IOC Report
file.exe

loading gif

Files

File Path
Type
Category
Malicious
file.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Docs.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Sat Nov 23 15:44:43 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Gmail.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Sat Nov 23 15:44:43 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Google Drive.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Wed Oct 4 12:54:07 2023, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Sheets.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Sat Nov 23 15:44:43 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Slides.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Sat Nov 23 15:44:43 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\YouTube.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Sat Nov 23 15:44:43 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
dropped
Chrome Cache Entry: 100
MS Windows icon resource - 6 icons, -128x-128, 16 colors, 72x72, 16 colors
downloaded
Chrome Cache Entry: 101
ASCII text, with very long lines (46884)
downloaded
Chrome Cache Entry: 102
JSON data
dropped
Chrome Cache Entry: 103
MS Windows icon resource - 6 icons, -128x-128, 16 colors, 72x72, 16 colors
dropped
Chrome Cache Entry: 104
PNG image data, 658 x 480, 8-bit/color RGBA, non-interlaced
downloaded
Chrome Cache Entry: 105
ASCII text, with very long lines (33148), with no line terminators
dropped
Chrome Cache Entry: 106
JSON data
downloaded
Chrome Cache Entry: 107
PNG image data, 475 x 212, 8-bit/color RGBA, non-interlaced
downloaded
Chrome Cache Entry: 108
JSON data
downloaded
Chrome Cache Entry: 109
exported SGML document, ASCII text, with very long lines (65536), with no line terminators
dropped
Chrome Cache Entry: 110
ASCII text, with very long lines (46884)
dropped
Chrome Cache Entry: 111
ASCII text
dropped
Chrome Cache Entry: 112
SVG Scalable Vector Graphics image
downloaded
Chrome Cache Entry: 113
Web Open Font Format (Version 2), TrueType, length 19696, version 1.0
downloaded
Chrome Cache Entry: 114
ASCII text, with very long lines (33148), with no line terminators
downloaded
Chrome Cache Entry: 115
PNG image data, 475 x 212, 8-bit/color RGBA, non-interlaced
dropped
Chrome Cache Entry: 116
PNG image data, 658 x 480, 8-bit/color RGBA, non-interlaced
dropped
Chrome Cache Entry: 117
JSON data
dropped
Chrome Cache Entry: 118
HTML document, ASCII text, with very long lines (639), with CRLF, LF line terminators
downloaded
Chrome Cache Entry: 119
JSON data
downloaded
Chrome Cache Entry: 120
PNG image data, 533 x 478, 8-bit/color RGBA, non-interlaced
dropped
Chrome Cache Entry: 84
PNG image data, 533 x 478, 8-bit/color RGBA, non-interlaced
dropped
Chrome Cache Entry: 85
PNG image data, 533 x 478, 8-bit/color RGBA, non-interlaced
downloaded
Chrome Cache Entry: 86
SVG Scalable Vector Graphics image
dropped
Chrome Cache Entry: 87
JSON data
dropped
Chrome Cache Entry: 88
PNG image data, 533 x 478, 8-bit/color RGBA, non-interlaced
dropped
Chrome Cache Entry: 89
ASCII text, with very long lines (65536), with no line terminators
downloaded
Chrome Cache Entry: 90
ASCII text, with no line terminators
downloaded
Chrome Cache Entry: 91
JSON data
dropped
Chrome Cache Entry: 92
ASCII text, with very long lines (65410)
downloaded
Chrome Cache Entry: 93
JSON data
downloaded
Chrome Cache Entry: 94
PNG image data, 533 x 478, 8-bit/color RGBA, non-interlaced
downloaded
Chrome Cache Entry: 95
ASCII text, with very long lines (52717), with no line terminators
dropped
Chrome Cache Entry: 96
ASCII text
downloaded
Chrome Cache Entry: 97
ASCII text, with very long lines (52717), with no line terminators
downloaded
Chrome Cache Entry: 98
exported SGML document, ASCII text, with very long lines (65536), with no line terminators
downloaded
Chrome Cache Entry: 99
PNG image data, 533 x 478, 8-bit/color RGBA, non-interlaced
downloaded
There are 34 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\file.exe
"C:\Users\user\Desktop\file.exe"
malicious
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized --single-argument http://go.microsoft.com/fwlink/?prd=11324&pver=4.5&sbp=AppLaunch2&plcid=0x409&o1=SHIM_NOVERSION_FOUND&version=(null)&processName=file.exe&platform=0009&osver=6&isServer=0&shimver=4.0.30319.0
malicious
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1884 --field-trial-handle=2012,i,2391827392709409351,7372759067112353565,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8
malicious
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized --single-argument http://go.microsoft.com/fwlink/?prd=11324&pver=4.5&sbp=AppLaunch2&plcid=0x409&o1=SHIM_NOVERSION_FOUND&version=(null)&processName=file.exe&platform=0009&osver=6&isServer=0&shimver=4.0.30319.0
malicious
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2056 --field-trial-handle=2000,i,16209135328301955217,6092186935791453691,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8
malicious

URLs

Name
IP
Malicious
https://authoring-docs-microsoft.poolparty.biz/devrel/7696cda6-0510-47f6-8302-71bb5d2e28cf
unknown
https://duckduckgo.com/chrome_newtab
unknown
https://duckduckgo.com/ac/?q=
unknown
https://property-imper.sbs/api
172.67.162.84
https://imp.mt48.net/static?id=7RHzfOIXjFEYsBdvIpkX4Qqm4p8dfCfm4pbW1pbWfpbW7ReNxR3UIG8zInwYIFIVs9eYi
unknown
https://github.com/dotnet/docs/blob/17c4acca45e573a92878a44a2cce57d699fe9c7c/docs/framework/install/
unknown
https://bridge.sfo1.admarketplace.net/ctp?version=16.0.0&key=1696425136400800000.2&ci=1696425136743.
