Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
file.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
initial sample
|
||
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Docs.lnk
|
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command
line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Sat Nov 23 17:01:49 2024, atime=Wed Sep 27 04:28:28
2023, length=1210144, window=hide
|
dropped
|
||
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Gmail.lnk
|
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command
line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Sat Nov 23 17:01:49 2024, atime=Wed Sep 27 04:28:28
2023, length=1210144, window=hide
|
dropped
|
||
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Google Drive.lnk
|
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command
line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Wed Oct 4 12:54:07 2023, atime=Wed Sep 27 04:28:28
2023, length=1210144, window=hide
|
dropped
|
||
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Sheets.lnk
|
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command
line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Sat Nov 23 17:01:49 2024, atime=Wed Sep 27 04:28:28
2023, length=1210144, window=hide
|
dropped
|
||
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Slides.lnk
|
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command
line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Sat Nov 23 17:01:49 2024, atime=Wed Sep 27 04:28:28
2023, length=1210144, window=hide
|
dropped
|
||
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\YouTube.lnk
|
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command
line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Sat Nov 23 17:01:49 2024, atime=Wed Sep 27 04:28:28
2023, length=1210144, window=hide
|
dropped
|
||
Chrome Cache Entry: 100
|
ASCII text, with very long lines (52717), with no line terminators
|
dropped
|
||
Chrome Cache Entry: 101
|
ASCII text
|
downloaded
|
||
Chrome Cache Entry: 102
|
ASCII text, with very long lines (52717), with no line terminators
|
downloaded
|
||
Chrome Cache Entry: 103
|
exported SGML document, ASCII text, with very long lines (65536), with no line terminators
|
downloaded
|
||
Chrome Cache Entry: 104
|
PNG image data, 533 x 478, 8-bit/color RGBA, non-interlaced
|
downloaded
|
||
Chrome Cache Entry: 105
|
MS Windows icon resource - 6 icons, -128x-128, 16 colors, 72x72, 16 colors
|
downloaded
|
||
Chrome Cache Entry: 106
|
ASCII text, with very long lines (46884)
|
downloaded
|
||
Chrome Cache Entry: 107
|
JSON data
|
dropped
|
||
Chrome Cache Entry: 108
|
MS Windows icon resource - 6 icons, -128x-128, 16 colors, 72x72, 16 colors
|
dropped
|
||
Chrome Cache Entry: 109
|
PNG image data, 658 x 480, 8-bit/color RGBA, non-interlaced
|
downloaded
|
||
Chrome Cache Entry: 110
|
ASCII text, with very long lines (33148), with no line terminators
|
dropped
|
||
Chrome Cache Entry: 111
|
JSON data
|
downloaded
|
||
Chrome Cache Entry: 112
|
JPEG image data, JFIF standard 1.01, aspect ratio, density 1x1, segment length 16, baseline, precision 8, 1528x402, components
3
|
dropped
|
||
Chrome Cache Entry: 113
|
PNG image data, 475 x 212, 8-bit/color RGBA, non-interlaced
|
downloaded
|
||
Chrome Cache Entry: 114
|
JSON data
|
downloaded
|
||
Chrome Cache Entry: 115
|
JSON data
|
dropped
|
||
Chrome Cache Entry: 116
|
JPEG image data, JFIF standard 1.01, aspect ratio, density 1x1, segment length 16, baseline, precision 8, 1528x402, components
3
|
downloaded
|
||
Chrome Cache Entry: 117
|
exported SGML document, ASCII text, with very long lines (65536), with no line terminators
|
dropped
|
||
Chrome Cache Entry: 118
|
ASCII text, with very long lines (46884)
|
dropped
|
||
Chrome Cache Entry: 119
|
ASCII text
|
dropped
|
||
Chrome Cache Entry: 120
|
SVG Scalable Vector Graphics image
|
downloaded
|
||
Chrome Cache Entry: 121
|
Web Open Font Format (Version 2), TrueType, length 19696, version 1.0
|
downloaded
|
||
Chrome Cache Entry: 122
|
ASCII text, with very long lines (33148), with no line terminators
|
downloaded
|
||
Chrome Cache Entry: 123
|
PNG image data, 475 x 212, 8-bit/color RGBA, non-interlaced
|
dropped
|
||
Chrome Cache Entry: 124
|
PNG image data, 658 x 480, 8-bit/color RGBA, non-interlaced
|
dropped
|
||
Chrome Cache Entry: 125
|
JSON data
|
dropped
|
||
Chrome Cache Entry: 126
|
HTML document, ASCII text, with very long lines (639), with CRLF, LF line terminators
|
downloaded
|
||
Chrome Cache Entry: 127
|
JSON data
|
downloaded
|
||
Chrome Cache Entry: 128
|
PNG image data, 533 x 478, 8-bit/color RGBA, non-interlaced
|
dropped
|
||
Chrome Cache Entry: 87
|
PNG image data, 533 x 478, 8-bit/color RGBA, non-interlaced
|
dropped
|
||
Chrome Cache Entry: 88
|
PNG image data, 533 x 478, 8-bit/color RGBA, non-interlaced
|
downloaded
|
||
Chrome Cache Entry: 89
|
SVG Scalable Vector Graphics image
|
dropped
|
||
Chrome Cache Entry: 90
|
JSON data
|
dropped
|
||
Chrome Cache Entry: 91
|
PNG image data, 533 x 478, 8-bit/color RGBA, non-interlaced
|
dropped
|
||
Chrome Cache Entry: 92
|
ASCII text, with very long lines (65536), with no line terminators
|
downloaded
|
||
Chrome Cache Entry: 93
|
ASCII text, with no line terminators
|
downloaded
|
||
Chrome Cache Entry: 94
|
ASCII text, with very long lines (65410)
|
dropped
|
||
Chrome Cache Entry: 95
|
JSON data
|
dropped
|
||
Chrome Cache Entry: 96
|
ASCII text, with very long lines (65410)
|
downloaded
|
||
Chrome Cache Entry: 97
|
JSON data
|
dropped
|
||
Chrome Cache Entry: 98
|
JSON data
|
downloaded
|
||
Chrome Cache Entry: 99
|
PNG image data, 533 x 478, 8-bit/color RGBA, non-interlaced
|
downloaded
|
There are 39 hidden files, click here to show them.
