Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
file.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
initial sample
|
||
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Docs.lnk
|
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command
line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Sat Nov 23 15:44:43 2024, atime=Wed Sep 27 04:28:28
2023, length=1210144, window=hide
|
dropped
|
||
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Gmail.lnk
|
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command
line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Sat Nov 23 15:44:43 2024, atime=Wed Sep 27 04:28:28
2023, length=1210144, window=hide
|
dropped
|
||
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Google Drive.lnk
|
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command
line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Wed Oct 4 12:54:07 2023, atime=Wed Sep 27 04:28:28
2023, length=1210144, window=hide
|
dropped
|
||
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Sheets.lnk
|
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command
line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Sat Nov 23 15:44:43 2024, atime=Wed Sep 27 04:28:28
2023, length=1210144, window=hide
|
dropped
|
||
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Slides.lnk
|
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command
line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Sat Nov 23 15:44:43 2024, atime=Wed Sep 27 04:28:28
2023, length=1210144, window=hide
|
dropped
|
||
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\YouTube.lnk
|
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command
line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Sat Nov 23 15:44:43 2024, atime=Wed Sep 27 04:28:28
2023, length=1210144, window=hide
|
dropped
|
||
Chrome Cache Entry: 100
|
MS Windows icon resource - 6 icons, -128x-128, 16 colors, 72x72, 16 colors
|
downloaded
|
||
Chrome Cache Entry: 101
|
ASCII text, with very long lines (46884)
|
downloaded
|
||
Chrome Cache Entry: 102
|
JSON data
|
dropped
|
||
Chrome Cache Entry: 103
|
MS Windows icon resource - 6 icons, -128x-128, 16 colors, 72x72, 16 colors
|
dropped
|
||
Chrome Cache Entry: 104
|
PNG image data, 658 x 480, 8-bit/color RGBA, non-interlaced
|
downloaded
|
||
Chrome Cache Entry: 105
|
ASCII text, with very long lines (33148), with no line terminators
|
dropped
|
||
Chrome Cache Entry: 106
|
JSON data
|
downloaded
|
||
Chrome Cache Entry: 107
|
PNG image data, 475 x 212, 8-bit/color RGBA, non-interlaced
|
downloaded
|
||
Chrome Cache Entry: 108
|
JSON data
|
downloaded
|
||
Chrome Cache Entry: 109
|
exported SGML document, ASCII text, with very long lines (65536), with no line terminators
|
dropped
|
||
Chrome Cache Entry: 110
|
ASCII text, with very long lines (46884)
|
dropped
|
||
Chrome Cache Entry: 111
|
ASCII text
|
dropped
|
||
Chrome Cache Entry: 112
|
SVG Scalable Vector Graphics image
|
downloaded
|
||
Chrome Cache Entry: 113
|
Web Open Font Format (Version 2), TrueType, length 19696, version 1.0
|
downloaded
|
||
Chrome Cache Entry: 114
|
ASCII text, with very long lines (33148), with no line terminators
|
downloaded
|
||
Chrome Cache Entry: 115
|
PNG image data, 475 x 212, 8-bit/color RGBA, non-interlaced
|
dropped
|
||
Chrome Cache Entry: 116
|
PNG image data, 658 x 480, 8-bit/color RGBA, non-interlaced
|
dropped
|
||
Chrome Cache Entry: 117
|
JSON data
|
dropped
|
||
Chrome Cache Entry: 118
|
HTML document, ASCII text, with very long lines (639), with CRLF, LF line terminators
|
downloaded
|
||
Chrome Cache Entry: 119
|
JSON data
|
downloaded
|
||
Chrome Cache Entry: 120
|
PNG image data, 533 x 478, 8-bit/color RGBA, non-interlaced
|
dropped
|
||
Chrome Cache Entry: 84
|
PNG image data, 533 x 478, 8-bit/color RGBA, non-interlaced
|
dropped
|
||
Chrome Cache Entry: 85
|
PNG image data, 533 x 478, 8-bit/color RGBA, non-interlaced
|
downloaded
|
||
Chrome Cache Entry: 86
|
SVG Scalable Vector Graphics image
|
dropped
|
||
Chrome Cache Entry: 87
|
JSON data
|
dropped
|
||
Chrome Cache Entry: 88
|
PNG image data, 533 x 478, 8-bit/color RGBA, non-interlaced
|
dropped
|
||
Chrome Cache Entry: 89
|
ASCII text, with very long lines (65536), with no line terminators
|
downloaded
|
||
Chrome Cache Entry: 90
|
ASCII text, with no line terminators
|
downloaded
|
||
Chrome Cache Entry: 91
|
JSON data
|
dropped
|
||
Chrome Cache Entry: 92
|
ASCII text, with very long lines (65410)
|
downloaded
|
||
Chrome Cache Entry: 93
|
JSON data
|
downloaded
|
||
Chrome Cache Entry: 94
|
PNG image data, 533 x 478, 8-bit/color RGBA, non-interlaced
|
downloaded
|
||
Chrome Cache Entry: 95
|
ASCII text, with very long lines (52717), with no line terminators
|
dropped
|
||
Chrome Cache Entry: 96
|
ASCII text
|
downloaded
|
||
Chrome Cache Entry: 97
|
ASCII text, with very long lines (52717), with no line terminators
|
downloaded
|
||
Chrome Cache Entry: 98
|
exported SGML document, ASCII text, with very long lines (65536), with no line terminators
|
downloaded
|
||
Chrome Cache Entry: 99
|
PNG image data, 533 x 478, 8-bit/color RGBA, non-interlaced
|
downloaded
|
There are 34 hidden files, click here to show them.
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\file.exe
|
"C:\Users\user\Desktop\file.exe"
|
||
C:\Program Files\Google\Chrome\Application\chrome.exe
|
"C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized --single-argument http://go.microsoft.com/fwlink/?prd=11324&pver=4.5&sbp=AppLaunch2&plcid=0x409&o1=SHIM_NOVERSION_FOUND&version=(null)&processName=file.exe&platform=0009&osver=6&isServer=0&shimver=4.0.30319.0
|
||
C:\Program Files\Google\Chrome\Application\chrome.exe
|
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US
--service-sandbox-type=none --mojo-platform-channel-handle=1884 --field-trial-handle=2012,i,2391827392709409351,7372759067112353565,262144
--disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction
/prefetch:8
|
||
C:\Program Files\Google\Chrome\Application\chrome.exe
|
"C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized --single-argument http://go.microsoft.com/fwlink/?prd=11324&pver=4.5&sbp=AppLaunch2&plcid=0x409&o1=SHIM_NOVERSION_FOUND&version=(null)&processName=file.exe&platform=0009&osver=6&isServer=0&shimver=4.0.30319.0
|
||
C:\Program Files\Google\Chrome\Application\chrome.exe
|
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US
--service-sandbox-type=none --mojo-platform-channel-handle=2056 --field-trial-handle=2000,i,16209135328301955217,6092186935791453691,262144
--disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction
/prefetch:8
|
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
https://authoring-docs-microsoft.poolparty.biz/devrel/7696cda6-0510-47f6-8302-71bb5d2e28cf
|
unknown
|
||
https://duckduckgo.com/chrome_newtab
|
unknown
|
||
https://duckduckgo.com/ac/?q=
|
unknown
|
||
https://property-imper.sbs/api
|
172.67.162.84
|
||
https://imp.mt48.net/static?id=7RHzfOIXjFEYsBdvIpkX4Qqm4p8dfCfm4pbW1pbWfpbW7ReNxR3UIG8zInwYIFIVs9eYi
|
unknown
|
||
https://github.com/dotnet/docs/blob/17c4acca45e573a92878a44a2cce57d699fe9c7c/docs/framework/install/
|
unknown
|
||
https://bridge.sfo1.admarketplace.net/ctp?version=16.0.0&key=1696425136400800000.2&ci=1696425136743.
