Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
anuwhqTXGt.dll
|
PE32 executable (DLL) (console) Intel 80386, for MS Windows
|
initial sample
|
||
C:\Program Files (x86)\Wimsys\msg.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\Wimsys\msg.inf
|
data
|
dropped
|
||
C:\Program Files (x86)\Wimsys\uninstall.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\Wimsys\uninstall.tar
|
data
|
dropped
|
||
C:\ProgramData\USOShared\Logs\System\UpdateSessionOrchestration.9089aa03-3593-48cf-80b0-7499dec9f58a.1.etl
|
data
|
dropped
|
||
C:\ProgramData\regid.1991-06.com.microsoft\regid.1991-06.com.microsoft_Windows-10-Pro.swidtag
|
XML 1.0 document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
|
dropped
|
||
C:\Users\Public\fbe\fbegbhf.dll
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Users\Public\fbe\upd.inf
|
data
|
dropped
|
||
C:\Users\Public\wss_tmp\cr_ws_2.dll
|
PE32+ executable (DLL) (console) x86-64, for MS Windows
|
dropped
|
||
C:\Users\Public\wss_tmp\infile_x64.cab
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\nskFC4E.tmp
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\nsqF009.tmp\0.crx
|
Google Chrome extension, version 3
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\nsqF009.tmp\1.crx
|
Google Chrome extension, version 3
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\nsqF009.tmp\2.crx
|
Google Chrome extension, version 3
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\nsqF009.tmp\IpConfig.dll
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\nsqF009.tmp\MoreInfo.dll
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\nsqF009.tmp\SimpleSC.dll
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\nsqF009.tmp\System.dll
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\nsqF009.tmp\inetc.dll
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\nsqF009.tmp\md5dll.dll
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows, UPX compressed
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\nsqF009.tmp\nsExec.dll
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\nsrF22D.tmp
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\nssF49D.tmp\0.crx
|
Google Chrome extension, version 3
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\nssF49D.tmp\1.crx
|
Google Chrome extension, version 3
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\nssF49D.tmp\2.crx
|
Google Chrome extension, version 3
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\nssF49D.tmp\IpConfig.dll
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\nssF49D.tmp\MoreInfo.dll
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\nssF49D.tmp\SimpleSC.dll
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\nssF49D.tmp\System.dll
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\nssF49D.tmp\inetc.dll
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\nssF49D.tmp\md5dll.dll
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows, UPX compressed
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\nssF49D.tmp\nsExec.dll
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\nsyF72E.tmp
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\nszFA3A.tmp\0.crx
|
Google Chrome extension, version 3
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\nszFA3A.tmp\1.crx
|
Google Chrome extension, version 3
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\nszFA3A.tmp\2.crx
|
Google Chrome extension, version 3
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\nszFA3A.tmp\IpConfig.dll
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\nszFA3A.tmp\MoreInfo.dll
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\nszFA3A.tmp\SimpleSC.dll
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\nszFA3A.tmp\System.dll
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\nszFA3A.tmp\inetc.dll
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\nszFA3A.tmp\md5dll.dll
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows, UPX compressed
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\nszFA3A.tmp\nsExec.dll
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Windows\Installer\{f4b964cf-1b7a-aa88-03cb-3533f33b6987}\2e04d05a72bbb297aebc410e888a6ad5
|
JSON data
|
dropped
|
||
C:\Windows\Installer\{f4b964cf-1b7a-aa88-03cb-3533f33b6987}\66f120532d0318a6a449e3c438427a15.2
|
Google Chrome extension, version 3
|
dropped
|
||
C:\Windows\Installer\{f4b964cf-1b7a-aa88-03cb-3533f33b6987}\66f120532d0318a6a449e3c438427a15.2.E
|
Google Chrome extension, version 3
|
dropped
|
||
C:\Windows\Installer\{f4b964cf-1b7a-aa88-03cb-3533f33b6987}\c23a32abd836342a70b7f6c1aa74947e.2
|
XML 1.0 document, ASCII text, with very long lines (314), with no line terminators
|
dropped
|
||
C:\Windows\Installer\{f4b964cf-1b7a-aa88-03cb-3533f33b6987}\c23a32abd836342a70b7f6c1aa74947e.2.E
|
XML 1.0 document, ASCII text, with very long lines (316), with no line terminators
|
dropped
|
There are 39 hidden files, click here to show them.
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Windows\System32\svchost.exe
|
C:\Windows\System32\svchost.exe -k NetworkService -p
|
||
C:\Windows\System32\svchost.exe
|
C:\Windows\system32\svchost.exe -k UnistackSvcGroup
|
||
C:\Windows\SysWOW64\rundll32.exe
|
rundll32.exe "C:\Users\user\Desktop\anuwhqTXGt.dll",#1
|
||
C:\Windows\SysWOW64\rundll32.exe
|
rundll32.exe C:\Users\user\Desktop\anuwhqTXGt.dll,get
|
||
C:\Windows\System32\svchost.exe
|
C:\Windows\system32\svchost.exe -k LocalService -s W32Time
|
||
C:\Windows\System32\svchost.exe
|
C:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s StorSvc
|
||
C:\Windows\System32\svchost.exe
|
C:\Windows\System32\svchost.exe -k wsappx -p -s ClipSVC
|
||
C:\Windows\System32\svchost.exe
|
C:\Windows\system32\svchost.exe -k netsvcs -p -s UsoSvc
|
||
C:\Windows\System32\svchost.exe
|
C:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p -s wscsvc
|
||
C:\Windows\SysWOW64\rundll32.exe
|
rundll32.exe "C:\Users\user\Desktop\anuwhqTXGt.dll",get
|
||
C:\Windows\SysWOW64\reg.exe
|
reg add HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Edge\ExtensionInstallForcelist /v 1 /t REG_SZ /d liffkepbndfkkknedglekeghaegocokk;file:///C:/Windows/Installer/{f4b964cf-1b7a-aa88-03cb-3533f33b6987}/c23a32abd836342a70b7f6c1aa74947e.2.E
/reg:32
|
||
C:\Windows\SysWOW64\reg.exe
|
reg add HKEY_LOCAL_MACHINE\Software\Policies\Google\Chrome\ExtensionInstallForcelist /v 1 /t REG_SZ /d liffkepbndfkkknedglekeghaegocokk;file:///C:/Windows/Installer/{f4b964cf-1b7a-aa88-03cb-3533f33b6987}/c23a32abd836342a70b7f6c1aa74947e.2
/reg:32
|
||
C:\Windows\SysWOW64\rundll32.exe
|
rundll32 "C:\Users\Public\wss_tmp\cr_ws_2.dll" main --install-run
|
||
C:\Windows\SysWOW64\rundll32.exe
|
rundll32 "C:\Users\Public\wss_tmp\cr_ws_2.dll" main --install-run
|
||
C:\Windows\SysWOW64\rundll32.exe
|
rundll32 "C:\Users\Public\fbe\fbegbhf.dll" main -c uninstall
|
||
C:\Windows\SysWOW64\rundll32.exe
|
rundll32 "C:\Users\Public\wss_tmp\cr_ws_2.dll" main --install-run
|
||
C:\Windows\SysWOW64\rundll32.exe
|
rundll32 "C:\Users\Public\fbe\fbegbhf.dll" main -c install-run
|
||
C:\Windows\SysWOW64\rundll32.exe
|
rundll32 "C:\Users\Public\fbe\fbegbhf.dll" main -c uninstall
|
||
C:\Windows\System32\loaddll32.exe
|
loaddll32.exe "C:\Users\user\Desktop\anuwhqTXGt.dll"
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\SysWOW64\cmd.exe
|
cmd.exe /C rundll32.exe "C:\Users\user\Desktop\anuwhqTXGt.dll",#1
|
||
C:\Windows\System32\SgrmBroker.exe
|
C:\Windows\system32\SgrmBroker.exe
|
||
C:\Windows\SysWOW64\taskkill.exe
|
TaskKill /IM msedge.exe
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\SysWOW64\taskkill.exe
|
TaskKill /IM msedge.exe
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\SysWOW64\taskkill.exe
|
TaskKill /IM chrome.exe
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\SysWOW64\taskkill.exe
|
TaskKill /IM chrome.exe
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\SysWOW64\taskkill.exe
|
TaskKill /IM msedge.exe
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\rundll32.exe
|
rundll32 "C:\Users\Public\wss_tmp\cr_ws_2.dll" main --install-run
|
||
C:\Windows\System32\rundll32.exe
|
rundll32.exe "C:\Users\Public\wss_tmp\cr_ws_2.dll" main
|
||
C:\Windows\SysWOW64\taskkill.exe
|
TaskKill /IM chrome.exe
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\rundll32.exe
|
rundll32 "C:\Users\Public\fbe\fbegbhf.dll" main -c uninstall
|
||
C:\Windows\System32\rundll32.exe
|
"rundll32.exe" "C:\Users\Public\wss_tmp\cr_ws_2.dll" main JkoI28tA7 s54VVA9PL
|
||
C:\Windows\System32\rundll32.exe
|
rundll32 "C:\Users\Public\wss_tmp\cr_ws_2.dll" main --install-run
|
||
C:\Windows\System32\rundll32.exe
|
rundll32.exe "C:\Users\Public\wss_tmp\cr_ws_2.dll" main
|
||
C:\Windows\System32\rundll32.exe
|
rundll32 "C:\Users\Public\fbe\fbegbhf.dll" main -c install-run
|
||
C:\Windows\System32\rundll32.exe
|
rundll32.exe "C:\Users\Public\fbe\fbegbhf.dll" main
|
||
C:\Windows\System32\rundll32.exe
|
rundll32 "C:\Users\Public\fbe\fbegbhf.dll" main -c uninstall
|
||
C:\Windows\System32\rundll32.exe
|
"rundll32.exe" "C:\Users\Public\wss_tmp\cr_ws_2.dll" main 5l2dLaWBz 8H16fjAVL
|
There are 36 hidden processes, click here to show them.
