Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
file.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
initial sample
|
||
Chrome Cache Entry: 100
|
JPEG image data, JFIF standard 1.01, aspect ratio, density 1x1, segment length 16, baseline, precision 8, 1528x402, components
3
|
dropped
|
||
Chrome Cache Entry: 101
|
PNG image data, 475 x 212, 8-bit/color RGBA, non-interlaced
|
downloaded
|
||
Chrome Cache Entry: 102
|
JSON data
|
downloaded
|
||
Chrome Cache Entry: 103
|
JSON data
|
dropped
|
||
Chrome Cache Entry: 104
|
JPEG image data, JFIF standard 1.01, aspect ratio, density 1x1, segment length 16, baseline, precision 8, 1528x402, components
3
|
downloaded
|
||
Chrome Cache Entry: 105
|
exported SGML document, ASCII text, with very long lines (65536), with no line terminators
|
dropped
|
||
Chrome Cache Entry: 106
|
ASCII text, with very long lines (46884)
|
dropped
|
||
Chrome Cache Entry: 107
|
ASCII text
|
dropped
|
||
Chrome Cache Entry: 108
|
SVG Scalable Vector Graphics image
|
downloaded
|
||
Chrome Cache Entry: 109
|
Web Open Font Format (Version 2), TrueType, length 19696, version 1.0
|
downloaded
|
||
Chrome Cache Entry: 110
|
ASCII text, with very long lines (33148), with no line terminators
|
downloaded
|
||
Chrome Cache Entry: 111
|
PNG image data, 475 x 212, 8-bit/color RGBA, non-interlaced
|
dropped
|
||
Chrome Cache Entry: 112
|
PNG image data, 658 x 480, 8-bit/color RGBA, non-interlaced
|
dropped
|
||
Chrome Cache Entry: 113
|
JSON data
|
dropped
|
||
Chrome Cache Entry: 114
|
HTML document, ASCII text, with very long lines (639), with CRLF, LF line terminators
|
downloaded
|
||
Chrome Cache Entry: 115
|
JSON data
|
downloaded
|
||
Chrome Cache Entry: 116
|
PNG image data, 533 x 478, 8-bit/color RGBA, non-interlaced
|
dropped
|
||
Chrome Cache Entry: 75
|
PNG image data, 533 x 478, 8-bit/color RGBA, non-interlaced
|
dropped
|
||
Chrome Cache Entry: 76
|
PNG image data, 533 x 478, 8-bit/color RGBA, non-interlaced
|
downloaded
|
||
Chrome Cache Entry: 77
|
SVG Scalable Vector Graphics image
|
dropped
|
||
Chrome Cache Entry: 78
|
JSON data
|
dropped
|
||
Chrome Cache Entry: 79
|
PNG image data, 533 x 478, 8-bit/color RGBA, non-interlaced
|
dropped
|
||
Chrome Cache Entry: 80
|
ASCII text, with very long lines (65536), with no line terminators
|
downloaded
|
||
Chrome Cache Entry: 81
|
ASCII text, with very long lines (65410)
|
dropped
|
||
Chrome Cache Entry: 82
|
JSON data
|
dropped
|
||
Chrome Cache Entry: 83
|
ASCII text, with very long lines (65410)
|
downloaded
|
||
Chrome Cache Entry: 84
|
JSON data
|
downloaded
|
||
Chrome Cache Entry: 85
|
JSON data
|
dropped
|
||
Chrome Cache Entry: 86
|
PNG image data, 533 x 478, 8-bit/color RGBA, non-interlaced
|
downloaded
|
||
Chrome Cache Entry: 87
|
ASCII text, with very long lines (52717), with no line terminators
|
dropped
|
||
Chrome Cache Entry: 88
|
ASCII text
|
downloaded
|
||
Chrome Cache Entry: 89
|
ASCII text, with very long lines (52717), with no line terminators
|
downloaded
|
||
Chrome Cache Entry: 90
|
exported SGML document, ASCII text, with very long lines (65536), with no line terminators
|
downloaded
|
||
Chrome Cache Entry: 91
|
ASCII text, with no line terminators
|
downloaded
|
||
Chrome Cache Entry: 92
|
PNG image data, 533 x 478, 8-bit/color RGBA, non-interlaced
|
downloaded
|
||
Chrome Cache Entry: 93
|
MS Windows icon resource - 6 icons, -128x-128, 16 colors, 72x72, 16 colors
|
downloaded
|
||
Chrome Cache Entry: 94
|
ASCII text, with very long lines (46884)
|
downloaded
|
||
Chrome Cache Entry: 95
|
JSON data
|
dropped
|
||
Chrome Cache Entry: 96
|
MS Windows icon resource - 6 icons, -128x-128, 16 colors, 72x72, 16 colors
|
dropped
|
||
Chrome Cache Entry: 97
|
PNG image data, 658 x 480, 8-bit/color RGBA, non-interlaced
|
downloaded
|
||
Chrome Cache Entry: 98
|
ASCII text, with very long lines (33148), with no line terminators
|
dropped
|
||
Chrome Cache Entry: 99
|
JSON data
|
downloaded
|
There are 33 hidden files, click here to show them.
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\file.exe
|
"C:\Users\user\Desktop\file.exe"
|
||
C:\Program Files\Google\Chrome\Application\chrome.exe
|
"C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized --single-argument http://go.microsoft.com/fwlink/?prd=11324&pver=4.5&sbp=AppLaunch2&plcid=0x409&o1=SHIM_NOVERSION_FOUND&version=(null)&processName=file.exe&platform=0009&osver=6&isServer=0&shimver=4.0.30319.0
|
||
C:\Program Files\Google\Chrome\Application\chrome.exe
|
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US
--service-sandbox-type=none --mojo-platform-channel-handle=2168 --field-trial-handle=1880,i,4249164096274677999,9181346475388211576,262144
--disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction
/prefetch:8
|
||
C:\Program Files\Google\Chrome\Application\chrome.exe
|
"C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized --single-argument http://go.microsoft.com/fwlink/?prd=11324&pver=4.5&sbp=AppLaunch2&plcid=0x409&o1=SHIM_NOVERSION_FOUND&version=(null)&processName=file.exe&platform=0009&osver=6&isServer=0&shimver=4.0.30319.0
|
||
C:\Program Files\Google\Chrome\Application\chrome.exe
|
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US
--service-sandbox-type=none --mojo-platform-channel-handle=2132 --field-trial-handle=1916,i,2138066403308314358,10443051361612717293,262144
--disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction
/prefetch:8
|
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
https://authoring-docs-microsoft.poolparty.biz/devrel/7696cda6-0510-47f6-8302-71bb5d2e28cf
|
unknown
|
||
https://duckduckgo.com/chrome_newtab
|
unknown
|
||
https://duckduckgo.com/ac/?q=
|
unknown
|
||
https://property-imper.sbs/0914
|
unknown
|
||
https://property-imper.sbs/api
|
104.21.33.116
|
||
https://github.com/dotnet/docs/blob/17c4acca45e573a92878a44a2cce57d699fe9c7c/docs/framework/install/
|
unknown
|
||
https://www.linkedin.com/cws/share?url=$
|
unknown
|
||
https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
|
unknown
|
||
https://property-imper.sbs/t
|
unknown
|
||
https://github.com/Youssef1313
|
unknown
|
||
https://property-imper.sbs/apiY
|
unknown
|
||
https://management.azure.com/providers/Microsoft.Portal/userSettings/cloudconsole?api-version=2023-0
|
unknown
|
||
https://aka.ms/msignite_docs_banner
|
unknown
|
||
https://videoencodingpublic-hgeaeyeba8gycee3.b01.azurefd.net/public-b4da8140-92cf-421c-8b7b-e471d5b9
|
unknown
|
||
http://polymer.github.io/AUTHORS.txt
|
unknown
|
||
https://github.com/dotnet/docs/issues/new?template=z-customer-feedback.yml
|
unknown
|
||
https://management.azure.com/subscriptions?api-version=2016-06-01
|
unknown
|
||
https://github.com/dotnet/docs/blob/main/docs/framework/install/application-not-started.md
|
unknown
|
||
http://x1.c.lencr.org/0
|
unknown
|
||
http://x1.i.lencr.org/0
|
unknown
|
||
https://aka.ms/pshelpmechoose
|
unknown
|
||
https://aka.ms/feedback/report?space=61
|
unknown
|
||
https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
|
unknown
|
||
https://learn-video.azurefd.net/vod/player
|
unknown
|
||
https://twitter.com/intent/tweet?original_referer=$
|
unknown
|
||
https://github.com/gewarren
|
unknown
|
||
http://185.215
|
unknown
|
||
http://185.215.113.16/off/def.exepleWebKit/537.36
|
unknown
|
||
https://support.mozilla.org/products/firefoxgro.all
|
unknown
|
||
http://polymer.github.io/CONTRIBUTORS.txt
|
unknown
|
||
https://property-imper.sbs/apiz
|
unknown
|
||
https://github.com/dotnet/docs/blob/live/docs/framework/install/application-not-started.md
|
unknown
|
||
https://authoring-docs-microsoft.poolparty.biz/devrel/69c76c32-967e-4c65-b89a-74cc527db725
|
unknown
|
||
https://client-api.arkoselabs.com/v2/api.js
|
unknown
|
||
https://aka.ms/MSIgniteChallenge/Tier1Banner?wt.mc_id=ignite24_learnbanner_tier1_cnl
|
unknown
|
||
https://management.azure.com/providers/Microsoft.Portal/consoles/default?api-version=2017-12-01-prev
|
unknown
|
||
https://www.google.com/images/branding/product/ico/googleg_lodp.ico
|
unknown
|
||
https://property-imper.sbs:443/api9
|
unknown
|
||
https://github.com/Thraka
|
unknown
|
||
http://polymer.github.io/PATENTS.txt
|
unknown
|
||
https://aka.ms/certhelp
|
unknown
|
||
http://185.215.113.16/steam/random.exe
|
unknown
|
||
https://bridge.sfo1.admarketplace.net/ctp?version=16.0.0&key=1696490019400400000.2&ci=1696490019252.
