Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
file.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
initial sample
|
||
Chrome Cache Entry: 100
|
ASCII text, with very long lines (46884)
|
dropped
|
||
Chrome Cache Entry: 101
|
ASCII text
|
dropped
|
||
Chrome Cache Entry: 102
|
SVG Scalable Vector Graphics image
|
downloaded
|
||
Chrome Cache Entry: 103
|
Web Open Font Format (Version 2), TrueType, length 19696, version 1.0
|
downloaded
|
||
Chrome Cache Entry: 104
|
ASCII text, with very long lines (33148), with no line terminators
|
downloaded
|
||
Chrome Cache Entry: 105
|
PNG image data, 475 x 212, 8-bit/color RGBA, non-interlaced
|
dropped
|
||
Chrome Cache Entry: 106
|
PNG image data, 658 x 480, 8-bit/color RGBA, non-interlaced
|
dropped
|
||
Chrome Cache Entry: 107
|
JSON data
|
dropped
|
||
Chrome Cache Entry: 108
|
HTML document, ASCII text, with very long lines (639), with CRLF, LF line terminators
|
downloaded
|
||
Chrome Cache Entry: 109
|
JSON data
|
downloaded
|
||
Chrome Cache Entry: 110
|
PNG image data, 533 x 478, 8-bit/color RGBA, non-interlaced
|
dropped
|
||
Chrome Cache Entry: 72
|
PNG image data, 533 x 478, 8-bit/color RGBA, non-interlaced
|
dropped
|
||
Chrome Cache Entry: 73
|
PNG image data, 533 x 478, 8-bit/color RGBA, non-interlaced
|
downloaded
|
||
Chrome Cache Entry: 74
|
SVG Scalable Vector Graphics image
|
dropped
|
||
Chrome Cache Entry: 75
|
JSON data
|
dropped
|
||
Chrome Cache Entry: 76
|
PNG image data, 533 x 478, 8-bit/color RGBA, non-interlaced
|
dropped
|
||
Chrome Cache Entry: 77
|
ASCII text, with very long lines (65536), with no line terminators
|
downloaded
|
||
Chrome Cache Entry: 78
|
JSON data
|
dropped
|
||
Chrome Cache Entry: 79
|
ASCII text, with very long lines (65410)
|
downloaded
|
||
Chrome Cache Entry: 80
|
JSON data
|
downloaded
|
||
Chrome Cache Entry: 81
|
PNG image data, 533 x 478, 8-bit/color RGBA, non-interlaced
|
downloaded
|
||
Chrome Cache Entry: 82
|
ASCII text, with very long lines (52717), with no line terminators
|
dropped
|
||
Chrome Cache Entry: 83
|
ASCII text
|
downloaded
|
||
Chrome Cache Entry: 84
|
ASCII text, with very long lines (52717), with no line terminators
|
downloaded
|
||
Chrome Cache Entry: 85
|
exported SGML document, ASCII text, with very long lines (65536), with no line terminators
|
downloaded
|
||
Chrome Cache Entry: 86
|
ASCII text, with no line terminators
|
downloaded
|
||
Chrome Cache Entry: 87
|
PNG image data, 533 x 478, 8-bit/color RGBA, non-interlaced
|
downloaded
|
||
Chrome Cache Entry: 88
|
MS Windows icon resource - 6 icons, -128x-128, 16 colors, 72x72, 16 colors
|
downloaded
|
||
Chrome Cache Entry: 89
|
ASCII text, with very long lines (46884)
|
downloaded
|
||
Chrome Cache Entry: 90
|
JSON data
|
dropped
|
||
Chrome Cache Entry: 91
|
MS Windows icon resource - 6 icons, -128x-128, 16 colors, 72x72, 16 colors
|
dropped
|
||
Chrome Cache Entry: 92
|
PNG image data, 658 x 480, 8-bit/color RGBA, non-interlaced
|
downloaded
|
||
Chrome Cache Entry: 93
|
ASCII text, with very long lines (33148), with no line terminators
|
dropped
|
||
Chrome Cache Entry: 94
|
JSON data
|
downloaded
|
||
Chrome Cache Entry: 95
|
JPEG image data, JFIF standard 1.01, aspect ratio, density 1x1, segment length 16, baseline, precision 8, 1528x402, components
3
|
dropped
|
||
Chrome Cache Entry: 96
|
PNG image data, 475 x 212, 8-bit/color RGBA, non-interlaced
|
downloaded
|
||
Chrome Cache Entry: 97
|
JSON data
|
downloaded
|
||
Chrome Cache Entry: 98
|
JPEG image data, JFIF standard 1.01, aspect ratio, density 1x1, segment length 16, baseline, precision 8, 1528x402, components
3
|
downloaded
|
||
Chrome Cache Entry: 99
|
exported SGML document, ASCII text, with very long lines (65536), with no line terminators
|
dropped
|
There are 30 hidden files, click here to show them.
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\file.exe
|
"C:\Users\user\Desktop\file.exe"
|
||
C:\Program Files\Google\Chrome\Application\chrome.exe
|
"C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized --single-argument http://go.microsoft.com/fwlink/?prd=11324&pver=4.5&sbp=AppLaunch2&plcid=0x409&o1=SHIM_NOVERSION_FOUND&version=(null)&processName=file.exe&platform=0009&osver=6&isServer=0&shimver=4.0.30319.0
|
||
C:\Program Files\Google\Chrome\Application\chrome.exe
|
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US
--service-sandbox-type=none --mojo-platform-channel-handle=2064 --field-trial-handle=1912,i,17050092175459860122,8061209407353569252,262144
--disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction
/prefetch:8
|
||
C:\Program Files\Google\Chrome\Application\chrome.exe
|
"C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized --single-argument http://go.microsoft.com/fwlink/?prd=11324&pver=4.5&sbp=AppLaunch2&plcid=0x409&o1=SHIM_NOVERSION_FOUND&version=(null)&processName=file.exe&platform=0009&osver=6&isServer=0&shimver=4.0.30319.0
|
||
C:\Program Files\Google\Chrome\Application\chrome.exe
|
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US
--service-sandbox-type=none --mojo-platform-channel-handle=2012 --field-trial-handle=1968,i,12435437372849550956,943092038503640388,262144
--disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction
/prefetch:8
|
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
https://authoring-docs-microsoft.poolparty.biz/devrel/7696cda6-0510-47f6-8302-71bb5d2e28cf
|
unknown
|
||
https://duckduckgo.com/chrome_newtab
|
unknown
|
||
dare-curbys.biz
|
|||
impend-differ.biz
|
|||
https://duckduckgo.com/ac/?q=
|
unknown
|
||
https://atten-supporse.biz/B
|
unknown
|
||
https://github.com/dotnet/docs/blob/17c4acca45e573a92878a44a2cce57d699fe9c7c/docs/framework/install/
|
unknown
|
||
https://atten-supporse.biz/J
|
unknown
|
||
https://www.linkedin.com/cws/share?url=$
|
unknown
|
||
https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
|
unknown
|
||
https://atten-supporse.biz/Q
|
unknown
|
||
https://github.com/Youssef1313
|
unknown
|
||
https://management.azure.com/providers/Microsoft.Portal/userSettings/cloudconsole?api-version=2023-0
|
unknown
|
||
dwell-exclaim.biz
|
|||
https://aka.ms/msignite_docs_banner
|
unknown
|
||
https://videoencodingpublic-hgeaeyeba8gycee3.b01.azurefd.net/public-b4da8140-92cf-421c-8b7b-e471d5b9
|
unknown
|
||
http://polymer.github.io/AUTHORS.txt
|
unknown
|
||
https://github.com/dotnet/docs/issues/new?template=z-customer-feedback.yml
|
unknown
|
||
https://management.azure.com/subscriptions?api-version=2016-06-01
|
unknown
|
||
https://github.com/dotnet/docs/blob/main/docs/framework/install/application-not-started.md
|
unknown
|
||
zinc-sneark.biz
|
|||
http://x1.c.lencr.org/0
|
unknown
|
||
http://x1.i.lencr.org/0
|
unknown
|
||
https://aka.ms/pshelpmechoose
|
unknown
|
||
https://aka.ms/feedback/report?space=61
|
unknown
|
||
https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
|
unknown
|
||
formy-spill.biz
|
|||
https://learn-video.azurefd.net/vod/player
|
unknown
|
||
https://twitter.com/intent/tweet?original_referer=$
|
unknown
|
||
https://github.com/gewarren
|
unknown
|
||
se-blurry.biz
|
|||
https://support.mozilla.org/products/firefoxgro.all
|
unknown
|
||
http://polymer.github.io/CONTRIBUTORS.txt
|
unknown
|
||
https://www.mozilla.or
|
unknown
|
||
https://atten-supporse.biz/;
|
unknown
|
||
https://github.com/dotnet/docs/blob/live/docs/framework/install/application-not-started.md
|
unknown
|
||
