Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
file.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
initial sample
|
||
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Docs.lnk
|
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command
line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Mon Dec 2 05:38:09 2024, atime=Wed Sep 27 04:28:28
2023, length=1210144, window=hide
|
dropped
|
||
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Gmail.lnk
|
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command
line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Mon Dec 2 05:38:09 2024, atime=Wed Sep 27 04:28:28
2023, length=1210144, window=hide
|
dropped
|
||
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Google Drive.lnk
|
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command
line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Thu Oct 5 07:00:51 2023, atime=Wed Sep 27 04:28:28
2023, length=1210144, window=hide
|
dropped
|
||
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Sheets.lnk
|
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command
line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Mon Dec 2 05:38:09 2024, atime=Wed Sep 27 04:28:28
2023, length=1210144, window=hide
|
dropped
|
||
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Slides.lnk
|
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command
line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Mon Dec 2 05:38:09 2024, atime=Wed Sep 27 04:28:28
2023, length=1210144, window=hide
|
dropped
|
||
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\YouTube.lnk
|
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command
line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Mon Dec 2 05:38:08 2024, atime=Wed Sep 27 04:28:28
2023, length=1210144, window=hide
|
dropped
|
||
Chrome Cache Entry: 100
|
JSON data
|
dropped
|
||
Chrome Cache Entry: 101
|
ASCII text, with very long lines (65410)
|
downloaded
|
||
Chrome Cache Entry: 102
|
JSON data
|
downloaded
|
||
Chrome Cache Entry: 103
|
PNG image data, 533 x 478, 8-bit/color RGBA, non-interlaced
|
downloaded
|
||
Chrome Cache Entry: 104
|
ASCII text, with very long lines (52717), with no line terminators
|
dropped
|
||
Chrome Cache Entry: 105
|
ASCII text
|
downloaded
|
||
Chrome Cache Entry: 106
|
ASCII text, with very long lines (52717), with no line terminators
|
downloaded
|
||
Chrome Cache Entry: 107
|
exported SGML document, ASCII text, with very long lines (65536), with no line terminators
|
downloaded
|
||
Chrome Cache Entry: 108
|
PNG image data, 533 x 478, 8-bit/color RGBA, non-interlaced
|
downloaded
|
||
Chrome Cache Entry: 109
|
MS Windows icon resource - 6 icons, -128x-128, 16 colors, 72x72, 16 colors
|
downloaded
|
||
Chrome Cache Entry: 110
|
ASCII text, with very long lines (46884)
|
downloaded
|
||
Chrome Cache Entry: 111
|
JSON data
|
dropped
|
||
Chrome Cache Entry: 112
|
MS Windows icon resource - 6 icons, -128x-128, 16 colors, 72x72, 16 colors
|
dropped
|
||
Chrome Cache Entry: 113
|
PNG image data, 658 x 480, 8-bit/color RGBA, non-interlaced
|
downloaded
|
||
Chrome Cache Entry: 114
|
ASCII text, with very long lines (33148), with no line terminators
|
dropped
|
||
Chrome Cache Entry: 115
|
JSON data
|
downloaded
|
||
Chrome Cache Entry: 116
|
JPEG image data, JFIF standard 1.01, aspect ratio, density 1x1, segment length 16, baseline, precision 8, 1528x402, components
3
|
dropped
|
||
Chrome Cache Entry: 117
|
PNG image data, 475 x 212, 8-bit/color RGBA, non-interlaced
|
downloaded
|
||
Chrome Cache Entry: 118
|
JSON data
|
downloaded
|
||
Chrome Cache Entry: 119
|
JSON data
|
dropped
|
||
Chrome Cache Entry: 120
|
JPEG image data, JFIF standard 1.01, aspect ratio, density 1x1, segment length 16, baseline, precision 8, 1528x402, components
3
|
downloaded
|
||
Chrome Cache Entry: 121
|
exported SGML document, ASCII text, with very long lines (65536), with no line terminators
|
dropped
|
||
Chrome Cache Entry: 122
|
ASCII text, with very long lines (46884)
|
dropped
|
||
Chrome Cache Entry: 123
|
ASCII text
|
dropped
|
||
Chrome Cache Entry: 124
|
SVG Scalable Vector Graphics image
|
downloaded
|
||
Chrome Cache Entry: 125
|
Web Open Font Format (Version 2), TrueType, length 19696, version 1.0
|
downloaded
|
||
Chrome Cache Entry: 126
|
ASCII text, with very long lines (33148), with no line terminators
|
downloaded
|
||
Chrome Cache Entry: 127
|
PNG image data, 475 x 212, 8-bit/color RGBA, non-interlaced
|
dropped
|
||
Chrome Cache Entry: 128
|
PNG image data, 658 x 480, 8-bit/color RGBA, non-interlaced
|
dropped
|
||
Chrome Cache Entry: 129
|
JSON data
|
dropped
|
||
Chrome Cache Entry: 130
|
JSON data
|
dropped
|
||
Chrome Cache Entry: 131
|
HTML document, ASCII text, with very long lines (639), with CRLF, LF line terminators
|
downloaded
|
||
Chrome Cache Entry: 132
|
JSON data
|
downloaded
|
||
Chrome Cache Entry: 133
|
PNG image data, 533 x 478, 8-bit/color RGBA, non-interlaced
|
dropped
|
||
Chrome Cache Entry: 92
|
PNG image data, 533 x 478, 8-bit/color RGBA, non-interlaced
|
dropped
|
||
Chrome Cache Entry: 93
|
PNG image data, 533 x 478, 8-bit/color RGBA, non-interlaced
|
downloaded
|
||
Chrome Cache Entry: 94
|
SVG Scalable Vector Graphics image
|
dropped
|
||
Chrome Cache Entry: 95
|
JSON data
|
dropped
|
||
Chrome Cache Entry: 96
|
PNG image data, 533 x 478, 8-bit/color RGBA, non-interlaced
|
dropped
|
||
Chrome Cache Entry: 97
|
ASCII text, with very long lines (65536), with no line terminators
|
downloaded
|
||
Chrome Cache Entry: 98
|
ASCII text, with no line terminators
|
downloaded
|
||
Chrome Cache Entry: 99
|
ASCII text, with very long lines (65410)
|
dropped
|
There are 39 hidden files, click here to show them.
