Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
datasett.exe
|
PE32+ executable (GUI) x86-64, for MS Windows
|
initial sample
|
||
C:\Users\user\AppData\Local\Temp\_MEI50522\Speech\Common\en-US\sapi.dll.mui
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_MEI50522\Speech\Common\sapi.dll
|
PE32+ executable (DLL) (console) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_MEI50522\Speech\Engines\SR\en-US\srloc.dll.mui
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_MEI50522\Speech\Engines\SR\spsreng.dll
|
PE32+ executable (DLL) (console) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_MEI50522\Speech\Engines\SR\spsrx.dll
|
PE32+ executable (DLL) (console) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_MEI50522\Speech\Engines\SR\srloc.dll
|
PE32+ executable (DLL) (console) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_MEI50522\Speech\Engines\TTS\MSTTSEngine.dll
|
PE32+ executable (DLL) (console) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_MEI50522\Speech\Engines\TTS\MSTTSLoc.dll
|
PE32+ executable (DLL) (console) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_MEI50522\Speech\SpeechUX\SPTIP.DLL
|
PE32+ executable (DLL) (console) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_MEI50522\Speech\SpeechUX\SpeechUX.dll
|
PE32+ executable (DLL) (console) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_MEI50522\Speech\SpeechUX\SpeechUXPS.DLL
|
PE32+ executable (DLL) (console) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_MEI50522\Speech\SpeechUX\SpeechUXWiz.exe
|
PE32+ executable (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_MEI50522\Speech\SpeechUX\en-US\SpeechUX.dll.mui
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_MEI50522\Speech\SpeechUX\en-US\SpeechUXRes.dll
|
PE32+ executable (DLL) (console) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_MEI50522\Speech\SpeechUX\en-US\SpeechUXWiz.exe.mui
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_MEI50522\Speech\SpeechUX\en-US\sapi.cpl.mui
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_MEI50522\Speech\SpeechUX\en-US\speechuxcpl.dll.mui
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_MEI50522\Speech\SpeechUX\ru-RU\SpeechUX.dll.mui
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_MEI50522\Speech\SpeechUX\ru-RU\SpeechUXWiz.exe.mui
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_MEI50522\Speech\SpeechUX\ru-RU\speechuxcpl.dll.mui
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_MEI50522\Speech\SpeechUX\sapi.cpl
|
PE32+ executable (DLL) (console) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_MEI50522\Speech\SpeechUX\speechuxcpl.dll
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_MEI50522\VCRUNTIME140.dll
|
PE32+ executable (DLL) (console) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_MEI50522\VCRUNTIME140_1.dll
|
PE32+ executable (DLL) (console) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_MEI50522\__init__.py
|
Python script, ASCII text executable, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_MEI50522\__pycache__\__init__.cpython-39.pyc
|
python 3.9 byte-compiled
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_MEI50522\_bz2.pyd
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_MEI50522\_ctypes.pyd
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_MEI50522\_decimal.pyd
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_MEI50522\_hashlib.pyd
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_MEI50522\_lzma.pyd
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_MEI50522\_queue.pyd
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_MEI50522\_socket.pyd
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_MEI50522\_ssl.pyd
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_MEI50522\_uuid.pyd
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_MEI50522\base_library.zip
|
Zip archive data, at least v2.0 to extract, compression method=store
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_MEI50522\certifi\cacert.pem
|
ASCII text
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_MEI50522\charset_normalizer\md.cp39-win_amd64.pyd
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_MEI50522\charset_normalizer\md__mypyc.cp39-win_amd64.pyd
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_MEI50522\icon.ico
|
MS Windows icon resource - 1 icon, -128x-128, 32 bits/pixel
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_MEI50522\libcrypto-1_1.dll
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_MEI50522\libffi-7.dll
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_MEI50522\libssl-1_1.dll
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_MEI50522\packs.sha256
|
ASCII text
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_MEI50522\pyarmor_runtime.pyd
|
PE32+ executable (DLL) (console) x86-64 (stripped to external PDB), for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_MEI50522\pyarmor_runtime_000000\pyarmor_runtime.pyd
|
PE32+ executable (DLL) (console) x86-64 (stripped to external PDB), for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_MEI50522\python39.dll
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_MEI50522\pywin32_system32\pywintypes39.dll
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_MEI50522\select.pyd
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_MEI50522\unicodedata.pyd
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_MEI50522\win32api.pyd
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_MEI50522\win32event.pyd
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_MEI68642\Speech\Common\en-US\sapi.dll.mui
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_MEI68642\Speech\Common\sapi.dll
|
PE32+ executable (DLL) (console) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_MEI68642\Speech\Engines\SR\en-US\srloc.dll.mui
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_MEI68642\Speech\Engines\SR\spsreng.dll
|
PE32+ executable (DLL) (console) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_MEI68642\Speech\Engines\SR\spsrx.dll
|
PE32+ executable (DLL) (console) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_MEI68642\Speech\Engines\SR\srloc.dll
|
PE32+ executable (DLL) (console) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_MEI68642\Speech\Engines\TTS\MSTTSEngine.dll
|
PE32+ executable (DLL) (console) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_MEI68642\Speech\Engines\TTS\MSTTSLoc.dll
|
PE32+ executable (DLL) (console) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_MEI68642\Speech\SpeechUX\SPTIP.DLL
|
PE32+ executable (DLL) (console) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_MEI68642\Speech\SpeechUX\SpeechUX.dll
|
PE32+ executable (DLL) (console) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_MEI68642\Speech\SpeechUX\SpeechUXPS.DLL
|
PE32+ executable (DLL) (console) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_MEI68642\Speech\SpeechUX\SpeechUXWiz.exe
|
PE32+ executable (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_MEI68642\Speech\SpeechUX\en-US\SpeechUX.dll.mui
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_MEI68642\Speech\SpeechUX\en-US\SpeechUXRes.dll
|
PE32+ executable (DLL) (console) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_MEI68642\Speech\SpeechUX\en-US\SpeechUXWiz.exe.mui
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_MEI68642\Speech\SpeechUX\en-US\sapi.cpl.mui
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_MEI68642\Speech\SpeechUX\en-US\speechuxcpl.dll.mui
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_MEI68642\Speech\SpeechUX\ru-RU\SpeechUX.dll.mui
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_MEI68642\Speech\SpeechUX\ru-RU\SpeechUXWiz.exe.mui
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_MEI68642\Speech\SpeechUX\ru-RU\speechuxcpl.dll.mui
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_MEI68642\Speech\SpeechUX\sapi.cpl
|
PE32+ executable (DLL) (console) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_MEI68642\Speech\SpeechUX\speechuxcpl.dll
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_MEI68642\VCRUNTIME140.dll
|
PE32+ executable (DLL) (console) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_MEI68642\VCRUNTIME140_1.dll
|
PE32+ executable (DLL) (console) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_MEI68642\__init__.py
|
Python script, ASCII text executable, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_MEI68642\__pycache__\__init__.cpython-39.pyc
|
python 3.9 byte-compiled
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_MEI68642\_bz2.pyd
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_MEI68642\_ctypes.pyd
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_MEI68642\_decimal.pyd
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_MEI68642\_hashlib.pyd
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_MEI68642\_lzma.pyd
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_MEI68642\_queue.pyd
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_MEI68642\_socket.pyd
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_MEI68642\_ssl.pyd
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_MEI68642\_uuid.pyd
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_MEI68642\base_library.zip
|
Zip archive data, at least v2.0 to extract, compression method=store
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_MEI68642\certifi\cacert.pem
|
ASCII text
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_MEI68642\charset_normalizer\md.cp39-win_amd64.pyd
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_MEI68642\charset_normalizer\md__mypyc.cp39-win_amd64.pyd
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_MEI68642\icon.ico
|
MS Windows icon resource - 1 icon, -128x-128, 32 bits/pixel
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_MEI68642\libcrypto-1_1.dll
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_MEI68642\libffi-7.dll
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_MEI68642\libssl-1_1.dll
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_MEI68642\packs.sha256
|
ASCII text
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_MEI68642\pyarmor_runtime.pyd
|
PE32+ executable (DLL) (console) x86-64 (stripped to external PDB), for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_MEI68642\pyarmor_runtime_000000\pyarmor_runtime.pyd
|
PE32+ executable (DLL) (console) x86-64 (stripped to external PDB), for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_MEI68642\python39.dll
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_MEI68642\pywin32_system32\pywintypes39.dll
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_MEI68642\select.pyd
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_MEI68642\unicodedata.pyd
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_MEI68642\win32api.pyd
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_MEI68642\win32event.pyd
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
There are 95 hidden files, click here to show them.
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\datasett.exe
|
"C:\Users\user\Desktop\datasett.exe"
|
||
C:\Users\user\Desktop\datasett.exe
|
"C:\Users\user\Desktop\datasett.exe"
|
||
C:\Windows\System32\cmd.exe
|
C:\Windows\system32\cmd.exe /c schtasks /create /sc MINUTE /mo 15 /tn "VirboUpd" /tr "C:\Users\user\Desktop\datasett.exe"
/f
|
||
C:\Windows\System32\schtasks.exe
|
schtasks /create /sc MINUTE /mo 15 /tn "VirboUpd" /tr "C:\Users\user\Desktop\datasett.exe" /f
|
||
C:\Users\user\Desktop\datasett.exe
|
C:\Users\user\Desktop\datasett.exe
|
||
C:\Users\user\Desktop\datasett.exe
|
C:\Users\user\Desktop\datasett.exe
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
http://google.com/
|
unknown
|
||
https://mahler:8092/site-updates.py
|
unknown
|
||
http://crl.securetrust.com/SGCA.crl
|
unknown
|
||
https://api.telegram.org/bot
|
unknown
|
||
http://.../back.jpeg
|
unknown
|
||
https://www.python.org/download/releases/2.3/mro/.
