Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
file.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
initial sample
|
||
Chrome Cache Entry: 161
|
PNG image data, 533 x 478, 8-bit/color RGBA, non-interlaced
|
dropped
|
||
Chrome Cache Entry: 162
|
PNG image data, 533 x 478, 8-bit/color RGBA, non-interlaced
|
downloaded
|
||
Chrome Cache Entry: 163
|
SVG Scalable Vector Graphics image
|
dropped
|
||
Chrome Cache Entry: 164
|
JSON data
|
dropped
|
||
Chrome Cache Entry: 165
|
PNG image data, 533 x 478, 8-bit/color RGBA, non-interlaced
|
dropped
|
||
Chrome Cache Entry: 166
|
ASCII text, with very long lines (65536), with no line terminators
|
downloaded
|
||
Chrome Cache Entry: 167
|
JSON data
|
dropped
|
||
Chrome Cache Entry: 168
|
ASCII text, with very long lines (65410)
|
downloaded
|
||
Chrome Cache Entry: 169
|
JSON data
|
downloaded
|
||
Chrome Cache Entry: 170
|
PNG image data, 533 x 478, 8-bit/color RGBA, non-interlaced
|
downloaded
|
||
Chrome Cache Entry: 171
|
ASCII text, with very long lines (52717), with no line terminators
|
dropped
|
||
Chrome Cache Entry: 172
|
ASCII text
|
downloaded
|
||
Chrome Cache Entry: 173
|
ASCII text, with very long lines (52717), with no line terminators
|
downloaded
|
||
Chrome Cache Entry: 174
|
exported SGML document, ASCII text, with very long lines (65536), with no line terminators
|
downloaded
|
||
Chrome Cache Entry: 175
|
ASCII text, with no line terminators
|
downloaded
|
||
Chrome Cache Entry: 176
|
PNG image data, 533 x 478, 8-bit/color RGBA, non-interlaced
|
downloaded
|
||
Chrome Cache Entry: 177
|
MS Windows icon resource - 6 icons, -128x-128, 16 colors, 72x72, 16 colors
|
downloaded
|
||
Chrome Cache Entry: 178
|
ASCII text, with very long lines (46884)
|
downloaded
|
||
Chrome Cache Entry: 179
|
JSON data
|
dropped
|
||
Chrome Cache Entry: 180
|
MS Windows icon resource - 6 icons, -128x-128, 16 colors, 72x72, 16 colors
|
dropped
|
||
Chrome Cache Entry: 181
|
PNG image data, 658 x 480, 8-bit/color RGBA, non-interlaced
|
downloaded
|
||
Chrome Cache Entry: 182
|
ASCII text, with very long lines (33148), with no line terminators
|
dropped
|
||
Chrome Cache Entry: 183
|
JSON data
|
downloaded
|
||
Chrome Cache Entry: 184
|
JPEG image data, JFIF standard 1.01, aspect ratio, density 1x1, segment length 16, baseline, precision 8, 1528x402, components
3
|
dropped
|
||
Chrome Cache Entry: 185
|
PNG image data, 475 x 212, 8-bit/color RGBA, non-interlaced
|
downloaded
|
||
Chrome Cache Entry: 186
|
JSON data
|
downloaded
|
||
Chrome Cache Entry: 187
|
JPEG image data, JFIF standard 1.01, aspect ratio, density 1x1, segment length 16, baseline, precision 8, 1528x402, components
3
|
downloaded
|
||
Chrome Cache Entry: 188
|
exported SGML document, ASCII text, with very long lines (65536), with no line terminators
|
dropped
|
||
Chrome Cache Entry: 189
|
ASCII text, with very long lines (46884)
|
dropped
|
||
Chrome Cache Entry: 190
|
ASCII text
|
dropped
|
||
Chrome Cache Entry: 191
|
SVG Scalable Vector Graphics image
|
downloaded
|
||
Chrome Cache Entry: 192
|
Web Open Font Format (Version 2), TrueType, length 19696, version 1.0
|
downloaded
|
||
Chrome Cache Entry: 193
|
ASCII text, with very long lines (33148), with no line terminators
|
downloaded
|
||
Chrome Cache Entry: 194
|
PNG image data, 475 x 212, 8-bit/color RGBA, non-interlaced
|
dropped
|
||
Chrome Cache Entry: 195
|
PNG image data, 658 x 480, 8-bit/color RGBA, non-interlaced
|
dropped
|
||
Chrome Cache Entry: 196
|
JSON data
|
dropped
|
||
Chrome Cache Entry: 197
|
HTML document, ASCII text, with very long lines (639), with CRLF, LF line terminators
|
downloaded
|
||
Chrome Cache Entry: 198
|
JSON data
|
downloaded
|
||
Chrome Cache Entry: 200
|
PNG image data, 533 x 478, 8-bit/color RGBA, non-interlaced
|
dropped
|
There are 30 hidden files, click here to show them.
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\file.exe
|
"C:\Users\user\Desktop\file.exe"
|
||
C:\Program Files\Google\Chrome\Application\chrome.exe
|
"C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized --single-argument http://go.microsoft.com/fwlink/?prd=11324&pver=4.5&sbp=AppLaunch2&plcid=0x409&o1=SHIM_NOVERSION_FOUND&version=(null)&processName=file.exe&platform=0009&osver=6&isServer=0&shimver=4.0.30319.0
|
||
C:\Program Files\Google\Chrome\Application\chrome.exe
|
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US
--service-sandbox-type=none --mojo-platform-channel-handle=2404 --field-trial-handle=2240,i,11247665999065039724,17772590480702075197,262144
--disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction
/prefetch:8
|
||
C:\Program Files\Google\Chrome\Application\chrome.exe
|
"C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized --single-argument http://go.microsoft.com/fwlink/?prd=11324&pver=4.5&sbp=AppLaunch2&plcid=0x409&o1=SHIM_NOVERSION_FOUND&version=(null)&processName=file.exe&platform=0009&osver=6&isServer=0&shimver=4.0.30319.0
|
||
C:\Program Files\Google\Chrome\Application\chrome.exe
|
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US
--service-sandbox-type=none --mojo-platform-channel-handle=2068 --field-trial-handle=1968,i,1675136383235350527,12148286873504019134,262144
--disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction
/prefetch:8
|
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
https://authoring-docs-microsoft.poolparty.biz/devrel/7696cda6-0510-47f6-8302-71bb5d2e28cf
|
unknown
|
||
https://duckduckgo.com/chrome_newtab
|
unknown
|
||
http://185.215.113.16/-p
|
unknown
|
||
https://duckduckgo.com/ac/?q=
|
unknown
|
||
http://185.215.113.16/off/def.exeX
|
unknown
|
||
https://github.com/dotnet/docs/blob/17c4acca45e573a92878a44a2cce57d699fe9c7c/docs/framework/install/
|
unknown
|
||
