Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
sxs.exe
|
MS-DOS executable PE32 executable (GUI) Intel 80386, for MS Windows
|
initial sample
|
||
C:\Windows\noruns.reg
|
Windows Registry text (Win95 or above)
|
modified
|
||
C:\Windows\wuauclt.exe
|
MS-DOS executable PE32 executable (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Windows\wuauclt.exe:Zone.Identifier
|
ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Docs.lnk
|
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command
line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Thu Aug 29 14:12:15 2024, atime=Wed Sep 27 04:28:28
2023, length=1210144, window=hide
|
dropped
|
||
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Gmail.lnk
|
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command
line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Thu Aug 29 14:12:15 2024, atime=Wed Sep 27 04:28:28
2023, length=1210144, window=hide
|
dropped
|
||
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Google Drive.lnk
|
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command
line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Wed Oct 4 12:54:07 2023, atime=Wed Sep 27 04:28:28
2023, length=1210144, window=hide
|
dropped
|
||
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Sheets.lnk
|
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command
line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Thu Aug 29 14:12:15 2024, atime=Wed Sep 27 04:28:28
2023, length=1210144, window=hide
|
dropped
|
||
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Slides.lnk
|
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command
line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Thu Aug 29 14:12:15 2024, atime=Wed Sep 27 04:28:28
2023, length=1210144, window=hide
|
dropped
|
||
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\YouTube.lnk
|
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command
line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Thu Aug 29 14:12:15 2024, atime=Wed Sep 27 04:28:28
2023, length=1210144, window=hide
|
dropped
|
||
Chrome Cache Entry: 100
|
ASCII text, with very long lines (65465)
|
dropped
|
||
Chrome Cache Entry: 101
|
ASCII text, with very long lines (380), with no line terminators
|
downloaded
|
||
Chrome Cache Entry: 102
|
MS Windows icon resource - 2 icons, 16x16, 16 colors, 32x32, 16 colors
|
downloaded
|
||
Chrome Cache Entry: 103
|
JSON data
|
dropped
|
||
Chrome Cache Entry: 104
|
ASCII text, with very long lines (1618)
|
dropped
|
||
Chrome Cache Entry: 105
|
ASCII text, with very long lines (3809)
|
downloaded
|
||
Chrome Cache Entry: 106
|
ASCII text, with very long lines (1618)
|
downloaded
|
||
Chrome Cache Entry: 107
|
SVG Scalable Vector Graphics image
|
downloaded
|
||
Chrome Cache Entry: 108
|
ASCII text, with very long lines (1618)
|
downloaded
|
||
Chrome Cache Entry: 109
|
HTML document, ASCII text, with very long lines (12974)
|
downloaded
|
||
Chrome Cache Entry: 110
|
ASCII text, with very long lines (53485)
|
dropped
|
||
Chrome Cache Entry: 111
|
GIF image data, version 89a, 1 x 1
|
downloaded
|
||
Chrome Cache Entry: 112
|
JSON data
|
downloaded
|
||
Chrome Cache Entry: 113
|
ASCII text, with very long lines (380), with no line terminators
|
dropped
|
||
Chrome Cache Entry: 114
|
SVG Scalable Vector Graphics image
|
downloaded
|
||
Chrome Cache Entry: 115
|
ASCII text, with very long lines (65465)
|
downloaded
|
||
Chrome Cache Entry: 116
|
MS Windows icon resource - 2 icons, 16x16, 16 colors, 32x32, 16 colors
|
dropped
|
||
Chrome Cache Entry: 117
|
GIF image data, version 89a, 1 x 1
|
dropped
|
||
Chrome Cache Entry: 87
|
SVG Scalable Vector Graphics image
|
dropped
|
||
Chrome Cache Entry: 88
|
ASCII text, with very long lines (53485)
|
downloaded
|
||
Chrome Cache Entry: 89
|
ASCII text, with very long lines (57339)
|
downloaded
|
||
Chrome Cache Entry: 90
|
HTML document, ASCII text, with very long lines (619)
|
downloaded
|
||
Chrome Cache Entry: 91
|
GIF image data, version 89a, 1 x 1
|
dropped
|
||
Chrome Cache Entry: 92
|
GIF image data, version 89a, 1 x 1
|
downloaded
|
||
Chrome Cache Entry: 93
|
ASCII text, with very long lines (57339)
|
dropped
|
||
Chrome Cache Entry: 94
|
HTML document, ASCII text, with very long lines (12970)
|
downloaded
|
||
Chrome Cache Entry: 95
|
GIF image data, version 89a, 1 x 1
|
downloaded
|
||
Chrome Cache Entry: 96
|
HTML document, ASCII text, with no line terminators
|
downloaded
|
||
Chrome Cache Entry: 97
|
GIF image data, version 89a, 1 x 1
|
dropped
|
||
Chrome Cache Entry: 98
|
ASCII text, with very long lines (1618)
|
dropped
|
||
Chrome Cache Entry: 99
|
SVG Scalable Vector Graphics image
|
dropped
|
There are 31 hidden files, click here to show them.
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\sxs.exe
|
"C:\Users\user\Desktop\sxs.exe"
|
||
C:\Program Files\Internet Explorer\iexplore.exe
|
"C:\Program Files\Internet Explorer\iexplore.exe"
|
||
C:\Windows\wuauclt.exe
|
"C:\Windows\wuauclt.exe"
|
||
C:\Windows\SysWOW64\regedit.exe
|
"C:\Windows\System32\regedit.exe" /s C:\Windows\noruns.reg
|
||
C:\Windows\wuauclt.exe
|
"C:\Windows\wuauclt.exe"
|
||
C:\Program Files\Internet Explorer\iexplore.exe
|
"C:\Program Files\Internet Explorer\iexplore.exe"
|
||
C:\Windows\SysWOW64\explorer.exe
|
"C:\Windows\System32\explorer.exe" http://www.onefordvd.com
|
||
C:\Windows\explorer.exe
|
C:\Windows\explorer.exe /factory,{75dff2b7-6936-4c06-a8bb-676a7b00b24b} -Embedding
|
||
C:\Program Files\Google\Chrome\Application\chrome.exe
|
"C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized --single-argument http://www.onefordvd.com/
|
||
C:\Program Files\Google\Chrome\Application\chrome.exe
|
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US
--service-sandbox-type=none --mojo-platform-channel-handle=2104 --field-trial-handle=2068,i,10012621105845313477,5144001626182359971,262144
--disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction
/prefetch:8
|
||
C:\Windows\SysWOW64\explorer.exe
|
"C:\Windows\System32\explorer.exe" http://www.onefordvd.com
|
||
C:\Windows\SysWOW64\net.exe
|
"C:\Windows\System32\net.exe" stop sharedaccess
|
||
C:\Windows\explorer.exe
|
C:\Windows\explorer.exe /factory,{75dff2b7-6936-4c06-a8bb-676a7b00b24b} -Embedding
|
||
C:\Windows\SysWOW64\net.exe
|
"C:\Windows\System32\net.exe" stop KVWSC
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\SysWOW64\sc.exe
|
"C:\Windows\System32\sc.exe" config KVWSC start= disabled
|
||
C:\Windows\SysWOW64\net.exe
|
"C:\Windows\System32\net.exe" stop KVSrvXP
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\SysWOW64\sc.exe
|
"C:\Windows\System32\sc.exe" config KVSrvXP start= disabled
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\SysWOW64\net.exe
|
"C:\Windows\System32\net.exe" stop kavsvc
|
||
C:\Windows\SysWOW64\sc.exe
|
"C:\Windows\System32\sc.exe" config kavsvc start= disabled
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\SysWOW64\sc.exe
|
"C:\Windows\System32\sc.exe" config RsRavMon start= disabled
|
||
C:\Windows\SysWOW64\net1.exe
|
C:\Windows\system32\net1 stop sharedaccess
|
||
C:\Windows\SysWOW64\net.exe
|
"C:\Windows\System32\net.exe" stop RsCCenter
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\SysWOW64\net1.exe
|
C:\Windows\system32\net1 stop KVWSC
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\SysWOW64\sc.exe
|
"C:\Windows\System32\sc.exe" config RsCCenter start= disabled
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\SysWOW64\net.exe
|
"C:\Windows\System32\net.exe" stop RsRavMon
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\SysWOW64\net1.exe
|
C:\Windows\system32\net1 stop KVSrvXP
|
||
C:\Windows\SysWOW64\net1.exe
|
C:\Windows\system32\net1 stop kavsvc
|
||
C:\Windows\SysWOW64\net1.exe
|
C:\Windows\system32\net1 stop RsCCenter
|
||
C:\Windows\SysWOW64\net1.exe
|
C:\Windows\system32\net1 stop RsRavMon
|
||
C:\Program Files\Google\Chrome\Application\chrome.exe
|
"C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized --single-argument http://www.onefordvd.com/
|
||
C:\Program Files\Google\Chrome\Application\chrome.exe
|
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US
--service-sandbox-type=none --mojo-platform-channel-handle=2172 --field-trial-handle=2004,i,8456847473545843836,6778845690688114268,262144
--disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction
/prefetch:8
|
||
C:\Windows\explorer.exe
|
"C:\Windows\explorer.exe" http://www.dvdforone.com
|
||
C:\Windows\explorer.exe
|
C:\Windows\explorer.exe /factory,{75dff2b7-6936-4c06-a8bb-676a7b00b24b} -Embedding
|
||
C:\Program Files\Google\Chrome\Application\chrome.exe
|
"C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized --single-argument http://www.dvdforone.com/
|
||
C:\Program Files\Google\Chrome\Application\chrome.exe
|
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US
--service-sandbox-type=none --mojo-platform-channel-handle=2088 --field-trial-handle=2028,i,12403838513569625985,14954567300867270703,262144
--disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction
/prefetch:8
|
There are 36 hidden processes, click here to show them.
