Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
file.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
initial sample
|
||
Chrome Cache Entry: 100
|
ASCII text
|
dropped
|
||
Chrome Cache Entry: 101
|
SVG Scalable Vector Graphics image
|
downloaded
|
||
Chrome Cache Entry: 102
|
Web Open Font Format (Version 2), TrueType, length 19696, version 1.0
|
downloaded
|
||
Chrome Cache Entry: 103
|
ASCII text, with very long lines (33148), with no line terminators
|
downloaded
|
||
Chrome Cache Entry: 104
|
PNG image data, 475 x 212, 8-bit/color RGBA, non-interlaced
|
dropped
|
||
Chrome Cache Entry: 105
|
PNG image data, 658 x 480, 8-bit/color RGBA, non-interlaced
|
dropped
|
||
Chrome Cache Entry: 106
|
JSON data
|
dropped
|
||
Chrome Cache Entry: 107
|
HTML document, ASCII text, with very long lines (639), with CRLF, LF line terminators
|
downloaded
|
||
Chrome Cache Entry: 108
|
JSON data
|
downloaded
|
||
Chrome Cache Entry: 109
|
PNG image data, 533 x 478, 8-bit/color RGBA, non-interlaced
|
dropped
|
||
Chrome Cache Entry: 67
|
PNG image data, 533 x 478, 8-bit/color RGBA, non-interlaced
|
dropped
|
||
Chrome Cache Entry: 68
|
PNG image data, 533 x 478, 8-bit/color RGBA, non-interlaced
|
downloaded
|
||
Chrome Cache Entry: 69
|
SVG Scalable Vector Graphics image
|
dropped
|
||
Chrome Cache Entry: 70
|
JSON data
|
dropped
|
||
Chrome Cache Entry: 71
|
PNG image data, 533 x 478, 8-bit/color RGBA, non-interlaced
|
dropped
|
||
Chrome Cache Entry: 72
|
ASCII text, with very long lines (65536), with no line terminators
|
downloaded
|
||
Chrome Cache Entry: 73
|
ASCII text, with very long lines (65410)
|
dropped
|
||
Chrome Cache Entry: 74
|
JSON data
|
dropped
|
||
Chrome Cache Entry: 75
|
ASCII text, with very long lines (65410)
|
downloaded
|
||
Chrome Cache Entry: 76
|
JSON data
|
downloaded
|
||
Chrome Cache Entry: 77
|
JSON data
|
dropped
|
||
Chrome Cache Entry: 78
|
PNG image data, 533 x 478, 8-bit/color RGBA, non-interlaced
|
downloaded
|
||
Chrome Cache Entry: 79
|
ASCII text, with very long lines (52717), with no line terminators
|
dropped
|
||
Chrome Cache Entry: 80
|
ASCII text
|
downloaded
|
||
Chrome Cache Entry: 81
|
ASCII text, with very long lines (52717), with no line terminators
|
downloaded
|
||
Chrome Cache Entry: 82
|
exported SGML document, ASCII text, with very long lines (65536), with no line terminators
|
downloaded
|
||
Chrome Cache Entry: 83
|
ASCII text, with no line terminators
|
downloaded
|
||
Chrome Cache Entry: 84
|
JPEG image data, JFIF standard 1.01, aspect ratio, density 1x1, segment length 16, progressive, precision 8, 1301x300, components
3
|
dropped
|
||
Chrome Cache Entry: 85
|
PNG image data, 533 x 478, 8-bit/color RGBA, non-interlaced
|
downloaded
|
||
Chrome Cache Entry: 86
|
MS Windows icon resource - 6 icons, -128x-128, 16 colors, 72x72, 16 colors
|
downloaded
|
||
Chrome Cache Entry: 87
|
ASCII text, with very long lines (46884)
|
downloaded
|
||
Chrome Cache Entry: 88
|
JSON data
|
dropped
|
||
Chrome Cache Entry: 89
|
MS Windows icon resource - 6 icons, -128x-128, 16 colors, 72x72, 16 colors
|
dropped
|
||
Chrome Cache Entry: 90
|
PNG image data, 658 x 480, 8-bit/color RGBA, non-interlaced
|
downloaded
|
||
Chrome Cache Entry: 91
|
ASCII text, with very long lines (33148), with no line terminators
|
dropped
|
||
Chrome Cache Entry: 92
|
JSON data
|
downloaded
|
||
Chrome Cache Entry: 93
|
JSON data
|
dropped
|
||
Chrome Cache Entry: 94
|
PNG image data, 475 x 212, 8-bit/color RGBA, non-interlaced
|
downloaded
|
||
Chrome Cache Entry: 95
|
JSON data
|
downloaded
|
||
Chrome Cache Entry: 96
|
JSON data
|
dropped
|
||
Chrome Cache Entry: 97
|
exported SGML document, ASCII text, with very long lines (65536), with no line terminators
|
dropped
|
||
Chrome Cache Entry: 98
|
JPEG image data, JFIF standard 1.01, aspect ratio, density 1x1, segment length 16, progressive, precision 8, 1301x300, components
3
|
downloaded
|
||
Chrome Cache Entry: 99
|
ASCII text, with very long lines (46884)
|
dropped
|
There are 34 hidden files, click here to show them.
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\file.exe
|
"C:\Users\user\Desktop\file.exe"
|
||
C:\Program Files\Google\Chrome\Application\chrome.exe
|
"C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized --single-argument http://go.microsoft.com/fwlink/?prd=11324&pver=4.5&sbp=AppLaunch2&plcid=0x409&o1=SHIM_NOVERSION_FOUND&version=(null)&processName=file.exe&platform=0009&osver=6&isServer=0&shimver=4.0.30319.0
|
||
C:\Program Files\Google\Chrome\Application\chrome.exe
|
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US
--service-sandbox-type=none --mojo-platform-channel-handle=2052 --field-trial-handle=1988,i,5820746288978107784,3213896217040591065,262144
--disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction
/prefetch:8
|
||
C:\Program Files\Google\Chrome\Application\chrome.exe
|
"C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized --single-argument http://go.microsoft.com/fwlink/?prd=11324&pver=4.5&sbp=AppLaunch2&plcid=0x409&o1=SHIM_NOVERSION_FOUND&version=(null)&processName=file.exe&platform=0009&osver=6&isServer=0&shimver=4.0.30319.0
|
||
C:\Program Files\Google\Chrome\Application\chrome.exe
|
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US
--service-sandbox-type=none --mojo-platform-channel-handle=1712 --field-trial-handle=2020,i,16253832576636000712,15236952978649801762,262144
--disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction
/prefetch:8
|
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
https://authoring-docs-microsoft.poolparty.biz/devrel/7696cda6-0510-47f6-8302-71bb5d2e28cf
|
unknown
|
||
https://duckduckgo.com/chrome_newtab
|
unknown
|
||
https://cook-rain.sbs/L
|
unknown
|
||
https://duckduckgo.com/ac/?q=
|
unknown
|
||
https://github.com/dotnet/docs/blob/17c4acca45e573a92878a44a2cce57d699fe9c7c/docs/framework/install/
|
unknown
|
||
https://www.linkedin.com/cws/share?url=$
|
unknown
|
||
https://cook-rain.sbs/apiE
|
unknown
|
||
https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
|
unknown
|
||
https://www.amazon.com/?tag=admarketus-20&ref=pd_sl_
|
unknown
|
||
https://github.com/Youssef1313
|
unknown
|
||
https://management.azure.com/providers/Microsoft.Portal/userSettings/cloudconsole?api-version=2023-0
|
unknown
|
||
https://aka.ms/msignite_docs_banner
|
unknown
|
||
https://videoencodingpublic-hgeaeyeba8gycee3.b01.azurefd.net/public-b4da8140-92cf-421c-8b7b-e471d5b9
|
unknown
|
||
peepburry828.sbs
|
|||
http://polymer.github.io/AUTHORS.txt
|
unknown
|
||
https://github.com/dotnet/docs/issues/new?template=z-customer-feedback.yml
|
unknown
|
||
https://management.azure.com/subscriptions?api-version=2016-06-01
|
unknown
|
||
https://github.com/dotnet/docs/blob/main/docs/framework/install/application-not-started.md
|
unknown
|
||
http://x1.c.lencr.org/0
|
unknown
|
||
http://x1.i.lencr.org/0
|
unknown
|
||
https://aka.ms/pshelpmechoose
|
unknown
|
||
https://aka.ms/feedback/report?space=61
|
unknown
|
||
https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
|
unknown
|
||
https://learn-video.azurefd.net/vod/player
|
unknown
|
||
p10tgrace.sbs
|
|||
http://185.215.113.16/off/def.exel
|
unknown
|
||
https://twitter.com/intent/tweet?original_referer=$
|
unknown
|
||
https://github.com/gewarren
|
unknown
|
||
http://185.215.113.16/off/def.exepleWebKit/537.36
|
unknown
|
||
https://support.mozilla.org/products/firefoxgro.all
|
unknown
|
||
http://polymer.github.io/CONTRIBUTORS.txt
|
unknown
|
||
https://www.mozilla.or
|
unknown
|
||
processhol.sbs
|
|||
https://github.com/dotnet/docs/blob/live/docs/framework/install/application-not-started.md
|
unknown
|
||
https://authoring-docs-microsoft.poolparty.biz/devrel/69c76c32-967e-4c65-b89a-74cc527db725
|
unknown
|
||
https://client-api.arkoselabs.com/v2/api.js
|
unknown
|
||
https://aka.ms/MSIgniteChallenge/Tier1Banner?wt.mc_id=ignite24_learnbanner_tier1_cnl
|
unknown
|
||
