IOC Report
file.exe

loading gif

Files

File Path
Type
Category
Malicious
file.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
Chrome Cache Entry: 100
JPEG image data, JFIF standard 1.01, aspect ratio, density 1x1, segment length 16, baseline, precision 8, 1528x402, components 3
dropped
Chrome Cache Entry: 101
PNG image data, 475 x 212, 8-bit/color RGBA, non-interlaced
downloaded
Chrome Cache Entry: 102
JSON data
downloaded
Chrome Cache Entry: 103
JSON data
dropped
Chrome Cache Entry: 104
JPEG image data, JFIF standard 1.01, aspect ratio, density 1x1, segment length 16, baseline, precision 8, 1528x402, components 3
downloaded
Chrome Cache Entry: 105
exported SGML document, ASCII text, with very long lines (65536), with no line terminators
dropped
Chrome Cache Entry: 106
ASCII text, with very long lines (46884)
dropped
Chrome Cache Entry: 107
ASCII text
dropped
Chrome Cache Entry: 108
SVG Scalable Vector Graphics image
downloaded
Chrome Cache Entry: 109
Web Open Font Format (Version 2), TrueType, length 19696, version 1.0
downloaded
Chrome Cache Entry: 110
ASCII text, with very long lines (33148), with no line terminators
downloaded
Chrome Cache Entry: 111
PNG image data, 475 x 212, 8-bit/color RGBA, non-interlaced
dropped
Chrome Cache Entry: 112
PNG image data, 658 x 480, 8-bit/color RGBA, non-interlaced
dropped
Chrome Cache Entry: 113
JSON data
dropped
Chrome Cache Entry: 114
HTML document, ASCII text, with very long lines (639), with CRLF, LF line terminators
downloaded
Chrome Cache Entry: 115
JSON data
downloaded
Chrome Cache Entry: 116
PNG image data, 533 x 478, 8-bit/color RGBA, non-interlaced
dropped
Chrome Cache Entry: 75
PNG image data, 533 x 478, 8-bit/color RGBA, non-interlaced
dropped
Chrome Cache Entry: 76
PNG image data, 533 x 478, 8-bit/color RGBA, non-interlaced
downloaded
Chrome Cache Entry: 77
SVG Scalable Vector Graphics image
dropped
Chrome Cache Entry: 78
JSON data
dropped
Chrome Cache Entry: 79
PNG image data, 533 x 478, 8-bit/color RGBA, non-interlaced
dropped
Chrome Cache Entry: 80
ASCII text, with very long lines (65536), with no line terminators
downloaded
Chrome Cache Entry: 81
ASCII text, with very long lines (65410)
dropped
Chrome Cache Entry: 82
JSON data
dropped
Chrome Cache Entry: 83
ASCII text, with very long lines (65410)
downloaded
Chrome Cache Entry: 84
JSON data
downloaded
Chrome Cache Entry: 85
JSON data
dropped
Chrome Cache Entry: 86
PNG image data, 533 x 478, 8-bit/color RGBA, non-interlaced
downloaded
Chrome Cache Entry: 87
ASCII text, with very long lines (52717), with no line terminators
dropped
Chrome Cache Entry: 88
ASCII text
downloaded
Chrome Cache Entry: 89
ASCII text, with very long lines (52717), with no line terminators
downloaded
Chrome Cache Entry: 90
exported SGML document, ASCII text, with very long lines (65536), with no line terminators
downloaded
Chrome Cache Entry: 91
ASCII text, with no line terminators
downloaded
Chrome Cache Entry: 92
PNG image data, 533 x 478, 8-bit/color RGBA, non-interlaced
downloaded
Chrome Cache Entry: 93
MS Windows icon resource - 6 icons, -128x-128, 16 colors, 72x72, 16 colors
downloaded
Chrome Cache Entry: 94
ASCII text, with very long lines (46884)
downloaded
Chrome Cache Entry: 95
JSON data
dropped
Chrome Cache Entry: 96
MS Windows icon resource - 6 icons, -128x-128, 16 colors, 72x72, 16 colors
dropped
Chrome Cache Entry: 97
PNG image data, 658 x 480, 8-bit/color RGBA, non-interlaced
downloaded
Chrome Cache Entry: 98
ASCII text, with very long lines (33148), with no line terminators
dropped
Chrome Cache Entry: 99
JSON data
downloaded
There are 33 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\file.exe
"C:\Users\user\Desktop\file.exe"
malicious
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized --single-argument http://go.microsoft.com/fwlink/?prd=11324&pver=4.5&sbp=AppLaunch2&plcid=0x409&o1=SHIM_NOVERSION_FOUND&version=(null)&processName=file.exe&platform=0009&osver=6&isServer=0&shimver=4.0.30319.0
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2168 --field-trial-handle=1880,i,4249164096274677999,9181346475388211576,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized --single-argument http://go.microsoft.com/fwlink/?prd=11324&pver=4.5&sbp=AppLaunch2&plcid=0x409&o1=SHIM_NOVERSION_FOUND&version=(null)&processName=file.exe&platform=0009&osver=6&isServer=0&shimver=4.0.30319.0
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2132 --field-trial-handle=1916,i,2138066403308314358,10443051361612717293,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8

URLs

Name
IP
Malicious
https://authoring-docs-microsoft.poolparty.biz/devrel/7696cda6-0510-47f6-8302-71bb5d2e28cf
unknown
https://duckduckgo.com/chrome_newtab
unknown
https://duckduckgo.com/ac/?q=
unknown
https://property-imper.sbs/0914
unknown
https://property-imper.sbs/api
104.21.33.116
https://github.com/dotnet/docs/blob/17c4acca45e573a92878a44a2cce57d699fe9c7c/docs/framework/install/
unknown
https://www.linkedin.com/cws/share?url=$
unknown
https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
unknown
https://property-imper.sbs/t
unknown
https://github.com/Youssef1313
unknown
https://property-imper.sbs/apiY
unknown
https://management.azure.com/providers/Microsoft.Portal/userSettings/cloudconsole?api-version=2023-0
unknown
https://aka.ms/msignite_docs_banner
unknown
https://videoencodingpublic-hgeaeyeba8gycee3.b01.azurefd.net/public-b4da8140-92cf-421c-8b7b-e471d5b9
unknown
http://polymer.github.io/AUTHORS.txt
unknown
https://github.com/dotnet/docs/issues/new?template=z-customer-feedback.yml
unknown
https://management.azure.com/subscriptions?api-version=2016-06-01
unknown
https://github.com/dotnet/docs/blob/main/docs/framework/install/application-not-started.md
unknown
http://x1.c.lencr.org/0
unknown
http://x1.i.lencr.org/0
unknown
https://aka.ms/pshelpmechoose
unknown
https://aka.ms/feedback/report?space=61
unknown
https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
unknown
https://learn-video.azurefd.net/vod/player
unknown
https://twitter.com/intent/tweet?original_referer=$
unknown
https://github.com/gewarren
unknown
http://185.215
unknown
http://185.215.113.16/off/def.exepleWebKit/537.36
unknown
https://support.mozilla.org/products/firefoxgro.all
unknown
http://polymer.github.io/CONTRIBUTORS.txt
unknown
https://property-imper.sbs/apiz
unknown
https://github.com/dotnet/docs/blob/live/docs/framework/install/application-not-started.md
unknown
https://authoring-docs-microsoft.poolparty.biz/devrel/69c76c32-967e-4c65-b89a-74cc527db725
unknown
https://client-api.arkoselabs.com/v2/api.js
unknown
https://aka.ms/MSIgniteChallenge/Tier1Banner?wt.mc_id=ignite24_learnbanner_tier1_cnl
unknown
https://management.azure.com/providers/Microsoft.Portal/consoles/default?api-version=2017-12-01-prev
unknown
https://www.google.com/images/branding/product/ico/googleg_lodp.ico
unknown
https://property-imper.sbs:443/api9
unknown
https://github.com/Thraka
unknown
http://polymer.github.io/PATENTS.txt