|
unknown
|
||
https://github.com/mhammond/pywin32
|
unknown
|
||
https://httpbin.org/post
|
unknown
|
||
http://crl.dhimyotis.com/certignarootca.crl0
|
unknown
|
||
http://ocsp.digif
|
unknown
|
||
https://github.com/Ousret/charset_normalizer
|
unknown
|
||
http://ocsp.accv.ese
|
unknown
|
||
http://www.firmaprofesional.com/cps0
|
unknown
|
||
http://www.accv.es/legislacion_c.htm9hxj
|
unknown
|
||
https://python.org/dev/peps/pep-0263/
|
unknown
|
||
https://github.com/tensorflow/datasets/blob/master/tensorflow_datasets/core/utils/resource_utils.py#
|
unknown
|
||
https://github.com/urllib3/urllib3/issues/2920
|
unknown
|
||
http://crl.securetrust.com/SGCA.crl0
|
unknown
|
||
https://yahoo.com/
|
unknown
|
||
http://crl.securetrust.com/STCA.crl0
|
unknown
|
||
https://tools.ietf.org/html/rfc2388#section-4.4
|
unknown
|
||
https://iplogger.org/Drop8VbLink
|
unknown
|
||
https://pastebin.com/raw/uUbM2VAB__path__
|
unknown
|
||
http://www.iana.org/assignments/tls-parameters/tls-parameters.xml#tls-parameters-6
|
unknown
|
||
http://repository.swisssign.com/a
|
unknown
|
||
http://crl.thawte.com/ThawteTimestampingCA.crl0
|
unknown
|
||
https://html.spec.whatwg.org/multipage/
|
unknown
|
||
https://iplogger.org/Drop8otstuk
|
unknown
|
||
http://www.quovadisglobal.com/cps0
|
unknown
|
||
http://www.accv.es/fileadmin/Archivos/certificados/raizaccv1_der.crl
|
unknown
|
||
https://urllib3.readthedocs.io/en/latest/advanced-usage.html#tls-warnings
|
unknown
|
||
http://www.accv.es/fileadmin/Archivos/certificados/raizaccv1_der.crl0
|
unknown
|
||
https://pastebin.com/raw/fn5bRN1F
|
unknown
|
||
https://github.com/urllib3/urllib3/issues/2192#issuecomment-821832963
|
unknown
|
||
https://requests.readthedocs.io
|
unknown
|
||
http://crl.dhimyotis.com/certignarootca.crl
|
unknown
|
||
http://curl.haxx.se/rfc/cookie_spec.html
|
unknown
|
||
http://ocsp.accv.es
|
unknown
|
||
http://crl.xrampsecurity.com/XGCA.crlerr
|
unknown
|
||
http://repository.swisssign.com/
|
unknown
|
||
http://json.org
|
unknown
|
||
https://urllib3.readthedocs.io/en/latest/advanced-usage.html#https-proxy-error-http-proxy
|
unknown
|
||
https://github.com/python/cpython/blob/3.9/Lib/importlib/_bootstrap_external.py#L679-L688
|
unknown
|
||
https://httpbin.org/get
|
unknown
|
||
http://crl.xrampsecurity.com/XGCA.crl
|
unknown
|
||
https://github.com/urllib3/urllib3/issues/2920p
|
unknown
|
||
https://www.python.org
|
unknown
|
||
http://www.robotstxt.org/norobots-rfc.txt
|
unknown
|
||
https://pastebin.com/raw/uUbM2VAB
|
unknown
|
||
http://www.accv.es/legislacion_c.htm0U
|
unknown
|
||
http://ocsp.digi
|
unknown
|
||
https://wwww.certigna.fr/autorites/0m
|
unknown
|
||
http://ocsp.accv.es0
|
unknown
|
||
http://ocsp.thawte.com0
|
unknown
|
||
https://www.python.org/
|
unknown
|
||
https://github.com/python/cpython/blob/839d7893943782ee803536a47f1d4de160314f85/Lib/importlib/reader
|
unknown
|
||
https://api.ipify.org?format=json
|
unknown
|
||
https://httpbin.org/
|
unknown
|
||
https://www.python.org/dev/peps/pep-0205/
|
unknown
|
||
https://wwww.certigna.fr/autorites/
|
unknown
|
||
https://twitter.com/
|
unknown
|
||
http://www.quovadisglobal.com/cps
|
unknown
|
||
http://hg.python.org/cpython/file/603b4d593758/Lib/socket.py#l535
|
unknown
|
||
https://github.com/Unidata/MetPy/blob/a3424de66a44bf3a92b0dcacf4dff82ad7b86712/src/metpy/plots/wx_sy
|
unknown
|
||
https://google.com/
|
unknown
|
||
https://google.com/mail/
|
unknown
|
||
http://google.com/mail/
|
unknown
|
||
http://crl.securetrust.com/STCA.crl
|
unknown
|
||
http://wwwsearch.sf.net/):
|
unknown
|
||
https://ipinfo.io/
|
unknown
|
||
https://pastebin.com/raw/C1vS7y2X
|
unknown
|
||
http://www.accv.es/fileadmin/Archivos/certificados/raizaccv1.crt0
|
unknown
|
||
http://www.accv.es/legislacion_c.htm
|
unknown
|
||
http://tools.ietf.org/html/rfc6125#section-6.4.3
|
unknown
|
||
http://www.cert.fnmt.es/dpcs/A
|
unknown
|
||
http://crl.xrampsecurity.com/XGCA.crl0
|
unknown
|
||
https://www.openssl.org/H
|
unknown
|
||
http://crl.certigna.fr/certignarootca.crl01
|
unknown
|
||
http://www.cert.fnmt.es/dpcs/
|
unknown
|
||
https://google.com/mail
|
unknown
|
||
http://crl.dhimyotis.com/certignarootca.crl$hxw
|
unknown
|
||
http://www.accv.es00
|
unknown
|
||
https://github.com/python/cpython/blob/839d7893943782ee803536a47f1d4de160314f85/Lib/importlib/abc.py
|
unknown
|
||
https://urllib3.readthedocs.io/en/latest/advanced-usage.html#tls-warningspf
|
unknown
|
||
https://foss.heptapod.net/pypy/pypy/-/issues/3539
|
unknown
|
||
https://github.com/urllib3/urllib3/issues/2513#issuecomment-1152559900.
|
unknown
|
There are 76 hidden URLs, click here to show them.
Domains
Name
|
IP
|
Malicious
|
|
---|---|---|---|
iplogger.org
|
104.26.3.46
|
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
104.26.3.46
|
iplogger.org
|
United States
|
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
1CA112C0000
|
direct allocation
|
page read and write
|
||
1CA0EAB7000
|
heap
|
page read and write
|
||
2CBEB848000
|
heap
|
page read and write
|
||
7FFDFAE28000
|
unkown
|
page read and write
|
||
2884E3C4000
|
heap
|
page read and write
|
||
2CBEB848000
|
heap
|
page read and write
|
||
288504C4000
|
heap
|
page read and write
|
||
7FFE120C5000
|
unkown
|
page read and write
|
||
7FFE0EB21000
|
unkown
|
page execute read
|
||
2CBEB844000
|
heap
|
page read and write
|
||
28850934000
|
heap
|
page read and write
|
||
1CA10A4B000
|
heap
|
page read and write
|
||
7FF7996BC000
|
unkown
|
page read and write
|
||
7FFE1A451000
|
unkown
|
page execute read
|
||
1CA11486000
|
heap
|
page read and write
|
||
2CBEB848000
|
heap
|
page read and write
|
||
7FFE014C0000
|
unkown
|
page readonly
|
||
7FFE130C3000
|
unkown
|
page readonly
|
||
2885050F000
|
heap
|
page read and write
|
||
1CA0EA89000
|
heap
|
page read and write
|
||
61BA0000
|
unkown
|
page write copy
|
||
2884E344000
|
heap
|
page read and write
|
||
1D3521D7000
|
heap
|
page read and write
|
||
2CBEB852000
|
heap
|
page read and write
|
||
7FFE13301000
|
unkown
|
page execute read
|
||
7FFE11ED9000
|
unkown
|
page read and write
|
||
2885046D000
|
heap
|
page read and write
|
||
7FFDFA9EF000
|
unkown
|
page write copy
|
||
1D353B20000
|
heap
|
page read and write
|
||
7FFE0C0B7000
|
unkown
|
page readonly
|
||
1CA0EA90000
|
heap
|
page read and write
|
||
1CA0EA85000
|
heap
|
page read and write
|
||
1D3521D7000
|
heap
|
page read and write
|
||
7FFDFB738000
|
unkown
|
page read and write
|
||
61BA0000
|
unkown
|
page write copy
|
||
7FFE148E0000
|
unkown
|
page readonly
|
||
1CA0E9A0000
|
heap
|
page read and write
|
||
2CBEB848000
|
heap
|
page read and write
|
||
28850E50000
|
direct allocation
|
page read and write
|
||
2CBEB848000
|
heap
|
page read and write
|
||
2884E393000
|
heap
|
page read and write
|
||
1CA0EA90000
|
heap
|
page read and write
|
||
288504C4000
|
heap
|
page read and write
|
||
1CA0EAA9000
|
heap
|
page read and write
|
||
1CA0EAFE000
|
heap
|
page read and write
|
||
2884E2D0000
|
heap
|
page read and write
|
||
7FFDFB707000
|
unkown
|
page write copy
|
||
28850A15000
|
heap
|
page read and write
|
||
1CA0EADA000
|
heap
|
page read and write
|
||
288508E4000
|
heap
|
page read and write
|
||
1CA0E9D0000
|
heap
|
page read and write
|
||
7FF7996BE000
|
unkown
|
page readonly
|
||
7FFE11EA7000
|
unkown
|
page readonly
|
||
1CA0EAA9000
|
heap
|
page read and write
|
||
61B83000
|
unkown
|
page read and write
|
||
28850462000
|
heap
|
page read and write
|
||
2884E34F000
|
heap
|
page read and write
|
||
7FFE0B2C1000
|
unkown
|
page execute read
|
||
7FFE11EDD000
|
unkown
|
page readonly
|
||
2CBEB848000
|
heap
|
page read and write
|
||
7FFE0E143000
|
unkown
|
page readonly
|
||
1D3521E2000
|
heap
|
page read and write
|
||
1D3521DB000
|
heap
|
page read and write
|
||
61B9E000
