Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Windows\System32\loaddll32.exe
|
loaddll32.exe "C:\Users\user\Desktop\ursnif_IAT_corrected.exe.dll"
|
||
C:\Windows\SysWOW64\regsvr32.exe
|
regsvr32.exe /s C:\Users\user\Desktop\ursnif_IAT_corrected.exe.dll
|
||
C:\Windows\SysWOW64\rundll32.exe
|
rundll32.exe "C:\Users\user\Desktop\ursnif_IAT_corrected.exe.dll",#1
|
||
C:\Windows\SysWOW64\rundll32.exe
|
rundll32.exe C:\Users\user\Desktop\ursnif_IAT_corrected.exe.dll,DllRegisterServer
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\SysWOW64\cmd.exe
|
cmd.exe /C rundll32.exe "C:\Users\user\Desktop\ursnif_IAT_corrected.exe.dll",#1
|
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
http://linetwork.top/drew/NXo6zedpn_2B_/2BcanAQX/FnyJMATt_2F48kv6_2FGokp/FknJiZ4BPO/rcHYyBUZQ99j1sGoQ/3iqH_2FJ2MwI/44xXh3ewHre/Z3uYW8oE7cSgpQ/KoDoLpaNqGjAzcl7PDDtU/W4U8yO0BLXfpg6Fg/1LkQrB_2FwF36_2/F24Alce0F3ZIABc8fP/582wfkRmY/YYSggLyv6WiREP5aRpD7/BrtAiO3VnPYflPLClgV/qChVx2f_2BaPtkYL4DoePx/ugW_2FeHancyO/tXrlnouq/Hh9J5BBA0FEI0HWw67W05n9/zd1N.jlk
|
62.173.145.183
|
||
http://onlinetwork.top/
|
unknown
|
||
http://onlinetwork.top/)
|
unknown
|
||
http://onlinetwork.top/drew/u5bDuKFkXxAro/J7u_2BcQ/WcM5Uj0RwbHtvwyTUfix6_2/BcSLCk9FBn/ntIlUfYV61xDv7
|
unknown
|
||
http://linetwork.top/drew/NXo6zedpn_2B_/2BcanAQX/FnyJMATt_2F48kv6_2FGokp/FknJiZ4BPO/rcHYyBUZQ99j1sGo
|
unknown
|
||
http://onlinetwork.top/M
|
unknown
|
||
http://onlinetwork.top/drew/wmWOP2SQu9/lkwlizEoFo7LtzQm_/2FQKnjOJS7Fs/1omPLrC4w2x/K
|
unknown
|
||
http://linetwork.top/drew/cLUzScwIGd6lPZFBgwJAB/boGs7r3rpKnEEW26/IZwhyzcbrBr1vrh/pacdkNsvfXz_2BJd7M/
|
unknown
|
||
http://onlinetwork.top/drew/fkPc2r0gVHV/J_2FZDZ2sHG5ME/g7AZzNZ7pG5EAQpQ0yMPw/2o1hBcleFqeXJ_2F/_2BIHR
|
unknown
|
||
http://linetwork.top/drew/bBjIYvLPS6LWM/5hSIaVH5/Wq734Z_2BJdIJMJo3F9GITO/_2FcMitcTe/kWvqzZ_2B_2FKKbPA/PasXIoBqTiXU/g_2FlZW7Y_2/B41HTf6QrjFt_2/BVrbTt4PzlSq49i2n_2Bd/eYvDRtuGLt_2Fv6B/tiuwwj_2BAQltrY/i8qwn6NTmmAuX65G3U/G0pEw9pKd/5FnOrAI7ls4u0lmSvnEp/39rOvZP_2BCYyBu8UVC/tWjDwJwf88LN44CDcCSZK_/2BvPg5_2BjQiD/eLQzVCVR/WPugjRuufv7WeRl3hdeCsRv/aT5ChRiLQy/6L.jlk
|
62.173.145.183
|
||
http://linetwork.top/drew/fJ29sqPsP/PB4FnwvByjBglXFYEjZ1/hXe9prWt3B5GwuDq98v/uxK6HJV9Vv2hGb4_2BzE87/_2B7cwHJr4KZl/Z2JNy_2F/FQTy6SE98GzpaP4OycRAbeK/FNb75e_2BZ/vDSt33A5GpRAp0Wp5/3sRCo7L7mC_2/FRcDNZgk7ge/0DV7I1SHotZIJK/MawMR4TykLq9DH4qoWZqU/9lh5zRf0UXFuxlAr/44doOlzEgahzUed/pTo7pwfqznm_2FNsdD/ONqwlJdhn/hTW0RFx_2FoxngXj4_2B/7VTtckioJ/RQjhyCJh.jlk
|
62.173.145.183
|
||
http://linetwork.top/drew/cLUzScwIGd6lPZFBgwJAB/boGs7r3rpKnEEW26/IZwhyzcbrBr1vrh/pacdkNsvfXz_2BJd7M/nIUnH5UJy/lraLufWTWWuSthVJSQnB/skwB6_2F4mYx1hncPnC/DX7TcGWo1RJRVk4zslIVLg/yTztrtFucPEpP/M0MfTI80/ZOv2XL0MhanRoGMyGX9uAoo/dmIzHKJR6c/gnzW6jLfOR7yWUymL/vvx15g4IZ4jD/aDLfgoeX_2F/HE40tKUB0xmnED/5US9_2FwaFREdIsGRoa7p/JuiKle06sqYmlLWx/l.jlk
|
62.173.145.183
|
||
http://onlinetwork.top/drew/pkd6zgqwUDZasB/ZfiTcB208ordqnfSoXwRp/L_2FtDxOUhf3arTi/7kXxmpxOwIKTj9W/FF
|
unknown
|
||
http://linetwork.top/7
|
unknown
|
||
http://onlinetwork.top/drew/rlvNc0Gi62Z2w3Lq/XhEo009f5SrCecB/UqNEgSpKb_2FxSk3FP/SwVmULm50/faoxFounD5
|
unknown
|
||
http://linetwork.top/
|
unknown
|
||
http://config.ed4
|
unknown
|
||
http://config.edge.skype
|
unknown
|
There are 8 hidden URLs, click here to show them.
Domains
Name
|
IP
|
Malicious
|
|
---|---|---|---|
linetwork.top
|
62.173.145.183
|
||
onlinetwork.top
|
31.41.44.194
|
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
62.173.145.183
|
linetwork.top
|
Russian Federation
|
||
31.41.44.194
|
onlinetwork.top
