Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
file.exe
|
PE32+ executable (console) x86-64, for MS Windows
|
initial sample
|
||
C:\Windows\System32\AAFWtMo.exe
|
PE32+ executable (console) x86-64, for MS Windows
|
dropped
|
||
C:\Windows\System32\AARFjPz.exe
|
PE32+ executable (console) x86-64, for MS Windows
|
dropped
|
||
C:\Windows\System32\AINedvE.exe
|
PE32+ executable (console) x86-64, for MS Windows
|
dropped
|
||
C:\Windows\System32\AJbunRc.exe
|
PE32+ executable (console) x86-64, for MS Windows
|
dropped
|
||
C:\Windows\System32\ANovuUs.exe
|
PE32+ executable (console) x86-64, for MS Windows
|
dropped
|
||
C:\Windows\System32\AOxtNit.exe
|
PE32+ executable (console) x86-64, for MS Windows
|
dropped
|
||
C:\Windows\System32\AeHKOUk.exe
|
PE32+ executable (console) x86-64, for MS Windows
|
dropped
|
||
C:\Windows\System32\AfwGLOC.exe
|
PE32+ executable (console) x86-64, for MS Windows
|
dropped
|
||
C:\Windows\System32\AmlHggH.exe
|
PE32+ executable (console) x86-64, for MS Windows
|
dropped
|
||
C:\Windows\System32\AoDqPum.exe
|
PE32+ executable (console) x86-64, for MS Windows
|
dropped
|
||
C:\Windows\System32\AvKmyWx.exe
|
PE32+ executable (console) x86-64, for MS Windows
|
dropped
|
||
C:\Windows\System32\BBTtOmS.exe
|
PE32+ executable (console) x86-64, for MS Windows
|
dropped
|
||
C:\Windows\System32\BGEmobC.exe
|
PE32+ executable (console) x86-64, for MS Windows
|
dropped
|
||
C:\Windows\System32\BQVZXof.exe
|
PE32+ executable (console) x86-64, for MS Windows
|
dropped
|
||
C:\Windows\System32\BXwYBdZ.exe
|
PE32+ executable (console) x86-64, for MS Windows
|
dropped
|
||
C:\Windows\System32\BZXlXZF.exe
|
PE32+ executable (console) x86-64, for MS Windows
|
dropped
|
||
C:\Windows\System32\BkMxlYA.exe
|
PE32+ executable (console) x86-64, for MS Windows
|
dropped
|
||
C:\Windows\System32\BlxXZNI.exe
|
PE32+ executable (console) x86-64, for MS Windows
|
dropped
|
||
C:\Windows\System32\CGHEajN.exe
|
PE32+ executable (console) x86-64, for MS Windows
|
dropped
|
||
C:\Windows\System32\CStEhbp.exe
|
PE32+ executable (console) x86-64, for MS Windows
|
dropped
|
||
C:\Windows\System32\CgshOaM.exe
|
PE32+ executable (console) x86-64, for MS Windows
|
dropped
|
||
C:\Windows\System32\CwZoVMx.exe
|
PE32+ executable (console) x86-64, for MS Windows
|
dropped
|
||
C:\Windows\System32\DNWTLfi.exe
|
PE32+ executable (console) x86-64, for MS Windows
|
dropped
|
||
C:\Windows\System32\DYRnoDf.exe
|
PE32+ executable (console) x86-64, for MS Windows
|
dropped
|
||
C:\Windows\System32\DecYaAF.exe
|
PE32+ executable (console) x86-64, for MS Windows
|
dropped
|
||
C:\Windows\System32\DjFGkEO.exe
|
PE32+ executable (console) x86-64, for MS Windows
|
dropped
|
||
C:\Windows\System32\DoYQIEQ.exe
|
PE32+ executable (console) x86-64, for MS Windows
|
dropped
|
||
C:\Windows\System32\ENASfEY.exe
|
PE32+ executable (console) x86-64, for MS Windows
|
dropped
|
||
C:\Windows\System32\ENNjqpn.exe
|
PE32+ executable (console) x86-64, for MS Windows
|
dropped
|
||
C:\Windows\System32\EYQygjH.exe
|
PE32+ executable (console) x86-64, for MS Windows
|
dropped
|
||
C:\Windows\System32\EeTDKLH.exe
|
PE32+ executable (console) x86-64, for MS Windows
|
dropped
|
||
C:\Windows\System32\Emkynwd.exe
|
PE32+ executable (console) x86-64, for MS Windows
|
dropped
|
||
C:\Windows\System32\EpJmKCP.exe
|
PE32+ executable (console) x86-64, for MS Windows
|
dropped
|
||
C:\Windows\System32\EvKiHlY.exe
|
PE32+ executable (console) x86-64, for MS Windows
|
dropped
|
||
C:\Windows\System32\FCGGaTu.exe
|
PE32+ executable (console) x86-64, for MS Windows
|
dropped
|
||
C:\Windows\System32\FJbyTtP.exe
|
PE32+ executable (console) x86-64, for MS Windows
|
dropped
|
||
C:\Windows\System32\FOKqTNk.exe
|
PE32+ executable (console) x86-64, for MS Windows
|
dropped
|
||
C:\Windows\System32\FPbzJmC.exe
|
PE32+ executable (console) x86-64, for MS Windows
|
dropped
|
||
C:\Windows\System32\FSsBuPy.exe
|
PE32+ executable (console) x86-64, for MS Windows
|
dropped
|
||
C:\Windows\System32\FTsRyWe.exe
|
PE32+ executable (console) x86-64, for MS Windows
|
dropped
|
||
C:\Windows\System32\FddCmld.exe
|
PE32+ executable (console) x86-64, for MS Windows
|
dropped
|
||
C:\Windows\System32\FfHFdUV.exe
|
PE32+ executable (console) x86-64, for MS Windows
|
dropped
|
||
C:\Windows\System32\FgkhtMM.exe
|
PE32+ executable (console) x86-64, for MS Windows
|
dropped
|
||
C:\Windows\System32\FmDRJeq.exe
|
PE32+ executable (console) x86-64, for MS Windows
|
dropped
|
||
C:\Windows\System32\FwDCyKX.exe
|
PE32+ executable (console) x86-64, for MS Windows
|
dropped
|
||
C:\Windows\System32\GEjShaj.exe
|
PE32+ executable (console) x86-64, for MS Windows
|
dropped
|
||
C:\Windows\System32\HHkrdhY.exe
|
PE32+ executable (console) x86-64, for MS Windows
|
dropped
|
||
C:\Windows\System32\HKQIXhJ.exe
|
PE32+ executable (console) x86-64, for MS Windows
|
dropped
|
||
C:\Windows\System32\HfVKjfu.exe
|
PE32+ executable (console) x86-64, for MS Windows
|
dropped
|
||
C:\Windows\System32\HhuUNgU.exe
|
PE32+ executable (console) x86-64, for MS Windows
|
dropped
|
||
C:\Windows\System32\HmNtbmf.exe
|
PE32+ executable (console) x86-64, for MS Windows
|
dropped
|
||
C:\Windows\System32\HqzYgND.exe
|
PE32+ executable (console) x86-64, for MS Windows
|
dropped
|
||
C:\Windows\System32\HuQzjRH.exe
|
PE32+ executable (console) x86-64, for MS Windows
|
dropped
|
||
C:\Windows\System32\IGIRuaN.exe
|
PE32+ executable (console) x86-64, for MS Windows
|
dropped
|
||
C:\Windows\System32\IGbJixm.exe
|
PE32+ executable (console) x86-64, for MS Windows
|
dropped
|
||
C:\Windows\System32\IbzihzQ.exe
|
PE32+ executable (console) x86-64, for MS Windows
|
dropped
|
||
C:\Windows\System32\IfWXppj.exe
|
PE32+ executable (console) x86-64, for MS Windows
|
dropped
|
||
C:\Windows\System32\IkKuNGZ.exe
|
PE32+ executable (console) x86-64, for MS Windows
|
dropped
|
||
C:\Windows\System32\IwiJsNl.exe
|
PE32+ executable (console) x86-64, for MS Windows
|
dropped
|
||
C:\Windows\System32\JPNUgrl.exe
|
PE32+ executable (console) x86-64, for MS Windows
|
dropped
|
||
C:\Windows\System32\JSWAmsK.exe
|
PE32+ executable (console) x86-64, for MS Windows
|
dropped
|
||
C:\Windows\System32\JVEeonp.exe
|
PE32+ executable (console) x86-64, for MS Windows
|
dropped
|
||
C:\Windows\System32\JVLiIAQ.exe
|
PE32+ executable (console) x86-64, for MS Windows
|
dropped
|
||
C:\Windows\System32\JlwJpiQ.exe
|
PE32+ executable (console) x86-64, for MS Windows
|
dropped
|
||
C:\Windows\System32\JnWFmyo.exe
|
PE32+ executable (console) x86-64, for MS Windows
|
dropped
|
||
C:\Windows\System32\JvuHRXO.exe
|
PE32+ executable (console) x86-64, for MS Windows
|
dropped
|
||
C:\Windows\System32\JxXCqVa.exe
|
PE32+ executable (console) x86-64, for MS Windows
|
dropped
|
||
C:\Windows\System32\JyTylDG.exe
|
PE32+ executable (console) x86-64, for MS Windows
|
dropped
|
||
C:\Windows\System32\KEckQhl.exe
|
PE32+ executable (console) x86-64, for MS Windows
|
dropped
|
||
C:\Windows\System32\KNQeCYU.exe
|
PE32+ executable (console) x86-64, for MS Windows
|
dropped
|
||
C:\Windows\System32\KPSoDjq.exe
|
PE32+ executable (console) x86-64, for MS Windows
|
dropped
|
||
C:\Windows\System32\KTKMSLw.exe
|
PE32+ executable (console) x86-64, for MS Windows
|
dropped
|
||
C:\Windows\System32\KXPXHqw.exe
|
PE32+ executable (console) x86-64, for MS Windows
|
dropped
|
||
C:\Windows\System32\KdtqCrx.exe
|
PE32+ executable (console) x86-64, for MS Windows
|
dropped
|
||
C:\Windows\System32\KisuSgd.exe
|
PE32+ executable (console) x86-64, for MS Windows
|
dropped
|
||
C:\Windows\System32\KsaexJr.exe
|
PE32+ executable (console) x86-64, for MS Windows
|
dropped
|
||
C:\Windows\System32\KvrKIPQ.exe
|
PE32+ executable (console) x86-64, for MS Windows
|
dropped
|
||
C:\Windows\System32\LIUOcyg.exe
|
PE32+ executable (console) x86-64, for MS Windows
|
dropped
|
||
C:\Windows\System32\LIYZzMn.exe
|
PE32+ executable (console) x86-64, for MS Windows
|
dropped
|
||
C:\Windows\System32\LKIvikl.exe
|
PE32+ executable (console) x86-64, for MS Windows
|
dropped
|
||
C:\Windows\System32\LRwQOeC.exe
|
PE32+ executable (console) x86-64, for MS Windows
|
dropped
|
||
C:\Windows\System32\LlVYLfY.exe
|
PE32+ executable (console) x86-64, for MS Windows
|
dropped
|
||
C:\Windows\System32\LmLfObb.exe
|
PE32+ executable (console) x86-64, for MS Windows
|
dropped
|
||
C:\Windows\System32\LsxWNuU.exe
|
PE32+ executable (console) x86-64, for MS Windows
|
dropped
|
||
C:\Windows\System32\MVyvCVk.exe
|
PE32+ executable (console) x86-64, for MS Windows
|
dropped
|
||
C:\Windows\System32\MZzfLEZ.exe
|
PE32+ executable (console) x86-64, for MS Windows
|
dropped
|
||
C:\Windows\System32\MfIrnxp.exe
|
PE32+ executable (console) x86-64, for MS Windows
|
dropped
|
||
C:\Windows\System32\MqBemCY.exe
|
PE32+ executable (console) x86-64, for MS Windows
|
dropped
|
||
C:\Windows\System32\MqDEnug.exe
|
PE32+ executable (console) x86-64, for MS Windows
|
dropped
