Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
file.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
initial sample
|
||
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Docs.lnk
|
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command
line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Sun Nov 24 00:13:39 2024, atime=Wed Sep 27 04:28:28
2023, length=1210144, window=hide
|
dropped
|
||
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Gmail.lnk
|
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command
line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Sun Nov 24 00:13:38 2024, atime=Wed Sep 27 04:28:28
2023, length=1210144, window=hide
|
dropped
|
||
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Google Drive.lnk
|
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command
line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Wed Oct 4 12:54:07 2023, atime=Wed Sep 27 04:28:28
2023, length=1210144, window=hide
|
dropped
|
||
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Sheets.lnk
|
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command
line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Sun Nov 24 00:13:38 2024, atime=Wed Sep 27 04:28:28
2023, length=1210144, window=hide
|
dropped
|
||
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Slides.lnk
|
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command
line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Sun Nov 24 00:13:38 2024, atime=Wed Sep 27 04:28:28
2023, length=1210144, window=hide
|
dropped
|
||
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\YouTube.lnk
|
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command
line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Sun Nov 24 00:13:38 2024, atime=Wed Sep 27 04:28:28
2023, length=1210144, window=hide
|
dropped
|
||
Chrome Cache Entry: 100
|
MS Windows icon resource - 6 icons, -128x-128, 16 colors, 72x72, 16 colors
|
downloaded
|
||
Chrome Cache Entry: 101
|
ASCII text, with very long lines (46884)
|
downloaded
|
||
Chrome Cache Entry: 102
|
JSON data
|
dropped
|
||
Chrome Cache Entry: 103
|
MS Windows icon resource - 6 icons, -128x-128, 16 colors, 72x72, 16 colors
|
dropped
|
||
Chrome Cache Entry: 104
|
PNG image data, 658 x 480, 8-bit/color RGBA, non-interlaced
|
downloaded
|
||
Chrome Cache Entry: 105
|
ASCII text, with very long lines (33148), with no line terminators
|
dropped
|
||
Chrome Cache Entry: 106
|
JSON data
|
downloaded
|
||
Chrome Cache Entry: 107
|
JPEG image data, JFIF standard 1.01, aspect ratio, density 1x1, segment length 16, baseline, precision 8, 1528x402, components
3
|
dropped
|
||
Chrome Cache Entry: 108
|
PNG image data, 475 x 212, 8-bit/color RGBA, non-interlaced
|
downloaded
|
||
Chrome Cache Entry: 109
|
JSON data
|
downloaded
|
||
Chrome Cache Entry: 110
|
JPEG image data, JFIF standard 1.01, aspect ratio, density 1x1, segment length 16, baseline, precision 8, 1528x402, components
3
|
downloaded
|
||
Chrome Cache Entry: 111
|
exported SGML document, ASCII text, with very long lines (65536), with no line terminators
|
dropped
|
||
Chrome Cache Entry: 112
|
ASCII text, with very long lines (46884)
|
dropped
|
||
Chrome Cache Entry: 113
|
ASCII text
|
dropped
|
||
Chrome Cache Entry: 114
|
SVG Scalable Vector Graphics image
|
downloaded
|
||
Chrome Cache Entry: 115
|
Web Open Font Format (Version 2), TrueType, length 19696, version 1.0
|
downloaded
|
||
Chrome Cache Entry: 116
|
ASCII text, with very long lines (33148), with no line terminators
|
downloaded
|
||
Chrome Cache Entry: 117
|
PNG image data, 475 x 212, 8-bit/color RGBA, non-interlaced
|
dropped
|
||
Chrome Cache Entry: 118
|
PNG image data, 658 x 480, 8-bit/color RGBA, non-interlaced
|
dropped
|
||
Chrome Cache Entry: 119
|
JSON data
|
dropped
|
||
Chrome Cache Entry: 120
|
HTML document, ASCII text, with very long lines (639), with CRLF, LF line terminators
|
downloaded
|
||
Chrome Cache Entry: 121
|
JSON data
|
downloaded
|
||
Chrome Cache Entry: 122
|
PNG image data, 533 x 478, 8-bit/color RGBA, non-interlaced
|
dropped
|
||
Chrome Cache Entry: 84
|
PNG image data, 533 x 478, 8-bit/color RGBA, non-interlaced
|
dropped
|
||
Chrome Cache Entry: 85
|
PNG image data, 533 x 478, 8-bit/color RGBA, non-interlaced
|
downloaded
|
||
Chrome Cache Entry: 86
|
SVG Scalable Vector Graphics image
|
dropped
|
||
Chrome Cache Entry: 87
|
JSON data
|
dropped
|
||
Chrome Cache Entry: 88
|
PNG image data, 533 x 478, 8-bit/color RGBA, non-interlaced
|
dropped
|
||
Chrome Cache Entry: 89
|
ASCII text, with very long lines (65536), with no line terminators
|
downloaded
|
||
Chrome Cache Entry: 90
|
ASCII text, with no line terminators
|
downloaded
|
||
Chrome Cache Entry: 91
|
JSON data
|
dropped
|
||
Chrome Cache Entry: 92
|
ASCII text, with very long lines (65410)
|
downloaded
|
||
Chrome Cache Entry: 93
|
JSON data
|
downloaded
|
||
Chrome Cache Entry: 94
|
PNG image data, 533 x 478, 8-bit/color RGBA, non-interlaced
|
downloaded
|
||
Chrome Cache Entry: 95
|
ASCII text, with very long lines (52717), with no line terminators
|
dropped
|
||
Chrome Cache Entry: 96
|
ASCII text
|
downloaded
|
||
Chrome Cache Entry: 97
|
ASCII text, with very long lines (52717), with no line terminators
|
downloaded
|
||
Chrome Cache Entry: 98
|
exported SGML document, ASCII text, with very long lines (65536), with no line terminators
|
downloaded
|
||
Chrome Cache Entry: 99
|
PNG image data, 533 x 478, 8-bit/color RGBA, non-interlaced
|
downloaded
|
There are 36 hidden files, click here to show them.
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\file.exe
|
"C:\Users\user\Desktop\file.exe"
|
||
C:\Program Files\Google\Chrome\Application\chrome.exe
|
"C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized --single-argument http://go.microsoft.com/fwlink/?prd=11324&pver=4.5&sbp=AppLaunch2&plcid=0x409&o1=SHIM_NOVERSION_FOUND&version=(null)&processName=file.exe&platform=0009&osver=6&isServer=0&shimver=4.0.30319.0
|
||
C:\Program Files\Google\Chrome\Application\chrome.exe
|
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US
--service-sandbox-type=none --mojo-platform-channel-handle=2472 --field-trial-handle=2332,i,7438478652651464284,9822841454251947196,262144
--disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction
/prefetch:8
|
||
C:\Program Files\Google\Chrome\Application\chrome.exe
|
"C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized --single-argument http://go.microsoft.com/fwlink/?prd=11324&pver=4.5&sbp=AppLaunch2&plcid=0x409&o1=SHIM_NOVERSION_FOUND&version=(null)&processName=file.exe&platform=0009&osver=6&isServer=0&shimver=4.0.30319.0
|
||
C:\Program Files\Google\Chrome\Application\chrome.exe
|
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US
--service-sandbox-type=none --mojo-platform-channel-handle=2052 --field-trial-handle=1992,i,12934382445748236653,13668332504761590760,262144
--disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction
/prefetch:8
|
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
https://authoring-docs-microsoft.poolparty.biz/devrel/7696cda6-0510-47f6-8302-71bb5d2e28cf
|
unknown
|
||
https://duckduckgo.com/chrome_newtab
|
unknown
|
||
https://duckduckgo.com/ac/?q=
|
unknown
|
||
https://property-imper.sbs/api
|
104.21.33.116
|
||
https://github.com/dotnet/docs/blob/17c4acca45e573a92878a44a2cce57d699fe9c7c/docs/framework/install/
|
unknown
|
||
https://www.linkedin.com/cws/share?url=$
|
unknown
|
||
https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
|
unknown
|
||
https://property-imper.sbs/CC
|
unknown
|
||
https://github.com/Youssef1313
|
unknown
|
||
https://management.azure.com/providers/Microsoft.Portal/userSettings/cloudconsole?api-version=2023-0
|
unknown
|
||
https://aka.ms/msignite_docs_banner
|
unknown
|
||
https://videoencodingpublic-hgeaeyeba8gycee3.b01.azurefd.net/public-b4da8140-92cf-421c-8b7b-e471d5b9
|
unknown
|
||
http://polymer.github.io/AUTHORS.txt
|
unknown
|
||
https://github.com/dotnet/docs/issues/new?template=z-customer-feedback.yml
|
unknown
|
||
http://crl.micro0
|
unknown
|
||
https://property-imper.sbs/%
|
unknown
|
||
https://management.azure.com/subscriptions?api-version=2016-06-01
|
unknown
|
||
https://github.com/dotnet/docs/blob/main/docs/framework/install/application-not-started.md
|
unknown
|
||
http://x1.c.lencr.org/0
|
unknown
|
||
http://x1.i.lencr.org/0
|
unknown
|
||
https://aka.ms/pshelpmechoose
|
unknown
|
||
https://aka.ms/feedback/report?space=61
|
unknown
|
||
https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
|
unknown
|
||
https://learn-video.azurefd.net/vod/player
|
unknown
|
||
https://twitter.com/intent/tweet?original_referer=$
|
unknown
|
||
https://github.com/gewarren
|
unknown
|
||
http://185.215.113.16/off/def.exepleWebKit/537.36
|
unknown
|
||
http://185.215.113.16/steam/random.exeX
|
unknown
|
||
https://support.mozilla.org/products/firefoxgro.all
|
unknown
|
||
http://polymer.github.io/CONTRIBUTORS.txt
|
unknown
|
||
https://github.com/dotnet/docs/blob/live/docs/framework/install/application-not-started.md
|
unknown
|
||
https://authoring-docs-microsoft.poolparty.biz/devrel/69c76c32-967e-4c65-b89a-74cc527db725
|
unknown
|
||
https://client-api.arkoselabs.com/v2/api.js
|
unknown
|
||
https://aka.ms/MSIgniteChallenge/Tier1Banner?wt.mc_id=ignite24_learnbanner_tier1_cnl
|
unknown
|
||
https://management.azure.com/providers/Microsoft.Portal/consoles/default?api-version=2017-12-01-prev
|
unknown
|
||
https://www.google.com/images/branding/product/ico/googleg_lodp.ico
|
unknown
|
||
https://github.com/Thraka
|
unknown
|
||
http://polymer.github.io/PATENTS.txt
|
unknown
|
||
https://aka.ms/certhelp
|
unknown
|
||
http://185.215.113.16/steam/random.exe
|
unknown
|
||
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
|
unknown
|
||
http://crl.rootca1.amazontrust.com/rootca1.crl0
|
unknown
|
||
https://github.com/mairaw
|
unknown
|
||
https://property-imper.sbs/%%
|
unknown
|
||
https://js.monitor.azure.com/scripts/c/ms.jsll-4.min.js
|
13.107.246.63
|
||
http://ocsp.rootca1.amazontrust.com0:
|
unknown
|
||
https://schema.org
|
unknown
|
||
http://polymer.github.io/LICENSE.txt
|
unknown
|
||
https://www.ecosia.org/newtab/
|
unknown
|
||
https://property-imper.sbs/
|
unknown
|
||
https://support.mozilla.org/kb/customize-firefox-controls-buttons-and-toolbars?utm_source=firefox-br
|
unknown
|
||
https://property-imper.sbs/.
