Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
file.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
initial sample
|
||
Chrome Cache Entry: 100
|
PNG image data, 475 x 212, 8-bit/color RGBA, non-interlaced
|
downloaded
|
||
Chrome Cache Entry: 101
|
JSON data
|
downloaded
|
||
Chrome Cache Entry: 102
|
JSON data
|
dropped
|
||
Chrome Cache Entry: 103
|
exported SGML document, ASCII text, with very long lines (65536), with no line terminators
|
dropped
|
||
Chrome Cache Entry: 104
|
JPEG image data, JFIF standard 1.01, aspect ratio, density 1x1, segment length 16, progressive, precision 8, 1301x300, components
3
|
downloaded
|
||
Chrome Cache Entry: 105
|
ASCII text, with very long lines (46884)
|
dropped
|
||
Chrome Cache Entry: 106
|
ASCII text
|
dropped
|
||
Chrome Cache Entry: 107
|
SVG Scalable Vector Graphics image
|
downloaded
|
||
Chrome Cache Entry: 108
|
Web Open Font Format (Version 2), TrueType, length 19696, version 1.0
|
downloaded
|
||
Chrome Cache Entry: 109
|
ASCII text, with very long lines (33148), with no line terminators
|
downloaded
|
||
Chrome Cache Entry: 110
|
PNG image data, 475 x 212, 8-bit/color RGBA, non-interlaced
|
dropped
|
||
Chrome Cache Entry: 111
|
PNG image data, 658 x 480, 8-bit/color RGBA, non-interlaced
|
dropped
|
||
Chrome Cache Entry: 112
|
JSON data
|
dropped
|
||
Chrome Cache Entry: 113
|
HTML document, ASCII text, with very long lines (639), with CRLF, LF line terminators
|
downloaded
|
||
Chrome Cache Entry: 114
|
JSON data
|
downloaded
|
||
Chrome Cache Entry: 115
|
PNG image data, 533 x 478, 8-bit/color RGBA, non-interlaced
|
dropped
|
||
Chrome Cache Entry: 74
|
PNG image data, 533 x 478, 8-bit/color RGBA, non-interlaced
|
dropped
|
||
Chrome Cache Entry: 75
|
PNG image data, 533 x 478, 8-bit/color RGBA, non-interlaced
|
downloaded
|
||
Chrome Cache Entry: 76
|
SVG Scalable Vector Graphics image
|
dropped
|
||
Chrome Cache Entry: 77
|
JSON data
|
dropped
|
||
Chrome Cache Entry: 78
|
PNG image data, 533 x 478, 8-bit/color RGBA, non-interlaced
|
dropped
|
||
Chrome Cache Entry: 79
|
ASCII text, with very long lines (65536), with no line terminators
|
downloaded
|
||
Chrome Cache Entry: 80
|
ASCII text, with very long lines (65410)
|
dropped
|
||
Chrome Cache Entry: 81
|
JSON data
|
dropped
|
||
Chrome Cache Entry: 82
|
ASCII text, with very long lines (65410)
|
downloaded
|
||
Chrome Cache Entry: 83
|
JSON data
|
downloaded
|
||
Chrome Cache Entry: 84
|
PNG image data, 533 x 478, 8-bit/color RGBA, non-interlaced
|
downloaded
|
||
Chrome Cache Entry: 85
|
ASCII text, with very long lines (52717), with no line terminators
|
dropped
|
||
Chrome Cache Entry: 86
|
ASCII text
|
downloaded
|
||
Chrome Cache Entry: 87
|
ASCII text, with very long lines (52717), with no line terminators
|
downloaded
|
||
Chrome Cache Entry: 88
|
exported SGML document, ASCII text, with very long lines (65536), with no line terminators
|
downloaded
|
||
Chrome Cache Entry: 89
|
ASCII text, with no line terminators
|
downloaded
|
||
Chrome Cache Entry: 90
|
JPEG image data, JFIF standard 1.01, aspect ratio, density 1x1, segment length 16, progressive, precision 8, 1301x300, components
3
|
dropped
|
||
Chrome Cache Entry: 91
|
PNG image data, 533 x 478, 8-bit/color RGBA, non-interlaced
|
downloaded
|
||
Chrome Cache Entry: 92
|
MS Windows icon resource - 6 icons, -128x-128, 16 colors, 72x72, 16 colors
|
downloaded
|
||
Chrome Cache Entry: 93
|
ASCII text, with very long lines (46884)
|
downloaded
|
||
Chrome Cache Entry: 94
|
JSON data
|
dropped
|
||
Chrome Cache Entry: 95
|
MS Windows icon resource - 6 icons, -128x-128, 16 colors, 72x72, 16 colors
|
dropped
|
||
Chrome Cache Entry: 96
|
PNG image data, 658 x 480, 8-bit/color RGBA, non-interlaced
|
downloaded
|
||
Chrome Cache Entry: 97
|
JSON data
|
dropped
|
||
Chrome Cache Entry: 98
|
ASCII text, with very long lines (33148), with no line terminators
|
dropped
|
||
Chrome Cache Entry: 99
|
JSON data
|
downloaded
|
There are 33 hidden files, click here to show them.
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\file.exe
|
"C:\Users\user\Desktop\file.exe"
|
||
C:\Program Files\Google\Chrome\Application\chrome.exe
|
"C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized --single-argument http://go.microsoft.com/fwlink/?prd=11324&pver=4.5&sbp=AppLaunch2&plcid=0x409&o1=SHIM_NOVERSION_FOUND&version=(null)&processName=file.exe&platform=0009&osver=6&isServer=0&shimver=4.0.30319.0
|
||
C:\Program Files\Google\Chrome\Application\chrome.exe
|
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US
--service-sandbox-type=none --mojo-platform-channel-handle=2192 --field-trial-handle=1924,i,2095106671095358693,17802434904325068709,262144
--disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction
/prefetch:8
|
||
C:\Program Files\Google\Chrome\Application\chrome.exe
|
"C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized --single-argument http://go.microsoft.com/fwlink/?prd=11324&pver=4.5&sbp=AppLaunch2&plcid=0x409&o1=SHIM_NOVERSION_FOUND&version=(null)&processName=file.exe&platform=0009&osver=6&isServer=0&shimver=4.0.30319.0
|
||
C:\Program Files\Google\Chrome\Application\chrome.exe
|
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US
--service-sandbox-type=none --mojo-platform-channel-handle=2112 --field-trial-handle=1916,i,16216201613498523600,2861810971136064477,262144
--disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction
/prefetch:8
|
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
https://authoring-docs-microsoft.poolparty.biz/devrel/7696cda6-0510-47f6-8302-71bb5d2e28cf
|
unknown
|
||
https://www.amazon.com/?tag=admarketus-20&ref=pd_sl_ef0fa27a12d43fbd45649e195429e8a63ddcad7cf7e128c0
|
unknown
|
||
https://duckduckgo.com/chrome_newtab
|
unknown
|
||
https://duckduckgo.com/ac/?q=
|
unknown
|
||
https://cook-rain.sbs/apivL
|
unknown
|
||
https://github.com/dotnet/docs/blob/17c4acca45e573a92878a44a2cce57d699fe9c7c/docs/framework/install/
|
unknown
|
||
https://www.linkedin.com/cws/share?url=$
|
unknown
|
||
https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
|
unknown
|
||
https://cook-rain.sbs/9
|
unknown
|
||
https://cook-rain.sbs/ers
|
unknown
|
||
https://github.com/Youssef1313
|
unknown
|
||
https://management.azure.com/providers/Microsoft.Portal/userSettings/cloudconsole?api-version=2023-0
|
unknown
|
||
https://aka.ms/msignite_docs_banner
|
unknown
|
||
https://videoencodingpublic-hgeaeyeba8gycee3.b01.azurefd.net/public-b4da8140-92cf-421c-8b7b-e471d5b9
|
unknown
|
||
peepburry828.sbs
|
|||
http://polymer.github.io/AUTHORS.txt
|
unknown
|
||
https://github.com/dotnet/docs/issues/new?template=z-customer-feedback.yml
|
unknown
|
||
https://management.azure.com/subscriptions?api-version=2016-06-01
|
unknown
|
||
https://cook-rain.sbs/h
|
unknown
|
||
https://github.com/dotnet/docs/blob/main/docs/framework/install/application-not-started.md
|
unknown
|
||
http://x1.c.lencr.org/0
|
unknown
|
||
http://x1.i.lencr.org/0
|
unknown
|
||
https://aka.ms/pshelpmechoose
|
unknown
|
||
https://aka.ms/feedback/report?space=61
|
unknown
|
||
https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
|
unknown
|
||
https://cook-rain.sbs/a
|
unknown
|
||
https://learn-video.azurefd.net/vod/player
|
unknown
|
||
p10tgrace.sbs
|
|||
https://cook-rain.sbs/Z
|
unknown
|
||
https://twitter.com/intent/tweet?original_referer=$
|
unknown
|
||
https://github.com/gewarren
|
unknown
|
||
http://185.215.113.16/off/def.exepleWebKit/537.36
|
unknown
|
||
https://support.mozilla.org/products/firefoxgro.all
|
unknown
|
||
http://polymer.github.io/CONTRIBUTORS.txt
|
unknown
|
||
https://cook-rain.sbs/T
|
unknown
|
||
processhol.sbs
|
|||
https://github.com/dotnet/docs/blob/live/docs/framework/install/application-not-started.md
|
unknown
|
||
https://authoring-docs-microsoft.poolparty.biz/devrel/69c76c32-967e-4c65-b89a-74cc527db725
|
unknown
|
||
https://client-api.arkoselabs.com/v2/api.js
|
unknown
|
||
https://aka.ms/MSIgniteChallenge/Tier1Banner?wt.mc_id=ignite24_learnbanner_tier1_cnl
|
unknown
|
||
https://management.azure.com/providers/Microsoft.Portal/consoles/default?api-version=2017-12-01-prev
|
unknown
|
||
https://www.google.com/images/branding/product/ico/googleg_lodp.ico
|
unknown
|
||
https://github.com/Thraka
|
unknown
|
||
https://cook-rain.sbs/api
|
104.21.66.38
|
||
http://polymer.github.io/PATENTS.txt
|
unknown
|
||
https://aka.ms/certhelp
|
unknown
|
||
http://185.215.113.16/steam/random.exe
|
unknown
|
||
https://bridge.sfo1.admarketplace.net/ctp?version=16.0.0&key=1696490019400400000.2&ci=1696490019252.