unknown
https://aka.ms/certhelp
unknown
http://185.215.113.16/steam/random.exe
unknown
https://bridge.sfo1.admarketplace.net/ctp?version=16.0.0&key=1696490019400400000.2&ci=1696490019252.
unknown
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
unknown
http://crl.rootca1.amazontrust.com/rootca1.crl0
unknown
https://github.com/mairaw
unknown
http://www.microsoft.
unknown
https://js.monitor.azure.com/scripts/c/ms.jsll-4.min.js
13.107.246.63
http://ocsp.rootca1.amazontrust.com0:
unknown
https://schema.org
unknown
http://polymer.github.io/LICENSE.txt
unknown
https://www.ecosia.org/newtab/
unknown
https://property-imper.sbs/
unknown
https://support.mozilla.org/kb/customize-firefox-controls-buttons-and-toolbars?utm_source=firefox-br
unknown
https://aka.ms/yourcaliforniaprivacychoices
unknown
https://ac.ecosia.org/autocomplete?q=
unknown
https://github.com/nschonni
unknown
https://videoencodingpublic-hgeaeyeba8gycee3.b01.azurefd.net/public-09ce73a6-05a5-4e4d-b3d7-bd5a8c05
unknown
https://github.com/adegeo
unknown
https://github.com/jonschlinkert/is-plain-object
unknown
http://crt.rootca1.amazontrust.com/rootca1.cer0?
unknown
https://octokit.github.io/rest.js/#throttling
unknown
https://property-imper.sbs/apiO
unknown
https://imp.mt48.net/static?id=7RHzfOIXjFEYsBdvIpkX4Qqm4pqWfpl%2B4pbW4pbWfpbW7ReNxR3UIG8zInwYIFIVs9e
unknown
https://contile-images.services.mozilla.com/CuERQnIs4CzqjKBh9os6_h9d4CUDCHO3oiqmAQO6VLM.25122.jpg
unknown
https://github.com/js-cookie/js-cookie
unknown
https://property-imper.sbs/api6
unknown
http://185.215.113.16/off/def.exe
unknown
http://schema.org/Organization
unknown
https://channel9.msdn.com/
unknown
https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
unknown
https://github.com/dotnet/try
unknown
https://property-imper.sbs/api=
unknown
http://185.215.113.16/off/def.exe(w
unknown
There are 64 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
property-imper.sbs
104.21.33.116
www.google.com
142.250.181.100
s-part-0035.t-0009.t-msedge.net
13.107.246.63
js.monitor.azure.com
unknown
mdec.nelreports.net
unknown

IPs

IP
Domain
Country
Malicious
192.168.2.7
unknown
unknown
malicious
13.107.246.63
s-part-0035.t-0009.t-msedge.net
United States
185.215.113.16
unknown
Portugal
142.250.181.100
www.google.com
United States
239.255.255.250
unknown
Reserved
104.21.33.116
property-imper.sbs
United States
192.168.2.23
unknown
unknown

Memdumps

Base Address
Regiontype
Protect
Malicious
80EE000
stack
page read and write
5BC2000
trusted library allocation
page read and write
5BBA000
trusted library allocation
page read and write
5BBA000
trusted library allocation
page read and write
5A40000
heap
page read and write
4AFE000
stack
page read and write
124E000
stack
page read and write
73C8F000
unkown
page readonly
5C29000
trusted library allocation
page read and write
13A8000
heap
page read and write
5B9F000
trusted library allocation
page read and write
5B91000
trusted library allocation
page read and write
5C37000
trusted library allocation
page read and write
5C0A000
trusted library allocation
page read and write
5B9D000
trusted library allocation
page read and write
6034000
trusted library allocation
page read and write
60DB000
trusted library allocation
page read and write
40FE000
stack
page read and write
5BBA000
trusted library allocation
page read and write
6166000
trusted library allocation
page read and write
614C000
trusted library allocation
page read and write
5C2C000
trusted library allocation
page read and write
5C43000
trusted library allocation
page read and write
5C0A000
trusted library allocation
page read and write
5C2C000
trusted library allocation
page read and write
603D000
trusted library allocation
page read and write
6038000
trusted library allocation
page read and write
12B0000
direct allocation
page read and write
13A1000
heap
page read and write
129E000
stack
page read and write
8480000
direct allocation
page read and write
5B9D000
trusted library allocation
page read and write
5BCA000
trusted library allocation
page read and write
6036000
trusted library allocation
page read and write
5C2C000
trusted library allocation
page read and write
612A000
trusted library allocation
page read and write
5BDC000
trusted library allocation
page read and write
12B0000
direct allocation
page read and write
51DF000
stack
page read and write
139D000
heap
page read and write
5BA4000
trusted library allocation
page read and write
6037000
trusted library allocation
page read and write
86F0000
heap
page read and write
5BFB000
trusted library allocation
page read and write
60DA000
trusted library allocation
page read and write
5BD4000
trusted library allocation
page read and write
5C3D000
trusted library allocation
page read and write
6033000
trusted library allocation
page read and write
6139000
trusted library allocation
page read and write
616B000
trusted library allocation
page read and write
5C3D000
trusted library allocation
page read and write
60E8000
trusted library allocation
page read and write
6582000
trusted library allocation
page execute and read and write
343F000
stack
page read and write
5C02000
trusted library allocation
page read and write
54DE000
stack
page read and write
5BC0000
trusted library allocation
page read and write
81EF000
stack
page read and write
5C02000
trusted library allocation
page read and write
5C3D000
trusted library allocation
page read and write
612C000
trusted library allocation
page read and write
5BCA000
trusted library allocation
page read and write
5BCD000
trusted library allocation
page read and write
6035000
trusted library allocation
page read and write
4D00000
trusted library allocation
page read and write
5B9D000
trusted library allocation
page read and write
12CA000
heap
page read and write
5BAE000
trusted library allocation
page read and write
5C23000
trusted library allocation
page read and write
6034000
trusted library allocation
page read and write
5E32000
trusted library allocation
page read and write
5C15000
trusted library allocation
page read and write
5EBC000
trusted library allocation
page read and write
5BE4000
trusted library allocation
page read and write
5C2C000
trusted library allocation
page read and write
5BBA000
trusted library allocation
page read and write
6103000
trusted library allocation
page read and write
1311000
heap
page read and write
139E000
heap
page read and write
139E000
heap
page read and write
6112000
trusted library allocation
page read and write
5C34000
trusted library allocation
page read and write
61FE000
trusted library allocation
page read and write
5BA9000
trusted library allocation
page read and write
5BC0000
trusted library allocation
page read and write
5220000
direct allocation
page execute and read and write
622F000
stack
page read and write
603F000
trusted library allocation
page read and write
5BDB000
trusted library allocation
page read and write
5C07000
trusted library allocation
page read and write
13AD000
heap
