Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\WER9Fz381n.exe
|
"C:\Users\user\Desktop\WER9Fz381n.exe"
|
||
C:\Users\user\Desktop\WER9Fz381n.exe
|
"C:\Users\user\Desktop\WER9Fz381n.exe"
|
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
http://dg2sz7pxs7llf2t25fsbutlvvrjij4pmojugn75cmxnvoshmju6dzcad.onion
|
unknown
|
||
http://www.exabot.com/go/robot)Opera/9.80
|
unknown
|
||
http://dg2sz7pxs7llf2t25fsbutlvvrjij4pmojugn75cmxnvoshmju6dzcad.onion9e146be9-c76a-4720-bcdb-53011b8
|
unknown
|
||
http://dg2sz7pxs7llf2t25fsbutlvvrjij4pmojugn75cmxnvoshmju6dzcad.oniont
|
unknown
|
||
http://dg2sz7pxs7llf2t25fsbutlvvrjij4pmojugn75cmxnvoshmju6dzcad.onionhttp://dg2sz7pxs7llf2t25fsbutlv
|
unknown
|
||
http://dg2sz7pxs7llf2t25fsbutlvvrjij4pmojugn75cmxnvoshmju6dzcad.onionS-1-5-21-2246122658-3693405117-
|
unknown
|
||
http://search.msn.com/msnbot.htm)net/http:
|
unknown
|
||
http://help.yahoo.com/help/us/ysea
|
unknown
|
||
http://ww82.trythisgid.com/
|
199.59.243.227
|
||
http://invalidlog.txtlookup
|
unknown
|
||
http://search.msn.com/msnbot.htm)msnbot/1.1
|
unknown
|
||
http://search.msn.com/msn
|
unknown
|
||
http://gais.cs.ccu.edu.tw/robot.php)Gulper
|
unknown
|
||
https://raw.githubusercontent.c
|
unknown
|
||
http://www.google.com/bot.html)tls:
|
unknown
|
||
http://www.spidersoft.com)Wget/1.9
|
unknown
|
||
http://www.archive.org/details/archive.org_bot)Opera/9.80
|
unknown
|
||
http://www.baidu.com/search/spider.htm)MobileSafari/600.1.4
|
unknown
|
||
http://yandex.com/bots)Opera/9.51
|
unknown
|
||
http://www.google.com/bot.html)Mozilla/5.0
|
unknown
|
||
http://www.google.com/bot.h
|
unknown
|
||
http://https://_bad_pdb_file.pdb
|
unknown
|
||
http://archive.org/details/archive.org_bot)Mozilla/5.0
|
unknown
|
||
https://www.google.com
|
unknown
|
||
http://devlog.gregarius.net/docs/ua)Links
|
unknown
|
||
http://misc.yahoo.com.cn/help.html)QueryPerformanceFrequency
|
unknown
|
||
http://www.bloglines.com)F
|
unknown
|
||
https://cdn.discordapp.com/attachments/1023299088751538198/1023549843135795230/to
|
unknown
|
||
http://www.alltheweb.com/help/webmaster/crawler)POLARIS/6.01(BREW
|
unknown
|
||
http://www.google.com/feedfetcher.html)HKLM
|
unknown
|
||
http://grub.org)Mozilla/5.0
|
unknown
|
||
http://crl.g
|
unknown
|
||
https://blockchain.infoindex
|
unknown
|
||
http://search.ms
|
unknown
|
||
http://yandex.com/bots)Opera/9.80
|
unknown
|
||
https://trythisgid.com/app-install-failureinsufficient
|
unknown
|
||
https://turnitin.com/robot/crawlerinfo.html)gentraceback
|
unknown
|
||
http://www.avantbrowser.com)MOT-V9mm/00.62
|
unknown
|
||
https://trythisgid.com/app-install-failure
|
46.8.8.100
|
||
https://blockstream.info/apiinvalid
|
unknown
|
||
http://search.msn.com/msnbot.htm)pkcs7:
|
unknown
|
||
http://www.alexa.com/help/webmasters;
|
unknown
|
||
http://www.google.com/adsbot.html)Encountered
|
unknown
|
||
https://cdn.discordapp.com/attachments/925779512644497442/933676145558310953/obfs4proxy.exehttps://g
|
unknown
|
||
http://www.googlebot.com/bot.html)Links
|
unknown
|
||
http://ww82.trythisgid.com/Fri
|
unknown
|
There are 36 hidden URLs, click here to show them.
