Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
file.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
initial sample
|
||
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Docs.lnk
|
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command
line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Sun Nov 24 01:04:42 2024, atime=Wed Sep 27 04:28:28
2023, length=1210144, window=hide
|
dropped
|
||
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Gmail.lnk
|
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command
line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Sun Nov 24 01:04:42 2024, atime=Wed Sep 27 04:28:28
2023, length=1210144, window=hide
|
dropped
|
||
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Google Drive.lnk
|
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command
line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Wed Oct 4 12:54:07 2023, atime=Wed Sep 27 04:28:28
2023, length=1210144, window=hide
|
dropped
|
||
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Sheets.lnk
|
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command
line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Sun Nov 24 01:04:42 2024, atime=Wed Sep 27 04:28:28
2023, length=1210144, window=hide
|
dropped
|
||
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Slides.lnk
|
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command
line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Sun Nov 24 01:04:42 2024, atime=Wed Sep 27 04:28:28
2023, length=1210144, window=hide
|
dropped
|
||
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\YouTube.lnk
|
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command
line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Sun Nov 24 01:04:42 2024, atime=Wed Sep 27 04:28:28
2023, length=1210144, window=hide
|
dropped
|
||
Chrome Cache Entry: 100
|
ASCII text, with very long lines (65410)
|
downloaded
|
||
Chrome Cache Entry: 101
|
gzip compressed data, from TOPS/20, original size modulo 2^32 25441
|
downloaded
|
||
Chrome Cache Entry: 102
|
PNG image data, 533 x 478, 8-bit/color RGBA, non-interlaced
|
downloaded
|
||
Chrome Cache Entry: 103
|
ASCII text, with very long lines (52717), with no line terminators
|
dropped
|
||
Chrome Cache Entry: 104
|
ASCII text
|
downloaded
|
||
Chrome Cache Entry: 105
|
ASCII text, with very long lines (52717), with no line terminators
|
downloaded
|
||
Chrome Cache Entry: 106
|
gzip compressed data, from FAT filesystem (MS-DOS, OS/2, NT), original size modulo 2^32 1173007
|
downloaded
|
||
Chrome Cache Entry: 107
|
PNG image data, 533 x 478, 8-bit/color RGBA, non-interlaced
|
downloaded
|
||
Chrome Cache Entry: 108
|
JSON data
|
dropped
|
||
Chrome Cache Entry: 109
|
MS Windows icon resource - 6 icons, -128x-128, 16 colors, 72x72, 16 colors
|
downloaded
|
||
Chrome Cache Entry: 110
|
ASCII text, with very long lines (46884)
|
downloaded
|
||
Chrome Cache Entry: 111
|
gzip compressed data, from TOPS/20, original size modulo 2^32 5644
|
dropped
|
||
Chrome Cache Entry: 112
|
MS Windows icon resource - 6 icons, -128x-128, 16 colors, 72x72, 16 colors
|
dropped
|
||
Chrome Cache Entry: 113
|
PNG image data, 658 x 480, 8-bit/color RGBA, non-interlaced
|
downloaded
|
||
Chrome Cache Entry: 114
|
gzip compressed data, from TOPS/20, original size modulo 2^32 33148
|
dropped
|
||
Chrome Cache Entry: 115
|
JSON data
|
downloaded
|
||
Chrome Cache Entry: 116
|
JPEG image data, JFIF standard 1.01, aspect ratio, density 1x1, segment length 16, baseline, precision 8, 1528x402, components
3
|
dropped
|
||
Chrome Cache Entry: 117
|
PNG image data, 475 x 212, 8-bit/color RGBA, non-interlaced
|
downloaded
|
||
Chrome Cache Entry: 118
|
JSON data
|
downloaded
|
||
Chrome Cache Entry: 119
|
JSON data
|
dropped
|
||
Chrome Cache Entry: 120
|
JPEG image data, JFIF standard 1.01, aspect ratio, density 1x1, segment length 16, baseline, precision 8, 1528x402, components
3
|
downloaded
|
||
Chrome Cache Entry: 121
|
gzip compressed data, from FAT filesystem (MS-DOS, OS/2, NT), original size modulo 2^32 1173007
|
dropped
|
||
Chrome Cache Entry: 122
|
ASCII text, with very long lines (46884)
|
dropped
|
||
Chrome Cache Entry: 123
|
ASCII text
|
dropped
|
||
Chrome Cache Entry: 124
|
gzip compressed data, from FAT filesystem (MS-DOS, OS/2, NT), original size modulo 2^32 1154
|
downloaded
|
||
Chrome Cache Entry: 125
|
Web Open Font Format (Version 2), TrueType, length 19696, version 1.0
|
downloaded
|
||
Chrome Cache Entry: 126
|
ASCII text, with very long lines (33148), with no line terminators
|
downloaded
|
||
Chrome Cache Entry: 127
|
PNG image data, 475 x 212, 8-bit/color RGBA, non-interlaced
|
dropped
|
||
Chrome Cache Entry: 128
|
PNG image data, 658 x 480, 8-bit/color RGBA, non-interlaced
|
dropped
|
||
Chrome Cache Entry: 129
|
JSON data
|
dropped
|
||
Chrome Cache Entry: 130
|
HTML document, ASCII text, with very long lines (639), with CRLF, LF line terminators
|
downloaded
|
||
Chrome Cache Entry: 131
|
JSON data
|
downloaded
|
||
Chrome Cache Entry: 132
|
PNG image data, 533 x 478, 8-bit/color RGBA, non-interlaced
|
dropped
|
||
Chrome Cache Entry: 91
|
PNG image data, 533 x 478, 8-bit/color RGBA, non-interlaced
|
dropped
|
||
Chrome Cache Entry: 92
|
PNG image data, 533 x 478, 8-bit/color RGBA, non-interlaced
|
downloaded
|
||
Chrome Cache Entry: 93
|
gzip compressed data, from FAT filesystem (MS-DOS, OS/2, NT), original size modulo 2^32 1154
|
dropped
|
||
Chrome Cache Entry: 94
|
gzip compressed data, from TOPS/20, original size modulo 2^32 3130
|
dropped
|
||
Chrome Cache Entry: 95
|
PNG image data, 533 x 478, 8-bit/color RGBA, non-interlaced
|
dropped
|
||
Chrome Cache Entry: 96
|
ASCII text, with very long lines (65536), with no line terminators
|
downloaded
|
||
Chrome Cache Entry: 97
|
ASCII text, with no line terminators
|
downloaded
|
||
Chrome Cache Entry: 98
|
ASCII text, with very long lines (65410)
|
dropped
|
||
Chrome Cache Entry: 99
|
gzip compressed data, from TOPS/20, original size modulo 2^32 25441
|
dropped
|
There are 39 hidden files, click here to show them.
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\file.exe
|
"C:\Users\user\Desktop\file.exe"
|
||
C:\Program Files\Google\Chrome\Application\chrome.exe
|
"C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized --single-argument http://go.microsoft.com/fwlink/?prd=11324&pver=4.5&sbp=AppLaunch2&plcid=0x409&o1=SHIM_NOVERSION_FOUND&version=(null)&processName=file.exe&platform=0009&osver=6&isServer=0&shimver=4.0.30319.0
|
||
C:\Program Files\Google\Chrome\Application\chrome.exe
|
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US
--service-sandbox-type=none --mojo-platform-channel-handle=2064 --field-trial-handle=1712,i,16499392452807308267,17586683353551675273,262144
--disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction
/prefetch:8
|
||
C:\Program Files\Google\Chrome\Application\chrome.exe
|
"C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized --single-argument http://go.microsoft.com/fwlink/?prd=11324&pver=4.5&sbp=AppLaunch2&plcid=0x409&o1=SHIM_NOVERSION_FOUND&version=(null)&processName=file.exe&platform=0009&osver=6&isServer=0&shimver=4.0.30319.0
|
||
C:\Program Files\Google\Chrome\Application\chrome.exe
|
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US
--service-sandbox-type=none --mojo-platform-channel-handle=2052 --field-trial-handle=2012,i,16342311137299287003,18054011809701615545,262144
--disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction
/prefetch:8
|
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
https://authoring-docs-microsoft.poolparty.biz/devrel/7696cda6-0510-47f6-8302-71bb5d2e28cf
|
unknown
|
||
https://duckduckgo.com/chrome_newtab
|
unknown
|
||
https://duckduckgo.com/ac/?q=
|
unknown
|
||
https://property-imper.sbs/api
|
104.21.33.116
|
||
https://imp.mt48.net/static?id=7RHzfOIXjFEYsBdvIpkX4Qqm4p8dfCfm4pbW1pbWfpbW7ReNxR3UIG8zInwYIFIVs9eYi
|
unknown
|
||
https://github.com/dotnet/docs/blob/17c4acca45e573a92878a44a2cce57d699fe9c7c/docs/framework/install/
|
unknown
|
||
https://bridge.sfo1.admarketplace.net/ctp?version=16.0.0&key=1696425136400800000.2&ci=1696425136743.
