Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
burlar al diablo napoleon hill pdf.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
initial sample
|
||
C:\Users\user\AppData\Local\Temp\690727\Sodium.pif
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
modified
|
||
C:\Users\user\AppData\Local\Temp\690727\M
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\Dying
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\Facial
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\Fraction
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\Greene
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\Ncaa
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\Price
|
ASCII text, with very long lines (1080), with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\Price.bat
|
ASCII text, with very long lines (1080), with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\Principle
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\Removal
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\Shoe
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\Sized
|
data
|
dropped
|
There are 4 hidden files, click here to show them.
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Windows\SysWOW64\cmd.exe
|
"C:\Windows\System32\cmd.exe" /c copy Price Price.bat & Price.bat
|
||
C:\Windows\SysWOW64\findstr.exe
|
findstr /I "wrsa opssvc"
|
||
C:\Windows\SysWOW64\findstr.exe
|
findstr -I "avastui avgui bdservicehost nswscsvc sophoshealth"
|
||
C:\Windows\SysWOW64\cmd.exe
|
cmd /c md 690727
|
||
C:\Windows\SysWOW64\findstr.exe
|
findstr /V "AviationLauraUhFujitsu" Fraction
|
||
C:\Windows\SysWOW64\cmd.exe
|
cmd /c copy /b ..\Removal + ..\Facial + ..\Shoe + ..\Greene + ..\Ncaa + ..\Dying + ..\Principle M
|
||
C:\Users\user\AppData\Local\Temp\690727\Sodium.pif
|
Sodium.pif M
|
||
C:\Users\user\Desktop\burlar al diablo napoleon hill pdf.exe
|
"C:\Users\user\Desktop\burlar al diablo napoleon hill pdf.exe"
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\SysWOW64\tasklist.exe
|
tasklist
|
||
C:\Windows\SysWOW64\tasklist.exe
|
tasklist
|
||
C:\Windows\SysWOW64\choice.exe
|
choice /d y /t 5
|
There are 2 hidden processes, click here to show them.
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
https://steamcommunity.com/profiles/76561199724331900
|
104.102.49.254
|
||
https://osgwiki.com/wiki/Manifest_Request
|
unknown
|
||
http://localhost/data.svc
|
unknown
|
||
http://www.autoitscript.com/autoit3/J
|
unknown
|
||
https://xsts.auth.xboxlive.comHttpMethodUrlRequestHeadersForceRefreshAllUsersRequestBodyBase64user.a
|
unknown
|
||
https://aka.ms/iris-actions.WNF_SHEL_PPI_WIN32VTCAPP_PROCESS_STARTEDThis
|
unknown
|
||
http://Passport.NET/purposehr
|
unknown
|
||
http://www.microsoft.R
|
unknown
|
||
http://schemas.xmlsoap.org/wsdl/soap/2003-02-11.xsd.
|
unknown
|
||
http://crl.microso
|
unknown
|
||
http://ocsp2.gS
|
unknown
|
||
http://www.xrml.org/schema/2001/11/xrml2core
|
unknown
|
||
https://go.microsoft
|
unknown
|
||
http://schemas.xmlsoap.org/disco/soap/S
|
unknown
|
||
http://www.xmlspy.com)
|
unknown
|
||
http://ocsp2.gShell
|
unknown
|
||
http://nsis.sf.net/NSIS_ErrorError
|
unknown
|
||
https://www.autoitscript.com/autoit3/
|
unknown
|
||
http://activity.windows.com/user-activity.jsonWindows.Internal.StateRepository.ApplicationResourceRe
|
unknown
|
||
http://schemas.xmlsoap.org/disco/scl/
|
unknown
|
||
http://crl.mi
|
unknown
|
||
http://crl.mit
|
unknown
|
||
http://schemas.xmlsoap.org/wsdl/2003-02-11.xsd
|
unknown
|
||
http://www.ws-i.org/Profiles/BasicProfile-1.1.html
|
unknown
|
There are 14 hidden URLs, click here to show them.