Domains
Name
|
IP
|
Malicious
|
|
---|---|---|---|
ww82.trythisgid.com
|
unknown
|
||
s-part-0017.t-0009.t-msedge.net
|
13.107.246.45
|
||
trythisgid.com
|
46.8.8.100
|
||
63214.bodis.com
|
199.59.243.227
|
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
199.59.243.227
|
63214.bodis.com
|
United States
|
||
46.8.8.100
|
trythisgid.com
|
Russian Federation
|
Registry
Path
|
Value
|
Malicious
|
|
---|---|---|---|
HKEY_CURRENT_USER\SOFTWARE\Microsoft\a839a7d7
|
Servers
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\a839a7d7
|
UUID
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\a839a7d7
|
FirstInstallDate
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\a839a7d7
|
ServiceVersion
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\a839a7d7
|
PGDSE
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\a839a7d7
|
ServersVersion
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\a839a7d7
|
OSCaption
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\a839a7d7
|
OSArchitecture
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\a839a7d7
|
IsAdmin
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\a839a7d7
|
AV
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\a839a7d7
|
PatchTime
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\a839a7d7
|
CPU
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\a839a7d7
|
GPU
|
There are 3 hidden registries, click here to show them.
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
3700000
|
direct allocation
|
page read and write
|
||
37F0000
|
direct allocation
|
page read and write
|
||
400000
|
unkown
|
page execute and read and write
|
||
400000
|
unkown
|
page execute and read and write
|
||
327A000
|
direct allocation
|
page execute and read and write
|
||
336A000
|
direct allocation
|
page execute and read and write
|
||
13C36000
|
direct allocation
|
page read and write
|
||
13C0E000
|
direct allocation
|
page read and write
|
||
347B1000
|
heap
|
page read and write
|
||
13D79000
|
direct allocation
|
page read and write
|
||
2E80000
|
direct allocation
|
page execute and read and write
|
||
13D38000
|
direct allocation
|
page read and write
|
||
C7C000
|
unkown
|
page execute and read and write
|
||
13C08000
|
direct allocation
|
page read and write
|
||
13C46000
|
direct allocation
|
page read and write
|
||
3713000
|
direct allocation
|
page read and write
|
||
13C0C000
|
direct allocation
|
page read and write
|
||
EEA000
|
heap
|
page read and write
|
||
13D30000
|
direct allocation
|
page read and write
|
||
13D72000
|
direct allocation
|
page read and write
|
||
A7C000
|
unkown
|
page execute and read and write
|
||
13CB4000
|
direct allocation
|
page read and write
|
||
13D0C000
|
direct allocation
|
page read and write
|
||
3466F000
|
stack
|
page read and write
|
||
13CCE000
|
direct allocation
|
page read and write
|
||
F0B000
|
heap
|
page read and write
|
||
DCD000
|
heap
|
page read and write
|
||
13D5A000
|
direct allocation
|
page read and write
|
||
EEA000
|
heap
|
page read and write
|
||
F0A000
|
heap
|
page read and write
|
||
13CC4000
|
direct allocation
|
page read and write
|
||
3D7A000
|
direct allocation
|
page read and write
|
||
13D00000
|
direct allocation
|
page read and write
|
||
13CFA000
|
direct allocation
|
page read and write
|
||
13C8C000
|
direct allocation
|
page read and write
|
||
37FE000
|
direct allocation
|
page read and write
|
||
F0E000
|
heap
|
page read and write
|
||
13C92000
|