|
||
C:\Windows\System32\MwQiyKB.exe
|
PE32+ executable (console) x86-64, for MS Windows
|
dropped
|
||
C:\Windows\System32\NHtBCxU.exe
|
PE32+ executable (console) x86-64, for MS Windows
|
dropped
|
||
C:\Windows\System32\NUGNSrJ.exe
|
PE32+ executable (console) x86-64, for MS Windows
|
dropped
|
||
C:\Windows\System32\NbSGhVM.exe
|
PE32+ executable (console) x86-64, for MS Windows
|
dropped
|
||
C:\Windows\System32\NbwonFl.exe
|
PE32+ executable (console) x86-64, for MS Windows
|
dropped
|
||
C:\Windows\System32\NkJqpeK.exe
|
PE32+ executable (console) x86-64, for MS Windows
|
dropped
|
||
C:\Windows\System32\NoVBMWR.exe
|
PE32+ executable (console) x86-64, for MS Windows
|
dropped
|
||
C:\Windows\System32\NppXEik.exe
|
PE32+ executable (console) x86-64, for MS Windows
|
dropped
|
||
C:\Windows\System32\OCQPeNZ.exe
|
PE32+ executable (console) x86-64, for MS Windows
|
dropped
|
||
C:\Windows\System32\ODEkuhr.exe
|
PE32+ executable (console) x86-64, for MS Windows
|
dropped
|
||
C:\Windows\System32\OLgSbZB.exe
|
PE32+ executable (console) x86-64, for MS Windows
|
dropped
|
||
C:\Windows\System32\OTQisvZ.exe
|
PE32+ executable (console) x86-64, for MS Windows
|
dropped
|
||
C:\Windows\System32\OaEKhAc.exe
|
PE32+ executable (console) x86-64, for MS Windows
|
dropped
|
||
C:\Windows\System32\OakHRVh.exe
|
PE32+ executable (console) x86-64, for MS Windows
|
dropped
|
||
C:\Windows\System32\OjDKkKR.exe
|
PE32+ executable (console) x86-64, for MS Windows
|
dropped
|
||
C:\Windows\System32\OkcQGeE.exe
|
PE32+ executable (console) x86-64, for MS Windows
|
dropped
|
||
C:\Windows\System32\OmReOVb.exe
|
PE32+ executable (console) x86-64, for MS Windows
|
dropped
|
||
C:\Windows\System32\OoXXuCQ.exe
|
PE32+ executable (console) x86-64, for MS Windows
|
dropped
|
||
C:\Windows\System32\PATRbwz.exe
|
PE32+ executable (console) x86-64, for MS Windows
|
dropped
|
||
C:\Windows\System32\PFFZxBK.exe
|
PE32+ executable (console) x86-64, for MS Windows
|
dropped
|
||
C:\Windows\System32\PVSsNXl.exe
|
PE32+ executable (console) x86-64, for MS Windows
|
dropped
|
||
C:\Windows\System32\PXvfCpI.exe
|
PE32+ executable (console) x86-64, for MS Windows
|
dropped
|
||
C:\Windows\System32\PtyEDzX.exe
|
PE32+ executable (console) x86-64, for MS Windows
|
dropped
|
||
C:\Windows\System32\Pyjxeub.exe
|
PE32+ executable (console) x86-64, for MS Windows
|
dropped
|
||
C:\Windows\System32\QMneGpM.exe
|
PE32+ executable (console) x86-64, for MS Windows
|
dropped
|
||
C:\Windows\System32\QQrJtgR.exe
|
PE32+ executable (console) x86-64, for MS Windows
|
dropped
|
||
C:\Windows\System32\QafCaUC.exe
|
PE32+ executable (console) x86-64, for MS Windows
|
dropped
|
||
C:\Windows\System32\QeMlQoi.exe
|
PE32+ executable (console) x86-64, for MS Windows
|
dropped
|
||
C:\Windows\System32\REoMUue.exe
|
PE32+ executable (console) x86-64, for MS Windows
|
dropped
|
||
C:\Windows\System32\RSlZAbq.exe
|
PE32+ executable (console) x86-64, for MS Windows
|
dropped
|
||
C:\Windows\System32\RkBIliC.exe
|
PE32+ executable (console) x86-64, for MS Windows
|
dropped
|
||
C:\Windows\System32\SDuWpap.exe
|
PE32+ executable (console) x86-64, for MS Windows
|
dropped
|
||
C:\Windows\System32\SFUZlia.exe
|
PE32+ executable (console) x86-64, for MS Windows
|
dropped
|
||
C:\Windows\System32\SJbiQtA.exe
|
PE32+ executable (console) x86-64, for MS Windows
|
dropped
|
||
C:\Windows\System32\SUPTwuz.exe
|
PE32+ executable (console) x86-64, for MS Windows
|
dropped
|
||
C:\Windows\System32\SUqdJFj.exe
|
PE32+ executable (console) x86-64, for MS Windows
|
dropped
|
||
C:\Windows\System32\SYhASaz.exe
|
PE32+ executable (console) x86-64, for MS Windows
|
dropped
|
||
C:\Windows\System32\SgRYHnh.exe
|
PE32+ executable (console) x86-64, for MS Windows
|
dropped
|
||
C:\Windows\System32\SuSRVcd.exe
|
PE32+ executable (console) x86-64, for MS Windows
|
dropped
|
||
C:\Windows\System32\SxUWiRQ.exe
|
PE32+ executable (console) x86-64, for MS Windows
|
dropped
|
||
C:\Windows\System32\TIHWeXa.exe
|
PE32+ executable (console) x86-64, for MS Windows
|
dropped
|
||
C:\Windows\System32\TKmEpby.exe
|
PE32+ executable (console) x86-64, for MS Windows
|
dropped
|
||
C:\Windows\System32\TRDwKtF.exe
|
PE32+ executable (console) x86-64, for MS Windows
|
dropped
|
||
C:\Windows\System32\TrOUMxR.exe
|
PE32+ executable (console) x86-64, for MS Windows
|
dropped
|
||
C:\Windows\System32\TuPZZgO.exe
|
PE32+ executable (console) x86-64, for MS Windows
|
dropped
|
||
C:\Windows\System32\UTMWcnW.exe
|
PE32+ executable (console) x86-64, for MS Windows
|
dropped
|
||
C:\Windows\System32\UWoSVBa.exe
|
PE32+ executable (console) x86-64, for MS Windows
|
dropped
|
||
C:\Windows\System32\UYpGIpx.exe
|
PE32+ executable (console) x86-64, for MS Windows
|
dropped
|
||
C:\Windows\System32\UcDbkWX.exe
|
PE32+ executable (console) x86-64, for MS Windows
|
dropped
|
||
C:\Windows\System32\UhaWIvI.exe
|
PE32+ executable (console) x86-64, for MS Windows
|
dropped
|
||
C:\Windows\System32\UsvbkSz.exe
|
PE32+ executable (console) x86-64, for MS Windows
|
dropped
|
||
C:\Windows\System32\UthEkPV.exe
|
PE32+ executable (console) x86-64, for MS Windows
|
dropped
|
||
C:\Windows\System32\VDAzIym.exe
|
PE32+ executable (console) x86-64, for MS Windows
|
dropped
|
||
C:\Windows\System32\VFmvQYa.exe
|
PE32+ executable (console) x86-64, for MS Windows
|
dropped
|
||
C:\Windows\System32\VGaYkjy.exe
|
PE32+ executable (console) x86-64, for MS Windows
|
dropped
|
||
C:\Windows\System32\VJGuWtg.exe
|
PE32+ executable (console) x86-64, for MS Windows
|
dropped
|
||
C:\Windows\System32\VWmfLAK.exe
|
PE32+ executable (console) x86-64, for MS Windows
|
dropped
|
||
C:\Windows\System32\VcsXjEN.exe
|
PE32+ executable (console) x86-64, for MS Windows
|
dropped
|
||
C:\Windows\System32\VeDzKyt.exe
|
PE32+ executable (console) x86-64, for MS Windows
|
dropped
|
||
C:\Windows\System32\WJJOByy.exe
|
PE32+ executable (console) x86-64, for MS Windows
|
dropped
|
||
C:\Windows\System32\WUhIqEX.exe
|
PE32+ executable (console) x86-64, for MS Windows
|
dropped
|
||
C:\Windows\System32\WaSCrgW.exe
|
PE32+ executable (console) x86-64, for MS Windows
|
dropped
|
||
C:\Windows\System32\WaZAbif.exe
|
PE32+ executable (console) x86-64, for MS Windows
|
dropped
|
||
C:\Windows\System32\WvCPwWV.exe
|
PE32+ executable (console) x86-64, for MS Windows
|
dropped
|
||
C:\Windows\System32\XAMlAeL.exe
|
PE32+ executable (console) x86-64, for MS Windows
|
dropped
|
||
C:\Windows\System32\XaZvEHG.exe
|
PE32+ executable (console) x86-64, for MS Windows
|
dropped
|
||
C:\Windows\System32\XbmxgAo.exe
|
PE32+ executable (console) x86-64, for MS Windows
|
dropped
|
||
C:\Windows\System32\XdtKVFg.exe
|
PE32+ executable (console) x86-64, for MS Windows
|
dropped
|
||
C:\Windows\System32\XiEDOUw.exe
|
PE32+ executable (console) x86-64, for MS Windows
|
dropped
|
||
C:\Windows\System32\XvmplkI.exe
|
PE32+ executable (console) x86-64, for MS Windows
|
dropped
|
||
C:\Windows\System32\YDNKKav.exe
|
PE32+ executable (console) x86-64, for MS Windows
|
dropped
|
||
C:\Windows\System32\YHzfIbf.exe
|
PE32+ executable (console) x86-64, for MS Windows
|
dropped
|
||
C:\Windows\System32\YNbNjyr.exe
|
PE32+ executable (console) x86-64, for MS Windows
|
dropped
|
||
C:\Windows\System32\YPSGLBU.exe
|
PE32+ executable (console) x86-64, for MS Windows
|
dropped
|
||
C:\Windows\System32\YeogayJ.exe
|
PE32+ executable (console) x86-64, for MS Windows
|
dropped
|
||
C:\Windows\System32\YoRPgID.exe
|
PE32+ executable (console) x86-64, for MS Windows
|
dropped
|
||
C:\Windows\System32\YoWRHKm.exe
|
PE32+ executable (console) x86-64, for MS Windows
|
dropped
|
||
C:\Windows\System32\YuhEzpi.exe
|
PE32+ executable (console) x86-64, for MS Windows
|
dropped
|
||
C:\Windows\System32\ZOsbaqw.exe
|
PE32+ executable (console) x86-64, for MS Windows
|
dropped
|
||
C:\Windows\System32\ZYpXsUH.exe
|
PE32+ executable (console) x86-64, for MS Windows
|
dropped
|
||
C:\Windows\System32\ZZceFPb.exe
|
PE32+ executable (console) x86-64, for MS Windows
|
dropped
|
||
C:\Windows\System32\ZcPsbVC.exe
|
PE32+ executable (console) x86-64, for MS Windows
|
dropped
|
||
C:\Windows\System32\ZjfUfPp.exe
|
PE32+ executable (console) x86-64, for MS Windows
|
dropped
|
||
C:\Windows\System32\ZksIGgD.exe
|
PE32+ executable (console) x86-64, for MS Windows
|
dropped
|
||
C:\Windows\System32\ZxDRWfb.exe
|
PE32+ executable (console) x86-64, for MS Windows
|
dropped
|
||
C:\Windows\System32\aRcunFP.exe
|
PE32+ executable (console) x86-64, for MS Windows
|
dropped
|
||
C:\Windows\System32\aaQPPko.exe
|
PE32+ executable (console) x86-64, for MS Windows
|
dropped
|
||
C:\Windows\System32\agvrwBm.exe
|
PE32+ executable (console) x86-64, for MS Windows
|
dropped
|
||
C:\Windows\System32\aqHHhqZ.exe
|
PE32+ executable (console) x86-64, for MS Windows
|
dropped
|
||
C:\Windows\System32\asMPLRF.exe
|
PE32+ executable (console) x86-64, for MS Windows
|
dropped
|
||
C:\Windows\System32\atCrJKj.exe
