Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
file.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
initial sample
|
||
Chrome Cache Entry: 100
|
Web Open Font Format (Version 2), TrueType, length 19696, version 1.0
|
downloaded
|
||
Chrome Cache Entry: 101
|
ASCII text, with very long lines (33148), with no line terminators
|
downloaded
|
||
Chrome Cache Entry: 102
|
PNG image data, 475 x 212, 8-bit/color RGBA, non-interlaced
|
dropped
|
||
Chrome Cache Entry: 103
|
PNG image data, 658 x 480, 8-bit/color RGBA, non-interlaced
|
dropped
|
||
Chrome Cache Entry: 104
|
JSON data
|
dropped
|
||
Chrome Cache Entry: 105
|
HTML document, ASCII text, with very long lines (639), with CRLF, LF line terminators
|
downloaded
|
||
Chrome Cache Entry: 106
|
JSON data
|
downloaded
|
||
Chrome Cache Entry: 107
|
PNG image data, 533 x 478, 8-bit/color RGBA, non-interlaced
|
dropped
|
||
Chrome Cache Entry: 69
|
PNG image data, 533 x 478, 8-bit/color RGBA, non-interlaced
|
dropped
|
||
Chrome Cache Entry: 70
|
PNG image data, 533 x 478, 8-bit/color RGBA, non-interlaced
|
downloaded
|
||
Chrome Cache Entry: 71
|
SVG Scalable Vector Graphics image
|
dropped
|
||
Chrome Cache Entry: 72
|
JSON data
|
dropped
|
||
Chrome Cache Entry: 73
|
PNG image data, 533 x 478, 8-bit/color RGBA, non-interlaced
|
dropped
|
||
Chrome Cache Entry: 74
|
ASCII text, with very long lines (65536), with no line terminators
|
downloaded
|
||
Chrome Cache Entry: 75
|
JSON data
|
dropped
|
||
Chrome Cache Entry: 76
|
ASCII text, with very long lines (65410)
|
downloaded
|
||
Chrome Cache Entry: 77
|
JSON data
|
downloaded
|
||
Chrome Cache Entry: 78
|
PNG image data, 533 x 478, 8-bit/color RGBA, non-interlaced
|
downloaded
|
||
Chrome Cache Entry: 79
|
ASCII text, with very long lines (52717), with no line terminators
|
dropped
|
||
Chrome Cache Entry: 80
|
ASCII text
|
downloaded
|
||
Chrome Cache Entry: 81
|
ASCII text, with very long lines (52717), with no line terminators
|
downloaded
|
||
Chrome Cache Entry: 82
|
exported SGML document, ASCII text, with very long lines (65536), with no line terminators
|
downloaded
|
||
Chrome Cache Entry: 83
|
ASCII text, with no line terminators
|
downloaded
|
||
Chrome Cache Entry: 84
|
PNG image data, 533 x 478, 8-bit/color RGBA, non-interlaced
|
downloaded
|
||
Chrome Cache Entry: 85
|
MS Windows icon resource - 6 icons, -128x-128, 16 colors, 72x72, 16 colors
|
downloaded
|
||
Chrome Cache Entry: 86
|
ASCII text, with very long lines (46884)
|
downloaded
|
||
Chrome Cache Entry: 87
|
JSON data
|
dropped
|
||
Chrome Cache Entry: 88
|
MS Windows icon resource - 6 icons, -128x-128, 16 colors, 72x72, 16 colors
|
dropped
|
||
Chrome Cache Entry: 89
|
PNG image data, 658 x 480, 8-bit/color RGBA, non-interlaced
|
downloaded
|
||
Chrome Cache Entry: 90
|
ASCII text, with very long lines (33148), with no line terminators
|
dropped
|
||
Chrome Cache Entry: 91
|
JSON data
|
downloaded
|
||
Chrome Cache Entry: 92
|
JPEG image data, JFIF standard 1.01, aspect ratio, density 1x1, segment length 16, baseline, precision 8, 1528x402, components
3
|
dropped
|
||
Chrome Cache Entry: 93
|
PNG image data, 475 x 212, 8-bit/color RGBA, non-interlaced
|
downloaded
|
||
Chrome Cache Entry: 94
|
JSON data
|
downloaded
|
||
Chrome Cache Entry: 95
|
JPEG image data, JFIF standard 1.01, aspect ratio, density 1x1, segment length 16, baseline, precision 8, 1528x402, components
3
|
downloaded
|
||
Chrome Cache Entry: 96
|
exported SGML document, ASCII text, with very long lines (65536), with no line terminators
|
dropped
|
||
Chrome Cache Entry: 97
|
ASCII text, with very long lines (46884)
|
dropped
|
||
Chrome Cache Entry: 98
|
ASCII text
|
dropped
|
||
Chrome Cache Entry: 99
|
SVG Scalable Vector Graphics image
|
downloaded
|
There are 30 hidden files, click here to show them.
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\file.exe
|
"C:\Users\user\Desktop\file.exe"
|
||
C:\Program Files\Google\Chrome\Application\chrome.exe
|
"C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized --single-argument http://go.microsoft.com/fwlink/?prd=11324&pver=4.5&sbp=AppLaunch2&plcid=0x409&o1=SHIM_NOVERSION_FOUND&version=(null)&processName=file.exe&platform=0009&osver=6&isServer=0&shimver=4.0.30319.0
|
||
C:\Program Files\Google\Chrome\Application\chrome.exe
|
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US
--service-sandbox-type=none --mojo-platform-channel-handle=2208 --field-trial-handle=1884,i,17699298288420818842,9296858339139321116,262144
--disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction
/prefetch:8
|
||
C:\Program Files\Google\Chrome\Application\chrome.exe
|
"C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized --single-argument http://go.microsoft.com/fwlink/?prd=11324&pver=4.5&sbp=AppLaunch2&plcid=0x409&o1=SHIM_NOVERSION_FOUND&version=(null)&processName=file.exe&platform=0009&osver=6&isServer=0&shimver=4.0.30319.0
|
||
C:\Program Files\Google\Chrome\Application\chrome.exe
|
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US
--service-sandbox-type=none --mojo-platform-channel-handle=1992 --field-trial-handle=1848,i,12859633962272970777,3292351338685912697,262144
--disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction
/prefetch:8
|
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
https://authoring-docs-microsoft.poolparty.biz/devrel/7696cda6-0510-47f6-8302-71bb5d2e28cf
|
unknown
|
||
https://duckduckgo.com/chrome_newtab
|
unknown
|
||
https://duckduckgo.com/ac/?q=
|
unknown
|
||
https://github.com/dotnet/docs/blob/17c4acca45e573a92878a44a2cce57d699fe9c7c/docs/framework/install/
|
unknown
|
||
https://www.linkedin.com/cws/share?url=$
|
unknown
|
||
https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
|
unknown
|
||
https://atten-supporse.biz/Q
|
unknown
|
||
https://github.com/Youssef1313
|
unknown
|
||
https://contile-images.services.mozilla.com/T23eBL4EHswiSaF6kya2gYsRHvdfADK-NYjs1mVRNGE.3351.jpg
|
unknown
|
||
https://management.azure.com/providers/Microsoft.Portal/userSettings/cloudconsole?api-version=2023-0
|
unknown
|
||
https://aka.ms/msignite_docs_banner
|
unknown
|
||
https://videoencodingpublic-hgeaeyeba8gycee3.b01.azurefd.net/public-b4da8140-92cf-421c-8b7b-e471d5b9
|
unknown
|
||
http://polymer.github.io/AUTHORS.txt
|
unknown
|
||
https://github.com/dotnet/docs/issues/new?template=z-customer-feedback.yml
|
unknown
|
||
https://management.azure.com/subscriptions?api-version=2016-06-01
|
unknown
|
||
https://github.com/dotnet/docs/blob/main/docs/framework/install/application-not-started.md
|
unknown
|
||
https://atten-supporse.biz//
|
unknown
|
||
http://185.215.113.16/off/def.exez
|
unknown
|
||
http://x1.c.lencr.org/0
|
unknown
|
||
http://x1.i.lencr.org/0
|
unknown
|
||
https://aka.ms/pshelpmechoose
|
unknown
|
||
https://aka.ms/feedback/report?space=61
|
unknown
|
||
https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
|
unknown
|
||
https://learn-video.azurefd.net/vod/player
|
unknown
|
||
https://twitter.com/intent/tweet?original_referer=$
|
unknown
|
||
https://github.com/gewarren
|
unknown
|
||
https://support.mozilla.org/products/firefoxgro.all
|
unknown
|
||
http://185.215.113.16/e
|
unknown
|
||
http://polymer.github.io/CONTRIBUTORS.txt
|
unknown
|
||
https://www.mozilla.or
|
unknown
|
||
https://github.com/dotnet/docs/blob/live/docs/framework/install/application-not-started.md
|
unknown
|
||
https://authoring-docs-microsoft.poolparty.biz/devrel/69c76c32-967e-4c65-b89a-74cc527db725
|
unknown
|
||
https://client-api.arkoselabs.com/v2/api.js
|
unknown
|
||
https://aka.ms/MSIgniteChallenge/Tier1Banner?wt.mc_id=ignite24_learnbanner_tier1_cnl
|
unknown
|
||
https://management.azure.com/providers/Microsoft.Portal/consoles/default?api-version=2017-12-01-prev
|
unknown
|
||
https://www.google.com/images/branding/product/ico/googleg_lodp.ico
|
unknown
|
||
https://github.com/Thraka
|
unknown
|
||
https://bridge.sfo1.admarketplace.net/ctp?version=16.0.0&key=1696484494400800000.2&ci=1696484494189.
