Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
file.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
initial sample
|
||
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Docs.lnk
|
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command
line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Tue Dec 10 03:47:36 2024, atime=Wed Sep 27 04:28:28
2023, length=1210144, window=hide
|
dropped
|
||
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Gmail.lnk
|
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command
line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Tue Dec 10 03:47:35 2024, atime=Wed Sep 27 04:28:28
2023, length=1210144, window=hide
|
dropped
|
||
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Google Drive.lnk
|
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command
line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Wed Oct 4 12:54:07 2023, atime=Wed Sep 27 04:28:28
2023, length=1210144, window=hide
|
dropped
|
||
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Sheets.lnk
|
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command
line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Tue Dec 10 03:47:35 2024, atime=Wed Sep 27 04:28:28
2023, length=1210144, window=hide
|
dropped
|
||
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Slides.lnk
|
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command
line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Tue Dec 10 03:47:35 2024, atime=Wed Sep 27 04:28:28
2023, length=1210144, window=hide
|
dropped
|
||
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\YouTube.lnk
|
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command
line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Tue Dec 10 03:47:35 2024, atime=Wed Sep 27 04:28:28
2023, length=1210144, window=hide
|
dropped
|
||
Chrome Cache Entry: 100
|
MS Windows icon resource - 6 icons, -128x-128, 16 colors, 72x72, 16 colors
|
downloaded
|
||
Chrome Cache Entry: 101
|
ASCII text, with very long lines (46884)
|
downloaded
|
||
Chrome Cache Entry: 102
|
JSON data
|
dropped
|
||
Chrome Cache Entry: 103
|
MS Windows icon resource - 6 icons, -128x-128, 16 colors, 72x72, 16 colors
|
dropped
|
||
Chrome Cache Entry: 104
|
PNG image data, 658 x 480, 8-bit/color RGBA, non-interlaced
|
downloaded
|
||
Chrome Cache Entry: 105
|
ASCII text, with very long lines (33148), with no line terminators
|
dropped
|
||
Chrome Cache Entry: 106
|
JSON data
|
downloaded
|
||
Chrome Cache Entry: 107
|
JPEG image data, JFIF standard 1.01, aspect ratio, density 1x1, segment length 16, baseline, precision 8, 1528x402, components
3
|
dropped
|
||
Chrome Cache Entry: 108
|
PNG image data, 475 x 212, 8-bit/color RGBA, non-interlaced
|
downloaded
|
||
Chrome Cache Entry: 109
|
JSON data
|
dropped
|
||
Chrome Cache Entry: 110
|
JSON data
|
downloaded
|
||
Chrome Cache Entry: 111
|
JSON data
|
dropped
|
||
Chrome Cache Entry: 112
|
JPEG image data, JFIF standard 1.01, aspect ratio, density 1x1, segment length 16, baseline, precision 8, 1528x402, components
3
|
downloaded
|
||
Chrome Cache Entry: 113
|
exported SGML document, ASCII text, with very long lines (65536), with no line terminators
|
dropped
|
||
Chrome Cache Entry: 114
|
JSON data
|
dropped
|
||
Chrome Cache Entry: 115
|
ASCII text, with very long lines (46884)
|
dropped
|
||
Chrome Cache Entry: 116
|
ASCII text
|
dropped
|
||
Chrome Cache Entry: 117
|
SVG Scalable Vector Graphics image
|
downloaded
|
||
Chrome Cache Entry: 118
|
Web Open Font Format (Version 2), TrueType, length 19696, version 1.0
|
downloaded
|
||
Chrome Cache Entry: 119
|
ASCII text, with very long lines (33148), with no line terminators
|
downloaded
|
||
Chrome Cache Entry: 120
|
PNG image data, 475 x 212, 8-bit/color RGBA, non-interlaced
|
dropped
|
||
Chrome Cache Entry: 121
|
PNG image data, 658 x 480, 8-bit/color RGBA, non-interlaced
|
dropped
|
||
Chrome Cache Entry: 122
|
JSON data
|
dropped
|
||
Chrome Cache Entry: 123
|
HTML document, ASCII text, with very long lines (639), with CRLF, LF line terminators
|
downloaded
|
||
Chrome Cache Entry: 124
|
JSON data
|
downloaded
|
||
Chrome Cache Entry: 125
|
PNG image data, 533 x 478, 8-bit/color RGBA, non-interlaced
|
dropped
|
||
Chrome Cache Entry: 83
|
PNG image data, 533 x 478, 8-bit/color RGBA, non-interlaced
|
dropped
|
||
Chrome Cache Entry: 84
|
PNG image data, 533 x 478, 8-bit/color RGBA, non-interlaced
|
downloaded
|
||
Chrome Cache Entry: 85
|
SVG Scalable Vector Graphics image
|
dropped
|
||
Chrome Cache Entry: 86
|
JSON data
|
dropped
|
||
Chrome Cache Entry: 87
|
PNG image data, 533 x 478, 8-bit/color RGBA, non-interlaced
|
dropped
|
||
Chrome Cache Entry: 88
|
ASCII text, with very long lines (65536), with no line terminators
|
downloaded
|
||
Chrome Cache Entry: 89
|
ASCII text, with no line terminators
|
downloaded
|
||
Chrome Cache Entry: 90
|
ASCII text, with very long lines (65410)
|
dropped
|
||
Chrome Cache Entry: 91
|
JSON data
|
dropped
|
||
Chrome Cache Entry: 92
|
ASCII text, with very long lines (65410)
|
downloaded
|
||
Chrome Cache Entry: 93
|
JSON data
|
downloaded
|
||
Chrome Cache Entry: 94
|
PNG image data, 533 x 478, 8-bit/color RGBA, non-interlaced
|
downloaded
|
||
Chrome Cache Entry: 95
|
ASCII text, with very long lines (52717), with no line terminators
|
dropped
|
||
Chrome Cache Entry: 96
|
ASCII text
|
downloaded
|
||
Chrome Cache Entry: 97
|
ASCII text, with very long lines (52717), with no line terminators
|
downloaded
|
||
Chrome Cache Entry: 98
|
exported SGML document, ASCII text, with very long lines (65536), with no line terminators
|
downloaded
|
||
Chrome Cache Entry: 99
|
PNG image data, 533 x 478, 8-bit/color RGBA, non-interlaced
|
downloaded
|
There are 40 hidden files, click here to show them.
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\file.exe
|
"C:\Users\user\Desktop\file.exe"
|
||
C:\Program Files\Google\Chrome\Application\chrome.exe
|
"C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized --single-argument http://go.microsoft.com/fwlink/?prd=11324&pver=4.5&sbp=AppLaunch2&plcid=0x409&o1=SHIM_NOVERSION_FOUND&version=(null)&processName=file.exe&platform=0009&osver=6&isServer=0&shimver=4.0.30319.0
|
||
C:\Program Files\Google\Chrome\Application\chrome.exe
|
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US
--service-sandbox-type=none --mojo-platform-channel-handle=2076 --field-trial-handle=1980,i,9850134868156104095,2027123724465788591,262144
--disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction
/prefetch:8
|
||
C:\Program Files\Google\Chrome\Application\chrome.exe
|
"C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized --single-argument http://go.microsoft.com/fwlink/?prd=11324&pver=4.5&sbp=AppLaunch2&plcid=0x409&o1=SHIM_NOVERSION_FOUND&version=(null)&processName=file.exe&platform=0009&osver=6&isServer=0&shimver=4.0.30319.0
|
||
C:\Program Files\Google\Chrome\Application\chrome.exe
|
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US
--service-sandbox-type=none --mojo-platform-channel-handle=1160 --field-trial-handle=2008,i,16001316125916077205,5372674781634389717,262144
--disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction
/prefetch:8
|
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
https://authoring-docs-microsoft.poolparty.biz/devrel/7696cda6-0510-47f6-8302-71bb5d2e28cf
|
unknown
|
||
https://duckduckgo.com/chrome_newtab
|
unknown
|
||
dare-curbys.biz
|
|||
impend-differ.biz
|
|||
https://duckduckgo.com/ac/?q=
|
unknown
|
||
https://imp.mt48.net/static?id=7RHzfOIXjFEYsBdvIpkX4Qqm4p8dfCfm4pbW1pbWfpbW7ReNxR3UIG8zInwYIFIVs9eYi
|
unknown
|
||
https://github.com/dotnet/docs/blob/17c4acca45e573a92878a44a2cce57d699fe9c7c/docs/framework/install/
|
unknown
|
||
https://bridge.sfo1.admarketplace.net/ctp?version=16.0.0&key=1696425136400800000.2&ci=1696425136743.
