Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
file.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
initial sample
|
||
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Docs.lnk
|
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command
line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Sat Nov 23 13:37:37 2024, atime=Wed Sep 27 04:28:28
2023, length=1210144, window=hide
|
dropped
|
||
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Gmail.lnk
|
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command
line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Sat Nov 23 13:37:37 2024, atime=Wed Sep 27 04:28:28
2023, length=1210144, window=hide
|
dropped
|
||
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Google Drive.lnk
|
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command
line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Wed Oct 4 12:54:07 2023, atime=Wed Sep 27 04:28:28
2023, length=1210144, window=hide
|
dropped
|
||
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Sheets.lnk
|
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command
line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Sat Nov 23 13:37:37 2024, atime=Wed Sep 27 04:28:28
2023, length=1210144, window=hide
|
dropped
|
||
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Slides.lnk
|
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command
line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Sat Nov 23 13:37:37 2024, atime=Wed Sep 27 04:28:28
2023, length=1210144, window=hide
|
dropped
|
||
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\YouTube.lnk
|
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command
line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Sat Nov 23 13:37:37 2024, atime=Wed Sep 27 04:28:28
2023, length=1210144, window=hide
|
dropped
|
||
Chrome Cache Entry: 100
|
ASCII text, with very long lines (52717), with no line terminators
|
dropped
|
||
Chrome Cache Entry: 101
|
ASCII text
|
downloaded
|
||
Chrome Cache Entry: 102
|
ASCII text, with very long lines (52717), with no line terminators
|
downloaded
|
||
Chrome Cache Entry: 103
|
exported SGML document, ASCII text, with very long lines (65536), with no line terminators
|
downloaded
|
||
Chrome Cache Entry: 104
|
PNG image data, 533 x 478, 8-bit/color RGBA, non-interlaced
|
downloaded
|
||
Chrome Cache Entry: 105
|
MS Windows icon resource - 6 icons, -128x-128, 16 colors, 72x72, 16 colors
|
downloaded
|
||
Chrome Cache Entry: 106
|
ASCII text, with very long lines (46884)
|
downloaded
|
||
Chrome Cache Entry: 107
|
JSON data
|
dropped
|
||
Chrome Cache Entry: 108
|
MS Windows icon resource - 6 icons, -128x-128, 16 colors, 72x72, 16 colors
|
dropped
|
||
Chrome Cache Entry: 109
|
PNG image data, 658 x 480, 8-bit/color RGBA, non-interlaced
|
downloaded
|
||
Chrome Cache Entry: 110
|
ASCII text, with very long lines (33148), with no line terminators
|
dropped
|
||
Chrome Cache Entry: 111
|
JSON data
|
downloaded
|
||
Chrome Cache Entry: 112
|
PNG image data, 475 x 212, 8-bit/color RGBA, non-interlaced
|
downloaded
|
||
Chrome Cache Entry: 113
|
JSON data
|
downloaded
|
||
Chrome Cache Entry: 114
|
exported SGML document, ASCII text, with very long lines (65536), with no line terminators
|
dropped
|
||
Chrome Cache Entry: 115
|
ASCII text, with very long lines (46884)
|
dropped
|
||
Chrome Cache Entry: 116
|
ASCII text
|
dropped
|
||
Chrome Cache Entry: 117
|
SVG Scalable Vector Graphics image
|
downloaded
|
||
Chrome Cache Entry: 118
|
Web Open Font Format (Version 2), TrueType, length 19696, version 1.0
|
downloaded
|
||
Chrome Cache Entry: 119
|
ASCII text, with very long lines (33148), with no line terminators
|
downloaded
|
||
Chrome Cache Entry: 120
|
PNG image data, 475 x 212, 8-bit/color RGBA, non-interlaced
|
dropped
|
||
Chrome Cache Entry: 121
|
PNG image data, 658 x 480, 8-bit/color RGBA, non-interlaced
|
dropped
|
||
Chrome Cache Entry: 122
|
JSON data
|
dropped
|
||
Chrome Cache Entry: 123
|
HTML document, ASCII text, with very long lines (639), with CRLF, LF line terminators
|
downloaded
|
||
Chrome Cache Entry: 124
|
JSON data
|
downloaded
|
||
Chrome Cache Entry: 125
|
PNG image data, 533 x 478, 8-bit/color RGBA, non-interlaced
|
dropped
|
||
Chrome Cache Entry: 89
|
PNG image data, 533 x 478, 8-bit/color RGBA, non-interlaced
|
dropped
|
||
Chrome Cache Entry: 90
|
PNG image data, 533 x 478, 8-bit/color RGBA, non-interlaced
|
downloaded
|
||
Chrome Cache Entry: 91
|
SVG Scalable Vector Graphics image
|
dropped
|
||
Chrome Cache Entry: 92
|
JSON data
|
dropped
|
||
Chrome Cache Entry: 93
|
PNG image data, 533 x 478, 8-bit/color RGBA, non-interlaced
|
dropped
|
||
Chrome Cache Entry: 94
|
ASCII text, with very long lines (65536), with no line terminators
|
downloaded
|
||
Chrome Cache Entry: 95
|
ASCII text, with no line terminators
|
downloaded
|
||
Chrome Cache Entry: 96
|
JSON data
|
dropped
|
||
Chrome Cache Entry: 97
|
ASCII text, with very long lines (65410)
|
downloaded
|
||
Chrome Cache Entry: 98
|
JSON data
|
downloaded
|
||
Chrome Cache Entry: 99
|
PNG image data, 533 x 478, 8-bit/color RGBA, non-interlaced
|
downloaded
|
There are 34 hidden files, click here to show them.
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\file.exe
|
"C:\Users\user\Desktop\file.exe"
|
||
C:\Program Files\Google\Chrome\Application\chrome.exe
|
"C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized --single-argument http://go.microsoft.com/fwlink/?prd=11324&pver=4.5&sbp=AppLaunch2&plcid=0x409&o1=SHIM_NOVERSION_FOUND&version=(null)&processName=file.exe&platform=0009&osver=6&isServer=0&shimver=4.0.30319.0
|
||
C:\Program Files\Google\Chrome\Application\chrome.exe
|
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US
--service-sandbox-type=none --mojo-platform-channel-handle=2096 --field-trial-handle=2000,i,5454548092775656080,16599925680545359581,262144
--disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction
/prefetch:8
|
||
C:\Program Files\Google\Chrome\Application\chrome.exe
|
"C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized --single-argument http://go.microsoft.com/fwlink/?prd=11324&pver=4.5&sbp=AppLaunch2&plcid=0x409&o1=SHIM_NOVERSION_FOUND&version=(null)&processName=file.exe&platform=0009&osver=6&isServer=0&shimver=4.0.30319.0
|
||
C:\Program Files\Google\Chrome\Application\chrome.exe
|
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US
--service-sandbox-type=none --mojo-platform-channel-handle=1512 --field-trial-handle=1980,i,3811379757786440935,1444168497897757390,262144
--disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction
/prefetch:8
|
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
https://authoring-docs-microsoft.poolparty.biz/devrel/7696cda6-0510-47f6-8302-71bb5d2e28cf
|
unknown
|
||
https://duckduckgo.com/chrome_newtab
|
unknown
|
||
https://duckduckgo.com/ac/?q=
|
unknown
|
||
https://property-imper.sbs/api
|
104.21.33.116
|
||
https://imp.mt48.net/static?id=7RHzfOIXjFEYsBdvIpkX4Qqm4p8dfCfm4pbW1pbWfpbW7ReNxR3UIG8zInwYIFIVs9eYi
|
unknown
|
||
https://github.com/dotnet/docs/blob/17c4acca45e573a92878a44a2cce57d699fe9c7c/docs/framework/install/
|
unknown
|
||
https://bridge.sfo1.admarketplace.net/ctp?version=16.0.0&key=1696425136400800000.2&ci=1696425136743.
