Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
file.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
initial sample
|
||
Chrome Cache Entry: 100
|
PNG image data, 475 x 212, 8-bit/color RGBA, non-interlaced
|
downloaded
|
||
Chrome Cache Entry: 101
|
JSON data
|
downloaded
|
||
Chrome Cache Entry: 102
|
JSON data
|
dropped
|
||
Chrome Cache Entry: 103
|
JPEG image data, JFIF standard 1.01, aspect ratio, density 1x1, segment length 16, baseline, precision 8, 1528x402, components
3
|
downloaded
|
||
Chrome Cache Entry: 104
|
exported SGML document, ASCII text, with very long lines (65536), with no line terminators
|
dropped
|
||
Chrome Cache Entry: 105
|
ASCII text, with very long lines (46884)
|
dropped
|
||
Chrome Cache Entry: 106
|
ASCII text
|
dropped
|
||
Chrome Cache Entry: 107
|
JSON data
|
dropped
|
||
Chrome Cache Entry: 108
|
SVG Scalable Vector Graphics image
|
downloaded
|
||
Chrome Cache Entry: 109
|
Web Open Font Format (Version 2), TrueType, length 19696, version 1.0
|
downloaded
|
||
Chrome Cache Entry: 110
|
ASCII text, with very long lines (33148), with no line terminators
|
downloaded
|
||
Chrome Cache Entry: 111
|
PNG image data, 475 x 212, 8-bit/color RGBA, non-interlaced
|
dropped
|
||
Chrome Cache Entry: 112
|
PNG image data, 658 x 480, 8-bit/color RGBA, non-interlaced
|
dropped
|
||
Chrome Cache Entry: 113
|
JSON data
|
dropped
|
||
Chrome Cache Entry: 114
|
HTML document, ASCII text, with very long lines (639), with CRLF, LF line terminators
|
downloaded
|
||
Chrome Cache Entry: 115
|
JSON data
|
downloaded
|
||
Chrome Cache Entry: 116
|
PNG image data, 533 x 478, 8-bit/color RGBA, non-interlaced
|
dropped
|
||
Chrome Cache Entry: 75
|
PNG image data, 533 x 478, 8-bit/color RGBA, non-interlaced
|
dropped
|
||
Chrome Cache Entry: 76
|
PNG image data, 533 x 478, 8-bit/color RGBA, non-interlaced
|
downloaded
|
||
Chrome Cache Entry: 77
|
SVG Scalable Vector Graphics image
|
dropped
|
||
Chrome Cache Entry: 78
|
JSON data
|
dropped
|
||
Chrome Cache Entry: 79
|
PNG image data, 533 x 478, 8-bit/color RGBA, non-interlaced
|
dropped
|
||
Chrome Cache Entry: 80
|
ASCII text, with very long lines (65536), with no line terminators
|
downloaded
|
||
Chrome Cache Entry: 81
|
ASCII text, with very long lines (65410)
|
dropped
|
||
Chrome Cache Entry: 82
|
JSON data
|
dropped
|
||
Chrome Cache Entry: 83
|
ASCII text, with very long lines (65410)
|
downloaded
|
||
Chrome Cache Entry: 84
|
JSON data
|
downloaded
|
||
Chrome Cache Entry: 85
|
PNG image data, 533 x 478, 8-bit/color RGBA, non-interlaced
|
downloaded
|
||
Chrome Cache Entry: 86
|
ASCII text, with very long lines (52717), with no line terminators
|
dropped
|
||
Chrome Cache Entry: 87
|
ASCII text
|
downloaded
|
||
Chrome Cache Entry: 88
|
ASCII text, with very long lines (52717), with no line terminators
|
downloaded
|
||
Chrome Cache Entry: 89
|
exported SGML document, ASCII text, with very long lines (65536), with no line terminators
|
downloaded
|
||
Chrome Cache Entry: 90
|
ASCII text, with no line terminators
|
downloaded
|
||
Chrome Cache Entry: 91
|
PNG image data, 533 x 478, 8-bit/color RGBA, non-interlaced
|
downloaded
|
||
Chrome Cache Entry: 92
|
MS Windows icon resource - 6 icons, -128x-128, 16 colors, 72x72, 16 colors
|
downloaded
|
||
Chrome Cache Entry: 93
|
ASCII text, with very long lines (46884)
|
downloaded
|
||
Chrome Cache Entry: 94
|
JSON data
|
dropped
|
||
Chrome Cache Entry: 95
|
MS Windows icon resource - 6 icons, -128x-128, 16 colors, 72x72, 16 colors
|
dropped
|
||
Chrome Cache Entry: 96
|
PNG image data, 658 x 480, 8-bit/color RGBA, non-interlaced
|
downloaded
|
||
Chrome Cache Entry: 97
|
ASCII text, with very long lines (33148), with no line terminators
|
dropped
|
||
Chrome Cache Entry: 98
|
JSON data
|
downloaded
|
||
Chrome Cache Entry: 99
|
JPEG image data, JFIF standard 1.01, aspect ratio, density 1x1, segment length 16, baseline, precision 8, 1528x402, components
3
|
dropped
|
There are 33 hidden files, click here to show them.
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\file.exe
|
"C:\Users\user\Desktop\file.exe"
|
||
C:\Program Files\Google\Chrome\Application\chrome.exe
|
"C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized --single-argument http://go.microsoft.com/fwlink/?prd=11324&pver=4.5&sbp=AppLaunch2&plcid=0x409&o1=SHIM_NOVERSION_FOUND&version=(null)&processName=file.exe&platform=0009&osver=6&isServer=0&shimver=4.0.30319.0
|
||
C:\Program Files\Google\Chrome\Application\chrome.exe
|
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US
--service-sandbox-type=none --mojo-platform-channel-handle=2124 --field-trial-handle=1944,i,15678705187657892955,17844764496678976098,262144
--disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction
/prefetch:8
|
||
C:\Program Files\Google\Chrome\Application\chrome.exe
|
"C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized --single-argument http://go.microsoft.com/fwlink/?prd=11324&pver=4.5&sbp=AppLaunch2&plcid=0x409&o1=SHIM_NOVERSION_FOUND&version=(null)&processName=file.exe&platform=0009&osver=6&isServer=0&shimver=4.0.30319.0
|
||
C:\Program Files\Google\Chrome\Application\chrome.exe
|
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US
--service-sandbox-type=none --mojo-platform-channel-handle=2120 --field-trial-handle=1928,i,17398790498450911145,18130191618194724577,262144
--disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction
/prefetch:8
|
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
https://authoring-docs-microsoft.poolparty.biz/devrel/7696cda6-0510-47f6-8302-71bb5d2e28cf
|
unknown
|
||
https://www.amazon.com/?tag=admarketus-20&ref=pd_sl_ef0fa27a12d43fbd45649e195429e8a63ddcad7cf7e128c0
|
unknown
|
||
https://duckduckgo.com/chrome_newtab
|
unknown
|
||
https://atten-supporse.biz/F
|
unknown
|
||
https://duckduckgo.com/ac/?q=
|
unknown
|
||
http://185.215.113.16:80/off/def.exePackages
|
unknown
|
||
https://github.com/dotnet/docs/blob/17c4acca45e573a92878a44a2cce57d699fe9c7c/docs/framework/install/
|
unknown
|
||
https://www.linkedin.com/cws/share?url=$
|
unknown
|
||
https://atten-supporse.biz/V
|
unknown
|
||
https://atten-supporse.biz:443/apil
|
unknown
|
||
https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
|
unknown
|
||
https://github.com/Youssef1313
|
unknown
|
||
https://management.azure.com/providers/Microsoft.Portal/userSettings/cloudconsole?api-version=2023-0
|
unknown
|
||
https://aka.ms/msignite_docs_banner
|
unknown
|
||
https://videoencodingpublic-hgeaeyeba8gycee3.b01.azurefd.net/public-b4da8140-92cf-421c-8b7b-e471d5b9
|
unknown
|
||
http://polymer.github.io/AUTHORS.txt
|
unknown
|
||
https://github.com/dotnet/docs/issues/new?template=z-customer-feedback.yml
|
unknown
|
||
http://185.215.113.16/steam/random.exev
|
unknown
|
||
https://atten-supporse.biz/-G
|
unknown
|
||
https://management.azure.com/subscriptions?api-version=2016-06-01
|
unknown
|
||
https://github.com/dotnet/docs/blob/main/docs/framework/install/application-not-started.md
|
unknown
|
||
http://x1.c.lencr.org/0
|
unknown
|
||
http://x1.i.lencr.org/0
|
unknown
|
||
https://aka.ms/pshelpmechoose
|
unknown
|
||
https://aka.ms/feedback/report?space=61
|
unknown
|
||
https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
|
unknown
|
||
https://learn-video.azurefd.net/vod/player
|
unknown
|
||
https://twitter.com/intent/tweet?original_referer=$
|
unknown
|
||
https://github.com/gewarren
|
unknown
|
||
http://185.215.113.16/off/def.exepleWebKit/537.36
|
unknown
|
||
https://atten-supporse.biz:443/apiK
|
unknown
|
||
https://support.mozilla.org/products/firefoxgro.all
|
unknown
|
||
http://polymer.github.io/CONTRIBUTORS.txt
|
unknown
|
||
https://atten-supporse.biz/EA
|
unknown
|
||
https://github.com/dotnet/docs/blob/live/docs/framework/install/application-not-started.md
|
unknown
|
||
https://authoring-docs-microsoft.poolparty.biz/devrel/69c76c32-967e-4c65-b89a-74cc527db725
|
unknown
|
||
https://client-api.arkoselabs.com/v2/api.js
|
unknown
|
||
https://aka.ms/MSIgniteChallenge/Tier1Banner?wt.mc_id=ignite24_learnbanner_tier1_cnl
|
unknown
|
||
https://management.azure.com/providers/Microsoft.Portal/consoles/default?api-version=2017-12-01-prev
|
unknown
|
||
https://www.google.com/images/branding/product/ico/googleg_lodp.ico
|
unknown
|
||
https://github.com/Thraka
|
unknown
|
||
http://polymer.github.io/PATENTS.txt
|
unknown
|
||
https://aka.ms/certhelp
|
unknown
|
||
http://185.215.113.16/steam/random.exe
|
unknown
|
||
https://bridge.sfo1.admarketplace.net/ctp?version=16.0.0&key=1696490019400400000.2&ci=1696490019252.
