Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
file.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
initial sample
|
||
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Docs.lnk
|
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command
line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Thu Nov 21 12:26:43 2024, atime=Wed Sep 27 04:28:28
2023, length=1210144, window=hide
|
dropped
|
||
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Gmail.lnk
|
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command
line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Thu Nov 21 12:26:43 2024, atime=Wed Sep 27 04:28:28
2023, length=1210144, window=hide
|
dropped
|
||
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Google Drive.lnk
|
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command
line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Wed Oct 4 12:54:07 2023, atime=Wed Sep 27 04:28:28
2023, length=1210144, window=hide
|
dropped
|
||
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Sheets.lnk
|
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command
line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Thu Nov 21 12:26:43 2024, atime=Wed Sep 27 04:28:28
2023, length=1210144, window=hide
|
dropped
|
||
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Slides.lnk
|
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command
line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Thu Nov 21 12:26:43 2024, atime=Wed Sep 27 04:28:28
2023, length=1210144, window=hide
|
dropped
|
||
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\YouTube.lnk
|
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command
line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Thu Nov 21 12:26:42 2024, atime=Wed Sep 27 04:28:28
2023, length=1210144, window=hide
|
dropped
|
||
Chrome Cache Entry: 100
|
PNG image data, 533 x 478, 8-bit/color RGBA, non-interlaced
|
downloaded
|
||
Chrome Cache Entry: 101
|
ASCII text, with very long lines (52717), with no line terminators
|
dropped
|
||
Chrome Cache Entry: 102
|
ASCII text
|
downloaded
|
||
Chrome Cache Entry: 103
|
ASCII text, with very long lines (52717), with no line terminators
|
downloaded
|
||
Chrome Cache Entry: 104
|
exported SGML document, ASCII text, with very long lines (65536), with no line terminators
|
downloaded
|
||
Chrome Cache Entry: 105
|
JPEG image data, JFIF standard 1.01, aspect ratio, density 1x1, segment length 16, progressive, precision 8, 1301x300, components
3
|
dropped
|
||
Chrome Cache Entry: 106
|
PNG image data, 533 x 478, 8-bit/color RGBA, non-interlaced
|
downloaded
|
||
Chrome Cache Entry: 107
|
MS Windows icon resource - 6 icons, -128x-128, 16 colors, 72x72, 16 colors
|
downloaded
|
||
Chrome Cache Entry: 108
|
ASCII text, with very long lines (46884)
|
downloaded
|
||
Chrome Cache Entry: 109
|
JSON data
|
dropped
|
||
Chrome Cache Entry: 110
|
MS Windows icon resource - 6 icons, -128x-128, 16 colors, 72x72, 16 colors
|
dropped
|
||
Chrome Cache Entry: 111
|
PNG image data, 658 x 480, 8-bit/color RGBA, non-interlaced
|
downloaded
|
||
Chrome Cache Entry: 112
|
ASCII text, with very long lines (33148), with no line terminators
|
dropped
|
||
Chrome Cache Entry: 113
|
JSON data
|
downloaded
|
||
Chrome Cache Entry: 114
|
PNG image data, 475 x 212, 8-bit/color RGBA, non-interlaced
|
downloaded
|
||
Chrome Cache Entry: 115
|
JSON data
|
downloaded
|
||
Chrome Cache Entry: 116
|
exported SGML document, ASCII text, with very long lines (65536), with no line terminators
|
dropped
|
||
Chrome Cache Entry: 117
|
JPEG image data, JFIF standard 1.01, aspect ratio, density 1x1, segment length 16, progressive, precision 8, 1301x300, components
3
|
downloaded
|
||
Chrome Cache Entry: 118
|
ASCII text, with very long lines (46884)
|
dropped
|
||
Chrome Cache Entry: 119
|
ASCII text
|
dropped
|
||
Chrome Cache Entry: 120
|
SVG Scalable Vector Graphics image
|
downloaded
|
||
Chrome Cache Entry: 121
|
Web Open Font Format (Version 2), TrueType, length 19696, version 1.0
|
downloaded
|
||
Chrome Cache Entry: 122
|
ASCII text, with very long lines (33148), with no line terminators
|
downloaded
|
||
Chrome Cache Entry: 123
|
PNG image data, 475 x 212, 8-bit/color RGBA, non-interlaced
|
dropped
|
||
Chrome Cache Entry: 124
|
PNG image data, 658 x 480, 8-bit/color RGBA, non-interlaced
|
dropped
|
||
Chrome Cache Entry: 125
|
JSON data
|
dropped
|
||
Chrome Cache Entry: 126
|
HTML document, ASCII text, with very long lines (639), with CRLF, LF line terminators
|
downloaded
|
||
Chrome Cache Entry: 127
|
JSON data
|
downloaded
|
||
Chrome Cache Entry: 128
|
PNG image data, 533 x 478, 8-bit/color RGBA, non-interlaced
|
dropped
|
||
Chrome Cache Entry: 90
|
PNG image data, 533 x 478, 8-bit/color RGBA, non-interlaced
|
dropped
|
||
Chrome Cache Entry: 91
|
PNG image data, 533 x 478, 8-bit/color RGBA, non-interlaced
|
downloaded
|
||
Chrome Cache Entry: 92
|
SVG Scalable Vector Graphics image
|
dropped
|
||
Chrome Cache Entry: 93
|
JSON data
|
dropped
|
||
Chrome Cache Entry: 94
|
PNG image data, 533 x 478, 8-bit/color RGBA, non-interlaced
|
dropped
|
||
Chrome Cache Entry: 95
|
ASCII text, with very long lines (65536), with no line terminators
|
downloaded
|
||
Chrome Cache Entry: 96
|
ASCII text, with no line terminators
|
downloaded
|
||
Chrome Cache Entry: 97
|
JSON data
|
dropped
|
||
Chrome Cache Entry: 98
|
ASCII text, with very long lines (65410)
|
downloaded
|
||
Chrome Cache Entry: 99
|
JSON data
|
downloaded
|
There are 36 hidden files, click here to show them.
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\file.exe
|
"C:\Users\user\Desktop\file.exe"
|
||
C:\Program Files\Google\Chrome\Application\chrome.exe
|
"C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized --single-argument http://go.microsoft.com/fwlink/?prd=11324&pver=4.5&sbp=AppLaunch2&plcid=0x409&o1=SHIM_NOVERSION_FOUND&version=(null)&processName=file.exe&platform=0009&osver=6&isServer=0&shimver=4.0.30319.0
|
||
C:\Program Files\Google\Chrome\Application\chrome.exe
|
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US
--service-sandbox-type=none --mojo-platform-channel-handle=1728 --field-trial-handle=1988,i,17902174310795812285,10958693031429815383,262144
--disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction
/prefetch:8
|
||
C:\Program Files\Google\Chrome\Application\chrome.exe
|
"C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized --single-argument http://go.microsoft.com/fwlink/?prd=11324&pver=4.5&sbp=AppLaunch2&plcid=0x409&o1=SHIM_NOVERSION_FOUND&version=(null)&processName=file.exe&platform=0009&osver=6&isServer=0&shimver=4.0.30319.0
|
||
C:\Program Files\Google\Chrome\Application\chrome.exe
|
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US
--service-sandbox-type=none --mojo-platform-channel-handle=2032 --field-trial-handle=1976,i,8889273046663356673,18172762526831080646,262144
--disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction
/prefetch:8
|
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
https://authoring-docs-microsoft.poolparty.biz/devrel/7696cda6-0510-47f6-8302-71bb5d2e28cf
|
unknown
|
||
http://185.215.113.16/off/def.exeAppleWebKit/537.36
|
unknown
|
||
https://duckduckgo.com/chrome_newtab
|
unknown
|
||
https://duckduckgo.com/ac/?q=
|
unknown
|
||
http://185.215.113.16/steam/random.exe$0
|
unknown
|
||
https://cook-rain.sbs/C
|
unknown
|
||
https://imp.mt48.net/static?id=7RHzfOIXjFEYsBdvIpkX4Qqm4p8dfCfm4pbW1pbWfpbW7ReNxR3UIG8zInwYIFIVs9eYi
|
unknown
|
||
https://github.com/dotnet/docs/blob/17c4acca45e573a92878a44a2cce57d699fe9c7c/docs/framework/install/
|
unknown
|
||
https://bridge.sfo1.admarketplace.net/ctp?version=16.0.0&key=1696425136400800000.2&ci=1696425136743.
