Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
#U5b89#U88c5#U52a9#U624b_2.0.6.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
initial sample
|
||
C:\Program Files (x86)\Windows NT\hrsw.vbc
|
PE32 executable (DLL) (console) Intel 80386, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\Windows NT\is-0F5J3.tmp
|
PE32+ executable (console) x86-64 (stripped to external PDB), for MS Windows
|
dropped
|
||
C:\Program Files (x86)\Windows NT\tProtect.dll
|
PE32+ executable (native) x86-64, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\Windows NT\trash (copy)
|
PE32+ executable (console) x86-64 (stripped to external PDB), for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\is-6SCB4.tmp\#U5b89#U88c5#U52a9#U624b_2.0.6.tmp
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\is-R46SO.tmp\update.vac
|
PE32 executable (DLL) (console) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\is-U5HAP.tmp\#U5b89#U88c5#U52a9#U624b_2.0.6.tmp
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\is-V2E3L.tmp\update.vac
|
PE32 executable (DLL) (console) Intel 80386, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\Windows NT\7zr.exe
|
PE32 executable (console) Intel 80386, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\Windows NT\file.bin (copy)
|
data
|
dropped
|
||
C:\Program Files (x86)\Windows NT\is-QJ471.tmp
|
data
|
dropped
|
||
C:\Program Files (x86)\Windows NT\locale.bin
|
data
|
dropped
|
||
C:\Program Files (x86)\Windows NT\locale.dat
|
7-zip archive data, version 0.4
|
dropped
|
||
C:\Program Files (x86)\Windows NT\locale2.bin
|
data
|
dropped
|
||
C:\Program Files (x86)\Windows NT\locale2.dat
|
7-zip archive data, version 0.4
|
dropped
|
||
C:\Program Files (x86)\Windows NT\locale3.bin
|
data
|
dropped
|
||
C:\Program Files (x86)\Windows NT\locale3.dat
|
7-zip archive data, version 0.4
|
dropped
|
||
C:\Program Files (x86)\Windows NT\locale4.bin
|
data
|
dropped
|
||
C:\Program Files (x86)\Windows NT\locale4.dat
|
7-zip archive data, version 0.4
|
dropped
|
||
C:\Program Files (x86)\Windows NT\locale7.bin
|
data
|
dropped
|
||
C:\Program Files (x86)\Windows NT\locale7.dat
|
7-zip archive data, version 0.4
|
dropped
|
||
C:\Program Files (x86)\Windows NT\res.dat
|
7-zip archive data, version 0.4
|
dropped
|
||
C:\Program Files (x86)\Windows NT\task.xml
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_3trkrlnv.vwo.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_4gnolrdq.yk0.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_aqv2isbv.5we.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_j32rbbna.tb4.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\is-R46SO.tmp\_isetup\_setup64.tmp
|
PE32+ executable (console) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\is-V2E3L.tmp\_isetup\_setup64.tmp
|
PE32+ executable (console) x86-64, for MS Windows
|
dropped
|
||
\Device\ConDrv
|
ASCII text, with CRLF, CR line terminators
|
dropped
|
There are 22 hidden files, click here to show them.
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\#U5b89#U88c5#U52a9#U624b_2.0.6.exe
|
"C:\Users\user\Desktop\#U5b89#U88c5#U52a9#U624b_2.0.6.exe"
|
||
C:\Users\user\AppData\Local\Temp\is-U5HAP.tmp\#U5b89#U88c5#U52a9#U624b_2.0.6.tmp
|
"C:\Users\user\AppData\Local\Temp\is-U5HAP.tmp\#U5b89#U88c5#U52a9#U624b_2.0.6.tmp" /SL5="$20432,4753239,845824,C:\Users\user\Desktop\#U5b89#U88c5#U52a9#U624b_2.0.6.exe"
|
||
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
|
"powershell.exe" -Command "Add-MpPreference -ExclusionPath 'C:\'"
|
||
C:\Users\user\Desktop\#U5b89#U88c5#U52a9#U624b_2.0.6.exe
|
"C:\Users\user\Desktop\#U5b89#U88c5#U52a9#U624b_2.0.6.exe" /VERYSILENT
|
||
C:\Users\user\AppData\Local\Temp\is-6SCB4.tmp\#U5b89#U88c5#U52a9#U624b_2.0.6.tmp
|
"C:\Users\user\AppData\Local\Temp\is-6SCB4.tmp\#U5b89#U88c5#U52a9#U624b_2.0.6.tmp" /SL5="$20442,4753239,845824,C:\Users\user\Desktop\#U5b89#U88c5#U52a9#U624b_2.0.6.exe"
/VERYSILENT
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\cmd.exe
|
cmd /c start sc create CleverSoar displayname= CleverSoar binPath= "C:\Program Files (x86)\Windows NT\tProtect.dll" type=
kernel start= auto
|
||
C:\Windows\System32\sc.exe
|
sc create CleverSoar displayname= CleverSoar binPath= "C:\Program Files (x86)\Windows NT\tProtect.dll" type= kernel start=
auto
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Program Files (x86)\Windows NT\7zr.exe
|
7zr.exe x -y res.dat -pad8dtyw9eyfd9aslyd9iald
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Program Files (x86)\Windows NT\7zr.exe
|
7zr.exe x -y locale3.dat -pasfasdf79yf9layslofs
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\cmd.exe
|
cmd /c start sc start CleverSoar
|
||
C:\Windows\System32\sc.exe
|
sc start CleverSoar
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\cmd.exe
|
cmd /c start sc start CleverSoar
|
||
C:\Windows\System32\sc.exe
|
sc start CleverSoar
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\cmd.exe
|
cmd /c start sc start CleverSoar
|
||
C:\Windows\System32\sc.exe
|
sc start CleverSoar
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\wbem\WmiPrvSE.exe
|
C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding
|
||
C:\Windows\System32\cmd.exe
|
cmd /c start sc start CleverSoar
|
||
C:\Windows\System32\sc.exe
|
sc start CleverSoar
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\cmd.exe
|
cmd /c start sc start CleverSoar
|
||
C:\Windows\System32\sc.exe
|
sc start CleverSoar
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\cmd.exe
|
cmd /c start sc start CleverSoar
|
||
C:\Windows\System32\sc.exe
|
sc start CleverSoar
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\cmd.exe
|
cmd /c start sc start CleverSoar
|
||
C:\Windows\System32\sc.exe
|
sc start CleverSoar
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\cmd.exe
|
cmd /c start sc start CleverSoar
