Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
file.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
initial sample
|
||
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Docs.lnk
|
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command
line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Sun Nov 24 06:44:18 2024, atime=Mon Oct 2 20:46:57
2023, length=1210144, window=hide
|
dropped
|
||
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Gmail.lnk
|
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command
line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Sun Nov 24 06:44:18 2024, atime=Mon Oct 2 20:46:57
2023, length=1210144, window=hide
|
dropped
|
||
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Google Drive.lnk
|
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command
line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Thu Oct 5 08:59:33 2023, atime=Mon Oct 2 20:46:57
2023, length=1210144, window=hide
|
dropped
|
||
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Sheets.lnk
|
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command
line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Sun Nov 24 06:44:18 2024, atime=Mon Oct 2 20:46:57
2023, length=1210144, window=hide
|
dropped
|
||
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Slides.lnk
|
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command
line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Sun Nov 24 06:44:18 2024, atime=Mon Oct 2 20:46:57
2023, length=1210144, window=hide
|
dropped
|
||
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\YouTube.lnk
|
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command
line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Sun Nov 24 06:44:18 2024, atime=Mon Oct 2 20:46:57
2023, length=1210144, window=hide
|
dropped
|
||
Chrome Cache Entry: 100
|
PNG image data, 533 x 478, 8-bit/color RGBA, non-interlaced
|
dropped
|
||
Chrome Cache Entry: 101
|
ASCII text, with very long lines (65536), with no line terminators
|
downloaded
|
||
Chrome Cache Entry: 102
|
ASCII text, with very long lines (65410)
|
dropped
|
||
Chrome Cache Entry: 103
|
JSON data
|
dropped
|
||
Chrome Cache Entry: 104
|
ASCII text, with very long lines (65410)
|
downloaded
|
||
Chrome Cache Entry: 105
|
JSON data
|
downloaded
|
||
Chrome Cache Entry: 106
|
PNG image data, 533 x 478, 8-bit/color RGBA, non-interlaced
|
downloaded
|
||
Chrome Cache Entry: 107
|
ASCII text, with very long lines (52717), with no line terminators
|
dropped
|
||
Chrome Cache Entry: 108
|
ASCII text
|
downloaded
|
||
Chrome Cache Entry: 109
|
ASCII text, with very long lines (52717), with no line terminators
|
downloaded
|
||
Chrome Cache Entry: 110
|
exported SGML document, ASCII text, with very long lines (65536), with no line terminators
|
downloaded
|
||
Chrome Cache Entry: 111
|
PNG image data, 533 x 478, 8-bit/color RGBA, non-interlaced
|
downloaded
|
||
Chrome Cache Entry: 112
|
MS Windows icon resource - 6 icons, -128x-128, 16 colors, 72x72, 16 colors
|
downloaded
|
||
Chrome Cache Entry: 113
|
ASCII text, with very long lines (46884)
|
downloaded
|
||
Chrome Cache Entry: 114
|
JSON data
|
dropped
|
||
Chrome Cache Entry: 115
|
MS Windows icon resource - 6 icons, -128x-128, 16 colors, 72x72, 16 colors
|
dropped
|
||
Chrome Cache Entry: 116
|
PNG image data, 658 x 480, 8-bit/color RGBA, non-interlaced
|
downloaded
|
||
Chrome Cache Entry: 117
|
ASCII text, with very long lines (33148), with no line terminators
|
dropped
|
||
Chrome Cache Entry: 118
|
JSON data
|
downloaded
|
||
Chrome Cache Entry: 119
|
JPEG image data, JFIF standard 1.01, aspect ratio, density 1x1, segment length 16, baseline, precision 8, 1528x402, components
3
|
dropped
|
||
Chrome Cache Entry: 120
|
PNG image data, 475 x 212, 8-bit/color RGBA, non-interlaced
|
downloaded
|
||
Chrome Cache Entry: 121
|
JSON data
|
downloaded
|
||
Chrome Cache Entry: 122
|
JSON data
|
dropped
|
||
Chrome Cache Entry: 123
|
JPEG image data, JFIF standard 1.01, aspect ratio, density 1x1, segment length 16, baseline, precision 8, 1528x402, components
3
|
downloaded
|
||
Chrome Cache Entry: 124
|
exported SGML document, ASCII text, with very long lines (65536), with no line terminators
|
dropped
|
||
Chrome Cache Entry: 125
|
ASCII text, with very long lines (46884)
|
dropped
|
||
Chrome Cache Entry: 126
|
ASCII text
|
dropped
|
||
Chrome Cache Entry: 127
|
SVG Scalable Vector Graphics image
|
downloaded
|
||
Chrome Cache Entry: 128
|
Web Open Font Format (Version 2), TrueType, length 19696, version 1.0
|
downloaded
|
||
Chrome Cache Entry: 129
|
ASCII text, with very long lines (33148), with no line terminators
|
downloaded
|
||
Chrome Cache Entry: 130
|
PNG image data, 475 x 212, 8-bit/color RGBA, non-interlaced
|
dropped
|
||
Chrome Cache Entry: 131
|
PNG image data, 658 x 480, 8-bit/color RGBA, non-interlaced
|
dropped
|
||
Chrome Cache Entry: 132
|
JSON data
|
dropped
|
||
Chrome Cache Entry: 133
|
HTML document, ASCII text, with very long lines (639), with CRLF, LF line terminators
|
downloaded
|
||
Chrome Cache Entry: 134
|
JSON data
|
downloaded
|
||
Chrome Cache Entry: 135
|
PNG image data, 533 x 478, 8-bit/color RGBA, non-interlaced
|
dropped
|
||
Chrome Cache Entry: 94
|
PNG image data, 533 x 478, 8-bit/color RGBA, non-interlaced
|
dropped
|
||
Chrome Cache Entry: 95
|
PNG image data, 533 x 478, 8-bit/color RGBA, non-interlaced
|
downloaded
|
||
Chrome Cache Entry: 96
|
SVG Scalable Vector Graphics image
|
dropped
|
||
Chrome Cache Entry: 97
|
ASCII text, with no line terminators
|
downloaded
|
||
Chrome Cache Entry: 98
|
JSON data
|
dropped
|
||
Chrome Cache Entry: 99
|
JSON data
|
dropped
|
There are 39 hidden files, click here to show them.
