IOC Report
file.exe

loading gif

Files

File Path
Type
Category
Malicious
file.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Docs.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Sat Nov 23 17:01:49 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Gmail.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Sat Nov 23 17:01:49 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Google Drive.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Wed Oct 4 12:54:07 2023, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Sheets.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Sat Nov 23 17:01:49 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Slides.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Sat Nov 23 17:01:49 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\YouTube.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Sat Nov 23 17:01:49 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
dropped
Chrome Cache Entry: 100
ASCII text, with very long lines (52717), with no line terminators
dropped
Chrome Cache Entry: 101
ASCII text
downloaded
Chrome Cache Entry: 102
ASCII text, with very long lines (52717), with no line terminators
downloaded
Chrome Cache Entry: 103
exported SGML document, ASCII text, with very long lines (65536), with no line terminators
downloaded
Chrome Cache Entry: 104
PNG image data, 533 x 478, 8-bit/color RGBA, non-interlaced
downloaded
Chrome Cache Entry: 105
MS Windows icon resource - 6 icons, -128x-128, 16 colors, 72x72, 16 colors
downloaded
Chrome Cache Entry: 106
ASCII text, with very long lines (46884)
downloaded
Chrome Cache Entry: 107
JSON data
dropped
Chrome Cache Entry: 108
MS Windows icon resource - 6 icons, -128x-128, 16 colors, 72x72, 16 colors
dropped
Chrome Cache Entry: 109
PNG image data, 658 x 480, 8-bit/color RGBA, non-interlaced
downloaded
Chrome Cache Entry: 110
ASCII text, with very long lines (33148), with no line terminators
dropped
Chrome Cache Entry: 111
JSON data
downloaded
Chrome Cache Entry: 112
JPEG image data, JFIF standard 1.01, aspect ratio, density 1x1, segment length 16, baseline, precision 8, 1528x402, components 3
dropped
Chrome Cache Entry: 113
PNG image data, 475 x 212, 8-bit/color RGBA, non-interlaced
downloaded
Chrome Cache Entry: 114
JSON data
downloaded
Chrome Cache Entry: 115
JSON data
dropped
Chrome Cache Entry: 116
JPEG image data, JFIF standard 1.01, aspect ratio, density 1x1, segment length 16, baseline, precision 8, 1528x402, components 3
downloaded
Chrome Cache Entry: 117
exported SGML document, ASCII text, with very long lines (65536), with no line terminators
dropped
Chrome Cache Entry: 118
ASCII text, with very long lines (46884)
dropped
Chrome Cache Entry: 119
ASCII text
dropped
Chrome Cache Entry: 120
SVG Scalable Vector Graphics image
downloaded
Chrome Cache Entry: 121
Web Open Font Format (Version 2), TrueType, length 19696, version 1.0
downloaded
Chrome Cache Entry: 122
ASCII text, with very long lines (33148), with no line terminators
downloaded
Chrome Cache Entry: 123
PNG image data, 475 x 212, 8-bit/color RGBA, non-interlaced
dropped
Chrome Cache Entry: 124
PNG image data, 658 x 480, 8-bit/color RGBA, non-interlaced
dropped
Chrome Cache Entry: 125
JSON data
dropped
Chrome Cache Entry: 126
HTML document, ASCII text, with very long lines (639), with CRLF, LF line terminators
downloaded
Chrome Cache Entry: 127
JSON data
downloaded
Chrome Cache Entry: 128
PNG image data, 533 x 478, 8-bit/color RGBA, non-interlaced
dropped
Chrome Cache Entry: 87
PNG image data, 533 x 478, 8-bit/color RGBA, non-interlaced
dropped
Chrome Cache Entry: 88
PNG image data, 533 x 478, 8-bit/color RGBA, non-interlaced
downloaded
Chrome Cache Entry: 89
SVG Scalable Vector Graphics image
dropped
Chrome Cache Entry: 90
JSON data
dropped
Chrome Cache Entry: 91
PNG image data, 533 x 478, 8-bit/color RGBA, non-interlaced
dropped
Chrome Cache Entry: 92
ASCII text, with very long lines (65536), with no line terminators
downloaded
Chrome Cache Entry: 93
ASCII text, with no line terminators
downloaded
Chrome Cache Entry: 94
ASCII text, with very long lines (65410)
dropped
Chrome Cache Entry: 95
JSON data
dropped
Chrome Cache Entry: 96
ASCII text, with very long lines (65410)
downloaded
Chrome Cache Entry: 97
JSON data
dropped
Chrome Cache Entry: 98
JSON data
downloaded
Chrome Cache Entry: 99
PNG image data, 533 x 478, 8-bit/color RGBA, non-interlaced
downloaded
There are 39 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\file.exe
"C:\Users\user\Desktop\file.exe"
malicious
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized --single-argument http://go.microsoft.com/fwlink/?prd=11324&pver=4.5&sbp=AppLaunch2&plcid=0x409&o1=SHIM_NOVERSION_FOUND&version=(null)&processName=file.exe&platform=0009&osver=6&isServer=0&shimver=4.0.30319.0
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2068 --field-trial-handle=1984,i,11204049690359226366,8167700250922482004,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized --single-argument http://go.microsoft.com/fwlink/?prd=11324&pver=4.5&sbp=AppLaunch2&plcid=0x409&o1=SHIM_NOVERSION_FOUND&version=(null)&processName=file.exe&platform=0009&osver=6&isServer=0&shimver=4.0.30319.0
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2152 --field-trial-handle=1984,i,13680411521332787545,10737033242991967105,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8

URLs

Name
IP
Malicious
https://authoring-docs-microsoft.poolparty.biz/devrel/7696cda6-0510-47f6-8302-71bb5d2e28cf
unknown
https://duckduckgo.com/chrome_newtab
unknown
http://185.215.113.16/off/def.exeb
unknown
https://duckduckgo.com/ac/?q=
unknown
https://property-imper.sbs/api
172.67.162.84
https://github.com/dotnet/docs/blob/17c4acca45e573a92878a44a2cce57d699fe9c7c/docs/framework/install/
unknown
https://www.linkedin.com/cws/share?url=$
unknown
https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
unknown
https://github.com/Youssef1313
unknown
https://management.azure.com/providers/Microsoft.Portal/userSettings/cloudconsole?api-version=2023-0
unknown
https://aka.ms/msignite_docs_banner
unknown
https://videoencodingpublic-hgeaeyeba8gycee3.b01.azurefd.net/public-b4da8140-92cf-421c-8b7b-e471d5b9
unknown
http://polymer.github.io/AUTHORS.txt
unknown
https://github.com/dotnet/docs/issues/new?template=z-customer-feedback.yml
unknown
https://property-imper.sbs/l
unknown
https://management.azure.com/subscriptions?api-version=2016-06-01
unknown
https://github.com/dotnet/docs/blob/main/docs/framework/install/application-not-started.md
unknown
http://x1.c.lencr.org/0
unknown
http://x1.i.lencr.org/0
unknown
https://aka.ms/pshelpmechoose
unknown
https://aka.ms/feedback/report?space=61
unknown
https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
unknown
http://185.215.113.16/off/def.exes