Domains
Name
|
IP
|
Malicious
|
|
---|---|---|---|
steamcommunity.com
|
104.102.49.254
|
||
mediavelk.sbs
|
unknown
|
||
activedomest.sbs
|
unknown
|
||
ostracizez.sbs
|
unknown
|
||
definitib.sbs
|
unknown
|
||
strikebripm.sbs
|
unknown
|
||
trappysno.cyou
|
unknown
|
||
arenbootk.sbs
|
unknown
|
||
offybirhtdi.sbs
|
unknown
|
||
aWBQBumKUJoWuGshZMLv.aWBQBumKUJoWuGshZMLv
|
unknown
|
||
elaboretib.sbs
|
unknown
|
There are 1 hidden domains, click here to show them.
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
104.102.49.254
|
steamcommunity.com
|
United States
|
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
1A21000
|
trusted library allocation
|
page read and write
|
||
BBE000
|
stack
|
page read and write
|
||
3BB1000
|
heap
|
page read and write
|
||
6F9000
|
heap
|
page read and write
|
||
6F9000
|
heap
|
page read and write
|
||
D00000
|
heap
|
page read and write
|
||
27D5000
|
heap
|
page read and write
|
||
1CB6000
|
trusted library allocation
|
page read and write
|
||
1921000
|
trusted library allocation
|
page read and write
|
||
18BC000
|
heap
|
page read and write
|
||
197C000
|
trusted library allocation
|
page read and write
|
||
948000
|
heap
|
page read and write
|
||
1A21000
|
trusted library allocation
|
page read and write
|
||
1990000
|
trusted library allocation
|
page read and write
|
||
196B000
|
trusted library allocation
|
page read and write
|
||
30F0000
|
heap
|
page read and write
|
||
1D4B000
|
trusted library allocation
|
page read and write
|
||
3BB1000
|
heap
|
page read and write
|
||
1986000
|
trusted library allocation
|
page read and write
|
||
1861000
|
heap
|
page read and write
|
||
1C24000
|
trusted library allocation
|
page read and write
|
||
1982000
|
trusted library allocation
|
page read and write
|
||
D84000
|
unkown
|
page write copy
|
||
3BB1000
|
heap
|
page read and write
|
||
1921000
|
trusted library allocation
|
page read and write
|
||
1CC5000
|
trusted library allocation
|
page read and write
|
||
8BF000
|
stack
|
page read and write
|
||
1921000
|
trusted library allocation
|
page read and write
|
||
2B60000
|
heap
|
page read and write
|
||
198A000
|
trusted library allocation
|
page read and write
|
||
1C28000
|
trusted library allocation
|
page read and write
|
||
C0E000
|
heap
|
page read and write
|
||
1A21000
|
trusted library allocation
|
page read and write
|
||
18B0000
|
heap
|
page read and write
|
||
22FE000
|
stack
|
page read and write
|
||
3BB1000
|
heap
|
page read and write
|
||
3CD000
|
stack
|
page read and write
|
||
1983000
|
trusted library allocation
|
page read and write
|
||
1C26000
|
trusted library allocation
|
page read and write
|
||
401000
|
unkown
|
page execute read
|
||
27D3000
|
heap
|
page read and write
|
||
96E000
|
heap
|
page read and write
|
||
702000
|
heap
|
page read and write
|
||
3BB1000
|
heap
|
page read and write
|
||
1CCB000
|
trusted library allocation
|
page read and write
|
||
1921000
|
trusted library allocation
|
page read and write
|
||
4BCF000
|
stack
|
page read and write
|
||
C3E000
|
heap
|
page read and write
|
||
18AC000
|
heap
|
page read and write
|
||
1C20000
|
trusted library allocation
|
page read and write
|
||
1921000
|
trusted library allocation
|
page read and write
|
||
87E000
|
stack
|
page read and write
|
||
6ED000
|
heap
|
page read and write
|
||
6ED000
|
heap
|
page read and write
|
||
2B1E000
|
stack
|
page read and write
|
||
3BB1000
|
heap
|
page read and write
|
||
1861000
|
heap
|
page read and write
|
||
B40000
|
heap
|
page read and write
|
||
18B4000
|
heap
|
page read and write
|
||
3BB1000
|
heap
|
page read and write
|
||
25AC000
|
stack
|
page read and write
|
||
963000
|
heap
|
page read and write
|
||
1A21000
|
trusted library allocation
|
page read and write
|
||
1A21000
|
trusted library allocation