https://management.azure.com/providers/Microsoft.Portal/consoles/default?api-version=2017-12-01-prev
|
unknown
|
||
https://www.google.com/images/branding/product/ico/googleg_lodp.ico
|
unknown
|
||
https://github.com/Thraka
|
unknown
|
||
https://cook-rain.sbs/api
|
188.114.97.3
|
||
https://imp.mt48.net/static?id=7RHzfOIXjFEYsBdvIpkX4Qqm4pLk4pqk4pbW1pbWfpbW7ReNxR3UIG8zInwYIFIVs9eYi
|
unknown
|
||
http://polymer.github.io/PATENTS.txt
|
unknown
|
||
https://aka.ms/certhelp
|
unknown
|
||
http://185.215.113.16/steam/random.exe
|
unknown
|
||
https://cook-rain.sbs/
|
unknown
|
||
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
|
unknown
|
||
http://crl.rootca1.amazontrust.com/rootca1.crl0
|
unknown
|
||
https://github.com/mairaw
|
unknown
|
||
https://js.monitor.azure.com/scripts/c/ms.jsll-4.min.js
|
13.107.246.45
|
||
http://ocsp.rootca1.amazontrust.com0:
|
unknown
|
||
https://schema.org
|
unknown
|
||
p3ar11fter.sbs
|
|||
http://polymer.github.io/LICENSE.txt
|
unknown
|
||
https://bridge.sfo1.admarketplace.net/ctp?version=16.0.0&key=1696484494400800000.2&ci=169648449
|
unknown
|
||
https://www.ecosia.org/newtab/
|
unknown
|
||
https://support.mozilla.org/kb/customize-firefox-controls-buttons-and-toolbars?utm_source=firefox-br
|
unknown
|
||
https://www.t-mobile.com/cell-phones/brand/apple?cmpid=MGPO_PAM_P_EVGRNIPHN_
|
unknown
|
||
https://aka.ms/yourcaliforniaprivacychoices
|
unknown
|
||
https://ac.ecosia.org/autocomplete?q=
|
unknown
|
||
https://github.com/nschonni
|
unknown
|
||
https://videoencodingpublic-hgeaeyeba8gycee3.b01.azurefd.net/public-09ce73a6-05a5-4e4d-b3d7-bd5a8c05
|
unknown
|
||
https://github.com/adegeo
|
unknown
|
||
http://crl.micro
|
unknown
|
||
https://contile-images.services.mozilla.com/obgoOYObjIFea_bXuT6L4LbBJ8j425AD87S1HMD3BWg.9991.jpg
|
unknown
|
||
https://github.com/jonschlinkert/is-plain-object
|
unknown
|
||
http://crt.rootca1.amazontrust.com/rootca1.cer0?
|
unknown
|
||
https://octokit.github.io/rest.js/#throttling
|
unknown
|
||
https://github.com/js-cookie/js-cookie
|
unknown
|
||
http://185.215.113.16/off/def.exe
|
unknown
|
||
http://schema.org/Organization
|
unknown
|
||
https://channel9.msdn.com/
|
unknown
|
||
https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
|
unknown
|
||
https://bridge.sfo1.ap01.net/ctp?version=16.0.0&key=1696484494400800000.1&ci=1696484494189.12791&cta
|
unknown
|
||
https://github.com/dotnet/try
|
unknown
|
There are 65 hidden URLs, click here to show them.
Domains
Name
|
IP
|
Malicious
|
|
---|---|---|---|
cook-rain.sbs
|
188.114.97.3
|
||
s-part-0017.t-0009.t-msedge.net
|
13.107.246.45
|
||
www.google.com
|
172.217.16.132
|
||
s-part-0032.t-0009.t-msedge.net
|
13.107.246.60
|
||
js.monitor.azure.com
|
unknown
|
||
mdec.nelreports.net
|
unknown
|
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
192.168.2.6
|
unknown
|
unknown
|
||
13.107.246.45
|
s-part-0017.t-0009.t-msedge.net
|
United States
|
||
185.215.113.16
|
unknown
|
Portugal
|
||
13.107.246.60
|
s-part-0032.t-0009.t-msedge.net
|
United States
|
||
188.114.97.3
|
cook-rain.sbs
|
European Union
|
||
239.255.255.250
|
unknown
|
Reserved
|
||
172.217.16.132
|
www.google.com
|
United States
|
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
4D1000
|
unkown
|
page execute and read and write
|
||
5AC6000
|
trusted library allocation
|
page read and write
|
||
581F000
|
trusted library allocation
|
page read and write
|
||
5CF1000
|
trusted library allocation
|
page read and write
|
||
5BE3000
|
trusted library allocation
|
page read and write
|
||
D90000
|
heap
|
page read and write
|
||
5819000
|
trusted library allocation
|
page read and write
|
||
5B81000
|
trusted library allocation
|
page read and write
|
||
F04000
|
heap
|
page read and write
|
||
5AC2000
|
trusted library allocation
|
page read and write
|
||
57C0000
|
trusted library allocation
|
page read and write
|
||
45AF000
|
stack
|
page read and write
|
||
5C30000
|
trusted library allocation
|
page read and write
|
||
5AC0000
|
trusted library allocation
|
page read and write
|
||
5ACD000
|
trusted library allocation
|
page read and write
|
||
8420000
|
trusted library allocation
|
page read and write
|
||
4E20000
|
direct allocation
|
page execute and read and write
|
||
583E000
|
trusted library allocation
|
page read and write
|
||
5AC6000
|
trusted library allocation
|
page read and write
|
||
4D0000
|
unkown
|
page read and write
|
||
5AC4000
|
trusted library allocation
|
page read and write
|
||
4E50000
|
direct allocation
|
page execute and read and write
|
||
3AAE000
|
stack
|
page read and write
|
||
580A000
|
trusted library allocation
|
page read and write
|
||
5846000
|
trusted library allocation
|
page read and write
|
||
EF0000
|
direct allocation
|
page read and write
|
||
57E0000
|
trusted library allocation
|
page read and write
|
||
5843000
|
trusted library allocation
|
page read and write
|
||
4840000
|
heap
|
page read and write
|
||
583E000
|
trusted library allocation
|
page read and write
|
||
5BEB000
|
trusted library allocation
|
page read and write
|
||
5B9D000
|
trusted library allocation
|
page read and write
|
||
F04000
|
heap
|
page read and write
|
||
581F000
|
trusted library allocation
|
page read and write
|
||
5AC3000
|
trusted library allocation
|
page read and write
|
||
EC7000
|
heap
|
page read and write
|
||
5886000
|
trusted library allocation
|
page read and write
|
||
580F000
|
trusted library allocation
|
page read and write
|
||
4831000
|
heap
|
page read and write
|
||
709E000
|
stack
|
page read and write
|
||
5AC4000
|
trusted library allocation
|
page read and write
|
||
2B10000
|
direct allocation
|
page read and write
|
||
57C4000
|
trusted library allocation
|
page read and write
|
||
5B86000
|
trusted library allocation
|
page read and write
|
||
57EF000
|
trusted library allocation
|
page read and write
|
||
5BD1000
|
trusted library allocation
|
page read and write
|
||
5B96000
|
trusted library allocation
|
page read and write
|
||
8270000
|
direct allocation
|
page execute and read and write
|
||
57F7000
|
trusted library allocation
|
page read and write
|
||
583E000
|
trusted library allocation
|
page read and write
|
||
57C1000
|
trusted library allocation
|
page read and write
|
||
5F6B000
|
trusted library allocation
|
page read and write
|
||
5AC6000
|
trusted library allocation
|
page read and write
|
||
ED8000
|
heap
|
page read and write
|
||
111F000
|
stack
|
page read and write
|
||
581D000
|
trusted library allocation
|
page read and write
|
||
57F6000
|
trusted library allocation
|
page read and write
|
||
5843000
|
trusted library allocation
|
page read and write
|
||
5843000
|
trusted library allocation
|
page read and write
|
||
2A3E000
|
stack
|
page read and write
|
||
2D2F000
|
stack
|
page read and write
|
||
EC5000
|
heap
|
page read and write
|
||
57F0000
|
trusted library allocation
|
page read and write
|
||
5843000
|
trusted library allocation
|
page read and write
|
||
745E000
|
stack
|
page read and write
|
||
57E6000
|
trusted library allocation
|
page read and write
|
||
5C0F000
|
trusted library allocation
|
page read and write
|
||
5843000
|
trusted library allocation
|
page read and write
|
||
EBB000
|
heap
|
page read and write
|
||
583B000
|
trusted library allocation
|
page read and write
|
||
5843000
|
trusted library allocation
|
page read and write
|
||
57DA000
|
trusted library allocation
|
page read and write
|
||
EE0000
|
heap
|
page read and write
|
||
EA5000
|
heap
|
page read and write
|
||
57F5000
|
trusted library allocation
|
page read and write
|
||
EC9000
|
heap
|
page read and write
|
||
5DBE000
|
stack
|
page read and write
|
||
80B0000
|
trusted library allocation
|
page read and write
|
||
80B0000
|
direct allocation
|
page read and write
|
||
583E000
|
trusted library allocation
|
page read and write
|
||
583E000
|
trusted library allocation
|
page read and write
|
||
5903000
|
trusted library allocation
|
page read and write
|
||
5809000
|
trusted library allocation