|
unknown
|
||
https://www.linkedin.com/cws/share?url=$
|
unknown
|
||
https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
|
unknown
|
||
https://github.com/Youssef1313
|
unknown
|
||
https://management.azure.com/providers/Microsoft.Portal/userSettings/cloudconsole?api-version=2023-0
|
unknown
|
||
https://aka.ms/msignite_docs_banner
|
unknown
|
||
https://videoencodingpublic-hgeaeyeba8gycee3.b01.azurefd.net/public-b4da8140-92cf-421c-8b7b-e471d5b9
|
unknown
|
||
http://polymer.github.io/AUTHORS.txt
|
unknown
|
||
https://github.com/dotnet/docs/issues/new?template=z-customer-feedback.yml
|
unknown
|
||
https://management.azure.com/subscriptions?api-version=2016-06-01
|
unknown
|
||
https://github.com/dotnet/docs/blob/main/docs/framework/install/application-not-started.md
|
unknown
|
||
http://x1.c.lencr.org/0
|
unknown
|
||
http://x1.i.lencr.org/0
|
unknown
|
||
https://aka.ms/pshelpmechoose
|
unknown
|
||
https://aka.ms/feedback/report?space=61
|
unknown
|
||
https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
|
unknown
|
||
https://learn-video.azurefd.net/vod/player
|
unknown
|
||
https://twitter.com/intent/tweet?original_referer=$
|
unknown
|
||
https://github.com/gewarren
|
unknown
|
||
http://185.215.113.16/off/def.exepleWebKit/537.36
|
unknown
|
||
https://support.mozilla.org/products/firefoxgro.all
|
unknown
|
||
http://polymer.github.io/CONTRIBUTORS.txt
|
unknown
|
||
https://property-imper.sbs/api9-
|
unknown
|
||
https://github.com/dotnet/docs/blob/live/docs/framework/install/application-not-started.md
|
unknown
|
||
https://property-imper.sbs:443/apiicrosoft
|
unknown
|
||
https://authoring-docs-microsoft.poolparty.biz/devrel/69c76c32-967e-4c65-b89a-74cc527db725
|
unknown
|
||
https://client-api.arkoselabs.com/v2/api.js
|
unknown
|
||
https://aka.ms/MSIgniteChallenge/Tier1Banner?wt.mc_id=ignite24_learnbanner_tier1_cnl
|
unknown
|
||
https://management.azure.com/providers/Microsoft.Portal/consoles/default?api-version=2017-12-01-prev
|
unknown
|
||
https://www.google.com/images/branding/product/ico/googleg_lodp.ico
|
unknown
|
||
https://github.com/Thraka
|
unknown
|
||
http://polymer.github.io/PATENTS.txt
|
unknown
|
||
https://aka.ms/certhelp
|
unknown
|
||
http://185.215.113.16/steam/random.exe
|
unknown
|
||
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
|
unknown
|
||
http://crl.rootca1.amazontrust.com/rootca1.crl0
|
unknown
|
||
https://github.com/mairaw
|
unknown
|
||
https://js.monitor.azure.com/scripts/c/ms.jsll-4.min.js
|
13.107.246.63
|
||
http://ocsp.rootca1.amazontrust.com0:
|
unknown
|
||
https://schema.org
|
unknown
|
||
http://polymer.github.io/LICENSE.txt
|
unknown
|
||
https://www.ecosia.org/newtab/
|
unknown
|
||
https://bridge.sfo1.ap01.net/ctp?version=16.0.0&key=1696425136400800000.1&ci=1696425136743.12791&cta
|
unknown
|
||
https://property-imper.sbs/
|
unknown
|
||
https://support.mozilla.org/kb/customize-firefox-controls-buttons-and-toolbars?utm_source=firefox-br
|
unknown
|
||
https://aka.ms/yourcaliforniaprivacychoices
|
unknown
|
||
https://ac.ecosia.org/autocomplete?q=
|
unknown
|
||
https://github.com/nschonni
|
unknown
|
||
https://videoencodingpublic-hgeaeyeba8gycee3.b01.azurefd.net/public-09ce73a6-05a5-4e4d-b3d7-bd5a8c05
|
unknown
|
||
https://contile-images.services.mozilla.com/u1AuJcj32cbVUf9NjMipLXEYwu2uFIt4lsj-ccwVqEs.36904.jpg
|
unknown
|
||
https://github.com/adegeo
|
unknown
|
||
https://contile-images.services.mozilla.com/obgoOYObjIFea_bXuT6L4LbBJ8j425AD87S1HMD3BWg.9991.jpg
|
unknown
|
||
https://github.com/jonschlinkert/is-plain-object
|
unknown
|
||
http://crt.rootca1.amazontrust.com/rootca1.cer0?
|
unknown
|
||
https://octokit.github.io/rest.js/#throttling
|
unknown
|
||
https://www.bestbuy.com/site/electronics/top-deals/pcmcat1563299784494.c/?id=pcmcat1563299784494&ref
|
unknown
|
||
https://github.com/js-cookie/js-cookie
|
unknown
|
||
https://www.amazon.com/?tag=admarketus-20&ref=pd_sl_35787f1071928bc3a1aef90b79c9bee9c64ba6683fde7477
|
unknown
|
||
http://185.215.113.16/off/def.exe
|
unknown
|
||
http://schema.org/Organization
|
unknown
|
||
https://channel9.msdn.com/
|
unknown
|
||
https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
|
unknown
|
||
https://github.com/dotnet/try
|
unknown
|
There are 59 hidden URLs, click here to show them.