|
||
C:\Windows\System32\sc.exe
|
sc start CleverSoar
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\cmd.exe
|
cmd /c start sc start CleverSoar
|
||
C:\Windows\System32\sc.exe
|
sc start CleverSoar
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\cmd.exe
|
cmd /c start sc start CleverSoar
|
||
C:\Windows\System32\sc.exe
|
sc start CleverSoar
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\cmd.exe
|
cmd /c start sc start CleverSoar
|
||
C:\Windows\System32\sc.exe
|
sc start CleverSoar
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\cmd.exe
|
cmd /c start sc start CleverSoar
|
||
C:\Windows\System32\sc.exe
|
sc start CleverSoar
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\cmd.exe
|
cmd /c start sc start CleverSoar
|
||
C:\Windows\System32\sc.exe
|
sc start CleverSoar
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\cmd.exe
|
cmd /c start sc start CleverSoar
|
||
C:\Windows\System32\sc.exe
|
sc start CleverSoar
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\cmd.exe
|
cmd /c start sc start CleverSoar
|
||
C:\Windows\System32\sc.exe
|
sc start CleverSoar
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\cmd.exe
|
cmd /c start sc start CleverSoar
|
||
C:\Windows\System32\sc.exe
|
sc start CleverSoar
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\cmd.exe
|
cmd /c start sc start CleverSoar
|
||
C:\Windows\System32\sc.exe
|
sc start CleverSoar
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\cmd.exe
|
cmd /c start sc start CleverSoar
|
||
C:\Windows\System32\sc.exe
|
sc start CleverSoar
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\cmd.exe
|
cmd /c start sc start CleverSoar
|
||
C:\Windows\System32\sc.exe
|
sc start CleverSoar
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\cmd.exe
|
cmd /c start sc start CleverSoar
|
||
C:\Windows\System32\sc.exe
|
sc start CleverSoar
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\cmd.exe
|
cmd /c start sc start CleverSoar
|
||
C:\Windows\System32\sc.exe
|
sc start CleverSoar
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\cmd.exe
|
cmd /c start sc start CleverSoar
|
||
C:\Windows\System32\sc.exe
|
sc start CleverSoar
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\cmd.exe
|
cmd /c start sc start CleverSoar
|
||
C:\Windows\System32\sc.exe
|
sc start CleverSoar
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\cmd.exe
|
cmd /c start sc start CleverSoar
|
||
C:\Windows\System32\sc.exe
|
sc start CleverSoar
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\cmd.exe
|
cmd /c start sc start CleverSoar
|
||
C:\Windows\System32\sc.exe
|
sc start CleverSoar
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\cmd.exe
|
cmd /c start sc start CleverSoar
|
||
C:\Windows\System32\sc.exe
|
sc start CleverSoar
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\cmd.exe
|
cmd /c start sc start CleverSoar
|
||
C:\Windows\System32\sc.exe
|
sc start CleverSoar
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\cmd.exe
|
cmd /c start sc start CleverSoar
|
||
C:\Windows\System32\sc.exe
|
sc start CleverSoar
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\cmd.exe
|
cmd /c start sc start CleverSoar
|
||
C:\Windows\System32\sc.exe
|
sc start CleverSoar
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\cmd.exe
|
cmd /c start sc start CleverSoar
|
||
C:\Windows\System32\sc.exe
|
sc start CleverSoar
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\cmd.exe
|
cmd /c start sc start CleverSoar
|
||
C:\Windows\System32\sc.exe
|
sc start CleverSoar
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\cmd.exe
|
cmd /c start sc start CleverSoar
|
||
C:\Windows\System32\Conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
There are 99 hidden processes, click here to show them.
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
https://aria2.github.io/Usage:
|
unknown
|
||
https://jrsoftware.org/ishelp/index.php?topic=setupcmdlineSetupU
|
unknown
|
||
https://github.com/aria2/aria2/issuesReport
|
unknown
|
||
http://www.metalinker.org/
|
unknown
|
||
https://www.remobjects.com/ps
|
unknown
|
||
https://aria2.github.io/
|
unknown
|
||
https://github.com/aria2/aria2/issues
|
unknown
|
||
https://www.innosetup.com/
|
unknown
|
||
http://www.metalinker.org/basic_string::_M_construct
|
unknown
|
Registry
Path
|
Value
|
Malicious
|
|
---|---|---|---|
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
|
Owner
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
|
SessionHash
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
|
Sequence
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
|
Owner
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
|
SessionHash
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
|
Sequence
|
||
HKEY_CURRENT_USER\SOFTWARE\Magisk
|
ring3_username
|
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
2C4EE6B8000
|
heap
|
page read and write
|
||
32D0000
|
heap
|
page read and write
|
||
2D9E000
|
direct allocation
|
page read and write
|
||
A75000
|
unkown
|
page read and write
|
||
580000
|
unkown
|
page readonly
|
||
DEF000
|
direct allocation
|
page read and write
|
||
AF0000
|
unkown
|
page readonly
|
||
BADA27F000
|
stack
|
page read and write
|
||
13E0000
|
heap
|
page read and write
|
||
E21000
|
direct allocation
|
page read and write
|
||
1195000
|
unkown
|
page read and write
|
||
15B9000
|
direct allocation
|
page read and write
|
||
2E39000
|
heap
|
page read and write
|
||
9172DFE000
|
stack
|
page read and write
|
||
2F9B5515000
|
heap
|
page read and write
|
||
6CA48000
|
unkown
|
page readonly
|
||
16AC000
|
direct allocation
|
page read and write
|
||
15A3000
|
direct allocation
|
page read and write
|
||
2122B925000
|
heap
|
page read and write
|
||
21FCD465000
|
heap
|
page read and write
|
||
AE0987C000
|
stack
|