|
PE32+ executable (console) x86-64, for MS Windows
|
dropped
|
||
C:\Windows\System32\bHOUpYN.exe
|
PE32+ executable (console) x86-64, for MS Windows
|
dropped
|
||
C:\Windows\System32\bWqzsZL.exe
|
PE32+ executable (console) x86-64, for MS Windows
|
dropped
|
||
C:\Windows\System32\bZAgvbx.exe
|
PE32+ executable (console) x86-64, for MS Windows
|
dropped
|
||
C:\Windows\System32\biTFilm.exe
|
PE32+ executable (console) x86-64, for MS Windows
|
dropped
|
||
C:\Windows\System32\boujFkb.exe
|
PE32+ executable (console) x86-64, for MS Windows
|
dropped
|
||
C:\Windows\System32\byMqxSp.exe
|
PE32+ executable (console) x86-64, for MS Windows
|
dropped
|
||
C:\Windows\System32\cMZjysl.exe
|
PE32+ executable (console) x86-64, for MS Windows
|
dropped
|
||
C:\Windows\System32\cQSYuAP.exe
|
PE32+ executable (console) x86-64, for MS Windows
|
dropped
|
||
C:\Windows\System32\cWFXjGb.exe
|
PE32+ executable (console) x86-64, for MS Windows
|
dropped
|
||
C:\Windows\System32\cbxEAHb.exe
|
PE32+ executable (console) x86-64, for MS Windows
|
dropped
|
||
C:\Windows\System32\cvviXVl.exe
|
PE32+ executable (console) x86-64, for MS Windows
|
dropped
|
||
C:\Windows\System32\dTlWhsy.exe
|
PE32+ executable (console) x86-64, for MS Windows
|
dropped
|
||
C:\Windows\System32\dXYoCLq.exe
|
PE32+ executable (console) x86-64, for MS Windows
|
dropped
|
||
C:\Windows\System32\daTQGhs.exe
|
PE32+ executable (console) x86-64, for MS Windows
|
dropped
|
||
C:\Windows\System32\dbOMNtK.exe
|
PE32+ executable (console) x86-64, for MS Windows
|
dropped
|
||
C:\Windows\System32\dcvcJux.exe
|
PE32+ executable (console) x86-64, for MS Windows
|
dropped
|
||
C:\Windows\System32\dhdvyXn.exe
|
PE32+ executable (console) x86-64, for MS Windows
|
dropped
|
||
C:\Windows\System32\dkvzZbr.exe
|
PE32+ executable (console) x86-64, for MS Windows
|
dropped
|
||
C:\Windows\System32\dxwuaZx.exe
|
PE32+ executable (console) x86-64, for MS Windows
|
dropped
|
||
C:\Windows\System32\dznqpDP.exe
|
PE32+ executable (console) x86-64, for MS Windows
|
dropped
|
||
C:\Windows\System32\eJQEoBU.exe
|
PE32+ executable (console) x86-64, for MS Windows
|
dropped
|
||
C:\Windows\System32\eTlchBa.exe
|
PE32+ executable (console) x86-64, for MS Windows
|
dropped
|
||
C:\Windows\System32\ecTFjpe.exe
|
PE32+ executable (console) x86-64, for MS Windows
|
dropped
|
||
C:\Windows\System32\edsunAc.exe
|
PE32+ executable (console) x86-64, for MS Windows
|
dropped
|
||
C:\Windows\System32\ehLRfQc.exe
|
PE32+ executable (console) x86-64, for MS Windows
|
dropped
|
||
C:\Windows\System32\ezbfIqP.exe
|
PE32+ executable (console) x86-64, for MS Windows
|
dropped
|
||
C:\Windows\System32\fsYNdIS.exe
|
PE32+ executable (console) x86-64, for MS Windows
|
dropped
|
||
C:\Windows\System32\gFItvpO.exe
|
PE32+ executable (console) x86-64, for MS Windows
|
dropped
|
||
C:\Windows\System32\gIWIAoR.exe
|
PE32+ executable (console) x86-64, for MS Windows
|
dropped
|
||
C:\Windows\System32\gIerfNx.exe
|
PE32+ executable (console) x86-64, for MS Windows
|
dropped
|
||
C:\Windows\System32\gVxVuPE.exe
|
PE32+ executable (console) x86-64, for MS Windows
|
dropped
|
||
C:\Windows\System32\gZXMDli.exe
|
PE32+ executable (console) x86-64, for MS Windows
|
dropped
|
||
C:\Windows\System32\gaDJFNb.exe
|
PE32+ executable (console) x86-64, for MS Windows
|
dropped
|
||
C:\Windows\System32\gsJfIAI.exe
|
PE32+ executable (console) x86-64, for MS Windows
|
dropped
|
||
C:\Windows\System32\gvzqmaV.exe
|
PE32+ executable (console) x86-64, for MS Windows
|
dropped
|
||
C:\Windows\System32\hEUdUZb.exe
|
PE32+ executable (console) x86-64, for MS Windows
|
dropped
|
||
C:\Windows\System32\hHHgQhg.exe
|
PE32+ executable (console) x86-64, for MS Windows
|
dropped
|
||
C:\Windows\System32\hHyzwMR.exe
|
PE32+ executable (console) x86-64, for MS Windows
|
dropped
|
||
C:\Windows\System32\hImJGCQ.exe
|
PE32+ executable (console) x86-64, for MS Windows
|
dropped
|
||
C:\Windows\System32\hPbLcyI.exe
|
PE32+ executable (console) x86-64, for MS Windows
|
dropped
|
||
C:\Windows\System32\hcWXimc.exe
|
PE32+ executable (console) x86-64, for MS Windows
|
dropped
|
||
C:\Windows\System32\hdrmJmm.exe
|
PE32+ executable (console) x86-64, for MS Windows
|
dropped
|
||
C:\Windows\System32\hiRRhNA.exe
|
PE32+ executable (console) x86-64, for MS Windows
|
dropped
|
||
C:\Windows\System32\hkdrylp.exe
|
PE32+ executable (console) x86-64, for MS Windows
|
dropped
|
||
C:\Windows\System32\hldtrer.exe
|
PE32+ executable (console) x86-64, for MS Windows
|
dropped
|
||
C:\Windows\System32\htpHIjf.exe
|
PE32+ executable (console) x86-64, for MS Windows
|
dropped
|
||
C:\Windows\System32\iDjoCba.exe
|
PE32+ executable (console) x86-64, for MS Windows
|
dropped
|
||
C:\Windows\System32\iNyWjdh.exe
|
PE32+ executable (console) x86-64, for MS Windows
|
dropped
|
||
C:\Windows\System32\iVxWAhp.exe
|
PE32+ executable (console) x86-64, for MS Windows
|
dropped
|
||
C:\Windows\System32\iWlgDsI.exe
|
PE32+ executable (console) x86-64, for MS Windows
|
dropped
|
||
C:\Windows\System32\ifdEeMJ.exe
|
PE32+ executable (console) x86-64, for MS Windows
|
dropped
|
||
C:\Windows\System32\ihRMBvK.exe
|
PE32+ executable (console) x86-64, for MS Windows
|
dropped
|
||
C:\Windows\System32\jNFZeRV.exe
|
PE32+ executable (console) x86-64, for MS Windows
|
dropped
|
||
C:\Windows\System32\jNvuQDu.exe
|
PE32+ executable (console) x86-64, for MS Windows
|
dropped
|
||
C:\Windows\System32\jOLYVDQ.exe
|
PE32+ executable (console) x86-64, for MS Windows
|
dropped
|
||
C:\Windows\System32\jlhXoDU.exe
|
PE32+ executable (console) x86-64, for MS Windows
|
dropped
|
||
C:\Windows\System32\kDIeJiO.exe
|
PE32+ executable (console) x86-64, for MS Windows
|
dropped
|
||
C:\Windows\System32\kPIwtDx.exe
|
PE32+ executable (console) x86-64, for MS Windows
|
dropped
|
||
C:\Windows\System32\kcGcYyc.exe
|
PE32+ executable (console) x86-64, for MS Windows
|
dropped
|
||
C:\Windows\System32\kiaPNWp.exe
|
PE32+ executable (console) x86-64, for MS Windows
|
dropped
|
||
C:\Windows\System32\koSIwBF.exe
|
PE32+ executable (console) x86-64, for MS Windows
|
dropped
|
||
C:\Windows\System32\kwBHINw.exe
|
PE32+ executable (console) x86-64, for MS Windows
|
dropped
|
||
C:\Windows\System32\lYsCKDB.exe
|
PE32+ executable (console) x86-64, for MS Windows
|
dropped
|
||
C:\Windows\System32\lkHmjCB.exe
|
PE32+ executable (console) x86-64, for MS Windows
|
dropped
|
||
C:\Windows\System32\lvuSoVX.exe
|
PE32+ executable (console) x86-64, for MS Windows
|
dropped
|
||
C:\Windows\System32\mNMttQk.exe
|
PE32+ executable (console) x86-64, for MS Windows
|
dropped
|
||
C:\Windows\System32\mUtoiRj.exe
|
PE32+ executable (console) x86-64, for MS Windows
|
dropped
|
||
C:\Windows\System32\mZbuFep.exe
|
PE32+ executable (console) x86-64, for MS Windows
|
dropped
|
||
C:\Windows\System32\nEqlptY.exe
|
PE32+ executable (console) x86-64, for MS Windows
|
dropped
|
||
C:\Windows\System32\nOUmNRd.exe
|
PE32+ executable (console) x86-64, for MS Windows
|
dropped
|
||
C:\Windows\System32\nUwvlEf.exe
|
PE32+ executable (console) x86-64, for MS Windows
|
dropped
|
||
C:\Windows\System32\nUxFpBv.exe
|
PE32+ executable (console) x86-64, for MS Windows
|
dropped
|
||
C:\Windows\System32\nVRFUMU.exe
|
PE32+ executable (console) x86-64, for MS Windows
|
dropped
|
||
C:\Windows\System32\nZqSwkk.exe
|
PE32+ executable (console) x86-64, for MS Windows
|
dropped
|
||
C:\Windows\System32\niuNHza.exe
|
PE32+ executable (console) x86-64, for MS Windows
|
dropped
|
||
C:\Windows\System32\nySppDL.exe
|
PE32+ executable (console) x86-64, for MS Windows
|
dropped
|
||
C:\Windows\System32\oFlkVvC.exe
|
PE32+ executable (console) x86-64, for MS Windows
|
dropped
|
||
C:\Windows\System32\oLIMGEG.exe
|
PE32+ executable (console) x86-64, for MS Windows
|
dropped
|
||
C:\Windows\System32\oTTZHtv.exe
|
PE32+ executable (console) x86-64, for MS Windows
|
dropped
|
||
C:\Windows\System32\oXhzTJB.exe
|
PE32+ executable (console) x86-64, for MS Windows
|
dropped
|
||
C:\Windows\System32\oblCraV.exe
|
PE32+ executable (console) x86-64, for MS Windows
|
dropped
|
||
C:\Windows\System32\oeyXpah.exe
|
PE32+ executable (console) x86-64, for MS Windows
|
dropped
|
||
C:\Windows\System32\oheGeDM.exe
|
PE32+ executable (console) x86-64, for MS Windows
|
dropped
|
||
C:\Windows\System32\pBUJBbD.exe
|
PE32+ executable (console) x86-64, for MS Windows
|
dropped
|
||
C:\Windows\System32\pCYFbPY.exe
|
PE32+ executable (console) x86-64, for MS Windows
|
dropped
|
||
C:\Windows\System32\pONZxkY.exe
|
PE32+ executable (console) x86-64, for MS Windows
|
dropped
|
||
C:\Windows\System32\pQiWMAE.exe
|
PE32+ executable (console) x86-64, for MS Windows
|
dropped
|
||
C:\Windows\System32\pVAAkNS.exe
|
PE32+ executable (console) x86-64, for MS Windows
|
dropped
|
||
C:\Windows\System32\pmqeloX.exe
|
PE32+ executable (console) x86-64, for MS Windows
|
dropped
|
||
C:\Windows\System32\pnHAApr.exe
|