unknown
https://learn-video.azurefd.net/vod/player
unknown
https://twitter.com/intent/tweet?original_referer=$
unknown
https://github.com/gewarren
unknown
http://185.215.113.16/off/def.exepleWebKit/537.36
unknown
https://support.mozilla.org/products/firefoxgro.all
unknown
http://polymer.github.io/CONTRIBUTORS.txt
unknown
http://185.215.113.16/i
unknown
https://github.com/dotnet/docs/blob/live/docs/framework/install/application-not-started.md
unknown
https://property-imper.sbs/api#
unknown
https://authoring-docs-microsoft.poolparty.biz/devrel/69c76c32-967e-4c65-b89a-74cc527db725
unknown
https://client-api.arkoselabs.com/v2/api.js
unknown
https://property-imper.sbs:443/api
unknown
https://aka.ms/MSIgniteChallenge/Tier1Banner?wt.mc_id=ignite24_learnbanner_tier1_cnl
unknown
https://management.azure.com/providers/Microsoft.Portal/consoles/default?api-version=2017-12-01-prev
unknown
https://www.google.com/images/branding/product/ico/googleg_lodp.ico
unknown
https://github.com/Thraka
unknown
http://polymer.github.io/PATENTS.txt
unknown
https://aka.ms/certhelp
unknown
http://185.215.113.16/steam/random.exe
unknown
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
unknown
http://crl.rootca1.amazontrust.com/rootca1.crl0
unknown
https://github.com/mairaw
unknown
https://js.monitor.azure.com/scripts/c/ms.jsll-4.min.js
13.107.246.63
http://ocsp.rootca1.amazontrust.com0:
unknown
https://schema.org
unknown
http://polymer.github.io/LICENSE.txt
unknown
https://www.ecosia.org/newtab/
unknown
https://property-imper.sbs/
unknown
https://support.mozilla.org/kb/customize-firefox-controls-buttons-and-toolbars?utm_source=firefox-br
unknown
https://aka.ms/yourcaliforniaprivacychoices
unknown
https://ac.ecosia.org/autocomplete?q=
unknown
https://github.com/nschonni
unknown
http://185.215.113.16/
unknown
https://videoencodingpublic-hgeaeyeba8gycee3.b01.azurefd.net/public-09ce73a6-05a5-4e4d-b3d7-bd5a8c05
unknown
https://property-imper.sbs/apiE
unknown
https://github.com/adegeo
unknown
https://github.com/jonschlinkert/is-plain-object
unknown
http://crt.rootca1.amazontrust.com/rootca1.cer0?
unknown
https://octokit.github.io/rest.js/#throttling
unknown
https://property-imper.sbs/lv
unknown
https://github.com/js-cookie/js-cookie
unknown
http://185.215.113.16/off/def.exe
unknown
http://schema.org/Organization
unknown
https://channel9.msdn.com/
unknown
https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
unknown
https://github.com/dotnet/try
unknown
https://property-imper.sbs/n&
unknown
There are 60 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
property-imper.sbs
172.67.162.84
www.google.com
142.250.181.100
s-part-0035.t-0009.t-msedge.net
13.107.246.63
js.monitor.azure.com
unknown
mdec.nelreports.net
unknown

IPs

IP
Domain
Country
Malicious
192.168.2.5
unknown
unknown
malicious
13.107.246.63
s-part-0035.t-0009.t-msedge.net
United States
185.215.113.16
unknown
Portugal
142.250.181.100
www.google.com
United States
172.67.162.84
property-imper.sbs
United States
239.255.255.250
unknown
Reserved

Memdumps

Base Address
Regiontype
Protect
Malicious
5D73000
trusted library allocation
page read and write
6476000
trusted library allocation
page read and write
633A000
trusted library allocation
page read and write
155A000
heap
page read and write
366E000
stack
page read and write
8620000
trusted library allocation
page read and write
5D74000
trusted library allocation
page read and write
61EA000
trusted library allocation
page read and write
61EB000
trusted library allocation
page read and write
1644000
heap
page read and write
643D000
trusted library allocation
page read and write
5D71000
trusted library allocation
page read and write
62D7000
trusted library allocation
page read and write
5FB5000
trusted library allocation
page read and write
5D7C000
trusted library allocation
page read and write
62D5000
trusted library allocation
page read and write
38EE000
stack
page read and write
5D63000
trusted library allocation
page read and write
5D73000
trusted library allocation
page read and write
74DE000
stack
page read and write
5D50000
trusted library allocation
page read and write
6348000
trusted library allocation
page read and write
61E2000
trusted library allocation
page read and write
5D62000
trusted library allocation
page read and write
632A000
trusted library allocation
page read and write
6F9F000
stack
page read and write
1645000
heap
page read and write
F37000
unkown
page write copy
164C000
heap
page read and write
5D73000
trusted library allocation
page read and write
1622000
heap
page read and write
62BA000
trusted library allocation
page read and write
633A000
trusted library allocation
page read and write
1647000
heap
page read and write
5E41000
trusted library allocation
page read and write
5D63000
trusted library allocation
page read and write
5D73000
trusted library allocation
page read and write
5D7B000
trusted library allocation
page read and write
5D63000
trusted library allocation
page read and write
86C0000
direct allocation
page execute and read and write
62F9000
trusted library allocation
page read and write
452F000
stack
page read and write
62CF000
trusted library allocation
page read and write
70DF000
stack
page read and write
631B000
trusted library allocation
page read and write
711E000
stack
page read and write
6328000
trusted library allocation
page read and write
5D51000
trusted library allocation
page read and write
5D73000
trusted library allocation
page read and write
5DB2000
trusted library allocation
page read and write
5D84000
trusted library allocation
page read and write
5D73000
trusted library allocation
page read and write
5D66000
trusted library allocation
page read and write
633C000
trusted library allocation
page read and write
47EE000
stack
page read and write
5D63000
trusted library allocation
page read and write
5D73000
trusted library allocation
page read and write
5D43000
trusted library allocation
page read and write
162A000
heap
page read and write
5D4A000
trusted library allocation
page read and write
61EC000
trusted library allocation
page read and write
61E3000
trusted library allocation
page read and write
61E4000
trusted library allocation
page read and write
15B9000
heap
page read and write
5D46000
trusted library allocation
page read and write
5DBC000
trusted library allocation
page read and write
5D83000
trusted library allocation
page read and write
540D000
stack
page read and write
62E2000
trusted library allocation
page read and write
5D49000
trusted library allocation
page read and write
5D97000
trusted library allocation
page read and write
4CB0000
heap
page read and write
7C5E000
stack
page read and write
5D7B000
trusted library allocation
page read and write
6287000
trusted library allocation
page read and write