page read and write
|
||
273E3E70000
|
heap
|
page read and write
|
||
2B513370000
|
heap
|
page read and write
|
||
122E000
|
stack
|
page read and write
|
||
302C000
|
direct allocation
|
page read and write
|
||
A70000
|
unkown
|
page read and write
|
||
2243E2B0000
|
heap
|
page read and write
|
||
18683385000
|
heap
|
page read and write
|
||
E0C000
|
direct allocation
|
page read and write
|
||
2E19000
|
heap
|
page read and write
|
||
28E8CD88000
|
heap
|
page read and write
|
||
50FC47C000
|
stack
|
page read and write
|
||
20571EA0000
|
heap
|
page read and write
|
||
1540000
|
heap
|
page read and write
|
||
2A02EF00000
|
heap
|
page read and write
|
||
9CAF8BD000
|
stack
|
page read and write
|
||
2F9B5510000
|
heap
|
page read and write
|
||
2DAC000
|
direct allocation
|
page read and write
|
||
15C7000
|
direct allocation
|
page read and write
|
||
2DFD000
|
direct allocation
|
page read and write
|
||
4E77000
|
trusted library allocation
|
page read and write
|
||
1DEB2BE0000
|
heap
|
page read and write
|
||
301D000
|
direct allocation
|
page read and write
|
||
179FFBC0000
|
heap
|
page read and write
|
||
1238000
|
heap
|
page read and write
|
||
131D000
|
stack
|
page read and write
|
||
21FCD420000
|
heap
|
page read and write
|
||
4D5D000
|
stack
|
page read and write
|
||
18D67A10000
|
heap
|
page read and write
|
||
118E000
|
unkown
|
page write copy
|
||
D7F000
|
direct allocation
|
page read and write
|
||
18D67B98000
|
heap
|
page read and write
|
||
42AE000
|
direct allocation
|
page read and write
|
||
73AFEFF000
|
stack
|
page read and write
|
||
DA4000
|
direct allocation
|
page read and write
|
||
1190000
|
unkown
|
page write copy
|
||
16B3000
|
direct allocation
|
page read and write
|
||
1250000
|
heap
|
page read and write
|
||
152F000
|
stack
|
page read and write
|
||
2FF2000
|
direct allocation
|
page read and write
|
||
4E60000
|
trusted library allocation
|
page read and write
|
||
2FE3000
|
direct allocation
|
page read and write
|
||
D30000
|
direct allocation
|
page read and write
|
||
3041000
|
direct allocation
|
page read and write
|
||
1B347188000
|
heap
|
page read and write
|
||
25A54A20000
|
heap
|
page read and write
|
||
BB2000
|
unkown
|
page write copy
|
||
4C21000
|
heap
|
page read and write
|
||
D4C000
|
direct allocation
|
page read and write
|
||
4290000
|
direct allocation
|
page read and write
|
||
D78000
|
stack
|
page read and write
|
||
1D00EA90000
|
heap
|
page read and write
|
||
14A0000
|
heap
|
page read and write
|
||
EAD000
|
stack
|
page read and write
|
||
2FAB000
|
direct allocation
|
page read and write
|
||
1260000
|
heap
|
page read and write
|
||
2FB6000
|
direct allocation
|
page read and write
|
||
4E62000
|
trusted library allocation
|
page read and write
|
||
1E874CE0000
|
heap
|
page read and write
|
||
2FC4000
|
direct allocation
|
page read and write
|
||
B9C000
|
unkown
|
page readonly
|
||
1CF75410000
|
heap
|
page read and write
|
||
1BE99260000
|
heap
|
page read and write
|
||
34D0000
|
heap
|
page read and write
|
||
1195000
|
heap
|
page read and write
|
||
3CD0000
|
direct allocation
|
page read and write
|
||
25A54A00000
|
heap
|
page read and write
|
||
6C8A0000
|
unkown
|
page readonly
|
||
CE4827E000
|
stack
|
page read and write
|
||
1BE991C0000
|
heap
|
page read and write
|
||
163D000
|
direct allocation
|
page read and write
|
||
1195000
|
unkown
|
page write copy
|
||
FF005EE000
|
stack
|
page read and write
|
||
7C1000
|
unkown
|
page execute read
|
||
2C4EE640000
|
heap
|
page read and write
|
||
4289000
|
direct allocation
|
page read and write
|
||
F0771CE000
|
stack
|
page read and write
|
||
1010000
|
heap
|
page read and write
|
||
25A54A80000
|
heap
|
page read and write
|
||
1570000
|
heap
|
page read and write
|
||
20571C70000
|
heap
|
page read and write
|
||
2F40000
|
direct allocation
|
page read and write
|
||
2E88000
|
direct allocation
|
page read and write
|
||
156E000
|
stack
|
page read and write
|
||
40B0000
|
direct allocation
|
page read and write
|
||
295BDA10000
|
heap
|
page read and write
|
||
2E16000
|
heap
|
page read and write
|
||
BBB000
|
unkown
|
page readonly
|
||
2DB4000
|
direct allocation
|
page read and write
|
||
D96000
|
direct allocation
|
page read and write
|
||
126D000
|
heap
|
page read and write
|
||
3D83000
|
direct allocation
|
page read and write
|
||
2F99000
|
direct allocation
|
page read and write
|
||
27E8DB90000
|
heap
|
page read and write
|
||
E06810D000
|
stack
|
page read and write
|
||
2314FEB5000
|
heap
|
page read and write
|
||
2C56FA00000
|
heap
|
page read and write
|
||
13C0000
|
heap
|
page read and write
|
||
4D0C000
|
stack
|
page read and write
|
||
16D9000
|
heap
|
page read and write
|
||
BB2000
|
unkown
|
page read and write
|
||
3A90000
|
direct allocation
|
page read and write
|
||
D45000
|
direct allocation
|
page read and write
|
||
28E8CBE0000
|
heap
|
page read and write
|
||
632000
|
unkown
|
page read and write
|
||
13E6000
|
heap
|
page read and write
|
||
1E874CC0000
|
heap
|
page read and write
|
||
AE7000
|
unkown
|
page readonly
|
||
2E29000
|
heap
|
page read and write
|
||
EEB0A7E000
|
stack
|
page read and write
|
||
2F72000
|
direct allocation
|
page read and write
|
||
5641CFE000
|
stack
|
page read and write
|
||
15B4000
|
heap
|
page read and write
|
||
2300A6C5000
|
heap
|
page read and write
|
||
1F112E10000
|
heap
|
page read and write
|
||
2DDF000
|
direct allocation
|
page read and write
|
||
637000
|
unkown
|
page readonly
|
||
2FAE000
|
direct allocation
|
page read and write
|
||
223A8400000
|
heap
|
page read and write
|
||
DCB7CFF000
|
stack
|
page read and write
|
||
2300A780000
|
heap
|
page read and write
|
||
16BA000
|
direct allocation
|
page read and write
|
||
1619000
|
direct allocation
|
page read and write