|
unkown
|
page read and write
|
||
2884E346000
|
heap
|
page read and write
|
||
28850924000
|
heap
|
page read and write
|
||
1CA11830000
|
direct allocation
|
page read and write
|
||
28850932000
|
heap
|
page read and write
|
||
7FFDFA9A1000
|
unkown
|
page readonly
|
||
EBCDFFF000
|
unkown
|
page read and write
|
||
28850982000
|
heap
|
page read and write
|
||
7FFDFA735000
|
unkown
|
page execute read
|
||
7FFE0CFB4000
|
unkown
|
page readonly
|
||
7FF7996BE000
|
unkown
|
page readonly
|
||
7FFE10235000
|
unkown
|
page read and write
|
||
28850934000
|
heap
|
page read and write
|
||
1CA0EADA000
|
heap
|
page read and write
|
||
1D3521D4000
|
heap
|
page read and write
|
||
2884E312000
|
heap
|
page read and write
|
||
2884E30C000
|
heap
|
page read and write
|
||
7FFE10313000
|
unkown
|
page read and write
|
||
7FFDFB311000
|
unkown
|
page execute read
|
||
1CA0EAA7000
|
heap
|
page read and write
|
||
1D3521DB000
|
heap
|
page read and write
|
||
2CBEB84B000
|
heap
|
page read and write
|
||
7FFE12E11000
|
unkown
|
page execute read
|
||
2CBEB84D000
|
heap
|
page read and write
|
||
2885085F000
|
heap
|
page read and write
|
||
7FF7996BE000
|
unkown
|
page readonly
|
||
7FFDFA76D000
|
unkown
|
page execute read
|
||
7FFE11524000
|
unkown
|
page readonly
|
||
2CBEB844000
|
heap
|
page read and write
|
||
1D3521BF000
|
heap
|
page read and write
|
||
7FFE0074D000
|
unkown
|
page readonly
|
||
1CA0EAA9000
|
heap
|
page read and write
|
||
1CA0EA8B000
|
heap
|
page read and write
|
||
1CA0EAF8000
|
heap
|
page read and write
|
||
2CBEB857000
|
heap
|
page read and write
|
||
28850983000
|
heap
|
page read and write
|
||
1CA0EA94000
|
heap
|
page read and write
|
||
7FFE11070000
|
unkown
|
page readonly
|
||
7FFE11EC1000
|
unkown
|
page execute read
|
||
1CA0EAE9000
|
heap
|
page read and write
|
||
7FF7996AD000
|
unkown
|
page read and write
|
||
2884E4B0000
|
heap
|
page readonly
|
||
2884E2FC000
|
heap
|
page read and write
|
||
7FFE01320000
|
unkown
|
page readonly
|
||
1CA11070000
|
direct allocation
|
page read and write
|
||
7FFE11EAF000
|
unkown
|
page readonly
|
||
28851290000
|
direct allocation
|
page read and write
|
||
28850511000
|
heap
|
page read and write
|
||
2CBEB84F000
|
heap
|
page read and write
|
||
1CA10F90000
|
direct allocation
|
page read and write
|
||
28850D70000
|
direct allocation
|
page read and write
|
||
2CBEB844000
|
heap
|
page read and write
|
||
2884E3AD000
|
heap
|
page read and write
|
||
7FFDFB05D000
|
unkown
|
page execute read
|
||
288503E0000
|
direct allocation
|
page read and write
|
||
2884E3AC000
|
heap
|
page read and write
|
||
7FFE11BB8000
|
unkown
|
page read and write
|
||
2CBEB855000
|
heap
|
page read and write
|
||
7FFE0E131000
|
unkown
|
page execute read
|
||
2CBEB84B000
|
heap
|
page read and write
|
||
2884E3A0000
|
heap
|
page read and write
|
||
2884E34B000
|
heap
|
page read and write
|
||
1D3521D7000
|
heap
|
page read and write
|
||
1CA0EAF2000
|
heap
|
page read and write
|
||
1CA10FE0000
|
direct allocation
|
page read and write
|
||
2884E33C000
|
heap
|
page read and write
|
||
1CA0EA85000
|
heap
|
page read and write
|
||
2CBEB828000
|
heap
|
page read and write
|
||
1CA0EAA9000
|
heap
|
page read and write
|
||
7FFE0CF80000
|
unkown
|
page readonly
|
||
288504C7000
|
heap
|
page read and write
|
||
7FFE120C6000
|
unkown
|
page readonly
|
||
7FF7996AD000
|
unkown
|
page write copy
|
||
28850539000
|
heap
|
page read and write
|
||
28850730000
|
direct allocation
|
page read and write
|
||
7FFDFAF4E000
|
unkown
|
page readonly
|
||
1CA0EA90000
|
heap
|
page read and write
|
||
1D3521D7000
|
heap
|
page read and write
|
||
7FFE13309000
|
unkown
|
page readonly
|
||
7FFE0C0A0000
|
unkown
|
page readonly
|
||
2CBEB848000
|
heap
|
page read and write
|
||
1CA0EADF000
|
heap
|
page read and write
|
||
2884E394000
|
heap
|
page read and write
|
||
1CA0EAA9000
|
heap
|
page read and write
|
||
2CBEB848000
|
heap
|
page read and write
|
||
1D353C90000
|
heap
|
page read and write
|
||
7FFE00730000
|
unkown
|
page readonly
|
||
28850800000
|
direct allocation
|
page read and write
|
||
1D3521E2000
|
heap
|
page read and write
|
||
1CA10ED1000
|
heap
|
page read and write
|
||
217B46D6000
|
heap
|
page read and write
|
||
7FF799670000
|
unkown
|
page readonly
|
||
1CA10A41000
|
heap
|
page read and write
|
||
28850980000
|
heap
|
page read and write
|
||
7FFE11EAD000
|
unkown
|
page read and write
|
||
1D3521E4000
|
heap
|
page read and write
|
||
7FFDFAFAF000
|
unkown
|
page read and write
|
||
7FFE101E1000
|
unkown
|
page readonly
|
||
28850540000
|
heap
|
page read and write
|
||
7FFE1A450000
|
unkown
|
page readonly
|
||
7FFE10241000
|
unkown
|
page execute read
|
||
2884E2FD000
|
heap
|
page read and write
|
||
1CA0EA73000
|
heap
|
page read and write
|
||
1CA0EAF2000
|
heap
|
page read and write
|
||
7FFE0C0A1000
|
unkown
|
page execute read
|
||
2884E3BE000
|
heap
|
page read and write
|
||
2884E33B000
|
heap
|
page read and write
|
||
1CA0EA6F000
|
heap
|
page read and write
|
||
7FFE10240000
|
unkown
|
page readonly
|
||
28850460000
|
heap
|
page read and write
|
||
7FFDFB050000
|
unkown
|
page execute read
|
||
2CBEB856000
|
heap
|
page read and write
|
||
2884E348000
|
heap
|
page read and write
|
||
7FFE01321000
|
unkown
|
page execute read
|
||
EBCE0FF000
|
stack
|
page read and write
|
||
7FFE0EA70000
|
unkown
|
page readonly
|
||
1D3521D7000
|
heap
|
page read and write
|
||
1CA10A4A000
|
heap
|
page read and write
|
||
7FF799670000
|
unkown
|
page readonly
|
||
1D3521E1000
|
heap
|
page read and write
|
||
CE3E1D6000
|
stack
|
page read and write
|
||
1CA0EABB000
|
heap
|
page read and write
|
||
1CA11900000
|
direct allocation
|
page read and write
|
||
1CA109C0000
|
direct allocation
|
page read and write
|
||
2884E365000
|
heap
|
page read and write
|
||
1CA0EADA000
|
heap
|
page read and write
|
||
1CA0EAF8000
|
heap
|
page read and write
|
||
7FFE0EB20000
|
unkown
|
page readonly
|
||
1D3521D7000
|
heap
|
page read and write
|
||
7FFE10231000
|
unkown
|
page execute read
|
||
7FFDFAFC0000
|
unkown
|
page readonly
|
||
7FFE0EB41000
|
unkown
|
page execute read
|
||
2CBEB848000
|
heap
|
page read and write
|
||
318D5BE000
|
stack
|
page read and write
|
||
1CA0EA2E000
|
heap
|
page read and write
|
||
1D3521D9000
|
heap
|
page read and write
|
||
1D3521E6000
|
heap
|
page read and write
|
||
2884E344000
|
heap
|
page read and write
|
||
1D3521D5000
|
heap
|
page read and write
|
||
7FFE001A1000
|
unkown
|
page execute read
|
||
1CA10F31000
|
heap
|
page read and write
|
||
7FFE0E130000
|
unkown
|
page readonly
|
||
7FFDFAA21000
|
unkown
|
page execute read
|
||
2884E314000
|
heap
|
page read and write
|
||
1D3521D8000
|
heap
|
page read and write
|
||
7FFE1A481000
|
unkown
|
page readonly
|
||
1CA10A00000
|
direct allocation
|
page read and write
|
||
1D3521DB000
|
heap
|
page read and write
|
||
2884E370000
|
heap
|
page read and write
|
||
7FFE1A486000
|
unkown
|
page read and write
|
||
CE4C1CF000
|
stack
|
page read and write
|
||
7FFDFA9F0000
|
unkown
|
page read and write
|
||
2CBEB848000
|
heap
|
page read and write
|
||
1CA10880000
|
direct allocation
|
page read and write
|
||
7FFDFAFAB000
|
unkown
|
page readonly
|
||
7FFDFA97B000
|
unkown
|
page readonly
|
||
1CA10AE3000
|
heap
|
page read and write
|
||
2884E362000
|
heap
|
page read and write
|
||
1D3521D3000
|
heap
|
page read and write
|
||
28850946000
|
heap
|
page read and write
|
||
28850461000
|
heap
|
page read and write
|
||
1CA0EA8D000
|
heap
|
page read and write
|
||
288508E2000
|
heap
|
page read and write
|
||
2884E33D000
|
heap
|
page read and write
|
||
2CBEB848000
|
heap
|
page read and write
|
||
2884E3C1000
|
heap
|
page read and write
|
||
7FF7996BE000
|
unkown
|
page readonly
|
||
1CA0EA90000