|
unknown
|
||
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
|
unknown
|
||
http://crl.rootca1.amazontrust.com/rootca1.crl0
|
unknown
|
||
https://atten-supporse.biz/api
|
172.67.165.166
|
||
https://github.com/mairaw
|
unknown
|
||
https://js.monitor.azure.com/scripts/c/ms.jsll-4.min.js
|
13.107.246.63
|
||
http://ocsp.rootca1.amazontrust.com0:
|
unknown
|
||
https://schema.org
|
unknown
|
||
http://polymer.github.io/LICENSE.txt
|
unknown
|
||
https://www.ecosia.org/newtab/
|
unknown
|
||
https://support.mozilla.org/kb/customize-firefox-controls-buttons-and-toolbars?utm_source=firefox-br
|
unknown
|
||
https://aka.ms/yourcaliforniaprivacychoices
|
unknown
|
||
https://ac.ecosia.org/autocomplete?q=
|
unknown
|
||
https://github.com/nschonni
|
unknown
|
||
http://185.215.113.16/
|
unknown
|
||
https://atten-supporse.biz/apitEO
|
unknown
|
||
https://atten-supporse.biz/f
|
unknown
|
||
https://videoencodingpublic-hgeaeyeba8gycee3.b01.azurefd.net/public-09ce73a6-05a5-4e4d-b3d7-bd5a8c05
|
unknown
|
||
http://185.215.113.16/off/def.exe=
|
unknown
|
||
https://github.com/adegeo
|
unknown
|
||
https://contile-images.services.mozilla.com/obgoOYObjIFea_bXuT6L4LbBJ8j425AD87S1HMD3BWg.9991.jpg
|
unknown
|
||
https://atten-supporse.biz/n
|
unknown
|
||
https://github.com/jonschlinkert/is-plain-object
|
unknown
|
||
http://crt.rootca1.amazontrust.com/rootca1.cer0?
|
unknown
|
||
https://octokit.github.io/rest.js/#throttling
|
unknown
|
||
https://www.invisalign.com/?utm_source=admarketplace&utm_medium=paidsearch&utm_campaign=Invisalign&u
|
unknown
|
||
https://imp.mt48.net/static?id=7RHzfOIXjFEYsBdvIpkX4Qqm4pqWfpl%2B4pbW4pbWfpbW7ReNxR3UIG8zInwYIFIVs9e
|
unknown
|
||
https://atten-supporse.biz/api5
|
unknown
|
||
https://contile-images.services.mozilla.com/CuERQnIs4CzqjKBh9os6_h9d4CUDCHO3oiqmAQO6VLM.25122.jpg
|
unknown
|
||
https://atten-supporse.biz:443/api
|
|||
https://github.com/js-cookie/js-cookie
|
unknown
|
||
http://185.215.113.16/off/def.exe
|
unknown
|
||
http://schema.org/Organization
|
unknown
|
||
https://atten-supporse.biz/
|
unknown
|
||
https://channel9.msdn.com/
|
unknown
|
||
https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
|
unknown
|
||
https://github.com/dotnet/try
|
unknown
|
||
https://bridge.sfo1.ap01.net/ctp?version=16.0.0&key=1696490019400400000.1&ci=1696490019252.12791&cta
|
unknown
|
There are 72 hidden URLs, click here to show them.
Domains
Name
|
IP
|
Malicious
|
|
---|---|---|---|
atten-supporse.biz
|
172.67.165.166
|
||
www.google.com
|
142.250.181.100
|
||
s-part-0035.t-0009.t-msedge.net
|
13.107.246.63
|
||
js.monitor.azure.com
|
unknown
|
||
mdec.nelreports.net
|
unknown
|
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
192.168.2.7
|
unknown
|
unknown
|
||
13.107.246.63
|
s-part-0035.t-0009.t-msedge.net
|
United States
|
||
185.215.113.16
|
unknown
|
Portugal
|
||
172.67.165.166
|
atten-supporse.biz
|
United States
|
||
142.250.181.100
|
www.google.com
|
United States
|
||
239.255.255.250
|
unknown
|
Reserved
|
||
192.168.2.23
|
unknown
|
unknown
|
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
5D4E000
|
trusted library allocation
|
page read and write
|
||
62D4000
|
trusted library allocation
|
page read and write
|
||
5D74000
|
trusted library allocation
|
page read and write
|
||
555D000
|
stack
|
page read and write
|
||
58E0000
|
remote allocation
|
page read and write
|
||
64A0000
|
direct allocation
|
page read and write
|
||
6291000
|
trusted library allocation
|
page read and write
|
||
4C5F000
|
stack
|
page read and write
|
||
61E8000
|
trusted library allocation
|
page read and write
|
||
61E8000
|
trusted library allocation
|
page read and write
|
||
61E8000
|
trusted library allocation
|
page read and write
|
||
5D76000
|
trusted library allocation
|
page read and write
|
||
61E4000
|
trusted library allocation
|
page read and write
|
||
5D8B000
|
trusted library allocation
|
page read and write
|
||
5EB0000
|
direct allocation
|
page read and write
|
||
61E1000
|
trusted library allocation
|
page read and write
|
||
5D5F000
|
trusted library allocation
|
page read and write
|
||
6328000
|
trusted library allocation
|
page read and write
|
||
61E9000
|
trusted library allocation
|
page read and write
|
||
5D7F000
|
trusted library allocation
|
page read and write
|
||
61E8000
|
trusted library allocation
|
page read and write
|
||
5D6F000
|
trusted library allocation
|
page read and write
|
||
6765000
|
trusted library allocation
|
page read and write
|
||
78CF000
|
stack
|
page read and write
|
||
1330000
|
heap
|
page read and write
|
||
3C5E000
|
stack
|
page read and write
|
||
5D5F000
|
trusted library allocation
|
page read and write
|
||
5DAC000
|
trusted library allocation
|
page read and write
|
||
61ED000
|
trusted library allocation
|
page read and write
|
||
5D66000
|
trusted library allocation
|
page read and write
|
||
64A0000
|
direct allocation
|
page read and write
|
||
642C000
|
trusted library allocation
|
page read and write
|
||
3B1E000
|
stack
|
page read and write
|
||
5E42000
|
trusted library allocation
|
page read and write
|
||
641B000
|
trusted library allocation
|
page read and write
|
||
5D5F000
|
trusted library allocation
|
page read and write
|
||
5DA3000
|
trusted library allocation
|
page read and write
|
||
61E4000
|
trusted library allocation
|
page read and write
|
||
6283000
|
trusted library allocation
|
page read and write
|
||
64A0000
|
direct allocation
|
page read and write
|
||
6780000
|
trusted library allocation
|
page read and write
|
||
714F000
|
stack
|
page read and write
|
||
768E000
|
stack
|
page read and write
|
||
138B000
|
heap
|
page read and write
|
||
389E000
|
stack
|
page read and write
|
||
5D4B000
|
trusted library allocation
|
page read and write
|
||
631A000
|
trusted library allocation
|
page read and write
|
||
8BFC000
|
stack
|
page read and write
|
||
63BE000
|
trusted library allocation
|
page read and write
|
||
5D81000
|
trusted library allocation
|
page read and write
|
||
5D7B000
|
trusted library allocation
|
page read and write
|
||
551C000
|
stack
|
page read and write
|
||
5D7E000
|
trusted library allocation
|
page read and write
|
||
FCB000
|
stack
|
page read and write
|
||
53E0000
|
direct allocation
|
page execute and read and write
|
||
6C4F000
|
stack
|
page read and write
|
||
6285000
|
trusted library allocation
|
page read and write
|
||
5D93000
|
trusted library allocation
|
page read and write
|
||
5FEF000
|
trusted library allocation
|
page read and write
|
||
63DF000
|
trusted library allocation
|
page read and write
|
||
53F0000
|
direct allocation
|
page execute and read and write
|
||
63D9000
|
trusted library allocation
|
page read and write
|
||
5D4A000
|
trusted library allocation
|
page read and write
|
||
5D52000
|
trusted library allocation
|
page read and write
|
||
1454000
|
heap
|
page read and write
|
||
1434000
|
heap
|
page read and write
|
||
13F0000
|
heap
|
page read and write
|
||
5E43000
|
trusted library allocation
|
page read and write
|
||
3C1F000
|
stack
|
page read and write
|
||
7048F000
|
unkown
|
page readonly
|
||
5410000
|
direct allocation
|
page execute and read and write
|
||
6351000
|
trusted library allocation
|
page read and write
|
||
A110000
|
trusted library allocation
|
page read and write
|
||
1454000
|
heap
|
page read and write
|
||
5A3000
|
unkown
|
page execute and read and write
|
||
5D85000
|
trusted library allocation
|
page read and write
