Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
file.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
initial sample
|
||
Chrome Cache Entry: 100
|
gzip compressed data, from TOPS/20, original size modulo 2^32 4897
|
downloaded
|
||
Chrome Cache Entry: 101
|
JSON data
|
dropped
|
||
Chrome Cache Entry: 102
|
JPEG image data, JFIF standard 1.01, aspect ratio, density 1x1, segment length 16, baseline, precision 8, 1528x402, components
3
|
downloaded
|
||
Chrome Cache Entry: 103
|
exported SGML document, ASCII text, with very long lines (65536), with no line terminators
|
dropped
|
||
Chrome Cache Entry: 104
|
ASCII text, with very long lines (46884)
|
dropped
|
||
Chrome Cache Entry: 105
|
ASCII text
|
dropped
|
||
Chrome Cache Entry: 106
|
gzip compressed data, from FAT filesystem (MS-DOS, OS/2, NT), original size modulo 2^32 1154
|
downloaded
|
||
Chrome Cache Entry: 107
|
Web Open Font Format (Version 2), TrueType, length 19696, version 1.0
|
downloaded
|
||
Chrome Cache Entry: 108
|
gzip compressed data, from TOPS/20, original size modulo 2^32 33148
|
downloaded
|
||
Chrome Cache Entry: 109
|
PNG image data, 475 x 212, 8-bit/color RGBA, non-interlaced
|
dropped
|
||
Chrome Cache Entry: 110
|
PNG image data, 658 x 480, 8-bit/color RGBA, non-interlaced
|
dropped
|
||
Chrome Cache Entry: 111
|
JSON data
|
dropped
|
||
Chrome Cache Entry: 112
|
gzip compressed data, from FAT filesystem (MS-DOS, OS/2, NT), original size modulo 2^32 47062
|
downloaded
|
||
Chrome Cache Entry: 113
|
gzip compressed data, from TOPS/20, original size modulo 2^32 3130
|
downloaded
|
||
Chrome Cache Entry: 114
|
PNG image data, 533 x 478, 8-bit/color RGBA, non-interlaced
|
dropped
|
||
Chrome Cache Entry: 74
|
PNG image data, 533 x 478, 8-bit/color RGBA, non-interlaced
|
dropped
|
||
Chrome Cache Entry: 75
|
PNG image data, 533 x 478, 8-bit/color RGBA, non-interlaced
|
downloaded
|
||
Chrome Cache Entry: 76
|
SVG Scalable Vector Graphics image
|
dropped
|
||
Chrome Cache Entry: 77
|
JSON data
|
dropped
|
||
Chrome Cache Entry: 78
|
PNG image data, 533 x 478, 8-bit/color RGBA, non-interlaced
|
dropped
|
||
Chrome Cache Entry: 79
|
gzip compressed data, from FAT filesystem (MS-DOS, OS/2, NT), original size modulo 2^32 464328
|
downloaded
|
||
Chrome Cache Entry: 80
|
ASCII text, with very long lines (65410)
|
dropped
|
||
Chrome Cache Entry: 81
|
JSON data
|
dropped
|
||
Chrome Cache Entry: 82
|
ASCII text, with very long lines (65410)
|
downloaded
|
||
Chrome Cache Entry: 83
|
gzip compressed data, from TOPS/20, original size modulo 2^32 25553
|
downloaded
|
||
Chrome Cache Entry: 84
|
PNG image data, 533 x 478, 8-bit/color RGBA, non-interlaced
|
downloaded
|
||
Chrome Cache Entry: 85
|
ASCII text, with very long lines (52717), with no line terminators
|
dropped
|
||
Chrome Cache Entry: 86
|
gzip compressed data, from FAT filesystem (MS-DOS, OS/2, NT), original size modulo 2^32 1432
|
downloaded
|
||
Chrome Cache Entry: 87
|
ASCII text, with very long lines (52717), with no line terminators
|
downloaded
|
||
Chrome Cache Entry: 88
|
gzip compressed data, from TOPS/20, original size modulo 2^32 1173007
|
downloaded
|
||
Chrome Cache Entry: 89
|
ASCII text, with no line terminators
|
downloaded
|
||
Chrome Cache Entry: 90
|
PNG image data, 533 x 478, 8-bit/color RGBA, non-interlaced
|
downloaded
|
||
Chrome Cache Entry: 91
|
MS Windows icon resource - 6 icons, -128x-128, 16 colors, 72x72, 16 colors
|
downloaded
|
||
Chrome Cache Entry: 92
|
gzip compressed data, from FAT filesystem (MS-DOS, OS/2, NT), original size modulo 2^32 1817143
|
downloaded
|
||
Chrome Cache Entry: 93
|
JSON data
|
dropped
|
||
Chrome Cache Entry: 94
|
MS Windows icon resource - 6 icons, -128x-128, 16 colors, 72x72, 16 colors
|
dropped
|
||
Chrome Cache Entry: 95
|
PNG image data, 658 x 480, 8-bit/color RGBA, non-interlaced
|
downloaded
|
||
Chrome Cache Entry: 96
|
ASCII text, with very long lines (33148), with no line terminators
|
dropped
|
||
Chrome Cache Entry: 97
|
gzip compressed data, from TOPS/20, original size modulo 2^32 5644
|
downloaded
|
||
Chrome Cache Entry: 98
|
JPEG image data, JFIF standard 1.01, aspect ratio, density 1x1, segment length 16, baseline, precision 8, 1528x402, components
3
|
dropped
|
||
Chrome Cache Entry: 99
|
PNG image data, 475 x 212, 8-bit/color RGBA, non-interlaced
|
downloaded
|
There are 32 hidden files, click here to show them.