|
page read and write
|
||
1384000
|
heap
|
page read and write
|
||
41F000
|
unkown
|
page read and write
|
||
3BB1000
|
heap
|
page read and write
|
||
716000
|
heap
|
page read and write
|
||
1C2C000
|
trusted library allocation
|
page read and write
|
||
900000
|
heap
|
page read and write
|
||
1CCA000
|
trusted library allocation
|
page read and write
|
||
1921000
|
trusted library allocation
|
page read and write
|
||
6FE000
|
heap
|
page read and write
|
||
1C2B000
|
trusted library allocation
|
page read and write
|
||
1861000
|
heap
|
page read and write
|
||
2F60000
|
heap
|
page read and write
|
||
5AE000
|
stack
|
page read and write
|
||
1D4F000
|
trusted library allocation
|
page read and write
|
||
6B0000
|
heap
|
page read and write
|
||
8AF000
|
stack
|
page read and write
|
||
6FE000
|
heap
|
page read and write
|
||
1CC3000
|
trusted library allocation
|
page read and write
|
||
1921000
|
trusted library allocation
|
page read and write
|
||
C30000
|
heap
|
page read and write
|
||
3BB1000
|
heap
|
page read and write
|
||
6BA000
|
heap
|
page read and write
|
||
1CDE000
|
trusted library allocation
|
page read and write
|
||
1CCF000
|
trusted library allocation
|
page read and write
|
||
D80000
|
unkown
|
page write copy
|
||
1921000
|
trusted library allocation
|
page read and write
|
||
1A1E000
|
trusted library allocation
|
page read and write
|
||
198D000
|
trusted library allocation
|
page read and write
|
||
12F0000
|
trusted library allocation
|
page read and write
|
||
1C2D000
|
trusted library allocation
|
page read and write
|
||
3BB1000
|
heap
|
page read and write
|
||
1CDA000
|
trusted library allocation
|
page read and write
|
||
719000
|
heap
|
page read and write
|
||
25EC000
|
stack
|
page read and write
|
||
C7F000
|
stack
|
page read and write
|
||
1C27000
|
trusted library allocation
|
page read and write
|
||
2893000
|
heap
|
page read and write
|
||
28C8000
|
heap
|
page read and write
|
||
1965000
|
trusted library allocation
|
page read and write
|
||
1C21000
|
trusted library allocation
|
page read and write
|
||
1C24000
|
trusted library allocation
|
page read and write
|
||
35FC000
|
stack
|
page read and write
|
||
1C22000
|
trusted library allocation
|
page read and write
|
||
1CC1000
|
trusted library allocation
|
page read and write
|
||
718000
|
heap
|
page read and write
|
||
1921000
|
trusted library allocation
|
page read and write
|
||
961000
|
heap
|
page read and write
|
||
702000
|
heap
|
page read and write
|
||
1C26000
|
trusted library allocation
|
page read and write
|
||
19DE000
|
trusted library allocation
|
page read and write
|
||
2DC000
|
stack
|
page read and write
|
||
1C2F000
|
trusted library allocation
|
page read and write
|
||
1921000
|
trusted library allocation
|
page read and write
|
||
1921000
|
trusted library allocation
|
page read and write
|
||
6ED000
|
heap
|
page read and write
|
||
4ACF000
|
stack
|
page read and write
|
||
98B000
|
heap
|
page read and write
|
||
6ED000
|
heap
|
page read and write
|
||
796000
|
heap
|
page read and write
|
||
1A21000
|
trusted library allocation
|
page read and write
|
||
2F67000
|
heap
|
page read and write
|
||
720000
|
heap
|
page read and write
|
||
199A000
|
trusted library allocation
|
page read and write
|
||
702000
|
heap
|
page read and write
|
||
1921000
|
trusted library allocation
|
page read and write
|
||
1CD9000
|
trusted library allocation
|
page read and write
|
||
CBE000
|
stack
|
page read and write
|
||
74E000
|
stack
|
page read and write
|
||
1921000
|
trusted library allocation
|
page read and write
|
||
3BB1000
|
heap
|
page read and write
|
||
27D2000
|
heap
|
page read and write
|
||
1921000
|
trusted library allocation
|
page read and write
|
||
12F0000
|
trusted library allocation
|