|
||
5D97000
|
trusted library allocation
|
page read and write
|
||
5E52000
|
trusted library allocation
|
page read and write
|
||
62D8000
|
trusted library allocation
|
page read and write
|
||
5D55000
|
trusted library allocation
|
page read and write
|
||
1428000
|
heap
|
page read and write
|
||
141F000
|
heap
|
page read and write
|
||
7E0E000
|
stack
|
page read and write
|
||
1420000
|
heap
|
page read and write
|
||
5DA7000
|
trusted library allocation
|
page read and write
|
||
5D57000
|
trusted library allocation
|
page read and write
|
||
61EB000
|
trusted library allocation
|
page read and write
|
||
1454000
|
heap
|
page read and write
|
||
1408000
|
heap
|
page read and write
|
||
143E000
|
heap
|
page read and write
|
||
61E7000
|
trusted library allocation
|
page read and write
|
||
700F000
|
stack
|
page read and write
|
||
61E7000
|
trusted library allocation
|
page read and write
|
||
4EC0000
|
trusted library allocation
|
page read and write
|
||
465E000
|
stack
|
page read and write
|
||
4DC1000
|
heap
|
page read and write
|
||
5D9D000
|
trusted library allocation
|
page read and write
|
||
5DAF000
|
trusted library allocation
|
page read and write
|
||
1420000
|
heap
|
page read and write
|
||
5D6E000
|
trusted library allocation
|
page read and write
|
||
5DB7000
|
trusted library allocation
|
page read and write
|
||
1454000
|
heap
|
page read and write
|
||
2E3000
|
unkown
|
page execute and read and write
|
||
629A000
|
trusted library allocation
|
page read and write
|
||
82CF000
|
stack
|
page read and write
|
||
4DB0000
|
direct allocation
|
page read and write
|
||
5F23000
|
trusted library allocation
|
page read and write
|
||
13B4000
|
heap
|
page read and write
|
||
5DDA000
|
trusted library allocation
|
page read and write
|
||
5D6F000
|
trusted library allocation
|
page read and write
|
||
6391000
|
trusted library allocation
|
page read and write
|
||
844E000
|
stack
|
page read and write
|
||
5D76000
|
trusted library allocation
|
page read and write
|
||
62BD000
|
trusted library allocation
|
page read and write
|
||
1454000
|
heap
|
page read and write
|
||
5D8F000
|
trusted library allocation
|
page read and write
|
||
6290000
|
trusted library allocation
|
page read and write
|
||
3EDE000
|
stack
|
page read and write
|
||
5DA6000
|
trusted library allocation
|
page read and write
|
||
5D6F000
|
trusted library allocation
|
page read and write
|
||
5D6F000
|
trusted library allocation
|
page read and write
|
||
644D000
|
trusted library allocation
|
page read and write
|
||
4DC1000
|
heap
|
page read and write
|
||
70470000
|
unkown
|
page readonly
|
||
5D5F000
|
trusted library allocation
|
page read and write
|
||
5C3D000
|
stack
|
page read and write
|
||
1424000
|
heap
|
page read and write
|
||
2F6000
|
unkown
|
page execute and read and write
|
||
451E000
|
stack
|
page read and write
|
||
53E0000
|
direct allocation
|
page execute and read and write
|
||
6348000
|
trusted library allocation
|
page read and write
|
||
5F1B000
|
trusted library allocation
|
page read and write
|
||
62F1000
|
trusted library allocation
|
page read and write
|
||
61E5000
|
trusted library allocation
|
page read and write
|
||
64A0000
|
direct allocation
|
page read and write
|
||
62CF000
|
trusted library allocation
|
page read and write
|
||
560000
|
unkown
|
page execute and read and write
|
||
61EB000
|
trusted library allocation
|
page read and write
|
||
1420000
|
heap
|
page read and write
|
||
5D5F000
|
trusted library allocation
|
page read and write
|
||
86E0000
|
direct allocation
|
page read and write
|
||
5D92000
|
trusted library allocation
|
page read and write
|
||
1421000
|
heap
|
page read and write
|
||
1440000
|
heap
|
page read and write
|
||
13F0000
|
heap
|
page read and write
|
||
61E7000
|
trusted library allocation
|
page read and write
|
||
5DF0000
|
trusted library allocation
|
page read and write
|
||
5D76000
|
trusted library allocation
|
page read and write
|
||
399F000
|
stack
|
page read and write
|
||
639D000
|
trusted library allocation
|
page read and write
|
||
5D60000
|
trusted library allocation
|
page read and write
|
||
746000
|
unkown
|
page execute and read and write
|
||
5250000
|
direct allocation
|
page read and write
|
||
5D58000
|
trusted library allocation
|
page read and write
|
||
6786000
|
trusted library allocation
|
page read and write
|
||
5D7F000
|
trusted library allocation
|
page read and write
|
||
5D95000
|
trusted library allocation
|
page read and write
|
||
5D7F000
|
trusted library allocation
|
page read and write
|
||
641F000
|
stack
|
page read and write
|
||
52A2000
|
direct allocation
|
page read and write
|
||
62FF000
|
trusted library allocation
|
page read and write
|
||
6306000
|
trusted library allocation
|
page read and write
|
||
1409000
|
heap
|
page read and write
|
||
6481000
|
trusted library allocation
|
page read and write
|
||
632A000
|
trusted library allocation
|
page read and write
|
||
5D51000
|
trusted library allocation
|
page read and write
|
||
5E05000
|
trusted library allocation
|
page read and write
|
||
1402000
|
heap
|
page read and write
|
||
6285000
|
trusted library allocation
|
page read and write
|
||
5D5C000
|
trusted library allocation
|
page read and write
|
||
5D4B000
|
trusted library allocation
|
page read and write
|
||
5DC3000
|
trusted library allocation
|
page read and write
|
||
647D000
|
trusted library allocation
|
page read and write
|
||
1454000
|
heap
|
page read and write
|
||
5D8C000
|
trusted library allocation
|
page read and write
|
||
5D6F000
|
trusted library allocation
|
page read and write
|
||
5D5F000
|
trusted library allocation
|
page read and write
|
||
5D57000
|
trusted library allocation
|
page read and write
|
||
7048D000
|
unkown
|
page read and write
|
||
61E4000
|
trusted library allocation
|
page read and write
|
||
61EF000
|
trusted library allocation
|
page read and write
|
||
5BE3000
|
heap
|
page read and write
|
||
18DD000
|
stack
|
page read and write
|
||
5D84000
|
trusted library allocation
|
page read and write
|
||
64BB000
|
trusted library allocation
|
page read and write
|
||
4DB0000
|
direct allocation
|
page read and write
|
||
5D7F000
|
trusted library allocation
|
page read and write
|
||
764F000
|
stack
|
page read and write
|
||
64A0000
|
direct allocation
|
page read and write
|
||
2A0000
|
unkown
|
page read and write
|
||
5D5B000
|
trusted library allocation
|
page read and write
|
||
6317000
|
trusted library allocation
|
page read and write
|
||
61EA000
|
trusted library allocation
|
page read and write
|
||
6364000
|
trusted library allocation
|
page read and write
|
||
425F000
|
stack
|
page read and write
|
||
1454000
|
heap
|
page read and write
|
||
5D5C000
|
trusted library allocation
|
page read and write
|
||
5D4E000
|
trusted library allocation
|
page read and write
|
||
5D8E000
|
trusted library allocation
|
page read and write
|
||
349F000
|
stack
|
page read and write
|
||
61E7000
|
trusted library allocation
|
page read and write
|
||
7A0F000
|
stack
|
page read and write
|
||
1420000
|
heap
|
page read and write
|
||
4DC1000
|
heap
|
page read and write
|
||
61EB000
|
trusted library allocation
|
page read and write
|
||
5D41000
|
trusted library allocation
|
page read and write
|
||
5DB3000
|
trusted library allocation
|
page read and write
|
||
4B1F000
|
stack
|
page read and write
|
||
5D84000
|
trusted library allocation
|
page read and write