|
||
13E7000
|
heap
|
page read and write
|
||
1D00E970000
|
heap
|
page read and write
|
||
3C10000
|
direct allocation
|
page read and write
|
||
2C56FD25000
|
heap
|
page read and write
|
||
28FF000
|
heap
|
page read and write
|
||
1CF753F0000
|
heap
|
page read and write
|
||
1578000
|
heap
|
page read and write
|
||
105E000
|
stack
|
page read and write
|
||
2C56FBD0000
|
heap
|
page read and write
|
||
BAD9F2C000
|
stack
|
page read and write
|
||
146E000
|
stack
|
page read and write
|
||
4E87000
|
trusted library allocation
|
page read and write
|
||
1688000
|
direct allocation
|
page read and write
|
||
28E8CCC0000
|
heap
|
page read and write
|
||
1210000
|
heap
|
page read and write
|
||
2F4E000
|
direct allocation
|
page read and write
|
||
D62000
|
direct allocation
|
page read and write
|
||
2712FE000
|
stack
|
page read and write
|
||
15EB000
|
direct allocation
|
page read and write
|
||
14C0000
|
direct allocation
|
page execute and read and write
|
||
78C000
|
stack
|
page read and write
|
||
E13000
|
direct allocation
|
page read and write
|
||
1590000
|
direct allocation
|
page read and write
|
||
50FC57E000
|
stack
|
page read and write
|
||
1572FA90000
|
heap
|
page read and write
|
||
179FFC98000
|
heap
|
page read and write
|
||
28C0000
|
heap
|
page read and write
|
||
3B10000
|
direct allocation
|
page read and write
|
||
15E4000
|
direct allocation
|
page read and write
|
||
295BDE00000
|
heap
|
page read and write
|
||
223A8865000
|
heap
|
page read and write
|
||
EC3737E000
|
stack
|
page read and write
|
||
AF0000
|
unkown
|
page readonly
|
||
5641DFE000
|
stack
|
page read and write
|
||
3C50000
|
direct allocation
|
page read and write
|
||
1F112FC0000
|
heap
|
page read and write
|
||
2300A690000
|
heap
|
page read and write
|
||
2E64000
|
direct allocation
|
page read and write
|
||
11A7000
|
unkown
|
page readonly
|
||
15F2000
|
direct allocation
|
page read and write
|
||
1B347130000
|
heap
|
page read and write
|
||
335EE7F000
|
stack
|
page read and write
|
||
3F4E000
|
stack
|
page read and write
|
||
BD24B7E000
|
stack
|
page read and write
|
||
E06847E000
|
stack
|
page read and write
|
||
11E0000
|
heap
|
page read and write
|
||
AFF000
|
stack
|
page read and write
|
||
1B300820000
|
heap
|
page read and write
|
||
1190000
|
unkown
|
page read and write
|
||
6CA58000
|
unkown
|
page write copy
|
||
564199D000
|
stack
|
page read and write
|
||
1E063B90000
|
heap
|
page read and write
|
||
137E000
|
stack
|
page read and write
|
||
6D4717F000
|
stack
|
page read and write
|
||
16D0000
|
heap
|
page read and write
|
||
CEF000
|
stack
|
page read and write
|
||
3F8000
|
heap
|
page read and write
|
||
BBBDBFF000
|
stack
|
page read and write
|
||
1BE991E0000
|
heap
|
page read and write
|
||
29CD000
|
heap
|
page read and write
|
||
4E87000
|
trusted library allocation
|
page read and write
|
||
2FA0000
|
direct allocation
|
page read and write
|
||
D5A000
|
heap
|
page read and write
|
||
404E000
|
stack
|
page read and write
|
||
18683040000
|
heap
|
page read and write
|
||
179FFF10000
|
heap
|
page read and write
|
||
42E2000
|
direct allocation
|
page read and write
|
||
20571D50000
|
heap
|
page read and write
|
||
2C56FBF0000
|
heap
|
page read and write
|
||
162E000
|
direct allocation
|
page read and write
|
||
129F000
|
heap
|
page read and write
|
||
4B8E000
|
stack
|
page read and write
|
||
D69000
|
direct allocation
|
page read and write
|
||
2F55000
|
direct allocation
|
page read and write
|
||
3390000
|
direct allocation
|
page read and write
|
||
2F78000
|
direct allocation
|
page read and write
|
||
2E39000
|
direct allocation
|
page read and write
|
||
2314FD90000
|
heap
|
page read and write
|
||
295BDBB8000
|
heap
|
page read and write
|
||
D3E000
|
direct allocation
|
page read and write
|
||
54E000
|
stack
|
page read and write
|
||
1BE99268000
|
heap
|
page read and write
|
||
4CCF000
|
stack
|
page read and write
|
||
2122B660000
|
heap
|
page read and write
|
||
4E60000
|
trusted library allocation
|
page read and write
|
||
D0E000
|
stack
|
page read and write
|
||
20571E70000
|
heap
|
page read and write
|
||
1D239D60000
|
heap
|
page read and write
|
||
303A000
|
direct allocation
|
page read and write
|
||
A6E000
|
unkown
|
page write copy
|
||
1272000
|
heap
|
page read and write
|
||
EB0000
|
heap
|
page read and write
|
||
DBA000
|
direct allocation
|
page read and write
|
||
1572FAD0000
|
heap
|
page read and write
|
||
27E8DD90000
|
heap
|
page read and write
|
||
2D69000
|
direct allocation
|
page read and write
|
||
2FF0000
|
direct allocation
|
page read and write
|
||
1E063850000
|
heap
|
page read and write
|
||
2FEB000
|
direct allocation
|
page read and write
|
||
32F0000
|
heap
|
page read and write
|
||
1CF75470000
|
heap
|
page read and write
|
||
6D4707C000
|
stack
|
page read and write
|
||
3008000
|
direct allocation
|
page read and write
|
||
1060000
|
heap
|
page read and write
|
||
80D39BD000
|
stack
|
page read and write
|
||
4E4218C000
|
stack
|
page read and write
|
||
18683150000
|
heap
|
page read and write
|
||
550000
|
heap
|
page read and write
|
||
AF0000
|
unkown
|
page readonly
|
||
1B300828000
|
heap
|
page read and write
|
||
1572FDE0000
|
heap
|
page read and write
|
||
2122B760000
|
heap
|
page read and write
|
||
BE0000
|
heap
|
page read and write
|
||
418C000
|
stack
|
page read and write
|
||
B9C000
|
unkown
|
page readonly
|
||
21FCD320000
|
heap
|
page read and write
|
||
119D000
|
unkown
|
page read and write
|
||
AF1000
|
unkown
|
page execute read
|
||
1090000
|
heap
|
page read and write
|
||
D6B23FE000
|
stack
|
page read and write
|
||
168F000
|
direct allocation
|
page read and write
|
||
1B347100000
|
heap
|
page read and write
|
||
CAB000
|
stack
|
page read and write
|
||
2DA5000
