Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
file.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
initial sample
|
||
Chrome Cache Entry: 100
|
PNG image data, 658 x 480, 8-bit/color RGBA, non-interlaced
|
dropped
|
||
Chrome Cache Entry: 101
|
JSON data
|
dropped
|
||
Chrome Cache Entry: 102
|
HTML document, ASCII text, with very long lines (639), with CRLF, LF line terminators
|
downloaded
|
||
Chrome Cache Entry: 103
|
JSON data
|
downloaded
|
||
Chrome Cache Entry: 104
|
PNG image data, 533 x 478, 8-bit/color RGBA, non-interlaced
|
dropped
|
||
Chrome Cache Entry: 66
|
PNG image data, 533 x 478, 8-bit/color RGBA, non-interlaced
|
dropped
|
||
Chrome Cache Entry: 67
|
PNG image data, 533 x 478, 8-bit/color RGBA, non-interlaced
|
downloaded
|
||
Chrome Cache Entry: 68
|
SVG Scalable Vector Graphics image
|
dropped
|
||
Chrome Cache Entry: 69
|
JSON data
|
dropped
|
||
Chrome Cache Entry: 70
|
PNG image data, 533 x 478, 8-bit/color RGBA, non-interlaced
|
dropped
|
||
Chrome Cache Entry: 71
|
ASCII text, with very long lines (65536), with no line terminators
|
downloaded
|
||
Chrome Cache Entry: 72
|
JSON data
|
dropped
|
||
Chrome Cache Entry: 73
|
ASCII text, with very long lines (65410)
|
downloaded
|
||
Chrome Cache Entry: 74
|
JSON data
|
downloaded
|
||
Chrome Cache Entry: 75
|
PNG image data, 533 x 478, 8-bit/color RGBA, non-interlaced
|
downloaded
|
||
Chrome Cache Entry: 76
|
ASCII text, with very long lines (52717), with no line terminators
|
dropped
|
||
Chrome Cache Entry: 77
|
ASCII text
|
downloaded
|
||
Chrome Cache Entry: 78
|
ASCII text, with very long lines (52717), with no line terminators
|
downloaded
|
||
Chrome Cache Entry: 79
|
exported SGML document, ASCII text, with very long lines (65536), with no line terminators
|
downloaded
|
||
Chrome Cache Entry: 80
|
ASCII text, with no line terminators
|
downloaded
|
||
Chrome Cache Entry: 81
|
PNG image data, 533 x 478, 8-bit/color RGBA, non-interlaced
|
downloaded
|
||
Chrome Cache Entry: 82
|
MS Windows icon resource - 6 icons, -128x-128, 16 colors, 72x72, 16 colors
|
downloaded
|
||
Chrome Cache Entry: 83
|
ASCII text, with very long lines (46884)
|
downloaded
|
||
Chrome Cache Entry: 84
|
JSON data
|
dropped
|
||
Chrome Cache Entry: 85
|
MS Windows icon resource - 6 icons, -128x-128, 16 colors, 72x72, 16 colors
|
dropped
|
||
Chrome Cache Entry: 86
|
PNG image data, 658 x 480, 8-bit/color RGBA, non-interlaced
|
downloaded
|
||
Chrome Cache Entry: 87
|
ASCII text, with very long lines (33148), with no line terminators
|
dropped
|
||
Chrome Cache Entry: 88
|
JSON data
|
downloaded
|
||
Chrome Cache Entry: 89
|
JPEG image data, JFIF standard 1.01, aspect ratio, density 1x1, segment length 16, baseline, precision 8, 1528x402, components
3
|
dropped
|
||
Chrome Cache Entry: 90
|
PNG image data, 475 x 212, 8-bit/color RGBA, non-interlaced
|
downloaded
|
||
Chrome Cache Entry: 91
|
JSON data
|
downloaded
|
||
Chrome Cache Entry: 92
|
JPEG image data, JFIF standard 1.01, aspect ratio, density 1x1, segment length 16, baseline, precision 8, 1528x402, components
3
|
downloaded
|
||
Chrome Cache Entry: 93
|
exported SGML document, ASCII text, with very long lines (65536), with no line terminators
|
dropped
|
||
Chrome Cache Entry: 94
|
ASCII text, with very long lines (46884)
|
dropped
|
||
Chrome Cache Entry: 95
|
ASCII text
|
dropped
|
||
Chrome Cache Entry: 96
|
SVG Scalable Vector Graphics image
|
downloaded
|
||
Chrome Cache Entry: 97
|
Web Open Font Format (Version 2), TrueType, length 19696, version 1.0
|
downloaded
|
||
Chrome Cache Entry: 98
|
ASCII text, with very long lines (33148), with no line terminators
|
downloaded
|
||
Chrome Cache Entry: 99
|
PNG image data, 475 x 212, 8-bit/color RGBA, non-interlaced
|
dropped
|
There are 30 hidden files, click here to show them.
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\file.exe
|
"C:\Users\user\Desktop\file.exe"
|
||
C:\Program Files\Google\Chrome\Application\chrome.exe
|
"C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized --single-argument http://go.microsoft.com/fwlink/?prd=11324&pver=4.5&sbp=AppLaunch2&plcid=0x409&o1=SHIM_NOVERSION_FOUND&version=(null)&processName=file.exe&platform=0009&osver=6&isServer=0&shimver=4.0.30319.0
|
||
C:\Program Files\Google\Chrome\Application\chrome.exe
|
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US
--service-sandbox-type=none --mojo-platform-channel-handle=2680 --field-trial-handle=2436,i,13883662097603284509,5735806010481988831,262144
--disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction
/prefetch:8
|
||
C:\Program Files\Google\Chrome\Application\chrome.exe
|
"C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized --single-argument http://go.microsoft.com/fwlink/?prd=11324&pver=4.5&sbp=AppLaunch2&plcid=0x409&o1=SHIM_NOVERSION_FOUND&version=(null)&processName=file.exe&platform=0009&osver=6&isServer=0&shimver=4.0.30319.0
|
||
C:\Program Files\Google\Chrome\Application\chrome.exe
|
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US
--service-sandbox-type=none --mojo-platform-channel-handle=2036 --field-trial-handle=1992,i,3177487743473689388,10012693031284183777,262144
--disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction
/prefetch:8
|
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
https://authoring-docs-microsoft.poolparty.biz/devrel/7696cda6-0510-47f6-8302-71bb5d2e28cf
|
unknown
|
||
https://duckduckgo.com/chrome_newtab
|
unknown
|
||
https://duckduckgo.com/ac/?q=
|
unknown
|
||
https://property-imper.sbs/apil
|
unknown
|
||
https://property-imper.sbs/api
|
104.21.33.116
|
||
https://github.com/dotnet/docs/blob/17c4acca45e573a92878a44a2cce57d699fe9c7c/docs/framework/install/
|
unknown
|
||
https://www.linkedin.com/cws/share?url=$
|
unknown
|
||
https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
|
unknown
|
||
https://github.com/Youssef1313
|
unknown
|
||
https://management.azure.com/providers/Microsoft.Portal/userSettings/cloudconsole?api-version=2023-0
|
unknown
|
||
https://aka.ms/msignite_docs_banner
|
unknown
|
||
https://videoencodingpublic-hgeaeyeba8gycee3.b01.azurefd.net/public-b4da8140-92cf-421c-8b7b-e471d5b9
|
unknown
|
||
http://polymer.github.io/AUTHORS.txt
|
unknown
|
||
https://github.com/dotnet/docs/issues/new?template=z-customer-feedback.yml
|
unknown
|
||
https://management.azure.com/subscriptions?api-version=2016-06-01
|
unknown
|
||
https://github.com/dotnet/docs/blob/main/docs/framework/install/application-not-started.md
|
unknown
|
||
http://x1.c.lencr.org/0
|
unknown
|
||
http://x1.i.lencr.org/0
|
unknown
|
||
https://aka.ms/pshelpmechoose
|
unknown
|
||
https://aka.ms/feedback/report?space=61
|
unknown
|
||
https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
|
unknown
|
||
http://185.215.113.16/off/def.exes
|
unknown
|
||
https://learn-video.azurefd.net/vod/player
|
unknown
|
||
https://twitter.com/intent/tweet?original_referer=$
|
unknown
|
||
https://github.com/gewarren
|
unknown
|
||
http://185.215.113.16/off/def.exepleWebKit/537.36
|
unknown
|
||
https://support.mozilla.org/products/firefoxgro.all
|
unknown
|
||
http://polymer.github.io/CONTRIBUTORS.txt
|
unknown
|
||
https://www.mozilla.or
|
unknown
|
||
https://github.com/dotnet/docs/blob/live/docs/framework/install/application-not-started.md
|
unknown
|
||
https://authoring-docs-microsoft.poolparty.biz/devrel/69c76c32-967e-4c65-b89a-74cc527db725
|
unknown
|
||
https://client-api.arkoselabs.com/v2/api.js
|
unknown
|
||
https://aka.ms/MSIgniteChallenge/Tier1Banner?wt.mc_id=ignite24_learnbanner_tier1_cnl
|