https://www.linkedin.com/cws/share?url=$
|
unknown
|
||
https://atten-supporse.biz/apii/
|
unknown
|
||
https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
|
unknown
|
||
https://github.com/Youssef1313
|
unknown
|
||
https://tse1.mm.bing.net/th?id=OADD2.10239340418598_1HURUV6S4V3U642BB&pid=21.2&c=16&roil=0&roit=0&roir=1&roib=1&w=1920&h=1080&dynsize=1&qlt=90
|
150.171.27.10
|
||
https://contile-images.services.mozilla.com/T23eBL4EHswiSaF6kya2gYsRHvdfADK-NYjs1mVRNGE.3351.jpg
|
unknown
|
||
https://atten-supporse.biz/api1i
|
unknown
|
||
https://management.azure.com/providers/Microsoft.Portal/userSettings/cloudconsole?api-version=2023-0
|
unknown
|
||
https://aka.ms/msignite_docs_banner
|
unknown
|
||
https://videoencodingpublic-hgeaeyeba8gycee3.b01.azurefd.net/public-b4da8140-92cf-421c-8b7b-e471d5b9
|
unknown
|
||
http://polymer.github.io/AUTHORS.txt
|
unknown
|
||
https://github.com/dotnet/docs/issues/new?template=z-customer-feedback.yml
|
unknown
|
||
https://tse1.mm.bing.net/th?id=OADD2.10239381874334_1JBEHDL9HJ0N3B9DS&pid=21.2&c=16&roil=0&roit=0&roir=1&roib=1&w=1920&h=1080&dynsize=1&qlt=90
|
150.171.27.10
|
||
https://management.azure.com/subscriptions?api-version=2016-06-01
|
unknown
|
||
https://tse1.mm.bing.net/th?id=OADD2.10239381874333_1SBUUU4AZ65VOU6A5&pid=21.2&c=3&w=1080&h=1920&dynsize=1&qlt=90
|
150.171.27.10
|
||
https://github.com/dotnet/docs/blob/main/docs/framework/install/application-not-started.md
|
unknown
|
||
http://185.215.113.16/Op
|
unknown
|
||
http://x1.c.lencr.org/0
|
unknown
|
||
http://x1.i.lencr.org/0
|
unknown
|
||
https://aka.ms/pshelpmechoose
|
unknown
|
||
https://tse1.mm.bing.net/th?id=OADD2.10239400908957_11ARMP1O2WG7GINZB&pid=21.2&c=3&w=1080&h=1920&dynsize=1&qlt=90
|
150.171.27.10
|
||
https://aka.ms/feedback/report?space=61
|
unknown
|
||
https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
|
unknown
|
||
https://atten-supporse.biz/apiTA
|
unknown
|
||
https://learn-video.azurefd.net/vod/player
|
unknown
|
||
https://twitter.com/intent/tweet?original_referer=$
|
unknown
|
||
https://github.com/gewarren
|
unknown
|
||
https://support.mozilla.org/products/firefoxgro.all
|
unknown
|
||
http://polymer.github.io/CONTRIBUTORS.txt
|
unknown
|
||
https://www.mozilla.or
|
unknown
|
||
http://185.215.113.16/Hp
|
unknown
|
||
https://github.com/dotnet/docs/blob/live/docs/framework/install/application-not-started.md
|
unknown
|
||
https://authoring-docs-microsoft.poolparty.biz/devrel/69c76c32-967e-4c65-b89a-74cc527db725
|
unknown
|
||
https://client-api.arkoselabs.com/v2/api.js
|
unknown
|
||
https://aka.ms/MSIgniteChallenge/Tier1Banner?wt.mc_id=ignite24_learnbanner_tier1_cnl
|
unknown
|
||
https://management.azure.com/providers/Microsoft.Portal/consoles/default?api-version=2017-12-01-prev
|
unknown
|
||
https://www.google.com/images/branding/product/ico/googleg_lodp.ico
|
unknown
|
||
https://github.com/Thraka
|
unknown
|
||
https://bridge.sfo1.admarketplace.net/ctp?version=16.0.0&key=1696484494400800000.2&ci=1696484494189.
|
unknown
|
||
https://imp.mt48.net/static?id=7RHzfOIXjFEYsBdvIpkX4Qqm4pLk4pqk4pbW1pbWfpbW7ReNxR3UIG8zInwYIFIVs9eYi
|
unknown
|
||
http://polymer.github.io/PATENTS.txt
|
unknown
|
||
https://atten-supporse.biz/api9
|
unknown
|
||
https://aka.ms/certhelp
|
unknown
|
||
http://185.215.113.16/steam/random.exe
|
unknown
|
||
https://atten-supporse.biz/apiV
|
unknown
|
||
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
|
unknown
|
||
http://crl.rootca1.amazontrust.com/rootca1.crl0
|
unknown
|
||
https://atten-supporse.biz/api
|
172.67.165.166
|
||
https://github.com/mairaw
|
unknown
|
||
https://js.monitor.azure.com/scripts/c/ms.jsll-4.min.js
|
13.107.246.63
|
||
http://ocsp.rootca1.amazontrust.com0:
|
unknown
|
||
https://schema.org
|
unknown
|
||
http://polymer.github.io/LICENSE.txt
|
unknown
|
||
https://www.ecosia.org/newtab/
|
unknown
|
||
https://support.mozilla.org/kb/customize-firefox-controls-buttons-and-toolbars?utm_source=firefox-br
|
unknown
|
||
https://www.t-mobile.com/cell-phones/brand/apple?cmpid=MGPO_PAM_P_EVGRNIPHN_
|
unknown
|
||
https://atten-supporse.biz/api1/
|
unknown
|
||
https://aka.ms/yourcaliforniaprivacychoices
|
unknown
|
||
https://ac.ecosia.org/autocomplete?q=
|
unknown
|
||
https://github.com/nschonni
|
unknown
|
||
http://185.215.113.16/
|
unknown
|
||
https://tse1.mm.bing.net/th?id=OADD2.10239400908960_16UZRV6TOZWUH7P1W&pid=21.2&c=16&roil=0&roit=0&roir=1&roib=1&w=1920&h=1080&dynsize=1&qlt=90
|
150.171.27.10
|
||
https://videoencodingpublic-hgeaeyeba8gycee3.b01.azurefd.net/public-09ce73a6-05a5-4e4d-b3d7-bd5a8c05
|
unknown
|
||
https://github.com/adegeo
|
unknown
|
||
https://tse1.mm.bing.net/th?id=OADD2.10239340418597_1J0EQ8ZTOVJVXHV7G&pid=21.2&c=3&w=1080&h=1920&dynsize=1&qlt=90
|
150.171.27.10
|
||
https://contile-images.services.mozilla.com/obgoOYObjIFea_bXuT6L4LbBJ8j425AD87S1HMD3BWg.9991.jpg
|
unknown
|
||
https://github.com/jonschlinkert/is-plain-object
|
unknown
|
||
https://www.amazon.com/?tag=admarketus-20&ref=pd_sl_86277c656a4bd7d619968160e91c45fd066919bb3bd119b3
|
unknown
|
||
http://crt.rootca1.amazontrust.com/rootca1.cer0?
|
unknown
|
||
https://octokit.github.io/rest.js/#throttling
|
unknown
|
||
https://atten-supporse.biz:443/api
|
|||
https://github.com/js-cookie/js-cookie
|
unknown
|
||
http://185.215.113.16/off/def.exe
|
unknown
|
||
http://schema.org/Organization
|
unknown
|
||
https://atten-supporse.biz/
|
unknown
|
||
https://channel9.msdn.com/
|
unknown
|
||
https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
|
unknown
|
||
https://bridge.sfo1.ap01.net/ctp?version=16.0.0&key=1696484494400800000.1&ci=1696484494189.12791&cta
|
unknown
|
||
https://github.com/dotnet/try
|
unknown
|
There are 75 hidden URLs, click here to show them.
