Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
file.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
initial sample
|
||
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Docs.lnk
|
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command
line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Wed Nov 27 14:32:12 2024, atime=Mon Oct 2 20:46:57
2023, length=1210144, window=hide
|
dropped
|
||
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Gmail.lnk
|
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command
line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Wed Nov 27 14:32:12 2024, atime=Mon Oct 2 20:46:57
2023, length=1210144, window=hide
|
dropped
|
||
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Google Drive.lnk
|
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command
line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Thu Oct 5 08:59:33 2023, atime=Mon Oct 2 20:46:57
2023, length=1210144, window=hide
|
dropped
|
||
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Sheets.lnk
|
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command
line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Wed Nov 27 14:32:12 2024, atime=Mon Oct 2 20:46:57
2023, length=1210144, window=hide
|
dropped
|
||
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Slides.lnk
|
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command
line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Wed Nov 27 14:32:12 2024, atime=Mon Oct 2 20:46:57
2023, length=1210144, window=hide
|
dropped
|
||
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\YouTube.lnk
|
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command
line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Wed Nov 27 14:32:12 2024, atime=Mon Oct 2 20:46:57
2023, length=1210144, window=hide
|
dropped
|
||
Chrome Cache Entry: 100
|
exported SGML document, ASCII text, with very long lines (65536), with no line terminators
|
downloaded
|
||
Chrome Cache Entry: 101
|
PNG image data, 533 x 478, 8-bit/color RGBA, non-interlaced
|
downloaded
|
||
Chrome Cache Entry: 102
|
MS Windows icon resource - 6 icons, -128x-128, 16 colors, 72x72, 16 colors
|
downloaded
|
||
Chrome Cache Entry: 103
|
ASCII text, with very long lines (46884)
|
downloaded
|
||
Chrome Cache Entry: 104
|
JSON data
|
dropped
|
||
Chrome Cache Entry: 105
|
MS Windows icon resource - 6 icons, -128x-128, 16 colors, 72x72, 16 colors
|
dropped
|
||
Chrome Cache Entry: 106
|
PNG image data, 658 x 480, 8-bit/color RGBA, non-interlaced
|
downloaded
|
||
Chrome Cache Entry: 107
|
ASCII text, with very long lines (33148), with no line terminators
|
dropped
|
||
Chrome Cache Entry: 108
|
JSON data
|
downloaded
|
||
Chrome Cache Entry: 109
|
JPEG image data, JFIF standard 1.01, aspect ratio, density 1x1, segment length 16, baseline, precision 8, 1528x402, components
3
|
dropped
|
||
Chrome Cache Entry: 110
|
PNG image data, 475 x 212, 8-bit/color RGBA, non-interlaced
|
downloaded
|
||
Chrome Cache Entry: 111
|
JSON data
|
downloaded
|
||
Chrome Cache Entry: 112
|
JSON data
|
dropped
|
||
Chrome Cache Entry: 113
|
JPEG image data, JFIF standard 1.01, aspect ratio, density 1x1, segment length 16, baseline, precision 8, 1528x402, components
3
|
downloaded
|
||
Chrome Cache Entry: 114
|
exported SGML document, ASCII text, with very long lines (65536), with no line terminators
|
dropped
|
||
Chrome Cache Entry: 115
|
ASCII text, with very long lines (46884)
|
dropped
|
||
Chrome Cache Entry: 116
|
ASCII text
|
dropped
|
||
Chrome Cache Entry: 117
|
SVG Scalable Vector Graphics image
|
downloaded
|
||
Chrome Cache Entry: 118
|
Web Open Font Format (Version 2), TrueType, length 19696, version 1.0
|
downloaded
|
||
Chrome Cache Entry: 119
|
ASCII text, with very long lines (33148), with no line terminators
|
downloaded
|
||
Chrome Cache Entry: 120
|
PNG image data, 475 x 212, 8-bit/color RGBA, non-interlaced
|
dropped
|
||
Chrome Cache Entry: 121
|
PNG image data, 658 x 480, 8-bit/color RGBA, non-interlaced
|
dropped
|
||
Chrome Cache Entry: 122
|
JSON data
|
dropped
|
||
Chrome Cache Entry: 123
|
HTML document, ASCII text, with very long lines (639), with CRLF, LF line terminators
|
downloaded
|
||
Chrome Cache Entry: 124
|
JSON data
|
downloaded
|
||
Chrome Cache Entry: 125
|
PNG image data, 533 x 478, 8-bit/color RGBA, non-interlaced
|
dropped
|
||
Chrome Cache Entry: 84
|
PNG image data, 533 x 478, 8-bit/color RGBA, non-interlaced
|
dropped
|
||
Chrome Cache Entry: 85
|
PNG image data, 533 x 478, 8-bit/color RGBA, non-interlaced
|
downloaded
|
||
Chrome Cache Entry: 86
|
SVG Scalable Vector Graphics image
|
dropped
|
||
Chrome Cache Entry: 87
|
ASCII text, with no line terminators
|
downloaded
|
||
Chrome Cache Entry: 88
|
JSON data
|
dropped
|
||
Chrome Cache Entry: 89
|
PNG image data, 533 x 478, 8-bit/color RGBA, non-interlaced
|
dropped
|
||
Chrome Cache Entry: 90
|
ASCII text, with very long lines (65536), with no line terminators
|
downloaded
|
||
Chrome Cache Entry: 91
|
ASCII text, with very long lines (65410)
|
dropped
|
||
Chrome Cache Entry: 92
|
JSON data
|
dropped
|
||
Chrome Cache Entry: 93
|
ASCII text, with very long lines (65410)
|
downloaded
|
||
Chrome Cache Entry: 94
|
JSON data
|
downloaded
|
||
Chrome Cache Entry: 95
|
JSON data
|
dropped
|
||
Chrome Cache Entry: 96
|
PNG image data, 533 x 478, 8-bit/color RGBA, non-interlaced
|
downloaded
|
||
Chrome Cache Entry: 97
|
ASCII text, with very long lines (52717), with no line terminators
|
dropped
|
||
Chrome Cache Entry: 98
|
ASCII text
|
downloaded
|
||
Chrome Cache Entry: 99
|
ASCII text, with very long lines (52717), with no line terminators
|
downloaded
|
There are 39 hidden files, click here to show them.