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\file.exe
|
"C:\Users\user\Desktop\file.exe"
|
||
C:\Program Files\Google\Chrome\Application\chrome.exe
|
"C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized --single-argument http://go.microsoft.com/fwlink/?prd=11324&pver=4.5&sbp=AppLaunch2&plcid=0x409&o1=SHIM_NOVERSION_FOUND&version=(null)&processName=file.exe&platform=0009&osver=6&isServer=0&shimver=4.0.30319.0
|
||
C:\Program Files\Google\Chrome\Application\chrome.exe
|
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US
--service-sandbox-type=none --mojo-platform-channel-handle=2184 --field-trial-handle=1912,i,18367878757296781263,2772418614693256820,262144
--disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction
/prefetch:8
|
||
C:\Program Files\Google\Chrome\Application\chrome.exe
|
"C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized --single-argument http://go.microsoft.com/fwlink/?prd=11324&pver=4.5&sbp=AppLaunch2&plcid=0x409&o1=SHIM_NOVERSION_FOUND&version=(null)&processName=file.exe&platform=0009&osver=6&isServer=0&shimver=4.0.30319.0
|
||
C:\Program Files\Google\Chrome\Application\chrome.exe
|
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US
--service-sandbox-type=none --mojo-platform-channel-handle=2108 --field-trial-handle=1920,i,1634595659012258759,6139322719468599713,262144
--disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction
/prefetch:8
|
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
https://www.amazon.com/?tag=admarketus-20&ref=pd_sl_ef0fa27a12d43fbd45649e195429e8a63ddcad7cf7e128c0
|
unknown
|
||
https://duckduckgo.com/chrome_newtab
|
unknown
|
||
dare-curbys.biz
|
|||
impend-differ.biz
|
|||
https://atten-supporse.biz/F
|
unknown
|
||
https://duckduckgo.com/ac/?q=
|
unknown
|
||
https://atten-supporse.biz/P
|
unknown
|
||
https://www.linkedin.com/cws/share?url=$
|
unknown
|
||
https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
|
unknown
|
||
https://atten-supporse.biz/apiogb
|
unknown
|
||
https://management.azure.com/providers/Microsoft.Portal/userSettings/cloudconsole?api-version=2023-0
|
unknown
|
||
dwell-exclaim.biz
|
|||
https://aka.ms/msignite_docs_banner
|
unknown
|
||
https://videoencodingpublic-hgeaeyeba8gycee3.b01.azurefd.net/public-b4da8140-92cf-421c-8b7b-e471d5b9
|
unknown
|
||
http://polymer.github.io/AUTHORS.txt
|
unknown
|
||
https://atten-supporse.biz/apih
|
unknown
|
||
https://management.azure.com/subscriptions?api-version=2016-06-01
|
unknown
|
||
zinc-sneark.biz
|
|||
http://x1.c.lencr.org/0
|
unknown
|
||
http://x1.i.lencr.org/0
|
unknown
|
||
https://aka.ms/pshelpmechoose
|
unknown
|
||
https://aka.ms/feedback/report?space=61
|
unknown
|
||
https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
|
unknown
|
||
formy-spill.biz
|
|||
https://atten-supporse.biz/8
|
unknown
|
||
https://learn-video.azurefd.net/vod/player
|
unknown
|
||
https://twitter.com/intent/tweet?original_referer=$
|
unknown
|
||
se-blurry.biz
|
|||
http://185.215.113.16/off/def.exeXSb
|
unknown
|
||
https://support.mozilla.org/products/firefoxgro.all
|
unknown
|
||
http://polymer.github.io/CONTRIBUTORS.txt
|
unknown
|
||
https://atten-supporse.biz/apiB
|
unknown
|
||
https://client-api.arkoselabs.com/v2/api.js
|
unknown
|
||
https://aka.ms/MSIgniteChallenge/Tier1Banner?wt.mc_id=ignite24_learnbanner_tier1_cnl
|
unknown
|
||
https://management.azure.com/providers/Microsoft.Portal/consoles/default?api-version=2017-12-01-prev
|
unknown
|
||
https://www.google.com/images/branding/product/ico/googleg_lodp.ico
|
unknown
|
||
covery-mover.biz
|
|||
http://go.microsoft.co:
|
unknown
|
||
http://polymer.github.io/PATENTS.txt
|
unknown
|
||
https://aka.ms/certhelp
|
unknown
|
||
http://185.215.113.16/steam/random.exe
|
unknown
|
||
https://bridge.sfo1.admarketplace.net/ctp?version=16.0.0&key=1696490019400400000.2&ci=1696490019252.
|
unknown
|
||
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
|
unknown
|
||
http://crl.rootca1.amazontrust.com/rootca1.crl0
|
unknown
|
||
https://atten-supporse.biz/api
|
104.21.48.1
|
||
http://ocsp.rootca1.amazontrust.com0:
|
unknown
|
||
https://schema.org
|
unknown
|
||
http://polymer.github.io/LICENSE.txt
|
unknown
|
||
https://www.ecosia.org/newtab/
|
unknown
|
||
https://atten-supporse.biz/apiP
|
unknown
|
||
https://support.mozilla.org/kb/customize-firefox-controls-buttons-and-toolbars?utm_source=firefox-br
|
unknown
|
||
https://ac.ecosia.org/autocomplete?q=
|
unknown
|
||
https://videoencodingpublic-hgeaeyeba8gycee3.b01.azurefd.net/public-09ce73a6-05a5-4e4d-b3d7-bd5a8c05
|
unknown
|
||
https://contile-images.services.mozilla.com/obgoOYObjIFea_bXuT6L4LbBJ8j425AD87S1HMD3BWg.9991.jpg
|
unknown
|
||
https://github.com/jonschlinkert/is-plain-object
|
unknown
|
||
http://crt.rootca1.amazontrust.com/rootca1.cer0?
|
unknown
|
||
https://octokit.github.io/rest.js/#throttling
|
unknown
|
||
https://www.invisalign.com/?utm_source=admarketplace&utm_medium=paidsearch&utm_campaign=Invisalign&u
|
unknown
|
||
https://imp.mt48.net/static?id=7RHzfOIXjFEYsBdvIpkX4Qqm4pqWfpl%2B4pbW4pbWfpbW7ReNxR3UIG8zInwYIFIVs9e
|
unknown
|
||
atten-supporse.biz
|
|||
https://contile-images.services.mozilla.com/CuERQnIs4CzqjKBh9os6_h9d4CUDCHO3oiqmAQO6VLM.25122.jpg
|
unknown
|
||
https://github.com/js-cookie/js-cookie
|
unknown
|
||
http://185.215.113.16/off/def.exe
|
unknown
|
||
https://atten-supporse.biz/
|
unknown
|
||
print-vexer.biz
|
|||
https://channel9.msdn.com/
|
unknown
|
||
https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
|
unknown
|
||
https://github.com/dotnet/try
|
unknown
|
||
https://bridge.sfo1.ap01.net/ctp?version=16.0.0&key=1696490019400400000.1&ci=1696490019252.12791&cta
|
unknown
|
There are 59 hidden URLs, click here to show them.
