Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
itVg5XA6eK.exe
|
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
|
initial sample
|
||
C:\ProgramData\rejdit_free_fire.exe
|
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\CLR_v2.0_32\UsageLogs\itVg5XA6eK.exe.log
|
ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\869b16e2825dce24066aba38ee1a9add.exe
|
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\CLR_v2.0_32\UsageLogs\rejdit_free_fire.exe.log
|
ASCII text, with CRLF line terminators
|
dropped
|
||
\Device\ConDrv
|
ASCII text, with CRLF line terminators
|
dropped
|
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\itVg5XA6eK.exe
|
C:\Users\user\Desktop\itVg5XA6eK.exe
|
||
C:\ProgramData\rejdit_free_fire.exe
|
"C:\ProgramData\rejdit_free_fire.exe"
|
||
C:\Windows\SysWOW64\netsh.exe
|
netsh firewall add allowedprogram "C:\ProgramData\rejdit_free_fire.exe" "rejdit_free_fire.exe" ENABLE
|
||
C:\ProgramData\rejdit_free_fire.exe
|
"C:\ProgramData\rejdit_free_fire.exe" ..
|
||
C:\ProgramData\rejdit_free_fire.exe
|
"C:\ProgramData\rejdit_free_fire.exe" ..
|
||
C:\ProgramData\rejdit_free_fire.exe
|
"C:\ProgramData\rejdit_free_fire.exe" ..
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
h43vipforyou.ddns.net
|
Domains
Name
|
IP
|
Malicious
|
|
---|---|---|---|
h43vipforyou.ddns.net
|
41.109.68.239
|
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
41.109.68.239
|
h43vipforyou.ddns.net
|
Algeria
|
Registry
Path
|
Value
|
Malicious
|
|
---|---|---|---|
HKEY_CURRENT_USER
|
di
|
||
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run
|
869b16e2825dce24066aba38ee1a9add
|
||
HKEY_CURRENT_USER\Environment
|
SEE_MASK_NOZONECHECKS
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run
|
869b16e2825dce24066aba38ee1a9add
|
||
HKEY_CURRENT_USER\Software\869b16e2825dce24066aba38ee1a9add
|
[kl]
|
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
3AB4000
|
trusted library allocation
|
page read and write
|
||
2965000
|
trusted library allocation
|
page read and write
|
||
442000
|
unkown
|
page readonly
|
||
21448FC7000
|
heap
|
page read and write
|
||
6DA000
|
trusted library allocation
|
page execute and read and write
|
||
21449030000
|
heap
|
page read and write
|
||
E89000
|
heap
|
page read and write
|
||
56FE000
|
stack
|
page read and write
|
||
2B2C9E78000
|
heap
|
page read and write
|
||
EFA000
|
heap
|
page read and write
|
||
3351000
|
trusted library allocation
|
page read and write
|
||
A58000
|
heap
|
page read and write
|
||
DE4000
|
heap
|
page read and write
|
||
94FB2FD000
|
stack
|
page read and write
|
||
1C3ED502000
|
heap
|
page read and write
|
||
10CB000
|
trusted library allocation
|
page execute and read and write
|
||
E6B000
|
heap
|
page read and write
|
||
E9D000
|
heap
|
page read and write
|
||
12BA4A50000
|
heap
|
page read and write
|
||
960000
|
unkown
|
page readonly
|
||
12BA5402000
|
trusted library allocation
|
page read and write
|
||
533A000
|
trusted library allocation
|
page read and write
|
||
572F000
|
stack
|
page read and write
|
||
DE4000
|
heap
|
page read and write
|
||
21448613000
|
heap
|
page read and write
|
||
DF0000
|
trusted library allocation
|
page read and write
|
||
E55000
|
heap
|
page read and write
|
||
6BDC69B000
|
stack
|
page read and write
|
||
1FD23C4E000
|
heap
|
page read and write
|
||
F4D000
|
heap
|
page read and write
|
||
533E000
|
trusted library allocation
|
page read and write
|
||
266CF500000
|
heap
|
page read and write
|
||
6BDCE7E000
|
stack
|
page read and write
|
||
1D84B302000
|
heap
|
page read and write
|
||
DF8000
|
heap
|
page read and write
|
||
E94000
|
heap
|
page read and write
|
||
530F000
|
trusted library allocation
|
page read and write
|
||
4A0000
|
heap
|
page read and write
|
||
97E000
|
stack
|
page read and write
|
||
970000
|
unkown
|
page readonly
|
||
E93000
|
heap
|
page read and write
|
||
5309000
|
trusted library allocation
|
page read and write
|
||
3961000
|
trusted library allocation
|
page read and write
|
||
5316000
|
trusted library allocation
|
page read and write
|
||
1C3ED42A000
|
heap
|
page read and write
|
||
EB5000
|
heap
|
page read and write
|
||
24B0000
|
heap
|
page execute and read and write
|
||
A0E000
|
stack
|
page read and write
|
||
4A80000
|
trusted library allocation
|
page execute and read and write
|
||
6BDCAFB000
|
stack
|
page read and write
|
||
2600000
|
trusted library allocation
|
page read and write
|
||
14F0000
|
heap
|
page read and write
|
||
1D84B202000
|
heap
|
page read and write
|
||
F7057FE000
|
stack
|
page read and write
|
||
4E3E000
|
stack
|
page read and write
|
||
E75000
|
heap
|
page read and write
|
||
14AB000
|
trusted library allocation
|
page execute and read and write
|
||
E0A000
|
heap
|
page read and write
|
||
26D17CC000
|
stack
|
page read and write
|
||
12BA4B50000
|
trusted library allocation
|
page read and write
|
||
9E0000
|
heap
|
page read and write
|
||
1D84B200000
|
heap
|
page read and write
|
||
94FAF7C000
|
stack
|
page read and write
