Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
C:\Users\user\Downloads\terraform-docs-v0.19.0-windows-amd64.zip (copy)
|
Zip archive data, at least v2.0 to extract, compression method=deflate
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\lshlpu2r.eym\LICENSE
|
ASCII text
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\lshlpu2r.eym\README.md
|
ASCII text, with very long lines (912)
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\lshlpu2r.eym\terraform-docs.exe
|
PE32+ executable (console) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\unarchiver.log
|
ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\Downloads\aa6327d2-dd0f-4b5a-a9bb-eccfcc8f59a4.tmp
|
Zip archive data, at least v2.0 to extract, compression method=deflate
|
dropped
|
||
C:\Users\user\Downloads\terraform-docs-v0.19.0-windows-amd64.zip.crdownload
|
Zip archive data, at least v2.0 to extract, compression method=deflate
|
dropped
|
||
Chrome Cache Entry: 51
|
Zip archive data, at least v2.0 to extract, compression method=deflate
|
downloaded
|
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Program Files\Google\Chrome\Application\chrome.exe
|
"C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized "about:blank"
|
||
C:\Program Files\Google\Chrome\Application\chrome.exe
|
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US
--service-sandbox-type=none --mojo-platform-channel-handle=2084 --field-trial-handle=2044,i,879850001711432955,9733008339987570398,262144
--disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction
/prefetch:8
|
||
C:\Program Files\Google\Chrome\Application\chrome.exe
|
"C:\Program Files\Google\Chrome\Application\chrome.exe" "https://github.com/terraform-docs/terraform-docs/releases/download/v0.19.0/terraform-docs-v0.19.0-windows-amd64.zip"
|
||
C:\Windows\SysWOW64\unarchiver.exe
|
"C:\Windows\SysWOW64\unarchiver.exe" "C:\Users\user\Downloads\terraform-docs-v0.19.0-windows-amd64.zip"
|
||
C:\Windows\SysWOW64\7za.exe
|
"C:\Windows\System32\7za.exe" x -pinfected -y -o"C:\Users\user\AppData\Local\Temp\lshlpu2r.eym" "C:\Users\user\Downloads\terraform-docs-v0.19.0-windows-amd64.zip"
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\SysWOW64\cmd.exe
|
"cmd.exe" /C "C:\Users\user\AppData\Local\Temp\lshlpu2r.eym\terraform-docs.exe"
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Users\user\AppData\Local\Temp\lshlpu2r.eym\terraform-docs.exe
|
C:\Users\user\AppData\Local\Temp\lshlpu2r.eym\terraform-docs.exe
|
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
https://github.com/terraform-docs/terraform-docs/releases/download/v0.19.0/terraform-docs-v0.19.0-windows-amd64.zip
|
|||
https://www.chocolatey.org
|
unknown
|
||
https://slack.terraform-docs.io/
|
unknown
|
||
https://golang.org/doc/code.html#GOPATH
|
unknown
|
||
https://codecov.io/gh/terraform-docs/terraform-docs/branch/master/graph/badge.svg)
|
unknown
|
||
https://pkg.go.dev/badge/github.com/terraform-docs/terraform-docs)
|
unknown
|
||
https://github.com/terraform-docs/terraform-docs/releases/download/v0.19.0/terraform-docs-v0.19.0-windows-amd64.zip
|
140.82.121.3
|
||
https://github.com/terraform-docs/gh-actions
|
unknown
|
||
https://img.shields.io/github/license/terraform-docs/terraform-docs)
|
unknown
|
||
https://terraform-docs.io/user-guide/configuration/formatter/
|
unknown
|
||
https://pkg.go.dev/github.com/terraform-docs/terraform-docs)
|
unknown
|
||
https://github.com/terraform-docs/terraform-docs/actions)
|
unknown
|
||
https://github.com/terraform-docs/scoop-bucket
|
unknown
|
||
https://github.com/terraform-docs/terraform-docs/blob/master/LICENSE)
|
unknown
|
||
https://terraform-docs.io/reference/terraform-docs/
|
unknown
|
||
https://github.com/spf13/cobra/issues/1508
|
unknown
|
||
https://github.com/terraform-docs/terraform-docs
