Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
0zBsv1tnt4.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
initial sample
|
||
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Docs.lnk
|
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command
line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Thu Dec 26 12:15:02 2024, atime=Wed Sep 27 04:28:28
2023, length=1210144, window=hide
|
dropped
|
||
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Gmail.lnk
|
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command
line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Thu Dec 26 12:15:02 2024, atime=Wed Sep 27 04:28:28
2023, length=1210144, window=hide
|
dropped
|
||
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Google Drive.lnk
|
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command
line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Thu Oct 5 07:00:51 2023, atime=Wed Sep 27 04:28:28
2023, length=1210144, window=hide
|
dropped
|
||
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Sheets.lnk
|
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command
line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Thu Dec 26 12:15:02 2024, atime=Wed Sep 27 04:28:28
2023, length=1210144, window=hide
|
dropped
|
||
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Slides.lnk
|
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command
line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Thu Dec 26 12:15:02 2024, atime=Wed Sep 27 04:28:28
2023, length=1210144, window=hide
|
dropped
|
||
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\YouTube.lnk
|
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command
line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Thu Dec 26 12:15:01 2024, atime=Wed Sep 27 04:28:28
2023, length=1210144, window=hide
|
dropped
|
||
Chrome Cache Entry: 100
|
exported SGML document, ASCII text, with very long lines (65536), with no line terminators
|
downloaded
|
||
Chrome Cache Entry: 101
|
ASCII text, with very long lines (46884)
|
dropped
|
||
Chrome Cache Entry: 102
|
PNG image data, 533 x 478, 8-bit/color RGBA, non-interlaced
|
downloaded
|
||
Chrome Cache Entry: 103
|
MS Windows icon resource - 6 icons, -128x-128, 16 colors, 72x72, 16 colors
|
downloaded
|
||
Chrome Cache Entry: 104
|
JSON data
|
dropped
|
||
Chrome Cache Entry: 105
|
MS Windows icon resource - 6 icons, -128x-128, 16 colors, 72x72, 16 colors
|
dropped
|
||
Chrome Cache Entry: 106
|
PNG image data, 658 x 480, 8-bit/color RGBA, non-interlaced
|
downloaded
|
||
Chrome Cache Entry: 107
|
ASCII text, with very long lines (33273), with no line terminators
|
dropped
|
||
Chrome Cache Entry: 108
|
JSON data
|
downloaded
|
||
Chrome Cache Entry: 109
|
Web Open Font Format (Version 2), TrueType, length 19696, version 1.0
|
downloaded
|
||
Chrome Cache Entry: 110
|
JPEG image data, JFIF standard 1.01, aspect ratio, density 1x1, segment length 16, baseline, precision 8, 1528x402, components
3
|
dropped
|
||
Chrome Cache Entry: 111
|
PNG image data, 475 x 212, 8-bit/color RGBA, non-interlaced
|
downloaded
|
||
Chrome Cache Entry: 112
|
HTML document, ASCII text, with very long lines (639), with CRLF, LF line terminators
|
downloaded
|
||
Chrome Cache Entry: 113
|
JSON data
|
downloaded
|
||
Chrome Cache Entry: 114
|
JPEG image data, JFIF standard 1.01, aspect ratio, density 1x1, segment length 16, baseline, precision 8, 1528x402, components
3
|
downloaded
|
||
Chrome Cache Entry: 115
|
exported SGML document, ASCII text, with very long lines (65536), with no line terminators
|
dropped
|
||
Chrome Cache Entry: 116
|
SVG Scalable Vector Graphics image
|
downloaded
|
||
Chrome Cache Entry: 117
|
ASCII text, with very long lines (33273), with no line terminators
|
downloaded
|
||
Chrome Cache Entry: 118
|
PNG image data, 475 x 212, 8-bit/color RGBA, non-interlaced
|
dropped
|
||
Chrome Cache Entry: 119
|
PNG image data, 658 x 480, 8-bit/color RGBA, non-interlaced
|
dropped
|
||
Chrome Cache Entry: 120
|
JSON data
|
dropped
|
||
Chrome Cache Entry: 121
|
ASCII text, with very long lines (46884)
|
downloaded
|
||
Chrome Cache Entry: 122
|
JSON data
|
downloaded
|
||
Chrome Cache Entry: 123
|
PNG image data, 533 x 478, 8-bit/color RGBA, non-interlaced
|
dropped
|
||
Chrome Cache Entry: 85
|
PNG image data, 533 x 478, 8-bit/color RGBA, non-interlaced
|
dropped
|
||
Chrome Cache Entry: 86
|
ASCII text
|
dropped
|
||
Chrome Cache Entry: 87
|
PNG image data, 533 x 478, 8-bit/color RGBA, non-interlaced
|
downloaded
|
||
Chrome Cache Entry: 88
|
SVG Scalable Vector Graphics image
|
dropped
|
||
Chrome Cache Entry: 89
|
JSON data
|
dropped
|
||
Chrome Cache Entry: 90
|
PNG image data, 533 x 478, 8-bit/color RGBA, non-interlaced
|
dropped
|
||
Chrome Cache Entry: 91
|
ASCII text, with no line terminators
|
downloaded
|
||
Chrome Cache Entry: 92
|
JSON data
|
dropped
|
||
Chrome Cache Entry: 93
|
ASCII text, with very long lines (65410)
|
downloaded
|
||
Chrome Cache Entry: 94
|
JSON data
|
downloaded
|
||
Chrome Cache Entry: 95
|
PNG image data, 533 x 478, 8-bit/color RGBA, non-interlaced
|
downloaded
|
||
Chrome Cache Entry: 96
|
ASCII text
|
downloaded
|
||
Chrome Cache Entry: 97
|
ASCII text, with very long lines (65536), with no line terminators
|
downloaded
|
||
Chrome Cache Entry: 98
|
ASCII text, with very long lines (52717), with no line terminators
|
dropped
|
||
Chrome Cache Entry: 99
|
ASCII text, with very long lines (52717), with no line terminators
|
downloaded
|
There are 36 hidden files, click here to show them.
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\0zBsv1tnt4.exe
|
"C:\Users\user\Desktop\0zBsv1tnt4.exe"
|
||
C:\Program Files\Google\Chrome\Application\chrome.exe
|
"C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized --single-argument http://go.microsoft.com/fwlink/?prd=11324&pver=4.5&sbp=AppLaunch2&plcid=0x409&o1=SHIM_NOVERSION_FOUND&version=(null)&processName=0zBsv1tnt4.exe&platform=0009&osver=6&isServer=0&shimver=4.0.30319.0
|
||
C:\Program Files\Google\Chrome\Application\chrome.exe
|
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US
--service-sandbox-type=none --mojo-platform-channel-handle=2116 --field-trial-handle=2040,i,2396547000121627558,15890828269926953277,262144
--disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction
/prefetch:8
|
||
C:\Program Files\Google\Chrome\Application\chrome.exe
|
"C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized --single-argument http://go.microsoft.com/fwlink/?prd=11324&pver=4.5&sbp=AppLaunch2&plcid=0x409&o1=SHIM_NOVERSION_FOUND&version=(null)&processName=0zBsv1tnt4.exe&platform=0009&osver=6&isServer=0&shimver=4.0.30319.0
|
||
C:\Program Files\Google\Chrome\Application\chrome.exe
|
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US
--service-sandbox-type=none --mojo-platform-channel-handle=2092 --field-trial-handle=1896,i,7583423197592999893,9247064027029795197,262144
--disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction
/prefetch:8
|
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
https://authoring-docs-microsoft.poolparty.biz/devrel/7696cda6-0510-47f6-8302-71bb5d2e28cf
|
unknown
|
||
https://duckduckgo.com/chrome_newtab
|
unknown
|
||
https://duckduckgo.com/ac/?q=
|
unknown
|
||
scentniej.buzz
|
|||
http://crl.microsoft2_
|
unknown
|
||
https://github.com/dotnet/docs/blob/17c4acca45e573a92878a44a2cce57d699fe9c7c/docs/framework/install/
|
unknown
|
||
https://www.linkedin.com/cws/share?url=$
|
unknown
|
||
http://185.215.113.16/O
|
unknown
|
||
https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
|
unknown
|
||
https://imp.mt48.net/static?id=7RHzfOIXjFEYsBdvIpkX4Qqm4pqX1CqX4pbW1pbWfpbZ7ReNxR3UIG8zInwYIFIVs9eYi
|
unknown
|
||
https://github.com/Youssef1313
|
unknown
|
||
https://management.azure.com/providers/Microsoft.Portal/userSettings/cloudconsole?api-version=2023-0
|
unknown
|
||
https://aka.ms/msignite_docs_banner
|
unknown
|
||
https://videoencodingpublic-hgeaeyeba8gycee3.b01.azurefd.net/public-b4da8140-92cf-421c-8b7b-e471d5b9
|
unknown
|
||
http://polymer.github.io/AUTHORS.txt
|
unknown
|
||
https://github.com/dotnet/docs/issues/new?template=z-customer-feedback.yml
|
unknown
|
||
https://mindhandru.buzz:443/api
|
unknown
|
||
https://management.azure.com/subscriptions?api-version=2016-06-01
|
unknown
|
||
https://github.com/dotnet/docs/blob/main/docs/framework/install/application-not-started.md
|
unknown
|
||
https://mindhandru.buzz/Cl
|
unknown
|
||
http://x1.c.lencr.org/0
|
unknown
|
||
http://x1.i.lencr.org/0
|
unknown
|
||
https://aka.ms/pshelpmechoose
|
unknown
|
||
https://aka.ms/feedback/report?space=61
|
unknown
|
||
http://185.215.113.16/off/def.exeGd
|
unknown
|
||
http://185.215.113.16/z
|
unknown
|
||
https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
|
unknown