page read and write
13A6000
heap
page read and write
5BF2000
trusted library allocation
page read and write
5D22000
trusted library allocation
page read and write
6280000
trusted library allocation
page read and write
139A000
heap
page read and write
84B0000
trusted library allocation
page read and write
5D6B000
trusted library allocation
page read and write
5C21000
trusted library allocation
page read and write
1398000
heap
page read and write
8B6E000
stack
page read and write
60F1000
trusted library allocation
page read and write
87F0000
trusted library allocation
page read and write
4C01000
heap
page read and write
5090000
direct allocation
page read and write
6CEE000
stack
page read and write
60F3000
trusted library allocation
page read and write
6033000
trusted library allocation
page read and write
627E000
trusted library allocation
page read and write
6BAE000
stack
page read and write
6035000
trusted library allocation
page read and write
603B000
trusted library allocation
page read and write
5BAC000
trusted library allocation
page read and write
5BD0000
trusted library allocation
page read and write
5C23000
trusted library allocation
page read and write
383E000
stack
page read and write
8480000
direct allocation
page read and write
616B000
trusted library allocation
page read and write
5BA7000
trusted library allocation
page read and write
5BB2000
trusted library allocation
page read and write
1204000
heap
page read and write
61C8000
trusted library allocation
page read and write
2F37000
heap
page read and write
13AB000
heap
page read and write
61DD000
trusted library allocation
page read and write
5C2C000
trusted library allocation
page read and write
5C02000
trusted library allocation
page read and write
603F000
trusted library allocation
page read and write
6032000
trusted library allocation
page read and write
5C3D000
trusted library allocation
page read and write
660000
unkown
page read and write
5BDC000
trusted library allocation
page read and write
622F000
trusted library allocation
page read and write
138E000
heap
page read and write
1204000
heap
page read and write
5BD9000
trusted library allocation
page read and write
5C15000
trusted library allocation
page read and write
5BA4000
trusted library allocation
page read and write
12B0000
direct allocation
page read and write
6037000
trusted library allocation
page read and write
851C000
stack
page read and write
36FE000
stack
page read and write
3A7F000
stack
page read and write
1391000
heap
page read and write
5C32000
trusted library allocation
page read and write
5C0A000
trusted library allocation
page read and write
5B9B000
trusted library allocation
page read and write
3CFF000
stack
page read and write
6112000
trusted library allocation
page read and write
5C47000
trusted library allocation
page read and write
5BD9000
trusted library allocation
page read and write
1204000
heap
page read and write
5BDB000
trusted library allocation
page read and write
8480000
direct allocation
page read and write
5BDB000
trusted library allocation
page read and write
6038000
trusted library allocation
page read and write
4ABF000
stack
page read and write
5C29000
trusted library allocation
page read and write
603B000
trusted library allocation
page read and write
1383000
heap
page read and write
5B9F000
trusted library allocation
page read and write
138C000
heap
page read and write
5C2C000
trusted library allocation
page read and write
6210000
trusted library allocation
page read and write
6032000
trusted library allocation
page read and write
103B000
stack
page read and write
5BCA000
trusted library allocation
page read and write
66AB000
trusted library allocation
page read and write
1204000
heap
page read and write
55DF000
stack
page read and write
5BAF000
trusted library allocation
page read and write
5BF6000
trusted library allocation
page read and write
5C27000
trusted library allocation
page read and write
5B9A000
trusted library allocation
page read and write
5C29000
trusted library allocation
page read and write
138C000
heap
page read and write
5BA8000
trusted library allocation
page read and write
5C1B000
trusted library allocation
page read and write
5BDB000
trusted library allocation
page read and write
5BAC000
trusted library allocation
page read and write
7FAE000
stack
page read and write
73C87000
unkown
page readonly
5C27000
trusted library allocation
page read and write
49BE000
stack
page read and write
611E000
trusted library allocation
page read and write
5B92000
trusted library allocation
page read and write
12B0000
direct allocation
page read and write
60FF000
trusted library allocation
page read and write
139D000
heap
page read and write
5C08000
trusted library allocation
page read and write
6036000
trusted library allocation
page read and write
5BC6000
trusted library allocation
page read and write
5BD6000
trusted library allocation
page read and write
5C2C000
trusted library allocation
page read and write
6035000
trusted library allocation
page read and write
5C29000
trusted library allocation
page read and write
13A1000
heap
page read and write
1180000
heap
page read and write
8B2C000
stack
page read and write
588F000
stack
page read and write
139D000
heap
page read and write
867E000
stack
page read and write
5BAA000
trusted library allocation
page read and write
5BC1000
trusted library allocation
page read and write
5C92000
trusted library allocation
page read and write
5C23000
trusted library allocation
page read and write
5BCD000
trusted library allocation
page read and write
5C2C000
trusted library allocation
page read and write
87F8000
trusted library allocation
page read and write
5C37000
trusted library allocation
page read and write
139A000
heap
page read and write
9F50000
trusted library allocation
page read and write
8480000
direct allocation
page read and write
5C27000
trusted library allocation
page read and write
4BFF000
stack
page read and write
6241000
trusted library allocation
page read and write
5C02000
trusted library allocation
page read and write
60F5000
trusted library allocation
page read and write
5C27000
trusted library allocation
page read and write
5C27000
trusted library allocation
page read and write
6038000
trusted library allocation
page read and write
5BA4000
trusted library allocation
page read and write
87F2000
trusted library allocation
page read and write
5C94000
trusted library allocation
page read and write
5C2C000
trusted library allocation
page read and write
6032000
trusted library allocation
page read and write
5C37000
trusted library allocation
page read and write
5BEA000
trusted library allocation
page read and write
5BD9000
trusted library allocation
page read and write
5BB2000
trusted library allocation
page read and write
4C01000
heap
page read and write
5BF6000
trusted library allocation
page read and write
5C2C000
trusted library allocation
page read and write
5BBA000
trusted library allocation
page read and write
614B000