|
||
1330000
|
heap
|
page read and write
|
||
DA0000
|
trusted library allocation
|
page read and write
|
||
21448F00000
|
heap
|
page read and write
|
||
DC0000
|
trusted library allocation
|
page read and write
|
||
E95000
|
heap
|
page read and write
|
||
186B9C51000
|
heap
|
page read and write
|
||
599E000
|
stack
|
page read and write
|
||
1FD23C42000
|
heap
|
page read and write
|
||
1C3ED487000
|
heap
|
page read and write
|
||
5309000
|
trusted library allocation
|
page read and write
|
||
2630000
|
heap
|
page execute and read and write
|
||
EAA000
|
trusted library allocation
|
page execute and read and write
|
||
266CF658000
|
heap
|
page read and write
|
||
3000000
|
heap
|
page read and write
|
||
55BC000
|
stack
|
page read and write
|
||
6B2000
|
trusted library allocation
|
page execute and read and write
|
||
F7051FC000
|
stack
|
page read and write
|
||
E93000
|
heap
|
page read and write
|
||
21448695000
|
heap
|
page read and write
|
||
50FE000
|
stack
|
page read and write
|
||
4FBE000
|
stack
|
page read and write
|
||
55EF000
|
stack
|
page read and write
|
||
AB0000
|
heap
|
page read and write
|
||
1492000
|
trusted library allocation
|
page execute and read and write
|
||
1FD23C5F000
|
heap
|
page read and write
|
||
186B9C00000
|
heap
|
page read and write
|
||
28AB000
|
trusted library allocation
|
page execute and read and write
|
||
70A000
|
heap
|
page read and write
|
||
C26E87F000
|
stack
|
page read and write
|
||
E6E000
|
stack
|
page read and write
|
||
C0E000
|
stack
|
page read and write
|
||
1FD24402000
|
trusted library allocation
|
page read and write
|
||
21448665000
|
heap
|
page read and write
|
||
12BA4C02000
|
heap
|
page read and write
|
||
D72000
|
trusted library allocation
|
page execute and read and write
|
||
E93000
|
heap
|
page read and write
|
||
1210000
|
heap
|
page read and write
|
||
E94000
|
heap
|
page read and write
|
||
21448600000
|
heap
|
page read and write
|
||
2144868E000
|
heap
|
page read and write
|
||
5301000
|
trusted library allocation
|
page read and write
|
||
F7050FF000
|
stack
|
page read and write
|
||
3DA1000
|
trusted library allocation
|
page read and write
|
||
5ADF000
|
stack
|
page read and write
|
||
186B9C77000
|
heap
|
page read and write
|
||
186B9BB0000
|
heap
|
page read and write
|
||
DEA000
|
heap
|
page read and write
|
||
21449000000
|
heap
|
page read and write
|
||
6D2000
|
trusted library allocation
|
page execute and read and write
|
||
523F000
|
stack
|
page read and write
|
||
D42000
|
trusted library allocation
|
page execute and read and write
|
||
5331000
|
trusted library allocation
|
page read and write
|
||
21449023000
|
heap
|
page read and write
|
||
1C3ED46F000
|
heap
|
page read and write
|
||
186B9BE0000
|
trusted library allocation
|
page read and write
|
||
21448653000
|
heap
|
page read and write
|
||
2A3F000
|
trusted library allocation
|
page read and write
|
||
266D1240000
|
trusted library allocation
|
page read and write
|
||
266CF659000
|
heap
|
page read and write
|
||
1472000
|
trusted library allocation
|
page execute and read and write
|
||
5334000
|
trusted library allocation
|
page read and write
|
||
4C80000
|
trusted library allocation
|
page read and write
|
||
6CA000
|
trusted library allocation
|
page execute and read and write
|
||
531B000
|
trusted library allocation
|
page read and write
|
||
21065EB000
|
stack
|
page read and write
|
||
499B000
|
stack
|
page read and write
|
||
C26E97D000
|
stack
|
page read and write
|
||
A30000
|
heap
|
page read and write
|
||
E79000
|
heap
|
page read and write
|
||
2144878E000
|
heap
|
page read and write
|
||
E2C000
|
heap
|
page read and write
|
||
2106CFB000
|
stack
|
page read and write
|
||
E0A000
|
heap
|
page read and write
|
||
D2E000
|
stack
|
page read and write
|
||
21448669000
|
heap
|
page read and write
|
||
5306000
|
trusted library allocation
|
page read and write
|
||
1FD23C55000
|
heap
|
page read and write
|
||
53BE000
|
stack
|
page read and write
|
||
266CF663000
|
heap
|
page read and write
|
||
17B000
|
stack
|
page read and write
|
||
5334000
|
trusted library allocation
|
page read and write
|
||
94FB07E000
|
stack
|
page read and write
|
||
21449013000
|
heap
|
page read and write
|
||
1C3ED4BB000
|
heap
|
page read and write
|
||
E79000
|
heap
|
page read and write
|
||
5309000
|
trusted library allocation
|
page read and write
|
||
11E0000
|
trusted library allocation
|
page read and write
|
||
DCC000
|
trusted library allocation
|
page execute and read and write
|
||
E20000
|
heap
|
page read and write
|
||
31D7000
|
heap
|
page read and write
|
||
E5A000
|
heap
|
page read and write
|
||
6BDCD79000
|
stack
|
page read and write
|
||
21448F22000
|
heap
|
page read and write
|
||
2B2C9E7D000
|
heap
|
page read and write
|
||
537E000
|
stack
|
page read and write
|
||
2B2C9C60000
|
heap
|
page read and write
|
||
DE7000
|
heap
|
page read and write
|
||
31D0000
|
heap
|
page read and write
|
||
DE4000
|
heap
|
page read and write