|
||
61EA000
|
trusted library allocation
|
page read and write
|
||
5D50000
|
trusted library allocation
|
page read and write
|
||
61E8000
|
trusted library allocation
|
page read and write
|
||
5D6C000
|
trusted library allocation
|
page read and write
|
||
61E2000
|
trusted library allocation
|
page read and write
|
||
5D55000
|
trusted library allocation
|
page read and write
|
||
61E6000
|
trusted library allocation
|
page read and write
|
||
61E6000
|
trusted library allocation
|
page read and write
|
||
62B3000
|
trusted library allocation
|
page read and write
|
||
5D7F000
|
trusted library allocation
|
page read and write
|
||
461F000
|
stack
|
page read and write
|
||
5DAA000
|
trusted library allocation
|
page read and write
|
||
5D67000
|
trusted library allocation
|
page read and write
|
||
5D84000
|
trusted library allocation
|
page read and write
|
||
86E0000
|
direct allocation
|
page read and write
|
||
6299000
|
trusted library allocation
|
page read and write
|
||
3E9F000
|
stack
|
page read and write
|
||
6416000
|
trusted library allocation
|
page read and write
|
||
475F000
|
stack
|
page read and write
|
||
5D7F000
|
trusted library allocation
|
page read and write
|
||
5DB7000
|
trusted library allocation
|
page read and write
|
||
138C000
|
heap
|
page read and write
|
||
62B6000
|
trusted library allocation
|
page read and write
|
||
5E6B000
|
trusted library allocation
|
page read and write
|
||
5D99000
|
trusted library allocation
|
page read and write
|
||
411F000
|
stack
|
page read and write
|
||
142B000
|
heap
|
page read and write
|
||
5D5F000
|
trusted library allocation
|
page read and write
|
||
47D000
|
unkown
|
page execute and read and write
|
||
5DC3000
|
trusted library allocation
|
page read and write
|
||
5D8D000
|
trusted library allocation
|
page read and write
|
||
142A000
|
heap
|
page read and write
|
||
5D99000
|
trusted library allocation
|
page read and write
|
||
61E2000
|
trusted library allocation
|
page read and write
|
||
4DA0000
|
heap
|
page read and write
|
||
81CE000
|
stack
|
page read and write
|
||
6295000
|
trusted library allocation
|
page read and write
|
||
385F000
|
stack
|
page read and write
|
||
7A4E000
|
stack
|
page read and write
|
||
639B000
|
trusted library allocation
|
page read and write
|
||
5DEA000
|
trusted library allocation
|
page read and write
|
||
6296000
|
trusted library allocation
|
page read and write
|
||
1378000
|
heap
|
page read and write
|
||
5D44000
|
trusted library allocation
|
page read and write
|
||
7CCE000
|
stack
|
page read and write
|
||
6331000
|
trusted library allocation
|
page read and write
|
||
4B5E000
|
stack
|
page read and write
|
||
5D97000
|
trusted library allocation
|
page read and write
|
||
4DC1000
|
heap
|
page read and write
|
||
34DE000
|
stack
|
page read and write
|
||
5D7F000
|
trusted library allocation
|
page read and write
|
||
62B4000
|
trusted library allocation
|
page read and write
|
||
64A0000
|
direct allocation
|
page read and write
|
||
5400000
|
direct allocation
|
page execute and read and write
|
||
1454000
|
heap
|
page read and write
|
||
6ECF000
|
stack
|
page read and write
|
||
61E7000
|
trusted library allocation
|
page read and write
|
||
5D60000
|
trusted library allocation
|
page read and write
|
||
1424000
|
heap
|
page read and write
|
||
1421000
|
heap
|
page read and write
|
||
1413000
|
heap
|
page read and write
|
||
6F0E000
|
stack
|
page read and write
|
||
5D5A000
|
trusted library allocation
|
page read and write
|
||
5D42000
|
trusted library allocation
|
page read and write
|
||
5FE2000
|
trusted library allocation
|
page read and write
|
||
5D7B000
|
trusted library allocation
|
page read and write
|
||
754E000
|
stack
|
page read and write
|
||
61E5000
|
trusted library allocation
|
page read and write
|
||
2A1000
|
unkown
|
page execute and write copy
|
||
5D8F000
|
trusted library allocation
|
page read and write
|
||
4DC1000
|
heap
|
page read and write
|
||
5DA2000
|
trusted library allocation
|
page read and write
|
||
53E0000
|
direct allocation
|
page execute and read and write
|
||
62D6000
|
trusted library allocation
|
page read and write
|
||
840F000
|
stack
|
page read and write
|
||
885E000
|
stack
|
page read and write
|
||
5D5D000
|
trusted library allocation
|
page read and write
|
||
5D6F000
|
trusted library allocation
|
page read and write
|
||
5D8B000
|
trusted library allocation
|
page read and write
|
||
647F000
|
trusted library allocation
|
page read and write
|
||
1454000
|
heap
|
page read and write
|
||
1439000
|
heap
|
page read and write
|
||
61EA000
|
trusted library allocation
|
page read and write
|
||
5D79000
|
trusted library allocation
|
page read and write
|
||
5D6F000
|
trusted library allocation
|
page read and write
|
||
62A3000
|
trusted library allocation
|
page read and write
|
||
8D3E000
|
stack
|
page read and write
|
||
143A000
|
heap
|
page read and write
|
||
5D45000
|
trusted library allocation
|
page read and write
|
||
1436000
|
heap
|
page read and write
|
||
5D60000
|
trusted library allocation
|
page read and write
|
||
6851000
|
trusted library allocation
|
page read and write
|
||
61E4000
|
trusted library allocation
|
page read and write
|
||
6366000
|
trusted library allocation
|
page read and write
|
||
579F000
|
stack
|
page read and write
|
||
6A44000
|
trusted library allocation
|
page execute and read and write
|
||
62DE000
|
trusted library allocation
|
page read and write
|
||
854F000
|
stack
|
page read and write
|
||
5DDD000
|
trusted library allocation
|
page read and write
|
||
62A1000
|
trusted library allocation
|
page read and write
|
||
4DD0000
|
heap
|
page read and write
|
||
750F000
|
stack
|
page read and write
|
||
8E3E000
|
stack
|
page read and write
|
||
62FD000
|
trusted library allocation
|
page read and write
|
||
4DC1000
|
heap
|
page read and write
|
||
5D50000
|
trusted library allocation
|
page read and write
|
||
48DE000
|
stack
|
page read and write
|
||
6297000
|
trusted library allocation
|
page read and write
|
||
61E6000
|
trusted library allocation
|
page read and write
|
||
5DDA000
|
trusted library allocation
|
page read and write
|
||
5210000
|
heap
|
page read and write
|
||
5D77000
|
trusted library allocation
|
page read and write
|
||
4DB0000
|
direct allocation
|
page read and write
|
||
5D6F000
|
trusted library allocation
|
page read and write
|
||
1434000
|
heap
|
page read and write
|
||
718E000
|
stack
|
page read and write
|
||
13A6000
|
heap
|
page read and write
|
||
2F4000
|
unkown
|
page write copy
|
||
6295000
|
trusted library allocation
|
page read and write
|
||
5D5A000
|
trusted library allocation
|
page read and write
|
||
1439000
|
heap
|
page read and write
|
||
4DB0000
|
direct allocation
|
page read and write
|
||
8690000
|
trusted library allocation
|
page read and write
|
||
6313000
|
trusted library allocation
|
page read and write
|
||
5D55000
|
trusted library allocation
|
page read and write
|
||
62BB000
|
trusted library allocation
|
page read and write
|
||
61EB000
|
trusted library allocation
|
page read and write
|
||
5D40000
|
trusted library allocation
|
page read and write
|
||
5D6E000
|
trusted library allocation
|
page read and write
|
||
4DC1000
|
heap
|
page read and write
|
||
1426000
|
heap
|
page read and write
|
||
704E000
|
stack
|
page read and write
|
||
632F000
|
trusted library allocation
|
page read and write
|
||
5D57000
|