Domains
Name
|
IP
|
Malicious
|
|
---|---|---|---|
atten-supporse.biz
|
104.21.48.1
|
||
www.google.com
|
142.250.181.68
|
||
s-part-0035.t-0009.t-msedge.net
|
13.107.246.63
|
||
js.monitor.azure.com
|
unknown
|
||
mdec.nelreports.net
|
unknown
|
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
192.168.2.7
|
unknown
|
unknown
|
||
104.21.48.1
|
atten-supporse.biz
|
United States
|
||
192.168.2.16
|
unknown
|
unknown
|
||
185.215.113.16
|
unknown
|
Portugal
|
||
239.255.255.250
|
unknown
|
Reserved
|
||
142.250.181.68
|
www.google.com
|
United States
|
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
B61000
|
unkown
|
page execute and read and write
|
||
1655000
|
heap
|
page read and write
|
||
7C0E000
|
stack
|
page read and write
|
||
4E80000
|
heap
|
page read and write
|
||
6111000
|
trusted library allocation
|
page read and write
|
||
5F10000
|
trusted library allocation
|
page read and write
|
||
30E0000
|
direct allocation
|
page read and write
|
||
5E30000
|
trusted library allocation
|
page read and write
|
||
5E39000
|
trusted library allocation
|
page read and write
|
||
5E11000
|
trusted library allocation
|
page read and write
|
||
5E61000
|
trusted library allocation
|
page read and write
|
||
5E10000
|
trusted library allocation
|
page read and write
|
||
87AC000
|
stack
|
page read and write
|
||
5E47000
|
trusted library allocation
|
page read and write
|
||
5EAA000
|
trusted library allocation
|
page read and write
|
||
3D3E000
|
stack
|
page read and write
|
||
5E65000
|
trusted library allocation
|
page read and write
|
||
7049F000
|
unkown
|
page readonly
|
||
55ED000
|
stack
|
page read and write
|
||
62B0000
|
trusted library allocation
|
page read and write
|
||
5EB7000
|
trusted library allocation
|
page read and write
|
||
A1F0000
|
trusted library allocation
|
page read and write
|
||
3BBF000
|
stack
|
page read and write
|
||
165F000
|
heap
|
page read and write
|
||
637F000
|
trusted library allocation
|
page read and write
|
||
75CE000
|
stack
|
page read and write
|
||
5F29000
|
trusted library allocation
|
page read and write
|
||
E12000
|
unkown
|
page execute and read and write
|
||
63EC000
|
trusted library allocation
|
page read and write
|
||
6345000
|
trusted library allocation
|
page read and write
|
||
62B2000
|
trusted library allocation
|
page read and write
|
||
5E30000
|
trusted library allocation
|
page read and write
|
||
63A4000
|
trusted library allocation
|
page read and write
|
||
165F000
|
heap
|
page read and write
|
||
5E39000
|
trusted library allocation
|
page read and write
|
||
69A0000
|
trusted library allocation
|
page read and write
|
||
63FE000
|
trusted library allocation
|
page read and write
|
||
62BE000
|
trusted library allocation
|
page read and write
|
||
64A1000
|
trusted library allocation
|
page read and write
|
||
3ABE000
|
stack
|
page read and write
|
||
54B0000
|
direct allocation
|
page execute and read and write
|
||
6816000
|
trusted library allocation
|
page read and write
|
||
62B6000
|
trusted library allocation
|
page read and write
|
||
5EB3000
|
trusted library allocation
|
page read and write
|
||
5E29000
|
trusted library allocation
|
page read and write
|
||
62B4000
|
trusted library allocation
|
page read and write
|
||
5F2A000
|
trusted library allocation
|
page read and write
|
||
6347000
|
trusted library allocation
|
page read and write
|
||
62B2000
|
trusted library allocation
|
page read and write
|
||
6619000
|
trusted library allocation
|
page read and write
|
||
1661000
|
heap
|
page read and write
|
||
165C000
|
heap
|
page read and write
|
||
177E000
|
stack
|
page read and write
|
||
5EA6000
|
trusted library allocation
|
page read and write
|
||
5EAF000
|
trusted library allocation
|
page read and write
|
||
71CF000
|
stack
|
page read and write
|
||
62BF000
|
trusted library allocation
|
page read and write
|
||
167A000
|
heap
|
page read and write
|
||
67F0000
|
direct allocation
|
page read and write
|
||
642C000
|
trusted library allocation
|
page read and write
|
||
54FF000
|
trusted library allocation
|
page read and write
|
||
5E39000
|
trusted library allocation
|
page read and write
|
||
158A000
|
heap
|
page read and write
|
||
63F9000
|
trusted library allocation
|
page read and write
|
||
5E31000
|
trusted library allocation
|
page read and write
|
||
397E000
|
stack
|
page read and write
|
||
3CFF000
|
stack
|
page read and write
|
||
1673000
|
heap
|
page read and write
|
||
61C5000
|
trusted library allocation
|
page read and write
|
||
635A000
|
trusted library allocation
|
page read and write
|
||
1659000
|
heap
|
page read and write
|
||
8770000
|
direct allocation
|
page read and write
|
||
63B2000
|
trusted library allocation
|
page execute and read and write
|
||
1622000
|
heap
|
page read and write
|
||
61FD000
|
trusted library allocation
|
page read and write
|
||
62BE000
|
trusted library allocation
|
page read and write
|
||
5E66000
|
trusted library allocation
|
page read and write
|
||
5E49000
|
trusted library allocation
|
page read and write
|
||
6445000
|
trusted library allocation
|
page read and write
|
||
7D4E000
|
stack
|
page read and write
|
||
5EBA000
|
trusted library allocation
|
page read and write
|
||
5E6F000
|
trusted library allocation
|
page read and write
|
||
63BA000
|
trusted library allocation
|
page execute and read and write
|
||
1580000
|
heap
|
page read and write
|
||
644F000
|
trusted library allocation
|
page read and write
|
||
5EA6000
|
trusted library allocation
|
page read and write
|
||
3BFE000
|
stack
|
page read and write
|
||
62BE000
|
trusted library allocation
|
page read and write
|
||
63D4000
|
trusted library allocation
|
page read and write
|
||
4EA1000
|
heap
|
page read and write
|
||
309E000
|
stack
|
page read and write
|
||
6818000
|
trusted library allocation
|
page read and write
|
||
5E12000
|
trusted library allocation
|
page read and write
|
||
5E18000
|
trusted library allocation
|
page read and write
|
||
6F4F000
|
stack
|
page read and write
|
||
89CA000
|
trusted library allocation
|
page read and write
|
||
63D8000
|
trusted library allocation
|
page read and write
|
||
14E0000
|
heap
|
page read and write
|
||
5E55000
|
trusted library allocation
|
page read and write
|
||
5E41000
|
trusted library allocation
|
page read and write
|
||
5E40000
|
trusted library allocation
|
page read and write
|
||
62B3000
|
trusted library allocation
|
page read and write
|
||
167A000
|
heap
|
page read and write
|
||
531D000
|
stack
|
page read and write
|
||
5E66000
|
trusted library allocation
|
page read and write
|
||
650B000
|
trusted library allocation
|
page read and write
|
||
5E60000
|
trusted library allocation
|
page read and write
|
||
8710000
|
direct allocation
|
page read and write
|
||
63FC000
|
trusted library allocation
|
page read and write
|
||
798E000
|
stack
|
page read and write
|
||
8DBE000
|
stack
|
page read and write
|
||
8710000
|
direct allocation
|
page read and write
|
||
5E45000
|
trusted library allocation
|
page read and write
|
||
649E000
|
trusted library allocation
|
page read and write
|
||
62B2000
|