|
||
D2F000
|
stack
|
page read and write
|
||
4A1C000
|
stack
|
page read and write
|
||
D30000
|
trusted library allocation
|
page read and write
|
||
AF9000
|
stack
|
page read and write
|
||
5306000
|
trusted library allocation
|
page read and write
|
||
2A96000
|
trusted library allocation
|
page read and write
|
||
E0A000
|
heap
|
page read and write
|
||
797000
|
heap
|
page read and write
|
||
DF3000
|
heap
|
page read and write
|
||
440000
|
unkown
|
page readonly
|
||
E94000
|
heap
|
page read and write
|
||
5309000
|
trusted library allocation
|
page read and write
|
||
4354000
|
trusted library allocation
|
page read and write
|
||
1FD23C56000
|
heap
|
page read and write
|
||
DE4000
|
heap
|
page read and write
|
||
21448693000
|
heap
|
page read and write
|
||
533E000
|
stack
|
page read and write
|
||
C5C000
|
stack
|
page read and write
|
||
547F000
|
stack
|
page read and write
|
||
266D0FC0000
|
trusted library allocation
|
page read and write
|
||
1C3ED3F0000
|
trusted library allocation
|
page read and write
|
||
960000
|
unkown
|
page readonly
|
||
E86000
|
heap
|
page read and write
|
||
2EEE000
|
stack
|
page read and write
|
||
8F6000
|
stack
|
page read and write
|
||
D4A000
|
trusted library allocation
|
page execute and read and write
|
||
94FB17C000
|
stack
|
page read and write
|
||
E53000
|
heap
|
page read and write
|
||
266D0FF0000
|
remote allocation
|
page read and write
|
||
5328000
|
trusted library allocation
|
page read and write
|
||
531F000
|
trusted library allocation
|
page read and write
|
||
5331000
|
trusted library allocation
|
page read and write
|
||
DF2000
|
heap
|
page read and write
|
||
6D0000
|
heap
|
page read and write
|
||
28A7000
|
trusted library allocation
|
page execute and read and write
|
||
980000
|
unkown
|
page read and write
|
||
A80000
|
trusted library allocation
|
page read and write
|
||
EBC000
|
trusted library allocation
|
page execute and read and write
|
||
C26E67F000
|
stack
|
page read and write
|
||
26D1C7E000
|
stack
|
page read and write
|
||
E99000
|
heap
|
page read and write
|
||
186BA402000
|
trusted library allocation
|
page read and write
|
||
AB6000
|
heap
|
page read and write
|
||
DF6000
|
heap
|
page read and write
|
||
266CF600000
|
heap
|
page read and write
|
||
6A2000
|
trusted library allocation
|
page execute and read and write
|
||
1450000
|
trusted library allocation
|
page read and write
|
||
8F0000
|
heap
|
page read and write
|
||
4E7E000
|
stack
|
page read and write
|
||
1D84B050000
|
heap
|
page read and write
|
||
1E0000
|
trusted library allocation
|
page read and write
|
||
E9D000
|
heap
|
page read and write
|
||
26C49FE000
|
stack
|
page read and write
|
||
533A000
|
trusted library allocation
|
page read and write
|
||
73B000
|
heap
|
page read and write
|
||
5B0000
|
heap
|
page read and write
|
||
570000
|
trusted library allocation
|
page read and write
|
||
E58000
|
heap
|
page read and write
|
||
1D84B247000
|
heap
|
page read and write
|
||
12BA4C00000
|
heap
|
page read and write
|
||
1C3EDC02000
|
heap
|
page read and write
|
||
5331000
|
trusted library allocation
|
page read and write
|
||
E7E000
|
heap
|
page read and write
|
||
21448713000
|
heap
|
page read and write
|
||
5323000
|
trusted library allocation
|
page read and write
|
||
21448F43000
|
heap
|
page read and write
|
||
1C3ED350000
|
heap
|
page read and write
|
||
10D0000
|
heap
|
page read and write
|
||
4AB0000
|
heap
|
page read and write
|
||
1136000
|
stack
|
page read and write
|
||
E0A000
|
heap
|
page read and write
|
||
2AB5000
|
trusted library allocation
|
page read and write
|
||
2144868A000
|
heap
|
page read and write
|
||
1FD23C76000
|
heap
|
page read and write
|
||
5324000
|
trusted library allocation
|
page read and write
|
||
26D21FE000
|
stack
|
page read and write
|
||
1190000
|
heap
|
page read and write
|
||
14D0000
|
heap
|
page execute and read and write
|
||
EB0000
|
trusted library allocation
|
page read and write
|
||
1FD23C00000
|
heap
|
page read and write
|
||
E7F000
|
heap
|
page read and write
|
||
A92000
|
heap
|
page read and write
|
||
7B0000
|
heap
|
page read and write
|
||
118F000
|
trusted library allocation
|
page read and write
|
||
266D0FA0000
|
trusted library allocation
|
page read and write
|
||
5080000
|
trusted library allocation
|
page read and write
|
||
214485F0000
|
trusted library allocation
|
page read and write
|
||
D8B000
|
trusted library allocation
|
page execute and read and write
|
||
D87000
|
trusted library allocation
|
page execute and read and write
|
||
5331000
|
trusted library allocation
|
page read and write
|
||
2144863C000
|
heap
|
page read and write
|
||
2B2C9E00000
|
heap
|
page read and write
|
||
2B2C9F02000
|
heap
|
page read and write
|
||
9A0000
|
trusted library allocation
|
page read and write
|
||
F7052FF000
|
stack
|
page read and write
|
||
266CF490000
|
heap
|
page read and write
|
||
186B9B40000
|
heap
|
page read and write
|
||
2B2C9E70000
|
heap
|
page read and write
|
||
