Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
vce exam simulator 2.2.1 crackk.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
initial sample
|
||
C:\Users\user\AppData\Local\Temp\459250\Spa.com
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
modified
|
||
C:\Users\user\AppData\Local\Temp\459250\y
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\Branches
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\Earned
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\Edmonton
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\Est
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\Giant
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\Hawk
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\Instance
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\Leading
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\Let
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\Malawi
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\No
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\Paper
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\Penalties
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\Performances
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\Reed
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\Toe
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\Vary
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\Walls
|
ASCII text, with very long lines (873), with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\Walls.cmd (copy)
|
ASCII text, with very long lines (873), with CRLF line terminators
|
dropped
|
There are 12 hidden files, click here to show them.
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Windows\SysWOW64\cmd.exe
|
"C:\Windows\System32\cmd.exe" /c move Walls Walls.cmd & Walls.cmd
|
||
C:\Windows\SysWOW64\findstr.exe
|
findstr /I "opssvc wrsa"
|
||
C:\Windows\SysWOW64\findstr.exe
|
findstr "AvastUI AVGUI bdservicehost nsWscSvc ekrn SophosHealth"
|
||
C:\Windows\SysWOW64\cmd.exe
|
cmd /c md 459250
|
||
C:\Windows\SysWOW64\findstr.exe
|
findstr /V "Sorry" Branches
|
||
C:\Windows\SysWOW64\cmd.exe
|
cmd /c copy /b ..\Penalties + ..\Let + ..\No + ..\Giant + ..\Instance + ..\Reed + ..\Hawk y
|
||
C:\Users\user\AppData\Local\Temp\459250\Spa.com
|
Spa.com y
|
||
C:\Users\user\Desktop\vce exam simulator 2.2.1 crackk.exe
|
"C:\Users\user\Desktop\vce exam simulator 2.2.1 crackk.exe"
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\SysWOW64\tasklist.exe
|
tasklist
|
||
C:\Windows\SysWOW64\tasklist.exe
|
tasklist
|
||
C:\Windows\SysWOW64\choice.exe
|
choice /d y /t 5
|
There are 2 hidden processes, click here to show them.
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
https://bithithol.click/api
|
104.21.33.227
|
||
http://www.microsoft.cov8GM
|
unknown
|
||
http://localhost/data.svc
|
unknown
|
||
https://duckduckgo.com/chrome_newtab
|
unknown
|
||
https://duckduckgo.com/ac/?q=
|
unknown
|
||
https://bridge.lga1.admarketplace.net/ctp?version=16.0.0&key=1696332238301000001.2&ci=1696332238417.
|
unknown
|
||
https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
|
unknown
|
||
http://asp.net/ApplicationServices/v200TU
|
unknown
|
||
https://support.office.com/article/94ba2e0b-638e-4a92-8857-2cb5ac1d8e17
|
unknown
|
||
https://www.autoitscript.com/autoit3/
|
unknown
|
||
http://crl.microso
|
unknown
|
||
https://imp.mt48.net/static?id=7RHzfOIXjFEYsBdvIpkX4QqmfZfYfQfafZbXfpbWfpbX7ReNxR3UIG8zInwYIFIVs9eYi
|
unknown
|
||
http://schemas.microsoft.co7
|
unknown
|
||
https://bithithol.click:443/api
|
unknown
|
||
http://x1.c.lencr.org/0
|
unknown
|
||
http://x1.i.lencr.org/0
|
unknown
|
||
https://support.office.com/article/94ba2e0b-638e-4a92-8857-2cb5ac1d8e17Install
|
unknown
|
||
https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
|
unknown
|
||
http://www.ietf.org/rfc/rfc2396.txt
|
unknown
|
||
http://tempuri.org/.
|
unknown
|
||
https://support.mozilla.org/products/firefoxgro.all
|
unknown
|
||
https://www.amazon.com/?tag=admarketus-20&ref=pd_sl_7548d4575af019e4c148ccf1a78112802e66a0816a72fc94
|
unknown
|
||
http://www.micros-core-marshal-l1-1-0.dll
|
unknown
|
||
https://bithithol.click/
|
unknown
|
||
https://contile-images.services.mozilla.com/0TegrVVRalreHILhR2WvtD_CFzj13HCDcLqqpvXSOuY.10862.jpg
|
unknown
|
||
https://www.google.com/images/branding/product/ico/googleg_lodp.ico
|
unknown
|
||
https://bithithol.click/apim
|
unknown
|
||
http://www.xrml.org/schema/2001/11/xrml2core
|
unknown
|
||
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
|
unknown
|
||
http://crl.rootca1.amazontrust.com/rootca1.crl0
|
unknown
|
||
https://bridge.lga1.ap01.net/ctp?version=16.0.0&key=1696332238301000001.1&ci=1696332238417.12791&cta
|
unknown
|
||
http://www.autoitscript.com/autoit3/X
|
unknown
|
||
http://ocsp.rootca1.amazontrust.com0:
|
unknown
|
||
https://support.office.com/article/7D48285B-20E8-4B9B-91AD-216E34163BAD?wt.mc_id=EnterPK2016
|
unknown
|
||
http://nsis.sf.net/NSIS_ErrorError
|
unknown
|
||
https://www.ecosia.org/newtab/
|
unknown
|
||
https://support.mozilla.org/kb/customize-firefox-controls-buttons-and-toolbars?utm_source=firefox-br
|
unknown
|
||
http://asp.net/ApplicationServices/v200
|
unknown
|
||
http://crl.microsoft.