|
unknown
|
||
https://www.linkedin.com/cws/share?url=$
|
unknown
|
||
https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
|
unknown
|
||
https://property-imper.sbs/CC
|
unknown
|
||
https://github.com/Youssef1313
|
unknown
|
||
https://management.azure.com/providers/Microsoft.Portal/userSettings/cloudconsole?api-version=2023-0
|
unknown
|
||
https://aka.ms/msignite_docs_banner
|
unknown
|
||
https://videoencodingpublic-hgeaeyeba8gycee3.b01.azurefd.net/public-b4da8140-92cf-421c-8b7b-e471d5b9
|
unknown
|
||
http://polymer.github.io/AUTHORS.txt
|
unknown
|
||
https://github.com/dotnet/docs/issues/new?template=z-customer-feedback.yml
|
unknown
|
||
https://management.azure.com/subscriptions?api-version=2016-06-01
|
unknown
|
||
https://github.com/dotnet/docs/blob/main/docs/framework/install/application-not-started.md
|
unknown
|
||
http://x1.c.lencr.org/0
|
unknown
|
||
http://x1.i.lencr.org/0
|
unknown
|
||
https://aka.ms/pshelpmechoose
|
unknown
|
||
https://aka.ms/feedback/report?space=61
|
unknown
|
||
https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
|
unknown
|
||
https://learn-video.azurefd.net/vod/player
|
unknown
|
||
https://property-imper.sbs/::
|
unknown
|
||
https://twitter.com/intent/tweet?original_referer=$
|
unknown
|
||
https://github.com/gewarren
|
unknown
|
||
http://185.215
|
unknown
|
||
http://185.215.113.16/off/def.exepleWebKit/537.36
|
unknown
|
||
https://property-imper.sbs/apiy
|
unknown
|
||
https://support.mozilla.org/products/firefoxgro.all
|
unknown
|
||
http://polymer.github.io/CONTRIBUTORS.txt
|
unknown
|
||
https://github.com/dotnet/docs/blob/live/docs/framework/install/application-not-started.md
|
unknown
|
||
https://property-imper.sbs:443/apiicrosoft
|
unknown
|
||
https://authoring-docs-microsoft.poolparty.biz/devrel/69c76c32-967e-4c65-b89a-74cc527db725
|
unknown
|
||
https://client-api.arkoselabs.com/v2/api.js
|
unknown
|
||
https://property-imper.sbs:443/api
|
unknown
|
||
https://aka.ms/MSIgniteChallenge/Tier1Banner?wt.mc_id=ignite24_learnbanner_tier1_cnl
|
unknown
|
||
https://management.azure.com/providers/Microsoft.Portal/consoles/default?api-version=2017-12-01-prev
|
unknown
|
||
https://www.google.com/images/branding/product/ico/googleg_lodp.ico
|
unknown
|
||
https://github.com/Thraka
|
unknown
|
||
http://polymer.github.io/PATENTS.txt
|
unknown
|
||
https://aka.ms/certhelp
|
unknown
|
||
http://185.215.113.16/steam/random.exe
|
unknown
|
||
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
|
unknown
|
||
http://crl.rootca1.amazontrust.com/rootca1.crl0
|
unknown
|
||
https://github.com/mairaw
|
unknown
|
||
https://property-imper.sbs/55
|
unknown
|
||
https://js.monitor.azure.com/scripts/c/ms.jsll-4.min.js
|
13.107.246.63
|
||
http://ocsp.rootca1.amazontrust.com0:
|
unknown
|
||
https://schema.org
|
unknown
|
||
http://polymer.github.io/LICENSE.txt
|
unknown
|
||
https://www.ecosia.org/newtab/
|
unknown
|
||
http://31.41.244.11/files/rnd.exe
|
unknown
|
||
https://bridge.sfo1.ap01.net/ctp?version=16.0.0&key=1696425136400800000.1&ci=1696425136743.12791&cta
|
unknown
|
||
https://property-imper.sbs/
|
unknown
|
||
https://support.mozilla.org/kb/customize-firefox-controls-buttons-and-toolbars?utm_source=firefox-br
|
unknown
|
||
https://aka.ms/yourcaliforniaprivacychoices
|
unknown
|
||
https://ac.ecosia.org/autocomplete?q=
|
unknown
|
||
https://github.com/nschonni
|
unknown
|
||
https://property-imper.sbs/$v6/
|
unknown
|
||
https://property-imper.sbs/h
|
unknown
|
||
https://property-imper.sbs/api;E
|
unknown
|
||
https://videoencodingpublic-hgeaeyeba8gycee3.b01.azurefd.net/public-09ce73a6-05a5-4e4d-b3d7-bd5a8c05
|
unknown
|
||
https://contile-images.services.mozilla.com/u1AuJcj32cbVUf9NjMipLXEYwu2uFIt4lsj-ccwVqEs.36904.jpg
|
unknown
|
||
https://github.com/adegeo
|
unknown
|
||
http://crl.micro
|
unknown
|
||
https://contile-images.services.mozilla.com/obgoOYObjIFea_bXuT6L4LbBJ8j425AD87S1HMD3BWg.9991.jpg
|
unknown
|
||
http://185.215.113.16:80/off/def.exe
|
unknown
|
||
https://property-imper.sbs:443/apiK
|
unknown
|
||
https://github.com/jonschlinkert/is-plain-object
|
unknown
|
||
https://property-imper.sbs/apiN
|
unknown
|
||
http://crt.rootca1.amazontrust.com/rootca1.cer0?
|
unknown
|
||
https://octokit.github.io/rest.js/#throttling
|
unknown
|
||
https://www.bestbuy.com/site/electronics/top-deals/pcmcat1563299784494.c/?id=pcmcat1563299784494&ref
|
unknown
|
||
https://github.com/js-cookie/js-cookie
|
unknown
|
||
https://www.amazon.com/?tag=admarketus-20&ref=pd_sl_35787f1071928bc3a1aef90b79c9bee9c64ba6683fde7477
|
unknown
|
||
http://185.215.113.16/off/def.exe
|
unknown
|
||
http://schema.org/Organization
|
unknown
|
||
https://channel9.msdn.com/
|
unknown
|
||
https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
|
unknown
|
||
https://github.com/dotnet/try
|
unknown
|
There are 72 hidden URLs, click here to show them.
Domains
Name
|
IP
|
Malicious
|
|
---|---|---|---|
property-imper.sbs
|
172.67.162.84
|
||
www.google.com
|
216.58.208.228
|
||
s-part-0035.t-0009.t-msedge.net
|
13.107.246.63
|
||
js.monitor.azure.com
|
unknown
|
||
mdec.nelreports.net
|
unknown
|
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
192.168.2.5
|
unknown
|
unknown
|
||
13.107.246.63
|
s-part-0035.t-0009.t-msedge.net
|
United States
|
||
185.215.113.16
|
unknown
|
Portugal
|
||
172.67.162.84
|
property-imper.sbs
|
United States
|
||
239.255.255.250
|
unknown
|
Reserved
|
||
216.58.208.228
|
www.google.com
|
United States
|
Registry
Path
|
Value
|
Malicious
|
|
---|---|---|---|
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer
|
SlowContextMenuEntries
|
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
5527000
|
trusted library allocation
|
page read and write
|
||
5D71000
|
trusted library allocation
|
page read and write
|
||
5511000
|
trusted library allocation
|
page read and write
|
||
54F2000
|
trusted library allocation
|
page read and write
|
||
5587000
|
trusted library allocation
|
page read and write
|
||
462000
|
unkown
|
page execute and read and write
|
||
54A3000
|
trusted library allocation
|
page read and write
|
||
5A66000
|
trusted library allocation
|
page read and write
|
||
44E1000
|
heap
|
page read and write
|
||
592D000
|
trusted library allocation
|
page read and write
|
||
5B7A000
|
trusted library allocation
|
page read and write
|
||
323E000
|
stack
|
page read and write
|
||
5925000
|
trusted library allocation
|
page read and write
|
||
2F7F000
|
stack
|
page read and write
|
||
5BA0000
|
direct allocation
|
page read and write
|
||
59E9000
|
trusted library allocation
|
page read and write
|
||
78CE000
|
stack
|
page read and write
|
||
5A6F000
|
trusted library allocation
|
page read and write
|
||
5922000
|
trusted library allocation
|
page read and write
|
||
54B2000
|
trusted library allocation
|
page read and write
|
||
54B8000
|
trusted library allocation
|
page read and write
|
||
54AE000
|
trusted library allocation
|
page read and write
|
||
728E000
|
stack
|
page read and write
|
||
D7C000
|
heap
|
page read and write
|
||
59DE000
|
trusted library allocation
|
page read and write
|
||
D74000
|
heap
|
page read and write
|
||
59F6000
|
trusted library allocation
|
page read and write
|
||
549E000
|
trusted library allocation
|
page read and write
|
||
638E000
|
stack
|
page read and write
|
||
54B7000
|
trusted library allocation
|
page read and write
|
||
6029000
|
trusted library allocation
|
page execute and read and write
|
||
549E000
|
trusted library allocation
|
page read and write
|
||
59C2000
|
trusted library allocation
|
page read and write
|
||
69CE000
|
stack
|
page read and write
|
||
54AE000
|
trusted library allocation
|
page read and write
|
||
54CA000
|
trusted library allocation
|
page read and write
|
||
549E000
|
trusted library allocation
|
page read and write
|
||
55A0000
|
trusted library allocation
|
page read and write
|
||
30BF000
|
stack
|
page read and write
|
||
7C8E000
|
stack
|
page read and write
|
||
54C7000
|
trusted library allocation
|
page read and write
|
||
4FBF000
|
stack
|
page read and write
|
||
54C4000
|
trusted library allocation