|
unknown
|
||
https://cook-rain.sbs/
|
unknown
|
||
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
|
unknown
|
||
http://crl.rootca1.amazontrust.com/rootca1.crl0
|
unknown
|
||
https://github.com/mairaw
|
unknown
|
||
https://cook-rain.sbs/z
|
unknown
|
||
https://js.monitor.azure.com/scripts/c/ms.jsll-4.min.js
|
13.107.246.63
|
||
http://ocsp.rootca1.amazontrust.com0:
|
unknown
|
||
https://schema.org
|
unknown
|
||
p3ar11fter.sbs
|
|||
http://185.215.113.16/steam/random.exe-
|
unknown
|
||
http://polymer.github.io/LICENSE.txt
|
unknown
|
||
https://www.ecosia.org/newtab/
|
unknown
|
||
https://support.mozilla.org/kb/customize-firefox-controls-buttons-and-toolbars?utm_source=firefox-br
|
unknown
|
||
https://cook-rain.sbs/s
|
unknown
|
||
https://aka.ms/yourcaliforniaprivacychoices
|
unknown
|
||
https://ac.ecosia.org/autocomplete?q=
|
unknown
|
||
https://github.com/nschonni
|
unknown
|
||
https://cook-rain.sbs/api.m
|
unknown
|
||
https://cook-rain.sbs/-l
|
unknown
|
||
https://videoencodingpublic-hgeaeyeba8gycee3.b01.azurefd.net/public-09ce73a6-05a5-4e4d-b3d7-bd5a8c05
|
unknown
|
||
https://github.com/adegeo
|
unknown
|
||
https://cook-rain.sbs:443/api
|
unknown
|
||
https://contile-images.services.mozilla.com/obgoOYObjIFea_bXuT6L4LbBJ8j425AD87S1HMD3BWg.9991.jpg
|
unknown
|
||
https://cook-rain.sbs/%
|
unknown
|
||
https://github.com/jonschlinkert/is-plain-object
|
unknown
|
||
http://crt.rootca1.amazontrust.com/rootca1.cer0?
|
unknown
|
||
https://octokit.github.io/rest.js/#throttling
|
unknown
|
||
https://www.invisalign.com/?utm_source=admarketplace&utm_medium=paidsearch&utm_campaign=Invisalign&u
|
unknown
|
||
https://imp.mt48.net/static?id=7RHzfOIXjFEYsBdvIpkX4Qqm4pqWfpl%2B4pbW4pbWfpbW7ReNxR3UIG8zInwYIFIVs9e
|
unknown
|
||
https://contile-images.services.mozilla.com/CuERQnIs4CzqjKBh9os6_h9d4CUDCHO3oiqmAQO6VLM.25122.jpg
|
unknown
|
||
https://github.com/js-cookie/js-cookie
|
unknown
|
||
https://cook-rain.sbs/apiqjf
|
unknown
|
||
http://185.215.113.16/off/def.exe
|
unknown
|
||
http://schema.org/Organization
|
unknown
|
||
https://channel9.msdn.com/
|
unknown
|
||
https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
|
unknown
|
||
https://github.com/dotnet/try
|
unknown
|
||
https://bridge.sfo1.ap01.net/ctp?version=16.0.0&key=1696490019400400000.1&ci=1696490019252.12791&cta
|
unknown
|
There are 76 hidden URLs, click here to show them.