unknown
https://www.linkedin.com/cws/share?url=$
unknown
https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
unknown
https://property-imper.sbs/CC
unknown
https://github.com/Youssef1313
unknown
https://management.azure.com/providers/Microsoft.Portal/userSettings/cloudconsole?api-version=2023-0
unknown
https://aka.ms/msignite_docs_banner
unknown
https://videoencodingpublic-hgeaeyeba8gycee3.b01.azurefd.net/public-b4da8140-92cf-421c-8b7b-e471d5b9
unknown
http://polymer.github.io/AUTHORS.txt
unknown
https://github.com/dotnet/docs/issues/new?template=z-customer-feedback.yml
unknown
https://management.azure.com/subscriptions?api-version=2016-06-01
unknown
https://github.com/dotnet/docs/blob/main/docs/framework/install/application-not-started.md
unknown
http://x1.c.lencr.org/0
unknown
http://x1.i.lencr.org/0
unknown
https://aka.ms/pshelpmechoose
unknown
https://aka.ms/feedback/report?space=61
unknown
https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
unknown
https://learn-video.azurefd.net/vod/player
unknown
https://property-imper.sbs/::
unknown
https://twitter.com/intent/tweet?original_referer=$
unknown
https://github.com/gewarren
unknown
http://185.215
unknown
http://185.215.113.16/off/def.exepleWebKit/537.36
unknown
https://property-imper.sbs/apiy
unknown
https://support.mozilla.org/products/firefoxgro.all
unknown
http://polymer.github.io/CONTRIBUTORS.txt
unknown
https://github.com/dotnet/docs/blob/live/docs/framework/install/application-not-started.md
unknown
https://property-imper.sbs:443/apiicrosoft
unknown
https://authoring-docs-microsoft.poolparty.biz/devrel/69c76c32-967e-4c65-b89a-74cc527db725
unknown
https://client-api.arkoselabs.com/v2/api.js
unknown
https://property-imper.sbs:443/api
unknown
https://aka.ms/MSIgniteChallenge/Tier1Banner?wt.mc_id=ignite24_learnbanner_tier1_cnl
unknown
https://management.azure.com/providers/Microsoft.Portal/consoles/default?api-version=2017-12-01-prev
unknown
https://www.google.com/images/branding/product/ico/googleg_lodp.ico
unknown
https://github.com/Thraka
unknown
http://polymer.github.io/PATENTS.txt
unknown
https://aka.ms/certhelp
unknown
http://185.215.113.16/steam/random.exe
unknown
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
unknown
http://crl.rootca1.amazontrust.com/rootca1.crl0
unknown
https://github.com/mairaw
unknown
https://property-imper.sbs/55
unknown
https://js.monitor.azure.com/scripts/c/ms.jsll-4.min.js
13.107.246.63
http://ocsp.rootca1.amazontrust.com0:
unknown
https://schema.org
unknown
http://polymer.github.io/LICENSE.txt
unknown
https://www.ecosia.org/newtab/
unknown
http://31.41.244.11/files/rnd.exe
unknown
https://bridge.sfo1.ap01.net/ctp?version=16.0.0&key=1696425136400800000.1&ci=1696425136743.12791&cta
unknown
https://property-imper.sbs/
unknown
https://support.mozilla.org/kb/customize-firefox-controls-buttons-and-toolbars?utm_source=firefox-br
unknown
https://aka.ms/yourcaliforniaprivacychoices
unknown
https://ac.ecosia.org/autocomplete?q=
unknown
https://github.com/nschonni
unknown
https://property-imper.sbs/$v6/
unknown
https://property-imper.sbs/h
unknown
https://property-imper.sbs/api;E
unknown
https://videoencodingpublic-hgeaeyeba8gycee3.b01.azurefd.net/public-09ce73a6-05a5-4e4d-b3d7-bd5a8c05
unknown
https://contile-images.services.mozilla.com/u1AuJcj32cbVUf9NjMipLXEYwu2uFIt4lsj-ccwVqEs.36904.jpg
unknown
https://github.com/adegeo
unknown
http://crl.micro
unknown
https://contile-images.services.mozilla.com/obgoOYObjIFea_bXuT6L4LbBJ8j425AD87S1HMD3BWg.9991.jpg
unknown
http://185.215.113.16:80/off/def.exe
unknown
https://property-imper.sbs:443/apiK
unknown
https://github.com/jonschlinkert/is-plain-object
unknown
https://property-imper.sbs/apiN
unknown
http://crt.rootca1.amazontrust.com/rootca1.cer0?