|
unknown
|
||
https://aka.ms/yourcaliforniaprivacychoices
|
unknown
|
||
https://ac.ecosia.org/autocomplete?q=
|
unknown
|
||
https://github.com/nschonni
|
unknown
|
||
http://185.215.113.16/
|
unknown
|
||
https://property-imper.sbs/e
|
unknown
|
||
https://property-imper.sbs/apihQ
|
unknown
|
||
https://videoencodingpublic-hgeaeyeba8gycee3.b01.azurefd.net/public-09ce73a6-05a5-4e4d-b3d7-bd5a8c05
|
unknown
|
||
https://github.com/adegeo
|
unknown
|
||
https://property-imper.sbs/apiH
|
unknown
|
||
https://github.com/jonschlinkert/is-plain-object
|
unknown
|
||
http://crt.rootca1.amazontrust.com/rootca1.cer0?
|
unknown
|
||
https://octokit.github.io/rest.js/#throttling
|
unknown
|
||
https://property-imper.sbs/U
|
unknown
|
||
https://github.com/js-cookie/js-cookie
|
unknown
|
||
https://property-imper.sbs/$$
|
unknown
|
||
http://185.215.113.16/off/def.exe
|
unknown
|
||
http://schema.org/Organization
|
unknown
|
||
https://channel9.msdn.com/
|
unknown
|
||
https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
|
unknown
|
||
https://property-imper.sbs/M
|
unknown
|
||
https://github.com/dotnet/try
|
unknown
|
There are 63 hidden URLs, click here to show them.
Domains
Name
|
IP
|
Malicious
|
|
---|---|---|---|
property-imper.sbs
|
104.21.33.116
|
||
www.google.com
|
142.250.181.100
|
||
s-part-0035.t-0009.t-msedge.net
|
13.107.246.63
|
||
js.monitor.azure.com
|
unknown
|
||
mdec.nelreports.net
|
unknown
|
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
192.168.2.5
|
unknown
|
unknown
|
||
13.107.246.63
|
s-part-0035.t-0009.t-msedge.net
|
United States
|
||
185.215.113.16
|
unknown
|
Portugal
|
||
142.250.181.100
|
www.google.com
|
United States
|
||
239.255.255.250
|
unknown
|
Reserved
|
||
104.21.33.116
|
property-imper.sbs
|
United States
|
Registry
Path
|
Value
|
Malicious
|
|
---|---|---|---|
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer
|
SlowContextMenuEntries
|
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
53DA000
|
trusted library allocation
|
page read and write
|
||
543D000
|
trusted library allocation
|
page read and write
|
||
53BF000
|
trusted library allocation
|
page read and write
|
||
544E000
|
trusted library allocation
|
page read and write
|
||
5455000
|
trusted library allocation
|
page read and write
|
||
5902000
|
trusted library allocation
|
page read and write
|
||
59A1000
|
trusted library allocation
|
page read and write
|
||
7DE000
|
heap
|
page read and write
|
||
7E8000
|
heap
|
page read and write
|
||
5A63000
|
trusted library allocation
|
page read and write
|
||
544F000
|
trusted library allocation
|
page read and write
|
||
5449000
|
trusted library allocation
|
page read and write
|
||
4A30000
|
direct allocation
|
page execute and read and write
|
||
541C000
|
trusted library allocation
|
page read and write
|
||
7CB0000
|
direct allocation
|
page read and write
|
||
58F9000
|
trusted library allocation
|
page read and write
|
||
5487000
|
trusted library allocation
|
page read and write
|
||
53C9000
|
trusted library allocation
|
page read and write
|
||
5426000
|
trusted library allocation
|
page read and write
|
||
5487000
|
trusted library allocation
|
page read and write
|
||
917000
|
unkown
|
page write copy
|
||
53CB000
|
trusted library allocation
|
page read and write
|
||
5433000
|
trusted library allocation
|
page read and write
|
||
5447000
|
trusted library allocation
|
page read and write
|
||
5438000
|
trusted library allocation
|
page read and write
|
||
5447000
|
trusted library allocation
|
page read and write
|
||
318E000
|
stack
|
page read and write
|
||
547F000
|
trusted library allocation
|
page read and write
|
||
5A43000
|
trusted library allocation
|
page read and write
|
||
4431000
|
heap
|
page read and write
|
||
542D000
|
trusted library allocation
|
page read and write
|
||
3B4F000
|
stack
|
page read and write
|
||
F6E000
|
stack
|
page read and write
|
||
5921000
|
trusted library allocation
|
page read and write
|
||
549A000
|
trusted library allocation
|
page read and write
|
||
53E9000
|
trusted library allocation
|
page read and write
|
||
5A6C000
|
trusted library allocation
|
page read and write
|
||
595D000
|
trusted library allocation
|
page read and write
|
||
549A000
|
trusted library allocation
|
page read and write
|
||
585C000
|
trusted library allocation
|
page read and write
|
||
7DF000
|
heap
|
page read and write
|
||
5428000
|
trusted library allocation
|
page read and write
|
||
585B000
|
trusted library allocation
|
page read and write
|
||
5851000
|
trusted library allocation
|
page read and write
|
||
5853000
|
trusted library allocation
|
page read and write
|
||
5DD6000
|
trusted library allocation
|
page read and write
|
||
2D8F000
|
stack
|
page read and write
|
||
549A000
|
trusted library allocation
|
page read and write
|
||
549A000
|
trusted library allocation
|
page read and write
|
||
5444000
|
trusted library allocation
|
page read and write
|
||
5900000
|
trusted library allocation
|
page read and write
|
||
549A000
|
trusted library allocation
|
page read and write
|
||
822C000
|
stack
|
page read and write
|
||
5433000
|
trusted library allocation
|
page read and write
|
||
5447000
|
trusted library allocation
|
page read and write
|
||
4B8D000
|
stack
|
page read and write
|
||
5967000
|
trusted library allocation
|
page read and write
|
||
BC8000
|
unkown
|
page execute and read and write
|
||
53B4000
|
trusted library allocation
|
page read and write
|
||
53CF000
|
trusted library allocation
|
page read and write
|
||
8B0000
|
direct allocation
|
page read and write
|
||
76B000
|
heap
|
page read and write
|
||
53D7000
|
trusted library allocation
|
page read and write
|
||
5448000
|
trusted library allocation
|
page read and write
|
||
4441000
|
heap
|
page read and write
|
||
5457000
|
trusted library allocation
|
page read and write
|
||
54BF000
|
trusted library allocation
|
page read and write
|
||
5447000
|
trusted library allocation
|
page read and write
|
||
544D000
|
trusted library allocation
|
page read and write
|
||
5DD0000
|
trusted library allocation
|
page read and write
|
||
70B000
|
stack
|
page read and write
|
||
660F000
|
stack
|
page read and write
|
||
53E1000
|
trusted library allocation
|
page read and write
|
||
549A000
|
trusted library allocation
|
page read and write
|
||
660000
|
heap
|
page read and write
|
||
542A000
|
trusted library allocation
|
page read and write
|
||
542F000
|
trusted library allocation
|
page read and write
|
||
59DD000
|
trusted library allocation
|
page read and write
|
||
5436000
|
trusted library allocation
|
page read and write
|
||
5917000
|
trusted library allocation
|
page read and write
|
||
53C6000
|
trusted library allocation
|
page read and write
|
||
5447000
|
trusted library allocation
|
page read and write
|
||
542A000
|
trusted library allocation
|
page read and write
|
||
5426000
|
trusted library allocation
|
page read and write
|
||
585A000
|
trusted library allocation
|
page read and write
|
||
549A000
|
trusted library allocation
|
page read and write
|
||
48C0000
|
direct allocation
|
page read and write
|
||
7E60000
|
direct allocation
|
page execute and read and write
|
||
53E9000
|
trusted library allocation
|
page read and write
|
||
7CB0000
|
direct allocation
|
page read and write
|
||
5A4F000
|
stack
|
page read and write
|
||
5438000
|
trusted library allocation
|
page read and write
|
||
5442000
|
trusted library allocation
|
page read and write
|
||
5858000
|
trusted library allocation
|
page read and write
|
||
5852000
|
trusted library allocation
|
page read and write
|
||
5AEA000
|
trusted library allocation
|
page read and write
|
||
53E6000
|
trusted library allocation
|
page read and write
|
||
5426000
|
trusted library allocation
|
page read and write
|
||
4431000
|
heap
|
page read and write
|
||
890000
|
heap
|
page read and write
|
||
549A000
|
trusted library allocation
|
page read and write
|
||
53BF000
|
trusted library allocation
|
page read and write
|
||
7E8000
|
heap
|
page read and write
|
||
5853000
|
trusted library allocation
|
page read and write
|
||
5468000
|
trusted library allocation
|
page read and write
|
||
5433000
|
trusted library allocation
|
page read and write
|
||
543D000
|
trusted library allocation
|
page read and write
|
||
783000
|
heap
|
page read and write
|
||
543E000
|
trusted library allocation
|
page read and write
|
||
2DCE000
|
stack
|
page read and write
|
||
5426000
|
trusted library allocation
|
page read and write
|
||
5468000
|
trusted library allocation
|
page read and write
|
||
5447000
|
trusted library allocation
|
page read and write
|
||
5A65000
|
trusted library allocation
|
page read and write
|
||
542E000
|
trusted library allocation
|
page read and write
|
||
728F000
|