|
unknown
|
||
https://www.linkedin.com/cws/share?url=$
|
unknown
|
||
https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
|
unknown
|
||
https://cook-rain.sbs/api8eGNei1kuTiEQW4l
|
unknown
|
||
https://github.com/Youssef1313
|
unknown
|
||
https://management.azure.com/providers/Microsoft.Portal/userSettings/cloudconsole?api-version=2023-0
|
unknown
|
||
https://aka.ms/msignite_docs_banner
|
unknown
|
||
https://videoencodingpublic-hgeaeyeba8gycee3.b01.azurefd.net/public-b4da8140-92cf-421c-8b7b-e471d5b9
|
unknown
|
||
peepburry828.sbs
|
|||
http://polymer.github.io/AUTHORS.txt
|
unknown
|
||
https://cook-rain.sbs/apiA
|
unknown
|
||
https://github.com/dotnet/docs/issues/new?template=z-customer-feedback.yml
|
unknown
|
||
https://management.azure.com/subscriptions?api-version=2016-06-01
|
unknown
|
||
https://github.com/dotnet/docs/blob/main/docs/framework/install/application-not-started.md
|
unknown
|
||
https://cook-rain.sbs/g
|
unknown
|
||
http://x1.c.lencr.org/0
|
unknown
|
||
http://x1.i.lencr.org/0
|
unknown
|
||
https://aka.ms/pshelpmechoose
|
unknown
|
||
https://aka.ms/feedback/report?space=61
|
unknown
|
||
https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
|
unknown
|
||
https://learn-video.azurefd.net/vod/player
|
unknown
|
||
p10tgrace.sbs
|
|||
https://twitter.com/intent/tweet?original_referer=$
|
unknown
|
||
https://github.com/gewarren
|
unknown
|
||
https://support.mozilla.org/products/firefoxgro.all
|
unknown
|
||
http://polymer.github.io/CONTRIBUTORS.txt
|
unknown
|
||
processhol.sbs
|
|||
https://github.com/dotnet/docs/blob/live/docs/framework/install/application-not-started.md
|
unknown
|
||
https://cook-rain.sbs/om.
|
unknown
|
||
https://authoring-docs-microsoft.poolparty.biz/devrel/69c76c32-967e-4c65-b89a-74cc527db725
|
unknown
|
||
https://client-api.arkoselabs.com/v2/api.js
|
unknown
|
||
https://aka.ms/MSIgniteChallenge/Tier1Banner?wt.mc_id=ignite24_learnbanner_tier1_cnl
|
unknown
|
||
https://management.azure.com/providers/Microsoft.Portal/consoles/default?api-version=2017-12-01-prev
|
unknown
|
||
https://www.google.com/images/branding/product/ico/googleg_lodp.ico
|
unknown
|
||
https://github.com/Thraka
|
unknown
|
||
https://cook-rain.sbs/api
|
188.114.96.3
|
||
http://polymer.github.io/PATENTS.txt
|
unknown
|
||
https://aka.ms/certhelp
|
unknown
|
||
http://185.215.113.16/steam/random.exe
|
unknown
|
||
https://cook-rain.sbs/
|
unknown
|
||
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
|
unknown
|
||
http://crl.rootca1.amazontrust.com/rootca1.crl0
|
unknown
|
||
https://github.com/mairaw
|
unknown
|
||
https://js.monitor.azure.com/scripts/c/ms.jsll-4.min.js
|
13.107.246.45
|
||
http://ocsp.rootca1.amazontrust.com0:
|
unknown
|
||
https://schema.org
|
unknown
|
||
p3ar11fter.sbs
|
|||
http://polymer.github.io/LICENSE.txt
|
unknown
|
||
https://www.ecosia.org/newtab/
|
unknown
|
||
https://bridge.sfo1.ap01.net/ctp?version=16.0.0&key=1696425136400800000.1&ci=1696425136743.12791&cta
|
unknown
|
||
https://support.mozilla.org/kb/customize-firefox-controls-buttons-and-toolbars?utm_source=firefox-br
|
unknown
|
||
https://aka.ms/yourcaliforniaprivacychoices
|
unknown
|
||
https://ac.ecosia.org/autocomplete?q=
|
unknown
|
||
https://github.com/nschonni
|
unknown
|
||
https://videoencodingpublic-hgeaeyeba8gycee3.b01.azurefd.net/public-09ce73a6-05a5-4e4d-b3d7-bd5a8c05
|
unknown
|
||
https://contile-images.services.mozilla.com/u1AuJcj32cbVUf9NjMipLXEYwu2uFIt4lsj-ccwVqEs.36904.jpg
|
unknown
|
||
https://github.com/adegeo
|
unknown
|
||
http://crl.micro
|
unknown
|
||
https://contile-images.services.mozilla.com/obgoOYObjIFea_bXuT6L4LbBJ8j425AD87S1HMD3BWg.9991.jpg
|
unknown
|
||
https://cook-rain.sbs/apibK0a6
|
unknown
|
||
https://github.com/jonschlinkert/is-plain-object
|
unknown
|
||
http://crt.rootca1.amazontrust.com/rootca1.cer0?
|
unknown
|
||
https://cook-rain.sbs/3SozW
|
unknown
|
||
https://octokit.github.io/rest.js/#throttling
|
unknown
|
||
https://www.bestbuy.com/site/electronics/top-deals/pcmcat1563299784494.c/?id=pcmcat1563299784494&ref
|
unknown
|
||
https://github.com/js-cookie/js-cookie
|
unknown
|
||
https://www.amazon.com/?tag=admarketus-20&ref=pd_sl_35787f1071928bc3a1aef90b79c9bee9c64ba6683fde7477
|
unknown
|
||
http://185.215.113.16/off/def.exe
|
unknown
|
||
http://schema.org/Organization
|
unknown
|
||
https://channel9.msdn.com/
|
unknown
|
||
https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
|
unknown
|
||
https://github.com/dotnet/try
|
unknown
|
There are 70 hidden URLs, click here to show them.
Domains
Name
|
IP
|
Malicious
|
|
---|---|---|---|
s-part-0016.t-0009.t-msedge.net
|
13.107.246.44
|
||
cook-rain.sbs
|
188.114.96.3
|
||
s-part-0017.t-0009.t-msedge.net
|
13.107.246.45
|
||
www.google.com
|
216.58.206.68
|
||
js.monitor.azure.com
|
unknown
|
||
mdec.nelreports.net
|
unknown
|
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
192.168.2.5
|
unknown
|
unknown
|
||
13.107.246.45
|
s-part-0017.t-0009.t-msedge.net
|
United States
|
||
13.107.246.44
|
s-part-0016.t-0009.t-msedge.net
|
United States
|
||
185.215.113.16
|
unknown
|
Portugal
|
||
216.58.206.68
|
www.google.com
|
United States
|
||
239.255.255.250
|
unknown
|
Reserved
|
||
188.114.96.3
|
cook-rain.sbs
|
European Union
|
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
F7C000
|
unkown
|
page execute and read and write
|
||
C40000
|
heap
|
page read and write
|
||
5D54000
|
trusted library allocation
|
page read and write
|
||
65EA000
|
trusted library allocation
|
page read and write
|
||
5E11000
|
trusted library allocation
|
page read and write
|
||
5DD9000
|
trusted library allocation
|
page read and write
|
||
5E20000
|
trusted library allocation
|
page read and write
|
||
5E20000
|
trusted library allocation
|
page read and write
|
||
5DF0000
|
trusted library allocation
|
page read and write
|
||
625D000
|
trusted library allocation
|
page read and write
|
||
2FEB000
|
stack
|
page read and write
|
||
65EB000
|
trusted library allocation
|
page read and write
|
||
5FB2000
|
trusted library allocation
|
page read and write
|
||
5E41000
|
trusted library allocation
|
page read and write
|
||
5D5B000
|
trusted library allocation
|
page read and write
|
||
5DB6000
|
trusted library allocation
|
page read and write
|
||
5D80000
|
trusted library allocation
|
page read and write
|
||
682D000
|
trusted library allocation
|
page read and write
|
||
7C9E000
|
stack
|
page read and write
|
||
65E0000
|
trusted library allocation
|
page read and write
|
||
5E2A000
|
trusted library allocation
|
page read and write
|
||
5DE6000
|
trusted library allocation
|
page read and write
|
||
65ED000
|
trusted library allocation
|
page read and write
|
||
1674000
|
heap
|
page read and write
|
||
5E11000
|
trusted library allocation
|
page read and write
|
||
7A1E000
|
stack
|
page read and write
|
||
66DE000
|
trusted library allocation
|
page read and write
|
||
5DEB000
|
trusted library allocation
|
page read and write
|
||
5DE9000
|
trusted library allocation
|
page read and write
|
||
5E41000
|
trusted library allocation
|
page read and write
|
||
8C30000
|
direct allocation
|
page execute and read and write
|
||
5DD9000
|
trusted library allocation
|
page read and write
|
||
5DCD000
|
trusted library allocation
|
page read and write
|
||
5F4D000
|
trusted library allocation
|
page read and write
|
||
165F000
|
heap
|
page read and write
|
||
5D48000
|
trusted library allocation
|
page read and write
|
||
67C5000
|
trusted library allocation
|
page read and write
|
||
5D60000
|
trusted library allocation
|
page read and write
|
||
15EB000
|
heap
|
page read and write
|
||
5DC5000
|
trusted library allocation
|
page read and write
|
||
5DC0000
|
trusted library allocation
|
page read and write
|
||
5DB6000
|
trusted library allocation
|
page read and write
|
||
6811000
|
trusted library allocation
|
page read and write
|
||
48DE000
|
stack
|
page read and write
|
||
C80000
|
heap
|
page read and write
|
||
5DCA000
|
trusted library allocation
|
page read and write
|
||
66A6000
|
trusted library allocation
|
page read and write
|
||
686F000
|
trusted library allocation
|
page read and write
|
||
751E000
|
stack
|
page read and write
|
||
5E2A000
|
trusted library allocation
|
page read and write
|
||
65EB000
|
trusted library allocation
|
page read and write
|
||
475F000
|
stack
|
page read and write
|
||
5DCC000
|
trusted library allocation
|
page read and write
|
||
6733000
|
trusted library allocation
|
page read and write
|
||
65EB000
|
trusted library allocation
|
page read and write
|
||
5DCC000
|
trusted library allocation
|
page read and write
|
||
8C00000
|
direct allocation
|
page execute and read and write
|
||
3D5F000
|
stack
|
page read and write
|
||
C44000
|
heap
|
page read and write
|
||
5E41000
|
trusted library allocation
|