257E000
|
stack
|
page read and write
|
||
21448F22000
|
heap
|
page read and write
|
||
266CF648000
|
heap
|
page read and write
|
||
21448FBD000
|
heap
|
page read and write
|
||
50BE000
|
stack
|
page read and write
|
||
1FD23C31000
|
heap
|
page read and write
|
||
5530000
|
trusted library allocation
|
page execute and read and write
|
||
14A7000
|
trusted library allocation
|
page execute and read and write
|
||
543E000
|
stack
|
page read and write
|
||
527F000
|
stack
|
page read and write
|
||
2B2C9E3C000
|
heap
|
page read and write
|
||
E9B000
|
heap
|
page read and write
|
||
E9B000
|
heap
|
page read and write
|
||
2AB1000
|
trusted library allocation
|
page read and write
|
||
214487B9000
|
heap
|
page read and write
|
||
DEE000
|
heap
|
page read and write
|
||
1500000
|
heap
|
page read and write
|
||
E8C000
|
heap
|
page read and write
|
||
E0A000
|
heap
|
page read and write
|
||
21448FB1000
|
heap
|
page read and write
|
||
1FD23BC0000
|
trusted library allocation
|
page read and write
|
||
5333000
|
trusted library allocation
|
page read and write
|
||
147C000
|
trusted library allocation
|
page execute and read and write
|
||
2106AFB000
|
stack
|
page read and write
|
||
3DA4000
|
trusted library allocation
|
page read and write
|
||
533A000
|
trusted library allocation
|
page read and write
|
||
5329000
|
trusted library allocation
|
page read and write
|
||
E7F000
|
heap
|
page read and write
|
||
2B2C9DD0000
|
trusted library allocation
|
page read and write
|
||
4C70000
|
trusted library allocation
|
page read and write
|
||
5307000
|
trusted library allocation
|
page read and write
|
||
1C3ED360000
|
heap
|
page read and write
|
||
1FD23C60000
|
heap
|
page read and write
|
||
5302000
|
trusted library allocation
|
page read and write
|
||
2B2C9E66000
|
heap
|
page read and write
|
||
266D1200000
|
trusted library allocation
|
page read and write
|
||
75F000
|
heap
|
page read and write
|
||
26C47FF000
|
stack
|
page read and write
|
||
21448672000
|
heap
|
page read and write
|
||
6BDD1FF000
|
stack
|
page read and write
|
||
4F7F000
|
stack
|
page read and write
|
||
266CF63D000
|
heap
|
page read and write
|
||
1C3ED513000
|
heap
|
page read and write
|
||
552E000
|
stack
|
page read and write
|
||
4CFE000
|
stack
|
page read and write
|
||
6C7000
|
trusted library allocation
|
page execute and read and write
|
||
6B0000
|
trusted library allocation
|
page read and write
|
||
E23000
|
heap
|
page read and write
|
||
E6E000
|
heap
|
page read and write
|
||
E8C000
|
heap
|
page read and write
|
||
DF0000
|
heap
|
page read and write
|
||
1FD23D02000
|
heap
|
page read and write
|
||
E98000
|
heap
|
page read and write
|
||
4141000
|
trusted library allocation
|
page read and write
|
||
1A0000
|
remote allocation
|
page read and write
|
||
2B2C9E29000
|
heap
|
page read and write
|
||
E93000
|
heap
|
page read and write
|
||
2B2C9E13000
|
heap
|
page read and write
|
||
1D84B0A0000
|
heap
|
page read and write
|
||
E72000
|
heap
|
page read and write
|
||
26D1F7E000
|
stack
|
page read and write
|
||
F4A000
|
heap
|
page read and write
|
||
5311000
|
trusted library allocation
|
page read and write
|
||
53E0000
|
heap
|
page read and write
|
||
11DE000
|
stack
|
page read and write
|
||
1FD23C6B000
|
heap
|
page read and write
|
||
5334000
|
trusted library allocation
|
page read and write
|
||
6EB000
|
trusted library allocation
|
page execute and read and write
|
||
94FACFF000
|
stack
|
page read and write
|
||
D90000
|
heap
|
page read and write
|
||
21448F02000
|
heap
|
page read and write
|
||
533C000
|
trusted library allocation
|
page read and write
|
||
1FD23C64000
|
heap
|
page read and write
|
||
2DA1000
|
trusted library allocation
|
page read and write
|
||
523E000
|
stack
|
page read and write
|
||
1139000
|
stack
|
page read and write
|
||
4F7E000
|
stack
|
page read and write
|
||
4FA0000
|
heap
|
page read and write
|
||
E93000
|
heap
|
page read and write
|
||
3AB1000
|
trusted library allocation
|
page read and write
|
||
F7058FE000
|
stack
|
page read and write
|
||
115E000
|
stack
|
page read and write
|
||
1FD23C29000
|
heap
|
page read and write
|
||
3145000
|
trusted library allocation
|
page read and write
|
||
146A000
|
trusted library allocation
|
page execute and read and write
|
||
4AB3000
|
heap
|
page read and write
|
||
D56000
|
stack
|
page read and write
|
||
5130000
|
heap
|
page read and write
|
||
1C3EDD32000
|
heap
|
page read and write
|
||
6BA000
|
trusted library allocation
|
page execute and read and write
|
||
E9E000
|
heap
|
page read and write
|
||
1462000
|
trusted library allocation
|
page execute and read and write
|
||
1D84B22F000
|
heap
|
page read and write
|
||
A80000
|
trusted library allocation
|
page read and write
|
||
E79000
|
heap
|
page read and write
|
||
266CF713000
|
heap
|
page read and write
|
||
E83000
|
heap
|
page read and write
|
||
690000
|
trusted library allocation
|
page read and write
|
||
2B2C9F13000
|
heap
|
page read and write
|
||
