Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
file.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
initial sample
|
||
Chrome Cache Entry: 100
|
JSON data
|
downloaded
|
||
Chrome Cache Entry: 101
|
PNG image data, 475 x 212, 8-bit/color RGBA, non-interlaced
|
downloaded
|
||
Chrome Cache Entry: 102
|
JSON data
|
downloaded
|
||
Chrome Cache Entry: 103
|
JSON data
|
dropped
|
||
Chrome Cache Entry: 104
|
exported SGML document, ASCII text, with very long lines (65536), with no line terminators
|
dropped
|
||
Chrome Cache Entry: 105
|
JPEG image data, JFIF standard 1.01, aspect ratio, density 1x1, segment length 16, progressive, precision 8, 1301x300, components
3
|
downloaded
|
||
Chrome Cache Entry: 106
|
ASCII text, with very long lines (46884)
|
dropped
|
||
Chrome Cache Entry: 107
|
ASCII text
|
dropped
|
||
Chrome Cache Entry: 108
|
SVG Scalable Vector Graphics image
|
downloaded
|
||
Chrome Cache Entry: 109
|
Web Open Font Format (Version 2), TrueType, length 19696, version 1.0
|
downloaded
|
||
Chrome Cache Entry: 110
|
ASCII text, with very long lines (33148), with no line terminators
|
downloaded
|
||
Chrome Cache Entry: 111
|
PNG image data, 475 x 212, 8-bit/color RGBA, non-interlaced
|
dropped
|
||
Chrome Cache Entry: 112
|
PNG image data, 658 x 480, 8-bit/color RGBA, non-interlaced
|
dropped
|
||
Chrome Cache Entry: 113
|
JSON data
|
dropped
|
||
Chrome Cache Entry: 114
|
HTML document, ASCII text, with very long lines (639), with CRLF, LF line terminators
|
downloaded
|
||
Chrome Cache Entry: 115
|
JSON data
|
downloaded
|
||
Chrome Cache Entry: 116
|
PNG image data, 533 x 478, 8-bit/color RGBA, non-interlaced
|
dropped
|
||
Chrome Cache Entry: 74
|
PNG image data, 533 x 478, 8-bit/color RGBA, non-interlaced
|
dropped
|
||
Chrome Cache Entry: 75
|
PNG image data, 533 x 478, 8-bit/color RGBA, non-interlaced
|
downloaded
|
||
Chrome Cache Entry: 76
|
SVG Scalable Vector Graphics image
|
dropped
|
||
Chrome Cache Entry: 77
|
JSON data
|
dropped
|
||
Chrome Cache Entry: 78
|
PNG image data, 533 x 478, 8-bit/color RGBA, non-interlaced
|
dropped
|
||
Chrome Cache Entry: 79
|
JSON data
|
dropped
|
||
Chrome Cache Entry: 80
|
ASCII text, with very long lines (65536), with no line terminators
|
downloaded
|
||
Chrome Cache Entry: 81
|
ASCII text, with very long lines (65410)
|
dropped
|
||
Chrome Cache Entry: 82
|
JSON data
|
dropped
|
||
Chrome Cache Entry: 83
|
ASCII text, with very long lines (65410)
|
downloaded
|
||
Chrome Cache Entry: 84
|
JSON data
|
downloaded
|
||
Chrome Cache Entry: 85
|
PNG image data, 533 x 478, 8-bit/color RGBA, non-interlaced
|
downloaded
|
||
Chrome Cache Entry: 86
|
ASCII text, with very long lines (52717), with no line terminators
|
dropped
|
||
Chrome Cache Entry: 87
|
ASCII text
|
downloaded
|
||
Chrome Cache Entry: 88
|
ASCII text, with very long lines (52717), with no line terminators
|
downloaded
|
||
Chrome Cache Entry: 89
|
exported SGML document, ASCII text, with very long lines (65536), with no line terminators
|
downloaded
|
||
Chrome Cache Entry: 91
|
ASCII text, with no line terminators
|
downloaded
|
||
Chrome Cache Entry: 92
|
JPEG image data, JFIF standard 1.01, aspect ratio, density 1x1, segment length 16, progressive, precision 8, 1301x300, components
3
|
dropped
|
||
Chrome Cache Entry: 93
|
PNG image data, 533 x 478, 8-bit/color RGBA, non-interlaced
|
downloaded
|
||
Chrome Cache Entry: 94
|
MS Windows icon resource - 6 icons, -128x-128, 16 colors, 72x72, 16 colors
|
downloaded
|
||
Chrome Cache Entry: 95
|
ASCII text, with very long lines (46884)
|
downloaded
|
||
Chrome Cache Entry: 96
|
JSON data
|
dropped
|
||
Chrome Cache Entry: 97
|
MS Windows icon resource - 6 icons, -128x-128, 16 colors, 72x72, 16 colors
|
dropped
|
||
Chrome Cache Entry: 98
|
PNG image data, 658 x 480, 8-bit/color RGBA, non-interlaced
|
downloaded
|
||
Chrome Cache Entry: 99
|
ASCII text, with very long lines (33148), with no line terminators
|
dropped
|
There are 33 hidden files, click here to show them.
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\file.exe
|
"C:\Users\user\Desktop\file.exe"
|
||
C:\Program Files\Google\Chrome\Application\chrome.exe
|
"C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized --single-argument http://go.microsoft.com/fwlink/?prd=11324&pver=4.5&sbp=AppLaunch2&plcid=0x409&o1=SHIM_NOVERSION_FOUND&version=(null)&processName=file.exe&platform=0009&osver=6&isServer=0&shimver=4.0.30319.0
|
||
C:\Program Files\Google\Chrome\Application\chrome.exe
|
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US
--service-sandbox-type=none --mojo-platform-channel-handle=2152 --field-trial-handle=1924,i,16693149984039008949,18427732997764737227,262144
--disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction
/prefetch:8
|
||
C:\Program Files\Google\Chrome\Application\chrome.exe
|
"C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized --single-argument http://go.microsoft.com/fwlink/?prd=11324&pver=4.5&sbp=AppLaunch2&plcid=0x409&o1=SHIM_NOVERSION_FOUND&version=(null)&processName=file.exe&platform=0009&osver=6&isServer=0&shimver=4.0.30319.0
|
||
C:\Program Files\Google\Chrome\Application\chrome.exe
|
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US
--service-sandbox-type=none --mojo-platform-channel-handle=2168 --field-trial-handle=1928,i,15905540884992955177,16070851734019653976,262144
--disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction
/prefetch:8
|
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
https://authoring-docs-microsoft.poolparty.biz/devrel/7696cda6-0510-47f6-8302-71bb5d2e28cf
|
unknown
|
||
https://www.amazon.com/?tag=admarketus-20&ref=pd_sl_ef0fa27a12d43fbd45649e195429e8a63ddcad7cf7e128c0
|
unknown
|
||
https://duckduckgo.com/chrome_newtab
|
unknown
|
||
https://duckduckgo.com/ac/?q=
|
unknown
|
||
https://github.com/dotnet/docs/blob/17c4acca45e573a92878a44a2cce57d699fe9c7c/docs/framework/install/
|
unknown
|
||
https://www.linkedin.com/cws/share?url=$
|
unknown
|
||
https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
|
unknown
|
||
https://github.com/Youssef1313
|
unknown
|
||
https://management.azure.com/providers/Microsoft.Portal/userSettings/cloudconsole?api-version=2023-0
|
unknown
|
||
https://aka.ms/msignite_docs_banner
|
unknown
|
||
https://videoencodingpublic-hgeaeyeba8gycee3.b01.azurefd.net/public-b4da8140-92cf-421c-8b7b-e471d5b9
|
unknown
|
||
peepburry828.sbs
|
|||
http://polymer.github.io/AUTHORS.txt
|
unknown
|
||
https://github.com/dotnet/docs/issues/new?template=z-customer-feedback.yml
|
unknown
|
||
https://cook-rain.sbs/Hf
|
unknown
|
||
https://management.azure.com/subscriptions?api-version=2016-06-01
|
unknown
|
||
https://cook-rain.sbs/apibe
|
unknown
|
||
https://github.com/dotnet/docs/blob/main/docs/framework/install/application-not-started.md
|
unknown
|
||
http://x1.c.lencr.org/0
|
unknown
|
||
http://x1.i.lencr.org/0
|
unknown
|
||
https://aka.ms/pshelpmechoose
|
unknown
|
||
https://aka.ms/feedback/report?space=61
|
unknown
|
||
https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
|
unknown
|
||
https://learn-video.azurefd.net/vod/player
|
unknown
|
||
p10tgrace.sbs
|
|||
https://twitter.com/intent/tweet?original_referer=$
|
unknown
|
||
https://github.com/gewarren
|
unknown
|
||
http://185.215.113.16/off/def.exepleWebKit/537.36
|
unknown
|
||
https://cook-rain.sbs/zf
|
unknown
|
||
https://support.mozilla.org/products/firefoxgro.all
|
unknown
|
||
http://polymer.github.io/CONTRIBUTORS.txt
|
unknown
|
||
processhol.sbs
|
|||
https://github.com/dotnet/docs/blob/live/docs/framework/install/application-not-started.md
|
unknown
|
||
https://authoring-docs-microsoft.poolparty.biz/devrel/69c76c32-967e-4c65-b89a-74cc527db725
|
unknown
|
||
https://client-api.arkoselabs.com/v2/api.js
|
unknown
|
||
https://aka.ms/MSIgniteChallenge/Tier1Banner?wt.mc_id=ignite24_learnbanner_tier1_cnl
|
unknown
|
||
https://management.azure.com/providers/Microsoft.Portal/consoles/default?api-version=2017-12-01-prev
|
unknown
|
||
https://www.google.com/images/branding/product/ico/googleg_lodp.ico
|
unknown
|
||
https://github.com/Thraka
|
unknown
|
||
https://cook-rain.sbs/api
|
104.21.66.38
|
||
http://185.215.113.16/steam/random.exeI
|
unknown
|
||
http://polymer.github.io/PATENTS.txt
|
unknown
|
||
https://aka.ms/certhelp
|
unknown
|
||
http://185.215.113.16/steam/random.exe
|
unknown
|
||
https://bridge.sfo1.admarketplace.net/ctp?version=16.0.0&key=1696490019400400000.2&ci=1696490019252.