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
https://embro.info/installer.php?pixid=2&campaignId=&firstrun=1&bg=1&cmdline=%22C%3A%5CUsers%5Cuser%5CDesktop%5CanuwhqTXGt%2Edll%22%2C%231&v=e1.0.0.28&tv=1.0-90000&unique_id=EA0012FA9C0BA3312209B38DA78C55F7&mid=5a22443ffb9ed87bfffb38c0fd1fd644&aid=VPGCNBK0FG&aid2=none&ts=1713854402&ts2=&brw=chrome&mi=0&ma=10
|
172.67.207.72
|
||
http://serragatino.info/preinstaller/index.php?evt=start&v=1.28.763.1&ts=1713854395&mid=d85294d3634ef96b9b06988fd385c922&payload=
|
104.21.24.192
|
||
https://embro.info/installer.php?pixid=2&campaignId=&firstrun=1&bg=1&cmdline=C%3A%5CUsers%5Cuser%5CDesktop%5CanuwhqTXGt%2Edll%2Cget&v=e1.0.0.28&tv=1.0-90000&unique_id=EA0012FA9C0BA3312209B38DA78C55F7&mid=5a22443ffb9ed87bfffb38c0fd1fd644&aid=VPGCNBK0FG&aid2=none&ts=1713854403&ts2=&brw=chrome&mi=0&ma=10
|
172.67.207.72
|
||
http://serragatino.info/preinstaller/index.php?evt=end_install&v=1.28.763.1&ts=1713854416&mid=d85294d3634ef96b9b06988fd385c922&payload=
|
104.21.24.192
|
||
https://embro.info/installer/finish?v=e1.0.0.28&tv=1.0-90000&unique_id=EA0012FA9C0BA3312209B38DA78C55F7&mid=5a22443ffb9ed87bfffb38c0fd1fd644&aid=VPGCNBK0FG&aid2=VPGCNBK0FG&ts=1713854404&ts2=&brw=chrome&mi=0&ma=10
|
172.67.207.72
|
||
https://embro.info/updateTask/index.php?v=e1.0.0.28&os_mj=10&os_mn=0&os_bitness=64&unique_id=EA0012FA9C0BA3312209B38DA78C55F7&mid=5a22443ffb9ed87bfffb38c0fd1fd644&aid=VPGCNBK0FG&aid2=VPGCNBK0FG&ts=1713854404&ts2=&brw=chrome&retry_version=1.0.0.28&retry_count=0
|
172.67.207.72
|
||
http://serragatino.info/preinstaller/index.php?evt=start_download&v=1.28.763.1&ts=1713854396&mid=d85294d3634ef96b9b06988fd385c922&payload=
|
104.21.24.192
|
||
https://embro.info/installer/start?v=e1.0.0.28&tv=1.0-90000&unique_id=EA0012FA9C0BA3312209B38DA78C55F7&mid=5a22443ffb9ed87bfffb38c0fd1fd644&aid=VPGCNBK0FG&aid2=VPGCNBK0FG&ts=1713854404&ts2=&brw=chrome&mi=0&ma=10
|
172.67.207.72
|
||
https://embro.info/installer/start?v=e1.0.0.28&tv=1.0-90000&unique_id=EA0012FA9C0BA3312209B38DA78C55F7&mid=5a22443ffb9ed87bfffb38c0fd1fd644&aid=VPGCNBK0FG&aid2=none&ts=1713854403&ts2=&brw=chrome&mi=0&ma=10
|
172.67.207.72
|
||
http://serragatino.info/preinstaller/index.php?evt=end_download&v=1.28.763.1&ts=1713854399&mid=d85294d3634ef96b9b06988fd385c922&payload=
|
104.21.24.192
|
||
https://embro.info/installer/get_timestamp.php
|
172.67.207.72
|
||
http://serragatino.info/preinstaller/index.php?evt=start&v=1.28.763.1&ts=1713854398&mid=d85294d3634ef96b9b06988fd385c922&payload=
|
104.21.24.192
|
||
http://serragatino.info/preinstaller/index.php?evt=start_install&v=1.28.763.1&ts=1713854399&mid=d85294d3634ef96b9b06988fd385c922&payload=
|
104.21.24.192
|
||
http://serragatino.info/preinstaller/index.php?evt=start_install&v=1.28.763.1&ts=1713854400&mid=d85294d3634ef96b9b06988fd385c922&payload=
|
104.21.24.192
|
||
http://serragatino.info/preinstaller/index.php?evt=end_install&v=1.28.763.1&ts=1713854414&mid=d85294d3634ef96b9b06988fd385c922&payload=
|
104.21.24.192
|
||
https://embro.info/installer/finish?v=e1.0.0.28&tv=1.0-90000&unique_id=EA0012FA9C0BA3312209B38DA78C55F7&mid=5a22443ffb9ed87bfffb38c0fd1fd644&aid=VPGCNBK0FG&aid2=none&ts=1713854403&ts2=&brw=chrome&mi=0&ma=10
|
172.67.207.72
|
||
http://serragatino.info/preinstaller/index.php?evt=start&v=1.28.763.1&ts=1713854396&mid=d85294d3634ef96b9b06988fd385c922&payload=
|
104.21.24.192
|
||
http://serragatino.info/preinstaller/index.php?evt=end_download&v=1.28.763.1&ts=1713854401&mid=d85294d3634ef96b9b06988fd385c922&payload=
|
104.21.24.192
|
||
http://serragatino.info/preinstaller/index.php?evt=end_download&v=1.28.763.1&ts=1713854398&mid=d85294d3634ef96b9b06988fd385c922&payload=
|
104.21.24.192
|
||
http://serragatino.info/preinstaller/index.php?evt=end_install&v=1.28.763.1&ts=1713854417&mid=d85294d3634ef96b9b06988fd385c922&payload=
|
104.21.24.192
|
||
http://serragatino.info/preinstaller/index.php?evt=start_install&v=1.28.763.1&ts=1713854401&mid=d85294d3634ef96b9b06988fd385c922&payload=
|
104.21.24.192
|
||
http://serragatino.info/preinstaller/index.php?evt=start_download&v=1.28.763.1&ts=1713854399&mid=d85294d3634ef96b9b06988fd385c922&payload=
|
104.21.24.192
|
||
https://embro.info/installer/finish?v=e1.0.0.28&tv=1.0-90000&unique_id=EA0012FA9C0BA3312209B38DA78C55F7&mid=5a22443ffb9ed87bfffb38c0fd1fd644&aid=VPGCNBK0FG&aid2=none&ts=1713854402&ts2=&brw=chrome&mi=0&ma=10
|
172.67.207.72
|
||
https://embro.info/installer/start?v=e1.0.0.28&tv=1.0-90000&unique_id=EA0012FA9C0BA3312209B38DA78C55F7&mid=5a22443ffb9ed87bfffb38c0fd1fd644&aid=VPGCNBK0FG&aid2=none&ts=1713854402&ts2=&brw=chrome&mi=0&ma=10
|
172.67.207.72
|
||
https://embro.info/installer/get_timestamp.php1023
|
unknown
|
||
https://embro.info/U
|
unknown
|
||
http://4o985rhikfsof.b-cdn.net/license_1.28.763.1.dat
|
138.199.40.58
|
||
https://embro.info/S
|
unknown
|
||
https://embro.info/
|
unknown
|
||
https://dev.ditu.live.com/REST/v1/Routes/
|
unknown
|
||
https://dev.virtualearth.net/REST/v1/Routes/Driving
|
unknown
|
||
https://t0.ssl.ak.dynamic.tiles.virtualearth.net/comp/gen.ashx
|
unknown
|
||
https://embro.info/installer/finish
|
unknown
|
||
https://embro.info/installer/start?v=e1.0.0.28&tv=1.0-90000&unique_id=EA0012FA9C0BA3312209B38DA78C55
|
unknown
|
||
https://dev.virtualearth.net/REST/v1/Routes/Walking
|
unknown
|
||
https://embro.info/I
|
unknown
|
||
http://nsis.sf.net/NSIS_Error...
|
unknown
|
||
http://standards.iso.org/iso/19770/-2/2009/schema.xsd
|
unknown
|
||
https://embro.info/installer.php?pixid=2&campaignId=&firstrun=1&bg=1&cmdline=%22C%3A%5CUsers%5Cfront
|
unknown
|
||
https://t0.ssl.ak.dynamic.tiles.virtualea0D#xk
|
unknown
|
||
https://dev.ditu.live.com/mapcontrol/logging.ashx
|
unknown
|
||
https://dev.ditu.live.com/REST/v1/Imagery/Copyright/
|
unknown
|
||
https://curl.se/docs/hsts.html
|
unknown
|
||
https://embro.info/installer.php?pixid=2&campaignId=&firstrun=1&bg=1&cmdline=C%3A%5CUsers%5Cuseres
|
unknown
|
||
https://t0.ssl.ak.dynamic.tiles.virtualearth.net/odvs/gri?pv=1&r=
|
unknown
|
||
https://curl.se/docs/alt-svc.html#
|
unknown
|
||
https://dev.virtualearth.net/REST/v1/Transit/Schedules/
|
unknown
|
||
https://curl.se/docs/hsts.html#
|
unknown
|
||
https://embro.info/j
|
unknown
|
||
http://www.bingmapsportal.com
|
unknown
|
||
https://dev.virtualearth.net/REST/v1/Imagery/Copyright/
|
unknown
|
||
https://ecn.dev.virtualearth.net/REST/v1/Imagery/Copyright/
|
unknown
|
||
https://embro.info/a
|
unknown
|
||
https://embro.info/_
|
unknown
|
||
https://dynamic.t0.tiles.ditu.live.com/comp/gen.ashx
|
unknown
|
||
https://embro.info/0-3AEA-1069-A2D8-08002B30309D
|
unknown
|
||
https://embro.info/X~
|
unknown
|
||
https://curl.se/docs/http-cookies.html
|
unknown
|
||
https://embro.info/installer/finish?v=e1.0.0.28&tv=1.0-90000&unique_id=EA0012FA9C0BA3312209B38DA78C5
|
unknown
|
||
https://dev.ditu.live.com/REST/v1/Transit/Stops/
|
unknown
|
||
http://www.google.com/update2/response
|
unknown
|
||
https://dev.virtualearth.net/REST/v1/Routes/
|
unknown
|
||
https://dev.virtualearth.net/REST/v1/Traffic/Incidents/
|
unknown
|
||
https://embro.info/installer/finishixid=2&campaignId=&firstrun=1&bg=1&cmdline=%22C%3A%5CUsers%5Cfron
|
unknown
|
||
https://t0.ss
|
unknown
|
||
https://t0.ssl.ak.dynamic.tiles.virtualearth.net/odvs/gdi?pv=1&r=
|
unknown
|
||
https://dynamic.api.tiles.ditu.live.com/odvs/gri?pv=1&r=
|
unknown
|
||
https://dev.virtualearth.net/webservices/v1/LoggingService/LoggingService.svc/Log?
|
unknown
|
||
http://nsis.sf.net/NSIS_ErrorError
|
unknown
|
||
https://curl.se/docs/alt-svc.html
|
unknown
|
||
https://t0.ssl.ak.dynamic.tiles.virtualearth.net/odvs/gd?pv=1&r=
|
unknown
|
||
https://ecn.dev.virtualearth.net/REST/V1/MapControlConfiguration/native/
|
unknown
|
||
https://dev.virtualearth.net/REST/v1/Locations
|
unknown
|
||
https://dev.ditu.live.com/REST/V1/MapControlConfiguration/native/
|
unknown
|
||
https://dev.virtualearth.net/mapcontrol/logging.ashx
|
unknown
|
||
https://embro.info/installer.php
|
unknown
|
||
https://dynamic.api.tiles.ditu.live.com/odvs/gdi?pv=1&r=
|
unknown
|
||
https://embro.info/updateTask/index.php
|
unknown
|
||
http://nsis.sf.net/NSIS_Error
|
unknown
|
||
https://dynamic.t
|
unknown
|
||
https://embro.info/installer/start500
|
unknown
|
||
https://embro.info/-
|
unknown
|
||
https://dev.virtualearth.net/REST/v1/Routes/Transit
|
unknown
|
||
https://t0.ssl.ak.tiles.virtualearth.net/tiles/gen
|
unknown
|
||
https://embro.info/installer/finish?v=e1.0.0.28&tv=1.0-90000&unique_id=ErR
|
unknown
|
||
https://tiles.virtualearth.net/tiles/cmd/StreetSideBubbleMetaData?north=
|
unknown
|
||
https://curl.se/docs/http-cookies.html#
|
unknown
|
||
https://dynamic.api.tiles.ditu.live.com/odvs/gdv?pv=1&r=
|
unknown
|
||
https://dev.ditu.live.com/REST/v1/Locations
|
unknown
|
||
https://t0.ssl.ak.dynamic.tiles.v
|
unknown
|
||
https://embro.info/installer/finishixid=2&campaignId=&firstrun=1&bg=1&cmdline=C%3A%5CUsers%5Cusere
|
unknown
|
||
https://embro.info/installer/get_timestamp.php./
|
unknown
|
||
https://dev.ditu.live.com/REST/v1/JsonFilter/VenueMaps/data/
|
unknown
|
||
https://dynamic.api.tiles.ditu.live.com/odvs/gd?pv=1&r=
|
unknown
|
There are 84 hidden URLs, click here to show them.