Domains
Name
|
IP
|
Malicious
|
|
---|---|---|---|
property-imper.sbs
|
104.21.33.116
|
||
www.google.com
|
172.217.21.36
|
||
s-part-0035.t-0009.t-msedge.net
|
13.107.246.63
|
||
js.monitor.azure.com
|
unknown
|
||
mdec.nelreports.net
|
unknown
|
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
192.168.2.5
|
unknown
|
unknown
|
||
13.107.246.63
|
s-part-0035.t-0009.t-msedge.net
|
United States
|
||
185.215.113.16
|
unknown
|
Portugal
|
||
239.255.255.250
|
unknown
|
Reserved
|
||
104.21.33.116
|
property-imper.sbs
|
United States
|
||
172.217.21.36
|
www.google.com
|
United States
|
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
13C4000
|
heap
|
page read and write
|
||
5C7B000
|
trusted library allocation
|
page read and write
|
||
1311000
|
heap
|
page read and write
|
||
5CC6000
|
trusted library allocation
|
page read and write
|
||
457E000
|
stack
|
page read and write
|
||
5C45000
|
trusted library allocation
|
page read and write
|
||
6191000
|
trusted library allocation
|
page read and write
|
||
61DB000
|
trusted library allocation
|
page read and write
|
||
61AF000
|
trusted library allocation
|
page read and write
|
||
52E0000
|
direct allocation
|
page execute and read and write
|
||
5CFC000
|
trusted library allocation
|
page read and write
|
||
3CBE000
|
stack
|
page read and write
|
||
532B000
|
trusted library allocation
|
page read and write
|
||
132C000
|
heap
|
page read and write
|
||
625B000
|
trusted library allocation
|
page read and write
|
||
13C4000
|
heap
|
page read and write
|
||
5D59000
|
trusted library allocation
|
page read and write
|
||
5E57000
|
trusted library allocation
|
page read and write
|
||
60EC000
|
trusted library allocation
|
page read and write
|
||
739000
|
unkown
|
page execute and read and write
|
||
4CC1000
|
heap
|
page read and write
|
||
5D49000
|
trusted library allocation
|
page read and write
|
||
5CF5000
|
trusted library allocation
|
page read and write
|
||
5CEB000
|
trusted library allocation
|
page read and write
|
||
130F000
|
heap
|
page read and write
|
||
5D62000
|
trusted library allocation
|
page read and write
|
||
5CD3000
|
trusted library allocation
|
page read and write
|
||
5E47000
|
trusted library allocation
|
page read and write
|
||
61F7000
|
trusted library allocation
|
page read and write
|
||
5CDA000
|
trusted library allocation
|
page read and write
|
||
5D05000
|
trusted library allocation
|
page read and write
|
||
5CDA000
|
trusted library allocation
|
page read and write
|
||
633F000
|
trusted library allocation
|
page read and write
|
||
2EE0000
|
direct allocation
|
page read and write
|
||
61BA000
|
trusted library allocation
|
page read and write
|
||
131C000
|
heap
|
page read and write
|
||
60E6000
|
trusted library allocation
|
page read and write
|
||
5D15000
|
trusted library allocation
|
page read and write
|
||
5CE4000
|
trusted library allocation
|
page read and write
|
||
5CC6000
|
trusted library allocation
|
page read and write
|
||
5CC8000
|
trusted library allocation
|
page read and write
|
||
621D000
|
trusted library allocation
|
page read and write
|
||
61DC000
|
trusted library allocation
|
page read and write
|
||
5D0B000
|
trusted library allocation
|
page read and write
|
||
5CBB000
|
trusted library allocation
|
page read and write
|
||
2EE0000
|
direct allocation
|
page read and write
|
||
5F79000
|
stack
|
page read and write
|
||
5D05000
|
trusted library allocation
|
page read and write
|
||
61A6000
|
trusted library allocation
|
page read and write
|
||
5CCA000
|
trusted library allocation
|
page read and write
|
||
60E4000
|
trusted library allocation
|
page read and write
|
||
2EE0000
|
direct allocation
|
page read and write
|
||
5CB2000
|
trusted library allocation
|
page read and write
|
||
5CC6000
|
trusted library allocation
|
page read and write
|
||
5CAC000
|
trusted library allocation
|
page read and write
|
||
1230000
|
heap
|
page read and write
|
||
1311000
|
heap
|
page read and write
|
||
1328000
|
heap
|
page read and write
|
||
57E0000
|
remote allocation
|
page read and write
|
||
1311000
|
heap
|
page read and write
|
||
37BE000
|
stack
|
page read and write
|
||
61F1000
|
trusted library allocation
|
page read and write
|
||
5CD4000
|
trusted library allocation
|
page read and write
|
||
131E000
|
heap
|
page read and write
|
||
417F000
|
stack
|
page read and write
|
||
5E3C000
|
trusted library allocation
|
page read and write
|
||
5A5000
|
unkown
|
page execute and read and write
|
||
6229000
|
trusted library allocation
|
page read and write
|
||
5C49000
|
trusted library allocation
|
page read and write
|
||
5D15000
|
trusted library allocation
|
page read and write
|
||
5CF5000
|
trusted library allocation
|
page read and write
|
||
545D000
|
stack
|
page read and write
|
||
60E7000
|
trusted library allocation
|
page read and write
|
||
47BF000
|
stack
|
page read and write
|
||
1327000
|
heap
|
page read and write
|
||
601E000
|
trusted library allocation
|
page read and write
|
||
4CC1000
|
heap
|
page read and write
|
||
5D48000
|
trusted library allocation
|
page read and write
|
||
61BC000
|
trusted library allocation
|
page read and write
|
||
13C4000
|
heap
|
page read and write
|
||
4CD0000
|
heap
|
page read and write
|
||
5CDD000
|
trusted library allocation
|
page read and write
|
||
6223000
|
trusted library allocation
|
page read and write
|
||
60E7000
|
trusted library allocation
|
page read and write
|
||
85A000
|
unkown
|
page execute and write copy
|
||
5D60000
|
trusted library allocation
|
page read and write
|
||
594F000
|
stack
|
page read and write
|
||
1318000
|
heap
|
page read and write
|
||
131C000
|
heap
|
page read and write
|
||
4CC1000
|
heap
|
page read and write
|
||
6259000
|
trusted library allocation
|
page read and write
|
||
61F3000
|
trusted library allocation
|
page read and write
|
||
9F1000
|
unkown
|
page execute and read and write
|
||
60E4000
|
trusted library allocation
|
page read and write
|
||
5CCD000
|
trusted library allocation
|
page read and write
|
||
5CD4000
|
trusted library allocation
|
page read and write
|
||
3C7F000
|
stack
|
page read and write
|
||
5CF3000
|
trusted library allocation
|
page read and write
|
||
60E3000
|
trusted library allocation
|
page read and write
|
||
5D05000
|
trusted library allocation
|
page read and write
|
||
4A3F000
|
stack
|
page read and write
|
||
5CDE000
|
trusted library allocation
|
page read and write
|
||
618F000
|
trusted library allocation
|
page read and write
|
||
57E0000
|
remote allocation
|
page read and write
|
||
5E49000
|
trusted library allocation
|
page read and write
|
||
5C64000
|
trusted library allocation
|
page read and write
|
||
5CD0000
|
trusted library allocation
|
page read and write
|
||
5C51000
|
trusted library allocation
|
page read and write
|
||
5C50000
|
trusted library allocation
|
page read and write
|
||
5D62000
|
trusted library allocation
|
page read and write
|
||
317E000
|
stack
|
page read and write
|
||
5CF4000
|
trusted library allocation
|
page read and write
|
||
1340000
|
heap
|
page read and write
|
||
622B000
|
trusted library allocation
|
page read and write
|
||
3F3E000
|
stack
|
page read and write
|
||
5E2E000
|
trusted library allocation
|
page read and write
|
||
6240000
|
trusted library allocation
|
page read and write
|
||
8560000
|
direct allocation
|
page read and write
|
||
5CE6000
|
trusted library allocation
|
page read and write
|
||
61AF000
|
trusted library allocation
|
page read and write
|
||
6202000
|
trusted library allocation
|
page read and write
|
||
1327000
|
heap
|
page read and write
|
||
131B000
|
heap
|
page read and write
|
||
617A000
|
trusted library allocation
|
page read and write
|
||
5CF4000
|
trusted library allocation
|
page read and write
|
||
327F000
|
stack
|
page read and write
|
||
5D15000
|
trusted library allocation
|
page read and write
|
||
1326000
|
heap
|
page read and write
|
||
8560000
|