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
http://msg.tmhacker.com/ie.txtZin
|
unknown
|
||
https://syndicatedsearch.goog
|
unknown
|
||
http://1861119.com/1.txt
|
unknown
|
||
http://1861119.com/index.exe$N
|
unknown
|
||
http://www.dvdforone.com/0M
|
unknown
|
||
http://www.xxx.com/qqmsg.txt
|
unknown
|
||
http://1861119.com/ie.txthT;
|
unknown
|
||
http://1861119.com/ie.txt
|
unknown
|
||
http://www.xxx.com/abc.exe
|
unknown
|
||
https://ad-delivery.net/px.gif?ch=2
|
172.67.69.19
|
||
http://msg.tmhacker.com/down.txt
|
unknown
|
||
http://www.xxx.com/ie.txt
|
unknown
|
||
http://1861119.com/ie.txt_
|
unknown
|
||
http://1861119.com/index.exeq#
|
unknown
|
||
https://img1.wsimg.com/parking-lander/static/js/main.5bbf83b7.js
|
unknown
|
||
http://msg.tmhacker.com/tean1.txt8U
|
unknown
|
||
https://www.google.com/pagead/1p-conversion/16521530460/?gad_source=1&adview_type=5
|
unknown
|
||
http://1861119.com/ie.tx
|
unknown
|
||
https://api.aws.parking.godaddy.com/v1/parkingEvents?abp=1&gdabp=true
|
54.174.215.77
|
||
https://syndicatedsearch.goog/afs/gen_204?client=dp-namemedia06_3ph&output=uds_ads_only&zx=lhb5r7xl5det&aqid=1Y_QZrGTL9KnjuwPiPe1wA0&psid=7621175430&pbt=bv&adbx=267&adby=173.6875&adbh=464&adbw=500&adbah=148%2C148%2C148&adbn=master-1&eawp=partner-dp-namemedia06_3ph&errv=667606770&csala=4%7C0%7C1541%7C1243%7C284&lle=0&ifv=1&hpt=0
|
172.217.16.206
|
||
http://www.onefordvd.comXV
|
unknown
|
||
https://www.onefordvd.com/lander
|
|||
http://msg.tmhacker.com/ie.t
|
unknown
|
||
https://login.li
|
unknown
|
||
http://www.dvdforone.com/C:
|
unknown
|
||
http://1861119.com/index.exe
|
unknown
|
||
http://www.om7890.com/mfx/help.exe
|
unknown
|
||
http://www.onefordvd.com/A
|
unknown
|
||
http://www.dvdforone.com/Zy
|
unknown
|
||
http://www.onefordvd.com/s.lll
|
unknown
|
||
https://ad-delivery.net/px.gif?ch=1&e=0.7379176731179411
|
172.67.69.19
|
||
https://ad.doubleclick.net/favicon.ico?ad=300x250&ad_box_=1&adnet=1&showad=1&size=250x250
|
216.58.206.38
|
||
http://www.onefordvd.comop
|
unknown
|
||
https://www.google.com/js/bg/qfimbA0GYhgyETKN2gHT05d-Hpg6wiB8plDJ1aMSf3s.js
|
216.58.206.68
|
||
http://msg.tmhacker.com/ie.txt
|
unknown
|
||
http://1861119.com/index.exeb1
|
unknown
|
||
https://syndicatedsearch.goog/adsense/domains/caf.js?pac=0
|
142.250.184.238
|
||
http://www.gamesrb.com/rbm/help.exe
|
unknown
|
||
https://syndicatedsearch.goog/afs/gen_204?client=dp-namemedia06_3ph&output=uds_ads_only&zx=2gf50ip8fgbm&aqid=1o_QZoOUFf6kjuwPko2JoA0&psid=7621175430&pbt=bv&adbx=267&adby=173.6875&adbh=464&adbw=500&adbah=148%2C148%2C148&adbn=master-1&eawp=partner-dp-namemedia06_3ph&errv=667606770&csala=11%7C0%7C1627%7C1343%7C1527&lle=0&ifv=1&hpt=0
|
172.217.16.206
|
||
http://www.onefordvd.com/)
|
unknown
|
||
https://afs.googleusercontent.com/ad_icons/standard/publisher_icon_image/chevron.svg?c=%230f1c21
|
142.250.186.161
|
||
http://www.onefordvd.com/&
|
unknown
|
||
http://msg.tmhacker.com/ie.txt&
|
unknown
|
||
http://1861119.com/1.txtW
|
unknown
|
||
http://www.dvdforone.com/23
|
unknown
|
||
https://syndicatedsearch.goog/afs/gen_204?client=dp-namemedia06_3ph&output=uds_ads_only&zx=g3yhpaijmirq&aqid=1o_QZoOUFf6kjuwPko2JoA0&psid=7621175430&pbt=bs&adbx=267&adby=173.6875&adbh=464&adbw=500&adbah=148%2C148%2C148&adbn=master-1&eawp=partner-dp-namemedia06_3ph&errv=667606770&csala=11%7C0%7C1627%7C1343%7C1527&lle=0&ifv=1&hpt=0
|
172.217.16.206
|
||
http://msg.tmhacker.com/ie.txt)
|
unknown
|
||
http://www.dvdforone.com
|
unknown
|
||
http://domainretailing.com/rg-dsale3p.php?d=onefordvd.com
|
unknown
|
||
http://1861119.com/index.exeE
|
unknown
|
||
http://msg.tmhacker.com/ie.txt-
|
unknown
|
||
http://1861119.com/1.txtO
|
unknown
|
||
http://1861119.com/ie.txt/
|
unknown
|
||
https://www.google.com/adsense/domains/caf.js?abp=1&gdabp=true
|
142.250.186.68
|
||
https://img1.wsimg.com/parking-lander/static/css/main.ef90a627.css
|
unknown
|
||
http://msg.tmhacker.com/ie.txt~n
|
unknown
|
||
http://1861119.com/index.exe0U
|
unknown
|
||
http://w.tw7890.com/
|
unknown
|
||
http://1861119.com/index.exe8
|
unknown
|
||
http://msg.tmhacker.com/tean1.txtJS;.JSE;.WSF;.WSH;#F
|
unknown
|
||
http://msg.tmhacker.com/ie.txtp1
|
unknown
|
||
http://www.dvdforone.com/o
|
unknown
|
||
http://1861119.com/index.exe.
|
unknown
|
||
http://www.onefordvd.com/~
|
unknown
|
||
http://www.onefordvd.com/23M4
|
unknown
|
||
http://www.onefordvd.com/6x
|
unknown
|
||
http://www.onefordvd.com/v
|
unknown
|
||
http://www.dvdforone.com/4b823s
|
unknown
|
||
http://www.onefordvd.com/t
|
unknown
|
||
http://www.onefordvd.com_
|
unknown
|
||
http://www.onefordvd.com/n
|
unknown
|
||
http://www.tw7890.com/twv/help.exehttp://www.om7890.com/mfx/help.exehttp://www.hg7890.com/hgb/help.e
|
unknown
|
||
http://www.onefordvd.com/l
|
unknown
|
||
http://www.onefordvd.come
|
unknown
|
||
https://ad-delivery.net/px.gif?ch=1&e=0.7550573385120041
|
172.67.69.19
|
||
http://www.onefordvd.com/i
|
unknown
|
||
http://msg.tmhacker.com/tean1.txtME
|
unknown
|
||
http://www.onefordvd.com/10
|
unknown
|
||
http://msg.tmhacker.com/down.txtrp
|
unknown
|
||
https://afs.googleusercontent.com/ad_icons/standard/publisher_icon_image/search.svg?c=%230f1c21
|
142.250.186.161
|
||
http://msg.tmhacker.com/down.txtrj
|
unknown
|
||
http://msg.tmhacker.com/ie.txtSia
|
unknown
|
||
http://www.onefordvd.com/Y
|
unknown
|
||
http://www.onefordvd.com/W
|
unknown
|
||
https://btloader.com/tag?o=5097926782615552&upapi=true
|
172.67.41.60
|
||
http://www.onefordvd.com/lander
|
15.197.204.56
|
||
http://www.dvdforone.com/Vh
|
unknown
|
||
http://1861119.com/ie.txt~
|
unknown
|
||
http://www.tw7890.com/twv/help.exe
|
unknown
|
||
http://1861119.com/ie.txtlate
|
unknown
|
||
http://1861119.com/1.txtnss
|
unknown
|
||
http://www.onefordvd.com/4b823
|
unknown
|
||
http://www.onefordvd.com
|
unknown
|
||
http://msg.tmhacker.com/tean1.txt&
|
unknown
|
||
http://www.dvdforone.comC:
|
unknown
|
||
http://1861119.com/index.exe3N
|
unknown
|
||
http://www.onefordvd.com/c%1
|
unknown
|
||
http://www.dvdforone.com/
|
unknown
|
||
https://syndicatedsearch.goog/afs/gen_204?client=dp-namemedia06_3ph&output=uds_ads_only&zx=11hs6q014uq&aqid=1Y_QZrGTL9KnjuwPiPe1wA0&psid=7621175430&pbt=bs&adbx=267&adby=173.6875&adbh=464&adbw=500&adbah=148%2C148%2C148&adbn=master-1&eawp=partner-dp-namemedia06_3ph&errv=667606770&csala=4%7C0%7C1541%7C1243%7C284&lle=0&ifv=1&hpt=0
|
172.217.16.206
|
||
http://msg.tmhacker.com/tean1.txt
|
unknown
|
There are 90 hidden URLs, click here to show them.
Domains
Name
|
IP
|
Malicious
|
|
---|---|---|---|
gddomainparking.com
|
54.174.215.77
|
||
google.com
|
142.250.186.110
|
||
syndicatedsearch.goog
|
172.217.16.206
|
||
ad.doubleclick.net
|
216.58.206.38
|
||
www.google.com
|
142.250.186.68
|
||
btloader.com
|
172.67.41.60
|
||
googlehosted.l.googleusercontent.com
|
142.250.186.161
|
||
www.onefordvd.com
|
15.197.204.56
|
||
ad-delivery.net
|
172.67.69.19
|
||
img1.wsimg.com
|
unknown
|
||
1861119.com
|
unknown
|
||
afs.googleusercontent.com
|
unknown
|
||
www.dvdforone.com
|
unknown
|
||
api.aws.parking.godaddy.com
|
unknown
|
||
msg.tmhacker.com
|
unknown
|
There are 5 hidden domains, click here to show them.