|
unknown
|
||
https://goreportcard.com/badge/github.com/terraform-docs/terraform-docs)
|
unknown
|
||
https://pkg.go.dev/github.com/terraform-docs/terraform-docs/terraform#Module
|
unknown
|
||
https://codecov.io/gh/terraform-docs/terraform-docs)
|
unknown
|
||
https://terraform-docs.io/
|
unknown
|
||
https://brew.sh
|
unknown
|
||
https://github.com/terraform-docs/terraform-docs/workflows/ci/badge.svg)
|
unknown
|
||
https://github.com/terraform-docs/tfdocs-format-template
|
unknown
|
||
https://github.com/terraform-docs/terraform-docs/releases)
|
unknown
|
||
https://img.shields.io/github/v/release/terraform-docs/terraform-docs)
|
unknown
|
||
https://terraform-docs.io/user-guide/configuration/content/
|
unknown
|
||
https://terraform-docs.io/user-guide/configuration/output/
|
unknown
|
||
https://scoop.sh/
|
unknown
|
||
https://goreportcard.com/report/github.com/terraform-docs/terraform-docs)
|
unknown
|
||
https://pre-commit.com/#install
|
unknown
|
||
https://terraform-docs.io/user-guide/configuration/
|
unknown
|
||
https://github.com/terraform-docs/terraform-docs/releases
|
unknown
|
||
https://github.com/terraform-docs/terraform-docs/releases/download/v0.19.0/terraform-docs-v0.19.0-$(
|
unknown
|
||
https://terraform-docs.io/user-guide/introduction/
|
unknown
|
||
https://github.com/spf13/cobra/issues/1279
|
unknown
|
There are 25 hidden URLs, click here to show them.
Domains
Name
|
IP
|
Malicious
|
|
---|---|---|---|
s-part-0044.t-0009.fb-t-msedge.net
|
13.107.253.72
|
||
github.com
|
140.82.121.3
|
||
www.google.com
|
142.250.186.36
|
||
objects.githubusercontent.com
|
185.199.109.133
|
||
fp2e7a.wpc.phicdn.net
|
192.229.221.95
|
||
s-part-0032.t-0009.t-msedge.net
|
13.107.246.60
|
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
142.250.186.36
|
www.google.com
|
United States
|
||
239.255.255.250
|
unknown
|
Reserved
|
||
185.199.109.133
|
objects.githubusercontent.com
|
Netherlands
|
||
140.82.121.3
|
github.com
|
United States
|
||
192.168.2.4
|
unknown
|
unknown
|
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
C000082000
|
direct allocation
|
page read and write
|
||
C0002BE000
|
direct allocation
|
page read and write
|
||
311E000
|
heap
|
page read and write
|
||
C000280000
|
direct allocation
|
page read and write
|
||
C0002D6000
|
direct allocation
|
page read and write
|
||
11F2000
|
unkown
|
page read and write
|
||
950000
|
heap
|
page read and write
|
||
C000068000
|
direct allocation
|
page read and write
|
||
1387000
|
trusted library allocation
|
page execute and read and write
|
||
1680000
|
trusted library allocation
|
page read and write
|
||
C00023C000
|
direct allocation
|
page read and write
|
||
C0002D2000
|
direct allocation
|
page read and write
|
||
124E000
|
heap
|
page read and write
|
||
C000172000
|
direct allocation
|
page read and write
|
||
C000116000
|
direct allocation
|
page read and write
|
||
DF6000
|
stack
|
page read and write
|
||
C000246000
|
direct allocation
|
page read and write
|
||
C00022A000
|
direct allocation
|
page read and write
|
||
C0001DB000
|
direct allocation
|
page read and write
|
||
5420000
|
trusted library allocation
|
page execute and read and write
|
||
C000073000
|
direct allocation
|
page read and write
|
||
C0001B4000
|
direct allocation
|
page read and write
|
||
1070000
|
heap
|
page read and write
|
||
2BE0000
|
heap
|
page read and write
|
||
127E000
|
heap
|
page read and write
|
||
C00011E000
|
direct allocation
|
page read and write
|
||
2B90000
|
heap
|
page read and write
|
||
C000146000
|
direct allocation
|
page read and write
|
||
3309000
|
trusted library allocation
|
page read and write
|
||
C0002E2000
|
direct allocation
|
page read and write
|
||
C0000DA000
|
direct allocation
|
page read and write
|
||
C00022E000
|
