IOC Report
0zBsv1tnt4.exe

loading gif

Files

File Path
Type
Category
Malicious
0zBsv1tnt4.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Docs.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Thu Dec 26 12:15:02 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Gmail.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Thu Dec 26 12:15:02 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Google Drive.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Thu Oct 5 07:00:51 2023, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Sheets.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Thu Dec 26 12:15:02 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Slides.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Thu Dec 26 12:15:02 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\YouTube.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Thu Dec 26 12:15:01 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
dropped
Chrome Cache Entry: 100
exported SGML document, ASCII text, with very long lines (65536), with no line terminators
downloaded
Chrome Cache Entry: 101
ASCII text, with very long lines (46884)
dropped
Chrome Cache Entry: 102
PNG image data, 533 x 478, 8-bit/color RGBA, non-interlaced
downloaded
Chrome Cache Entry: 103
MS Windows icon resource - 6 icons, -128x-128, 16 colors, 72x72, 16 colors
downloaded
Chrome Cache Entry: 104
JSON data
dropped
Chrome Cache Entry: 105
MS Windows icon resource - 6 icons, -128x-128, 16 colors, 72x72, 16 colors
dropped
Chrome Cache Entry: 106
PNG image data, 658 x 480, 8-bit/color RGBA, non-interlaced
downloaded
Chrome Cache Entry: 107
ASCII text, with very long lines (33273), with no line terminators
dropped
Chrome Cache Entry: 108
JSON data
downloaded
Chrome Cache Entry: 109
Web Open Font Format (Version 2), TrueType, length 19696, version 1.0
downloaded
Chrome Cache Entry: 110
JPEG image data, JFIF standard 1.01, aspect ratio, density 1x1, segment length 16, baseline, precision 8, 1528x402, components 3
dropped
Chrome Cache Entry: 111
PNG image data, 475 x 212, 8-bit/color RGBA, non-interlaced
downloaded
Chrome Cache Entry: 112
HTML document, ASCII text, with very long lines (639), with CRLF, LF line terminators
downloaded
Chrome Cache Entry: 113
JSON data
downloaded
Chrome Cache Entry: 114
JPEG image data, JFIF standard 1.01, aspect ratio, density 1x1, segment length 16, baseline, precision 8, 1528x402, components 3
downloaded
Chrome Cache Entry: 115
exported SGML document, ASCII text, with very long lines (65536), with no line terminators
dropped
Chrome Cache Entry: 116
SVG Scalable Vector Graphics image
downloaded
Chrome Cache Entry: 117
ASCII text, with very long lines (33273), with no line terminators
downloaded
Chrome Cache Entry: 118
PNG image data, 475 x 212, 8-bit/color RGBA, non-interlaced
dropped
Chrome Cache Entry: 119
PNG image data, 658 x 480, 8-bit/color RGBA, non-interlaced
dropped
Chrome Cache Entry: 120
JSON data
dropped
Chrome Cache Entry: 121
ASCII text, with very long lines (46884)
downloaded
Chrome Cache Entry: 122
JSON data
downloaded
Chrome Cache Entry: 123
PNG image data, 533 x 478, 8-bit/color RGBA, non-interlaced
dropped
Chrome Cache Entry: 85
PNG image data, 533 x 478, 8-bit/color RGBA, non-interlaced
dropped
Chrome Cache Entry: 86
ASCII text
dropped
Chrome Cache Entry: 87
PNG image data, 533 x 478, 8-bit/color RGBA, non-interlaced
downloaded
Chrome Cache Entry: 88
SVG Scalable Vector Graphics image
dropped
Chrome Cache Entry: 89
JSON data
dropped
Chrome Cache Entry: 90
PNG image data, 533 x 478, 8-bit/color RGBA, non-interlaced
dropped
Chrome Cache Entry: 91
ASCII text, with no line terminators
downloaded
Chrome Cache Entry: 92
JSON data
dropped
Chrome Cache Entry: 93
ASCII text, with very long lines (65410)
downloaded
Chrome Cache Entry: 94
JSON data
downloaded
Chrome Cache Entry: 95
PNG image data, 533 x 478, 8-bit/color RGBA, non-interlaced
downloaded
Chrome Cache Entry: 96
ASCII text
downloaded
Chrome Cache Entry: 97
ASCII text, with very long lines (65536), with no line terminators
downloaded
Chrome Cache Entry: 98
ASCII text, with very long lines (52717), with no line terminators
dropped
Chrome Cache Entry: 99
ASCII text, with very long lines (52717), with no line terminators
downloaded
There are 36 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\0zBsv1tnt4.exe
"C:\Users\user\Desktop\0zBsv1tnt4.exe"
malicious
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized --single-argument http://go.microsoft.com/fwlink/?prd=11324&pver=4.5&sbp=AppLaunch2&plcid=0x409&o1=SHIM_NOVERSION_FOUND&version=(null)&processName=0zBsv1tnt4.exe&platform=0009&osver=6&isServer=0&shimver=4.0.30319.0
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2116 --field-trial-handle=2040,i,2396547000121627558,15890828269926953277,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized --single-argument http://go.microsoft.com/fwlink/?prd=11324&pver=4.5&sbp=AppLaunch2&plcid=0x409&o1=SHIM_NOVERSION_FOUND&version=(null)&processName=0zBsv1tnt4.exe&platform=0009&osver=6&isServer=0&shimver=4.0.30319.0
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2092 --field-trial-handle=1896,i,7583423197592999893,9247064027029795197,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8

URLs

Name
IP
Malicious
https://authoring-docs-microsoft.poolparty.biz/devrel/7696cda6-0510-47f6-8302-71bb5d2e28cf
unknown
https://duckduckgo.com/chrome_newtab
unknown
https://duckduckgo.com/ac/?q=
unknown
scentniej.buzz
http://crl.microsoft2_
unknown
https://github.com/dotnet/docs/blob/17c4acca45e573a92878a44a2cce57d699fe9c7c/docs/framework/install/
unknown
https://www.linkedin.com/cws/share?url=$
unknown
http://185.215.113.16/O
unknown
https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
unknown
https://imp.mt48.net/static?id=7RHzfOIXjFEYsBdvIpkX4Qqm4pqX1CqX4pbW1pbWfpbZ7ReNxR3UIG8zInwYIFIVs9eYi
unknown
https://github.com/Youssef1313
unknown
https://management.azure.com/providers/Microsoft.Portal/userSettings/cloudconsole?api-version=2023-0
unknown
https://aka.ms/msignite_docs_banner
unknown
https://videoencodingpublic-hgeaeyeba8gycee3.b01.azurefd.net/public-b4da8140-92cf-421c-8b7b-e471d5b9
unknown
http://polymer.github.io/AUTHORS.txt
unknown
https://github.com/dotnet/docs/issues/new?template=z-customer-feedback.yml
unknown
https://mindhandru.buzz:443/api
unknown
https://management.azure.com/subscriptions?api-version=2016-06-01
unknown
https://github.com/dotnet/docs/blob/main/docs/framework/install/application-not-started.md
unknown
https://mindhandru.buzz/Cl
unknown
http://x1.c.lencr.org/0
unknown
http://x1.i.lencr.org/0
unknown
https://aka.ms/pshelpmechoose
unknown
https://aka.ms/feedback/report?space=61
unknown
http://185.215.113.16/off/def.exeGd
unknown
http://185.215.113.16/z
unknown
https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
unknown
hummskitnj.buzz
mindhandru.buzz
https://mindhandru.buzz/aB
unknown
https://mindhandru.buzz:443/api;WU
unknown
https://learn-video.azurefd.net/vod/player
unknown
https://twitter.com/intent/tweet?original_referer=$
unknown
https://github.com/gewarren
unknown
https://mindhandru.buzz/api
104.21.11.101
https://support.mozilla.org/products/firefoxgro.all
unknown
http://polymer.github.io/CONTRIBUTORS.txt
unknown
https://github.com/dotnet/docs/blob/live/docs/framework/install/application-not-started.md
unknown
https://mindhandru.buzz/DataA4
unknown