trusted library allocation
|
page read and write
|
||
6297000
|
trusted library allocation
|
page read and write
|
||
6322000
|
trusted library allocation
|
page read and write
|
||
5D4C000
|
trusted library allocation
|
page read and write
|
||
1426000
|
heap
|
page read and write
|
||
6C8E000
|
stack
|
page read and write
|
||
5D75000
|
trusted library allocation
|
page read and write
|
||
6287000
|
trusted library allocation
|
page read and write
|
||
5D6F000
|
trusted library allocation
|
page read and write
|
||
5D78000
|
trusted library allocation
|
page read and write
|
||
335F000
|
stack
|
page read and write
|
||
5D98000
|
trusted library allocation
|
page read and write
|
||
1391000
|
heap
|
page read and write
|
||
6354000
|
trusted library allocation
|
page read and write
|
||
168E000
|
stack
|
page read and write
|
||
5BBF000
|
stack
|
page read and write
|
||
1433000
|
heap
|
page read and write
|
||
142B000
|
heap
|
page read and write
|
||
5D5E000
|
trusted library allocation
|
page read and write
|
||
631B000
|
trusted library allocation
|
page read and write
|
||
61EA000
|
trusted library allocation
|
page read and write
|
||
7F4E000
|
stack
|
page read and write
|
||
633B000
|
trusted library allocation
|
page read and write
|
||
4DB0000
|
direct allocation
|
page read and write
|
||
479E000
|
stack
|
page read and write
|
||
6327000
|
trusted library allocation
|
page read and write
|
||
1454000
|
heap
|
page read and write
|
||
4DB0000
|
direct allocation
|
page read and write
|
||
2F87000
|
heap
|
page read and write
|
||
61F0000
|
trusted library allocation
|
page read and write
|
||
61E2000
|
trusted library allocation
|
page read and write
|
||
5D6F000
|
trusted library allocation
|
page read and write
|
||
70486000
|
unkown
|
page execute and read and write
|
||
1436000
|
heap
|
page read and write
|
||
12FB000
|
stack
|
page read and write
|
||
5D88000
|
trusted library allocation
|
page read and write
|
||
64A0000
|
direct allocation
|
page read and write
|
||
63D7000
|
trusted library allocation
|
page read and write
|
||
5DA7000
|
trusted library allocation
|
page read and write
|
||
5D5F000
|
trusted library allocation
|
page read and write
|
||
3D5F000
|
stack
|
page read and write
|
||
4DC1000
|
heap
|
page read and write
|
||
1454000
|
heap
|
page read and write
|
||
5D5D000
|
trusted library allocation
|
page read and write
|
||
6294000
|
trusted library allocation
|
page read and write
|
||
61ED000
|
trusted library allocation
|
page read and write
|
||
61E5000
|
trusted library allocation
|
page read and write
|
||
6352000
|
trusted library allocation
|
page read and write
|
||
5D76000
|
trusted library allocation
|
page read and write
|
||
140F000
|
heap
|
page read and write
|
||
5D8C000
|
trusted library allocation
|
page read and write
|
||
5D5D000
|
trusted library allocation
|
page read and write
|
||
5D58000
|
trusted library allocation
|
page read and write
|
||
5D58000
|
trusted library allocation
|
page read and write
|
||
8710000
|
heap
|
page read and write
|
||
5D88000
|
trusted library allocation
|
page read and write
|
||
1454000
|
heap
|
page read and write
|
||
5D97000
|
trusted library allocation
|
page read and write
|
||
49DF000
|
stack
|
page read and write
|
||
61E2000
|
trusted library allocation
|
page read and write
|
||
790E000
|
stack
|
page read and write
|
||
77CE000
|
stack
|
page read and write
|
||
5D99000
|
trusted library allocation
|
page read and write
|
||
5E7A000
|
stack
|
page read and write
|
||
5DDA000
|
trusted library allocation
|
page read and write
|
||
5D57000
|
trusted library allocation
|
page read and write
|
||
61ED000
|
trusted library allocation
|
page read and write
|
||
134E000
|
heap
|
page read and write
|
||
62E0000
|
trusted library allocation
|
page read and write
|
||
5D50000
|
trusted library allocation
|
page read and write
|
||
5DC0000
|
trusted library allocation
|
page read and write
|
||
5D43000
|
trusted library allocation
|
page read and write
|
||
5D45000
|
trusted library allocation
|
page read and write
|
||
61E7000
|
trusted library allocation
|
page read and write
|
||
5D4B000
|
trusted library allocation
|
page read and write
|
||
5D6F000
|
trusted library allocation
|
page read and write
|
||
5D77000
|
trusted library allocation
|
page read and write
|
||
5D5D000
|
trusted library allocation
|
page read and write
|
||
4DC1000
|
heap
|
page read and write
|
||
63EE000
|
trusted library allocation
|
page read and write
|
||
5DB9000
|
trusted library allocation
|
page read and write
|
||
5D6E000
|
trusted library allocation
|
page read and write
|
||
5ED9000
|
trusted library allocation
|
page read and write
|
||
6458000
|
trusted library allocation
|
page read and write
|
||
569E000
|
stack
|
page read and write
|
||
7C8F000
|
stack
|
page read and write
|
||
5D6F000
|
trusted library allocation
|
page read and write
|
||
62B6000
|
trusted library allocation
|
page read and write
|
||
5D5F000
|
trusted library allocation
|
page read and write
|
||
1421000
|
heap
|
page read and write
|
||
43DE000
|
stack
|
page read and write
|
||
13B4000
|
heap
|
page read and write
|
||
5D5B000
|
trusted library allocation
|
page read and write
|
||
5E40000
|
trusted library allocation
|
page read and write
|
||
638F000
|
trusted library allocation
|
page read and write
|
||
5DDA000
|
trusted library allocation
|
page read and write
|
||
5FE0000
|
trusted library allocation
|
page read and write
|
||
5D6F000
|
trusted library allocation
|
page read and write
|
||
13B4000
|
heap
|
page read and write
|
||
5D5C000
|
trusted library allocation
|
page read and write
|
||
4DC1000
|
heap
|
page read and write
|
||
5D60000
|
trusted library allocation
|
page read and write
|
||
5D4B000
|
trusted library allocation
|
page read and write
|
||
5E43000
|
trusted library allocation
|
page read and write
|
||
6319000
|
trusted library allocation
|
page read and write
|
||
88B0000
|
heap
|
page read and write
|
||
141D000
|
heap
|
page read and write
|
||
644F000
|
trusted library allocation
|
page read and write
|
||
1420000
|
heap
|
page read and write
|
||
64B9000
|
trusted library allocation
|
page read and write
|
||
5D7F000
|
trusted library allocation
|
page read and write
|
||
62DE000
|
trusted library allocation
|
page read and write
|
||
63EC000
|
trusted library allocation
|
page read and write
|
||
73CF000
|
stack
|
page read and write
|
||
5D55000
|
trusted library allocation
|
page read and write
|
||
539F000
|
stack
|
page read and write
|
||
64A0000
|
direct allocation
|
page read and write
|
||
1386000
|
heap
|
page read and write
|
||
58DE000
|
stack
|
page read and write
|
||
747000
|
unkown
|
page execute and write copy
|
||
5D67000
|
trusted library allocation
|
page read and write
|
||
5DC3000
|
trusted library allocation
|
page read and write
|
||
5DD9000
|
trusted library allocation
|
page read and write
|
||
5DBD000
|
trusted library allocation
|
page read and write
|
||
5D63000
|
trusted library allocation
|
page read and write
|
||
4DB0000
|
direct allocation
|
page read and write
|
||
61E0000
|
trusted library allocation
|
page read and write
|
||
5D89000
|
trusted library allocation
|
page read and write
|
||
5D62000
|
trusted library allocation
|
page read and write
|
||
5D9D000
|
trusted library allocation
|
page read and write
|
||
5D7D000
|
trusted library allocation
|
page read and write
|
||
5E83000
|
trusted library allocation
|
