Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
file.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
initial sample
|
||
Chrome Cache Entry: 100
|
JSON data
|
downloaded
|
||
Chrome Cache Entry: 101
|
JSON data
|
dropped
|
||
Chrome Cache Entry: 102
|
JPEG image data, JFIF standard 1.01, aspect ratio, density 1x1, segment length 16, baseline, precision 8, 1528x402, components
3
|
downloaded
|
||
Chrome Cache Entry: 103
|
exported SGML document, ASCII text, with very long lines (65536), with no line terminators
|
dropped
|
||
Chrome Cache Entry: 104
|
ASCII text, with very long lines (46884)
|
dropped
|
||
Chrome Cache Entry: 105
|
ASCII text
|
dropped
|
||
Chrome Cache Entry: 106
|
SVG Scalable Vector Graphics image
|
downloaded
|
||
Chrome Cache Entry: 107
|
Web Open Font Format (Version 2), TrueType, length 19696, version 1.0
|
downloaded
|
||
Chrome Cache Entry: 108
|
ASCII text, with very long lines (33148), with no line terminators
|
downloaded
|
||
Chrome Cache Entry: 109
|
PNG image data, 475 x 212, 8-bit/color RGBA, non-interlaced
|
dropped
|
||
Chrome Cache Entry: 110
|
PNG image data, 658 x 480, 8-bit/color RGBA, non-interlaced
|
dropped
|
||
Chrome Cache Entry: 111
|
JSON data
|
dropped
|
||
Chrome Cache Entry: 112
|
HTML document, ASCII text, with very long lines (639), with CRLF, LF line terminators
|
downloaded
|
||
Chrome Cache Entry: 113
|
JSON data
|
downloaded
|
||
Chrome Cache Entry: 114
|
PNG image data, 533 x 478, 8-bit/color RGBA, non-interlaced
|
dropped
|
||
Chrome Cache Entry: 73
|
PNG image data, 533 x 478, 8-bit/color RGBA, non-interlaced
|
dropped
|
||
Chrome Cache Entry: 74
|
PNG image data, 533 x 478, 8-bit/color RGBA, non-interlaced
|
downloaded
|
||
Chrome Cache Entry: 75
|
SVG Scalable Vector Graphics image
|
dropped
|
||
Chrome Cache Entry: 76
|
JSON data
|
dropped
|
||
Chrome Cache Entry: 77
|
PNG image data, 533 x 478, 8-bit/color RGBA, non-interlaced
|
dropped
|
||
Chrome Cache Entry: 78
|
ASCII text, with very long lines (65536), with no line terminators
|
downloaded
|
||
Chrome Cache Entry: 79
|
ASCII text, with very long lines (65410)
|
dropped
|
||
Chrome Cache Entry: 80
|
JSON data
|
dropped
|
||
Chrome Cache Entry: 81
|
ASCII text, with very long lines (65410)
|
downloaded
|
||
Chrome Cache Entry: 82
|
JSON data
|
downloaded
|
||
Chrome Cache Entry: 83
|
JSON data
|
dropped
|
||
Chrome Cache Entry: 84
|
PNG image data, 533 x 478, 8-bit/color RGBA, non-interlaced
|
downloaded
|
||
Chrome Cache Entry: 85
|
ASCII text, with very long lines (52717), with no line terminators
|
dropped
|
||
Chrome Cache Entry: 86
|
ASCII text
|
downloaded
|
||
Chrome Cache Entry: 87
|
ASCII text, with very long lines (52717), with no line terminators
|
downloaded
|
||
Chrome Cache Entry: 88
|
exported SGML document, ASCII text, with very long lines (65536), with no line terminators
|
downloaded
|
||
Chrome Cache Entry: 89
|
ASCII text, with no line terminators
|
downloaded
|
||
Chrome Cache Entry: 90
|
PNG image data, 533 x 478, 8-bit/color RGBA, non-interlaced
|
downloaded
|
||
Chrome Cache Entry: 91
|
MS Windows icon resource - 6 icons, -128x-128, 16 colors, 72x72, 16 colors
|
downloaded
|
||
Chrome Cache Entry: 92
|
ASCII text, with very long lines (46884)
|
downloaded
|
||
Chrome Cache Entry: 93
|
JSON data
|
dropped
|
||
Chrome Cache Entry: 94
|
MS Windows icon resource - 6 icons, -128x-128, 16 colors, 72x72, 16 colors
|
dropped
|
||
Chrome Cache Entry: 95
|
PNG image data, 658 x 480, 8-bit/color RGBA, non-interlaced
|
downloaded
|
||
Chrome Cache Entry: 96
|
ASCII text, with very long lines (33148), with no line terminators
|
dropped
|
||
Chrome Cache Entry: 97
|
JSON data
|
downloaded
|
||
Chrome Cache Entry: 98
|
JPEG image data, JFIF standard 1.01, aspect ratio, density 1x1, segment length 16, baseline, precision 8, 1528x402, components
3
|
dropped
|
||
Chrome Cache Entry: 99
|
PNG image data, 475 x 212, 8-bit/color RGBA, non-interlaced
|
downloaded
|
There are 33 hidden files, click here to show them.
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\file.exe
|
"C:\Users\user\Desktop\file.exe"
|
||
C:\Program Files\Google\Chrome\Application\chrome.exe
|
"C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized --single-argument http://go.microsoft.com/fwlink/?prd=11324&pver=4.5&sbp=AppLaunch2&plcid=0x409&o1=SHIM_NOVERSION_FOUND&version=(null)&processName=file.exe&platform=0009&osver=6&isServer=0&shimver=4.0.30319.0
|
||
C:\Program Files\Google\Chrome\Application\chrome.exe
|
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US
--service-sandbox-type=none --mojo-platform-channel-handle=2524 --field-trial-handle=1908,i,3407012707208329137,12783355728101438977,262144
--disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction
/prefetch:8
|
||
C:\Program Files\Google\Chrome\Application\chrome.exe
|
"C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized --single-argument http://go.microsoft.com/fwlink/?prd=11324&pver=4.5&sbp=AppLaunch2&plcid=0x409&o1=SHIM_NOVERSION_FOUND&version=(null)&processName=file.exe&platform=0009&osver=6&isServer=0&shimver=4.0.30319.0
|
||
C:\Program Files\Google\Chrome\Application\chrome.exe
|
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US
--service-sandbox-type=none --mojo-platform-channel-handle=1164 --field-trial-handle=1932,i,12659663742680586460,29782516825973807,262144
--disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction
/prefetch:8
|
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
https://authoring-docs-microsoft.poolparty.biz/devrel/7696cda6-0510-47f6-8302-71bb5d2e28cf
|
unknown
|
||
https://www.amazon.com/?tag=admarketus-20&ref=pd_sl_ef0fa27a12d43fbd45649e195429e8a63ddcad7cf7e128c0
|
unknown
|
||
https://duckduckgo.com/chrome_newtab
|
unknown
|
||
http://185.215.113.16/off/def.exeb
|
unknown
|
||
https://duckduckgo.com/ac/?q=
|
unknown
|
||
https://property-imper.sbs/api
|
104.21.33.116
|
||
https://github.com/dotnet/docs/blob/17c4acca45e573a92878a44a2cce57d699fe9c7c/docs/framework/install/
|
unknown
|
||
https://www.linkedin.com/cws/share?url=$
|
unknown
|
||
https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
|
unknown
|
||
https://property-imper.sbs/apiU
|
unknown
|
||
https://github.com/Youssef1313
|
unknown
|
||
https://management.azure.com/providers/Microsoft.Portal/userSettings/cloudconsole?api-version=2023-0
|
unknown
|
||
https://aka.ms/msignite_docs_banner
|
unknown
|
||
https://videoencodingpublic-hgeaeyeba8gycee3.b01.azurefd.net/public-b4da8140-92cf-421c-8b7b-e471d5b9
|
unknown
|
||
http://polymer.github.io/AUTHORS.txt
|
unknown
|
||
https://github.com/dotnet/docs/issues/new?template=z-customer-feedback.yml
|
unknown
|
||
https://management.azure.com/subscriptions?api-version=2016-06-01
|
unknown
|
||
https://github.com/dotnet/docs/blob/main/docs/framework/install/application-not-started.md
|
unknown
|
||
https://property-imper.sbs/apiYRs78O
|
unknown
|
||
http://x1.c.lencr.org/0
|
unknown
|
||
http://x1.i.lencr.org/0
|
unknown
|
||
https://aka.ms/pshelpmechoose
|
unknown
|
||
https://aka.ms/feedback/report?space=61
|
unknown
|
||
https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
|
unknown
|
||
https://property-imper.sbs:443/api&t
|
unknown
|
||
https://property-imper.sbs/apiYRs78Oc
|
unknown
|
||
http://185.215.113.16/off/def.exes
|
unknown
|
||
https://learn-video.azurefd.net/vod/player
|
unknown
|
||
https://twitter.com/intent/tweet?original_referer=$
|
unknown
|
||
https://github.com/gewarren
|
unknown
|
||
http://185.215.113.16/off/def.exepleWebKit/537.36
|
unknown
|
||
https://support.mozilla.org/products/firefoxgro.all
|
unknown
|
||
http://polymer.github.io/CONTRIBUTORS.txt
|
unknown
|
||
https://github.com/dotnet/docs/blob/live/docs/framework/install/application-not-started.md
|
unknown
|
||
https://authoring-docs-microsoft.poolparty.biz/devrel/69c76c32-967e-4c65-b89a-74cc527db725
|
unknown
|
||
https://client-api.arkoselabs.com/v2/api.js
|
unknown
|
||
https://aka.ms/MSIgniteChallenge/Tier1Banner?wt.mc_id=ignite24_learnbanner_tier1_cnl
|
unknown
|
||
https://management.azure.com/providers/Microsoft.Portal/consoles/default?api-version=2017-12-01-prev
|
unknown
|
||
https://www.google.com/images/branding/product/ico/googleg_lodp.ico
|
unknown
|
||
https://github.com/Thraka
|
unknown
|
||
http://polymer.github.io/PATENTS.txt
|
unknown
|
||
https://aka.ms/certhelp
|
unknown
|
||
http://185.215.113.16/steam/random.exe
|
unknown
|
||
https://bridge.sfo1.admarketplace.net/ctp?version=16.0.0&key=1696490019400400000.2&ci=1696490019252.
