IOC Report
file.exe

loading gif

Files

File Path
Type
Category
Malicious
file.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Docs.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Sun Nov 24 00:13:39 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Gmail.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Sun Nov 24 00:13:38 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Google Drive.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Wed Oct 4 12:54:07 2023, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Sheets.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Sun Nov 24 00:13:38 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Slides.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Sun Nov 24 00:13:38 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\YouTube.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Sun Nov 24 00:13:38 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
dropped
Chrome Cache Entry: 100
MS Windows icon resource - 6 icons, -128x-128, 16 colors, 72x72, 16 colors
downloaded
Chrome Cache Entry: 101
ASCII text, with very long lines (46884)
downloaded
Chrome Cache Entry: 102
JSON data
dropped
Chrome Cache Entry: 103
MS Windows icon resource - 6 icons, -128x-128, 16 colors, 72x72, 16 colors
dropped
Chrome Cache Entry: 104
PNG image data, 658 x 480, 8-bit/color RGBA, non-interlaced
downloaded
Chrome Cache Entry: 105
ASCII text, with very long lines (33148), with no line terminators
dropped
Chrome Cache Entry: 106
JSON data
downloaded
Chrome Cache Entry: 107
JPEG image data, JFIF standard 1.01, aspect ratio, density 1x1, segment length 16, baseline, precision 8, 1528x402, components 3
dropped
Chrome Cache Entry: 108
PNG image data, 475 x 212, 8-bit/color RGBA, non-interlaced
downloaded
Chrome Cache Entry: 109
JSON data
downloaded
Chrome Cache Entry: 110
JPEG image data, JFIF standard 1.01, aspect ratio, density 1x1, segment length 16, baseline, precision 8, 1528x402, components 3
downloaded
Chrome Cache Entry: 111
exported SGML document, ASCII text, with very long lines (65536), with no line terminators
dropped
Chrome Cache Entry: 112
ASCII text, with very long lines (46884)
dropped
Chrome Cache Entry: 113
ASCII text
dropped
Chrome Cache Entry: 114
SVG Scalable Vector Graphics image
downloaded
Chrome Cache Entry: 115
Web Open Font Format (Version 2), TrueType, length 19696, version 1.0
downloaded
Chrome Cache Entry: 116
ASCII text, with very long lines (33148), with no line terminators
downloaded
Chrome Cache Entry: 117
PNG image data, 475 x 212, 8-bit/color RGBA, non-interlaced
dropped
Chrome Cache Entry: 118
PNG image data, 658 x 480, 8-bit/color RGBA, non-interlaced
dropped
Chrome Cache Entry: 119
JSON data
dropped
Chrome Cache Entry: 120
HTML document, ASCII text, with very long lines (639), with CRLF, LF line terminators
downloaded
Chrome Cache Entry: 121
JSON data
downloaded
Chrome Cache Entry: 122
PNG image data, 533 x 478, 8-bit/color RGBA, non-interlaced
dropped
Chrome Cache Entry: 84
PNG image data, 533 x 478, 8-bit/color RGBA, non-interlaced
dropped
Chrome Cache Entry: 85
PNG image data, 533 x 478, 8-bit/color RGBA, non-interlaced
downloaded
Chrome Cache Entry: 86
SVG Scalable Vector Graphics image
dropped
Chrome Cache Entry: 87
JSON data
dropped
Chrome Cache Entry: 88
PNG image data, 533 x 478, 8-bit/color RGBA, non-interlaced
dropped
Chrome Cache Entry: 89
ASCII text, with very long lines (65536), with no line terminators
downloaded
Chrome Cache Entry: 90
ASCII text, with no line terminators
downloaded
Chrome Cache Entry: 91
JSON data
dropped
Chrome Cache Entry: 92
ASCII text, with very long lines (65410)
downloaded
Chrome Cache Entry: 93
JSON data
downloaded
Chrome Cache Entry: 94
PNG image data, 533 x 478, 8-bit/color RGBA, non-interlaced
downloaded
Chrome Cache Entry: 95
ASCII text, with very long lines (52717), with no line terminators
dropped
Chrome Cache Entry: 96
ASCII text
downloaded
Chrome Cache Entry: 97
ASCII text, with very long lines (52717), with no line terminators
downloaded
Chrome Cache Entry: 98
exported SGML document, ASCII text, with very long lines (65536), with no line terminators
downloaded
Chrome Cache Entry: 99
PNG image data, 533 x 478, 8-bit/color RGBA, non-interlaced
downloaded
There are 36 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\file.exe
"C:\Users\user\Desktop\file.exe"
malicious
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized --single-argument http://go.microsoft.com/fwlink/?prd=11324&pver=4.5&sbp=AppLaunch2&plcid=0x409&o1=SHIM_NOVERSION_FOUND&version=(null)&processName=file.exe&platform=0009&osver=6&isServer=0&shimver=4.0.30319.0
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2472 --field-trial-handle=2332,i,7438478652651464284,9822841454251947196,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized --single-argument http://go.microsoft.com/fwlink/?prd=11324&pver=4.5&sbp=AppLaunch2&plcid=0x409&o1=SHIM_NOVERSION_FOUND&version=(null)&processName=file.exe&platform=0009&osver=6&isServer=0&shimver=4.0.30319.0
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2052 --field-trial-handle=1992,i,12934382445748236653,13668332504761590760,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8

URLs

Name
IP
Malicious
https://authoring-docs-microsoft.poolparty.biz/devrel/7696cda6-0510-47f6-8302-71bb5d2e28cf
unknown
https://duckduckgo.com/chrome_newtab
unknown
https://duckduckgo.com/ac/?q=
unknown
https://property-imper.sbs/api
104.21.33.116
https://github.com/dotnet/docs/blob/17c4acca45e573a92878a44a2cce57d699fe9c7c/docs/framework/install/
unknown
https://www.linkedin.com/cws/share?url=$
unknown
https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
unknown
https://property-imper.sbs/CC
unknown
https://github.com/Youssef1313
unknown
https://management.azure.com/providers/Microsoft.Portal/userSettings/cloudconsole?api-version=2023-0
unknown
https://aka.ms/msignite_docs_banner
unknown
https://videoencodingpublic-hgeaeyeba8gycee3.b01.azurefd.net/public-b4da8140-92cf-421c-8b7b-e471d5b9
unknown
http://polymer.github.io/AUTHORS.txt
unknown
https://github.com/dotnet/docs/issues/new?template=z-customer-feedback.yml
unknown
http://crl.micro0
unknown
https://property-imper.sbs/%
unknown
https://management.azure.com/subscriptions?api-version=2016-06-01
unknown
https://github.com/dotnet/docs/blob/main/docs/framework/install/application-not-started.md
unknown
http://x1.c.lencr.org/0
unknown
http://x1.i.lencr.org/0
unknown
https://aka.ms/pshelpmechoose
unknown
https://aka.ms/feedback/report?space=61
unknown
https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
unknown
https://learn-video.azurefd.net/vod/player
unknown
https://twitter.com/intent/tweet?original_referer=$
unknown
https://github.com/gewarren
unknown
http://185.215.113.16/off/def.exepleWebKit/537.36
unknown
http://185.215.113.16/steam/random.exeX
unknown
https://support.mozilla.org/products/firefoxgro.all
unknown
http://polymer.github.io/CONTRIBUTORS.txt
unknown
https://github.com/dotnet/docs/blob/live/docs/framework/install/application-not-started.md
unknown
https://authoring-docs-microsoft.poolparty.biz/devrel/69c76c32-967e-4c65-b89a-74cc527db725
unknown
https://client-api.arkoselabs.com/v2/api.js
unknown
https://aka.ms/MSIgniteChallenge/Tier1Banner?wt.mc_id=ignite24_learnbanner_tier1_cnl
unknown
https://management.azure.com/providers/Microsoft.Portal/consoles/default?api-version=2017-12-01-prev
unknown
https://www.google.com/images/branding/product/ico/googleg_lodp.ico
unknown
https://github.com/Thraka
unknown
http://polymer.github.io/PATENTS.txt