Domains
Name
|
IP
|
Malicious
|
|
---|---|---|---|
cook-rain.sbs
|
104.21.66.38
|
||
www.google.com
|
142.250.181.68
|
||
s-part-0035.t-0009.t-msedge.net
|
13.107.246.63
|
||
js.monitor.azure.com
|
unknown
|
||
mdec.nelreports.net
|
unknown
|
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
192.168.2.7
|
unknown
|
unknown
|
||
13.107.246.63
|
s-part-0035.t-0009.t-msedge.net
|
United States
|
||
185.215.113.16
|
unknown
|
Portugal
|
||
104.21.66.38
|
cook-rain.sbs
|
United States
|
||
239.255.255.250
|
unknown
|
Reserved
|
||
142.250.181.68
|
www.google.com
|
United States
|
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
761000
|
unkown
|
page execute and read and write
|
||
5BEC000
|
trusted library allocation
|
page read and write
|
||
D6B000
|
heap
|
page read and write
|
||
599F000
|
trusted library allocation
|
page read and write
|
||
55E1000
|
trusted library allocation
|
page read and write
|
||
5A7E000
|
trusted library allocation
|
page read and write
|
||
4ABF000
|
stack
|
page read and write
|
||
5A8F000
|
trusted library allocation
|
page read and write
|
||
5AD9000
|
trusted library allocation
|
page read and write
|
||
5A90000
|
trusted library allocation
|
page read and write
|
||
55DF000
|
trusted library allocation
|
page read and write
|
||
5608000
|
trusted library allocation
|
page read and write
|
||
559B000
|
trusted library allocation
|
page read and write
|
||
55D4000
|
trusted library allocation
|
page read and write
|
||
55D4000
|
trusted library allocation
|
page read and write
|
||
D7F000
|
heap
|
page read and write
|
||
44F1000
|
heap
|
page read and write
|
||
4B00000
|
direct allocation
|
page execute and read and write
|
||
2D6E000
|
stack
|
page read and write
|
||
5635000
|
trusted library allocation
|
page read and write
|
||
55F2000
|
trusted library allocation
|
page read and write
|
||
559B000
|
trusted library allocation
|
page read and write
|
||
55EC000
|
trusted library allocation
|
page read and write
|
||
DA5000
|
heap
|
page read and write
|
||
2820000
|
heap
|
page read and write
|
||
44F1000
|
heap
|
page read and write
|
||
4930000
|
trusted library allocation
|
page read and write
|
||
44F1000
|
heap
|
page read and write
|
||
55D9000
|
trusted library allocation
|
page read and write
|
||
5998000
|
trusted library allocation
|
page read and write
|
||
56B7000
|
trusted library allocation
|
page read and write
|
||
7B9000
|
unkown
|
page execute and read and write
|
||
4970000
|
direct allocation
|
page read and write
|
||
750000
|
direct allocation
|
page read and write
|
||
55DE000
|
trusted library allocation
|
page read and write
|
||
55C4000
|
trusted library allocation
|
page read and write
|
||
55CB000
|
trusted library allocation
|
page read and write
|
||
372F000
|
stack
|
page read and write
|
||
55C4000
|
trusted library allocation
|
page read and write
|
||
5998000
|
trusted library allocation
|
page read and write
|
||
590000
|
heap
|
page read and write
|
||
44F1000
|
heap
|
page read and write
|
||
7EA0000
|
direct allocation
|
page read and write
|
||
5D6E000
|
trusted library allocation
|
page execute and read and write
|
||
558F000
|
trusted library allocation
|
page read and write
|
||
55A2000
|
trusted library allocation
|
page read and write
|
||
A52000
|
unkown
|
page execute and read and write
|
||
55B4000
|
trusted library allocation
|
page read and write
|
||
5997000
|
trusted library allocation
|
page read and write
|
||
5996000
|
trusted library allocation
|
page read and write
|
||
3D6F000
|
stack
|
page read and write
|
||
599E000
|
trusted library allocation
|
page read and write
|
||
55CE000
|
trusted library allocation
|
page read and write
|
||
55E6000
|
trusted library allocation
|
page read and write
|
||
55D7000
|
trusted library allocation
|
page read and write
|
||
55D4000
|
trusted library allocation
|
page read and write
|
||
D9E000
|
heap
|
page read and write
|
||
D8B000
|
heap
|
page read and write
|
||
55D4000
|
trusted library allocation
|
page read and write
|
||
55D3000
|
trusted library allocation
|
page read and write
|
||
5608000
|
trusted library allocation
|
page read and write
|
||
5635000
|
trusted library allocation
|
page read and write
|
||
5593000
|
trusted library allocation
|
page read and write
|
||
4970000
|
direct allocation
|
page read and write
|
||
5B90000
|
trusted library allocation
|
page read and write
|
||
5BBC000
|
trusted library allocation
|
page read and write
|
||
5590000
|
trusted library allocation
|
page read and write
|
||
55E8000
|
trusted library allocation
|
page read and write
|
||
5AD7000
|
trusted library allocation
|
page read and write
|
||
5A20000
|
trusted library allocation
|
page read and write
|
||
5592000
|
trusted library allocation
|
page read and write
|
||
599D000
|
trusted library allocation
|
page read and write
|
||
5AD9000
|
trusted library allocation
|
page read and write
|
||
55BA000
|
trusted library allocation
|
page read and write
|
||
D89000
|
heap
|
page read and write
|
||
336F000
|
stack
|
page read and write
|
||
559E000
|
trusted library allocation
|
page read and write
|
||
5583000
|
trusted library allocation
|
page read and write
|
||
55A2000
|
trusted library allocation
|
page read and write
|
||
5993000
|
trusted library allocation
|
page read and write
|
||
5581000
|
trusted library allocation
|
page read and write
|
||
55A7000
|
trusted library allocation
|
page read and write
|
||
558E000
|
trusted library allocation
|
page read and write
|
||
5B84000
|
trusted library allocation
|
page read and write
|
||
42AE000
|
stack
|
page read and write
|
||
559F000
|
trusted library allocation
|
page read and write
|
||
5999000
|
trusted library allocation
|
page read and write
|
||
5AB3000
|
trusted library allocation
|
page read and write
|
||
55B2000
|
trusted library allocation
|
page read and write
|
||
D8B000
|
heap
|
page read and write
|
||
55D4000
|
trusted library allocation
|
page read and write
|
||
55D4000
|
trusted library allocation
|
page read and write
|
||
558A000
|
trusted library allocation
|
page read and write
|
||
750000
|
direct allocation
|
page read and write
|
||
55B3000
|
trusted library allocation
|
page read and write
|
||
55C9000
|
trusted library allocation
|
page read and write
|
||
55C9000
|
trusted library allocation
|
page read and write
|
||
EAE000
|
stack
|
page read and write
|
||
55D9000
|
trusted library allocation
|
page read and write
|
||
5AD2000
|
trusted library allocation
|
page execute and read and write
|
||
55A7000
|
trusted library allocation
|
page read and write
|
||
44F1000
|
heap
|
page read and write
|
||
55B3000
|
trusted library allocation
|
page read and write
|
||
44F1000
|
heap
|
page read and write
|
||
5995000
|
trusted library allocation
|
page read and write
|
||
5AD7000
|
trusted library allocation
|
page read and write
|
||
5C61000
|
trusted library allocation
|
page execute and read and write
|
||
559E000
|
trusted library allocation
|
page read and write
|
||
44F1000
|
heap
|
page read and write
|
||
D89000
|
heap
|
page read and write
|
||
533E000
|
stack
|
page read and write
|
||
5608000
|
trusted library allocation
|
page read and write
|
||
5A5B000
|
trusted library allocation
|
page read and write
|
||
55A0000
|
trusted library allocation
|
page read and write
|
||
38AE000
|
stack
|
page read and write
|
||
5A59000
|
trusted library allocation
|
page read and write
|
||
7EA0000
|
direct allocation
|
page read and write
|
||
55A2000
|
trusted library allocation
|
page read and write
|
||
55D9000
|
trusted library allocation
|
page read and write
|
||
4AF0000
|
direct allocation
|
page execute and read and write
|
||
55D4000
|
trusted library allocation
|
page read and write
|
||
5AC1000
|
trusted library allocation
|
page read and write
|
||
4B00000
|
direct allocation
|
page execute and read and write
|
||
4B0D000
|
stack
|
page read and write
|
||
55D7000
|
trusted library allocation
|
page read and write
|
||
55C3000
|
trusted library allocation
|
page read and write
|
||
5993000
|
trusted library allocation