|
||
hummskitnj.buzz
|
|||
mindhandru.buzz
|
|||
https://mindhandru.buzz/aB
|
unknown
|
||
https://mindhandru.buzz:443/api;WU
|
unknown
|
||
https://learn-video.azurefd.net/vod/player
|
unknown
|
||
https://twitter.com/intent/tweet?original_referer=$
|
unknown
|
||
https://github.com/gewarren
|
unknown
|
||
https://mindhandru.buzz/api
|
104.21.11.101
|
||
https://support.mozilla.org/products/firefoxgro.all
|
unknown
|
||
http://polymer.github.io/CONTRIBUTORS.txt
|
unknown
|
||
https://github.com/dotnet/docs/blob/live/docs/framework/install/application-not-started.md
|
unknown
|
||
https://mindhandru.buzz/DataA4
|
unknown
|
||
http://185.215.113.16/off/def.exeeWebKit/537.36
|
unknown
|
||
https://authoring-docs-microsoft.poolparty.biz/devrel/69c76c32-967e-4c65-b89a-74cc527db725
|
unknown
|
||
https://client-api.arkoselabs.com/v2/api.js
|
unknown
|
||
https://aka.ms/MSIgniteChallenge/Tier1Banner?wt.mc_id=ignite24_learnbanner_tier1_cnl
|
unknown
|
||
https://management.azure.com/providers/Microsoft.Portal/consoles/default?api-version=2017-12-01-prev
|
unknown
|
||
https://www.google.com/images/branding/product/ico/googleg_lodp.ico
|
unknown
|
||
https://github.com/Thraka
|
unknown
|
||
https://mindhandru.buzz/s
|
unknown
|
||
rebuildeso.buzz
|
|||
https://mindhandru.buzz/==
|
unknown
|
||
http://polymer.github.io/PATENTS.txt
|
unknown
|
||
appliacnesot.buzz
|
|||
https://aka.ms/certhelp
|
unknown
|
||
screwamusresz.buzz
|
|||
https://mindhandru.buzz/
|
unknown
|
||
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
|
unknown
|
||
http://crl.rootca1.amazontrust.com/rootca1.crl0
|
unknown
|
||
cashfuzysao.buzz
|
|||
https://github.com/mairaw
|
unknown
|
||
https://js.monitor.azure.com/scripts/c/ms.jsll-4.min.js
|
13.107.246.63
|
||
http://ocsp.rootca1.amazontrust.com0:
|
unknown
|
||
inherineau.buzz
|
|||
https://schema.org
|
unknown
|
||
http://polymer.github.io/LICENSE.txt
|
unknown
|
||
http://185.215.113.16/off/def.exeSd
|
unknown
|
||
https://mindhandru.buzz/wK
|
unknown
|
||
https://www.ecosia.org/newtab/
|
unknown
|
||
https://support.mozilla.org/kb/customize-firefox-controls-buttons-and-toolbars?utm_source=firefox-br
|
unknown
|
||
https://mindhandru.buzz/d
|
unknown
|
||
https://aka.ms/yourcaliforniaprivacychoices
|
unknown
|
||
https://ac.ecosia.org/autocomplete?q=
|
unknown
|
||
https://github.com/nschonni
|
unknown
|
||
http://185.215.113.16/
|
unknown
|
||
https://videoencodingpublic-hgeaeyeba8gycee3.b01.azurefd.net/public-09ce73a6-05a5-4e4d-b3d7-bd5a8c05
|
unknown
|
||
https://github.com/adegeo
|
unknown
|
||
prisonyfork.buzz
|
|||
https://github.com/jonschlinkert/is-plain-object
|
unknown
|
||
http://crt.rootca1.amazontrust.com/rootca1.cer0?
|
unknown
|
||
https://octokit.github.io/rest.js/#throttling
|
unknown
|
||
https://mindhandru.buzz:443/apiz
|
unknown
|
||
https://contile-images.services.mozilla.com/CuERQnIs4CzqjKBh9os6_h9d4CUDCHO3oiqmAQO6VLM.25122.jpg
|
unknown
|
||
https://github.com/js-cookie/js-cookie
|
unknown
|
||
http://185.215.113.16/off/def.exe
|
unknown
|
||
http://schema.org/Organization
|
unknown
|
||
https://mindhandru.buzz/P)
|
unknown
|
||
https://channel9.msdn.com/
|
unknown
|
||
https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
|
unknown
|
||
https://github.com/dotnet/try
|
unknown
|
||
https://mindhandru.buzz/tC
|
unknown
|
There are 78 hidden URLs, click here to show them.
Domains
Name
|
IP
|
Malicious
|
|
---|---|---|---|
www.google.com
|
142.250.181.68
|
||
s-part-0035.t-0009.t-msedge.net
|
13.107.246.63
|
||
mindhandru.buzz
|
104.21.11.101
|
||
js.monitor.azure.com
|
unknown
|
||
mdec.nelreports.net
|
unknown
|
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
192.168.2.8
|
unknown
|
unknown
|
||
185.215.113.16
|
unknown
|
Portugal
|
||
239.255.255.250
|
unknown
|
Reserved
|
||
142.250.181.68
|
www.google.com
|
United States
|
||
104.21.11.101
|
mindhandru.buzz
|
United States
|
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
4FA0000
|
direct allocation
|
page read and write
|
||
5F89000
|
trusted library allocation
|
page read and write
|
||
5AEB000
|
trusted library allocation
|
page read and write
|
||
5AF5000
|
trusted library allocation
|
page read and write
|
||
5F93000
|
trusted library allocation
|
page read and write
|
||
5AEC000
|
trusted library allocation
|
page read and write
|
||
375E000
|
stack
|
page read and write
|
||
60D5000
|
trusted library allocation
|
page read and write
|
||
83C0000
|
direct allocation
|
page read and write
|
||
5B70000
|
trusted library allocation
|
page read and write
|
||
5AF1000
|
trusted library allocation
|
page read and write
|
||
5B66000
|
trusted library allocation
|
page read and write
|
||
1230000
|
direct allocation
|
page read and write
|
||
5B13000
|
trusted library allocation
|
page read and write
|
||
5F84000
|
trusted library allocation
|
page read and write
|
||
5DE6000
|
trusted library allocation
|
page read and write
|
||
5B13000
|
trusted library allocation
|
page read and write
|
||
C41000
|
unkown
|
page execute and write copy
|
||
2F97000
|
heap
|
page read and write
|
||
5F87000
|
trusted library allocation
|
page read and write
|
||
6138000
|
trusted library allocation
|
page read and write
|
||
67CE000
|
trusted library allocation
|
page execute and read and write
|
||
5F8D000
|
trusted library allocation
|
page read and write
|
||
83C0000
|
direct allocation
|
page read and write
|
||
5B13000
|
trusted library allocation
|
page read and write
|
||
5B03000
|
trusted library allocation
|
page read and write
|
||
61BE000
|
stack
|
page read and write
|
||
60AA000
|
trusted library allocation
|
page read and write
|
||
815E000
|
stack
|
page read and write
|
||
5B76000
|
trusted library allocation
|
page read and write
|
||
63DC000
|
trusted library allocation
|
page read and write
|
||
5F8F000
|
trusted library allocation
|
page read and write
|
||
5F90000
|
trusted library allocation
|
page read and write
|
||
5BF9000
|
trusted library allocation
|
page read and write
|
||
862F000
|
stack
|
page read and write
|
||
5AEC000
|
trusted library allocation
|
page read and write
|
||
602F000
|
trusted library allocation
|
page read and write
|
||
2F80000
|
direct allocation
|
page read and write
|
||
5B6B000
|
trusted library allocation
|
page read and write
|
||
6043000
|
trusted library allocation
|
page read and write
|
||
5E94000
|
trusted library allocation
|
page read and write
|
||
5F88000
|
trusted library allocation
|
page read and write
|
||
5DE5000
|
trusted library allocation
|
page read and write
|
||
5620000
|
remote allocation
|
page read and write
|
||
1462000
|
heap
|
page read and write
|
||
7D5F000
|
stack
|
page read and write
|
||
5BA0000
|
trusted library allocation
|
page read and write
|
||
5AE8000
|
trusted library allocation
|
page read and write
|
||
439F000
|
stack
|
page read and write
|
||
5B94000
|
trusted library allocation
|
page read and write
|
||
5AF1000
|
trusted library allocation
|
page read and write
|
||
60BD000
|
trusted library allocation
|
page read and write
|
||
60A4000
|
trusted library allocation
|
page read and write
|
||
5DED000
|
trusted library allocation
|
page read and write
|
||
60B5000
|
trusted library allocation
|
page read and write
|
||
5F89000
|
trusted library allocation
|
page read and write
|
||
5B62000
|
trusted library allocation
|
page read and write
|
||
711E000
|
stack
|
page read and write
|
||
5DEA000
|
trusted library allocation
|
page read and write
|
||
61E8000
|
trusted library allocation
|
page read and write
|
||
60CE000
|
trusted library allocation
|
page read and write
|
||
6087000
|
trusted library allocation
|
page read and write
|
||
61B8000
|
trusted library allocation
|
page read and write
|
||
67BF000
|
trusted library allocation
|
page execute and read and write
|
||
5F8E000
|
trusted library allocation
|
page read and write
|
||
83C0000
|
direct allocation
|
page read and write
|
||
5B90000
|
trusted library allocation
|
page read and write
|
||
5B02000
|
trusted library allocation
|
page read and write
|
||
5B19000
|
trusted library allocation
|
page read and write
|
||
B0D000
|
unkown
|
page execute and write copy
|
||
60F2000
|
trusted library allocation
|
page read and write
|
||
7D9E000
|
stack
|
page read and write
|
||
5AF5000
|
trusted library allocation
|
page read and write
|
||
995000
|
unkown
|
page execute and read and write
|
||
5BB0000
|
trusted library allocation
|
page read and write
|
||
5F86000
|
trusted library allocation
|
page read and write
|
||
6055000
|
trusted library allocation
|
page read and write
|
||
5BA7000
|
trusted library allocation
|
page read and write
|
||
5B03000
|
trusted library allocation
|
page read and write
|
||
5DEA000
|
trusted library allocation
|
page read and write
|
||
5C19000
|
trusted library allocation