|
unknown
|
||
https://www.linkedin.com/cws/share?url=$
|
unknown
|
||
https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
|
unknown
|
||
https://atten-supporse.biz/R
|
unknown
|
||
https://github.com/Youssef1313
|
unknown
|
||
https://management.azure.com/providers/Microsoft.Portal/userSettings/cloudconsole?api-version=2023-0
|
unknown
|
||
dwell-exclaim.biz
|
|||
https://aka.ms/msignite_docs_banner
|
unknown
|
||
https://videoencodingpublic-hgeaeyeba8gycee3.b01.azurefd.net/public-b4da8140-92cf-421c-8b7b-e471d5b9
|
unknown
|
||
http://polymer.github.io/AUTHORS.txt
|
unknown
|
||
https://github.com/dotnet/docs/issues/new?template=z-customer-feedback.yml
|
unknown
|
||
https://atten-supporse.biz/apite
|
unknown
|
||
https://management.azure.com/subscriptions?api-version=2016-06-01
|
unknown
|
||
https://atten-supporse.biz/apib
|
unknown
|
||
https://github.com/dotnet/docs/blob/main/docs/framework/install/application-not-started.md
|
unknown
|
||
zinc-sneark.biz
|
|||
http://x1.c.lencr.org/0
|
unknown
|
||
http://x1.i.lencr.org/0
|
unknown
|
||
https://aka.ms/pshelpmechoose
|
unknown
|
||
https://aka.ms/feedback/report?space=61
|
unknown
|
||
https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
|
unknown
|
||
formy-spill.biz
|
|||
https://learn-video.azurefd.net/vod/player
|
unknown
|
||
https://twitter.com/intent/tweet?original_referer=$
|
unknown
|
||
https://github.com/gewarren
|
unknown
|
||
se-blurry.biz
|
|||
https://support.mozilla.org/products/firefoxgro.all
|
unknown
|
||
http://polymer.github.io/CONTRIBUTORS.txt
|
unknown
|
||
http://185.215.113.16/off/def.exed
|
unknown
|
||
https://github.com/dotnet/docs/blob/live/docs/framework/install/application-not-started.md
|
unknown
|
||
https://authoring-docs-microsoft.poolparty.biz/devrel/69c76c32-967e-4c65-b89a-74cc527db725
|
unknown
|
||
https://client-api.arkoselabs.com/v2/api.js
|
unknown
|
||
https://aka.ms/MSIgniteChallenge/Tier1Banner?wt.mc_id=ignite24_learnbanner_tier1_cnl
|
unknown
|
||
https://management.azure.com/providers/Microsoft.Portal/consoles/default?api-version=2017-12-01-prev
|
unknown
|
||
https://www.google.com/images/branding/product/ico/googleg_lodp.ico
|
unknown
|
||
https://github.com/Thraka
|
unknown
|
||
covery-mover.biz
|
|||
http://polymer.github.io/PATENTS.txt
|
unknown
|
||
https://aka.ms/certhelp
|
unknown
|
||
http://185.215.113.16/steam/random.exe
|
unknown
|
||
https://atten-supporse.biz/apif%aX
|
unknown
|
||
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
|
unknown
|
||
http://crl.rootca1.amazontrust.com/rootca1.crl0
|
unknown
|
||
https://atten-supporse.biz/api
|
104.21.16.1
|
||
https://github.com/mairaw
|
unknown
|
||
http://ocsp.rootca1.amazontrust.com0:
|
unknown
|
||
https://js.monitor.azure.com/scripts/c/ms.jsll-4.min.js
|
unknown
|
||
https://schema.org
|
unknown
|
||
http://polymer.github.io/LICENSE.txt
|
unknown
|
||
https://www.ecosia.org/newtab/
|
unknown
|
||
https://bridge.sfo1.ap01.net/ctp?version=16.0.0&key=1696425136400800000.1&ci=1696425136743.12791&cta
|
unknown
|
||
https://support.mozilla.org/kb/customize-firefox-controls-buttons-and-toolbars?utm_source=firefox-br
|
unknown
|
||
https://aka.ms/yourcaliforniaprivacychoices
|
unknown
|
||
https://ac.ecosia.org/autocomplete?q=
|
unknown
|
||
https://github.com/nschonni
|
unknown
|
||
https://videoencodingpublic-hgeaeyeba8gycee3.b01.azurefd.net/public-09ce73a6-05a5-4e4d-b3d7-bd5a8c05
|
unknown
|
||
https://contile-images.services.mozilla.com/u1AuJcj32cbVUf9NjMipLXEYwu2uFIt4lsj-ccwVqEs.36904.jpg
|
unknown
|
||
https://github.com/adegeo
|
unknown
|
||
http://crl.micro
|
unknown
|
||
https://contile-images.services.mozilla.com/obgoOYObjIFea_bXuT6L4LbBJ8j425AD87S1HMD3BWg.9991.jpg
|
unknown
|
||
http://185.215.113.16:80/off/def.exe
|
unknown
|
||
https://atten-supporse.biz/l
|
unknown
|
||
https://atten-supporse.biz:443/apiicrosoft
|
unknown
|
||
https://github.com/jonschlinkert/is-plain-object
|
unknown
|
||
http://crt.rootca1.amazontrust.com/rootca1.cer0?
|
unknown
|
||
https://octokit.github.io/rest.js/#throttling
|
unknown
|
||
https://www.bestbuy.com/site/electronics/top-deals/pcmcat1563299784494.c/?id=pcmcat1563299784494&ref
|
unknown
|
||
atten-supporse.biz
|
|||
https://github.com/js-cookie/js-cookie
|
unknown
|
||
https://www.amazon.com/?tag=admarketus-20&ref=pd_sl_35787f1071928bc3a1aef90b79c9bee9c64ba6683fde7477
|
unknown
|
||
https://atten-supporse.biz/apidnv
|
unknown
|
||
https://atten-supporse.biz/t
|
unknown
|
||
http://185.215.113.16/off/def.exe
|
unknown
|
||
http://schema.org/Organization
|
unknown
|
||
https://atten-supporse.biz/
|
unknown
|
||
https://atten-supporse.biz/r
|
unknown
|
||
print-vexer.biz
|
|||
https://channel9.msdn.com/
|
unknown
|
||
https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
|
unknown
|
||
https://atten-supporse.biz/apio%hX
|
unknown
|
||
https://github.com/dotnet/try
|
unknown
|
There are 78 hidden URLs, click here to show them.