trusted library allocation
page read and write
6030000
trusted library allocation
page read and write
60D8000
trusted library allocation
page read and write
12B0000
direct allocation
page read and write
5C29000
trusted library allocation
page read and write
6034000
trusted library allocation
page read and write
357F000
stack
page read and write
347E000
stack
page read and write
13AC000
heap
page read and write
6036000
trusted library allocation
page read and write
62A8000
trusted library allocation
page read and write
5E30000
trusted library allocation
page read and write
487E000
stack
page read and write
617E000
trusted library allocation
page read and write
5BDA000
trusted library allocation
page read and write
5C47000
trusted library allocation
page read and write
1204000
heap
page read and write
37FF000
stack
page read and write
5BEC000
trusted library allocation
page read and write
6031000
trusted library allocation
page read and write
5220000
direct allocation
page execute and read and write
433F000
stack
page read and write
1204000
heap
page read and write
5BA4000
trusted library allocation
page read and write
5200000
direct allocation
page execute and read and write
6035000
trusted library allocation
page read and write
5BD2000
trusted library allocation
page read and write
62A2000
trusted library allocation
page read and write
5C02000
trusted library allocation
page read and write
615C000
trusted library allocation
page read and write
45FE000
stack
page read and write
958000
unkown
page execute and read and write
5BBA000
trusted library allocation
page read and write
60D1000
trusted library allocation
page read and write
5C7F000
trusted library allocation
page read and write
6E2E000
stack
page read and write
5C31000
trusted library allocation
page read and write
5B97000
trusted library allocation
page read and write
5BD0000
trusted library allocation
page read and write
6034000
trusted library allocation
page read and write
5C2C000
trusted library allocation
page read and write
5C29000
trusted library allocation
page read and write
73C71000
unkown
page execute read
5C2C000
trusted library allocation
page read and write
5C33000
trusted library allocation
page read and write
5CEB000
trusted library allocation
page read and write
6041000
trusted library allocation
page read and write
5B91000
trusted library allocation
page read and write
6143000
trusted library allocation
page read and write
5C27000
trusted library allocation
page read and write
5BDB000
trusted library allocation
page read and write
5220000
direct allocation
page execute and read and write
5BAC000
trusted library allocation
page read and write
5CC9000
stack
page read and write
5C3C000
trusted library allocation
page read and write
5C2C000
trusted library allocation
page read and write
75AE000
stack
page read and write
832F000
stack
page read and write
60DB000
trusted library allocation
page read and write
603C000
trusted library allocation
page read and write
5E03000
trusted library allocation
page read and write
5C23000
trusted library allocation
page read and write
1204000
heap
page read and write
5BA9000
trusted library allocation
page read and write
6034000
trusted library allocation
page read and write
5D63000
trusted library allocation
page read and write
84E0000
direct allocation
page read and write
5B9A000
trusted library allocation
page read and write
5BD2000
trusted library allocation
page read and write
8480000
direct allocation
page read and write
4C01000
heap
page read and write
5220000
direct allocation
page execute and read and write
80AF000
stack
page read and write
5BF2000
trusted library allocation
page read and write
5090000
direct allocation
page read and write
5230000
direct allocation
page execute and read and write
62D7000
trusted library allocation
page read and write
614C000
trusted library allocation
page read and write
5BBA000
trusted library allocation
page read and write
6100000
trusted library allocation
page read and write
5BD9000
trusted library allocation
page read and write
614A000
trusted library allocation
page read and write
13A8000
heap
page read and write
5B91000
trusted library allocation
page read and write
5C37000
trusted library allocation
page read and write
6032000
trusted library allocation
page read and write
8560000
direct allocation
page execute and read and write
5BAE000
trusted library allocation
page read and write
603A000
trusted library allocation
page read and write
6149000
trusted library allocation
page read and write
3FBE000
stack
page read and write
5BC1000
trusted library allocation
page read and write
1204000
heap
page read and write
5BA1000
trusted library allocation
page read and write
612F000
trusted library allocation
page read and write
5E3A000
trusted library allocation
page read and write
670A000
trusted library allocation
page execute and read and write
613B000
trusted library allocation
page read and write
5C3C000
trusted library allocation
page read and write
5EBC000
trusted library allocation
page read and write
60DD000
trusted library allocation
page read and write
5B8E000
stack
page read and write
12B0000
direct allocation
page read and write
13A6000
heap
page read and write
603D000
trusted library allocation
page read and write
5C27000
trusted library allocation
page read and write
5C2D000
trusted library allocation
page read and write
6039000
trusted library allocation
page read and write
5D73000
trusted library allocation
page read and write
603B000
trusted library allocation
page read and write
5BA4000
trusted library allocation
page read and write
60F8000
trusted library allocation
page read and write
5BDB000
trusted library allocation
page read and write
5C1D000
trusted library allocation
page read and write
5BCD000
trusted library allocation
page read and write
5C27000
trusted library allocation
page read and write
1204000
heap
page read and write
4C01000
heap
page read and write
5BCA000
trusted library allocation
page read and write
113B000
stack
page read and write
5BCA000
trusted library allocation
page read and write
5C9D000
trusted library allocation
page read and write
5B97000
trusted library allocation
page read and write
139C000
heap
page read and write
5BF0000
trusted library allocation
page read and write
5B9A000
trusted library allocation
page read and write
620E000
trusted library allocation
page read and write
6036000
trusted library allocation
page read and write
6041000
trusted library allocation
page read and write
5BAE000
trusted library allocation
page read and write
1391000
heap
page read and write
5C61000
trusted library allocation
page read and write
6131000
trusted library allocation
page read and write
1396000
heap
page read and write
1204000
heap
page read and write
5C43000
trusted library allocation
page read and write
1395000
heap
page read and write
5C2C000
trusted library allocation
page read and write
5C18000
trusted library allocation
page read and write
4C01000
heap