unknown
https://octokit.github.io/rest.js/#throttling
unknown
https://www.bestbuy.com/site/electronics/top-deals/pcmcat1563299784494.c/?id=pcmcat1563299784494&ref
unknown
https://github.com/js-cookie/js-cookie
unknown
https://www.amazon.com/?tag=admarketus-20&ref=pd_sl_35787f1071928bc3a1aef90b79c9bee9c64ba6683fde7477
unknown
http://185.215.113.16/off/def.exe
unknown
http://schema.org/Organization
unknown
https://channel9.msdn.com/
unknown
https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
unknown
https://github.com/dotnet/try
unknown
There are 72 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
property-imper.sbs
172.67.162.84
www.google.com
216.58.208.228
s-part-0035.t-0009.t-msedge.net
13.107.246.63
js.monitor.azure.com
unknown
mdec.nelreports.net
unknown

IPs

IP
Domain
Country
Malicious
192.168.2.5
unknown
unknown
malicious
13.107.246.63
s-part-0035.t-0009.t-msedge.net
United States
185.215.113.16
unknown
Portugal
172.67.162.84
property-imper.sbs
United States
239.255.255.250
unknown
Reserved
216.58.208.228
www.google.com
United States

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer
SlowContextMenuEntries

Memdumps

Base Address
Regiontype
Protect
Malicious
5527000
trusted library allocation
page read and write
5D71000
trusted library allocation
page read and write
5511000
trusted library allocation
page read and write
54F2000
trusted library allocation
page read and write
5587000
trusted library allocation
page read and write
462000
unkown
page execute and read and write
54A3000
trusted library allocation
page read and write
5A66000
trusted library allocation
page read and write
44E1000
heap
page read and write
592D000
trusted library allocation
page read and write
5B7A000
trusted library allocation
page read and write
323E000
stack
page read and write
5925000
trusted library allocation
page read and write
2F7F000
stack
page read and write
5BA0000
direct allocation
page read and write
59E9000
trusted library allocation
page read and write
78CE000
stack
page read and write
5A6F000
trusted library allocation
page read and write
5922000
trusted library allocation
page read and write
54B2000
trusted library allocation
page read and write
54B8000
trusted library allocation
page read and write
54AE000
trusted library allocation
page read and write
728E000
stack
page read and write
D7C000
heap
page read and write
59DE000
trusted library allocation
page read and write
D74000
heap
page read and write
59F6000
trusted library allocation
page read and write
549E000
trusted library allocation
page read and write
638E000
stack
page read and write
54B7000
trusted library allocation
page read and write
6029000
trusted library allocation
page execute and read and write
549E000
trusted library allocation
page read and write
59C2000
trusted library allocation
page read and write
69CE000
stack
page read and write
54AE000
trusted library allocation
page read and write
54CA000
trusted library allocation
page read and write
549E000
trusted library allocation
page read and write
55A0000
trusted library allocation
page read and write
30BF000
stack
page read and write
7C8E000
stack
page read and write
54C7000
trusted library allocation
page read and write
4FBF000
stack
page read and write
54C4000
trusted library allocation
page read and write
D42000
heap
page read and write
D66000
heap
page read and write
5A48000
trusted library allocation
page read and write
548A000
trusted library allocation
page read and write
44E1000
heap
page read and write
59E1000
trusted library allocation
page read and write
548E000
trusted library allocation
page read and write
5497000
trusted library allocation
page read and write
5920000
trusted library allocation
page read and write
572B000
trusted library allocation
page read and write
5527000
trusted library allocation
page read and write
5628000
trusted library allocation
page read and write
5920000
trusted library allocation
page read and write
D77000
heap
page read and write
592E000
trusted library allocation
page read and write
44E1000
heap
page read and write
5922000
trusted library allocation
page read and write
D54000
heap
page read and write
54C5000
trusted library allocation
page read and write
5273000
heap
page read and write
4B4E000
trusted library allocation
page read and write
648F000
stack
page read and write
CC6000
heap
page read and write
79CF000
stack
page read and write
54A0000
trusted library allocation
page read and write
7E90000
heap
page read and write
28A0000
direct allocation
page read and write
549E000
trusted library allocation
page read and write
D5C000
heap
page read and write
D65000
heap
page read and write
5926000
trusted library allocation
page read and write
55DE000
stack
page read and write
4B00000
direct allocation
page execute and read and write
5484000
trusted library allocation
page read and write
28A0000
direct allocation
page read and write
3EBE000
stack
page read and write
D4E000
heap
page read and write
54AE000
trusted library allocation
page read and write
54C7000
trusted library allocation
page read and write
5536000
trusted library allocation
page read and write
D67000
heap
page read and write
49F000
unkown
page execute and read and write
54C0000
trusted library allocation
page read and write
C70000
heap
page read and write
558B000
trusted library allocation
page read and write
3BFF000
stack
page read and write
C80000
heap
page read and write
5A63000
trusted library allocation
page read and write
44E1000
heap
page read and write
D79000
heap
page read and write
3AFE000
stack
page read and write
54AF000
trusted library allocation
page read and write
592A000
trusted library allocation
page read and write
D69000
heap
page read and write
548E000
trusted library allocation
page read and write
5BBF000
trusted library allocation
page read and write
5722000
trusted library allocation
page read and write
D79000
heap
page read and write
54C7000
trusted library allocation
page read and write
D6C000
heap
page read and write
D79000
heap
page read and write
5490000
trusted library allocation
page read and write
54A4000
trusted library allocation
page read and write
AC0000
heap
page read and write
5498000
trusted library allocation
page read and write
5930000
trusted library allocation
page read and write
5581000
trusted library allocation
page read and write
44E1000
heap
page read and write
514F000
stack
page read and write
54A5000
trusted library allocation
page read and write
2ABF000
stack
page read and write
AAE000
stack
page read and write
74CF000
stack
page read and write
5E9A000
trusted library allocation
page execute and read and write
5488000
trusted library allocation
page read and write
1F7000
unkown
page write copy
549E000
trusted library allocation
page read and write
549C000
trusted library allocation
page read and write
54AE000
trusted library allocation
page read and write
5720000
trusted library allocation
page read and write
397F000
stack
page read and write
5514000
trusted library allocation
page read and write
5496000
trusted library allocation
page read and write
5534000
trusted library allocation
page read and write
28A0000
direct allocation
page read and write
5B1F000
stack
page read and write
549D000
trusted library allocation
page read and write
54D5000
trusted library allocation
page read and write
44F0000
heap
page read and write
54AE000
trusted library allocation