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\file.exe
|
"C:\Users\user\Desktop\file.exe"
|
||
C:\Program Files\Google\Chrome\Application\chrome.exe
|
"C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized --single-argument http://go.microsoft.com/fwlink/?prd=11324&pver=4.5&sbp=AppLaunch2&plcid=0x409&o1=SHIM_NOVERSION_FOUND&version=(null)&processName=file.exe&platform=0009&osver=6&isServer=0&shimver=4.0.30319.0
|
||
C:\Program Files\Google\Chrome\Application\chrome.exe
|
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US
--service-sandbox-type=none --mojo-platform-channel-handle=2536 --field-trial-handle=1924,i,5708739163240515119,9735538660646773485,262144
--disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction
/prefetch:8
|
||
C:\Program Files\Google\Chrome\Application\chrome.exe
|
"C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized --single-argument http://go.microsoft.com/fwlink/?prd=11324&pver=4.5&sbp=AppLaunch2&plcid=0x409&o1=SHIM_NOVERSION_FOUND&version=(null)&processName=file.exe&platform=0009&osver=6&isServer=0&shimver=4.0.30319.0
|
||
C:\Program Files\Google\Chrome\Application\chrome.exe
|
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US
--service-sandbox-type=none --mojo-platform-channel-handle=2036 --field-trial-handle=2008,i,13480779338358767381,12639924099947820658,262144
--disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction
/prefetch:8
|
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
https://authoring-docs-microsoft.poolparty.biz/devrel/7696cda6-0510-47f6-8302-71bb5d2e28cf
|
unknown
|
||
https://duckduckgo.com/chrome_newtab
|
unknown
|
||
https://duckduckgo.com/ac/?q=
|
unknown
|
||
https://property-imper.sbs/api
|
172.67.162.84
|
||
https://www.marriott.com/default.mi?utm_source=admarketplace&utm_medium=cpc&utm_campaign=Marriott_Pr
|
unknown
|
||
https://github.com/dotnet/docs/blob/17c4acca45e573a92878a44a2cce57d699fe9c7c/docs/framework/install/
|
unknown
|
||
https://www.linkedin.com/cws/share?url=$
|
unknown
|
||
https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
|
unknown
|
||
https://github.com/Youssef1313
|
unknown
|
||
https://management.azure.com/providers/Microsoft.Portal/userSettings/cloudconsole?api-version=2023-0
|
unknown
|
||
https://aka.ms/msignite_docs_banner
|
unknown
|
||
https://videoencodingpublic-hgeaeyeba8gycee3.b01.azurefd.net/public-b4da8140-92cf-421c-8b7b-e471d5b9
|
unknown
|
||
http://polymer.github.io/AUTHORS.txt
|
unknown
|
||
https://contile-images.services.mozilla.com/5b4DH7KHAf2n_mNaLjNi1-UAoKmM9rhqaA9w7FyznHo.10943.jpg
|
unknown
|
||
https://github.com/dotnet/docs/issues/new?template=z-customer-feedback.yml
|
unknown
|
||
https://management.azure.com/subscriptions?api-version=2016-06-01
|
unknown
|
||
https://bridge.sfo1.admarketplace.net/ctp?version=16.0.0&ci=1696497267574.12791&key=1696497267400700
|
unknown
|
||
https://github.com/dotnet/docs/blob/main/docs/framework/install/application-not-started.md
|
unknown
|
||
https://property-imper.sbs/apiiw
|
unknown
|
||
http://x1.c.lencr.org/0
|
unknown
|
||
http://x1.i.lencr.org/0
|
unknown
|
||
https://aka.ms/pshelpmechoose
|
unknown
|
||
https://imp.mt48.net/static?id=7RHzfOIXjFEYsBdvIpkX4Qqm4pqrfQHr4pbW4ZbWfpbY7ReNxR3UIG8zInwYIFIVs9eYi
|
unknown
|
||
https://aka.ms/feedback/report?space=61
|
unknown
|
||
https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
|
unknown
|
||
https://property-imper.sbs/J/z
|
unknown
|
||
http://185.215.113.16/off/def.exes
|
unknown
|
||
https://learn-video.azurefd.net/vod/player
|
unknown
|
||
https://twitter.com/intent/tweet?original_referer=$
|
unknown
|
||
https://github.com/gewarren
|
unknown
|
||
http://185.215.113.16/off/def.exepleWebKit/537.36
|
unknown
|
||
https://bridge.sfo1.ap01.net/ctp?version=16.0.0&ci=1696497267574.12791&key=1696497267400700002.1&cta
|
unknown
|
||
https://support.mozilla.org/products/firefoxgro.all
|
unknown
|
||
http://polymer.github.io/CONTRIBUTORS.txt
|
unknown
|
||
http://crl.micro8
|
unknown
|
||
https://github.com/dotnet/docs/blob/live/docs/framework/install/application-not-started.md
|
unknown
|
||
https://authoring-docs-microsoft.poolparty.biz/devrel/69c76c32-967e-4c65-b89a-74cc527db725
|
unknown
|
||
https://client-api.arkoselabs.com/v2/api.js
|
unknown
|
||
https://aka.ms/MSIgniteChallenge/Tier1Banner?wt.mc_id=ignite24_learnbanner_tier1_cnl
|
unknown
|
||
https://management.azure.com/providers/Microsoft.Portal/consoles/default?api-version=2017-12-01-prev
|
unknown
|
||
https://www.google.com/images/branding/product/ico/googleg_lodp.ico
|
unknown
|
||
https://github.com/Thraka
|
unknown
|
||
http://polymer.github.io/PATENTS.txt
|
unknown
|
||
https://aka.ms/certhelp
|
unknown
|
||
http://185.215.113.16/steam/random.exe
|
unknown
|
||
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
|
unknown
|
||
http://crl.rootca1.amazontrust.com/rootca1.crl0
|
unknown
|
||
https://github.com/mairaw
|
unknown
|
||
https://www.amazon.com/?tag=admarketus-20&ref=pd_sl_15e498ec2b39921665a1fbc954bff40a8106629178eadc64
|
unknown
|
||
https://js.monitor.azure.com/scripts/c/ms.jsll-4.min.js
|
13.107.246.63
|
||
http://ocsp.rootca1.amazontrust.com0:
|
unknown
|
||
https://schema.org
|
unknown
|
||
http://polymer.github.io/LICENSE.txt
|
unknown
|
||
https://property-imper.sbs//
|
unknown
|
||
https://www.ecosia.org/newtab/
|
unknown
|
||
https://support.mozilla.org/kb/customize-firefox-controls-buttons-and-toolbars?utm_source=firefox-br
|
unknown
|
||
https://aka.ms/yourcaliforniaprivacychoices
|
unknown
|
||
https://ac.ecosia.org/autocomplete?q=
|
unknown
|
||
https://github.com/nschonni
|
unknown
|
||
https://videoencodingpublic-hgeaeyeba8gycee3.b01.azurefd.net/public-09ce73a6-05a5-4e4d-b3d7-bd5a8c05
|
unknown
|
||
https://github.com/adegeo
|
unknown
|
||
https://property-imper.sbs/apiBo
|
unknown
|
||
https://contile-images.services.mozilla.com/obgoOYObjIFea_bXuT6L4LbBJ8j425AD87S1HMD3BWg.9991.jpg
|
unknown
|
||
https://github.com/jonschlinkert/is-plain-object
|
unknown
|
||
http://crt.rootca1.amazontrust.com/rootca1.cer0?
|
unknown
|
||
https://octokit.github.io/rest.js/#throttling
|
unknown
|
||
https://github.com/js-cookie/js-cookie
|
unknown
|
||
http://185.215.113.16/off/def.exe
|
unknown
|
||
http://schema.org/Organization
|
unknown
|
||
https://channel9.msdn.com/
|
unknown
|
||
https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
|
unknown
|
||
https://github.com/dotnet/try
|
unknown
|
There are 62 hidden URLs, click here to show them.