|
unknown
|
||
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
|
unknown
|
||
http://crl.rootca1.amazontrust.com/rootca1.crl0
|
unknown
|
||
https://github.com/mairaw
|
unknown
|
||
http://www.microsoft.
|
unknown
|
||
https://js.monitor.azure.com/scripts/c/ms.jsll-4.min.js
|
13.107.246.63
|
||
http://ocsp.rootca1.amazontrust.com0:
|
unknown
|
||
https://schema.org
|
unknown
|
||
http://polymer.github.io/LICENSE.txt
|
unknown
|
||
https://www.ecosia.org/newtab/
|
unknown
|
||
https://property-imper.sbs/
|
unknown
|
||
https://support.mozilla.org/kb/customize-firefox-controls-buttons-and-toolbars?utm_source=firefox-br
|
unknown
|
||
https://aka.ms/yourcaliforniaprivacychoices
|
unknown
|
||
https://ac.ecosia.org/autocomplete?q=
|
unknown
|
||
https://github.com/nschonni
|
unknown
|
||
https://videoencodingpublic-hgeaeyeba8gycee3.b01.azurefd.net/public-09ce73a6-05a5-4e4d-b3d7-bd5a8c05
|
unknown
|
||
https://github.com/adegeo
|
unknown
|
||
https://github.com/jonschlinkert/is-plain-object
|
unknown
|
||
http://crt.rootca1.amazontrust.com/rootca1.cer0?
|
unknown
|
||
https://octokit.github.io/rest.js/#throttling
|
unknown
|
||
https://property-imper.sbs/apiO
|
unknown
|
||
https://imp.mt48.net/static?id=7RHzfOIXjFEYsBdvIpkX4Qqm4pqWfpl%2B4pbW4pbWfpbW7ReNxR3UIG8zInwYIFIVs9e
|
unknown
|
||
https://contile-images.services.mozilla.com/CuERQnIs4CzqjKBh9os6_h9d4CUDCHO3oiqmAQO6VLM.25122.jpg
|
unknown
|
||
https://github.com/js-cookie/js-cookie
|
unknown
|
||
https://property-imper.sbs/api6
|
unknown
|
||
http://185.215.113.16/off/def.exe
|
unknown
|
||
http://schema.org/Organization
|
unknown
|
||
https://channel9.msdn.com/
|
unknown
|
||
https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
|
unknown
|
||
https://github.com/dotnet/try
|
unknown
|
||
https://property-imper.sbs/api=
|
unknown
|
||
http://185.215.113.16/off/def.exe(w
|
unknown
|
There are 64 hidden URLs, click here to show them.
Domains
Name
|
IP
|
Malicious
|
|
---|---|---|---|
property-imper.sbs
|
104.21.33.116
|
||
www.google.com
|
142.250.181.100
|
||
s-part-0035.t-0009.t-msedge.net
|
13.107.246.63
|
||
js.monitor.azure.com
|
unknown
|
||
mdec.nelreports.net
|
unknown
|
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
192.168.2.7
|
unknown
|
unknown
|
||
13.107.246.63
|
s-part-0035.t-0009.t-msedge.net
|
United States
|
||
185.215.113.16
|
unknown
|
Portugal
|
||
142.250.181.100
|
www.google.com
|
United States
|
||
239.255.255.250
|
unknown
|
Reserved
|
||
104.21.33.116
|
property-imper.sbs
|
United States
|
||
192.168.2.23
|
unknown
|
unknown
|
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
80EE000
|
stack
|
page read and write
|
||
5BC2000
|
trusted library allocation
|
page read and write
|
||
5BBA000
|
trusted library allocation
|
page read and write
|
||
5BBA000
|
trusted library allocation
|
page read and write
|
||
5A40000
|
heap
|
page read and write
|
||
4AFE000
|
stack
|
page read and write
|
||
124E000
|
stack
|
page read and write
|
||
73C8F000
|
unkown
|
page readonly
|
||
5C29000
|
trusted library allocation
|
page read and write
|
||
13A8000
|
heap
|
page read and write
|
||
5B9F000
|
trusted library allocation
|
page read and write
|
||
5B91000
|
trusted library allocation
|
page read and write
|
||
5C37000
|
trusted library allocation
|
page read and write
|
||
5C0A000
|
trusted library allocation
|
page read and write
|
||
5B9D000
|
trusted library allocation
|
page read and write
|
||
6034000
|
trusted library allocation
|
page read and write
|
||
60DB000
|
trusted library allocation
|
page read and write
|
||
40FE000
|
stack
|
page read and write
|
||
5BBA000
|
trusted library allocation
|
page read and write
|
||
6166000
|
trusted library allocation
|
page read and write
|
||
614C000
|
trusted library allocation
|
page read and write
|
||
5C2C000
|
trusted library allocation
|
page read and write
|
||
5C43000
|
trusted library allocation
|
page read and write
|
||
5C0A000
|
trusted library allocation
|
page read and write
|
||
5C2C000
|
trusted library allocation
|
page read and write
|
||
603D000
|
trusted library allocation
|
page read and write
|
||
6038000
|
trusted library allocation
|
page read and write
|
||
12B0000
|
direct allocation
|
page read and write
|
||
13A1000
|
heap
|
page read and write
|
||
129E000
|
stack
|
page read and write
|
||
8480000
|
direct allocation
|
page read and write
|
||
5B9D000
|
trusted library allocation
|
page read and write
|
||
5BCA000
|
trusted library allocation
|
page read and write
|
||
6036000
|
trusted library allocation
|
page read and write
|
||
5C2C000
|
trusted library allocation
|
page read and write
|
||
612A000
|
trusted library allocation
|
page read and write
|
||
5BDC000
|
trusted library allocation
|
page read and write
|
||
12B0000
|
direct allocation
|
page read and write
|
||
51DF000
|
stack
|
page read and write
|
||
139D000
|
heap
|
page read and write
|
||
5BA4000
|
trusted library allocation
|
page read and write
|
||
6037000
|
trusted library allocation
|
page read and write
|
||
86F0000
|
heap
|
page read and write
|
||
5BFB000
|
trusted library allocation
|
page read and write
|
||
60DA000
|
trusted library allocation
|
page read and write
|
||
5BD4000
|
trusted library allocation
|
page read and write
|
||
5C3D000
|
trusted library allocation
|
page read and write
|
||
6033000
|
trusted library allocation
|
page read and write
|
||
6139000
|
trusted library allocation
|
page read and write
|
||
616B000
|
trusted library allocation
|
page read and write
|
||
5C3D000
|
trusted library allocation
|
page read and write
|
||
60E8000
|
trusted library allocation
|
page read and write
|
||
6582000
|
trusted library allocation
|
page execute and read and write
|
||
343F000
|
stack
|
page read and write
|
||
5C02000
|
trusted library allocation
|
page read and write
|
||
54DE000
|
stack
|
page read and write
|
||
5BC0000
|
trusted library allocation
|
page read and write
|
||
81EF000
|
stack
|
page read and write
|
||
5C02000
|
trusted library allocation
|
page read and write
|
||
5C3D000
|
trusted library allocation
|
page read and write
|
||
612C000
|
trusted library allocation
|
page read and write
|
||
5BCA000
|
trusted library allocation
|
page read and write
|
||
5BCD000
|
trusted library allocation
|
page read and write
|
||
6035000
|
trusted library allocation
|
page read and write
|
||
4D00000
|
trusted library allocation
|
page read and write
|
||
5B9D000
|
trusted library allocation
|
page read and write
|
||
12CA000
|
heap
|
page read and write
|
||
5BAE000
|
trusted library allocation
|
page read and write
|
||
5C23000
|
trusted library allocation
|
page read and write
|
||
6034000
|
trusted library allocation
|
page read and write
|
||
5E32000
|
trusted library allocation
|
page read and write
|
||
5C15000
|
trusted library allocation
|
page read and write
|
||
5EBC000
|
trusted library allocation
|
page read and write
|
||
5BE4000
|
trusted library allocation
|
page read and write
|
||
5C2C000
|
trusted library allocation
|
page read and write
|
||
5BBA000
|
trusted library allocation
|
page read and write
|
||
6103000
|
trusted library allocation
|
page read and write
|
||
1311000
|
heap
|
page read and write
|
||
139E000
|
heap
|
page read and write
|
||
139E000
|
heap
|
page read and write
|
||
6112000
|
trusted library allocation
|
page read and write
|
||
5C34000
|
trusted library allocation
|
page read and write
|
||
61FE000
|
trusted library allocation
|
page read and write
|
||
5BA9000
|
trusted library allocation
|
page read and write
|
||
5BC0000
|
trusted library allocation
|
page read and write
|
||
5220000
|
direct allocation
|
page execute and read and write
|
||
622F000
|
stack
|
page read and write
|
||
603F000
|
trusted library allocation
|
page read and write
|
||
5BDB000
|
trusted library allocation
|
page read and write
|
||
5C07000
|
trusted library allocation
|
page read and write
|
||
13AD000
|
heap
|
page read and write
|
||
13A6000
|
heap
|
page read and write
|
||
5BF2000
|
trusted library allocation
|
page read and write
|
||
5D22000
|
trusted library allocation
|
page read and write
|
||
6280000
|
trusted library allocation
|
page read and write
|