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\file.exe
|
"C:\Users\user\Desktop\file.exe"
|
||
C:\Program Files\Google\Chrome\Application\chrome.exe
|
"C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized --single-argument http://go.microsoft.com/fwlink/?prd=11324&pver=4.5&sbp=AppLaunch2&plcid=0x409&o1=SHIM_NOVERSION_FOUND&version=(null)&processName=file.exe&platform=0009&osver=6&isServer=0&shimver=4.0.30319.0
|
||
C:\Program Files\Google\Chrome\Application\chrome.exe
|
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US
--service-sandbox-type=none --mojo-platform-channel-handle=2136 --field-trial-handle=1900,i,6270560810318321206,4862603060177102708,262144
--disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction
/prefetch:8
|
||
C:\Program Files\Google\Chrome\Application\chrome.exe
|
"C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized --single-argument http://go.microsoft.com/fwlink/?prd=11324&pver=4.5&sbp=AppLaunch2&plcid=0x409&o1=SHIM_NOVERSION_FOUND&version=(null)&processName=file.exe&platform=0009&osver=6&isServer=0&shimver=4.0.30319.0
|
||
C:\Program Files\Google\Chrome\Application\chrome.exe
|
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US
--service-sandbox-type=none --mojo-platform-channel-handle=2020 --field-trial-handle=1988,i,9570468939057985229,18284962801725825015,262144
--disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction
/prefetch:8
|
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
https://community.fastly.steamstatic.com/public/shared/images/responsive/header_menu_hamburger.png
|
unknown
|
||
https://duckduckgo.com/chrome_newtab
|
unknown
|
||
https://duckduckgo.com/ac/?q=
|
unknown
|
||
https://community.fastly.steamstatic.com/public/css/promo/summer2017/stickers.css?v=Ncr6N09yZIap&
|
unknown
|
||
https://steamcommunity.com/?subsection=broadcasts
|
unknown
|
||
https://www.linkedin.com/cws/share?url=$
|
unknown
|
||
https://store.steampowered.com/subscriber_agreement/
|
unknown
|
||
https://github.com/Youssef1313
|
unknown
|
||
https://management.azure.com/providers/Microsoft.Portal/userSettings/cloudconsole?api-version=2023-0
|
unknown
|
||
https://aka.ms/msignite_docs_banner
|
unknown
|
||
https://videoencodingpublic-hgeaeyeba8gycee3.b01.azurefd.net/public-b4da8140-92cf-421c-8b7b-e471d5b9
|
unknown
|
||
http://polymer.github.io/AUTHORS.txt
|
unknown
|
||
https://contile-images.services.mozilla.com/5b4DH7KHAf2n_mNaLjNi1-UAoKmM9rhqaA9w7FyznHo.10943.jpg
|
unknown
|
||
https://github.com/dotnet/docs/issues/new?template=z-customer-feedback.yml
|
unknown
|
||
http://www.valvesoftware.com/legal.htm
|
unknown
|
||
https://community.fastly.steamstatic.com/public/shared/css/shared_global.css?v=wuA4X_n5-mo0&l=en
|
unknown
|
||
https://management.azure.com/subscriptions?api-version=2016-06-01
|
unknown
|
||
https://bridge.sfo1.admarketplace.net/ctp?version=16.0.0&ci=1696497267574.12791&key=1696497267400700
|
unknown
|
||
https://github.com/dotnet/docs/blob/main/docs/framework/install/application-not-started.md
|
unknown
|
||
https://aka.ms/pshelpmechoose
|
unknown
|
||
https://aka.ms/feedback/report?space=61
|
unknown
|
||
https://www.valvesoftware.com/en/contact?contact-person=Translation%20Team%20Feedback
|
unknown
|
||
https://community.fastly.steamstatic.com/public/javascript/applications/community/libraries~b28b7af6
|
unknown
|
||
https://learn-video.azurefd.net/vod/player
|
unknown
|
||
https://community.fastly.steamstatic.com/public/shared/css/motiva_sans.css?v=-yZgCk0Nu7kH&l=engl
|
unknown
|
||
https://twitter.com/intent/tweet?original_referer=$
|
unknown
|
||
https://community.fastly.steamstatic.com/public/css/skin_1/profilev2.css?v=fe66ET2uI50l&l=englis
|
unknown
|
||
https://community.fastly.steamstatic.com/public/javascript/scriptaculous/_combined.js?v=pbdAKOcDIgbC
|
unknown
|
||
https://marshal-zhukov.com/y
|
unknown
|
||
https://bridge.sfo1.ap01.net/ctp?version=16.0.0&ci=1696497267574.12791&key=1696497267400700002.1&cta
|
unknown
|
||
https://community.fastly.steamstatic.com/public/images/skin_1/footerLogo_valve.png?v=1
|
unknown
|
||
https://community.fastly.steamstatic.com/public/shared/css/buttons.css?v=qhQgyjWi6LgJ&l=english&
|
unknown
|
||
https://steamcommunity.com/profiles/76561199724331900
|
104.121.10.34
|
||
https://community.fastly.steamstatic.com/public/javascript/promo/stickers.js?v=CcLRHsa04otQ&l=en
|
unknown
|
||
https://management.azure.com/providers/Microsoft.Portal/consoles/default?api-version=2017-12-01-prev
|
unknown
|
||
https://github.com/Thraka
|
unknown
|
||
http://microsoft.co
|
unknown
|
||
http://store.steampowered.com/privacy_agreement/
|
unknown
|
||
https://community.fastly.steamstatic.com/public/javascript/applications/community/main.js?v=OgygW_VD
|
unknown
|
||
http://polymer.github.io/PATENTS.txt
|
unknown
|
||
https://store.steampowered.com/points/shop/
|
unknown
|
||
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
|
unknown
|
||
http://crl.rootca1.amazontrust.com/rootca1.crl0
|
unknown
|
||
https://js.monitor.azure.com/scripts/c/ms.jsll-4.min.js
|
13.107.246.63
|
||
http://ocsp.rootca1.amazontrust.com0:
|
unknown
|
||
https://schema.org
|
unknown
|
||
http://polymer.github.io/LICENSE.txt
|
unknown
|
||
https://community.fastly.steamstatic.com/public/javascript/modalv2.js?v=zBXEuexVQ0FZ&l=english&a
|
unknown
|
||
https://www.ecosia.org/newtab/
|
unknown
|
||
https://steamcommunity.com/profiles/76561199724331900/inventory/
|
unknown
|
||
https://support.mozilla.org/kb/customize-firefox-controls-buttons-and-toolbars?utm_source=firefox-br
|
unknown
|
||
https://store.steampowered.com/privacy_agreement/
|
unknown
|
||
https://community.fastly.steamstatic.com/public/css/skin_1/modalContent.css?v=WXAusLHclDIt&l=eng
|
unknown
|
||
https://github.com/adegeo
|
unknown
|
||
https://community.fastly.steamstatic.com/public/javascript/global.js?v=jWc2JLWHx5Kn&l=english&am
|
unknown
|
||
https://octokit.github.io/rest.js/#throttling
|
unknown
|
||
https://github.com/js-cookie/js-cookie
|
unknown
|
||
http://185.215.113.16/off/def.exe
|
unknown
|
||
http://schema.org/Organization
|
unknown
|
||
https://community.fastly.steamstatic.com/public/javascript/webui/clientcom.js?v=nT6RHKdfWgaJ&l=e
|
unknown
|
||
https://github.com/dotnet/try
|
unknown
|
||
https://store.steampowered.com/about/
|
unknown
|
||
https://authoring-docs-microsoft.poolparty.biz/devrel/7696cda6-0510-47f6-8302-71bb5d2e28cf
|
unknown
|
||
https://steamcommunity.com/my/wishlist/
|
unknown
|
||
https://community.fastly.steamstatic.com/public/css/applications/community/main.css?v=4Vb3xc8UazdB&a
|
unknown
|
||
https://community.fastly.steamstatic.com/public/shared/css/shared_responsive.css?v=JL1e4uQSrVGe&
|
unknown
|
||
https://marshal-zhukov.com/)
|
unknown
|
||
https://help.steampowered.com/en/
|
unknown
|
||
https://steamcommunity.com/market/
|
unknown
|
||
https://store.steampowered.com/news/
|
unknown
|
||
https://www.marriott.com/default.mi?utm_source=admarketplace&utm_medium=cpc&utm_campaign=Marriott_Pr
|
unknown
|
||
https://github.com/dotnet/docs/blob/17c4acca45e573a92878a44a2cce57d699fe9c7c/docs/framework/install/
|
unknown
|
||
https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
|
unknown
|
||
http://store.steampowered.com/subscriber_agreement/
|
unknown
|
||
https://steamcommunity.com/linkfilter/?u=http%3A%2F%2Fwww.geonames.org
|
unknown
|
||
https://steamcommunity.com/discussions/
|
unknown
|
||
https://store.steampowered.com/stats/
|
unknown
|
||
https://community.fastly.steamstatic.com/public/shared/javascript/shared_global.js?v=Gr6TbGRvDtNE&am
|
unknown
|
||
https://community.fastly.steamstatic.com/public/shared/images/responsive/logo_valve_footer.png
|
unknown
|
||
https://community.fastly.steamstatic.com/public/css/skin_1/header.css?v=EM4kCu67DNda&l=english&a
|
unknown
|
||
https://store.steampowered.com/steam_refunds/
|
unknown
|
||
http://x1.c.lencr.org/0
|
unknown
|
||
http://x1.i.lencr.org/0
|
unknown
|
||
https://imp.mt48.net/static?id=7RHzfOIXjFEYsBdvIpkX4Qqm4pqrfQHr4pbW4ZbWfpbY7ReNxR3UIG8zInwYIFIVs9eYi
|
unknown
|
||
https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
|
unknown
|
||
https://steamcommunity.com/login/home/?goto=profiles%2F76561199724331900
|
unknown
|
||
https://community.fastly.steamstatic.com/public/shared/images/header/logo_steam.svg?t=962016
|
unknown
|
||
https://community.fastly.steamstatic.com/public/javascript/reportedcontent.js?v=-lZqrarogJr8&l=e
|
unknown
|
||
https://marshal-zhukov.com/api
|
172.67.160.80
|
||
https://github.com/gewarren
|
unknown
|
||
https://marshal-zhukov.com/apiYB
|
unknown
|
||
https://steamcommunity.com/workshop/
|
unknown
|
||
https://support.mozilla.org/products/firefoxgro.all
|
unknown
|
||
http://polymer.github.io/CONTRIBUTORS.txt
|
unknown
|
||
https://community.fastly.steamstatic.com/public/css/globalv2.css?v=hzEgqbtRcI5V&l=english&_c
|
unknown
|
||
https://store.steampowered.com/legal/
|
unknown
|
||
https://community.fastly.steamstatic.com/public/shared/javascript/tooltip.js?v=QYkT4eS5mbTN&l=en
|
unknown
|
||
https://community.fastly.steamstatic.com/public/javascript/prototype-1.7.js?v=npJElBnrEO6W&l=eng
|
unknown
|
||
https://github.com/dotnet/docs/blob/live/docs/framework/install/application-not-started.md
|
unknown
|
||
https://authoring-docs-microsoft.poolparty.biz/devrel/69c76c32-967e-4c65-b89a-74cc527db725
|
unknown
|
There are 90 hidden URLs, click here to show them.
