Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
file.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
initial sample
|
||
Chrome Cache Entry: 100
|
JPEG image data, JFIF standard 1.01, aspect ratio, density 1x1, segment length 16, progressive, precision 8, 1301x300, components
3
|
downloaded
|
||
Chrome Cache Entry: 101
|
ASCII text, with very long lines (46884)
|
dropped
|
||
Chrome Cache Entry: 102
|
ASCII text
|
dropped
|
||
Chrome Cache Entry: 103
|
SVG Scalable Vector Graphics image
|
downloaded
|
||
Chrome Cache Entry: 104
|
Web Open Font Format (Version 2), TrueType, length 19696, version 1.0
|
downloaded
|
||
Chrome Cache Entry: 105
|
ASCII text, with very long lines (33148), with no line terminators
|
downloaded
|
||
Chrome Cache Entry: 106
|
PNG image data, 475 x 212, 8-bit/color RGBA, non-interlaced
|
dropped
|
||
Chrome Cache Entry: 107
|
PNG image data, 658 x 480, 8-bit/color RGBA, non-interlaced
|
dropped
|
||
Chrome Cache Entry: 108
|
JSON data
|
dropped
|
||
Chrome Cache Entry: 109
|
HTML document, ASCII text, with very long lines (639), with CRLF, LF line terminators
|
downloaded
|
||
Chrome Cache Entry: 110
|
JSON data
|
downloaded
|
||
Chrome Cache Entry: 111
|
PNG image data, 533 x 478, 8-bit/color RGBA, non-interlaced
|
dropped
|
||
Chrome Cache Entry: 70
|
PNG image data, 533 x 478, 8-bit/color RGBA, non-interlaced
|
dropped
|
||
Chrome Cache Entry: 71
|
PNG image data, 533 x 478, 8-bit/color RGBA, non-interlaced
|
downloaded
|
||
Chrome Cache Entry: 72
|
SVG Scalable Vector Graphics image
|
dropped
|
||
Chrome Cache Entry: 73
|
JSON data
|
dropped
|
||
Chrome Cache Entry: 74
|
PNG image data, 533 x 478, 8-bit/color RGBA, non-interlaced
|
dropped
|
||
Chrome Cache Entry: 75
|
ASCII text, with very long lines (65536), with no line terminators
|
downloaded
|
||
Chrome Cache Entry: 76
|
ASCII text, with no line terminators
|
downloaded
|
||
Chrome Cache Entry: 77
|
ASCII text, with very long lines (65410)
|
dropped
|
||
Chrome Cache Entry: 78
|
JSON data
|
dropped
|
||
Chrome Cache Entry: 79
|
ASCII text, with very long lines (65410)
|
downloaded
|
||
Chrome Cache Entry: 80
|
JSON data
|
downloaded
|
||
Chrome Cache Entry: 81
|
PNG image data, 533 x 478, 8-bit/color RGBA, non-interlaced
|
downloaded
|
||
Chrome Cache Entry: 82
|
ASCII text, with very long lines (52717), with no line terminators
|
dropped
|
||
Chrome Cache Entry: 83
|
ASCII text
|
downloaded
|
||
Chrome Cache Entry: 84
|
ASCII text, with very long lines (52717), with no line terminators
|
downloaded
|
||
Chrome Cache Entry: 85
|
exported SGML document, ASCII text, with very long lines (65536), with no line terminators
|
downloaded
|
||
Chrome Cache Entry: 86
|
JPEG image data, JFIF standard 1.01, aspect ratio, density 1x1, segment length 16, progressive, precision 8, 1301x300, components
3
|
dropped
|
||
Chrome Cache Entry: 87
|
PNG image data, 533 x 478, 8-bit/color RGBA, non-interlaced
|
downloaded
|
||
Chrome Cache Entry: 88
|
MS Windows icon resource - 6 icons, -128x-128, 16 colors, 72x72, 16 colors
|
downloaded
|
||
Chrome Cache Entry: 89
|
ASCII text, with very long lines (46884)
|
downloaded
|
||
Chrome Cache Entry: 90
|
JSON data
|
dropped
|
||
Chrome Cache Entry: 91
|
MS Windows icon resource - 6 icons, -128x-128, 16 colors, 72x72, 16 colors
|
dropped
|
||
Chrome Cache Entry: 92
|
PNG image data, 658 x 480, 8-bit/color RGBA, non-interlaced
|
downloaded
|
||
Chrome Cache Entry: 93
|
ASCII text, with very long lines (33148), with no line terminators
|
dropped
|
||
Chrome Cache Entry: 94
|
JSON data
|
downloaded
|
||
Chrome Cache Entry: 95
|
PNG image data, 475 x 212, 8-bit/color RGBA, non-interlaced
|
downloaded
|
||
Chrome Cache Entry: 96
|
JSON data
|
downloaded
|
||
Chrome Cache Entry: 97
|
JSON data
|
dropped
|
||
Chrome Cache Entry: 98
|
JSON data
|
dropped
|
||
Chrome Cache Entry: 99
|
exported SGML document, ASCII text, with very long lines (65536), with no line terminators
|
dropped
|
There are 33 hidden files, click here to show them.
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\file.exe
|
"C:\Users\user\Desktop\file.exe"
|
||
C:\Program Files\Google\Chrome\Application\chrome.exe
|
"C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized --single-argument http://go.microsoft.com/fwlink/?prd=11324&pver=4.5&sbp=AppLaunch2&plcid=0x409&o1=SHIM_NOVERSION_FOUND&version=(null)&processName=file.exe&platform=0009&osver=6&isServer=0&shimver=4.0.30319.0
|
||
C:\Program Files\Google\Chrome\Application\chrome.exe
|
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US
--service-sandbox-type=none --mojo-platform-channel-handle=2456 --field-trial-handle=2388,i,17003217840531008037,10136595972546319066,262144
--disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction
/prefetch:8
|
||
C:\Program Files\Google\Chrome\Application\chrome.exe
|
"C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized --single-argument http://go.microsoft.com/fwlink/?prd=11324&pver=4.5&sbp=AppLaunch2&plcid=0x409&o1=SHIM_NOVERSION_FOUND&version=(null)&processName=file.exe&platform=0009&osver=6&isServer=0&shimver=4.0.30319.0
|
||
C:\Program Files\Google\Chrome\Application\chrome.exe
|
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US
--service-sandbox-type=none --mojo-platform-channel-handle=2028 --field-trial-handle=1952,i,10276600850100983597,11233374651624369468,262144
--disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction
/prefetch:8
|
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
https://authoring-docs-microsoft.poolparty.biz/devrel/7696cda6-0510-47f6-8302-71bb5d2e28cf
|
unknown
|
||
https://duckduckgo.com/chrome_newtab
|
unknown
|
||
https://duckduckgo.com/ac/?q=
|
unknown
|
||
http://185.215.113.16/off/def.exe~81
|
unknown
|
||
https://cook-rain.sbs/apirG
|
unknown
|
||
https://github.com/dotnet/docs/blob/17c4acca45e573a92878a44a2cce57d699fe9c7c/docs/framework/install/
|
unknown
|
||
https://bridge.lga1.admarketplace.net/ctp?version=16.0.0&key=1696332238301000001.2&ci=1696332238417.
