Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
file.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
initial sample
|
||
Chrome Cache Entry: 100
|
ASCII text, with very long lines (46884)
|
dropped
|
||
Chrome Cache Entry: 101
|
ASCII text
|
dropped
|
||
Chrome Cache Entry: 102
|
SVG Scalable Vector Graphics image
|
downloaded
|
||
Chrome Cache Entry: 103
|
Web Open Font Format (Version 2), TrueType, length 19696, version 1.0
|
downloaded
|
||
Chrome Cache Entry: 104
|
ASCII text, with very long lines (33148), with no line terminators
|
downloaded
|
||
Chrome Cache Entry: 105
|
PNG image data, 475 x 212, 8-bit/color RGBA, non-interlaced
|
dropped
|
||
Chrome Cache Entry: 106
|
PNG image data, 658 x 480, 8-bit/color RGBA, non-interlaced
|
dropped
|
||
Chrome Cache Entry: 107
|
JSON data
|
dropped
|
||
Chrome Cache Entry: 108
|
HTML document, ASCII text, with very long lines (639), with CRLF, LF line terminators
|
downloaded
|
||
Chrome Cache Entry: 109
|
JSON data
|
downloaded
|
||
Chrome Cache Entry: 110
|
PNG image data, 533 x 478, 8-bit/color RGBA, non-interlaced
|
dropped
|
||
Chrome Cache Entry: 69
|
PNG image data, 533 x 478, 8-bit/color RGBA, non-interlaced
|
dropped
|
||
Chrome Cache Entry: 70
|
PNG image data, 533 x 478, 8-bit/color RGBA, non-interlaced
|
downloaded
|
||
Chrome Cache Entry: 71
|
SVG Scalable Vector Graphics image
|
dropped
|
||
Chrome Cache Entry: 72
|
JSON data
|
dropped
|
||
Chrome Cache Entry: 73
|
PNG image data, 533 x 478, 8-bit/color RGBA, non-interlaced
|
dropped
|
||
Chrome Cache Entry: 74
|
ASCII text, with very long lines (65536), with no line terminators
|
downloaded
|
||
Chrome Cache Entry: 75
|
ASCII text, with very long lines (65410)
|
dropped
|
||
Chrome Cache Entry: 76
|
JSON data
|
dropped
|
||
Chrome Cache Entry: 77
|
ASCII text, with very long lines (65410)
|
downloaded
|
||
Chrome Cache Entry: 78
|
JSON data
|
downloaded
|
||
Chrome Cache Entry: 79
|
PNG image data, 533 x 478, 8-bit/color RGBA, non-interlaced
|
downloaded
|
||
Chrome Cache Entry: 80
|
ASCII text, with very long lines (52717), with no line terminators
|
dropped
|
||
Chrome Cache Entry: 81
|
JSON data
|
dropped
|
||
Chrome Cache Entry: 82
|
ASCII text
|
downloaded
|
||
Chrome Cache Entry: 83
|
ASCII text, with very long lines (52717), with no line terminators
|
downloaded
|
||
Chrome Cache Entry: 84
|
exported SGML document, ASCII text, with very long lines (65536), with no line terminators
|
downloaded
|
||
Chrome Cache Entry: 85
|
ASCII text, with no line terminators
|
downloaded
|
||
Chrome Cache Entry: 86
|
JPEG image data, JFIF standard 1.01, aspect ratio, density 1x1, segment length 16, progressive, precision 8, 1301x300, components
3
|
dropped
|
||
Chrome Cache Entry: 87
|
PNG image data, 533 x 478, 8-bit/color RGBA, non-interlaced
|
downloaded
|
||
Chrome Cache Entry: 88
|
MS Windows icon resource - 6 icons, -128x-128, 16 colors, 72x72, 16 colors
|
downloaded
|
||
Chrome Cache Entry: 89
|
ASCII text, with very long lines (46884)
|
downloaded
|
||
Chrome Cache Entry: 90
|
JSON data
|
dropped
|
||
Chrome Cache Entry: 91
|
MS Windows icon resource - 6 icons, -128x-128, 16 colors, 72x72, 16 colors
|
dropped
|
||
Chrome Cache Entry: 92
|
PNG image data, 658 x 480, 8-bit/color RGBA, non-interlaced
|
downloaded
|
||
Chrome Cache Entry: 93
|
ASCII text, with very long lines (33148), with no line terminators
|
dropped
|
||
Chrome Cache Entry: 94
|
JSON data
|
downloaded
|
||
Chrome Cache Entry: 95
|
PNG image data, 475 x 212, 8-bit/color RGBA, non-interlaced
|
downloaded
|
||
Chrome Cache Entry: 96
|
JSON data
|
downloaded
|
||
Chrome Cache Entry: 97
|
JSON data
|
dropped
|
||
Chrome Cache Entry: 98
|
exported SGML document, ASCII text, with very long lines (65536), with no line terminators
|
dropped
|
||
Chrome Cache Entry: 99
|
JPEG image data, JFIF standard 1.01, aspect ratio, density 1x1, segment length 16, progressive, precision 8, 1301x300, components
3
|
downloaded
|
There are 33 hidden files, click here to show them.