Domains
Name
|
IP
|
Malicious
|
|
---|---|---|---|
steamcommunity.com
|
104.121.10.34
|
||
marshal-zhukov.com
|
172.67.160.80
|
||
www.google.com
|
142.250.181.100
|
||
s-part-0035.t-0009.t-msedge.net
|
13.107.246.63
|
||
js.monitor.azure.com
|
unknown
|
||
powerful-avoids.sbs
|
unknown
|
||
property-imper.sbs
|
unknown
|
||
mdec.nelreports.net
|
unknown
|
||
leg-sate-boat.sbs
|
unknown
|
||
occupy-blushi.sbs
|
unknown
|
||
disobey-curly.sbs
|
unknown
|
||
blade-govern.sbs
|
unknown
|
||
story-tense-faz.sbs
|
unknown
|
||
motion-treesz.sbs
|
unknown
|
||
frogs-severz.sbs
|
unknown
|
There are 5 hidden domains, click here to show them.
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
192.168.2.10
|
unknown
|
unknown
|
||
13.107.246.63
|
s-part-0035.t-0009.t-msedge.net
|
United States
|
||
185.215.113.16
|
unknown
|
Portugal
|
||
104.121.10.34
|
steamcommunity.com
|
United States
|
||
142.250.181.100
|
www.google.com
|
United States
|
||
172.67.160.80
|
marshal-zhukov.com
|
United States
|
||
239.255.255.250
|
unknown
|
Reserved
|
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
5467000
|
trusted library allocation
|
page read and write
|
||
5463000
|
trusted library allocation
|
page read and write
|
||
5DAA000
|
trusted library allocation
|
page read and write
|
||
5655000
|
trusted library allocation
|
page read and write
|
||
544A000
|
trusted library allocation
|
page read and write
|
||
6050000
|
trusted library allocation
|
page read and write
|
||
54A6000
|
trusted library allocation
|
page read and write
|
||
54B3000
|
trusted library allocation
|
page read and write
|
||
760000
|
direct allocation
|
page read and write
|
||
4EBD000
|
stack
|
page read and write
|
||
853000
|
heap
|
page read and write
|
||
5DB0000
|
trusted library allocation
|
page read and write
|
||
54B8000
|
trusted library allocation
|
page read and write
|
||
5B0C000
|
trusted library allocation
|
page read and write
|
||
5DAC000
|
trusted library allocation
|
page read and write
|
||
54AB000
|
trusted library allocation
|
page read and write
|
||
5DAA000
|
trusted library allocation
|
page read and write
|
||
410E000
|
stack
|
page read and write
|
||
2F8E000
|
stack
|
page read and write
|
||
557E000
|
trusted library allocation
|
page read and write
|
||
3ACE000
|
stack
|
page read and write
|
||
544A000
|
trusted library allocation
|
page read and write
|
||
5C05000
|
trusted library allocation
|
page read and write
|
||
5520000
|
trusted library allocation
|
page read and write
|
||
5DAE000
|
trusted library allocation
|
page read and write
|
||
380F000
|
stack
|
page read and write
|
||
4371000
|
heap
|
page read and write
|
||
5541000
|
trusted library allocation
|
page read and write
|
||
54F9000
|
trusted library allocation
|
page read and write
|
||
7B8000
|
heap
|
page read and write
|
||
5DA9000
|
trusted library allocation
|
page read and write
|
||
5DA9000
|
trusted library allocation
|
page read and write
|
||
3C0E000
|
stack
|
page read and write
|
||
5DAD000
|
trusted library allocation
|
page read and write
|
||
54A0000
|
trusted library allocation
|
page read and write
|
||
58E000
|
stack
|
page read and write
|
||
5B0E000
|
trusted library allocation
|
page read and write
|
||
4FBC000
|
stack
|
page read and write
|
||
483B000
|
stack
|
page read and write
|
||
5529000
|
trusted library allocation
|
page read and write
|
||
54AF000
|
trusted library allocation
|
page read and write
|
||
5548000
|
trusted library allocation
|
page read and write
|
||
5581000
|
trusted library allocation
|
page read and write
|
||
5499000
|
trusted library allocation
|
page read and write
|
||
5B03000
|
trusted library allocation
|
page read and write
|
||
5576000
|
trusted library allocation
|
page read and write
|
||
545A000
|
trusted library allocation
|
page read and write
|
||
6031000
|
trusted library allocation
|
page read and write
|
||
36CF000
|
stack
|
page read and write
|
||
563D000
|
trusted library allocation
|
page read and write
|
||
5576000
|
trusted library allocation
|
page read and write
|
||
850000
|
heap
|
page read and write
|
||
5586000
|
trusted library allocation
|
page read and write
|
||
54AB000
|
trusted library allocation
|
page read and write
|
||
5511000
|
trusted library allocation
|
page read and write
|
||
5B00000
|
trusted library allocation
|
page read and write
|
||
5DA2000
|
trusted library allocation
|
page read and write
|
||
5B03000
|
trusted library allocation
|
page read and write
|
||
5551000
|
trusted library allocation
|
page read and write
|
||
5DAB000
|
trusted library allocation
|
page read and write
|
||
557B000
|
trusted library allocation
|
page read and write
|
||
77E000
|
heap
|
page read and write
|
||
4CFF000
|
stack
|
page read and write
|
||
5446000
|
trusted library allocation
|
page read and write
|
||
8160000
|
direct allocation
|
page read and write
|
||
5425000
|
trusted library allocation
|
page read and write
|
||
557F000
|
trusted library allocation
|
page read and write
|
||
5B05000
|
trusted library allocation
|
page read and write
|
||
5443000
|
trusted library allocation
|
page read and write
|
||
5B08000
|
trusted library allocation
|
page read and write
|
||
280F000
|
stack
|
page read and write
|
||
344F000
|
stack
|
page read and write
|
||
5DAD000
|
trusted library allocation
|
page read and write
|
||
5588000
|
trusted library allocation
|
page read and write
|
||
5454000
|
trusted library allocation
|
page read and write
|
||
5B05000
|
trusted library allocation
|
page read and write
|
||
5B02000
|
trusted library allocation
|
page read and write
|
||
856000
|
heap
|
page read and write
|
||
5446000
|
trusted library allocation
|
page read and write
|
||
545B000
|
trusted library allocation
|
page read and write
|
||
557E000
|
trusted library allocation
|
page read and write
|
||
546B000
|
trusted library allocation
|
page read and write
|
||
5DAC000
|
trusted library allocation
|
page read and write
|
||
5DAA000
|
trusted library allocation
|
page read and write
|
||
542B000
|
trusted library allocation
|
page read and write
|
||
5586000
|
trusted library allocation
|
page read and write
|
||
5520000
|
trusted library allocation
|
page read and write
|
||
5B04000
|
trusted library allocation
|
page read and write
|
||
54A1000
|
trusted library allocation
|
page read and write
|
||
54A0000
|
trusted library allocation
|
page read and write
|
||
3D4E000
|
stack
|
page read and write
|
||
30CE000
|
stack
|
page read and write
|
||
545D000
|
trusted library allocation
|
page read and write
|
||
5576000
|
trusted library allocation
|
page read and write
|
||
E82000
|
unkown
|
page execute and read and write
|
||
5B03000
|
trusted library allocation
|
page read and write
|
||
760000
|
direct allocation
|
page read and write
|
||
49B0000
|
direct allocation
|
page execute and read and write
|
||
5508000
|
trusted library allocation
|
page read and write
|
||
557F000
|
trusted library allocation
|
page read and write
|
||
4371000
|
heap
|
page read and write
|
||
4371000
|
heap
|
page read and write
|
||
5DAD000
|
trusted library allocation
|
page read and write
|
||
5DA9000
|
trusted library allocation
|
page read and write
|
||
5549000
|
trusted library allocation
|
page read and write
|
||
5B0D000
|
trusted library allocation
|
page read and write
|
||
5B02000
|
trusted library allocation
|
page read and write
|
||
5501000
|
trusted library allocation
|
page read and write
|
||
515E000
|
stack
|