|
unknown
|
||
https://www.linkedin.com/cws/share?url=$
|
unknown
|
||
https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
|
unknown
|
||
https://github.com/Youssef1313
|
unknown
|
||
https://management.azure.com/providers/Microsoft.Portal/userSettings/cloudconsole?api-version=2023-0
|
unknown
|
||
https://aka.ms/msignite_docs_banner
|
unknown
|
||
https://videoencodingpublic-hgeaeyeba8gycee3.b01.azurefd.net/public-b4da8140-92cf-421c-8b7b-e471d5b9
|
unknown
|
||
http://polymer.github.io/AUTHORS.txt
|
unknown
|
||
https://github.com/dotnet/docs/issues/new?template=z-customer-feedback.yml
|
unknown
|
||
https://management.azure.com/subscriptions?api-version=2016-06-01
|
unknown
|
||
https://github.com/dotnet/docs/blob/main/docs/framework/install/application-not-started.md
|
unknown
|
||
http://x1.c.lencr.org/0
|
unknown
|
||
http://x1.i.lencr.org/0
|
unknown
|
||
https://aka.ms/pshelpmechoose
|
unknown
|
||
https://aka.ms/feedback/report?space=61
|
unknown
|
||
https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
|
unknown
|
||
https://learn-video.azurefd.net/vod/player
|
unknown
|
||
https://twitter.com/intent/tweet?original_referer=$
|
unknown
|
||
https://github.com/gewarren
|
unknown
|
||
http://185.215.113.16/off/def.exepleWebKit/537.36
|
unknown
|
||
https://property-imper.sbs/apix
|
unknown
|
||
https://support.mozilla.org/products/firefoxgro.all
|
unknown
|
||
http://polymer.github.io/CONTRIBUTORS.txt
|
unknown
|
||
https://github.com/dotnet/docs/blob/live/docs/framework/install/application-not-started.md
|
unknown
|
||
https://authoring-docs-microsoft.poolparty.biz/devrel/69c76c32-967e-4c65-b89a-74cc527db725
|
unknown
|
||
https://client-api.arkoselabs.com/v2/api.js
|
unknown
|
||
https://aka.ms/MSIgniteChallenge/Tier1Banner?wt.mc_id=ignite24_learnbanner_tier1_cnl
|
unknown
|
||
https://management.azure.com/providers/Microsoft.Portal/consoles/default?api-version=2017-12-01-prev
|
unknown
|
||
https://www.google.com/images/branding/product/ico/googleg_lodp.ico
|
unknown
|
||
https://github.com/Thraka
|
unknown
|
||
http://polymer.github.io/PATENTS.txt
|
unknown
|
||
https://aka.ms/certhelp
|
unknown
|
||
http://185.215.113.16/steam/random.exe
|
unknown
|
||
http://go.mi
|
unknown
|
||
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
|
unknown
|
||
http://crl.rootca1.amazontrust.com/rootca1.crl0
|
unknown
|
||
https://github.com/mairaw
|
unknown
|
||
https://js.monitor.azure.com/scripts/c/ms.jsll-4.min.js
|
13.107.246.63
|
||
http://ocsp.rootca1.amazontrust.com0:
|
unknown
|
||
https://schema.org
|
unknown
|
||
http://polymer.github.io/LICENSE.txt
|
unknown
|
||
https://www.ecosia.org/newtab/
|
unknown
|
||
http://31.41.244.11/files/rnd.exe
|
unknown
|
||
https://bridge.sfo1.ap01.net/ctp?version=16.0.0&key=1696425136400800000.1&ci=1696425136743.12791&cta
|
unknown
|
||
https://property-imper.sbs/
|
unknown
|
||
https://support.mozilla.org/kb/customize-firefox-controls-buttons-and-toolbars?utm_source=firefox-br
|
unknown
|
||
https://aka.ms/yourcaliforniaprivacychoices
|
unknown
|
||
https://ac.ecosia.org/autocomplete?q=
|
unknown
|
||
https://github.com/nschonni
|
unknown
|
||
http://185.215.113.16/
|
unknown
|
||
https://videoencodingpublic-hgeaeyeba8gycee3.b01.azurefd.net/public-09ce73a6-05a5-4e4d-b3d7-bd5a8c05
|
unknown
|
||
https://contile-images.services.mozilla.com/u1AuJcj32cbVUf9NjMipLXEYwu2uFIt4lsj-ccwVqEs.36904.jpg
|
unknown
|
||
https://github.com/adegeo
|
unknown
|
||
https://contile-images.services.mozilla.com/obgoOYObjIFea_bXuT6L4LbBJ8j425AD87S1HMD3BWg.9991.jpg
|
unknown
|
||
http://185.215.113.16/off/def.exe9
|
unknown
|
||
https://github.com/jonschlinkert/is-plain-object
|
unknown
|
||
http://crt.rootca1.amazontrust.com/rootca1.cer0?
|
unknown
|
||
https://octokit.github.io/rest.js/#throttling
|
unknown
|
||
https://www.bestbuy.com/site/electronics/top-deals/pcmcat1563299784494.c/?id=pcmcat1563299784494&ref
|
unknown
|
||
https://property-imper.sbs/api1
|
unknown
|
||
https://github.com/js-cookie/js-cookie
|
unknown
|
||
https://www.amazon.com/?tag=admarketus-20&ref=pd_sl_35787f1071928bc3a1aef90b79c9bee9c64ba6683fde7477
|
unknown
|
||
http://185.215.113.16/off/def.exe
|
unknown
|
||
http://schema.org/Organization
|
unknown
|
||
https://channel9.msdn.com/
|
unknown
|
||
https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
|
unknown
|
||
https://github.com/dotnet/try
|
unknown
|
There are 63 hidden URLs, click here to show them.
Domains
Name
|
IP
|
Malicious
|
|
---|---|---|---|
property-imper.sbs
|
104.21.33.116
|
||
www.google.com
|
172.217.21.36
|
||
s-part-0035.t-0009.t-msedge.net
|
13.107.246.63
|
||
js.monitor.azure.com
|
unknown
|
||
mdec.nelreports.net
|
unknown
|
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
192.168.2.5
|
unknown
|
unknown
|
||
13.107.246.63
|
s-part-0035.t-0009.t-msedge.net
|
United States
|
||
185.215.113.16
|
unknown
|
Portugal
|
||
239.255.255.250
|
unknown
|
Reserved
|
||
104.21.33.116
|
property-imper.sbs
|
United States
|
||
172.217.21.36
|
www.google.com
|
United States
|
Registry
Path
|
Value
|
Malicious
|
|
---|---|---|---|
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer
|
SlowContextMenuEntries
|
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
5549000
|
trusted library allocation
|
page read and write
|
||
5828000
|
trusted library allocation
|
page read and write
|
||
5F23000
|
trusted library allocation
|
page read and write
|
||
44F1000
|
heap
|
page read and write
|
||
336F000
|
stack
|
page read and write
|
||
5414000
|
trusted library allocation
|
page read and write
|
||
5414000
|
trusted library allocation
|
page read and write
|
||
3EAF000
|
stack
|
page read and write
|
||
54FD000
|
trusted library allocation
|
page read and write
|
||
7D1F000
|
stack
|
page read and write
|
||
54B8000
|
trusted library allocation
|
page read and write
|
||
4AAF000
|
stack
|
page read and write
|
||
6A9E000
|
stack
|
page read and write
|
||
44F1000
|
heap
|
page read and write
|
||
54FD000
|
trusted library allocation
|
page read and write
|
||
5905000
|
trusted library allocation
|
page read and write
|
||
721E000
|
stack
|
page read and write
|
||
548D000
|
trusted library allocation
|
page read and write
|
||
582A000
|
trusted library allocation
|
page read and write
|
||
4AC0000
|
remote allocation
|
page read and write
|
||
E20000
|
heap
|
page read and write
|
||
54FD000
|
trusted library allocation
|
page read and write
|
||
E25000
|
heap
|
page read and write
|
||
53E0000
|
heap
|
page read and write
|
||
75DE000
|
stack
|
page read and write
|
||
593F000
|
trusted library allocation
|
page read and write
|
||
5569000
|
trusted library allocation
|
page read and write
|
||
582D000
|
trusted library allocation
|
page read and write
|
||
5829000
|
trusted library allocation
|
page read and write
|
||
58E7000
|
trusted library allocation
|
page read and write
|
||
5A71000
|
trusted library allocation
|
page read and write
|
||
54FD000
|
trusted library allocation
|
page read and write
|
||
7D30000
|
direct allocation
|
page read and write
|
||
54F9000
|
trusted library allocation
|
page read and write
|
||
E48000
|
heap
|
page read and write
|
||
5437000
|
trusted library allocation
|
page read and write
|
||
7BDF000
|
stack
|
page read and write
|
||
5468000
|
trusted library allocation
|
page read and write
|
||
E38000
|
heap
|
page read and write
|
||
54C1000
|
trusted library allocation
|
page read and write
|
||
54F0000
|
trusted library allocation
|
page read and write
|
||
5498000
|
trusted library allocation
|
page read and write
|
||
54F9000
|
trusted library allocation
|
page read and write
|
||
54FD000
|
trusted library allocation
|
page read and write
|
||
54C1000
|
trusted library allocation
|
page read and write
|
||
54FD000
|
trusted library allocation
|
page read and write
|
||
5964000
|
trusted library allocation
|
page read and write
|
||
5A9A000
|
trusted library allocation
|
page read and write
|
||
54A1000
|
trusted library allocation
|
page read and write
|
||
609C000
|
stack
|
page read and write
|
||
54FD000
|
trusted library allocation
|
page read and write
|
||
59F2000
|
trusted library allocation
|
page read and write
|
||
54B1000
|
trusted library allocation
|
page read and write
|
||
5AEF000
|
trusted library allocation
|
page read and write
|
||
D50000
|
heap
|
page read and write
|
||
E40000
|
heap
|
page read and write
|
||
5827000
|
trusted library allocation
|
page read and write
|
||
5903000
|
trusted library allocation
|
page read and write
|
||
5499000
|
trusted library allocation
|
page read and write
|
||
769000
|
unkown
|
page execute and read and write
|
||
A27000
|
unkown
