Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Windows\AppReadiness\mmzwi.exe
|
C:\Windows\AppReadiness\mmzwi.exe
|
||
C:\Users\user\Desktop\gjsdk.exe
|
"C:\Users\user\Desktop\gjsdk.exe"
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\svchost.exe
|
C:\Windows\System32\svchost.exe -k LocalService -p -s LicenseManager
|
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
http://html4/loose.dtd
|
unknown
|
||
http://45.151.62.65:8082/7FBE8Vhw_Ej3wyS05Pj-_OcuPl34HeR5tlGYDglketqIsLl6CwLCyB374ln1tVW7ajwzELAFfky
|
unknown
|
||
https://lockn1t3.xyz00:11:22:33:44:5500:11:22:33:44:5500:11:22:33:44:5500:11:22:33:44:5500:11:22:33:
|
unknown
|
||
https://lockn1t3.xyzsizeof(rtype)
|
unknown
|
||
http://%s:%d/%sHTTP/1.1
|
unknown
|
||
https://github.com/urfave/cli/blob/main/docs/CHANGELOG.md
|
unknown
|
||
http://45.151.62.65:8082/7FBE8Vhw_Ej3wyS05Pj-_OcuPl34HeR5tlGYDglketqIsLl6CwLCyB374ln1tVW7ajwzELAFfkyu3R5Q-hjDLQ==
|
45.151.62.65
|
||
https://lockn1t3.xyzMMZWIODFMQ2GGOJRGRTGIM3GMY4TOYRVHBQTQZRSMZRDQNLEMVSWOZLDNNXQMMZWIODFMQ2GGOJRGRTG
|
unknown
|
||
http://45.151.62.65:8082/
|
45.151.62.65
|
||
https://lockn1t3.xyz
|
unknown
|
||
http://%s:%d/%sbg-hi-bluebg-hi-magentabg-hi-cyanHTTP/1.1
|
unknown
|
||
https://lockn1t3.xyz--09AZ__azMMZWIODFMQ2GGOJRGRTGIM3GMY4TOYRVHBQTQZRSMZRDQNLEMVSWOZLDNNXQ
|
unknown
|
||
https://github.com/urfave/cli/blob/main/docs/CHANGELOG.md#deprecated-cli-app-action-signature
|
unknown
|
||
https://github.com/urfave/cli/blob/main/docs/CHANGELOG.mdThe
|
unknown
|
||
https://github.com/urfave/cli/blob/main/docs/CHANGELOG.md#deprecated-cli-app-action-signatureNAME:
|
unknown
|
||
http://.css
|
unknown
|
||
ftp://192.168.2.47
|
unknown
|
||
https://github.com/urfave/cli/blob/main/docs/CHANGELOG.md#deprecated-cli-app-action-signatureeyJhbGc
|
unknown
|
||
http://.jpg
|
unknown
|
||
https://github.com/go-sql-driver/mysql/wiki/old_passwords
|
unknown
|
||
https://lockn1t3.xyzocelot.jython27.xyztiger.jython27.xyz00:11:22:33:44:55cecreate
|
unknown
|
||
https://github.com/urfave/cli/blob/main/docs/CHANGELOG.mdMust
|
unknown
|
There are 12 hidden URLs, click here to show them.