|
unknown
|
||
http://185.215.113.16/steam/random.exep
|
unknown
|
||
https://www.linkedin.com/cws/share?url=$
|
unknown
|
||
https://cook-rain.sbs/apiwF
|
unknown
|
||
https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
|
unknown
|
||
https://cook-rain.sbs/apiJ
|
unknown
|
||
https://cook-rain.sbs/t_stat
|
unknown
|
||
https://support.office.com/article/94ba2e0b-638e-4a92-8857-2cb5ac1d8e17
|
unknown
|
||
https://github.com/Youssef1313
|
unknown
|
||
https://management.azure.com/providers/Microsoft.Portal/userSettings/cloudconsole?api-version=2023-0
|
unknown
|
||
https://aka.ms/msignite_docs_banner
|
unknown
|
||
https://videoencodingpublic-hgeaeyeba8gycee3.b01.azurefd.net/public-b4da8140-92cf-421c-8b7b-e471d5b9
|
unknown
|
||
peepburry828.sbs
|
|||
http://polymer.github.io/AUTHORS.txt
|
unknown
|
||
https://github.com/dotnet/docs/issues/new?template=z-customer-feedback.yml
|
unknown
|
||
https://management.azure.com/subscriptions?api-version=2016-06-01
|
unknown
|
||
https://cook-rain.sbs/api%F
|
unknown
|
||
https://github.com/dotnet/docs/blob/main/docs/framework/install/application-not-started.md
|
unknown
|
||
https://imp.mt48.net/static?id=7RHzfOIXjFEYsBdvIpkX4QqmfZfYfQfafZbXfpbWfpbX7ReNxR3UIG8zInwYIFIVs9eYi
|
unknown
|
||
http://x1.c.lencr.org/0
|
unknown
|
||
http://x1.i.lencr.org/0
|
unknown
|
||
https://aka.ms/pshelpmechoose
|
unknown
|
||
https://aka.ms/feedback/report?space=61
|
unknown
|
||
https://support.office.com/article/94ba2e0b-638e-4a92-8857-2cb5ac1d8e17Install
|
unknown
|
||
https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
|
unknown
|
||
https://cook-rain.Xr
|
unknown
|
||
https://learn-video.azurefd.net/vod/player
|
unknown
|
||
p10tgrace.sbs
|
|||
https://twitter.com/intent/tweet?original_referer=$
|
unknown
|
||
https://github.com/gewarren
|
unknown
|
||
http://185.215.113.16/off/def.exepleWebKit/537.36
|
unknown
|
||
https://support.mozilla.org/products/firefoxgro.all
|
unknown
|
||
http://polymer.github.io/CONTRIBUTORS.txt
|
unknown
|
||
https://www.amazon.com/?tag=admarketus-20&ref=pd_sl_7548d4575af019e4c148ccf1a78112802e66a0816a72fc94
|
unknown
|
||
processhol.sbs
|
|||
https://github.com/dotnet/docs/blob/live/docs/framework/install/application-not-started.md
|
unknown
|
||
https://authoring-docs-microsoft.poolparty.biz/devrel/69c76c32-967e-4c65-b89a-74cc527db725
|
unknown
|
||
https://client-api.arkoselabs.com/v2/api.js
|
unknown
|
||
https://aka.ms/MSIgniteChallenge/Tier1Banner?wt.mc_id=ignite24_learnbanner_tier1_cnl
|
unknown
|
||
https://contile-images.services.mozilla.com/0TegrVVRalreHILhR2WvtD_CFzj13HCDcLqqpvXSOuY.10862.jpg
|
unknown
|
||
https://management.azure.com/providers/Microsoft.Portal/consoles/default?api-version=2017-12-01-prev
|
unknown
|
||
https://www.google.com/images/branding/product/ico/googleg_lodp.ico
|
unknown
|
||
https://github.com/Thraka
|
unknown
|
||
https://cook-rain.sbs/api
|
188.114.96.3
|
||
http://crl.microH
|
unknown
|
||
https://cook-rain.sbs/NF
|
unknown
|
||
http://polymer.github.io/PATENTS.txt
|
unknown
|
||
https://aka.ms/certhelp
|
unknown
|
||
http://185.215.113.16/steam/random.exe
|
unknown
|
||
https://cook-rain.sbs/
|
unknown
|
||
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
|
unknown
|
||
http://crl.rootca1.amazontrust.com/rootca1.crl0
|
unknown
|
||
https://bridge.lga1.ap01.net/ctp?version=16.0.0&key=1696332238301000001.1&ci=1696332238417.12791&cta
|
unknown
|
||
https://github.com/mairaw
|
unknown
|
||
https://js.monitor.azure.com/scripts/c/ms.jsll-4.min.js
|
13.107.246.45
|
||
http://ocsp.rootca1.amazontrust.com0:
|
unknown
|
||
https://support.office.com/article/7D48285B-20E8-4B9B-91AD-216E34163BAD?wt.mc_id=EnterPK2016
|
unknown
|
||
https://schema.org
|
unknown
|
||
p3ar11fter.sbs
|
|||
http://polymer.github.io/LICENSE.txt
|
unknown
|
||
https://cook-rain.sbs/e48
|
unknown
|
||
https://www.ecosia.org/newtab/
|
unknown
|
||
https://support.mozilla.org/kb/customize-firefox-controls-buttons-and-toolbars?utm_source=firefox-br
|
unknown
|
||
https://aka.ms/yourcaliforniaprivacychoices
|
unknown
|
||
https://ac.ecosia.org/autocomplete?q=
|
unknown
|
||
https://github.com/nschonni
|
unknown
|
||
http://185.215.113.16/
|
unknown
|
||
https://videoencodingpublic-hgeaeyeba8gycee3.b01.azurefd.net/public-09ce73a6-05a5-4e4d-b3d7-bd5a8c05
|
unknown
|
||
https://github.com/adegeo
|
unknown
|
||
http://185.215.113.16/off/def.exed4f
|
unknown
|
||
https://contile-images.services.mozilla.com/obgoOYObjIFea_bXuT6L4LbBJ8j425AD87S1HMD3BWg.9991.jpg
|
unknown
|
||
https://support.microsof
|
unknown
|
||
https://github.com/jonschlinkert/is-plain-object
|
unknown
|
||
http://crt.rootca1.amazontrust.com/rootca1.cer0?
|
unknown
|
||
https://octokit.github.io/rest.js/#throttling
|
unknown
|
||
https://github.com/js-cookie/js-cookie
|
unknown
|
||
http://185.215.113.16/off/def.exe
|
unknown
|
||
http://schema.org/Organization
|
unknown
|
||
https://support.office.com/article/7D48285B-20E8-4B9B-91AD-216E34163BAD?wt.mc_id=EnterPK2016Examples
|
unknown
|
||
https://channel9.msdn.com/
|
unknown
|
||
https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
|
unknown
|
||
https://github.com/dotnet/try
|
unknown
|
There are 78 hidden URLs, click here to show them.