|
heap
|
page read and write
|
||
2885086F000
|
heap
|
page read and write
|
||
1CA0EB0A000
|
heap
|
page read and write
|
||
2884E346000
|
heap
|
page read and write
|
||
7FFE1025E000
|
unkown
|
page readonly
|
||
7FFDFB754000
|
unkown
|
page read and write
|
||
288508FF000
|
heap
|
page read and write
|
||
1D3521E4000
|
heap
|
page read and write
|
||
61BA4000
|
unkown
|
page readonly
|
||
1CA0EAA7000
|
heap
|
page read and write
|
||
7FF7996AD000
|
unkown
|
page read and write
|
||
7FFE00755000
|
unkown
|
page read and write
|
||
2884E33F000
|
heap
|
page read and write
|
||
7FFDFB70A000
|
unkown
|
page read and write
|
||
7FFE01473000
|
unkown
|
page readonly
|
||
7FFE0CFAD000
|
unkown
|
page read and write
|
||
2884E367000
|
heap
|
page read and write
|
||
288504DD000
|
heap
|
page read and write
|
||
7FFE00183000
|
unkown
|
page readonly
|
||
28850915000
|
heap
|
page read and write
|
||
2CBEB848000
|
heap
|
page read and write
|
||
7FFE130C0000
|
unkown
|
page readonly
|
||
28850E10000
|
direct allocation
|
page read and write
|
||
7FF799671000
|
unkown
|
page execute read
|
||
1D3521E5000
|
heap
|
page read and write
|
||
7FFDFB9B1000
|
unkown
|
page execute read
|
||
7FFE117E5000
|
unkown
|
page readonly
|
||
7FFE130C5000
|
unkown
|
page read and write
|
||
7FFDFB291000
|
unkown
|
page readonly
|
||
28850AD0000
|
direct allocation
|
page read and write
|
||
1D3521D4000
|
heap
|
page read and write
|
||
2884E346000
|
heap
|
page read and write
|
||
2884E3CE000
|
heap
|
page read and write
|
||
1CA10B80000
|
direct allocation
|
page read and write
|
||
F182FEA000
|
stack
|
page read and write
|
||
1D3521CE000
|
heap
|
page read and write
|
||
2CBEB844000
|
heap
|
page read and write
|
||
2CBEB844000
|
heap
|
page read and write
|
||
28850901000
|
heap
|
page read and write
|
||
1CA0EA89000
|
heap
|
page read and write
|
||
288504F6000
|
heap
|
page read and write
|
||
CE4C1DF000
|
stack
|
page read and write
|
||
1CA10D91000
|
heap
|
page read and write
|
||
7FFDFACED000
|
unkown
|
page readonly
|
||
2884E344000
|
heap
|
page read and write
|
||
1D352160000
|
heap
|
page read and write
|
||
1D3521D7000
|
heap
|
page read and write
|
||
1D3521DA000
|
heap
|
page read and write
|
||
7FFE11500000
|
unkown
|
page readonly
|
||
1CA11260000
|
direct allocation
|
page read and write
|
||
7FFE1030E000
|
unkown
|
page readonly
|
||
7FFE00749000
|
unkown
|
page readonly
|
||
7FFDFB2DF000
|
unkown
|
page read and write
|
||
7FF7996B0000
|
unkown
|
page read and write
|
||
2885090C000
|
heap
|
page read and write
|
||
1D3521DA000
|
heap
|
page read and write
|
||
7FFDFB2E7000
|
unkown
|
page readonly
|
||
7FFE130C1000
|
unkown
|
page execute read
|
||
7FF79969A000
|
unkown
|
page readonly
|
||
1D3521D7000
|
heap
|
page read and write
|
||
7FFE10301000
|
unkown
|
page execute read
|
||
7FFE0B2C5000
|
unkown
|
page readonly
|
||
1CA0EA90000
|
heap
|
page read and write
|
||
7FFDFA94A000
|
unkown
|
page readonly
|
||
2CBEB848000
|
heap
|
page read and write
|
||
288500E0000
|
direct allocation
|
page read and write
|
||
1D3521D7000
|
heap
|
page read and write
|
||
28850513000
|
heap
|
page read and write
|
||
2884E393000
|
heap
|
page read and write
|
||
1CA0EAA9000
|
heap
|
page read and write
|
||
2884E3CD000
|
heap
|
page read and write
|
||
288504F7000
|
heap
|
page read and write
|
||
1D3521D7000
|
heap
|
page read and write
|
||
28850514000
|
heap
|
page read and write
|
||
2CBEB848000
|
heap
|
page read and write
|
||
28850465000
|
heap
|
page read and write
|
||
1D352170000
|
heap
|
page readonly
|
||
7FFE0CF81000
|
unkown
|
page execute read
|
||
1CA10BD0000
|
direct allocation
|
page read and write
|
||
28850924000
|
heap
|
page read and write
|
||
61B99000
|
unkown
|
page read and write
|
||
1CA0EA6F000
|
heap
|
page read and write
|
||
28850A1F000
|
heap
|
page read and write
|
||
28850850000
|
heap
|
page read and write
|
||
2885046D000
|
heap
|
page read and write
|
||
7FFE11074000
|
unkown
|
page readonly
|
||
7FFDFA6DD000
|
unkown
|
page execute read
|
||
7FFE11523000
|
unkown
|
page read and write
|
||
2885095E000
|
heap
|
page read and write
|
||
1D3521E6000
|
heap
|
page read and write
|
||
1CA0EADA000
|
heap
|
page read and write
|
||
2884E346000
|
heap
|
page read and write
|
||
CE4C5CF000
|
stack
|
page read and write
|
||
2885052B000
|
heap
|
page read and write
|
||
2884E346000
|
heap
|
page read and write
|
||
28850420000
|
direct allocation
|
page read and write
|
||
1D3521D9000
|
heap
|
page read and write
|
||
288504DD000
|
heap
|
page read and write
|
||
288504DD000
|
heap
|
page read and write
|
||
28850A1E000
|
heap
|
page read and write
|
||
7FFDFAFCD000
|
unkown
|
page execute read
|
||
7FF799670000
|
unkown
|
page readonly
|
||
7FF7996BE000
|
unkown
|
page readonly
|
||
7FFE0018E000
|
unkown
|
page read and write
|
||
7FFE0E170000
|
unkown
|
page readonly
|
||
2884E4C0000
|
heap
|
page read and write
|
||
7FFE013BC000
|
unkown
|
page read and write
|
||
1CA103B0000
|
heap
|
page read and write
|
||
7FFE01395000
|
unkown
|
page readonly
|
||
2884FCC0000
|
heap
|
page read and write
|
||
2884E34B000
|
heap
|
page read and write
|
||
F182FE4000
|
stack
|
page read and write
|
||
1CA11190000
|
direct allocation
|
page read and write
|
||
7FFDFB04A000
|
unkown
|
page execute read
|
||
7FFE01443000
|
unkown
|
page execute read
|
||
1D3521D7000
|
heap
|
page read and write
|
||
1CA102B0000
|
direct allocation
|
page read and write
|
||
1CA10C10000
|
heap
|
page read and write
|
||
2CBEB848000
|
heap
|
page read and write
|
||
2884E365000
|
heap
|
page read and write
|
||
1CA10F0E000
|
heap
|
page read and write
|
||
7FFDFB75F000
|
unkown
|
page readonly
|
||
2CBEB848000
|
heap
|
page read and write
|
||
1CA0EB03000
|
heap
|
page read and write
|
||
7FFDFB303000
|
unkown
|
page readonly
|
||
288508C7000
|
heap
|
page read and write
|
||
1D3521D7000
|
heap
|
page read and write
|
||
2884E30E000
|
heap
|
page read and write
|
||
318CFD7000
|
stack
|
page read and write
|
||
7FFDFAA13000
|
unkown
|
page readonly
|
||
2884E348000
|
heap
|
page read and write
|
||
7FFE11076000
|
unkown
|
page read and write
|
||
28850512000
|
heap
|
page read and write
|
||
2CBEB844000
|
heap
|
page read and write
|
||
288505F0000
|
direct allocation
|
page read and write
|
||
28850A15000
|
heap
|
page read and write
|
||
7FF7996BE000
|
unkown
|
page readonly
|
||
2884E362000
|
heap
|
page read and write
|
||
7FFE0CFD1000
|
unkown
|
page readonly
|
||
7FFE11ED1000
|
unkown
|
page readonly
|
||
7FFDFB039000
|
unkown
|
page execute read
|
||
1CA0EA77000
|
heap
|
page read and write
|
||
1CA10B40000
|
direct allocation
|
page read and write
|
||
7FF799671000
|
unkown
|
page execute read
|
||
7FFE0EB40000
|
unkown
|
page readonly
|
||
2CBEB857000
|
heap
|
page read and write
|
||
2884E3B6000
|
heap
|
page read and write
|
||
1D3521E5000
|
heap
|
page read and write
|
||
2884E39F000
|
heap
|
page read and write
|
||
61BA4000
|
unkown
|
page readonly
|
||
7FFDFAEA0000
|
unkown
|
page readonly
|
||
1CA10D90000
|
heap
|
page read and write
|
||
2885046A000
|
heap
|
page read and write
|
||
28850A15000
|
heap
|
page read and write
|
||
7FFE11BB0000
|
unkown
|
page readonly
|
||
7FFE1150D000
|
unkown
|
page readonly
|
||
7FFE101D0000
|
unkown
|
page readonly
|
||
1D3521D8000
|
heap
|
page read and write
|
||
61B01000
|
unkown
|
page execute read
|
||
28850935000
|
heap
|
page read and write
|
||
7FFDFB2B7000
|
unkown
|
page readonly
|
||
1D3521D8000
|
heap
|
page read and write
|
||
1CA0EAE9000
|
heap
|
page read and write
|
||
7FFE13313000
|
unkown
|
page readonly
|
||
28850981000
|
heap
|
page read and write
|
||
7FFE001BE000
|
unkown
|
page read and write
|
||
2885086F000
|
heap
|
page read and write
|
||
7FFE0B2C0000
|
unkown
|
page readonly
|
||
2CBEB857000
|