page read and write
|
||
D50000
|
unkown
|
page readonly
|
||
720000
|
heap
|
page read and write
|
||
3BB1000
|
heap
|
page read and write
|
||
1A21000
|
trusted library allocation
|
page read and write
|
||
97C000
|
heap
|
page read and write
|
||
98E000
|
heap
|
page read and write
|
||
6ED000
|
heap
|
page read and write
|
||
1CCF000
|
trusted library allocation
|
page read and write
|
||
2B5F000
|
stack
|
page read and write
|
||
1A21000
|
trusted library allocation
|
page read and write
|
||
6FE000
|
heap
|
page read and write
|
||
400000
|
unkown
|
page readonly
|
||
1A21000
|
trusted library allocation
|
page read and write
|
||
749000
|
heap
|
page read and write
|
||
6FE000
|
heap
|
page read and write
|
||
196E000
|
trusted library allocation
|
page read and write
|
||
3BB1000
|
heap
|
page read and write
|
||
1A21000
|
trusted library allocation
|
page read and write
|
||
3BB1000
|
heap
|
page read and write
|
||
27CF000
|
stack
|
page read and write
|
||
3BB1000
|
heap
|
page read and write
|
||
28C0000
|
heap
|
page read and write
|
||
3BB1000
|
heap
|
page read and write
|
||
7DE000
|
stack
|
page read and write
|
||
1C20000
|
trusted library allocation
|
page read and write
|
||
197B000
|
trusted library allocation
|
page read and write
|
||
1A1E000
|
trusted library allocation
|
page read and write
|
||
18BE000
|
heap
|
page read and write
|
||
1921000
|
trusted library allocation
|
page read and write
|
||
1C22000
|
trusted library allocation
|
page read and write
|
||
6ED000
|
heap
|
page read and write
|
||
1921000
|
trusted library allocation
|
page read and write
|
||
3BB1000
|
heap
|
page read and write
|
||
1A21000
|
trusted library allocation
|
page read and write
|
||
70E000
|
stack
|
page read and write
|
||
1CB3000
|
trusted library allocation
|
page read and write
|
||
4B0E000
|
stack
|
page read and write
|
||
18AB000
|
heap
|
page read and write
|
||
1CDD000
|
trusted library allocation
|
page read and write
|
||
1921000
|
trusted library allocation
|
page read and write
|
||
C10000
|
heap
|
page read and write
|
||
3BB1000
|
heap
|
page read and write
|
||
C0E000
|
heap
|
page read and write
|
||
195D000
|
trusted library allocation
|
page read and write
|
||
1921000
|
trusted library allocation
|
page read and write
|
||
6FE000
|
heap
|
page read and write
|
||
27D7000
|
heap
|
page read and write
|
||
1A21000
|
trusted library allocation
|
page read and write
|
||
1921000
|
trusted library allocation
|
page read and write
|
||
1917000
|
heap
|
page read and write
|
||
D76000
|
unkown
|
page readonly
|
||
1921000
|
trusted library allocation
|
page read and write
|
||
1C28000
|
trusted library allocation
|
page read and write
|
||
15CC000
|
heap
|
page read and write
|
||
1861000
|
heap
|
page read and write
|
||
27D4000
|
heap
|
page read and write
|
||
380000
|
heap
|
page read and write
|
||
1CD7000
|
trusted library allocation
|
page read and write
|
||
1917000
|
heap
|
page read and write
|
||
1C27000
|
trusted library allocation
|
page read and write
|
||
1CBC000
|
trusted library allocation
|
page read and write
|
||
1D7D000
|
trusted library allocation
|
page read and write
|
||
19DD000
|
trusted library allocation
|
page read and write
|
||
720000
|
heap
|
page read and write
|
||
1967000
|
trusted library allocation
|
page read and write
|
||
6FE000
|
heap
|
page read and write
|
||
702000
|
heap
|
page read and write
|
||
5B0000
|
heap
|
page read and write
|
||
95F000
|
heap
|
page read and write
|
||
1861000
|
heap
|
page read and write
|
||
98E000
|
heap
|
page read and write
|
||
749000
|
heap
|
page read and write
|
||
4B4F000
|
stack
|
page read and write
|
||
1977000
|
trusted library allocation
|
page read and write
|
||
1861000
|
heap
|
page read and write
|
||
27D3000
|
heap
|
page read and write
|
||