unknown
|
||
https://management.azure.com/providers/Microsoft.Portal/consoles/default?api-version=2017-12-01-prev
|
unknown
|
||
https://www.google.com/images/branding/product/ico/googleg_lodp.ico
|
unknown
|
||
https://github.com/Thraka
|
unknown
|
||
http://polymer.github.io/PATENTS.txt
|
unknown
|
||
https://aka.ms/certhelp
|
unknown
|
||
http://185.215.113.16/steam/random.exe
|
unknown
|
||
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
|
unknown
|
||
http://crl.rootca1.amazontrust.com/rootca1.crl0
|
unknown
|
||
http://crl.microP5
|
unknown
|
||
https://github.com/mairaw
|
unknown
|
||
https://js.monitor.azure.com/scripts/c/ms.jsll-4.min.js
|
13.107.246.63
|
||
http://ocsp.rootca1.amazontrust.com0:
|
unknown
|
||
https://schema.org
|
unknown
|
||
http://polymer.github.io/LICENSE.txt
|
unknown
|
||
https://property-imper.sbs/apida
|
unknown
|
||
https://www.ecosia.org/newtab/
|
unknown
|
||
https://property-imper.sbs/
|
unknown
|
||
https://support.mozilla.org/kb/customize-firefox-controls-buttons-and-toolbars?utm_source=firefox-br
|
unknown
|
||
https://aka.ms/yourcaliforniaprivacychoices
|
unknown
|
||
https://ac.ecosia.org/autocomplete?q=
|
unknown
|
||
https://github.com/nschonni
|
unknown
|
||
http://185.215.113.16/
|
unknown
|
||
https://videoencodingpublic-hgeaeyeba8gycee3.b01.azurefd.net/public-09ce73a6-05a5-4e4d-b3d7-bd5a8c05
|
unknown
|
||
https://github.com/adegeo
|
unknown
|
||
https://github.com/jonschlinkert/is-plain-object
|
unknown
|
||
http://crt.rootca1.amazontrust.com/rootca1.cer0?
|
unknown
|
||
https://octokit.github.io/rest.js/#throttling
|
unknown
|
||
https://github.com/js-cookie/js-cookie
|
unknown
|
||
http://185.215.113.16/off/def.exe
|
unknown
|
||
http://schema.org/Organization
|
unknown
|
||
https://property-imper.sbs/Q
|
unknown
|
||
https://channel9.msdn.com/
|
unknown
|
||
https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
|
unknown
|
||
https://github.com/dotnet/try
|
unknown
|
There are 57 hidden URLs, click here to show them.
Domains
Name
|
IP
|
Malicious
|
|
---|---|---|---|
property-imper.sbs
|
104.21.33.116
|
||
www.google.com
|
142.250.181.100
|
||
s-part-0035.t-0009.t-msedge.net
|
13.107.246.63
|
||
js.monitor.azure.com
|
unknown
|
||
mdec.nelreports.net
|
unknown
|
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
192.168.2.6
|
unknown
|
unknown
|
||
13.107.246.63
|
s-part-0035.t-0009.t-msedge.net
|
United States
|
||
185.215.113.16
|
unknown
|
Portugal
|
||
142.250.181.100
|
www.google.com
|
United States
|
||
239.255.255.250
|
unknown
|
Reserved
|
||
104.21.33.116
|
property-imper.sbs
|
United States
|
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
5FA0000
|
trusted library allocation
|
page read and write
|
||
80CF000
|
stack
|
page read and write
|
||
57DE000
|
trusted library allocation
|
page read and write
|
||
5A9D000
|
trusted library allocation
|
page read and write
|
||
1054000
|
heap
|
page read and write
|
||
5FD3000
|
trusted library allocation
|
page read and write
|
||
5E93000
|
trusted library allocation
|
page read and write
|
||
57E0000
|
trusted library allocation
|
page read and write
|
||
57DD000
|
trusted library allocation
|
page read and write
|
||
57B1000
|
trusted library allocation
|
page read and write
|
||
57D8000
|
trusted library allocation
|
page read and write
|
||
5803000
|
trusted library allocation
|
page read and write
|
||
5F42000
|
trusted library allocation
|
page read and write
|
||
57BE000
|
trusted library allocation
|
page read and write
|
||
347E000
|
stack
|
page read and write
|
||
1207000
|
heap
|
page read and write
|
||
5F95000
|
trusted library allocation
|
page read and write
|
||
57DD000
|
trusted library allocation
|
page read and write
|
||
57D3000
|
trusted library allocation
|
page read and write
|
||
57EC000
|
trusted library allocation
|
page read and write
|
||
5F6A000
|
trusted library allocation
|
page read and write
|
||
5E91000
|
trusted library allocation
|
page read and write
|
||
4F80000
|
direct allocation
|
page execute and read and write
|
||
4981000
|
heap
|
page read and write
|
||
5F38000
|
trusted library allocation
|
page read and write
|
||
1130000
|
direct allocation
|
page read and write
|
||
5E98000
|
trusted library allocation
|
page read and write
|
||
1242000
|
heap
|
page read and write
|
||
57E5000
|
trusted library allocation
|
page read and write
|
||
5FBC000
|
trusted library allocation
|
page read and write
|
||
8350000
|
direct allocation
|
page read and write
|
||
5FF1000
|
trusted library allocation
|
page read and write
|
||
5E9D000
|
trusted library allocation
|
page read and write
|
||
57CA000
|
trusted library allocation
|
page read and write
|
||
57FD000
|
trusted library allocation
|
page read and write
|
||
5FB7000
|
trusted library allocation
|
page read and write
|
||
582E000
|
trusted library allocation
|
page read and write
|
||
5690000
|
heap
|
page read and write
|
||
6F8E000
|
stack
|
page read and write
|
||
86F0000
|
trusted library allocation
|
page read and write
|
||
66B5000
|
trusted library allocation
|
page execute and read and write
|
||
57F4000
|
trusted library allocation
|
page read and write
|
||
57F4000
|
trusted library allocation
|
page read and write
|
||
5F5C000
|
trusted library allocation
|
page read and write
|
||
57E1000
|
trusted library allocation
|
page read and write
|
||
5F9F000
|
trusted library allocation
|
page read and write
|
||
4981000
|
heap
|
page read and write
|
||
5E92000
|
trusted library allocation
|
page read and write
|
||
5825000
|
trusted library allocation
|
page read and write
|
||
5832000
|
trusted library allocation
|
page read and write
|
||
57E7000
|
trusted library allocation
|
page read and write
|
||
5E93000
|
trusted library allocation
|
page read and write
|
||
75CE000
|
stack
|
page read and write
|
||
5854000
|
trusted library allocation
|
page read and write
|
||
5F39000
|
trusted library allocation
|
page read and write
|
||
6093000
|
trusted library allocation
|
page read and write
|
||
4F90000
|
direct allocation
|
page execute and read and write
|
||
5F25000
|
trusted library allocation
|
page read and write
|
||
5806000
|
trusted library allocation
|
page read and write
|
||
57B1000
|
trusted library allocation
|
page read and write
|
||
1227000
|
heap
|
page read and write
|
||
1054000
|
heap
|
page read and write
|
||
4981000
|
heap
|
page read and write
|
||
8500000
|
direct allocation
|
page execute and read and write
|
||
57CE000
|
trusted library allocation
|
page read and write
|
||
5FD9000
|
trusted library allocation
|
page read and write
|
||
36FE000
|
stack
|
page read and write
|
||
5F81000
|
trusted library allocation
|
page read and write
|
||
5E91000
|
trusted library allocation
|
page read and write
|
||
57E7000
|
trusted library allocation
|
page read and write
|
||
57EC000
|
trusted library allocation
|
page read and write
|
||
3E3F000
|
stack
|
page read and write
|
||
566E000
|
stack
|
page read and write
|
||
5844000
|
trusted library allocation
|
page read and write
|
||
5805000
|
trusted library allocation
|
page read and write
|
||
57CF000
|
trusted library allocation
|
page read and write
|
||
57ED000
|
trusted library allocation
|
page read and write
|
||
4F90000
|
direct allocation
|
page execute and read and write
|
||
4FA0000
|
direct allocation
|
page execute and read and write
|
||
A74E000
|
stack
|
page read and write
|
||
71CF000
|
stack
|
page read and write
|
||
57BB000
|
trusted library allocation
|
page read and write
|
||
57F8000
|
trusted library allocation