heap
|
page read and write
|
||
7FFDFB20F000
|
unkown
|
page readonly
|
||
2CBEB84B000
|
heap
|
page read and write
|
||
2884E2EE000
|
heap
|
page read and write
|
||
2884E34F000
|
heap
|
page read and write
|
||
1CA10370000
|
direct allocation
|
page read and write
|
||
28850020000
|
direct allocation
|
page read and write
|
||
28850944000
|
heap
|
page read and write
|
||
28850851000
|
heap
|
page read and write
|
||
7FFE0C0A5000
|
unkown
|
page readonly
|
||
288508DD000
|
heap
|
page read and write
|
||
2884E3B8000
|
heap
|
page read and write
|
||
1CA0EAE9000
|
heap
|
page read and write
|
||
7FFE001B0000
|
unkown
|
page readonly
|
||
7FFDFAF52000
|
unkown
|
page readonly
|
||
1CA110B0000
|
direct allocation
|
page read and write
|
||
1D3521D7000
|
heap
|
page read and write
|
||
7FFDFB9B0000
|
unkown
|
page readonly
|
||
1CA0EADA000
|
heap
|
page read and write
|
||
7FFDFBA62000
|
unkown
|
page readonly
|
||
7FFE0C0B0000
|
unkown
|
page readonly
|
||
7FFE012F1000
|
unkown
|
page execute read
|
||
1CA0EADA000
|
heap
|
page read and write
|
||
7FFE11501000
|
unkown
|
page execute read
|
||
7FFE0B2C8000
|
unkown
|
page read and write
|
||
7FFE0EB66000
|
unkown
|
page readonly
|
||
288508E6000
|
heap
|
page read and write
|
||
217B448C000
|
heap
|
page read and write
|
||
7FFDFA6D1000
|
unkown
|
page execute read
|
||
1D3521DC000
|
heap
|
page read and write
|
||
7FFE0CF86000
|
unkown
|
page readonly
|
||
2CBEB810000
|
heap
|
page read and write
|
||
7FFE148E1000
|
unkown
|
page execute read
|
||
2CBEB83E000
|
heap
|
page read and write
|
||
288504DD000
|
heap
|
page read and write
|
||
1CA0EA8B000
|
heap
|
page read and write
|
||
1D3521D7000
|
heap
|
page read and write
|
||
2CBEB844000
|
heap
|
page read and write
|
||
7FFE0C0BF000
|
unkown
|
page readonly
|
||
1CA10A49000
|
heap
|
page read and write
|
||
1D3521B0000
|
heap
|
page read and write
|
||
7FFE12E14000
|
unkown
|
page readonly
|
||
2884E342000
|
heap
|
page read and write
|
||
2CBEB857000
|
heap
|
page read and write
|
||
61B7F000
|
unkown
|
page write copy
|
||
1CA0EAE4000
|
heap
|
page read and write
|
||
2CBEB848000
|
heap
|
page read and write
|
||
28850466000
|
heap
|
page read and write
|
||
7FFE1025A000
|
unkown
|
page read and write
|
||
61B83000
|
unkown
|
page read and write
|
||
2884E314000
|
heap
|
page read and write
|
||
7FFE01304000
|
unkown
|
page readonly
|
||
7FFE148E6000
|
unkown
|
page read and write
|
||
2884E33E000
|
heap
|
page read and write
|
||
7FF7996BC000
|
unkown
|
page read and write
|
||
2884E3B6000
|
heap
|
page read and write
|
||
1D3521D8000
|
heap
|
page read and write
|
||
2CBEB848000
|
heap
|
page read and write
|
||
7FFDFBABF000
|
unkown
|
page read and write
|
||
28850541000
|
heap
|
page read and write
|
||
7FFDFB025000
|
unkown
|
page execute read
|
||
288504C7000
|
heap
|
page read and write
|
||
7FFDFB307000
|
unkown
|
page readonly
|
||
28850A34000
|
heap
|
page read and write
|
||
7FFDFB733000
|
unkown
|
page read and write
|
||
1CA0EAE9000
|
heap
|
page read and write
|
||
7FFE120C3000
|
unkown
|
page readonly
|
||
1CA0EA55000
|
heap
|
page read and write
|
||
7FFDFBA5E000
|
unkown
|
page readonly
|
||
7FFDFAFB1000
|
unkown
|
page readonly
|
||
7FFE001C1000
|
unkown
|
page readonly
|
||
2CBEB857000
|
heap
|
page read and write
|
||
1CA0EA6F000
|
heap
|
page read and write
|
||
28850A38000
|
heap
|
page read and write
|
||
28850A15000
|
heap
|
page read and write
|
||
2884E32B000
|
heap
|
page read and write
|
||
28850A48000
|
heap
|
page read and write
|
||
28850560000
|
direct allocation
|
page read and write
|
||
1CA0EA73000
|
heap
|
page read and write
|
||
2884E325000
|
heap
|
page read and write
|
||
7FFE11EA0000
|
unkown
|
page readonly
|
||
2CBEB847000
|
heap
|
page read and write
|
||
7FFDFAE44000
|
unkown
|
page read and write
|
||
7FFDFBA12000
|
unkown
|
page readonly
|
||
7FFE00171000
|
unkown
|
page execute read
|
||
2884E39C000
|
heap
|
page read and write
|
||
1D3521D8000
|
heap
|
page read and write
|
||
288508EB000
|
heap
|
page read and write
|
||
28850EB4000
|
heap
|
page read and write
|
||
1CA1148D000
|
heap
|
page read and write
|
||
7FFE1151D000
|
unkown
|
page read and write
|
||
61B9E000
|
unkown
|
page read and write
|
||
2884E33F000
|
heap
|
page read and write
|
||
1CA0EA85000
|
heap
|
page read and write
|
||
288508ED000
|
heap
|
page read and write
|
||
1CA0EB0A000
|
heap
|
page read and write
|
||
1CA0EA8D000
|
heap
|
page read and write
|
||
7FF799670000
|
unkown
|
page readonly
|
||
1CA10A4D000
|
heap
|
page read and write
|
||
1CA0EAF8000
|
heap
|
page read and write
|
||
28850A2A000
|
heap
|
page read and write
|
||
28850944000
|
heap
|
page read and write
|
||
28851320000
|
direct allocation
|
page read and write
|
||
288508E9000
|
heap
|
page read and write
|
||
7FFE014C1000
|
unkown
|
page execute read
|
||
28850944000
|
heap
|
page read and write
|
||
7FFE013D1000
|
unkown
|
page execute read
|
||
1D3521DA000
|
heap
|
page read and write
|
||
1CA0EAB2000
|
heap
|
page read and write
|
||
28850EB0000
|
heap
|
page read and write
|
||
7FFE117E8000
|
unkown
|
page read and write
|
||
F182FEC000
|
stack
|
page read and write
|
||
7FFE148E7000
|
unkown
|
page readonly
|
||
1CA10ED5000
|
heap
|
page read and write
|
||
EBCDEFC000
|
stack
|
page read and write
|
||
7FFE0EB31000
|
unkown
|
page read and write
|
||
2884E33C000
|
heap
|
page read and write
|
||
7FFDFBAC1000
|
unkown
|
page readonly
|
||
1CA0EAE0000
|
heap
|
page read and write
|
||
1CA0EAFE000
|
heap
|
page read and write
|
||
28850260000
|
direct allocation
|
page read and write
|
||
28850527000
|
heap
|
page read and write
|
||
28850B20000
|
direct allocation
|
page read and write
|
||
2CBEB848000
|
heap
|
page read and write
|
||
7FFDFAC5E000
|
unkown
|
page readonly
|
||
1CA0EA85000
|
heap
|
page read and write
|
||
2884E334000
|
heap
|
page read and write
|
||
61B99000
|
unkown
|
page read and write
|
||
2CBEB84B000
|
heap
|
page read and write
|
||
28850955000
|
heap
|
page read and write
|
||
7FFE0C0BD000
|
unkown
|
page read and write
|
||
1CA0EA8D000
|
heap
|
page read and write
|
||
1D352180000
|
heap
|
page read and write
|
||
28850461000
|
heap
|
page read and write
|
||
7FFE11071000
|
unkown
|
page execute read
|
||
1CA0EA90000
|
heap
|
page read and write
|
||
7FFE0CF9D000
|
unkown
|
page readonly
|
||
1D3521D4000
|
heap
|
page read and write
|
||
28850540000
|
heap
|
page read and write
|
||
7FFE0E17E000
|
unkown
|
page read and write
|
||
28850A2A000
|
heap
|
page read and write
|
||
7FFDFAE64000
|
unkown
|
page read and write
|
||
F1833CF000
|
stack
|
page read and write
|
||
1CA0EAE4000
|
heap
|
page read and write
|
||
7FFE120C1000
|
unkown
|
page execute read
|
||
2884E349000
|
heap
|
page read and write
|
||
28850521000
|
heap
|
page read and write
|
||
7FFE13311000
|
unkown
|
page read and write
|
||
7FFE10314000
|
unkown
|
page readonly
|
||
7FFE130C6000
|
unkown
|
page readonly
|
||
28850A15000
|
heap
|
page read and write
|
||
7FFE117E0000
|
unkown
|
page readonly
|
||
7FFE001A0000
|
unkown
|
page readonly
|
||
28850630000
|
heap
|
page read and write
|
||
1D3521E6000
|
heap
|
page read and write
|
||
CE3E1EC000
|
stack
|
page read and write
|
||
28850462000
|
heap
|
page read and write
|
||
217B4420000
|
heap
|
page read and write
|
||
1CA10840000
|
direct allocation
|
page read and write
|
||
7FFDFA749000
|
unkown
|
page execute read
|
||
1D3521D7000
|
heap
|
page read and write
|
||
28850527000
|
heap
|
page read and write
|
||
28850D30000
|
direct allocation
|
page read and write
|
||
7FFDFAE6F000
|
unkown
|
page readonly
|
||
7FFE0CF91000
|
unkown
|
page execute read
|
||
1CA0EA80000
|
heap
|
page read and write
|
||
2CBEB848000
|
heap
|
page read and write
|
||
288508F7000
|
heap
|
page read and write
|
||
1D3521D7000
|