|
page read and write
|
||
583E000
|
trusted library allocation
|
page read and write
|
||
5AC7000
|
trusted library allocation
|
page read and write
|
||
4831000
|
heap
|
page read and write
|
||
5AC7000
|
trusted library allocation
|
page read and write
|
||
82A0000
|
direct allocation
|
page execute and read and write
|
||
57F3000
|
trusted library allocation
|
page read and write
|
||
7F9E000
|
stack
|
page read and write
|
||
5843000
|
trusted library allocation
|
page read and write
|
||
57EC000
|
trusted library allocation
|
page read and write
|
||
4F6D000
|
stack
|
page read and write
|
||
5854000
|
trusted library allocation
|
page read and write
|
||
35AE000
|
stack
|
page read and write
|
||
5BF1000
|
trusted library allocation
|
page read and write
|
||
5D7C000
|
stack
|
page read and write
|
||
57F6000
|
trusted library allocation
|
page read and write
|
||
583E000
|
trusted library allocation
|
page read and write
|
||
57C5000
|
trusted library allocation
|
page read and write
|
||
EBE000
|
heap
|
page read and write
|
||
5802000
|
trusted library allocation
|
page read and write
|
||
5843000
|
trusted library allocation
|
page read and write
|
||
3E2F000
|
stack
|
page read and write
|
||
80B0000
|
direct allocation
|
page read and write
|
||
EF0000
|
direct allocation
|
page read and write
|
||
5BF5000
|
trusted library allocation
|
page read and write
|
||
5809000
|
trusted library allocation
|
page read and write
|
||
5843000
|
trusted library allocation
|
page read and write
|
||
5BE1000
|
trusted library allocation
|
page read and write
|
||
5BC8000
|
trusted library allocation
|
page read and write
|
||
869C000
|
stack
|
page read and write
|
||
5BD2000
|
trusted library allocation
|
page read and write
|
||
57D5000
|
trusted library allocation
|
page read and write
|
||
57F6000
|
trusted library allocation
|
page read and write
|
||
4E7A000
|
trusted library allocation
|
page read and write
|
||
57F6000
|
trusted library allocation
|
page read and write
|
||
5B5B000
|
trusted library allocation
|
page read and write
|
||
5DFE000
|
stack
|
page read and write
|
||
57D8000
|
trusted library allocation
|
page read and write
|
||
5ACB000
|
trusted library allocation
|
page read and write
|
||
4831000
|
heap
|
page read and write
|
||
45EE000
|
stack
|
page read and write
|
||
7B9F000
|
stack
|
page read and write
|
||
56BD000
|
stack
|
page read and write
|
||
59A3000
|
trusted library allocation
|
page read and write
|
||
57D8000
|
trusted library allocation
|
page read and write
|
||
EBB000
|
heap
|
page read and write
|
||
5AC7000
|
trusted library allocation
|
page read and write
|
||
EB3000
|
heap
|
page read and write
|
||
5843000
|
trusted library allocation
|
page read and write
|
||
5E40000
|
direct allocation
|
page read and write
|
||
5807000
|
trusted library allocation
|
page read and write
|
||
6B5F000
|
stack
|
page read and write
|
||
EB2000
|
heap
|
page read and write
|
||
57EF000
|
trusted library allocation
|
page read and write
|
||
5843000
|
trusted library allocation
|
page read and write
|
||
5844000
|
trusted library allocation
|
page read and write
|
||
5AC5000
|
trusted library allocation
|
page read and write
|
||
EF0000
|
direct allocation
|
page read and write
|
||
5818000
|
trusted library allocation
|
page read and write
|
||
5AC6000
|
trusted library allocation
|
page read and write
|
||
5AC6000
|
trusted library allocation
|
page read and write
|
||
5AC5000
|
trusted library allocation
|
page read and write
|
||
879C000
|
stack
|
page read and write
|
||
58C2000
|
trusted library allocation
|
page read and write
|
||
57F6000
|
trusted library allocation
|
page read and write
|
||
5836000
|
trusted library allocation
|
page read and write
|
||
5864000
|
trusted library allocation
|
page read and write
|
||
57D2000
|
trusted library allocation
|
page read and write
|
||
5D07000
|
trusted library allocation
|
page read and write
|
||
57D6000
|
trusted library allocation
|
page read and write
|
||
580B000
|
trusted library allocation
|
page read and write
|
||
5BE0000
|
trusted library allocation
|
page read and write
|
||
57C5000
|
trusted library allocation
|
page read and write
|
||
57F6000
|
trusted library allocation
|
page read and write
|
||
6222000
|
trusted library allocation
|
page execute and read and write
|
||
5843000
|
trusted library allocation
|
page read and write
|
||
5834000
|
trusted library allocation
|
page read and write
|
||
6E1E000
|
stack
|
page read and write
|
||
57E0000
|
trusted library allocation
|
page read and write
|
||
5802000
|
trusted library allocation
|
page read and write
|
||
5ACD000
|
trusted library allocation
|
page read and write
|
||
583E000
|
trusted library allocation
|
page read and write
|
||
532F000
|
stack
|
page read and write
|
||
5843000
|
trusted library allocation
|
page read and write
|
||
4E20000
|
direct allocation
|
page execute and read and write
|
||
7A9E000
|
stack
|
page read and write
|
||
5B9F000
|
trusted library allocation
|
page read and write
|
||
583E000
|
trusted library allocation
|
page read and write
|
||
7E6000
|
unkown
|
page execute and read and write
|
||
5843000
|
trusted library allocation
|
page read and write
|
||
F04000
|
heap
|
page read and write
|
||
57E1000
|
trusted library allocation
|
page read and write
|
||
7CDF000
|
stack
|
page read and write
|
||
7F5F000
|
stack
|
page read and write
|
||
583E000
|
trusted library allocation
|
page read and write
|
||
E9D000
|
heap
|
page read and write
|
||
4DF0000
|
direct allocation
|
page execute and read and write
|
||
76DE000
|
stack
|
page read and write
|
||
5824000
|
trusted library allocation
|
page read and write
|
||
5853000
|
trusted library allocation
|
page read and write
|
||
5B9C000
|
trusted library allocation
|
page read and write
|
||
705F000
|
stack
|
page read and write
|
||
5CA6000
|
trusted library allocation
|
page read and write
|
||
57FB000
|
trusted library allocation
|
page read and write
|
||
C3B000
|
stack
|
page read and write
|
||
3A6F000
|
stack
|
page read and write
|
||
5AC2000
|
trusted library allocation
|
page read and write
|
||
5833000
|
trusted library allocation
|
page read and write
|
||
57C7000
|
trusted library allocation
|
page read and write
|
||
5ACF000
|
trusted library allocation
|
page read and write
|
||
809F000
|
stack
|
page read and write
|
||
57CF000
|
trusted library allocation
|
page read and write
|
||
8150000
|
heap
|
page read and write
|
||
5B67000
|
trusted library allocation
|
page read and write
|
||
101E000
|
stack
|
page read and write
|
||
57F6000
|
trusted library allocation
|
page read and write
|
||
4831000
|
heap
|
page read and write
|
||
5CCD000
|
trusted library allocation
|
page read and write
|
||
7A5F000
|
stack
|
page read and write
|
||
5843000
|
trusted library allocation
|
page read and write
|
||
5A3B000
|
trusted library allocation
|
page read and write
|
||
57E5000
|
trusted library allocation
|
page read and write
|
||
4831000
|
heap
|
page read and write
|
||
5843000
|
trusted library allocation
|
page read and write
|
||
5AC8000
|
trusted library allocation
|
page read and write
|
||
F04000
|
heap
|
page read and write
|
||
5BBB000
|
trusted library allocation
|
page read and write
|
||
59AB000
|
trusted library allocation
|
page read and write
|
||
57D5000
|
trusted library allocation
|
page read and write
|
||
5843000
|
trusted library allocation
|
page read and write
|
||
4831000
|
heap
|
page read and write
|
||
5B9D000
|
trusted library allocation
|
page read and write
|
||
5843000
|
trusted library allocation
|
page read and write
|
||
382E000
|
stack
|
page read and write
|
||
57F6000
|
trusted library allocation
|
page read and write
|
||
57F6000
|
trusted library allocation
|
page read and write
|
||
582D000
|
trusted library allocation
|
page read and write
|
||
57F0000
|
trusted library allocation
|
page read and write
|
||
5843000
|
trusted library allocation