Domains
Name
|
IP
|
Malicious
|
|
---|---|---|---|
cook-rain.sbs
|
188.114.96.3
|
||
s-part-0017.t-0009.t-msedge.net
|
13.107.246.45
|
||
www.google.com
|
142.250.186.68
|
||
js.monitor.azure.com
|
unknown
|
||
mdec.nelreports.net
|
unknown
|
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
192.168.2.4
|
unknown
|
unknown
|
||
142.250.186.68
|
www.google.com
|
United States
|
||
13.107.246.45
|
s-part-0017.t-0009.t-msedge.net
|
United States
|
||
185.215.113.16
|
unknown
|
Portugal
|
||
239.255.255.250
|
unknown
|
Reserved
|
||
188.114.96.3
|
cook-rain.sbs
|
European Union
|
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
50D0000
|
heap
|
page read and write
|
||
47CE000
|
stack
|
page read and write
|
||
5E5B000
|
trusted library allocation
|
page read and write
|
||
608A000
|
trusted library allocation
|
page read and write
|
||
608B000
|
trusted library allocation
|
page read and write
|
||
FEB000
|
unkown
|
page execute and write copy
|
||
5C52000
|
trusted library allocation
|
page read and write
|
||
414F000
|
stack
|
page read and write
|
||
6083000
|
trusted library allocation
|
page read and write
|
||
8570000
|
direct allocation
|
page read and write
|
||
5C05000
|
trusted library allocation
|
page read and write
|
||
5C06000
|
trusted library allocation
|
page read and write
|
||
5C0D000
|
trusted library allocation
|
page read and write
|
||
5280000
|
direct allocation
|
page execute and read and write
|
||
171C000
|
heap
|
page read and write
|
||
360F000
|
stack
|
page read and write
|
||
608F000
|
trusted library allocation
|
page read and write
|
||
8570000
|
direct allocation
|
page read and write
|
||
1728000
|
heap
|
page read and write
|
||
6D3F000
|
stack
|
page read and write
|
||
1444000
|
heap
|
page read and write
|
||
5BEA000
|
trusted library allocation
|
page read and write
|
||
6087000
|
trusted library allocation
|
page read and write
|
||
6084000
|
trusted library allocation
|
page read and write
|
||
7D7F000
|
stack
|
page read and write
|
||
5D71000
|
trusted library allocation
|
page read and write
|
||
5BF9000
|
trusted library allocation
|
page read and write
|
||
5C4E000
|
trusted library allocation
|
page read and write
|
||
5BEE000
|
trusted library allocation
|
page read and write
|
||
6086000
|
trusted library allocation
|
page read and write
|
||
5BF2000
|
trusted library allocation
|
page read and write
|
||
6324000
|
trusted library allocation
|
page read and write
|
||
6442000
|
trusted library allocation
|
page execute and read and write
|
||
8500000
|
trusted library allocation
|
page read and write
|
||
5BF2000
|
trusted library allocation
|
page read and write
|
||
5BEC000
|
trusted library allocation
|
page read and write
|
||
171C000
|
heap
|
page read and write
|
||
16FC000
|
heap
|
page read and write
|
||
42CE000
|
stack
|
page read and write
|
||
5C04000
|
trusted library allocation
|
page read and write
|
||
6191000
|
trusted library allocation
|
page read and write
|
||
5C80000
|
trusted library allocation
|
page read and write
|
||
6160000
|
trusted library allocation
|
page read and write
|
||
5C04000
|
trusted library allocation
|
page read and write
|
||
8500000
|
direct allocation
|
page read and write
|
||
5CE2000
|
trusted library allocation
|
page read and write
|
||
4C8F000
|
stack
|
page read and write
|
||
6137000
|
trusted library allocation
|
page read and write
|
||
1729000
|
heap
|
page read and write
|
||
6162000
|
trusted library allocation
|
page read and write
|
||
5BF5000
|
trusted library allocation
|
page read and write
|
||
1444000
|
heap
|
page read and write
|
||
66F0000
|
trusted library allocation
|
page execute and read and write
|
||
619B000
|
trusted library allocation
|
page read and write
|
||
74BF000
|
stack
|
page read and write
|
||
1620000
|
direct allocation
|
page read and write
|
||
608E000
|
trusted library allocation
|
page read and write
|
||
8500000
|
direct allocation
|
page read and write
|
||
5C44000
|
trusted library allocation
|
page read and write
|
||
5C35000
|
trusted library allocation
|
page read and write
|
||
5BF5000
|
trusted library allocation
|
page read and write
|
||
62FD000
|
trusted library allocation
|
page read and write
|
||
16EE000
|
heap
|
page read and write
|
||
3A0E000
|
stack
|
page read and write
|
||
1181000
|
unkown
|
page execute and write copy
|
||
5BE1000
|
trusted library allocation
|
page read and write
|
||
61C3000
|
trusted library allocation
|
page read and write
|
||
5BF5000
|
trusted library allocation
|
page read and write
|
||
6135000
|
trusted library allocation
|
page read and write
|
||
16FD000
|
heap
|
page read and write
|
||
83BF000
|
stack
|
page read and write
|
||
7C7E000
|
stack
|
page read and write
|
||
5C56000
|
trusted library allocation
|
page read and write
|
||
6168000
|
trusted library allocation
|
page read and write
|
||
61A8000
|
trusted library allocation
|
page read and write
|
||
78BE000
|
stack
|
page read and write
|
||
5C15000
|
trusted library allocation
|
page read and write
|
||
1729000
|
heap
|
page read and write
|
||
6086000
|
trusted library allocation
|
page read and write
|
||
5BF2000
|
trusted library allocation
|
page read and write
|
||
5CE9000
|
trusted library allocation
|
page read and write
|
||
61AA000
|
trusted library allocation
|
page read and write
|
||
1430000
|
direct allocation
|
page read and write
|
||
388F000
|
stack
|
page read and write
|
||
3ECF000
|
stack
|
page read and write
|
||
608A000
|
trusted library allocation
|
page read and write
|
||
1444000
|
heap
|
page read and write
|
||
6081000
|
trusted library allocation
|
page read and write
|
||
777E000
|
stack
|
page read and write
|
||
1700000
|
heap
|
page read and write
|
||
613C000
|
trusted library allocation
|
page read and write
|
||
5CEC000
|
trusted library allocation
|
page read and write
|
||
5C04000
|
trusted library allocation
|
page read and write
|
||
6090000
|
trusted library allocation
|
page read and write
|
||
618D000
|
trusted library allocation
|
page read and write
|
||
773F000
|
stack
|
page read and write
|
||
32CF000
|
stack
|
page read and write
|
||
3B0F000
|
stack
|
page read and write
|
||
9EB000
|
stack
|
page read and write
|
||
1705000
|
heap
|
page read and write
|
||
1630000
|
heap
|
page read and write
|
||
5BE1000
|
trusted library allocation
|
page read and write
|
||
5C78000
|
trusted library allocation
|
page read and write
|
||
5C40000
|
trusted library allocation
|
page read and write
|
||
6706000
|
trusted library allocation
|
page read and write
|
||
5BF5000
|
trusted library allocation
|
page read and write
|
||
171A000
|
heap
|
page read and write
|
||
1420000
|
heap
|
page read and write
|
||
567E000
|
stack
|
page read and write
|
||
5BF5000
|
trusted library allocation
|
page read and write
|
||
5C15000
|
trusted library allocation
|
page read and write
|
||
3C8E000
|
stack
|
page read and write
|
||
6087000
|
trusted library allocation
|
page read and write
|
||
1620000
|
direct allocation
|
page read and write
|
||
170E000
|
heap
|
page read and write
|
||
595E000
|
stack
|
page read and write
|
||
5C31000
|
trusted library allocation
|
page read and write
|
||
5BF0000
|
trusted library allocation
|
page read and write
|
||
6081000
|
trusted library allocation
|
page read and write
|
||
608E000
|
trusted library allocation
|
page read and write
|
||
5C1D000
|
trusted library allocation
|
page read and write
|
||
5C04000
|
trusted library allocation
|
page read and write
|
||
171C000
|
heap
|
page read and write
|
||
5BF5000
|
trusted library allocation
|
page read and write
|
||
4C91000
|
heap
|
page read and write
|
||
5BF2000
|
trusted library allocation
|
page read and write
|
||
5BF0000
|
trusted library allocation
|
page read and write
|
||
4C91000
|
heap
|
page read and write
|
||
5780000