PE32+ executable (console) x86-64, for MS Windows
|
dropped
|
||
C:\Windows\System32\pydLviI.exe
|
PE32+ executable (console) x86-64, for MS Windows
|
dropped
|
||
C:\Windows\System32\qBNFibO.exe
|
PE32+ executable (console) x86-64, for MS Windows
|
dropped
|
||
C:\Windows\System32\qPOzufP.exe
|
PE32+ executable (console) x86-64, for MS Windows
|
dropped
|
||
C:\Windows\System32\qQrbmYX.exe
|
PE32+ executable (console) x86-64, for MS Windows
|
dropped
|
||
C:\Windows\System32\qYfJmBx.exe
|
PE32+ executable (console) x86-64, for MS Windows
|
dropped
|
||
C:\Windows\System32\qrMFKUE.exe
|
PE32+ executable (console) x86-64, for MS Windows
|
dropped
|
||
C:\Windows\System32\qulWMNK.exe
|
PE32+ executable (console) x86-64, for MS Windows
|
dropped
|
||
C:\Windows\System32\qyjihXJ.exe
|
PE32+ executable (console) x86-64, for MS Windows
|
dropped
|
||
C:\Windows\System32\rECIoeF.exe
|
PE32+ executable (console) x86-64, for MS Windows
|
dropped
|
||
C:\Windows\System32\rSfKwnk.exe
|
PE32+ executable (console) x86-64, for MS Windows
|
dropped
|
||
C:\Windows\System32\rWLJMFs.exe
|
PE32+ executable (console) x86-64, for MS Windows
|
dropped
|
||
C:\Windows\System32\rfvRxbV.exe
|
PE32+ executable (console) x86-64, for MS Windows
|
dropped
|
||
C:\Windows\System32\rzBuUNn.exe
|
PE32+ executable (console) x86-64, for MS Windows
|
dropped
|
||
C:\Windows\System32\rzOVEdp.exe
|
PE32+ executable (console) x86-64, for MS Windows
|
dropped
|
||
C:\Windows\System32\sDUxUOz.exe
|
PE32+ executable (console) x86-64, for MS Windows
|
dropped
|
||
C:\Windows\System32\sGHQnMX.exe
|
PE32+ executable (console) x86-64, for MS Windows
|
dropped
|
||
C:\Windows\System32\sHrvKbH.exe
|
PE32+ executable (console) x86-64, for MS Windows
|
dropped
|
||
C:\Windows\System32\sOMtwdY.exe
|
PE32+ executable (console) x86-64, for MS Windows
|
dropped
|
||
C:\Windows\System32\sRxYPzo.exe
|
PE32+ executable (console) x86-64, for MS Windows
|
dropped
|
||
C:\Windows\System32\sklRMsM.exe
|
PE32+ executable (console) x86-64, for MS Windows
|
dropped
|
||
C:\Windows\System32\spwZxbD.exe
|
PE32+ executable (console) x86-64, for MS Windows
|
dropped
|
||
C:\Windows\System32\suHCBrv.exe
|
PE32+ executable (console) x86-64, for MS Windows
|
dropped
|
||
C:\Windows\System32\tRrgCEd.exe
|
PE32+ executable (console) x86-64, for MS Windows
|
dropped
|
||
C:\Windows\System32\tYuJBKo.exe
|
PE32+ executable (console) x86-64, for MS Windows
|
dropped
|
||
C:\Windows\System32\thYWpNp.exe
|
PE32+ executable (console) x86-64, for MS Windows
|
dropped
|
||
C:\Windows\System32\uJLpuAT.exe
|
PE32+ executable (console) x86-64, for MS Windows
|
dropped
|
||
C:\Windows\System32\uUnCnJC.exe
|
PE32+ executable (console) x86-64, for MS Windows
|
dropped
|
||
C:\Windows\System32\ugXtQTT.exe
|
PE32+ executable (console) x86-64, for MS Windows
|
dropped
|
||
C:\Windows\System32\uoUnoPV.exe
|
PE32+ executable (console) x86-64, for MS Windows
|
dropped
|
||
C:\Windows\System32\uwpSJTY.exe
|
PE32+ executable (console) x86-64, for MS Windows
|
dropped
|
||
C:\Windows\System32\uxZFvtG.exe
|
PE32+ executable (console) x86-64, for MS Windows
|
dropped
|
||
C:\Windows\System32\vINSkcN.exe
|
PE32+ executable (console) x86-64, for MS Windows
|
dropped
|
||
C:\Windows\System32\vQWABTG.exe
|
PE32+ executable (console) x86-64, for MS Windows
|
dropped
|
||
C:\Windows\System32\vUMVWef.exe
|
PE32+ executable (console) x86-64, for MS Windows
|
dropped
|
||
C:\Windows\System32\vsZRZPn.exe
|
PE32+ executable (console) x86-64, for MS Windows
|
dropped
|
||
C:\Windows\System32\vtyxvBq.exe
|
PE32+ executable (console) x86-64, for MS Windows
|
dropped
|
||
C:\Windows\System32\vwIpBIp.exe
|
PE32+ executable (console) x86-64, for MS Windows
|
dropped
|
||
C:\Windows\System32\wHmEWnE.exe
|
PE32+ executable (console) x86-64, for MS Windows
|
dropped
|
||
C:\Windows\System32\wIBrJnT.exe
|
PE32+ executable (console) x86-64, for MS Windows
|
dropped
|
||
C:\Windows\System32\wLBrJuN.exe
|
PE32+ executable (console) x86-64, for MS Windows
|
dropped
|
||
C:\Windows\System32\wMaaxvk.exe
|
PE32+ executable (console) x86-64, for MS Windows
|
dropped
|
||
C:\Windows\System32\waRaTny.exe
|
PE32+ executable (console) x86-64, for MS Windows
|
dropped
|
||
C:\Windows\System32\wkKSPgp.exe
|
PE32+ executable (console) x86-64, for MS Windows
|
dropped
|
||
C:\Windows\System32\wncnOga.exe
|
PE32+ executable (console) x86-64, for MS Windows
|
dropped
|
||
C:\Windows\System32\xZCsQFU.exe
|
PE32+ executable (console) x86-64, for MS Windows
|
dropped
|
||
C:\Windows\System32\xjXpcqI.exe
|
PE32+ executable (console) x86-64, for MS Windows
|
dropped
|
||
C:\Windows\System32\xosmhFY.exe
|
PE32+ executable (console) x86-64, for MS Windows
|
dropped
|
||
C:\Windows\System32\xsPUYnY.exe
|
PE32+ executable (console) x86-64, for MS Windows
|
dropped
|
||
C:\Windows\System32\yNciWyL.exe
|
PE32+ executable (console) x86-64, for MS Windows
|
dropped
|
||
C:\Windows\System32\yQykaWi.exe
|
PE32+ executable (console) x86-64, for MS Windows
|
dropped
|
||
C:\Windows\System32\ycvgKWP.exe
|
PE32+ executable (console) x86-64, for MS Windows
|
dropped
|
||
C:\Windows\System32\yeQSiTm.exe
|
PE32+ executable (console) x86-64, for MS Windows
|
dropped
|
||
C:\Windows\System32\zAqphYy.exe
|
PE32+ executable (console) x86-64, for MS Windows
|
dropped
|
||
C:\Windows\System32\zZluDpQ.exe
|
PE32+ executable (console) x86-64, for MS Windows
|
dropped
|
||
C:\Windows\System32\zafOJaW.exe
|
PE32+ executable (console) x86-64, for MS Windows
|
dropped
|
||
C:\Windows\System32\zcRTKcl.exe
|
PE32+ executable (console) x86-64, for MS Windows
|
dropped
|
||
C:\Windows\System32\zgnppqX.exe
|
PE32+ executable (console) x86-64, for MS Windows
|
dropped
|
||
C:\Windows\System32\zoNaMRv.exe
|
PE32+ executable (console) x86-64, for MS Windows
|
dropped
|
||
C:\Windows\System32\zoWFHEB.exe
|
PE32+ executable (console) x86-64, for MS Windows
|
dropped
|
||
C:\Windows\System32\zxkWcfH.exe
|
PE32+ executable (console) x86-64, for MS Windows
|
dropped
|
There are 321 hidden files, click here to show them.
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\file.exe
|
"C:\Users\user\Desktop\file.exe"
|
||
C:\Windows\System32\JvuHRXO.exe
|
C:\Windows\System32\JvuHRXO.exe
|
||
C:\Windows\System32\wkKSPgp.exe
|
C:\Windows\System32\wkKSPgp.exe
|
||
C:\Windows\System32\gaDJFNb.exe
|
C:\Windows\System32\gaDJFNb.exe
|
||
C:\Windows\System32\ehLRfQc.exe
|
C:\Windows\System32\ehLRfQc.exe
|
||
C:\Windows\System32\OTQisvZ.exe
|
C:\Windows\System32\OTQisvZ.exe
|
||
C:\Windows\System32\AvKmyWx.exe
|
C:\Windows\System32\AvKmyWx.exe
|
||
C:\Windows\System32\XaZvEHG.exe
|
C:\Windows\System32\XaZvEHG.exe
|
||
C:\Windows\System32\oblCraV.exe
|
C:\Windows\System32\oblCraV.exe
|
||
C:\Windows\System32\YuhEzpi.exe
|
C:\Windows\System32\YuhEzpi.exe
|
||
C:\Windows\System32\DYRnoDf.exe
|
C:\Windows\System32\DYRnoDf.exe
|
||
C:\Windows\System32\biTFilm.exe
|
C:\Windows\System32\biTFilm.exe
|
||
C:\Windows\System32\BXwYBdZ.exe
|
C:\Windows\System32\BXwYBdZ.exe
|
||
C:\Windows\System32\AJbunRc.exe
|
C:\Windows\System32\AJbunRc.exe
|
||
C:\Windows\System32\SUqdJFj.exe
|
C:\Windows\System32\SUqdJFj.exe
|
||
C:\Windows\System32\TIHWeXa.exe
|
C:\Windows\System32\TIHWeXa.exe
|
||
C:\Windows\System32\PXvfCpI.exe
|
C:\Windows\System32\PXvfCpI.exe
|
||
C:\Windows\System32\dhdvyXn.exe
|
C:\Windows\System32\dhdvyXn.exe
|
||
C:\Windows\System32\QMneGpM.exe
|
C:\Windows\System32\QMneGpM.exe
|
||
C:\Windows\System32\ODEkuhr.exe
|
C:\Windows\System32\ODEkuhr.exe
|
||
C:\Windows\System32\VFmvQYa.exe
|
C:\Windows\System32\VFmvQYa.exe
|
||
C:\Windows\System32\FJbyTtP.exe
|
C:\Windows\System32\FJbyTtP.exe
|
||
C:\Windows\System32\FTsRyWe.exe
|
C:\Windows\System32\FTsRyWe.exe
|
||
C:\Windows\System32\uUnCnJC.exe
|
C:\Windows\System32\uUnCnJC.exe
|
||
C:\Windows\System32\NbSGhVM.exe
|
C:\Windows\System32\NbSGhVM.exe
|
||
C:\Windows\System32\WJJOByy.exe
|
C:\Windows\System32\WJJOByy.exe
|
||
C:\Windows\System32\DNWTLfi.exe
|
C:\Windows\System32\DNWTLfi.exe
|
||
C:\Windows\System32\JVLiIAQ.exe
|
C:\Windows\System32\JVLiIAQ.exe
|
||
C:\Windows\System32\eTlchBa.exe
|
C:\Windows\System32\eTlchBa.exe
|
||
C:\Windows\System32\FmDRJeq.exe
|
C:\Windows\System32\FmDRJeq.exe
|
||
C:\Windows\System32\JxXCqVa.exe
|
C:\Windows\System32\JxXCqVa.exe
|
||
C:\Windows\System32\qulWMNK.exe
|
C:\Windows\System32\qulWMNK.exe
|
||
C:\Windows\System32\KvrKIPQ.exe
|
C:\Windows\System32\KvrKIPQ.exe
|
||
C:\Windows\System32\zgnppqX.exe
|
C:\Windows\System32\zgnppqX.exe
|
||
C:\Windows\System32\VeDzKyt.exe
|
C:\Windows\System32\VeDzKyt.exe
|
||
C:\Windows\System32\Emkynwd.exe
|
C:\Windows\System32\Emkynwd.exe
|
||
C:\Windows\System32\UTMWcnW.exe
|
C:\Windows\System32\UTMWcnW.exe
|
||
C:\Windows\System32\nUwvlEf.exe
|
C:\Windows\System32\nUwvlEf.exe
|
||
C:\Windows\System32\FSsBuPy.exe
|
C:\Windows\System32\FSsBuPy.exe
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
There are 30 hidden processes, click here to show them.