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\file.exe
|
"C:\Users\user\Desktop\file.exe"
|
||
C:\Program Files\Google\Chrome\Application\chrome.exe
|
"C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized --single-argument http://go.microsoft.com/fwlink/?prd=11324&pver=4.5&sbp=AppLaunch2&plcid=0x409&o1=SHIM_NOVERSION_FOUND&version=(null)&processName=file.exe&platform=0009&osver=6&isServer=0&shimver=4.0.30319.0
|
||
C:\Program Files\Google\Chrome\Application\chrome.exe
|
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US
--service-sandbox-type=none --mojo-platform-channel-handle=2224 --field-trial-handle=1828,i,11464838882767469421,13980832017172917232,262144
--disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction
/prefetch:8
|
||
C:\Program Files\Google\Chrome\Application\chrome.exe
|
"C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized --single-argument http://go.microsoft.com/fwlink/?prd=11324&pver=4.5&sbp=AppLaunch2&plcid=0x409&o1=SHIM_NOVERSION_FOUND&version=(null)&processName=file.exe&platform=0009&osver=6&isServer=0&shimver=4.0.30319.0
|
||
C:\Program Files\Google\Chrome\Application\chrome.exe
|
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US
--service-sandbox-type=none --mojo-platform-channel-handle=2056 --field-trial-handle=1988,i,12511401562534462833,16217488018526680522,262144
--disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction
/prefetch:8
|
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
https://authoring-docs-microsoft.poolparty.biz/devrel/7696cda6-0510-47f6-8302-71bb5d2e28cf
|
unknown
|
||
https://duckduckgo.com/chrome_newtab
|
unknown
|
||
https://duckduckgo.com/ac/?q=
|
unknown
|
||
https://github.com/dotnet/docs/blob/17c4acca45e573a92878a44a2cce57d699fe9c7c/docs/framework/install/
|
unknown
|
||
https://atten-supporse.biz/apibdoD
|
unknown
|
||
https://www.linkedin.com/cws/share?url=$
|
unknown
|
||
https://atten-supporse.biz/RSz
|
unknown
|
||
https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
|
unknown
|
||
https://imp.mt48.net/static?id=7RHzfOIXjFEYsBdvIpkX4Qqm4pqX1CqX4pbW1pbWfpbZ7ReNxR3UIG8zInwYIFIVs9eYi
|
unknown
|
||
https://github.com/Youssef1313
|
unknown
|
||
https://management.azure.com/providers/Microsoft.Portal/userSettings/cloudconsole?api-version=2023-0
|
unknown
|
||
https://aka.ms/msignite_docs_banner
|
unknown
|
||
https://videoencodingpublic-hgeaeyeba8gycee3.b01.azurefd.net/public-b4da8140-92cf-421c-8b7b-e471d5b9
|
unknown
|
||
http://polymer.github.io/AUTHORS.txt
|
unknown
|
||
https://github.com/dotnet/docs/issues/new?template=z-customer-feedback.yml
|
unknown
|
||
https://management.azure.com/subscriptions?api-version=2016-06-01
|
unknown
|
||
https://github.com/dotnet/docs/blob/main/docs/framework/install/application-not-started.md
|
unknown
|
||
http://x1.c.lencr.org/0
|
unknown
|
||
http://x1.i.lencr.org/0
|
unknown
|
||
https://aka.ms/pshelpmechoose
|
unknown
|
||
https://aka.ms/feedback/report?space=61
|
unknown
|
||
https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
|
unknown
|
||
https://learn-video.azurefd.net/vod/player
|
unknown
|
||
https://twitter.com/intent/tweet?original_referer=$
|
unknown
|
||
https://github.com/gewarren
|
unknown
|
||
https://support.mozilla.org/products/firefoxgro.all
|
unknown
|
||
http://polymer.github.io/CONTRIBUTORS.txt
|
unknown
|
||
https://github.com/dotnet/docs/blob/live/docs/framework/install/application-not-started.md
|
unknown
|
||
https://authoring-docs-microsoft.poolparty.biz/devrel/69c76c32-967e-4c65-b89a-74cc527db725
|
unknown
|
||
https://client-api.arkoselabs.com/v2/api.js
|
unknown
|
||
https://aka.ms/MSIgniteChallenge/Tier1Banner?wt.mc_id=ignite24_learnbanner_tier1_cnl
|
unknown
|
||
https://management.azure.com/providers/Microsoft.Portal/consoles/default?api-version=2017-12-01-prev
|
unknown
|
||
https://www.google.com/images/branding/product/ico/googleg_lodp.ico
|
unknown
|
||
https://github.com/Thraka
|
unknown
|
||
http://polymer.github.io/PATENTS.txt
|
unknown
|
||
https://aka.ms/certhelp
|
unknown
|
||
http://185.215.113.16/steam/random.exe
|
unknown
|
||
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
|
unknown
|
||
http://crl.rootca1.amazontrust.com/rootca1.crl0
|
unknown
|
||
https://atten-supporse.biz/JSB
|
unknown
|
||
https://atten-supporse.biz/api
|
104.21.16.9
|
||
https://github.com/mairaw
|
unknown
|
||
https://js.monitor.azure.com/scripts/c/ms.jsll-4.min.js
|
13.107.246.63
|
||
http://ocsp.rootca1.amazontrust.com0:
|
unknown
|
||
https://schema.org
|
unknown
|
||
http://polymer.github.io/LICENSE.txt
|
unknown
|
||
https://bridge.sfo1.admarketplace.net/ctp?version=16.0.0&key=1696491991400800003.2&ci=1696491991993.
|
unknown
|
||
https://www.ecosia.org/newtab/
|
unknown
|
||
https://support.mozilla.org/kb/customize-firefox-controls-buttons-and-toolbars?utm_source=firefox-br
|
unknown
|
||
https://www.amazon.com/?tag=admarketus-20&ref=pd_sl_15d7e4b694824b33323940336fbf0bead57d89764383fe44
|
unknown
|
||
https://aka.ms/yourcaliforniaprivacychoices
|
unknown
|
||
https://ac.ecosia.org/autocomplete?q=
|
unknown
|
||
https://github.com/nschonni
|
unknown
|
||
https://videoencodingpublic-hgeaeyeba8gycee3.b01.azurefd.net/public-09ce73a6-05a5-4e4d-b3d7-bd5a8c05
|
unknown
|
||
https://github.com/adegeo
|
unknown
|
||
http://crl.micro
|
unknown
|
||
https://contile-images.services.mozilla.com/obgoOYObjIFea_bXuT6L4LbBJ8j425AD87S1HMD3BWg.9991.jpg
|
unknown
|
||
https://github.com/jonschlinkert/is-plain-object
|
unknown
|
||
http://crt.rootca1.amazontrust.com/rootca1.cer0?
|
unknown
|
||
https://octokit.github.io/rest.js/#throttling
|
unknown
|
||
https://www.invisalign.com/?utm_source=admarketplace&utm_medium=paidsearch&utm_campaign=Invisalign&u
|
unknown
|
||
https://bridge.sfo1.ap01.net/ctp?version=16.0.0&key=1696491991400800003.1&ci=1696491991993.12791&cta
|
unknown
|
||
https://contile-images.services.mozilla.com/CuERQnIs4CzqjKBh9os6_h9d4CUDCHO3oiqmAQO6VLM.25122.jpg
|
unknown
|
||
https://github.com/js-cookie/js-cookie
|
unknown
|
||
http://185.215.113.16/off/def.exe
|
unknown
|
||
http://schema.org/Organization
|
unknown
|
||
https://atten-supporse.biz/
|
unknown
|
||
https://channel9.msdn.com/
|
unknown
|
||
https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
|
unknown
|
||
https://github.com/dotnet/try
|
unknown
|
There are 60 hidden URLs, click here to show them.