|
page read and write
|
||
57CA000
|
trusted library allocation
|
page read and write
|
||
1223000
|
heap
|
page read and write
|
||
57CF000
|
trusted library allocation
|
page read and write
|
||
57E4000
|
trusted library allocation
|
page read and write
|
||
5815000
|
trusted library allocation
|
page read and write
|
||
1196000
|
heap
|
page read and write
|
||
3F6000
|
unkown
|
page execute and read and write
|
||
1239000
|
heap
|
page read and write
|
||
65AB000
|
trusted library allocation
|
page execute and read and write
|
||
5854000
|
trusted library allocation
|
page read and write
|
||
4981000
|
heap
|
page read and write
|
||
1242000
|
heap
|
page read and write
|
||
6412000
|
trusted library allocation
|
page execute and read and write
|
||
57CA000
|
trusted library allocation
|
page read and write
|
||
57EE000
|
trusted library allocation
|
page read and write
|
||
57ED000
|
trusted library allocation
|
page read and write
|
||
5805000
|
trusted library allocation
|
page read and write
|
||
57E0000
|
trusted library allocation
|
page read and write
|
||
5F93000
|
trusted library allocation
|
page read and write
|
||
581D000
|
trusted library allocation
|
page read and write
|
||
343F000
|
stack
|
page read and write
|
||
7C0E000
|
stack
|
page read and write
|
||
784E000
|
stack
|
page read and write
|
||
57E9000
|
trusted library allocation
|
page read and write
|
||
5A1000
|
unkown
|
page execute and write copy
|
||
57DF000
|
trusted library allocation
|
page read and write
|
||
121B000
|
heap
|
page read and write
|
||
57E5000
|
trusted library allocation
|
page read and write
|
||
8350000
|
direct allocation
|
page read and write
|
||
5E93000
|
trusted library allocation
|
page read and write
|
||
57C2000
|
trusted library allocation
|
page read and write
|
||
57DF000
|
trusted library allocation
|
page read and write
|
||
1054000
|
heap
|
page read and write
|
||
6130000
|
direct allocation
|
page read and write
|
||
580E000
|
trusted library allocation
|
page read and write
|
||
5E94000
|
trusted library allocation
|
page read and write
|
||
57CA000
|
trusted library allocation
|
page read and write
|
||
6402000
|
trusted library allocation
|
page read and write
|
||
57B5000
|
trusted library allocation
|
page read and write
|
||
57DD000
|
trusted library allocation
|
page read and write
|
||
5E9C000
|
trusted library allocation
|
page read and write
|
||
5FB9000
|
trusted library allocation
|
page read and write
|
||
7F8F000
|
stack
|
page read and write
|
||
11C2000
|
heap
|
page read and write
|
||
1225000
|
heap
|
page read and write
|
||
57CF000
|
trusted library allocation
|
page read and write
|
||
5E96000
|
trusted library allocation
|
page read and write
|
||
57D3000
|
trusted library allocation
|
page read and write
|
||
5F99000
|
trusted library allocation
|
page read and write
|
||
86FA000
|
trusted library allocation
|
page read and write
|
||
57FD000
|
trusted library allocation
|
page read and write
|
||
4F90000
|
direct allocation
|
page execute and read and write
|
||
5ACD000
|
trusted library allocation
|
page read and write
|
||
708F000
|
stack
|
page read and write
|
||
5E9C000
|
trusted library allocation
|
page read and write
|
||
5FC6000
|
trusted library allocation
|
page read and write
|
||
57F0000
|
trusted library allocation
|
page read and write
|
||
433F000
|
stack
|
page read and write
|
||
447F000
|
stack
|
page read and write
|
||
5FD1000
|
trusted library allocation
|
page read and write
|
||
6D0E000
|
stack
|
page read and write
|
||
4981000
|
heap
|
page read and write
|
||
4981000
|
heap
|
page read and write
|
||
5E9E000
|
trusted library allocation
|
page read and write
|
||
2D6E000
|
stack
|
page read and write
|
||
798E000
|
stack
|
page read and write
|
||
1223000
|
heap
|
page read and write
|
||
57ED000
|
trusted library allocation
|
page read and write
|
||
57B2000
|
trusted library allocation
|
page read and write
|
||
2E7F000
|
stack
|
page read and write
|
||
5863000
|
trusted library allocation
|
page read and write
|
||
1054000
|
heap
|
page read and write
|
||
57DA000
|
trusted library allocation
|
page read and write
|
||
5E9E000
|
trusted library allocation
|
page read and write
|
||
5490000
|
remote allocation
|
page read and write
|
||
602F000
|
trusted library allocation
|
page read and write
|
||
4981000
|
heap
|
page read and write
|
||
5E9E000
|
trusted library allocation
|
page read and write
|
||
589F000
|
trusted library allocation
|
page read and write
|
||
60C8000
|
trusted library allocation
|
page read and write
|
||
57DF000
|
trusted library allocation
|
page read and write
|
||
603F000
|
trusted library allocation
|
page read and write
|
||
5E98000
|
trusted library allocation
|
page read and write
|
||
1242000
|
heap
|
page read and write
|
||
1237000
|
heap
|
page read and write
|
||
57D5000
|
trusted library allocation
|
page read and write
|
||
7A8F000
|
stack
|
page read and write
|
||
5E9C000
|
trusted library allocation
|
page read and write
|
||
5EA0000
|
trusted library allocation
|
page read and write
|
||
57E0000
|
trusted library allocation
|
page read and write
|
||
1242000
|
heap
|
page read and write
|
||
5F75000
|
trusted library allocation
|
page read and write
|
||
2D2E000
|
stack
|
page read and write
|
||
5F23000
|
trusted library allocation
|
page read and write
|
||
3FBD000
|
stack
|
page read and write
|
||
5F44000
|
trusted library allocation
|
page read and write
|
||
5F7F000
|
trusted library allocation
|
page read and write
|
||
579F000
|
stack
|
page read and write
|
||
57B2000
|
trusted library allocation
|
page read and write
|
||
1227000
|
heap
|
page read and write
|
||
581F000
|
trusted library allocation
|
page read and write
|
||
5E9E000
|
trusted library allocation
|
page read and write
|
||
4F90000
|
direct allocation
|
page execute and read and write
|
||
8350000
|
direct allocation
|
page read and write
|
||
5E9E000
|
trusted library allocation
|
page read and write
|
||
5863000
|
trusted library allocation
|
page read and write
|
||
5F82000
|
trusted library allocation
|
page read and write
|
||
57F7000
|
trusted library allocation
|
page read and write
|
||
583F000
|
trusted library allocation
|
page read and write
|
||
5F5C000
|
trusted library allocation
|
page read and write
|
||
5876000
|
trusted library allocation
|
page read and write
|
||
605F000
|
trusted library allocation
|
page read and write
|
||
5EA0000
|
trusted library allocation
|
page read and write
|
||
57B5000
|
trusted library allocation
|
page read and write
|
||
59F6000
|
trusted library allocation
|
page read and write
|
||
580E000
|
trusted library allocation
|
page read and write
|
||
57B4000
|
trusted library allocation
|
page read and write
|
||
1130000
|
direct allocation
|
page read and write
|
||
57DD000
|
trusted library allocation
|
page read and write
|
||
5812000
|
trusted library allocation
|
page read and write
|
||
333E000
|
stack
|
page read and write
|
||
690F000
|
stack
|
page read and write
|
||
11FA000
|
heap
|
page read and write
|
||
76CF000
|
stack
|
page read and write
|
||
4E00000
|
direct allocation
|
page read and write
|
||
6E0F000
|
stack
|
page read and write
|
||
4E4C000
|
stack
|
page read and write
|
||
3F7F000
|
stack
|
page read and write
|
||
5E9E000
|
trusted library allocation
|
page read and write
|
||
8BCE000
|
stack
|
page read and write
|
||
54FE000
|
stack
|
page read and write
|
||
5FAB000
|
trusted library allocation
|
page read and write
|
||
1226000
|
heap
|
page read and write
|
||