heap
|
page read and write
|
||
2CBEB848000
|
heap
|
page read and write
|
||
1CA0EA90000
|
heap
|
page read and write
|
||
7FFDFB26B000
|
unkown
|
page readonly
|
||
1D3521E5000
|
heap
|
page read and write
|
||
288505A0000
|
direct allocation
|
page read and write
|
||
288508C6000
|
heap
|
page read and write
|
||
CE4C1DA000
|
stack
|
page read and write
|
||
7FFDFB2E5000
|
unkown
|
page read and write
|
||
1CA0EA80000
|
heap
|
page read and write
|
||
7FFE110F0000
|
unkown
|
page readonly
|
||
28850512000
|
heap
|
page read and write
|
||
7FFE148E4000
|
unkown
|
page readonly
|
||
28850945000
|
heap
|
page read and write
|
||
1CA0EA18000
|
heap
|
page read and write
|
||
7FF7996AD000
|
unkown
|
page write copy
|
||
2884E344000
|
heap
|
page read and write
|
||
28850946000
|
heap
|
page read and write
|
||
28850924000
|
heap
|
page read and write
|
||
1CA10F05000
|
heap
|
page read and write
|
||
2885085A000
|
heap
|
page read and write
|
||
7FFE0CF90000
|
unkown
|
page readonly
|
||
28850855000
|
heap
|
page read and write
|
||
7FFE1A471000
|
unkown
|
page execute read
|
||
2884E347000
|
heap
|
page read and write
|
||
7FFE12E10000
|
unkown
|
page readonly
|
||
2884E34F000
|
heap
|
page read and write
|
||
288508EA000
|
heap
|
page read and write
|
||
28850BB0000
|
direct allocation
|
page read and write
|
||
7FFE014CE000
|
unkown
|
page readonly
|
||
2CBEB849000
|
heap
|
page read and write
|
||
7FFDFB5DD000
|
unkown
|
page readonly
|
||
2884E33F000
|
heap
|
page read and write
|
||
1CA0EAEC000
|
heap
|
page read and write
|
||
1D3521D8000
|
heap
|
page read and write
|
||
7FF799671000
|
unkown
|
page execute read
|
||
7FFE110F6000
|
unkown
|
page readonly
|
||
2CBEB84B000
|
heap
|
page read and write
|
||
1D3521D7000
|
heap
|
page read and write
|
||
61B00000
|
unkown
|
page readonly
|
||
2884E3A3000
|
heap
|
page read and write
|
||
7FFE0E14E000
|
unkown
|
page read and write
|
||
7FF7996BE000
|
unkown
|
page readonly
|
||
7FF799671000
|
unkown
|
page execute read
|
||
2CBEB9F0000
|
heap
|
page readonly
|
||
7FFDFB71B000
|
unkown
|
page write copy
|
||
1CA102F0000
|
direct allocation
|
page read and write
|
||
2884E367000
|
heap
|
page read and write
|
||
7FFE101E6000
|
unkown
|
page read and write
|
||
288504BA000
|
heap
|
page read and write
|
||
28850A27000
|
heap
|
page read and write
|
||
1D3521D4000
|
heap
|
page read and write
|
||
2884E362000
|
heap
|
page read and write
|
||
2884E3CD000
|
heap
|
page read and write
|
||
1CA117B0000
|
direct allocation
|
page read and write
|
||
7FFE110F9000
|
unkown
|
page readonly
|
||
288502A0000
|
direct allocation
|
page read and write
|
||
28850858000
|
heap
|
page read and write
|
||
217B4450000
|
heap
|
page read and write
|
||
1CA117F0000
|
direct allocation
|
page read and write
|
||
2CBEB848000
|
heap
|
page read and write
|
||
28850515000
|
heap
|
page read and write
|
||
1CA11710000
|
direct allocation
|
page read and write
|
||
7FF799670000
|
unkown
|
page readonly
|
||
1CA0EA8D000
|
heap
|
page read and write
|
||
1CA10D10000
|
direct allocation
|
page read and write
|
||
2CBEB848000
|
heap
|
page read and write
|
||
2CBEB848000
|
heap
|
page read and write
|
||
7FFE12E12000
|
unkown
|
page readonly
|
||
7FF7996AD000
|
unkown
|
page read and write
|
||
288508DB000
|
heap
|
page read and write
|
||
1D3521D4000
|
heap
|
page read and write
|
||
1CA0EADA000
|
heap
|
page read and write
|
||
7FFE0C0A9000
|
unkown
|
page readonly
|
||
1CA0EAA7000
|
heap
|
page read and write
|
||
2884E394000
|
heap
|
page read and write
|
||
7FFE0EB59000
|
unkown
|
page readonly
|
||
7FFE013D0000
|
unkown
|
page readonly
|
||
288508ED000
|
heap
|
page read and write
|
||
1D3521E1000
|
heap
|
page read and write
|
||
2884E3C8000
|
heap
|
page read and write
|
||
7FFDFB6F4000
|
unkown
|
page read and write
|
||
2885051F000
|
heap
|
page read and write
|
||
2CBEB848000
|
heap
|
page read and write
|
||
2CBEB857000
|
heap
|
page read and write
|
||
288504DE000
|
heap
|
page read and write
|
||
7FFE0130E000
|
unkown
|
page readonly
|
||
1D3521D7000
|
heap
|
page read and write
|
||
7FFDFAE04000
|
unkown
|
page read and write
|
||
1CA0EA89000
|
heap
|
page read and write
|
||
1D3521D7000
|
heap
|
page read and write
|
||
1D3521DA000
|
heap
|
page read and write
|
||
28850A16000
|
heap
|
page read and write
|
||
2884E3A2000
|
heap
|
page read and write
|
||
28850539000
|
heap
|
page read and write
|
||
217B44A7000
|
heap
|
page read and write
|
||
1CA0EA8B000
|
heap
|
page read and write
|
||
2885087D000
|
heap
|
page read and write
|
||
7FFDFA91D000
|
unkown
|
page execute read
|
||
2885088E000
|
heap
|
page read and write
|
||
2CBEB848000
|
heap
|
page read and write
|
||
2CBEB857000
|
heap
|
page read and write
|
||
2884E393000
|
heap
|
page read and write
|
||
28850EB3000
|
heap
|
page read and write
|
||
28850BF0000
|
direct allocation
|
page read and write
|
||
1D3521D4000
|
heap
|
page read and write
|
||
2884E351000
|
heap
|
page read and write
|
||
CE4C1EA000
|
stack
|
page read and write
|
||
CE4C1D4000
|
stack
|
page read and write
|
||
1CA11100000
|
direct allocation
|
page read and write
|
||
7FFDFAEA1000
|
unkown
|
page execute read
|
||
2884E362000
|
heap
|
page read and write
|
||
7FF79969A000
|
unkown
|
page readonly
|
||
1CA11750000
|
direct allocation
|
page read and write
|
||
28850866000
|
heap
|
page read and write
|
||
288508D8000
|
heap
|
page read and write
|
||
2CBEB856000
|
heap
|
page read and write
|
||
1CA10B39000
|
heap
|
page read and write
|
||
1D3521E6000
|
heap
|
page read and write
|
||
1CA10B0C000
|
heap
|
page read and write
|
||
2CBED1F0000
|
heap
|
page read and write
|
||
7FF799671000
|
unkown
|
page execute read
|
||
2885097A000
|
heap
|
page read and write
|
||
1CA0EA89000
|
heap
|
page read and write
|
||
28850E9E000
|
heap
|
page read and write
|
||
28850523000
|
heap
|
page read and write
|
||
2884E365000
|
heap
|
page read and write
|
||
2884E3C8000
|
heap
|
page read and write
|
||
2884E34F000
|
heap
|
page read and write
|
||
7FFE0EB65000
|
unkown
|
page read and write
|
||
1CA11220000
|
direct allocation
|
page read and write
|
||
2884E348000
|
heap
|
page read and write
|
||
2884E30E000
|
heap
|
page read and write
|
||
7FF799671000
|
unkown
|
page execute read
|
||
1D3521DE000
|
heap
|
page read and write
|
||
1D3521D8000
|
heap
|
page read and write
|
||
2884E365000
|
heap
|
page read and write
|
||
2884E3C3000
|
heap
|
page read and write
|
||
1D3521CE000
|
heap
|
page read and write
|
||
1D3521E6000
|
heap
|
page read and write
|
||
1D3521B8000
|
heap
|
page read and write
|
||
1D3521E5000
|
heap
|
page read and write
|
||
2884E3D0000
|
heap
|
page read and write
|
||
7FFE1A459000
|
unkown
|
page readonly
|
||
1D3521DD000
|
heap
|
page read and write
|
||
2884E3A8000
|
heap
|
page read and write
|
||
2884E33F000
|
heap
|
page read and write
|
||
7FFE014D3000
|
unkown
|
page read and write
|
||
28850522000
|
heap
|
page read and write
|
||
288504B4000
|
heap
|
page read and write
|
||
1D3521DB000
|
heap
|
page read and write
|
||
1CA10F21000
|
heap
|
page read and write
|
||
2884E3C4000
|
heap
|
page read and write
|
||
CE3E5CE000
|
stack
|
page read and write
|
||
2884E32E000
|
heap
|
page read and write
|
||
1D3521D7000
|
heap
|
page read and write
|
||
F1835BF000
|
stack
|
page read and write
|
||
288512E0000
|
direct allocation
|
page read and write
|
||
7FFE01393000
|
unkown
|
page execute read
|
||
7FFE11BB1000
|
unkown
|
page execute read
|
||
7FFE014D4000
|
unkown
|
page readonly
|
||
2884E392000
|
heap
|
page read and write
|
||
1CA0EA8D000
|
heap
|
page read and write
|
||
28850CE0000
|
direct allocation
|
page read and write
|
||
288508F7000
|
heap
|
page read and write
|
||
2884E393000
|
heap
|
page read and write
|
||
2884E393000
|
heap
|
page read and write