|
unknown
|
||
https://ac.ecosia.org/autocomplete?q=
|
unknown
|
||
http://www.microso1.0800)4
|
unknown
|
||
http://crl.m
|
unknown
|
||
https://contile-images.services.mozilla.com/obgoOYObjIFea_bXuT6L4LbBJ8j425AD87S1HMD3BWg.9991.jpg
|
unknown
|
||
https://support.microsof
|
unknown
|
||
http://crt.rootca1.amazontrust.com/rootca1.cer0?
|
unknown
|
||
https://support.office.com/article/7D48285B-20E8-4B9B-91AD-216E34163BAD?wt.mc_id=EnterPK2016Examples
|
unknown
|
||
https://bithithol.click/api=
|
unknown
|
||
https://bithithol.click/api:
|
unknown
|
||
https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
|
unknown
|
||
http://crl.micros
|
unknown
|
There are 40 hidden URLs, click here to show them.
Domains
Name
|
IP
|
Malicious
|
|
---|---|---|---|
bithithol.click
|
104.21.33.227
|
||
UJXheBevpnMncefcEO.UJXheBevpnMncefcEO
|
unknown
|
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
104.21.33.227
|
bithithol.click
|
United States
|
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
455C000
|
trusted library allocation
|
page read and write
|
||
1D65000
|
heap
|
page read and write
|
||
1D73000
|
heap
|
page read and write
|
||
4870000
|
heap
|
page read and write
|
||
73E000
|
stack
|
page read and write
|
||
30F7000
|
heap
|
page read and write
|
||
47D9000
|
trusted library allocation
|
page read and write
|
||
4491000
|
trusted library allocation
|
page read and write
|
||
4850000
|
direct allocation
|
page read and write
|
||
4491000
|
trusted library allocation
|
page read and write
|
||
4695000
|
trusted library allocation
|
page read and write
|
||
455F000
|
trusted library allocation
|
page read and write
|
||
1D83000
|
heap
|
page read and write
|
||
15FF000
|
stack
|
page read and write
|
||
19D6000
|
heap
|
page read and write
|
||
4574000
|
trusted library allocation
|
page read and write
|
||
40E2000
|
heap
|
page read and write
|
||
482B000
|
trusted library allocation
|
page read and write
|
||
4772000
|
trusted library allocation
|
page read and write
|
||
4692000
|
trusted library allocation
|
page read and write
|
||
4544000
|
trusted library allocation
|
page read and write
|
||
1D4A000
|
heap
|
page read and write
|
||
30CF000
|
heap
|
page read and write
|
||
2770000
|
direct allocation
|
page execute and read and write
|
||
455E000
|
trusted library allocation
|
page read and write
|
||
5DF2000
|
trusted library allocation
|
page read and write
|
||
84B000
|
heap
|
page read and write
|
||
4697000
|
trusted library allocation
|
page read and write
|
||
400000
|
unkown
|
page readonly
|
||
4730000
|
remote allocation
|
page read and write
|
||
469B000
|
trusted library allocation
|
page read and write
|
||
469E000
|
trusted library allocation
|
page read and write
|
||
4546000
|
trusted library allocation
|
page read and write
|
||
2F70000
|
heap
|
page read and write
|
||
40E2000
|
heap
|
page read and write
|
||
4774000
|
trusted library allocation
|
page read and write
|
||
4695000
|
trusted library allocation
|
page read and write
|
||
4696000
|
trusted library allocation
|
page read and write
|
||
4556000
|
trusted library allocation
|
page read and write
|
||
4699000
|
trusted library allocation
|
page read and write
|
||
1D72000
|
heap
|
page read and write
|
||
40E1000
|
heap
|
page read and write
|
||
445C000
|
trusted library allocation
|
page read and write
|
||
4391000
|
trusted library allocation
|
page read and write
|
||
4391000
|
trusted library allocation
|
page read and write
|
||
30FB000
|
heap
|
page read and write
|
||
4759000
|
trusted library allocation
|
page read and write
|
||
453E000
|
trusted library allocation
|
page read and write
|
||
1D6D000
|
heap
|
page read and write
|
||
457A000
|
trusted library allocation
|
page read and write
|
||
5EA2000
|
trusted library allocation
|
page read and write
|
||
5D9F000
|
stack
|
page read and write
|
||
17E0000
|
heap
|
page read and write
|
||
3170000
|
heap
|
page read and write
|
||
43E1000
|
trusted library allocation
|
page read and write
|
||
1640000
|
heap
|
page read and write
|
||
500E000
|
stack
|
page read and write
|
||
469A000
|
trusted library allocation
|
page read and write
|
||
4545000
|
trusted library allocation
|
page read and write
|
||
4514000
|
trusted library allocation
|
page read and write
|
||
30B8000
|
heap
|
page read and write
|
||
4CAE000
|
stack
|