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\file.exe
|
"C:\Users\user\Desktop\file.exe"
|
||
C:\Program Files\Google\Chrome\Application\chrome.exe
|
"C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized --single-argument http://go.microsoft.com/fwlink/?prd=11324&pver=4.5&sbp=AppLaunch2&plcid=0x409&o1=SHIM_NOVERSION_FOUND&version=(null)&processName=file.exe&platform=0009&osver=6&isServer=0&shimver=4.0.30319.0
|
||
C:\Program Files\Google\Chrome\Application\chrome.exe
|
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US
--service-sandbox-type=none --mojo-platform-channel-handle=2068 --field-trial-handle=1984,i,11204049690359226366,8167700250922482004,262144
--disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction
/prefetch:8
|
||
C:\Program Files\Google\Chrome\Application\chrome.exe
|
"C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized --single-argument http://go.microsoft.com/fwlink/?prd=11324&pver=4.5&sbp=AppLaunch2&plcid=0x409&o1=SHIM_NOVERSION_FOUND&version=(null)&processName=file.exe&platform=0009&osver=6&isServer=0&shimver=4.0.30319.0
|
||
C:\Program Files\Google\Chrome\Application\chrome.exe
|
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US
--service-sandbox-type=none --mojo-platform-channel-handle=2152 --field-trial-handle=1984,i,13680411521332787545,10737033242991967105,262144
--disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction
/prefetch:8
|
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
https://authoring-docs-microsoft.poolparty.biz/devrel/7696cda6-0510-47f6-8302-71bb5d2e28cf
|
unknown
|
||
https://duckduckgo.com/chrome_newtab
|
unknown
|
||
http://185.215.113.16/off/def.exeb
|
unknown
|
||
https://duckduckgo.com/ac/?q=
|
unknown
|
||
https://property-imper.sbs/api
|
172.67.162.84
|
||
https://github.com/dotnet/docs/blob/17c4acca45e573a92878a44a2cce57d699fe9c7c/docs/framework/install/
|
unknown
|
||
https://www.linkedin.com/cws/share?url=$
|
unknown
|
||
https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
|
unknown
|
||
https://github.com/Youssef1313
|
unknown
|
||
https://management.azure.com/providers/Microsoft.Portal/userSettings/cloudconsole?api-version=2023-0
|
unknown
|
||
https://aka.ms/msignite_docs_banner
|
unknown
|
||
https://videoencodingpublic-hgeaeyeba8gycee3.b01.azurefd.net/public-b4da8140-92cf-421c-8b7b-e471d5b9
|
unknown
|
||
http://polymer.github.io/AUTHORS.txt
|
unknown
|
||
https://github.com/dotnet/docs/issues/new?template=z-customer-feedback.yml
|
unknown
|
||
https://property-imper.sbs/l
|
unknown
|
||
https://management.azure.com/subscriptions?api-version=2016-06-01
|
unknown
|
||
https://github.com/dotnet/docs/blob/main/docs/framework/install/application-not-started.md
|
unknown
|
||
http://x1.c.lencr.org/0
|
unknown
|
||
http://x1.i.lencr.org/0
|
unknown
|
||
https://aka.ms/pshelpmechoose
|
unknown
|
||
https://aka.ms/feedback/report?space=61
|
unknown
|
||
https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
|
unknown
|
||
http://185.215.113.16/off/def.exes
|
unknown
|
||
https://learn-video.azurefd.net/vod/player
|
unknown
|
||
https://twitter.com/intent/tweet?original_referer=$
|
unknown
|
||
https://github.com/gewarren
|
unknown
|
||
http://185.215.113.16/off/def.exepleWebKit/537.36
|
unknown
|
||
https://support.mozilla.org/products/firefoxgro.all
|
unknown
|
||
http://polymer.github.io/CONTRIBUTORS.txt
|
unknown
|
||
http://185.215.113.16/i
|
unknown
|
||
https://github.com/dotnet/docs/blob/live/docs/framework/install/application-not-started.md
|
unknown
|
||
https://property-imper.sbs/api#
|
unknown
|
||
https://authoring-docs-microsoft.poolparty.biz/devrel/69c76c32-967e-4c65-b89a-74cc527db725
|
unknown
|
||
https://client-api.arkoselabs.com/v2/api.js
|
unknown
|
||
https://property-imper.sbs:443/api
|
unknown
|
||
https://aka.ms/MSIgniteChallenge/Tier1Banner?wt.mc_id=ignite24_learnbanner_tier1_cnl
|
unknown
|
||
https://management.azure.com/providers/Microsoft.Portal/consoles/default?api-version=2017-12-01-prev
|
unknown
|
||
https://www.google.com/images/branding/product/ico/googleg_lodp.ico
|
unknown
|
||
https://github.com/Thraka
|
unknown
|
||
http://polymer.github.io/PATENTS.txt
|
unknown
|
||
https://aka.ms/certhelp
|
unknown
|
||
http://185.215.113.16/steam/random.exe
|
unknown
|
||
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
|
unknown
|
||
http://crl.rootca1.amazontrust.com/rootca1.crl0
|
unknown
|
||
https://github.com/mairaw
|
unknown
|
||
https://js.monitor.azure.com/scripts/c/ms.jsll-4.min.js
|
13.107.246.63
|
||
http://ocsp.rootca1.amazontrust.com0:
|
unknown
|
||
https://schema.org
|
unknown
|
||
http://polymer.github.io/LICENSE.txt
|
unknown
|
||
https://www.ecosia.org/newtab/
|
unknown
|
||
https://property-imper.sbs/
|
unknown
|
||
https://support.mozilla.org/kb/customize-firefox-controls-buttons-and-toolbars?utm_source=firefox-br
|
unknown
|
||
https://aka.ms/yourcaliforniaprivacychoices
|
unknown
|
||
https://ac.ecosia.org/autocomplete?q=
|
unknown
|
||
https://github.com/nschonni
|
unknown
|
||
http://185.215.113.16/
|
unknown
|
||
https://videoencodingpublic-hgeaeyeba8gycee3.b01.azurefd.net/public-09ce73a6-05a5-4e4d-b3d7-bd5a8c05
|
unknown
|
||
https://property-imper.sbs/apiE
|
unknown
|
||
https://github.com/adegeo
|
unknown
|
||
https://github.com/jonschlinkert/is-plain-object
|
unknown
|
||
http://crt.rootca1.amazontrust.com/rootca1.cer0?
|
unknown
|
||
https://octokit.github.io/rest.js/#throttling
|
unknown
|
||
https://property-imper.sbs/lv
|
unknown
|
||
https://github.com/js-cookie/js-cookie
|
unknown
|
||
http://185.215.113.16/off/def.exe
|
unknown
|
||
http://schema.org/Organization
|
unknown
|
||
https://channel9.msdn.com/
|
unknown
|
||
https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
|
unknown
|
||
https://github.com/dotnet/try
|
unknown
|
||
https://property-imper.sbs/n&
|
unknown
|
There are 60 hidden URLs, click here to show them.
Domains
Name
|
IP
|
Malicious
|
|
---|---|---|---|
property-imper.sbs
|
172.67.162.84
|
||
www.google.com
|
142.250.181.100
|
||
s-part-0035.t-0009.t-msedge.net
|
13.107.246.63
|
||
js.monitor.azure.com
|
unknown
|
||
mdec.nelreports.net
|
unknown
|
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
192.168.2.5
|
unknown
|
unknown
|
||
13.107.246.63
|
s-part-0035.t-0009.t-msedge.net
|
United States
|
||
185.215.113.16
|
unknown
|
Portugal
|
||
142.250.181.100
|
www.google.com
|
United States
|
||
172.67.162.84
|
property-imper.sbs
|
United States
|
||
239.255.255.250
|
unknown
|
Reserved
|
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
5D73000
|
trusted library allocation
|
page read and write
|
||
6476000
|
trusted library allocation
|
page read and write
|
||
633A000
|
trusted library allocation
|
page read and write
|
||
155A000
|
heap
|
page read and write
|
||
366E000
|
stack
|
page read and write
|
||
8620000
|
trusted library allocation
|
page read and write
|
||
5D74000
|
trusted library allocation
|
page read and write
|
||
61EA000
|
trusted library allocation
|
page read and write
|
||
61EB000
|
trusted library allocation
|
page read and write
|
||
1644000
|
heap
|
page read and write
|
||
643D000
|
trusted library allocation
|
page read and write
|
||
5D71000
|
trusted library allocation
|
page read and write
|
||
62D7000
|
trusted library allocation
|
page read and write
|
||
5FB5000
|
trusted library allocation
|
page read and write
|
||
5D7C000
|
trusted library allocation
|
page read and write
|
||
62D5000
|
trusted library allocation
|
page read and write
|
||
38EE000
|
stack
|
page read and write
|
||
5D63000
|
trusted library allocation
|
page read and write
|
||
5D73000
|
trusted library allocation
|
page read and write
|
||
74DE000
|
stack
|
page read and write
|
||
5D50000
|
trusted library allocation
|
page read and write
|
||
6348000
|
trusted library allocation
|
page read and write
|
||
61E2000
|
trusted library allocation
|
page read and write
|
||
5D62000
|
trusted library allocation
|
page read and write
|
||
632A000
|
trusted library allocation
|
page read and write
|
||
6F9F000
|
stack
|
page read and write
|
||
1645000
|
heap
|
page read and write
|
||
F37000
|
unkown
|
page write copy
|
||
164C000
|
heap
|
page read and write
|
||
5D73000
|
trusted library allocation
|
page read and write
|
||
1622000
|
heap
|
page read and write
|
||
62BA000
|
trusted library allocation
|
page read and write
|
||
633A000
|
trusted library allocation
|
page read and write
|
||