page read and write
7F9E000
stack
page read and write
54AE000
trusted library allocation
page read and write
549E000
trusted library allocation
page read and write
5926000
trusted library allocation
page read and write
54E1000
trusted library allocation
page read and write
5923000
trusted library allocation
page read and write
54AE000
trusted library allocation
page read and write
670F000
stack
page read and write
592C000
trusted library allocation
page read and write
5485000
trusted library allocation
page read and write
5922000
trusted library allocation
page read and write
5498000
trusted library allocation
page read and write
5587000
trusted library allocation
page read and write
592E000
trusted library allocation
page read and write
D67000
heap
page read and write
59FF000
trusted library allocation
page read and write
54BB000
trusted library allocation
page read and write
5A32000
trusted library allocation
page read and write
54F2000
trusted library allocation
page read and write
5B50000
trusted library allocation
page read and write
6CB000
stack
page read and write
5B88000
trusted library allocation
page read and write
5923000
trusted library allocation
page read and write
5A42000
trusted library allocation
page read and write
548A000
trusted library allocation
page read and write
54B7000
trusted library allocation
page read and write
548E000
trusted library allocation
page read and write
D66000
heap
page read and write
40FF000
stack
page read and write
4B0D000
stack
page read and write
5F97000
trusted library allocation
page read and write
4A0000
unkown
page execute and write copy
59FB000
trusted library allocation
page read and write
592B000
trusted library allocation
page read and write
7E10000
trusted library allocation
page read and write
54A9000
trusted library allocation
page read and write
380000
unkown
page execute and read and write
5518000
trusted library allocation
page read and write
5BA0000
direct allocation
page read and write
44E1000
heap
page read and write
56BF000
trusted library allocation
page read and write
54AE000
trusted library allocation
page read and write
59C4000
trusted library allocation
page read and write
548E000
trusted library allocation
page read and write
4B00000
direct allocation
page execute and read and write
5A30000
trusted library allocation
page read and write
5928000
trusted library allocation
page read and write
D77000
heap
page read and write
5B7C000
trusted library allocation
page read and write
549F000
trusted library allocation
page read and write
5921000
trusted library allocation
page read and write
549D000
trusted library allocation
page read and write
44E1000
heap
page read and write
5484000
trusted library allocation
page read and write
80CE000
stack
page read and write
5518000
trusted library allocation
page read and write
613C000
trusted library allocation
page execute and read and write
54AE000
trusted library allocation
page read and write
7E40000
direct allocation
page execute and read and write
549E000
trusted library allocation
page read and write
54AC000
trusted library allocation
page read and write
44E1000
heap
page read and write
59F8000
trusted library allocation
page read and write
5A51000
trusted library allocation
page read and write
5925000
trusted library allocation
page read and write
553A000
trusted library allocation
page read and write
5485000
trusted library allocation
page read and write
D7B000
heap
page read and write
54AE000
trusted library allocation
page read and write
556D000
trusted library allocation
page read and write
383F000
stack
page read and write
44E1000
heap
page read and write
5926000
trusted library allocation
page read and write
549E000
trusted library allocation
page read and write
D5F000
heap
page read and write
688E000
stack
page read and write
504E000
stack
page read and write
54A7000
trusted library allocation
page read and write
548F000
trusted library allocation
page read and write
5927000
trusted library allocation
page read and write
54C0000
trusted library allocation
page read and write
D5E000
heap
page read and write
592E000
trusted library allocation
page read and write
5493000
trusted library allocation
page read and write
54AA000
trusted library allocation
page read and write
4B00000
direct allocation
page execute and read and write
54FE000
trusted library allocation
page read and write
548F000
trusted library allocation
page read and write
54B8000
trusted library allocation
page read and write
54AE000
trusted library allocation
page read and write
5929000
trusted library allocation
page read and write
5BC0000
direct allocation
page read and write
634F000
stack
page read and write
5585000
trusted library allocation
page read and write
44E1000
heap
page read and write
54AE000
trusted library allocation
page read and write
5538000
trusted library allocation
page read and write
5BA0000
direct allocation
page read and write
5A30000
trusted library allocation
page read and write
5921000
trusted library allocation
page read and write
7A0E000
stack
page read and write
5921000
trusted library allocation
page read and write
5628000
trusted library allocation
page read and write
5A42000
trusted library allocation
page read and write
5A6E000
trusted library allocation
page read and write
28B0000
heap
page read and write
54AC000
trusted library allocation
page read and write
54AE000
trusted library allocation
page read and write
54D4000
trusted library allocation
page read and write
44E1000
heap
page read and write
698F000
stack
page read and write
5927000
trusted library allocation
page read and write
54AA000
trusted library allocation
page read and write
5583000
trusted library allocation
page read and write
5A40000
trusted library allocation
page read and write
549D000
trusted library allocation
page read and write
54A7000
trusted library allocation
page read and write
5920000
trusted library allocation
page read and write
5926000
trusted library allocation
page read and write
59C6000
trusted library allocation
page read and write
548F000
trusted library allocation
page read and write
54D0000
trusted library allocation
page read and write
54AD000
trusted library allocation
page read and write
5518000
trusted library allocation
page read and write
54B6000
trusted library allocation
page read and write
54A6000
trusted library allocation
page read and write
788F000
stack
page read and write
D75000
heap
page read and write
549E000
trusted library allocation
page read and write
5920000
trusted library allocation
page read and write
5AFE000
trusted library allocation
page read and write
5BA0000
direct allocation
page read and write
39BE000
stack
page read and write
6FCF000
stack
page read and write
5B3C000
trusted library allocation
page read and write
44E1000
heap
page read and write
35FE000
stack
page read and write
3FFE000
stack
page read and write
5580000
trusted library allocation
page read and write
5A20000
trusted library allocation
page read and write
D79000
heap
page read and write
5493000
trusted library allocation
page read and write
5B5C000
stack
page read and write
5922000
trusted library allocation
page read and write
D3D000
heap
page read and write
558D000
trusted library allocation
page read and write
54B6000
trusted library allocation
page read and write
7E10000
direct allocation
page execute and read and write
285E000
stack
page read and write
