Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
file.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
initial sample
|
||
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Docs.lnk
|
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command
line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Wed Nov 20 11:27:46 2024, atime=Wed Sep 27 04:28:28
2023, length=1210144, window=hide
|
dropped
|
||
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Gmail.lnk
|
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command
line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Wed Nov 20 11:27:45 2024, atime=Wed Sep 27 04:28:28
2023, length=1210144, window=hide
|
dropped
|
||
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Google Drive.lnk
|
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command
line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Thu Oct 5 07:00:51 2023, atime=Wed Sep 27 04:28:28
2023, length=1210144, window=hide
|
dropped
|
||
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Sheets.lnk
|
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command
line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Wed Nov 20 11:27:45 2024, atime=Wed Sep 27 04:28:28
2023, length=1210144, window=hide
|
dropped
|
||
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Slides.lnk
|
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command
line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Wed Nov 20 11:27:46 2024, atime=Wed Sep 27 04:28:28
2023, length=1210144, window=hide
|
dropped
|
||
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\YouTube.lnk
|
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command
line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Wed Nov 20 11:27:45 2024, atime=Wed Sep 27 04:28:28
2023, length=1210144, window=hide
|
dropped
|
||
Chrome Cache Entry: 100
|
JSON data
|
downloaded
|
||
Chrome Cache Entry: 101
|
PNG image data, 533 x 478, 8-bit/color RGBA, non-interlaced
|
downloaded
|
||
Chrome Cache Entry: 102
|
ASCII text, with very long lines (52717), with no line terminators
|
dropped
|
||
Chrome Cache Entry: 103
|
ASCII text
|
downloaded
|
||
Chrome Cache Entry: 104
|
ASCII text, with very long lines (52717), with no line terminators
|
downloaded
|
||
Chrome Cache Entry: 105
|
exported SGML document, ASCII text, with very long lines (65536), with no line terminators
|
downloaded
|
||
Chrome Cache Entry: 106
|
JPEG image data, JFIF standard 1.01, aspect ratio, density 1x1, segment length 16, progressive, precision 8, 1301x300, components
3
|
dropped
|
||
Chrome Cache Entry: 107
|
PNG image data, 533 x 478, 8-bit/color RGBA, non-interlaced
|
downloaded
|
||
Chrome Cache Entry: 108
|
MS Windows icon resource - 6 icons, -128x-128, 16 colors, 72x72, 16 colors
|
downloaded
|
||
Chrome Cache Entry: 109
|
ASCII text, with very long lines (46884)
|
downloaded
|
||
Chrome Cache Entry: 110
|
JSON data
|
dropped
|
||
Chrome Cache Entry: 111
|
MS Windows icon resource - 6 icons, -128x-128, 16 colors, 72x72, 16 colors
|
dropped
|
||
Chrome Cache Entry: 112
|
PNG image data, 658 x 480, 8-bit/color RGBA, non-interlaced
|
downloaded
|
||
Chrome Cache Entry: 113
|
ASCII text, with very long lines (33148), with no line terminators
|
dropped
|
||
Chrome Cache Entry: 114
|
JSON data
|
downloaded
|
||
Chrome Cache Entry: 115
|
JSON data
|
dropped
|
||
Chrome Cache Entry: 116
|
PNG image data, 475 x 212, 8-bit/color RGBA, non-interlaced
|
downloaded
|
||
Chrome Cache Entry: 117
|
JSON data
|
downloaded
|
||
Chrome Cache Entry: 118
|
JSON data
|
dropped
|
||
Chrome Cache Entry: 119
|
exported SGML document, ASCII text, with very long lines (65536), with no line terminators
|
dropped
|
||
Chrome Cache Entry: 120
|
JPEG image data, JFIF standard 1.01, aspect ratio, density 1x1, segment length 16, progressive, precision 8, 1301x300, components
3
|
downloaded
|
||
Chrome Cache Entry: 121
|
ASCII text, with very long lines (46884)
|
dropped
|
||
Chrome Cache Entry: 122
|
ASCII text
|
dropped
|
||
Chrome Cache Entry: 123
|
SVG Scalable Vector Graphics image
|
downloaded
|
||
Chrome Cache Entry: 124
|
Web Open Font Format (Version 2), TrueType, length 19696, version 1.0
|
downloaded
|
||
Chrome Cache Entry: 125
|
ASCII text, with very long lines (33148), with no line terminators
|
downloaded
|
||
Chrome Cache Entry: 126
|
PNG image data, 475 x 212, 8-bit/color RGBA, non-interlaced
|
dropped
|
||
Chrome Cache Entry: 127
|
PNG image data, 658 x 480, 8-bit/color RGBA, non-interlaced
|
dropped
|
||
Chrome Cache Entry: 128
|
JSON data
|
dropped
|
||
Chrome Cache Entry: 129
|
HTML document, ASCII text, with very long lines (639), with CRLF, LF line terminators
|
downloaded
|
||
Chrome Cache Entry: 130
|
JSON data
|
downloaded
|
||
Chrome Cache Entry: 131
|
PNG image data, 533 x 478, 8-bit/color RGBA, non-interlaced
|
dropped
|
||
Chrome Cache Entry: 90
|
PNG image data, 533 x 478, 8-bit/color RGBA, non-interlaced
|
dropped
|
||
Chrome Cache Entry: 91
|
PNG image data, 533 x 478, 8-bit/color RGBA, non-interlaced
|
downloaded
|
||
Chrome Cache Entry: 92
|
SVG Scalable Vector Graphics image
|
dropped
|
||
Chrome Cache Entry: 93
|
JSON data
|
dropped
|
||
Chrome Cache Entry: 94
|
PNG image data, 533 x 478, 8-bit/color RGBA, non-interlaced
|
dropped
|
||
Chrome Cache Entry: 95
|
ASCII text, with very long lines (65536), with no line terminators
|
downloaded
|
||
Chrome Cache Entry: 96
|
ASCII text, with no line terminators
|
downloaded
|
||
Chrome Cache Entry: 97
|
ASCII text, with very long lines (65410)
|
dropped
|
||
Chrome Cache Entry: 98
|
JSON data
|
dropped
|
||
Chrome Cache Entry: 99
|
ASCII text, with very long lines (65410)
|
downloaded
|
There are 39 hidden files, click here to show them.