1550000
heap
page read and write
526F000
stack
page read and write
160C000
heap
page read and write
632C000
trusted library allocation
page read and write
41AE000
stack
page read and write
6278000
trusted library allocation
page read and write
61E3000
trusted library allocation
page read and write
52A0000
direct allocation
page execute and read and write
38AF000
stack
page read and write
5D4C000
trusted library allocation
page read and write
6047000
trusted library allocation
page read and write
62CF000
trusted library allocation
page read and write
5D64000
trusted library allocation
page read and write
61E5000
trusted library allocation
page read and write
164A000
heap
page read and write
5D56000
trusted library allocation
page read and write
578F000
stack
page read and write
725E000
stack
page read and write
5D41000
trusted library allocation
page read and write
1644000
heap
page read and write
6478000
trusted library allocation
page read and write
164E000
heap
page read and write
630B000
trusted library allocation
page read and write
466F000
stack
page read and write
5D63000
trusted library allocation
page read and write
5D92000
trusted library allocation
page read and write
5D63000
trusted library allocation
page read and write
62D8000
trusted library allocation
page read and write
5D63000
trusted library allocation
page read and write
6310000
trusted library allocation
page read and write
EE1000
unkown
page execute and write copy
ED0000
direct allocation
page read and write
4CB1000
heap
page read and write
5D6B000
trusted library allocation
page read and write
6317000
trusted library allocation
page read and write
83DE000
stack
page read and write
5E52000
trusted library allocation
page read and write
5DC9000
trusted library allocation
page read and write
11DD000
unkown
page execute and write copy
5DEE000
trusted library allocation
page read and write
61E7000
trusted library allocation
page read and write
629B000
trusted library allocation
page read and write
61EA000
trusted library allocation
page read and write
640F000
trusted library allocation
page read and write
5D47000
trusted library allocation
page read and write
62EC000
trusted library allocation
page read and write
5D73000
trusted library allocation
page read and write
61E6000
trusted library allocation
page read and write
60D6000
trusted library allocation
page read and write
61E4000
trusted library allocation
page read and write
160C000
heap
page read and write
861F000
stack
page read and write
1527000
heap
page read and write
5280000
remote allocation
page read and write
5D73000
trusted library allocation
page read and write
5D4E000
trusted library allocation
page read and write
5D9B000
trusted library allocation
page read and write
4A2F000
stack
page read and write
62C7000
trusted library allocation
page read and write
5D76000
trusted library allocation
page read and write
1631000
heap
page read and write
5D62000
trusted library allocation
page read and write
5D73000
trusted library allocation
page read and write
5D49000
trusted library allocation
page read and write
5D6B000
trusted library allocation
page read and write
5D7B000
trusted library allocation
page read and write
E65000
heap
page read and write
516C000
stack
page read and write
5D73000
trusted library allocation
page read and write
735F000
stack
page read and write
ED0000
direct allocation
page read and write
5D62000
trusted library allocation
page read and write
5D49000
trusted library allocation
page read and write
61E5000
trusted library allocation
page read and write
11DD000
unkown
page execute and read and write
5D61000
trusted library allocation
page read and write
1631000
heap
page read and write
63D5000
trusted library allocation
page read and write
4CB1000
heap
page read and write
5E40000
trusted library allocation
page read and write
6049000
trusted library allocation
page read and write
5D66000
trusted library allocation
page read and write
1612000
heap
page read and write
61EC000
trusted library allocation
page read and write
5D73000
trusted library allocation
page read and write
61E1000
trusted library allocation
page read and write
5F25000
trusted library allocation
page read and write
564E000
stack
page read and write
5D73000
trusted library allocation
page read and write
61E9000
trusted library allocation
page read and write
5D73000
trusted library allocation
page read and write
ED0000
direct allocation
page read and write
69D4000
trusted library allocation
page execute and read and write
5D41000
trusted library allocation
page read and write
161B000
heap
page read and write
5D6B000
trusted library allocation
page read and write
1615000
heap
page read and write
5D73000
trusted library allocation
page read and write
F37000
unkown
page read and write
58DF000
stack
page read and write
673A000
trusted library allocation
page execute and read and write
5D9B000
trusted library allocation
page read and write
815E000
stack
page read and write
8990000
heap
page read and write
1649000
heap
page read and write
5D93000
trusted library allocation
page read and write
163C000
heap
page read and write
5D50000
trusted library allocation
page read and write
8640000
trusted library allocation
page read and write
63D3000
trusted library allocation
page read and write
61E8000
trusted library allocation
page read and write
61E8000
trusted library allocation
page read and write
163A000
heap
page read and write
5D6E000
trusted library allocation
page read and write
61E3000
trusted library allocation
page read and write
5D83000
trusted library allocation
page read and write
161F000
heap
page read and write
62F4000
trusted library allocation
page read and write
161D000
heap
page read and write
161E000
heap
page read and write
63DF000
stack
page read and write
1649000
heap
page read and write
161B000
heap
page read and write
61E5000
trusted library allocation
page read and write
6FDE000
stack
page read and write
5D49000
trusted library allocation
page read and write
163A000
heap
page read and write
5D51000
trusted library allocation
page read and write
62D6000
trusted library allocation
page read and write
61E5000
trusted library allocation
page read and write
5D5F000
trusted library allocation
page read and write
362F000
stack
page read and write
5D66000
trusted library allocation
page read and write
4CB1000
heap
page read and write
62C0000
trusted library allocation
page read and write
5D67000
trusted library allocation
page read and write
61EC000
trusted library allocation
page read and write
5D9E000
trusted library allocation
page read and write
5D53000
trusted library allocation
page read and write
6470000
direct allocation
page read and write
5D41000
trusted library allocation
page read and write
61E7000
trusted library allocation