5924000
trusted library allocation
page read and write
5BC1000
trusted library allocation
page read and write
54AE000
trusted library allocation
page read and write
D7C000
heap
page read and write
28A0000
direct allocation
page read and write
5BA0000
direct allocation
page read and write
5ACC000
trusted library allocation
page read and write
5BA0000
direct allocation
page read and write
5925000
trusted library allocation
page read and write
4ABF000
stack
page read and write
423F000
stack
page read and write
54C1000
trusted library allocation
page read and write
54B0000
trusted library allocation
page read and write
D77000
heap
page read and write
D4E000
heap
page read and write
4AF0000
direct allocation
page execute and read and write
54CC000
trusted library allocation
page read and write
5928000
trusted library allocation
page read and write
54E5000
trusted library allocation
page read and write
D4A000
heap
page read and write
54BF000
trusted library allocation
page read and write
D77000
heap
page read and write
54D8000
trusted library allocation
page read and write
549E000
trusted library allocation
page read and write
5481000
trusted library allocation
page read and write
D4B000
heap
page read and write
55D8000
trusted library allocation
page read and write
592A000
trusted library allocation
page read and write
612E000
trusted library allocation
page execute and read and write
548F000
trusted library allocation
page read and write
5518000
trusted library allocation
page read and write
5BC0000
direct allocation
page read and write
D54000
heap
page read and write
7C4F000
stack
page read and write
54AE000
trusted library allocation
page read and write
592B000
trusted library allocation
page read and write
2FBE000
stack
page read and write
5927000
trusted library allocation
page read and write
5929000
trusted library allocation
page read and write
44E0000
heap
page read and write
5A6A000
trusted library allocation
page read and write
5923000
trusted library allocation
page read and write
5527000
trusted library allocation
page read and write
5A29000
trusted library allocation
page read and write
5A6E000
trusted library allocation
page read and write
5518000
trusted library allocation
page read and write
5495000
trusted library allocation
page read and write
4920000
trusted library allocation
page read and write
59FA000
trusted library allocation
page read and write
548A000
trusted library allocation
page read and write
59E0000
trusted library allocation
page read and write
5270000
heap
page read and write
5923000
trusted library allocation
page read and write
5A08000
trusted library allocation
page read and write
750E000
stack
page read and write
549E000
trusted library allocation
page read and write
549E000
trusted library allocation
page read and write
549F000
trusted library allocation
page read and write
549D000
trusted library allocation
page read and write
5499000
trusted library allocation
page read and write
54C7000
trusted library allocation
page read and write
5A01000
trusted library allocation
page read and write
54C6000
trusted library allocation
page read and write
5929000
trusted library allocation
page read and write
1A1000
unkown
page execute and write copy
D4A000
heap
page read and write
5920000
trusted library allocation
page read and write
59E7000
trusted library allocation
page read and write
5B3A000
trusted library allocation
page read and write
D7B000
heap
page read and write
54AD000
trusted library allocation
page read and write
592B000
trusted library allocation
page read and write
549D000
trusted library allocation
page read and write
7D90000
trusted library allocation
page read and write
54B2000
trusted library allocation
page read and write
D7E000
heap
page read and write
85DE000
stack
page read and write
5A53000
trusted library allocation
page read and write
54CE000
trusted library allocation
page read and write
35BF000
stack
page read and write
5924000
trusted library allocation
page read and write
5A39000
trusted library allocation
page read and write
613E000
trusted library allocation
page execute and read and write
D77000
heap
page read and write
7CB000
stack
page read and write
5481000
trusted library allocation
page read and write
6D8E000
stack
page read and write
54D6000
trusted library allocation
page read and write
5923000
trusted library allocation
page read and write
549C000
trusted library allocation
page read and write
5481000
trusted library allocation
page read and write
1A1000
unkown
page execute and read and write
55B8000
trusted library allocation
page read and write
D61000
heap
page read and write
44E1000
heap
page read and write
5518000
trusted library allocation
page read and write
289E000
stack
page read and write
5925000
trusted library allocation
page read and write
28A0000
direct allocation
page read and write
549E000
trusted library allocation
page read and write
54AE000
trusted library allocation
page read and write
548F000
trusted library allocation
page read and write
387E000
stack
page read and write
E7F000
stack
page read and write
28A0000
direct allocation
page read and write
D4B000
heap
page read and write
5A88000
trusted library allocation
page read and write
54AE000
trusted library allocation
page read and write
54E2000
trusted library allocation
page read and write
D77000
heap
page read and write
CE8000
heap
page read and write
5A69000
trusted library allocation
page read and write
5B2C000
trusted library allocation
page read and write
5660000
trusted library allocation
page read and write
CCA000
heap
page read and write
54A7000
trusted library allocation
page read and write
54EA000
trusted library allocation
page read and write
D77000
heap
page read and write
549E000
trusted library allocation
page read and write
592D000
trusted library allocation
page read and write
54B8000
trusted library allocation
page read and write
54AE000
trusted library allocation
page read and write
54AE000
trusted library allocation
page read and write
5E90000
trusted library allocation
page read and write
80D0000
heap
page read and write
5923000
trusted library allocation
page read and write
4B00000
direct allocation
page execute and read and write
D7C000
heap
page read and write
54AE000
trusted library allocation
page read and write
5E92000
trusted library allocation
page execute and read and write
51BE000
stack
page read and write
A30000
heap
page read and write
6B0E000
stack
page read and write
D73000
heap
page read and write
54C8000
trusted library allocation
page read and write
549B000
trusted library allocation
page read and write
549E000
trusted library allocation
page read and write
59D1000
trusted library allocation
page read and write
5922000
trusted library allocation
page read and write
54A6000
trusted library allocation
page read and write
5B2F000
trusted library allocation
page read and write
549D000
trusted library allocation
page read and write
5498000
trusted library allocation
page read and write
49F000
unkown
page execute and write copy
4EBE000
stack
page read and write
28A0000
direct allocation
page read and write
5518000
trusted library allocation
page read and write
5497000
trusted library allocation
page read and write
724F000
stack
page read and write
D79000
heap
page read and write
5527000
trusted library allocation
page read and write
84DE000
stack
page read and write
54CE000