|
Russian Federation
|
||
192.168.2.1
|
unknown
|
unknown
|
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
1AC8000
|
heap
|
page read and write
|
||
4EA8000
|
heap
|
page read and write
|
||
1379000
|
heap
|
page read and write
|
||
4EA8000
|
heap
|
page read and write
|
||
4F88000
|
heap
|
page read and write
|
||
4FF8000
|
heap
|
page read and write
|
||
4FF8000
|
heap
|
page read and write
|
||
4EA8000
|
heap
|
page read and write
|
||
4EA8000
|
heap
|
page read and write
|
||
4FF8000
|
heap
|
page read and write
|
||
1AC8000
|
heap
|
page read and write
|
||
1AC8000
|
heap
|
page read and write
|
||
4FF8000
|
heap
|
page read and write
|
||
4B09000
|
heap
|
page read and write
|
||
4F88000
|
heap
|
page read and write
|
||
4F88000
|
heap
|
page read and write
|
||
4EA8000
|
heap
|
page read and write
|
||
4EA8000
|
heap
|
page read and write
|
||
1AC8000
|
heap
|
page read and write
|
||
1AC8000
|
heap
|
page read and write
|
||
4F88000
|
heap
|
page read and write
|
||
1AC8000
|
heap
|
page read and write
|
||
4FF8000
|
heap
|
page read and write
|
||
4F88000
|
heap
|
page read and write
|
||
4F88000
|
heap
|
page read and write
|
||
49B9000
|
heap
|
page read and write
|
||
1AC8000
|
heap
|
page read and write
|
||
4FF8000
|
heap
|
page read and write
|
||
4F88000
|
heap
|
page read and write
|
||
4F88000
|
heap
|
page read and write
|
||
4A49000
|
heap
|
page read and write
|
||
4EA8000
|
heap
|
page read and write
|
||
1AC8000
|
heap
|
page read and write
|
||
4FF8000
|
heap
|
page read and write
|
||
4EA8000
|
heap
|
page read and write
|
||
4FF8000
|
heap
|
page read and write
|
||
4FF8000
|
heap
|
page read and write
|
||
1AC8000
|
heap
|
page read and write
|
||
4F88000
|
heap
|
page read and write
|
||
4EA8000
|
heap
|
page read and write
|
||
888000
|
heap
|
page read and write
|
||
896000
|
heap
|
page read and write
|
||
20F0A508000
|
heap
|
page read and write
|
||
2E3A000
|
unclassified section
|
page read and write
|
||
87C000
|
stack
|
page read and write
|
||
810000
|
heap
|
page read and write
|
||
20F0AF52000
|
heap
|
page read and write
|
||
2945000
|
heap
|
page read and write
|
||
20F0AF94000
|
heap
|
page read and write
|
||
20F0AFA2000
|
heap
|
page read and write
|
||
20F0AF91000
|
heap
|
page read and write
|
||
4AC8000
|
heap
|
page read and write
|
||
2DA0000
|
heap
|
page read and write
|
||
A5147FE000
|
stack
|
page read and write
|
||
20F0AFB3000
|
heap
|
page read and write
|
||
A5146FF000
|
stack
|
page read and write
|
||
548F000
|
stack
|
page read and write
|
||
4AC8000
|
heap
|
page read and write
|
||
2BDE000
|
heap
|
page read and write
|
||
20F0AFD6000
|
heap
|
page read and write
|
||
D16F9F9000
|
stack
|
page read and write
|
||
20F0AF91000
|
heap
|
page read and write
|
||
26DF2288000
|
heap
|
page read and write
|
||
53DE000
|
stack
|
page read and write
|
||
F6D5D0F000
|
stack
|
page read and write
|
||
A5145F7000
|
stack
|
page read and write
|
||
28D06C70000
|
heap
|
page read and write
|
||
2B89000
|
heap
|
page read and write
|
||
2E94000
|
heap
|
page read and write
|
||
7F1000
|
unclassified section
|
page execute read
|
||
26DF2150000
|
heap
|
page read and write
|
||
20F0AFA2000
|
heap
|
page read and write
|
||
28D06E90000
|
trusted library allocation
|
page read and write
|
||
F8E000
|
stack
|
page read and write
|
||
28D06E89000
|
heap
|
page read and write
|
||
2585C802000
|
unkown
|
page read and write
|
||
28D06C50000
|
trusted library allocation
|
page read and write
|
||
20F0A4C2000
|
heap
|