Domains
Name
|
IP
|
Malicious
|
|
---|---|---|---|
atten-supporse.biz
|
104.21.16.9
|
||
www.google.com
|
172.217.21.36
|
||
s-part-0035.t-0009.t-msedge.net
|
13.107.246.63
|
||
js.monitor.azure.com
|
unknown
|
||
mdec.nelreports.net
|
unknown
|
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
192.168.2.8
|
unknown
|
unknown
|
||
13.107.246.63
|
s-part-0035.t-0009.t-msedge.net
|
United States
|
||
185.215.113.16
|
unknown
|
Portugal
|
||
239.255.255.250
|
unknown
|
Reserved
|
||
104.21.16.9
|
atten-supporse.biz
|
United States
|
||
172.217.21.36
|
www.google.com
|
United States
|
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
5A79000
|
stack
|
page read and write
|
||
10E0000
|
direct allocation
|
page read and write
|
||
5949000
|
trusted library allocation
|
page read and write
|
||
44DF000
|
stack
|
page read and write
|
||
5977000
|
trusted library allocation
|
page read and write
|
||
56F0000
|
heap
|
page read and write
|
||
568E000
|
stack
|
page read and write
|
||
5DE0000
|
trusted library allocation
|
page read and write
|
||
599C000
|
trusted library allocation
|
page read and write
|
||
4FF0000
|
direct allocation
|
page execute and read and write
|
||
722E000
|
stack
|
page read and write
|
||
5968000
|
trusted library allocation
|
page read and write
|
||
5963000
|
trusted library allocation
|
page read and write
|
||
5959000
|
trusted library allocation
|
page read and write
|
||
59DE000
|
trusted library allocation
|
page read and write
|
||
5DE7000
|
trusted library allocation
|
page read and write
|
||
606E000
|
trusted library allocation
|
page read and write
|
||
5DE8000
|
trusted library allocation
|
page read and write
|
||
594A000
|
trusted library allocation
|
page read and write
|
||
598C000
|
trusted library allocation
|
page read and write
|
||
594F000
|
trusted library allocation
|
page read and write
|
||
1054000
|
heap
|
page read and write
|
||
80EF000
|
stack
|
page read and write
|
||
59DE000
|
trusted library allocation
|
page read and write
|
||
11ED000
|
heap
|
page read and write
|
||
5967000
|
trusted library allocation
|
page read and write
|
||
596F000
|
trusted library allocation
|
page read and write
|
||
4FB0000
|
direct allocation
|
page execute and read and write
|
||
5EC9000
|
trusted library allocation
|
page read and write
|
||
5967000
|
trusted library allocation
|
page read and write
|
||
59DD000
|
trusted library allocation
|
page read and write
|
||
82B0000
|
direct allocation
|
page read and write
|
||
5DEB000
|
trusted library allocation
|
page read and write
|
||
5DE3000
|
trusted library allocation
|
page read and write
|
||
5DF0000
|
trusted library allocation
|
page read and write
|
||
5F04000
|
trusted library allocation
|
page read and write
|
||
6CE000
|
unkown
|
page write copy
|
||
59A3000
|
trusted library allocation
|
page read and write
|
||
8250000
|
direct allocation
|
page read and write
|
||
5DE1000
|
trusted library allocation
|
page read and write
|
||
5968000
|
trusted library allocation
|
page read and write
|
||
5E92000
|
trusted library allocation
|
page read and write
|
||
5DEC000
|
trusted library allocation
|
page read and write
|
||
3FDF000
|
stack
|
page read and write
|
||
82B0000
|
direct allocation
|
page read and write
|
||
49E1000
|
heap
|
page read and write
|
||
5959000
|
trusted library allocation
|
page read and write
|
||
1054000
|
heap
|
page read and write
|
||
6BEE000
|
stack
|
page read and write
|
||
8280000
|
trusted library allocation
|
page read and write
|
||
5DE5000
|
trusted library allocation
|
page read and write
|
||
49E1000
|
heap
|
page read and write
|
||
597E000
|
trusted library allocation
|
page read and write
|
||
57FF000
|
stack
|
page read and write
|
||
10E0000
|
direct allocation
|
page read and write
|
||
894C000
|
stack
|
page read and write
|
||
596B000
|
trusted library allocation
|
page read and write
|
||
335F000
|
stack
|
page read and write
|
||
5967000
|
trusted library allocation
|
page read and write
|
||
5EA7000
|
trusted library allocation
|
page read and write
|
||
976000
|
unkown
|
page execute and write copy
|
||
5DE1000
|
trusted library allocation
|
page read and write
|
||
59ED000
|
trusted library allocation
|
page read and write
|
||
451E000
|
stack
|
page read and write
|
||
2C90000
|
heap
|
page read and write
|
||
76EF000
|
stack
|
page read and write
|
||
842F000
|
stack
|
page read and write
|
||
59AE000
|
trusted library allocation
|
page read and write
|
||
11E7000
|
heap
|
page read and write
|
||
5987000
|
trusted library allocation
|
page read and write
|
||
1200000
|
heap
|
page read and write
|
||
5DED000
|
trusted library allocation
|
page read and write
|
||
10E0000
|
direct allocation
|
page read and write
|
||
5955000
|
trusted library allocation
|
page read and write
|
||
5979000
|
trusted library allocation
|
page read and write
|
||
5DE3000
|
trusted library allocation
|
page read and write
|
||
5E99000
|
trusted library allocation
|
page read and write
|
||
5968000
|
trusted library allocation
|
page read and write
|
||
5DEA000
|
trusted library allocation
|
page read and write
|
||
5AD0000
|
trusted library allocation
|
page read and write
|
||
598C000
|
trusted library allocation
|
page read and write
|
||
5ED2000
|
trusted library allocation
|
page read and write
|
||
5DE4000
|
trusted library allocation
|
page read and write
|
||
5DEA000
|
trusted library allocation
|
page read and write
|
||
59D5000
|
trusted library allocation
|
page read and write
|
||
5AA4000
|
trusted library allocation
|
page read and write
|
||
371F000
|
stack
|
page read and write
|
||
5964000
|
trusted library allocation
|
page read and write
|
||
7FEE000
|
stack
|
page read and write
|
||
772E000
|
stack
|
page read and write
|
||
5B73000
|
trusted library allocation
|
page read and write
|
||
7D6E000
|
stack
|
page read and write
|
||
5ED4000
|
trusted library allocation
|
page read and write
|
||
1209000
|
heap
|
page read and write
|
||
5E9C000
|
trusted library allocation
|
page read and write
|
||
5958000
|
trusted library allocation
|
page read and write
|
||
70EE000
|
stack
|
page read and write
|
||
11F0000
|
heap
|
page read and write
|
||
5DE4000
|
trusted library allocation
|
page read and write
|
||
594A000
|
trusted library allocation
|
page read and write
|
||
5EA2000
|
trusted library allocation
|
page read and write
|
||
599B000
|
trusted library allocation
|
page read and write
|
||
109E000
|
stack
|
page read and write
|
||
5DE9000
|
trusted library allocation
|
page read and write
|
||
595F000
|
trusted library allocation
|
page read and write
|
||
5967000
|
trusted library allocation
|
page read and write
|
||
4FE0000
|
direct allocation
|
page execute and read and write
|
||
5DE5000
|
trusted library allocation
|
page read and write
|
||
5F01000
|
trusted library allocation
|
page read and write
|
||
594F000
|
trusted library allocation
|
page read and write
|
||
49E1000
|
heap
|
page read and write
|
||
49E1000
|
heap
|
page read and write
|
||
9D60000
|
trusted library allocation
|
page read and write
|
||
10E0000
|
direct allocation
|
page read and write
|
||
5E96000
|
trusted library allocation
|
page read and write
|
||
796F000
|
stack
|
page read and write
|
||
401E000
|
stack
|
page read and write
|
||
5979000
|
trusted library allocation
|
page read and write
|
||
5957000
|
trusted library allocation
|
page read and write
|
||
6358000
|
trusted library allocation
|
page read and write
|
||
5E90000
|
trusted library allocation
|
page read and write
|
||
5DE3000
|
trusted library allocation
|
page read and write
|
||
1202000
|
heap
|
page read and write
|
||
5964000
|
trusted library allocation
|
page read and write
|
||
5DE2000
|
trusted library allocation
|
page read and write
|
||
5979000
|
trusted library allocation
|
page read and write
|