https://authoring-docs-microsoft.poolparty.biz/devrel/69c76c32-967e-4c65-b89a-74cc527db725
|
unknown
|
||
https://client-api.arkoselabs.com/v2/api.js
|
unknown
|
||
https://aka.ms/MSIgniteChallenge/Tier1Banner?wt.mc_id=ignite24_learnbanner_tier1_cnl
|
unknown
|
||
https://management.azure.com/providers/Microsoft.Portal/consoles/default?api-version=2017-12-01-prev
|
unknown
|
||
https://www.google.com/images/branding/product/ico/googleg_lodp.ico
|
unknown
|
||
https://github.com/Thraka
|
unknown
|
||
covery-mover.biz
|
|||
http://polymer.github.io/PATENTS.txt
|
unknown
|
||
https://aka.ms/certhelp
|
unknown
|
||
http://185.215.113.16/steam/random.exe
|
unknown
|
||
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
|
unknown
|
||
http://crl.rootca1.amazontrust.com/rootca1.crl0
|
unknown
|
||
https://atten-supporse.biz/api
|
104.21.112.1
|
||
https://github.com/mairaw
|
unknown
|
||
http://ocsp.rootca1.amazontrust.com0:
|
unknown
|
||
https://js.monitor.azure.com/scripts/c/ms.jsll-4.min.js
|
unknown
|
||
https://schema.org
|
unknown
|
||
http://polymer.github.io/LICENSE.txt
|
unknown
|
||
https://www.ecosia.org/newtab/
|
unknown
|
||
https://support.mozilla.org/kb/customize-firefox-controls-buttons-and-toolbars?utm_source=firefox-br
|
unknown
|
||
https://aka.ms/yourcaliforniaprivacychoices
|
unknown
|
||
https://ac.ecosia.org/autocomplete?q=
|
unknown
|
||
https://github.com/nschonni
|
unknown
|
||
http://185.215.113.16/
|
unknown
|
||
https://videoencodingpublic-hgeaeyeba8gycee3.b01.azurefd.net/public-09ce73a6-05a5-4e4d-b3d7-bd5a8c05
|
unknown
|
||
https://github.com/adegeo
|
unknown
|
||
https://github.com/jonschlinkert/is-plain-object
|
unknown
|
||
http://crt.rootca1.amazontrust.com/rootca1.cer0?
|
unknown
|
||
https://octokit.github.io/rest.js/#throttling
|
unknown
|
||
atten-supporse.biz
|
|||
https://atten-supporse.biz:443/api
|
unknown
|
||
https://github.com/js-cookie/js-cookie
|
unknown
|
||
http://185.215.113.16/off/def.exe
|
unknown
|
||
http://schema.org/Organization
|
unknown
|
||
https://atten-supporse.biz/q
|
unknown
|
||
https://atten-supporse.biz/
|
unknown
|
||
print-vexer.biz
|
|||
https://channel9.msdn.com/
|
unknown
|
||
http://crl.microx
|
unknown
|
||
https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
|
unknown
|
||
https://github.com/dotnet/try
|
unknown
|
||
https://atten-supporse.biz/y
|
unknown
|
||
https://atten-supporse.biz/z
|
unknown
|
There are 69 hidden URLs, click here to show them.
Domains
Name
|
IP
|
Malicious
|
|
---|---|---|---|
atten-supporse.biz
|
104.21.112.1
|
||
www.google.com
|
172.217.21.36
|
||
s-part-0035.t-0009.t-msedge.net
|
13.107.246.63
|
||
js.monitor.azure.com
|
unknown
|
||
mdec.nelreports.net
|
unknown
|
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
192.168.2.6
|
unknown
|
unknown
|
||
185.215.113.16
|
unknown
|
Portugal
|
||
104.21.112.1
|
atten-supporse.biz
|
United States
|
||
239.255.255.250
|
unknown
|
Reserved
|
||
172.217.21.36
|
www.google.com
|
United States
|
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
391000
|
unkown
|
page execute and read and write
|
||
FBC000
|
heap
|
page read and write
|
||
56EA000
|
trusted library allocation
|
page read and write
|
||
5D7B000
|
trusted library allocation
|
page read and write
|
||
F43000
|
heap
|
page read and write
|
||
6350000
|
trusted library allocation
|
page execute and read and write
|
||
57A4000
|
trusted library allocation
|
page read and write
|
||
5C42000
|
trusted library allocation
|
page read and write
|
||
5C48000
|
trusted library allocation
|
page read and write
|
||
5876000
|
trusted library allocation
|
page read and write
|
||
FBC000
|
heap
|
page read and write
|
||
56B6000
|
trusted library allocation
|
page read and write
|
||
5D31000
|
trusted library allocation
|
page read and write
|
||
5C4C000
|
trusted library allocation
|
page read and write
|
||
56FD000
|
trusted library allocation
|
page read and write
|
||
E8F000
|
stack
|
page read and write
|
||
F97000
|
heap
|
page read and write
|
||
390000
|
unkown
|
page read and write
|
||
76BE000
|
stack
|
page read and write
|
||
8090000
|
direct allocation
|
page read and write
|
||
46D0000
|
direct allocation
|
page read and write
|
||
56DE000
|
trusted library allocation
|
page read and write
|
||
F44000
|
heap
|
page read and write
|
||
56DC000
|
trusted library allocation
|
page read and write
|
||
F76000
|
heap
|
page read and write
|
||
5D01000
|
trusted library allocation
|
page read and write
|
||
3D2000
|
unkown
|
page execute and read and write
|
||
434E000
|
stack
|
page read and write
|
||
575C000
|
trusted library allocation
|
page read and write
|
||
56F4000
|
trusted library allocation
|
page read and write
|
||
5C40000
|
trusted library allocation
|
page read and write
|
||
56C1000
|
trusted library allocation
|
page read and write
|
||
F46000
|
heap
|
page read and write
|
||
56E1000
|
trusted library allocation
|
page read and write
|
||
5C49000
|
trusted library allocation
|
page read and write
|
||
8090000
|
direct allocation
|
page read and write
|
||
5DDE000
|
trusted library allocation
|
page read and write
|
||
46D0000
|
direct allocation
|
page read and write
|
||
4B70000
|
direct allocation
|
page read and write
|
||
5749000
|
trusted library allocation
|
page read and write
|
||
5C4F000
|
trusted library allocation
|
page read and write
|
||
56A9000
|
trusted library allocation
|
page read and write
|
||
56BA000
|
trusted library allocation
|
page read and write
|
||
46D0000
|
direct allocation
|
page read and write
|
||
5C45000
|
trusted library allocation
|
page read and write
|
||
584E000
|
trusted library allocation
|
page read and write
|
||
5C46000
|
trusted library allocation
|
page read and write
|
||
5D7D000
|
trusted library allocation
|
page read and write
|
||
56A1000
|
trusted library allocation
|
page read and write
|
||
56DC000
|
trusted library allocation
|
page read and write
|
||
8090000
|
direct allocation
|
page read and write
|
||
3E4E000
|
stack
|
page read and write
|
||
56A8000
|
trusted library allocation
|
page read and write
|
||
56D8000
|
trusted library allocation
|
page read and write
|
||
391000
|
unkown
|
page execute and write copy
|
||
56DC000
|
trusted library allocation
|
page read and write
|
||
5C4E000
|
trusted library allocation
|
page read and write
|
||
ECA000
|
heap
|
page read and write
|
||
FB6000
|
heap
|
page read and write
|
||
3B8F000
|
stack
|
page read and write
|
||
56A1000
|
trusted library allocation
|
page read and write
|
||
5C4E000
|
trusted library allocation
|
page read and write
|
||
40CE000
|
stack
|
page read and write
|
||
46E1000
|
heap
|
page read and write
|
||
7DFF000
|
stack
|
page read and write
|
||
46E1000
|
heap
|
page read and write
|
||
57DE000
|
trusted library allocation
|
page read and write
|
||
4CAF000
|
stack
|
page read and write
|
||
56DC000
|
trusted library allocation
|
page read and write
|
||
F96000
|
heap
|
page read and write
|
||
56B9000
|
trusted library allocation
|
page read and write
|
||
5D75000
|
trusted library allocation
|
page read and write
|
||
5886000
|
trusted library allocation
|
page read and write
|
||
5CF6000
|
trusted library allocation
|
page read and write
|
||
F8C000
|
heap
|
page read and write
|
||
56ED000
|
trusted library allocation
|
page read and write
|
||
5C4D000
|
trusted library allocation
|
page read and write
|
||
5D37000
|
trusted library allocation
|