|
page read and write
|
||
D42000
|
heap
|
page read and write
|
||
D66000
|
heap
|
page read and write
|
||
5A48000
|
trusted library allocation
|
page read and write
|
||
548A000
|
trusted library allocation
|
page read and write
|
||
44E1000
|
heap
|
page read and write
|
||
59E1000
|
trusted library allocation
|
page read and write
|
||
548E000
|
trusted library allocation
|
page read and write
|
||
5497000
|
trusted library allocation
|
page read and write
|
||
5920000
|
trusted library allocation
|
page read and write
|
||
572B000
|
trusted library allocation
|
page read and write
|
||
5527000
|
trusted library allocation
|
page read and write
|
||
5628000
|
trusted library allocation
|
page read and write
|
||
5920000
|
trusted library allocation
|
page read and write
|
||
D77000
|
heap
|
page read and write
|
||
592E000
|
trusted library allocation
|
page read and write
|
||
44E1000
|
heap
|
page read and write
|
||
5922000
|
trusted library allocation
|
page read and write
|
||
D54000
|
heap
|
page read and write
|
||
54C5000
|
trusted library allocation
|
page read and write
|
||
5273000
|
heap
|
page read and write
|
||
4B4E000
|
trusted library allocation
|
page read and write
|
||
648F000
|
stack
|
page read and write
|
||
CC6000
|
heap
|
page read and write
|
||
79CF000
|
stack
|
page read and write
|
||
54A0000
|
trusted library allocation
|
page read and write
|
||
7E90000
|
heap
|
page read and write
|
||
28A0000
|
direct allocation
|
page read and write
|
||
549E000
|
trusted library allocation
|
page read and write
|
||
D5C000
|
heap
|
page read and write
|
||
D65000
|
heap
|
page read and write
|
||
5926000
|
trusted library allocation
|
page read and write
|
||
55DE000
|
stack
|
page read and write
|
||
4B00000
|
direct allocation
|
page execute and read and write
|
||
5484000
|
trusted library allocation
|
page read and write
|
||
28A0000
|
direct allocation
|
page read and write
|
||
3EBE000
|
stack
|
page read and write
|
||
D4E000
|
heap
|
page read and write
|
||
54AE000
|
trusted library allocation
|
page read and write
|
||
54C7000
|
trusted library allocation
|
page read and write
|
||
5536000
|
trusted library allocation
|
page read and write
|
||
D67000
|
heap
|
page read and write
|
||
49F000
|
unkown
|
page execute and read and write
|
||
54C0000
|
trusted library allocation
|
page read and write
|
||
C70000
|
heap
|
page read and write
|
||
558B000
|
trusted library allocation
|
page read and write
|
||
3BFF000
|
stack
|
page read and write
|
||
C80000
|
heap
|
page read and write
|
||
5A63000
|
trusted library allocation
|
page read and write
|
||
44E1000
|
heap
|
page read and write
|
||
D79000
|
heap
|
page read and write
|
||
3AFE000
|
stack
|
page read and write
|
||
54AF000
|
trusted library allocation
|
page read and write
|
||
592A000
|
trusted library allocation
|
page read and write
|
||
D69000
|
heap
|
page read and write
|
||
548E000
|
trusted library allocation
|
page read and write
|
||
5BBF000
|
trusted library allocation
|
page read and write
|
||
5722000
|
trusted library allocation
|
page read and write
|
||
D79000
|
heap
|
page read and write
|
||
54C7000
|
trusted library allocation
|
page read and write
|
||
D6C000
|
heap
|
page read and write
|
||
D79000
|
heap
|
page read and write
|
||
5490000
|
trusted library allocation
|
page read and write
|
||
54A4000
|
trusted library allocation
|
page read and write
|
||
AC0000
|
heap
|
page read and write
|
||
5498000
|
trusted library allocation
|
page read and write
|
||
5930000
|
trusted library allocation
|
page read and write
|
||
5581000
|
trusted library allocation
|
page read and write
|
||
44E1000
|
heap
|
page read and write
|
||
514F000
|
stack
|
page read and write
|
||
54A5000
|
trusted library allocation
|
page read and write
|
||
2ABF000
|
stack
|
page read and write
|
||
AAE000
|
stack
|
page read and write
|
||
74CF000
|
stack
|
page read and write
|
||
5E9A000
|
trusted library allocation
|
page execute and read and write
|
||
5488000
|
trusted library allocation
|
page read and write
|
||
1F7000
|
unkown
|
page write copy
|
||
549E000
|
trusted library allocation
|
page read and write
|
||
549C000
|
trusted library allocation
|
page read and write
|
||
54AE000
|
trusted library allocation
|
page read and write
|
||
5720000
|
trusted library allocation
|
page read and write
|
||
397F000
|
stack
|
page read and write
|
||
5514000
|
trusted library allocation
|
page read and write
|
||
5496000
|
trusted library allocation
|
page read and write
|
||
5534000
|
trusted library allocation
|
page read and write
|
||
28A0000
|
direct allocation
|
page read and write
|
||
5B1F000
|
stack
|
page read and write
|
||
549D000
|
trusted library allocation
|
page read and write
|
||
54D5000
|
trusted library allocation
|
page read and write
|
||
44F0000
|
heap
|
page read and write
|
||
54AE000
|
trusted library allocation
|
page read and write
|
||
7F9E000
|
stack
|
page read and write
|
||
54AE000
|
trusted library allocation
|
page read and write
|
||
549E000
|
trusted library allocation
|
page read and write
|
||
5926000
|
trusted library allocation
|
page read and write
|
||
54E1000
|
trusted library allocation
|
page read and write
|
||
5923000
|
trusted library allocation
|
page read and write
|
||
54AE000
|
trusted library allocation
|
page read and write
|
||
670F000
|
stack
|
page read and write
|
||
592C000
|
trusted library allocation
|
page read and write
|
||
5485000
|
trusted library allocation
|
page read and write
|
||
5922000
|
trusted library allocation
|
page read and write
|
||
5498000
|
trusted library allocation
|
page read and write
|
||
5587000
|
trusted library allocation
|
page read and write
|
||
592E000
|
trusted library allocation
|
page read and write
|
||
D67000
|
heap
|
page read and write
|
||
59FF000
|
trusted library allocation
|
page read and write
|
||
54BB000
|
trusted library allocation
|
page read and write
|
||
5A32000
|
trusted library allocation
|
page read and write
|
||
54F2000
|
trusted library allocation
|
page read and write
|
||
5B50000
|
trusted library allocation
|
page read and write
|
||
6CB000
|
stack
|
page read and write
|
||
5B88000
|
trusted library allocation
|
page read and write
|
||
5923000
|
trusted library allocation
|
page read and write
|
||
5A42000
|
trusted library allocation
|
page read and write
|
||
548A000
|
trusted library allocation
|
page read and write
|
||
54B7000
|
trusted library allocation
|
page read and write
|
||
548E000
|
trusted library allocation
|
page read and write
|
||
D66000
|
heap
|
page read and write
|
||
40FF000
|
stack
|
page read and write
|
||
4B0D000
|
stack
|
page read and write
|
||
5F97000
|
trusted library allocation
|
page read and write
|
||
4A0000
|
unkown
|
page execute and write copy
|
||
59FB000
|
trusted library allocation
|
page read and write
|
||
592B000
|
trusted library allocation
|
page read and write
|
||
7E10000
|
trusted library allocation
|
page read and write
|
||
54A9000
|
trusted library allocation
|
page read and write
|
||
380000
|
unkown
|
page execute and read and write
|
||
5518000
|
trusted library allocation
|
page read and write
|
||
5BA0000
|
direct allocation
|
page read and write
|
||
44E1000
|
heap
|
page read and write
|
||
56BF000
|
trusted library allocation
|
page read and write
|
||
54AE000
|
trusted library allocation
|
page read and write
|
||
59C4000
|
trusted library allocation
|
page read and write
|
||
548E000
|
trusted library allocation
|
page read and write
|
||
4B00000
|
direct allocation
|
page execute and read and write
|
||
5A30000
|
trusted library allocation
|
page read and write
|
||
5928000
|
trusted library allocation
|
page read and write
|
||
D77000
|
heap
|
page read and write
|
||
5B7C000
|
trusted library allocation
|
page read and write
|
||
549F000
|
trusted library allocation
|
page read and write
|
||
5921000
|
trusted library allocation
|
page read and write
|
||
549D000
|
trusted library allocation
|
page read and write
|
||
44E1000
|
heap
|
page read and write
|
||
5484000
|