Domains
Name
|
IP
|
Malicious
|
|
---|---|---|---|
serragatino.info
|
104.21.24.192
|
||
embro.info
|
172.67.207.72
|
||
4o985rhikfsof.b-cdn.net
|
138.199.40.58
|
||
www.google.com
|
142.250.176.196
|
||
guayaco.info
|
104.21.69.207
|
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
104.21.24.192
|
serragatino.info
|
United States
|
||
172.67.207.72
|
embro.info
|
United States
|
||
138.199.40.58
|
4o985rhikfsof.b-cdn.net
|
European Union
|
||
168.61.215.74
|
unknown
|
United States
|
Registry
Path
|
Value
|
Malicious
|
|
---|---|---|---|
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Security Center\Provider\Av\{D68DDC3A-831F-4fae-9E44-DA132C1ACF46}
|
STATE
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Security Center
|
cval
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\google\chrome\ExtensionInstallForcelist
|
1
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Wimsys
|
mid
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Wimsys
|
uid
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Wimsys
|
aid
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Wimsys
|
aid2
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Wimsys
|
ts
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Wimsys
|
ts2
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Wimsys
|
mid
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Wimsys
|
uid
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Wimsys
|
aid
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Wimsys
|
aid2
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Wimsys
|
ts
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Wimsys
|
ts2
|
||
HKEY_LOCAL_MACHINE\SYSTEM\Software\FQ
|
unique_id
|
||
HKEY_LOCAL_MACHINE\SYSTEM\Software\FQ
|
mid
|
||
HKEY_LOCAL_MACHINE\SYSTEM\Software\FQ
|
aid
|
||
HKEY_LOCAL_MACHINE\SYSTEM\Software\FQ
|
aid2
|
||
HKEY_LOCAL_MACHINE\SYSTEM\Software\FQ
|
ts
|
||
HKEY_LOCAL_MACHINE\SYSTEM\Software\FQ
|
ts2
|
||
HKEY_LOCAL_MACHINE\SYSTEM\Software\FQ
|
brw
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Google\Chrome\NativeMessagingHosts\com.regreader.nativemessage
|
NULL
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\b0ce0805d069128c445841c673b20d15
|
aid
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\b0ce0805d069128c445841c673b20d15
|
aid
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\Wimsys
|
DisplayName
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\Wimsys
|
UninstallString
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\Wimsys
|
DisplayIcon
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Wimsys
|
a
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Wimsys
|
cid
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Wimsys
|
u
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Wimsys
|
ts
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Wimsys
|
ts
|
||
HKEY_LOCAL_MACHINE\SYSTEM\Software\FQ
|
ts
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\W32Time\Config
|
LastKnownGoodTime
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\WMI\Security
|
c688cf83-9945-5ff6-0e1e-1ff1f8a2ec9a
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\WindowsUpdate\Orchestrator
|
StartWorkerOnServiceStart
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\WindowsUpdate\Orchestrator\Scheduler
|
Checking to see if mostack override has changed
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\WindowsUpdate\Orchestrator\Scheduler
|
UsoCrmScan
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\WindowsUpdate\Orchestrator\Scheduler
|
CleanupUsoLogs
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Wimsys
|
aid2
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Wimsys
|
ts
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Wimsys
|
ts
|
||
HKEY_LOCAL_MACHINE\SYSTEM\Software\FQ
|
aid2
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Edge\ExtensionInstallForcelist
|
1
|
There are 35 hidden registries, click here to show them.
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
2477C500000
|
heap
|
page read and write
|
||
342F000
|
stack
|
page read and write
|
||
A2D000
|
heap
|
page read and write
|
||
52A0000
|
heap
|
page read and write
|
||
2BD0000
|
heap
|
page read and write
|
||
2A90000
|
heap
|
page read and write
|
||
FFF6BFE000
|
stack
|
page read and write
|
||
2E57000
|
heap
|
page execute and read and write
|
||
19AED07F000
|
heap
|
page read and write
|
||
1D98912A000
|
heap
|
page read and write
|
||
6D4D5000
|
unkown
|
page read and write
|
||
357E000
|
heap
|
page read and write
|
||
2C3E000
|
stack
|
page read and write
|
||
45D4000
|
heap
|
page read and write
|
||
2E53000
|
heap
|
page read and write
|
||
5099FEF000
|
stack
|
page read and write
|
||
213BC3D0000
|
heap
|
page read and write
|
||
1788B980000
|
heap
|
page read and write
|
||
2D50000
|
heap
|
page read and write
|
||
498E000
|
stack
|
page read and write
|
||
5074000
|
heap
|
page read and write
|
||
344E000
|
heap
|
page read and write
|
||
4CE0000
|
heap
|
page read and write
|
||
31BE000
|
unkown
|
page read and write
|
||
265DB390000
|
heap
|
page read and write
|
||
E7B000
|
heap
|
page read and write
|
||
22638C10000
|
heap
|
page read and write
|
||
2EBB000
|
heap
|
page read and write
|
||
19AED02B000
|
heap
|
page read and write
|
||
1C9C6765000
|
heap
|
page read and write
|
||
541B000
|
heap
|
page read and write
|
||
2DB0000
|
heap
|
page read and write
|
||
2A025320000
|
remote allocation
|
page read and write
|
||
2FFC000
|
stack
|
page read and write
|
||
2C8E000
|
stack
|
page read and write
|
||
21BD9483000
|
heap
|
page read and write
|
||
2E46000
|
heap
|
page read and write
|
||
6EE0D000
|
unkown
|
page read and write
|
||
32CC000
|
heap
|
page read and write
|
||
1D988816000
|
heap
|
page read and write
|
||
2CA8000
|
heap
|
page read and write
|
||
4B88000
|
heap
|
page read and write
|
||
1800DF000
|
unkown
|
page write copy
|
||
52D6FFD000
|
stack
|
page read and write
|
||
3070000
|
heap
|
page read and write
|
||
53FF000
|
stack
|
page read and write
|
||
1800E1000
|
unkown
|
page read and write
|
||
257B8600000
|
heap
|
page read and write
|
||
2DAB000
|
heap
|
page read and write
|
||
21BD9430000
|
direct allocation
|
page execute and read and write
|
||
21BD7D25000
|
heap
|
page read and write
|
||
B273B7E000
|
stack
|
page read and write
|
||
4B92000
|
heap
|
page read and write
|
||
4E8A000
|
heap
|
page read and write
|
||
180001000
|
unkown
|
page execute read
|
||
1A89316C000
|
heap
|
page read and write
|
||
880000
|
heap
|
page read and write
|
||
1DDF0469000
|
heap
|
page read and write
|
||
E9D7677000
|
stack
|
page read and write
|
||
294F000
|
stack
|
page read and write
|
||
27E8000
|
stack
|
page read and write
|
||
22638B11000
|
heap
|
page read and write
|
||
265DB445000
|
heap
|
page read and write
|
||
303307E000
|
stack
|
page read and write
|
||
560D000
|
heap
|
page read and write
|
||
265DCDE0000
|
heap
|
page read and write
|
||
3226000
|
heap
|
page read and write
|
||
2AD3000
|
heap
|
page read and write
|
||
24C0000
|
heap
|
page read and write
|
||
26B78286000
|
heap
|
page read and write
|
||
26B78281000
|
heap
|
page read and write
|
||
3032A7E000
|
stack
|
page read and write
|
||
7D0000
|
heap
|
page read and write
|
||
5A3E000
|
stack
|
page read and write
|
||
2E53000
|
heap
|
page read and write
|
||
3275000
|
heap
|
page read and write
|
||
4CD000
|
stack
|
page read and write
|
||
2DCB000
|
heap
|
page read and write
|
||
4BA2000
|
heap
|
page read and write
|
||
3588000
|
heap
|
page read and write
|
||
2477E090000
|
heap
|
page read and write
|
||
610C000
|
stack
|
page read and write
|
||
166D8850000
|
direct allocation
|
page execute and read and write
|
||
1D989100000
|
heap
|
page read and write
|
||
358B000
|
heap
|
page read and write
|
||
180001000
|
unkown
|
page execute read
|
||
6CAD9FE000
|
stack
|
page read and write
|
||
1C9C8040000
|
heap
|
page read and write
|
||
482B000
|
stack
|
page read and write
|
||
6EE06000
|
unkown
|
page readonly
|
||
AA0000
|
heap
|
page read and write
|
||
8FE000
|
unkown
|
page read and write
|
||
4CC1000
|
heap
|
page read and write
|
||
2D21000
|
heap
|
page read and write
|
||
166D868E000
|
heap
|
page read and write
|
||
2D9F000
|
stack
|
page read and write
|
||
26B78252000
|
heap
|
page read and write
|
||
2CE8000
|
heap
|
page read and write
|
||
265DCF59000
|
heap
|
page read and write
|
||
1A892F61000
|
heap
|
page read and write
|
||
308E000
|
heap
|
page read and write
|
||
6EE0F000
|
unkown
|
page readonly
|
||
2E59000
|
heap
|
page read and write
|
||
19AED025000
|
heap
|
page read and write
|
||
26B78302000
|
heap
|
page read and write
|
||
22637210000
|
heap
|
page read and write
|
||
257B8602000
|
heap
|
page read and write
|
||
26B78285000
|
heap
|
page read and write
|
||
4DB0000
|
heap
|
page read and write
|
||
5651000
|
heap
|
page read and write
|
||
3588000
|
heap
|
page read and write
|
||
35DD000
|
stack
|
page read and write
|
||
24FC000
|
stack
|
page read and write
|
||
1BFBB600000
|
heap
|
page read and write
|
||
4B70000
|
heap
|
page read and write
|
||
1800DF000
|
unkown
|
page write copy
|
||
166D86F0000
|
heap
|
page read and write
|
||
32E4000
|
heap
|
page read and write
|
||
22636F3E000
|
heap
|
page read and write
|
||
2C8F000
|
stack
|
page read and write
|
||
3588000
|
heap
|
page read and write
|
||
1C74AD3E000
|
direct allocation
|
page execute and read and write
|
||
2477E42E000
|
direct allocation
|
page execute and read and write
|
||
324C000
|
heap
|
page read and write
|
||
58C0000
|
heap
|
page read and write
|
||
3032F7E000
|
unkown
|
page readonly
|
||
2DA8000
|
heap
|
page read and write
|
||
3175000
|
heap
|
page read and write
|
||
6EDF1000
|
unkown
|
page execute read
|
||
295D000
|
stack
|
page read and write
|
||
4D7C000
|
heap
|
page read and write
|
||
83C000
|
stack
|
page read and write
|
||
2AB9000
|
heap
|
page read and write
|
||
52DA000
|
heap
|
page read and write
|
||
4E84000
|
heap
|
page read and write
|
||
1BFBB602000
|
heap
|
page read and write
|
||
3264000
|
heap
|
page read and write
|
||
2477C4E0000
|
heap
|
page read and write
|
||
29B0000
|
heap
|
page read and write
|
||
265DCEEA000
|
heap
|
page read and write
|
||
26B78266000
|
heap
|
page read and write
|
||
4CD0000
|
heap
|
page read and write
|
||
19AED102000
|
heap
|
page read and write
|
||
26B7825A000
|
heap
|
page read and write
|
||
52D63FE000
|
unkown
|
page readonly
|
||
19AED815000
|
heap
|
page read and write
|
||
1A892D8A000
|
direct allocation
|
page execute and read and write
|
||
1C9C6760000
|
heap
|
page read and write
|
||
6D4A1000
|
unkown
|
page execute read
|
||
34B8000
|
direct allocation