||
597C000
|
trusted library allocation
|
page read and write
|
||
F10000
|
heap
|
page read and write
|
||
1054000
|
heap
|
page read and write
|
||
30DF000
|
stack
|
page read and write
|
||
49E1000
|
heap
|
page read and write
|
||
5979000
|
trusted library allocation
|
page read and write
|
||
5979000
|
trusted library allocation
|
page read and write
|
||
6BAF000
|
stack
|
page read and write
|
||
10E0000
|
direct allocation
|
page read and write
|
||
5DE6000
|
trusted library allocation
|
page read and write
|
||
5981000
|
trusted library allocation
|
page read and write
|
||
5A4B000
|
trusted library allocation
|
page read and write
|
||
79AE000
|
stack
|
page read and write
|
||
5BE2000
|
trusted library allocation
|
page read and write
|
||
5963000
|
trusted library allocation
|
page read and write
|
||
5ECB000
|
trusted library allocation
|
page read and write
|
||
59AD000
|
trusted library allocation
|
page read and write
|
||
11E0000
|
heap
|
page read and write
|
||
5DE4000
|
trusted library allocation
|
page read and write
|
||
5DE0000
|
trusted library allocation
|
page read and write
|
||
11FD000
|
heap
|
page read and write
|
||
696E000
|
stack
|
page read and write
|
||
5F9D000
|
trusted library allocation
|
page read and write
|
||
5997000
|
trusted library allocation
|
page read and write
|
||
5DE3000
|
trusted library allocation
|
page read and write
|
||
7AEE000
|
stack
|
page read and write
|
||
49F2000
|
heap
|
page read and write
|
||
59B8000
|
trusted library allocation
|
page read and write
|
||
5992000
|
trusted library allocation
|
page read and write
|
||
74AE000
|
stack
|
page read and write
|
||
5FAF000
|
trusted library allocation
|
page read and write
|
||
120B000
|
heap
|
page read and write
|
||
52BE000
|
stack
|
page read and write
|
||
5DE5000
|
trusted library allocation
|
page read and write
|
||
5945000
|
trusted library allocation
|
page read and write
|
||
7EAE000
|
stack
|
page read and write
|
||
5DEE000
|
trusted library allocation
|
page read and write
|
||
4FC0000
|
direct allocation
|
page execute and read and write
|
||
5979000
|
trusted library allocation
|
page read and write
|
||
5A43000
|
trusted library allocation
|
page read and write
|
||
5DEA000
|
trusted library allocation
|
page read and write
|
||
660E000
|
trusted library allocation
|
page execute and read and write
|
||
5954000
|
trusted library allocation
|
page read and write
|
||
5F9B000
|
trusted library allocation
|
page read and write
|
||
5EE4000
|
trusted library allocation
|
page read and write
|
||
5DEA000
|
trusted library allocation
|
page read and write
|
||
6453000
|
trusted library allocation
|
page read and write
|
||
3ADF000
|
stack
|
page read and write
|
||
6D0000
|
unkown
|
page execute and read and write
|
||
321F000
|
stack
|
page read and write
|
||
594A000
|
trusted library allocation
|
page read and write
|
||
59DE000
|
trusted library allocation
|
page read and write
|
||
425F000
|
stack
|
page read and write
|
||
11C0000
|
heap
|
page read and write
|
||
5967000
|
trusted library allocation
|
page read and write
|
||
5AF4000
|
trusted library allocation
|
page read and write
|
||
6F6F000
|
stack
|
page read and write
|
||
7D2F000
|
stack
|
page read and write
|
||
5974000
|
trusted library allocation
|
page read and write
|
||
11F0000
|
heap
|
page read and write
|
||
5969000
|
trusted library allocation
|
page read and write
|
||
5958000
|
trusted library allocation
|
page read and write
|
||
594F000
|
trusted library allocation
|
page read and write
|
||
8602000
|
trusted library allocation
|
page read and write
|
||
5E9E000
|
trusted library allocation
|
page read and write
|
||
5E88000
|
trusted library allocation
|
page read and write
|
||
375E000
|
stack
|
page read and write
|
||
5997000
|
trusted library allocation
|
page read and write
|
||
595F000
|
trusted library allocation
|
page read and write
|
||
11EF000
|
heap
|
page read and write
|
||
1200000
|
heap
|
page read and write
|
||
5970000
|
trusted library allocation
|
page read and write
|
||
5990000
|
trusted library allocation
|
page read and write
|
||
5995000
|
trusted library allocation
|
page read and write
|
||
5EFA000
|
trusted library allocation
|
page read and write
|
||
415E000
|
stack
|
page read and write
|
||
5E7F000
|
trusted library allocation
|
page read and write
|
||
95B000
|
unkown
|
page execute and read and write
|
||
596C000
|
trusted library allocation
|
page read and write
|
||
680000
|
unkown
|
page readonly
|
||
10E0000
|
direct allocation
|
page read and write
|
||
5DE0000
|
trusted library allocation
|
page read and write
|
||
115E000
|
heap
|
page read and write
|
||
596A000
|
trusted library allocation
|
page read and write
|
||
5FDF000
|
stack
|
page read and write
|
||
5DE5000
|
trusted library allocation
|
page read and write
|
||
461F000
|
stack
|
page read and write
|
||
5967000
|
trusted library allocation
|
page read and write
|
||
5963000
|
trusted library allocation
|
page read and write
|
||
884C000
|
stack
|
page read and write
|
||
11F0000
|
heap
|
page read and write
|
||
411E000
|
stack
|
page read and write
|
||
6E6E000
|
stack
|
page read and write
|
||
1054000
|
heap
|
page read and write
|
||
583D000
|
stack
|
page read and write
|
||
594F000
|
trusted library allocation
|
page read and write
|
||
5EF8000
|
trusted library allocation
|
page read and write
|
||
732F000
|
stack
|
page read and write
|
||
5EEC000
|
trusted library allocation
|
page read and write
|
||
5E86000
|
trusted library allocation
|
page read and write
|
||
10E0000
|
direct allocation
|
page read and write
|
||
5968000
|
trusted library allocation
|
page read and write
|
||
746F000
|
stack
|
page read and write
|
||
594F000
|
trusted library allocation
|
page read and write
|
||
8250000
|
direct allocation
|
page read and write
|
||
120A000
|
heap
|
page read and write
|
||
5EFF000
|
trusted library allocation
|
page read and write
|
||
935000
|
unkown
|
page execute and read and write
|
||
5F0D000
|
trusted library allocation
|
page read and write
|
||
1054000
|
heap
|
page read and write
|
||
3C5E000
|
stack
|
page read and write
|
||
11E9000
|
heap
|
page read and write
|
||
8250000
|
direct allocation
|
page read and write
|
||
5966000
|
trusted library allocation
|
page read and write
|
||
5967000
|
trusted library allocation
|
page read and write
|
||
5979000
|
trusted library allocation
|
page read and write
|
||
11C1000
|
heap
|
page read and write
|
||
3D9E000
|
stack
|
page read and write
|
||
596A000
|
trusted library allocation
|
page read and write
|
||
475F000
|
stack
|
page read and write
|
||
5EB0000
|
trusted library allocation
|
page read and write
|
||
5E97000
|
trusted library allocation
|
page read and write
|
||
5DE6000
|
trusted library allocation
|
page read and write
|
||
5951000
|
trusted library allocation
|
page read and write
|
||
53BE000
|
stack
|
page read and write
|
||
5A4A000
|
trusted library allocation
|
page read and write
|
||
5EF7000
|
trusted library allocation
|
page read and write
|
||
598B000
|
trusted library allocation
|
page read and write
|
||
5F06000
|
trusted library allocation
|
page read and write
|
||
8250000
|
direct allocation
|
page read and write
|
||
59A1000
|
trusted library allocation
|
page read and write
|
||
429E000
|
stack
|
page read and write
|
||
594A000
|
trusted library allocation
|
page read and write
|
||
5DE3000
|
trusted library allocation
|
page read and write
|
||
5EA0000
|
trusted library allocation
|
page read and write
|
||
5958000
|
trusted library allocation
|
page read and write
|
||
11FD000
|
heap
|
page read and write
|
||
5941000
|
trusted library allocation
|
page read and write
|
||
8230000
|
direct allocation
|
page read and write
|
||
822F000
|
stack
|
page read and write
|
||
3D5F000
|
stack
|
page read and write