|
unknown
|
||
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
|
unknown
|
||
http://crl.rootca1.amazontrust.com/rootca1.crl0
|
unknown
|
||
https://github.com/mairaw
|
unknown
|
||
http://www.microsoft.
|
unknown
|
||
https://js.monitor.azure.com/scripts/c/ms.jsll-4.min.js
|
13.107.246.63
|
||
http://ocsp.rootca1.amazontrust.com0:
|
unknown
|
||
https://schema.org
|
unknown
|
||
http://polymer.github.io/LICENSE.txt
|
unknown
|
||
https://www.ecosia.org/newtab/
|
unknown
|
||
https://property-imper.sbs/
|
unknown
|
||
https://support.mozilla.org/kb/customize-firefox-controls-buttons-and-toolbars?utm_source=firefox-br
|
unknown
|
||
https://aka.ms/yourcaliforniaprivacychoices
|
unknown
|
||
https://ac.ecosia.org/autocomplete?q=
|
unknown
|
||
https://github.com/nschonni
|
unknown
|
||
http://185.215.113.16/
|
unknown
|
||
https://videoencodingpublic-hgeaeyeba8gycee3.b01.azurefd.net/public-09ce73a6-05a5-4e4d-b3d7-bd5a8c05
|
unknown
|
||
https://github.com/adegeo
|
unknown
|
||
http://185.215.113.16/D
|
unknown
|
||
https://contile-images.services.mozilla.com/obgoOYObjIFea_bXuT6L4LbBJ8j425AD87S1HMD3BWg.9991.jpg
|
unknown
|
||
https://github.com/jonschlinkert/is-plain-object
|
unknown
|
||
http://crt.rootca1.amazontrust.com/rootca1.cer0?
|
unknown
|
||
https://octokit.github.io/rest.js/#throttling
|
unknown
|
||
https://www.invisalign.com/?utm_source=admarketplace&utm_medium=paidsearch&utm_campaign=Invisalign&u
|
unknown
|
||
https://imp.mt48.net/static?id=7RHzfOIXjFEYsBdvIpkX4Qqm4pqWfpl%2B4pbW4pbWfpbW7ReNxR3UIG8zInwYIFIVs9e
|
unknown
|
||
https://contile-images.services.mozilla.com/CuERQnIs4CzqjKBh9os6_h9d4CUDCHO3oiqmAQO6VLM.25122.jpg
|
unknown
|
||
https://github.com/js-cookie/js-cookie
|
unknown
|
||
https://property-imper.sbs:443/apig
|
unknown
|
||
http://185.215.113.16/off/def.exe
|
unknown
|
||
http://schema.org/Organization
|
unknown
|
||
https://channel9.msdn.com/
|
unknown
|
||
https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
|
unknown
|
||
https://github.com/dotnet/try
|
unknown
|
||
https://bridge.sfo1.ap01.net/ctp?version=16.0.0&key=1696490019400400000.1&ci=1696490019252.12791&cta
|
unknown
|
There are 67 hidden URLs, click here to show them.
Domains
Name
|
IP
|
Malicious
|
|
---|---|---|---|
property-imper.sbs
|
104.21.33.116
|
||
www.google.com
|
172.217.21.36
|
||
s-part-0035.t-0009.t-msedge.net
|
13.107.246.63
|
||
js.monitor.azure.com
|
unknown
|
||
mdec.nelreports.net
|
unknown
|
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
192.168.2.7
|
unknown
|
unknown
|
||
13.107.246.63
|
s-part-0035.t-0009.t-msedge.net
|
United States
|
||
185.215.113.16
|
unknown
|
Portugal
|
||
239.255.255.250
|
unknown
|
Reserved
|
||
104.21.33.116
|
property-imper.sbs
|
United States
|
||
172.217.21.36
|
www.google.com
|
United States
|
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
533C000
|
trusted library allocation
|
page read and write
|
||
532A000
|
trusted library allocation
|
page read and write
|
||
5C3000
|
heap
|
page read and write
|
||
51BF000
|
stack
|
page read and write
|
||
748F000
|
stack
|
page read and write
|
||
5394000
|
trusted library allocation
|
page read and write
|
||
57A3000
|
trusted library allocation
|
page read and write
|
||
532A000
|
trusted library allocation
|
page read and write
|
||
59B000
|
heap
|
page read and write
|
||
588D000
|
trusted library allocation
|
page read and write
|
||
57A7000
|
trusted library allocation
|
page read and write
|
||
532E000
|
trusted library allocation
|
page read and write
|
||
530F000
|
trusted library allocation
|
page read and write
|
||
5A9000
|
heap
|
page read and write
|
||
7FA0000
|
heap
|
page read and write
|
||
533B000
|
trusted library allocation
|
page read and write
|
||
3D6E000
|
stack
|
page read and write
|
||
5406000
|
trusted library allocation
|
page read and write
|
||
586D000
|
trusted library allocation
|
page read and write
|
||
422F000
|
stack
|
page read and write
|
||
5305000
|
trusted library allocation
|
page read and write
|
||
5891000
|
trusted library allocation
|
page read and write
|
||
531D000
|
trusted library allocation
|
page read and write
|
||
53B1000
|
trusted library allocation
|
page read and write
|
||
58EC000
|
trusted library allocation
|
page read and write
|
||
57AE000
|
trusted library allocation
|
page read and write
|
||
543A000
|
trusted library allocation
|
page read and write
|
||
535E000
|
trusted library allocation
|
page read and write
|
||
532B000
|
trusted library allocation
|
page read and write
|
||
3BEF000
|
stack
|
page read and write
|
||
625000
|
unkown
|
page execute and read and write
|
||
57A6000
|
trusted library allocation
|
page read and write
|
||
54AA000
|
trusted library allocation
|
page read and write
|
||
5E13000
|
trusted library allocation
|
page read and write
|
||
533B000
|
trusted library allocation
|
page read and write
|
||
7C10000
|
direct allocation
|
page read and write
|
||
5368000
|
trusted library allocation
|
page read and write
|
||
530F000
|
trusted library allocation
|
page read and write
|
||
5910000
|
trusted library allocation
|
page read and write
|
||
59DF000
|
trusted library allocation
|
page read and write
|
||
2AAE000
|
stack
|
page read and write
|
||
55A4000
|
trusted library allocation
|
page read and write
|
||
57AB000
|
trusted library allocation
|
page read and write
|
||
5407000
|
trusted library allocation
|
page read and write
|
||
658F000
|
stack
|
page read and write
|
||
531D000
|
trusted library allocation
|
page read and write
|
||
5A6000
|
heap
|
page read and write
|
||
58C6000
|
trusted library allocation
|
page read and write
|
||
5868000
|
trusted library allocation
|
page read and write
|
||
536000
|
heap
|
page read and write
|
||
5368000
|
trusted library allocation
|
page read and write
|
||
31EF000
|
stack
|
page read and write
|
||
549A000
|
trusted library allocation
|
page read and write
|
||
47C0000
|
heap
|
page read and write
|
||
57A3000
|
trusted library allocation
|
page read and write
|
||
2710000
|
direct allocation
|
page read and write
|
||
5355000
|
trusted library allocation
|
page read and write
|
||
533B000
|
trusted library allocation
|
page read and write
|
||
57A3000
|
trusted library allocation
|
page read and write
|
||
454000
|
heap
|
page read and write
|
||
58C4000
|
trusted library allocation
|
page read and write
|
||
536D000
|
trusted library allocation
|
page read and write
|
||
57A1000
|
trusted library allocation
|
page read and write
|
||
6A8F000
|
stack
|
page read and write
|
||
834E000
|
stack
|
page read and write
|
||
5403000
|
trusted library allocation
|
page read and write
|
||
5306000
|
trusted library allocation
|
page read and write
|
||
57AF000
|
trusted library allocation
|
page read and write
|
||
5385000
|
trusted library allocation
|
page read and write
|
||
58B9000
|
trusted library allocation
|
page read and write
|
||
5A0000
|
heap
|
page read and write
|
||
5374000
|
trusted library allocation
|
page read and write
|
||
57A5000
|
trusted library allocation
|
page read and write
|
||
534E000
|
trusted library allocation
|
page read and write
|
||
7C10000
|
direct allocation
|
page read and write
|
||
533B000
|
trusted library allocation
|
page read and write
|
||
5398000
|
trusted library allocation
|
page read and write
|
||
5866000
|
trusted library allocation
|
page read and write
|
||
588C000
|
trusted library allocation
|
page read and write
|
||
2710000
|
direct allocation
|
page read and write
|
||
5324000
|
trusted library allocation
|
page read and write
|
||
59A000
|
heap
|
page read and write
|
||
35EE000
|
stack
|
page read and write
|
||
533F000
|
trusted library allocation
|
page read and write
|
||
5306000
|
trusted library allocation
|
page read and write
|
||
5A30000
|
direct allocation
|
page read and write
|
||
5A0000
|
heap
|
page read and write
|
||
4370000
|
heap
|
page read and write