1647000
|
heap
|
page read and write
|
||
5E41000
|
trusted library allocation
|
page read and write
|
||
5D63000
|
trusted library allocation
|
page read and write
|
||
5D73000
|
trusted library allocation
|
page read and write
|
||
5D7B000
|
trusted library allocation
|
page read and write
|
||
5D63000
|
trusted library allocation
|
page read and write
|
||
86C0000
|
direct allocation
|
page execute and read and write
|
||
62F9000
|
trusted library allocation
|
page read and write
|
||
452F000
|
stack
|
page read and write
|
||
62CF000
|
trusted library allocation
|
page read and write
|
||
70DF000
|
stack
|
page read and write
|
||
631B000
|
trusted library allocation
|
page read and write
|
||
711E000
|
stack
|
page read and write
|
||
6328000
|
trusted library allocation
|
page read and write
|
||
5D51000
|
trusted library allocation
|
page read and write
|
||
5D73000
|
trusted library allocation
|
page read and write
|
||
5DB2000
|
trusted library allocation
|
page read and write
|
||
5D84000
|
trusted library allocation
|
page read and write
|
||
5D73000
|
trusted library allocation
|
page read and write
|
||
5D66000
|
trusted library allocation
|
page read and write
|
||
633C000
|
trusted library allocation
|
page read and write
|
||
47EE000
|
stack
|
page read and write
|
||
5D63000
|
trusted library allocation
|
page read and write
|
||
5D73000
|
trusted library allocation
|
page read and write
|
||
5D43000
|
trusted library allocation
|
page read and write
|
||
162A000
|
heap
|
page read and write
|
||
5D4A000
|
trusted library allocation
|
page read and write
|
||
61EC000
|
trusted library allocation
|
page read and write
|
||
61E3000
|
trusted library allocation
|
page read and write
|
||
61E4000
|
trusted library allocation
|
page read and write
|
||
15B9000
|
heap
|
page read and write
|
||
5D46000
|
trusted library allocation
|
page read and write
|
||
5DBC000
|
trusted library allocation
|
page read and write
|
||
5D83000
|
trusted library allocation
|
page read and write
|
||
540D000
|
stack
|
page read and write
|
||
62E2000
|
trusted library allocation
|
page read and write
|
||
5D49000
|
trusted library allocation
|
page read and write
|
||
5D97000
|
trusted library allocation
|
page read and write
|
||
4CB0000
|
heap
|
page read and write
|
||
7C5E000
|
stack
|
page read and write
|
||
5D7B000
|
trusted library allocation
|
page read and write
|
||
6287000
|
trusted library allocation
|
page read and write
|
||
1550000
|
heap
|
page read and write
|
||
526F000
|
stack
|
page read and write
|
||
160C000
|
heap
|
page read and write
|
||
632C000
|
trusted library allocation
|
page read and write
|
||
41AE000
|
stack
|
page read and write
|
||
6278000
|
trusted library allocation
|
page read and write
|
||
61E3000
|
trusted library allocation
|
page read and write
|
||
52A0000
|
direct allocation
|
page execute and read and write
|
||
38AF000
|
stack
|
page read and write
|
||
5D4C000
|
trusted library allocation
|
page read and write
|
||
6047000
|
trusted library allocation
|
page read and write
|
||
62CF000
|
trusted library allocation
|
page read and write
|
||
5D64000
|
trusted library allocation
|
page read and write
|
||
61E5000
|
trusted library allocation
|
page read and write
|
||
164A000
|
heap
|
page read and write
|
||
5D56000
|
trusted library allocation
|
page read and write
|
||
578F000
|
stack
|
page read and write
|
||
725E000
|
stack
|
page read and write
|
||
5D41000
|
trusted library allocation
|
page read and write
|
||
1644000
|
heap
|
page read and write
|
||
6478000
|
trusted library allocation
|
page read and write
|
||
164E000
|
heap
|
page read and write
|
||
630B000
|
trusted library allocation
|
page read and write
|
||
466F000
|
stack
|
page read and write
|
||
5D63000
|
trusted library allocation
|
page read and write
|
||
5D92000
|
trusted library allocation
|
page read and write
|
||
5D63000
|
trusted library allocation
|
page read and write
|
||
62D8000
|
trusted library allocation
|
page read and write
|
||
5D63000
|
trusted library allocation
|
page read and write
|
||
6310000
|
trusted library allocation
|
page read and write
|
||
EE1000
|
unkown
|
page execute and write copy
|
||
ED0000
|
direct allocation
|
page read and write
|
||
4CB1000
|
heap
|
page read and write
|
||
5D6B000
|
trusted library allocation
|
page read and write
|
||
6317000
|
trusted library allocation
|
page read and write
|
||
83DE000
|
stack
|
page read and write
|
||
5E52000
|
trusted library allocation
|
page read and write
|
||
5DC9000
|
trusted library allocation
|
page read and write
|
||
11DD000
|
unkown
|
page execute and write copy
|
||
5DEE000
|
trusted library allocation
|
page read and write
|
||
61E7000
|
trusted library allocation
|
page read and write
|
||
629B000
|
trusted library allocation
|
page read and write
|
||
61EA000
|
trusted library allocation
|
page read and write
|
||
640F000
|
trusted library allocation
|
page read and write
|
||
5D47000
|
trusted library allocation
|
page read and write
|
||
62EC000
|
trusted library allocation
|
page read and write
|
||
5D73000
|
trusted library allocation
|
page read and write
|
||
61E6000
|
trusted library allocation
|
page read and write
|
||
60D6000
|
trusted library allocation
|
page read and write
|
||
61E4000
|
trusted library allocation
|
page read and write
|
||
160C000
|
heap
|
page read and write
|
||
861F000
|
stack
|
page read and write
|
||
1527000
|
heap
|
page read and write
|
||
5280000
|
remote allocation
|
page read and write
|
||
5D73000
|
trusted library allocation
|
page read and write
|
||
5D4E000
|
trusted library allocation
|
page read and write
|
||
5D9B000
|
trusted library allocation
|
page read and write
|
||
4A2F000
|
stack
|
page read and write
|
||
62C7000
|
trusted library allocation
|
page read and write
|
||
5D76000
|
trusted library allocation
|
page read and write
|
||
1631000
|
heap
|
page read and write
|
||
5D62000
|
trusted library allocation
|
page read and write
|
||
5D73000
|
trusted library allocation
|
page read and write
|
||
5D49000
|
trusted library allocation
|
page read and write
|
||
5D6B000
|
trusted library allocation
|
page read and write
|
||
5D7B000
|
trusted library allocation
|
page read and write
|
||
E65000
|
heap
|
page read and write
|
||
516C000
|
stack
|
page read and write
|
||
5D73000
|
trusted library allocation
|
page read and write
|
||
735F000
|
stack
|
page read and write
|
||
ED0000
|
direct allocation
|
page read and write
|
||
5D62000
|
trusted library allocation
|
page read and write
|
||
5D49000
|
trusted library allocation
|
page read and write
|
||
61E5000
|
trusted library allocation
|
page read and write
|
||
11DD000
|
unkown
|
page execute and read and write
|
||
5D61000
|
trusted library allocation
|
page read and write
|
||
1631000
|
heap
|
page read and write
|
||
63D5000
|
trusted library allocation
|
page read and write
|
||
4CB1000
|
heap
|
page read and write
|
||
5E40000
|
trusted library allocation
|
page read and write
|
||
6049000
|
trusted library allocation
|
page read and write
|
||
5D66000
|
trusted library allocation
|
page read and write
|
||
1612000
|
heap
|
page read and write
|
||
61EC000
|
trusted library allocation
|
page read and write
|
||
5D73000
|
trusted library allocation
|
page read and write
|
||
61E1000
|
trusted library allocation
|
page read and write
|
||
5F25000
|
trusted library allocation
|
page read and write
|
||
564E000
|
stack
|
page read and write
|
||
5D73000
|
trusted library allocation
|
page read and write
|
||
61E9000
|
trusted library allocation
|
page read and write
|
||
5D73000
|
trusted library allocation
|
page read and write
|
||
ED0000
|
direct allocation
|
page read and write
|
||
69D4000
|
trusted library allocation
|
page execute and read and write
|
||
5D41000
|
trusted library allocation
|
page read and write
|
||
161B000
|
heap
|
page read and write
|
||
5D6B000
|
trusted library allocation
|
page read and write
|
||
1615000
|
heap
|
page read and write
|
||
5D73000
|
trusted library allocation
|
page read and write
|
||
F37000
|
unkown
|
page read and write
|
||
58DF000
|
stack
|
page read and write
|
||
673A000
|
trusted library allocation
|
page execute and read and write
|
||
5D9B000
|
trusted library allocation
|
page read and write
|
||
815E000
|
stack
|
page read and write
|
||
8990000
|
heap
|
page read and write
|
||
1649000
|
heap
|
page read and write
|
||