trusted library allocation
|
page read and write
|
||
824E000
|
stack
|
page read and write
|
||
4EA1000
|
heap
|
page read and write
|
||
5F52000
|
trusted library allocation
|
page read and write
|
||
744F000
|
stack
|
page read and write
|
||
8710000
|
direct allocation
|
page read and write
|
||
5E39000
|
trusted library allocation
|
page read and write
|
||
5E11000
|
trusted library allocation
|
page read and write
|
||
8770000
|
direct allocation
|
page read and write
|
||
8710000
|
direct allocation
|
page read and write
|
||
665E000
|
trusted library allocation
|
page execute and read and write
|
||
546F000
|
stack
|
page read and write
|
||
1651000
|
heap
|
page read and write
|
||
4EB0000
|
heap
|
page read and write
|
||
5EBA000
|
trusted library allocation
|
page read and write
|
||
5E40000
|
trusted library allocation
|
page read and write
|
||
1661000
|
heap
|
page read and write
|
||
6E4E000
|
stack
|
page read and write
|
||
62BC000
|
trusted library allocation
|
page read and write
|
||
5EBA000
|
trusted library allocation
|
page read and write
|
||
62B4000
|
trusted library allocation
|
page read and write
|
||
64DF000
|
trusted library allocation
|
page read and write
|
||
433F000
|
stack
|
page read and write
|
||
5E90000
|
trusted library allocation
|
page read and write
|
||
62BD000
|
trusted library allocation
|
page read and write
|
||
5E3C000
|
trusted library allocation
|
page read and write
|
||
5E29000
|
trusted library allocation
|
page read and write
|
||
62B4000
|
trusted library allocation
|
page read and write
|
||
4C3E000
|
stack
|
page read and write
|
||
46FF000
|
stack
|
page read and write
|
||
6399000
|
trusted library allocation
|
page read and write
|
||
5E7F000
|
trusted library allocation
|
page read and write
|
||
8710000
|
direct allocation
|
page read and write
|
||
7BCF000
|
stack
|
page read and write
|
||
5F49000
|
trusted library allocation
|
page read and write
|
||
54B0000
|
direct allocation
|
page execute and read and write
|
||
423E000
|
stack
|
page read and write
|
||
B60000
|
unkown
|
page readonly
|
||
62B1000
|
trusted library allocation
|
page read and write
|
||
6447000
|
trusted library allocation
|
page read and write
|
||
62B8000
|
trusted library allocation
|
page read and write
|
||
63F3000
|
trusted library allocation
|
page read and write
|
||
5E58000
|
trusted library allocation
|
page read and write
|
||
5EFA000
|
trusted library allocation
|
page read and write
|
||
62B6000
|
trusted library allocation
|
page read and write
|
||
62B6000
|
trusted library allocation
|
page read and write
|
||
6376000
|
trusted library allocation
|
page read and write
|
||
1670000
|
heap
|
page read and write
|
||
166A000
|
heap
|
page read and write
|
||
4BFF000
|
stack
|
page read and write
|
||
5E30000
|
trusted library allocation
|
page read and write
|
||
167A000
|
heap
|
page read and write
|
||
62BE000
|
trusted library allocation
|
page read and write
|
||
6D0E000
|
stack
|
page read and write
|
||
647F000
|
trusted library allocation
|
page read and write
|
||
5EBA000
|
trusted library allocation
|
page read and write
|
||
473E000
|
stack
|
page read and write
|
||
64BD000
|
trusted library allocation
|
page read and write
|
||
138B000
|
stack
|
page read and write
|
||
357F000
|
stack
|
page read and write
|
||
8710000
|
direct allocation
|
page read and write
|
||
70496000
|
unkown
|
page execute and read and write
|
||
30F0000
|
heap
|
page read and write
|
||
62B5000
|
trusted library allocation
|
page read and write
|
||
5E73000
|
trusted library allocation
|
page read and write
|
||
6E0F000
|
stack
|
page read and write
|
||
5E53000
|
trusted library allocation
|
page read and write
|
||
5B5E000
|
stack
|
page read and write
|
||
652F000
|
trusted library allocation
|
page read and write
|
||
834F000
|
stack
|
page read and write
|
||
63F1000
|
trusted library allocation
|
page read and write
|
||
62B1000
|
trusted library allocation
|
page read and write
|
||
860E000
|
stack
|
page read and write
|
||
30E0000
|
direct allocation
|
page read and write
|
||
5F18000
|
trusted library allocation
|
page read and write
|
||
63B5000
|
trusted library allocation
|
page read and write
|
||
636A000
|
trusted library allocation
|
page read and write
|
||
5E39000
|
trusted library allocation
|
page read and write
|
||
6383000
|
trusted library allocation
|
page read and write
|
||
164D000
|
heap
|
page read and write
|
||
62B4000
|
trusted library allocation
|
page read and write
|
||
1667000
|
heap
|
page read and write
|
||
611D000
|
trusted library allocation
|
page read and write
|
||
6381000
|
trusted library allocation
|
page read and write
|
||
5E1B000
|
trusted library allocation
|
page read and write
|
||
5FFE000
|
trusted library allocation
|
page read and write
|
||
5E39000
|
trusted library allocation
|
page read and write
|
||
820F000
|
stack
|
page read and write
|
||
794F000
|
stack
|
page read and write
|
||
5E65000
|
trusted library allocation
|
page read and write
|
||
4EA1000
|
heap
|
page read and write
|
||
62B3000
|
trusted library allocation
|
page read and write
|
||
63C2000
|
trusted library allocation
|
page read and write
|
||
62B3000
|
trusted library allocation
|
page read and write
|
||
8710000
|
direct allocation
|
page read and write
|
||
5E30000
|
trusted library allocation
|
page read and write
|
||
1664000
|
heap
|
page read and write
|
||
FF4000
|
unkown
|
page execute and write copy
|
||
5E2A000
|
trusted library allocation
|
page read and write
|
||
32FF000
|
stack
|
page read and write
|
||
87C0000
|
heap
|
page read and write
|
||
6149000
|
stack
|
page read and write
|
||
4E7F000
|
stack
|
page read and write
|
||
6383000
|
trusted library allocation
|
page read and write
|
||
5F18000
|
trusted library allocation
|
page read and write
|
||
A130000
|
trusted library allocation
|
page read and write
|
||
1651000
|
heap
|
page read and write
|
||
62C0000
|
trusted library allocation
|
page read and write
|
||
639A000
|
trusted library allocation
|
page read and write
|
||
758F000
|
stack
|
page read and write
|
||
5E39000
|
trusted library allocation
|
page read and write
|
||
54C0000
|
direct allocation
|
page execute and read and write
|
||
4EA1000
|
heap
|
page read and write
|
||
62B9000
|
trusted library allocation
|
page read and write
|
||
41FF000
|
stack
|
page read and write
|
||
4EA1000
|
heap
|
page read and write
|
||
88CE000
|
stack
|
page read and write
|
||
848F000
|
stack
|
page read and write
|
||
5E58000
|
trusted library allocation
|
page read and write
|
||
5E90000
|
trusted library allocation
|
page read and write
|
||
8710000
|
direct allocation
|
page read and write
|
||
6ABD000
|
trusted library allocation
|
page read and write
|
||
5E3F000
|
trusted library allocation
|
page read and write
|
||
5E36000
|
trusted library allocation
|
page read and write
|
||
1400000
|
heap
|
page read and write
|
||
13D5000
|
heap
|
page read and write
|
||
62BF000
|
trusted library allocation
|
page read and write
|
||
4D3F000
|
stack
|
page read and write
|
||
5E71000
|
trusted library allocation
|
page read and write
|
||
5E29000
|