page read and write
|
||
4749000
|
trusted library allocation
|
page read and write
|
||
4567000
|
trusted library allocation
|
page read and write
|
||
4587000
|
trusted library allocation
|
page read and write
|
||
2A2E000
|
stack
|
page read and write
|
||
2AAB000
|
heap
|
page read and write
|
||
1CF0000
|
heap
|
page read and write
|
||
474D000
|
trusted library allocation
|
page read and write
|
||
23FB000
|
heap
|
page read and write
|
||
450000
|
unkown
|
page readonly
|
||
85B000
|
heap
|
page read and write
|
||
40E1000
|
heap
|
page read and write
|
||
4475000
|
trusted library allocation
|
page read and write
|
||
4491000
|
trusted library allocation
|
page read and write
|
||
877000
|
heap
|
page read and write
|
||
4491000
|
trusted library allocation
|
page read and write
|
||
3430000
|
heap
|
page read and write
|
||
1D33000
|
heap
|
page read and write
|
||
4767000
|
trusted library allocation
|
page read and write
|
||
4733000
|
trusted library allocation
|
page read and write
|
||
1CE3000
|
heap
|
page read and write
|
||
40E2000
|
heap
|
page read and write
|
||
4557000
|
trusted library allocation
|
page read and write
|
||
450F000
|
trusted library allocation
|
page read and write
|
||
4475000
|
trusted library allocation
|
page read and write
|
||
1D83000
|
heap
|
page read and write
|
||
48BC000
|
trusted library allocation
|
page read and write
|
||
1C6E000
|
heap
|
page read and write
|
||
40E2000
|
heap
|
page read and write
|
||
450F000
|
trusted library allocation
|
page read and write
|
||
30D0000
|
heap
|
page read and write
|
||
40E2000
|
heap
|
page read and write
|
||
219E000
|
stack
|
page read and write
|
||
455F000
|
trusted library allocation
|
page read and write
|
||
4569000
|
trusted library allocation
|
page read and write
|
||
2AAB000
|
heap
|
page read and write
|
||
4753000
|
trusted library allocation
|
page read and write
|
||
4692000
|
trusted library allocation
|
page read and write
|
||
30EA000
|
heap
|
page read and write
|
||
2880000
|
heap
|
page read and write
|
||
48A4000
|
direct allocation
|
page execute and read and write
|
||
401000
|
unkown
|
page execute read
|
||
30FD000
|
heap
|
page read and write
|
||
4546000
|
trusted library allocation
|
page read and write
|
||
30D3000
|
heap
|
page read and write
|
||
837000
|
heap
|
page read and write
|
||
2A9C000
|
heap
|
page read and write
|
||
473E000
|
trusted library allocation
|
page read and write
|
||
2A81000
|
heap
|
page read and write
|
||
4567000
|
trusted library allocation
|
page read and write
|
||
4475000
|
trusted library allocation
|
page read and write
|
||
17AE000
|
stack
|
page read and write
|
||
29AE000
|
stack
|
page read and write
|
||
452F000
|
trusted library allocation
|
page read and write
|
||
1990000
|
heap
|
page read and write
|
||
82B000
|
heap
|
page read and write
|
||
4491000
|
trusted library allocation
|
page read and write
|
||
4588000
|
trusted library allocation
|
page read and write
|
||
4491000
|
trusted library allocation
|
page read and write
|
||
4567000
|
trusted library allocation
|
page read and write
|
||
30CF000
|
heap
|
page read and write
|
||
1B2E000
|
heap
|
page read and write
|
||
451C000
|
trusted library allocation
|
page read and write
|
||
4695000
|
trusted library allocation
|
page read and write
|
||
1D7F000
|
heap
|
page read and write
|
||
308D000
|
stack
|
page read and write
|
||
475E000
|
trusted library allocation
|
page read and write
|
||
837000
|
heap
|
page read and write
|
||
4390000
|
trusted library allocation
|
page read and write
|
||
30B0000
|
heap
|
page read and write
|
||
860000
|
heap
|
page read and write
|
||
1D72000
|
heap
|
page read and write
|
||
469A000
|
trusted library allocation
|
page read and write
|
||
40E2000
|
heap
|
page read and write
|
||
2AA3000
|
heap
|
page read and write
|
||
2A80000
|
heap
|
page read and write
|
||
4475000
|
trusted library allocation
|
page read and write
|
||
469B000
|
trusted library allocation
|
page read and write
|
||
4581000
|
trusted library allocation
|
page read and write
|
||
4743000
|
trusted library allocation
|
page read and write
|
||
593E000
|
stack
|
page read and write
|
||
51D000
|
unkown
|
page write copy
|
||
6F0000
|
heap
|
page read and write
|
||
455C000
|
trusted library allocation
|
page read and write
|
||
447B000
|
trusted library allocation