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
https://pdfcrowd.com/?ref=pdf)
|
unknown
|
||
https://pdfcrowd.com/doc/api/?ref=pdf)
|
unknown
|
||
https://gettodaveriviedt0.com/secur3-appleld-verlfy1/?16shop)
|
unknown
|
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
7FF7FB251000
|
unkown
|
page execute and read and write
|
||
7FF6EC711000
|
unkown
|
page execute and read and write
|
||
7FF6273A1000
|
unkown
|
page execute and read and write
|
||
7FF6E0B31000
|
unkown
|
page execute and read and write
|
||
7FF647CC1000
|
unkown
|
page execute and read and write
|
||
7FF7FA7C1000
|
unkown
|
page execute and read and write
|
||
7FF7E2FB1000
|
unkown
|
page execute and read and write
|
||
7FF76A091000
|
unkown
|
page execute and read and write
|
||
7FF6CC6E1000
|
unkown
|
page execute and read and write
|
||
7FF6C4431000
|
unkown
|
page execute and read and write
|
||
7FF6A9E61000
|
unkown
|
page execute and read and write
|
||
7FF602D91000
|
unkown
|
page execute and read and write
|
||
7FF650C61000
|
unkown
|
page execute and read and write
|
||
7FF74E921000
|
unkown
|
page execute and read and write
|
||
7FF75CE91000
|
unkown
|
page execute and read and write
|
||
7FF7BF041000
|
unkown
|
page execute and read and write
|
||
7FF77F321000
|
unkown
|
page execute and read and write
|
||
7FF740491000
|
unkown
|
page execute and read and write
|
||
7FF61D671000
|
unkown
|
page execute and read and write
|
||
7FF69F8A1000
|
unkown
|
page execute and read and write
|
||
7FF7750C1000
|
unkown
|
page execute and read and write
|
||
7FF7F0E61000
|
unkown
|
page execute and read and write
|
||
7FF7F5F91000
|
unkown
|
page execute and read and write
|
||
7FF601721000
|
unkown
|
page execute and read and write
|
||
7FF63FD91000
|
unkown
|
page execute and read and write
|
||
7FF6E1ED1000
|
unkown
|
page execute and read and write
|
||
7FF6F3451000
|
unkown
|
page execute and read and write
|
||
7FF765D81000
|
unkown
|
page execute and read and write
|
||
7FF610231000
|
unkown
|
page execute and read and write
|
||
7FF741711000
|
unkown
|
page execute and read and write
|
||
7FF781B71000
|
unkown
|
page execute and read and write
|
||
7FF72C9D1000
|
unkown
|
page execute and read and write
|
||
7FF6B47A1000
|
unkown
|
page execute and read and write
|
||
7FF78CCD1000
|
unkown
|
page execute and read and write
|
||
7FF63CCE1000
|
unkown
|
page execute and read and write
|
||
7FF695C61000
|
unkown
|
page execute and read and write
|
||
7FF6BE0A1000
|
unkown
|
page execute and read and write
|
||
7FF6ABE51000
|
unkown
|
page execute and read and write
|
||
7FF6480AC000
|
unkown
|
page execute and read and write
|
||
7FF6E201A000
|
unkown
|
page execute and read and write
|
||
7FF7F124C000
|
unkown
|
page execute and read and write
|
||
1FE75818000
|
direct allocation
|
page execute read
|
||
7FF63CCE0000
|
unkown
|
page readonly
|
||
21112C50000
|
heap
|
page read and write
|
||
7FF7FA7C0000
|
unkown
|
page readonly
|
||
1E2727A0000
|
heap
|
page read and write
|
||
7FF65103A000
|
unkown
|
page execute and read and write
|
||
7FF695C60000
|
unkown
|
page readonly
|
||
7FF7750C0000
|
unkown
|
page readonly
|
||
7FF69FC0C000
|
unkown
|
page execute and write copy
|
||
29E6A7B8000
|
direct allocation
|
page execute read
|
||
FD99FF000
|
stack
|
page read and write
|
||
205BA2CB000
|
heap
|
page read and write
|
||
DBC66FC000
|
stack
|
page read and write
|
||
FB552FC000
|
stack
|
page read and write
|
||
19AAD0D8000
|
direct allocation
|
page execute read
|
||
7FF6B47A0000
|
unkown
|
page readonly
|
||
14B3EFF000
|
stack
|
page read and write
|
||
1C189A10000
|
heap
|
page read and write
|
||
1E413130000
|
heap
|
page read and write
|
||
7FF61059C000
|
unkown
|
page execute and write copy
|
||
260401F9000
|
heap
|
page read and write
|
||
7FF6CC82A000
|
unkown
|
page execute and read and write
|
||
15EDB7A8000
|
direct allocation
|
page execute read
|
||
13F7A970000
|
direct allocation
|
page execute read
|
||
7FF77F68C000
|
unkown
|
page execute and write copy
|
||
7FF6B4B8E000
|
unkown
|
page execute and write copy
|
||
7FF6480B0000
|
unkown
|
page write copy
|
||
27BF42A0000
|
heap
|
page read and write
|
||
FD48EFF000
|
stack
|
page read and write
|
||
13F7A978000
|
direct allocation
|
page execute read
|
||
21184D98000
|
direct allocation
|
page execute read
|
||
23552699000
|
heap
|
page read and write
|
||
7FF647E0A000
|
unkown
|
page execute and read and write
|
||
7FF781F60000
|
unkown
|
page read and write
|
||
7FF78D0AA000
|
unkown
|
page execute and read and write
|
||
7FF6480AE000
|
unkown
|
page execute and write copy
|
||
D653CFF000
|
stack
|
page read and write
|
||
7FF6C4820000
|
unkown
|
page write copy
|
||
F476FC000
|
stack
|
page read and write
|
||
7FF72C9D0000
|
unkown
|
page readonly
|
||
1FE756D0000
|
heap
|
page read and write
|
||
2587D19B000
|
heap
|
page read and write
|
||
7FF7FA90A000
|
unkown
|
page execute and read and write
|
||
7FF75CFDA000
|
unkown
|
page execute and read and write
|
||
7FF7E33A0000
|
unkown
|
page write copy
|
||
7FF7BF430000
|
unkown
|
page write copy
|
||
7FF766170000
|
unkown
|
page write copy
|
||
7FF6E1ED0000
|
unkown
|
page readonly
|
||
1E2727D0000
|
direct allocation
|
page execute read
|
||
7FF601B10000
|
unkown
|
page write copy
|
||
7FF7F636A000
|
unkown
|
page execute and read and write
|
||
2587D2E0000
|
direct allocation
|
page execute read
|
||
7FF6C4430000
|
unkown
|
page readonly
|
||
28B8A8A0000
|
direct allocation
|
page execute read
|
||
7FF60316A000
|
unkown
|
page execute and read and write
|
||
19AAD0A0000
|
heap
|
page read and write
|
||
7FF69F8A0000
|
unkown
|
page readonly
|
||
7FF6E22AA000
|
unkown
|
page execute and read and write
|
||
7FF7F0E60000
|
unkown
|
page readonly
|
||
7FF7F637C000
|
unkown
|
page execute and read and write
|
||
7FF7E331C000
|
unkown
|
page execute and write copy
|
||
7FF7FAB9A000
|
unkown
|
page execute and read and write
|
||
7FF7F0FAA000
|
unkown
|
page execute and read and write
|
||
7FF78D0C0000
|
unkown
|
page read and write
|
||
2B620AC0000
|
heap
|
page read and write
|
||
2AFFFD90000
|
heap
|
page read and write
|
||
9B7CBFF000
|
stack
|
page read and write
|
||
21118130000
|
heap
|
page read and write
|
||
D8B24FF000
|
stack
|
page read and write
|
||
7FF74ED10000
|
unkown
|
page read and write
|
||
7FF63D0CE000
|
unkown
|
page execute and write copy
|
||
205BA2C0000
|
heap
|
page read and write
|
||
7FF79179C000
|
unkown
|
page execute and write copy
|
||
2256AFF000
|
stack
|
page read and write
|
||
7FF601B0C000
|
unkown
|
page execute and read and write
|
||
9B7C72C000
|
stack
|
page read and write
|
||
13F7A9E0000
|
heap
|
page read and write
|
||
7FF7F637E000
|
unkown
|
page execute and write copy
|
||
205BA2DD000
|
heap
|
page read and write
|
||
206B7F2C000
|
heap
|
page read and write
|
||
2ADB4208000
|
direct allocation
|
page execute read
|
||
21110380000
|
heap
|
page read and write
|
||
7FF6ECAFC000
|
unkown
|
page execute and read and write
|
||
1FE757F0000
|
heap
|
page read and write
|
||
FD956C000
|
stack
|
page read and write
|
||
13E12380000
|
heap
|
page read and write
|
||
7FF78D03C000
|
unkown
|
page execute and write copy
|
||
1AF04330000
|
heap
|
page read and write
|
||
1B415070000
|
heap
|
page read and write
|
||
7FF74ECFA000
|
unkown
|
page execute and read and write
|
||
7FF6F383C000
|
unkown
|
page execute and read and write
|
||
2B620AC9000
|
heap
|
page read and write
|
||
7FF647CC0000
|
unkown
|
page readonly
|
||
12698F10000
|
direct allocation
|
page execute read
|
||
7FF6B4B0C000
|
unkown
|
page execute and write copy
|
||
7FF6B4B7A000
|
unkown
|
page execute and read and write
|
||
29E6AB30000
|
heap
|
page read and write
|
||
1CD6C630000
|
heap
|
page read and write
|
||
7FF791820000
|
unkown
|
page write copy
|
||
7FF7F123A000
|
unkown
|
page execute and read and write
|
||
2587D190000
|
heap
|
page read and write
|
||
1473B7B0000
|
heap
|
page read and write
|
||
1B415050000
|
heap
|
page read and write
|
||
A5717FF000
|
stack
|
page read and write
|
||
7FF6E1ED0000
|
unkown
|
page readonly
|
||
1EE49020000
|
heap
|
page read and write
|
||
CDD9AFE000
|
stack
|
page read and write
|
||
29066418000
|
direct allocation
|
page execute read
|
||
2ADB41D0000
|
heap
|
page read and write
|
||
2587D2B0000
|
heap
|
page read and write
|
||
21C8F29B000
|
heap
|
page read and write
|
||
1F1B1400000
|
direct allocation
|
page execute read
|
||
13F7ADA0000
|
heap
|
page read and write
|
||
2232D8C0000
|
heap
|
page read and write
|
||
7FF6030FC000
|
unkown
|
page execute and write copy
|
||
7FF6EC710000
|
unkown
|
page readonly
|
||
B2591FF000
|
stack
|
page read and write
|
||
7FF6CCAD0000
|
unkown
|
page read and write
|
||
7FF740880000
|
unkown
|
page write copy
|
||
7FF61D9DC000
|
unkown
|
page execute and write copy
|
||
205BA520000
|
heap
|
page read and write
|
||
7FF601720000
|
unkown
|
page readonly
|
||
7FF6B4B90000
|
unkown
|
page write copy
|
||
7FF7F0E60000
|
unkown
|
page readonly
|
||
7FF74E920000
|
unkown
|
page readonly
|
||
21112250000
|
heap
|
page read and write
|
||
7FF7BF18A000
|
unkown
|
page execute and read and write
|
||
7FF741710000
|
unkown
|
page readonly
|
||
206B7EA0000
|
heap
|
page read and write
|
||
2ADB4440000
|
heap
|
page read and write
|
||
4136D6C000
|
stack
|
page read and write
|
||
1B4150A8000
|
direct allocation
|
page execute read
|
||
21C8F280000
|
direct allocation
|
page execute read
|
||
7FF781F60000
|
unkown
|
page write copy
|
||
13E1252B000
|
heap
|
page read and write
|
||
7FF6ECB00000
|
unkown
|
page write copy
|
||
7FF6C481C000
|
unkown
|
page execute and read and write
|
||
27BF4339000
|
heap
|
page read and write
|
||
7FF74EA6A000
|
unkown
|
page execute and read and write
|
||
255CEB88000
|
direct allocation
|
page execute read
|
||
1473B5D0000
|
heap
|
page read and write
|
||
13F7A9EC000
|
heap
|
page read and write
|
||
1CD6C460000
|
heap
|
page read and write
|
||
7FF72CDC0000
|
unkown
|
page read and write
|
||
32652FC000
|
stack
|
page read and write
|
||
7FF65104E000
|
unkown
|
page execute and write copy
|
||
9B7CAFF000
|
stack
|
page read and write
|
||
1E2729F0000
|
heap
|
page read and write
|
||
7FF63D04C000
|
unkown
|
page execute and write copy
|
||
2587D2E8000
|
direct allocation
|
page execute read
|
||
158F9750000
|
direct allocation
|
page execute read
|
||
7FF78D0BE000
|
unkown
|
page execute and write copy
|
||
1AF03FA7000
|
heap
|
page read and write
|
||
41371FF000
|
stack
|
page read and write
|
||
158F9720000
|
heap
|
page read and write
|
||
7FF60317E000
|
unkown
|
page execute and write copy
|
||
A1DB9FF000
|
stack
|
page read and write
|
||
30BBEFC000
|
stack
|
page read and write
|
||
FB553FE000
|
stack
|
page read and write
|
||
7FF7F62FC000
|
unkown
|
page execute and write copy
|
||
7FF76616E000
|
unkown
|
page execute and write copy
|
||
1E2727E9000
|
heap
|
page read and write
|
||
A1DB8FF000
|
stack
|
page read and write
|
||
12698F40000
|
heap
|
page read and write
|
||
21117B60000
|
heap
|
page read and write
|
||
F13BDFE000
|
stack
|
page read and write
|
||
2232D8E0000
|
heap
|