|
page read and write
|
||
5994000
|
trusted library allocation
|
page read and write
|
||
44F1000
|
heap
|
page read and write
|
||
D8B000
|
heap
|
page read and write
|
||
2E6F000
|
stack
|
page read and write
|
||
5996000
|
trusted library allocation
|
page read and write
|
||
55C9000
|
trusted library allocation
|
page read and write
|
||
D2B000
|
heap
|
page read and write
|
||
55BE000
|
trusted library allocation
|
page read and write
|
||
750000
|
direct allocation
|
page read and write
|
||
4970000
|
direct allocation
|
page read and write
|
||
559A000
|
trusted library allocation
|
page read and write
|
||
D8B000
|
heap
|
page read and write
|
||
D8B000
|
heap
|
page read and write
|
||
322F000
|
stack
|
page read and write
|
||
5608000
|
trusted library allocation
|
page read and write
|
||
55D4000
|
trusted library allocation
|
page read and write
|
||
5992000
|
trusted library allocation
|
page read and write
|
||
55D4000
|
trusted library allocation
|
page read and write
|
||
D8B000
|
heap
|
page read and write
|
||
55B5000
|
trusted library allocation
|
page read and write
|
||
5A5C000
|
trusted library allocation
|
page read and write
|
||
55D4000
|
trusted library allocation
|
page read and write
|
||
55D2000
|
trusted library allocation
|
page read and write
|
||
557C000
|
stack
|
page read and write
|
||
5608000
|
trusted library allocation
|
page read and write
|
||
560B000
|
trusted library allocation
|
page read and write
|
||
D8B000
|
heap
|
page read and write
|
||
5C1D000
|
trusted library allocation
|
page read and write
|
||
5B9D000
|
trusted library allocation
|
page read and write
|
||
7EA0000
|
trusted library allocation
|
page read and write
|
||
D8A000
|
heap
|
page read and write
|
||
599F000
|
trusted library allocation
|
page read and write
|
||
3EEE000
|
stack
|
page read and write
|
||
D97000
|
heap
|
page read and write
|
||
5B29000
|
trusted library allocation
|
page read and write
|
||
558A000
|
trusted library allocation
|
page read and write
|
||
D8B000
|
heap
|
page read and write
|
||
55B3000
|
trusted library allocation
|
page read and write
|
||
5994000
|
trusted library allocation
|
page read and write
|
||
5B48000
|
trusted library allocation
|
page read and write
|
||
5585000
|
trusted library allocation
|
page read and write
|
||
44F1000
|
heap
|
page read and write
|
||
5B17000
|
trusted library allocation
|
page read and write
|
||
55A2000
|
trusted library allocation
|
page read and write
|
||
5A23000
|
trusted library allocation
|
page read and write
|
||
34AF000
|
stack
|
page read and write
|
||
750000
|
direct allocation
|
page read and write
|
||
DA2000
|
heap
|
page read and write
|
||
D8B000
|
heap
|
page read and write
|
||
5997000
|
trusted library allocation
|
page read and write
|
||
5994000
|
trusted library allocation
|
page read and write
|
||
5AC0000
|
trusted library allocation
|
page read and write
|
||
5635000
|
trusted library allocation
|
page read and write
|
||
5992000
|
trusted library allocation
|
page read and write
|
||
D97000
|
heap
|
page read and write
|
||
559A000
|
trusted library allocation
|
page read and write
|
||
558F000
|
trusted library allocation
|
page read and write
|
||
7EA0000
|
direct allocation
|
page read and write
|
||
7EA0000
|
direct allocation
|
page read and write
|
||
5AC9000
|
trusted library allocation
|
page read and write
|
||
569F000
|
trusted library allocation
|
page read and write
|
||
44F0000
|
heap
|
page read and write
|
||
55D4000
|
trusted library allocation
|
page read and write
|
||
750000
|
direct allocation
|
page read and write
|
||
5594000
|
trusted library allocation
|
page read and write
|
||
599A000
|
trusted library allocation
|
page read and write
|
||
59C9000
|
stack
|
page read and write
|
||
55FA000
|
trusted library allocation
|
page read and write
|
||
5997000
|
trusted library allocation
|
page read and write
|
||
5ACF000
|
trusted library allocation
|
page read and write
|
||
D8B000
|
heap
|
page read and write
|
||
5792000
|
trusted library allocation
|
page read and write
|
||
5996000
|
trusted library allocation
|
page read and write
|
||
599C000
|
trusted library allocation
|
page read and write
|
||
55B4000
|
trusted library allocation
|
page read and write
|
||
55BC000
|
trusted library allocation
|
page read and write
|
||
55D1000
|
trusted library allocation
|
page read and write
|
||
5581000
|
trusted library allocation
|
page read and write
|
||
3C6E000
|
stack
|
page read and write
|
||
7F10000
|
direct allocation
|
page read and write
|
||
43B000
|
stack
|
page read and write
|
||
504E000
|
stack
|
page read and write
|
||
558B000
|
trusted library allocation
|
page read and write
|
||
5AB9000
|
trusted library allocation
|
page read and write
|
||
D8B000
|
heap
|
page read and write
|
||
55B0000
|
trusted library allocation
|
page read and write
|
||
39EE000
|
stack
|
page read and write
|
||
5996000
|
trusted library allocation
|
page read and write
|
||
55C4000
|
trusted library allocation
|
page read and write
|
||
4D3D000
|
stack
|
page read and write
|
||
55D4000
|
trusted library allocation
|
page read and write
|
||
5A25000
|
trusted library allocation
|
page read and write
|
||
D97000
|
heap
|
page read and write
|
||
5AA4000
|
trusted library allocation
|
page read and write
|
||
55C4000
|
trusted library allocation
|
page read and write
|
||
D89000
|
heap
|
page read and write
|
||
5C04000
|
trusted library allocation
|
page read and write
|
||
55B8000
|
trusted library allocation
|
page read and write
|
||
D97000
|
heap
|
page read and write
|
||
5999000
|
trusted library allocation
|
page read and write
|
||
4AE0000
|
direct allocation
|
page execute and read and write
|
||
559B000
|
trusted library allocation
|
page read and write
|
||
559A000
|
trusted library allocation
|
page read and write
|
||
44EF000
|
stack
|
page read and write
|
||
55D4000
|
trusted library allocation
|
page read and write
|
||
55C3000
|
trusted library allocation
|
page read and write
|
||
D8B000
|
heap
|
page read and write
|
||
5A35000
|
trusted library allocation
|
page read and write
|
||
543E000
|
stack
|
page read and write
|
||
5A32000
|
trusted library allocation
|
page read and write
|
||
55DD000
|
trusted library allocation
|
page read and write
|
||
55BB000
|
trusted library allocation
|
page read and write
|
||
D99000
|
heap
|
page read and write
|
||
44F1000
|
heap
|
page read and write
|
||
5E5000
|
heap
|
page read and write
|
||
55D4000
|
trusted library allocation
|
page read and write
|
||
599A000
|
trusted library allocation
|
page read and write
|
||
55B3000
|
trusted library allocation
|
page read and write
|
||
55CC000
|
trusted library allocation
|
page read and write
|
||
D16000
|
heap
|
page read and write
|
||
5635000
|
trusted library allocation
|
page read and write
|
||
C0C000
|
unkown
|
page execute and read and write
|
||
D8B000
|
heap
|
page read and write
|
||
55C0000
|
trusted library allocation
|
page read and write
|
||
55D5000
|
trusted library allocation
|
page read and write
|
||
3EAF000
|
stack
|
page read and write
|
||
5ADB000
|
trusted library allocation
|
page read and write
|
||
5997000
|
trusted library allocation
|
page read and write
|
||
55B3000
|
trusted library allocation
|
page read and write
|
||
55A0000
|
trusted library allocation
|
page read and write
|
||
5584000
|
trusted library allocation
|
page read and write
|
||
560C000
|
trusted library allocation
|
page read and write
|
||
5585000
|
trusted library allocation
|
page read and write
|
||
55E4000
|
trusted library allocation
|
page read and write
|
||
D8D000
|
heap
|
page read and write
|
||
D8B000
|
heap
|
page read and write
|
||
55A6000
|
trusted library allocation
|
page read and write
|
||
55B4000
|
trusted library allocation
|
page read and write
|
||
4FE0000
|
remote allocation
|
page read and write
|
||
5B46000
|
trusted library allocation
|
page read and write
|
||
55B3000
|
trusted library allocation
|
page read and write
|
||
44F1000
|
heap
|
page read and write
|
||
27CE000
|
stack
|