direct allocation
|
page read and write
|
||
13C70000
|
direct allocation
|
page read and write
|
||
13C48000
|
direct allocation
|
page read and write
|
||
13BEE000
|
stack
|
page read and write
|
||
37F1000
|
direct allocation
|
page read and write
|
||
2B0E000
|
stack
|
page read and write
|
||
13CDA000
|
direct allocation
|
page read and write
|
||
13D2E000
|
direct allocation
|
page read and write
|
||
F12000
|
heap
|
page read and write
|
||
13C58000
|
direct allocation
|
page read and write
|
||
73D06000
|
unkown
|
page readonly
|
||
C29000
|
unkown
|
page execute and read and write
|
||
EDF000
|
heap
|
page read and write
|
||
13C72000
|
direct allocation
|
page read and write
|
||
D80000
|
heap
|
page read and write
|
||
CA0000
|
heap
|
page read and write
|
||
13D62000
|
direct allocation
|
page read and write
|
||
349B000
|
direct allocation
|
page execute and read and write
|
||
13C12000
|
direct allocation
|
page read and write
|
||
13CB4000
|
direct allocation
|
page read and write
|
||
DCD000
|
heap
|
page read and write
|
||
13C9C000
|
direct allocation
|
page read and write
|
||
73CF0000
|
unkown
|
page readonly
|
||
13C64000
|
direct allocation
|
page read and write
|
||
13C72000
|
direct allocation
|
page read and write
|
||
29FE000
|
stack
|
page read and write
|
||
13C82000
|
direct allocation
|
page read and write
|
||
3715000
|
direct allocation
|
page read and write
|
||
345BF000
|
stack
|
page read and write
|
||
13C26000
|
direct allocation
|
page read and write
|
||
400000
|
unkown
|
page readonly
|
||
2A40000
|
heap
|
page read and write
|
||
13D3A000
|
direct allocation
|
page read and write
|
||
2B50000
|
heap
|
page read and write
|
||
13C4C000
|
direct allocation
|
page read and write
|
||
1F0000
|
heap
|
page read and write
|
||
358B000
|
direct allocation
|
page execute and read and write
|
||
2A70000
|
heap
|
page read and write
|
||
13D08000
|
direct allocation
|
page read and write
|
||
E32000
|
direct allocation
|
page read and write
|
||
401000
|
unkown
|
page execute read
|
||
13CDA000
|
direct allocation
|
page read and write
|
||
13D26000
|
direct allocation
|
page read and write
|
||
13D1E000
|
direct allocation
|
page read and write
|
||
1F7000
|
heap
|
page read and write
|
||
3447F000
|
stack
|
page read and write
|
||
13C76000
|
direct allocation
|
page read and write
|
||
2A3D000
|
stack
|
page read and write
|
||
13CE4000
|
direct allocation
|
page read and write
|
||
13D1A000
|
direct allocation
|
page read and write
|
||
13C66000
|
direct allocation
|
page read and write
|
||
13D5C000
|
direct allocation
|
page read and write
|
||
13C42000
|
direct allocation
|
page read and write
|
||
DC5000
|
heap
|
page read and write
|
||
D90000
|
heap
|
page read and write
|
||
13C70000
|
direct allocation
|
page read and write
|
||
13C74000
|
direct allocation
|
page read and write
|
||
13C84000
|
direct allocation
|
page read and write
|
||
D95000
|
heap
|
page read and write
|
||
C8B000
|
unkown
|
page execute and read and write
|
||
111F000
|
stack
|
page read and write
|
||
13D82000
|
direct allocation
|
page read and write
|
||
13C84000
|
direct allocation
|
page read and write
|
||
1F0000
|
heap
|
page read and write
|
||
347AF000
|
stack
|
page read and write
|
||
41D000
|
unkown
|
page execute read
|
||
2A50000
|
heap
|
page read and write
|
||
4015000
|
direct allocation
|
page read and write
|
||
37F3000
|
direct allocation
|
page read and write
|
||
13CF0000
|
direct allocation