trusted library allocation
|
page read and write
|
||
8D7C000
|
stack
|
page read and write
|
||
61F5000
|
trusted library allocation
|
page read and write
|
||
166F000
|
heap
|
page read and write
|
||
5E11000
|
trusted library allocation
|
page read and write
|
||
FF3000
|
unkown
|
page execute and read and write
|
||
5E36000
|
trusted library allocation
|
page read and write
|
||
8710000
|
direct allocation
|
page read and write
|
||
5E11000
|
trusted library allocation
|
page read and write
|
||
5E3F000
|
trusted library allocation
|
page read and write
|
||
63B3000
|
trusted library allocation
|
page read and write
|
||
596F000
|
stack
|
page read and write
|
||
1654000
|
heap
|
page read and write
|
||
5E0E000
|
stack
|
page read and write
|
||
5E1B000
|
trusted library allocation
|
page read and write
|
||
7E8E000
|
stack
|
page read and write
|
||
6363000
|
trusted library allocation
|
page read and write
|
||
6175000
|
trusted library allocation
|
page read and write
|
||
166F000
|
heap
|
page read and write
|
||
163D000
|
heap
|
page read and write
|
||
1664000
|
heap
|
page read and write
|
||
62B9000
|
trusted library allocation
|
page read and write
|
||
5E5F000
|
trusted library allocation
|
page read and write
|
||
5490000
|
direct allocation
|
page execute and read and write
|
||
5E68000
|
trusted library allocation
|
page read and write
|
||
5330000
|
direct allocation
|
page read and write
|
||
4EA1000
|
heap
|
page read and write
|
||
5E66000
|
trusted library allocation
|
page read and write
|
||
1652000
|
heap
|
page read and write
|
||
5E85000
|
trusted library allocation
|
page read and write
|
||
62B4000
|
trusted library allocation
|
page read and write
|
||
8750000
|
trusted library allocation
|
page read and write
|
||
5F1A000
|
trusted library allocation
|
page read and write
|
||
63DA000
|
trusted library allocation
|
page read and write
|
||
5E47000
|
trusted library allocation
|
page read and write
|
||
635E000
|
trusted library allocation
|
page read and write
|
||
62BD000
|
trusted library allocation
|
page read and write
|
||
8710000
|
direct allocation
|
page read and write
|
||
67EE000
|
stack
|
page read and write
|
||
7A8F000
|
stack
|
page read and write
|
||
62C0000
|
trusted library allocation
|
page read and write
|
||
5EBA000
|
trusted library allocation
|
page read and write
|
||
63FB000
|
trusted library allocation
|
page read and write
|
||
636C000
|
trusted library allocation
|
page read and write
|
||
62BF000
|
trusted library allocation
|
page read and write
|
||
5CC0000
|
heap
|
page read and write
|
||
5E28000
|
trusted library allocation
|
page read and write
|
||
63A5000
|
trusted library allocation
|
page read and write
|
||
8710000
|
direct allocation
|
page read and write
|
||
1654000
|
heap
|
page read and write
|
||
E3D000
|
unkown
|
page execute and read and write
|
||
E55000
|
unkown
|
page execute and read and write
|
||
5E30000
|
trusted library allocation
|
page read and write
|
||
1667000
|
heap
|
page read and write
|
||
5F41000
|
trusted library allocation
|
page read and write
|
||
5F18000
|
trusted library allocation
|
page read and write
|
||
7FCE000
|
stack
|
page read and write
|
||
5EA6000
|
trusted library allocation
|
page read and write
|
||
6352000
|
trusted library allocation
|
page read and write
|
||
45BF000
|
stack
|
page read and write
|
||
5E2C000
|
trusted library allocation
|
page read and write
|
||
62BE000
|
trusted library allocation
|
page read and write
|
||
5E2F000
|
trusted library allocation
|
page read and write
|
||
BB3000
|
unkown
|
page write copy
|
||
6117000
|
trusted library allocation
|
page read and write
|
||
54B0000
|
direct allocation
|
page execute and read and write
|
||
1667000
|
heap
|
page read and write
|
||
7D0F000
|
stack
|
page read and write
|
||
54D0000
|
direct allocation
|
page execute and read and write
|
||
49BE000
|
stack
|
page read and write
|
||
62B1000
|
trusted library allocation
|
page read and write
|
||
1651000
|
heap
|
page read and write
|
||
8EBE000
|
stack
|
page read and write
|
||
5E1B000
|
trusted library allocation
|
page read and write
|
||
720E000
|
stack
|
page read and write
|
||
770E000
|
stack
|
page read and write
|
||
63B3000
|
trusted library allocation
|
page read and write
|
||
56EC000
|
stack
|
page read and write
|
||
62B8000
|
trusted library allocation
|
page read and write
|
||
4EA1000
|
heap
|
page read and write
|
||
6460000
|
trusted library allocation
|
page read and write
|
||
5EB0000
|
trusted library allocation
|
page read and write
|
||
6358000
|
trusted library allocation
|
page read and write
|
||
3FBE000
|
stack
|
page read and write
|
||
3E7E000
|
stack
|
page read and write
|
||
63B5000
|
trusted library allocation
|
page read and write
|
||
5F54000
|
trusted library allocation
|
page read and write
|
||
5E39000
|
trusted library allocation
|
page read and write
|
||
62B2000
|
trusted library allocation
|
page read and write
|
||
6115000
|
trusted library allocation
|
page read and write
|
||
62B5000
|
trusted library allocation
|
page read and write
|
||
638B000
|
trusted library allocation
|
page read and write
|
||
437E000
|
stack
|
page read and write
|
||
536B000
|
stack
|
page read and write
|
||
582F000
|
stack
|
page read and write
|
||
6400000
|
trusted library allocation
|
page read and write
|
||
63B1000
|
trusted library allocation
|
page read and write
|
||
784E000
|
stack
|
page read and write
|
||
8C7C000
|
stack
|
page read and write
|
||
4EA1000
|
heap
|
page read and write
|
||
1654000
|
heap
|
page read and write
|
||
63B0000
|
trusted library allocation
|
page read and write
|
||
1660000
|
heap
|
page read and write
|
||
52E0000
|
trusted library allocation
|
page read and write
|
||
6540000
|
trusted library allocation
|
page execute and read and write
|
||
63A2000
|
trusted library allocation
|
page read and write
|
||
5E67000
|
trusted library allocation
|
page read and write
|
||
63CE000
|
trusted library allocation
|
page read and write
|
||
810E000
|
stack
|
page read and write
|
||
1658000
|
heap
|
page read and write
|
||
30E0000
|
direct allocation
|
page read and write
|
||
6488000
|
trusted library allocation
|
page read and write
|
||
664F000
|
trusted library allocation
|
page execute and read and write
|
||
36BF000
|
stack
|
page read and write
|
||
165F000
|
heap
|
page read and write
|
||
6365000
|
trusted library allocation
|
page read and write
|
||
5E56000
|
trusted library allocation
|
page read and write
|
||
5E47000
|
trusted library allocation
|
page read and write
|
||
5E39000
|
trusted library allocation
|
page read and write
|
||
8710000
|
direct allocation
|
page read and write
|
||
5E61000
|
trusted library allocation
|
page read and write
|
||
63FE000
|
trusted library allocation
|
page read and write
|
||
62B4000
|
trusted library allocation
|
page read and write
|
||
730F000
|
stack
|
page read and write
|
||
6360000
|
trusted library allocation
|
page read and write
|
||
5E58000
|
trusted library allocation
|
page read and write
|
||
62BC000
|
trusted library allocation
|
page read and write
|
||
5EB3000
|