page read and write
|
||
807F000
|
stack
|
page read and write
|
||
FB6000
|
heap
|
page read and write
|
||
573D000
|
trusted library allocation
|
page read and write
|
||
56CC000
|
trusted library allocation
|
page read and write
|
||
56CC000
|
trusted library allocation
|
page read and write
|
||
68D000
|
unkown
|
page execute and write copy
|
||
56AE000
|
trusted library allocation
|
page read and write
|
||
56CB000
|
trusted library allocation
|
page read and write
|
||
6DFE000
|
stack
|
page read and write
|
||
56C1000
|
trusted library allocation
|
page read and write
|
||
5D67000
|
trusted library allocation
|
page read and write
|
||
F97000
|
heap
|
page read and write
|
||
56AC000
|
trusted library allocation
|
page read and write
|
||
340F000
|
stack
|
page read and write
|
||
8090000
|
direct allocation
|
page read and write
|
||
56C0000
|
trusted library allocation
|
page read and write
|
||
5D40000
|
trusted library allocation
|
page read and write
|
||
5CAC000
|
trusted library allocation
|
page read and write
|
||
F92000
|
heap
|
page read and write
|
||
46E1000
|
heap
|
page read and write
|
||
743E000
|
stack
|
page read and write
|
||
56C2000
|
trusted library allocation
|
page read and write
|
||
5E43000
|
trusted library allocation
|
page read and write
|
||
F99000
|
heap
|
page read and write
|
||
8160000
|
heap
|
page read and write
|
||
56F9000
|
trusted library allocation
|
page read and write
|
||
9CA000
|
stack
|
page read and write
|
||
5C48000
|
trusted library allocation
|
page read and write
|
||
56CC000
|
trusted library allocation
|
page read and write
|
||
6DBF000
|
stack
|
page read and write
|
||
F97000
|
heap
|
page read and write
|
||
7CFE000
|
stack
|
page read and write
|
||
56EA000
|
trusted library allocation
|
page read and write
|
||
F43000
|
heap
|
page read and write
|
||
56CC000
|
trusted library allocation
|
page read and write
|
||
46D0000
|
direct allocation
|
page read and write
|
||
56C1000
|
trusted library allocation
|
page read and write
|
||
5729000
|
trusted library allocation
|
page read and write
|
||
5F0D000
|
trusted library allocation
|
page read and write
|
||
394E000
|
stack
|
page read and write
|
||
5C40000
|
trusted library allocation
|
page read and write
|
||
37CF000
|
stack
|
page read and write
|
||
573E000
|
trusted library allocation
|
page read and write
|
||
FB5000
|
heap
|
page read and write
|
||
5706000
|
trusted library allocation
|
page read and write
|
||
5C4B000
|
trusted library allocation
|
page read and write
|
||
8452000
|
trusted library allocation
|
page read and write
|
||
56D4000
|
trusted library allocation
|
page read and write
|
||
703F000
|
stack
|
page read and write
|
||
46D0000
|
direct allocation
|
page read and write
|
||
5733000
|
trusted library allocation
|
page read and write
|
||
5D62000
|
trusted library allocation
|
page read and write
|
||
46D0000
|
direct allocation
|
page read and write
|
||
56BB000
|
trusted library allocation
|
page read and write
|
||
5C44000
|
trusted library allocation
|
page read and write
|
||
56FD000
|
trusted library allocation
|
page read and write
|
||
56C1000
|
trusted library allocation
|
page read and write
|
||
7A7E000
|
stack
|
page read and write
|
||
56CB000
|
trusted library allocation
|
page read and write
|
||
51C0000
|
remote allocation
|
page read and write
|
||
56CF000
|
trusted library allocation
|
page read and write
|
||
8450000
|
trusted library allocation
|
page read and write
|
||
569F000
|
stack
|
page read and write
|
||
FB9000
|
heap
|
page read and write
|
||
69FF000
|
stack
|
page read and write
|
||
ECE000
|
heap
|
page read and write
|
||
41CF000
|
stack
|
page read and write
|
||
FB5000
|
heap
|
page read and write
|
||
F99000
|
heap
|
page read and write
|
||
56CC000
|
trusted library allocation
|
page read and write
|
||
5C49000
|
trusted library allocation
|
page read and write
|
||
56C1000
|
trusted library allocation
|
page read and write
|
||
5D64000
|
trusted library allocation
|
page read and write
|
||
56E1000
|
trusted library allocation
|
page read and write
|
||
9CF0000
|
trusted library allocation
|
page read and write
|
||
5CF5000
|
trusted library allocation
|
page read and write
|
||
5C49000
|
trusted library allocation
|
page read and write
|
||
4CF0000
|
direct allocation
|
page execute and read and write
|
||
56B8000
|
trusted library allocation
|
page read and write
|
||
56CC000
|
trusted library allocation
|
page read and write
|
||
56ED000
|
trusted library allocation
|
page read and write
|
||
380E000
|
stack
|
page read and write
|
||
5C46000
|
trusted library allocation
|
page read and write
|
||
F37000
|
heap
|
page read and write
|
||
46E1000
|
heap
|
page read and write
|
||
56D0000
|
trusted library allocation
|
page read and write
|
||
5719000
|
trusted library allocation
|
page read and write
|
||
5C47000
|
trusted library allocation
|
page read and write
|
||
5D13000
|
trusted library allocation
|
page read and write
|
||
5C46000
|
trusted library allocation
|
page read and write
|
||
5D1E000
|
trusted library allocation
|
page read and write
|
||
3F8E000
|
stack
|
page read and write
|
||
78FF000
|
stack
|
page read and write
|
||
56DC000
|
trusted library allocation
|
page read and write
|
||
F8B000
|
heap
|
page read and write
|
||
5E87000
|
trusted library allocation
|
page read and write
|
||
5C45000
|
trusted library allocation
|
page read and write
|
||
3D0E000
|
stack
|
page read and write
|
||
56CB000
|
trusted library allocation
|
page read and write
|
||
7B7F000
|
stack
|
page read and write
|
||
5C47000
|
trusted library allocation
|
page read and write
|
||
4CD0000
|
direct allocation
|
page execute and read and write
|
||
FA1000
|
heap
|
page read and write
|
||
56CC000
|
trusted library allocation
|
page read and write
|
||
10FE000
|
stack
|
page read and write
|
||
5719000
|
trusted library allocation
|
page read and write
|
||
56A1000
|
trusted library allocation
|
page read and write
|
||
EC0000
|
heap
|
page read and write
|
||
56C9000
|
trusted library allocation
|
page read and write
|
||
56B8000
|
trusted library allocation
|
page read and write
|
||
D30000
|
heap
|
page read and write
|
||
56B1000
|
trusted library allocation
|
page read and write
|
||
56E4000
|
trusted library allocation
|
page read and write
|
||
68FE000
|
stack
|
page read and write
|
||
5D02000
|
trusted library allocation
|
page read and write
|
||
5707000
|
trusted library allocation
|
page read and write
|
||
56BB000
|
trusted library allocation
|
page read and write
|
||
56EA000
|
trusted library allocation
|
page read and write
|
||
36CE000
|
stack
|
page read and write
|
||
56C4000
|
trusted library allocation
|
page read and write
|
||
87CC000
|
stack
|
page read and write
|
||
5C47000
|
trusted library allocation
|
page read and write
|
||
56CC000
|
trusted library allocation
|
page read and write
|
||
7A3F000
|
stack
|
page read and write
|
||
56E5000
|
trusted library allocation
|
page read and write
|
||
46CF000
|
stack
|
page read and write
|
||
F9F000
|
heap
|
page read and write
|
||
56CC000
|
trusted library allocation
|
page read and write
|
||
5D74000
|
trusted library allocation
|
page read and write
|
||
344E000
|
stack
|
page read and write
|
||
5820000
|
direct allocation
|
page read and write
|
||
56BC000
|
trusted library allocation
|
page read and write
|
||
5719000
|
trusted library allocation