|
page read and write
|
||
6069000
|
trusted library allocation
|
page read and write
|
||
14EE000
|
heap
|
page read and write
|
||
5B09000
|
trusted library allocation
|
page read and write
|
||
5F81000
|
trusted library allocation
|
page read and write
|
||
5F87000
|
trusted library allocation
|
page read and write
|
||
5F84000
|
trusted library allocation
|
page read and write
|
||
60C3000
|
trusted library allocation
|
page read and write
|
||
6062000
|
trusted library allocation
|
page read and write
|
||
49DF000
|
stack
|
page read and write
|
||
5F89000
|
trusted library allocation
|
page read and write
|
||
5B58000
|
trusted library allocation
|
page read and write
|
||
BC9000
|
unkown
|
page execute and read and write
|
||
602D000
|
trusted library allocation
|
page read and write
|
||
5BE4000
|
trusted library allocation
|
page read and write
|
||
539D000
|
stack
|
page read and write
|
||
8470000
|
trusted library allocation
|
page read and write
|
||
7EDE000
|
stack
|
page read and write
|
||
4B21000
|
heap
|
page read and write
|
||
5E44000
|
trusted library allocation
|
page read and write
|
||
5B01000
|
trusted library allocation
|
page read and write
|
||
603F000
|
trusted library allocation
|
page read and write
|
||
6247000
|
trusted library allocation
|
page read and write
|
||
371F000
|
stack
|
page read and write
|
||
5C8A000
|
trusted library allocation
|
page read and write
|
||
608F000
|
trusted library allocation
|
page read and write
|
||
5B03000
|
trusted library allocation
|
page read and write
|
||
5130000
|
direct allocation
|
page execute and read and write
|
||
2F80000
|
direct allocation
|
page read and write
|
||
5F94000
|
trusted library allocation
|
page read and write
|
||
1244000
|
heap
|
page read and write
|
||
5F82000
|
trusted library allocation
|
page read and write
|
||
84A0000
|
direct allocation
|
page execute and read and write
|
||
5B76000
|
trusted library allocation
|
page read and write
|
||
6032000
|
trusted library allocation
|
page read and write
|
||
5B6D000
|
trusted library allocation
|
page read and write
|
||
5B6A000
|
trusted library allocation
|
page read and write
|
||
1476000
|
heap
|
page read and write
|
||
605E000
|
trusted library allocation
|
page read and write
|
||
5F8B000
|
trusted library allocation
|
page read and write
|
||
9B0000
|
unkown
|
page execute and read and write
|
||
5AF1000
|
trusted library allocation
|
page read and write
|
||
83F0000
|
trusted library allocation
|
page read and write
|
||
C58000
|
unkown
|
page execute and read and write
|
||
5BAF000
|
trusted library allocation
|
page read and write
|
||
6055000
|
trusted library allocation
|
page read and write
|
||
5F88000
|
trusted library allocation
|
page read and write
|
||
951000
|
unkown
|
page execute and write copy
|
||
5BA7000
|
trusted library allocation
|
page read and write
|
||
5F82000
|
trusted library allocation
|
page read and write
|
||
5B0E000
|
trusted library allocation
|
page read and write
|
||
5F82000
|
trusted library allocation
|
page read and write
|
||
150C000
|
heap
|
page read and write
|
||
5B93000
|
trusted library allocation
|
page read and write
|
||
62EE000
|
trusted library allocation
|
page read and write
|
||
479E000
|
stack
|
page read and write
|
||
5F88000
|
trusted library allocation
|
page read and write
|
||
5B13000
|
trusted library allocation
|
page read and write
|
||
1230000
|
direct allocation
|
page read and write
|
||
5B13000
|
trusted library allocation
|
page read and write
|
||
5B13000
|
trusted library allocation
|
page read and write
|
||
83A0000
|
direct allocation
|
page read and write
|
||
5B88000
|
trusted library allocation
|
page read and write
|
||
5B09000
|
trusted library allocation
|
page read and write
|
||
6091000
|
trusted library allocation
|
page read and write
|
||
8470000
|
direct allocation
|
page execute and read and write
|
||
1501000
|
heap
|
page read and write
|
||
606F000
|
trusted library allocation
|
page read and write
|
||
60A1000
|
trusted library allocation
|
page read and write
|
||
61EA000
|
trusted library allocation
|
page read and write
|
||
57CD000
|
stack
|
page read and write
|
||
150E000
|
heap
|
page read and write
|
||
5B85000
|
trusted library allocation
|
page read and write
|
||
6034000
|
trusted library allocation
|
page read and write
|
||
5BF9000
|
trusted library allocation
|
page read and write
|
||
349F000
|
stack
|
page read and write
|
||
6F9F000
|
stack
|
page read and write
|
||
9AF000
|
unkown
|
page execute and write copy
|
||
6031000
|
trusted library allocation
|
page read and write
|
||
5B13000
|
trusted library allocation
|
page read and write
|
||
1501000
|
heap
|
page read and write
|
||
14E1000
|
heap
|
page read and write
|
||
465E000
|
stack
|
page read and write
|
||
5AE8000
|
trusted library allocation
|
page read and write
|
||
6510000
|
trusted library allocation
|
page read and write
|
||
1244000
|
heap
|
page read and write
|
||
5F91000
|
trusted library allocation
|
page read and write
|
||
5F89000
|
trusted library allocation
|
page read and write
|
||
5F8E000
|
trusted library allocation
|
page read and write
|
||
5BA0000
|
trusted library allocation
|
page read and write
|
||
60DB000
|
trusted library allocation
|
page read and write
|
||
609B000
|
trusted library allocation
|
page read and write
|
||
4B21000
|
heap
|
page read and write
|
||
5B0C000
|
trusted library allocation
|
page read and write
|
||
8C4E000
|
stack
|
page read and write
|
||
5110000
|
direct allocation
|
page execute and read and write
|
||
845C000
|
stack
|
page read and write
|
||
9B1000
|
unkown
|
page execute and write copy
|
||
4FDC000
|
stack
|
page read and write
|
||
605E000
|
trusted library allocation
|
page read and write
|
||
6060000
|
trusted library allocation
|
page read and write
|
||
5B13000
|
trusted library allocation
|
page read and write
|
||
7C5E000
|
stack
|
page read and write
|
||
61CA000
|
trusted library allocation
|
page read and write
|
||
60C9000
|
trusted library allocation
|
page read and write
|
||
6181000
|
trusted library allocation
|
page read and write
|
||
319F000
|
stack
|
page read and write
|
||
1244000
|
heap
|
page read and write
|
||
5EC4000
|
trusted library allocation
|
page read and write
|
||
4F60000
|
heap
|
page read and write
|
||
5B23000
|
trusted library allocation
|
page read and write
|
||
5E24000
|
trusted library allocation
|
page read and write
|
||
5F85000
|
trusted library allocation
|
page read and write
|
||
1244000
|
heap
|
page read and write
|
||
5B33000
|
trusted library allocation
|
page read and write
|
||
C48000
|
unkown
|
page execute and write copy
|
||
5DE6000
|
trusted library allocation
|
page read and write
|
||
69DF000
|
stack
|
page read and write
|
||
60D4000
|
trusted library allocation
|
page read and write
|
||
5B6A000
|
trusted library allocation
|
page read and write
|
||
5F8E000
|
trusted library allocation
|
page read and write
|
||
5620000
|
remote allocation
|
page read and write
|
||
5F86000
|
trusted library allocation
|
page read and write
|
||
475F000
|
stack
|
page read and write
|
||
60C5000
|
trusted library allocation
|
page read and write
|
||
68DF000
|
stack
|
page read and write
|
||
7FDF000
|
stack
|
page read and write
|
||
6025000
|
trusted library allocation
|
page read and write
|
||
5B37000
|
trusted library allocation
|
page read and write
|
||
385F000
|
stack
|
page read and write
|
||
5B09000
|
trusted library allocation
|
page read and write
|
||
5B7E000
|
trusted library allocation
|
page read and write
|
||
739E000
|
stack
|
page read and write
|
||
61EE000
|
trusted library allocation
|
page read and write
|
||
5F82000
|
trusted library allocation
|
page read and write
|
||
B31000
|
unkown
|
page execute and write copy
|
||
1230000
|
direct allocation
|
page read and write
|
||
5B09000
|
trusted library allocation
|
page read and write
|
||
1230000
|
direct allocation
|
page read and write
|
||
5AF1000
|
trusted library allocation
|
page read and write
|
||
6068000
|
trusted library allocation
|
page read and write
|
||
609C000
|
trusted library allocation
|
page read and write
|
||
5B18000
|
trusted library allocation
|
page read and write
|
||
150B000
|
heap
|
page read and write
|
||
83C0000
|
direct allocation
|
page read and write
|
||
61B1000
|
trusted library allocation
|
page read and write
|
||
60E1000
|
trusted library allocation
|
page read and write
|
||
6083000
|
trusted library allocation
|
page read and write
|
||
5F8F000
|
trusted library allocation
|
page read and write
|
||
14E6000
|
heap
|
page read and write
|
||
5F8C000
|
trusted library allocation
|
page read and write
|
||
5F93000
|
trusted library allocation
|
page read and write
|
||
5DF0000
|
trusted library allocation
