Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
file.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
initial sample
|
||
Chrome Cache Entry: 100
|
ASCII text, with very long lines (46884)
|
dropped
|
||
Chrome Cache Entry: 101
|
ASCII text
|
dropped
|
||
Chrome Cache Entry: 102
|
SVG Scalable Vector Graphics image
|
downloaded
|
||
Chrome Cache Entry: 103
|
Web Open Font Format (Version 2), TrueType, length 19696, version 1.0
|
downloaded
|
||
Chrome Cache Entry: 104
|
ASCII text, with very long lines (33148), with no line terminators
|
downloaded
|
||
Chrome Cache Entry: 105
|
PNG image data, 475 x 212, 8-bit/color RGBA, non-interlaced
|
dropped
|
||
Chrome Cache Entry: 106
|
PNG image data, 658 x 480, 8-bit/color RGBA, non-interlaced
|
dropped
|
||
Chrome Cache Entry: 107
|
JSON data
|
dropped
|
||
Chrome Cache Entry: 108
|
HTML document, ASCII text, with very long lines (639), with CRLF, LF line terminators
|
downloaded
|
||
Chrome Cache Entry: 109
|
JSON data
|
downloaded
|
||
Chrome Cache Entry: 110
|
PNG image data, 533 x 478, 8-bit/color RGBA, non-interlaced
|
dropped
|
||
Chrome Cache Entry: 69
|
PNG image data, 533 x 478, 8-bit/color RGBA, non-interlaced
|
dropped
|
||
Chrome Cache Entry: 70
|
PNG image data, 533 x 478, 8-bit/color RGBA, non-interlaced
|
downloaded
|
||
Chrome Cache Entry: 71
|
SVG Scalable Vector Graphics image
|
dropped
|
||
Chrome Cache Entry: 72
|
JSON data
|
dropped
|
||
Chrome Cache Entry: 73
|
PNG image data, 533 x 478, 8-bit/color RGBA, non-interlaced
|
dropped
|
||
Chrome Cache Entry: 74
|
ASCII text, with very long lines (65536), with no line terminators
|
downloaded
|
||
Chrome Cache Entry: 75
|
ASCII text, with very long lines (65410)
|
dropped
|
||
Chrome Cache Entry: 76
|
JSON data
|
dropped
|
||
Chrome Cache Entry: 77
|
ASCII text, with very long lines (65410)
|
downloaded
|
||
Chrome Cache Entry: 78
|
JSON data
|
downloaded
|
||
Chrome Cache Entry: 79
|
PNG image data, 533 x 478, 8-bit/color RGBA, non-interlaced
|
downloaded
|
||
Chrome Cache Entry: 80
|
ASCII text, with very long lines (52717), with no line terminators
|
dropped
|
||
Chrome Cache Entry: 81
|
ASCII text
|
downloaded
|
||
Chrome Cache Entry: 82
|
ASCII text, with very long lines (52717), with no line terminators
|
downloaded
|
||
Chrome Cache Entry: 83
|
exported SGML document, ASCII text, with very long lines (65536), with no line terminators
|
downloaded
|
||
Chrome Cache Entry: 84
|
JSON data
|
dropped
|
||
Chrome Cache Entry: 85
|
ASCII text, with no line terminators
|
downloaded
|
||
Chrome Cache Entry: 86
|
PNG image data, 533 x 478, 8-bit/color RGBA, non-interlaced
|
downloaded
|
||
Chrome Cache Entry: 87
|
MS Windows icon resource - 6 icons, -128x-128, 16 colors, 72x72, 16 colors
|
downloaded
|
||
Chrome Cache Entry: 88
|
ASCII text, with very long lines (46884)
|
downloaded
|
||
Chrome Cache Entry: 89
|
JSON data
|
dropped
|
||
Chrome Cache Entry: 90
|
MS Windows icon resource - 6 icons, -128x-128, 16 colors, 72x72, 16 colors
|
dropped
|
||
Chrome Cache Entry: 91
|
PNG image data, 658 x 480, 8-bit/color RGBA, non-interlaced
|
downloaded
|
||
Chrome Cache Entry: 92
|
ASCII text, with very long lines (33148), with no line terminators
|
dropped
|
||
Chrome Cache Entry: 93
|
JSON data
|
downloaded
|
||
Chrome Cache Entry: 94
|
JPEG image data, JFIF standard 1.01, aspect ratio, density 1x1, segment length 16, baseline, precision 8, 1528x402, components
3
|
dropped
|
||
Chrome Cache Entry: 95
|
PNG image data, 475 x 212, 8-bit/color RGBA, non-interlaced
|
downloaded
|
||
Chrome Cache Entry: 96
|
JSON data
|
downloaded
|
||
Chrome Cache Entry: 97
|
JSON data
|
dropped
|
||
Chrome Cache Entry: 98
|
JPEG image data, JFIF standard 1.01, aspect ratio, density 1x1, segment length 16, baseline, precision 8, 1528x402, components
3
|
downloaded
|
||
Chrome Cache Entry: 99
|
exported SGML document, ASCII text, with very long lines (65536), with no line terminators
|
dropped
|
There are 33 hidden files, click here to show them.
