Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
wsx.exe
|
PE32+ executable (GUI) x86-64, for MS Windows
|
initial sample
|
||
C:\Users\user\AppData\Roaming\Software\registry_65f93d51.exe
|
PE32+ executable (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_MEI18922\VCRUNTIME140.dll
|
PE32+ executable (DLL) (console) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_MEI18922\VCRUNTIME140_1.dll
|
PE32+ executable (DLL) (console) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_MEI18922\_asyncio.pyd
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_MEI18922\_bz2.pyd
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_MEI18922\_cffi_backend.cp38-win_amd64.pyd
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_MEI18922\_ctypes.pyd
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_MEI18922\_decimal.pyd
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_MEI18922\_hashlib.pyd
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_MEI18922\_lzma.pyd
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_MEI18922\_multiprocessing.pyd
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_MEI18922\_overlapped.pyd
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_MEI18922\_queue.pyd
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_MEI18922\_socket.pyd
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_MEI18922\_ssl.pyd
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_MEI18922\api-ms-win-core-console-l1-1-0.dll
|
PE32+ executable (DLL) (console) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_MEI18922\api-ms-win-core-datetime-l1-1-0.dll
|
PE32+ executable (DLL) (console) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_MEI18922\api-ms-win-core-debug-l1-1-0.dll
|
PE32+ executable (DLL) (console) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_MEI18922\api-ms-win-core-errorhandling-l1-1-0.dll
|
PE32+ executable (DLL) (console) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_MEI18922\api-ms-win-core-fibers-l1-1-0.dll
|
PE32+ executable (DLL) (console) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_MEI18922\api-ms-win-core-file-l1-1-0.dll
|
PE32+ executable (DLL) (console) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_MEI18922\api-ms-win-core-file-l1-2-0.dll
|
PE32+ executable (DLL) (console) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_MEI18922\api-ms-win-core-file-l2-1-0.dll
|
PE32+ executable (DLL) (console) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_MEI18922\api-ms-win-core-handle-l1-1-0.dll
|
PE32+ executable (DLL) (console) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_MEI18922\api-ms-win-core-heap-l1-1-0.dll
|
PE32+ executable (DLL) (console) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_MEI18922\api-ms-win-core-interlocked-l1-1-0.dll
|
PE32+ executable (DLL) (console) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_MEI18922\api-ms-win-core-libraryloader-l1-1-0.dll
|
PE32+ executable (DLL) (console) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_MEI18922\api-ms-win-core-localization-l1-2-0.dll
|
PE32+ executable (DLL) (console) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_MEI18922\api-ms-win-core-memory-l1-1-0.dll
|
PE32+ executable (DLL) (console) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_MEI18922\api-ms-win-core-namedpipe-l1-1-0.dll
|
PE32+ executable (DLL) (console) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_MEI18922\api-ms-win-core-processenvironment-l1-1-0.dll
|
PE32+ executable (DLL) (console) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_MEI18922\api-ms-win-core-processthreads-l1-1-0.dll
|
PE32+ executable (DLL) (console) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_MEI18922\api-ms-win-core-processthreads-l1-1-1.dll
|
PE32+ executable (DLL) (console) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_MEI18922\api-ms-win-core-profile-l1-1-0.dll
|
PE32+ executable (DLL) (console) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_MEI18922\api-ms-win-core-rtlsupport-l1-1-0.dll
|
PE32+ executable (DLL) (console) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_MEI18922\api-ms-win-core-string-l1-1-0.dll
|
PE32+ executable (DLL) (console) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_MEI18922\api-ms-win-core-synch-l1-1-0.dll
|
PE32+ executable (DLL) (console) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_MEI18922\api-ms-win-core-synch-l1-2-0.dll
|
PE32+ executable (DLL) (console) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_MEI18922\api-ms-win-core-sysinfo-l1-1-0.dll
|
PE32+ executable (DLL) (console) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_MEI18922\api-ms-win-core-timezone-l1-1-0.dll
|
PE32+ executable (DLL) (console) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_MEI18922\api-ms-win-core-util-l1-1-0.dll
|
PE32+ executable (DLL) (console) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_MEI18922\api-ms-win-crt-conio-l1-1-0.dll
|
PE32+ executable (DLL) (console) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_MEI18922\api-ms-win-crt-convert-l1-1-0.dll
|
PE32+ executable (DLL) (console) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_MEI18922\api-ms-win-crt-environment-l1-1-0.dll
|
PE32+ executable (DLL) (console) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_MEI18922\api-ms-win-crt-filesystem-l1-1-0.dll
|
PE32+ executable (DLL) (console) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_MEI18922\api-ms-win-crt-heap-l1-1-0.dll
|
PE32+ executable (DLL) (console) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_MEI18922\api-ms-win-crt-locale-l1-1-0.dll
|
PE32+ executable (DLL) (console) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_MEI18922\api-ms-win-crt-math-l1-1-0.dll
|
PE32+ executable (DLL) (console) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_MEI18922\api-ms-win-crt-process-l1-1-0.dll
|
PE32+ executable (DLL) (console) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_MEI18922\api-ms-win-crt-runtime-l1-1-0.dll
|
PE32+ executable (DLL) (console) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_MEI18922\api-ms-win-crt-stdio-l1-1-0.dll
|
PE32+ executable (DLL) (console) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_MEI18922\api-ms-win-crt-string-l1-1-0.dll
|
PE32+ executable (DLL) (console) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_MEI18922\api-ms-win-crt-time-l1-1-0.dll
|
PE32+ executable (DLL) (console) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_MEI18922\api-ms-win-crt-utility-l1-1-0.dll
|
PE32+ executable (DLL) (console) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_MEI18922\base_library.zip
|
Zip archive data, at least v2.0 to extract, compression method=store
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_MEI18922\bcrypt\_bcrypt.pyd
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_MEI18922\certifi\cacert.pem
|
ASCII text
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_MEI18922\charset_normalizer\md.cp38-win_amd64.pyd
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_MEI18922\charset_normalizer\md__mypyc.cp38-win_amd64.pyd
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_MEI18922\cryptography-3.4.8.dist-info\INSTALLER
|
ASCII text
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_MEI18922\cryptography-3.4.8.dist-info\LICENSE
|
ASCII text
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_MEI18922\cryptography-3.4.8.dist-info\LICENSE.APACHE
|
ASCII text
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_MEI18922\cryptography-3.4.8.dist-info\LICENSE.BSD
|
ASCII text
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_MEI18922\cryptography-3.4.8.dist-info\LICENSE.PSF
|
Unicode text, UTF-8 text
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_MEI18922\cryptography-3.4.8.dist-info\METADATA
|
ASCII text
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_MEI18922\cryptography-3.4.8.dist-info\RECORD
|
CSV text
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_MEI18922\cryptography-3.4.8.dist-info\WHEEL
|
ASCII text
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_MEI18922\cryptography-3.4.8.dist-info\top_level.txt
|
ASCII text
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_MEI18922\cryptography\hazmat\bindings\_openssl.pyd
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_MEI18922\libcrypto-1_1.dll
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_MEI18922\libffi-7.dll
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_MEI18922\libssl-1_1.dll
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_MEI18922\pyexpat.pyd
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_MEI18922\python3.dll
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_MEI18922\python38.dll
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_MEI18922\pywin32_system32\pywintypes38.dll
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_MEI18922\select.pyd
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_MEI18922\ucrtbase.dll
|
PE32+ executable (DLL) (console) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_MEI18922\unicodedata.pyd
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_MEI18922\win32wnet.pyd
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_MEI60562\VCRUNTIME140.dll
|
PE32+ executable (DLL) (console) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_MEI60562\VCRUNTIME140_1.dll
|
PE32+ executable (DLL) (console) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_MEI60562\_asyncio.pyd
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_MEI60562\_bz2.pyd
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_MEI60562\_cffi_backend.cp38-win_amd64.pyd
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_MEI60562\_ctypes.pyd
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_MEI60562\_decimal.pyd
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_MEI60562\_hashlib.pyd
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_MEI60562\_lzma.pyd
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_MEI60562\_multiprocessing.pyd
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_MEI60562\_overlapped.pyd
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_MEI60562\_queue.pyd
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_MEI60562\_socket.pyd
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_MEI60562\_ssl.pyd
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_MEI60562\api-ms-win-core-console-l1-1-0.dll
|
PE32+ executable (DLL) (console) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_MEI60562\api-ms-win-core-datetime-l1-1-0.dll
|
PE32+ executable (DLL) (console) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_MEI60562\api-ms-win-core-debug-l1-1-0.dll
|
PE32+ executable (DLL) (console) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_MEI60562\api-ms-win-core-errorhandling-l1-1-0.dll
|
PE32+ executable (DLL) (console) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_MEI60562\api-ms-win-core-fibers-l1-1-0.dll
|
PE32+ executable (DLL) (console) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_MEI60562\api-ms-win-core-file-l1-1-0.dll
|
PE32+ executable (DLL) (console) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_MEI60562\api-ms-win-core-file-l1-2-0.dll
|
PE32+ executable (DLL) (console) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_MEI60562\api-ms-win-core-file-l2-1-0.dll
|
PE32+ executable (DLL) (console) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_MEI60562\api-ms-win-core-handle-l1-1-0.dll
|
PE32+ executable (DLL) (console) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_MEI60562\api-ms-win-core-heap-l1-1-0.dll
|
PE32+ executable (DLL) (console) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_MEI60562\api-ms-win-core-interlocked-l1-1-0.dll
|
PE32+ executable (DLL) (console) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_MEI60562\api-ms-win-core-libraryloader-l1-1-0.dll
|
PE32+ executable (DLL) (console) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_MEI60562\api-ms-win-core-localization-l1-2-0.dll
|
PE32+ executable (DLL) (console) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_MEI60562\api-ms-win-core-memory-l1-1-0.dll
|
PE32+ executable (DLL) (console) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_MEI60562\api-ms-win-core-namedpipe-l1-1-0.dll
|
PE32+ executable (DLL) (console) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_MEI60562\api-ms-win-core-processenvironment-l1-1-0.dll
|
PE32+ executable (DLL) (console) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_MEI60562\api-ms-win-core-processthreads-l1-1-0.dll
|
PE32+ executable (DLL) (console) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_MEI60562\api-ms-win-core-processthreads-l1-1-1.dll
|
PE32+ executable (DLL) (console) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_MEI60562\api-ms-win-core-profile-l1-1-0.dll
|
PE32+ executable (DLL) (console) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_MEI60562\api-ms-win-core-rtlsupport-l1-1-0.dll
|
PE32+ executable (DLL) (console) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_MEI60562\api-ms-win-core-string-l1-1-0.dll
|
PE32+ executable (DLL) (console) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_MEI60562\api-ms-win-core-synch-l1-1-0.dll
|
PE32+ executable (DLL) (console) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_MEI60562\api-ms-win-core-synch-l1-2-0.dll
|
PE32+ executable (DLL) (console) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_MEI60562\api-ms-win-core-sysinfo-l1-1-0.dll
|
PE32+ executable (DLL) (console) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_MEI60562\api-ms-win-core-timezone-l1-1-0.dll
|
PE32+ executable (DLL) (console) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_MEI60562\api-ms-win-core-util-l1-1-0.dll
|
PE32+ executable (DLL) (console) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_MEI60562\api-ms-win-crt-conio-l1-1-0.dll
|
PE32+ executable (DLL) (console) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_MEI60562\api-ms-win-crt-convert-l1-1-0.dll
|
PE32+ executable (DLL) (console) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_MEI60562\api-ms-win-crt-environment-l1-1-0.dll
|
PE32+ executable (DLL) (console) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_MEI60562\api-ms-win-crt-filesystem-l1-1-0.dll
|
PE32+ executable (DLL) (console) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_MEI60562\api-ms-win-crt-heap-l1-1-0.dll
|
PE32+ executable (DLL) (console) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_MEI60562\api-ms-win-crt-locale-l1-1-0.dll
|
PE32+ executable (DLL) (console) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_MEI60562\api-ms-win-crt-math-l1-1-0.dll
|
PE32+ executable (DLL) (console) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_MEI60562\api-ms-win-crt-process-l1-1-0.dll
|
PE32+ executable (DLL) (console) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_MEI60562\api-ms-win-crt-runtime-l1-1-0.dll
|
PE32+ executable (DLL) (console) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_MEI60562\api-ms-win-crt-stdio-l1-1-0.dll
|
PE32+ executable (DLL) (console) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_MEI60562\api-ms-win-crt-string-l1-1-0.dll
|
PE32+ executable (DLL) (console) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_MEI60562\api-ms-win-crt-time-l1-1-0.dll
|
PE32+ executable (DLL) (console) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_MEI60562\api-ms-win-crt-utility-l1-1-0.dll
|
PE32+ executable (DLL) (console) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_MEI60562\base_library.zip
|
Zip archive data, at least v2.0 to extract, compression method=store
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_MEI60562\bcrypt\_bcrypt.pyd
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_MEI60562\certifi\cacert.pem
|
ASCII text
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_MEI60562\charset_normalizer\md.cp38-win_amd64.pyd
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_MEI60562\charset_normalizer\md__mypyc.cp38-win_amd64.pyd
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_MEI60562\cryptography-3.4.8.dist-info\INSTALLER
|
ASCII text
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_MEI60562\cryptography-3.4.8.dist-info\LICENSE
|
ASCII text
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_MEI60562\cryptography-3.4.8.dist-info\LICENSE.APACHE
|
ASCII text
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_MEI60562\cryptography-3.4.8.dist-info\LICENSE.BSD
|
ASCII text
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_MEI60562\cryptography-3.4.8.dist-info\LICENSE.PSF
|
Unicode text, UTF-8 text
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_MEI60562\cryptography-3.4.8.dist-info\METADATA
|
ASCII text
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_MEI60562\cryptography-3.4.8.dist-info\RECORD
|
CSV text
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_MEI60562\cryptography-3.4.8.dist-info\WHEEL
|
ASCII text
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_MEI60562\cryptography-3.4.8.dist-info\top_level.txt
|
ASCII text
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_MEI60562\cryptography\hazmat\bindings\_openssl.pyd
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_MEI60562\libcrypto-1_1.dll
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_MEI60562\libffi-7.dll
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_MEI60562\libssl-1_1.dll
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_MEI60562\pyexpat.pyd
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_MEI60562\python3.dll
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_MEI60562\python38.dll
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_MEI60562\pywin32_system32\pywintypes38.dll
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_MEI60562\select.pyd
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_MEI60562\ucrtbase.dll
|
PE32+ executable (DLL) (console) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_MEI60562\unicodedata.pyd
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_MEI60562\win32wnet.pyd
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\Software\lockfile
|
ASCII text, with no line terminators
|
dropped
|
There are 151 hidden files, click here to show them.