page read and write
|
||
20F0AFA3000
|
heap
|
page read and write
|
||
8BB000
|
stack
|
page read and write
|
||
20F0AE02000
|
heap
|
page read and write
|
||
26DF21C0000
|
heap
|
page read and write
|
||
28D07B90000
|
trusted library allocation
|
page read and write
|
||
4EAB000
|
heap
|
page read and write
|
||
2E95000
|
heap
|
page read and write
|
||
2B97000
|
heap
|
page read and write
|
||
20F0AF83000
|
heap
|
page read and write
|
||
36D178A000
|
stack
|
page read and write
|
||
20F0AFA3000
|
heap
|
page read and write
|
||
2CE0000
|
heap
|
page read and write
|
||
4AC8000
|
heap
|
page read and write
|
||
FCD000
|
stack
|
page read and write
|
||
4AC8000
|
heap
|
page read and write
|
||
21E08116000
|
heap
|
page read and write
|
||
28D06CAF000
|
heap
|
page read and write
|
||
4B88000
|
heap
|
page read and write
|
||
AB7000
|
heap
|
page read and write
|
||
45CA000
|
stack
|
page read and write
|
||
53A0000
|
trusted library allocation
|
page read and write
|
||
20F0AF91000
|
heap
|
page read and write
|
||
4A38000
|
heap
|
page read and write
|
||
20F0AFB4000
|
heap
|
page read and write
|
||
28D06A90000
|
trusted library allocation
|
page read and write
|
||
4F8B000
|
heap
|
page read and write
|
||
4BDD000
|
stack
|
page read and write
|
||
2D5E000
|
stack
|
page read and write
|
||
EFE000
|
stack
|
page read and write
|
||
DFE000
|
stack
|
page read and write
|
||
20F0AFA5000
|
heap
|
page read and write
|
||
4B88000
|
heap
|
page read and write
|
||
4B1F000
|
stack
|
page read and write
|
||
72382CB000
|
stack
|
page read and write
|
||
4B88000
|
heap
|
page read and write
|
||
36D1AFE000
|
stack
|
page read and write
|
||
7238CFB000
|
stack
|
page read and write
|
||
20F0AFB5000
|
heap
|
page read and write
|
||
9F0000
|
trusted library allocation
|
page read and write
|
||
20F0AF7F000
|
heap
|
page read and write
|
||
32A0000
|
trusted library allocation
|
page read and write
|
||
20F0AFA2000
|
heap
|
page read and write
|
||
20F0AF84000
|
heap
|
page read and write
|
||
26DF2265000
|
heap
|
page read and write
|
||
20F0A4B2000
|
heap
|
page read and write
|
||
20F0AF8B000
|
heap
|
page read and write
|
||
D16FAFE000
|
stack
|
page read and write
|
||
87B000
|
heap
|
page read and write
|
||
289B000
|
stack
|
page read and write
|
||
2CE5000
|
heap
|
page read and write
|
||
21E080C0000
|
heap
|
page read and write
|
||
20F0A413000
|
heap
|
page read and write
|
||
2E2C000
|
stack
|
page read and write
|
||
22E8DFE0000
|
heap
|
page read and write
|
||
10000000
|
unkown
|
page readonly
|
||
2900000
|
trusted library allocation
|
page read and write
|
||
20F0AF24000
|
heap
|
page read and write
|
||
547E000
|
stack
|
page read and write
|
||
16D0000
|
heap
|
page read and write
|
||
20F0AFA2000
|
heap
|
page read and write
|
||
22E8E250000
|
heap
|
page read and write
|
||
1ACB000
|
heap
|
page read and write
|
||
52BD000
|
stack
|
page read and write
|
||
20F0A488000
|
heap
|
page read and write
|
||
2BC5000
|
heap
|
page read and write
|
||
20F0AF91000
|
heap
|
page read and write
|
||
A5144FE000
|
stack
|
page read and write
|
||
7D0000
|
trusted library allocation
|
page read and write
|
||
D16F87B000
|
stack
|
page read and write
|
||
22E8E302000
|
heap
|
page read and write
|
||
2B96000
|
heap
|
page read and write
|
||
26DF21F0000
|
trusted library allocation
|
page read and write
|
||
554E000
|
stack
|
page read and write
|
||
700000
|
heap
|
page read and write
|
||
464A000
|
stack
|
page read and write
|
||
4B5E000
|
stack
|
page read and write