Domains
Name
|
IP
|
Malicious
|
|
---|---|---|---|
atten-supporse.biz
|
104.21.16.1
|
||
www.google.com
|
142.250.181.100
|
||
s-part-0035.t-0009.t-msedge.net
|
13.107.246.63
|
||
js.monitor.azure.com
|
unknown
|
||
mdec.nelreports.net
|
unknown
|
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
192.168.2.5
|
unknown
|
unknown
|
||
104.21.16.1
|
atten-supporse.biz
|
United States
|
||
185.215.113.16
|
unknown
|
Portugal
|
||
142.250.181.100
|
www.google.com
|
United States
|
||
239.255.255.250
|
unknown
|
Reserved
|
Registry
Path
|
Value
|
Malicious
|
|
---|---|---|---|
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer
|
SlowContextMenuEntries
|
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
5819000
|
trusted library allocation
|
page read and write
|
||
584D000
|
trusted library allocation
|
page read and write
|
||
5808000
|
trusted library allocation
|
page read and write
|
||
11D6000
|
heap
|
page read and write
|
||
4E20000
|
direct allocation
|
page execute and read and write
|
||
2B9F000
|
stack
|
page read and write
|
||
61B0000
|
trusted library allocation
|
page read and write
|
||
620D000
|
trusted library allocation
|
page read and write
|
||
5A88000
|
trusted library allocation
|
page read and write
|
||
57B4000
|
trusted library allocation
|
page read and write
|
||
5805000
|
trusted library allocation
|
page read and write
|
||
3D3E000
|
stack
|
page read and write
|
||
57F9000
|
trusted library allocation
|
page read and write
|
||
57AC000
|
trusted library allocation
|
page read and write
|
||
5796000
|
trusted library allocation
|
page read and write
|
||
4E30000
|
direct allocation
|
page execute and read and write
|
||
E59000
|
unkown
|
page execute and read and write
|
||
36FE000
|
stack
|
page read and write
|
||
6168000
|
trusted library allocation
|
page read and write
|
||
5887000
|
trusted library allocation
|
page read and write
|
||
5800000
|
trusted library allocation
|
page read and write
|
||
1040000
|
unkown
|
page execute and read and write
|
||
11E3000
|
heap
|
page read and write
|
||
5803000
|
trusted library allocation
|
page read and write
|
||
117D000
|
heap
|
page read and write
|
||
1100000
|
heap
|
page read and write
|
||
5788000
|
trusted library allocation
|
page read and write
|
||
57C5000
|
trusted library allocation
|
page read and write
|
||
11D6000
|
heap
|
page read and write
|
||
6027000
|
trusted library allocation
|
page read and write
|
||
584D000
|
trusted library allocation
|
page read and write
|
||
6103000
|
trusted library allocation
|
page read and write
|
||
578D000
|
trusted library allocation
|
page read and write
|
||
2BB7000
|
heap
|
page read and write
|
||
6027000
|
trusted library allocation
|
page read and write
|
||
57D2000
|
trusted library allocation
|
page read and write
|
||
60C7000
|
trusted library allocation
|
page read and write
|
||
117D000
|
heap
|
page read and write
|
||
6166000
|
trusted library allocation
|
page read and write
|
||
6029000
|
trusted library allocation
|
page read and write
|
||
5888000
|
trusted library allocation
|
page read and write
|
||
584D000
|
trusted library allocation
|
page read and write
|
||
584D000
|
trusted library allocation
|
page read and write
|
||
584D000
|
trusted library allocation
|
page read and write
|
||
5792000
|
trusted library allocation
|
page read and write
|
||
579D000
|
trusted library allocation
|
page read and write
|
||
5990000
|
trusted library allocation
|
page read and write
|
||
8480000
|
trusted library allocation
|
page read and write
|
||
6028000
|
trusted library allocation
|
page read and write
|
||
58AA000
|
trusted library allocation
|
page read and write
|
||
11D7000
|
heap
|
page read and write
|
||
6177000
|
trusted library allocation
|
page read and write
|
||
5821000
|
trusted library allocation
|
page read and write
|
||
602A000
|
trusted library allocation
|
page read and write
|
||
57E5000
|
trusted library allocation
|
page read and write
|
||
57FC000
|
trusted library allocation
|
page read and write
|
||
57D3000
|
trusted library allocation
|
page read and write
|
||
602F000
|
trusted library allocation
|
page read and write
|
||
5808000
|
trusted library allocation
|
page read and write
|
||
6121000
|
trusted library allocation
|
page read and write
|
||
5880000
|
trusted library allocation
|
page read and write
|
||
11CB000
|
heap
|
page read and write
|
||
584D000
|
trusted library allocation
|
page read and write
|
||
5811000
|
trusted library allocation
|
page read and write
|
||
5816000
|
trusted library allocation
|
page read and write
|
||
8480000
|
direct allocation
|
page read and write
|
||
10D0000
|
direct allocation
|
page read and write
|
||
5AB9000
|
trusted library allocation
|
page read and write
|
||
5820000
|
trusted library allocation
|
page read and write
|
||
5821000
|
trusted library allocation
|
page read and write
|
||
57B5000
|
trusted library allocation
|
page read and write
|
||
10D0000
|
direct allocation
|
page read and write
|
||
57FF000
|
trusted library allocation
|
page read and write
|
||
5803000
|
trusted library allocation
|
page read and write
|
||
57D6000
|
trusted library allocation
|
page read and write
|
||
582C000
|
trusted library allocation
|
page read and write
|
||
6219000
|
trusted library allocation
|
page read and write
|
||
3E3F000
|
stack
|
page read and write
|
||
5784000
|
trusted library allocation
|
page read and write
|
||
582D000
|
trusted library allocation
|
page read and write
|
||
60C2000
|
trusted library allocation
|
page read and write
|
||
602E000
|
trusted library allocation
|
page read and write
|
||
602D000
|
trusted library allocation
|
page read and write
|
||
5917000
|
trusted library allocation
|
page read and write
|
||
11D3000
|
heap
|
page read and write
|
||
6022000
|
trusted library allocation
|
page read and write
|
||
4841000
|
heap
|
page read and write
|
||
E98000
|
unkown
|
page execute and read and write
|
||
4841000
|
heap
|
page read and write
|
||
584D000
|
trusted library allocation
|
page read and write
|
||
11DA000
|
heap
|
page read and write
|
||
1184000
|
heap
|
page read and write
|
||
4841000
|
heap
|
page read and write
|
||
11DA000
|
heap
|
page read and write
|
||
584D000
|
trusted library allocation
|
page read and write
|
||
6199000
|
trusted library allocation
|
page read and write
|
||
6157000
|
trusted library allocation
|
page read and write
|
||
584D000
|
trusted library allocation
|
page read and write
|
||
6028000
|
trusted library allocation
|
page read and write
|
||
4E20000
|
direct allocation
|
page execute and read and write
|
||
57C5000
|
trusted library allocation
|
page read and write
|
||
5808000
|
trusted library allocation
|
page read and write
|
||
597E000
|
trusted library allocation
|
page read and write
|
||
57D0000
|
trusted library allocation
|
page read and write
|
||
582C000
|
trusted library allocation
|
page read and write
|
||
1162000
|
heap
|
page read and write
|
||
6155000
|
trusted library allocation
|
page read and write
|
||
6025000
|
trusted library allocation
|
page read and write
|
||
5C22000
|
trusted library allocation
|
page read and write
|
||
5899000
|
trusted library allocation
|
page read and write
|
||
6031000
|
trusted library allocation
|
page read and write
|
||
5888000
|
trusted library allocation
|
page read and write
|
||
B90000
|
unkown
|
page readonly
|
||
8640000
|
direct allocation
|
page execute and read and write
|
||
57FC000
|
trusted library allocation
|
page read and write
|
||
6027000
|
trusted library allocation
|
page read and write
|
||
578B000
|
trusted library allocation
|
page read and write
|
||
11D7000
|
heap
|
page read and write
|
||
57FC000
|
trusted library allocation
|
page read and write
|
||
11D6000
|
heap
|
page read and write
|
||
E99000
|
unkown
|
page execute and write copy
|
||
581A000
|
trusted library allocation
|
page read and write
|
||
582E000
|
trusted library allocation
|
page read and write
|
||
5819000
|
trusted library allocation
|
page read and write
|
||
57C5000
|
trusted library allocation
|
page read and write
|
||
602A000
|
trusted library allocation
|
page read and write
|
||
2CFE000
|
stack
|
page read and write
|
||