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\file.exe
|
"C:\Users\user\Desktop\file.exe"
|
||
C:\Program Files\Google\Chrome\Application\chrome.exe
|
"C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized --single-argument http://go.microsoft.com/fwlink/?prd=11324&pver=4.5&sbp=AppLaunch2&plcid=0x409&o1=SHIM_NOVERSION_FOUND&version=(null)&processName=file.exe&platform=0009&osver=6&isServer=0&shimver=4.0.30319.0
|
||
C:\Program Files\Google\Chrome\Application\chrome.exe
|
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US
--service-sandbox-type=none --mojo-platform-channel-handle=2196 --field-trial-handle=1880,i,2658369671924741548,14956457475855153189,262144
--disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction
/prefetch:8
|
||
C:\Program Files\Google\Chrome\Application\chrome.exe
|
"C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized --single-argument http://go.microsoft.com/fwlink/?prd=11324&pver=4.5&sbp=AppLaunch2&plcid=0x409&o1=SHIM_NOVERSION_FOUND&version=(null)&processName=file.exe&platform=0009&osver=6&isServer=0&shimver=4.0.30319.0
|
||
C:\Program Files\Google\Chrome\Application\chrome.exe
|
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US
--service-sandbox-type=none --mojo-platform-channel-handle=2056 --field-trial-handle=2000,i,6861188437534111061,5673823380615513189,262144
--disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction
/prefetch:8
|
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
https://authoring-docs-microsoft.poolparty.biz/devrel/7696cda6-0510-47f6-8302-71bb5d2e28cf
|
unknown
|
||
https://cook-rain.sbs/api_time
|
unknown
|
||
https://duckduckgo.com/chrome_newtab
|
unknown
|
||
https://cook-rain.sbs/api3
|
unknown
|
||
https://duckduckgo.com/ac/?q=
|
unknown
|
||
https://cook-rain.sbs/A
|
unknown
|
||
https://cook-rain.sbs/apixg3
|
unknown
|
||
https://github.com/dotnet/docs/blob/17c4acca45e573a92878a44a2cce57d699fe9c7c/docs/framework/install/
|
unknown
|
||
https://www.linkedin.com/cws/share?url=$
|
unknown
|
||
https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
|
unknown
|
||
https://github.com/Youssef1313
|
unknown
|
||
https://contile-images.services.mozilla.com/T23eBL4EHswiSaF6kya2gYsRHvdfADK-NYjs1mVRNGE.3351.jpg
|
unknown
|
||
https://cook-rain.sbs/4
|
unknown
|
||
https://management.azure.com/providers/Microsoft.Portal/userSettings/cloudconsole?api-version=2023-0
|
unknown
|
||
https://aka.ms/msignite_docs_banner
|
unknown
|
||
https://videoencodingpublic-hgeaeyeba8gycee3.b01.azurefd.net/public-b4da8140-92cf-421c-8b7b-e471d5b9
|
unknown
|
||
https://cook-rain.sbs/apiB
|
unknown
|
||
peepburry828.sbs
|
|||
http://polymer.github.io/AUTHORS.txt
|
unknown
|
||
https://github.com/dotnet/docs/issues/new?template=z-customer-feedback.yml
|
unknown
|
||
https://management.azure.com/subscriptions?api-version=2016-06-01
|
unknown
|
||
https://github.com/dotnet/docs/blob/main/docs/framework/install/application-not-started.md
|
unknown
|
||
http://x1.c.lencr.org/0
|
unknown
|
||
http://x1.i.lencr.org/0
|
unknown
|
||
https://aka.ms/pshelpmechoose
|
unknown
|
||
https://aka.ms/feedback/report?space=61
|
unknown
|
||
https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
|
unknown
|
||
http://185.215.113.16/off/def.exep
|
unknown
|
||
https://learn-video.azurefd.net/vod/player
|
unknown
|
||
p10tgrace.sbs
|
|||
https://twitter.com/intent/tweet?original_referer=$
|
unknown
|
||
https://github.com/gewarren
|
unknown
|
||
https://support.mozilla.org/products/firefoxgro.all
|
unknown
|
||
http://polymer.github.io/CONTRIBUTORS.txt
|
unknown
|
||
https://www.mozilla.or
|
unknown
|
||
processhol.sbs
|
|||
https://github.com/dotnet/docs/blob/live/docs/framework/install/application-not-started.md
|
unknown
|
||
https://authoring-docs-microsoft.poolparty.biz/devrel/69c76c32-967e-4c65-b89a-74cc527db725
|
unknown
|
||
https://client-api.arkoselabs.com/v2/api.js
|
unknown
|
||
https://aka.ms/MSIgniteChallenge/Tier1Banner?wt.mc_id=ignite24_learnbanner_tier1_cnl
|
unknown
|
||
https://management.azure.com/providers/Microsoft.Portal/consoles/default?api-version=2017-12-01-prev
|
unknown
|
||
https://www.google.com/images/branding/product/ico/googleg_lodp.ico
|
unknown
|
||
https://github.com/Thraka
|
unknown
|
||
https://cook-rain.sbs/api
|
188.114.97.3
|
||
https://bridge.sfo1.admarketplace.net/ctp?version=16.0.0&key=1696484494400800000.2&ci=1696484494189.
|
unknown
|
||
https://imp.mt48.net/static?id=7RHzfOIXjFEYsBdvIpkX4Qqm4pLk4pqk4pbW1pbWfpbW7ReNxR3UIG8zInwYIFIVs9eYi
|
unknown
|
||
http://polymer.github.io/PATENTS.txt
|
unknown
|
||
https://aka.ms/certhelp
|
unknown
|
||
https://cook-rain.sbs/
|
unknown
|
||
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
|
unknown
|
||
http://crl.rootca1.amazontrust.com/rootca1.crl0
|
unknown
|
||
https://github.com/mairaw
|
unknown
|
||
https://js.monitor.azure.com/scripts/c/ms.jsll-4.min.js
|
13.107.246.45
|
||
http://ocsp.rootca1.amazontrust.com0:
|
unknown
|
||
https://schema.org
|
unknown
|
||
p3ar11fter.sbs
|
|||
http://polymer.github.io/LICENSE.txt
|
unknown
|
||
https://www.ecosia.org/newtab/
|
unknown
|
||
https://support.mozilla.org/kb/customize-firefox-controls-buttons-and-toolbars?utm_source=firefox-br
|
unknown
|
||
https://www.t-mobile.com/cell-phones/brand/apple?cmpid=MGPO_PAM_P_EVGRNIPHN_
|
unknown
|
||
https://aka.ms/yourcaliforniaprivacychoices
|
unknown
|
||
https://ac.ecosia.org/autocomplete?q=
|
unknown
|
||
https://github.com/nschonni
|
unknown
|
||
https://videoencodingpublic-hgeaeyeba8gycee3.b01.azurefd.net/public-09ce73a6-05a5-4e4d-b3d7-bd5a8c05
|
unknown
|
||
https://github.com/adegeo
|
unknown
|
||
https://cook-rain.sbs/(
|
unknown
|
||
https://cook-rain.sbs:443/api
|
unknown
|
||
https://contile-images.services.mozilla.com/obgoOYObjIFea_bXuT6L4LbBJ8j425AD87S1HMD3BWg.9991.jpg
|
unknown
|
||
http://185.215.113.16:80/off/def.exe
|
unknown
|
||
https://github.com/jonschlinkert/is-plain-object
|
unknown
|
||
https://www.amazon.com/?tag=admarketus-20&ref=pd_sl_86277c656a4bd7d619968160e91c45fd066919bb3bd119b3
|
unknown
|
||
http://crt.rootca1.amazontrust.com/rootca1.cer0?
|
unknown
|
||
https://octokit.github.io/rest.js/#throttling
|
unknown
|
||
https://github.com/js-cookie/js-cookie
|
unknown
|
||
http://185.215.113.16/off/def.exe
|
unknown
|
||
http://schema.org/Organization
|
unknown
|
||
https://channel9.msdn.com/
|
unknown
|
||
https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
|
unknown
|
||
https://bridge.sfo1.ap01.net/ctp?version=16.0.0&key=1696484494400800000.1&ci=1696484494189.12791&cta
|
unknown
|
||
https://github.com/dotnet/try
|
unknown
|
There are 70 hidden URLs, click here to show them.