|
||
7238A7E000
|
stack
|
page read and write
|
||
537F000
|
stack
|
page read and write
|
||
539F000
|
stack
|
page read and write
|
||
2BE4000
|
heap
|
page read and write
|
||
4A38000
|
heap
|
page read and write
|
||
28D06E10000
|
heap
|
page readonly
|
||
26DF2302000
|
heap
|
page read and write
|
||
21E08120000
|
heap
|
page read and write
|
||
2585C900000
|
trusted library allocation
|
page read and write
|
||
4A38000
|
heap
|
page read and write
|
||
28D06E80000
|
heap
|
page read and write
|
||
2E4A000
|
heap
|
page read and write
|
||
600000
|
heap
|
page read and write
|
||
2B81000
|
heap
|
page read and write
|
||
541F000
|
stack
|
page read and write
|
||
83A000
|
heap
|
page read and write
|
||
D52D8FE000
|
stack
|
page read and write
|
||
4EAB000
|
heap
|
page read and write
|
||
28D06C60000
|
heap
|
page read and write
|
||
20F0AFE5000
|
heap
|
page read and write
|
||
2B59000
|
heap
|
page read and write
|
||
2B5A000
|
heap
|
page read and write
|
||
20F0A4E2000
|
heap
|
page read and write
|
||
20F0A516000
|
heap
|
page read and write
|
||
164E000
|
stack
|
page read and write
|
||
46D0000
|
heap
|
page read and write
|
||
10000000
|
unkown
|
page readonly
|
||
2EC5000
|
heap
|
page read and write
|
||
2E39000
|
unclassified section
|
page readonly
|
||
E3C000
|
stack
|
page read and write
|
||
2BEC000
|
heap
|
page read and write
|
||
28D06CCB000
|
heap
|
page read and write
|
||
2585C7A0000
|
heap
|
page read and write
|
||
20F0AFA2000
|
heap
|
page read and write
|
||
460D000
|
stack
|
page read and write
|
||
20F0AFA2000
|
heap
|
page read and write
|
||
20F0AF73000
|
heap
|
page read and write
|
||
2B99000
|
heap
|
page read and write
|
||
4FFB000
|
heap
|
page read and write
|
||
4AC8000
|
heap
|
page read and write
|
||
28D06CAF000
|
heap
|
page read and write
|
||
22E8E28A000
|
heap
|
page read and write
|
||
2E31000
|
unclassified section
|
page execute read
|
||
10005000
|
unkown
|
page read and write
|
||
45EC000
|
unclassified section
|
page readonly
|
||
2DCC000
|
stack
|
page read and write
|
||
26DF2213000
|
heap
|
page read and write
|
||
5640000
|
heap
|
page read and write
|
||
46A0000
|
heap
|
page read and write
|
||
20F0AF89000
|
heap
|
page read and write
|
||
2BC5000
|
heap
|
page read and write
|
||
28D06CD0000
|
heap
|
page read and write
|
||
20F0A45C000
|
heap
|
page read and write
|
||
20F0AF91000
|
heap
|
page read and write
|
||
5380000
|
trusted library allocation
|
page read and write
|
||
2E65000
|
heap
|
page read and write
|
||
21E07F70000
|
heap
|
page read and write
|
||
28D06CD0000
|
heap
|
page read and write
|
||
5F0000
|
heap
|
page read and write
|
||
4A8C000
|
stack
|
page read and write
|
||
2585C828000
|
heap
|
page read and write
|
||
4C00000
|
heap
|
page read and write
|
||
10006000
|
unkown
|
page readonly
|
||
527A000
|
stack
|
page read and write
|
||
1ACB000
|
heap
|
page read and write
|
||
4FFB000
|
heap
|
page read and write
|
||
398F000
|
stack
|
page read and write
|
||
20F0B400000
|
heap
|
page read and write
|
||
28D06CA7000
|
heap
|
page read and write
|
||
D16FC7E000
|
stack
|
page read and write
|
||
2BDF000
|
heap
|
page read and write
|
||
2AFC000
|
unclassified section
|
page readonly
|
||
2BC1000
|
heap
|
page read and write
|
||
10006000
|
unkown
|
page readonly
|
||
2D30000
|
heap
|
page read and write
|
||
20F0AF91000
|
heap
|
page read and write
|
||
4A38000
|
heap
|
page read and write
|
||
20F0A460000
|
heap
|
page read and write
|
||
2BE4000
|
heap
|
page read and write
|
||