3740000
|
heap
|
page read and write
|
||
3BB1000
|
heap
|
page read and write
|
||
34BF000
|
stack
|
page read and write
|
||
1D69000
|
trusted library allocation
|
page read and write
|
||
21F0000
|
heap
|
page read and write
|
||
408000
|
unkown
|
page readonly
|
||
C3E000
|
heap
|
page read and write
|
||
1A21000
|
trusted library allocation
|
page read and write
|
||
6F9000
|
heap
|
page read and write
|
||
1921000
|
trusted library allocation
|
page read and write
|
||
702000
|
heap
|
page read and write
|
||
1CBB000
|
trusted library allocation
|
page read and write
|
||
1969000
|
trusted library allocation
|
page read and write
|
||
3BB1000
|
heap
|
page read and write
|
||
1861000
|
heap
|
page read and write
|
||
198C000
|
trusted library allocation
|
page read and write
|
||
18A5000
|
heap
|
page read and write
|
||
98E000
|
heap
|
page read and write
|
||
1CC6000
|
trusted library allocation
|
page read and write
|
||
18B2000
|
heap
|
page read and write
|
||
1921000
|
trusted library allocation
|
page read and write
|
||
96D000
|
heap
|
page read and write
|
||
1543000
|
heap
|
page read and write
|
||
1C27000
|
trusted library allocation
|
page read and write
|
||
2150000
|
heap
|
page read and write
|
||
1921000
|
trusted library allocation
|
page read and write
|
||
27D6000
|
heap
|
page read and write
|
||
189E000
|
heap
|
page read and write
|
||
1861000
|
heap
|
page read and write
|
||
1C23000
|
trusted library allocation
|
page read and write
|
||
6F9000
|
heap
|
page read and write
|
||
408000
|
unkown
|
page readonly
|
||
3BB1000
|
heap
|
page read and write
|
||
1921000
|
trusted library allocation
|
page read and write
|
||
907000
|
heap
|
page read and write
|
||
C2B000
|
heap
|
page read and write
|
||
1991000
|
trusted library allocation
|
page read and write
|
||
B56000
|
heap
|
page read and write
|
||
1C27000
|
trusted library allocation
|
page read and write
|
||
28AE000
|
stack
|
page read and write
|
||
B50000
|
heap
|
page read and write
|
||
1CCC000
|
trusted library allocation
|
page read and write
|
||
1921000
|
trusted library allocation
|
page read and write
|
||
1861000
|
heap
|
page read and write
|
||
401000
|
unkown
|
page execute read
|
||
1995000
|
trusted library allocation
|
page read and write
|
||
197F000
|
trusted library allocation
|
page read and write
|
||
1970000
|
trusted library allocation
|
page read and write
|
||
1921000
|
trusted library allocation
|
page read and write
|
||
98B000
|
heap
|
page read and write
|
||
8FE000
|
stack
|
page read and write
|
||
1921000
|
trusted library allocation
|
page read and write
|
||
1921000
|
trusted library allocation
|
page read and write
|
||
1C2A000
|
trusted library allocation
|
page read and write
|
||
4B8E000
|
stack
|
page read and write
|
||
97C000
|
heap
|
page read and write
|
||
C3E000
|
heap
|
page read and write
|
||
1C2B000
|
trusted library allocation
|
page read and write
|
||
2885000
|
heap
|
page read and write
|
||
81E000
|
stack
|
page read and write
|
||
A3C000
|
stack
|
page read and write
|
||
3BB1000
|
heap
|
page read and write
|
||
C2B000
|
heap
|
page read and write
|
||
702000
|
heap
|
page read and write
|
||
C12000
|
heap
|
page read and write
|
||
1861000
|
heap
|
page read and write
|
||
2380000
|
heap
|
page read and write
|
||
98B000
|
heap
|
page read and write
|
||
6FE000
|
heap
|
page read and write
|
||
18AE000
|
heap
|
page read and write
|
||
1861000
|
heap
|
page read and write
|
||
19DD000
|
trusted library allocation
|
page read and write
|
||
12F0000
|
trusted library allocation
|
page read and write
|
||
1A21000
|
trusted library allocation
|
page read and write
|
||
C2B000
|
heap
|
page read and write
|
||
1861000
|
heap
|
page read and write
|
||
461000
|
unkown
|
page read and write
|
||
AB0000
|
heap
|