||
139A000
|
heap
|
page read and write
|
||
84B0000
|
trusted library allocation
|
page read and write
|
||
5D6B000
|
trusted library allocation
|
page read and write
|
||
5C21000
|
trusted library allocation
|
page read and write
|
||
1398000
|
heap
|
page read and write
|
||
8B6E000
|
stack
|
page read and write
|
||
60F1000
|
trusted library allocation
|
page read and write
|
||
87F0000
|
trusted library allocation
|
page read and write
|
||
4C01000
|
heap
|
page read and write
|
||
5090000
|
direct allocation
|
page read and write
|
||
6CEE000
|
stack
|
page read and write
|
||
60F3000
|
trusted library allocation
|
page read and write
|
||
6033000
|
trusted library allocation
|
page read and write
|
||
627E000
|
trusted library allocation
|
page read and write
|
||
6BAE000
|
stack
|
page read and write
|
||
6035000
|
trusted library allocation
|
page read and write
|
||
603B000
|
trusted library allocation
|
page read and write
|
||
5BAC000
|
trusted library allocation
|
page read and write
|
||
5BD0000
|
trusted library allocation
|
page read and write
|
||
5C23000
|
trusted library allocation
|
page read and write
|
||
383E000
|
stack
|
page read and write
|
||
8480000
|
direct allocation
|
page read and write
|
||
616B000
|
trusted library allocation
|
page read and write
|
||
5BA7000
|
trusted library allocation
|
page read and write
|
||
5BB2000
|
trusted library allocation
|
page read and write
|
||
1204000
|
heap
|
page read and write
|
||
61C8000
|
trusted library allocation
|
page read and write
|
||
2F37000
|
heap
|
page read and write
|
||
13AB000
|
heap
|
page read and write
|
||
61DD000
|
trusted library allocation
|
page read and write
|
||
5C2C000
|
trusted library allocation
|
page read and write
|
||
5C02000
|
trusted library allocation
|
page read and write
|
||
603F000
|
trusted library allocation
|
page read and write
|
||
6032000
|
trusted library allocation
|
page read and write
|
||
5C3D000
|
trusted library allocation
|
page read and write
|
||
660000
|
unkown
|
page read and write
|
||
5BDC000
|
trusted library allocation
|
page read and write
|
||
622F000
|
trusted library allocation
|
page read and write
|
||
138E000
|
heap
|
page read and write
|
||
1204000
|
heap
|
page read and write
|
||
5BD9000
|
trusted library allocation
|
page read and write
|
||
5C15000
|
trusted library allocation
|
page read and write
|
||
5BA4000
|
trusted library allocation
|
page read and write
|
||
12B0000
|
direct allocation
|
page read and write
|
||
6037000
|
trusted library allocation
|
page read and write
|
||
851C000
|
stack
|
page read and write
|
||
36FE000
|
stack
|
page read and write
|
||
3A7F000
|
stack
|
page read and write
|
||
1391000
|
heap
|
page read and write
|
||
5C32000
|
trusted library allocation
|
page read and write
|
||
5C0A000
|
trusted library allocation
|
page read and write
|
||
5B9B000
|
trusted library allocation
|
page read and write
|
||
3CFF000
|
stack
|
page read and write
|
||
6112000
|
trusted library allocation
|
page read and write
|
||
5C47000
|
trusted library allocation
|
page read and write
|
||
5BD9000
|
trusted library allocation
|
page read and write
|
||
1204000
|
heap
|
page read and write
|
||
5BDB000
|
trusted library allocation
|
page read and write
|
||
8480000
|
direct allocation
|
page read and write
|
||
5BDB000
|
trusted library allocation
|
page read and write
|
||
6038000
|
trusted library allocation
|
page read and write
|
||
4ABF000
|
stack
|
page read and write
|
||
5C29000
|
trusted library allocation
|
page read and write
|
||
603B000
|
trusted library allocation
|
page read and write
|
||
1383000
|
heap
|
page read and write
|
||
5B9F000
|
trusted library allocation
|
page read and write
|
||
138C000
|
heap
|
page read and write
|
||
5C2C000
|
trusted library allocation
|
page read and write
|
||
6210000
|
trusted library allocation
|
page read and write
|
||
6032000
|
trusted library allocation
|
page read and write
|
||
103B000
|
stack
|
page read and write
|
||
5BCA000
|
trusted library allocation
|
page read and write
|
||
66AB000
|
trusted library allocation
|
page read and write
|
||
1204000
|
heap
|
page read and write
|
||
55DF000
|
stack
|
page read and write
|
||
5BAF000
|
trusted library allocation
|
page read and write
|
||
5BF6000
|
trusted library allocation
|
page read and write
|
||
5C27000
|
trusted library allocation
|
page read and write
|
||
5B9A000
|
trusted library allocation
|
page read and write
|
||
5C29000
|
trusted library allocation
|
page read and write
|
||
138C000
|
heap
|
page read and write
|
||
5BA8000
|
trusted library allocation
|
page read and write
|
||
5C1B000
|
trusted library allocation
|
page read and write
|
||
5BDB000
|
trusted library allocation
|
page read and write
|
||
5BAC000
|
trusted library allocation
|
page read and write
|
||
7FAE000
|
stack
|
page read and write
|
||
73C87000
|
unkown
|
page readonly
|
||
5C27000
|
trusted library allocation
|
page read and write
|
||
49BE000
|
stack
|
page read and write
|
||
611E000
|
trusted library allocation
|
page read and write
|
||
5B92000
|
trusted library allocation
|
page read and write
|
||
12B0000
|
direct allocation
|
page read and write
|
||
60FF000
|
trusted library allocation
|
page read and write
|
||
139D000
|
heap
|
page read and write
|
||
5C08000
|
trusted library allocation
|
page read and write
|
||
6036000
|
trusted library allocation
|
page read and write
|
||
5BC6000
|
trusted library allocation
|
page read and write
|
||
5BD6000
|
trusted library allocation
|
page read and write
|
||
5C2C000
|
trusted library allocation
|
page read and write
|
||
6035000
|
trusted library allocation
|
page read and write
|
||
5C29000
|
trusted library allocation
|
page read and write
|
||
13A1000
|
heap
|
page read and write
|
||
1180000
|
heap
|
page read and write
|
||
8B2C000
|
stack
|
page read and write
|
||
588F000
|
stack
|
page read and write
|
||
139D000
|
heap
|
page read and write
|
||
867E000
|
stack
|
page read and write
|
||
5BAA000
|
trusted library allocation
|
page read and write
|
||
5BC1000
|
trusted library allocation
|
page read and write
|
||
5C92000
|
trusted library allocation
|
page read and write
|
||
5C23000
|
trusted library allocation
|
page read and write
|
||
5BCD000
|
trusted library allocation
|
page read and write
|
||
5C2C000
|
trusted library allocation
|
page read and write
|
||
87F8000
|
trusted library allocation
|
page read and write
|
||
5C37000
|
trusted library allocation
|
page read and write
|
||
139A000
|
heap
|
page read and write
|
||
9F50000
|
trusted library allocation
|
page read and write
|
||
8480000
|
direct allocation
|
page read and write
|
||
5C27000
|
trusted library allocation
|
page read and write
|
||
4BFF000
|
stack
|
page read and write
|
||
6241000
|
trusted library allocation
|
page read and write
|
||
5C02000
|
trusted library allocation
|
page read and write
|
||
60F5000
|
trusted library allocation
|
page read and write
|
||
5C27000
|
trusted library allocation
|
page read and write
|
||
5C27000
|
trusted library allocation
|
page read and write
|
||
6038000
|
trusted library allocation
|
page read and write
|
||
5BA4000
|
trusted library allocation
|
page read and write
|
||
87F2000
|
trusted library allocation
|
page read and write
|
||
5C94000
|
trusted library allocation
|
page read and write
|
||
5C2C000
|
trusted library allocation
|
page read and write
|
||
6032000
|
trusted library allocation
|
page read and write
|
||
5C37000
|
trusted library allocation
|
page read and write
|
||
5BEA000
|
trusted library allocation
|
page read and write
|
||
5BD9000
|
trusted library allocation
|
page read and write
|
||
5BB2000
|
trusted library allocation
|
page read and write
|
||
4C01000
|
heap
|
page read and write
|
||
5BF6000
|
trusted library allocation
|
page read and write
|
||
5C2C000
|
trusted library allocation
|
page read and write
|
||
5BBA000
|
trusted library allocation
|
page read and write
|
||
614B000
|
trusted library allocation
|
page read and write
|
||
6030000
|
trusted library allocation
|
page read and write
|
||
60D8000
|
trusted library allocation
|
page read and write
|
||
12B0000
|