Domains
Name
|
IP
|
Malicious
|
|
---|---|---|---|
property-imper.sbs
|
172.67.162.84
|
||
www.google.com
|
142.250.181.68
|
||
s-part-0035.t-0009.t-msedge.net
|
13.107.246.63
|
||
js.monitor.azure.com
|
unknown
|
||
mdec.nelreports.net
|
unknown
|
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
192.168.2.10
|
unknown
|
unknown
|
||
13.107.246.63
|
s-part-0035.t-0009.t-msedge.net
|
United States
|
||
185.215.113.16
|
unknown
|
Portugal
|
||
172.67.162.84
|
property-imper.sbs
|
United States
|
||
239.255.255.250
|
unknown
|
Reserved
|
||
142.250.181.68
|
www.google.com
|
United States
|
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
4E60000
|
direct allocation
|
page execute and read and write
|
||
57D4000
|
trusted library allocation
|
page read and write
|
||
57E7000
|
trusted library allocation
|
page read and write
|
||
8130000
|
direct allocation
|
page read and write
|
||
57C5000
|
trusted library allocation
|
page read and write
|
||
5C58000
|
trusted library allocation
|
page read and write
|
||
5D07000
|
trusted library allocation
|
page read and write
|
||
56AE000
|
stack
|
page read and write
|
||
DF0000
|
direct allocation
|
page read and write
|
||
5821000
|
trusted library allocation
|
page read and write
|
||
57B7000
|
trusted library allocation
|
page read and write
|
||
57FA000
|
trusted library allocation
|
page read and write
|
||
B99000
|
heap
|
page read and write
|
||
5350000
|
remote allocation
|
page read and write
|
||
B82000
|
heap
|
page read and write
|
||
581C000
|
trusted library allocation
|
page read and write
|
||
58E9000
|
stack
|
page read and write
|
||
5818000
|
trusted library allocation
|
page read and write
|
||
581D000
|
trusted library allocation
|
page read and write
|
||
B54000
|
heap
|
page read and write
|
||
5835000
|
trusted library allocation
|
page read and write
|
||
4831000
|
heap
|
page read and write
|
||
3E2F000
|
stack
|
page read and write
|
||
57B5000
|
trusted library allocation
|
page read and write
|
||
5D79000
|
trusted library allocation
|
page read and write
|
||
8190000
|
trusted library allocation
|
page read and write
|
||
630E000
|
stack
|
page read and write
|
||
57DC000
|
trusted library allocation
|
page read and write
|
||
B5F000
|
heap
|
page read and write
|
||
57CF000
|
trusted library allocation
|
page read and write
|
||
5C57000
|
trusted library allocation
|
page read and write
|
||
770E000
|
stack
|
page read and write
|
||
5D88000
|
trusted library allocation
|
page read and write
|
||
5C53000
|
trusted library allocation
|
page read and write
|
||
B8C000
|
heap
|
page read and write
|
||
57CF000
|
trusted library allocation
|
page read and write
|
||
5825000
|
trusted library allocation
|
page read and write
|
||
5CEC000
|
trusted library allocation
|
page read and write
|
||
5E90000
|
trusted library allocation
|
page read and write
|
||
4E50000
|
direct allocation
|
page execute and read and write
|
||
4E80000
|
direct allocation
|
page execute and read and write
|
||
57BD000
|
trusted library allocation
|
page read and write
|
||
5805000
|
trusted library allocation
|
page read and write
|
||
835F000
|
stack
|
page read and write
|
||
DE0000
|
heap
|
page read and write
|
||
57CB000
|
trusted library allocation
|
page read and write
|
||
5C54000
|
trusted library allocation
|
page read and write
|
||
7ACE000
|
stack
|
page read and write
|
||
5814000
|
trusted library allocation
|
page read and write
|
||
5C56000
|
trusted library allocation
|
page read and write
|
||
57E9000
|
trusted library allocation
|
page read and write
|
||
5A50000
|
trusted library allocation
|
page read and write
|
||
57E5000
|
trusted library allocation
|
page read and write
|
||
4CC0000
|
direct allocation
|
page read and write
|
||
8FA000
|
stack
|
page read and write
|
||
694E000
|
stack
|
page read and write
|
||
4E30000
|
direct allocation
|
page execute and read and write
|
||
748E000
|
stack
|
page read and write
|
||
57C4000
|
trusted library allocation
|
page read and write
|
||
581D000
|
trusted library allocation
|
page read and write
|
||
AA0000
|
heap
|
page read and write
|
||
4831000
|
heap
|
page read and write
|
||
5C51000
|
trusted library allocation
|
page read and write
|
||
5860000
|
trusted library allocation
|
page read and write
|
||
B99000
|
heap
|
page read and write
|
||
5CF9000
|
trusted library allocation
|
page read and write
|
||
5C52000
|
trusted library allocation
|
page read and write
|
||
5813000
|
trusted library allocation
|
page read and write
|
||
5C5B000
|
trusted library allocation
|
page read and write
|
||
5D75000
|
trusted library allocation
|
page read and write
|
||
5D6A000
|
trusted library allocation
|
page read and write
|
||
B95000
|
heap
|
page read and write
|
||
7C0E000
|
stack
|
page read and write
|
||
581D000
|
trusted library allocation
|
page read and write
|
||
4831000
|
heap
|
page read and write
|
||
57FC000
|
trusted library allocation
|
page read and write
|
||
5864000
|
trusted library allocation
|
page read and write
|
||
45AF000
|
stack
|
page read and write
|
||
5C59000
|
trusted library allocation
|
page read and write
|
||
57CA000
|
trusted library allocation
|
page read and write
|
||
57D8000
|
trusted library allocation
|
page read and write
|
||
5D52000
|
trusted library allocation
|
page read and write
|
||
AAE000
|
heap
|
page read and write
|
||
58B8000
|
trusted library allocation
|
page read and write
|
||
57CD000
|
trusted library allocation
|
page read and write
|
||
57BA000
|
trusted library allocation
|
page read and write
|
||
57BE000
|
trusted library allocation
|
page read and write
|
||
654F000
|
stack
|
page read and write
|
||
46EF000
|
stack
|
page read and write
|
||
6A8E000
|
stack
|
page read and write
|
||
964000
|
heap
|
page read and write
|
||
5D0C000
|
trusted library allocation
|
page read and write
|
||
5CFB000
|
trusted library allocation
|
page read and write
|
||
5D37000
|
trusted library allocation
|
page read and write
|
||
58F2000
|
trusted library allocation
|
page read and write
|
||
70CE000
|
stack
|
page read and write
|
||
5D3E000
|
trusted library allocation
|
page read and write
|
||
57DC000
|
trusted library allocation
|
page read and write
|
||
582D000
|
trusted library allocation
|
page read and write
|
||
964000
|
heap
|
page read and write
|
||
B95000
|
heap
|
page read and write
|
||
57F5000
|
trusted library allocation
|
page read and write
|
||
396E000
|
stack
|
page read and write
|
||
5350000
|
remote allocation
|
page read and write
|
||
5E8E000
|
trusted library allocation
|
page read and write
|
||
57C5000
|
trusted library allocation
|
page read and write
|
||
5C54000
|
trusted library allocation
|
page read and write
|
||
581C000
|
trusted library allocation
|
page read and write
|
||
5D18000
|
trusted library allocation
|
page read and write
|
||
510E000
|
stack
|
page read and write
|
||
57E4000
|
trusted library allocation
|
page read and write
|
||
57C0000
|
trusted library allocation
|
page read and write
|
||
57B8000
|
trusted library allocation
|
page read and write
|
||
964000
|
heap
|
page read and write
|
||
B81000
|
heap
|
page read and write
|
||
66CE000
|
stack
|
page read and write
|
||
80D0000
|
direct allocation
|
page read and write
|
||
5C59000
|
trusted library allocation
|
page read and write
|
||
4831000
|
heap
|
page read and write
|
||
5DCF000
|
trusted library allocation
|
page read and write
|
||
4E50000
|
direct allocation
|
page execute and read and write
|
||
4F8D000
|
stack
|
page read and write
|
||
5C56000
|
trusted library allocation
|
page read and write
|
||
1111000
|
unkown
|
page execute and write copy
|
||
57C4000
|
trusted library allocation
|
page read and write
|
||
B79000
|
heap
|
page read and write
|
||
57BF000
|
trusted library allocation
|
page read and write
|
||
960000
|
heap
|
page read and write
|
||
B8C000
|
heap
|
page read and write
|
||
5D1B000
|
trusted library allocation
|
page read and write
|
||
DF0000
|
direct allocation
|
page read and write
|
||
57C8000
|
trusted library allocation