page read and write
5B9E000
trusted library allocation
page read and write
393F000
stack
page read and write
5BC7000
trusted library allocation
page read and write
5C0A000
trusted library allocation
page read and write
5E32000
trusted library allocation
page read and write
5BBA000
trusted library allocation
page read and write
5C29000
trusted library allocation
page read and write
3ABE000
stack
page read and write
13AB000
heap
page read and write
139E000
heap
page read and write
5C9B000
trusted library allocation
page read and write
60E6000
trusted library allocation
page read and write
6150000
trusted library allocation
page read and write
6037000
trusted library allocation
page read and write
615E000
trusted library allocation
page read and write
5C52000
trusted library allocation
page read and write
4C00000
heap
page read and write
614B000
trusted library allocation
page read and write
8480000
direct allocation
page read and write
45BF000
stack
page read and write
5C3C000
trusted library allocation
page read and write
6151000
trusted library allocation
page read and write
5B97000
trusted library allocation
page read and write
5BBA000
trusted library allocation
page read and write
6180000
trusted library allocation
page read and write
5C29000
trusted library allocation
page read and write
611E000
trusted library allocation
page read and write
796E000
stack
page read and write
5B9C000
trusted library allocation
page read and write
5C23000
trusted library allocation
page read and write
36BF000
stack
page read and write
658A000
trusted library allocation
page execute and read and write
561D000
stack
page read and write
5BD6000
trusted library allocation
page read and write
5C27000
trusted library allocation
page read and write
5720000
remote allocation
page read and write
8A2C000
stack
page read and write
6115000
trusted library allocation
page read and write
1204000
heap
page read and write
AF2000
unkown
page execute and write copy
603F000
trusted library allocation
page read and write
5BBA000
trusted library allocation
page read and write
742F000
stack
page read and write
307F000
stack
page read and write
5C27000
trusted library allocation
page read and write
139E000
heap
page read and write
1326000
heap
page read and write
4C10000
heap
page read and write
5BCA000
trusted library allocation
page read and write
846F000
stack
page read and write
5090000
direct allocation
page read and write
5720000
remote allocation
page read and write
5C2C000
trusted library allocation
page read and write
61B8000
trusted library allocation
page read and write
4C01000
heap
page read and write
5BB2000
trusted library allocation
page read and write
138B000
heap
page read and write
539D000
stack
page read and write
6032000
trusted library allocation
page read and write
959000
unkown
page execute and write copy
6040000
trusted library allocation
page read and write
5C27000
trusted library allocation
page read and write
5BDC000
trusted library allocation
page read and write
5C07000
trusted library allocation
page read and write
5BDB000
trusted library allocation
page read and write
5BF9000
trusted library allocation
page read and write
5C0A000
trusted library allocation
page read and write
139E000
heap
page read and write
6033000
trusted library allocation
page read and write
138C000
heap
page read and write
5720000
remote allocation
page read and write
5240000
direct allocation
page execute and read and write
7BEE000
stack
page read and write
6033000
trusted library allocation
page read and write
5BAE000
trusted library allocation
page read and write
5B9A000
trusted library allocation
page read and write
6033000
trusted library allocation
page read and write
5C27000
trusted library allocation
page read and write
62AA000
trusted library allocation
page read and write
5C15000
trusted library allocation
page read and write
1204000
heap
page read and write
5B9A000
trusted library allocation
page read and write
6101000
trusted library allocation
page read and write
6129000
stack
page read and write
5C2C000
trusted library allocation
page read and write
6038000
trusted library allocation
page read and write
5220000
direct allocation
page execute and read and write
12B0000
direct allocation
page read and write
6167000
trusted library allocation
page read and write
732E000
stack
page read and write
6580000
trusted library allocation
page read and write
5BE4000
trusted library allocation
page read and write
5C27000
trusted library allocation
page read and write
5C15000
trusted library allocation
page read and write
12B0000
direct allocation
page read and write
6824000
trusted library allocation
page execute and read and write
6035000
trusted library allocation
page read and write
139E000
heap
page read and write
5BA7000
trusted library allocation
page read and write
5C0A000
trusted library allocation
page read and write
5BF5000
trusted library allocation
page read and write
13A4000
heap
page read and write
1200000
heap
page read and write
603D000
trusted library allocation
page read and write
60DD000
trusted library allocation
page read and write
41FF000
stack
page read and write
571E000
stack
page read and write
5C29000
trusted library allocation
page read and write
6032000
trusted library allocation
page read and write
5BDB000
trusted library allocation
page read and write
5BE8000
trusted library allocation
page read and write
73C70000
unkown
page readonly
5BC3000
trusted library allocation
page read and write
5C1A000
trusted library allocation
page read and write
5BDB000
trusted library allocation
page read and write
139B000
heap
page read and write
661000
unkown
page execute and read and write
6B9000
unkown
page execute and read and write
6165000
trusted library allocation
page read and write
5BA1000
trusted library allocation
page read and write
6120000
trusted library allocation
page read and write
5BE8000
trusted library allocation
page read and write
5C29000
trusted library allocation
page read and write
5BBA000
trusted library allocation
page read and write
5BDB000
trusted library allocation
page read and write
746E000
stack
page read and write
522E000
stack
page read and write
5C15000
trusted library allocation
page read and write
7D2E000
stack
page read and write
138E000
heap
page read and write
139A000
heap
page read and write
1204000
heap
page read and write
5BD2000
trusted library allocation
page read and write
12B0000
direct allocation
page read and write
5BAF000
trusted library allocation
page read and write
4C01000
heap
page read and write
4C01000
heap
page read and write
6586000
trusted library allocation
page read and write
1373000
heap
page read and write
5C33000
trusted library allocation
page read and write
12F7000
heap
page read and write
61A8000
trusted library allocation
page read and write
8480000
direct allocation
page read and write
1204000
heap
page read and write
5B9A000
trusted library allocation
page read and write
61AA000
trusted library allocation