|
direct allocation
|
page read and write
|
||
11DF07E000
|
stack
|
page read and write
|
||
2F31000
|
direct allocation
|
page read and write
|
||
2F00000
|
heap
|
page read and write
|
||
115D000
|
unkown
|
page execute read
|
||
BBB000
|
unkown
|
page readonly
|
||
D50000
|
heap
|
page read and write
|
||
1BE990E0000
|
heap
|
page read and write
|
||
1F112DA0000
|
heap
|
page read and write
|
||
118E000
|
unkown
|
page read and write
|
||
3D60000
|
direct allocation
|
page read and write
|
||
C51CD8F000
|
stack
|
page read and write
|
||
2E16000
|
heap
|
page read and write
|
||
4BCE000
|
stack
|
page read and write
|
||
42A4000
|
direct allocation
|
page read and write
|
||
18683120000
|
heap
|
page read and write
|
||
1572FAA0000
|
heap
|
page read and write
|
||
DE0000
|
direct allocation
|
page read and write
|
||
1696000
|
direct allocation
|
page read and write
|
||
115D000
|
stack
|
page read and write
|
||
7EF3B000
|
direct allocation
|
page read and write
|
||
2E5D000
|
direct allocation
|
page read and write
|
||
9172CFD000
|
stack
|
page read and write
|
||
2E4F000
|
direct allocation
|
page read and write
|
||
1E063938000
|
heap
|
page read and write
|
||
273E3F70000
|
heap
|
page read and write
|
||
3560000
|
trusted library allocation
|
page read and write
|
||
11DED4D000
|
stack
|
page read and write
|
||
1CF75310000
|
heap
|
page read and write
|
||
1DEB2A10000
|
heap
|
page read and write
|
||
D5B000
|
direct allocation
|
page read and write
|
||
2F88000
|
direct allocation
|
page read and write
|
||
156E000
|
stack
|
page read and write
|
||
7F23A000
|
direct allocation
|
page read and write
|
||
11C0000
|
heap
|
page read and write
|
||
1D00E978000
|
heap
|
page read and write
|
||
1F112DC0000
|
heap
|
page read and write
|
||
2B513440000
|
heap
|
page read and write
|
||
CE4817F000
|
stack
|
page read and write
|
||
80D3DFE000
|
stack
|
page read and write
|
||
39C000
|
stack
|
page read and write
|
||
26F3F2C000
|
stack
|
page read and write
|
||
1654000
|
direct allocation
|
page read and write
|
||
A54857E000
|
stack
|
page read and write
|
||
4E60000
|
trusted library allocation
|
page read and write
|
||
4012000
|
heap
|
page read and write
|
||
635000
|
unkown
|
page write copy
|
||
632000
|
unkown
|
page read and write
|
||
2122B560000
|
heap
|
page read and write
|
||
1B347110000
|
heap
|
page read and write
|
||
1608000
|
direct allocation
|
page read and write
|
||
4220000
|
heap
|
page read and write
|
||
D19000
|
direct allocation
|
page read and write
|
||
1E063930000
|
heap
|
page read and write
|
||
348E000
|
stack
|
page read and write
|
||
2DD0000
|
direct allocation
|
page read and write
|
||
4320000
|
direct allocation
|
page read and write
|
||
D9D000
|
direct allocation
|
page read and write
|
||
DE8047E000
|
stack
|
page read and write
|
||
F28000
|
heap
|
page read and write
|
||
142F000
|
stack
|
page read and write
|
||
2DBB000
|
direct allocation
|
page read and write
|
||
2E32000
|
direct allocation
|
page read and write
|
||
D55000
|
heap
|
page read and write
|
||
408E000
|
direct allocation
|
page read and write
|
||
223A8410000
|
heap
|
page read and write
|
||
1240000
|
direct allocation
|
page read and write
|
||
4E7B000
|
trusted library allocation
|
page read and write
|
||
473B000
|
direct allocation
|
page read and write
|
||
BB2000
|
unkown
|
page read and write
|
||
1572FDE5000
|
heap
|
page read and write
|
||
165B000
|
direct allocation
|
page read and write
|
||
214361B0000
|
heap
|
page read and write
|
||
118B000
|
unkown
|
page execute read
|
||
3570000
|
heap
|
page read and write
|
||
1268000
|
heap
|
page read and write
|
||
DC1000
|
direct allocation
|
page read and write
|
||
2DE6000
|
direct allocation
|
page read and write
|
||
4098000
|
direct allocation
|
page read and write
|
||
3016000
|
direct allocation
|
page read and write
|
||
EEB087D000
|
stack
|
page read and write
|
||
DF6000
|
direct allocation
|
page read and write
|
||
16D5000
|
heap
|
page read and write
|
||
20571D70000
|
heap
|
page read and write
|
||
15CE000
|
direct allocation
|
page read and write
|
||
32E0000
|
heap
|
page read and write
|
||
4C1F000
|
stack
|
page read and write
|
||
21FCD400000
|
heap
|
page read and write
|
||
2B80000
|
heap
|
page read and write
|
||
2B40000
|
direct allocation
|
page read and write
|
||
9CAF9BF000
|
stack
|
page read and write
|
||
3D8D000
|
direct allocation
|
page read and write
|
||
4E0D000
|
stack
|
page read and write
|
||
3048000
|
direct allocation
|
page read and write
|
||
1D239F60000
|
heap
|
page read and write
|
||
28E8CD80000
|
heap
|
page read and write
|
||
A87000
|
unkown
|
page readonly
|
||
15C0000
|
heap
|
page read and write
|
||
2E6C000
|
direct allocation
|
page read and write
|
||
7E4097F000
|
stack
|
page read and write
|
||
1B347180000
|
heap
|
page read and write
|
||
2F9B5208000
|
heap
|
page read and write
|
||
1679000
|
direct allocation
|
page read and write
|
||
C042A7D000
|
stack
|
page read and write
|
||
1D239D87000
|
heap
|
page read and write
|
||
639000
|
unkown
|
page readonly
|
||
18683158000
|
heap
|
page read and write
|
||
1644000
|
direct allocation
|
page read and write
|
||
D8F000
|
direct allocation
|
page read and write
|
||
2FD4000
|
direct allocation
|
page read and write
|
||
223A84C0000
|
heap
|
page read and write
|
||
2F9B51A0000
|
heap
|
page read and write
|
||
13AE000
|
stack
|
page read and write
|
||
DE8037E000
|
stack
|
page read and write
|
||
75EC48C000
|
stack
|
page read and write
|
||
223A84C8000
|
heap
|
page read and write
|
||
EDF000
|
stack
|
page read and write
|
||
AD0000
|
heap
|
page read and write
|
||
27E8DBC8000
|
heap
|
page read and write
|
||
2F9B5200000
|
heap
|
page read and write
|
||
25A54A87000
|
heap
|
page read and write
|
||
28E8CCE0000