|
unknown
|
||
https://cook-rain.sbs/
|
unknown
|
||
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
|
unknown
|
||
http://crl.rootca1.amazontrust.com/rootca1.crl0
|
unknown
|
||
https://github.com/mairaw
|
unknown
|
||
https://js.monitor.azure.com/scripts/c/ms.jsll-4.min.js
|
13.107.246.63
|
||
http://ocsp.rootca1.amazontrust.com0:
|
unknown
|
||
https://schema.org
|
unknown
|
||
p3ar11fter.sbs
|
|||
http://polymer.github.io/LICENSE.txt
|
unknown
|
||
https://www.ecosia.org/newtab/
|
unknown
|
||
https://cook-rain.sbs/Af
|
unknown
|
||
https://support.mozilla.org/kb/customize-firefox-controls-buttons-and-toolbars?utm_source=firefox-br
|
unknown
|
||
https://aka.ms/yourcaliforniaprivacychoices
|
unknown
|
||
https://cook-rain.sbs/apigs
|
unknown
|
||
https://ac.ecosia.org/autocomplete?q=
|
unknown
|
||
https://github.com/nschonni
|
unknown
|
||
https://videoencodingpublic-hgeaeyeba8gycee3.b01.azurefd.net/public-09ce73a6-05a5-4e4d-b3d7-bd5a8c05
|
unknown
|
||
https://github.com/adegeo
|
unknown
|
||
https://contile-images.services.mozilla.com/obgoOYObjIFea_bXuT6L4LbBJ8j425AD87S1HMD3BWg.9991.jpg
|
unknown
|
||
https://github.com/jonschlinkert/is-plain-object
|
unknown
|
||
http://crt.rootca1.amazontrust.com/rootca1.cer0?
|
unknown
|
||
https://octokit.github.io/rest.js/#throttling
|
unknown
|
||
https://www.invisalign.com/?utm_source=admarketplace&utm_medium=paidsearch&utm_campaign=Invisalign&u
|
unknown
|
||
https://imp.mt48.net/static?id=7RHzfOIXjFEYsBdvIpkX4Qqm4pqWfpl%2B4pbW4pbWfpbW7ReNxR3UIG8zInwYIFIVs9e
|
unknown
|
||
https://contile-images.services.mozilla.com/CuERQnIs4CzqjKBh9os6_h9d4CUDCHO3oiqmAQO6VLM.25122.jpg
|
unknown
|
||
https://cook-rain.sbs/Wf
|
unknown
|
||
https://github.com/js-cookie/js-cookie
|
unknown
|
||
http://185.215.113.16/off/def.exe
|
unknown
|
||
http://schema.org/Organization
|
unknown
|
||
https://channel9.msdn.com/
|
unknown
|
||
https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
|
unknown
|
||
https://github.com/dotnet/try
|
unknown
|
||
https://bridge.sfo1.ap01.net/ctp?version=16.0.0&key=1696490019400400000.1&ci=1696490019252.12791&cta
|
unknown
|
||
https://cook-rain.sbs/api_
|
unknown
|
There are 69 hidden URLs, click here to show them.
Domains
Name
|
IP
|
Malicious
|
|
---|---|---|---|
cook-rain.sbs
|
104.21.66.38
|
||
www.google.com
|
142.250.181.68
|
||
s-part-0035.t-0009.t-msedge.net
|
13.107.246.63
|
||
js.monitor.azure.com
|
unknown
|
||
mdec.nelreports.net
|
unknown
|
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
192.168.2.7
|
unknown
|
unknown
|
||
13.107.246.63
|
s-part-0035.t-0009.t-msedge.net
|
United States
|
||
185.215.113.16
|
unknown
|
Portugal
|
||
104.21.66.38
|
cook-rain.sbs
|
United States
|
||
239.255.255.250
|
unknown
|
Reserved
|
||
142.250.181.68
|
www.google.com
|
United States
|
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
141000
|
unkown
|
page execute and read and write
|
||
5C35000
|
trusted library allocation
|
page read and write
|
||
5CB9000
|
trusted library allocation
|
page read and write
|
||
5B42000
|
trusted library allocation
|
page read and write
|
||
E80000
|
direct allocation
|
page read and write
|
||
5C6E000
|
trusted library allocation
|
page read and write
|
||
2E2F000
|
stack
|
page read and write
|
||
56BF000
|
trusted library allocation
|
page read and write
|
||
4D60000
|
direct allocation
|
page execute and read and write
|
||
5B41000
|
trusted library allocation
|
page read and write
|
||
5240000
|
remote allocation
|
page read and write
|
||
5B43000
|
trusted library allocation
|
page read and write
|
||
F8A000
|
heap
|
page read and write
|
||
56E8000
|
trusted library allocation
|
page read and write
|
||
79BE000
|
stack
|
page read and write
|
||
A39E000
|
stack
|
page read and write
|
||
4D40000
|
direct allocation
|
page execute and read and write
|
||
4D4D000
|
stack
|
page read and write
|
||
9F7000
|
heap
|
page read and write
|
||
56CF000
|
trusted library allocation
|
page read and write
|
||
56C8000
|
trusted library allocation
|
page read and write
|
||
5C0D000
|
trusted library allocation
|
page read and write
|
||
5B51000
|
trusted library allocation
|
page read and write
|
||
5C53000
|
trusted library allocation
|
page read and write
|
||
56D7000
|
trusted library allocation
|
page read and write
|
||
7AFE000
|
stack
|
page read and write
|
||
56A1000
|
trusted library allocation
|
page read and write
|
||
56E7000
|
trusted library allocation
|
page read and write
|
||
5719000
|
trusted library allocation
|
page read and write
|
||
E80000
|
direct allocation
|
page read and write
|
||
5C7B000
|
trusted library allocation
|
page read and write
|
||
61FE000
|
stack
|
page read and write
|
||
56AB000
|
trusted library allocation
|
page read and write
|
||
5D1C000
|
trusted library allocation
|
page read and write
|
||
56D4000
|
trusted library allocation
|
page read and write
|
||
5B41000
|
trusted library allocation
|
page read and write
|
||
56E7000
|
trusted library allocation
|
page read and write
|
||
E80000
|
direct allocation
|
page read and write
|
||
F74000
|
heap
|
page read and write
|
||
4D10000
|
direct allocation
|
page execute and read and write
|
||
4BFB000
|
stack
|
page read and write
|
||
556E000
|
stack
|
page read and write
|
||
56BE000
|
trusted library allocation
|
page read and write
|
||
F7C000
|
heap
|
page read and write
|
||
5DBC000
|
trusted library allocation
|
page read and write
|
||
5B48000
|
trusted library allocation
|
page read and write
|
||
E34000
|
heap
|
page read and write
|
||
5B4D000
|
trusted library allocation
|
page read and write
|
||
56C5000
|
trusted library allocation
|
page read and write
|
||
523E000
|
stack
|
page read and write
|
||
5BD8000
|
trusted library allocation
|
page read and write
|
||
E34000
|
heap
|
page read and write
|
||
56A8000
|
trusted library allocation
|
page read and write
|
||
5C8D000
|
trusted library allocation
|
page read and write
|
||
5B44000
|
trusted library allocation
|
page read and write
|
||
66BF000
|
stack
|
page read and write
|
||
5C96000
|
trusted library allocation
|
page read and write
|
||
5706000
|
trusted library allocation
|
page read and write
|
||
5753000
|
trusted library allocation
|
page read and write
|
||
5B48000
|
trusted library allocation
|
page read and write
|
||
7FC0000
|
direct allocation
|
page read and write
|
||
E9A000
|
heap
|
page read and write
|
||
56E7000
|
trusted library allocation
|
page read and write
|
||
F60000
|
heap
|
page read and write
|
||
5C6B000
|
trusted library allocation
|
page read and write
|
||
7FC0000
|
direct allocation
|
page read and write
|
||
56E7000
|
trusted library allocation
|
page read and write
|
||
31EF000
|
stack
|
page read and write
|
||
5C08000
|
trusted library allocation
|
page read and write
|
||
56E7000
|
trusted library allocation
|
page read and write
|
||
56A1000
|
trusted library allocation
|
page read and write
|
||
56F2000
|
trusted library allocation
|
page read and write
|
||
56C6000
|
trusted library allocation
|
page read and write
|
||
3D6D000
|
stack
|
page read and write
|
||
4D40000
|
direct allocation
|
page execute and read and write
|
||
6F7F000
|
stack
|
page read and write