Domains
Name
|
IP
|
Malicious
|
|
---|---|---|---|
atten-supporse.biz
|
172.67.165.166
|
||
www.google.com
|
142.250.181.68
|
||
s-part-0035.t-0009.t-msedge.net
|
13.107.246.63
|
||
js.monitor.azure.com
|
unknown
|
||
mdec.nelreports.net
|
unknown
|
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
192.168.2.6
|
unknown
|
unknown
|
||
13.107.246.63
|
s-part-0035.t-0009.t-msedge.net
|
United States
|
||
185.215.113.16
|
unknown
|
Portugal
|
||
172.67.165.166
|
atten-supporse.biz
|
United States
|
||
239.255.255.250
|
unknown
|
Reserved
|
||
142.250.181.68
|
www.google.com
|
United States
|
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
5D41000
|
trusted library allocation
|
page read and write
|
||
5D38000
|
trusted library allocation
|
page read and write
|
||
58C0000
|
remote allocation
|
page read and write
|
||
5DED000
|
trusted library allocation
|
page read and write
|
||
6140000
|
trusted library allocation
|
page read and write
|
||
5D68000
|
trusted library allocation
|
page read and write
|
||
5D33000
|
trusted library allocation
|
page read and write
|
||
5DEE000
|
trusted library allocation
|
page read and write
|
||
5D33000
|
trusted library allocation
|
page read and write
|
||
626C000
|
trusted library allocation
|
page read and write
|
||
5DCF000
|
trusted library allocation
|
page read and write
|
||
5DB8000
|
trusted library allocation
|
page read and write
|
||
6237000
|
trusted library allocation
|
page read and write
|
||
6132000
|
trusted library allocation
|
page read and write
|
||
1568000
|
heap
|
page read and write
|
||
5D42000
|
trusted library allocation
|
page read and write
|
||
5DEA000
|
trusted library allocation
|
page read and write
|
||
613B000
|
trusted library allocation
|
page read and write
|
||
5D5F000
|
trusted library allocation
|
page read and write
|
||
5DF0000
|
trusted library allocation
|
page read and write
|
||
6135000
|
trusted library allocation
|
page read and write
|
||
613E000
|
trusted library allocation
|
page read and write
|
||
5E28000
|
trusted library allocation
|
page read and write
|
||
5282000
|
direct allocation
|
page read and write
|
||
5DEC000
|
trusted library allocation
|
page read and write
|
||
6223000
|
trusted library allocation
|
page read and write
|
||
5D59000
|
trusted library allocation
|
page read and write
|
||
4D90000
|
direct allocation
|
page read and write
|
||
5DE6000
|
trusted library allocation
|
page read and write
|
||
5D4C000
|
trusted library allocation
|
page read and write
|
||
5D51000
|
trusted library allocation
|
page read and write
|
||
5D33000
|
trusted library allocation
|
page read and write
|
||
5D30000
|
trusted library allocation
|
page read and write
|
||
5D72000
|
trusted library allocation
|
page read and write
|
||
6130000
|
trusted library allocation
|
page read and write
|
||
6286000
|
trusted library allocation
|
page read and write
|
||
5D29000
|
trusted library allocation
|
page read and write
|
||
6132000
|
trusted library allocation
|
page read and write
|
||
5DC0000
|
trusted library allocation
|
page read and write
|
||
5D42000
|
trusted library allocation
|
page read and write
|
||
5D42000
|
trusted library allocation
|
page read and write
|
||
4DA1000
|
heap
|
page read and write
|
||
61F5000
|
trusted library allocation
|
page read and write
|
||
63DF000
|
trusted library allocation
|
page read and write
|
||
6202000
|
trusted library allocation
|
page read and write
|
||
5DE2000
|
trusted library allocation
|
page read and write
|
||
5D6A000
|
trusted library allocation
|
page read and write
|
||
5D2A000
|
trusted library allocation
|
page read and write
|
||
6134000
|
trusted library allocation
|
page read and write
|
||
5DF6000
|
trusted library allocation
|
page read and write
|
||
53C0000
|
direct allocation
|
page execute and read and write
|
||
624A000
|
trusted library allocation
|
page read and write
|
||
5D36000
|
trusted library allocation
|
page read and write
|
||
5D36000
|
trusted library allocation
|
page read and write
|
||
613B000
|
trusted library allocation
|
page read and write
|
||
6133000
|
trusted library allocation
|
page read and write
|
||
5D42000
|
trusted library allocation
|
page read and write
|
||
156B000
|
heap
|
page read and write
|
||
5D33000
|
trusted library allocation
|
page read and write
|
||
1394000
|
heap
|
page read and write
|
||
5D24000
|
trusted library allocation
|
page read and write
|
||
620000
|
unkown
|
page readonly
|
||
5DD1000
|
trusted library allocation
|
page read and write
|
||
5D33000
|
trusted library allocation
|
page read and write
|
||
5D85000
|
trusted library allocation
|
page read and write
|
||
6131000
|
trusted library allocation
|
page read and write
|
||
4DA1000
|
heap
|
page read and write
|
||
6376000
|
trusted library allocation
|
page read and write
|
||
5DDC000
|
trusted library allocation
|
page read and write
|
||
5DB9000
|
trusted library allocation
|
page read and write
|
||
5D8A000
|
trusted library allocation
|
page read and write
|
||
5DCB000
|
trusted library allocation
|
page read and write
|
||
6256000
|
trusted library allocation
|
page read and write
|
||
5D3A000
|
trusted library allocation
|
page read and write
|
||
4D90000
|
direct allocation
|
page read and write
|
||
5DD8000
|
trusted library allocation
|
page read and write
|
||
4D90000
|
direct allocation
|
page read and write
|
||
60FD000
|
trusted library allocation
|
page read and write
|
||
62DC000
|
trusted library allocation
|
page read and write
|
||
6200000
|
trusted library allocation
|
page read and write
|
||
5DCB000
|
trusted library allocation
|
page read and write
|
||
5D4B000
|
trusted library allocation
|
page read and write
|
||
6136000
|
trusted library allocation
|
page read and write
|
||
5E59000
|
trusted library allocation
|
page read and write
|
||
5D42000
|
trusted library allocation
|
page read and write
|
||
5D2A000
|
trusted library allocation
|
page read and write
|
||
63CF000
|
trusted library allocation
|
page read and write
|
||
62DA000
|
trusted library allocation
|
page read and write
|
||
53C0000
|
direct allocation
|
page execute and read and write
|
||
624B000
|
trusted library allocation
|
page read and write
|
||
1574000
|
heap
|
page read and write
|
||
5404000
|
trusted library allocation
|
page read and write
|
||
5D72000
|
trusted library allocation
|
page read and write
|
||
5D42000
|
trusted library allocation
|
page read and write
|
||
5D2D000
|
trusted library allocation
|
page read and write
|
||
6133000
|
trusted library allocation
|
page read and write
|
||
5D6A000
|
trusted library allocation
|
page read and write
|
||
6280000
|
trusted library allocation
|
page read and write
|
||
6134000
|
trusted library allocation
|
page read and write
|
||
61F9000
|