9E0000
|
heap
|
page read and write
|
||
5805000
|
trusted library allocation
|
page read and write
|
||
4851000
|
heap
|
page read and write
|
||
6290000
|
trusted library allocation
|
page read and write
|
||
9D0000
|
heap
|
page read and write
|
||
6023000
|
trusted library allocation
|
page read and write
|
||
41FF000
|
stack
|
page read and write
|
||
BD2000
|
unkown
|
page execute and read and write
|
||
5630000
|
heap
|
page read and write
|
||
11D6000
|
heap
|
page read and write
|
||
580A000
|
trusted library allocation
|
page read and write
|
||
11CB000
|
heap
|
page read and write
|
||
60D1000
|
trusted library allocation
|
page read and write
|
||
6022000
|
trusted library allocation
|
page read and write
|
||
10D0000
|
direct allocation
|
page read and write
|
||
582C000
|
trusted library allocation
|
page read and write
|
||
578F000
|
trusted library allocation
|
page read and write
|
||
57F0000
|
trusted library allocation
|
page read and write
|
||
6022000
|
trusted library allocation
|
page read and write
|
||
579C000
|
trusted library allocation
|
page read and write
|
||
580E000
|
trusted library allocation
|
page read and write
|
||
5819000
|
trusted library allocation
|
page read and write
|
||
582C000
|
trusted library allocation
|
page read and write
|
||
6119000
|
trusted library allocation
|
page read and write
|
||
116A000
|
heap
|
page read and write
|
||
5821000
|
trusted library allocation
|
page read and write
|
||
60F4000
|
trusted library allocation
|
page read and write
|
||
6134000
|
trusted library allocation
|
page read and write
|
||
5805000
|
trusted library allocation
|
page read and write
|
||
57D5000
|
trusted library allocation
|
page read and write
|
||
584D000
|
trusted library allocation
|
page read and write
|
||
5799000
|
trusted library allocation
|
page read and write
|
||
5803000
|
trusted library allocation
|
page read and write
|
||
11DC000
|
heap
|
page read and write
|
||
11D6000
|
heap
|
page read and write
|
||
582D000
|
trusted library allocation
|
page read and write
|
||
57C5000
|
trusted library allocation
|
page read and write
|
||
57AA000
|
trusted library allocation
|
page read and write
|
||
1183000
|
heap
|
page read and write
|
||
383E000
|
stack
|
page read and write
|
||
5819000
|
trusted library allocation
|
page read and write
|
||
6022000
|
trusted library allocation
|
page read and write
|
||
58AF000
|
trusted library allocation
|
page read and write
|
||
4F5D000
|
stack
|
page read and write
|
||
108E000
|
stack
|
page read and write
|
||
57AD000
|
trusted library allocation
|
page read and write
|
||
5790000
|
trusted library allocation
|
page read and write
|
||
58A0000
|
trusted library allocation
|
page read and write
|
||
11DE000
|
heap
|
page read and write
|
||
5784000
|
trusted library allocation
|
page read and write
|
||
B4E000
|
stack
|
page read and write
|
||
60D0000
|
trusted library allocation
|
page read and write
|
||
5822000
|
trusted library allocation
|
page read and write
|
||
4D01000
|
direct allocation
|
page read and write
|
||
6029000
|
trusted library allocation
|
page read and write
|
||
58B9000
|
trusted library allocation
|
page read and write
|
||
2F3F000
|
stack
|
page read and write
|
||
620F000
|
trusted library allocation
|
page read and write
|
||
579D000
|
trusted library allocation
|
page read and write
|
||
6027000
|
trusted library allocation
|
page read and write
|
||
60E6000
|
trusted library allocation
|
page read and write
|
||
617D000
|
trusted library allocation
|
page read and write
|
||
578F000
|
trusted library allocation
|
page read and write
|
||
613C000
|
trusted library allocation
|
page read and write
|
||
5819000
|
trusted library allocation
|
page read and write
|
||
57CC000
|
trusted library allocation
|
page read and write
|
||
2DFF000
|
stack
|
page read and write
|
||
5B12000
|
trusted library allocation
|
page read and write
|
||
45BF000
|
stack
|
page read and write
|
||
6023000
|
trusted library allocation
|
page read and write
|
||
5809000
|
trusted library allocation
|
page read and write
|
||
5C20000
|
trusted library allocation
|
page read and write
|
||
1169000
|
heap
|
page read and write
|
||
6021000
|
trusted library allocation
|
page read and write
|
||
584D000
|
trusted library allocation
|
page read and write
|
||
602D000
|
trusted library allocation
|
page read and write
|
||
11CD000
|
heap
|
page read and write
|
||
397E000
|
stack
|
page read and write
|
||
5816000
|
trusted library allocation
|
page read and write
|
||
6175000
|
trusted library allocation
|
page read and write
|
||
5835000
|
trusted library allocation
|
page read and write
|
||
5BF1000
|
trusted library allocation
|
page read and write
|
||
580B000
|
trusted library allocation
|
page read and write
|
||
32FF000
|
stack
|
page read and write
|
||
58B9000
|
trusted library allocation
|
page read and write
|
||
4E50000
|
direct allocation
|
page execute and read and write
|
||
6021000
|
trusted library allocation
|
page read and write
|
||
584D000
|
trusted library allocation
|
page read and write
|
||
5784000
|
trusted library allocation
|
page read and write
|
||
584D000
|
trusted library allocation
|
page read and write
|
||
117E000
|
heap
|
page read and write
|
||
584D000
|
trusted library allocation
|
page read and write
|
||
57A9000
|
trusted library allocation
|
page read and write
|
||
11C7000
|
heap
|
page read and write
|
||
8480000
|
direct allocation
|
page read and write
|
||
4CBD000
|
stack
|
page read and write
|
||
60C8000
|
trusted library allocation
|
page read and write
|
||
598E000
|
trusted library allocation
|
page read and write
|
||
11DF000
|
heap
|
page read and write
|
||
60E4000
|
trusted library allocation
|
page read and write
|
||
1183000
|
heap
|
page read and write
|
||
5803000
|
trusted library allocation
|
page read and write
|
||
57B6000
|
trusted library allocation
|
page read and write
|
||
60F2000
|
trusted library allocation
|
page read and write
|
||
602B000
|
trusted library allocation
|
page read and write
|
||
57B8000
|
trusted library allocation
|
page read and write
|
||
6024000
|
trusted library allocation
|
page read and write
|
||
57B6000
|
trusted library allocation
|
page read and write
|
||
5819000
|
trusted library allocation
|
page read and write
|
||
602D000
|
trusted library allocation
|
page read and write
|
||
11D6000
|
heap
|
page read and write
|
||
60CE000
|
trusted library allocation
|
page read and write
|
||
57AA000
|
trusted library allocation
|
page read and write
|
||
611F000
|
trusted library allocation
|
page read and write
|
||
578A000
|
trusted library allocation
|
page read and write
|
||
6122000
|
trusted library allocation
|
page read and write
|
||
6029000
|
trusted library allocation
|
page read and write
|
||
8480000
|
direct allocation
|
page read and write
|
||
578D000
|
trusted library allocation
|
page read and write
|
||
6027000
|
trusted library allocation
|
page read and write
|
||
578F000
|
trusted library allocation
|
page read and write
|
||
11E2000
|
heap
|
page read and write
|
||
4F9D000
|
stack
|
page read and write
|
||
602C000
|
trusted library allocation
|
page read and write
|
||
60CA000
|
trusted library allocation
|
page read and write
|
||
6024000
|
trusted library allocation
|
page read and write
|
||
60DF000
|
trusted library allocation
|
page read and write
|
||
4841000
|
heap
|
page read and write
|
||
584D000
|
trusted library allocation
|
page read and write
|
||
5899000
|
trusted library allocation
|
page read and write
|
||
5811000
|
trusted library allocation
|
page read and write
|
||
584D000
|
trusted library allocation
|
page read and write
|
||
4841000
|
heap
|
page read and write
|
||
50DE000
|
stack
|
page read and write
|
||
11D3000
|
heap
|
page read and write
|
||
5798000
|
trusted library allocation
|
page read and write
|
||
4841000
|
heap
|
page read and write
|
||
6111000
|
trusted library allocation
|
page read and write
|
||
5888000
|
trusted library allocation
|
page read and write
|
||
6020000
|
trusted library allocation
|
page read and write
|
||
5784000
|
trusted library allocation
|
page read and write
|
||
333E000
|
stack
|
page read and write
|
||