page read and write
|
||
5A3A000
|
trusted library allocation
|
page read and write
|
||
5998000
|
trusted library allocation
|
page read and write
|
||
55D4000
|
trusted library allocation
|
page read and write
|
||
55BB000
|
trusted library allocation
|
page read and write
|
||
5990000
|
trusted library allocation
|
page read and write
|
||
44F1000
|
heap
|
page read and write
|
||
5614000
|
trusted library allocation
|
page read and write
|
||
DA9000
|
heap
|
page read and write
|
||
4D7E000
|
stack
|
page read and write
|
||
5AD9000
|
trusted library allocation
|
page read and write
|
||
5E0000
|
heap
|
page read and write
|
||
D8B000
|
heap
|
page read and write
|
||
5601000
|
trusted library allocation
|
page read and write
|
||
55BE000
|
trusted library allocation
|
page read and write
|
||
5999000
|
trusted library allocation
|
page read and write
|
||
55BB000
|
trusted library allocation
|
page read and write
|
||
326E000
|
stack
|
page read and write
|
||
55D6000
|
trusted library allocation
|
page read and write
|
||
559B000
|
trusted library allocation
|
page read and write
|
||
599C000
|
trusted library allocation
|
page read and write
|
||
2A2F000
|
stack
|
page read and write
|
||
5B5E000
|
trusted library allocation
|
page read and write
|
||
5995000
|
trusted library allocation
|
page read and write
|
||
55A7000
|
trusted library allocation
|
page read and write
|
||
D88000
|
heap
|
page read and write
|
||
55E7000
|
trusted library allocation
|
page read and write
|
||
C8B000
|
stack
|
page read and write
|
||
312E000
|
stack
|
page read and write
|
||
5AD6000
|
trusted library allocation
|
page read and write
|
||
7EA0000
|
direct allocation
|
page read and write
|
||
51CE000
|
stack
|
page read and write
|
||
55F3000
|
trusted library allocation
|
page read and write
|
||
760000
|
unkown
|
page readonly
|
||
7EA0000
|
direct allocation
|
page read and write
|
||
55D4000
|
trusted library allocation
|
page read and write
|
||
55A5000
|
trusted library allocation
|
page read and write
|
||
DA3000
|
heap
|
page read and write
|
||
558E000
|
trusted library allocation
|
page read and write
|
||
5999000
|
trusted library allocation
|
page read and write
|
||
55BB000
|
trusted library allocation
|
page read and write
|
||
5584000
|
trusted library allocation
|
page read and write
|
||
55D4000
|
trusted library allocation
|
page read and write
|
||
599C000
|
trusted library allocation
|
page read and write
|
||
55D4000
|
trusted library allocation
|
page read and write
|
||
5A7C000
|
trusted library allocation
|
page read and write
|
||
34EE000
|
stack
|
page read and write
|
||
5AEF000
|
trusted library allocation
|
page read and write
|
||
55D4000
|
trusted library allocation
|
page read and write
|
||
D86000
|
heap
|
page read and write
|
||
5998000
|
trusted library allocation
|
page read and write
|
||
55F4000
|
trusted library allocation
|
page read and write
|
||
599E000
|
trusted library allocation
|
page read and write
|
||
5995000
|
trusted library allocation
|
page read and write
|
||
7EA0000
|
direct allocation
|
page read and write
|
||
55D4000
|
trusted library allocation
|
page read and write
|
||
D78000
|
heap
|
page read and write
|
||
5583000
|
trusted library allocation
|
page read and write
|
||
3B2D000
|
stack
|
page read and write
|
||
55CB000
|
trusted library allocation
|
page read and write
|
||
5ADB000
|
trusted library allocation
|
page read and write
|
||
5997000
|
trusted library allocation
|
page read and write
|
||
558E000
|
trusted library allocation
|
page read and write
|
||
D7B000
|
heap
|
page read and write
|
||
55CC000
|
trusted library allocation
|
page read and write
|
||
2EAE000
|
stack
|
page read and write
|
||
DA4000
|
heap
|
page read and write
|
||
CBE000
|
heap
|
page read and write
|
||
5AC2000
|
trusted library allocation
|
page read and write
|
||
D89000
|
heap
|
page read and write
|
||
5AE6000
|
trusted library allocation
|
page read and write
|
||
7EA0000
|
direct allocation
|
page read and write
|
||
55D4000
|
trusted library allocation
|
page read and write
|
||
7F10000
|
direct allocation
|
page read and write
|
||
5BFF000
|
trusted library allocation
|
page read and write
|
||
5A34000
|
trusted library allocation
|
page read and write
|
||
55CD000
|
trusted library allocation
|
page read and write
|
||
599A000
|
trusted library allocation
|
page read and write
|
||
55B3000
|
trusted library allocation
|
page read and write
|
||
5A82000
|
trusted library allocation
|
page read and write
|
||
750000
|
direct allocation
|
page read and write
|
||
DA0000
|
heap
|
page read and write
|
||
D99000
|
heap
|
page read and write
|
||
4B10000
|
direct allocation
|
page execute and read and write
|
||
599C000
|
trusted library allocation
|
page read and write
|
||
55B4000
|
trusted library allocation
|
page read and write
|
||
5A96000
|
trusted library allocation
|
page read and write
|
||
5790000
|
trusted library allocation
|
page read and write
|
||
5991000
|
trusted library allocation
|
page read and write
|
||
55BB000
|
trusted library allocation
|
page read and write
|
||
558F000
|
trusted library allocation
|
page read and write
|
||
DA0000
|
heap
|
page read and write
|
||
5C27000
|
trusted library allocation
|
page read and write
|
||
55BB000
|
trusted library allocation
|
page read and write
|
||
5A8D000
|
trusted library allocation
|
page read and write
|
||
43AF000
|
stack
|
page read and write
|
||
55D4000
|
trusted library allocation
|
page read and write
|
||
5583000
|
trusted library allocation
|
page read and write
|
||
5993000
|
trusted library allocation
|
page read and write
|
||
55A7000
|
trusted library allocation
|
page read and write
|
||
599D000
|
trusted library allocation
|
page read and write
|
||
3FEF000
|
stack
|
page read and write
|
||
5B15000
|
trusted library allocation
|
page read and write
|
||
5BAB000
|
trusted library allocation
|
page read and write
|
||
44F1000
|
heap
|
page read and write
|
||
57EF000
|
trusted library allocation
|
page read and write
|
||
44F1000
|
heap
|
page read and write
|
||
55EA000
|
trusted library allocation
|
page read and write
|
||
55B3000
|
trusted library allocation
|
page read and write
|
||
609B000
|
trusted library allocation
|
page read and write
|
||
5BEE000
|
trusted library allocation
|
page read and write
|
||
750000
|
direct allocation
|
page read and write
|
||
6FE000
|
stack
|
page read and write
|
||
D2F000
|
heap
|
page read and write
|
||
7EA0000
|
direct allocation
|
page read and write
|
||
564C000
|
trusted library allocation
|
page read and write
|
||
5AED000
|
trusted library allocation
|
page read and write
|
||
D9E000
|
heap
|
page read and write
|
||
D99000
|
heap
|
page read and write
|
||
3DAE000
|
stack
|
page read and write
|
||
7F10000
|
direct allocation
|
page read and write
|
||
5A42000
|
trusted library allocation
|
page read and write
|
||
55CA000
|
trusted library allocation
|
page read and write
|
||
2C2F000
|
stack
|
page read and write
|
||
599E000
|
trusted library allocation
|
page read and write
|
||
5757000
|
trusted library allocation
|
page read and write
|
||
55DC000
|
trusted library allocation
|
page read and write
|
||
5A44000
|
trusted library allocation
|
page read and write
|
||
52CF000
|
stack
|
page read and write
|
||
5A26000
|
trusted library allocation
|
page read and write
|
||
5997000
|
trusted library allocation
|
page read and write
|
||
55B3000
|
trusted library allocation
|
page read and write
|
||
C90000
|
heap
|
page read and write
|
||
5C25000
|
trusted library allocation
|
page read and write
|
||
55A7000
|
trusted library allocation
|
page read and write
|
||
5581000
|
trusted library allocation
|
page read and write
|
||
5A98000
|
trusted library allocation
|
page read and write
|
||
5593000
|
trusted library allocation
|
page read and write
|
||
562B000
|
trusted library allocation
|
page read and write
|
||
5AED000
|
trusted library allocation
|
page read and write
|
||
55CB000
|
trusted library allocation
|
page read and write
|
||
4970000
|
direct allocation