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\wsx.exe
|
"C:\Users\user\Desktop\wsx.exe"
|
||
C:\Users\user\Desktop\wsx.exe
|
"C:\Users\user\Desktop\wsx.exe"
|
||
C:\Windows\System32\cmd.exe
|
C:\Windows\system32\cmd.exe /c "schtasks /query /tn "registry_65f93d51.exe""
|
||
C:\Windows\System32\schtasks.exe
|
schtasks /query /tn "registry_65f93d51.exe"
|
||
C:\Windows\System32\cmd.exe
|
C:\Windows\system32\cmd.exe /c "schtasks /create /tn "registry_65f93d51.exe" /tr "C:\Users\user\AppData\Roaming\Software\registry_65f93d51.exe"
/sc onlogon /rl highest /f"
|
||
C:\Windows\System32\schtasks.exe
|
schtasks /create /tn "registry_65f93d51.exe" /tr "C:\Users\user\AppData\Roaming\Software\registry_65f93d51.exe" /sc onlogon
/rl highest /f
|
||
C:\Users\user\AppData\Roaming\Software\registry_65f93d51.exe
|
C:\Users\user\AppData\Roaming\Software\registry_65f93d51.exe
|
||
C:\Users\user\AppData\Roaming\Software\registry_65f93d51.exe
|
C:\Users\user\AppData\Roaming\Software\registry_65f93d51.exe
|
||
C:\Windows\System32\cmd.exe
|
C:\Windows\system32\cmd.exe /c "schtasks /query /tn "registry_65f93d51.exe""
|
||
C:\Windows\System32\schtasks.exe
|
schtasks /query /tn "registry_65f93d51.exe"
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
There are 3 hidden processes, click here to show them.
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
https://github.com/asweigart/pyperclip/issues/55
|
unknown
|
||
http://crl.xrampsecurity.com/XGCA.crll__.
|
unknown
|
||
http://pontoslivelobb.servicos.ws/conta.phprg
|
unknown
|
||
https://cloud.google.com/appengine/docs/standard/runtimes
|
unknown
|
||
https://github.com/mhammond/pywin32
|
unknown
|
||
http://pontoslivelobb.servicos.ws/conta.php
|
191.252.83.191
|
||
http://docs.python.org/library/unittest.html
|
unknown
|
||
https://github.com/tensorflow/datasets/blob/master/tensorflow_datasets/core/utils/resource_utils.py#
|
unknown
|
||
http://pontoslivelobb.servicos.ws/salva.php
|
unknown
|
||
http://www.python.org/download/releases/2.3/mro/.
|
unknown
|
||
https://github.com/pyca/cryptography/actions?query=workflow%3ACI
|
unknown
|
||
https://tools.ietf.org/html/rfc2388#section-4.4
|
unknown
|
||
https://www.apache.org/licenses/LICENSE-2.0
|
unknown
|
||
http://docs.python.org/3/library/subprocess#subprocess.Popen.kill
|
unknown
|
||
https://codecov.io/github/pyca/cryptography/coverage.svg?branch=master
|
unknown
|
||
http://crl.dhimyotis.com/certignarootca.crl
|
unknown
|
||
http://curl.haxx.se/rfc/cookie_spec.html
|
unknown
|
||
http://ocsp.accv.es
|
unknown
|
||
http://www.python.org/dev/peps/pep-0205/
|
unknown
|
||
http://docs.python.org/3/library/subprocess#subprocess.Popen.returncode
|
unknown
|
||
https://stackoverflow.com/questions/455434/how-should-i-use-formatmessage-properly-in-c
|
unknown
|
||
https://estudosadulto.educacao.ws/contador/contador.php
|
unknown
|
||
http://json.org
|
unknown
|
||
https://github.com/python/cpython/blob/3.9/Lib/importlib/_bootstrap_external.py#L679-L688
|
unknown
|
||
https://httpbin.org/get
|
unknown
|
||
http://httpbin.org/
|
unknown
|
||
http://91.92.246.171:5000/replace
|
unknown
|
||
https://wwww.certigna.fr/autorites/0m
|
unknown
|
||
https://github.com/python/cpython/blob/839d7893943782ee803536a47f1d4de160314f85/Lib/importlib/reader
|
unknown
|
||
https://codecov.io/github/pyca/cryptography?branch=master
|
unknown
|
||
https://httpbin.org/
|
unknown
|
||
https://www.apache.org/licenses/
|
unknown
|
||
https://wwww.certigna.fr/autorites/
|
unknown
|
||
http://www.cl.cam.ac.uk/~mgk25/iso-time.html
|
unknown
|
||
http://pontoslivelobb.servicos.ws/conta.phprg)
|
unknown
|
||
http://repository.swisssign.com/t
|
unknown
|
||
http://hg.python.org/cpython/file/603b4d593758/Lib/socket.py#l535
|
unknown
|
||
https://github.com/Unidata/MetPy/blob/a3424de66a44bf3a92b0dcacf4dff82ad7b86712/src/metpy/plots/wx_sy
|
unknown
|
||
https://cryptography.io/en/latest/installation.html
|
unknown
|
||
http://crl.securetrust.com/STCA.crl
|
unknown
|
||
http://crl.securetrust.com/STCA.crl__exit__c
|
unknown
|
||
http://wwwsearch.sf.net/):
|
unknown
|
||
http://www.accv.es/fileadmin/Archivos/certificados/raizaccv1.crt0
|
unknown
|
||
http://www.accv.es/legislacion_c.htm
|
unknown
|
||
http://tools.ietf.org/html/rfc6125#section-6.4.3
|
unknown
|
||
http://crl.xrampsecurity.com/XGCA.crl0
|
unknown
|
||
http://www.cert.fnmt.es/dpcs/
|
unknown
|
||
http://www.accv.es00
|
unknown
|
||
https://github.com/python/cpython/blob/839d7893943782ee803536a47f1d4de160314f85/Lib/importlib/abc.py
|
unknown
|
||
http://www.phys.uu.nl/~vgent/calendar/isocalendar.htm
|
unknown
|
||
https://github.com/pyca/cryptography/issues
|
unknown
|
||
https://readthedocs.org/projects/cryptography/badge/?version=latest
|
unknown
|
||
https://github.com/urllib3/urllib3/issues/2513#issuecomment-1152559900.
|
unknown
|
||
http://google.com/
|
unknown
|
||
https://mahler:8092/site-updates.py
|
unknown
|
||
https://urllib3.readthedocs.io/en/stable/v2-migration-guide.html
|
unknown
|
||
https://estudosadulto.educacao.ws/contador/contador.php0
|
unknown
|
||
http://crl.securetrust.com/SGCA.crl
|
unknown
|
||
http://docs.p
|
unknown
|
||
http://.../back.jpeg
|
unknown
|
||
https://github.com/pyca/cryptography
|
unknown
|
||
https://cryptography.io/
|
unknown
|
||
https://urllib3.readthedocs.io/en/1.26.x/advanced-usage.html#https-proxy-error-http-proxy
|
unknown
|
||
http://www.python.org/
|
unknown
|
||
https://httpbin.org/post
|
unknown
|
||
https://pyperclip.readthedocs.io/en/latest/index.html#not-implemented-error
|
unknown
|
||
https://github.com/Ousret/charset_normalizer
|
unknown
|
||
https://github.com/urllib3/urllib3/issues/497
|
unknown
|
||
http://www.firmaprofesional.com/cps0
|
unknown
|
||
http://crl.securetrust.com/SGCA.crl0
|
unknown
|
||
http://crl.securetrust.com/STCA.crl0
|
unknown
|
||
http://www.quovadisglobal.com/cpsd
|
unknown
|
||
http://yahoo.com/
|
unknown
|
||
http://www.iana.org/assignments/tls-parameters/tls-parameters.xml#tls-parameters-6
|
unknown
|
||
http://crl.thawte.com/ThawteTimestampingCA.crl0
|
unknown
|
||
https://w3c.github.io/html/sec-forms.html#multipart-form-data
|
unknown
|
||
http://www.quovadisglobal.com/cps0
|
unknown
|
||
http://www.accv.es/fileadmin/Archivos/certificados/raizaccv1_der.crl
|
unknown
|
||
http://www.accv.es/fileadmin/Archivos/certificados/raizaccv1_der.crl0
|
unknown
|
||
https://docs.microsof
|
unknown
|
||
https://mail.python.org/mailman/listinfo/cryptography-dev
|
unknown
|
||
https://requests.readthedocs.io
|
unknown
|
||
http://repository.swisssign.com/
|
unknown
|
||
http://python.org/dev/peps/pep-0263/
|
unknown
|
||
http://crl.xrampsecurity.com/XGCA.crl
|
unknown
|
||
http://repository.swisssign.com/Hd
|
unknown
|
||
http://repository.swisssign.com/0R
|
unknown
|
||
https://www.python.org
|
unknown
|
||
http://www.accv.es/legislacion_c.htm0U
|
unknown
|
||
http://ocsp.accv.es0
|
unknown
|
||
http://ocsp.thawte.com0
|
unknown
|
||
https://urllib3.readthedocs.io/en/1.26.x/advanced-usage.html#ssl-warnings
|
unknown
|
||
https://cryptography.io/en/latest/security.html
|
unknown
|
||
https://twitter.com/
|
unknown
|
||
https://urllib3.readthedocs.io/en/1.26.x/advanced-usage.html#ssl-warningsPv
|
unknown
|
||
http://www.quovadisglobal.com/cps
|
unknown
|
||
https://img.shields.io/pypi/v/cryptography.svg
|
unknown
|
||
http://google.com/mail/
|
unknown
|
||
http://docs.python.org/3/library/subprocess#subprocess.Popen.terminate
|
unknown
|
||
https://estudosadulto.educacao.ws/contador/contador.php0wt
|
unknown
|
There are 90 hidden URLs, click here to show them.