|
||
602C000
|
trusted library allocation
|
page read and write
|
||
1204000
|
heap
|
page read and write
|
||
49E1000
|
heap
|
page read and write
|
||
120A000
|
heap
|
page read and write
|
||
6BD000
|
unkown
|
page execute and read and write
|
||
39DE000
|
stack
|
page read and write
|
||
5979000
|
trusted library allocation
|
page read and write
|
||
5974000
|
trusted library allocation
|
page read and write
|
||
736E000
|
stack
|
page read and write
|
||
5E94000
|
trusted library allocation
|
page read and write
|
||
1205000
|
heap
|
page read and write
|
||
5958000
|
trusted library allocation
|
page read and write
|
||
5959000
|
trusted library allocation
|
page read and write
|
||
5EA5000
|
trusted library allocation
|
page read and write
|
||
6366000
|
trusted library allocation
|
page read and write
|
||
5A84000
|
trusted library allocation
|
page read and write
|
||
5958000
|
trusted library allocation
|
page read and write
|
||
5ABE000
|
stack
|
page read and write
|
||
5971000
|
trusted library allocation
|
page read and write
|
||
8250000
|
direct allocation
|
page read and write
|
||
5957000
|
trusted library allocation
|
page read and write
|
||
120D000
|
heap
|
page read and write
|
||
4FC0000
|
direct allocation
|
page execute and read and write
|
||
325E000
|
stack
|
page read and write
|
||
5941000
|
trusted library allocation
|
page read and write
|
||
11FF000
|
heap
|
page read and write
|
||
5AEA000
|
trusted library allocation
|
page read and write
|
||
8250000
|
direct allocation
|
page read and write
|
||
7E6F000
|
stack
|
page read and write
|
||
5EEA000
|
trusted library allocation
|
page read and write
|
||
2BEE000
|
stack
|
page read and write
|
||
5979000
|
trusted library allocation
|
page read and write
|
||
59ED000
|
trusted library allocation
|
page read and write
|
||
5A47000
|
trusted library allocation
|
page read and write
|
||
5949000
|
trusted library allocation
|
page read and write
|
||
5DEA000
|
trusted library allocation
|
page read and write
|
||
5DE8000
|
trusted library allocation
|
page read and write
|
||
5979000
|
trusted library allocation
|
page read and write
|
||
5DEE000
|
trusted library allocation
|
page read and write
|
||
5E92000
|
trusted library allocation
|
page read and write
|
||
349F000
|
stack
|
page read and write
|
||
5F24000
|
trusted library allocation
|
page read and write
|
||
5DEB000
|
trusted library allocation
|
page read and write
|
||
5F48000
|
trusted library allocation
|
page read and write
|
||
5958000
|
trusted library allocation
|
page read and write
|
||
6049000
|
trusted library allocation
|
page read and write
|
||
4FD0000
|
direct allocation
|
page execute and read and write
|
||
5F24000
|
trusted library allocation
|
page read and write
|
||
5958000
|
trusted library allocation
|
page read and write
|
||
59BE000
|
trusted library allocation
|
page read and write
|
||
5990000
|
trusted library allocation
|
page read and write
|
||
5968000
|
trusted library allocation
|
page read and write
|
||
5979000
|
trusted library allocation
|
page read and write
|
||
5F5A000
|
trusted library allocation
|
page read and write
|
||
5DE2000
|
trusted library allocation
|
page read and write
|
||
5963000
|
trusted library allocation
|
page read and write
|
||
601B000
|
stack
|
page read and write
|
||
5DE6000
|
trusted library allocation
|
page read and write
|
||
2F9F000
|
stack
|
page read and write
|
||
1054000
|
heap
|
page read and write
|
||
120D000
|
heap
|
page read and write
|
||
5948000
|
trusted library allocation
|
page read and write
|
||
5DEC000
|
trusted library allocation
|
page read and write
|
||
5957000
|
trusted library allocation
|
page read and write
|
||
5DE0000
|
trusted library allocation
|
page read and write
|
||
59DE000
|
trusted library allocation
|
page read and write
|
||
11F4000
|
heap
|
page read and write
|
||
11ED000
|
heap
|
page read and write
|
||
5968000
|
trusted library allocation
|
page read and write
|
||
4FC0000
|
direct allocation
|
page execute and read and write
|
||
3B1E000
|
stack
|
page read and write
|
||
5F1D000
|
trusted library allocation
|
page read and write
|
||
49E1000
|
heap
|
page read and write
|
||
1100000
|
direct allocation
|
page read and write
|
||
594F000
|
trusted library allocation
|
page read and write
|
||
5941000
|
trusted library allocation
|
page read and write
|
||
5F7B000
|
trusted library allocation
|
page read and write
|
||
5F25000
|
trusted library allocation
|
page read and write
|
||
120D000
|
heap
|
page read and write
|
||
5F5C000
|
trusted library allocation
|
page read and write
|
||
5957000
|
trusted library allocation
|
page read and write
|
||
5975000
|
trusted library allocation
|
page read and write
|
||
117E000
|
heap
|
page read and write
|
||
6FAE000
|
stack
|
page read and write
|
||
6AAE000
|
stack
|
page read and write
|
||
339E000
|
stack
|
page read and write
|
||
5960000
|
trusted library allocation
|
page read and write
|
||
49E1000
|
heap
|
page read and write
|
||
5941000
|
trusted library allocation
|
page read and write
|
||
5961000
|
trusted library allocation
|
page read and write
|
||
4E9B000
|
stack
|
page read and write
|
||
596B000
|
trusted library allocation
|
page read and write
|
||
5EAE000
|
trusted library allocation
|
page read and write
|
||
2D9F000
|
stack
|
page read and write
|
||
1054000
|
heap
|
page read and write
|
||
5ED3000
|
trusted library allocation
|
page read and write
|
||
5948000
|
trusted library allocation
|
page read and write
|
||
1207000
|
heap
|
page read and write
|
||
595B000
|
trusted library allocation
|
page read and write
|
||
5979000
|
trusted library allocation
|
page read and write
|
||
5967000
|
trusted library allocation
|
page read and write
|
||
1178000
|
heap
|
page read and write
|
||
5954000
|
trusted library allocation
|
page read and write
|
||
4FC0000
|
direct allocation
|
page execute and read and write
|
||
6A6F000
|
stack
|
page read and write
|
||
11EF000
|
heap
|
page read and write
|
||
10E0000
|
direct allocation
|
page read and write
|
||
832B000
|
stack
|
page read and write
|
||
596B000
|
trusted library allocation
|
page read and write
|
||
1050000
|
heap
|
page read and write
|
||
857000
|
unkown
|
page execute and read and write
|
||
49E1000
|
heap
|
page read and write
|
||
596C000
|
trusted library allocation
|
page read and write
|
||
812E000
|
stack
|
page read and write
|
||
11F4000
|
heap
|
page read and write
|
||
120A000
|
heap
|
page read and write
|
||
672F000
|
stack
|
page read and write
|
||
5999000
|
trusted library allocation
|
page read and write
|
||
11FD000
|
heap
|
page read and write
|
||
5DE8000
|
trusted library allocation
|
page read and write
|
||
604B000
|
trusted library allocation
|
page read and write
|
||
609E000
|
stack
|
page read and write
|
||
634B000
|
trusted library allocation
|
page read and write
|
||
111A000
|
heap
|
page read and write
|
||
5EE2000
|
trusted library allocation
|
page read and write
|
||
1100000
|
direct allocation
|
page read and write
|
||
5B2C000
|
trusted library allocation
|
page read and write
|
||
5967000
|
trusted library allocation
|
page read and write
|
||
4E20000
|
heap
|
page read and write
|
||
5982000
|
trusted library allocation
|
page read and write
|
||
3E9F000
|
stack
|
page read and write
|
||
5998000
|
trusted library allocation
|
page read and write
|
||
5957000
|
trusted library allocation
|
page read and write
|
||
5DE6000
|
trusted library allocation
|
page read and write
|
||
5959000
|
trusted library allocation
|
page read and write
|
||
11FD000
|
heap
|
page read and write
|
||
11EF000
|
heap
|
page read and write
|
||
49E1000
|
heap
|
page read and write
|
||
5EAC000
|
trusted library allocation
|
page read and write
|
||
5A6C000
|
trusted library allocation
|
page read and write
|
||