|
page execute and read and write
|
||
44EF000
|
stack
|
page read and write
|
||
5966000
|
trusted library allocation
|
page read and write
|
||
E2D000
|
heap
|
page read and write
|
||
54C1000
|
trusted library allocation
|
page read and write
|
||
5949000
|
trusted library allocation
|
page read and write
|
||
5826000
|
trusted library allocation
|
page read and write
|
||
54FD000
|
trusted library allocation
|
page read and write
|
||
3EEE000
|
stack
|
page read and write
|
||
54C1000
|
trusted library allocation
|
page read and write
|
||
E40000
|
heap
|
page read and write
|
||
5825000
|
trusted library allocation
|
page read and write
|
||
799E000
|
stack
|
page read and write
|
||
54AD000
|
trusted library allocation
|
page read and write
|
||
416E000
|
stack
|
page read and write
|
||
CDE000
|
stack
|
page read and write
|
||
52CE000
|
stack
|
page read and write
|
||
58F4000
|
trusted library allocation
|
page read and write
|
||
54F9000
|
trusted library allocation
|
page read and write
|
||
58E9000
|
trusted library allocation
|
page read and write
|
||
5F2E000
|
trusted library allocation
|
page execute and read and write
|
||
54FD000
|
trusted library allocation
|
page read and write
|
||
546A000
|
trusted library allocation
|
page read and write
|
||
A28000
|
unkown
|
page execute and write copy
|
||
54C1000
|
trusted library allocation
|
page read and write
|
||
54DA000
|
trusted library allocation
|
page read and write
|
||
547F000
|
trusted library allocation
|
page read and write
|
||
54C1000
|
trusted library allocation
|
page read and write
|
||
5A07000
|
trusted library allocation
|
page read and write
|
||
4E8E000
|
stack
|
page read and write
|
||
582D000
|
trusted library allocation
|
page read and write
|
||
6CE000
|
stack
|
page read and write
|
||
54FD000
|
trusted library allocation
|
page read and write
|
||
5829000
|
trusted library allocation
|
page read and write
|
||
54FD000
|
trusted library allocation
|
page read and write
|
||
5489000
|
trusted library allocation
|
page read and write
|
||
E36000
|
heap
|
page read and write
|
||
54B0000
|
trusted library allocation
|
page read and write
|
||
594A000
|
trusted library allocation
|
page read and write
|
||
592B000
|
trusted library allocation
|
page read and write
|
||
5449000
|
trusted library allocation
|
page read and write
|
||
5512000
|
trusted library allocation
|
page read and write
|
||
5950000
|
trusted library allocation
|
page read and write
|
||
7D30000
|
direct allocation
|
page read and write
|
||
44F1000
|
heap
|
page read and write
|
||
5906000
|
trusted library allocation
|
page read and write
|
||
548B000
|
trusted library allocation
|
page read and write
|
||
E14000
|
heap
|
page read and write
|
||
29EF000
|
stack
|
page read and write
|
||
5940000
|
trusted library allocation
|
page read and write
|
||
6E5E000
|
stack
|
page read and write
|
||
5422000
|
trusted library allocation
|
page read and write
|
||
54FD000
|
trusted library allocation
|
page read and write
|
||
5499000
|
trusted library allocation
|
page read and write
|
||
710000
|
unkown
|
page readonly
|
||
711000
|
unkown
|
page execute and write copy
|
||
3FEF000
|
stack
|
page read and write
|
||
54B1000
|
trusted library allocation
|
page read and write
|
||
549E000
|
trusted library allocation
|
page read and write
|
||
700000
|
direct allocation
|
page read and write
|
||
5497000
|
trusted library allocation
|
page read and write
|
||
54C1000
|
trusted library allocation
|
page read and write
|
||
546A000
|
trusted library allocation
|
page read and write
|
||
5A09000
|
trusted library allocation
|
page read and write
|
||
5941000
|
trusted library allocation
|
page read and write
|
||
54FD000
|
trusted library allocation
|
page read and write
|
||
54FD000
|
trusted library allocation
|
page read and write
|
||
58E8000
|
trusted library allocation
|
page read and write
|
||
5824000
|
trusted library allocation
|
page read and write
|
||
795F000
|
stack
|
page read and write
|
||
58BE000
|
trusted library allocation
|
page read and write
|
||
2FAF000
|
stack
|
page read and write
|
||
731F000
|
stack
|
page read and write
|
||
82AC000
|
stack
|
page read and write
|
||
4FCF000
|
stack
|
page read and write
|
||
631E000
|
stack
|
page read and write
|
||
4AF0000
|
direct allocation
|
page execute and read and write
|
||
43AF000
|
stack
|
page read and write
|
||
54FD000
|
trusted library allocation
|
page read and write
|
||
593E000
|
trusted library allocation
|
page read and write
|
||
4AD0000
|
direct allocation
|
page execute and read and write
|
||
700000
|
direct allocation
|
page read and write
|
||
83EE000
|
stack
|
page read and write
|
||
4970000
|
direct allocation
|
page read and write
|
||
5822000
|
trusted library allocation
|
page read and write
|
||
7D90000
|
direct allocation
|
page read and write
|
||
44F1000
|
heap
|
page read and write
|
||
595C000
|
trusted library allocation
|
page read and write
|
||
54FD000
|
trusted library allocation
|
page read and write
|
||
58E2000
|
trusted library allocation
|
page read and write
|
||
58E3000
|
trusted library allocation
|
page read and write
|
||
582D000
|
trusted library allocation
|
page read and write
|
||
5822000
|
trusted library allocation
|
page read and write
|
||
E36000
|
heap
|
page read and write
|
||
54FD000
|
trusted library allocation
|
page read and write
|
||
54D8000
|
trusted library allocation
|
page read and write
|
||
700000
|
direct allocation
|
page read and write
|
||
544B000
|
trusted library allocation
|
page read and write
|
||
700000
|
direct allocation
|
page read and write
|
||
59E1000
|
trusted library allocation
|
page read and write
|
||
54FD000
|
trusted library allocation
|
page read and write
|
||
542C000
|
trusted library allocation
|
page read and write
|
||
5412000
|
trusted library allocation
|
page read and write
|
||
D5E000
|
heap
|
page read and write
|
||
54C1000
|
trusted library allocation
|
page read and write
|
||
272B000
|
stack
|
page read and write
|
||
27AE000
|
stack
|
page read and write
|
||
BD3000
|
unkown
|
page execute and read and write
|
||
7F20000
|
direct allocation
|
page execute and read and write
|
||
549D000
|
trusted library allocation
|
page read and write
|
||
49AC000
|
stack
|
page read and write
|
||
548C000
|
trusted library allocation
|
page read and write
|
||
3B2E000
|
stack
|
page read and write
|
||
5D86000
|
trusted library allocation
|
page read and write
|
||
54B1000
|
trusted library allocation
|
page read and write
|
||
5416000
|
trusted library allocation
|
page read and write
|
||
54E0000
|
trusted library allocation
|
page read and write
|
||
4D8E000
|
stack
|
page read and write
|
||
E38000
|
heap
|
page read and write
|
||
44F0000
|
heap
|
page read and write
|
||
7D30000
|
direct allocation
|
page read and write
|
||
E2D000
|
heap
|
page read and write
|
||
7D30000
|
direct allocation
|
page read and write
|
||
70DE000
|
stack
|
page read and write
|
||
54D6000
|
trusted library allocation
|
page read and write
|
||
54B0000
|
trusted library allocation
|
page read and write
|
||
5822000
|
trusted library allocation
|
page read and write
|
||
5824000
|
trusted library allocation
|
page read and write
|
||
27D0000
|
direct allocation
|
page execute and read and write
|
||
5979000
|
trusted library allocation
|
page read and write
|
||
E1B000
|
heap
|
page read and write
|
||
276E000
|
stack
|
page read and write
|
||
58F8000
|
trusted library allocation
|
page read and write
|
||
5489000
|
trusted library allocation
|
page read and write
|
||
DBB000
|
heap
|
page read and write
|
||
7D30000
|
direct allocation
|
page read and write
|
||
5966000
|
trusted library allocation
|
page read and write
|
||
E38000
|
heap
|
page read and write
|
||
E3D000
|
heap
|
page read and write
|
||
54FD000
|
trusted library allocation
|
page read and write
|
||
E40000
|
heap
|
page read and write
|
||
593C000
|
trusted library allocation
|
page read and write
|
||
54AA000
|
trusted library allocation
|
page read and write
|
||
595E000
|
trusted library allocation
|
page read and write
|
||
5A19000
|
trusted library allocation
|
page read and write
|
||
4AE0000
|
direct allocation
|
page execute and read and write
|
||
54FD000
|
trusted library allocation
|
page read and write
|
||
6040000
|
trusted library allocation
|
page execute and read and write
|
||
5962000
|
trusted library allocation
|
page read and write
|
||
54C1000
|
trusted library allocation
|
page read and write
|
||
54B0000
|
trusted library allocation
|
page read and write
|
||
5444000
|
trusted library allocation
|
page read and write
|
||