trusted library allocation
|
page read and write
|
||
6385000
|
trusted library allocation
|
page read and write
|
||
62BE000
|
trusted library allocation
|
page read and write
|
||
393F000
|
stack
|
page read and write
|
||
5E29000
|
trusted library allocation
|
page read and write
|
||
63B3000
|
trusted library allocation
|
page read and write
|
||
5EA6000
|
trusted library allocation
|
page read and write
|
||
483F000
|
stack
|
page read and write
|
||
30E0000
|
direct allocation
|
page read and write
|
||
5E70000
|
trusted library allocation
|
page read and write
|
||
62B3000
|
trusted library allocation
|
page read and write
|
||
343F000
|
stack
|
page read and write
|
||
5E39000
|
trusted library allocation
|
page read and write
|
||
5F3D000
|
trusted library allocation
|
page read and write
|
||
63C6000
|
trusted library allocation
|
page read and write
|
||
154E000
|
stack
|
page read and write
|
||
30E0000
|
direct allocation
|
page read and write
|
||
64EE000
|
trusted library allocation
|
page read and write
|
||
4EA1000
|
heap
|
page read and write
|
||
5E39000
|
trusted library allocation
|
page read and write
|
||
62B2000
|
trusted library allocation
|
page read and write
|
||
5EA6000
|
trusted library allocation
|
page read and write
|
||
62B3000
|
trusted library allocation
|
page read and write
|
||
44BE000
|
stack
|
page read and write
|
||
628D000
|
trusted library allocation
|
page read and write
|
||
88D0000
|
direct allocation
|
page execute and read and write
|
||
5E50000
|
trusted library allocation
|
page read and write
|
||
5E4E000
|
trusted library allocation
|
page read and write
|
||
5E58000
|
trusted library allocation
|
page read and write
|
||
5E29000
|
trusted library allocation
|
page read and write
|
||
62B3000
|
trusted library allocation
|
page read and write
|
||
62B2000
|
trusted library allocation
|
page read and write
|
||
59EE000
|
stack
|
page read and write
|
||
5E68000
|
trusted library allocation
|
page read and write
|
||
5E39000
|
trusted library allocation
|
page read and write
|
||
5E18000
|
trusted library allocation
|
page read and write
|
||
4EA1000
|
heap
|
page read and write
|
||
6397000
|
trusted library allocation
|
page read and write
|
||
649F000
|
trusted library allocation
|
page read and write
|
||
5E87000
|
trusted library allocation
|
page read and write
|
||
E56000
|
unkown
|
page execute and write copy
|
||
36FE000
|
stack
|
page read and write
|
||
5E16000
|
trusted library allocation
|
page read and write
|
||
40BF000
|
stack
|
page read and write
|
||
84CE000
|
stack
|
page read and write
|
||
62B1000
|
trusted library allocation
|
page read and write
|
||
63B1000
|
trusted library allocation
|
page read and write
|
||
62B3000
|
trusted library allocation
|
page read and write
|
||
85CF000
|
stack
|
page read and write
|
||
638C000
|
trusted library allocation
|
page read and write
|
||
6CCF000
|
stack
|
page read and write
|
||
676F000
|
stack
|
page read and write
|
||
4EA1000
|
heap
|
page read and write
|
||
64DD000
|
trusted library allocation
|
page read and write
|
||
61ED000
|
trusted library allocation
|
page read and write
|
||
333E000
|
stack
|
page read and write
|
||
870F000
|
stack
|
page read and write
|
||
1570000
|
heap
|
page read and write
|
||
5E29000
|
trusted library allocation
|
page read and write
|
||
5F18000
|
trusted library allocation
|
page read and write
|
||
30E0000
|
direct allocation
|
page read and write
|
||
62BA000
|
trusted library allocation
|
page read and write
|
||
35BE000
|
stack
|
page read and write
|
||
5E39000
|
trusted library allocation
|
page read and write
|
||
62B3000
|
trusted library allocation
|
page read and write
|
||
62C1000
|
trusted library allocation
|
page read and write
|
||
586E000
|
stack
|
page read and write
|
||
158E000
|
heap
|
page read and write
|
||
1667000
|
heap
|
page read and write
|
||
645A000
|
trusted library allocation
|
page read and write
|
||
6358000
|
trusted library allocation
|
page read and write
|
||
6155000
|
trusted library allocation
|
page read and write
|
||
5E4B000
|
trusted library allocation
|
page read and write
|
||
62B2000
|
trusted library allocation
|
page read and write
|
||
63B3000
|
trusted library allocation
|
page read and write
|
||
5EB3000
|
trusted library allocation
|
page read and write
|
||
7ACE000
|
stack
|
page read and write
|
||
642A000
|
trusted library allocation
|
page read and write
|
||
5EB0000
|
trusted library allocation
|
page read and write
|
||
166C000
|
heap
|
page read and write
|
||
15E0000
|
heap
|
page read and write
|
||
5EBA000
|
trusted library allocation
|
page read and write
|
||
5E90000
|
trusted library allocation
|
page read and write
|
||
5371000
|
direct allocation
|
page read and write
|
||
6113000
|
trusted library allocation
|
page read and write
|
||
5F29000
|
trusted library allocation
|
page read and write
|
||
63D9000
|
trusted library allocation
|
page read and write
|
||
708F000
|
stack
|
page read and write
|
||
6381000
|
trusted library allocation
|
page read and write
|
||
7E4F000
|
stack
|
page read and write
|
||
62BB000
|
trusted library allocation
|
page read and write
|
||
62B5000
|
trusted library allocation
|
page read and write
|
||
62B4000
|
trusted library allocation
|
page read and write
|
||
650A000
|
trusted library allocation
|
page read and write
|
||
5E6E000
|
trusted library allocation
|
page read and write
|
||
8710000
|
direct allocation
|
page read and write
|
||
5E48000
|
trusted library allocation
|
page read and write
|
||
5E29000
|
trusted library allocation
|
page read and write
|
||
5E15000
|
trusted library allocation
|
page read and write
|
||
5E31000
|
trusted library allocation
|
page read and write
|
||
5E39000
|
trusted library allocation
|
page read and write
|
||
5E76000
|
trusted library allocation
|
page read and write
|
||
5E78000
|
trusted library allocation
|
page read and write
|
||
5F54000
|
trusted library allocation
|
page read and write
|
||
4EA1000
|
heap
|
page read and write
|
||
347E000
|
stack
|
page read and write
|
||
5E71000
|
trusted library allocation
|
page read and write
|
||
640F000
|
trusted library allocation
|
page read and write
|
||
5F49000
|
trusted library allocation
|
page read and write
|
||
5E39000
|
trusted library allocation
|
page read and write
|
||
5FA9000
|
trusted library allocation
|
page read and write
|
||
54E0000
|
direct allocation
|
page execute and read and write
|
||
166F000
|
heap
|
page read and write
|
||
E55000
|
unkown
|
page execute and write copy
|
||
654C000
|
trusted library allocation
|
page read and write
|
||
31FF000
|
stack
|
page read and write
|
||
6354000
|
trusted library allocation
|
page read and write
|
||
5E44000
|
trusted library allocation
|
page read and write
|
||
63F7000
|
trusted library allocation
|
page read and write
|
||
5EBA000
|
trusted library allocation
|
page read and write
|
||
5F11000
|
trusted library allocation
|
page read and write
|
||
62C1000
|
trusted library allocation
|
page read and write
|
||
6509000
|
trusted library allocation
|
page read and write
|
||
6360000
|
trusted library allocation
|