trusted library allocation
|
page read and write
|
||
80CE000
|
stack
|
page read and write
|
||
5518000
|
trusted library allocation
|
page read and write
|
||
613C000
|
trusted library allocation
|
page execute and read and write
|
||
54AE000
|
trusted library allocation
|
page read and write
|
||
7E40000
|
direct allocation
|
page execute and read and write
|
||
549E000
|
trusted library allocation
|
page read and write
|
||
54AC000
|
trusted library allocation
|
page read and write
|
||
44E1000
|
heap
|
page read and write
|
||
59F8000
|
trusted library allocation
|
page read and write
|
||
5A51000
|
trusted library allocation
|
page read and write
|
||
5925000
|
trusted library allocation
|
page read and write
|
||
553A000
|
trusted library allocation
|
page read and write
|
||
5485000
|
trusted library allocation
|
page read and write
|
||
D7B000
|
heap
|
page read and write
|
||
54AE000
|
trusted library allocation
|
page read and write
|
||
556D000
|
trusted library allocation
|
page read and write
|
||
383F000
|
stack
|
page read and write
|
||
44E1000
|
heap
|
page read and write
|
||
5926000
|
trusted library allocation
|
page read and write
|
||
549E000
|
trusted library allocation
|
page read and write
|
||
D5F000
|
heap
|
page read and write
|
||
688E000
|
stack
|
page read and write
|
||
504E000
|
stack
|
page read and write
|
||
54A7000
|
trusted library allocation
|
page read and write
|
||
548F000
|
trusted library allocation
|
page read and write
|
||
5927000
|
trusted library allocation
|
page read and write
|
||
54C0000
|
trusted library allocation
|
page read and write
|
||
D5E000
|
heap
|
page read and write
|
||
592E000
|
trusted library allocation
|
page read and write
|
||
5493000
|
trusted library allocation
|
page read and write
|
||
54AA000
|
trusted library allocation
|
page read and write
|
||
4B00000
|
direct allocation
|
page execute and read and write
|
||
54FE000
|
trusted library allocation
|
page read and write
|
||
548F000
|
trusted library allocation
|
page read and write
|
||
54B8000
|
trusted library allocation
|
page read and write
|
||
54AE000
|
trusted library allocation
|
page read and write
|
||
5929000
|
trusted library allocation
|
page read and write
|
||
5BC0000
|
direct allocation
|
page read and write
|
||
634F000
|
stack
|
page read and write
|
||
5585000
|
trusted library allocation
|
page read and write
|
||
44E1000
|
heap
|
page read and write
|
||
54AE000
|
trusted library allocation
|
page read and write
|
||
5538000
|
trusted library allocation
|
page read and write
|
||
5BA0000
|
direct allocation
|
page read and write
|
||
5A30000
|
trusted library allocation
|
page read and write
|
||
5921000
|
trusted library allocation
|
page read and write
|
||
7A0E000
|
stack
|
page read and write
|
||
5921000
|
trusted library allocation
|
page read and write
|
||
5628000
|
trusted library allocation
|
page read and write
|
||
5A42000
|
trusted library allocation
|
page read and write
|
||
5A6E000
|
trusted library allocation
|
page read and write
|
||
28B0000
|
heap
|
page read and write
|
||
54AC000
|
trusted library allocation
|
page read and write
|
||
54AE000
|
trusted library allocation
|
page read and write
|
||
54D4000
|
trusted library allocation
|
page read and write
|
||
44E1000
|
heap
|
page read and write
|
||
698F000
|
stack
|
page read and write
|
||
5927000
|
trusted library allocation
|
page read and write
|
||
54AA000
|
trusted library allocation
|
page read and write
|
||
5583000
|
trusted library allocation
|
page read and write
|
||
5A40000
|
trusted library allocation
|
page read and write
|
||
549D000
|
trusted library allocation
|
page read and write
|
||
54A7000
|
trusted library allocation
|
page read and write
|
||
5920000
|
trusted library allocation
|
page read and write
|
||
5926000
|
trusted library allocation
|
page read and write
|
||
59C6000
|
trusted library allocation
|
page read and write
|
||
548F000
|
trusted library allocation
|
page read and write
|
||
54D0000
|
trusted library allocation
|
page read and write
|
||
54AD000
|
trusted library allocation
|
page read and write
|
||
5518000
|
trusted library allocation
|
page read and write
|
||
54B6000
|
trusted library allocation
|
page read and write
|
||
54A6000
|
trusted library allocation
|
page read and write
|
||
788F000
|
stack
|
page read and write
|
||
D75000
|
heap
|
page read and write
|
||
549E000
|
trusted library allocation
|
page read and write
|
||
5920000
|
trusted library allocation
|
page read and write
|
||
5AFE000
|
trusted library allocation
|
page read and write
|
||
5BA0000
|
direct allocation
|
page read and write
|
||
39BE000
|
stack
|
page read and write
|
||
6FCF000
|
stack
|
page read and write
|
||
5B3C000
|
trusted library allocation
|
page read and write
|
||
44E1000
|
heap
|
page read and write
|
||
35FE000
|
stack
|
page read and write
|
||
3FFE000
|
stack
|
page read and write
|
||
5580000
|
trusted library allocation
|
page read and write
|
||
5A20000
|
trusted library allocation
|
page read and write
|
||
D79000
|
heap
|
page read and write
|
||
5493000
|
trusted library allocation
|
page read and write
|
||
5B5C000
|
stack
|
page read and write
|
||
5922000
|
trusted library allocation
|
page read and write
|
||
D3D000
|
heap
|
page read and write
|
||
558D000
|
trusted library allocation
|
page read and write
|
||
54B6000
|
trusted library allocation
|
page read and write
|
||
7E10000
|
direct allocation
|
page execute and read and write
|
||
285E000
|
stack
|
page read and write
|
||
5924000
|
trusted library allocation
|
page read and write
|
||
5BC1000
|
trusted library allocation
|
page read and write
|
||
54AE000
|
trusted library allocation
|
page read and write
|
||
D7C000
|
heap
|
page read and write
|
||
28A0000
|
direct allocation
|
page read and write
|
||
5BA0000
|
direct allocation
|
page read and write
|
||
5ACC000
|
trusted library allocation
|
page read and write
|
||
5BA0000
|
direct allocation
|
page read and write
|
||
5925000
|
trusted library allocation
|
page read and write
|
||
4ABF000
|
stack
|
page read and write
|
||
423F000
|
stack
|
page read and write
|
||
54C1000
|
trusted library allocation
|
page read and write
|
||
54B0000
|
trusted library allocation
|
page read and write
|
||
D77000
|
heap
|
page read and write
|
||
D4E000
|
heap
|
page read and write
|
||
4AF0000
|
direct allocation
|
page execute and read and write
|
||
54CC000
|
trusted library allocation
|
page read and write
|
||
5928000
|
trusted library allocation
|
page read and write
|
||
54E5000
|
trusted library allocation
|
page read and write
|
||
D4A000
|
heap
|
page read and write
|
||
54BF000
|
trusted library allocation
|
page read and write
|
||
D77000
|
heap
|
page read and write
|
||
54D8000
|
trusted library allocation
|
page read and write
|
||
549E000
|
trusted library allocation
|
page read and write
|
||
5481000
|
trusted library allocation
|
page read and write
|
||
D4B000
|
heap
|
page read and write
|
||
55D8000
|
trusted library allocation
|
page read and write
|
||
592A000
|
trusted library allocation
|
page read and write
|
||
612E000
|
trusted library allocation
|
page execute and read and write
|
||
548F000
|
trusted library allocation
|
page read and write
|
||
5518000
|
trusted library allocation
|
page read and write
|
||
5BC0000
|
direct allocation
|
page read and write
|
||
D54000
|
heap
|
page read and write
|
||
7C4F000
|
stack
|
page read and write
|
||
54AE000
|
trusted library allocation
|
page read and write
|
||
592B000
|
trusted library allocation
|
page read and write
|
||
2FBE000
|
stack
|
page read and write
|
||
5927000
|
trusted library allocation
|
page read and write
|
||
5929000
|
trusted library allocation
|
page read and write
|
||
44E0000
|
heap
|
page read and write
|
||
5A6A000
|
trusted library allocation
|
page read and write
|
||
5923000
|
trusted library allocation
|
page read and write
|
||
5527000
|
trusted library allocation
|
page read and write
|
||
5A29000
|
trusted library allocation
|
page read and write
|
||
5A6E000
|
trusted library allocation
|