page read and write
|
||
65E2000
|
trusted library allocation
|
page read and write
|
||
6699000
|
trusted library allocation
|
page read and write
|
||
5D7E000
|
trusted library allocation
|
page read and write
|
||
6098000
|
trusted library allocation
|
page read and write
|
||
8A40000
|
direct allocation
|
page read and write
|
||
5E20000
|
trusted library allocation
|
page read and write
|
||
5D76000
|
trusted library allocation
|
page read and write
|
||
429E000
|
stack
|
page read and write
|
||
5E2A000
|
trusted library allocation
|
page read and write
|
||
5DB3000
|
trusted library allocation
|
page read and write
|
||
5D4A000
|
trusted library allocation
|
page read and write
|
||
6694000
|
trusted library allocation
|
page read and write
|
||
65E2000
|
trusted library allocation
|
page read and write
|
||
4DA1000
|
heap
|
page read and write
|
||
65ED000
|
trusted library allocation
|
page read and write
|
||
5E2A000
|
trusted library allocation
|
page read and write
|
||
5ED3000
|
trusted library allocation
|
page read and write
|
||
5FA0000
|
trusted library allocation
|
page read and write
|
||
851F000
|
stack
|
page read and write
|
||
701F000
|
stack
|
page read and write
|
||
5380000
|
direct allocation
|
page execute and read and write
|
||
5E11000
|
trusted library allocation
|
page read and write
|
||
65EF000
|
trusted library allocation
|
page read and write
|
||
6770000
|
trusted library allocation
|
page read and write
|
||
5DC4000
|
trusted library allocation
|
page read and write
|
||
4EA0000
|
trusted library allocation
|
page read and write
|
||
5DF1000
|
trusted library allocation
|
page read and write
|
||
489F000
|
stack
|
page read and write
|
||
6041000
|
trusted library allocation
|
page read and write
|
||
4DA1000
|
heap
|
page read and write
|
||
C44000
|
heap
|
page read and write
|
||
65E4000
|
trusted library allocation
|
page read and write
|
||
6E07000
|
trusted library allocation
|
page execute and read and write
|
||
67B8000
|
trusted library allocation
|
page read and write
|
||
66EE000
|
trusted library allocation
|
page read and write
|
||
6698000
|
trusted library allocation
|
page read and write
|
||
6731000
|
trusted library allocation
|
page read and write
|
||
5DDB000
|
trusted library allocation
|
page read and write
|
||
5E11000
|
trusted library allocation
|
page read and write
|
||
3030000
|
direct allocation
|
page read and write
|
||
65E7000
|
trusted library allocation
|
page read and write
|
||
54FD000
|
stack
|
page read and write
|
||
F75000
|
unkown
|
page execute and read and write
|
||
5DD3000
|
trusted library allocation
|
page read and write
|
||
5E00000
|
trusted library allocation
|
page read and write
|
||
801F000
|
stack
|
page read and write
|
||
165F000
|
heap
|
page read and write
|
||
66CF000
|
trusted library allocation
|
page read and write
|
||
5E59000
|
trusted library allocation
|
page read and write
|
||
5DE4000
|
trusted library allocation
|
page read and write
|
||
65EC000
|
trusted library allocation
|
page read and write
|
||
5D4F000
|
trusted library allocation
|
page read and write
|
||
C44000
|
heap
|
page read and write
|
||
5E01000
|
trusted library allocation
|
page read and write
|
||
805E000
|
stack
|
page read and write
|
||
66B1000
|
trusted library allocation
|
page read and write
|
||
6799000
|
trusted library allocation
|
page read and write
|
||
5DD9000
|
trusted library allocation
|
page read and write
|
||
5D40000
|
trusted library allocation
|
page read and write
|
||
8A40000
|
direct allocation
|
page read and write
|
||
5ECD000
|
trusted library allocation
|
page read and write
|
||
3030000
|
direct allocation
|
page read and write
|
||
165E000
|
heap
|
page read and write
|
||
5DBB000
|
trusted library allocation
|
page read and write
|
||
5DBD000
|
trusted library allocation
|
page read and write
|
||
5DD9000
|
trusted library allocation
|
page read and write
|
||
5E11000
|
trusted library allocation
|
page read and write
|
||
5E11000
|
trusted library allocation
|
page read and write
|
||
6A51000
|
trusted library allocation
|
page read and write
|
||
5E01000
|
trusted library allocation
|
page read and write
|
||
79DF000
|
stack
|
page read and write
|
||
8AA0000
|
direct allocation
|
page read and write
|
||
4DA1000
|
heap
|
page read and write
|
||
5DCF000
|
trusted library allocation
|
page read and write
|
||
5DCB000
|
trusted library allocation
|
page read and write
|
||
65E9000
|
trusted library allocation
|
page read and write
|
||
5E41000
|
trusted library allocation
|
page read and write
|
||
C44000
|
heap
|
page read and write
|
||
1664000
|
heap
|
page read and write
|
||
4DA1000
|
heap
|
page read and write
|
||
51E0000
|
heap
|
page read and write
|
||
66D9000
|
stack
|
page read and write
|
||
5DF0000
|
trusted library allocation
|
page read and write
|
||
685E000
|
stack
|
page read and write
|
||
65E3000
|
trusted library allocation
|
page read and write
|
||
15E2000
|
heap
|
page read and write
|
||
6697000
|
trusted library allocation
|
page read and write
|
||
789F000
|
stack
|
page read and write
|
||
5D83000
|
trusted library allocation
|
page read and write
|
||
66A4000
|
trusted library allocation
|
page read and write
|
||
5E48000
|
trusted library allocation
|
page read and write
|
||
5E65000
|
trusted library allocation
|
page read and write
|
||
3030000
|
direct allocation
|
page read and write
|
||
6047000
|
trusted library allocation
|
page read and write
|
||
3D9E000
|
stack
|
page read and write
|
||
65E9000
|
trusted library allocation
|
page read and write
|
||
66ED000
|
trusted library allocation
|
page read and write
|
||
5D41000
|
trusted library allocation
|
page read and write
|
||
5DE6000
|
trusted library allocation
|
page read and write
|
||
5D95000
|
trusted library allocation
|
page read and write
|
||
5DE1000
|
trusted library allocation
|
page read and write
|
||
439F000
|
stack
|
page read and write
|
||
5E11000
|
trusted library allocation
|
page read and write
|
||
675F000
|
trusted library allocation
|
page read and write
|
||
3030000
|
direct allocation
|
page read and write
|
||
5D4F000
|
trusted library allocation
|
page read and write
|
||
6B62000
|
trusted library allocation
|
page execute and read and write
|
||
4DA1000
|
heap
|
page read and write
|
||
66B3000
|
trusted library allocation
|
page read and write
|
||
5E15000
|
trusted library allocation
|
page read and write
|
||
5D4E000
|
trusted library allocation
|
page read and write
|
||
5E2A000
|
trusted library allocation
|
page read and write
|
||
4DA1000
|
heap
|
page read and write
|
||
5E2A000
|
trusted library allocation
|
page read and write
|
||
5E2A000
|
trusted library allocation
|
page read and write
|
||
53B0000
|
direct allocation
|
page execute and read and write
|
||
5E2A000
|
trusted library allocation
|
page read and write
|
||
3FDF000
|
stack
|
page read and write
|
||
1670000
|
heap
|
page read and write
|
||
C44000
|
heap
|
page read and write
|
||
58C0000
|
remote allocation
|
page read and write
|
||
5E48000
|
trusted library allocation
|
page read and write
|
||
166C000
|
heap
|
page read and write
|
||
1674000
|
heap
|
page read and write
|
||
5E11000
|
trusted library allocation
|
page read and write
|
||
5DCB000
|
trusted library allocation
|
page read and write
|
||
3030000
|
direct allocation
|
page read and write
|
||
5DC1000
|
trusted library allocation
|
page read and write
|
||
3B1E000
|
stack
|
page read and write
|
||
5E01000
|
trusted library allocation
|
page read and write
|
||
5E11000
|
trusted library allocation
|
page read and write
|
||
6728000
|
trusted library allocation
|
page read and write
|
||
58C0000
|
remote allocation
|
page read and write
|
||
669F000
|
trusted library allocation
|
page read and write
|
||
5DF1000
|
trusted library allocation
|
page read and write
|
||
669E000
|
trusted library allocation
|
page read and write
|
||
65E4000
|
trusted library allocation
|
page read and write
|
||
5E11000
|
trusted library allocation
|
page read and write
|
||
65E7000
|
trusted library allocation
|
page read and write
|
||
567E000
|
stack
|
page read and write
|
||
CE7000
|
unkown
|
page write copy
|
||
3050000
|
heap
|
page read and write
|
||
5DCD000
|
trusted library allocation
|
page read and write
|
||
5E11000
|
trusted library allocation
|
page read and write
|
||
779E000
|
stack
|
page read and write
|
||
66EB000
|
trusted library allocation
|
page read and write
|
||
5DB2000
|
trusted library allocation
|
page read and write
|
||
5E2A000
|
trusted library allocation
|
page read and write
|
||
166A000
|
heap
|
page read and write
|
||
C44000
|
heap
|
page read and write
|
||
159A000
|
heap
|
page read and write
|
||
BFA000
|
stack
|
page read and write
|
||
5D91000
|
trusted library allocation
|
page read and write
|