direct allocation
|
page read and write
|
||
5F47000
|
trusted library allocation
|
page read and write
|
||
1327000
|
heap
|
page read and write
|
||
2EE0000
|
direct allocation
|
page read and write
|
||
5CDA000
|
trusted library allocation
|
page read and write
|
||
5CC6000
|
trusted library allocation
|
page read and write
|
||
622E000
|
trusted library allocation
|
page read and write
|
||
5CF4000
|
trusted library allocation
|
page read and write
|
||
5D15000
|
trusted library allocation
|
page read and write
|
||
1327000
|
heap
|
page read and write
|
||
5C67000
|
trusted library allocation
|
page read and write
|
||
60E4000
|
trusted library allocation
|
page read and write
|
||
8560000
|
direct allocation
|
page read and write
|
||
1327000
|
heap
|
page read and write
|
||
5CF5000
|
trusted library allocation
|
page read and write
|
||
5F4B000
|
trusted library allocation
|
page read and write
|
||
61B0000
|
trusted library allocation
|
page read and write
|
||
5CEB000
|
trusted library allocation
|
page read and write
|
||
60E3000
|
trusted library allocation
|
page read and write
|
||
60E5000
|
trusted library allocation
|
page read and write
|
||
1327000
|
heap
|
page read and write
|
||
13C4000
|
heap
|
page read and write
|
||
5CC6000
|
trusted library allocation
|
page read and write
|
||
60E5000
|
trusted library allocation
|
page read and write
|
||
5CC6000
|
trusted library allocation
|
page read and write
|
||
622F000
|
trusted library allocation
|
page read and write
|
||
6205000
|
trusted library allocation
|
page read and write
|
||
57E0000
|
remote allocation
|
page read and write
|
||
8560000
|
direct allocation
|
page read and write
|
||
5CF4000
|
trusted library allocation
|
page read and write
|
||
5CAC000
|
trusted library allocation
|
page read and write
|
||
60EA000
|
trusted library allocation
|
page read and write
|
||
5D15000
|
trusted library allocation
|
page read and write
|
||
6313000
|
trusted library allocation
|
page read and write
|
||
85C0000
|
direct allocation
|
page read and write
|
||
5F9E000
|
trusted library allocation
|
page read and write
|
||
5CE9000
|
trusted library allocation
|
page read and write
|
||
1327000
|
heap
|
page read and write
|
||
5C95000
|
trusted library allocation
|
page read and write
|
||
2EE0000
|
direct allocation
|
page read and write
|
||
620E000
|
trusted library allocation
|
page read and write
|
||
6341000
|
trusted library allocation
|
page read and write
|
||
620A000
|
trusted library allocation
|
page read and write
|
||
6180000
|
trusted library allocation
|
page read and write
|
||
5D41000
|
trusted library allocation
|
page read and write
|
||
FCA000
|
stack
|
page read and write
|
||
8560000
|
direct allocation
|
page read and write
|
||
1311000
|
heap
|
page read and write
|
||
61DD000
|
trusted library allocation
|
page read and write
|
||
5CDD000
|
trusted library allocation
|
page read and write
|
||
629A000
|
trusted library allocation
|
page read and write
|
||
42BF000
|
stack
|
page read and write
|
||
4CC1000
|
heap
|
page read and write
|
||
5CF4000
|
trusted library allocation
|
page read and write
|
||
5C97000
|
trusted library allocation
|
page read and write
|
||
4CC1000
|
heap
|
page read and write
|
||
1325000
|
heap
|
page read and write
|
||
13C4000
|
heap
|
page read and write
|
||
5CB6000
|
trusted library allocation
|
page read and write
|
||
60E8000
|
trusted library allocation
|
page read and write
|
||
12AA000
|
heap
|
page read and write
|
||
52E0000
|
direct allocation
|
page execute and read and write
|
||
5CF4000
|
trusted library allocation
|
page read and write
|
||
560000
|
unkown
|
page read and write
|
||
5C60000
|
trusted library allocation
|
page read and write
|
||
5150000
|
direct allocation
|
page read and write
|
||
5DD4000
|
trusted library allocation
|
page read and write
|
||
5C64000
|
trusted library allocation
|
page read and write
|
||
60EC000
|
trusted library allocation
|
page read and write
|
||
5D05000
|
trusted library allocation
|
page read and write
|
||
2FFF000
|
stack
|
page read and write
|
||
5C81000
|
trusted library allocation
|
page read and write
|
||
5D48000
|
trusted library allocation
|
page read and write
|
||
5C7A000
|
trusted library allocation
|
page read and write
|
||
5C91000
|
trusted library allocation
|
page read and write
|
||
52F0000
|
direct allocation
|
page execute and read and write
|
||
42FE000
|
stack
|
page read and write
|
||
5F4A000
|
trusted library allocation
|
page read and write
|
||
5D79000
|
trusted library allocation
|
page read and write
|
||
60E2000
|
trusted library allocation
|
page read and write
|
||
5CFA000
|
trusted library allocation
|
page read and write
|
||
1325000
|
heap
|
page read and write
|
||
5CF8000
|
trusted library allocation
|
page read and write
|
||
5C4A000
|
trusted library allocation
|
page read and write
|
||
60E5000
|
trusted library allocation
|
page read and write
|
||
13C4000
|
heap
|
page read and write
|
||
62E1000
|
trusted library allocation
|
page read and write
|
||
5CE1000
|
trusted library allocation
|
page read and write
|
||
130F000
|
heap
|
page read and write
|
||
634F000
|
trusted library allocation
|
page read and write
|
||
1325000
|
heap
|
page read and write
|
||
2EF7000
|
heap
|
page read and write
|
||
5CE4000
|
trusted library allocation
|
page read and write
|
||
5C49000
|
trusted library allocation
|
page read and write
|
||
61F5000
|
trusted library allocation
|
page read and write
|
||
13C4000
|
heap
|
page read and write
|
||
61D0000
|
trusted library allocation
|
page read and write
|
||
5CE6000
|
trusted library allocation
|
page read and write
|
||
5D24000
|
trusted library allocation
|
page read and write
|
||
61F3000
|
trusted library allocation
|
page read and write
|
||
ECB000
|
stack
|
page read and write
|
||
6210000
|
trusted library allocation
|
page read and write
|
||
5C62000
|
trusted library allocation
|
page read and write
|
||
60E9000
|
trusted library allocation
|
page read and write
|
||
443E000
|
stack
|
page read and write
|
||
5CDF000
|
trusted library allocation
|
page read and write
|
||
5CDA000
|
trusted library allocation
|
page read and write
|
||
555D000
|
stack
|
page read and write
|
||
60EC000
|
trusted library allocation
|
page read and write
|
||
620C000
|
trusted library allocation
|
page read and write
|
||
85B000
|
unkown
|
page execute and write copy
|
||
5CE9000
|
trusted library allocation
|
page read and write
|
||
60B6000
|
trusted library allocation
|
page read and write
|
||
5D05000
|
trusted library allocation
|
page read and write
|
||
52D0000
|
direct allocation
|
page execute and read and write
|
||
622D000
|
trusted library allocation
|
page read and write
|
||
62B1000
|
trusted library allocation
|
page read and write
|
||
5C81000
|
trusted library allocation
|
page read and write
|
||
60E2000
|
trusted library allocation
|
page read and write
|
||
5D15000
|
trusted library allocation
|
page read and write
|
||
5D05000
|
trusted library allocation
|
page read and write
|
||
60E5000
|
trusted library allocation
|
page read and write
|
||
2EE0000
|
direct allocation
|
page read and write
|
||
60E7000
|
trusted library allocation
|
page read and write
|
||
41BE000
|
stack
|
page read and write
|
||
60E8000
|
trusted library allocation
|
page read and write
|
||
5B20000
|
heap
|
page read and write
|
||
1278000
|
heap
|
page read and write
|
||
81C000
|
unkown
|
page execute and read and write
|
||
8560000
|
direct allocation
|
page read and write
|
||
5CDA000
|
trusted library allocation
|
page read and write
|
||
60EF000
|
trusted library allocation
|
page read and write
|
||
33FE000
|
stack
|
page read and write
|
||
6184000
|
trusted library allocation
|
page read and write
|
||
60EF000
|
trusted library allocation
|
page read and write
|
||
5CDE000
|
trusted library allocation
|
page read and write
|
||
6182000
|
trusted library allocation
|
page read and write
|
||