E87000
|
heap
|
page read and write
|
||
E6B000
|
heap
|
page read and write
|
||
537E000
|
stack
|
page read and write
|
||
563E000
|
stack
|
page read and write
|
||
1FD23C5C000
|
heap
|
page read and write
|
||
AA0000
|
trusted library allocation
|
page read and write
|
||
2B2C9E65000
|
heap
|
page read and write
|
||
160E000
|
stack
|
page read and write
|
||
E6F000
|
heap
|
page read and write
|
||
DF1000
|
heap
|
page read and write
|
||
1C3ED3C0000
|
heap
|
page read and write
|
||
5306000
|
trusted library allocation
|
page read and write
|
||
266CF602000
|
heap
|
page read and write
|
||
CFE000
|
stack
|
page read and write
|
||
266CF718000
|
heap
|
page read and write
|
||
E94000
|
heap
|
page read and write
|
||
FEF000
|
stack
|
page read and write
|
||
E83000
|
heap
|
page read and write
|
||
1FD23C47000
|
heap
|
page read and write
|
||
E7C000
|
heap
|
page read and write
|
||
A80000
|
trusted library allocation
|
page execute and read and write
|
||
132E000
|
stack
|
page read and write
|
||
7B7000
|
heap
|
page read and write
|
||
E8A000
|
heap
|
page read and write
|
||
E34000
|
heap
|
page read and write
|
||
533B000
|
trusted library allocation
|
page read and write
|
||
523E000
|
stack
|
page read and write
|
||
A80000
|
trusted library allocation
|
page read and write
|
||
266CF649000
|
heap
|
page read and write
|
||
2106DFE000
|
stack
|
page read and write
|
||
D6E000
|
stack
|
page read and write
|
||
4D00000
|
trusted library allocation
|
page read and write
|
||
F7053FD000
|
stack
|
page read and write
|
||
E72000
|
heap
|
page read and write
|
||
12BA4C51000
|
heap
|
page read and write
|
||
1FD23C40000
|
heap
|
page read and write
|
||
A6B000
|
heap
|
page read and write
|
||
2B2C9CD0000
|
heap
|
page read and write
|
||
C26E0BB000
|
stack
|
page read and write
|
||
A80000
|
trusted library allocation
|
page read and write
|
||
C26EC7C000
|
stack
|
page read and write
|
||
EE2000
|
trusted library allocation
|
page execute and read and write
|
||
F704F7B000
|
stack
|
page read and write
|
||
4D3E000
|
stack
|
page read and write
|
||
186B9C13000
|
heap
|
page read and write
|
||
12BA4B80000
|
remote allocation
|
page read and write
|
||
1C3ED4C6000
|
heap
|
page read and write
|
||
EA2000
|
trusted library allocation
|
page execute and read and write
|
||
5309000
|
trusted library allocation
|
page read and write
|
||
12BA4B80000
|
remote allocation
|
page read and write
|
||
5331000
|
trusted library allocation
|
page read and write
|
||
21448656000
|
heap
|
page read and write
|
||
E8D000
|
heap
|
page read and write
|
||
4351000
|
trusted library allocation
|
page read and write
|
||
5307000
|
trusted library allocation
|
page read and write
|
||
5FE000
|
stack
|
page read and write
|
||
DE8000
|
heap
|
page read and write
|
||
9C0000
|
heap
|
page read and write
|
||
2CCE000
|
stack
|
page read and write
|
||
26D217D000
|
stack
|
page read and write
|
||
1D84B1A0000
|
trusted library allocation
|
page read and write
|
||
1C3ED43D000
|
heap
|
page read and write
|
||
DF8000
|
heap
|
page read and write
|
||
50FE000
|
stack
|
page read and write
|
||
2106BFB000
|
stack
|
page read and write
|
||
1090000
|
trusted library allocation
|
page read and write
|
||
D59000
|
stack
|
page read and write
|
||
52E0000
|
trusted library allocation
|
page read and write
|
||
E80000
|
heap
|
page read and write
|
||
2C00000
|
trusted library allocation
|
page read and write
|
||
530F000
|
trusted library allocation
|
page read and write
|
||
49DD000
|
stack
|
page read and write
|
||
4D90000
|
heap
|
page read and write
|
||
186B9C24000
|
heap
|
page read and write
|
||
139E000
|
stack
|
page read and write
|
||
2A30000
|
trusted library allocation
|
page read and write
|
||
4BF0000
|
trusted library allocation
|
page read and write
|
||
2B2C9E76000
|
heap
|
page read and write
|
||
54BE000
|
stack
|
page read and write
|
||
DBA000
|
trusted library allocation
|
page execute and read and write
|
||
E86000
|
heap
|
page read and write
|
||
DED000
|
heap
|
page read and write
|
||
E7A000
|
heap
|
page read and write
|
||
F704B0B000
|
stack
|
page read and write
|
||
4BEE000
|
stack
|
page read and write
|
||
6E7000
|
trusted library allocation
|
page execute and read and write
|
||
5070000
|
trusted library allocation
|
page read and write
|
||
4C70000
|
trusted library allocation
|
page read and write
|
||
2B2C9E5A000
|
heap
|
page read and write
|
||
21448649000
|
heap
|
page read and write
|
||
7DE000
|
stack
|
page read and write
|
||
2C10000
|
trusted library allocation
|
page read and write
|
||
4FF0000
|
trusted library allocation
|
page read and write
|
||
266D0FF0000
|
remote allocation
|
page read and write
|
||
2610000
|
heap
|
page read and write
|
||
E90000
|
heap
|
page read and write
|
||
28EE000
|
stack
|
page read and write
|
||
E83000
|
heap
|
page read and write
|
||
5650000
|
heap
|
page read and write
|
||
533A000
|
trusted library allocation
|
page read and write
|
||
1C3ED413000
|
heap
|
page read and write