Domains
Name
|
IP
|
Malicious
|
|
---|---|---|---|
cook-rain.sbs
|
188.114.97.3
|
||
s-part-0017.t-0009.t-msedge.net
|
13.107.246.45
|
||
www.google.com
|
172.217.16.196
|
||
s-part-0032.t-0009.t-msedge.net
|
13.107.246.60
|
||
js.monitor.azure.com
|
unknown
|
||
mdec.nelreports.net
|
unknown
|
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
192.168.2.6
|
unknown
|
unknown
|
||
13.107.246.45
|
s-part-0017.t-0009.t-msedge.net
|
United States
|
||
185.215.113.16
|
unknown
|
Portugal
|
||
188.114.97.3
|
cook-rain.sbs
|
European Union
|
||
239.255.255.250
|
unknown
|
Reserved
|
||
172.217.16.196
|
www.google.com
|
United States
|
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
5D44000
|
trusted library allocation
|
page read and write
|
||
5D12000
|
trusted library allocation
|
page read and write
|
||
627E000
|
trusted library allocation
|
page read and write
|
||
5D3C000
|
trusted library allocation
|
page read and write
|
||
629F000
|
trusted library allocation
|
page read and write
|
||
5CFE000
|
trusted library allocation
|
page read and write
|
||
61A1000
|
trusted library allocation
|
page read and write
|
||
6196000
|
trusted library allocation
|
page read and write
|
||
5D0E000
|
trusted library allocation
|
page read and write
|
||
5D0E000
|
trusted library allocation
|
page read and write
|
||
5D5A000
|
trusted library allocation
|
page read and write
|
||
53A0000
|
direct allocation
|
page execute and read and write
|
||
1768000
|
heap
|
page read and write
|
||
5CE1000
|
trusted library allocation
|
page read and write
|
||
6193000
|
trusted library allocation
|
page read and write
|
||
5D10000
|
trusted library allocation
|
page read and write
|
||
62D6000
|
trusted library allocation
|
page read and write
|
||
629E000
|
trusted library allocation
|
page read and write
|
||
628C000
|
trusted library allocation
|
page read and write
|
||
5370000
|
direct allocation
|
page execute and read and write
|
||
5D41000
|
trusted library allocation
|
page read and write
|
||
62D3000
|
trusted library allocation
|
page read and write
|
||
5880000
|
remote allocation
|
page read and write
|
||
5CF2000
|
trusted library allocation
|
page read and write
|
||
4D91000
|
heap
|
page read and write
|
||
5390000
|
direct allocation
|
page execute and read and write
|
||
5D38000
|
trusted library allocation
|
page read and write
|
||
5D01000
|
trusted library allocation
|
page read and write
|
||
6198000
|
trusted library allocation
|
page read and write
|
||
5F92000
|
trusted library allocation
|
page read and write
|
||
5D12000
|
trusted library allocation
|
page read and write
|
||
61A0000
|
trusted library allocation
|
page read and write
|
||
6198000
|
trusted library allocation
|
page read and write
|
||
53E5000
|
trusted library allocation
|
page read and write
|
||
628C000
|
trusted library allocation
|
page read and write
|
||
5CFB000
|
trusted library allocation
|
page read and write
|
||
177B000
|
heap
|
page read and write
|
||
5CE2000
|
trusted library allocation
|
page read and write
|
||
176E000
|
heap
|
page read and write
|
||
5D0D000
|
trusted library allocation
|
page read and write
|
||
5D6A000
|
trusted library allocation
|
page read and write
|
||
5CE3000
|
trusted library allocation
|
page read and write
|
||
1680000
|
direct allocation
|
page read and write
|
||
5D03000
|
trusted library allocation
|
page read and write
|
||
1771000
|
heap
|
page read and write
|
||
5D3D000
|
trusted library allocation
|
page read and write
|
||
6198000
|
trusted library allocation
|
page read and write
|
||
624F000
|
trusted library allocation
|
page read and write
|
||
5D07000
|
trusted library allocation
|
page read and write
|
||
1775000
|
heap
|
page read and write
|
||
62B7000
|
trusted library allocation
|
page read and write
|
||
63AD000
|
trusted library allocation
|
page read and write
|
||
5D06000
|
trusted library allocation
|
page read and write
|
||
5E0D000
|
trusted library allocation
|
page read and write
|
||
630E000
|
trusted library allocation
|
page read and write
|
||
6199000
|
trusted library allocation
|
page read and write
|
||
5D2D000
|
trusted library allocation
|
page read and write
|
||
5D1D000
|
trusted library allocation
|
page read and write
|
||
177E000
|
heap
|
page read and write
|
||
619B000
|
trusted library allocation
|
page read and write
|
||
1715000
|
heap
|
page read and write
|
||
5D42000
|
trusted library allocation
|
page read and write
|
||
6198000
|
trusted library allocation
|
page read and write
|
||
5DEB000
|
trusted library allocation
|
page read and write
|
||
5CFE000
|
trusted library allocation
|
page read and write
|
||
6328000
|
trusted library allocation
|
page read and write
|
||
5CF2000
|
trusted library allocation
|
page read and write
|
||
619D000
|
trusted library allocation
|
page read and write
|
||
5CE1000
|
trusted library allocation
|
page read and write
|
||
1719000
|
heap
|
page read and write
|
||
5CF2000
|
trusted library allocation
|
page read and write
|
||
62B4000
|
trusted library allocation
|
page read and write
|
||
5CE7000
|
trusted library allocation
|
page read and write
|
||
5DAD000
|
trusted library allocation
|
page read and write
|
||
5D2A000
|
trusted library allocation
|
page read and write
|
||
4D91000
|
heap
|
page read and write
|
||
619A000
|
trusted library allocation
|
page read and write
|
||
4D91000
|
heap
|
page read and write
|
||
4D91000
|
heap
|
page read and write
|
||
6263000
|
trusted library allocation
|
page read and write
|
||
5CF2000
|
trusted library allocation
|
page read and write
|
||
5D73000
|
trusted library allocation
|
page read and write
|
||
5D2D000
|
trusted library allocation
|
page read and write
|
||
5D01000
|
trusted library allocation
|
page read and write
|
||
62E0000
|
trusted library allocation
|
page read and write
|
||
628E000
|
trusted library allocation
|
page read and write
|
||
5D00000
|
trusted library allocation
|
page read and write
|
||
5CF2000
|
trusted library allocation
|
page read and write
|
||
628C000
|
trusted library allocation
|
page read and write
|
||
6339000
|
trusted library allocation
|
page read and write
|
||
177E000
|
heap
|
page read and write
|
||
5D15000
|
trusted library allocation
|
page read and write
|
||
5CF2000
|
trusted library allocation
|
page read and write
|
||
4D91000
|
heap
|
page read and write
|
||
5CF2000
|
trusted library allocation
|
page read and write
|
||
5DEB000
|
trusted library allocation
|
page read and write
|
||
5D18000
|
trusted library allocation
|
page read and write
|
||
626E000
|
trusted library allocation
|
page read and write
|
||
619F000
|
trusted library allocation
|
page read and write
|
||
5DE7000
|
trusted library allocation
|
page read and write
|
||
5D2D000
|
trusted library allocation
|
page read and write
|
||
5CFF000
|
trusted library allocation
|
page read and write
|
||
6190000
|
trusted library allocation
|
page read and write
|
||
5D46000
|
trusted library allocation
|
page read and write
|
||
5DEE000
|
trusted library allocation
|
page read and write
|
||
1777000
|
heap
|
page read and write
|
||
5D1E000
|
trusted library allocation
|
page read and write