|
page execute and read and write
|
||
2FB0000
|
heap
|
page read and write
|
||
2DAF000
|
heap
|
page read and write
|
||
2DB4000
|
heap
|
page read and write
|
||
314E000
|
stack
|
page read and write
|
||
359B000
|
heap
|
page read and write
|
||
320A000
|
heap
|
page read and write
|
||
1C9C8110000
|
heap
|
page read and write
|
||
166D8C21000
|
heap
|
page read and write
|
||
5BDF000
|
heap
|
page read and write
|
||
26B78242000
|
heap
|
page read and write
|
||
4B8C000
|
heap
|
page read and write
|
||
9FB000
|
heap
|
page read and write
|
||
21BD97FE000
|
direct allocation
|
page execute and read and write
|
||
29A0000
|
heap
|
page read and write
|
||
52D9000
|
heap
|
page read and write
|
||
E9D777F000
|
stack
|
page read and write
|
||
4BC2000
|
heap
|
page read and write
|
||
4E8D000
|
heap
|
page read and write
|
||
1788D460000
|
direct allocation
|
page execute and read and write
|
||
298E000
|
stack
|
page read and write
|
||
21BD78E0000
|
heap
|
page read and write
|
||
2DFF000
|
heap
|
page read and write
|
||
4830000
|
heap
|
page read and write
|
||
30A0000
|
heap
|
page read and write
|
||
346537F000
|
stack
|
page read and write
|
||
343B000
|
heap
|
page read and write
|
||
6EE0D000
|
unkown
|
page read and write
|
||
1D988868000
|
heap
|
page read and write
|
||
180000000
|
unkown
|
page readonly
|
||
52A5000
|
heap
|
page read and write
|
||
1A892F65000
|
heap
|
page read and write
|
||
64267AF000
|
stack
|
page read and write
|
||
5044C7E000
|
stack
|
page read and write
|
||
4D24000
|
heap
|
page read and write
|
||
26B78283000
|
heap
|
page read and write
|
||
32DA000
|
heap
|
page read and write
|
||
2477E1A0000
|
heap
|
page read and write
|
||
2960000
|
heap
|
page read and write
|
||
B2744FE000
|
stack
|
page read and write
|
||
9FB000
|
heap
|
page read and write
|
||
6210000
|
remote allocation
|
page read and write
|
||
6EE0F000
|
unkown
|
page readonly
|
||
1BFBB810000
|
heap
|
page read and write
|
||
1A892A70000
|
heap
|
page read and write
|
||
3550000
|
heap
|
page read and write
|
||
324B000
|
heap
|
page read and write
|
||
26B78249000
|
heap
|
page read and write
|
||
323D000
|
heap
|
page read and write
|
||
9E8000
|
heap
|
page read and write
|
||
2D8E000
|
heap
|
page read and write
|
||
2ECC000
|
stack
|
page read and write
|
||
A2C000
|
heap
|
page read and write
|
||
6D4D7000
|
unkown
|
page readonly
|
||
5FDB000
|
stack
|
page read and write
|
||
3469000
|
heap
|
page read and write
|
||
4EED000
|
stack
|
page read and write
|
||
5480000
|
direct allocation
|
page read and write
|
||
6EDF0000
|
unkown
|
page readonly
|
||
2A025320000
|
remote allocation
|
page read and write
|
||
52D6DFE000
|
stack
|
page read and write
|
||
5F70000
|
heap
|
page read and write
|
||
4F84000
|
heap
|
page read and write
|
||
34CF000
|
stack
|
page read and write
|
||
55CE000
|
heap
|
page read and write
|
||
22638C89000
|
heap
|
page read and write
|
||
5FE000
|
stack
|
page read and write
|
||
265DB440000
|
heap
|
page read and write
|
||
4701000
|
direct allocation
|
page execute and read and write
|
||
325A000
|
heap
|
page read and write
|
||
333E000
|
stack
|
page read and write
|
||
2EB3000
|
heap
|
page read and write
|
||
4F30000
|
heap
|
page read and write
|
||
2ECF000
|
heap
|
page read and write
|
||
26B781A0000
|
heap
|
page read and write
|
||
290F000
|
stack
|
page read and write
|
||
29EE000
|
stack
|
page read and write
|
||
265DCEE0000
|
heap
|
page read and write
|
||
1A892780000
|
heap
|
page read and write
|
||
344E000
|
stack
|
page read and write
|
||
2D27000
|
heap
|
page execute and read and write
|
||
3032DFE000
|
stack
|
page read and write
|
||
1D988813000
|
heap
|
page read and write
|
||
26B78268000
|
heap
|
page read and write
|
||
4A70000
|
heap
|
page read and write
|
||
B273FFE000
|
unkown
|
page readonly
|
||
31B0000
|
heap
|
page read and write
|
||
1788D7A0000
|
direct allocation
|
page execute and read and write
|
||
468E000
|
stack
|
page read and write
|
||
356B000
|
heap
|
page read and write
|
||
52D637D000
|
stack
|
page read and write
|
||
1BFBBD80000
|
trusted library allocation
|
page read and write
|
||
4EE2000
|
heap
|
page read and write
|
||
1DDF0459000
|
heap
|
page read and write
|
||
1C9C8219000
|
heap
|
page read and write
|
||
4F51000
|
heap
|
page read and write
|
||
1C9C6560000
|
heap
|
page read and write
|
||
1DDF02F0000
|
heap
|
page read and write
|
||
52D70FE000
|
unkown
|
page readonly
|
||
22638BAF000
|
heap
|
page read and write
|
||
325C000
|
stack
|
page read and write
|
||
2ABF000
|
heap
|
page read and write
|
||
257B8660000
|
heap
|
page read and write
|
||
4710000
|
heap
|
page read and write
|
||
444E000
|
stack
|
page read and write
|
||
5221000
|
heap
|
page read and write
|
||
21BD7A52000
|
heap
|
page read and write
|
||
1C9C8100000
|
heap
|
page read and write
|
||
4708000
|
direct allocation
|
page execute and read and write
|
||
3457000
|
heap
|
page read and write
|
||
26B78267000
|
heap
|
page read and write
|
||
44CF000
|
stack
|
page read and write
|
||
BD0000
|
heap
|
page read and write
|
||
523B000
|
stack
|
page read and write
|
||
5B6E000
|
stack
|
page read and write
|
||
2A9A000
|
heap
|
page read and write
|
||
3279000
|
heap
|
page read and write
|
||
5D70000
|
direct allocation
|
page read and write
|
||
350E000
|
stack
|
page read and write
|
||
6EDF1000
|
unkown
|
page execute read
|
||
4B9E000
|
heap
|
page read and write
|
||
2DAC000
|
stack
|
page read and write
|
||
26B78213000
|
heap
|
page read and write
|
||
5AF6000
|
heap
|
page read and write
|
||
55E8000
|
heap
|
page read and write
|
||
45EF000
|
stack
|
page read and write
|
||
4CCD000
|
heap
|
page read and write
|
||
33EE000
|
stack
|
page read and write
|
||
E87000
|
heap
|
page read and write
|
||
346A000
|
heap
|
page read and write
|
||
2EBF000
|
heap
|
page read and write
|
||
3D0000
|
heap
|
page read and write
|
||
6EE0F000
|
unkown
|
page readonly
|
||
5548000
|
heap
|
page read and write
|
||
2D21000
|
heap
|
page read and write
|
||
3465000
|
heap
|
page read and write
|
||
32D1000
|
heap
|
page read and write
|
||
6D4A1000
|
unkown
|
page execute read
|
||
3249000
|
heap
|
page read and write
|
||
265DD1F0000
|
direct allocation
|
page execute and read and write
|
||
1800E4000
|
unkown
|
page readonly
|
||
3457000
|
heap
|
page read and write
|
||
2B5A000
|
heap
|
page read and write
|
||
6CAD3CB000
|
stack
|
page read and write
|
||
2C67000
|
heap
|
page read and write
|
||
5BFC000
|
heap
|
page read and write
|
||
5420000
|
heap
|
page read and write
|
||
359B000
|
heap
|
page read and write
|
||
2AC6000
|
heap
|
page read and write
|
||
5AEA000
|
heap
|
page read and write
|
||
3268000
|
heap
|
page read and write
|
||
448E000
|
stack
|
page read and write
|
||
24CA000
|
heap
|
page read and write
|
||
6EE06000
|
unkown
|
page readonly
|
||
26B78270000
|
heap
|
page read and write
|
||
19AED802000
|
heap
|
page read and write
|
||
1C9C81AF000
|
heap
|
page read and write
|
||
1C74ACB0000
|
direct allocation
|
page execute and read and write
|
||
470D000
|
stack
|
page read and write
|
||
2EFE000
|
stack
|
page read and write
|
||
6EDF1000
|
unkown
|
page execute read
|
||
55CC000
|
heap
|
page read and write
|
||
52FA000
|
heap
|
page read and write
|
||
5339000
|
heap
|
page read and write
|
||
52D73FE000
|
unkown
|
page readonly
|
||
257B864C000
|
heap
|
page read and write
|
||
4950000
|
heap
|
page read and write
|
||
1800B1000
|
unkown
|
page readonly
|
||
7E378A7000
|
stack
|
page read and write
|
||
2C8E000
|
stack
|
page read and write
|
||
6210000
|
direct allocation
|
page read and write
|
||
2477C66D000
|
heap
|
page read and write
|
||
2DFA000
|
heap
|
page read and write
|
||
257B8E02000
|
trusted library allocation
|
page read and write
|
||
470000
|
heap
|
page read and write
|
||
2A023813000
|
heap
|
page read and write
|
||
52D71FE000
|
unkown
|
page readonly
|
||
213BC8A0000
|
heap
|
page read and write
|
||
4B9E000
|
heap
|
page read and write
|
||
1C9C8289000
|
heap
|
page read and write
|
||
47CE000
|
stack
|
page read and write
|
||
6EE06000
|
unkown
|
page readonly
|
||
4DFF000
|
stack
|
page read and write
|
||
6EDF0000
|
unkown
|
page readonly
|
||
1788D4A0000
|
heap
|
page read and write
|
||
4EB8000
|
heap
|
page read and write
|
||
26B78255000
|
heap
|
page read and write
|
||
4F2C000
|
stack
|
page read and write
|
||
22638C11000
|
heap
|
page read and write
|
||
226371B0000
|
heap
|
page read and write
|
||
21BD79B8000
|
heap
|
page read and write
|
||
2C60000
|
heap
|
page read and write
|
||
26B7823F000
|
heap
|
page read and write
|
||
1DDF0402000
|
heap
|
page read and write
|
||
1788BAC0000
|
heap
|
page read and write
|
||
357E000
|
heap
|
page read and write
|
||
2DBB000
|
heap
|
page read and write
|
||
4E6E000
|
heap
|
page read and write
|
||
2C4E000
|
stack
|
page read and write
|
||
344E000
|
heap
|
page read and write
|
||
5444000
|
heap
|
page read and write
|
||
6EE0F000
|
unkown
|
page readonly
|
||
336E000
|
stack
|
page read and write
|
||
2DB8000
|
heap
|
page read and write
|
||
2D1D000
|
heap
|
page read and write
|
||
4D2F000
|
heap
|
page read and write
|
||
26B7824C000
|
heap
|
page read and write
|
||
4E20000
|
heap
|
page read and write
|
||
25F0000
|
heap
|
page read and write
|
||
166D8C21000
|
heap
|
page read and write
|
||
1C9C8111000
|
heap
|
page read and write
|
||
359B000
|
heap
|
page read and write
|
||
1C74ABCD000
|
heap
|
page read and write
|
||
A2B000
|
heap
|
page read and write
|
||
323C000
|
stack
|
page read and write
|
||
2DBC000
|
heap
|
page read and write
|
||
180001000
|
unkown
|
page execute read
|
||
61CF000
|
stack
|
page read and write
|
||
21BD79CF000
|
heap
|
page read and write
|
||
166D8880000
|
heap
|
page read and write
|
||
4D7E000
|
stack
|
page read and write
|
||
294E000
|
stack
|
page read and write
|
||
2DA4000
|
heap
|
page read and write
|
||
2DBB000
|
heap
|
page read and write
|
||
59FE000
|
stack
|
page read and write
|
||
2A40000
|
heap
|
page read and write
|
||
50D000
|
stack
|
page read and write
|
||
464C000
|
direct allocation
|
page execute and read and write
|
||
3230000
|
heap
|
page read and write
|
||
1C74AD50000
|
heap
|
page read and write
|
||
B0F000
|
unkown
|
page read and write
|
||
2A02382B000
|
heap
|
page read and write
|
||
1A89289E000
|
heap
|
page read and write
|
||
5C2D000
|
heap
|
page read and write
|
||
6CADBFF000
|
stack
|
page read and write
|
||
6EDF1000
|
unkown
|
page execute read
|
||
A28000
|
heap
|
page read and write
|
||
3F0000
|
heap
|
page read and write
|
||
257B8702000
|
heap
|
page read and write
|
||
6EE0F000
|
unkown
|
page readonly