5D2A000
|
trusted library allocation
|
page read and write
|
||
60E3000
|
trusted library allocation
|
page read and write
|
||
61E0000
|
trusted library allocation
|
page read and write
|
||
1325000
|
heap
|
page read and write
|
||
5CF5000
|
trusted library allocation
|
page read and write
|
||
52E0000
|
direct allocation
|
page execute and read and write
|
||
1325000
|
heap
|
page read and write
|
||
60E9000
|
trusted library allocation
|
page read and write
|
||
60F1000
|
trusted library allocation
|
page read and write
|
||
5CF4000
|
trusted library allocation
|
page read and write
|
||
12F0000
|
heap
|
page read and write
|
||
61DE000
|
trusted library allocation
|
page read and write
|
||
5CFA000
|
trusted library allocation
|
page read and write
|
||
5D4A000
|
trusted library allocation
|
page read and write
|
||
5CFC000
|
trusted library allocation
|
page read and write
|
||
5CD0000
|
trusted library allocation
|
page read and write
|
||
5CBF000
|
trusted library allocation
|
page read and write
|
||
5C4F000
|
trusted library allocation
|
page read and write
|
||
4CD1000
|
heap
|
page read and write
|
||
5AFE000
|
stack
|
page read and write
|
||
61E9000
|
trusted library allocation
|
page read and write
|
||
5CBA000
|
trusted library allocation
|
page read and write
|
||
5E2E000
|
trusted library allocation
|
page read and write
|
||
60EA000
|
trusted library allocation
|
page read and write
|
||
6204000
|
trusted library allocation
|
page read and write
|
||
13C4000
|
heap
|
page read and write
|
||
5D15000
|
trusted library allocation
|
page read and write
|
||
5C69000
|
trusted library allocation
|
page read and write
|
||
5D59000
|
trusted library allocation
|
page read and write
|
||
367E000
|
stack
|
page read and write
|
||
1327000
|
heap
|
page read and write
|
||
3DFE000
|
stack
|
page read and write
|
||
624D000
|
trusted library allocation
|
page read and write
|
||
5100000
|
trusted library allocation
|
page read and write
|
||
5D0A000
|
trusted library allocation
|
page read and write
|
||
130F000
|
heap
|
page read and write
|
||
52B0000
|
direct allocation
|
page execute and read and write
|
||
569E000
|
stack
|
page read and write
|
||
5CB6000
|
trusted library allocation
|
page read and write
|
||
5CF4000
|
trusted library allocation
|
page read and write
|
||
60E7000
|
trusted library allocation
|
page read and write
|
||
60E4000
|
trusted library allocation
|
page read and write
|
||
644D000
|
trusted library allocation
|
page read and write
|
||
61D1000
|
trusted library allocation
|
page read and write
|
||
4CC1000
|
heap
|
page read and write
|
||
6230000
|
trusted library allocation
|
page read and write
|
||
130F000
|
heap
|
page read and write
|
||
5D15000
|
trusted library allocation
|
page read and write
|
||
844000
|
unkown
|
page execute and read and write
|
||
5194000
|
direct allocation
|
page read and write
|
||
5CD0000
|
trusted library allocation
|
page read and write
|
||
60E1000
|
trusted library allocation
|
page read and write
|
||
4CC0000
|
heap
|
page read and write
|
||
621B000
|
trusted library allocation
|
page read and write
|
||
5D14000
|
trusted library allocation
|
page read and write
|
||
5F43000
|
trusted library allocation
|
page read and write
|
||
5CB9000
|
trusted library allocation
|
page read and write
|
||
52C0000
|
direct allocation
|
page execute and read and write
|
||
1327000
|
heap
|
page read and write
|
||
2EE0000
|
direct allocation
|
page read and write
|
||
5D41000
|
trusted library allocation
|
page read and write
|
||
6357000
|
trusted library allocation
|
page read and write
|
||
5DE8000
|
trusted library allocation
|
page read and write
|
||
5CC6000
|
trusted library allocation
|
page read and write
|
||
13C4000
|
heap
|
page read and write
|
||
5CF5000
|
trusted library allocation
|
page read and write
|
||
5C77000
|
trusted library allocation
|
page read and write
|
||
5CE4000
|
trusted library allocation
|
page read and write
|
||
60E0000
|
trusted library allocation
|
page read and write
|
||
5F49000
|
trusted library allocation
|
page read and write
|
||
13C4000
|
heap
|
page read and write
|
||
313F000
|
stack
|
page read and write
|
||
6225000
|
trusted library allocation
|
page read and write
|
||
5CF5000
|
trusted library allocation
|
page read and write
|
||
5C67000
|
trusted library allocation
|
page read and write
|
||
60E8000
|
trusted library allocation
|
page read and write
|
||
3B7E000
|
stack
|
page read and write
|
||
5CE4000
|
trusted library allocation
|
page read and write
|
||
2E7E000
|
stack
|
page read and write
|
||
5EAB000
|
trusted library allocation
|
page read and write
|
||
62EF000
|
trusted library allocation
|
page read and write
|
||
5F7E000
|
trusted library allocation
|
page read and write
|
||
1291000
|
heap
|
page read and write
|
||
5C77000
|
trusted library allocation
|
page read and write
|
||
5CDA000
|
trusted library allocation
|
page read and write
|
||
5F45000
|
trusted library allocation
|
page read and write
|
||
5C71000
|
trusted library allocation
|
page read and write
|
||
5CD3000
|
trusted library allocation
|
page read and write
|
||
61F5000
|
trusted library allocation
|
page read and write
|
||
1328000
|
heap
|
page read and write
|
||
5C45000
|
trusted library allocation
|
page read and write
|
||
13C4000
|
heap
|
page read and write
|
||
5CF5000
|
trusted library allocation
|
page read and write
|
||
52E0000
|
direct allocation
|
page execute and read and write
|
||
4CC1000
|
heap
|
page read and write
|
||
5D41000
|
trusted library allocation
|
page read and write
|
||
5CE6000
|
trusted library allocation
|
page read and write
|
||
8560000
|
direct allocation
|
page read and write
|
||
5D1C000
|
trusted library allocation
|
page read and write
|
||
598D000
|
stack
|
page read and write
|
||
5D59000
|
trusted library allocation
|
page read and write
|
||
5C43000
|
trusted library allocation
|
page read and write
|
||
637F000
|
trusted library allocation
|
page read and write
|
||
5CB9000
|
trusted library allocation
|
page read and write
|
||
5C6A000
|
trusted library allocation
|
page read and write
|
||
6193000
|
trusted library allocation
|
page read and write
|
||
4CC1000
|
heap
|
page read and write
|
||
5CC6000
|
trusted library allocation
|
page read and write
|
||
5F66000
|
trusted library allocation
|
page read and write
|
||
4A7E000
|
stack
|
page read and write
|
||
39FF000
|
stack
|
page read and write
|
||
13C4000
|
heap
|
page read and write
|
||
131B000
|
heap
|
page read and write
|
||
5CD0000
|
trusted library allocation
|
page read and write
|
||
5CDA000
|
trusted library allocation
|
page read and write
|
||
5CD4000
|
trusted library allocation
|
page read and write
|
||
5C4A000
|
trusted library allocation
|
page read and write
|
||
1327000
|
heap
|
page read and write
|
||
8560000
|
direct allocation
|
page read and write
|
||
60E6000
|
trusted library allocation
|
page read and write
|
||
60EA000
|
trusted library allocation
|
page read and write
|
||
5CC6000
|
trusted library allocation
|
page read and write
|
||
2EE0000
|
direct allocation
|
page read and write
|
||
13C4000
|
heap
|
page read and write
|
||
61AD000
|
trusted library allocation
|
page read and write
|
||
5CDA000
|
trusted library allocation
|
page read and write
|
||
5CB9000
|
trusted library allocation
|
page read and write
|
||
467F000
|
stack
|
page read and write
|
||
2EF0000
|
heap
|
page read and write
|
||
6195000
|
trusted library allocation
|
page read and write
|
||
5CE6000
|
trusted library allocation
|
page read and write
|
||
5D05000
|
trusted library allocation
|
page read and write
|
||
5CE6000
|
trusted library allocation
|
page read and write
|
||
5CC6000
|
trusted library allocation
|
page read and write
|
||
5C4F000
|
trusted library allocation
|
page read and write
|
||
85C0000
|
direct allocation
|
page read and write
|
||
5CDE000
|
trusted library allocation
|
page read and write
|
||
60EA000
|