|
unknown
|
||
https://imp.mt48.net/static?id=7RHzfOIXjFEYsBdvIpkX4Qqm4pLk4pqk4pbW1pbWfpbW7ReNxR3UIG8zInwYIFIVs9eYi
|
unknown
|
||
http://polymer.github.io/PATENTS.txt
|
unknown
|
||
https://aka.ms/certhelp
|
unknown
|
||
http://185.215.113.16/steam/random.exe
|
unknown
|
||
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
|
unknown
|
||
http://crl.rootca1.amazontrust.com/rootca1.crl0
|
unknown
|
||
https://atten-supporse.biz/api
|
104.21.16.9
|
||
https://github.com/mairaw
|
unknown
|
||
https://js.monitor.azure.com/scripts/c/ms.jsll-4.min.js
|
13.107.246.63
|
||
http://ocsp.rootca1.amazontrust.com0:
|
unknown
|
||
https://schema.org
|
unknown
|
||
http://polymer.github.io/LICENSE.txt
|
unknown
|
||
https://www.ecosia.org/newtab/
|
unknown
|
||
https://support.mozilla.org/kb/customize-firefox-controls-buttons-and-toolbars?utm_source=firefox-br
|
unknown
|
||
https://www.t-mobile.com/cell-phones/brand/apple?cmpid=MGPO_PAM_P_EVGRNIPHN_
|
unknown
|
||
https://aka.ms/yourcaliforniaprivacychoices
|
unknown
|
||
https://ac.ecosia.org/autocomplete?q=
|
unknown
|
||
https://github.com/nschonni
|
unknown
|
||
http://185.215.113.16/
|
unknown
|
||
https://videoencodingpublic-hgeaeyeba8gycee3.b01.azurefd.net/public-09ce73a6-05a5-4e4d-b3d7-bd5a8c05
|
unknown
|
||
https://github.com/adegeo
|
unknown
|
||
https://contile-images.services.mozilla.com/obgoOYObjIFea_bXuT6L4LbBJ8j425AD87S1HMD3BWg.9991.jpg
|
unknown
|
||
http://185.215.113.16:80/off/def.exeicrosoft
|
unknown
|
||
https://github.com/jonschlinkert/is-plain-object
|
unknown
|
||
https://www.amazon.com/?tag=admarketus-20&ref=pd_sl_86277c656a4bd7d619968160e91c45fd066919bb3bd119b3
|
unknown
|
||
http://crt.rootca1.amazontrust.com/rootca1.cer0?
|
unknown
|
||
https://octokit.github.io/rest.js/#throttling
|
unknown
|
||
https://atten-supporse.biz/api7
|
unknown
|
||
https://atten-supporse.biz:443/api
|
unknown
|
||
https://github.com/js-cookie/js-cookie
|
unknown
|
||
http://185.215.113.16/off/def.exe
|
unknown
|
||
http://schema.org/Organization
|
unknown
|
||
https://atten-supporse.biz/
|
unknown
|
||
https://channel9.msdn.com/
|
unknown
|
||
http://crl.microx
|
unknown
|
||
https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
|
unknown
|
||
https://bridge.sfo1.ap01.net/ctp?version=16.0.0&key=1696484494400800000.1&ci=1696484494189.12791&cta
|
unknown
|
||
https://github.com/dotnet/try
|
unknown
|
There are 66 hidden URLs, click here to show them.
Domains
Name
|
IP
|
Malicious
|
|
---|---|---|---|
atten-supporse.biz
|
104.21.16.9
|
||
www.google.com
|
142.250.181.100
|
||
s-part-0035.t-0009.t-msedge.net
|
13.107.246.63
|
||
js.monitor.azure.com
|
unknown
|
||
mdec.nelreports.net
|
unknown
|
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
192.168.2.6
|
unknown
|
unknown
|
||
13.107.246.63
|
s-part-0035.t-0009.t-msedge.net
|
United States
|
||
185.215.113.16
|
unknown
|
Portugal
|
||
142.250.181.100
|
www.google.com
|
United States
|
||
239.255.255.250
|
unknown
|
Reserved
|
||
104.21.16.9
|
atten-supporse.biz
|
United States
|
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
53B0000
|
trusted library allocation
|
page read and write
|
||
862000
|
heap
|
page read and write
|
||
5393000
|
trusted library allocation
|
page read and write
|
||
539F000
|
trusted library allocation
|
page read and write
|
||
536E000
|
stack
|
page read and write
|
||
5FAF000
|
stack
|
page read and write
|
||
547C000
|
trusted library allocation
|
page read and write
|
||
595C000
|
trusted library allocation
|
page read and write
|
||
766E000
|
stack
|
page read and write
|
||
43F1000
|
heap
|
page read and write
|
||
595D000
|
trusted library allocation
|
page read and write
|
||
5D4000
|
heap
|
page read and write
|
||
5902000
|
trusted library allocation
|
page read and write
|
||
53D4000
|
trusted library allocation
|
page read and write
|
||
5388000
|
trusted library allocation
|
page read and write
|
||
538D000
|
trusted library allocation
|
page read and write
|
||
84E000
|
heap
|
page read and write
|
||
5D4D000
|
trusted library allocation
|
page execute and read and write
|
||
712F000
|
stack
|
page read and write
|
||
7C70000
|
direct allocation
|
page read and write
|
||
5D4000
|
heap
|
page read and write
|
||
4A40000
|
direct allocation
|
page execute and read and write
|
||
5E5A000
|
trusted library allocation
|
page execute and read and write
|
||
5394000
|
trusted library allocation
|
page read and write
|
||
581B000
|
trusted library allocation
|
page read and write
|
||
15B000
|
stack
|
page read and write
|
||
863000
|
heap
|
page read and write
|
||
5816000
|
trusted library allocation
|
page read and write
|
||
538A000
|
trusted library allocation
|
page read and write
|
||
53B6000
|
trusted library allocation
|
page read and write
|
||
5200000
|
heap
|
page read and write
|
||
53DB000
|
trusted library allocation
|
page read and write
|
||
4E0E000
|
stack
|
page read and write
|
||
65EF000
|
stack
|
page read and write
|
||
43F1000
|
heap
|
page read and write
|
||
5394000
|
trusted library allocation
|
page read and write
|
||
CB1000
|
unkown
|
page execute and write copy
|
||
53BF000
|
trusted library allocation
|
page read and write
|
||
53B8000
|
trusted library allocation
|
page read and write
|
||
2DAE000
|
stack
|
page read and write
|
||
53BF000
|
trusted library allocation
|
page read and write
|
||
53A0000
|
trusted library allocation
|
page read and write
|
||
4400000
|
heap
|
page read and write
|
||
49E0000
|
direct allocation
|
page execute and read and write
|
||
4A1D000
|
stack
|
page read and write
|
||
5936000
|
trusted library allocation
|
page read and write
|
||
5820000
|
trusted library allocation
|
page read and write
|
||
5817000
|
trusted library allocation
|
page read and write
|
||
5D4000
|
heap
|
page read and write
|
||
5471000
|
trusted library allocation
|
page read and write
|
||
542A000
|
trusted library allocation
|
page read and write
|
||
592E000
|
trusted library allocation
|
page read and write
|
||
5394000
|
trusted library allocation
|
page read and write
|
||
5813000
|
trusted library allocation
|
page read and write
|
||
53FD000
|
trusted library allocation
|
page read and write
|
||
69AF000
|
stack
|
page read and write
|
||
5371000
|
trusted library allocation
|
page read and write
|
||
316E000
|
stack
|
page read and write
|
||
53BF000
|
trusted library allocation
|
page read and write
|
||
5388000
|
trusted library allocation
|
page read and write
|
||
5813000
|
trusted library allocation
|
page read and write
|
||
53BF000
|
trusted library allocation
|
page read and write
|
||
53E8000
|
trusted library allocation
|
page read and write
|
||
58FC000
|
trusted library allocation
|
page read and write
|
||
7C90000
|
direct allocation
|
page read and write
|
||
5816000
|
trusted library allocation
|
page read and write
|
||
68AE000
|
stack
|
page read and write
|
||
86C000
|
heap
|
page read and write
|
||
43F1000
|
heap
|
page read and write
|
||
4880000
|
direct allocation
|
page read and write
|
||
53B7000
|
trusted library allocation
|
page read and write
|
||
53AC000
|
trusted library allocation
|
page read and write
|
||
53BF000
|
trusted library allocation
|
page read and write
|
||
CA0000
|
direct allocation
|
page read and write
|
||
53D9000
|
trusted library allocation
|
page read and write
|
||
53B6000
|
trusted library allocation
|
page read and write
|
||
53BF000
|
trusted library allocation
|
page read and write
|
||
5D4000
|
heap
|
page read and write
|
||
5811000
|
trusted library allocation
|
page read and write
|
||
53B1000
|
trusted library allocation
|
page read and write
|
||
53A4000
|
trusted library allocation
|
page read and write
|
||
53BF000
|
trusted library allocation
|
page read and write
|
||
4880000
|
direct allocation
|
page read and write
|
||
53D7000
|
trusted library allocation
|
