Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
file.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
initial sample
|
||
Chrome Cache Entry: 100
|
ASCII text, with very long lines (46884)
|
dropped
|
||
Chrome Cache Entry: 101
|
ASCII text
|
dropped
|
||
Chrome Cache Entry: 102
|
SVG Scalable Vector Graphics image
|
downloaded
|
||
Chrome Cache Entry: 103
|
Web Open Font Format (Version 2), TrueType, length 19696, version 1.0
|
downloaded
|
||
Chrome Cache Entry: 104
|
ASCII text, with very long lines (33148), with no line terminators
|
downloaded
|
||
Chrome Cache Entry: 105
|
PNG image data, 475 x 212, 8-bit/color RGBA, non-interlaced
|
dropped
|
||
Chrome Cache Entry: 106
|
PNG image data, 658 x 480, 8-bit/color RGBA, non-interlaced
|
dropped
|
||
Chrome Cache Entry: 107
|
JSON data
|
dropped
|
||
Chrome Cache Entry: 108
|
HTML document, ASCII text, with very long lines (639), with CRLF, LF line terminators
|
downloaded
|
||
Chrome Cache Entry: 109
|
JSON data
|
downloaded
|
||
Chrome Cache Entry: 110
|
PNG image data, 533 x 478, 8-bit/color RGBA, non-interlaced
|
dropped
|
||
Chrome Cache Entry: 70
|
PNG image data, 533 x 478, 8-bit/color RGBA, non-interlaced
|
dropped
|
||
Chrome Cache Entry: 71
|
PNG image data, 533 x 478, 8-bit/color RGBA, non-interlaced
|
downloaded
|
||
Chrome Cache Entry: 72
|
SVG Scalable Vector Graphics image
|
dropped
|
||
Chrome Cache Entry: 73
|
JSON data
|
dropped
|
||
Chrome Cache Entry: 74
|
PNG image data, 533 x 478, 8-bit/color RGBA, non-interlaced
|
dropped
|
||
Chrome Cache Entry: 75
|
ASCII text, with very long lines (65536), with no line terminators
|
downloaded
|
||
Chrome Cache Entry: 76
|
ASCII text, with no line terminators
|
downloaded
|
||
Chrome Cache Entry: 77
|
ASCII text, with very long lines (65410)
|
dropped
|
||
Chrome Cache Entry: 78
|
JSON data
|
dropped
|
||
Chrome Cache Entry: 79
|
ASCII text, with very long lines (65410)
|
downloaded
|
||
Chrome Cache Entry: 80
|
JSON data
|
downloaded
|
||
Chrome Cache Entry: 81
|
ASCII text, with very long lines (52717), with no line terminators
|
dropped
|
||
Chrome Cache Entry: 82
|
ASCII text
|
downloaded
|
||
Chrome Cache Entry: 83
|
ASCII text, with very long lines (52717), with no line terminators
|
downloaded
|
||
Chrome Cache Entry: 84
|
exported SGML document, ASCII text, with very long lines (65536), with no line terminators
|
downloaded
|
||
Chrome Cache Entry: 85
|
PNG image data, 533 x 478, 8-bit/color RGBA, non-interlaced
|
downloaded
|
||
Chrome Cache Entry: 86
|
MS Windows icon resource - 6 icons, -128x-128, 16 colors, 72x72, 16 colors
|
downloaded
|
||
Chrome Cache Entry: 87
|
ASCII text, with very long lines (46884)
|
downloaded
|
||
Chrome Cache Entry: 88
|
JSON data
|
dropped
|
||
Chrome Cache Entry: 89
|
MS Windows icon resource - 6 icons, -128x-128, 16 colors, 72x72, 16 colors
|
dropped
|
||
Chrome Cache Entry: 90
|
PNG image data, 658 x 480, 8-bit/color RGBA, non-interlaced
|
downloaded
|
||
Chrome Cache Entry: 91
|
ASCII text, with very long lines (33148), with no line terminators
|
dropped
|
||
Chrome Cache Entry: 92
|
JSON data
|
downloaded
|
||
Chrome Cache Entry: 93
|
JPEG image data, JFIF standard 1.01, aspect ratio, density 1x1, segment length 16, baseline, precision 8, 1528x402, components
3
|
dropped
|
||
Chrome Cache Entry: 94
|
PNG image data, 475 x 212, 8-bit/color RGBA, non-interlaced
|
downloaded
|
||
Chrome Cache Entry: 95
|
JSON data
|
dropped
|
||
Chrome Cache Entry: 96
|
JSON data
|
downloaded
|
||
Chrome Cache Entry: 97
|
JSON data
|
dropped
|
||
Chrome Cache Entry: 98
|
JPEG image data, JFIF standard 1.01, aspect ratio, density 1x1, segment length 16, baseline, precision 8, 1528x402, components
3
|
downloaded
|
||
Chrome Cache Entry: 99
|
exported SGML document, ASCII text, with very long lines (65536), with no line terminators
|
dropped
|
There are 32 hidden files, click here to show them.
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\file.exe
|
"C:\Users\user\Desktop\file.exe"
|
||
C:\Program Files\Google\Chrome\Application\chrome.exe
|
"C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized --single-argument http://go.microsoft.com/fwlink/?prd=11324&pver=4.5&sbp=AppLaunch2&plcid=0x409&o1=SHIM_NOVERSION_FOUND&version=(null)&processName=file.exe&platform=0009&osver=6&isServer=0&shimver=4.0.30319.0
|
||
C:\Program Files\Google\Chrome\Application\chrome.exe
|
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US
--service-sandbox-type=none --mojo-platform-channel-handle=2152 --field-trial-handle=1936,i,6285013393734485110,13074657082886557463,262144
--disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction
/prefetch:8
|
||
C:\Program Files\Google\Chrome\Application\chrome.exe
|
"C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized --single-argument http://go.microsoft.com/fwlink/?prd=11324&pver=4.5&sbp=AppLaunch2&plcid=0x409&o1=SHIM_NOVERSION_FOUND&version=(null)&processName=file.exe&platform=0009&osver=6&isServer=0&shimver=4.0.30319.0
|
||
C:\Program Files\Google\Chrome\Application\chrome.exe
|
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US
--service-sandbox-type=none --mojo-platform-channel-handle=2040 --field-trial-handle=2004,i,5650072745666498097,8566792970818888660,262144
--disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction
/prefetch:8
|
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
https://community.fastly.steamstatic.com/public/shared/images/responsive/header_menu_hamburger.png
|
unknown
|
||
https://duckduckgo.com/chrome_newtab
|
unknown
|
||
https://duckduckgo.com/ac/?q=
|
unknown
|
||
https://community.fastly.steamstatic.com/public/css/promo/summer2017/stickers.css?v=Ncr6N09yZIap&
|
unknown
|
||
https://marshal-zhukov.com/jX
|
unknown
|
||
https://steamcommunity.com/(S
|
unknown
|
||
https://steamcommunity.com/?subsection=broadcasts
|
unknown
|
||
https://bridge.lga1.admarketplace.net/ctp?version=16.0.0&key=1696332238301000001.2&ci=1696332238417.