|
page read and write
|
||
6CDE000
|
stack
|
page read and write
|
||
5843000
|
trusted library allocation
|
page read and write
|
||
57D7000
|
trusted library allocation
|
page read and write
|
||
EC2000
|
heap
|
page read and write
|
||
57FE000
|
trusted library allocation
|
page read and write
|
||
57CE000
|
trusted library allocation
|
page read and write
|
||
57D3000
|
trusted library allocation
|
page read and write
|
||
583E000
|
trusted library allocation
|
page read and write
|
||
6226000
|
trusted library allocation
|
page read and write
|
||
4E00000
|
direct allocation
|
page execute and read and write
|
||
583E000
|
trusted library allocation
|
page read and write
|
||
57CB000
|
trusted library allocation
|
page read and write
|
||
549F000
|
stack
|
page read and write
|
||
5853000
|
trusted library allocation
|
page read and write
|
||
5B5F000
|
trusted library allocation
|
page read and write
|
||
825E000
|
stack
|
page read and write
|
||
583E000
|
trusted library allocation
|
page read and write
|
||
5CA8000
|
trusted library allocation
|
page read and write
|
||
4E40000
|
direct allocation
|
page execute and read and write
|
||
5BF2000
|
trusted library allocation
|
page read and write
|
||
5ACF000
|
trusted library allocation
|
page read and write
|
||
57E1000
|
trusted library allocation
|
page read and write
|
||
5F6A000
|
trusted library allocation
|
page read and write
|
||
422E000
|
stack
|
page read and write
|
||
4831000
|
heap
|
page read and write
|
||
5843000
|
trusted library allocation
|
page read and write
|
||
583E000
|
trusted library allocation
|
page read and write
|
||
583E000
|
trusted library allocation
|
page read and write
|
||
5843000
|
trusted library allocation
|
page read and write
|
||
57D5000
|
trusted library allocation
|
page read and write
|
||
57D5000
|
trusted library allocation
|
page read and write
|
||
5829000
|
trusted library allocation
|
page read and write
|
||
57F1000
|
trusted library allocation
|
page read and write
|
||
5C8D000
|
trusted library allocation
|
page read and write
|
||
580E000
|
trusted library allocation
|
page read and write
|
||
7E7000
|
unkown
|
page execute and write copy
|
||
5849000
|
trusted library allocation
|
page read and write
|
||
80B0000
|
direct allocation
|
page read and write
|
||
5ACF000
|
trusted library allocation
|
page read and write
|
||
57F6000
|
trusted library allocation
|
page read and write
|
||
57F6000
|
trusted library allocation
|
page read and write
|
||
ED5000
|
heap
|
page read and write
|
||
306F000
|
stack
|
page read and write
|
||
5BF4000
|
trusted library allocation
|
page read and write
|
||
F04000
|
heap
|
page read and write
|
||
583D000
|
trusted library allocation
|
page read and write
|
||
332E000
|
stack
|
page read and write
|
||
539E000
|
stack
|
page read and write
|
||
5B9F000
|
trusted library allocation
|
page read and write
|
||
795E000
|
stack
|
page read and write
|
||
5849000
|
trusted library allocation
|
page read and write
|
||
5843000
|
trusted library allocation
|
page read and write
|
||
77DF000
|
stack
|
page read and write
|
||
57E5000
|
trusted library allocation
|
page read and write
|
||
5AC5000
|
trusted library allocation
|
page read and write
|
||
583E000
|
trusted library allocation
|
page read and write
|
||
57E5000
|
trusted library allocation
|
page read and write
|
||
482F000
|
stack
|
page read and write
|
||
993000
|
unkown
|
page execute and read and write
|
||
5BEF000
|
trusted library allocation
|
page read and write
|
||
5BF4000
|
trusted library allocation
|
page read and write
|
||
5846000
|
trusted library allocation
|
page read and write
|
||
580F000
|
trusted library allocation
|
page read and write
|
||
EC7000
|
heap
|
page read and write
|
||
8110000
|
direct allocation
|
page read and write
|
||
5836000
|
trusted library allocation
|
page read and write
|
||
EF0000
|
direct allocation
|
page read and write
|
||
EC2000
|
heap
|
page read and write
|
||
57F5000
|
trusted library allocation
|
page read and write
|
||
5CEF000
|
trusted library allocation
|
page read and write
|
||
5AC3000
|
trusted library allocation
|
page read and write
|
||
57E5000
|
trusted library allocation
|
page read and write
|
||
5BB4000
|
trusted library allocation
|
page read and write
|
||
80E0000
|
trusted library allocation
|
page read and write
|
||
5C1A000
|
trusted library allocation
|
page read and write
|
||
A3CF000
|
stack
|
page read and write
|
||
581B000
|
trusted library allocation
|
page read and write
|
||
ED4000
|
heap
|
page read and write
|
||
40EE000
|
stack
|
page read and write
|
||
5850000
|
trusted library allocation
|
page read and write
|
||
57D3000
|
trusted library allocation
|
page read and write
|
||
4831000
|
heap
|
page read and write
|
||
5BB4000
|
trusted library allocation
|
page read and write
|
||
5ACB000
|
trusted library allocation
|
page read and write
|
||
F04000
|
heap
|
page read and write
|
||
583E000
|
trusted library allocation
|
page read and write
|
||
37EF000
|
stack
|
page read and write
|
||
80B0000
|
direct allocation
|
page read and write
|
||
5C18000
|
trusted library allocation
|
page read and write
|
||
63AF000
|
trusted library allocation
|
page execute and read and write
|
||
2B10000
|
direct allocation
|
page read and write
|
||
5CDF000
|
trusted library allocation
|
page read and write
|
||
EB2000
|
heap
|
page read and write
|
||
583E000
|
trusted library allocation
|
page read and write
|
||
432F000
|
stack
|
page read and write
|
||
5824000
|
trusted library allocation
|
page read and write
|
||
583E000
|
trusted library allocation
|
page read and write
|
||
5843000
|
trusted library allocation
|
page read and write
|
||
3CEF000
|
stack
|
page read and write
|
||
EC2000
|
heap
|
page read and write
|
||
57C8000
|
trusted library allocation
|
page read and write
|
||
731E000
|
stack
|
page read and write
|
||
EBE000
|
heap
|
page read and write
|
||
5AD1000
|
trusted library allocation
|
page read and write
|
||
80B0000
|
direct allocation
|
page read and write
|
||
F04000
|
heap
|
page read and write
|
||
5843000
|
trusted library allocation
|
page read and write
|
||
759E000
|
stack
|
page read and write
|
||
57FB000
|
trusted library allocation
|
page read and write
|
||
4FAD000
|
stack
|
page read and write
|
||
446F000
|
stack
|
page read and write
|
||
57F1000
|
trusted library allocation
|
page read and write
|
||
57E5000
|
trusted library allocation
|
page read and write
|
||
66DF000
|
stack
|
page read and write
|
||
57F6000
|
trusted library allocation
|
page read and write
|
||
2F6E000
|
stack
|
page read and write
|
||
5ACF000
|
trusted library allocation
|
page read and write
|
||
584A000
|
trusted library allocation
|
page read and write
|
||
51EF000
|
stack
|
page read and write
|
||
2A7C000
|
stack
|
page read and write
|
||
5816000
|
trusted library allocation
|
page read and write
|
||
522E000
|
stack
|
page read and write
|
||
4C70000
|
heap
|
page read and write
|
||
583E000
|
trusted library allocation
|
page read and write
|
||
5B7A000
|
trusted library allocation
|
page read and write
|
||
6B8000
|
unkown
|
page execute and read and write
|
||
5827000
|
trusted library allocation
|
page read and write
|
||
6DDF000
|
stack
|
page read and write
|
||
581E000
|
trusted library allocation
|
page read and write
|
||
57E6000
|
trusted library allocation
|
page read and write
|
||
5D09000
|
trusted library allocation
|
page read and write
|
||
5C4E000
|
trusted library allocation
|
page read and write
|
||
5846000
|
trusted library allocation
|
page read and write
|
||
EC2000
|
heap
|
page read and write
|
||
3BEE000
|
stack
|
page read and write
|
||
57EF000
|
trusted library allocation
|
page read and write
|
||
ECB000
|
heap
|
page read and write
|
||
57E6000
|
trusted library allocation
|
page read and write
|
||
71DE000
|
stack
|
page read and write
|
||
5C36000
|
trusted library allocation
|
page read and write