|
page read and write
|
||
B89000
|
heap
|
page read and write
|
||
5C5D000
|
trusted library allocation
|
page read and write
|
||
5D84000
|
trusted library allocation
|
page read and write
|
||
5DB0000
|
trusted library allocation
|
page read and write
|
||
5350000
|
remote allocation
|
page read and write
|
||
5D95000
|
trusted library allocation
|
page read and write
|
||
80D0000
|
direct allocation
|
page read and write
|
||
5C5B000
|
trusted library allocation
|
page read and write
|
||
5D4E000
|
trusted library allocation
|
page read and write
|
||
A7E000
|
stack
|
page read and write
|
||
DF0000
|
direct allocation
|
page read and write
|
||
DF0000
|
direct allocation
|
page read and write
|
||
5843000
|
trusted library allocation
|
page read and write
|
||
57F5000
|
trusted library allocation
|
page read and write
|
||
57EC000
|
trusted library allocation
|
page read and write
|
||
B71000
|
heap
|
page read and write
|
||
5D05000
|
trusted library allocation
|
page read and write
|
||
5D33000
|
trusted library allocation
|
page read and write
|
||
57E5000
|
trusted library allocation
|
page read and write
|
||
57DD000
|
trusted library allocation
|
page read and write
|
||
582C000
|
trusted library allocation
|
page read and write
|
||
7A8F000
|
stack
|
page read and write
|
||
57FA000
|
trusted library allocation
|
page read and write
|
||
3A6F000
|
stack
|
page read and write
|
||
6CCF000
|
stack
|
page read and write
|
||
5C61000
|
trusted library allocation
|
page read and write
|
||
5843000
|
trusted library allocation
|
page read and write
|
||
5DE5000
|
trusted library allocation
|
page read and write
|
||
581D000
|
trusted library allocation
|
page read and write
|
||
DF0000
|
direct allocation
|
page read and write
|
||
62B4000
|
trusted library allocation
|
page execute and read and write
|
||
80D0000
|
direct allocation
|
page read and write
|
||
B97000
|
heap
|
page read and write
|
||
57FA000
|
trusted library allocation
|
page read and write
|
||
5825000
|
trusted library allocation
|
page read and write
|
||
E45000
|
unkown
|
page execute and read and write
|
||
5C52000
|
trusted library allocation
|
page read and write
|
||
964000
|
heap
|
page read and write
|
||
57E5000
|
trusted library allocation
|
page read and write
|
||
5D16000
|
trusted library allocation
|
page read and write
|
||
57E8000
|
trusted library allocation
|
page read and write
|
||
58C1000
|
trusted library allocation
|
page read and write
|
||
5E51000
|
trusted library allocation
|
page read and write
|
||
964000
|
heap
|
page read and write
|
||
5807000
|
trusted library allocation
|
page read and write
|
||
524E000
|
stack
|
page read and write
|
||
582E000
|
trusted library allocation
|
page read and write
|
||
5D90000
|
trusted library allocation
|
page read and write
|
||
5C5A000
|
trusted library allocation
|
page read and write
|
||
5C52000
|
trusted library allocation
|
page read and write
|
||
581C000
|
trusted library allocation
|
page read and write
|
||
5C54000
|
trusted library allocation
|
page read and write
|
||
6F4F000
|
stack
|
page read and write
|
||
964000
|
heap
|
page read and write
|
||
6012000
|
trusted library allocation
|
page execute and read and write
|
||
B89000
|
heap
|
page read and write
|
||
5CF5000
|
trusted library allocation
|
page read and write
|
||
580C000
|
trusted library allocation
|
page read and write
|
||
5C57000
|
trusted library allocation
|
page read and write
|
||
7D0F000
|
stack
|
page read and write
|
||
4831000
|
heap
|
page read and write
|
||
57C9000
|
trusted library allocation
|
page read and write
|
||
5861000
|
trusted library allocation
|
page read and write
|
||
57D4000
|
trusted library allocation
|
page read and write
|
||
5D4E000
|
trusted library allocation
|
page read and write
|
||
5E2B000
|
trusted library allocation
|
page read and write
|
||
B79000
|
heap
|
page read and write
|
||
80D0000
|
trusted library allocation
|
page read and write
|
||
57DE000
|
trusted library allocation
|
page read and write
|
||
B98000
|
heap
|
page read and write
|
||
57CF000
|
trusted library allocation
|
page read and write
|
||
690F000
|
stack
|
page read and write
|
||
B90000
|
heap
|
page read and write
|
||
B86000
|
heap
|
page read and write
|
||
57C4000
|
trusted library allocation
|
page read and write
|
||
5944000
|
trusted library allocation
|
page read and write
|
||
57B4000
|
trusted library allocation
|
page read and write
|
||
5D6A000
|
trusted library allocation
|
page read and write
|
||
5847000
|
trusted library allocation
|
page read and write
|
||
B95000
|
heap
|
page read and write
|
||
57D6000
|
trusted library allocation
|
page read and write
|
||
57C4000
|
trusted library allocation
|
page read and write
|
||
B97000
|
heap
|
page read and write
|
||
B95000
|
heap
|
page read and write
|
||
5C55000
|
trusted library allocation
|
page read and write
|
||
57D7000
|
trusted library allocation
|
page read and write
|
||
5C54000
|
trusted library allocation
|
page read and write
|
||
5807000
|
trusted library allocation
|
page read and write
|
||
870C000
|
stack
|
page read and write
|
||
5C5B000
|
trusted library allocation
|
page read and write
|
||
8130000
|
direct allocation
|
page read and write
|
||
57DC000
|
trusted library allocation
|
page read and write
|
||
5C55000
|
trusted library allocation
|
page read and write
|
||
884E000
|
stack
|
page read and write
|
||
894E000
|
stack
|
page read and write
|
||
5D08000
|
trusted library allocation
|
page read and write
|
||
B87000
|
heap
|
page read and write
|
||
5E0000
|
heap
|
page read and write
|
||
5D42000
|
trusted library allocation
|
page read and write
|
||
AAA000
|
heap
|
page read and write
|
||
582D000
|
trusted library allocation
|
page read and write
|
||
80D0000
|
direct allocation
|
page read and write
|
||
332E000
|
stack
|
page read and write
|
||
5D61000
|
trusted library allocation
|
page read and write
|
||
5C53000
|
trusted library allocation
|
page read and write
|
||
5EA9000
|
trusted library allocation
|
page read and write
|
||
8450000
|
trusted library allocation
|
page read and write
|
||
5EDD000
|
trusted library allocation
|
page read and write
|
||
5D3D000
|
trusted library allocation
|
page read and write
|
||
6F8E000
|
stack
|
page read and write
|
||
B8F000
|
heap
|
page read and write
|
||
5C5A000
|
trusted library allocation
|
page read and write
|
||
57E5000
|
trusted library allocation
|
page read and write
|
||
5992000
|
trusted library allocation
|
page read and write
|
||
B86000
|
heap
|
page read and write
|
||
B99000
|
heap
|
page read and write
|
||
6E0F000
|
stack
|
page read and write
|
||
57F5000
|
trusted library allocation
|
page read and write
|
||
50CC000
|
stack
|
page read and write
|
||
5DEC000
|
trusted library allocation
|
page read and write
|
||
5C57000
|
trusted library allocation
|
page read and write
|
||
95E000
|
stack
|
page read and write
|
||
5C58000
|
trusted library allocation
|
page read and write
|
||
57D4000
|
trusted library allocation
|
page read and write
|
||
57E5000
|
trusted library allocation
|
page read and write
|
||
658E000
|
stack
|
page read and write
|
||
5DDB000
|
trusted library allocation
|
page read and write
|
||
5DCD000
|
trusted library allocation
|
page read and write
|
||
57B3000
|
trusted library allocation
|
page read and write
|
||
5920000
|
direct allocation
|
page read and write
|
||
57BB000
|
trusted library allocation
|
page read and write
|
||
2A9C000
|
stack
|
page read and write
|
||
5825000
|
trusted library allocation
|
page read and write
|
||
5D0A000
|
trusted library allocation
|
page read and write
|
||
57F3000
|
trusted library allocation
|
page read and write
|
||
AF1000
|
heap
|
page read and write
|
||
58B6000
|
trusted library allocation
|
page read and write
|
||
5C5B000
|
trusted library allocation
|
page read and write
|
||
4E9A000
|
trusted library allocation
|
page read and write
|
||
5EF8000
|
trusted library allocation
|
page read and write
|
||
B6E000
|
heap
|
page read and write
|