trusted library allocation
|
page read and write
|
||
5D5A000
|
trusted library allocation
|
page read and write
|
||
61EE000
|
trusted library allocation
|
page read and write
|
||
5D88000
|
trusted library allocation
|
page read and write
|
||
6258000
|
trusted library allocation
|
page read and write
|
||
5DCB000
|
trusted library allocation
|
page read and write
|
||
5D42000
|
trusted library allocation
|
page read and write
|
||
6365000
|
trusted library allocation
|
page read and write
|
||
5E39000
|
trusted library allocation
|
page read and write
|
||
1394000
|
heap
|
page read and write
|
||
1571000
|
heap
|
page read and write
|
||
6130000
|
trusted library allocation
|
page read and write
|
||
5DED000
|
trusted library allocation
|
page read and write
|
||
4D90000
|
direct allocation
|
page read and write
|
||
6230000
|
trusted library allocation
|
page read and write
|
||
61CD000
|
trusted library allocation
|
page read and write
|
||
6133000
|
trusted library allocation
|
page read and write
|
||
625F000
|
trusted library allocation
|
page read and write
|
||
6137000
|
trusted library allocation
|
page read and write
|
||
6130000
|
trusted library allocation
|
page read and write
|
||
5D5D000
|
trusted library allocation
|
page read and write
|
||
5DC9000
|
trusted library allocation
|
page read and write
|
||
5DE2000
|
trusted library allocation
|
page read and write
|
||
4D90000
|
direct allocation
|
page read and write
|
||
622E000
|
trusted library allocation
|
page read and write
|
||
53C0000
|
direct allocation
|
page execute and read and write
|
||
6132000
|
trusted library allocation
|
page read and write
|
||
5E21000
|
trusted library allocation
|
page read and write
|
||
6253000
|
trusted library allocation
|
page read and write
|
||
627F000
|
trusted library allocation
|
page read and write
|
||
5DD9000
|
trusted library allocation
|
page read and write
|
||
5D22000
|
trusted library allocation
|
page read and write
|
||
5D6C000
|
trusted library allocation
|
page read and write
|
||
1560000
|
heap
|
page read and write
|
||
4D90000
|
direct allocation
|
page read and write
|
||
4D90000
|
direct allocation
|
page read and write
|
||
627B000
|
trusted library allocation
|
page read and write
|
||
5DE4000
|
trusted library allocation
|
page read and write
|
||
6134000
|
trusted library allocation
|
page read and write
|
||
53C0000
|
direct allocation
|
page execute and read and write
|
||
5240000
|
direct allocation
|
page read and write
|
||
6130000
|
trusted library allocation
|
page read and write
|
||
61DD000
|
trusted library allocation
|
page read and write
|
||
5DCC000
|
trusted library allocation
|
page read and write
|
||
5D33000
|
trusted library allocation
|
page read and write
|
||
5D33000
|
trusted library allocation
|
page read and write
|
||
6139000
|
trusted library allocation
|
page read and write
|
||
4DA1000
|
heap
|
page read and write
|
||
5D27000
|
trusted library allocation
|
page read and write
|
||
5DC6000
|
trusted library allocation
|
page read and write
|
||
5DC5000
|
trusted library allocation
|
page read and write
|
||
5DB8000
|
trusted library allocation
|
page read and write
|
||
5D56000
|
trusted library allocation
|
page read and write
|
||
5D2B000
|
trusted library allocation
|
page read and write
|
||
1394000
|
heap
|
page read and write
|
||
5D42000
|
trusted library allocation
|
page read and write
|
||
6138000
|
trusted library allocation
|
page read and write
|
||
5D42000
|
trusted library allocation
|
page read and write
|
||
6225000
|
trusted library allocation
|
page read and write
|
||
5D2D000
|
trusted library allocation
|
page read and write
|
||
1394000
|
heap
|
page read and write
|
||
6131000
|
trusted library allocation
|
page read and write
|
||
5D33000
|
trusted library allocation
|
page read and write
|
||
6566000
|
trusted library allocation
|
page read and write
|
||
5DDC000
|
trusted library allocation
|
page read and write
|
||
61F7000
|
trusted library allocation
|
page read and write
|
||
1560000
|
heap
|
page read and write
|
||
5D42000
|
trusted library allocation
|
page read and write
|
||
6132000
|
trusted library allocation
|
page read and write
|
||
6137000
|
trusted library allocation
|
page read and write
|
||
5DE4000
|
trusted library allocation
|
page read and write
|
||
5DF1000
|
trusted library allocation
|
page read and write
|
||
5D3B000
|
trusted library allocation
|
page read and write
|
||
1577000
|
heap
|
page read and write
|
||
5D69000
|
trusted library allocation
|
page read and write
|
||
1568000
|
heap
|
page read and write
|
||
5DDE000
|
trusted library allocation
|
page read and write
|
||
6235000
|
trusted library allocation
|
page read and write
|
||
6137000
|
trusted library allocation
|
page read and write
|
||
1394000
|
heap
|
page read and write
|
||
6137000
|
trusted library allocation
|
page read and write
|
||
5D6A000
|
trusted library allocation
|
page read and write
|
||
5DD8000
|
trusted library allocation
|
page read and write
|
||
51E0000
|
trusted library allocation
|
page read and write
|
||
6208000
|
trusted library allocation
|
page read and write
|
||
5F58000
|
trusted library allocation
|
page read and write
|
||
5DD8000
|
trusted library allocation
|
page read and write
|
||
6362000
|
trusted library allocation
|
page read and write
|
||
6200000
|
trusted library allocation
|
page read and write
|
||
4DA1000
|
heap
|
page read and write
|
||
5D42000
|
trusted library allocation
|
page read and write
|
||
1576000
|
heap
|
page read and write
|
||
5D4C000
|
trusted library allocation
|
page read and write
|
||
1394000
|
heap
|
page read and write
|
||
6139000
|
trusted library allocation
|
page read and write
|
||
5D22000
|
trusted library allocation
|
page read and write
|
||
5D23000
|
trusted library allocation
|
page read and write
|
||
5230000
|
direct allocation
|
page read and write
|
||
5E64000
|
trusted library allocation
|
page read and write
|
||
5DED000
|
trusted library allocation
|
page read and write
|
||
5DDE000
|
trusted library allocation
|
page read and write
|
||
63A6000
|
trusted library allocation
|
page read and write
|
||
5D33000
|
trusted library allocation
|
page read and write
|
||
5F58000
|
trusted library allocation
|
page read and write
|
||
5D42000
|
trusted library allocation
|
page read and write
|
||
5D4C000
|
trusted library allocation
|
page read and write
|
||
5DB9000
|
trusted library allocation
|
page read and write
|
||
5D6C000
|
trusted library allocation
|
page read and write
|
||
5DCF000
|
trusted library allocation
|
page read and write
|
||
5D3B000
|
trusted library allocation
|
page read and write
|
||
5D42000
|
trusted library allocation
|
page read and write
|
||
5D85000
|
trusted library allocation
|
page read and write
|
||