page read and write
|
||
6298000
|
trusted library allocation
|
page read and write
|
||
6324000
|
trusted library allocation
|
page read and write
|
||
61EC000
|
trusted library allocation
|
page read and write
|
||
565D000
|
stack
|
page read and write
|
||
5D48000
|
trusted library allocation
|
page read and write
|
||
5D97000
|
trusted library allocation
|
page read and write
|
||
61E3000
|
trusted library allocation
|
page read and write
|
||
1391000
|
heap
|
page read and write
|
||
1439000
|
heap
|
page read and write
|
||
5D62000
|
trusted library allocation
|
page read and write
|
||
2F80000
|
heap
|
page read and write
|
||
4DB0000
|
direct allocation
|
page read and write
|
||
5D5F000
|
trusted library allocation
|
page read and write
|
||
61E7000
|
trusted library allocation
|
page read and write
|
||
5D41000
|
trusted library allocation
|
page read and write
|
||
830E000
|
stack
|
page read and write
|
||
5DC3000
|
trusted library allocation
|
page read and write
|
||
631E000
|
trusted library allocation
|
page read and write
|
||
5D99000
|
trusted library allocation
|
page read and write
|
||
61EB000
|
trusted library allocation
|
page read and write
|
||
1450000
|
heap
|
page read and write
|
||
429E000
|
stack
|
page read and write
|
||
5D3E000
|
stack
|
page read and write
|
||
62FD000
|
trusted library allocation
|
page read and write
|
||
4DC1000
|
heap
|
page read and write
|
||
5DB7000
|
trusted library allocation
|
page read and write
|
||
1454000
|
heap
|
page read and write
|
||
5DCA000
|
trusted library allocation
|
page read and write
|
||
5D6F000
|
trusted library allocation
|
page read and write
|
||
5EA3000
|
trusted library allocation
|
page read and write
|
||
5D4E000
|
trusted library allocation
|
page read and write
|
||
4D9F000
|
stack
|
page read and write
|
||
5D6F000
|
trusted library allocation
|
page read and write
|
||
5DC0000
|
trusted library allocation
|
page read and write
|
||
8CFC000
|
stack
|
page read and write
|
||
158E000
|
stack
|
page read and write
|
||
61E6000
|
trusted library allocation
|
page read and write
|
||
5DAA000
|
trusted library allocation
|
page read and write
|
||
64A0000
|
direct allocation
|
page read and write
|
||
62EF000
|
trusted library allocation
|
page read and write
|
||
5DAF000
|
trusted library allocation
|
page read and write
|
||
594E000
|
stack
|
page read and write
|
||
4A1E000
|
stack
|
page read and write
|
||
61E6000
|
trusted library allocation
|
page read and write
|
||
5D5D000
|
trusted library allocation
|
page read and write
|
||
6305000
|
trusted library allocation
|
page read and write
|
||
664E000
|
trusted library allocation
|
page read and write
|
||
5D63000
|
trusted library allocation
|
page read and write
|
||
53E0000
|
direct allocation
|
page execute and read and write
|
||
2A0000
|
unkown
|
page readonly
|
||
5E4C000
|
trusted library allocation
|
page read and write
|
||
5D73000
|
trusted library allocation
|
page read and write
|
||
1454000
|
heap
|
page read and write
|
||
5D4A000
|
trusted library allocation
|
page read and write
|
||
61F0000
|
trusted library allocation
|
page read and write
|
||
61F1000
|
trusted library allocation
|
page read and write
|
||
86E0000
|
direct allocation
|
page read and write
|
||
5D5E000
|
trusted library allocation
|
page read and write
|
||
5BE0000
|
heap
|
page read and write
|
||
5D5F000
|
trusted library allocation
|
page read and write
|
||
5D4E000
|
trusted library allocation
|
page read and write
|
||
1439000
|
heap
|
page read and write
|
||
5D5D000
|
trusted library allocation
|
page read and write
|
||
5D52000
|
trusted library allocation
|
page read and write
|
||
5D6E000
|
trusted library allocation
|
page read and write
|
||
5D7F000
|
trusted library allocation
|
page read and write
|
||
1454000
|
heap
|
page read and write
|
||
62E0000
|
trusted library allocation
|
page read and write
|
||
5D76000
|
trusted library allocation
|
page read and write
|
||
5D5D000
|
trusted library allocation
|
page read and write
|
||
5D7F000
|
trusted library allocation
|
page read and write
|
||
58B000
|
unkown
|
page execute and read and write
|
||
4DC1000
|
heap
|
page read and write
|
||
5D7F000
|
trusted library allocation
|
page read and write
|
||
6319000
|
trusted library allocation
|
page read and write
|
||
1431000
|
heap
|
page read and write
|
||
5E45000
|
trusted library allocation
|
page read and write
|
||
439F000
|
stack
|
page read and write
|
||
678A000
|
trusted library allocation
|
page execute and read and write
|
||
5DA3000
|
trusted library allocation
|
page read and write
|
||
649E000
|
stack
|
page read and write
|
||
5DAF000
|
trusted library allocation
|
page read and write
|
||
627F000
|
trusted library allocation
|
page read and write
|
||
5D6E000
|
trusted library allocation
|
page read and write
|
||
5D76000
|
trusted library allocation
|
page read and write
|
||
401E000
|
stack
|
page read and write
|
||
61E9000
|
trusted library allocation
|
page read and write
|
||
5D6F000
|
trusted library allocation
|
page read and write
|
||
5D5F000
|
trusted library allocation
|
page read and write
|
||
89BA000
|
trusted library allocation
|
page read and write
|
||
4DC1000
|
heap
|
page read and write
|
||
143A000
|
heap
|
page read and write
|
||
5DD9000
|
trusted library allocation
|
page read and write
|
||
4DC0000
|
heap
|
page read and write
|
||
595000
|
unkown
|
page execute and read and write
|
||
5DD9000
|
trusted library allocation
|
page read and write
|
||
5DDC000
|
trusted library allocation
|
page read and write
|
||
30DF000
|
stack
|
page read and write
|
||
5D7F000
|
trusted library allocation
|
page read and write
|
||
140F000
|
heap
|
page read and write
|
||
6293000
|
trusted library allocation
|
page read and write
|
||
1425000
|
heap
|
page read and write
|
||
633D000
|
trusted library allocation
|
page read and write
|
||
858E000
|
stack
|
page read and write
|
||
1454000
|
heap
|
page read and write
|
||
5A3000
|
unkown
|
page execute and write copy
|
||
61E2000
|
trusted library allocation
|
page read and write
|
||
4C9E000
|
stack
|
page read and write
|
||
61E4000
|
trusted library allocation
|
page read and write
|
||
1439000
|
heap
|
page read and write
|
||
5D76000
|
trusted library allocation
|
page read and write
|
||
61E4000
|
trusted library allocation
|
page read and write
|
||
1340000
|
heap
|
page read and write
|
||
5D89000
|
trusted library allocation
|
page read and write
|
||
61E2000
|
trusted library allocation
|
page read and write
|
||
5D5D000
|
trusted library allocation
|
page read and write
|
||
4DB0000
|
direct allocation
|
page read and write
|
||
62A1000
|
trusted library allocation
|
page read and write
|
||
1427000
|
heap
|
page read and write
|
||
86B0000
|
trusted library allocation
|
page read and write
|
||
53E0000
|
direct allocation
|
page execute and read and write
|
||
529B000
|
stack
|
page read and write
|
||
70471000
|
unkown
|
page execute read
|
||
58E0000
|
remote allocation
|
page read and write
|
||
62D9000
|
stack
|
page read and write
|
||
1403000
|
heap
|
page read and write
|
||
63DB000
|
trusted library allocation
|
page read and write
|
||
5D5A000
|
trusted library allocation
|
page read and write
|
||
61E9000
|
trusted library allocation
|
page read and write
|
||
61E8000
|
trusted library allocation
|
page read and write
|
||
5D7F000
|
trusted library allocation
|
page read and write
|
||
19DE000
|
stack
|