trusted library allocation
page read and write
5922000
trusted library allocation
page read and write
D3D000
heap
page read and write
5B10000
trusted library allocation
page read and write
D7C000
heap
page read and write
5492000
trusted library allocation
page read and write
54F2000
trusted library allocation
page read and write
D4E000
heap
page read and write
D61000
heap
page read and write
7B0F000
stack
page read and write
551B000
trusted library allocation
page read and write
80EA000
trusted library allocation
page read and write
5B8A000
trusted library allocation
page read and write
55F0000
direct allocation
page read and write
2E3F000
stack
page read and write
5925000
trusted library allocation
page read and write
5925000
trusted library allocation
page read and write
D7B000
heap
page read and write
D79000
heap
page read and write
54D6000
trusted library allocation
page read and write
558B000
trusted library allocation
page read and write
D6C000
heap
page read and write
6E8F000
stack
page read and write
54E5000
trusted library allocation
page read and write
548E000
trusted library allocation
page read and write
549E000
trusted library allocation
page read and write
5E76000
trusted library allocation
page read and write
56F0000
trusted library allocation
page read and write
44C0000
heap
page read and write
44E1000
heap
page read and write
5A06000
trusted library allocation
page read and write
2E7E000
stack
page read and write
5BC0000
direct allocation
page read and write
54B6000
trusted library allocation
page read and write
D79000
heap
page read and write
D5C000
heap
page read and write
7E0C000
stack
page read and write
54AE000
trusted library allocation
page read and write
54D1000
trusted library allocation
page read and write
9980000
trusted library allocation
page read and write
D5A000
heap
page read and write
54AE000
trusted library allocation
page read and write
D4A000
heap
page read and write
54AE000
trusted library allocation
page read and write
4B10000
direct allocation
page execute and read and write
549E000
trusted library allocation
page read and write
D79000
heap
page read and write
548A000
trusted library allocation
page read and write
D4A000
heap
page read and write
80E0000
trusted library allocation
page read and write
D74000
heap
page read and write
54D5000
trusted library allocation
page read and write
28A0000
direct allocation
page read and write
5527000
trusted library allocation
page read and write
54AE000
trusted library allocation
page read and write
4B30000
direct allocation
page execute and read and write
54EB000
trusted library allocation
page read and write
5496000
trusted library allocation
page read and write
54D2000
trusted library allocation
page read and write
5A37000
trusted library allocation
page read and write
5581000
trusted library allocation
page read and write
5A48000
trusted library allocation
page read and write
BDE000
stack
page read and write
548E000
trusted library allocation
page read and write
D4A000
heap
page read and write
549D000
trusted library allocation
page read and write
D4F000
heap
page read and write
54AE000
trusted library allocation
page read and write
5A16000
trusted library allocation
page read and write
5B00000
trusted library allocation
page read and write
D77000
heap
page read and write
C8E000
heap
page read and write
29BF000
stack
page read and write
59F8000
trusted library allocation
page read and write
D66000
heap
page read and write
59D3000
trusted library allocation
page read and write
54B0000
trusted library allocation
page read and write
1F9000
unkown
page execute and read and write
5490000
trusted library allocation
page read and write
5927000
trusted library allocation
page read and write
549A000
trusted library allocation
page read and write
44E1000
heap
page read and write
347F000
stack
page read and write
760F000
stack
page read and write
D40000
heap
page read and write
849C000
stack
page read and write
D32000
heap
page read and write
D69000
heap
page read and write
778E000
stack
page read and write
549D000
trusted library allocation
page read and write
54D9000
trusted library allocation
page read and write
54AE000
trusted library allocation
page read and write
3E7F000
stack
page read and write
5A44000
trusted library allocation
page read and write
5518000
trusted library allocation
page read and write
5BA0000
direct allocation
page read and write
5481000
trusted library allocation
page read and write
5527000
trusted library allocation
page read and write
5580000
trusted library allocation
page read and write
D69000
heap
page read and write
373E000
stack
page read and write
49BC000
stack
page read and write
592C000
trusted library allocation
page read and write
5926000
trusted library allocation
page read and write
43BE000
stack
page read and write
54F2000
trusted library allocation
page read and write
4970000
direct allocation
page read and write
54A4000
trusted library allocation
page read and write
5485000
trusted library allocation
page read and write
5923000
trusted library allocation
page read and write
413E000
stack
page read and write
54D5000
trusted library allocation
page read and write
5A11000
trusted library allocation
page read and write
490000
unkown
page execute and read and write
54D7000
trusted library allocation
page read and write
5BA0000
direct allocation
page read and write
CD1000
heap
page read and write
489000
unkown
page execute and read and write
738F000
stack
page read and write
5AD2000
trusted library allocation
page read and write
54C7000
trusted library allocation
page read and write
5B2A000
trusted library allocation
page read and write
F7F000
stack
page read and write
549F000
trusted library allocation
page read and write
5A0E000
trusted library allocation
page read and write
54AE000
trusted library allocation
page read and write
674E000
stack
page read and write
28B7000
heap
page read and write
4970000
direct allocation
page read and write
7DA0000
trusted library allocation
page read and write
54F1000
trusted library allocation
page read and write
54E3000
trusted library allocation
page read and write
6C4E000
stack
page read and write
547E000
stack
page read and write
44E1000
heap
page read and write
5527000
trusted library allocation
page read and write
4D7E000
stack
page read and write
5BDE000
trusted library allocation
page read and write
5498000
trusted library allocation
page read and write
3ABF000
stack
page read and write
54AE000
trusted library allocation
page read and write
5921000
trusted library allocation
page read and write
3FBF000
stack
page read and write
54D7000
trusted library allocation
page read and write
5BA0000
direct allocation
page read and write
AC5000
heap
page read and write
54AE000
trusted library allocation
page read and write
5927000
trusted library allocation
page read and write
522E000
stack
page read and write
548E000
trusted library allocation
page read and write
549E000
trusted library allocation
page read and write
5A46000
trusted library allocation
page read and write
549E000
trusted library allocation
page read and write
54BB000
trusted library allocation
page read and write
5BA0000
direct allocation
page read and write
549E000
trusted library allocation
page read and write
D4A000
heap
page read and write
6ACF000
stack
page read and write
44E1000
heap
page read and write
D4E000
heap
page read and write