11D7000
|
heap
|
page read and write
|
||
60CF000
|
trusted library allocation
|
page read and write
|
||
6117000
|
trusted library allocation
|
page read and write
|
||
6029000
|
trusted library allocation
|
page read and write
|
||
62A8000
|
trusted library allocation
|
page read and write
|
||
624B000
|
trusted library allocation
|
page read and write
|
||
57C0000
|
trusted library allocation
|
page read and write
|
||
11DA000
|
heap
|
page read and write
|
||
584D000
|
trusted library allocation
|
page read and write
|
||
580D000
|
trusted library allocation
|
page read and write
|
||
581B000
|
trusted library allocation
|
page read and write
|
||
57FF000
|
trusted library allocation
|
page read and write
|
||
602B000
|
trusted library allocation
|
page read and write
|
||
5821000
|
trusted library allocation
|
page read and write
|
||
6023000
|
trusted library allocation
|
page read and write
|
||
5808000
|
trusted library allocation
|
page read and write
|
||
58A2000
|
trusted library allocation
|
page read and write
|
||
BE3000
|
unkown
|
page write copy
|
||
6024000
|
trusted library allocation
|
page read and write
|
||
6160000
|
trusted library allocation
|
page read and write
|
||
5800000
|
trusted library allocation
|
page read and write
|
||
60CE000
|
trusted library allocation
|
page read and write
|
||
1182000
|
heap
|
page read and write
|
||
4841000
|
heap
|
page read and write
|
||
5809000
|
trusted library allocation
|
page read and write
|
||
1179000
|
heap
|
page read and write
|
||
578A000
|
trusted library allocation
|
page read and write
|
||
584D000
|
trusted library allocation
|
page read and write
|
||
58A2000
|
trusted library allocation
|
page read and write
|
||
5821000
|
trusted library allocation
|
page read and write
|
||
11DA000
|
heap
|
page read and write
|
||
8480000
|
direct allocation
|
page read and write
|
||
5821000
|
trusted library allocation
|
page read and write
|
||
61EF000
|
trusted library allocation
|
page read and write
|
||
584E000
|
trusted library allocation
|
page read and write
|
||
57F0000
|
trusted library allocation
|
page read and write
|
||
3FBE000
|
stack
|
page read and write
|
||
584D000
|
trusted library allocation
|
page read and write
|
||
57C5000
|
trusted library allocation
|
page read and write
|
||
117C000
|
heap
|
page read and write
|
||
584D000
|
trusted library allocation
|
page read and write
|
||
11D6000
|
heap
|
page read and write
|
||
584D000
|
trusted library allocation
|
page read and write
|
||
611D000
|
trusted library allocation
|
page read and write
|
||
5819000
|
trusted library allocation
|
page read and write
|
||
61BF000
|
trusted library allocation
|
page read and write
|
||
602A000
|
trusted library allocation
|
page read and write
|
||
11D6000
|
heap
|
page read and write
|
||
35BE000
|
stack
|
page read and write
|
||
6028000
|
trusted library allocation
|
page read and write
|
||
57F0000
|
trusted library allocation
|
page read and write
|
||
6197000
|
trusted library allocation
|
page read and write
|
||
5791000
|
trusted library allocation
|
page read and write
|
||
8670000
|
direct allocation
|
page execute and read and write
|
||
623D000
|
trusted library allocation
|
page read and write
|
||
623F000
|
trusted library allocation
|
page read and write
|
||
117E000
|
heap
|
page read and write
|
||
61BD000
|
trusted library allocation
|
page read and write
|
||
117D000
|
heap
|
page read and write
|
||
11CD000
|
heap
|
page read and write
|
||
614D000
|
trusted library allocation
|
page read and write
|
||
5821000
|
trusted library allocation
|
page read and write
|
||
5821000
|
trusted library allocation
|
page read and write
|
||
117D000
|
heap
|
page read and write
|
||
5834000
|
trusted library allocation
|
page read and write
|
||
6160000
|
trusted library allocation
|
page read and write
|
||
586A000
|
trusted library allocation
|
page read and write
|
||
618B000
|
trusted library allocation
|
page read and write
|
||
535E000
|
stack
|
page read and write
|
||
11D6000
|
heap
|
page read and write
|
||
84A0000
|
direct allocation
|
page read and write
|
||
580E000
|
trusted library allocation
|
page read and write
|
||
6130000
|
trusted library allocation
|
page read and write
|
||
6189000
|
trusted library allocation
|
page read and write
|
||
584D000
|
trusted library allocation
|
page read and write
|
||
6031000
|
trusted library allocation
|
page read and write
|
||
5A82000
|
trusted library allocation
|
page read and write
|
||
584D000
|
trusted library allocation
|
page read and write
|
||
11EA000
|
heap
|
page read and write
|
||
D74000
|
unkown
|
page execute and read and write
|
||
580E000
|
trusted library allocation
|
page read and write
|
||
57BA000
|
trusted library allocation
|
page read and write
|
||
8480000
|
direct allocation
|
page read and write
|
||
10D0000
|
direct allocation
|
page read and write
|
||
6164000
|
trusted library allocation
|
page read and write
|
||
117E000
|
heap
|
page read and write
|
||
6130000
|
trusted library allocation
|
page read and write
|
||
347E000
|
stack
|
page read and write
|
||
60C5000
|
trusted library allocation
|
page read and write
|
||
60D8000
|
trusted library allocation
|
page read and write
|
||
57E6000
|
trusted library allocation
|
page read and write
|
||
8480000
|
direct allocation
|
page read and write
|
||
3F7E000
|
stack
|
page read and write
|
||
5821000
|
trusted library allocation
|
page read and write
|
||
602C000
|
trusted library allocation
|
page read and write
|
||
6113000
|
trusted library allocation
|
page read and write
|
||
4E00000
|
remote allocation
|
page read and write
|
||
10D0000
|
direct allocation
|
page read and write
|
||
5A8A000
|
trusted library allocation
|
page read and write
|
||
581B000
|
trusted library allocation
|
page read and write
|
||
57D0000
|
trusted library allocation
|
page read and write
|
||
6117000
|
trusted library allocation
|
page read and write
|
||
6105000
|
trusted library allocation
|
page read and write
|
||
580A000
|
trusted library allocation
|
page read and write
|
||
10F0000
|
direct allocation
|
page read and write
|
||
602A000
|
trusted library allocation
|
page read and write
|
||
602C000
|
trusted library allocation
|
page read and write
|
||
5808000
|
trusted library allocation
|
page read and write
|
||
5821000
|
trusted library allocation
|
page read and write
|
||
580D000
|
trusted library allocation
|
page read and write
|
||
57B6000
|
trusted library allocation
|
page read and write
|
||
1180000
|
heap
|
page read and write
|
||
584D000
|
trusted library allocation
|
page read and write
|
||
58B9000
|
trusted library allocation
|
page read and write
|
||
5816000
|
trusted library allocation
|
page read and write
|
||
11EA000
|
heap
|
page read and write
|
||
6029000
|
trusted library allocation
|
page read and write
|
||
4E20000
|
direct allocation
|
page execute and read and write
|
||
5825000
|
trusted library allocation
|
page read and write
|
||
5816000
|
trusted library allocation
|
page read and write
|
||
584D000
|
trusted library allocation
|
page read and write
|
||
5805000
|
trusted library allocation
|
page read and write
|
||
8FB000
|
stack
|
page read and write
|
||
57FC000
|
trusted library allocation
|
page read and write
|
||
60D1000
|
trusted library allocation
|
page read and write
|
||
6025000
|
trusted library allocation
|
page read and write
|
||
57BD000
|
trusted library allocation
|
page read and write
|
||
3A7F000
|
stack
|
page read and write
|
||
E89000
|
unkown
|
page execute and read and write
|
||
60F2000
|
trusted library allocation
|
page read and write
|
||
591D000
|
trusted library allocation
|
page read and write
|
||
578A000
|
trusted library allocation
|
page read and write
|
||
5803000
|
trusted library allocation
|
page read and write
|
||
60FF000
|
trusted library allocation
|
page read and write
|
||
6027000
|
trusted library allocation
|
page read and write
|
||
58B7000
|
trusted library allocation
|
page read and write
|
||
602B000
|
trusted library allocation
|
page read and write
|
||
580B000
|
trusted library allocation
|
page read and write
|
||
6029000
|
trusted library allocation
|
page read and write
|