|
||
5C4C000
|
trusted library allocation
|
page read and write
|
||
5B9A000
|
trusted library allocation
|
page read and write
|
||
5835000
|
trusted library allocation
|
page read and write
|
||
7D7000
|
unkown
|
page execute and read and write
|
||
5BED000
|
trusted library allocation
|
page read and write
|
||
50EE000
|
stack
|
page read and write
|
||
4831000
|
heap
|
page read and write
|
||
57D5000
|
trusted library allocation
|
page read and write
|
||
583E000
|
trusted library allocation
|
page read and write
|
||
5843000
|
trusted library allocation
|
page read and write
|
||
57ED000
|
trusted library allocation
|
page read and write
|
||
5E3E000
|
stack
|
page read and write
|
||
5F69000
|
trusted library allocation
|
page read and write
|
||
5812000
|
trusted library allocation
|
page read and write
|
||
41EF000
|
stack
|
page read and write
|
||
57E5000
|
trusted library allocation
|
page read and write
|
||
57E6000
|
trusted library allocation
|
page read and write
|
||
583E000
|
trusted library allocation
|
page read and write
|
||
5AC5000
|
trusted library allocation
|
page read and write
|
||
EF0000
|
direct allocation
|
page read and write
|
||
4CF4000
|
direct allocation
|
page read and write
|
||
589A000
|
trusted library allocation
|
page read and write
|
||
57F6000
|
trusted library allocation
|
page read and write
|
||
80B0000
|
direct allocation
|
page read and write
|
||
5330000
|
remote allocation
|
page read and write
|
||
ED4000
|
heap
|
page read and write
|
||
68DF000
|
stack
|
page read and write
|
||
5B55000
|
trusted library allocation
|
page read and write
|
||
583E000
|
trusted library allocation
|
page read and write
|
||
DEA000
|
heap
|
page read and write
|
||
5843000
|
trusted library allocation
|
page read and write
|
||
EAE000
|
heap
|
page read and write
|
||
5C0F000
|
trusted library allocation
|
page read and write
|
||
5BF3000
|
trusted library allocation
|
page read and write
|
||
719F000
|
stack
|
page read and write
|
||
57D2000
|
trusted library allocation
|
page read and write
|
||
46EF000
|
stack
|
page read and write
|
||
57D5000
|
trusted library allocation
|
page read and write
|
||
5BCF000
|
trusted library allocation
|
page read and write
|
||
5843000
|
trusted library allocation
|
page read and write
|
||
5B6F000
|
trusted library allocation
|
page read and write
|
||
583E000
|
trusted library allocation
|
page read and write
|
||
57E6000
|
trusted library allocation
|
page read and write
|
||
80B0000
|
direct allocation
|
page read and write
|
||
584B000
|
trusted library allocation
|
page read and write
|
||
583E000
|
trusted library allocation
|
page read and write
|
||
57D2000
|
trusted library allocation
|
page read and write
|
||
5AC0000
|
trusted library allocation
|
page read and write
|
||
2F2F000
|
stack
|
page read and write
|
||
5B5D000
|
trusted library allocation
|
page read and write
|
||
31AF000
|
stack
|
page read and write
|
||
5AC7000
|
trusted library allocation
|
page read and write
|
||
57F8000
|
trusted library allocation
|
page read and write
|
||
5AC5000
|
trusted library allocation
|
page read and write
|
||
ED4000
|
heap
|
page read and write
|
||
57F6000
|
trusted library allocation
|
page read and write
|
||
EF0000
|
direct allocation
|
page read and write
|
||
57C4000
|
trusted library allocation
|
page read and write
|
||
5843000
|
trusted library allocation
|
page read and write
|
||
5853000
|
trusted library allocation
|
page read and write
|
||
40AF000
|
stack
|
page read and write
|
||
582D000
|
trusted library allocation
|
page read and write
|
||
EF0000
|
direct allocation
|
page read and write
|
||
342F000
|
stack
|
page read and write
|
||
8422000
|
trusted library allocation
|
page read and write
|
||
5B65000
|
trusted library allocation
|
page read and write
|
||
58D2000
|
trusted library allocation
|
page read and write
|
||
5DC2000
|
trusted library allocation
|
page read and write
|
||
5AC2000
|
trusted library allocation
|
page read and write
|
||
5B66000
|
trusted library allocation
|
page read and write
|
||
583E000
|
trusted library allocation
|
page read and write
|
||
5811000
|
trusted library allocation
|
page read and write
|
||
5833000
|
trusted library allocation
|
page read and write
|
||
755F000
|
stack
|
page read and write
|
||
36AF000
|
stack
|
page read and write
|
||
583E000
|
trusted library allocation
|
page read and write
|
||
5AC4000
|
trusted library allocation
|
page read and write
|
||
5AC0000
|
trusted library allocation
|
page read and write
|
||
5C0D000
|
trusted library allocation
|
page read and write
|
||
80B0000
|
direct allocation
|
page read and write
|
||
60F4000
|
trusted library allocation
|
page read and write
|
||
F00000
|
heap
|
page read and write
|
||
57D5000
|
trusted library allocation
|
page read and write
|
||
5BC6000
|
trusted library allocation
|
page read and write
|
||
58CC000
|
trusted library allocation
|
page read and write
|
||
5AC4000
|
trusted library allocation
|
page read and write
|
||
5C0F000
|
trusted library allocation
|
page read and write
|
||
57F7000
|
trusted library allocation
|
page read and write
|
||
5843000
|
trusted library allocation
|
page read and write
|
||
583E000
|
trusted library allocation
|
page read and write
|
||
5BE8000
|
trusted library allocation
|
page read and write
|
||
5814000
|
trusted library allocation
|
page read and write
|
||
560F000
|
stack
|
page read and write
|
||
5C12000
|
trusted library allocation
|
page read and write
|
||
57D5000
|
trusted library allocation
|
page read and write
|
||
5AC3000
|
trusted library allocation
|
page read and write
|
||
741F000
|
stack
|
page read and write
|
||
57F6000
|
trusted library allocation
|
page read and write
|
||
F04000
|
heap
|
page read and write
|
||
5BF2000
|
trusted library allocation
|
page read and write
|
||
436E000
|
stack
|
page read and write
|
||
5843000
|
trusted library allocation
|
page read and write
|
||
5670000
|
heap
|
page read and write
|
||
EC1000
|
heap
|
page read and write
|
||
4831000
|
heap
|
page read and write
|
||
5BBD000
|
trusted library allocation
|
page read and write
|
||
DEE000
|
heap
|
page read and write
|
||
7E5E000
|
stack
|
page read and write
|
||
583E000
|
trusted library allocation
|
page read and write
|
||
5AC4000
|
trusted library allocation
|
page read and write
|
||
5AC5000
|
trusted library allocation
|
page read and write
|
||
E49000
|
heap
|
page read and write
|
||
58C2000
|
trusted library allocation
|
page read and write
|
||
4E30000
|
direct allocation
|
page execute and read and write
|
||
EC2000
|
heap
|
page read and write
|
||
5C8B000
|
trusted library allocation
|
page read and write
|
||
5C46000
|
trusted library allocation
|
page read and write
|
||
E18000
|
heap
|
page read and write
|
||
587C000
|
trusted library allocation
|
page read and write
|
||
4831000
|
heap
|
page read and write
|
||
5BE2000
|
trusted library allocation
|
page read and write
|
||
5673000
|
heap
|
page read and write
|
||
5C73000
|
trusted library allocation
|
page read and write
|
||
583D000
|
trusted library allocation
|
page read and write
|
||
581E000
|
trusted library allocation
|
page read and write
|
||
5AC6000
|
trusted library allocation
|
page read and write
|
||
5CD1000
|
trusted library allocation
|
page read and write
|
||
585C000
|
trusted library allocation
|
page read and write
|
||
583E000
|
trusted library allocation
|
page read and write
|
||
5B7A000
|
trusted library allocation
|
page read and write
|
||
5CCF000
|
trusted library allocation
|
page read and write
|
||
50AD000
|
stack
|
page read and write
|
||
57D5000
|
trusted library allocation
|
page read and write
|
||
87DE000
|
stack
|
page read and write
|
||
57DB000
|
trusted library allocation
|
page read and write
|
||
57E6000
|
trusted library allocation
|
page read and write
|
||
57FE000
|
trusted library allocation
|
page read and write
|
||
583E000
|
trusted library allocation