||
57F2000
|
trusted library allocation
|
page read and write
|
||
5E70000
|
trusted library allocation
|
page read and write
|
||
57FA000
|
trusted library allocation
|
page read and write
|
||
845A000
|
trusted library allocation
|
page read and write
|
||
598A000
|
trusted library allocation
|
page read and write
|
||
B97000
|
heap
|
page read and write
|
||
3BEE000
|
stack
|
page read and write
|
||
80D0000
|
direct allocation
|
page read and write
|
||
57EC000
|
trusted library allocation
|
page read and write
|
||
DDE000
|
stack
|
page read and write
|
||
5C5E000
|
trusted library allocation
|
page read and write
|
||
57E6000
|
trusted library allocation
|
page read and write
|
||
520E000
|
stack
|
page read and write
|
||
67CF000
|
stack
|
page read and write
|
||
4831000
|
heap
|
page read and write
|
||
4831000
|
heap
|
page read and write
|
||
B97000
|
heap
|
page read and write
|
||
4E0F000
|
stack
|
page read and write
|
||
57DC000
|
trusted library allocation
|
page read and write
|
||
DF0000
|
direct allocation
|
page read and write
|
||
57D4000
|
trusted library allocation
|
page read and write
|
||
581D000
|
trusted library allocation
|
page read and write
|
||
57E7000
|
trusted library allocation
|
page read and write
|
||
57F0000
|
trusted library allocation
|
page read and write
|
||
5D7E000
|
trusted library allocation
|
page read and write
|
||
730F000
|
stack
|
page read and write
|
||
5895000
|
trusted library allocation
|
page read and write
|
||
B7F000
|
heap
|
page read and write
|
||
5802000
|
trusted library allocation
|
page read and write
|
||
5CEE000
|
trusted library allocation
|
page read and write
|
||
5D3A000
|
trusted library allocation
|
page read and write
|
||
31EE000
|
stack
|
page read and write
|
||
1110000
|
unkown
|
page execute and read and write
|
||
57E7000
|
trusted library allocation
|
page read and write
|
||
2AE0000
|
heap
|
page read and write
|
||
1110000
|
unkown
|
page execute and write copy
|
||
582E000
|
trusted library allocation
|
page read and write
|
||
780F000
|
stack
|
page read and write
|
||
B7F000
|
heap
|
page read and write
|
||
57CD000
|
trusted library allocation
|
page read and write
|
||
6B8F000
|
stack
|
page read and write
|
||
B97000
|
heap
|
page read and write
|
||
5C60000
|
trusted library allocation
|
page read and write
|
||
B7C000
|
heap
|
page read and write
|
||
57E5000
|
trusted library allocation
|
page read and write
|
||
5C56000
|
trusted library allocation
|
page read and write
|
||
5C52000
|
trusted library allocation
|
page read and write
|
||
57FC000
|
trusted library allocation
|
page read and write
|
||
964000
|
heap
|
page read and write
|
||
5C53000
|
trusted library allocation
|
page read and write
|
||
5C53000
|
trusted library allocation
|
page read and write
|
||
57E7000
|
trusted library allocation
|
page read and write
|
||
5C56000
|
trusted library allocation
|
page read and write
|
||
57B6000
|
trusted library allocation
|
page read and write
|
||
680E000
|
stack
|
page read and write
|
||
B7C000
|
heap
|
page read and write
|
||
5D7C000
|
trusted library allocation
|
page read and write
|
||
57D1000
|
trusted library allocation
|
page read and write
|
||
57BD000
|
trusted library allocation
|
page read and write
|
||
5D38000
|
trusted library allocation
|
page read and write
|
||
4831000
|
heap
|
page read and write
|
||
DF0000
|
direct allocation
|
page read and write
|
||
5802000
|
trusted library allocation
|
page read and write
|
||
B6E000
|
heap
|
page read and write
|
||
581B000
|
trusted library allocation
|
page read and write
|
||
5868000
|
trusted library allocation
|
page read and write
|
||
5C53000
|
trusted library allocation
|
page read and write
|
||
5CF6000
|
trusted library allocation
|
page read and write
|
||
432F000
|
stack
|
page read and write
|
||
57EC000
|
trusted library allocation
|
page read and write
|
||
57C4000
|
trusted library allocation
|
page read and write
|
||
57F1000
|
trusted library allocation
|
page read and write
|
||
32EE000
|
stack
|
page read and write
|
||
E57000
|
unkown
|
page read and write
|
||
5D50000
|
trusted library allocation
|
page read and write
|
||
4E50000
|
direct allocation
|
page execute and read and write
|
||
5D97000
|
trusted library allocation
|
page read and write
|
||
2BEF000
|
stack
|
page read and write
|
||
4842000
|
heap
|
page read and write
|
||
57C4000
|
trusted library allocation
|
page read and write
|
||
76CF000
|
stack
|
page read and write
|
||
4831000
|
heap
|
page read and write
|
||
12B8000
|
unkown
|
page execute and read and write
|
||
5C55000
|
trusted library allocation
|
page read and write
|
||
B97000
|
heap
|
page read and write
|
||
392F000
|
stack
|
page read and write
|
||
57F2000
|
trusted library allocation
|
page read and write
|
||
57C4000
|
trusted library allocation
|
page read and write
|
||
B15000
|
heap
|
page read and write
|
||
5D16000
|
trusted library allocation
|
page read and write
|
||
5E3A000
|
trusted library allocation
|
page read and write
|
||
5865000
|
trusted library allocation
|
page read and write
|
||
5D86000
|
trusted library allocation
|
page read and write
|
||
B71000
|
heap
|
page read and write
|
||
5DAE000
|
trusted library allocation
|
page read and write
|
||
482F000
|
stack
|
page read and write
|
||
57BF000
|
trusted library allocation
|
page read and write
|
||
5C59000
|
trusted library allocation
|
page read and write
|
||
57E4000
|
trusted library allocation
|
page read and write
|
||
57DF000
|
trusted library allocation
|
page read and write
|
||
5D1B000
|
trusted library allocation
|
page read and write
|
||
3BAF000
|
stack
|
page read and write
|
||
5C55000
|
trusted library allocation
|
page read and write
|
||
5C5C000
|
trusted library allocation
|
page read and write
|
||
581C000
|
trusted library allocation
|
page read and write
|
||
5C53000
|
trusted library allocation
|
page read and write
|
||
57FD000
|
trusted library allocation
|
page read and write
|
||
57E5000
|
trusted library allocation
|
page read and write
|
||
5CF6000
|
trusted library allocation
|
page read and write
|
||
B8C000
|
heap
|
page read and write
|
||
12B9000
|
unkown
|
page execute and write copy
|
||
5D8E000
|
trusted library allocation
|
page read and write
|
||
57DB000
|
trusted library allocation
|
page read and write
|
||
644C000
|
stack
|
page read and write
|
||
5D1D000
|
trusted library allocation
|
page read and write
|
||
E01000
|
unkown
|
page execute and write copy
|
||
582D000
|
trusted library allocation
|
page read and write
|
||
B99000
|
heap
|
page read and write
|
||
5ECB000
|
trusted library allocation
|
page read and write
|
||
5812000
|
trusted library allocation
|
page read and write
|
||
B7C000
|
heap
|
page read and write
|
||
E00000
|
unkown
|
page read and write
|
||
57E7000
|
trusted library allocation
|
page read and write
|
||
57DD000
|
trusted library allocation
|
page read and write
|
||
57DD000
|
trusted library allocation
|
page read and write
|
||
57F0000
|
trusted library allocation
|
page read and write
|
||
B77000
|
heap
|
page read and write
|
||
57BF000
|
trusted library allocation
|
page read and write
|
||
5843000
|
trusted library allocation
|
page read and write
|
||
57DA000
|
trusted library allocation
|
page read and write
|
||
5803000
|
trusted library allocation
|
page read and write
|
||
5C52000
|
trusted library allocation
|
page read and write
|
||
57FD000
|
trusted library allocation
|
page read and write
|
||
5D3C000
|
trusted library allocation
|
page read and write
|
||
580E000
|
trusted library allocation
|
page read and write
|
||
B97000
|
heap
|
page read and write
|
||
B99000
|
heap
|
page read and write
|
||
4D0C000
|
stack
|
page read and write
|
||
E57000
|
unkown
|
page write copy
|
||
5C50000
|
trusted library allocation
|
page read and write
|
||
3F6E000
|
stack
|
page read and write
|
||
4E20000
|
direct allocation
|
page execute and read and write
|
||
4C70000
|
trusted library allocation
|
page read and write
|
||
356F000
|
stack
|
page read and write