||
60C0000
|
trusted library allocation
|
page read and write
|
||
11DB000
|
heap
|
page read and write
|
||
57AA000
|
trusted library allocation
|
page read and write
|
||
114E000
|
heap
|
page read and write
|
||
117D000
|
heap
|
page read and write
|
||
5805000
|
trusted library allocation
|
page read and write
|
||
4E00000
|
remote allocation
|
page read and write
|
||
11DA000
|
heap
|
page read and write
|
||
602A000
|
trusted library allocation
|
page read and write
|
||
4841000
|
heap
|
page read and write
|
||
580E000
|
trusted library allocation
|
page read and write
|
||
580E000
|
trusted library allocation
|
page read and write
|
||
6109000
|
trusted library allocation
|
page read and write
|
||
5881000
|
trusted library allocation
|
page read and write
|
||
5AD9000
|
trusted library allocation
|
page read and write
|
||
11CE000
|
heap
|
page read and write
|
||
54CE000
|
stack
|
page read and write
|
||
61F1000
|
trusted library allocation
|
page read and write
|
||
4E40000
|
direct allocation
|
page execute and read and write
|
||
11CB000
|
heap
|
page read and write
|
||
5785000
|
trusted library allocation
|
page read and write
|
||
584D000
|
trusted library allocation
|
page read and write
|
||
A05000
|
heap
|
page read and write
|
||
6026000
|
trusted library allocation
|
page read and write
|
||
E81000
|
unkown
|
page execute and read and write
|
||
612E000
|
trusted library allocation
|
page read and write
|
||
5809000
|
trusted library allocation
|
page read and write
|
||
6028000
|
trusted library allocation
|
page read and write
|
||
584D000
|
trusted library allocation
|
page read and write
|
||
6162000
|
trusted library allocation
|
page read and write
|
||
2CBF000
|
stack
|
page read and write
|
||
613A000
|
trusted library allocation
|
page read and write
|
||
37FF000
|
stack
|
page read and write
|
||
10D0000
|
direct allocation
|
page read and write
|
||
5791000
|
trusted library allocation
|
page read and write
|
||
10D0000
|
direct allocation
|
page read and write
|
||
628E000
|
trusted library allocation
|
page read and write
|
||
5822000
|
trusted library allocation
|
page read and write
|
||
578C000
|
trusted library allocation
|
page read and write
|
||
5805000
|
trusted library allocation
|
page read and write
|
||
6022000
|
trusted library allocation
|
page read and write
|
||
6023000
|
trusted library allocation
|
page read and write
|
||
584D000
|
trusted library allocation
|
page read and write
|
||
6179000
|
trusted library allocation
|
page read and write
|
||
588D000
|
trusted library allocation
|
page read and write
|
||
6026000
|
trusted library allocation
|
page read and write
|
||
6027000
|
trusted library allocation
|
page read and write
|
||
584D000
|
trusted library allocation
|
page read and write
|
||
5AFE000
|
stack
|
page read and write
|
||
6029000
|
trusted library allocation
|
page read and write
|
||
1041000
|
unkown
|
page execute and write copy
|
||
4E00000
|
direct allocation
|
page execute and read and write
|
||
617B000
|
trusted library allocation
|
page read and write
|
||
E98000
|
unkown
|
page execute and write copy
|
||
602F000
|
trusted library allocation
|
page read and write
|
||
614C000
|
trusted library allocation
|
page read and write
|
||
5808000
|
trusted library allocation
|
page read and write
|
||
5A83000
|
trusted library allocation
|
page read and write
|
||
57A8000
|
trusted library allocation
|
page read and write
|
||
4E20000
|
direct allocation
|
page execute and read and write
|
||
11D6000
|
heap
|
page read and write
|
||
582C000
|
trusted library allocation
|
page read and write
|
||
584D000
|
trusted library allocation
|
page read and write
|
||
6024000
|
trusted library allocation
|
page read and write
|
||
60D3000
|
trusted library allocation
|
page read and write
|
||
60F0000
|
trusted library allocation
|
page read and write
|
||
8480000
|
direct allocation
|
page read and write
|
||
1138000
|
heap
|
page read and write
|
||
44BE000
|
stack
|
page read and write
|
||
578B000
|
trusted library allocation
|
page read and write
|
||
509D000
|
stack
|
page read and write
|
||
1180000
|
heap
|
page read and write
|
||
614E000
|
trusted library allocation
|
page read and write
|
||
BE3000
|
unkown
|
page write copy
|
||
582C000
|
trusted library allocation
|
page read and write
|
||
57B4000
|
trusted library allocation
|
page read and write
|
||
57DB000
|
trusted library allocation
|
page read and write
|
||
473E000
|
stack
|
page read and write
|
||
5A0A000
|
trusted library allocation
|
page read and write
|
||
11DC000
|
heap
|
page read and write
|
||
58B1000
|
trusted library allocation
|
page read and write
|
||
6026000
|
trusted library allocation
|
page read and write
|
||
5AA1000
|
trusted library allocation
|
page read and write
|
||
11D6000
|
heap
|
page read and write
|
||
1169000
|
heap
|
page read and write
|
||
582D000
|
trusted library allocation
|
page read and write
|
||
10D0000
|
direct allocation
|
page read and write
|
||
5808000
|
trusted library allocation
|
page read and write
|
||
5808000
|
trusted library allocation
|
page read and write
|
||
57CA000
|
trusted library allocation
|
page read and write
|
||
5808000
|
trusted library allocation
|
page read and write
|
||
30BE000
|
stack
|
page read and write
|
||
2BB0000
|
heap
|
page read and write
|
||
58B9000
|
trusted library allocation
|
page read and write
|
||
584D000
|
trusted library allocation
|
page read and write
|
||
5785000
|
trusted library allocation
|
page read and write
|
||
4841000
|
heap
|
page read and write
|
||
582C000
|
trusted library allocation
|
page read and write
|
||
5F8D000
|
trusted library allocation
|
page read and write
|
||
5803000
|
trusted library allocation
|
page read and write
|
||
6026000
|
trusted library allocation
|
page read and write
|
||
6025000
|
trusted library allocation
|
page read and write
|
||
6025000
|
trusted library allocation
|
page read and write
|
||
10D0000
|
direct allocation
|
page read and write
|
||
B8E000
|
stack
|
page read and write
|
||
57A3000
|
trusted library allocation
|
page read and write
|
||
57CE000
|
trusted library allocation
|
page read and write
|
||
393F000
|
stack
|
page read and write
|
||
84A0000
|
direct allocation
|
page read and write
|
||
588A000
|
trusted library allocation
|
page read and write
|
||
46FF000
|
stack
|
page read and write
|
||
584D000
|
trusted library allocation
|
page read and write
|
||
5C25000
|
trusted library allocation
|
page read and write
|
||
6021000
|
trusted library allocation
|
page read and write
|
||
582C000
|
trusted library allocation
|
page read and write
|
||
597E000
|
trusted library allocation
|
page read and write
|
||
11CD000
|
heap
|
page read and write
|
||
3BBF000
|
stack
|
page read and write
|
||
5881000
|
trusted library allocation
|
page read and write
|
||
8480000
|
direct allocation
|
page read and write
|
||
613B000
|
trusted library allocation
|
page read and write
|
||
584D000
|
trusted library allocation
|
page read and write
|
||
2E3E000
|
stack
|
page read and write
|
||
5881000
|
trusted library allocation
|
page read and write
|
||
10CC000
|
stack
|
page read and write
|
||
110A000
|
heap
|
page read and write
|
||
59ED000
|
trusted library allocation
|
page read and write
|
||
11D7000
|
heap
|
page read and write
|
||
614F000
|
trusted library allocation
|
page read and write
|
||
580A000
|
trusted library allocation
|
page read and write
|
||
5798000
|
trusted library allocation
|
page read and write
|
||
5821000
|
trusted library allocation
|
page read and write
|
||
5AB9000
|
stack
|
page read and write
|
||
5786000
|
trusted library allocation
|
page read and write
|
||
4841000
|
heap
|
page read and write
|
||
577E000
|
stack
|
page read and write
|
||
117D000
|
heap
|
page read and write
|
||
580B000
|
trusted library allocation
|
page read and write
|
||
110E000
|
heap
|
page read and write
|
||
5B61000
|
trusted library allocation
|
page read and write
|
||
6108000
|
trusted library allocation
|
page read and write
|
||
40BF000
|
stack
|
page read and write
|
||
307F000
|
stack
|
page read and write
|
||
597C000
|
trusted library allocation
|
page read and write
|
||
602A000
|