|
heap
|
page read and write
|
||
179FFF15000
|
heap
|
page read and write
|
||
28FD000
|
heap
|
page read and write
|
||
1D239D80000
|
heap
|
page read and write
|
||
BBB000
|
unkown
|
page readonly
|
||
27E8DBA0000
|
heap
|
page read and write
|
||
1E063B95000
|
heap
|
page read and write
|
||
C5498FF000
|
stack
|
page read and write
|
||
4150000
|
direct allocation
|
page read and write
|
||
127B000
|
heap
|
page read and write
|
||
BBBDAFF000
|
stack
|
page read and write
|
||
223A8860000
|
heap
|
page read and write
|
||
20571D78000
|
heap
|
page read and write
|
||
629000
|
unkown
|
page read and write
|
||
2E12000
|
heap
|
page read and write
|
||
1B300AB0000
|
heap
|
page read and write
|
||
179FFC90000
|
heap
|
page read and write
|
||
11DF17E000
|
stack
|
page read and write
|
||
DE8000
|
direct allocation
|
page read and write
|
||
F0774FE000
|
stack
|
page read and write
|
||
BBBD79D000
|
stack
|
page read and write
|
||
4D20000
|
trusted library allocation
|
page read and write
|
||
2C4EE6B0000
|
heap
|
page read and write
|
||
BF6000
|
stack
|
page read and write
|
||
1B347490000
|
heap
|
page read and write
|
||
2FE0000
|
heap
|
page read and write
|
||
1672000
|
direct allocation
|
page read and write
|
||
EE1000
|
unkown
|
page execute read
|
||
73AFBCE000
|
stack
|
page read and write
|
||
2D90000
|
direct allocation
|
page read and write
|
||
2A02EDF0000
|
heap
|
page read and write
|
||
2E7A000
|
direct allocation
|
page read and write
|
||
D70000
|
direct allocation
|
page read and write
|
||
DD0000
|
heap
|
page read and write
|
||
D86000
|
direct allocation
|
page read and write
|
||
2243E330000
|
heap
|
page read and write
|
||
214361B8000
|
heap
|
page read and write
|
||
1D00EB35000
|
heap
|
page read and write
|
||
2D97000
|
direct allocation
|
page read and write
|
||
2D88000
|
direct allocation
|
page read and write
|
||
1E874AE0000
|
heap
|
page read and write
|
||
C51CC8D000
|
stack
|
page read and write
|
||
2B5133A0000
|
heap
|
page read and write
|
||
3A10000
|
direct allocation
|
page read and write
|
||
120E000
|
stack
|
page read and write
|
||
80D3CFE000
|
stack
|
page read and write
|
||
2F9B5170000
|
heap
|
page read and write
|
||
1DEB29D0000
|
heap
|
page read and write
|
||
2D81000
|
direct allocation
|
page read and write
|
||
18D67B90000
|
heap
|
page read and write
|
||
F20000
|
heap
|
page read and write
|
||
F0770CD000
|
stack
|
page read and write
|
||
2E3A000
|
heap
|
page read and write
|
||
2F9B5180000
|
heap
|
page read and write
|
||
3024000
|
direct allocation
|
page read and write
|
||
7F0000
|
heap
|
page read and write
|
||
2C56FD20000
|
heap
|
page read and write
|
||
1E874BC8000
|
heap
|
page read and write
|
||
2BD0000
|
direct allocation
|
page read and write
|
||
136F000
|
stack
|
page read and write
|
||
629000
|
unkown
|
page read and write
|
||
1DEB29E0000
|
heap
|
page read and write
|
||
6C8A1000
|
unkown
|
page execute read
|
||
1DEB2DD0000
|
heap
|
page read and write
|
||
2FDB000
|
direct allocation
|
page read and write
|
||
1B3007E0000
|
heap
|
page read and write
|
||
D28000
|
direct allocation
|
page read and write
|
||
E40000
|
heap
|
page read and write
|
||
15C1000
|
heap
|
page read and write
|
||
BBB000
|
unkown
|
page readonly
|
||
AF0000
|
unkown
|
page readonly
|
||
26F437E000
|
stack
|
page read and write
|
||
3104000
|
heap
|
page read and write
|
||
EC3747E000
|
stack
|
page read and write
|
||
2FEA000
|
heap
|
page read and write
|
||
28E8CF85000
|
heap
|
page read and write
|
||
13B5000
|
heap
|
page read and write
|
||
2F64000
|
direct allocation
|
page read and write
|
||
25A54A50000
|
heap
|
page read and write
|
||
2E7A000
|
heap
|
page read and write
|
||
BD24A7F000
|
stack
|
page read and write
|
||
42CE000
|
direct allocation
|
page read and write
|
||
C5494AC000
|
stack
|
page read and write
|
||
AF1000
|
unkown
|
page execute read
|
||
214364F0000
|
heap
|
page read and write
|
||
270EEC000
|
stack
|
page read and write
|
||
2C4EE620000
|
heap
|
page read and write
|
||
295BDE05000
|
heap
|
page read and write
|
||
2243E620000
|
heap
|
page read and write
|
||
3D60000
|
direct allocation
|
page read and write
|
||
21FCD210000
|
heap
|
page read and write
|
||
DE8027D000
|
stack
|
page read and write
|
||
295BDB10000
|
heap
|
page read and write
|
||
3573000
|
heap
|
page read and write
|
||
15B3000
|
heap
|
page read and write
|
||
4E7B000
|
trusted library allocation
|
page read and write
|
||
2314FD70000
|
heap
|
page read and write
|
||
DD2000
|
direct allocation
|
page read and write
|
||
3D60000
|
direct allocation
|
page read and write
|
||
2A02F000000
|
heap
|
page read and write
|
||
80D3D7E000
|
unkown
|
page readonly
|
||
DCB7DFF000
|
stack
|
page read and write
|
||
DF0000
|
heap
|
page read and write
|
||
BD2471C000
|
stack
|
page read and write
|
||
2AC0000
|
direct allocation
|
page read and write
|
||
1D239C80000
|
heap
|
page read and write
|
||
2DF6000
|
direct allocation
|
page read and write
|
||
EE7267D000
|
stack
|
page read and write
|
||
1E874E65000
|
heap
|
page read and write
|
||
AE09A7E000
|
stack
|
page read and write
|
||
1F112E18000
|
heap
|
page read and write
|
||
40B3000
|
direct allocation
|
page read and write
|
||
32D3000
|
heap
|
page read and write
|
||
2FE5000
|
heap
|
page read and write
|
||
EE7277F000
|
stack
|
page read and write
|
||
29B000
|
stack
|
page read and write
|
||
D6B22FC000
|
stack
|
page read and write
|
||
D9E000
|
stack
|
page read and write
|
||
B9C000
|
unkown
|
page readonly
|
||
484D000
|
direct allocation
|
page read and write
|
||
409000
|
heap
|
page read and write
|
||
2F39000
|
direct allocation
|
page read and write
|
||
2C4EE540000
|
heap
|
page read and write
|
||
A54867E000
|
stack
|
page read and write
|
||
7E40A7E000
|
stack
|