page read and write
|
||
4371000
|
heap
|
page read and write
|
||
5541000
|
trusted library allocation
|
page read and write
|
||
5581000
|
trusted library allocation
|
page read and write
|
||
BC0000
|
unkown
|
page read and write
|
||
54BE000
|
trusted library allocation
|
page read and write
|
||
2E4E000
|
stack
|
page read and write
|
||
5534000
|
trusted library allocation
|
page read and write
|
||
5B39000
|
stack
|
page read and write
|
||
4371000
|
heap
|
page read and write
|
||
5B08000
|
trusted library allocation
|
page read and write
|
||
5400000
|
trusted library allocation
|
page read and write
|
||
5B05000
|
trusted library allocation
|
page read and write
|
||
5433000
|
trusted library allocation
|
page read and write
|
||
5DAF000
|
trusted library allocation
|
page read and write
|
||
85B000
|
heap
|
page read and write
|
||
5B0C000
|
trusted library allocation
|
page read and write
|
||
5B9D000
|
trusted library allocation
|
page read and write
|
||
54A0000
|
trusted library allocation
|
page read and write
|
||
40CF000
|
stack
|
page read and write
|
||
5465000
|
trusted library allocation
|
page read and write
|
||
5B0A000
|
trusted library allocation
|
page read and write
|
||
5B0A000
|
trusted library allocation
|
page read and write
|
||
542B000
|
trusted library allocation
|
page read and write
|
||
5454000
|
trusted library allocation
|
page read and write
|
||
4382000
|
heap
|
page read and write
|
||
544F000
|
trusted library allocation
|
page read and write
|
||
5B06000
|
trusted library allocation
|
page read and write
|
||
5B00000
|
trusted library allocation
|
page read and write
|
||
5576000
|
trusted library allocation
|
page read and write
|
||
5DAE000
|
trusted library allocation
|
page read and write
|
||
557E000
|
trusted library allocation
|
page read and write
|
||
5B9B000
|
trusted library allocation
|
page read and write
|
||
54A1000
|
trusted library allocation
|
page read and write
|
||
760000
|
direct allocation
|
page read and write
|
||
5455000
|
trusted library allocation
|
page read and write
|
||
4970000
|
direct allocation
|
page execute and read and write
|
||
4D3E000
|
stack
|
page read and write
|
||
5517000
|
trusted library allocation
|
page read and write
|
||
54AE000
|
trusted library allocation
|
page read and write
|
||
55A8000
|
trusted library allocation
|
page read and write
|
||
5504000
|
trusted library allocation
|
page read and write
|
||
6B7000
|
heap
|
page read and write
|
||
5576000
|
trusted library allocation
|
page read and write
|
||
5427000
|
trusted library allocation
|
page read and write
|
||
4381000
|
heap
|
page read and write
|
||
5B0C000
|
trusted library allocation
|
page read and write
|
||
5549000
|
trusted library allocation
|
page read and write
|
||
493F000
|
stack
|
page read and write
|
||
5BC9000
|
trusted library allocation
|
page read and write
|
||
5496000
|
trusted library allocation
|
page read and write
|
||
543C000
|
trusted library allocation
|
page read and write
|
||
5550000
|
trusted library allocation
|
page read and write
|
||
5BBB000
|
trusted library allocation
|
page read and write
|
||
8100000
|
direct allocation
|
page read and write
|
||
5582000
|
trusted library allocation
|
page read and write
|
||
54A1000
|
trusted library allocation
|
page read and write
|
||
54B7000
|
trusted library allocation
|
page read and write
|
||
605A000
|
trusted library allocation
|
page execute and read and write
|
||
549E000
|
trusted library allocation
|
page read and write
|
||
5496000
|
trusted library allocation
|
page read and write
|
||
863000
|
heap
|
page read and write
|
||
8100000
|
direct allocation
|
page read and write
|
||
9B000
|
stack
|
page read and write
|
||
4371000
|
heap
|
page read and write
|
||
5B0D000
|
trusted library allocation
|
page read and write
|
||
5DAE000
|
trusted library allocation
|
page read and write
|
||
603E000
|
trusted library allocation
|
page read and write
|
||
5DA9000
|
trusted library allocation
|
page read and write
|
||
760000
|
direct allocation
|
page read and write
|
||
4371000
|
heap
|
page read and write
|
||
5DAE000
|
trusted library allocation
|
page read and write
|
||
3BCF000
|
stack
|
page read and write
|
||
5502000
|
trusted library allocation
|
page read and write
|
||
1065000
|
unkown
|
page execute and read and write
|
||
5B0A000
|
trusted library allocation
|
page read and write
|
||
547B000
|
trusted library allocation
|
page read and write
|
||
5DAC000
|
trusted library allocation
|
page read and write
|
||
545B000
|
trusted library allocation
|
page read and write
|
||
54A8000
|
trusted library allocation
|
page read and write
|
||
BC1000
|
unkown
|
page execute and read and write
|
||
5433000
|
trusted library allocation
|
page read and write
|
||
EC5000
|
unkown
|
page execute and read and write
|
||
5DA7000
|
trusted library allocation
|
page read and write
|
||
5B00000
|
trusted library allocation
|
page read and write
|
||
5DB0000
|
trusted library allocation
|
page read and write
|
||
760000
|
direct allocation
|
page read and write
|
||
5479000
|
trusted library allocation
|
page read and write
|
||
4350000
|
heap
|
page read and write
|
||
5B0A000
|
trusted library allocation
|
page read and write
|
||
5DAD000
|
trusted library allocation
|
page read and write
|
||
5DB1000
|
trusted library allocation
|
page read and write
|
||
5429000
|
trusted library allocation
|
page read and write
|
||
5BAA000
|
trusted library allocation
|
page read and write
|
||
570C000
|
trusted library allocation
|
page read and write
|
||
5B00000
|
trusted library allocation
|
page read and write
|
||
575D000
|
trusted library allocation
|
page read and write
|
||
552E000
|
trusted library allocation
|
page read and write
|
||
5630000
|
trusted library allocation
|
page read and write
|
||
50FD000
|
stack
|
page read and write
|
||
5DAC000
|
trusted library allocation
|
page read and write
|
||
5576000
|
trusted library allocation
|
page read and write
|
||
8100000
|
direct allocation
|
page read and write
|
||
47ED000
|
stack
|
page read and write
|
||
5490000
|
trusted library allocation
|
page read and write
|
||
5B04000
|
trusted library allocation
|
page read and write
|
||
4ABE000
|
stack
|
page read and write
|
||
57AD000
|
trusted library allocation
|
page read and write
|
||
8100000
|
direct allocation
|
page read and write
|
||
54A6000
|
trusted library allocation
|
page read and write
|
||
398E000
|
stack
|
page read and write
|
||
5519000
|
trusted library allocation
|
page read and write
|
||
569B000
|
trusted library allocation
|
page read and write
|
||
6AE000
|
stack
|
page read and write
|
||
330F000
|
stack
|
page read and write
|
||
4371000
|
heap
|
page read and write
|
||
5448000
|
trusted library allocation
|
page read and write
|
||
5B0A000
|
trusted library allocation
|
page read and write
|
||
8100000
|
direct allocation
|
page read and write
|
||
5B0D000
|
trusted library allocation
|
page read and write
|
||
5B9F000
|
trusted library allocation
|
page read and write
|
||
5C00000
|
trusted library allocation
|
page read and write
|
||
5DAD000
|
trusted library allocation
|
page read and write
|
||
5479000
|
trusted library allocation
|
page read and write
|
||
57DD000
|
trusted library allocation
|
page read and write
|
||
5DAC000
|
trusted library allocation
|
page read and write
|
||
8100000
|
trusted library allocation
|
page read and write
|
||
57E5000
|
trusted library allocation
|
page read and write