54C2000
trusted library allocation
page read and write
54F2000
trusted library allocation
page read and write
3C3E000
stack
page read and write
65CF000
stack
page read and write
54D7000
trusted library allocation
page read and write
5A6B000
trusted library allocation
page read and write
D61000
heap
page read and write
D79000
heap
page read and write
5518000
trusted library allocation
page read and write
54AE000
trusted library allocation
page read and write
548E000
trusted library allocation
page read and write
73CE000
stack
page read and write
2CFF000
stack
page read and write
54B1000
trusted library allocation
page read and write
4FE0000
remote allocation
page read and write
54D0000
trusted library allocation
page read and write
C6C000
stack
page read and write
4AD0000
direct allocation
page execute and read and write
D54000
heap
page read and write
624F000
stack
page read and write
5921000
trusted library allocation
page read and write
D4E000
heap
page read and write
5929000
trusted library allocation
page read and write
5A0A000
trusted library allocation
page read and write
5510000
trusted library allocation
page read and write
1A0000
unkown
page read and write
549E000
trusted library allocation
page read and write
54A0000
trusted library allocation
page read and write
D42000
heap
page read and write
5AF6000
trusted library allocation
page read and write
5536000
trusted library allocation
page read and write
D7C000
heap
page read and write
44E1000
heap
page read and write
D77000
heap
page read and write
7B4E000
stack
page read and write
28A0000
direct allocation
page read and write
5928000
trusted library allocation
page read and write
5A10000
trusted library allocation
page read and write
54FB000
trusted library allocation
page read and write
D75000
heap
page read and write
54F2000
trusted library allocation
page read and write
700E000
stack
page read and write
537F000
stack
page read and write
54DE000
trusted library allocation
page read and write
CD1000
heap
page read and write
A40000
heap
page read and write
59E6000
trusted library allocation
page read and write
4C3D000
stack
page read and write
5A22000
trusted library allocation
page read and write
54A3000
trusted library allocation
page read and write
D77000
heap
page read and write
D5A000
heap
page read and write
5505000
trusted library allocation
page read and write
54C9000
trusted library allocation
page read and write
54CE000
trusted library allocation
page read and write
5491000
trusted library allocation
page read and write
D77000
heap
page read and write
4D3D000
stack
page read and write
5927000
trusted library allocation
page read and write
59D9000
trusted library allocation
page read and write
337E000
stack
page read and write
5B0E000
trusted library allocation
page read and write
5A4F000
trusted library allocation
page read and write
54A9000
trusted library allocation
page read and write
549E000
trusted library allocation
page read and write
592C000
trusted library allocation
page read and write
28A0000
direct allocation
page read and write
59D7000
trusted library allocation
page read and write
D69000
heap
page read and write
D4E000
heap
page read and write
63C000
unkown
page execute and write copy
5485000
trusted library allocation
page read and write
54AE000
trusted library allocation
page read and write
5A6C000
trusted library allocation
page read and write
549F000
trusted library allocation
page read and write
54AE000
trusted library allocation
page read and write
D79000
heap
page read and write
5AAB000
trusted library allocation
page read and write
5A64000
trusted library allocation
page read and write
C8A000
heap
page read and write
54B6000
trusted library allocation
page read and write
5A70000
trusted library allocation
page read and write
D4F000
heap
page read and write
59C6000
trusted library allocation
page read and write
5A46000
trusted library allocation
page read and write
548E000
trusted library allocation
page read and write
D67000
heap
page read and write
5A72000
trusted library allocation
page read and write
D79000
heap
page read and write
54CB000
trusted library allocation
page read and write
D69000
heap
page read and write
59C4000
trusted library allocation
page read and write
D32000
heap
page read and write
6ECE000
stack
page read and write
5480000
trusted library allocation
page read and write
5BA0000
direct allocation
page read and write
1F7000
unkown
page read and write
5A55000
trusted library allocation
page read and write
4B20000
direct allocation
page execute and read and write
54A2000
trusted library allocation
page read and write
54AE000
trusted library allocation
page read and write
5A19000
stack
page read and write
54C0000
trusted library allocation
page read and write
54B6000
trusted library allocation
page read and write
5924000
trusted library allocation
page read and write
5481000
trusted library allocation
page read and write
549D000
trusted library allocation
page read and write
4FE0000
remote allocation
page read and write
5B44000
trusted library allocation
page read and write
549D000
trusted library allocation
page read and write
5527000
trusted library allocation
page read and write
44E1000
heap
page read and write
5928000
trusted library allocation
page read and write
54B8000
trusted library allocation
page read and write
4B00000
direct allocation
page execute and read and write
54B7000
trusted library allocation
page read and write
59FF000
trusted library allocation
page read and write
549D000
trusted library allocation
page read and write
592E000
trusted library allocation
page read and write
5E83000
trusted library allocation
page read and write
C2E000
stack
page read and write
2D3E000
stack
page read and write
5BA0000
direct allocation
page read and write
550A000
trusted library allocation
page read and write
684F000
stack
page read and write
549E000
trusted library allocation
page read and write
54F2000
trusted library allocation
page read and write
5AD4000
trusted library allocation
page read and write
54C8000
trusted library allocation
page read and write
5527000
trusted library allocation
page read and write
660E000
stack
page read and write
549E000
trusted library allocation
page read and write
592C000
trusted library allocation
page read and write
80E2000
trusted library allocation
page read and write
714E000
stack
page read and write
5927000
trusted library allocation
page read and write
5485000
trusted library allocation
page read and write
5A2C000
trusted library allocation
page read and write
5A7A000
trusted library allocation
page read and write
427E000
stack
page read and write
764E000
stack
page read and write
5658000
trusted library allocation
page read and write
5923000
trusted library allocation
page read and write
549D000
trusted library allocation
page read and write
31FF000
stack
page read and write
5924000
trusted library allocation
page read and write
437F000
stack
page read and write
5ACA000
trusted library allocation
page read and write
1E5000
unkown
page execute and read and write
D4F000
heap
page read and write
54B6000
trusted library allocation
page read and write
549E000
trusted library allocation
page read and write
1A0000
unkown
page readonly
496D000
stack
page read and write
D5E000
heap
page read and write
333F000
stack
page read and write
2BBF000
stack
page read and write
59E4000
trusted library allocation