|
||
6210000
|
remote allocation
|
page read and write
|
||
52D4000
|
heap
|
page read and write
|
||
2D8E000
|
heap
|
page read and write
|
||
1BFBB646000
|
heap
|
page read and write
|
||
6EDF1000
|
unkown
|
page execute read
|
||
2D77000
|
heap
|
page read and write
|
||
5BE5000
|
heap
|
page read and write
|
||
1A892F60000
|
heap
|
page read and write
|
||
52A0000
|
heap
|
page read and write
|
||
780000
|
heap
|
page read and write
|
||
22637270000
|
heap
|
page read and write
|
||
356C000
|
heap
|
page read and write
|
||
2DBF000
|
heap
|
page read and write
|
||
1A892680000
|
heap
|
page read and write
|
||
2CC0000
|
heap
|
page read and write
|
||
22636EE0000
|
heap
|
page read and write
|
||
52F5000
|
heap
|
page read and write
|
||
2B50000
|
heap
|
page read and write
|
||
479000
|
stack
|
page read and write
|
||
55C9000
|
heap
|
page read and write
|
||
5330000
|
heap
|
page read and write
|
||
2A023A10000
|
heap
|
page read and write
|
||
A30000
|
heap
|
page read and write
|
||
6CADAFE000
|
stack
|
page read and write
|
||
8B0000
|
heap
|
page read and write
|
||
531D000
|
heap
|
page read and write
|
||
2F0C000
|
stack
|
page read and write
|
||
B2742FD000
|
stack
|
page read and write
|
||
265DCDE1000
|
heap
|
page read and write
|
||
3266000
|
heap
|
page read and write
|
||
213BC270000
|
heap
|
page read and write
|
||
2ECF000
|
heap
|
page read and write
|
||
32C000
|
stack
|
page read and write
|
||
5346000
|
heap
|
page read and write
|
||
2AAD000
|
heap
|
page read and write
|
||
6EE0D000
|
unkown
|
page read and write
|
||
26B7826C000
|
heap
|
page read and write
|
||
26B7829F000
|
heap
|
page read and write
|
||
1D988848000
|
heap
|
page read and write
|
||
2D70000
|
heap
|
page read and write
|
||
265DB240000
|
heap
|
page read and write
|
||
166D8510000
|
heap
|
page read and write
|
||
359E000
|
unkown
|
page read and write
|
||
2C4F000
|
stack
|
page read and write
|
||
1A892E50000
|
heap
|
page read and write
|
||
31C0000
|
heap
|
page read and write
|
||
6D4D1000
|
unkown
|
page readonly
|
||
5F90000
|
heap
|
page read and write
|
||
5BDC000
|
heap
|
page read and write
|
||
FBE000
|
stack
|
page read and write
|
||
2A023902000
|
heap
|
page read and write
|
||
2E99000
|
heap
|
page read and write
|
||
2B70000
|
heap
|
page read and write
|
||
E60000
|
heap
|
page read and write
|
||
1C74AC10000
|
heap
|
page read and write
|
||
2477E22E000
|
heap
|
page read and write
|
||
4DAA000
|
heap
|
page read and write
|
||
26B78284000
|
heap
|
page read and write
|
||
22636F30000
|
heap
|
page read and write
|
||
2E32000
|
heap
|
page read and write
|
||
2DEC000
|
stack
|
page read and write
|
||
6EDF0000
|
unkown
|
page readonly
|
||
3243000
|
heap
|
page read and write
|
||
1C9C66E0000
|
direct allocation
|
page execute and read and write
|
||
320E000
|
stack
|
page read and write
|
||
2A0237F0000
|
heap
|
page read and write
|
||
3467000
|
heap
|
page read and write
|
||
213BC3D5000
|
heap
|
page read and write
|
||
59BC000
|
stack
|
page read and write
|
||
1DDF0400000
|
heap
|
page read and write
|
||
26B78930000
|
trusted library allocation
|
page read and write
|
||
52AC000
|
heap
|
page read and write
|
||
52EE000
|
stack
|
page read and write
|
||
1C74C680000
|
heap
|
page read and write
|
||
26B78235000
|
heap
|
page read and write
|
||
533E000
|
stack
|
page read and write
|
||
4DB6000
|
heap
|
page read and write
|
||
2CA0000
|
heap
|
page read and write
|
||
1C9C8210000
|
heap
|
page read and write
|
||
1788B9E0000
|
heap
|
page read and write
|
||
1D989118000
|
heap
|
page read and write
|
||
354F000
|
stack
|
page read and write
|
||
2ABF000
|
heap
|
page read and write
|
||
4CE0000
|
heap
|
page read and write
|
||
5AA0000
|
heap
|
page read and write
|
||
22637275000
|
heap
|
page read and write
|
||
470C000
|
direct allocation
|
page execute and read and write
|
||
19AED04B000
|
heap
|
page read and write
|
||
1A892E61000
|
heap
|
page read and write
|
||
5AA5000
|
heap
|
page read and write
|
||
330F000
|
stack
|
page read and write
|
||
1A892FD9000
|
heap
|
page read and write
|
||
5910000
|
heap
|
page read and write
|
||
2D15000
|
heap
|
page read and write
|
||
3038000
|
stack
|
page read and write
|
||
2DA8000
|
heap
|
page read and write
|
||
257B8641000
|
heap
|
page read and write
|
||
1C9C670A000
|
direct allocation
|
page execute and read and write
|
||
2D40000
|
heap
|
page read and write
|
||
3255000
|
heap
|
page read and write
|
||
1C74AC80000
|
direct allocation
|
page execute and read and write
|
||
7E379AF000
|
stack
|
page read and write
|
||
1D988790000
|
heap
|
page read and write
|
||
2E58000
|
heap
|
page execute and read and write
|
||
2EBB000
|
heap
|
page read and write
|
||
2DB3000
|
heap
|
page read and write
|
||
50FE000
|
stack
|
page read and write
|
||
3790000
|
heap
|
page read and write
|
||
343F000
|
heap
|
page read and write
|
||
2D1D000
|
heap
|
page read and write
|
||
30D0000
|
heap
|
page read and write
|
||
4C8C000
|
heap
|
page read and write
|
||
356B000
|
heap
|
page read and write
|
||
AFC000
|
stack
|
page read and write
|
||
2D69000
|
heap
|
page read and write
|
||
6EE06000
|
unkown
|
page readonly
|
||
6210000
|
direct allocation
|
page read and write
|
||
2540000
|
heap
|
page read and write
|
||
52D69FE000
|
stack
|
page read and write
|
||
1800DD000
|
unkown
|
page read and write
|
||
2A3C000
|
stack
|
page read and write
|
||
3269000
|
heap
|
page read and write
|
||
3350000
|
heap
|
page read and write
|
||
5F80000
|
heap
|
page read and write
|
||
166D8F20000
|
direct allocation
|
page execute and read and write
|
||
1DDF0437000
|
heap
|
page read and write
|
||
21BD7A8B000
|
heap
|
page read and write
|
||
494F000
|
stack
|
page read and write
|
||
3268000
|
heap
|
page read and write
|
||
265DB1F0000
|
heap
|
page read and write
|
||
474E000
|
stack
|
page read and write
|
||
22639022000
|
direct allocation
|
page execute and read and write
|
||
166D860B000
|
heap
|
page read and write
|
||
601C000
|
stack
|
page read and write
|
||
1A892E60000
|
heap
|
page read and write
|
||
4CA0000
|
heap
|
page read and write
|
||
11EF000
|
stack
|
page read and write
|
||
2A02387A000
|
heap
|
page read and write
|
||
562D000
|
heap
|
page read and write
|
||
6EE0F000
|
unkown
|
page readonly
|
||
2D0A000
|
heap
|
page read and write
|
||
96F000
|
unkown
|
page read and write
|
||
B273C7E000
|
stack
|
page read and write
|
||
19AED03A000
|
heap
|
page read and write
|
||
2DA8000
|
heap
|
page read and write
|
||
1DDF0502000
|
heap
|
page read and write
|
||
21BD9571000
|
heap
|
page read and write
|
||
9AE000
|
stack
|
page read and write
|
||
19AED041000
|
heap
|
page read and write
|
||
26B78288000
|
heap
|
page read and write
|
||
1D988837000
|
heap
|
page read and write
|
||
5C4C000
|
heap
|
page read and write
|
||
19AED002000
|
heap
|
page read and write
|
||
6EE06000
|
unkown
|
page readonly
|
||
6EDF0000
|
unkown
|
page readonly
|
||
4DA4000
|
heap
|
page read and write
|
||
1D988823000
|
heap
|
page read and write
|
||
2D95000
|
heap
|
page read and write
|
||
327F000
|
heap
|
page read and write
|
||
A1A000
|
heap
|
page read and write
|
||
2D1D000
|
heap
|
page read and write
|
||
4D89000
|
heap
|
page read and write
|
||
A1A000
|
heap
|
page read and write
|
||
3266000
|
heap
|
page read and write
|
||
2550000
|
heap
|
page read and write
|
||
4F50000
|
heap
|
page read and write
|
||
26B78241000
|
heap
|
page read and write
|
||
52FF000
|
stack
|
page read and write
|
||
2DF6000
|
heap
|
page read and write
|
||
3464000
|
heap
|
page read and write
|
||
257B864A000
|
heap
|
page read and write
|
||
213BCC2E000
|
direct allocation
|
page execute and read and write
|
||
2A023900000
|
heap
|
page read and write
|
||
3BC000
|
stack
|
page read and write
|
||
1C9C64A0000
|
heap
|
page read and write
|
||
36C000
|
stack
|
page read and write
|
||
257B8613000
|
heap
|
page read and write
|
||
356F000
|
heap
|
page read and write
|
||
1D9887A0000
|
heap
|
page read and write
|
||
303267E000
|
unkown
|
page readonly
|
||
26B7826E000
|
heap
|
page read and write
|
||
303257E000
|
stack
|
page read and write
|
||
2E39000
|
heap
|
page read and write
|
||
B2743FE000
|
unkown
|
page readonly
|
||
32F0000
|
heap
|
page read and write
|
||
3310000
|
heap
|
page read and write
|
||
166D8877000
|
direct allocation
|
page execute and read and write
|
||
1BFBBD90000
|
trusted library allocation
|
page read and write
|
||
79D397E000
|
stack
|
page read and write
|
||
5305000
|
heap
|
page read and write
|
||
213BC8A1000
|
heap
|
page read and write
|
||
3259000
|
heap
|
page read and write
|
||
213BC9A0000
|
heap
|
page read and write
|
||
3255000
|
heap
|
page read and write
|
||
E7F000
|
heap
|
page read and write
|
||
21BD9457000
|
direct allocation
|
page execute and read and write
|
||
E70000
|
heap
|
page read and write
|
||
1C9C6670000
|
heap
|
page read and write
|
||
19AED000000
|
heap
|
page read and write
|
||
6EE0F000
|
unkown
|
page readonly
|
||
E9D76FF000
|
stack
|
page read and write
|
||
AA5000
|
heap
|
page read and write
|
||
55D1000
|
heap
|
page read and write
|
||
3457000
|
heap
|
page read and write
|
||
4D40000
|
heap
|
page read and write
|
||
52F4000
|
heap
|
page read and write
|
||
4D84000
|
heap
|
page read and write
|
||
5342000
|
heap
|
page read and write
|
||
33CE000
|
stack
|
page read and write
|
||
180000000
|
unkown
|
page readonly
|
||
2AB0000
|
heap
|
page read and write
|
||
2A90000
|
heap
|
page read and write
|
||
549D000
|
heap
|
page read and write
|
||
5BAE000
|
stack
|
page read and write
|
||
26B7829C000
|
heap
|
page read and write
|
||
3594000
|
heap
|
page read and write
|
||
4CD7000
|
heap
|
page read and write
|
||
32DA000
|
heap
|
page read and write
|
||
3032E7E000
|
unkown
|
page readonly
|
||
53A3000
|
heap
|
page read and write
|
||
2AB9000
|
heap
|
page read and write
|
||
250E000
|
heap
|
page read and write
|
||
2D16000
|
heap
|
page read and write
|
||
265DB3A0000
|
direct allocation
|
page execute and read and write
|
||
257B8C60000
|
remote allocation
|
page read and write
|
||
2D5E000
|
stack
|
page read and write
|
||
2E47000
|
heap
|
page read and write
|
||
26B7825E000
|
heap
|
page read and write
|
||
4B0E000
|
stack
|
page read and write
|
||
4DBF000
|
stack
|
page read and write
|
||
4CC8000
|
heap
|
page read and write
|
||
2D1F000
|
stack
|
page read and write
|
||
2CDE000
|
stack
|
page read and write
|
||
290E000
|
stack
|
page read and write
|
||
B2741FE000
|
unkown
|
page readonly
|
||
87F000
|
stack
|
page read and write
|
||
537F000
|
stack
|
page read and write
|
||
2477C598000
|
heap
|
page read and write
|
||
3078000
|