Domains
Name
|
IP
|
Malicious
|
|
---|---|---|---|
pontoslivelobb.servicos.ws
|
191.252.83.191
|
||
fp2e7a.wpc.phicdn.net
|
192.229.221.95
|
||
estudosadulto.educacao.ws
|
94.156.67.32
|
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
191.252.83.191
|
pontoslivelobb.servicos.ws
|
Brazil
|
||
94.156.67.32
|
estudosadulto.educacao.ws
|
Bulgaria
|
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
1D6CD6E0000
|
direct allocation
|
page read and write
|
||
1AA02354000
|
heap
|
page read and write
|
||
1BF40577000
|
heap
|
page read and write
|
||
1AA02361000
|
heap
|
page read and write
|
||
7FF8A8080000
|
unkown
|
page readonly
|
||
7FF8B90F1000
|
unkown
|
page execute read
|
||
7FF7E720D000
|
unkown
|
page read and write
|
||
1DEECD10000
|
direct allocation
|
page read and write
|
||
7FF8A82F2000
|
unkown
|
page readonly
|
||
1BF4058E000
|
heap
|
page read and write
|
||
1DEED165000
|
heap
|
page read and write
|
||
1D6CF7E0000
|
direct allocation
|
page read and write
|
||
1D6CBEAF000
|
heap
|
page read and write
|
||
7FF8A8D9E000
|
unkown
|
page readonly
|
||
7FF8B78C3000
|
unkown
|
page readonly
|
||
1D6CD820000
|
heap
|
page read and write
|
||
1A61DAA0000
|
heap
|
page read and write
|
||
1D6CBE9C000
|
heap
|
page read and write
|
||
1AA02362000
|
heap
|
page read and write
|
||
7FF8A736B000
|
unkown
|
page readonly
|
||
7FF6BD60E000
|
unkown
|
page readonly
|
||
1DEEB051000
|
heap
|
page read and write
|
||
1BF40595000
|
heap
|
page read and write
|
||
1DEEC8A0000
|
heap
|
page read and write
|
||
1A61DAC0000
|
heap
|
page read and write
|
||
1D6CBE36000
|
heap
|
page read and write
|
||
1DEEB051000
|
heap
|
page read and write
|
||
1AA02363000
|
heap
|
page read and write
|
||
7FF8B9145000
|
unkown
|
page read and write
|
||
7FF8B82E1000
|
unkown
|
page execute read
|
||
1BF40595000
|
heap
|
page read and write
|
||
1D6CBD80000
|
direct allocation
|
page read and write
|
||
1D6CE211000
|
heap
|
page read and write
|
||
1AA02368000
|
heap
|
page read and write
|
||
1D6CF75A000
|
heap
|
page read and write
|
||
1D6CBE36000
|
heap
|
page read and write
|
||
1DEED5D0000
|
direct allocation
|
page read and write
|
||
1D6CE4A0000
|
direct allocation
|
page read and write
|
||
7FF8B9146000
|
unkown
|
page readonly
|
||
1BF40588000
|
heap
|
page read and write
|
||
1DEEB067000
|
heap
|
page read and write
|
||
1AA0235F000
|
heap
|
page read and write
|
||
1D6CEB00000
|
direct allocation
|
page read and write
|
||
1D6CF710000
|
direct allocation
|
page read and write
|
||
7FF8A82C7000
|
unkown
|
page readonly
|
||
1AA02362000
|
heap
|
page read and write
|
||
1D6CBE3F000
|
heap
|
page read and write
|
||
7FF8B9141000
|
unkown
|
page execute read
|
||
1D6CEB80000
|
direct allocation
|
page read and write
|
||
1DEEAFD8000
|
heap
|
page read and write
|
||
1DEEE1D0000
|
direct allocation
|
page read and write
|
||
1D6CBE38000
|
heap
|
page read and write
|
||
1D6CBE91000
|
heap
|
page read and write
|
||
1DEEB0A5000
|
heap
|
page read and write
|
||
7FF6BD5C1000
|
unkown
|
page execute read
|
||
7FF8A8323000
|
unkown
|
page readonly
|
||
1AA0234E000
|
heap
|
page read and write
|
||
1D6CEDB0000
|
direct allocation
|
page read and write
|
||
7FF8A7B30000
|
unkown
|
page readonly
|
||
7FF8B9100000
|
unkown
|
page readonly
|
||
1DEECCD0000
|
direct allocation
|
page read and write
|
||
1DEED010000
|
direct allocation
|
page read and write
|
||
1D6CBE85000
|
heap
|
page read and write
|
||
1D6CF7A0000
|
direct allocation
|
page read and write
|
||
1D6CF7A0000
|
direct allocation
|
page read and write
|
||
1AA0235B000
|
heap
|
page read and write
|
||
1DEED690000
|
direct allocation
|
page read and write
|
||
7FF8A8AAB000
|
unkown
|
page readonly
|
||
1D6CBE3E000
|
heap
|
page read and write
|
||
1BF4058B000
|
heap
|
page read and write
|
||
1DEEE070000
|
direct allocation
|
page read and write
|
||
238F7DE000
|
stack
|
page read and write
|
||
7FF8BFB20000
|
unkown
|
page readonly
|
||
7FF8B90BF000
|
unkown
|
page readonly
|
||
7FF8BFB30000
|
unkown
|
page readonly
|
||
1D6CBE3E000
|
heap
|
page read and write
|
||
1DEED8C0000
|
direct allocation
|
page read and write
|
||
1DEEE030000
|
direct allocation
|
page read and write
|
||
7FF8BFB34000
|
unkown
|
page read and write
|
||
1D6CE9AC000
|
heap
|
page read and write
|
||
1D6CEEF0000
|
heap
|
page read and write
|
||
1DEEB05E000
|
heap
|
page read and write
|
||
7FF8A9399000
|
unkown
|
page readonly
|
||
7FF8A7DAC000
|
unkown
|
page readonly
|
||
1DEEDD7D000
|
heap
|
page read and write
|
||
1D6CBE91000
|
heap
|
page read and write
|
||
7FF8B780A000
|
unkown
|
page read and write
|
||
7FF8A8AA7000
|
unkown
|
page readonly
|
||
1D6CE777000
|
heap
|
page read and write
|
||
1D6CBE0D000
|
heap
|
page read and write
|
||
1DEEDB33000
|
heap
|
page read and write
|
||
1D6CBE85000
|
heap
|
page read and write
|
||
1DEED190000
|
direct allocation
|
page read and write
|
||
7FF8B829E000
|
unkown
|
page readonly
|
||
7FF8A92F0000
|
unkown
|
page readonly
|
||
1AA02354000
|
heap
|
page read and write
|
||
1D6CED70000
|
direct allocation
|
page read and write
|
||
1BF40588000
|
heap
|
page read and write
|
||
1DEED980000
|
direct allocation
|
page read and write
|
||
1AA02364000
|
heap
|
page read and write
|
||
1BF4058B000
|
heap
|
page read and write
|
||
7FF8B8F8F000
|
unkown
|
page readonly
|
||
1D6CF7A0000
|
direct allocation
|
page read and write
|
||
7FF8A72C0000
|
unkown
|
page readonly
|
||
7FF8B82B0000
|
unkown
|
page readonly
|
||
7FF8A8395000
|
unkown
|
page read and write
|
||
1D6CE680000
|
direct allocation
|
page read and write
|
||
1D6CE450000
|
direct allocation
|
page read and write
|
||
CB472FF000
|
unkown
|
page read and write
|
||
1D6CBE85000
|
heap
|
page read and write
|
||
7FF8BA24E000
|
unkown
|
page readonly
|
||
1D6CF7A0000
|
direct allocation
|
page read and write
|
||
1D6CBE55000
|
heap
|
page read and write
|
||
1BF40595000
|
heap
|
page read and write
|
||
238F5EA000
|
stack
|
page read and write
|
||
7FF8B9105000
|
unkown
|
page readonly
|
||
1DEED3C1000
|
heap
|
page read and write
|
||
1D6CECF0000
|
direct allocation
|
page read and write
|
||
1D6CDDB8000
|
heap
|
page read and write
|
||
1D6CDDB1000
|
heap
|
page read and write
|
||
1BF40589000
|
heap
|
page read and write
|
||
7FF8A7B17000
|
unkown
|
page read and write
|
||
7FF8A7EF3000
|
unkown
|
page write copy
|
||
7FF8BA4F6000
|
unkown
|
page readonly
|
||
7FF7E71FA000
|
unkown
|
page readonly
|
||
7FF8B9180000
|
unkown
|
page readonly
|
||
1D6CBE36000
|
heap
|
page read and write
|
||
7FF6BD5C1000
|
unkown
|
page execute read
|
||
7FF8A7DBE000
|
unkown
|
page readonly
|
||
7FF8B919D000
|
unkown
|
page readonly
|
||
1BF40588000
|
heap
|
page read and write
|
||
1D6CE208000
|
heap
|
page read and write
|
||
7FF8A7A81000
|
unkown
|
page execute read
|
||
1AA02359000
|
heap
|
page read and write
|
||
1BF40588000
|
heap
|
page read and write
|
||
1DEEB0C6000
|
heap
|
page read and write
|
||
7FF8A731C000
|
unkown
|
page readonly
|
||
1D6CF7A0000
|
direct allocation
|
page read and write
|
||
1BF4058A000
|
heap
|
page read and write
|
||
7FF8A7F0F000
|
unkown
|
page read and write
|
||
1AA0235A000
|
heap
|
page read and write
|
||
1BF4058E000
|
heap
|
page read and write
|
||
1AA02354000
|
heap
|
page read and write
|
||
1D6CF7A0000
|
direct allocation
|
page read and write
|
||
7FF7E720D000
|
unkown
|
page read and write
|
||
1BF4056F000
|
heap
|
page read and write
|
||
7FF8B7804000
|
unkown
|
page readonly
|
||
7FF8B7820000
|
unkown
|
page readonly
|
||
1D6CD720000
|
direct allocation
|
page read and write
|
||
1D6CEC30000
|
direct allocation
|
page read and write
|
||
7FF8A7F61000
|
unkown
|
page execute read
|
||
1D6CE793000
|
heap
|
page read and write
|
||
7FF8BA254000
|
unkown
|
page readonly
|
||
1AA02367000
|
heap
|
page read and write
|
||
7FF8A770D000
|
unkown
|
page readonly
|
||
1DEEE210000
|
direct allocation
|
page read and write
|
||
1BF40588000
|
heap
|
page read and write
|
||
1D6CBE91000
|
heap
|
page read and write
|
||
1A61DAEA000
|
heap
|
page read and write
|
||
1DEEE1D0000
|
direct allocation
|
page read and write
|
||
1AA02362000
|
heap
|
page read and write
|
||
1AA02362000
|
heap
|
page read and write
|
||
1BF4058A000
|
heap
|
page read and write
|
||
1D6CE6C0000
|
heap
|
page read and write
|
||
1D6CF7A0000
|
direct allocation
|
page read and write
|
||
7FF8A73C9000
|
unkown
|
page read and write
|
||
7FF6BD5EA000
|
unkown
|
page readonly
|
||
1D6CF7A0000
|
direct allocation
|
page read and write
|
||
7FF8BA4F9000
|
unkown
|
page readonly
|
||
1BF40588000
|
heap
|
page read and write
|
||
1D6CBE36000
|
heap
|
page read and write
|
||
1D6CBE86000
|
heap
|