5D93000
|
trusted library allocation
|
page read and write
|
||
163C000
|
heap
|
page read and write
|
||
5D50000
|
trusted library allocation
|
page read and write
|
||
8640000
|
trusted library allocation
|
page read and write
|
||
63D3000
|
trusted library allocation
|
page read and write
|
||
61E8000
|
trusted library allocation
|
page read and write
|
||
61E8000
|
trusted library allocation
|
page read and write
|
||
163A000
|
heap
|
page read and write
|
||
5D6E000
|
trusted library allocation
|
page read and write
|
||
61E3000
|
trusted library allocation
|
page read and write
|
||
5D83000
|
trusted library allocation
|
page read and write
|
||
161F000
|
heap
|
page read and write
|
||
62F4000
|
trusted library allocation
|
page read and write
|
||
161D000
|
heap
|
page read and write
|
||
161E000
|
heap
|
page read and write
|
||
63DF000
|
stack
|
page read and write
|
||
1649000
|
heap
|
page read and write
|
||
161B000
|
heap
|
page read and write
|
||
61E5000
|
trusted library allocation
|
page read and write
|
||
6FDE000
|
stack
|
page read and write
|
||
5D49000
|
trusted library allocation
|
page read and write
|
||
163A000
|
heap
|
page read and write
|
||
5D51000
|
trusted library allocation
|
page read and write
|
||
62D6000
|
trusted library allocation
|
page read and write
|
||
61E5000
|
trusted library allocation
|
page read and write
|
||
5D5F000
|
trusted library allocation
|
page read and write
|
||
362F000
|
stack
|
page read and write
|
||
5D66000
|
trusted library allocation
|
page read and write
|
||
4CB1000
|
heap
|
page read and write
|
||
62C0000
|
trusted library allocation
|
page read and write
|
||
5D67000
|
trusted library allocation
|
page read and write
|
||
61EC000
|
trusted library allocation
|
page read and write
|
||
5D9E000
|
trusted library allocation
|
page read and write
|
||
5D53000
|
trusted library allocation
|
page read and write
|
||
6470000
|
direct allocation
|
page read and write
|
||
5D41000
|
trusted library allocation
|
page read and write
|
||
61E7000
|
trusted library allocation
|
page read and write
|
||
6310000
|
trusted library allocation
|
page read and write
|
||
5D73000
|
trusted library allocation
|
page read and write
|
||
62B7000
|
trusted library allocation
|
page read and write
|
||
5D79000
|
trusted library allocation
|
page read and write
|
||
5DE1000
|
trusted library allocation
|
page read and write
|
||
4CB1000
|
heap
|
page read and write
|
||
5D42000
|
trusted library allocation
|
page read and write
|
||
1647000
|
heap
|
page read and write
|
||
ED0000
|
direct allocation
|
page read and write
|
||
5D93000
|
trusted library allocation
|
page read and write
|
||
632C000
|
trusted library allocation
|
page read and write
|
||
5D73000
|
trusted library allocation
|
page read and write
|
||
163C000
|
heap
|
page read and write
|
||
5D78000
|
trusted library allocation
|
page read and write
|
||
86AC000
|
stack
|
page read and write
|
||
5D62000
|
trusted library allocation
|
page read and write
|
||
3DAF000
|
stack
|
page read and write
|
||
5BF3000
|
heap
|
page read and write
|
||
5D62000
|
trusted library allocation
|
page read and write
|
||
1642000
|
heap
|
page read and write
|
||
5D63000
|
trusted library allocation
|
page read and write
|
||
60C0000
|
direct allocation
|
page read and write
|
||
5D6F000
|
trusted library allocation
|
page read and write
|
||
5D6B000
|
trusted library allocation
|
page read and write
|
||
5D63000
|
trusted library allocation
|
page read and write
|
||
5EF3000
|
trusted library allocation
|
page read and write
|
||
5D70000
|
trusted library allocation
|
page read and write
|
||
5D73000
|
trusted library allocation
|
page read and write
|
||
61E7000
|
trusted library allocation
|
page read and write
|
||
1649000
|
heap
|
page read and write
|
||
5D63000
|
trusted library allocation
|
page read and write
|
||
5D60000
|
trusted library allocation
|
page read and write
|
||
1649000
|
heap
|
page read and write
|
||
5D42000
|
trusted library allocation
|
page read and write
|
||
61E0000
|
trusted library allocation
|
page read and write
|
||
61E6000
|
trusted library allocation
|
page read and write
|
||
5EED000
|
trusted library allocation
|
page read and write
|
||
554D000
|
stack
|
page read and write
|
||
775E000
|
stack
|
page read and write
|
||
402F000
|
stack
|
page read and write
|
||
F25000
|
unkown
|
page execute and read and write
|
||
61EE000
|
trusted library allocation
|
page read and write
|
||
5E9D000
|
trusted library allocation
|
page read and write
|
||
630F000
|
trusted library allocation
|
page read and write
|
||
5DA8000
|
trusted library allocation
|
page read and write
|
||
5D4B000
|
trusted library allocation
|
page read and write
|
||
63FB000
|
trusted library allocation
|
page read and write
|
||
62AE000
|
trusted library allocation
|
page read and write
|
||
6296000
|
trusted library allocation
|
page read and write
|
||
1622000
|
heap
|
page read and write
|
||
4BAE000
|
stack
|
page read and write
|
||
811F000
|
stack
|
page read and write
|
||
5D89000
|
trusted library allocation
|
page read and write
|
||
6470000
|
direct allocation
|
page read and write
|
||
5D73000
|
trusted library allocation
|
page read and write
|
||
5D42000
|
trusted library allocation
|
page read and write
|
||
5DD2000
|
trusted library allocation
|
page read and write
|
||
5D8A000
|
trusted library allocation
|
page read and write
|
||
5E1D000
|
trusted library allocation
|
page read and write
|
||
62EE000
|
trusted library allocation
|
page read and write
|
||
1627000
|
heap
|
page read and write
|
||
61E3000
|
trusted library allocation
|
page read and write
|
||
5D42000
|
trusted library allocation
|
page read and write
|
||
5D7B000
|
trusted library allocation
|
page read and write
|
||
5DA5000
|
trusted library allocation
|
page read and write
|
||
5D78000
|
trusted library allocation
|
page read and write
|
||
61E7000
|
trusted library allocation
|
page read and write
|
||
5D73000
|
trusted library allocation
|
page read and write
|
||
5D73000
|
trusted library allocation
|
page read and write
|
||
5DDE000
|
trusted library allocation
|
page read and write
|
||
302B000
|
stack
|
page read and write
|
||
5D71000
|
trusted library allocation
|
page read and write
|
||
D20000
|
heap
|
page read and write
|
||
5D51000
|
trusted library allocation
|
page read and write
|
||
163F000
|
heap
|
page read and write
|
||
5D7F000
|
trusted library allocation
|
page read and write
|
||
61E3000
|
trusted library allocation
|
page read and write
|
||
14BE000
|
stack
|
page read and write
|
||
5DE1000
|
trusted library allocation
|
page read and write
|
||
1644000
|
heap
|
page read and write
|
||
5D7C000
|
trusted library allocation
|
page read and write
|
||
62BE000
|
trusted library allocation
|
page read and write
|
||
5D49000
|
trusted library allocation
|
page read and write
|
||
6D5E000
|
stack
|
page read and write
|
||
1644000
|
heap
|
page read and write
|
||
61EA000
|
trusted library allocation
|
page read and write
|
||
5D62000
|
trusted library allocation
|
page read and write
|
||
629B000
|
trusted library allocation
|
page read and write
|
||
61EC000
|
trusted library allocation
|
page read and write
|
||
8C1B000
|
stack
|
page read and write
|
||
749F000
|
stack
|
page read and write
|
||
5DDF000
|
trusted library allocation
|
page read and write
|
||
5D9B000
|
trusted library allocation
|
page read and write
|
||
8670000
|
direct allocation
|
page read and write
|
||
5D51000
|
trusted library allocation
|
page read and write
|
||
53CD000
|
stack
|
page read and write
|
||
6338000
|
trusted library allocation
|
page read and write
|
||
5E42000
|
trusted library allocation
|
page read and write
|
||
160D000
|
heap
|
page read and write
|
||
5D42000
|
trusted library allocation
|
page read and write
|
||
5B8F000
|
stack
|
page read and write
|
||
1642000
|
heap
|
page read and write
|
||
1510000
|
direct allocation
|
page read and write
|
||
4CB1000
|
heap
|
page read and write
|
||
6289000
|
trusted library allocation
|
page read and write
|
||
62CD000
|
trusted library allocation
|
page read and write
|
||
5DA3000
|
trusted library allocation
|
page read and write
|
||
492E000
|
stack
|
page read and write
|
||
15FF000
|
heap
|
page read and write
|
||
799F000
|
stack
|
page read and write
|
||
43EF000
|
stack
|
page read and write
|
||
5D42000
|
trusted library allocation
|
