Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
file.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
initial sample
|
||
Chrome Cache Entry: 100
|
JSON data
|
dropped
|
||
Chrome Cache Entry: 101
|
JPEG image data, JFIF standard 1.01, aspect ratio, density 1x1, segment length 16, baseline, precision 8, 1528x402, components
3
|
downloaded
|
||
Chrome Cache Entry: 102
|
exported SGML document, ASCII text, with very long lines (65536), with no line terminators
|
dropped
|
||
Chrome Cache Entry: 103
|
ASCII text, with very long lines (46884)
|
dropped
|
||
Chrome Cache Entry: 104
|
ASCII text
|
dropped
|
||
Chrome Cache Entry: 105
|
SVG Scalable Vector Graphics image
|
downloaded
|
||
Chrome Cache Entry: 106
|
Web Open Font Format (Version 2), TrueType, length 19696, version 1.0
|
downloaded
|
||
Chrome Cache Entry: 107
|
ASCII text, with very long lines (33148), with no line terminators
|
downloaded
|
||
Chrome Cache Entry: 108
|
PNG image data, 475 x 212, 8-bit/color RGBA, non-interlaced
|
dropped
|
||
Chrome Cache Entry: 109
|
PNG image data, 658 x 480, 8-bit/color RGBA, non-interlaced
|
dropped
|
||
Chrome Cache Entry: 110
|
JSON data
|
dropped
|
||
Chrome Cache Entry: 111
|
HTML document, ASCII text, with very long lines (639), with CRLF, LF line terminators
|
downloaded
|
||
Chrome Cache Entry: 112
|
JSON data
|
downloaded
|
||
Chrome Cache Entry: 113
|
PNG image data, 533 x 478, 8-bit/color RGBA, non-interlaced
|
dropped
|
||
Chrome Cache Entry: 72
|
PNG image data, 533 x 478, 8-bit/color RGBA, non-interlaced
|
dropped
|
||
Chrome Cache Entry: 73
|
PNG image data, 533 x 478, 8-bit/color RGBA, non-interlaced
|
downloaded
|
||
Chrome Cache Entry: 74
|
SVG Scalable Vector Graphics image
|
dropped
|
||
Chrome Cache Entry: 75
|
JSON data
|
dropped
|
||
Chrome Cache Entry: 76
|
PNG image data, 533 x 478, 8-bit/color RGBA, non-interlaced
|
dropped
|
||
Chrome Cache Entry: 77
|
ASCII text, with very long lines (65536), with no line terminators
|
downloaded
|
||
Chrome Cache Entry: 78
|
JSON data
|
dropped
|
||
Chrome Cache Entry: 79
|
ASCII text, with very long lines (65410)
|
dropped
|
||
Chrome Cache Entry: 80
|
JSON data
|
dropped
|
||
Chrome Cache Entry: 81
|
ASCII text, with very long lines (65410)
|
downloaded
|
||
Chrome Cache Entry: 82
|
JSON data
|
downloaded
|
||
Chrome Cache Entry: 83
|
PNG image data, 533 x 478, 8-bit/color RGBA, non-interlaced
|
downloaded
|
||
Chrome Cache Entry: 84
|
ASCII text, with very long lines (52717), with no line terminators
|
dropped
|
||
Chrome Cache Entry: 85
|
ASCII text
|
downloaded
|
||
Chrome Cache Entry: 86
|
ASCII text, with very long lines (52717), with no line terminators
|
downloaded
|
||
Chrome Cache Entry: 87
|
exported SGML document, ASCII text, with very long lines (65536), with no line terminators
|
downloaded
|
||
Chrome Cache Entry: 88
|
ASCII text, with no line terminators
|
downloaded
|
||
Chrome Cache Entry: 89
|
PNG image data, 533 x 478, 8-bit/color RGBA, non-interlaced
|
downloaded
|
||
Chrome Cache Entry: 90
|
MS Windows icon resource - 6 icons, -128x-128, 16 colors, 72x72, 16 colors
|
downloaded
|
||
Chrome Cache Entry: 91
|
ASCII text, with very long lines (46884)
|
downloaded
|
||
Chrome Cache Entry: 92
|
JSON data
|
dropped
|
||
Chrome Cache Entry: 93
|
MS Windows icon resource - 6 icons, -128x-128, 16 colors, 72x72, 16 colors
|
dropped
|
||
Chrome Cache Entry: 94
|
PNG image data, 658 x 480, 8-bit/color RGBA, non-interlaced
|
downloaded
|
||
Chrome Cache Entry: 95
|
ASCII text, with very long lines (33148), with no line terminators
|
dropped
|
||
Chrome Cache Entry: 96
|
JSON data
|
downloaded
|
||
Chrome Cache Entry: 97
|
JPEG image data, JFIF standard 1.01, aspect ratio, density 1x1, segment length 16, baseline, precision 8, 1528x402, components
3
|
dropped
|
||
Chrome Cache Entry: 98
|
PNG image data, 475 x 212, 8-bit/color RGBA, non-interlaced
|
downloaded
|
||
Chrome Cache Entry: 99
|
JSON data
|
downloaded
|
There are 33 hidden files, click here to show them.
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\file.exe
|
"C:\Users\user\Desktop\file.exe"
|
||
C:\Program Files\Google\Chrome\Application\chrome.exe
|
"C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized --single-argument http://go.microsoft.com/fwlink/?prd=11324&pver=4.5&sbp=AppLaunch2&plcid=0x409&o1=SHIM_NOVERSION_FOUND&version=(null)&processName=file.exe&platform=0009&osver=6&isServer=0&shimver=4.0.30319.0
|
||
C:\Program Files\Google\Chrome\Application\chrome.exe
|
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US
--service-sandbox-type=none --mojo-platform-channel-handle=2092 --field-trial-handle=1896,i,9604878912781494424,10388162517610597454,262144
--disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction
/prefetch:8
|
||
C:\Program Files\Google\Chrome\Application\chrome.exe
|
"C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized --single-argument http://go.microsoft.com/fwlink/?prd=11324&pver=4.5&sbp=AppLaunch2&plcid=0x409&o1=SHIM_NOVERSION_FOUND&version=(null)&processName=file.exe&platform=0009&osver=6&isServer=0&shimver=4.0.30319.0
|
||
C:\Program Files\Google\Chrome\Application\chrome.exe
|
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US
--service-sandbox-type=none --mojo-platform-channel-handle=2032 --field-trial-handle=1976,i,6169164683179771580,6537590639377131950,262144
--disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction
/prefetch:8
|
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
https://authoring-docs-microsoft.poolparty.biz/devrel/7696cda6-0510-47f6-8302-71bb5d2e28cf
|
unknown
|
||
https://duckduckgo.com/chrome_newtab
|
unknown
|
||
dare-curbys.biz
|
|||
impend-differ.biz
|
|||
https://duckduckgo.com/ac/?q=
|
unknown
|
||
http://crl.microsoft
|
unknown
|
||
https://atten-supporse.biz/mv
|
unknown
|
||
https://github.com/dotnet/docs/blob/17c4acca45e573a92878a44a2cce57d699fe9c7c/docs/framework/install/
|
unknown
|
||
https://www.linkedin.com/cws/share?url=$
|
unknown
|
||
https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
|
unknown
|
||
https://www.amazon.com/?tag=admarketus-20&ref=pd_sl_
|
unknown
|
||
https://github.com/Youssef1313
|
unknown
|
||
https://atten-supporse.biz/apilit
|
unknown
|
||
https://contile-images.services.mozilla.com/T23eBL4EHswiSaF6kya2gYsRHvdfADK-NYjs1mVRNGE.3351.jpg
|
unknown
|
||
https://management.azure.com/providers/Microsoft.Portal/userSettings/cloudconsole?api-version=2023-0
|
unknown
|
||
dwell-exclaim.biz
|
|||
https://aka.ms/msignite_docs_banner
|
unknown
|
||
https://videoencodingpublic-hgeaeyeba8gycee3.b01.azurefd.net/public-b4da8140-92cf-421c-8b7b-e471d5b9
|
unknown
|
||
http://polymer.github.io/AUTHORS.txt
|
unknown
|
||
https://github.com/dotnet/docs/issues/new?template=z-customer-feedback.yml
|
unknown
|
||
https://atten-supporse.biz/apiate
|
unknown
|
||
https://management.azure.com/subscriptions?api-version=2016-06-01
|
unknown
|
||
https://github.com/dotnet/docs/blob/main/docs/framework/install/application-not-started.md
|
unknown
|
||
zinc-sneark.biz
|
|||
http://x1.c.lencr.org/0
|
unknown
|
||
http://x1.i.lencr.org/0
|
unknown
|
||
https://aka.ms/pshelpmechoose
|
unknown
|
||
https://aka.ms/feedback/report?space=61
|
unknown
|
||
https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
|
unknown
|
||
https://atten-supporse.biz/apiY
|
unknown
|
||
formy-spill.biz
|
|||
https://atten-supporse.biz/6
|
unknown
|
||
https://learn-video.azurefd.net/vod/player
|
unknown
|
||
https://twitter.com/intent/tweet?original_referer=$
|
unknown
|
||
https://github.com/gewarren
|
unknown
|
||
se-blurry.biz
|
|||
http://185.215.113.16/f
|
unknown
|
||
https://support.mozilla.org/products/firefoxgro.all
|
unknown
|
||
http://polymer.github.io/CONTRIBUTORS.txt
|
unknown
|
||
http://185.215.113.16/steam/random.exeZ
|
unknown
|
||
https://www.mozilla.or
|
unknown
|
||
https://github.com/dotnet/docs/blob/live/docs/framework/install/application-not-started.md
|
unknown
|
||
https://authoring-docs-microsoft.poolparty.biz/devrel/69c76c32-967e-4c65-b89a-74cc527db725
|
unknown
|
||
https://client-api.arkoselabs.com/v2/api.js
|
unknown
|
||
https://aka.ms/MSIgniteChallenge/Tier1Banner?wt.mc_id=ignite24_learnbanner_tier1_cnl
|
unknown
|
||
https://management.azure.com/providers/Microsoft.Portal/consoles/default?api-version=2017-12-01-prev
|
unknown
|
||
https://www.google.com/images/branding/product/ico/googleg_lodp.ico
|
unknown
|
||
https://github.com/Thraka
|
unknown
|
||
https://bridge.sfo1.admarketplace.net/ctp?version=16.0.0&key=1696484494400800000.2&ci=1696484494189.