page read and write
|
||
1AA0235A000
|
heap
|
page read and write
|
||
1D6CE0FA000
|
heap
|
page read and write
|
||
1DEEB057000
|
heap
|
page read and write
|
||
7FF7E721E000
|
unkown
|
page readonly
|
||
1DEECC50000
|
direct allocation
|
page read and write
|
||
1DEEB054000
|
heap
|
page read and write
|
||
1BF40590000
|
heap
|
page read and write
|
||
1DEEB075000
|
heap
|
page read and write
|
||
1DEED42A000
|
heap
|
page read and write
|
||
1DEED940000
|
direct allocation
|
page read and write
|
||
1DEEB099000
|
heap
|
page read and write
|
||
1AA022F0000
|
heap
|
page readonly
|
||
1BF40588000
|
heap
|
page read and write
|
||
1BF40588000
|
heap
|
page read and write
|
||
1BF40588000
|
heap
|
page read and write
|
||
1DEEB067000
|
heap
|
page read and write
|
||
1DEEAFED000
|
heap
|
page read and write
|
||
1C8023C0000
|
heap
|
page read and write
|
||
1BF40595000
|
heap
|
page read and write
|
||
1D6CBE9B000
|
heap
|
page read and write
|
||
1AA0235F000
|
heap
|
page read and write
|
||
1D6CED30000
|
direct allocation
|
page read and write
|
||
1AA02362000
|
heap
|
page read and write
|
||
1DEED880000
|
direct allocation
|
page read and write
|
||
1D6CBE5B000
|
heap
|
page read and write
|
||
1AA02354000
|
heap
|
page read and write
|
||
1BF40593000
|
heap
|
page read and write
|
||
1DEED091000
|
heap
|
page read and write
|
||
1D6CBEBA000
|
heap
|
page read and write
|
||
1D6CEAC0000
|
direct allocation
|
page read and write
|
||
1D6CBD10000
|
heap
|
page read and write
|
||
7FF8A8A06000
|
unkown
|
page readonly
|
||
1D6CE80F000
|
heap
|
page read and write
|
||
1AA0235D000
|
heap
|
page read and write
|
||
1AA02364000
|
heap
|
page read and write
|
||
1AA02354000
|
heap
|
page read and write
|
||
1BF40595000
|
heap
|
page read and write
|
||
1AA02363000
|
heap
|
page read and write
|
||
7FF8B90F6000
|
unkown
|
page readonly
|
||
1AA0235A000
|
heap
|
page read and write
|
||
1DEEB0B6000
|
heap
|
page read and write
|
||
7FF8B9109000
|
unkown
|
page read and write
|
||
1AA0235F000
|
heap
|
page read and write
|
||
1BF40595000
|
heap
|
page read and write
|
||
7FF8B780E000
|
unkown
|
page readonly
|
||
1AA02355000
|
heap
|
page read and write
|
||
1AA02361000
|
heap
|
page read and write
|
||
1DEEDC94000
|
heap
|
page read and write
|
||
7FF8B9F69000
|
unkown
|
page readonly
|
||
1DEEB067000
|
heap
|
page read and write
|
||
7FF8B78B9000
|
unkown
|
page readonly
|
||
1A61DD20000
|
heap
|
page read and write
|
||
1BF40588000
|
heap
|
page read and write
|
||
1DEEB075000
|
heap
|
page read and write
|
||
1AA0235A000
|
heap
|
page read and write
|
||
1D6CF7A0000
|
direct allocation
|
page read and write
|
||
1AA02354000
|
heap
|
page read and write
|
||
1AA02354000
|
heap
|
page read and write
|
||
1BF40595000
|
heap
|
page read and write
|
||
1DEEDEF0000
|
direct allocation
|
page read and write
|
||
1DEEDC79000
|
heap
|
page read and write
|
||
1AA02362000
|
heap
|
page read and write
|
||
7FF7E71D1000
|
unkown
|
page execute read
|
||
7FF7E71FA000
|
unkown
|
page readonly
|
||
1D6CE410000
|
direct allocation
|
page read and write
|
||
1BF40588000
|
heap
|
page read and write
|
||
1D6CBE85000
|
heap
|
page read and write
|
||
7FF8A7435000
|
unkown
|
page execute read
|
||
7FF8A810A000
|
unkown
|
page execute read
|
||
1D6CBE3E000
|
heap
|
page read and write
|
||
7FF8B8250000
|
unkown
|
page readonly
|
||
1BF4058C000
|
heap
|
page read and write
|
||
1D6CDDD5000
|
heap
|
page read and write
|
||
1BF4058B000
|
heap
|
page read and write
|
||
1DEEE210000
|
direct allocation
|
page read and write
|
||
7FF8B7843000
|
unkown
|
page read and write
|
||
1D6CE2D0000
|
direct allocation
|
page read and write
|
||
7FF6BD60E000
|
unkown
|
page readonly
|
||
7FF8B8291000
|
unkown
|
page execute read
|
||
1D6CBE9C000
|
heap
|
page read and write
|
||
1BF40588000
|
heap
|
page read and write
|
||
1D6CBE3F000
|
heap
|
page read and write
|
||
1BF40595000
|
heap
|
page read and write
|
||
7FF8B90BC000
|
unkown
|
page read and write
|
||
1D6CD6A0000
|
direct allocation
|
page read and write
|
||
1AA02359000
|
heap
|
page read and write
|
||
7FF8B78C1000
|
unkown
|
page read and write
|
||
7FF8A836E000
|
unkown
|
page readonly
|
||
1BF40586000
|
heap
|
page read and write
|
||
1BF40588000
|
heap
|
page read and write
|
||
7FF8A9364000
|
unkown
|
page readonly
|
||
1DEEB057000
|
heap
|
page read and write
|
||
7FF8B8261000
|
unkown
|
page execute read
|
||
1AA0235B000
|
heap
|
page read and write
|
||
1DEEE0C0000
|
direct allocation
|
page read and write
|
||
1C802340000
|
heap
|
page read and write
|
||
1AA022E0000
|
heap
|
page read and write
|
||
7FF8B8799000
|
unkown
|
page read and write
|
||
51655AC000
|
stack
|
page read and write
|
||
1AA02364000
|
heap
|
page read and write
|
||
5164FDE000
|
stack
|
page read and write
|
||
1D6CBE91000
|
heap
|
page read and write
|
||
1AA02368000
|
heap
|
page read and write
|
||
1DEEB057000
|
heap
|
page read and write
|
||
1D6CEA9D000
|
heap
|
page read and write
|
||
1DEEB051000
|
heap
|
page read and write
|
||
1D6CDF30000
|
direct allocation
|
page read and write
|
||
1D6CE070000
|
direct allocation
|
page read and write
|
||
1BF40595000
|
heap
|
page read and write
|
||
1D6CF7A0000
|
direct allocation
|
page read and write
|
||
1AA02368000
|
heap
|
page read and write
|
||
1DEED250000
|
direct allocation
|
page read and write
|
||
1BF40588000
|
heap
|
page read and write
|
||
7FF8B90F0000
|
unkown
|
page readonly
|
||
7FF8A92F1000
|
unkown
|
page execute read
|
||
1D6CDF90000
|
direct allocation
|
page read and write
|
||
1AA0235A000
|
heap
|
page read and write
|
||
1DEEB057000
|
heap
|
page read and write
|
||
1DEEB0D0000
|
heap
|
page read and write
|
||
1D6CE030000
|
direct allocation
|
page read and write
|
||
7FF8A76EB000
|
unkown
|
page read and write
|
||
1D6CBE62000
|
heap
|
page read and write
|
||
7FF8B8F80000
|
unkown
|
page readonly
|
||
7FF8B879A000
|
unkown
|
page readonly
|
||
1DEED650000
|
direct allocation
|
page read and write
|
||
1DEED190000
|
direct allocation
|
page read and write
|
||
1DEED165000
|
heap
|
page read and write
|
||
1D6CBE38000
|
heap
|
page read and write
|
||
7FF8B782D000
|
unkown
|
page readonly
|
||
7FF8B9150000
|
unkown
|
page readonly
|
||
1BF40599000
|
heap
|
page read and write
|
||
1AA0235B000
|
heap
|
page read and write
|
||
1BF40595000
|
heap
|
page read and write
|
||
1D6CBE90000
|
heap
|
page read and write
|
||
1AA0235A000
|
heap
|
page read and write
|
||
1AA02359000
|
heap
|
page read and write
|
||
7FF6BD5FD000
|
unkown
|
page read and write
|
||
1D6CEDB0000
|
direct allocation
|
page read and write
|
||
7FF8B8B05000
|
unkown
|
page readonly
|
||
1AA02362000
|
heap
|
page read and write
|
||
1D6CBE3B000
|
heap
|
page read and write
|
||
1DEED44E000
|
heap
|
page read and write
|
||
1BF40560000
|
heap
|
page read and write
|
||
1DEEDFF0000
|
direct allocation
|
page read and write
|
||
7FF8B8251000
|
unkown
|
page execute read
|
||
1BF40595000
|
heap
|
page read and write
|
||
1A61DD15000
|
heap
|
page read and write
|
||
1AA02355000
|
heap
|
page read and write
|
||
1AA02354000
|
heap
|
page read and write
|
||
1D6CBD40000
|
heap
|
page read and write
|
||
1BF4059A000
|
heap
|
page read and write
|
||
7FF8A811D000
|
unkown
|
page execute read
|
||
1D6CEC30000
|
direct allocation
|
page read and write
|
||
1D6CE7F9000
|
heap
|
page read and write
|
||
1BF40588000
|
heap
|
page read and write
|
||
1AA02354000
|
heap
|
page read and write
|
||
1DEEB099000
|
heap
|
page read and write
|
||
1D6CEA61000
|
heap
|
page read and write
|
||
1D6CBE33000
|
heap
|
page read and write
|
||
1D6CBE85000
|
heap
|
page read and write
|
||
1D6CF7A0000
|
direct allocation
|
page read and write
|
||
7FF7E71D0000
|
unkown
|
page readonly
|
||
1C802310000
|
heap
|
page read and write
|
||
1AA02364000
|
heap
|
page read and write
|
||
7FF8A8B09000
|
unkown
|
page read and write
|
||
1D6CF7A0000
|
direct allocation
|
page read and write
|
||
1DEED2F0000
|
direct allocation
|
page read and write
|
||
7FF8A80E5000
|
unkown
|
page execute read
|
||
1D6CBE5A000
|
heap
|
page read and write
|
||
7FF8B78A0000
|
unkown
|
page readonly
|
||
51653BF000
|
stack
|
page read and write
|
||
1BF40595000
|
heap
|
page read and write
|
||
1AA0235B000
|
heap
|
page read and write
|
||
7FF8B8F72000
|
unkown
|
page readonly
|
||
7FF8A7370000
|
unkown
|
page readonly
|
||
CB473FF000
|
stack
|
page read and write
|
||
7FF8A76E5000
|
unkown
|
page read and write
|
||
5164DD7000
|
stack
|
page read and write
|
||
7FF6BD5FD000
|
unkown
|
page read and write
|
||
1BF40588000
|
heap
|
page read and write
|
||
1D6CEA4B000
|
heap
|
page read and write
|
||
1BF40588000
|
heap
|
page read and write