|
||
7FC0000
|
direct allocation
|
page read and write
|
||
56CC000
|
trusted library allocation
|
page read and write
|
||
5C9F000
|
trusted library allocation
|
page read and write
|
||
2E6E000
|
stack
|
page read and write
|
||
570F000
|
trusted library allocation
|
page read and write
|
||
F7A000
|
heap
|
page read and write
|
||
571B000
|
trusted library allocation
|
page read and write
|
||
E9E000
|
heap
|
page read and write
|
||
566F000
|
stack
|
page read and write
|
||
56B4000
|
trusted library allocation
|
page read and write
|
||
5B49000
|
trusted library allocation
|
page read and write
|
||
56A5000
|
trusted library allocation
|
page read and write
|
||
56E7000
|
trusted library allocation
|
page read and write
|
||
56B1000
|
trusted library allocation
|
page read and write
|
||
56F5000
|
trusted library allocation
|
page read and write
|
||
61AB000
|
trusted library allocation
|
page execute and read and write
|
||
5708000
|
trusted library allocation
|
page read and write
|
||
56D7000
|
trusted library allocation
|
page read and write
|
||
5919000
|
trusted library allocation
|
page read and write
|
||
5D7000
|
unkown
|
page execute and write copy
|
||
F7B000
|
heap
|
page read and write
|
||
5513000
|
heap
|
page read and write
|
||
5240000
|
remote allocation
|
page read and write
|
||
56E2000
|
trusted library allocation
|
page read and write
|
||
F40000
|
heap
|
page read and write
|
||
F7F000
|
heap
|
page read and write
|
||
5C8E000
|
trusted library allocation
|
page read and write
|
||
57A6000
|
trusted library allocation
|
page read and write
|
||
7ABF000
|
stack
|
page read and write
|
||
3C2E000
|
stack
|
page read and write
|
||
5B49000
|
trusted library allocation
|
page read and write
|
||
99E0000
|
trusted library allocation
|
page read and write
|
||
66FE000
|
stack
|
page read and write
|
||
56AE000
|
trusted library allocation
|
page read and write
|
||
5C8B000
|
trusted library allocation
|
page read and write
|
||
5C30000
|
trusted library allocation
|
page read and write
|
||
5C50000
|
trusted library allocation
|
page read and write
|
||
5C54000
|
trusted library allocation
|
page read and write
|
||
7FC0000
|
direct allocation
|
page read and write
|
||
513E000
|
stack
|
page read and write
|
||
5B43000
|
trusted library allocation
|
page read and write
|
||
5C51000
|
trusted library allocation
|
page read and write
|
||
E90000
|
heap
|
page read and write
|
||
141000
|
unkown
|
page execute and write copy
|
||
5BFD000
|
trusted library allocation
|
page read and write
|
||
E7D000
|
stack
|
page read and write
|
||
E34000
|
heap
|
page read and write
|
||
56D7000
|
trusted library allocation
|
page read and write
|
||
E34000
|
heap
|
page read and write
|
||
56F8000
|
trusted library allocation
|
page read and write
|
||
F84000
|
heap
|
page read and write
|
||
7FC0000
|
direct allocation
|
page read and write
|
||
E34000
|
heap
|
page read and write
|
||
5C3B000
|
trusted library allocation
|
page read and write
|
||
56B6000
|
trusted library allocation
|
page read and write
|
||
E80000
|
direct allocation
|
page read and write
|
||
4B80000
|
heap
|
page read and write
|
||
570A000
|
trusted library allocation
|
page read and write
|
||
322E000
|
stack
|
page read and write
|
||
F70000
|
heap
|
page read and write
|
||
57E1000
|
trusted library allocation
|
page read and write
|
||
5C08000
|
trusted library allocation
|
page read and write
|
||
773E000
|
stack
|
page read and write
|
||
876C000
|
stack
|
page read and write
|
||
8000000
|
trusted library allocation
|
page read and write
|
||
5705000
|
trusted library allocation
|
page read and write
|
||
57AA000
|
trusted library allocation
|
page read and write
|
||
5D35000
|
trusted library allocation
|
page read and write
|
||
436F000
|
stack
|
page read and write
|
||
426E000
|
stack
|
page read and write
|
||
5753000
|
trusted library allocation
|
page read and write
|
||
6E7E000
|
stack
|
page read and write
|
||
5B4F000
|
trusted library allocation
|
page read and write
|
||
4731000
|
heap
|
page read and write
|
||
6E3F000
|
stack
|
page read and write
|
||
5C38000
|
trusted library allocation
|
page read and write
|
||
56E7000
|
trusted library allocation
|
page read and write
|
||
5B4E000
|
trusted library allocation
|
page read and write
|
||
70BF000
|
stack
|
page read and write
|
||
44EE000
|
stack
|
page read and write
|
||
787E000
|
stack
|
page read and write
|
||
4731000
|
heap
|
page read and write
|
||
5C98000
|
trusted library allocation
|
page read and write
|
||
5B4A000
|
trusted library allocation
|
page read and write
|
||
7FC0000
|
direct allocation
|
page read and write
|
||
807C000
|
stack
|
page read and write
|
||
56B8000
|
trusted library allocation
|
page read and write
|
||
56A9000
|
trusted library allocation
|
page read and write
|
||
56BA000
|
trusted library allocation
|
page read and write
|
||
5C40000
|
trusted library allocation
|
page read and write
|
||
5724000
|
trusted library allocation
|
page read and write
|
||
5B42000
|
trusted library allocation
|
page read and write
|
||
8020000
|
direct allocation
|
page read and write
|
||
5C78000
|
trusted library allocation
|
page read and write
|
||
5C62000
|
trusted library allocation
|
page read and write
|
||
F63000
|
heap
|
page read and write
|
||
56E7000
|
trusted library allocation
|
page read and write
|
||
9B0000
|
heap
|
page read and write
|
||
E34000
|
heap
|
page read and write
|
||
5BEA000
|
trusted library allocation
|
page read and write
|
||
5B41000
|
trusted library allocation
|
page read and write
|
||
5B44000
|
trusted library allocation
|
page read and write
|
||
8030000
|
heap
|
page read and write
|
||
56C6000
|
trusted library allocation
|
page read and write
|
||
35AF000
|
stack
|
page read and write
|
||
56B1000
|
trusted library allocation
|
page read and write
|
||
56D7000
|
trusted library allocation
|
page read and write
|
||
4731000
|
heap
|
page read and write
|
||
73CE1000
|
unkown
|
page execute read
|
||
56AE000
|
trusted library allocation
|
page read and write
|
||
5C7D000
|
trusted library allocation
|
page read and write
|
||
6A7F000
|
stack
|
page read and write
|
||
56D6000
|
trusted library allocation
|
page read and write
|
||
5C3A000
|
trusted library allocation
|
page read and write
|
||
5B46000
|
trusted library allocation
|
page read and write
|
||
5940000
|
trusted library allocation
|
page read and write
|
||
56C6000
|
trusted library allocation
|
page read and write
|
||
56E7000
|
trusted library allocation
|
page read and write
|
||
320000
|
unkown
|
page execute and read and write
|
||
5B47000
|
trusted library allocation
|
page read and write
|
||
56D6000
|
trusted library allocation
|
page read and write
|
||
5787000
|
trusted library allocation
|
page read and write
|
||
5B4C000
|
trusted library allocation
|
page read and write
|
||
5B45000
|
trusted library allocation
|
page read and write
|
||
E34000
|
heap
|
page read and write
|
||
56FF000
|
trusted library allocation
|
page read and write
|
||
5B48000
|
trusted library allocation
|
page read and write
|
||
8020000
|
direct allocation
|
page read and write
|
||
5BFE000
|