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\file.exe
|
"C:\Users\user\Desktop\file.exe"
|
||
C:\Program Files\Google\Chrome\Application\chrome.exe
|
"C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized --single-argument http://go.microsoft.com/fwlink/?prd=11324&pver=4.5&sbp=AppLaunch2&plcid=0x409&o1=SHIM_NOVERSION_FOUND&version=(null)&processName=file.exe&platform=0009&osver=6&isServer=0&shimver=4.0.30319.0
|
||
C:\Program Files\Google\Chrome\Application\chrome.exe
|
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US
--service-sandbox-type=none --mojo-platform-channel-handle=2096 --field-trial-handle=1908,i,16866088290354366866,11762703884386129565,262144
--disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction
/prefetch:8
|
||
C:\Program Files\Google\Chrome\Application\chrome.exe
|
"C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized --single-argument http://go.microsoft.com/fwlink/?prd=11324&pver=4.5&sbp=AppLaunch2&plcid=0x409&o1=SHIM_NOVERSION_FOUND&version=(null)&processName=file.exe&platform=0009&osver=6&isServer=0&shimver=4.0.30319.0
|
||
C:\Program Files\Google\Chrome\Application\chrome.exe
|
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US
--service-sandbox-type=none --mojo-platform-channel-handle=2024 --field-trial-handle=1976,i,15534154704042037435,5378647065527263683,262144
--disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction
/prefetch:8
|
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
https://authoring-docs-microsoft.poolparty.biz/devrel/7696cda6-0510-47f6-8302-71bb5d2e28cf
|
unknown
|
||
https://duckduckgo.com/chrome_newtab
|
unknown
|
||
https://duckduckgo.com/ac/?q=
|
unknown
|
||
https://github.com/dotnet/docs/blob/17c4acca45e573a92878a44a2cce57d699fe9c7c/docs/framework/install/
|
unknown
|
||
https://www.linkedin.com/cws/share?url=$
|
unknown
|
||
https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
|
unknown
|
||
https://imp.mt48.net/static?id=7RHzfOIXjFEYsBdvIpkX4Qqm4pqX1CqX4pbW1pbWfpbZ7ReNxR3UIG8zInwYIFIVs9eYi
|
unknown
|
||
https://github.com/Youssef1313
|
unknown
|
||
https://cook-rain.sbs/KxT
|
unknown
|
||
https://cook-rain.sbs:443/apical
|
unknown
|
||
https://management.azure.com/providers/Microsoft.Portal/userSettings/cloudconsole?api-version=2023-0
|
unknown
|
||
https://aka.ms/msignite_docs_banner
|
unknown
|
||
https://videoencodingpublic-hgeaeyeba8gycee3.b01.azurefd.net/public-b4da8140-92cf-421c-8b7b-e471d5b9
|
unknown
|
||
peepburry828.sbs
|
|||
http://polymer.github.io/AUTHORS.txt
|
unknown
|
||
https://cook-rain.sbs/api0Z
|
unknown
|
||
https://github.com/dotnet/docs/issues/new?template=z-customer-feedback.yml
|
unknown
|
||
https://cook-rain.sbs//
|
unknown
|
||
https://management.azure.com/subscriptions?api-version=2016-06-01
|
unknown
|
||
https://github.com/dotnet/docs/blob/main/docs/framework/install/application-not-started.md
|
unknown
|
||
http://x1.c.lencr.org/0
|
unknown
|
||
http://x1.i.lencr.org/0
|
unknown
|
||
https://aka.ms/pshelpmechoose
|
unknown
|
||
https://aka.ms/feedback/report?space=61
|
unknown
|
||
https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
|
unknown
|
||
https://learn-video.azurefd.net/vod/player
|
unknown
|
||
p10tgrace.sbs
|
|||
https://twitter.com/intent/tweet?original_referer=$
|
unknown
|
||
https://cook-rain.sbs/apigsBX1
|
unknown
|
||
https://github.com/gewarren
|
unknown
|
||
http://185.215.113.16/off/def.exepleWebKit/537.36
|
unknown
|
||
https://support.mozilla.org/products/firefoxgro.all
|
unknown
|
||
http://polymer.github.io/CONTRIBUTORS.txt
|
unknown
|
||
https://cook-rain.sbs/T
|
unknown
|
||
processhol.sbs
|
|||
https://github.com/dotnet/docs/blob/live/docs/framework/install/application-not-started.md
|
unknown
|
||
https://cook-rain.sbs/apigLX/
|
unknown
|
||
https://authoring-docs-microsoft.poolparty.biz/devrel/69c76c32-967e-4c65-b89a-74cc527db725
|
unknown
|
||
https://client-api.arkoselabs.com/v2/api.js
|
unknown
|
||
https://aka.ms/MSIgniteChallenge/Tier1Banner?wt.mc_id=ignite24_learnbanner_tier1_cnl
|
unknown
|
||
https://management.azure.com/providers/Microsoft.Portal/consoles/default?api-version=2017-12-01-prev
|
unknown
|
||
https://www.google.com/images/branding/product/ico/googleg_lodp.ico
|
unknown
|
||
https://github.com/Thraka
|
unknown
|
||
https://cook-rain.sbs/api
|
188.114.96.3
|
||
http://polymer.github.io/PATENTS.txt
|
unknown
|
||
https://aka.ms/certhelp
|
unknown
|
||
http://185.215.113.16/steam/random.exe
|
unknown
|
||
https://cook-rain.sbs/
|
unknown
|
||
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
|
unknown
|
||
http://crl.rootca1.amazontrust.com/rootca1.crl0
|
unknown
|
||
https://github.com/mairaw
|
unknown
|
||
https://js.monitor.azure.com/scripts/c/ms.jsll-4.min.js
|
13.107.246.45
|
||
http://ocsp.rootca1.amazontrust.com0:
|
unknown
|
||
https://cook-rain.sbs/y
|
unknown
|
||
https://schema.org
|
unknown
|
||
p3ar11fter.sbs
|
|||
http://polymer.github.io/LICENSE.txt
|
unknown
|
||
https://bridge.sfo1.admarketplace.net/ctp?version=16.0.0&key=1696491991400800003.2&ci=1696491991993.
|
unknown
|
||
https://www.ecosia.org/newtab/
|
unknown
|
||
https://support.mozilla.org/kb/customize-firefox-controls-buttons-and-toolbars?utm_source=firefox-br
|
unknown
|
||
https://www.amazon.com/?tag=admarketus-20&ref=pd_sl_15d7e4b694824b33323940336fbf0bead57d89764383fe44
|
unknown
|
||
https://aka.ms/yourcaliforniaprivacychoices
|
unknown
|
||
http://go.microsoft.co(
|
unknown
|
||
https://ac.ecosia.org/autocomplete?q=
|
unknown
|
||
https://github.com/nschonni
|
unknown
|
||
http://185.215.113.16/
|
unknown
|
||
https://videoencodingpublic-hgeaeyeba8gycee3.b01.azurefd.net/public-09ce73a6-05a5-4e4d-b3d7-bd5a8c05
|
unknown
|
||
https://github.com/adegeo
|
unknown
|
||
http://crl.micro
|
unknown
|
||
https://contile-images.services.mozilla.com/obgoOYObjIFea_bXuT6L4LbBJ8j425AD87S1HMD3BWg.9991.jpg
|
unknown
|
||
https://cook-rain.sbs/&
|
unknown
|
||
https://github.com/jonschlinkert/is-plain-object
|
unknown
|
||
http://crt.rootca1.amazontrust.com/rootca1.cer0?
|
unknown
|
||
https://octokit.github.io/rest.js/#throttling
|
unknown
|
||
https://www.invisalign.com/?utm_source=admarketplace&utm_medium=paidsearch&utm_campaign=Invisalign&u
|
unknown
|
||
https://bridge.sfo1.ap01.net/ctp?version=16.0.0&key=1696491991400800003.1&ci=1696491991993.12791&cta
|
unknown
|
||
https://contile-images.services.mozilla.com/CuERQnIs4CzqjKBh9os6_h9d4CUDCHO3oiqmAQO6VLM.25122.jpg
|
unknown
|
||
https://github.com/js-cookie/js-cookie
|
unknown
|
||
http://185.215.113.16/off/def.exe
|
unknown
|
||
http://schema.org/Organization
|
unknown
|
||
https://channel9.msdn.com/
|
unknown
|
||
https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
|
unknown
|
||
https://github.com/dotnet/try
|
unknown
|
There are 73 hidden URLs, click here to show them.