page read and write
|
||
5612000
|
trusted library allocation
|
page read and write
|
||
53A7000
|
trusted library allocation
|
page read and write
|
||
53A1000
|
trusted library allocation
|
page read and write
|
||
53B0000
|
trusted library allocation
|
page read and write
|
||
537E000
|
trusted library allocation
|
page read and write
|
||
59A9000
|
trusted library allocation
|
page read and write
|
||
581A000
|
trusted library allocation
|
page read and write
|
||
53CD000
|
trusted library allocation
|
page read and write
|
||
581D000
|
trusted library allocation
|
page read and write
|
||
539E000
|
trusted library allocation
|
page read and write
|
||
58CF000
|
trusted library allocation
|
page read and write
|
||
4A10000
|
direct allocation
|
page execute and read and write
|
||
CA0000
|
direct allocation
|
page read and write
|
||
58E0000
|
trusted library allocation
|
page read and write
|
||
75E000
|
stack
|
page read and write
|
||
7C6F000
|
stack
|
page read and write
|
||
5BB9000
|
stack
|
page read and write
|
||
84E000
|
heap
|
page read and write
|
||
FAD000
|
unkown
|
page execute and write copy
|
||
5818000
|
trusted library allocation
|
page read and write
|
||
676E000
|
stack
|
page read and write
|
||
5944000
|
trusted library allocation
|
page read and write
|
||
5A41000
|
trusted library allocation
|
page read and write
|
||
5814000
|
trusted library allocation
|
page read and write
|
||
83F000
|
heap
|
page read and write
|
||
53B5000
|
trusted library allocation
|
page read and write
|
||
4A10000
|
direct allocation
|
page execute and read and write
|
||
7B3000
|
heap
|
page read and write
|
||
542C000
|
trusted library allocation
|
page read and write
|
||
2C6E000
|
stack
|
page read and write
|
||
5A3F000
|
trusted library allocation
|
page read and write
|
||
53AF000
|
trusted library allocation
|
page read and write
|
||
BBE000
|
stack
|
page read and write
|
||
7E80000
|
heap
|
page read and write
|
||
61E000
|
stack
|
page read and write
|
||
50EE000
|
stack
|
page read and write
|
||
594E000
|
trusted library allocation
|
page read and write
|
||
53A9000
|
trusted library allocation
|
page read and write
|
||
581C000
|
trusted library allocation
|
page read and write
|
||
53BF000
|
trusted library allocation
|
page read and write
|
||
539F000
|
trusted library allocation
|
page read and write
|
||
58BF000
|
trusted library allocation
|
page read and write
|
||
53A4000
|
trusted library allocation
|
page read and write
|
||
53DC000
|
trusted library allocation
|
page read and write
|
||
55ED000
|
trusted library allocation
|
page read and write
|
||
581A000
|
trusted library allocation
|
page read and write
|
||
581C000
|
trusted library allocation
|
page read and write
|
||
507F000
|
stack
|
page read and write
|
||
5D4000
|
heap
|
page read and write
|
||
5818000
|
trusted library allocation
|
page read and write
|
||
526E000
|
stack
|
page read and write
|
||
539E000
|
trusted library allocation
|
page read and write
|
||
5811000
|
trusted library allocation
|
page read and write
|
||
5812000
|
trusted library allocation
|
page read and write
|
||
53C8000
|
trusted library allocation
|
page read and write
|
||
53AF000
|
trusted library allocation
|
page read and write
|
||
5939000
|
trusted library allocation
|
page read and write
|
||
49CF000
|
stack
|
page read and write
|
||
4DCE000
|
stack
|
page read and write
|
||
86E000
|
heap
|
page read and write
|
||
5EAE000
|
stack
|
page read and write
|
||
58AB000
|
trusted library allocation
|
page read and write
|
||
4A10000
|
direct allocation
|
page execute and read and write
|
||
537B000
|
trusted library allocation
|
page read and write
|
||
53CB000
|
trusted library allocation
|
page read and write
|
||
820000
|
heap
|
page read and write
|
||
C57000
|
heap
|
page read and write
|
||
58C4000
|
trusted library allocation
|
page read and write
|
||
5818000
|
trusted library allocation
|
page read and write
|
||
302E000
|
stack
|
page read and write
|
||
5395000
|
trusted library allocation
|
page read and write
|
||
5378000
|
trusted library allocation
|
page read and write
|
||
5458000
|
trusted library allocation
|
page read and write
|
||
538A000
|
trusted library allocation
|
page read and write
|
||
53BB000
|
trusted library allocation
|
page read and write
|
||
4880000
|
direct allocation
|
page read and write
|
||
28EF000
|
stack
|
page read and write
|
||
5A08000
|
trusted library allocation
|
page read and write
|
||
58F0000
|
trusted library allocation
|
page read and write
|
||
539E000
|
trusted library allocation
|
page read and write
|
||
2EEE000
|
stack
|
page read and write
|
||
85E000
|
heap
|
page read and write
|
||
82F000
|
heap
|
page read and write
|
||
53BF000
|
trusted library allocation
|
page read and write
|
||
53E4000
|
trusted library allocation
|
page read and write
|
||
5389000
|
trusted library allocation
|
page read and write
|
||
5A79000
|
trusted library allocation
|
page read and write
|
||
843000
|
heap
|
page read and write
|
||
5386000
|
trusted library allocation
|
page read and write
|
||
5811000
|
trusted library allocation
|
page read and write
|
||
83F000
|
heap
|
page read and write
|
||
5819000
|
trusted library allocation
|
page read and write
|
||
53DD000
|
trusted library allocation
|
page read and write
|
||
86C000
|
heap
|
page read and write
|
||
53ED000
|
trusted library allocation
|
page read and write
|
||
5395000
|
trusted library allocation
|
page read and write
|
||
43F1000
|
heap
|
page read and write
|
||
53BF000
|
trusted library allocation
|
page read and write
|
||
53BD000
|
trusted library allocation
|
page read and write
|
||
4C8D000
|
stack
|
page read and write
|
||
4A20000
|
direct allocation
|
page execute and read and write
|
||
6FEF000
|
stack
|
page read and write
|
||
C3E000
|
stack
|
page read and write
|
||
53C5000
|
trusted library allocation
|
page read and write
|
||
537B000
|
trusted library allocation
|
page read and write
|
||
5814000
|
trusted library allocation
|
page read and write
|
||
539E000
|
trusted library allocation
|
page read and write
|
||
CA0000
|
direct allocation
|
page read and write
|
||
5935000
|
trusted library allocation
|
page read and write
|
||
7D6000
|
heap
|
page read and write
|
||
5371000
|
trusted library allocation
|
page read and write
|
||
539E000
|
trusted library allocation
|
page read and write
|
||
53B0000
|
trusted library allocation
|
page read and write
|
||
549D000
|
trusted library allocation
|
page read and write
|
||
53A4000
|
trusted library allocation
|
page read and write
|
||
590B000
|
trusted library allocation
|
page read and write
|
||
5921000
|
trusted library allocation
|
page read and write
|
||
5818000
|
trusted library allocation
|
page read and write
|
||
58B9000
|
trusted library allocation
|
page read and write
|
||
53BF000
|
trusted library allocation
|
page read and write
|
||
402F000
|
stack
|
page read and write
|
||
53BF000
|
trusted library allocation
|
page read and write
|
||
581C000
|
trusted library allocation
|
page read and write
|
||
53BF000
|
trusted library allocation
|
page read and write
|
||
599E000
|
trusted library allocation
|
page read and write
|
||
7C1000
|
heap
|
page read and write
|
||
5815000
|
trusted library allocation
|
page read and write
|
||
5D4000
|
heap
|
page read and write
|
||
5AA4000
|
trusted library allocation
|
page read and write
|
||
5820000
|
trusted library allocation
|
page read and write
|
||
1C0000
|
heap
|
page read and write
|
||
539F000
|
trusted library allocation
|
page read and write
|
||
5470000
|
trusted library allocation
|
page read and write
|
||
860000
|
heap
|
page read and write
|
||
863000
|
heap
|
page read and write
|
||
5946000
|
trusted library allocation
|
page read and write
|
||
850000
|
heap
|
page read and write
|
||
7C90000
|
direct allocation
|