page read and write
|
||
636000
|
unkown
|
page read and write
|
||
2DEF000
|
direct allocation
|
page read and write
|
||
2B5137C0000
|
heap
|
page read and write
|
||
C5495AF000
|
stack
|
page read and write
|
||
270FEF000
|
stack
|
page read and write
|
||
1680000
|
direct allocation
|
page read and write
|
||
7E4087D000
|
stack
|
page read and write
|
||
2DC2000
|
direct allocation
|
page read and write
|
||
D37000
|
direct allocation
|
page read and write
|
||
1620000
|
direct allocation
|
page read and write
|
||
42E0000
|
direct allocation
|
page read and write
|
||
2F10000
|
direct allocation
|
page read and write
|
||
21436160000
|
heap
|
page read and write
|
||
18683250000
|
heap
|
page read and write
|
||
2A02F195000
|
heap
|
page read and write
|
||
2B513448000
|
heap
|
page read and write
|
||
FF008FE000
|
stack
|
page read and write
|
||
B9C000
|
unkown
|
page readonly
|
||
D78000
|
direct allocation
|
page read and write
|
||
1E874E60000
|
heap
|
page read and write
|
||
1636000
|
direct allocation
|
page read and write
|
||
3D70000
|
direct allocation
|
page read and write
|
||
15AA000
|
heap
|
page read and write
|
||
1D239F65000
|
heap
|
page read and write
|
||
2E10000
|
heap
|
page read and write
|
||
2243E625000
|
heap
|
page read and write
|
||
2FBD000
|
direct allocation
|
page read and write
|
||
15C9000
|
heap
|
page read and write
|
||
4A8E000
|
stack
|
page read and write
|
||
2A02EFE0000
|
heap
|
page read and write
|
||
3D7B000
|
direct allocation
|
page read and write
|
||
3D9F000
|
direct allocation
|
page read and write
|
||
2300A787000
|
heap
|
page read and write
|
||
2E73000
|
direct allocation
|
page read and write
|
||
21436170000
|
heap
|
page read and write
|
||
26F427F000
|
stack
|
page read and write
|
||
1D00E880000
|
heap
|
page read and write
|
||
581000
|
unkown
|
page execute read
|
||
1BE99550000
|
heap
|
page read and write
|
||
2314FC90000
|
heap
|
page read and write
|
||
273E4120000
|
heap
|
page read and write
|
||
18683380000
|
heap
|
page read and write
|
||
28BF000
|
stack
|
page read and write
|
||
AE0997F000
|
stack
|
page read and write
|
||
3FB0000
|
direct allocation
|
page read and write
|
||
21FCD218000
|
heap
|
page read and write
|
||
1287000
|
heap
|
page read and write
|
||
335EB7D000
|
stack
|
page read and write
|
||
2300A5B0000
|
heap
|
page read and write
|
||
DAC000
|
stack
|
page read and write
|
||
780000
|
heap
|
page read and write
|
||
10EF000
|
stack
|
page read and write
|
||
21FCD460000
|
heap
|
page read and write
|
||
18D67B10000
|
heap
|
page read and write
|
||
273E3F90000
|
heap
|
page read and write
|
||
169D000
|
direct allocation
|
page read and write
|
||
105C000
|
stack
|
page read and write
|
||
D6B26FE000
|
stack
|
page read and write
|
||
11A4000
|
unkown
|
page write copy
|
||
1E063870000
|
heap
|
page read and write
|
||
2C56FA08000
|
heap
|
page read and write
|
||
1D00EA70000
|
heap
|
page read and write
|
||
1230000
|
heap
|
page read and write
|
||
335EF7F000
|
stack
|
page read and write
|
||
2B5137C5000
|
heap
|
page read and write
|
||
10E6000
|
unkown
|
page execute read
|
||
4E60000
|
trusted library allocation
|
page read and write
|
||
11E6000
|
heap
|
page read and write
|
||
2E81000
|
direct allocation
|
page read and write
|
||
1CF756D0000
|
heap
|
page read and write
|
||
D10000
|
heap
|
page read and write
|
||
2D4F000
|
stack
|
page read and write
|
||
1B3007D0000
|
heap
|
page read and write
|
||
2243E338000
|
heap
|
page read and write
|
||
4E4257E000
|
unkown
|
page readonly
|
||
4A4E000
|
stack
|
page read and write
|
||
2A02EDF8000
|
heap
|
page read and write
|
||
E06857E000
|
stack
|
page read and write
|
||
EC3727D000
|
stack
|
page read and write
|
||
18D67B70000
|
heap
|
page read and write
|
||
4E425FF000
|
stack
|
page read and write
|
||
EE7287E000
|
stack
|
page read and write
|
||
6CB23000
|
unkown
|
page read and write
|
||
27E8DF10000
|
heap
|
page read and write
|
||
75EC8FF000
|
stack
|
page read and write
|
||
2F5D000
|
direct allocation
|
page read and write
|
||
2FF7000
|
heap
|
page read and write
|
||
A80000
|
unkown
|
page write copy
|
||
1572FAD8000
|
heap
|
page read and write
|
||
2E29000
|
heap
|
page read and write
|
||
62B000
|
unkown
|
page read and write
|
||
7C0000
|
unkown
|
page readonly
|
||
2E40000
|
direct allocation
|
page read and write
|
||
4C20000
|
heap
|
page read and write
|
||
295BDAF0000
|
heap
|
page read and write
|
||
6D4727F000
|
stack
|
page read and write
|
||
1E874BC0000
|
heap
|
page read and write
|
||
2C4EE8F0000
|
heap
|
page read and write
|
||
D54000
|
direct allocation
|
page read and write
|
||
1B300AB5000
|
heap
|
page read and write
|
||
16C1000
|
direct allocation
|
page read and write
|
||
62B000
|
unkown
|
page read and write
|
||
1CF756D5000
|
heap
|
page read and write
|
||
414F000
|
stack
|
page read and write
|
||
AE099FE000
|
unkown
|
page readonly
|
||
1B300800000
|
heap
|
page read and write
|
||
1E063770000
|
heap
|
page read and write
|
||
1098000
|
heap
|
page read and write
|
||
BADA37F000
|
stack
|
page read and write
|
||
15C0000
|
direct allocation
|
page read and write
|
||
4E7B000
|
trusted library allocation
|
page read and write
|
||
9CAFCFF000
|
stack
|
page read and write
|
||
273E3D80000
|
heap
|
page read and write
|
||
15DD000
|
direct allocation
|
page read and write
|
||
1D00EB30000
|
heap
|
page read and write
|
||
DE0000
|
heap
|
page read and write
|
||
E1A000
|
direct allocation
|
page read and write
|
||
21436190000
|
heap
|
page read and write
|
||
4299000
|
direct allocation
|
page read and write
|
||
164D000
|
direct allocation
|
page read and write
|
||
3DD0000
|
direct allocation
|
page read and write
|
||
2F47000
|
direct allocation
|
page read and write
|
||
1DEB2A18000
|
heap
|
page read and write