http://185.215.113.16/off/def.exeeWebKit/537.36
unknown
https://authoring-docs-microsoft.poolparty.biz/devrel/69c76c32-967e-4c65-b89a-74cc527db725
unknown
https://client-api.arkoselabs.com/v2/api.js
unknown
https://aka.ms/MSIgniteChallenge/Tier1Banner?wt.mc_id=ignite24_learnbanner_tier1_cnl
unknown
https://management.azure.com/providers/Microsoft.Portal/consoles/default?api-version=2017-12-01-prev
unknown
https://www.google.com/images/branding/product/ico/googleg_lodp.ico
unknown
https://github.com/Thraka
unknown
https://mindhandru.buzz/s
unknown
rebuildeso.buzz
https://mindhandru.buzz/==
unknown
http://polymer.github.io/PATENTS.txt
unknown
appliacnesot.buzz
https://aka.ms/certhelp
unknown
screwamusresz.buzz
https://mindhandru.buzz/
unknown
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
unknown
http://crl.rootca1.amazontrust.com/rootca1.crl0
unknown
cashfuzysao.buzz
https://github.com/mairaw
unknown
https://js.monitor.azure.com/scripts/c/ms.jsll-4.min.js
13.107.246.63
http://ocsp.rootca1.amazontrust.com0:
unknown
inherineau.buzz
https://schema.org
unknown
http://polymer.github.io/LICENSE.txt
unknown
http://185.215.113.16/off/def.exeSd
unknown
https://mindhandru.buzz/wK
unknown
https://www.ecosia.org/newtab/
unknown
https://support.mozilla.org/kb/customize-firefox-controls-buttons-and-toolbars?utm_source=firefox-br
unknown
https://mindhandru.buzz/d
unknown
https://aka.ms/yourcaliforniaprivacychoices
unknown
https://ac.ecosia.org/autocomplete?q=
unknown
https://github.com/nschonni
unknown
http://185.215.113.16/
unknown
https://videoencodingpublic-hgeaeyeba8gycee3.b01.azurefd.net/public-09ce73a6-05a5-4e4d-b3d7-bd5a8c05
unknown
https://github.com/adegeo
unknown
prisonyfork.buzz
https://github.com/jonschlinkert/is-plain-object
unknown
http://crt.rootca1.amazontrust.com/rootca1.cer0?
unknown
https://octokit.github.io/rest.js/#throttling
unknown
https://mindhandru.buzz:443/apiz
unknown
https://contile-images.services.mozilla.com/CuERQnIs4CzqjKBh9os6_h9d4CUDCHO3oiqmAQO6VLM.25122.jpg
unknown
https://github.com/js-cookie/js-cookie
unknown
http://185.215.113.16/off/def.exe
unknown
http://schema.org/Organization
unknown
https://mindhandru.buzz/P)
unknown
https://channel9.msdn.com/
unknown
https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
unknown
https://github.com/dotnet/try
unknown
https://mindhandru.buzz/tC
unknown
There are 78 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
www.google.com
142.250.181.68
s-part-0035.t-0009.t-msedge.net
13.107.246.63
mindhandru.buzz
104.21.11.101
js.monitor.azure.com
unknown
mdec.nelreports.net
unknown

IPs

IP
Domain
Country
Malicious
192.168.2.8
unknown
unknown
malicious
185.215.113.16
unknown
Portugal
239.255.255.250
unknown
Reserved
142.250.181.68
www.google.com
United States
104.21.11.101
mindhandru.buzz
United States

Memdumps

Base Address
Regiontype
Protect
Malicious
4FA0000
direct allocation
page read and write
malicious
5F89000
trusted library allocation
page read and write
5AEB000
trusted library allocation
page read and write
5AF5000
trusted library allocation
page read and write
5F93000
trusted library allocation
page read and write
5AEC000
trusted library allocation
page read and write
375E000
stack
page read and write
60D5000
trusted library allocation
page read and write
83C0000
direct allocation
page read and write
5B70000
trusted library allocation
page read and write
5AF1000
trusted library allocation
page read and write
5B66000
trusted library allocation
page read and write
1230000
direct allocation
page read and write
5B13000
trusted library allocation
page read and write
5F84000
trusted library allocation
page read and write
5DE6000
trusted library allocation
page read and write
5B13000
trusted library allocation
page read and write
C41000
unkown
page execute and write copy
2F97000
heap
page read and write
5F87000
trusted library allocation
page read and write
6138000
trusted library allocation
page read and write
67CE000
trusted library allocation
page execute and read and write
5F8D000
trusted library allocation
page read and write
83C0000
direct allocation
page read and write
5B13000
trusted library allocation
page read and write
5B03000
trusted library allocation
page read and write
61BE000
stack
page read and write
60AA000
trusted library allocation
page read and write
815E000
stack
page read and write
5B76000
trusted library allocation
page read and write
63DC000
trusted library allocation
page read and write
5F8F000
trusted library allocation
page read and write
5F90000
trusted library allocation
page read and write
5BF9000
trusted library allocation
page read and write
862F000
stack
page read and write
5AEC000
trusted library allocation
page read and write
602F000
trusted library allocation
page read and write
2F80000
direct allocation
page read and write
5B6B000
trusted library allocation
page read and write
6043000
trusted library allocation
page read and write
5E94000
trusted library allocation
page read and write
5F88000
trusted library allocation
page read and write
5DE5000
trusted library allocation
page read and write
5620000
remote allocation
page read and write
1462000
heap
page read and write
7D5F000
stack
page read and write
5BA0000
trusted library allocation
page read and write
5AE8000
trusted library allocation
page read and write
439F000
stack
page read and write
5B94000
trusted library allocation
page read and write
5AF1000
trusted library allocation
page read and write
60BD000
trusted library allocation
page read and write
60A4000
trusted library allocation
page read and write
5DED000
trusted library allocation
page read and write
60B5000
trusted library allocation
page read and write
5F89000
trusted library allocation
page read and write
5B62000
trusted library allocation
page read and write
711E000
stack
page read and write
5DEA000
trusted library allocation
page read and write
61E8000
trusted library allocation
page read and write
60CE000
trusted library allocation
page read and write
6087000
trusted library allocation
page read and write
61B8000
trusted library allocation
page read and write
67BF000
trusted library allocation
page execute and read and write
5F8E000
trusted library allocation
page read and write
83C0000
direct allocation
page read and write
5B90000
trusted library allocation
page read and write
5B02000
trusted library allocation
page read and write
5B19000
trusted library allocation
page read and write
B0D000
unkown
page execute and write copy
60F2000
trusted library allocation
page read and write
7D9E000
stack
page read and write
5AF5000
trusted library allocation
page read and write
995000
unkown
page execute and read and write
5BB0000
trusted library allocation
page read and write
5F86000
trusted library allocation
page read and write
6055000
trusted library allocation
page read and write
5BA7000
trusted library allocation
page read and write
5B03000
trusted library allocation
page read and write
5DEA000
trusted library allocation
page read and write
5C19000
trusted library allocation
page read and write
6069000
trusted library allocation
page read and write
14EE000
heap
page read and write
5B09000
trusted library allocation
page read and write
5F81000
trusted library allocation
page read and write
5F87000
trusted library allocation
page read and write
5F84000
trusted library allocation
page read and write
60C3000
trusted library allocation