page read and write
|
||
538D000
|
trusted library allocation
|
page read and write
|
||
3EEF000
|
stack
|
page read and write
|
||
4A58000
|
trusted library allocation
|
page read and write
|
||
538C000
|
trusted library allocation
|
page read and write
|
||
27EF000
|
stack
|
page read and write
|
||
96E0000
|
trusted library allocation
|
page read and write
|
||
53B6000
|
trusted library allocation
|
page read and write
|
||
53CF000
|
trusted library allocation
|
page read and write
|
||
86A000
|
heap
|
page read and write
|
||
53AF000
|
trusted library allocation
|
page read and write
|
||
537B000
|
trusted library allocation
|
page read and write
|
||
5816000
|
trusted library allocation
|
page read and write
|
||
5817000
|
trusted library allocation
|
page read and write
|
||
4CCE000
|
stack
|
page read and write
|
||
58BD000
|
trusted library allocation
|
page read and write
|
||
547A000
|
trusted library allocation
|
page read and write
|
||
53E8000
|
trusted library allocation
|
page read and write
|
||
53A9000
|
trusted library allocation
|
page read and write
|
||
5A77000
|
trusted library allocation
|
page read and write
|
||
539F000
|
trusted library allocation
|
page read and write
|
||
5380000
|
trusted library allocation
|
page read and write
|
||
5813000
|
trusted library allocation
|
page read and write
|
||
5D4000
|
heap
|
page read and write
|
||
726F000
|
stack
|
page read and write
|
||
53BF000
|
trusted library allocation
|
page read and write
|
||
537F000
|
trusted library allocation
|
page read and write
|
||
5BC0000
|
trusted library allocation
|
page read and write
|
||
43F1000
|
heap
|
page read and write
|
||
5395000
|
trusted library allocation
|
page read and write
|
||
2EAF000
|
stack
|
page read and write
|
||
49F0000
|
direct allocation
|
page execute and read and write
|
||
5811000
|
trusted library allocation
|
page read and write
|
||
595F000
|
trusted library allocation
|
page read and write
|
||
58E9000
|
trusted library allocation
|
page read and write
|
||
53EC000
|
trusted library allocation
|
page read and write
|
||
5815000
|
trusted library allocation
|
page read and write
|
||
612E000
|
stack
|
page read and write
|
||
861000
|
heap
|
page read and write
|
||
43F1000
|
heap
|
page read and write
|
||
53E8000
|
trusted library allocation
|
page read and write
|
||
33AF000
|
stack
|
page read and write
|
||
CA0000
|
direct allocation
|
page read and write
|
||
861000
|
heap
|
page read and write
|
||
43F1000
|
heap
|
page read and write
|
||
539F000
|
trusted library allocation
|
page read and write
|
||
53E8000
|
trusted library allocation
|
page read and write
|
||
5393000
|
trusted library allocation
|
page read and write
|
||
53BC000
|
trusted library allocation
|
page read and write
|
||
39EF000
|
stack
|
page read and write
|
||
861000
|
heap
|
page read and write
|
||
86E000
|
heap
|
page read and write
|
||
64EE000
|
stack
|
page read and write
|
||
5970000
|
trusted library allocation
|
page read and write
|
||
5904000
|
trusted library allocation
|
page read and write
|
||
C40000
|
heap
|
page read and write
|
||
34EF000
|
stack
|
page read and write
|
||
6EEE000
|
stack
|
page read and write
|
||
5390000
|
trusted library allocation
|
page read and write
|
||
537E000
|
trusted library allocation
|
page read and write
|
||
53BC000
|
trusted library allocation
|
page read and write
|
||
539F000
|
trusted library allocation
|
page read and write
|
||
854000
|
heap
|
page read and write
|
||
5D4000
|
heap
|
page read and write
|
||
5387000
|
trusted library allocation
|
page read and write
|
||
5614000
|
trusted library allocation
|
page read and write
|
||
5408000
|
trusted library allocation
|
page read and write
|
||
5371000
|
trusted library allocation
|
page read and write
|
||
7C70000
|
trusted library allocation
|
page read and write
|
||
538B000
|
trusted library allocation
|
page read and write
|
||
C50000
|
heap
|
page read and write
|
||
2B2E000
|
stack
|
page read and write
|
||
539E000
|
trusted library allocation
|
page read and write
|
||
845000
|
heap
|
page read and write
|
||
5819000
|
trusted library allocation
|
page read and write
|
||
74EF000
|
stack
|
page read and write
|
||
5E83000
|
trusted library allocation
|
page read and write
|
||
5D4000
|
heap
|
page read and write
|
||
53AF000
|
trusted library allocation
|
page read and write
|
||
72AE000
|
stack
|
page read and write
|
||
843000
|
heap
|
page read and write
|
||
43F1000
|
heap
|
page read and write
|
||
5394000
|
trusted library allocation
|
page read and write
|
||
53B0000
|
trusted library allocation
|
page read and write
|
||
85B000
|
heap
|
page read and write
|
||
5814000
|
trusted library allocation
|
page read and write
|
||
5382000
|
trusted library allocation
|
page read and write
|
||
5931000
|
trusted library allocation
|
page read and write
|
||
58E2000
|
trusted library allocation
|
page read and write
|
||
5813000
|
trusted library allocation
|
page read and write
|
||
5818000
|
trusted library allocation
|
page read and write
|
||
43EF000
|
stack
|
page read and write
|
||
53F7000
|
trusted library allocation
|
page read and write
|
||
5386000
|
trusted library allocation
|
page read and write
|
||
43F1000
|
heap
|
page read and write
|
||
F9F000
|
unkown
|
page execute and read and write
|
||
53C4000
|
trusted library allocation
|
page read and write
|
||
77A000
|
heap
|
page read and write
|
||
7C90000
|
direct allocation
|
page read and write
|
||
53B1000
|
trusted library allocation
|
page read and write
|
||
406E000
|
stack
|
page read and write
|
||
538B000
|
trusted library allocation
|
page read and write
|
||
5374000
|
trusted library allocation
|
page read and write
|
||
53BF000
|
trusted library allocation
|
page read and write
|
||
5390000
|
trusted library allocation
|
page read and write
|
||
5A5F000
|
trusted library allocation
|
page read and write
|
||
7C70000
|
direct allocation
|
page read and write
|
||
662E000
|
stack
|
page read and write
|
||
538D000
|
trusted library allocation
|
page read and write
|
||
53D7000
|
trusted library allocation
|
page read and write
|
||
5810000
|
trusted library allocation
|
page read and write
|
||
5961000
|
trusted library allocation
|
page read and write
|
||
58C3000
|
trusted library allocation
|
page read and write
|
||
5525000
|
trusted library allocation
|
page read and write
|
||
53AC000
|
trusted library allocation
|
page read and write
|
||
5390000
|
trusted library allocation
|
page read and write
|
||
58C6000
|
trusted library allocation
|
page read and write
|
||
581D000
|
trusted library allocation
|
page read and write
|
||
538D000
|
trusted library allocation
|
page read and write
|
||
5386000
|
trusted library allocation
|
page read and write
|
||
53A5000
|
trusted library allocation
|
page read and write
|
||
4840000
|
heap
|
page read and write
|
||
5817000
|
trusted library allocation
|
page read and write
|
||
3F2E000
|
stack
|
page read and write
|
||
114B000
|
unkown
|
page execute and read and write
|
||
53AF000
|
trusted library allocation
|
page read and write
|
||
58CC000
|
trusted library allocation
|
page read and write
|
||
53C9000
|
trusted library allocation
|
page read and write
|
||
5906000
|
trusted library allocation
|
page read and write
|
||
4880000
|
direct allocation
|
page read and write
|
||
596B000
|
trusted library allocation
|
page read and write
|
||
5821000
|
trusted library allocation
|
page read and write
|
||
5380000
|
trusted library allocation
|
page read and write
|
||
5A5D000
|
trusted library allocation
|
page read and write
|
||
538D000
|
trusted library allocation
|
page read and write
|
||
362F000
|
stack
|
page read and write
|
||
859000
|
heap
|
page read and write
|
||
53AF000
|
trusted library allocation
|
page read and write
|
||
5812000
|
trusted library allocation