|
page read and write
|
||
1230000
|
direct allocation
|
page read and write
|
||
6097000
|
trusted library allocation
|
page read and write
|
||
2EAF000
|
stack
|
page read and write
|
||
5AE4000
|
trusted library allocation
|
page read and write
|
||
5AEE000
|
trusted library allocation
|
page read and write
|
||
1240000
|
heap
|
page read and write
|
||
5B13000
|
trusted library allocation
|
page read and write
|
||
6079000
|
stack
|
page read and write
|
||
5BA7000
|
trusted library allocation
|
page read and write
|
||
5B90000
|
trusted library allocation
|
page read and write
|
||
48DE000
|
stack
|
page read and write
|
||
5BB0000
|
trusted library allocation
|
page read and write
|
||
5F83000
|
trusted library allocation
|
page read and write
|
||
5D1A000
|
trusted library allocation
|
page read and write
|
||
5F86000
|
trusted library allocation
|
page read and write
|
||
950000
|
unkown
|
page read and write
|
||
6C1E000
|
stack
|
page read and write
|
||
4B21000
|
heap
|
page read and write
|
||
5F8A000
|
trusted library allocation
|
page read and write
|
||
309F000
|
stack
|
page read and write
|
||
83C0000
|
direct allocation
|
page read and write
|
||
451E000
|
stack
|
page read and write
|
||
5AD0000
|
heap
|
page read and write
|
||
7ADF000
|
stack
|
page read and write
|
||
B29000
|
unkown
|
page execute and write copy
|
||
5AF6000
|
trusted library allocation
|
page read and write
|
||
5F87000
|
trusted library allocation
|
page read and write
|
||
5F8A000
|
trusted library allocation
|
page read and write
|
||
1244000
|
heap
|
page read and write
|
||
5F8F000
|
trusted library allocation
|
page read and write
|
||
725E000
|
stack
|
page read and write
|
||
6064000
|
trusted library allocation
|
page read and write
|
||
BCE000
|
unkown
|
page execute and write copy
|
||
611D000
|
trusted library allocation
|
page read and write
|
||
389E000
|
stack
|
page read and write
|
||
606B000
|
trusted library allocation
|
page read and write
|
||
5B13000
|
trusted library allocation
|
page read and write
|
||
735F000
|
stack
|
page read and write
|
||
6221000
|
trusted library allocation
|
page read and write
|
||
601E000
|
trusted library allocation
|
page read and write
|
||
3ADF000
|
stack
|
page read and write
|
||
9A5000
|
unkown
|
page execute and write copy
|
||
BFC000
|
unkown
|
page execute and write copy
|
||
BB7000
|
unkown
|
page execute and read and write
|
||
5B96000
|
trusted library allocation
|
page read and write
|
||
568E000
|
stack
|
page read and write
|
||
B2A000
|
unkown
|
page execute and read and write
|
||
5AF1000
|
trusted library allocation
|
page read and write
|
||
5BA8000
|
trusted library allocation
|
page read and write
|
||
9EF0000
|
trusted library allocation
|
page read and write
|
||
5DE4000
|
trusted library allocation
|
page read and write
|
||
9A5000
|
unkown
|
page execute and read and write
|
||
5EBC000
|
trusted library allocation
|
page read and write
|
||
1501000
|
heap
|
page read and write
|
||
150B000
|
heap
|
page read and write
|
||
83C0000
|
direct allocation
|
page read and write
|
||
6245000
|
trusted library allocation
|
page read and write
|
||
5BE1000
|
trusted library allocation
|
page read and write
|
||
B99000
|
unkown
|
page execute and write copy
|
||
511D000
|
stack
|
page read and write
|
||
60D5000
|
trusted library allocation
|
page read and write
|
||
3D9E000
|
stack
|
page read and write
|
||
5C19000
|
trusted library allocation
|
page read and write
|
||
83C0000
|
direct allocation
|
page read and write
|
||
5B13000
|
trusted library allocation
|
page read and write
|
||
5B03000
|
trusted library allocation
|
page read and write
|
||
5B9B000
|
trusted library allocation
|
page read and write
|
||
B8E000
|
unkown
|
page execute and write copy
|
||
561F000
|
stack
|
page read and write
|
||
5F84000
|
trusted library allocation
|
page read and write
|
||
5F89000
|
trusted library allocation
|
page read and write
|
||
5F84000
|
trusted library allocation
|
page read and write
|
||
529D000
|
stack
|
page read and write
|
||
5BA0000
|
trusted library allocation
|
page read and write
|
||
5B00000
|
trusted library allocation
|
page read and write
|
||
150C000
|
heap
|
page read and write
|
||
1447000
|
heap
|
page read and write
|
||
5B08000
|
trusted library allocation
|
page read and write
|
||
1230000
|
direct allocation
|
page read and write
|
||
1501000
|
heap
|
page read and write
|
||
5B63000
|
trusted library allocation
|
page read and write
|
||
6123000
|
trusted library allocation
|
page read and write
|
||
6038000
|
trusted library allocation
|
page read and write
|
||
5F8F000
|
trusted library allocation
|
page read and write
|
||
5B95000
|
trusted library allocation
|
page read and write
|
||
5AED000
|
trusted library allocation
|
page read and write
|
||
4B21000
|
heap
|
page read and write
|
||
3FDF000
|
stack
|
page read and write
|
||
618E000
|
trusted library allocation
|
page read and write
|
||
5F8D000
|
trusted library allocation
|
page read and write
|
||
4B32000
|
heap
|
page read and write
|
||
8B0B000
|
stack
|
page read and write
|
||
608D000
|
trusted library allocation
|
page read and write
|
||
8C0C000
|
stack
|
page read and write
|
||
5B13000
|
trusted library allocation
|
page read and write
|
||
5B13000
|
trusted library allocation
|
page read and write
|
||
5B06000
|
trusted library allocation
|
page read and write
|
||
6E9E000
|
stack
|
page read and write
|
||
3E9F000
|
stack
|
page read and write
|
||
6043000
|
trusted library allocation
|
page read and write
|
||
6188000
|
trusted library allocation
|
page read and write
|
||
5B67000
|
trusted library allocation
|
page read and write
|
||
1230000
|
direct allocation
|
page read and write
|
||
60DF000
|
trusted library allocation
|
page read and write
|
||
5B05000
|
trusted library allocation
|
page read and write
|
||
5BE6000
|
trusted library allocation
|
page read and write
|
||
14E5000
|
heap
|
page read and write
|
||
60A2000
|
trusted library allocation
|
page read and write
|
||
5F8D000
|
trusted library allocation
|
page read and write
|
||
608D000
|
trusted library allocation
|
page read and write
|
||
138E000
|
stack
|
page read and write
|
||
5B94000
|
trusted library allocation
|
page read and write
|
||
5F89000
|
trusted library allocation
|
page read and write
|
||
61F5000
|
trusted library allocation
|
page read and write
|
||
1244000
|
heap
|
page read and write
|
||
145D000
|
heap
|
page read and write
|
||
5F8D000
|
trusted library allocation
|
page read and write
|
||
5B6A000
|
trusted library allocation
|
page read and write
|
||
5B13000
|
trusted library allocation
|
page read and write
|
||
5AE0000
|
trusted library allocation
|
page read and write
|
||
60B8000
|
trusted library allocation
|
page read and write
|
||
14E5000
|
heap
|
page read and write
|
||
60B9000
|
trusted library allocation
|
page read and write
|
||
5AE9000
|
trusted library allocation
|
page read and write
|
||
5AF8000
|
trusted library allocation
|
page read and write
|
||
150B000
|
heap
|
page read and write
|
||
5B23000
|
trusted library allocation
|
page read and write
|
||
67FE000
|
trusted library allocation
|
page read and write
|
||
83C0000
|
direct allocation
|
page read and write
|
||
5B6F000
|
trusted library allocation
|
page read and write
|
||
BD6000
|
unkown
|
page execute and read and write
|
||
5F82000
|
trusted library allocation
|
page read and write
|
||
489F000
|
stack
|
page read and write
|
||
5439000
|
trusted library allocation
|
page read and write
|
||
5C09000
|
trusted library allocation
|
page read and write
|
||
6045000
|
trusted library allocation
|
page read and write
|
||
1489000
|
heap
|
page read and write
|
||
6033000
|
trusted library allocation
|
page read and write
|
||
6093000
|
trusted library allocation
|
page read and write
|
||
4B21000
|
heap
|
page read and write
|
||
54DF000
|
stack
|
page read and write
|
||
5AEE000
|
trusted library allocation
|
page read and write
|
||
64FF000
|
trusted library allocation
|
page read and write
|
||
5AF1000
|
trusted library allocation
|
page read and write
|
||
83C0000
|
direct allocation
|
page read and write
|
||
1486000
|
heap
|
page read and write
|
||
14DB000
|
heap
|
page read and write
|
||
5F85000
|
trusted library allocation
|
page read and write
|
||
6051000
|
trusted library allocation
|
page read and write
|
||
1462000
|
heap
|
page read and write
|
||
609E000
|
trusted library allocation
|
page read and write
|
||
617B000
|
trusted library allocation
|
page read and write
|
||
5BA9000
|
trusted library allocation
|
page read and write
|
||
361E000
|
stack
|
page read and write
|
||
5DEC000
|
trusted library allocation
|
page read and write
|
||
61FE000
|
stack
|
page read and write
|
||
829E000
|