direct allocation
|
page read and write
|
||
C000090000
|
direct allocation
|
page read and write
|
||
1E7F417C000
|
heap
|
page read and write
|
||
1060000
|
heap
|
page read and write
|
||
C000100000
|
direct allocation
|
page read and write
|
||
163F000
|
stack
|
page read and write
|
||
3103000
|
heap
|
page read and write
|
||
11A1000
|
unkown
|
page read and write
|
||
310E000
|
heap
|
page read and write
|
||
C0002E6000
|
direct allocation
|
page read and write
|
||
1110000
|
heap
|
page read and write
|
||
C000180000
|
direct allocation
|
page read and write
|
||
C000174000
|
direct allocation
|
page read and write
|
||
1E7F9530000
|
trusted library allocation
|
page read and write
|
||
C00021E000
|
direct allocation
|
page read and write
|
||
C00028E000
|
direct allocation
|
page read and write
|
||
C00009C000
|
direct allocation
|
page read and write
|
||
1C1000
|
unkown
|
page execute read
|
||
3304000
|
trusted library allocation
|
page read and write
|
||
C0001E2000
|
direct allocation
|
page read and write
|
||
C0000D6000
|
direct allocation
|
page read and write
|
||
C0000AA000
|
direct allocation
|
page read and write
|
||
C000292000
|
direct allocation
|
page read and write
|
||
C0001AE000
|
direct allocation
|
page read and write
|
||
C0000D8000
|
direct allocation
|
page read and write
|
||
C000178000
|
direct allocation
|
page read and write
|
||
C0000B8000
|
direct allocation
|
page read and write
|
||
C0002E0000
|
direct allocation
|
page read and write
|
||
C00019A000
|
direct allocation
|
page read and write
|
||
C000260000
|
direct allocation
|
page read and write
|
||
122E000
|
stack
|
page read and write
|
||
C0000B4000
|
direct allocation
|
page read and write
|
||
C000098000
|
direct allocation
|
page read and write
|
||
C0002FA000
|
direct allocation
|
page read and write
|
||
541E000
|
stack
|
page read and write
|
||
C0001BE000
|
direct allocation
|
page read and write
|
||
49C000
|
stack
|
page read and write
|
||
2BDE000
|
unkown
|
page read and write
|
||
C000061000
|
direct allocation
|
page read and write
|
||
C0001A2000
|
direct allocation
|
page read and write
|
||
7F950000
|
trusted library allocation
|
page execute and read and write
|
||
818000
|
heap
|
page read and write
|
||
11CD000
|
unkown
|
page write copy
|
||
1146000
|
unkown
|
page read and write
|
||
1380000
|
trusted library allocation
|
page read and write
|
||
C00012E000
|
direct allocation
|
page read and write
|
||
C000184000
|
direct allocation
|
page read and write
|
||
C0002A6000
|
direct allocation
|
page read and write
|
||
333B000
|
trusted library allocation
|
page read and write
|
||
C00025A000
|
direct allocation
|
page read and write
|
||
94E000
|
stack
|
page read and write
|
||
C0002EA000
|
direct allocation
|
page read and write
|
||
32B0000
|
trusted library allocation
|
page read and write
|
||
C0002E8000
|
direct allocation
|
page read and write
|
||
ABD7FE000
|
stack
|
page read and write
|
||
C0002CE000
|
direct allocation
|
page read and write
|
||
C000063000
|
direct allocation
|
page read and write
|
||
C0002BC000
|
direct allocation
|
page read and write
|
||
1E7F4130000
|
direct allocation
|
page read and write
|
||
C000176000
|
direct allocation
|
page read and write
|
||
1E7F9530000
|
trusted library allocation
|
page read and write
|
||
2EFD000
|
stack
|
page read and write
|
||
13D0000
|
heap
|
page execute and read and write
|
||
ABCFFD000
|
stack
|
page read and write
|
||
C000142000
|
direct allocation
|
page read and write
|
||
C00018A000
|
direct allocation
|
page read and write
|
||
3339000
|
trusted library allocation
|
page read and write
|
||
C7F000
|
stack
|
page read and write
|
||
C000086000
|
direct allocation
|
page read and write
|
||
26D0000
|
trusted library allocation
|
page read and write