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
142.250.186.68
|
www.google.com
|
United States
|
||
216.58.206.38
|
ad.doubleclick.net
|
United States
|
||
192.168.2.4
|
unknown
|
unknown
|
||
54.174.215.77
|
gddomainparking.com
|
United States
|
||
192.168.2.5
|
unknown
|
unknown
|
||
104.26.2.70
|
unknown
|
United States
|
||
142.250.186.161
|
googlehosted.l.googleusercontent.com
|
United States
|
||
172.217.16.206
|
syndicatedsearch.goog
|
United States
|
||
142.250.184.193
|
unknown
|
United States
|
||
172.67.69.19
|
ad-delivery.net
|
United States
|
||
15.197.204.56
|
www.onefordvd.com
|
United States
|
||
172.67.41.60
|
btloader.com
|
United States
|
||
216.58.206.68
|
unknown
|
United States
|
||
239.255.255.250
|
unknown
|
Reserved
|
||
142.250.186.166
|
unknown
|
United States
|
||
142.250.184.238
|
unknown
|
United States
|
There are 6 hidden IPs, click here to show them.
Registry
Path
|
Value
|
Malicious
|
|
---|---|---|---|
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer
|
NoDriveTypeAutoRun
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run
|
Microsoft
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer
|
hx-1
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer
|
SlowContextMenuEntries
|
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
386E000
|
stack
|
page read and write
|
||
5E8000
|
heap
|
page read and write
|
||
2219000
|
heap
|
page read and write
|
||
2B80000
|
heap
|
page read and write
|
||
BE0000
|
heap
|
page read and write
|
||
3000000
|
heap
|
page read and write
|
||
2F80000
|
heap
|
page read and write
|
||
2170000
|
direct allocation
|
page read and write
|
||
66A000
|
heap
|
page read and write
|
||
27F0000
|
heap
|
page read and write
|
||
8E5000
|
heap
|
page read and write
|
||
5F4000
|
heap
|
page read and write
|
||
534000
|
heap
|
page read and write
|
||
5D5000
|
heap
|
page read and write
|
||
26FD000
|
stack
|
page read and write
|
||
2170000
|
direct allocation
|
page read and write
|
||
592000
|
heap
|
page read and write
|
||
4F0000
|
heap
|
page read and write
|
||
1140000
|
heap
|
page read and write
|
||
2FBF000
|
stack
|
page read and write
|
||
8E0000
|
heap
|
page read and write
|
||
2350000
|
trusted library allocation
|
page read and write
|
||
23A0000
|
heap
|
page read and write
|
||
2100000
|
direct allocation
|
page read and write
|
||
330E000
|
stack
|
page read and write
|
||
EA4000
|
heap
|
page read and write
|
||
84B000
|
heap
|
page read and write
|
||
3140000
|
heap
|
page read and write
|
||
28BF000
|
stack
|
page read and write
|
||
5CE000
|
stack
|
page read and write
|
||
301E000
|
stack
|
page read and write
|
||
3F0000
|
heap
|
page read and write
|
||
42B000
|
unkown
|
page read and write
|
||
23B0000
|
direct allocation
|
page read and write
|
||
2BD0000
|
heap
|
page read and write
|
||
25AC000
|
stack
|
page read and write
|
||
1E4000
|
heap
|
page read and write
|
||
1E4000
|
heap
|
page read and write
|
||
52EF000
|
stack
|
page read and write
|
||
1E4000
|
heap
|
page read and write
|
||
27D0000
|
heap
|
page read and write
|
||
2271000
|
heap
|
page read and write
|
||
2271000
|
heap
|
page read and write
|
||
2271000
|
heap
|
page read and write
|
||
2211000
|
heap
|
page read and write
|
||
21E0000
|
direct allocation
|
page read and write
|
||
23B0000
|
direct allocation
|
page read and write
|
||
760000
|
trusted library allocation
|
page read and write
|
||
2271000
|
heap
|
page read and write
|
||
1620000
|
heap
|
page read and write
|
||
2201000
|
heap
|
page read and write
|
||
2271000
|
heap
|
page read and write
|
||
23B0000
|
direct allocation
|
page read and write
|
||
EB6000
|
heap
|
page read and write
|
||
2DB0000
|
heap
|
page read and write
|
||
437000
|
unkown
|
page read and write
|
||
740000
|
direct allocation
|
page execute and read and write
|
||
2908000
|
heap
|
page read and write
|
||
294E000
|
heap
|
page read and write
|
||
150000
|
heap
|
page read and write
|
||
2271000
|
heap
|
page read and write
|
||
1E4000
|
heap
|
page read and write
|
||
30D0000
|
heap
|
page read and write
|
||
2201000
|
heap
|
page read and write
|
||
23B0000
|
direct allocation
|
page read and write
|
||
5F4000
|
heap
|
page read and write
|
||
2201000
|
heap
|
page read and write
|
||
29E0000
|
heap
|
page read and write
|
||
5F4000
|
heap
|
page read and write
|
||
446000
|
unkown
|
page execute and write copy
|
||
5F4000
|
heap
|
page read and write
|
||
2FDF000
|
stack
|
page read and write
|
||
372E000
|
stack
|
page read and write
|
||
1E4000
|
heap
|
page read and write
|
||
303E000
|
stack
|
page read and write
|
||
2201000
|
heap
|
page read and write
|
||
2201000
|
heap
|
page read and write
|
||
2170000
|
direct allocation
|
page read and write
|
||
F60000
|
heap
|
page read and write
|
||
2E30000
|
trusted library allocation
|
page read and write
|
||
1E4000
|
heap
|
page read and write
|
||
700000
|
trusted library allocation
|
page read and write
|
||
2FE0000
|
heap
|
page read and write
|
||
303D000
|
stack
|
page read and write
|
||
3865000
|
heap
|
page read and write
|
||
572000
|
heap
|
page read and write
|
||
1E4000
|
heap
|
page read and write
|
||
2211000
|
heap
|
page read and write
|
||
1E4000
|
heap
|
page read and write
|
||
30D000
|
stack
|
page read and write
|
||
1205000
|
heap
|
page read and write
|
||
6F0000
|
heap
|
page read and write
|
||
1E4000
|
heap
|
page read and write
|
||
1E4000
|
heap
|
page read and write
|
||
2271000
|
heap
|
page read and write
|
||
E69000
|
heap
|
page read and write
|
||
2E7C000
|
stack
|
page read and write
|
||
3105000
|
heap
|
page read and write
|
||
2CFC000
|
stack
|
page read and write
|
||
249E000
|
stack
|
page read and write
|
||
7D0000
|
heap
|
page read and write
|
||
E60000
|
heap
|
page read and write
|
||
1E4000
|
heap
|
page read and write
|
||
1E4000
|
heap
|
page read and write
|
||
2310000
|
trusted library allocation
|
page read and write
|
||
5F4000
|
heap
|
page read and write
|
||
AC000
|
stack
|
page read and write
|
||
1E4000
|
heap
|
page read and write
|
||
6F0000
|
heap
|
page read and write
|
||
2ECF000
|
stack
|
page read and write
|
||
2201000
|
heap
|
page read and write
|
||
2B00000
|
heap
|
page read and write
|
||
23B0000
|
direct allocation
|
page read and write
|
||
2271000
|
heap
|
page read and write
|
||
5F4000
|
heap
|
page read and write
|
||
1E4000
|
heap
|
page read and write
|
||
485E000
|
stack
|
page read and write
|
||
1E4000
|
heap
|
page read and write
|
||
326E000
|
stack
|
page read and write
|
||
2BF8000
|
heap
|
page read and write
|
||
1E4000
|
heap
|
page read and write
|
||
5DD000
|
heap
|
page read and write
|
||
2170000
|
direct allocation
|
page read and write
|
||
2170000
|
direct allocation
|
page read and write
|
||
238C000
|
stack
|
page read and write
|
||
534000
|
heap
|
page read and write
|
||
2310000
|
trusted library allocation
|
page read and write
|
||
28F8000
|
heap
|
page read and write
|
||
437000
|
unkown
|
page read and write
|
||
256B000
|
stack
|
page read and write
|
||
F6C000
|
heap
|
page read and write
|
||
2CFF000
|
stack
|
page read and write
|
||
534000
|
heap
|
page read and write
|
||
29DD000
|
heap
|
page read and write
|
||
2100000
|
direct allocation
|
page read and write
|
||
1E4000
|
heap
|
page read and write
|
||
600000
|
heap
|
page read and write
|
||
2200000
|
heap
|
page read and write
|
||
E00000
|
heap
|
page read and write
|
||
207C000
|
stack
|
page read and write
|
||
58F000
|
heap
|
page read and write
|
||
2271000
|
heap
|
page read and write
|
||
534000
|
heap
|
page read and write
|
||
534000
|
heap
|
page read and write
|
||
2AE0000
|
heap
|
page read and write
|
||
1E4000
|
heap
|
page read and write
|
||
5F4000
|
heap
|
page read and write
|
||
B0B000
|
stack
|
page read and write
|
||
2E30000
|
trusted library allocation
|
page read and write
|
||
360000
|
heap
|
page read and write
|
||
2201000
|
heap
|
page read and write
|
||
887000
|
heap
|
page read and write
|
||
2271000
|
heap
|
page read and write
|
||
1E4000
|
heap
|
page read and write
|
||
300E000
|
stack
|
page read and write
|
||
2858000
|
heap
|
page read and write
|
||
2B40000
|
heap
|
page read and write
|
||
D50000
|
remote allocation
|
page execute and read and write
|
||
2E30000
|
trusted library allocation
|
page read and write
|
||
5F4000
|
heap
|
page read and write
|
||
30EF000
|
stack
|
page read and write
|
||
13F0000
|
heap
|
page read and write
|
||
2201000
|
heap
|
page read and write
|
||
2FFE000
|
stack
|
page read and write
|
||
3198000
|
heap
|
page read and write
|
||
566000
|
heap
|
page read and write
|
||
BDE000
|
stack
|
page read and write
|
||
23B0000
|
direct allocation
|
page read and write
|
||
3080000
|
heap
|
page read and write
|
||
2845000
|
heap
|
page read and write
|
||
5F1000
|
heap
|
page read and write
|
||
1E4000
|
heap
|
page read and write
|
||
5BF000
|
heap
|