|
||
1D6CE6DF000
|
heap
|
page read and write
|
||
1D6CEC30000
|
direct allocation
|
page read and write
|
||
1D6CBE3E000
|
heap
|
page read and write
|
||
1D6CE310000
|
direct allocation
|
page read and write
|
||
1DEED569000
|
heap
|
page read and write
|
||
1D6CE4E0000
|
direct allocation
|
page read and write
|
||
1BF40588000
|
heap
|
page read and write
|
||
1D6CE580000
|
direct allocation
|
page read and write
|
||
1BF40590000
|
heap
|
page read and write
|
||
1DEEB0B4000
|
heap
|
page read and write
|
||
1C8023D0000
|
heap
|
page read and write
|
||
7FF8BA521000
|
unkown
|
page execute read
|
||
1D6CBE7E000
|
heap
|
page read and write
|
||
1AA02363000
|
heap
|
page read and write
|
||
1D6CE0C0000
|
heap
|
page read and write
|
||
1DEEB054000
|
heap
|
page read and write
|
||
1BF40595000
|
heap
|
page read and write
|
||
7FF8B9181000
|
unkown
|
page execute read
|
||
1BF404F0000
|
heap
|
page readonly
|
||
1DEED9C0000
|
heap
|
page read and write
|
||
28FF3530000
|
heap
|
page read and write
|
||
1BF4059A000
|
heap
|
page read and write
|
||
7FF7E71D0000
|
unkown
|
page readonly
|
||
1D6CEE90000
|
direct allocation
|
page read and write
|
||
1DEEC900000
|
heap
|
page read and write
|
||
1A61DAE0000
|
heap
|
page read and write
|
||
1D6CF750000
|
direct allocation
|
page read and write
|
||
1DEED710000
|
direct allocation
|
page read and write
|
||
7FF8A73D1000
|
unkown
|
page execute read
|
||
7FF8BA525000
|
unkown
|
page readonly
|
||
7FF8B9F73000
|
unkown
|
page readonly
|
||
1BF40588000
|
heap
|
page read and write
|
||
1AA02365000
|
heap
|
page read and write
|
||
1DEED090000
|
heap
|
page read and write
|
||
7FF8BFB21000
|
unkown
|
page execute read
|
||
1D6CBE4B000
|
heap
|
page read and write
|
||
1AA02356000
|
heap
|
page read and write
|
||
7FF8A9387000
|
unkown
|
page read and write
|
||
7FF8BA529000
|
unkown
|
page read and write
|
||
7FF8B90E2000
|
unkown
|
page readonly
|
||
7FF8A76ED000
|
unkown
|
page readonly
|
||
7FF6BD60C000
|
unkown
|
page read and write
|
||
1D6CDDB7000
|
heap
|
page read and write
|
||
C00BAC000
|
stack
|
page read and write
|
||
1BF40588000
|
heap
|
page read and write
|
||
1DEEB054000
|
heap
|
page read and write
|
||
1D6CE5C0000
|
direct allocation
|
page read and write
|
||
46D60FF000
|
unkown
|
page read and write
|
||
7FF8BA502000
|
unkown
|
page readonly
|
||
1D6CEA1F000
|
heap
|
page read and write
|
||
1D6CF7A0000
|
direct allocation
|
page read and write
|
||
7FF8B9169000
|
unkown
|
page readonly
|
||
7FF8B8256000
|
unkown
|
page readonly
|
||
1AA02363000
|
heap
|
page read and write
|
||
1BF4058B000
|
heap
|
page read and write
|
||
1BF40595000
|
heap
|
page read and write
|
||
1BF40588000
|
heap
|
page read and write
|
||
1D6CF7A0000
|
direct allocation
|
page read and write
|
||
1D6CEE00000
|
direct allocation
|
page read and write
|
||
7FF8B9140000
|
unkown
|
page readonly
|
||
1DEEE210000
|
direct allocation
|
page read and write
|
||
7FF8B82CD000
|
unkown
|
page readonly
|
||
1AA02354000
|
heap
|
page read and write
|
||
1D6CF7A0000
|
direct allocation
|
page read and write
|
||
7FF8A7617000
|
unkown
|
page readonly
|
||
7FF8B90D5000
|
unkown
|
page readonly
|
||
1DEEDB8C000
|
heap
|
page read and write
|
||
1D6CEC30000
|
direct allocation
|
page read and write
|
||
1AA02364000
|
heap
|
page read and write
|
||
1AA02362000
|
heap
|
page read and write
|
||
7FF8B82C9000
|
unkown
|
page read and write
|
||
C009BF000
|
stack
|
page read and write
|
||
1AA0235B000
|
heap
|
page read and write
|
||
1AA02354000
|
heap
|
page read and write
|
||
1DEEB03E000
|
heap
|
page read and write
|
||
1AA02359000
|
heap
|
page read and write
|
||
1AA02330000
|
heap
|
page read and write
|
||
7FF8B90F5000
|
unkown
|
page read and write
|
||
1D6CBEAE000
|
heap
|
page read and write
|
||
1BF40588000
|
heap
|
page read and write
|
||
1BF40594000
|
heap
|
page read and write
|
||
7FF8B9F71000
|
unkown
|
page read and write
|
||
1DEEB057000
|
heap
|
page read and write
|
||
1BF40595000
|
heap
|
page read and write
|
||
1D6CF7A0000
|
direct allocation
|
page read and write
|
||
7FF8A9362000
|
unkown
|
page execute read
|
||
1DEEB043000
|
heap
|
page read and write
|
||
1BF40590000
|
heap
|
page read and write
|
||
7FF8A8E04000
|
unkown
|
page readonly
|
||
1D6CED70000
|
direct allocation
|
page read and write
|
||
7FF8B9074000
|
unkown
|
page readonly
|
||
1DEED6D0000
|
direct allocation
|
page read and write
|
||
1D6CF7A0000
|
direct allocation
|
page read and write
|
||
1DEED760000
|
direct allocation
|
page read and write
|
||
1BF4058A000
|
heap
|
page read and write
|
||
1D6CBE5B000
|
heap
|
page read and write
|
||
7FF6BD5FD000
|
unkown
|
page write copy
|
||
7FF8A8ED3000
|
unkown
|
page write copy
|
||
1D6CF7A0000
|
direct allocation
|
page read and write
|
||
1D6CBE91000
|
heap
|
page read and write
|
||
1A61DD10000
|
heap
|
page read and write
|
||
1BF40500000
|
heap
|
page read and write
|
||
1D6CBE91000
|
heap
|
page read and write
|
||
7FF8B8260000
|
unkown
|
page readonly
|
||
1D6CBE8B000
|
heap
|
page read and write
|
||
1DEED1D0000
|
direct allocation
|
page read and write
|
||
7FF8B8F70000
|
unkown
|
page readonly
|
||
1AA02359000
|
heap
|
page read and write
|
||
1AA02363000
|
heap
|
page read and write
|
||
1DEEDEB0000
|
direct allocation
|
page read and write
|
||
1AA02356000
|
heap
|
page read and write
|
||
7FF7E71D1000
|
unkown
|
page execute read
|
||
1BF4058E000
|
heap
|
page read and write
|
||
1D6CF7A0000
|
direct allocation
|
page read and write
|
||
1BF40588000
|
heap
|
page read and write
|
||
1AA0235D000
|
heap
|
page read and write
|
||
1DEEDAE1000
|
heap
|
page read and write
|
||
1BF40588000
|
heap
|
page read and write
|
||
7FF8A745A000
|
unkown
|
page execute read
|
||
7FF8A83BD000
|
unkown
|
page readonly
|
||
1D6CF7A0000
|
direct allocation
|
page read and write
|
||
1D6CF7A0000
|
direct allocation
|
page read and write
|
||
7FF8A7D31000
|
unkown
|
page readonly
|
||
1AA02354000
|
heap
|
page read and write
|
||
7FF8B78A2000
|
unkown
|
page readonly
|
||
1D6CEBF0000
|
direct allocation
|
page read and write
|
||
1D6CF7A0000
|
direct allocation
|
page read and write
|
||
1BF40590000
|
heap
|
page read and write
|
||
1D6CE9B5000
|
heap
|
page read and write
|
||
7FF8B8253000
|
unkown
|
page readonly
|
||
1DEEB049000
|
heap
|
page read and write
|
||
46D61FE000
|
stack
|
page read and write
|
||
1DEED840000
|
direct allocation
|
page read and write
|
||
1DEEB0C8000
|
heap
|
page read and write
|
||
1BF40588000
|
heap
|
page read and write
|
||
7FF6BD60C000
|
unkown
|
page read and write
|
||
1DEEDE00000
|
direct allocation
|
page read and write
|
||
7FF8A8D8C000
|
unkown
|
page readonly
|
||
1AA0235D000
|
heap
|
page read and write
|
||
1BF4057F000
|
heap
|
page read and write
|
||
7FF8B90D0000
|
unkown
|
page readonly
|
||
1AA02356000
|
heap
|
page read and write
|
||
1DEEDD72000
|
heap
|
page read and write
|
||
7FF8B78B1000
|
unkown
|
page execute read
|
||
1DEED0B6000
|
heap
|
page read and write
|
||
7FF8B9151000
|
unkown
|
page execute read
|
||
28FF36E0000
|
heap
|
page read and write
|
||
1D6CD660000
|
direct allocation
|
page read and write
|
||
1BF40588000
|
heap
|
page read and write
|
||
7FF8B8255000
|
unkown
|
page read and write
|
||
1DEEB099000
|
heap
|
page read and write
|
||
1DEEB049000
|
heap
|
page read and write
|
||
7FF8A72C6000
|
unkown
|
page readonly
|
||
7FF8A8A01000
|
unkown
|
page execute read
|
||
1DEEE260000
|
direct allocation
|
page read and write
|
||
7FF6BD5EA000
|
unkown
|
page readonly
|
||
7FF8B8835000
|
unkown
|
page read and write
|
||
1D6CBE2C000
|
heap
|
page read and write
|
||
1D6CEED0000
|
heap
|
page read and write
|
||
7FF8B90E1000
|
unkown
|
page execute read
|
||
7FF8B90B0000
|
unkown
|
page readonly
|
||
1AA0235D000
|
heap
|
page read and write
|
||
1DEEC905000
|
heap
|
page read and write
|
||
1BF40594000
|
heap
|
page read and write
|
||
7FF8B8C16000
|
unkown
|
page readonly
|
||
1D6CBE2B000
|
heap
|
page read and write
|
||
1DEEB05D000
|
heap
|
page read and write
|
||
7FF8A8EAB000
|
unkown
|
page read and write
|
||
7FF8A7449000
|
unkown
|
page execute read
|
||
1BF40594000
|
heap
|
page read and write
|
||
1D6CE390000
|
direct allocation
|
page read and write
|
||
7FF8BA500000
|
unkown
|
page readonly
|
||
7FF8A7B31000
|
unkown
|
page execute read
|
||
7FF8B8C11000
|
unkown
|
page execute read
|
||
1AA02359000
|
heap
|
page read and write
|
||
1D6CBE33000
|
heap
|
page read and write
|
||
1AA02356000
|
heap
|
page read and write
|
||
1DEEB049000
|
heap
|
page read and write
|
||
7FF8B90DA000
|
unkown
|
page readonly
|
||
1D6CDEAC000
|
heap
|
page read and write
|
||
8D447EC000
|
stack
|