1566000
|
heap
|
page read and write
|
||
5D42000
|
trusted library allocation
|
page read and write
|
||
1394000
|
heap
|
page read and write
|
||
5D42000
|
trusted library allocation
|
page read and write
|
||
5D41000
|
trusted library allocation
|
page read and write
|
||
5DCB000
|
trusted library allocation
|
page read and write
|
||
63CD000
|
trusted library allocation
|
page read and write
|
||
5DCB000
|
trusted library allocation
|
page read and write
|
||
5DED000
|
trusted library allocation
|
page read and write
|
||
5D42000
|
trusted library allocation
|
page read and write
|
||
5D33000
|
trusted library allocation
|
page read and write
|
||
61C8000
|
trusted library allocation
|
page read and write
|
||
61DF000
|
trusted library allocation
|
page read and write
|
||
613C000
|
trusted library allocation
|
page read and write
|
||
4D90000
|
direct allocation
|
page read and write
|
||
613C000
|
trusted library allocation
|
page read and write
|
||
61E7000
|
trusted library allocation
|
page read and write
|
||
63D9000
|
trusted library allocation
|
page read and write
|
||
4DA1000
|
heap
|
page read and write
|
||
6235000
|
trusted library allocation
|
page read and write
|
||
4DA1000
|
heap
|
page read and write
|
||
5D33000
|
trusted library allocation
|
page read and write
|
||
1394000
|
heap
|
page read and write
|
||
630B000
|
trusted library allocation
|
page read and write
|
||
5E51000
|
trusted library allocation
|
page read and write
|
||
5D6A000
|
trusted library allocation
|
page read and write
|
||
1570000
|
heap
|
page read and write
|
||
61CB000
|
trusted library allocation
|
page read and write
|
||
6139000
|
trusted library allocation
|
page read and write
|
||
6237000
|
trusted library allocation
|
page read and write
|
||
5D59000
|
trusted library allocation
|
page read and write
|
||
6133000
|
trusted library allocation
|
page read and write
|
||
5D54000
|
trusted library allocation
|
page read and write
|
||
1394000
|
heap
|
page read and write
|
||
5D28000
|
trusted library allocation
|
page read and write
|
||
61F7000
|
trusted library allocation
|
page read and write
|
||
4D90000
|
direct allocation
|
page read and write
|
||
5DF6000
|
trusted library allocation
|
page read and write
|
||
5DC5000
|
trusted library allocation
|
page read and write
|
||
1394000
|
heap
|
page read and write
|
||
5DE8000
|
trusted library allocation
|
page read and write
|
||
62AD000
|
trusted library allocation
|
page read and write
|
||
6065000
|
trusted library allocation
|
page read and write
|
||
6139000
|
trusted library allocation
|
page read and write
|
||
5D28000
|
trusted library allocation
|
page read and write
|
||
156E000
|
heap
|
page read and write
|
||
621F000
|
trusted library allocation
|
page read and write
|
||
6138000
|
trusted library allocation
|
page read and write
|
||
6134000
|
trusted library allocation
|
page read and write
|
||
6136000
|
trusted library allocation
|
page read and write
|
||
631A000
|
trusted library allocation
|
page read and write
|
||
6237000
|
trusted library allocation
|
page read and write
|
||
6139000
|
trusted library allocation
|
page read and write
|
||
1571000
|
heap
|
page read and write
|
||
6132000
|
trusted library allocation
|
page read and write
|
||
5390000
|
direct allocation
|
page execute and read and write
|
||
5D39000
|
trusted library allocation
|
page read and write
|
||
5D29000
|
trusted library allocation
|
page read and write
|
||
5DD8000
|
trusted library allocation
|
page read and write
|
||
5DEB000
|
trusted library allocation
|
page read and write
|
||
5D4C000
|
trusted library allocation
|
page read and write
|
||
4D90000
|
direct allocation
|
page read and write
|
||
5DBD000
|
trusted library allocation
|
page read and write
|
||
5DD8000
|
trusted library allocation
|
page read and write
|
||
5D3A000
|
trusted library allocation
|
page read and write
|
||
155F000
|
heap
|
page read and write
|
||
6130000
|
trusted library allocation
|
page read and write
|
||
6221000
|
trusted library allocation
|
page read and write
|
||
1561000
|
heap
|
page read and write
|
||
5D25000
|
trusted library allocation
|
page read and write
|
||
613A000
|
trusted library allocation
|
page read and write
|
||
5DD8000
|
trusted library allocation
|
page read and write
|
||
5DB8000
|
trusted library allocation
|
page read and write
|
||
5D33000
|
trusted library allocation
|
page read and write
|
||
613F000
|
trusted library allocation
|
page read and write
|
||
5DBA000
|
trusted library allocation
|
page read and write
|
||
5D56000
|
trusted library allocation
|
page read and write
|
||
1565000
|
heap
|
page read and write
|
||
6134000
|
trusted library allocation
|
page read and write
|
||
61F7000
|
trusted library allocation
|
page read and write
|
||
53C0000
|
direct allocation
|
page execute and read and write
|
||
5D41000
|
trusted library allocation
|
page read and write
|
||
1565000
|
heap
|
page read and write
|
||
5D51000
|
trusted library allocation
|
page read and write
|
||
6814000
|
trusted library allocation
|
page read and write
|
||
6135000
|
trusted library allocation
|
page read and write
|
||
5D42000
|
trusted library allocation
|
page read and write
|
||
5D56000
|
trusted library allocation
|
page read and write
|
||
61D7000
|
trusted library allocation
|
page read and write
|
||
602E000
|
trusted library allocation
|
page read and write
|
||
5DF6000
|
trusted library allocation
|
page read and write
|
||
5DDC000
|
trusted library allocation
|
page read and write
|
||
5D59000
|
trusted library allocation
|
page read and write
|
||
5DB8000
|
trusted library allocation
|
page read and write
|
||
613C000
|
trusted library allocation
|
page read and write
|
||
5D26000
|
trusted library allocation
|
page read and write
|
||
5D42000
|
trusted library allocation
|
page read and write
|
||
5D33000
|
trusted library allocation
|
page read and write
|
||
5E59000
|
trusted library allocation
|
page read and write
|
||
6235000
|
trusted library allocation
|
page read and write
|
||
5D88000
|
trusted library allocation
|
page read and write
|
||
4DA1000
|
heap
|
page read and write
|
||
6135000
|
trusted library allocation
|
page read and write
|
||
5D59000
|
trusted library allocation
|
page read and write
|
||
5D33000
|
trusted library allocation
|
page read and write
|
||
628E000
|
trusted library allocation
|
page read and write
|
||
1550000
|
heap
|
page read and write
|
||
6248000
|
trusted library allocation
|
page read and write
|
||
6134000
|
trusted library allocation
|
page read and write
|
||
5E28000
|
trusted library allocation
|
page read and write
|
||
1571000
|
heap
|
page read and write
|
||
6288000
|
trusted library allocation
|
page read and write
|
||
1394000
|
heap
|
page read and write
|
||