page read and write
64CE000
stack
page read and write
54DB000
trusted library allocation
page read and write
4AE0000
direct allocation
page execute and read and write
5485000
trusted library allocation
page read and write
5930000
trusted library allocation
page read and write
5269000
stack
page read and write
54A4000
trusted library allocation
page read and write
5A2A000
trusted library allocation
page read and write
5925000
trusted library allocation
page read and write
44E1000
heap
page read and write
44BF000
stack
page read and write
54D2000
trusted library allocation
page read and write
5A13000
trusted library allocation
page read and write
D74000
heap
page read and write
49B4000
direct allocation
page read and write
5923000
trusted library allocation
page read and write
5A27000
trusted library allocation
page read and write
5927000
trusted library allocation
page read and write
5BA0000
direct allocation
page read and write
5A0C000
trusted library allocation
page read and write
44E1000
heap
page read and write
4E7E000
stack
page read and write
5925000
trusted library allocation
page read and write
D75000
heap
page read and write
3D3F000
stack
page read and write
D58000
heap
page read and write
44E1000
heap
page read and write
3D7E000
stack
page read and write
54AE000
trusted library allocation
page read and write
549D000
trusted library allocation
page read and write
54CA000
trusted library allocation
page read and write
5925000
trusted library allocation
page read and write
30FE000
stack
page read and write
549C000
trusted library allocation
page read and write
7D8F000
stack
page read and write
548B000
trusted library allocation
page read and write
5B9E000
stack
page read and write
5E96000
trusted library allocation
page read and write
550B000
trusted library allocation
page read and write
5A01000
trusted library allocation
page read and write
54D5000
trusted library allocation
page read and write
28A0000
direct allocation
page read and write
54EC000
trusted library allocation
page read and write
5925000
trusted library allocation
page read and write
774F000
stack
page read and write
5A8A000
trusted library allocation
page read and write
D62000
heap
page read and write
5498000
trusted library allocation
page read and write
D7C000
heap
page read and write
5A2E000
trusted library allocation
page read and write
592A000
trusted library allocation
page read and write
5481000
trusted library allocation
page read and write
5493000
trusted library allocation
page read and write
5AF8000
trusted library allocation
page read and write
D79000
heap
page read and write
5922000
trusted library allocation
page read and write
D77000
heap
page read and write
2BFE000
stack
page read and write
36FF000
stack
page read and write
28A0000
direct allocation
page read and write
5A8D000
trusted library allocation
page read and write
5A78000
trusted library allocation
page read and write
549D000
trusted library allocation
page read and write
5A6C000
trusted library allocation
page read and write
6C0F000
stack
page read and write
54AE000
trusted library allocation
page read and write
CE8000
heap
page read and write
561E000
trusted library allocation
page read and write
D5C000
heap
page read and write
5B4E000
trusted library allocation
page read and write
54B7000
trusted library allocation
page read and write
5BA0000
direct allocation
page read and write
54DE000
trusted library allocation
page read and write
D6E000
heap
page read and write
54F2000
trusted library allocation
page read and write
5929000
trusted library allocation
page read and write
5582000
trusted library allocation
page read and write
54CB000
trusted library allocation
page read and write
54F2000
trusted library allocation
page read and write
54AE000
trusted library allocation
page read and write
54E1000
trusted library allocation
page read and write
5B46000
trusted library allocation
page read and write
28A0000
direct allocation
page read and write
54AE000
trusted library allocation
page read and write
5481000
trusted library allocation
page read and write
54AE000
trusted library allocation
page read and write
54AE000
trusted library allocation
page read and write
549A000
trusted library allocation
page read and write
4970000
direct allocation
page read and write
54A6000
trusted library allocation
page read and write
5BE0000
trusted library allocation
page read and write
54AE000
trusted library allocation
page read and write
34BE000
stack
page read and write
5A71000
trusted library allocation
page read and write
4B00000
direct allocation
page execute and read and write
44E1000
heap
page read and write
281F000
stack
page read and write
5927000
trusted library allocation
page read and write
5650000
trusted library allocation
page read and write
5A70000
trusted library allocation
page read and write
993F000
stack
page read and write
549E000
trusted library allocation
page read and write
5AAD000
trusted library allocation
page read and write
63B000
unkown
page execute and read and write
592B000
trusted library allocation
page read and write
5A14000
trusted library allocation
page read and write
D7C000
heap
page read and write
28A0000
direct allocation
page read and write
D79000
heap
page read and write
CF5000
heap
page read and write
5491000
trusted library allocation
page read and write
5A65000
trusted library allocation
page read and write
710F000
stack
page read and write
54AE000
trusted library allocation
page read and write
D63000
heap
page read and write
59FD000
trusted library allocation
page read and write
556D000
trusted library allocation
page read and write
6D4F000
stack
page read and write
CB8000
heap
page read and write
59C4000
trusted library allocation
page read and write
D79000
heap
page read and write
54AF000
trusted library allocation
page read and write
54CE000
trusted library allocation
page read and write
D59000
heap
page read and write
54A7000
trusted library allocation
page read and write
548A000
trusted library allocation
page read and write
549E000
trusted library allocation
page read and write
54BB000
trusted library allocation
page read and write
549E000
trusted library allocation
page read and write
839C000
stack
page read and write
549E000
trusted library allocation
page read and write
4FE0000
remote allocation
page read and write
5B2D000
trusted library allocation
page read and write
D77000
heap
page read and write
4970000
direct allocation
page read and write
CF5000
heap
page read and write
59E3000
trusted library allocation
page read and write
D7C000
heap
page read and write
54FC000
trusted library allocation
page read and write
There are 881 hidden memdumps, click here to show them.

DOM / HTML

URL
Malicious
https://learn.microsoft.com/en-us/dotnet/framework/install/application-not-started?version=(null)&processName=file.exe&platform=0009&osver=6&isServer=0&shimver=4.0.30319.0
https://learn.microsoft.com/en-us/dotnet/framework/install/application-not-started?version=(null)&processName=file.exe&platform=0009&osver=6&isServer=0&shimver=4.0.30319.0
https://learn.microsoft.com/en-us/dotnet/framework/install/application-not-started?version=(null)&processName=file.exe&platform=0009&osver=6&isServer=0&shimver=4.0.30319.0
https://learn.microsoft.com/en-us/dotnet/framework/install/application-not-started?version=(null)&processName=file.exe&platform=0009&osver=6&isServer=0&shimver=4.0.30319.0