|
||
5520000
|
trusted library allocation
|
page read and write
|
||
55E2000
|
trusted library allocation
|
page read and write
|
||
5B0A000
|
trusted library allocation
|
page read and write
|
||
5875000
|
trusted library allocation
|
page read and write
|
||
57DC000
|
trusted library allocation
|
page read and write
|
||
5DA7000
|
trusted library allocation
|
page read and write
|
||
5B0E000
|
trusted library allocation
|
page read and write
|
||
5B02000
|
trusted library allocation
|
page read and write
|
||
5C9C000
|
trusted library allocation
|
page read and write
|
||
4371000
|
heap
|
page read and write
|
||
5B01000
|
trusted library allocation
|
page read and write
|
||
5DAB000
|
trusted library allocation
|
page read and write
|
||
54A5000
|
trusted library allocation
|
page read and write
|
||
5576000
|
trusted library allocation
|
page read and write
|
||
5433000
|
trusted library allocation
|
page read and write
|
||
5586000
|
trusted library allocation
|
page read and write
|
||
557F000
|
trusted library allocation
|
page read and write
|
||
5431000
|
trusted library allocation
|
page read and write
|
||
8160000
|
direct allocation
|
page read and write
|
||
5B0F000
|
trusted library allocation
|
page read and write
|
||
5BCF000
|
trusted library allocation
|
page read and write
|
||
370E000
|
stack
|
page read and write
|
||
5B0E000
|
trusted library allocation
|
page read and write
|
||
553A000
|
trusted library allocation
|
page read and write
|
||
5DA8000
|
trusted library allocation
|
page read and write
|
||
5B05000
|
trusted library allocation
|
page read and write
|
||
8100000
|
direct allocation
|
page read and write
|
||
5B06000
|
trusted library allocation
|
page read and write
|
||
5576000
|
trusted library allocation
|
page read and write
|
||
5424000
|
trusted library allocation
|
page read and write
|
||
4E0000
|
heap
|
page read and write
|
||
4BBD000
|
stack
|
page read and write
|
||
857000
|
heap
|
page read and write
|
||
4980000
|
direct allocation
|
page execute and read and write
|
||
5DAF000
|
trusted library allocation
|
page read and write
|
||
5520000
|
trusted library allocation
|
page read and write
|
||
549C000
|
trusted library allocation
|
page read and write
|
||
5520000
|
trusted library allocation
|
page read and write
|
||
2B8F000
|
stack
|
page read and write
|
||
556E000
|
trusted library allocation
|
page read and write
|
||
55DB000
|
trusted library allocation
|
page read and write
|
||
563B000
|
trusted library allocation
|
page read and write
|
||
5B06000
|
trusted library allocation
|
page read and write
|
||
547B000
|
trusted library allocation
|
page read and write
|
||
542A000
|
trusted library allocation
|
page read and write
|
||
544A000
|
trusted library allocation
|
page read and write
|
||
5BAC000
|
trusted library allocation
|
page read and write
|
||
5576000
|
trusted library allocation
|
page read and write
|
||
5DB1000
|
trusted library allocation
|
page read and write
|
||
4FFE000
|
stack
|
page read and write
|
||
5637000
|
trusted library allocation
|
page read and write
|
||
5DAD000
|
trusted library allocation
|
page read and write
|
||
5DAE000
|
trusted library allocation
|
page read and write
|
||
EAF000
|
unkown
|
page execute and read and write
|
||
81E0000
|
direct allocation
|
page execute and read and write
|
||
5BB2000
|
trusted library allocation
|
page read and write
|
||
8100000
|
direct allocation
|
page read and write
|
||
563D000
|
trusted library allocation
|
page read and write
|
||
5424000
|
trusted library allocation
|
page read and write
|
||
545B000
|
trusted library allocation
|
page read and write
|
||
5B0A000
|
trusted library allocation
|
page read and write
|
||
384E000
|
stack
|
page read and write
|
||
545C000
|
trusted library allocation
|
page read and write
|
||
543B000
|
trusted library allocation
|
page read and write
|
||
5449000
|
trusted library allocation
|
page read and write
|
||
557F000
|
trusted library allocation
|
page read and write
|
||
557E000
|
trusted library allocation
|
page read and write
|
||
54AB000
|
trusted library allocation
|
page read and write
|
||
760000
|
direct allocation
|
page read and write
|
||
5528000
|
trusted library allocation
|
page read and write
|
||
557E000
|
trusted library allocation
|
page read and write
|
||
557F000
|
trusted library allocation
|
page read and write
|
||
557E000
|
trusted library allocation
|
page read and write
|
||
5529000
|
trusted library allocation
|
page read and write
|
||
542C000
|
trusted library allocation
|
page read and write
|
||
4371000
|
heap
|
page read and write
|
||
5581000
|
trusted library allocation
|
page read and write
|
||
4E60000
|
remote allocation
|
page read and write
|
||
5686000
|
trusted library allocation
|
page read and write
|
||
5DAE000
|
trusted library allocation
|
page read and write
|
||
54BB000
|
trusted library allocation
|
page read and write
|
||
19A000
|
stack
|
page read and write
|
||
5B07000
|
trusted library allocation
|
page read and write
|
||
547B000
|
trusted library allocation
|
page read and write
|
||
5DAD000
|
trusted library allocation
|
page read and write
|
||
5DAF000
|
trusted library allocation
|
page read and write
|
||
5B0B000
|
trusted library allocation
|
page read and write
|
||
5578000
|
trusted library allocation
|
page read and write
|
||
5576000
|
trusted library allocation
|
page read and write
|
||
5502000
|
trusted library allocation
|
page read and write
|
||
5B08000
|
trusted library allocation
|
page read and write
|
||
557F000
|
trusted library allocation
|
page read and write
|
||
4371000
|
heap
|
page read and write
|
||
3E4F000
|
stack
|
page read and write
|
||
5499000
|
trusted library allocation
|
page read and write
|
||
5424000
|
trusted library allocation
|
page read and write
|
||
760000
|
direct allocation
|
page read and write
|
||
57DE000
|
trusted library allocation
|
page read and write
|
||
5DA7000
|
trusted library allocation
|
page read and write
|
||
5B04000
|
trusted library allocation
|
page read and write
|
||
4980000
|
direct allocation
|
page execute and read and write
|
||
5B0B000
|
trusted library allocation
|
page read and write
|
||
4980000
|
direct allocation
|
page execute and read and write
|
||
2E0F000
|
stack
|
page read and write
|
||
545A000
|
trusted library allocation
|
page read and write
|
||
5B04000
|
trusted library allocation
|
page read and write
|
||
424E000
|
stack
|
page read and write
|
||
5433000
|
trusted library allocation
|
page read and write
|
||
5B02000
|
trusted library allocation
|
page read and write
|
||
5B08000
|
trusted library allocation
|
page read and write
|
||
5552000
|
trusted library allocation
|
page read and write
|
||
542B000
|
trusted library allocation
|
page read and write
|
||
4370000
|
heap
|
page read and write
|
||
848000
|
heap
|
page read and write
|
||
54B0000
|
trusted library allocation
|
page read and write
|
||
5440000
|
trusted library allocation
|
page read and write
|
||
544D000
|
trusted library allocation
|
page read and write
|
||
5BB4000
|
trusted library allocation
|
page read and write
|
||
4371000
|
heap
|
page read and write
|
||
557F000
|
trusted library allocation
|
page read and write
|
||
54AB000
|
trusted library allocation
|
page read and write
|
||
498E000
|
stack
|
page read and write
|
||
5DAF000
|
trusted library allocation
|
page read and write
|
||
846000
|
heap
|
page read and write
|
||
557F000
|
trusted library allocation