102E000
|
stack
|
page read and write
|
||
57C2000
|
trusted library allocation
|
page read and write
|
||
5F68000
|
trusted library allocation
|
page read and write
|
||
57CF000
|
trusted library allocation
|
page read and write
|
||
57F4000
|
trusted library allocation
|
page read and write
|
||
123F000
|
heap
|
page read and write
|
||
57C1000
|
trusted library allocation
|
page read and write
|
||
57D8000
|
trusted library allocation
|
page read and write
|
||
4A80000
|
trusted library allocation
|
page read and write
|
||
57DF000
|
trusted library allocation
|
page read and write
|
||
582E000
|
trusted library allocation
|
page read and write
|
||
1233000
|
heap
|
page read and write
|
||
57B6000
|
trusted library allocation
|
page read and write
|
||
538E000
|
stack
|
page read and write
|
||
6021000
|
trusted library allocation
|
page read and write
|
||
4FB0000
|
direct allocation
|
page execute and read and write
|
||
580D000
|
trusted library allocation
|
page read and write
|
||
57DD000
|
trusted library allocation
|
page read and write
|
||
6410000
|
trusted library allocation
|
page read and write
|
||
67CF000
|
stack
|
page read and write
|
||
40BF000
|
stack
|
page read and write
|
||
8350000
|
direct allocation
|
page read and write
|
||
780F000
|
stack
|
page read and write
|
||
393F000
|
stack
|
page read and write
|
||
57F2000
|
trusted library allocation
|
page read and write
|
||
641A000
|
trusted library allocation
|
page execute and read and write
|
||
4981000
|
heap
|
page read and write
|
||
57F8000
|
trusted library allocation
|
page read and write
|
||
1236000
|
heap
|
page read and write
|
||
5856000
|
trusted library allocation
|
page read and write
|
||
70CE000
|
stack
|
page read and write
|
||
83B0000
|
direct allocation
|
page read and write
|
||
5C90000
|
trusted library allocation
|
page read and write
|
||
4981000
|
heap
|
page read and write
|
||
57F4000
|
trusted library allocation
|
page read and write
|
||
5E93000
|
trusted library allocation
|
page read and write
|
||
57CF000
|
trusted library allocation
|
page read and write
|
||
5A15000
|
trusted library allocation
|
page read and write
|
||
46FF000
|
stack
|
page read and write
|
||
5E9D000
|
trusted library allocation
|
page read and write
|
||
5800000
|
trusted library allocation
|
page read and write
|
||
40FE000
|
stack
|
page read and write
|
||
6121000
|
trusted library allocation
|
page read and write
|
||
5864000
|
trusted library allocation
|
page read and write
|
||
5F50000
|
trusted library allocation
|
page read and write
|
||
57ED000
|
trusted library allocation
|
page read and write
|
||
5EFD000
|
trusted library allocation
|
page read and write
|
||
5F24000
|
trusted library allocation
|
page read and write
|
||
45FE000
|
stack
|
page read and write
|
||
5F68000
|
trusted library allocation
|
page read and write
|
||
57E4000
|
trusted library allocation
|
page read and write
|
||
35BE000
|
stack
|
page read and write
|
||
307F000
|
stack
|
page read and write
|
||
4981000
|
heap
|
page read and write
|
||
5FB3000
|
trusted library allocation
|
page read and write
|
||
57E0000
|
trusted library allocation
|
page read and write
|
||
5FEF000
|
trusted library allocation
|
page read and write
|
||
57DD000
|
trusted library allocation
|
page read and write
|
||
57CA000
|
trusted library allocation
|
page read and write
|
||
2CEF000
|
stack
|
page read and write
|
||
5F67000
|
trusted library allocation
|
page read and write
|
||
770E000
|
stack
|
page read and write
|
||
6BCE000
|
stack
|
page read and write
|
||
57DE000
|
trusted library allocation
|
page read and write
|
||
5813000
|
trusted library allocation
|
page read and write
|
||
1054000
|
heap
|
page read and write
|
||
5F37000
|
trusted library allocation
|
page read and write
|
||
5E97000
|
trusted library allocation
|
page read and write
|
||
5E93000
|
trusted library allocation
|
page read and write
|
||
57DA000
|
trusted library allocation
|
page read and write
|
||
4FC0000
|
direct allocation
|
page execute and read and write
|
||
5F91000
|
trusted library allocation
|
page read and write
|
||
57ED000
|
trusted library allocation
|
page read and write
|
||
5E95000
|
trusted library allocation
|
page read and write
|
||
4990000
|
heap
|
page read and write
|
||
45BF000
|
stack
|
page read and write
|
||
57FD000
|
trusted library allocation
|
page read and write
|
||
8350000
|
direct allocation
|
page read and write
|
||
5818000
|
trusted library allocation
|
page read and write
|
||
357F000
|
stack
|
page read and write
|
||
1130000
|
direct allocation
|
page read and write
|
||
5E9E000
|
trusted library allocation
|
page read and write
|
||
30BE000
|
stack
|
page read and write
|
||
57FD000
|
trusted library allocation
|
page read and write
|
||
5FB9000
|
trusted library allocation
|
page read and write
|
||
5E9A000
|
trusted library allocation
|
page read and write
|
||
7BCF000
|
stack
|
page read and write
|
||
1234000
|
heap
|
page read and write
|
||
57C2000
|
trusted library allocation
|
page read and write
|
||
5E9A000
|
trusted library allocation
|
page read and write
|
||
1224000
|
heap
|
page read and write
|
||
57CA000
|
trusted library allocation
|
page read and write
|
||
84EE000
|
stack
|
page read and write
|
||
57EE000
|
trusted library allocation
|
page read and write
|
||
5C8E000
|
stack
|
page read and write
|
||
60CA000
|
trusted library allocation
|
page read and write
|
||
1225000
|
heap
|
page read and write
|
||
4981000
|
heap
|
page read and write
|
||
60DB000
|
trusted library allocation
|
page read and write
|
||
57F4000
|
trusted library allocation
|
page read and write
|
||
57CF000
|
trusted library allocation
|
page read and write
|
||
57F7000
|
trusted library allocation
|
page read and write
|
||
6A8E000
|
stack
|
page read and write
|
||
5FAE000
|
trusted library allocation
|
page read and write
|
||
5F39000
|
trusted library allocation
|
page read and write
|
||
1054000
|
heap
|
page read and write
|
||
57ED000
|
trusted library allocation
|
page read and write
|
||
4991000
|
heap
|
page read and write
|
||
3A7F000
|
stack
|
page read and write
|
||
1237000
|
heap
|
page read and write
|
||
4FDF000
|
trusted library allocation
|
page read and write
|
||
1224000
|
heap
|
page read and write
|
||
5E9A000
|
trusted library allocation
|
page read and write
|
||
1130000
|
direct allocation
|
page read and write
|
||
5832000
|
trusted library allocation
|
page read and write
|
||
5816000
|
trusted library allocation
|
page read and write
|
||
582C000
|
trusted library allocation
|
page read and write
|
||
122D000
|
heap
|
page read and write
|
||
3CFF000
|
stack
|
page read and write
|
||
5F95000
|
trusted library allocation
|
page read and write
|
||
581B000
|
trusted library allocation
|
page read and write
|
||
123C000
|
heap
|
page read and write
|
||
611C000
|
trusted library allocation
|
page read and write
|
||
1231000
|
heap
|
page read and write
|
||
57EA000
|
trusted library allocation
|
page read and write
|
||
59FC000
|
trusted library allocation
|
page read and write
|
||
5E94000
|
trusted library allocation
|
page read and write
|
||
57D3000
|
trusted library allocation
|
page read and write
|
||
1050000
|
heap
|
page read and write
|
||
57EE000
|
trusted library allocation
|
page read and write
|
||
5FDE000
|
stack
|
page read and write
|
||
1241000
|
heap
|
page read and write
|
||
8B8C000
|
stack
|
page read and write
|
||
5E9F000
|
trusted library allocation
|
page read and write
|
||
5817000
|
trusted library allocation