|
||
7C10000
|
direct allocation
|
page read and write
|
||
57AA000
|
trusted library allocation
|
page read and write
|
||
5346000
|
trusted library allocation
|
page read and write
|
||
4470000
|
trusted library allocation
|
page read and write
|
||
57A7000
|
trusted library allocation
|
page read and write
|
||
4380000
|
heap
|
page read and write
|
||
3AEE000
|
stack
|
page read and write
|
||
4960000
|
direct allocation
|
page execute and read and write
|
||
534E000
|
trusted library allocation
|
page read and write
|
||
7C10000
|
direct allocation
|
page read and write
|
||
57A5000
|
trusted library allocation
|
page read and write
|
||
5EA8000
|
trusted library allocation
|
page execute and read and write
|
||
57B0000
|
trusted library allocation
|
page read and write
|
||
536F000
|
trusted library allocation
|
page read and write
|
||
530D000
|
trusted library allocation
|
page read and write
|
||
7C10000
|
direct allocation
|
page read and write
|
||
4371000
|
heap
|
page read and write
|
||
D8F000
|
stack
|
page read and write
|
||
533F000
|
trusted library allocation
|
page read and write
|
||
5A4000
|
heap
|
page read and write
|
||
5C7000
|
heap
|
page read and write
|
||
533B000
|
trusted library allocation
|
page read and write
|
||
5354000
|
trusted library allocation
|
page read and write
|
||
532D000
|
trusted library allocation
|
page read and write
|
||
57A8000
|
trusted library allocation
|
page read and write
|
||
844F000
|
stack
|
page read and write
|
||
530E000
|
trusted library allocation
|
page read and write
|
||
59B2000
|
trusted library allocation
|
page read and write
|
||
5394000
|
trusted library allocation
|
page read and write
|
||
58EE000
|
trusted library allocation
|
page read and write
|
||
533B000
|
trusted library allocation
|
page read and write
|
||
4C0D000
|
stack
|
page read and write
|
||
4970000
|
direct allocation
|
page execute and read and write
|
||
536B000
|
trusted library allocation
|
page read and write
|
||
639000
|
unkown
|
page execute and read and write
|
||
4ACC000
|
stack
|
page read and write
|
||
57A6000
|
trusted library allocation
|
page read and write
|
||
5394000
|
trusted library allocation
|
page read and write
|
||
58E1000
|
trusted library allocation
|
page read and write
|
||
4990000
|
direct allocation
|
page execute and read and write
|
||
454000
|
heap
|
page read and write
|
||
5C3000
|
heap
|
page read and write
|
||
5E1000
|
unkown
|
page execute and write copy
|
||
580000
|
heap
|
page read and write
|
||
57A6000
|
trusted library allocation
|
page read and write
|
||
5B3000
|
heap
|
page read and write
|
||
5316000
|
trusted library allocation
|
page read and write
|
||
5D16000
|
trusted library allocation
|
page read and write
|
||
5317000
|
trusted library allocation
|
page read and write
|
||
5AD000
|
heap
|
page read and write
|
||
5346000
|
trusted library allocation
|
page read and write
|
||
C8D000
|
stack
|
page read and write
|
||
54E2000
|
trusted library allocation
|
page read and write
|
||
533B000
|
trusted library allocation
|
page read and write
|
||
58D9000
|
trusted library allocation
|
page read and write
|
||
634E000
|
stack
|
page read and write
|
||
5316000
|
trusted library allocation
|
page read and write
|
||
5863000
|
trusted library allocation
|
page read and write
|
||
454000
|
heap
|
page read and write
|
||
2710000
|
direct allocation
|
page read and write
|
||
8D8000
|
unkown
|
page execute and read and write
|
||
5BE000
|
heap
|
page read and write
|
||
7C10000
|
direct allocation
|
page read and write
|
||
534C000
|
trusted library allocation
|
page read and write
|
||
531D000
|
trusted library allocation
|
page read and write
|
||
4DE000
|
heap
|
page read and write
|
||
770F000
|
stack
|
page read and write
|
||
4D8E000
|
stack
|
page read and write
|
||
5324000
|
trusted library allocation
|
page read and write
|
||
5A54000
|
trusted library allocation
|
page read and write
|
||
4D0000
|
heap
|
page read and write
|
||
57A7000
|
trusted library allocation
|
page read and write
|
||
57A3000
|
trusted library allocation
|
page read and write
|
||
539C000
|
trusted library allocation
|
page read and write
|
||
58E9000
|
trusted library allocation
|
page read and write
|
||
70461000
|
unkown
|
page execute read
|
||
534A000
|
trusted library allocation
|
page read and write
|
||
2E6E000
|
stack
|
page read and write
|
||
7C10000
|
trusted library allocation
|
page read and write
|
||
535B000
|
trusted library allocation
|
page read and write
|
||
2CEF000
|
stack
|
page read and write
|
||
532B000
|
trusted library allocation
|
page read and write
|
||
532F000
|
trusted library allocation
|
page read and write
|
||
533B000
|
trusted library allocation
|
page read and write
|
||
70476000
|
unkown
|
page execute and read and write
|
||
454000
|
heap
|
page read and write
|
||
534D000
|
trusted library allocation
|
page read and write
|
||
5356000
|
trusted library allocation
|
page read and write
|
||
599E000
|
trusted library allocation
|
page read and write
|
||
5329000
|
trusted library allocation
|
page read and write
|
||
2FAE000
|
stack
|
page read and write
|
||
589E000
|
trusted library allocation
|
page read and write
|
||
382F000
|
stack
|
page read and write
|
||
53B3000
|
trusted library allocation
|
page read and write
|
||
53A7000
|
trusted library allocation
|
page read and write
|
||
5869000
|
trusted library allocation
|
page read and write
|
||
533B000
|
trusted library allocation
|
page read and write
|
||
2710000
|
direct allocation
|
page read and write
|
||
2E2F000
|
stack
|
page read and write
|
||
2710000
|
direct allocation
|
page read and write
|
||
532A000
|
trusted library allocation
|
page read and write
|
||
521000
|
heap
|
page read and write
|
||
5852000
|
trusted library allocation
|
page read and write
|
||
7FBA000
|
trusted library allocation
|
page read and write
|
||
5C7000
|
heap
|
page read and write
|
||
598000
|
heap
|
page read and write
|
||
494F000
|
stack
|
page read and write
|
||
5C3000
|
heap
|
page read and write
|
||
58AC000
|
trusted library allocation
|
page read and write
|
||
532E000
|
trusted library allocation
|
page read and write
|
||
5B4000
|
heap
|
page read and write
|
||
536F000
|
trusted library allocation
|
page read and write
|
||
5843000
|
trusted library allocation
|
page read and write
|
||
4371000
|
heap
|
page read and write
|
||
57A0000
|
trusted library allocation
|
page read and write
|
||
5346000
|
trusted library allocation
|
page read and write
|
||
532B000
|
trusted library allocation
|
page read and write
|
||
5AF000
|
heap
|
page read and write
|
||
5316000
|
trusted library allocation
|
page read and write
|
||
5AB000
|
heap
|
page read and write
|
||
5CD000
|
heap
|
page read and write
|
||
5A4000
|
heap
|
page read and write
|
||
57A3000
|
trusted library allocation
|
page read and write
|
||
531C000
|
trusted library allocation
|
page read and write
|
||
51FD000
|
stack
|
page read and write
|
||
534F000
|
trusted library allocation
|
page read and write
|
||
39AE000
|
stack
|
page read and write
|
||
5CD000
|
heap
|
page read and write
|
||
5572000
|
trusted library allocation
|
page read and write
|
||
531A000
|
trusted library allocation
|
page read and write
|
||
4E90000
|
remote allocation
|
page read and write
|
||
4371000
|
heap
|
page read and write
|
||
5BC000
|
heap
|
page read and write
|
||
588E000
|
trusted library allocation
|
page read and write
|
||
57A0000
|
trusted library allocation
|
page read and write
|
||
5AD000
|
heap
|
page read and write
|
||
4DA000
|
heap
|
page read and write
|
||
50B3000
|
heap
|
page read and write
|
||
5A1E000
|
trusted library allocation
|
page read and write
|
||
454000
|
heap
|
page read and write
|
||
59D000
|
heap
|
page read and write
|
||
5AB000
|
heap
|
page read and write
|
||
5366000
|
trusted library allocation
|