page read and write
6062000
trusted library allocation
page read and write
49DF000
stack
page read and write
5F89000
trusted library allocation
page read and write
5B58000
trusted library allocation
page read and write
BC9000
unkown
page execute and read and write
602D000
trusted library allocation
page read and write
5BE4000
trusted library allocation
page read and write
539D000
stack
page read and write
8470000
trusted library allocation
page read and write
7EDE000
stack
page read and write
4B21000
heap
page read and write
5E44000
trusted library allocation
page read and write
5B01000
trusted library allocation
page read and write
603F000
trusted library allocation
page read and write
6247000
trusted library allocation
page read and write
371F000
stack
page read and write
5C8A000
trusted library allocation
page read and write
608F000
trusted library allocation
page read and write
5B03000
trusted library allocation
page read and write
5130000
direct allocation
page execute and read and write
2F80000
direct allocation
page read and write
5F94000
trusted library allocation
page read and write
1244000
heap
page read and write
5F82000
trusted library allocation
page read and write
84A0000
direct allocation
page execute and read and write
5B76000
trusted library allocation
page read and write
6032000
trusted library allocation
page read and write
5B6D000
trusted library allocation
page read and write
5B6A000
trusted library allocation
page read and write
1476000
heap
page read and write
605E000
trusted library allocation
page read and write
5F8B000
trusted library allocation
page read and write
9B0000
unkown
page execute and read and write
5AF1000
trusted library allocation
page read and write
83F0000
trusted library allocation
page read and write
C58000
unkown
page execute and read and write
5BAF000
trusted library allocation
page read and write
6055000
trusted library allocation
page read and write
5F88000
trusted library allocation
page read and write
951000
unkown
page execute and write copy
5BA7000
trusted library allocation
page read and write
5F82000
trusted library allocation
page read and write
5B0E000
trusted library allocation
page read and write
5F82000
trusted library allocation
page read and write
150C000
heap
page read and write
5B93000
trusted library allocation
page read and write
62EE000
trusted library allocation
page read and write
479E000
stack
page read and write
5F88000
trusted library allocation
page read and write
5B13000
trusted library allocation
page read and write
1230000
direct allocation
page read and write
5B13000
trusted library allocation
page read and write
5B13000
trusted library allocation
page read and write
83A0000
direct allocation
page read and write
5B88000
trusted library allocation
page read and write
5B09000
trusted library allocation
page read and write
6091000
trusted library allocation
page read and write
8470000
direct allocation
page execute and read and write
1501000
heap
page read and write
606F000
trusted library allocation
page read and write
60A1000
trusted library allocation
page read and write
61EA000
trusted library allocation
page read and write
57CD000
stack
page read and write
150E000
heap
page read and write
5B85000
trusted library allocation
page read and write
6034000
trusted library allocation
page read and write
5BF9000
trusted library allocation
page read and write
349F000
stack
page read and write
6F9F000
stack
page read and write
9AF000
unkown
page execute and write copy
6031000
trusted library allocation
page read and write
5B13000
trusted library allocation
page read and write
1501000
heap
page read and write
14E1000
heap
page read and write
465E000
stack
page read and write
5AE8000
trusted library allocation
page read and write
6510000
trusted library allocation
page read and write
1244000
heap
page read and write
5F91000
trusted library allocation
page read and write
5F89000
trusted library allocation
page read and write
5F8E000
trusted library allocation
page read and write
5BA0000
trusted library allocation
page read and write
60DB000
trusted library allocation
page read and write
609B000
trusted library allocation
page read and write
4B21000
heap
page read and write
5B0C000
trusted library allocation
page read and write
8C4E000
stack
page read and write
5110000
direct allocation
page execute and read and write
845C000
stack
page read and write
9B1000
unkown
page execute and write copy
4FDC000
stack
page read and write
605E000
trusted library allocation
page read and write
6060000
trusted library allocation
page read and write
5B13000
trusted library allocation
page read and write
7C5E000
stack
page read and write
61CA000
trusted library allocation
page read and write
60C9000
trusted library allocation
page read and write
6181000
trusted library allocation
page read and write
319F000
stack
page read and write
1244000
heap
page read and write
5EC4000
trusted library allocation
page read and write
4F60000
heap
page read and write
5B23000
trusted library allocation
page read and write
5E24000
trusted library allocation
page read and write
5F85000
trusted library allocation
page read and write
1244000
heap
page read and write
5B33000
trusted library allocation
page read and write
C48000
unkown
page execute and write copy
5DE6000
trusted library allocation
page read and write
69DF000
stack
page read and write
60D4000
trusted library allocation
page read and write
5B6A000
trusted library allocation
page read and write
5F8E000
trusted library allocation
page read and write
5620000
remote allocation
page read and write
5F86000
trusted library allocation
page read and write
475F000
stack
page read and write
60C5000
trusted library allocation
page read and write
68DF000
stack
page read and write
7FDF000
stack
page read and write
6025000
trusted library allocation
page read and write
5B37000
trusted library allocation
page read and write
385F000
stack
page read and write
5B09000
trusted library allocation
page read and write
5B7E000
trusted library allocation
page read and write
739E000
stack
page read and write
61EE000
trusted library allocation
page read and write
5F82000
trusted library allocation
page read and write
B31000
unkown
page execute and write copy
1230000
direct allocation
page read and write
5B09000
trusted library allocation
page read and write
1230000
direct allocation
page read and write
5AF1000
trusted library allocation
page read and write
6068000
trusted library allocation
page read and write
609C000
trusted library allocation
page read and write
5B18000
trusted library allocation
page read and write
150B000
heap
page read and write
83C0000
direct allocation
page read and write
61B1000
trusted library allocation
page read and write
60E1000
trusted library allocation
page read and write
6083000
trusted library allocation
page read and write
5F8F000
trusted library allocation
page read and write
14E6000
heap
page read and write
5F8C000
trusted library allocation
page read and write
5F93000
trusted library allocation
page read and write
5DF0000
trusted library allocation
page read and write
1230000
direct allocation
page read and write
6097000
trusted library allocation
page read and write
2EAF000
stack
page read and write
5AE4000
trusted library allocation
page read and write
5AEE000
trusted library allocation
page read and write
1240000
heap
page read and write
5B13000
trusted library allocation