|
page read and write
|
||
56BA000
|
trusted library allocation
|
page read and write
|
||
7CBF000
|
stack
|
page read and write
|
||
57A9000
|
trusted library allocation
|
page read and write
|
||
5D39000
|
stack
|
page read and write
|
||
880E000
|
stack
|
page read and write
|
||
5719000
|
trusted library allocation
|
page read and write
|
||
368F000
|
stack
|
page read and write
|
||
56CF000
|
trusted library allocation
|
page read and write
|
||
56B7000
|
trusted library allocation
|
page read and write
|
||
56F6000
|
trusted library allocation
|
page read and write
|
||
3A4F000
|
stack
|
page read and write
|
||
56E7000
|
trusted library allocation
|
page read and write
|
||
5737000
|
trusted library allocation
|
page read and write
|
||
5D3D000
|
trusted library allocation
|
page read and write
|
||
46E1000
|
heap
|
page read and write
|
||
46E1000
|
heap
|
page read and write
|
||
4D20000
|
direct allocation
|
page execute and read and write
|
||
5C49000
|
trusted library allocation
|
page read and write
|
||
5CD9000
|
trusted library allocation
|
page read and write
|
||
56A1000
|
trusted library allocation
|
page read and write
|
||
61C6000
|
trusted library allocation
|
page read and write
|
||
5710000
|
trusted library allocation
|
page read and write
|
||
56CB000
|
trusted library allocation
|
page read and write
|
||
5C46000
|
trusted library allocation
|
page read and write
|
||
56BD000
|
trusted library allocation
|
page read and write
|
||
EF7000
|
heap
|
page read and write
|
||
5D3B000
|
trusted library allocation
|
page read and write
|
||
56DC000
|
trusted library allocation
|
page read and write
|
||
6B3F000
|
stack
|
page read and write
|
||
6474000
|
trusted library allocation
|
page execute and read and write
|
||
56CC000
|
trusted library allocation
|
page read and write
|
||
5733000
|
trusted library allocation
|
page read and write
|
||
56B8000
|
trusted library allocation
|
page read and write
|
||
677F000
|
stack
|
page read and write
|
||
67BE000
|
stack
|
page read and write
|
||
5C46000
|
trusted library allocation
|
page read and write
|
||
56CB000
|
trusted library allocation
|
page read and write
|
||
80C0000
|
trusted library allocation
|
page read and write
|
||
5C49000
|
trusted library allocation
|
page read and write
|
||
5C46000
|
trusted library allocation
|
page read and write
|
||
575B000
|
trusted library allocation
|
page read and write
|
||
575F000
|
trusted library allocation
|
page read and write
|
||
56C4000
|
trusted library allocation
|
page read and write
|
||
57AC000
|
trusted library allocation
|
page read and write
|
||
F92000
|
heap
|
page read and write
|
||
56C1000
|
trusted library allocation
|
page read and write
|
||
56C1000
|
trusted library allocation
|
page read and write
|
||
56CB000
|
trusted library allocation
|
page read and write
|
||
5707000
|
trusted library allocation
|
page read and write
|
||
5C43000
|
trusted library allocation
|
page read and write
|
||
8090000
|
direct allocation
|
page read and write
|
||
FA4000
|
heap
|
page read and write
|
||
3F4F000
|
stack
|
page read and write
|
||
6F3E000
|
stack
|
page read and write
|
||
46E1000
|
heap
|
page read and write
|
||
56CB000
|
trusted library allocation
|
page read and write
|
||
46F0000
|
heap
|
page read and write
|
||
5D33000
|
trusted library allocation
|
page read and write
|
||
FB6000
|
heap
|
page read and write
|
||
56A8000
|
trusted library allocation
|
page read and write
|
||
56A6000
|
trusted library allocation
|
page read and write
|
||
46D0000
|
direct allocation
|
page read and write
|
||
61CA000
|
trusted library allocation
|
page execute and read and write
|
||
56CC000
|
trusted library allocation
|
page read and write
|
||
46E1000
|
heap
|
page read and write
|
||
5D4B000
|
trusted library allocation
|
page read and write
|
||
4CF0000
|
direct allocation
|
page execute and read and write
|
||
46E1000
|
heap
|
page read and write
|
||
D10000
|
heap
|
page read and write
|
||
5EAD000
|
trusted library allocation
|
page read and write
|
||
56A1000
|
trusted library allocation
|
page read and write
|
||
F2E000
|
heap
|
page read and write
|
||
5D31000
|
trusted library allocation
|
page read and write
|
||
841E000
|
stack
|
page read and write
|
||
56E1000
|
trusted library allocation
|
page read and write
|
||
61BD000
|
trusted library allocation
|
page read and write
|
||
FA2000
|
heap
|
page read and write
|
||
F92000
|
heap
|
page read and write
|
||
56ED000
|
trusted library allocation
|
page read and write
|
||
5C4C000
|
trusted library allocation
|
page read and write
|
||
56D0000
|
trusted library allocation
|
page read and write
|
||
5701000
|
trusted library allocation
|
page read and write
|
||
5D61000
|
trusted library allocation
|
page read and write
|
||
FBA000
|
heap
|
page read and write
|
||
56ED000
|
trusted library allocation
|
page read and write
|
||
5D66000
|
trusted library allocation
|
page read and write
|
||
80F0000
|
direct allocation
|
page read and write
|
||
46E1000
|
heap
|
page read and write
|
||
5EB1000
|
trusted library allocation
|
page read and write
|
||
56A1000
|
trusted library allocation
|
page read and write
|
||
46D0000
|
direct allocation
|
page read and write
|
||
6A3E000
|
stack
|
page read and write
|
||
56CB000
|
trusted library allocation
|
page read and write
|
||
4D32000
|
trusted library allocation
|
page read and write
|
||
56BA000
|
trusted library allocation
|
page read and write
|
||
5D0F000
|
trusted library allocation
|
page read and write
|
||
FA4000
|
heap
|
page read and write
|
||
420E000
|
stack
|
page read and write
|
||
5D35000
|
trusted library allocation
|
page read and write
|
||
56C0000
|
trusted library allocation
|
page read and write
|
||
2CCE000
|
stack
|
page read and write
|
||
570D000
|
trusted library allocation
|
page read and write
|
||
5D4C000
|
trusted library allocation
|
page read and write
|
||
2E0E000
|
stack
|
page read and write
|
||
46E1000
|
heap
|
page read and write
|
||
2B4F000
|
stack
|
page read and write
|
||
5C43000
|
trusted library allocation
|
page read and write
|
||
46E1000
|
heap
|
page read and write
|
||
571E000
|
trusted library allocation
|
page read and write
|
||
5C45000
|
trusted library allocation
|
page read and write
|
||
5D63000
|
trusted library allocation
|
page read and write
|
||
56CC000
|
trusted library allocation
|
page read and write
|
||
677000
|
unkown
|
page execute and read and write
|
||
56DC000
|
trusted library allocation
|
page read and write
|
||
5705000
|
trusted library allocation
|
page read and write
|
||
5CDB000
|
trusted library allocation
|
page read and write
|
||
56DC000
|
trusted library allocation
|
page read and write
|
||
6464000
|
trusted library allocation
|
page execute and read and write
|
||
56D8000
|
trusted library allocation
|
page read and write
|
||
5D1C000
|
trusted library allocation
|
page read and write
|
||
57A7000
|
trusted library allocation
|
page read and write
|
||
5C40000
|
trusted library allocation
|
page read and write
|
||
32CF000
|
stack
|
page read and write
|
||
56BA000
|
trusted library allocation
|
page read and write
|
||
7F3F000
|
stack
|
page read and write
|
||
8090000
|
trusted library allocation
|
page read and write
|
||
5C47000
|
trusted library allocation
|
page read and write
|
||
573E000
|
trusted library allocation
|
page read and write
|
||
56C1000
|