unknown
https://aka.ms/certhelp
unknown
http://185.215.113.16/steam/random.exe
unknown
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
unknown
http://crl.rootca1.amazontrust.com/rootca1.crl0
unknown
https://github.com/mairaw
unknown
https://property-imper.sbs/%%
unknown
https://js.monitor.azure.com/scripts/c/ms.jsll-4.min.js
13.107.246.63
http://ocsp.rootca1.amazontrust.com0:
unknown
https://schema.org
unknown
http://polymer.github.io/LICENSE.txt
unknown
https://www.ecosia.org/newtab/
unknown
https://property-imper.sbs/
unknown
https://support.mozilla.org/kb/customize-firefox-controls-buttons-and-toolbars?utm_source=firefox-br
unknown
https://property-imper.sbs/.
unknown
https://aka.ms/yourcaliforniaprivacychoices
unknown
https://ac.ecosia.org/autocomplete?q=
unknown
https://github.com/nschonni
unknown
http://185.215.113.16/
unknown
https://property-imper.sbs/e
unknown
https://property-imper.sbs/apihQ
unknown
https://videoencodingpublic-hgeaeyeba8gycee3.b01.azurefd.net/public-09ce73a6-05a5-4e4d-b3d7-bd5a8c05
unknown
https://github.com/adegeo
unknown
https://property-imper.sbs/apiH
unknown
https://github.com/jonschlinkert/is-plain-object
unknown
http://crt.rootca1.amazontrust.com/rootca1.cer0?
unknown
https://octokit.github.io/rest.js/#throttling
unknown
https://property-imper.sbs/U
unknown
https://github.com/js-cookie/js-cookie
unknown
https://property-imper.sbs/$$
unknown
http://185.215.113.16/off/def.exe
unknown
http://schema.org/Organization
unknown
https://channel9.msdn.com/
unknown
https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
unknown
https://property-imper.sbs/M
unknown
https://github.com/dotnet/try
unknown
There are 63 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
property-imper.sbs
104.21.33.116
www.google.com
142.250.181.100
s-part-0035.t-0009.t-msedge.net
13.107.246.63
js.monitor.azure.com
unknown
mdec.nelreports.net
unknown

IPs

IP
Domain
Country
Malicious
192.168.2.5
unknown
unknown
malicious
13.107.246.63
s-part-0035.t-0009.t-msedge.net
United States
185.215.113.16
unknown
Portugal
142.250.181.100
www.google.com
United States
239.255.255.250
unknown
Reserved
104.21.33.116
property-imper.sbs
United States

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer
SlowContextMenuEntries

Memdumps

Base Address
Regiontype
Protect
Malicious
53DA000
trusted library allocation
page read and write
543D000
trusted library allocation
page read and write
53BF000
trusted library allocation
page read and write
544E000
trusted library allocation
page read and write
5455000
trusted library allocation
page read and write
5902000
trusted library allocation
page read and write
59A1000
trusted library allocation
page read and write
7DE000
heap
page read and write
7E8000
heap
page read and write
5A63000
trusted library allocation
page read and write
544F000
trusted library allocation
page read and write
5449000
trusted library allocation
page read and write
4A30000
direct allocation
page execute and read and write
541C000
trusted library allocation
page read and write
7CB0000
direct allocation
page read and write
58F9000
trusted library allocation
page read and write
5487000
trusted library allocation
page read and write
53C9000
trusted library allocation
page read and write
5426000
trusted library allocation
page read and write
5487000
trusted library allocation
page read and write
917000
unkown
page write copy
53CB000
trusted library allocation
page read and write
5433000
trusted library allocation
page read and write
5447000
trusted library allocation
page read and write
5438000
trusted library allocation
page read and write
5447000
trusted library allocation
page read and write
318E000
stack
page read and write
547F000
trusted library allocation
page read and write
5A43000
trusted library allocation
page read and write
4431000
heap
page read and write
542D000
trusted library allocation
page read and write
3B4F000
stack
page read and write
F6E000
stack
page read and write
5921000
trusted library allocation
page read and write
549A000
trusted library allocation
page read and write
53E9000
trusted library allocation
page read and write
5A6C000
trusted library allocation
page read and write
595D000
trusted library allocation
page read and write
549A000
trusted library allocation
page read and write
585C000
trusted library allocation
page read and write
7DF000
heap
page read and write
5428000
trusted library allocation
page read and write
585B000
trusted library allocation
page read and write
5851000
trusted library allocation
page read and write
5853000
trusted library allocation
page read and write
5DD6000
trusted library allocation
page read and write
2D8F000
stack
page read and write
549A000
trusted library allocation
page read and write
549A000
trusted library allocation
page read and write
5444000
trusted library allocation
page read and write
5900000
trusted library allocation
page read and write
549A000
trusted library allocation
page read and write
822C000
stack
page read and write
5433000
trusted library allocation
page read and write
5447000
trusted library allocation
page read and write
4B8D000
stack
page read and write
5967000
trusted library allocation
page read and write
BC8000
unkown
page execute and read and write
53B4000
trusted library allocation
page read and write
53CF000
trusted library allocation
page read and write
8B0000
direct allocation
page read and write
76B000
heap
page read and write
53D7000
trusted library allocation
page read and write
5448000
trusted library allocation
page read and write
4441000
heap
page read and write
5457000
trusted library allocation
page read and write
54BF000
trusted library allocation
page read and write
5447000
trusted library allocation
page read and write
544D000
trusted library allocation
page read and write
5DD0000
trusted library allocation
page read and write
70B000
stack
page read and write
660F000
stack
page read and write
53E1000
trusted library allocation
page read and write
549A000
trusted library allocation
page read and write
660000
heap
page read and write
542A000
trusted library allocation
page read and write
542F000
trusted library allocation
page read and write
59DD000
trusted library allocation
page read and write
5436000
trusted library allocation
page read and write
5917000
trusted library allocation
page read and write
53C6000
trusted library allocation
page read and write
5447000
trusted library allocation
page read and write
542A000
trusted library allocation
page read and write
5426000
trusted library allocation
page read and write
585A000
trusted library allocation
page read and write
549A000
trusted library allocation
page read and write
48C0000
direct allocation
page read and write
7E60000
direct allocation
page execute and read and write
53E9000
trusted library allocation
page read and write
7CB0000
direct allocation
page read and write
5A4F000
stack
page read and write
5438000
trusted library allocation
page read and write
5442000
trusted library allocation
page read and write
5858000
trusted library allocation
page read and write
5852000
trusted library allocation
page read and write
5AEA000
trusted library allocation
page read and write
53E6000
trusted library allocation
page read and write
5426000
trusted library allocation
page read and write
4431000
heap
page read and write
890000
heap
page read and write
549A000
trusted library allocation
page read and write
53BF000
trusted library allocation
page read and write
7E8000
heap
page read and write
5853000
trusted library allocation
page read and write
5468000
trusted library allocation