page read and write
|
||
162A000
|
heap
|
page read and write
|
||
164D000
|
heap
|
page read and write
|
||
8800000
|
direct allocation
|
page execute and read and write
|
||
4DB0000
|
trusted library allocation
|
page read and write
|
||
1622000
|
heap
|
page read and write
|
||
5D6B000
|
trusted library allocation
|
page read and write
|
||
5D71000
|
trusted library allocation
|
page read and write
|
||
137A000
|
unkown
|
page execute and read and write
|
||
6298000
|
trusted library allocation
|
page read and write
|
||
5E22000
|
trusted library allocation
|
page read and write
|
||
161E000
|
heap
|
page read and write
|
||
632E000
|
trusted library allocation
|
page read and write
|
||
57DE000
|
stack
|
page read and write
|
||
5DA3000
|
trusted library allocation
|
page read and write
|
||
6BDF000
|
stack
|
page read and write
|
||
5D84000
|
trusted library allocation
|
page read and write
|
||
6616000
|
trusted library allocation
|
page read and write
|
||
4CB1000
|
heap
|
page read and write
|
||
785F000
|
stack
|
page read and write
|
||
1637000
|
heap
|
page read and write
|
||
5D73000
|
trusted library allocation
|
page read and write
|
||
5280000
|
remote allocation
|
page read and write
|
||
155E000
|
heap
|
page read and write
|
||
61E9000
|
trusted library allocation
|
page read and write
|
||
ED0000
|
direct allocation
|
page read and write
|
||
EE1000
|
unkown
|
page execute and read and write
|
||
62BC000
|
trusted library allocation
|
page read and write
|
||
5D63000
|
trusted library allocation
|
page read and write
|
||
1631000
|
heap
|
page read and write
|
||
6282000
|
trusted library allocation
|
page read and write
|
||
5D63000
|
trusted library allocation
|
page read and write
|
||
5D73000
|
trusted library allocation
|
page read and write
|
||
5DBE000
|
trusted library allocation
|
page read and write
|
||
61E7000
|
trusted library allocation
|
page read and write
|
||
442E000
|
stack
|
page read and write
|
||
5D73000
|
trusted library allocation
|
page read and write
|
||
6470000
|
direct allocation
|
page read and write
|
||
6438000
|
trusted library allocation
|
page read and write
|
||
1647000
|
heap
|
page read and write
|
||
5D8F000
|
trusted library allocation
|
page read and write
|
||
F39000
|
unkown
|
page execute and read and write
|
||
11C6000
|
unkown
|
page execute and read and write
|
||
33AF000
|
stack
|
page read and write
|
||
5D63000
|
trusted library allocation
|
page read and write
|
||
62FF000
|
trusted library allocation
|
page read and write
|
||
1540000
|
direct allocation
|
page execute and read and write
|
||
640D000
|
trusted library allocation
|
page read and write
|
||
416F000
|
stack
|
page read and write
|
||
62AC000
|
trusted library allocation
|
page read and write
|
||
5D8A000
|
trusted library allocation
|
page read and write
|
||
37AE000
|
stack
|
page read and write
|
||
61E3000
|
trusted library allocation
|
page read and write
|
||
6470000
|
direct allocation
|
page read and write
|
||
62AE000
|
trusted library allocation
|
page read and write
|
||
5D73000
|
trusted library allocation
|
page read and write
|
||
5D8B000
|
trusted library allocation
|
page read and write
|
||
164C000
|
heap
|
page read and write
|
||
1629000
|
heap
|
page read and write
|
||
4CB1000
|
heap
|
page read and write
|
||
63C9000
|
trusted library allocation
|
page read and write
|
||
5D6B000
|
trusted library allocation
|
page read and write
|
||
4CB1000
|
heap
|
page read and write
|
||
61E2000
|
trusted library allocation
|
page read and write
|
||
61E6000
|
trusted library allocation
|
page read and write
|
||
1649000
|
heap
|
page read and write
|
||
5D73000
|
trusted library allocation
|
page read and write
|
||
62C5000
|
trusted library allocation
|
page read and write
|
||
163F000
|
heap
|
page read and write
|
||
5DA3000
|
trusted library allocation
|
page read and write
|
||
4CB1000
|
heap
|
page read and write
|
||
39EF000
|
stack
|
page read and write
|
||
5290000
|
direct allocation
|
page execute and read and write
|
||
1631000
|
heap
|
page read and write
|
||
6319000
|
trusted library allocation
|
page read and write
|
||
ED0000
|
direct allocation
|
page read and write
|
||
5D73000
|
trusted library allocation
|
page read and write
|
||
5D73000
|
trusted library allocation
|
page read and write
|
||
5290000
|
direct allocation
|
page execute and read and write
|
||
5270000
|
direct allocation
|
page execute and read and write
|
||
62B5000
|
trusted library allocation
|
page read and write
|
||
62AC000
|
trusted library allocation
|
page read and write
|
||
137B000
|
unkown
|
page execute and write copy
|
||
5D73000
|
trusted library allocation
|
page read and write
|
||
1641000
|
heap
|
page read and write
|
||
1637000
|
heap
|
page read and write
|
||
61E7000
|
trusted library allocation
|
page read and write
|
||
5D7B000
|
trusted library allocation
|
page read and write
|
||
5DAC000
|
trusted library allocation
|
page read and write
|
||
1510000
|
direct allocation
|
page read and write
|
||
5DBE000
|
trusted library allocation
|
page read and write
|
||
5D73000
|
trusted library allocation
|
page read and write
|
||
5D7B000
|
trusted library allocation
|
page read and write
|
||
4CB1000
|
heap
|
page read and write
|
||
62FD000
|
trusted library allocation
|
page read and write
|
||
84DF000
|
stack
|
page read and write
|
||
629D000
|
trusted library allocation
|
page read and write
|
||
1622000
|
heap
|
page read and write
|
||
5E22000
|
trusted library allocation
|
page read and write
|
||
61E1000
|
trusted library allocation
|
page read and write
|
||
46AE000
|
stack
|
page read and write
|
||
5DAC000
|
trusted library allocation
|
page read and write
|
||
61E5000
|
trusted library allocation
|
page read and write
|
||
1649000
|
heap
|
page read and write
|
||
5D48000
|
trusted library allocation
|
page read and write
|
||
643F000
|
trusted library allocation
|
page read and write
|
||
163C000
|
heap
|
page read and write
|
||
5D4E000
|
trusted library allocation
|
page read and write
|
||
1641000
|
heap
|
page read and write
|
||
EAE000
|
stack
|
page read and write
|
||
61E8000
|
trusted library allocation
|
page read and write
|
||
62FB000
|
trusted library allocation
|
page read and write
|
||
5D7C000
|
trusted library allocation
|
page read and write
|
||
5D8B000
|
trusted library allocation
|
page read and write
|
||
61E9000
|
trusted library allocation
|
page read and write
|
||
630D000
|
trusted library allocation
|
page read and write
|
||
4CB1000
|
heap
|
page read and write
|
||
6C1E000
|
stack
|
page read and write
|
||
75DF000
|
stack
|
page read and write
|
||
88E0000
|
trusted library allocation
|
page read and write
|
||
5D67000
|
trusted library allocation
|
page read and write
|
||
1588000
|
heap
|
page read and write
|
||
3B2F000
|
stack
|
page read and write
|
||
2FEF000
|
stack
|
page read and write
|
||
5D7B000
|
trusted library allocation
|
page read and write
|
||
4B6F000
|
stack
|
page read and write
|
||
5290000
|
direct allocation
|
page execute and read and write
|
||
5290000
|
direct allocation
|
page execute and read and write
|
||
ED0000
|
direct allocation
|
page read and write
|
||
61E4000
|
trusted library allocation
|
page read and write
|
||
1641000
|
heap
|
page read and write
|
||
5D49000
|
trusted library allocation
|
page read and write
|
||
6470000
|
direct allocation
|
page read and write
|
||
5DBD000
|
trusted library allocation
|
page read and write
|
||
68BE000
|
trusted library allocation
|
page execute and read and write
|
||
52C0000
|
direct allocation
|
page execute and read and write
|
||
5DC9000
|
trusted library allocation
|
page read and write
|
||
52D5000
|
trusted library allocation
|
page read and write
|
||
550D000
|
stack
|
page read and write
|
||
162A000
|
heap
|
page read and write
|
||
5D9B000
|
trusted library allocation
|
page read and write
|
||
61E7000
|
trusted library allocation
|
page read and write
|
||
63EF000
|
trusted library allocation
|
page read and write
|
||
1620000
|
heap
|
page read and write
|
||
5D4D000
|
trusted library allocation
|
page read and write
|
||
7B1E000
|
stack
|
page read and write
|
||
8670000
|
direct allocation
|
page read and write
|
||
6ADF000
|
stack
|
page read and write
|
||
8D5E000
|
stack
|
page read and write
|
||
5D73000
|
trusted library allocation
|
page read and write
|
||
164D000
|
heap
|
page read and write
|
||
63AF000
|