|
page read and write
|
||
5A84000
|
trusted library allocation
|
page read and write
|
||
611C000
|
stack
|
page read and write
|
||
60C0000
|
trusted library allocation
|
page read and write
|
||
115A000
|
heap
|
page read and write
|
||
57D7000
|
trusted library allocation
|
page read and write
|
||
548F000
|
stack
|
page read and write
|
||
57FD000
|
trusted library allocation
|
page read and write
|
||
57EC000
|
trusted library allocation
|
page read and write
|
||
5F7E000
|
trusted library allocation
|
page read and write
|
||
57F2000
|
trusted library allocation
|
page read and write
|
||
57CF000
|
trusted library allocation
|
page read and write
|
||
60BE000
|
trusted library allocation
|
page read and write
|
||
6156000
|
trusted library allocation
|
page read and write
|
||
57D5000
|
trusted library allocation
|
page read and write
|
||
2D70000
|
heap
|
page read and write
|
||
60B1000
|
trusted library allocation
|
page read and write
|
||
1223000
|
heap
|
page read and write
|
||
5E95000
|
trusted library allocation
|
page read and write
|
||
5F6C000
|
trusted library allocation
|
page read and write
|
||
404000
|
unkown
|
page execute and read and write
|
||
4F4F000
|
stack
|
page read and write
|
||
122E000
|
heap
|
page read and write
|
||
57C5000
|
trusted library allocation
|
page read and write
|
||
5F8A000
|
trusted library allocation
|
page read and write
|
||
5FF3000
|
trusted library allocation
|
page read and write
|
||
1130000
|
direct allocation
|
page read and write
|
||
5F5A000
|
trusted library allocation
|
page read and write
|
||
5E98000
|
trusted library allocation
|
page read and write
|
||
124B000
|
heap
|
page read and write
|
||
100000
|
unkown
|
page read and write
|
||
5F93000
|
trusted library allocation
|
page read and write
|
||
7E4F000
|
stack
|
page read and write
|
||
1242000
|
heap
|
page read and write
|
||
2EF000
|
unkown
|
page execute and read and write
|
||
57D8000
|
trusted library allocation
|
page read and write
|
||
31BF000
|
stack
|
page read and write
|
||
520D000
|
stack
|
page read and write
|
||
57C3000
|
trusted library allocation
|
page read and write
|
||
5F6A000
|
trusted library allocation
|
page read and write
|
||
57DD000
|
trusted library allocation
|
page read and write
|
||
57CF000
|
trusted library allocation
|
page read and write
|
||
57ED000
|
trusted library allocation
|
page read and write
|
||
86F2000
|
trusted library allocation
|
page read and write
|
||
1236000
|
heap
|
page read and write
|
||
57E0000
|
trusted library allocation
|
page read and write
|
||
57D7000
|
trusted library allocation
|
page read and write
|
||
57D5000
|
trusted library allocation
|
page read and write
|
||
5E95000
|
trusted library allocation
|
page read and write
|
||
5FD6000
|
trusted library allocation
|
page read and write
|
||
6158000
|
trusted library allocation
|
page read and write
|
||
5E96000
|
trusted library allocation
|
page read and write
|
||
57EC000
|
trusted library allocation
|
page read and write
|
||
5F4E000
|
trusted library allocation
|
page read and write
|
||
57CA000
|
trusted library allocation
|
page read and write
|
||
5863000
|
trusted library allocation
|
page read and write
|
||
122B000
|
heap
|
page read and write
|
||
4981000
|
heap
|
page read and write
|
||
60DD000
|
trusted library allocation
|
page read and write
|
||
1227000
|
heap
|
page read and write
|
||
8350000
|
trusted library allocation
|
page read and write
|
||
36BF000
|
stack
|
page read and write
|
||
4F90000
|
direct allocation
|
page execute and read and write
|
||
8380000
|
trusted library allocation
|
page read and write
|
||
5863000
|
trusted library allocation
|
page read and write
|
||
5832000
|
trusted library allocation
|
page read and write
|
||
57C5000
|
trusted library allocation
|
page read and write
|
||
6405000
|
trusted library allocation
|
page read and write
|
||
57FD000
|
trusted library allocation
|
page read and write
|
||
57CF000
|
trusted library allocation
|
page read and write
|
||
5E98000
|
trusted library allocation
|
page read and write
|
||
57D3000
|
trusted library allocation
|
page read and write
|
||
748E000
|
stack
|
page read and write
|
||
57D3000
|
trusted library allocation
|
page read and write
|
||
57B8000
|
trusted library allocation
|
page read and write
|
||
57FD000
|
trusted library allocation
|
page read and write
|
||
57BD000
|
trusted library allocation
|
page read and write
|
||
5EA0000
|
trusted library allocation
|
page read and write
|
||
57CF000
|
trusted library allocation
|
page read and write
|
||
57C9000
|
trusted library allocation
|
page read and write
|
||
59EE000
|
stack
|
page read and write
|
||
57D7000
|
trusted library allocation
|
page read and write
|
||
EFB000
|
stack
|
page read and write
|
||
57D5000
|
trusted library allocation
|
page read and write
|
||
57D2000
|
trusted library allocation
|
page read and write
|
||
611F000
|
trusted library allocation
|
page read and write
|
||
5B65000
|
trusted library allocation
|
page read and write
|
||
4981000
|
heap
|
page read and write
|
||
5F8D000
|
trusted library allocation
|
page read and write
|
||
5E93000
|
trusted library allocation
|
page read and write
|
||
423E000
|
stack
|
page read and write
|
||
8350000
|
direct allocation
|
page read and write
|
||
581D000
|
trusted library allocation
|
page read and write
|
||
6CCF000
|
stack
|
page read and write
|
||
5E9E000
|
trusted library allocation
|
page read and write
|
||
57DD000
|
trusted library allocation
|
page read and write
|
||
57CF000
|
trusted library allocation
|
page read and write
|
||
57EC000
|
trusted library allocation
|
page read and write
|
||
4981000
|
heap
|
page read and write
|
||
5825000
|
trusted library allocation
|
page read and write
|
||
5E98000
|
trusted library allocation
|
page read and write
|
||
5811000
|
trusted library allocation
|
page read and write
|
||
5FD7000
|
trusted library allocation
|
page read and write
|
||
1248000
|
heap
|
page read and write
|
||
607F000
|
trusted library allocation
|
page read and write
|
||
1236000
|
heap
|
page read and write
|
||
5E95000
|
trusted library allocation
|
page read and write
|
||
1130000
|
direct allocation
|
page read and write
|
||
57CA000
|
trusted library allocation
|
page read and write
|
||
8350000
|
direct allocation
|
page read and write
|
||
4F60000
|
direct allocation
|
page execute and read and write
|
||
3BFE000
|
stack
|
page read and write
|
||
57C5000
|
trusted library allocation
|
page read and write
|
||
57D3000
|
trusted library allocation
|
page read and write
|
||
5693000
|
heap
|
page read and write
|
||
5854000
|
trusted library allocation
|
page read and write
|
||
3EE000
|
unkown
|
page execute and read and write
|
||
5E97000
|
trusted library allocation
|
page read and write
|
||
5EA0000
|
trusted library allocation
|
page read and write
|
||
1130000
|
direct allocation
|
page read and write
|
||
1225000
|
heap
|
page read and write
|
||
57D3000
|
trusted library allocation
|
page read and write
|
||
57DC000
|
trusted library allocation
|
page read and write
|
||
60EC000
|
trusted library allocation
|
page read and write
|
||
824E000
|
stack
|
page read and write
|
||
57DD000
|
trusted library allocation
|
page read and write
|
||
585A000
|
trusted library allocation
|
page read and write
|
||
57D5000
|
trusted library allocation
|
page read and write
|
||
5E9C000
|
trusted library allocation
|
page read and write
|
||
57B2000
|
trusted library allocation
|
page read and write
|
||
5833000
|