|
page read and write
|
||
13CA4000
|
direct allocation
|
page read and write
|
||
1F5000
|
heap
|
page read and write
|
||
2980000
|
heap
|
page read and write
|
||
420000
|
unkown
|
page write copy
|
||
13D4E000
|
direct allocation
|
page read and write
|
||
13CB6000
|
direct allocation
|
page read and write
|
||
13C14000
|
direct allocation
|
page read and write
|
||
E70000
|
heap
|
page read and write
|
||
4018000
|
direct allocation
|
page read and write
|
||
400000
|
unkown
|
page readonly
|
||
13D0A000
|
direct allocation
|
page read and write
|
||
13C40000
|
direct allocation
|
page read and write
|
||
13CA2000
|
direct allocation
|
page read and write
|
||
13CC8000
|
direct allocation
|
page read and write
|
||
13D10000
|
direct allocation
|
page read and write
|
||
36A9000
|
direct allocation
|
page execute and read and write
|
||
13D22000
|
direct allocation
|
page read and write
|
||
19B000
|
stack
|
page read and write
|
||
E9F000
|
heap
|
page read and write
|
||
13D7C000
|
direct allocation
|
page read and write
|
||
13B1F000
|
stack
|
page read and write
|
||
13C50000
|
direct allocation
|
page read and write
|
||
3710000
|
direct allocation
|
page read and write
|
||
13CD6000
|
direct allocation
|
page read and write
|
||
13CBE000
|
direct allocation
|
page read and write
|
||
DCE000
|
heap
|
page read and write
|
||
13D68000
|
direct allocation
|
page read and write
|
||
13C88000
|
direct allocation
|
page read and write
|
||
13CE6000
|
direct allocation
|
page read and write
|
||
13D60000
|
direct allocation
|
page read and write
|
||
EA2000
|
heap
|
page read and write
|
||
9C000
|
stack
|
page read and write
|
||
13C3E000
|
direct allocation
|
page read and write
|
||
13C0C000
|
direct allocation
|
page read and write
|
||
13CF6000
|
direct allocation
|
page read and write
|
||
33DFF000
|
stack
|
page read and write
|
||
13CA6000
|
direct allocation
|
page read and write
|
||
FDF000
|
stack
|
page read and write
|
||
13C9C000
|
direct allocation
|
page read and write
|
||
F0A000
|
heap
|
page read and write
|
||
E02000
|
heap
|
page read and write
|
||
13CEC000
|
direct allocation
|
page read and write
|
||
3423F000
|
stack
|
page read and write
|
||
13C3C000
|
direct allocation
|
page read and write
|
||
C8E000
|
unkown
|
page execute and read and write
|
||
DFA000
|
heap
|
page read and write
|
||
13B0F000
|
stack
|
page read and write
|
||
3442E000
|
stack
|
page read and write
|
||
13C19000
|
direct allocation
|
page read and write
|
||
DFD000
|
heap
|
page read and write
|
||
9C000
|
stack
|
page read and write
|
||
13CE0000
|
direct allocation
|
page read and write
|
||
DEA000
|
heap
|
page read and write
|
||
13C24000
|
direct allocation
|
page read and write
|
||
73D0D000
|
unkown
|
page read and write
|
||
13C88000
|
direct allocation
|
page read and write
|
||
13CAE000
|
direct allocation
|
page read and write
|
||
D97000
|
heap
|
page read and write
|
||
13CE4000
|
direct allocation
|
page read and write
|
||
C26000
|
unkown
|
page execute and read and write
|
||
ED9000
|
heap
|
page read and write
|
||
13CAC000
|
direct allocation
|
page read and write
|
||
13C57000
|
direct allocation
|
page read and write
|
||
3433F000
|
stack
|
page read and write
|
||
35EB000
|
direct allocation
|
page execute and read and write
|
||
DDE000
|
stack
|
page read and write
|
||
345C1000
|
heap
|
page read and write
|
||
13C1E000
|
direct allocation
|
page read and write
|
||
13C02000
|