page read and write
|
||
1E4000
|
heap
|
page read and write
|
||
610000
|
heap
|
page read and write
|
||
372C000
|
stack
|
page read and write
|
||
2CD8000
|
heap
|
page read and write
|
||
2201000
|
heap
|
page read and write
|
||
2310000
|
trusted library allocation
|
page read and write
|
||
2B1D000
|
stack
|
page read and write
|
||
1AE000
|
stack
|
page read and write
|
||
1E4000
|
heap
|
page read and write
|
||
2310000
|
trusted library allocation
|
page read and write
|
||
30A0000
|
heap
|
page read and write
|
||
311E000
|
stack
|
page read and write
|
||
5DA000
|
heap
|
page read and write
|
||
400000
|
unkown
|
page readonly
|
||
50D000
|
stack
|
page read and write
|
||
410000
|
heap
|
page read and write
|
||
2A4E000
|
stack
|
page read and write
|
||
533000
|
direct allocation
|
page execute and read and write
|
||
43D000
|
stack
|
page read and write
|
||
26BD000
|
stack
|
page read and write
|
||
745000
|
direct allocation
|
page execute and read and write
|
||
534000
|
heap
|
page read and write
|
||
5F1000
|
heap
|
page read and write
|
||
1E4000
|
heap
|
page read and write
|
||
4FF000
|
stack
|
page read and write
|
||
2D10000
|
heap
|
page read and write
|
||
2170000
|
direct allocation
|
page read and write
|
||
2CBE000
|
stack
|
page read and write
|
||
34EE000
|
stack
|
page read and write
|
||
2750000
|
heap
|
page read and write
|
||
275E000
|
stack
|
page read and write
|
||
2E30000
|
trusted library allocation
|
page read and write
|
||
2100000
|
direct allocation
|
page read and write
|
||
1E4000
|
heap
|
page read and write
|
||
FD000
|
stack
|
page read and write
|
||
256B000
|
stack
|
page read and write
|
||
E8E000
|
heap
|
page read and write
|
||
2271000
|
heap
|
page read and write
|
||
3090000
|
heap
|
page read and write
|
||
EA9000
|
heap
|
page read and write
|
||
2860000
|
heap
|
page read and write
|
||
2201000
|
heap
|
page read and write
|
||
1E4000
|
heap
|
page read and write
|
||
1E4000
|
heap
|
page read and write
|
||
2B8E000
|
stack
|
page read and write
|
||
6E0000
|
heap
|
page read and write
|
||
2EA0000
|
heap
|
page read and write
|
||
2170000
|
direct allocation
|
page read and write
|
||
2170000
|
direct allocation
|
page read and write
|
||
2880000
|
heap
|
page read and write
|
||
2FC5000
|
heap
|
page read and write
|
||
2F3E000
|
stack
|
page read and write
|
||
550000
|
heap
|
page read and write
|
||
307D000
|
stack
|
page read and write
|
||
348E000
|
stack
|
page read and write
|
||
2B8E000
|
stack
|
page read and write
|
||
1E4000
|
heap
|
page read and write
|
||
F82000
|
heap
|
page read and write
|
||
2271000
|
heap
|
page read and write
|
||
5F4000
|
heap
|
page read and write
|
||
1E4000
|
heap
|
page read and write
|
||
1E4000
|
heap
|
page read and write
|
||
2B90000
|
heap
|
page read and write
|
||
2172000
|
direct allocation
|
page read and write
|
||
317F000
|
stack
|
page read and write
|
||
2310000
|
trusted library allocation
|
page read and write
|
||
2201000
|
heap
|
page read and write
|
||
2FEE000
|
stack
|
page read and write
|
||
2E30000
|
trusted library allocation
|
page read and write
|
||
1E0000
|
heap
|
page read and write
|
||
BD000
|
stack
|
page read and write
|
||
29CF000
|
heap
|
page read and write
|
||
2201000
|
heap
|
page read and write
|
||
2B9D000
|
stack
|
page read and write
|
||
33B0000
|
heap
|
page read and write
|
||
534000
|
heap
|
page read and write
|
||
EB6000
|
heap
|
page read and write
|
||
5F4000
|
heap
|
page read and write
|
||
2100000
|
direct allocation
|
page read and write
|
||
5E8000
|
heap
|
page read and write
|
||
58B000
|
heap
|
page read and write
|
||
2C00000
|
heap
|
page read and write
|
||
51AC000
|
stack
|
page read and write
|
||
5F4000
|
heap
|
page read and write
|
||
1E4000
|
heap
|
page read and write
|
||
2271000
|
heap
|
page read and write
|
||
2271000
|
heap
|
page read and write
|
||
2B60000
|
heap
|
page read and write
|
||
1E5000
|
heap
|
page read and write
|
||
2271000
|
heap
|
page read and write
|
||
760000
|
trusted library allocation
|
page read and write
|
||
2201000
|
heap
|
page read and write
|
||
D55000
|
remote allocation
|
page execute and read and write
|
||
2201000
|
heap
|
page read and write
|
||
2860000
|
heap
|
page read and write
|
||
1E4000
|
heap
|
page read and write
|
||
1E4000
|
heap
|
page read and write
|
||
1E4000
|
heap
|
page read and write
|
||
438000
|
unkown
|
page execute and read and write
|
||
2219000
|
heap
|
page read and write
|
||
5B8000
|
heap
|
page read and write
|
||
2310000
|
trusted library allocation
|
page read and write
|
||
1E4000
|
heap
|
page read and write
|
||
30B0000
|
heap
|
page read and write
|
||
5F4000
|
heap
|
page read and write
|
||
21B0000
|
heap
|
page read and write
|
||
1F7F000
|
stack
|
page read and write
|
||
1E4000
|
heap
|
page read and write
|
||
1E4000
|
heap
|
page read and write
|
||
296F000
|
stack
|
page read and write
|
||
2885000
|
heap
|
page read and write
|
||
29CF000
|
stack
|
page read and write
|
||
14D5000
|
heap
|
page read and write
|
||
889000
|
heap
|
page read and write
|
||
5F4000
|
heap
|
page read and write
|
||
2ACD000
|
stack
|
page read and write
|
||
2ED4000
|
heap
|
page read and write
|
||
2AEF000
|
stack
|
page read and write
|
||
473E000
|
stack
|
page read and write
|
||
58E000
|
stack
|
page read and write
|
||
760000
|
trusted library allocation
|
page read and write
|
||
1E4000
|
heap
|
page read and write
|
||
31F0000
|
heap
|
page read and write
|
||
1E4000
|
heap
|
page read and write
|
||
29EF000
|
stack
|
page read and write
|
||
489F000
|
stack
|
page read and write
|
||
19C000
|
stack
|
page read and write
|
||
1F0000
|
heap
|
page read and write
|
||
1E4000
|
heap
|
page read and write
|
||
27D0000
|
heap
|
page read and write
|
||
5F0000
|
heap
|
page read and write
|
||
54F000
|
stack
|
page read and write
|
||
2840000
|
heap
|
page read and write
|
||
2B7F000
|
stack
|
page read and write
|
||
2201000
|
heap
|
page read and write
|
||
23B0000
|
direct allocation
|
page read and write
|
||
288E000
|
stack
|
page read and write
|
||
1E4000
|
heap
|
page read and write
|
||
5C1000
|
heap
|
page read and write
|
||
2E30000
|
trusted library allocation
|
page read and write
|
||
5C1000
|
heap
|
page read and write
|
||
2E30000
|
trusted library allocation
|
page read and write
|
||
2201000
|
heap
|
page read and write
|
||
23B0000
|
direct allocation
|
page read and write
|
||
6EF000
|
stack
|
page read and write
|
||
1E4000
|
heap
|
page read and write
|
||
2A6F000
|
stack
|
page read and write
|
||
2271000
|
heap
|
page read and write
|
||
2FBF000
|
stack
|
page read and write
|
||
1E4000
|
heap
|
page read and write
|
||
1F0000
|
heap
|
page read and write
|
||
2201000
|
heap
|
page read and write
|
||
33C0000
|
heap
|
page read and write
|
||
338F000
|
stack
|
page read and write
|
||
534000
|
heap
|
page read and write
|
||
2CBD000
|
stack
|
page read and write
|
||
2B5D000
|
stack
|
page read and write
|
||
2F4F000
|
stack
|
page read and write
|
||
293F000
|
stack
|
page read and write
|
||
5F4000
|
heap
|
page read and write
|
||
2D78000
|
heap
|
page read and write
|
||
6FF000
|
stack
|
page read and write
|
||
5F4000
|
heap
|
page read and write
|
||
5F4000
|
heap
|
page read and write
|
||
27DF000
|
stack
|
page read and write
|
||
520000
|
heap
|
page read and write
|
||
2310000
|
trusted library allocation
|
page read and write
|
||
1E4000
|
heap
|
page read and write
|
||
2211000
|
heap
|
page read and write
|
||
2271000
|
heap
|
page read and write
|
||
534000
|
heap
|
page read and write
|
||
4D10000
|
heap
|
page read and write
|
||
30DD000
|
stack
|
page read and write
|
||
2170000
|
direct allocation
|
page read and write
|
||
58B000
|
heap
|
page read and write
|
||
1E4000
|
heap
|
page read and write
|
||
2315000
|
direct allocation
|
page execute and read and write
|
||
4E0C000
|
stack
|
page read and write
|
||
2201000
|
heap
|
page read and write
|
||
2100000
|
direct allocation
|
page read and write
|
||
2100000
|
direct allocation
|
page read and write
|
||
520000
|
heap
|
page read and write
|
||
42B000
|
unkown
|
page read and write
|
||
1E4000
|
heap
|
page read and write
|
||
1E4000
|
heap
|
page read and write
|
||
2211000
|
heap
|
page read and write
|
||
2310000
|
trusted library allocation
|
page read and write
|
||
2201000
|
heap
|
page read and write
|
||
2201000
|
heap
|
page read and write
|
||
2B4F000
|
stack
|
page read and write
|
||
2201000
|
heap
|
page read and write
|
||
5FC000
|
heap
|
page read and write
|
||
E94000
|
heap
|
page read and write
|
||
2271000
|
heap
|
page read and write
|
||
2271000
|
heap
|
page read and write
|
||
2219000
|
heap
|
page read and write
|
||
2211000
|
heap
|
page read and write
|
||
508000
|
heap
|
page read and write
|
||
431000
|
unkown
|
page read and write
|
||
43B0000
|
heap
|
page read and write
|
||
2830000
|
heap
|