|
page read and write
|
||
552C000
|
trusted library allocation
|
page read and write
|
||
54A1000
|
trusted library allocation
|
page read and write
|
||
5B08000
|
trusted library allocation
|
page read and write
|
||
5B07000
|
trusted library allocation
|
page read and write
|
||
4E60000
|
remote allocation
|
page read and write
|
||
4960000
|
direct allocation
|
page execute and read and write
|
||
4E3F000
|
stack
|
page read and write
|
||
4371000
|
heap
|
page read and write
|
||
5A0000
|
heap
|
page read and write
|
||
545C000
|
trusted library allocation
|
page read and write
|
||
5DA8000
|
trusted library allocation
|
page read and write
|
||
5581000
|
trusted library allocation
|
page read and write
|
||
5520000
|
trusted library allocation
|
page read and write
|
||
5DAC000
|
trusted library allocation
|
page read and write
|
||
35CE000
|
stack
|
page read and write
|
||
5490000
|
trusted library allocation
|
page read and write
|
||
5B01000
|
trusted library allocation
|
page read and write
|
||
70E000
|
stack
|
page read and write
|
||
5464000
|
trusted library allocation
|
page read and write
|
||
4371000
|
heap
|
page read and write
|
||
5B08000
|
trusted library allocation
|
page read and write
|
||
47F0000
|
direct allocation
|
page read and write
|
||
5520000
|
trusted library allocation
|
page read and write
|
||
5702000
|
trusted library allocation
|
page read and write
|
||
5437000
|
trusted library allocation
|
page read and write
|
||
5576000
|
trusted library allocation
|
page read and write
|
||
5B0B000
|
trusted library allocation
|
page read and write
|
||
5571000
|
trusted library allocation
|
page read and write
|
||
49C1000
|
trusted library allocation
|
page read and write
|
||
2D0E000
|
stack
|
page read and write
|
||
5DAD000
|
trusted library allocation
|
page read and write
|
||
5475000
|
trusted library allocation
|
page read and write
|
||
552F000
|
trusted library allocation
|
page read and write
|
||
562E000
|
trusted library allocation
|
page read and write
|
||
5B0F000
|
trusted library allocation
|
page read and write
|
||
57DE000
|
trusted library allocation
|
page read and write
|
||
557E000
|
trusted library allocation
|
page read and write
|
||
5B03000
|
trusted library allocation
|
page read and write
|
||
557E000
|
trusted library allocation
|
page read and write
|
||
5B0D000
|
trusted library allocation
|
page read and write
|
||
5B0A000
|
trusted library allocation
|
page read and write
|
||
EB7000
|
unkown
|
page execute and read and write
|
||
54A0000
|
trusted library allocation
|
page read and write
|
||
543C000
|
trusted library allocation
|
page read and write
|
||
5DAC000
|
trusted library allocation
|
page read and write
|
||
5B09000
|
trusted library allocation
|
page read and write
|
||
5DAF000
|
trusted library allocation
|
page read and write
|
||
54B0000
|
trusted library allocation
|
page read and write
|
||
54B7000
|
trusted library allocation
|
page read and write
|
||
863000
|
heap
|
page read and write
|
||
5539000
|
trusted library allocation
|
page read and write
|
||
54B6000
|
trusted library allocation
|
page read and write
|
||
82B000
|
heap
|
page read and write
|
||
7B1000
|
heap
|
page read and write
|
||
544A000
|
trusted library allocation
|
page read and write
|
||
320E000
|
stack
|
page read and write
|
||
556E000
|
trusted library allocation
|
page read and write
|
||
5508000
|
trusted library allocation
|
page read and write
|
||
846000
|
heap
|
page read and write
|
||
760000
|
direct allocation
|
page read and write
|
||
54A0000
|
trusted library allocation
|
page read and write
|
||
3FCE000
|
stack
|
page read and write
|
||
5725000
|
trusted library allocation
|
page read and write
|
||
EC6000
|
unkown
|
page execute and write copy
|
||
5B10000
|
trusted library allocation
|
page read and write
|
||
5DAF000
|
trusted library allocation
|
page read and write
|
||
770000
|
heap
|
page read and write
|
||
54AC000
|
trusted library allocation
|
page read and write
|
||
760000
|
direct allocation
|
page read and write
|
||
5448000
|
trusted library allocation
|
page read and write
|
||
544A000
|
trusted library allocation
|
page read and write
|
||
5B9D000
|
trusted library allocation
|
page read and write
|
||
434F000
|
stack
|
page read and write
|
||
420F000
|
stack
|
page read and write
|
||
5490000
|
trusted library allocation
|
page read and write
|
||
863000
|
heap
|
page read and write
|
||
5581000
|
trusted library allocation
|
page read and write
|
||
573D000
|
trusted library allocation
|
page read and write
|
||
74C000
|
stack
|
page read and write
|
||
290F000
|
stack
|
page read and write
|
||
5DAB000
|
trusted library allocation
|
page read and write
|
||
54B6000
|
trusted library allocation
|
page read and write
|
||
C19000
|
unkown
|
page execute and read and write
|
||
54B7000
|
trusted library allocation
|
page read and write
|
||
5DAE000
|
trusted library allocation
|
page read and write
|
||
54A0000
|
trusted library allocation
|
page read and write
|
||
5B01000
|
trusted library allocation
|
page read and write
|
||
5DB1000
|
trusted library allocation
|
page read and write
|
||
5552000
|
trusted library allocation
|
page read and write
|
||
5BB1000
|
trusted library allocation
|
page read and write
|
||
5B02000
|
trusted library allocation
|
page read and write
|
||
542C000
|
trusted library allocation
|
page read and write
|
||
5DAF000
|
trusted library allocation
|
page read and write
|
||
54A1000
|
trusted library allocation
|
page read and write
|
||
82D000
|
heap
|
page read and write
|
||
5443000
|
trusted library allocation
|
page read and write
|
||
5458000
|
trusted library allocation
|
page read and write
|
||
5DAB000
|
trusted library allocation
|
page read and write
|
||
5BC0000
|
trusted library allocation
|
page read and write
|
||
4BFD000
|
stack
|
page read and write
|
||
55F2000
|
trusted library allocation
|
page read and write
|
||
6114000
|
trusted library allocation
|
page read and write
|
||
5B06000
|
trusted library allocation
|
page read and write
|
||
394F000
|
stack
|
page read and write
|
||
5519000
|
trusted library allocation
|
page read and write
|
||
5B06000
|
trusted library allocation
|
page read and write
|
||
5B01000
|
trusted library allocation
|
page read and write
|
||
5BD1000
|
trusted library allocation
|
page read and write
|
||
5DA1000
|
trusted library allocation
|
page read and write
|
||
5451000
|
trusted library allocation
|
page read and write
|
||
4800000
|
direct allocation
|
page read and write
|
||
7C2000
|
heap
|
page read and write
|
||
5B0D000
|
trusted library allocation
|
page read and write
|
||
525F000
|
stack
|
page read and write
|
||
5511000
|
trusted library allocation
|
page read and write
|
||
5DA4000
|
trusted library allocation
|
page read and write
|
||
5576000
|
trusted library allocation
|
page read and write
|
||
557B000
|
trusted library allocation
|
page read and write
|
||
5BAF000
|
trusted library allocation
|
page read and write
|
||
5B0F000
|
trusted library allocation
|
page read and write
|
||
2F4F000
|
stack
|
page read and write
|
||
5B05000
|
trusted library allocation
|
page read and write
|
||
294E000
|
stack
|
page read and write
|
||
5B03000
|
trusted library allocation
|
page read and write
|
||
545B000
|
trusted library allocation
|
page read and write
|
||
5B03000
|
trusted library allocation
|
page read and write
|
||
750000
|
heap
|
page read and write
|
||
576F000
|