direct allocation
|
page read and write
|
||
13CAA000
|
direct allocation
|
page read and write
|
||
DA0000
|
heap
|
page read and write
|
||
DC8000
|
heap
|
page read and write
|
||
34710000
|
heap
|
page read and write
|
||
13C20000
|
direct allocation
|
page read and write
|
||
101E000
|
stack
|
page read and write
|
||
D70000
|
heap
|
page read and write
|
||
2B4E000
|
stack
|
page read and write
|
||
13D28000
|
direct allocation
|
page read and write
|
||
13C40000
|
direct allocation
|
page read and write
|
||
13C16000
|
direct allocation
|
page read and write
|
||
346C0000
|
trusted library allocation
|
page read and write
|
||
13C2B000
|
direct allocation
|
page read and write
|
||
13C36000
|
direct allocation
|
page read and write
|
||
13C02000
|
direct allocation
|
page read and write
|
||
C26000
|
unkown
|
page execute and read and write
|
||
13C90000
|
direct allocation
|
page read and write
|
||
33CFF000
|
stack
|
page read and write
|
||
13D48000
|
direct allocation
|
page read and write
|
||
33CFF000
|
stack
|
page read and write
|
||
13C7E000
|
direct allocation
|
page read and write
|
||
13D5E000
|
direct allocation
|
page read and write
|
||
ED8000
|
heap
|
page read and write
|
||
13C86000
|
direct allocation
|
page read and write
|
||
96C000
|
unkown
|
page readonly
|
||
13C1E000
|
direct allocation
|
page read and write
|
||
13C0A000
|
direct allocation
|
page read and write
|
||
13C65000
|
direct allocation
|
page read and write
|
||
13D32000
|
direct allocation
|
page read and write
|
||
13CDC000
|
direct allocation
|
page read and write
|
||
13C80000
|
direct allocation
|
page read and write
|
||
13C86000
|
direct allocation
|
page read and write
|
||
37F7000
|
direct allocation
|
page read and write
|
||
13D2A000
|
direct allocation
|
page read and write
|
||
28C0000
|
direct allocation
|
page read and write
|
||
73D0F000
|
unkown
|
page readonly
|
||
13CF4000
|
direct allocation
|
page read and write
|
||
13C5A000
|
direct allocation
|
page read and write
|
||
13CC2000
|
direct allocation
|
page read and write
|
||
34FB000
|
direct allocation
|
page execute and read and write
|
||
13C54000
|
direct allocation
|
page read and write
|
||
13C7C000
|
direct allocation
|
page read and write
|
||
13C2B000
|
direct allocation
|
page read and write
|
||
13CE2000
|
direct allocation
|
page read and write
|
||
13CB0000
|
direct allocation
|
page read and write
|
||
DFE000
|
heap
|
page read and write
|
||
2A8F000
|
stack
|
page read and write
|
||
13CF2000
|
direct allocation
|
page read and write
|
||
2B60000
|
heap
|
page read and write
|
||
3740000
|
direct allocation
|
page read and write
|
||
3F25000
|
direct allocation
|
page read and write
|
||
DFD000
|
heap
|
page read and write
|
||
33EFF000
|
stack
|
page read and write
|
||
2ACE000
|
stack
|
page read and write
|
||
C29000
|
unkown
|
page execute and read and write
|
||
41D000
|
unkown
|
page execute read
|
||
EDE000
|
stack
|
page read and write
|
||
2900000
|
direct allocation
|
page read and write
|
||
EAF000
|
heap
|
page read and write
|
||
13B54000
|
direct allocation
|
page read and write
|
||
DD3000
|
heap
|
page read and write
|
||
13CF2000
|
direct allocation
|
page read and write
|
||
13B24000
|
direct allocation
|
page read and write
|
||
13C38000
|
direct allocation
|
page read and write
|
||
13CF8000
|
direct allocation
|
page read and write
|
||
13CF4000
|
direct allocation
|
page read and write
|
||
13C24000
|
direct allocation