10E0000
|
direct allocation
|
page read and write
|
||
59DF000
|
trusted library allocation
|
page read and write
|
||
5980000
|
trusted library allocation
|
page read and write
|
||
5FF7000
|
trusted library allocation
|
page read and write
|
||
120B000
|
heap
|
page read and write
|
||
681000
|
unkown
|
page execute and write copy
|
||
6D2E000
|
stack
|
page read and write
|
||
786E000
|
stack
|
page read and write
|
||
1054000
|
heap
|
page read and write
|
||
11F7000
|
heap
|
page read and write
|
||
11F0000
|
heap
|
page read and write
|
||
4FC0000
|
direct allocation
|
page execute and read and write
|
||
1054000
|
heap
|
page read and write
|
||
682F000
|
stack
|
page read and write
|
||
120E000
|
heap
|
page read and write
|
||
49E1000
|
heap
|
page read and write
|
||
70AF000
|
stack
|
page read and write
|
||
5DE2000
|
trusted library allocation
|
page read and write
|
||
1148000
|
heap
|
page read and write
|
||
5979000
|
trusted library allocation
|
page read and write
|
||
5990000
|
trusted library allocation
|
page read and write
|
||
4E60000
|
direct allocation
|
page read and write
|
||
594C000
|
trusted library allocation
|
page read and write
|
||
4E9C000
|
direct allocation
|
page read and write
|
||
60A3000
|
trusted library allocation
|
page read and write
|
||
120A000
|
heap
|
page read and write
|
||
595A000
|
trusted library allocation
|
page read and write
|
||
5DE6000
|
trusted library allocation
|
page read and write
|
||
5FF9000
|
trusted library allocation
|
page read and write
|
||
5958000
|
trusted library allocation
|
page read and write
|
||
7AAF000
|
stack
|
page read and write
|
||
5A48000
|
trusted library allocation
|
page read and write
|
||
553E000
|
stack
|
page read and write
|
||
439F000
|
stack
|
page read and write
|
||
5949000
|
trusted library allocation
|
page read and write
|
||
59BD000
|
trusted library allocation
|
page read and write
|
||
56F3000
|
heap
|
page read and write
|
||
5962000
|
trusted library allocation
|
page read and write
|
||
5945000
|
trusted library allocation
|
page read and write
|
||
1054000
|
heap
|
page read and write
|
||
5DEC000
|
trusted library allocation
|
page read and write
|
||
1040000
|
heap
|
page read and write
|
||
59DE000
|
trusted library allocation
|
page read and write
|
||
5976000
|
trusted library allocation
|
page read and write
|
||
1200000
|
heap
|
page read and write
|
||
5957000
|
trusted library allocation
|
page read and write
|
||
5EB9000
|
trusted library allocation
|
page read and write
|
||
3C1F000
|
stack
|
page read and write
|
||
5F1B000
|
trusted library allocation
|
page read and write
|
||
489F000
|
stack
|
page read and write
|
||
513E000
|
stack
|
page read and write
|
||
5EEC000
|
trusted library allocation
|
page read and write
|
||
59FC000
|
trusted library allocation
|
page read and write
|
||
5DE4000
|
trusted library allocation
|
page read and write
|
||
5979000
|
trusted library allocation
|
page read and write
|
||
967000
|
unkown
|
page execute and read and write
|
||
5945000
|
trusted library allocation
|
page read and write
|
||
5DEA000
|
trusted library allocation
|
page read and write
|
||
11F0000
|
heap
|
page read and write
|
||
5E90000
|
trusted library allocation
|
page read and write
|
||
1209000
|
heap
|
page read and write
|
||
5A53000
|
trusted library allocation
|
page read and write
|
||
5941000
|
trusted library allocation
|
page read and write
|
||
10E0000
|
direct allocation
|
page read and write
|
||
5DE8000
|
trusted library allocation
|
page read and write
|
||
5955000
|
trusted library allocation
|
page read and write
|
||
5958000
|
trusted library allocation
|
page read and write
|
||
5EAE000
|
trusted library allocation
|
page read and write
|
||
8250000
|
trusted library allocation
|
page read and write
|
||
1170000
|
heap
|
page read and write
|
||
5E8E000
|
trusted library allocation
|
page read and write
|
||
599E000
|
trusted library allocation
|
page read and write
|
||
8250000
|
direct allocation
|
page read and write
|
||
5F27000
|
trusted library allocation
|
page read and write
|
||
120E000
|
heap
|
page read and write
|
||
593E000
|
stack
|
page read and write
|
||
49E1000
|
heap
|
page read and write
|
||
5DE5000
|
trusted library allocation
|
page read and write
|
||
8250000
|
direct allocation
|
page read and write
|
||
5997000
|
trusted library allocation
|
page read and write
|
||
5DE7000
|
trusted library allocation
|
page read and write
|
||
59FA000
|
trusted library allocation
|
page read and write
|
||
7FAF000
|
stack
|
page read and write
|
||
5DEC000
|
trusted library allocation
|
page read and write
|
||
8500000
|
heap
|
page read and write
|
||
6236000
|
trusted library allocation
|
page read and write
|
||
5EF5000
|
trusted library allocation
|
page read and write
|
||
7C2E000
|
stack
|
page read and write
|
||
117E000
|
heap
|
page read and write
|
||
5F73000
|
trusted library allocation
|
page read and write
|
||
5DE7000
|
trusted library allocation
|
page read and write
|
||
8440000
|
direct allocation
|
page execute and read and write
|
||
599B000
|
trusted library allocation
|
page read and write
|
||
6CEF000
|
stack
|
page read and write
|
||
503D000
|
stack
|
page read and write
|
||
5F10000
|
trusted library allocation
|
page read and write
|
||
1202000
|
heap
|
page read and write
|
||
600C000
|
trusted library allocation
|
page read and write
|
||
636A000
|
trusted library allocation
|
page execute and read and write
|
||
5BBC000
|
trusted library allocation
|
page read and write
|
||
120D000
|
heap
|
page read and write
|
||
5F3C000
|
trusted library allocation
|
page read and write
|
||
2C80000
|
direct allocation
|
page execute and read and write
|
||
5968000
|
trusted library allocation
|
page read and write
|
||
5968000
|
trusted library allocation
|
page read and write
|
||
120E000
|
heap
|
page read and write
|
||
5F3A000
|
trusted library allocation
|
page read and write
|
||
5970000
|
trusted library allocation
|
page read and write
|
||
5EE0000
|
trusted library allocation
|
page read and write
|
||
5DE2000
|
trusted library allocation
|
page read and write
|
||
8608000
|
trusted library allocation
|
page read and write
|
||
5DEC000
|
trusted library allocation
|
page read and write
|
||
4FA0000
|
direct allocation
|
page execute and read and write
|
||
5EB4000
|
trusted library allocation
|
page read and write
|
||
5A4D000
|
trusted library allocation
|
page read and write
|
||
5BE0000
|
trusted library allocation
|
page read and write
|
||
49E1000
|
heap
|
page read and write
|
||
5982000
|
trusted library allocation
|
page read and write
|
||
5DE9000
|
trusted library allocation
|
page read and write
|
||
5967000
|
trusted library allocation
|
page read and write
|
||
5995000
|
trusted library allocation
|
page read and write
|
||
49E1000
|
heap
|
page read and write
|
||
5FB1000
|
trusted library allocation
|
page read and write
|
||
5DEC000
|
trusted library allocation
|
page read and write
|
||
5B24000
|
trusted library allocation
|
page read and write
|
||
5988000
|
trusted library allocation
|
page read and write
|
||
11CA000
|
heap
|
page read and write
|
||
5E94000
|
trusted library allocation
|
page read and write
|
||
596B000
|
trusted library allocation
|
page read and write
|
||
5DE2000
|
trusted library allocation
|
page read and write
|
||
120C000
|
heap
|
page read and write
|
||
5DEB000
|
trusted library allocation
|
page read and write
|
||
6CE000
|
unkown
|
page read and write
|
||
5EEE000
|
trusted library allocation
|
page read and write
|
||
5DE4000
|
trusted library allocation
|
page read and write
|
||
5DE9000
|
trusted library allocation
|
page read and write
|
||
5ED9000
|
stack
|
page read and write
|
||
5A2F000
|
trusted library allocation
|
page read and write
|
||
4F9F000
|
stack
|
page read and write