Domains
Name
|
IP
|
Malicious
|
|
---|---|---|---|
c4h10o.autos
|
45.151.62.65
|
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
45.151.62.65
|
c4h10o.autos
|
Russian Federation
|
Registry
Path
|
Value
|
Malicious
|
|
---|---|---|---|
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\partmgr
|
EnableCounterForIoctl
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\EventLog\Application\SecureAuthService
|
CustomSource
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\EventLog\Application\SecureAuthService
|
EventMessageFile
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\EventLog\Application\SecureAuthService
|
TypesSupported
|
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
C000798000
|
direct allocation
|
page read and write
|
||
1FB5000
|
unkown
|
page execute and read and write
|
||
C000806000
|
direct allocation
|
page read and write
|
||
C0005FC000
|
direct allocation
|
page read and write
|
||
16F41A02000
|
heap
|
page read and write
|
||
2B0E4950000
|
direct allocation
|
page read and write
|
||
C0002D8000
|
direct allocation
|
page read and write
|
||
3DB327E000
|
unkown
|
page readonly
|
||
C000000000
|
direct allocation
|
page read and write
|
||
3512000
|
unkown
|
page execute and read and write
|
||
1F8FE744000
|
direct allocation
|
page read and write
|
||
2B0E9A81000
|
direct allocation
|
page read and write
|
||
C000130000
|
direct allocation
|
page read and write
|
||
C00023A000
|
direct allocation
|
page read and write
|
||
C00091A000
|
direct allocation
|
page read and write
|
||
12E9000
|
unkown
|
page execute and read and write
|
||
C000902000
|
direct allocation
|
page read and write
|
||
C000126000
|
direct allocation
|
page read and write
|
||
C00092E000
|
direct allocation
|
page read and write
|
||
2441000
|
unkown
|
page execute and read and write
|
||
13AD000
|
unkown
|
page execute and read and write
|
||
C000218000
|
direct allocation
|
page read and write
|
||
8B359FC000
|
stack
|
page read and write
|
||
C000218000
|
direct allocation
|
page read and write
|
||
F36000
|
unkown
|
page execute and read and write
|
||
C00005B000
|
direct allocation
|
page read and write
|
||
1F8FE7F6000
|
direct allocation
|
page read and write
|
||
C0007A6000
|
direct allocation
|
page read and write
|
||
C00079C000
|
direct allocation
|
page read and write
|
||
1E75000
|
unkown
|
page execute and read and write
|
||
2B0E9C10000
|
direct allocation
|
page read and write
|
||
C00029A000
|
direct allocation
|
page read and write
|
||
C000032000
|
direct allocation
|
page read and write
|
||
AE8000
|
unkown
|
page execute and read and write
|
||
C0005AA000
|
direct allocation
|
page read and write
|
||
1F8FFA70000
|
direct allocation
|
page read and write
|
||
ADA000
|
unkown
|
page execute and read and write
|
||
1F8FFB92000
|
direct allocation
|
page read and write
|
||
C0007B2000
|
direct allocation
|
page read and write
|
||
C0008AC000
|
direct allocation
|
page read and write
|
||
1F8FE7D3000
|
direct allocation
|
page read and write
|
||
C000800000
|
direct allocation
|
page read and write
|
||
C000222000
|
direct allocation
|
page read and write
|
||
2B0E9AC6000
|
direct allocation
|
page read and write
|
||
C0001D1000
|
direct allocation
|
page read and write
|
||
22F0000
|
unkown
|
page execute and read and write
|
||
2B0E4930000
|
direct allocation
|
page read and write
|
||
C00011E000
|
direct allocation
|
page read and write
|
||
36D2000
|
unkown
|
page execute and read and write
|
||
1D51000
|
unkown
|
page execute and read and write
|
||
3512000
|
unkown
|
page execute and read and write
|
||
36DC000
|
unkown
|
page execute and read and write
|
||
DEE000
|
unkown
|
page execute and read and write
|
||
C000122000
|
direct allocation
|
page read and write
|
||
C0001B6000
|
direct allocation
|
page read and write
|
||
C0008B0000
|
direct allocation
|
page read and write
|
||
3DB387E000
|
unkown
|
page readonly
|
||
359E000
|
unkown
|
page execute and read and write
|
||