page read and write
60D3000
trusted library allocation
page read and write
5C29000
trusted library allocation
page read and write
8480000
direct allocation
page read and write
6040000
trusted library allocation
page read and write
60DF000
trusted library allocation
page read and write
6F2F000
stack
page read and write
6031000
trusted library allocation
page read and write
9FD0000
trusted library allocation
page read and write
13AC000
heap
page read and write
1204000
heap
page read and write
5B9A000
trusted library allocation
page read and write
5C15000
trusted library allocation
page read and write
5BEA000
trusted library allocation
page read and write
5BDB000
trusted library allocation
page read and write
6030000
trusted library allocation
page read and write
5C2C000
trusted library allocation
page read and write
5C2C000
trusted library allocation
page read and write
578E000
stack
page read and write
5C9A000
trusted library allocation
page read and write
5C27000
trusted library allocation
page read and write
60D9000
trusted library allocation
page read and write
6037000
trusted library allocation
page read and write
11EE000
stack
page read and write
13AC000
heap
page read and write
51F0000
direct allocation
page execute and read and write
31FE000
stack
page read and write
5BA4000
trusted library allocation
page read and write
62C0000
direct allocation
page read and write
76AF000
stack
page read and write
84E0000
direct allocation
page read and write
483F000
stack
page read and write
13AC000
heap
page read and write
59FF000
stack
page read and write
5BF1000
trusted library allocation
page read and write
4C01000
heap
page read and write
8480000
direct allocation
page read and write
5C29000
trusted library allocation
page read and write
58FE000
stack
page read and write
756F000
stack
page read and write
5BA9000
trusted library allocation
page read and write
5C3D000
trusted library allocation
page read and write
5C27000
trusted library allocation
page read and write
5C07000
trusted library allocation
page read and write
5C27000
trusted library allocation
page read and write
1204000
heap
page read and write
94A000
unkown
page execute and read and write
614A000
trusted library allocation
page read and write
12C0000
heap
page read and write
60D5000
trusted library allocation
page read and write
AF1000
unkown
page execute and read and write
4C01000
heap
page read and write
5C12000
trusted library allocation
page read and write
6194000
trusted library allocation
page read and write
46FF000
stack
page read and write
72EF000
stack
page read and write
5BA4000
trusted library allocation
page read and write
603B000
trusted library allocation
page read and write
6231000
trusted library allocation
page read and write
5BBA000
trusted library allocation
page read and write
5C27000
trusted library allocation
page read and write
5C21000
trusted library allocation
page read and write
692F000
stack
page read and write
5BBA000
trusted library allocation
page read and write
5BA8000
trusted library allocation
page read and write
6035000
trusted library allocation
page read and write
5C0A000
trusted library allocation
page read and write
1393000
heap
page read and write
626B000
stack
page read and write
77EF000
stack
page read and write
6111000
trusted library allocation
page read and write
5BB2000
trusted library allocation
page read and write
5BBD000
trusted library allocation
page read and write
4C01000
heap
page read and write
5250000
direct allocation
page execute and read and write
62A0000
trusted library allocation
page read and write
5C29000
trusted library allocation
page read and write
6169000
trusted library allocation
page read and write
61CA000
trusted library allocation
page read and write
5C1B000
trusted library allocation
page read and write
4C01000
heap
page read and write
5C18000
trusted library allocation
page read and write
13AC000
heap
page read and write
5C2C000
trusted library allocation
page read and write
2F30000
heap
page read and write
5C22000
trusted library allocation
page read and write
6B6F000
stack
page read and write
6813000
trusted library allocation
page execute and read and write
5C3C000
trusted library allocation
page read and write
5BFB000
trusted library allocation
page read and write
437E000
stack
page read and write
62CB000
trusted library allocation
page read and write
782E000
stack
page read and write
5C29000
trusted library allocation
page read and write
5BDB000
trusted library allocation
page read and write
1305000
heap
page read and write
8480000
direct allocation
page read and write
1204000
heap
page read and write
4C01000
heap
page read and write
138E000
heap
page read and write
5BAB000
trusted library allocation
page read and write
1204000
heap
page read and write
839000
unkown
page execute and read and write
5B91000
trusted library allocation
page read and write
5C02000
trusted library allocation
page read and write
497F000
stack
page read and write
6261000
trusted library allocation
page read and write
60D3000
trusted library allocation
page read and write
6030000
trusted library allocation
page read and write
5C2C000
trusted library allocation
page read and write
5BCA000
trusted library allocation
page read and write
5BCA000
trusted library allocation
page read and write
6164000
trusted library allocation
page read and write
836E000
stack
page read and write
6034000
trusted library allocation
page read and write
5BA4000
trusted library allocation
page read and write
35BE000
stack
page read and write
5C2C000
trusted library allocation
page read and write
5BFB000
trusted library allocation
page read and write
5C2C000
trusted library allocation
page read and write
616D000
trusted library allocation
page read and write
5BF2000
trusted library allocation
page read and write
6114000
trusted library allocation
page read and write
615D000
trusted library allocation
page read and write
6A6E000
stack
page read and write
61DB000
trusted library allocation
page read and write
8480000
direct allocation
page read and write
645A000
trusted library allocation
page read and write
5BBA000
trusted library allocation
page read and write
5C9C000
trusted library allocation
page read and write
139D000
heap
page read and write
5EBA000
trusted library allocation
page read and write
5C29000
trusted library allocation
page read and write
6153000
trusted library allocation
page read and write
61FC000
trusted library allocation
page read and write
5C29000
trusted library allocation
page read and write
4C01000
heap
page read and write
5BD9000
trusted library allocation
page read and write
139E000
heap
page read and write
139E000
heap
page read and write
6036000
trusted library allocation
page read and write
5BD9000
trusted library allocation
page read and write
5090000
direct allocation
page read and write
610F000
trusted library allocation
page read and write
139B000
heap
page read and write
6141000
trusted library allocation
page read and write