|
page read and write
|
||
454E000
|
trusted library allocation
|
page read and write
|
||
30FE000
|
heap
|
page read and write
|
||
30D3000
|
heap
|
page read and write
|
||
1D5F000
|
heap
|
page read and write
|
||
2786000
|
heap
|
page read and write
|
||
1D77000
|
heap
|
page read and write
|
||
30EE000
|
heap
|
page read and write
|
||
1A61000
|
heap
|
page read and write
|
||
1760000
|
heap
|
page read and write
|
||
469B000
|
trusted library allocation
|
page read and write
|
||
31EE000
|
stack
|
page read and write
|
||
326F000
|
stack
|
page read and write
|
||
1D69000
|
heap
|
page read and write
|
||
4742000
|
trusted library allocation
|
page read and write
|
||
420000
|
unkown
|
page read and write
|
||
30EA000
|
heap
|
page read and write
|
||
4491000
|
trusted library allocation
|
page read and write
|
||
4694000
|
trusted library allocation
|
page read and write
|
||
469D000
|
trusted library allocation
|
page read and write
|
||
446A000
|
trusted library allocation
|
page read and write
|
||
4690000
|
trusted library allocation
|
page read and write
|
||
4516000
|
trusted library allocation
|
page read and write
|
||
40E2000
|
heap
|
page read and write
|
||
4519000
|
trusted library allocation
|
page read and write
|
||
4520000
|
trusted library allocation
|
page read and write
|
||
1D63000
|
heap
|
page read and write
|
||
483F000
|
stack
|
page read and write
|
||
4840000
|
heap
|
page read and write
|
||
43E4000
|
trusted library allocation
|
page read and write
|
||
4491000
|
trusted library allocation
|
page read and write
|
||
3030000
|
heap
|
page read and write
|
||
4698000
|
trusted library allocation
|
page read and write
|
||
28D6000
|
heap
|
page read and write
|
||
4581000
|
trusted library allocation
|
page read and write
|
||
2AAB000
|
heap
|
page read and write
|
||
4699000
|
trusted library allocation
|
page read and write
|
||
1D7F000
|
heap
|
page read and write
|
||
4521000
|
trusted library allocation
|
page read and write
|
||
1D50000
|
heap
|
page read and write
|
||
4851000
|
direct allocation
|
page execute and read and write
|
||
300C000
|
stack
|
page read and write
|
||
452E000
|
trusted library allocation
|
page read and write
|
||
4756000
|
trusted library allocation
|
page read and write
|
||
25A3000
|
heap
|
page read and write
|
||
2B3F000
|
stack
|
page read and write
|
||
474B000
|
trusted library allocation
|
page read and write
|
||
47BC000
|
trusted library allocation
|
page read and write
|
||
19A000
|
stack
|
page read and write
|
||
452C000
|
trusted library allocation
|
page read and write
|
||
1D65000
|
heap
|
page read and write
|
||
3438000
|
heap
|
page read and write
|
||
447B000
|
trusted library allocation
|
page read and write
|
||
4412000
|
trusted library allocation
|
page read and write
|
||
40E2000
|
heap
|
page read and write
|
||
469B000
|
trusted library allocation
|
page read and write
|
||
28CE000
|
stack
|
page read and write
|
||
291E000
|
stack
|
page read and write
|
||
1D88000
|
heap
|
page read and write
|
||
4516000
|
trusted library allocation
|
page read and write
|
||
44C5000
|
trusted library allocation
|
page read and write
|
||
1D82000
|
heap
|
page read and write
|
||
4543000
|
trusted library allocation
|
page read and write
|
||
4730000
|
remote allocation
|
page read and write
|
||
50EE000
|
stack
|
page read and write
|
||
2720000
|
heap
|
page read and write
|
||
40E2000
|
heap
|
page read and write
|
||
33A0000
|
heap
|
page read and write
|
||
4491000
|
trusted library allocation
|
page read and write
|
||
401000
|
unkown
|
page execute read
|
||
4691000
|
trusted library allocation
|
page read and write
|
||
5E68000
|
trusted library allocation
|
page read and write
|
||
2320000
|
heap
|
page read and write
|
||
4731000
|
trusted library allocation
|
page read and write
|
||
4491000
|
trusted library allocation
|
page read and write
|
||
600000
|
heap
|
page read and write
|
||
40E2000
|
heap
|
page read and write
|
||
450F000
|
trusted library allocation
|
page read and write
|
||
283D000
|
stack
|
page read and write
|
||
451000
|
unkown
|
page execute read
|
||
2AA6000
|
heap
|
page read and write
|
||
473F000
|
trusted library allocation
|
page read and write
|
||
446A000
|
trusted library allocation
|
page read and write
|
||
2A98000
|
heap
|
page read and write
|
||
4599000
|