page read and write
6079000
stack
page read and write
5BA7000
trusted library allocation
page read and write
5B90000
trusted library allocation
page read and write
48DE000
stack
page read and write
5BB0000
trusted library allocation
page read and write
5F83000
trusted library allocation
page read and write
5D1A000
trusted library allocation
page read and write
5F86000
trusted library allocation
page read and write
950000
unkown
page read and write
6C1E000
stack
page read and write
4B21000
heap
page read and write
5F8A000
trusted library allocation
page read and write
309F000
stack
page read and write
83C0000
direct allocation
page read and write
451E000
stack
page read and write
5AD0000
heap
page read and write
7ADF000
stack
page read and write
B29000
unkown
page execute and write copy
5AF6000
trusted library allocation
page read and write
5F87000
trusted library allocation
page read and write
5F8A000
trusted library allocation
page read and write
1244000
heap
page read and write
5F8F000
trusted library allocation
page read and write
725E000
stack
page read and write
6064000
trusted library allocation
page read and write
BCE000
unkown
page execute and write copy
611D000
trusted library allocation
page read and write
389E000
stack
page read and write
606B000
trusted library allocation
page read and write
5B13000
trusted library allocation
page read and write
735F000
stack
page read and write
6221000
trusted library allocation
page read and write
601E000
trusted library allocation
page read and write
3ADF000
stack
page read and write
9A5000
unkown
page execute and write copy
BFC000
unkown
page execute and write copy
BB7000
unkown
page execute and read and write
5B96000
trusted library allocation
page read and write
568E000
stack
page read and write
B2A000
unkown
page execute and read and write
5AF1000
trusted library allocation
page read and write
5BA8000
trusted library allocation
page read and write
9EF0000
trusted library allocation
page read and write
5DE4000
trusted library allocation
page read and write
9A5000
unkown
page execute and read and write
5EBC000
trusted library allocation
page read and write
1501000
heap
page read and write
150B000
heap
page read and write
83C0000
direct allocation
page read and write
6245000
trusted library allocation
page read and write
5BE1000
trusted library allocation
page read and write
B99000
unkown
page execute and write copy
511D000
stack
page read and write
60D5000
trusted library allocation
page read and write
3D9E000
stack
page read and write
5C19000
trusted library allocation
page read and write
83C0000
direct allocation
page read and write
5B13000
trusted library allocation
page read and write
5B03000
trusted library allocation
page read and write
5B9B000
trusted library allocation
page read and write
B8E000
unkown
page execute and write copy
561F000
stack
page read and write
5F84000
trusted library allocation
page read and write
5F89000
trusted library allocation
page read and write
5F84000
trusted library allocation
page read and write
529D000
stack
page read and write
5BA0000
trusted library allocation
page read and write
5B00000
trusted library allocation
page read and write
150C000
heap
page read and write
1447000
heap
page read and write
5B08000
trusted library allocation
page read and write
1230000
direct allocation
page read and write
1501000
heap
page read and write
5B63000
trusted library allocation
page read and write
6123000
trusted library allocation
page read and write
6038000
trusted library allocation
page read and write
5F8F000
trusted library allocation
page read and write
5B95000
trusted library allocation
page read and write
5AED000
trusted library allocation
page read and write
4B21000
heap
page read and write
3FDF000
stack
page read and write
618E000
trusted library allocation
page read and write
5F8D000
trusted library allocation
page read and write
4B32000
heap
page read and write
8B0B000
stack
page read and write
608D000
trusted library allocation
page read and write
8C0C000
stack
page read and write
5B13000
trusted library allocation
page read and write
5B13000
trusted library allocation
page read and write
5B06000
trusted library allocation
page read and write
6E9E000
stack
page read and write
3E9F000
stack
page read and write
6043000
trusted library allocation
page read and write
6188000
trusted library allocation
page read and write
5B67000
trusted library allocation
page read and write
1230000
direct allocation
page read and write
60DF000
trusted library allocation
page read and write
5B05000
trusted library allocation
page read and write
5BE6000
trusted library allocation
page read and write
14E5000
heap
page read and write
60A2000
trusted library allocation
page read and write
5F8D000
trusted library allocation
page read and write
608D000
trusted library allocation
page read and write
138E000
stack
page read and write
5B94000
trusted library allocation
page read and write
5F89000
trusted library allocation
page read and write
61F5000
trusted library allocation
page read and write
1244000
heap
page read and write
145D000
heap
page read and write
5F8D000
trusted library allocation
page read and write
5B6A000
trusted library allocation
page read and write
5B13000
trusted library allocation
page read and write
5AE0000
trusted library allocation
page read and write
60B8000
trusted library allocation
page read and write
14E5000
heap
page read and write
60B9000
trusted library allocation
page read and write
5AE9000
trusted library allocation
page read and write
5AF8000
trusted library allocation
page read and write
150B000
heap
page read and write
5B23000
trusted library allocation
page read and write
67FE000
trusted library allocation
page read and write
83C0000
direct allocation
page read and write
5B6F000
trusted library allocation
page read and write
BD6000
unkown
page execute and read and write
5F82000
trusted library allocation
page read and write
489F000
stack
page read and write
5439000
trusted library allocation
page read and write
5C09000
trusted library allocation
page read and write
6045000
trusted library allocation
page read and write
1489000
heap
page read and write
6033000
trusted library allocation
page read and write
6093000
trusted library allocation
page read and write
4B21000
heap
page read and write
54DF000
stack
page read and write
5AEE000
trusted library allocation
page read and write
64FF000
trusted library allocation
page read and write
5AF1000
trusted library allocation
page read and write
83C0000
direct allocation
page read and write
1486000
heap
page read and write
14DB000
heap
page read and write
5F85000
trusted library allocation
page read and write
6051000
trusted library allocation
page read and write
1462000
heap
page read and write
609E000
trusted library allocation
page read and write
617B000
trusted library allocation
page read and write
5BA9000
trusted library allocation
page read and write
361E000
stack
page read and write
5DEC000
trusted library allocation
page read and write
61FE000
stack
page read and write
829E000
stack
page read and write
5F84000
trusted library allocation
page read and write
613E000
trusted library allocation
page read and write
5B13000
trusted library allocation
page read and write
6085000
trusted library allocation
page read and write
4B21000
heap
page read and write
10FA000
stack
page read and write
75DF000
stack