trusted library allocation
|
page read and write
|
||
1054000
|
heap
|
page read and write
|
||
57C8000
|
trusted library allocation
|
page read and write
|
||
5F89000
|
stack
|
page read and write
|
||
5FAC000
|
trusted library allocation
|
page read and write
|
||
57F7000
|
trusted library allocation
|
page read and write
|
||
57CF000
|
trusted library allocation
|
page read and write
|
||
100000
|
unkown
|
page readonly
|
||
734E000
|
stack
|
page read and write
|
||
5F5A000
|
trusted library allocation
|
page read and write
|
||
5E9C000
|
trusted library allocation
|
page read and write
|
||
123C000
|
heap
|
page read and write
|
||
3C7000
|
unkown
|
page execute and read and write
|
||
57D3000
|
trusted library allocation
|
page read and write
|
||
63F4000
|
trusted library allocation
|
page read and write
|
||
4E54000
|
direct allocation
|
page read and write
|
||
57BB000
|
trusted library allocation
|
page read and write
|
||
5E9B000
|
trusted library allocation
|
page read and write
|
||
1150000
|
heap
|
page read and write
|
||
601F000
|
trusted library allocation
|
page read and write
|
||
5FB5000
|
trusted library allocation
|
page read and write
|
||
60EE000
|
trusted library allocation
|
page read and write
|
||
1054000
|
heap
|
page read and write
|
||
145000
|
unkown
|
page execute and read and write
|
||
57F6000
|
trusted library allocation
|
page read and write
|
||
83EC000
|
stack
|
page read and write
|
||
57B1000
|
trusted library allocation
|
page read and write
|
||
5E99000
|
trusted library allocation
|
page read and write
|
||
1054000
|
heap
|
page read and write
|
||
5F3A000
|
trusted library allocation
|
page read and write
|
||
580E000
|
trusted library allocation
|
page read and write
|
||
58ED000
|
stack
|
page read and write
|
||
57ED000
|
trusted library allocation
|
page read and write
|
||
5FBB000
|
trusted library allocation
|
page read and write
|
||
121B000
|
heap
|
page read and write
|
||
5E9D000
|
trusted library allocation
|
page read and write
|
||
4981000
|
heap
|
page read and write
|
||
1242000
|
heap
|
page read and write
|
||
134E000
|
stack
|
page read and write
|
||
5E96000
|
trusted library allocation
|
page read and write
|
||
534F000
|
stack
|
page read and write
|
||
57E5000
|
trusted library allocation
|
page read and write
|
||
1120000
|
heap
|
page read and write
|
||
57E0000
|
trusted library allocation
|
page read and write
|
||
581C000
|
trusted library allocation
|
page read and write
|
||
123D000
|
heap
|
page read and write
|
||
BE0000
|
heap
|
page read and write
|
||
1187000
|
heap
|
page read and write
|
||
5E96000
|
trusted library allocation
|
page read and write
|
||
85F0000
|
heap
|
page read and write
|
||
57FD000
|
trusted library allocation
|
page read and write
|
||
57EC000
|
trusted library allocation
|
page read and write
|
||
582B000
|
trusted library allocation
|
page read and write
|
||
1054000
|
heap
|
page read and write
|
||
1224000
|
heap
|
page read and write
|
||
5F3B000
|
trusted library allocation
|
page read and write
|
||
5E9B000
|
trusted library allocation
|
page read and write
|
||
7ACE000
|
stack
|
page read and write
|
||
5F8B000
|
trusted library allocation
|
page read and write
|
||
4981000
|
heap
|
page read and write
|
||
8350000
|
direct allocation
|
page read and write
|
||
3BBF000
|
stack
|
page read and write
|
||
57EE000
|
trusted library allocation
|
page read and write
|
||
57C1000
|
trusted library allocation
|
page read and write
|
||
6081000
|
trusted library allocation
|
page read and write
|
||
57E9000
|
trusted library allocation
|
page read and write
|
||
7D4E000
|
stack
|
page read and write
|
||
5F9E000
|
trusted library allocation
|
page read and write
|
||
57B2000
|
trusted library allocation
|
page read and write
|
||
1054000
|
heap
|
page read and write
|
||
5C92000
|
trusted library allocation
|
page read and write
|
||
5863000
|
trusted library allocation
|
page read and write
|
||
5E9A000
|
trusted library allocation
|
page read and write
|
||
580B000
|
trusted library allocation
|
page read and write
|
||
31FE000
|
stack
|
page read and write
|
||
57ED000
|
trusted library allocation
|
page read and write
|
||
5E9C000
|
trusted library allocation
|
page read and write
|
||
405000
|
unkown
|
page execute and write copy
|
||
57DD000
|
trusted library allocation
|
page read and write
|
||
60FC000
|
trusted library allocation
|
page read and write
|
||
6061000
|
trusted library allocation
|
page read and write
|
||
5815000
|
trusted library allocation
|
page read and write
|
||
1223000
|
heap
|
page read and write
|
||
1224000
|
heap
|
page read and write
|
||
57D5000
|
trusted library allocation
|
page read and write
|
||
57B6000
|
trusted library allocation
|
page read and write
|
||
5FA9000
|
trusted library allocation
|
page read and write
|
||
730F000
|
stack
|
page read and write
|
||
583E000
|
trusted library allocation
|
page read and write
|
||
8350000
|
direct allocation
|
page read and write
|
||
57E0000
|
trusted library allocation
|
page read and write
|
||
57CF000
|
trusted library allocation
|
page read and write
|
||
6031000
|
trusted library allocation
|
page read and write
|
||
109E000
|
stack
|
page read and write
|
||
5490000
|
remote allocation
|
page read and write
|
||
6B8F000
|
stack
|
page read and write
|
||
5F4E000
|
trusted library allocation
|
page read and write
|
||
5816000
|
trusted library allocation
|
page read and write
|
||
680E000
|
stack
|
page read and write
|
||
5E91000
|
trusted library allocation
|
page read and write
|
||
758F000
|
stack
|
page read and write
|
||
B7B000
|
stack
|
page read and write
|
||
5F88000
|
trusted library allocation
|
page read and write
|
||
4DC0000
|
heap
|
page read and write
|
||
57E4000
|
trusted library allocation
|
page read and write
|
||
5E98000
|
trusted library allocation
|
page read and write
|
||
57C9000
|
trusted library allocation
|
page read and write
|
||
5E9B000
|
trusted library allocation
|
page read and write
|
||
57C3000
|
trusted library allocation
|
page read and write
|
||
5F7C000
|
trusted library allocation
|
page read and write
|
||
5A1000
|
unkown
|
page execute and read and write
|
||
510E000
|
stack
|
page read and write
|
||
5F77000
|
trusted library allocation
|
page read and write
|
||
1207000
|
heap
|
page read and write
|
||
5831000
|
trusted library allocation
|
page read and write
|
||
892E000
|
stack
|
page read and write
|
||
5490000
|
remote allocation
|
page read and write
|
||
5E95000
|
trusted library allocation
|
page read and write
|
||
122D000
|
heap
|
page read and write
|
||
57D3000
|
trusted library allocation
|
page read and write
|
||
5863000
|
trusted library allocation
|
page read and write
|
||
5F4F000
|
trusted library allocation
|
page read and write
|
||
4E00000
|
direct allocation
|
page read and write
|
||
5F4D000
|
trusted library allocation
|
page read and write
|
||
5F9B000
|
trusted library allocation
|
page read and write
|
||
5863000
|
trusted library allocation
|
page read and write
|
||
5E9A000
|
trusted library allocation
|
page read and write
|
||
5800000
|
trusted library allocation
|
page read and write
|
||
1054000
|
heap
|
page read and write
|
||
4E00000
|
direct allocation
|
page read and write
|
||
5805000
|
trusted library allocation
|
page read and write
|
||
5E9D000
|
trusted library allocation
|
page read and write
|
||
122B000
|
heap
|
page read and write
|
||
5810000
|
trusted library allocation
|
page read and write
|
||
1237000
|
heap
|
page read and write
|
||
5832000