||
3C1F000
|
stack
|
page read and write
|
||
7B1F000
|
stack
|
page read and write
|
||
5DC1000
|
trusted library allocation
|
page read and write
|
||
5E2A000
|
trusted library allocation
|
page read and write
|
||
5DF0000
|
trusted library allocation
|
page read and write
|
||
829F000
|
stack
|
page read and write
|
||
5DDD000
|
trusted library allocation
|
page read and write
|
||
5220000
|
direct allocation
|
page read and write
|
||
8A40000
|
direct allocation
|
page read and write
|
||
5A6E000
|
stack
|
page read and write
|
||
1663000
|
heap
|
page read and write
|
||
5E2A000
|
trusted library allocation
|
page read and write
|
||
668E000
|
trusted library allocation
|
page read and write
|
||
5E2A000
|
trusted library allocation
|
page read and write
|
||
5D33000
|
heap
|
page read and write
|
||
5E01000
|
trusted library allocation
|
page read and write
|
||
5E2A000
|
trusted library allocation
|
page read and write
|
||
5DBA000
|
trusted library allocation
|
page read and write
|
||
82DE000
|
stack
|
page read and write
|
||
5DDD000
|
trusted library allocation
|
page read and write
|
||
53E0000
|
direct allocation
|
page execute and read and write
|
||
5DC0000
|
trusted library allocation
|
page read and write
|
||
8A40000
|
direct allocation
|
page read and write
|
||
465E000
|
stack
|
page read and write
|
||
6729000
|
trusted library allocation
|
page read and write
|
||
5DBB000
|
trusted library allocation
|
page read and write
|
||
668C000
|
trusted library allocation
|
page read and write
|
||
53B0000
|
direct allocation
|
page execute and read and write
|
||
5E2A000
|
trusted library allocation
|
page read and write
|
||
5E00000
|
trusted library allocation
|
page read and write
|
||
65E4000
|
trusted library allocation
|
page read and write
|
||
5220000
|
direct allocation
|
page read and write
|
||
58C0000
|
remote allocation
|
page read and write
|
||
1661000
|
heap
|
page read and write
|
||
5E2A000
|
trusted library allocation
|
page read and write
|
||
66F2000
|
trusted library allocation
|
page read and write
|
||
5DE6000
|
trusted library allocation
|
page read and write
|
||
5DD1000
|
trusted library allocation
|
page read and write
|
||
6B4B000
|
trusted library allocation
|
page read and write
|
||
5DD9000
|
trusted library allocation
|
page read and write
|
||
53A0000
|
direct allocation
|
page execute and read and write
|
||
3030000
|
direct allocation
|
page read and write
|
||
5E01000
|
trusted library allocation
|
page read and write
|
||
3030000
|
direct allocation
|
page read and write
|
||
729E000
|
stack
|
page read and write
|
||
5D64000
|
trusted library allocation
|
page read and write
|
||
667B000
|
trusted library allocation
|
page read and write
|
||
65E3000
|
trusted library allocation
|
page read and write
|
||
1677000
|
heap
|
page read and write
|
||
675B000
|
trusted library allocation
|
page read and write
|
||
5D97000
|
trusted library allocation
|
page read and write
|
||
7B5E000
|
stack
|
page read and write
|
||
689E000
|
stack
|
page read and write
|
||
166C000
|
heap
|
page read and write
|
||
671D000
|
trusted library allocation
|
page read and write
|
||
5F42000
|
trusted library allocation
|
page read and write
|
||
5E01000
|
trusted library allocation
|
page read and write
|
||
5E11000
|
trusted library allocation
|
page read and write
|
||
5E2A000
|
trusted library allocation
|
page read and write
|
||
CE9000
|
unkown
|
page execute and read and write
|
||
67FC000
|
trusted library allocation
|
page read and write
|
||
67B6000
|
trusted library allocation
|
page read and write
|
||
3030000
|
direct allocation
|
page read and write
|
||
5D46000
|
trusted library allocation
|
page read and write
|
||
5E01000
|
trusted library allocation
|
page read and write
|
||
5D5F000
|
trusted library allocation
|
page read and write
|
||
5E2A000
|
trusted library allocation
|
page read and write
|
||
65E6000
|
trusted library allocation
|
page read and write
|
||
3C5E000
|
stack
|
page read and write
|
||
5E41000
|
trusted library allocation
|
page read and write
|
||
6692000
|
trusted library allocation
|
page read and write
|
||
5E59000
|
trusted library allocation
|
page read and write
|
||
5E11000
|
trusted library allocation
|
page read and write
|
||
5DE6000
|
trusted library allocation
|
page read and write
|
||
671F000
|
trusted library allocation
|
page read and write
|
||
5E2A000
|
trusted library allocation
|
page read and write
|
||
5E00000
|
trusted library allocation
|
page read and write
|
||
8A40000
|
direct allocation
|
page read and write
|
||
1674000
|
heap
|
page read and write
|
||
5E2A000
|
trusted library allocation
|
page read and write
|
||
5DBB000
|
trusted library allocation
|
page read and write
|
||
5DBB000
|
trusted library allocation
|
page read and write
|
||
6042000
|
trusted library allocation
|
page read and write
|
||
8A40000
|
direct allocation
|
page read and write
|
||
461F000
|
stack
|
page read and write
|
||
5E01000
|
trusted library allocation
|
page read and write
|
||
5E2A000
|
trusted library allocation
|
page read and write
|
||
66F1000
|
trusted library allocation
|
page read and write
|
||
5F34000
|
trusted library allocation
|
page read and write
|
||
5E48000
|
trusted library allocation
|
page read and write
|
||
5D30000
|
heap
|
page read and write
|
||
1665000
|
heap
|
page read and write
|
||
5DB2000
|
trusted library allocation
|
page read and write
|
||
5ED9000
|
trusted library allocation
|
page read and write
|
||
6707000
|
trusted library allocation
|
page read and write
|
||
5D80000
|
trusted library allocation
|
page read and write
|
||
6727000
|
trusted library allocation
|
page read and write
|
||
165E000
|
heap
|
page read and write
|
||
166D000
|
heap
|
page read and write
|
||
65E2000
|
trusted library allocation
|
page read and write
|
||
5DD4000
|
trusted library allocation
|
page read and write
|
||
5E2A000
|
trusted library allocation
|
page read and write
|
||
66F3000
|
trusted library allocation
|
page read and write
|
||
349F000
|
stack
|
page read and write
|
||
C44000
|
heap
|
page read and write
|
||
5E2A000
|
trusted library allocation
|
page read and write
|
||
5D44000
|
trusted library allocation
|
page read and write
|
||
5DBB000
|
trusted library allocation
|
page read and write
|
||
78DE000
|
stack
|
page read and write
|
||
5DBD000
|
trusted library allocation
|
page read and write
|
||
5DE6000
|
trusted library allocation
|
page read and write
|
||
1670000
|
heap
|
page read and write
|
||
8A40000
|
direct allocation
|
page read and write
|
||
53F0000
|
direct allocation
|
page execute and read and write
|
||
1666000
|
heap
|
page read and write
|
||
53B0000
|
direct allocation
|
page execute and read and write
|
||
4DA1000
|
heap
|
page read and write
|
||
4DA1000
|
heap
|
page read and write
|
||
577F000
|
stack
|
page read and write
|
||
5DD9000
|
trusted library allocation
|
page read and write
|
||
66A0000
|
trusted library allocation
|
page read and write
|
||
60D5000
|
trusted library allocation
|
page read and write
|
||
5D64000
|
trusted library allocation
|
page read and write
|
||
5E71000
|
trusted library allocation
|
page read and write
|
||
1124000
|
unkown
|
page execute and read and write
|
||
6B66000
|
trusted library allocation
|
page read and write
|
||
680F000
|
trusted library allocation
|
page read and write
|
||
3EDE000
|
stack
|
page read and write
|
||
5D60000
|
trusted library allocation
|
page read and write
|
||
67FE000
|
trusted library allocation
|
page read and write
|
||
67B4000
|
trusted library allocation
|
page read and write
|
||
6044000
|
trusted library allocation
|
page read and write
|
||
66DC000
|
trusted library allocation
|
page read and write
|
||
6722000
|
trusted library allocation
|
page read and write
|
||
6871000
|
trusted library allocation
|
page read and write
|
||
4DA1000
|
heap
|
page read and write
|
||
66EC000
|
trusted library allocation
|
page read and write
|
||
166C000
|
heap
|
page read and write
|
||
5E0B000
|
trusted library allocation
|
page read and write
|
||
5E11000
|
trusted library allocation
|
page read and write
|
||
4DA1000
|
heap
|
page read and write
|
||
5DDD000
|
trusted library allocation
|
page read and write
|
||
682B000
|
trusted library allocation
|
page read and write
|
||
66C9000
|
trusted library allocation
|
page read and write
|
||
5F4F000
|
trusted library allocation
|
page read and write
|
||
677B000
|
trusted library allocation
|
page read and write
|
||
5DC5000
|
trusted library allocation
|
page read and write
|
||
325F000
|
stack
|
page read and write
|
||
5D71000
|
trusted library allocation
|
page read and write
|
||
CD6000
|
unkown
|
page execute and read and write
|
||
C44000
|
heap
|
page read and write
|
||
5E2A000
|
trusted library allocation
|
page read and write