stack
|
page read and write
|
||
3242000
|
heap
|
page read and write
|
||
26B78233000
|
heap
|
page read and write
|
||
4B91000
|
heap
|
page read and write
|
||
19AED100000
|
heap
|
page read and write
|
||
27C7000
|
heap
|
page read and write
|
||
19AED064000
|
heap
|
page read and write
|
||
4CDB000
|
heap
|
page read and write
|
||
925000
|
heap
|
page read and write
|
||
A27000
|
heap
|
page read and write
|
||
32A0000
|
heap
|
page read and write
|
||
19AECF20000
|
heap
|
page read and write
|
||
2DAE000
|
heap
|
page read and write
|
||
4B9A000
|
heap
|
page read and write
|
||
5C40000
|
heap
|
page read and write
|
||
298E000
|
stack
|
page read and write
|
||
1A893382000
|
direct allocation
|
page execute and read and write
|
||
A0F000
|
heap
|
page read and write
|
||
166D85F8000
|
heap
|
page read and write
|
||
4D48000
|
heap
|
page read and write
|
||
53B8000
|
heap
|
page read and write
|
||
2477C610000
|
heap
|
page read and write
|
||
4BA2000
|
heap
|
page read and write
|
||
532B000
|
heap
|
page read and write
|
||
166D86C7000
|
heap
|
page read and write
|
||
1A893280000
|
direct allocation
|
page execute and read and write
|
||
414F000
|
stack
|
page read and write
|
||
2A025320000
|
remote allocation
|
page read and write
|
||
46A0000
|
direct allocation
|
page execute and read and write
|
||
265DB261000
|
heap
|
page read and write
|
||
166D85F0000
|
heap
|
page read and write
|
||
1DDF0C02000
|
trusted library allocation
|
page read and write
|
||
532E000
|
stack
|
page read and write
|
||
3527000
|
heap
|
page read and write
|
||
2D3C000
|
stack
|
page read and write
|
||
257B862B000
|
heap
|
page read and write
|
||
5854000
|
heap
|
page read and write
|
||
49CF000
|
stack
|
page read and write
|
||
4648000
|
direct allocation
|
page execute and read and write
|
||
538E000
|
heap
|
page read and write
|
||
3FC000
|
stack
|
page read and write
|
||
4E8F000
|
heap
|
page read and write
|
||
45AE000
|
stack
|
page read and write
|
||
5BB0000
|
remote allocation
|
page read and write
|
||
A7E000
|
unkown
|
page read and write
|
||
26B78261000
|
heap
|
page read and write
|
||
2A023874000
|
heap
|
page read and write
|
||
553C000
|
heap
|
page read and write
|
||
46CF000
|
stack
|
page read and write
|
||
2EA8000
|
heap
|
page read and write
|
||
2DE7000
|
heap
|
page read and write
|
||
22638E17000
|
heap
|
page read and write
|
||
6EE06000
|
unkown
|
page readonly
|
||
5F2E000
|
heap
|
page read and write
|
||
5099F67000
|
stack
|
page read and write
|
||
3520000
|
heap
|
page read and write
|
||
A0B000
|
heap
|
page read and write
|
||
32E4000
|
heap
|
page read and write
|
||
1C74ABF0000
|
heap
|
page read and write
|
||
1800DD000
|
unkown
|
page read and write
|
||
29C0000
|
heap
|
page read and write
|
||
257B84D0000
|
heap
|
page read and write
|
||
30A5000
|
heap
|
page read and write
|
||
324B000
|
heap
|
page read and write
|
||
3267000
|
heap
|
page execute and read and write
|
||
265DB300000
|
heap
|
page read and write
|
||
6EE0F000
|
unkown
|
page readonly
|
||
32CF000
|
heap
|
page read and write
|
||
6EDF1000
|
unkown
|
page execute read
|
||
527D000
|
stack
|
page read and write
|
||
1788D4DA000
|
heap
|
page read and write
|
||
2477E017000
|
direct allocation
|
page execute and read and write
|
||
4EEB000
|
heap
|
page read and write
|
||
58B4000
|
heap
|
page read and write
|
||
1800E1000
|
unkown
|
page read and write
|
||
32B0000
|
heap
|
page read and write
|
||
4D2F000
|
heap
|
page read and write
|
||
213BC870000
|
direct allocation
|
page execute and read and write
|
||
54A9000
|
heap
|
page read and write
|
||
2C7E000
|
stack
|
page read and write
|
||
3430000
|
heap
|
page read and write
|
||
2E5E000
|
stack
|
page read and write
|
||
21BD7A8B000
|
heap
|
page read and write
|
||
6EE0D000
|
unkown
|
page read and write
|
||
2477C59F000
|
heap
|
page read and write
|
||
2EBF000
|
heap
|
page read and write
|
||
6210000
|
remote allocation
|
page read and write
|
||
2E47000
|
heap
|
page read and write
|
||
543C000
|
stack
|
page read and write
|
||
340E000
|
stack
|
page read and write
|
||
78C000
|
stack
|
page read and write
|
||
1D989102000
|
heap
|
page read and write
|
||
5450000
|
heap
|
page read and write
|
||
1A892A75000
|
heap
|
page read and write
|
||
55F1000
|
heap
|
page read and write
|
||
22638B10000
|
heap
|
page read and write
|
||
213BC3A0000
|
heap
|
page read and write
|
||
2CE8000
|
heap
|
page read and write
|
||
9E0000
|
heap
|
page read and write
|
||
53BF000
|
stack
|
page read and write
|
||
2477E1A1000
|
heap
|
page read and write
|
||
B273F7E000
|
stack
|
page read and write
|
||
344E000
|
heap
|
page read and write
|
||
1A892EFF000
|
heap
|
page read and write
|
||
1BFBB8F0000
|
heap
|
page read and write
|
||
2DB1000
|
heap
|
page read and write
|
||
7CE000
|
unkown
|
page read and write
|
||
1D988848000
|
heap
|
page read and write
|
||
2CE6000
|
heap
|
page read and write
|
||
166D8C2F000
|
heap
|
page read and write
|
||
1C74AB11000
|
heap
|
page read and write
|
||
1D989132000
|
heap
|
page read and write
|
||
4CD1000
|
heap
|
page read and write
|
||
5480000
|
remote allocation
|
page read and write
|
||
2ADD000
|
heap
|
page read and write
|
||
21BD9471000
|
heap
|
page read and write
|
||
4A0E000
|
stack
|
page read and write
|
||
2A023917000
|
heap
|
page read and write
|
||
34BC000
|
direct allocation
|
page execute and read and write
|
||
3050000
|
heap
|
page read and write
|
||
4B82000
|
heap
|
page read and write
|
||
3355000
|
heap
|
page read and write
|
||
5C40000
|
direct allocation
|
page read and write
|
||
2A44000
|
heap
|
page read and write
|
||
2DBB000
|
heap
|
page read and write
|
||
55FA000
|
heap
|
page read and write
|
||
344E000
|
heap
|
page read and write
|
||
F70000
|
heap
|
page read and write
|
||
166D8C20000
|
heap
|
page read and write
|
||
BEF000
|
stack
|
page read and write
|
||
1C9C64C1000
|
heap
|
page read and write
|
||
6D4A0000
|
unkown
|
page readonly
|
||
3449000
|
heap
|
page read and write
|
||
A1A000
|
heap
|
page read and write
|
||
2477C540000
|
heap
|
page read and write
|
||
1BFBBE02000
|
trusted library allocation
|
page read and write
|
||
561A000
|
heap
|
page read and write
|
||
3596000
|
heap
|
page read and write
|
||
1788D4A1000
|
heap
|
page read and write
|
||
166D86C7000
|
heap
|
page read and write
|
||
5BE000
|
stack
|
page read and write
|
||
534A000
|
heap
|
page read and write
|
||
1800E1000
|
unkown
|
page read and write
|
||
6EE06000
|
unkown
|
page readonly
|
||
307A000
|
heap
|
page read and write
|
||
79D3A7E000
|
unkown
|
page readonly
|
||
52D64FE000
|
unkown
|
page readonly
|
||
2A025402000
|
trusted library allocation
|
page read and write
|
||
52D68FE000
|
unkown
|
page readonly
|
||
2F10000
|
heap
|
page read and write
|
||
1788D4A1000
|
heap
|
page read and write
|
||
31BE000
|
stack
|
page read and write
|
||
3470000
|
heap
|
page read and write
|
||
477E000
|
stack
|
page read and write
|
||
51F0000
|
heap
|
page read and write
|
||
2E9C000
|
heap
|
page read and write
|
||
2CEE000
|
stack
|
page read and write
|
||
303E000
|
stack
|
page read and write
|
||
3273000
|
heap
|
page read and write
|
||
5480000
|
remote allocation
|
page read and write
|
||
1DDF0416000
|
heap
|
page read and write
|
||
53FC000
|
stack
|
page read and write
|
||
2A023AF0000
|
heap
|
page read and write
|
||
2EBF000
|
stack
|
page read and write
|
||
478E000
|
stack
|
page read and write
|
||
2A7C000
|
stack
|
page read and write
|
||
32D0000
|
heap
|
page read and write
|
||
605E000
|
stack
|
page read and write
|
||
26B78282000
|
heap
|
page read and write
|
||
3F96E7E000
|
stack
|
page read and write
|
||
3F96EFE000
|
stack
|
page read and write
|
||
5C57000
|
heap
|
page read and write
|
||
1280000
|
heap
|
page read and write
|
||
19AECE40000
|
heap
|
page read and write
|
||
1C9C6470000
|
heap
|
page read and write
|
||
4DAE000
|
heap
|
page read and write
|
||
2AC3000
|
heap
|
page read and write
|
||
2A023862000
|
heap
|
page read and write
|
||
4CAC000
|
heap
|
page read and write
|
||
48EC000
|
stack
|
page read and write
|
||
55D2000
|
heap
|
page read and write
|
||
3E0000
|
heap
|
page read and write
|
||
3599000
|
heap
|
page read and write
|
||
2D77000
|
heap
|
page read and write
|
||
1C74ABCD000
|
heap
|
page read and write
|
||
2477C590000
|
heap
|
page read and write
|
||
2CAE000
|
stack
|
page read and write
|
||
2D8C000
|
heap
|
page read and write
|
||
343A000
|
heap
|
page read and write
|
||
5044CFE000
|
stack
|
page read and write
|
||
A777DFD000
|
stack
|
page read and write
|
||
2DF5000
|
heap
|
page read and write
|
||
1788D5A0000
|
heap
|
page read and write
|
||
26B78295000
|
heap
|
page read and write
|
||
346E000
|
heap
|
page read and write
|
||
3440000
|
heap
|
page read and write
|
||
2A023800000
|
heap
|
page read and write
|
||
2CA8000
|
heap
|
page read and write
|
||
53AC000
|
heap
|
page read and write
|
||
4D23000
|
heap
|
page read and write
|
||
5BE1000
|
heap
|
page read and write
|
||
257B85E0000
|
trusted library allocation
|
page read and write
|
||
2FFF000
|
unkown
|
page read and write
|
||
2DFA000
|
heap
|
page read and write
|
||
3465000
|
heap
|
page read and write
|
||
4C80000
|
heap
|
page read and write
|
||
53AF000
|
heap
|
page read and write
|
||
2760000
|
heap
|
page read and write
|
||
4CD0000
|
heap
|
page read and write
|
||
32DA000
|
heap
|
page read and write
|
||
2DB1000
|
heap
|
page read and write
|
||
2770000
|
heap
|
page read and write
|
||
60E0000
|
trusted library allocation
|
page read and write
|
||
26B7825C000
|
heap
|
page read and write
|
||
570000
|
heap
|
page read and write
|
||
2AD0000
|
heap
|
page read and write
|
||
6D4A1000
|
unkown
|
page execute read
|
||
26B7822D000
|
heap
|
page read and write
|
||
1DDF0310000
|
heap
|
page read and write
|
||
2DBB000
|
heap
|
page read and write
|
||
47E0000
|
heap
|
page read and write
|
||
2A00000
|
heap
|
page read and write
|
||
265DB0F0000
|
heap
|
page read and write
|
||
2D21000
|
heap
|
page read and write
|
||
5128000
|
heap
|
page read and write
|
||
609F000
|
stack
|
page read and write
|
||
1C74C791000
|
heap
|
page read and write
|
||
1A8927FF000
|
heap
|
page read and write
|
||
166D8C5A000
|
heap
|
page read and write
|
||
257B8C60000
|
remote allocation
|
page read and write
|
||
2D8F000
|
heap
|
page read and write
|
||
BFC000
|
stack
|
page read and write
|
||
4E6D000
|
stack
|
page read and write
|
||
5848000
|
heap
|
page read and write
|
||
89D000
|
stack
|
page read and write
|
||
3410000
|
heap
|
page read and write
|
||
6EDF1000
|
unkown
|
page execute read
|
||
21BD9770000
|
direct allocation
|