|
page read and write
|
||
57E6000
|
trusted library allocation
|
page read and write
|
||
4E20000
|
direct allocation
|
page execute and read and write
|
||
2B20000
|
heap
|
page read and write
|
||
57E8000
|
trusted library allocation
|
page read and write
|
||
57F6000
|
trusted library allocation
|
page read and write
|
||
842A000
|
trusted library allocation
|
page read and write
|
||
4DEF000
|
stack
|
page read and write
|
||
F04000
|
heap
|
page read and write
|
||
5830000
|
trusted library allocation
|
page read and write
|
||
583E000
|
trusted library allocation
|
page read and write
|
||
5866000
|
trusted library allocation
|
page read and write
|
||
EC2000
|
heap
|
page read and write
|
||
ED6000
|
heap
|
page read and write
|
||
5C75000
|
trusted library allocation
|
page read and write
|
||
57E6000
|
trusted library allocation
|
page read and write
|
||
5ACC000
|
trusted library allocation
|
page read and write
|
||
5AC7000
|
trusted library allocation
|
page read and write
|
||
4D0000
|
unkown
|
page readonly
|
||
4CB0000
|
direct allocation
|
page read and write
|
||
57F6000
|
trusted library allocation
|
page read and write
|
||
583E000
|
trusted library allocation
|
page read and write
|
||
57F5000
|
trusted library allocation
|
page read and write
|
||
62DC000
|
trusted library allocation
|
page read and write
|
||
5B6D000
|
trusted library allocation
|
page read and write
|
||
57F6000
|
trusted library allocation
|
page read and write
|
||
5AC2000
|
trusted library allocation
|
page read and write
|
||
5B98000
|
trusted library allocation
|
page read and write
|
||
5BE4000
|
trusted library allocation
|
page read and write
|
||
57D5000
|
trusted library allocation
|
page read and write
|
||
6F5E000
|
stack
|
page read and write
|
||
5C10000
|
trusted library allocation
|
page read and write
|
||
5C44000
|
trusted library allocation
|
page read and write
|
||
57CB000
|
trusted library allocation
|
page read and write
|
||
80B0000
|
direct allocation
|
page read and write
|
||
5843000
|
trusted library allocation
|
page read and write
|
||
EBF000
|
heap
|
page read and write
|
||
584B000
|
trusted library allocation
|
page read and write
|
||
5AF9000
|
stack
|
page read and write
|
||
EC8000
|
heap
|
page read and write
|
||
ED7000
|
heap
|
page read and write
|
||
5B98000
|
trusted library allocation
|
page read and write
|
||
31EE000
|
stack
|
page read and write
|
||
5E54000
|
trusted library allocation
|
page read and write
|
||
5954000
|
trusted library allocation
|
page read and write
|
||
57E6000
|
trusted library allocation
|
page read and write
|
||
5807000
|
trusted library allocation
|
page read and write
|
||
F04000
|
heap
|
page read and write
|
||
4E10000
|
direct allocation
|
page execute and read and write
|
||
5835000
|
trusted library allocation
|
page read and write
|
||
580D000
|
trusted library allocation
|
page read and write
|
||
5843000
|
trusted library allocation
|
page read and write
|
||
583E000
|
trusted library allocation
|
page read and write
|
||
125E000
|
stack
|
page read and write
|
||
57F8000
|
trusted library allocation
|
page read and write
|
||
57CF000
|
trusted library allocation
|
page read and write
|
||
5F68000
|
trusted library allocation
|
page read and write
|
||
57D0000
|
trusted library allocation
|
page read and write
|
||
36EE000
|
stack
|
page read and write
|
||
583E000
|
trusted library allocation
|
page read and write
|
||
EBE000
|
heap
|
page read and write
|
||
3E6D000
|
stack
|
page read and write
|
||
515000
|
unkown
|
page execute and read and write
|
||
5825000
|
trusted library allocation
|
page read and write
|
||
5AC9000
|
trusted library allocation
|
page read and write
|
||
5B53000
|
trusted library allocation
|
page read and write
|
||
ED9000
|
heap
|
page read and write
|
||
57E5000
|
trusted library allocation
|
page read and write
|
||
3BAF000
|
stack
|
page read and write
|
||
5843000
|
trusted library allocation
|
page read and write
|
||
5ACF000
|
trusted library allocation
|
page read and write
|
||
64CC000
|
trusted library allocation
|
page execute and read and write
|
||
5843000
|
trusted library allocation
|
page read and write
|
||
57FC000
|
trusted library allocation
|
page read and write
|
||
EB2000
|
heap
|
page read and write
|
||
57E6000
|
trusted library allocation
|
page read and write
|
||
57E5000
|
trusted library allocation
|
page read and write
|
||
356F000
|
stack
|
page read and write
|
||
5B68000
|
trusted library allocation
|
page read and write
|
||
57C2000
|
trusted library allocation
|
page read and write
|
||
5846000
|
trusted library allocation
|
page read and write
|
||
528000
|
unkown
|
page execute and read and write
|
||
585E000
|
trusted library allocation
|
page read and write
|
||
57F8000
|
trusted library allocation
|
page read and write
|
||
583E000
|
trusted library allocation
|
page read and write
|
||
EF0000
|
direct allocation
|
page read and write
|
||
5BC5000
|
trusted library allocation
|
page read and write
|
||
5AC6000
|
trusted library allocation
|
page read and write
|
||
4831000
|
heap
|
page read and write
|
||
5AC7000
|
trusted library allocation
|
page read and write
|
||
F04000
|
heap
|
page read and write
|
||
5973000
|
trusted library allocation
|
page read and write
|
||
ECA000
|
heap
|
page read and write
|
||
581D000
|
trusted library allocation
|
page read and write
|
||
769F000
|
stack
|
page read and write
|
||
4E20000
|
direct allocation
|
page execute and read and write
|
||
4CEB000
|
stack
|
page read and write
|
||
F04000
|
heap
|
page read and write
|
||
5ACE000
|
trusted library allocation
|
page read and write
|
||
4831000
|
heap
|
page read and write
|
||
57F6000
|
trusted library allocation
|
page read and write
|
||
583E000
|
trusted library allocation
|
page read and write
|
||
5BB6000
|
trusted library allocation
|
page read and write
|
||
5AC8000
|
trusted library allocation
|
page read and write
|
||
583E000
|
trusted library allocation
|
page read and write
|
||
5843000
|
trusted library allocation
|
page read and write
|
||
32EF000
|
stack
|
page read and write
|
||
57E6000
|
trusted library allocation
|
page read and write
|
||
7BDE000
|
stack
|
page read and write
|
||
5AC1000
|
trusted library allocation
|
page read and write
|
||
5805000
|
trusted library allocation
|
page read and write
|
||
F04000
|
heap
|
page read and write
|
||
5833000
|
trusted library allocation
|
page read and write
|
||
583E000
|
trusted library allocation
|
page read and write
|
||
6220000
|
trusted library allocation
|
page read and write
|
||
5AC2000
|
trusted library allocation
|
page read and write
|
||
5AC6000
|
trusted library allocation
|
page read and write
|
||
5805000
|
trusted library allocation
|
page read and write
|
||
5BED000
|
trusted library allocation
|
page read and write
|
||
F04000
|
heap
|
page read and write
|
||
5827000
|
trusted library allocation
|
page read and write
|
||
44AE000
|
stack
|
page read and write
|
||
5AC1000
|
trusted library allocation
|
page read and write
|
||
F04000
|
heap
|
page read and write
|
||
72DF000
|
stack
|
page read and write
|
||
5952000
|
trusted library allocation
|
page read and write
|
||
8360000
|
trusted library allocation
|
page read and write
|
||
584B000
|
trusted library allocation
|
page read and write
|
||
5F6C000
|
trusted library allocation
|
page read and write
|
||
5B87000
|
trusted library allocation
|
page read and write
|
||
5AC2000
|
trusted library allocation
|
page read and write
|
||
F04000
|
heap
|
page read and write
|
||
6F1F000
|
stack
|
page read and write
|
||
57E5000
|
trusted library allocation
|
page read and write
|
||
5AC8000
|
trusted library allocation
|
page read and write
|
||
7E6000
|
unkown
|
page execute and write copy
|
||
5BEC000
|
trusted library allocation
|
page read and write
|
||
589A000
|
trusted library allocation
|
page read and write
|
||
5837000
|
trusted library allocation
|