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\file.exe
|
"C:\Users\user\Desktop\file.exe"
|
||
C:\Program Files\Google\Chrome\Application\chrome.exe
|
"C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized --single-argument http://go.microsoft.com/fwlink/?prd=11324&pver=4.5&sbp=AppLaunch2&plcid=0x409&o1=SHIM_NOVERSION_FOUND&version=(null)&processName=file.exe&platform=0009&osver=6&isServer=0&shimver=4.0.30319.0
|
||
C:\Program Files\Google\Chrome\Application\chrome.exe
|
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US
--service-sandbox-type=none --mojo-platform-channel-handle=2196 --field-trial-handle=1944,i,12398090769683283580,15883976292217934783,262144
--disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction
/prefetch:8
|
||
C:\Program Files\Google\Chrome\Application\chrome.exe
|
"C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized --single-argument http://go.microsoft.com/fwlink/?prd=11324&pver=4.5&sbp=AppLaunch2&plcid=0x409&o1=SHIM_NOVERSION_FOUND&version=(null)&processName=file.exe&platform=0009&osver=6&isServer=0&shimver=4.0.30319.0
|
||
C:\Program Files\Google\Chrome\Application\chrome.exe
|
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US
--service-sandbox-type=none --mojo-platform-channel-handle=2032 --field-trial-handle=1916,i,5027301421968509795,4579798897625562281,262144
--disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction
/prefetch:8
|
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
https://atten-supporse.biz/G
|
unknown
|
||
https://authoring-docs-microsoft.poolparty.biz/devrel/7696cda6-0510-47f6-8302-71bb5d2e28cf
|
unknown
|
||
https://duckduckgo.com/chrome_newtab
|
unknown
|
||
dare-curbys.biz
|
|||
impend-differ.biz
|
|||
https://duckduckgo.com/ac/?q=
|
unknown
|
||
http://crl.microsoft
|
unknown
|
||
https://github.com/dotnet/docs/blob/17c4acca45e573a92878a44a2cce57d699fe9c7c/docs/framework/install/
|
unknown
|
||
https://www.linkedin.com/cws/share?url=$
|
unknown
|
||
https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
|
unknown
|
||
https://atten-supporse.biz/apiT7
|
unknown
|
||
https://github.com/Youssef1313
|
unknown
|
||
https://management.azure.com/providers/Microsoft.Portal/userSettings/cloudconsole?api-version=2023-0
|
unknown
|
||
dwell-exclaim.biz
|
|||
https://aka.ms/msignite_docs_banner
|
unknown
|
||
https://videoencodingpublic-hgeaeyeba8gycee3.b01.azurefd.net/public-b4da8140-92cf-421c-8b7b-e471d5b9
|
unknown
|
||
http://polymer.github.io/AUTHORS.txt
|
unknown
|
||
https://github.com/dotnet/docs/issues/new?template=z-customer-feedback.yml
|
unknown
|
||
https://management.azure.com/subscriptions?api-version=2016-06-01
|
unknown
|
||
https://github.com/dotnet/docs/blob/main/docs/framework/install/application-not-started.md
|
unknown
|
||
zinc-sneark.biz
|
|||
http://x1.c.lencr.org/0
|
unknown
|
||
http://x1.i.lencr.org/0
|
unknown
|
||
https://aka.ms/pshelpmechoose
|
unknown
|
||
https://aka.ms/feedback/report?space=61
|
unknown
|
||
https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
|
unknown
|
||
formy-spill.biz
|
|||
https://learn-video.azurefd.net/vod/player
|
unknown
|
||
https://twitter.com/intent/tweet?original_referer=$
|
unknown
|
||
https://github.com/gewarren
|
unknown
|
||
se-blurry.biz
|
|||
https://support.mozilla.org/products/firefoxgro.all
|
unknown
|
||
http://polymer.github.io/CONTRIBUTORS.txt
|
unknown
|
||
http://185.215.113.16/rD
|
unknown
|
||
https://github.com/dotnet/docs/blob/live/docs/framework/install/application-not-started.md
|
unknown
|
||
https://authoring-docs-microsoft.poolparty.biz/devrel/69c76c32-967e-4c65-b89a-74cc527db725
|
unknown
|
||
https://client-api.arkoselabs.com/v2/api.js
|
unknown
|
||
https://aka.ms/MSIgniteChallenge/Tier1Banner?wt.mc_id=ignite24_learnbanner_tier1_cnl
|
unknown
|
||
https://management.azure.com/providers/Microsoft.Portal/consoles/default?api-version=2017-12-01-prev
|
unknown
|
||
https://www.google.com/images/branding/product/ico/googleg_lodp.ico
|
unknown
|
||
https://github.com/Thraka
|
unknown
|
||
https://atten-supporse.biz/URDT
|
unknown
|
||
covery-mover.biz
|
|||
http://polymer.github.io/PATENTS.txt
|
unknown
|
||
https://aka.ms/certhelp
|
unknown
|
||
https://bridge.sfo1.admarketplace.net/ctp?version=16.0.0&key=1696490019400400000.2&ci=1696490019252.
|
unknown
|
||
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
|
unknown
|
||
http://crl.rootca1.amazontrust.com/rootca1.crl0
|
unknown
|
||
https://atten-supporse.biz/api
|
172.67.165.166
|
||
https://github.com/mairaw
|
unknown
|
||
http://ocsp.rootca1.amazontrust.com0:
|
unknown
|
||
https://js.monitor.azure.com/scripts/c/ms.jsll-4.min.js
|
unknown
|
||
https://schema.org
|
unknown
|
||
http://polymer.github.io/LICENSE.txt
|
unknown
|
||
https://www.ecosia.org/newtab/
|
unknown
|
||
https://support.mozilla.org/kb/customize-firefox-controls-buttons-and-toolbars?utm_source=firefox-br
|
unknown
|
||
https://aka.ms/yourcaliforniaprivacychoices
|
unknown
|
||
https://ac.ecosia.org/autocomplete?q=
|
unknown
|
||
https://github.com/nschonni
|
unknown
|
||
http://185.215.113.16/
|
unknown
|
||
https://atten-supporse.biz/h
|
unknown
|
||
https://atten-supporse.biz/0u
|
unknown
|
||
https://videoencodingpublic-hgeaeyeba8gycee3.b01.azurefd.net/public-09ce73a6-05a5-4e4d-b3d7-bd5a8c05
|
unknown
|
||
https://github.com/adegeo
|
unknown
|
||
http://185.215.113.16/5
|
unknown
|
||
http://185.215.113.16:80/off/def.exe
|
unknown
|
||
https://github.com/jonschlinkert/is-plain-object
|
unknown
|
||
http://crt.rootca1.amazontrust.com/rootca1.cer0?
|
unknown
|
||
https://octokit.github.io/rest.js/#throttling
|
unknown
|
||
https://atten-supporse.biz/w
|
unknown
|
||
https://imp.mt48.net/static?id=7RHzfOIXjFEYsBdvIpkX4Qqm4pqWfpl%2B4pbW4pbWfpbW7ReNxR3UIG8zInwYIFIVs9e
|
unknown
|
||
atten-supporse.biz
|
|||
https://contile-images.services.mozilla.com/CuERQnIs4CzqjKBh9os6_h9d4CUDCHO3oiqmAQO6VLM.25122.jpg
|
unknown
|
||
https://github.com/js-cookie/js-cookie
|
unknown
|
||
http://schema.org/Organization
|
unknown
|
||
https://atten-supporse.biz/
|
unknown
|
||
print-vexer.biz
|
|||
https://channel9.msdn.com/
|
unknown
|
||
https://atten-supporse.biz/api0
|
unknown
|
||
https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
|
unknown
|
||
https://github.com/dotnet/try
|
unknown
|
There are 71 hidden URLs, click here to show them.