trusted library allocation
|
page read and write
|
||
4391000
|
trusted library allocation
|
page read and write
|
||
513000
|
unkown
|
page readonly
|
||
453F000
|
trusted library allocation
|
page read and write
|
||
1D85000
|
heap
|
page read and write
|
||
845000
|
heap
|
page read and write
|
||
1D50000
|
heap
|
page read and write
|
||
4755000
|
trusted library allocation
|
page read and write
|
||
409000
|
unkown
|
page readonly
|
||
3010000
|
heap
|
page read and write
|
||
4720000
|
trusted library allocation
|
page read and write
|
||
4391000
|
trusted library allocation
|
page read and write
|
||
4727000
|
trusted library allocation
|
page read and write
|
||
2F30000
|
heap
|
page read and write
|
||
4699000
|
trusted library allocation
|
page read and write
|
||
4527000
|
trusted library allocation
|
page read and write
|
||
4F0E000
|
stack
|
page read and write
|
||
860000
|
heap
|
page read and write
|
||
845000
|
heap
|
page read and write
|
||
770000
|
heap
|
page read and write
|
||
400000
|
unkown
|
page readonly
|
||
15D9000
|
stack
|
page read and write
|
||
2ECE000
|
stack
|
page read and write
|
||
1D76000
|
heap
|
page read and write
|
||
553E000
|
stack
|
page read and write
|
||
4588000
|
trusted library allocation
|
page read and write
|
||
4517000
|
trusted library allocation
|
page read and write
|
||
4526000
|
trusted library allocation
|
page read and write
|
||
504F000
|
stack
|
page read and write
|
||
2780000
|
heap
|
page read and write
|
||
15BE000
|
stack
|
page read and write
|
||
4741000
|
trusted library allocation
|
page read and write
|
||
6B0000
|
heap
|
page read and write
|
||
4491000
|
trusted library allocation
|
page read and write
|
||
46B000
|
unkown
|
page read and write
|
||
287F000
|
stack
|
page read and write
|
||
4536000
|
trusted library allocation
|
page read and write
|
||
6F5000
|
heap
|
page read and write
|
||
2A8D000
|
heap
|
page read and write
|
||
2AAB000
|
heap
|
page read and write
|
||
4733000
|
trusted library allocation
|
page read and write
|
||
4738000
|
trusted library allocation
|
page read and write
|
||
2A84000
|
heap
|
page read and write
|
||
30EA000
|
heap
|
page read and write
|
||
1D88000
|
heap
|
page read and write
|
||
877000
|
heap
|
page read and write
|
||
40E2000
|
heap
|
page read and write
|
||
2940000
|
heap
|
page read and write
|
||
7F0000
|
heap
|
page read and write
|
||
259F000
|
stack
|
page read and write
|
||
454E000
|
trusted library allocation
|
page read and write
|
||
1D7F000
|
heap
|
page read and write
|
||
513000
|
unkown
|
page readonly
|
||
23F5000
|
heap
|
page read and write
|
||
1D75000
|
heap
|
page read and write
|
||
4697000
|
trusted library allocation
|
page read and write
|
||
4696000
|
trusted library allocation
|
page read and write
|
||
1D73000
|
heap
|
page read and write
|
||
4755000
|
trusted library allocation
|
page read and write
|
||
4760000
|
trusted library allocation
|
page read and write
|
||
456F000
|
trusted library allocation
|
page read and write
|
||
54EF000
|
stack
|
page read and write
|
||
2F40000
|
heap
|
page read and write
|
||
4752000
|
trusted library allocation
|
page read and write
|
||
1D71000
|
heap
|
page read and write
|
||
4695000
|
trusted library allocation
|
page read and write
|
||
2A60000
|
heap
|
page read and write
|
||
2324000
|
heap
|
page read and write
|
||
1D6C000
|
heap
|
page read and write
|
||
1D88000
|
heap
|
page read and write
|
||
2948000
|
heap
|
page read and write
|
||
521000
|
unkown
|
page write copy
|
||
1A4D000
|
heap
|
page read and write
|
||
475D000
|
trusted library allocation
|
page read and write
|
||
4699000
|
trusted library allocation
|
page read and write
|
||
17E4000
|
heap
|
page read and write
|
||
484B000
|
trusted library allocation
|
page read and write
|
||
5DD3000
|
trusted library allocation
|
page read and write
|
||
434000
|
unkown
|
page read and write
|
||
476D000
|
trusted library allocation
|
page read and write
|
||
5EB2000
|
trusted library allocation
|
page read and write
|
||
4765000
|
trusted library allocation
|
page read and write
|
||
455F000
|
trusted library allocation
|
page read and write
|
||
1AB4000
|
heap
|
page read and write
|
||
4692000
|
trusted library allocation
|
page read and write
|
||
5EAA000
|
trusted library allocation
|
page read and write
|
||
40C000
|
unkown
|