|
||
1775000
|
heap
|
page read and write
|
||
5D52000
|
trusted library allocation
|
page read and write
|
||
A41000
|
unkown
|
page execute and write copy
|
||
62A4000
|
trusted library allocation
|
page read and write
|
||
61A1000
|
trusted library allocation
|
page read and write
|
||
5CFD000
|
trusted library allocation
|
page read and write
|
||
1765000
|
heap
|
page read and write
|
||
619C000
|
trusted library allocation
|
page read and write
|
||
5D5D000
|
trusted library allocation
|
page read and write
|
||
6192000
|
trusted library allocation
|
page read and write
|
||
624C000
|
trusted library allocation
|
page read and write
|
||
5CFB000
|
trusted library allocation
|
page read and write
|
||
5D1B000
|
trusted library allocation
|
page read and write
|
||
5CE3000
|
trusted library allocation
|
page read and write
|
||
53A0000
|
direct allocation
|
page execute and read and write
|
||
5D6D000
|
trusted library allocation
|
page read and write
|
||
5D2D000
|
trusted library allocation
|
page read and write
|
||
5D2D000
|
trusted library allocation
|
page read and write
|
||
5D2E000
|
trusted library allocation
|
page read and write
|
||
5D2D000
|
trusted library allocation
|
page read and write
|
||
5CF8000
|
trusted library allocation
|
page read and write
|
||
63AB000
|
trusted library allocation
|
page read and write
|
||
1784000
|
heap
|
page read and write
|
||
5D43000
|
trusted library allocation
|
page read and write
|
||
5D2D000
|
trusted library allocation
|
page read and write
|
||
5CE1000
|
trusted library allocation
|
page read and write
|
||
5D0A000
|
trusted library allocation
|
page read and write
|
||
6193000
|
trusted library allocation
|
page read and write
|
||
5CF5000
|
trusted library allocation
|
page read and write
|
||
1785000
|
heap
|
page read and write
|
||
5D23000
|
trusted library allocation
|
page read and write
|
||
62DE000
|
trusted library allocation
|
page read and write
|
||
1712000
|
heap
|
page read and write
|
||
6280000
|
trusted library allocation
|
page read and write
|
||
1778000
|
heap
|
page read and write
|
||
5D7C000
|
trusted library allocation
|
page read and write
|
||
5D2D000
|
trusted library allocation
|
page read and write
|
||
6263000
|
trusted library allocation
|
page read and write
|
||
62A9000
|
trusted library allocation
|
page read and write
|
||
1714000
|
heap
|
page read and write
|
||
53A0000
|
direct allocation
|
page execute and read and write
|
||
4D91000
|
heap
|
page read and write
|
||
5CE6000
|
trusted library allocation
|
page read and write
|
||
5D2D000
|
trusted library allocation
|
page read and write
|
||
5D06000
|
trusted library allocation
|
page read and write
|
||
5D2D000
|
trusted library allocation
|
page read and write
|
||
5D27000
|
trusted library allocation
|
page read and write
|
||
5D1D000
|
trusted library allocation
|
page read and write
|
||
5DE2000
|
trusted library allocation
|
page read and write
|
||
5D10000
|
trusted library allocation
|
page read and write
|
||
681D000
|
trusted library allocation
|
page read and write
|
||
62D0000
|
trusted library allocation
|
page read and write
|
||
5E95000
|
trusted library allocation
|
page read and write
|
||
5D47000
|
trusted library allocation
|
page read and write
|
||
62B0000
|
trusted library allocation
|
page read and write
|
||
641F000
|
trusted library allocation
|
page read and write
|
||
5D04000
|
trusted library allocation
|
page read and write
|
||
629D000
|
trusted library allocation
|
page read and write
|
||
62FF000
|
trusted library allocation
|
page read and write
|
||
5DEC000
|
trusted library allocation
|
page read and write
|
||
1765000
|
heap
|
page read and write
|
||
1765000
|
heap
|
page read and write
|
||
5D76000
|
trusted library allocation
|
page read and write
|
||
5CF5000
|
trusted library allocation
|
page read and write
|
||
5D1B000
|
trusted library allocation
|
page read and write
|
||
6196000
|
trusted library allocation
|
page read and write
|
||
5D96000
|
trusted library allocation
|
page read and write
|
||
5254000
|
direct allocation
|
page read and write
|
||
5D1F000
|
trusted library allocation
|
page read and write
|
||
6197000
|
trusted library allocation
|
page read and write
|
||
6407000
|
trusted library allocation
|
page read and write
|
||
5D2A000
|
trusted library allocation
|
page read and write
|
||
5D24000
|
trusted library allocation
|
page read and write
|
||
4D91000
|
heap
|
page read and write
|
||
5F5D000
|
trusted library allocation
|
page read and write
|
||
5D1D000
|
trusted library allocation
|
page read and write
|
||
5D9E000
|
trusted library allocation
|
page read and write
|
||
5D2D000
|
trusted library allocation
|
page read and write
|
||
5D4A000
|
trusted library allocation
|
page read and write
|
||
5CF2000
|
trusted library allocation
|
page read and write
|
||
6271000
|
trusted library allocation
|
page read and write
|
||
5D10000
|
trusted library allocation
|
page read and write
|
||
1680000
|
direct allocation
|
page read and write
|
||
5D0E000
|
trusted library allocation
|
page read and write
|
||
5CF2000
|
trusted library allocation
|
page read and write
|
||
5D09000
|
trusted library allocation
|
page read and write
|
||
5CF2000
|
trusted library allocation
|
page read and write
|
||
5D54000
|
trusted library allocation
|
page read and write
|
||
5CF2000
|
trusted library allocation
|
page read and write
|
||
5D1E000
|
trusted library allocation
|
page read and write
|
||
6198000
|
trusted library allocation
|
page read and write
|
||
5D3C000
|
trusted library allocation
|
page read and write
|
||
6195000
|
trusted library allocation
|
page read and write
|
||
5D0D000
|
trusted library allocation
|
page read and write
|
||
619B000
|
trusted library allocation
|
page read and write
|
||
63EB000
|
trusted library allocation
|
page read and write
|
||
5CF8000
|
trusted library allocation
|
page read and write
|
||
5D4A000
|
trusted library allocation
|
page read and write
|
||
5D0B000
|
trusted library allocation
|
page read and write
|
||
5D0D000
|
trusted library allocation
|
page read and write
|
||
4D91000
|
heap
|
page read and write
|
||
5D0D000
|
trusted library allocation
|
page read and write
|
||
668A000
|
trusted library allocation
|
page read and write
|
||
5D36000
|
trusted library allocation
|
page read and write
|
||
5D12000
|
trusted library allocation
|
page read and write
|
||
4D91000
|
heap
|
page read and write
|
||
5CFF000
|
trusted library allocation
|
page read and write
|
||
5CF2000
|
trusted library allocation
|
page read and write
|
||
5D2D000
|
trusted library allocation
|
page read and write
|
||
6257000
|
trusted library allocation
|
page read and write
|
||
5D1B000
|
trusted library allocation
|
page read and write
|
||
5D01000
|
trusted library allocation
|
page read and write
|
||
6196000
|
trusted library allocation
|
page read and write
|
||
5CFB000
|
trusted library allocation
|
page read and write
|
||
53A0000
|
direct allocation
|
page execute and read and write
|
||
16F8000
|
heap
|
page read and write
|
||
624D000
|
trusted library allocation
|
page read and write
|
||
5880000
|
remote allocation