trusted library allocation
|
page read and write
|
||
56E7000
|
trusted library allocation
|
page read and write
|
||
5B43000
|
trusted library allocation
|
page read and write
|
||
5DD7000
|
trusted library allocation
|
page read and write
|
||
4731000
|
heap
|
page read and write
|
||
5B44000
|
trusted library allocation
|
page read and write
|
||
56D6000
|
trusted library allocation
|
page read and write
|
||
4731000
|
heap
|
page read and write
|
||
783F000
|
stack
|
page read and write
|
||
56E7000
|
trusted library allocation
|
page read and write
|
||
7FC0000
|
direct allocation
|
page read and write
|
||
56D5000
|
trusted library allocation
|
page read and write
|
||
CFA000
|
stack
|
page read and write
|
||
5CDB000
|
trusted library allocation
|
page read and write
|
||
56E7000
|
trusted library allocation
|
page read and write
|
||
4740000
|
heap
|
page read and write
|
||
E80000
|
direct allocation
|
page read and write
|
||
E80000
|
direct allocation
|
page read and write
|
||
5B4C000
|
trusted library allocation
|
page read and write
|
||
61BC000
|
trusted library allocation
|
page execute and read and write
|
||
35EE000
|
stack
|
page read and write
|
||
817E000
|
stack
|
page read and write
|
||
56D3000
|
trusted library allocation
|
page read and write
|
||
7FC0000
|
direct allocation
|
page read and write
|
||
39AE000
|
stack
|
page read and write
|
||
5B43000
|
trusted library allocation
|
page read and write
|
||
56D6000
|
trusted library allocation
|
page read and write
|
||
5B43000
|
trusted library allocation
|
page read and write
|
||
4731000
|
heap
|
page read and write
|
||
5BE7000
|
trusted library allocation
|
page read and write
|
||
5C97000
|
trusted library allocation
|
page read and write
|
||
5BE8000
|
trusted library allocation
|
page read and write
|
||
57A4000
|
trusted library allocation
|
page read and write
|
||
56D6000
|
trusted library allocation
|
page read and write
|
||
56FB000
|
trusted library allocation
|
page read and write
|
||
E80000
|
direct allocation
|
page read and write
|
||
412E000
|
stack
|
page read and write
|
||
F76000
|
heap
|
page read and write
|
||
5C6C000
|
trusted library allocation
|
page read and write
|
||
3FAF000
|
stack
|
page read and write
|
||
573B000
|
trusted library allocation
|
page read and write
|
||
F76000
|
heap
|
page read and write
|
||
647E000
|
stack
|
page read and write
|
||
56E7000
|
trusted library allocation
|
page read and write
|
||
34AE000
|
stack
|
page read and write
|
||
56C4000
|
trusted library allocation
|
page read and write
|
||
56E5000
|
trusted library allocation
|
page read and write
|
||
56BD000
|
trusted library allocation
|
page read and write
|
||
F60000
|
heap
|
page read and write
|
||
56D3000
|
trusted library allocation
|
page read and write
|
||
336E000
|
stack
|
page read and write
|
||
56BC000
|
trusted library allocation
|
page read and write
|
||
56E7000
|
trusted library allocation
|
page read and write
|
||
4731000
|
heap
|
page read and write
|
||
2A6F000
|
stack
|
page read and write
|
||
5B4F000
|
trusted library allocation
|
page read and write
|
||
E0E000
|
stack
|
page read and write
|
||
2FAE000
|
stack
|
page read and write
|
||
56E7000
|
trusted library allocation
|
page read and write
|
||
5B46000
|
trusted library allocation
|
page read and write
|
||
F66000
|
heap
|
page read and write
|
||
5B4A000
|
trusted library allocation
|
page read and write
|
||
5702000
|
trusted library allocation
|
page read and write
|
||
5713000
|
trusted library allocation
|
page read and write
|
||
5706000
|
trusted library allocation
|
page read and write
|
||
5BE5000
|
trusted library allocation
|
page read and write
|
||
401000
|
unkown
|
page execute and read and write
|
||
EC8000
|
heap
|
page read and write
|
||
F64000
|
heap
|
page read and write
|
||
61B9000
|
trusted library allocation
|
page read and write
|
||
E34000
|
heap
|
page read and write
|
||
F66000
|
heap
|
page read and write
|
||
5CD8000
|
trusted library allocation
|
page read and write
|
||
5C2E000
|
trusted library allocation
|
page read and write
|
||
332F000
|
stack
|
page read and write
|
||
5C5E000
|
trusted library allocation
|
page read and write
|
||
56F3000
|
trusted library allocation
|
page read and write
|
||
5BD6000
|
trusted library allocation
|
page read and write
|
||
6BFE000
|
stack
|
page read and write
|
||
43D000
|
unkown
|
page execute and read and write
|
||
F7D000
|
heap
|
page read and write
|
||
56BE000
|
trusted library allocation
|
page read and write
|
||
5B42000
|
trusted library allocation
|
page read and write
|
||
56A9000
|
trusted library allocation
|
page read and write
|
||
56CC000
|
trusted library allocation
|
page read and write
|
||
5753000
|
trusted library allocation
|
page read and write
|
||
53AF000
|
stack
|
page read and write
|
||
723E000
|
stack
|
page read and write
|
||
F84000
|
heap
|
page read and write
|
||
5F00000
|
trusted library allocation
|
page read and write
|
||
5B4A000
|
trusted library allocation
|
page read and write
|
||
40EF000
|
stack
|
page read and write
|
||
56E7000
|
trusted library allocation
|
page read and write
|
||
56D6000
|
trusted library allocation
|
page read and write
|
||
56E7000
|
trusted library allocation
|
page read and write
|
||
36EF000
|
stack
|
page read and write
|
||
56E7000
|
trusted library allocation
|
page read and write
|
||
4EBD000
|
stack
|
page read and write
|
||
56A1000
|
trusted library allocation
|
page read and write
|
||
5C88000
|
trusted library allocation
|
page read and write
|
||
E30000
|
heap
|
page read and write
|
||
F76000
|
heap
|
page read and write
|
||
F70000
|
heap
|
page read and write
|
||
56EA000
|
trusted library allocation
|
page read and write
|
||
57AB000
|
trusted library allocation
|
page read and write
|
||
F3D000
|
heap
|
page read and write
|
||
4731000
|
heap
|
page read and write
|
||
56D6000
|
trusted library allocation
|
page read and write
|
||
2D2E000
|
stack
|
page read and write
|
||
5CEC000
|
trusted library allocation
|
page read and write
|
||
E80000
|
direct allocation
|
page read and write
|
||
5CDA000
|
trusted library allocation
|
page read and write
|
||
5702000
|
trusted library allocation
|
page read and write
|
||
5889000
|
trusted library allocation
|
page read and write
|
||
198000
|
unkown
|
page execute and read and write
|
||
F60000
|
heap
|
page read and write
|
||
56C6000
|
trusted library allocation
|
page read and write
|
||
5879000
|
trusted library allocation
|
page read and write
|
||
5712000
|
trusted library allocation
|
page read and write
|
||
5D4A000
|
trusted library allocation
|
page read and write
|
||
5702000
|
trusted library allocation
|
page read and write
|
||
56C6000
|
trusted library allocation
|
page read and write
|
||
5703000
|
trusted library allocation
|
page read and write
|
||
56E8000
|
trusted library allocation
|
page read and write
|
||
5B42000
|
trusted library allocation
|
page read and write
|
||
F63000
|
heap
|
page read and write
|
||
56CA000
|
trusted library allocation
|
page read and write
|
||
56E7000
|
trusted library allocation
|
page read and write
|
||
56B2000
|
trusted library allocation
|
page read and write