stack
|
page read and write
|
||
53D4000
|
trusted library allocation
|
page read and write
|
||
5468000
|
trusted library allocation
|
page read and write
|
||
3A4E000
|
stack
|
page read and write
|
||
5987000
|
trusted library allocation
|
page read and write
|
||
7F9A000
|
trusted library allocation
|
page read and write
|
||
595D000
|
trusted library allocation
|
page read and write
|
||
7D10000
|
direct allocation
|
page read and write
|
||
549A000
|
trusted library allocation
|
page read and write
|
||
7D4C000
|
stack
|
page read and write
|
||
543A000
|
trusted library allocation
|
page read and write
|
||
597E000
|
trusted library allocation
|
page read and write
|
||
5426000
|
trusted library allocation
|
page read and write
|
||
549A000
|
trusted library allocation
|
page read and write
|
||
53AE000
|
stack
|
page read and write
|
||
548A000
|
trusted library allocation
|
page read and write
|
||
53BF000
|
trusted library allocation
|
page read and write
|
||
440F000
|
stack
|
page read and write
|
||
32CE000
|
stack
|
page read and write
|
||
549A000
|
trusted library allocation
|
page read and write
|
||
6D8F000
|
stack
|
page read and write
|
||
543D000
|
trusted library allocation
|
page read and write
|
||
5468000
|
trusted library allocation
|
page read and write
|
||
7D0000
|
heap
|
page read and write
|
||
5428000
|
trusted library allocation
|
page read and write
|
||
5442000
|
trusted library allocation
|
page read and write
|
||
5431000
|
trusted library allocation
|
page read and write
|
||
599B000
|
trusted library allocation
|
page read and write
|
||
54B5000
|
trusted library allocation
|
page read and write
|
||
544F000
|
trusted library allocation
|
page read and write
|
||
5929000
|
trusted library allocation
|
page read and write
|
||
7F90000
|
trusted library allocation
|
page read and write
|
||
3E0E000
|
stack
|
page read and write
|
||
5448000
|
trusted library allocation
|
page read and write
|
||
5857000
|
trusted library allocation
|
page read and write
|
||
5426000
|
trusted library allocation
|
page read and write
|
||
5438000
|
trusted library allocation
|
page read and write
|
||
546F000
|
trusted library allocation
|
page read and write
|
||
7D0000
|
heap
|
page read and write
|
||
5441000
|
trusted library allocation
|
page read and write
|
||
304E000
|
stack
|
page read and write
|
||
544F000
|
trusted library allocation
|
page read and write
|
||
7F4000
|
heap
|
page read and write
|
||
778F000
|
stack
|
page read and write
|
||
53D7000
|
trusted library allocation
|
page read and write
|
||
D6D000
|
unkown
|
page execute and write copy
|
||
510E000
|
stack
|
page read and write
|
||
5475000
|
trusted library allocation
|
page read and write
|
||
5428000
|
trusted library allocation
|
page read and write
|
||
7CB0000
|
direct allocation
|
page read and write
|
||
61E000
|
stack
|
page read and write
|
||
8B0000
|
direct allocation
|
page read and write
|
||
430E000
|
stack
|
page read and write
|
||
5487000
|
trusted library allocation
|
page read and write
|
||
5851000
|
trusted library allocation
|
page read and write
|
||
53D2000
|
trusted library allocation
|
page read and write
|
||
7E7000
|
heap
|
page read and write
|
||
5437000
|
trusted library allocation
|
page read and write
|
||
5439000
|
trusted library allocation
|
page read and write
|
||
599F000
|
trusted library allocation
|
page read and write
|
||
53BA000
|
trusted library allocation
|
page read and write
|
||
549A000
|
trusted library allocation
|
page read and write
|
||
5439000
|
trusted library allocation
|
page read and write
|
||
5948000
|
trusted library allocation
|
page read and write
|
||
5468000
|
trusted library allocation
|
page read and write
|
||
546F000
|
trusted library allocation
|
page read and write
|
||
4431000
|
heap
|
page read and write
|
||
628F000
|
stack
|
page read and write
|
||
755000
|
heap
|
page read and write
|
||
BBA000
|
unkown
|
page execute and read and write
|
||
5861000
|
trusted library allocation
|
page read and write
|
||
585E000
|
trusted library allocation
|
page read and write
|
||
5904000
|
trusted library allocation
|
page read and write
|
||
71E000
|
heap
|
page read and write
|
||
54BE000
|
trusted library allocation
|
page read and write
|
||
5442000
|
trusted library allocation
|
page read and write
|
||
53EB000
|
trusted library allocation
|
page read and write
|
||
549A000
|
trusted library allocation
|
page read and write
|
||
5859000
|
trusted library allocation
|
page read and write
|
||
5991000
|
trusted library allocation
|
page read and write
|
||
53D2000
|
trusted library allocation
|
page read and write
|
||
549A000
|
trusted library allocation
|
page read and write
|
||
53D7000
|
trusted library allocation
|
page read and write
|
||
33CF000
|
stack
|
page read and write
|
||
543E000
|
trusted library allocation
|
page read and write
|
||
5650000
|
trusted library allocation
|
page read and write
|
||
5993000
|
trusted library allocation
|
page read and write
|
||
5407000
|
trusted library allocation
|
page read and write
|
||
5468000
|
trusted library allocation
|
page read and write
|
||
5468000
|
trusted library allocation
|
page read and write
|
||
5855000
|
trusted library allocation
|
page read and write
|
||
7F2000
|
heap
|
page read and write
|
||
549A000
|
trusted library allocation
|
page read and write
|
||
5853000
|
trusted library allocation
|
page read and write
|
||
5436000
|
trusted library allocation
|
page read and write
|
||
5541000
|
trusted library allocation
|
page read and write
|
||
4431000
|
heap
|
page read and write
|
||
5437000
|
trusted library allocation
|
page read and write
|
||
5418000
|
trusted library allocation
|
page read and write
|
||
678E000
|
stack
|
page read and write
|
||
490C000
|
stack
|
page read and write
|
||
7CA000
|
heap
|
page read and write
|
||
BC9000
|
unkown
|
page execute and write copy
|
||
5405000
|
trusted library allocation
|
page read and write
|
||
B88000
|
unkown
|
page execute and read and write
|
||
542E000
|
trusted library allocation
|
page read and write
|
||
59A1000
|
trusted library allocation
|
page read and write
|
||
58F7000
|
trusted library allocation
|
page read and write
|
||
5909000
|
trusted library allocation
|
page read and write
|
||
5468000
|
trusted library allocation
|
page read and write
|
||
5852000
|
trusted library allocation
|
page read and write
|
||
5DDA000
|
trusted library allocation
|
page execute and read and write
|
||
53FF000
|
trusted library allocation
|
page read and write
|
||
5467000
|
trusted library allocation
|
page read and write
|
||
7E2000
|
heap
|
page read and write
|
||
51A3000
|
heap
|
page read and write
|
||
549A000
|
trusted library allocation
|
page read and write
|
||
585F000
|
trusted library allocation
|
page read and write
|
||
5468000
|
trusted library allocation
|
page read and write
|
||
4A0F000
|
stack
|
page read and write
|
||
7F1000
|
heap
|
page read and write
|
||
543B000
|
trusted library allocation
|
page read and write
|
||
5982000
|
trusted library allocation
|
page read and write
|
||
543C000
|
trusted library allocation
|
page read and write
|
||
5431000
|
trusted library allocation
|
page read and write
|
||
781000
|
heap
|
page read and write
|
||
674F000
|
stack
|
page read and write
|
||
53BA000
|
trusted library allocation
|
page read and write
|
||
5938000
|
trusted library allocation
|
page read and write
|
||
549A000
|
trusted library allocation
|
page read and write
|
||
4F0E000
|
stack
|
page read and write
|
||
5855000
|
trusted library allocation
|
page read and write
|
||
5441000
|
trusted library allocation
|
page read and write
|
||
704E000
|
stack
|
page read and write
|
||
5457000
|
trusted library allocation
|
page read and write
|
||
5468000
|
trusted library allocation
|
page read and write
|
||
37CE000
|
stack
|
page read and write
|
||
5A45000
|
trusted library allocation
|
page read and write
|
||
54E9000
|
stack
|
page read and write
|
||
7CB0000
|
direct allocation
|
page read and write
|
||
768E000
|
stack
|
page read and write
|
||
5AE7000
|
trusted library allocation
|
page read and write
|
||
5428000
|
trusted library allocation
|
page read and write
|
||
832C000
|
stack
|
page read and write
|
||
5968000
|
trusted library allocation
|
page read and write
|
||
5852000
|
trusted library allocation
|
page read and write
|
||
543D000
|
trusted library allocation
|
page read and write
|
||
585F000
|
trusted library allocation
|
page read and write
|
||
5851000
|
trusted library allocation
|
page read and write
|
||
59A1000
|
trusted library allocation
|
page read and write
|
||
593E000
|
trusted library allocation
|
page read and write
|
||
549A000
|
trusted library allocation
|
page read and write
|
||
54B1000
|