1F8FE819000
|
direct allocation
|
page read and write
|
||
1AED000
|
unkown
|
page execute and read and write
|
||
1FCC000
|
unkown
|
page execute and read and write
|
||
640000
|
unkown
|
page readonly
|
||
B9C000
|
unkown
|
page execute and read and write
|
||
C000B40000
|
direct allocation
|
page read and write
|
||
3551000
|
unkown
|
page execute and write copy
|
||
C0003BA000
|
direct allocation
|
page read and write
|
||
C35000
|
unkown
|
page execute and read and write
|
||
1F8FE530000
|
heap
|
page read and write
|
||
3580000
|
unkown
|
page execute and read and write
|
||
1483000
|
unkown
|
page execute and read and write
|
||
BBF000
|
unkown
|
page execute and read and write
|
||
C000122000
|
direct allocation
|
page read and write
|
||
1F8FE570000
|
heap
|
page read and write
|
||
3DB357C000
|
stack
|
page read and write
|
||
11C6000
|
unkown
|
page execute and read and write
|
||
C0001EE000
|
direct allocation
|
page read and write
|
||
1F8FFA50000
|
direct allocation
|
page read and write
|
||
C00060A000
|
direct allocation
|
page read and write
|
||
C0002F6000
|
direct allocation
|
page read and write
|
||
3498000
|
unkown
|
page execute and read and write
|
||
FF0000
|
unkown
|
page execute and read and write
|
||
CAE39FE000
|
stack
|
page read and write
|
||
C0007FC000
|
direct allocation
|
page read and write
|
||
14DA000
|
unkown
|
page execute and read and write
|
||
C0007E4000
|
direct allocation
|
page read and write
|
||
2B0E46D4000
|
direct allocation
|
page read and write
|
||
C000916000
|
direct allocation
|
page read and write
|
||
C0001EC000
|
direct allocation
|
page read and write
|
||
C00003A000
|
direct allocation
|
page read and write
|
||
20F8000
|
unkown
|
page execute and read and write
|
||
E0C000
|
unkown
|
page execute and read and write
|
||
C0002EF000
|
direct allocation
|
page read and write
|
||
C0002AC000
|
direct allocation
|
page read and write
|
||
1C40000
|
unkown
|
page execute and read and write
|
||
C0002DE000
|
direct allocation
|
page read and write
|
||
C0002B4000
|
direct allocation
|
page read and write
|
||
1F8FE510000
|
heap
|
page read and write
|
||
DFE000
|
unkown
|
page execute and read and write
|
||
C000090000
|
direct allocation
|
page read and write
|
||
AA6000
|
unkown
|
page execute and read and write
|
||
C0001A6000
|
direct allocation
|
page read and write
|
||
20D5000
|
unkown
|
page execute and read and write
|
||
2B0E9B80000
|
direct allocation
|
page read and write
|
||
1459000
|
unkown
|
page execute and read and write
|
||
10E5000
|
unkown
|
page execute and read and write
|
||
C000092000
|
direct allocation
|
page read and write
|
||
1FA1000
|
unkown
|
page execute and read and write
|
||
36CD000
|
unkown
|
page execute and read and write
|
||
FD6000
|
unkown
|
page execute and read and write
|
||
C0003C0000
|
direct allocation
|
page read and write
|
||
C000B50000
|
direct allocation
|
page read and write
|
||
1147000
|
unkown
|
page execute and read and write
|
||
C000278000
|
direct allocation
|
page read and write
|
||
2011000
|
unkown
|
page execute and read and write
|
||
C0008A2000
|
direct allocation
|
page read and write
|
||
C000340000
|
direct allocation
|
page read and write
|
||
2B0E9B46000
|
direct allocation
|
page read and write
|
||
C00090C000
|
direct allocation
|
page read and write
|
||
C00090A000
|
direct allocation
|
page read and write
|
||
2B0E9B20000
|
direct allocation
|
page read and write
|
||
36CD000
|
unkown
|
page execute and read and write
|
||
128E000
|
unkown
|
page execute and read and write
|
||
A82000
|
unkown
|
page execute and read and write
|
||
36DF000
|
unkown
|
page execute and write copy
|
||
C000120000
|
direct allocation
|
page read and write
|
||
C0007A2000
|
direct allocation
|
page read and write
|
||
C0008FA000
|
direct allocation
|
page read and write
|
||
C0007B2000
|
direct allocation
|
page read and write
|
||
C00002E000
|
direct allocation
|
page read and write
|
||
DD1000
|
unkown
|
page execute and read and write