|
||
1125000
|
unkown
|
page execute and write copy
|
||
5E2A000
|
trusted library allocation
|
page read and write
|
||
65E2000
|
trusted library allocation
|
page read and write
|
||
1663000
|
heap
|
page read and write
|
||
5DDD000
|
trusted library allocation
|
page read and write
|
||
58BF000
|
stack
|
page read and write
|
||
60E8000
|
trusted library allocation
|
page read and write
|
||
1643000
|
heap
|
page read and write
|
||
5E2A000
|
trusted library allocation
|
page read and write
|
||
5DDE000
|
trusted library allocation
|
page read and write
|
||
66BA000
|
trusted library allocation
|
page read and write
|
||
5DD3000
|
trusted library allocation
|
page read and write
|
||
5E11000
|
trusted library allocation
|
page read and write
|
||
5E2A000
|
trusted library allocation
|
page read and write
|
||
5D4B000
|
trusted library allocation
|
page read and write
|
||
526B000
|
stack
|
page read and write
|
||
5E11000
|
trusted library allocation
|
page read and write
|
||
7F1E000
|
stack
|
page read and write
|
||
166C000
|
heap
|
page read and write
|
||
53D0000
|
direct allocation
|
page execute and read and write
|
||
5E20000
|
trusted library allocation
|
page read and write
|
||
5E2A000
|
trusted library allocation
|
page read and write
|
||
6118000
|
trusted library allocation
|
page read and write
|
||
1665000
|
heap
|
page read and write
|
||
C90000
|
unkown
|
page read and write
|
||
68AC000
|
trusted library allocation
|
page read and write
|
||
5DDF000
|
trusted library allocation
|
page read and write
|
||
C44000
|
heap
|
page read and write
|
||
1666000
|
heap
|
page read and write
|
||
5DCB000
|
trusted library allocation
|
page read and write
|
||
4DA1000
|
heap
|
page read and write
|
||
5E2A000
|
trusted library allocation
|
page read and write
|
||
5E49000
|
trusted library allocation
|
page read and write
|
||
5E2A000
|
trusted library allocation
|
page read and write
|
||
66B5000
|
trusted library allocation
|
page read and write
|
||
5DF3000
|
trusted library allocation
|
page read and write
|
||
5DDD000
|
trusted library allocation
|
page read and write
|
||
5E2A000
|
trusted library allocation
|
page read and write
|
||
676E000
|
trusted library allocation
|
page read and write
|
||
819E000
|
stack
|
page read and write
|
||
5DC4000
|
trusted library allocation
|
page read and write
|
||
65EF000
|
trusted library allocation
|
page read and write
|
||
5DCC000
|
trusted library allocation
|
page read and write
|
||
166E000
|
heap
|
page read and write
|
||
5E63000
|
trusted library allocation
|
page read and write
|
||
765E000
|
stack
|
page read and write
|
||
5E05000
|
trusted library allocation
|
page read and write
|
||
5DCB000
|
trusted library allocation
|
page read and write
|
||
6045000
|
trusted library allocation
|
page read and write
|
||
1667000
|
heap
|
page read and write
|
||
5D4F000
|
trusted library allocation
|
page read and write
|
||
4DA1000
|
heap
|
page read and write
|
||
39DE000
|
stack
|
page read and write
|
||
6704000
|
trusted library allocation
|
page read and write
|
||
6836000
|
trusted library allocation
|
page read and write
|
||
5E00000
|
trusted library allocation
|
page read and write
|
||
5D6C000
|
trusted library allocation
|
page read and write
|
||
5E11000
|
trusted library allocation
|
page read and write
|
||
5E11000
|
trusted library allocation
|
page read and write
|
||
66B3000
|
trusted library allocation
|
page read and write
|
||
4B5E000
|
stack
|
page read and write
|
||
5DE6000
|
trusted library allocation
|
page read and write
|
||
6685000
|
trusted library allocation
|
page read and write
|
||
5E10000
|
trusted library allocation
|
page read and write
|
||
5DC1000
|
trusted library allocation
|
page read and write
|
||
5E11000
|
trusted library allocation
|
page read and write
|
||
6041000
|
trusted library allocation
|
page read and write
|
||
165F000
|
heap
|
page read and write
|
||
6683000
|
trusted library allocation
|
page read and write
|
||
5DD9000
|
trusted library allocation
|
page read and write
|
||
5E00000
|
trusted library allocation
|
page read and write
|
||
4D9F000
|
stack
|
page read and write
|
||
AFB000
|
stack
|
page read and write
|
||
5E2A000
|
trusted library allocation
|
page read and write
|
||
5E2A000
|
trusted library allocation
|
page read and write
|
||
61E0000
|
trusted library allocation
|
page read and write
|
||
61B0000
|
trusted library allocation
|
page read and write
|
||
553D000
|
stack
|
page read and write
|
||
1653000
|
heap
|
page read and write
|
||
4DA0000
|
heap
|
page read and write
|
||
5E11000
|
trusted library allocation
|
page read and write
|
||
669A000
|
trusted library allocation
|
page read and write
|
||
67DF000
|
stack
|
page read and write
|
||
5E11000
|
trusted library allocation
|
page read and write
|
||
66C3000
|
trusted library allocation
|
page read and write
|
||
5D7E000
|
trusted library allocation
|
page read and write
|
||
671F000
|
trusted library allocation
|
page read and write
|
||
739F000
|
stack
|
page read and write
|
||
5E79000
|
trusted library allocation
|
page read and write
|
||
6709000
|
trusted library allocation
|
page read and write
|
||
671D000
|
trusted library allocation
|
page read and write
|
||
6838000
|
trusted library allocation
|
page read and write
|
||
5DCC000
|
trusted library allocation
|
page read and write
|
||
5E2A000
|
trusted library allocation
|
page read and write
|
||
65E3000
|
trusted library allocation
|
page read and write
|
||
5E42000
|
trusted library allocation
|
page read and write
|
||
5E2A000
|
trusted library allocation
|
page read and write
|
||
5D4F000
|
trusted library allocation
|
page read and write
|
||
5DDD000
|
trusted library allocation
|
page read and write
|
||
C91000
|
unkown
|
page execute and read and write
|
||
5F4F000
|
trusted library allocation
|
page read and write
|
||
5DD5000
|
trusted library allocation
|
page read and write
|
||
761F000
|
stack
|
page read and write
|
||
66CE000
|
trusted library allocation
|
page read and write
|
||
6687000
|
trusted library allocation
|
page read and write
|
||
675A000
|
trusted library allocation
|
page read and write
|
||
425F000
|
stack
|
page read and write
|
||
5E2A000
|
trusted library allocation
|
page read and write
|
||
165F000
|
heap
|
page read and write
|
||
5D46000
|
trusted library allocation
|
page read and write
|
||
5E48000
|
trusted library allocation
|
page read and write
|
||
5B6E000
|
stack
|
page read and write
|
||
5D43000
|
trusted library allocation
|
page read and write
|
||
C44000
|
heap
|
page read and write
|
||
536F000
|
stack
|
page read and write
|
||
65EB000
|
trusted library allocation
|
page read and write
|
||
1668000
|
heap
|
page read and write
|
||
65E2000
|
trusted library allocation
|
page read and write
|
||
65E0000
|
trusted library allocation
|
page read and write
|
||
5D4A000
|
trusted library allocation
|
page read and write
|
||
5D84000
|
trusted library allocation
|
page read and write
|
||
5275000
|
direct allocation
|
page read and write
|
||
5F42000
|
trusted library allocation
|
page read and write
|
||
16CE000
|
stack
|
page read and write
|
||
682A000
|
trusted library allocation
|
page read and write
|
||
65EE000
|
trusted library allocation
|
page read and write
|
||
66D1000
|
trusted library allocation
|
page read and write
|
||
5E59000
|
trusted library allocation
|
page read and write
|
||
65E2000
|
trusted library allocation
|
page read and write
|
||
715E000
|
stack
|
page read and write
|
||
5E65000
|
trusted library allocation
|
page read and write
|
||
302E000
|
stack
|
page read and write
|
||
65E2000
|
trusted library allocation
|
page read and write
|
||
5DE7000
|
trusted library allocation
|
page read and write
|
||
5E11000
|
trusted library allocation
|
page read and write
|
||
5E2A000
|
trusted library allocation
|
page read and write
|
||
1663000
|
heap
|
page read and write
|
||
672B000
|
trusted library allocation
|
page read and write
|
||
5E00000
|
trusted library allocation
|
page read and write
|
||
5E11000
|
trusted library allocation
|
page read and write
|
||
5E11000
|
trusted library allocation
|
page read and write
|
||
5230000
|
direct allocation
|
page read and write
|
||
C44000
|
heap
|
page read and write
|
||
5E11000
|
trusted library allocation
|
page read and write
|
||
5D4F000
|
trusted library allocation
|
page read and write
|
||
401E000
|
stack
|
page read and write
|
||
6E16000
|
trusted library allocation
|
page execute and read and write
|
||
5DBB000
|
trusted library allocation
|
page read and write
|
||
66F2000
|
trusted library allocation
|
page read and write
|
||
8A40000
|
direct allocation
|
page read and write
|
||
66F0000
|
trusted library allocation
|
page read and write
|
||
8A40000
|
direct allocation
|
page read and write