|
page read and write
|
||
13C38000
|
direct allocation
|
page read and write
|
||
73D0F000
|
unkown
|
page readonly
|
||
420000
|
unkown
|
page write copy
|
||
13C5E000
|
direct allocation
|
page read and write
|
||
73D06000
|
unkown
|
page readonly
|
||
13C08000
|
direct allocation
|
page read and write
|
||
EDA000
|
heap
|
page read and write
|
||
2970000
|
heap
|
page read and write
|
||
13B9E000
|
stack
|
page read and write
|
||
346AE000
|
stack
|
page read and write
|
||
3706000
|
direct allocation
|
page read and write
|
||
13CCA000
|
direct allocation
|
page read and write
|
||
E7A000
|
heap
|
page read and write
|
||
343EF000
|
stack
|
page read and write
|
||
13CB2000
|
direct allocation
|
page read and write
|
||
34A20000
|
heap
|
page read and write
|
||
13D6A000
|
direct allocation
|
page read and write
|
||
73D0D000
|
unkown
|
page read and write
|
||
13A1F000
|
stack
|
page read and write
|
||
C8B000
|
unkown
|
page execute and read and write
|
||
13C7E000
|
direct allocation
|
page read and write
|
||
28D2000
|
direct allocation
|
page read and write
|
||
3452F000
|
stack
|
page read and write
|
||
ED6000
|
heap
|
page read and write
|
||
13CD2000
|
direct allocation
|
page read and write
|
||
13BCE000
|
stack
|
page read and write
|
||
13C6D000
|
direct allocation
|
page read and write
|
||
13D1C000
|
direct allocation
|
page read and write
|
||
96C000
|
unkown
|
page readonly
|
||
E9F000
|
heap
|
page read and write
|
||
E60000
|
direct allocation
|
page read and write
|
||
13C3A000
|
direct allocation
|
page read and write
|
||
73CF0000
|
unkown
|
page readonly
|
||
13C31000
|
direct allocation
|
page read and write
|
||
F10000
|
heap
|
page read and write
|
||
13C9A000
|
direct allocation
|
page read and write
|
||
3799000
|
direct allocation
|
page execute and read and write
|
||
C7C000
|
unkown
|
page execute and read and write
|
||
28CA000
|
direct allocation
|
page read and write
|
||
DCD000
|
heap
|
page read and write
|
||
13C94000
|
direct allocation
|
page read and write
|
||
73CF1000
|
unkown
|
page execute read
|
||
E2A000
|
direct allocation
|
page read and write
|
||
3487F000
|
stack
|
page read and write
|
||
13C68000
|
direct allocation
|
page read and write
|
||
13D6E000
|
direct allocation
|
page read and write
|
||
13C3E000
|
direct allocation
|
page read and write
|
||
370C000
|
direct allocation
|
page read and write
|
||
3456E000
|
stack
|
page read and write
|
||
13C18000
|
direct allocation
|
page read and write
|
||
13CCA000
|
direct allocation
|
page read and write
|
||
13D14000
|
direct allocation
|
page read and write
|
||
33DFE000
|
stack
|
page read and write
|
||
13CC0000
|
direct allocation
|
page read and write
|
||
13C78000
|
direct allocation
|
page read and write
|
||
13C6E000
|
direct allocation
|
page read and write
|
||
C8E000
|
unkown
|
page execute and read and write
|
||
A7C000
|
unkown
|
page execute and read and write
|
||
13C4E000
|
direct allocation
|
page read and write
|
||
116F000
|
stack
|
page read and write
|
||
DC5000
|
heap
|
page read and write
|
||
13C68000
|
direct allocation
|
page read and write
|
||
13C3A000
|
direct allocation
|
page read and write
|
||
13C0E000
|
direct allocation
|
page read and write
|
||
13C10000
|
direct allocation
|
page read and write
|
||
13D12000
|
direct allocation
|
page read and write
|
||
2F70000
|
direct allocation
|
page execute and read and write
|
||
DEA000
|
heap
|
page read and write
|
||
2960000
|
heap