Domains
Name
|
IP
|
Malicious
|
|
---|---|---|---|
cook-rain.sbs
|
188.114.96.3
|
||
s-part-0017.t-0009.t-msedge.net
|
13.107.246.45
|
||
s-part-0015.t-0009.t-msedge.net
|
13.107.246.43
|
||
www.google.com
|
142.250.185.164
|
||
js.monitor.azure.com
|
unknown
|
||
mdec.nelreports.net
|
unknown
|
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
192.168.2.8
|
unknown
|
unknown
|
||
13.107.246.43
|
s-part-0015.t-0009.t-msedge.net
|
United States
|
||
142.250.186.36
|
unknown
|
United States
|
||
13.107.246.45
|
s-part-0017.t-0009.t-msedge.net
|
United States
|
||
185.215.113.16
|
unknown
|
Portugal
|
||
239.255.255.250
|
unknown
|
Reserved
|
||
142.250.185.164
|
www.google.com
|
United States
|
||
188.114.96.3
|
cook-rain.sbs
|
European Union
|
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
FA1000
|
unkown
|
page execute and read and write
|
||
5E32000
|
trusted library allocation
|
page read and write
|
||
1295000
|
unkown
|
page execute and read and write
|
||
5DB9000
|
trusted library allocation
|
page read and write
|
||
5E3C000
|
trusted library allocation
|
page read and write
|
||
5DD5000
|
trusted library allocation
|
page read and write
|
||
BE5000
|
heap
|
page read and write
|
||
5CE6000
|
trusted library allocation
|
page read and write
|
||
322F000
|
stack
|
page read and write
|
||
2B40000
|
direct allocation
|
page read and write
|
||
BE6000
|
heap
|
page read and write
|
||
53B0000
|
remote allocation
|
page read and write
|
||
5863000
|
trusted library allocation
|
page read and write
|
||
5CE6000
|
trusted library allocation
|
page read and write
|
||
4EB0000
|
direct allocation
|
page execute and read and write
|
||
5D8B000
|
trusted library allocation
|
page read and write
|
||
5845000
|
trusted library allocation
|
page read and write
|
||
586B000
|
trusted library allocation
|
page read and write
|
||
58B3000
|
trusted library allocation
|
page read and write
|
||
5879000
|
trusted library allocation
|
page read and write
|
||
C03000
|
heap
|
page read and write
|
||
5CED000
|
trusted library allocation
|
page read and write
|
||
2B40000
|
direct allocation
|
page read and write
|
||
82D0000
|
direct allocation
|
page execute and read and write
|
||
5873000
|
trusted library allocation
|
page read and write
|
||
58AB000
|
trusted library allocation
|
page read and write
|
||
5DB8000
|
trusted library allocation
|
page read and write
|
||
587B000
|
trusted library allocation
|
page read and write
|
||
48B1000
|
heap
|
page read and write
|
||
402E000
|
stack
|
page read and write
|
||
5E3E000
|
trusted library allocation
|
page read and write
|
||
B1A000
|
heap
|
page read and write
|
||
5E30000
|
trusted library allocation
|
page read and write
|
||
4EE0000
|
direct allocation
|
page execute and read and write
|
||
C00000
|
heap
|
page read and write
|
||
502D000
|
stack
|
page read and write
|
||
5873000
|
trusted library allocation
|
page read and write
|
||
5849000
|
trusted library allocation
|
page read and write
|
||
4CF0000
|
heap
|
page read and write
|
||
5ECC000
|
trusted library allocation
|
page read and write
|
||
5899000
|
trusted library allocation
|
page read and write
|
||
5CEE000
|
trusted library allocation
|
page read and write
|
||
5864000
|
trusted library allocation
|
page read and write
|
||
5CEC000
|
trusted library allocation
|
page read and write
|
||
5968000
|
trusted library allocation
|
page read and write
|
||
5DC0000
|
trusted library allocation
|
page read and write
|
||
BD6000
|
heap
|
page read and write
|
||
3B2E000
|
stack
|
page read and write
|
||
5879000
|
trusted library allocation
|
page read and write
|
||
8110000
|
direct allocation
|
page read and write
|
||
5863000
|
trusted library allocation
|
page read and write
|
||
30EF000
|
stack
|
page read and write
|
||
58B3000
|
trusted library allocation
|
page read and write
|
||
5CE7000
|
trusted library allocation
|
page read and write
|
||
6ABE000
|
stack
|
page read and write
|
||
C06000
|
heap
|
page read and write
|
||
58E4000
|
trusted library allocation
|
page read and write
|
||
8110000
|
direct allocation
|
page read and write
|
||
4D74000
|
direct allocation
|
page read and write
|
||
35EF000
|
stack
|
page read and write
|
||
A44000
|
heap
|
page read and write
|
||
BF7000
|
heap
|
page read and write
|
||
3C6E000
|
stack
|
page read and write
|
||
70FE000
|
stack
|
page read and write
|
||
65BE000
|
stack
|
page read and write
|
||
8140000
|
heap
|
page read and write
|
||
34AF000
|
stack
|
page read and write
|
||
BFF000
|
heap
|
page read and write
|
||
BF0000
|
heap
|
page read and write
|
||
5863000
|
trusted library allocation
|
page read and write
|
||
88BC000
|
stack
|
page read and write
|
||
5E19000
|
trusted library allocation
|
page read and write
|
||
5884000
|
trusted library allocation
|
page read and write
|
||
5CE5000
|
trusted library allocation
|
page read and write
|
||
2B40000
|
direct allocation
|
page read and write
|
||
3EAF000
|
stack
|
page read and write
|
||
5DD6000
|
trusted library allocation
|
page read and write
|
||
5884000
|
trusted library allocation
|
page read and write
|
||
BE1000
|
heap
|
page read and write
|
||
5853000
|
trusted library allocation
|
page read and write
|
||
BEB000
|
heap
|
page read and write
|
||
58B4000
|
trusted library allocation
|
page read and write
|
||
B78000
|
heap
|
page read and write
|
||
5E22000
|
trusted library allocation
|
page read and write
|
||
5E1B000
|
trusted library allocation
|
page read and write
|
||
A40000
|
heap
|
page read and write
|
||
5D86000
|
trusted library allocation
|
page read and write
|
||
58D7000
|
trusted library allocation
|
page read and write
|
||
5CE8000
|
trusted library allocation
|
page read and write
|
||
BFF000
|
heap
|
page read and write
|
||
C0D000
|
heap
|
page read and write
|
||
526E000
|
stack
|
page read and write
|
||
5877000
|
trusted library allocation
|
page read and write
|
||
5879000
|
trusted library allocation
|
page read and write
|
||
5CE0000
|
trusted library allocation
|
page read and write
|
||
7C3E000
|
stack
|
page read and write
|
||
BCA000
|
heap
|
page read and write
|
||
5DD7000
|
trusted library allocation
|
page read and write
|
||
5D81000
|
trusted library allocation
|
page read and write
|
||
BFD000
|
heap
|
page read and write
|
||
5CE5000
|
trusted library allocation
|
page read and write
|
||
C0D000
|
heap
|
page read and write
|
||
5862000
|
trusted library allocation
|
page read and write
|
||
FA0000
|
unkown
|
page read and write
|
||
5CE0000
|
trusted library allocation
|
page read and write
|
||
587C000
|
trusted library allocation
|
page read and write
|
||
5CE6000
|
trusted library allocation
|
page read and write
|
||
58D7000
|
trusted library allocation
|
page read and write
|
||
5AE2000
|
trusted library allocation
|
page read and write
|
||
5E7F000
|
trusted library allocation
|
page read and write
|
||
5D8D000
|
trusted library allocation
|
page read and write
|
||
5E1F000
|
trusted library allocation
|
page read and write
|
||
5851000
|
trusted library allocation
|
page read and write
|
||
5F2B000
|
trusted library allocation
|
page read and write
|
||
6089000
|
stack
|
page read and write
|
||
48B1000
|
heap
|
page read and write
|
||
5E30000
|
trusted library allocation
|
page read and write
|
||
5942000
|
trusted library allocation
|
page read and write
|
||
59BE000
|
stack
|
page read and write
|
||
FE5000
|
unkown
|
page execute and read and write
|
||
D0E000
|
stack
|
page read and write
|
||
1458000
|
unkown
|
page execute and read and write
|
||
BFD000
|
heap
|
page read and write
|
||
58E0000
|
trusted library allocation
|
page read and write
|
||
58CA000
|
trusted library allocation
|
page read and write
|
||
C06000
|
heap
|
page read and write
|
||
587A000
|
trusted library allocation
|
page read and write
|
||
5890000
|
trusted library allocation
|
page read and write
|
||
5DFB000
|
trusted library allocation
|
page read and write
|
||
5DAF000
|
trusted library allocation
|
page read and write
|
||
C0A000
|
heap
|
page read and write
|
||
5848000
|
trusted library allocation
|
page read and write
|
||
5CEF000
|
trusted library allocation
|
page read and write
|
||
C06000