page read and write
|
||
7BB000
|
unkown
|
page execute and read and write
|
||
5AD000
|
heap
|
page read and write
|
||
57B1000
|
trusted library allocation
|
page read and write
|
||
530D000
|
trusted library allocation
|
page read and write
|
||
57A5000
|
trusted library allocation
|
page read and write
|
||
4810000
|
direct allocation
|
page read and write
|
||
5409000
|
trusted library allocation
|
page read and write
|
||
51B000
|
heap
|
page read and write
|
||
7C10000
|
direct allocation
|
page read and write
|
||
5BC000
|
heap
|
page read and write
|
||
589D000
|
trusted library allocation
|
page read and write
|
||
585D000
|
trusted library allocation
|
page read and write
|
||
587A000
|
trusted library allocation
|
page read and write
|
||
5C6000
|
heap
|
page read and write
|
||
57A2000
|
trusted library allocation
|
page read and write
|
||
5A4000
|
heap
|
page read and write
|
||
6F8F000
|
stack
|
page read and write
|
||
34AE000
|
stack
|
page read and write
|
||
5AB000
|
heap
|
page read and write
|
||
5D12000
|
trusted library allocation
|
page execute and read and write
|
||
5329000
|
trusted library allocation
|
page read and write
|
||
4371000
|
heap
|
page read and write
|
||
57AB000
|
trusted library allocation
|
page read and write
|
||
720F000
|
stack
|
page read and write
|
||
57AD000
|
trusted library allocation
|
page read and write
|
||
4990000
|
direct allocation
|
page execute and read and write
|
||
49C0000
|
direct allocation
|
page execute and read and write
|
||
5422000
|
trusted library allocation
|
page read and write
|
||
5344000
|
trusted library allocation
|
page read and write
|
||
2F6F000
|
stack
|
page read and write
|
||
5856000
|
trusted library allocation
|
page read and write
|
||
644F000
|
stack
|
page read and write
|
||
5A8000
|
heap
|
page read and write
|
||
57AC000
|
trusted library allocation
|
page read and write
|
||
5356000
|
trusted library allocation
|
page read and write
|
||
4B0E000
|
stack
|
page read and write
|
||
530F000
|
trusted library allocation
|
page read and write
|
||
531A000
|
trusted library allocation
|
page read and write
|
||
57AE000
|
trusted library allocation
|
page read and write
|
||
5331000
|
trusted library allocation
|
page read and write
|
||
436F000
|
stack
|
page read and write
|
||
7CAC000
|
stack
|
page read and write
|
||
5331000
|
trusted library allocation
|
page read and write
|
||
5305000
|
trusted library allocation
|
page read and write
|
||
5A4000
|
heap
|
page read and write
|
||
724E000
|
stack
|
page read and write
|
||
5AA000
|
heap
|
page read and write
|
||
5861000
|
trusted library allocation
|
page read and write
|
||
530D000
|
trusted library allocation
|
page read and write
|
||
5A1000
|
heap
|
page read and write
|
||
5899000
|
stack
|
page read and write
|
||
5359000
|
trusted library allocation
|
page read and write
|
||
53A5000
|
trusted library allocation
|
page read and write
|
||
8C9000
|
unkown
|
page execute and read and write
|
||
535A000
|
trusted library allocation
|
page read and write
|
||
539F000
|
trusted library allocation
|
page read and write
|
||
57A0000
|
trusted library allocation
|
page read and write
|
||
5A17000
|
trusted library allocation
|
page read and write
|
||
532A000
|
trusted library allocation
|
page read and write
|
||
4371000
|
heap
|
page read and write
|
||
5336000
|
trusted library allocation
|
page read and write
|
||
532B000
|
trusted library allocation
|
page read and write
|
||
535A000
|
trusted library allocation
|
page read and write
|
||
5319000
|
trusted library allocation
|
page read and write
|
||
531A000
|
trusted library allocation
|
page read and write
|
||
533F000
|
trusted library allocation
|
page read and write
|
||
257E000
|
stack
|
page read and write
|
||
536F000
|
trusted library allocation
|
page read and write
|
||
539C000
|
trusted library allocation
|
page read and write
|
||
2727000
|
heap
|
page read and write
|
||
58E3000
|
trusted library allocation
|
page read and write
|
||
57A2000
|
trusted library allocation
|
page read and write
|
||
58A7000
|
trusted library allocation
|
page read and write
|
||
7C10000
|
direct allocation
|
page read and write
|
||
454000
|
heap
|
page read and write
|
||
66CF000
|
stack
|
page read and write
|
||
58D7000
|
trusted library allocation
|
page read and write
|
||
6E4F000
|
stack
|
page read and write
|
||
454000
|
heap
|
page read and write
|
||
533B000
|
trusted library allocation
|
page read and write
|
||
58DC000
|
trusted library allocation
|
page read and write
|
||
5863000
|
trusted library allocation
|
page read and write
|
||
5366000
|
trusted library allocation
|
page read and write
|
||
532E000
|
trusted library allocation
|
page read and write
|
||
4371000
|
heap
|
page read and write
|
||
536F000
|
trusted library allocation
|
page read and write
|
||
57A3000
|
trusted library allocation
|
page read and write
|
||
531A000
|
trusted library allocation
|
page read and write
|
||
412E000
|
stack
|
page read and write
|
||
5317000
|
trusted library allocation
|
page read and write
|
||
54D2000
|
trusted library allocation
|
page read and write
|
||
55A0000
|
trusted library allocation
|
page read and write
|
||
521000
|
heap
|
page read and write
|
||
6D4E000
|
stack
|
page read and write
|
||
6E8E000
|
stack
|
page read and write
|
||
539C000
|
trusted library allocation
|
page read and write
|
||
5328000
|
trusted library allocation
|
page read and write
|
||
531F000
|
trusted library allocation
|
page read and write
|
||
5AC000
|
heap
|
page read and write
|
||
7C10000
|
direct allocation
|
page read and write
|
||
620E000
|
stack
|
page read and write
|
||
2BEE000
|
stack
|
page read and write
|
||
57A0000
|
trusted library allocation
|
page read and write
|
||
533B000
|
trusted library allocation
|
page read and write
|
||
710E000
|
stack
|
page read and write
|
||
57AB000
|
trusted library allocation
|
page read and write
|
||
7047F000
|
unkown
|
page readonly
|
||
533B000
|
trusted library allocation
|
page read and write
|
||
531F000
|
trusted library allocation
|
page read and write
|
||
531A000
|
trusted library allocation
|
page read and write
|
||
336E000
|
stack
|
page read and write
|
||
57A4000
|
trusted library allocation
|
page read and write
|
||
36EF000
|
stack
|
page read and write
|
||
454000
|
heap
|
page read and write
|
||
591000
|
heap
|
page read and write
|
||
5309000
|
trusted library allocation
|
page read and write
|
||
57A5000
|
trusted library allocation
|
page read and write
|
||
4990000
|
direct allocation
|
page execute and read and write
|
||
2710000
|
direct allocation
|
page read and write
|
||
4E90000
|
remote allocation
|
page read and write
|
||
58EB000
|
trusted library allocation
|
page read and write
|
||
5316000
|
trusted library allocation
|
page read and write
|
||
7B0E000
|
stack
|
page read and write
|
||
5A8000
|
heap
|
page read and write
|
||
531F000
|
trusted library allocation
|
page read and write
|
||
454000
|
heap
|
page read and write
|
||
5B4000
|
heap
|
page read and write
|
||
499D000
|
stack
|
page read and write
|
||
4E90000
|
remote allocation
|
page read and write
|
||
53B2000
|
trusted library allocation
|
page read and write
|
||
4800000
|
direct allocation
|
page read and write
|
||
532E000
|
trusted library allocation
|
page read and write
|
||
5317000
|
trusted library allocation
|
page read and write
|
||
531E000
|
trusted library allocation
|
page read and write
|
||
597F000
|
trusted library allocation
|
page read and write
|
||
5339000
|
trusted library allocation
|
page read and write
|
||
680F000
|
stack
|
page read and write
|
||
5316000
|
trusted library allocation
|
page read and write
|
||
57A7000
|
trusted library allocation
|
page read and write
|
||
532A000
|
trusted library allocation
|
page read and write
|
||
584F000
|
trusted library allocation
|
page read and write