page read and write
|
||
8740000
|
heap
|
page read and write
|
||
4EA1000
|
heap
|
page read and write
|
||
62B5000
|
trusted library allocation
|
page read and write
|
||
5E44000
|
trusted library allocation
|
page read and write
|
||
166D000
|
heap
|
page read and write
|
||
165E000
|
heap
|
page read and write
|
||
447F000
|
stack
|
page read and write
|
||
5E57000
|
trusted library allocation
|
page read and write
|
||
1652000
|
heap
|
page read and write
|
||
1673000
|
heap
|
page read and write
|
||
89C2000
|
trusted library allocation
|
page read and write
|
||
6F8E000
|
stack
|
page read and write
|
||
5E78000
|
trusted library allocation
|
page read and write
|
||
63F5000
|
trusted library allocation
|
page read and write
|
||
62BE000
|
trusted library allocation
|
page read and write
|
||
645C000
|
trusted library allocation
|
page read and write
|
||
1676000
|
heap
|
page read and write
|
||
497F000
|
stack
|
page read and write
|
||
70CE000
|
stack
|
page read and write
|
||
62C0000
|
trusted library allocation
|
page read and write
|
||
1660000
|
heap
|
page read and write
|
||
BA2000
|
unkown
|
page execute and read and write
|
||
62B1000
|
trusted library allocation
|
page read and write
|
||
3A7F000
|
stack
|
page read and write
|
||
6660000
|
trusted library allocation
|
page execute and read and write
|
||
5E22000
|
trusted library allocation
|
page read and write
|
||
6371000
|
trusted library allocation
|
page read and write
|
||
62C0000
|
trusted library allocation
|
page read and write
|
||
8770000
|
direct allocation
|
page read and write
|
||
6B2C000
|
trusted library allocation
|
page read and write
|
||
5EAB000
|
trusted library allocation
|
page read and write
|
||
5E29000
|
trusted library allocation
|
page read and write
|
||
62B3000
|
trusted library allocation
|
page read and write
|
||
1673000
|
heap
|
page read and write
|
||
63F9000
|
trusted library allocation
|
page read and write
|
||
165C000
|
heap
|
page read and write
|
||
63D7000
|
trusted library allocation
|
page read and write
|
||
62BB000
|
trusted library allocation
|
page read and write
|
||
618E000
|
stack
|
page read and write
|
||
B60000
|
unkown
|
page read and write
|
||
80CF000
|
stack
|
page read and write
|
||
165F000
|
heap
|
page read and write
|
||
63EE000
|
trusted library allocation
|
page read and write
|
||
15EE000
|
heap
|
page read and write
|
||
62B4000
|
trusted library allocation
|
page read and write
|
||
6374000
|
trusted library allocation
|
page read and write
|
||
40FE000
|
stack
|
page read and write
|
||
3F7F000
|
stack
|
page read and write
|
||
BB5000
|
unkown
|
page execute and read and write
|
||
5CC3000
|
heap
|
page read and write
|
||
5E29000
|
trusted library allocation
|
page read and write
|
||
1651000
|
heap
|
page read and write
|
||
4EA1000
|
heap
|
page read and write
|
||
5980000
|
remote allocation
|
page read and write
|
||
63DA000
|
trusted library allocation
|
page read and write
|
||
5EBA000
|
trusted library allocation
|
page read and write
|
||
5F49000
|
trusted library allocation
|
page read and write
|
||
63F7000
|
trusted library allocation
|
page read and write
|
||
70480000
|
unkown
|
page readonly
|
||
63D2000
|
trusted library allocation
|
page read and write
|
||
5E76000
|
trusted library allocation
|
page read and write
|
||
1673000
|
heap
|
page read and write
|
||
67AC000
|
stack
|
page read and write
|
||
63A9000
|
stack
|
page read and write
|
||
6BCF000
|
stack
|
page read and write
|
||
62B0000
|
trusted library allocation
|
page read and write
|
||
5980000
|
remote allocation
|
page read and write
|
||
5E39000
|
trusted library allocation
|
page read and write
|
||
62B7000
|
trusted library allocation
|
page read and write
|
||
30E0000
|
direct allocation
|
page read and write
|
||
30F7000
|
heap
|
page read and write
|
||
5EBA000
|
trusted library allocation
|
page read and write
|
||
5EAB000
|
trusted library allocation
|
page read and write
|
||
5F29000
|
trusted library allocation
|
page read and write
|
||
64F0000
|
trusted library allocation
|
page read and write
|
||
5E2F000
|
trusted library allocation
|
page read and write
|
||
1655000
|
heap
|
page read and write
|
||
5E29000
|
trusted library allocation
|
page read and write
|
||
62B6000
|
trusted library allocation
|
page read and write
|
||
63B5000
|
trusted library allocation
|
page read and write
|
||
5E61000
|
trusted library allocation
|
page read and write
|
||
5EAD000
|
trusted library allocation
|
page read and write
|
||
5E6E000
|
trusted library allocation
|
page read and write
|
||
63D8000
|
trusted library allocation
|
page read and write
|
||
167A000
|
heap
|
page read and write
|
||
6000000
|
trusted library allocation
|
page read and write
|
||
4EA1000
|
heap
|
page read and write
|
||
637E000
|
trusted library allocation
|
page read and write
|
||
62B0000
|
trusted library allocation
|
page read and write
|
||
30E0000
|
direct allocation
|
page read and write
|
||
5EB6000
|
trusted library allocation
|
page read and write
|
||
654E000
|
trusted library allocation
|
page read and write
|
||
3E3F000
|
stack
|
page read and write
|
||
64BF000
|
trusted library allocation
|
page read and write
|
||
62B5000
|
trusted library allocation
|
page read and write
|
||
63CC000
|
trusted library allocation
|
page read and write
|
||
613D000
|
trusted library allocation
|
page read and write
|
||
4EA1000
|
heap
|
page read and write
|
||
5D0D000
|
stack
|
page read and write
|
||
5AEF000
|
stack
|
page read and write
|
||
15CE000
|
heap
|
page read and write
|
||
54B0000
|
direct allocation
|
page execute and read and write
|
||
5E5D000
|
trusted library allocation
|
page read and write
|
||
166A000
|
heap
|
page read and write
|
||
6124000
|
trusted library allocation
|
page read and write
|
||
5C5F000
|
stack
|
page read and write
|
||
5E31000
|
trusted library allocation
|
page read and write
|
||
62B3000
|
trusted library allocation
|
page read and write
|
||
54BE000
|
stack
|
page read and write
|
||
5E28000
|
trusted library allocation
|
page read and write
|
||
487E000
|
stack
|
page read and write
|
||
1659000
|
heap
|
page read and write
|
||
D33000
|
unkown
|
page execute and read and write
|
||
5E85000
|
trusted library allocation
|
page read and write
|
||
63A7000
|
trusted library allocation
|
page read and write
|
||
5E28000
|
trusted library allocation
|
page read and write
|
||
E47000
|
unkown
|
page execute and read and write
|
||
63AF000
|
trusted library allocation
|
page read and write
|
||
5480000
|
direct allocation
|
page execute and read and write
|
||
4EA0000
|
heap
|
page read and write
|
||
54B0000
|
direct allocation
|
page execute and read and write
|
||
5E52000
|
trusted library allocation
|
page read and write
|
||
838E000
|
stack
|
page read and write
|
||
64A0000
|
trusted library allocation
|
page read and write
|
||
5EAB000
|
trusted library allocation
|
page read and write
|
||
5F29000
|
trusted library allocation
|
page read and write
|
||
54B0000
|
direct allocation
|
page execute and read and write
|
||
5E47000
|
trusted library allocation
|
page read and write
|