page read and write
5433000
trusted library allocation
page read and write
543D000
trusted library allocation
page read and write
783000
heap
page read and write
543E000
trusted library allocation
page read and write
2DCE000
stack
page read and write
5426000
trusted library allocation
page read and write
5468000
trusted library allocation
page read and write
5447000
trusted library allocation
page read and write
5A65000
trusted library allocation
page read and write
542E000
trusted library allocation
page read and write
728F000
stack
page read and write
53D4000
trusted library allocation
page read and write
5468000
trusted library allocation
page read and write
3A4E000
stack
page read and write
5987000
trusted library allocation
page read and write
7F9A000
trusted library allocation
page read and write
595D000
trusted library allocation
page read and write
7D10000
direct allocation
page read and write
549A000
trusted library allocation
page read and write
7D4C000
stack
page read and write
543A000
trusted library allocation
page read and write
597E000
trusted library allocation
page read and write
5426000
trusted library allocation
page read and write
549A000
trusted library allocation
page read and write
53AE000
stack
page read and write
548A000
trusted library allocation
page read and write
53BF000
trusted library allocation
page read and write
440F000
stack
page read and write
32CE000
stack
page read and write
549A000
trusted library allocation
page read and write
6D8F000
stack
page read and write
543D000
trusted library allocation
page read and write
5468000
trusted library allocation
page read and write
7D0000
heap
page read and write
5428000
trusted library allocation
page read and write
5442000
trusted library allocation
page read and write
5431000
trusted library allocation
page read and write
599B000
trusted library allocation
page read and write
54B5000
trusted library allocation
page read and write
544F000
trusted library allocation
page read and write
5929000
trusted library allocation
page read and write
7F90000
trusted library allocation
page read and write
3E0E000
stack
page read and write
5448000
trusted library allocation
page read and write
5857000
trusted library allocation
page read and write
5426000
trusted library allocation
page read and write
5438000
trusted library allocation
page read and write
546F000
trusted library allocation
page read and write
7D0000
heap
page read and write
5441000
trusted library allocation
page read and write
304E000
stack
page read and write
544F000
trusted library allocation
page read and write
7F4000
heap
page read and write
778F000
stack
page read and write
53D7000
trusted library allocation
page read and write
D6D000
unkown
page execute and write copy
510E000
stack
page read and write
5475000
trusted library allocation
page read and write
5428000
trusted library allocation
page read and write
7CB0000
direct allocation
page read and write
61E000
stack
page read and write
8B0000
direct allocation
page read and write
430E000
stack
page read and write
5487000
trusted library allocation
page read and write
5851000
trusted library allocation
page read and write
53D2000
trusted library allocation
page read and write
7E7000
heap
page read and write
5437000
trusted library allocation
page read and write
5439000
trusted library allocation
page read and write
599F000
trusted library allocation
page read and write
53BA000
trusted library allocation
page read and write
549A000
trusted library allocation
page read and write
5439000
trusted library allocation
page read and write
5948000
trusted library allocation
page read and write
5468000
trusted library allocation
page read and write
546F000
trusted library allocation
page read and write
4431000
heap
page read and write
628F000
stack
page read and write
755000
heap
page read and write
BBA000
unkown
page execute and read and write
5861000
trusted library allocation
page read and write
585E000
trusted library allocation
page read and write
5904000
trusted library allocation
page read and write
71E000
heap
page read and write
54BE000
trusted library allocation
page read and write
5442000
trusted library allocation
page read and write
53EB000
trusted library allocation
page read and write
549A000
trusted library allocation
page read and write
5859000
trusted library allocation
page read and write
5991000
trusted library allocation
page read and write
53D2000
trusted library allocation
page read and write
549A000
trusted library allocation
page read and write
53D7000
trusted library allocation
page read and write
33CF000
stack
page read and write
543E000
trusted library allocation
page read and write
5650000
trusted library allocation
page read and write
5993000
trusted library allocation
page read and write
5407000
trusted library allocation
page read and write
5468000
trusted library allocation
page read and write
5468000
trusted library allocation
page read and write
5855000
trusted library allocation
page read and write
7F2000
heap
page read and write
549A000
trusted library allocation
page read and write
5853000
trusted library allocation
page read and write
5436000
trusted library allocation
page read and write
5541000
trusted library allocation
page read and write
4431000
heap
page read and write
5437000
trusted library allocation
page read and write
5418000
trusted library allocation
page read and write
678E000
stack
page read and write
490C000
stack
page read and write
7CA000
heap
page read and write
BC9000
unkown
page execute and write copy
5405000
trusted library allocation
page read and write
B88000
unkown
page execute and read and write
542E000
trusted library allocation
page read and write
59A1000
trusted library allocation
page read and write
58F7000
trusted library allocation
page read and write
5909000
trusted library allocation
page read and write
5468000
trusted library allocation
page read and write
5852000
trusted library allocation
page read and write
5DDA000
trusted library allocation
page execute and read and write
53FF000
trusted library allocation
page read and write
5467000
trusted library allocation
page read and write
7E2000
heap
page read and write
51A3000
heap
page read and write
549A000
trusted library allocation
page read and write
585F000
trusted library allocation
page read and write
5468000
trusted library allocation
page read and write
4A0F000
stack
page read and write
7F1000
heap
page read and write
543B000
trusted library allocation
page read and write
5982000
trusted library allocation
page read and write
543C000
trusted library allocation
page read and write
5431000
trusted library allocation
page read and write
781000
heap
page read and write
674F000
stack
page read and write
53BA000
trusted library allocation
page read and write
5938000
trusted library allocation
page read and write
549A000
trusted library allocation
page read and write
4F0E000
stack
page read and write
5855000
trusted library allocation
page read and write
5441000
trusted library allocation
page read and write
704E000
stack
page read and write
5457000
trusted library allocation
page read and write
5468000
trusted library allocation
page read and write
37CE000
stack
page read and write
5A45000
trusted library allocation
page read and write
54E9000
stack
page read and write
7CB0000
direct allocation
page read and write
768E000
stack
page read and write
5AE7000
trusted library allocation
page read and write
5428000
trusted library allocation
page read and write
832C000
stack
page read and write
5968000
trusted library allocation