page read and write
6310000
trusted library allocation
page read and write
5D73000
trusted library allocation
page read and write
62B7000
trusted library allocation
page read and write
5D79000
trusted library allocation
page read and write
5DE1000
trusted library allocation
page read and write
4CB1000
heap
page read and write
5D42000
trusted library allocation
page read and write
1647000
heap
page read and write
ED0000
direct allocation
page read and write
5D93000
trusted library allocation
page read and write
632C000
trusted library allocation
page read and write
5D73000
trusted library allocation
page read and write
163C000
heap
page read and write
5D78000
trusted library allocation
page read and write
86AC000
stack
page read and write
5D62000
trusted library allocation
page read and write
3DAF000
stack
page read and write
5BF3000
heap
page read and write
5D62000
trusted library allocation
page read and write
1642000
heap
page read and write
5D63000
trusted library allocation
page read and write
60C0000
direct allocation
page read and write
5D6F000
trusted library allocation
page read and write
5D6B000
trusted library allocation
page read and write
5D63000
trusted library allocation
page read and write
5EF3000
trusted library allocation
page read and write
5D70000
trusted library allocation
page read and write
5D73000
trusted library allocation
page read and write
61E7000
trusted library allocation
page read and write
1649000
heap
page read and write
5D63000
trusted library allocation
page read and write
5D60000
trusted library allocation
page read and write
1649000
heap
page read and write
5D42000
trusted library allocation
page read and write
61E0000
trusted library allocation
page read and write
61E6000
trusted library allocation
page read and write
5EED000
trusted library allocation
page read and write
554D000
stack
page read and write
775E000
stack
page read and write
402F000
stack
page read and write
F25000
unkown
page execute and read and write
61EE000
trusted library allocation
page read and write
5E9D000
trusted library allocation
page read and write
630F000
trusted library allocation
page read and write
5DA8000
trusted library allocation
page read and write
5D4B000
trusted library allocation
page read and write
63FB000
trusted library allocation
page read and write
62AE000
trusted library allocation
page read and write
6296000
trusted library allocation
page read and write
1622000
heap
page read and write
4BAE000
stack
page read and write
811F000
stack
page read and write
5D89000
trusted library allocation
page read and write
6470000
direct allocation
page read and write
5D73000
trusted library allocation
page read and write
5D42000
trusted library allocation
page read and write
5DD2000
trusted library allocation
page read and write
5D8A000
trusted library allocation
page read and write
5E1D000
trusted library allocation
page read and write
62EE000
trusted library allocation
page read and write
1627000
heap
page read and write
61E3000
trusted library allocation
page read and write
5D42000
trusted library allocation
page read and write
5D7B000
trusted library allocation
page read and write
5DA5000
trusted library allocation
page read and write
5D78000
trusted library allocation
page read and write
61E7000
trusted library allocation
page read and write
5D73000
trusted library allocation
page read and write
5D73000
trusted library allocation
page read and write
5DDE000
trusted library allocation
page read and write
302B000
stack
page read and write
5D71000
trusted library allocation
page read and write
D20000
heap
page read and write
5D51000
trusted library allocation
page read and write
163F000
heap
page read and write
5D7F000
trusted library allocation
page read and write
61E3000
trusted library allocation
page read and write
14BE000
stack
page read and write
5DE1000
trusted library allocation
page read and write
1644000
heap
page read and write
5D7C000
trusted library allocation
page read and write
62BE000
trusted library allocation
page read and write
5D49000
trusted library allocation
page read and write
6D5E000
stack
page read and write
1644000
heap
page read and write
61EA000
trusted library allocation
page read and write
5D62000
trusted library allocation
page read and write
629B000
trusted library allocation
page read and write
61EC000
trusted library allocation
page read and write
8C1B000
stack
page read and write
749F000
stack
page read and write
5DDF000
trusted library allocation
page read and write
5D9B000
trusted library allocation
page read and write
8670000
direct allocation
page read and write
5D51000
trusted library allocation
page read and write
53CD000
stack
page read and write
6338000
trusted library allocation
page read and write
5E42000
trusted library allocation
page read and write
160D000
heap
page read and write
5D42000
trusted library allocation
page read and write
5B8F000
stack
page read and write
1642000
heap
page read and write
1510000
direct allocation
page read and write
4CB1000
heap
page read and write
6289000
trusted library allocation
page read and write
62CD000
trusted library allocation
page read and write
5DA3000
trusted library allocation
page read and write
492E000
stack
page read and write
15FF000
heap
page read and write
799F000
stack
page read and write
43EF000
stack
page read and write
5D42000
trusted library allocation
page read and write
162A000
heap
page read and write
164D000
heap
page read and write
8800000
direct allocation
page execute and read and write
4DB0000
trusted library allocation
page read and write
1622000
heap
page read and write
5D6B000
trusted library allocation
page read and write
5D71000
trusted library allocation
page read and write
137A000
unkown
page execute and read and write
6298000
trusted library allocation
page read and write
5E22000
trusted library allocation
page read and write
161E000
heap
page read and write
632E000
trusted library allocation
page read and write
57DE000
stack
page read and write
5DA3000
trusted library allocation
page read and write
6BDF000
stack
page read and write
5D84000
trusted library allocation
page read and write
6616000
trusted library allocation
page read and write
4CB1000
heap
page read and write
785F000
stack
page read and write
1637000
heap
page read and write
5D73000
trusted library allocation
page read and write
5280000
remote allocation
page read and write
155E000
heap
page read and write
61E9000
trusted library allocation
page read and write
ED0000
direct allocation
page read and write
EE1000
unkown
page execute and read and write
62BC000
trusted library allocation
page read and write
5D63000
trusted library allocation
page read and write
1631000
heap
page read and write
6282000
trusted library allocation
page read and write
5D63000
trusted library allocation