stack
|
page read and write
|
||
5F84000
|
trusted library allocation
|
page read and write
|
||
613E000
|
trusted library allocation
|
page read and write
|
||
5B13000
|
trusted library allocation
|
page read and write
|
||
6085000
|
trusted library allocation
|
page read and write
|
||
4B21000
|
heap
|
page read and write
|
||
10FA000
|
stack
|
page read and write
|
||
75DF000
|
stack
|
page read and write
|
||
5BE0000
|
trusted library allocation
|
page read and write
|
||
4B21000
|
heap
|
page read and write
|
||
6085000
|
trusted library allocation
|
page read and write
|
||
5110000
|
direct allocation
|
page execute and read and write
|
||
5B77000
|
trusted library allocation
|
page read and write
|
||
6059000
|
trusted library allocation
|
page read and write
|
||
5B21000
|
trusted library allocation
|
page read and write
|
||
5F83000
|
trusted library allocation
|
page read and write
|
||
5F85000
|
trusted library allocation
|
page read and write
|
||
5B5E000
|
trusted library allocation
|
page read and write
|
||
C43000
|
unkown
|
page execute and write copy
|
||
60B2000
|
trusted library allocation
|
page read and write
|
||
BBD000
|
unkown
|
page execute and read and write
|
||
5BA8000
|
trusted library allocation
|
page read and write
|
||
5B13000
|
trusted library allocation
|
page read and write
|
||
5B54000
|
trusted library allocation
|
page read and write
|
||
5B6C000
|
trusted library allocation
|
page read and write
|
||
7E9F000
|
stack
|
page read and write
|
||
401E000
|
stack
|
page read and write
|
||
2F2E000
|
stack
|
page read and write
|
||
4FE4000
|
direct allocation
|
page read and write
|
||
5B13000
|
trusted library allocation
|
page read and write
|
||
BFD000
|
unkown
|
page execute and read and write
|
||
5B90000
|
trusted library allocation
|
page read and write
|
||
5C19000
|
trusted library allocation
|
page read and write
|
||
5B5C000
|
trusted library allocation
|
page read and write
|
||
5B06000
|
trusted library allocation
|
page read and write
|
||
605C000
|
trusted library allocation
|
page read and write
|
||
1486000
|
heap
|
page read and write
|
||
5B96000
|
trusted library allocation
|
page read and write
|
||
83C0000
|
direct allocation
|
page read and write
|
||
5BE1000
|
trusted library allocation
|
page read and write
|
||
5B37000
|
trusted library allocation
|
page read and write
|
||
1244000
|
heap
|
page read and write
|
||
60C7000
|
trusted library allocation
|
page read and write
|
||
4B21000
|
heap
|
page read and write
|
||
5B39000
|
trusted library allocation
|
page read and write
|
||
14E2000
|
heap
|
page read and write
|
||
888F000
|
stack
|
page read and write
|
||
5BB1000
|
trusted library allocation
|
page read and write
|
||
61EF000
|
trusted library allocation
|
page read and write
|
||
5B09000
|
trusted library allocation
|
page read and write
|
||
1244000
|
heap
|
page read and write
|
||
5BA6000
|
trusted library allocation
|
page read and write
|
||
5B70000
|
trusted library allocation
|
page read and write
|
||
5AAA000
|
stack
|
page read and write
|
||
5BF9000
|
trusted library allocation
|
page read and write
|
||
5150000
|
direct allocation
|
page execute and read and write
|
||
150B000
|
heap
|
page read and write
|
||
604C000
|
trusted library allocation
|
page read and write
|
||
5B82000
|
trusted library allocation
|
page read and write
|
||
5B61000
|
trusted library allocation
|
page read and write
|
||
60E5000
|
trusted library allocation
|
page read and write
|
||
2F6E000
|
stack
|
page read and write
|
||
5B13000
|
trusted library allocation
|
page read and write
|
||
5B62000
|
trusted library allocation
|
page read and write
|
||
5B13000
|
trusted library allocation
|
page read and write
|
||
5B13000
|
trusted library allocation
|
page read and write
|
||
83C0000
|
trusted library allocation
|
page read and write
|
||
5B78000
|
trusted library allocation
|
page read and write
|
||
5BE2000
|
trusted library allocation
|
page read and write
|
||
150C000
|
heap
|
page read and write
|
||
5B01000
|
trusted library allocation
|
page read and write
|
||
5F8F000
|
trusted library allocation
|
page read and write
|
||
5F88000
|
trusted library allocation
|
page read and write
|
||
150E000
|
heap
|
page read and write
|
||
5B70000
|
trusted library allocation
|
page read and write
|
||
79DE000
|
stack
|
page read and write
|
||
5140000
|
direct allocation
|
page execute and read and write
|
||
771F000
|
stack
|
page read and write
|
||
5F8C000
|
trusted library allocation
|
page read and write
|
||
5B69000
|
trusted library allocation
|
page read and write
|
||
B94000
|
unkown
|
page execute and write copy
|
||
5B62000
|
trusted library allocation
|
page read and write
|
||
5BB8000
|
trusted library allocation
|
page read and write
|
||
1459000
|
heap
|
page read and write
|
||
5DE9000
|
trusted library allocation
|
page read and write
|
||
875E000
|
stack
|
page read and write
|
||
5B4E000
|
trusted library allocation
|
page read and write
|
||
5B13000
|
trusted library allocation
|
page read and write
|
||
6048000
|
trusted library allocation
|
page read and write
|
||
5A3F000
|
stack
|
page read and write
|
||
60CE000
|
trusted library allocation
|
page read and write
|
||
5BE1000
|
trusted library allocation
|
page read and write
|
||
5B61000
|
trusted library allocation
|
page read and write
|
||
5AE9000
|
trusted library allocation
|
page read and write
|
||
5AF1000
|
trusted library allocation
|
page read and write
|
||
5BB6000
|
trusted library allocation
|
page read and write
|
||
83C0000
|
direct allocation
|
page read and write
|
||
1489000
|
heap
|
page read and write
|
||
145B000
|
heap
|
page read and write
|
||
5B6C000
|
trusted library allocation
|
page read and write
|
||
5F83000
|
trusted library allocation
|
page read and write
|
||
4B21000
|
heap
|
page read and write
|
||
5BE8000
|
trusted library allocation
|
page read and write
|
||
BCD000
|
unkown
|
page execute and read and write
|
||
5110000
|
direct allocation
|
page execute and read and write
|
||
5B6A000
|
trusted library allocation
|
page read and write
|
||
1230000
|
direct allocation
|
page read and write
|
||
6027000
|
trusted library allocation
|
page read and write
|
||
5BF9000
|
trusted library allocation
|
page read and write
|
||
5AE5000
|
trusted library allocation
|
page read and write
|
||
5AF9000
|
trusted library allocation
|
page read and write
|
||
5AD3000
|
heap
|
page read and write
|
||
5AF5000
|
trusted library allocation
|
page read and write
|
||
5B54000
|
trusted library allocation
|
page read and write
|
||
5BAB000
|
trusted library allocation
|
page read and write
|
||
14F0000
|
heap
|
page read and write
|
||
120E000
|
stack
|
page read and write
|
||
5B1F000
|
trusted library allocation
|
page read and write
|
||
5F90000
|
trusted library allocation
|
page read and write
|
||
1244000
|
heap
|
page read and write
|
||
5B13000
|
trusted library allocation
|
page read and write
|
||
1220000
|
heap
|
page read and write
|
||
B0A000
|
unkown
|
page execute and read and write
|
||
5BC0000
|
trusted library allocation
|
page read and write
|
||
6046000
|
trusted library allocation
|
page read and write
|
||
5AFC000
|
trusted library allocation
|
page read and write
|
||
5F93000
|
trusted library allocation
|
page read and write
|
||
5F8B000
|
trusted library allocation
|
page read and write
|
||
5B85000
|
trusted library allocation
|
page read and write
|
||
4B20000
|
heap
|
page read and write
|
||
4B21000
|
heap
|
page read and write
|
||
C41000
|
unkown
|
page execute and write copy
|
||
140E000
|
stack
|
page read and write
|
||
5B70000
|
trusted library allocation
|
page read and write
|
||
4B21000
|
heap
|
page read and write
|
||
621F000
|
trusted library allocation
|
page read and write
|
||
14E1000
|
heap
|
page read and write
|
||
5F83000
|
trusted library allocation
|
page read and write
|
||
5B04000
|
trusted library allocation
|
page read and write
|
||
5B13000
|
trusted library allocation
|
page read and write
|
||
5B6A000
|
trusted library allocation
|
page read and write
|
||
6089000
|
trusted library allocation
|
page read and write
|
||
6D1F000
|
stack
|
page read and write
|
||
5F8D000
|
trusted library allocation
|
page read and write
|
||
5B08000
|
trusted library allocation
|
page read and write
|
||
5BA7000
|
trusted library allocation
|
page read and write
|
||
5AF1000
|
trusted library allocation
|
page read and write
|
||
43DE000
|
stack
|
page read and write
|
||
5F8A000
|
trusted library allocation
|
page read and write
|
||
C38000
|
unkown
|
page execute and write copy
|
||
609B000
|
trusted library allocation
|
page read and write
|
||
5AF3000
|
trusted library allocation
|
page read and write
|
||
D80000
|
heap
|
page read and write
|
||
6091000
|