|
heap
|
page read and write
|
||
5CE2000
|
trusted library allocation
|
page read and write
|
||
BEF000
|
heap
|
page read and write
|
||
5CE4000
|
trusted library allocation
|
page read and write
|
||
5CE9000
|
trusted library allocation
|
page read and write
|
||
5899000
|
trusted library allocation
|
page read and write
|
||
5E1E000
|
trusted library allocation
|
page read and write
|
||
A44000
|
heap
|
page read and write
|
||
5CF0000
|
trusted library allocation
|
page read and write
|
||
5866000
|
trusted library allocation
|
page read and write
|
||
7D7E000
|
stack
|
page read and write
|
||
697E000
|
stack
|
page read and write
|
||
5884000
|
trusted library allocation
|
page read and write
|
||
5F7C000
|
trusted library allocation
|
page read and write
|
||
5877000
|
trusted library allocation
|
page read and write
|
||
BED000
|
heap
|
page read and write
|
||
33AE000
|
stack
|
page read and write
|
||
5CE4000
|
trusted library allocation
|
page read and write
|
||
5CE7000
|
trusted library allocation
|
page read and write
|
||
2FEE000
|
stack
|
page read and write
|
||
586A000
|
trusted library allocation
|
page read and write
|
||
A44000
|
heap
|
page read and write
|
||
873F000
|
stack
|
page read and write
|
||
5E1A000
|
trusted library allocation
|
page read and write
|
||
BEA000
|
heap
|
page read and write
|
||
58F5000
|
trusted library allocation
|
page read and write
|
||
BEB000
|
heap
|
page read and write
|
||
B76000
|
heap
|
page read and write
|
||
5DE2000
|
trusted library allocation
|
page read and write
|
||
58E0000
|
trusted library allocation
|
page read and write
|
||
8110000
|
direct allocation
|
page read and write
|
||
2B40000
|
direct allocation
|
page read and write
|
||
5FB000
|
stack
|
page read and write
|
||
B48000
|
heap
|
page read and write
|
||
34EE000
|
stack
|
page read and write
|
||
588D000
|
trusted library allocation
|
page read and write
|
||
6326000
|
trusted library allocation
|
page execute and read and write
|
||
BE1000
|
heap
|
page read and write
|
||
58B9000
|
trusted library allocation
|
page read and write
|
||
5CE4000
|
trusted library allocation
|
page read and write
|
||
83C0000
|
trusted library allocation
|
page read and write
|
||
48B0000
|
heap
|
page read and write
|
||
BE4000
|
heap
|
page read and write
|
||
5CEE000
|
trusted library allocation
|
page read and write
|
||
5DBA000
|
trusted library allocation
|
page read and write
|
||
C06000
|
heap
|
page read and write
|
||
BFF000
|
heap
|
page read and write
|
||
5942000
|
trusted library allocation
|
page read and write
|
||
5863000
|
trusted library allocation
|
page read and write
|
||
5F7B000
|
trusted library allocation
|
page read and write
|
||
5850000
|
trusted library allocation
|
page read and write
|
||
5DE0000
|
trusted library allocation
|
page read and write
|
||
58A0000
|
trusted library allocation
|
page read and write
|
||
5E32000
|
trusted library allocation
|
page read and write
|
||
BE5000
|
heap
|
page read and write
|
||
5866000
|
trusted library allocation
|
page read and write
|
||
5873000
|
trusted library allocation
|
page read and write
|
||
BFD000
|
heap
|
page read and write
|
||
5E2E000
|
trusted library allocation
|
page read and write
|
||
5841000
|
trusted library allocation
|
page read and write
|
||
7EBE000
|
stack
|
page read and write
|
||
5863000
|
trusted library allocation
|
page read and write
|
||
5897000
|
trusted library allocation
|
page read and write
|
||
BF0000
|
heap
|
page read and write
|
||
5EAD000
|
trusted library allocation
|
page read and write
|
||
584F000
|
trusted library allocation
|
page read and write
|
||
5DF3000
|
trusted library allocation
|
page read and write
|
||
BD1000
|
heap
|
page read and write
|
||
5893000
|
trusted library allocation
|
page read and write
|
||
5CE1000
|
trusted library allocation
|
page read and write
|
||
53B0000
|
remote allocation
|
page read and write
|
||
5F1C000
|
trusted library allocation
|
page read and write
|
||
5F8E000
|
trusted library allocation
|
page read and write
|
||
8110000
|
direct allocation
|
page read and write
|
||
950000
|
heap
|
page read and write
|
||
58A3000
|
trusted library allocation
|
page read and write
|
||
5CE4000
|
trusted library allocation
|
page read and write
|
||
49B0000
|
trusted library allocation
|
page read and write
|
||
5846000
|
trusted library allocation
|
page read and write
|
||
5D93000
|
trusted library allocation
|
page read and write
|
||
59C0000
|
direct allocation
|
page read and write
|
||
58A3000
|
trusted library allocation
|
page read and write
|
||
5878000
|
trusted library allocation
|
page read and write
|
||
BD6000
|
heap
|
page read and write
|
||
587C000
|
trusted library allocation
|
page read and write
|
||
5944000
|
trusted library allocation
|
page read and write
|
||
5850000
|
trusted library allocation
|
page read and write
|
||
4E90000
|
direct allocation
|
page execute and read and write
|
||
584A000
|
trusted library allocation
|
page read and write
|
||
5D8F000
|
trusted library allocation
|
page read and write
|
||
3AEF000
|
stack
|
page read and write
|
||
56CE000
|
stack
|
page read and write
|
||
A44000
|
heap
|
page read and write
|
||
6338000
|
trusted library allocation
|
page execute and read and write
|
||
5871000
|
trusted library allocation
|
page read and write
|
||
5841000
|
trusted library allocation
|
page read and write
|
||
863E000
|
stack
|
page read and write
|
||
5841000
|
trusted library allocation
|
page read and write
|
||
BF6000
|
heap
|
page read and write
|
||
5CE3000
|
trusted library allocation
|
page read and write
|
||
BE2000
|
heap
|
page read and write
|
||
647C000
|
stack
|
page read and write
|
||
12AF000
|
unkown
|
page execute and read and write
|
||
5F15000
|
trusted library allocation
|
page read and write
|
||
6220000
|
trusted library allocation
|
page execute and read and write
|
||
76FF000
|
stack
|
page read and write
|
||
362E000
|
stack
|
page read and write
|
||
BEA000
|
heap
|
page read and write
|
||
5862000
|
trusted library allocation
|
page read and write
|
||
5CEB000
|
trusted library allocation
|
page read and write
|
||
2B40000
|
direct allocation
|
page read and write
|
||
2B40000
|
direct allocation
|
page read and write
|
||
5850000
|
trusted library allocation
|
page read and write
|
||
5E4C000
|
trusted library allocation
|
page read and write
|
||
BEB000
|
heap
|
page read and write
|
||
48B1000
|
heap
|
page read and write
|
||
58B3000
|
trusted library allocation
|
page read and write
|
||
551F000
|
stack
|
page read and write
|
||
A44000
|
heap
|
page read and write
|
||
5878000
|
trusted library allocation
|
page read and write
|
||
589C000
|
trusted library allocation
|
page read and write
|
||
2B67000
|
heap
|
page read and write
|
||
5DD8000
|
trusted library allocation
|
page read and write
|
||
7AFE000
|
stack
|
page read and write
|
||
5863000
|
trusted library allocation
|
page read and write
|
||
8110000
|
direct allocation
|
page read and write
|
||
5D84000
|
trusted library allocation
|
page read and write
|
||
A44000
|
heap
|
page read and write
|
||
5864000
|
trusted library allocation
|
page read and write
|
||
5CE3000
|
trusted library allocation
|
page read and write
|
||
C08000
|
heap
|
page read and write
|
||
2C6E000
|
stack
|
page read and write
|
||
5DEA000
|
trusted library allocation
|
page read and write
|
||
5858000
|
trusted library allocation
|
page read and write
|
||
2FAF000
|
stack
|
page read and write
|
||
2B40000
|
direct allocation
|
page read and write
|
||
71FF000
|
stack
|
page read and write
|
||
FA1000
|
unkown
|
page execute and write copy
|
||
4EB0000
|
direct allocation
|
page execute and read and write
|
||
3FEF000
|
stack
|
page read and write
|
||
2AFF000
|
stack
|
page read and write
|
||
C08000
|
heap
|
page read and write
|
||
5EED000
|
trusted library allocation
|
page read and write
|
||
8110000
|
direct allocation
|
page read and write
|
||
6BFE000
|
stack
|
page read and write
|
||
5CE6000
|
trusted library allocation
|
page read and write
|
||
3DAE000
|
stack
|
page read and write
|
||
C0C000
|
heap
|
page read and write
|
||
BFF000
|
heap
|
page read and write
|
||