trusted library allocation
|
page read and write
|
||
5D47000
|
trusted library allocation
|
page read and write
|
||
573E000
|
trusted library allocation
|
page read and write
|
||
56AF000
|
trusted library allocation
|
page read and write
|
||
571C000
|
trusted library allocation
|
page read and write
|
||
FBA000
|
heap
|
page read and write
|
||
56AE000
|
trusted library allocation
|
page read and write
|
||
56D2000
|
trusted library allocation
|
page read and write
|
||
FB9000
|
heap
|
page read and write
|
||
73FF000
|
stack
|
page read and write
|
||
56ED000
|
trusted library allocation
|
page read and write
|
||
31CE000
|
stack
|
page read and write
|
||
FA0000
|
heap
|
page read and write
|
||
5C41000
|
trusted library allocation
|
page read and write
|
||
4F2D000
|
stack
|
page read and write
|
||
56AE000
|
trusted library allocation
|
page read and write
|
||
4B5D000
|
stack
|
page read and write
|
||
56DE000
|
trusted library allocation
|
page read and write
|
||
46E1000
|
heap
|
page read and write
|
||
4B70000
|
direct allocation
|
page read and write
|
||
594D000
|
trusted library allocation
|
page read and write
|
||
4BAB000
|
stack
|
page read and write
|
||
5C44000
|
trusted library allocation
|
page read and write
|
||
FA4000
|
heap
|
page read and write
|
||
56F6000
|
trusted library allocation
|
page read and write
|
||
5CEB000
|
trusted library allocation
|
page read and write
|
||
5D40000
|
trusted library allocation
|
page read and write
|
||
5D11000
|
trusted library allocation
|
page read and write
|
||
570C000
|
trusted library allocation
|
page read and write
|
||
F92000
|
heap
|
page read and write
|
||
46E1000
|
heap
|
page read and write
|
||
5D0A000
|
trusted library allocation
|
page read and write
|
||
5CE9000
|
trusted library allocation
|
page read and write
|
||
56CC000
|
trusted library allocation
|
page read and write
|
||
5C4B000
|
trusted library allocation
|
page read and write
|
||
86CC000
|
stack
|
page read and write
|
||
5C44000
|
trusted library allocation
|
page read and write
|
||
FAE000
|
heap
|
page read and write
|
||
56B2000
|
trusted library allocation
|
page read and write
|
||
3E3000
|
unkown
|
page write copy
|
||
5D33000
|
trusted library allocation
|
page read and write
|
||
5733000
|
trusted library allocation
|
page read and write
|
||
FBC000
|
heap
|
page read and write
|
||
68BF000
|
stack
|
page read and write
|
||
56B5000
|
trusted library allocation
|
page read and write
|
||
5D84000
|
trusted library allocation
|
page read and write
|
||
5E78000
|
trusted library allocation
|
page read and write
|
||
4CE0000
|
direct allocation
|
page execute and read and write
|
||
56BA000
|
trusted library allocation
|
page read and write
|
||
4CF0000
|
direct allocation
|
page execute and read and write
|
||
2B8E000
|
stack
|
page read and write
|
||
5D72000
|
trusted library allocation
|
page read and write
|
||
5DF1000
|
trusted library allocation
|
page read and write
|
||
7F7E000
|
stack
|
page read and write
|
||
571A000
|
trusted library allocation
|
page read and write
|
||
4CF0000
|
direct allocation
|
page execute and read and write
|
||
5D49000
|
trusted library allocation
|
page read and write
|
||
56D5000
|
trusted library allocation
|
page read and write
|
||
753F000
|
stack
|
page read and write
|
||
390F000
|
stack
|
page read and write
|
||
F0E000
|
heap
|
page read and write
|
||
80F0000
|
direct allocation
|
page read and write
|
||
57FE000
|
stack
|
page read and write
|
||
56D8000
|
trusted library allocation
|
page read and write
|
||
56CC000
|
trusted library allocation
|
page read and write
|
||
56C9000
|
trusted library allocation
|
page read and write
|
||
536E000
|
stack
|
page read and write
|
||
5D0A000
|
trusted library allocation
|
page read and write
|
||
50AE000
|
stack
|
page read and write
|
||
D8D000
|
stack
|
page read and write
|
||
5714000
|
trusted library allocation
|
page read and write
|
||
56DC000
|
trusted library allocation
|
page read and write
|
||
56AD000
|
trusted library allocation
|
page read and write
|
||
56DC000
|
trusted library allocation
|
page read and write
|
||
5C42000
|
trusted library allocation
|
page read and write
|
||
67E000
|
unkown
|
page execute and read and write
|
||
56ED000
|
trusted library allocation
|
page read and write
|
||
5C47000
|
trusted library allocation
|
page read and write
|
||
5C42000
|
trusted library allocation
|
page read and write
|
||
5C41000
|
trusted library allocation
|
page read and write
|
||
61AB000
|
trusted library allocation
|
page read and write
|
||
28A0000
|
heap
|
page read and write
|
||
56DC000
|
trusted library allocation
|
page read and write
|
||
FA1000
|
heap
|
page read and write
|
||
28C0000
|
heap
|
page read and write
|
||
5C4E000
|
trusted library allocation
|
page read and write
|
||
56BD000
|
trusted library allocation
|
page read and write
|
||
5DDC000
|
trusted library allocation
|
page read and write
|
||
5EAF000
|
trusted library allocation
|
page read and write
|
||
56ED000
|
trusted library allocation
|
page read and write
|
||
812C000
|
stack
|
page read and write
|
||
56C1000
|
trusted library allocation
|
page read and write
|
||
8280000
|
direct allocation
|
page execute and read and write
|
||
5C43000
|
trusted library allocation
|
page read and write
|
||
308E000
|
stack
|
page read and write
|
||
8140000
|
direct allocation
|
page execute and read and write
|
||
5C4B000
|
trusted library allocation
|
page read and write
|
||
56AC000
|
trusted library allocation
|
page read and write
|
||
56E000
|
unkown
|
page execute and read and write
|
||
5D14000
|
trusted library allocation
|
page read and write
|
||
767F000
|
stack
|
page read and write
|
||
56D2000
|
trusted library allocation
|
page read and write
|
||
578B000
|
trusted library allocation
|
page read and write
|
||
2A4C000
|
stack
|
page read and write
|
||
82F000
|
unkown
|
page execute and write copy
|
||
56CB000
|
trusted library allocation
|
page read and write
|
||
56CC000
|
trusted library allocation
|
page read and write
|
||
5C46000
|
trusted library allocation
|
page read and write
|
||
46D0000
|
direct allocation
|
page read and write
|
||
8090000
|
direct allocation
|
page read and write
|
||
56C1000
|
trusted library allocation
|
page read and write
|
||
8360000
|
trusted library allocation
|
page read and write
|
||
56E4000
|
trusted library allocation
|
page read and write
|
||
56CC000
|
trusted library allocation
|
page read and write
|
||
522E000
|
stack
|
page read and write
|
||
56A5000
|
trusted library allocation
|
page read and write
|
||
28C7000
|
heap
|
page read and write
|
||
56FC000
|
trusted library allocation
|
page read and write
|
||
56E9000
|
trusted library allocation
|
page read and write
|
||
56EE000
|
trusted library allocation
|
page read and write
|
||
5EBE000
|
stack
|
page read and write
|
||
56BC000
|
trusted library allocation
|
page read and write
|
||
46E1000
|
heap
|
page read and write
|
||
68D000
|
unkown
|
page execute and read and write
|
||
572D000
|
trusted library allocation
|
page read and write
|
||
5C51000
|
trusted library allocation
|
page read and write
|
||
506E000
|
stack
|
page read and write
|
||
5A40000
|
trusted library allocation
|
page read and write
|
||
F76000
|
heap
|
page read and write
|
||
46D0000
|
direct allocation
|
page read and write
|
||
657F000
|
stack
|
page read and write
|
||
5D64000