trusted library allocation
|
page read and write
|
||
6ADF000
|
stack
|
page read and write
|
||
5AF2000
|
trusted library allocation
|
page read and write
|
||
60EE000
|
trusted library allocation
|
page read and write
|
||
5B13000
|
trusted library allocation
|
page read and write
|
||
14FE000
|
heap
|
page read and write
|
||
C19000
|
unkown
|
page execute and read and write
|
||
BB8000
|
unkown
|
page execute and write copy
|
||
BB4000
|
unkown
|
page execute and write copy
|
||
5BEA000
|
trusted library allocation
|
page read and write
|
||
5AEF000
|
trusted library allocation
|
page read and write
|
||
5F87000
|
trusted library allocation
|
page read and write
|
||
14DA000
|
heap
|
page read and write
|
||
4B21000
|
heap
|
page read and write
|
||
2F90000
|
heap
|
page read and write
|
||
6225000
|
trusted library allocation
|
page read and write
|
||
3C5E000
|
stack
|
page read and write
|
||
429E000
|
stack
|
page read and write
|
||
775E000
|
stack
|
page read and write
|
||
141E000
|
heap
|
page read and write
|
||
5BA9000
|
trusted library allocation
|
page read and write
|
||
5F90000
|
trusted library allocation
|
page read and write
|
||
5F83000
|
trusted library allocation
|
page read and write
|
||
5F87000
|
trusted library allocation
|
page read and write
|
||
60D7000
|
trusted library allocation
|
page read and write
|
||
5B62000
|
trusted library allocation
|
page read and write
|
||
58CC000
|
stack
|
page read and write
|
||
5B11000
|
trusted library allocation
|
page read and write
|
||
951000
|
unkown
|
page execute and read and write
|
||
150D000
|
heap
|
page read and write
|
||
3D5F000
|
stack
|
page read and write
|
||
61AB000
|
trusted library allocation
|
page read and write
|
||
61F1000
|
trusted library allocation
|
page read and write
|
||
5F8B000
|
trusted library allocation
|
page read and write
|
||
604E000
|
trusted library allocation
|
page read and write
|
||
5B13000
|
trusted library allocation
|
page read and write
|
||
1486000
|
heap
|
page read and write
|
||
5B13000
|
trusted library allocation
|
page read and write
|
||
5F82000
|
trusted library allocation
|
page read and write
|
||
5BB4000
|
trusted library allocation
|
page read and write
|
||
1489000
|
heap
|
page read and write
|
||
5BE4000
|
trusted library allocation
|
page read and write
|
||
5B77000
|
trusted library allocation
|
page read and write
|
||
4B21000
|
heap
|
page read and write
|
||
608B000
|
trusted library allocation
|
page read and write
|
||
6020000
|
trusted library allocation
|
page read and write
|
||
1230000
|
direct allocation
|
page read and write
|
||
5BA0000
|
trusted library allocation
|
page read and write
|
||
5B13000
|
trusted library allocation
|
page read and write
|
||
799F000
|
stack
|
page read and write
|
||
5F8C000
|
trusted library allocation
|
page read and write
|
||
83C0000
|
direct allocation
|
page read and write
|
||
DEE000
|
stack
|
page read and write
|
||
801E000
|
stack
|
page read and write
|
||
60C3000
|
trusted library allocation
|
page read and write
|
||
1230000
|
direct allocation
|
page read and write
|
||
5B13000
|
trusted library allocation
|
page read and write
|
||
5BB8000
|
trusted library allocation
|
page read and write
|
||
5BE1000
|
trusted library allocation
|
page read and write
|
||
608B000
|
trusted library allocation
|
page read and write
|
||
5BE1000
|
trusted library allocation
|
page read and write
|
||
825F000
|
stack
|
page read and write
|
||
618C000
|
trusted library allocation
|
page read and write
|
||
5AF1000
|
trusted library allocation
|
page read and write
|
||
5B7F000
|
trusted library allocation
|
page read and write
|
||
13CB000
|
stack
|
page read and write
|
||
5BF9000
|
trusted library allocation
|
page read and write
|
||
C58000
|
unkown
|
page execute and write copy
|
||
5620000
|
remote allocation
|
page read and write
|
||
5C0A000
|
trusted library allocation
|
page read and write
|
||
5B6B000
|
trusted library allocation
|
page read and write
|
||
5B1B000
|
trusted library allocation
|
page read and write
|
||
6097000
|
trusted library allocation
|
page read and write
|
||
5BB6000
|
trusted library allocation
|
page read and write
|
||
5B82000
|
trusted library allocation
|
page read and write
|
||
5F8A000
|
trusted library allocation
|
page read and write
|
||
61AD000
|
trusted library allocation
|
page read and write
|
||
6163000
|
trusted library allocation
|
page read and write
|
||
5B6D000
|
trusted library allocation
|
page read and write
|
||
60EC000
|
trusted library allocation
|
page read and write
|
||
150D000
|
heap
|
page read and write
|
||
6054000
|
trusted library allocation
|
page read and write
|
||
5F86000
|
trusted library allocation
|
page read and write
|
||
7B1E000
|
stack
|
page read and write
|
||
5F8F000
|
trusted library allocation
|
page read and write
|
||
5F92000
|
trusted library allocation
|
page read and write
|
||
14E4000
|
heap
|
page read and write
|
||
5F80000
|
trusted library allocation
|
page read and write
|
||
5B01000
|
trusted library allocation
|
page read and write
|
||
60FD000
|
trusted library allocation
|
page read and write
|
||
5B08000
|
trusted library allocation
|
page read and write
|
||
147F000
|
heap
|
page read and write
|
||
5B04000
|
trusted library allocation
|
page read and write
|
||
461F000
|
stack
|
page read and write
|
||
5B13000
|
trusted library allocation
|
page read and write
|
||
60D3000
|
trusted library allocation
|
page read and write
|
||
5B94000
|
trusted library allocation
|
page read and write
|
||
5F8E000
|
trusted library allocation
|
page read and write
|
||
5F89000
|
trusted library allocation
|
page read and write
|
||
5B6C000
|
trusted library allocation
|
page read and write
|
||
6101000
|
trusted library allocation
|
page read and write
|
||
5F86000
|
trusted library allocation
|
page read and write
|
||
607E000
|
trusted library allocation
|
page read and write
|
||
1230000
|
direct allocation
|
page read and write
|
||
1244000
|
heap
|
page read and write
|
||
5B6F000
|
trusted library allocation
|
page read and write
|
||
5110000
|
direct allocation
|
page execute and read and write
|
||
5B13000
|
trusted library allocation
|
page read and write
|
||
5F8C000
|
trusted library allocation
|
page read and write
|
||
5AF2000
|
trusted library allocation
|
page read and write
|
||
5F8E000
|
trusted library allocation
|
page read and write
|
||
5B95000
|
trusted library allocation
|
page read and write
|
||
5B37000
|
trusted library allocation
|
page read and write
|
||
339F000
|
stack
|
page read and write
|
||
66AA000
|
trusted library allocation
|
page execute and read and write
|
||
50F0000
|
direct allocation
|
page execute and read and write
|
||
5F94000
|
trusted library allocation
|
page read and write
|
||
146E000
|
heap
|
page read and write
|
||
5B09000
|
trusted library allocation
|
page read and write
|
||
5BB1000
|
trusted library allocation
|
page read and write
|
||
61BC000
|
trusted library allocation
|
page read and write
|
||
525D000
|
stack
|
page read and write
|
||
6BDF000
|
stack
|
page read and write
|
||
150D000
|
heap
|
page read and write
|
||
611F000
|
trusted library allocation
|
page read and write
|
||
1244000
|
heap
|
page read and write
|
||
60CA000
|
trusted library allocation
|
page read and write
|
||
749F000
|
stack
|
page read and write
|
||
415E000
|
stack
|
page read and write
|
||
5B06000
|
trusted library allocation
|
page read and write
|
||
5B19000
|
trusted library allocation
|
page read and write
|
||
5F8D000
|
trusted library allocation
|
page read and write
|
||
B25000
|
unkown
|
page execute and read and write
|
||
5F8F000
|
trusted library allocation
|
page read and write
|
||
60DB000
|
trusted library allocation
|
page read and write
|
||
329F000
|
stack
|
page read and write
|
||
8420000
|
direct allocation
|
page read and write
|
||
5F88000
|
trusted library allocation
|
page read and write
|
||
B93000
|
unkown
|
page execute and read and write
|
||
5110000
|
direct allocation
|
page execute and read and write
|
||
14E1000
|
heap
|
page read and write
|
||
1410000
|
heap
|
page read and write
|
||
141A000
|
heap
|
page read and write
|
||
1244000
|
heap
|
page read and write
|
||
5AF1000
|
trusted library allocation
|
page read and write
|
||
411F000
|
stack
|
page read and write
|
||
5F93000
|
trusted library allocation
|
page read and write
|
||
35DF000
|
stack
|
page read and write
|
||
60CF000
|
trusted library allocation
|
page read and write
|
||
5F8A000
|
trusted library allocation
|
page read and write
|
||
BC5000
|
unkown
|
page execute and write copy
|
||
BCA000
|
unkown
|
page execute and write copy
|
||
5AF5000
|
trusted library allocation
|
page read and write
|
||
5B57000
|
trusted library allocation
|
page read and write