|
remote allocation
|
page read and write
|
||
6133000
|
trusted library allocation
|
page read and write
|
||
5C2E000
|
trusted library allocation
|
page read and write
|
||
1444000
|
heap
|
page read and write
|
||
5270000
|
direct allocation
|
page execute and read and write
|
||
5BF5000
|
trusted library allocation
|
page read and write
|
||
154E000
|
stack
|
page read and write
|
||
1669000
|
heap
|
page read and write
|
||
61DD000
|
trusted library allocation
|
page read and write
|
||
5C13000
|
trusted library allocation
|
page read and write
|
||
8740000
|
heap
|
page read and write
|
||
170C000
|
heap
|
page read and write
|
||
5BF9000
|
trusted library allocation
|
page read and write
|
||
5C92000
|
trusted library allocation
|
page read and write
|
||
172D000
|
heap
|
page read and write
|
||
5ADD000
|
stack
|
page read and write
|
||
630C000
|
trusted library allocation
|
page read and write
|
||
5BE0000
|
trusted library allocation
|
page read and write
|
||
5C2C000
|
trusted library allocation
|
page read and write
|
||
61BA000
|
trusted library allocation
|
page read and write
|
||
6083000
|
trusted library allocation
|
page read and write
|
||
6173000
|
trusted library allocation
|
page read and write
|
||
7FFF000
|
stack
|
page read and write
|
||
3B4E000
|
stack
|
page read and write
|
||
65CC000
|
trusted library allocation
|
page execute and read and write
|
||
172A000
|
heap
|
page read and write
|
||
5C04000
|
trusted library allocation
|
page read and write
|
||
FEA000
|
unkown
|
page execute and read and write
|
||
C50000
|
heap
|
page read and write
|
||
1444000
|
heap
|
page read and write
|
||
5BFC000
|
trusted library allocation
|
page read and write
|
||
4C91000
|
heap
|
page read and write
|
||
D48000
|
unkown
|
page execute and read and write
|
||
54FD000
|
stack
|
page read and write
|
||
615E000
|
trusted library allocation
|
page read and write
|
||
1729000
|
heap
|
page read and write
|
||
CBD000
|
stack
|
page read and write
|
||
5C0C000
|
trusted library allocation
|
page read and write
|
||
79FE000
|
stack
|
page read and write
|
||
5C91000
|
trusted library allocation
|
page read and write
|
||
172A000
|
heap
|
page read and write
|
||
53BD000
|
stack
|
page read and write
|
||
CF0000
|
unkown
|
page read and write
|
||
5C04000
|
trusted library allocation
|
page read and write
|
||
5BEF000
|
trusted library allocation
|
page read and write
|
||
1430000
|
direct allocation
|
page read and write
|
||
6172000
|
trusted library allocation
|
page read and write
|
||
5C4E000
|
trusted library allocation
|
page read and write
|
||
1717000
|
heap
|
page read and write
|
||
61DB000
|
trusted library allocation
|
page read and write
|
||
6082000
|
trusted library allocation
|
page read and write
|
||
5C4C000
|
trusted library allocation
|
page read and write
|
||
5BFA000
|
trusted library allocation
|
page read and write
|
||
6081000
|
trusted library allocation
|
page read and write
|
||
5C2A000
|
trusted library allocation
|
page read and write
|
||
4A4E000
|
stack
|
page read and write
|
||
1705000
|
heap
|
page read and write
|
||
6139000
|
trusted library allocation
|
page read and write
|
||
16FC000
|
heap
|
page read and write
|
||
4C91000
|
heap
|
page read and write
|
||
5BF5000
|
trusted library allocation
|
page read and write
|
||
4C91000
|
heap
|
page read and write
|
||
171C000
|
heap
|
page read and write
|
||
ED8000
|
unkown
|
page execute and read and write
|
||
61A3000
|
trusted library allocation
|
page read and write
|
||
616A000
|
trusted library allocation
|
page read and write
|
||
FEA000
|
unkown
|
page execute and write copy
|
||
6D7E000
|
stack
|
page read and write
|
||
50D0000
|
trusted library allocation
|
page read and write
|
||
171C000
|
heap
|
page read and write
|
||
6088000
|
trusted library allocation
|
page read and write
|
||
8500000
|
direct allocation
|
page read and write
|
||
5C11000
|
trusted library allocation
|
page read and write
|
||
608E000
|
trusted library allocation
|
page read and write
|
||
9FA0000
|
trusted library allocation
|
page read and write
|
||
5C0E000
|
trusted library allocation
|
page read and write
|
||
5BF9000
|
trusted library allocation
|
page read and write
|
||
1728000
|
heap
|
page read and write
|
||
454E000
|
stack
|
page read and write
|
||
1703000
|
heap
|
page read and write
|
||
5C4E000
|
trusted library allocation
|
page read and write
|
||
5C29000
|
trusted library allocation
|
page read and write
|
||
1430000
|
direct allocation
|
page read and write
|
||
478F000
|
stack
|
page read and write
|
||
6089000
|
trusted library allocation
|
page read and write
|
||
48CF000
|
stack
|
page read and write
|
||
6087000
|
trusted library allocation
|
page read and write
|
||
608C000
|
trusted library allocation
|
page read and write
|
||
5C56000
|
trusted library allocation
|
page read and write
|
||
1703000
|
heap
|
page read and write
|
||
5DCB000
|
trusted library allocation
|
page read and write
|
||
5BE8000
|
trusted library allocation
|
page read and write
|
||
608C000
|
trusted library allocation
|
page read and write
|
||
5C47000
|
trusted library allocation
|
page read and write
|
||
450F000
|
stack
|
page read and write
|
||
163E000
|
heap
|
page read and write
|
||
5A7F000
|
stack
|
page read and write
|
||
171A000
|
heap
|
page read and write
|
||
5C04000
|
trusted library allocation
|
page read and write
|
||
6129000
|
trusted library allocation
|
page read and write
|
||
61B8000
|
trusted library allocation
|
page read and write
|
||
1444000
|
heap
|
page read and write
|
||
61D3000
|
trusted library allocation
|
page read and write
|
||
16A6000
|
heap
|
page read and write
|
||
CF1000
|
unkown
|
page execute and write copy
|
||
1701000
|
heap
|
page read and write
|
||
FAA000
|
unkown
|
page execute and read and write
|
||
5C66000
|
trusted library allocation
|
page read and write
|
||
1725000
|
heap
|
page read and write
|
||
31CF000
|
stack
|
page read and write
|
||
57EE000
|
stack
|
page read and write
|
||
6171000
|
trusted library allocation
|
page read and write
|
||
418E000
|
stack
|
page read and write
|
||
5C4E000
|
trusted library allocation
|
page read and write
|
||
5C05000
|
trusted library allocation
|
page read and write
|
||
6088000
|
trusted library allocation
|
page read and write
|
||
62D8000
|
trusted library allocation
|
page read and write
|
||
170E000
|
heap
|
page read and write
|
||
172A000
|
heap
|
page read and write
|
||
1430000
|
direct allocation
|
page read and write
|
||
62AB000
|
trusted library allocation
|
page read and write
|
||
5BF5000
|
trusted library allocation
|
page read and write
|
||
163A000
|
heap
|
page read and write
|
||
5973000
|
heap
|
page read and write
|
||
5C04000
|
trusted library allocation
|
page read and write
|
||
5BF5000
|
trusted library allocation
|
page read and write
|
||
6ABF000
|
stack
|
page read and write
|
||
5BF5000
|
trusted library allocation
|
page read and write
|
||
827F000
|
stack
|
page read and write
|
||
608E000
|
trusted library allocation
|
page read and write
|
||
1709000
|
heap
|
page read and write
|
||
6085000
|
trusted library allocation
|
page read and write
|
||
563F000
|
stack
|
page read and write
|
||
618F000
|
trusted library allocation
|
page read and write
|
||
5C0C000
|
trusted library allocation
|
page read and write
|
||
1717000
|
heap
|
page read and write
|
||
6197000
|
trusted library allocation
|
page read and write
|
||
5C0C000
|
trusted library allocation
|
page read and write
|
||
613A000
|
trusted library allocation
|
page read and write
|
||
61A8000
|
trusted library allocation
|
page read and write
|
||
61BB000
|
trusted library allocation
|
page read and write
|
||
6158000
|
trusted library allocation
|
page read and write
|
||
172D000
|
heap
|
page read and write
|
||
817E000
|