direct allocation
|
page read and write
|
||
5C29000
|
trusted library allocation
|
page read and write
|
||
6034000
|
trusted library allocation
|
page read and write
|
||
357F000
|
stack
|
page read and write
|
||
347E000
|
stack
|
page read and write
|
||
13AC000
|
heap
|
page read and write
|
||
6036000
|
trusted library allocation
|
page read and write
|
||
62A8000
|
trusted library allocation
|
page read and write
|
||
5E30000
|
trusted library allocation
|
page read and write
|
||
487E000
|
stack
|
page read and write
|
||
617E000
|
trusted library allocation
|
page read and write
|
||
5BDA000
|
trusted library allocation
|
page read and write
|
||
5C47000
|
trusted library allocation
|
page read and write
|
||
1204000
|
heap
|
page read and write
|
||
37FF000
|
stack
|
page read and write
|
||
5BEC000
|
trusted library allocation
|
page read and write
|
||
6031000
|
trusted library allocation
|
page read and write
|
||
5220000
|
direct allocation
|
page execute and read and write
|
||
433F000
|
stack
|
page read and write
|
||
1204000
|
heap
|
page read and write
|
||
5BA4000
|
trusted library allocation
|
page read and write
|
||
5200000
|
direct allocation
|
page execute and read and write
|
||
6035000
|
trusted library allocation
|
page read and write
|
||
5BD2000
|
trusted library allocation
|
page read and write
|
||
62A2000
|
trusted library allocation
|
page read and write
|
||
5C02000
|
trusted library allocation
|
page read and write
|
||
615C000
|
trusted library allocation
|
page read and write
|
||
45FE000
|
stack
|
page read and write
|
||
958000
|
unkown
|
page execute and read and write
|
||
5BBA000
|
trusted library allocation
|
page read and write
|
||
60D1000
|
trusted library allocation
|
page read and write
|
||
5C7F000
|
trusted library allocation
|
page read and write
|
||
6E2E000
|
stack
|
page read and write
|
||
5C31000
|
trusted library allocation
|
page read and write
|
||
5B97000
|
trusted library allocation
|
page read and write
|
||
5BD0000
|
trusted library allocation
|
page read and write
|
||
6034000
|
trusted library allocation
|
page read and write
|
||
5C2C000
|
trusted library allocation
|
page read and write
|
||
5C29000
|
trusted library allocation
|
page read and write
|
||
73C71000
|
unkown
|
page execute read
|
||
5C2C000
|
trusted library allocation
|
page read and write
|
||
5C33000
|
trusted library allocation
|
page read and write
|
||
5CEB000
|
trusted library allocation
|
page read and write
|
||
6041000
|
trusted library allocation
|
page read and write
|
||
5B91000
|
trusted library allocation
|
page read and write
|
||
6143000
|
trusted library allocation
|
page read and write
|
||
5C27000
|
trusted library allocation
|
page read and write
|
||
5BDB000
|
trusted library allocation
|
page read and write
|
||
5220000
|
direct allocation
|
page execute and read and write
|
||
5BAC000
|
trusted library allocation
|
page read and write
|
||
5CC9000
|
stack
|
page read and write
|
||
5C3C000
|
trusted library allocation
|
page read and write
|
||
5C2C000
|
trusted library allocation
|
page read and write
|
||
75AE000
|
stack
|
page read and write
|
||
832F000
|
stack
|
page read and write
|
||
60DB000
|
trusted library allocation
|
page read and write
|
||
603C000
|
trusted library allocation
|
page read and write
|
||
5E03000
|
trusted library allocation
|
page read and write
|
||
5C23000
|
trusted library allocation
|
page read and write
|
||
1204000
|
heap
|
page read and write
|
||
5BA9000
|
trusted library allocation
|
page read and write
|
||
6034000
|
trusted library allocation
|
page read and write
|
||
5D63000
|
trusted library allocation
|
page read and write
|
||
84E0000
|
direct allocation
|
page read and write
|
||
5B9A000
|
trusted library allocation
|
page read and write
|
||
5BD2000
|
trusted library allocation
|
page read and write
|
||
8480000
|
direct allocation
|
page read and write
|
||
4C01000
|
heap
|
page read and write
|
||
5220000
|
direct allocation
|
page execute and read and write
|
||
80AF000
|
stack
|
page read and write
|
||
5BF2000
|
trusted library allocation
|
page read and write
|
||
5090000
|
direct allocation
|
page read and write
|
||
5230000
|
direct allocation
|
page execute and read and write
|
||
62D7000
|
trusted library allocation
|
page read and write
|
||
614C000
|
trusted library allocation
|
page read and write
|
||
5BBA000
|
trusted library allocation
|
page read and write
|
||
6100000
|
trusted library allocation
|
page read and write
|
||
5BD9000
|
trusted library allocation
|
page read and write
|
||
614A000
|
trusted library allocation
|
page read and write
|
||
13A8000
|
heap
|
page read and write
|
||
5B91000
|
trusted library allocation
|
page read and write
|
||
5C37000
|
trusted library allocation
|
page read and write
|
||
6032000
|
trusted library allocation
|
page read and write
|
||
8560000
|
direct allocation
|
page execute and read and write
|
||
5BAE000
|
trusted library allocation
|
page read and write
|
||
603A000
|
trusted library allocation
|
page read and write
|
||
6149000
|
trusted library allocation
|
page read and write
|
||
3FBE000
|
stack
|
page read and write
|
||
5BC1000
|
trusted library allocation
|
page read and write
|
||
1204000
|
heap
|
page read and write
|
||
5BA1000
|
trusted library allocation
|
page read and write
|
||
612F000
|
trusted library allocation
|
page read and write
|
||
5E3A000
|
trusted library allocation
|
page read and write
|
||
670A000
|
trusted library allocation
|
page execute and read and write
|
||
613B000
|
trusted library allocation
|
page read and write
|
||
5C3C000
|
trusted library allocation
|
page read and write
|
||
5EBC000
|
trusted library allocation
|
page read and write
|
||
60DD000
|
trusted library allocation
|
page read and write
|
||
5B8E000
|
stack
|
page read and write
|
||
12B0000
|
direct allocation
|
page read and write
|
||
13A6000
|
heap
|
page read and write
|
||
603D000
|
trusted library allocation
|
page read and write
|
||
5C27000
|
trusted library allocation
|
page read and write
|
||
5C2D000
|
trusted library allocation
|
page read and write
|
||
6039000
|
trusted library allocation
|
page read and write
|
||
5D73000
|
trusted library allocation
|
page read and write
|
||
603B000
|
trusted library allocation
|
page read and write
|
||
5BA4000
|
trusted library allocation
|
page read and write
|
||
60F8000
|
trusted library allocation
|
page read and write
|
||
5BDB000
|
trusted library allocation
|
page read and write
|
||
5C1D000
|
trusted library allocation
|
page read and write
|
||
5BCD000
|
trusted library allocation
|
page read and write
|
||
5C27000
|
trusted library allocation
|
page read and write
|
||
1204000
|
heap
|
page read and write
|
||
4C01000
|
heap
|
page read and write
|
||
5BCA000
|
trusted library allocation
|
page read and write
|
||
113B000
|
stack
|
page read and write
|
||
5BCA000
|
trusted library allocation
|
page read and write
|
||
5C9D000
|
trusted library allocation
|
page read and write
|
||
5B97000
|
trusted library allocation
|
page read and write
|
||
139C000
|
heap
|
page read and write
|
||
5BF0000
|
trusted library allocation
|
page read and write
|
||
5B9A000
|
trusted library allocation
|
page read and write
|
||
620E000
|
trusted library allocation
|
page read and write
|
||
6036000
|
trusted library allocation
|
page read and write
|
||
6041000
|
trusted library allocation
|
page read and write
|
||
5BAE000
|
trusted library allocation
|
page read and write
|
||
1391000
|
heap
|
page read and write
|
||
5C61000
|
trusted library allocation
|
page read and write
|
||
6131000
|
trusted library allocation
|
page read and write
|
||
1396000
|
heap
|
page read and write
|
||
1204000
|
heap
|
page read and write
|
||
5C43000
|
trusted library allocation
|
page read and write
|
||
1395000
|
heap
|
page read and write
|
||
5C2C000
|
trusted library allocation
|
page read and write
|
||
5C18000
|
trusted library allocation
|
page read and write
|
||
4C01000
|
heap
|
page read and write
|
||
5B9E000
|
trusted library allocation
|
page read and write
|
||
393F000
|
stack
|
page read and write
|
||
5BC7000
|
trusted library allocation