|
||
1E7F4150000
|
heap
|
page read and write
|
||
C000210000
|
direct allocation
|
page read and write
|
||
C0000CC000
|
direct allocation
|
page read and write
|
||
ABD5FE000
|
stack
|
page read and write
|
||
DF9000
|
stack
|
page read and write
|
||
1E7F9487000
|
direct allocation
|
page read and write
|
||
125A000
|
unkown
|
page readonly
|
||
1342000
|
trusted library allocation
|
page execute and read and write
|
||
C0000E0000
|
direct allocation
|
page read and write
|
||
C0002DE000
|
direct allocation
|
page read and write
|
||
1259000
|
unkown
|
page write copy
|
||
C000288000
|
direct allocation
|
page read and write
|
||
59AE000
|
stack
|
page read and write
|
||
C000051000
|
direct allocation
|
page read and write
|
||
C0000E8000
|
direct allocation
|
page read and write
|
||
C0000CA000
|
direct allocation
|
page read and write
|
||
11A5000
|
unkown
|
page write copy
|
||
135A000
|
trusted library allocation
|
page execute and read and write
|
||
11EC000
|
unkown
|
page read and write
|
||
32DB000
|
trusted library allocation
|
page read and write
|
||
C00001A000
|
direct allocation
|
page read and write
|
||
C0000DE000
|
direct allocation
|
page read and write
|
||
32FF000
|
trusted library allocation
|
page read and write
|
||
C000218000
|
direct allocation
|
page read and write
|
||
1350000
|
trusted library allocation
|
page read and write
|
||
C000284000
|
direct allocation
|
page read and write
|
||
C00024C000
|
direct allocation
|
page read and write
|
||
C000108000
|
direct allocation
|
page read and write
|
||
32CA000
|
trusted library allocation
|
page read and write
|
||
C00016C000
|
direct allocation
|
page read and write
|
||
1E7F4176000
|
heap
|
page read and write
|
||
332E000
|
stack
|
page read and write
|
||
C0002C0000
|
direct allocation
|
page read and write
|
||
C0000A0000
|
direct allocation
|
page read and write
|
||
C0002B0000
|
direct allocation
|
page read and write
|
||
963000
|
unkown
|
page readonly
|
||
1C1000
|
unkown
|
page execute read
|
||
1267000
|
heap
|
page read and write
|
||
11BF000
|
unkown
|
page read and write
|
||
1E7F40DA000
|
direct allocation
|
page read and write
|
||
1259000
|
unkown
|
page write copy
|
||
C0002C6000
|
direct allocation
|
page read and write
|
||
C0000E6000
|
direct allocation
|
page read and write
|
||
11AA000
|
unkown
|
page read and write
|
||
113A000
|
unkown
|
page write copy
|
||
3330000
|
heap
|
page read and write
|
||
1229000
|
unkown
|
page readonly
|
||
C000238000
|
direct allocation
|
page read and write
|
||
1147000
|
unkown
|
page write copy
|
||
11CE000
|
unkown
|
page write copy
|
||
2BF0000
|
heap
|
page read and write
|
||
11CA000
|
unkown
|
page read and write
|
||
1240000
|
heap
|
page read and write
|
||
C000036000
|
direct allocation
|
page read and write
|
||
C0002C4000
|
direct allocation
|
page read and write
|
||
C0002AA000
|
direct allocation
|
page read and write
|
||
1E7F3FE0000
|
heap
|
page read and write
|
||
1690000
|
heap
|
page read and write
|
||
1229000
|
unkown
|
page readonly
|
||
32E2000
|
trusted library allocation
|
page read and write
|
||
11C0000
|
unkown
|
page write copy
|
||
C0000C0000
|
direct allocation
|
page read and write
|
||
C0000C6000
|
direct allocation
|
page read and write
|
||
11CC000
|
unkown
|
page read and write
|
||
C00030A000
|
direct allocation
|
page read and write
|
||
C0000DC000
|
direct allocation
|
page read and write
|
||
DFB000
|
stack
|
page read and write
|
||
11C1000
|
unkown
|
page read and write
|
||
113A000
|
unkown
|
page write copy
|
||
11BC000
|
unkown
|
page write copy
|
||
B7E000
|
stack
|
page read and write
|
||
1E7F40D0000
|
direct allocation
|
page read and write
|
||
10BE000
|
stack
|
page read and write
|
||
C0002CA000
|
direct allocation
|
page read and write
|
||