page read and write
|
||
2211000
|
heap
|
page read and write
|
||
515000
|
heap
|
page read and write
|
||
3C0000
|
heap
|
page read and write
|
||
2100000
|
direct allocation
|
page read and write
|
||
88A000
|
heap
|
page read and write
|
||
820000
|
heap
|
page read and write
|
||
78E000
|
stack
|
page read and write
|
||
1E4000
|
heap
|
page read and write
|
||
2E30000
|
trusted library allocation
|
page read and write
|
||
2219000
|
heap
|
page read and write
|
||
1E4000
|
heap
|
page read and write
|
||
730000
|
heap
|
page read and write
|
||
2201000
|
heap
|
page read and write
|
||
2A3E000
|
stack
|
page read and write
|
||
354F000
|
stack
|
page read and write
|
||
530000
|
direct allocation
|
page execute and read and write
|
||
534000
|
heap
|
page read and write
|
||
1E4000
|
heap
|
page read and write
|
||
119E000
|
stack
|
page read and write
|
||
573000
|
heap
|
page read and write
|
||
28CE000
|
stack
|
page read and write
|
||
2ED0000
|
heap
|
page read and write
|
||
2201000
|
heap
|
page read and write
|
||
2AAC000
|
stack
|
page read and write
|
||
2271000
|
heap
|
page read and write
|
||
2934000
|
heap
|
page read and write
|
||
F10000
|
heap
|
page read and write
|
||
2271000
|
heap
|
page read and write
|
||
1F0000
|
heap
|
page read and write
|
||
1E4000
|
heap
|
page read and write
|
||
520000
|
heap
|
page read and write
|
||
1E4000
|
heap
|
page read and write
|
||
F6D000
|
heap
|
page read and write
|
||
26E000
|
stack
|
page read and write
|
||
234E000
|
stack
|
page read and write
|
||
534000
|
heap
|
page read and write
|
||
1E4000
|
heap
|
page read and write
|
||
2A7D000
|
stack
|
page read and write
|
||
5DA000
|
heap
|
page read and write
|
||
245E000
|
stack
|
page read and write
|
||
292E000
|
heap
|
page read and write
|
||
2219000
|
heap
|
page read and write
|
||
29E0000
|
heap
|
page read and write
|
||
1E4000
|
heap
|
page read and write
|
||
2170000
|
direct allocation
|
page read and write
|
||
5F4000
|
heap
|
page read and write
|
||
14AA000
|
heap
|
page read and write
|
||
534000
|
heap
|
page read and write
|
||
58F000
|
heap
|
page read and write
|
||
1E4000
|
heap
|
page read and write
|
||
3ED000
|
stack
|
page read and write
|
||
5F4000
|
heap
|
page read and write
|
||
400000
|
unkown
|
page readonly
|
||
2D4E000
|
stack
|
page read and write
|
||
160000
|
heap
|
page read and write
|
||
2219000
|
heap
|
page read and write
|
||
1E4000
|
heap
|
page read and write
|
||
9B000
|
stack
|
page read and write
|
||
36EE000
|
stack
|
page read and write
|
||
10AE000
|
stack
|
page read and write
|
||
1E4000
|
heap
|
page read and write
|
||
760000
|
trusted library allocation
|
page read and write
|
||
2C3E000
|
stack
|
page read and write
|
||
8CF000
|
stack
|
page read and write
|
||
6A0000
|
heap
|
page read and write
|
||
400000
|
unkown
|
page readonly
|
||
2219000
|
heap
|
page read and write
|
||
1E4000
|
heap
|
page read and write
|
||
2170000
|
direct allocation
|
page read and write
|
||
56C000
|
heap
|
page read and write
|
||
5F0000
|
direct allocation
|
page execute and read and write
|
||
2BF0000
|
heap
|
page read and write
|
||
2211000
|
heap
|
page read and write
|
||
5CA000
|
heap
|
page read and write
|
||
2201000
|
heap
|
page read and write
|
||
1E4000
|
heap
|
page read and write
|
||
2C1F000
|
stack
|
page read and write
|
||
2100000
|
direct allocation
|
page read and write
|
||
446000
|
unkown
|
page execute and write copy
|
||
1E4000
|
heap
|
page read and write
|
||
35C0000
|
heap
|
page read and write
|
||
23B0000
|
direct allocation
|
page read and write
|
||
5F4000
|
heap
|
page read and write
|
||
E98000
|
heap
|
page read and write
|
||
5F4000
|
heap
|
page read and write
|
||
2271000
|
heap
|
page read and write
|
||
2AE000
|
stack
|
page read and write
|
||
1E4000
|
heap
|
page read and write
|
||
2AA5000
|
heap
|
page read and write
|
||
2E30000
|
trusted library allocation
|
page read and write
|
||
5F4000
|
heap
|
page read and write
|
||
350000
|
heap
|
page read and write
|
||
F60000
|
heap
|
page read and write
|
||
27F5000
|
heap
|
page read and write
|
||
1E4000
|
heap
|
page read and write
|
||
2201000
|
heap
|
page read and write
|
||
868000
|
heap
|
page read and write
|
||
1145000
|
heap
|
page read and write
|
||
2201000
|
heap
|
page read and write
|
||
23B0000
|
direct allocation
|
page read and write
|
||
2219000
|
heap
|
page read and write
|
||
6E5000
|
heap
|
page read and write
|
||
9B000
|
stack
|
page read and write
|
||
2930000
|
heap
|
page read and write
|
||
29C0000
|
heap
|
page read and write
|
||
1E4000
|
heap
|
page read and write
|
||
28FE000
|
stack
|
page read and write
|
||
2271000
|
heap
|
page read and write
|
||
534000
|
heap
|
page read and write
|
||
1E4000
|
heap
|
page read and write
|
||
28EE000
|
stack
|
page read and write
|
||
F83000
|
heap
|
page read and write
|
||
2219000
|
heap
|
page read and write
|
||
2ADE000
|
stack
|
page read and write
|
||
438000
|
unkown
|
page execute and write copy
|
||
2E4F000
|
stack
|
page read and write
|
||
2330000
|
direct allocation
|
page execute and read and write
|
||
2B4E000
|
stack
|
page read and write
|
||
47BE000
|
stack
|
page read and write
|
||
2E30000
|
trusted library allocation
|
page read and write
|
||
5F4000
|
heap
|
page read and write
|
||
9CF000
|
stack
|
page read and write
|
||
273D000
|
stack
|
page read and write
|
||
5F4000
|
heap
|
page read and write
|
||
1AD000
|
stack
|
page read and write
|
||
1E4000
|
heap
|
page read and write
|
||
2F60000
|
heap
|
page read and write
|
||
2271000
|
heap
|
page read and write
|
||
2271000
|
heap
|
page read and write
|
||
2D00000
|
heap
|
page read and write
|
||
5FC000
|
heap
|
page read and write
|
||
5E0000
|
heap
|
page read and write
|
||
2201000
|
heap
|
page read and write
|
||
2E30000
|
trusted library allocation
|
page read and write
|
||
1E4000
|
heap
|
page read and write
|
||
5F4000
|
heap
|
page read and write
|
||
2D5E000
|
stack
|
page read and write
|
||
5F4000
|
heap
|
page read and write
|
||
340E000
|
stack
|
page read and write
|
||
437000
|
unkown
|
page read and write
|
||
2B9C000
|
stack
|
page read and write
|
||
2270000
|
heap
|
page read and write
|
||
276F000
|
stack
|
page read and write
|
||
3EF000
|
stack
|
page read and write
|
||
2271000
|
heap
|
page read and write
|
||
420000
|
heap
|
page read and write
|
||
536000
|
direct allocation
|
page execute and read and write
|
||
2201000
|
heap
|
page read and write
|
||
5F4000
|
heap
|
page read and write
|
||
1E4000
|
heap
|
page read and write
|
||
F40000
|
heap
|
page read and write
|
||
27F0000
|
heap
|
page read and write
|
||
310F000
|
stack
|
page read and write
|
||
2271000
|
heap
|
page read and write
|
||
30E0000
|
trusted library allocation
|
page read and write
|
||
1E4000
|
heap
|
page read and write
|
||
750000
|
direct allocation
|
page execute and read and write
|
||
401000
|
unkown
|
page read and write
|
||
600000
|
trusted library allocation
|
page read and write
|
||
2271000
|
heap
|
page read and write
|
||
760000
|
trusted library allocation
|
page read and write
|
||
1E4000
|
heap
|
page read and write
|
||
2B05000
|
heap
|
page read and write
|
||
2271000
|
heap
|
page read and write
|
||
2201000
|
heap
|
page read and write
|
||
2201000
|
heap
|
page read and write
|
||
1E4000
|
heap
|
page read and write
|
||
34F000
|
stack
|
page read and write
|
||
2FED000
|
stack
|
page read and write
|
||
5C1000
|
heap
|
page read and write
|
||
780000
|
direct allocation
|
page read and write
|
||
5F4000
|
heap
|
page read and write
|
||
B68000
|
stack
|
page read and write
|
||
27CE000
|
stack
|
page read and write
|
||
534000
|
heap
|
page read and write
|
||
1E4000
|
heap
|
page read and write
|
||
2201000
|
heap
|
page read and write
|
||
2210000
|
heap
|
page read and write
|
||
1E4000
|
heap
|
page read and write
|
||
6F0000
|
heap
|
page read and write
|
||
23B0000
|
direct allocation
|
page read and write
|
||
5CA000
|
heap
|
page read and write
|
||
2170000
|
direct allocation
|
page read and write
|
||
2810000
|
heap
|
page read and write
|
||
2271000
|
heap
|
page read and write
|
||
2E30000
|
trusted library allocation
|
page read and write
|
||
7CE000
|
stack
|
page read and write
|
||
2800000
|
heap
|
page read and write
|
||
859000
|
heap
|
page read and write
|
||
534000
|
heap
|
page read and write
|
||
534000
|
heap
|
page read and write
|
||
37E000
|
stack
|
page read and write
|
||
2F50000
|
heap
|
page read and write
|
||
315F000
|
stack
|
page read and write
|
||
23B0000
|
direct allocation
|
page read and write
|
||
148B000
|
heap
|
page read and write
|
||
3100000
|
heap
|
page read and write
|
||
2219000
|
heap
|
page read and write
|
||
299E000
|
stack
|
page read and write
|
||
1E4000
|
heap
|
page read and write
|
||
2175000
|
direct allocation
|
page read and write
|
||
2271000
|
heap
|
page read and write
|
||