|
||
5C77000
|
trusted library allocation
|
page read and write
|
||
5B41000
|
trusted library allocation
|
page read and write
|
||
E34000
|
heap
|
page read and write
|
||
5706000
|
trusted library allocation
|
page read and write
|
||
4D20000
|
direct allocation
|
page execute and read and write
|
||
5B49000
|
trusted library allocation
|
page read and write
|
||
57D9000
|
stack
|
page read and write
|
||
7FC0000
|
direct allocation
|
page read and write
|
||
84EE000
|
stack
|
page read and write
|
||
5B43000
|
trusted library allocation
|
page read and write
|
||
4C04000
|
direct allocation
|
page read and write
|
||
5B47000
|
trusted library allocation
|
page read and write
|
||
56A4000
|
trusted library allocation
|
page read and write
|
||
5701000
|
trusted library allocation
|
page read and write
|
||
56D0000
|
trusted library allocation
|
page read and write
|
||
4D40000
|
direct allocation
|
page execute and read and write
|
||
75BF000
|
stack
|
page read and write
|
||
5B42000
|
trusted library allocation
|
page read and write
|
||
94B000
|
stack
|
page read and write
|
||
F5C000
|
heap
|
page read and write
|
||
56D5000
|
trusted library allocation
|
page read and write
|
||
56E7000
|
trusted library allocation
|
page read and write
|
||
4D40000
|
direct allocation
|
page execute and read and write
|
||
7FE0000
|
heap
|
page read and write
|
||
57A2000
|
trusted library allocation
|
page read and write
|
||
5CB7000
|
trusted library allocation
|
page read and write
|
||
7BFF000
|
stack
|
page read and write
|
||
56D7000
|
trusted library allocation
|
page read and write
|
||
5B41000
|
trusted library allocation
|
page read and write
|
||
56C1000
|
trusted library allocation
|
page read and write
|
||
F6E000
|
heap
|
page read and write
|
||
56E7000
|
trusted library allocation
|
page read and write
|
||
56BF000
|
trusted library allocation
|
page read and write
|
||
56A1000
|
trusted library allocation
|
page read and write
|
||
575D000
|
trusted library allocation
|
page read and write
|
||
56C9000
|
trusted library allocation
|
page read and write
|
||
56B0000
|
trusted library allocation
|
page read and write
|
||
F66000
|
heap
|
page read and write
|
||
5C8C000
|
trusted library allocation
|
page read and write
|
||
57A5000
|
trusted library allocation
|
page read and write
|
||
4D86000
|
trusted library allocation
|
page read and write
|
||
56D3000
|
trusted library allocation
|
page read and write
|
||
56AB000
|
trusted library allocation
|
page read and write
|
||
5724000
|
trusted library allocation
|
page read and write
|
||
73CF6000
|
unkown
|
page execute and read and write
|
||
5B43000
|
trusted library allocation
|
page read and write
|
||
6BBF000
|
stack
|
page read and write
|
||
594B000
|
trusted library allocation
|
page read and write
|
||
F76000
|
heap
|
page read and write
|
||
57A2000
|
trusted library allocation
|
page read and write
|
||
733F000
|
stack
|
page read and write
|
||
386E000
|
stack
|
page read and write
|
||
633C000
|
stack
|
page read and write
|
||
7FC0000
|
trusted library allocation
|
page read and write
|
||
F7B000
|
heap
|
page read and write
|
||
693F000
|
stack
|
page read and write
|
||
74BE000
|
stack
|
page read and write
|
||
4CFF000
|
stack
|
page read and write
|
||
56F4000
|
trusted library allocation
|
page read and write
|
||
5753000
|
trusted library allocation
|
page read and write
|
||
5753000
|
trusted library allocation
|
page read and write
|
||
F6B000
|
heap
|
page read and write
|
||
56E7000
|
trusted library allocation
|
page read and write
|
||
6ABE000
|
stack
|
page read and write
|
||
F67000
|
heap
|
page read and write
|
||
56E7000
|
trusted library allocation
|
page read and write
|
||
56E7000
|
trusted library allocation
|
page read and write
|
||
5C2C000
|
trusted library allocation
|
page read and write
|
||
56AE000
|
trusted library allocation
|
page read and write
|
||
56EB000
|
trusted library allocation
|
page read and write
|
||
56E7000
|
trusted library allocation
|
page read and write
|
||
43E000
|
unkown
|
page execute and write copy
|
||
F75000
|
heap
|
page read and write
|
||
108E000
|
stack
|
page read and write
|
||
56BC000
|
trusted library allocation
|
page read and write
|
||
56A4000
|
trusted library allocation
|
page read and write
|
||
F84000
|
heap
|
page read and write
|
||
56DF000
|
trusted library allocation
|
page read and write
|
||
F6D000
|
heap
|
page read and write
|
||
5723000
|
trusted library allocation
|
page read and write
|
||
E80000
|
direct allocation
|
page read and write
|
||
4731000
|
heap
|
page read and write
|
||
56FF000
|
trusted library allocation
|
page read and write
|
||
56B3000
|
trusted library allocation
|
page read and write
|
||
56BD000
|
trusted library allocation
|
page read and write
|
||
56FB000
|
trusted library allocation
|
page read and write
|
||
56AE000
|
trusted library allocation
|
page read and write
|
||
5801000
|
trusted library allocation
|
page read and write
|
||
571B000
|
trusted library allocation
|
page read and write
|
||
372E000
|
stack
|
page read and write
|
||
5C2E000
|
trusted library allocation
|
page read and write
|
||
5B44000
|
trusted library allocation
|
page read and write
|
||
5B46000
|
trusted library allocation
|
page read and write
|
||
73CFF000
|
unkown
|
page readonly
|
||
56E7000
|
trusted library allocation
|
page read and write
|
||
56E7000
|
trusted library allocation
|
page read and write
|
||
5851000
|
trusted library allocation
|
page read and write
|
||
4D50000
|
direct allocation
|
page execute and read and write
|
||
44AF000
|
stack
|
page read and write
|
||
5705000
|
trusted library allocation
|
page read and write
|
||
4731000
|
heap
|
page read and write
|
||
56EA000
|
trusted library allocation
|
page read and write
|
||
5B46000
|
trusted library allocation
|
page read and write
|
||
571B000
|
trusted library allocation
|
page read and write
|
||
462E000
|
stack
|
page read and write
|
||
56C6000
|
trusted library allocation
|
page read and write
|
||
56E7000
|
trusted library allocation
|
page read and write
|
||
5B4B000
|
trusted library allocation
|
page read and write
|
||
30EE000
|
stack
|
page read and write
|
||
5B44000
|
trusted library allocation
|
page read and write
|
||
56D7000
|
trusted library allocation
|
page read and write
|
||
53EE000
|
stack
|
page read and write
|
||
2AAB000
|
stack
|
page read and write
|
||
56D5000
|
trusted library allocation
|
page read and write
|
||
56FB000
|
trusted library allocation
|
page read and write
|
||
8272000
|
trusted library allocation
|
page read and write
|
||
56BF000
|
trusted library allocation
|
page read and write
|
||
56A6000
|
trusted library allocation
|
page read and write
|
||
5DD9000
|
trusted library allocation
|
page read and write
|
||
5C8A000
|
trusted library allocation
|
page read and write
|
||
5B40000
|
trusted library allocation
|
page read and write
|
||
56E7000
|
trusted library allocation
|
page read and write
|
||
5C0A000
|
trusted library allocation
|
page read and write
|
||
56D6000
|
trusted library allocation
|
page read and write
|
||
56E7000
|
trusted library allocation
|
page read and write
|