|
unknown
|
||
covery-mover.biz
|
|||
https://imp.mt48.net/static?id=7RHzfOIXjFEYsBdvIpkX4Qqm4pLk4pqk4pbW1pbWfpbW7ReNxR3UIG8zInwYIFIVs9eYi
|
unknown
|
||
http://polymer.github.io/PATENTS.txt
|
unknown
|
||
https://aka.ms/certhelp
|
unknown
|
||
http://185.215.113.16/steam/random.exe
|
unknown
|
||
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
|
unknown
|
||
http://crl.rootca1.amazontrust.com/rootca1.crl0
|
unknown
|
||
https://atten-supporse.biz/api
|
104.21.16.1
|
||
https://github.com/mairaw
|
unknown
|
||
http://ocsp.rootca1.amazontrust.com0:
|
unknown
|
||
https://js.monitor.azure.com/scripts/c/ms.jsll-4.min.js
|
unknown
|
||
https://schema.org
|
unknown
|
||
http://polymer.github.io/LICENSE.txt
|
unknown
|
||
https://www.ecosia.org/newtab/
|
unknown
|
||
https://support.mozilla.org/kb/customize-firefox-controls-buttons-and-toolbars?utm_source=firefox-br
|
unknown
|
||
https://www.t-mobile.com/cell-phones/brand/apple?cmpid=MGPO_PAM_P_EVGRNIPHN_
|
unknown
|
||
https://aka.ms/yourcaliforniaprivacychoices
|
unknown
|
||
https://ac.ecosia.org/autocomplete?q=
|
unknown
|
||
https://github.com/nschonni
|
unknown
|
||
http://185.215.113.16/
|
unknown
|
||
https://videoencodingpublic-hgeaeyeba8gycee3.b01.azurefd.net/public-09ce73a6-05a5-4e4d-b3d7-bd5a8c05
|
unknown
|
||
https://github.com/adegeo
|
unknown
|
||
https://contile-images.services.mozilla.com/obgoOYObjIFea_bXuT6L4LbBJ8j425AD87S1HMD3BWg.9991.jpg
|
unknown
|
||
https://github.com/jonschlinkert/is-plain-object
|
unknown
|
||
http://crt.rootca1.amazontrust.com/rootca1.cer0?
|
unknown
|
||
https://octokit.github.io/rest.js/#throttling
|
unknown
|
||
atten-supporse.biz
|
|||
https://github.com/js-cookie/js-cookie
|
unknown
|
||
http://185.215.113.16/off/def.exe
|
unknown
|
||
http://schema.org/Organization
|
unknown
|
||
https://atten-supporse.biz/
|
unknown
|
||
print-vexer.biz
|
|||
https://channel9.msdn.com/
|
unknown
|
||
https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
|
unknown
|
||
https://bridge.sfo1.ap01.net/ctp?version=16.0.0&key=1696484494400800000.1&ci=1696484494189.12791&cta
|
unknown
|
||
https://github.com/dotnet/try
|
unknown
|
There are 75 hidden URLs, click here to show them.
Domains
Name
|
IP
|
Malicious
|
|
---|---|---|---|
atten-supporse.biz
|
104.21.16.1
|
||
www.google.com
|
172.217.21.36
|
||
s-part-0035.t-0009.t-msedge.net
|
13.107.246.63
|
||
js.monitor.azure.com
|
unknown
|
||
mdec.nelreports.net
|
unknown
|
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
192.168.2.6
|
unknown
|
unknown
|
||
104.21.16.1
|
atten-supporse.biz
|
United States
|
||
185.215.113.16
|
unknown
|
Portugal
|
||
239.255.255.250
|
unknown
|
Reserved
|
||
172.217.21.36
|
www.google.com
|
United States
|
Registry
Path
|
Value
|
Malicious
|
|
---|---|---|---|
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer
|
SlowContextMenuEntries
|
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
91000
|
unkown
|
page execute and read and write
|
||
5890000
|
trusted library allocation
|
page read and write
|
||
5386000
|
trusted library allocation
|
page read and write
|
||
BCD000
|
heap
|
page read and write
|
||
57DA000
|
trusted library allocation
|
page read and write
|
||
53D4000
|
trusted library allocation
|
page read and write
|
||
5345000
|
trusted library allocation
|
page read and write
|
||
43C0000
|
direct allocation
|
page read and write
|
||
43D1000
|
heap
|
page read and write
|
||
53D4000
|
trusted library allocation
|
page read and write
|
||
2ABF000
|
stack
|
page read and write
|
||
BCD000
|
heap
|
page read and write
|
||
5457000
|
trusted library allocation
|
page read and write
|
||
57D6000
|
trusted library allocation
|
page read and write
|
||
BC8000
|
heap
|
page read and write
|
||
53A7000
|
trusted library allocation
|
page read and write
|
||
53A7000
|
trusted library allocation
|
page read and write
|
||
4C5C000
|
stack
|
page read and write
|
||
57D8000
|
trusted library allocation
|
page read and write
|
||
43D1000
|
heap
|
page read and write
|
||
537E000
|
trusted library allocation
|
page read and write
|
||
5EDA000
|
trusted library allocation
|
page execute and read and write
|
||
313E000
|
stack
|
page read and write
|
||
599F000
|
trusted library allocation
|
page read and write
|
||
58C2000
|
trusted library allocation
|
page read and write
|
||
57D9000
|
trusted library allocation
|
page read and write
|
||
57D5000
|
trusted library allocation
|
page read and write
|
||
53C3000
|
trusted library allocation
|
page read and write
|
||
BCA000
|
heap
|
page read and write
|
||
5356000
|
trusted library allocation
|
page read and write
|
||
B55000
|
heap
|
page read and write
|
||
57D8000
|
trusted library allocation
|
page read and write
|
||
537A000
|
trusted library allocation
|
page read and write
|
||
7C60000
|
direct allocation
|
page read and write
|
||
5341000
|
trusted library allocation
|
page read and write
|
||
534A000
|
trusted library allocation
|
page read and write
|
||
58B4000
|
trusted library allocation
|
page read and write
|
||
53AE000
|
trusted library allocation
|
page read and write
|
||
590E000
|
trusted library allocation
|
page read and write
|
||
534E000
|
trusted library allocation
|
page read and write
|
||
59BB000
|
trusted library allocation
|
page read and write
|
||
57D3000
|
trusted library allocation
|
page read and write
|
||
57D6000
|
trusted library allocation
|
page read and write
|
||
4A10000
|
direct allocation
|
page execute and read and write
|
||
535D000
|
trusted library allocation
|
page read and write
|
||
BCC000
|
heap
|
page read and write
|
||
5350000
|
trusted library allocation
|
page read and write
|
||
57D8000
|
trusted library allocation
|
page read and write
|
||
BC6000
|
heap
|
page read and write
|
||
5363000
|
trusted library allocation
|
page read and write
|
||
43D1000
|
heap
|
page read and write
|
||
5A6D000
|
trusted library allocation
|
page read and write
|
||
BBC000
|
heap
|
page read and write
|
||
53E9000
|
trusted library allocation
|
page read and write
|
||
7C60000
|
direct allocation
|
page read and write
|
||
536D000
|
trusted library allocation
|
page read and write
|
||
536B000
|
trusted library allocation
|
page read and write
|
||
BBB000
|
heap
|
page read and write
|
||
BB2000
|
heap
|
page read and write
|
||
535D000
|
trusted library allocation
|
page read and write
|
||
5376000
|
trusted library allocation
|
page read and write
|
||
590E000
|
stack
|
page read and write
|
||
5331000
|
trusted library allocation
|
page read and write
|
||
535D000
|
trusted library allocation
|
page read and write
|
||
4850000
|
remote allocation
|
page read and write
|
||
7C60000
|
direct allocation
|
page read and write
|
||
BCD000
|
heap
|
page read and write
|
||
BBB000
|
heap
|
page read and write
|
||
43D0000
|
heap
|
page read and write
|
||
BBB000
|
heap
|
page read and write
|
||
591E000
|
trusted library allocation
|
page read and write
|
||
534B000
|
trusted library allocation
|
page read and write
|
||
2BFF000
|
stack
|
page read and write
|
||
49E0000
|
direct allocation
|
page execute and read and write
|
||
BC3000
|
heap
|
page read and write
|
||
43D1000
|
heap
|
page read and write
|
||
537E000
|
trusted library allocation
|
page read and write
|
||
595D000
|
trusted library allocation
|
page read and write
|
||
5A9D000
|
trusted library allocation
|
page read and write
|
||
5385000
|
trusted library allocation
|