|
||
7FFDFAFC1000
|
unkown
|
page execute read
|
||
1CA0EA8D000
|
heap
|
page read and write
|
||
1CA0EA89000
|
heap
|
page read and write
|
||
28850A2A000
|
heap
|
page read and write
|
||
2CBEB846000
|
heap
|
page read and write
|
||
288508F2000
|
heap
|
page read and write
|
||
2884E397000
|
heap
|
page read and write
|
||
217B4430000
|
heap
|
page read and write
|
||
1D3521D9000
|
heap
|
page read and write
|
||
2884E36C000
|
heap
|
page read and write
|
||
1CA10AE4000
|
heap
|
page read and write
|
||
28850DD0000
|
direct allocation
|
page read and write
|
||
2884E367000
|
heap
|
page read and write
|
||
2884E394000
|
heap
|
page read and write
|
||
1D3521D7000
|
heap
|
page read and write
|
||
1CA0EA82000
|
heap
|
page read and write
|
||
2884E362000
|
heap
|
page read and write
|
||
28850470000
|
heap
|
page read and write
|
||
1D3521D7000
|
heap
|
page read and write
|
||
7FFE117E9000
|
unkown
|
page readonly
|
||
1CA0EADA000
|
heap
|
page read and write
|
||
7FF79969A000
|
unkown
|
page readonly
|
||
28850461000
|
heap
|
page read and write
|
||
2CBEB844000
|
heap
|
page read and write
|
||
7FF79969A000
|
unkown
|
page readonly
|
||
1CA103B5000
|
heap
|
page read and write
|
||
2885090B000
|
heap
|
page read and write
|
||
288508E9000
|
heap
|
page read and write
|
||
2884E33F000
|
heap
|
page read and write
|
||
1CA0EAE9000
|
heap
|
page read and write
|
||
7FF7996BC000
|
unkown
|
page read and write
|
||
7FFE1A470000
|
unkown
|
page readonly
|
||
7FF7996AD000
|
unkown
|
page write copy
|
||
7FFE01468000
|
unkown
|
page read and write
|
||
2884E327000
|
heap
|
page read and write
|
||
7FFDFA75A000
|
unkown
|
page execute read
|
||
217B44A5000
|
heap
|
page read and write
|
||
1D3521DD000
|
heap
|
page read and write
|
||
1D3521D7000
|
heap
|
page read and write
|
||
7FFE0CF83000
|
unkown
|
page readonly
|
||
7FFE0CFB3000
|
unkown
|
page read and write
|
||
318D7AE000
|
stack
|
page read and write
|
||
7FF799671000
|
unkown
|
page execute read
|
||
7FFE101E7000
|
unkown
|
page readonly
|
||
7FFE01445000
|
unkown
|
page readonly
|
||
1CA0EB03000
|
heap
|
page read and write
|
||
1CA0EB0A000
|
heap
|
page read and write
|
||
2CBEB84D000
|
heap
|
page read and write
|
||
2CBEB848000
|
heap
|
page read and write
|
||
1CA0EA80000
|
heap
|
page read and write
|
||
28850A15000
|
heap
|
page read and write
|
||
2CBEB849000
|
heap
|
page read and write
|
||
2CBEB84F000
|
heap
|
page read and write
|
||
2884E367000
|
heap
|
page read and write
|
||
7FFE013BD000
|
unkown
|
page readonly
|
||
28850944000
|
heap
|
page read and write
|
||
318CFEC000
|
stack
|
page read and write
|
||
7FFDFAEA6000
|
unkown
|
page readonly
|
||
61B01000
|
unkown
|
page execute read
|
||
2CBEB820000
|
heap
|
page read and write
|
||
28850924000
|
heap
|
page read and write
|
||
288504F8000
|
heap
|
page read and write
|
||
7FFDFB54E000
|
unkown
|
page readonly
|
||
2CBEB851000
|
heap
|
page read and write
|
||
288508F7000
|
heap
|
page read and write
|
||
2884E3C8000
|
heap
|
page read and write
|
||
1D3521D7000
|
heap
|
page read and write
|
||
1D3521D5000
|
heap
|
page read and write
|
||
1CA10A41000
|
heap
|
page read and write
|
||
1D3521E5000
|
heap
|
page read and write
|
||
2CBEB848000
|
heap
|
page read and write
|
||
7FFDFAE48000
|
unkown
|
page read and write
|
||
288507B0000
|
direct allocation
|
page read and write
|
||
1D3521D7000
|
heap
|
page read and write
|
||
7FFDFB23A000
|
unkown
|
page readonly
|
||
288500A0000
|
direct allocation
|
page read and write
|
||
2CBEB848000
|
heap
|
page read and write
|
||
28850860000
|
heap
|
page read and write
|
||
7FFDFAA17000
|
unkown
|
page readonly
|
||
2884E32A000
|
heap
|
page read and write
|
||
1CA10A41000
|
heap
|
page read and write
|
||
7FF799670000
|
unkown
|
page readonly
|
||
2884E3AE000
|
heap
|
page read and write
|
||
7FFE10300000
|
unkown
|
page readonly
|
||
7FFE11BB9000
|
unkown
|
page readonly
|
||
7FFE0CFC1000
|
unkown
|
page execute read
|
||
1CA10AED000
|
heap
|
page read and write
|
||
2CBEB848000
|
heap
|
page read and write
|
||
2884E34F000
|
heap
|
page read and write
|
||
1CA113D9000
|
heap
|
page read and write
|
||
7FFDFAD2F000
|
unkown
|
page readonly
|
||
2884E3C3000
|
heap
|
page read and write
|
||
28850908000
|
heap
|
page read and write
|
||
28850539000
|
heap
|
page read and write
|
||
7FFE0CF85000
|
unkown
|
page read and write
|
||
1CA10E95000
|
heap
|
page read and write
|
||
28850A15000
|
heap
|
page read and write
|
||
1CA0EA85000
|
heap
|
page read and write
|
||
1CA0EA85000
|
heap
|
page read and write
|
||
288504E4000
|
heap
|
page read and write
|
||
7FFE00191000
|
unkown
|
page readonly
|
||
217B4480000
|
heap
|
page read and write
|
||
7FFDFAE27000
|
unkown
|
page write copy
|
||
1D3521D4000
|
heap
|
page read and write
|
||
2CBEB848000
|
heap
|
page read and write
|
||
28850A15000
|
heap
|
page read and write
|
||
2884E394000
|
heap
|
page read and write
|
||
7FFE11BB5000
|
unkown
|
page readonly
|
||
7FFE1A456000
|
unkown
|
page readonly
|
||
288504B5000
|
heap
|
page read and write
|
||
7FFDFB9B6000
|
unkown
|
page readonly
|
||
1CA10A40000
|
heap
|
page read and write
|
||
7FFE0EA74000
|
unkown
|
page readonly
|
||
1CA0EA85000
|
heap
|
page read and write
|
||
28850946000
|
heap
|
page read and write
|
||
288508CF000
|
heap
|
page read and write
|
||
2885093D000
|
heap
|
page read and write
|
||
7FFE0CFDD000
|
unkown
|
page readonly
|
||
1D3521D7000
|
heap
|
page read and write
|
||
2884E3C3000
|
heap
|
page read and write
|
||
7FFE10233000
|
unkown
|
page readonly
|
||
2CBEB84B000
|
heap
|
page read and write
|
||
2885090A000
|
heap
|
page read and write
|
||
1D3521D8000
|
heap
|
page read and write
|
||
7FFE0EA71000
|
unkown
|
page execute read
|
||
2884E344000
|
heap
|
page read and write
|
||
1CA0E990000
|
heap
|
page readonly
|
||
7FFE10236000
|
unkown
|
page readonly
|
||
7FFE0B2C9000
|
unkown
|
page readonly
|
||
2CBEB84D000
|
heap
|
page read and write
|
||
7FFE0E151000
|
unkown
|
page readonly
|
||
7FFE013CA000
|
unkown
|
page readonly
|
||
7FFDFAD53000
|
unkown
|
page readonly
|
||
288508FE000
|
heap
|
page read and write
|
||
1D3521DD000
|
heap
|
page read and write
|
||
2884E319000
|
heap
|
page read and write
|
||
1D3521DD000
|
heap
|
page read and write
|
||
7FFDFBABB000
|
unkown
|
page readonly
|
||
61B84000
|
unkown
|
page readonly
|
||
7FFE120C0000
|
unkown
|
page readonly
|
||
28850EF5000
|
heap
|
page read and write
|
||
2884E3AD000
|
heap
|
page read and write
|
||
1CA0EA8D000
|
heap
|
page read and write
|
||
7FF7996BE000
|
unkown
|
page readonly
|
||
1CA1147C000
|
heap
|
page read and write
|
||
2884E3C0000
|
heap
|
page read and write
|
||
28850944000
|
heap
|
page read and write
|
||
2884E367000
|
heap
|
page read and write
|
||
1CA10A5D000
|
heap
|
page read and write
|
||
288504DD000
|
heap
|
page read and write
|
||
1D3521D5000
|
heap
|
page read and write
|
||
217B46D0000
|
heap
|
page read and write
|
||
28850A90000
|
direct allocation
|
page read and write
|
||
2885090A000
|
heap
|
page read and write
|
||
288508C0000
|
heap
|
page read and write
|
||
7FFE0C0B1000
|
unkown
|
page execute read
|
||
61B84000
|
unkown
|
page readonly
|
||
2884E365000
|
heap
|
page read and write
|
||
1CA11030000
|
direct allocation
|
page read and write
|
||
2CBEB857000
|
heap
|
page read and write
|
||
2884E348000
|
heap
|
page read and write
|
||
2884E3A0000
|
heap
|
page read and write
|
||
7FF7996B0000
|
unkown
|
page read and write
|
||
2885090C000
|
heap
|
page read and write
|
||
2CBEB84B000
|
heap
|
page read and write
|
||
2CBEB844000
|
heap
|
page read and write
|
||
288504F7000
|
heap
|
page read and write
|
||
1CA0E8B0000
|
heap
|
page read and write
|
||
217B46E0000
|
heap
|
page read and write
|
||
28850060000
|
direct allocation
|
page read and write