2585C730000
|
heap
|
page read and write
|
||
26DF2263000
|
heap
|
page read and write
|
||
36D1C7F000
|
stack
|
page read and write
|
||
2BA1000
|
heap
|
page read and write
|
||
36D1B7F000
|
stack
|
page read and write
|
||
2AFA000
|
unclassified section
|
page read and write
|
||
F00000
|
heap
|
page read and write
|
||
2AF0000
|
unclassified section
|
page read and write
|
||
2E3C000
|
unclassified section
|
page readonly
|
||
26DF223C000
|
heap
|
page read and write
|
||
458D000
|
stack
|
page read and write
|
||
3340000
|
heap
|
page read and write
|
||
285C000
|
stack
|
page read and write
|
||
468E000
|
stack
|
page read and write
|
||
10003000
|
unkown
|
page readonly
|
||
2585C810000
|
unkown
|
page read and write
|
||
28D06E20000
|
trusted library allocation
|
page read and write
|
||
965000
|
heap
|
page read and write
|
||
CFD000
|
stack
|
page read and write
|
||
4660000
|
trusted library allocation
|
page read and write
|
||
20F0A2E0000
|
heap
|
page read and write
|
||
A513FBD000
|
stack
|
page read and write
|
||
20F0A4E4000
|
heap
|
page read and write
|
||
20F0A461000
|
heap
|
page read and write
|
||
28D06CAF000
|
heap
|
page read and write
|
||
22E8E200000
|
heap
|
page read and write
|
||
168E000
|
stack
|
page read and write
|
||
22E8E308000
|
heap
|
page read and write
|
||
72387F8000
|
stack
|
page read and write
|
||
4790000
|
heap
|
page read and write
|
||
10003000
|
unkown
|
page readonly
|
||
2E0C000
|
stack
|
page read and write
|
||
898000
|
heap
|
page read and write
|
||
2B10000
|
heap
|
page read and write
|
||
D52D49D000
|
stack
|
page read and write
|
||
2585C915000
|
trusted library allocation
|
page read and write
|
||
22E8E27D000
|
heap
|
page read and write
|
||
4670000
|
heap
|
page read and write
|
||
20F0AF00000
|
heap
|
page read and write
|
||
20F0B41A000
|
heap
|
page read and write
|
||
20F0A400000
|
heap
|
page read and write
|
||
7238EF8000
|
stack
|
page read and write
|
||
7238BFE000
|
stack
|
page read and write
|
||
A513F3B000
|
stack
|
page read and write
|
||
20F0AF91000
|
heap
|
page read and write
|
||
2B99000
|
heap
|
page read and write
|
||
2BE0000
|
heap
|
page read and write
|
||
150C000
|
stack
|
page read and write
|
||
388E000
|
stack
|
page read and write
|
||
76C000
|
stack
|
page read and write
|
||
535E000
|
stack
|
page read and write
|
||
7238B78000
|
stack
|
page read and write
|
||
20F0A502000
|
heap
|
page read and write
|
||
4A38000
|
heap
|
page read and write
|
||
10001000
|
unkown
|
page execute read
|
||
20F0AFB3000
|
heap
|
page read and write
|
||
52FA000
|
stack
|
page read and write
|
||
20F0AFB6000
|
heap
|
page read and write
|
||
544E000
|
stack
|
page read and write
|
||
7F0000
|
unclassified section
|
page read and write
|
||
888000
|
heap
|
page read and write
|
||
4B88000
|
heap
|
page read and write
|
||
20F0AFB8000
|
heap
|
page read and write
|
||
A51427E000
|
stack
|
page read and write
|
||
2B4B000
|
heap
|
page read and write
|
||
20F0AF94000
|
heap
|
page read and write
|
||
45EA000
|
unclassified section
|
page read and write
|
||
2EB1000
|
heap
|
page read and write
|
||
20F0AF8F000
|
heap
|
page read and write
|
||
2EB1000
|
heap
|
page read and write
|
||
20F0AFB8000
|
heap
|
page read and write
|
||
2E30000
|
unclassified section
|
page read and write
|
||
2B50000
|
heap
|
page read and write
|
||
10005000
|
unkown
|
page read and write
|
||
2585C923000
|
heap
|
page read and write
|
||
16CD000
|
stack
|
page read and write
|
||
20F0AFB3000
|
heap
|
page read and write
|
||