page read and write
|
||
51E3000
|
heap
|
page read and write
|
||
B32000
|
heap
|
page read and write
|
||
58A3000
|
trusted library allocation
|
page read and write
|
||
537C000
|
trusted library allocation
|
page read and write
|
||
535E000
|
trusted library allocation
|
page read and write
|
||
53CB000
|
trusted library allocation
|
page read and write
|
||
53D4000
|
trusted library allocation
|
page read and write
|
||
3B3E000
|
stack
|
page read and write
|
||
58BC000
|
trusted library allocation
|
page read and write
|
||
5387000
|
trusted library allocation
|
page read and write
|
||
39FE000
|
stack
|
page read and write
|
||
91000
|
unkown
|
page execute and write copy
|
||
57D6000
|
trusted library allocation
|
page read and write
|
||
53C9000
|
trusted library allocation
|
page read and write
|
||
534E000
|
trusted library allocation
|
page read and write
|
||
43C0000
|
direct allocation
|
page read and write
|
||
940000
|
heap
|
page read and write
|
||
ADE000
|
heap
|
page read and write
|
||
58E9000
|
trusted library allocation
|
page read and write
|
||
58A4000
|
trusted library allocation
|
page read and write
|
||
BA7000
|
heap
|
page read and write
|
||
BAB000
|
heap
|
page read and write
|
||
B55000
|
heap
|
page read and write
|
||
57D0000
|
trusted library allocation
|
page read and write
|
||
536C000
|
trusted library allocation
|
page read and write
|
||
53AF000
|
trusted library allocation
|
page read and write
|
||
53D4000
|
trusted library allocation
|
page read and write
|
||
5892000
|
trusted library allocation
|
page read and write
|
||
BC3000
|
heap
|
page read and write
|
||
BCD000
|
heap
|
page read and write
|
||
BA1000
|
heap
|
page read and write
|
||
5349000
|
trusted library allocation
|
page read and write
|
||
7C60000
|
direct allocation
|
page read and write
|
||
57D9000
|
trusted library allocation
|
page read and write
|
||
BA0000
|
heap
|
page read and write
|
||
57D9000
|
trusted library allocation
|
page read and write
|
||
2FBF000
|
stack
|
page read and write
|
||
53C9000
|
trusted library allocation
|
page read and write
|
||
5D5A000
|
trusted library allocation
|
page execute and read and write
|
||
B50000
|
heap
|
page read and write
|
||
B55000
|
heap
|
page read and write
|
||
55A7000
|
trusted library allocation
|
page read and write
|
||
5894000
|
trusted library allocation
|
page read and write
|
||
5364000
|
trusted library allocation
|
page read and write
|
||
535D000
|
trusted library allocation
|
page read and write
|
||
BAB000
|
heap
|
page read and write
|
||
BA1000
|
heap
|
page read and write
|
||
BAF000
|
heap
|
page read and write
|
||
53AA000
|
trusted library allocation
|
page read and write
|
||
5398000
|
trusted library allocation
|
page read and write
|
||
BAB000
|
heap
|
page read and write
|
||
57D5000
|
trusted library allocation
|
page read and write
|
||
537E000
|
trusted library allocation
|
page read and write
|
||
53E9000
|
trusted library allocation
|
page read and write
|
||
58B9000
|
trusted library allocation
|
page read and write
|
||
964000
|
heap
|
page read and write
|
||
5361000
|
trusted library allocation
|
page read and write
|
||
55D2000
|
trusted library allocation
|
page read and write
|
||
BC0000
|
heap
|
page read and write
|
||
39A000
|
unkown
|
page execute and read and write
|
||
53D4000
|
trusted library allocation
|
page read and write
|
||
5368000
|
trusted library allocation
|
page read and write
|
||
B53000
|
heap
|
page read and write
|
||
5507000
|
trusted library allocation
|
page read and write
|
||
5354000
|
trusted library allocation
|
page read and write
|
||
58D4000
|
trusted library allocation
|
page read and write
|
||
BC3000
|
heap
|
page read and write
|
||
533A000
|
trusted library allocation
|
page read and write
|
||
5A43000
|
trusted library allocation
|
page read and write
|
||
5334000
|
trusted library allocation
|
page read and write
|
||
57D6000
|
trusted library allocation
|
page read and write
|
||
54DF000
|
trusted library allocation
|
page read and write
|
||
B50000
|
heap
|
page read and write
|
||
53CA000
|
trusted library allocation
|
page read and write
|
||
53DB000
|
trusted library allocation
|
page read and write
|
||
53C9000
|
trusted library allocation
|
page read and write
|
||
53DE000
|
trusted library allocation
|
page read and write
|
||
5387000
|
trusted library allocation
|
page read and write
|
||
58A1000
|
trusted library allocation
|
page read and write
|
||
57DA000
|
trusted library allocation
|
page read and write
|
||
57D3000
|
trusted library allocation
|
page read and write
|
||
5880000
|
trusted library allocation
|
page read and write
|
||
58BB000
|
trusted library allocation
|
page read and write
|
||
522E000
|
stack
|
page read and write
|
||
595B000
|
trusted library allocation
|
page read and write
|
||
5376000
|
trusted library allocation
|
page read and write
|
||
57DF000
|
trusted library allocation
|
page read and write
|
||
BC0000
|
heap
|
page read and write
|
||
58CF000
|
trusted library allocation
|
page read and write
|
||
BB0000
|
heap
|
page read and write
|
||
57D3000
|
trusted library allocation
|
page read and write
|
||
5923000
|
trusted library allocation
|
page read and write
|
||
591C000
|
trusted library allocation
|
page read and write
|
||
53D4000
|
trusted library allocation
|
page read and write
|
||
5D56000
|
trusted library allocation
|
page read and write
|
||
BAF000
|
heap
|
page read and write
|
||
BAF000
|
heap
|
page read and write
|
||
58FD000
|
trusted library allocation
|
page read and write
|
||
43BF000
|
stack
|
page read and write
|
||
536D000
|
trusted library allocation
|
page read and write
|
||
964000
|
heap
|
page read and write
|
||
537E000
|
trusted library allocation
|
page read and write
|
||
4F3E000
|
stack
|
page read and write
|
||
90000
|
unkown
|
page readonly
|
||
337F000
|
stack
|
page read and write
|
||
BC3000
|
heap
|
page read and write
|
||
B30000
|
heap
|
page read and write
|
||
59B9000
|
trusted library allocation
|
page read and write
|
||
536D000
|
trusted library allocation
|
page read and write
|
||
57D3000
|
trusted library allocation
|
page read and write
|
||
964000
|
heap
|
page read and write
|
||
7C60000
|
direct allocation
|
page read and write
|
||
5896000
|
trusted library allocation
|
page read and write
|
||
4EDF000
|
stack
|
page read and write
|
||
53DB000
|
trusted library allocation
|
page read and write
|
||
BA1000
|
heap
|
page read and write
|
||
57DC000
|
trusted library allocation
|
page read and write
|
||
5365000
|
trusted library allocation
|
page read and write
|
||
BC3000
|
heap
|
page read and write
|
||
2D3F000
|
stack
|
page read and write
|
||
5D3C000
|
trusted library allocation
|
page read and write
|
||
5364000
|
trusted library allocation
|
page read and write
|
||
BC6000
|
heap
|
page read and write
|
||
57DA000
|
trusted library allocation
|
page read and write
|
||
536E000
|
trusted library allocation
|
page read and write
|
||
535E000
|
trusted library allocation
|
page read and write
|
||
BC8000
|
heap
|
page read and write
|
||
278000
|
unkown
|
page execute and read and write
|
||
BB6000
|
heap
|
page read and write
|
||
536B000
|
trusted library allocation
|
page read and write
|
||
5A1F000
|
trusted library allocation
|
page read and write
|
||
5A29000
|
trusted library allocation
|
page read and write
|
||
5334000
|
trusted library allocation
|
page read and write