page read and write
5852000
trusted library allocation
page read and write
543D000
trusted library allocation
page read and write
585F000
trusted library allocation
page read and write
5851000
trusted library allocation
page read and write
59A1000
trusted library allocation
page read and write
593E000
trusted library allocation
page read and write
549A000
trusted library allocation
page read and write
54B1000
trusted library allocation
page read and write
8C1000
unkown
page execute and read and write
549A000
trusted library allocation
page read and write
1E0000
heap
page read and write
5487000
trusted library allocation
page read and write
53D2000
trusted library allocation
page read and write
594E000
trusted library allocation
page read and write
5468000
trusted library allocation
page read and write
5F67000
trusted library allocation
page execute and read and write
595B000
trusted library allocation
page read and write
5468000
trusted library allocation
page read and write
5A2D000
trusted library allocation
page read and write
549A000
trusted library allocation
page read and write
6CE000
stack
page read and write
740E000
stack
page read and write
544D000
trusted library allocation
page read and write
5442000
trusted library allocation
page read and write
5431000
trusted library allocation
page read and write
5468000
trusted library allocation
page read and write
5428000
trusted library allocation
page read and write
5468000
trusted library allocation
page read and write
593A000
trusted library allocation
page read and write
4431000
heap
page read and write
5451000
trusted library allocation
page read and write
7E1000
heap
page read and write
53BA000
trusted library allocation
page read and write
754E000
stack
page read and write
5557000
trusted library allocation
page read and write
549A000
trusted library allocation
page read and write
5854000
trusted library allocation
page read and write
5428000
trusted library allocation
page read and write
5447000
trusted library allocation
page read and write
5856000
trusted library allocation
page read and write
5468000
trusted library allocation
page read and write
5458000
trusted library allocation
page read and write
AA0000
unkown
page execute and read and write
5457000
trusted library allocation
page read and write
4431000
heap
page read and write
84E000
stack
page read and write
5468000
trusted library allocation
page read and write
5426000
trusted library allocation
page read and write
7E4000
heap
page read and write
549A000
trusted library allocation
page read and write
59FE000
trusted library allocation
page read and write
5565000
trusted library allocation
page read and write
4431000
heap
page read and write
5855000
trusted library allocation
page read and write
4431000
heap
page read and write
53D5000
trusted library allocation
page read and write
549A000
trusted library allocation
page read and write
65E000
stack
page read and write
59FC000
trusted library allocation
page read and write
790E000
stack
page read and write
5AEC000
trusted library allocation
page read and write
585A000
trusted library allocation
page read and write
280F000
stack
page read and write
5980000
trusted library allocation
page read and write
418F000
stack
page read and write
7EC000
heap
page read and write
5400000
trusted library allocation
page read and write
917000
unkown
page read and write
549A000
trusted library allocation
page read and write
5855000
trusted library allocation
page read and write
5426000
trusted library allocation
page read and write
4430000
heap
page read and write
7D10000
direct allocation
page read and write
1D0000
heap
page read and write
7E2000
heap
page read and write
544E000
trusted library allocation
page read and write
5852000
trusted library allocation
page read and write
53B5000
trusted library allocation
page read and write
5406000
trusted library allocation
page read and write
5428000
trusted library allocation
page read and write
549A000
trusted library allocation
page read and write
4A20000
direct allocation
page execute and read and write
7E4F000
stack
page read and write
5852000
trusted library allocation
page read and write
5946000
trusted library allocation
page read and write
543D000
trusted library allocation
page read and write
8C0000
unkown
page read and write
541C000
trusted library allocation
page read and write
5851000
trusted library allocation
page read and write
63CE000
stack
page read and write
549A000
trusted library allocation
page read and write
5477000
trusted library allocation
page read and write
7A0F000
stack
page read and write
599E000
trusted library allocation
page read and write
549A000
trusted library allocation
page read and write
96F0000
trusted library allocation
page read and write
5481000
trusted library allocation
page read and write
59C0000
trusted library allocation
page read and write
48C0000
direct allocation
page read and write
4A40000
direct allocation
page execute and read and write
53BA000
trusted library allocation
page read and write
5927000
trusted library allocation
page read and write
5468000
trusted library allocation
page read and write
5910000
trusted library allocation
page read and write
5440000
trusted library allocation
page read and write
4431000
heap
page read and write
548B000
trusted library allocation
page read and write
3F0F000
stack
page read and write
7E9000
heap
page read and write
5496000
trusted library allocation
page read and write
5457000
trusted library allocation
page read and write
5696000
trusted library allocation
page read and write
5496000
trusted library allocation
page read and write
585C000
trusted library allocation
page read and write
6DCE000
stack
page read and write
5401000
trusted library allocation
page read and write
5426000
trusted library allocation
page read and write
5448000
trusted library allocation
page read and write
7EA000
heap
page read and write
53E6000
trusted library allocation
page read and write
5447000
trusted library allocation
page read and write
7CB0000
direct allocation
page read and write
5441000
trusted library allocation
page read and write
5965000
trusted library allocation
page read and write
5457000
trusted library allocation
page read and write
549A000
trusted library allocation
page read and write
5902000
trusted library allocation
page read and write
594F000
trusted library allocation
page read and write
5DC8000
trusted library allocation
page read and write
4A60000
direct allocation
page execute and read and write
4F30000
remote allocation
page read and write
5857000
trusted library allocation
page read and write
608A000
trusted library allocation
page execute and read and write
543B000
trusted library allocation
page read and write
549A000
trusted library allocation
page read and write
4F9E000
stack
page read and write
700F000
stack
page read and write
5468000
trusted library allocation
page read and write
4C8D000
stack
page read and write
5447000
trusted library allocation
page read and write
5431000
trusted library allocation
page read and write
543A000
trusted library allocation
page read and write
5458000
trusted library allocation
page read and write
5407000
trusted library allocation
page read and write
5468000
trusted library allocation
page read and write
846E000
stack
page read and write
6088000
trusted library allocation
page execute and read and write
8B0000
direct allocation
page read and write
5855000
trusted library allocation
page read and write
5436000
trusted library allocation
page read and write
8B0000
direct allocation
page read and write