page read and write
5D73000
trusted library allocation
page read and write
5DBE000
trusted library allocation
page read and write
61E7000
trusted library allocation
page read and write
442E000
stack
page read and write
5D73000
trusted library allocation
page read and write
6470000
direct allocation
page read and write
6438000
trusted library allocation
page read and write
1647000
heap
page read and write
5D8F000
trusted library allocation
page read and write
F39000
unkown
page execute and read and write
11C6000
unkown
page execute and read and write
33AF000
stack
page read and write
5D63000
trusted library allocation
page read and write
62FF000
trusted library allocation
page read and write
1540000
direct allocation
page execute and read and write
640D000
trusted library allocation
page read and write
416F000
stack
page read and write
62AC000
trusted library allocation
page read and write
5D8A000
trusted library allocation
page read and write
37AE000
stack
page read and write
61E3000
trusted library allocation
page read and write
6470000
direct allocation
page read and write
62AE000
trusted library allocation
page read and write
5D73000
trusted library allocation
page read and write
5D8B000
trusted library allocation
page read and write
164C000
heap
page read and write
1629000
heap
page read and write
4CB1000
heap
page read and write
63C9000
trusted library allocation
page read and write
5D6B000
trusted library allocation
page read and write
4CB1000
heap
page read and write
61E2000
trusted library allocation
page read and write
61E6000
trusted library allocation
page read and write
1649000
heap
page read and write
5D73000
trusted library allocation
page read and write
62C5000
trusted library allocation
page read and write
163F000
heap
page read and write
5DA3000
trusted library allocation
page read and write
4CB1000
heap
page read and write
39EF000
stack
page read and write
5290000
direct allocation
page execute and read and write
1631000
heap
page read and write
6319000
trusted library allocation
page read and write
ED0000
direct allocation
page read and write
5D73000
trusted library allocation
page read and write
5D73000
trusted library allocation
page read and write
5290000
direct allocation
page execute and read and write
5270000
direct allocation
page execute and read and write
62B5000
trusted library allocation
page read and write
62AC000
trusted library allocation
page read and write
137B000
unkown
page execute and write copy
5D73000
trusted library allocation
page read and write
1641000
heap
page read and write
1637000
heap
page read and write
61E7000
trusted library allocation
page read and write
5D7B000
trusted library allocation
page read and write
5DAC000
trusted library allocation
page read and write
1510000
direct allocation
page read and write
5DBE000
trusted library allocation
page read and write
5D73000
trusted library allocation
page read and write
5D7B000
trusted library allocation
page read and write
4CB1000
heap
page read and write
62FD000
trusted library allocation
page read and write
84DF000
stack
page read and write
629D000
trusted library allocation
page read and write
1622000
heap
page read and write
5E22000
trusted library allocation
page read and write
61E1000
trusted library allocation
page read and write
46AE000
stack
page read and write
5DAC000
trusted library allocation
page read and write
61E5000
trusted library allocation
page read and write
1649000
heap
page read and write
5D48000
trusted library allocation
page read and write
643F000
trusted library allocation
page read and write
163C000
heap
page read and write
5D4E000
trusted library allocation
page read and write
1641000
heap
page read and write
EAE000
stack
page read and write
61E8000
trusted library allocation
page read and write
62FB000
trusted library allocation
page read and write
5D7C000
trusted library allocation
page read and write
5D8B000
trusted library allocation
page read and write
61E9000
trusted library allocation
page read and write
630D000
trusted library allocation
page read and write
4CB1000
heap
page read and write
6C1E000
stack
page read and write
75DF000
stack
page read and write
88E0000
trusted library allocation
page read and write
5D67000
trusted library allocation
page read and write
1588000
heap
page read and write
3B2F000
stack
page read and write
2FEF000
stack
page read and write
5D7B000
trusted library allocation
page read and write
4B6F000
stack
page read and write
5290000
direct allocation
page execute and read and write
5290000
direct allocation
page execute and read and write
ED0000
direct allocation
page read and write
61E4000
trusted library allocation
page read and write
1641000
heap
page read and write
5D49000
trusted library allocation
page read and write
6470000
direct allocation
page read and write
5DBD000
trusted library allocation
page read and write
68BE000
trusted library allocation
page execute and read and write
52C0000
direct allocation
page execute and read and write
5DC9000
trusted library allocation
page read and write
52D5000
trusted library allocation
page read and write
550D000
stack
page read and write
162A000
heap
page read and write
5D9B000
trusted library allocation
page read and write
61E7000
trusted library allocation
page read and write
63EF000
trusted library allocation
page read and write
1620000
heap
page read and write
5D4D000
trusted library allocation
page read and write
7B1E000
stack
page read and write
8670000
direct allocation
page read and write
6ADF000
stack
page read and write
8D5E000
stack
page read and write
5D73000
trusted library allocation
page read and write
164D000
heap
page read and write
63AF000
trusted library allocation
page read and write
3F2E000
stack
page read and write
645A000
trusted library allocation
page read and write
5D73000
trusted library allocation
page read and write
3DEE000
stack
page read and write
5D49000
trusted library allocation
page read and write
5D42000
trusted library allocation
page read and write
5D9B000
trusted library allocation
page read and write
5D63000
trusted library allocation
page read and write
ED0000
direct allocation
page read and write
5DA1000
trusted library allocation
page read and write
61E5000
trusted library allocation
page read and write
5D49000
trusted library allocation
page read and write
5D78000
trusted library allocation
page read and write
5D69000
trusted library allocation
page read and write
3EEF000
stack
page read and write
ED0000
direct allocation
page read and write
5D49000
trusted library allocation
page read and write
5D65000
trusted library allocation
page read and write
591D000
stack
page read and write
5D9E000
trusted library allocation
page read and write
61EF000
trusted library allocation
page read and write
6458000