page read and write
|
||
7FF7E7210000
|
unkown
|
page read and write
|
||
1AA02364000
|
heap
|
page read and write
|
||
1AA02356000
|
heap
|
page read and write
|
||
7FF8B907A000
|
unkown
|
page read and write
|
||
1D6CBDDE000
|
heap
|
page read and write
|
||
1DEED210000
|
direct allocation
|
page read and write
|
||
1D6CEC70000
|
direct allocation
|
page read and write
|
||
1D6CBE5B000
|
heap
|
page read and write
|
||
1DEEB06C000
|
heap
|
page read and write
|
||
7FF8B9060000
|
unkown
|
page readonly
|
||
7FF6BD5C0000
|
unkown
|
page readonly
|
||
1BF4059A000
|
heap
|
page read and write
|
||
1AA02359000
|
heap
|
page read and write
|
||
1D6CF7A0000
|
direct allocation
|
page read and write
|
||
7FF8B912E000
|
unkown
|
page write copy
|
||
7FF8B8AF0000
|
unkown
|
page readonly
|
||
1AA02363000
|
heap
|
page read and write
|
||
1BF40595000
|
heap
|
page read and write
|
||
1DEEB03C000
|
heap
|
page read and write
|
||
7FF8B82E0000
|
unkown
|
page readonly
|
||
28FF3510000
|
heap
|
page read and write
|
||
1AA02359000
|
heap
|
page read and write
|
||
7FF8A7615000
|
unkown
|
page execute read
|
||
7FF8B83DF000
|
unkown
|
page read and write
|
||
1BF40588000
|
heap
|
page read and write
|
||
1DEEE070000
|
direct allocation
|
page read and write
|
||
7FF8B90E0000
|
unkown
|
page readonly
|
||
1BF40588000
|
heap
|
page read and write
|
||
1D6CF7A0000
|
direct allocation
|
page read and write
|
||
28FF351B000
|
heap
|
page read and write
|
||
1DEEE210000
|
direct allocation
|
page read and write
|
||
A7315FF000
|
unkown
|
page read and write
|
||
1D6CDF30000
|
direct allocation
|
page read and write
|
||
1AA02361000
|
heap
|
page read and write
|
||
1D6CBD00000
|
heap
|
page readonly
|
||
7FF8B8790000
|
unkown
|
page readonly
|
||
1D6CF7A0000
|
direct allocation
|
page read and write
|
||
1AA02354000
|
heap
|
page read and write
|
||
1D6CE8C8000
|
heap
|
page read and write
|
||
7FF8A7A80000
|
unkown
|
page readonly
|
||
1BF40590000
|
heap
|
page read and write
|
||
1AA02362000
|
heap
|
page read and write
|
||
1DEECC90000
|
direct allocation
|
page read and write
|
||
7FF8A938C000
|
unkown
|
page readonly
|
||
7FF8B9199000
|
unkown
|
page read and write
|
||
7FF8B910A000
|
unkown
|
page readonly
|
||
7FF8B83E2000
|
unkown
|
page readonly
|
||
1AA0235B000
|
heap
|
page read and write
|
||
1D6CE350000
|
direct allocation
|
page read and write
|
||
28FF34D0000
|
heap
|
page read and write
|
||
1D6CBDC0000
|
heap
|
page read and write
|
||
7FF8B90B1000
|
unkown
|
page execute read
|
||
1BF40595000
|
heap
|
page read and write
|
||
1BF4058B000
|
heap
|
page read and write
|
||
7FF8B8836000
|
unkown
|
page readonly
|
||
1D6CBE81000
|
heap
|
page read and write
|
||
1BF4059A000
|
heap
|
page read and write
|
||
1DEEDBBE000
|
heap
|
page read and write
|
||
1AA03CC0000
|
heap
|
page read and write
|
||
7FF8B912D000
|
unkown
|
page read and write
|
||
1BF40588000
|
heap
|
page read and write
|
||
7FF8B77F0000
|
unkown
|
page readonly
|
||
1AA02359000
|
heap
|
page read and write
|
||
1D6CF7A0000
|
direct allocation
|
page read and write
|
||
1DEEE150000
|
direct allocation
|
page read and write
|
||
1AA02368000
|
heap
|
page read and write
|
||
7FF8A8AB0000
|
unkown
|
page readonly
|
||
7FF8B82A4000
|
unkown
|
page readonly
|
||
1BF40599000
|
heap
|
page read and write
|
||
1BF40410000
|
heap
|
page read and write
|
||
7FF8A82C5000
|
unkown
|
page execute read
|
||
1D6CBC20000
|
heap
|
page read and write
|
||
1BF40590000
|
heap
|
page read and write
|
||
1D6CBE8B000
|
heap
|
page read and write
|
||
7FF8B8795000
|
unkown
|
page readonly
|
||
1DEED7A0000
|
direct allocation
|
page read and write
|
||
7FF6BD5FD000
|
unkown
|
page write copy
|
||
1AA02354000
|
heap
|
page read and write
|
||
CB46F7C000
|
stack
|
page read and write
|
||
7FF8A7B29000
|
unkown
|
page readonly
|
||
7FF8B9F61000
|
unkown
|
page execute read
|
||
1D6CBE91000
|
heap
|
page read and write
|
||
1D6CBE86000
|
heap
|
page read and write
|
||
1D6CF7A0000
|
direct allocation
|
page read and write
|
||
7FF8A73D0000
|
unkown
|
page readonly
|
||
7FF8A9392000
|
unkown
|
page readonly
|
||
7FF8B8C10000
|
unkown
|
page readonly
|
||
1DEEB04B000
|
heap
|
page read and write
|
||
7FF8A808D000
|
unkown
|
page execute read
|
||
1D6CBE55000
|
heap
|
page read and write
|
||
1BF40599000
|
heap
|
page read and write
|
||
1BF40594000
|
heap
|
page read and write
|
||
1DEEB03E000
|
heap
|
page read and write
|
||
1BF40588000
|
heap
|
page read and write
|
||
7FF7E721C000
|
unkown
|
page read and write
|
||
1AA02362000
|
heap
|
page read and write
|
||
1AA0235A000
|
heap
|
page read and write
|
||
1D6CF7A0000
|
direct allocation
|
page read and write
|
||
7FF8A7AF4000
|
unkown
|
page readonly
|
||
1AA02354000
|
heap
|
page read and write
|
||
7FF6BD5EA000
|
unkown
|
page readonly
|
||
1BF40595000
|
heap
|
page read and write
|
||
1AA02356000
|
heap
|
page read and write
|
||
1BF4059A000
|
heap
|
page read and write
|
||
1BF40595000
|
heap
|
page read and write
|
||
1AA02359000
|
heap
|
page read and write
|
||
1BF4058B000
|
heap
|
page read and write
|
||
7FF6BD5C0000
|
unkown
|
page readonly
|
||
7FF8A72C1000
|
unkown
|
page execute read
|
||
1AA02356000
|
heap
|
page read and write
|
||
1AA02356000
|
heap
|
page read and write
|
||
1D6CF7A0000
|
direct allocation
|
page read and write
|
||
1DEEDF70000
|
direct allocation
|
page read and write
|
||
1DEED330000
|
direct allocation
|
page read and write
|
||
1D6CBE36000
|
heap
|
page read and write
|
||
1BF40588000
|
heap
|
page read and write
|
||
7FF8A8D11000
|
unkown
|
page readonly
|
||
1D6CBE25000
|
heap
|
page read and write
|
||
1AA02364000
|
heap
|
page read and write
|
||
7FF8B77F1000
|
unkown
|
page execute read
|
||
1D6CBE9F000
|
heap
|
page read and write
|
||
1AA02356000
|
heap
|
page read and write
|
||
1D6CBE85000
|
heap
|
page read and write
|
||
7FF8A8A5C000
|
unkown
|
page readonly
|
||
1AA02356000
|
heap
|
page read and write
|
||
1D6CF7A0000
|
direct allocation
|
page read and write
|
||
7FF8B78A4000
|
unkown
|
page readonly
|
||
1AA02364000
|
heap
|
page read and write
|
||
1DEEDD4A000
|
heap
|
page read and write
|
||
1D6CBE2B000
|
heap
|
page read and write
|
||
1DEEB07C000
|
heap
|
page read and write
|
||
28FF37E0000
|
heap
|
page read and write
|
||
1AA02363000
|
heap
|
page read and write
|
||
1AA02363000
|
heap
|
page read and write
|
||
1BF40530000
|
heap
|
page read and write
|
||
1BF40595000
|
heap
|
page read and write
|
||
1D6CDF30000
|
direct allocation
|
page read and write
|
||
1BF40588000
|
heap
|
page read and write
|
||
1D6CF7A0000
|
direct allocation
|
page read and write
|
||
7FF8B783E000
|
unkown
|
page write copy
|
||
1DEEB041000
|
heap
|
page read and write
|
||
7FF8B90D1000
|
unkown
|
page execute read
|
||
1AA0235B000
|
heap
|
page read and write
|
||
1DEEB051000
|
heap
|
page read and write
|
||
1DEEDD86000
|
heap
|
page read and write
|
||
7FF7E721E000
|
unkown
|
page readonly
|
||
1AA02356000
|
heap
|
page read and write
|
||
1BF40595000
|
heap
|
page read and write
|
||
1DEEB0C8000
|
heap
|
page read and write
|
||
7FF8B8F87000
|
unkown
|
page readonly
|
||
1BF40588000
|
heap
|
page read and write
|
||
1D6CEA82000
|
heap
|
page read and write
|
||
7FF8B8830000
|
unkown
|
page readonly
|
||
1DEEB043000
|
heap
|
page read and write
|
||
1A61DB12000
|
heap
|
page read and write
|
||
1DEED900000
|
direct allocation
|
page read and write
|
||
1AA02355000
|
heap
|
page read and write
|
||
1D6CF7A0000
|
direct allocation
|
page read and write
|
||
7FF8B8B04000
|
unkown
|
page read and write
|
||
1D6CE96B000
|
heap
|
page read and write
|
||
7FF7E71FA000
|
unkown
|
page readonly
|
||
7FF6BD5C0000
|
unkown
|
page readonly
|
||
1BF40588000
|
heap
|
page read and write
|
||
1BF40588000
|
heap
|
page read and write
|
||
1D6CF7A0000
|
direct allocation
|
page read and write
|
||
7FF8B82C2000
|
unkown
|
page readonly
|
||
7FF8A7E00000
|
unkown
|
page readonly
|
||
7FF7E721E000
|
unkown
|
page readonly
|
||
1D6CBE4A000
|
heap
|
page read and write
|
||
238F5E3000
|
stack
|
page read and write
|
||
1DEED590000
|
direct allocation
|
page read and write
|
||
7FF8A8B05000
|
unkown
|
page readonly
|
||
1BF4059A000
|
heap
|
page read and write
|
||
1C802320000
|
heap
|
page read and write
|
||
1D6CE530000
|
direct allocation
|
page read and write
|
||
1D6CEA29000
|
heap
|
page read and write
|
||
1D6CE640000
|
direct allocation
|
page read and write
|
||
1DEEB098000
|
heap
|
page read and write
|
||
1AA0235F000
|
heap
|
page read and write
|
||
1BF4058A000
|
heap
|
page read and write
|
||
1D6CF7A0000
|
direct allocation
|
page read and write
|
||
1D6CBE55000
|
heap
|
page read and write
|
||