page read and write
|
||
5BE2000
|
trusted library allocation
|
page read and write
|
||
5CE1000
|
trusted library allocation
|
page read and write
|
||
5806000
|
trusted library allocation
|
page read and write
|
||
F04000
|
heap
|
page read and write
|
||
5827000
|
trusted library allocation
|
page read and write
|
||
791F000
|
stack
|
page read and write
|
||
583E000
|
trusted library allocation
|
page read and write
|
||
80B0000
|
direct allocation
|
page read and write
|
||
57F0000
|
trusted library allocation
|
page read and write
|
||
EA5000
|
heap
|
page read and write
|
||
EF0000
|
direct allocation
|
page read and write
|
||
5843000
|
trusted library allocation
|
page read and write
|
||
5D3F000
|
stack
|
page read and write
|
||
D80000
|
heap
|
page read and write
|
||
57F6000
|
trusted library allocation
|
page read and write
|
||
6210000
|
trusted library allocation
|
page read and write
|
||
5BAA000
|
trusted library allocation
|
page read and write
|
||
5AC9000
|
trusted library allocation
|
page read and write
|
||
583E000
|
trusted library allocation
|
page read and write
|
||
5ACC000
|
trusted library allocation
|
page read and write
|
||
5843000
|
trusted library allocation
|
page read and write
|
||
57F6000
|
trusted library allocation
|
page read and write
|
||
57F3000
|
trusted library allocation
|
page read and write
|
||
5BC3000
|
trusted library allocation
|
page read and write
|
||
5806000
|
trusted library allocation
|
page read and write
|
||
5AC5000
|
trusted library allocation
|
page read and write
|
||
5AC5000
|
trusted library allocation
|
page read and write
|
||
5AC0000
|
trusted library allocation
|
page read and write
|
||
6A5E000
|
stack
|
page read and write
|
||
6C9F000
|
stack
|
page read and write
|
||
781E000
|
stack
|
page read and write
|
||
5F67000
|
trusted library allocation
|
page read and write
|
||
5C11000
|
trusted library allocation
|
page read and write
|
||
EC2000
|
heap
|
page read and write
|
||
5AC4000
|
trusted library allocation
|
page read and write
|
||
583E000
|
trusted library allocation
|
page read and write
|
||
57F0000
|
trusted library allocation
|
page read and write
|
||
EBE000
|
heap
|
page read and write
|
||
65DF000
|
stack
|
page read and write
|
||
5843000
|
trusted library allocation
|
page read and write
|
||
5AD1000
|
trusted library allocation
|
page read and write
|
||
80B0000
|
direct allocation
|
page read and write
|
||
5AC0000
|
trusted library allocation
|
page read and write
|
||
4831000
|
heap
|
page read and write
|
||
5ACD000
|
trusted library allocation
|
page read and write
|
||
ED9000
|
heap
|
page read and write
|
||
5823000
|
trusted library allocation
|
page read and write
|
||
57C5000
|
trusted library allocation
|
page read and write
|
||
EF0000
|
direct allocation
|
page read and write
|
||
80F0000
|
heap
|
page read and write
|
||
550E000
|
stack
|
page read and write
|
||
57F5000
|
trusted library allocation
|
page read and write
|
||
392F000
|
stack
|
page read and write
|
||
5844000
|
trusted library allocation
|
page read and write
|
||
5330000
|
remote allocation
|
page read and write
|
||
583E000
|
trusted library allocation
|
page read and write
|
||
4831000
|
heap
|
page read and write
|
||
5819000
|
trusted library allocation
|
page read and write
|
||
994000
|
unkown
|
page execute and write copy
|
||
5841000
|
trusted library allocation
|
page read and write
|
||
EBE000
|
heap
|
page read and write
|
||
5843000
|
trusted library allocation
|
page read and write
|
||
EF0000
|
direct allocation
|
page read and write
|
||
ED8000
|
heap
|
page read and write
|
||
EBE000
|
heap
|
page read and write
|
||
5B78000
|
trusted library allocation
|
page read and write
|
||
5825000
|
trusted library allocation
|
page read and write
|
||
5854000
|
trusted library allocation
|
page read and write
|
||
5814000
|
trusted library allocation
|
page read and write
|
||
5AC2000
|
trusted library allocation
|
page read and write
|
||
EB3000
|
heap
|
page read and write
|
||
5843000
|
trusted library allocation
|
page read and write
|
||
5802000
|
trusted library allocation
|
page read and write
|
||
5829000
|
trusted library allocation
|
page read and write
|
||
F04000
|
heap
|
page read and write
|
||
5AC7000
|
trusted library allocation
|
page read and write
|
||
583E000
|
trusted library allocation
|
page read and write
|
||
EC8000
|
heap
|
page read and write
|
||
5AC1000
|
trusted library allocation
|
page read and write
|
||
5803000
|
trusted library allocation
|
page read and write
|
||
7D1E000
|
stack
|
page read and write
|
||
4831000
|
heap
|
page read and write
|
||
2E2F000
|
stack
|
page read and write
|
||
ED7000
|
heap
|
page read and write
|
||
580A000
|
trusted library allocation
|
page read and write
|
||
584B000
|
trusted library allocation
|
page read and write
|
||
58C0000
|
trusted library allocation
|
page read and write
|
||
5864000
|
trusted library allocation
|
page read and write
|
||
5843000
|
trusted library allocation
|
page read and write
|
||
6B9E000
|
stack
|
page read and write
|
||
5843000
|
trusted library allocation
|
page read and write
|
||
57DA000
|
trusted library allocation
|
page read and write
|
||
EC2000
|
heap
|
page read and write
|
||
9AD0000
|
trusted library allocation
|
page read and write
|
||
5AC5000
|
trusted library allocation
|
page read and write
|
||
5AC5000
|
trusted library allocation
|
page read and write
|
||
EF0000
|
direct allocation
|
page read and write
|
||
5871000
|
trusted library allocation
|
page read and write
|
||
5ACC000
|
trusted library allocation
|
page read and write
|
||
4E60000
|
direct allocation
|
page execute and read and write
|
||
57D2000
|
trusted library allocation
|
page read and write
|
||
5DCC000
|
trusted library allocation
|
page read and write
|
||
5C0F000
|
trusted library allocation
|
page read and write
|
||
5BBD000
|
trusted library allocation
|
page read and write
|
||
5808000
|
trusted library allocation
|
page read and write
|
||
5C11000
|
trusted library allocation
|
page read and write
|
||
8110000
|
direct allocation
|
page read and write
|
||
5843000
|
trusted library allocation
|
page read and write
|
||
58EB000
|
trusted library allocation
|
page read and write
|
||
5BB2000
|
trusted library allocation
|
page read and write
|
||
3D2E000
|
stack
|
page read and write
|
||
4831000
|
heap
|
page read and write
|
||
583E000
|
trusted library allocation
|
page read and write
|
||
5B83000
|
trusted library allocation
|
page read and write
|
||
5843000
|
trusted library allocation
|
page read and write
|
||
583E000
|
trusted library allocation
|
page read and write
|
||
EC8000
|
heap
|
page read and write
|
||
581D000
|
trusted library allocation
|
page read and write
|
||
5330000
|
remote allocation
|
page read and write
|
||
5827000
|
trusted library allocation
|
page read and write
|
||
57C8000
|
trusted library allocation
|
page read and write
|
||
5C11000
|
trusted library allocation
|
page read and write
|
||
57E6000
|
trusted library allocation
|
page read and write
|
||
581E000
|
trusted library allocation
|
page read and write
|
||
5832000
|
trusted library allocation
|
page read and write
|
||
5AC7000
|
trusted library allocation
|
page read and write
|
||
E32000
|
heap
|
page read and write
|
||
5BF3000
|
trusted library allocation
|
page read and write
|
||
57F6000
|
trusted library allocation
|
page read and write
|
||
5843000
|
trusted library allocation
|
page read and write
|
||
4E20000
|
direct allocation
|
page execute and read and write
|
||
5C2E000
|
trusted library allocation
|
page read and write
|
||
57E0000
|
trusted library allocation
|
page read and write
|
||
5844000
|
trusted library allocation
|
page read and write
|
||
5843000
|
trusted library allocation
|
page read and write
|
||
5B7C000
|
trusted library allocation
|
page read and write
|
||
7E1F000
|
stack
|
page read and write
|
||
5BBF000
|
trusted library allocation