|
||
454000
|
heap
|
page read and write
|
||
52FE000
|
stack
|
page read and write
|
||
5317000
|
trusted library allocation
|
page read and write
|
||
532B000
|
trusted library allocation
|
page read and write
|
||
7F10000
|
trusted library allocation
|
page read and write
|
||
58F3000
|
trusted library allocation
|
page read and write
|
||
684E000
|
stack
|
page read and write
|
||
5A4000
|
heap
|
page read and write
|
||
57A3000
|
trusted library allocation
|
page read and write
|
||
57A2000
|
trusted library allocation
|
page read and write
|
||
5394000
|
trusted library allocation
|
page read and write
|
||
593D000
|
trusted library allocation
|
page read and write
|
||
532A000
|
trusted library allocation
|
page read and write
|
||
536F000
|
trusted library allocation
|
page read and write
|
||
58AB000
|
trusted library allocation
|
page read and write
|
||
5330000
|
trusted library allocation
|
page read and write
|
||
533B000
|
trusted library allocation
|
page read and write
|
||
5401000
|
trusted library allocation
|
page read and write
|
||
454000
|
heap
|
page read and write
|
||
5377000
|
trusted library allocation
|
page read and write
|
||
5FC0000
|
trusted library allocation
|
page execute and read and write
|
||
5357000
|
trusted library allocation
|
page read and write
|
||
61CF000
|
stack
|
page read and write
|
||
531A000
|
trusted library allocation
|
page read and write
|
||
5329000
|
trusted library allocation
|
page read and write
|
||
895000
|
unkown
|
page execute and read and write
|
||
440000
|
heap
|
page read and write
|
||
55A2000
|
trusted library allocation
|
page read and write
|
||
26BC000
|
stack
|
page read and write
|
||
4371000
|
heap
|
page read and write
|
||
57AC000
|
trusted library allocation
|
page read and write
|
||
533B000
|
trusted library allocation
|
page read and write
|
||
5A3A000
|
trusted library allocation
|
page read and write
|
||
58D000
|
heap
|
page read and write
|
||
5334000
|
trusted library allocation
|
page read and write
|
||
58B6000
|
trusted library allocation
|
page read and write
|
||
5A0000
|
heap
|
page read and write
|
||
5336000
|
trusted library allocation
|
page read and write
|
||
4990000
|
direct allocation
|
page execute and read and write
|
||
5310000
|
trusted library allocation
|
page read and write
|
||
5345000
|
trusted library allocation
|
page read and write
|
||
5329000
|
trusted library allocation
|
page read and write
|
||
3FAF000
|
stack
|
page read and write
|
||
531A000
|
trusted library allocation
|
page read and write
|
||
5323000
|
trusted library allocation
|
page read and write
|
||
5346000
|
trusted library allocation
|
page read and write
|
||
5338000
|
trusted library allocation
|
page read and write
|
||
5BC000
|
heap
|
page read and write
|
||
532D000
|
trusted library allocation
|
page read and write
|
||
532A000
|
trusted library allocation
|
page read and write
|
||
5394000
|
trusted library allocation
|
page read and write
|
||
5C6000
|
heap
|
page read and write
|
||
5868000
|
trusted library allocation
|
page read and write
|
||
6FCE000
|
stack
|
page read and write
|
||
648E000
|
stack
|
page read and write
|
||
57A1000
|
trusted library allocation
|
page read and write
|
||
532B000
|
trusted library allocation
|
page read and write
|
||
7FB8000
|
trusted library allocation
|
page read and write
|
||
788E000
|
stack
|
page read and write
|
||
386E000
|
stack
|
page read and write
|
||
5843000
|
trusted library allocation
|
page read and write
|
||
5321000
|
trusted library allocation
|
page read and write
|
||
4980000
|
direct allocation
|
page execute and read and write
|
||
2710000
|
direct allocation
|
page read and write
|
||
5BF000
|
heap
|
page read and write
|
||
531D000
|
trusted library allocation
|
page read and write
|
||
534B000
|
trusted library allocation
|
page read and write
|
||
5302000
|
trusted library allocation
|
page read and write
|
||
396F000
|
stack
|
page read and write
|
||
774E000
|
stack
|
page read and write
|
||
30AF000
|
stack
|
page read and write
|
||
5D10000
|
trusted library allocation
|
page read and write
|
||
7C70000
|
direct allocation
|
page read and write
|
||
536F000
|
trusted library allocation
|
page read and write
|
||
5317000
|
trusted library allocation
|
page read and write
|
||
536F000
|
trusted library allocation
|
page read and write
|
||
536000
|
heap
|
page read and write
|
||
57A1000
|
trusted library allocation
|
page read and write
|
||
59C000
|
heap
|
page read and write
|
||
4371000
|
heap
|
page read and write
|
||
5CD000
|
heap
|
page read and write
|
||
5349000
|
trusted library allocation
|
page read and write
|
||
5C3000
|
heap
|
page read and write
|
||
57A2000
|
trusted library allocation
|
page read and write
|
||
5408000
|
trusted library allocation
|
page read and write
|
||
454000
|
heap
|
page read and write
|
||
5848000
|
trusted library allocation
|
page read and write
|
||
5C3000
|
heap
|
page read and write
|
||
74CE000
|
stack
|
page read and write
|
||
57AC000
|
trusted library allocation
|
page read and write
|
||
292F000
|
stack
|
page read and write
|
||
7C10000
|
direct allocation
|
page read and write
|
||
332F000
|
stack
|
page read and write
|
||
5319000
|
trusted library allocation
|
page read and write
|
||
6ACE000
|
stack
|
page read and write
|
||
57A1000
|
trusted library allocation
|
page read and write
|
||
57AD000
|
trusted library allocation
|
page read and write
|
||
5A0000
|
heap
|
page read and write
|
||
5394000
|
trusted library allocation
|
page read and write
|
||
5BC000
|
heap
|
page read and write
|
||
57AE000
|
trusted library allocation
|
page read and write
|
||
57A2000
|
trusted library allocation
|
page read and write
|
||
3C2E000
|
stack
|
page read and write
|
||
535B000
|
trusted library allocation
|
page read and write
|
||
3FEE000
|
stack
|
page read and write
|
||
26FE000
|
stack
|
page read and write
|
||
1DA000
|
stack
|
page read and write
|
||
49A0000
|
direct allocation
|
page execute and read and write
|
||
57A4000
|
trusted library allocation
|
page read and write
|
||
4FFF000
|
stack
|
page read and write
|
||
282F000
|
stack
|
page read and write
|
||
57A3000
|
trusted library allocation
|
page read and write
|
||
5AA000
|
heap
|
page read and write
|
||
5C3000
|
heap
|
page read and write
|
||
57AF000
|
trusted library allocation
|
page read and write
|
||
60CF000
|
stack
|
page read and write
|
||
530F000
|
trusted library allocation
|
page read and write
|
||
5A8000
|
heap
|
page read and write
|
||
5300000
|
trusted library allocation
|
page read and write
|
||
5A2B000
|
trusted library allocation
|
page read and write
|
||
5A19000
|
trusted library allocation
|
page read and write
|
||
5329000
|
trusted library allocation
|
page read and write
|
||
5343000
|
trusted library allocation
|
page read and write
|
||
532B000
|
trusted library allocation
|
page read and write
|
||
5858000
|
trusted library allocation
|
page read and write
|
||
532A000
|
trusted library allocation
|
page read and write
|
||
533C000
|
trusted library allocation
|
page read and write
|
||
5CD000
|
heap
|
page read and write
|
||
2700000
|
heap
|
page read and write
|
||
5324000
|
trusted library allocation
|
page read and write
|
||
530F000
|
trusted library allocation
|
page read and write
|
||
5334000
|
trusted library allocation
|
page read and write
|
||
5A4000
|
heap
|
page read and write
|
||
533B000
|
trusted library allocation
|
page read and write
|
||
5C3000
|
heap
|
page read and write
|
||
58B8000
|
trusted library allocation
|
page read and write
|
||
5C3000
|
heap
|
page read and write
|
||
784F000
|
stack
|
page read and write
|
||
30EE000
|
stack
|
page read and write
|
||
4371000
|
heap
|
page read and write
|
||
58DD000
|
trusted library allocation
|
page read and write
|
||
57A4000
|
trusted library allocation
|
page read and write
|
||