|
trusted library allocation
|
page read and write
|
||
1236000
|
heap
|
page read and write
|
||
5E9C000
|
trusted library allocation
|
page read and write
|
||
1233000
|
heap
|
page read and write
|
||
720E000
|
stack
|
page read and write
|
||
11B7000
|
heap
|
page read and write
|
||
5FBB000
|
trusted library allocation
|
page read and write
|
||
5E96000
|
trusted library allocation
|
page read and write
|
||
5832000
|
trusted library allocation
|
page read and write
|
||
5E93000
|
trusted library allocation
|
page read and write
|
||
57D3000
|
trusted library allocation
|
page read and write
|
||
57FD000
|
trusted library allocation
|
page read and write
|
||
1130000
|
direct allocation
|
page read and write
|
||
4981000
|
heap
|
page read and write
|
||
57DD000
|
trusted library allocation
|
page read and write
|
||
5F6A000
|
trusted library allocation
|
page read and write
|
||
57ED000
|
trusted library allocation
|
page read and write
|
||
60DF000
|
stack
|
page read and write
|
||
57DA000
|
trusted library allocation
|
page read and write
|
||
524E000
|
stack
|
page read and write
|
||
57FD000
|
trusted library allocation
|
page read and write
|
||
157000
|
unkown
|
page write copy
|
||
7D0F000
|
stack
|
page read and write
|
||
5832000
|
trusted library allocation
|
page read and write
|
||
5854000
|
trusted library allocation
|
page read and write
|
||
4F9D000
|
stack
|
page read and write
|
||
5FB5000
|
trusted library allocation
|
page read and write
|
||
5E97000
|
trusted library allocation
|
page read and write
|
||
397E000
|
stack
|
page read and write
|
||
57EC000
|
trusted library allocation
|
page read and write
|
||
8A2F000
|
stack
|
page read and write
|
||
1054000
|
heap
|
page read and write
|
||
1248000
|
heap
|
page read and write
|
||
1239000
|
heap
|
page read and write
|
||
101000
|
unkown
|
page execute and read and write
|
||
5FF5000
|
trusted library allocation
|
page read and write
|
||
6E4E000
|
stack
|
page read and write
|
||
5FB7000
|
trusted library allocation
|
page read and write
|
||
5E94000
|
trusted library allocation
|
page read and write
|
||
1242000
|
heap
|
page read and write
|
||
57C2000
|
trusted library allocation
|
page read and write
|
||
1130000
|
direct allocation
|
page read and write
|
||
57CF000
|
trusted library allocation
|
page read and write
|
||
57F2000
|
trusted library allocation
|
page read and write
|
||
5863000
|
trusted library allocation
|
page read and write
|
||
122E000
|
heap
|
page read and write
|
||
6F4F000
|
stack
|
page read and write
|
||
111B000
|
stack
|
page read and write
|
||
820F000
|
stack
|
page read and write
|
||
5E99000
|
trusted library allocation
|
page read and write
|
||
1234000
|
heap
|
page read and write
|
||
57E9000
|
trusted library allocation
|
page read and write
|
||
604F000
|
trusted library allocation
|
page read and write
|
||
101000
|
unkown
|
page execute and write copy
|
||
585E000
|
trusted library allocation
|
page read and write
|
||
157000
|
unkown
|
page read and write
|
||
57D7000
|
trusted library allocation
|
page read and write
|
||
57D7000
|
trusted library allocation
|
page read and write
|
||
57DA000
|
trusted library allocation
|
page read and write
|
||
487E000
|
stack
|
page read and write
|
||
383E000
|
stack
|
page read and write
|
||
57B2000
|
trusted library allocation
|
page read and write
|
||
1130000
|
direct allocation
|
page read and write
|
||
57D3000
|
trusted library allocation
|
page read and write
|
||
2F7F000
|
stack
|
page read and write
|
||
4981000
|
heap
|
page read and write
|
||
4F90000
|
direct allocation
|
page execute and read and write
|
||
57E7000
|
trusted library allocation
|
page read and write
|
||
8520000
|
trusted library allocation
|
page read and write
|
||
5FB9000
|
trusted library allocation
|
page read and write
|
||
5F3A000
|
trusted library allocation
|
page read and write
|
||
66C4000
|
trusted library allocation
|
page execute and read and write
|
||
5F26000
|
trusted library allocation
|
page read and write
|
||
497F000
|
stack
|
page read and write
|
||
1130000
|
direct allocation
|
page read and write
|
||
83B0000
|
direct allocation
|
page read and write
|
||
1054000
|
heap
|
page read and write
|
||
57E4000
|
trusted library allocation
|
page read and write
|
||
122B000
|
heap
|
page read and write
|
||
4980000
|
heap
|
page read and write
|
||
5F97000
|
trusted library allocation
|
page read and write
|
||
59F0000
|
trusted library allocation
|
page read and write
|
||
57B0000
|
trusted library allocation
|
page read and write
|
||
810E000
|
stack
|
page read and write
|
||
8350000
|
direct allocation
|
page read and write
|
||
5E90000
|
trusted library allocation
|
page read and write
|
||
1226000
|
heap
|
page read and write
|
||
5854000
|
trusted library allocation
|
page read and write
|
||
57B2000
|
trusted library allocation
|
page read and write
|
||
57FD000
|
trusted library allocation
|
page read and write
|
||
5E9C000
|
trusted library allocation
|
page read and write
|
||
57FD000
|
trusted library allocation
|
page read and write
|
||
1211000
|
heap
|
page read and write
|
||
1054000
|
heap
|
page read and write
|
||
159000
|
unkown
|
page execute and read and write
|
||
1227000
|
heap
|
page read and write
|
||
57D4000
|
trusted library allocation
|
page read and write
|
||
57B1000
|
trusted library allocation
|
page read and write
|
||
5E95000
|
trusted library allocation
|
page read and write
|
||
83B0000
|
direct allocation
|
page read and write
|
||
57B4000
|
trusted library allocation
|
page read and write
|
||
57DD000
|
trusted library allocation
|
page read and write
|
||
32FF000
|
stack
|
page read and write
|
||
5F4B000
|
trusted library allocation
|
page read and write
|
||
57B4000
|
trusted library allocation
|
page read and write
|
||
57D7000
|
trusted library allocation
|
page read and write
|
||
5F38000
|
trusted library allocation
|
page read and write
|
||
57EC000
|
trusted library allocation
|
page read and write
|
||
57E0000
|
trusted library allocation
|
page read and write
|
||
5832000
|
trusted library allocation
|
page read and write
|
||
483F000
|
stack
|
page read and write
|
||
5854000
|
trusted library allocation
|
page read and write
|
||
5EA0000
|
trusted library allocation
|
page read and write
|
||
5875000
|
trusted library allocation
|
page read and write
|
||
57D7000
|
trusted library allocation
|
page read and write
|
||
57D8000
|
trusted library allocation
|
page read and write
|
||
57FD000
|
trusted library allocation
|
page read and write
|
||
7FCE000
|
stack
|
page read and write
|
||
5F65000
|
trusted library allocation
|
page read and write
|
||
1054000
|
heap
|
page read and write
|
||
5A2E000
|
stack
|
page read and write
|
||
50CC000
|
stack
|
page read and write
|
||
1234000
|
heap
|
page read and write
|
||
57C0000
|
trusted library allocation
|
page read and write
|
||
8350000
|
direct allocation
|
page read and write
|
||
5E9D000
|
trusted library allocation
|
page read and write
|
||
582D000
|
trusted library allocation
|
page read and write
|
||
57E6000
|
trusted library allocation
|
page read and write
|
||
5E9A000
|
trusted library allocation
|
page read and write
|
||
5AD5000
|
trusted library allocation
|
page read and write
|
||
3ABE000
|
stack
|
page read and write
|
||
57DD000
|
trusted library allocation
|
page read and write
|
||
794F000
|
stack
|
page read and write
|
||
57CF000
|
trusted library allocation
|
page read and write
|
||
57DA000
|
trusted library allocation
|
page read and write