||
F72000
|
heap
|
page read and write
|
||
8020000
|
direct allocation
|
page read and write
|
||
56C3000
|
trusted library allocation
|
page read and write
|
||
9A9E000
|
stack
|
page read and write
|
||
56B2000
|
trusted library allocation
|
page read and write
|
||
4FBD000
|
stack
|
page read and write
|
||
5D4C000
|
trusted library allocation
|
page read and write
|
||
8180000
|
direct allocation
|
page execute and read and write
|
||
5C38000
|
trusted library allocation
|
page read and write
|
||
683E000
|
stack
|
page read and write
|
||
5C8A000
|
trusted library allocation
|
page read and write
|
||
56D7000
|
trusted library allocation
|
page read and write
|
||
62FF000
|
stack
|
page read and write
|
||
5B44000
|
trusted library allocation
|
page read and write
|
||
57C9000
|
trusted library allocation
|
page read and write
|
||
F62000
|
heap
|
page read and write
|
||
571C000
|
trusted library allocation
|
page read and write
|
||
54EE000
|
stack
|
page read and write
|
||
7D3F000
|
stack
|
page read and write
|
||
56D7000
|
trusted library allocation
|
page read and write
|
||
5C39000
|
trusted library allocation
|
page read and write
|
||
5C90000
|
trusted library allocation
|
page read and write
|
||
797F000
|
stack
|
page read and write
|
||
5B4A000
|
trusted library allocation
|
page read and write
|
||
5D33000
|
trusted library allocation
|
page read and write
|
||
5743000
|
trusted library allocation
|
page read and write
|
||
5C0C000
|
trusted library allocation
|
page read and write
|
||
5D1A000
|
trusted library allocation
|
page read and write
|
||
56A7000
|
trusted library allocation
|
page read and write
|
||
F6D000
|
heap
|
page read and write
|
||
5B45000
|
trusted library allocation
|
page read and write
|
||
5BE4000
|
trusted library allocation
|
page read and write
|
||
7C3E000
|
stack
|
page read and write
|
||
75FE000
|
stack
|
page read and write
|
||
4731000
|
heap
|
page read and write
|
||
57A0000
|
trusted library allocation
|
page read and write
|
||
9AA0000
|
trusted library allocation
|
page read and write
|
||
4731000
|
heap
|
page read and write
|
||
5C4E000
|
trusted library allocation
|
page read and write
|
||
7FC0000
|
direct allocation
|
page read and write
|
||
5B4C000
|
trusted library allocation
|
page read and write
|
||
4830000
|
trusted library allocation
|
page read and write
|
||
F87000
|
heap
|
page read and write
|
||
56C5000
|
trusted library allocation
|
page read and write
|
||
56AB000
|
trusted library allocation
|
page read and write
|
||
5C5C000
|
trusted library allocation
|
page read and write
|
||
5B45000
|
trusted library allocation
|
page read and write
|
||
5C2E000
|
trusted library allocation
|
page read and write
|
||
45EF000
|
stack
|
page read and write
|
||
2BAF000
|
stack
|
page read and write
|
||
E20000
|
heap
|
page read and write
|
||
6D3E000
|
stack
|
page read and write
|
||
56D7000
|
trusted library allocation
|
page read and write
|
||
5B43000
|
trusted library allocation
|
page read and write
|
||
F54000
|
heap
|
page read and write
|
||
643F000
|
stack
|
page read and write
|
||
56C2000
|
trusted library allocation
|
page read and write
|
||
56C1000
|
trusted library allocation
|
page read and write
|
||
56A7000
|
trusted library allocation
|
page read and write
|
||
5D38000
|
trusted library allocation
|
page read and write
|
||
5C37000
|
trusted library allocation
|
page read and write
|
||
5B48000
|
trusted library allocation
|
page read and write
|
||
56F0000
|
trusted library allocation
|
page read and write
|
||
5C30000
|
trusted library allocation
|
page read and write
|
||
F6C000
|
heap
|
page read and write
|
||
56D6000
|
trusted library allocation
|
page read and write
|
||
5C6D000
|
trusted library allocation
|
page read and write
|
||
56E7000
|
trusted library allocation
|
page read and write
|
||
737E000
|
stack
|
page read and write
|
||
E34000
|
heap
|
page read and write
|
||
E80000
|
direct allocation
|
page read and write
|
||
E34000
|
heap
|
page read and write
|
||
56D5000
|
trusted library allocation
|
page read and write
|
||
396F000
|
stack
|
page read and write
|
||
F7A000
|
heap
|
page read and write
|
||
3E6F000
|
stack
|
page read and write
|
||
296E000
|
stack
|
page read and write
|
||
575F000
|
trusted library allocation
|
page read and write
|
||
81B0000
|
direct allocation
|
page execute and read and write
|
||
56C8000
|
trusted library allocation
|
page read and write
|
||
56E7000
|
trusted library allocation
|
page read and write
|
||
56D1000
|
trusted library allocation
|
page read and write
|
||
140000
|
unkown
|
page readonly
|
||
F7A000
|
heap
|
page read and write
|
||
5C0A000
|
trusted library allocation
|
page read and write
|
||
56AC000
|
trusted library allocation
|
page read and write
|
||
4731000
|
heap
|
page read and write
|
||
50FF000
|
stack
|
page read and write
|
||
56C6000
|
trusted library allocation
|
page read and write
|
||
571B000
|
trusted library allocation
|
page read and write
|
||
5C1D000
|
trusted library allocation
|
page read and write
|
||
866C000
|
stack
|
page read and write
|
||
56E1000
|
trusted library allocation
|
page read and write
|
||
3EAE000
|
stack
|
page read and write
|
||
F62000
|
heap
|
page read and write
|
||
73CFD000
|
unkown
|
page read and write
|
||
571B000
|
trusted library allocation
|
page read and write
|
||
56B1000
|
trusted library allocation
|
page read and write
|
||
E80000
|
direct allocation
|
page read and write
|
||
F72000
|
heap
|
page read and write
|
||
56FA000
|
trusted library allocation
|
page read and write
|
||
4731000
|
heap
|
page read and write
|
||
8270000
|
trusted library allocation
|
page read and write
|
||
5F06000
|
trusted library allocation
|
page read and write
|
||
56AE000
|
trusted library allocation
|
page read and write
|
||
56CF000
|
trusted library allocation
|
page read and write
|
||
56DB000
|
trusted library allocation
|
page read and write
|
||
5B4E000
|
trusted library allocation
|
page read and write
|
||
E34000
|
heap
|
page read and write
|
||
56E7000
|
trusted library allocation
|
page read and write
|
||
5C8B000
|
trusted library allocation
|
page read and write
|
||
56A5000
|
trusted library allocation
|
page read and write
|
||
56C6000
|
trusted library allocation
|
page read and write
|
||
5B43000
|
trusted library allocation
|
page read and write
|
||
5B4A000
|
trusted library allocation
|
page read and write
|
||
56C9000
|
trusted library allocation
|
page read and write
|
||
7FC0000
|
direct allocation
|
page read and write
|
||
73CF7000
|
unkown
|
page readonly
|
||
5C58000
|
trusted library allocation
|
page read and write
|
||
E34000
|
heap
|
page read and write
|
||
5C8E000
|
trusted library allocation
|
page read and write
|
||
43D000
|
unkown
|
page execute and write copy
|
||
56A5000
|
trusted library allocation
|
page read and write
|
||
52AE000
|
stack
|
page read and write
|
||
5743000
|
trusted library allocation
|
page read and write
|
||
F62000
|
heap
|
page read and write
|
||
697E000
|
stack
|
page read and write
|
||
5704000
|
trusted library allocation
|
page read and write
|
||
4FFE000
|
stack
|
page read and write
|
||
3FEE000
|
stack