page read and write
|
||
5518000
|
trusted library allocation
|
page read and write
|
||
5495000
|
trusted library allocation
|
page read and write
|
||
4920000
|
trusted library allocation
|
page read and write
|
||
59FA000
|
trusted library allocation
|
page read and write
|
||
548A000
|
trusted library allocation
|
page read and write
|
||
59E0000
|
trusted library allocation
|
page read and write
|
||
5270000
|
heap
|
page read and write
|
||
5923000
|
trusted library allocation
|
page read and write
|
||
5A08000
|
trusted library allocation
|
page read and write
|
||
750E000
|
stack
|
page read and write
|
||
549E000
|
trusted library allocation
|
page read and write
|
||
549E000
|
trusted library allocation
|
page read and write
|
||
549F000
|
trusted library allocation
|
page read and write
|
||
549D000
|
trusted library allocation
|
page read and write
|
||
5499000
|
trusted library allocation
|
page read and write
|
||
54C7000
|
trusted library allocation
|
page read and write
|
||
5A01000
|
trusted library allocation
|
page read and write
|
||
54C6000
|
trusted library allocation
|
page read and write
|
||
5929000
|
trusted library allocation
|
page read and write
|
||
1A1000
|
unkown
|
page execute and write copy
|
||
D4A000
|
heap
|
page read and write
|
||
5920000
|
trusted library allocation
|
page read and write
|
||
59E7000
|
trusted library allocation
|
page read and write
|
||
5B3A000
|
trusted library allocation
|
page read and write
|
||
D7B000
|
heap
|
page read and write
|
||
54AD000
|
trusted library allocation
|
page read and write
|
||
592B000
|
trusted library allocation
|
page read and write
|
||
549D000
|
trusted library allocation
|
page read and write
|
||
7D90000
|
trusted library allocation
|
page read and write
|
||
54B2000
|
trusted library allocation
|
page read and write
|
||
D7E000
|
heap
|
page read and write
|
||
85DE000
|
stack
|
page read and write
|
||
5A53000
|
trusted library allocation
|
page read and write
|
||
54CE000
|
trusted library allocation
|
page read and write
|
||
35BF000
|
stack
|
page read and write
|
||
5924000
|
trusted library allocation
|
page read and write
|
||
5A39000
|
trusted library allocation
|
page read and write
|
||
613E000
|
trusted library allocation
|
page execute and read and write
|
||
D77000
|
heap
|
page read and write
|
||
7CB000
|
stack
|
page read and write
|
||
5481000
|
trusted library allocation
|
page read and write
|
||
6D8E000
|
stack
|
page read and write
|
||
54D6000
|
trusted library allocation
|
page read and write
|
||
5923000
|
trusted library allocation
|
page read and write
|
||
549C000
|
trusted library allocation
|
page read and write
|
||
5481000
|
trusted library allocation
|
page read and write
|
||
1A1000
|
unkown
|
page execute and read and write
|
||
55B8000
|
trusted library allocation
|
page read and write
|
||
D61000
|
heap
|
page read and write
|
||
44E1000
|
heap
|
page read and write
|
||
5518000
|
trusted library allocation
|
page read and write
|
||
289E000
|
stack
|
page read and write
|
||
5925000
|
trusted library allocation
|
page read and write
|
||
28A0000
|
direct allocation
|
page read and write
|
||
549E000
|
trusted library allocation
|
page read and write
|
||
54AE000
|
trusted library allocation
|
page read and write
|
||
548F000
|
trusted library allocation
|
page read and write
|
||
387E000
|
stack
|
page read and write
|
||
E7F000
|
stack
|
page read and write
|
||
28A0000
|
direct allocation
|
page read and write
|
||
D4B000
|
heap
|
page read and write
|
||
5A88000
|
trusted library allocation
|
page read and write
|
||
54AE000
|
trusted library allocation
|
page read and write
|
||
54E2000
|
trusted library allocation
|
page read and write
|
||
D77000
|
heap
|
page read and write
|
||
CE8000
|
heap
|
page read and write
|
||
5A69000
|
trusted library allocation
|
page read and write
|
||
5B2C000
|
trusted library allocation
|
page read and write
|
||
5660000
|
trusted library allocation
|
page read and write
|
||
CCA000
|
heap
|
page read and write
|
||
54A7000
|
trusted library allocation
|
page read and write
|
||
54EA000
|
trusted library allocation
|
page read and write
|
||
D77000
|
heap
|
page read and write
|
||
549E000
|
trusted library allocation
|
page read and write
|
||
592D000
|
trusted library allocation
|
page read and write
|
||
54B8000
|
trusted library allocation
|
page read and write
|
||
54AE000
|
trusted library allocation
|
page read and write
|
||
54AE000
|
trusted library allocation
|
page read and write
|
||
5E90000
|
trusted library allocation
|
page read and write
|
||
80D0000
|
heap
|
page read and write
|
||
5923000
|
trusted library allocation
|
page read and write
|
||
4B00000
|
direct allocation
|
page execute and read and write
|
||
D7C000
|
heap
|
page read and write
|
||
54AE000
|
trusted library allocation
|
page read and write
|
||
5E92000
|
trusted library allocation
|
page execute and read and write
|
||
51BE000
|
stack
|
page read and write
|
||
A30000
|
heap
|
page read and write
|
||
6B0E000
|
stack
|
page read and write
|
||
D73000
|
heap
|
page read and write
|
||
54C8000
|
trusted library allocation
|
page read and write
|
||
549B000
|
trusted library allocation
|
page read and write
|
||
549E000
|
trusted library allocation
|
page read and write
|
||
59D1000
|
trusted library allocation
|
page read and write
|
||
5922000
|
trusted library allocation
|
page read and write
|
||
54A6000
|
trusted library allocation
|
page read and write
|
||
5B2F000
|
trusted library allocation
|
page read and write
|
||
549D000
|
trusted library allocation
|
page read and write
|
||
5498000
|
trusted library allocation
|
page read and write
|
||
49F000
|
unkown
|
page execute and write copy
|
||
4EBE000
|
stack
|
page read and write
|
||
28A0000
|
direct allocation
|
page read and write
|
||
5518000
|
trusted library allocation
|
page read and write
|
||
5497000
|
trusted library allocation
|
page read and write
|
||
724F000
|
stack
|
page read and write
|
||
D79000
|
heap
|
page read and write
|
||
5527000
|
trusted library allocation
|
page read and write
|
||
84DE000
|
stack
|
page read and write
|
||
54CE000
|
trusted library allocation
|
page read and write
|
||
5922000
|
trusted library allocation
|
page read and write
|
||
D3D000
|
heap
|
page read and write
|
||
5B10000
|
trusted library allocation
|
page read and write
|
||
D7C000
|
heap
|
page read and write
|
||
5492000
|
trusted library allocation
|
page read and write
|
||
54F2000
|
trusted library allocation
|
page read and write
|
||
D4E000
|
heap
|
page read and write
|
||
D61000
|
heap
|
page read and write
|
||
7B0F000
|
stack
|
page read and write
|
||
551B000
|
trusted library allocation
|
page read and write
|
||
80EA000
|
trusted library allocation
|
page read and write
|
||
5B8A000
|
trusted library allocation
|
page read and write
|
||
55F0000
|
direct allocation
|
page read and write
|
||
2E3F000
|
stack
|
page read and write
|
||
5925000
|
trusted library allocation
|
page read and write
|
||
5925000
|
trusted library allocation
|
page read and write
|
||
D7B000
|
heap
|
page read and write
|
||
D79000
|
heap
|
page read and write
|
||
54D6000
|
trusted library allocation
|
page read and write
|
||
558B000
|
trusted library allocation
|
page read and write
|
||
D6C000
|
heap
|
page read and write
|
||
6E8F000
|
stack
|
page read and write
|
||
54E5000
|
trusted library allocation
|
page read and write
|
||
548E000
|
trusted library allocation
|
page read and write
|
||
549E000
|
trusted library allocation
|
page read and write
|
||
5E76000
|
trusted library allocation
|
page read and write
|
||
56F0000
|
trusted library allocation
|
page read and write
|
||
44C0000
|
heap
|
page read and write
|
||
44E1000
|
heap
|
page read and write
|
||
5A06000
|
trusted library allocation
|
page read and write
|
||
2E7E000
|
stack
|
page read and write
|
||
5BC0000
|
direct allocation
|
page read and write
|
||
54B6000
|
trusted library allocation
|
page read and write
|
||
D79000
|
heap
|
page read and write
|
||
D5C000
|
heap
|
page read and write
|
||