trusted library allocation
page read and write
5290000
direct allocation
page execute and read and write
5D73000
trusted library allocation
page read and write
5D8D000
trusted library allocation
page read and write
5D7B000
trusted library allocation
page read and write
61EA000
trusted library allocation
page read and write
512D000
stack
page read and write
5D3D000
stack
page read and write
1641000
heap
page read and write
1644000
heap
page read and write
789E000
stack
page read and write
5DA4000
trusted library allocation
page read and write
7D9E000
stack
page read and write
61E6000
trusted library allocation
page read and write
ED0000
direct allocation
page read and write
801E000
stack
page read and write
61EE000
trusted library allocation
page read and write
61E4000
trusted library allocation
page read and write
5F1D000
trusted library allocation
page read and write
641C000
stack
page read and write
63BF000
trusted library allocation
page read and write
161C000
heap
page read and write
568E000
stack
page read and write
15A3000
heap
page read and write
5F8E000
trusted library allocation
page read and write
1520000
heap
page read and write
1649000
heap
page read and write
162A000
heap
page read and write
5D63000
trusted library allocation
page read and write
5D63000
trusted library allocation
page read and write
644B000
trusted library allocation
page read and write
61E7000
trusted library allocation
page read and write
5D73000
trusted library allocation
page read and write
61E0000
trusted library allocation
page read and write
3A2E000
stack
page read and write
5DAC000
trusted library allocation
page read and write
645E000
stack
page read and write
5130000
direct allocation
page read and write
632A000
trusted library allocation
page read and write
5DC0000
trusted library allocation
page read and write
61E3000
trusted library allocation
page read and write
5D99000
trusted library allocation
page read and write
61E8000
trusted library allocation
page read and write
5DDE000
trusted library allocation
page read and write
15AE000
heap
page read and write
5D63000
trusted library allocation
page read and write
5D63000
trusted library allocation
page read and write
63F1000
trusted library allocation
page read and write
5D5B000
trusted library allocation
page read and write
61E6000
trusted library allocation
page read and write
5DB2000
trusted library allocation
page read and write
3B6E000
stack
page read and write
5D62000
trusted library allocation
page read and write
161B000
heap
page read and write
61EC000
trusted library allocation
page read and write
EE0000
unkown
page read and write
6470000
direct allocation
page read and write
739E000
stack
page read and write
ED0000
direct allocation
page read and write
5D62000
trusted library allocation
page read and write
EB0000
heap
page read and write
6287000
trusted library allocation
page read and write
164A000
heap
page read and write
5C3D000
stack
page read and write
5D84000
trusted library allocation
page read and write
5D42000
trusted library allocation
page read and write
6736000
trusted library allocation
page read and write
5D73000
trusted library allocation
page read and write
5D73000
trusted library allocation
page read and write
5D63000
trusted library allocation
page read and write
5D81000
trusted library allocation
page read and write
5D98000
trusted library allocation
page read and write
6732000
trusted library allocation
page execute and read and write
637C000
trusted library allocation
page read and write
61E2000
trusted library allocation
page read and write
8D1C000
stack
page read and write
5DDD000
trusted library allocation
page read and write
CFA000
stack
page read and write
7FDF000
stack
page read and write
61E9000
trusted library allocation
page read and write
1649000
heap
page read and write
5D73000
trusted library allocation
page read and write
1649000
heap
page read and write
6398000
trusted library allocation
page read and write
164E000
heap
page read and write
5D42000
trusted library allocation
page read and write
5E70000
trusted library allocation
page read and write
5D70000
trusted library allocation
page read and write
635D000
trusted library allocation
page read and write
721F000
stack
page read and write
6470000
direct allocation
page read and write
5D8B000
trusted library allocation
page read and write
5E41000
trusted library allocation
page read and write
5D74000
trusted library allocation
page read and write
61E9000
trusted library allocation
page read and write
119C000
unkown
page execute and read and write
1644000
heap
page read and write
5A8E000
stack
page read and write
61ED000
trusted library allocation
page read and write
61E7000
trusted library allocation
page read and write
406E000
stack
page read and write
643A000
trusted library allocation
page read and write
5D5C000
trusted library allocation
page read and write
5D6C000
trusted library allocation
page read and write
4CB1000
heap
page read and write
5D74000
trusted library allocation
page read and write
6315000
trusted library allocation
page read and write
5D49000
trusted library allocation
page read and write
5D73000
trusted library allocation
page read and write
6470000
direct allocation
page read and write
61EA000
trusted library allocation
page read and write
633A000
trusted library allocation
page read and write
4CB1000
heap
page read and write
5D49000
trusted library allocation
page read and write
5D42000
trusted library allocation
page read and write
5D48000
trusted library allocation
page read and write
6297000
trusted library allocation
page read and write
6396000
trusted library allocation
page read and write
6048000
trusted library allocation
page read and write
5D63000
trusted library allocation
page read and write
6470000
direct allocation
page read and write
4CAF000
stack
page read and write
5D71000
trusted library allocation
page read and write
11CE000
unkown
page execute and read and write
69C5000
trusted library allocation
page execute and read and write
164C000
heap
page read and write
4CB1000
heap
page read and write
63CB000
trusted library allocation
page read and write
5D78000
trusted library allocation
page read and write
1620000
heap
page read and write
4CB1000
heap
page read and write
1620000
heap
page read and write
5DFC000
trusted library allocation
page read and write
5D83000
trusted library allocation
page read and write
63C1000
trusted library allocation
page read and write
5D9B000
trusted library allocation
page read and write
163F000
heap
page read and write
6284000
trusted library allocation
page read and write
61E8000
trusted library allocation
page read and write
E50000
heap
page read and write
326F000
stack
page read and write
4CB1000
heap
page read and write
5A1E000
stack
page read and write