|
page read and write
|
||
9A0000
|
heap
|
page read and write
|
||
56BF000
|
trusted library allocation
|
page read and write
|
||
5C89000
|
trusted library allocation
|
page read and write
|
||
56FE000
|
trusted library allocation
|
page read and write
|
||
5D68000
|
trusted library allocation
|
page read and write
|
||
E34000
|
heap
|
page read and write
|
||
609A000
|
trusted library allocation
|
page execute and read and write
|
||
572F000
|
trusted library allocation
|
page read and write
|
||
56A9000
|
trusted library allocation
|
page read and write
|
||
422F000
|
stack
|
page read and write
|
||
5CD9000
|
trusted library allocation
|
page read and write
|
||
5C95000
|
trusted library allocation
|
page read and write
|
||
5240000
|
remote allocation
|
page read and write
|
||
5B47000
|
trusted library allocation
|
page read and write
|
||
56A7000
|
trusted library allocation
|
page read and write
|
||
5B4C000
|
trusted library allocation
|
page read and write
|
||
F76000
|
heap
|
page read and write
|
||
5835000
|
trusted library allocation
|
page read and write
|
||
56C5000
|
trusted library allocation
|
page read and write
|
||
7EBE000
|
stack
|
page read and write
|
||
56E7000
|
trusted library allocation
|
page read and write
|
||
5CEA000
|
trusted library allocation
|
page read and write
|
||
382F000
|
stack
|
page read and write
|
||
5C3E000
|
trusted library allocation
|
page read and write
|
||
5C42000
|
trusted library allocation
|
page read and write
|
||
5B40000
|
trusted library allocation
|
page read and write
|
||
5B4F000
|
trusted library allocation
|
page read and write
|
||
2BEE000
|
stack
|
page read and write
|
||
2F6F000
|
stack
|
page read and write
|
||
42F000
|
unkown
|
page execute and read and write
|
||
56BA000
|
trusted library allocation
|
page read and write
|
||
5B48000
|
trusted library allocation
|
page read and write
|
||
F6B000
|
heap
|
page read and write
|
||
70FE000
|
stack
|
page read and write
|
||
7FC0000
|
direct allocation
|
page read and write
|
||
5D6000
|
unkown
|
page execute and read and write
|
||
57A4000
|
trusted library allocation
|
page read and write
|
||
5B42000
|
trusted library allocation
|
page read and write
|
||
5881000
|
trusted library allocation
|
page read and write
|
||
56CC000
|
trusted library allocation
|
page read and write
|
||
E34000
|
heap
|
page read and write
|
||
5D66000
|
trusted library allocation
|
page read and write
|
||
E80000
|
direct allocation
|
page read and write
|
||
5B4D000
|
trusted library allocation
|
page read and write
|
||
5F02000
|
trusted library allocation
|
page execute and read and write
|
||
5B43000
|
trusted library allocation
|
page read and write
|
||
4731000
|
heap
|
page read and write
|
||
56D3000
|
trusted library allocation
|
page read and write
|
||
F63000
|
heap
|
page read and write
|
||
56D7000
|
trusted library allocation
|
page read and write
|
||
E34000
|
heap
|
page read and write
|
||
56A9000
|
trusted library allocation
|
page read and write
|
||
56D7000
|
trusted library allocation
|
page read and write
|
||
427000
|
unkown
|
page execute and read and write
|
||
5C75000
|
trusted library allocation
|
page read and write
|
||
56E7000
|
trusted library allocation
|
page read and write
|
||
5CD5000
|
trusted library allocation
|
page read and write
|
||
5C0B000
|
trusted library allocation
|
page read and write
|
||
747F000
|
stack
|
page read and write
|
||
472F000
|
stack
|
page read and write
|
||
5EF9000
|
stack
|
page read and write
|
||
3BEF000
|
stack
|
page read and write
|
||
56A7000
|
trusted library allocation
|
page read and write
|
||
56BE000
|
trusted library allocation
|
page read and write
|
||
F6B000
|
heap
|
page read and write
|
||
5C9D000
|
trusted library allocation
|
page read and write
|
||
56C9000
|
trusted library allocation
|
page read and write
|
||
56A1000
|
trusted library allocation
|
page read and write
|
||
5B4D000
|
trusted library allocation
|
page read and write
|
||
185000
|
unkown
|
page execute and read and write
|
||
E80000
|
direct allocation
|
page read and write
|
||
56E1000
|
trusted library allocation
|
page read and write
|
||
4D40000
|
direct allocation
|
page execute and read and write
|
||
2CEF000
|
stack
|
page read and write
|
||
F63000
|
heap
|
page read and write
|
||
56D4000
|
trusted library allocation
|
page read and write
|
||
56CE000
|
trusted library allocation
|
page read and write
|
||
5C3A000
|
trusted library allocation
|
page read and write
|
||
5B41000
|
trusted library allocation
|
page read and write
|
||
4731000
|
heap
|
page read and write
|
||
65BE000
|
stack
|
page read and write
|
||
F63000
|
heap
|
page read and write
|
||
5BFF000
|
trusted library allocation
|
page read and write
|
||
56D2000
|
trusted library allocation
|
page read and write
|
||
56B1000
|
trusted library allocation
|
page read and write
|
||
56E7000
|
trusted library allocation
|
page read and write
|
||
56D7000
|
trusted library allocation
|
page read and write
|
||
5713000
|
trusted library allocation
|
page read and write
|
||
5708000
|
trusted library allocation
|
page read and write
|
||
56A5000
|
trusted library allocation
|
page read and write
|
||
F74000
|
heap
|
page read and write
|
||
56D6000
|
trusted library allocation
|
page read and write
|
||
56E7000
|
trusted library allocation
|
page read and write
|
||
E34000
|
heap
|
page read and write
|
||
5C13000
|
trusted library allocation
|
page read and write
|
||
4D40000
|
direct allocation
|
page execute and read and write
|
||
5B42000
|
trusted library allocation
|
page read and write
|
||
5C40000
|
trusted library allocation
|
page read and write
|
||
56D9000
|
trusted library allocation
|
page read and write
|
||
5B45000
|
trusted library allocation
|
page read and write
|
||
56D6000
|
trusted library allocation
|
page read and write
|
||
3AEE000
|
stack
|
page read and write
|
||
F64000
|
heap
|
page read and write
|
||
5D8D000
|
trusted library allocation
|
page read and write
|
||
5B41000
|
trusted library allocation
|
page read and write
|
||
5755000
|
trusted library allocation
|
page read and write
|
||
4BC0000
|
direct allocation
|
page read and write
|
||
56C8000
|
trusted library allocation
|
page read and write
|
||
571B000
|
trusted library allocation
|
page read and write
|
||
5703000
|
trusted library allocation
|
page read and write
|
||
43AE000
|
stack
|
page read and write
|
||
56A1000
|
trusted library allocation
|
page read and write
|
||
7FBF000
|
stack
|
page read and write
|
||
5708000
|
trusted library allocation
|
page read and write
|
||
3D2F000
|
stack
|
page read and write
|
||
4D30000
|
direct allocation
|
page execute and read and write
|
||
56E6000
|
trusted library allocation
|
page read and write
|
||
56DD000
|
trusted library allocation
|
page read and write
|
||
56A1000
|
trusted library allocation
|
page read and write
|
||
6CFF000
|
stack
|
page read and write
|
||
E34000
|
heap
|
page read and write
|
||
ED8000
|
heap
|
page read and write
|
||
4BC0000
|
direct allocation
|
page read and write
|
||
5B40000
|
trusted library allocation
|
page read and write
|
||
657F000
|
stack
|
page read and write
|
||