2310000
|
trusted library allocation
|
page read and write
|
||
23AC000
|
heap
|
page read and write
|
||
1E4000
|
heap
|
page read and write
|
||
536000
|
direct allocation
|
page execute and read and write
|
||
2271000
|
heap
|
page read and write
|
||
450000
|
heap
|
page read and write
|
||
1E4000
|
heap
|
page read and write
|
||
2E30000
|
trusted library allocation
|
page read and write
|
||
2BB0000
|
heap
|
page read and write
|
||
70E000
|
stack
|
page read and write
|
||
47D000
|
stack
|
page read and write
|
||
2E30000
|
trusted library allocation
|
page read and write
|
||
6B0000
|
heap
|
page read and write
|
||
2201000
|
heap
|
page read and write
|
||
2219000
|
heap
|
page read and write
|
||
534000
|
heap
|
page read and write
|
||
5F4000
|
heap
|
page read and write
|
||
23B0000
|
direct allocation
|
page read and write
|
||
2271000
|
heap
|
page read and write
|
||
2B7E000
|
stack
|
page read and write
|
||
8D0000
|
heap
|
page read and write
|
||
6E0000
|
heap
|
page read and write
|
||
1E4000
|
heap
|
page read and write
|
||
2271000
|
heap
|
page read and write
|
||
14AB000
|
heap
|
page read and write
|
||
5F4000
|
heap
|
page read and write
|
||
2170000
|
direct allocation
|
page read and write
|
||
5F4000
|
heap
|
page read and write
|
||
2170000
|
direct allocation
|
page read and write
|
||
2E00000
|
heap
|
page read and write
|
||
2CDC000
|
stack
|
page read and write
|
||
2201000
|
heap
|
page read and write
|
||
2D2E000
|
stack
|
page read and write
|
||
2201000
|
heap
|
page read and write
|
||
1E4000
|
heap
|
page read and write
|
||
2170000
|
direct allocation
|
page read and write
|
||
42B000
|
unkown
|
page read and write
|
||
2820000
|
heap
|
page read and write
|
||
1EF000
|
stack
|
page read and write
|
||
700000
|
trusted library allocation
|
page read and write
|
||
47FF000
|
stack
|
page read and write
|
||
500000
|
heap
|
page read and write
|
||
534000
|
heap
|
page read and write
|
||
1E4000
|
heap
|
page read and write
|
||
14AA000
|
heap
|
page read and write
|
||
30E0000
|
heap
|
page read and write
|
||
2BD0000
|
heap
|
page read and write
|
||
339E000
|
stack
|
page read and write
|
||
5D0000
|
heap
|
page read and write
|
||
1E4000
|
heap
|
page read and write
|
||
2780000
|
heap
|
page read and write
|
||
2170000
|
direct allocation
|
page read and write
|
||
2201000
|
heap
|
page read and write
|
||
2211000
|
heap
|
page read and write
|
||
58D000
|
heap
|
page read and write
|
||
2170000
|
direct allocation
|
page read and write
|
||
2201000
|
heap
|
page read and write
|
||
23B0000
|
direct allocation
|
page read and write
|
||
2271000
|
heap
|
page read and write
|
||
544000
|
heap
|
page read and write
|
||
1E4000
|
heap
|
page read and write
|
||
1E4000
|
heap
|
page read and write
|
||
2170000
|
direct allocation
|
page read and write
|
||
2310000
|
trusted library allocation
|
page read and write
|
||
400000
|
unkown
|
page readonly
|
||
2CCD000
|
stack
|
page read and write
|
||
2CF0000
|
heap
|
page read and write
|
||
2E30000
|
trusted library allocation
|
page read and write
|
||
530000
|
heap
|
page read and write
|
||
6D0000
|
heap
|
page read and write
|
||
2E4E000
|
stack
|
page read and write
|
||
F53000
|
heap
|
page read and write
|
||
565000
|
heap
|
page read and write
|
||
1E4000
|
heap
|
page read and write
|
||
23B0000
|
direct allocation
|
page read and write
|
||
2E30000
|
trusted library allocation
|
page read and write
|
||
2271000
|
heap
|
page read and write
|
||
1E4000
|
heap
|
page read and write
|
||
382F000
|
stack
|
page read and write
|
||
28EF000
|
stack
|
page read and write
|
||
7F2000
|
heap
|
page read and write
|
||
60F000
|
stack
|
page read and write
|
||
2100000
|
direct allocation
|
page read and write
|
||
2C3D000
|
stack
|
page read and write
|
||
35EC000
|
stack
|
page read and write
|
||
1E4000
|
heap
|
page read and write
|
||
710000
|
heap
|
page read and write
|
||
27AE000
|
stack
|
page read and write
|
||
19C000
|
stack
|
page read and write
|
||
2B4F000
|
stack
|
page read and write
|
||
5F4000
|
heap
|
page read and write
|
||
55B000
|
heap
|
page read and write
|
||
2271000
|
heap
|
page read and write
|
||
4D20000
|
heap
|
page read and write
|
||
2A0E000
|
stack
|
page read and write
|
||
1E4000
|
heap
|
page read and write
|
||
2170000
|
direct allocation
|
page read and write
|
||
2271000
|
heap
|
page read and write
|
||
BE0000
|
heap
|
page read and write
|
||
2271000
|
heap
|
page read and write
|
||
2E30000
|
trusted library allocation
|
page read and write
|
||
2840000
|
heap
|
page read and write
|
||
148C000
|
heap
|
page read and write
|
||
2219000
|
heap
|
page read and write
|
||
2211000
|
heap
|
page read and write
|
||
2808000
|
heap
|
page read and write
|
||
2201000
|
heap
|
page read and write
|
||
5F4000
|
heap
|
page read and write
|
||
35C8000
|
heap
|
page read and write
|
||
322B000
|
stack
|
page read and write
|
||
29CC000
|
heap
|
page read and write
|
||
2080000
|
heap
|
page read and write
|
||
534000
|
heap
|
page read and write
|
||
29A8000
|
heap
|
page read and write
|
||
760000
|
trusted library allocation
|
page read and write
|
||
1E4000
|
heap
|
page read and write
|
||
2201000
|
heap
|
page read and write
|
||
1E4000
|
heap
|
page read and write
|
||
2211000
|
heap
|
page read and write
|
||
2105000
|
direct allocation
|
page read and write
|
||
2AEF000
|
stack
|
page read and write
|
||
2271000
|
heap
|
page read and write
|
||
1FFE000
|
stack
|
page read and write
|
||
EAB000
|
heap
|
page read and write
|
||
592000
|
heap
|
page read and write
|
||
2100000
|
direct allocation
|
page read and write
|
||
2F30000
|
heap
|
page read and write
|
||
2885000
|
heap
|
page read and write
|
||
58D000
|
heap
|
page read and write
|
||
2DFE000
|
stack
|
page read and write
|
||
66E000
|
heap
|
page read and write
|
||
FA8000
|
heap
|
page read and write
|
||
760000
|
trusted library allocation
|
page read and write
|
||
23B0000
|
direct allocation
|
page read and write
|
||
1E4000
|
heap
|
page read and write
|
||
5D5000
|
heap
|
page read and write
|
||
376C000
|
stack
|
page read and write
|
||
21F0000
|
direct allocation
|
page execute and read and write
|
||
2ECE000
|
stack
|
page read and write
|
||
2280000
|
heap
|
page read and write
|
||
760000
|
trusted library allocation
|
page read and write
|
||
1290000
|
heap
|
page read and write
|
||
1E4000
|
heap
|
page read and write
|
||
215E000
|
stack
|
page read and write
|
||
28D0000
|
heap
|
page read and write
|
||
1E4000
|
heap
|
page read and write
|
||
EAD000
|
heap
|
page read and write
|
||
1E4000
|
heap
|
page read and write
|
||
27C8000
|
heap
|
page read and write
|
||
2170000
|
direct allocation
|
page read and write
|
||
28D8000
|
heap
|
page read and write
|
||
1E4000
|
heap
|
page read and write
|
||
2A7E000
|
stack
|
page read and write
|
||
534000
|
heap
|
page read and write
|
||
2211000
|
heap
|
page read and write
|
||
1E4000
|
heap
|
page read and write
|
||
362C000
|
stack
|
page read and write
|
||
32D0000
|
heap
|
page read and write
|
||
2271000
|
heap
|
page read and write
|
||
6DB000
|
heap
|
page read and write
|
||
F5E000
|
heap
|
page read and write
|
||
312C000
|
stack
|
page read and write
|
||
5D2000
|
heap
|
page read and write
|
||
534000
|
heap
|
page read and write
|
||
3F0000
|
heap
|
page read and write
|
||
533000
|
heap
|
page read and write
|
||
2211000
|
heap
|
page read and write
|
||
2170000
|
direct allocation
|
page read and write
|
||
5F4000
|
heap
|
page read and write
|
||
1E0000
|
heap
|
page read and write
|
||
2A3F000
|
stack
|
page read and write
|
||
1E4000
|
heap
|
page read and write
|
||
5F4000
|
heap
|
page read and write
|
||
14D5000
|
heap
|
page read and write
|
||
5B7000
|
heap
|
page read and write
|
||
1E4000
|
heap
|
page read and write
|
||
1200000
|
heap
|
page read and write
|
||
3100000
|
heap
|
page read and write
|
||
50AC000
|
stack
|
page read and write
|
||
2A50000
|
heap
|
page read and write
|
||
2219000
|
heap
|
page read and write
|
||
2350000
|
trusted library allocation
|
page read and write
|
||
33DF000
|
stack
|
page read and write
|
||
14D3000
|
heap
|
page read and write
|
||
401000
|
unkown
|
page read and write
|
||
2E30000
|
trusted library allocation
|
page read and write
|
||
1E4000
|
heap
|
page read and write
|
||
2350000
|
trusted library allocation
|
page read and write
|
||
2100000
|
direct allocation
|
page read and write
|
||
2E30000
|
trusted library allocation
|
page read and write
|
||
27E0000
|
heap
|
page read and write
|
||
2E30000
|
trusted library allocation
|
page read and write
|
||
30D5000
|
heap
|
page read and write
|
||
246F000
|
stack
|
page read and write
|
||
2271000
|
heap
|
page read and write
|
||
5F4000
|
heap
|
page read and write
|
||
2170000
|
direct allocation
|
page read and write
|
||
2900000
|
heap
|
page read and write
|
||
2211000
|
heap
|