5468000
trusted library allocation
page read and write
5468000
trusted library allocation
page read and write
598D000
trusted library allocation
page read and write
5929000
trusted library allocation
page read and write
53BC000
trusted library allocation
page read and write
5428000
trusted library allocation
page read and write
53B0000
trusted library allocation
page read and write
5853000
trusted library allocation
page read and write
53CB000
trusted library allocation
page read and write
2B0F000
stack
page read and write
55ED000
trusted library allocation
page read and write
549A000
trusted library allocation
page read and write
53BF000
trusted library allocation
page read and write
549A000
trusted library allocation
page read and write
5853000
trusted library allocation
page read and write
7F92000
trusted library allocation
page read and write
5449000
trusted library allocation
page read and write
54DD000
trusted library allocation
page read and write
549A000
trusted library allocation
page read and write
5457000
trusted library allocation
page read and write
8B0000
direct allocation
page read and write
5859000
trusted library allocation
page read and write
5447000
trusted library allocation
page read and write
542F000
trusted library allocation
page read and write
290F000
stack
page read and write
2C4F000
stack
page read and write
5859000
trusted library allocation
page read and write
56DC000
trusted library allocation
page read and write
5A5F000
trusted library allocation
page read and write
549A000
trusted library allocation
page read and write
5468000
trusted library allocation
page read and write
4431000
heap
page read and write
53EB000
trusted library allocation
page read and write
5481000
trusted library allocation
page read and write
340E000
stack
page read and write
5472000
trusted library allocation
page read and write
5458000
trusted library allocation
page read and write
4FB000
stack
page read and write
4870000
trusted library allocation
page read and write
542D000
trusted library allocation
page read and write
748000
heap
page read and write
7D1000
heap
page read and write
7DE000
heap
page read and write
7B4F000
stack
page read and write
5435000
trusted library allocation
page read and write
6C8E000
stack
page read and write
5496000
trusted library allocation
page read and write
545F000
trusted library allocation
page read and write
5860000
trusted library allocation
page read and write
5853000
trusted library allocation
page read and write
BB0000
unkown
page execute and read and write
5857000
trusted library allocation
page read and write
53D7000
trusted library allocation
page read and write
4A50000
direct allocation
page execute and read and write
5436000
trusted library allocation
page read and write
54F5000
trusted library allocation
page read and write
5458000
trusted library allocation
page read and write
5852000
trusted library allocation
page read and write
5855000
trusted library allocation
page read and write
5A2F000
trusted library allocation
page read and write
5428000
trusted library allocation
page read and write
5854000
trusted library allocation
page read and write
7E4000
heap
page read and write
5428000
trusted library allocation
page read and write
544F000
trusted library allocation
page read and write
5426000
trusted library allocation
page read and write
4A50000
direct allocation
page execute and read and write
53E3000
trusted library allocation
page read and write
5437000
trusted library allocation
page read and write
53D2000
trusted library allocation
page read and write
5418000
trusted library allocation
page read and write
53E3000
trusted library allocation
page read and write
5496000
trusted library allocation
page read and write
7F4000
heap
page read and write
5457000
trusted library allocation
page read and write
599F000
trusted library allocation
page read and write
5449000
trusted library allocation
page read and write
3C8F000
stack
page read and write
58F4000
trusted library allocation
page read and write
3B8E000
stack
page read and write
7EA000
heap
page read and write
547F000
trusted library allocation
page read and write
5595000
trusted library allocation
page read and write
41CE000
stack
page read and write
5468000
trusted library allocation
page read and write
543A000
trusted library allocation
page read and write
5856000
trusted library allocation
page read and write
542A000
trusted library allocation
page read and write
782000
heap
page read and write
5477000
trusted library allocation
page read and write
53CB000
trusted library allocation
page read and write
542C000
trusted library allocation
page read and write
4A50000
direct allocation
page execute and read and write
7CB0000
direct allocation
page read and write
53E7000
trusted library allocation
page read and write
5433000
trusted library allocation
page read and write
5852000
trusted library allocation
page read and write
544F000
trusted library allocation
page read and write
7B8E000
stack
page read and write
543E000
trusted library allocation
page read and write
D6C000
unkown
page execute and read and write
328F000
stack
page read and write
585C000
trusted library allocation
page read and write
5428000
trusted library allocation
page read and write
5A4E000
trusted library allocation
page read and write
549A000
trusted library allocation
page read and write
558D000
trusted library allocation
page read and write
5446000
trusted library allocation
page read and write
8C1000
unkown
page execute and write copy
5457000
trusted library allocation
page read and write
599A000
trusted library allocation
page read and write
549A000
trusted library allocation
page read and write
5447000
trusted library allocation
page read and write
5436000
trusted library allocation
page read and write
549A000
trusted library allocation
page read and write
3CCE000
stack
page read and write
543E000
trusted library allocation
page read and write
5468000
trusted library allocation
page read and write
5854000
trusted library allocation
page read and write
549A000
trusted library allocation
page read and write
7DE000
heap
page read and write
543D000
trusted library allocation
page read and write
5458000
trusted library allocation
page read and write
5468000
trusted library allocation
page read and write
7CB0000
direct allocation
page read and write
4F30000
remote allocation
page read and write
5DB9000
trusted library allocation
page read and write
590F000
trusted library allocation
page read and write
8B0000
direct allocation
page read and write
350F000
stack
page read and write
594D000
trusted library allocation
page read and write
5461000
trusted library allocation
page read and write
5433000
trusted library allocation
page read and write
549A000
trusted library allocation
page read and write
5426000
trusted library allocation
page read and write
5859000
trusted library allocation
page read and write
5A61000
trusted library allocation
page read and write
5932000
trusted library allocation
page read and write
5856000
trusted library allocation
page read and write
7E90000
heap
page read and write
5858000
trusted library allocation
page read and write
509F000
stack
page read and write
593B000
trusted library allocation
page read and write
8C0000
unkown
page readonly
4F30000
remote allocation
page read and write
542A000
trusted library allocation
page read and write
4431000
heap
page read and write
4A70000
direct allocation
page execute and read and write
5998000
trusted library allocation
page read and write
543A000
trusted library allocation
page read and write