|
||
2A50000
|
heap
|
page execute and read and write
|
||
59DF000
|
stack
|
page read and write
|
||
134D000
|
heap
|
page read and write
|
||
700000
|
heap
|
page read and write
|
||
545E47E000
|
stack
|
page read and write
|
||
4F6000
|
stack
|
page read and write
|
||
575E000
|
stack
|
page read and write
|
||
26C43BE000
|
stack
|
page read and write
|
||
1D84B256000
|
heap
|
page read and write
|
||
1FD23B20000
|
heap
|
page read and write
|
||
960000
|
unkown
|
page readonly
|
||
73C000
|
stack
|
page read and write
|
||
7E0000
|
trusted library allocation
|
page read and write
|
||
532B000
|
trusted library allocation
|
page read and write
|
||
1D84B213000
|
heap
|
page read and write
|
||
95C000
|
stack
|
page read and write
|
||
562F000
|
stack
|
page read and write
|
||
54EE000
|
stack
|
page read and write
|
||
1FD23C7D000
|
heap
|
page read and write
|
||
51FE000
|
stack
|
page read and write
|
||
DED000
|
heap
|
page read and write
|
||
186B9D13000
|
heap
|
page read and write
|
||
1FD23C3C000
|
heap
|
page read and write
|
||
E89000
|
heap
|
page read and write
|
||
5314000
|
trusted library allocation
|
page read and write
|
||
E9B000
|
heap
|
page read and write
|
||
12BA4C3C000
|
heap
|
page read and write
|
||
DB2000
|
trusted library allocation
|
page execute and read and write
|
||
2DFF000
|
stack
|
page read and write
|
||
6E2000
|
trusted library allocation
|
page read and write
|
||
2B2C9E02000
|
heap
|
page read and write
|
||
E6E000
|
heap
|
page read and write
|
||
1FD23C79000
|
heap
|
page read and write
|
||
D52000
|
trusted library allocation
|
page execute and read and write
|
||
2760000
|
heap
|
page read and write
|
||
585E000
|
stack
|
page read and write
|
||
E7A000
|
heap
|
page read and write
|
||
12BA4D02000
|
heap
|
page read and write
|
||
2A10000
|
heap
|
page read and write
|
||
186B9C3C000
|
heap
|
page read and write
|
||
503E000
|
stack
|
page read and write
|
||
4A7E000
|
stack
|
page read and write
|
||
21448F54000
|
heap
|
page read and write
|
||
26C467E000
|
stack
|
page read and write
|
||
214487E5000
|
heap
|
page read and write
|
||
545E27E000
|
stack
|
page read and write
|
||
E87000
|
heap
|
page read and write
|
||
ED0000
|
heap
|
page read and write
|
||
E7C000
|
heap
|
page read and write
|
||
1D84B040000
|
heap
|
page read and write
|
||
E0D000
|
heap
|
page read and write
|
||
DA0000
|
heap
|
page read and write
|
||
5323000
|
trusted library allocation
|
page read and write
|
||
26D1DFE000
|
stack
|
page read and write
|
||
E8C000
|
heap
|
page read and write
|
||
E7C000
|
heap
|
page read and write
|
||
5301000
|
trusted library allocation
|
page read and write
|
||
5306000
|
trusted library allocation
|
page read and write
|
||
94FB5FF000
|
stack
|
page read and write
|
||
C26E4FE000
|
stack
|
page read and write
|
||
94FAD7C000
|
stack
|
page read and write
|
||
E89000
|
heap
|
page read and write
|
||
26C48FE000
|
stack
|
page read and write
|
||
5326000
|
trusted library allocation
|
page read and write
|
||
EF0000
|
heap
|
page read and write
|
||
21448E02000
|
heap
|
page read and write
|
||
186B9D02000
|
heap
|
page read and write
|
||
266CF659000
|
heap
|
page read and write
|
||
186B9C79000
|
heap
|
page read and write
|
||
AA0000
|
trusted library allocation
|
page read and write
|
||
2B2CA602000
|
trusted library allocation
|
page read and write
|
||
530F000
|
trusted library allocation
|
page read and write
|
||
5326000
|
trusted library allocation
|
page read and write
|
||
2BE0000
|
trusted library allocation
|
page execute and read and write
|
||
E72000
|
heap
|
page read and write
|
||
266CF649000
|
heap
|
page read and write
|
||
1362000
|
heap
|
page read and write
|
||
EB2000
|
trusted library allocation
|
page execute and read and write
|
||
110000
|
heap
|
page read and write
|
||
186B9C02000
|
heap
|
page read and write
|
||
1FD23C5E000
|
heap
|
page read and write
|
||
266D1002000
|
trusted library allocation
|
page read and write
|
||
A83000
|
trusted library allocation
|
page read and write
|
||
E90000
|
heap
|
page read and write
|
||
1180000
|
trusted library allocation
|
page read and write
|
||
3141000
|
trusted library allocation
|
page read and write
|
||
E6C000
|
heap
|
page read and write
|
||
1FD23C57000
|
heap
|
page read and write
|
||
2FEE000
|
stack
|
page read and write
|
||
266D0FF0000
|
remote allocation
|
page read and write
|
||
D5A000
|
trusted library allocation
|
page execute and read and write
|
||
AF6000
|
stack
|
page read and write
|
||
266CF62A000
|
heap
|
page read and write
|
||
25BE000
|
stack
|
page read and write
|
||
26C4AFF000
|
stack
|
page read and write
|
||
DE0000
|
heap
|
page read and write
|
||
21448675000
|
heap
|
page read and write
|
||
DEC000
|
heap
|
page read and write
|
||
5329000
|
trusted library allocation
|
page read and write
|
||
3355000
|
trusted library allocation
|
page read and write
|
||
520000
|
heap
|
page read and write
|
||
E6E000
|
heap
|
page read and write
|
||
DE7000
|
heap
|