|
page read and write
|
||
5593000
|
trusted library allocation
|
page read and write
|
||
5BBE000
|
trusted library allocation
|
page read and write
|
||
5AA3000
|
trusted library allocation
|
page read and write
|
||
55AB000
|
trusted library allocation
|
page read and write
|
||
55C3000
|
trusted library allocation
|
page read and write
|
||
2B2F000
|
stack
|
page read and write
|
||
44F1000
|
heap
|
page read and write
|
||
750000
|
direct allocation
|
page read and write
|
||
55C4000
|
trusted library allocation
|
page read and write
|
||
55D4000
|
trusted library allocation
|
page read and write
|
||
5594000
|
trusted library allocation
|
page read and write
|
||
35EF000
|
stack
|
page read and write
|
||
3AEF000
|
stack
|
page read and write
|
||
7EA0000
|
direct allocation
|
page read and write
|
||
44F1000
|
heap
|
page read and write
|
||
D8B000
|
heap
|
page read and write
|
||
55BE000
|
trusted library allocation
|
page read and write
|
||
416E000
|
stack
|
page read and write
|
||
55B3000
|
trusted library allocation
|
page read and write
|
||
55B4000
|
trusted library allocation
|
page read and write
|
||
292F000
|
stack
|
page read and write
|
||
5B9F000
|
trusted library allocation
|
page read and write
|
||
5AC9000
|
trusted library allocation
|
page read and write
|
||
4B00000
|
direct allocation
|
page execute and read and write
|
||
43EE000
|
stack
|
page read and write
|
||
5ABF000
|
trusted library allocation
|
page read and write
|
||
750000
|
direct allocation
|
page read and write
|
||
5AA5000
|
trusted library allocation
|
page read and write
|
||
D7F000
|
heap
|
page read and write
|
||
59A0000
|
trusted library allocation
|
page read and write
|
||
55E3000
|
trusted library allocation
|
page read and write
|
||
5991000
|
trusted library allocation
|
page read and write
|
||
55B4000
|
trusted library allocation
|
page read and write
|
||
568B000
|
trusted library allocation
|
page read and write
|
||
599E000
|
trusted library allocation
|
page read and write
|
||
362E000
|
stack
|
page read and write
|
||
55B3000
|
trusted library allocation
|
page read and write
|
||
D8B000
|
heap
|
page read and write
|
||
CB0000
|
heap
|
page read and write
|
||
55C3000
|
trusted library allocation
|
page read and write
|
||
D8B000
|
heap
|
page read and write
|
||
44F1000
|
heap
|
page read and write
|
||
5A8D000
|
trusted library allocation
|
page read and write
|
||
D93000
|
heap
|
page read and write
|
||
2D2F000
|
stack
|
page read and write
|
||
55A7000
|
trusted library allocation
|
page read and write
|
||
6083000
|
trusted library allocation
|
page read and write
|
||
5AE4000
|
trusted library allocation
|
page read and write
|
||
5A93000
|
trusted library allocation
|
page read and write
|
||
55E7000
|
trusted library allocation
|
page read and write
|
||
55C4000
|
trusted library allocation
|
page read and write
|
||
5AD1000
|
trusted library allocation
|
page read and write
|
||
5ACE000
|
trusted library allocation
|
page read and write
|
||
55B3000
|
trusted library allocation
|
page read and write
|
||
5A8E000
|
trusted library allocation
|
page read and write
|
||
5995000
|
trusted library allocation
|
page read and write
|
||
5997000
|
trusted library allocation
|
page read and write
|
||
55E1000
|
trusted library allocation
|
page read and write
|
||
5589000
|
trusted library allocation
|
page read and write
|
||
D98000
|
heap
|
page read and write
|
||
5AA6000
|
trusted library allocation
|
page read and write
|
||
558C000
|
trusted library allocation
|
page read and write
|
||
55C3000
|
trusted library allocation
|
page read and write
|
||
574F000
|
trusted library allocation
|
page read and write
|
||
7EA0000
|
direct allocation
|
page read and write
|
||
559E000
|
trusted library allocation
|
page read and write
|
||
44F1000
|
heap
|
page read and write
|
||
55B6000
|
trusted library allocation
|
page read and write
|
||
55E3000
|
trusted library allocation
|
page read and write
|
||
D8B000
|
heap
|
page read and write
|
||
55A2000
|
trusted library allocation
|
page read and write
|
||
55D4000
|
trusted library allocation
|
page read and write
|
||
5AB5000
|
trusted library allocation
|
page read and write
|
||
5A38000
|
trusted library allocation
|
page read and write
|
||
5589000
|
trusted library allocation
|
page read and write
|
||
55A2000
|
trusted library allocation
|
page read and write
|
||
D9E000
|
heap
|
page read and write
|
||
44F1000
|
heap
|
page read and write
|
||
5A28000
|
trusted library allocation
|
page read and write
|
||
5AFF000
|
trusted library allocation
|
page read and write
|
||
D93000
|
heap
|
page read and write
|
||
5996000
|
trusted library allocation
|
page read and write
|
||
558A000
|
trusted library allocation
|
page read and write
|
||
5590000
|
trusted library allocation
|
page read and write
|
||
94D000
|
unkown
|
page execute and read and write
|
||
55D4000
|
trusted library allocation
|
page read and write
|
||
55E8000
|
trusted library allocation
|
page read and write
|
||
5A7A000
|
trusted library allocation
|
page read and write
|
||
55D4000
|
trusted library allocation
|
page read and write
|
||
5589000
|
trusted library allocation
|
page read and write
|
||
5B27000
|
trusted library allocation
|
page read and write
|
||
5994000
|
trusted library allocation
|
page read and write
|
||
55A5000
|
trusted library allocation
|
page read and write
|
||
4B00000
|
direct allocation
|
page execute and read and write
|
||
55D9000
|
trusted library allocation
|
page read and write
|
||
750000
|
direct allocation
|
page read and write
|
||
55B5000
|
trusted library allocation
|
page read and write
|
||
A29000
|
unkown
|
page execute and read and write
|
||
55D4000
|
trusted library allocation
|
page read and write
|
||
55A3000
|
trusted library allocation
|
page read and write
|
||
55A0000
|
trusted library allocation
|
page read and write
|
||
5A78000
|
trusted library allocation
|
page read and write
|
||
5EFB000
|
trusted library allocation
|
page read and write
|
||
5584000
|
trusted library allocation
|
page read and write
|
||
5A71000
|
trusted library allocation
|
page read and write
|
||
55D4000
|
trusted library allocation
|
page read and write
|
||
8090000
|
direct allocation
|
page execute and read and write
|
||
55B4000
|
trusted library allocation
|
page read and write
|
||
5ADD000
|
trusted library allocation
|
page read and write
|
||
55A2000
|
trusted library allocation
|
page read and write
|
||
4C3D000
|
stack
|
page read and write
|
||
278E000
|
stack
|
page read and write
|
||
55BB000
|
trusted library allocation
|
page read and write
|
||
49BC000
|
stack
|
page read and write
|
||
55AB000
|
trusted library allocation
|
page read and write
|
||
55D4000
|
trusted library allocation
|
page read and write
|
||
5580000
|
trusted library allocation
|
page read and write
|
||
5C1B000
|
trusted library allocation
|
page read and write
|
||
750000
|
direct allocation
|
page read and write
|
||
D8B000
|
heap
|
page read and write
|
||
D7B000
|
heap
|
page read and write
|
||
DA0000
|
heap
|
page read and write
|
||
CE7000
|
heap
|
page read and write
|
||
5A5D000
|
trusted library allocation
|
page read and write
|
||
5727000
|
trusted library allocation
|
page read and write
|
||
44F1000
|
heap
|
page read and write
|
||
5A6B000
|
trusted library allocation
|
page read and write
|
||
39AF000
|
stack
|
page read and write
|
||
55C4000
|
trusted library allocation
|
page read and write
|
||
55AE000
|
trusted library allocation
|
page read and write
|
||
5AEF000
|
trusted library allocation
|
page read and write
|
||
A68000
|
unkown
|
page execute and read and write
|
||
5602000
|
trusted library allocation
|
page read and write
|
||
5A5A000
|
trusted library allocation
|
page read and write
|
||
5A7C000
|
trusted library allocation
|
page read and write
|
||
D8B000
|
heap
|
page read and write
|
||
D9B000
|
heap
|
page read and write
|
||
D01000
|
heap
|
page read and write
|
||
55E5000
|
trusted library allocation
|
page read and write
|
||
386F000
|
stack
|
page read and write