532B000
|
trusted library allocation
|
page read and write
|
||
530F000
|
trusted library allocation
|
page read and write
|
||
5C3000
|
heap
|
page read and write
|
||
530A000
|
trusted library allocation
|
page read and write
|
||
5324000
|
trusted library allocation
|
page read and write
|
||
4C4E000
|
stack
|
page read and write
|
||
5338000
|
trusted library allocation
|
page read and write
|
||
5397000
|
trusted library allocation
|
page read and write
|
||
70477000
|
unkown
|
page readonly
|
||
533B000
|
trusted library allocation
|
page read and write
|
||
5D1A000
|
trusted library allocation
|
page execute and read and write
|
||
454000
|
heap
|
page read and write
|
||
5356000
|
trusted library allocation
|
page read and write
|
||
58C000
|
heap
|
page read and write
|
||
532B000
|
trusted library allocation
|
page read and write
|
||
5CD000
|
heap
|
page read and write
|
||
5A7000
|
heap
|
page read and write
|
||
2BAF000
|
stack
|
page read and write
|
||
5319000
|
trusted library allocation
|
page read and write
|
||
584A000
|
trusted library allocation
|
page read and write
|
||
698E000
|
stack
|
page read and write
|
||
5C3000
|
heap
|
page read and write
|
||
5C3000
|
heap
|
page read and write
|
||
536D000
|
trusted library allocation
|
page read and write
|
||
531A000
|
trusted library allocation
|
page read and write
|
||
7D10000
|
heap
|
page read and write
|
||
57A8000
|
trusted library allocation
|
page read and write
|
||
533B000
|
trusted library allocation
|
page read and write
|
||
4EFE000
|
stack
|
page read and write
|
||
585A000
|
trusted library allocation
|
page read and write
|
||
5C3000
|
heap
|
page read and write
|
||
450000
|
heap
|
page read and write
|
||
5304000
|
trusted library allocation
|
page read and write
|
||
454000
|
heap
|
page read and write
|
||
5AB000
|
heap
|
page read and write
|
||
5A9000
|
heap
|
page read and write
|
||
454000
|
heap
|
page read and write
|
||
58A0000
|
trusted library allocation
|
page read and write
|
||
9710000
|
trusted library allocation
|
page read and write
|
||
539C000
|
trusted library allocation
|
page read and write
|
||
531D000
|
trusted library allocation
|
page read and write
|
||
5355000
|
trusted library allocation
|
page read and write
|
||
70460000
|
unkown
|
page readonly
|
||
5332000
|
trusted library allocation
|
page read and write
|
||
5A4000
|
heap
|
page read and write
|
||
5323000
|
trusted library allocation
|
page read and write
|
||
533B000
|
trusted library allocation
|
page read and write
|
||
531A000
|
trusted library allocation
|
page read and write
|
||
322E000
|
stack
|
page read and write
|
||
58DB000
|
trusted library allocation
|
page read and write
|
||
426E000
|
stack
|
page read and write
|
||
4800000
|
direct allocation
|
page read and write
|
||
5355000
|
trusted library allocation
|
page read and write
|
||
533B000
|
trusted library allocation
|
page read and write
|
||
59F0000
|
trusted library allocation
|
page read and write
|
||
532B000
|
trusted library allocation
|
page read and write
|
||
57A2000
|
trusted library allocation
|
page read and write
|
||
589F000
|
trusted library allocation
|
page read and write
|
||
5B1000
|
heap
|
page read and write
|
||
4E8F000
|
stack
|
page read and write
|
||
58AE000
|
trusted library allocation
|
page read and write
|
||
57AE000
|
trusted library allocation
|
page read and write
|
||
5A9000
|
heap
|
page read and write
|
||
5408000
|
trusted library allocation
|
page read and write
|
||
5AB000
|
heap
|
page read and write
|
||
5A1C000
|
trusted library allocation
|
page read and write
|
||
534D000
|
trusted library allocation
|
page read and write
|
||
532B000
|
trusted library allocation
|
page read and write
|
||
5335000
|
trusted library allocation
|
page read and write
|
||
5A1E000
|
stack
|
page read and write
|
||
6BCF000
|
stack
|
page read and write
|
||
2720000
|
heap
|
page read and write
|
||
5367000
|
trusted library allocation
|
page read and write
|
||
5316000
|
trusted library allocation
|
page read and write
|
||
5854000
|
trusted library allocation
|
page read and write
|
||
57AC000
|
trusted library allocation
|
page read and write
|
||
7C70000
|
direct allocation
|
page read and write
|
||
5892000
|
trusted library allocation
|
page read and write
|
||
57A4000
|
trusted library allocation
|
page read and write
|
||
532B000
|
trusted library allocation
|
page read and write
|
||
545A000
|
trusted library allocation
|
page read and write
|
||
5E0000
|
unkown
|
page readonly
|
||
5308000
|
trusted library allocation
|
page read and write
|
||
58DB000
|
trusted library allocation
|
page read and write
|
||
5FB1000
|
trusted library allocation
|
page execute and read and write
|
||
506E000
|
stack
|
page read and write
|
||
49B0000
|
direct allocation
|
page execute and read and write
|
||
5CEF000
|
trusted library allocation
|
page read and write
|
||
5394000
|
trusted library allocation
|
page read and write
|
||
5363000
|
trusted library allocation
|
page read and write
|
||
7047D000
|
unkown
|
page read and write
|
||
8D9000
|
unkown
|
page execute and write copy
|
||
59C000
|
heap
|
page read and write
|
||
A70000
|
unkown
|
page execute and read and write
|
||
588B000
|
trusted library allocation
|
page read and write
|
||
54DA000
|
trusted library allocation
|
page read and write
|
||
533B000
|
trusted library allocation
|
page read and write
|
||
5334000
|
trusted library allocation
|
page read and write
|
||
532B000
|
trusted library allocation
|
page read and write
|
||
5312000
|
trusted library allocation
|
page read and write
|
||
532D000
|
trusted library allocation
|
page read and write
|
||
532B000
|
trusted library allocation
|
page read and write
|
||
57A8000
|
trusted library allocation
|
page read and write
|
||
C4F000
|
stack
|
page read and write
|
||
532D000
|
trusted library allocation
|
page read and write
|
||
532A000
|
trusted library allocation
|
page read and write
|
||
484C000
|
stack
|
page read and write
|
||
4854000
|
direct allocation
|
page read and write
|
||
820B000
|
stack
|
page read and write
|
||
582000
|
heap
|
page read and write
|
||
5376000
|
trusted library allocation
|
page read and write
|
||
5878000
|
trusted library allocation
|
page read and write
|
||
5845000
|
trusted library allocation
|
page read and write
|
||
4371000
|
heap
|
page read and write
|
||
533B000
|
trusted library allocation
|
page read and write
|
||
57A5000
|
trusted library allocation
|
page read and write
|
||
507000
|
heap
|
page read and write
|
||
5B4000
|
heap
|
page read and write
|
||
532D000
|
trusted library allocation
|
page read and write
|
||
533B000
|
trusted library allocation
|
page read and write
|
||
5A0000
|
heap
|
page read and write
|
||
5C6000
|
heap
|
page read and write
|
||
5324000
|
trusted library allocation
|
page read and write
|
||
5A2D000
|
trusted library allocation
|
page read and write
|
||
5CD000
|
heap
|
page read and write
|
||
7E1E000
|
stack
|
page read and write
|
||
57A2000
|
trusted library allocation
|
page read and write
|
||
536E000
|
trusted library allocation
|
page read and write
|
||
5301000
|
trusted library allocation
|
page read and write
|
||
7C10000
|
direct allocation
|
page read and write
|
||
5329000
|
trusted library allocation
|
page read and write
|
||
2710000
|
direct allocation
|
page read and write
|
||
5317000
|
trusted library allocation
|
page read and write
|
||
5324000
|
trusted library allocation
|
page read and write
|
||
533C000
|
trusted library allocation
|
page read and write
|
||
5CFD000
|
trusted library allocation
|
page read and write
|
||
548E000
|
stack
|
page read and write
|
||
59A0000
|
trusted library allocation
|
page read and write
|
||
57AB000
|
trusted library allocation
|
page read and write
|
||
372E000
|
stack
|
page read and write
|
||
2710000
|
direct allocation
|
page read and write
|