|
||
BBB000
|
heap
|
page read and write
|
||
B56000
|
heap
|
page read and write
|
||
537E000
|
trusted library allocation
|
page read and write
|
||
BA1000
|
heap
|
page read and write
|
||
5381000
|
trusted library allocation
|
page read and write
|
||
43C0000
|
direct allocation
|
page read and write
|
||
8FB000
|
stack
|
page read and write
|
||
BC3000
|
heap
|
page read and write
|
||
49B0000
|
direct allocation
|
page execute and read and write
|
||
BAD000
|
heap
|
page read and write
|
||
591F000
|
trusted library allocation
|
page read and write
|
||
BC3000
|
heap
|
page read and write
|
||
57D7000
|
trusted library allocation
|
page read and write
|
||
57D7000
|
trusted library allocation
|
page read and write
|
||
5418000
|
trusted library allocation
|
page read and write
|
||
D0E000
|
stack
|
page read and write
|
||
5396000
|
trusted library allocation
|
page read and write
|
||
4D9F000
|
stack
|
page read and write
|
||
535D000
|
trusted library allocation
|
page read and write
|
||
5D50000
|
trusted library allocation
|
page read and write
|
||
534E000
|
trusted library allocation
|
page read and write
|
||
964000
|
heap
|
page read and write
|
||
7C60000
|
direct allocation
|
page read and write
|
||
5353000
|
trusted library allocation
|
page read and write
|
||
4860000
|
direct allocation
|
page read and write
|
||
4DDE000
|
stack
|
page read and write
|
||
B07000
|
heap
|
page read and write
|
||
BC3000
|
heap
|
page read and write
|
||
384000
|
unkown
|
page execute and read and write
|
||
43D1000
|
heap
|
page read and write
|
||
BA1000
|
heap
|
page read and write
|
||
535E000
|
trusted library allocation
|
page read and write
|
||
59FD000
|
trusted library allocation
|
page read and write
|
||
5905000
|
trusted library allocation
|
page read and write
|
||
5883000
|
trusted library allocation
|
page read and write
|
||
57DE000
|
trusted library allocation
|
page read and write
|
||
57DA000
|
trusted library allocation
|
page read and write
|
||
537E000
|
trusted library allocation
|
page read and write
|
||
53D7000
|
trusted library allocation
|
page read and write
|
||
BAB000
|
heap
|
page read and write
|
||
534A000
|
trusted library allocation
|
page read and write
|
||
5365000
|
trusted library allocation
|
page read and write
|
||
43C0000
|
direct allocation
|
page read and write
|
||
5A0F000
|
stack
|
page read and write
|
||
39A000
|
unkown
|
page execute and write copy
|
||
5397000
|
trusted library allocation
|
page read and write
|
||
5882000
|
trusted library allocation
|
page read and write
|
||
BC5000
|
heap
|
page read and write
|
||
7C60000
|
direct allocation
|
page read and write
|
||
591F000
|
trusted library allocation
|
page read and write
|
||
58B7000
|
trusted library allocation
|
page read and write
|
||
5881000
|
trusted library allocation
|
page read and write
|
||
3D7F000
|
stack
|
page read and write
|
||
BAD000
|
heap
|
page read and write
|
||
B1E000
|
heap
|
page read and write
|
||
53C9000
|
trusted library allocation
|
page read and write
|
||
BC3000
|
heap
|
page read and write
|
||
534B000
|
trusted library allocation
|
page read and write
|
||
5350000
|
trusted library allocation
|
page read and write
|
||
5332000
|
trusted library allocation
|
page read and write
|
||
BB4000
|
heap
|
page read and write
|
||
58B5000
|
trusted library allocation
|
page read and write
|
||
4860000
|
direct allocation
|
page read and write
|
||
283F000
|
stack
|
page read and write
|
||
5E43000
|
trusted library allocation
|
page read and write
|
||
43E2000
|
heap
|
page read and write
|
||
53A7000
|
trusted library allocation
|
page read and write
|
||
5879000
|
trusted library allocation
|
page read and write
|
||
53DB000
|
trusted library allocation
|
page read and write
|
||
B55000
|
heap
|
page read and write
|
||
58E6000
|
trusted library allocation
|
page read and write
|
||
BCA000
|
heap
|
page read and write
|
||
BC6000
|
heap
|
page read and write
|
||
43C0000
|
direct allocation
|
page read and write
|
||
57D6000
|
trusted library allocation
|
page read and write
|
||
49E0000
|
direct allocation
|
page execute and read and write
|
||
586A000
|
trusted library allocation
|
page read and write
|
||
53CC000
|
trusted library allocation
|
page read and write
|
||
57D4000
|
trusted library allocation
|
page read and write
|
||
B55000
|
heap
|
page read and write
|
||
489B000
|
stack
|
page read and write
|
||
BA1000
|
heap
|
page read and write
|
||
5873000
|
trusted library allocation
|
page read and write
|
||
58A5000
|
trusted library allocation
|
page read and write
|
||
53C9000
|
trusted library allocation
|
page read and write
|
||
5396000
|
trusted library allocation
|
page read and write
|
||
BC2000
|
heap
|
page read and write
|
||
BBB000
|
heap
|
page read and write
|
||
536B000
|
trusted library allocation
|
page read and write
|
||
53DB000
|
trusted library allocation
|
page read and write
|
||
590C000
|
trusted library allocation
|
page read and write
|
||
359000
|
unkown
|
page execute and read and write
|
||
5333000
|
trusted library allocation
|
page read and write
|
||
5372000
|
trusted library allocation
|
page read and write
|
||
4B1E000
|
stack
|
page read and write
|
||
534B000
|
trusted library allocation
|
page read and write
|
||
2AFE000
|
stack
|
page read and write
|
||
57D6000
|
trusted library allocation
|
page read and write
|
||
5387000
|
trusted library allocation
|
page read and write
|
||
5433000
|
trusted library allocation
|
page read and write
|
||
BCA000
|
heap
|
page read and write
|
||
57DC000
|
trusted library allocation
|
page read and write
|
||
5896000
|
trusted library allocation
|
page read and write
|
||
BA3000
|
heap
|
page read and write
|
||
587B000
|
trusted library allocation
|
page read and write
|
||
517C000
|
stack
|
page read and write
|
||
30FF000
|
stack
|
page read and write
|
||
53DB000
|
trusted library allocation
|
page read and write
|
||
534B000
|
trusted library allocation
|
page read and write
|
||
BB4000
|
heap
|
page read and write
|
||
535F000
|
trusted library allocation
|
page read and write
|
||
537C000
|
trusted library allocation
|
page read and write
|
||
5895000
|
trusted library allocation
|
page read and write
|
||
BC3000
|
heap
|
page read and write
|
||
5D49000
|
trusted library allocation
|
page read and write
|
||
57D5000
|
trusted library allocation
|
page read and write
|
||
5389000
|
trusted library allocation
|
page read and write
|
||
536C000
|
trusted library allocation
|
page read and write
|
||
B50000
|
heap
|
page read and write
|
||
6008000
|
trusted library allocation
|
page execute and read and write
|
||
5355000
|
trusted library allocation
|
page read and write
|
||
5397000
|
trusted library allocation
|
page read and write
|
||
59D1000
|
trusted library allocation
|
page read and write
|
||
BCA000
|
heap
|
page read and write
|
||
57D7000
|
trusted library allocation
|
page read and write
|
||
38B000
|
unkown
|
page execute and read and write
|
||
536D000
|
trusted library allocation
|
page read and write
|
||
7D40000
|
direct allocation
|
page execute and read and write
|
||
3EBF000
|
stack
|
page read and write
|
||
57D5000
|
trusted library allocation
|
page read and write
|
||
4850000
|
remote allocation
|
page read and write
|
||
BB0000
|
heap
|
page read and write
|
||
BBB000
|
heap
|
page read and write
|
||
57D1000
|
trusted library allocation
|