|
trusted library allocation
|
page read and write
|
||
56AB000
|
trusted library allocation
|
page read and write
|
||
FB5000
|
heap
|
page read and write
|
||
56E5000
|
trusted library allocation
|
page read and write
|
||
6C7F000
|
stack
|
page read and write
|
||
304F000
|
stack
|
page read and write
|
||
5590000
|
heap
|
page read and write
|
||
57AB000
|
trusted library allocation
|
page read and write
|
||
4CF0000
|
direct allocation
|
page execute and read and write
|
||
51AF000
|
stack
|
page read and write
|
||
71BE000
|
stack
|
page read and write
|
||
5F0F000
|
trusted library allocation
|
page read and write
|
||
8090000
|
direct allocation
|
page read and write
|
||
5DBE000
|
trusted library allocation
|
page read and write
|
||
5755000
|
trusted library allocation
|
page read and write
|
||
5C4E000
|
trusted library allocation
|
page read and write
|
||
5C4D000
|
trusted library allocation
|
page read and write
|
||
FA9000
|
heap
|
page read and write
|
||
5730000
|
trusted library allocation
|
page read and write
|
||
4D00000
|
direct allocation
|
page execute and read and write
|
||
56FF000
|
trusted library allocation
|
page read and write
|
||
56AD000
|
trusted library allocation
|
page read and write
|
||
5C43000
|
trusted library allocation
|
page read and write
|
||
571C000
|
trusted library allocation
|
page read and write
|
||
5C44000
|
trusted library allocation
|
page read and write
|
||
46E1000
|
heap
|
page read and write
|
||
56ED000
|
trusted library allocation
|
page read and write
|
||
F43000
|
heap
|
page read and write
|
||
8090000
|
direct allocation
|
page read and write
|
||
5D7A000
|
trusted library allocation
|
page read and write
|
||
56B8000
|
trusted library allocation
|
page read and write
|
||
5DC0000
|
trusted library allocation
|
page read and write
|
||
757E000
|
stack
|
page read and write
|
||
5E76000
|
trusted library allocation
|
page read and write
|
||
56D1000
|
trusted library allocation
|
page read and write
|
||
5CE9000
|
trusted library allocation
|
page read and write
|
||
56B8000
|
trusted library allocation
|
page read and write
|
||
56ED000
|
trusted library allocation
|
page read and write
|
||
FBB000
|
heap
|
page read and write
|
||
72BF000
|
stack
|
page read and write
|
||
FA1000
|
heap
|
page read and write
|
||
5D39000
|
trusted library allocation
|
page read and write
|
||
56B1000
|
trusted library allocation
|
page read and write
|
||
5C41000
|
trusted library allocation
|
page read and write
|
||
56DC000
|
trusted library allocation
|
page read and write
|
||
56A2000
|
trusted library allocation
|
page read and write
|
||
554E000
|
stack
|
page read and write
|
||
5719000
|
trusted library allocation
|
page read and write
|
||
793E000
|
stack
|
page read and write
|
||
845A000
|
trusted library allocation
|
page read and write
|
||
56C1000
|
trusted library allocation
|
page read and write
|
||
46E1000
|
heap
|
page read and write
|
||
573E000
|
trusted library allocation
|
page read and write
|
||
5D24000
|
trusted library allocation
|
page read and write
|
||
5C43000
|
trusted library allocation
|
page read and write
|
||
F76000
|
heap
|
page read and write
|
||
57A3000
|
trusted library allocation
|
page read and write
|
||
56ED000
|
trusted library allocation
|
page read and write
|
||
4CFE000
|
stack
|
page read and write
|
||
8090000
|
direct allocation
|
page read and write
|
||
4F6E000
|
stack
|
page read and write
|
||
2DCF000
|
stack
|
page read and write
|
||
56A6000
|
trusted library allocation
|
page read and write
|
||
56DC000
|
trusted library allocation
|
page read and write
|
||
FBC000
|
heap
|
page read and write
|
||
707E000
|
stack
|
page read and write
|
||
56D3000
|
trusted library allocation
|
page read and write
|
||
5D86000
|
trusted library allocation
|
page read and write
|
||
5C45000
|
trusted library allocation
|
page read and write
|
||
5835000
|
trusted library allocation
|
page read and write
|
||
5C4D000
|
trusted library allocation
|
page read and write
|
||
56B7000
|
trusted library allocation
|
page read and write
|
||
4D10000
|
direct allocation
|
page execute and read and write
|
||
5E7C000
|
stack
|
page read and write
|
||
56BB000
|
trusted library allocation
|
page read and write
|
||
5EC1000
|
trusted library allocation
|
page read and write
|
||
46E0000
|
heap
|
page read and write
|
||
56E6000
|
trusted library allocation
|
page read and write
|
||
5C43000
|
trusted library allocation
|
page read and write
|
||
5C45000
|
trusted library allocation
|
page read and write
|
||
F95000
|
heap
|
page read and write
|
||
61C0000
|
trusted library allocation
|
page read and write
|
||
4B20000
|
trusted library allocation
|
page read and write
|
||
4CF0000
|
direct allocation
|
page execute and read and write
|
||
5C45000
|
trusted library allocation
|
page read and write
|
||
5CE1000
|
trusted library allocation
|
page read and write
|
||
46D0000
|
direct allocation
|
page read and write
|
||
FA5000
|
heap
|
page read and write
|
||
5589000
|
stack
|
page read and write
|
||
F92000
|
heap
|
page read and write
|
||
F9A000
|
heap
|
page read and write
|
||
5719000
|
trusted library allocation
|
page read and write
|
||
5D0D000
|
trusted library allocation
|
page read and write
|
||
56DC000
|
trusted library allocation
|
page read and write
|
||
56A8000
|
trusted library allocation
|
page read and write
|
||
5C42000
|
trusted library allocation
|
page read and write
|
||
46D0000
|
direct allocation
|
page read and write
|
||
5D77000
|
trusted library allocation
|
page read and write
|
||
3E0F000
|
stack
|
page read and write
|
||
8090000
|
direct allocation
|
page read and write
|
||
573E000
|
trusted library allocation
|
page read and write
|
||
5C44000
|
trusted library allocation
|
page read and write
|
||
56D3000
|
trusted library allocation
|
page read and write
|
||
72FE000
|
stack
|
page read and write
|
||
5916000
|
trusted library allocation
|
page read and write
|
||
5709000
|
trusted library allocation
|
page read and write
|
||
717F000
|
stack
|
page read and write
|
||
56D1000
|
trusted library allocation
|
page read and write
|
||
C30000
|
heap
|
page read and write
|
||
56ED000
|
trusted library allocation
|
page read and write
|
||
5D42000
|
trusted library allocation
|
page read and write
|
||
5CEB000
|
trusted library allocation
|
page read and write
|
||
56B7000
|
trusted library allocation
|
page read and write
|
||
56C2000
|
trusted library allocation
|
page read and write
|
||
56CB000
|
trusted library allocation
|
page read and write
|
||
51C0000
|
remote allocation
|
page read and write
|
||
5705000
|
trusted library allocation
|
page read and write
|
||
56D3000
|
trusted library allocation
|
page read and write
|
||
5C49000
|
trusted library allocation
|
page read and write
|
||
56ED000
|
trusted library allocation
|
page read and write
|
||
4BB1000
|
direct allocation
|
page read and write
|
||
F25000
|
heap
|
page read and write
|
||
8458000
|
trusted library allocation
|
page read and write
|
||
5704000
|
trusted library allocation
|
page read and write
|
||
5D70000
|
trusted library allocation
|
page read and write
|
||
D35000
|
heap
|
page read and write
|
||
5DEF000
|
trusted library allocation
|
page read and write
|
||
56C1000
|
trusted library allocation
|
page read and write
|
||
5EBF000
|
trusted library allocation
|
page read and write
|
||
5D99000
|