trusted library allocation
|
page read and write
|
||
52CE000
|
stack
|
page read and write
|
||
5B0E000
|
trusted library allocation
|
page read and write
|
||
5B09000
|
trusted library allocation
|
page read and write
|
||
5B07000
|
trusted library allocation
|
page read and write
|
||
856000
|
heap
|
page read and write
|
||
5273000
|
heap
|
page read and write
|
||
543C000
|
trusted library allocation
|
page read and write
|
||
BAE000
|
stack
|
page read and write
|
||
5420000
|
trusted library allocation
|
page read and write
|
||
77A000
|
heap
|
page read and write
|
||
5F2C000
|
trusted library allocation
|
page read and write
|
||
54B7000
|
trusted library allocation
|
page read and write
|
||
4980000
|
direct allocation
|
page execute and read and write
|
||
4371000
|
heap
|
page read and write
|
||
5B06000
|
trusted library allocation
|
page read and write
|
||
7DE000
|
heap
|
page read and write
|
||
308F000
|
stack
|
page read and write
|
||
5586000
|
trusted library allocation
|
page read and write
|
||
8100000
|
direct allocation
|
page read and write
|
||
5DAC000
|
trusted library allocation
|
page read and write
|
||
5539000
|
trusted library allocation
|
page read and write
|
||
55EE000
|
trusted library allocation
|
page read and write
|
||
54AB000
|
trusted library allocation
|
page read and write
|
||
C17000
|
unkown
|
page read and write
|
||
5DA3000
|
trusted library allocation
|
page read and write
|
||
54AA000
|
trusted library allocation
|
page read and write
|
||
5DAC000
|
trusted library allocation
|
page read and write
|
||
5554000
|
trusted library allocation
|
page read and write
|
||
552A000
|
trusted library allocation
|
page read and write
|
||
5B00000
|
trusted library allocation
|
page read and write
|
||
5BB9000
|
trusted library allocation
|
page read and write
|
||
8100000
|
direct allocation
|
page read and write
|
||
5BBE000
|
trusted library allocation
|
page read and write
|
||
5C70000
|
direct allocation
|
page read and write
|
||
5511000
|
trusted library allocation
|
page read and write
|
||
5576000
|
trusted library allocation
|
page read and write
|
||
4E60000
|
remote allocation
|
page read and write
|
||
5B06000
|
trusted library allocation
|
page read and write
|
||
5588000
|
trusted library allocation
|
page read and write
|
||
7DA000
|
heap
|
page read and write
|
||
5576000
|
trusted library allocation
|
page read and write
|
||
5B0C000
|
trusted library allocation
|
page read and write
|
||
3A8F000
|
stack
|
page read and write
|
||
5424000
|
trusted library allocation
|
page read and write
|
||
5C39000
|
stack
|
page read and write
|
||
54BB000
|
trusted library allocation
|
page read and write
|
||
5B0F000
|
trusted library allocation
|
page read and write
|
||
54B7000
|
trusted library allocation
|
page read and write
|
||
5511000
|
trusted library allocation
|
page read and write
|
||
54B6000
|
trusted library allocation
|
page read and write
|
||
5518000
|
trusted library allocation
|
page read and write
|
||
47F0000
|
direct allocation
|
page read and write
|
||
5DAF000
|
trusted library allocation
|
page read and write
|
||
5706000
|
trusted library allocation
|
page read and write
|
||
760000
|
direct allocation
|
page read and write
|
||
557E000
|
trusted library allocation
|
page read and write
|
||
400000
|
heap
|
page read and write
|
||
8100000
|
direct allocation
|
page read and write
|
||
5588000
|
trusted library allocation
|
page read and write
|
||
54AB000
|
trusted library allocation
|
page read and write
|
||
5DA5000
|
trusted library allocation
|
page read and write
|
||
5DA2000
|
trusted library allocation
|
page read and write
|
||
D9C000
|
unkown
|
page execute and read and write
|
||
83B000
|
heap
|
page read and write
|
||
4371000
|
heap
|
page read and write
|
||
5B07000
|
trusted library allocation
|
page read and write
|
||
542B000
|
trusted library allocation
|
page read and write
|
||
54A5000
|
trusted library allocation
|
page read and write
|
||
31CF000
|
stack
|
page read and write
|
||
5DA4000
|
trusted library allocation
|
page read and write
|
||
4980000
|
direct allocation
|
page execute and read and write
|
||
570D000
|
trusted library allocation
|
page read and write
|
||
557B000
|
trusted library allocation
|
page read and write
|
||
5BA1000
|
trusted library allocation
|
page read and write
|
||
5653000
|
trusted library allocation
|
page read and write
|
||
5B06000
|
trusted library allocation
|
page read and write
|
||
5448000
|
trusted library allocation
|
page read and write
|
||
557E000
|
trusted library allocation
|
page read and write
|
||
4990000
|
direct allocation
|
page execute and read and write
|
||
5576000
|
trusted library allocation
|
page read and write
|
||
5DA5000
|
trusted library allocation
|
page read and write
|
||
7A8000
|
heap
|
page read and write
|
||
760000
|
direct allocation
|
page read and write
|
||
5A5000
|
heap
|
page read and write
|
||
83F000
|
heap
|
page read and write
|
||
5DAE000
|
trusted library allocation
|
page read and write
|
||
556E000
|
trusted library allocation
|
page read and write
|
||
5520000
|
trusted library allocation
|
page read and write
|
||
5DA5000
|
trusted library allocation
|
page read and write
|
||
5479000
|
trusted library allocation
|
page read and write
|
||
5B01000
|
trusted library allocation
|
page read and write
|
||
5444000
|
trusted library allocation
|
page read and write
|
||
5B04000
|
trusted library allocation
|
page read and write
|
||
5B94000
|
trusted library allocation
|
page read and write
|
||
760000
|
direct allocation
|
page read and write
|
||
5DAB000
|
trusted library allocation
|
page read and write
|
||
5DA7000
|
trusted library allocation
|
page read and write
|
||
5B0B000
|
trusted library allocation
|
page read and write
|
||
5559000
|
trusted library allocation
|
page read and write
|
||
54E000
|
stack
|
page read and write
|
||
6052000
|
trusted library allocation
|
page execute and read and write
|
||
543C000
|
trusted library allocation
|
page read and write
|
||
6B0000
|
heap
|
page read and write
|
||
5519000
|
trusted library allocation
|
page read and write
|
||
5DB0000
|
trusted library allocation
|
page read and write
|
||
857000
|
heap
|
page read and write
|
||
5655000
|
trusted library allocation
|
page read and write
|
||
4844000
|
direct allocation
|
page read and write
|
||
5587000
|
trusted library allocation
|
page read and write
|
||
547B000
|
trusted library allocation
|
page read and write
|
||
760000
|
direct allocation
|
page read and write
|
||
8100000
|
direct allocation
|
page read and write
|
||
C17000
|
unkown
|
page write copy
|
||
8100000
|
direct allocation
|
page read and write
|
||
270F000
|
stack
|
page read and write
|
||
557F000
|
trusted library allocation
|
page read and write
|
||
5B09000
|
trusted library allocation
|
page read and write
|
||
5DAC000
|
trusted library allocation
|
page read and write
|
||
5DA5000
|
trusted library allocation
|
page read and write
|
||
5433000
|
trusted library allocation
|
page read and write
|
||
5DA7000
|
trusted library allocation
|
page read and write
|
||
5DAB000
|
trusted library allocation
|
page read and write
|
||
8100000
|
direct allocation
|
page read and write
|
||
5DA2000
|
trusted library allocation
|
page read and write
|
||
5B02000
|
trusted library allocation
|
page read and write
|
||
54A0000
|
trusted library allocation
|
page read and write
|
||
5DAA000
|
trusted library allocation
|
page read and write