page read and write
|
||
B49000
|
heap
|
page read and write
|
||
58D0000
|
trusted library allocation
|
page read and write
|
||
58AE000
|
trusted library allocation
|
page read and write
|
||
53A0000
|
trusted library allocation
|
page read and write
|
||
4C9E000
|
stack
|
page read and write
|
||
58FF000
|
trusted library allocation
|
page read and write
|
||
58EC000
|
trusted library allocation
|
page read and write
|
||
5336000
|
trusted library allocation
|
page read and write
|
||
539D000
|
trusted library allocation
|
page read and write
|
||
5340000
|
trusted library allocation
|
page read and write
|
||
7C60000
|
direct allocation
|
page read and write
|
||
57D1000
|
trusted library allocation
|
page read and write
|
||
5364000
|
trusted library allocation
|
page read and write
|
||
E3000
|
unkown
|
page write copy
|
||
535D000
|
trusted library allocation
|
page read and write
|
||
5344000
|
trusted library allocation
|
page read and write
|
||
57D4000
|
trusted library allocation
|
page read and write
|
||
BBB000
|
heap
|
page read and write
|
||
BC0000
|
heap
|
page read and write
|
||
538E000
|
trusted library allocation
|
page read and write
|
||
43D1000
|
heap
|
page read and write
|
||
B55000
|
heap
|
page read and write
|
||
417E000
|
stack
|
page read and write
|
||
53C9000
|
trusted library allocation
|
page read and write
|
||
E0E000
|
stack
|
page read and write
|
||
57D7000
|
trusted library allocation
|
page read and write
|
||
A9E000
|
stack
|
page read and write
|
||
BC4000
|
heap
|
page read and write
|
||
5347000
|
trusted library allocation
|
page read and write
|
||
39B000
|
unkown
|
page execute and write copy
|
||
537D000
|
trusted library allocation
|
page read and write
|
||
D2000
|
unkown
|
page execute and read and write
|
||
964000
|
heap
|
page read and write
|
||
58D6000
|
trusted library allocation
|
page read and write
|
||
53BE000
|
trusted library allocation
|
page read and write
|
||
297F000
|
stack
|
page read and write
|
||
5877000
|
trusted library allocation
|
page read and write
|
||
58BA000
|
trusted library allocation
|
page read and write
|
||
5938000
|
trusted library allocation
|
page read and write
|
||
57D8000
|
trusted library allocation
|
page read and write
|
||
373F000
|
stack
|
page read and write
|
||
BC3000
|
heap
|
page read and write
|
||
59FF000
|
trusted library allocation
|
page read and write
|
||
5350000
|
trusted library allocation
|
page read and write
|
||
BBB000
|
heap
|
page read and write
|
||
BAA000
|
heap
|
page read and write
|
||
534E000
|
trusted library allocation
|
page read and write
|
||
BB4000
|
heap
|
page read and write
|
||
5919000
|
trusted library allocation
|
page read and write
|
||
7CC0000
|
direct allocation
|
page read and write
|
||
950000
|
heap
|
page read and write
|
||
BA0000
|
heap
|
page read and write
|
||
58FA000
|
trusted library allocation
|
page read and write
|
||
BAF000
|
heap
|
page read and write
|
||
53C9000
|
trusted library allocation
|
page read and write
|
||
532F000
|
stack
|
page read and write
|
||
537E000
|
trusted library allocation
|
page read and write
|
||
57D7000
|
trusted library allocation
|
page read and write
|
||
539C000
|
trusted library allocation
|
page read and write
|
||
5354000
|
trusted library allocation
|
page read and write
|
||
57D6000
|
trusted library allocation
|
page read and write
|
||
5435000
|
trusted library allocation
|
page read and write
|
||
B53000
|
heap
|
page read and write
|
||
5390000
|
trusted library allocation
|
page read and write
|
||
5A3C000
|
trusted library allocation
|
page read and write
|
||
53E1000
|
trusted library allocation
|
page read and write
|
||
543E000
|
trusted library allocation
|
page read and write
|
||
BA1000
|
heap
|
page read and write
|
||
58AC000
|
trusted library allocation
|
page read and write
|
||
BAF000
|
heap
|
page read and write
|
||
5907000
|
trusted library allocation
|
page read and write
|
||
5395000
|
trusted library allocation
|
page read and write
|
||
535E000
|
trusted library allocation
|
page read and write
|
||
5381000
|
trusted library allocation
|
page read and write
|
||
536D000
|
trusted library allocation
|
page read and write
|
||
5336000
|
trusted library allocation
|
page read and write
|
||
57D2000
|
trusted library allocation
|
page read and write
|
||
BB0000
|
heap
|
page read and write
|
||
5340000
|
trusted library allocation
|
page read and write
|
||
413F000
|
stack
|
page read and write
|
||
57D4000
|
trusted library allocation
|
page read and write
|
||
5871000
|
trusted library allocation
|
page read and write
|
||
5333000
|
trusted library allocation
|
page read and write
|
||
BC3000
|
heap
|
page read and write
|
||
5353000
|
trusted library allocation
|
page read and write
|
||
57DC000
|
trusted library allocation
|
page read and write
|
||
5392000
|
trusted library allocation
|
page read and write
|
||
964000
|
heap
|
page read and write
|
||
BCD000
|
heap
|
page read and write
|
||
BBB000
|
heap
|
page read and write
|
||
58A3000
|
trusted library allocation
|
page read and write
|
||
5341000
|
trusted library allocation
|
page read and write
|
||
5376000
|
trusted library allocation
|
page read and write
|
||
4810000
|
heap
|
page read and write
|
||
363E000
|
stack
|
page read and write
|
||
5365000
|
trusted library allocation
|
page read and write
|
||
34FE000
|
stack
|
page read and write
|
||
B56000
|
heap
|
page read and write
|
||
BC3000
|
heap
|
page read and write
|
||
5355000
|
trusted library allocation
|
page read and write
|
||
541000
|
unkown
|
page execute and write copy
|
||
2C3E000
|
stack
|
page read and write
|
||
53C9000
|
trusted library allocation
|
page read and write
|
||
57D8000
|
trusted library allocation
|
page read and write
|
||
BBB000
|
heap
|
page read and write
|
||
BB2000
|
heap
|
page read and write
|
||
53CA000
|
trusted library allocation
|
page read and write
|
||
58D8000
|
trusted library allocation
|
page read and write
|
||
BA3000
|
heap
|
page read and write
|
||
BC3000
|
heap
|
page read and write
|
||
57D4000
|
trusted library allocation
|
page read and write
|
||
BC8000
|
heap
|
page read and write
|
||
5A1E000
|
trusted library allocation
|
page read and write
|
||
53A7000
|
trusted library allocation
|
page read and write
|
||
BBB000
|
heap
|
page read and write
|
||
7CC0000
|
direct allocation
|
page read and write
|
||
537E000
|
trusted library allocation
|
page read and write
|
||
B55000
|
heap
|
page read and write
|
||
537C000
|
trusted library allocation
|
page read and write
|
||
57DA000
|
trusted library allocation
|
page read and write
|
||
53A5000
|
trusted library allocation
|
page read and write
|
||
53DB000
|
trusted library allocation
|
page read and write
|
||
960000
|
heap
|
page read and write
|
||
59CF000
|
trusted library allocation
|
page read and write
|
||
5336000
|
trusted library allocation
|
page read and write
|
||
BC3000
|
heap
|
page read and write
|
||
49E0000
|
direct allocation
|
page execute and read and write
|
||
5A8E000
|
stack
|
page read and write
|
||
BC9000
|
heap
|
page read and write
|
||
57DA000
|
trusted library allocation
|
page read and write
|
||
58FC000
|
trusted library allocation
|
page read and write
|
||
57D8000
|
trusted library allocation
|
page read and write
|
||
5FF7000
|
trusted library allocation
|
page execute and read and write
|
||
5A6B000
|
trusted library allocation
|