|
||
5C5D000
|
trusted library allocation
|
page read and write
|
||
57D4000
|
trusted library allocation
|
page read and write
|
||
342F000
|
stack
|
page read and write
|
||
57D4000
|
trusted library allocation
|
page read and write
|
||
57F6000
|
trusted library allocation
|
page read and write
|
||
5D3A000
|
trusted library allocation
|
page read and write
|
||
B99000
|
heap
|
page read and write
|
||
5C56000
|
trusted library allocation
|
page read and write
|
||
2F6E000
|
stack
|
page read and write
|
||
472E000
|
stack
|
page read and write
|
||
5801000
|
trusted library allocation
|
page read and write
|
||
57D6000
|
trusted library allocation
|
page read and write
|
||
5D06000
|
trusted library allocation
|
page read and write
|
||
8452000
|
trusted library allocation
|
page read and write
|
||
57E6000
|
trusted library allocation
|
page read and write
|
||
B7F000
|
heap
|
page read and write
|
||
5822000
|
trusted library allocation
|
page read and write
|
||
DF0000
|
direct allocation
|
page read and write
|
||
57F5000
|
trusted library allocation
|
page read and write
|
||
798E000
|
stack
|
page read and write
|
||
964000
|
heap
|
page read and write
|
||
3AAE000
|
stack
|
page read and write
|
||
5807000
|
trusted library allocation
|
page read and write
|
||
7BCF000
|
stack
|
page read and write
|
||
5811000
|
trusted library allocation
|
page read and write
|
||
4E5E000
|
stack
|
page read and write
|
||
964000
|
heap
|
page read and write
|
||
584D000
|
trusted library allocation
|
page read and write
|
||
601A000
|
trusted library allocation
|
page execute and read and write
|
||
B7D000
|
heap
|
page read and write
|
||
5C5A000
|
trusted library allocation
|
page read and write
|
||
5CF8000
|
trusted library allocation
|
page read and write
|
||
DF0000
|
direct allocation
|
page read and write
|
||
DF0000
|
direct allocation
|
page read and write
|
||
5D84000
|
trusted library allocation
|
page read and write
|
||
FEA000
|
unkown
|
page execute and read and write
|
||
758F000
|
stack
|
page read and write
|
||
57C2000
|
trusted library allocation
|
page read and write
|
||
B97000
|
heap
|
page read and write
|
||
80D0000
|
direct allocation
|
page read and write
|
||
57C4000
|
trusted library allocation
|
page read and write
|
||
58BC000
|
trusted library allocation
|
page read and write
|
||
57C3000
|
trusted library allocation
|
page read and write
|
||
B62000
|
heap
|
page read and write
|
||
964000
|
heap
|
page read and write
|
||
80D0000
|
direct allocation
|
page read and write
|
||
57D2000
|
trusted library allocation
|
page read and write
|
||
5838000
|
trusted library allocation
|
page read and write
|
||
5D05000
|
trusted library allocation
|
page read and write
|
||
80CF000
|
stack
|
page read and write
|
||
57E4000
|
trusted library allocation
|
page read and write
|
||
5805000
|
trusted library allocation
|
page read and write
|
||
B07000
|
heap
|
page read and write
|
||
5A52000
|
trusted library allocation
|
page read and write
|
||
57CD000
|
trusted library allocation
|
page read and write
|
||
734E000
|
stack
|
page read and write
|
||
5DB6000
|
trusted library allocation
|
page read and write
|
||
5E8D000
|
trusted library allocation
|
page read and write
|
||
57FE000
|
trusted library allocation
|
page read and write
|
||
57D8000
|
trusted library allocation
|
page read and write
|
||
DF0000
|
direct allocation
|
page read and write
|
||
57D4000
|
trusted library allocation
|
page read and write
|
||
57FA000
|
trusted library allocation
|
page read and write
|
||
57E5000
|
trusted library allocation
|
page read and write
|
||
708F000
|
stack
|
page read and write
|
||
6BCE000
|
stack
|
page read and write
|
||
B97000
|
heap
|
page read and write
|
||
5C54000
|
trusted library allocation
|
page read and write
|
||
5DAD000
|
trusted library allocation
|
page read and write
|
||
57BC000
|
trusted library allocation
|
page read and write
|
||
4E40000
|
direct allocation
|
page execute and read and write
|
||
57D0000
|
trusted library allocation
|
page read and write
|
||
422E000
|
stack
|
page read and write
|
||
4CD0000
|
direct allocation
|
page read and write
|
||
4831000
|
heap
|
page read and write
|
||
5C5D000
|
trusted library allocation
|
page read and write
|
||
5C59000
|
trusted library allocation
|
page read and write
|
||
57D4000
|
trusted library allocation
|
page read and write
|
||
5EDF000
|
trusted library allocation
|
page read and write
|
||
57F5000
|
trusted library allocation
|
page read and write
|
||
5C52000
|
trusted library allocation
|
page read and write
|
||
5E5A000
|
trusted library allocation
|
page read and write
|
||
5C57000
|
trusted library allocation
|
page read and write
|
||
57B8000
|
trusted library allocation
|
page read and write
|
||
7D4E000
|
stack
|
page read and write
|
||
880C000
|
stack
|
page read and write
|
||
5C5A000
|
trusted library allocation
|
page read and write
|
||
54C0000
|
heap
|
page read and write
|
||
58DA000
|
trusted library allocation
|
page read and write
|
||
57D6000
|
trusted library allocation
|
page read and write
|
||
964000
|
heap
|
page read and write
|
||
AE0000
|
heap
|
page read and write
|
||
8250000
|
heap
|
page read and write
|
||
4FCD000
|
stack
|
page read and write
|
||
10CF000
|
unkown
|
page execute and read and write
|
||
E01000
|
unkown
|
page execute and read and write
|
||
57DC000
|
trusted library allocation
|
page read and write
|
||
57E5000
|
trusted library allocation
|
page read and write
|
||
4CC0000
|
direct allocation
|
page read and write
|
||
B7C000
|
heap
|
page read and write
|
||
57D4000
|
trusted library allocation
|
page read and write
|
||
B97000
|
heap
|
page read and write
|
||
B89000
|
heap
|
page read and write
|
||
40EE000
|
stack
|
page read and write
|
||
AE7000
|
heap
|
page read and write
|
||
4830000
|
heap
|
page read and write
|
||
5D3C000
|
trusted library allocation
|
page read and write
|
||
5826000
|
trusted library allocation
|
page read and write
|
||
5C56000
|
trusted library allocation
|
page read and write
|
||
5814000
|
trusted library allocation
|
page read and write
|
||
5843000
|
trusted library allocation
|
page read and write
|
||
6010000
|
trusted library allocation
|
page read and write
|
||
5E29000
|
trusted library allocation
|
page read and write
|
||
4D14000
|
direct allocation
|
page read and write
|
||
B77000
|
heap
|
page read and write
|
||
57D4000
|
trusted library allocation
|
page read and write
|
||
5E58000
|
trusted library allocation
|
page read and write
|
||
58B9000
|
trusted library allocation
|
page read and write
|
||
57E3000
|
trusted library allocation
|
page read and write
|
||
58BF000
|
trusted library allocation
|
page read and write
|
||
40AF000
|
stack
|
page read and write
|
||
80D0000
|
direct allocation
|
page read and write
|
||
6A4F000
|
stack
|
page read and write
|
||
80D0000
|
direct allocation
|
page read and write
|
||
57E7000
|
trusted library allocation
|
page read and write
|
||
57B000
|
stack
|
page read and write
|
||
57C4000
|
trusted library allocation
|
page read and write
|
||
4831000
|
heap
|
page read and write
|
||
3D2E000
|
stack
|
page read and write
|
||
57ED000
|
trusted library allocation
|
page read and write
|
||
57D0000
|
trusted library allocation
|
page read and write
|
||
B99000
|
heap
|
page read and write
|
||
57C2000
|
trusted library allocation
|
page read and write
|
||
B95000
|
heap
|
page read and write
|
||
5D7F000
|
trusted library allocation
|
page read and write
|
||
57B0000
|
trusted library allocation
|
page read and write
|
||
964000
|
heap
|
page read and write
|
||
54BF000
|
stack
|
page read and write
|
||
5D3B000
|
trusted library allocation
|
page read and write
|
||
4831000
|
heap
|
page read and write
|
||
57CB000
|
trusted library allocation
|
page read and write
|
||
45EE000
|
stack
|
page read and write
|
||
57F5000
|
trusted library allocation
|
page read and write
|
||
5DE7000
|
trusted library allocation
|
page read and write
|
||
5C52000
|
trusted library allocation
|