30FC000
|
heap
|
page read and write
|
||
153F000
|
stack
|
page read and write
|
||
1115000
|
heap
|
page read and write
|
||
322E000
|
stack
|
page read and write
|
||
C000088000
|
direct allocation
|
page read and write
|
||
C00005C000
|
direct allocation
|
page read and write
|
||
C00008C000
|
direct allocation
|
page read and write
|
||
C000282000
|
direct allocation
|
page read and write
|
||
C000300000
|
direct allocation
|
page read and write
|
||
C0001AC000
|
direct allocation
|
page read and write
|
||
11A7000
|
unkown
|
page read and write
|
||
1E7F4170000
|
heap
|
page read and write
|
||
C000158000
|
direct allocation
|
page read and write
|
||
2B2D000
|
stack
|
page read and write
|
||
960000
|
heap
|
page read and write
|
||
C00003C000
|
direct allocation
|
page read and write
|
||
C0001D2000
|
direct allocation
|
page read and write
|
||
C00023E000
|
direct allocation
|
page read and write
|
||
1372000
|
trusted library allocation
|
page execute and read and write
|
||
C00002C000
|
direct allocation
|
page read and write
|
||
32E7000
|
trusted library allocation
|
page read and write
|
||
C0000AC000
|
direct allocation
|
page read and write
|
||
C0002AC000
|
direct allocation
|
page read and write
|
||
C00003A000
|
direct allocation
|
page read and write
|
||
1E7F4182000
|
heap
|
page read and write
|
||
810000
|
heap
|
page read and write
|
||
C00017A000
|
direct allocation
|
page read and write
|
||
C000032000
|
direct allocation
|
page read and write
|
||
311E000
|
heap
|
page read and write
|
||
ABD9FF000
|
stack
|
page read and write
|
||
EC0000
|
trusted library allocation
|
page read and write
|
||
11C4000
|
unkown
|
page write copy
|
||
C000302000
|
direct allocation
|
page read and write
|
||
C000076000
|
direct allocation
|
page read and write
|
||
1352000
|
trusted library allocation
|
page execute and read and write
|
||
1E7F9480000
|
direct allocation
|
page read and write
|
||
C00007E000
|
direct allocation
|
page read and write
|
||
C000134000
|
direct allocation
|
page read and write
|
||
1E7F9530000
|
trusted library allocation
|
page read and write
|
||
EA0000
|
trusted library allocation
|
page read and write
|
||
134A000
|
trusted library allocation
|
page execute and read and write
|
||
32BC000
|
trusted library allocation
|
page read and write
|
||
C0000B6000
|
direct allocation
|
page read and write
|
||
E90000
|
heap
|
page read and write
|
||
C000066000
|
direct allocation
|
page read and write
|
||
C0000D2000
|
direct allocation
|
page read and write
|
||
2F3E000
|
stack
|
page read and write
|
||
10F0000
|
heap
|
page read and write
|
||
C0002FC000
|
direct allocation
|
page read and write
|
||
26C0000
|
heap
|
page read and write
|
||
C00025E000
|
direct allocation
|
page read and write
|
||
572D000
|
stack
|
page read and write
|
||
32EE000
|
trusted library allocation
|
page read and write
|
||
C000290000
|
direct allocation
|
page read and write
|
||
34C0000
|
heap
|
page read and write
|
||
C0000BA000
|
direct allocation
|
page read and write
|
||
C000094000
|
direct allocation
|
page read and write
|
||
C0000D4000
|
direct allocation
|
page read and write
|
||
11CF000
|
unkown
|
page read and write
|
||
C000162000
|
direct allocation
|
page read and write
|
||
C000258000
|
direct allocation
|
page read and write
|
||
C0002F6000
|
direct allocation
|
page read and write
|
||
55ED000
|
stack
|
page read and write
|
||
3379000
|
trusted library allocation
|
page read and write
|
||
1E7F9471000
|
direct allocation
|
page read and write
|
||
54EE000
|
stack
|
page read and write
|
||
135C000
|
trusted library allocation
|
page execute and read and write
|
||
CFC000
|
stack
|
page read and write
|
||
310E000
|
heap
|
page read and write
|
||
138B000
|
trusted library allocation
|