Domains
Name
|
IP
|
Malicious
|
|
---|---|---|---|
atten-supporse.biz
|
172.67.165.166
|
||
www.google.com
|
142.250.181.68
|
||
s-part-0035.t-0009.t-msedge.net
|
13.107.246.63
|
||
js.monitor.azure.com
|
unknown
|
||
mdec.nelreports.net
|
unknown
|
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
192.168.2.7
|
unknown
|
unknown
|
||
185.215.113.16
|
unknown
|
Portugal
|
||
172.67.165.166
|
atten-supporse.biz
|
United States
|
||
239.255.255.250
|
unknown
|
Reserved
|
||
142.250.181.68
|
www.google.com
|
United States
|
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
5080000
|
direct allocation
|
page read and write
|
||
1395000
|
heap
|
page read and write
|
||
5B90000
|
trusted library allocation
|
page read and write
|
||
5B51000
|
trusted library allocation
|
page read and write
|
||
5FE7000
|
trusted library allocation
|
page read and write
|
||
5B4F000
|
trusted library allocation
|
page read and write
|
||
5B5C000
|
trusted library allocation
|
page read and write
|
||
5B90000
|
trusted library allocation
|
page read and write
|
||
5B5E000
|
trusted library allocation
|
page read and write
|
||
5B87000
|
trusted library allocation
|
page read and write
|
||
1386000
|
heap
|
page read and write
|
||
1290000
|
direct allocation
|
page read and write
|
||
1290000
|
direct allocation
|
page read and write
|
||
60B5000
|
trusted library allocation
|
page read and write
|
||
5B87000
|
trusted library allocation
|
page read and write
|
||
60B3000
|
trusted library allocation
|
page read and write
|
||
5B7A000
|
trusted library allocation
|
page read and write
|
||
5BFE000
|
trusted library allocation
|
page read and write
|
||
5B90000
|
trusted library allocation
|
page read and write
|
||
5B83000
|
trusted library allocation
|
page read and write
|
||
1398000
|
heap
|
page read and write
|
||
60E7000
|
trusted library allocation
|
page read and write
|
||
5B7C000
|
trusted library allocation
|
page read and write
|
||
5DBA000
|
trusted library allocation
|
page read and write
|
||
5B92000
|
trusted library allocation
|
page read and write
|
||
617A000
|
trusted library allocation
|
page read and write
|
||
5FE4000
|
trusted library allocation
|
page read and write
|
||
51F0000
|
direct allocation
|
page execute and read and write
|
||
5BAB000
|
trusted library allocation
|
page read and write
|
||
60A9000
|
trusted library allocation
|
page read and write
|
||
610E000
|
trusted library allocation
|
page read and write
|
||
5B65000
|
trusted library allocation
|
page read and write
|
||
137D000
|
heap
|
page read and write
|
||
5B5C000
|
trusted library allocation
|
page read and write
|
||
6073000
|
trusted library allocation
|
page read and write
|
||
5BBA000
|
trusted library allocation
|
page read and write
|
||
5BBE000
|
trusted library allocation
|
page read and write
|
||
1290000
|
direct allocation
|
page read and write
|
||
5BEC000
|
trusted library allocation
|
page read and write
|
||
5B8D000
|
trusted library allocation
|
page read and write
|
||
5FE2000
|
trusted library allocation
|
page read and write
|
||
5FE5000
|
trusted library allocation
|
page read and write
|
||
61A7000
|
trusted library allocation
|
page read and write
|
||
5BC0000
|
trusted library allocation
|
page read and write
|
||
5BAD000
|
trusted library allocation
|
page read and write
|
||
5B70000
|
trusted library allocation
|
page read and write
|
||
5B90000
|
trusted library allocation
|
page read and write
|
||
5CF2000
|
trusted library allocation
|
page read and write
|
||
60BA000
|
trusted library allocation
|
page read and write
|
||
60A1000
|
trusted library allocation
|
page read and write
|
||
614C000
|
trusted library allocation
|
page read and write
|
||
5B81000
|
trusted library allocation
|
page read and write
|
||
5FE9000
|
trusted library allocation
|
page read and write
|
||
5B50000
|
trusted library allocation
|
page read and write
|
||
138C000
|
heap
|
page read and write
|
||
6152000
|
trusted library allocation
|
page read and write
|
||
61AA000
|
trusted library allocation
|
page read and write
|
||
613B000
|
trusted library allocation
|
page read and write
|
||
5FF1000
|
trusted library allocation
|
page read and write
|
||
5B90000
|
trusted library allocation
|
page read and write
|
||
62BF000
|
trusted library allocation
|
page read and write
|
||
303000
|
unkown
|
page write copy
|
||
4C01000
|
heap
|
page read and write
|
||
139E000
|
heap
|
page read and write
|
||
5BAA000
|
trusted library allocation
|
page read and write
|
||
11E4000
|
heap
|
page read and write
|
||
5B65000
|
trusted library allocation
|
page read and write
|
||
5C45000
|
trusted library allocation
|
page read and write
|
||
51F0000
|
direct allocation
|
page execute and read and write
|
||
5B79000
|
trusted library allocation
|
page read and write
|
||
5C41000
|
trusted library allocation
|
page read and write
|
||
5FE2000
|
trusted library allocation
|
page read and write
|
||
5B59000
|
trusted library allocation
|
page read and write
|
||
5B76000
|
trusted library allocation
|
page read and write
|
||
5B9E000
|
trusted library allocation
|
page read and write
|
||
612B000
|
trusted library allocation
|
page read and write
|
||
4C01000
|
heap
|
page read and write
|
||
5FF0000
|
trusted library allocation
|
page read and write
|
||
5B6A000
|
trusted library allocation
|
page read and write
|
||
5FE5000
|
trusted library allocation
|
page read and write
|
||
5B6E000
|
trusted library allocation
|
page read and write
|
||
5FEE000
|
trusted library allocation
|
page read and write
|
||
138D000
|
heap
|
page read and write
|
||
5FE6000
|
trusted library allocation
|
page read and write
|
||
51F0000
|
direct allocation
|
page execute and read and write
|
||
5B89000
|
trusted library allocation
|
page read and write
|
||
2F20000
|
direct allocation
|
page read and write
|
||
5C82000
|
trusted library allocation
|
page read and write
|
||
1386000
|
heap
|
page read and write
|
||
5B90000
|
trusted library allocation
|
page read and write
|
||
6211000
|
trusted library allocation
|
page read and write
|
||
5C6A000
|
trusted library allocation
|
page read and write
|
||
5BC0000
|
trusted library allocation
|
page read and write
|
||
5B5C000
|
trusted library allocation
|
page read and write
|
||
5B90000
|
trusted library allocation
|
page read and write
|
||
1395000
|
heap
|
page read and write
|
||
5FE8000
|
trusted library allocation
|
page read and write
|
||
5B90000
|
trusted library allocation
|
page read and write
|
||
5FEA000
|
trusted library allocation
|
page read and write
|
||
6142000
|
trusted library allocation
|
page read and write
|
||
5BD4000
|
trusted library allocation
|