trusted library allocation
|
page read and write
|
||
3F2E000
|
stack
|
page read and write
|
||
645A000
|
trusted library allocation
|
page read and write
|
||
5D73000
|
trusted library allocation
|
page read and write
|
||
3DEE000
|
stack
|
page read and write
|
||
5D49000
|
trusted library allocation
|
page read and write
|
||
5D42000
|
trusted library allocation
|
page read and write
|
||
5D9B000
|
trusted library allocation
|
page read and write
|
||
5D63000
|
trusted library allocation
|
page read and write
|
||
ED0000
|
direct allocation
|
page read and write
|
||
5DA1000
|
trusted library allocation
|
page read and write
|
||
61E5000
|
trusted library allocation
|
page read and write
|
||
5D49000
|
trusted library allocation
|
page read and write
|
||
5D78000
|
trusted library allocation
|
page read and write
|
||
5D69000
|
trusted library allocation
|
page read and write
|
||
3EEF000
|
stack
|
page read and write
|
||
ED0000
|
direct allocation
|
page read and write
|
||
5D49000
|
trusted library allocation
|
page read and write
|
||
5D65000
|
trusted library allocation
|
page read and write
|
||
591D000
|
stack
|
page read and write
|
||
5D9E000
|
trusted library allocation
|
page read and write
|
||
61EF000
|
trusted library allocation
|
page read and write
|
||
6458000
|
trusted library allocation
|
page read and write
|
||
5290000
|
direct allocation
|
page execute and read and write
|
||
5D73000
|
trusted library allocation
|
page read and write
|
||
5D8D000
|
trusted library allocation
|
page read and write
|
||
5D7B000
|
trusted library allocation
|
page read and write
|
||
61EA000
|
trusted library allocation
|
page read and write
|
||
512D000
|
stack
|
page read and write
|
||
5D3D000
|
stack
|
page read and write
|
||
1641000
|
heap
|
page read and write
|
||
1644000
|
heap
|
page read and write
|
||
789E000
|
stack
|
page read and write
|
||
5DA4000
|
trusted library allocation
|
page read and write
|
||
7D9E000
|
stack
|
page read and write
|
||
61E6000
|
trusted library allocation
|
page read and write
|
||
ED0000
|
direct allocation
|
page read and write
|
||
801E000
|
stack
|
page read and write
|
||
61EE000
|
trusted library allocation
|
page read and write
|
||
61E4000
|
trusted library allocation
|
page read and write
|
||
5F1D000
|
trusted library allocation
|
page read and write
|
||
641C000
|
stack
|
page read and write
|
||
63BF000
|
trusted library allocation
|
page read and write
|
||
161C000
|
heap
|
page read and write
|
||
568E000
|
stack
|
page read and write
|
||
15A3000
|
heap
|
page read and write
|
||
5F8E000
|
trusted library allocation
|
page read and write
|
||
1520000
|
heap
|
page read and write
|
||
1649000
|
heap
|
page read and write
|
||
162A000
|
heap
|
page read and write
|
||
5D63000
|
trusted library allocation
|
page read and write
|
||
5D63000
|
trusted library allocation
|
page read and write
|
||
644B000
|
trusted library allocation
|
page read and write
|
||
61E7000
|
trusted library allocation
|
page read and write
|
||
5D73000
|
trusted library allocation
|
page read and write
|
||
61E0000
|
trusted library allocation
|
page read and write
|
||
3A2E000
|
stack
|
page read and write
|
||
5DAC000
|
trusted library allocation
|
page read and write
|
||
645E000
|
stack
|
page read and write
|
||
5130000
|
direct allocation
|
page read and write
|
||
632A000
|
trusted library allocation
|
page read and write
|
||
5DC0000
|
trusted library allocation
|
page read and write
|
||
61E3000
|
trusted library allocation
|
page read and write
|
||
5D99000
|
trusted library allocation
|
page read and write
|
||
61E8000
|
trusted library allocation
|
page read and write
|
||
5DDE000
|
trusted library allocation
|
page read and write
|
||
15AE000
|
heap
|
page read and write
|
||
5D63000
|
trusted library allocation
|
page read and write
|
||
5D63000
|
trusted library allocation
|
page read and write
|
||
63F1000
|
trusted library allocation
|
page read and write
|
||
5D5B000
|
trusted library allocation
|
page read and write
|
||
61E6000
|
trusted library allocation
|
page read and write
|
||
5DB2000
|
trusted library allocation
|
page read and write
|
||
3B6E000
|
stack
|
page read and write
|
||
5D62000
|
trusted library allocation
|
page read and write
|
||
161B000
|
heap
|
page read and write
|
||
61EC000
|
trusted library allocation
|
page read and write
|
||
EE0000
|
unkown
|
page read and write
|
||
6470000
|
direct allocation
|
page read and write
|
||
739E000
|
stack
|
page read and write
|
||
ED0000
|
direct allocation
|
page read and write
|
||
5D62000
|
trusted library allocation
|
page read and write
|
||
EB0000
|
heap
|
page read and write
|
||
6287000
|
trusted library allocation
|
page read and write
|
||
164A000
|
heap
|
page read and write
|
||
5C3D000
|
stack
|
page read and write
|
||
5D84000
|
trusted library allocation
|
page read and write
|
||
5D42000
|
trusted library allocation
|
page read and write
|
||
6736000
|
trusted library allocation
|
page read and write
|
||
5D73000
|
trusted library allocation
|
page read and write
|
||
5D73000
|
trusted library allocation
|
page read and write
|
||
5D63000
|
trusted library allocation
|
page read and write
|
||
5D81000
|
trusted library allocation
|
page read and write
|
||
5D98000
|
trusted library allocation
|
page read and write
|
||
6732000
|
trusted library allocation
|
page execute and read and write
|
||
637C000
|
trusted library allocation
|
page read and write
|
||
61E2000
|
trusted library allocation
|
page read and write
|
||
8D1C000
|
stack
|
page read and write
|
||
5DDD000
|
trusted library allocation
|
page read and write
|
||
CFA000
|
stack
|
page read and write
|
||
7FDF000
|
stack
|
page read and write
|
||
61E9000
|
trusted library allocation
|
page read and write
|
||
1649000
|
heap
|
page read and write
|
||
5D73000
|
trusted library allocation
|
page read and write
|
||
1649000
|
heap
|
page read and write
|
||
6398000
|
trusted library allocation
|
page read and write
|
||
164E000
|
heap
|
page read and write
|
||
5D42000
|
trusted library allocation
|
page read and write
|
||
5E70000
|
trusted library allocation
|
page read and write
|
||
5D70000
|
trusted library allocation
|
page read and write
|
||
635D000
|
trusted library allocation
|
page read and write
|
||
721F000
|
stack
|
page read and write
|
||
6470000
|
direct allocation
|
page read and write
|
||
5D8B000
|
trusted library allocation
|
page read and write
|
||
5E41000
|
trusted library allocation
|
page read and write
|
||
5D74000
|
trusted library allocation
|
page read and write
|
||
61E9000
|
trusted library allocation
|
page read and write
|
||
119C000
|
unkown
|
page execute and read and write
|
||
1644000
|
heap
|
page read and write
|
||
5A8E000
|
stack
|
page read and write
|
||
61ED000
|
trusted library allocation
|
page read and write
|
||
61E7000
|
trusted library allocation
|
page read and write
|
||
406E000
|
stack
|
page read and write
|
||
643A000
|
trusted library allocation
|
page read and write
|
||
5D5C000
|
trusted library allocation
|
page read and write
|
||
5D6C000
|
trusted library allocation
|
page read and write
|
||
4CB1000
|
heap
|
page read and write
|
||
5D74000
|
trusted library allocation
|
page read and write
|
||
6315000
|
trusted library allocation
|
page read and write
|
||
5D49000
|
trusted library allocation
|
page read and write
|
||
5D73000
|
trusted library allocation
|
page read and write
|
||
6470000
|
direct allocation
|
page read and write
|
||
61EA000
|
trusted library allocation
|
page read and write
|
||
633A000
|
trusted library allocation
|
page read and write
|
||
4CB1000
|
heap
|
page read and write
|
||
5D49000
|
trusted library allocation
|
page read and write
|
||
5D42000
|
trusted library allocation
|
page read and write
|
||
5D48000
|
trusted library allocation
|
page read and write
|
||
6297000
|
trusted library allocation
|
page read and write
|
||
6396000
|
trusted library allocation
|
page read and write
|
||
6048000
|
trusted library allocation
|
page read and write
|
||
5D63000
|
trusted library allocation
|
page read and write
|
||
6470000
|
direct allocation
|
page read and write
|
||
4CAF000
|
stack
|
page read and write
|
||
5D71000
|
trusted library allocation
|
page read and write
|
||
11CE000
|
unkown
|
page execute and read and write
|
||
69C5000
|
trusted library allocation
|
page execute and read and write
|
||
164C000
|
heap
|