|
unknown
|
||
https://www.linkedin.com/cws/share?url=$
|
unknown
|
||
https://store.steampowered.com/subscriber_agreement/
|
unknown
|
||
http://185.215.113.16/off/def.exeO
|
unknown
|
||
https://github.com/Youssef1313
|
unknown
|
||
https://management.azure.com/providers/Microsoft.Portal/userSettings/cloudconsole?api-version=2023-0
|
unknown
|
||
https://aka.ms/msignite_docs_banner
|
unknown
|
||
https://videoencodingpublic-hgeaeyeba8gycee3.b01.azurefd.net/public-b4da8140-92cf-421c-8b7b-e471d5b9
|
unknown
|
||
http://polymer.github.io/AUTHORS.txt
|
unknown
|
||
https://github.com/dotnet/docs/issues/new?template=z-customer-feedback.yml
|
unknown
|
||
http://www.valvesoftware.com/legal.htm
|
unknown
|
||
https://community.fastly.steamstatic.com/public/shared/css/shared_global.css?v=wuA4X_n5-mo0&l=en
|
unknown
|
||
https://marshal-zhukov.com/apite
|
unknown
|
||
https://management.azure.com/subscriptions?api-version=2016-06-01
|
unknown
|
||
https://github.com/dotnet/docs/blob/main/docs/framework/install/application-not-started.md
|
unknown
|
||
https://imp.mt48.net/static?id=7RHzfOIXjFEYsBdvIpkX4QqmfZfYfQfafZbXfpbWfpbX7ReNxR3UIG8zInwYIFIVs9eYi
|
unknown
|
||
http://185.215.113.16/off/def.exemP
|
unknown
|
||
https://aka.ms/pshelpmechoose
|
unknown
|
||
https://aka.ms/feedback/report?space=61
|
unknown
|
||
https://www.valvesoftware.com/en/contact?contact-person=Translation%20Team%20Feedback
|
unknown
|
||
https://community.fastly.steamstatic.com/public/javascript/applications/community/libraries~b28b7af6
|
unknown
|
||
http://185.215.113.16/off/def.exep
|
unknown
|
||
https://learn-video.azurefd.net/vod/player
|
unknown
|
||
https://marshal-zhukov.com/s
|
unknown
|
||
https://community.fastly.steamstatic.com/public/shared/css/motiva_sans.css?v=-yZgCk0Nu7kH&l=engl
|
unknown
|
||
https://twitter.com/intent/tweet?original_referer=$
|
unknown
|
||
https://community.fastly.steamstatic.com/public/css/skin_1/profilev2.css?v=fe66ET2uI50l&l=englis
|
unknown
|
||
https://community.fastly.steamstatic.com/public/javascript/scriptaculous/_combined.js?v=pbdAKOcDIgbC
|
unknown
|
||
https://community.fastly.steamstatic.com/public/images/skin_1/footerLogo_valve.png?v=1
|
unknown
|
||
https://community.fastly.steamstatic.com/public/shared/css/buttons.css?v=qhQgyjWi6LgJ&l=english&
|
unknown
|
||
https://www.amazon.com/?tag=admarketus-20&ref=pd_sl_7548d4575af019e4c148ccf1a78112802e66a0816a72fc94
|
unknown
|
||
https://steamcommunity.com/profiles/76561199724331900
|
23.55.153.106
|
||
https://community.fastly.steamstatic.com/public/javascript/promo/stickers.js?v=CcLRHsa04otQ&l=en
|
unknown
|
||
https://management.azure.com/providers/Microsoft.Portal/consoles/default?api-version=2017-12-01-prev
|
unknown
|
||
https://github.com/Thraka
|
unknown
|
||
http://store.steampowered.com/privacy_agreement/
|
unknown
|
||
https://community.fastly.steamstatic.com/public/javascript/applications/community/main.js?v=OgygW_VD
|
unknown
|
||
http://polymer.github.io/PATENTS.txt
|
unknown
|
||
https://steamcommunity.com:443/profiles/76561199724331900
|
unknown
|
||
https://store.steampowered.com/points/shop/
|
unknown
|
||
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
|
unknown
|
||
http://crl.rootca1.amazontrust.com/rootca1.crl0
|
unknown
|
||
https://bridge.lga1.ap01.net/ctp?version=16.0.0&key=1696332238301000001.1&ci=1696332238417.12791&cta
|
unknown
|
||
https://marshal-zhukov.com/r:
|
unknown
|
||
https://js.monitor.azure.com/scripts/c/ms.jsll-4.min.js
|
13.107.246.63
|
||
http://ocsp.rootca1.amazontrust.com0:
|
unknown
|
||
https://support.office.com/article/7D48285B-20E8-4B9B-91AD-216E34163BAD?wt.mc_id=EnterPK2016
|
unknown
|
||
https://schema.org
|
unknown
|
||
http://polymer.github.io/LICENSE.txt
|
unknown
|
||
https://community.fastly.steamstatic.com/public/javascript/modalv2.js?v=zBXEuexVQ0FZ&l=english&a
|
unknown
|
||
https://www.ecosia.org/newtab/
|
unknown
|
||
https://steamcommunity.com/profiles/76561199724331900/inventory/
|
unknown
|
||
https://support.mozilla.org/kb/customize-firefox-controls-buttons-and-toolbars?utm_source=firefox-br
|
unknown
|
||
https://store.steampowered.com/privacy_agreement/
|
unknown
|
||
https://community.fastly.steamstatic.com/public/css/skin_1/modalContent.css?v=WXAusLHclDIt&l=eng
|
unknown
|
||
https://github.com/adegeo
|
unknown
|
||
https://support.microsof
|
unknown
|
||
https://community.fastly.steamstatic.com/public/javascript/global.js?v=jWc2JLWHx5Kn&l=english&am
|
unknown
|
||
https://octokit.github.io/rest.js/#throttling
|
unknown
|
||
https://github.com/js-cookie/js-cookie
|
unknown
|
||
http://185.215.113.16/off/def.exe
|
unknown
|
||
http://schema.org/Organization
|
unknown
|
||
https://community.fastly.steamstatic.com/public/javascript/webui/clientcom.js?v=nT6RHKdfWgaJ&l=e
|
unknown
|
||
https://support.office.com/article/7D48285B-20E8-4B9B-91AD-216E34163BAD?wt.mc_id=EnterPK2016Examples
|
unknown
|
||
https://community.fastly.steamstatic.com/public/javascript/applications/community/manifest.js?v=jIFn
|
unknown
|
||
https://github.com/dotnet/try
|
unknown
|
||
https://store.steampowered.com/about/
|
unknown
|
||
https://authoring-docs-microsoft.poolparty.biz/devrel/7696cda6-0510-47f6-8302-71bb5d2e28cf
|
unknown
|
||
https://steamcommunity.com/my/wishlist/
|
unknown
|
||
https://community.fastly.steamstatic.com/public/css/applications/community/main.css?v=4Vb3xc8UazdB&a
|
unknown
|
||
https://community.fastly.steamstatic.com/public/shared/css/shared_responsive.css?v=JL1e4uQSrVGe&
|
unknown
|
||
https://help.steampowered.com/en/
|
unknown
|
||
https://steamcommunity.com/market/
|
unknown
|
||
https://store.steampowered.com/news/
|
unknown
|
||
https://github.com/dotnet/docs/blob/17c4acca45e573a92878a44a2cce57d699fe9c7c/docs/framework/install/
|
unknown
|
||
https://marshal-zhukov.com/apiq3
|
unknown
|
||
https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
|
unknown
|
||
http://store.steampowered.com/subscriber_agreement/
|
unknown
|
||
https://steamcommunity.com/linkfilter/?u=http%3A%2F%2Fwww.geonames.org
|
unknown
|
||
https://support.office.com/article/94ba2e0b-638e-4a92-8857-2cb5ac1d8e17
|
unknown
|
||
https://marshal-zhukov.com/apiq
|
unknown
|
||
https://steamcommunity.com/profiles/76561199724331900PS
|
unknown
|
||
https://marshal-zhukov.com/ZYa
|
unknown
|
||
https://steamcommunity.com/discussions/
|
unknown
|
||
https://marshal-zhukov.com:443/apiyq
|
unknown
|
||
https://store.steampowered.com/stats/
|
unknown
|
||
https://community.fastly.steamstatic.com/public/shared/javascript/shared_global.js?v=Gr6TbGRvDtNE&am
|
unknown
|
||
https://community.fastly.steamstatic.com/public/shared/images/responsive/logo_valve_footer.png
|
unknown
|
||
https://community.fastly.steamstatic.com/public/css/skin_1/header.css?v=EM4kCu67DNda&l=english&a
|
unknown
|
||
https://store.steampowered.com/steam_refunds/
|
unknown
|
||
http://x1.c.lencr.org/0
|
unknown
|
||
http://x1.i.lencr.org/0
|
unknown
|
||
https://support.office.com/article/94ba2e0b-638e-4a92-8857-2cb5ac1d8e17Install
|
unknown
|
There are 90 hidden URLs, click here to show them.
Domains
Name
|
IP
|
Malicious
|
|
---|---|---|---|
steamcommunity.com
|
23.55.153.106
|
||
marshal-zhukov.com
|
104.21.82.174
|
||
www.google.com
|
142.250.181.68
|
||
s-part-0035.t-0009.t-msedge.net
|
13.107.246.63
|
||
js.monitor.azure.com
|
unknown
|
||
mdec.nelreports.net
|
unknown
|
||
savvy-steereo.sbs
|
unknown
|
||
plastic-mitten.sbs
|
unknown
|
||
record-envyp.sbs
|
unknown
|
||
hallowed-noisy.sbs
|
unknown
|
||
copper-replace.sbs
|
unknown
|
||
wrench-creter.sbs
|
unknown
|
||
slam-whipp.sbs
|
unknown
|
||
looky-marked.sbs
|
unknown
|
||
preside-comforter.sbs
|
unknown
|
There are 5 hidden domains, click here to show them.