page read and write
|
||
5A09000
|
trusted library allocation
|
page read and write
|
||
53EB000
|
trusted library allocation
|
page read and write
|
||
BCD000
|
heap
|
page read and write
|
||
537E000
|
trusted library allocation
|
page read and write
|
||
537E000
|
trusted library allocation
|
page read and write
|
||
29BE000
|
stack
|
page read and write
|
||
BBB000
|
heap
|
page read and write
|
||
BC3000
|
heap
|
page read and write
|
||
48A1000
|
direct allocation
|
page read and write
|
||
534A000
|
trusted library allocation
|
page read and write
|
||
53AC000
|
trusted library allocation
|
page read and write
|
||
57D7000
|
trusted library allocation
|
page read and write
|
||
964000
|
heap
|
page read and write
|
||
964000
|
heap
|
page read and write
|
||
59DD000
|
trusted library allocation
|
page read and write
|
||
5353000
|
trusted library allocation
|
page read and write
|
||
42BE000
|
stack
|
page read and write
|
||
49E0000
|
direct allocation
|
page execute and read and write
|
||
BB6000
|
heap
|
page read and write
|
||
BBB000
|
heap
|
page read and write
|
||
BB0000
|
heap
|
page read and write
|
||
E3000
|
unkown
|
page write copy
|
||
54CB000
|
trusted library allocation
|
page read and write
|
||
BBB000
|
heap
|
page read and write
|
||
539A000
|
trusted library allocation
|
page read and write
|
||
536D000
|
trusted library allocation
|
page read and write
|
||
57D5000
|
trusted library allocation
|
page read and write
|
||
536B000
|
trusted library allocation
|
page read and write
|
||
43D1000
|
heap
|
page read and write
|
||
BB2000
|
heap
|
page read and write
|
||
536D000
|
trusted library allocation
|
page read and write
|
||
BC3000
|
heap
|
page read and write
|
||
57DC000
|
trusted library allocation
|
page read and write
|
||
5908000
|
trusted library allocation
|
page read and write
|
||
43D1000
|
heap
|
page read and write
|
||
533D000
|
trusted library allocation
|
page read and write
|
||
5368000
|
trusted library allocation
|
page read and write
|
||
5437000
|
trusted library allocation
|
page read and write
|
||
43D1000
|
heap
|
page read and write
|
||
5898000
|
trusted library allocation
|
page read and write
|
||
5A9B000
|
trusted library allocation
|
page read and write
|
||
53DB000
|
trusted library allocation
|
page read and write
|
||
5868000
|
trusted library allocation
|
page read and write
|
||
5344000
|
trusted library allocation
|
page read and write
|
||
5365000
|
trusted library allocation
|
page read and write
|
||
35FF000
|
stack
|
page read and write
|
||
964000
|
heap
|
page read and write
|
||
34BF000
|
stack
|
page read and write
|
||
5364000
|
trusted library allocation
|
page read and write
|
||
43D1000
|
heap
|
page read and write
|
||
2FFE000
|
stack
|
page read and write
|
||
5885000
|
trusted library allocation
|
page read and write
|
||
4860000
|
direct allocation
|
page read and write
|
||
5353000
|
trusted library allocation
|
page read and write
|
||
BAF000
|
heap
|
page read and write
|
||
5D52000
|
trusted library allocation
|
page execute and read and write
|
||
590A000
|
trusted library allocation
|
page read and write
|
||
5379000
|
trusted library allocation
|
page read and write
|
||
533B000
|
trusted library allocation
|
page read and write
|
||
539C000
|
trusted library allocation
|
page read and write
|
||
272C000
|
stack
|
page read and write
|
||
5439000
|
trusted library allocation
|
page read and write
|
||
49D0000
|
direct allocation
|
page execute and read and write
|
||
57D5000
|
trusted library allocation
|
page read and write
|
||
5435000
|
trusted library allocation
|
page read and write
|
||
58D2000
|
trusted library allocation
|
page read and write
|
||
5A45000
|
trusted library allocation
|
page read and write
|
||
5350000
|
trusted library allocation
|
page read and write
|
||
5A2B000
|
trusted library allocation
|
page read and write
|
||
BBB000
|
heap
|
page read and write
|
||
287E000
|
stack
|
page read and write
|
||
5938000
|
trusted library allocation
|
page read and write
|
||
5893000
|
trusted library allocation
|
page read and write
|
||
57D3000
|
trusted library allocation
|
page read and write
|
||
BA3000
|
heap
|
page read and write
|
||
BC3000
|
heap
|
page read and write
|
||
5350000
|
trusted library allocation
|
page read and write
|
||
59DB000
|
trusted library allocation
|
page read and write
|
||
43C0000
|
direct allocation
|
page read and write
|
||
BA1000
|
heap
|
page read and write
|
||
43C0000
|
direct allocation
|
page read and write
|
||
BA1000
|
heap
|
page read and write
|
||
B55000
|
heap
|
page read and write
|
||
537E000
|
trusted library allocation
|
page read and write
|
||
550F000
|
trusted library allocation
|
page read and write
|
||
58FB000
|
trusted library allocation
|
page read and write
|
||
BA1000
|
heap
|
page read and write
|
||
2E7F000
|
stack
|
page read and write
|
||
5332000
|
trusted library allocation
|
page read and write
|
||
43D1000
|
heap
|
page read and write
|
||
57D7000
|
trusted library allocation
|
page read and write
|
||
538D000
|
trusted library allocation
|
page read and write
|
||
B53000
|
heap
|
page read and write
|
||
57D8000
|
trusted library allocation
|
page read and write
|
||
4A2D000
|
trusted library allocation
|
page read and write
|
||
57D6000
|
trusted library allocation
|
page read and write
|
||
53A7000
|
trusted library allocation
|
page read and write
|
||
5333000
|
trusted library allocation
|
page read and write
|
||
7C60000
|
direct allocation
|
page read and write
|
||
5389000
|
trusted library allocation
|
page read and write
|
||
BA1000
|
heap
|
page read and write
|
||
5353000
|
trusted library allocation
|
page read and write
|
||
BC0000
|
heap
|
page read and write
|
||
7C60000
|
direct allocation
|
page read and write
|
||
43C0000
|
direct allocation
|
page read and write
|
||
546A000
|
stack
|
page read and write
|
||
58FD000
|
trusted library allocation
|
page read and write
|
||
43D1000
|
heap
|
page read and write
|
||
5353000
|
trusted library allocation
|
page read and write
|
||
49F0000
|
direct allocation
|
page execute and read and write
|
||
5A4C000
|
stack
|
page read and write
|
||
58C9000
|
trusted library allocation
|
page read and write
|
||
3AFF000
|
stack
|
page read and write
|
||
5341000
|
trusted library allocation
|
page read and write
|
||
3DBE000
|
stack
|
page read and write
|
||
5A1C000
|
trusted library allocation
|
page read and write
|
||
3C3F000
|
stack
|
page read and write
|
||
BBB000
|
heap
|
page read and write
|
||
5995000
|
trusted library allocation
|
page read and write
|
||
BBB000
|
heap
|
page read and write
|
||
57DA000
|
trusted library allocation
|
page read and write
|
||
49ED000
|
stack
|
page read and write
|
||
5330000
|
trusted library allocation
|
page read and write
|
||
5349000
|
trusted library allocation
|
page read and write
|
||
90000
|
unkown
|
page read and write
|
||
964000
|
heap
|
page read and write
|
||
5396000
|
trusted library allocation
|
page read and write
|
||
536D000
|
trusted library allocation
|
page read and write
|
||
5340000
|
trusted library allocation
|
page read and write
|
||
43C0000
|
direct allocation
|
page read and write
|
||
5370000
|
trusted library allocation
|
page read and write
|
||
7C60000
|
direct allocation
|
page read and write
|
||
5378000
|
trusted library allocation
|
page read and write
|
||
57D9000
|
trusted library allocation
|