stack
|
page read and write
|
||
608B000
|
trusted library allocation
|
page read and write
|
||
5BE3000
|
trusted library allocation
|
page read and write
|
||
5C15000
|
trusted library allocation
|
page read and write
|
||
61B7000
|
trusted library allocation
|
page read and write
|
||
464F000
|
stack
|
page read and write
|
||
5D50000
|
direct allocation
|
page read and write
|
||
8570000
|
direct allocation
|
page read and write
|
||
617B000
|
trusted library allocation
|
page read and write
|
||
61CE000
|
trusted library allocation
|
page read and write
|
||
6083000
|
trusted library allocation
|
page read and write
|
||
737F000
|
stack
|
page read and write
|
||
6088000
|
trusted library allocation
|
page read and write
|
||
5C4E000
|
trusted library allocation
|
page read and write
|
||
374F000
|
stack
|
page read and write
|
||
5C04000
|
trusted library allocation
|
page read and write
|
||
1430000
|
direct allocation
|
page read and write
|
||
5BE6000
|
trusted library allocation
|
page read and write
|
||
172D000
|
heap
|
page read and write
|
||
618F000
|
trusted library allocation
|
page read and write
|
||
5BF5000
|
trusted library allocation
|
page read and write
|
||
6AFE000
|
stack
|
page read and write
|
||
171C000
|
heap
|
page read and write
|
||
6087000
|
trusted library allocation
|
page read and write
|
||
5C1B000
|
trusted library allocation
|
page read and write
|
||
4C91000
|
heap
|
page read and write
|
||
5BFA000
|
trusted library allocation
|
page read and write
|
||
1700000
|
heap
|
page read and write
|
||
61DF000
|
trusted library allocation
|
page read and write
|
||
139E000
|
stack
|
page read and write
|
||
8530000
|
trusted library allocation
|
page read and write
|
||
4C91000
|
heap
|
page read and write
|
||
6168000
|
trusted library allocation
|
page read and write
|
||
644A000
|
trusted library allocation
|
page execute and read and write
|
||
5C0C000
|
trusted library allocation
|
page read and write
|
||
6440000
|
trusted library allocation
|
page read and write
|
||
5260000
|
direct allocation
|
page execute and read and write
|
||
1444000
|
heap
|
page read and write
|
||
5D43000
|
trusted library allocation
|
page read and write
|
||
1430000
|
direct allocation
|
page read and write
|
||
5E82000
|
trusted library allocation
|
page read and write
|
||
5C03000
|
trusted library allocation
|
page read and write
|
||
5C03000
|
trusted library allocation
|
page read and write
|
||
61FC000
|
trusted library allocation
|
page read and write
|
||
5C06000
|
trusted library allocation
|
page read and write
|
||
6085000
|
trusted library allocation
|
page read and write
|
||
5BF2000
|
trusted library allocation
|
page read and write
|
||
61EF000
|
trusted library allocation
|
page read and write
|
||
6146000
|
trusted library allocation
|
page read and write
|
||
1703000
|
heap
|
page read and write
|
||
6081000
|
trusted library allocation
|
page read and write
|
||
4C91000
|
heap
|
page read and write
|
||
5C01000
|
trusted library allocation
|
page read and write
|
||
58EF000
|
stack
|
page read and write
|
||
7C3F000
|
stack
|
page read and write
|
||
4C91000
|
heap
|
page read and write
|
||
6084000
|
trusted library allocation
|
page read and write
|
||
172A000
|
heap
|
page read and write
|
||
171C000
|
heap
|
page read and write
|
||
168C000
|
heap
|
page read and write
|
||
66F2000
|
trusted library allocation
|
page execute and read and write
|
||
608C000
|
trusted library allocation
|
page read and write
|
||
170E000
|
heap
|
page read and write
|
||
1700000
|
heap
|
page read and write
|
||
61AD000
|
trusted library allocation
|
page read and write
|
||
608F000
|
trusted library allocation
|
page read and write
|
||
172A000
|
heap
|
page read and write
|
||
16FF000
|
heap
|
page read and write
|
||
171A000
|
heap
|
page read and write
|
||
697F000
|
stack
|
page read and write
|
||
5C4E000
|
trusted library allocation
|
page read and write
|
||
1701000
|
heap
|
page read and write
|
||
5C42000
|
trusted library allocation
|
page read and write
|
||
5C04000
|
trusted library allocation
|
page read and write
|
||
5C0C000
|
trusted library allocation
|
page read and write
|
||
6084000
|
trusted library allocation
|
page read and write
|
||
6089000
|
trusted library allocation
|
page read and write
|
||
1430000
|
direct allocation
|
page read and write
|
||
5C13000
|
trusted library allocation
|
page read and write
|
||
4C91000
|
heap
|
page read and write
|
||
7B3E000
|
stack
|
page read and write
|
||
CF0000
|
unkown
|
page readonly
|
||
378E000
|
stack
|
page read and write
|
||
624F000
|
trusted library allocation
|
page read and write
|
||
6169000
|
trusted library allocation
|
page read and write
|
||
170E000
|
heap
|
page read and write
|
||
1717000
|
heap
|
page read and write
|
||
1713000
|
heap
|
page read and write
|
||
5C0C000
|
trusted library allocation
|
page read and write
|
||
5C0C000
|
trusted library allocation
|
page read and write
|
||
5C04000
|
trusted library allocation
|
page read and write
|
||
61AA000
|
trusted library allocation
|
page read and write
|
||
400F000
|
stack
|
page read and write
|
||
5C4C000
|
trusted library allocation
|
page read and write
|
||
4C91000
|
heap
|
page read and write
|
||
1430000
|
direct allocation
|
page read and write
|
||
5BE2000
|
trusted library allocation
|
page read and write
|
||
6085000
|
trusted library allocation
|
page read and write
|
||
5C15000
|
trusted library allocation
|
page read and write
|
||
5C04000
|
trusted library allocation
|
page read and write
|
||
6081000
|
trusted library allocation
|
page read and write
|
||
350E000
|
stack
|
page read and write
|
||
5C15000
|
trusted library allocation
|
page read and write
|
||
5C13000
|
trusted library allocation
|
page read and write
|
||
33CF000
|
stack
|
page read and write
|
||
5780000
|
remote allocation
|
page read and write
|
||
7DBE000
|
stack
|
page read and write
|
||
6084000
|
trusted library allocation
|
page read and write
|
||
83FE000
|
stack
|
page read and write
|
||
5970000
|
heap
|
page read and write
|
||
170C000
|
heap
|
page read and write
|
||
673E000
|
stack
|
page read and write
|
||
75FF000
|
stack
|
page read and write
|
||
440E000
|
stack
|
page read and write
|
||
608C000
|
trusted library allocation
|
page read and write
|
||
170F000
|
heap
|
page read and write
|
||
1717000
|
heap
|
page read and write
|
||
4CA0000
|
heap
|
page read and write
|
||
6087000
|
trusted library allocation
|
page read and write
|
||
616A000
|
trusted library allocation
|
page read and write
|
||
611A000
|
trusted library allocation
|
page read and write
|
||
1728000
|
heap
|
page read and write
|
||
5BFA000
|
trusted library allocation
|
page read and write
|
||
39CF000
|
stack
|
page read and write
|
||
608D000
|
trusted library allocation
|
page read and write
|
||
172D000
|
heap
|
page read and write
|
||
5BFC000
|
trusted library allocation
|
page read and write
|
||
6218000
|
trusted library allocation
|
page read and write
|
||
6088000
|
trusted library allocation
|
page read and write
|
||
6090000
|
trusted library allocation
|
page read and write
|
||
6118000
|
trusted library allocation
|
page read and write
|
||
6135000
|
trusted library allocation
|
page read and write
|
||
3C4F000
|
stack
|
page read and write
|
||
5E80000
|
trusted library allocation
|
page read and write
|
||
3D8F000
|
stack
|
page read and write
|
||
34CF000
|
stack
|
page read and write
|
||
1444000
|
heap
|
page read and write
|
||
5C4F000
|
trusted library allocation
|
page read and write
|
||
4B8E000
|
stack
|
page read and write
|
||
FDB000
|
unkown
|
page execute and read and write
|
||
5C03000
|
trusted library allocation
|
page read and write
|
||
5C3D000
|
trusted library allocation
|
page read and write
|
||
5C3C000
|
trusted library allocation