511F000
|
stack
|
page read and write
|
||
5AED000
|
trusted library allocation
|
page read and write
|
||
5489000
|
trusted library allocation
|
page read and write
|
||
D5A000
|
heap
|
page read and write
|
||
5825000
|
trusted library allocation
|
page read and write
|
||
E4B000
|
heap
|
page read and write
|
||
54C1000
|
trusted library allocation
|
page read and write
|
||
592D000
|
trusted library allocation
|
page read and write
|
||
58E1000
|
trusted library allocation
|
page read and write
|
||
54F9000
|
trusted library allocation
|
page read and write
|
||
4B00000
|
direct allocation
|
page execute and read and write
|
||
2BEF000
|
stack
|
page read and write
|
||
E45000
|
heap
|
page read and write
|
||
548C000
|
trusted library allocation
|
page read and write
|
||
54C1000
|
trusted library allocation
|
page read and write
|
||
54F0000
|
trusted library allocation
|
page read and write
|
||
54C1000
|
trusted library allocation
|
page read and write
|
||
549E000
|
trusted library allocation
|
page read and write
|
||
58DA000
|
trusted library allocation
|
page read and write
|
||
54A5000
|
trusted library allocation
|
page read and write
|
||
376E000
|
stack
|
page read and write
|
||
592C000
|
trusted library allocation
|
page read and write
|
||
5827000
|
trusted library allocation
|
page read and write
|
||
5DA0000
|
trusted library allocation
|
page read and write
|
||
541B000
|
trusted library allocation
|
page read and write
|
||
54AE000
|
trusted library allocation
|
page read and write
|
||
54FD000
|
trusted library allocation
|
page read and write
|
||
582F000
|
trusted library allocation
|
page read and write
|
||
5497000
|
trusted library allocation
|
page read and write
|
||
5432000
|
trusted library allocation
|
page read and write
|
||
5414000
|
trusted library allocation
|
page read and write
|
||
54FD000
|
trusted library allocation
|
page read and write
|
||
543A000
|
trusted library allocation
|
page read and write
|
||
54B1000
|
trusted library allocation
|
page read and write
|
||
54C1000
|
trusted library allocation
|
page read and write
|
||
54FD000
|
trusted library allocation
|
page read and write
|
||
84EE000
|
stack
|
page read and write
|
||
54B1000
|
trusted library allocation
|
page read and write
|
||
548B000
|
trusted library allocation
|
page read and write
|
||
67DF000
|
stack
|
page read and write
|
||
595E000
|
trusted library allocation
|
page read and write
|
||
5952000
|
trusted library allocation
|
page read and write
|
||
58C0000
|
trusted library allocation
|
page read and write
|
||
5960000
|
trusted library allocation
|
page read and write
|
||
59D0000
|
trusted library allocation
|
page read and write
|
||
645E000
|
stack
|
page read and write
|
||
5A66000
|
trusted library allocation
|
page read and write
|
||
54FD000
|
trusted library allocation
|
page read and write
|
||
2EAE000
|
stack
|
page read and write
|
||
54C1000
|
trusted library allocation
|
page read and write
|
||
44F1000
|
heap
|
page read and write
|
||
54C1000
|
trusted library allocation
|
page read and write
|
||
54FD000
|
trusted library allocation
|
page read and write
|
||
54DB000
|
trusted library allocation
|
page read and write
|
||
E24000
|
heap
|
page read and write
|
||
54B8000
|
trusted library allocation
|
page read and write
|
||
700000
|
direct allocation
|
page read and write
|
||
54B1000
|
trusted library allocation
|
page read and write
|
||
F4E000
|
stack
|
page read and write
|
||
5489000
|
trusted library allocation
|
page read and write
|
||
549B000
|
trusted library allocation
|
page read and write
|
||
7D30000
|
direct allocation
|
page read and write
|
||
54C1000
|
trusted library allocation
|
page read and write
|
||
54C1000
|
trusted library allocation
|
page read and write
|
||
7D30000
|
direct allocation
|
page read and write
|
||
5D93000
|
trusted library allocation
|
page read and write
|
||
58F6000
|
trusted library allocation
|
page read and write
|
||
54B1000
|
trusted library allocation
|
page read and write
|
||
58C3000
|
trusted library allocation
|
page read and write
|
||
7D30000
|
direct allocation
|
page read and write
|
||
546A000
|
trusted library allocation
|
page read and write
|
||
745F000
|
stack
|
page read and write
|
||
543A000
|
trusted library allocation
|
page read and write
|
||
54DB000
|
trusted library allocation
|
page read and write
|
||
54FA000
|
trusted library allocation
|
page read and write
|
||
54FD000
|
trusted library allocation
|
page read and write
|
||
5828000
|
trusted library allocation
|
page read and write
|
||
5828000
|
trusted library allocation
|
page read and write
|
||
5489000
|
trusted library allocation
|
page read and write
|
||
54FD000
|
trusted library allocation
|
page read and write
|
||
326E000
|
stack
|
page read and write
|
||
700000
|
direct allocation
|
page read and write
|
||
2D6E000
|
stack
|
page read and write
|
||
54C1000
|
trusted library allocation
|
page read and write
|
||
54FD000
|
trusted library allocation
|
page read and write
|
||
55E9000
|
trusted library allocation
|
page read and write
|
||
544C000
|
trusted library allocation
|
page read and write
|
||
6CDF000
|
stack
|
page read and write
|
||
6F9E000
|
stack
|
page read and write
|
||
54FD000
|
trusted library allocation
|
page read and write
|
||
54FD000
|
trusted library allocation
|
page read and write
|
||
543D000
|
trusted library allocation
|
page read and write
|
||
E30000
|
heap
|
page read and write
|
||
7D30000
|
direct allocation
|
page read and write
|
||
582E000
|
trusted library allocation
|
page read and write
|
||
5C74000
|
trusted library allocation
|
page read and write
|
||
E14000
|
heap
|
page read and write
|
||
59B8000
|
trusted library allocation
|
page read and write
|
||
5A88000
|
trusted library allocation
|
page read and write
|
||
548B000
|
trusted library allocation
|
page read and write
|
||
5489000
|
trusted library allocation
|
page read and write
|
||
D91000
|
heap
|
page read and write
|
||
590E000
|
trusted library allocation
|
page read and write
|
||
582B000
|
trusted library allocation
|
page read and write
|
||
E30000
|
heap
|
page read and write
|
||
7D30000
|
trusted library allocation
|
page read and write
|
||
3D6F000
|
stack
|
page read and write
|
||
5422000
|
trusted library allocation
|
page read and write
|
||
44F1000
|
heap
|
page read and write
|
||
5939000
|
trusted library allocation
|
page read and write
|
||
54A1000
|
trusted library allocation
|
page read and write
|
||
582B000
|
trusted library allocation
|
page read and write
|
||
54B0000
|
trusted library allocation
|
page read and write
|
||
54E0000
|
trusted library allocation
|
page read and write
|
||
4AC0000
|
direct allocation
|
page execute and read and write
|
||
54AD000
|
trusted library allocation
|
page read and write
|
||
549E000
|
trusted library allocation
|
page read and write
|
||
5959000
|
stack
|
page read and write
|
||
54C1000
|
trusted library allocation
|
page read and write
|
||
8030000
|
trusted library allocation
|
page read and write
|
||
54F0000
|
trusted library allocation
|
page read and write
|
||
4AD0000
|
direct allocation
|
page execute and read and write
|
||
5904000
|
trusted library allocation
|
page read and write
|
||
549B000
|
trusted library allocation
|
page read and write
|
||
44F1000
|
heap
|
page read and write
|
||
6A5F000
|
stack
|
page read and write
|
||
7D30000
|
direct allocation
|
page read and write
|
||
5826000
|
trusted library allocation
|
page read and write
|
||
E36000
|
heap
|
page read and write
|
||
544A000
|
trusted library allocation
|
page read and write
|
||
54B1000
|
trusted library allocation
|
page read and write
|
||
54B4000
|
trusted library allocation
|
page read and write
|
||
5499000
|
trusted library allocation
|
page read and write
|
||
54AD000
|
trusted library allocation
|
page read and write
|
||
541B000
|
trusted library allocation
|
page read and write
|
||
700000
|
direct allocation
|
page read and write
|
||
58F6000
|
trusted library allocation
|
page read and write
|
||
5495000
|
trusted library allocation
|
page read and write
|
||
54FD000
|
trusted library allocation
|
page read and write
|
||
54FD000
|
trusted library allocation
|
page read and write
|
||
54B8000
|
trusted library allocation
|
page read and write
|
||
34AF000
|
stack
|
page read and write
|
||
54FD000
|
trusted library allocation
|
page read and write
|
||
54FC000
|
trusted library allocation
|
page read and write
|
||
546A000
|
trusted library allocation
|
page read and write
|
||
5AAD000
|
trusted library allocation
|
page read and write
|
||
54B8000
|
trusted library allocation