page read and write
|
||
23987050000
|
heap
|
page read and write
|
||
290663E0000
|
heap
|
page read and write
|
||
260401B0000
|
heap
|
page read and write
|
||
7FF76A480000
|
unkown
|
page write copy
|
||
7FF74ED0E000
|
unkown
|
page execute and write copy
|
||
23552690000
|
heap
|
page read and write
|
||
7FF76A090000
|
unkown
|
page readonly
|
||
23552790000
|
direct allocation
|
page execute read
|
||
29066680000
|
heap
|
page read and write
|
||
2CAFDC000
|
stack
|
page read and write
|
||
1EE48FE0000
|
heap
|
page read and write
|
||
BFCADFF000
|
stack
|
page read and write
|
||
90B26FC000
|
stack
|
page read and write
|
||
7FF6ECAFE000
|
unkown
|
page execute and write copy
|
||
2B620AA0000
|
heap
|
page read and write
|
||
27BF42F8000
|
direct allocation
|
page execute read
|
||
7FF6BE0A0000
|
unkown
|
page readonly
|
||
7FF6E0F0A000
|
unkown
|
page execute and read and write
|
||
28B8A8A8000
|
direct allocation
|
page execute read
|
||
12698EC0000
|
heap
|
page read and write
|
||
7FF6C479C000
|
unkown
|
page execute and write copy
|
||
15EDB3F0000
|
heap
|
page read and write
|
||
2059AFF000
|
stack
|
page read and write
|
||
1F1B11DB000
|
heap
|
page read and write
|
||
13E12490000
|
heap
|
page read and write
|
||
13E12460000
|
heap
|
page read and write
|
||
7FF6C4430000
|
unkown
|
page readonly
|
||
1CD6C46C000
|
heap
|
page read and write
|
||
255CEC20000
|
heap
|
page read and write
|
||
1C189B89000
|
heap
|
page read and write
|
||
2AFFFCD0000
|
heap
|
page read and write
|
||
6110BFF000
|
stack
|
page read and write
|
||
28B8A780000
|
heap
|
page read and write
|
||
23987070000
|
heap
|
page read and write
|
||
7FF6A9E60000
|
unkown
|
page readonly
|
||
239870A0000
|
direct allocation
|
page execute read
|
||
7FF76A090000
|
unkown
|
page readonly
|
||
7FF601B10000
|
unkown
|
page read and write
|
||
2111710D000
|
heap
|
page read and write
|
||
7FF6B4B8C000
|
unkown
|
page execute and read and write
|
||
21C8F288000
|
direct allocation
|
page execute read
|
||
7FF695C60000
|
unkown
|
page readonly
|
||
20AFCC10000
|
heap
|
page read and write
|
||
1473B700000
|
direct allocation
|
page execute read
|
||
27BF433C000
|
heap
|
page read and write
|
||
7FF6BE490000
|
unkown
|
page read and write
|
||
7FF6CCACC000
|
unkown
|
page execute and read and write
|
||
255CE970000
|
heap
|
page read and write
|
||
21C8F150000
|
heap
|
page read and write
|
||
AFD4FE000
|
stack
|
page read and write
|
||
7FF6ECAEA000
|
unkown
|
page execute and read and write
|
||
8A3DFE000
|
stack
|
page read and write
|
||
7FF6A9E60000
|
unkown
|
page readonly
|
||
7FF7BF040000
|
unkown
|
page readonly
|
||
7FF6AC1BC000
|
unkown
|
page execute and write copy
|
||
7FF7BF3AC000
|
unkown
|
page execute and write copy
|
||
1AF03EE0000
|
heap
|
page read and write
|
||
7FF63D0D0000
|
unkown
|
page write copy
|
||
7FF62778E000
|
unkown
|
page execute and write copy
|
||
255CEB60000
|
heap
|
page read and write
|
||
7FF63CE2A000
|
unkown
|
page execute and read and write
|
||
1E4133D0000
|
heap
|
page read and write
|
||
7FF61DA60000
|
unkown
|
page read and write
|
||
13E124C0000
|
direct allocation
|
page execute read
|
||
7FF6E0F1C000
|
unkown
|
page execute and read and write
|
||
1A5B75F0000
|
heap
|
page read and write
|
||
63114FF000
|
stack
|
page read and write
|
||
7FF61DA60000
|
unkown
|
page write copy
|
||
7FF6AC240000
|
unkown
|
page write copy
|
||
1AF03F9B000
|
heap
|
page read and write
|
||
21184C5B000
|
heap
|
page read and write
|
||
7FF7BF41A000
|
unkown
|
page execute and read and write
|
||
7FF6F37BC000
|
unkown
|
page execute and write copy
|
||
7FF64017E000
|
unkown
|
page execute and write copy
|
||
38502FF000
|
stack
|
page read and write
|
||
61107BC000
|
stack
|
page read and write
|
||
2587D290000
|
heap
|
page read and write
|
||
2587D0B0000
|
heap
|
page read and write
|
||
7FF741710000
|
unkown
|
page readonly
|
||
19AACEBB000
|
heap
|
page read and write
|
||
255CEB40000
|
heap
|
page read and write
|
||
7FF610230000
|
unkown
|
page readonly
|
||
2ADB41B0000
|
heap
|
page read and write
|
||
21C8F440000
|
heap
|
page read and write
|
||
211151C0000
|
heap
|
page read and write
|
||
BFCA99C000
|
stack
|
page read and write
|
||
2110EBD0000
|
heap
|
page read and write
|
||
23552830000
|
heap
|
page read and write
|
||
C3DC6FF000
|
stack
|
page read and write
|
||
2110E780000
|
heap
|
page read and write
|
||
7FF69604C000
|
unkown
|
page execute and read and write
|
||
7FF6AA24C000
|
unkown
|
page execute and read and write
|
||
7FF7FABAC000
|
unkown
|
page execute and read and write
|
||
15EDB439000
|
heap
|
page read and write
|
||
7FF650C60000
|
unkown
|
page readonly
|
||
7FF75CE90000
|
unkown
|
page readonly
|
||
7FF7754AC000
|
unkown
|
page execute and read and write
|
||
1FE75810000
|
direct allocation
|
page execute read
|
||
7FF6E22BC000
|
unkown
|
page execute and read and write
|
||
D6D1AFF000
|
stack
|
page read and write
|
||
1E413139000
|
heap
|
page read and write
|
||
7FF6F3450000
|
unkown
|
page readonly
|
||
7FF6E0C7A000
|
unkown
|
page execute and read and write
|
||
1AF03F99000
|
heap
|
page read and write
|
||
EA24CFF000
|
stack
|
page read and write
|
||
12698EB0000
|
heap
|
page read and write
|
||
126991A0000
|
heap
|
page read and write
|
||
1CD6C370000
|
heap
|
page read and write
|
||
2232D6EB000
|
heap
|
page read and write
|
||
7FF60186A000
|
unkown
|
page execute and read and write
|
||
27BF4330000
|
heap
|
page read and write
|
||
1E2727EB000
|
heap
|
page read and write
|
||
7FF6E0F20000
|
unkown
|
page write copy
|
||
1AF03F40000
|
direct allocation
|
page execute read
|
||
7FF741B00000
|
unkown
|
page write copy
|
||
1A5B75F9000
|
heap
|
page read and write
|
||
1E413368000
|
direct allocation
|
page execute read
|
||
2110E7B8000
|
direct allocation
|
page execute read
|
||
2256BFF000
|
stack
|
page read and write
|
||
1EE49218000
|
direct allocation
|
page execute read
|
||
1CD6C3C0000
|
direct allocation
|
page execute read
|
||
7FF7F5F90000
|
unkown
|
page readonly
|
||
6110AFF000
|
stack
|
page read and write
|
||
7FF6C457A000
|
unkown
|
page execute and read and write
|
||
7FF7FB640000
|
unkown
|
page read and write
|
||
7FF6E0B30000
|
unkown
|
page readonly
|
||
1713C4D0000
|
heap
|
page read and write
|
||
7FF77F6FA000
|
unkown
|
page execute and read and write
|
||
21113C20000
|
heap
|
page read and write
|
||
26040440000
|
heap
|
page read and write
|
||
1CD6C290000
|
heap
|
page read and write
|
||
1A5B7550000
|
heap
|
page read and write
|
||
7FF7BF42E000
|
unkown
|
page execute and write copy
|
||
2AFFFD30000
|
direct allocation
|
page execute read
|
||
4D5C7FF000
|
stack
|
page read and write
|
||
1A5B7590000
|
direct allocation
|
page execute read
|
||
7FF76615A000
|
unkown
|
page execute and read and write
|
||
7FF7FB250000
|
unkown
|
page readonly
|
||
7FF6CC6E0000
|
unkown
|
page readonly
|
||
D06418C000
|
stack
|
page read and write
|
||
2059BFF000
|
stack
|
page read and write
|
||
15EDB7A0000
|
direct allocation
|
page execute read
|
||
A5716FC000
|
stack
|
page read and write
|
||
13E124C8000
|
direct allocation
|
page execute read
|
||
7FF74ED10000
|
unkown
|
page write copy
|
||
255CE97B000
|
heap
|
page read and write
|
||
D8B25FF000
|
stack
|
page read and write
|
||
14B3BCC000
|
stack
|
page read and write
|
||
7FF7754B0000
|
unkown
|
page read and write
|
||
23363AA0000
|
heap
|
page read and write
|
||
7FF69FC90000
|
unkown
|
page write copy
|
||
7FF64802C000
|
unkown
|
page execute and write copy
|
||
2AFFFCE0000
|
heap
|
page read and write
|
||
7FF77520A000
|
unkown
|
page execute and read and write
|
||
21184B60000
|
heap
|
page read and write
|
||
239870A8000
|
direct allocation
|
page execute read
|
||
7FF6B4B90000
|
unkown
|
page read and write
|
||
1473B9E0000
|
heap
|
page read and write
|
||
7FF76A3FC000
|
unkown
|
page execute and write copy
|
||
7FF77F710000
|
unkown
|
page read and write
|
||
7FF740490000
|
unkown
|
page readonly
|
||
1AF03F90000
|
heap
|
page read and write
|
||
1FE757B0000
|
heap
|
page read and write
|
||
7FF781F5C000
|
unkown
|
page execute and read and write
|
||
7FF696050000
|
unkown
|
page write copy
|
||
26040300000
|
direct allocation
|
page execute read
|
||
7FF77F46A000
|
unkown
|
page execute and read and write
|
||
7FF7FABB0000
|
unkown
|
page read and write
|
||
362E7FE000
|
stack
|
page read and write
|
||
7FF6AA23A000
|
unkown
|
page execute and read and write
|
||
7FF7FB63C000
|
unkown
|
page execute and read and write
|
||
7FF6BE490000
|
unkown
|
page write copy
|
||
5D0CFFF000
|
stack
|
page read and write
|
||
7FF6B48EA000
|
unkown
|
page execute and read and write
|
||
7FF7F124E000
|
unkown
|
page execute and write copy
|
||
2B620A80000
|
heap
|
page read and write
|
||
1C189B80000
|
heap
|
page read and write
|
||
2D989FF000
|
stack
|
page read and write
|
||
30BC0FF000
|
stack
|
page read and write
|
||
32653FE000
|
stack
|
page read and write
|
||
1F1B11D9000
|
heap
|
page read and write
|
||
28B8A750000
|
heap
|
page read and write
|
||
7FF74185A000
|
unkown
|
page execute and read and write
|
||
23363940000
|
heap
|
page read and write
|
||
2AFFFD38000
|
direct allocation
|
page execute read
|
||
7FF651050000
|
unkown
|
page write copy
|
||
7FF696050000
|
unkown
|
page read and write
|
||
20AFCDEB000
|
heap
|
page read and write
|
||
6A953FF000
|
stack
|
page read and write
|
||
206B7F29000
|
heap
|
page read and write
|
||
20AFCD48000
|
direct allocation
|
page execute read
|
||
7FF6CCA4C000
|
unkown
|
page execute and write copy
|
||
7FF74086A000
|
unkown
|
page execute and read and write
|
||
7FF61061E000
|
unkown
|
page execute and write copy
|
||
7FF651050000
|
unkown
|
page read and write
|
||
7FF7E339E000
|
unkown
|
page execute and write copy
|
||
2232F0C8000
|
direct allocation
|
page execute read
|
||
7FF6EC85A000
|
unkown
|
page execute and read and write
|
||
12698F49000
|
heap
|
page read and write
|
||
23363D10000
|
heap
|
page read and write
|
||
7FF6F382A000
|
unkown
|
page execute and read and write
|
||
12698F18000
|
direct allocation
|
page execute read
|
||
7FF69FC7A000
|
unkown
|
page execute and read and write
|
||
7FF7FA7C0000
|
unkown
|
page readonly
|
||
1CD6C3C8000
|
direct allocation
|
page execute read
|
||
7FF6AC23E000
|
unkown
|
page execute and write copy
|
||
FD98FE000
|
stack
|
page read and write
|
||
7FF74087C000
|
unkown
|
page execute and read and write
|
||
7FF7754AE000
|
unkown
|
page execute and write copy
|
||
7FF62770C000
|
unkown
|
page execute and write copy
|
||
21113220000
|
heap
|
page read and write
|
||
8A3EFF000
|
stack
|
page read and write
|
||
260401FC000
|
heap
|
page read and write
|
||
7FF61037A000
|
unkown
|
page execute and read and write
|
||
1B4150A0000
|
direct allocation
|
page execute read
|
||
1A5B7450000
|
heap
|
page read and write
|
||
2587D199000
|
heap
|
page read and write
|
||
1F1B12D0000
|
heap
|
page read and write
|
||
7FF61D670000
|
unkown
|
page readonly
|
||
2ADB424C000
|
heap
|
page read and write
|
||
7FF77F70E000
|
unkown
|
page execute and write copy
|
||
7FF76616C000
|
unkown
|
page execute and read and write