|
page read and write
|
||
5C0A000
|
trusted library allocation
|
page read and write
|
||
5E32000
|
trusted library allocation
|
page read and write
|
||
5BBA000
|
trusted library allocation
|
page read and write
|
||
5C29000
|
trusted library allocation
|
page read and write
|
||
3ABE000
|
stack
|
page read and write
|
||
13AB000
|
heap
|
page read and write
|
||
139E000
|
heap
|
page read and write
|
||
5C9B000
|
trusted library allocation
|
page read and write
|
||
60E6000
|
trusted library allocation
|
page read and write
|
||
6150000
|
trusted library allocation
|
page read and write
|
||
6037000
|
trusted library allocation
|
page read and write
|
||
615E000
|
trusted library allocation
|
page read and write
|
||
5C52000
|
trusted library allocation
|
page read and write
|
||
4C00000
|
heap
|
page read and write
|
||
614B000
|
trusted library allocation
|
page read and write
|
||
8480000
|
direct allocation
|
page read and write
|
||
45BF000
|
stack
|
page read and write
|
||
5C3C000
|
trusted library allocation
|
page read and write
|
||
6151000
|
trusted library allocation
|
page read and write
|
||
5B97000
|
trusted library allocation
|
page read and write
|
||
5BBA000
|
trusted library allocation
|
page read and write
|
||
6180000
|
trusted library allocation
|
page read and write
|
||
5C29000
|
trusted library allocation
|
page read and write
|
||
611E000
|
trusted library allocation
|
page read and write
|
||
796E000
|
stack
|
page read and write
|
||
5B9C000
|
trusted library allocation
|
page read and write
|
||
5C23000
|
trusted library allocation
|
page read and write
|
||
36BF000
|
stack
|
page read and write
|
||
658A000
|
trusted library allocation
|
page execute and read and write
|
||
561D000
|
stack
|
page read and write
|
||
5BD6000
|
trusted library allocation
|
page read and write
|
||
5C27000
|
trusted library allocation
|
page read and write
|
||
5720000
|
remote allocation
|
page read and write
|
||
8A2C000
|
stack
|
page read and write
|
||
6115000
|
trusted library allocation
|
page read and write
|
||
1204000
|
heap
|
page read and write
|
||
AF2000
|
unkown
|
page execute and write copy
|
||
603F000
|
trusted library allocation
|
page read and write
|
||
5BBA000
|
trusted library allocation
|
page read and write
|
||
742F000
|
stack
|
page read and write
|
||
307F000
|
stack
|
page read and write
|
||
5C27000
|
trusted library allocation
|
page read and write
|
||
139E000
|
heap
|
page read and write
|
||
1326000
|
heap
|
page read and write
|
||
4C10000
|
heap
|
page read and write
|
||
5BCA000
|
trusted library allocation
|
page read and write
|
||
846F000
|
stack
|
page read and write
|
||
5090000
|
direct allocation
|
page read and write
|
||
5720000
|
remote allocation
|
page read and write
|
||
5C2C000
|
trusted library allocation
|
page read and write
|
||
61B8000
|
trusted library allocation
|
page read and write
|
||
4C01000
|
heap
|
page read and write
|
||
5BB2000
|
trusted library allocation
|
page read and write
|
||
138B000
|
heap
|
page read and write
|
||
539D000
|
stack
|
page read and write
|
||
6032000
|
trusted library allocation
|
page read and write
|
||
959000
|
unkown
|
page execute and write copy
|
||
6040000
|
trusted library allocation
|
page read and write
|
||
5C27000
|
trusted library allocation
|
page read and write
|
||
5BDC000
|
trusted library allocation
|
page read and write
|
||
5C07000
|
trusted library allocation
|
page read and write
|
||
5BDB000
|
trusted library allocation
|
page read and write
|
||
5BF9000
|
trusted library allocation
|
page read and write
|
||
5C0A000
|
trusted library allocation
|
page read and write
|
||
139E000
|
heap
|
page read and write
|
||
6033000
|
trusted library allocation
|
page read and write
|
||
138C000
|
heap
|
page read and write
|
||
5720000
|
remote allocation
|
page read and write
|
||
5240000
|
direct allocation
|
page execute and read and write
|
||
7BEE000
|
stack
|
page read and write
|
||
6033000
|
trusted library allocation
|
page read and write
|
||
5BAE000
|
trusted library allocation
|
page read and write
|
||
5B9A000
|
trusted library allocation
|
page read and write
|
||
6033000
|
trusted library allocation
|
page read and write
|
||
5C27000
|
trusted library allocation
|
page read and write
|
||
62AA000
|
trusted library allocation
|
page read and write
|
||
5C15000
|
trusted library allocation
|
page read and write
|
||
1204000
|
heap
|
page read and write
|
||
5B9A000
|
trusted library allocation
|
page read and write
|
||
6101000
|
trusted library allocation
|
page read and write
|
||
6129000
|
stack
|
page read and write
|
||
5C2C000
|
trusted library allocation
|
page read and write
|
||
6038000
|
trusted library allocation
|
page read and write
|
||
5220000
|
direct allocation
|
page execute and read and write
|
||
12B0000
|
direct allocation
|
page read and write
|
||
6167000
|
trusted library allocation
|
page read and write
|
||
732E000
|
stack
|
page read and write
|
||
6580000
|
trusted library allocation
|
page read and write
|
||
5BE4000
|
trusted library allocation
|
page read and write
|
||
5C27000
|
trusted library allocation
|
page read and write
|
||
5C15000
|
trusted library allocation
|
page read and write
|
||
12B0000
|
direct allocation
|
page read and write
|
||
6824000
|
trusted library allocation
|
page execute and read and write
|
||
6035000
|
trusted library allocation
|
page read and write
|
||
139E000
|
heap
|
page read and write
|
||
5BA7000
|
trusted library allocation
|
page read and write
|
||
5C0A000
|
trusted library allocation
|
page read and write
|
||
5BF5000
|
trusted library allocation
|
page read and write
|
||
13A4000
|
heap
|
page read and write
|
||
1200000
|
heap
|
page read and write
|
||
603D000
|
trusted library allocation
|
page read and write
|
||
60DD000
|
trusted library allocation
|
page read and write
|
||
41FF000
|
stack
|
page read and write
|
||
571E000
|
stack
|
page read and write
|
||
5C29000
|
trusted library allocation
|
page read and write
|
||
6032000
|
trusted library allocation
|
page read and write
|
||
5BDB000
|
trusted library allocation
|
page read and write
|
||
5BE8000
|
trusted library allocation
|
page read and write
|
||
73C70000
|
unkown
|
page readonly
|
||
5BC3000
|
trusted library allocation
|
page read and write
|
||
5C1A000
|
trusted library allocation
|
page read and write
|
||
5BDB000
|
trusted library allocation
|
page read and write
|
||
139B000
|
heap
|
page read and write
|
||
661000
|
unkown
|
page execute and read and write
|
||
6B9000
|
unkown
|
page execute and read and write
|
||
6165000
|
trusted library allocation
|
page read and write
|
||
5BA1000
|
trusted library allocation
|
page read and write
|
||
6120000
|
trusted library allocation
|
page read and write
|
||
5BE8000
|
trusted library allocation
|
page read and write
|
||
5C29000
|
trusted library allocation
|
page read and write
|
||
5BBA000
|
trusted library allocation
|
page read and write
|
||
5BDB000
|
trusted library allocation
|
page read and write
|
||
746E000
|
stack
|
page read and write
|
||
522E000
|
stack
|
page read and write
|
||
5C15000
|
trusted library allocation
|
page read and write
|
||
7D2E000
|
stack
|
page read and write
|
||
138E000
|
heap
|
page read and write
|
||
139A000
|
heap
|
page read and write
|
||
1204000
|
heap
|
page read and write
|
||
5BD2000
|
trusted library allocation
|
page read and write
|
||
12B0000
|
direct allocation
|
page read and write
|
||
5BAF000
|
trusted library allocation
|
page read and write
|
||
4C01000
|
heap
|
page read and write
|
||
4C01000
|
heap
|
page read and write
|
||
6586000
|
trusted library allocation
|
page read and write
|
||
1373000
|
heap
|
page read and write
|
||
5C33000
|
trusted library allocation
|
page read and write
|
||
12F7000
|
heap
|
page read and write
|
||
61A8000
|
trusted library allocation
|
page read and write
|
||
8480000
|
direct allocation
|
page read and write
|
||
1204000
|
heap
|
page read and write
|
||
5B9A000
|
trusted library allocation
|
page read and write
|
||
61AA000
|
trusted library allocation
|
page read and write
|
||
60D3000
|
trusted library allocation
|
page read and write