|
page read and write
|
||
549D000
|
trusted library allocation
|
page read and write
|
||
5ABF000
|
stack
|
page read and write
|
||
548B000
|
trusted library allocation
|
page read and write
|
||
781F000
|
stack
|
page read and write
|
||
54B1000
|
trusted library allocation
|
page read and write
|
||
5494000
|
trusted library allocation
|
page read and write
|
||
543A000
|
trusted library allocation
|
page read and write
|
||
592E000
|
trusted library allocation
|
page read and write
|
||
54C1000
|
trusted library allocation
|
page read and write
|
||
54AD000
|
trusted library allocation
|
page read and write
|
||
7C1E000
|
stack
|
page read and write
|
||
54C1000
|
trusted library allocation
|
page read and write
|
||
7A9F000
|
stack
|
page read and write
|
||
58D8000
|
trusted library allocation
|
page read and write
|
||
54AD000
|
trusted library allocation
|
page read and write
|
||
54BA000
|
trusted library allocation
|
page read and write
|
||
4AD0000
|
direct allocation
|
page execute and read and write
|
||
5830000
|
trusted library allocation
|
page read and write
|
||
54FD000
|
trusted library allocation
|
page read and write
|
||
44F1000
|
heap
|
page read and write
|
||
54AA000
|
trusted library allocation
|
page read and write
|
||
5827000
|
trusted library allocation
|
page read and write
|
||
5824000
|
trusted library allocation
|
page read and write
|
||
58F9000
|
trusted library allocation
|
page read and write
|
||
525D000
|
stack
|
page read and write
|
||
54FD000
|
trusted library allocation
|
page read and write
|
||
372F000
|
stack
|
page read and write
|
||
5828000
|
trusted library allocation
|
page read and write
|
||
44F1000
|
heap
|
page read and write
|
||
5493000
|
trusted library allocation
|
page read and write
|
||
E4D000
|
heap
|
page read and write
|
||
5493000
|
trusted library allocation
|
page read and write
|
||
D20000
|
heap
|
page read and write
|
||
54A1000
|
trusted library allocation
|
page read and write
|
||
5468000
|
trusted library allocation
|
page read and write
|
||
700000
|
direct allocation
|
page read and write
|
||
4AD0000
|
direct allocation
|
page execute and read and write
|
||
681E000
|
stack
|
page read and write
|
||
1CB000
|
stack
|
page read and write
|
||
594D000
|
trusted library allocation
|
page read and write
|
||
5438000
|
trusted library allocation
|
page read and write
|
||
54A1000
|
trusted library allocation
|
page read and write
|
||
54FD000
|
trusted library allocation
|
page read and write
|
||
3C2E000
|
stack
|
page read and write
|
||
544C000
|
trusted library allocation
|
page read and write
|
||
E44000
|
heap
|
page read and write
|
||
44F1000
|
heap
|
page read and write
|
||
54C1000
|
trusted library allocation
|
page read and write
|
||
7EF0000
|
direct allocation
|
page execute and read and write
|
||
5437000
|
trusted library allocation
|
page read and write
|
||
54D9000
|
trusted library allocation
|
page read and write
|
||
544C000
|
trusted library allocation
|
page read and write
|
||
544A000
|
trusted library allocation
|
page read and write
|
||
54BB000
|
trusted library allocation
|
page read and write
|
||
5827000
|
trusted library allocation
|
page read and write
|
||
8032000
|
trusted library allocation
|
page read and write
|
||
5411000
|
trusted library allocation
|
page read and write
|
||
5917000
|
trusted library allocation
|
page read and write
|
||
548B000
|
trusted library allocation
|
page read and write
|
||
735E000
|
stack
|
page read and write
|
||
9810000
|
trusted library allocation
|
page read and write
|
||
54B1000
|
trusted library allocation
|
page read and write
|
||
5909000
|
trusted library allocation
|
page read and write
|
||
5907000
|
trusted library allocation
|
page read and write
|
||
6E1F000
|
stack
|
page read and write
|
||
59F4000
|
trusted library allocation
|
page read and write
|
||
5828000
|
trusted library allocation
|
page read and write
|
||
54B0000
|
trusted library allocation
|
page read and write
|
||
D88000
|
heap
|
page read and write
|
||
58C7000
|
trusted library allocation
|
page read and write
|
||
5422000
|
trusted library allocation
|
page read and write
|
||
54FD000
|
trusted library allocation
|
page read and write
|
||
548D000
|
trusted library allocation
|
page read and write
|
||
55B4000
|
trusted library allocation
|
page read and write
|
||
54FD000
|
trusted library allocation
|
page read and write
|
||
54B0000
|
trusted library allocation
|
page read and write
|
||
E40000
|
heap
|
page read and write
|
||
44F1000
|
heap
|
page read and write
|
||
5422000
|
trusted library allocation
|
page read and write
|
||
E2D000
|
heap
|
page read and write
|
||
54F9000
|
trusted library allocation
|
page read and write
|
||
709F000
|
stack
|
page read and write
|
||
5A68000
|
trusted library allocation
|
page read and write
|
||
54B1000
|
trusted library allocation
|
page read and write
|
||
E30000
|
heap
|
page read and write
|
||
5A3F000
|
trusted library allocation
|
page read and write
|
||
548C000
|
trusted library allocation
|
page read and write
|
||
5825000
|
trusted library allocation
|
page read and write
|
||
3C6E000
|
stack
|
page read and write
|
||
59B0000
|
trusted library allocation
|
page read and write
|
||
5822000
|
trusted library allocation
|
page read and write
|
||
54B1000
|
trusted library allocation
|
page read and write
|
||
E30000
|
heap
|
page read and write
|
||
53E3000
|
heap
|
page read and write
|
||
33AE000
|
stack
|
page read and write
|
||
54B1000
|
trusted library allocation
|
page read and write
|
||
E36000
|
heap
|
page read and write
|
||
5822000
|
trusted library allocation
|
page read and write
|
||
5457000
|
trusted library allocation
|
page read and write
|
||
593E000
|
trusted library allocation
|
page read and write
|
||
592D000
|
trusted library allocation
|
page read and write
|
||
58F7000
|
trusted library allocation
|
page read and write
|
||
A0F000
|
unkown
|
page execute and read and write
|
||
54C1000
|
trusted library allocation
|
page read and write
|
||
545A000
|
trusted library allocation
|
page read and write
|
||
44F1000
|
heap
|
page read and write
|
||
541B000
|
trusted library allocation
|
page read and write
|
||
5621000
|
trusted library allocation
|
page read and write
|
||
54FD000
|
trusted library allocation
|
page read and write
|
||
5414000
|
trusted library allocation
|
page read and write
|
||
9790000
|
trusted library allocation
|
page read and write
|
||
582A000
|
trusted library allocation
|
page read and write
|
||
594D000
|
trusted library allocation
|
page read and write
|
||
759F000
|
stack
|
page read and write
|
||
DB7000
|
heap
|
page read and write
|
||
54FD000
|
trusted library allocation
|
page read and write
|
||
541B000
|
trusted library allocation
|
page read and write
|
||
7D90000
|
direct allocation
|
page read and write
|
||
E30000
|
heap
|
page read and write
|
||
5489000
|
trusted library allocation
|
page read and write
|
||
5681000
|
trusted library allocation
|
page read and write
|
||
54FD000
|
trusted library allocation
|
page read and write
|
||
548F000
|
trusted library allocation
|
page read and write
|
||
5440000
|
trusted library allocation
|
page read and write
|
||
E1B000
|
heap
|
page read and write
|
||
DA2000
|
heap
|
page read and write
|
||
5468000
|
trusted library allocation
|
page read and write
|
||
54AB000
|
trusted library allocation
|
page read and write
|
||
54C1000
|
trusted library allocation
|
page read and write
|
||
66DE000
|
stack
|
page read and write
|
||
27E7000
|
heap
|
page read and write
|
||
54B8000
|
trusted library allocation
|
page read and write
|
||
5497000
|
trusted library allocation
|
page read and write
|
||
54AE000
|
trusted library allocation
|
page read and write
|
||
6050000
|
trusted library allocation
|
page execute and read and write
|
||
E42000
|
heap
|
page read and write
|
||
54C1000
|
trusted library allocation
|
page read and write
|
||
362E000
|
stack
|
page read and write
|
||
5489000
|
trusted library allocation
|
page read and write
|
||
582F000
|
trusted library allocation
|
page read and write
|
||
58BF000
|
trusted library allocation
|
page read and write
|
||
5829000
|
trusted library allocation
|
page read and write
|
||
59AE000
|
trusted library allocation
|
page read and write
|
||
5410000
|
trusted library allocation
|
page read and write
|
||
54A1000
|
trusted library allocation
|
page read and write
|
||
700000
|
direct allocation
|
page read and write
|
||
7DCB000
|
stack
|
page read and write
|
||
767000
|
unkown
|
page write copy
|
||
5941000
|
trusted library allocation
|
page read and write
|
||
596E000