|
page read and write
|
||
170F000
|
heap
|
page read and write
|
||
6127000
|
trusted library allocation
|
page read and write
|
||
6199000
|
trusted library allocation
|
page read and write
|
||
CE0000
|
heap
|
page read and write
|
||
61A4000
|
trusted library allocation
|
page read and write
|
||
5C24000
|
trusted library allocation
|
page read and write
|
||
170C000
|
heap
|
page read and write
|
||
172D000
|
heap
|
page read and write
|
||
5BEC000
|
trusted library allocation
|
page read and write
|
||
1728000
|
heap
|
page read and write
|
||
6152000
|
trusted library allocation
|
page read and write
|
||
887E000
|
stack
|
page read and write
|
||
5C12000
|
trusted library allocation
|
page read and write
|
||
1444000
|
heap
|
page read and write
|
||
5DC3000
|
trusted library allocation
|
page read and write
|
||
16FC000
|
heap
|
page read and write
|
||
53FD000
|
stack
|
page read and write
|
||
1444000
|
heap
|
page read and write
|
||
6089000
|
trusted library allocation
|
page read and write
|
||
428F000
|
stack
|
page read and write
|
||
5780000
|
remote allocation
|
page read and write
|
||
5C2D000
|
trusted library allocation
|
page read and write
|
||
6085000
|
trusted library allocation
|
page read and write
|
||
5C44000
|
trusted library allocation
|
page read and write
|
||
5BF1000
|
trusted library allocation
|
page read and write
|
||
62DA000
|
trusted library allocation
|
page read and write
|
||
5D0B000
|
trusted library allocation
|
page read and write
|
||
5BE8000
|
trusted library allocation
|
page read and write
|
||
73BE000
|
stack
|
page read and write
|
||
5BF1000
|
trusted library allocation
|
page read and write
|
||
5C04000
|
trusted library allocation
|
page read and write
|
||
84FF000
|
stack
|
page read and write
|
||
5C0C000
|
trusted library allocation
|
page read and write
|
||
5BF7000
|
trusted library allocation
|
page read and write
|
||
CE7000
|
heap
|
page read and write
|
||
61CC000
|
trusted library allocation
|
page read and write
|
||
5C86000
|
trusted library allocation
|
page read and write
|
||
43CE000
|
stack
|
page read and write
|
||
6134000
|
trusted library allocation
|
page read and write
|
||
404E000
|
stack
|
page read and write
|
||
172A000
|
heap
|
page read and write
|
||
172D000
|
heap
|
page read and write
|
||
5C15000
|
trusted library allocation
|
page read and write
|
||
86C0000
|
trusted library allocation
|
page read and write
|
||
61CB000
|
trusted library allocation
|
page read and write
|
||
5C01000
|
trusted library allocation
|
page read and write
|
||
6199000
|
trusted library allocation
|
page read and write
|
||
5C90000
|
trusted library allocation
|
page read and write
|
||
38CE000
|
stack
|
page read and write
|
||
170C000
|
heap
|
page read and write
|
||
6144000
|
trusted library allocation
|
page read and write
|
||
6082000
|
trusted library allocation
|
page read and write
|
||
5C15000
|
trusted library allocation
|
page read and write
|
||
5BEA000
|
trusted library allocation
|
page read and write
|
||
172A000
|
heap
|
page read and write
|
||
727E000
|
stack
|
page read and write
|
||
5C2C000
|
trusted library allocation
|
page read and write
|
||
6246000
|
trusted library allocation
|
page read and write
|
||
6439000
|
stack
|
page read and write
|
||
608A000
|
trusted library allocation
|
page read and write
|
||
172A000
|
heap
|
page read and write
|
||
5DBB000
|
trusted library allocation
|
page read and write
|
||
5CF2000
|
trusted library allocation
|
page read and write
|
||
5C1E000
|
trusted library allocation
|
page read and write
|
||
1728000
|
heap
|
page read and write
|
||
3F0E000
|
stack
|
page read and write
|
||
621A000
|
trusted library allocation
|
page read and write
|
||
5C25000
|
trusted library allocation
|
page read and write
|
||
79BF000
|
stack
|
page read and write
|
||
15CE000
|
stack
|
page read and write
|
||
5C14000
|
trusted library allocation
|
page read and write
|
||
5BF9000
|
trusted library allocation
|
page read and write
|
||
61AF000
|
trusted library allocation
|
page read and write
|
||
5C04000
|
trusted library allocation
|
page read and write
|
||
5BF5000
|
trusted library allocation
|
page read and write
|
||
61CF000
|
trusted library allocation
|
page read and write
|
||
5C26000
|
trusted library allocation
|
page read and write
|
||
5C17000
|
trusted library allocation
|
page read and write
|
||
69BE000
|
stack
|
page read and write
|
||
62AD000
|
trusted library allocation
|
page read and write
|
||
61B5000
|
trusted library allocation
|
page read and write
|
||
4C91000
|
heap
|
page read and write
|
||
6086000
|
trusted library allocation
|
page read and write
|
||
6136000
|
trusted library allocation
|
page read and write
|
||
4C91000
|
heap
|
page read and write
|
||
723F000
|
stack
|
page read and write
|
||
5C06000
|
trusted library allocation
|
page read and write
|
||
614D000
|
trusted library allocation
|
page read and write
|
||
172A000
|
heap
|
page read and write
|
||
524F000
|
stack
|
page read and write
|
||
5280000
|
direct allocation
|
page execute and read and write
|
||
1703000
|
heap
|
page read and write
|
||
5C0D000
|
trusted library allocation
|
page read and write
|
||
6083000
|
trusted library allocation
|
page read and write
|
||
6131000
|
trusted library allocation
|
page read and write
|
||
6129000
|
trusted library allocation
|
page read and write
|
||
1180000
|
unkown
|
page execute and read and write
|
||
5C15000
|
trusted library allocation
|
page read and write
|
||
5C04000
|
trusted library allocation
|
page read and write
|
||
8880000
|
trusted library allocation
|
page read and write
|
||
6080000
|
trusted library allocation
|
page read and write
|
||
5BF1000
|
trusted library allocation
|
page read and write
|
||
171D000
|
heap
|
page read and write
|
||
5280000
|
direct allocation
|
page execute and read and write
|
||
687C000
|
stack
|
page read and write
|
||
4C91000
|
heap
|
page read and write
|
||
6FFE000
|
stack
|
page read and write
|
||
171D000
|
heap
|
page read and write
|
||
30CF000
|
stack
|
page read and write
|
||
8500000
|
direct allocation
|
page read and write
|
||
6332000
|
trusted library allocation
|
page read and write
|
||
1697000
|
heap
|
page read and write
|
||
6089000
|
trusted library allocation
|
page read and write
|
||
5C4C000
|
trusted library allocation
|
page read and write
|
||
6083000
|
trusted library allocation
|
page read and write
|
||
5CE7000
|
trusted library allocation
|
page read and write
|
||
61CD000
|
trusted library allocation
|
page read and write
|
||
8500000
|
direct allocation
|
page read and write
|
||
1444000
|
heap
|
page read and write
|
||
632D000
|
trusted library allocation
|
page read and write
|
||
61C9000
|
trusted library allocation
|
page read and write
|
||
CF1000
|
unkown
|
page execute and read and write
|
||
C40000
|
heap
|
page read and write
|
||
577E000
|
stack
|
page read and write
|
||
1430000
|
direct allocation
|
page read and write
|
||
528E000
|
stack
|
page read and write
|
||
5BF1000
|
trusted library allocation
|
page read and write
|
||
5C4A000
|
trusted library allocation
|
page read and write
|
||
1444000
|
heap
|
page read and write
|
||
5CE3000
|
trusted library allocation
|
page read and write
|
||
6229000
|
trusted library allocation
|
page read and write
|
||
5BF5000
|
trusted library allocation
|
page read and write
|
||
8500000
|
direct allocation
|
page read and write
|
||
5C04000
|
trusted library allocation
|
page read and write
|
||
5BFA000
|
trusted library allocation
|
page read and write
|
||
66E1000
|
trusted library allocation
|
page execute and read and write
|
||
6088000
|
trusted library allocation
|
page read and write
|
||
4C91000
|
heap
|
page read and write
|
||
630A000
|
trusted library allocation
|
page read and write
|
||
4C90000
|