|
||
5C29000
|
trusted library allocation
|
page read and write
|
||
8480000
|
direct allocation
|
page read and write
|
||
6040000
|
trusted library allocation
|
page read and write
|
||
60DF000
|
trusted library allocation
|
page read and write
|
||
6F2F000
|
stack
|
page read and write
|
||
6031000
|
trusted library allocation
|
page read and write
|
||
9FD0000
|
trusted library allocation
|
page read and write
|
||
13AC000
|
heap
|
page read and write
|
||
1204000
|
heap
|
page read and write
|
||
5B9A000
|
trusted library allocation
|
page read and write
|
||
5C15000
|
trusted library allocation
|
page read and write
|
||
5BEA000
|
trusted library allocation
|
page read and write
|
||
5BDB000
|
trusted library allocation
|
page read and write
|
||
6030000
|
trusted library allocation
|
page read and write
|
||
5C2C000
|
trusted library allocation
|
page read and write
|
||
5C2C000
|
trusted library allocation
|
page read and write
|
||
578E000
|
stack
|
page read and write
|
||
5C9A000
|
trusted library allocation
|
page read and write
|
||
5C27000
|
trusted library allocation
|
page read and write
|
||
60D9000
|
trusted library allocation
|
page read and write
|
||
6037000
|
trusted library allocation
|
page read and write
|
||
11EE000
|
stack
|
page read and write
|
||
13AC000
|
heap
|
page read and write
|
||
51F0000
|
direct allocation
|
page execute and read and write
|
||
31FE000
|
stack
|
page read and write
|
||
5BA4000
|
trusted library allocation
|
page read and write
|
||
62C0000
|
direct allocation
|
page read and write
|
||
76AF000
|
stack
|
page read and write
|
||
84E0000
|
direct allocation
|
page read and write
|
||
483F000
|
stack
|
page read and write
|
||
13AC000
|
heap
|
page read and write
|
||
59FF000
|
stack
|
page read and write
|
||
5BF1000
|
trusted library allocation
|
page read and write
|
||
4C01000
|
heap
|
page read and write
|
||
8480000
|
direct allocation
|
page read and write
|
||
5C29000
|
trusted library allocation
|
page read and write
|
||
58FE000
|
stack
|
page read and write
|
||
756F000
|
stack
|
page read and write
|
||
5BA9000
|
trusted library allocation
|
page read and write
|
||
5C3D000
|
trusted library allocation
|
page read and write
|
||
5C27000
|
trusted library allocation
|
page read and write
|
||
5C07000
|
trusted library allocation
|
page read and write
|
||
5C27000
|
trusted library allocation
|
page read and write
|
||
1204000
|
heap
|
page read and write
|
||
94A000
|
unkown
|
page execute and read and write
|
||
614A000
|
trusted library allocation
|
page read and write
|
||
12C0000
|
heap
|
page read and write
|
||
60D5000
|
trusted library allocation
|
page read and write
|
||
AF1000
|
unkown
|
page execute and read and write
|
||
4C01000
|
heap
|
page read and write
|
||
5C12000
|
trusted library allocation
|
page read and write
|
||
6194000
|
trusted library allocation
|
page read and write
|
||
46FF000
|
stack
|
page read and write
|
||
72EF000
|
stack
|
page read and write
|
||
5BA4000
|
trusted library allocation
|
page read and write
|
||
603B000
|
trusted library allocation
|
page read and write
|
||
6231000
|
trusted library allocation
|
page read and write
|
||
5BBA000
|
trusted library allocation
|
page read and write
|
||
5C27000
|
trusted library allocation
|
page read and write
|
||
5C21000
|
trusted library allocation
|
page read and write
|
||
692F000
|
stack
|
page read and write
|
||
5BBA000
|
trusted library allocation
|
page read and write
|
||
5BA8000
|
trusted library allocation
|
page read and write
|
||
6035000
|
trusted library allocation
|
page read and write
|
||
5C0A000
|
trusted library allocation
|
page read and write
|
||
1393000
|
heap
|
page read and write
|
||
626B000
|
stack
|
page read and write
|
||
77EF000
|
stack
|
page read and write
|
||
6111000
|
trusted library allocation
|
page read and write
|
||
5BB2000
|
trusted library allocation
|
page read and write
|
||
5BBD000
|
trusted library allocation
|
page read and write
|
||
4C01000
|
heap
|
page read and write
|
||
5250000
|
direct allocation
|
page execute and read and write
|
||
62A0000
|
trusted library allocation
|
page read and write
|
||
5C29000
|
trusted library allocation
|
page read and write
|
||
6169000
|
trusted library allocation
|
page read and write
|
||
61CA000
|
trusted library allocation
|
page read and write
|
||
5C1B000
|
trusted library allocation
|
page read and write
|
||
4C01000
|
heap
|
page read and write
|
||
5C18000
|
trusted library allocation
|
page read and write
|
||
13AC000
|
heap
|
page read and write
|
||
5C2C000
|
trusted library allocation
|
page read and write
|
||
2F30000
|
heap
|
page read and write
|
||
5C22000
|
trusted library allocation
|
page read and write
|
||
6B6F000
|
stack
|
page read and write
|
||
6813000
|
trusted library allocation
|
page execute and read and write
|
||
5C3C000
|
trusted library allocation
|
page read and write
|
||
5BFB000
|
trusted library allocation
|
page read and write
|
||
437E000
|
stack
|
page read and write
|
||
62CB000
|
trusted library allocation
|
page read and write
|
||
782E000
|
stack
|
page read and write
|
||
5C29000
|
trusted library allocation
|
page read and write
|
||
5BDB000
|
trusted library allocation
|
page read and write
|
||
1305000
|
heap
|
page read and write
|
||
8480000
|
direct allocation
|
page read and write
|
||
1204000
|
heap
|
page read and write
|
||
4C01000
|
heap
|
page read and write
|
||
138E000
|
heap
|
page read and write
|
||
5BAB000
|
trusted library allocation
|
page read and write
|
||
1204000
|
heap
|
page read and write
|
||
839000
|
unkown
|
page execute and read and write
|
||
5B91000
|
trusted library allocation
|
page read and write
|
||
5C02000
|
trusted library allocation
|
page read and write
|
||
497F000
|
stack
|
page read and write
|
||
6261000
|
trusted library allocation
|
page read and write
|
||
60D3000
|
trusted library allocation
|
page read and write
|
||
6030000
|
trusted library allocation
|
page read and write
|
||
5C2C000
|
trusted library allocation
|
page read and write
|
||
5BCA000
|
trusted library allocation
|
page read and write
|
||
5BCA000
|
trusted library allocation
|
page read and write
|
||
6164000
|
trusted library allocation
|
page read and write
|
||
836E000
|
stack
|
page read and write
|
||
6034000
|
trusted library allocation
|
page read and write
|
||
5BA4000
|
trusted library allocation
|
page read and write
|
||
35BE000
|
stack
|
page read and write
|
||
5C2C000
|
trusted library allocation
|
page read and write
|
||
5BFB000
|
trusted library allocation
|
page read and write
|
||
5C2C000
|
trusted library allocation
|
page read and write
|
||
616D000
|
trusted library allocation
|
page read and write
|
||
5BF2000
|
trusted library allocation
|
page read and write
|
||
6114000
|
trusted library allocation
|
page read and write
|
||
615D000
|
trusted library allocation
|
page read and write
|
||
6A6E000
|
stack
|
page read and write
|
||
61DB000
|
trusted library allocation
|
page read and write
|
||
8480000
|
direct allocation
|
page read and write
|
||
645A000
|
trusted library allocation
|
page read and write
|
||
5BBA000
|
trusted library allocation
|
page read and write
|
||
5C9C000
|
trusted library allocation
|
page read and write
|
||
139D000
|
heap
|
page read and write
|
||
5EBA000
|
trusted library allocation
|
page read and write
|
||
5C29000
|
trusted library allocation
|
page read and write
|
||
6153000
|
trusted library allocation
|
page read and write
|
||
61FC000
|
trusted library allocation
|
page read and write
|
||
5C29000
|
trusted library allocation
|
page read and write
|
||
4C01000
|
heap
|
page read and write
|
||
5BD9000
|
trusted library allocation
|
page read and write
|
||
139E000
|
heap
|
page read and write
|
||
139E000
|
heap
|
page read and write
|
||
6036000
|
trusted library allocation
|
page read and write
|
||
5BD9000
|
trusted library allocation
|
page read and write
|
||
5090000
|
direct allocation
|
page read and write
|
||
610F000
|
trusted library allocation
|
page read and write
|
||
139B000
|
heap
|
page read and write
|
||
6141000
|
trusted library allocation
|
page read and write
|
||