page read and write
|
||
5F4000
|
heap
|
page read and write
|
||
1E4000
|
heap
|
page read and write
|
||
2B30000
|
heap
|
page read and write
|
||
5F4000
|
heap
|
page read and write
|
||
308F000
|
stack
|
page read and write
|
||
307F000
|
stack
|
page read and write
|
||
4B0000
|
heap
|
page read and write
|
||
1E4000
|
heap
|
page read and write
|
||
2AD000
|
stack
|
page read and write
|
||
760000
|
trusted library allocation
|
page read and write
|
||
2271000
|
heap
|
page read and write
|
||
530000
|
direct allocation
|
page execute and read and write
|
||
2E30000
|
trusted library allocation
|
page read and write
|
||
5F7000
|
heap
|
page read and write
|
||
590000
|
heap
|
page read and write
|
||
1E4000
|
heap
|
page read and write
|
||
1E4000
|
heap
|
page read and write
|
||
713000
|
heap
|
page read and write
|
||
1E4000
|
heap
|
page read and write
|
||
100000
|
remote allocation
|
page execute and read and write
|
||
534000
|
heap
|
page read and write
|
||
23B0000
|
direct allocation
|
page read and write
|
||
2201000
|
heap
|
page read and write
|
||
2201000
|
heap
|
page read and write
|
||
534000
|
heap
|
page read and write
|
||
534000
|
heap
|
page read and write
|
||
2211000
|
heap
|
page read and write
|
||
19B000
|
stack
|
page read and write
|
||
2200000
|
direct allocation
|
page read and write
|
||
327E000
|
stack
|
page read and write
|
||
4370000
|
heap
|
page read and write
|
||
BB0000
|
heap
|
page read and write
|
||
438000
|
unkown
|
page execute and read and write
|
||
FA8000
|
heap
|
page read and write
|
||
30C0000
|
heap
|
page read and write
|
||
2BFE000
|
stack
|
page read and write
|
||
2F1E000
|
stack
|
page read and write
|
||
14D3000
|
heap
|
page read and write
|
||
308F000
|
stack
|
page read and write
|
||
2102000
|
direct allocation
|
page read and write
|
||
63D000
|
stack
|
page read and write
|
||
68E000
|
stack
|
page read and write
|
||
3008000
|
heap
|
page read and write
|
||
47E000
|
stack
|
page read and write
|
||
2B0D000
|
stack
|
page read and write
|
||
2938000
|
heap
|
page read and write
|
||
1E4000
|
heap
|
page read and write
|
||
1E4000
|
heap
|
page read and write
|
||
29DC000
|
heap
|
page read and write
|
||
534000
|
heap
|
page read and write
|
||
1E4000
|
heap
|
page read and write
|
||
1440000
|
heap
|
page read and write
|
||
2100000
|
direct allocation
|
page read and write
|
||
27DF000
|
stack
|
page read and write
|
||
2AF0000
|
heap
|
page read and write
|
||
2201000
|
heap
|
page read and write
|
||
5D8000
|
heap
|
page read and write
|
||
12D000
|
stack
|
page read and write
|
||
2FC0000
|
heap
|
page read and write
|
||
606000
|
heap
|
page read and write
|
||
2AA0000
|
heap
|
page read and write
|
||
275E000
|
stack
|
page read and write
|
||
2201000
|
heap
|
page read and write
|
||
1E4000
|
heap
|
page read and write
|
||
2100000
|
direct allocation
|
page read and write
|
||
3148000
|
heap
|
page read and write
|
||
2E30000
|
trusted library allocation
|
page read and write
|
||
1410000
|
heap
|
page read and write
|
||
1E4000
|
heap
|
page read and write
|
||
1E4000
|
heap
|
page read and write
|
||
2100000
|
direct allocation
|
page read and write
|
||
2ED000
|
stack
|
page read and write
|
||
5CE000
|
heap
|
page read and write
|
||
20DE000
|
stack
|
page read and write
|
||
2E30000
|
trusted library allocation
|
page read and write
|
||
2219000
|
heap
|
page read and write
|
||
431000
|
unkown
|
page read and write
|
||
2271000
|
heap
|
page read and write
|
||
2219000
|
heap
|
page read and write
|
||
2271000
|
heap
|
page read and write
|
||
886000
|
heap
|
page read and write
|
||
1E4000
|
heap
|
page read and write
|
||
1E4000
|
heap
|
page read and write
|
||
1E4000
|
heap
|
page read and write
|
||
889000
|
heap
|
page read and write
|
||
1E4000
|
heap
|
page read and write
|
||
2310000
|
trusted library allocation
|
page read and write
|
||
38E000
|
stack
|
page read and write
|
||
2201000
|
heap
|
page read and write
|
||
1E4000
|
heap
|
page read and write
|
||
2219000
|
heap
|
page read and write
|
||
27EF000
|
stack
|
page read and write
|
||
640000
|
heap
|
page read and write
|
||
5DA000
|
heap
|
page read and write
|
||
2211000
|
heap
|
page read and write
|
||
1E4000
|
heap
|
page read and write
|
||
1625000
|
heap
|
page read and write
|
||
3430000
|
heap
|
page read and write
|
||
1E4000
|
heap
|
page read and write
|
||
5F4000
|
heap
|
page read and write
|
||
282E000
|
stack
|
page read and write
|
||
2E2E000
|
stack
|
page read and write
|
||
5F4000
|
heap
|
page read and write
|
||
2201000
|
heap
|
page read and write
|
||
58D000
|
stack
|
page read and write
|
||
2201000
|
heap
|
page read and write
|
||
78F000
|
stack
|
page read and write
|
||
2FC0000
|
heap
|
page read and write
|
||
1E4000
|
heap
|
page read and write
|
||
2BEF000
|
stack
|
page read and write
|
||
477F000
|
stack
|
page read and write
|
||
2E30000
|
trusted library allocation
|
page read and write
|
||
760000
|
trusted library allocation
|
page read and write
|
||
2170000
|
direct allocation
|
page read and write
|
||
2211000
|
heap
|
page read and write
|
||
1E4000
|
heap
|
page read and write
|
||
660000
|
heap
|
page read and write
|
||
2B00000
|
heap
|
page read and write
|
||
1E4000
|
heap
|
page read and write
|
||
30E8000
|
heap
|
page read and write
|
||
198000
|
stack
|
page read and write
|
||
2271000
|
heap
|
page read and write
|
||
534000
|
heap
|
page read and write
|
||
2201000
|
heap
|
page read and write
|
||
1E4000
|
heap
|
page read and write
|
||
5F4000
|
heap
|
page read and write
|
||
1E4000
|
heap
|
page read and write
|
||
2830000
|
heap
|
page read and write
|
||
2271000
|
heap
|
page read and write
|
||
534000
|
heap
|
page read and write
|
||
2CD0000
|
heap
|
page read and write
|
||
293E000
|
heap
|
page read and write
|
||
1E4000
|
heap
|
page read and write
|
||
21E0000
|
direct allocation
|
page execute and read and write
|
||
400000
|
unkown
|
page readonly
|
||
1E4000
|
heap
|
page read and write
|
||
2201000
|
heap
|
page read and write
|
||
5F4000
|
heap
|
page read and write
|
||
27C0000
|
heap
|
page read and write
|
||
700000
|
direct allocation
|
page execute and read and write
|
||
760000
|
trusted library allocation
|
page read and write
|
||
2B4E000
|
stack
|
page read and write
|
||
1E4000
|
heap
|
page read and write
|
||
2219000
|
heap
|
page read and write
|
||
2271000
|
heap
|
page read and write
|
||
1E4000
|
heap
|
page read and write
|
||
B50000
|
heap
|
page read and write
|
||
5F4000
|
heap
|
page read and write
|
||
277F000
|
stack
|
page read and write
|
||
2100000
|
direct allocation
|
page read and write
|
||
2201000
|
heap
|
page read and write
|
||
51EE000
|
stack
|
page read and write
|
||
1E4000
|
heap
|
page read and write
|
||
740000
|
direct allocation
|
page execute and read and write
|
||
58F000
|
heap
|
page read and write
|
||
2E30000
|
trusted library allocation
|
page read and write
|
||
1E4000
|
heap
|
page read and write
|
||
2CED000
|
stack
|
page read and write
|
||
28F0000
|
heap
|
page read and write
|
||
2271000
|
heap
|
page read and write
|
||
2271000
|
heap
|
page read and write
|
||
23B0000
|
direct allocation
|
page read and write
|
||
1E4000
|
heap
|
page read and write
|
||
2CBE000
|
stack
|
page read and write
|
||
5F4000
|
heap
|
page read and write
|
||
31F5000
|
heap
|
page read and write
|
||
606000
|
heap
|
page read and write
|
||
534000
|
heap
|
page read and write
|
||
3085000
|
heap
|
page read and write
|
||
2B90000
|
heap
|
page read and write
|
||
EA4000
|
heap
|
page read and write
|
||
1E4000
|
heap
|
page read and write
|
||
2271000
|
heap
|
page read and write
|
||
5F4000
|
heap
|
page read and write
|
||
1278000
|
stack
|
page read and write
|
||
EA9000
|
heap
|
page read and write
|
||
760000
|
trusted library allocation
|
page read and write
|
||
2271000
|
heap
|
page read and write
|
||
50E000
|
stack
|
page read and write
|
||
5F4000
|
heap
|
page read and write
|
||
2DFD000
|
stack
|
page read and write
|
||
5F4000
|
heap
|
page read and write
|
||
2ABF000
|
stack
|
page read and write
|
||
1E4000
|
heap
|
page read and write
|
||
2271000
|
heap
|
page read and write
|
||
2820000
|
heap
|
page read and write
|
||
2E30000
|
trusted library allocation
|
page read and write
|
||
2211000
|
heap
|
page read and write
|
||
2271000
|
heap
|
page read and write
|
||
2211000
|
heap
|
page read and write
|
||
1E4000
|
heap
|
page read and write
|
||
2201000
|
heap
|
page read and write
|
||
2EF0000
|
heap
|
page read and write
|
||
5E1000
|
heap
|
page read and write
|
||
2A2E000
|
stack
|
page read and write
|
||
29A0000
|
heap
|
page read and write
|
||
2201000
|
heap
|
page read and write
|
||
2F4C000
|
stack
|
page read and write
|
||
3190000
|
heap
|
page read and write
|
||
3080000
|
heap
|
page read and write
|
||
5F4000
|
heap
|
page read and write
|
||
2CF8000
|
heap
|
page read and write