|
page read and write
|
||
5D0000
|
heap
|
page read and write
|
||
539E000
|
trusted library allocation
|
page read and write
|
||
593B000
|
trusted library allocation
|
page read and write
|
||
78AF000
|
stack
|
page read and write
|
||
6C2F000
|
stack
|
page read and write
|
||
5948000
|
trusted library allocation
|
page read and write
|
||
86A000
|
heap
|
page read and write
|
||
4F0F000
|
stack
|
page read and write
|
||
5555000
|
trusted library allocation
|
page read and write
|
||
5814000
|
trusted library allocation
|
page read and write
|
||
581E000
|
trusted library allocation
|
page read and write
|
||
550A000
|
trusted library allocation
|
page read and write
|
||
53AC000
|
trusted library allocation
|
page read and write
|
||
53BF000
|
trusted library allocation
|
page read and write
|
||
5D4000
|
heap
|
page read and write
|
||
538D000
|
trusted library allocation
|
page read and write
|
||
539F000
|
trusted library allocation
|
page read and write
|
||
5D4000
|
heap
|
page read and write
|
||
53BF000
|
trusted library allocation
|
page read and write
|
||
5810000
|
trusted library allocation
|
page read and write
|
||
5387000
|
trusted library allocation
|
page read and write
|
||
7F82000
|
trusted library allocation
|
page read and write
|
||
82FC000
|
stack
|
page read and write
|
||
537B000
|
trusted library allocation
|
page read and write
|
||
5371000
|
trusted library allocation
|
page read and write
|
||
5904000
|
trusted library allocation
|
page read and write
|
||
1D0000
|
heap
|
page read and write
|
||
7E60000
|
direct allocation
|
page execute and read and write
|
||
5811000
|
trusted library allocation
|
page read and write
|
||
5395000
|
trusted library allocation
|
page read and write
|
||
5382000
|
trusted library allocation
|
page read and write
|
||
53A4000
|
trusted library allocation
|
page read and write
|
||
5985000
|
trusted library allocation
|
page read and write
|
||
5D4000
|
heap
|
page read and write
|
||
D05000
|
unkown
|
page write copy
|
||
863000
|
heap
|
page read and write
|
||
58A9000
|
trusted library allocation
|
page read and write
|
||
5387000
|
trusted library allocation
|
page read and write
|
||
43F1000
|
heap
|
page read and write
|
||
53A9000
|
trusted library allocation
|
page read and write
|
||
596D000
|
trusted library allocation
|
page read and write
|
||
58E3000
|
trusted library allocation
|
page read and write
|
||
5812000
|
trusted library allocation
|
page read and write
|
||
762F000
|
stack
|
page read and write
|
||
86A000
|
heap
|
page read and write
|
||
7F80000
|
trusted library allocation
|
page read and write
|
||
5A2F000
|
trusted library allocation
|
page read and write
|
||
38EE000
|
stack
|
page read and write
|
||
CA0000
|
direct allocation
|
page read and write
|
||
5382000
|
trusted library allocation
|
page read and write
|
||
7C70000
|
direct allocation
|
page read and write
|
||
37AE000
|
stack
|
page read and write
|
||
53E8000
|
trusted library allocation
|
page read and write
|
||
538A000
|
trusted library allocation
|
page read and write
|
||
53BF000
|
trusted library allocation
|
page read and write
|
||
53EB000
|
trusted library allocation
|
page read and write
|
||
58B7000
|
trusted library allocation
|
page read and write
|
||
5380000
|
trusted library allocation
|
page read and write
|
||
5950000
|
trusted library allocation
|
page read and write
|
||
539F000
|
trusted library allocation
|
page read and write
|
||
776F000
|
stack
|
page read and write
|
||
43F1000
|
heap
|
page read and write
|
||
597A000
|
trusted library allocation
|
page read and write
|
||
595F000
|
trusted library allocation
|
page read and write
|
||
53BF000
|
trusted library allocation
|
page read and write
|
||
53AC000
|
trusted library allocation
|
page read and write
|
||
5372000
|
trusted library allocation
|
page read and write
|
||
5942000
|
trusted library allocation
|
page read and write
|
||
58DB000
|
trusted library allocation
|
page read and write
|
||
53A3000
|
trusted library allocation
|
page read and write
|
||
592A000
|
trusted library allocation
|
page read and write
|
||
4A30000
|
direct allocation
|
page execute and read and write
|
||
53B0000
|
trusted library allocation
|
page read and write
|
||
84E000
|
heap
|
page read and write
|
||
539E000
|
trusted library allocation
|
page read and write
|
||
53BF000
|
trusted library allocation
|
page read and write
|
||
5817000
|
trusted library allocation
|
page read and write
|
||
53BF000
|
trusted library allocation
|
page read and write
|
||
7F1000
|
heap
|
page read and write
|
||
53BE000
|
trusted library allocation
|
page read and write
|
||
6D6F000
|
stack
|
page read and write
|
||
861000
|
heap
|
page read and write
|
||
537E000
|
trusted library allocation
|
page read and write
|
||
5BC6000
|
trusted library allocation
|
page read and write
|
||
CF3000
|
unkown
|
page execute and read and write
|
||
5394000
|
trusted library allocation
|
page read and write
|
||
53A4000
|
trusted library allocation
|
page read and write
|
||
53BF000
|
trusted library allocation
|
page read and write
|
||
5814000
|
trusted library allocation
|
page read and write
|
||
53D3000
|
trusted library allocation
|
page read and write
|
||
86E000
|
heap
|
page read and write
|
||
53A7000
|
trusted library allocation
|
page read and write
|
||
2FEF000
|
stack
|
page read and write
|
||
58D7000
|
trusted library allocation
|
page read and write
|
||
5428000
|
trusted library allocation
|
page read and write
|
||
60EF000
|
stack
|
page read and write
|
||
5399000
|
trusted library allocation
|
page read and write
|
||
53BA000
|
trusted library allocation
|
page read and write
|
||
42AF000
|
stack
|
page read and write
|
||
539E000
|
trusted library allocation
|
page read and write
|
||
5A31000
|
trusted library allocation
|
page read and write
|
||
84A000
|
heap
|
page read and write
|
||
4A10000
|
direct allocation
|
page execute and read and write
|
||
5415000
|
trusted library allocation
|
page read and write
|
||
86E000
|
heap
|
page read and write
|
||
5386000
|
trusted library allocation
|
page read and write
|
||
312F000
|
stack
|
page read and write
|
||
7B6E000
|
stack
|
page read and write
|
||
590B000
|
trusted library allocation
|
page read and write
|
||
5957000
|
trusted library allocation
|
page read and write
|
||
53BF000
|
trusted library allocation
|
page read and write
|
||
53D8000
|
trusted library allocation
|
page read and write
|
||
58EF000
|
trusted library allocation
|
page read and write
|
||
53DB000
|
trusted library allocation
|
page read and write
|
||
850000
|
heap
|
page read and write
|
||
CB0000
|
unkown
|
page readonly
|
||
7D2B000
|
stack
|
page read and write
|
||
C9E000
|
stack
|
page read and write
|
||
581D000
|
trusted library allocation
|
page read and write
|
||
5BCA000
|
trusted library allocation
|
page execute and read and write
|
||
5815000
|
trusted library allocation
|
page read and write
|
||
5395000
|
trusted library allocation
|
page read and write
|
||
59D1000
|
trusted library allocation
|
page read and write
|
||
58C1000
|
trusted library allocation
|
page read and write
|
||
43F1000
|
heap
|
page read and write
|
||
5812000
|
trusted library allocation
|
page read and write
|
||
581E000
|
trusted library allocation
|
page read and write
|
||
863000
|
heap
|
page read and write
|
||
4FA000
|
stack
|
page read and write
|
||
7C70000
|
direct allocation
|
page read and write
|
||
58FE000
|
trusted library allocation
|
page read and write
|
||
84F000
|
heap
|
page read and write
|
||
5382000
|
trusted library allocation
|
page read and write
|
||
53BF000
|
trusted library allocation
|
page read and write
|
||
53DC000
|
trusted library allocation
|
page read and write
|
||
539E000
|
trusted library allocation
|
page read and write
|
||
5818000
|
trusted library allocation