BE7000
|
heap
|
page read and write
|
||
594B000
|
trusted library allocation
|
page read and write
|
||
48B1000
|
heap
|
page read and write
|
||
A44000
|
heap
|
page read and write
|
||
48B1000
|
heap
|
page read and write
|
||
5E69000
|
trusted library allocation
|
page read and write
|
||
5CE4000
|
trusted library allocation
|
page read and write
|
||
5873000
|
trusted library allocation
|
page read and write
|
||
BEA000
|
heap
|
page read and write
|
||
5876000
|
trusted library allocation
|
page read and write
|
||
8110000
|
direct allocation
|
page read and write
|
||
58E0000
|
trusted library allocation
|
page read and write
|
||
589D000
|
trusted library allocation
|
page read and write
|
||
326E000
|
stack
|
page read and write
|
||
C0C000
|
heap
|
page read and write
|
||
5860000
|
trusted library allocation
|
page read and write
|
||
5AE0000
|
trusted library allocation
|
page read and write
|
||
5884000
|
trusted library allocation
|
page read and write
|
||
588C000
|
trusted library allocation
|
page read and write
|
||
5894000
|
trusted library allocation
|
page read and write
|
||
584E000
|
trusted library allocation
|
page read and write
|
||
BE1000
|
heap
|
page read and write
|
||
5850000
|
trusted library allocation
|
page read and write
|
||
5DA3000
|
trusted library allocation
|
page read and write
|
||
5F4D000
|
trusted library allocation
|
page read and write
|
||
5F1E000
|
trusted library allocation
|
page read and write
|
||
5845000
|
trusted library allocation
|
page read and write
|
||
4FED000
|
stack
|
page read and write
|
||
A44000
|
heap
|
page read and write
|
||
BD0000
|
heap
|
page read and write
|
||
BF6000
|
heap
|
page read and write
|
||
5CE7000
|
trusted library allocation
|
page read and write
|
||
9BEE000
|
stack
|
page read and write
|
||
A30000
|
heap
|
page read and write
|
||
5866000
|
trusted library allocation
|
page read and write
|
||
BFD000
|
heap
|
page read and write
|
||
2B40000
|
direct allocation
|
page read and write
|
||
BE2000
|
heap
|
page read and write
|
||
BE7000
|
heap
|
page read and write
|
||
4EF9000
|
trusted library allocation
|
page read and write
|
||
C0B000
|
heap
|
page read and write
|
||
5CE3000
|
trusted library allocation
|
page read and write
|
||
5944000
|
trusted library allocation
|
page read and write
|
||
126D000
|
unkown
|
page execute and read and write
|
||
5F6F000
|
trusted library allocation
|
page read and write
|
||
58B1000
|
trusted library allocation
|
page read and write
|
||
BBC000
|
heap
|
page read and write
|
||
5850000
|
trusted library allocation
|
page read and write
|
||
5DBB000
|
trusted library allocation
|
page read and write
|
||
BE1000
|
heap
|
page read and write
|
||
312E000
|
stack
|
page read and write
|
||
5863000
|
trusted library allocation
|
page read and write
|
||
516E000
|
stack
|
page read and write
|
||
589C000
|
trusted library allocation
|
page read and write
|
||
5856000
|
trusted library allocation
|
page read and write
|
||
643F000
|
stack
|
page read and write
|
||
589B000
|
trusted library allocation
|
page read and write
|
||
5CE6000
|
trusted library allocation
|
page read and write
|
||
5848000
|
trusted library allocation
|
page read and write
|
||
5884000
|
trusted library allocation
|
page read and write
|
||
58B0000
|
trusted library allocation
|
page read and write
|
||
5CEE000
|
trusted library allocation
|
page read and write
|
||
3C2F000
|
stack
|
page read and write
|
||
5CE8000
|
trusted library allocation
|
page read and write
|
||
48B1000
|
heap
|
page read and write
|
||
5863000
|
trusted library allocation
|
page read and write
|
||
8110000
|
direct allocation
|
page read and write
|
||
5ECE000
|
trusted library allocation
|
page read and write
|
||
4EB0000
|
direct allocation
|
page execute and read and write
|
||
B1E000
|
heap
|
page read and write
|
||
5A72000
|
trusted library allocation
|
page read and write
|
||
66BF000
|
stack
|
page read and write
|
||
5884000
|
trusted library allocation
|
page read and write
|
||
58C4000
|
trusted library allocation
|
page read and write
|
||
58A3000
|
trusted library allocation
|
page read and write
|
||
8170000
|
direct allocation
|
page read and write
|
||
5883000
|
trusted library allocation
|
page read and write
|
||
B78000
|
heap
|
page read and write
|
||
773E000
|
stack
|
page read and write
|
||
BE2000
|
heap
|
page read and write
|
||
5E3F000
|
trusted library allocation
|
page read and write
|
||
583F000
|
stack
|
page read and write
|
||
BE2000
|
heap
|
page read and write
|
||
5942000
|
trusted library allocation
|
page read and write
|
||
797F000
|
stack
|
page read and write
|
||
5929000
|
trusted library allocation
|
page read and write
|
||
58E0000
|
trusted library allocation
|
page read and write
|
||
BF5000
|
heap
|
page read and write
|
||
5E08000
|
trusted library allocation
|
page read and write
|
||
6E7E000
|
stack
|
page read and write
|
||
584A000
|
trusted library allocation
|
page read and write
|
||
5CE5000
|
trusted library allocation
|
page read and write
|
||
4EC0000
|
direct allocation
|
page execute and read and write
|
||
BBC000
|
heap
|
page read and write
|
||
5863000
|
trusted library allocation
|
page read and write
|
||
5CE7000
|
trusted library allocation
|
page read and write
|
||
5CE9000
|
trusted library allocation
|
page read and write
|
||
8170000
|
direct allocation
|
page read and write
|
||
C06000
|
heap
|
page read and write
|
||
53B0000
|
remote allocation
|
page read and write
|
||
5863000
|
trusted library allocation
|
page read and write
|
||
7E7F000
|
stack
|
page read and write
|
||
5D82000
|
trusted library allocation
|
page read and write
|
||
594F000
|
trusted library allocation
|
page read and write
|
||
A44000
|
heap
|
page read and write
|
||
58B9000
|
trusted library allocation
|
page read and write
|
||
6BBF000
|
stack
|
page read and write
|
||
5F90000
|
trusted library allocation
|
page read and write
|
||
BE7000
|
heap
|
page read and write
|
||
C02000
|
heap
|
page read and write
|
||
5E18000
|
trusted library allocation
|
page read and write
|
||
4D30000
|
direct allocation
|
page read and write
|
||
5DA9000
|
trusted library allocation
|
page read and write
|
||
5873000
|
trusted library allocation
|
page read and write
|
||
586D000
|
trusted library allocation
|
page read and write
|
||
58B3000
|
trusted library allocation
|
page read and write
|
||
48B1000
|
heap
|
page read and write
|
||
5851000
|
trusted library allocation
|
page read and write
|
||
5D84000
|
trusted library allocation
|
page read and write
|
||
4E80000
|
direct allocation
|
page execute and read and write
|
||
6CFF000
|
stack
|
page read and write
|
||
58BD000
|
trusted library allocation
|
page read and write
|
||
585C000
|
trusted library allocation
|
page read and write
|
||
5862000
|
trusted library allocation
|
page read and write
|
||
58B3000
|
trusted library allocation
|
page read and write
|
||
AFE000
|
stack
|
page read and write
|
||
5841000
|
trusted library allocation
|
page read and write
|
||
565C000
|
stack
|
page read and write
|
||
58FB000
|
trusted library allocation
|
page read and write
|
||
8110000
|
trusted library allocation
|
page read and write
|
||
B62000
|
heap
|
page read and write
|
||
A44000
|
heap
|
page read and write
|
||
5CE6000
|
trusted library allocation
|
page read and write
|
||
BF5000
|
heap
|
page read and write
|
||
6354000
|
trusted library allocation
|
page read and write
|
||
C0B000
|
heap
|
page read and write
|
||
6096000
|
trusted library allocation
|
page read and write
|
||
5DFD000
|
trusted library allocation
|
page read and write
|
||
5E07000
|
trusted library allocation
|
page read and write
|
||
5CEA000
|
trusted library allocation
|
page read and write
|
||
BFF000
|
heap
|
page read and write
|
||
5889000
|
trusted library allocation
|
page read and write
|
||
52AE000
|
stack
|
page read and write
|
||
BFF000
|
heap
|
page read and write
|
||
5CEA000
|
trusted library allocation
|
page read and write
|
||
5898000
|
trusted library allocation
|
page read and write
|
||
5DAD000
|
trusted library allocation
|
page read and write
|
||
58E0000
|
trusted library allocation
|
page read and write