heap
|
page read and write
|
||
5BE1000
|
trusted library allocation
|
page read and write
|
||
70FF000
|
stack
|
page read and write
|
||
172D000
|
heap
|
page read and write
|
||
5C36000
|
trusted library allocation
|
page read and write
|
||
1430000
|
direct allocation
|
page read and write
|
||
172C000
|
heap
|
page read and write
|
||
5C15000
|
trusted library allocation
|
page read and write
|
||
5BF6000
|
trusted library allocation
|
page read and write
|
||
6179000
|
trusted library allocation
|
page read and write
|
||
86C0000
|
direct allocation
|
page execute and read and write
|
||
6133000
|
trusted library allocation
|
page read and write
|
||
5C05000
|
trusted library allocation
|
page read and write
|
||
FD5000
|
unkown
|
page execute and read and write
|
||
6292000
|
trusted library allocation
|
page read and write
|
||
803E000
|
stack
|
page read and write
|
||
6083000
|
trusted library allocation
|
page read and write
|
||
8C3C000
|
stack
|
page read and write
|
||
172A000
|
heap
|
page read and write
|
||
8500000
|
direct allocation
|
page read and write
|
||
608B000
|
trusted library allocation
|
page read and write
|
||
6179000
|
trusted library allocation
|
page read and write
|
||
6082000
|
trusted library allocation
|
page read and write
|
||
6160000
|
trusted library allocation
|
page read and write
|
||
6091000
|
trusted library allocation
|
page read and write
|
||
8500000
|
direct allocation
|
page read and write
|
||
514C000
|
stack
|
page read and write
|
||
6088000
|
trusted library allocation
|
page read and write
|
||
5C15000
|
trusted library allocation
|
page read and write
|
||
618D000
|
trusted library allocation
|
page read and write
|
||
5BE6000
|
trusted library allocation
|
page read and write
|
||
618F000
|
trusted library allocation
|
page read and write
|
||
5BF2000
|
trusted library allocation
|
page read and write
|
||
5C44000
|
trusted library allocation
|
page read and write
|
||
5C04000
|
trusted library allocation
|
page read and write
|
||
1444000
|
heap
|
page read and write
|
||
86F0000
|
direct allocation
|
page execute and read and write
|
||
6167000
|
trusted library allocation
|
page read and write
|
||
4C91000
|
heap
|
page read and write
|
||
490E000
|
stack
|
page read and write
|
||
170C000
|
heap
|
page read and write
|
||
5C2C000
|
trusted library allocation
|
page read and write
|
||
1444000
|
heap
|
page read and write
|
||
8550000
|
heap
|
page read and write
|
||
6083000
|
trusted library allocation
|
page read and write
|
||
7EFE000
|
stack
|
page read and write
|
||
1444000
|
heap
|
page read and write
|
||
8BBE000
|
stack
|
page read and write
|
||
171C000
|
heap
|
page read and write
|
||
5C39000
|
trusted library allocation
|
page read and write
|
||
5C04000
|
trusted library allocation
|
page read and write
|
||
5250000
|
direct allocation
|
page execute and read and write
|
||
5C1B000
|
trusted library allocation
|
page read and write
|
||
128A000
|
stack
|
page read and write
|
||
5C18000
|
trusted library allocation
|
page read and write
|
||
787F000
|
stack
|
page read and write
|
||
5C2B000
|
trusted library allocation
|
page read and write
|
||
6085000
|
trusted library allocation
|
page read and write
|
||
5BF1000
|
trusted library allocation
|
page read and write
|
||
6FBF000
|
stack
|
page read and write
|
||
5280000
|
direct allocation
|
page execute and read and write
|
||
6086000
|
trusted library allocation
|
page read and write
|
||
1430000
|
direct allocation
|
page read and write
|
||
1444000
|
heap
|
page read and write
|
||
5C15000
|
trusted library allocation
|
page read and write
|
||
5BFC000
|
trusted library allocation
|
page read and write
|
||
5154000
|
direct allocation
|
page read and write
|
||
6EBE000
|
stack
|
page read and write
|
||
5BF2000
|
trusted library allocation
|
page read and write
|
||
608A000
|
trusted library allocation
|
page read and write
|
||
5C30000
|
trusted library allocation
|
page read and write
|
||
6BFF000
|
stack
|
page read and write
|
||
61FE000
|
trusted library allocation
|
page read and write
|
||
5C25000
|
trusted library allocation
|
page read and write
|
||
6081000
|
trusted library allocation
|
page read and write
|
||
888A000
|
trusted library allocation
|
page read and write
|
||
608B000
|
trusted library allocation
|
page read and write
|
||
5C41000
|
trusted library allocation
|
page read and write
|
||
5C44000
|
trusted library allocation
|
page read and write
|
||
1444000
|
heap
|
page read and write
|
||
5BED000
|
trusted library allocation
|
page read and write
|
||
A7DE000
|
stack
|
page read and write
|
||
5C34000
|
trusted library allocation
|
page read and write
|
||
6446000
|
trusted library allocation
|
page read and write
|
||
5BEF000
|
trusted library allocation
|
page read and write
|
||
5BF1000
|
trusted library allocation
|
page read and write
|
||
1705000
|
heap
|
page read and write
|
||
5290000
|
direct allocation
|
page execute and read and write
|
||
5C1A000
|
trusted library allocation
|
page read and write
|
||
1716000
|
heap
|
page read and write
|
||
6091000
|
trusted library allocation
|
page read and write
|
||
1700000
|
heap
|
page read and write
|
||
171C000
|
heap
|
page read and write
|
||
171F000
|
heap
|
page read and write
|
||
5CE4000
|
trusted library allocation
|
page read and write
|
||
16FC000
|
heap
|
page read and write
|
||
6150000
|
trusted library allocation
|
page read and write
|
||
61B9000
|
trusted library allocation
|
page read and write
|
||
5BF5000
|
trusted library allocation
|
page read and write
|
||
632B000
|
trusted library allocation
|
page read and write
|
||
61CB000
|
trusted library allocation
|
page read and write
|
||
6085000
|
trusted library allocation
|
page read and write
|
||
626A000
|
trusted library allocation
|
page read and write
|
||
D35000
|
unkown
|
page execute and read and write
|
||
4C91000
|
heap
|
page read and write
|
||
4C91000
|
heap
|
page read and write
|
||
62FF000
|
trusted library allocation
|
page read and write
|
||
5BDE000
|
stack
|
page read and write
|
||
5BED000
|
trusted library allocation
|
page read and write
|
||
5C2B000
|
trusted library allocation
|
page read and write
|
||
6174000
|
trusted library allocation
|
page read and write
|
||
5BEF000
|
trusted library allocation
|
page read and write
|
||
5C2D000
|
trusted library allocation
|
page read and write
|
||
8500000
|
direct allocation
|
page read and write
|
||
1444000
|
heap
|
page read and write
|
||
6085000
|
trusted library allocation
|
page read and write
|
||
5C1E000
|
trusted library allocation
|
page read and write
|
||
16A3000
|
heap
|
page read and write
|
||
8500000
|
direct allocation
|
page read and write
|
||
5C0F000
|
trusted library allocation
|
page read and write
|
||
170C000
|
heap
|
page read and write
|
||
5C04000
|
trusted library allocation
|
page read and write
|
||
3DCE000
|
stack
|
page read and write
|
||
61D1000
|
trusted library allocation
|
page read and write
|
||
6082000
|
trusted library allocation
|
page read and write
|
||
6081000
|
trusted library allocation
|
page read and write
|
||
85AC000
|
stack
|
page read and write
|
||
5BF1000
|
trusted library allocation
|
page read and write
|
||
620F000
|
trusted library allocation
|
page read and write
|
||
8882000
|
trusted library allocation
|
page read and write
|
||
608B000
|
trusted library allocation
|
page read and write
|
||
5C04000
|
trusted library allocation
|
page read and write
|
||
4A0F000
|
stack
|
page read and write
|
||
52C4000
|
trusted library allocation
|
page read and write
|
||
172C000
|
heap
|
page read and write
|
||
6083000
|
trusted library allocation
|
page read and write
|
||
170C000
|
heap
|
page read and write
|
||
713E000
|
stack
|
page read and write
|
||
612B000
|
trusted library allocation
|
page read and write