page read and write
|
||
5B5D000
|
trusted library allocation
|
page read and write
|
||
6096000
|
trusted library allocation
|
page read and write
|
||
612E000
|
trusted library allocation
|
page read and write
|
||
5B41000
|
trusted library allocation
|
page read and write
|
||
1290000
|
direct allocation
|
page read and write
|
||
5B7C000
|
trusted library allocation
|
page read and write
|
||
11E4000
|
heap
|
page read and write
|
||
138A000
|
heap
|
page read and write
|
||
4C01000
|
heap
|
page read and write
|
||
6137000
|
trusted library allocation
|
page read and write
|
||
4C01000
|
heap
|
page read and write
|
||
5FE2000
|
trusted library allocation
|
page read and write
|
||
5BAB000
|
trusted library allocation
|
page read and write
|
||
5FE6000
|
trusted library allocation
|
page read and write
|
||
60DC000
|
trusted library allocation
|
page read and write
|
||
626C000
|
trusted library allocation
|
page read and write
|
||
5B65000
|
trusted library allocation
|
page read and write
|
||
5BF9000
|
trusted library allocation
|
page read and write
|
||
5FED000
|
trusted library allocation
|
page read and write
|
||
5B90000
|
trusted library allocation
|
page read and write
|
||
5B90000
|
trusted library allocation
|
page read and write
|
||
5BC0000
|
trusted library allocation
|
page read and write
|
||
6148000
|
trusted library allocation
|
page read and write
|
||
5B90000
|
trusted library allocation
|
page read and write
|
||
60C3000
|
trusted library allocation
|
page read and write
|
||
5BD8000
|
trusted library allocation
|
page read and write
|
||
139C000
|
heap
|
page read and write
|
||
5B65000
|
trusted library allocation
|
page read and write
|
||
5B96000
|
trusted library allocation
|
page read and write
|
||
5BAB000
|
trusted library allocation
|
page read and write
|
||
1386000
|
heap
|
page read and write
|
||
6118000
|
trusted library allocation
|
page read and write
|
||
5B7F000
|
trusted library allocation
|
page read and write
|
||
1367000
|
heap
|
page read and write
|
||
51C0000
|
direct allocation
|
page execute and read and write
|
||
5BB8000
|
trusted library allocation
|
page read and write
|
||
5B93000
|
trusted library allocation
|
page read and write
|
||
5FEA000
|
trusted library allocation
|
page read and write
|
||
5C40000
|
trusted library allocation
|
page read and write
|
||
60A7000
|
trusted library allocation
|
page read and write
|
||
1290000
|
direct allocation
|
page read and write
|
||
627B000
|
trusted library allocation
|
page read and write
|
||
5B65000
|
trusted library allocation
|
page read and write
|
||
611A000
|
trusted library allocation
|
page read and write
|
||
5D1A000
|
trusted library allocation
|
page read and write
|
||
611E000
|
trusted library allocation
|
page read and write
|
||
6217000
|
trusted library allocation
|
page read and write
|
||
5B8F000
|
trusted library allocation
|
page read and write
|
||
6110000
|
trusted library allocation
|
page read and write
|
||
5B8E000
|
trusted library allocation
|
page read and write
|
||
612C000
|
trusted library allocation
|
page read and write
|
||
60FF000
|
trusted library allocation
|
page read and write
|
||
5BA0000
|
trusted library allocation
|
page read and write
|
||
5B87000
|
trusted library allocation
|
page read and write
|
||
5B41000
|
trusted library allocation
|
page read and write
|
||
5FEB000
|
trusted library allocation
|
page read and write
|
||
5B4D000
|
trusted library allocation
|
page read and write
|
||
5B56000
|
trusted library allocation
|
page read and write
|
||
5C4B000
|
trusted library allocation
|
page read and write
|
||
614E000
|
trusted library allocation
|
page read and write
|
||
5C47000
|
trusted library allocation
|
page read and write
|
||
5B65000
|
trusted library allocation
|
page read and write
|
||
5B53000
|
trusted library allocation
|
page read and write
|
||
5FE9000
|
trusted library allocation
|
page read and write
|
||
11E4000
|
heap
|
page read and write
|
||
62AD000
|
trusted library allocation
|
page read and write
|
||
60EA000
|
trusted library allocation
|
page read and write
|
||
5B90000
|
trusted library allocation
|
page read and write
|
||
6106000
|
trusted library allocation
|
page read and write
|
||
5FE5000
|
trusted library allocation
|
page read and write
|
||
5B87000
|
trusted library allocation
|
page read and write
|
||
1290000
|
direct allocation
|
page read and write
|
||
60A9000
|
trusted library allocation
|
page read and write
|
||
5FE3000
|
trusted library allocation
|
page read and write
|
||
6101000
|
trusted library allocation
|
page read and write
|
||
5B53000
|
trusted library allocation
|
page read and write
|
||
5B88000
|
trusted library allocation
|
page read and write
|
||
61E0000
|
trusted library allocation
|
page read and write
|
||
5FEC000
|
trusted library allocation
|
page read and write
|
||
60D1000
|
trusted library allocation
|
page read and write
|
||
5B90000
|
trusted library allocation
|
page read and write
|
||
5FE1000
|
trusted library allocation
|
page read and write
|
||
5B7A000
|
trusted library allocation
|
page read and write
|
||
6098000
|
trusted library allocation
|
page read and write
|
||
5B79000
|
trusted library allocation
|
page read and write
|
||
5FE2000
|
trusted library allocation
|
page read and write
|
||
11E4000
|
heap
|
page read and write
|
||
5B87000
|
trusted library allocation
|
page read and write
|
||
614C000
|
trusted library allocation
|
page read and write
|
||
5BA8000
|
trusted library allocation
|
page read and write
|
||
5B7A000
|
trusted library allocation
|
page read and write
|
||
5B90000
|
trusted library allocation
|
page read and write
|
||
6092000
|
trusted library allocation
|
page read and write
|
||
5B53000
|
trusted library allocation
|
page read and write
|
||
5B90000
|
trusted library allocation
|
page read and write
|
||
60C2000
|
trusted library allocation
|
page read and write
|
||
5BBA000
|
trusted library allocation
|
page read and write
|
||
5BA8000
|
trusted library allocation
|
page read and write
|
||
5FE4000
|
trusted library allocation
|
page read and write
|
||
4C01000
|
heap
|
page read and write
|
||
5BA2000
|
trusted library allocation
|
page read and write
|
||
5B90000
|
trusted library allocation
|
page read and write
|
||
5B84000
|
trusted library allocation
|
page read and write
|
||
5B57000
|
trusted library allocation
|
page read and write
|
||
1395000
|
heap
|
page read and write
|
||
60E8000
|
trusted library allocation
|
page read and write
|
||
5B90000
|
trusted library allocation
|
page read and write
|
||
5FE4000
|
trusted library allocation
|
page read and write
|
||
5FE6000
|
trusted library allocation
|