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
192.168.2.4
|
unknown
|
unknown
|
||
13.107.246.63
|
s-part-0035.t-0009.t-msedge.net
|
United States
|
||
185.215.113.16
|
unknown
|
Portugal
|
||
239.255.255.250
|
unknown
|
Reserved
|
||
104.21.82.174
|
marshal-zhukov.com
|
United States
|
||
23.55.153.106
|
steamcommunity.com
|
United States
|
||
142.250.181.68
|
www.google.com
|
United States
|
Registry
Path
|
Value
|
Malicious
|
|
---|---|---|---|
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer
|
SlowContextMenuEntries
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer
|
SlowContextMenuEntries
|
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
1300000
|
heap
|
page read and write
|
||
153E000
|
stack
|
page read and write
|
||
5A75000
|
trusted library allocation
|
page read and write
|
||
D60000
|
direct allocation
|
page read and write
|
||
5A44000
|
trusted library allocation
|
page read and write
|
||
5A6D000
|
trusted library allocation
|
page read and write
|
||
1025000
|
unkown
|
page execute and read and write
|
||
1326000
|
heap
|
page read and write
|
||
1343000
|
trusted library allocation
|
page read and write
|
||
5A84000
|
trusted library allocation
|
page read and write
|
||
5A82000
|
trusted library allocation
|
page read and write
|
||
80F0000
|
direct allocation
|
page read and write
|
||
75EE000
|
stack
|
page read and write
|
||
C94000
|
heap
|
page read and write
|
||
6CEF000
|
stack
|
page read and write
|
||
5A86000
|
trusted library allocation
|
page read and write
|
||
142C000
|
trusted library allocation
|
page read and write
|
||
5A85000
|
trusted library allocation
|
page read and write
|
||
5AA4000
|
trusted library allocation
|
page read and write
|
||
64DB000
|
trusted library allocation
|
page read and write
|
||
D60000
|
direct allocation
|
page read and write
|
||
5AA4000
|
trusted library allocation
|
page read and write
|
||
F47000
|
unkown
|
page execute and read and write
|
||
5C5C000
|
trusted library allocation
|
page read and write
|
||
132B000
|
heap
|
page read and write
|
||
5B77000
|
trusted library allocation
|
page read and write
|
||
5A51000
|
trusted library allocation
|
page read and write
|
||
1349000
|
trusted library allocation
|
page read and write
|
||
5C5E000
|
trusted library allocation
|
page read and write
|
||
879C000
|
stack
|
page read and write
|
||
6020000
|
direct allocation
|
page read and write
|
||
5A65000
|
trusted library allocation
|
page read and write
|
||
142D000
|
trusted library allocation
|
page read and write
|
||
5A61000
|
trusted library allocation
|
page read and write
|
||
5A76000
|
trusted library allocation
|
page read and write
|
||
83DE000
|
stack
|
page read and write
|
||
1350000
|
trusted library allocation
|
page read and write
|
||
134A000
|
trusted library allocation
|
page read and write
|
||
132B000
|
heap
|
page read and write
|
||
5C5E000
|
trusted library allocation
|
page read and write
|
||
1324000
|
heap
|
page read and write
|
||
5C5D000
|
trusted library allocation
|
page read and write
|
||
5A76000
|
trusted library allocation
|
page read and write
|
||
50AF000
|
stack
|
page read and write
|
||
133D000
|
heap
|
page read and write
|
||
5A85000
|
trusted library allocation
|
page read and write
|
||
5A79000
|
trusted library allocation
|
page read and write
|
||
1320000
|
heap
|
page read and write
|
||
5A85000
|
trusted library allocation
|
page read and write
|
||
49AF000
|
stack
|
page read and write
|
||
5A48000
|
trusted library allocation
|
page read and write
|
||
5AA5000
|
trusted library allocation
|
page read and write
|
||
1425000
|
trusted library allocation
|
page read and write
|
||
5EFC000
|
trusted library allocation
|
page execute and read and write
|
||
5A85000
|
trusted library allocation
|
page read and write
|
||
5A7B000
|
trusted library allocation
|
page read and write
|
||
5C53000
|
trusted library allocation
|
page read and write
|
||
5A65000
|
trusted library allocation
|
page read and write
|
||
5ADD000
|
trusted library allocation
|
page read and write
|
||
DB3000
|
unkown
|
page execute and read and write
|
||
5A62000
|
trusted library allocation
|
page read and write
|
||
5A76000
|
trusted library allocation
|
page read and write
|
||
5C60000
|
trusted library allocation
|
page read and write
|
||
5C52000
|
trusted library allocation
|
page read and write
|
||
5A5A000
|
trusted library allocation
|
page read and write
|
||
35EE000
|
stack
|
page read and write
|
||
134F000
|
trusted library allocation
|
page read and write
|
||
6020000
|
direct allocation
|
page read and write
|
||
5C53000
|
trusted library allocation
|
page read and write
|
||
13D2000
|
trusted library allocation
|
page read and write
|
||
1439000
|
trusted library allocation
|
page read and write
|
||
A3B000
|
stack
|
page read and write
|
||
132D000
|
heap
|
page read and write
|
||
5A85000
|
trusted library allocation
|
page read and write
|
||
5AEE000
|
trusted library allocation
|
page read and write
|
||
5A9D000
|
trusted library allocation
|
page read and write
|
||
5A53000
|
trusted library allocation
|
page read and write
|
||
5A5F000
|
trusted library allocation
|
page read and write
|
||
1439000
|
stack
|
page read and write
|
||
1302000
|
heap
|
page read and write
|
||
4AF1000
|
heap
|
page read and write
|
||
1347000
|
trusted library allocation
|
page read and write
|
||
5AA4000
|
trusted library allocation
|
page read and write
|
||
1206000
|
unkown
|
page execute and write copy
|
||
5A75000
|
trusted library allocation
|
page read and write
|
||
6244000
|
trusted library allocation
|
page read and write
|
||
6020000
|
direct allocation
|
page read and write
|
||
5AA3000
|
trusted library allocation
|
page read and write
|
||
3D2F000
|
stack
|
page read and write
|
||
5B97000
|
trusted library allocation
|
page read and write
|
||
521E000
|
stack
|
page read and write
|
||
5C59000
|
trusted library allocation
|
page read and write
|
||
5A85000
|
trusted library allocation
|
page read and write
|
||
5A76000
|
trusted library allocation
|
page read and write
|
||
1349000
|
trusted library allocation
|
page read and write
|
||
148F000
|
trusted library allocation
|
page read and write
|
||
5AE7000
|
trusted library allocation
|
page read and write
|
||
133B000
|
heap
|
page read and write
|
||
D60000
|
direct allocation
|
page read and write
|
||
6020000
|
direct allocation
|
page read and write
|
||
C94000
|
heap
|
page read and write
|
||
1294000
|
heap
|
page read and write
|
||
1431000
|
trusted library allocation
|
page read and write
|
||
6020000
|
direct allocation
|
page read and write
|
||
5A4F000
|
trusted library allocation
|
page read and write
|
||
1344000
|
trusted library allocation
|
page read and write
|
||
5C51000
|
trusted library allocation
|
page read and write
|
||
1344000
|
trusted library allocation
|
page read and write
|
||
5C0F000
|
trusted library allocation
|
page read and write
|
||
1347000
|
trusted library allocation
|
page read and write
|
||
12C7000
|
heap
|
page read and write
|
||
5ABE000
|
trusted library allocation
|
page read and write
|
||
5A66000
|
trusted library allocation
|
page read and write
|
||
5A75000
|
trusted library allocation
|
page read and write
|
||
772E000
|
stack
|
page read and write
|
||
5A59000
|
trusted library allocation
|
page read and write
|
||
C70000
|
heap
|
page read and write
|
||
5A7C000
|
trusted library allocation
|
page read and write
|
||
1318000
|
heap
|
page read and write
|
||
55DF000
|
stack
|
page read and write
|
||
1435000
|
trusted library allocation
|
page read and write
|
||
1334000
|
heap
|
page read and write
|
||
5ABD000
|
trusted library allocation
|
page read and write
|
||
4AF1000
|
heap
|
page read and write
|
||
5A7E000
|
trusted library allocation
|
page read and write
|
||
5A85000
|
trusted library allocation
|
page read and write
|
||
67EF000
|
stack
|
page read and write
|
||
6020000
|
direct allocation
|
page read and write
|
||
5A7B000
|
trusted library allocation
|
page read and write
|
||
4AF1000
|
heap
|
page read and write
|
||
5A56000
|
trusted library allocation
|
page read and write
|
||
5A63000
|
trusted library allocation
|
page read and write
|
||
8410000
|
heap
|
page read and write
|
||
134C000
|
trusted library allocation
|
page read and write
|
||
140E000
|
trusted library allocation
|
page read and write
|
||
124E000
|
heap
|
page read and write
|
||
5AAD000
|
trusted library allocation
|
page read and write
|
||
13EC000
|