7E0C000
|
stack
|
page read and write
|
||
54AE000
|
trusted library allocation
|
page read and write
|
||
54D1000
|
trusted library allocation
|
page read and write
|
||
9980000
|
trusted library allocation
|
page read and write
|
||
D5A000
|
heap
|
page read and write
|
||
54AE000
|
trusted library allocation
|
page read and write
|
||
D4A000
|
heap
|
page read and write
|
||
54AE000
|
trusted library allocation
|
page read and write
|
||
4B10000
|
direct allocation
|
page execute and read and write
|
||
549E000
|
trusted library allocation
|
page read and write
|
||
D79000
|
heap
|
page read and write
|
||
548A000
|
trusted library allocation
|
page read and write
|
||
D4A000
|
heap
|
page read and write
|
||
80E0000
|
trusted library allocation
|
page read and write
|
||
D74000
|
heap
|
page read and write
|
||
54D5000
|
trusted library allocation
|
page read and write
|
||
28A0000
|
direct allocation
|
page read and write
|
||
5527000
|
trusted library allocation
|
page read and write
|
||
54AE000
|
trusted library allocation
|
page read and write
|
||
4B30000
|
direct allocation
|
page execute and read and write
|
||
54EB000
|
trusted library allocation
|
page read and write
|
||
5496000
|
trusted library allocation
|
page read and write
|
||
54D2000
|
trusted library allocation
|
page read and write
|
||
5A37000
|
trusted library allocation
|
page read and write
|
||
5581000
|
trusted library allocation
|
page read and write
|
||
5A48000
|
trusted library allocation
|
page read and write
|
||
BDE000
|
stack
|
page read and write
|
||
548E000
|
trusted library allocation
|
page read and write
|
||
D4A000
|
heap
|
page read and write
|
||
549D000
|
trusted library allocation
|
page read and write
|
||
D4F000
|
heap
|
page read and write
|
||
54AE000
|
trusted library allocation
|
page read and write
|
||
5A16000
|
trusted library allocation
|
page read and write
|
||
5B00000
|
trusted library allocation
|
page read and write
|
||
D77000
|
heap
|
page read and write
|
||
C8E000
|
heap
|
page read and write
|
||
29BF000
|
stack
|
page read and write
|
||
59F8000
|
trusted library allocation
|
page read and write
|
||
D66000
|
heap
|
page read and write
|
||
59D3000
|
trusted library allocation
|
page read and write
|
||
54B0000
|
trusted library allocation
|
page read and write
|
||
1F9000
|
unkown
|
page execute and read and write
|
||
5490000
|
trusted library allocation
|
page read and write
|
||
5927000
|
trusted library allocation
|
page read and write
|
||
549A000
|
trusted library allocation
|
page read and write
|
||
44E1000
|
heap
|
page read and write
|
||
347F000
|
stack
|
page read and write
|
||
760F000
|
stack
|
page read and write
|
||
D40000
|
heap
|
page read and write
|
||
849C000
|
stack
|
page read and write
|
||
D32000
|
heap
|
page read and write
|
||
D69000
|
heap
|
page read and write
|
||
778E000
|
stack
|
page read and write
|
||
549D000
|
trusted library allocation
|
page read and write
|
||
54D9000
|
trusted library allocation
|
page read and write
|
||
54AE000
|
trusted library allocation
|
page read and write
|
||
3E7F000
|
stack
|
page read and write
|
||
5A44000
|
trusted library allocation
|
page read and write
|
||
5518000
|
trusted library allocation
|
page read and write
|
||
5BA0000
|
direct allocation
|
page read and write
|
||
5481000
|
trusted library allocation
|
page read and write
|
||
5527000
|
trusted library allocation
|
page read and write
|
||
5580000
|
trusted library allocation
|
page read and write
|
||
D69000
|
heap
|
page read and write
|
||
373E000
|
stack
|
page read and write
|
||
49BC000
|
stack
|
page read and write
|
||
592C000
|
trusted library allocation
|
page read and write
|
||
5926000
|
trusted library allocation
|
page read and write
|
||
43BE000
|
stack
|
page read and write
|
||
54F2000
|
trusted library allocation
|
page read and write
|
||
4970000
|
direct allocation
|
page read and write
|
||
54A4000
|
trusted library allocation
|
page read and write
|
||
5485000
|
trusted library allocation
|
page read and write
|
||
5923000
|
trusted library allocation
|
page read and write
|
||
413E000
|
stack
|
page read and write
|
||
54D5000
|
trusted library allocation
|
page read and write
|
||
5A11000
|
trusted library allocation
|
page read and write
|
||
490000
|
unkown
|
page execute and read and write
|
||
54D7000
|
trusted library allocation
|
page read and write
|
||
5BA0000
|
direct allocation
|
page read and write
|
||
CD1000
|
heap
|
page read and write
|
||
489000
|
unkown
|
page execute and read and write
|
||
738F000
|
stack
|
page read and write
|
||
5AD2000
|
trusted library allocation
|
page read and write
|
||
54C7000
|
trusted library allocation
|
page read and write
|
||
5B2A000
|
trusted library allocation
|
page read and write
|
||
F7F000
|
stack
|
page read and write
|
||
549F000
|
trusted library allocation
|
page read and write
|
||
5A0E000
|
trusted library allocation
|
page read and write
|
||
54AE000
|
trusted library allocation
|
page read and write
|
||
674E000
|
stack
|
page read and write
|
||
28B7000
|
heap
|
page read and write
|
||
4970000
|
direct allocation
|
page read and write
|
||
7DA0000
|
trusted library allocation
|
page read and write
|
||
54F1000
|
trusted library allocation
|
page read and write
|
||
54E3000
|
trusted library allocation
|
page read and write
|
||
6C4E000
|
stack
|
page read and write
|
||
547E000
|
stack
|
page read and write
|
||
44E1000
|
heap
|
page read and write
|
||
5527000
|
trusted library allocation
|
page read and write
|
||
4D7E000
|
stack
|
page read and write
|
||
5BDE000
|
trusted library allocation
|
page read and write
|
||
5498000
|
trusted library allocation
|
page read and write
|
||
3ABF000
|
stack
|
page read and write
|
||
54AE000
|
trusted library allocation
|
page read and write
|
||
5921000
|
trusted library allocation
|
page read and write
|
||
3FBF000
|
stack
|
page read and write
|
||
54D7000
|
trusted library allocation
|
page read and write
|
||
5BA0000
|
direct allocation
|
page read and write
|
||
AC5000
|
heap
|
page read and write
|
||
54AE000
|
trusted library allocation
|
page read and write
|
||
5927000
|
trusted library allocation
|
page read and write
|
||
522E000
|
stack
|
page read and write
|
||
548E000
|
trusted library allocation
|
page read and write
|
||
549E000
|
trusted library allocation
|
page read and write
|
||
5A46000
|
trusted library allocation
|
page read and write
|
||
549E000
|
trusted library allocation
|
page read and write
|
||
54BB000
|
trusted library allocation
|
page read and write
|
||
5BA0000
|
direct allocation
|
page read and write
|
||
549E000
|
trusted library allocation
|
page read and write
|
||
D4A000
|
heap
|
page read and write
|
||
6ACF000
|
stack
|
page read and write
|
||
44E1000
|
heap
|
page read and write
|
||
D4E000
|
heap
|
page read and write
|
||
54C2000
|
trusted library allocation
|
page read and write
|
||
54F2000
|
trusted library allocation
|
page read and write
|
||
3C3E000
|
stack
|
page read and write
|
||
65CF000
|
stack
|
page read and write
|
||
54D7000
|
trusted library allocation
|
page read and write
|
||
5A6B000
|
trusted library allocation
|
page read and write
|
||
D61000
|
heap
|
page read and write
|
||
D79000
|
heap
|
page read and write
|
||
5518000
|
trusted library allocation
|
page read and write
|
||
54AE000
|
trusted library allocation
|
page read and write
|
||
548E000
|
trusted library allocation
|
page read and write
|
||
73CE000
|
stack
|
page read and write
|
||
2CFF000
|
stack
|
page read and write
|
||
54B1000
|
trusted library allocation
|
page read and write
|
||
4FE0000
|
remote allocation
|
page read and write
|
||
54D0000
|
trusted library allocation
|
page read and write
|
||
C6C000
|
stack
|
page read and write
|
||
4AD0000
|
direct allocation
|
page execute and read and write
|
||
D54000
|
heap
|
page read and write
|
||
624F000
|
stack
|
page read and write
|
||
5921000
|
trusted library allocation
|
page read and write
|
||
D4E000
|
heap
|
page read and write
|
||
5929000
|
trusted library allocation
|
page read and write