page execute and read and write
|
||
3032B7E000
|
unkown
|
page readonly
|
||
26B7822B000
|
heap
|
page read and write
|
||
53AE000
|
heap
|
page read and write
|
||
509A27F000
|
stack
|
page read and write
|
||
FFF697F000
|
unkown
|
page read and write
|
||
3450000
|
direct allocation
|
page execute and read and write
|
||
19AECF50000
|
trusted library allocation
|
page read and write
|
||
166D866A000
|
heap
|
page read and write
|
||
52D717E000
|
stack
|
page read and write
|
||
1C9C8632000
|
direct allocation
|
page execute and read and write
|
||
E97000
|
heap
|
page read and write
|
||
213BC8AA000
|
heap
|
page read and write
|
||
265DB1D0000
|
heap
|
page read and write
|
||
265DCDD0000
|
heap
|
page read and write
|
||
64CD4FE000
|
stack
|
page read and write
|
||
6D4A0000
|
unkown
|
page readonly
|
||
4D78000
|
heap
|
page read and write
|
||
FFF687B000
|
stack
|
page read and write
|
||
511C000
|
heap
|
page read and write
|
||
4D84000
|
heap
|
page read and write
|
||
1C74AAF0000
|
heap
|
page read and write
|
||
4E8C000
|
heap
|
page read and write
|
||
166D8FAE000
|
direct allocation
|
page execute and read and write
|
||
265DB3CA000
|
direct allocation
|
page execute and read and write
|
||
2AB0000
|
heap
|
page read and write
|
||
265DD2F2000
|
direct allocation
|
page execute and read and write
|
||
4F78000
|
heap
|
page read and write
|
||
257B8C60000
|
remote allocation
|
page read and write
|
||
1C9C8530000
|
direct allocation
|
page execute and read and write
|
||
21BD9470000
|
heap
|
page read and write
|
||
2477C66D000
|
heap
|
page read and write
|
||
6EE0D000
|
unkown
|
page read and write
|
||
3428000
|
heap
|
page read and write
|
||
6EE0D000
|
unkown
|
page read and write
|
||
2AC0000
|
heap
|
page read and write
|
||
2CCF000
|
stack
|
page read and write
|
||
2D78000
|
heap
|
page read and write
|
||
2D8B000
|
heap
|
page read and write
|
||
5C20000
|
heap
|
page read and write
|
||
4ACF000
|
stack
|
page read and write
|
||
2AB5000
|
heap
|
page read and write
|
||
4D7C000
|
heap
|
page read and write
|
||
52E5000
|
heap
|
page read and write
|
||
52D72FE000
|
stack
|
page read and write
|
||
24FA000
|
heap
|
page read and write
|
||
4D9B000
|
heap
|
page read and write
|
||
A80000
|
heap
|
page read and write
|
||
343B000
|
heap
|
page read and write
|
||
1800B1000
|
unkown
|
page readonly
|
||
4ED8000
|
heap
|
page read and write
|
||
2AB4000
|
heap
|
page read and write
|
||
2D8F000
|
heap
|
page read and write
|
||
537E000
|
stack
|
page read and write
|
||
324F000
|
heap
|
page read and write
|
||
1800DD000
|
unkown
|
page read and write
|
||
1A8927ED000
|
heap
|
page read and write
|
||
1788B975000
|
heap
|
page read and write
|
||
6D4D5000
|
unkown
|
page read and write
|
||
257B865B000
|
heap
|
page read and write
|
||
21BD9570000
|
heap
|
page read and write
|
||
340F000
|
stack
|
page read and write
|
||
2CFC000
|
stack
|
page read and write
|
||
2AE0000
|
heap
|
page read and write
|
||
2DF0000
|
heap
|
page read and write
|
||
4CE7000
|
heap
|
page read and write
|
||
303317E000
|
unkown
|
page readonly
|
||
3032D7E000
|
unkown
|
page readonly
|
||
26B78250000
|
heap
|
page read and write
|
||
6EDF1000
|
unkown
|
page execute read
|
||
642672F000
|
stack
|
page read and write
|
||
30328FE000
|
stack
|
page read and write
|
||
56B3000
|
heap
|
page read and write
|
||
329C000
|
stack
|
page read and write
|
||
51E0000
|
heap
|
page read and write
|
||
26B8000
|
stack
|
page read and write
|
||
BEE000
|
stack
|
page read and write
|
||
1788B940000
|
heap
|
page read and write
|
||
4641000
|
direct allocation
|
page execute and read and write
|
||
22636EC0000
|
heap
|
page read and write
|
||
3248000
|
heap
|
page read and write
|
||
2DCB000
|
heap
|
page read and write
|
||
53B9000
|
heap
|
page read and write
|
||
1D988800000
|
heap
|
page read and write
|
||
32AC000
|
heap
|
page read and write
|
||
26B782A8000
|
heap
|
page read and write
|
||
1DDF0448000
|
heap
|
page read and write
|
||
348F000
|
stack
|
page read and write
|
||
6D4D7000
|
unkown
|
page readonly
|
||
166D8710000
|
heap
|
page read and write
|
||
1800E4000
|
unkown
|
page readonly
|
||
2DB9000
|
heap
|
page read and write
|
||
2D70000
|
heap
|
page read and write
|
||
2DB6000
|
heap
|
page read and write
|
||
3465000
|
heap
|
page read and write
|
||
4ECB000
|
heap
|
page read and write
|
||
1C74C691000
|
heap
|
page read and write
|
||
1788B9E8000
|
heap
|
page read and write
|
||
2E47000
|
heap
|
page read and write
|
||
4D78000
|
heap
|
page read and write
|
||
456F000
|
stack
|
page read and write
|
||
1C9C64A8000
|
heap
|
page read and write
|
||
19AED022000
|
heap
|
page read and write
|
||
45D0000
|
heap
|
page read and write
|
||
166D8DAE000
|
heap
|
page read and write
|
||
B273CFE000
|
unkown
|
page readonly
|
||
26B78258000
|
heap
|
page read and write
|
||
22637130000
|
direct allocation
|
page execute and read and write
|
||
5BD2000
|
heap
|
page read and write
|
||
A777CFF000
|
stack
|
page read and write
|
||
4CB1000
|
heap
|
page read and write
|
||
5AED000
|
stack
|
page read and write
|
||
597B000
|
stack
|
page read and write
|
||
5BB0000
|
remote allocation
|
page read and write
|
||
2E39000
|
heap
|
page read and write
|
||
1788B950000
|
heap
|
page read and write
|
||
33F0000
|
heap
|
page read and write
|
||
E8D000
|
heap
|
page read and write
|
||
2477E0A0000
|
heap
|
page read and write
|
||
4E85000
|
heap
|
page read and write
|
||
618E000
|
stack
|
page read and write
|
||
1788D490000
|
heap
|
page read and write
|
||
52BE000
|
stack
|
page read and write
|
||
1C74C6CA000
|
heap
|
page read and write
|
||
1C9C8211000
|
heap
|
page read and write
|
||
21BD79C6000
|
heap
|
page read and write
|
||
26B781D0000
|
heap
|
page read and write
|
||
31AF000
|
stack
|
page read and write
|
||
355E000
|
unkown
|
page read and write
|
||
2C4E000
|
stack
|
page read and write
|
||
265DB248000
|
heap
|
page read and write
|
||
2BF0000
|
heap
|
page read and write
|
||
5C40000
|
direct allocation
|
page read and write
|
||
29CF000
|
stack
|
page read and write
|
||
3F96BD7000
|
stack
|
page read and write
|
||
309E000
|
unkown
|
page read and write
|
||
4E24000
|
heap
|
page read and write
|
||
1BFBB702000
|
heap
|
page read and write
|
||
5C0D000
|
heap
|
page read and write
|
||
6EDF0000
|
unkown
|
page readonly
|
||
2D21000
|
heap
|
page read and write
|
||
52D6EFE000
|
unkown
|
page readonly
|
||
1800DF000
|
unkown
|
page write copy
|
||
9FF000
|
heap
|
page read and write
|
||
4CE1000
|
heap
|
page read and write
|
||
339F000
|
stack
|
page read and write
|
||
6EDF0000
|
unkown
|
page readonly
|
||
1D988887000
|
heap
|
page read and write
|
||
26F8000
|
stack
|
page read and write
|
||
3469000
|
heap
|
page read and write
|
||
A1A000
|
heap
|
page read and write
|
||
180000000
|
unkown
|
page readonly
|
||
3448000
|
heap
|
page read and write
|
||
22638C1B000
|
heap
|
page read and write
|
||
50449B7000
|
stack
|
page read and write
|
||
290E000
|
stack
|
page read and write
|
||
2FBE000
|
unkown
|
page read and write
|
||
B2740FE000
|
stack
|
page read and write
|
||
2CCA000
|
heap
|
page read and write
|
||
2477DFF0000
|
direct allocation
|
page execute and read and write
|
||
4B80000
|
heap
|
page read and write
|
||
48AE000
|
stack
|
page read and write
|
||
4D41000
|
heap
|
page read and write
|
||
A27000
|
heap
|
page read and write
|
||
4E90000
|
heap
|
page read and write
|
||
64CD5FE000
|
stack
|
page readonly
|
||
213BCBA0000
|
direct allocation
|
page execute and read and write
|
||
A777C77000
|
stack
|
page read and write
|
||
344E000
|
stack
|
page read and write
|
||
26B78200000
|
heap
|
page read and write
|
||
6EE0F000
|
unkown
|
page readonly
|
||
1C74AAF8000
|
heap
|
page read and write
|
||
55A0000
|
direct allocation
|
page read and write
|
||
6CC000
|
stack
|
page read and write
|
||
B8F000
|
stack
|
page read and write
|
||
1788D82E000
|
direct allocation
|
page execute and read and write
|
||
3170000
|
heap
|
page read and write
|
||
21BD7D20000
|
heap
|
page read and write
|
||
4EAF000
|
heap
|
page read and write
|
||
4BA2000
|
heap
|
page read and write
|
||
1A8927EA000
|
heap
|
page read and write
|
||
2E70000
|
heap
|
page read and write
|
||
A2E000
|
heap
|
page read and write
|
||
21BD79C7000
|
heap
|
page read and write
|
||
47BF000
|
stack
|
page read and write
|
||
5F3A000
|
heap
|
page read and write
|
||
2AF5000
|
heap
|
page read and write
|
||
3558000
|
heap
|
page read and write
|
||
19AED08C000
|
heap
|
page read and write
|
||
5480000
|
remote allocation
|
page read and write
|
||
21BD7A2E000
|
heap
|
page read and write
|
||
5624000
|
heap
|
page read and write
|
||
1800E4000
|
unkown
|
page readonly
|
||
A0F000
|
heap
|
page read and write
|
||
4E87000
|
heap
|
page read and write
|
||
5215000
|
heap
|
page read and write
|
||
3200000
|
heap
|
page read and write
|
||
2D8B000
|
heap
|
page read and write
|
||
358D000
|
heap
|
page read and write
|
||
2DB3000
|
heap
|
page read and write
|
||
26B7826B000
|
heap
|
page read and write
|
||
4CC9000
|
heap
|
page read and write
|
||
2CA0000
|
heap
|
page read and write
|
||
26B781C0000
|
heap
|
page read and write
|
||
6D4D7000
|
unkown
|
page readonly
|
||
45E0000
|
direct allocation
|
page execute and read and write
|
||
A0A000
|
heap
|
page read and write
|
||
7E3792F000
|
stack
|
page read and write
|
||
1A892D60000
|
direct allocation
|
page execute and read and write
|
||
26B78257000
|
heap
|
page read and write
|
||
2BED000
|
stack
|
page read and write
|
||
1C74AB07000
|
heap
|
page read and write
|
||
2D95000
|
heap
|
page read and write
|
||
5B2E000
|
stack
|
page read and write
|
||
26B7825D000
|
heap
|
page read and write
|
||
1788B970000
|
heap
|
page read and write
|
||
26B7822E000
|
heap
|
page read and write
|
||
1C74C691000
|
heap
|
page read and write
|
||
26B78254000
|
heap
|
page read and write
|
||
52D627C000
|
stack
|
page read and write
|
||
4E62000
|
heap
|
page read and write
|
||
5BEE000
|
stack
|
page read and write
|
||
B7BF4FF000
|
stack
|
page read and write
|
||
64CD0FB000
|
stack
|
page read and write
|
||
5300000
|
heap
|
page read and write
|
||
1788D487000
|
direct allocation
|
page execute and read and write
|
||
19AECE20000
|
heap
|
page read and write
|
||
340E000
|
stack
|
page read and write
|
||
6340000
|
direct allocation
|
page read and write
|
||
26B78260000
|
heap
|
page read and write
|
||
213BC2AD000
|
heap
|
page read and write
|
||
5068000
|
heap
|
page read and write
|
||
2477C4D0000
|
heap
|
page read and write
|
||
2DE7000
|
heap
|
page read and write
|
||
B273BFE000
|
unkown
|
page readonly
|
||
5920000
|
heap
|
page read and write