5405000
trusted library allocation
page read and write
5422000
trusted library allocation
page read and write
5435000
trusted library allocation
page read and write
544D000
trusted library allocation
page read and write
5652000
trusted library allocation
page read and write
5858000
trusted library allocation
page read and write
4431000
heap
page read and write
5447000
trusted library allocation
page read and write
53CF000
trusted library allocation
page read and write
53B6000
trusted library allocation
page read and write
5468000
trusted library allocation
page read and write
585A000
trusted library allocation
page read and write
638F000
stack
page read and write
7E7000
heap
page read and write
5458000
trusted library allocation
page read and write
7BE000
heap
page read and write
5AB1000
trusted library allocation
page read and write
7CB0000
direct allocation
page read and write
5934000
trusted library allocation
page read and write
5449000
trusted library allocation
page read and write
38CF000
stack
page read and write
599D000
trusted library allocation
page read and write
5416000
trusted library allocation
page read and write
776000
heap
page read and write
54C1000
trusted library allocation
page read and write
4431000
heap
page read and write
5861000
trusted library allocation
page read and write
590D000
trusted library allocation
page read and write
5515000
trusted library allocation
page read and write
549A000
trusted library allocation
page read and write
4410000
heap
page read and write
6B0F000
stack
page read and write
5428000
trusted library allocation
page read and write
7EA0000
direct allocation
page execute and read and write
5850000
trusted library allocation
page read and write
2C8E000
stack
page read and write
5419000
trusted library allocation
page read and write
52AF000
stack
page read and write
541C000
trusted library allocation
page read and write
5AE9000
trusted library allocation
page read and write
5851000
trusted library allocation
page read and write
59DB000
trusted library allocation
page read and write
5415000
trusted library allocation
page read and write
5477000
trusted library allocation
page read and write
53D4000
trusted library allocation
page read and write
919000
unkown
page execute and read and write
5850000
trusted library allocation
page read and write
5449000
trusted library allocation
page read and write
5428000
trusted library allocation
page read and write
5DD2000
trusted library allocation
page execute and read and write
8B0000
direct allocation
page read and write
53E9000
trusted library allocation
page read and write
5858000
trusted library allocation
page read and write
5A8F000
trusted library allocation
page read and write
48C0000
direct allocation
page read and write
5436000
trusted library allocation
page read and write
404F000
stack
page read and write
585E000
trusted library allocation
page read and write
7ED000
heap
page read and write
5438000
trusted library allocation
page read and write
5ABA000
trusted library allocation
page read and write
5468000
trusted library allocation
page read and write
5459000
trusted library allocation
page read and write
552E000
stack
page read and write
54C4000
trusted library allocation
page read and write
BC8000
unkown
page execute and write copy
5856000
trusted library allocation
page read and write
542F000
trusted library allocation
page read and write
547F000
trusted library allocation
page read and write
714F000
stack
page read and write
5475000
trusted library allocation
page read and write
5966000
trusted library allocation
page read and write
590E000
trusted library allocation
page read and write
544D000
trusted library allocation
page read and write
5439000
trusted library allocation
page read and write
5468000
trusted library allocation
page read and write
5405000
trusted library allocation
page read and write
53E7000
trusted library allocation
page read and write
5441000
trusted library allocation
page read and write
53CB000
trusted library allocation
page read and write
5858000
trusted library allocation
page read and write
6B4E000
stack
page read and write
5428000
trusted library allocation
page read and write
88E000
stack
page read and write
599F000
trusted library allocation
page read and write
5436000
trusted library allocation
page read and write
5436000
trusted library allocation
page read and write
53CA000
trusted library allocation
page read and write
5428000
trusted library allocation
page read and write
5468000
trusted library allocation
page read and write
5407000
trusted library allocation
page read and write
547C000
trusted library allocation
page read and write
549A000
trusted library allocation
page read and write
5436000
trusted library allocation
page read and write
5A8C000
stack
page read and write
78CF000
stack
page read and write
549A000
trusted library allocation
page read and write
5468000
trusted library allocation
page read and write
4E0E000
stack
page read and write
390E000
stack
page read and write
5853000
trusted library allocation
page read and write
48BD000
stack
page read and write
7D00000
heap
page read and write
53F7000
trusted library allocation
page read and write
7E7000
heap
page read and write
585F000
trusted library allocation
page read and write
5431000
trusted library allocation
page read and write
599C000
trusted library allocation
page read and write
665000
heap
page read and write
549A000
trusted library allocation
page read and write
4440000
heap
page read and write
5856000
trusted library allocation
page read and write
53F1000
trusted library allocation
page read and write
53BA000
trusted library allocation
page read and write
8B0000
direct allocation
page read and write
51A0000
heap
page read and write
762000
heap
page read and write
5949000
stack
page read and write
59B7000
trusted library allocation
page read and write
53EB000
trusted library allocation
page read and write
53BA000
trusted library allocation
page read and write
543D000
trusted library allocation
page read and write
5458000
trusted library allocation
page read and write
544D000
trusted library allocation
page read and write
2F0E000
stack
page read and write
5853000
trusted library allocation
page read and write
5854000
trusted library allocation
page read and write
549A000
trusted library allocation
page read and write
5422000
trusted library allocation
page read and write
549A000
trusted library allocation
page read and write
5487000
trusted library allocation
page read and write
5EC2000
trusted library allocation
page read and write
5447000
trusted library allocation
page read and write
5468000
trusted library allocation
page read and write
750F000
stack
page read and write
7D0000
heap
page read and write
5861000
trusted library allocation
page read and write
54B8000
trusted library allocation
page read and write
549A000
trusted library allocation
page read and write
7CB0000
direct allocation
page read and write
5457000
trusted library allocation
page read and write
4A50000
direct allocation
page execute and read and write
7F98000
trusted library allocation
page read and write
650E000
stack
page read and write
48C0000
direct allocation
page read and write
549A000
trusted library allocation
page read and write
58F2000
trusted library allocation
page read and write
53BA000
trusted library allocation
page read and write
364F000
stack
page read and write
7DE000
heap
page read and write
5985000
trusted library allocation
page read and write
53FF000
trusted library allocation
page read and write
5442000
trusted library allocation