|
trusted library allocation
|
page read and write
|
||
582B000
|
trusted library allocation
|
page read and write
|
||
5827000
|
trusted library allocation
|
page read and write
|
||
5AAB000
|
trusted library allocation
|
page read and write
|
||
5489000
|
trusted library allocation
|
page read and write
|
||
54FD000
|
trusted library allocation
|
page read and write
|
||
4AD0000
|
direct allocation
|
page execute and read and write
|
||
4D4D000
|
stack
|
page read and write
|
||
61DE000
|
stack
|
page read and write
|
||
54FB000
|
trusted library allocation
|
page read and write
|
||
548F000
|
trusted library allocation
|
page read and write
|
||
4C0C000
|
stack
|
page read and write
|
||
700000
|
direct allocation
|
page read and write
|
||
54FD000
|
trusted library allocation
|
page read and write
|
||
543A000
|
trusted library allocation
|
page read and write
|
||
541A000
|
trusted library allocation
|
page read and write
|
||
426F000
|
stack
|
page read and write
|
||
771E000
|
stack
|
page read and write
|
||
549B000
|
trusted library allocation
|
page read and write
|
||
44F1000
|
heap
|
page read and write
|
||
54FD000
|
trusted library allocation
|
page read and write
|
||
E38000
|
heap
|
page read and write
|
||
54C3000
|
trusted library allocation
|
page read and write
|
||
541B000
|
trusted library allocation
|
page read and write
|
||
541B000
|
trusted library allocation
|
page read and write
|
||
54C1000
|
trusted library allocation
|
page read and write
|
||
54FD000
|
trusted library allocation
|
page read and write
|
||
695E000
|
stack
|
page read and write
|
||
582A000
|
trusted library allocation
|
page read and write
|
||
5947000
|
trusted library allocation
|
page read and write
|
||
58C9000
|
trusted library allocation
|
page read and write
|
||
BD4000
|
unkown
|
page execute and write copy
|
||
54AD000
|
trusted library allocation
|
page read and write
|
||
541D000
|
trusted library allocation
|
page read and write
|
||
4500000
|
heap
|
page read and write
|
||
54C1000
|
trusted library allocation
|
page read and write
|
||
28EF000
|
stack
|
page read and write
|
||
59CA000
|
trusted library allocation
|
page read and write
|
||
641F000
|
stack
|
page read and write
|
||
54AF000
|
trusted library allocation
|
page read and write
|
||
54A1000
|
trusted library allocation
|
page read and write
|
||
54B1000
|
trusted library allocation
|
page read and write
|
||
5824000
|
trusted library allocation
|
page read and write
|
||
548B000
|
trusted library allocation
|
page read and write
|
||
54E5000
|
trusted library allocation
|
page read and write
|
||
5DA2000
|
trusted library allocation
|
page execute and read and write
|
||
54F0000
|
trusted library allocation
|
page read and write
|
||
27B0000
|
direct allocation
|
page read and write
|
||
5436000
|
trusted library allocation
|
page read and write
|
||
D1E000
|
stack
|
page read and write
|
||
8039000
|
trusted library allocation
|
page read and write
|
||
5A60000
|
trusted library allocation
|
page read and write
|
||
5825000
|
trusted library allocation
|
page read and write
|
||
597F000
|
trusted library allocation
|
page read and write
|
||
5497000
|
trusted library allocation
|
page read and write
|
||
30EF000
|
stack
|
page read and write
|
||
44F1000
|
heap
|
page read and write
|
||
54B8000
|
trusted library allocation
|
page read and write
|
||
5489000
|
trusted library allocation
|
page read and write
|
||
5437000
|
trusted library allocation
|
page read and write
|
||
5A3D000
|
trusted library allocation
|
page read and write
|
||
582B000
|
trusted library allocation
|
page read and write
|
||
5497000
|
trusted library allocation
|
page read and write
|
||
4B1E000
|
trusted library allocation
|
page read and write
|
||
54A1000
|
trusted library allocation
|
page read and write
|
||
582E000
|
trusted library allocation
|
page read and write
|
||
755000
|
unkown
|
page execute and read and write
|
||
5823000
|
trusted library allocation
|
page read and write
|
||
549D000
|
trusted library allocation
|
page read and write
|
||
5468000
|
trusted library allocation
|
page read and write
|
||
592F000
|
trusted library allocation
|
page read and write
|
||
5444000
|
trusted library allocation
|
page read and write
|
||
582D000
|
trusted library allocation
|
page read and write
|
||
548F000
|
trusted library allocation
|
page read and write
|
||
4AC0000
|
remote allocation
|
page read and write
|
||
A27000
|
unkown
|
page execute and write copy
|
||
2FEE000
|
stack
|
page read and write
|
||
54F9000
|
trusted library allocation
|
page read and write
|
||
62DF000
|
stack
|
page read and write
|
||
39AF000
|
stack
|
page read and write
|
||
58C5000
|
trusted library allocation
|
page read and write
|
||
322F000
|
stack
|
page read and write
|
||
44F1000
|
heap
|
page read and write
|
||
5494000
|
trusted library allocation
|
page read and write
|
||
54D5000
|
trusted library allocation
|
page read and write
|
||
54FD000
|
trusted library allocation
|
page read and write
|
||
E4B000
|
heap
|
page read and write
|
||
5948000
|
trusted library allocation
|
page read and write
|
||
548C000
|
trusted library allocation
|
page read and write
|
||
54FD000
|
trusted library allocation
|
page read and write
|
||
54C1000
|
trusted library allocation
|
page read and write
|
||
7D30000
|
direct allocation
|
page read and write
|
||
DFF000
|
heap
|
page read and write
|
||
54D0000
|
trusted library allocation
|
page read and write
|
||
7D30000
|
direct allocation
|
page read and write
|
||
55B9000
|
trusted library allocation
|
page read and write
|
||
54FD000
|
trusted library allocation
|
page read and write
|
||
54B1000
|
trusted library allocation
|
page read and write
|
||
7D60000
|
trusted library allocation
|
page read and write
|
||
5497000
|
trusted library allocation
|
page read and write
|
||
5464000
|
trusted library allocation
|
page read and write
|
||
54B1000
|
trusted library allocation
|
page read and write
|
||
54FD000
|
trusted library allocation
|
page read and write
|
||
542C000
|
trusted library allocation
|
page read and write
|
||
5825000
|
trusted library allocation
|
page read and write
|
||
5427000
|
trusted library allocation
|
page read and write
|
||
54B1000
|
trusted library allocation
|
page read and write
|
||
E40000
|
heap
|
page read and write
|
||
54F9000
|
trusted library allocation
|
page read and write
|
||
E1B000
|
heap
|
page read and write
|
||
54FD000
|
trusted library allocation
|
page read and write
|
||
5499000
|
trusted library allocation
|
page read and write
|
||
749E000
|
stack
|
page read and write
|
||
544C000
|
trusted library allocation
|
page read and write
|
||
496D000
|
stack
|
page read and write
|
||
5489000
|
trusted library allocation
|
page read and write
|
||
54B1000
|
trusted library allocation
|
page read and write
|
||
54C1000
|
trusted library allocation
|
page read and write
|
||
54F9000
|
trusted library allocation
|
page read and write
|
||
76DF000
|
stack
|
page read and write
|
||
6F5F000
|
stack
|
page read and write
|
||
548B000
|
trusted library allocation
|
page read and write
|
||
44F1000
|
heap
|
page read and write
|
||
58C5000
|
trusted library allocation
|
page read and write
|
||
58D0000
|
trusted library allocation
|
page read and write
|
||
54B7000
|
trusted library allocation
|
page read and write
|
||
5830000
|
trusted library allocation
|
page read and write
|
||
8FB000
|
unkown
|
page execute and read and write
|
||
402E000
|
stack
|
page read and write
|
||
412F000
|
stack
|
page read and write
|
||
54C1000
|
trusted library allocation
|
page read and write
|
||
54C1000
|
trusted library allocation
|
page read and write
|
||
E30000
|
heap
|
page read and write
|
||
548C000
|
trusted library allocation
|
page read and write
|
||
5489000
|
trusted library allocation
|
page read and write
|
||
5968000
|
trusted library allocation
|
page read and write
|
||
5A5E000
|
trusted library allocation
|
page read and write
|
||
5825000
|
trusted library allocation
|
page read and write
|
||
54D8000
|
trusted library allocation
|
page read and write
|
||
83AC000
|
stack
|
page read and write
|
||
5422000
|
trusted library allocation
|
page read and write
|
||
544A000
|
trusted library allocation
|
page read and write
|
||
54C4000
|
trusted library allocation
|
page read and write
|
||
54FD000
|
trusted library allocation
|
page read and write
|
||
5826000
|
trusted library allocation
|
page read and write
|
||
58EB000
|
trusted library allocation
|
page read and write
|
||
44F1000
|
heap
|
page read and write
|
||
5518000
|
trusted library allocation
|
page read and write
|