|
||
622B000
|
trusted library allocation
|
page read and write
|
||
16A6000
|
heap
|
page read and write
|
||
5C15000
|
trusted library allocation
|
page read and write
|
||
6083000
|
trusted library allocation
|
page read and write
|
||
6272000
|
trusted library allocation
|
page read and write
|
||
8500000
|
direct allocation
|
page read and write
|
||
8500000
|
direct allocation
|
page read and write
|
||
1705000
|
heap
|
page read and write
|
||
615A000
|
trusted library allocation
|
page read and write
|
||
5BEF000
|
trusted library allocation
|
page read and write
|
||
5C04000
|
trusted library allocation
|
page read and write
|
||
169A000
|
heap
|
page read and write
|
||
6270000
|
trusted library allocation
|
page read and write
|
||
617B000
|
trusted library allocation
|
page read and write
|
||
5C55000
|
trusted library allocation
|
page read and write
|
||
608B000
|
trusted library allocation
|
page read and write
|
||
82BE000
|
stack
|
page read and write
|
||
5BE1000
|
trusted library allocation
|
page read and write
|
||
61A1000
|
trusted library allocation
|
page read and write
|
||
5C3C000
|
trusted library allocation
|
page read and write
|
||
1440000
|
heap
|
page read and write
|
||
5C15000
|
trusted library allocation
|
page read and write
|
||
6090000
|
trusted library allocation
|
page read and write
|
||
5BFD000
|
trusted library allocation
|
page read and write
|
||
52B0000
|
direct allocation
|
page execute and read and write
|
||
608D000
|
trusted library allocation
|
page read and write
|
||
A8DF000
|
stack
|
page read and write
|
||
1728000
|
heap
|
page read and write
|
||
5BFD000
|
trusted library allocation
|
page read and write
|
||
5C04000
|
trusted library allocation
|
page read and write
|
||
171C000
|
heap
|
page read and write
|
||
5C06000
|
trusted library allocation
|
page read and write
|
||
13DE000
|
stack
|
page read and write
|
||
158E000
|
stack
|
page read and write
|
||
5BEF000
|
trusted library allocation
|
page read and write
|
||
4C91000
|
heap
|
page read and write
|
||
1706000
|
heap
|
page read and write
|
||
86AF000
|
stack
|
page read and write
|
||
608A000
|
trusted library allocation
|
page read and write
|
||
61C5000
|
trusted library allocation
|
page read and write
|
||
6E7F000
|
stack
|
page read and write
|
||
61D5000
|
trusted library allocation
|
page read and write
|
||
1444000
|
heap
|
page read and write
|
||
6083000
|
trusted library allocation
|
page read and write
|
||
5280000
|
direct allocation
|
page execute and read and write
|
||
1701000
|
heap
|
page read and write
|
||
5C15000
|
trusted library allocation
|
page read and write
|
||
5280000
|
direct allocation
|
page execute and read and write
|
||
5C15000
|
trusted library allocation
|
page read and write
|
||
5BE1000
|
trusted library allocation
|
page read and write
|
||
6248000
|
trusted library allocation
|
page read and write
|
||
5C7E000
|
trusted library allocation
|
page read and write
|
||
5C18000
|
trusted library allocation
|
page read and write
|
||
608D000
|
trusted library allocation
|
page read and write
|
||
1430000
|
direct allocation
|
page read and write
|
||
5D23000
|
trusted library allocation
|
page read and write
|
||
7AFF000
|
stack
|
page read and write
|
||
182E000
|
stack
|
page read and write
|
||
5C15000
|
trusted library allocation
|
page read and write
|
||
5C60000
|
trusted library allocation
|
page read and write
|
||
6137000
|
trusted library allocation
|
page read and write
|
||
813F000
|
stack
|
page read and write
|
||
5D19000
|
stack
|
page read and write
|
||
5C1B000
|
trusted library allocation
|
page read and write
|
||
5C4C000
|
trusted library allocation
|
page read and write
|
||
553E000
|
stack
|
page read and write
|
||
5C2E000
|
trusted library allocation
|
page read and write
|
||
5BEE000
|
trusted library allocation
|
page read and write
|
||
5C04000
|
trusted library allocation
|
page read and write
|
||
5C53000
|
trusted library allocation
|
page read and write
|
||
61E1000
|
trusted library allocation
|
page read and write
|
||
5110000
|
direct allocation
|
page read and write
|
||
160E000
|
stack
|
page read and write
|
||
5BFD000
|
trusted library allocation
|
page read and write
|
||
6085000
|
trusted library allocation
|
page read and write
|
||
763E000
|
stack
|
page read and write
|
||
364E000
|
stack
|
page read and write
|
||
16A6000
|
heap
|
page read and write
|
||
6083000
|
trusted library allocation
|
page read and write
|
||
172D000
|
heap
|
page read and write
|
||
1683000
|
heap
|
page read and write
|
||
608E000
|
trusted library allocation
|
page read and write
|
||
170C000
|
heap
|
page read and write
|
||
5BF2000
|
trusted library allocation
|
page read and write
|
||
5C18000
|
trusted library allocation
|
page read and write
|
||
5C15000
|
trusted library allocation
|
page read and write
|
||
141B000
|
stack
|
page read and write
|
||
5D93000
|
trusted library allocation
|
page read and write
|
||
16FD000
|
heap
|
page read and write
|
||
1709000
|
heap
|
page read and write
|
||
172A000
|
heap
|
page read and write
|
||
6C3E000
|
stack
|
page read and write
|
||
8D3C000
|
stack
|
page read and write
|
||
5C15000
|
trusted library allocation
|
page read and write
|
||
5BFD000
|
trusted library allocation
|
page read and write
|
||
1430000
|
direct allocation
|
page read and write
|
||
6251000
|
trusted library allocation
|
page read and write
|
||
626C000
|
trusted library allocation
|
page read and write
|
||
7EBF000
|
stack
|
page read and write
|
||
608F000
|
trusted library allocation
|
page read and write
|
||
5BEF000
|
trusted library allocation
|
page read and write
|
||
74FE000
|
stack
|
page read and write
|
||
5CE2000
|
trusted library allocation
|
page read and write
|
||
8500000
|
direct allocation
|
page read and write
|
||
5C03000
|
trusted library allocation
|
page read and write
|
||
683F000
|
stack
|
page read and write
|
||
5BF5000
|
trusted library allocation
|
page read and write
|
||
5C4E000
|
trusted library allocation
|
page read and write
|
||
6294000
|
trusted library allocation
|
page read and write
|
||
5C15000
|
trusted library allocation
|
page read and write
|
||
170A000
|
heap
|
page read and write
|
||
8500000
|
direct allocation
|
page read and write
|
||
5BED000
|
trusted library allocation
|
page read and write
|
||
5C03000
|
trusted library allocation
|
page read and write
|
||
614F000
|
trusted library allocation
|
page read and write
|
||
468E000
|
stack
|
page read and write
|
||
170C000
|
heap
|
page read and write
|
||
1430000
|
direct allocation
|
page read and write
|
||
6091000
|
trusted library allocation
|
page read and write
|
||
4B4F000
|
stack
|
page read and write
|
||
1444000
|
heap
|
page read and write
|
||
5BEF000
|
trusted library allocation
|
page read and write
|
||
52A0000
|
direct allocation
|
page execute and read and write
|
||
5C0D000
|
trusted library allocation
|
page read and write
|
||
61A2000
|
trusted library allocation
|
page read and write
|
There are 807 hidden memdumps, click here to show them.
DOM / HTML
URL
|
Malicious
|
|
---|---|---|
https://learn.microsoft.com/en-us/dotnet/framework/install/application-not-started?version=(null)&processName=file.exe&platform=0009&osver=6&isServer=0&shimver=4.0.30319.0
|
||
https://learn.microsoft.com/en-us/dotnet/framework/install/application-not-started?version=(null)&processName=file.exe&platform=0009&osver=6&isServer=0&shimver=4.0.30319.0
|
||
https://learn.microsoft.com/en-us/dotnet/framework/install/application-not-started?version=(null)&processName=file.exe&platform=0009&osver=6&isServer=0&shimver=4.0.30319.0
|
||
https://learn.microsoft.com/en-us/dotnet/framework/install/application-not-started?version=(null)&processName=file.exe&platform=0009&osver=6&isServer=0&shimver=4.0.30319.0
|