page write copy
|
||
1D75000
|
heap
|
page read and write
|
||
40E2000
|
heap
|
page read and write
|
||
482A000
|
trusted library allocation
|
page read and write
|
||
469C000
|
trusted library allocation
|
page read and write
|
||
175E000
|
stack
|
page read and write
|
||
30F7000
|
heap
|
page read and write
|
||
4446000
|
trusted library allocation
|
page read and write
|
||
4551000
|
trusted library allocation
|
page read and write
|
||
5080000
|
heap
|
page read and write
|
||
4755000
|
trusted library allocation
|
page read and write
|
||
23F0000
|
heap
|
page read and write
|
||
1D73000
|
heap
|
page read and write
|
||
4533000
|
trusted library allocation
|
page read and write
|
||
322E000
|
stack
|
page read and write
|
||
1B03000
|
heap
|
page read and write
|
||
19A0000
|
heap
|
page read and write
|
||
1C06000
|
heap
|
page read and write
|
||
4491000
|
trusted library allocation
|
page read and write
|
||
500000
|
unkown
|
page readonly
|
||
474E000
|
trusted library allocation
|
page read and write
|
||
2A98000
|
heap
|
page read and write
|
||
FDA000
|
stack
|
page read and write
|
||
4536000
|
trusted library allocation
|
page read and write
|
||
267C000
|
stack
|
page read and write
|
||
4570000
|
trusted library allocation
|
page read and write
|
||
5E2A000
|
trusted library allocation
|
page read and write
|
||
2A68000
|
heap
|
page read and write
|
||
4ED000
|
unkown
|
page readonly
|
||
1D65000
|
heap
|
page read and write
|
||
469F000
|
trusted library allocation
|
page read and write
|
||
1D83000
|
heap
|
page read and write
|
||
480E000
|
trusted library allocation
|
page read and write
|
||
30FD000
|
heap
|
page read and write
|
||
30BF000
|
stack
|
page read and write
|
||
310C000
|
stack
|
page read and write
|
||
4390000
|
trusted library allocation
|
page read and write
|
||
1D5E000
|
heap
|
page read and write
|
||
4760000
|
trusted library allocation
|
page read and write
|
||
2AA7000
|
heap
|
page read and write
|
||
4771000
|
trusted library allocation
|
page read and write
|
||
40C000
|
unkown
|
page read and write
|
||
4567000
|
trusted library allocation
|
page read and write
|
||
4490000
|
trusted library allocation
|
page read and write
|
||
4536000
|
trusted library allocation
|
page read and write
|
||
85B000
|
heap
|
page read and write
|
||
2E3C000
|
stack
|
page read and write
|
||
40E2000
|
heap
|
page read and write
|
||
454B000
|
trusted library allocation
|
page read and write
|
||
2EB0000
|
heap
|
page read and write
|
||
4740000
|
trusted library allocation
|
page read and write
|
||
1D5D000
|
heap
|
page read and write
|
||
1D7A000
|
heap
|
page read and write
|
||
2ECC000
|
stack
|
page read and write
|
||
4391000
|
trusted library allocation
|
page read and write
|
||
30FA000
|
heap
|
page read and write
|
||
AEF000
|
stack
|
page read and write
|
||
2A8C000
|
heap
|
page read and write
|
||
4491000
|
trusted library allocation
|
page read and write
|
||
30CF000
|
heap
|
page read and write
|
||
40E2000
|
heap
|
page read and write
|
||
29EF000
|
stack
|
page read and write
|
||
22E0000
|
heap
|
page read and write
|
||
833000
|
heap
|
page read and write
|
||
1A6C000
|
heap
|
page read and write
|
||
1D69000
|
heap
|
page read and write
|
||
4696000
|
trusted library allocation
|
page read and write
|
||
4491000
|
trusted library allocation
|
page read and write
|
||
293F000
|
stack
|
page read and write
|
||
4778000
|
trusted library allocation
|
page read and write
|
||
4696000
|
trusted library allocation
|
page read and write
|
||
307E000
|
stack
|
page read and write
|
||
1C4E000
|
heap
|
page read and write
|
||
1D65000
|
heap
|
page read and write
|
||
9EF000
|
stack
|
page read and write
|
||
47BE000
|
trusted library allocation
|
page read and write
|
||
1D65000
|
heap
|
page read and write
|
||
475B000
|
trusted library allocation
|
page read and write
|
||
1D33000
|
heap
|
page read and write
|
||
40E2000
|
heap
|
page read and write
|
||
1C8E000
|
heap
|
page read and write
|
||
4491000
|
trusted library allocation
|
page read and write
|
||
2A80000
|
heap
|
page read and write
|
||
4776000
|
trusted library allocation
|
page read and write
|
||
2A98000
|
heap
|
page read and write
|
||
1D7F000
|
heap
|
page read and write
|
||
455C000
|
trusted library allocation
|
page read and write
|
||
4F8E000
|
stack
|
page read and write