page read and write
|
||
B6E000
|
heap
|
page read and write
|
||
E00000
|
unkown
|
page readonly
|
||
57E5000
|
trusted library allocation
|
page read and write
|
||
80D0000
|
direct allocation
|
page read and write
|
||
5D81000
|
trusted library allocation
|
page read and write
|
||
57CD000
|
trusted library allocation
|
page read and write
|
||
581D000
|
trusted library allocation
|
page read and write
|
||
4E70000
|
direct allocation
|
page execute and read and write
|
||
5DAE000
|
trusted library allocation
|
page read and write
|
||
2F2F000
|
stack
|
page read and write
|
||
5843000
|
trusted library allocation
|
page read and write
|
||
57F0000
|
trusted library allocation
|
page read and write
|
||
5D40000
|
trusted library allocation
|
page read and write
|
||
4831000
|
heap
|
page read and write
|
||
1101000
|
unkown
|
page execute and read and write
|
||
7E8E000
|
stack
|
page read and write
|
||
964000
|
heap
|
page read and write
|
||
B97000
|
heap
|
page read and write
|
||
553E000
|
stack
|
page read and write
|
||
5F0000
|
heap
|
page read and write
|
||
5D73000
|
trusted library allocation
|
page read and write
|
||
57C4000
|
trusted library allocation
|
page read and write
|
||
5843000
|
trusted library allocation
|
page read and write
|
||
5C52000
|
trusted library allocation
|
page read and write
|
||
640F000
|
stack
|
page read and write
|
||
57B4000
|
trusted library allocation
|
page read and write
|
||
5D35000
|
trusted library allocation
|
page read and write
|
||
5EAB000
|
trusted library allocation
|
page read and write
|
||
57FE000
|
trusted library allocation
|
page read and write
|
||
5D6F000
|
trusted library allocation
|
page read and write
|
||
B54000
|
heap
|
page read and write
|
||
8100000
|
trusted library allocation
|
page read and write
|
||
57D4000
|
trusted library allocation
|
page read and write
|
||
5912000
|
trusted library allocation
|
page read and write
|
||
62C9000
|
trusted library allocation
|
page read and write
|
||
6D0E000
|
stack
|
page read and write
|
||
B9A000
|
heap
|
page read and write
|
||
6E4E000
|
stack
|
page read and write
|
||
B7C000
|
heap
|
page read and write
|
||
5DAB000
|
trusted library allocation
|
page read and write
|
||
2DEF000
|
stack
|
page read and write
|
||
5A5B000
|
trusted library allocation
|
page read and write
|
||
57FD000
|
trusted library allocation
|
page read and write
|
||
816C000
|
stack
|
page read and write
|
||
2AE7000
|
heap
|
page read and write
|
||
599A000
|
trusted library allocation
|
page read and write
|
||
B89000
|
heap
|
page read and write
|
||
B99000
|
heap
|
page read and write
|
||
B7D000
|
heap
|
page read and write
|
||
B6F000
|
heap
|
page read and write
|
||
4831000
|
heap
|
page read and write
|
||
784E000
|
stack
|
page read and write
|
||
57E2000
|
trusted library allocation
|
page read and write
|
||
57F4000
|
trusted library allocation
|
page read and write
|
||
57D7000
|
trusted library allocation
|
page read and write
|
||
5805000
|
trusted library allocation
|
page read and write
|
||
57F9000
|
trusted library allocation
|
page read and write
|
||
B9C000
|
heap
|
page read and write
|
||
5E8F000
|
trusted library allocation
|
page read and write
|
||
5895000
|
trusted library allocation
|
page read and write
|
||
5DAD000
|
trusted library allocation
|
page read and write
|
||
57CC000
|
trusted library allocation
|
page read and write
|
||
581C000
|
trusted library allocation
|
page read and write
|
||
B80000
|
heap
|
page read and write
|
||
8120000
|
heap
|
page read and write
|
||
5805000
|
trusted library allocation
|
page read and write
|
||
4831000
|
heap
|
page read and write
|
||
306F000
|
stack
|
page read and write
|
||
5814000
|
trusted library allocation
|
page read and write
|
||
57E5000
|
trusted library allocation
|
page read and write
|
||
5895000
|
trusted library allocation
|
page read and write
|
||
5804000
|
trusted library allocation
|
page read and write
|
||
B97000
|
heap
|
page read and write
|
||
58BA000
|
trusted library allocation
|
page read and write
|
||
30AE000
|
stack
|
page read and write
|
||
6009000
|
stack
|
page read and write
|
||
668F000
|
stack
|
page read and write
|
||
6016000
|
trusted library allocation
|
page read and write
|
||
5C50000
|
trusted library allocation
|
page read and write
|
||
4E50000
|
direct allocation
|
page execute and read and write
|
||
57C4000
|
trusted library allocation
|
page read and write
|
||
C9E000
|
stack
|
page read and write
|
||
5C58000
|
trusted library allocation
|
page read and write
|
||
10F9000
|
unkown
|
page execute and read and write
|
||
57E5000
|
trusted library allocation
|
page read and write
|
||
5C54000
|
trusted library allocation
|
page read and write
|
||
57C5000
|
trusted library allocation
|
page read and write
|
||
7FCE000
|
stack
|
page read and write
|
||
720E000
|
stack
|
page read and write
|
||
4C80000
|
heap
|
page read and write
|
||
58B4000
|
trusted library allocation
|
page read and write
|
||
81B0000
|
direct allocation
|
page execute and read and write
|
||
75CE000
|
stack
|
page read and write
|
||
57E3000
|
trusted library allocation
|
page read and write
|
||
58B7000
|
trusted library allocation
|
page read and write
|
||
5815000
|
trusted library allocation
|
page read and write
|
||
35AE000
|
stack
|
page read and write
|
||
346E000
|
stack
|
page read and write
|
||
5834000
|
trusted library allocation
|
page read and write
|
||
5C5B000
|
trusted library allocation
|
page read and write
|
||
57E5000
|
trusted library allocation
|
page read and write
|
||
5802000
|
trusted library allocation
|
page read and write
|
||
57C5000
|
trusted library allocation
|
page read and write
|
||
5C5C000
|
trusted library allocation
|
page read and write
|
||
5843000
|
trusted library allocation
|
page read and write
|
||
B99000
|
heap
|
page read and write
|
||
57E6000
|
trusted library allocation
|
page read and write
|
||
5C52000
|
trusted library allocation
|
page read and write
|
||
DF0000
|
direct allocation
|
page read and write
|
||
5C60000
|
trusted library allocation
|
page read and write
|
||
436E000
|
stack
|
page read and write
|
||
2CEF000
|
stack
|
page read and write
|
||
5C50000
|
trusted library allocation
|
page read and write
|
||
5C51000
|
trusted library allocation
|
page read and write
|
||
4831000
|
heap
|
page read and write
|
||
3FAE000
|
stack
|
page read and write
|
||
8130000
|
direct allocation
|
page read and write
|
||
5C55000
|
trusted library allocation
|
page read and write
|
||
5DAB000
|
trusted library allocation
|
page read and write
|
||
5855000
|
trusted library allocation
|
page read and write
|
||
5C54000
|
trusted library allocation
|
page read and write
|
||
B87000
|
heap
|
page read and write
|
||
964000
|
heap
|
page read and write
|
||
57C4000
|
trusted library allocation
|
page read and write
|
||
5D6D000
|
trusted library allocation
|
page read and write
|
||
5DB0000
|
trusted library allocation
|
page read and write
|
||
57DA000
|
trusted library allocation
|
page read and write
|
||
5F08000
|
trusted library allocation
|
page read and write
|
||
57E5000
|
trusted library allocation
|
page read and write
|
||
5D50000
|
trusted library allocation
|
page read and write
|
||
57E1000
|
trusted library allocation
|
page read and write
|
||
80D0000
|
direct allocation
|
page read and write
|
||
5D5F000
|
trusted library allocation
|
page read and write
|
||
5D18000
|
trusted library allocation
|
page read and write
|
||
5D82000
|
trusted library allocation
|
page read and write
|
||
744F000
|
stack
|
page read and write
|
||
57CB000
|
trusted library allocation
|
page read and write
|
||
B7D000
|
heap
|
page read and write
|
||
44AE000
|
stack
|
page read and write
|
||
5D7B000
|
trusted library allocation
|
page read and write
|
||
B77000
|
heap
|
page read and write
|
||
9CAE000
|
stack
|
page read and write
|
||
B97000
|
heap
|
page read and write
|
||
D9F000
|
stack
|
page read and write
|
||
3CEF000
|
stack
|
page read and write
|
||
964000
|
heap
|
page read and write