|
||
15D1000
|
heap
|
page read and write
|
||
53B0000
|
direct allocation
|
page execute and read and write
|
||
5E2A000
|
trusted library allocation
|
page read and write
|
||
5DF0000
|
trusted library allocation
|
page read and write
|
||
5E2A000
|
trusted library allocation
|
page read and write
|
||
592E000
|
stack
|
page read and write
|
||
66CD000
|
trusted library allocation
|
page read and write
|
||
5D6A000
|
trusted library allocation
|
page read and write
|
||
65EB000
|
trusted library allocation
|
page read and write
|
||
5E65000
|
trusted library allocation
|
page read and write
|
||
5E11000
|
trusted library allocation
|
page read and write
|
||
5E11000
|
trusted library allocation
|
page read and write
|
||
5D44000
|
trusted library allocation
|
page read and write
|
||
C90000
|
unkown
|
page readonly
|
||
5DD9000
|
trusted library allocation
|
page read and write
|
||
5E2A000
|
trusted library allocation
|
page read and write
|
||
67FA000
|
trusted library allocation
|
page read and write
|
||
F4B000
|
unkown
|
page execute and read and write
|
||
5E01000
|
trusted library allocation
|
page read and write
|
||
65E9000
|
trusted library allocation
|
page read and write
|
||
6702000
|
trusted library allocation
|
page read and write
|
||
65F1000
|
trusted library allocation
|
page read and write
|
||
335F000
|
stack
|
page read and write
|
||
66DE000
|
trusted library allocation
|
page read and write
|
||
1590000
|
heap
|
page read and write
|
||
6758000
|
trusted library allocation
|
page read and write
|
||
5DE6000
|
trusted library allocation
|
page read and write
|
||
5DE6000
|
trusted library allocation
|
page read and write
|
||
65E9000
|
trusted library allocation
|
page read and write
|
||
815F000
|
stack
|
page read and write
|
||
5E11000
|
trusted library allocation
|
page read and write
|
||
5D7B000
|
trusted library allocation
|
page read and write
|
||
5DBD000
|
trusted library allocation
|
page read and write
|
||
5E08000
|
trusted library allocation
|
page read and write
|
||
C70000
|
heap
|
page read and write
|
||
667D000
|
trusted library allocation
|
page read and write
|
||
5DF8000
|
trusted library allocation
|
page read and write
|
||
5E2A000
|
trusted library allocation
|
page read and write
|
||
725F000
|
stack
|
page read and write
|
||
1677000
|
heap
|
page read and write
|
||
65E0000
|
trusted library allocation
|
page read and write
|
||
73DE000
|
stack
|
page read and write
|
||
1666000
|
heap
|
page read and write
|
||
159E000
|
heap
|
page read and write
|
||
5390000
|
direct allocation
|
page execute and read and write
|
||
5DE6000
|
trusted library allocation
|
page read and write
|
||
65E1000
|
trusted library allocation
|
page read and write
|
||
3E9F000
|
stack
|
page read and write
|
||
5DAC000
|
trusted library allocation
|
page read and write
|
||
67C7000
|
trusted library allocation
|
page read and write
|
||
5DF1000
|
trusted library allocation
|
page read and write
|
||
6CFB000
|
trusted library allocation
|
page execute and read and write
|
||
5E00000
|
trusted library allocation
|
page read and write
|
||
5D5E000
|
trusted library allocation
|
page read and write
|
||
5DCD000
|
trusted library allocation
|
page read and write
|
||
17CE000
|
stack
|
page read and write
|
||
6078000
|
trusted library allocation
|
page read and write
|
||
5D67000
|
trusted library allocation
|
page read and write
|
||
3030000
|
direct allocation
|
page read and write
|
||
5D67000
|
trusted library allocation
|
page read and write
|
||
65EB000
|
trusted library allocation
|
page read and write
|
||
65E7000
|
trusted library allocation
|
page read and write
|
||
6828000
|
trusted library allocation
|
page read and write
|
||
5E11000
|
trusted library allocation
|
page read and write
|
||
5DF0000
|
trusted library allocation
|
page read and write
|
||
83DF000
|
stack
|
page read and write
|
||
5E11000
|
trusted library allocation
|
page read and write
|
||
65E8000
|
trusted library allocation
|
page read and write
|
||
669F000
|
trusted library allocation
|
page read and write
|
||
F8C000
|
unkown
|
page execute and read and write
|
||
8AA0000
|
direct allocation
|
page read and write
|
||
5E11000
|
trusted library allocation
|
page read and write
|
||
65EB000
|
trusted library allocation
|
page read and write
|
||
C44000
|
heap
|
page read and write
|
||
361E000
|
stack
|
page read and write
|
||
65ED000
|
trusted library allocation
|
page read and write
|
||
4DA1000
|
heap
|
page read and write
|
||
5E00000
|
trusted library allocation
|
page read and write
|
||
855E000
|
stack
|
page read and write
|
||
65E0000
|
trusted library allocation
|
page read and write
|
||
5E10000
|
trusted library allocation
|
page read and write
|
||
5DBB000
|
trusted library allocation
|
page read and write
|
||
53B0000
|
direct allocation
|
page execute and read and write
|
||
5D5B000
|
trusted library allocation
|
page read and write
|
||
65E0000
|
trusted library allocation
|
page read and write
|
||
5E01000
|
trusted library allocation
|
page read and write
|
||
6043000
|
trusted library allocation
|
page read and write
|
||
5E2A000
|
trusted library allocation
|
page read and write
|
||
15D3000
|
heap
|
page read and write
|
||
67B6000
|
trusted library allocation
|
page read and write
|
||
5E2A000
|
trusted library allocation
|
page read and write
|
||
5A2F000
|
stack
|
page read and write
|
||
5403000
|
trusted library allocation
|
page read and write
|
||
66F0000
|
trusted library allocation
|
page read and write
|
||
5DC1000
|
trusted library allocation
|
page read and write
|
||
5DCC000
|
trusted library allocation
|
page read and write
|
||
5DC4000
|
trusted library allocation
|
page read and write
|
||
5E2A000
|
trusted library allocation
|
page read and write
|
||
5DD7000
|
trusted library allocation
|
page read and write
|
||
5E2A000
|
trusted library allocation
|
page read and write
|
||
65E9000
|
trusted library allocation
|
page read and write
|
||
65EB000
|
trusted library allocation
|
page read and write
|
||
5E00000
|
trusted library allocation
|
page read and write
|
||
4C9E000
|
stack
|
page read and write
|
||
1654000
|
heap
|
page read and write
|
||
375E000
|
stack
|
page read and write
|
||
65ED000
|
trusted library allocation
|
page read and write
|
||
5DC0000
|
trusted library allocation
|
page read and write
|
||
6047000
|
trusted library allocation
|
page read and write
|
||
5DE6000
|
trusted library allocation
|
page read and write
|
||
5E11000
|
trusted library allocation
|
page read and write
|
||
145E000
|
stack
|
page read and write
|
||
5D67000
|
trusted library allocation
|
page read and write
|
||
8AA0000
|
direct allocation
|
page read and write
|
||
5DD3000
|
trusted library allocation
|
page read and write
|
||
5E2A000
|
trusted library allocation
|
page read and write
|
||
CE7000
|
unkown
|
page read and write
|
||
479E000
|
stack
|
page read and write
|
||
5E65000
|
trusted library allocation
|
page read and write
|
||
5E11000
|
trusted library allocation
|
page read and write
|
||
4DA1000
|
heap
|
page read and write
|
||
3030000
|
direct allocation
|
page read and write
|
||
65E3000
|
trusted library allocation
|
page read and write
|
||
67FC000
|
trusted library allocation
|
page read and write
|
||
5E2A000
|
trusted library allocation
|
page read and write
|
||
5D67000
|
trusted library allocation
|
page read and write
|
||
1668000
|
heap
|
page read and write
|
||
165F000
|
heap
|
page read and write
|
||
5D6A000
|
trusted library allocation
|
page read and write
|
||
5E11000
|
trusted library allocation
|
page read and write
|
||
5D76000
|
trusted library allocation
|
page read and write
|
||
65F0000
|
trusted library allocation
|
page read and write
|
||
C44000
|
heap
|
page read and write
|
||
5DF0000
|
trusted library allocation
|
page read and write
|
||
166E000
|
heap
|
page read and write
|
||
4DA1000
|
heap
|
page read and write
|
||
1670000
|
heap
|
page read and write
|
||
669D000
|
trusted library allocation
|
page read and write
|
||
6046000
|
trusted library allocation
|
page read and write
|
||
5E2A000
|
trusted library allocation
|
page read and write
|
||
6120000
|
trusted library allocation
|
page read and write
|
||
7C5F000
|
stack
|
page read and write
|
||
1671000
|
heap
|
page read and write
|
||
5E2A000
|
trusted library allocation
|
page read and write
|
||
389E000
|
stack
|
page read and write
|
||
6726000
|
trusted library allocation
|
page read and write
|
||
66F5000
|
trusted library allocation
|
page read and write
|
||
5DD9000
|
trusted library allocation
|
page read and write
|
||
66D2000
|
trusted library allocation
|
page read and write
|
||
685C000
|
trusted library allocation
|
page read and write
|
||
5E01000
|
trusted library allocation
|
page read and write
|
||
C91000
|