trusted library allocation
|
page read and write
|
||
8C1000
|
unkown
|
page execute and read and write
|
||
549A000
|
trusted library allocation
|
page read and write
|
||
1E0000
|
heap
|
page read and write
|
||
5487000
|
trusted library allocation
|
page read and write
|
||
53D2000
|
trusted library allocation
|
page read and write
|
||
594E000
|
trusted library allocation
|
page read and write
|
||
5468000
|
trusted library allocation
|
page read and write
|
||
5F67000
|
trusted library allocation
|
page execute and read and write
|
||
595B000
|
trusted library allocation
|
page read and write
|
||
5468000
|
trusted library allocation
|
page read and write
|
||
5A2D000
|
trusted library allocation
|
page read and write
|
||
549A000
|
trusted library allocation
|
page read and write
|
||
6CE000
|
stack
|
page read and write
|
||
740E000
|
stack
|
page read and write
|
||
544D000
|
trusted library allocation
|
page read and write
|
||
5442000
|
trusted library allocation
|
page read and write
|
||
5431000
|
trusted library allocation
|
page read and write
|
||
5468000
|
trusted library allocation
|
page read and write
|
||
5428000
|
trusted library allocation
|
page read and write
|
||
5468000
|
trusted library allocation
|
page read and write
|
||
593A000
|
trusted library allocation
|
page read and write
|
||
4431000
|
heap
|
page read and write
|
||
5451000
|
trusted library allocation
|
page read and write
|
||
7E1000
|
heap
|
page read and write
|
||
53BA000
|
trusted library allocation
|
page read and write
|
||
754E000
|
stack
|
page read and write
|
||
5557000
|
trusted library allocation
|
page read and write
|
||
549A000
|
trusted library allocation
|
page read and write
|
||
5854000
|
trusted library allocation
|
page read and write
|
||
5428000
|
trusted library allocation
|
page read and write
|
||
5447000
|
trusted library allocation
|
page read and write
|
||
5856000
|
trusted library allocation
|
page read and write
|
||
5468000
|
trusted library allocation
|
page read and write
|
||
5458000
|
trusted library allocation
|
page read and write
|
||
AA0000
|
unkown
|
page execute and read and write
|
||
5457000
|
trusted library allocation
|
page read and write
|
||
4431000
|
heap
|
page read and write
|
||
84E000
|
stack
|
page read and write
|
||
5468000
|
trusted library allocation
|
page read and write
|
||
5426000
|
trusted library allocation
|
page read and write
|
||
7E4000
|
heap
|
page read and write
|
||
549A000
|
trusted library allocation
|
page read and write
|
||
59FE000
|
trusted library allocation
|
page read and write
|
||
5565000
|
trusted library allocation
|
page read and write
|
||
4431000
|
heap
|
page read and write
|
||
5855000
|
trusted library allocation
|
page read and write
|
||
4431000
|
heap
|
page read and write
|
||
53D5000
|
trusted library allocation
|
page read and write
|
||
549A000
|
trusted library allocation
|
page read and write
|
||
65E000
|
stack
|
page read and write
|
||
59FC000
|
trusted library allocation
|
page read and write
|
||
790E000
|
stack
|
page read and write
|
||
5AEC000
|
trusted library allocation
|
page read and write
|
||
585A000
|
trusted library allocation
|
page read and write
|
||
280F000
|
stack
|
page read and write
|
||
5980000
|
trusted library allocation
|
page read and write
|
||
418F000
|
stack
|
page read and write
|
||
7EC000
|
heap
|
page read and write
|
||
5400000
|
trusted library allocation
|
page read and write
|
||
917000
|
unkown
|
page read and write
|
||
549A000
|
trusted library allocation
|
page read and write
|
||
5855000
|
trusted library allocation
|
page read and write
|
||
5426000
|
trusted library allocation
|
page read and write
|
||
4430000
|
heap
|
page read and write
|
||
7D10000
|
direct allocation
|
page read and write
|
||
1D0000
|
heap
|
page read and write
|
||
7E2000
|
heap
|
page read and write
|
||
544E000
|
trusted library allocation
|
page read and write
|
||
5852000
|
trusted library allocation
|
page read and write
|
||
53B5000
|
trusted library allocation
|
page read and write
|
||
5406000
|
trusted library allocation
|
page read and write
|
||
5428000
|
trusted library allocation
|
page read and write
|
||
549A000
|
trusted library allocation
|
page read and write
|
||
4A20000
|
direct allocation
|
page execute and read and write
|
||
7E4F000
|
stack
|
page read and write
|
||
5852000
|
trusted library allocation
|
page read and write
|
||
5946000
|
trusted library allocation
|
page read and write
|
||
543D000
|
trusted library allocation
|
page read and write
|
||
8C0000
|
unkown
|
page read and write
|
||
541C000
|
trusted library allocation
|
page read and write
|
||
5851000
|
trusted library allocation
|
page read and write
|
||
63CE000
|
stack
|
page read and write
|
||
549A000
|
trusted library allocation
|
page read and write
|
||
5477000
|
trusted library allocation
|
page read and write
|
||
7A0F000
|
stack
|
page read and write
|
||
599E000
|
trusted library allocation
|
page read and write
|
||
549A000
|
trusted library allocation
|
page read and write
|
||
96F0000
|
trusted library allocation
|
page read and write
|
||
5481000
|
trusted library allocation
|
page read and write
|
||
59C0000
|
trusted library allocation
|
page read and write
|
||
48C0000
|
direct allocation
|
page read and write
|
||
4A40000
|
direct allocation
|
page execute and read and write
|
||
53BA000
|
trusted library allocation
|
page read and write
|
||
5927000
|
trusted library allocation
|
page read and write
|
||
5468000
|
trusted library allocation
|
page read and write
|
||
5910000
|
trusted library allocation
|
page read and write
|
||
5440000
|
trusted library allocation
|
page read and write
|
||
4431000
|
heap
|
page read and write
|
||
548B000
|
trusted library allocation
|
page read and write
|
||
3F0F000
|
stack
|
page read and write
|
||
7E9000
|
heap
|
page read and write
|
||
5496000
|
trusted library allocation
|
page read and write
|
||
5457000
|
trusted library allocation
|
page read and write
|
||
5696000
|
trusted library allocation
|
page read and write
|
||
5496000
|
trusted library allocation
|
page read and write
|
||
585C000
|
trusted library allocation
|
page read and write
|
||
6DCE000
|
stack
|
page read and write
|
||
5401000
|
trusted library allocation
|
page read and write
|
||
5426000
|
trusted library allocation
|
page read and write
|
||
5448000
|
trusted library allocation
|
page read and write
|
||
7EA000
|
heap
|
page read and write
|
||
53E6000
|
trusted library allocation
|
page read and write
|
||
5447000
|
trusted library allocation
|
page read and write
|
||
7CB0000
|
direct allocation
|
page read and write
|
||
5441000
|
trusted library allocation
|
page read and write
|
||
5965000
|
trusted library allocation
|
page read and write
|
||
5457000
|
trusted library allocation
|
page read and write
|
||
549A000
|
trusted library allocation
|
page read and write
|
||
5902000
|
trusted library allocation
|
page read and write
|
||
594F000
|
trusted library allocation
|
page read and write
|
||
5DC8000
|
trusted library allocation
|
page read and write
|
||
4A60000
|
direct allocation
|
page execute and read and write
|
||
4F30000
|
remote allocation
|
page read and write
|
||
5857000
|
trusted library allocation
|
page read and write
|
||
608A000
|
trusted library allocation
|
page execute and read and write
|
||
543B000
|
trusted library allocation
|
page read and write
|
||
549A000
|
trusted library allocation
|
page read and write
|
||
4F9E000
|
stack
|
page read and write
|
||
700F000
|
stack
|
page read and write
|
||
5468000
|
trusted library allocation
|
page read and write
|
||
4C8D000
|
stack
|
page read and write
|
||
5447000
|
trusted library allocation
|
page read and write
|
||
5431000
|
trusted library allocation
|
page read and write
|
||
543A000
|
trusted library allocation
|
page read and write
|
||
5458000
|
trusted library allocation
|
page read and write
|
||
5407000
|
trusted library allocation
|
page read and write
|
||
5468000
|
trusted library allocation
|
page read and write
|
||
846E000
|
stack
|
page read and write
|
||
6088000
|
trusted library allocation
|
page execute and read and write
|
||
8B0000
|
direct allocation
|
page read and write
|
||
5855000
|
trusted library allocation
|
page read and write
|
||
5436000
|
trusted library allocation
|
page read and write
|
||
8B0000
|
direct allocation
|
page read and write
|
||
5468000
|
trusted library allocation
|
page read and write
|
||
5468000
|
trusted library allocation
|
page read and write
|
||
598D000
|
trusted library allocation
|
page read and write
|
||
5929000
|
trusted library allocation
|
page read and write
|
||
53BC000
|
trusted library allocation
|
page read and write
|
||
5428000
|
trusted library allocation
|