trusted library allocation
|
page read and write
|
||
5AA4000
|
trusted library allocation
|
page read and write
|
||
133E000
|
heap
|
page read and write
|
||
35AF000
|
stack
|
page read and write
|
||
5C50000
|
trusted library allocation
|
page read and write
|
||
5AD2000
|
trusted library allocation
|
page read and write
|
||
50D0000
|
direct allocation
|
page execute and read and write
|
||
796F000
|
stack
|
page read and write
|
||
5A8F000
|
trusted library allocation
|
page read and write
|
||
1205000
|
unkown
|
page execute and read and write
|
||
132B000
|
heap
|
page read and write
|
||
1321000
|
heap
|
page read and write
|
||
1343000
|
trusted library allocation
|
page read and write
|
||
5AA3000
|
trusted library allocation
|
page read and write
|
||
1304000
|
heap
|
page read and write
|
||
1340000
|
trusted library allocation
|
page read and write
|
||
5A5E000
|
trusted library allocation
|
page read and write
|
||
5A75000
|
trusted library allocation
|
page read and write
|
||
134C000
|
trusted library allocation
|
page read and write
|
||
5B46000
|
trusted library allocation
|
page read and write
|
||
3E6F000
|
stack
|
page read and write
|
||
5A48000
|
trusted library allocation
|
page read and write
|
||
6042000
|
trusted library allocation
|
page read and write
|
||
C94000
|
heap
|
page read and write
|
||
5A85000
|
trusted library allocation
|
page read and write
|
||
5A6D000
|
trusted library allocation
|
page read and write
|
||
5AB6000
|
trusted library allocation
|
page read and write
|
||
4AF1000
|
heap
|
page read and write
|
||
5A96000
|
trusted library allocation
|
page read and write
|
||
1341000
|
trusted library allocation
|
page read and write
|
||
5A6C000
|
trusted library allocation
|
page read and write
|
||
134D000
|
trusted library allocation
|
page read and write
|
||
13E9000
|
trusted library allocation
|
page read and write
|
||
5A74000
|
trusted library allocation
|
page read and write
|
||
58FE000
|
stack
|
page read and write
|
||
5AD6000
|
trusted library allocation
|
page read and write
|
||
1341000
|
trusted library allocation
|
page read and write
|
||
4FB2000
|
direct allocation
|
page read and write
|
||
5AAD000
|
trusted library allocation
|
page read and write
|
||
D60000
|
direct allocation
|
page read and write
|
||
66EF000
|
stack
|
page read and write
|
||
1318000
|
heap
|
page read and write
|
||
5AB3000
|
trusted library allocation
|
page read and write
|
||
1052000
|
unkown
|
page execute and read and write
|
||
5BE7000
|
trusted library allocation
|
page read and write
|
||
9E80000
|
trusted library allocation
|
page read and write
|
||
1343000
|
trusted library allocation
|
page read and write
|
||
5A5A000
|
trusted library allocation
|
page read and write
|
||
48AE000
|
stack
|
page read and write
|
||
1448000
|
trusted library allocation
|
page read and write
|
||
5A76000
|
trusted library allocation
|
page read and write
|
||
5110000
|
direct allocation
|
page execute and read and write
|
||
5ADD000
|
trusted library allocation
|
page read and write
|
||
5A85000
|
trusted library allocation
|
page read and write
|
||
732F000
|
stack
|
page read and write
|
||
5A9C000
|
trusted library allocation
|
page read and write
|
||
1308000
|
heap
|
page read and write
|
||
59FF000
|
stack
|
page read and write
|
||
C94000
|
heap
|
page read and write
|
||
C94000
|
heap
|
page read and write
|
||
1303000
|
heap
|
page read and write
|
||
8120000
|
heap
|
page read and write
|
||
D60000
|
direct allocation
|
page read and write
|
||
5A49000
|
trusted library allocation
|
page read and write
|
||
44EE000
|
stack
|
page read and write
|
||
148D000
|
trusted library allocation
|
page read and write
|
||
600F000
|
stack
|
page read and write
|
||
476E000
|
stack
|
page read and write
|
||
5A57000
|
trusted library allocation
|
page read and write
|
||
1346000
|
trusted library allocation
|
page read and write
|
||
396F000
|
stack
|
page read and write
|
||
142F000
|
trusted library allocation
|
page read and write
|
||
134D000
|
trusted library allocation
|
page read and write
|
||
C94000
|
heap
|
page read and write
|
||
133E000
|
heap
|
page read and write
|
||
8420000
|
trusted library allocation
|
page read and write
|
||
5A68000
|
trusted library allocation
|
page read and write
|
||
1346000
|
trusted library allocation
|
page read and write
|
||
3BEF000
|
stack
|
page read and write
|
||
4AF1000
|
heap
|
page read and write
|
||
80EF000
|
stack
|
page read and write
|
||
5A65000
|
trusted library allocation
|
page read and write
|
||
3D6E000
|
stack
|
page read and write
|
||
C94000
|
heap
|
page read and write
|
||
8110000
|
trusted library allocation
|
page read and write
|
||
5A7B000
|
trusted library allocation
|
page read and write
|
||
124A000
|
heap
|
page read and write
|
||
5C60000
|
trusted library allocation
|
page read and write
|
||
1342000
|
trusted library allocation
|
page read and write
|
||
134B000
|
trusted library allocation
|
page read and write
|
||
1345000
|
trusted library allocation
|
page read and write
|
||
4FAC000
|
stack
|
page read and write
|
||
55E0000
|
remote allocation
|
page read and write
|
||
5C5C000
|
trusted library allocation
|
page read and write
|
||
5121000
|
trusted library allocation
|
page read and write
|
||
5A76000
|
trusted library allocation
|
page read and write
|
||
1346000
|
trusted library allocation
|
page read and write
|
||
5DE2000
|
trusted library allocation
|
page execute and read and write
|
||
1318000
|
heap
|
page read and write
|
||
332F000
|
stack
|
page read and write
|
||
134F000
|
trusted library allocation
|
page read and write
|
||
5A76000
|
trusted library allocation
|
page read and write
|
||
5C61000
|
trusted library allocation
|
page read and write
|
||
134E000
|
trusted library allocation
|
page read and write
|
||
5A76000
|
trusted library allocation
|
page read and write
|
||
5A85000
|
trusted library allocation
|
page read and write
|
||
134A000
|
trusted library allocation
|
page read and write
|
||
133B000
|
heap
|
page read and write
|
||
5A48000
|
trusted library allocation
|
page read and write
|
||
C94000
|
heap
|
page read and write
|
||
12B2000
|
heap
|
page read and write
|
||
579E000
|
stack
|
page read and write
|
||
5A75000
|
trusted library allocation
|
page read and write
|
||
5A85000
|
trusted library allocation
|
page read and write
|
||
5A76000
|
trusted library allocation
|
page read and write
|
||
129C000
|
heap
|
page read and write
|
||
5A65000
|
trusted library allocation
|
page read and write
|
||
7FEE000
|
stack
|
page read and write
|
||
5A73000
|
trusted library allocation
|
page read and write
|
||
D60000
|
direct allocation
|
page read and write
|
||
6020000
|
direct allocation
|
page read and write
|
||
1346000
|
trusted library allocation
|
page read and write
|
||
147E000
|
stack
|
page read and write
|
||
5A62000
|
trusted library allocation
|
page read and write
|
||
5AB6000
|
trusted library allocation
|
page read and write
|
||
12A9000
|
heap
|
page read and write
|
||
1350000
|
trusted library allocation
|
page read and write
|
||
5C54000
|
trusted library allocation
|
page read and write
|
||
412D000
|
stack
|
page read and write
|
||
4AF1000
|
heap
|
page read and write
|
||
6A6F000
|
stack
|
page read and write
|
||
64E8000
|
trusted library allocation
|
page read and write
|
||
2D9E000
|
stack
|
page read and write
|
||
5A7A000
|
trusted library allocation
|
page read and write
|
||
5A85000
|
trusted library allocation
|
page read and write
|
||
13D9000
|
trusted library allocation
|
page read and write
|
||
133B000
|
heap
|
page read and write
|
||
80F0000
|
direct allocation
|
page read and write
|
||
5A56000
|
trusted library allocation
|
page read and write
|
||
5AB0000
|
trusted library allocation
|
page read and write
|
||
146C000
|
trusted library allocation
|
page read and write
|
||
D60000
|
direct allocation
|
page read and write
|
||
12C6000
|
heap
|
page read and write
|
||
140A000
|
trusted library allocation
|
page read and write
|
||
1285000
|
heap
|
page read and write
|
||
5C5B000
|
trusted library allocation
|
page read and write
|
||
5A85000
|
trusted library allocation
|
page read and write
|
||
5A51000
|
trusted library allocation
|
page read and write
|
||
5A48000
|
trusted library allocation
|
page read and write
|
||
7BEF000
|
stack
|
page read and write
|
||
5A85000
|
trusted library allocation
|
page read and write
|
||
5A7C000
|
trusted library allocation
|
page read and write
|
||
147C000