|
||
5A0A000
|
trusted library allocation
|
page read and write
|
||
5510000
|
trusted library allocation
|
page read and write
|
||
1A0000
|
unkown
|
page read and write
|
||
549E000
|
trusted library allocation
|
page read and write
|
||
54A0000
|
trusted library allocation
|
page read and write
|
||
D42000
|
heap
|
page read and write
|
||
5AF6000
|
trusted library allocation
|
page read and write
|
||
5536000
|
trusted library allocation
|
page read and write
|
||
D7C000
|
heap
|
page read and write
|
||
44E1000
|
heap
|
page read and write
|
||
D77000
|
heap
|
page read and write
|
||
7B4E000
|
stack
|
page read and write
|
||
28A0000
|
direct allocation
|
page read and write
|
||
5928000
|
trusted library allocation
|
page read and write
|
||
5A10000
|
trusted library allocation
|
page read and write
|
||
54FB000
|
trusted library allocation
|
page read and write
|
||
D75000
|
heap
|
page read and write
|
||
54F2000
|
trusted library allocation
|
page read and write
|
||
700E000
|
stack
|
page read and write
|
||
537F000
|
stack
|
page read and write
|
||
54DE000
|
trusted library allocation
|
page read and write
|
||
CD1000
|
heap
|
page read and write
|
||
A40000
|
heap
|
page read and write
|
||
59E6000
|
trusted library allocation
|
page read and write
|
||
4C3D000
|
stack
|
page read and write
|
||
5A22000
|
trusted library allocation
|
page read and write
|
||
54A3000
|
trusted library allocation
|
page read and write
|
||
D77000
|
heap
|
page read and write
|
||
D5A000
|
heap
|
page read and write
|
||
5505000
|
trusted library allocation
|
page read and write
|
||
54C9000
|
trusted library allocation
|
page read and write
|
||
54CE000
|
trusted library allocation
|
page read and write
|
||
5491000
|
trusted library allocation
|
page read and write
|
||
D77000
|
heap
|
page read and write
|
||
4D3D000
|
stack
|
page read and write
|
||
5927000
|
trusted library allocation
|
page read and write
|
||
59D9000
|
trusted library allocation
|
page read and write
|
||
337E000
|
stack
|
page read and write
|
||
5B0E000
|
trusted library allocation
|
page read and write
|
||
5A4F000
|
trusted library allocation
|
page read and write
|
||
54A9000
|
trusted library allocation
|
page read and write
|
||
549E000
|
trusted library allocation
|
page read and write
|
||
592C000
|
trusted library allocation
|
page read and write
|
||
28A0000
|
direct allocation
|
page read and write
|
||
59D7000
|
trusted library allocation
|
page read and write
|
||
D69000
|
heap
|
page read and write
|
||
D4E000
|
heap
|
page read and write
|
||
63C000
|
unkown
|
page execute and write copy
|
||
5485000
|
trusted library allocation
|
page read and write
|
||
54AE000
|
trusted library allocation
|
page read and write
|
||
5A6C000
|
trusted library allocation
|
page read and write
|
||
549F000
|
trusted library allocation
|
page read and write
|
||
54AE000
|
trusted library allocation
|
page read and write
|
||
D79000
|
heap
|
page read and write
|
||
5AAB000
|
trusted library allocation
|
page read and write
|
||
5A64000
|
trusted library allocation
|
page read and write
|
||
C8A000
|
heap
|
page read and write
|
||
54B6000
|
trusted library allocation
|
page read and write
|
||
5A70000
|
trusted library allocation
|
page read and write
|
||
D4F000
|
heap
|
page read and write
|
||
59C6000
|
trusted library allocation
|
page read and write
|
||
5A46000
|
trusted library allocation
|
page read and write
|
||
548E000
|
trusted library allocation
|
page read and write
|
||
D67000
|
heap
|
page read and write
|
||
5A72000
|
trusted library allocation
|
page read and write
|
||
D79000
|
heap
|
page read and write
|
||
54CB000
|
trusted library allocation
|
page read and write
|
||
D69000
|
heap
|
page read and write
|
||
59C4000
|
trusted library allocation
|
page read and write
|
||
D32000
|
heap
|
page read and write
|
||
6ECE000
|
stack
|
page read and write
|
||
5480000
|
trusted library allocation
|
page read and write
|
||
5BA0000
|
direct allocation
|
page read and write
|
||
1F7000
|
unkown
|
page read and write
|
||
5A55000
|
trusted library allocation
|
page read and write
|
||
4B20000
|
direct allocation
|
page execute and read and write
|
||
54A2000
|
trusted library allocation
|
page read and write
|
||
54AE000
|
trusted library allocation
|
page read and write
|
||
5A19000
|
stack
|
page read and write
|
||
54C0000
|
trusted library allocation
|
page read and write
|
||
54B6000
|
trusted library allocation
|
page read and write
|
||
5924000
|
trusted library allocation
|
page read and write
|
||
5481000
|
trusted library allocation
|
page read and write
|
||
549D000
|
trusted library allocation
|
page read and write
|
||
4FE0000
|
remote allocation
|
page read and write
|
||
5B44000
|
trusted library allocation
|
page read and write
|
||
549D000
|
trusted library allocation
|
page read and write
|
||
5527000
|
trusted library allocation
|
page read and write
|
||
44E1000
|
heap
|
page read and write
|
||
5928000
|
trusted library allocation
|
page read and write
|
||
54B8000
|
trusted library allocation
|
page read and write
|
||
4B00000
|
direct allocation
|
page execute and read and write
|
||
54B7000
|
trusted library allocation
|
page read and write
|
||
59FF000
|
trusted library allocation
|
page read and write
|
||
549D000
|
trusted library allocation
|
page read and write
|
||
592E000
|
trusted library allocation
|
page read and write
|
||
5E83000
|
trusted library allocation
|
page read and write
|
||
C2E000
|
stack
|
page read and write
|
||
2D3E000
|
stack
|
page read and write
|
||
5BA0000
|
direct allocation
|
page read and write
|
||
550A000
|
trusted library allocation
|
page read and write
|
||
684F000
|
stack
|
page read and write
|
||
549E000
|
trusted library allocation
|
page read and write
|
||
54F2000
|
trusted library allocation
|
page read and write
|
||
5AD4000
|
trusted library allocation
|
page read and write
|
||
54C8000
|
trusted library allocation
|
page read and write
|
||
5527000
|
trusted library allocation
|
page read and write
|
||
660E000
|
stack
|
page read and write
|
||
549E000
|
trusted library allocation
|
page read and write
|
||
592C000
|
trusted library allocation
|
page read and write
|
||
80E2000
|
trusted library allocation
|
page read and write
|
||
714E000
|
stack
|
page read and write
|
||
5927000
|
trusted library allocation
|
page read and write
|
||
5485000
|
trusted library allocation
|
page read and write
|
||
5A2C000
|
trusted library allocation
|
page read and write
|
||
5A7A000
|
trusted library allocation
|
page read and write
|
||
427E000
|
stack
|
page read and write
|
||
764E000
|
stack
|
page read and write
|
||
5658000
|
trusted library allocation
|
page read and write
|
||
5923000
|
trusted library allocation
|
page read and write
|
||
549D000
|
trusted library allocation
|
page read and write
|
||
31FF000
|
stack
|
page read and write
|
||
5924000
|
trusted library allocation
|
page read and write
|
||
437F000
|
stack
|
page read and write
|
||
5ACA000
|
trusted library allocation
|
page read and write
|
||
1E5000
|
unkown
|
page execute and read and write
|
||
D4F000
|
heap
|
page read and write
|
||
54B6000
|
trusted library allocation
|
page read and write
|
||
549E000
|
trusted library allocation
|
page read and write
|
||
1A0000
|
unkown
|
page readonly
|
||
496D000
|
stack
|
page read and write
|
||
D5E000
|
heap
|
page read and write
|
||
333F000
|
stack
|
page read and write
|
||
2BBF000
|
stack
|
page read and write
|
||
59E4000
|
trusted library allocation
|
page read and write
|
||
64CE000
|
stack
|
page read and write
|
||
54DB000
|
trusted library allocation
|
page read and write
|
||
4AE0000
|
direct allocation
|
page execute and read and write
|
||
5485000
|
trusted library allocation
|
page read and write
|
||
5930000
|
trusted library allocation
|
page read and write
|
||
5269000
|
stack
|
page read and write
|
||
54A4000
|
trusted library allocation
|
page read and write
|
||
5A2A000
|
trusted library allocation
|
page read and write
|
||
5925000
|
trusted library allocation
|
page read and write
|