page read and write
|
||
53B0000
|
trusted library allocation
|
page read and write
|
||
5853000
|
trusted library allocation
|
page read and write
|
||
53CB000
|
trusted library allocation
|
page read and write
|
||
2B0F000
|
stack
|
page read and write
|
||
55ED000
|
trusted library allocation
|
page read and write
|
||
549A000
|
trusted library allocation
|
page read and write
|
||
53BF000
|
trusted library allocation
|
page read and write
|
||
549A000
|
trusted library allocation
|
page read and write
|
||
5853000
|
trusted library allocation
|
page read and write
|
||
7F92000
|
trusted library allocation
|
page read and write
|
||
5449000
|
trusted library allocation
|
page read and write
|
||
54DD000
|
trusted library allocation
|
page read and write
|
||
549A000
|
trusted library allocation
|
page read and write
|
||
5457000
|
trusted library allocation
|
page read and write
|
||
8B0000
|
direct allocation
|
page read and write
|
||
5859000
|
trusted library allocation
|
page read and write
|
||
5447000
|
trusted library allocation
|
page read and write
|
||
542F000
|
trusted library allocation
|
page read and write
|
||
290F000
|
stack
|
page read and write
|
||
2C4F000
|
stack
|
page read and write
|
||
5859000
|
trusted library allocation
|
page read and write
|
||
56DC000
|
trusted library allocation
|
page read and write
|
||
5A5F000
|
trusted library allocation
|
page read and write
|
||
549A000
|
trusted library allocation
|
page read and write
|
||
5468000
|
trusted library allocation
|
page read and write
|
||
4431000
|
heap
|
page read and write
|
||
53EB000
|
trusted library allocation
|
page read and write
|
||
5481000
|
trusted library allocation
|
page read and write
|
||
340E000
|
stack
|
page read and write
|
||
5472000
|
trusted library allocation
|
page read and write
|
||
5458000
|
trusted library allocation
|
page read and write
|
||
4FB000
|
stack
|
page read and write
|
||
4870000
|
trusted library allocation
|
page read and write
|
||
542D000
|
trusted library allocation
|
page read and write
|
||
748000
|
heap
|
page read and write
|
||
7D1000
|
heap
|
page read and write
|
||
7DE000
|
heap
|
page read and write
|
||
7B4F000
|
stack
|
page read and write
|
||
5435000
|
trusted library allocation
|
page read and write
|
||
6C8E000
|
stack
|
page read and write
|
||
5496000
|
trusted library allocation
|
page read and write
|
||
545F000
|
trusted library allocation
|
page read and write
|
||
5860000
|
trusted library allocation
|
page read and write
|
||
5853000
|
trusted library allocation
|
page read and write
|
||
BB0000
|
unkown
|
page execute and read and write
|
||
5857000
|
trusted library allocation
|
page read and write
|
||
53D7000
|
trusted library allocation
|
page read and write
|
||
4A50000
|
direct allocation
|
page execute and read and write
|
||
5436000
|
trusted library allocation
|
page read and write
|
||
54F5000
|
trusted library allocation
|
page read and write
|
||
5458000
|
trusted library allocation
|
page read and write
|
||
5852000
|
trusted library allocation
|
page read and write
|
||
5855000
|
trusted library allocation
|
page read and write
|
||
5A2F000
|
trusted library allocation
|
page read and write
|
||
5428000
|
trusted library allocation
|
page read and write
|
||
5854000
|
trusted library allocation
|
page read and write
|
||
7E4000
|
heap
|
page read and write
|
||
5428000
|
trusted library allocation
|
page read and write
|
||
544F000
|
trusted library allocation
|
page read and write
|
||
5426000
|
trusted library allocation
|
page read and write
|
||
4A50000
|
direct allocation
|
page execute and read and write
|
||
53E3000
|
trusted library allocation
|
page read and write
|
||
5437000
|
trusted library allocation
|
page read and write
|
||
53D2000
|
trusted library allocation
|
page read and write
|
||
5418000
|
trusted library allocation
|
page read and write
|
||
53E3000
|
trusted library allocation
|
page read and write
|
||
5496000
|
trusted library allocation
|
page read and write
|
||
7F4000
|
heap
|
page read and write
|
||
5457000
|
trusted library allocation
|
page read and write
|
||
599F000
|
trusted library allocation
|
page read and write
|
||
5449000
|
trusted library allocation
|
page read and write
|
||
3C8F000
|
stack
|
page read and write
|
||
58F4000
|
trusted library allocation
|
page read and write
|
||
3B8E000
|
stack
|
page read and write
|
||
7EA000
|
heap
|
page read and write
|
||
547F000
|
trusted library allocation
|
page read and write
|
||
5595000
|
trusted library allocation
|
page read and write
|
||
41CE000
|
stack
|
page read and write
|
||
5468000
|
trusted library allocation
|
page read and write
|
||
543A000
|
trusted library allocation
|
page read and write
|
||
5856000
|
trusted library allocation
|
page read and write
|
||
542A000
|
trusted library allocation
|
page read and write
|
||
782000
|
heap
|
page read and write
|
||
5477000
|
trusted library allocation
|
page read and write
|
||
53CB000
|
trusted library allocation
|
page read and write
|
||
542C000
|
trusted library allocation
|
page read and write
|
||
4A50000
|
direct allocation
|
page execute and read and write
|
||
7CB0000
|
direct allocation
|
page read and write
|
||
53E7000
|
trusted library allocation
|
page read and write
|
||
5433000
|
trusted library allocation
|
page read and write
|
||
5852000
|
trusted library allocation
|
page read and write
|
||
544F000
|
trusted library allocation
|
page read and write
|
||
7B8E000
|
stack
|
page read and write
|
||
543E000
|
trusted library allocation
|
page read and write
|
||
D6C000
|
unkown
|
page execute and read and write
|
||
328F000
|
stack
|
page read and write
|
||
585C000
|
trusted library allocation
|
page read and write
|
||
5428000
|
trusted library allocation
|
page read and write
|
||
5A4E000
|
trusted library allocation
|
page read and write
|
||
549A000
|
trusted library allocation
|
page read and write
|
||
558D000
|
trusted library allocation
|
page read and write
|
||
5446000
|
trusted library allocation
|
page read and write
|
||
8C1000
|
unkown
|
page execute and write copy
|
||
5457000
|
trusted library allocation
|
page read and write
|
||
599A000
|
trusted library allocation
|
page read and write
|
||
549A000
|
trusted library allocation
|
page read and write
|
||
5447000
|
trusted library allocation
|
page read and write
|
||
5436000
|
trusted library allocation
|
page read and write
|
||
549A000
|
trusted library allocation
|
page read and write
|
||
3CCE000
|
stack
|
page read and write
|
||
543E000
|
trusted library allocation
|
page read and write
|
||
5468000
|
trusted library allocation
|
page read and write
|
||
5854000
|
trusted library allocation
|
page read and write
|
||
549A000
|
trusted library allocation
|
page read and write
|
||
7DE000
|
heap
|
page read and write
|
||
543D000
|
trusted library allocation
|
page read and write
|
||
5458000
|
trusted library allocation
|
page read and write
|
||
5468000
|
trusted library allocation
|
page read and write
|
||
7CB0000
|
direct allocation
|
page read and write
|
||
4F30000
|
remote allocation
|
page read and write
|
||
5DB9000
|
trusted library allocation
|
page read and write
|
||
590F000
|
trusted library allocation
|
page read and write
|
||
8B0000
|
direct allocation
|
page read and write
|
||
350F000
|
stack
|
page read and write
|
||
594D000
|
trusted library allocation
|
page read and write
|
||
5461000
|
trusted library allocation
|
page read and write
|
||
5433000
|
trusted library allocation
|
page read and write
|
||
549A000
|
trusted library allocation
|
page read and write
|
||
5426000
|
trusted library allocation
|
page read and write
|
||
5859000
|
trusted library allocation
|
page read and write
|
||
5A61000
|
trusted library allocation
|
page read and write
|
||
5932000
|
trusted library allocation
|
page read and write
|
||
5856000
|
trusted library allocation
|
page read and write
|
||
7E90000
|
heap
|
page read and write
|
||
5858000
|
trusted library allocation
|
page read and write
|
||
509F000
|
stack
|
page read and write
|
||
593B000
|
trusted library allocation
|
page read and write
|
||
8C0000
|
unkown
|
page readonly
|
||
4F30000
|
remote allocation
|
page read and write
|
||
542A000
|
trusted library allocation
|
page read and write
|
||
4431000
|
heap
|
page read and write
|
||
4A70000
|
direct allocation
|
page execute and read and write
|
||
5998000
|
trusted library allocation
|
page read and write
|
||
543A000
|
trusted library allocation
|
page read and write
|
||
5405000
|
trusted library allocation
|
page read and write
|
||
5422000
|
trusted library allocation
|
page read and write
|
||
5435000
|
trusted library allocation
|
page read and write
|
||
544D000
|
trusted library allocation
|
page read and write