page read and write
|
||
5BB8000
|
trusted library allocation
|
page read and write
|
||
5FE5000
|
trusted library allocation
|
page read and write
|
||
612E000
|
trusted library allocation
|
page read and write
|
||
5B80000
|
trusted library allocation
|
page read and write
|
||
60DA000
|
trusted library allocation
|
page read and write
|
||
5B90000
|
trusted library allocation
|
page read and write
|
||
5B5D000
|
trusted library allocation
|
page read and write
|
||
6120000
|
trusted library allocation
|
page read and write
|
||
1290000
|
direct allocation
|
page read and write
|
||
5BA0000
|
trusted library allocation
|
page read and write
|
||
5B92000
|
trusted library allocation
|
page read and write
|
||
5B90000
|
trusted library allocation
|
page read and write
|
||
5B90000
|
trusted library allocation
|
page read and write
|
||
5C49000
|
trusted library allocation
|
page read and write
|
||
1364000
|
heap
|
page read and write
|
||
1391000
|
heap
|
page read and write
|
||
5FE6000
|
trusted library allocation
|
page read and write
|
||
5B9B000
|
trusted library allocation
|
page read and write
|
||
4C01000
|
heap
|
page read and write
|
||
5FE1000
|
trusted library allocation
|
page read and write
|
||
1376000
|
heap
|
page read and write
|
||
5FED000
|
trusted library allocation
|
page read and write
|
||
135D000
|
heap
|
page read and write
|
||
60A9000
|
trusted library allocation
|
page read and write
|
||
5B90000
|
trusted library allocation
|
page read and write
|
||
1384000
|
heap
|
page read and write
|
||
614A000
|
trusted library allocation
|
page read and write
|
||
6136000
|
trusted library allocation
|
page read and write
|
||
51E0000
|
direct allocation
|
page execute and read and write
|
||
138E000
|
heap
|
page read and write
|
||
6215000
|
trusted library allocation
|
page read and write
|
||
60A3000
|
trusted library allocation
|
page read and write
|
||
619B000
|
trusted library allocation
|
page read and write
|
||
5B6A000
|
trusted library allocation
|
page read and write
|
||
5FED000
|
trusted library allocation
|
page read and write
|
||
1290000
|
direct allocation
|
page read and write
|
||
1290000
|
direct allocation
|
page read and write
|
||
5BA7000
|
trusted library allocation
|
page read and write
|
||
62BD000
|
trusted library allocation
|
page read and write
|
||
1376000
|
heap
|
page read and write
|
||
5FEA000
|
trusted library allocation
|
page read and write
|
||
624F000
|
trusted library allocation
|
page read and write
|
||
5FEC000
|
trusted library allocation
|
page read and write
|
||
5FEE000
|
trusted library allocation
|
page read and write
|
||
5B70000
|
trusted library allocation
|
page read and write
|
||
4C01000
|
heap
|
page read and write
|
||
5BD1000
|
trusted library allocation
|
page read and write
|
||
137A000
|
heap
|
page read and write
|
||
5B74000
|
trusted library allocation
|
page read and write
|
||
5B7E000
|
trusted library allocation
|
page read and write
|
||
1371000
|
heap
|
page read and write
|
||
5FE4000
|
trusted library allocation
|
page read and write
|
||
629A000
|
trusted library allocation
|
page read and write
|
||
1386000
|
heap
|
page read and write
|
||
623B000
|
trusted library allocation
|
page read and write
|
||
626E000
|
trusted library allocation
|
page read and write
|
||
6094000
|
trusted library allocation
|
page read and write
|
||
5FF0000
|
trusted library allocation
|
page read and write
|
||
4C01000
|
heap
|
page read and write
|
||
5B90000
|
trusted library allocation
|
page read and write
|
||
1371000
|
heap
|
page read and write
|
||
60A7000
|
trusted library allocation
|
page read and write
|
||
5B9B000
|
trusted library allocation
|
page read and write
|
||
4C01000
|
heap
|
page read and write
|
||
2B0000
|
unkown
|
page readonly
|
||
6199000
|
trusted library allocation
|
page read and write
|
||
5B90000
|
trusted library allocation
|
page read and write
|
||
60C1000
|
trusted library allocation
|
page read and write
|
||
523F000
|
trusted library allocation
|
page read and write
|
||
4C01000
|
heap
|
page read and write
|
||
5DE2000
|
trusted library allocation
|
page read and write
|
||
6253000
|
trusted library allocation
|
page read and write
|
||
5FE8000
|
trusted library allocation
|
page read and write
|
||
5BA7000
|
trusted library allocation
|
page read and write
|
||
60A6000
|
trusted library allocation
|
page read and write
|
||
5B8C000
|
trusted library allocation
|
page read and write
|
||
1290000
|
direct allocation
|
page read and write
|
||
5FE8000
|
trusted library allocation
|
page read and write
|
||
5B90000
|
trusted library allocation
|
page read and write
|
||
5BD1000
|
trusted library allocation
|
page read and write
|
||
5B79000
|
trusted library allocation
|
page read and write
|
||
5B5C000
|
trusted library allocation
|
page read and write
|
||
60BF000
|
trusted library allocation
|
page read and write
|
||
1393000
|
heap
|
page read and write
|
||
627D000
|
trusted library allocation
|
page read and write
|
||
1389000
|
heap
|
page read and write
|
||
11E4000
|
heap
|
page read and write
|
||
5B46000
|
trusted library allocation
|
page read and write
|
||
5B65000
|
trusted library allocation
|
page read and write
|
||
6122000
|
trusted library allocation
|
page read and write
|
||
5BAA000
|
trusted library allocation
|
page read and write
|
||
5BBC000
|
trusted library allocation
|
page read and write
|
||
5BEB000
|
trusted library allocation
|
page read and write
|
||
1384000
|
heap
|
page read and write
|
||
5B50000
|
trusted library allocation
|
page read and write
|
||
1395000
|
heap
|
page read and write
|
||
61A0000
|
trusted library allocation
|
page read and write
|
||
5B41000
|
trusted library allocation
|
page read and write
|
||
137A000
|
heap
|
page read and write
|
||
6139000
|
trusted library allocation
|
page read and write
|
||
5B90000
|
trusted library allocation
|
page read and write
|
||
1376000
|
heap
|
page read and write
|
||
6112000
|
trusted library allocation
|
page read and write
|
||
1391000
|
heap
|
page read and write
|
||
5FEB000
|
trusted library allocation
|
page read and write
|
||
1391000
|
heap
|
page read and write
|
||
665B000
|
trusted library allocation
|
page read and write
|
||
60EA000
|
trusted library allocation
|
page read and write
|
||
5040000
|
trusted library allocation
|
page read and write
|
||
1386000
|
heap
|
page read and write
|
||
5FE3000
|
trusted library allocation
|
page read and write
|
||
5B59000
|
trusted library allocation
|
page read and write
|
||
1371000
|
heap
|
page read and write
|
||
51F0000
|
direct allocation
|
page execute and read and write
|
||
2B1000
|
unkown
|
page execute and write copy