|
page read and write
|
||
5AC7000
|
trusted library allocation
|
page read and write
|
||
57D9000
|
trusted library allocation
|
page read and write
|
||
64BE000
|
trusted library allocation
|
page execute and read and write
|
||
5BD4000
|
trusted library allocation
|
page read and write
|
||
57ED000
|
trusted library allocation
|
page read and write
|
||
5843000
|
trusted library allocation
|
page read and write
|
||
583E000
|
trusted library allocation
|
page read and write
|
||
691E000
|
stack
|
page read and write
|
||
5BF9000
|
stack
|
page read and write
|
||
5824000
|
trusted library allocation
|
page read and write
|
||
472E000
|
stack
|
page read and write
|
||
57E6000
|
trusted library allocation
|
page read and write
|
||
583E000
|
trusted library allocation
|
page read and write
|
||
7A6000
|
unkown
|
page execute and read and write
|
||
57E6000
|
trusted library allocation
|
page read and write
|
||
5B84000
|
trusted library allocation
|
page read and write
|
||
3FAE000
|
stack
|
page read and write
|
||
5ACB000
|
trusted library allocation
|
page read and write
|
||
584A000
|
trusted library allocation
|
page read and write
|
||
2B27000
|
heap
|
page read and write
|
||
5821000
|
trusted library allocation
|
page read and write
|
||
EC8000
|
heap
|
page read and write
|
||
E55000
|
heap
|
page read and write
|
||
5ACA000
|
trusted library allocation
|
page read and write
|
||
6203000
|
trusted library allocation
|
page read and write
|
||
57DD000
|
trusted library allocation
|
page read and write
|
||
583E000
|
trusted library allocation
|
page read and write
|
||
EF0000
|
direct allocation
|
page read and write
|
||
599B000
|
trusted library allocation
|
page read and write
|
||
2ABE000
|
stack
|
page read and write
|
||
4831000
|
heap
|
page read and write
|
||
396E000
|
stack
|
page read and write
|
||
2AFE000
|
stack
|
page read and write
|
||
80B0000
|
direct allocation
|
page read and write
|
||
5848000
|
trusted library allocation
|
page read and write
|
||
3F6F000
|
stack
|
page read and write
|
||
57DA000
|
trusted library allocation
|
page read and write
|
||
5AC3000
|
trusted library allocation
|
page read and write
|
||
8110000
|
direct allocation
|
page read and write
|
||
57EB000
|
trusted library allocation
|
page read and write
|
||
5843000
|
trusted library allocation
|
page read and write
|
||
67DF000
|
stack
|
page read and write
|
||
80B0000
|
direct allocation
|
page read and write
|
||
4831000
|
heap
|
page read and write
|
||
5CD3000
|
trusted library allocation
|
page read and write
|
||
622A000
|
trusted library allocation
|
page execute and read and write
|
||
80B0000
|
direct allocation
|
page read and write
|
||
5829000
|
trusted library allocation
|
page read and write
|
||
57C7000
|
trusted library allocation
|
page read and write
|
||
5805000
|
trusted library allocation
|
page read and write
|
||
5BBD000
|
trusted library allocation
|
page read and write
|
||
57E6000
|
trusted library allocation
|
page read and write
|
||
5AC3000
|
trusted library allocation
|
page read and write
|
||
2C2F000
|
stack
|
page read and write
|
||
58CB000
|
trusted library allocation
|
page read and write
|
||
7CF000
|
unkown
|
page execute and read and write
|
||
5B7C000
|
trusted library allocation
|
page read and write
|
||
5ACD000
|
trusted library allocation
|
page read and write
|
||
4E2E000
|
stack
|
page read and write
|
||
5C3E000
|
stack
|
page read and write
|
||
5C34000
|
trusted library allocation
|
page read and write
|
||
5808000
|
trusted library allocation
|
page read and write
|
||
5954000
|
trusted library allocation
|
page read and write
|
||
5AC4000
|
trusted library allocation
|
page read and write
|
||
EC0000
|
heap
|
page read and write
|
||
583E000
|
trusted library allocation
|
page read and write
|
||
814C000
|
stack
|
page read and write
|
||
57E5000
|
trusted library allocation
|
page read and write
|
||
5843000
|
trusted library allocation
|
page read and write
|
||
57E5000
|
trusted library allocation
|
page read and write
|
||
5BBB000
|
trusted library allocation
|
page read and write
|
||
583E000
|
trusted library allocation
|
page read and write
|
||
4831000
|
heap
|
page read and write
|
||
4830000
|
heap
|
page read and write
|
||
5B7A000
|
trusted library allocation
|
page read and write
|
||
57BE000
|
stack
|
page read and write
|
||
5ACE000
|
trusted library allocation
|
page read and write
|
||
57F6000
|
trusted library allocation
|
page read and write
|
||
EAE000
|
heap
|
page read and write
|
||
5815000
|
trusted library allocation
|
page read and write
|
||
EB8000
|
heap
|
page read and write
|
||
30AE000
|
stack
|
page read and write
|
||
5909000
|
trusted library allocation
|
page read and write
|
||
64CE000
|
trusted library allocation
|
page execute and read and write
|
||
F04000
|
heap
|
page read and write
|
||
5AC9000
|
trusted library allocation
|
page read and write
|
||
57F8000
|
trusted library allocation
|
page read and write
|
||
5F66000
|
trusted library allocation
|
page read and write
|
||
5843000
|
trusted library allocation
|
page read and write
|
||
115D000
|
stack
|
page read and write
|
||
583E000
|
trusted library allocation
|
page read and write
|
||
583E000
|
trusted library allocation
|
page read and write
|
||
5B9E000
|
trusted library allocation
|
page read and write
|
||
57F6000
|
trusted library allocation
|
page read and write
|
||
5B59000
|
trusted library allocation
|
page read and write
|
||
5AC9000
|
trusted library allocation
|
page read and write
|
||
5BEA000
|
trusted library allocation
|
page read and write
|
||
4D1000
|
unkown
|
page execute and write copy
|
||
346E000
|
stack
|
page read and write
|
||
F04000
|
heap
|
page read and write
|
||
583E000
|
trusted library allocation
|
page read and write
|
||
4E20000
|
direct allocation
|
page execute and read and write
|
||
4930000
|
trusted library allocation
|
page read and write
|
||
DE0000
|
heap
|
page read and write
|
||
57F5000
|
trusted library allocation
|
page read and write
|
||
57ED000
|
trusted library allocation
|
page read and write
|
||
5B85000
|
trusted library allocation
|
page read and write
|
||
6A1F000
|
stack
|
page read and write
|
||
5843000
|
trusted library allocation
|
page read and write
|
||
57E6000
|
trusted library allocation
|
page read and write
|
||
5823000
|
trusted library allocation
|
page read and write
|
||
D3B000
|
stack
|
page read and write
|
||
5843000
|
trusted library allocation
|
page read and write
|
||
EF0000
|
direct allocation
|
page read and write
|
||
5F6D000
|
trusted library allocation
|
page read and write
|
||
583E000
|
trusted library allocation
|
page read and write
|
||
5843000
|
trusted library allocation
|
page read and write
|
||
5BA8000
|
trusted library allocation
|
page read and write
|
||
ED5000
|
heap
|
page read and write
|
||
5AC7000
|
trusted library allocation
|
page read and write
|
||
5BEA000
|
trusted library allocation
|
page read and write
|
There are 886 hidden memdumps, click here to show them.
DOM / HTML
URL
|
Malicious
|
|
---|---|---|
https://learn.microsoft.com/en-us/dotnet/framework/install/application-not-started?version=(null)&processName=file.exe&platform=0009&osver=6&isServer=0&shimver=4.0.30319.0
|
||
https://learn.microsoft.com/en-us/dotnet/framework/install/application-not-started?version=(null)&processName=file.exe&platform=0009&osver=6&isServer=0&shimver=4.0.30319.0
|
||
https://learn.microsoft.com/en-us/dotnet/framework/install/application-not-started?version=(null)&processName=file.exe&platform=0009&osver=6&isServer=0&shimver=4.0.30319.0
|
||
https://learn.microsoft.com/en-us/dotnet/framework/install/application-not-started?version=(null)&processName=file.exe&platform=0009&osver=6&isServer=0&shimver=4.0.30319.0
|
||
https://learn.microsoft.com/en-us/dotnet/framework/install/application-not-started?version=(null)&processName=file.exe&platform=0009&osver=6&isServer=0&shimver=4.0.30319.0
|