||
57A6000
|
trusted library allocation
|
page read and write
|
||
2710000
|
direct allocation
|
page read and write
|
||
536F000
|
trusted library allocation
|
page read and write
|
||
5317000
|
trusted library allocation
|
page read and write
|
||
57A4000
|
trusted library allocation
|
page read and write
|
||
5329000
|
trusted library allocation
|
page read and write
|
||
5359000
|
trusted library allocation
|
page read and write
|
||
5301000
|
trusted library allocation
|
page read and write
|
||
530F000
|
trusted library allocation
|
page read and write
|
||
57A0000
|
trusted library allocation
|
page read and write
|
||
5308000
|
trusted library allocation
|
page read and write
|
||
2710000
|
direct allocation
|
page read and write
|
||
5867000
|
trusted library allocation
|
page read and write
|
||
589D000
|
trusted library allocation
|
page read and write
|
||
630F000
|
stack
|
page read and write
|
||
531A000
|
trusted library allocation
|
page read and write
|
||
539C000
|
trusted library allocation
|
page read and write
|
||
58DE000
|
trusted library allocation
|
page read and write
|
||
57A4000
|
trusted library allocation
|
page read and write
|
||
539C000
|
trusted library allocation
|
page read and write
|
||
5858000
|
trusted library allocation
|
page read and write
|
||
4371000
|
heap
|
page read and write
|
||
5CD000
|
heap
|
page read and write
|
||
346F000
|
stack
|
page read and write
|
||
536D000
|
trusted library allocation
|
page read and write
|
||
694F000
|
stack
|
page read and write
|
||
5845000
|
trusted library allocation
|
page read and write
|
||
5341000
|
trusted library allocation
|
page read and write
|
||
670E000
|
stack
|
page read and write
|
||
5A8000
|
heap
|
page read and write
|
||
4371000
|
heap
|
page read and write
|
||
584D000
|
trusted library allocation
|
page read and write
|
||
5E0000
|
unkown
|
page read and write
|
||
5405000
|
trusted library allocation
|
page read and write
|
||
57A1000
|
trusted library allocation
|
page read and write
|
||
5BC000
|
heap
|
page read and write
|
||
738E000
|
stack
|
page read and write
|
||
50B0000
|
heap
|
page read and write
|
||
798F000
|
stack
|
page read and write
|
||
532B000
|
trusted library allocation
|
page read and write
|
||
7FB0000
|
trusted library allocation
|
page read and write
|
||
57AD000
|
trusted library allocation
|
page read and write
|
||
4371000
|
heap
|
page read and write
|
||
5339000
|
trusted library allocation
|
page read and write
|
||
532B000
|
trusted library allocation
|
page read and write
|
||
5326000
|
trusted library allocation
|
page read and write
|
||
59F8000
|
trusted library allocation
|
page read and write
|
||
57A2000
|
trusted library allocation
|
page read and write
|
||
58DF000
|
trusted library allocation
|
page read and write
|
||
57A6000
|
trusted library allocation
|
page read and write
|
||
5377000
|
trusted library allocation
|
page read and write
|
||
534E000
|
trusted library allocation
|
page read and write
|
||
58B6000
|
trusted library allocation
|
page read and write
|
||
4371000
|
heap
|
page read and write
|
||
59BB000
|
trusted library allocation
|
page read and write
|
||
5C6000
|
heap
|
page read and write
|
||
4371000
|
heap
|
page read and write
|
||
49DC000
|
trusted library allocation
|
page read and write
|
||
590E000
|
trusted library allocation
|
page read and write
|
||
539C000
|
trusted library allocation
|
page read and write
|
||
5C6000
|
heap
|
page read and write
|
||
59DB000
|
stack
|
page read and write
|
||
53F000
|
heap
|
page read and write
|
||
532B000
|
trusted library allocation
|
page read and write
|
||
5A8000
|
heap
|
page read and write
|
||
5BE6000
|
trusted library allocation
|
page read and write
|
||
5A4000
|
heap
|
page read and write
|
||
40EF000
|
stack
|
page read and write
|
||
532B000
|
trusted library allocation
|
page read and write
|
||
4371000
|
heap
|
page read and write
|
||
5909000
|
trusted library allocation
|
page read and write
|
||
5341000
|
trusted library allocation
|
page read and write
|
||
2A6F000
|
stack
|
page read and write
|
||
5339000
|
trusted library allocation
|
page read and write
|
||
532B000
|
trusted library allocation
|
page read and write
|
||
532B000
|
trusted library allocation
|
page read and write
|
||
4990000
|
direct allocation
|
page execute and read and write
|
||
532A000
|
trusted library allocation
|
page read and write
|
||
533B000
|
trusted library allocation
|
page read and write
|
||
5317000
|
trusted library allocation
|
page read and write
|
||
DB000
|
stack
|
page read and write
|
||
593F000
|
trusted library allocation
|
page read and write
|
||
5301000
|
trusted library allocation
|
page read and write
|
||
3AAF000
|
stack
|
page read and write
|
||
79CE000
|
stack
|
page read and write
|
||
3E6F000
|
stack
|
page read and write
|
||
5A7000
|
heap
|
page read and write
|
||
5AD000
|
heap
|
page read and write
|
||
5329000
|
trusted library allocation
|
page read and write
|
||
5BC000
|
heap
|
page read and write
|
||
53DB000
|
trusted library allocation
|
page read and write
|
||
532B000
|
trusted library allocation
|
page read and write
|
||
59A000
|
heap
|
page read and write
|
||
7C10000
|
direct allocation
|
page read and write
|
||
454000
|
heap
|
page read and write
|
||
454000
|
heap
|
page read and write
|
||
535A000
|
trusted library allocation
|
page read and write
|
||
5332000
|
trusted library allocation
|
page read and write
|
||
5329000
|
trusted library allocation
|
page read and write
|
||
7C10000
|
direct allocation
|
page read and write
|
||
531F000
|
trusted library allocation
|
page read and write
|
||
5884000
|
trusted library allocation
|
page read and write
|
||
5301000
|
trusted library allocation
|
page read and write
|
||
58AE000
|
trusted library allocation
|
page read and write
|
||
5AA000
|
heap
|
page read and write
|
||
5319000
|
trusted library allocation
|
page read and write
|
||
531F000
|
trusted library allocation
|
page read and write
|
||
2D2E000
|
stack
|
page read and write
|
||
532B000
|
trusted library allocation
|
page read and write
|
||
532A000
|
trusted library allocation
|
page read and write
|
||
5342000
|
trusted library allocation
|
page read and write
|
||
535E000
|
trusted library allocation
|
page read and write
|
||
534E000
|
trusted library allocation
|
page read and write
|
||
5403000
|
trusted library allocation
|
page read and write
|
||
59DD000
|
trusted library allocation
|
page read and write
|
||
830C000
|
stack
|
page read and write
|
||
532A000
|
trusted library allocation
|
page read and write
|
||
533B000
|
trusted library allocation
|
page read and write
|
||
35AF000
|
stack
|
page read and write
|
||
595B000
|
trusted library allocation
|
page read and write
|
||
58AD000
|
trusted library allocation
|
page read and write
|
||
4371000
|
heap
|
page read and write
|
||
5890000
|
trusted library allocation
|
page read and write
|
||
5981000
|
trusted library allocation
|
page read and write
|
||
70CF000
|
stack
|
page read and write
|
||
586F000
|
trusted library allocation
|
page read and write
|
||
5363000
|
trusted library allocation
|
page read and write
|
||
5339000
|
trusted library allocation
|
page read and write
|
||
532B000
|
trusted library allocation
|
page read and write
|
||
599F000
|
stack
|
page read and write
|
||
7C10000
|
direct allocation
|
page read and write
|
||
4371000
|
heap
|
page read and write
|
||
296E000
|
stack
|
page read and write
|
||
760E000
|
stack
|
page read and write
|
||
531F000
|
trusted library allocation
|
page read and write
|
||
534B000
|
trusted library allocation
|
page read and write
|
||
59F6000
|
trusted library allocation
|
page read and write
|
||
5AC000
|
heap
|
page read and write
|
||
2710000
|
direct allocation
|
page read and write
|
||
5A4000
|
heap
|
page read and write
|
||
5CA000
|
heap
|
page read and write
|