|
||
5858000
|
trusted library allocation
|
page read and write
|
||
5848000
|
trusted library allocation
|
page read and write
|
||
5CE8000
|
trusted library allocation
|
page read and write
|
||
5CE4000
|
trusted library allocation
|
page read and write
|
||
5CEB000
|
trusted library allocation
|
page read and write
|
||
5DE8000
|
trusted library allocation
|
page read and write
|
||
5DD7000
|
trusted library allocation
|
page read and write
|
||
5850000
|
trusted library allocation
|
page read and write
|
||
5850000
|
trusted library allocation
|
page read and write
|
||
58E0000
|
trusted library allocation
|
page read and write
|
||
82B0000
|
heap
|
page read and write
|
||
5730000
|
heap
|
page read and write
|
||
5852000
|
trusted library allocation
|
page read and write
|
||
588B000
|
trusted library allocation
|
page read and write
|
||
588D000
|
trusted library allocation
|
page read and write
|
||
5CED000
|
trusted library allocation
|
page read and write
|
||
6D3E000
|
stack
|
page read and write
|
||
5CEA000
|
trusted library allocation
|
page read and write
|
||
5889000
|
trusted library allocation
|
page read and write
|
||
59F0000
|
trusted library allocation
|
page read and write
|
||
586C000
|
trusted library allocation
|
page read and write
|
||
BEF000
|
heap
|
page read and write
|
||
462F000
|
stack
|
page read and write
|
||
BED000
|
heap
|
page read and write
|
||
58B1000
|
trusted library allocation
|
page read and write
|
||
5980000
|
trusted library allocation
|
page read and write
|
||
5884000
|
trusted library allocation
|
page read and write
|
||
5893000
|
trusted library allocation
|
page read and write
|
||
59E1000
|
trusted library allocation
|
page read and write
|
||
5849000
|
trusted library allocation
|
page read and write
|
||
5E09000
|
trusted library allocation
|
page read and write
|
||
5E81000
|
trusted library allocation
|
page read and write
|
||
59A0000
|
trusted library allocation
|
page read and write
|
||
5890000
|
trusted library allocation
|
page read and write
|
||
58DC000
|
trusted library allocation
|
page read and write
|
||
5DE3000
|
trusted library allocation
|
page read and write
|
||
5861000
|
trusted library allocation
|
page read and write
|
||
5DA5000
|
trusted library allocation
|
page read and write
|
||
5884000
|
trusted library allocation
|
page read and write
|
||
BF5000
|
heap
|
page read and write
|
||
FA0000
|
unkown
|
page readonly
|
||
4D30000
|
direct allocation
|
page read and write
|
||
4D30000
|
direct allocation
|
page read and write
|
||
1459000
|
unkown
|
page execute and write copy
|
||
58B1000
|
trusted library allocation
|
page read and write
|
||
5840000
|
trusted library allocation
|
page read and write
|
||
587B000
|
trusted library allocation
|
page read and write
|
||
5878000
|
trusted library allocation
|
page read and write
|
||
5861000
|
trusted library allocation
|
page read and write
|
||
5897000
|
trusted library allocation
|
page read and write
|
||
38AE000
|
stack
|
page read and write
|
||
5CE5000
|
trusted library allocation
|
page read and write
|
||
7D3F000
|
stack
|
page read and write
|
||
412F000
|
stack
|
page read and write
|
||
5894000
|
trusted library allocation
|
page read and write
|
||
A44000
|
heap
|
page read and write
|
||
5873000
|
trusted library allocation
|
page read and write
|
||
BE4000
|
heap
|
page read and write
|
||
58EA000
|
trusted library allocation
|
page read and write
|
||
BE6000
|
heap
|
page read and write
|
||
2B40000
|
direct allocation
|
page read and write
|
||
5841000
|
trusted library allocation
|
page read and write
|
||
5CED000
|
trusted library allocation
|
page read and write
|
||
5A18000
|
trusted library allocation
|
page read and write
|
||
5E4E000
|
trusted library allocation
|
page read and write
|
||
737E000
|
stack
|
page read and write
|
||
5884000
|
trusted library allocation
|
page read and write
|
||
5899000
|
trusted library allocation
|
page read and write
|
||
BE1000
|
heap
|
page read and write
|
||
5873000
|
trusted library allocation
|
page read and write
|
||
A44000
|
heap
|
page read and write
|
||
BBC000
|
heap
|
page read and write
|
||
5CEF000
|
trusted library allocation
|
page read and write
|
||
5871000
|
trusted library allocation
|
page read and write
|
||
5851000
|
trusted library allocation
|
page read and write
|
||
BBC000
|
heap
|
page read and write
|
||
7FBF000
|
stack
|
page read and write
|
||
5CE5000
|
trusted library allocation
|
page read and write
|
||
5CE2000
|
trusted library allocation
|
page read and write
|
||
C06000
|
heap
|
page read and write
|
||
586C000
|
trusted library allocation
|
page read and write
|
||
74BE000
|
stack
|
page read and write
|
||
587A000
|
trusted library allocation
|
page read and write
|
||
5858000
|
trusted library allocation
|
page read and write
|
||
5866000
|
trusted library allocation
|
page read and write
|
||
A44000
|
heap
|
page read and write
|
||
5F89000
|
trusted library allocation
|
page read and write
|
||
C06000
|
heap
|
page read and write
|
||
5CE4000
|
trusted library allocation
|
page read and write
|
||
5941000
|
trusted library allocation
|
page read and write
|
||
5CF0000
|
trusted library allocation
|
page read and write
|
||
A44000
|
heap
|
page read and write
|
||
5869000
|
trusted library allocation
|
page read and write
|
||
5A20000
|
trusted library allocation
|
page read and write
|
||
585E000
|
trusted library allocation
|
page read and write
|
||
A44000
|
heap
|
page read and write
|
||
5E4C000
|
trusted library allocation
|
page read and write
|
||
59D0000
|
trusted library allocation
|
page read and write
|
||
BF0000
|
heap
|
page read and write
|
||
5F53000
|
trusted library allocation
|
page read and write
|
||
5CEB000
|
trusted library allocation
|
page read and write
|
||
4E6F000
|
stack
|
page read and write
|
||
C0B000
|
heap
|
page read and write
|
||
5F17000
|
trusted library allocation
|
page read and write
|
||
586C000
|
trusted library allocation
|
page read and write
|
||
5850000
|
trusted library allocation
|
page read and write
|
||
8300000
|
direct allocation
|
page execute and read and write
|
||
587B000
|
trusted library allocation
|
page read and write
|
||
58A3000
|
trusted library allocation
|
page read and write
|
||
5873000
|
trusted library allocation
|
page read and write
|
||
5892000
|
trusted library allocation
|
page read and write
|
||
BF3000
|
heap
|
page read and write
|
||
C06000
|
heap
|
page read and write
|
||
5DC7000
|
trusted library allocation
|
page read and write
|
||
5F55000
|
trusted library allocation
|
page read and write
|
||
5CF0000
|
trusted library allocation
|
page read and write
|
||
5877000
|
trusted library allocation
|
page read and write
|
||
48B1000
|
heap
|
page read and write
|
||
12B0000
|
unkown
|
page execute and write copy
|
||
C0B000
|
heap
|
page read and write
|
||
C06000
|
heap
|
page read and write
|
||
5CEE000
|
trusted library allocation
|
page read and write
|
||
BD6000
|
heap
|
page read and write
|
||
BE0000
|
heap
|
page read and write
|
||
A44000
|
heap
|
page read and write
|
||
58E8000
|
trusted library allocation
|
page read and write
|
||
B10000
|
heap
|
page read and write
|
||
48B1000
|
heap
|
page read and write
|
||
5E24000
|
trusted library allocation
|
page read and write
|
||
555D000
|
stack
|
page read and write
|
||
C08000
|
heap
|
page read and write
|
||
BF7000
|
heap
|
page read and write
|
||
2B40000
|
direct allocation
|
page read and write
|
||
5884000
|
trusted library allocation
|
page read and write
|
||
541E000
|
stack
|
page read and write
|
||
787E000
|
stack
|
page read and write
|
||
7ABF000
|
stack
|
page read and write
|
||
5878000
|
trusted library allocation
|
page read and write
|
||
C08000
|
heap
|
page read and write
|
||
5CE4000
|
trusted library allocation
|
page read and write
|
||
BE9000
|
heap
|
page read and write
|
||
70BF000
|
stack
|
page read and write
|
||
5861000
|
trusted library allocation
|
page read and write
|
||
5D91000
|
trusted library allocation
|
page read and write
|
||
BF3000
|
heap
|
page read and write
|
||
9BF0000
|
trusted library allocation
|
page read and write
|
||
5873000
|
trusted library allocation