|
page read and write
|
||
5D1E000
|
trusted library allocation
|
page read and write
|
||
629C000
|
trusted library allocation
|
page read and write
|
||
5D14000
|
trusted library allocation
|
page read and write
|
||
626F000
|
trusted library allocation
|
page read and write
|
||
1680000
|
direct allocation
|
page read and write
|
||
6402000
|
trusted library allocation
|
page read and write
|
||
63E8000
|
trusted library allocation
|
page read and write
|
||
6197000
|
trusted library allocation
|
page read and write
|
||
1680000
|
direct allocation
|
page read and write
|
||
5ECD000
|
trusted library allocation
|
page read and write
|
||
6195000
|
trusted library allocation
|
page read and write
|
||
6404000
|
trusted library allocation
|
page read and write
|
||
5D5F000
|
trusted library allocation
|
page read and write
|
||
5D3E000
|
trusted library allocation
|
page read and write
|
||
5D12000
|
trusted library allocation
|
page read and write
|
||
5D2D000
|
trusted library allocation
|
page read and write
|
||
5D08000
|
trusted library allocation
|
page read and write
|
||
5CE4000
|
trusted library allocation
|
page read and write
|
||
176A000
|
heap
|
page read and write
|
||
A96000
|
unkown
|
page write copy
|
||
6251000
|
trusted library allocation
|
page read and write
|
||
5D10000
|
trusted library allocation
|
page read and write
|
||
62C6000
|
trusted library allocation
|
page read and write
|
||
5D09000
|
trusted library allocation
|
page read and write
|
||
6263000
|
trusted library allocation
|
page read and write
|
||
6194000
|
trusted library allocation
|
page read and write
|
||
5D76000
|
trusted library allocation
|
page read and write
|
||
5D76000
|
trusted library allocation
|
page read and write
|
||
6193000
|
trusted library allocation
|
page read and write
|
||
5CF2000
|
trusted library allocation
|
page read and write
|
||
619A000
|
trusted library allocation
|
page read and write
|
||
1765000
|
heap
|
page read and write
|
||
1777000
|
heap
|
page read and write
|
||
5D12000
|
trusted library allocation
|
page read and write
|
||
5D2A000
|
trusted library allocation
|
page read and write
|
||
1777000
|
heap
|
page read and write
|
||
628A000
|
trusted library allocation
|
page read and write
|
||
628C000
|
trusted library allocation
|
page read and write
|
||
5D06000
|
trusted library allocation
|
page read and write
|
||
5CF2000
|
trusted library allocation
|
page read and write
|
||
5D2D000
|
trusted library allocation
|
page read and write
|
||
5D0A000
|
trusted library allocation
|
page read and write
|
||
177A000
|
heap
|
page read and write
|
||
1680000
|
direct allocation
|
page read and write
|
||
6245000
|
trusted library allocation
|
page read and write
|
||
62CE000
|
trusted library allocation
|
page read and write
|
||
177E000
|
heap
|
page read and write
|
||
6196000
|
trusted library allocation
|
page read and write
|
||
5D74000
|
trusted library allocation
|
page read and write
|
||
5CF5000
|
trusted library allocation
|
page read and write
|
||
628F000
|
trusted library allocation
|
page read and write
|
||
619E000
|
trusted library allocation
|
page read and write
|
||
5210000
|
direct allocation
|
page read and write
|
||
6191000
|
trusted library allocation
|
page read and write
|
||
177A000
|
heap
|
page read and write
|
||
5D4C000
|
trusted library allocation
|
page read and write
|
||
6199000
|
trusted library allocation
|
page read and write
|
||
6199000
|
trusted library allocation
|
page read and write
|
||
6194000
|
trusted library allocation
|
page read and write
|
||
5D2D000
|
trusted library allocation
|
page read and write
|
||
5D2D000
|
trusted library allocation
|
page read and write
|
||
1773000
|
heap
|
page read and write
|
||
62D1000
|
trusted library allocation
|
page read and write
|
||
5D70000
|
trusted library allocation
|
page read and write
|
||
6190000
|
trusted library allocation
|
page read and write
|
||
5CFF000
|
trusted library allocation
|
page read and write
|
||
62A6000
|
trusted library allocation
|
page read and write
|
||
5D16000
|
trusted library allocation
|
page read and write
|
||
6195000
|
trusted library allocation
|
page read and write
|
||
5D27000
|
trusted library allocation
|
page read and write
|
||
5D36000
|
trusted library allocation
|
page read and write
|
||
1775000
|
heap
|
page read and write
|
||
1680000
|
direct allocation
|
page read and write
|
||
5D24000
|
trusted library allocation
|
page read and write
|
||
5D38000
|
trusted library allocation
|
page read and write
|
||
6194000
|
trusted library allocation
|
page read and write
|
||
1680000
|
direct allocation
|
page read and write
|
||
63ED000
|
trusted library allocation
|
page read and write
|
||
628D000
|
trusted library allocation
|
page read and write
|
||
6409000
|
trusted library allocation
|
page read and write
|
||
5D4C000
|
trusted library allocation
|
page read and write
|
||
1781000
|
heap
|
page read and write
|
||
629F000
|
trusted library allocation
|
page read and write
|
||
5D4C000
|
trusted library allocation
|
page read and write
|
||
6270000
|
trusted library allocation
|
page read and write
|
||
5D2D000
|
trusted library allocation
|
page read and write
|
||
5D56000
|
trusted library allocation
|
page read and write
|
||
1680000
|
direct allocation
|
page read and write
|
||
5D18000
|
trusted library allocation
|
page read and write
|
||
177B000
|
heap
|
page read and write
|
||
5D1E000
|
trusted library allocation
|
page read and write
|
||
1763000
|
heap
|
page read and write
|
||
6192000
|
trusted library allocation
|
page read and write
|
||
61A0000
|
trusted library allocation
|
page read and write
|
||
16E1000
|
heap
|
page read and write
|
||
619E000
|
trusted library allocation
|
page read and write
|
||
5CF2000
|
trusted library allocation
|
page read and write
|
||
624A000
|
trusted library allocation
|
page read and write
|
||
5D18000
|
trusted library allocation
|
page read and write
|
||
62B5000
|
trusted library allocation
|
page read and write
|
||
5D09000
|
trusted library allocation
|
page read and write
|
||
5D25000
|
trusted library allocation
|
page read and write
|
||
6244000
|
trusted library allocation
|
page read and write
|
||
63AB000
|
trusted library allocation
|
page read and write
|
||
5D1D000
|
trusted library allocation
|
page read and write
|
||
6192000
|
trusted library allocation
|
page read and write
|
||
5D2D000
|
trusted library allocation
|
page read and write
|
||
4D91000
|
heap
|
page read and write
|
||
1765000
|
heap
|
page read and write
|
||
1715000
|
heap
|
page read and write
|
||
5D2A000
|
trusted library allocation
|
page read and write
|
||
5D2D000
|
trusted library allocation
|
page read and write
|
||
5DE9000
|
trusted library allocation
|
page read and write
|
||
5CF1000
|
trusted library allocation
|
page read and write
|
||
5D65000
|
trusted library allocation
|
page read and write
|
||
5CF0000
|
trusted library allocation
|
page read and write
|
||
4D91000
|
heap
|
page read and write
|
||
5CFE000
|
trusted library allocation
|
page read and write
|
||
5D0F000
|
trusted library allocation
|
page read and write
|
||