|
||
59FB000
|
trusted library allocation
|
page read and write
|
||
5CF3000
|
trusted library allocation
|
page read and write
|
||
5D3D000
|
trusted library allocation
|
page read and write
|
||
4831000
|
heap
|
page read and write
|
||
5808000
|
trusted library allocation
|
page read and write
|
||
57C4000
|
trusted library allocation
|
page read and write
|
||
5C58000
|
trusted library allocation
|
page read and write
|
||
5849000
|
trusted library allocation
|
page read and write
|
||
57BE000
|
trusted library allocation
|
page read and write
|
||
5C50000
|
trusted library allocation
|
page read and write
|
||
5854000
|
trusted library allocation
|
page read and write
|
||
31AF000
|
stack
|
page read and write
|
||
5D07000
|
trusted library allocation
|
page read and write
|
||
36EE000
|
stack
|
page read and write
|
||
7E4F000
|
stack
|
page read and write
|
||
5E3C000
|
trusted library allocation
|
page read and write
|
||
57E1000
|
trusted library allocation
|
page read and write
|
||
57BA000
|
trusted library allocation
|
page read and write
|
||
57DD000
|
trusted library allocation
|
page read and write
|
||
2E2E000
|
stack
|
page read and write
|
||
53BE000
|
stack
|
page read and write
|
||
57C6000
|
trusted library allocation
|
page read and write
|
||
71CF000
|
stack
|
page read and write
|
||
DF0000
|
direct allocation
|
page read and write
|
||
61A9000
|
trusted library allocation
|
page execute and read and write
|
||
B7B000
|
heap
|
page read and write
|
||
57F7000
|
trusted library allocation
|
page read and write
|
||
5C5F000
|
trusted library allocation
|
page read and write
|
||
B84000
|
heap
|
page read and write
|
||
57C4000
|
trusted library allocation
|
page read and write
|
||
5D5F000
|
trusted library allocation
|
page read and write
|
||
57E5000
|
trusted library allocation
|
page read and write
|
||
563F000
|
stack
|
page read and write
|
||
5ECD000
|
trusted library allocation
|
page read and write
|
||
54C3000
|
heap
|
page read and write
|
||
B6E000
|
heap
|
page read and write
|
||
37EF000
|
stack
|
page read and write
|
||
5838000
|
trusted library allocation
|
page read and write
|
||
B6E000
|
heap
|
page read and write
|
||
4E50000
|
direct allocation
|
page execute and read and write
|
||
5D50000
|
trusted library allocation
|
page read and write
|
||
5D35000
|
trusted library allocation
|
page read and write
|
||
57B8000
|
trusted library allocation
|
page read and write
|
||
DF0000
|
direct allocation
|
page read and write
|
||
5962000
|
trusted library allocation
|
page read and write
|
||
964000
|
heap
|
page read and write
|
||
5C57000
|
trusted library allocation
|
page read and write
|
||
581D000
|
trusted library allocation
|
page read and write
|
||
AD7000
|
heap
|
page read and write
|
||
446F000
|
stack
|
page read and write
|
||
36AF000
|
stack
|
page read and write
|
||
57EE000
|
trusted library allocation
|
page read and write
|
||
B6E000
|
heap
|
page read and write
|
||
B7C000
|
heap
|
page read and write
|
||
5C58000
|
trusted library allocation
|
page read and write
|
||
585F000
|
trusted library allocation
|
page read and write
|
||
7F8F000
|
stack
|
page read and write
|
||
5DDD000
|
trusted library allocation
|
page read and write
|
||
5D68000
|
trusted library allocation
|
page read and write
|
||
5C58000
|
trusted library allocation
|
page read and write
|
||
57AE000
|
stack
|
page read and write
|
||
80D0000
|
direct allocation
|
page read and write
|
||
5D6C000
|
trusted library allocation
|
page read and write
|
||
824D000
|
stack
|
page read and write
|
||
5C54000
|
trusted library allocation
|
page read and write
|
||
5C50000
|
trusted library allocation
|
page read and write
|
||
57C2000
|
trusted library allocation
|
page read and write
|
||
5F06000
|
trusted library allocation
|
page read and write
|
||
3E6E000
|
stack
|
page read and write
|
||
964000
|
heap
|
page read and write
|
||
E59000
|
unkown
|
page execute and read and write
|
||
5C56000
|
trusted library allocation
|
page read and write
|
||
5D61000
|
trusted library allocation
|
page read and write
|
||
964000
|
heap
|
page read and write
|
||
4831000
|
heap
|
page read and write
|
||
57B9000
|
trusted library allocation
|
page read and write
|
||
5826000
|
trusted library allocation
|
page read and write
|
||
57F2000
|
trusted library allocation
|
page read and write
|
||
4E50000
|
direct allocation
|
page execute and read and write
|
||
58BB000
|
trusted library allocation
|
page read and write
|
||
5808000
|
trusted library allocation
|
page read and write
|
||
2ADE000
|
stack
|
page read and write
|
||
57E3000
|
trusted library allocation
|
page read and write
|
||
382E000
|
stack
|
page read and write
|
||
57D7000
|
trusted library allocation
|
page read and write
|
||
5D1D000
|
trusted library allocation
|
page read and write
|
||
9CF0000
|
trusted library allocation
|
page read and write
|
||
5E4F000
|
trusted library allocation
|
page read and write
|
||
5C56000
|
trusted library allocation
|
page read and write
|
||
5CF4000
|
trusted library allocation
|
page read and write
|
||
57BF000
|
trusted library allocation
|
page read and write
|
||
5A2A000
|
trusted library allocation
|
page read and write
|
||
4CC0000
|
direct allocation
|
page read and write
|
||
57D4000
|
trusted library allocation
|
page read and write
|
||
57E5000
|
trusted library allocation
|
page read and write
|
||
57E3000
|
trusted library allocation
|
page read and write
|
||
5C5E000
|
trusted library allocation
|
page read and write
|
||
5C51000
|
trusted library allocation
|
page read and write
|
||
62C4000
|
trusted library allocation
|
page execute and read and write
|
||
5C52000
|
trusted library allocation
|
page read and write
|
||
5961000
|
trusted library allocation
|
page read and write
|
||
80D0000
|
direct allocation
|
page read and write
|
||
581C000
|
trusted library allocation
|
page read and write
|
||
5C59000
|
trusted library allocation
|
page read and write
|
||
534F000
|
stack
|
page read and write
|
||
41EF000
|
stack
|
page read and write
|
||
5C56000
|
trusted library allocation
|
page read and write
|
||
5C58000
|
trusted library allocation
|
page read and write
|
||
5804000
|
trusted library allocation
|
page read and write
|
||
794F000
|
stack
|
page read and write
|
||
8180000
|
direct allocation
|
page execute and read and write
|
||
57CF000
|
trusted library allocation
|
page read and write
|
||
5C5C000
|
trusted library allocation
|
page read and write
|
||
57D4000
|
trusted library allocation
|
page read and write
|
||
5D3B000
|
trusted library allocation
|
page read and write
|
||
80D0000
|
direct allocation
|
page read and write
|
||
5823000
|
trusted library allocation
|
page read and write
|
||
5822000
|
trusted library allocation
|
page read and write
|
||
5C5E000
|
trusted library allocation
|
page read and write
|
||
5802000
|
trusted library allocation
|
page read and write
|
||
B95000
|
heap
|
page read and write
|
||
62C6000
|
trusted library allocation
|
page execute and read and write
|
||
5D82000
|
trusted library allocation
|
page read and write
|
||
964000
|
heap
|
page read and write
|
||
57C4000
|
trusted library allocation
|
page read and write
|
||
B8C000
|
heap
|
page read and write
|
||
964000
|
heap
|
page read and write
|
||
5C58000
|
trusted library allocation
|
page read and write
|
||
5E6E000
|
trusted library allocation
|
page read and write
|
There are 827 hidden memdumps, click here to show them.
DOM / HTML
URL
|
Malicious
|
|
---|---|---|
https://learn.microsoft.com/en-us/dotnet/framework/install/application-not-started?version=(null)&processName=file.exe&platform=0009&osver=6&isServer=0&shimver=4.0.30319.0
|
||
https://learn.microsoft.com/en-us/dotnet/framework/install/application-not-started?version=(null)&processName=file.exe&platform=0009&osver=6&isServer=0&shimver=4.0.30319.0
|
||
https://learn.microsoft.com/en-us/dotnet/framework/install/application-not-started?version=(null)&processName=file.exe&platform=0009&osver=6&isServer=0&shimver=4.0.30319.0
|