|
page read and write
|
||
53B7000
|
trusted library allocation
|
page read and write
|
||
555D000
|
trusted library allocation
|
page read and write
|
||
7C70000
|
direct allocation
|
page read and write
|
||
53E8000
|
trusted library allocation
|
page read and write
|
||
CA0000
|
direct allocation
|
page read and write
|
||
843000
|
heap
|
page read and write
|
||
96E000
|
stack
|
page read and write
|
||
53B0000
|
trusted library allocation
|
page read and write
|
||
53B0000
|
trusted library allocation
|
page read and write
|
||
5376000
|
trusted library allocation
|
page read and write
|
||
48C2000
|
direct allocation
|
page read and write
|
||
58D5000
|
trusted library allocation
|
page read and write
|
||
9760000
|
trusted library allocation
|
page read and write
|
||
53BF000
|
trusted library allocation
|
page read and write
|
||
53A5000
|
trusted library allocation
|
page read and write
|
||
BFB000
|
stack
|
page read and write
|
||
53BF000
|
trusted library allocation
|
page read and write
|
||
5815000
|
trusted library allocation
|
page read and write
|
||
5817000
|
trusted library allocation
|
page read and write
|
||
53E4000
|
trusted library allocation
|
page read and write
|
||
7C70000
|
direct allocation
|
page read and write
|
||
5AB7000
|
trusted library allocation
|
page read and write
|
||
5376000
|
trusted library allocation
|
page read and write
|
||
5933000
|
trusted library allocation
|
page read and write
|
||
7CA0000
|
heap
|
page read and write
|
||
590A000
|
trusted library allocation
|
page read and write
|
||
53BF000
|
trusted library allocation
|
page read and write
|
||
5816000
|
trusted library allocation
|
page read and write
|
||
F97000
|
unkown
|
page execute and read and write
|
||
53BF000
|
trusted library allocation
|
page read and write
|
||
53CD000
|
trusted library allocation
|
page read and write
|
||
7C70000
|
direct allocation
|
page read and write
|
||
416F000
|
stack
|
page read and write
|
||
53A3000
|
trusted library allocation
|
page read and write
|
||
86A000
|
heap
|
page read and write
|
||
752E000
|
stack
|
page read and write
|
||
53B0000
|
trusted library allocation
|
page read and write
|
||
3CAE000
|
stack
|
page read and write
|
||
541C000
|
trusted library allocation
|
page read and write
|
||
5814000
|
trusted library allocation
|
page read and write
|
||
53E4000
|
trusted library allocation
|
page read and write
|
||
E92000
|
unkown
|
page execute and read and write
|
||
5377000
|
trusted library allocation
|
page read and write
|
||
53C6000
|
trusted library allocation
|
page read and write
|
||
FAE000
|
unkown
|
page execute and write copy
|
||
83F000
|
heap
|
page read and write
|
||
6B2E000
|
stack
|
page read and write
|
||
86A000
|
heap
|
page read and write
|
||
5484000
|
trusted library allocation
|
page read and write
|
||
3B6E000
|
stack
|
page read and write
|
||
51EF000
|
stack
|
page read and write
|
||
73EE000
|
stack
|
page read and write
|
||
541D000
|
trusted library allocation
|
page read and write
|
||
53BD000
|
trusted library allocation
|
page read and write
|
||
376F000
|
stack
|
page read and write
|
||
43F1000
|
heap
|
page read and write
|
||
114C000
|
unkown
|
page execute and write copy
|
||
83F000
|
heap
|
page read and write
|
||
7B2F000
|
stack
|
page read and write
|
||
86A000
|
heap
|
page read and write
|
||
53A7000
|
trusted library allocation
|
page read and write
|
||
53ED000
|
trusted library allocation
|
page read and write
|
||
78EE000
|
stack
|
page read and write
|
||
5BC2000
|
trusted library allocation
|
page execute and read and write
|
||
5390000
|
trusted library allocation
|
page read and write
|
||
58CB000
|
trusted library allocation
|
page read and write
|
||
53BF000
|
trusted library allocation
|
page read and write
|
||
5813000
|
trusted library allocation
|
page read and write
|
||
539F000
|
trusted library allocation
|
page read and write
|
||
D07000
|
unkown
|
page execute and read and write
|
||
63AE000
|
stack
|
page read and write
|
||
53BD000
|
trusted library allocation
|
page read and write
|
||
581A000
|
trusted library allocation
|
page read and write
|
||
53D7000
|
trusted library allocation
|
page read and write
|
||
537B000
|
trusted library allocation
|
page read and write
|
||
85E000
|
heap
|
page read and write
|
||
86E000
|
heap
|
page read and write
|
||
5811000
|
trusted library allocation
|
page read and write
|
||
43F1000
|
heap
|
page read and write
|
||
5382000
|
trusted library allocation
|
page read and write
|
||
3DAF000
|
stack
|
page read and write
|
||
CA0000
|
direct allocation
|
page read and write
|
||
53C8000
|
trusted library allocation
|
page read and write
|
||
86C000
|
heap
|
page read and write
|
||
5A4D000
|
trusted library allocation
|
page read and write
|
||
5D4000
|
heap
|
page read and write
|
||
591F000
|
trusted library allocation
|
page read and write
|
||
581F000
|
trusted library allocation
|
page read and write
|
||
5404000
|
trusted library allocation
|
page read and write
|
||
59E0000
|
trusted library allocation
|
page read and write
|
||
5394000
|
trusted library allocation
|
page read and write
|
||
5D4000
|
heap
|
page read and write
|
||
44F0000
|
trusted library allocation
|
page read and write
|
||
581A000
|
trusted library allocation
|
page read and write
|
||
5386000
|
trusted library allocation
|
page read and write
|
||
547B000
|
trusted library allocation
|
page read and write
|
||
5813000
|
trusted library allocation
|
page read and write
|
||
581B000
|
trusted library allocation
|
page read and write
|
||
4A10000
|
direct allocation
|
page execute and read and write
|
||
82A000
|
heap
|
page read and write
|
||
58F5000
|
trusted library allocation
|
page read and write
|
||
538A000
|
trusted library allocation
|
page read and write
|
||
86E000
|
heap
|
page read and write
|
||
5D4000
|
heap
|
page read and write
|
||
860000
|
heap
|
page read and write
|
||
29EF000
|
stack
|
page read and write
|
||
7F8A000
|
trusted library allocation
|
page read and write
|
||
4B8D000
|
stack
|
page read and write
|
||
539E000
|
trusted library allocation
|
page read and write
|
||
5472000
|
trusted library allocation
|
page read and write
|
||
53EF000
|
trusted library allocation
|
page read and write
|
||
53BF000
|
trusted library allocation
|
page read and write
|
||
539F000
|
trusted library allocation
|
page read and write
|
||
863000
|
heap
|
page read and write
|
||
5D4000
|
heap
|
page read and write
|
||
869000
|
heap
|
page read and write
|
||
CB1000
|
unkown
|
page execute and read and write
|
||
38AF000
|
stack
|
page read and write
|
||
CB0000
|
unkown
|
page read and write
|
||
53D8000
|
trusted library allocation
|
page read and write
|
||
5388000
|
trusted library allocation
|
page read and write
|
||
554D000
|
trusted library allocation
|
page read and write
|
||
53A6000
|
trusted library allocation
|
page read and write
|
||
5E68000
|
trusted library allocation
|
page execute and read and write
|
||
53A0000
|
trusted library allocation
|
page read and write
|
||
84E000
|
heap
|
page read and write
|
||
53ED000
|
trusted library allocation
|
page read and write
|
||
CA0000
|
direct allocation
|
page read and write
|
||
86E000
|
heap
|
page read and write
|
||
53AF000
|
trusted library allocation
|
page read and write
|
||
58F7000
|
trusted library allocation
|
page read and write
|
||
5813000
|
trusted library allocation
|
page read and write
|
||
86A000
|
heap
|
page read and write
|
||
53BF000
|
trusted library allocation
|
page read and write
|
||
58CD000
|
trusted library allocation
|
page read and write
|
||
58ED000
|
trusted library allocation
|
page read and write
|
||
5D4000
|
heap
|
page read and write
|
||
3A2E000
|
stack
|
page read and write
|
||
53B1000
|
trusted library allocation
|
page read and write
|
||
69EE000
|
stack
|