|
||
5997000
|
trusted library allocation
|
page read and write
|
||
55C0000
|
trusted library allocation
|
page read and write
|
||
5A56000
|
trusted library allocation
|
page read and write
|
||
D8B000
|
heap
|
page read and write
|
||
D7B000
|
heap
|
page read and write
|
||
55D4000
|
trusted library allocation
|
page read and write
|
||
DA9000
|
heap
|
page read and write
|
||
8060000
|
direct allocation
|
page execute and read and write
|
||
5A8B000
|
trusted library allocation
|
page read and write
|
||
280E000
|
stack
|
page read and write
|
||
4B20000
|
direct allocation
|
page execute and read and write
|
||
5583000
|
trusted library allocation
|
page read and write
|
||
5996000
|
trusted library allocation
|
page read and write
|
||
599B000
|
trusted library allocation
|
page read and write
|
||
5992000
|
trusted library allocation
|
page read and write
|
||
55B3000
|
trusted library allocation
|
page read and write
|
||
5996000
|
trusted library allocation
|
page read and write
|
||
55A3000
|
trusted library allocation
|
page read and write
|
||
55B5000
|
trusted library allocation
|
page read and write
|
||
5A7A000
|
trusted library allocation
|
page read and write
|
||
55A0000
|
trusted library allocation
|
page read and write
|
||
2FAF000
|
stack
|
page read and write
|
||
55C0000
|
trusted library allocation
|
page read and write
|
||
53A000
|
stack
|
page read and write
|
||
761000
|
unkown
|
page execute and write copy
|
||
558A000
|
trusted library allocation
|
page read and write
|
||
55D4000
|
trusted library allocation
|
page read and write
|
||
599D000
|
trusted library allocation
|
page read and write
|
||
5BAD000
|
trusted library allocation
|
page read and write
|
||
55B5000
|
trusted library allocation
|
page read and write
|
||
55CB000
|
trusted library allocation
|
page read and write
|
||
D8B000
|
heap
|
page read and write
|
||
55D4000
|
trusted library allocation
|
page read and write
|
||
55D3000
|
trusted library allocation
|
page read and write
|
||
514F000
|
stack
|
page read and write
|
||
750000
|
direct allocation
|
page read and write
|
||
376E000
|
stack
|
page read and write
|
||
D8B000
|
heap
|
page read and write
|
||
559A000
|
trusted library allocation
|
page read and write
|
||
5995000
|
trusted library allocation
|
page read and write
|
||
44F1000
|
heap
|
page read and write
|
||
55D4000
|
trusted library allocation
|
page read and write
|
||
33AE000
|
stack
|
page read and write
|
||
55D4000
|
trusted library allocation
|
page read and write
|
||
5B81000
|
trusted library allocation
|
page read and write
|
||
5997000
|
trusted library allocation
|
page read and write
|
||
4E7F000
|
stack
|
page read and write
|
||
558F000
|
trusted library allocation
|
page read and write
|
||
5DEE000
|
stack
|
page read and write
|
||
740000
|
heap
|
page read and write
|
||
55E3000
|
trusted library allocation
|
page read and write
|
||
55A7000
|
trusted library allocation
|
page read and write
|
||
73E000
|
stack
|
page read and write
|
||
5635000
|
trusted library allocation
|
page read and write
|
||
5608000
|
trusted library allocation
|
page read and write
|
||
558A000
|
trusted library allocation
|
page read and write
|
||
5A4D000
|
trusted library allocation
|
page read and write
|
||
5EF9000
|
trusted library allocation
|
page read and write
|
||
55A0000
|
trusted library allocation
|
page read and write
|
||
496D000
|
stack
|
page read and write
|
||
55A5000
|
trusted library allocation
|
page read and write
|
||
5A42000
|
trusted library allocation
|
page read and write
|
||
55DC000
|
trusted library allocation
|
page read and write
|
||
D89000
|
heap
|
page read and write
|
||
D8B000
|
heap
|
page read and write
|
||
5A4F000
|
trusted library allocation
|
page read and write
|
||
564A000
|
trusted library allocation
|
page read and write
|
||
4AD0000
|
direct allocation
|
page execute and read and write
|
||
55D4000
|
trusted library allocation
|
page read and write
|
||
D8B000
|
heap
|
page read and write
|
||
5995000
|
trusted library allocation
|
page read and write
|
||
D93000
|
heap
|
page read and write
|
||
7EA0000
|
direct allocation
|
page read and write
|
||
5D7C000
|
trusted library allocation
|
page execute and read and write
|
||
D7F000
|
heap
|
page read and write
|
||
55CB000
|
trusted library allocation
|
page read and write
|
||
559A000
|
trusted library allocation
|
page read and write
|
||
55DB000
|
trusted library allocation
|
page read and write
|
||
7EA0000
|
direct allocation
|
page read and write
|
||
4B00000
|
direct allocation
|
page execute and read and write
|
||
A68000
|
unkown
|
page execute and write copy
|
||
5608000
|
trusted library allocation
|
page read and write
|
||
5621000
|
trusted library allocation
|
page read and write
|
||
4FE0000
|
remote allocation
|
page read and write
|
||
D8B000
|
heap
|
page read and write
|
||
55A3000
|
trusted library allocation
|
page read and write
|
||
D8B000
|
heap
|
page read and write
|
||
5D7E000
|
trusted library allocation
|
page execute and read and write
|
||
55AA000
|
trusted library allocation
|
page read and write
|
||
44F1000
|
heap
|
page read and write
|
||
5AA1000
|
trusted library allocation
|
page read and write
|
||
55D4000
|
trusted library allocation
|
page read and write
|
||
55B3000
|
trusted library allocation
|
page read and write
|
||
5ABB000
|
trusted library allocation
|
page read and write
|
||
55E8000
|
trusted library allocation
|
page read and write
|
||
55D4000
|
trusted library allocation
|
page read and write
|
||
55B2000
|
trusted library allocation
|
page read and write
|
||
55B4000
|
trusted library allocation
|
page read and write
|
||
30EF000
|
stack
|
page read and write
|
||
55B4000
|
trusted library allocation
|
page read and write
|
||
5998000
|
trusted library allocation
|
page read and write
|
||
5A33000
|
trusted library allocation
|
page read and write
|
||
44F1000
|
heap
|
page read and write
|
||
55B4000
|
trusted library allocation
|
page read and write
|
||
D8B000
|
heap
|
page read and write
|
||
D8B000
|
heap
|
page read and write
|
||
55A5000
|
trusted library allocation
|
page read and write
|
||
55A3000
|
trusted library allocation
|
page read and write
|
||
55D4000
|
trusted library allocation
|
page read and write
|
||
D8B000
|
heap
|
page read and write
|
||
55B2000
|
trusted library allocation
|
page read and write
|
||
D8B000
|
heap
|
page read and write
|
||
5AFA000
|
trusted library allocation
|
page read and write
|
||
D8B000
|
heap
|
page read and write
|
||
5183000
|
heap
|
page read and write
|
||
D8B000
|
heap
|
page read and write
|
||
5990000
|
trusted library allocation
|
page read and write
|
||
55CF000
|
trusted library allocation
|
page read and write
|
||
56D7000
|
trusted library allocation
|
page read and write
|
||
55AB000
|
trusted library allocation
|
page read and write
|
||
5686000
|
trusted library allocation
|
page read and write
|
||
559B000
|
trusted library allocation
|
page read and write
|
||
A59000
|
unkown
|
page execute and read and write
|
||
D8A000
|
heap
|
page read and write
|
||
5A38000
|
trusted library allocation
|
page read and write
|
||
4B43000
|
trusted library allocation
|
page read and write
|
||
D8B000
|
heap
|
page read and write
|
||
55BB000
|
trusted library allocation
|
page read and write
|
||
55E2000
|
trusted library allocation
|
page read and write
|
||
55A0000
|
trusted library allocation
|
page read and write
|
||
CBA000
|
heap
|
page read and write
|
||
575F000
|
trusted library allocation
|
page read and write
|
||
5AD0000
|
trusted library allocation
|
page read and write
|
||
5AAB000
|
trusted library allocation
|
page read and write
|
||
5997000
|
trusted library allocation
|
page read and write
|
||
599A000
|
trusted library allocation
|
page read and write
|
||
5AAD000
|
trusted library allocation
|
page read and write
|
||
5A69000
|
trusted library allocation
|
page read and write
|
||
5C01000
|
trusted library allocation
|
page read and write
|
||
5990000
|
trusted library allocation
|
page read and write