|
||
28850770000
|
direct allocation
|
page read and write
|
||
7FFDFB310000
|
unkown
|
page readonly
|
||
2CBEB857000
|
heap
|
page read and write
|
||
7FFDFAE2B000
|
unkown
|
page write copy
|
||
7FFE0130A000
|
unkown
|
page read and write
|
||
7FFE1151E000
|
unkown
|
page write copy
|
||
1CA113A0000
|
heap
|
page read and write
|
||
7FF799671000
|
unkown
|
page execute read
|
||
2884E33F000
|
heap
|
page read and write
|
||
7FFE0E161000
|
unkown
|
page execute read
|
||
7FFE0CFAE000
|
unkown
|
page write copy
|
||
1CA0EAE0000
|
heap
|
page read and write
|
||
7FF79969A000
|
unkown
|
page readonly
|
||
1CA0EA85000
|
heap
|
page read and write
|
||
7FFE013B8000
|
unkown
|
page write copy
|
||
7FFDFA760000
|
unkown
|
page execute read
|
||
28850895000
|
heap
|
page read and write
|
||
7FF799670000
|
unkown
|
page readonly
|
||
2884E352000
|
heap
|
page read and write
|
||
28850C40000
|
direct allocation
|
page read and write
|
||
2CBEB848000
|
heap
|
page read and write
|
||
1CA0EAA9000
|
heap
|
page read and write
|
||
1CA0EAA9000
|
heap
|
page read and write
|
||
2884E394000
|
heap
|
page read and write
|
||
1CA0EA8D000
|
heap
|
page read and write
|
||
7FFE117E1000
|
unkown
|
page execute read
|
||
1CA10B39000
|
heap
|
page read and write
|
||
2CBEB852000
|
heap
|
page read and write
|
||
2CBEB848000
|
heap
|
page read and write
|
||
1D3521D4000
|
heap
|
page read and write
|
||
7FF7996BC000
|
unkown
|
page read and write
|
||
28850B60000
|
direct allocation
|
page read and write
|
||
2CBEB848000
|
heap
|
page read and write
|
||
1CA0EAE9000
|
heap
|
page read and write
|
||
28850A15000
|
heap
|
page read and write
|
||
288504C7000
|
heap
|
page read and write
|
||
2CBEB848000
|
heap
|
page read and write
|
||
7FFE0EB33000
|
unkown
|
page readonly
|
||
7FFE0E160000
|
unkown
|
page readonly
|
||
2884E349000
|
heap
|
page read and write
|
||
1D3521D4000
|
heap
|
page read and write
|
||
7FFE0C0A8000
|
unkown
|
page read and write
|
||
28850944000
|
heap
|
page read and write
|
||
7FF7996AD000
|
unkown
|
page write copy
|
||
7FFE00756000
|
unkown
|
page readonly
|
||
28850944000
|
heap
|
page read and write
|
||
28850A1E000
|
heap
|
page read and write
|
||
7FFE0147A000
|
unkown
|
page readonly
|
||
7FFDFA6D0000
|
unkown
|
page readonly
|
||
1D3521DE000
|
heap
|
page read and write
|
||
1D3521D4000
|
heap
|
page read and write
|
||
2884E352000
|
heap
|
page read and write
|
||
7FFE0EA72000
|
unkown
|
page readonly
|
||
1CA11140000
|
direct allocation
|
page read and write
|
||
2884E373000
|
heap
|
page read and write
|
||
7FFE0EB29000
|
unkown
|
page readonly
|
||
61B7F000
|
unkown
|
page write copy
|
||
CE4C1E3000
|
stack
|
page read and write
|
||
7FF79969A000
|
unkown
|
page readonly
|
||
1CA10B2F000
|
heap
|
page read and write
|
||
2884FC90000
|
heap
|
page read and write
|
||
2884E30D000
|
heap
|
page read and write
|
||
1D3521D7000
|
heap
|
page read and write
|
||
1CA11870000
|
direct allocation
|
page read and write
|
||
7FFE11EC0000
|
unkown
|
page readonly
|
||
7FFE10254000
|
unkown
|
page readonly
|
||
7FFE0CFC0000
|
unkown
|
page readonly
|
||
28850A1E000
|
heap
|
page read and write
|
||
2CBEB84D000
|
heap
|
page read and write
|
||
288508BE000
|
heap
|
page read and write
|
||
1D3521D4000
|
heap
|
page read and write
|
||
28850EF5000
|
heap
|
page read and write
|
||
CE4C3DF000
|
stack
|
page read and write
|
||
28850A50000
|
direct allocation
|
page read and write
|
||
2884E348000
|
heap
|
page read and write
|
||
7FFE0EB5D000
|
unkown
|
page readonly
|
||
288508ED000
|
heap
|
page read and write
|
||
1CA10D50000
|
direct allocation
|
page read and write
|
||
1CA10330000
|
direct allocation
|
page read and write
|
||
2885053F000
|
heap
|
page read and write
|
||
2CBEB855000
|
heap
|
page read and write
|
||
7FFE012F0000
|
unkown
|
page readonly
|
||
1CA11310000
|
heap
|
page read and write
|
||
1CA0EA10000
|
heap
|
page read and write
|
||
7FFE1A487000
|
unkown
|
page readonly
|
||
7FFDFAA20000
|
unkown
|
page readonly
|
||
1D3521D7000
|
heap
|
page read and write
|
||
288508DD000
|
heap
|
page read and write
|
||
7FFE00170000
|
unkown
|
page readonly
|
||
61B00000
|
unkown
|
page readonly
|
||
7FFE10230000
|
unkown
|
page readonly
|
||
2884E3BF000
|
heap
|
page read and write
|
||
1D3521D7000
|
heap
|
page read and write
|
||
2884E311000
|
heap
|
page read and write
|
||
288504DD000
|
heap
|
page read and write
|
||
288504C6000
|
heap
|
page read and write
|
||
7FF79969A000
|
unkown
|
page readonly
|
||
7FFE13300000
|
unkown
|
page readonly
|
||
7FFE0E181000
|
unkown
|
page readonly
|
||
2884E334000
|
heap
|
page read and write
|
||
1CA0EA82000
|
heap
|
page read and write
|
||
28850924000
|
heap
|
page read and write
|
||
7FFDFAF02000
|
unkown
|
page readonly
|
||
1D3521CE000
|
heap
|
page read and write
|
||
7FFDFA91F000
|
unkown
|
page readonly
|
||
1CA118C0000
|
direct allocation
|
page read and write
|
||
2CBED1D0000
|
heap
|
page read and write
|
||
2884E3C1000
|
heap
|
page read and write
|
||
28850E90000
|
heap
|
page read and write
|
||
1CA0EA90000
|
heap
|
page read and write
|
||
7FFE110F1000
|
unkown
|
page execute read
|
||
1CA0EA6F000
|
heap
|
page read and write
|
||
CE3E3DE000
|
stack
|
page read and write
|
||
2CBEB848000
|
heap
|
page read and write
|
||
2CBEB854000
|
heap
|
page read and write
|
||
1CA0EAE9000
|
heap
|
page read and write
|
||
2CBEB844000
|
heap
|
page read and write
|
||
2CBEB848000
|
heap
|
page read and write
|
||
28850874000
|
heap
|
page read and write
|
||
7FFDFA9C7000
|
unkown
|
page readonly
|
||
7FFE11EA1000
|
unkown
|
page execute read
|
||
2CBEB84D000
|
heap
|
page read and write
|
||
7FFE0146D000
|
unkown
|
page readonly
|
||
288504C3000
|
heap
|
page read and write
|
||
1CA0EAEC000
|
heap
|
page read and write
|
||
288508F6000
|
heap
|
page read and write
|
||
7FFDFB61F000
|
unkown
|
page readonly
|
||
1CA0EAF8000
|
heap
|
page read and write
|
||
2884E3B3000
|
heap
|
page read and write
|
||
7FFDFB20D000
|
unkown
|
page execute read
|
||
7FFE0CFD9000
|
unkown
|
page read and write
|
||
7FFE013C3000
|
unkown
|
page readonly
|
||
7FFE00731000
|
unkown
|
page execute read
|
||
2CBEB845000
|
heap
|
page read and write
|
||
28850984000
|
heap
|
page read and write
|
||
28850C80000
|
direct allocation
|
page read and write
|
||
2884E342000
|
heap
|
page read and write
|
||
288504E2000
|
heap
|
page read and write
|
||
28850908000
|
heap
|
page read and write
|
||
7FFE11077000
|
unkown
|
page readonly
|
||
28850903000
|
heap
|
page read and write
|
||
7FFE101D1000
|
unkown
|
page execute read
|
||
1D3521C7000
|
heap
|
page read and write
|
||
2884E3BC000
|
heap
|
page read and write
|
||
7FFDFA9F7000
|
unkown
|
page readonly
|
||
2884FCC5000
|
heap
|
page read and write
|
||
2CBEBA00000
|
heap
|
page read and write
|
||
1CA111D0000
|
direct allocation
|
page read and write
|
||
7FF799670000
|
unkown
|
page readonly
|
||
1CA0EAB4000
|
heap
|
page read and write
|
||
288508EB000
|
heap
|
page read and write
|
||
CE4C1EC000
|
stack
|
page read and write
|
||
288504F5000
|
heap
|
page read and write
|
||
2CBEB848000
|
heap
|
page read and write
|
||
7FFDFB643000
|
unkown
|
page readonly
|
||
7FF79969A000
|
unkown
|
page readonly
|
||
1CA0EADA000
|
heap
|
page read and write
|
||
2884E3C0000
|
heap
|
page read and write
|
||
1CA10E85000
|
heap
|
page read and write
|
||
28850537000
|
heap
|
page read and write
|
||
1D3521D8000
|
heap
|
page read and write
|
||
28851323000
|
direct allocation
|
page read and write
|
||
1CA0EAA7000
|
heap
|
page read and write
|
||
1CA0EA6F000
|
heap
|
page read and write
|
||
288504EA000
|
heap
|
page read and write
|
||
1CA0EAA7000
|
heap
|
page read and write
|
||
7FF7996AD000
|
unkown
|
page read and write
|
There are 1060 hidden memdumps, click here to show them.