|
page read and write
|
||
13C9E000
|
direct allocation
|
page read and write
|
||
13C10000
|
direct allocation
|
page read and write
|
||
13CAC000
|
direct allocation
|
page read and write
|
||
3E6A000
|
direct allocation
|
page read and write
|
||
3477D000
|
stack
|
page read and write
|
||
13D36000
|
direct allocation
|
page read and write
|
||
E9F000
|
heap
|
page read and write
|
||
13CEC000
|
direct allocation
|
page read and write
|
||
E1E000
|
stack
|
page read and write
|
||
13C06000
|
direct allocation
|
page read and write
|
||
3F28000
|
direct allocation
|
page read and write
|
||
3700000
|
direct allocation
|
page read and write
|
||
DD3000
|
heap
|
page read and write
|
||
E20000
|
direct allocation
|
page read and write
|
||
73CF1000
|
unkown
|
page execute read
|
||
13D64000
|
direct allocation
|
page read and write
|
||
13C5C000
|
direct allocation
|
page read and write
|
||
2B7B000
|
heap
|
page execute and read and write
|
||
13D18000
|
direct allocation
|
page read and write
|
||
F12000
|
heap
|
page read and write
|
||
401000
|
unkown
|
page execute read
|
||
13C14000
|
direct allocation
|
page read and write
|
||
295D000
|
stack
|
page read and write
|
||
13C52000
|
direct allocation
|
page read and write
|
||
348B0000
|
trusted library allocation
|
page read and write
|
||
13C8E000
|
direct allocation
|
page read and write
|
||
13C16000
|
direct allocation
|
page read and write
|
||
13CC6000
|
direct allocation
|
page read and write
|
||
346C0000
|
direct allocation
|
page read and write
|
||
13C74000
|
direct allocation
|
page read and write
|
||
EEA000
|
heap
|
page read and write
|
||
F0A000
|
heap
|
page read and write
|
||
13D4A000
|
direct allocation
|
page read and write
|
||
295E000
|
stack
|
page read and write
|
||
DFD000
|
heap
|
page read and write
|
||
13C42000
|
direct allocation
|
page read and write
|
||
EDF000
|
heap
|
page read and write
|
||
13C00000
|
direct allocation
|
page read and write
|
||
13CCE000
|
direct allocation
|
page read and write
|
||
345C0000
|
heap
|
page read and write
|
||
3437E000
|
stack
|
page read and write
|
||
13CE2000
|
direct allocation
|
page read and write
|
||
13D66000
|
direct allocation
|
page read and write
|
||
347B0000
|
heap
|
page read and write
|
||
344BE000
|
stack
|
page read and write
|
||
EAB000
|
heap
|
page read and write
|
||
13C90000
|
direct allocation
|
page read and write
|
||
DA8000
|
heap
|
page read and write
|
||
2A8C000
|
heap
|
page execute and read and write
|
||
13B4E000
|
stack
|
page read and write
|
||
29BE000
|
stack
|
page read and write
|
||
13CD8000
|
direct allocation
|
page read and write
|
||
EDF000
|
heap
|
page read and write
|
||
346C0000
|
trusted library allocation
|
page read and write
|
||
13C4C000
|
direct allocation
|
page read and write
|
||
106F000
|
stack
|
page read and write
|
||
13C26000
|
direct allocation
|
page read and write
|
||
13C12000
|
direct allocation
|
page read and write
|
||
13C04000
|
direct allocation
|
page read and write
|
||
13D56000
|
direct allocation
|
page read and write
|
||
EC2000
|
heap
|
page read and write
|
||
13D34000
|
direct allocation
|
page read and write
|
||
13D0E000
|
direct allocation
|
page read and write
|
||
19C000
|
stack
|
page read and write
|
||
3830000
|
direct allocation
|
page read and write
|
||
13CEE000
|
direct allocation
|
page read and write
|
||
E7E000
|
heap
|
page read and write
|
There are 369 hidden memdumps, click here to show them.