|
trusted library allocation
|
page read and write
|
||
5ADD000
|
trusted library allocation
|
page read and write
|
||
131B000
|
heap
|
page read and write
|
||
5A51000
|
trusted library allocation
|
page read and write
|
||
133E000
|
heap
|
page read and write
|
||
12B5000
|
heap
|
page read and write
|
||
12A7000
|
heap
|
page read and write
|
||
5A65000
|
trusted library allocation
|
page read and write
|
||
5A85000
|
trusted library allocation
|
page read and write
|
||
5C58000
|
trusted library allocation
|
page read and write
|
||
5C58000
|
trusted library allocation
|
page read and write
|
||
B90000
|
heap
|
page read and write
|
||
5A85000
|
trusted library allocation
|
page read and write
|
||
535D000
|
stack
|
page read and write
|
||
132D000
|
heap
|
page read and write
|
||
1304000
|
heap
|
page read and write
|
||
C94000
|
heap
|
page read and write
|
||
12B5000
|
heap
|
page read and write
|
||
4AF1000
|
heap
|
page read and write
|
||
5C5C000
|
trusted library allocation
|
page read and write
|
||
4AF1000
|
heap
|
page read and write
|
||
5A6D000
|
trusted library allocation
|
page read and write
|
||
70EE000
|
stack
|
page read and write
|
||
5A5D000
|
trusted library allocation
|
page read and write
|
||
5A57000
|
trusted library allocation
|
page read and write
|
||
5AB6000
|
trusted library allocation
|
page read and write
|
||
786E000
|
stack
|
page read and write
|
||
5A6D000
|
trusted library allocation
|
page read and write
|
||
5A7B000
|
trusted library allocation
|
page read and write
|
||
1350000
|
trusted library allocation
|
page read and write
|
||
2DE0000
|
heap
|
page read and write
|
||
8422000
|
trusted library allocation
|
page read and write
|
||
4B01000
|
heap
|
page read and write
|
||
5C52000
|
trusted library allocation
|
page read and write
|
||
5A7D000
|
trusted library allocation
|
page read and write
|
||
1410000
|
trusted library allocation
|
page read and write
|
||
C94000
|
heap
|
page read and write
|
||
5A85000
|
trusted library allocation
|
page read and write
|
||
1318000
|
heap
|
page read and write
|
||
6D2E000
|
stack
|
page read and write
|
||
13FC000
|
trusted library allocation
|
page read and write
|
||
5B5F000
|
trusted library allocation
|
page read and write
|
||
134D000
|
trusted library allocation
|
page read and write
|
||
549F000
|
stack
|
page read and write
|
||
6020000
|
direct allocation
|
page read and write
|
||
5A85000
|
trusted library allocation
|
page read and write
|
||
1346000
|
trusted library allocation
|
page read and write
|
||
1328000
|
heap
|
page read and write
|
||
131B000
|
heap
|
page read and write
|
||
9E3E000
|
stack
|
page read and write
|
||
1419000
|
trusted library allocation
|
page read and write
|
||
1293000
|
heap
|
page read and write
|
||
5A85000
|
trusted library allocation
|
page read and write
|
||
5A52000
|
trusted library allocation
|
page read and write
|
||
5A65000
|
trusted library allocation
|
page read and write
|
||
5A85000
|
trusted library allocation
|
page read and write
|
||
50C0000
|
direct allocation
|
page execute and read and write
|
||
5A51000
|
trusted library allocation
|
page read and write
|
||
5C56000
|
trusted library allocation
|
page read and write
|
||
1343000
|
trusted library allocation
|
page read and write
|
||
5A51000
|
trusted library allocation
|
page read and write
|
||
1342000
|
trusted library allocation
|
page read and write
|
||
5A79000
|
trusted library allocation
|
page read and write
|
||
5A76000
|
trusted library allocation
|
page read and write
|
||
2EEF000
|
stack
|
page read and write
|
||
5AA5000
|
trusted library allocation
|
page read and write
|
||
5AE6000
|
trusted library allocation
|
page read and write
|
||
4AF1000
|
heap
|
page read and write
|
||
134C000
|
trusted library allocation
|
page read and write
|
||
1407000
|
trusted library allocation
|
page read and write
|
||
696E000
|
stack
|
page read and write
|
||
5C52000
|
trusted library allocation
|
page read and write
|
||
5C1F000
|
trusted library allocation
|
page read and write
|
||
4AF1000
|
heap
|
page read and write
|
||
5A85000
|
trusted library allocation
|
page read and write
|
||
4F70000
|
direct allocation
|
page read and write
|
||
5A51000
|
trusted library allocation
|
page read and write
|
||
5AD3000
|
trusted library allocation
|
page read and write
|
||
134B000
|
trusted library allocation
|
page read and write
|
||
5A65000
|
trusted library allocation
|
page read and write
|
||
5A68000
|
trusted library allocation
|
page read and write
|
||
C94000
|
heap
|
page read and write
|
||
5EED000
|
trusted library allocation
|
page execute and read and write
|
||
C94000
|
heap
|
page read and write
|
||
5C5F000
|
trusted library allocation
|
page read and write
|
||
782F000
|
stack
|
page read and write
|
||
D71000
|
unkown
|
page execute and write copy
|
||
4AEF000
|
stack
|
page read and write
|
||
1311000
|
heap
|
page read and write
|
||
12C4000
|
heap
|
page read and write
|
||
49EE000
|
stack
|
page read and write
|
||
C94000
|
heap
|
page read and write
|
||
3FAF000
|
stack
|
page read and write
|
||
1349000
|
trusted library allocation
|
page read and write
|
||
5C5D000
|
trusted library allocation
|
page read and write
|
||
45EF000
|
stack
|
page read and write
|
||
D70000
|
unkown
|
page readonly
|
||
13DE000
|
trusted library allocation
|
page read and write
|
||
D60000
|
direct allocation
|
page read and write
|
||
B3B000
|
stack
|
page read and write
|
||
5A8D000
|
trusted library allocation
|
page read and write
|
||
1300000
|
heap
|
page read and write
|
||
5A84000
|
trusted library allocation
|
page read and write
|
||
1348000
|
trusted library allocation
|
page read and write
|
||
4F30000
|
heap
|
page read and write
|
||
1349000
|
trusted library allocation
|
page read and write
|
||
5100000
|
direct allocation
|
page execute and read and write
|
||
2FEF000
|
stack
|
page read and write
|
||
134A000
|
trusted library allocation
|
page read and write
|
||
5A76000
|
trusted library allocation
|
page read and write
|
||
5AC5000
|
trusted library allocation
|
page read and write
|
||
5A66000
|
trusted library allocation
|
page read and write
|
||
132C000
|
heap
|
page read and write
|
||
6020000
|
direct allocation
|
page read and write
|
||
1437000
|
trusted library allocation
|
page read and write
|
||
5A66000
|
trusted library allocation
|
page read and write
|
||
134C000
|
trusted library allocation
|
page read and write
|
||
5A56000
|
trusted library allocation
|
page read and write
|
||
D60000
|
direct allocation
|
page read and write
|
||
12F7000
|
heap
|
page read and write
|
||
50E0000
|
direct allocation
|
page execute and read and write
|
||
14FE000
|
stack
|
page read and write
|
||
336E000
|
stack
|
page read and write
|
||
1350000
|
trusted library allocation
|
page read and write
|
||
8429000
|
trusted library allocation
|
page read and write
|
||
9C80000
|
trusted library allocation
|
page read and write
|
||
134E000
|
trusted library allocation
|
page read and write
|
||
5A86000
|
trusted library allocation
|
page read and write
|
||
1423000
|
trusted library allocation
|
page read and write
|
||
1342000
|
trusted library allocation
|
page read and write
|
||
88DE000
|
stack
|
page read and write
|
||
7E6F000
|
stack
|
page read and write
|
||
58A0000
|
direct allocation
|
page read and write
|
||
5CAF000
|
trusted library allocation
|
page read and write
|
||
5A84000
|
trusted library allocation
|
page read and write
|
||
5C5E000
|
trusted library allocation
|
page read and write
|
||
13DB000
|
trusted library allocation
|
page read and write
|
||
12D8000
|
heap
|
page read and write
|
||
5B2B000
|
trusted library allocation
|
page read and write
|
||
C94000
|
heap
|
page read and write
|
||
5A85000
|
trusted library allocation
|
page read and write
|
||
1425000
|
trusted library allocation
|
page read and write
|
||
1347000
|
trusted library allocation
|
page read and write
|
||
1220000
|
direct allocation
|
page read and write
|
||
5A53000
|
trusted library allocation
|
page read and write
|
||
134A000
|
trusted library allocation
|
page read and write
|
||
1305000
|
heap
|
page read and write
|
||
5A76000
|
trusted library allocation
|
page read and write
|
||
5A76000
|
trusted library allocation
|
page read and write
|
||
DC7000
|
unkown
|
page execute and read and write
|
||
1427000
|
trusted library allocation
|
page read and write
|
||
5A85000
|
trusted library allocation
|
page read and write
|
||
105B000
|
unkown
|