page read and write
|
||
592C000
|
trusted library allocation
|
page read and write
|
||
53DD000
|
trusted library allocation
|
page read and write
|
||
5810000
|
trusted library allocation
|
page read and write
|
||
53BD000
|
trusted library allocation
|
page read and write
|
||
4A00000
|
direct allocation
|
page execute and read and write
|
||
5983000
|
trusted library allocation
|
page read and write
|
||
59CF000
|
trusted library allocation
|
page read and write
|
||
5D4000
|
heap
|
page read and write
|
||
53AC000
|
trusted library allocation
|
page read and write
|
||
2C2F000
|
stack
|
page read and write
|
||
7C1000
|
heap
|
page read and write
|
||
53A6000
|
trusted library allocation
|
page read and write
|
||
843000
|
heap
|
page read and write
|
||
5816000
|
trusted library allocation
|
page read and write
|
||
53A0000
|
trusted library allocation
|
page read and write
|
||
53BF000
|
trusted library allocation
|
page read and write
|
||
539E000
|
trusted library allocation
|
page read and write
|
||
7C70000
|
direct allocation
|
page read and write
|
||
53AF000
|
trusted library allocation
|
page read and write
|
||
581F000
|
trusted library allocation
|
page read and write
|
||
79EF000
|
stack
|
page read and write
|
||
53AF000
|
trusted library allocation
|
page read and write
|
||
716E000
|
stack
|
page read and write
|
||
7CC0000
|
trusted library allocation
|
page read and write
|
||
590D000
|
trusted library allocation
|
page read and write
|
||
5AA6000
|
trusted library allocation
|
page read and write
|
||
5906000
|
trusted library allocation
|
page read and write
|
||
43F1000
|
heap
|
page read and write
|
||
53A4000
|
trusted library allocation
|
page read and write
|
||
7C70000
|
direct allocation
|
page read and write
|
||
42EE000
|
stack
|
page read and write
|
||
53D5000
|
trusted library allocation
|
page read and write
|
||
53CA000
|
trusted library allocation
|
page read and write
|
||
5380000
|
trusted library allocation
|
page read and write
|
||
5A4F000
|
trusted library allocation
|
page read and write
|
||
7BC000
|
heap
|
page read and write
|
||
84F000
|
heap
|
page read and write
|
||
539F000
|
trusted library allocation
|
page read and write
|
||
539F000
|
trusted library allocation
|
page read and write
|
||
43F1000
|
heap
|
page read and write
|
||
622F000
|
stack
|
page read and write
|
||
352E000
|
stack
|
page read and write
|
||
86A000
|
heap
|
page read and write
|
||
53A5000
|
trusted library allocation
|
page read and write
|
||
537E000
|
trusted library allocation
|
page read and write
|
||
53B8000
|
trusted library allocation
|
page read and write
|
||
5909000
|
trusted library allocation
|
page read and write
|
||
3B2E000
|
stack
|
page read and write
|
||
77E000
|
heap
|
page read and write
|
||
53A6000
|
trusted library allocation
|
page read and write
|
||
851000
|
heap
|
page read and write
|
||
5AAA000
|
trusted library allocation
|
page read and write
|
||
53D1000
|
trusted library allocation
|
page read and write
|
||
539C000
|
trusted library allocation
|
page read and write
|
||
5812000
|
trusted library allocation
|
page read and write
|
||
53E8000
|
trusted library allocation
|
page read and write
|
||
5E6A000
|
trusted library allocation
|
page execute and read and write
|
||
537B000
|
trusted library allocation
|
page read and write
|
||
5375000
|
trusted library allocation
|
page read and write
|
||
5389000
|
trusted library allocation
|
page read and write
|
||
85A000
|
heap
|
page read and write
|
||
53B0000
|
trusted library allocation
|
page read and write
|
||
CA0000
|
direct allocation
|
page read and write
|
||
53BB000
|
trusted library allocation
|
page read and write
|
||
5394000
|
trusted library allocation
|
page read and write
|
||
48CC000
|
stack
|
page read and write
|
||
5816000
|
trusted library allocation
|
page read and write
|
||
537E000
|
trusted library allocation
|
page read and write
|
||
5399000
|
trusted library allocation
|
page read and write
|
||
4F10000
|
remote allocation
|
page read and write
|
||
53AF000
|
trusted library allocation
|
page read and write
|
||
5815000
|
trusted library allocation
|
page read and write
|
||
5394000
|
trusted library allocation
|
page read and write
|
||
53DD000
|
trusted library allocation
|
page read and write
|
||
43F0000
|
heap
|
page read and write
|
||
53B5000
|
trusted library allocation
|
page read and write
|
||
58E1000
|
trusted library allocation
|
page read and write
|
||
5378000
|
trusted library allocation
|
page read and write
|
||
5813000
|
trusted library allocation
|
page read and write
|
||
539E000
|
trusted library allocation
|
page read and write
|
||
539E000
|
trusted library allocation
|
page read and write
|
||
58CE000
|
trusted library allocation
|
page read and write
|
||
539F000
|
trusted library allocation
|
page read and write
|
||
5978000
|
trusted library allocation
|
page read and write
|
||
591E000
|
trusted library allocation
|
page read and write
|
||
5933000
|
trusted library allocation
|
page read and write
|
||
7A7000
|
heap
|
page read and write
|
||
71E000
|
stack
|
page read and write
|
||
5813000
|
trusted library allocation
|
page read and write
|
||
5374000
|
trusted library allocation
|
page read and write
|
||
53A9000
|
trusted library allocation
|
page read and write
|
||
5813000
|
trusted library allocation
|
page read and write
|
||
5390000
|
trusted library allocation
|
page read and write
|
||
5955000
|
trusted library allocation
|
page read and write
|
||
5930000
|
trusted library allocation
|
page read and write
|
||
581F000
|
trusted library allocation
|
page read and write
|
||
539F000
|
trusted library allocation
|
page read and write
|
||
53AF000
|
trusted library allocation
|
page read and write
|
||
53D0000
|
trusted library allocation
|
page read and write
|
||
5818000
|
trusted library allocation
|
page read and write
|
||
43F1000
|
heap
|
page read and write
|
||
843000
|
heap
|
page read and write
|
||
77AE000
|
stack
|
page read and write
|
||
53BF000
|
trusted library allocation
|
page read and write
|
||
32AE000
|
stack
|
page read and write
|
||
86E000
|
heap
|
page read and write
|
||
53CA000
|
trusted library allocation
|
page read and write
|
||
5379000
|
trusted library allocation
|
page read and write
|
||
CA0000
|
direct allocation
|
page read and write
|
||
537C000
|
trusted library allocation
|
page read and write
|
||
53A7000
|
trusted library allocation
|
page read and write
|
||
5911000
|
trusted library allocation
|
page read and write
|
||
859000
|
heap
|
page read and write
|
||
5382000
|
trusted library allocation
|
page read and write
|
||
82F000
|
heap
|
page read and write
|
||
53BF000
|
trusted library allocation
|
page read and write
|
||
7C70000
|
direct allocation
|
page read and write
|
||
859000
|
heap
|
page read and write
|
||
84A000
|
heap
|
page read and write
|
||
2AEF000
|
stack
|
page read and write
|
||
5816000
|
trusted library allocation
|
page read and write
|
||
53A9000
|
trusted library allocation
|
page read and write
|
||
CA0000
|
direct allocation
|
page read and write
|
||
547E000
|
trusted library allocation
|
page read and write
|
||
5814000
|
trusted library allocation
|
page read and write
|
||
5395000
|
trusted library allocation
|
page read and write
|
||
5371000
|
trusted library allocation
|
page read and write
|
||
4A10000
|
direct allocation
|
page execute and read and write
|
||
64AF000
|
stack
|
page read and write
|
||
3DEE000
|
stack
|
page read and write
|
||
53BC000
|
trusted library allocation
|
page read and write
|
||
5944000
|
trusted library allocation
|
page read and write
|
||
5203000
|
heap
|
page read and write
|
||
CA0000
|
direct allocation
|
page read and write
|
||
6DAE000
|
stack
|
page read and write
|
||
58CD000
|
trusted library allocation
|
page read and write
|
||