5DCF000
|
trusted library allocation
|
page read and write
|
||
6211000
|
trusted library allocation
|
page read and write
|
||
63A8000
|
trusted library allocation
|
page read and write
|
||
920000
|
unkown
|
page execute and write copy
|
||
6260000
|
trusted library allocation
|
page read and write
|
||
619D000
|
trusted library allocation
|
page read and write
|
||
5D3B000
|
trusted library allocation
|
page read and write
|
||
5D85000
|
trusted library allocation
|
page read and write
|
||
5D2D000
|
trusted library allocation
|
page read and write
|
||
5D42000
|
trusted library allocation
|
page read and write
|
||
5DDC000
|
trusted library allocation
|
page read and write
|
||
5DC3000
|
trusted library allocation
|
page read and write
|
||
6522000
|
trusted library allocation
|
page read and write
|
||
6560000
|
trusted library allocation
|
page read and write
|
||
157A000
|
heap
|
page read and write
|
||
633A000
|
trusted library allocation
|
page read and write
|
||
5DEC000
|
trusted library allocation
|
page read and write
|
||
6105000
|
trusted library allocation
|
page read and write
|
||
5E64000
|
trusted library allocation
|
page read and write
|
||
4DA1000
|
heap
|
page read and write
|
||
6318000
|
trusted library allocation
|
page read and write
|
||
6135000
|
trusted library allocation
|
page read and write
|
||
5D42000
|
trusted library allocation
|
page read and write
|
||
4DA1000
|
heap
|
page read and write
|
||
5D6B000
|
trusted library allocation
|
page read and write
|
||
4DA1000
|
heap
|
page read and write
|
||
5DF3000
|
trusted library allocation
|
page read and write
|
||
61ED000
|
trusted library allocation
|
page read and write
|
||
4D90000
|
direct allocation
|
page read and write
|
||
6249000
|
trusted library allocation
|
page read and write
|
||
5D22000
|
trusted library allocation
|
page read and write
|
||
1565000
|
heap
|
page read and write
|
||
58C0000
|
remote allocation
|
page read and write
|
||
5D69000
|
trusted library allocation
|
page read and write
|
||
5DEC000
|
trusted library allocation
|
page read and write
|
||
60D5000
|
trusted library allocation
|
page read and write
|
||
5DB9000
|
trusted library allocation
|
page read and write
|
||
6132000
|
trusted library allocation
|
page read and write
|
||
6229000
|
trusted library allocation
|
page read and write
|
||
62DE000
|
trusted library allocation
|
page read and write
|
||
62CC000
|
trusted library allocation
|
page read and write
|
||
1394000
|
heap
|
page read and write
|
||
6284000
|
trusted library allocation
|
page read and write
|
||
613F000
|
trusted library allocation
|
page read and write
|
||
622B000
|
trusted library allocation
|
page read and write
|
||
5EDD000
|
trusted library allocation
|
page read and write
|
||
1560000
|
heap
|
page read and write
|
||
613A000
|
trusted library allocation
|
page read and write
|
||
5D4C000
|
trusted library allocation
|
page read and write
|
||
5D42000
|
trusted library allocation
|
page read and write
|
||
626B000
|
trusted library allocation
|
page read and write
|
||
5D63000
|
trusted library allocation
|
page read and write
|
||
5DC7000
|
trusted library allocation
|
page read and write
|
||
1576000
|
heap
|
page read and write
|
||
6341000
|
trusted library allocation
|
page read and write
|
||
613D000
|
trusted library allocation
|
page read and write
|
||
5DEA000
|
trusted library allocation
|
page read and write
|
||
1560000
|
heap
|
page read and write
|
||
5D52000
|
trusted library allocation
|
page read and write
|
||
4DA1000
|
heap
|
page read and write
|
||
5DEB000
|
trusted library allocation
|
page read and write
|
||
1394000
|
heap
|
page read and write
|
||
613A000
|
trusted library allocation
|
page read and write
|
||
5DE2000
|
trusted library allocation
|
page read and write
|
||
6139000
|
trusted library allocation
|
page read and write
|
||
1568000
|
heap
|
page read and write
|
||
5DD8000
|
trusted library allocation
|
page read and write
|
||
53A0000
|
direct allocation
|
page execute and read and write
|
||
5D21000
|
trusted library allocation
|
page read and write
|
||
61DB000
|
trusted library allocation
|
page read and write
|
||
1394000
|
heap
|
page read and write
|
||
5D33000
|
trusted library allocation
|
page read and write
|
||
63DF000
|
trusted library allocation
|
page read and write
|
||
5D33000
|
trusted library allocation
|
page read and write
|
||
5D30000
|
trusted library allocation
|
page read and write
|
||
5D73000
|
trusted library allocation
|
page read and write
|
||
5D2F000
|
trusted library allocation
|
page read and write
|
||
6132000
|
trusted library allocation
|
page read and write
|
||
613B000
|
trusted library allocation
|
page read and write
|
||
5D84000
|
trusted library allocation
|
page read and write
|
||
1563000
|
heap
|
page read and write
|
||
5D2A000
|
trusted library allocation
|
page read and write
|
||
5D33000
|
trusted library allocation
|
page read and write
|
||
6130000
|
trusted library allocation
|
page read and write
|
||
633F000
|
trusted library allocation
|
page read and write
|
||
6235000
|
trusted library allocation
|
page read and write
|
||
5D41000
|
trusted library allocation
|
page read and write
|
||
6521000
|
trusted library allocation
|
page read and write
|
||
5D7A000
|
trusted library allocation
|
page read and write
|
||
6131000
|
trusted library allocation
|
page read and write
|
||
5D72000
|
trusted library allocation
|
page read and write
|
||
4DA1000
|
heap
|
page read and write
|
||
613E000
|
trusted library allocation
|
page read and write
|
||
5D2D000
|
trusted library allocation
|
page read and write
|
||
6342000
|
trusted library allocation
|
page read and write
|
||
53B0000
|
direct allocation
|
page execute and read and write
|
||
620A000
|
trusted library allocation
|
page read and write
|
||
4DA1000
|
heap
|
page read and write
|
||
621C000
|
trusted library allocation
|
page read and write
|
||
638F000
|
trusted library allocation
|
page read and write
|
||
1569000
|
heap
|
page read and write
|
||
6132000
|
trusted library allocation
|
page read and write
|
||
61D5000
|
trusted library allocation
|
page read and write
|
||
5DC7000
|
trusted library allocation
|
page read and write
|
||
5E39000
|
trusted library allocation
|
page read and write
|
||
6132000
|
trusted library allocation
|
page read and write
|
||
6A37000
|
trusted library allocation
|
page read and write
|
||
1577000
|
heap
|
page read and write
|
||
4DA1000
|
heap
|
page read and write
|
||
5DC5000
|
trusted library allocation
|
page read and write
|
||
613E000
|
trusted library allocation
|
page read and write
|
||
5DC5000
|
trusted library allocation
|
page read and write
|
||
5E39000
|
trusted library allocation
|
page read and write
|
||
61F0000
|
trusted library allocation