page read and write
|
||
4CB1000
|
heap
|
page read and write
|
||
63CB000
|
trusted library allocation
|
page read and write
|
||
5D78000
|
trusted library allocation
|
page read and write
|
||
1620000
|
heap
|
page read and write
|
||
4CB1000
|
heap
|
page read and write
|
||
1620000
|
heap
|
page read and write
|
||
5DFC000
|
trusted library allocation
|
page read and write
|
||
5D83000
|
trusted library allocation
|
page read and write
|
||
63C1000
|
trusted library allocation
|
page read and write
|
||
5D9B000
|
trusted library allocation
|
page read and write
|
||
163F000
|
heap
|
page read and write
|
||
6284000
|
trusted library allocation
|
page read and write
|
||
61E8000
|
trusted library allocation
|
page read and write
|
||
E50000
|
heap
|
page read and write
|
||
326F000
|
stack
|
page read and write
|
||
4CB1000
|
heap
|
page read and write
|
||
5A1E000
|
stack
|
page read and write
|
||
61E6000
|
trusted library allocation
|
page read and write
|
||
52B0000
|
direct allocation
|
page execute and read and write
|
||
5D7B000
|
trusted library allocation
|
page read and write
|
||
5D5F000
|
trusted library allocation
|
page read and write
|
||
5D4A000
|
trusted library allocation
|
page read and write
|
||
839F000
|
stack
|
page read and write
|
||
62E1000
|
trusted library allocation
|
page read and write
|
||
5D49000
|
trusted library allocation
|
page read and write
|
||
4CC0000
|
heap
|
page read and write
|
||
5D73000
|
trusted library allocation
|
page read and write
|
||
161B000
|
heap
|
page read and write
|
||
48EF000
|
stack
|
page read and write
|
||
7C1F000
|
stack
|
page read and write
|
||
5D8E000
|
trusted library allocation
|
page read and write
|
||
5174000
|
direct allocation
|
page read and write
|
||
5D7B000
|
trusted library allocation
|
page read and write
|
||
162E000
|
heap
|
page read and write
|
||
164A000
|
heap
|
page read and write
|
||
162B000
|
heap
|
page read and write
|
||
61E5000
|
trusted library allocation
|
page read and write
|
||
11DE000
|
unkown
|
page execute and write copy
|
||
5D49000
|
trusted library allocation
|
page read and write
|
||
6490000
|
trusted library allocation
|
page read and write
|
||
47AF000
|
stack
|
page read and write
|
||
5D40000
|
trusted library allocation
|
page read and write
|
||
5DFC000
|
trusted library allocation
|
page read and write
|
||
174E000
|
stack
|
page read and write
|
||
5D47000
|
trusted library allocation
|
page read and write
|
||
63FD000
|
trusted library allocation
|
page read and write
|
||
6856000
|
trusted library allocation
|
page read and write
|
||
5280000
|
remote allocation
|
page read and write
|
||
5DCA000
|
trusted library allocation
|
page read and write
|
||
61EA000
|
trusted library allocation
|
page read and write
|
||
1623000
|
heap
|
page read and write
|
||
42ED000
|
stack
|
page read and write
|
||
829E000
|
stack
|
page read and write
|
||
164D000
|
heap
|
page read and write
|
||
631E000
|
trusted library allocation
|
page read and write
|
||
6470000
|
direct allocation
|
page read and write
|
||
69D6000
|
trusted library allocation
|
page execute and read and write
|
||
5D73000
|
trusted library allocation
|
page read and write
|
||
5D84000
|
trusted library allocation
|
page read and write
|
||
6D1F000
|
stack
|
page read and write
|
||
648E000
|
trusted library allocation
|
page read and write
|
||
5DDD000
|
trusted library allocation
|
page read and write
|
||
5E4D000
|
trusted library allocation
|
page read and write
|
||
5D6D000
|
trusted library allocation
|
page read and write
|
||
5D49000
|
trusted library allocation
|
page read and write
|
||
61E7000
|
trusted library allocation
|
page read and write
|
||
147E000
|
stack
|
page read and write
|
||
89A0000
|
trusted library allocation
|
page read and write
|
||
5D4C000
|
trusted library allocation
|
page read and write
|
||
6E5F000
|
stack
|
page read and write
|
||
5D8A000
|
trusted library allocation
|
page read and write
|
||
5F15000
|
trusted library allocation
|
page read and write
|
||
79DE000
|
stack
|
page read and write
|
||
6470000
|
direct allocation
|
page read and write
|
||
5D62000
|
trusted library allocation
|
page read and write
|
||
5D8B000
|
trusted library allocation
|
page read and write
|
||
62E4000
|
trusted library allocation
|
page read and write
|
||
5DA4000
|
trusted library allocation
|
page read and write
|
||
644D000
|
trusted library allocation
|
page read and write
|
||
8670000
|
direct allocation
|
page read and write
|
||
10C3000
|
unkown
|
page execute and read and write
|
||
5D49000
|
trusted library allocation
|
page read and write
|
||
635F000
|
trusted library allocation
|
page read and write
|
||
34EF000
|
stack
|
page read and write
|
||
5DEE000
|
trusted library allocation
|
page read and write
|
||
1641000
|
heap
|
page read and write
|
||
5D56000
|
trusted library allocation
|
page read and write
|
||
5D63000
|
trusted library allocation
|
page read and write
|
||
61E9000
|
trusted library allocation
|
page read and write
|
||
4CB1000
|
heap
|
page read and write
|
||
6309000
|
trusted library allocation
|
page read and write
|
||
5D61000
|
trusted library allocation
|
page read and write
|
||
5D49000
|
trusted library allocation
|
page read and write
|
||
E00000
|
heap
|
page read and write
|
||
604A000
|
trusted library allocation
|
page read and write
|
||
5D83000
|
trusted library allocation
|
page read and write
|
||
5DB2000
|
trusted library allocation
|
page read and write
|
||
771F000
|
stack
|
page read and write
|
||
EE0000
|
unkown
|
page readonly
|
||
164C000
|
heap
|
page read and write
|
||
62DD000
|
trusted library allocation
|
page read and write
|
||
1642000
|
heap
|
page read and write
|
||
5DEC000
|
trusted library allocation
|
page read and write
|
||
627A000
|
trusted library allocation
|
page read and write
|
||
5D93000
|
trusted library allocation
|
page read and write
|
||
5D63000
|
trusted library allocation
|
page read and write
|
||
5D63000
|
trusted library allocation
|
page read and write
|
||
61E2000
|
trusted library allocation
|
page read and write
|
||
6338000
|
trusted library allocation
|
page read and write
|
||
5E22000
|
trusted library allocation
|
page read and write
|
||
89A9000
|
trusted library allocation
|
page read and write
|
||
5290000
|
direct allocation
|
page execute and read and write
|
||
5D49000
|
trusted library allocation
|
page read and write
|
||
5280000
|
direct allocation
|
page execute and read and write
|
||
5D9B000
|
trusted library allocation
|
page read and write
|
||
1510000
|
direct allocation
|
page read and write
|
||
61E3000
|
trusted library allocation
|
page read and write
|
||
61E2000
|
trusted library allocation
|
page read and write
|
||
5D56000
|
trusted library allocation
|
page read and write
|
||
63AD000
|
trusted library allocation
|
page read and write
|
||
62D1000
|
trusted library allocation
|
page read and write
|
||
62E3000
|
trusted library allocation
|
page read and write
|
||
61E5000
|
trusted library allocation
|
page read and write
|
||
61E1000
|
trusted library allocation
|
page read and write
|
||
60BE000
|
stack
|
page read and write
|
||
672B000
|
trusted library allocation
|
page read and write
|
||
6470000
|
direct allocation
|
page read and write
|
||
1631000
|
heap
|
page read and write
|
||
456E000
|
stack
|
page read and write
|
||
1649000
|
heap
|
page read and write
|
||
3CAE000
|
stack
|
page read and write
|
||
5D45000
|
trusted library allocation
|
page read and write
|
||
4CB1000
|
heap
|
page read and write
|
||
5E46000
|
trusted library allocation
|
page read and write
|
||
ED0000
|
direct allocation
|
page read and write
|
||
6E9E000
|
stack
|
page read and write
|
||
8E5E000
|
stack
|
page read and write
|
||
1647000
|
heap
|
page read and write
|
||
89A2000
|
trusted library allocation
|
page read and write
|
||
5D42000
|
trusted library allocation
|
page read and write
|
||
5D6C000
|
trusted library allocation
|
page read and write
|
||
5DA4000
|
trusted library allocation
|
page read and write
|
||
61E4000
|
trusted library allocation
|
page read and write
|
||
1622000
|
heap
|
page read and write
|
||
62DB000
|
trusted library allocation
|
page read and write
|
||
5D6E000
|
trusted library allocation
|
page read and write
|
||
164B000
|
heap
|
page read and write
|
||
61E9000
|
trusted library allocation
|
page read and write
|
||
6041000
|
trusted library allocation
|