unkown
|
page execute and write copy
|
||
5E59000
|
trusted library allocation
|
page read and write
|
||
5DBF000
|
trusted library allocation
|
page read and write
|
||
3057000
|
heap
|
page read and write
|
||
6779000
|
trusted library allocation
|
page read and write
|
||
5D79000
|
trusted library allocation
|
page read and write
|
||
6761000
|
trusted library allocation
|
page read and write
|
||
43DE000
|
stack
|
page read and write
|
||
165D000
|
heap
|
page read and write
|
||
5E2A000
|
trusted library allocation
|
page read and write
|
||
5DE6000
|
trusted library allocation
|
page read and write
|
||
5D4A000
|
trusted library allocation
|
page read and write
|
||
5DC6000
|
trusted library allocation
|
page read and write
|
||
65E9000
|
trusted library allocation
|
page read and write
|
||
5E71000
|
trusted library allocation
|
page read and write
|
||
66E0000
|
trusted library allocation
|
page read and write
|
||
399F000
|
stack
|
page read and write
|
||
7EDF000
|
stack
|
page read and write
|
||
5D95000
|
trusted library allocation
|
page read and write
|
||
C44000
|
heap
|
page read and write
|
||
5E01000
|
trusted library allocation
|
page read and write
|
||
44DF000
|
stack
|
page read and write
|
||
3030000
|
direct allocation
|
page read and write
|
||
66CC000
|
trusted library allocation
|
page read and write
|
||
5DBB000
|
trusted library allocation
|
page read and write
|
||
1580000
|
heap
|
page read and write
|
||
6B60000
|
trusted library allocation
|
page read and write
|
||
6F1F000
|
stack
|
page read and write
|
||
74DF000
|
stack
|
page read and write
|
||
5DC0000
|
trusted library allocation
|
page read and write
|
||
5220000
|
direct allocation
|
page read and write
|
||
5DF5000
|
trusted library allocation
|
page read and write
|
||
385F000
|
stack
|
page read and write
|
||
65E4000
|
trusted library allocation
|
page read and write
|
||
65E1000
|
trusted library allocation
|
page read and write
|
||
5DBB000
|
trusted library allocation
|
page read and write
|
||
6724000
|
trusted library allocation
|
page read and write
|
||
5DC5000
|
trusted library allocation
|
page read and write
|
||
5E2A000
|
trusted library allocation
|
page read and write
|
||
5E2A000
|
trusted library allocation
|
page read and write
|
||
35DF000
|
stack
|
page read and write
|
||
1678000
|
heap
|
page read and write
|
||
5E40000
|
trusted library allocation
|
page read and write
|
||
5E11000
|
trusted library allocation
|
page read and write
|
||
68AA000
|
trusted library allocation
|
page read and write
|
||
4DB0000
|
heap
|
page read and write
|
||
5DF0000
|
trusted library allocation
|
page read and write
|
||
5DC4000
|
trusted library allocation
|
page read and write
|
||
5DD9000
|
trusted library allocation
|
page read and write
|
||
5DE6000
|
trusted library allocation
|
page read and write
|
||
451E000
|
stack
|
page read and write
|
||
6E18000
|
trusted library allocation
|
page execute and read and write
|
||
155F000
|
stack
|
page read and write
|
||
5E01000
|
trusted library allocation
|
page read and write
|
||
4DA1000
|
heap
|
page read and write
|
||
5DBB000
|
trusted library allocation
|
page read and write
|
||
4DA1000
|
heap
|
page read and write
|
||
5E2A000
|
trusted library allocation
|
page read and write
|
||
65E7000
|
trusted library allocation
|
page read and write
|
||
65E4000
|
trusted library allocation
|
page read and write
|
||
5DAC000
|
trusted library allocation
|
page read and write
|
||
7D9F000
|
stack
|
page read and write
|
||
65EB000
|
trusted library allocation
|
page read and write
|
||
65EF000
|
trusted library allocation
|
page read and write
|
||
841E000
|
stack
|
page read and write
|
||
5DD4000
|
trusted library allocation
|
page read and write
|
||
5E79000
|
trusted library allocation
|
page read and write
|
||
5DE6000
|
trusted library allocation
|
page read and write
|
||
5DF0000
|
trusted library allocation
|
page read and write
|
||
6685000
|
trusted library allocation
|
page read and write
|
||
6729000
|
trusted library allocation
|
page read and write
|
||
65E9000
|
trusted library allocation
|
page read and write
|
||
6703000
|
trusted library allocation
|
page read and write
|
||
669D000
|
trusted library allocation
|
page read and write
|
||
4A1E000
|
stack
|
page read and write
|
||
53BD000
|
stack
|
page read and write
|
||
5DBE000
|
trusted library allocation
|
page read and write
|
||
5D72000
|
trusted library allocation
|
page read and write
|
||
65ED000
|
trusted library allocation
|
page read and write
|
||
5E11000
|
trusted library allocation
|
page read and write
|
||
5DC0000
|
trusted library allocation
|
page read and write
|
||
6048000
|
trusted library allocation
|
page read and write
|
||
5E2A000
|
trusted library allocation
|
page read and write
|
||
165E000
|
heap
|
page read and write
|
||
1670000
|
heap
|
page read and write
|
||
65E5000
|
trusted library allocation
|
page read and write
|
||
5E20000
|
trusted library allocation
|
page read and write
|
||
5E4A000
|
trusted library allocation
|
page read and write
|
||
5E2A000
|
trusted library allocation
|
page read and write
|
||
C44000
|
heap
|
page read and write
|
||
3030000
|
direct allocation
|
page read and write
|
||
66AF000
|
trusted library allocation
|
page read and write
|
||
5DE4000
|
trusted library allocation
|
page read and write
|
||
5DF8000
|
trusted library allocation
|
page read and write
|
||
5DCC000
|
trusted library allocation
|
page read and write
|
||
5E79000
|
trusted library allocation
|
page read and write
|
||
65E5000
|
trusted library allocation
|
page read and write
|
||
5E11000
|
trusted library allocation
|
page read and write
|
||
5F36000
|
trusted library allocation
|
page read and write
|
||
65EA000
|
trusted library allocation
|
page read and write
|
||
775F000
|
stack
|
page read and write
|
||
5DF1000
|
trusted library allocation
|
page read and write
|
||
685A000
|
trusted library allocation
|
page read and write
|
||
C44000
|
heap
|
page read and write
|
||
5E01000
|
trusted library allocation
|
page read and write
|
||
5D4F000
|
trusted library allocation
|
page read and write
|
||
563D000
|
stack
|
page read and write
|
||
8A40000
|
direct allocation
|
page read and write
|
||
5E11000
|
trusted library allocation
|
page read and write
|
||
5D43000
|
trusted library allocation
|
page read and write
|
||
5EE6000
|
trusted library allocation
|
page read and write
|
||
5E2A000
|
trusted library allocation
|
page read and write
|
||
5D4A000
|
trusted library allocation
|
page read and write
|
||
34DE000
|
stack
|
page read and write
|
||
5CDF000
|
stack
|
page read and write
|
||
5D81000
|
trusted library allocation
|
page read and write
|
||
5DF4000
|
trusted library allocation
|
page read and write
|
||
5E01000
|
trusted library allocation
|
page read and write
|
||
5D77000
|
trusted library allocation
|
page read and write
|
||
65ED000
|
trusted library allocation
|
page read and write
|
||
49DF000
|
stack
|
page read and write
|
||
5DBD000
|
trusted library allocation
|
page read and write
|
||
6A3E000
|
trusted library allocation
|
page read and write
|
||
5DD0000
|
trusted library allocation
|
page read and write
|
||
5DD0000
|
trusted library allocation
|
page read and write
|
||
6110000
|
trusted library allocation
|
page read and write
|
||
5DC5000
|
trusted library allocation
|
page read and write
|
||
166A000
|
heap
|
page read and write
|
||
6759000
|
trusted library allocation
|
page read and write
|
||
5DF5000
|
trusted library allocation
|
page read and write
|
||
8A40000
|
trusted library allocation
|
page read and write
|
||
5DB8000
|
trusted library allocation
|
page read and write
|
||
65EA000
|
trusted library allocation
|
page read and write
|
||
5F36000
|
trusted library allocation
|
page read and write
|
||
65E2000
|
trusted library allocation
|
page read and write
|
||
5D4F000
|
trusted library allocation
|
page read and write
|
||
5E2A000
|
trusted library allocation
|
page read and write
|
||
66CB000
|
trusted library allocation
|
page read and write
|
||
5BDE000
|
stack
|
page read and write
|
||
411F000
|
stack
|
page read and write
|
||
66B1000
|
trusted library allocation
|
page read and write
|
||
5DC8000
|
trusted library allocation
|
page read and write
|
||
5E01000
|
trusted library allocation
|
page read and write
|
||
5E01000
|
trusted library allocation
|
page read and write
|
||
5E01000
|
trusted library allocation
|
page read and write
|
||
8A40000
|
direct allocation
|
page read and write
|
||
679B000
|
trusted library allocation
|
page read and write
|
||
61E2000
|
trusted library allocation
|
page read and write
|
||
164C000
|
heap
|
page read and write
|
||
8A40000
|
direct allocation
|
page read and write
|
||
15C8000
|
heap
|
page read and write
|
||
5DE6000
|
trusted library allocation