|
page read and write
|
||
156C000
|
heap
|
page read and write
|
||
5DE8000
|
trusted library allocation
|
page read and write
|
||
5D42000
|
trusted library allocation
|
page read and write
|
||
1394000
|
heap
|
page read and write
|
||
5D2B000
|
trusted library allocation
|
page read and write
|
||
5DF0000
|
trusted library allocation
|
page read and write
|
||
624B000
|
trusted library allocation
|
page read and write
|
||
62AF000
|
trusted library allocation
|
page read and write
|
||
5DB8000
|
trusted library allocation
|
page read and write
|
||
5D6C000
|
trusted library allocation
|
page read and write
|
||
627D000
|
trusted library allocation
|
page read and write
|
||
5DC5000
|
trusted library allocation
|
page read and write
|
||
4DA1000
|
heap
|
page read and write
|
||
6233000
|
trusted library allocation
|
page read and write
|
||
5D42000
|
trusted library allocation
|
page read and write
|
||
6133000
|
trusted library allocation
|
page read and write
|
||
1566000
|
heap
|
page read and write
|
||
61EB000
|
trusted library allocation
|
page read and write
|
||
6566000
|
trusted library allocation
|
page read and write
|
||
6134000
|
trusted library allocation
|
page read and write
|
||
5D42000
|
trusted library allocation
|
page read and write
|
||
5D26000
|
trusted library allocation
|
page read and write
|
||
5D33000
|
trusted library allocation
|
page read and write
|
||
5DED000
|
trusted library allocation
|
page read and write
|
||
6034000
|
trusted library allocation
|
page read and write
|
||
6136000
|
trusted library allocation
|
page read and write
|
||
5D33000
|
trusted library allocation
|
page read and write
|
||
604D000
|
trusted library allocation
|
page read and write
|
||
5D42000
|
trusted library allocation
|
page read and write
|
||
5D42000
|
trusted library allocation
|
page read and write
|
||
5D33000
|
trusted library allocation
|
page read and write
|
||
5D33000
|
trusted library allocation
|
page read and write
|
||
5DED000
|
trusted library allocation
|
page read and write
|
||
5DC5000
|
trusted library allocation
|
page read and write
|
||
5D22000
|
trusted library allocation
|
page read and write
|
||
5D21000
|
trusted library allocation
|
page read and write
|
||
5DD1000
|
trusted library allocation
|
page read and write
|
||
5DDD000
|
trusted library allocation
|
page read and write
|
||
62BC000
|
trusted library allocation
|
page read and write
|
||
5D3A000
|
trusted library allocation
|
page read and write
|
||
6269000
|
trusted library allocation
|
page read and write
|
||
5DCF000
|
trusted library allocation
|
page read and write
|
||
1560000
|
heap
|
page read and write
|
||
62A5000
|
trusted library allocation
|
page read and write
|
||
5D2A000
|
trusted library allocation
|
page read and write
|
||
62BD000
|
trusted library allocation
|
page read and write
|
||
61E5000
|
trusted library allocation
|
page read and write
|
||
61DC000
|
trusted library allocation
|
page read and write
|
||
5D30000
|
trusted library allocation
|
page read and write
|
||
6134000
|
trusted library allocation
|
page read and write
|
||
1394000
|
heap
|
page read and write
|
||
6130000
|
trusted library allocation
|
page read and write
|
||
61C6000
|
trusted library allocation
|
page read and write
|
||
5E28000
|
trusted library allocation
|
page read and write
|
||
5DBE000
|
trusted library allocation
|
page read and write
|
||
626A000
|
trusted library allocation
|
page read and write
|
||
5DBA000
|
trusted library allocation
|
page read and write
|
||
1573000
|
heap
|
page read and write
|
||
5D42000
|
trusted library allocation
|
page read and write
|
||
1574000
|
heap
|
page read and write
|
||
5DCB000
|
trusted library allocation
|
page read and write
|
||
5D42000
|
trusted library allocation
|
page read and write
|
||
613A000
|
trusted library allocation
|
page read and write
|
||
5D42000
|
trusted library allocation
|
page read and write
|
||
5D21000
|
trusted library allocation
|
page read and write
|
||
6141000
|
trusted library allocation
|
page read and write
|
||
6136000
|
trusted library allocation
|
page read and write
|
||
5DE6000
|
trusted library allocation
|
page read and write
|
||
5DEC000
|
trusted library allocation
|
page read and write
|
||
5D30000
|
trusted library allocation
|
page read and write
|
||
63DB000
|
trusted library allocation
|
page read and write
|
||
5D28000
|
trusted library allocation
|
page read and write
|
||
5D40000
|
trusted library allocation
|
page read and write
|
||
156D000
|
heap
|
page read and write
|
||
6132000
|
trusted library allocation
|
page read and write
|
||
6133000
|
trusted library allocation
|
page read and write
|
||
6286000
|
trusted library allocation
|
page read and write
|
||
6130000
|
trusted library allocation
|
page read and write
|
||
6249000
|
trusted library allocation
|
page read and write
|
||
61DD000
|
trusted library allocation
|
page read and write
|
||
5DDC000
|
trusted library allocation
|
page read and write
|
||
5DCF000
|
trusted library allocation
|
page read and write
|
||
5D2D000
|
trusted library allocation
|
page read and write
|
||
675000
|
unkown
|
page write copy
|
||
6140000
|
trusted library allocation
|
page read and write
|
||
621E000
|
trusted library allocation
|
page read and write
|
||
61DE000
|
trusted library allocation
|
page read and write
|
||
6135000
|
trusted library allocation
|
page read and write
|
||
61F9000
|
trusted library allocation
|
page read and write
|
||
5D61000
|
trusted library allocation
|
page read and write
|
||
6215000
|
trusted library allocation
|
page read and write
|
||
5DCF000
|
trusted library allocation
|
page read and write
|
||
5D5D000
|
trusted library allocation
|
page read and write
|
||
5D63000
|
trusted library allocation
|
page read and write
|
||
1575000
|
heap
|
page read and write
|
||
63E1000
|
trusted library allocation
|
page read and write
|
||
62C1000
|
trusted library allocation
|
page read and write
|
||
63C7000
|
trusted library allocation
|
page read and write
|
||
613C000
|
trusted library allocation
|
page read and write
|
||
5D42000
|
trusted library allocation
|
page read and write
|
||
5D42000
|
trusted library allocation
|
page read and write
|
||
638D000
|
trusted library allocation
|
page read and write
|
||
5DDD000
|
trusted library allocation
|
page read and write
|
||
613E000
|
trusted library allocation
|
page read and write
|
||
6344000
|
trusted library allocation
|
page read and write
|
||
6309000
|
trusted library allocation
|
page read and write
|
||
5D22000
|
trusted library allocation
|
page read and write
|
||
4D90000
|
direct allocation
|
page read and write
|
||
6135000
|
trusted library allocation
|
page read and write
|
||
668D000
|
trusted library allocation
|
page read and write