page read and write
|
||
12BA4B80000
|
remote allocation
|
page read and write
|
||
5322000
|
trusted library allocation
|
page read and write
|
||
186B9C5E000
|
heap
|
page read and write
|
||
4F7E000
|
stack
|
page read and write
|
||
DE5000
|
heap
|
page read and write
|
||
266CF613000
|
heap
|
page read and write
|
||
26D1EFE000
|
stack
|
page read and write
|
||
245F000
|
stack
|
page read and write
|
||
1FD23C7A000
|
heap
|
page read and write
|
||
533E000
|
stack
|
page read and write
|
||
186B9C64000
|
heap
|
page read and write
|
||
103C000
|
stack
|
page read and write
|
||
29EE000
|
stack
|
page read and write
|
||
2A40000
|
trusted library allocation
|
page execute and read and write
|
||
273E000
|
stack
|
page read and write
|
||
5329000
|
trusted library allocation
|
page read and write
|
||
12BA4C26000
|
heap
|
page read and write
|
||
C26EB7E000
|
stack
|
page read and write
|
||
DBF000
|
heap
|
page read and write
|
||
21448560000
|
heap
|
page read and write
|
||
55FE000
|
stack
|
page read and write
|
||
4FA000
|
stack
|
page read and write
|
||
533A000
|
trusted library allocation
|
page read and write
|
||
E89000
|
heap
|
page read and write
|
||
F7056FF000
|
stack
|
page read and write
|
||
F7054FF000
|
stack
|
page read and write
|
||
3AEF000
|
trusted library allocation
|
page read and write
|
||
12BA4C13000
|
heap
|
page read and write
|
||
21449002000
|
heap
|
page read and write
|
||
542E000
|
stack
|
page read and write
|
||
E9B000
|
heap
|
page read and write
|
||
E0B000
|
heap
|
page read and write
|
||
E6E000
|
heap
|
page read and write
|
||
1FD23C13000
|
heap
|
page read and write
|
||
2CF0000
|
heap
|
page execute and read and write
|
||
545E379000
|
stack
|
page read and write
|
||
110E000
|
stack
|
page read and write
|
||
4BFE000
|
stack
|
page read and write
|
||
DF2000
|
heap
|
page read and write
|
||
55A0000
|
trusted library allocation
|
page read and write
|
||
970000
|
unkown
|
page readonly
|
||
DD0000
|
heap
|
page read and write
|
||
C26E77E000
|
stack
|
page read and write
|
||
CF4000
|
stack
|
page read and write
|
||
E9D000
|
heap
|
page read and write
|
||
4144000
|
trusted library allocation
|
page read and write
|
||
545E57E000
|
stack
|
page read and write
|
||
21448550000
|
heap
|
page read and write
|
||
970000
|
unkown
|
page readonly
|
||
3110000
|
trusted library allocation
|
page read and write
|
||
533E000
|
stack
|
page read and write
|
||
E31000
|
heap
|
page read and write
|
||
10EF000
|
stack
|
page read and write
|
||
589E000
|
stack
|
page read and write
|
||
170E000
|
stack
|
page read and write
|
||
1D84BA02000
|
trusted library allocation
|
page read and write
|
||
4E7E000
|
stack
|
page read and write
|
||
12BA49E0000
|
heap
|
page read and write
|
||
DF3000
|
heap
|
page read and write
|
||
DF8000
|
heap
|
page read and write
|
||
4C00000
|
trusted library allocation
|
page execute and read and write
|
||
E9D000
|
heap
|
page read and write
|
||
DEA000
|
heap
|
page read and write
|
||
4BBF000
|
stack
|
page read and write
|
||
C26EA7C000
|
stack
|
page read and write
|
||
E93000
|
heap
|
page read and write
|
||
21449027000
|
heap
|
page read and write
|
||
DF8000
|
heap
|
page read and write
|
||
5320000
|
trusted library allocation
|
page read and write
|
||
2FF0000
|
trusted library allocation
|
page read and write
|
||
10C7000
|
trusted library allocation
|
page execute and read and write
|
||
94FB1FC000
|
stack
|
page read and write
|
||
530F000
|
trusted library allocation
|
page read and write
|
||
F7055FE000
|
stack
|
page read and write
|
||
21448D40000
|
trusted library allocation
|
page read and write
|
||
E86000
|
heap
|
page read and write
|
||
E83000
|
heap
|
page read and write
|
||
47B000
|
unkown
|
page readonly
|
||
EB0000
|
heap
|
page read and write
|
||
26D207D000
|
stack
|
page read and write
|
||
1FD23C3A000
|
heap
|
page read and write
|
||
12BA4C29000
|
heap
|
page read and write
|
||
1FD23B90000
|
heap
|
page read and write
|
||
12BA49F0000
|
heap
|
page read and write
|
||
5301000
|
trusted library allocation
|
page read and write
|
||
CEE000
|
stack
|
page read and write
|
||
1C3ED4CC000
|
heap
|
page read and write
|
||
5316000
|
trusted library allocation
|
page read and write
|
||
6BDCF7A000
|
stack
|
page read and write
|
||
1FD23C62000
|
heap
|
page read and write
|
||
5326000
|
trusted library allocation
|
page read and write
|
||
4E7E000
|
stack
|
page read and write
|
||
4AEE000
|
stack
|
page read and write
|
||
266CF700000
|
heap
|
page read and write
|
||
E90000
|
trusted library allocation
|
page read and write
|
||
E86000
|
heap
|
page read and write
|
||
DEB000
|
heap
|
page read and write
|
||
186B9B50000
|
heap
|
page read and write
|
||
2FFF000
|
trusted library allocation
|
page read and write
|
||
533D000
|
trusted library allocation
|
page read and write
|
||
507E000
|
stack
|
page read and write
|
||
1384000
|
heap
|
page read and write
|
||
266CF670000
|
heap
|
page read and write
|
||
21448678000
|
heap
|
page read and write