page execute and read and write
|
||
C00020A000
|
direct allocation
|
page read and write
|
||
3281000
|
trusted library allocation
|
page read and write
|
||
C000034000
|
direct allocation
|
page read and write
|
||
ABD3FE000
|
stack
|
page read and write
|
||
2550000
|
heap
|
page read and write
|
||
C0000C4000
|
direct allocation
|
page read and write
|
||
1E7F40D8000
|
direct allocation
|
page read and write
|
||
C000222000
|
direct allocation
|
page read and write
|
||
C000182000
|
direct allocation
|
page read and write
|
||
586E000
|
stack
|
page read and write
|
||
1E7F9530000
|
trusted library allocation
|
page read and write
|
||
C00013C000
|
direct allocation
|
page read and write
|
||
32D5000
|
trusted library allocation
|
page read and write
|
||
C000308000
|
direct allocation
|
page read and write
|
||
330C000
|
trusted library allocation
|
page read and write
|
||
C000242000
|
direct allocation
|
page read and write
|
||
C00028C000
|
direct allocation
|
page read and write
|
||
26C5000
|
heap
|
page read and write
|
||
C000194000
|
direct allocation
|
page read and write
|
||
13CE000
|
stack
|
page read and write
|
||
137A000
|
trusted library allocation
|
page execute and read and write
|
||
C00009E000
|
direct allocation
|
page read and write
|
||
1230000
|
trusted library allocation
|
page read and write
|
||
58AE000
|
stack
|
page read and write
|
||
C0002B4000
|
direct allocation
|
page read and write
|
||
30CF000
|
unkown
|
page read and write
|
||
121A000
|
unkown
|
page read and write
|
||
C0000A4000
|
direct allocation
|
page read and write
|
||
C0000B0000
|
direct allocation
|
page read and write
|
||
1C1000
|
unkown
|
page execute read
|
||
C0000A8000
|
direct allocation
|
page read and write
|
||
1E7F94B0000
|
direct allocation
|
page read and write
|
||
C0001D4000
|
direct allocation
|
page read and write
|
||
C00025C000
|
direct allocation
|
page read and write
|
||
1C0000
|
unkown
|
page readonly
|
||
C000092000
|
direct allocation
|
page read and write
|
||
C000043000
|
direct allocation
|
page read and write
|
||
C000262000
|
direct allocation
|
page read and write
|
||
125A000
|
unkown
|
page readonly
|
||
C000000000
|
direct allocation
|
page read and write
|
||
C000186000
|
direct allocation
|
page read and write
|
||
167E000
|
stack
|
page read and write
|
||
963000
|
unkown
|
page readonly
|
||
C000080000
|
direct allocation
|
page read and write
|
||
1142000
|
unkown
|
page write copy
|
||
ABD1FE000
|
stack
|
page read and write
|
||
11CB000
|
unkown
|
page write copy
|
||
C000240000
|
direct allocation
|
page read and write
|
||
113B000
|
unkown
|
page read and write
|
||
4281000
|
trusted library allocation
|
page read and write
|
||
562E000
|
stack
|
page read and write
|
||
C0001C6000
|
direct allocation
|
page read and write
|
||
30F0000
|
heap
|
page read and write
|
||
C0002A0000
|
direct allocation
|
page read and write
|
||
C0002F4000
|
direct allocation
|
page read and write
|
||
1E7F40D4000
|
direct allocation
|
page read and write
|
||
C00004C000
|
direct allocation
|
page read and write
|
||
C00023A000
|
direct allocation
|
page read and write
|
||
800000
|
heap
|
page read and write
|
||
11A8000
|
unkown
|
page write copy
|
||
1430000
|
heap
|
page read and write
|
||
576E000
|
stack
|
page read and write
|
||
B3E000
|
stack
|
page read and write
|
||
1C0000
|
unkown
|
page readonly
|
||
32DF000
|
trusted library allocation
|
page read and write
|
||
C0000A6000
|
direct allocation
|
page read and write
|
||
13F0000
|
heap
|
page read and write
|
||
C0002FE000
|
direct allocation
|
page read and write
|
||
C000053000
|
direct allocation
|
page read and write
|
||
124B000
|
heap
|
page read and write
|
||
59D000
|
stack
|
page read and write
|
There are 306 hidden memdumps, click here to show them.