397E000
|
stack
|
page read and write
|
||
5C2D000
|
trusted library allocation
|
page read and write
|
||
5BDB000
|
trusted library allocation
|
page read and write
|
||
603D000
|
trusted library allocation
|
page read and write
|
||
5BAE000
|
trusted library allocation
|
page read and write
|
||
12B0000
|
direct allocation
|
page read and write
|
||
614F000
|
trusted library allocation
|
page read and write
|
||
8530000
|
direct allocation
|
page execute and read and write
|
||
62D9000
|
trusted library allocation
|
page read and write
|
||
4C01000
|
heap
|
page read and write
|
||
5C02000
|
trusted library allocation
|
page read and write
|
||
5C40000
|
trusted library allocation
|
page read and write
|
||
6191000
|
trusted library allocation
|
page read and write
|
||
5C29000
|
trusted library allocation
|
page read and write
|
||
1170000
|
heap
|
page read and write
|
||
30BE000
|
stack
|
page read and write
|
||
5BE4000
|
trusted library allocation
|
page read and write
|
||
5C4B000
|
trusted library allocation
|
page read and write
|
||
7F6F000
|
stack
|
page read and write
|
||
5C0A000
|
trusted library allocation
|
page read and write
|
||
5BAA000
|
trusted library allocation
|
page read and write
|
||
5BC7000
|
trusted library allocation
|
page read and write
|
||
5C27000
|
trusted library allocation
|
page read and write
|
||
5050000
|
heap
|
page read and write
|
||
913000
|
unkown
|
page execute and read and write
|
||
5C2C000
|
trusted library allocation
|
page read and write
|
||
3E7E000
|
stack
|
page read and write
|
||
5C29000
|
trusted library allocation
|
page read and write
|
||
5C02000
|
trusted library allocation
|
page read and write
|
||
8480000
|
direct allocation
|
page read and write
|
||
6572000
|
trusted library allocation
|
page read and write
|
||
5B91000
|
trusted library allocation
|
page read and write
|
||
5C23000
|
trusted library allocation
|
page read and write
|
||
6037000
|
trusted library allocation
|
page read and write
|
||
6034000
|
trusted library allocation
|
page read and write
|
||
139F000
|
heap
|
page read and write
|
||
611C000
|
trusted library allocation
|
page read and write
|
||
6035000
|
trusted library allocation
|
page read and write
|
||
5BC1000
|
trusted library allocation
|
page read and write
|
||
5BCA000
|
trusted library allocation
|
page read and write
|
||
12B0000
|
direct allocation
|
page read and write
|
||
5210000
|
direct allocation
|
page execute and read and write
|
||
168F000
|
stack
|
page read and write
|
||
6039000
|
trusted library allocation
|
page read and write
|
||
5C27000
|
trusted library allocation
|
page read and write
|
||
5B91000
|
trusted library allocation
|
page read and write
|
||
12B0000
|
direct allocation
|
page read and write
|
||
661000
|
unkown
|
page execute and write copy
|
||
5C29000
|
trusted library allocation
|
page read and write
|
||
60EA000
|
trusted library allocation
|
page read and write
|
||
5C27000
|
trusted library allocation
|
page read and write
|
||
5C0A000
|
trusted library allocation
|
page read and write
|
||
5BD2000
|
trusted library allocation
|
page read and write
|
||
6034000
|
trusted library allocation
|
page read and write
|
||
5BD2000
|
trusted library allocation
|
page read and write
|
||
5C26000
|
trusted library allocation
|
page read and write
|
||
614E000
|
trusted library allocation
|
page read and write
|
||
87FA000
|
trusted library allocation
|
page read and write
|
||
6032000
|
trusted library allocation
|
page read and write
|
||
473E000
|
stack
|
page read and write
|
||
603A000
|
trusted library allocation
|
page read and write
|
||
7E6E000
|
stack
|
page read and write
|
||
5BBF000
|
trusted library allocation
|
page read and write
|
||
617F000
|
trusted library allocation
|
page read and write
|
||
5CB3000
|
trusted library allocation
|
page read and write
|
||
5BF9000
|
trusted library allocation
|
page read and write
|
||
5BCA000
|
trusted library allocation
|
page read and write
|
||
6034000
|
trusted library allocation
|
page read and write
|
||
6105000
|
trusted library allocation
|
page read and write
|
||
5C2B000
|
trusted library allocation
|
page read and write
|
||
5C7F000
|
trusted library allocation
|
page read and write
|
||
5CCB000
|
trusted library allocation
|
page read and write
|
||
603F000
|
trusted library allocation
|
page read and write
|
||
5BC7000
|
trusted library allocation
|
page read and write
|
||
5BAC000
|
trusted library allocation
|
page read and write
|
||
13A1000
|
heap
|
page read and write
|
||
60F3000
|
trusted library allocation
|
page read and write
|
||
5B91000
|
trusted library allocation
|
page read and write
|
||
5B9D000
|
trusted library allocation
|
page read and write
|
||
5D3B000
|
trusted library allocation
|
page read and write
|
||
50D4000
|
direct allocation
|
page read and write
|
||
5BF7000
|
trusted library allocation
|
page read and write
|
||
706F000
|
stack
|
page read and write
|
||
139E000
|
heap
|
page read and write
|
||
5A8E000
|
stack
|
page read and write
|
||
5220000
|
direct allocation
|
page execute and read and write
|
||
6263000
|
trusted library allocation
|
page read and write
|
||
12CE000
|
heap
|
page read and write
|
||
5BF1000
|
trusted library allocation
|
page read and write
|
||
5BA4000
|
trusted library allocation
|
page read and write
|
||
71AF000
|
stack
|
page read and write
|
||
5C29000
|
trusted library allocation
|
page read and write
|
||
7CEF000
|
stack
|
page read and write
|
||
8C6E000
|
stack
|
page read and write
|
||
4C01000
|
heap
|
page read and write
|
||
3E3F000
|
stack
|
page read and write
|
||
60EE000
|
trusted library allocation
|
page read and write
|
||
6204000
|
trusted library allocation
|
page read and write
|
||
6114000
|
trusted library allocation
|
page read and write
|
||
50DB000
|
stack
|
page read and write
|
||
6CAF000
|
stack
|
page read and write
|
||
5BA1000
|
trusted library allocation
|
page read and write
|
||
5C29000
|
trusted library allocation
|
page read and write
|
||
5C52000
|
trusted library allocation
|
page read and write
|
||
5C65000
|
trusted library allocation
|
page read and write
|
||
660000
|
unkown
|
page readonly
|
||
5C29000
|
trusted library allocation
|
page read and write
|
||
3D3E000
|
stack
|
page read and write
|
||
6F6E000
|
stack
|
page read and write
|
||
5E76000
|
trusted library allocation
|
page read and write
|
||
7BAF000
|
stack
|
page read and write
|
||
5BCA000
|
trusted library allocation
|
page read and write
|
||
1391000
|
heap
|
page read and write
|
||
13AC000
|
heap
|
page read and write
|
||
12B0000
|
direct allocation
|
page read and write
|
||
5BD9000
|
trusted library allocation
|
page read and write
|
||
447F000
|
stack
|
page read and write
|
||
5BDE000
|
trusted library allocation
|
page read and write
|
||
5BF2000
|
trusted library allocation
|
page read and write
|
||
5BD4000
|
trusted library allocation
|
page read and write
|
||
70AE000
|
stack
|
page read and write
|
||
549D000
|
stack
|
page read and write
|
||
5C26000
|
trusted library allocation
|
page read and write
|
||
5BB2000
|
trusted library allocation
|
page read and write
|
||
1332000
|
heap
|
page read and write
|
||
5BA1000
|
trusted library allocation
|
page read and write
|
||
5BFA000
|
trusted library allocation
|
page read and write
|
||
822E000
|
stack
|
page read and write
|
||
5BE3000
|
trusted library allocation
|
page read and write
|
||
8570000
|
heap
|
page read and write
|
||
5C29000
|
trusted library allocation
|
page read and write
|
||
137F000
|
heap
|
page read and write
|
||
5B9D000
|
trusted library allocation
|
page read and write
|
||
5C7F000
|
trusted library allocation
|
page read and write
|
||
6032000
|
trusted library allocation
|
page read and write
|
||
5D1E000
|
stack
|
page read and write
|
||
6206000
|
trusted library allocation
|
page read and write
|
||
60FE000
|
trusted library allocation
|
page read and write
|
||
603E000
|
trusted library allocation
|
page read and write
|
||
5C3C000
|
trusted library allocation
|
page read and write
|
||
12B0000
|
direct allocation
|
page read and write
|
||
13A8000
|
heap
|
page read and write
|
||
5BDB000
|