7FF6BD60E000
|
unkown
|
page readonly
|
||
1BF4058B000
|
heap
|
page read and write
|
||
1D6CDEB0000
|
direct allocation
|
page read and write
|
||
1DEEE210000
|
direct allocation
|
page read and write
|
||
7FF8B78A1000
|
unkown
|
page execute read
|
||
1BF40595000
|
heap
|
page read and write
|
||
1D6CF7A0000
|
direct allocation
|
page read and write
|
||
7FF8B90B7000
|
unkown
|
page readonly
|
||
7FF6BD5C0000
|
unkown
|
page readonly
|
||
1BF4058B000
|
heap
|
page read and write
|
||
1DEED44E000
|
heap
|
page read and write
|
||
1AA02359000
|
heap
|
page read and write
|
||
1A61DA90000
|
heap
|
page read and write
|
||
1AA02362000
|
heap
|
page read and write
|
||
1AA02364000
|
heap
|
page read and write
|
||
7FF8A7642000
|
unkown
|
page readonly
|
||
1D6CBE91000
|
heap
|
page read and write
|
||
1BF40599000
|
heap
|
page read and write
|
||
1DEED7F0000
|
direct allocation
|
page read and write
|
||
7FF6BD5C1000
|
unkown
|
page execute read
|
||
1BF40595000
|
heap
|
page read and write
|
||
7FF8A76BE000
|
unkown
|
page readonly
|
||
1BF40588000
|
heap
|
page read and write
|
||
1DEEB098000
|
heap
|
page read and write
|
||
1AA02354000
|
heap
|
page read and write
|
||
1D6CEC30000
|
direct allocation
|
page read and write
|
||
1AA02359000
|
heap
|
page read and write
|
||
1BF4058A000
|
heap
|
page read and write
|
||
1D6CE600000
|
direct allocation
|
page read and write
|
||
1AA0235B000
|
heap
|
page read and write
|
||
1AA02361000
|
heap
|
page read and write
|
||
7FF8A7699000
|
unkown
|
page readonly
|
||
1AA02354000
|
heap
|
page read and write
|
||
1BF40594000
|
heap
|
page read and write
|
||
A7316FE000
|
stack
|
page read and write
|
||
1AA02356000
|
heap
|
page read and write
|
||
1D6CE103000
|
heap
|
page read and write
|
||
1D6CF7A0000
|
direct allocation
|
page read and write
|
||
1DEEB0A5000
|
heap
|
page read and write
|
||
1DEEB049000
|
heap
|
page read and write
|
||
1DEEB054000
|
heap
|
page read and write
|
||
7FF8A7367000
|
unkown
|
page readonly
|
||
1BF40588000
|
heap
|
page read and write
|
||
1BF40594000
|
heap
|
page read and write
|
||
7FF8B8C19000
|
unkown
|
page readonly
|
||
1DEEAFD0000
|
heap
|
page read and write
|
||
1D6CEB40000
|
direct allocation
|
page read and write
|
||
7FF8B9192000
|
unkown
|
page readonly
|
||
1DEED2B0000
|
direct allocation
|
page read and write
|
||
1AA02354000
|
heap
|
page read and write
|
||
1DEEDDC0000
|
direct allocation
|
page read and write
|
||
1DEEE2A0000
|
direct allocation
|
page read and write
|
||
7FF8A8DE0000
|
unkown
|
page readonly
|
||
1D6CF7A0000
|
direct allocation
|
page read and write
|
||
1AA02354000
|
heap
|
page read and write
|
||
1DEED091000
|
heap
|
page read and write
|
||
1AA02361000
|
heap
|
page read and write
|
||
1AA02366000
|
heap
|
page read and write
|
||
1DEEE190000
|
direct allocation
|
page read and write
|
||
7FF8A8062000
|
unkown
|
page readonly
|
||
1D6CEDB0000
|
direct allocation
|
page read and write
|
||
1DEEB051000
|
heap
|
page read and write
|
||
1D6CECB0000
|
direct allocation
|
page read and write
|
||
1BF40588000
|
heap
|
page read and write
|
||
1D6CBE5B000
|
heap
|
page read and write
|
||
1AA02355000
|
heap
|
page read and write
|
||
1D6CF7A0000
|
direct allocation
|
page read and write
|
||
7FF8A7B1C000
|
unkown
|
page readonly
|
||
1D6CBE5B000
|
heap
|
page read and write
|
||
1AA0235B000
|
heap
|
page read and write
|
||
1AA02354000
|
heap
|
page read and write
|
||
7FF8B9176000
|
unkown
|
page readonly
|
||
7FF8B9111000
|
unkown
|
page execute read
|
||
1AA02361000
|
heap
|
page read and write
|
||
1D6CBE9B000
|
heap
|
page read and write
|
||
1AA02358000
|
heap
|
page read and write
|
||
1AA02354000
|
heap
|
page read and write
|
||
7FF8A8B10000
|
unkown
|
page readonly
|
||
1D6CEC30000
|
direct allocation
|
page read and write
|
||
1DEEB06C000
|
heap
|
page read and write
|
||
1AA0235B000
|
heap
|
page read and write
|
||
1DEECE90000
|
direct allocation
|
page read and write
|
||
1BF40588000
|
heap
|
page read and write
|
||
1D6CD760000
|
direct allocation
|
page read and write
|
||
1D6CBE9B000
|
heap
|
page read and write
|
||
7FF8B9110000
|
unkown
|
page readonly
|
||
1DEEE030000
|
direct allocation
|
page read and write
|
||
7FF6BD5C1000
|
unkown
|
page execute read
|
||
1BF40595000
|
heap
|
page read and write
|
||
1D6CF7A0000
|
direct allocation
|
page read and write
|
||
1DEEDFB0000
|
direct allocation
|
page read and write
|
||
1BF40588000
|
heap
|
page read and write
|
||
7FF8B783D000
|
unkown
|
page read and write
|
||
1D6CF750000
|
direct allocation
|
page read and write
|
||
7FF8B827D000
|
unkown
|
page readonly
|
||
1BF40588000
|
heap
|
page read and write
|
||
1D6CBE9B000
|
heap
|
page read and write
|
||
1DEED394000
|
heap
|
page read and write
|
||
1BF40588000
|
heap
|
page read and write
|
||
7FF7E71FA000
|
unkown
|
page readonly
|
||
1D6CBE9F000
|
heap
|
page read and write
|
||
1D6CBE91000
|
heap
|
page read and write
|
||
7FF8A8024000
|
unkown
|
page readonly
|
||
7FF8A73DD000
|
unkown
|
page execute read
|
||
7FF8B8791000
|
unkown
|
page execute read
|
||
1AA0235B000
|
heap
|
page read and write
|
||
1DEEB04B000
|
heap
|
page read and write
|
||
7FF7E71D1000
|
unkown
|
page execute read
|
||
1DEEE210000
|
direct allocation
|
page read and write
|
||
1AA02356000
|
heap
|
page read and write
|
||
7FF8A7673000
|
unkown
|
page readonly
|
||
1AA02354000
|
heap
|
page read and write
|
||
7FF8BA4F1000
|
unkown
|
page execute read
|
||
1AA02364000
|
heap
|
page read and write
|
||
7FF8B90D9000
|
unkown
|
page read and write
|
||
1D6CF7A0000
|
direct allocation
|
page read and write
|
||
1DEEDE40000
|
direct allocation
|
page read and write
|
||
7FF8BA4F0000
|
unkown
|
page readonly
|
||
1AA02300000
|
heap
|
page read and write
|
||
1BF4058A000
|
heap
|
page read and write
|
||
1BF40595000
|
heap
|
page read and write
|
||
1BF4058A000
|
heap
|
page read and write
|
||
1DEED3B0000
|
heap
|
page read and write
|
||
1DEED4CE000
|
heap
|
page read and write
|
||
1AA0235F000
|
heap
|
page read and write
|
||
1D6CF7A0000
|
direct allocation
|
page read and write
|
||
7FF8B9134000
|
unkown
|
page readonly
|
||
1AA02364000
|
heap
|
page read and write
|
||
1BF40595000
|
heap
|
page read and write
|
||
1BF40591000
|
heap
|
page read and write
|
||
1AA02361000
|
heap
|
page read and write
|
||
7FF7E71D1000
|
unkown
|
page execute read
|
||
1AA02361000
|
heap
|
page read and write
|
||
C003D6000
|
stack
|
page read and write
|
||
1D6CD7A0000
|
direct allocation
|
page read and write
|
||
1DEEAEE0000
|
heap
|
page read and write
|
||
1DEEB098000
|
heap
|
page read and write
|
||
1DEED0A5000
|
heap
|
page read and write
|
||
7FF8A839B000
|
unkown
|
page read and write
|
||
7FF8A7AF2000
|
unkown
|
page execute read
|
||
7FF7E720D000
|
unkown
|
page write copy
|
||
1D6CF7A0000
|
direct allocation
|
page read and write
|
||
1BF4058B000
|
heap
|
page read and write
|
||
1AA02338000
|
heap
|
page read and write
|
||
7FF8B82B1000
|
unkown
|
page execute read
|
||
7FF8BA240000
|
unkown
|
page readonly
|
||
1BF40595000
|
heap
|
page read and write
|
||
7FF8B8285000
|
unkown
|
page read and write
|
||
8D447EA000
|
stack
|
page read and write
|
||
1D6CE86A000
|
heap
|
page read and write
|
||
1DEED610000
|
direct allocation
|
page read and write
|
||
7FF8A8349000
|
unkown
|
page readonly
|
||
7FF8A8B11000
|
unkown
|
page execute read
|
||
1DEED179000
|
heap
|
page read and write
|
||
7FF8B9061000
|
unkown
|
page execute read
|
||
1AA02356000
|
heap
|
page read and write
|
||
1BF40588000
|
heap
|
page read and write
|
||
1DEED401000
|
heap
|
page read and write
|
||
7FF8A7F0A000
|
unkown
|
page read and write
|
||
A7314FC000
|
stack
|
page read and write
|
||
1AA02354000
|
heap
|
page read and write
|
||
1BF40595000
|
heap
|
page read and write
|
||
1DEED0DF000
|
heap
|
page read and write
|
||
7FF8B82A3000
|
unkown
|
page read and write
|
||
1D6CF7A0000
|
direct allocation
|
page read and write
|
||
1D6CBE5B000
|
heap
|
page read and write
|
||
1AA0235D000
|
heap
|
page read and write
|
||
1BF40588000
|
heap
|
page read and write
|
||
1D6CDDB1000
|
heap
|
page read and write
|
||
1AA0235F000
|
heap
|
page read and write
|
||
1DEEB06C000
|
heap
|
page read and write
|
||
7FF6BD600000
|
unkown
|
page read and write
|
||
1D6CBE86000
|
heap
|
page read and write
|
||
7FF8B9175000
|
unkown
|
page read and write
|
||
1BF40588000
|
heap
|
page read and write
|
||
7FF8B907E000
|
unkown
|
page readonly
|
||
1BF40594000
|
heap
|
page read and write
|
||
1D6CBE2B000
|
heap
|
page read and write
|
||
1BF4059A000
|
heap
|
page read and write
|
||
1DEEB06C000
|
heap
|
page read and write
|
||
1DEEDEB0000
|
direct allocation
|