page execute and read and write
|
||
50E0000
|
direct allocation
|
page execute and read and write
|
||
5AA2000
|
trusted library allocation
|
page read and write
|
||
D60000
|
direct allocation
|
page read and write
|
||
5A48000
|
trusted library allocation
|
page read and write
|
||
4AF1000
|
heap
|
page read and write
|
||
1301000
|
heap
|
page read and write
|
||
141D000
|
trusted library allocation
|
page read and write
|
||
DC5000
|
unkown
|
page read and write
|
||
5A68000
|
trusted library allocation
|
page read and write
|
||
1328000
|
heap
|
page read and write
|
||
1331000
|
heap
|
page read and write
|
||
5A76000
|
trusted library allocation
|
page read and write
|
||
1311000
|
heap
|
page read and write
|
||
5A66000
|
trusted library allocation
|
page read and write
|
||
5AA8000
|
trusted library allocation
|
page read and write
|
||
133E000
|
heap
|
page read and write
|
||
5AA5000
|
trusted library allocation
|
page read and write
|
||
43AE000
|
stack
|
page read and write
|
||
3C2E000
|
stack
|
page read and write
|
||
572E000
|
stack
|
page read and write
|
||
141F000
|
trusted library allocation
|
page read and write
|
||
5C5E000
|
trusted library allocation
|
page read and write
|
||
39AE000
|
stack
|
page read and write
|
||
D60000
|
direct allocation
|
page read and write
|
||
5AC6000
|
trusted library allocation
|
page read and write
|
||
5A7B000
|
trusted library allocation
|
page read and write
|
||
12CF000
|
heap
|
page read and write
|
||
1343000
|
trusted library allocation
|
page read and write
|
||
34AE000
|
stack
|
page read and write
|
||
5A75000
|
trusted library allocation
|
page read and write
|
||
5A6F000
|
trusted library allocation
|
page read and write
|
||
133E000
|
heap
|
page read and write
|
||
1344000
|
trusted library allocation
|
page read and write
|
||
1300000
|
heap
|
page read and write
|
||
1324000
|
heap
|
page read and write
|
||
141B000
|
trusted library allocation
|
page read and write
|
||
50ED000
|
stack
|
page read and write
|
||
5C52000
|
trusted library allocation
|
page execute and read and write
|
||
D60000
|
direct allocation
|
page read and write
|
||
1343000
|
trusted library allocation
|
page read and write
|
||
50E0000
|
direct allocation
|
page execute and read and write
|
||
5A82000
|
trusted library allocation
|
page read and write
|
||
82C0000
|
direct allocation
|
page execute and read and write
|
||
5B2B000
|
trusted library allocation
|
page read and write
|
||
13E0000
|
trusted library allocation
|
page read and write
|
||
5A85000
|
trusted library allocation
|
page read and write
|
||
562D000
|
stack
|
page read and write
|
||
5A76000
|
trusted library allocation
|
page read and write
|
||
1429000
|
trusted library allocation
|
page read and write
|
||
5A85000
|
trusted library allocation
|
page read and write
|
||
5A69000
|
trusted library allocation
|
page read and write
|
||
5A76000
|
trusted library allocation
|
page read and write
|
||
130D000
|
heap
|
page read and write
|
||
134F000
|
trusted library allocation
|
page read and write
|
||
134A000
|
trusted library allocation
|
page read and write
|
||
5A79000
|
trusted library allocation
|
page read and write
|
||
1349000
|
trusted library allocation
|
page read and write
|
||
13FB000
|
trusted library allocation
|
page read and write
|
||
5A85000
|
trusted library allocation
|
page read and write
|
||
63CF000
|
trusted library allocation
|
page read and write
|
||
382F000
|
stack
|
page read and write
|
||
5A77000
|
trusted library allocation
|
page read and write
|
||
1446000
|
trusted library allocation
|
page read and write
|
||
5A62000
|
trusted library allocation
|
page read and write
|
||
422F000
|
stack
|
page read and write
|
||
131B000
|
heap
|
page read and write
|
||
5AD2000
|
trusted library allocation
|
page read and write
|
||
132E000
|
heap
|
page read and write
|
||
6020000
|
direct allocation
|
page read and write
|
||
5A74000
|
trusted library allocation
|
page read and write
|
||
1220000
|
direct allocation
|
page read and write
|
||
1348000
|
trusted library allocation
|
page read and write
|
||
6020000
|
direct allocation
|
page read and write
|
||
386E000
|
stack
|
page read and write
|
||
5A85000
|
trusted library allocation
|
page read and write
|
||
134E000
|
trusted library allocation
|
page read and write
|
||
D71000
|
unkown
|
page execute and read and write
|
||
6047000
|
trusted library allocation
|
page read and write
|
||
5A4B000
|
trusted library allocation
|
page read and write
|
||
6020000
|
direct allocation
|
page read and write
|
||
5ADD000
|
trusted library allocation
|
page read and write
|
||
C94000
|
heap
|
page read and write
|
||
346F000
|
stack
|
page read and write
|
||
539E000
|
stack
|
page read and write
|
||
1349000
|
trusted library allocation
|
page read and write
|
||
5C55000
|
trusted library allocation
|
page read and write
|
||
40EF000
|
stack
|
page read and write
|
||
9D3D000
|
stack
|
page read and write
|
||
5A4F000
|
trusted library allocation
|
page read and write
|
||
5A4F000
|
trusted library allocation
|
page read and write
|
||
4B3A000
|
heap
|
page read and write
|
||
5A48000
|
trusted library allocation
|
page read and write
|
||
82AF000
|
stack
|
page read and write
|
||
1311000
|
heap
|
page read and write
|
||
5A66000
|
trusted library allocation
|
page read and write
|
||
5A76000
|
trusted library allocation
|
page read and write
|
||
1405000
|
trusted library allocation
|
page read and write
|
||
5C17000
|
trusted library allocation
|
page read and write
|
||
5C51000
|
trusted library allocation
|
page read and write
|
||
1348000
|
trusted library allocation
|
page read and write
|
||
322E000
|
stack
|
page read and write
|
||
5A56000
|
trusted library allocation
|
page read and write
|
||
5A66000
|
trusted library allocation
|
page read and write
|
||
5A98000
|
trusted library allocation
|
page read and write
|
||
1300000
|
heap
|
page read and write
|
||
12B5000
|
heap
|
page read and write
|
||
1349000
|
trusted library allocation
|
page read and write
|
||
3AAF000
|
stack
|
page read and write
|
||
134E000
|
trusted library allocation
|
page read and write
|
||
5C59000
|
trusted library allocation
|
page read and write
|
||
5A85000
|
trusted library allocation
|
page read and write
|
||
5A44000
|
trusted library allocation
|
page read and write
|
||
5A75000
|
trusted library allocation
|
page read and write
|
||
1341000
|
trusted library allocation
|
page read and write
|
||
736E000
|
stack
|
page read and write
|
||
5A65000
|
trusted library allocation
|
page read and write
|
||
682E000
|
stack
|
page read and write
|
||
4F30000
|
trusted library allocation
|
page read and write
|
||
134B000
|
trusted library allocation
|
page read and write
|
||
6041000
|
trusted library allocation
|
page read and write
|
||
142E000
|
trusted library allocation
|
page read and write
|
||
13FE000
|
trusted library allocation
|
page read and write
|
||
5A85000
|
trusted library allocation
|
page read and write
|
||
6246000
|
trusted library allocation
|
page read and write
|
||
1347000
|
trusted library allocation
|
page read and write
|
||
1336000
|
heap
|
page read and write
|
||
1332000
|
heap
|
page read and write
|
||
5A85000
|
trusted library allocation
|
page read and write
|
||
DC5000
|
unkown
|
page write copy
|
||
6AAE000
|
stack
|
page read and write
|
||
5AA4000
|
trusted library allocation
|
page read and write
|
||
5A9C000
|
trusted library allocation
|
page read and write
|
||
1304000
|
heap
|
page read and write
|
||
6047000
|
trusted library allocation
|
page read and write
|
||
5A62000
|
trusted library allocation
|
page read and write
|
||
2D5C000
|
stack
|
page read and write
|
||
372E000
|
stack
|
page read and write
|
||
4AF0000
|
heap
|
page read and write
|
||
4AF1000
|
heap
|
page read and write
|
||
1342000
|
trusted library allocation
|
page read and write
|
||
134A000
|
trusted library allocation
|
page read and write
|
||
5A8D000
|
trusted library allocation
|
page read and write
|
||
5A85000
|
trusted library allocation
|
page read and write
|
||
133B000
|
heap
|
page read and write
|
||
4AF1000
|
heap
|
page read and write
|
||
5C5E000
|
trusted library allocation
|
page read and write
|
||
5A5A000
|
trusted library allocation
|
page read and write
|
||
3EAE000
|
stack
|
page read and write
|
||
5AA0000
|
trusted library allocation
|
page read and write
|
||
5C5B000
|
trusted library allocation
|
page read and write
|
||
5A62000
|
trusted library allocation