|
page read and write
|
||
5845000
|
trusted library allocation
|
page read and write
|
||
5CF1000
|
trusted library allocation
|
page read and write
|
||
5873000
|
trusted library allocation
|
page read and write
|
||
58BE000
|
trusted library allocation
|
page read and write
|
||
476F000
|
stack
|
page read and write
|
||
5CED000
|
trusted library allocation
|
page read and write
|
||
587D000
|
trusted library allocation
|
page read and write
|
||
79BE000
|
stack
|
page read and write
|
||
5E75000
|
trusted library allocation
|
page read and write
|
||
5869000
|
trusted library allocation
|
page read and write
|
||
5893000
|
trusted library allocation
|
page read and write
|
||
5E1F000
|
trusted library allocation
|
page read and write
|
||
39EE000
|
stack
|
page read and write
|
||
48B1000
|
heap
|
page read and write
|
||
C06000
|
heap
|
page read and write
|
||
48B1000
|
heap
|
page read and write
|
||
5CE6000
|
trusted library allocation
|
page read and write
|
||
5CE4000
|
trusted library allocation
|
page read and write
|
||
A44000
|
heap
|
page read and write
|
||
6092000
|
trusted library allocation
|
page execute and read and write
|
||
5DFD000
|
trusted library allocation
|
page read and write
|
||
C06000
|
heap
|
page read and write
|
||
F8B000
|
stack
|
page read and write
|
||
BE6000
|
heap
|
page read and write
|
||
43EE000
|
stack
|
page read and write
|
||
4EBE000
|
stack
|
page read and write
|
||
58E2000
|
trusted library allocation
|
page read and write
|
||
A44000
|
heap
|
page read and write
|
||
58B3000
|
trusted library allocation
|
page read and write
|
||
372F000
|
stack
|
page read and write
|
||
5DA7000
|
trusted library allocation
|
page read and write
|
||
5863000
|
trusted library allocation
|
page read and write
|
||
58B0000
|
trusted library allocation
|
page read and write
|
||
2B40000
|
direct allocation
|
page read and write
|
||
5CE8000
|
trusted library allocation
|
page read and write
|
||
5CE4000
|
trusted library allocation
|
page read and write
|
||
58E0000
|
trusted library allocation
|
page read and write
|
||
6F7F000
|
stack
|
page read and write
|
||
53AF000
|
stack
|
page read and write
|
||
586C000
|
trusted library allocation
|
page read and write
|
||
58B4000
|
trusted library allocation
|
page read and write
|
||
5CE9000
|
trusted library allocation
|
page read and write
|
||
466E000
|
stack
|
page read and write
|
||
5DDA000
|
trusted library allocation
|
page read and write
|
||
5884000
|
trusted library allocation
|
page read and write
|
||
586B000
|
trusted library allocation
|
page read and write
|
||
683E000
|
stack
|
page read and write
|
||
5845000
|
trusted library allocation
|
page read and write
|
||
585E000
|
trusted library allocation
|
page read and write
|
||
5862000
|
trusted library allocation
|
page read and write
|
||
5DF8000
|
trusted library allocation
|
page read and write
|
||
BF9000
|
heap
|
page read and write
|
||
5AB8000
|
trusted library allocation
|
page read and write
|
||
8110000
|
direct allocation
|
page read and write
|
||
589B000
|
trusted library allocation
|
page read and write
|
||
5884000
|
trusted library allocation
|
page read and write
|
||
48C0000
|
heap
|
page read and write
|
||
723E000
|
stack
|
page read and write
|
||
5E95000
|
trusted library allocation
|
page read and write
|
||
C06000
|
heap
|
page read and write
|
||
44EF000
|
stack
|
page read and write
|
||
58F7000
|
trusted library allocation
|
page read and write
|
||
48B1000
|
heap
|
page read and write
|
||
5884000
|
trusted library allocation
|
page read and write
|
||
5CE8000
|
trusted library allocation
|
page read and write
|
||
5863000
|
trusted library allocation
|
page read and write
|
||
BFF000
|
heap
|
page read and write
|
||
5CE6000
|
trusted library allocation
|
page read and write
|
||
48B1000
|
heap
|
page read and write
|
||
8FB000
|
stack
|
page read and write
|
||
2B40000
|
direct allocation
|
page read and write
|
||
733F000
|
stack
|
page read and write
|
||
5845000
|
trusted library allocation
|
page read and write
|
||
A4EF000
|
stack
|
page read and write
|
||
5E1D000
|
trusted library allocation
|
page read and write
|
||
58B3000
|
trusted library allocation
|
page read and write
|
||
2B3E000
|
stack
|
page read and write
|
||
58A7000
|
trusted library allocation
|
page read and write
|
||
48B1000
|
heap
|
page read and write
|
||
83C9000
|
trusted library allocation
|
page read and write
|
||
58A9000
|
trusted library allocation
|
page read and write
|
||
5CE2000
|
trusted library allocation
|
page read and write
|
||
586B000
|
trusted library allocation
|
page read and write
|
||
1185000
|
unkown
|
page execute and read and write
|
||
6A7F000
|
stack
|
page read and write
|
||
5CEC000
|
trusted library allocation
|
page read and write
|
||
5862000
|
trusted library allocation
|
page read and write
|
||
BE7000
|
heap
|
page read and write
|
||
5892000
|
trusted library allocation
|
page read and write
|
||
5865000
|
trusted library allocation
|
page read and write
|
||
A44000
|
heap
|
page read and write
|
||
5893000
|
trusted library allocation
|
page read and write
|
||
80FF000
|
stack
|
page read and write
|
||
5873000
|
trusted library allocation
|
page read and write
|
||
C0B000
|
heap
|
page read and write
|
||
48AF000
|
stack
|
page read and write
|
||
5863000
|
trusted library allocation
|
page read and write
|
||
5893000
|
trusted library allocation
|
page read and write
|
||
58D7000
|
trusted library allocation
|
page read and write
|
||
5CE2000
|
trusted library allocation
|
page read and write
|
||
2B60000
|
heap
|
page read and write
|
||
67FF000
|
stack
|
page read and write
|
||
5DD8000
|
trusted library allocation
|
page read and write
|
||
58B1000
|
trusted library allocation
|
page read and write
|
||
8110000
|
direct allocation
|
page read and write
|
||
5CE7000
|
trusted library allocation
|
page read and write
|
||
BE4000
|
heap
|
page read and write
|
||
586B000
|
trusted library allocation
|
page read and write
|
||
5CEE000
|
trusted library allocation
|
page read and write
|
||
2D6F000
|
stack
|
page read and write
|
||
5F7A000
|
trusted library allocation
|
page read and write
|
||
783F000
|
stack
|
page read and write
|
||
7BFF000
|
stack
|
page read and write
|
||
87BB000
|
stack
|
page read and write
|
||
5CE9000
|
trusted library allocation
|
page read and write
|
||
5CE3000
|
trusted library allocation
|
page read and write
|
||
5F4B000
|
trusted library allocation
|
page read and write
|
||
5943000
|
trusted library allocation
|
page read and write
|
||
75BF000
|
stack
|
page read and write
|
||
5851000
|
trusted library allocation
|
page read and write
|
||
5871000
|
trusted library allocation
|
page read and write
|
||
81AC000
|
stack
|
page read and write
|
||
2B40000
|
direct allocation
|
page read and write
|
||
589C000
|
trusted library allocation
|
page read and write
|
||
5CF0000
|
trusted library allocation
|
page read and write
|
||
F4E000
|
stack
|
page read and write
|
||
5850000
|
trusted library allocation
|
page read and write
|
||
83C2000
|
trusted library allocation
|
page read and write
|
||
5884000
|
trusted library allocation
|
page read and write
|
||
5E1D000
|
trusted library allocation
|
page read and write
|
||
5E1C000
|
trusted library allocation
|
page read and write
|
||
5EAF000
|
trusted library allocation
|
page read and write
|
||
426F000
|
stack
|
page read and write
|
||
5897000
|
trusted library allocation
|
page read and write
|
||
5DFA000
|
trusted library allocation
|
page read and write
|
||
585E000
|
trusted library allocation
|
page read and write
|
||
5CE6000
|
trusted library allocation
|
page read and write
|
||
5E1F000
|
trusted library allocation
|
page read and write
|
||
C0C000
|
heap
|
page read and write
|
||
BFD000
|
heap
|
page read and write
|
||
5D8D000
|
trusted library allocation
|
page read and write
|
||
AAE000
|
stack
|
page read and write
|
||
5884000
|
trusted library allocation
|
page read and write
|
||
5D7F000
|
trusted library allocation
|
page read and write
|
||
4EB0000
|
direct allocation
|
page execute and read and write
|
||
5EEF000
|
trusted library allocation
|
page read and write