|
||
469F000
|
trusted library allocation
|
page read and write
|
||
30EA000
|
heap
|
page read and write
|
||
22CE000
|
stack
|
page read and write
|
||
1D76000
|
heap
|
page read and write
|
||
40E2000
|
heap
|
page read and write
|
||
98000
|
stack
|
page read and write
|
||
2E7C000
|
stack
|
page read and write
|
||
40E2000
|
heap
|
page read and write
|
||
469E000
|
trusted library allocation
|
page read and write
|
||
40E2000
|
heap
|
page read and write
|
||
1D77000
|
heap
|
page read and write
|
||
30F8000
|
heap
|
page read and write
|
||
4760000
|
trusted library allocation
|
page read and write
|
||
40E2000
|
heap
|
page read and write
|
||
40E2000
|
heap
|
page read and write
|
||
2FCF000
|
stack
|
page read and write
|
||
7FE000
|
heap
|
page read and write
|
||
1C99000
|
heap
|
page read and write
|
||
19A8000
|
heap
|
page read and write
|
||
4771000
|
trusted library allocation
|
page read and write
|
||
525000
|
unkown
|
page readonly
|
||
4543000
|
trusted library allocation
|
page read and write
|
||
4561000
|
trusted library allocation
|
page read and write
|
||
3178000
|
heap
|
page read and write
|
||
30EA000
|
heap
|
page read and write
|
||
446C000
|
trusted library allocation
|
page read and write
|
||
476D000
|
trusted library allocation
|
page read and write
|
||
1D5D000
|
heap
|
page read and write
|
||
4491000
|
trusted library allocation
|
page read and write
|
||
4696000
|
trusted library allocation
|
page read and write
|
||
67EF000
|
trusted library allocation
|
page read and write
|
||
4411000
|
trusted library allocation
|
page read and write
|
||
4697000
|
trusted library allocation
|
page read and write
|
||
2730000
|
heap
|
page read and write
|
||
1D5F000
|
heap
|
page read and write
|
||
46CD000
|
stack
|
page read and write
|
||
51D000
|
unkown
|
page read and write
|
||
4527000
|
trusted library allocation
|
page read and write
|
||
4516000
|
trusted library allocation
|
page read and write
|
||
5DD9000
|
trusted library allocation
|
page read and write
|
||
4692000
|
trusted library allocation
|
page read and write
|
||
500000
|
unkown
|
page readonly
|
||
520000
|
heap
|
page read and write
|
||
458F000
|
trusted library allocation
|
page read and write
|
||
19C5000
|
heap
|
page read and write
|
||
451000
|
unkown
|
page execute read
|
||
68E000
|
stack
|
page read and write
|
||
453D000
|
trusted library allocation
|
page read and write
|
||
409000
|
unkown
|
page readonly
|
||
4F4F000
|
stack
|
page read and write
|
||
283E000
|
stack
|
page read and write
|
||
4691000
|
trusted library allocation
|
page read and write
|
||
1D5D000
|
heap
|
page read and write
|
||
47FE000
|
stack
|
page read and write
|
||
4588000
|
trusted library allocation
|
page read and write
|
||
525000
|
unkown
|
page readonly
|
||
2E8C000
|
stack
|
page read and write
|
||
40E2000
|
heap
|
page read and write
|
||
5050000
|
heap
|
page read and write
|
||
447B000
|
trusted library allocation
|
page read and write
|
||
40E2000
|
heap
|
page read and write
|
||
4491000
|
trusted library allocation
|
page read and write
|
||
498B000
|
trusted library allocation
|
page read and write
|
||
5DD6000
|
trusted library allocation
|
page read and write
|
||
4734000
|
trusted library allocation
|
page read and write
|
||
5E0A000
|
trusted library allocation
|
page read and write
|
||
1994000
|
heap
|
page read and write
|
||
4693000
|
trusted library allocation
|
page read and write
|
||
469D000
|
trusted library allocation
|
page read and write
|
||
483C000
|
trusted library allocation
|
page read and write
|
||
4692000
|
trusted library allocation
|
page read and write
|
||
4694000
|
trusted library allocation
|
page read and write
|
||
4412000
|
trusted library allocation
|
page read and write
|
||
1D77000
|
heap
|
page read and write
|
||
2AA4000
|
heap
|
page read and write
|
||
456D000
|
trusted library allocation
|
page read and write
|
||
1C2E000
|
heap
|
page read and write
|
||
28D0000
|
heap
|
page read and write
|
||
2AA8000
|
heap
|
page read and write
|
||
1D80000
|
heap
|
page read and write
|
||
40E2000
|
heap
|
page read and write
|
||
1D88000
|
heap
|
page read and write
|
||
451B000
|
trusted library allocation
|
page read and write
|
||
1D7E000
|
heap
|
page read and write
|
||
15EF000
|
stack
|
page read and write
|
||
4ED000
|
unkown
|
page readonly
|
||