|
page read and write
|
||
5A75000
|
trusted library allocation
|
page read and write
|
||
54DE000
|
stack
|
page read and write
|
||
50F0000
|
direct allocation
|
page execute and read and write
|
||
5A74000
|
trusted library allocation
|
page read and write
|
||
147A000
|
trusted library allocation
|
page read and write
|
||
C94000
|
heap
|
page read and write
|
||
C94000
|
heap
|
page read and write
|
||
7AEE000
|
stack
|
page read and write
|
||
5A84000
|
trusted library allocation
|
page read and write
|
||
106A000
|
unkown
|
page execute and write copy
|
||
1318000
|
heap
|
page read and write
|
||
4AF1000
|
heap
|
page read and write
|
||
5C5E000
|
trusted library allocation
|
page read and write
|
||
13D0000
|
trusted library allocation
|
page read and write
|
||
5A85000
|
trusted library allocation
|
page read and write
|
||
5A79000
|
trusted library allocation
|
page read and write
|
||
5A76000
|
trusted library allocation
|
page read and write
|
||
5EFE000
|
trusted library allocation
|
page execute and read and write
|
||
55E0000
|
remote allocation
|
page read and write
|
||
5ADF000
|
trusted library allocation
|
page read and write
|
||
5C5C000
|
trusted library allocation
|
page read and write
|
||
1335000
|
heap
|
page read and write
|
||
1344000
|
trusted library allocation
|
page read and write
|
||
1443000
|
trusted library allocation
|
page read and write
|
||
1408000
|
trusted library allocation
|
page read and write
|
||
30EF000
|
stack
|
page read and write
|
||
5C5D000
|
trusted library allocation
|
page read and write
|
||
6559000
|
trusted library allocation
|
page read and write
|
||
7C2E000
|
stack
|
page read and write
|
||
55E0000
|
remote allocation
|
page read and write
|
||
5A51000
|
trusted library allocation
|
page read and write
|
||
4AF1000
|
heap
|
page read and write
|
||
5C5C000
|
trusted library allocation
|
page read and write
|
||
1348000
|
trusted library allocation
|
page read and write
|
||
486F000
|
stack
|
page read and write
|
||
31EF000
|
stack
|
page read and write
|
||
1340000
|
trusted library allocation
|
page read and write
|
||
5C57000
|
trusted library allocation
|
page read and write
|
||
1351000
|
trusted library allocation
|
page read and write
|
||
76EF000
|
stack
|
page read and write
|
||
133C000
|
heap
|
page read and write
|
||
44AF000
|
stack
|
page read and write
|
||
14BB000
|
stack
|
page read and write
|
||
50E0000
|
direct allocation
|
page execute and read and write
|
||
5C56000
|
trusted library allocation
|
page read and write
|
||
722E000
|
stack
|
page read and write
|
||
5B2B000
|
trusted library allocation
|
page read and write
|
||
6061000
|
trusted library allocation
|
page read and write
|
||
6020000
|
direct allocation
|
page read and write
|
||
5A69000
|
trusted library allocation
|
page read and write
|
||
4AF1000
|
heap
|
page read and write
|
||
12CC000
|
heap
|
page read and write
|
||
5A92000
|
trusted library allocation
|
page read and write
|
||
1279000
|
heap
|
page read and write
|
||
5AAC000
|
trusted library allocation
|
page read and write
|
||
5A76000
|
trusted library allocation
|
page read and write
|
||
70AF000
|
stack
|
page read and write
|
||
1311000
|
heap
|
page read and write
|
||
1220000
|
direct allocation
|
page read and write
|
||
5A44000
|
trusted library allocation
|
page read and write
|
||
CE9000
|
stack
|
page read and write
|
||
1240000
|
heap
|
page read and write
|
||
6020000
|
direct allocation
|
page read and write
|
||
5A9F000
|
trusted library allocation
|
page read and write
|
||
5A75000
|
trusted library allocation
|
page read and write
|
||
589F000
|
stack
|
page read and write
|
||
1340000
|
trusted library allocation
|
page read and write
|
||
5A51000
|
trusted library allocation
|
page read and write
|
||
5A62000
|
trusted library allocation
|
page read and write
|
||
5A77000
|
trusted library allocation
|
page read and write
|
||
5A7E000
|
trusted library allocation
|
page read and write
|
||
1318000
|
heap
|
page read and write
|
||
5A65000
|
trusted library allocation
|
page read and write
|
||
5A85000
|
trusted library allocation
|
page read and write
|
||
4B00000
|
heap
|
page read and write
|
||
5A66000
|
trusted library allocation
|
page read and write
|
||
142F000
|
trusted library allocation
|
page read and write
|
||
1340000
|
trusted library allocation
|
page read and write
|
||
71EF000
|
stack
|
page read and write
|
||
134F000
|
trusted library allocation
|
page read and write
|
||
5A65000
|
trusted library allocation
|
page read and write
|
||
13FC000
|
trusted library allocation
|
page read and write
|
||
C90000
|
heap
|
page read and write
|
||
134C000
|
trusted library allocation
|
page read and write
|
||
5A79000
|
trusted library allocation
|
page read and write
|
||
5A76000
|
trusted library allocation
|
page read and write
|
||
5A95000
|
trusted library allocation
|
page read and write
|
||
1311000
|
heap
|
page read and write
|
||
5C50000
|
trusted library allocation
|
page read and write
|
||
134F000
|
trusted library allocation
|
page read and write
|
||
1320000
|
heap
|
page read and write
|
||
131E000
|
heap
|
page read and write
|
||
134D000
|
trusted library allocation
|
page read and write
|
||
5A65000
|
trusted library allocation
|
page read and write
|
||
5A40000
|
trusted library allocation
|
page read and write
|
||
5C54000
|
trusted library allocation
|
page read and write
|
||
1345000
|
trusted library allocation
|
page read and write
|
||
74AE000
|
stack
|
page read and write
|
||
6E6E000
|
stack
|
page read and write
|
||
5A85000
|
trusted library allocation
|
page read and write
|
||
50E0000
|
direct allocation
|
page execute and read and write
|
||
4AF1000
|
heap
|
page read and write
|
||
12C6000
|
heap
|
page read and write
|
||
50B0000
|
direct allocation
|
page execute and read and write
|
||
426E000
|
stack
|
page read and write
|
||
3AEE000
|
stack
|
page read and write
|
||
5A85000
|
trusted library allocation
|
page read and write
|
||
5A84000
|
trusted library allocation
|
page read and write
|
||
1342000
|
trusted library allocation
|
page read and write
|
||
5A95000
|
trusted library allocation
|
page read and write
|
||
5A33000
|
heap
|
page read and write
|
||
12B2000
|
heap
|
page read and write
|
||
1347000
|
trusted library allocation
|
page read and write
|
||
5A7E000
|
trusted library allocation
|
page read and write
|
||
5A5B000
|
trusted library allocation
|
page read and write
|
||
1437000
|
trusted library allocation
|
page read and write
|
||
5A7E000
|
trusted library allocation
|
page read and write
|
||
1346000
|
trusted library allocation
|
page read and write
|
||
D50000
|
heap
|
page read and write
|
||
134C000
|
trusted library allocation
|
page read and write
|
||
746F000
|
stack
|
page read and write
|
||
5A30000
|
heap
|
page read and write
|
||
5A62000
|
trusted library allocation
|
page read and write
|
||
13EA000
|
trusted library allocation
|
page read and write
|
||
5A65000
|
trusted library allocation
|
page read and write
|
||
5C54000
|
trusted library allocation
|
page read and write
|
||
5A84000
|
trusted library allocation
|
page read and write
|
||
5A7B000
|
trusted library allocation
|
page read and write
|
||
80F0000
|
direct allocation
|
page read and write
|
||
131F000
|
heap
|
page read and write
|
||
142B000
|
trusted library allocation
|
page read and write
|
||
1345000
|
trusted library allocation
|
page read and write
|
||
5A76000
|
trusted library allocation
|
page read and write
|
||
12EE000
|
heap
|
page read and write
|
||
80F0000
|
trusted library allocation
|
page read and write
|
||
134E000
|
trusted library allocation
|
page read and write
|
||
1325000
|
heap
|
page read and write
|
||
2DDE000
|
stack
|
page read and write
|
||
5A65000
|
trusted library allocation
|
page read and write
|
||
5C53000
|
trusted library allocation
|
page read and write
|
||
134E000
|
trusted library allocation
|
page read and write
|
||
5A66000
|
trusted library allocation
|
page read and write
|
||
6241000
|
trusted library allocation
|
page read and write
|
||
5AD2000
|
trusted library allocation
|
page read and write
|
||
6FAE000
|
stack
|
page read and write
|
||
5A6F000
|
trusted library allocation
|
page read and write
|
||
1311000
|
heap
|
page read and write
|
||
5A85000
|
trusted library allocation
|
page read and write
|
||
5AA4000
|
trusted library allocation
|
page read and write
|
||
13EF000
|
trusted library allocation
|
page read and write
|
||
5A76000
|