|
||
A85000
|
unkown
|
page readonly
|
||
6CC12000
|
unkown
|
page readonly
|
||
2314FEB0000
|
heap
|
page read and write
|
||
132D000
|
stack
|
page read and write
|
||
DCA000
|
direct allocation
|
page read and write
|
||
273E3E78000
|
heap
|
page read and write
|
||
300F000
|
direct allocation
|
page read and write
|
||
18D67AF0000
|
heap
|
page read and write
|
||
CE4807C000
|
stack
|
page read and write
|
||
500000
|
heap
|
page read and write
|
||
28E8CF80000
|
heap
|
page read and write
|
||
1664000
|
direct allocation
|
page read and write
|
||
4E77000
|
trusted library allocation
|
page read and write
|
||
2DD7000
|
direct allocation
|
page read and write
|
||
EE0000
|
unkown
|
page readonly
|
||
4E5B000
|
stack
|
page read and write
|
||
223A8430000
|
heap
|
page read and write
|
||
AF1000
|
unkown
|
page execute read
|
||
13A0000
|
heap
|
page read and write
|
||
27E8DF15000
|
heap
|
page read and write
|
||
2E2A000
|
direct allocation
|
page read and write
|
||
E28000
|
direct allocation
|
page read and write
|
||
1CF75478000
|
heap
|
page read and write
|
||
25A54920000
|
heap
|
page read and write
|
||
1DEB2DD5000
|
heap
|
page read and write
|
||
214364F5000
|
heap
|
page read and write
|
||
1410000
|
heap
|
page read and write
|
||
15D5000
|
heap
|
page read and write
|
||
2C4EE8F5000
|
heap
|
page read and write
|
||
AE09AFE000
|
unkown
|
page readonly
|
||
C042B7E000
|
stack
|
page read and write
|
||
2E04000
|
direct allocation
|
page read and write
|
||
2C56F9E0000
|
heap
|
page read and write
|
||
50FC67E000
|
stack
|
page read and write
|
||
2300A6D0000
|
heap
|
page read and write
|
||
2314FB90000
|
heap
|
page read and write
|
||
18D67B75000
|
heap
|
page read and write
|
||
37B0000
|
trusted library allocation
|
page read and write
|
||
DAA000
|
direct allocation
|
page read and write
|
||
15D5000
|
direct allocation
|
page read and write
|
||
A6E000
|
unkown
|
page read and write
|
||
179FFBE0000
|
heap
|
page read and write
|
||
D21000
|
direct allocation
|
page read and write
|
||
166F000
|
stack
|
page read and write
|
||
162B000
|
direct allocation
|
page read and write
|
||
1460000
|
heap
|
page read and write
|
||
2B513380000
|
heap
|
page read and write
|
||
CCD000
|
stack
|
page read and write
|
||
629000
|
unkown
|
page write copy
|
||
EFC000
|
unkown
|
page execute read
|
||
EEB097E000
|
stack
|
page read and write
|
||
11A4000
|
unkown
|
page read and write
|
||
2300A6C0000
|
heap
|
page read and write
|
||
28C1000
|
heap
|
page read and write
|
||
DFD000
|
direct allocation
|
page read and write
|
||
6CB29000
|
unkown
|
page execute read
|
||
D59000
|
heap
|
page read and write
|
||
75EC58E000
|
stack
|
page read and write
|
||
25A54A55000
|
heap
|
page read and write
|
||
2A02F190000
|
heap
|
page read and write
|
||
2243E290000
|
heap
|
page read and write
|
||
DCB79FD000
|
stack
|
page read and write
|
||
4E77000
|
trusted library allocation
|
page read and write
|
||
1D239E80000
|
heap
|
page read and write
|
||
2E17000
|
heap
|
page read and write
|
||
2122B920000
|
heap
|
page read and write
|
||
47C9000
|
direct allocation
|
page read and write
|
||
13B9000
|
heap
|
page read and write
|
||
1572FCA0000
|
heap
|
page read and write
|
||
3F0000
|
heap
|
page read and write
|
||
2E21000
|
direct allocation
|
page read and write
|
||
20571EA5000
|
heap
|
page read and write
|
||
2243E1B0000
|
heap
|
page read and write
|
||
1BE99555000
|
heap
|
page read and write
|
||
2E48000
|
direct allocation
|
page read and write
|
||
1F112FC5000
|
heap
|
page read and write
|
||
BB2000
|
unkown
|
page write copy
|
||
AF1000
|
unkown
|
page execute read
|
||
DD9000
|
direct allocation
|
page read and write
|
||
42BE000
|
direct allocation
|
page read and write
|
||
73AFACD000
|
stack
|
page read and write
|
||
D09000
|
direct allocation
|
page read and write
|
||
27E8DBC0000
|
heap
|
page read and write
|
||
C51D0FE000
|
stack
|
page read and write
|
||
FF004ED000
|
stack
|
page read and write
|
||
15B1000
|
direct allocation
|
page read and write
|
||
1B347495000
|
heap
|
page read and write
|
||
4E87000
|
trusted library allocation
|
page read and write
|
||
2E56000
|
direct allocation
|
page read and write
|
||
3310000
|
direct allocation
|
page execute and read and write
|
||
7EF20000
|
direct allocation
|
page read and write
|
||
2F23000
|
direct allocation
|
page read and write
|
||
13B0000
|
heap
|
page read and write
|
||
2F6B000
|
direct allocation
|
page read and write
|
||
16C8000
|
direct allocation
|
page read and write
|
||
16A4000
|
direct allocation
|
page read and write
|
||
2314FB98000
|
heap
|
page read and write
|
||
273E4125000
|
heap
|
page read and write
|
||
3390000
|
direct allocation
|
page read and write
|
||
176E000
|
stack
|
page read and write
|
||
2DC9000
|
direct allocation
|
page read and write
|
||
1F112CC0000
|
heap
|
page read and write
|
||
1190000
|
heap
|
page read and write
|
||
34AE000
|
direct allocation
|
page read and write
|
||
2122B740000
|
heap
|
page read and write
|
||
1230000
|
heap
|
page read and write
|
||
2E1A000
|
direct allocation
|
page read and write
|
||
3D70000
|
direct allocation
|
page read and write
|
||
166B000
|
direct allocation
|
page read and write
|
||
4E424FE000
|
stack
|
page read and write
|
||
E04000
|
direct allocation
|
page read and write
|
||
A54847C000
|
stack
|
page read and write
|
||
76E000
|
stack
|
page read and write
|
||
3033000
|
direct allocation
|
page read and write
|
||
C042C7F000
|
stack
|
page read and write
|
||
E60000
|
heap
|
page read and write
|
||
295BDBB0000
|
heap
|
page read and write
|
||
2122B568000
|
heap
|
page read and write
|
||
A7D000
|
unkown
|
page read and write
|
||
179FFAE0000
|
heap
|
page read and write
|
There are 745 hidden memdumps, click here to show them.