page read and write
|
||
62F2000
|
trusted library allocation
|
page read and write
|
||
5D71000
|
trusted library allocation
|
page read and write
|
||
5DEC000
|
trusted library allocation
|
page read and write
|
||
163B000
|
heap
|
page read and write
|
||
5D9B000
|
trusted library allocation
|
page read and write
|
||
1642000
|
heap
|
page read and write
|
||
6730000
|
trusted library allocation
|
page read and write
|
||
6283000
|
trusted library allocation
|
page read and write
|
||
630E000
|
trusted library allocation
|
page read and write
|
||
5E7D000
|
trusted library allocation
|
page read and write
|
||
6312000
|
trusted library allocation
|
page read and write
|
||
32AE000
|
stack
|
page read and write
|
||
62AE000
|
trusted library allocation
|
page read and write
|
||
7ADF000
|
stack
|
page read and write
|
||
5D73000
|
trusted library allocation
|
page read and write
|
||
1642000
|
heap
|
page read and write
|
||
5D66000
|
trusted library allocation
|
page read and write
|
||
5D88000
|
trusted library allocation
|
page read and write
|
||
312F000
|
stack
|
page read and write
|
||
ED0000
|
direct allocation
|
page read and write
|
||
6285000
|
trusted library allocation
|
page read and write
|
||
4CB1000
|
heap
|
page read and write
|
||
7EDE000
|
stack
|
page read and write
|
||
1649000
|
heap
|
page read and write
|
||
5D54000
|
trusted library allocation
|
page read and write
|
||
1644000
|
heap
|
page read and write
|
||
5D42000
|
trusted library allocation
|
page read and write
|
||
7D5F000
|
stack
|
page read and write
|
||
5D63000
|
trusted library allocation
|
page read and write
|
||
62B3000
|
trusted library allocation
|
page read and write
|
||
5D51000
|
trusted library allocation
|
page read and write
|
||
5D63000
|
trusted library allocation
|
page read and write
|
||
5D93000
|
trusted library allocation
|
page read and write
|
||
4CB1000
|
heap
|
page read and write
|
||
61EB000
|
trusted library allocation
|
page read and write
|
||
62D9000
|
stack
|
page read and write
|
||
62B1000
|
trusted library allocation
|
page read and write
|
||
160F000
|
heap
|
page read and write
|
||
ED0000
|
direct allocation
|
page read and write
|
||
316E000
|
stack
|
page read and write
|
||
1647000
|
heap
|
page read and write
|
||
5D6B000
|
trusted library allocation
|
page read and write
|
||
1647000
|
heap
|
page read and write
|
||
42AF000
|
stack
|
page read and write
|
||
5D69000
|
trusted library allocation
|
page read and write
|
||
5DAC000
|
trusted library allocation
|
page read and write
|
||
5D49000
|
trusted library allocation
|
page read and write
|
||
A140000
|
trusted library allocation
|
page read and write
|
||
631C000
|
trusted library allocation
|
page read and write
|
||
352E000
|
stack
|
page read and write
|
||
5D63000
|
trusted library allocation
|
page read and write
|
||
5D6B000
|
trusted library allocation
|
page read and write
|
||
86E0000
|
heap
|
page read and write
|
||
6470000
|
direct allocation
|
page read and write
|
||
61E5000
|
trusted library allocation
|
page read and write
|
||
5E65000
|
trusted library allocation
|
page read and write
|
||
1631000
|
heap
|
page read and write
|
||
376F000
|
stack
|
page read and write
|
||
1644000
|
heap
|
page read and write
|
||
5D6C000
|
trusted library allocation
|
page read and write
|
||
5D73000
|
trusted library allocation
|
page read and write
|
||
6311000
|
trusted library allocation
|
page read and write
|
||
5D42000
|
trusted library allocation
|
page read and write
|
||
637E000
|
trusted library allocation
|
page read and write
|
||
4CB1000
|
heap
|
page read and write
|
||
5D8C000
|
trusted library allocation
|
page read and write
|
||
5D73000
|
trusted library allocation
|
page read and write
|
||
164B000
|
heap
|
page read and write
|
||
87EF000
|
stack
|
page read and write
|
||
761E000
|
stack
|
page read and write
|
||
61E5000
|
trusted library allocation
|
page read and write
|
||
3C6F000
|
stack
|
page read and write
|
||
5DDC000
|
trusted library allocation
|
page read and write
|
||
4A6E000
|
stack
|
page read and write
|
||
629D000
|
trusted library allocation
|
page read and write
|
||
5D48000
|
trusted library allocation
|
page read and write
|
||
5D97000
|
trusted library allocation
|
page read and write
|
||
5D63000
|
trusted library allocation
|
page read and write
|
||
6079000
|
stack
|
page read and write
|
||
1641000
|
heap
|
page read and write
|
||
5D76000
|
trusted library allocation
|
page read and write
|
||
62AC000
|
trusted library allocation
|
page read and write
|
||
5DB2000
|
trusted library allocation
|
page read and write
|
||
4CB1000
|
heap
|
page read and write
|
||
9BB000
|
stack
|
page read and write
|
||
1645000
|
heap
|
page read and write
|
||
825F000
|
stack
|
page read and write
|
||
5E12000
|
trusted library allocation
|
page read and write
|
||
5D49000
|
trusted library allocation
|
page read and write
|
||
5D73000
|
trusted library allocation
|
page read and write
|
||
5E4C000
|
trusted library allocation
|
page read and write
|
||
1645000
|
heap
|
page read and write
|
||
5D49000
|
trusted library allocation
|
page read and write
|
||
164D000
|
heap
|
page read and write
|
||
5D62000
|
trusted library allocation
|
page read and write
|
||
163F000
|
heap
|
page read and write
|
||
5E12000
|
trusted library allocation
|
page read and write
|
||
4CB1000
|
heap
|
page read and write
|
||
E60000
|
heap
|
page read and write
|
||
5D6E000
|
trusted library allocation
|
page read and write
|
||
5D69000
|
trusted library allocation
|
page read and write
|
||
61E4000
|
trusted library allocation
|
page read and write
|
||
161B000
|
heap
|
page read and write
|
||
5D63000
|
trusted library allocation
|
page read and write
|
||
61EC000
|
trusted library allocation
|
page read and write
|
||
61E4000
|
trusted library allocation
|
page read and write
|
||
61ED000
|
trusted library allocation
|
page read and write
|
||
6470000
|
direct allocation
|
page read and write
|
||
61E2000
|
trusted library allocation
|
page read and write
|
||
5D63000
|
trusted library allocation
|
page read and write
|
||
5DA2000
|
trusted library allocation
|
page read and write
|
||
5D62000
|
trusted library allocation
|
page read and write
|
||
33EE000
|
stack
|
page read and write
|
||
5D6E000
|
trusted library allocation
|
page read and write
|
||
7E9F000
|
stack
|
page read and write
|
||
14FE000
|
stack
|
page read and write
|
||
164D000
|
heap
|
page read and write
|
||
630F000
|
trusted library allocation
|
page read and write
|
||
5D45000
|
trusted library allocation
|
page read and write
|
||
5DB2000
|
trusted library allocation
|
page read and write
|
||
5DE1000
|
trusted library allocation
|
page read and write
|
||
5BF0000
|
heap
|
page read and write
|
||
1622000
|
heap
|
page read and write
|
||
6299000
|
trusted library allocation
|
page read and write
|
||
6289000
|
trusted library allocation
|
page read and write
|
||
5DD5000
|
trusted library allocation
|
page read and write
|
||
1647000
|
heap
|
page read and write
|
||
851E000
|
stack
|
page read and write
|
||
5D78000
|
trusted library allocation
|
page read and write
|
||
671D000
|
trusted library allocation
|
page read and write
|
||
163B000
|
heap
|
page read and write
|
||
5D63000
|
trusted library allocation
|
page read and write
|
||
5D46000
|
trusted library allocation
|
page read and write
|
||
5DE2000
|
trusted library allocation
|
page read and write
|
There are 900 hidden memdumps, click here to show them.
DOM / HTML
URL
|
Malicious
|
|
---|---|---|
https://learn.microsoft.com/en-us/dotnet/framework/install/application-not-started?version=(null)&processName=file.exe&platform=0009&osver=6&isServer=0&shimver=4.0.30319.0
|
||
https://learn.microsoft.com/en-us/dotnet/framework/install/application-not-started?version=(null)&processName=file.exe&platform=0009&osver=6&isServer=0&shimver=4.0.30319.0
|
||
https://learn.microsoft.com/en-us/dotnet/framework/install/application-not-started?version=(null)&processName=file.exe&platform=0009&osver=6&isServer=0&shimver=4.0.30319.0
|
||
https://learn.microsoft.com/en-us/dotnet/framework/install/application-not-started?version=(null)&processName=file.exe&platform=0009&osver=6&isServer=0&shimver=4.0.30319.0
|
||
https://learn.microsoft.com/en-us/dotnet/framework/install/application-not-started?version=(null)&processName=file.exe&platform=0009&osver=6&isServer=0&shimver=4.0.30319.0
|