trusted library allocation
|
page read and write
|
||
2EE0000
|
direct allocation
|
page read and write
|
||
4CC1000
|
heap
|
page read and write
|
||
6231000
|
trusted library allocation
|
page read and write
|
||
5CF5000
|
trusted library allocation
|
page read and write
|
||
60E2000
|
trusted library allocation
|
page read and write
|
||
1327000
|
heap
|
page read and write
|
||
61F5000
|
trusted library allocation
|
page read and write
|
||
1318000
|
heap
|
page read and write
|
||
60E2000
|
trusted library allocation
|
page read and write
|
||
5CD0000
|
trusted library allocation
|
page read and write
|
||
5CF5000
|
trusted library allocation
|
page read and write
|
||
61AF000
|
trusted library allocation
|
page read and write
|
||
5D24000
|
trusted library allocation
|
page read and write
|
||
13C0000
|
heap
|
page read and write
|
||
5C71000
|
trusted library allocation
|
page read and write
|
||
5E76000
|
trusted library allocation
|
page read and write
|
||
5CB9000
|
trusted library allocation
|
page read and write
|
||
5CC6000
|
trusted library allocation
|
page read and write
|
||
60E2000
|
trusted library allocation
|
page read and write
|
||
34FF000
|
stack
|
page read and write
|
||
5C66000
|
trusted library allocation
|
page read and write
|
||
5C76000
|
trusted library allocation
|
page read and write
|
||
6016000
|
trusted library allocation
|
page read and write
|
||
5150000
|
direct allocation
|
page read and write
|
||
5D05000
|
trusted library allocation
|
page read and write
|
||
60ED000
|
trusted library allocation
|
page read and write
|
||
5CD3000
|
trusted library allocation
|
page read and write
|
||
57DF000
|
stack
|
page read and write
|
||
5C40000
|
trusted library allocation
|
page read and write
|
||
5CF5000
|
trusted library allocation
|
page read and write
|
||
5B7000
|
unkown
|
page write copy
|
||
5CD0000
|
trusted library allocation
|
page read and write
|
||
6182000
|
trusted library allocation
|
page read and write
|
||
2ED0000
|
heap
|
page read and write
|
||
5CD7000
|
trusted library allocation
|
page read and write
|
||
1282000
|
heap
|
page read and write
|
||
3A3E000
|
stack
|
page read and write
|
||
5D05000
|
trusted library allocation
|
page read and write
|
||
6217000
|
trusted library allocation
|
page read and write
|
||
60EB000
|
trusted library allocation
|
page read and write
|
||
634D000
|
trusted library allocation
|
page read and write
|
||
60ED000
|
trusted library allocation
|
page read and write
|
||
5CD0000
|
trusted library allocation
|
page read and write
|
||
5FEE000
|
trusted library allocation
|
page read and write
|
||
6233000
|
trusted library allocation
|
page read and write
|
||
60E0000
|
trusted library allocation
|
page read and write
|
||
5FD0000
|
trusted library allocation
|
page read and write
|
||
61D2000
|
trusted library allocation
|
page read and write
|
||
6376000
|
trusted library allocation
|
page read and write
|
||
5E3C000
|
trusted library allocation
|
page read and write
|
||
5110000
|
heap
|
page read and write
|
||
1327000
|
heap
|
page read and write
|
||
5CBA000
|
trusted library allocation
|
page read and write
|
||
5CDA000
|
trusted library allocation
|
page read and write
|
||
5D15000
|
trusted library allocation
|
page read and write
|
||
8560000
|
direct allocation
|
page read and write
|
||
493E000
|
stack
|
page read and write
|
||
5D2A000
|
trusted library allocation
|
page read and write
|
||
5CE4000
|
trusted library allocation
|
page read and write
|
||
5C5B000
|
trusted library allocation
|
page read and write
|
||
1327000
|
heap
|
page read and write
|
||
5CF4000
|
trusted library allocation
|
page read and write
|
||
61CE000
|
trusted library allocation
|
page read and write
|
||
5D05000
|
trusted library allocation
|
page read and write
|
||
6197000
|
trusted library allocation
|
page read and write
|
||
5CD0000
|
trusted library allocation
|
page read and write
|
||
60E5000
|
trusted library allocation
|
page read and write
|
||
8640000
|
direct allocation
|
page execute and read and write
|
||
62ED000
|
trusted library allocation
|
page read and write
|
||
5CC7000
|
trusted library allocation
|
page read and write
|
||
5D71000
|
trusted library allocation
|
page read and write
|
||
5CB9000
|
trusted library allocation
|
page read and write
|
||
5CE9000
|
trusted library allocation
|
page read and write
|
||
5D48000
|
trusted library allocation
|
page read and write
|
||
131C000
|
heap
|
page read and write
|
||
560000
|
unkown
|
page readonly
|
||
5CFA000
|
trusted library allocation
|
page read and write
|
||
403F000
|
stack
|
page read and write
|
||
5310000
|
direct allocation
|
page execute and read and write
|
||
60EA000
|
trusted library allocation
|
page read and write
|
||
5CD6000
|
trusted library allocation
|
page read and write
|
||
5CE9000
|
trusted library allocation
|
page read and write
|
||
5CBC000
|
trusted library allocation
|
page read and write
|
||
5C4F000
|
trusted library allocation
|
page read and write
|
||
5CE4000
|
trusted library allocation
|
page read and write
|
||
5D05000
|
trusted library allocation
|
page read and write
|
||
3B3F000
|
stack
|
page read and write
|
||
33BF000
|
stack
|
page read and write
|
||
5C82000
|
trusted library allocation
|
page read and write
|
||
303B000
|
stack
|
page read and write
|
||
13C4000
|
heap
|
page read and write
|
||
60E0000
|
trusted library allocation
|
page read and write
|
||
13C4000
|
heap
|
page read and write
|
||
6955000
|
trusted library allocation
|
page read and write
|
||
60E8000
|
trusted library allocation
|
page read and write
|
||
61E1000
|
trusted library allocation
|
page read and write
|
||
84B000
|
unkown
|
page execute and read and write
|
||
5DC7000
|
trusted library allocation
|
page read and write
|
||
5D20000
|
trusted library allocation
|
page read and write
|
||
60EB000
|
trusted library allocation
|
page read and write
|
||
5C67000
|
trusted library allocation
|
page read and write
|
||
619F000
|
trusted library allocation
|
page read and write
|
||
60E6000
|
trusted library allocation
|
page read and write
|
||
5CF5000
|
trusted library allocation
|
page read and write
|
||
6272000
|
trusted library allocation
|
page read and write
|
||
48FF000
|
stack
|
page read and write
|
||
5E59000
|
trusted library allocation
|
page read and write
|
||
1327000
|
heap
|
page read and write
|
||
60E2000
|
trusted library allocation
|
page read and write
|
||
1327000
|
heap
|
page read and write
|
||
6378000
|
trusted library allocation
|
page read and write
|
||
1320000
|
heap
|
page read and write
|
||
12A7000
|
heap
|
page read and write
|
||
5C48000
|
trusted library allocation
|
page read and write
|
||
6315000
|
trusted library allocation
|
page read and write
|
||
5CF5000
|
trusted library allocation
|
page read and write
|
||
60E2000
|
trusted library allocation
|
page read and write
|
||
5CC8000
|
trusted library allocation
|
page read and write
|
||
1311000
|
heap
|
page read and write
|
||
5E3A000
|
trusted library allocation
|
page read and write
|
||
60EF000
|
trusted library allocation
|
page read and write
|
||
1240000
|
heap
|
page read and write
|
||
2EE0000
|
direct allocation
|
page read and write
|
||
5B9000
|
unkown
|
page execute and read and write
|
||
5D59000
|
trusted library allocation
|
page read and write
|
||
60E2000
|
trusted library allocation
|
page read and write
|
||
5CBA000
|
trusted library allocation
|
page read and write
|
||
4BBE000
|
stack
|
page read and write
|
||
5CF5000
|
trusted library allocation
|
page read and write
|
||
5CB2000
|
trusted library allocation
|
page read and write
|
||
629C000
|
trusted library allocation
|
page read and write
|
||
4CC1000
|
heap
|
page read and write
|
||
124A000
|
heap
|
page read and write
|
||
56DE000
|
stack
|
page read and write
|
||
5DCE000
|
trusted library allocation
|
page read and write
|
||
5CDE000
|
trusted library allocation
|
page read and write
|
||
131C000