|
||
5652000
|
trusted library allocation
|
page read and write
|
||
5858000
|
trusted library allocation
|
page read and write
|
||
4431000
|
heap
|
page read and write
|
||
5447000
|
trusted library allocation
|
page read and write
|
||
53CF000
|
trusted library allocation
|
page read and write
|
||
53B6000
|
trusted library allocation
|
page read and write
|
||
5468000
|
trusted library allocation
|
page read and write
|
||
585A000
|
trusted library allocation
|
page read and write
|
||
638F000
|
stack
|
page read and write
|
||
7E7000
|
heap
|
page read and write
|
||
5458000
|
trusted library allocation
|
page read and write
|
||
7BE000
|
heap
|
page read and write
|
||
5AB1000
|
trusted library allocation
|
page read and write
|
||
7CB0000
|
direct allocation
|
page read and write
|
||
5934000
|
trusted library allocation
|
page read and write
|
||
5449000
|
trusted library allocation
|
page read and write
|
||
38CF000
|
stack
|
page read and write
|
||
599D000
|
trusted library allocation
|
page read and write
|
||
5416000
|
trusted library allocation
|
page read and write
|
||
776000
|
heap
|
page read and write
|
||
54C1000
|
trusted library allocation
|
page read and write
|
||
4431000
|
heap
|
page read and write
|
||
5861000
|
trusted library allocation
|
page read and write
|
||
590D000
|
trusted library allocation
|
page read and write
|
||
5515000
|
trusted library allocation
|
page read and write
|
||
549A000
|
trusted library allocation
|
page read and write
|
||
4410000
|
heap
|
page read and write
|
||
6B0F000
|
stack
|
page read and write
|
||
5428000
|
trusted library allocation
|
page read and write
|
||
7EA0000
|
direct allocation
|
page execute and read and write
|
||
5850000
|
trusted library allocation
|
page read and write
|
||
2C8E000
|
stack
|
page read and write
|
||
5419000
|
trusted library allocation
|
page read and write
|
||
52AF000
|
stack
|
page read and write
|
||
541C000
|
trusted library allocation
|
page read and write
|
||
5AE9000
|
trusted library allocation
|
page read and write
|
||
5851000
|
trusted library allocation
|
page read and write
|
||
59DB000
|
trusted library allocation
|
page read and write
|
||
5415000
|
trusted library allocation
|
page read and write
|
||
5477000
|
trusted library allocation
|
page read and write
|
||
53D4000
|
trusted library allocation
|
page read and write
|
||
919000
|
unkown
|
page execute and read and write
|
||
5850000
|
trusted library allocation
|
page read and write
|
||
5449000
|
trusted library allocation
|
page read and write
|
||
5428000
|
trusted library allocation
|
page read and write
|
||
5DD2000
|
trusted library allocation
|
page execute and read and write
|
||
8B0000
|
direct allocation
|
page read and write
|
||
53E9000
|
trusted library allocation
|
page read and write
|
||
5858000
|
trusted library allocation
|
page read and write
|
||
5A8F000
|
trusted library allocation
|
page read and write
|
||
48C0000
|
direct allocation
|
page read and write
|
||
5436000
|
trusted library allocation
|
page read and write
|
||
404F000
|
stack
|
page read and write
|
||
585E000
|
trusted library allocation
|
page read and write
|
||
7ED000
|
heap
|
page read and write
|
||
5438000
|
trusted library allocation
|
page read and write
|
||
5ABA000
|
trusted library allocation
|
page read and write
|
||
5468000
|
trusted library allocation
|
page read and write
|
||
5459000
|
trusted library allocation
|
page read and write
|
||
552E000
|
stack
|
page read and write
|
||
54C4000
|
trusted library allocation
|
page read and write
|
||
BC8000
|
unkown
|
page execute and write copy
|
||
5856000
|
trusted library allocation
|
page read and write
|
||
542F000
|
trusted library allocation
|
page read and write
|
||
547F000
|
trusted library allocation
|
page read and write
|
||
714F000
|
stack
|
page read and write
|
||
5475000
|
trusted library allocation
|
page read and write
|
||
5966000
|
trusted library allocation
|
page read and write
|
||
590E000
|
trusted library allocation
|
page read and write
|
||
544D000
|
trusted library allocation
|
page read and write
|
||
5439000
|
trusted library allocation
|
page read and write
|
||
5468000
|
trusted library allocation
|
page read and write
|
||
5405000
|
trusted library allocation
|
page read and write
|
||
53E7000
|
trusted library allocation
|
page read and write
|
||
5441000
|
trusted library allocation
|
page read and write
|
||
53CB000
|
trusted library allocation
|
page read and write
|
||
5858000
|
trusted library allocation
|
page read and write
|
||
6B4E000
|
stack
|
page read and write
|
||
5428000
|
trusted library allocation
|
page read and write
|
||
88E000
|
stack
|
page read and write
|
||
599F000
|
trusted library allocation
|
page read and write
|
||
5436000
|
trusted library allocation
|
page read and write
|
||
5436000
|
trusted library allocation
|
page read and write
|
||
53CA000
|
trusted library allocation
|
page read and write
|
||
5428000
|
trusted library allocation
|
page read and write
|
||
5468000
|
trusted library allocation
|
page read and write
|
||
5407000
|
trusted library allocation
|
page read and write
|
||
547C000
|
trusted library allocation
|
page read and write
|
||
549A000
|
trusted library allocation
|
page read and write
|
||
5436000
|
trusted library allocation
|
page read and write
|
||
5A8C000
|
stack
|
page read and write
|
||
78CF000
|
stack
|
page read and write
|
||
549A000
|
trusted library allocation
|
page read and write
|
||
5468000
|
trusted library allocation
|
page read and write
|
||
4E0E000
|
stack
|
page read and write
|
||
390E000
|
stack
|
page read and write
|
||
5853000
|
trusted library allocation
|
page read and write
|
||
48BD000
|
stack
|
page read and write
|
||
7D00000
|
heap
|
page read and write
|
||
53F7000
|
trusted library allocation
|
page read and write
|
||
7E7000
|
heap
|
page read and write
|
||
585F000
|
trusted library allocation
|
page read and write
|
||
5431000
|
trusted library allocation
|
page read and write
|
||
599C000
|
trusted library allocation
|
page read and write
|
||
665000
|
heap
|
page read and write
|
||
549A000
|
trusted library allocation
|
page read and write
|
||
4440000
|
heap
|
page read and write
|
||
5856000
|
trusted library allocation
|
page read and write
|
||
53F1000
|
trusted library allocation
|
page read and write
|
||
53BA000
|
trusted library allocation
|
page read and write
|
||
8B0000
|
direct allocation
|
page read and write
|
||
51A0000
|
heap
|
page read and write
|
||
762000
|
heap
|
page read and write
|
||
5949000
|
stack
|
page read and write
|
||
59B7000
|
trusted library allocation
|
page read and write
|
||
53EB000
|
trusted library allocation
|
page read and write
|
||
53BA000
|
trusted library allocation
|
page read and write
|
||
543D000
|
trusted library allocation
|
page read and write
|
||
5458000
|
trusted library allocation
|
page read and write
|
||
544D000
|
trusted library allocation
|
page read and write
|
||
2F0E000
|
stack
|
page read and write
|
||
5853000
|
trusted library allocation
|
page read and write
|
||
5854000
|
trusted library allocation
|
page read and write
|
||
549A000
|
trusted library allocation
|
page read and write
|
||
5422000
|
trusted library allocation
|
page read and write
|
||
549A000
|
trusted library allocation
|
page read and write
|
||
5487000
|
trusted library allocation
|
page read and write
|
||
5EC2000
|
trusted library allocation
|
page read and write
|
||
5447000
|
trusted library allocation
|
page read and write
|
||
5468000
|
trusted library allocation
|
page read and write
|
||
750F000
|
stack
|
page read and write
|
||
7D0000
|
heap
|
page read and write
|
||
5861000
|
trusted library allocation
|
page read and write
|
||
54B8000
|
trusted library allocation
|
page read and write
|
||
549A000
|
trusted library allocation
|
page read and write
|
||
7CB0000
|
direct allocation
|
page read and write
|
||
5457000
|
trusted library allocation
|
page read and write
|
||
4A50000
|
direct allocation
|
page execute and read and write
|
||
7F98000
|
trusted library allocation
|
page read and write
|
||
650E000
|
stack
|
page read and write
|
||
48C0000
|
direct allocation
|
page read and write
|
||
549A000
|
trusted library allocation
|
page read and write
|
||
58F2000
|
trusted library allocation
|
page read and write
|
||
53BA000
|
trusted library allocation
|
page read and write
|
||
364F000
|
stack
|
page read and write
|
||
7DE000
|
heap
|
page read and write
|
||
5985000
|
trusted library allocation
|
page read and write
|
||
53FF000
|
trusted library allocation
|
page read and write
|
||
5442000
|
trusted library allocation
|
page read and write
|
||
71A000
|
heap
|
page read and write
|
||
5426000
|
trusted library allocation
|
page read and write