61E6000
trusted library allocation
page read and write
52B0000
direct allocation
page execute and read and write
5D7B000
trusted library allocation
page read and write
5D5F000
trusted library allocation
page read and write
5D4A000
trusted library allocation
page read and write
839F000
stack
page read and write
62E1000
trusted library allocation
page read and write
5D49000
trusted library allocation
page read and write
4CC0000
heap
page read and write
5D73000
trusted library allocation
page read and write
161B000
heap
page read and write
48EF000
stack
page read and write
7C1F000
stack
page read and write
5D8E000
trusted library allocation
page read and write
5174000
direct allocation
page read and write
5D7B000
trusted library allocation
page read and write
162E000
heap
page read and write
164A000
heap
page read and write
162B000
heap
page read and write
61E5000
trusted library allocation
page read and write
11DE000
unkown
page execute and write copy
5D49000
trusted library allocation
page read and write
6490000
trusted library allocation
page read and write
47AF000
stack
page read and write
5D40000
trusted library allocation
page read and write
5DFC000
trusted library allocation
page read and write
174E000
stack
page read and write
5D47000
trusted library allocation
page read and write
63FD000
trusted library allocation
page read and write
6856000
trusted library allocation
page read and write
5280000
remote allocation
page read and write
5DCA000
trusted library allocation
page read and write
61EA000
trusted library allocation
page read and write
1623000
heap
page read and write
42ED000
stack
page read and write
829E000
stack
page read and write
164D000
heap
page read and write
631E000
trusted library allocation
page read and write
6470000
direct allocation
page read and write
69D6000
trusted library allocation
page execute and read and write
5D73000
trusted library allocation
page read and write
5D84000
trusted library allocation
page read and write
6D1F000
stack
page read and write
648E000
trusted library allocation
page read and write
5DDD000
trusted library allocation
page read and write
5E4D000
trusted library allocation
page read and write
5D6D000
trusted library allocation
page read and write
5D49000
trusted library allocation
page read and write
61E7000
trusted library allocation
page read and write
147E000
stack
page read and write
89A0000
trusted library allocation
page read and write
5D4C000
trusted library allocation
page read and write
6E5F000
stack
page read and write
5D8A000
trusted library allocation
page read and write
5F15000
trusted library allocation
page read and write
79DE000
stack
page read and write
6470000
direct allocation
page read and write
5D62000
trusted library allocation
page read and write
5D8B000
trusted library allocation
page read and write
62E4000
trusted library allocation
page read and write
5DA4000
trusted library allocation
page read and write
644D000
trusted library allocation
page read and write
8670000
direct allocation
page read and write
10C3000
unkown
page execute and read and write
5D49000
trusted library allocation
page read and write
635F000
trusted library allocation
page read and write
34EF000
stack
page read and write
5DEE000
trusted library allocation
page read and write
1641000
heap
page read and write
5D56000
trusted library allocation
page read and write
5D63000
trusted library allocation
page read and write
61E9000
trusted library allocation
page read and write
4CB1000
heap
page read and write
6309000
trusted library allocation
page read and write
5D61000
trusted library allocation
page read and write
5D49000
trusted library allocation
page read and write
E00000
heap
page read and write
604A000
trusted library allocation
page read and write
5D83000
trusted library allocation
page read and write
5DB2000
trusted library allocation
page read and write
771F000
stack
page read and write
EE0000
unkown
page readonly
164C000
heap
page read and write
62DD000
trusted library allocation
page read and write
1642000
heap
page read and write
5DEC000
trusted library allocation
page read and write
627A000
trusted library allocation
page read and write
5D93000
trusted library allocation
page read and write
5D63000
trusted library allocation
page read and write
5D63000
trusted library allocation
page read and write
61E2000
trusted library allocation
page read and write
6338000
trusted library allocation
page read and write
5E22000
trusted library allocation
page read and write
89A9000
trusted library allocation
page read and write
5290000
direct allocation
page execute and read and write
5D49000
trusted library allocation
page read and write
5280000
direct allocation
page execute and read and write
5D9B000
trusted library allocation
page read and write
1510000
direct allocation
page read and write
61E3000
trusted library allocation
page read and write
61E2000
trusted library allocation
page read and write
5D56000
trusted library allocation
page read and write
63AD000
trusted library allocation
page read and write
62D1000
trusted library allocation
page read and write
62E3000
trusted library allocation
page read and write
61E5000
trusted library allocation
page read and write
61E1000
trusted library allocation
page read and write
60BE000
stack
page read and write
672B000
trusted library allocation
page read and write
6470000
direct allocation
page read and write
1631000
heap
page read and write
456E000
stack
page read and write
1649000
heap
page read and write
3CAE000
stack
page read and write
5D45000
trusted library allocation
page read and write
4CB1000
heap
page read and write
5E46000
trusted library allocation
page read and write
ED0000
direct allocation
page read and write
6E9E000
stack
page read and write
8E5E000
stack
page read and write
1647000
heap
page read and write
89A2000
trusted library allocation
page read and write
5D42000
trusted library allocation
page read and write
5D6C000
trusted library allocation
page read and write
5DA4000
trusted library allocation
page read and write
61E4000
trusted library allocation
page read and write
1622000
heap
page read and write
62DB000
trusted library allocation
page read and write
5D6E000
trusted library allocation
page read and write
164B000
heap
page read and write
61E9000
trusted library allocation
page read and write
6041000
trusted library allocation
page read and write
62F2000
trusted library allocation
page read and write
5D71000
trusted library allocation
page read and write
5DEC000
trusted library allocation
page read and write
163B000
heap
page read and write
5D9B000
trusted library allocation
page read and write
1642000
heap
page read and write
6730000
trusted library allocation
page read and write
6283000
trusted library allocation
page read and write
630E000