619A000
|
trusted library allocation
|
page read and write
|
||
5D2D000
|
trusted library allocation
|
page read and write
|
||
5CF5000
|
trusted library allocation
|
page read and write
|
||
5D10000
|
trusted library allocation
|
page read and write
|
||
5D4B000
|
trusted library allocation
|
page read and write
|
||
5D2C000
|
trusted library allocation
|
page read and write
|
||
5380000
|
direct allocation
|
page execute and read and write
|
||
5E25000
|
trusted library allocation
|
page read and write
|
||
5D2D000
|
trusted library allocation
|
page read and write
|
||
6198000
|
trusted library allocation
|
page read and write
|
||
5D6B000
|
trusted library allocation
|
page read and write
|
||
5D4C000
|
trusted library allocation
|
page read and write
|
||
5D2E000
|
trusted library allocation
|
page read and write
|
||
63C5000
|
trusted library allocation
|
page read and write
|
||
5CF1000
|
trusted library allocation
|
page read and write
|
||
5D2D000
|
trusted library allocation
|
page read and write
|
||
619A000
|
trusted library allocation
|
page read and write
|
||
5D1B000
|
trusted library allocation
|
page read and write
|
||
5EBD000
|
trusted library allocation
|
page read and write
|
||
6259000
|
trusted library allocation
|
page read and write
|
||
62D2000
|
trusted library allocation
|
page read and write
|
||
1777000
|
heap
|
page read and write
|
||
5D56000
|
trusted library allocation
|
page read and write
|
||
619B000
|
trusted library allocation
|
page read and write
|
||
5D10000
|
trusted library allocation
|
page read and write
|
||
5D2D000
|
trusted library allocation
|
page read and write
|
||
5D8A000
|
trusted library allocation
|
page read and write
|
||
5D06000
|
trusted library allocation
|
page read and write
|
||
619D000
|
trusted library allocation
|
page read and write
|
||
5D12000
|
trusted library allocation
|
page read and write
|
||
A40000
|
unkown
|
page readonly
|
||
631E000
|
trusted library allocation
|
page read and write
|
||
5D6A000
|
trusted library allocation
|
page read and write
|
||
5D2D000
|
trusted library allocation
|
page read and write
|
||
629D000
|
trusted library allocation
|
page read and write
|
||
6284000
|
trusted library allocation
|
page read and write
|
||
5D12000
|
trusted library allocation
|
page read and write
|
||
5CF9000
|
trusted library allocation
|
page read and write
|
||
5D03000
|
trusted library allocation
|
page read and write
|
||
6246000
|
trusted library allocation
|
page read and write
|
||
6688000
|
trusted library allocation
|
page read and write
|
||
619C000
|
trusted library allocation
|
page read and write
|
||
5D1E000
|
trusted library allocation
|
page read and write
|
||
5D12000
|
trusted library allocation
|
page read and write
|
||
5D2D000
|
trusted library allocation
|
page read and write
|
||
62D0000
|
trusted library allocation
|
page read and write
|
||
62AE000
|
trusted library allocation
|
page read and write
|
||
1680000
|
direct allocation
|
page read and write
|
||
5D08000
|
trusted library allocation
|
page read and write
|
||
632F000
|
trusted library allocation
|
page read and write
|
||
6195000
|
trusted library allocation
|
page read and write
|
||
53A0000
|
direct allocation
|
page execute and read and write
|
||
659C000
|
trusted library allocation
|
page read and write
|
||
5CEF000
|
trusted library allocation
|
page read and write
|
||
6307000
|
trusted library allocation
|
page read and write
|
||
6309000
|
trusted library allocation
|
page read and write
|
||
5D3C000
|
trusted library allocation
|
page read and write
|
||
176C000
|
heap
|
page read and write
|
||
640F000
|
trusted library allocation
|
page read and write
|
||
5D0E000
|
trusted library allocation
|
page read and write
|
||
6196000
|
trusted library allocation
|
page read and write
|
||
5D1D000
|
trusted library allocation
|
page read and write
|
||
5D36000
|
trusted library allocation
|
page read and write
|
||
5D38000
|
trusted library allocation
|
page read and write
|
||
5CF5000
|
trusted library allocation
|
page read and write
|
||
6198000
|
trusted library allocation
|
page read and write
|
||
5D13000
|
trusted library allocation
|
page read and write
|
||
1680000
|
direct allocation
|
page read and write
|
||
62E0000
|
trusted library allocation
|
page read and write
|
||
5D5F000
|
trusted library allocation
|
page read and write
|
||
1768000
|
heap
|
page read and write
|
||
5CF2000
|
trusted library allocation
|
page read and write
|
||
4D91000
|
heap
|
page read and write
|
||
628A000
|
trusted library allocation
|
page read and write
|
||
6411000
|
trusted library allocation
|
page read and write
|
||
5D2D000
|
trusted library allocation
|
page read and write
|
||
5D1D000
|
trusted library allocation
|
page read and write
|
||
5DE2000
|
trusted library allocation
|
page read and write
|
||
6261000
|
trusted library allocation
|
page read and write
|
||
5D1D000
|
trusted library allocation
|
page read and write
|
||
638B000
|
trusted library allocation
|
page read and write
|
||
5D30000
|
trusted library allocation
|
page read and write
|
||
1680000
|
direct allocation
|
page read and write
|
||
5D4E000
|
trusted library allocation
|
page read and write
|
||
619C000
|
trusted library allocation
|
page read and write
|
||
62A7000
|
trusted library allocation
|
page read and write
|
||
4D91000
|
heap
|
page read and write
|
||
5D09000
|
trusted library allocation
|
page read and write
|
||
5D10000
|
trusted library allocation
|
page read and write
|
||
62BC000
|
trusted library allocation
|
page read and write
|
||
5D53000
|
trusted library allocation
|
page read and write
|
||
1765000
|
heap
|
page read and write
|
||
5D4C000
|
trusted library allocation
|
page read and write
|
||
630C000
|
trusted library allocation
|
page read and write
|
||
1680000
|
direct allocation
|
page read and write
|
||
5CFF000
|
trusted library allocation
|
page read and write
|
||
5D44000
|
trusted library allocation
|
page read and write
|
||
5D42000
|
trusted library allocation
|
page read and write
|
||
6198000
|
trusted library allocation
|
page read and write
|
||
5D5F000
|
trusted library allocation
|
page read and write
|
||
5D0D000
|
trusted library allocation
|
page read and write
|
||
619B000
|
trusted library allocation
|
page read and write
|
||
6191000
|
trusted library allocation
|
page read and write
|
||
628E000
|
trusted library allocation
|
page read and write
|
||
1680000
|
direct allocation
|
page read and write
|
||
1680000
|
direct allocation
|
page read and write
|
||
5D1B000
|
trusted library allocation
|
page read and write
|
||
5DA3000
|
trusted library allocation
|
page read and write
|
||
5D2D000
|
trusted library allocation
|
page read and write
|
||
5D2D000
|
trusted library allocation
|
page read and write
|
||
5D1D000
|
trusted library allocation
|
page read and write
|
||
6199000
|
trusted library allocation
|
page read and write
|
||
5D10000
|
trusted library allocation
|
page read and write
|
||
5D10000
|
trusted library allocation
|
page read and write
|
||
5DEE000
|
trusted library allocation
|
page read and write
|
||
6192000
|
trusted library allocation