|
||
5D5C000
|
trusted library allocation
|
page read and write
|
||
6133000
|
trusted library allocation
|
page read and write
|
||
6290000
|
trusted library allocation
|
page read and write
|
||
5D42000
|
trusted library allocation
|
page read and write
|
||
5D33000
|
trusted library allocation
|
page read and write
|
||
5D42000
|
trusted library allocation
|
page read and write
|
||
5DEC000
|
trusted library allocation
|
page read and write
|
||
6338000
|
trusted library allocation
|
page read and write
|
||
5DDC000
|
trusted library allocation
|
page read and write
|
||
61DB000
|
trusted library allocation
|
page read and write
|
||
58C0000
|
remote allocation
|
page read and write
|
||
5DCF000
|
trusted library allocation
|
page read and write
|
||
5D8A000
|
trusted library allocation
|
page read and write
|
||
6363000
|
trusted library allocation
|
page read and write
|
||
5D5C000
|
trusted library allocation
|
page read and write
|
||
1575000
|
heap
|
page read and write
|
||
5DD6000
|
trusted library allocation
|
page read and write
|
||
4DA1000
|
heap
|
page read and write
|
||
5DCB000
|
trusted library allocation
|
page read and write
|
||
6141000
|
trusted library allocation
|
page read and write
|
||
6378000
|
trusted library allocation
|
page read and write
|
||
5DB8000
|
trusted library allocation
|
page read and write
|
||
5DBF000
|
trusted library allocation
|
page read and write
|
||
5D3A000
|
trusted library allocation
|
page read and write
|
||
5D42000
|
trusted library allocation
|
page read and write
|
||
4DA1000
|
heap
|
page read and write
|
||
5D8A000
|
trusted library allocation
|
page read and write
|
||
156B000
|
heap
|
page read and write
|
||
5D41000
|
trusted library allocation
|
page read and write
|
||
5D3B000
|
trusted library allocation
|
page read and write
|
||
5D2D000
|
trusted library allocation
|
page read and write
|
||
5DE6000
|
trusted library allocation
|
page read and write
|
||
6213000
|
trusted library allocation
|
page read and write
|
||
1394000
|
heap
|
page read and write
|
||
1573000
|
heap
|
page read and write
|
||
63E1000
|
trusted library allocation
|
page read and write
|
||
6277000
|
trusted library allocation
|
page read and write
|
||
5DD6000
|
trusted library allocation
|
page read and write
|
||
621000
|
unkown
|
page execute and write copy
|
||
627D000
|
trusted library allocation
|
page read and write
|
||
61DD000
|
trusted library allocation
|
page read and write
|
||
6262000
|
trusted library allocation
|
page read and write
|
||
4DA1000
|
heap
|
page read and write
|
||
6137000
|
trusted library allocation
|
page read and write
|
||
1394000
|
heap
|
page read and write
|
||
6137000
|
trusted library allocation
|
page read and write
|
||
62A7000
|
trusted library allocation
|
page read and write
|
||
5D3A000
|
trusted library allocation
|
page read and write
|
||
5D42000
|
trusted library allocation
|
page read and write
|
||
5DB9000
|
trusted library allocation
|
page read and write
|
||
625D000
|
trusted library allocation
|
page read and write
|
||
5D42000
|
trusted library allocation
|
page read and write
|
||
5D3A000
|
trusted library allocation
|
page read and write
|
||
4D90000
|
direct allocation
|
page read and write
|
||
5DF6000
|
trusted library allocation
|
page read and write
|
||
6132000
|
trusted library allocation
|
page read and write
|
||
5DD8000
|
trusted library allocation
|
page read and write
|
||
627E000
|
trusted library allocation
|
page read and write
|
||
6140000
|
trusted library allocation
|
page read and write
|
||
5230000
|
direct allocation
|
page read and write
|
||
6137000
|
trusted library allocation
|
page read and write
|
||
6213000
|
trusted library allocation
|
page read and write
|
||
5D42000
|
trusted library allocation
|
page read and write
|
||
62CA000
|
trusted library allocation
|
page read and write
|
||
6132000
|
trusted library allocation
|
page read and write
|
||
5D3C000
|
trusted library allocation
|
page read and write
|
||
1394000
|
heap
|
page read and write
|
||
668F000
|
trusted library allocation
|
page read and write
|
||
5D52000
|
trusted library allocation
|
page read and write
|
||
6139000
|
trusted library allocation
|
page read and write
|
||
5DD8000
|
trusted library allocation
|
page read and write
|
||
6202000
|
trusted library allocation
|
page read and write
|
||
5DBE000
|
trusted library allocation
|
page read and write
|
||
1394000
|
heap
|
page read and write
|
||
5D42000
|
trusted library allocation
|
page read and write
|
||
5DB9000
|
trusted library allocation
|
page read and write
|
||
62DC000
|
trusted library allocation
|
page read and write
|
||
53C0000
|
direct allocation
|
page execute and read and write
|
||
6275000
|
trusted library allocation
|
page read and write
|
||
613E000
|
trusted library allocation
|
page read and write
|
||
4D90000
|
direct allocation
|
page read and write
|
||
5DB8000
|
trusted library allocation
|
page read and write
|
||
63C9000
|
trusted library allocation
|
page read and write
|
||
5D6B000
|
trusted library allocation
|
page read and write
|
||
5D6B000
|
trusted library allocation
|
page read and write
|
||
6255000
|
trusted library allocation
|
page read and write
|
||
5D42000
|
trusted library allocation
|
page read and write
|
||
5D38000
|
trusted library allocation
|
page read and write
|
||
5D42000
|
trusted library allocation
|
page read and write
|
||
6360000
|
trusted library allocation
|
page read and write
|
||
6132000
|
trusted library allocation
|
page read and write
|
||
5D62000
|
trusted library allocation
|
page read and write
|
||
610D000
|
trusted library allocation
|
page read and write
|
||
5DDE000
|
trusted library allocation
|
page read and write
|
||
5DD8000
|
trusted library allocation
|
page read and write
|
||
5D2D000
|
trusted library allocation
|
page read and write
|
||
5D33000
|
trusted library allocation
|
page read and write
|
||
5D33000
|
trusted library allocation
|
page read and write
|
There are 636 hidden memdumps, click here to show them.
DOM / HTML
URL
|
Malicious
|
|
---|---|---|
https://learn.microsoft.com/en-us/dotnet/framework/install/application-not-started?version=(null)&processName=file.exe&platform=0009&osver=6&isServer=0&shimver=4.0.30319.0
|
||
https://learn.microsoft.com/en-us/dotnet/framework/install/application-not-started?version=(null)&processName=file.exe&platform=0009&osver=6&isServer=0&shimver=4.0.30319.0
|
||
https://learn.microsoft.com/en-us/dotnet/framework/install/application-not-started?version=(null)&processName=file.exe&platform=0009&osver=6&isServer=0&shimver=4.0.30319.0
|
||
https://learn.microsoft.com/en-us/dotnet/framework/install/application-not-started?version=(null)&processName=file.exe&platform=0009&osver=6&isServer=0&shimver=4.0.30319.0
|