|
||
5B19000
|
trusted library allocation
|
page read and write
|
||
14FF000
|
heap
|
page read and write
|
||
6029000
|
trusted library allocation
|
page read and write
|
||
60B3000
|
trusted library allocation
|
page read and write
|
||
5AE4000
|
trusted library allocation
|
page read and write
|
||
6068000
|
trusted library allocation
|
page read and write
|
||
A7EE000
|
stack
|
page read and write
|
||
1244000
|
heap
|
page read and write
|
||
618A000
|
trusted library allocation
|
page read and write
|
||
5B13000
|
trusted library allocation
|
page read and write
|
||
5321000
|
trusted library allocation
|
page read and write
|
||
593E000
|
stack
|
page read and write
|
||
5F8B000
|
trusted library allocation
|
page read and write
|
||
5BE8000
|
trusted library allocation
|
page read and write
|
||
789E000
|
stack
|
page read and write
|
||
14E2000
|
heap
|
page read and write
|
||
5B13000
|
trusted library allocation
|
page read and write
|
||
5F8B000
|
trusted library allocation
|
page read and write
|
||
6066000
|
trusted library allocation
|
page read and write
|
||
5B88000
|
trusted library allocation
|
page read and write
|
||
5F84000
|
trusted library allocation
|
page read and write
|
||
5B19000
|
trusted library allocation
|
page read and write
|
||
5B39000
|
trusted library allocation
|
page read and write
|
||
6050000
|
trusted library allocation
|
page read and write
|
||
617D000
|
trusted library allocation
|
page read and write
|
||
5AF1000
|
trusted library allocation
|
page read and write
|
||
134E000
|
stack
|
page read and write
|
||
5F86000
|
trusted library allocation
|
page read and write
|
||
785F000
|
stack
|
page read and write
|
||
6190000
|
trusted library allocation
|
page read and write
|
||
6089000
|
trusted library allocation
|
page read and write
|
||
1501000
|
heap
|
page read and write
|
||
5B18000
|
trusted library allocation
|
page read and write
|
||
4B21000
|
heap
|
page read and write
|
||
4B21000
|
heap
|
page read and write
|
||
5AF5000
|
trusted library allocation
|
page read and write
|
||
6E5F000
|
stack
|
page read and write
|
||
B61000
|
unkown
|
page execute and write copy
|
||
4C20000
|
trusted library allocation
|
page read and write
|
||
6083000
|
trusted library allocation
|
page read and write
|
||
811F000
|
stack
|
page read and write
|
||
5E5C000
|
stack
|
page read and write
|
||
5F89000
|
trusted library allocation
|
page read and write
|
||
3C1F000
|
stack
|
page read and write
|
||
5F8A000
|
trusted library allocation
|
page read and write
|
||
B98000
|
unkown
|
page execute and read and write
|
||
5B13000
|
trusted library allocation
|
page read and write
|
||
14FF000
|
heap
|
page read and write
|
||
5B39000
|
trusted library allocation
|
page read and write
|
||
60C8000
|
trusted library allocation
|
page read and write
|
||
67D0000
|
trusted library allocation
|
page execute and read and write
|
||
613A000
|
trusted library allocation
|
page read and write
|
||
5BB5000
|
trusted library allocation
|
page read and write
|
||
5B88000
|
trusted library allocation
|
page read and write
|
||
5B6C000
|
trusted library allocation
|
page read and write
|
||
606C000
|
trusted library allocation
|
page read and write
|
||
5B13000
|
trusted library allocation
|
page read and write
|
||
4A1E000
|
stack
|
page read and write
|
||
4B21000
|
heap
|
page read and write
|
||
6084000
|
trusted library allocation
|
page read and write
|
||
61CE000
|
trusted library allocation
|
page read and write
|
||
5F90000
|
trusted library allocation
|
page read and write
|
||
604F000
|
trusted library allocation
|
page read and write
|
||
5F85000
|
trusted library allocation
|
page read and write
|
||
5B13000
|
trusted library allocation
|
page read and write
|
||
5AF8000
|
trusted library allocation
|
page read and write
|
||
542A000
|
trusted library allocation
|
page read and write
|
||
5F8D000
|
trusted library allocation
|
page read and write
|
||
5B6D000
|
trusted library allocation
|
page read and write
|
||
5BAF000
|
trusted library allocation
|
page read and write
|
||
399F000
|
stack
|
page read and write
|
||
B73000
|
unkown
|
page execute and read and write
|
||
5BE8000
|
trusted library allocation
|
page read and write
|
||
6089000
|
trusted library allocation
|
page read and write
|
||
D1B000
|
stack
|
page read and write
|
||
7C1F000
|
stack
|
page read and write
|
||
602F000
|
trusted library allocation
|
page read and write
|
||
B32000
|
unkown
|
page execute and read and write
|
||
6024000
|
trusted library allocation
|
page read and write
|
||
6FDE000
|
stack
|
page read and write
|
||
5B13000
|
trusted library allocation
|
page read and write
|
||
6035000
|
trusted library allocation
|
page read and write
|
||
5C07000
|
trusted library allocation
|
page read and write
|
||
44DF000
|
stack
|
page read and write
|
||
5F8F000
|
trusted library allocation
|
page read and write
|
||
603D000
|
trusted library allocation
|
page read and write
|
||
5F5C000
|
trusted library allocation
|
page read and write
|
||
14CD000
|
heap
|
page read and write
|
||
5F83000
|
trusted library allocation
|
page read and write
|
||
5C0F000
|
trusted library allocation
|
page read and write
|
||
60A6000
|
trusted library allocation
|
page read and write
|
||
5B4E000
|
trusted library allocation
|
page read and write
|
||
5B57000
|
trusted library allocation
|
page read and write
|
||
14E1000
|
heap
|
page read and write
|
||
B46000
|
unkown
|
page execute and write copy
|
||
4B21000
|
heap
|
page read and write
|
||
5B95000
|
trusted library allocation
|
page read and write
|
||
5C11000
|
trusted library allocation
|
page read and write
|
||
6062000
|
trusted library allocation
|
page read and write
|
||
6512000
|
trusted library allocation
|
page execute and read and write
|
||
5F85000
|
trusted library allocation
|
page read and write
|
||
5AE4000
|
trusted library allocation
|
page read and write
|
||
6062000
|
trusted library allocation
|
page read and write
|
||
5BE8000
|
trusted library allocation
|
page read and write
|
||
60D7000
|
trusted library allocation
|
page read and write
|
||
74DE000
|
stack
|
page read and write
|
||
5B13000
|
trusted library allocation
|
page read and write
|
||
B48000
|
unkown
|
page execute and read and write
|
||
50E0000
|
direct allocation
|
page execute and read and write
|
||
5AEB000
|
trusted library allocation
|
page read and write
|
||
5F8B000
|
trusted library allocation
|
page read and write
|
||
8520000
|
heap
|
page read and write
|
||
70DF000
|
stack
|
page read and write
|
||
950000
|
unkown
|
page readonly
|
||
5F8A000
|
trusted library allocation
|
page read and write
|
||
C48000
|
unkown
|
page execute and write copy
|
||
5F87000
|
trusted library allocation
|
page read and write
|
||
5F94000
|
trusted library allocation
|
page read and write
|
||
8420000
|
direct allocation
|
page read and write
|
||
6066000
|
trusted library allocation
|
page read and write
|
||
6053000
|
trusted library allocation
|
page read and write
|
||
5B13000
|
trusted library allocation
|
page read and write
|
||
5B94000
|
trusted library allocation
|
page read and write
|
||
60BB000
|
trusted library allocation
|
page read and write
|
||
5BAB000
|
trusted library allocation
|
page read and write
|
||
5AEB000
|
trusted library allocation
|
page read and write
|
||
5BA8000
|
trusted library allocation
|
page read and write
|
||
6049000
|
trusted library allocation
|
page read and write
|
||
60C1000
|
trusted library allocation
|
page read and write
|
||
B9D000
|
unkown
|
page execute and read and write
|
||
5ECC000
|
trusted library allocation
|
page read and write
|
||
61C8000
|
trusted library allocation
|
page read and write
|
||
8780000
|
heap
|
page read and write
|
||
5BB5000
|
trusted library allocation
|
page read and write
|
||
6516000
|
trusted library allocation
|
page read and write
|
||
651A000
|
trusted library allocation
|
page execute and read and write
|
||
5DF3000
|
trusted library allocation
|
page read and write
|
||
1501000
|
heap
|
page read and write
|
||
5C07000
|
trusted library allocation
|
page read and write
|
||
5BC0000
|
trusted library allocation
|
page read and write
|
||
6081000
|
trusted library allocation
|
page read and write
|
||
5B70000
|
trusted library allocation
|
page read and write
|
||
5B0B000
|
trusted library allocation
|
page read and write
|
||
60DB000
|
trusted library allocation
|
page read and write
|
||
3EDE000
|
stack
|
page read and write
|
||
160E000
|
stack
|
page read and write
|
||
5B72000
|
trusted library allocation
|
page read and write
|
||
6029000
|
trusted library allocation
|
page read and write
|
||
14FB000
|
heap
|
page read and write
|
||
60CD000
|
trusted library allocation
|
page read and write
|
||
60FB000
|