page read and write
5BE0000
trusted library allocation
page read and write
4B21000
heap
page read and write
6085000
trusted library allocation
page read and write
5110000
direct allocation
page execute and read and write
5B77000
trusted library allocation
page read and write
6059000
trusted library allocation
page read and write
5B21000
trusted library allocation
page read and write
5F83000
trusted library allocation
page read and write
5F85000
trusted library allocation
page read and write
5B5E000
trusted library allocation
page read and write
C43000
unkown
page execute and write copy
60B2000
trusted library allocation
page read and write
BBD000
unkown
page execute and read and write
5BA8000
trusted library allocation
page read and write
5B13000
trusted library allocation
page read and write
5B54000
trusted library allocation
page read and write
5B6C000
trusted library allocation
page read and write
7E9F000
stack
page read and write
401E000
stack
page read and write
2F2E000
stack
page read and write
4FE4000
direct allocation
page read and write
5B13000
trusted library allocation
page read and write
BFD000
unkown
page execute and read and write
5B90000
trusted library allocation
page read and write
5C19000
trusted library allocation
page read and write
5B5C000
trusted library allocation
page read and write
5B06000
trusted library allocation
page read and write
605C000
trusted library allocation
page read and write
1486000
heap
page read and write
5B96000
trusted library allocation
page read and write
83C0000
direct allocation
page read and write
5BE1000
trusted library allocation
page read and write
5B37000
trusted library allocation
page read and write
1244000
heap
page read and write
60C7000
trusted library allocation
page read and write
4B21000
heap
page read and write
5B39000
trusted library allocation
page read and write
14E2000
heap
page read and write
888F000
stack
page read and write
5BB1000
trusted library allocation
page read and write
61EF000
trusted library allocation
page read and write
5B09000
trusted library allocation
page read and write
1244000
heap
page read and write
5BA6000
trusted library allocation
page read and write
5B70000
trusted library allocation
page read and write
5AAA000
stack
page read and write
5BF9000
trusted library allocation
page read and write
5150000
direct allocation
page execute and read and write
150B000
heap
page read and write
604C000
trusted library allocation
page read and write
5B82000
trusted library allocation
page read and write
5B61000
trusted library allocation
page read and write
60E5000
trusted library allocation
page read and write
2F6E000
stack
page read and write
5B13000
trusted library allocation
page read and write
5B62000
trusted library allocation
page read and write
5B13000
trusted library allocation
page read and write
5B13000
trusted library allocation
page read and write
83C0000
trusted library allocation
page read and write
5B78000
trusted library allocation
page read and write
5BE2000
trusted library allocation
page read and write
150C000
heap
page read and write
5B01000
trusted library allocation
page read and write
5F8F000
trusted library allocation
page read and write
5F88000
trusted library allocation
page read and write
150E000
heap
page read and write
5B70000
trusted library allocation
page read and write
79DE000
stack
page read and write
5140000
direct allocation
page execute and read and write
771F000
stack
page read and write
5F8C000
trusted library allocation
page read and write
5B69000
trusted library allocation
page read and write
B94000
unkown
page execute and write copy
5B62000
trusted library allocation
page read and write
5BB8000
trusted library allocation
page read and write
1459000
heap
page read and write
5DE9000
trusted library allocation
page read and write
875E000
stack
page read and write
5B4E000
trusted library allocation
page read and write
5B13000
trusted library allocation
page read and write
6048000
trusted library allocation
page read and write
5A3F000
stack
page read and write
60CE000
trusted library allocation
page read and write
5BE1000
trusted library allocation
page read and write
5B61000
trusted library allocation
page read and write
5AE9000
trusted library allocation
page read and write
5AF1000
trusted library allocation
page read and write
5BB6000
trusted library allocation
page read and write
83C0000
direct allocation
page read and write
1489000
heap
page read and write
145B000
heap
page read and write
5B6C000
trusted library allocation
page read and write
5F83000
trusted library allocation
page read and write
4B21000
heap
page read and write
5BE8000
trusted library allocation
page read and write
BCD000
unkown
page execute and read and write
5110000
direct allocation
page execute and read and write
5B6A000
trusted library allocation
page read and write
1230000
direct allocation
page read and write
6027000
trusted library allocation
page read and write
5BF9000
trusted library allocation
page read and write
5AE5000
trusted library allocation
page read and write
5AF9000
trusted library allocation
page read and write
5AD3000
heap
page read and write
5AF5000
trusted library allocation
page read and write
5B54000
trusted library allocation
page read and write
5BAB000
trusted library allocation
page read and write
14F0000
heap
page read and write
120E000
stack
page read and write
5B1F000
trusted library allocation
page read and write
5F90000
trusted library allocation
page read and write
1244000
heap
page read and write
5B13000
trusted library allocation
page read and write
1220000
heap
page read and write
B0A000
unkown
page execute and read and write
5BC0000
trusted library allocation
page read and write
6046000
trusted library allocation
page read and write
5AFC000
trusted library allocation
page read and write
5F93000
trusted library allocation
page read and write
5F8B000
trusted library allocation
page read and write
5B85000
trusted library allocation
page read and write
4B20000
heap
page read and write
4B21000
heap
page read and write
C41000
unkown
page execute and write copy
140E000
stack
page read and write
5B70000
trusted library allocation
page read and write
4B21000
heap
page read and write
621F000
trusted library allocation
page read and write
14E1000
heap
page read and write
5F83000
trusted library allocation
page read and write
5B04000
trusted library allocation
page read and write
5B13000
trusted library allocation
page read and write
5B6A000
trusted library allocation
page read and write
6089000
trusted library allocation
page read and write
6D1F000
stack
page read and write
5F8D000
trusted library allocation
page read and write
5B08000
trusted library allocation
page read and write
5BA7000
trusted library allocation
page read and write
5AF1000
trusted library allocation
page read and write
43DE000
stack
page read and write
5F8A000
trusted library allocation
page read and write
C38000
unkown
page execute and write copy
609B000
trusted library allocation
page read and write
5AF3000
trusted library allocation
page read and write
D80000
heap
page read and write
6091000
trusted library allocation
page read and write
6ADF000
stack
page read and write
5AF2000
trusted library allocation
page read and write
60EE000
trusted library allocation
page read and write
5B13000
trusted library allocation
page read and write
14FE000
heap
page read and write