|
||
21184C59000
|
heap
|
page read and write
|
||
362E8FF000
|
stack
|
page read and write
|
||
158F99D0000
|
heap
|
page read and write
|
||
7FF627790000
|
unkown
|
page write copy
|
||
2587D1A7000
|
heap
|
page read and write
|
||
631110C000
|
stack
|
page read and write
|
||
2232D910000
|
heap
|
page read and write
|
||
2AFFFD00000
|
heap
|
page read and write
|
||
7FF7F5F90000
|
unkown
|
page readonly
|
||
7FF6E223C000
|
unkown
|
page execute and write copy
|
||
15EDB410000
|
heap
|
page read and write
|
||
7FF7E33A0000
|
unkown
|
page read and write
|
||
7FF6CCACE000
|
unkown
|
page execute and write copy
|
||
1713C62D000
|
heap
|
page read and write
|
||
7FF6273A0000
|
unkown
|
page readonly
|
||
7FF64809A000
|
unkown
|
page execute and read and write
|
||
2110E810000
|
heap
|
page read and write
|
||
7FF61DA5C000
|
unkown
|
page execute and read and write
|
||
19AACEB0000
|
heap
|
page read and write
|
||
27FA7270000
|
heap
|
page read and write
|
||
7FF77F320000
|
unkown
|
page readonly
|
||
7FF6ABE50000
|
unkown
|
page readonly
|
||
21111C80000
|
heap
|
page read and write
|
||
D6D1BFF000
|
stack
|
page read and write
|
||
D653AFC000
|
stack
|
page read and write
|
||
7FF781F5E000
|
unkown
|
page execute and write copy
|
||
23552560000
|
heap
|
page read and write
|
||
2CB2FF000
|
stack
|
page read and write
|
||
7FF650C60000
|
unkown
|
page readonly
|
||
7FF740880000
|
unkown
|
page read and write
|
||
7FF63D0BA000
|
unkown
|
page execute and read and write
|
||
1713C5D0000
|
heap
|
page read and write
|
||
7FF7405DA000
|
unkown
|
page execute and read and write
|
||
158F9700000
|
heap
|
page read and write
|
||
7FF695DAA000
|
unkown
|
page execute and read and write
|
||
23552798000
|
direct allocation
|
page execute read
|
||
A1DB59C000
|
stack
|
page read and write
|
||
362E6FC000
|
stack
|
page read and write
|
||
21117110000
|
heap
|
page read and write
|
||
7FF76A1DA000
|
unkown
|
page execute and read and write
|
||
7FF601B0E000
|
unkown
|
page execute and write copy
|
||
7FF69604E000
|
unkown
|
page execute and write copy
|
||
27FA7250000
|
heap
|
page read and write
|
||
D8B219C000
|
stack
|
page read and write
|
||
1AF03F10000
|
heap
|
page read and write
|
||
D653BFE000
|
stack
|
page read and write
|
||
7FF741A7C000
|
unkown
|
page execute and write copy
|
||
20597FC000
|
stack
|
page read and write
|
||
1A5B7607000
|
heap
|
page read and write
|
||
206B7F08000
|
direct allocation
|
page execute read
|
||
7FF7BF42C000
|
unkown
|
page execute and read and write
|
||
D0644FE000
|
stack
|
page read and write
|
||
7FF75D280000
|
unkown
|
page read and write
|
||
7FF740490000
|
unkown
|
page readonly
|
||
7FF64017C000
|
unkown
|
page execute and read and write
|
||
7FF7F11CC000
|
unkown
|
page execute and write copy
|
||
DEEC5AC000
|
stack
|
page read and write
|
||
7FF6BE48E000
|
unkown
|
page execute and write copy
|
||
7FF602D90000
|
unkown
|
page readonly
|
||
1E413360000
|
direct allocation
|
page execute read
|
||
7FF63FEDA000
|
unkown
|
page execute and read and write
|
||
7FF6C4820000
|
unkown
|
page read and write
|
||
27BF42C0000
|
heap
|
page read and write
|
||
21C8F290000
|
heap
|
page read and write
|
||
7FF640180000
|
unkown
|
page write copy
|
||
1A5B7598000
|
direct allocation
|
page execute read
|
||
260400D0000
|
heap
|
page read and write
|
||
1EE49210000
|
direct allocation
|
page execute read
|
||
7FF74E920000
|
unkown
|
page readonly
|
||
1E2727E0000
|
heap
|
page read and write
|
||
7FF6F383E000
|
unkown
|
page execute and write copy
|
||
7FF7750C0000
|
unkown
|
page readonly
|
||
7FF63D0D0000
|
unkown
|
page read and write
|
||
7FF69FC8E000
|
unkown
|
page execute and write copy
|
||
7FF6AA24E000
|
unkown
|
page execute and write copy
|
||
7FF6CCAD0000
|
unkown
|
page write copy
|
||
1A5B7530000
|
heap
|
page read and write
|
||
4D5C8FF000
|
stack
|
page read and write
|
||
7FF6480B0000
|
unkown
|
page read and write
|
||
21184D70000
|
heap
|
page read and write
|
||
7FF781F4A000
|
unkown
|
page execute and read and write
|
||
2D9855C000
|
stack
|
page read and write
|
||
AFD5FF000
|
stack
|
page read and write
|
||
2232D6E9000
|
heap
|
page read and write
|
||
7FF62778C000
|
unkown
|
page execute and read and write
|
||
29066410000
|
direct allocation
|
page execute read
|
||
27BF42F0000
|
direct allocation
|
page execute read
|
||
7FF6ABE50000
|
unkown
|
page readonly
|
||
27BF4290000
|
heap
|
page read and write
|
||
29E6A81C000
|
heap
|
page read and write
|
||
7FF7E339C000
|
unkown
|
page execute and read and write
|
||
205BA240000
|
heap
|
page read and write
|
||
158F979B000
|
heap
|
page read and write
|
||
7FF78CCD0000
|
unkown
|
page readonly
|
||
1B414F70000
|
heap
|
page read and write
|
||
7FF7FB63E000
|
unkown
|
page execute and write copy
|
||
B2590FF000
|
stack
|
page read and write
|
||
7FF6AA250000
|
unkown
|
page write copy
|
||
DEEC9FF000
|
stack
|
page read and write
|
||
7FF7E2FB0000
|
unkown
|
page readonly
|
||
7FF6BE40C000
|
unkown
|
page execute and write copy
|
||
7FF77549A000
|
unkown
|
page execute and read and write
|
||
1E413310000
|
heap
|
page read and write
|
||
13E124A0000
|
heap
|
page read and write
|
||
21111280000
|
heap
|
page read and write
|
||
7FF6A9FAA000
|
unkown
|
page execute and read and write
|
||
F478FF000
|
stack
|
page read and write
|
||
7FF61DA4A000
|
unkown
|
page execute and read and write
|
||
1C189B10000
|
heap
|
page read and write
|
||
21116B90000
|
heap
|
page read and write
|
||
15EDB430000
|
heap
|
page read and write
|
||
7FF69F8A0000
|
unkown
|
page readonly
|
||
1B4150D9000
|
heap
|
page read and write
|
||
225675C000
|
stack
|
page read and write
|
||
7FF77F70C000
|
unkown
|
page execute and read and write
|
||
7FF7FB39A000
|
unkown
|
page execute and read and write
|
||
20AFD0C0000
|
heap
|
page read and write
|
||
1C189B58000
|
direct allocation
|
page execute read
|
||
7FF6CCABA000
|
unkown
|
page execute and read and write
|
||
7FF781CBA000
|
unkown
|
page execute and read and write
|
||
7FF602EDA000
|
unkown
|
page execute and read and write
|
||
6A952FF000
|
stack
|
page read and write
|
||
7FF695FCC000
|
unkown
|
page execute and write copy
|
||
1AF03F48000
|
direct allocation
|
page execute read
|
||
7FF6C481E000
|
unkown
|
page execute and write copy
|
||
23363A40000
|
heap
|
page read and write
|
||
255CE950000
|
heap
|
page read and write
|
||
7FF6E0E9C000
|
unkown
|
page execute and write copy
|
||
2ADB4249000
|
heap
|
page read and write
|
||
19AAD0D0000
|
direct allocation
|
page execute read
|
||
28B8A670000
|
heap
|
page read and write
|
||
38503FF000
|
stack
|
page read and write
|
||
1E2726A0000
|
heap
|
page read and write
|
||
7FF6AC23C000
|
unkown
|
page execute and read and write
|
||
7FF6E22BE000
|
unkown
|
page execute and write copy
|
||
7FF791430000
|
unkown
|
page readonly
|
||
1713C608000
|
direct allocation
|
page execute read
|
||
1AF03EF0000
|
heap
|
page read and write
|
||
7FF7E30FA000
|
unkown
|
page execute and read and write
|
||
7FF69FC90000
|
unkown
|
page read and write
|
||
2AFFFD9B000
|
heap
|
page read and write
|
||
7FF781EDC000
|
unkown
|
page execute and write copy
|
||
C3DC5FF000
|
stack
|
page read and write
|
||
7FF7F1250000
|
unkown
|
page write copy
|
||
7FF6274EA000
|
unkown
|
page execute and read and write
|
||
2232D7E0000
|
heap
|
page read and write
|
||
1EE491F0000
|
heap
|
page read and write
|
||
21110A80000
|
heap
|
page read and write
|
||
7FF75D280000
|
unkown
|
page write copy
|
||
1713C7D0000
|
heap
|
page read and write
|
||
21184E70000
|
heap
|
page read and write
|
||
7FF62777A000
|
unkown
|
page execute and read and write
|
||
158F9620000
|
heap
|
page read and write
|
||
7FF6ABF9A000
|
unkown
|
page execute and read and write
|
||
D0645FF000
|
stack
|
page read and write
|
||
7FF72CDC0000
|
unkown
|
page write copy
|
||
19AACEB9000
|
heap
|
page read and write
|
||
7FF74ED0C000
|
unkown
|
page execute and read and write
|
||
158F9790000
|
heap
|
page read and write
|
||
7FF6E0F1E000
|
unkown
|
page execute and write copy
|
||
384FFEC000
|
stack
|
page read and write
|
||
20AFCD40000
|
direct allocation
|
page execute read
|
||
7FF72CDBE000
|
unkown
|
page execute and write copy
|
||
7FF69F9EA000
|
unkown
|
page execute and read and write
|
||
23552640000
|
heap
|
page read and write
|
||
1FE75830000
|
heap
|
page read and write
|
||
7FF601720000
|
unkown
|
page readonly
|
||
7FF7BF430000
|
unkown
|
page read and write
|
||
7FF7FB5BC000
|
unkown
|
page execute and write copy
|
||
1EE49029000
|
heap
|
page read and write
|
||
29E6A780000
|
heap
|
page read and write
|
||
2906643B000
|
heap
|
page read and write
|
||
206B7ED0000
|
heap
|
page read and write
|
||
1713C610000
|
heap
|
page read and write
|
||
1E413330000
|
heap
|
page read and write
|
||
6A94FCC000
|
stack
|
page read and write
|
||
41370FF000
|
stack
|
page read and write
|
||
27FA72A8000
|
direct allocation
|
page execute read
|
||
7FF69FC8C000
|
unkown
|
page execute and read and write
|
||
27BF4590000
|
heap
|
page read and write
|
||
2587D340000
|
heap
|
page read and write
|
||
7FF602D90000
|
unkown
|
page readonly
|
||
2AFFFFF0000
|
heap
|
page read and write
|
||
28B8A940000
|
heap
|
page read and write
|
||
1473B6B0000
|
heap
|
page read and write
|
||
211101FA000
|
heap
|
page read and write
|
||
1CD6C390000
|
heap
|
page read and write
|
||
2CB3FF000
|
stack
|
page read and write
|
||
1F1B13D0000
|
heap
|
page read and write
|
||
205BA140000
|
heap
|
page read and write
|
||
7FF75CE90000
|
unkown
|
page readonly
|
||
7FF76A480000
|
unkown
|
page read and write
|
||
1A5B7570000
|
heap
|
page read and write
|
||
21184C50000
|
heap
|
page read and write
|
||
8A3CFC000
|
stack
|
page read and write
|
||
FB554FF000
|
stack
|
page read and write
|
||
7FF6C480A000
|
unkown
|
page execute and read and write
|
||
1713C5B0000
|
heap
|
page read and write
|
||
7FF7FAB2C000
|
unkown
|
page execute and write copy
|
||
1473B7BB000
|
heap
|
page read and write
|
||
21117160000
|
heap
|
page read and write
|
||
7FF627790000
|
unkown
|
page read and write
|
||
1EE48FF0000
|
heap
|
page read and write
|
||
EA24BFF000
|
stack
|
page read and write
|
||
29E6A750000
|
heap
|
page read and write
|
||
7FF6CC6E0000
|
unkown
|
page readonly
|
||
1473B708000
|
direct allocation
|
page execute read
|
||
7FF7F60DA000
|
unkown
|
page execute and read and write
|
||
7FF741AFE000
|
unkown
|
page execute and write copy
|
||
7FF77F710000
|
unkown
|
page write copy
|
||
7FF741AEA000
|
unkown
|
page execute and read and write
|
||
28B8A880000
|
heap
|
page read and write
|
||
5D0D0FF000
|
stack
|
page read and write
|
||
1B4150D0000
|
heap
|
page read and write
|
||
2AFFFD99000
|
heap
|
page read and write
|
||
239870BC000
|
heap
|
page read and write
|
||
1E413230000
|
heap
|
page read and write
|
||
2110E82C000
|
heap
|
page read and write
|
||
205BA270000
|
direct allocation
|
page execute read
|
||
7FF6ECA7C000
|
unkown
|
page execute and write copy
|
||
91E0FFF000
|
stack
|
page read and write
|
||
255CEB80000
|
direct allocation
|
page execute read
|
||
2ADB40D0000
|
heap
|