28D06E30000
|
trusted library allocation
|
page read and write
|
||
723834E000
|
stack
|
page read and write
|
||
1000000
|
heap
|
page read and write
|
||
21E080A0000
|
heap
|
page read and write
|
||
20F0AF88000
|
heap
|
page read and write
|
||
21E0812C000
|
heap
|
page read and write
|
||
4A38000
|
heap
|
page read and write
|
||
2BB8000
|
heap
|
page read and write
|
||
10003000
|
unkown
|
page readonly
|
||
10000000
|
unkown
|
page readonly
|
||
2E27000
|
heap
|
page read and write
|
||
89F000
|
heap
|
page read and write
|
||
F6D60FB000
|
stack
|
page read and write
|
||
7F9000
|
unclassified section
|
page readonly
|
||
21E080FB000
|
heap
|
page read and write
|
||
F6D63FE000
|
stack
|
page read and write
|
||
2585C740000
|
trusted library allocation
|
page read and write
|
||
28D06E00000
|
trusted library allocation
|
page read and write
|
||
20F0A4FB000
|
heap
|
page read and write
|
||
22E8E050000
|
heap
|
page read and write
|
||
3A8A000
|
stack
|
page read and write
|
||
4F8B000
|
heap
|
page read and write
|
||
20F0AFB2000
|
heap
|
page read and write
|
||
45E9000
|
unclassified section
|
page readonly
|
||
A65000
|
heap
|
page read and write
|
||
22E8E229000
|
heap
|
page read and write
|
||
21E08120000
|
heap
|
page read and write
|
||
2ADC000
|
stack
|
page read and write
|
||
28D06D60000
|
trusted library allocation
|
page read and write
|
||
25F0000
|
heap
|
page read and write
|
||
20F0AFB5000
|
heap
|
page read and write
|
||
2585C813000
|
unkown
|
page read and write
|
||
20F0B402000
|
heap
|
page read and write
|
||
20F0A43C000
|
heap
|
page read and write
|
||
21E08106000
|
heap
|
page read and write
|
||
26DF2226000
|
heap
|
page read and write
|
||
22E8E26F000
|
heap
|
page read and write
|
||
533E000
|
stack
|
page read and write
|
||
20F0AFC0000
|
heap
|
page read and write
|
||
F6D64FF000
|
stack
|
page read and write
|
||
20F0AFA4000
|
heap
|
page read and write
|
||
10001000
|
unkown
|
page execute read
|
||
20F0AF86000
|
heap
|
page read and write
|
||
10001000
|
unkown
|
page execute read
|
||
22E8E150000
|
trusted library allocation
|
page read and write
|
||
54BF000
|
stack
|
page read and write
|
||
20F0AF87000
|
heap
|
page read and write
|
||
36D1BF9000
|
stack
|
page read and write
|
||
20F0A3E0000
|
remote allocation
|
page read and write
|
||
A51437C000
|
stack
|
page read and write
|
||
20F0A370000
|
trusted library allocation
|
page read and write
|
||
531F000
|
stack
|
page read and write
|
||
87B000
|
heap
|
page read and write
|
||
21E0812B000
|
heap
|
page read and write
|
||
10001000
|
unkown
|
page execute read
|
||
4B88000
|
heap
|
page read and write
|
||
20F0AF4D000
|
heap
|
page read and write
|
||
10006000
|
unkown
|
page readonly
|
||
20F0B402000
|
heap
|
page read and write
|
||
20F0AF90000
|
heap
|
page read and write
|
||
960000
|
heap
|
page read and write
|
||
723887E000
|
stack
|
page read and write
|
||
4B88000
|
heap
|
page read and write
|
||
10006000
|
unkown
|
page readonly
|
||
4B88000
|
heap
|
page read and write
|
||
22E8E313000
|
heap
|
page read and write
|
||
2B4D000
|
stack
|
page read and write
|
||
2585C800000
|
unkown
|
page read and write
|
||
2585C902000
|
trusted library allocation
|
page read and write
|
||
20F0AFD6000
|
heap
|
page read and write
|
||
4A38000
|
heap
|
page read and write
|
||
21E08120000
|
heap
|
page read and write
|
||
53CD000
|
stack
|
page read and write
|
||
10003000
|
unkown
|
page readonly
|
||
20F0AF91000
|
heap
|
page read and write
|
||
D16FA79000
|
stack
|