page read and write
|
||
5D7B000
|
trusted library allocation
|
page read and write
|
||
63C0000
|
trusted library allocation
|
page read and write
|
||
140A000
|
heap
|
page read and write
|
||
3FDF000
|
stack
|
page read and write
|
||
631C000
|
trusted library allocation
|
page read and write
|
||
2A1000
|
unkown
|
page execute and read and write
|
||
64A0000
|
direct allocation
|
page read and write
|
||
5DD9000
|
trusted library allocation
|
page read and write
|
||
1454000
|
heap
|
page read and write
|
||
778F000
|
stack
|
page read and write
|
||
5250000
|
direct allocation
|
page read and write
|
||
64A0000
|
direct allocation
|
page read and write
|
||
5D9F000
|
trusted library allocation
|
page read and write
|
||
62B4000
|
trusted library allocation
|
page read and write
|
||
70487000
|
unkown
|
page readonly
|
||
3D9E000
|
stack
|
page read and write
|
||
5D6F000
|
trusted library allocation
|
page read and write
|
||
53B0000
|
direct allocation
|
page execute and read and write
|
||
6A32000
|
trusted library allocation
|
page execute and read and write
|
||
61EC000
|
trusted library allocation
|
page read and write
|
||
53C0000
|
direct allocation
|
page execute and read and write
|
||
4DC1000
|
heap
|
page read and write
|
||
5DD3000
|
trusted library allocation
|
page read and write
|
||
5D49000
|
trusted library allocation
|
page read and write
|
||
62E0000
|
trusted library allocation
|
page read and write
|
||
5D65000
|
trusted library allocation
|
page read and write
|
||
86F0000
|
direct allocation
|
page execute and read and write
|
||
5DBF000
|
trusted library allocation
|
page read and write
|
||
1428000
|
heap
|
page read and write
|
||
61E2000
|
trusted library allocation
|
page read and write
|
||
5D6F000
|
trusted library allocation
|
page read and write
|
||
5250000
|
direct allocation
|
page read and write
|
||
5A4F000
|
stack
|
page read and write
|
||
62B5000
|
trusted library allocation
|
page read and write
|
||
5D8A000
|
trusted library allocation
|
page read and write
|
||
740E000
|
stack
|
page read and write
|
||
5D57000
|
trusted library allocation
|
page read and write
|
||
5D7F000
|
trusted library allocation
|
page read and write
|
||
6418000
|
trusted library allocation
|
page read and write
|
||
5DA7000
|
trusted library allocation
|
page read and write
|
||
A190000
|
trusted library allocation
|
page read and write
|
||
2FDE000
|
stack
|
page read and write
|
||
5D55000
|
trusted library allocation
|
page read and write
|
||
4DC1000
|
heap
|
page read and write
|
||
6A42000
|
trusted library allocation
|
page execute and read and write
|
||
62A3000
|
trusted library allocation
|
page read and write
|
||
5424000
|
trusted library allocation
|
page read and write
|
||
13F0000
|
heap
|
page read and write
|
||
5DDC000
|
trusted library allocation
|
page read and write
|
||
2F4000
|
unkown
|
page read and write
|
||
62D2000
|
trusted library allocation
|
page read and write
|
||
5F2B000
|
trusted library allocation
|
page read and write
|
||
642E000
|
trusted library allocation
|
page read and write
|
||
5D5E000
|
trusted library allocation
|
page read and write
|
||
62C3000
|
trusted library allocation
|
page read and write
|
||
4DC1000
|
heap
|
page read and write
|
||
5D5A000
|
trusted library allocation
|
page read and write
|
||
5DC3000
|
trusted library allocation
|
page read and write
|
||
5D7B000
|
trusted library allocation
|
page read and write
|
||
62FB000
|
trusted library allocation
|
page read and write
|
||
142B000
|
heap
|
page read and write
|
||
5D8D000
|
trusted library allocation
|
page read and write
|
||
1439000
|
heap
|
page read and write
|
||
61E9000
|
trusted library allocation
|
page read and write
|
||
143E000
|
heap
|
page read and write
|
||
631C000
|
trusted library allocation
|
page read and write
|
||
5D55000
|
trusted library allocation
|
page read and write
|
||
5D76000
|
trusted library allocation
|
page read and write
|
||
339E000
|
stack
|
page read and write
|
||
5DAC000
|
trusted library allocation
|
page read and write
|
||
6D8F000
|
stack
|
page read and write
|
||
61EE000
|
trusted library allocation
|
page read and write
|
||
5D7B000
|
trusted library allocation
|
page read and write
|
||
4DB0000
|
direct allocation
|
page read and write
|
||
4DB0000
|
direct allocation
|
page read and write
|
||
53D0000
|
direct allocation
|
page execute and read and write
|
||
64A0000
|
direct allocation
|
page read and write
|
||
808E000
|
stack
|
page read and write
|
||
5D7F000
|
trusted library allocation
|
page read and write
|
||
728F000
|
stack
|
page read and write
|
||
5DA4000
|
trusted library allocation
|
page read and write
|
||
647F000
|
trusted library allocation
|
page read and write
|
||
53E0000
|
direct allocation
|
page execute and read and write
|
||
35DF000
|
stack
|
page read and write
|
||
645A000
|
trusted library allocation
|
page read and write
|
||
62B2000
|
trusted library allocation
|
page read and write
|
||
61E4000
|
trusted library allocation
|
page read and write
|
||
6B4F000
|
stack
|
page read and write
|
||
5DBC000
|
trusted library allocation
|
page read and write
|
||
5D6C000
|
trusted library allocation
|
page read and write
|
||
361E000
|
stack
|
page read and write
|
||
61E0000
|
trusted library allocation
|
page read and write
|
||
5EF3000
|
trusted library allocation
|
page read and write
|
||
321F000
|
stack
|
page read and write
|
||
5DA7000
|
trusted library allocation
|
page read and write
|
||
61E7000
|
trusted library allocation
|
page read and write
|
||
415E000
|
stack
|
page read and write
|
||
64A0000
|
direct allocation
|
page read and write
|
||
8870000
|
direct allocation
|
page execute and read and write
|
||
61EA000
|
trusted library allocation
|
page read and write
|
||
63D9000
|
trusted library allocation
|
page read and write
|
||
4DC1000
|
heap
|
page read and write
|
||
5D9A000
|
trusted library allocation
|
page read and write
|
||
5D72000
|
trusted library allocation
|
page read and write
|
||
57DE000
|
stack
|
page read and write
|
||
5D78000
|
trusted library allocation
|
page read and write
|
||
62C1000
|
trusted library allocation
|
page read and write
|
||
5E49000
|
trusted library allocation
|
page read and write
|
||
61E9000
|
trusted library allocation
|
page read and write
|
||
634F000
|
trusted library allocation
|
page read and write
|
||
628E000
|
trusted library allocation
|
page read and write
|
||
72CE000
|
stack
|
page read and write
|
||
58E0000
|
remote allocation
|
page read and write
|
||
5D65000
|
trusted library allocation
|
page read and write
|
||
5D5F000
|
trusted library allocation
|
page read and write
|
||
5D52000
|
trusted library allocation
|
page read and write
|
||
4DC1000
|
heap
|
page read and write
|
||
6773000
|
trusted library allocation
|
page read and write
|
||
62E2000
|
trusted library allocation
|
page read and write
|
||
5D77000
|
trusted library allocation
|
page read and write
|
||
13A6000
|
heap
|
page read and write
|
||
62E8000
|
trusted library allocation
|
page read and write
|
||
134A000
|
heap
|
page read and write
|
||
5DD9000
|
trusted library allocation
|
page read and write
|
||
5D85000
|
trusted library allocation
|
page read and write
|
||
61E2000
|
trusted library allocation
|
page read and write
|
||
4DC1000
|
heap
|
page read and write
|
||
5ABE000
|
stack
|
page read and write
|
||
7B4F000
|
stack
|
page read and write
|
||
5D41000
|
trusted library allocation