C19000
unkown
page execute and read and write
BB8000
unkown
page execute and write copy
BB4000
unkown
page execute and write copy
5BEA000
trusted library allocation
page read and write
5AEF000
trusted library allocation
page read and write
5F87000
trusted library allocation
page read and write
14DA000
heap
page read and write
4B21000
heap
page read and write
2F90000
heap
page read and write
6225000
trusted library allocation
page read and write
3C5E000
stack
page read and write
429E000
stack
page read and write
775E000
stack
page read and write
141E000
heap
page read and write
5BA9000
trusted library allocation
page read and write
5F90000
trusted library allocation
page read and write
5F83000
trusted library allocation
page read and write
5F87000
trusted library allocation
page read and write
60D7000
trusted library allocation
page read and write
5B62000
trusted library allocation
page read and write
58CC000
stack
page read and write
5B11000
trusted library allocation
page read and write
951000
unkown
page execute and read and write
150D000
heap
page read and write
3D5F000
stack
page read and write
61AB000
trusted library allocation
page read and write
61F1000
trusted library allocation
page read and write
5F8B000
trusted library allocation
page read and write
604E000
trusted library allocation
page read and write
5B13000
trusted library allocation
page read and write
1486000
heap
page read and write
5B13000
trusted library allocation
page read and write
5F82000
trusted library allocation
page read and write
5BB4000
trusted library allocation
page read and write
1489000
heap
page read and write
5BE4000
trusted library allocation
page read and write
5B77000
trusted library allocation
page read and write
4B21000
heap
page read and write
608B000
trusted library allocation
page read and write
6020000
trusted library allocation
page read and write
1230000
direct allocation
page read and write
5BA0000
trusted library allocation
page read and write
5B13000
trusted library allocation
page read and write
799F000
stack
page read and write
5F8C000
trusted library allocation
page read and write
83C0000
direct allocation
page read and write
DEE000
stack
page read and write
801E000
stack
page read and write
60C3000
trusted library allocation
page read and write
1230000
direct allocation
page read and write
5B13000
trusted library allocation
page read and write
5BB8000
trusted library allocation
page read and write
5BE1000
trusted library allocation
page read and write
608B000
trusted library allocation
page read and write
5BE1000
trusted library allocation
page read and write
825F000
stack
page read and write
618C000
trusted library allocation
page read and write
5AF1000
trusted library allocation
page read and write
5B7F000
trusted library allocation
page read and write
13CB000
stack
page read and write
5BF9000
trusted library allocation
page read and write
C58000
unkown
page execute and write copy
5620000
remote allocation
page read and write
5C0A000
trusted library allocation
page read and write
5B6B000
trusted library allocation
page read and write
5B1B000
trusted library allocation
page read and write
6097000
trusted library allocation
page read and write
5BB6000
trusted library allocation
page read and write
5B82000
trusted library allocation
page read and write
5F8A000
trusted library allocation
page read and write
61AD000
trusted library allocation
page read and write
6163000
trusted library allocation
page read and write
5B6D000
trusted library allocation
page read and write
60EC000
trusted library allocation
page read and write
150D000
heap
page read and write
6054000
trusted library allocation
page read and write
5F86000
trusted library allocation
page read and write
7B1E000
stack
page read and write
5F8F000
trusted library allocation
page read and write
5F92000
trusted library allocation
page read and write
14E4000
heap
page read and write
5F80000
trusted library allocation
page read and write
5B01000
trusted library allocation
page read and write
60FD000
trusted library allocation
page read and write
5B08000
trusted library allocation
page read and write
147F000
heap
page read and write
5B04000
trusted library allocation
page read and write
461F000
stack
page read and write
5B13000
trusted library allocation
page read and write
60D3000
trusted library allocation
page read and write
5B94000
trusted library allocation
page read and write
5F8E000
trusted library allocation
page read and write
5F89000
trusted library allocation
page read and write
5B6C000
trusted library allocation
page read and write
6101000
trusted library allocation
page read and write
5F86000
trusted library allocation
page read and write
607E000
trusted library allocation
page read and write
1230000
direct allocation
page read and write
1244000
heap
page read and write
5B6F000
trusted library allocation
page read and write
5110000
direct allocation
page execute and read and write
5B13000
trusted library allocation
page read and write
5F8C000
trusted library allocation
page read and write
5AF2000
trusted library allocation
page read and write
5F8E000
trusted library allocation
page read and write
5B95000
trusted library allocation
page read and write
5B37000
trusted library allocation
page read and write
339F000
stack
page read and write
66AA000
trusted library allocation
page execute and read and write
50F0000
direct allocation
page execute and read and write
5F94000
trusted library allocation
page read and write
146E000
heap
page read and write
5B09000
trusted library allocation
page read and write
5BB1000
trusted library allocation
page read and write
61BC000
trusted library allocation
page read and write
525D000
stack
page read and write
6BDF000
stack
page read and write
150D000
heap
page read and write
611F000
trusted library allocation
page read and write
1244000
heap
page read and write
60CA000
trusted library allocation
page read and write
749F000
stack
page read and write
415E000
stack
page read and write
5B06000
trusted library allocation
page read and write
5B19000
trusted library allocation
page read and write
5F8D000
trusted library allocation
page read and write
B25000
unkown
page execute and read and write
5F8F000
trusted library allocation
page read and write
60DB000
trusted library allocation
page read and write
329F000
stack
page read and write
8420000
direct allocation
page read and write
5F88000
trusted library allocation
page read and write
B93000
unkown
page execute and read and write
5110000
direct allocation
page execute and read and write
14E1000
heap
page read and write
1410000
heap
page read and write
141A000
heap
page read and write
1244000
heap
page read and write
5AF1000
trusted library allocation
page read and write
411F000
stack
page read and write
5F93000
trusted library allocation
page read and write
35DF000
stack
page read and write
60CF000
trusted library allocation
page read and write
5F8A000
trusted library allocation
page read and write
BC5000
unkown
page execute and write copy
BCA000
unkown
page execute and write copy
5AF5000
trusted library allocation
page read and write
5B57000
trusted library allocation
page read and write
5B19000
trusted library allocation
page read and write
14FF000
heap
page read and write
6029000
trusted library allocation
page read and write
60B3000
trusted library allocation
page read and write
5AE4000
trusted library allocation