|
||
B14000
|
unkown
|
page execute and write copy
|
||
5DE6000
|
trusted library allocation
|
page read and write
|
||
8250000
|
direct allocation
|
page read and write
|
||
975000
|
unkown
|
page execute and write copy
|
||
5E84000
|
trusted library allocation
|
page read and write
|
||
5995000
|
trusted library allocation
|
page read and write
|
||
54FF000
|
stack
|
page read and write
|
||
82E0000
|
heap
|
page read and write
|
||
595A000
|
trusted library allocation
|
page read and write
|
||
5EB6000
|
trusted library allocation
|
page read and write
|
||
11F5000
|
heap
|
page read and write
|
||
597E000
|
trusted library allocation
|
page read and write
|
||
5E82000
|
trusted library allocation
|
page read and write
|
||
661E000
|
trusted library allocation
|
page execute and read and write
|
||
5961000
|
trusted library allocation
|
page read and write
|
||
59D2000
|
trusted library allocation
|
page read and write
|
||
5DEC000
|
trusted library allocation
|
page read and write
|
||
594F000
|
trusted library allocation
|
page read and write
|
||
782F000
|
stack
|
page read and write
|
||
5993000
|
trusted library allocation
|
page read and write
|
||
361E000
|
stack
|
page read and write
|
||
2C2C000
|
stack
|
page read and write
|
||
1054000
|
heap
|
page read and write
|
||
5F1A000
|
trusted library allocation
|
page read and write
|
||
59B8000
|
trusted library allocation
|
page read and write
|
||
5DEC000
|
trusted library allocation
|
page read and write
|
||
6050000
|
trusted library allocation
|
page read and write
|
||
5940000
|
trusted library allocation
|
page read and write
|
||
5ED4000
|
trusted library allocation
|
page read and write
|
||
517E000
|
stack
|
page read and write
|
||
2FDE000
|
stack
|
page read and write
|
||
594D000
|
trusted library allocation
|
page read and write
|
||
60A5000
|
trusted library allocation
|
page read and write
|
||
5FDB000
|
trusted library allocation
|
page read and write
|
||
5DEB000
|
trusted library allocation
|
page read and write
|
||
5B1C000
|
trusted library allocation
|
page read and write
|
||
5F75000
|
trusted library allocation
|
page read and write
|
||
59BC000
|
trusted library allocation
|
page read and write
|
||
5E85000
|
trusted library allocation
|
page read and write
|
||
5E97000
|
trusted library allocation
|
page read and write
|
||
1054000
|
heap
|
page read and write
|
||
5EBB000
|
trusted library allocation
|
page read and write
|
||
5997000
|
trusted library allocation
|
page read and write
|
||
5979000
|
trusted library allocation
|
page read and write
|
||
120D000
|
heap
|
page read and write
|
||
5976000
|
trusted library allocation
|
page read and write
|
||
600E000
|
trusted library allocation
|
page read and write
|
||
5A4B000
|
trusted library allocation
|
page read and write
|
||
5977000
|
trusted library allocation
|
page read and write
|
||
2C97000
|
heap
|
page read and write
|
||
5EB7000
|
trusted library allocation
|
page read and write
|
||
59AD000
|
trusted library allocation
|
page read and write
|
||
75EE000
|
stack
|
page read and write
|
||
59A3000
|
trusted library allocation
|
page read and write
|
||
49E1000
|
heap
|
page read and write
|
||
5DE9000
|
trusted library allocation
|
page read and write
|
||
5977000
|
trusted library allocation
|
page read and write
|
||
5945000
|
trusted library allocation
|
page read and write
|
||
5967000
|
trusted library allocation
|
page read and write
|
||
5FBB000
|
trusted library allocation
|
page read and write
|
||
49E1000
|
heap
|
page read and write
|
||
11F0000
|
heap
|
page read and write
|
||
8250000
|
direct allocation
|
page read and write
|
||
5F26000
|
trusted library allocation
|
page read and write
|
||
FF0000
|
heap
|
page read and write
|
||
5DE2000
|
trusted library allocation
|
page read and write
|
||
599B000
|
trusted library allocation
|
page read and write
|
||
11EF000
|
heap
|
page read and write
|
||
5999000
|
trusted library allocation
|
page read and write
|
||
11F2000
|
heap
|
page read and write
|
||
11EA000
|
heap
|
page read and write
|
||
598E000
|
trusted library allocation
|
page read and write
|
||
53FE000
|
stack
|
page read and write
|
||
43DE000
|
stack
|
page read and write
|
||
5997000
|
trusted library allocation
|
page read and write
|
||
59B8000
|
trusted library allocation
|
page read and write
|
||
5979000
|
trusted library allocation
|
page read and write
|
||
5DE8000
|
trusted library allocation
|
page read and write
|
||
5946000
|
trusted library allocation
|
page read and write
|
||
5E7D000
|
trusted library allocation
|
page read and write
|
||
6362000
|
trusted library allocation
|
page execute and read and write
|
||
399F000
|
stack
|
page read and write
|
||
71EF000
|
stack
|
page read and write
|
||
2E9F000
|
stack
|
page read and write
|
||
59A6000
|
trusted library allocation
|
page read and write
|
||
5987000
|
trusted library allocation
|
page read and write
|
||
5983000
|
trusted library allocation
|
page read and write
|
||
10DD000
|
stack
|
page read and write
|
||
5DE1000
|
trusted library allocation
|
page read and write
|
||
11FA000
|
heap
|
page read and write
|
||
594C000
|
trusted library allocation
|
page read and write
|
||
1205000
|
heap
|
page read and write
|
||
596A000
|
trusted library allocation
|
page read and write
|
||
5991000
|
trusted library allocation
|
page read and write
|
||
598D000
|
trusted library allocation
|
page read and write
|
||
11FD000
|
heap
|
page read and write
|
||
5991000
|
trusted library allocation
|
page read and write
|
||
49F2000
|
heap
|
page read and write
|
||
11F6000
|
heap
|
page read and write
|
||
1209000
|
heap
|
page read and write
|
||
5DEE000
|
trusted library allocation
|
page read and write
|
||
5ED7000
|
trusted library allocation
|
page read and write
|
||
59ED000
|
trusted library allocation
|
page read and write
|
||
5EBD000
|
trusted library allocation
|
page read and write
|
||
5EF8000
|
trusted library allocation
|
page read and write
|
||
59B8000
|
trusted library allocation
|
page read and write
|
||
5DE1000
|
trusted library allocation
|
page read and write
|
||
5992000
|
trusted library allocation
|
page read and write
|
||
111E000
|
heap
|
page read and write
|
||
5DEE000
|
trusted library allocation
|
page read and write
|
||
5DEA000
|
trusted library allocation
|
page read and write
|
||
8600000
|
trusted library allocation
|
page read and write
|
||
594D000
|
trusted library allocation
|
page read and write
|
||
5968000
|
trusted library allocation
|
page read and write
|
||
5DE2000
|
trusted library allocation
|
page read and write
|
||
5F7D000
|
trusted library allocation
|
page read and write
|
||
5DEA000
|
trusted library allocation
|
page read and write
|
||
385F000
|
stack
|
page read and write
|
||
5DE9000
|
trusted library allocation
|
page read and write
|
||
4E40000
|
remote allocation
|
page read and write
|
||
59B8000
|
trusted library allocation
|
page read and write
|
||
6012000
|
trusted library allocation
|
page read and write
|
||
6360000
|
trusted library allocation
|
page read and write
|
||
BAB000
|
stack
|
page read and write
|
||
8250000
|
direct allocation
|
page read and write
|
||
11EF000
|
heap
|
page read and write
|
||
597B000
|
trusted library allocation
|
page read and write
|
||
10E0000
|
direct allocation
|
page read and write
|
||
5DE4000
|
trusted library allocation
|
page read and write
|
||
5DE2000
|
trusted library allocation
|
page read and write
|
||
4E40000
|
remote allocation
|
page read and write
|
||
5956000
|
trusted library allocation
|
page read and write
|
||
563F000
|
stack
|
page read and write
|
||
59BF000
|
trusted library allocation
|
page read and write
|
||
5968000
|
trusted library allocation
|
page read and write
|
||
5F12000
|
trusted library allocation
|
page read and write
|
||
595A000
|