|
||
79D35BB000
|
stack
|
page read and write
|
||
4EA6000
|
heap
|
page read and write
|
||
21BD95FD000
|
heap
|
page read and write
|
||
6EE06000
|
unkown
|
page readonly
|
||
2E30000
|
heap
|
page read and write
|
||
FFF6A7F000
|
stack
|
page read and write
|
||
21BD7910000
|
heap
|
page read and write
|
||
2C3E000
|
stack
|
page read and write
|
||
1C74AB6F000
|
heap
|
page read and write
|
||
303219B000
|
stack
|
page read and write
|
||
2E3B000
|
heap
|
page read and write
|
||
21BD78F0000
|
heap
|
page read and write
|
||
32CE000
|
stack
|
page read and write
|
||
47D0000
|
heap
|
page read and write
|
||
359F000
|
heap
|
page read and write
|
||
B4E000
|
stack
|
page read and write
|
||
29F0000
|
heap
|
page read and write
|
||
26B78263000
|
heap
|
page read and write
|
||
29A0000
|
heap
|
page read and write
|
||
34B1000
|
direct allocation
|
page execute and read and write
|
||
361E000
|
stack
|
page read and write
|
||
26B782A4000
|
heap
|
page read and write
|
||
4F45000
|
heap
|
page read and write
|
||
303297E000
|
unkown
|
page readonly
|
||
770000
|
heap
|
page read and write
|
||
30C0000
|
heap
|
page read and write
|
||
4D84000
|
heap
|
page read and write
|
||
3032C7B000
|
stack
|
page read and write
|
||
25CE000
|
stack
|
page read and write
|
||
32A9000
|
heap
|
page read and write
|
||
53BE000
|
stack
|
page read and write
|
||
2D02000
|
heap
|
page read and write
|
||
5290000
|
heap
|
page read and write
|
||
343D000
|
heap
|
page read and write
|
||
6EE06000
|
unkown
|
page readonly
|
||
4D47000
|
heap
|
page read and write
|
||
540F000
|
heap
|
page read and write
|
||
6EE0D000
|
unkown
|
page read and write
|
||
1BFBB66F000
|
heap
|
page read and write
|
||
1C74C790000
|
heap
|
page read and write
|
||
1D9887D0000
|
trusted library allocation
|
page read and write
|
||
4B81000
|
heap
|
page read and write
|
||
52D67FD000
|
stack
|
page read and write
|
||
348E000
|
stack
|
page read and write
|
||
2DA0000
|
heap
|
page read and write
|
||
21BD7A8C000
|
heap
|
page read and write
|
||
19AED800000
|
heap
|
page read and write
|
||
56A7000
|
heap
|
page read and write
|
||
5D95CA8000
|
stack
|
page read and write
|
||
26B78262000
|
heap
|
page read and write
|
||
22636EB0000
|
heap
|
page read and write
|
||
22636F37000
|
heap
|
page read and write
|
||
1A892760000
|
heap
|
page read and write
|
||
6EE0D000
|
unkown
|
page read and write
|
||
1A8927E0000
|
heap
|
page read and write
|
||
2A023802000
|
heap
|
page read and write
|
||
513F000
|
stack
|
page read and write
|
||
2DB6000
|
heap
|
page read and write
|
||
1D9888B1000
|
heap
|
page read and write
|
||
83E000
|
stack
|
page read and write
|
||
4DA3000
|
heap
|
page read and write
|
||
350E000
|
stack
|
page read and write
|
||
5337000
|
heap
|
page read and write
|
||
BBE000
|
unkown
|
page read and write
|
||
3465277000
|
stack
|
page read and write
|
||
2D0E000
|
stack
|
page read and write
|
||
3268000
|
heap
|
page read and write
|
||
2DA4000
|
heap
|
page read and write
|
||
26B78A02000
|
trusted library allocation
|
page read and write
|
||
2D28000
|
heap
|
page execute and read and write
|
||
2477C545000
|
heap
|
page read and write
|
||
614C000
|
stack
|
page read and write
|
||
166D8DAD000
|
heap
|
page read and write
|
||
B273A7B000
|
stack
|
page read and write
|
||
52A1000
|
heap
|
page read and write
|
||
265DCEE1000
|
heap
|
page read and write
|
||
3490000
|
heap
|
page read and write
|
||
3597000
|
heap
|
page read and write
|
||
87C000
|
stack
|
page read and write
|
||
2DB0000
|
heap
|
page read and write
|
||
4E81000
|
heap
|
page read and write
|
||
B7BF197000
|
stack
|
page read and write
|
||
1C74AA00000
|
heap
|
page read and write
|
||
2D29000
|
heap
|
page read and write
|
||
4CB9000
|
heap
|
page read and write
|
||
5170000
|
heap
|
page read and write
|
||
5480000
|
direct allocation
|
page read and write
|
||
3590000
|
heap
|
page read and write
|
||
2D01000
|
heap
|
page read and write
|
||
486C000
|
stack
|
page read and write
|
||
1D988770000
|
heap
|
page read and write
|
||
213BC8AE000
|
heap
|
page read and write
|
||
6D4D1000
|
unkown
|
page readonly
|
||
1BFBB62B000
|
heap
|
page read and write
|
||
2A0252E0000
|
trusted library allocation
|
page read and write
|
||
A0F000
|
heap
|
page read and write
|
||
A0F000
|
heap
|
page read and write
|
||
1C74AB93000
|
heap
|
page read and write
|
||
1C74AD55000
|
heap
|
page read and write
|
||
4D8D000
|
heap
|
page read and write
|
||
1C9C841A000
|
heap
|
page read and write
|
||
4CA7000
|
heap
|
page read and write
|
||
460000
|
heap
|
page read and write
|
||
1DDF0413000
|
heap
|
page read and write
|
||
4CA5000
|
heap
|
page read and write
|
||
356F000
|
stack
|
page read and write
|
||
1C74ABCD000
|
heap
|
page read and write
|
||
31E0000
|
heap
|
page read and write
|
||
47E4000
|
heap
|
page read and write
|
||
24F0000
|
heap
|
page read and write
|
||
775000
|
heap
|
page read and write
|
||
5BB0000
|
remote allocation
|
page read and write
|
||
2D7A000
|
heap
|
page read and write
|
||
2AF0000
|
heap
|
page read and write
|
||
6D4D5000
|
unkown
|
page read and write
|
||
2A0252C0000
|
trusted library allocation
|
page read and write
|
||
3469000
|
heap
|
page read and write
|
||
46E000
|
stack
|
page read and write
|
||
19AED113000
|
heap
|
page read and write
|
||
166D8D21000
|
heap
|
page read and write
|
||
6EDF0000
|
unkown
|
page readonly
|
||
1C74ACA7000
|
direct allocation
|
page execute and read and write
|
||
1BFBB5F0000
|
heap
|
page read and write
|
||
2C50000
|
heap
|
page read and write
|
||
4B4F000
|
stack
|
page read and write
|
||
2DAE000
|
heap
|
page read and write
|
||
3276000
|
heap
|
page read and write
|
||
257B84B0000
|
heap
|
page read and write
|
||
26B7825B000
|
heap
|
page read and write
|
||
55C6000
|
heap
|
page read and write
|
||
359C000
|
heap
|
page read and write
|
||
166D8D20000
|
heap
|
page read and write
|
||
327B000
|
heap
|
page read and write
|
||
539A000
|
heap
|
page read and write
|
||
52D6AFE000
|
unkown
|
page readonly
|
||
257B85B0000
|
heap
|
page read and write
|
||
1DDF044C000
|
heap
|
page read and write
|
||
5C2E000
|
stack
|
page read and write
|
||
6EDF1000
|
unkown
|
page execute read
|
||
5BDD000
|
heap
|
page read and write
|
||
5C04000
|
heap
|
page read and write
|
||
2DBB000
|
heap
|
page read and write
|
||
64266A9000
|
stack
|
page read and write
|
||
2263715A000
|
direct allocation
|
page execute and read and write
|
||
1010000
|
heap
|
page read and write
|
||
5F95000
|
heap
|
page read and write
|
||
2D9B000
|
heap
|
page read and write
|
||
257B865C000
|
heap
|
page read and write
|
||
2AC0000
|
heap
|
page read and write
|
||
4CD4000
|
heap
|
page read and write
|
||
440E000
|
stack
|
page read and write
|
||
19AED013000
|
heap
|
page read and write
|
||
1D988902000
|
heap
|
page read and write
|
||
3457000
|
heap
|
page read and write
|
||
4CC5000
|
heap
|
page read and write
|
||
26B78231000
|
heap
|
page read and write
|
||
B7BF47E000
|
stack
|
page read and write
|
||
1C74C81D000
|
heap
|
page read and write
|
||
3420000
|
heap
|
page read and write
|
||
6EDF0000
|
unkown
|
page readonly
|
||
34652FF000
|
stack
|
page read and write
|
||
3238000
|
heap
|
page read and write
|
||
2E16000
|
heap
|
page read and write
|
||
B2745FE000
|
unkown
|
page readonly
|
||
4E91000
|
heap
|
page read and write
|
||
2DB6000
|
heap
|
page read and write
|
||
213BC2AA000
|
heap
|
page read and write
|
||
2DB7000
|
heap
|
page read and write
|
||
2AD5000
|
heap
|
page read and write
|
||
534A000
|
heap
|
page read and write
|
||
3268000
|
heap
|
page execute and read and write
|
||
2477E0A1000
|
heap
|
page read and write
|
||
7CC000
|
stack
|
page read and write
|
||
1DDF03F0000
|
heap
|
page read and write
|
||
166D8885000
|
heap
|
page read and write
|
||
4F0F000
|
heap
|
page read and write
|
||
323D000
|
heap
|
page read and write
|
||
3032EFE000
|
stack
|
page read and write
|
||
4D9B000
|
heap
|
page read and write
|
||
2DAD000
|
heap
|
page read and write
|
||
265DCE7F000
|
heap
|
page read and write
|
||
26B7824E000
|
heap
|
page read and write
|
||
22638F20000
|
direct allocation
|
page execute and read and write
|
||
52D647E000
|
stack
|
page read and write
|
||
900000
|
heap
|
page read and write
|
||
1BFBB613000
|
heap
|
page read and write
|
||
5C37000
|
heap
|
page read and write
|
||
2A023913000
|
heap
|
page read and write
|
||
2F70000
|
heap
|
page read and write
|
||
4A4F000
|
stack
|
page read and write
|
||
21BD79B0000
|
heap
|
page read and write
|
||
21BD9460000
|
heap
|
page read and write
|
||
6EDF0000
|
unkown
|
page readonly
|
||
213BC2A0000
|
heap
|
page read and write
|
||
2D6B000
|
heap
|
page read and write
|
||
213BC897000
|
direct allocation
|
page execute and read and write
|
||
1D989002000
|
heap
|
page read and write
|
||
32B8000
|
heap
|
page read and write
|
||
6D4A0000
|
unkown
|
page readonly
|
||
4C81000
|
heap
|
page read and write
|
||
1BFBB65A000
|
heap
|
page read and write
|
||
2A023840000
|
heap
|
page read and write
|
||
213BC190000
|
heap
|
page read and write
|
||
4EAF000
|
stack
|
page read and write
|
||
27C0000
|
heap
|
page read and write
|
||
2D09000
|
heap
|
page read and write
|
||
6EE0D000
|
unkown
|
page read and write
|
||
294E000
|
stack
|
page read and write
|
||
2E54000
|
heap
|
page read and write
|
||
26B7826D000
|
heap
|
page read and write
|
||
1800B1000
|
unkown
|
page readonly
|
||
2477C634000
|
heap
|
page read and write
|
||
2AF0000
|
heap
|
page read and write
|
||
32F0000
|
heap
|
page read and write
|
||
1C74C690000
|
heap
|
page read and write
|
||
70C000
|
stack
|
page read and write
|
||
1C9C6460000
|
heap
|
page read and write
|
||
6D4D1000
|
unkown
|
page readonly
|
||
2D9A000
|
heap
|
page read and write
|
||
2E01000
|
heap
|
page read and write
|
||
32E4000
|
heap
|
page read and write
|
||
2DB0000
|
heap
|
page read and write
|
||
21BD9478000
|
heap
|
page read and write
|
||
1C74AB09000
|
heap
|
page read and write
|
||
166D86C7000
|
heap
|
page read and write
|
||
32F5000
|
heap
|
page read and write
|
||
257B8660000
|
heap
|
page read and write
|
||
9FD000
|
heap
|
page read and write
|
||
920000
|
heap
|
page read and write
|
||
2DA0000
|
heap
|
page read and write
|
||
1DDF0A80000
|
trusted library allocation
|
page read and write
|
||
265DD0E0000
|
heap
|
page read and write
|
||
4CA1000
|
heap
|
page read and write
|
||
1BFBB640000
|
heap
|
page read and write
|
||
2477E3A0000
|
direct allocation
|
page execute and read and write
|
||
2E53000
|
heap
|
page read and write
|
||
2A38000
|
stack
|
page read and write
|
There are 1327 hidden memdumps, click here to show them.