page read and write
|
||
58A2000
|
trusted library allocation
|
page read and write
|
||
5362000
|
trusted library allocation
|
page read and write
|
||
5A3A000
|
trusted library allocation
|
page read and write
|
||
7C60000
|
direct allocation
|
page read and write
|
||
B9A000
|
heap
|
page read and write
|
||
5366000
|
trusted library allocation
|
page read and write
|
||
57D3000
|
trusted library allocation
|
page read and write
|
||
5C1E000
|
trusted library allocation
|
page read and write
|
||
5345000
|
trusted library allocation
|
page read and write
|
||
5918000
|
trusted library allocation
|
page read and write
|
||
5517000
|
trusted library allocation
|
page read and write
|
||
546F000
|
trusted library allocation
|
page read and write
|
||
7D10000
|
direct allocation
|
page execute and read and write
|
||
2737000
|
heap
|
page read and write
|
||
387F000
|
stack
|
page read and write
|
||
BCE000
|
heap
|
page read and write
|
||
AC0000
|
heap
|
page read and write
|
||
57D6000
|
trusted library allocation
|
page read and write
|
||
B55000
|
heap
|
page read and write
|
||
5341000
|
trusted library allocation
|
page read and write
|
||
327E000
|
stack
|
page read and write
|
||
53CA000
|
trusted library allocation
|
page read and write
|
||
BC3000
|
heap
|
page read and write
|
||
536D000
|
trusted library allocation
|
page read and write
|
||
53DB000
|
trusted library allocation
|
page read and write
|
||
43C0000
|
direct allocation
|
page read and write
|
||
B56000
|
heap
|
page read and write
|
||
BBB000
|
heap
|
page read and write
|
||
503F000
|
stack
|
page read and write
|
||
597F000
|
trusted library allocation
|
page read and write
|
||
43C0000
|
direct allocation
|
page read and write
|
||
43C0000
|
direct allocation
|
page read and write
|
||
5A21000
|
trusted library allocation
|
page read and write
|
||
BAB000
|
heap
|
page read and write
|
||
323F000
|
stack
|
page read and write
|
||
533D000
|
trusted library allocation
|
page read and write
|
||
5399000
|
trusted library allocation
|
page read and write
|
||
5392000
|
trusted library allocation
|
page read and write
|
||
5921000
|
trusted library allocation
|
page read and write
|
||
B8E000
|
heap
|
page read and write
|
||
57D2000
|
trusted library allocation
|
page read and write
|
||
5346000
|
trusted library allocation
|
page read and write
|
||
51E0000
|
heap
|
page read and write
|
||
5332000
|
trusted library allocation
|
page read and write
|
||
B52000
|
heap
|
page read and write
|
||
BA1000
|
heap
|
page read and write
|
||
5350000
|
trusted library allocation
|
page read and write
|
||
BC3000
|
heap
|
page read and write
|
||
55D0000
|
trusted library allocation
|
page read and write
|
||
E5000
|
unkown
|
page execute and read and write
|
||
5396000
|
trusted library allocation
|
page read and write
|
||
BAD000
|
heap
|
page read and write
|
||
ADA000
|
heap
|
page read and write
|
||
499F000
|
stack
|
page read and write
|
||
57D4000
|
trusted library allocation
|
page read and write
|
||
43D1000
|
heap
|
page read and write
|
||
536D000
|
trusted library allocation
|
page read and write
|
||
53C9000
|
trusted library allocation
|
page read and write
|
||
964000
|
heap
|
page read and write
|
||
5368000
|
trusted library allocation
|
page read and write
|
||
AD0000
|
heap
|
page read and write
|
||
533B000
|
trusted library allocation
|
page read and write
|
||
5344000
|
trusted library allocation
|
page read and write
|
||
5433000
|
trusted library allocation
|
page read and write
|
||
2EBE000
|
stack
|
page read and write
|
||
BA1000
|
heap
|
page read and write
|
||
377E000
|
stack
|
page read and write
|
||
58E4000
|
trusted library allocation
|
page read and write
|
||
5349000
|
trusted library allocation
|
page read and write
|
||
533B000
|
trusted library allocation
|
page read and write
|
||
536D000
|
trusted library allocation
|
page read and write
|
||
53AE000
|
trusted library allocation
|
page read and write
|
||
BA3000
|
heap
|
page read and write
|
||
43D1000
|
heap
|
page read and write
|
||
57DC000
|
trusted library allocation
|
page read and write
|
||
535E000
|
trusted library allocation
|
page read and write
|
||
BBB000
|
heap
|
page read and write
|
||
5917000
|
trusted library allocation
|
page read and write
|
||
4A00000
|
direct allocation
|
page execute and read and write
|
||
57DA000
|
trusted library allocation
|
page read and write
|
||
537E000
|
trusted library allocation
|
page read and write
|
||
4850000
|
remote allocation
|
page read and write
|
||
57D9000
|
trusted library allocation
|
page read and write
|
||
534A000
|
trusted library allocation
|
page read and write
|
||
7C60000
|
trusted library allocation
|
page read and write
|
||
403E000
|
stack
|
page read and write
|
||
5921000
|
trusted library allocation
|
page read and write
|
||
BCA000
|
heap
|
page read and write
|
||
58C0000
|
trusted library allocation
|
page read and write
|
||
5DB000
|
stack
|
page read and write
|
||
49E0000
|
direct allocation
|
page execute and read and write
|
||
53D4000
|
trusted library allocation
|
page read and write
|
||
538C000
|
trusted library allocation
|
page read and write
|
||
5350000
|
trusted library allocation
|
page read and write
|
||
26EF000
|
stack
|
page read and write
|
||
535D000
|
trusted library allocation
|
page read and write
|
||
BC6000
|
heap
|
page read and write
|
||
43C0000
|
direct allocation
|
page read and write
|
||
BCA000
|
heap
|
page read and write
|
||
57E1000
|
trusted library allocation
|
page read and write
|
||
599D000
|
trusted library allocation
|
page read and write
|
||
58EE000
|
trusted library allocation
|
page read and write
|
||
5350000
|
trusted library allocation
|
page read and write
|
||
5365000
|
trusted library allocation
|
page read and write
|
||
5925000
|
trusted library allocation
|
page read and write
|
||
537E000
|
trusted library allocation
|
page read and write
|
||
57D8000
|
trusted library allocation
|
page read and write
|
||
7C60000
|
direct allocation
|
page read and write
|
||
B55000
|
heap
|
page read and write
|
||
5906000
|
trusted library allocation
|
page read and write
|
||
3FFF000
|
stack
|
page read and write
|
||
BA3000
|
heap
|
page read and write
|
||
49E0000
|
direct allocation
|
page execute and read and write
|
||
BA1000
|
heap
|
page read and write
|
||
53AE000
|
trusted library allocation
|
page read and write
|
||
964000
|
heap
|
page read and write
|
||
5908000
|
trusted library allocation
|
page read and write
|
||
BA5000
|
heap
|
page read and write
|
||
43D1000
|
heap
|
page read and write
|
||
537E000
|
trusted library allocation
|
page read and write
|
||
5367000
|
trusted library allocation
|
page read and write
|
||
5936000
|
trusted library allocation
|
page read and write
|
||
44D0000
|
trusted library allocation
|
page read and write
|
||
535E000
|
trusted library allocation
|
page read and write
|
||
5338000
|
trusted library allocation
|
page read and write
|
||
54B0000
|
direct allocation
|
page read and write
|
||
BB3000
|
heap
|
page read and write
|
||
BAD000
|
heap
|
page read and write
|
||
538E000
|
trusted library allocation
|
page read and write
|
||
507E000
|
stack
|
page read and write
|
||
CCE000
|
stack
|
page read and write
|
||
BCD000
|
heap
|
page read and write
|
||
25EE000
|
stack
|
page read and write
|
||
5981000
|
trusted library allocation
|
page read and write
|
||
5389000
|
