
"iexplore.exe" wrote bytes "401c4af4fe070000" to virtual address "0x770229A8" (part of module "USER32.DLL") "iexplore.exe" wrote bytes "50694ef4fe070000" to virtual address "0xF51440E0" (part of module "IEFRAME.DLL")

"iexplore.exe" wrote bytes "401c4af4fe070000" to virtual address "0xFDFE05A8" (part of module "OLEAUT32.DLL") "iexplore.exe" wrote bytes "00ef4af4fe070000" to virtual address "0xFE451F30" (part of module "SHEL元2.DLL") "iexplore.exe" wrote bytes "00ef4af4fe070000" to virtual address "0xFB7018D0" (part of module "COMCT元2.DLL") "iexplore.exe" wrote bytes "40684ef4fe070000" to virtual address "0xFF2D5748" (part of module "SHLWAPI.DLL") "iexplore.exe" wrote bytes "b0624ef4fe070000" to virtual address "0xFEF2BE80" (part of module "OLE32.DLL") "iexplore.exe" wrote bytes "00ef4af4fe070000" to virtual address "0xFDFE0A30" (part of module "OLEAUT32.DLL") "iexplore.exe" wrote bytes "401c4af4fe070000" to virtual address "0xFF2D5348" (part of module "SHLWAPI.DLL") "iexplore.exe" wrote bytes "b0624ef4fe070000" to virtual address "0xFE451C30" (part of module "SHEL元2.DLL") "iexplore.exe" wrote bytes "50074cf4fe070000" to virtual address "0xFE451ED8" (part of module "SHEL元2.DLL") "iexplore.exe" wrote bytes "50074cf4fe070000" to virtual address "0xF5143E58" (part of module "IEFRAME.DLL") "iexplore.exe" wrote bytes "401c4af4fe070000" to virtual address "0xFC0F6098" (part of module "VERSION.DLL") "iexplore.exe" wrote bytes "401c4af4fe070000" to virtual address "0xFB2FF378" (part of module "UXTHEME.DLL") "iexplore.exe" wrote bytes "00ef4af4fe070000" to virtual address "0xFEF2BC38" (part of module "OLE32.DLL") "iexplore.exe" wrote bytes "b0624ef4fe070000" to virtual address "0xFF2D55B8" (part of module "SHLWAPI.DLL") "favicon_5_.ico" has type "PNG image data 16 x 16 4-bit colormap non-interlaced" "_F2B05EA4-5A4F-11EA-8F90-3C0027B0F69C_.dat" has type "Composite Document File V2 Document Cannot read section info" "ctpAlert_1_.css" has type "UTF-8 Unicode (with BOM) text with CRLF line terminators" "search_1_.json" has type "ASCII text with no line terminators" "favicon_6_.ico" has type "PNG image data 16 x 16 4-bit colormap non-interlaced" "RecoveryStore._EB92DA0D-5A4F-11EA-8F90-3C0027B0F69C_.dat" has type "Composite Document File V2 Document Cannot read section info" "\Sessions\1\BaseNamedObjects\IsoScope_e34_ConnHashTable_HashTable_Mutex" "\Sessions\1\BaseNamedObjects\IsoScope_e34_IE_EarlyTabStart_0x8d8_Mutex" "\Sessions\1\BaseNamedObjects\Local\ZonesLockedCacheCounterMutex" "\Sessions\1\BaseNamedObjects\Local\ZonesCacheCounterMutex" "\Sessions\1\BaseNamedObjects\Local\URLBLOCK_DOWNLOAD_MUTEX" "\Sessions\1\BaseNamedObjects\Local\URLBLOCK_HASHFILESWITCH_MUTEX"

"\Sessions\1\BaseNamedObjects\Local\URLBLOCK_FILEMAPSWITCH_MUTEX_3636"

"\Sessions\1\BaseNamedObjects\Local\VERMGMTBlockListFileMutex" "\Sessions\1\BaseNamedObjects\Local\!BrowserEmulation!SharedMemory!Mutex" Sends traffic on typical HTTP outbound port, but without HTTP header Found malicious artifacts related to "34.218.82.73".