trusted library allocation
|
page read and write
|
||
11F0000
|
heap
|
page read and write
|
||
898E000
|
stack
|
page read and write
|
||
49E1000
|
heap
|
page read and write
|
||
594F000
|
trusted library allocation
|
page read and write
|
||
EFB000
|
stack
|
page read and write
|
||
1209000
|
heap
|
page read and write
|
||
8250000
|
direct allocation
|
page read and write
|
||
59B5000
|
trusted library allocation
|
page read and write
|
||
11E8000
|
heap
|
page read and write
|
||
35DF000
|
stack
|
page read and write
|
||
11D6000
|
heap
|
page read and write
|
||
465E000
|
stack
|
page read and write
|
||
5977000
|
trusted library allocation
|
page read and write
|
||
5FB9000
|
trusted library allocation
|
page read and write
|
||
8A8E000
|
stack
|
page read and write
|
||
1110000
|
heap
|
page read and write
|
||
1054000
|
heap
|
page read and write
|
||
6014000
|
trusted library allocation
|
page read and write
|
||
5DE3000
|
trusted library allocation
|
page read and write
|
||
5979000
|
trusted library allocation
|
page read and write
|
||
4E40000
|
remote allocation
|
page read and write
|
||
597D000
|
trusted library allocation
|
page read and write
|
||
5DEA000
|
trusted library allocation
|
page read and write
|
||
48DE000
|
stack
|
page read and write
|
||
680000
|
unkown
|
page read and write
|
||
5EC4000
|
trusted library allocation
|
page read and write
|
||
5968000
|
trusted library allocation
|
page read and write
|
||
5EF6000
|
trusted library allocation
|
page read and write
|
||
140E000
|
stack
|
page read and write
|
||
5976000
|
trusted library allocation
|
page read and write
|
||
5968000
|
trusted library allocation
|
page read and write
|
||
5968000
|
trusted library allocation
|
page read and write
|
||
11C0000
|
heap
|
page read and write
|
||
11FD000
|
heap
|
page read and write
|
||
5ED2000
|
trusted library allocation
|
page read and write
|
||
64FA000
|
trusted library allocation
|
page execute and read and write
|
||
5ED5000
|
trusted library allocation
|
page read and write
|
||
692F000
|
stack
|
page read and write
|
||
975000
|
unkown
|
page execute and read and write
|
||
11E4000
|
heap
|
page read and write
|
||
6070000
|
trusted library allocation
|
page read and write
|
||
34DE000
|
stack
|
page read and write
|
||
5ED1000
|
trusted library allocation
|
page read and write
|
||
5DE4000
|
trusted library allocation
|
page read and write
|
||
11E0000
|
heap
|
page read and write
|
||
1054000
|
heap
|
page read and write
|
||
5E83000
|
trusted library allocation
|
page read and write
|
||
120A000
|
heap
|
page read and write
|
||
49E0000
|
heap
|
page read and write
|
||
5F18000
|
trusted library allocation
|
page read and write
|
||
5967000
|
trusted library allocation
|
page read and write
|
||
6E2F000
|
stack
|
page read and write
|
||
11F4000
|
heap
|
page read and write
|
||
7BEF000
|
stack
|
page read and write
|
||
594D000
|
trusted library allocation
|
page read and write
|
||
49E1000
|
heap
|
page read and write
|
||
5F0F000
|
trusted library allocation
|
page read and write
|
||
B13000
|
unkown
|
page execute and read and write
|
||
5979000
|
trusted library allocation
|
page read and write
|
||
595C000
|
trusted library allocation
|
page read and write
|
||
130E000
|
stack
|
page read and write
|
||
10E0000
|
direct allocation
|
page read and write
|
||
10E0000
|
direct allocation
|
page read and write
|
||
5DE3000
|
trusted library allocation
|
page read and write
|
||
5004000
|
trusted library allocation
|
page read and write
|
||
1100000
|
direct allocation
|
page read and write
|
||
5DEC000
|
trusted library allocation
|
page read and write
|
||
5E95000
|
trusted library allocation
|
page read and write
|
||
661C000
|
trusted library allocation
|
page execute and read and write
|
||
11E7000
|
heap
|
page read and write
|
||
8250000
|
direct allocation
|
page read and write
|
||
1202000
|
heap
|
page read and write
|
||
11F4000
|
heap
|
page read and write
|
||
5968000
|
trusted library allocation
|
page read and write
|
||
10E0000
|
direct allocation
|
page read and write
|
||
5EDE000
|
trusted library allocation
|
page read and write
|
||
4AE0000
|
trusted library allocation
|
page read and write
|
||
5FDD000
|
trusted library allocation
|
page read and write
|
||
5979000
|
trusted library allocation
|
page read and write
|
||
3EDE000
|
stack
|
page read and write
|
||
5F26000
|
trusted library allocation
|
page read and write
|
||
5DE7000
|
trusted library allocation
|
page read and write
|
||
527C000
|
stack
|
page read and write
|
||
120D000
|
heap
|
page read and write
|
||
59AC000
|
trusted library allocation
|
page read and write
|
||
8430000
|
trusted library allocation
|
page read and write
|
||
311E000
|
stack
|
page read and write
|
||
5976000
|
trusted library allocation
|
page read and write
|
||
11F4000
|
heap
|
page read and write
|
||
11EA000
|
heap
|
page read and write
|
||
5949000
|
trusted library allocation
|
page read and write
|
||
5968000
|
trusted library allocation
|
page read and write
|
||
11FA000
|
heap
|
page read and write
|
||
75AF000
|
stack
|
page read and write
|
||
1054000
|
heap
|
page read and write
|
||
2C6E000
|
stack
|
page read and write
|
||
82B0000
|
direct allocation
|
page read and write
|
||
5981000
|
trusted library allocation
|
page read and write
|
||
11EC000
|
heap
|
page read and write
|
||
681000
|
unkown
|
page execute and read and write
|
||
5958000
|
trusted library allocation
|
page read and write
|
||
8250000
|
direct allocation
|
page read and write
|
||
5A45000
|
trusted library allocation
|
page read and write
|
||
5976000
|
trusted library allocation
|
page read and write
|
||
5958000
|
trusted library allocation
|
page read and write
|
||
49DF000
|
stack
|
page read and write
|
||
5963000
|
trusted library allocation
|
page read and write
|
||
4FC0000
|
direct allocation
|
page execute and read and write
|
||
389E000
|
stack
|
page read and write
|
||
59ED000
|
trusted library allocation
|
page read and write
|
||
5979000
|
trusted library allocation
|
page read and write
|
||
5998000
|
trusted library allocation
|
page read and write
|
||
604E000
|
trusted library allocation
|
page read and write
|
||
1209000
|
heap
|
page read and write
|
||
5DE4000
|
trusted library allocation
|
page read and write
|
||
11FA000
|
heap
|
page read and write
|
||
49E1000
|
heap
|
page read and write
|
||
479E000
|
stack
|
page read and write
|
||
602A000
|
trusted library allocation
|
page read and write
|
||
5BE7000
|
trusted library allocation
|
page read and write
|
||
5A49000
|
trusted library allocation
|
page read and write
|
||
605E000
|
stack
|
page read and write
|
||
120A000
|
heap
|
page read and write
|
||
594F000
|
trusted library allocation
|
page read and write
|
||
5EC6000
|
trusted library allocation
|
page read and write
|
||
5964000
|
trusted library allocation
|
page read and write
|
||
82C0000
|
direct allocation
|
page execute and read and write
|
||
59ED000
|
trusted library allocation
|
page read and write
|
There are 801 hidden memdumps, click here to show them.
DOM / HTML
URL
|
Malicious
|
|
---|---|---|
https://learn.microsoft.com/en-us/dotnet/framework/install/application-not-started?version=(null)&processName=file.exe&platform=0009&osver=6&isServer=0&shimver=4.0.30319.0
|
||
https://learn.microsoft.com/en-us/dotnet/framework/install/application-not-started?version=(null)&processName=file.exe&platform=0009&osver=6&isServer=0&shimver=4.0.30319.0
|
||
https://learn.microsoft.com/en-us/dotnet/framework/install/application-not-started?version=(null)&processName=file.exe&platform=0009&osver=6&isServer=0&shimver=4.0.30319.0
|
||
https://learn.microsoft.com/en-us/dotnet/framework/install/application-not-started?version=(null)&processName=file.exe&platform=0009&osver=6&isServer=0&shimver=4.0.30319.0
|