|
||
549A000
|
trusted library allocation
|
page read and write
|
||
5439000
|
trusted library allocation
|
page read and write
|
||
7CE0000
|
trusted library allocation
|
page read and write
|
||
549A000
|
trusted library allocation
|
page read and write
|
||
53B6000
|
trusted library allocation
|
page read and write
|
||
585C000
|
trusted library allocation
|
page read and write
|
||
64CF000
|
stack
|
page read and write
|
||
53EB000
|
trusted library allocation
|
page read and write
|
||
53E7000
|
trusted library allocation
|
page read and write
|
||
54B1000
|
trusted library allocation
|
page read and write
|
||
5907000
|
trusted library allocation
|
page read and write
|
||
58F9000
|
trusted library allocation
|
page read and write
|
||
5426000
|
trusted library allocation
|
page read and write
|
||
836E000
|
stack
|
page read and write
|
||
5A4C000
|
trusted library allocation
|
page read and write
|
||
6ECF000
|
stack
|
page read and write
|
||
5436000
|
trusted library allocation
|
page read and write
|
||
5923000
|
trusted library allocation
|
page read and write
|
||
5927000
|
trusted library allocation
|
page read and write
|
||
4A50000
|
direct allocation
|
page execute and read and write
|
||
549A000
|
trusted library allocation
|
page read and write
|
||
549A000
|
trusted library allocation
|
page read and write
|
||
5428000
|
trusted library allocation
|
page read and write
|
||
549A000
|
trusted library allocation
|
page read and write
|
||
549A000
|
trusted library allocation
|
page read and write
|
||
5458000
|
trusted library allocation
|
page read and write
|
||
5455000
|
trusted library allocation
|
page read and write
|
||
56DA000
|
trusted library allocation
|
page read and write
|
||
585F000
|
trusted library allocation
|
page read and write
|
||
5428000
|
trusted library allocation
|
page read and write
|
||
543A000
|
trusted library allocation
|
page read and write
|
||
5ABC000
|
trusted library allocation
|
page read and write
|
||
42CF000
|
stack
|
page read and write
|
||
543C000
|
trusted library allocation
|
page read and write
|
||
5922000
|
trusted library allocation
|
page read and write
|
||
549A000
|
trusted library allocation
|
page read and write
|
||
549A000
|
trusted library allocation
|
page read and write
|
||
53B9000
|
trusted library allocation
|
page read and write
|
||
5496000
|
trusted library allocation
|
page read and write
|
||
598B000
|
trusted library allocation
|
page read and write
|
||
5447000
|
trusted library allocation
|
page read and write
|
||
4DCF000
|
stack
|
page read and write
|
||
7F4000
|
heap
|
page read and write
|
||
53DD000
|
trusted library allocation
|
page read and write
|
||
5652000
|
trusted library allocation
|
page read and write
|
||
5446000
|
trusted library allocation
|
page read and write
|
||
6078000
|
trusted library allocation
|
page execute and read and write
|
||
2B4E000
|
stack
|
page read and write
|
||
5859000
|
trusted library allocation
|
page read and write
|
||
5920000
|
trusted library allocation
|
page read and write
|
||
53CB000
|
trusted library allocation
|
page read and write
|
||
3DCF000
|
stack
|
page read and write
|
||
544D000
|
trusted library allocation
|
page read and write
|
||
314F000
|
stack
|
page read and write
|
||
549A000
|
trusted library allocation
|
page read and write
|
||
905000
|
unkown
|
page execute and read and write
|
||
7E7000
|
heap
|
page read and write
|
||
4A9D000
|
trusted library allocation
|
page read and write
|
||
3F4E000
|
stack
|
page read and write
|
||
53BF000
|
trusted library allocation
|
page read and write
|
||
549A000
|
trusted library allocation
|
page read and write
|
||
53D4000
|
trusted library allocation
|
page read and write
|
||
544B000
|
trusted library allocation
|
page read and write
|
||
5961000
|
trusted library allocation
|
page read and write
|
||
5447000
|
trusted library allocation
|
page read and write
|
||
5970000
|
trusted library allocation
|
page read and write
|
||
4A50000
|
direct allocation
|
page execute and read and write
|
||
5468000
|
trusted library allocation
|
page read and write
|
||
5468000
|
trusted library allocation
|
page read and write
|
||
5462000
|
trusted library allocation
|
page read and write
|
||
5921000
|
trusted library allocation
|
page read and write
|
||
718E000
|
stack
|
page read and write
|
||
4431000
|
heap
|
page read and write
|
||
549A000
|
trusted library allocation
|
page read and write
|
||
E6F000
|
stack
|
page read and write
|
||
59A1000
|
trusted library allocation
|
page read and write
|
||
7A4E000
|
stack
|
page read and write
|
||
618F000
|
stack
|
page read and write
|
||
4A80000
|
direct allocation
|
page execute and read and write
|
||
7F8000
|
heap
|
page read and write
|
||
5B19000
|
trusted library allocation
|
page read and write
|
||
5428000
|
trusted library allocation
|
page read and write
|
||
5858000
|
trusted library allocation
|
page read and write
|
||
56DC000
|
trusted library allocation
|
page read and write
|
||
7EA000
|
heap
|
page read and write
|
||
7E5000
|
heap
|
page read and write
|
||
5442000
|
trusted library allocation
|
page read and write
|
||
7C90000
|
direct allocation
|
page read and write
|
||
53BA000
|
trusted library allocation
|
page read and write
|
||
542D000
|
trusted library allocation
|
page read and write
|
||
69CF000
|
stack
|
page read and write
|
||
5AAF000
|
trusted library allocation
|
page read and write
|
||
8A0000
|
heap
|
page read and write
|
||
5980000
|
trusted library allocation
|
page read and write
|
||
5473000
|
trusted library allocation
|
page read and write
|
||
5851000
|
trusted library allocation
|
page read and write
|
||
77CE000
|
stack
|
page read and write
|
||
5477000
|
trusted library allocation
|
page read and write
|
||
8A7000
|
heap
|
page read and write
|
||
549A000
|
trusted library allocation
|
page read and write
|
||
5438000
|
trusted library allocation
|
page read and write
|
||
542D000
|
trusted library allocation
|
page read and write
|
||
549A000
|
trusted library allocation
|
page read and write
|
||
53CF000
|
trusted library allocation
|
page read and write
|
||
2A0F000
|
stack
|
page read and write
|
||
595F000
|
trusted library allocation
|
page read and write
|
||
54B3000
|
trusted library allocation
|
page read and write
|
||
5448000
|
trusted library allocation
|
page read and write
|
||
751000
|
heap
|
page read and write
|
||
59A3000
|
trusted library allocation
|
page read and write
|
||
547B000
|
trusted library allocation
|
page read and write
|
||
7CB0000
|
direct allocation
|
page read and write
|
||
72CE000
|
stack
|
page read and write
|
||
8B0000
|
direct allocation
|
page read and write
|
||
7F4000
|
heap
|
page read and write
|
||
543B000
|
trusted library allocation
|
page read and write
|
||
54B3000
|
trusted library allocation
|
page read and write
|
||
5442000
|
trusted library allocation
|
page read and write
|
||
54B6000
|
trusted library allocation
|
page read and write
|
||
5853000
|
trusted library allocation
|
page read and write
|
||
6F0E000
|
stack
|
page read and write
|
||
5426000
|
trusted library allocation
|
page read and write
|
||
8B0000
|
direct allocation
|
page read and write
|
||
5950000
|
trusted library allocation
|
page read and write
|
||
5403000
|
trusted library allocation
|
page read and write
|
||
5480000
|
trusted library allocation
|
page read and write
|
||
585A000
|
trusted library allocation
|
page read and write
|
||
5975000
|
trusted library allocation
|
page read and write
|
||
5CA7000
|
trusted library allocation
|
page read and write
|
||
5428000
|
trusted library allocation
|
page read and write
|
||
4431000
|
heap
|
page read and write
|
||
5919000
|
trusted library allocation
|
page read and write
|
||
5442000
|
trusted library allocation
|
page read and write
|
||
5853000
|
trusted library allocation
|
page read and write
|
||
5853000
|
trusted library allocation
|
page read and write
|
||
73CF000
|
stack
|
page read and write
|
||
585D000
|
trusted library allocation
|
page read and write
|
||
4431000
|
heap
|
page read and write
|
||
7CB0000
|
direct allocation
|
page read and write
|
||
549A000
|
trusted library allocation
|
page read and write
|
||
5468000
|
trusted library allocation
|
page read and write
|
||
543A000
|
trusted library allocation
|
page read and write
|
||
7EF000
|
heap
|
page read and write
|
||
5487000
|
trusted library allocation
|
page read and write
|
||
543D000
|
trusted library allocation
|
page read and write
|
||
541C000
|
trusted library allocation
|
page read and write
|
||
5472000
|
trusted library allocation
|
page read and write
|
||
664E000
|
stack
|
page read and write
|
||
5468000
|
trusted library allocation
|
page read and write
|
||
547D000
|
trusted library allocation