||
42AE000
|
stack
|
page read and write
|
||
691F000
|
stack
|
page read and write
|
||
535000
|
heap
|
page read and write
|
||
E4D000
|
heap
|
page read and write
|
||
54DD000
|
trusted library allocation
|
page read and write
|
||
4AD0000
|
direct allocation
|
page execute and read and write
|
||
54FD000
|
trusted library allocation
|
page read and write
|
||
5435000
|
trusted library allocation
|
page read and write
|
||
604E000
|
trusted library allocation
|
page execute and read and write
|
||
582A000
|
trusted library allocation
|
page read and write
|
||
53CF000
|
stack
|
page read and write
|
||
54C1000
|
trusted library allocation
|
page read and write
|
||
54FD000
|
trusted library allocation
|
page read and write
|
||
54B1000
|
trusted library allocation
|
page read and write
|
||
700000
|
direct allocation
|
page read and write
|
||
549B000
|
trusted library allocation
|
page read and write
|
||
582A000
|
trusted library allocation
|
page read and write
|
||
44F1000
|
heap
|
page read and write
|
||
5827000
|
trusted library allocation
|
page read and write
|
||
590C000
|
trusted library allocation
|
page read and write
|
||
5915000
|
trusted library allocation
|
page read and write
|
||
5829000
|
trusted library allocation
|
page read and write
|
||
71DF000
|
stack
|
page read and write
|
||
5513000
|
trusted library allocation
|
page read and write
|
||
5827000
|
trusted library allocation
|
page read and write
|
||
E1A000
|
heap
|
page read and write
|
||
5826000
|
trusted library allocation
|
page read and write
|
||
5826000
|
trusted library allocation
|
page read and write
|
||
582D000
|
trusted library allocation
|
page read and write
|
||
542C000
|
trusted library allocation
|
page read and write
|
||
7ECE000
|
stack
|
page read and write
|
||
54FD000
|
trusted library allocation
|
page read and write
|
||
68E000
|
stack
|
page read and write
|
||
5485000
|
trusted library allocation
|
page read and write
|
||
594F000
|
trusted library allocation
|
page read and write
|
||
5455000
|
trusted library allocation
|
page read and write
|
||
54DB000
|
trusted library allocation
|
page read and write
|
||
582D000
|
trusted library allocation
|
page read and write
|
||
5416000
|
trusted library allocation
|
page read and write
|
||
45F0000
|
trusted library allocation
|
page read and write
|
||
58CE000
|
trusted library allocation
|
page read and write
|
||
6F0000
|
heap
|
page read and write
|
||
5411000
|
trusted library allocation
|
page read and write
|
||
5495000
|
trusted library allocation
|
page read and write
|
||
5827000
|
trusted library allocation
|
page read and write
|
||
4AC0000
|
remote allocation
|
page read and write
|
||
548C000
|
trusted library allocation
|
page read and write
|
||
5531000
|
trusted library allocation
|
page read and write
|
||
5420000
|
trusted library allocation
|
page read and write
|
||
542C000
|
trusted library allocation
|
page read and write
|
||
44F1000
|
heap
|
page read and write
|
||
54DB000
|
trusted library allocation
|
page read and write
|
||
54B0000
|
trusted library allocation
|
page read and write
|
||
35EF000
|
stack
|
page read and write
|
||
5433000
|
trusted library allocation
|
page read and write
|
||
58F9000
|
trusted library allocation
|
page read and write
|
||
5828000
|
trusted library allocation
|
page read and write
|
||
44F1000
|
heap
|
page read and write
|
||
501E000
|
stack
|
page read and write
|
||
596C000
|
trusted library allocation
|
page read and write
|
||
54BE000
|
trusted library allocation
|
page read and write
|
||
5454000
|
trusted library allocation
|
page read and write
|
||
582B000
|
trusted library allocation
|
page read and write
|
||
5981000
|
trusted library allocation
|
page read and write
|
||
E1B000
|
heap
|
page read and write
|
||
2C2E000
|
stack
|
page read and write
|
||
54B0000
|
trusted library allocation
|
page read and write
|
||
54FD000
|
trusted library allocation
|
page read and write
|
||
5A8A000
|
trusted library allocation
|
page read and write
|
||
55E1000
|
trusted library allocation
|
page read and write
|
||
54B1000
|
trusted library allocation
|
page read and write
|
||
5827000
|
trusted library allocation
|
page read and write
|
||
5493000
|
trusted library allocation
|
page read and write
|
||
5820000
|
trusted library allocation
|
page read and write
|
||
54FD000
|
trusted library allocation
|
page read and write
|
||
58D6000
|
trusted library allocation
|
page read and write
|
||
5497000
|
trusted library allocation
|
page read and write
|
||
5A73000
|
trusted library allocation
|
page read and write
|
||
547F000
|
trusted library allocation
|
page read and write
|
||
54FD000
|
trusted library allocation
|
page read and write
|
||
54C1000
|
trusted library allocation
|
page read and write
|
||
582D000
|
trusted library allocation
|
page read and write
|
||
54C1000
|
trusted library allocation
|
page read and write
|
||
E4B000
|
heap
|
page read and write
|
||
59B6000
|
trusted library allocation
|
page read and write
|
||
548B000
|
trusted library allocation
|
page read and write
|
||
58E4000
|
trusted library allocation
|
page read and write
|
||
A19000
|
unkown
|
page execute and read and write
|
||
5825000
|
trusted library allocation
|
page read and write
|
||
5495000
|
trusted library allocation
|
page read and write
|
||
54E4000
|
trusted library allocation
|
page read and write
|
||
E29000
|
heap
|
page read and write
|
||
54B1000
|
trusted library allocation
|
page read and write
|
||
4C4D000
|
stack
|
page read and write
|
||
54C1000
|
trusted library allocation
|
page read and write
|
||
E47000
|
heap
|
page read and write
|
||
594B000
|
trusted library allocation
|
page read and write
|
||
E3B000
|
heap
|
page read and write
|
||
5A9C000
|
trusted library allocation
|
page read and write
|
||
549B000
|
trusted library allocation
|
page read and write
|
||
5495000
|
trusted library allocation
|
page read and write
|
||
54C1000
|
trusted library allocation
|
page read and write
|
||
544A000
|
trusted library allocation
|
page read and write
|
||
5820000
|
trusted library allocation
|
page read and write
|
||
6B9F000
|
stack
|
page read and write
|
||
582D000
|
trusted library allocation
|
page read and write
|
||
54C3000
|
trusted library allocation
|
page read and write
|
||
54B4000
|
trusted library allocation
|
page read and write
|
||
5825000
|
trusted library allocation
|
page read and write
|
||
541B000
|
trusted library allocation
|
page read and write
|
||
54C3000
|
trusted library allocation
|
page read and write
|
||
59CE000
|
trusted library allocation
|
page read and write
|
||
4FB000
|
stack
|
page read and write
|
||
54B1000
|
trusted library allocation
|
page read and write
|
||
5430000
|
trusted library allocation
|
page read and write
|
||
54A1000
|
trusted library allocation
|
page read and write
|
||
669F000
|
stack
|
page read and write
|
||
49B4000
|
direct allocation
|
page read and write
|
||
548B000
|
trusted library allocation
|
page read and write
|
||
27B0000
|
direct allocation
|
page read and write
|
||
6D1E000
|
stack
|
page read and write
|
||
54C1000
|
trusted library allocation
|
page read and write
|
||
5AD0000
|
direct allocation
|
page read and write
|
||
5827000
|
trusted library allocation
|
page read and write
|
||
619F000
|
stack
|
page read and write
|
||
58E5000
|
trusted library allocation
|
page read and write
|
||
5829000
|
trusted library allocation
|
page read and write
|
||
544A000
|
trusted library allocation
|
page read and write
|
||
59BE000
|
stack
|
page read and write
|
||
5822000
|
trusted library allocation
|
page read and write
|
||
598E000
|
trusted library allocation
|
page read and write
|
||
5960000
|
trusted library allocation
|
page read and write
|
||
5498000
|
trusted library allocation
|
page read and write
|
||
548B000
|
trusted library allocation
|
page read and write
|
||
54A4000
|
trusted library allocation
|
page read and write
|
||
44F1000
|
heap
|
page read and write
|
||
27B0000
|
direct allocation
|
page read and write
|
||
54FD000
|
trusted library allocation
|
page read and write
|
||
543E000
|
trusted library allocation
|
page read and write
|
||
54C1000
|
trusted library allocation
|
page read and write
|
||
700000
|
direct allocation
|
page read and write
|
||
548B000
|
trusted library allocation
|
page read and write
|
||
5498000
|
trusted library allocation
|
page read and write
|
||
548B000
|
trusted library allocation
|
page read and write
|
||
549E000
|
trusted library allocation
|
page read and write
|
||
548F000
|
trusted library allocation
|
page read and write
|
||
582F000
|