|
||
48B1000
|
heap
|
page read and write
|
||
5873000
|
trusted library allocation
|
page read and write
|
||
5DF5000
|
trusted library allocation
|
page read and write
|
||
5979000
|
stack
|
page read and write
|
||
5CEB000
|
trusted library allocation
|
page read and write
|
||
5929000
|
trusted library allocation
|
page read and write
|
||
5883000
|
trusted library allocation
|
page read and write
|
||
5851000
|
trusted library allocation
|
page read and write
|
||
BE9000
|
heap
|
page read and write
|
||
4D6C000
|
stack
|
page read and write
|
||
609A000
|
trusted library allocation
|
page execute and read and write
|
||
F90000
|
heap
|
page read and write
|
||
7FFE000
|
stack
|
page read and write
|
||
2EAE000
|
stack
|
page read and write
|
||
5E6B000
|
trusted library allocation
|
page read and write
|
||
48B1000
|
heap
|
page read and write
|
||
8150000
|
trusted library allocation
|
page read and write
|
||
586B000
|
trusted library allocation
|
page read and write
|
||
5869000
|
trusted library allocation
|
page read and write
|
||
5E34000
|
trusted library allocation
|
page read and write
|
||
4EA0000
|
direct allocation
|
page execute and read and write
|
||
5889000
|
trusted library allocation
|
page read and write
|
||
5854000
|
trusted library allocation
|
page read and write
|
||
58BA000
|
trusted library allocation
|
page read and write
|
||
5CE6000
|
trusted library allocation
|
page read and write
|
||
5CEF000
|
trusted library allocation
|
page read and write
|
||
5733000
|
heap
|
page read and write
|
||
5863000
|
trusted library allocation
|
page read and write
|
||
12A0000
|
unkown
|
page execute and read and write
|
||
512D000
|
stack
|
page read and write
|
||
5884000
|
trusted library allocation
|
page read and write
|
||
5E41000
|
trusted library allocation
|
page read and write
|
||
5E0A000
|
trusted library allocation
|
page read and write
|
||
5DB9000
|
trusted library allocation
|
page read and write
|
||
8110000
|
direct allocation
|
page read and write
|
||
C06000
|
heap
|
page read and write
|
||
747F000
|
stack
|
page read and write
|
||
6090000
|
trusted library allocation
|
page read and write
|
||
48B1000
|
heap
|
page read and write
|
||
5862000
|
trusted library allocation
|
page read and write
|
||
3D6F000
|
stack
|
page read and write
|
||
C06000
|
heap
|
page read and write
|
||
C0D000
|
heap
|
page read and write
|
||
5845000
|
trusted library allocation
|
page read and write
|
||
5874000
|
trusted library allocation
|
page read and write
|
||
6336000
|
trusted library allocation
|
page execute and read and write
|
||
5CEC000
|
trusted library allocation
|
page read and write
|
||
4EB0000
|
direct allocation
|
page execute and read and write
|
||
A44000
|
heap
|
page read and write
|
||
2B40000
|
direct allocation
|
page read and write
|
||
5884000
|
trusted library allocation
|
page read and write
|
||
5F2D000
|
trusted library allocation
|
page read and write
|
||
5DD5000
|
trusted library allocation
|
page read and write
|
||
66FE000
|
stack
|
page read and write
|
||
693F000
|
stack
|
page read and write
|
||
586B000
|
trusted library allocation
|
page read and write
|
||
5E93000
|
trusted library allocation
|
page read and write
|
||
43AF000
|
stack
|
page read and write
|
||
4ED0000
|
direct allocation
|
page execute and read and write
|
||
47AE000
|
stack
|
page read and write
|
||
5CE6000
|
trusted library allocation
|
page read and write
|
||
336F000
|
stack
|
page read and write
|
||
5845000
|
trusted library allocation
|
page read and write
|
||
4EB0000
|
direct allocation
|
page execute and read and write
|
||
2E6F000
|
stack
|
page read and write
|
||
BFF000
|
heap
|
page read and write
|
||
5DE5000
|
trusted library allocation
|
page read and write
|
||
58C3000
|
trusted library allocation
|
page read and write
|
||
B78000
|
heap
|
page read and write
|
||
6FBE000
|
stack
|
page read and write
|
||
58AB000
|
trusted library allocation
|
page read and write
|
||
58B4000
|
trusted library allocation
|
page read and write
|
||
C06000
|
heap
|
page read and write
|
||
5DA0000
|
trusted library allocation
|
page read and write
|
||
5DA2000
|
trusted library allocation
|
page read and write
|
||
48B1000
|
heap
|
page read and write
|
||
5CE5000
|
trusted library allocation
|
page read and write
|
||
5DB7000
|
trusted library allocation
|
page read and write
|
||
58C0000
|
trusted library allocation
|
page read and write
|
||
5863000
|
trusted library allocation
|
page read and write
|
||
58AD000
|
trusted library allocation
|
page read and write
|
||
386F000
|
stack
|
page read and write
|
||
BEE000
|
heap
|
page read and write
|
||
5DFF000
|
trusted library allocation
|
page read and write
|
||
5CE7000
|
trusted library allocation
|
page read and write
|
||
8110000
|
direct allocation
|
page read and write
|
||
BEE000
|
heap
|
page read and write
|
||
BF3000
|
heap
|
page read and write
|
||
8110000
|
direct allocation
|
page read and write
|
||
48B1000
|
heap
|
page read and write
|
||
C0D000
|
heap
|
page read and write
|
||
C06000
|
heap
|
page read and write
|
||
C06000
|
heap
|
page read and write
|
||
58D8000
|
trusted library allocation
|
page read and write
|
||
48B1000
|
heap
|
page read and write
|
||
12AF000
|
unkown
|
page execute and write copy
|
||
5E1D000
|
trusted library allocation
|
page read and write
|
||
42AE000
|
stack
|
page read and write
|
||
452E000
|
stack
|
page read and write
|
||
FF8000
|
unkown
|
page execute and read and write
|
||
BE4000
|
heap
|
page read and write
|
||
5CE8000
|
trusted library allocation
|
page read and write
|
||
5F71000
|
trusted library allocation
|
page read and write
|
||
657F000
|
stack
|
page read and write
|
||
5DC5000
|
trusted library allocation
|
page read and write
|
||
5859000
|
trusted library allocation
|
page read and write
|
||
5CE2000
|
trusted library allocation
|
page read and write
|
||
5949000
|
trusted library allocation
|
page read and write
|
||
5DA4000
|
trusted library allocation
|
page read and write
|
||
C0B000
|
heap
|
page read and write
|
||
39AF000
|
stack
|
page read and write
|
||
5DC2000
|
trusted library allocation
|
page read and write
|
||
376E000
|
stack
|
page read and write
|
||
8170000
|
direct allocation
|
page read and write
|
||
5A28000
|
trusted library allocation
|
page read and write
|
||
5841000
|
trusted library allocation
|
page read and write
|
||
82AE000
|
stack
|
page read and write
|
||
C0A000
|
heap
|
page read and write
|
||
5845000
|
trusted library allocation
|
page read and write
|
||
5846000
|
trusted library allocation
|
page read and write
|
||
6E3F000
|
stack
|
page read and write
|
||
584F000
|
trusted library allocation
|
page read and write
|
||
8110000
|
direct allocation
|
page read and write
|
||
5943000
|
trusted library allocation
|
page read and write
|
||
5869000
|
trusted library allocation
|
page read and write
|
||
5DA2000
|
trusted library allocation
|
page read and write
|
||
9B30000
|
trusted library allocation
|
page read and write
|
||
75FE000
|
stack
|
page read and write
|
||
5CE6000
|
trusted library allocation
|
page read and write
|
||
3EEE000
|
stack
|
page read and write
|
||
5897000
|
trusted library allocation
|
page read and write
|
||
5CE9000
|
trusted library allocation
|
page read and write
|
||
416E000
|
stack
|
page read and write
|
||
C06000
|
heap
|
page read and write
|
There are 847 hidden memdumps, click here to show them.
DOM / HTML
URL
|
Malicious
|
|
---|---|---|
https://learn.microsoft.com/en-us/dotnet/framework/install/application-not-started?version=(null)&processName=file.exe&platform=0009&osver=6&isServer=0&shimver=4.0.30319.0
|
||
https://learn.microsoft.com/en-us/dotnet/framework/install/application-not-started?version=(null)&processName=file.exe&platform=0009&osver=6&isServer=0&shimver=4.0.30319.0
|
||
https://learn.microsoft.com/en-us/dotnet/framework/install/application-not-started?version=(null)&processName=file.exe&platform=0009&osver=6&isServer=0&shimver=4.0.30319.0
|
||
https://learn.microsoft.com/en-us/dotnet/framework/install/application-not-started?version=(null)&processName=file.exe&platform=0009&osver=6&isServer=0&shimver=4.0.30319.0
|