|
||
5FE9000
|
trusted library allocation
|
page read and write
|
||
5BB7000
|
trusted library allocation
|
page read and write
|
||
61FF000
|
trusted library allocation
|
page read and write
|
||
5FE1000
|
trusted library allocation
|
page read and write
|
||
5B48000
|
trusted library allocation
|
page read and write
|
||
51F0000
|
direct allocation
|
page execute and read and write
|
||
4C01000
|
heap
|
page read and write
|
||
1378000
|
heap
|
page read and write
|
||
60C1000
|
trusted library allocation
|
page read and write
|
||
137A000
|
heap
|
page read and write
|
||
5FE1000
|
trusted library allocation
|
page read and write
|
||
6136000
|
trusted library allocation
|
page read and write
|
||
5BAD000
|
trusted library allocation
|
page read and write
|
||
137A000
|
heap
|
page read and write
|
||
5B65000
|
trusted library allocation
|
page read and write
|
||
5B73000
|
trusted library allocation
|
page read and write
|
||
5FF1000
|
trusted library allocation
|
page read and write
|
||
5070000
|
remote allocation
|
page read and write
|
||
5B5D000
|
trusted library allocation
|
page read and write
|
||
60C0000
|
trusted library allocation
|
page read and write
|
||
2F20000
|
direct allocation
|
page read and write
|
||
5B41000
|
trusted library allocation
|
page read and write
|
||
11E4000
|
heap
|
page read and write
|
||
5FE4000
|
trusted library allocation
|
page read and write
|
||
135E000
|
heap
|
page read and write
|
||
1368000
|
heap
|
page read and write
|
||
5B70000
|
trusted library allocation
|
page read and write
|
||
5BB1000
|
trusted library allocation
|
page read and write
|
||
5BC8000
|
trusted library allocation
|
page read and write
|
||
11E4000
|
heap
|
page read and write
|
||
1398000
|
heap
|
page read and write
|
||
6146000
|
trusted library allocation
|
page read and write
|
||
614E000
|
trusted library allocation
|
page read and write
|
||
61EF000
|
trusted library allocation
|
page read and write
|
||
1290000
|
direct allocation
|
page read and write
|
||
5B56000
|
trusted library allocation
|
page read and write
|
||
5B65000
|
trusted library allocation
|
page read and write
|
||
5B8D000
|
trusted library allocation
|
page read and write
|
||
625D000
|
trusted library allocation
|
page read and write
|
||
5B9E000
|
trusted library allocation
|
page read and write
|
||
60F8000
|
trusted library allocation
|
page read and write
|
||
5C01000
|
trusted library allocation
|
page read and write
|
||
1387000
|
heap
|
page read and write
|
||
1364000
|
heap
|
page read and write
|
||
5C43000
|
trusted library allocation
|
page read and write
|
||
5FE9000
|
trusted library allocation
|
page read and write
|
||
5BAC000
|
trusted library allocation
|
page read and write
|
||
5FE7000
|
trusted library allocation
|
page read and write
|
||
5BC2000
|
trusted library allocation
|
page read and write
|
||
4C01000
|
heap
|
page read and write
|
||
5FEF000
|
trusted library allocation
|
page read and write
|
||
5070000
|
remote allocation
|
page read and write
|
||
620F000
|
trusted library allocation
|
page read and write
|
||
5B6A000
|
trusted library allocation
|
page read and write
|
||
5B70000
|
trusted library allocation
|
page read and write
|
||
5B49000
|
trusted library allocation
|
page read and write
|
||
5B6A000
|
trusted library allocation
|
page read and write
|
||
612C000
|
trusted library allocation
|
page read and write
|
||
5C4B000
|
trusted library allocation
|
page read and write
|
||
60E2000
|
trusted library allocation
|
page read and write
|
||
629C000
|
trusted library allocation
|
page read and write
|
||
5BDF000
|
trusted library allocation
|
page read and write
|
||
5B51000
|
trusted library allocation
|
page read and write
|
||
5B90000
|
trusted library allocation
|
page read and write
|
||
5B65000
|
trusted library allocation
|
page read and write
|
||
611C000
|
trusted library allocation
|
page read and write
|
||
5FEC000
|
trusted library allocation
|
page read and write
|
||
5FE2000
|
trusted library allocation
|
page read and write
|
||
1386000
|
heap
|
page read and write
|
||
5B5E000
|
trusted library allocation
|
page read and write
|
||
5B90000
|
trusted library allocation
|
page read and write
|
||
5C43000
|
trusted library allocation
|
page read and write
|
||
5BA3000
|
trusted library allocation
|
page read and write
|
||
5D2A000
|
trusted library allocation
|
page read and write
|
||
5FE3000
|
trusted library allocation
|
page read and write
|
||
137D000
|
heap
|
page read and write
|
||
5FE0000
|
trusted library allocation
|
page read and write
|
||
5B71000
|
trusted library allocation
|
page read and write
|
||
5B7F000
|
trusted library allocation
|
page read and write
|
||
5B70000
|
trusted library allocation
|
page read and write
|
||
11E4000
|
heap
|
page read and write
|
||
5FE4000
|
trusted library allocation
|
page read and write
|
||
60A7000
|
trusted library allocation
|
page read and write
|
||
11E4000
|
heap
|
page read and write
|
||
5B73000
|
trusted library allocation
|
page read and write
|
||
60E0000
|
trusted library allocation
|
page read and write
|
||
5B7A000
|
trusted library allocation
|
page read and write
|
||
5FE3000
|
trusted library allocation
|
page read and write
|
||
6255000
|
trusted library allocation
|
page read and write
|
||
5BEB000
|
trusted library allocation
|
page read and write
|
||
5FE3000
|
trusted library allocation
|
page read and write
|
||
5FEE000
|
trusted library allocation
|
page read and write
|
||
5B90000
|
trusted library allocation
|
page read and write
|
||
5BAA000
|
trusted library allocation
|
page read and write
|
||
5B90000
|
trusted library allocation
|
page read and write
|
||
625F000
|
trusted library allocation
|
page read and write
|
||
5B65000
|
trusted library allocation
|
page read and write
|
||
611A000
|
trusted library allocation
|
page read and write
|
||
61F0000
|
trusted library allocation
|
page read and write
|
||
5FE3000
|
trusted library allocation
|
page read and write
|
||
5BD6000
|
trusted library allocation
|
page read and write
|
||
610C000
|
trusted library allocation
|
page read and write
|
||
5FEB000
|
trusted library allocation
|
page read and write
|
||
1398000
|
heap
|
page read and write
|
||
5B8B000
|
trusted library allocation
|
page read and write
|
||
61A9000
|
trusted library allocation
|
page read and write
|
||
5C41000
|
trusted library allocation
|
page read and write
|
||
60C2000
|
trusted library allocation
|
page read and write
|
||
5BB8000
|
trusted library allocation
|
page read and write
|
||
5FE4000
|
trusted library allocation
|
page read and write
|
||
5FE3000
|
trusted library allocation
|
page read and write