page read and write
|
||
28B0000
|
heap
|
page read and write
|
||
1C2E000
|
trusted library allocation
|
page read and write
|
||
D89000
|
unkown
|
page readonly
|
||
1C25000
|
trusted library allocation
|
page read and write
|
||
1861000
|
heap
|
page read and write
|
||
1CC9000
|
trusted library allocation
|
page read and write
|
||
1A21000
|
trusted library allocation
|
page read and write
|
||
1A21000
|
trusted library allocation
|
page read and write
|
||
1861000
|
heap
|
page read and write
|
||
199C000
|
trusted library allocation
|
page read and write
|
||
1921000
|
trusted library allocation
|
page read and write
|
||
18A4000
|
heap
|
page read and write
|
||
1A21000
|
trusted library allocation
|
page read and write
|
||
195E000
|
trusted library allocation
|
page read and write
|
||
6F9000
|
heap
|
page read and write
|
||
3BB1000
|
heap
|
page read and write
|
||
3BB1000
|
heap
|
page read and write
|
||
1A21000
|
trusted library allocation
|
page read and write
|
||
3BB1000
|
heap
|
page read and write
|
||
18DA000
|
heap
|
page read and write
|
||
27D3000
|
heap
|
page read and write
|
||
98B000
|
heap
|
page read and write
|
||
B3F000
|
stack
|
page read and write
|
||
1CC1000
|
trusted library allocation
|
page read and write
|
||
AFE000
|
stack
|
page read and write
|
||
1A21000
|
trusted library allocation
|
page read and write
|
||
1861000
|
heap
|
page read and write
|
||
1975000
|
trusted library allocation
|
page read and write
|
||
1C2F000
|
trusted library allocation
|
page read and write
|
||
6F9000
|
heap
|
page read and write
|
||
1A21000
|
trusted library allocation
|
page read and write
|
||
940000
|
heap
|
page read and write
|
||
3BB1000
|
heap
|
page read and write
|
||
1861000
|
heap
|
page read and write
|
||
18A7000
|
heap
|
page read and write
|
||
1CCD000
|
trusted library allocation
|
page read and write
|
||
1CB2000
|
trusted library allocation
|
page read and write
|
||
1985000
|
trusted library allocation
|
page read and write
|
||
19DE000
|
trusted library allocation
|
page read and write
|
||
702000
|
heap
|
page read and write
|
||
1861000
|
heap
|
page read and write
|
||
749000
|
heap
|
page read and write
|
||
6F9000
|
heap
|
page read and write
|
||
1989000
|
trusted library allocation
|
page read and write
|
||
3BB1000
|
heap
|
page read and write
|
||
97C000
|
heap
|
page read and write
|
||
1921000
|
trusted library allocation
|
page read and write
|
||
1384000
|
heap
|
page read and write
|
||
1921000
|
trusted library allocation
|
page read and write
|
||
1CB2000
|
trusted library allocation
|
page read and write
|
||
1921000
|
trusted library allocation
|
page read and write
|
||
732000
|
heap
|
page read and write
|
||
1979000
|
trusted library allocation
|
page read and write
|
||
1921000
|
trusted library allocation
|
page read and write
|
||
197E000
|
trusted library allocation
|
page read and write
|
||
719000
|
heap
|
page read and write
|
||
2320000
|
heap
|
page read and write
|
||
3BB1000
|
heap
|
page read and write
|
||
1921000
|
trusted library allocation
|
page read and write
|
||
4C20000
|
heap
|
page read and write
|
||
1CC6000
|
trusted library allocation
|
page read and write
|
||
1861000
|
heap
|
page read and write
|
||
19DE000
|
trusted library allocation
|
page read and write
|
||
1921000
|
trusted library allocation
|
page read and write
|
||
1CD8000
|
trusted library allocation
|
page read and write
|
||
9AF000
|
stack
|
page read and write
|
||
1921000
|
trusted library allocation
|
page read and write
|
||
C3E000
|
heap
|
page read and write
|
||
1C24000
|
trusted library allocation
|
page read and write
|
||
33BE000
|
stack
|
page read and write
|
||
6EA000
|
heap
|
page read and write
|
||
1A21000
|
trusted library allocation
|
page read and write
|
||
1C2A000
|