trusted library allocation
|
page read and write
|
||
4E20000
|
direct allocation
|
page execute and read and write
|
||
602C000
|
trusted library allocation
|
page read and write
|
||
6132000
|
trusted library allocation
|
page read and write
|
||
51DF000
|
stack
|
page read and write
|
||
8480000
|
direct allocation
|
page read and write
|
||
57F9000
|
trusted library allocation
|
page read and write
|
||
580B000
|
trusted library allocation
|
page read and write
|
||
6124000
|
trusted library allocation
|
page read and write
|
||
5831000
|
trusted library allocation
|
page read and write
|
||
11D3000
|
heap
|
page read and write
|
||
5808000
|
trusted library allocation
|
page read and write
|
||
6279000
|
trusted library allocation
|
page read and write
|
||
6136000
|
trusted library allocation
|
page read and write
|
||
602A000
|
trusted library allocation
|
page read and write
|
||
433F000
|
stack
|
page read and write
|
||
45FE000
|
stack
|
page read and write
|
||
57AA000
|
trusted library allocation
|
page read and write
|
||
117D000
|
heap
|
page read and write
|
||
5784000
|
trusted library allocation
|
page read and write
|
||
584D000
|
trusted library allocation
|
page read and write
|
||
6102000
|
trusted library allocation
|
page read and write
|
||
A00000
|
heap
|
page read and write
|
||
5821000
|
trusted library allocation
|
page read and write
|
||
10D0000
|
direct allocation
|
page read and write
|
||
6139000
|
trusted library allocation
|
page read and write
|
||
3BFE000
|
stack
|
page read and write
|
||
57FC000
|
trusted library allocation
|
page read and write
|
||
1180000
|
heap
|
page read and write
|
||
580C000
|
trusted library allocation
|
page read and write
|
||
5A88000
|
trusted library allocation
|
page read and write
|
||
6021000
|
trusted library allocation
|
page read and write
|
||
2BA0000
|
direct allocation
|
page execute and read and write
|
||
5803000
|
trusted library allocation
|
page read and write
|
||
6025000
|
trusted library allocation
|
page read and write
|
||
55CF000
|
stack
|
page read and write
|
||
57A2000
|
trusted library allocation
|
page read and write
|
||
57F4000
|
trusted library allocation
|
page read and write
|
||
6162000
|
trusted library allocation
|
page read and write
|
||
6029000
|
trusted library allocation
|
page read and write
|
||
57A7000
|
trusted library allocation
|
page read and write
|
||
5A8D000
|
trusted library allocation
|
page read and write
|
||
11CB000
|
heap
|
page read and write
|
||
10F0000
|
direct allocation
|
page read and write
|
||
5803000
|
trusted library allocation
|
page read and write
|
||
5780000
|
trusted library allocation
|
page read and write
|
||
617F000
|
trusted library allocation
|
page read and write
|
||
11CD000
|
heap
|
page read and write
|
||
11BF000
|
heap
|
page read and write
|
||
5B51000
|
trusted library allocation
|
page read and write
|
||
584D000
|
trusted library allocation
|
page read and write
|
||
602B000
|
trusted library allocation
|
page read and write
|
||
57FC000
|
trusted library allocation
|
page read and write
|
||
580B000
|
trusted library allocation
|
page read and write
|
||
5845000
|
trusted library allocation
|
page read and write
|
||
582D000
|
trusted library allocation
|
page read and write
|
||
6157000
|
trusted library allocation
|
page read and write
|
||
BE5000
|
unkown
|
page execute and read and write
|
||
57FC000
|
trusted library allocation
|
page read and write
|
||
57C4000
|
trusted library allocation
|
page read and write
|
||
5899000
|
trusted library allocation
|
page read and write
|
||
11D6000
|
heap
|
page read and write
|
||
357F000
|
stack
|
page read and write
|
||
11DA000
|
heap
|
page read and write
|
||
583D000
|
trusted library allocation
|
page read and write
|
||
5798000
|
trusted library allocation
|
page read and write
|
||
11D6000
|
heap
|
page read and write
|
||
3E7E000
|
stack
|
page read and write
|
||
5899000
|
trusted library allocation
|
page read and write
|
||
57AD000
|
trusted library allocation
|
page read and write
|
||
580E000
|
trusted library allocation
|
page read and write
|
||
57B6000
|
trusted library allocation
|
page read and write
|
||
4C80000
|
trusted library allocation
|
page read and write
|
||
4E20000
|
direct allocation
|
page execute and read and write
|
||
5887000
|
trusted library allocation
|
page read and write
|
||
580B000
|
trusted library allocation
|
page read and write
|
||
521E000
|
stack
|
page read and write
|
||
1175000
|
heap
|
page read and write
|
||
6104000
|
trusted library allocation
|
page read and write
|
||
6132000
|
trusted library allocation
|
page read and write
|
||
581B000
|
trusted library allocation
|
page read and write
|
||
11D6000
|
heap
|
page read and write
|
||
10D0000
|
direct allocation
|
page read and write
|
||
36BF000
|
stack
|
page read and write
|
||
4850000
|
heap
|
page read and write
|
||
4CFB000
|
stack
|
page read and write
|
||
4E69000
|
trusted library allocation
|
page read and write
|
||
6026000
|
trusted library allocation
|
page read and write
|
||
5990000
|
trusted library allocation
|
page read and write
|
||
4841000
|
heap
|
page read and write
|
||
57D9000
|
trusted library allocation
|
page read and write
|
||
6249000
|
trusted library allocation
|
page read and write
|
||
602F000
|
trusted library allocation
|
page read and write
|
||
578C000
|
trusted library allocation
|
page read and write
|
||
5816000
|
trusted library allocation
|
page read and write
|
||
11D6000
|
heap
|
page read and write
|
||
581B000
|
trusted library allocation
|
page read and write
|
||
582D000
|
trusted library allocation
|
page read and write
|
||
580B000
|
trusted library allocation
|
page read and write
|
||
6028000
|
trusted library allocation
|
page read and write
|
||
11DF000
|
heap
|
page read and write
|
||
602E000
|
trusted library allocation
|
page read and write
|
||
57F7000
|
trusted library allocation
|
page read and write
|
||
567E000
|
stack
|
page read and write
|
||
580E000
|
trusted library allocation
|
page read and write
|
||
602A000
|
trusted library allocation
|
page read and write
|
||
60D6000
|
trusted library allocation
|
page read and write
|
||
11CB000
|
heap
|
page read and write
|
||
40FE000
|
stack
|
page read and write
|
||
6119000
|
trusted library allocation
|
page read and write
|
||
4841000
|
heap
|
page read and write
|
||
5803000
|
trusted library allocation
|
page read and write
|
||
5633000
|
heap
|
page read and write
|
||
57C2000
|
trusted library allocation
|
page read and write
|
||
6028000
|
trusted library allocation
|
page read and write
|
||
5A0000
|
heap
|
page read and write
|
||
11CD000
|
heap
|
page read and write
|
||
11D6000
|
heap
|
page read and write
|
||
57BB000
|
trusted library allocation
|
page read and write
|
||
4840000
|
heap
|
page read and write
|
||
B91000
|
unkown
|
page execute and write copy
|
||
584D000
|
trusted library allocation
|
page read and write
|
||
11BF000
|
heap
|
page read and write
|
||
5784000
|
trusted library allocation
|
page read and write
|
||
627B000
|
trusted library allocation
|
page read and write
|
||
58A7000
|
trusted library allocation
|
page read and write
|
||
57B6000
|
trusted library allocation
|
page read and write
|
||
11D6000
|
heap
|
page read and write
|
||
10D0000
|
direct allocation
|
page read and write
|
||
5811000
|
trusted library allocation
|
page read and write
|
||
582C000
|
trusted library allocation
|
page read and write
|
||
581A000
|
trusted library allocation
|
page read and write
|
||
57FC000
|
trusted library allocation
|
page read and write
|
||
1180000
|
heap
|
page read and write
|
||
11DF000
|
heap
|
page read and write
|
||
8480000
|
direct allocation
|
page read and write
|
||
57BA000
|
trusted library allocation
|
page read and write
|
||
6492000
|
trusted library allocation
|
page read and write
|
||
57A8000
|
trusted library allocation
|
page read and write
|
||
6162000
|
trusted library allocation
|
page read and write
|
||
11DF000
|
heap
|
page read and write
|
||
57B2000
|
trusted library allocation
|
page read and write
|
||
5791000
|
trusted library allocation
|
page read and write
|
||
11BF000
|
heap
|
page read and write
|