|
||
614C000
|
trusted library allocation
|
page read and write
|
||
5B5E000
|
trusted library allocation
|
page read and write
|
||
5B7C000
|
trusted library allocation
|
page read and write
|
||
5B5C000
|
trusted library allocation
|
page read and write
|
||
61FD000
|
trusted library allocation
|
page read and write
|
||
5B65000
|
trusted library allocation
|
page read and write
|
||
60E9000
|
trusted library allocation
|
page read and write
|
||
5B5E000
|
trusted library allocation
|
page read and write
|
||
5BC0000
|
trusted library allocation
|
page read and write
|
||
619E000
|
trusted library allocation
|
page read and write
|
||
11E4000
|
heap
|
page read and write
|
||
5B8E000
|
trusted library allocation
|
page read and write
|
||
5B48000
|
trusted library allocation
|
page read and write
|
||
608B000
|
trusted library allocation
|
page read and write
|
||
5B90000
|
trusted library allocation
|
page read and write
|
||
5B8A000
|
trusted library allocation
|
page read and write
|
||
5B7B000
|
trusted library allocation
|
page read and write
|
||
5B87000
|
trusted library allocation
|
page read and write
|
||
5B90000
|
trusted library allocation
|
page read and write
|
||
5BB1000
|
trusted library allocation
|
page read and write
|
||
5B90000
|
trusted library allocation
|
page read and write
|
||
5FE3000
|
trusted library allocation
|
page read and write
|
||
1395000
|
heap
|
page read and write
|
||
5B73000
|
trusted library allocation
|
page read and write
|
||
5FEF000
|
trusted library allocation
|
page read and write
|
||
1371000
|
heap
|
page read and write
|
||
5C51000
|
trusted library allocation
|
page read and write
|
||
5BC8000
|
trusted library allocation
|
page read and write
|
||
5B8C000
|
trusted library allocation
|
page read and write
|
||
5B5E000
|
trusted library allocation
|
page read and write
|
||
5B4D000
|
trusted library allocation
|
page read and write
|
||
6118000
|
trusted library allocation
|
page read and write
|
||
6239000
|
trusted library allocation
|
page read and write
|
||
5B90000
|
trusted library allocation
|
page read and write
|
||
5BAA000
|
trusted library allocation
|
page read and write
|
||
4C01000
|
heap
|
page read and write
|
||
6251000
|
trusted library allocation
|
page read and write
|
||
1371000
|
heap
|
page read and write
|
||
5B90000
|
trusted library allocation
|
page read and write
|
||
5B9C000
|
trusted library allocation
|
page read and write
|
||
5FEC000
|
trusted library allocation
|
page read and write
|
||
137D000
|
heap
|
page read and write
|
||
5B90000
|
trusted library allocation
|
page read and write
|
||
5B7A000
|
trusted library allocation
|
page read and write
|
||
61EE000
|
trusted library allocation
|
page read and write
|
||
5B7F000
|
trusted library allocation
|
page read and write
|
||
5FEF000
|
trusted library allocation
|
page read and write
|
||
5BBA000
|
trusted library allocation
|
page read and write
|
||
611A000
|
trusted library allocation
|
page read and write
|
||
5B9D000
|
trusted library allocation
|
page read and write
|
||
4C01000
|
heap
|
page read and write
|
||
5BA4000
|
trusted library allocation
|
page read and write
|
||
5B7A000
|
trusted library allocation
|
page read and write
|
||
5BE1000
|
trusted library allocation
|
page read and write
|
||
1390000
|
heap
|
page read and write
|
||
1384000
|
heap
|
page read and write
|
||
5B56000
|
trusted library allocation
|
page read and write
|
||
11E4000
|
heap
|
page read and write
|
||
5FE8000
|
trusted library allocation
|
page read and write
|
||
6138000
|
trusted library allocation
|
page read and write
|
||
5B90000
|
trusted library allocation
|
page read and write
|
||
5BAD000
|
trusted library allocation
|
page read and write
|
||
5BEB000
|
trusted library allocation
|
page read and write
|
||
5B4D000
|
trusted library allocation
|
page read and write
|
||
5B90000
|
trusted library allocation
|
page read and write
|
||
5B99000
|
trusted library allocation
|
page read and write
|
||
60FA000
|
trusted library allocation
|
page read and write
|
||
6135000
|
trusted library allocation
|
page read and write
|
||
1386000
|
heap
|
page read and write
|
||
60D3000
|
trusted library allocation
|
page read and write
|
||
6150000
|
trusted library allocation
|
page read and write
|
||
5FEE000
|
trusted library allocation
|
page read and write
|
||
5B75000
|
trusted library allocation
|
page read and write
|
||
5B65000
|
trusted library allocation
|
page read and write
|
||
5B6B000
|
trusted library allocation
|
page read and write
|
||
6080000
|
trusted library allocation
|
page read and write
|
||
5FE6000
|
trusted library allocation
|
page read and write
|
||
5B96000
|
trusted library allocation
|
page read and write
|
||
5FE3000
|
trusted library allocation
|
page read and write
|
||
5B50000
|
trusted library allocation
|
page read and write
|
||
4C01000
|
heap
|
page read and write
|
||
5BAB000
|
trusted library allocation
|
page read and write
|
||
5D22000
|
trusted library allocation
|
page read and write
|
||
5BD0000
|
trusted library allocation
|
page read and write
|
||
5B6B000
|
trusted library allocation
|
page read and write
|
||
5B8D000
|
trusted library allocation
|
page read and write
|
||
5BD9000
|
trusted library allocation
|
page read and write
|
||
5FEF000
|
trusted library allocation
|
page read and write
|
||
5A9000
|
unkown
|
page execute and write copy
|
||
60A4000
|
trusted library allocation
|
page read and write
|
||
1367000
|
heap
|
page read and write
|
||
5B7A000
|
trusted library allocation
|
page read and write
|
||
5B90000
|
trusted library allocation
|
page read and write
|
||
5FE2000
|
trusted library allocation
|
page read and write
|
||
1370000
|
heap
|
page read and write
|
||
138A000
|
heap
|
page read and write
|
||
5B50000
|
trusted library allocation
|
page read and write
|
||
5FE6000
|
trusted library allocation
|
page read and write
|
||
11E4000
|
heap
|
page read and write
|
||
6110000
|
trusted library allocation
|
page read and write
|
||
1386000
|
heap
|
page read and write
|
||
5B7A000
|
trusted library allocation
|
page read and write
|
||
5FE1000
|
trusted library allocation
|
page read and write
|
||
5BF9000
|
trusted library allocation
|
page read and write
|
||
5B5C000
|
trusted library allocation
|
page read and write
|
||
5B81000
|
trusted library allocation
|
page read and write
|
||
50C1000
|
direct allocation
|
page read and write
|
||
5B8C000
|
trusted library allocation
|
page read and write
|
||
62AB000
|
trusted library allocation
|
page read and write
|
||
610E000
|
trusted library allocation
|
page read and write
|
||
11E4000
|
heap
|
page read and write
|
||
11E4000
|
heap