page read and write
|
||
20AFCCF0000
|
heap
|
page read and write
|
||
7FF6AC22A000
|
unkown
|
page execute and read and write
|
||
28B8A78C000
|
heap
|
page read and write
|
||
13F7A940000
|
heap
|
page read and write
|
||
DEEC8FE000
|
stack
|
page read and write
|
||
21110480000
|
heap
|
page read and write
|
||
7FF6BE47A000
|
unkown
|
page execute and read and write
|
||
DBC67FE000
|
stack
|
page read and write
|
||
2355269B000
|
heap
|
page read and write
|
||
1713C619000
|
heap
|
page read and write
|
||
7FF7FB640000
|
unkown
|
page write copy
|
||
7FF65104C000
|
unkown
|
page execute and read and write
|
||
7FF6E0B30000
|
unkown
|
page readonly
|
||
7FF6F3840000
|
unkown
|
page write copy
|
||
27FA7170000
|
heap
|
page read and write
|
||
BFCACFF000
|
stack
|
page read and write
|
||
23363A70000
|
direct allocation
|
page execute read
|
||
13F7A920000
|
heap
|
page read and write
|
||
23363A78000
|
direct allocation
|
page execute read
|
||
255CE979000
|
heap
|
page read and write
|
||
C3DC4FC000
|
stack
|
page read and write
|
||
7FF61061C000
|
unkown
|
page execute and read and write
|
||
28B8A789000
|
heap
|
page read and write
|
||
7FF7FB250000
|
unkown
|
page readonly
|
||
19AAD230000
|
heap
|
page read and write
|
||
32654FF000
|
stack
|
page read and write
|
||
7FF6273A0000
|
unkown
|
page readonly
|
||
19AACEA0000
|
heap
|
page read and write
|
||
1713C600000
|
direct allocation
|
page execute read
|
||
7FF6F3840000
|
unkown
|
page read and write
|
||
260401D0000
|
heap
|
page read and write
|
||
7FF603180000
|
unkown
|
page write copy
|
||
7FF61D7BA000
|
unkown
|
page execute and read and write
|
||
D6D176C000
|
stack
|
page read and write
|
||
20AFCDE9000
|
heap
|
page read and write
|
||
1B4152B0000
|
heap
|
page read and write
|
||
2232D6E0000
|
heap
|
page read and write
|
||
7FF7407FC000
|
unkown
|
page execute and write copy
|
||
23363AA9000
|
heap
|
page read and write
|
||
7FF6E22C0000
|
unkown
|
page read and write
|
||
23552660000
|
heap
|
page read and write
|
||
F477FF000
|
stack
|
page read and write
|
||
1EE4902C000
|
heap
|
page read and write
|
||
2110E819000
|
heap
|
page read and write
|
||
7FF741AFC000
|
unkown
|
page execute and read and write
|
||
29E6A760000
|
heap
|
page read and write
|
||
7FF6BE48C000
|
unkown
|
page execute and read and write
|
||
2232F0C0000
|
direct allocation
|
page execute read
|
||
7FF640180000
|
unkown
|
page read and write
|
||
27FA72F9000
|
heap
|
page read and write
|
||
7FF76A47E000
|
unkown
|
page execute and write copy
|
||
29E6A7B0000
|
direct allocation
|
page execute read
|
||
7FF7F1250000
|
unkown
|
page read and write
|
||
30BBFFF000
|
stack
|
page read and write
|
||
239872C0000
|
heap
|
page read and write
|
||
F13BCFC000
|
stack
|
page read and write
|
||
13F7A9E9000
|
heap
|
page read and write
|
||
7FF72CDAA000
|
unkown
|
page execute and read and write
|
||
2110E81B000
|
heap
|
page read and write
|
||
7FF74EC8C000
|
unkown
|
page execute and write copy
|
||
206B7EB0000
|
heap
|
page read and write
|
||
1EE49310000
|
heap
|
page read and write
|
||
7FF75D26A000
|
unkown
|
page execute and read and write
|
||
26040308000
|
direct allocation
|
page execute read
|
||
7FF7E2FB0000
|
unkown
|
page readonly
|
||
CDD977C000
|
stack
|
page read and write
|
||
205BA278000
|
direct allocation
|
page execute read
|
||
27FA72F0000
|
heap
|
page read and write
|
||
14B3FFF000
|
stack
|
page read and write
|
||
2B620ACC000
|
heap
|
page read and write
|
||
7FF6BE0A0000
|
unkown
|
page readonly
|
||
15EDB43B000
|
heap
|
page read and write
|
||
7FF765D80000
|
unkown
|
page readonly
|
||
2B620BD0000
|
direct allocation
|
page execute read
|
||
7FF72CDBC000
|
unkown
|
page execute and read and write
|
||
21C8F230000
|
heap
|
page read and write
|
||
AFD14C000
|
stack
|
page read and write
|
||
7FF60317C000
|
unkown
|
page execute and read and write
|
||
7FF6AC240000
|
unkown
|
page read and write
|
||
7FF72CD3C000
|
unkown
|
page execute and write copy
|
||
206B7F20000
|
heap
|
page read and write
|
||
7FF7BF040000
|
unkown
|
page readonly
|
||
7FF7FABAE000
|
unkown
|
page execute and write copy
|
||
1FE75839000
|
heap
|
page read and write
|
||
7FF76A47C000
|
unkown
|
page execute and read and write
|
||
158F9799000
|
heap
|
page read and write
|
||
7FF781B70000
|
unkown
|
page readonly
|
||
63115FF000
|
stack
|
page read and write
|
||
7FF63FD90000
|
unkown
|
page readonly
|
||
20AFCDE0000
|
heap
|
page read and write
|
||
12698F4B000
|
heap
|
page read and write
|
||
239870B9000
|
heap
|
page read and write
|
||
EA24AFC000
|
stack
|
page read and write
|
||
15EDB3E0000
|
heap
|
page read and write
|
||
1E272780000
|
heap
|
page read and write
|
||
7FF765D80000
|
unkown
|
page readonly
|
||
29E6A819000
|
heap
|
page read and write
|
||
1B4150DB000
|
heap
|
page read and write
|
||
1F1B1500000
|
heap
|
page read and write
|
||
DBC68FE000
|
stack
|
page read and write
|
||
2ADB4200000
|
direct allocation
|
page execute read
|
||
1F1B11D0000
|
heap
|
page read and write
|
||
7FF601AFA000
|
unkown
|
page execute and read and write
|
||
7FF72CB1A000
|
unkown
|
page execute and read and write
|
||
21C8F299000
|
heap
|
page read and write
|
||
7FF78CE1A000
|
unkown
|
page execute and read and write
|
||
7FF7F6380000
|
unkown
|
page write copy
|
||
7FF7FB62A000
|
unkown
|
page execute and read and write
|
||
290662E0000
|
heap
|
page read and write
|
||
7FF6ECB00000
|
unkown
|
page read and write
|
||
211141F0000
|
heap
|
page read and write
|
||
12698EE0000
|
heap
|
page read and write
|
||
7FF61DA5E000
|
unkown
|
page execute and write copy
|
||
7FF75D27E000
|
unkown
|
page execute and write copy
|
||
21184D90000
|
direct allocation
|
page execute read
|
||
1C189B50000
|
direct allocation
|
page execute read
|
||
206B7F10000
|
heap
|
page read and write
|
||
13F7A910000
|
heap
|
page read and write
|
||
91E0EFC000
|
stack
|
page read and write
|
||
29066430000
|
heap
|
page read and write
|
||
7FF63D0CC000
|
unkown
|
page execute and read and write
|
||
7FF6F359A000
|
unkown
|
page execute and read and write
|
||
7FF69603A000
|
unkown
|
page execute and read and write
|
||
7FF78D0BC000
|
unkown
|
page execute and read and write
|
||
5D0CEFC000
|
stack
|
page read and write
|
||
FD48FFF000
|
stack
|
page read and write
|
||
7FF766170000
|
unkown
|
page read and write
|
||
1F1B1408000
|
direct allocation
|
page execute read
|
||
7FF7F6380000
|
unkown
|
page read and write
|
||
15EDB7C0000
|
heap
|
page read and write
|
||
7FF77F320000
|
unkown
|
page readonly
|
||
7FF647CC0000
|
unkown
|
page readonly
|
||
158F9758000
|
direct allocation
|
page execute read
|
||
7FF7754B0000
|
unkown
|
page write copy
|
||
2B6209A0000
|
heap
|
page read and write
|
||
7FF610620000
|
unkown
|
page write copy
|
||
7FF603180000
|
unkown
|
page read and write
|
||
7FF64016A000
|
unkown
|
page execute and read and write
|
||
290663C0000
|
heap
|
page read and write
|
||
7FF6F3450000
|
unkown
|
page readonly
|
||
7FF765ECA000
|
unkown
|
page execute and read and write
|
||
7FF650FCC000
|
unkown
|
page execute and write copy
|
||
260401F0000
|
heap
|
page read and write
|
||
7FF78CCD0000
|
unkown
|
page readonly
|
||
1E2727D8000
|
direct allocation
|
page execute read
|
||
23986F70000
|
heap
|
page read and write
|
||
7FF6BE1EA000
|
unkown
|
page execute and read and write
|
||
1C189B20000
|
heap
|
page read and write
|
||
7FF7FABB0000
|
unkown
|
page write copy
|
||
90B27FF000
|
stack
|
page read and write
|
||
1C189B8B000
|
heap
|
page read and write
|
||
27FA74A0000
|
heap
|
page read and write
|
||
7FF78D0C0000
|
unkown
|
page write copy
|
||
1FE7583C000
|
heap
|
page read and write
|
||
7FF61060A000
|
unkown
|
page execute and read and write
|
||
27FA72A0000
|
direct allocation
|
page execute read
|
||
7FF7E338A000
|
unkown
|
page execute and read and write
|
||
1A5B75FB000
|
heap
|
page read and write
|
||
21114BF0000
|
heap
|
page read and write
|
||
27FA72FC000
|
heap
|
page read and write
|
||
7FF610230000
|
unkown
|
page readonly
|
||
1473B7B9000
|
heap
|
page read and write
|
||
2110E750000
|
heap
|
page read and write
|
||
7FF601A8C000
|
unkown
|
page execute and write copy
|
||
21116190000
|
heap
|
page read and write
|
||
29E6A810000
|
heap
|
page read and write
|
||
B6D1CFC000
|
stack
|
page read and write
|
||
20AFCD10000
|
heap
|
page read and write
|
||
205BA220000
|
heap
|
page read and write
|
||
7FF75D1FC000
|
unkown
|
page execute and write copy
|
||
7FF6AA1CC000
|
unkown
|
page execute and write copy
|
||
23363AAB000
|
heap
|
page read and write
|
||
2ADB4240000
|
heap
|
page read and write
|
||
7FF63CCE0000
|
unkown
|
page readonly
|
||
7FF781B70000
|
unkown
|
page readonly
|
||
7FF6EC710000
|
unkown
|
page readonly
|
||
7FF7660EC000
|
unkown
|
page execute and write copy
|
||
2B620C80000
|
heap
|
page read and write
|
||
7FF741B00000
|
unkown
|
page read and write
|
||
29066439000
|
heap
|
page read and write
|
||
2B620BD8000
|
direct allocation
|
page execute read
|
||
7FF74087E000
|
unkown
|
page execute and write copy
|
||
1713C61B000
|
heap
|
page read and write
|
||
CDD9BFF000
|
stack
|
page read and write
|
||
7FF650DAA000
|
unkown
|
page execute and read and write
|
||
21C8F250000
|
heap
|
page read and write
|
||
2110E760000
|
heap
|
page read and write
|
||
21115BC0000
|
heap
|
page read and write
|
||
21110680000
|
heap
|
page read and write
|
||
2110E7B0000
|
direct allocation
|
page execute read
|
||
13E12520000
|
heap
|
page read and write
|
||
206B7F00000
|
direct allocation
|
page execute read
|
||
205BA2C9000
|
heap
|
page read and write
|
||
F13BEFF000
|
stack
|
page read and write
|
||
90B28FF000
|
stack
|
page read and write
|
||
7FF75D27C000
|
unkown
|
page execute and read and write
|
||
1E41313B000
|
heap
|
page read and write
|
||
2D988FF000
|
stack
|
page read and write
|
||
A5718FF000
|
stack
|
page read and write
|
||
7FF63FD90000
|
unkown
|
page readonly
|
||
7FF6E0F20000
|
unkown
|
page read and write
|
||
91E10FF000
|
stack
|
page read and write
|
||
B258D0C000
|
stack
|
page read and write
|
||
239870B0000
|
heap
|
page read and write
|
||
7FF610620000
|
unkown
|
page read and write
|
||
1FE757D0000
|
heap
|
page read and write
|
||
7FF61D670000
|
unkown
|
page readonly
|
||
7FF72C9D0000
|
unkown
|
page readonly
|
||
1F1B13B0000
|
heap
|
page read and write
|
||
23363A20000
|
heap
|
page read and write
|
||
7FF6E22C0000
|
unkown
|
page write copy
|
||
7FF6400FC000
|
unkown
|
page execute and write copy
|
||
1473B6D0000
|
heap
|
page read and write
|
||
FD48B3C000
|
stack
|
page read and write
|
||
1CD6C469000
|
heap
|
page read and write
|
||
19AAD080000
|
heap
|
page read and write
|
||
7FF6AA250000
|
unkown
|
page read and write
|
||
21184D50000
|
heap
|
page read and write
|
||
13E12529000
|
heap
|
page read and write
|
||
7FF77542C000
|
unkown
|
page execute and write copy
|
||
7FF6B47A0000
|
unkown
|
page readonly
|
||
1C189AF0000
|
heap
|
page read and write
|
||
7FF76A46A000
|
unkown
|
page execute and read and write
|
||
4D5C6FC000
|
stack
|
page read and write
|
There are 867 hidden memdumps, click here to show them.