|
page read and write
|
||
368E000
|
stack
|
page read and write
|
||
5939000
|
trusted library allocation
|
page read and write
|
||
7CB0000
|
direct allocation
|
page read and write
|
||
549A000
|
trusted library allocation
|
page read and write
|
||
5461000
|
trusted library allocation
|
page read and write
|
||
5444000
|
trusted library allocation
|
page read and write
|
||
5496000
|
trusted library allocation
|
page read and write
|
||
544F000
|
trusted library allocation
|
page read and write
|
||
5426000
|
trusted library allocation
|
page read and write
|
||
5457000
|
trusted library allocation
|
page read and write
|
||
4431000
|
heap
|
page read and write
|
||
5468000
|
trusted library allocation
|
page read and write
|
||
53B3000
|
trusted library allocation
|
page read and write
|
||
5B0E000
|
stack
|
page read and write
|
||
53B3000
|
trusted library allocation
|
page read and write
|
||
596E000
|
trusted library allocation
|
page read and write
|
||
8B0000
|
direct allocation
|
page read and write
|
||
5467000
|
trusted library allocation
|
page read and write
|
||
5468000
|
trusted library allocation
|
page read and write
|
||
8B0000
|
direct allocation
|
page read and write
|
||
5ACE000
|
stack
|
page read and write
|
||
4904000
|
direct allocation
|
page read and write
|
||
4431000
|
heap
|
page read and write
|
||
58F7000
|
trusted library allocation
|
page read and write
|
||
5461000
|
trusted library allocation
|
page read and write
|
||
5468000
|
trusted library allocation
|
page read and write
|
||
8B0000
|
direct allocation
|
page read and write
|
||
5468000
|
trusted library allocation
|
page read and write
|
||
542D000
|
trusted library allocation
|
page read and write
|
||
5A6E000
|
trusted library allocation
|
page read and write
|
||
5433000
|
trusted library allocation
|
page read and write
|
||
3A0F000
|
stack
|
page read and write
|
||
5447000
|
trusted library allocation
|
page read and write
|
||
5426000
|
trusted library allocation
|
page read and write
|
||
7DE000
|
heap
|
page read and write
|
||
5438000
|
trusted library allocation
|
page read and write
|
||
549A000
|
trusted library allocation
|
page read and write
|
||
543C000
|
trusted library allocation
|
page read and write
|
||
97B0000
|
trusted library allocation
|
page read and write
|
||
5859000
|
trusted library allocation
|
page read and write
|
||
542A000
|
trusted library allocation
|
page read and write
|
||
6A0E000
|
stack
|
page read and write
|
||
53D7000
|
trusted library allocation
|
page read and write
|
||
68CE000
|
stack
|
page read and write
|
||
5454000
|
trusted library allocation
|
page read and write
|
||
4431000
|
heap
|
page read and write
|
||
543A000
|
trusted library allocation
|
page read and write
|
||
7C8F000
|
stack
|
page read and write
|
||
53B4000
|
trusted library allocation
|
page read and write
|
||
5442000
|
trusted library allocation
|
page read and write
|
||
5447000
|
trusted library allocation
|
page read and write
|
||
5431000
|
trusted library allocation
|
page read and write
|
||
5973000
|
trusted library allocation
|
page read and write
|
||
5A91000
|
trusted library allocation
|
page read and write
|
||
688F000
|
stack
|
page read and write
|
||
4CCE000
|
stack
|
page read and write
|
||
585B000
|
trusted library allocation
|
page read and write
|
||
549A000
|
trusted library allocation
|
page read and write
|
||
7CB0000
|
trusted library allocation
|
page read and write
|
||
54B3000
|
trusted library allocation
|
page read and write
|
||
4431000
|
heap
|
page read and write
|
||
544F000
|
trusted library allocation
|
page read and write
|
||
53E1000
|
trusted library allocation
|
page read and write
|
||
543C000
|
trusted library allocation
|
page read and write
|
||
4431000
|
heap
|
page read and write
|
||
5496000
|
trusted library allocation
|
page read and write
|
||
764F000
|
stack
|
page read and write
|
||
543D000
|
trusted library allocation
|
page read and write
|
||
2ECF000
|
stack
|
page read and write
|
||
5468000
|
trusted library allocation
|
page read and write
|
||
5457000
|
trusted library allocation
|
page read and write
|
||
562D000
|
trusted library allocation
|
page read and write
|
||
7CA000
|
heap
|
page read and write
|
||
4431000
|
heap
|
page read and write
|
||
5454000
|
trusted library allocation
|
page read and write
|
||
544A000
|
trusted library allocation
|
page read and write
|
||
53F6000
|
trusted library allocation
|
page read and write
|
||
5850000
|
trusted library allocation
|
page read and write
|
||
5B17000
|
trusted library allocation
|
page read and write
|
||
53B3000
|
trusted library allocation
|
page read and write
|
||
4431000
|
heap
|
page read and write
|
||
378F000
|
stack
|
page read and write
|
||
585B000
|
trusted library allocation
|
page read and write
|
||
5431000
|
trusted library allocation
|
page read and write
|
||
354E000
|
stack
|
page read and write
|
||
408E000
|
stack
|
page read and write
|
||
6C4F000
|
stack
|
page read and write
|
||
7D10000
|
direct allocation
|
page read and write
|
||
549A000
|
trusted library allocation
|
page read and write
|
||
7CB0000
|
direct allocation
|
page read and write
|
||
7CB0000
|
direct allocation
|
page read and write
|
||
591F000
|
trusted library allocation
|
page read and write
|
||
542C000
|
trusted library allocation
|
page read and write
|
||
5856000
|
trusted library allocation
|
page read and write
|
||
5447000
|
trusted library allocation
|
page read and write
|
||
53DA000
|
trusted library allocation
|
page read and write
|
||
8B0000
|
direct allocation
|
page read and write
|
||
5436000
|
trusted library allocation
|
page read and write
|
||
547B000
|
trusted library allocation
|
page read and write
|
||
7E9000
|
heap
|
page read and write
|
||
5940000
|
trusted library allocation
|
page read and write
|
||
7F2000
|
heap
|
page read and write
|
||
5414000
|
trusted library allocation
|
page read and write
|
||
5457000
|
trusted library allocation
|
page read and write
|
||
585A000
|
trusted library allocation
|
page read and write
|
||
565F000
|
trusted library allocation
|
page read and write
|
||
544D000
|
trusted library allocation
|
page read and write
|
||
543D000
|
trusted library allocation
|
page read and write
|
||
7E7000
|
heap
|
page read and write
|
||
16B000
|
stack
|
page read and write
|
||
5431000
|
trusted library allocation
|
page read and write
|
||
53BF000
|
trusted library allocation
|
page read and write
|
||
5487000
|
trusted library allocation
|
page read and write
|
||
4A5D000
|
stack
|
page read and write
|
||
5850000
|
trusted library allocation
|
page read and write
|
||
547F000
|
trusted library allocation
|
page read and write
|
||
547F000
|
trusted library allocation
|
page read and write
|
||
59C2000
|
trusted library allocation
|
page read and write
|
||
7F2000
|
heap
|
page read and write
|
||
517E000
|
stack
|
page read and write
|
||
300F000
|
stack
|
page read and write
|
||
53CB000
|
trusted library allocation
|
page read and write
|
||
7D5000
|
heap
|
page read and write
|
||
5857000
|
trusted library allocation
|
page read and write
|
||
549A000
|
trusted library allocation
|
page read and write
|
||
5448000
|
trusted library allocation
|
page read and write
|
||
595F000
|
trusted library allocation
|
page read and write
|
||
710000
|
heap
|
page read and write
|
||
5854000
|
trusted library allocation
|
page read and write
|
||
549A000
|
trusted library allocation
|
page read and write
|
||
559D000
|
trusted library allocation
|
page read and write
|
||
547D000
|
trusted library allocation
|
page read and write
|
There are 988 hidden memdumps, click here to show them.
DOM / HTML
URL
|
Malicious
|
|
---|---|---|
https://learn.microsoft.com/en-us/dotnet/framework/install/application-not-started?version=(null)&processName=file.exe&platform=0009&osver=6&isServer=0&shimver=4.0.30319.0
|
||
https://learn.microsoft.com/en-us/dotnet/framework/install/application-not-started?version=(null)&processName=file.exe&platform=0009&osver=6&isServer=0&shimver=4.0.30319.0
|
||
https://learn.microsoft.com/en-us/dotnet/framework/install/application-not-started?version=(null)&processName=file.exe&platform=0009&osver=6&isServer=0&shimver=4.0.30319.0
|
||
https://learn.microsoft.com/en-us/dotnet/framework/install/application-not-started?version=(null)&processName=file.exe&platform=0009&osver=6&isServer=0&shimver=4.0.30319.0
|
||
https://learn.microsoft.com/en-us/dotnet/framework/install/application-not-started?version=(null)&processName=file.exe&platform=0009&osver=6&isServer=0&shimver=4.0.30319.0
|
||
https://learn.microsoft.com/en-us/dotnet/framework/install/application-not-started?version=(null)&processName=file.exe&platform=0009&osver=6&isServer=0&shimver=4.0.30319.0
|