5D4000
|
heap
|
page read and write
|
||
53CE000
|
trusted library allocation
|
page read and write
|
||
58E7000
|
trusted library allocation
|
page read and write
|
||
53C0000
|
trusted library allocation
|
page read and write
|
||
859000
|
heap
|
page read and write
|
||
53AE000
|
trusted library allocation
|
page read and write
|
||
53B0000
|
trusted library allocation
|
page read and write
|
||
5920000
|
trusted library allocation
|
page read and write
|
||
770000
|
heap
|
page read and write
|
||
4F10000
|
remote allocation
|
page read and write
|
||
581D000
|
trusted library allocation
|
page read and write
|
||
3C6E000
|
stack
|
page read and write
|
||
84D000
|
heap
|
page read and write
|
||
6EAF000
|
stack
|
page read and write
|
||
326F000
|
stack
|
page read and write
|
||
581F000
|
trusted library allocation
|
page read and write
|
||
843000
|
heap
|
page read and write
|
||
5816000
|
trusted library allocation
|
page read and write
|
||
5928000
|
trusted library allocation
|
page read and write
|
||
538C000
|
trusted library allocation
|
page read and write
|
||
86C000
|
heap
|
page read and write
|
||
53A3000
|
trusted library allocation
|
page read and write
|
||
539E000
|
trusted library allocation
|
page read and write
|
||
5390000
|
trusted library allocation
|
page read and write
|
||
686F000
|
stack
|
page read and write
|
||
73AF000
|
stack
|
page read and write
|
||
84D000
|
heap
|
page read and write
|
||
833E000
|
stack
|
page read and write
|
||
5A0A000
|
trusted library allocation
|
page read and write
|
||
54E0000
|
direct allocation
|
page read and write
|
||
53C4000
|
trusted library allocation
|
page read and write
|
||
53BF000
|
trusted library allocation
|
page read and write
|
||
53DC000
|
trusted library allocation
|
page read and write
|
||
841000
|
heap
|
page read and write
|
||
33EE000
|
stack
|
page read and write
|
||
41AE000
|
stack
|
page read and write
|
||
4B4C000
|
stack
|
page read and write
|
||
5370000
|
trusted library allocation
|
page read and write
|
||
541D000
|
trusted library allocation
|
page read and write
|
||
7D6000
|
heap
|
page read and write
|
||
43F1000
|
heap
|
page read and write
|
||
7E30000
|
direct allocation
|
page execute and read and write
|
||
FAD000
|
unkown
|
page execute and read and write
|
||
7C70000
|
direct allocation
|
page read and write
|
||
626E000
|
stack
|
page read and write
|
||
702E000
|
stack
|
page read and write
|
||
53B0000
|
trusted library allocation
|
page read and write
|
||
5812000
|
trusted library allocation
|
page read and write
|
||
53C8000
|
trusted library allocation
|
page read and write
|
||
590C000
|
trusted library allocation
|
page read and write
|
||
5386000
|
trusted library allocation
|
page read and write
|
||
4F7E000
|
stack
|
page read and write
|
||
CA0000
|
direct allocation
|
page read and write
|
||
59AB000
|
trusted library allocation
|
page read and write
|
||
7C70000
|
direct allocation
|
page read and write
|
||
53AE000
|
trusted library allocation
|
page read and write
|
||
843000
|
heap
|
page read and write
|
||
CA0000
|
direct allocation
|
page read and write
|
||
53ED000
|
trusted library allocation
|
page read and write
|
||
53B0000
|
trusted library allocation
|
page read and write
|
||
53CC000
|
trusted library allocation
|
page read and write
|
||
537D000
|
trusted library allocation
|
page read and write
|
||
636F000
|
stack
|
page read and write
|
||
7E2F000
|
stack
|
page read and write
|
||
366E000
|
stack
|
page read and write
|
||
672F000
|
stack
|
page read and write
|
||
7C70000
|
direct allocation
|
page read and write
|
||
537A000
|
trusted library allocation
|
page read and write
|
||
843E000
|
stack
|
page read and write
|
||
5913000
|
trusted library allocation
|
page read and write
|
||
53BF000
|
trusted library allocation
|
page read and write
|
||
6AEF000
|
stack
|
page read and write
|
||
5386000
|
trusted library allocation
|
page read and write
|
||
D05000
|
unkown
|
page read and write
|
||
538B000
|
trusted library allocation
|
page read and write
|
||
5815000
|
trusted library allocation
|
page read and write
|
||
538C000
|
trusted library allocation
|
page read and write
|
||
53D8000
|
trusted library allocation
|
page read and write
|
||
F6C000
|
unkown
|
page execute and read and write
|
||
863000
|
heap
|
page read and write
|
||
7A2E000
|
stack
|
page read and write
|
||
5819000
|
trusted library allocation
|
page read and write
|
||
6C6E000
|
stack
|
page read and write
|
||
53B0000
|
trusted library allocation
|
page read and write
|
||
538B000
|
trusted library allocation
|
page read and write
|
||
595E000
|
trusted library allocation
|
page read and write
|
||
53AF000
|
trusted library allocation
|
page read and write
|
||
81FC000
|
stack
|
page read and write
|
||
53CA000
|
trusted library allocation
|
page read and write
|
||
5942000
|
trusted library allocation
|
page read and write
|
||
4F10000
|
remote allocation
|
page read and write
|
||
539F000
|
trusted library allocation
|
page read and write
|
||
5813000
|
trusted library allocation
|
page read and write
|
||
5815000
|
trusted library allocation
|
page read and write
|
||
5FEB000
|
stack
|
page read and write
|
||
7C70000
|
direct allocation
|
page read and write
|
||
840000
|
heap
|
page read and write
|
||
539F000
|
trusted library allocation
|
page read and write
|
||
54B5000
|
trusted library allocation
|
page read and write
|
||
58D9000
|
trusted library allocation
|
page read and write
|
||
5D4000
|
heap
|
page read and write
|
||
59DE000
|
trusted library allocation
|
page read and write
|
||
43F1000
|
heap
|
page read and write
|
||
581D000
|
trusted library allocation
|
page read and write
|
||
539F000
|
trusted library allocation
|
page read and write
|
||
581E000
|
trusted library allocation
|
page read and write
|
||
54A9000
|
stack
|
page read and write
|
||
859000
|
heap
|
page read and write
|
||
53A9000
|
trusted library allocation
|
page read and write
|
||
5473000
|
trusted library allocation
|
page read and write
|
||
5394000
|
trusted library allocation
|
page read and write
|
||
53BF000
|
trusted library allocation
|
page read and write
|
||
5816000
|
trusted library allocation
|
page read and write
|
||
43F1000
|
heap
|
page read and write
|
||
58F2000
|
trusted library allocation
|
page read and write
|
||
53AA000
|
trusted library allocation
|
page read and write
|
||
5908000
|
trusted library allocation
|
page read and write
|
||
5610000
|
trusted library allocation
|
page read and write
|
||
53BF000
|
trusted library allocation
|
page read and write
|
||
5934000
|
trusted library allocation
|
page read and write
|
||
84A000
|
heap
|
page read and write
|
||
2D6F000
|
stack
|
page read and write
|
||
592A000
|
trusted library allocation
|
page read and write
|
||
53B0000
|
trusted library allocation
|
page read and write
|
There are 887 hidden memdumps, click here to show them.
DOM / HTML
URL
|
Malicious
|
|
---|---|---|
https://learn.microsoft.com/en-us/dotnet/framework/install/application-not-started?version=(null)&processName=file.exe&platform=0009&osver=6&isServer=0&shimver=4.0.30319.0
|
||
https://learn.microsoft.com/en-us/dotnet/framework/install/application-not-started?version=(null)&processName=file.exe&platform=0009&osver=6&isServer=0&shimver=4.0.30319.0
|
||
https://learn.microsoft.com/en-us/dotnet/framework/install/application-not-started?version=(null)&processName=file.exe&platform=0009&osver=6&isServer=0&shimver=4.0.30319.0
|
||
https://learn.microsoft.com/en-us/dotnet/framework/install/application-not-started?version=(null)&processName=file.exe&platform=0009&osver=6&isServer=0&shimver=4.0.30319.0
|
||
https://learn.microsoft.com/en-us/dotnet/framework/install/application-not-started?version=(null)&processName=file.exe&platform=0009&osver=6&isServer=0&shimver=4.0.30319.0
|