page read and write
6068000
trusted library allocation
page read and write
A7EE000
stack
page read and write
1244000
heap
page read and write
618A000
trusted library allocation
page read and write
5B13000
trusted library allocation
page read and write
5321000
trusted library allocation
page read and write
593E000
stack
page read and write
5F8B000
trusted library allocation
page read and write
5BE8000
trusted library allocation
page read and write
789E000
stack
page read and write
14E2000
heap
page read and write
5B13000
trusted library allocation
page read and write
5F8B000
trusted library allocation
page read and write
6066000
trusted library allocation
page read and write
5B88000
trusted library allocation
page read and write
5F84000
trusted library allocation
page read and write
5B19000
trusted library allocation
page read and write
5B39000
trusted library allocation
page read and write
6050000
trusted library allocation
page read and write
617D000
trusted library allocation
page read and write
5AF1000
trusted library allocation
page read and write
134E000
stack
page read and write
5F86000
trusted library allocation
page read and write
785F000
stack
page read and write
6190000
trusted library allocation
page read and write
6089000
trusted library allocation
page read and write
1501000
heap
page read and write
5B18000
trusted library allocation
page read and write
4B21000
heap
page read and write
4B21000
heap
page read and write
5AF5000
trusted library allocation
page read and write
6E5F000
stack
page read and write
B61000
unkown
page execute and write copy
4C20000
trusted library allocation
page read and write
6083000
trusted library allocation
page read and write
811F000
stack
page read and write
5E5C000
stack
page read and write
5F89000
trusted library allocation
page read and write
3C1F000
stack
page read and write
5F8A000
trusted library allocation
page read and write
B98000
unkown
page execute and read and write
5B13000
trusted library allocation
page read and write
14FF000
heap
page read and write
5B39000
trusted library allocation
page read and write
60C8000
trusted library allocation
page read and write
67D0000
trusted library allocation
page execute and read and write
613A000
trusted library allocation
page read and write
5BB5000
trusted library allocation
page read and write
5B88000
trusted library allocation
page read and write
5B6C000
trusted library allocation
page read and write
606C000
trusted library allocation
page read and write
5B13000
trusted library allocation
page read and write
4A1E000
stack
page read and write
4B21000
heap
page read and write
6084000
trusted library allocation
page read and write
61CE000
trusted library allocation
page read and write
5F90000
trusted library allocation
page read and write
604F000
trusted library allocation
page read and write
5F85000
trusted library allocation
page read and write
5B13000
trusted library allocation
page read and write
5AF8000
trusted library allocation
page read and write
542A000
trusted library allocation
page read and write
5F8D000
trusted library allocation
page read and write
5B6D000
trusted library allocation
page read and write
5BAF000
trusted library allocation
page read and write
399F000
stack
page read and write
B73000
unkown
page execute and read and write
5BE8000
trusted library allocation
page read and write
6089000
trusted library allocation
page read and write
D1B000
stack
page read and write
7C1F000
stack
page read and write
602F000
trusted library allocation
page read and write
B32000
unkown
page execute and read and write
6024000
trusted library allocation
page read and write
6FDE000
stack
page read and write
5B13000
trusted library allocation
page read and write
6035000
trusted library allocation
page read and write
5C07000
trusted library allocation
page read and write
44DF000
stack
page read and write
5F8F000
trusted library allocation
page read and write
603D000
trusted library allocation
page read and write
5F5C000
trusted library allocation
page read and write
14CD000
heap
page read and write
5F83000
trusted library allocation
page read and write
5C0F000
trusted library allocation
page read and write
60A6000
trusted library allocation
page read and write
5B4E000
trusted library allocation
page read and write
5B57000
trusted library allocation
page read and write
14E1000
heap
page read and write
B46000
unkown
page execute and write copy
4B21000
heap
page read and write
5B95000
trusted library allocation
page read and write
5C11000
trusted library allocation
page read and write
6062000
trusted library allocation
page read and write
6512000
trusted library allocation
page execute and read and write
5F85000
trusted library allocation
page read and write
5AE4000
trusted library allocation
page read and write
6062000
trusted library allocation
page read and write
5BE8000
trusted library allocation
page read and write
60D7000
trusted library allocation
page read and write
74DE000
stack
page read and write
5B13000
trusted library allocation
page read and write
B48000
unkown
page execute and read and write
50E0000
direct allocation
page execute and read and write
5AEB000
trusted library allocation
page read and write
5F8B000
trusted library allocation
page read and write
8520000
heap
page read and write
70DF000
stack
page read and write
950000
unkown
page readonly
5F8A000
trusted library allocation
page read and write
C48000
unkown
page execute and write copy
5F87000
trusted library allocation
page read and write
5F94000
trusted library allocation
page read and write
8420000
direct allocation
page read and write
6066000
trusted library allocation
page read and write
6053000
trusted library allocation
page read and write
5B13000
trusted library allocation
page read and write
5B94000
trusted library allocation
page read and write
60BB000
trusted library allocation
page read and write
5BAB000
trusted library allocation
page read and write
5AEB000
trusted library allocation
page read and write
5BA8000
trusted library allocation
page read and write
6049000
trusted library allocation
page read and write
60C1000
trusted library allocation
page read and write
B9D000
unkown
page execute and read and write
5ECC000
trusted library allocation
page read and write
61C8000
trusted library allocation
page read and write
8780000
heap
page read and write
5BB5000
trusted library allocation
page read and write
6516000
trusted library allocation
page read and write
651A000
trusted library allocation
page execute and read and write
5DF3000
trusted library allocation
page read and write
1501000
heap
page read and write
5C07000
trusted library allocation
page read and write
5BC0000
trusted library allocation
page read and write
6081000
trusted library allocation
page read and write
5B70000
trusted library allocation
page read and write
5B0B000
trusted library allocation
page read and write
60DB000
trusted library allocation
page read and write
3EDE000
stack
page read and write
160E000
stack
page read and write
5B72000
trusted library allocation
page read and write
6029000
trusted library allocation
page read and write
14FB000
heap
page read and write
60CD000
trusted library allocation
page read and write
60FB000
trusted library allocation
page read and write
5B6E000
trusted library allocation
page read and write
88D0000
trusted library allocation
page read and write
147F000
heap
page read and write