|
||
57ED000
|
trusted library allocation
|
page read and write
|
||
8540000
|
direct allocation
|
page execute and read and write
|
||
8350000
|
direct allocation
|
page read and write
|
||
57FA000
|
trusted library allocation
|
page read and write
|
||
57C2000
|
trusted library allocation
|
page read and write
|
||
44BE000
|
stack
|
page read and write
|
||
5F51000
|
trusted library allocation
|
page read and write
|
||
5F26000
|
trusted library allocation
|
page read and write
|
||
57ED000
|
trusted library allocation
|
page read and write
|
||
2D77000
|
heap
|
page read and write
|
||
57B1000
|
trusted library allocation
|
page read and write
|
||
57DB000
|
trusted library allocation
|
page read and write
|
||
5805000
|
trusted library allocation
|
page read and write
|
||
4F70000
|
direct allocation
|
page execute and read and write
|
||
124B000
|
heap
|
page read and write
|
||
57D7000
|
trusted library allocation
|
page read and write
|
||
6051000
|
trusted library allocation
|
page read and write
|
||
5854000
|
trusted library allocation
|
page read and write
|
||
60AF000
|
trusted library allocation
|
page read and write
|
||
57DF000
|
trusted library allocation
|
page read and write
|
||
57B2000
|
trusted library allocation
|
page read and write
|
||
1130000
|
direct allocation
|
page read and write
|
||
611A000
|
trusted library allocation
|
page read and write
|
||
57D5000
|
trusted library allocation
|
page read and write
|
||
5F28000
|
trusted library allocation
|
page read and write
|
||
5832000
|
trusted library allocation
|
page read and write
|
||
5A2000
|
unkown
|
page execute and write copy
|
||
57CA000
|
trusted library allocation
|
page read and write
|
||
1054000
|
heap
|
page read and write
|
||
57C2000
|
trusted library allocation
|
page read and write
|
||
404000
|
unkown
|
page execute and write copy
|
||
57ED000
|
trusted library allocation
|
page read and write
|
||
8510000
|
heap
|
page read and write
|
||
57E2000
|
trusted library allocation
|
page read and write
|
||
5E9F000
|
trusted library allocation
|
page read and write
|
||
834F000
|
stack
|
page read and write
|
||
1212000
|
heap
|
page read and write
|
||
BF0000
|
heap
|
page read and write
|
||
5A2D000
|
trusted library allocation
|
page read and write
|
||
37FF000
|
stack
|
page read and write
|
||
5AC5000
|
trusted library allocation
|
page read and write
|
||
57F6000
|
trusted library allocation
|
page read and write
|
||
57EC000
|
trusted library allocation
|
page read and write
|
||
57E0000
|
trusted library allocation
|
page read and write
|
||
5E9E000
|
trusted library allocation
|
page read and write
|
||
55FF000
|
stack
|
page read and write
|
||
57D8000
|
trusted library allocation
|
page read and write
|
||
5E9E000
|
trusted library allocation
|
page read and write
|
||
11A1000
|
heap
|
page read and write
|
||
1130000
|
direct allocation
|
page read and write
|
||
5EA0000
|
trusted library allocation
|
page read and write
|
||
5E9B000
|
trusted library allocation
|
page read and write
|
||
57D7000
|
trusted library allocation
|
page read and write
|
||
5A69000
|
stack
|
page read and write
|
||
41FF000
|
stack
|
page read and write
|
||
5816000
|
trusted library allocation
|
page read and write
|
||
57E5000
|
trusted library allocation
|
page read and write
|
||
4E10000
|
direct allocation
|
page read and write
|
||
1227000
|
heap
|
page read and write
|
||
5F4C000
|
trusted library allocation
|
page read and write
|
||
57E9000
|
trusted library allocation
|
page read and write
|
||
473E000
|
stack
|
page read and write
|
||
4981000
|
heap
|
page read and write
|
||
5F9D000
|
trusted library allocation
|
page read and write
|
||
1227000
|
heap
|
page read and write
|
||
10DE000
|
stack
|
page read and write
|
||
5E96000
|
trusted library allocation
|
page read and write
|
||
8350000
|
direct allocation
|
page read and write
|
||
437E000
|
stack
|
page read and write
|
||
57ED000
|
trusted library allocation
|
page read and write
|
||
62EA000
|
trusted library allocation
|
page read and write
|
||
5FD4000
|
trusted library allocation
|
page read and write
|
||
583A000
|
trusted library allocation
|
page read and write
|
||
580A000
|
trusted library allocation
|
page read and write
|
||
5FC4000
|
trusted library allocation
|
page read and write
|
||
57E0000
|
trusted library allocation
|
page read and write
|
||
694E000
|
stack
|
page read and write
|
||
5815000
|
trusted library allocation
|
page read and write
|
||
5E9A000
|
trusted library allocation
|
page read and write
|
||
57B4000
|
trusted library allocation
|
page read and write
|
||
5812000
|
trusted library allocation
|
page read and write
|
||
1130000
|
direct allocation
|
page read and write
|
||
57EC000
|
trusted library allocation
|
page read and write
|
||
744F000
|
stack
|
page read and write
|
||
1054000
|
heap
|
page read and write
|
||
5F80000
|
trusted library allocation
|
page read and write
|
||
5E96000
|
trusted library allocation
|
page read and write
|
||
122F000
|
heap
|
page read and write
|
||
59FA000
|
trusted library allocation
|
page read and write
|
||
1054000
|
heap
|
page read and write
|
||
3E7E000
|
stack
|
page read and write
|
||
9E50000
|
trusted library allocation
|
page read and write
|
||
581E000
|
trusted library allocation
|
page read and write
|
||
57D3000
|
trusted library allocation
|
page read and write
|
||
3D3E000
|
stack
|
page read and write
|
||
144E000
|
stack
|
page read and write
|
||
57F7000
|
trusted library allocation
|
page read and write
|
||
57FE000
|
trusted library allocation
|
page read and write
|
||
7E8E000
|
stack
|
page read and write
|
||
6041000
|
trusted library allocation
|
page read and write
|
||
5854000
|
trusted library allocation
|
page read and write
|
||
6416000
|
trusted library allocation
|
page read and write
|
||
57C3000
|
trusted library allocation
|
page read and write
|
||
5874000
|
trusted library allocation
|
page read and write
|
||
57E0000
|
trusted library allocation
|
page read and write
|
||
8A8B000
|
stack
|
page read and write
|
||
115E000
|
heap
|
page read and write
|
||
123D000
|
heap
|
page read and write
|
||
6A4F000
|
stack
|
page read and write
|
||
6095000
|
trusted library allocation
|
page read and write
|
||
1054000
|
heap
|
page read and write
|
||
4981000
|
heap
|
page read and write
|
||
60FA000
|
trusted library allocation
|
page read and write
|
||
57BB000
|
trusted library allocation
|
page read and write
|
||
66C6000
|
trusted library allocation
|
page execute and read and write
|
||
5E98000
|
trusted library allocation
|
page read and write
|
||
57C1000
|
trusted library allocation
|
page read and write
|
||
57E7000
|
trusted library allocation
|
page read and write
|
||
57CA000
|
trusted library allocation
|
page read and write
|
||
5FBA000
|
trusted library allocation
|
page read and write
|
||
8350000
|
direct allocation
|
page read and write
|
There are 861 hidden memdumps, click here to show them.
DOM / HTML
URL
|
Malicious
|
|
---|---|---|
https://learn.microsoft.com/en-us/dotnet/framework/install/application-not-started?version=(null)&processName=file.exe&platform=0009&osver=6&isServer=0&shimver=4.0.30319.0
|
||
https://learn.microsoft.com/en-us/dotnet/framework/install/application-not-started?version=(null)&processName=file.exe&platform=0009&osver=6&isServer=0&shimver=4.0.30319.0
|
||
https://learn.microsoft.com/en-us/dotnet/framework/install/application-not-started?version=(null)&processName=file.exe&platform=0009&osver=6&isServer=0&shimver=4.0.30319.0
|