|
heap
|
page read and write
|
||
5D05000
|
trusted library allocation
|
page read and write
|
||
5C6A000
|
trusted library allocation
|
page read and write
|
||
5CC6000
|
trusted library allocation
|
page read and write
|
||
627A000
|
trusted library allocation
|
page read and write
|
||
5CD5000
|
trusted library allocation
|
page read and write
|
||
60EE000
|
trusted library allocation
|
page read and write
|
||
1289000
|
heap
|
page read and write
|
||
5C43000
|
trusted library allocation
|
page read and write
|
||
5D24000
|
trusted library allocation
|
page read and write
|
||
5C97000
|
trusted library allocation
|
page read and write
|
||
2EE0000
|
direct allocation
|
page read and write
|
||
5CC8000
|
trusted library allocation
|
page read and write
|
||
61E7000
|
trusted library allocation
|
page read and write
|
||
60E5000
|
trusted library allocation
|
page read and write
|
||
5CDF000
|
trusted library allocation
|
page read and write
|
||
1327000
|
heap
|
page read and write
|
||
2EE0000
|
direct allocation
|
page read and write
|
||
61E0000
|
trusted library allocation
|
page read and write
|
||
5C2F000
|
stack
|
page read and write
|
||
5CF4000
|
trusted library allocation
|
page read and write
|
||
6219000
|
trusted library allocation
|
page read and write
|
||
5CDA000
|
trusted library allocation
|
page read and write
|
||
5CDE000
|
trusted library allocation
|
page read and write
|
||
12FC000
|
heap
|
page read and write
|
||
4CC1000
|
heap
|
page read and write
|
||
62FF000
|
trusted library allocation
|
page read and write
|
||
130E000
|
heap
|
page read and write
|
||
8560000
|
direct allocation
|
page read and write
|
||
52EE000
|
stack
|
page read and write
|
||
5FB0000
|
direct allocation
|
page read and write
|
||
1327000
|
heap
|
page read and write
|
||
5CE9000
|
trusted library allocation
|
page read and write
|
||
5D15000
|
trusted library allocation
|
page read and write
|
||
124E000
|
heap
|
page read and write
|
||
159E000
|
stack
|
page read and write
|
||
529F000
|
stack
|
page read and write
|
||
5CF4000
|
trusted library allocation
|
page read and write
|
||
5C80000
|
trusted library allocation
|
page read and write
|
||
6301000
|
trusted library allocation
|
page read and write
|
||
4CC1000
|
heap
|
page read and write
|
||
377F000
|
stack
|
page read and write
|
||
60E3000
|
trusted library allocation
|
page read and write
|
||
60F1000
|
trusted library allocation
|
page read and write
|
||
52E0000
|
direct allocation
|
page execute and read and write
|
||
60ED000
|
trusted library allocation
|
page read and write
|
||
619D000
|
trusted library allocation
|
page read and write
|
||
60E2000
|
trusted library allocation
|
page read and write
|
||
5CC6000
|
trusted library allocation
|
page read and write
|
||
5CDA000
|
trusted library allocation
|
page read and write
|
||
559E000
|
stack
|
page read and write
|
||
5F43000
|
trusted library allocation
|
page read and write
|
||
60E7000
|
trusted library allocation
|
page read and write
|
||
5CBA000
|
trusted library allocation
|
page read and write
|
||
5D15000
|
trusted library allocation
|
page read and write
|
||
5EC0000
|
trusted library allocation
|
page read and write
|
||
618A000
|
trusted library allocation
|
page read and write
|
||
60EE000
|
trusted library allocation
|
page read and write
|
||
5C43000
|
trusted library allocation
|
page read and write
|
||
5CF4000
|
trusted library allocation
|
page read and write
|
||
60E0000
|
trusted library allocation
|
page read and write
|
||
5D0C000
|
trusted library allocation
|
page read and write
|
||
5CB9000
|
trusted library allocation
|
page read and write
|
||
60E2000
|
trusted library allocation
|
page read and write
|
||
5DDC000
|
trusted library allocation
|
page read and write
|
||
38BF000
|
stack
|
page read and write
|
||
5C4F000
|
trusted library allocation
|
page read and write
|
||
1327000
|
heap
|
page read and write
|
||
8610000
|
direct allocation
|
page execute and read and write
|
||
622D000
|
trusted library allocation
|
page read and write
|
||
5D15000
|
trusted library allocation
|
page read and write
|
||
5CDA000
|
trusted library allocation
|
page read and write
|
||
1328000
|
heap
|
page read and write
|
||
624B000
|
trusted library allocation
|
page read and write
|
||
62DF000
|
trusted library allocation
|
page read and write
|
||
12AA000
|
heap
|
page read and write
|
||
5C4A000
|
trusted library allocation
|
page read and write
|
||
8560000
|
direct allocation
|
page read and write
|
||
1328000
|
heap
|
page read and write
|
||
5CD0000
|
trusted library allocation
|
page read and write
|
||
60E4000
|
trusted library allocation
|
page read and write
|
||
5E49000
|
trusted library allocation
|
page read and write
|
||
131B000
|
heap
|
page read and write
|
||
60E6000
|
trusted library allocation
|
page read and write
|
||
5D0B000
|
trusted library allocation
|
page read and write
|
||
60E9000
|
trusted library allocation
|
page read and write
|
||
5C56000
|
trusted library allocation
|
page read and write
|
||
62AF000
|
trusted library allocation
|
page read and write
|
||
5CD0000
|
trusted library allocation
|
page read and write
|
||
52E0000
|
direct allocation
|
page execute and read and write
|
||
61CB000
|
trusted library allocation
|
page read and write
|
||
1325000
|
heap
|
page read and write
|
||
5C64000
|
trusted library allocation
|
page read and write
|
||
5CF4000
|
trusted library allocation
|
page read and write
|
||
3EFF000
|
stack
|
page read and write
|
||
519C000
|
stack
|
page read and write
|
||
46BE000
|
stack
|
page read and write
|
||
60E8000
|
trusted library allocation
|
page read and write
|
||
60EB000
|
trusted library allocation
|
page read and write
|
||
60E0000
|
trusted library allocation
|
page read and write
|
||
5D15000
|
trusted library allocation
|
page read and write
|
||
407E000
|
stack
|
page read and write
|
||
4CC1000
|
heap
|
page read and write
|
||
1313000
|
heap
|
page read and write
|
||
5CDD000
|
trusted library allocation
|
page read and write
|
||
130E000
|
heap
|
page read and write
|
||
5CC6000
|
trusted library allocation
|
page read and write
|
||
5D15000
|
trusted library allocation
|
page read and write
|
||
43FF000
|
stack
|
page read and write
|
||
6242000
|
trusted library allocation
|
page read and write
|
||
61B2000
|
trusted library allocation
|
page read and write
|
||
3DBF000
|
stack
|
page read and write
|
||
5CCD000
|
trusted library allocation
|
page read and write
|
||
5CC6000
|
trusted library allocation
|
page read and write
|
||
5C5D000
|
trusted library allocation
|
page read and write
|
||
561000
|
unkown
|
page execute and read and write
|
||
4CC1000
|
heap
|
page read and write
|
||
8560000
|
direct allocation
|
page read and write
|
||
61A4000
|
trusted library allocation
|
page read and write
|
||
5C6C000
|
trusted library allocation
|
page read and write
|
||
1311000
|
heap
|
page read and write
|
||
60EF000
|
trusted library allocation
|
page read and write
|
||
561000
|
unkown
|
page execute and write copy
|
||
5C6E000
|
trusted library allocation
|
page read and write
|
||
5C76000
|
trusted library allocation
|
page read and write
|
||
5CC8000
|
trusted library allocation
|
page read and write
|
||
5CF5000
|
trusted library allocation
|
page read and write
|
||
6278000
|
trusted library allocation
|
page read and write
|
||
5CCE000
|
trusted library allocation
|
page read and write
|
||
13C4000
|
heap
|
page read and write
|
||
5CE4000
|
trusted library allocation
|
page read and write
|
||
5D15000
|
trusted library allocation
|
page read and write
|
||
5F4D000
|
trusted library allocation
|
page read and write
|
||
6219000
|
trusted library allocation
|
page read and write
|
||
5CD7000
|
trusted library allocation
|
page read and write
|
||
61EB000
|
trusted library allocation
|
page read and write
|
||
5A8E000
|
stack
|
page read and write
|
||
5CF4000
|
trusted library allocation
|