trusted library allocation
|
page read and write
|
||
5B6E000
|
trusted library allocation
|
page read and write
|
||
88D0000
|
trusted library allocation
|
page read and write
|
||
147F000
|
heap
|
page read and write
|
||
4B21000
|
heap
|
page read and write
|
||
516E000
|
trusted library allocation
|
page read and write
|
||
5B29000
|
trusted library allocation
|
page read and write
|
||
5E0C000
|
trusted library allocation
|
page read and write
|
||
5C0D000
|
trusted library allocation
|
page read and write
|
||
5F88000
|
trusted library allocation
|
page read and write
|
||
60D0000
|
trusted library allocation
|
page read and write
|
||
5AF7000
|
trusted library allocation
|
page read and write
|
||
60C1000
|
trusted library allocation
|
page read and write
|
||
60B4000
|
trusted library allocation
|
page read and write
|
||
5AF3000
|
trusted library allocation
|
page read and write
|
||
5B02000
|
trusted library allocation
|
page read and write
|
||
1244000
|
heap
|
page read and write
|
||
609D000
|
trusted library allocation
|
page read and write
|
||
6064000
|
trusted library allocation
|
page read and write
|
||
1230000
|
direct allocation
|
page read and write
|
||
5AF7000
|
trusted library allocation
|
page read and write
|
||
60D7000
|
trusted library allocation
|
page read and write
|
||
1244000
|
heap
|
page read and write
|
||
5C19000
|
trusted library allocation
|
page read and write
|
||
64F0000
|
trusted library allocation
|
page read and write
|
||
4B21000
|
heap
|
page read and write
|
||
C42000
|
unkown
|
page execute and read and write
|
||
5F8A000
|
trusted library allocation
|
page read and write
|
||
5110000
|
direct allocation
|
page execute and read and write
|
||
5B4E000
|
trusted library allocation
|
page read and write
|
||
761E000
|
stack
|
page read and write
|
||
5B13000
|
trusted library allocation
|
page read and write
|
||
5AE4000
|
trusted library allocation
|
page read and write
|
||
1244000
|
heap
|
page read and write
|
||
5B7F000
|
trusted library allocation
|
page read and write
|
||
5F8B000
|
trusted library allocation
|
page read and write
|
||
1230000
|
direct allocation
|
page read and write
|
||
39DE000
|
stack
|
page read and write
|
||
6095000
|
trusted library allocation
|
page read and write
|
||
1244000
|
heap
|
page read and write
|
||
5B6D000
|
trusted library allocation
|
page read and write
|
||
5F90000
|
trusted library allocation
|
page read and write
|
||
14F0000
|
heap
|
page read and write
|
||
5B58000
|
trusted library allocation
|
page read and write
|
||
721F000
|
stack
|
page read and write
|
||
5B62000
|
trusted library allocation
|
page read and write
|
||
50DF000
|
stack
|
page read and write
|
||
4B1F000
|
stack
|
page read and write
|
||
5447000
|
trusted library allocation
|
page read and write
|
||
5AF3000
|
trusted library allocation
|
page read and write
|
||
602D000
|
trusted library allocation
|
page read and write
|
||
2EEE000
|
stack
|
page read and write
|
||
5E7C000
|
trusted library allocation
|
page read and write
|
||
1244000
|
heap
|
page read and write
|
||
D70000
|
heap
|
page read and write
|
||
5100000
|
direct allocation
|
page execute and read and write
|
||
53DE000
|
stack
|
page read and write
|
||
5B08000
|
trusted library allocation
|
page read and write
|
||
623E000
|
stack
|
page read and write
|
||
607F000
|
trusted library allocation
|
page read and write
|
||
1244000
|
heap
|
page read and write
|
||
5F88000
|
trusted library allocation
|
page read and write
|
||
5F89000
|
trusted library allocation
|
page read and write
|
||
5B13000
|
trusted library allocation
|
page read and write
|
||
5B77000
|
trusted library allocation
|
page read and write
|
||
624B000
|
trusted library allocation
|
page read and write
|
||
615D000
|
trusted library allocation
|
page read and write
|
||
5BB2000
|
trusted library allocation
|
page read and write
|
||
5120000
|
direct allocation
|
page execute and read and write
|
||
5C11000
|
trusted library allocation
|
page read and write
|
||
5F81000
|
trusted library allocation
|
page read and write
|
||
5F8D000
|
trusted library allocation
|
page read and write
|
||
5F86000
|
trusted library allocation
|
page read and write
|
||
83C0000
|
direct allocation
|
page read and write
|
||
5B6D000
|
trusted library allocation
|
page read and write
|
||
5F85000
|
trusted library allocation
|
page read and write
|
||
5B13000
|
trusted library allocation
|
page read and write
|
||
5BA6000
|
trusted library allocation
|
page read and write
|
||
6085000
|
trusted library allocation
|
page read and write
|
||
839F000
|
stack
|
page read and write
|
||
5F80000
|
trusted library allocation
|
page read and write
|
||
5428000
|
trusted library allocation
|
page read and write
|
||
5F83000
|
trusted library allocation
|
page read and write
|
||
5F88000
|
trusted library allocation
|
page read and write
|
||
14E2000
|
heap
|
page read and write
|
||
3B1E000
|
stack
|
page read and write
|
||
6080000
|
trusted library allocation
|
page read and write
|
||
5F8E000
|
trusted library allocation
|
page read and write
|
||
5F84000
|
trusted library allocation
|
page read and write
|
||
5B13000
|
trusted library allocation
|
page read and write
|
||
578F000
|
stack
|
page read and write
|
||
5BB1000
|
trusted library allocation
|
page read and write
|
||
1244000
|
heap
|
page read and write
|
||
61B6000
|
trusted library allocation
|
page read and write
|
||
1462000
|
heap
|
page read and write
|
||
5F87000
|
trusted library allocation
|
page read and write
|
||
5F85000
|
trusted library allocation
|
page read and write
|
||
83C0000
|
direct allocation
|
page read and write
|
||
5F8C000
|
trusted library allocation
|
page read and write
|
||
5432000
|
trusted library allocation
|
page read and write
|
||
6023000
|
trusted library allocation
|
page read and write
|
||
5E1E000
|
stack
|
page read and write
|
||
5DE3000
|
trusted library allocation
|
page read and write
|
||
618A000
|
trusted library allocation
|
page read and write
|
||
88D2000
|
trusted library allocation
|
page read and write
|
||
5F84000
|
trusted library allocation
|
page read and write
|
||
147F000
|
heap
|
page read and write
|
||
1230000
|
direct allocation
|
page read and write
|
||
551E000
|
stack
|
page read and write
|
||
5F87000
|
trusted library allocation
|
page read and write
|
||
5B95000
|
trusted library allocation
|
page read and write
|
||
615F000
|
trusted library allocation
|
page read and write
|
||
5B77000
|
trusted library allocation
|
page read and write
|
||
5F8B000
|
trusted library allocation
|
page read and write
|
||
5F81000
|
trusted library allocation
|
page read and write
|
||
5B5D000
|
trusted library allocation
|
page read and write
|
||
5B6D000
|
trusted library allocation
|
page read and write
|
||
34DE000
|
stack
|
page read and write
|
||
5B13000
|
trusted library allocation
|
page read and write
|
||
617F000
|
stack
|
page read and write
|
||
5B57000
|
trusted library allocation
|
page read and write
|
||
425E000
|
stack
|
page read and write
|
||
88D9000
|
trusted library allocation
|
page read and write
|
||
5B0C000
|
trusted library allocation
|
page read and write
|
||
5F89000
|
trusted library allocation
|
page read and write
|
||
5B01000
|
trusted library allocation
|
page read and write
|
||
5B6A000
|
trusted library allocation
|
page read and write
|
||
6D5E000
|
stack
|
page read and write
|
||
60D5000
|
trusted library allocation
|
page read and write
|
||
5F86000
|
trusted library allocation
|
page read and write
|
||
5C07000
|
trusted library allocation
|
page read and write
|
||
6089000
|
trusted library allocation
|
page read and write
|
||
6060000
|
trusted library allocation
|
page read and write
|
||
1475000
|
heap
|
page read and write
|
There are 970 hidden memdumps, click here to show them.
DOM / HTML
URL
|
Malicious
|
|
---|---|---|
https://learn.microsoft.com/en-us/dotnet/framework/install/application-not-started?version=(null)&processName=0zBsv1tnt4.exe&platform=0009&osver=6&isServer=0&shimver=4.0.30319.0
|
||
https://learn.microsoft.com/en-us/dotnet/framework/install/application-not-started?version=(null)&processName=0zBsv1tnt4.exe&platform=0009&osver=6&isServer=0&shimver=4.0.30319.0
|
||
https://learn.microsoft.com/en-us/dotnet/framework/install/application-not-started?version=(null)&processName=0zBsv1tnt4.exe&platform=0009&osver=6&isServer=0&shimver=4.0.30319.0
|
||
https://learn.microsoft.com/en-us/dotnet/framework/install/application-not-started?version=(null)&processName=0zBsv1tnt4.exe&platform=0009&osver=6&isServer=0&shimver=4.0.30319.0
|
||
https://learn.microsoft.com/en-us/dotnet/framework/install/application-not-started?version=(null)&processName=0zBsv1tnt4.exe&platform=0009&osver=6&isServer=0&shimver=4.0.30319.0
|