|
||
21449030000
|
heap
|
page read and write
|
||
5334000
|
trusted library allocation
|
page read and write
|
||
D10000
|
heap
|
page read and write
|
||
1C3ED400000
|
heap
|
page read and write
|
||
31C0000
|
heap
|
page read and write
|
||
1470000
|
trusted library allocation
|
page read and write
|
||
E99000
|
heap
|
page read and write
|
||
553E000
|
stack
|
page read and write
|
||
129F000
|
stack
|
page read and write
|
||
9B0000
|
trusted library allocation
|
page execute and read and write
|
||
517E000
|
stack
|
page read and write
|
||
F23000
|
heap
|
page read and write
|
||
980000
|
unkown
|
page read and write
|
||
4FE0000
|
trusted library allocation
|
page read and write
|
||
A90000
|
trusted library allocation
|
page read and write
|
||
E7A000
|
heap
|
page read and write
|
||
E94000
|
heap
|
page read and write
|
||
F0D000
|
heap
|
page read and write
|
||
1338000
|
heap
|
page read and write
|
||
266CF702000
|
heap
|
page read and write
|
||
6BDD07E000
|
stack
|
page read and write
|
||
E2E000
|
heap
|
page read and write
|
||
1FD23C82000
|
heap
|
page read and write
|
||
C20000
|
heap
|
page read and write
|
||
E9D000
|
heap
|
page read and write
|
||
A8C000
|
trusted library allocation
|
page read and write
|
||
6BDCBFF000
|
stack
|
page read and write
|
||
1C3EDD00000
|
heap
|
page read and write
|
||
55FE000
|
stack
|
page read and write
|
||
50C000
|
stack
|
page read and write
|
||
D50000
|
trusted library allocation
|
page read and write
|
||
32DF000
|
stack
|
page read and write
|
||
2892000
|
trusted library allocation
|
page execute and read and write
|
||
26C433C000
|
stack
|
page read and write
|
||
DE4000
|
heap
|
page read and write
|
||
2B2C9C70000
|
heap
|
page read and write
|
||
E8C000
|
heap
|
page read and write
|
||
21448F6F000
|
heap
|
page read and write
|
||
21448F96000
|
heap
|
page read and write
|
||
545E07C000
|
stack
|
page read and write
|
||
DC2000
|
trusted library allocation
|
page execute and read and write
|
||
E83000
|
heap
|
page read and write
|
||
A20000
|
heap
|
page read and write
|
||
D6E000
|
stack
|
page read and write
|
||
E87000
|
heap
|
page read and write
|
||
6BDD0FF000
|
stack
|
page read and write
|
||
1D84B23E000
|
heap
|
page read and write
|
||
50B0000
|
trusted library allocation
|
page read and write
|
||
1FD23C26000
|
heap
|
page read and write
|
||
980000
|
unkown
|
page read and write
|
||
4A19000
|
stack
|
page read and write
|
||
DF2000
|
heap
|
page read and write
|
||
DF8000
|
heap
|
page read and write
|
||
E92000
|
heap
|
page read and write
|
||
94FB3FF000
|
stack
|
page read and write
|
||
26D1CFF000
|
stack
|
page read and write
|
||
2DA5000
|
trusted library allocation
|
page read and write
|
||
1D84B229000
|
heap
|
page read and write
|
||
266CF4A0000
|
heap
|
page read and write
|
||
6AA000
|
trusted library allocation
|
page execute and read and write
|
||
1FD23C5A000
|
heap
|
page read and write
|
||
21448643000
|
heap
|
page read and write
|
||
94FA93C000
|
stack
|
page read and write
|
||
5314000
|
trusted library allocation
|
page read and write
|
||
DFA000
|
heap
|
page read and write
|
||
D00000
|
trusted library allocation
|
page read and write
|
||
186B9D00000
|
heap
|
page read and write
|
||
93E000
|
stack
|
page read and write
|
||
E8C000
|
heap
|
page read and write
|
||
E7C000
|
heap
|
page read and write
|
||
DA8000
|
heap
|
page read and write
|
||
1FD23C34000
|
heap
|
page read and write
|
||
50BE000
|
stack
|
page read and write
|
||
25FD000
|
stack
|
page read and write
|
||
DEE000
|
stack
|
page read and write
|
||
A80000
|
trusted library allocation
|
page read and write
|
||
2C30000
|
heap
|
page read and write
|
||
7FB30000
|
trusted library allocation
|
page execute and read and write
|
||
94FB4FD000
|
stack
|
page read and write
|
||
E7A000
|
heap
|
page read and write
|
||
DED000
|
heap
|
page read and write
|
||
C2E000
|
stack
|
page read and write
|
||
1D84B23B000
|
heap
|
page read and write
|
||
1FD23B30000
|
heap
|
page read and write
|
||
5325000
|
trusted library allocation
|
page read and write
|
||
21448629000
|
heap
|
page read and write
|
||
CFB000
|
stack
|
page read and write
|
||
108E000
|
unkown
|
page read and write
|
||
8F9000
|
stack
|
page read and write
|
||
266CF68A000
|
heap
|
page read and write
|
||
1FD23C58000
|
heap
|
page read and write
|
||
9FE000
|
unkown
|
page read and write
|
||
2961000
|
trusted library allocation
|
page read and write
|
||
214485C0000
|
heap
|
page read and write
|
||
E7E000
|
heap
|
page read and write
|
||
D5C000
|
trusted library allocation
|
page execute and read and write
|
||
D90000
|
heap
|
page read and write
|
||
55B0000
|
trusted library allocation
|
page read and write
|
||
E93000
|
heap
|
page read and write
|
||
DF1000
|
heap
|
page read and write
|
||
5313000
|
trusted library allocation
|
page read and write
|
||
6BDCCFC000
|
stack
|
page read and write
|
||
1FD23C67000
|
heap
|
page read and write
|
There are 760 hidden memdumps, click here to show them.