||
6159000
|
trusted library allocation
|
page read and write
|
||
8480000
|
direct allocation
|
page read and write
|
||
1160000
|
heap
|
page read and write
|
||
592B000
|
trusted library allocation
|
page read and write
|
||
B91000
|
unkown
|
page execute and read and write
|
||
621B000
|
trusted library allocation
|
page read and write
|
||
4841000
|
heap
|
page read and write
|
||
5A85000
|
trusted library allocation
|
page read and write
|
||
57C5000
|
trusted library allocation
|
page read and write
|
||
84A0000
|
direct allocation
|
page read and write
|
||
584D000
|
trusted library allocation
|
page read and write
|
||
4841000
|
heap
|
page read and write
|
||
1178000
|
heap
|
page read and write
|
||
57DB000
|
trusted library allocation
|
page read and write
|
||
58A2000
|
trusted library allocation
|
page read and write
|
||
31FE000
|
stack
|
page read and write
|
||
4E10000
|
direct allocation
|
page execute and read and write
|
||
6024000
|
trusted library allocation
|
page read and write
|
||
483F000
|
stack
|
page read and write
|
||
57FC000
|
trusted library allocation
|
page read and write
|
||
589F000
|
trusted library allocation
|
page read and write
|
||
60E8000
|
trusted library allocation
|
page read and write
|
||
8480000
|
direct allocation
|
page read and write
|
||
6106000
|
trusted library allocation
|
page read and write
|
||
437E000
|
stack
|
page read and write
|
||
6024000
|
trusted library allocation
|
page read and write
|
||
11D6000
|
heap
|
page read and write
|
||
423E000
|
stack
|
page read and write
|
||
586A000
|
trusted library allocation
|
page read and write
|
||
1183000
|
heap
|
page read and write
|
||
60DD000
|
trusted library allocation
|
page read and write
|
||
4CC0000
|
direct allocation
|
page read and write
|
||
57BA000
|
trusted library allocation
|
page read and write
|
||
A4D000
|
stack
|
page read and write
|
||
5B29000
|
trusted library allocation
|
page read and write
|
||
602C000
|
trusted library allocation
|
page read and write
|
||
58AF000
|
trusted library allocation
|
page read and write
|
||
57BB000
|
trusted library allocation
|
page read and write
|
||
6023000
|
trusted library allocation
|
page read and write
|
||
1169000
|
heap
|
page read and write
|
||
57FC000
|
trusted library allocation
|
page read and write
|
||
582C000
|
trusted library allocation
|
page read and write
|
||
580E000
|
trusted library allocation
|
page read and write
|
||
61CD000
|
trusted library allocation
|
page read and write
|
||
57D9000
|
trusted library allocation
|
page read and write
|
||
60E2000
|
trusted library allocation
|
page read and write
|
||
545F000
|
stack
|
page read and write
|
||
5811000
|
trusted library allocation
|
page read and write
|
||
583E000
|
trusted library allocation
|
page read and write
|
||
6028000
|
trusted library allocation
|
page read and write
|
||
5808000
|
trusted library allocation
|
page read and write
|
||
612C000
|
trusted library allocation
|
page read and write
|
||
5803000
|
trusted library allocation
|
page read and write
|
||
31BF000
|
stack
|
page read and write
|
||
61CB000
|
trusted library allocation
|
page read and write
|
||
12FE000
|
stack
|
page read and write
|
||
6101000
|
trusted library allocation
|
page read and write
|
||
5800000
|
trusted library allocation
|
page read and write
|
||
57D9000
|
trusted library allocation
|
page read and write
|
||
3CFF000
|
stack
|
page read and write
|
||
4841000
|
heap
|
page read and write
|
||
B90000
|
unkown
|
page read and write
|
||
5888000
|
trusted library allocation
|
page read and write
|
||
578C000
|
trusted library allocation
|
page read and write
|
||
5792000
|
trusted library allocation
|
page read and write
|
||
447F000
|
stack
|
page read and write
|
||
1169000
|
heap
|
page read and write
|
||
5B0000
|
heap
|
page read and write
|
||
4841000
|
heap
|
page read and write
|
||
10D0000
|
direct allocation
|
page read and write
|
||
584D000
|
trusted library allocation
|
page read and write
|
||
4841000
|
heap
|
page read and write
|
||
60CC000
|
trusted library allocation
|
page read and write
|
||
11E3000
|
heap
|
page read and write
|
||
8480000
|
direct allocation
|
page read and write
|
||
6023000
|
trusted library allocation
|
page read and write
|
||
602B000
|
trusted library allocation
|
page read and write
|
||
4841000
|
heap
|
page read and write
|
||
5816000
|
trusted library allocation
|
page read and write
|
||
5806000
|
trusted library allocation
|
page read and write
|
||
57B6000
|
trusted library allocation
|
page read and write
|
||
5821000
|
trusted library allocation
|
page read and write
|
||
580A000
|
trusted library allocation
|
page read and write
|
||
6107000
|
trusted library allocation
|
page read and write
|
||
57AE000
|
trusted library allocation
|
page read and write
|
||
3ABE000
|
stack
|
page read and write
|
||
53B000
|
stack
|
page read and write
|
||
580C000
|
trusted library allocation
|
page read and write
|
||
11E2000
|
heap
|
page read and write
|
||
11DC000
|
heap
|
page read and write
|
||
5808000
|
trusted library allocation
|
page read and write
|
||
5808000
|
trusted library allocation
|
page read and write
|
||
4841000
|
heap
|
page read and write
|
||
583D000
|
trusted library allocation
|
page read and write
|
||
4E00000
|
remote allocation
|
page read and write
|
||
4841000
|
heap
|
page read and write
|
||
6027000
|
trusted library allocation
|
page read and write
|
||
6166000
|
trusted library allocation
|
page read and write
|
||
5834000
|
trusted library allocation
|
page read and write
|
||
581B000
|
trusted library allocation
|
page read and write
|
||
4841000
|
heap
|
page read and write
|
||
531F000
|
stack
|
page read and write
|
||
11DE000
|
heap
|
page read and write
|
||
578D000
|
trusted library allocation
|
page read and write
|
||
62AA000
|
trusted library allocation
|
page read and write
|
||
343F000
|
stack
|
page read and write
|
||
581E000
|
trusted library allocation
|
page read and write
|
||
584D000
|
trusted library allocation
|
page read and write
|
||
602D000
|
trusted library allocation
|
page read and write
|
||
4DFF000
|
stack
|
page read and write
|
||
59B4000
|
trusted library allocation
|
page read and write
|
||
61AE000
|
trusted library allocation
|
page read and write
|
||
6024000
|
trusted library allocation
|
page read and write
|
||
5B59000
|
trusted library allocation
|
page read and write
|
||
584D000
|
trusted library allocation
|
page read and write
|
||
602B000
|
trusted library allocation
|
page read and write
|
||
11BC000
|
heap
|
page read and write
|
||
2F7E000
|
stack
|
page read and write
|
||
611B000
|
trusted library allocation
|
page read and write
|
||
11CD000
|
heap
|
page read and write
|
||
8480000
|
direct allocation
|
page read and write
|
||
10D0000
|
direct allocation
|
page read and write
|
||
6031000
|
trusted library allocation
|
page read and write
|
||
6164000
|
trusted library allocation
|
page read and write
|
||
5803000
|
trusted library allocation
|
page read and write
|
||
602F000
|
trusted library allocation
|
page read and write
|
||
580E000
|
trusted library allocation
|
page read and write
|
||
5806000
|
trusted library allocation
|
page read and write
|
There are 814 hidden memdumps, click here to show them.
DOM / HTML
URL
|
Malicious
|
|
---|---|---|
https://learn.microsoft.com/en-us/dotnet/framework/install/application-not-started?version=(null)&processName=file.exe&platform=0009&osver=6&isServer=0&shimver=4.0.30319.0
|
||
https://learn.microsoft.com/en-us/dotnet/framework/install/application-not-started?version=(null)&processName=file.exe&platform=0009&osver=6&isServer=0&shimver=4.0.30319.0
|
||
https://learn.microsoft.com/en-us/dotnet/framework/install/application-not-started?version=(null)&processName=file.exe&platform=0009&osver=6&isServer=0&shimver=4.0.30319.0
|
||
https://learn.microsoft.com/en-us/dotnet/framework/install/application-not-started?version=(null)&processName=file.exe&platform=0009&osver=6&isServer=0&shimver=4.0.30319.0
|
||
https://learn.microsoft.com/en-us/dotnet/framework/install/application-not-started?version=(null)&processName=file.exe&platform=0009&osver=6&isServer=0&shimver=4.0.30319.0
|