page read and write
71A000
heap
page read and write
5426000
trusted library allocation
page read and write
549A000
trusted library allocation
page read and write
5439000
trusted library allocation
page read and write
7CE0000
trusted library allocation
page read and write
549A000
trusted library allocation
page read and write
53B6000
trusted library allocation
page read and write
585C000
trusted library allocation
page read and write
64CF000
stack
page read and write
53EB000
trusted library allocation
page read and write
53E7000
trusted library allocation
page read and write
54B1000
trusted library allocation
page read and write
5907000
trusted library allocation
page read and write
58F9000
trusted library allocation
page read and write
5426000
trusted library allocation
page read and write
836E000
stack
page read and write
5A4C000
trusted library allocation
page read and write
6ECF000
stack
page read and write
5436000
trusted library allocation
page read and write
5923000
trusted library allocation
page read and write
5927000
trusted library allocation
page read and write
4A50000
direct allocation
page execute and read and write
549A000
trusted library allocation
page read and write
549A000
trusted library allocation
page read and write
5428000
trusted library allocation
page read and write
549A000
trusted library allocation
page read and write
549A000
trusted library allocation
page read and write
5458000
trusted library allocation
page read and write
5455000
trusted library allocation
page read and write
56DA000
trusted library allocation
page read and write
585F000
trusted library allocation
page read and write
5428000
trusted library allocation
page read and write
543A000
trusted library allocation
page read and write
5ABC000
trusted library allocation
page read and write
42CF000
stack
page read and write
543C000
trusted library allocation
page read and write
5922000
trusted library allocation
page read and write
549A000
trusted library allocation
page read and write
549A000
trusted library allocation
page read and write
53B9000
trusted library allocation
page read and write
5496000
trusted library allocation
page read and write
598B000
trusted library allocation
page read and write
5447000
trusted library allocation
page read and write
4DCF000
stack
page read and write
7F4000
heap
page read and write
53DD000
trusted library allocation
page read and write
5652000
trusted library allocation
page read and write
5446000
trusted library allocation
page read and write
6078000
trusted library allocation
page execute and read and write
2B4E000
stack
page read and write
5859000
trusted library allocation
page read and write
5920000
trusted library allocation
page read and write
53CB000
trusted library allocation
page read and write
3DCF000
stack
page read and write
544D000
trusted library allocation
page read and write
314F000
stack
page read and write
549A000
trusted library allocation
page read and write
905000
unkown
page execute and read and write
7E7000
heap
page read and write
4A9D000
trusted library allocation
page read and write
3F4E000
stack
page read and write
53BF000
trusted library allocation
page read and write
549A000
trusted library allocation
page read and write
53D4000
trusted library allocation
page read and write
544B000
trusted library allocation
page read and write
5961000
trusted library allocation
page read and write
5447000
trusted library allocation
page read and write
5970000
trusted library allocation
page read and write
4A50000
direct allocation
page execute and read and write
5468000
trusted library allocation
page read and write
5468000
trusted library allocation
page read and write
5462000
trusted library allocation
page read and write
5921000
trusted library allocation
page read and write
718E000
stack
page read and write
4431000
heap
page read and write
549A000
trusted library allocation
page read and write
E6F000
stack
page read and write
59A1000
trusted library allocation
page read and write
7A4E000
stack
page read and write
618F000
stack
page read and write
4A80000
direct allocation
page execute and read and write
7F8000
heap
page read and write
5B19000
trusted library allocation
page read and write
5428000
trusted library allocation
page read and write
5858000
trusted library allocation
page read and write
56DC000
trusted library allocation
page read and write
7EA000
heap
page read and write
7E5000
heap
page read and write
5442000
trusted library allocation
page read and write
7C90000
direct allocation
page read and write
53BA000
trusted library allocation
page read and write
542D000
trusted library allocation
page read and write
69CF000
stack
page read and write
5AAF000
trusted library allocation
page read and write
8A0000
heap
page read and write
5980000
trusted library allocation
page read and write
5473000
trusted library allocation
page read and write
5851000
trusted library allocation
page read and write
77CE000
stack
page read and write
5477000
trusted library allocation
page read and write
8A7000
heap
page read and write
549A000
trusted library allocation
page read and write
5438000
trusted library allocation
page read and write
542D000
trusted library allocation
page read and write
549A000
trusted library allocation
page read and write
53CF000
trusted library allocation
page read and write
2A0F000
stack
page read and write
595F000
trusted library allocation
page read and write
54B3000
trusted library allocation
page read and write
5448000
trusted library allocation
page read and write
751000
heap
page read and write
59A3000
trusted library allocation
page read and write
547B000
trusted library allocation
page read and write
7CB0000
direct allocation
page read and write
72CE000
stack
page read and write
8B0000
direct allocation
page read and write
7F4000
heap
page read and write
543B000
trusted library allocation
page read and write
54B3000
trusted library allocation
page read and write
5442000
trusted library allocation
page read and write
54B6000
trusted library allocation
page read and write
5853000
trusted library allocation
page read and write
6F0E000
stack
page read and write
5426000
trusted library allocation
page read and write
8B0000
direct allocation
page read and write
5950000
trusted library allocation
page read and write
5403000
trusted library allocation
page read and write
5480000
trusted library allocation
page read and write
585A000
trusted library allocation
page read and write
5975000
trusted library allocation
page read and write
5CA7000
trusted library allocation
page read and write
5428000
trusted library allocation
page read and write
4431000
heap
page read and write
5919000
trusted library allocation
page read and write
5442000
trusted library allocation
page read and write
5853000
trusted library allocation
page read and write
5853000
trusted library allocation
page read and write
73CF000
stack
page read and write
585D000
trusted library allocation
page read and write
4431000
heap
page read and write
7CB0000
direct allocation
page read and write
549A000
trusted library allocation
page read and write
5468000
trusted library allocation
page read and write
543A000
trusted library allocation
page read and write
7EF000
heap
page read and write
5487000
trusted library allocation
page read and write
543D000
trusted library allocation
page read and write
541C000
trusted library allocation
page read and write
5472000
trusted library allocation
page read and write
664E000
stack
page read and write
5468000
trusted library allocation
page read and write
547D000
trusted library allocation