|
||
27BE000
|
stack
|
page read and write
|
||
534000
|
heap
|
page read and write
|
||
25AC000
|
stack
|
page read and write
|
||
23B0000
|
direct allocation
|
page read and write
|
||
2271000
|
heap
|
page read and write
|
||
5F4000
|
heap
|
page read and write
|
||
1E4000
|
heap
|
page read and write
|
||
2211000
|
heap
|
page read and write
|
||
2201000
|
heap
|
page read and write
|
||
EB6000
|
heap
|
page read and write
|
||
70E000
|
stack
|
page read and write
|
||
2201000
|
heap
|
page read and write
|
||
2BBC000
|
stack
|
page read and write
|
||
1E4000
|
heap
|
page read and write
|
||
58D000
|
heap
|
page read and write
|
||
5F4000
|
heap
|
page read and write
|
||
5BF000
|
heap
|
page read and write
|
||
2201000
|
heap
|
page read and write
|
||
7CE000
|
stack
|
page read and write
|
||
2219000
|
heap
|
page read and write
|
||
46FF000
|
stack
|
page read and write
|
||
2271000
|
heap
|
page read and write
|
||
1E4000
|
heap
|
page read and write
|
||
2ADD000
|
stack
|
page read and write
|
||
4F0E000
|
stack
|
page read and write
|
||
336F000
|
stack
|
page read and write
|
||
5BF000
|
heap
|
page read and write
|
||
30D0000
|
heap
|
page read and write
|
||
2271000
|
heap
|
page read and write
|
||
23B5000
|
direct allocation
|
page read and write
|
||
760000
|
trusted library allocation
|
page read and write
|
||
E83000
|
heap
|
page read and write
|
||
3860000
|
heap
|
page read and write
|
||
1E4000
|
heap
|
page read and write
|
||
430000
|
heap
|
page read and write
|
||
1E4000
|
heap
|
page read and write
|
||
2100000
|
direct allocation
|
page read and write
|
||
23B2000
|
direct allocation
|
page read and write
|
||
1E4000
|
heap
|
page read and write
|
||
2201000
|
heap
|
page read and write
|
||
2210000
|
heap
|
page read and write
|
||
67D000
|
stack
|
page read and write
|
||
68E000
|
stack
|
page read and write
|
||
1E4000
|
heap
|
page read and write
|
||
438000
|
unkown
|
page execute and write copy
|
||
2EBA000
|
stack
|
page read and write
|
||
14D5000
|
heap
|
page read and write
|
||
2100000
|
direct allocation
|
page read and write
|
||
760000
|
trusted library allocation
|
page read and write
|
||
543000
|
direct allocation
|
page execute and read and write
|
||
300E000
|
stack
|
page read and write
|
||
534000
|
heap
|
page read and write
|
||
5F0000
|
heap
|
page read and write
|
||
27D8000
|
heap
|
page read and write
|
||
27FD000
|
stack
|
page read and write
|
||
2201000
|
heap
|
page read and write
|
||
2AF5000
|
heap
|
page read and write
|
||
630000
|
heap
|
page read and write
|
||
2DDE000
|
stack
|
page read and write
|
||
2271000
|
heap
|
page read and write
|
||
28AE000
|
stack
|
page read and write
|
||
2219000
|
heap
|
page read and write
|
||
2E30000
|
trusted library allocation
|
page read and write
|
||
23B0000
|
direct allocation
|
page read and write
|
||
1E4000
|
heap
|
page read and write
|
||
3AE000
|
stack
|
page read and write
|
||
5F7000
|
heap
|
page read and write
|
||
292C000
|
heap
|
page read and write
|
||
2310000
|
trusted library allocation
|
page read and write
|
||
23B0000
|
direct allocation
|
page read and write
|
||
29FF000
|
stack
|
page read and write
|
||
2271000
|
heap
|
page read and write
|
||
2B2E000
|
stack
|
page read and write
|
||
2D70000
|
heap
|
page read and write
|
||
1E4000
|
heap
|
page read and write
|
||
436E000
|
stack
|
page read and write
|
||
267E000
|
stack
|
page read and write
|
||
2810000
|
heap
|
page read and write
|
||
2C7F000
|
stack
|
page read and write
|
||
285E000
|
stack
|
page read and write
|
||
431000
|
unkown
|
page read and write
|
||
1E4000
|
heap
|
page read and write
|
||
546000
|
direct allocation
|
page execute and read and write
|
||
2B1E000
|
stack
|
page read and write
|
||
2281000
|
heap
|
page read and write
|
||
533000
|
direct allocation
|
page execute and read and write
|
||
2BC0000
|
heap
|
page read and write
|
||
2D8F000
|
stack
|
page read and write
|
||
5CE000
|
stack
|
page read and write
|
||
34CE000
|
stack
|
page read and write
|
||
2A8F000
|
stack
|
page read and write
|
||
26BE000
|
stack
|
page read and write
|
||
1463000
|
heap
|
page read and write
|
||
885000
|
heap
|
page read and write
|
||
534000
|
heap
|
page read and write
|
||
4D0000
|
heap
|
page read and write
|
||
2170000
|
direct allocation
|
page read and write
|
||
534000
|
heap
|
page read and write
|
||
23B0000
|
direct allocation
|
page read and write
|
||
1E4000
|
heap
|
page read and write
|
||
2F60000
|
heap
|
page read and write
|
||
446000
|
unkown
|
page execute and write copy
|
||
29E0000
|
heap
|
page read and write
|
||
2C0000
|
heap
|
page read and write
|
||
720000
|
direct allocation
|
page read and write
|
||
1E4000
|
heap
|
page read and write
|
||
2170000
|
direct allocation
|
page read and write
|
||
276F000
|
stack
|
page read and write
|
||
1E4000
|
heap
|
page read and write
|
||
2220000
|
heap
|
page read and write
|
||
2211000
|
heap
|
page read and write
|
||
58B000
|
heap
|
page read and write
|
||
597000
|
heap
|
page read and write
|
||
53F000
|
heap
|
page read and write
|
||
2201000
|
heap
|
page read and write
|
||
2C9D000
|
stack
|
page read and write
|
||
33D000
|
stack
|
page read and write
|
||
2F50000
|
heap
|
page read and write
|
||
534000
|
heap
|
page read and write
|
||
2880000
|
heap
|
page read and write
|
||
660000
|
heap
|
page read and write
|
||
2D60000
|
heap
|
page read and write
|
||
211E000
|
stack
|
page read and write
|
||
1E4000
|
heap
|
page read and write
|
||
23B0000
|
direct allocation
|
page read and write
|
||
2934000
|
heap
|
page read and write
|
||
2271000
|
heap
|
page read and write
|
||
2271000
|
heap
|
page read and write
|
||
3550000
|
heap
|
page read and write
|
||
5F4000
|
heap
|
page read and write
|
||
FA8000
|
heap
|
page read and write
|
||
2201000
|
heap
|
page read and write
|
||
592000
|
heap
|
page read and write
|
||
401000
|
unkown
|
page read and write
|
||
5F4000
|
heap
|
page read and write
|
||
400000
|
unkown
|
page readonly
|
||
ED000
|
stack
|
page read and write
|
||
438000
|
unkown
|
page execute and write copy
|
||
2BCF000
|
stack
|
page read and write
|
||
1E4000
|
heap
|
page read and write
|
||
1E4000
|
heap
|
page read and write
|
||
2850000
|
heap
|
page read and write
|
||
5F4000
|
heap
|
page read and write
|
||
2B0000
|
heap
|
page read and write
|
||
24AE000
|
stack
|
page read and write
|
||
5F4000
|
heap
|
page read and write
|
||
540000
|
direct allocation
|
page execute and read and write
|
||
438000
|
unkown
|
page execute and read and write
|
||
2FAE000
|
stack
|
page read and write
|
||
1E4000
|
heap
|
page read and write
|
||
2201000
|
heap
|
page read and write
|
||
7DE000
|
heap
|
page read and write
|
||
2D30000
|
heap
|
page read and write
|
||
610000
|
direct allocation
|
page read and write
|
||
2BE0000
|
heap
|
page read and write
|
||
2FB0000
|
heap
|
page read and write
|
||
534000
|
heap
|
page read and write
|
||
2310000
|
direct allocation
|
page execute and read and write
|
||
2211000
|
heap
|
page read and write
|
||
600000
|
trusted library allocation
|
page read and write
|
||
2D00000
|
heap
|
page read and write
|
||
2271000
|
heap
|
page read and write
|
||
1E4000
|
heap
|
page read and write
|
||
2201000
|
heap
|
page read and write
|
||
5B7000
|
heap
|
page read and write
|
||
24F0000
|
heap
|
page read and write
|
||
BC0000
|
heap
|
page read and write
|
||
293E000
|
heap
|
page read and write
|
||
23B0000
|
direct allocation
|
page read and write
|
||
2310000
|
trusted library allocation
|
page read and write
|
||
1E4000
|
heap
|
page read and write
|
||
1E4000
|
heap
|
page read and write
|
||
113E000
|
stack
|
page read and write
|
||
14CD000
|
heap
|
page read and write
|
||
2E30000
|
trusted library allocation
|
page read and write
|
||
6D0000
|
heap
|
page read and write
|
||
2FE5000
|
heap
|
page read and write
|
||
9B000
|
stack
|
page read and write
|
||
105000
|
remote allocation
|
page execute and read and write
|
||
5D0000
|
heap
|
page read and write
|
||
23A7000
|
heap
|
page read and write
|
||
2201000
|
heap
|
page read and write
|
||
5D8000
|
heap
|
page read and write
|
||
3108000
|
heap
|
page read and write
|
||
2F20000
|
heap
|
page read and write
|
||
23B0000
|
direct allocation
|
page read and write
|
||
2100000
|
direct allocation
|
page read and write
|
||
2211000
|
heap
|
page read and write
|
||
7DA000
|
heap
|
page read and write
|
There are 1156 hidden memdumps, click here to show them.
DOM / HTML
URL
|
Malicious
|
|
---|---|---|
http://www.onefordvd.com/
|
||
https://www.onefordvd.com/lander
|
||
https://www.onefordvd.com/lander
|
||
https://www.onefordvd.com/lander
|
||
https://www.onefordvd.com/lander
|
||
https://www.onefordvd.com/lander
|
||
https://www.onefordvd.com/lander
|
||
https://www.onefordvd.com/lander
|
||
https://www.onefordvd.com/lander
|
||
https://www.onefordvd.com/lander
|