397E000
stack
page read and write
5C2D000
trusted library allocation
page read and write
5BDB000
trusted library allocation
page read and write
603D000
trusted library allocation
page read and write
5BAE000
trusted library allocation
page read and write
12B0000
direct allocation
page read and write
614F000
trusted library allocation
page read and write
8530000
direct allocation
page execute and read and write
62D9000
trusted library allocation
page read and write
4C01000
heap
page read and write
5C02000
trusted library allocation
page read and write
5C40000
trusted library allocation
page read and write
6191000
trusted library allocation
page read and write
5C29000
trusted library allocation
page read and write
1170000
heap
page read and write
30BE000
stack
page read and write
5BE4000
trusted library allocation
page read and write
5C4B000
trusted library allocation
page read and write
7F6F000
stack
page read and write
5C0A000
trusted library allocation
page read and write
5BAA000
trusted library allocation
page read and write
5BC7000
trusted library allocation
page read and write
5C27000
trusted library allocation
page read and write
5050000
heap
page read and write
913000
unkown
page execute and read and write
5C2C000
trusted library allocation
page read and write
3E7E000
stack
page read and write
5C29000
trusted library allocation
page read and write
5C02000
trusted library allocation
page read and write
8480000
direct allocation
page read and write
6572000
trusted library allocation
page read and write
5B91000
trusted library allocation
page read and write
5C23000
trusted library allocation
page read and write
6037000
trusted library allocation
page read and write
6034000
trusted library allocation
page read and write
139F000
heap
page read and write
611C000
trusted library allocation
page read and write
6035000
trusted library allocation
page read and write
5BC1000
trusted library allocation
page read and write
5BCA000
trusted library allocation
page read and write
12B0000
direct allocation
page read and write
5210000
direct allocation
page execute and read and write
168F000
stack
page read and write
6039000
trusted library allocation
page read and write
5C27000
trusted library allocation
page read and write
5B91000
trusted library allocation
page read and write
12B0000
direct allocation
page read and write
661000
unkown
page execute and write copy
5C29000
trusted library allocation
page read and write
60EA000
trusted library allocation
page read and write
5C27000
trusted library allocation
page read and write
5C0A000
trusted library allocation
page read and write
5BD2000
trusted library allocation
page read and write
6034000
trusted library allocation
page read and write
5BD2000
trusted library allocation
page read and write
5C26000
trusted library allocation
page read and write
614E000
trusted library allocation
page read and write
87FA000
trusted library allocation
page read and write
6032000
trusted library allocation
page read and write
473E000
stack
page read and write
603A000
trusted library allocation
page read and write
7E6E000
stack
page read and write
5BBF000
trusted library allocation
page read and write
617F000
trusted library allocation
page read and write
5CB3000
trusted library allocation
page read and write
5BF9000
trusted library allocation
page read and write
5BCA000
trusted library allocation
page read and write
6034000
trusted library allocation
page read and write
6105000
trusted library allocation
page read and write
5C2B000
trusted library allocation
page read and write
5C7F000
trusted library allocation
page read and write
5CCB000
trusted library allocation
page read and write
603F000
trusted library allocation
page read and write
5BC7000
trusted library allocation
page read and write
5BAC000
trusted library allocation
page read and write
13A1000
heap
page read and write
60F3000
trusted library allocation
page read and write
5B91000
trusted library allocation
page read and write
5B9D000
trusted library allocation
page read and write
5D3B000
trusted library allocation
page read and write
50D4000
direct allocation
page read and write
5BF7000
trusted library allocation
page read and write
706F000
stack
page read and write
139E000
heap
page read and write
5A8E000
stack
page read and write
5220000
direct allocation
page execute and read and write
6263000
trusted library allocation
page read and write
12CE000
heap
page read and write
5BF1000
trusted library allocation
page read and write
5BA4000
trusted library allocation
page read and write
71AF000
stack
page read and write
5C29000
trusted library allocation
page read and write
7CEF000
stack
page read and write
8C6E000
stack
page read and write
4C01000
heap
page read and write
3E3F000
stack
page read and write
60EE000
trusted library allocation
page read and write
6204000
trusted library allocation
page read and write
6114000
trusted library allocation
page read and write
50DB000
stack
page read and write
6CAF000
stack
page read and write
5BA1000
trusted library allocation
page read and write
5C29000
trusted library allocation
page read and write
5C52000
trusted library allocation
page read and write
5C65000
trusted library allocation
page read and write
660000
unkown
page readonly
5C29000
trusted library allocation
page read and write
3D3E000
stack
page read and write
6F6E000
stack
page read and write
5E76000
trusted library allocation
page read and write
7BAF000
stack
page read and write
5BCA000
trusted library allocation
page read and write
1391000
heap
page read and write
13AC000
heap
page read and write
12B0000
direct allocation
page read and write
5BD9000
trusted library allocation
page read and write
447F000
stack
page read and write
5BDE000
trusted library allocation
page read and write
5BF2000
trusted library allocation
page read and write
5BD4000
trusted library allocation
page read and write
70AE000
stack
page read and write
549D000
stack
page read and write
5C26000
trusted library allocation
page read and write
5BB2000
trusted library allocation
page read and write
1332000
heap
page read and write
5BA1000
trusted library allocation
page read and write
5BFA000
trusted library allocation
page read and write
822E000
stack
page read and write
5BE3000
trusted library allocation
page read and write
8570000
heap
page read and write
5C29000
trusted library allocation
page read and write
137F000
heap
page read and write
5B9D000
trusted library allocation
page read and write
5C7F000
trusted library allocation
page read and write
6032000
trusted library allocation
page read and write
5D1E000
stack
page read and write
6206000
trusted library allocation
page read and write
60FE000
trusted library allocation
page read and write
603E000
trusted library allocation
page read and write
5C3C000
trusted library allocation
page read and write
12B0000
direct allocation
page read and write
13A8000
heap
page read and write
5BDB000
trusted library allocation
page read and write
5C67000