||
44E1000
|
heap
|
page read and write
|
||
44BF000
|
stack
|
page read and write
|
||
54D2000
|
trusted library allocation
|
page read and write
|
||
5A13000
|
trusted library allocation
|
page read and write
|
||
D74000
|
heap
|
page read and write
|
||
49B4000
|
direct allocation
|
page read and write
|
||
5923000
|
trusted library allocation
|
page read and write
|
||
5A27000
|
trusted library allocation
|
page read and write
|
||
5927000
|
trusted library allocation
|
page read and write
|
||
5BA0000
|
direct allocation
|
page read and write
|
||
5A0C000
|
trusted library allocation
|
page read and write
|
||
44E1000
|
heap
|
page read and write
|
||
4E7E000
|
stack
|
page read and write
|
||
5925000
|
trusted library allocation
|
page read and write
|
||
D75000
|
heap
|
page read and write
|
||
3D3F000
|
stack
|
page read and write
|
||
D58000
|
heap
|
page read and write
|
||
44E1000
|
heap
|
page read and write
|
||
3D7E000
|
stack
|
page read and write
|
||
54AE000
|
trusted library allocation
|
page read and write
|
||
549D000
|
trusted library allocation
|
page read and write
|
||
54CA000
|
trusted library allocation
|
page read and write
|
||
5925000
|
trusted library allocation
|
page read and write
|
||
30FE000
|
stack
|
page read and write
|
||
549C000
|
trusted library allocation
|
page read and write
|
||
7D8F000
|
stack
|
page read and write
|
||
548B000
|
trusted library allocation
|
page read and write
|
||
5B9E000
|
stack
|
page read and write
|
||
5E96000
|
trusted library allocation
|
page read and write
|
||
550B000
|
trusted library allocation
|
page read and write
|
||
5A01000
|
trusted library allocation
|
page read and write
|
||
54D5000
|
trusted library allocation
|
page read and write
|
||
28A0000
|
direct allocation
|
page read and write
|
||
54EC000
|
trusted library allocation
|
page read and write
|
||
5925000
|
trusted library allocation
|
page read and write
|
||
774F000
|
stack
|
page read and write
|
||
5A8A000
|
trusted library allocation
|
page read and write
|
||
D62000
|
heap
|
page read and write
|
||
5498000
|
trusted library allocation
|
page read and write
|
||
D7C000
|
heap
|
page read and write
|
||
5A2E000
|
trusted library allocation
|
page read and write
|
||
592A000
|
trusted library allocation
|
page read and write
|
||
5481000
|
trusted library allocation
|
page read and write
|
||
5493000
|
trusted library allocation
|
page read and write
|
||
5AF8000
|
trusted library allocation
|
page read and write
|
||
D79000
|
heap
|
page read and write
|
||
5922000
|
trusted library allocation
|
page read and write
|
||
D77000
|
heap
|
page read and write
|
||
2BFE000
|
stack
|
page read and write
|
||
36FF000
|
stack
|
page read and write
|
||
28A0000
|
direct allocation
|
page read and write
|
||
5A8D000
|
trusted library allocation
|
page read and write
|
||
5A78000
|
trusted library allocation
|
page read and write
|
||
549D000
|
trusted library allocation
|
page read and write
|
||
5A6C000
|
trusted library allocation
|
page read and write
|
||
6C0F000
|
stack
|
page read and write
|
||
54AE000
|
trusted library allocation
|
page read and write
|
||
CE8000
|
heap
|
page read and write
|
||
561E000
|
trusted library allocation
|
page read and write
|
||
D5C000
|
heap
|
page read and write
|
||
5B4E000
|
trusted library allocation
|
page read and write
|
||
54B7000
|
trusted library allocation
|
page read and write
|
||
5BA0000
|
direct allocation
|
page read and write
|
||
54DE000
|
trusted library allocation
|
page read and write
|
||
D6E000
|
heap
|
page read and write
|
||
54F2000
|
trusted library allocation
|
page read and write
|
||
5929000
|
trusted library allocation
|
page read and write
|
||
5582000
|
trusted library allocation
|
page read and write
|
||
54CB000
|
trusted library allocation
|
page read and write
|
||
54F2000
|
trusted library allocation
|
page read and write
|
||
54AE000
|
trusted library allocation
|
page read and write
|
||
54E1000
|
trusted library allocation
|
page read and write
|
||
5B46000
|
trusted library allocation
|
page read and write
|
||
28A0000
|
direct allocation
|
page read and write
|
||
54AE000
|
trusted library allocation
|
page read and write
|
||
5481000
|
trusted library allocation
|
page read and write
|
||
54AE000
|
trusted library allocation
|
page read and write
|
||
54AE000
|
trusted library allocation
|
page read and write
|
||
549A000
|
trusted library allocation
|
page read and write
|
||
4970000
|
direct allocation
|
page read and write
|
||
54A6000
|
trusted library allocation
|
page read and write
|
||
5BE0000
|
trusted library allocation
|
page read and write
|
||
54AE000
|
trusted library allocation
|
page read and write
|
||
34BE000
|
stack
|
page read and write
|
||
5A71000
|
trusted library allocation
|
page read and write
|
||
4B00000
|
direct allocation
|
page execute and read and write
|
||
44E1000
|
heap
|
page read and write
|
||
281F000
|
stack
|
page read and write
|
||
5927000
|
trusted library allocation
|
page read and write
|
||
5650000
|
trusted library allocation
|
page read and write
|
||
5A70000
|
trusted library allocation
|
page read and write
|
||
993F000
|
stack
|
page read and write
|
||
549E000
|
trusted library allocation
|
page read and write
|
||
5AAD000
|
trusted library allocation
|
page read and write
|
||
63B000
|
unkown
|
page execute and read and write
|
||
592B000
|
trusted library allocation
|
page read and write
|
||
5A14000
|
trusted library allocation
|
page read and write
|
||
D7C000
|
heap
|
page read and write
|
||
28A0000
|
direct allocation
|
page read and write
|
||
D79000
|
heap
|
page read and write
|
||
CF5000
|
heap
|
page read and write
|
||
5491000
|
trusted library allocation
|
page read and write
|
||
5A65000
|
trusted library allocation
|
page read and write
|
||
710F000
|
stack
|
page read and write
|
||
54AE000
|
trusted library allocation
|
page read and write
|
||
D63000
|
heap
|
page read and write
|
||
59FD000
|
trusted library allocation
|
page read and write
|
||
556D000
|
trusted library allocation
|
page read and write
|
||
6D4F000
|
stack
|
page read and write
|
||
CB8000
|
heap
|
page read and write
|
||
59C4000
|
trusted library allocation
|
page read and write
|
||
D79000
|
heap
|
page read and write
|
||
54AF000
|
trusted library allocation
|
page read and write
|
||
54CE000
|
trusted library allocation
|
page read and write
|
||
D59000
|
heap
|
page read and write
|
||
54A7000
|
trusted library allocation
|
page read and write
|
||
548A000
|
trusted library allocation
|
page read and write
|
||
549E000
|
trusted library allocation
|
page read and write
|
||
54BB000
|
trusted library allocation
|
page read and write
|
||
549E000
|
trusted library allocation
|
page read and write
|
||
839C000
|
stack
|
page read and write
|
||
549E000
|
trusted library allocation
|
page read and write
|
||
4FE0000
|
remote allocation
|
page read and write
|
||
5B2D000
|
trusted library allocation
|
page read and write
|
||
D77000
|
heap
|
page read and write
|
||
4970000
|
direct allocation
|
page read and write
|
||
CF5000
|
heap
|
page read and write
|
||
59E3000
|
trusted library allocation
|
page read and write
|
||
D7C000
|
heap
|
page read and write
|
||
54FC000
|
trusted library allocation
|
page read and write
|
There are 881 hidden memdumps, click here to show them.
DOM / HTML
URL
|
Malicious
|
|
---|---|---|
https://learn.microsoft.com/en-us/dotnet/framework/install/application-not-started?version=(null)&processName=file.exe&platform=0009&osver=6&isServer=0&shimver=4.0.30319.0
|
||
https://learn.microsoft.com/en-us/dotnet/framework/install/application-not-started?version=(null)&processName=file.exe&platform=0009&osver=6&isServer=0&shimver=4.0.30319.0
|
||
https://learn.microsoft.com/en-us/dotnet/framework/install/application-not-started?version=(null)&processName=file.exe&platform=0009&osver=6&isServer=0&shimver=4.0.30319.0
|
||
https://learn.microsoft.com/en-us/dotnet/framework/install/application-not-started?version=(null)&processName=file.exe&platform=0009&osver=6&isServer=0&shimver=4.0.30319.0
|