page read and write
|
||
20F0B403000
|
heap
|
page read and write
|
||
26DF2313000
|
heap
|
page read and write
|
||
2A5D000
|
stack
|
page read and write
|
||
20F0AF89000
|
heap
|
page read and write
|
||
3B8E000
|
stack
|
page read and write
|
||
20F0AFB3000
|
heap
|
page read and write
|
||
20F0B402000
|
heap
|
page read and write
|
||
20F0AF65000
|
heap
|
page read and write
|
||
2B81000
|
heap
|
page read and write
|
||
7FC000
|
unclassified section
|
page readonly
|
||
26DF2160000
|
heap
|
page read and write
|
||
26DF2300000
|
heap
|
page read and write
|
||
F6D62F7000
|
stack
|
page read and write
|
||
1ACB000
|
heap
|
page read and write
|
||
4F8B000
|
heap
|
page read and write
|
||
28D07980000
|
trusted library allocation
|
page read and write
|
||
2BE1000
|
heap
|
page read and write
|
||
21E08380000
|
heap
|
page read and write
|
||
523D000
|
stack
|
page read and write
|
||
20F0AF49000
|
heap
|
page read and write
|
||
20F0AF4D000
|
heap
|
page read and write
|
||
AB0000
|
heap
|
page read and write
|
||
28D06BE0000
|
heap
|
page read and write
|
||
4EAB000
|
heap
|
page read and write
|
||
20F0A513000
|
heap
|
page read and write
|
||
2585CC02000
|
heap
|
page read and write
|
||
538A000
|
stack
|
page read and write
|
||
20F0AF7B000
|
heap
|
page read and write
|
||
2EA4000
|
heap
|
page read and write
|
||
2BE0000
|
heap
|
page read and write
|
||
26DF2229000
|
heap
|
page read and write
|
||
2E40000
|
heap
|
page read and write
|
||
20F0AF18000
|
heap
|
page read and write
|
||
10005000
|
unkown
|
page read and write
|
||
2EBE000
|
heap
|
page read and write
|
||
20F0AFC0000
|
heap
|
page read and write
|
||
20F0AFA6000
|
heap
|
page read and write
|
||
4A90000
|
heap
|
page read and write
|
||
20F0A340000
|
heap
|
page read and write
|
||
F6D5C8C000
|
stack
|
page read and write
|
||
20F0A3E0000
|
remote allocation
|
page read and write
|
||
2B1A000
|
heap
|
page read and write
|
||
7FA000
|
unclassified section
|
page read and write
|
||
26DF2200000
|
heap
|
page read and write
|
||
22E8EA02000
|
trusted library allocation
|
page read and write
|
||
A51447B000
|
stack
|
page read and write
|
||
20F0A45D000
|
heap
|
page read and write
|
||
2BC1000
|
heap
|
page read and write
|
||
28D06DC0000
|
trusted library allocation
|
page read and write
|
||
22E8E256000
|
heap
|
page read and write
|
||
21E08117000
|
heap
|
page read and write
|
||
2B71000
|
heap
|
page read and write
|
||
20F0AF77000
|
heap
|
page read and write
|
||
20F0A3E0000
|
remote allocation
|
page read and write
|
||
20F0AFC6000
|
heap
|
page read and write
|
||
26DF2258000
|
heap
|
page read and write
|
||
4B88000
|
heap
|
page read and write
|
||
F6D61FB000
|
stack
|
page read and write
|
||
4B88000
|
heap
|
page read and write
|
||
55C0000
|
trusted library allocation
|
page read and write
|
||
20F0AFD7000
|
heap
|
page read and write
|
||
2BEB000
|
heap
|
page read and write
|
||
20F0A47A000
|
heap
|
page read and write
|
||
4B90000
|
heap
|
page read and write
|
||
3D8A000
|
stack
|
page read and write
|
||
1ACB000
|
heap
|
page read and write
|
||
26DF2C02000
|
trusted library allocation
|
page read and write
|
||
20F0A462000
|
heap
|
page read and write
|
||
CB0000
|
heap
|
page read and write
|
||
D52DBFE000
|
stack
|
page read and write
|
||
28D06A80000
|
heap
|
page read and write
|
||
7238977000
|
stack
|
page read and write
|
||
22E8E300000
|
heap
|
page read and write
|
||
21E08385000
|
heap
|
page read and write
|
||
7AB000
|
stack
|
page read and write
|
||
10005000
|
unkown