|
page read and write
|
||
61AC000
|
trusted library allocation
|
page read and write
|
||
4C01000
|
heap
|
page read and write
|
||
5B58000
|
trusted library allocation
|
page read and write
|
||
1376000
|
heap
|
page read and write
|
||
1290000
|
direct allocation
|
page read and write
|
||
5B49000
|
trusted library allocation
|
page read and write
|
||
5B78000
|
trusted library allocation
|
page read and write
|
||
5BB2000
|
trusted library allocation
|
page read and write
|
||
5B75000
|
trusted library allocation
|
page read and write
|
||
4C01000
|
heap
|
page read and write
|
||
5B65000
|
trusted library allocation
|
page read and write
|
||
60B8000
|
trusted library allocation
|
page read and write
|
||
5FE4000
|
trusted library allocation
|
page read and write
|
||
5B65000
|
trusted library allocation
|
page read and write
|
||
5FE1000
|
trusted library allocation
|
page read and write
|
||
11E4000
|
heap
|
page read and write
|
||
5B8D000
|
trusted library allocation
|
page read and write
|
||
5FE6000
|
trusted library allocation
|
page read and write
|
||
1394000
|
heap
|
page read and write
|
||
5FE5000
|
trusted library allocation
|
page read and write
|
||
5BBA000
|
trusted library allocation
|
page read and write
|
||
5BA8000
|
trusted library allocation
|
page read and write
|
||
137E000
|
heap
|
page read and write
|
||
5B5C000
|
trusted library allocation
|
page read and write
|
||
60E8000
|
trusted library allocation
|
page read and write
|
||
5B65000
|
trusted library allocation
|
page read and write
|
||
611C000
|
trusted library allocation
|
page read and write
|
||
5B8C000
|
trusted library allocation
|
page read and write
|
||
60C0000
|
trusted library allocation
|
page read and write
|
||
5CA2000
|
trusted library allocation
|
page read and write
|
||
5BEB000
|
trusted library allocation
|
page read and write
|
||
5FE3000
|
trusted library allocation
|
page read and write
|
||
5B80000
|
trusted library allocation
|
page read and write
|
||
5FE8000
|
trusted library allocation
|
page read and write
|
||
1398000
|
heap
|
page read and write
|
||
5B98000
|
trusted library allocation
|
page read and write
|
||
1290000
|
direct allocation
|
page read and write
|
||
5BB4000
|
trusted library allocation
|
page read and write
|
||
5B73000
|
trusted library allocation
|
page read and write
|
||
5BB0000
|
trusted library allocation
|
page read and write
|
||
5FF1000
|
trusted library allocation
|
page read and write
|
||
138C000
|
heap
|
page read and write
|
||
5B90000
|
trusted library allocation
|
page read and write
|
||
5FE2000
|
trusted library allocation
|
page read and write
|
||
5BA2000
|
trusted library allocation
|
page read and write
|
||
5FE9000
|
trusted library allocation
|
page read and write
|
||
5FE2000
|
trusted library allocation
|
page read and write
|
||
5B78000
|
trusted library allocation
|
page read and write
|
||
612D000
|
trusted library allocation
|
page read and write
|
||
5FE6000
|
trusted library allocation
|
page read and write
|
||
138A000
|
heap
|
page read and write
|
||
6138000
|
trusted library allocation
|
page read and write
|
||
6075000
|
trusted library allocation
|
page read and write
|
||
5070000
|
remote allocation
|
page read and write
|
||
5B99000
|
trusted library allocation
|
page read and write
|
||
5B90000
|
trusted library allocation
|
page read and write
|
||
5C4B000
|
trusted library allocation
|
page read and write
|
||
5B65000
|
trusted library allocation
|
page read and write
|
||
5B65000
|
trusted library allocation
|
page read and write
|
||
5FEE000
|
trusted library allocation
|
page read and write
|
||
1290000
|
direct allocation
|
page read and write
|
||
6178000
|
trusted library allocation
|
page read and write
|
||
61DE000
|
trusted library allocation
|
page read and write
|
||
51F0000
|
direct allocation
|
page execute and read and write
|
||
1391000
|
heap
|
page read and write
|
||
6082000
|
trusted library allocation
|
page read and write
|
||
5B50000
|
trusted library allocation
|
page read and write
|
||
5FE4000
|
trusted library allocation
|
page read and write
|
||
6090000
|
trusted library allocation
|
page read and write
|
||
5B90000
|
trusted library allocation
|
page read and write
|
||
6092000
|
trusted library allocation
|
page read and write
|
||
137D000
|
heap
|
page read and write
|
||
5B86000
|
trusted library allocation
|
page read and write
|
||
1351000
|
heap
|
page read and write
|
||
6089000
|
trusted library allocation
|
page read and write
|
||
5FEB000
|
trusted library allocation
|
page read and write
|
||
6104000
|
trusted library allocation
|
page read and write
|
||
5B70000
|
trusted library allocation
|
page read and write
|
||
5FEC000
|
trusted library allocation
|
page read and write
|
||
5BC8000
|
trusted library allocation
|
page read and write
|
||
5B5C000
|
trusted library allocation
|
page read and write
|
||
612C000
|
trusted library allocation
|
page read and write
|
||
5FE4000
|
trusted library allocation
|
page read and write
|
||
5FEF000
|
trusted library allocation
|
page read and write
|
||
5B6A000
|
trusted library allocation
|
page read and write
|
||
4C01000
|
heap
|
page read and write
|
||
61ED000
|
trusted library allocation
|
page read and write
|
||
5FE0000
|
trusted library allocation
|
page read and write
|
||
4C01000
|
heap
|
page read and write
|
||
5FEB000
|
trusted library allocation
|
page read and write
|
||
1389000
|
heap
|
page read and write
|
||
612E000
|
trusted library allocation
|
page read and write
|
||
139E000
|
heap
|
page read and write
|
||
51D0000
|
direct allocation
|
page execute and read and write
|
||
5B90000
|
trusted library allocation
|
page read and write
|
There are 633 hidden memdumps, click here to show them.
DOM / HTML
URL
|
Malicious
|
|
---|---|---|
https://learn.microsoft.com/en-us/dotnet/framework/install/application-not-started?version=(null)&processName=file.exe&platform=0009&osver=6&isServer=0&shimver=4.0.30319.0
|
||
https://learn.microsoft.com/en-us/dotnet/framework/install/application-not-started?version=(null)&processName=file.exe&platform=0009&osver=6&isServer=0&shimver=4.0.30319.0
|
||
https://learn.microsoft.com/en-us/dotnet/framework/install/application-not-started?version=(null)&processName=file.exe&platform=0009&osver=6&isServer=0&shimver=4.0.30319.0
|
||
https://learn.microsoft.com/en-us/dotnet/framework/install/application-not-started?version=(null)&processName=file.exe&platform=0009&osver=6&isServer=0&shimver=4.0.30319.0
|
||
https://learn.microsoft.com/en-us/dotnet/framework/install/application-not-started?version=(null)&processName=file.exe&platform=0009&osver=6&isServer=0&shimver=4.0.30319.0
|