|
page read and write
|
||
61E5000
|
trusted library allocation
|
page read and write
|
||
5D41000
|
trusted library allocation
|
page read and write
|
||
61F1000
|
trusted library allocation
|
page read and write
|
||
5DA2000
|
trusted library allocation
|
page read and write
|
||
5D6F000
|
trusted library allocation
|
page read and write
|
||
61E6000
|
trusted library allocation
|
page read and write
|
||
1424000
|
heap
|
page read and write
|
||
61E9000
|
trusted library allocation
|
page read and write
|
||
5D51000
|
trusted library allocation
|
page read and write
|
||
5D7F000
|
trusted library allocation
|
page read and write
|
||
1454000
|
heap
|
page read and write
|
||
5D9C000
|
trusted library allocation
|
page read and write
|
||
5DA7000
|
trusted library allocation
|
page read and write
|
||
5FBB000
|
trusted library allocation
|
page read and write
|
||
61E3000
|
trusted library allocation
|
page read and write
|
||
5DB1000
|
trusted library allocation
|
page read and write
|
||
142B000
|
heap
|
page read and write
|
||
627D000
|
trusted library allocation
|
page read and write
|
||
61E0000
|
trusted library allocation
|
page read and write
|
||
89B0000
|
trusted library allocation
|
page read and write
|
||
5D48000
|
trusted library allocation
|
page read and write
|
||
39DE000
|
stack
|
page read and write
|
||
61EE000
|
trusted library allocation
|
page read and write
|
||
6307000
|
trusted library allocation
|
page read and write
|
||
1424000
|
heap
|
page read and write
|
||
5D6F000
|
trusted library allocation
|
page read and write
|
||
5D7F000
|
trusted library allocation
|
page read and write
|
||
5DD9000
|
trusted library allocation
|
page read and write
|
||
4DB0000
|
direct allocation
|
page read and write
|
||
489F000
|
stack
|
page read and write
|
||
5D73000
|
trusted library allocation
|
page read and write
|
||
61E4000
|
trusted library allocation
|
page read and write
|
||
5D99000
|
trusted library allocation
|
page read and write
|
||
61E5000
|
trusted library allocation
|
page read and write
|
||
61ED000
|
trusted library allocation
|
page read and write
|
||
62B4000
|
trusted library allocation
|
page read and write
|
||
641D000
|
trusted library allocation
|
page read and write
|
||
1439000
|
heap
|
page read and write
|
||
13A6000
|
heap
|
page read and write
|
||
5D5A000
|
trusted library allocation
|
page read and write
|
||
7B8E000
|
stack
|
page read and write
|
||
6782000
|
trusted library allocation
|
page execute and read and write
|
||
5DA0000
|
trusted library allocation
|
page read and write
|
||
5D4E000
|
trusted library allocation
|
page read and write
|
||
5D9F000
|
trusted library allocation
|
page read and write
|
||
3ADF000
|
stack
|
page read and write
|
||
5260000
|
direct allocation
|
page read and write
|
||
89B2000
|
trusted library allocation
|
page read and write
|
||
5DC3000
|
trusted library allocation
|
page read and write
|
||
371F000
|
stack
|
page read and write
|
||
62EA000
|
trusted library allocation
|
page read and write
|
||
61E4000
|
trusted library allocation
|
page read and write
|
||
64A0000
|
direct allocation
|
page read and write
|
||
1454000
|
heap
|
page read and write
|
||
7DCF000
|
stack
|
page read and write
|
||
868F000
|
stack
|
page read and write
|
||
7F0F000
|
stack
|
page read and write
|
||
61EF000
|
trusted library allocation
|
page read and write
|
||
5D60000
|
trusted library allocation
|
page read and write
|
||
375E000
|
stack
|
page read and write
|
||
63DD000
|
trusted library allocation
|
page read and write
|
||
5D6F000
|
trusted library allocation
|
page read and write
|
||
5DAF000
|
trusted library allocation
|
page read and write
|
||
5D81000
|
trusted library allocation
|
page read and write
|
||
5D72000
|
trusted library allocation
|
page read and write
|
||
5D6E000
|
trusted library allocation
|
page read and write
|
||
142B000
|
heap
|
page read and write
|
||
804F000
|
stack
|
page read and write
|
||
5D87000
|
trusted library allocation
|
page read and write
|
||
691C000
|
trusted library allocation
|
page execute and read and write
|
||
6325000
|
trusted library allocation
|
page read and write
|
||
61E6000
|
trusted library allocation
|
page read and write
|
||
5D92000
|
trusted library allocation
|
page read and write
|
||
631E000
|
stack
|
page read and write
|
||
5D55000
|
trusted library allocation
|
page read and write
|
||
141F000
|
heap
|
page read and write
|
||
818F000
|
stack
|
page read and write
|
||
5D5F000
|
trusted library allocation
|
page read and write
|
||
6DCE000
|
stack
|
page read and write
|
||
5DD0000
|
trusted library allocation
|
page read and write
|
||
311B000
|
stack
|
page read and write
|
||
1417000
|
heap
|
page read and write
|
||
5D73000
|
trusted library allocation
|
page read and write
|
||
4DB0000
|
direct allocation
|
page read and write
|
||
875C000
|
stack
|
page read and write
|
||
5D5A000
|
trusted library allocation
|
page read and write
|
||
325E000
|
stack
|
page read and write
|
||
1391000
|
heap
|
page read and write
|
||
44DF000
|
stack
|
page read and write
|
||
5D6F000
|
trusted library allocation
|
page read and write
|
||
5DE8000
|
trusted library allocation
|
page read and write
|
||
5D52000
|
trusted library allocation
|
page read and write
|
||
1454000
|
heap
|
page read and write
|
||
5D6E000
|
trusted library allocation
|
page read and write
|
||
53EE000
|
stack
|
page read and write
|
||
5D7F000
|
trusted library allocation
|
page read and write
|
||
5E41000
|
trusted library allocation
|
page read and write
|
||
5D6F000
|
trusted library allocation
|
page read and write
|
||
645C000
|
stack
|
page read and write
|
||
4DC1000
|
heap
|
page read and write
|
||
6293000
|
trusted library allocation
|
page read and write
|
||
1431000
|
heap
|
page read and write
|
||
6304000
|
trusted library allocation
|
page read and write
|
||
62D1000
|
trusted library allocation
|
page read and write
|
||
4DB0000
|
direct allocation
|
page read and write
|
||
5D41000
|
trusted library allocation
|
page read and write
|
||
5A4000
|
unkown
|
page execute and write copy
|
||
61EF000
|
trusted library allocation
|
page read and write
|
||
5D52000
|
trusted library allocation
|
page read and write
|
||
6315000
|
trusted library allocation
|
page read and write
|
There are 836 hidden memdumps, click here to show them.
DOM / HTML
URL
|
Malicious
|
|
---|---|---|
https://learn.microsoft.com/en-us/dotnet/framework/install/application-not-started?version=(null)&processName=file.exe&platform=0009&osver=6&isServer=0&shimver=4.0.30319.0
|
||
https://learn.microsoft.com/en-us/dotnet/framework/install/application-not-started?version=(null)&processName=file.exe&platform=0009&osver=6&isServer=0&shimver=4.0.30319.0
|
||
https://learn.microsoft.com/en-us/dotnet/framework/install/application-not-started?version=(null)&processName=file.exe&platform=0009&osver=6&isServer=0&shimver=4.0.30319.0
|
||
https://learn.microsoft.com/en-us/dotnet/framework/install/application-not-started?version=(null)&processName=file.exe&platform=0009&osver=6&isServer=0&shimver=4.0.30319.0
|
||
https://learn.microsoft.com/en-us/dotnet/framework/install/application-not-started?version=(null)&processName=file.exe&platform=0009&osver=6&isServer=0&shimver=4.0.30319.0
|
||
https://learn.microsoft.com/en-us/dotnet/framework/install/application-not-started?version=(null)&processName=file.exe&platform=0009&osver=6&isServer=0&shimver=4.0.30319.0
|