trusted library allocation
|
page read and write
|
||
56BA000
|
trusted library allocation
|
page read and write
|
||
8090000
|
direct allocation
|
page read and write
|
||
56FA000
|
trusted library allocation
|
page read and write
|
||
56F1000
|
trusted library allocation
|
page read and write
|
||
5EFE000
|
stack
|
page read and write
|
||
5EAF000
|
trusted library allocation
|
page read and write
|
||
56B2000
|
trusted library allocation
|
page read and write
|
||
56CC000
|
trusted library allocation
|
page read and write
|
||
5D2D000
|
trusted library allocation
|
page read and write
|
||
56A4000
|
trusted library allocation
|
page read and write
|
||
5D34000
|
trusted library allocation
|
page read and write
|
||
7BBE000
|
stack
|
page read and write
|
||
5D5A000
|
trusted library allocation
|
page read and write
|
||
56E6000
|
trusted library allocation
|
page read and write
|
||
587E000
|
trusted library allocation
|
page read and write
|
||
8440000
|
heap
|
page read and write
|
||
F76000
|
heap
|
page read and write
|
||
56A9000
|
trusted library allocation
|
page read and write
|
||
46E1000
|
heap
|
page read and write
|
||
5704000
|
trusted library allocation
|
page read and write
|
||
5D59000
|
trusted library allocation
|
page read and write
|
||
5D65000
|
trusted library allocation
|
page read and write
|
||
6CBE000
|
stack
|
page read and write
|
||
448E000
|
stack
|
page read and write
|
||
56A5000
|
trusted library allocation
|
page read and write
|
||
5711000
|
trusted library allocation
|
page read and write
|
||
FBD000
|
heap
|
page read and write
|
||
5C4A000
|
trusted library allocation
|
page read and write
|
||
FFE000
|
stack
|
page read and write
|
||
56B2000
|
trusted library allocation
|
page read and write
|
||
FB9000
|
heap
|
page read and write
|
||
5CF7000
|
trusted library allocation
|
page read and write
|
||
667F000
|
stack
|
page read and write
|
||
46E1000
|
heap
|
page read and write
|
||
5D49000
|
trusted library allocation
|
page read and write
|
||
F2E000
|
heap
|
page read and write
|
||
56BA000
|
trusted library allocation
|
page read and write
|
||
5C50000
|
trusted library allocation
|
page read and write
|
||
FBC000
|
heap
|
page read and write
|
||
4CC0000
|
direct allocation
|
page execute and read and write
|
||
F92000
|
heap
|
page read and write
|
||
5DEC000
|
trusted library allocation
|
page read and write
|
||
56BA000
|
trusted library allocation
|
page read and write
|
||
56D8000
|
trusted library allocation
|
page read and write
|
||
5C4F000
|
trusted library allocation
|
page read and write
|
||
5D78000
|
trusted library allocation
|
page read and write
|
||
5C4C000
|
trusted library allocation
|
page read and write
|
||
5C4D000
|
trusted library allocation
|
page read and write
|
||
56F5000
|
trusted library allocation
|
page read and write
|
||
56FF000
|
trusted library allocation
|
page read and write
|
||
56E6000
|
trusted library allocation
|
page read and write
|
||
5E19000
|
trusted library allocation
|
page read and write
|
||
FBB000
|
heap
|
page read and write
|
||
354F000
|
stack
|
page read and write
|
||
56FB000
|
trusted library allocation
|
page read and write
|
||
FA6000
|
heap
|
page read and write
|
||
56A1000
|
trusted library allocation
|
page read and write
|
||
46E1000
|
heap
|
page read and write
|
||
5704000
|
trusted library allocation
|
page read and write
|
||
5726000
|
trusted library allocation
|
page read and write
|
||
8090000
|
direct allocation
|
page read and write
|
||
5DEE000
|
trusted library allocation
|
page read and write
|
||
8CB000
|
stack
|
page read and write
|
||
5D2B000
|
trusted library allocation
|
page read and write
|
||
FBB000
|
heap
|
page read and write
|
||
56A9000
|
trusted library allocation
|
page read and write
|
||
6476000
|
trusted library allocation
|
page execute and read and write
|
||
5C4F000
|
trusted library allocation
|
page read and write
|
||
56CB000
|
trusted library allocation
|
page read and write
|
||
3A8E000
|
stack
|
page read and write
|
||
6096000
|
trusted library allocation
|
page read and write
|
||
5E38000
|
trusted library allocation
|
page read and write
|
||
56CB000
|
trusted library allocation
|
page read and write
|
||
532F000
|
stack
|
page read and write
|
||
57AE000
|
trusted library allocation
|
page read and write
|
||
652000
|
unkown
|
page execute and read and write
|
||
572D000
|
trusted library allocation
|
page read and write
|
||
430F000
|
stack
|
page read and write
|
||
56AE000
|
trusted library allocation
|
page read and write
|
||
5C43000
|
trusted library allocation
|
page read and write
|
||
56CB000
|
trusted library allocation
|
page read and write
|
||
FBB000
|
heap
|
page read and write
|
||
5D4E000
|
trusted library allocation
|
page read and write
|
||
5724000
|
trusted library allocation
|
page read and write
|
||
358E000
|
stack
|
page read and write
|
||
5D16000
|
trusted library allocation
|
page read and write
|
||
56F6000
|
trusted library allocation
|
page read and write
|
||
5D18000
|
trusted library allocation
|
page read and write
|
||
56DE000
|
trusted library allocation
|
page read and write
|
||
330E000
|
stack
|
page read and write
|
||
3CCF000
|
stack
|
page read and write
|
||
F76000
|
heap
|
page read and write
|
||
6EFF000
|
stack
|
page read and write
|
||
FBA000
|
heap
|
page read and write
|
||
F81000
|
heap
|
page read and write
|
||
5E41000
|
trusted library allocation
|
page read and write
|
||
5D00000
|
trusted library allocation
|
page read and write
|
||
56F4000
|
trusted library allocation
|
page read and write
|
||
5C4C000
|
trusted library allocation
|
page read and write
|
||
5D97000
|
trusted library allocation
|
page read and write
|
||
56C1000
|
trusted library allocation
|
page read and write
|
||
56E8000
|
trusted library allocation
|
page read and write
|
||
8090000
|
direct allocation
|
page read and write
|
||
56ED000
|
trusted library allocation
|
page read and write
|
||
56E4000
|
trusted library allocation
|
page read and write
|
||
573E000
|
trusted library allocation
|
page read and write
|
||
FA7000
|
heap
|
page read and write
|
||
56ED000
|
trusted library allocation
|
page read and write
|
||
3E5000
|
unkown
|
page execute and read and write
|
||
5C46000
|
trusted library allocation
|
page read and write
|
||
5C48000
|
trusted library allocation
|
page read and write
|
||
5C4B000
|
trusted library allocation
|
page read and write
|
||
56A8000
|
trusted library allocation
|
page read and write
|
||
FA9000
|
heap
|
page read and write
|
||
5D36000
|
trusted library allocation
|
page read and write
|
||
5E3F000
|
stack
|
page read and write
|
||
61C2000
|
trusted library allocation
|
page execute and read and write
|
||
5733000
|
trusted library allocation
|
page read and write
|
||
56A9000
|
trusted library allocation
|
page read and write
|
||
5D5B000
|
trusted library allocation
|
page read and write
|
||
FBA000
|
heap
|
page read and write
|
||
56C1000
|
trusted library allocation
|
page read and write
|
||
5C44000
|
trusted library allocation
|
page read and write
|
||
5CF8000
|
trusted library allocation
|
page read and write
|
||
FA9000
|
heap
|
page read and write
|
||
56B5000
|
trusted library allocation
|
page read and write
|
||
5733000
|
trusted library allocation
|
page read and write
|
||
56E4000
|
trusted library allocation
|
page read and write
|
||
5724000
|
trusted library allocation