|
page read and write
|
||
4A38000
|
heap
|
page read and write
|
||
4AC8000
|
heap
|
page read and write
|
||
4AB0000
|
heap
|
page read and write
|
||
2CDD000
|
stack
|
page read and write
|
||
2E20000
|
heap
|
page read and write
|
||
22E8E213000
|
heap
|
page read and write
|
||
20F0AFB5000
|
heap
|
page read and write
|
||
28D06C68000
|
heap
|
page read and write
|
||
13F8000
|
heap
|
page read and write
|
||
2EBE000
|
heap
|
page read and write
|
||
20F0AFD1000
|
heap
|
page read and write
|
||
4AC8000
|
heap
|
page read and write
|
||
2BB8000
|
heap
|
page read and write
|
||
81B000
|
heap
|
page read and write
|
||
20F0AF80000
|
heap
|
page read and write
|
||
7F0000
|
trusted library allocation
|
page read and write
|
||
2EA4000
|
heap
|
page read and write
|
||
20F0AF84000
|
heap
|
page read and write
|
||
28D06E85000
|
heap
|
page read and write
|
||
2D60000
|
heap
|
page read and write
|
||
4A38000
|
heap
|
page read and write
|
||
86B000
|
heap
|
page read and write
|
||
10000000
|
unkown
|
page readonly
|
||
7238DF9000
|
stack
|
page read and write
|
||
76B000
|
stack
|
page read and write
|
||
F6D5D8F000
|
stack
|
page read and write
|
||
2AF1000
|
unclassified section
|
page execute read
|
||
21E080F0000
|
heap
|
page read and write
|
||
4AC8000
|
heap
|
page read and write
|
||
28D06BC0000
|
heap
|
page read and write
|
||
4F8B000
|
heap
|
page read and write
|
||
20F0A45E000
|
heap
|
page read and write
|
||
20F0A429000
|
heap
|
page read and write
|
||
54F0000
|
trusted library allocation
|
page read and write
|
||
2D2E000
|
stack
|
page read and write
|
||
89B000
|
heap
|
page read and write
|
||
45E0000
|
unclassified section
|
page read and write
|
||
66D000
|
stack
|
page read and write
|
||
EBE000
|
stack
|
page read and write
|
||
72383CF000
|
stack
|
page read and write
|
||
26DF228C000
|
heap
|
page read and write
|
||
4FFB000
|
heap
|
page read and write
|
||
22E8E23C000
|
heap
|
page read and write
|
||
2EBB000
|
heap
|
page read and write
|
||
20F0A4C5000
|
heap
|
page read and write
|
||
A60000
|
heap
|
page read and write
|
||
4FFB000
|
heap
|
page read and write
|
||
2A9E000
|
stack
|
page read and write
|
||
2940000
|
heap
|
page read and write
|
||
22E8E202000
|
heap
|
page read and write
|
||
36D1A7E000
|
stack
|
page read and write
|
||
4EAB000
|
heap
|
page read and write
|
||
550F000
|
stack
|
page read and write
|
||
20F0AFA5000
|
heap
|
page read and write
|
||
2B4E000
|
heap
|
page read and write
|
||
558E000
|
stack
|
page read and write
|
||
378F000
|
stack
|
page read and write
|
||
20F0AF83000
|
heap
|
page read and write
|
||
2C4C000
|
stack
|
page read and write
|
||
540A000
|
stack
|
page read and write
|
||
20F0AF91000
|
heap
|
page read and write
|
||
20F0B402000
|
heap
|
page read and write
|
||
2AF9000
|
unclassified section
|
page readonly
|
||
D16FBF9000
|
stack
|
page read and write
|
||
21E08101000
|
heap
|
page read and write
|
||
2E76000
|
heap
|
page read and write
|
||
4AC8000
|
heap
|
page read and write
|
||
20F0AFD1000
|
heap
|
page read and write
|
||
2B50000
|
heap
|
page read and write
|
||
54CE000
|
stack
|
page read and write
|
||
22E8DFF0000
|
heap
|
page read and write
|
||
4640000
|
heap
|
page read and write
|
||
20F0A2D0000
|
heap
|
page read and write
|
||
20F0AF91000
|
heap
|
page read and write
|
||
20F0A47A000
|
heap
|
page read and write
|
||
45E1000
|
unclassified section
|
page execute read
|
||
3C8F000
|
stack
|
page read and write
|
There are 529 hidden memdumps, click here to show them.