|
||
55B4000
|
trusted library allocation
|
page read and write
|
||
5620000
|
trusted library allocation
|
page read and write
|
||
55A2000
|
trusted library allocation
|
page read and write
|
||
55EC000
|
trusted library allocation
|
page read and write
|
||
55B3000
|
trusted library allocation
|
page read and write
|
||
55A7000
|
trusted library allocation
|
page read and write
|
||
599A000
|
trusted library allocation
|
page read and write
|
||
5ADA000
|
trusted library allocation
|
page execute and read and write
|
||
5B01000
|
trusted library allocation
|
page read and write
|
||
D8B000
|
heap
|
page read and write
|
||
55B4000
|
trusted library allocation
|
page read and write
|
||
55FD000
|
trusted library allocation
|
page read and write
|
||
D23000
|
heap
|
page read and write
|
||
55C4000
|
trusted library allocation
|
page read and write
|
||
D89000
|
heap
|
page read and write
|
||
5C02000
|
trusted library allocation
|
page read and write
|
||
5180000
|
heap
|
page read and write
|
||
55B4000
|
trusted library allocation
|
page read and write
|
||
5A40000
|
trusted library allocation
|
page read and write
|
||
D98000
|
heap
|
page read and write
|
||
55EB000
|
trusted library allocation
|
page read and write
|
||
55B2000
|
trusted library allocation
|
page read and write
|
||
55B7000
|
trusted library allocation
|
page read and write
|
||
5AC9000
|
stack
|
page read and write
|
||
D31000
|
heap
|
page read and write
|
||
5998000
|
trusted library allocation
|
page read and write
|
||
750000
|
direct allocation
|
page read and write
|
||
D8B000
|
heap
|
page read and write
|
||
4FBF000
|
stack
|
page read and write
|
||
D99000
|
heap
|
page read and write
|
||
5997000
|
trusted library allocation
|
page read and write
|
||
49B4000
|
direct allocation
|
page read and write
|
||
5B8E000
|
trusted library allocation
|
page read and write
|
||
4B00000
|
direct allocation
|
page execute and read and write
|
||
55A0000
|
trusted library allocation
|
page read and write
|
||
5596000
|
trusted library allocation
|
page read and write
|
||
599E000
|
trusted library allocation
|
page read and write
|
||
412F000
|
stack
|
page read and write
|
||
55B6000
|
trusted library allocation
|
page read and write
|
||
D74000
|
heap
|
page read and write
|
||
55A2000
|
trusted library allocation
|
page read and write
|
||
FAE000
|
stack
|
page read and write
|
||
55A2000
|
trusted library allocation
|
page read and write
|
||
547D000
|
stack
|
page read and write
|
||
4500000
|
heap
|
page read and write
|
||
2FEE000
|
stack
|
page read and write
|
||
580000
|
heap
|
page read and write
|
||
5791000
|
trusted library allocation
|
page read and write
|
||
5A57000
|
trusted library allocation
|
page read and write
|
||
599C000
|
trusted library allocation
|
page read and write
|
||
7EA0000
|
direct allocation
|
page read and write
|
||
55B3000
|
trusted library allocation
|
page read and write
|
||
5A80000
|
trusted library allocation
|
page read and write
|
||
5EEF000
|
stack
|
page read and write
|
||
5ACB000
|
trusted library allocation
|
page read and write
|
||
402E000
|
stack
|
page read and write
|
||
55A5000
|
trusted library allocation
|
page read and write
|
||
559B000
|
trusted library allocation
|
page read and write
|
||
750000
|
direct allocation
|
page read and write
|
||
55B4000
|
trusted library allocation
|
page read and write
|
||
5999000
|
trusted library allocation
|
page read and write
|
||
C4E000
|
stack
|
page read and write
|
||
55B4000
|
trusted library allocation
|
page read and write
|
||
7A5000
|
unkown
|
page execute and read and write
|
||
5596000
|
trusted library allocation
|
page read and write
|
||
5A9F000
|
trusted library allocation
|
page read and write
|
||
559A000
|
trusted library allocation
|
page read and write
|
||
5993000
|
trusted library allocation
|
page read and write
|
||
5680000
|
trusted library allocation
|
page read and write
|
||
D8B000
|
heap
|
page read and write
|
||
55A2000
|
trusted library allocation
|
page read and write
|
||
558D000
|
trusted library allocation
|
page read and write
|
||
DA0000
|
heap
|
page read and write
|
||
760000
|
unkown
|
page read and write
|
||
7B7000
|
unkown
|
page write copy
|
||
5996000
|
trusted library allocation
|
page read and write
|
||
55D4000
|
trusted library allocation
|
page read and write
|
||
426F000
|
stack
|
page read and write
|
||
D8B000
|
heap
|
page read and write
|
||
5A91000
|
trusted library allocation
|
page read and write
|
||
5A6F000
|
trusted library allocation
|
page read and write
|
||
599A000
|
trusted library allocation
|
page read and write
|
||
55F2000
|
trusted library allocation
|
page read and write
|
||
5599000
|
trusted library allocation
|
page read and write
|
||
5998000
|
trusted library allocation
|
page read and write
|
||
55C4000
|
trusted library allocation
|
page read and write
|
||
5A36000
|
trusted library allocation
|
page read and write
|
||
D8B000
|
heap
|
page read and write
|
||
5ACB000
|
trusted library allocation
|
page read and write
|
||
5A22000
|
trusted library allocation
|
page read and write
|
||
55A3000
|
trusted library allocation
|
page read and write
|
||
D8B000
|
heap
|
page read and write
|
||
2827000
|
heap
|
page read and write
|
||
55B5000
|
trusted library allocation
|
page read and write
|
||
5998000
|
trusted library allocation
|
page read and write
|
||
55A3000
|
trusted library allocation
|
page read and write
|
||
5AD0000
|
trusted library allocation
|
page read and write
|
||
599C000
|
trusted library allocation
|
page read and write
|
||
5AF8000
|
trusted library allocation
|
page read and write
|
||
7B7000
|
unkown
|
page read and write
|
||
55B4000
|
trusted library allocation
|
page read and write
|
||
5999000
|
trusted library allocation
|
page read and write
|
||
55E8000
|
trusted library allocation
|
page read and write
|
||
5994000
|
trusted library allocation
|
page read and write
|
||
558A000
|
trusted library allocation
|
page read and write
|
||
5991000
|
trusted library allocation
|
page read and write
|
||
A69000
|
unkown
|
page execute and write copy
|
||
D9F000
|
heap
|
page read and write
|
||
55A9000
|
trusted library allocation
|
page read and write
|
||
55E9000
|
trusted library allocation
|
page read and write
|
||
4EBE000
|
stack
|
page read and write
|
||
D8B000
|
heap
|
page read and write
|
||
D8B000
|
heap
|
page read and write
|
||
5B60000
|
trusted library allocation
|
page read and write
|
||
559B000
|
trusted library allocation
|
page read and write
|
||
55D4000
|
trusted library allocation
|
page read and write
|
||
DA9000
|
heap
|
page read and write
|
||
3C2F000
|
stack
|
page read and write
|
||
55AB000
|
trusted library allocation
|
page read and write
|
||
4B30000
|
direct allocation
|
page execute and read and write
|
||
4FE0000
|
remote allocation
|
page read and write
|
||
5583000
|
trusted library allocation
|
page read and write
|
||
5992000
|
trusted library allocation
|
page read and write
|
||
5A54000
|
trusted library allocation
|
page read and write
|
||
55B4000
|
trusted library allocation
|
page read and write
|
||
5635000
|
trusted library allocation
|
page read and write
|
||
D8B000
|
heap
|
page read and write
|
||
D8A000
|
heap
|
page read and write
|
There are 809 hidden memdumps, click here to show them.
DOM / HTML
URL
|
Malicious
|
|
---|---|---|
https://learn.microsoft.com/en-us/dotnet/framework/install/application-not-started?version=(null)&processName=file.exe&platform=0009&osver=6&isServer=0&shimver=4.0.30319.0
|
||
https://learn.microsoft.com/en-us/dotnet/framework/install/application-not-started?version=(null)&processName=file.exe&platform=0009&osver=6&isServer=0&shimver=4.0.30319.0
|
||
https://learn.microsoft.com/en-us/dotnet/framework/install/application-not-started?version=(null)&processName=file.exe&platform=0009&osver=6&isServer=0&shimver=4.0.30319.0
|
||
https://learn.microsoft.com/en-us/dotnet/framework/install/application-not-started?version=(null)&processName=file.exe&platform=0009&osver=6&isServer=0&shimver=4.0.30319.0
|