|
page read and write
|
||
571C000
|
trusted library allocation
|
page read and write
|
||
5CFF000
|
trusted library allocation
|
page read and write
|
||
57AD000
|
trusted library allocation
|
page read and write
|
||
56F0000
|
trusted library allocation
|
page read and write
|
||
7E3E000
|
stack
|
page read and write
|
||
F99000
|
heap
|
page read and write
|
||
5D72000
|
trusted library allocation
|
page read and write
|
||
77FE000
|
stack
|
page read and write
|
||
F22000
|
heap
|
page read and write
|
||
56CF000
|
trusted library allocation
|
page read and write
|
||
890E000
|
stack
|
page read and write
|
||
5C46000
|
trusted library allocation
|
page read and write
|
||
5C42000
|
trusted library allocation
|
page read and write
|
||
5C45000
|
trusted library allocation
|
page read and write
|
||
56CB000
|
trusted library allocation
|
page read and write
|
||
5CE3000
|
trusted library allocation
|
page read and write
|
||
56CC000
|
trusted library allocation
|
page read and write
|
||
51C0000
|
remote allocation
|
page read and write
|
||
56ED000
|
trusted library allocation
|
page read and write
|
||
5593000
|
heap
|
page read and write
|
||
F99000
|
heap
|
page read and write
|
||
56B4000
|
trusted library allocation
|
page read and write
|
||
5D0F000
|
trusted library allocation
|
page read and write
|
||
4E2C000
|
stack
|
page read and write
|
||
3E3000
|
unkown
|
page write copy
|
||
572D000
|
trusted library allocation
|
page read and write
|
||
FBB000
|
heap
|
page read and write
|
||
5D0C000
|
trusted library allocation
|
page read and write
|
||
2A0F000
|
stack
|
page read and write
|
||
61B9000
|
trusted library allocation
|
page read and write
|
||
5A42000
|
trusted library allocation
|
page read and write
|
||
F96000
|
heap
|
page read and write
|
||
FB9000
|
heap
|
page read and write
|
||
56B8000
|
trusted library allocation
|
page read and write
|
||
9CAF000
|
stack
|
page read and write
|
||
FA9000
|
heap
|
page read and write
|
||
56B2000
|
trusted library allocation
|
page read and write
|
||
5C4F000
|
trusted library allocation
|
page read and write
|
||
56AA000
|
trusted library allocation
|
page read and write
|
||
EB0000
|
heap
|
page read and write
|
||
575D000
|
trusted library allocation
|
page read and write
|
||
5C48000
|
trusted library allocation
|
page read and write
|
||
F92000
|
heap
|
page read and write
|
||
318F000
|
stack
|
page read and write
|
||
3BCE000
|
stack
|
page read and write
|
||
5719000
|
trusted library allocation
|
page read and write
|
||
F95000
|
heap
|
page read and write
|
||
FA1000
|
heap
|
page read and write
|
||
56AF000
|
trusted library allocation
|
page read and write
|
||
5757000
|
trusted library allocation
|
page read and write
|
||
56AC000
|
trusted library allocation
|
page read and write
|
||
2F4E000
|
stack
|
page read and write
|
||
56A0000
|
trusted library allocation
|
page read and write
|
||
5718000
|
trusted library allocation
|
page read and write
|
||
56DC000
|
trusted library allocation
|
page read and write
|
||
54DE000
|
stack
|
page read and write
|
||
FA4000
|
heap
|
page read and write
|
||
390000
|
unkown
|
page readonly
|
||
77BF000
|
stack
|
page read and write
|
||
F9A000
|
heap
|
page read and write
|
||
56AC000
|
trusted library allocation
|
page read and write
|
||
408F000
|
stack
|
page read and write
|
||
5706000
|
trusted library allocation
|
page read and write
|
||
5D12000
|
trusted library allocation
|
page read and write
|
||
6B7E000
|
stack
|
page read and write
|
||
5E36000
|
trusted library allocation
|
page read and write
|
||
5C42000
|
trusted library allocation
|
page read and write
|
||
45CE000
|
stack
|
page read and write
|
||
F99000
|
heap
|
page read and write
|
||
2C8F000
|
stack
|
page read and write
|
||
8090000
|
direct allocation
|
page read and write
|
||
56F6000
|
trusted library allocation
|
page read and write
|
||
5C45000
|
trusted library allocation
|
page read and write
|
||
56B4000
|
trusted library allocation
|
page read and write
|
||
56BA000
|
trusted library allocation
|
page read and write
|
||
5D42000
|
trusted library allocation
|
page read and write
|
||
68E000
|
unkown
|
page execute and write copy
|
||
46D0000
|
direct allocation
|
page read and write
|
||
2F0F000
|
stack
|
page read and write
|
||
5C43000
|
trusted library allocation
|
page read and write
|
||
5E89000
|
trusted library allocation
|
page read and write
|
||
546E000
|
stack
|
page read and write
|
||
4B70000
|
direct allocation
|
page read and write
|
||
56F9000
|
trusted library allocation
|
page read and write
|
||
FBB000
|
heap
|
page read and write
|
||
56B7000
|
trusted library allocation
|
page read and write
|
||
444F000
|
stack
|
page read and write
|
||
5D08000
|
trusted library allocation
|
page read and write
|
||
56ED000
|
trusted library allocation
|
page read and write
|
||
57C6000
|
trusted library allocation
|
page read and write
|
||
FA1000
|
heap
|
page read and write
|
||
826F000
|
stack
|
page read and write
|
||
5C47000
|
trusted library allocation
|
page read and write
|
||
82E000
|
unkown
|
page execute and read and write
|
||
56B7000
|
trusted library allocation
|
page read and write
|
||
5C45000
|
trusted library allocation
|
page read and write
|
||
FBC000
|
heap
|
page read and write
|
||
56BA000
|
trusted library allocation
|
page read and write
|
||
458F000
|
stack
|
page read and write
|
||
46E1000
|
heap
|
page read and write
|
||
57A2000
|
trusted library allocation
|
page read and write
|
||
5C4F000
|
trusted library allocation
|
page read and write
|
||
5D2F000
|
trusted library allocation
|
page read and write
|
||
5D22000
|
trusted library allocation
|
page read and write
|
||
5A3F000
|
stack
|
page read and write
|
||
5D11000
|
trusted library allocation
|
page read and write
|
||
46D0000
|
direct allocation
|
page read and write
|
||
5D58000
|
trusted library allocation
|
page read and write
|
||
5C40000
|
trusted library allocation
|
page read and write
|
||
56A9000
|
trusted library allocation
|
page read and write
|
||
5E1B000
|
trusted library allocation
|
page read and write
|
||
5733000
|
trusted library allocation
|
page read and write
|
||
FA7000
|
heap
|
page read and write
|
||
5C40000
|
trusted library allocation
|
page read and write
|
||
290E000
|
stack
|
page read and write
|
||
FB6000
|
heap
|
page read and write
|
||
80F0000
|
direct allocation
|
page read and write
|
There are 836 hidden memdumps, click here to show them.
DOM / HTML
URL
|
Malicious
|
|
---|---|---|
https://learn.microsoft.com/en-us/dotnet/framework/install/application-not-started?version=(null)&processName=file.exe&platform=0009&osver=6&isServer=0&shimver=4.0.30319.0
|
||
https://learn.microsoft.com/en-us/dotnet/framework/install/application-not-started?version=(null)&processName=file.exe&platform=0009&osver=6&isServer=0&shimver=4.0.30319.0
|
||
https://learn.microsoft.com/en-us/dotnet/framework/install/application-not-started?version=(null)&processName=file.exe&platform=0009&osver=6&isServer=0&shimver=4.0.30319.0
|
||
https://learn.microsoft.com/en-us/dotnet/framework/install/application-not-started?version=(null)&processName=file.exe&platform=0009&osver=6&isServer=0&shimver=4.0.30319.0
|
||
https://learn.microsoft.com/en-us/dotnet/framework/install/application-not-started?version=(null)&processName=file.exe&platform=0009&osver=6&isServer=0&shimver=4.0.30319.0
|