trusted library allocation
|
page read and write
|
||
5C67000
|
trusted library allocation
|
page read and write
|
||
60F6000
|
trusted library allocation
|
page read and write
|
||
62CD000
|
trusted library allocation
|
page read and write
|
||
6036000
|
trusted library allocation
|
page read and write
|
||
6563000
|
trusted library allocation
|
page read and write
|
||
5BD9000
|
trusted library allocation
|
page read and write
|
||
5C3D000
|
trusted library allocation
|
page read and write
|
||
5BCA000
|
trusted library allocation
|
page read and write
|
||
5C02000
|
trusted library allocation
|
page read and write
|
||
5C29000
|
trusted library allocation
|
page read and write
|
||
5BDB000
|
trusted library allocation
|
page read and write
|
||
6A2F000
|
stack
|
page read and write
|
||
603A000
|
trusted library allocation
|
page read and write
|
||
7E2F000
|
stack
|
page read and write
|
||
6117000
|
trusted library allocation
|
page read and write
|
||
1390000
|
heap
|
page read and write
|
||
333E000
|
stack
|
page read and write
|
||
40BF000
|
stack
|
page read and write
|
||
5C15000
|
trusted library allocation
|
page read and write
|
||
5C45000
|
trusted library allocation
|
page read and write
|
||
5B90000
|
trusted library allocation
|
page read and write
|
||
5C02000
|
trusted library allocation
|
page read and write
|
||
615B000
|
trusted library allocation
|
page read and write
|
||
603F000
|
trusted library allocation
|
page read and write
|
||
5C18000
|
trusted library allocation
|
page read and write
|
||
60E8000
|
trusted library allocation
|
page read and write
|
||
6151000
|
trusted library allocation
|
page read and write
|
||
76EE000
|
stack
|
page read and write
|
||
84E0000
|
direct allocation
|
page read and write
|
||
5C2D000
|
trusted library allocation
|
page read and write
|
||
6A5000
|
unkown
|
page execute and read and write
|
||
5C18000
|
trusted library allocation
|
page read and write
|
||
2F7C000
|
stack
|
page read and write
|
||
3BBF000
|
stack
|
page read and write
|
||
5E79000
|
trusted library allocation
|
page read and write
|
||
792F000
|
stack
|
page read and write
|
||
6041000
|
trusted library allocation
|
page read and write
|
||
5BAD000
|
trusted library allocation
|
page read and write
|
||
8480000
|
trusted library allocation
|
page read and write
|
||
62AE000
|
stack
|
page read and write
|
||
4C01000
|
heap
|
page read and write
|
||
6037000
|
trusted library allocation
|
page read and write
|
||
6030000
|
trusted library allocation
|
page read and write
|
||
31BF000
|
stack
|
page read and write
|
||
603B000
|
trusted library allocation
|
page read and write
|
||
61B6000
|
trusted library allocation
|
page read and write
|
||
5BAB000
|
trusted library allocation
|
page read and write
|
||
617D000
|
trusted library allocation
|
page read and write
|
||
2F2F000
|
stack
|
page read and write
|
||
13A8000
|
heap
|
page read and write
|
||
32FF000
|
stack
|
page read and write
|
||
617A000
|
trusted library allocation
|
page read and write
|
||
5BDB000
|
trusted library allocation
|
page read and write
|
||
7AAE000
|
stack
|
page read and write
|
||
5C29000
|
trusted library allocation
|
page read and write
|
||
7A6F000
|
stack
|
page read and write
|
||
5A43000
|
heap
|
page read and write
|
||
5BCA000
|
trusted library allocation
|
page read and write
|
||
4C01000
|
heap
|
page read and write
|
||
5BDB000
|
trusted library allocation
|
page read and write
|
||
1204000
|
heap
|
page read and write
|
||
6822000
|
trusted library allocation
|
page execute and read and write
|
||
6038000
|
trusted library allocation
|
page read and write
|
||
5B9B000
|
trusted library allocation
|
page read and write
|
||
71EE000
|
stack
|
page read and write
|
||
13A8000
|
heap
|
page read and write
|
||
6039000
|
trusted library allocation
|
page read and write
|
||
5BD8000
|
trusted library allocation
|
page read and write
|
||
5BF6000
|
trusted library allocation
|
page read and write
|
||
4C01000
|
heap
|
page read and write
|
||
5BDB000
|
trusted library allocation
|
page read and write
|
||
6039000
|
trusted library allocation
|
page read and write
|
||
6149000
|
trusted library allocation
|
page read and write
|
||
940000
|
unkown
|
page execute and read and write
|
||
3F7F000
|
stack
|
page read and write
|
||
6DEF000
|
stack
|
page read and write
|
||
5C2C000
|
trusted library allocation
|
page read and write
|
||
73C86000
|
unkown
|
page execute and read and write
|
||
5BC1000
|
trusted library allocation
|
page read and write
|
||
535C000
|
stack
|
page read and write
|
||
3BFE000
|
stack
|
page read and write
|
||
4C01000
|
heap
|
page read and write
|
||
158E000
|
stack
|
page read and write
|
||
623F000
|
trusted library allocation
|
page read and write
|
||
5C29000
|
trusted library allocation
|
page read and write
|
||
5BD9000
|
trusted library allocation
|
page read and write
|
||
5C2C000
|
trusted library allocation
|
page read and write
|
||
5BBA000
|
trusted library allocation
|
page read and write
|
||
603E000
|
trusted library allocation
|
page read and write
|
||
6B7000
|
unkown
|
page read and write
|
||
1349000
|
heap
|
page read and write
|
||
6032000
|
trusted library allocation
|
page read and write
|
||
5C2C000
|
trusted library allocation
|
page read and write
|
||
5C21000
|
trusted library allocation
|
page read and write
|
||
5C29000
|
trusted library allocation
|
page read and write
|
||
6B7000
|
unkown
|
page write copy
|
||
8480000
|
direct allocation
|
page read and write
|
||
5B97000
|
trusted library allocation
|
page read and write
|
||
5C29000
|
trusted library allocation
|
page read and write
|
||
5BB2000
|
trusted library allocation
|
page read and write
|
||
6032000
|
trusted library allocation
|
page read and write
|
||
5BD9000
|
trusted library allocation
|
page read and write
|
||
60EC000
|
trusted library allocation
|
page read and write
|
||
5BDE000
|
trusted library allocation
|
page read and write
|
||
5C27000
|
trusted library allocation
|
page read and write
|
||
5C26000
|
trusted library allocation
|
page read and write
|
||
13A8000
|
heap
|
page read and write
|
||
1204000
|
heap
|
page read and write
|
||
958000
|
unkown
|
page execute and write copy
|
||
5C37000
|
trusted library allocation
|
page read and write
|
||
6039000
|
trusted library allocation
|
page read and write
|
||
617C000
|
trusted library allocation
|
page read and write
|
||
618F000
|
trusted library allocation
|
page read and write
|
||
423E000
|
stack
|
page read and write
|
||
44BE000
|
stack
|
page read and write
|
||
5C27000
|
trusted library allocation
|
page read and write
|
||
12A0000
|
heap
|
page read and write
|
||
73C8D000
|
unkown
|
page read and write
|
||
1391000
|
heap
|
page read and write
|
||
5C1B000
|
trusted library allocation
|
page read and write
|
||
5C94000
|
trusted library allocation
|
page read and write
|
||
5C3C000
|
trusted library allocation
|
page read and write
|
||
5C29000
|
trusted library allocation
|
page read and write
|
||
8480000
|
direct allocation
|
page read and write
|
||
5269000
|
trusted library allocation
|
page read and write
|
||
5BC6000
|
trusted library allocation
|
page read and write
|
There are 924 hidden memdumps, click here to show them.
DOM / HTML
URL
|
Malicious
|
|
---|---|---|
https://learn.microsoft.com/en-us/dotnet/framework/install/application-not-started?version=(null)&processName=file.exe&platform=0009&osver=6&isServer=0&shimver=4.0.30319.0
|
||
https://learn.microsoft.com/en-us/dotnet/framework/install/application-not-started?version=(null)&processName=file.exe&platform=0009&osver=6&isServer=0&shimver=4.0.30319.0
|
||
https://learn.microsoft.com/en-us/dotnet/framework/install/application-not-started?version=(null)&processName=file.exe&platform=0009&osver=6&isServer=0&shimver=4.0.30319.0
|
||
https://learn.microsoft.com/en-us/dotnet/framework/install/application-not-started?version=(null)&processName=file.exe&platform=0009&osver=6&isServer=0&shimver=4.0.30319.0
|
||
https://learn.microsoft.com/en-us/dotnet/framework/install/application-not-started?version=(null)&processName=file.exe&platform=0009&osver=6&isServer=0&shimver=4.0.30319.0
|