trusted library allocation
|
page read and write
|
||
5437000
|
trusted library allocation
|
page read and write
|
||
7EE0000
|
heap
|
page read and write
|
||
E4B000
|
heap
|
page read and write
|
||
582B000
|
trusted library allocation
|
page read and write
|
||
43EE000
|
stack
|
page read and write
|
||
54FD000
|
trusted library allocation
|
page read and write
|
||
54E0000
|
trusted library allocation
|
page read and write
|
||
54B1000
|
trusted library allocation
|
page read and write
|
||
544C000
|
trusted library allocation
|
page read and write
|
||
5432000
|
trusted library allocation
|
page read and write
|
||
5943000
|
trusted library allocation
|
page read and write
|
||
312E000
|
stack
|
page read and write
|
||
54FD000
|
trusted library allocation
|
page read and write
|
||
7D90000
|
direct allocation
|
page read and write
|
||
54A1000
|
trusted library allocation
|
page read and write
|
||
54FD000
|
trusted library allocation
|
page read and write
|
||
6BDE000
|
stack
|
page read and write
|
||
5620000
|
trusted library allocation
|
page read and write
|
||
3AEF000
|
stack
|
page read and write
|
||
DD9000
|
heap
|
page read and write
|
||
5824000
|
trusted library allocation
|
page read and write
|
||
54FD000
|
trusted library allocation
|
page read and write
|
||
54BA000
|
trusted library allocation
|
page read and write
|
||
597B000
|
trusted library allocation
|
page read and write
|
||
58E6000
|
trusted library allocation
|
page read and write
|
||
542A000
|
trusted library allocation
|
page read and write
|
||
4AB0000
|
direct allocation
|
page execute and read and write
|
||
593B000
|
trusted library allocation
|
page read and write
|
||
548B000
|
trusted library allocation
|
page read and write
|
||
55F1000
|
trusted library allocation
|
page read and write
|
||
541A000
|
trusted library allocation
|
page read and write
|
||
564A000
|
trusted library allocation
|
page read and write
|
||
655F000
|
stack
|
page read and write
|
||
543A000
|
trusted library allocation
|
page read and write
|
||
582F000
|
trusted library allocation
|
page read and write
|
||
54F9000
|
trusted library allocation
|
page read and write
|
||
515D000
|
stack
|
page read and write
|
||
5622000
|
trusted library allocation
|
page read and write
|
||
E1D000
|
heap
|
page read and write
|
||
582B000
|
trusted library allocation
|
page read and write
|
||
54AA000
|
trusted library allocation
|
page read and write
|
||
7D30000
|
direct allocation
|
page read and write
|
||
582B000
|
trusted library allocation
|
page read and write
|
||
59CC000
|
trusted library allocation
|
page read and write
|
||
785E000
|
stack
|
page read and write
|
||
2D2F000
|
stack
|
page read and write
|
||
39EE000
|
stack
|
page read and write
|
||
9E5000
|
unkown
|
page execute and read and write
|
||
7ADE000
|
stack
|
page read and write
|
||
3DAE000
|
stack
|
page read and write
|
||
58FB000
|
trusted library allocation
|
page read and write
|
||
5512000
|
trusted library allocation
|
page read and write
|
||
547F000
|
trusted library allocation
|
page read and write
|
||
5444000
|
trusted library allocation
|
page read and write
|
||
549E000
|
trusted library allocation
|
page read and write
|
||
27E0000
|
heap
|
page read and write
|
||
54B0000
|
trusted library allocation
|
page read and write
|
||
5489000
|
trusted library allocation
|
page read and write
|
||
E0C000
|
heap
|
page read and write
|
||
711000
|
unkown
|
page execute and read and write
|
||
54D5000
|
trusted library allocation
|
page read and write
|
||
54F9000
|
trusted library allocation
|
page read and write
|
||
767000
|
unkown
|
page read and write
|
||
530000
|
heap
|
page read and write
|
||
54F0000
|
trusted library allocation
|
page read and write
|
||
54D8000
|
trusted library allocation
|
page read and write
|
||
54A1000
|
trusted library allocation
|
page read and write
|
||
5990000
|
trusted library allocation
|
page read and write
|
||
5DAA000
|
trusted library allocation
|
page execute and read and write
|
||
5485000
|
trusted library allocation
|
page read and write
|
||
4ECE000
|
stack
|
page read and write
|
||
34EE000
|
stack
|
page read and write
|
||
54A1000
|
trusted library allocation
|
page read and write
|
||
5820000
|
trusted library allocation
|
page read and write
|
||
710000
|
unkown
|
page read and write
|
||
54FD000
|
trusted library allocation
|
page read and write
|
||
54FD000
|
trusted library allocation
|
page read and write
|
||
5820000
|
trusted library allocation
|
page read and write
|
||
542C000
|
trusted library allocation
|
page read and write
|
||
5828000
|
trusted library allocation
|
page read and write
|
||
5831000
|
trusted library allocation
|
page read and write
|
||
700000
|
direct allocation
|
page read and write
|
||
54D5000
|
trusted library allocation
|
page read and write
|
||
58D8000
|
trusted library allocation
|
page read and write
|
||
542C000
|
trusted library allocation
|
page read and write
|
||
54AD000
|
trusted library allocation
|
page read and write
|
||
44F1000
|
heap
|
page read and write
|
||
54B8000
|
trusted library allocation
|
page read and write
|
||
54F9000
|
trusted library allocation
|
page read and write
|
||
549E000
|
trusted library allocation
|
page read and write
|
||
54FD000
|
trusted library allocation
|
page read and write
|
||
5822000
|
trusted library allocation
|
page read and write
|
||
5DA6000
|
trusted library allocation
|
page read and write
|
||
7D30000
|
direct allocation
|
page read and write
|
||
541B000
|
trusted library allocation
|
page read and write
|
||
620000
|
heap
|
page read and write
|
||
54C1000
|
trusted library allocation
|
page read and write
|
||
541A000
|
trusted library allocation
|
page read and write
|
||
2E6F000
|
stack
|
page read and write
|
||
54B4000
|
trusted library allocation
|
page read and write
|
||
54B1000
|
trusted library allocation
|
page read and write
|
||
8020000
|
heap
|
page read and write
|
||
5499000
|
trusted library allocation
|
page read and write
|
||
543D000
|
trusted library allocation
|
page read and write
|
||
585A000
|
stack
|
page read and write
|
||
E38000
|
heap
|
page read and write
|
||
582D000
|
trusted library allocation
|
page read and write
|
||
5449000
|
trusted library allocation
|
page read and write
|
||
54E4000
|
trusted library allocation
|
page read and write
|
||
2AEF000
|
stack
|
page read and write
|
||
54F9000
|
trusted library allocation
|
page read and write
|
||
5422000
|
trusted library allocation
|
page read and write
|
||
548B000
|
trusted library allocation
|
page read and write
|
||
700000
|
direct allocation
|
page read and write
|
||
540000
|
heap
|
page read and write
|
||
38AE000
|
stack
|
page read and write
|
||
54AF000
|
trusted library allocation
|
page read and write
|
||
E38000
|
heap
|
page read and write
|
||
58C1000
|
trusted library allocation
|
page read and write
|
||
386F000
|
stack
|
page read and write
|
||
54FD000
|
trusted library allocation
|
page read and write
|
||
5494000
|
trusted library allocation
|
page read and write
|
||
5828000
|
trusted library allocation
|
page read and write
|
||
54E8000
|
trusted library allocation
|
page read and write
|
||
54C1000
|
trusted library allocation
|
page read and write
|
||
44F1000
|
heap
|
page read and write
|
||
54FD000
|
trusted library allocation
|
page read and write
|
||
54FD000
|
trusted library allocation
|
page read and write
|
||
5494000
|
trusted library allocation
|
page read and write
|
||
54FD000
|
trusted library allocation
|
page read and write
|
||
659E000
|
stack
|
page read and write
|
||
58C3000
|
trusted library allocation
|
page read and write
|
||
59DF000
|
trusted library allocation
|
page read and write
|
||
54FD000
|
trusted library allocation
|
page read and write
|
||
5A14000
|
trusted library allocation
|
page read and write
|
There are 928 hidden memdumps, click here to show them.
DOM / HTML
URL
|
Malicious
|
|
---|---|---|
https://learn.microsoft.com/en-us/dotnet/framework/install/application-not-started?version=(null)&processName=file.exe&platform=0009&osver=6&isServer=0&shimver=4.0.30319.0
|
||
https://learn.microsoft.com/en-us/dotnet/framework/install/application-not-started?version=(null)&processName=file.exe&platform=0009&osver=6&isServer=0&shimver=4.0.30319.0
|
||
https://learn.microsoft.com/en-us/dotnet/framework/install/application-not-started?version=(null)&processName=file.exe&platform=0009&osver=6&isServer=0&shimver=4.0.30319.0
|
||
https://learn.microsoft.com/en-us/dotnet/framework/install/application-not-started?version=(null)&processName=file.exe&platform=0009&osver=6&isServer=0&shimver=4.0.30319.0
|