page read and write
368E000
stack
page read and write
5939000
trusted library allocation
page read and write
7CB0000
direct allocation
page read and write
549A000
trusted library allocation
page read and write
5461000
trusted library allocation
page read and write
5444000
trusted library allocation
page read and write
5496000
trusted library allocation
page read and write
544F000
trusted library allocation
page read and write
5426000
trusted library allocation
page read and write
5457000
trusted library allocation
page read and write
4431000
heap
page read and write
5468000
trusted library allocation
page read and write
53B3000
trusted library allocation
page read and write
5B0E000
stack
page read and write
53B3000
trusted library allocation
page read and write
596E000
trusted library allocation
page read and write
8B0000
direct allocation
page read and write
5467000
trusted library allocation
page read and write
5468000
trusted library allocation
page read and write
8B0000
direct allocation
page read and write
5ACE000
stack
page read and write
4904000
direct allocation
page read and write
4431000
heap
page read and write
58F7000
trusted library allocation
page read and write
5461000
trusted library allocation
page read and write
5468000
trusted library allocation
page read and write
8B0000
direct allocation
page read and write
5468000
trusted library allocation
page read and write
542D000
trusted library allocation
page read and write
5A6E000
trusted library allocation
page read and write
5433000
trusted library allocation
page read and write
3A0F000
stack
page read and write
5447000
trusted library allocation
page read and write
5426000
trusted library allocation
page read and write
7DE000
heap
page read and write
5438000
trusted library allocation
page read and write
549A000
trusted library allocation
page read and write
543C000
trusted library allocation
page read and write
97B0000
trusted library allocation
page read and write
5859000
trusted library allocation
page read and write
542A000
trusted library allocation
page read and write
6A0E000
stack
page read and write
53D7000
trusted library allocation
page read and write
68CE000
stack
page read and write
5454000
trusted library allocation
page read and write
4431000
heap
page read and write
543A000
trusted library allocation
page read and write
7C8F000
stack
page read and write
53B4000
trusted library allocation
page read and write
5442000
trusted library allocation
page read and write
5447000
trusted library allocation
page read and write
5431000
trusted library allocation
page read and write
5973000
trusted library allocation
page read and write
5A91000
trusted library allocation
page read and write
688F000
stack
page read and write
4CCE000
stack
page read and write
585B000
trusted library allocation
page read and write
549A000
trusted library allocation
page read and write
7CB0000
trusted library allocation
page read and write
54B3000
trusted library allocation
page read and write
4431000
heap
page read and write
544F000
trusted library allocation
page read and write
53E1000
trusted library allocation
page read and write
543C000
trusted library allocation
page read and write
4431000
heap
page read and write
5496000
trusted library allocation
page read and write
764F000
stack
page read and write
543D000
trusted library allocation
page read and write
2ECF000
stack
page read and write
5468000
trusted library allocation
page read and write
5457000
trusted library allocation
page read and write
562D000
trusted library allocation
page read and write
7CA000
heap
page read and write
4431000
heap
page read and write
5454000
trusted library allocation
page read and write
544A000
trusted library allocation
page read and write
53F6000
trusted library allocation
page read and write
5850000
trusted library allocation
page read and write
5B17000
trusted library allocation
page read and write
53B3000
trusted library allocation
page read and write
4431000
heap
page read and write
378F000
stack
page read and write
585B000
trusted library allocation
page read and write
5431000
trusted library allocation
page read and write
354E000
stack
page read and write
408E000
stack
page read and write
6C4F000
stack
page read and write
7D10000
direct allocation
page read and write
549A000
trusted library allocation
page read and write
7CB0000
direct allocation
page read and write
7CB0000
direct allocation
page read and write
591F000
trusted library allocation
page read and write
542C000
trusted library allocation
page read and write
5856000
trusted library allocation
page read and write
5447000
trusted library allocation
page read and write
53DA000
trusted library allocation
page read and write
8B0000
direct allocation
page read and write
5436000
trusted library allocation
page read and write
547B000
trusted library allocation
page read and write
7E9000
heap
page read and write
5940000
trusted library allocation
page read and write
7F2000
heap
page read and write
5414000
trusted library allocation
page read and write
5457000
trusted library allocation
page read and write
585A000
trusted library allocation
page read and write
565F000
trusted library allocation
page read and write
544D000
trusted library allocation
page read and write
543D000
trusted library allocation
page read and write
7E7000
heap
page read and write
16B000
stack
page read and write
5431000
trusted library allocation
page read and write
53BF000
trusted library allocation
page read and write
5487000
trusted library allocation
page read and write
4A5D000
stack
page read and write
5850000
trusted library allocation
page read and write
547F000
trusted library allocation
page read and write
547F000
trusted library allocation
page read and write
59C2000
trusted library allocation
page read and write
7F2000
heap
page read and write
517E000
stack
page read and write
300F000
stack
page read and write
53CB000
trusted library allocation
page read and write
7D5000
heap
page read and write
5857000
trusted library allocation
page read and write
549A000
trusted library allocation
page read and write
5448000
trusted library allocation
page read and write
595F000
trusted library allocation
page read and write
710000
heap
page read and write
5854000
trusted library allocation
page read and write
549A000
trusted library allocation
page read and write
559D000
trusted library allocation
page read and write
547D000
trusted library allocation
page read and write
There are 988 hidden memdumps, click here to show them.

DOM / HTML

URL
Malicious
https://learn.microsoft.com/en-us/dotnet/framework/install/application-not-started?version=(null)&processName=file.exe&platform=0009&osver=6&isServer=0&shimver=4.0.30319.0
https://learn.microsoft.com/en-us/dotnet/framework/install/application-not-started?version=(null)&processName=file.exe&platform=0009&osver=6&isServer=0&shimver=4.0.30319.0
https://learn.microsoft.com/en-us/dotnet/framework/install/application-not-started?version=(null)&processName=file.exe&platform=0009&osver=6&isServer=0&shimver=4.0.30319.0
https://learn.microsoft.com/en-us/dotnet/framework/install/application-not-started?version=(null)&processName=file.exe&platform=0009&osver=6&isServer=0&shimver=4.0.30319.0
https://learn.microsoft.com/en-us/dotnet/framework/install/application-not-started?version=(null)&processName=file.exe&platform=0009&osver=6&isServer=0&shimver=4.0.30319.0
https://learn.microsoft.com/en-us/dotnet/framework/install/application-not-started?version=(null)&processName=file.exe&platform=0009&osver=6&isServer=0&shimver=4.0.30319.0