page read and write
|
||
5CCE000
|
trusted library allocation
|
page read and write
|
||
363F000
|
stack
|
page read and write
|
||
5CCE000
|
trusted library allocation
|
page read and write
|
||
5D79000
|
trusted library allocation
|
page read and write
|
||
2EE0000
|
direct allocation
|
page read and write
|
||
60E8000
|
trusted library allocation
|
page read and write
|
||
5D15000
|
trusted library allocation
|
page read and write
|
||
5CC6000
|
trusted library allocation
|
page read and write
|
||
5CE6000
|
trusted library allocation
|
page read and write
|
||
453F000
|
stack
|
page read and write
|
||
6026000
|
trusted library allocation
|
page read and write
|
||
13AE000
|
stack
|
page read and write
|
||
60E5000
|
trusted library allocation
|
page read and write
|
||
4CC1000
|
heap
|
page read and write
|
||
4CC1000
|
heap
|
page read and write
|
||
5B7000
|
unkown
|
page read and write
|
||
2ECE000
|
stack
|
page read and write
|
||
61DE000
|
trusted library allocation
|
page read and write
|
||
5CD3000
|
trusted library allocation
|
page read and write
|
||
5150000
|
direct allocation
|
page read and write
|
||
622F000
|
trusted library allocation
|
page read and write
|
||
5CF3000
|
trusted library allocation
|
page read and write
|
||
5CBA000
|
trusted library allocation
|
page read and write
|
||
1327000
|
heap
|
page read and write
|
||
13C4000
|
heap
|
page read and write
|
||
4CBF000
|
stack
|
page read and write
|
||
5CE6000
|
trusted library allocation
|
page read and write
|
||
60ED000
|
trusted library allocation
|
page read and write
|
||
2D7E000
|
stack
|
page read and write
|
||
5CF6000
|
trusted library allocation
|
page read and write
|
||
6355000
|
trusted library allocation
|
page read and write
|
||
5D62000
|
trusted library allocation
|
page read and write
|
||
38FE000
|
stack
|
page read and write
|
||
5D79000
|
trusted library allocation
|
page read and write
|
||
61CC000
|
trusted library allocation
|
page read and write
|
||
60E0000
|
trusted library allocation
|
page read and write
|
||
8560000
|
direct allocation
|
page read and write
|
||
1327000
|
heap
|
page read and write
|
||
60E2000
|
trusted library allocation
|
page read and write
|
||
6195000
|
trusted library allocation
|
page read and write
|
||
2EE0000
|
direct allocation
|
page read and write
|
||
5C49000
|
trusted library allocation
|
page read and write
|
||
637D000
|
trusted library allocation
|
page read and write
|
||
61E2000
|
trusted library allocation
|
page read and write
|
||
5CBA000
|
trusted library allocation
|
page read and write
|
||
61D3000
|
trusted library allocation
|
page read and write
|
||
5CE9000
|
trusted library allocation
|
page read and write
|
||
61B1000
|
trusted library allocation
|
page read and write
|
||
1311000
|
heap
|
page read and write
|
||
61F3000
|
trusted library allocation
|
page read and write
|
||
4CC1000
|
heap
|
page read and write
|
||
5CFC000
|
trusted library allocation
|
page read and write
|
||
5C51000
|
trusted library allocation
|
page read and write
|
||
584E000
|
stack
|
page read and write
|
||
85A000
|
unkown
|
page execute and read and write
|
||
5C95000
|
trusted library allocation
|
page read and write
|
||
13C4000
|
heap
|
page read and write
|
||
4B7F000
|
stack
|
page read and write
|
||
621F000
|
trusted library allocation
|
page read and write
|
||
5CC6000
|
trusted library allocation
|
page read and write
|
||
5C74000
|
trusted library allocation
|
page read and write
|
||
5D40000
|
trusted library allocation
|
page read and write
|
||
6178000
|
trusted library allocation
|
page read and write
|
||
60E3000
|
trusted library allocation
|
page read and write
|
||
5C43000
|
trusted library allocation
|
page read and write
|
||
5300000
|
direct allocation
|
page execute and read and write
|
||
5CD7000
|
trusted library allocation
|
page read and write
|
||
5C5F000
|
trusted library allocation
|
page read and write
|
||
5CF5000
|
trusted library allocation
|
page read and write
|
||
5E2C000
|
trusted library allocation
|
page read and write
|
||
4CC1000
|
heap
|
page read and write
|
||
8560000
|
trusted library allocation
|
page read and write
|
||
60E5000
|
trusted library allocation
|
page read and write
|
||
32BE000
|
stack
|
page read and write
|
||
1316000
|
heap
|
page read and write
|
||
5D15000
|
trusted library allocation
|
page read and write
|
||
8560000
|
direct allocation
|
page read and write
|
||
60E7000
|
trusted library allocation
|
page read and write
|
||
85C0000
|
direct allocation
|
page read and write
|
||
60E0000
|
trusted library allocation
|
page read and write
|
||
5CF4000
|
trusted library allocation
|
page read and write
|
||
5CCE000
|
trusted library allocation
|
page read and write
|
||
60E8000
|
trusted library allocation
|
page read and write
|
||
353E000
|
stack
|
page read and write
|
||
541D000
|
stack
|
page read and write
|
||
5CE6000
|
trusted library allocation
|
page read and write
|
||
60E7000
|
trusted library allocation
|
page read and write
|
||
61B1000
|
trusted library allocation
|
page read and write
|
||
47FE000
|
stack
|
page read and write
|
||
9F2000
|
unkown
|
page execute and write copy
|
||
5B23000
|
heap
|
page read and write
|
||
5CE4000
|
trusted library allocation
|
page read and write
|
||
61DF000
|
trusted library allocation
|
page read and write
|
||
5CF4000
|
trusted library allocation
|
page read and write
|
||
61CD000
|
trusted library allocation
|
page read and write
|
||
5CF8000
|
trusted library allocation
|
page read and write
|
||
13C4000
|
heap
|
page read and write
|
||
13C4000
|
heap
|
page read and write
|
||
6207000
|
trusted library allocation
|
page read and write
|
||
5D2A000
|
trusted library allocation
|
page read and write
|
||
5CCA000
|
trusted library allocation
|
page read and write
|
||
5C79000
|
trusted library allocation
|
page read and write
|
||
618C000
|
trusted library allocation
|
page read and write
|
||
5CD0000
|
trusted library allocation
|
page read and write
|
||
5CAC000
|
trusted library allocation
|
page read and write
|
||
60E6000
|
trusted library allocation
|
page read and write
|
||
60EC000
|
trusted library allocation
|
page read and write
|
||
5CF5000
|
trusted library allocation
|
page read and write
|
||
60E5000
|
trusted library allocation
|
page read and write
|
||
5CF3000
|
trusted library allocation
|
page read and write
|
||
5D62000
|
trusted library allocation
|
page read and write
|
||
4CC1000
|
heap
|
page read and write
|
||
61E5000
|
trusted library allocation
|
page read and write
|
||
5D24000
|
trusted library allocation
|
page read and write
|
||
5E59000
|
trusted library allocation
|
page read and write
|
||
5CF5000
|
trusted library allocation
|
page read and write
|
||
5CC2000
|
trusted library allocation
|
page read and write
|
||
5E96000
|
trusted library allocation
|
page read and write
|
||
5CF6000
|
trusted library allocation
|
page read and write
|
||
5150000
|
direct allocation
|
page read and write
|
There are 787 hidden memdumps, click here to show them.
DOM / HTML
URL
|
Malicious
|
|
---|---|---|
https://learn.microsoft.com/en-us/dotnet/framework/install/application-not-started?version=(null)&processName=file.exe&platform=0009&osver=6&isServer=0&shimver=4.0.30319.0
|
||
https://learn.microsoft.com/en-us/dotnet/framework/install/application-not-started?version=(null)&processName=file.exe&platform=0009&osver=6&isServer=0&shimver=4.0.30319.0
|
||
https://learn.microsoft.com/en-us/dotnet/framework/install/application-not-started?version=(null)&processName=file.exe&platform=0009&osver=6&isServer=0&shimver=4.0.30319.0
|
||
https://learn.microsoft.com/en-us/dotnet/framework/install/application-not-started?version=(null)&processName=file.exe&platform=0009&osver=6&isServer=0&shimver=4.0.30319.0
|
||
https://learn.microsoft.com/en-us/dotnet/framework/install/application-not-started?version=(null)&processName=file.exe&platform=0009&osver=6&isServer=0&shimver=4.0.30319.0
|