4BC0000
|
direct allocation
|
page read and write
|
||
67FF000
|
stack
|
page read and write
|
||
61BA000
|
trusted library allocation
|
page execute and read and write
|
||
5F0A000
|
trusted library allocation
|
page execute and read and write
|
||
30AF000
|
stack
|
page read and write
|
||
56C6000
|
trusted library allocation
|
page read and write
|
||
4731000
|
heap
|
page read and write
|
||
346F000
|
stack
|
page read and write
|
||
7FC0000
|
direct allocation
|
page read and write
|
||
EE1000
|
heap
|
page read and write
|
||
56B7000
|
trusted library allocation
|
page read and write
|
||
5DF4000
|
trusted library allocation
|
page read and write
|
||
5DE5000
|
trusted library allocation
|
page read and write
|
||
5C56000
|
trusted library allocation
|
page read and write
|
||
4D70000
|
direct allocation
|
page execute and read and write
|
||
F64000
|
heap
|
page read and write
|
||
E34000
|
heap
|
page read and write
|
||
9F0000
|
heap
|
page read and write
|
||
56B1000
|
trusted library allocation
|
page read and write
|
||
5810000
|
direct allocation
|
page read and write
|
||
4E7C000
|
stack
|
page read and write
|
||
5CAA000
|
trusted library allocation
|
page read and write
|
||
7D7E000
|
stack
|
page read and write
|
||
56A1000
|
trusted library allocation
|
page read and write
|
||
56A0000
|
trusted library allocation
|
page read and write
|
||
56B7000
|
trusted library allocation
|
page read and write
|
||
140000
|
unkown
|
page read and write
|
||
5B4D000
|
trusted library allocation
|
page read and write
|
||
5B47000
|
trusted library allocation
|
page read and write
|
||
56E7000
|
trusted library allocation
|
page read and write
|
||
56E8000
|
trusted library allocation
|
page read and write
|
||
5C88000
|
trusted library allocation
|
page read and write
|
||
56D6000
|
trusted library allocation
|
page read and write
|
||
5C11000
|
trusted library allocation
|
page read and write
|
||
5703000
|
trusted library allocation
|
page read and write
|
||
56C1000
|
trusted library allocation
|
page read and write
|
||
571B000
|
trusted library allocation
|
page read and write
|
||
5C79000
|
trusted library allocation
|
page read and write
|
||
5C56000
|
trusted library allocation
|
page read and write
|
||
E34000
|
heap
|
page read and write
|
||
56C6000
|
trusted library allocation
|
page read and write
|
||
56AD000
|
trusted library allocation
|
page read and write
|
||
F76000
|
heap
|
page read and write
|
||
56C5000
|
trusted library allocation
|
page read and write
|
||
5C77000
|
trusted library allocation
|
page read and write
|
||
827A000
|
trusted library allocation
|
page read and write
|
||
4730000
|
heap
|
page read and write
|
||
5B48000
|
trusted library allocation
|
page read and write
|
||
F6B000
|
heap
|
page read and write
|
||
5753000
|
trusted library allocation
|
page read and write
|
||
5C64000
|
trusted library allocation
|
page read and write
|
||
73CE0000
|
unkown
|
page readonly
|
||
85EF000
|
stack
|
page read and write
|
||
56C6000
|
trusted library allocation
|
page read and write
|
||
57B0000
|
trusted library allocation
|
page read and write
|
||
56D6000
|
trusted library allocation
|
page read and write
|
||
6FBE000
|
stack
|
page read and write
|
||
76FF000
|
stack
|
page read and write
|
||
570A000
|
trusted library allocation
|
page read and write
|
||
56E2000
|
trusted library allocation
|
page read and write
|
||
5B4F000
|
trusted library allocation
|
page read and write
|
||
5BFD000
|
trusted library allocation
|
page read and write
|
||
E80000
|
direct allocation
|
page read and write
|
||
5B46000
|
trusted library allocation
|
page read and write
|
||
5B46000
|
trusted library allocation
|
page read and write
|
||
5C0A000
|
trusted library allocation
|
page read and write
|
||
56E7000
|
trusted library allocation
|
page read and write
|
||
5C7A000
|
trusted library allocation
|
page read and write
|
||
3AAF000
|
stack
|
page read and write
|
||
56C6000
|
trusted library allocation
|
page read and write
|
||
5723000
|
trusted library allocation
|
page read and write
|
||
EF5000
|
heap
|
page read and write
|
||
56A5000
|
trusted library allocation
|
page read and write
|
||
5C1B000
|
trusted library allocation
|
page read and write
|
||
71FF000
|
stack
|
page read and write
|
||
4731000
|
heap
|
page read and write
|
||
5B50000
|
trusted library allocation
|
page read and write
|
||
138E000
|
stack
|
page read and write
|
||
5B45000
|
trusted library allocation
|
page read and write
|
||
5C00000
|
trusted library allocation
|
page read and write
|
||
5942000
|
trusted library allocation
|
page read and write
|
||
4731000
|
heap
|
page read and write
|
||
5DBE000
|
trusted library allocation
|
page read and write
|
||
5BE2000
|
trusted library allocation
|
page read and write
|
||
56AF000
|
trusted library allocation
|
page read and write
|
||
5510000
|
heap
|
page read and write
|
||
56DC000
|
trusted library allocation
|
page read and write
|
||
F6C000
|
heap
|
page read and write
|
||
F74000
|
heap
|
page read and write
|
||
56E7000
|
trusted library allocation
|
page read and write
|
||
56E7000
|
trusted library allocation
|
page read and write
|
||
5735000
|
trusted library allocation
|
page read and write
|
||
7FC0000
|
direct allocation
|
page read and write
|
||
5D8F000
|
trusted library allocation
|
page read and write
|
||
5D3A000
|
trusted library allocation
|
page read and write
|
||
5B47000
|
trusted library allocation
|
page read and write
|
||
56EF000
|
trusted library allocation
|
page read and write
|
||
5B43000
|
trusted library allocation
|
page read and write
|
||
7E7F000
|
stack
|
page read and write
|
||
56C9000
|
trusted library allocation
|
page read and write
|
||
5BFB000
|
trusted library allocation
|
page read and write
|
||
57A7000
|
trusted library allocation
|
page read and write
|
||
56D6000
|
trusted library allocation
|
page read and write
|
||
5B4E000
|
trusted library allocation
|
page read and write
|
||
56C6000
|
trusted library allocation
|
page read and write
|
||
5B44000
|
trusted library allocation
|
page read and write
|
||
4731000
|
heap
|
page read and write
|
||
5B41000
|
trusted library allocation
|
page read and write
|
There are 811 hidden memdumps, click here to show them.
DOM / HTML
URL
|
Malicious
|
|
---|---|---|
https://learn.microsoft.com/en-us/dotnet/framework/install/application-not-started?version=(null)&processName=file.exe&platform=0009&osver=6&isServer=0&shimver=4.0.30319.0
|
||
https://learn.microsoft.com/en-us/dotnet/framework/install/application-not-started?version=(null)&processName=file.exe&platform=0009&osver=6&isServer=0&shimver=4.0.30319.0
|
||
https://learn.microsoft.com/en-us/dotnet/framework/install/application-not-started?version=(null)&processName=file.exe&platform=0009&osver=6&isServer=0&shimver=4.0.30319.0
|
||
https://learn.microsoft.com/en-us/dotnet/framework/install/application-not-started?version=(null)&processName=file.exe&platform=0009&osver=6&isServer=0&shimver=4.0.30319.0
|
||
https://learn.microsoft.com/en-us/dotnet/framework/install/application-not-started?version=(null)&processName=file.exe&platform=0009&osver=6&isServer=0&shimver=4.0.30319.0
|