|
page read and write
|
||
5D86000
|
trusted library allocation
|
page read and write
|
||
65E9000
|
trusted library allocation
|
page read and write
|
||
5D64000
|
trusted library allocation
|
page read and write
|
||
3ADF000
|
stack
|
page read and write
|
||
65EE000
|
trusted library allocation
|
page read and write
|
||
6B57000
|
trusted library allocation
|
page read and write
|
||
315F000
|
stack
|
page read and write
|
||
5E6F000
|
trusted library allocation
|
page read and write
|
||
65EB000
|
trusted library allocation
|
page read and write
|
||
6B6A000
|
trusted library allocation
|
page execute and read and write
|
||
5DF1000
|
trusted library allocation
|
page read and write
|
||
5D76000
|
trusted library allocation
|
page read and write
|
||
165E000
|
heap
|
page read and write
|
||
5DD0000
|
trusted library allocation
|
page read and write
|
||
5DE6000
|
trusted library allocation
|
page read and write
|
||
5E01000
|
trusted library allocation
|
page read and write
|
||
166E000
|
heap
|
page read and write
|
||
53B0000
|
direct allocation
|
page execute and read and write
|
||
66CB000
|
trusted library allocation
|
page read and write
|
||
5DEF000
|
trusted library allocation
|
page read and write
|
||
5DBE000
|
trusted library allocation
|
page read and write
|
||
65E2000
|
trusted library allocation
|
page read and write
|
||
65F0000
|
trusted library allocation
|
page read and write
|
||
66C1000
|
trusted library allocation
|
page read and write
|
||
66C7000
|
trusted library allocation
|
page read and write
|
||
6060000
|
trusted library allocation
|
page read and write
|
||
5DCB000
|
trusted library allocation
|
page read and write
|
||
5EDD000
|
trusted library allocation
|
page read and write
|
||
5E11000
|
trusted library allocation
|
page read and write
|
||
5F40000
|
trusted library allocation
|
page read and write
|
||
5DC1000
|
trusted library allocation
|
page read and write
|
||
166C000
|
heap
|
page read and write
|
||
1663000
|
heap
|
page read and write
|
||
1670000
|
heap
|
page read and write
|
||
5DCB000
|
trusted library allocation
|
page read and write
|
||
5D6A000
|
trusted library allocation
|
page read and write
|
||
F8D000
|
unkown
|
page execute and write copy
|
||
5DF0000
|
trusted library allocation
|
page read and write
|
||
339E000
|
stack
|
page read and write
|
||
5E11000
|
trusted library allocation
|
page read and write
|
||
5F7A000
|
trusted library allocation
|
page read and write
|
||
5D77000
|
trusted library allocation
|
page read and write
|
||
5E2A000
|
trusted library allocation
|
page read and write
|
||
5E11000
|
trusted library allocation
|
page read and write
|
||
5DD9000
|
trusted library allocation
|
page read and write
|
||
65E4000
|
trusted library allocation
|
page read and write
|
||
53C0000
|
direct allocation
|
page execute and read and write
|
||
5E63000
|
trusted library allocation
|
page read and write
|
||
66D0000
|
trusted library allocation
|
page read and write
|
||
5DF5000
|
trusted library allocation
|
page read and write
|
||
5DD9000
|
trusted library allocation
|
page read and write
|
||
5DF2000
|
trusted library allocation
|
page read and write
|
||
65E9000
|
trusted library allocation
|
page read and write
|
||
C44000
|
heap
|
page read and write
|
||
5D97000
|
trusted library allocation
|
page read and write
|
||
5E01000
|
trusted library allocation
|
page read and write
|
||
5E18000
|
trusted library allocation
|
page read and write
|
||
5E01000
|
trusted library allocation
|
page read and write
|
||
5E2A000
|
trusted library allocation
|
page read and write
|
||
57BE000
|
stack
|
page read and write
|
||
5DD9000
|
trusted library allocation
|
page read and write
|
||
4DA1000
|
heap
|
page read and write
|
||
4DA1000
|
heap
|
page read and write
|
||
5DF9000
|
trusted library allocation
|
page read and write
|
||
65E7000
|
trusted library allocation
|
page read and write
|
||
66BC000
|
trusted library allocation
|
page read and write
|
||
654E000
|
trusted library allocation
|
page read and write
|
||
1661000
|
heap
|
page read and write
|
||
65E6000
|
trusted library allocation
|
page read and write
|
||
3030000
|
direct allocation
|
page read and write
|
||
60BE000
|
stack
|
page read and write
|
||
166F000
|
heap
|
page read and write
|
||
711F000
|
stack
|
page read and write
|
||
166C000
|
heap
|
page read and write
|
||
15F6000
|
heap
|
page read and write
|
||
5E2A000
|
trusted library allocation
|
page read and write
|
||
5E2A000
|
trusted library allocation
|
page read and write
|
||
5E2A000
|
trusted library allocation
|
page read and write
|
||
C44000
|
heap
|
page read and write
|
||
5E2A000
|
trusted library allocation
|
page read and write
|
||
415E000
|
stack
|
page read and write
|
||
E75000
|
unkown
|
page execute and read and write
|
||
65E5000
|
trusted library allocation
|
page read and write
|
||
8A40000
|
direct allocation
|
page read and write
|
||
4DA1000
|
heap
|
page read and write
|
||
4B1F000
|
stack
|
page read and write
|
||
5DD4000
|
trusted library allocation
|
page read and write
|
||
166C000
|
heap
|
page read and write
|
||
5D64000
|
trusted library allocation
|
page read and write
|
||
1670000
|
heap
|
page read and write
|
||
5DD9000
|
trusted library allocation
|
page read and write
|
||
66F3000
|
trusted library allocation
|
page read and write
|
||
65EC000
|
trusted library allocation
|
page read and write
|
||
5DBB000
|
trusted library allocation
|
page read and write
|
||
5E01000
|
trusted library allocation
|
page read and write
|
||
681C000
|
stack
|
page read and write
|
||
5E01000
|
trusted library allocation
|
page read and write
|
||
2FAE000
|
stack
|
page read and write
|
||
5DC1000
|
trusted library allocation
|
page read and write
|
||
65E9000
|
trusted library allocation
|
page read and write
|
||
8A40000
|
direct allocation
|
page read and write
|
||
F8C000
|
unkown
|
page execute and write copy
|
||
7DDE000
|
stack
|
page read and write
|
||
C44000
|
heap
|
page read and write
|
||
5E01000
|
trusted library allocation
|
page read and write
|
||
66C5000
|
trusted library allocation
|
page read and write
|
||
65EB000
|
trusted library allocation
|
page read and write
|
||
5E00000
|
trusted library allocation
|
page read and write
|
||
5DAC000
|
trusted library allocation
|
page read and write
|
||
5DC8000
|
trusted library allocation
|
page read and write
|
||
5E59000
|
trusted library allocation
|
page read and write
|
||
5E2A000
|
trusted library allocation
|
page read and write
|
||
607A000
|
stack
|
page read and write
|
||
5DBB000
|
trusted library allocation
|
page read and write
|
||
65E6000
|
trusted library allocation
|
page read and write
|
||
5E6A000
|
trusted library allocation
|
page read and write
|
||
3030000
|
direct allocation
|
page read and write
|
||
371F000
|
stack
|
page read and write
|
||
1664000
|
heap
|
page read and write
|
||
5DBD000
|
trusted library allocation
|
page read and write
|
||
4C5F000
|
stack
|
page read and write
|
||
5D43000
|
trusted library allocation
|
page read and write
|
||
65E4000
|
trusted library allocation
|
page read and write
|
||
5D71000
|
trusted library allocation
|
page read and write
|
||
C44000
|
heap
|
page read and write
|
||
65F1000
|
trusted library allocation
|
page read and write
|
||
5DCC000
|
trusted library allocation
|
page read and write
|
||
5DCB000
|
trusted library allocation
|
page read and write
|
||
5DEE000
|
trusted library allocation
|
page read and write
|
||
1644000
|
heap
|
page read and write
|
||
5E79000
|
trusted library allocation
|
page read and write
|
||
6705000
|
trusted library allocation
|
page read and write
|
There are 942 hidden memdumps, click here to show them.
DOM / HTML
URL
|
Malicious
|
|
---|---|---|
https://learn.microsoft.com/en-us/dotnet/framework/install/application-not-started?version=(null)&processName=file.exe&platform=0009&osver=6&isServer=0&shimver=4.0.30319.0
|
||
https://learn.microsoft.com/en-us/dotnet/framework/install/application-not-started?version=(null)&processName=file.exe&platform=0009&osver=6&isServer=0&shimver=4.0.30319.0
|
||
https://learn.microsoft.com/en-us/dotnet/framework/install/application-not-started?version=(null)&processName=file.exe&platform=0009&osver=6&isServer=0&shimver=4.0.30319.0
|
||
https://learn.microsoft.com/en-us/dotnet/framework/install/application-not-started?version=(null)&processName=file.exe&platform=0009&osver=6&isServer=0&shimver=4.0.30319.0
|
||
https://learn.microsoft.com/en-us/dotnet/framework/install/application-not-started?version=(null)&processName=file.exe&platform=0009&osver=6&isServer=0&shimver=4.0.30319.0
|
||
https://learn.microsoft.com/en-us/dotnet/framework/install/application-not-started?version=(null)&processName=file.exe&platform=0009&osver=6&isServer=0&shimver=4.0.30319.0
|