|
||
8160000
|
direct allocation
|
page read and write
|
||
5DAA000
|
trusted library allocation
|
page read and write
|
||
8100000
|
direct allocation
|
page read and write
|
||
5588000
|
trusted library allocation
|
page read and write
|
||
2A8E000
|
stack
|
page read and write
|
||
54AF000
|
trusted library allocation
|
page read and write
|
||
5433000
|
trusted library allocation
|
page read and write
|
||
57D5000
|
trusted library allocation
|
page read and write
|
||
5BA3000
|
trusted library allocation
|
page read and write
|
||
557E000
|
trusted library allocation
|
page read and write
|
||
54A0000
|
trusted library allocation
|
page read and write
|
||
358F000
|
stack
|
page read and write
|
||
5448000
|
trusted library allocation
|
page read and write
|
||
2A4F000
|
stack
|
page read and write
|
||
3D0F000
|
stack
|
page read and write
|
||
5B03000
|
trusted library allocation
|
page read and write
|
||
5510000
|
trusted library allocation
|
page read and write
|
||
5DAA000
|
trusted library allocation
|
page read and write
|
||
2BCE000
|
stack
|
page read and write
|
||
4371000
|
heap
|
page read and write
|
||
4470000
|
trusted library allocation
|
page read and write
|
||
53CF000
|
stack
|
page read and write
|
||
54AB000
|
trusted library allocation
|
page read and write
|
||
856000
|
heap
|
page read and write
|
||
49A0000
|
direct allocation
|
page execute and read and write
|
||
5B08000
|
trusted library allocation
|
page read and write
|
||
5B02000
|
trusted library allocation
|
page read and write
|
||
85E000
|
heap
|
page read and write
|
||
5558000
|
trusted library allocation
|
page read and write
|
||
5700000
|
trusted library allocation
|
page read and write
|
||
557F000
|
trusted library allocation
|
page read and write
|
||
5500000
|
trusted library allocation
|
page read and write
|
||
5B92000
|
trusted library allocation
|
page read and write
|
||
4980000
|
direct allocation
|
page execute and read and write
|
||
5576000
|
trusted library allocation
|
page read and write
|
||
5571000
|
trusted library allocation
|
page read and write
|
||
5DA3000
|
trusted library allocation
|
page read and write
|
||
557F000
|
trusted library allocation
|
page read and write
|
||
5576000
|
trusted library allocation
|
page read and write
|
||
557B000
|
trusted library allocation
|
page read and write
|
||
6056000
|
trusted library allocation
|
page read and write
|
||
5BB0000
|
trusted library allocation
|
page read and write
|
||
5B08000
|
trusted library allocation
|
page read and write
|
||
545A000
|
trusted library allocation
|
page read and write
|
||
5630000
|
trusted library allocation
|
page read and write
|
||
85A000
|
heap
|
page read and write
|
||
553F000
|
trusted library allocation
|
page read and write
|
||
54A0000
|
trusted library allocation
|
page read and write
|
||
96E000
|
stack
|
page read and write
|
||
5DA3000
|
trusted library allocation
|
page read and write
|
||
5DAD000
|
trusted library allocation
|
page read and write
|
||
4950000
|
direct allocation
|
page execute and read and write
|
||
5503000
|
trusted library allocation
|
page read and write
|
||
5B09000
|
trusted library allocation
|
page read and write
|
||
3E8E000
|
stack
|
page read and write
|
||
5DB1000
|
trusted library allocation
|
page read and write
|
||
54BB000
|
trusted library allocation
|
page read and write
|
||
5BB2000
|
trusted library allocation
|
page read and write
|
||
5BCB000
|
trusted library allocation
|
page read and write
|
||
5540000
|
trusted library allocation
|
page read and write
|
||
47F0000
|
direct allocation
|
page read and write
|
||
BC1000
|
unkown
|
page execute and write copy
|
||
4371000
|
heap
|
page read and write
|
||
557F000
|
trusted library allocation
|
page read and write
|
||
856000
|
heap
|
page read and write
|
||
542C000
|
trusted library allocation
|
page read and write
|
||
5490000
|
trusted library allocation
|
page read and write
|
||
5DA9000
|
trusted library allocation
|
page read and write
|
||
82B000
|
heap
|
page read and write
|
||
5521000
|
trusted library allocation
|
page read and write
|
||
856000
|
heap
|
page read and write
|
||
5B0C000
|
trusted library allocation
|
page read and write
|
||
56BE000
|
trusted library allocation
|
page read and write
|
||
5DAB000
|
trusted library allocation
|
page read and write
|
||
5501000
|
trusted library allocation
|
page read and write
|
||
5528000
|
trusted library allocation
|
page read and write
|
||
557B000
|
trusted library allocation
|
page read and write
|
||
348E000
|
stack
|
page read and write
|
||
544D000
|
trusted library allocation
|
page read and write
|
||
7EE000
|
heap
|
page read and write
|
||
81B0000
|
direct allocation
|
page execute and read and write
|
||
5B10000
|
trusted library allocation
|
page read and write
|
||
557B000
|
trusted library allocation
|
page read and write
|
||
5DAC000
|
trusted library allocation
|
page read and write
|
||
5DA0000
|
trusted library allocation
|
page read and write
|
||
EC5000
|
unkown
|
page execute and write copy
|
||
5B10000
|
trusted library allocation
|
page read and write
|
||
3F8F000
|
stack
|
page read and write
|
||
5DAE000
|
trusted library allocation
|
page read and write
|
||
C05000
|
unkown
|
page execute and read and write
|
||
5529000
|
trusted library allocation
|
page read and write
|
||
BC0000
|
unkown
|
page readonly
|
||
4371000
|
heap
|
page read and write
|
||
4371000
|
heap
|
page read and write
|
||
54AC000
|
trusted library allocation
|
page read and write
|
||
334E000
|
stack
|
page read and write
|
||
61E0000
|
trusted library allocation
|
page execute and read and write
|
||
5424000
|
trusted library allocation
|
page read and write
|
||
54A0000
|
trusted library allocation
|
page read and write
|
||
4371000
|
heap
|
page read and write
|
||
542B000
|
trusted library allocation
|
page read and write
|
||
54A0000
|
trusted library allocation
|
page read and write
|
||
5B01000
|
trusted library allocation
|
page read and write
|
||
760000
|
direct allocation
|
page read and write
|
||
5576000
|
trusted library allocation
|
page read and write
|
||
5B03000
|
trusted library allocation
|
page read and write
|
||
544D000
|
trusted library allocation
|
page read and write
|
||
83F000
|
heap
|
page read and write
|
||
5270000
|
heap
|
page read and write
|
||
2CCF000
|
stack
|
page read and write
|
||
4371000
|
heap
|
page read and write
|
||
5702000
|
trusted library allocation
|
page read and write
|
||
5B0C000
|
trusted library allocation
|
page read and write
|
||
5539000
|
trusted library allocation
|
page read and write
|
||
5DAA000
|
trusted library allocation
|
page read and write
|
There are 721 hidden memdumps, click here to show them.
DOM / HTML
URL
|
Malicious
|
|
---|---|---|
https://learn.microsoft.com/en-us/dotnet/framework/install/application-not-started?version=(null)&processName=file.exe&platform=0009&osver=6&isServer=0&shimver=4.0.30319.0
|
||
https://learn.microsoft.com/en-us/dotnet/framework/install/application-not-started?version=(null)&processName=file.exe&platform=0009&osver=6&isServer=0&shimver=4.0.30319.0
|
||
https://learn.microsoft.com/en-us/dotnet/framework/install/application-not-started?version=(null)&processName=file.exe&platform=0009&osver=6&isServer=0&shimver=4.0.30319.0
|
||
https://learn.microsoft.com/en-us/dotnet/framework/install/application-not-started?version=(null)&processName=file.exe&platform=0009&osver=6&isServer=0&shimver=4.0.30319.0
|