||
57AD000
|
trusted library allocation
|
page read and write
|
||
57AB000
|
trusted library allocation
|
page read and write
|
||
532A000
|
trusted library allocation
|
page read and write
|
||
57A8000
|
trusted library allocation
|
page read and write
|
||
533B000
|
trusted library allocation
|
page read and write
|
||
3D2F000
|
stack
|
page read and write
|
||
532E000
|
trusted library allocation
|
page read and write
|
||
57A4000
|
trusted library allocation
|
page read and write
|
||
531F000
|
trusted library allocation
|
page read and write
|
||
4800000
|
direct allocation
|
page read and write
|
||
57A6000
|
trusted library allocation
|
page read and write
|
||
5387000
|
trusted library allocation
|
page read and write
|
||
4371000
|
heap
|
page read and write
|
||
530A000
|
trusted library allocation
|
page read and write
|
||
7CF0000
|
direct allocation
|
page execute and read and write
|
||
5C7000
|
heap
|
page read and write
|
||
5394000
|
trusted library allocation
|
page read and write
|
||
57A2000
|
trusted library allocation
|
page read and write
|
||
5A0000
|
heap
|
page read and write
|
||
7C70000
|
direct allocation
|
page read and write
|
||
6C0E000
|
stack
|
page read and write
|
||
59C000
|
heap
|
page read and write
|
||
5394000
|
trusted library allocation
|
page read and write
|
||
5A0000
|
heap
|
page read and write
|
||
7CC0000
|
direct allocation
|
page execute and read and write
|
||
533B000
|
trusted library allocation
|
page read and write
|
||
5882000
|
trusted library allocation
|
page read and write
|
||
534F000
|
trusted library allocation
|
page read and write
|
||
536C000
|
trusted library allocation
|
page read and write
|
||
536B000
|
trusted library allocation
|
page read and write
|
||
5346000
|
trusted library allocation
|
page read and write
|
||
599B000
|
trusted library allocation
|
page read and write
|
||
454000
|
heap
|
page read and write
|
||
532A000
|
trusted library allocation
|
page read and write
|
||
58C8000
|
trusted library allocation
|
page read and write
|
||
5865000
|
trusted library allocation
|
page read and write
|
||
581000
|
heap
|
page read and write
|
||
531C000
|
trusted library allocation
|
page read and write
|
||
637000
|
unkown
|
page read and write
|
||
4D4F000
|
stack
|
page read and write
|
||
637000
|
unkown
|
page write copy
|
||
535F000
|
trusted library allocation
|
page read and write
|
||
532B000
|
trusted library allocation
|
page read and write
|
||
531F000
|
trusted library allocation
|
page read and write
|
||
58BB000
|
trusted library allocation
|
page read and write
|
||
585B000
|
trusted library allocation
|
page read and write
|
||
8D8000
|
unkown
|
page execute and write copy
|
||
57AA000
|
trusted library allocation
|
page read and write
|
||
8C0000
|
unkown
|
page execute and read and write
|
||
531F000
|
trusted library allocation
|
page read and write
|
||
58B4000
|
trusted library allocation
|
page read and write
|
||
7C0F000
|
stack
|
page read and write
|
||
531A000
|
trusted library allocation
|
page read and write
|
||
533B000
|
trusted library allocation
|
page read and write
|
||
530D000
|
trusted library allocation
|
page read and write
|
||
57A4000
|
trusted library allocation
|
page read and write
|
||
460000
|
heap
|
page read and write
|
||
5C0000
|
heap
|
page read and write
|
||
532E000
|
trusted library allocation
|
page read and write
|
||
57AD000
|
trusted library allocation
|
page read and write
|
||
4990000
|
direct allocation
|
page execute and read and write
|
||
267F000
|
stack
|
page read and write
|
||
3EAE000
|
stack
|
page read and write
|
||
7ACF000
|
stack
|
page read and write
|
||
589B000
|
trusted library allocation
|
page read and write
|
||
65CE000
|
stack
|
page read and write
|
||
59BD000
|
trusted library allocation
|
page read and write
|
||
59EE000
|
trusted library allocation
|
page read and write
|
||
5866000
|
trusted library allocation
|
page read and write
|
||
4CE000
|
stack
|
page read and write
|
||
58E1000
|
trusted library allocation
|
page read and write
|
||
57B1000
|
trusted library allocation
|
page read and write
|
||
5377000
|
trusted library allocation
|
page read and write
|
||
57A9000
|
trusted library allocation
|
page read and write
|
||
58D9000
|
trusted library allocation
|
page read and write
|
||
5A3C000
|
trusted library allocation
|
page read and write
|
||
5A7000
|
heap
|
page read and write
|
||
58A5000
|
trusted library allocation
|
page read and write
|
||
57A1000
|
trusted library allocation
|
page read and write
|
||
7FB2000
|
trusted library allocation
|
page read and write
|
||
4371000
|
heap
|
page read and write
|
||
5312000
|
trusted library allocation
|
page read and write
|
||
5353000
|
trusted library allocation
|
page read and write
|
||
734F000
|
stack
|
page read and write
|
||
539C000
|
trusted library allocation
|
page read and write
|
||
5356000
|
trusted library allocation
|
page read and write
|
||
5999000
|
trusted library allocation
|
page read and write
|
||
534C000
|
trusted library allocation
|
page read and write
|
||
454000
|
heap
|
page read and write
|
||
59B4000
|
trusted library allocation
|
page read and write
|
||
5C6000
|
heap
|
page read and write
|
||
5310000
|
trusted library allocation
|
page read and write
|
||
5310000
|
trusted library allocation
|
page read and write
|
||
7C40000
|
trusted library allocation
|
page read and write
|
||
588F000
|
trusted library allocation
|
page read and write
|
||
530A000
|
trusted library allocation
|
page read and write
|
||
532A000
|
trusted library allocation
|
page read and write
|
||
58B0000
|
trusted library allocation
|
page read and write
|
||
2710000
|
direct allocation
|
page read and write
|
||
5A56000
|
trusted library allocation
|
page read and write
|
||
591000
|
heap
|
page read and write
|
||
5E1000
|
unkown
|
page execute and read and write
|
||
53DB000
|
trusted library allocation
|
page read and write
|
||
532B000
|
trusted library allocation
|
page read and write
|
||
58C6000
|
trusted library allocation
|
page read and write
|
||
58F5000
|
trusted library allocation
|
page read and write
|
||
532D000
|
trusted library allocation
|
page read and write
|
||
5439000
|
stack
|
page read and write
|
||
6D0F000
|
stack
|
page read and write
|
||
530D000
|
trusted library allocation
|
page read and write
|
||
5375000
|
trusted library allocation
|
page read and write
|
||
533B000
|
trusted library allocation
|
page read and write
|
||
2710000
|
direct allocation
|
page read and write
|
||
5CD000
|
heap
|
page read and write
|
||
5959000
|
trusted library allocation
|
page read and write
|
||
57A6000
|
trusted library allocation
|
page read and write
|
||
5374000
|
trusted library allocation
|
page read and write
|
||
454000
|
heap
|
page read and write
|
||
75CF000
|
stack
|
page read and write
|
||
533F000
|
trusted library allocation
|
page read and write
|
There are 906 hidden memdumps, click here to show them.
DOM / HTML
URL
|
Malicious
|
|
---|---|---|
https://learn.microsoft.com/en-us/dotnet/framework/install/application-not-started?version=(null)&processName=file.exe&platform=0009&osver=6&isServer=0&shimver=4.0.30319.0
|
||
https://learn.microsoft.com/en-us/dotnet/framework/install/application-not-started?version=(null)&processName=file.exe&platform=0009&osver=6&isServer=0&shimver=4.0.30319.0
|
||
https://learn.microsoft.com/en-us/dotnet/framework/install/application-not-started?version=(null)&processName=file.exe&platform=0009&osver=6&isServer=0&shimver=4.0.30319.0
|
||
https://learn.microsoft.com/en-us/dotnet/framework/install/application-not-started?version=(null)&processName=file.exe&platform=0009&osver=6&isServer=0&shimver=4.0.30319.0
|
||
https://learn.microsoft.com/en-us/dotnet/framework/install/application-not-started?version=(null)&processName=file.exe&platform=0009&osver=6&isServer=0&shimver=4.0.30319.0
|