trusted library allocation
page read and write
5E7D000
trusted library allocation
page read and write
6312000
trusted library allocation
page read and write
32AE000
stack
page read and write
62AE000
trusted library allocation
page read and write
7ADF000
stack
page read and write
5D73000
trusted library allocation
page read and write
1642000
heap
page read and write
5D66000
trusted library allocation
page read and write
5D88000
trusted library allocation
page read and write
312F000
stack
page read and write
ED0000
direct allocation
page read and write
6285000
trusted library allocation
page read and write
4CB1000
heap
page read and write
7EDE000
stack
page read and write
1649000
heap
page read and write
5D54000
trusted library allocation
page read and write
1644000
heap
page read and write
5D42000
trusted library allocation
page read and write
7D5F000
stack
page read and write
5D63000
trusted library allocation
page read and write
62B3000
trusted library allocation
page read and write
5D51000
trusted library allocation
page read and write
5D63000
trusted library allocation
page read and write
5D93000
trusted library allocation
page read and write
4CB1000
heap
page read and write
61EB000
trusted library allocation
page read and write
62D9000
stack
page read and write
62B1000
trusted library allocation
page read and write
160F000
heap
page read and write
ED0000
direct allocation
page read and write
316E000
stack
page read and write
1647000
heap
page read and write
5D6B000
trusted library allocation
page read and write
1647000
heap
page read and write
42AF000
stack
page read and write
5D69000
trusted library allocation
page read and write
5DAC000
trusted library allocation
page read and write
5D49000
trusted library allocation
page read and write
A140000
trusted library allocation
page read and write
631C000
trusted library allocation
page read and write
352E000
stack
page read and write
5D63000
trusted library allocation
page read and write
5D6B000
trusted library allocation
page read and write
86E0000
heap
page read and write
6470000
direct allocation
page read and write
61E5000
trusted library allocation
page read and write
5E65000
trusted library allocation
page read and write
1631000
heap
page read and write
376F000
stack
page read and write
1644000
heap
page read and write
5D6C000
trusted library allocation
page read and write
5D73000
trusted library allocation
page read and write
6311000
trusted library allocation
page read and write
5D42000
trusted library allocation
page read and write
637E000
trusted library allocation
page read and write
4CB1000
heap
page read and write
5D8C000
trusted library allocation
page read and write
5D73000
trusted library allocation
page read and write
164B000
heap
page read and write
87EF000
stack
page read and write
761E000
stack
page read and write
61E5000
trusted library allocation
page read and write
3C6F000
stack
page read and write
5DDC000
trusted library allocation
page read and write
4A6E000
stack
page read and write
629D000
trusted library allocation
page read and write
5D48000
trusted library allocation
page read and write
5D97000
trusted library allocation
page read and write
5D63000
trusted library allocation
page read and write
6079000
stack
page read and write
1641000
heap
page read and write
5D76000
trusted library allocation
page read and write
62AC000
trusted library allocation
page read and write
5DB2000
trusted library allocation
page read and write
4CB1000
heap
page read and write
9BB000
stack
page read and write
1645000
heap
page read and write
825F000
stack
page read and write
5E12000
trusted library allocation
page read and write
5D49000
trusted library allocation
page read and write
5D73000
trusted library allocation
page read and write
5E4C000
trusted library allocation
page read and write
1645000
heap
page read and write
5D49000
trusted library allocation
page read and write
164D000
heap
page read and write
5D62000
trusted library allocation
page read and write
163F000
heap
page read and write
5E12000
trusted library allocation
page read and write
4CB1000
heap
page read and write
E60000
heap
page read and write
5D6E000
trusted library allocation
page read and write
5D69000
trusted library allocation
page read and write
61E4000
trusted library allocation
page read and write
161B000
heap
page read and write
5D63000
trusted library allocation
page read and write
61EC000
trusted library allocation
page read and write
61E4000
trusted library allocation
page read and write
61ED000
trusted library allocation
page read and write
6470000
direct allocation
page read and write
61E2000
trusted library allocation
page read and write
5D63000
trusted library allocation
page read and write
5DA2000
trusted library allocation
page read and write
5D62000
trusted library allocation
page read and write
33EE000
stack
page read and write
5D6E000
trusted library allocation
page read and write
7E9F000
stack
page read and write
14FE000
stack
page read and write
164D000
heap
page read and write
630F000
trusted library allocation
page read and write
5D45000
trusted library allocation
page read and write
5DB2000
trusted library allocation
page read and write
5DE1000
trusted library allocation
page read and write
5BF0000
heap
page read and write
1622000
heap
page read and write
6299000
trusted library allocation
page read and write
6289000
trusted library allocation
page read and write
5DD5000
trusted library allocation
page read and write
1647000
heap
page read and write
851E000
stack
page read and write
5D78000
trusted library allocation
page read and write
671D000
trusted library allocation
page read and write
163B000
heap
page read and write
5D63000
trusted library allocation
page read and write
5D46000
trusted library allocation
page read and write
5DE2000
trusted library allocation
page read and write
There are 900 hidden memdumps, click here to show them.

DOM / HTML

URL
Malicious
https://learn.microsoft.com/en-us/dotnet/framework/install/application-not-started?version=(null)&processName=file.exe&platform=0009&osver=6&isServer=0&shimver=4.0.30319.0
https://learn.microsoft.com/en-us/dotnet/framework/install/application-not-started?version=(null)&processName=file.exe&platform=0009&osver=6&isServer=0&shimver=4.0.30319.0
https://learn.microsoft.com/en-us/dotnet/framework/install/application-not-started?version=(null)&processName=file.exe&platform=0009&osver=6&isServer=0&shimver=4.0.30319.0
https://learn.microsoft.com/en-us/dotnet/framework/install/application-not-started?version=(null)&processName=file.exe&platform=0009&osver=6&isServer=0&shimver=4.0.30319.0
https://learn.microsoft.com/en-us/dotnet/framework/install/application-not-started?version=(null)&processName=file.exe&platform=0009&osver=6&isServer=0&shimver=4.0.30319.0