page read and write
|
||
1D6CF7A0000
|
direct allocation
|
page read and write
|
||
1DEEB054000
|
heap
|
page read and write
|
||
1D6CBE86000
|
heap
|
page read and write
|
||
1AA02362000
|
heap
|
page read and write
|
||
1DEEAFC0000
|
heap
|
page readonly
|
||
7FF8A8EEF000
|
unkown
|
page read and write
|
||
1C802390000
|
heap
|
page read and write
|
||
7FF8A7F60000
|
unkown
|
page readonly
|
||
1BF40588000
|
heap
|
page read and write
|
||
1AA02362000
|
heap
|
page read and write
|
||
1DEED390000
|
heap
|
page read and write
|
||
7FF8B9F60000
|
unkown
|
page readonly
|
||
1AA02354000
|
heap
|
page read and write
|
||
46D5DFC000
|
stack
|
page read and write
|
||
7FF8BA52A000
|
unkown
|
page readonly
|
||
7FF8A839D000
|
unkown
|
page readonly
|
||
1AA0235B000
|
heap
|
page read and write
|
||
1BF4058B000
|
heap
|
page read and write
|
||
1BF4058E000
|
heap
|
page read and write
|
||
1D6CF7A0000
|
direct allocation
|
page read and write
|
||
C003EC000
|
stack
|
page read and write
|
||
1C8023D1000
|
heap
|
page read and write
|
||
1DEEB0B4000
|
heap
|
page read and write
|
||
1BF40594000
|
heap
|
page read and write
|
||
1AA02356000
|
heap
|
page read and write
|
||
1AA02354000
|
heap
|
page read and write
|
||
1AA02361000
|
heap
|
page read and write
|
||
1BF40588000
|
heap
|
page read and write
|
||
1AA02354000
|
heap
|
page read and write
|
||
1BF40590000
|
heap
|
page read and write
|
||
7FF8A8B0B000
|
unkown
|
page readonly
|
||
7FF8B8F81000
|
unkown
|
page execute read
|
||
7FF8B8B07000
|
unkown
|
page readonly
|
||
1D6CD825000
|
heap
|
page read and write
|
||
1D6CBE65000
|
heap
|
page read and write
|
||
1AA02356000
|
heap
|
page read and write
|
||
1D6CEE40000
|
direct allocation
|
page read and write
|
||
1AA02362000
|
heap
|
page read and write
|
||
7FF7E721E000
|
unkown
|
page readonly
|
||
7FF8B9143000
|
unkown
|
page readonly
|
||
7FF8B8279000
|
unkown
|
page readonly
|
||
7FF8A8081000
|
unkown
|
page execute read
|
||
1D6CDDB0000
|
heap
|
page read and write
|
||
7FF7E71D0000
|
unkown
|
page readonly
|
||
1D6CBE40000
|
heap
|
page read and write
|
||
1D6CBE36000
|
heap
|
page read and write
|
||
1BF40595000
|
heap
|
page read and write
|
||
1D6CBE85000
|
heap
|
page read and write
|
||
1BF40568000
|
heap
|
page read and write
|
||
1D6CDEF0000
|
direct allocation
|
page read and write
|
||
7FF7E71D0000
|
unkown
|
page readonly
|
||
1DEEB0B8000
|
heap
|
page read and write
|
||
1AA02354000
|
heap
|
page read and write
|
||
1BF4058B000
|
heap
|
page read and write
|
||
1BF41F10000
|
heap
|
page read and write
|
||
1BF4058E000
|
heap
|
page read and write
|
||
1D6CBE3B000
|
heap
|
page read and write
|
||
7FF8B8B00000
|
unkown
|
page readonly
|
||
1D6CD7E0000
|
direct allocation
|
page read and write
|
||
1C802570000
|
heap
|
page read and write
|
||
1AA02364000
|
heap
|
page read and write
|
||
7FF8B8831000
|
unkown
|
page execute read
|
||
1D6CF7A0000
|
direct allocation
|
page read and write
|
||
7FF8A80F9000
|
unkown
|
page execute read
|
||
1BF40588000
|
heap
|
page read and write
|
||
1DEEB099000
|
heap
|
page read and write
|
||
7FF8B8AF1000
|
unkown
|
page execute read
|
||
7FF8BFB35000
|
unkown
|
page readonly
|
||
1D6CEBF0000
|
direct allocation
|
page read and write
|
||
1BF40588000
|
heap
|
page read and write
|
||
1D6CEC30000
|
direct allocation
|
page read and write
|
||
1AA02356000
|
heap
|
page read and write
|
||
1AA02356000
|
heap
|
page read and write
|
||
7FF8BA520000
|
unkown
|
page readonly
|
||
1AA02354000
|
heap
|
page read and write
|
||
7FF8A7F37000
|
unkown
|
page readonly
|
||
7FF8A7B22000
|
unkown
|
page readonly
|
||
7FF8A7ECB000
|
unkown
|
page read and write
|
||
238F5EC000
|
stack
|
page read and write
|
||
7FF8B8833000
|
unkown
|
page readonly
|
||
1DEED050000
|
direct allocation
|
page read and write
|
||
1DEEB098000
|
heap
|
page read and write
|
||
7FF8B7844000
|
unkown
|
page readonly
|
||
1BF40588000
|
heap
|
page read and write
|
||
1AA0235B000
|
heap
|
page read and write
|
||
7FF8B78B0000
|
unkown
|
page readonly
|
||
7FF6BD5EA000
|
unkown
|
page readonly
|
||
8D447E3000
|
stack
|
page read and write
|
||
1BF4058A000
|
heap
|
page read and write
|
||
1DEEB08B000
|
heap
|
page read and write
|
||
1AA02363000
|
heap
|
page read and write
|
||
1DEEE210000
|
direct allocation
|
page read and write
|
||
7FF8B911D000
|
unkown
|
page readonly
|
||
1AA02356000
|
heap
|
page read and write
|
||
7FF8B90E4000
|
unkown
|
page readonly
|
||
1D6CBE58000
|
heap
|
page read and write
|
||
7FF8A8EEA000
|
unkown
|
page read and write
|
||
1AA02359000
|
heap
|
page read and write
|
||
1DEEDF30000
|
direct allocation
|
page read and write
|
||
7FF8B916D000
|
unkown
|
page readonly
|
||
1AA0235F000
|
heap
|
page read and write
|
||
1BF40590000
|
heap
|
page read and write
|
||
1D6CE3D0000
|
direct allocation
|
page read and write
|
||
1D6CBEAE000
|
heap
|
page read and write
|
||
1D6CBDC8000
|
heap
|
page read and write
|
||
7FF8BA241000
|
unkown
|
page execute read
|
||
7FF8B83A4000
|
unkown
|
page readonly
|
||
7FF8B8F8C000
|
unkown
|
page read and write
|
||
7FF8B9101000
|
unkown
|
page execute read
|
||
1D6CDFF0000
|
direct allocation
|
page read and write
|
||
1D6CF6D0000
|
direct allocation
|
page read and write
|
||
1DEECED0000
|
direct allocation
|
page read and write
|
||
1D6CBE5A000
|
heap
|
page read and write
|
||
28FF37E5000
|
heap
|
page read and write
|
||
1C8023A0000
|
heap
|
page read and write
|
||
1BF40588000
|
heap
|
page read and write
|
||
28FF34C0000
|
heap
|
page read and write
|
||
1AA02359000
|
heap
|
page read and write
|
||
1AA0235F000
|
heap
|
page read and write
|
||
7FF8B8290000
|
unkown
|
page readonly
|
||
7FF8A83B9000
|
unkown
|
page readonly
|
||
7FF7E720D000
|
unkown
|
page write copy
|
||
7FF8B9133000
|
unkown
|
page read and write
|
||
1DEEB06C000
|
heap
|
page read and write
|
||
1AA02357000
|
heap
|
page read and write
|
||
7FF8A73CB000
|
unkown
|
page readonly
|
||
7FF8A8110000
|
unkown
|
page execute read
|
||
1DEEE260000
|
direct allocation
|
page read and write
|
||
1DEED190000
|
direct allocation
|
page read and write
|
||
1BF40595000
|
heap
|
page read and write
|
||
1D6CE893000
|
heap
|
page read and write
|
||
1C8023AB000
|
heap
|
page read and write
|
||
7FF8BFB37000
|
unkown
|
page readonly
|
||
1D6CF7A0000
|
direct allocation
|
page read and write
|
||
1DEEE100000
|
direct allocation
|
page read and write
|
||
1A61DB11000
|
heap
|
page read and write
|
||
1DEEE070000
|
direct allocation
|
page read and write
|
||
7FF6BD60E000
|
unkown
|
page readonly
|
||
1DEEB073000
|
heap
|
page read and write
|
||
7FF8B8286000
|
unkown
|
page readonly
|
||
7FF8BA253000
|
unkown
|
page read and write
|
||
28FF34F0000
|
heap
|
page read and write
|
||
1AA0235B000
|
heap
|
page read and write
|
||
7FF8A805F000
|
unkown
|
page read and write
|
||
1AA0235F000
|
heap
|
page read and write
|
||
1BF40588000
|
heap
|
page read and write
|
||
1D6CF7A0000
|
direct allocation
|
page read and write
|
||
7FF8A8A00000
|
unkown
|
page readonly
|
||
1AA02356000
|
heap
|
page read and write
|
||
1D6CBE3F000
|
heap
|
page read and write
|
||
1AA02354000
|
heap
|
page read and write
|
||
1D6CEC30000
|
direct allocation
|
page read and write
|
||
7FF8A7460000
|
unkown
|
page execute read
|
||
1BF40588000
|
heap
|
page read and write
|
||
7FF8A7709000
|
unkown
|
page readonly
|
||
1D6CDE98000
|
heap
|
page read and write
|
||
7FF8B90F3000
|
unkown
|
page readonly
|
||
1D6CEA43000
|
heap
|
page read and write
|
||
1DEEDAC5000
|
heap
|
page read and write
|
||
1BF40588000
|
heap
|
page read and write
|
||
1D6CDDB8000
|
heap
|
page read and write
|
||
1AA02364000
|
heap
|
page read and write
|
||
7FF8A7E24000
|
unkown
|
page readonly
|
||
7FF8A73C5000
|
unkown
|
page readonly
|
||
7FF7E721C000
|
unkown
|
page read and write
|
||
1D6CEEDD000
|
heap
|
page read and write
|
||
1D6CF7A0000
|
direct allocation
|
page read and write
|
||
1AA03CA0000
|
heap
|
page read and write
|
||
7FF8A746D000
|
unkown
|
page execute read
|
||
1D6CF7E0000
|
direct allocation
|
page read and write
|
||
1D6CF7A0000
|
direct allocation
|
page read and write
|
||
1AA02357000
|
heap
|
page read and write
|
||
7FF8B7821000
|
unkown
|
page execute read
|
||
5164DEC000
|
stack
|
page read and write
|
||
7FF8A8F17000
|
unkown
|
page readonly
|
||
1D6CF750000
|
direct allocation
|
page read and write
|
||
1C802395000
|
heap
|
page read and write
|
||
1BF40594000
|
heap
|
page read and write
|
||
1D6CF7A0000
|
direct allocation
|
page read and write
|
||
1BF4058C000
|
heap
|
page read and write
|
||
1D6CF7A0000
|
direct allocation
|
page read and write
|
There are 1069 hidden memdumps, click here to show them.