trusted library allocation
page read and write
60F6000
trusted library allocation
page read and write
62CD000
trusted library allocation
page read and write
6036000
trusted library allocation
page read and write
6563000
trusted library allocation
page read and write
5BD9000
trusted library allocation
page read and write
5C3D000
trusted library allocation
page read and write
5BCA000
trusted library allocation
page read and write
5C02000
trusted library allocation
page read and write
5C29000
trusted library allocation
page read and write
5BDB000
trusted library allocation
page read and write
6A2F000
stack
page read and write
603A000
trusted library allocation
page read and write
7E2F000
stack
page read and write
6117000
trusted library allocation
page read and write
1390000
heap
page read and write
333E000
stack
page read and write
40BF000
stack
page read and write
5C15000
trusted library allocation
page read and write
5C45000
trusted library allocation
page read and write
5B90000
trusted library allocation
page read and write
5C02000
trusted library allocation
page read and write
615B000
trusted library allocation
page read and write
603F000
trusted library allocation
page read and write
5C18000
trusted library allocation
page read and write
60E8000
trusted library allocation
page read and write
6151000
trusted library allocation
page read and write
76EE000
stack
page read and write
84E0000
direct allocation
page read and write
5C2D000
trusted library allocation
page read and write
6A5000
unkown
page execute and read and write
5C18000
trusted library allocation
page read and write
2F7C000
stack
page read and write
3BBF000
stack
page read and write
5E79000
trusted library allocation
page read and write
792F000
stack
page read and write
6041000
trusted library allocation
page read and write
5BAD000
trusted library allocation
page read and write
8480000
trusted library allocation
page read and write
62AE000
stack
page read and write
4C01000
heap
page read and write
6037000
trusted library allocation
page read and write
6030000
trusted library allocation
page read and write
31BF000
stack
page read and write
603B000
trusted library allocation
page read and write
61B6000
trusted library allocation
page read and write
5BAB000
trusted library allocation
page read and write
617D000
trusted library allocation
page read and write
2F2F000
stack
page read and write
13A8000
heap
page read and write
32FF000
stack
page read and write
617A000
trusted library allocation
page read and write
5BDB000
trusted library allocation
page read and write
7AAE000
stack
page read and write
5C29000
trusted library allocation
page read and write
7A6F000
stack
page read and write
5A43000
heap
page read and write
5BCA000
trusted library allocation
page read and write
4C01000
heap
page read and write
5BDB000
trusted library allocation
page read and write
1204000
heap
page read and write
6822000
trusted library allocation
page execute and read and write
6038000
trusted library allocation
page read and write
5B9B000
trusted library allocation
page read and write
71EE000
stack
page read and write
13A8000
heap
page read and write
6039000
trusted library allocation
page read and write
5BD8000
trusted library allocation
page read and write
5BF6000
trusted library allocation
page read and write
4C01000
heap
page read and write
5BDB000
trusted library allocation
page read and write
6039000
trusted library allocation
page read and write
6149000
trusted library allocation
page read and write
940000
unkown
page execute and read and write
3F7F000
stack
page read and write
6DEF000
stack
page read and write
5C2C000
trusted library allocation
page read and write
73C86000
unkown
page execute and read and write
5BC1000
trusted library allocation
page read and write
535C000
stack
page read and write
3BFE000
stack
page read and write
4C01000
heap
page read and write
158E000
stack
page read and write
623F000
trusted library allocation
page read and write
5C29000
trusted library allocation
page read and write
5BD9000
trusted library allocation
page read and write
5C2C000
trusted library allocation
page read and write
5BBA000
trusted library allocation
page read and write
603E000
trusted library allocation
page read and write
6B7000
unkown
page read and write
1349000
heap
page read and write
6032000
trusted library allocation
page read and write
5C2C000
trusted library allocation
page read and write
5C21000
trusted library allocation
page read and write
5C29000
trusted library allocation
page read and write
6B7000
unkown
page write copy
8480000
direct allocation
page read and write
5B97000
trusted library allocation
page read and write
5C29000
trusted library allocation
page read and write
5BB2000
trusted library allocation
page read and write
6032000
trusted library allocation
page read and write
5BD9000
trusted library allocation
page read and write
60EC000
trusted library allocation
page read and write
5BDE000
trusted library allocation
page read and write
5C27000
trusted library allocation
page read and write
5C26000
trusted library allocation
page read and write
13A8000
heap
page read and write
1204000
heap
page read and write
958000
unkown
page execute and write copy
5C37000
trusted library allocation
page read and write
6039000
trusted library allocation
page read and write
617C000
trusted library allocation
page read and write
618F000
trusted library allocation
page read and write
423E000
stack
page read and write
44BE000
stack
page read and write
5C27000
trusted library allocation
page read and write
12A0000
heap
page read and write
73C8D000
unkown
page read and write
1391000
heap
page read and write
5C1B000
trusted library allocation
page read and write
5C94000
trusted library allocation
page read and write
5C3C000
trusted library allocation
page read and write
5C29000
trusted library allocation
page read and write
8480000
direct allocation
page read and write
5269000
trusted library allocation
page read and write
5BC6000
trusted library allocation
page read and write
There are 924 hidden memdumps, click here to show them.

DOM / HTML

URL
Malicious
https://learn.microsoft.com/en-us/dotnet/framework/install/application-not-started?version=(null)&processName=file.exe&platform=0009&osver=6&isServer=0&shimver=4.0.30319.0
https://learn.microsoft.com/en-us/dotnet/framework/install/application-not-started?version=(null)&processName=file.exe&platform=0009&osver=6&isServer=0&shimver=4.0.30319.0
https://learn.microsoft.com/en-us/dotnet/framework/install/application-not-started?version=(null)&processName=file.exe&platform=0009&osver=6&isServer=0&shimver=4.0.30319.0
https://learn.microsoft.com/en-us/dotnet/framework/install/application-not-started?version=(null)&processName=file.exe&platform=0009&osver=6&isServer=0&shimver=4.0.30319.0
https://learn.microsoft.com/en-us/dotnet/framework/install/application-not-started?version=(null)&processName=file.exe&platform=0009&osver=6&isServer=0&shimver=4.0.30319.0