|
page read and write
|
||
619A000
|
trusted library allocation
|
page read and write
|
||
6190000
|
trusted library allocation
|
page read and write
|
||
1763000
|
heap
|
page read and write
|
||
5D2D000
|
trusted library allocation
|
page read and write
|
||
5D2D000
|
trusted library allocation
|
page read and write
|
||
5D2D000
|
trusted library allocation
|
page read and write
|
||
5CFC000
|
trusted library allocation
|
page read and write
|
||
5D56000
|
trusted library allocation
|
page read and write
|
||
5D04000
|
trusted library allocation
|
page read and write
|
||
5CF2000
|
trusted library allocation
|
page read and write
|
||
5D33000
|
trusted library allocation
|
page read and write
|
||
16DC000
|
heap
|
page read and write
|
||
5D25000
|
trusted library allocation
|
page read and write
|
||
5D2D000
|
trusted library allocation
|
page read and write
|
||
5D1E000
|
trusted library allocation
|
page read and write
|
||
1715000
|
heap
|
page read and write
|
||
5D18000
|
trusted library allocation
|
page read and write
|
||
6193000
|
trusted library allocation
|
page read and write
|
||
4D91000
|
heap
|
page read and write
|
||
5D07000
|
trusted library allocation
|
page read and write
|
||
6199000
|
trusted library allocation
|
page read and write
|
||
5CFD000
|
trusted library allocation
|
page read and write
|
||
619A000
|
trusted library allocation
|
page read and write
|
||
642A000
|
trusted library allocation
|
page read and write
|
||
5D2D000
|
trusted library allocation
|
page read and write
|
||
5DE5000
|
trusted library allocation
|
page read and write
|
||
6261000
|
trusted library allocation
|
page read and write
|
||
627A000
|
trusted library allocation
|
page read and write
|
||
619D000
|
trusted library allocation
|
page read and write
|
||
4D91000
|
heap
|
page read and write
|
||
5D24000
|
trusted library allocation
|
page read and write
|
||
5CE7000
|
trusted library allocation
|
page read and write
|
||
5CFB000
|
trusted library allocation
|
page read and write
|
||
176C000
|
heap
|
page read and write
|
||
4D91000
|
heap
|
page read and write
|
||
6196000
|
trusted library allocation
|
page read and write
|
||
53A0000
|
direct allocation
|
page execute and read and write
|
||
5D14000
|
trusted library allocation
|
page read and write
|
||
6196000
|
trusted library allocation
|
page read and write
|
||
5D12000
|
trusted library allocation
|
page read and write
|
||
5D02000
|
trusted library allocation
|
page read and write
|
||
5D06000
|
trusted library allocation
|
page read and write
|
||
176D000
|
heap
|
page read and write
|
||
62A9000
|
trusted library allocation
|
page read and write
|
||
177E000
|
heap
|
page read and write
|
||
5CF2000
|
trusted library allocation
|
page read and write
|
||
5D0E000
|
trusted library allocation
|
page read and write
|
||
5D0D000
|
trusted library allocation
|
page read and write
|
||
5D2C000
|
trusted library allocation
|
page read and write
|
||
5D00000
|
trusted library allocation
|
page read and write
|
||
62CE000
|
trusted library allocation
|
page read and write
|
||
5D0F000
|
trusted library allocation
|
page read and write
|
||
5CF8000
|
trusted library allocation
|
page read and write
|
||
5D0D000
|
trusted library allocation
|
page read and write
|
||
1775000
|
heap
|
page read and write
|
||
5D18000
|
trusted library allocation
|
page read and write
|
||
6190000
|
trusted library allocation
|
page read and write
|
||
5D1D000
|
trusted library allocation
|
page read and write
|
||
5CFA000
|
trusted library allocation
|
page read and write
|
||
5D12000
|
trusted library allocation
|
page read and write
|
||
5CF2000
|
trusted library allocation
|
page read and write
|
||
619B000
|
trusted library allocation
|
page read and write
|
||
5D14000
|
trusted library allocation
|
page read and write
|
||
5D1E000
|
trusted library allocation
|
page read and write
|
||
619B000
|
trusted library allocation
|
page read and write
|
||
1773000
|
heap
|
page read and write
|
||
6192000
|
trusted library allocation
|
page read and write
|
||
5DE0000
|
trusted library allocation
|
page read and write
|
||
4D91000
|
heap
|
page read and write
|
||
5D28000
|
trusted library allocation
|
page read and write
|
||
63A9000
|
trusted library allocation
|
page read and write
|
||
5D1D000
|
trusted library allocation
|
page read and write
|
||
5D8D000
|
trusted library allocation
|
page read and write
|
||
6282000
|
trusted library allocation
|
page read and write
|
||
5D10000
|
trusted library allocation
|
page read and write
|
||
1714000
|
heap
|
page read and write
|
||
5D1A000
|
trusted library allocation
|
page read and write
|
||
619E000
|
trusted library allocation
|
page read and write
|
||
4D91000
|
heap
|
page read and write
|
||
642C000
|
trusted library allocation
|
page read and write
|
||
62C4000
|
trusted library allocation
|
page read and write
|
||
5D47000
|
trusted library allocation
|
page read and write
|
||
5D2D000
|
trusted library allocation
|
page read and write
|
||
6301000
|
trusted library allocation
|
page read and write
|
||
62D8000
|
trusted library allocation
|
page read and write
|
||
5D4E000
|
trusted library allocation
|
page read and write
|
||
6195000
|
trusted library allocation
|
page read and write
|
||
5CF0000
|
trusted library allocation
|
page read and write
|
||
5D2D000
|
trusted library allocation
|
page read and write
|
||
5D3C000
|
trusted library allocation
|
page read and write
|
||
1765000
|
heap
|
page read and write
|
||
5D2A000
|
trusted library allocation
|
page read and write
|
||
63C3000
|
trusted library allocation
|
page read and write
|
||
62AB000
|
trusted library allocation
|
page read and write
|
||
5D7E000
|
trusted library allocation
|
page read and write
|
||
5D2D000
|
trusted library allocation
|
page read and write
|
||
5880000
|
remote allocation
|
page read and write
|
||
4E90000
|
trusted library allocation
|
page read and write
|
||
5CF2000
|
trusted library allocation
|
page read and write
|
||
5DF4000
|
trusted library allocation
|
page read and write
|
||
624F000
|
trusted library allocation
|
page read and write
|
||
5D2D000
|
trusted library allocation
|
page read and write
|
||
5D24000
|
trusted library allocation
|
page read and write
|
||
619D000
|
trusted library allocation
|
page read and write
|
||
5D0D000
|
trusted library allocation
|
page read and write
|
||
659C000
|
trusted library allocation
|
page read and write
|
||
5210000
|
direct allocation
|
page read and write
|
||
5D25000
|
trusted library allocation
|
page read and write
|
||
4D91000
|
heap
|
page read and write
|
||
177E000
|
heap
|
page read and write
|
||
170C000
|
heap
|
page read and write
|
||
5D6E000
|
trusted library allocation
|
page read and write
|
||
5D5C000
|
trusted library allocation
|
page read and write
|
||
635D000
|
trusted library allocation
|
page read and write
|
||
6198000
|
trusted library allocation
|
page read and write
|
||
6421000
|
trusted library allocation
|
page read and write
|
||
176C000
|
heap
|
page read and write
|
||
5D6E000
|
trusted library allocation
|
page read and write
|
||
5CE1000
|
trusted library allocation
|