trusted library allocation
|
page read and write
|
||
1313000
|
heap
|
page read and write
|
||
106B000
|
unkown
|
page execute and write copy
|
||
1326000
|
heap
|
page read and write
|
||
525D000
|
stack
|
page read and write
|
||
1441000
|
trusted library allocation
|
page read and write
|
||
5A57000
|
trusted library allocation
|
page read and write
|
||
D70000
|
unkown
|
page read and write
|
||
1318000
|
heap
|
page read and write
|
||
3FEE000
|
stack
|
page read and write
|
||
5A66000
|
trusted library allocation
|
page read and write
|
||
1318000
|
heap
|
page read and write
|
||
131E000
|
heap
|
page read and write
|
||
692F000
|
stack
|
page read and write
|
||
D60000
|
direct allocation
|
page read and write
|
||
1421000
|
trusted library allocation
|
page read and write
|
||
7EAE000
|
stack
|
page read and write
|
||
5A66000
|
trusted library allocation
|
page read and write
|
||
5C56000
|
trusted library allocation
|
page read and write
|
||
6040000
|
trusted library allocation
|
page read and write
|
||
5C58000
|
trusted library allocation
|
page read and write
|
||
5A53000
|
trusted library allocation
|
page read and write
|
||
5A62000
|
trusted library allocation
|
page read and write
|
||
13FE000
|
trusted library allocation
|
page read and write
|
||
5AF6000
|
trusted library allocation
|
page read and write
|
||
1303000
|
heap
|
page read and write
|
||
5ADD000
|
trusted library allocation
|
page read and write
|
||
141B000
|
trusted library allocation
|
page read and write
|
||
1348000
|
trusted library allocation
|
page read and write
|
||
5C5F000
|
trusted library allocation
|
page read and write
|
||
7D2F000
|
stack
|
page read and write
|
||
5AA5000
|
trusted library allocation
|
page read and write
|
||
462E000
|
stack
|
page read and write
|
||
5A48000
|
trusted library allocation
|
page read and write
|
||
13FC000
|
trusted library allocation
|
page read and write
|
||
75AF000
|
stack
|
page read and write
|
||
6BAF000
|
stack
|
page read and write
|
||
5A7B000
|
trusted library allocation
|
page read and write
|
||
5A68000
|
trusted library allocation
|
page read and write
|
||
5AA4000
|
trusted library allocation
|
page read and write
|
||
1346000
|
trusted library allocation
|
page read and write
|
||
5AEA000
|
trusted library allocation
|
page read and write
|
||
5C56000
|
trusted library allocation
|
page read and write
|
||
5A7B000
|
trusted library allocation
|
page read and write
|
||
87DE000
|
stack
|
page read and write
|
||
13FE000
|
trusted library allocation
|
page read and write
|
||
5A9D000
|
trusted library allocation
|
page read and write
|
||
5C5B000
|
trusted library allocation
|
page read and write
|
||
1345000
|
trusted library allocation
|
page read and write
|
||
5AB6000
|
trusted library allocation
|
page read and write
|
||
5C5A000
|
trusted library allocation
|
page read and write
|
||
2DE7000
|
heap
|
page read and write
|
||
436F000
|
stack
|
page read and write
|
||
D60000
|
direct allocation
|
page read and write
|
||
6E2F000
|
stack
|
page read and write
|
||
81AC000
|
stack
|
page read and write
|
||
5AE7000
|
trusted library allocation
|
page read and write
|
||
5A8F000
|
trusted library allocation
|
page read and write
|
||
12B8000
|
heap
|
page read and write
|
||
6F6F000
|
stack
|
page read and write
|
||
133A000
|
heap
|
page read and write
|
||
79AE000
|
stack
|
page read and write
|
||
5C5E000
|
trusted library allocation
|
page read and write
|
||
5A51000
|
trusted library allocation
|
page read and write
|
||
5A94000
|
trusted library allocation
|
page read and write
|
||
5C5A000
|
trusted library allocation
|
page execute and read and write
|
||
5C5C000
|
trusted library allocation
|
page read and write
|
||
5A85000
|
trusted library allocation
|
page read and write
|
||
5A5F000
|
trusted library allocation
|
page read and write
|
||
5B46000
|
trusted library allocation
|
page read and write
|
||
134A000
|
trusted library allocation
|
page read and write
|
||
5A76000
|
trusted library allocation
|
page read and write
|
||
5A85000
|
trusted library allocation
|
page read and write
|
||
5A66000
|
trusted library allocation
|
page read and write
|
||
50E0000
|
direct allocation
|
page execute and read and write
|
||
5A85000
|
trusted library allocation
|
page read and write
|
||
2D1E000
|
stack
|
page read and write
|
||
5C5F000
|
trusted library allocation
|
page read and write
|
||
6BEE000
|
stack
|
page read and write
|
||
5AAA000
|
trusted library allocation
|
page read and write
|
||
5B40000
|
trusted library allocation
|
page read and write
|
||
1331000
|
heap
|
page read and write
|
||
13ED000
|
trusted library allocation
|
page read and write
|
||
5A9C000
|
trusted library allocation
|
page read and write
|
||
13FD000
|
trusted library allocation
|
page read and write
|
||
5A53000
|
trusted library allocation
|
page read and write
|
||
146A000
|
trusted library allocation
|
page read and write
|
||
1296000
|
heap
|
page read and write
|
||
4AF1000
|
heap
|
page read and write
|
||
4AF1000
|
heap
|
page read and write
|
||
1318000
|
heap
|
page read and write
|
||
5A62000
|
trusted library allocation
|
page read and write
|
||
131B000
|
heap
|
page read and write
|
||
131B000
|
heap
|
page read and write
|
||
134C000
|
trusted library allocation
|
page read and write
|
||
5C59000
|
trusted library allocation
|
page read and write
|
||
6041000
|
trusted library allocation
|
page read and write
|
||
5A85000
|
trusted library allocation
|
page read and write
|
||
134E000
|
trusted library allocation
|
page read and write
|
||
1321000
|
heap
|
page read and write
|
||
106A000
|
unkown
|
page execute and read and write
|
||
5A84000
|
trusted library allocation
|
page read and write
|
||
5A75000
|
trusted library allocation
|
page read and write
|
||
5A85000
|
trusted library allocation
|
page read and write
|
||
131F000
|
heap
|
page read and write
|
||
8100000
|
direct allocation
|
page execute and read and write
|
||
7AAF000
|
stack
|
page read and write
|
||
5A85000
|
trusted library allocation
|
page read and write
|
||
7FAF000
|
stack
|
page read and write
|
||
8A1F000
|
stack
|
page read and write
|
||
5A69000
|
trusted library allocation
|
page read and write
|
||
5A85000
|
trusted library allocation
|
page read and write
|
||
5ADD000
|
trusted library allocation
|
page read and write
|
||
65EF000
|
stack
|
page read and write
|
||
5A77000
|
trusted library allocation
|
page read and write
|
||
5A5A000
|
trusted library allocation
|
page read and write
|
||
5AE6000
|
trusted library allocation
|
page read and write
|
||
36EF000
|
stack
|
page read and write
|
||
5C56000
|
trusted library allocation
|
page read and write
|
||
5A4D000
|
trusted library allocation
|
page read and write
|
||
13E7000
|
trusted library allocation
|
page read and write
|
||
5A53000
|
trusted library allocation
|
page read and write
|
||
7D6E000
|
stack
|
page read and write
|
||
5A84000
|
trusted library allocation
|
page read and write
|
||
1336000
|
heap
|
page read and write
|
||
C94000
|
heap
|
page read and write
|
||
C94000
|
heap
|
page read and write
|
||
5C54000
|
trusted library allocation
|
page read and write
|
||
869B000
|
stack
|
page read and write
|
||
131F000
|
heap
|
page read and write
|
||
129C000
|
heap
|
page read and write
|
||
5A6D000
|
trusted library allocation
|
page read and write
|
||
C94000
|
heap
|
page read and write
|
||
472F000
|
stack
|
page read and write
|
||
1348000
|
trusted library allocation
|
page read and write
|
||
5C5B000
|
trusted library allocation
|
page read and write
|
||
5C5A000
|
trusted library allocation
|
page read and write
|
||
1344000
|
trusted library allocation
|
page read and write
|
There are 871 hidden memdumps, click here to show them.
DOM / HTML
URL
|
Malicious
|
|
---|---|---|
https://learn.microsoft.com/en-us/dotnet/framework/install/application-not-started?version=(null)&processName=file.exe&platform=0009&osver=6&isServer=0&shimver=4.0.30319.0
|
||
https://learn.microsoft.com/en-us/dotnet/framework/install/application-not-started?version=(null)&processName=file.exe&platform=0009&osver=6&isServer=0&shimver=4.0.30319.0
|
||
https://learn.microsoft.com/en-us/dotnet/framework/install/application-not-started?version=(null)&processName=file.exe&platform=0009&osver=6&isServer=0&shimver=4.0.30319.0
|
||
https://learn.microsoft.com/en-us/dotnet/framework/install/application-not-started?version=(null)&processName=file.exe&platform=0009&osver=6&isServer=0&shimver=4.0.30319.0
|