4B21000
heap
page read and write
516E000
trusted library allocation
page read and write
5B29000
trusted library allocation
page read and write
5E0C000
trusted library allocation
page read and write
5C0D000
trusted library allocation
page read and write
5F88000
trusted library allocation
page read and write
60D0000
trusted library allocation
page read and write
5AF7000
trusted library allocation
page read and write
60C1000
trusted library allocation
page read and write
60B4000
trusted library allocation
page read and write
5AF3000
trusted library allocation
page read and write
5B02000
trusted library allocation
page read and write
1244000
heap
page read and write
609D000
trusted library allocation
page read and write
6064000
trusted library allocation
page read and write
1230000
direct allocation
page read and write
5AF7000
trusted library allocation
page read and write
60D7000
trusted library allocation
page read and write
1244000
heap
page read and write
5C19000
trusted library allocation
page read and write
64F0000
trusted library allocation
page read and write
4B21000
heap
page read and write
C42000
unkown
page execute and read and write
5F8A000
trusted library allocation
page read and write
5110000
direct allocation
page execute and read and write
5B4E000
trusted library allocation
page read and write
761E000
stack
page read and write
5B13000
trusted library allocation
page read and write
5AE4000
trusted library allocation
page read and write
1244000
heap
page read and write
5B7F000
trusted library allocation
page read and write
5F8B000
trusted library allocation
page read and write
1230000
direct allocation
page read and write
39DE000
stack
page read and write
6095000
trusted library allocation
page read and write
1244000
heap
page read and write
5B6D000
trusted library allocation
page read and write
5F90000
trusted library allocation
page read and write
14F0000
heap
page read and write
5B58000
trusted library allocation
page read and write
721F000
stack
page read and write
5B62000
trusted library allocation
page read and write
50DF000
stack
page read and write
4B1F000
stack
page read and write
5447000
trusted library allocation
page read and write
5AF3000
trusted library allocation
page read and write
602D000
trusted library allocation
page read and write
2EEE000
stack
page read and write
5E7C000
trusted library allocation
page read and write
1244000
heap
page read and write
D70000
heap
page read and write
5100000
direct allocation
page execute and read and write
53DE000
stack
page read and write
5B08000
trusted library allocation
page read and write
623E000
stack
page read and write
607F000
trusted library allocation
page read and write
1244000
heap
page read and write
5F88000
trusted library allocation
page read and write
5F89000
trusted library allocation
page read and write
5B13000
trusted library allocation
page read and write
5B77000
trusted library allocation
page read and write
624B000
trusted library allocation
page read and write
615D000
trusted library allocation
page read and write
5BB2000
trusted library allocation
page read and write
5120000
direct allocation
page execute and read and write
5C11000
trusted library allocation
page read and write
5F81000
trusted library allocation
page read and write
5F8D000
trusted library allocation
page read and write
5F86000
trusted library allocation
page read and write
83C0000
direct allocation
page read and write
5B6D000
trusted library allocation
page read and write
5F85000
trusted library allocation
page read and write
5B13000
trusted library allocation
page read and write
5BA6000
trusted library allocation
page read and write
6085000
trusted library allocation
page read and write
839F000
stack
page read and write
5F80000
trusted library allocation
page read and write
5428000
trusted library allocation
page read and write
5F83000
trusted library allocation
page read and write
5F88000
trusted library allocation
page read and write
14E2000
heap
page read and write
3B1E000
stack
page read and write
6080000
trusted library allocation
page read and write
5F8E000
trusted library allocation
page read and write
5F84000
trusted library allocation
page read and write
5B13000
trusted library allocation
page read and write
578F000
stack
page read and write
5BB1000
trusted library allocation
page read and write
1244000
heap
page read and write
61B6000
trusted library allocation
page read and write
1462000
heap
page read and write
5F87000
trusted library allocation
page read and write
5F85000
trusted library allocation
page read and write
83C0000
direct allocation
page read and write
5F8C000
trusted library allocation
page read and write
5432000
trusted library allocation
page read and write
6023000
trusted library allocation
page read and write
5E1E000
stack
page read and write
5DE3000
trusted library allocation
page read and write
618A000
trusted library allocation
page read and write
88D2000
trusted library allocation
page read and write
5F84000
trusted library allocation
page read and write
147F000
heap
page read and write
1230000
direct allocation
page read and write
551E000
stack
page read and write
5F87000
trusted library allocation
page read and write
5B95000
trusted library allocation
page read and write
615F000
trusted library allocation
page read and write
5B77000
trusted library allocation
page read and write
5F8B000
trusted library allocation
page read and write
5F81000
trusted library allocation
page read and write
5B5D000
trusted library allocation
page read and write
5B6D000
trusted library allocation
page read and write
34DE000
stack
page read and write
5B13000
trusted library allocation
page read and write
617F000
stack
page read and write
5B57000
trusted library allocation
page read and write
425E000
stack
page read and write
88D9000
trusted library allocation
page read and write
5B0C000
trusted library allocation
page read and write
5F89000
trusted library allocation
page read and write
5B01000
trusted library allocation
page read and write
5B6A000
trusted library allocation
page read and write
6D5E000
stack
page read and write
60D5000
trusted library allocation
page read and write
5F86000
trusted library allocation
page read and write
5C07000
trusted library allocation
page read and write
6089000
trusted library allocation
page read and write
6060000
trusted library allocation
page read and write
1475000
heap
page read and write
There are 970 hidden memdumps, click here to show them.

DOM / HTML

URL
Malicious
https://learn.microsoft.com/en-us/dotnet/framework/install/application-not-started?version=(null)&processName=0zBsv1tnt4.exe&platform=0009&osver=6&isServer=0&shimver=4.0.30319.0
https://learn.microsoft.com/en-us/dotnet/framework/install/application-not-started?version=(null)&processName=0zBsv1tnt4.exe&platform=0009&osver=6&isServer=0&shimver=4.0.30319.0
https://learn.microsoft.com/en-us/dotnet/framework/install/application-not-started?version=(null)&processName=0zBsv1tnt4.exe&platform=0009&osver=6&isServer=0&shimver=4.0.30319.0
https://learn.microsoft.com/en-us/dotnet/framework/install/application-not-started?version=(null)&processName=0zBsv1tnt4.exe&platform=0009&osver=6&isServer=0&shimver=4.0.30319.0
https://learn.microsoft.com/en-us/dotnet/framework/install/application-not-started?version=(null)&processName=0zBsv1tnt4.exe&platform=0009&osver=6&isServer=0&shimver=4.0.30319.0