page read and write
|
||
5CF0000
|
trusted library allocation
|
page read and write
|
||
6193000
|
trusted library allocation
|
page read and write
|
||
5DEF000
|
trusted library allocation
|
page read and write
|
||
6597000
|
trusted library allocation
|
page read and write
|
||
6193000
|
trusted library allocation
|
page read and write
|
||
1717000
|
heap
|
page read and write
|
||
6278000
|
trusted library allocation
|
page read and write
|
||
5CF2000
|
trusted library allocation
|
page read and write
|
||
63EA000
|
trusted library allocation
|
page read and write
|
||
5D39000
|
trusted library allocation
|
page read and write
|
||
5210000
|
direct allocation
|
page read and write
|
||
5D58000
|
trusted library allocation
|
page read and write
|
||
5D0D000
|
trusted library allocation
|
page read and write
|
||
6195000
|
trusted library allocation
|
page read and write
|
||
5D2C000
|
trusted library allocation
|
page read and write
|
||
1717000
|
heap
|
page read and write
|
||
5D02000
|
trusted library allocation
|
page read and write
|
||
5D1D000
|
trusted library allocation
|
page read and write
|
||
5D25000
|
trusted library allocation
|
page read and write
|
||
5D2D000
|
trusted library allocation
|
page read and write
|
||
6389000
|
trusted library allocation
|
page read and write
|
||
177A000
|
heap
|
page read and write
|
||
5D5B000
|
trusted library allocation
|
page read and write
|
||
6409000
|
trusted library allocation
|
page read and write
|
||
5D4C000
|
trusted library allocation
|
page read and write
|
||
5D03000
|
trusted library allocation
|
page read and write
|
||
5D2D000
|
trusted library allocation
|
page read and write
|
||
5D03000
|
trusted library allocation
|
page read and write
|
||
5D35000
|
trusted library allocation
|
page read and write
|
||
1765000
|
heap
|
page read and write
|
||
5D25000
|
trusted library allocation
|
page read and write
|
||
5D0D000
|
trusted library allocation
|
page read and write
|
||
5CF2000
|
trusted library allocation
|
page read and write
|
||
5DED000
|
trusted library allocation
|
page read and write
|
||
177E000
|
heap
|
page read and write
|
||
6192000
|
trusted library allocation
|
page read and write
|
||
62D0000
|
trusted library allocation
|
page read and write
|
||
619A000
|
trusted library allocation
|
page read and write
|
||
5CE1000
|
trusted library allocation
|
page read and write
|
||
4D91000
|
heap
|
page read and write
|
||
632B000
|
trusted library allocation
|
page read and write
|
||
5DE7000
|
trusted library allocation
|
page read and write
|
||
5D2D000
|
trusted library allocation
|
page read and write
|
||
6196000
|
trusted library allocation
|
page read and write
|
||
5D20000
|
trusted library allocation
|
page read and write
|
||
6197000
|
trusted library allocation
|
page read and write
|
||
5D0A000
|
trusted library allocation
|
page read and write
|
||
619F000
|
trusted library allocation
|
page read and write
|
||
5D47000
|
trusted library allocation
|
page read and write
|
||
6197000
|
trusted library allocation
|
page read and write
|
||
6198000
|
trusted library allocation
|
page read and write
|
||
6198000
|
trusted library allocation
|
page read and write
|
||
5D2C000
|
trusted library allocation
|
page read and write
|
||
5CFF000
|
trusted library allocation
|
page read and write
|
||
5D1E000
|
trusted library allocation
|
page read and write
|
||
5D0D000
|
trusted library allocation
|
page read and write
|
||
4D91000
|
heap
|
page read and write
|
||
624E000
|
trusted library allocation
|
page read and write
|
||
5D2D000
|
trusted library allocation
|
page read and write
|
||
6261000
|
trusted library allocation
|
page read and write
|
||
619A000
|
trusted library allocation
|
page read and write
|
||
5CE5000
|
trusted library allocation
|
page read and write
|
||
5DED000
|
trusted library allocation
|
page read and write
|
||
6247000
|
trusted library allocation
|
page read and write
|
||
5D2D000
|
trusted library allocation
|
page read and write
|
||
635F000
|
trusted library allocation
|
page read and write
|
||
624C000
|
trusted library allocation
|
page read and write
|
||
5D0D000
|
trusted library allocation
|
page read and write
|
||
633B000
|
trusted library allocation
|
page read and write
|
||
632D000
|
trusted library allocation
|
page read and write
|
||
16F6000
|
heap
|
page read and write
|
||
5D47000
|
trusted library allocation
|
page read and write
|
||
6407000
|
trusted library allocation
|
page read and write
|
||
5D47000
|
trusted library allocation
|
page read and write
|
||
619A000
|
trusted library allocation
|
page read and write
|
||
6198000
|
trusted library allocation
|
page read and write
|
||
5D5C000
|
trusted library allocation
|
page read and write
|
||
619A000
|
trusted library allocation
|
page read and write
|
||
6194000
|
trusted library allocation
|
page read and write
|
||
5D1D000
|
trusted library allocation
|
page read and write
|
||
5D46000
|
trusted library allocation
|
page read and write
|
||
5D54000
|
trusted library allocation
|
page read and write
|
||
61A0000
|
trusted library allocation
|
page read and write
|
||
6194000
|
trusted library allocation
|
page read and write
|
||
176C000
|
heap
|
page read and write
|
||
5D72000
|
trusted library allocation
|
page read and write
|
||
5CF2000
|
trusted library allocation
|
page read and write
|
||
619F000
|
trusted library allocation
|
page read and write
|
||
5D2D000
|
trusted library allocation
|
page read and write
|
||
5EC5000
|
trusted library allocation
|
page read and write
|
||
5D4C000
|
trusted library allocation
|
page read and write
|
||
67F2000
|
trusted library allocation
|
page read and write
|
||
5D2B000
|
trusted library allocation
|
page read and write
|
||
1777000
|
heap
|
page read and write
|
||
5D03000
|
trusted library allocation
|
page read and write
|
||
62BE000
|
trusted library allocation
|
page read and write
|
||
4D91000
|
heap
|
page read and write
|
||
631C000
|
trusted library allocation
|
page read and write
|
||
5D2D000
|
trusted library allocation
|
page read and write
|
||
5D2B000
|
trusted library allocation
|
page read and write
|
||
62B6000
|
trusted library allocation
|
page read and write
|
||
D38000
|
unkown
|
page execute and write copy
|
||
5CF2000
|
trusted library allocation
|
page read and write
|
||
1703000
|
heap
|
page read and write
|
There are 673 hidden memdumps, click here to show them.
DOM / HTML
URL
|
Malicious
|
|
---|---|---|
https://learn.microsoft.com/en-us/dotnet/framework/install/application-not-started?version=(null)&processName=file.exe&platform=0009&osver=6&isServer=0&shimver=4.0.30319.0
|
||
https://learn.microsoft.com/en-us/dotnet/framework/install/application-not-started?version=(null)&processName=file.exe&platform=0009&osver=6&isServer=0&shimver=4.0.30319.0
|
||
https://learn.microsoft.com/en-us/dotnet/framework/install/application-not-started?version=(null)&processName=file.exe&platform=0009&osver=6&isServer=0&shimver=4.0.30319.0
|
||
https://learn.microsoft.com/en-us/dotnet/framework/install/application-not-started?version=(null)&processName=file.exe&platform=0009&osver=6&isServer=0&shimver=4.0.30319.0
|