4390000
|
trusted library allocation
|
page read and write
|
||
7BE000
|
stack
|
page read and write
|
||
474D000
|
trusted library allocation
|
page read and write
|
||
1D77000
|
heap
|
page read and write
|
||
30DD000
|
heap
|
page read and write
|
||
300F000
|
stack
|
page read and write
|
||
4693000
|
trusted library allocation
|
page read and write
|
||
5DD3000
|
trusted library allocation
|
page read and write
|
||
4696000
|
trusted library allocation
|
page read and write
|
||
1D6E000
|
heap
|
page read and write
|
||
4698000
|
trusted library allocation
|
page read and write
|
||
4695000
|
trusted library allocation
|
page read and write
|
||
4552000
|
trusted library allocation
|
page read and write
|
||
452F000
|
trusted library allocation
|
page read and write
|
||
1CA3000
|
heap
|
page read and write
|
||
45A1000
|
trusted library allocation
|
page read and write
|
||
62D5000
|
trusted library allocation
|
page read and write
|
||
4517000
|
trusted library allocation
|
page read and write
|
||
2A9B000
|
heap
|
page read and write
|
||
497D000
|
trusted library allocation
|
page read and write
|
||
447B000
|
trusted library allocation
|
page read and write
|
||
4567000
|
trusted library allocation
|
page read and write
|
||
2750000
|
heap
|
page read and write
|
||
833000
|
heap
|
page read and write
|
||
7FA000
|
heap
|
page read and write
|
||
1D60000
|
heap
|
page read and write
|
||
5F42000
|
trusted library allocation
|
page read and write
|
||
2940000
|
heap
|
page read and write
|
||
40E2000
|
heap
|
page read and write
|
||
30DC000
|
heap
|
page read and write
|
||
40F1000
|
heap
|
page read and write
|
||
1D50000
|
heap
|
page read and write
|
||
30ED000
|
heap
|
page read and write
|
||
1D4A000
|
heap
|
page read and write
|
||
5E7A000
|
trusted library allocation
|
page read and write
|
||
1D72000
|
heap
|
page read and write
|
||
1D88000
|
heap
|
page read and write
|
||
30F6000
|
heap
|
page read and write
|
||
4510000
|
trusted library allocation
|
page read and write
|
||
40E1000
|
heap
|
page read and write
|
||
15CE000
|
stack
|
page read and write
|
||
17E4000
|
heap
|
page read and write
|
||
30D3000
|
heap
|
page read and write
|
||
476C000
|
trusted library allocation
|
page read and write
|
||
30F7000
|
heap
|
page read and write
|
||
4738000
|
trusted library allocation
|
page read and write
|
||
4777000
|
trusted library allocation
|
page read and write
|
||
4555000
|
trusted library allocation
|
page read and write
|
||
4471000
|
trusted library allocation
|
page read and write
|
||
4569000
|
trusted library allocation
|
page read and write
|
||
41E0000
|
trusted library allocation
|
page read and write
|
||
4746000
|
trusted library allocation
|
page read and write
|
||
453D000
|
trusted library allocation
|
page read and write
|
||
40E2000
|
heap
|
page read and write
|
||
2FCE000
|
stack
|
page read and write
|
||
472C000
|
trusted library allocation
|
page read and write
|
||
2F76000
|
heap
|
page read and write
|
||
40E2000
|
heap
|
page read and write
|
||
473D000
|
trusted library allocation
|
page read and write
|
||
43C5000
|
trusted library allocation
|
page read and write
|
||
26BC000
|
stack
|
page read and write
|
||
22F0000
|
heap
|
page read and write
|
||
40E2000
|
heap
|
page read and write
|
||
2A98000
|
heap
|
page read and write
|
||
50AD000
|
stack
|
page read and write
|
||
47BF000
|
stack
|
page read and write
|
||
4FCF000
|
stack
|
page read and write
|
||
1D78000
|
heap
|
page read and write
|
||
450000
|
unkown
|
page readonly
|
||
450F000
|
trusted library allocation
|
page read and write
|
||
64E000
|
stack
|
page read and write
|
||
4730000
|
remote allocation
|
page read and write
|
||
4391000
|
trusted library allocation
|
page read and write
|
||
469C000
|
trusted library allocation
|
page read and write
|
||
2A98000
|
heap
|
page read and write
|
||
4512000
|
trusted library allocation
|
page read and write
|
||
40E2000
|
heap
|
page read and write
|
||
469A000
|
trusted library allocation
|
page read and write
|
||
599E000
|
stack
|
page read and write
|
||
40E2000
|
heap
|
page read and write
|
||
473B000
|
trusted library allocation
|
page read and write
|
||
485F000
|
trusted library allocation
|
page read and write
|
||
470D000
|
stack
|
page read and write
|
There are 562 hidden memdumps, click here to show them.