||
37FF000
|
stack
|
page read and write
|
||
642B000
|
trusted library allocation
|
page read and write
|
||
5E29000
|
trusted library allocation
|
page read and write
|
||
652D000
|
trusted library allocation
|
page read and write
|
||
5E2F000
|
trusted library allocation
|
page read and write
|
||
30E0000
|
direct allocation
|
page read and write
|
||
13D0000
|
heap
|
page read and write
|
||
30DB000
|
stack
|
page read and write
|
||
5E18000
|
trusted library allocation
|
page read and write
|
||
4AFE000
|
stack
|
page read and write
|
||
128B000
|
stack
|
page read and write
|
||
572E000
|
stack
|
page read and write
|
||
8710000
|
direct allocation
|
page read and write
|
||
5F18000
|
trusted library allocation
|
page read and write
|
||
734E000
|
stack
|
page read and write
|
||
5E29000
|
trusted library allocation
|
page read and write
|
||
650C000
|
trusted library allocation
|
page read and write
|
||
4D7E000
|
stack
|
page read and write
|
||
5E29000
|
trusted library allocation
|
page read and write
|
||
5E31000
|
trusted library allocation
|
page read and write
|
||
63EA000
|
trusted library allocation
|
page read and write
|
||
5E29000
|
trusted library allocation
|
page read and write
|
||
30E0000
|
direct allocation
|
page read and write
|
||
639C000
|
trusted library allocation
|
page read and write
|
||
30E0000
|
direct allocation
|
page read and write
|
||
7049D000
|
unkown
|
page read and write
|
||
62B0000
|
trusted library allocation
|
page read and write
|
||
5E2F000
|
trusted library allocation
|
page read and write
|
||
5E73000
|
trusted library allocation
|
page read and write
|
||
BB3000
|
unkown
|
page write copy
|
||
4EA1000
|
heap
|
page read and write
|
||
62B6000
|
trusted library allocation
|
page read and write
|
||
54A0000
|
direct allocation
|
page execute and read and write
|
||
5E68000
|
trusted library allocation
|
page read and write
|
||
4EA1000
|
heap
|
page read and write
|
||
17BE000
|
stack
|
page read and write
|
||
648A000
|
trusted library allocation
|
page read and write
|
||
63F0000
|
trusted library allocation
|
page read and write
|
||
383E000
|
stack
|
page read and write
|
||
5E66000
|
trusted library allocation
|
page read and write
|
||
167A000
|
heap
|
page read and write
|
||
61A8000
|
trusted library allocation
|
page read and write
|
||
5EB4000
|
trusted library allocation
|
page read and write
|
||
64B9000
|
trusted library allocation
|
page read and write
|
||
5F49000
|
trusted library allocation
|
page read and write
|
||
62BA000
|
trusted library allocation
|
page read and write
|
||
30E0000
|
direct allocation
|
page read and write
|
||
15B7000
|
heap
|
page read and write
|
||
B61000
|
unkown
|
page execute and write copy
|
||
62B2000
|
trusted library allocation
|
page read and write
|
||
5EB6000
|
trusted library allocation
|
page read and write
|
||
18BF000
|
stack
|
page read and write
|
||
4EA1000
|
heap
|
page read and write
|
||
64BB000
|
trusted library allocation
|
page read and write
|
||
5E67000
|
trusted library allocation
|
page read and write
|
||
637C000
|
trusted library allocation
|
page read and write
|
||
6000000
|
trusted library allocation
|
page read and write
|
||
62B3000
|
trusted library allocation
|
page read and write
|
||
63C4000
|
trusted library allocation
|
page read and write
|
||
4EA1000
|
heap
|
page read and write
|
||
62B5000
|
trusted library allocation
|
page read and write
|
||
5E29000
|
trusted library allocation
|
page read and write
|
||
5E13000
|
trusted library allocation
|
page read and write
|
||
8710000
|
trusted library allocation
|
page read and write
|
||
5E2F000
|
trusted library allocation
|
page read and write
|
||
76CF000
|
stack
|
page read and write
|
||
6411000
|
trusted library allocation
|
page read and write
|
||
89C0000
|
trusted library allocation
|
page read and write
|
||
5E15000
|
trusted library allocation
|
page read and write
|
||
5E5B000
|
trusted library allocation
|
page read and write
|
||
164F000
|
heap
|
page read and write
|
||
644D000
|
trusted library allocation
|
page read and write
|
||
62BC000
|
trusted library allocation
|
page read and write
|
||
5330000
|
direct allocation
|
page read and write
|
||
45FE000
|
stack
|
page read and write
|
||
5330000
|
direct allocation
|
page read and write
|
||
5E65000
|
trusted library allocation
|
page read and write
|
||
748E000
|
stack
|
page read and write
|
||
780F000
|
stack
|
page read and write
|
||
4EA1000
|
heap
|
page read and write
|
||
5E11000
|
trusted library allocation
|
page read and write
|
||
63B6000
|
trusted library allocation
|
page read and write
|
||
62BC000
|
trusted library allocation
|
page read and write
|
||
5E29000
|
trusted library allocation
|
page read and write
|
||
5E18000
|
trusted library allocation
|
page read and write
|
||
6389000
|
trusted library allocation
|
page read and write
|
||
636F000
|
trusted library allocation
|
page read and write
|
||
5980000
|
remote allocation
|
page read and write
|
||
611E000
|
trusted library allocation
|
page read and write
|
||
6356000
|
trusted library allocation
|
page read and write
|
||
70497000
|
unkown
|
page readonly
|
||
161F000
|
heap
|
page read and write
|
||
5EBA000
|
trusted library allocation
|
page read and write
|
||
642D000
|
trusted library allocation
|
page read and write
|
||
6AAF000
|
trusted library allocation
|
page read and write
|
||
7F8F000
|
stack
|
page read and write
|
||
30E0000
|
direct allocation
|
page read and write
|
||
5F29000
|
trusted library allocation
|
page read and write
|
||
611F000
|
trusted library allocation
|
page read and write
|
||
63C4000
|
trusted library allocation
|
page read and write
|
||
70481000
|
unkown
|
page execute read
|
||
4ABF000
|
stack
|
page read and write
|
||
8900000
|
direct allocation
|
page execute and read and write
|
||
635E000
|
trusted library allocation
|
page read and write
|
||
5E2F000
|
trusted library allocation
|
page read and write
|
||
5E57000
|
trusted library allocation
|
page read and write
|
||
5E9F000
|
trusted library allocation
|
page read and write
|
||
30E0000
|
direct allocation
|
page read and write
|
||
645E000
|
trusted library allocation
|
page read and write
|
||
6481000
|
trusted library allocation
|
page read and write
|
||
638A000
|
trusted library allocation
|
page read and write
|
There are 723 hidden memdumps, click here to show them.
DOM / HTML
URL
|
Malicious
|
|
---|---|---|
https://learn.microsoft.com/en-us/dotnet/framework/install/application-not-started?version=(null)&processName=file.exe&platform=0009&osver=6&isServer=0&shimver=4.0.30319.0
|
||
https://learn.microsoft.com/en-us/dotnet/framework/install/application-not-started?version=(null)&processName=file.exe&platform=0009&osver=6&isServer=0&shimver=4.0.30319.0
|
||
https://learn.microsoft.com/en-us/dotnet/framework/install/application-not-started?version=(null)&processName=file.exe&platform=0009&osver=6&isServer=0&shimver=4.0.30319.0
|
||
https://learn.microsoft.com/en-us/dotnet/framework/install/application-not-started?version=(null)&processName=file.exe&platform=0009&osver=6&isServer=0&shimver=4.0.30319.0
|