trusted library allocation
|
page read and write
|
||
236E000
|
stack
|
page read and write
|
||
400000
|
unkown
|
page readonly
|
||
1921000
|
trusted library allocation
|
page read and write
|
||
19A000
|
stack
|
page read and write
|
||
1921000
|
trusted library allocation
|
page read and write
|
||
1958000
|
trusted library allocation
|
page read and write
|
||
196C000
|
trusted library allocation
|
page read and write
|
||
510000
|
heap
|
page read and write
|
||
1CCB000
|
trusted library allocation
|
page read and write
|
||
1554000
|
heap
|
page read and write
|
||
A7C000
|
stack
|
page read and write
|
||
97F000
|
heap
|
page read and write
|
||
97C000
|
heap
|
page read and write
|
||
1861000
|
heap
|
page read and write
|
||
3BB1000
|
heap
|
page read and write
|
||
719000
|
heap
|
page read and write
|
||
1C2D000
|
trusted library allocation
|
page read and write
|
||
1921000
|
trusted library allocation
|
page read and write
|
||
31C000
|
stack
|
page read and write
|
||
40B000
|
unkown
|
page write copy
|
||
1861000
|
heap
|
page read and write
|
||
1964000
|
trusted library allocation
|
page read and write
|
||
4F4000
|
unkown
|
page readonly
|
||
387F000
|
heap
|
page read and write
|
||
1C29000
|
trusted library allocation
|
page read and write
|
||
15EB000
|
heap
|
page read and write
|
||
1CB1000
|
trusted library allocation
|
page read and write
|
||
98C000
|
heap
|
page read and write
|
||
1921000
|
trusted library allocation
|
page read and write
|
||
1921000
|
trusted library allocation
|
page read and write
|
||
6F9000
|
heap
|
page read and write
|
||
702000
|
heap
|
page read and write
|
||
1999000
|
trusted library allocation
|
page read and write
|
||
1CB3000
|
trusted library allocation
|
page read and write
|
||
373F000
|
stack
|
page read and write
|
||
732000
|
heap
|
page read and write
|
||
1A21000
|
trusted library allocation
|
page read and write
|
||
1CDE000
|
trusted library allocation
|
page read and write
|
||
1921000
|
trusted library allocation
|
page read and write
|
||
CFF000
|
stack
|
page read and write
|
||
1C21000
|
trusted library allocation
|
page read and write
|
||
C3E000
|
heap
|
page read and write
|
||
6F9000
|
heap
|
page read and write
|
||
1D66000
|
trusted library allocation
|
page read and write
|
||
1973000
|
trusted library allocation
|
page read and write
|
||
199D000
|
trusted library allocation
|
page read and write
|
||
1D78000
|
trusted library allocation
|
page read and write
|
||
790000
|
heap
|
page read and write
|
||
18B5000
|
heap
|
page read and write
|
||
1CB1000
|
trusted library allocation
|
page read and write
|
||
3BB1000
|
heap
|
page read and write
|
||
3BB1000
|
heap
|
page read and write
|
||
1A21000
|
trusted library allocation
|
page read and write
|
||
1921000
|
trusted library allocation
|
page read and write
|
||
1CD3000
|
trusted library allocation
|
page read and write
|
||
BF8000
|
heap
|
page read and write
|
||
3D0000
|
heap
|
page read and write
|
||
CC1000
|
unkown
|
page execute read
|
||
1861000
|
heap
|
page read and write
|
||
98000
|
stack
|
page read and write
|
||
56E000
|
stack
|
page read and write
|
||
34FC000
|
stack
|
page read and write
|
||
1917000
|
heap
|
page read and write
|
||
2324000
|
heap
|
page read and write
|
||
1C26000
|
trusted library allocation
|
page read and write
|
||
1921000
|
trusted library allocation
|
page read and write
|
||
3BB1000
|
heap
|
page read and write
|
||
27D7000
|
heap
|
page read and write
|
||
1921000
|
trusted library allocation
|
page read and write
|
||
1CD4000
|
trusted library allocation
|
page read and write
|
||
1C2B000
|
trusted library allocation
|
page read and write
|
||
719000
|
heap
|
page read and write
|
||
3BB1000
|
heap
|
page read and write
|
||
1CC8000
|
trusted library allocation
|
page read and write