trusted library allocation
|
page read and write
|
||
2730000
|
heap
|
page read and write
|
||
43C0000
|
direct allocation
|
page read and write
|
||
5345000
|
trusted library allocation
|
page read and write
|
||
964000
|
heap
|
page read and write
|
||
535F000
|
trusted library allocation
|
page read and write
|
||
BBB000
|
heap
|
page read and write
|
||
5389000
|
trusted library allocation
|
page read and write
|
||
53A7000
|
trusted library allocation
|
page read and write
|
||
B55000
|
heap
|
page read and write
|
||
BBB000
|
heap
|
page read and write
|
||
5344000
|
trusted library allocation
|
page read and write
|
||
7C60000
|
direct allocation
|
page read and write
|
||
5375000
|
trusted library allocation
|
page read and write
|
||
57DC000
|
trusted library allocation
|
page read and write
|
||
57D6000
|
trusted library allocation
|
page read and write
|
||
BAB000
|
heap
|
page read and write
|
||
5997000
|
trusted library allocation
|
page read and write
|
||
537B000
|
trusted library allocation
|
page read and write
|
||
537E000
|
trusted library allocation
|
page read and write
|
||
537B000
|
trusted library allocation
|
page read and write
|
||
5350000
|
trusted library allocation
|
page read and write
|
||
BCC000
|
heap
|
page read and write
|
||
57D8000
|
trusted library allocation
|
page read and write
|
||
537E000
|
trusted library allocation
|
page read and write
|
||
537E000
|
trusted library allocation
|
page read and write
|
||
57D7000
|
trusted library allocation
|
page read and write
|
||
535D000
|
trusted library allocation
|
page read and write
|
||
3C7E000
|
stack
|
page read and write
|
||
BA5000
|
heap
|
page read and write
|
||
538C000
|
trusted library allocation
|
page read and write
|
||
5340000
|
trusted library allocation
|
page read and write
|
||
5341000
|
trusted library allocation
|
page read and write
|
||
58D1000
|
trusted library allocation
|
page read and write
|
||
535D000
|
trusted library allocation
|
page read and write
|
||
53B7000
|
trusted library allocation
|
page read and write
|
||
5340000
|
trusted library allocation
|
page read and write
|
||
BC6000
|
heap
|
page read and write
|
||
58EB000
|
trusted library allocation
|
page read and write
|
||
BC3000
|
heap
|
page read and write
|
||
57D8000
|
trusted library allocation
|
page read and write
|
||
5354000
|
trusted library allocation
|
page read and write
|
||
5438000
|
trusted library allocation
|
page read and write
|
||
BC3000
|
heap
|
page read and write
|
||
BBB000
|
heap
|
page read and write
|
||
427F000
|
stack
|
page read and write
|
||
591A000
|
trusted library allocation
|
page read and write
|
||
5385000
|
trusted library allocation
|
page read and write
|
||
5879000
|
trusted library allocation
|
page read and write
|
||
5A07000
|
trusted library allocation
|
page read and write
|
||
5883000
|
trusted library allocation
|
page read and write
|
||
57D7000
|
trusted library allocation
|
page read and write
|
||
5380000
|
trusted library allocation
|
page read and write
|
||
5435000
|
trusted library allocation
|
page read and write
|
||
BA1000
|
heap
|
page read and write
|
||
4B5E000
|
stack
|
page read and write
|
||
536A000
|
trusted library allocation
|
page read and write
|
||
5340000
|
trusted library allocation
|
page read and write
|
||
53A7000
|
trusted library allocation
|
page read and write
|
||
43D1000
|
heap
|
page read and write
|
||
534F000
|
trusted library allocation
|
page read and write
|
||
58C7000
|
trusted library allocation
|
page read and write
|
||
BC9000
|
heap
|
page read and write
|
||
43D1000
|
heap
|
page read and write
|
||
57D8000
|
trusted library allocation
|
page read and write
|
||
58B2000
|
trusted library allocation
|
page read and write
|
||
57D4000
|
trusted library allocation
|
page read and write
|
||
38BE000
|
stack
|
page read and write
|
||
53A3000
|
trusted library allocation
|
page read and write
|
||
539D000
|
trusted library allocation
|
page read and write
|
||
58C9000
|
stack
|
page read and write
|
||
53CA000
|
trusted library allocation
|
page read and write
|
||
33BE000
|
stack
|
page read and write
|
||
53A7000
|
trusted library allocation
|
page read and write
|
||
39BF000
|
stack
|
page read and write
|
||
53AC000
|
trusted library allocation
|
page read and write
|
||
535A000
|
trusted library allocation
|
page read and write
|
||
5353000
|
trusted library allocation
|
page read and write
|
||
BA0000
|
heap
|
page read and write
|
||
43D1000
|
heap
|
page read and write
|
||
5350000
|
trusted library allocation
|
page read and write
|
||
57D1000
|
trusted library allocation
|
page read and write
|
||
2D7E000
|
stack
|
page read and write
|
||
58D6000
|
trusted library allocation
|
page read and write
|
||
534B000
|
trusted library allocation
|
page read and write
|
||
BBB000
|
heap
|
page read and write
|
||
57D2000
|
trusted library allocation
|
page read and write
|
||
B47000
|
heap
|
page read and write
|
||
55DE000
|
trusted library allocation
|
page read and write
|
||
5387000
|
trusted library allocation
|
page read and write
|
||
6006000
|
trusted library allocation
|
page execute and read and write
|
||
57DA000
|
trusted library allocation
|
page read and write
|
||
964000
|
heap
|
page read and write
|
||
B3E000
|
heap
|
page read and write
|
||
964000
|
heap
|
page read and write
|
||
540000
|
unkown
|
page execute and read and write
|
||
57D5000
|
trusted library allocation
|
page read and write
|
||
5385000
|
trusted library allocation
|
page read and write
|
||
53AB000
|
trusted library allocation
|
page read and write
|
||
5364000
|
trusted library allocation
|
page read and write
|
||
5350000
|
trusted library allocation
|
page read and write
|
||
3EFE000
|
stack
|
page read and write
|
||
BCA000
|
heap
|
page read and write
|
||
43D1000
|
heap
|
page read and write
|
||
5345000
|
trusted library allocation
|
page read and write
|
||
B3E000
|
heap
|
page read and write
|
||
5345000
|
trusted library allocation
|
page read and write
|
||
7CC0000
|
direct allocation
|
page read and write
|
||
537D000
|
trusted library allocation
|
page read and write
|
||
49C0000
|
direct allocation
|
page execute and read and write
|
||
57DA000
|
trusted library allocation
|
page read and write
|
||
5372000
|
trusted library allocation
|
page read and write
|
||
539A000
|
trusted library allocation
|
page read and write
|
||
53D4000
|
trusted library allocation
|
page read and write
|
||
536C000
|
trusted library allocation
|
page read and write
|
||
BA1000
|
heap
|
page read and write
|
||
5353000
|
trusted library allocation
|
page read and write
|
There are 856 hidden memdumps, click here to show them.
DOM / HTML
URL
|
Malicious
|
|
---|---|---|
https://learn.microsoft.com/en-us/dotnet/framework/install/application-not-started?version=(null)&processName=file.exe&platform=0009&osver=6&isServer=0&shimver=4.0.30319.0
|
||
https://learn.microsoft.com/en-us/dotnet/framework/install/application-not-started?version=(null)&processName=file.exe&platform=0009&osver=6&isServer=0&shimver=4.0.30319.0
|
||
https://learn.microsoft.com/en-us/dotnet/framework/install/application-not-started?version=(null)&processName=file.exe&platform=0009&osver=6&isServer=0&shimver=4.0.30319.0
|
||
https://learn.microsoft.com/en-us/dotnet/framework/install/application-not-started?version=(null)&processName=file.exe&platform=0009&osver=6&isServer=0&shimver=4.0.30319.0
|