|
||
1CC4000
|
trusted library allocation
|
page read and write
|
||
21AE000
|
stack
|
page read and write
|
||
98B000
|
heap
|
page read and write
|
||
3BB1000
|
heap
|
page read and write
|
||
1A21000
|
trusted library allocation
|
page read and write
|
||
1C28000
|
trusted library allocation
|
page read and write
|
||
C2B000
|
heap
|
page read and write
|
||
4770000
|
heap
|
page read and write
|
||
1CC8000
|
trusted library allocation
|
page read and write
|
||
1921000
|
trusted library allocation
|
page read and write
|
||
6ED000
|
heap
|
page read and write
|
||
1D4D000
|
trusted library allocation
|
page read and write
|
||
6ED000
|
heap
|
page read and write
|
||
1861000
|
heap
|
page read and write
|
||
702000
|
heap
|
page read and write
|
||
1A1E000
|
trusted library allocation
|
page read and write
|
||
1CD4000
|
trusted library allocation
|
page read and write
|
||
5B5000
|
heap
|
page read and write
|
||
18A9000
|
heap
|
page read and write
|
||
6BE000
|
heap
|
page read and write
|
||
980000
|
heap
|
page read and write
|
||
1CBA000
|
trusted library allocation
|
page read and write
|
||
2ACF000
|
stack
|
page read and write
|
||
18B9000
|
heap
|
page read and write
|
||
189D000
|
heap
|
page read and write
|
||
1A21000
|
trusted library allocation
|
page read and write
|
||
98E000
|
heap
|
page read and write
|
||
363E000
|
stack
|
page read and write
|
||
719000
|
heap
|
page read and write
|
||
1C27000
|
trusted library allocation
|
page read and write
|
||
18BB000
|
heap
|
page read and write
|
||
1C27000
|
trusted library allocation
|
page read and write
|
||
C1C000
|
heap
|
page read and write
|
||
719000
|
heap
|
page read and write
|
||
520000
|
heap
|
page read and write
|
||
1CD0000
|
trusted library allocation
|
page read and write
|
||
1921000
|
trusted library allocation
|
page read and write
|
||
1C20000
|
trusted library allocation
|
page read and write
|
||
1962000
|
trusted library allocation
|
page read and write
|
||
78E000
|
stack
|
page read and write
|
||
1921000
|
trusted library allocation
|
page read and write
|
||
6FE000
|
heap
|
page read and write
|
||
98B000
|
heap
|
page read and write
|
||
1D4D000
|
trusted library allocation
|
page read and write
|
||
6FE000
|
heap
|
page read and write
|
||
1C2B000
|
trusted library allocation
|
page read and write
|
||
4F4000
|
unkown
|
page readonly
|
||
732000
|
heap
|
page read and write
|
||
CC0000
|
unkown
|
page readonly
|
||
97C000
|
heap
|
page read and write
|
||
1A21000
|
trusted library allocation
|
page read and write
|
||
2860000
|
heap
|
page read and write
|
||
4A8E000
|
stack
|
page read and write
|
||
1C23000
|
trusted library allocation
|
page read and write
|
||
702000
|
heap
|
page read and write
|
||
1C27000
|
trusted library allocation
|
page read and write
|
||
40B000
|
unkown
|
page read and write
|
||
1921000
|
trusted library allocation
|
page read and write
|
||
719000
|
heap
|
page read and write
|
||
BF0000
|
heap
|
page read and write
|
||
1972000
|
trusted library allocation
|
page read and write
|
||
D2F000
|
stack
|
page read and write
|
||
21F5000
|
heap
|
page read and write
|
||
6FE000
|
heap
|
page read and write
|
||
1997000
|
trusted library allocation
|
page read and write
|
||
3BB1000
|
heap
|
page read and write
|
||
18B7000
|
heap
|
page read and write
|
||
1CCC000
|
trusted library allocation
|
page read and write
|
||
27DA000
|
heap
|
page read and write
|
||
C1D000
|
heap
|
page read and write
|
||
95F000
|
heap
|
page read and write
|
||
1A21000
|
trusted library allocation
|
page read and write
|
||
2820000
|
heap
|
page read and write
|
||
27D5000
|
heap
|
page read and write
|
||
4BF0000
|
heap
|
page read and write
|
||
C2F000
|
heap
|
page read and write
|
There are 504 hidden memdumps, click here to show them.