|
||
B75000
|
unkown
|
page execute and read and write
|
||
1345000
|
unkown
|
page execute and read and write
|
||
C000607000
|
direct allocation
|
page read and write
|
||
DA8000
|
unkown
|
page execute and read and write
|
||
CAE3DFF000
|
stack
|
page read and write
|
||
1E98000
|
unkown
|
page execute and read and write
|
||
C000324000
|
direct allocation
|
page read and write
|
||
C7F000
|
unkown
|
page execute and read and write
|
||
C0007CA000
|
direct allocation
|
page read and write
|
||
C000060000
|
direct allocation
|
page read and write
|
||
C000C90000
|
direct allocation
|
page read and write
|
||
1EC1000
|
unkown
|
page execute and read and write
|
||
F64000
|
unkown
|
page execute and read and write
|
||
3DB29BC000
|
stack
|
page read and write
|
||
16F41A2B000
|
heap
|
page read and write
|
||
C00002C000
|
direct allocation
|
page read and write
|
||
16F41A13000
|
heap
|
page read and write
|
||
C0005EE000
|
direct allocation
|
page read and write
|
||
C000264000
|
direct allocation
|
page read and write
|
||
C00079C000
|
direct allocation
|
page read and write
|
||
C20000
|
unkown
|
page execute and read and write
|
||
C00080C000
|
direct allocation
|
page read and write
|
||
F46000
|
unkown
|
page execute and read and write
|
||
C000041000
|
direct allocation
|
page read and write
|
||
C000008000
|
direct allocation
|
page read and write
|
||
2B0E9C92000
|
direct allocation
|
page read and write
|
||
C0007A0000
|
direct allocation
|
page read and write
|
||
C000128000
|
direct allocation
|
page read and write
|
||
C0003CE000
|
direct allocation
|
page read and write
|
||
CEE000
|
unkown
|
page execute and read and write
|
||
3551000
|
unkown
|
page execute and write copy
|
||
C0003EC000
|
direct allocation
|
page read and write
|
||
2B51000
|
unkown
|
page execute and write copy
|
||
C0007E6000
|
direct allocation
|
page read and write
|
||
C01000
|
unkown
|
page execute and read and write
|
||
C000904000
|
direct allocation
|
page read and write
|
||
2B0E9B4B000
|
direct allocation
|
page read and write
|
||
C00059C000
|
direct allocation
|
page read and write
|
||
1171000
|
unkown
|
page execute and read and write
|
||
16F419E0000
|
heap
|
page read and write
|
||
C00006B000
|
direct allocation
|
page read and write
|
||
2B0E45A0000
|
heap
|
page read and write
|
||
1041000
|
unkown
|
page execute and read and write
|
||
C0002FE000
|
direct allocation
|
page read and write
|
||
2B0E46D8000
|
direct allocation
|
page read and write
|
||
C00022C000
|
direct allocation
|
page read and write
|
||
C000BAC000
|
direct allocation
|
page read and write
|
||
2B0E9B10000
|
direct allocation
|
page read and write
|
||
C000134000
|
direct allocation
|
page read and write
|
||
2B0E4940000
|
direct allocation
|
page read and write
|
||
C000110000
|
direct allocation
|
page read and write
|
||
1161000
|
unkown
|
page execute and read and write
|
||
C0002E3000
|
direct allocation
|
page read and write
|
||
C0000FC000
|
direct allocation
|
page read and write
|
||
1F21000
|
unkown
|
page execute and read and write
|
||
C0007C4000
|
direct allocation
|
page read and write
|
||
640000
|
unkown
|
page readonly
|
||
1F63000
|
unkown
|
page execute and read and write
|
||
C000051000
|
direct allocation
|
page read and write
|
||
C0005B0000
|
direct allocation
|
page read and write
|
||
1CB9000
|
unkown
|
page execute and read and write
|
||
CD7000
|
unkown
|
page execute and read and write
|
||
3DB2F7D000
|
stack
|
page read and write
|
||
3DB337E000
|
stack
|
page read and write
|
||
640000
|
unkown
|
page readonly
|
||
C000232000
|
direct allocation
|
page read and write
|
||
2234000
|
unkown
|
page execute and read and write
|
||
C000094000
|
direct allocation
|
page read and write
|
||
C000394000
|
direct allocation
|
page read and write
|
||
C000342000
|
direct allocation
|
page read and write
|
||
1F8FFB86000
|
direct allocation
|
page read and write
|
||
C000100000
|
direct allocation
|
page read and write
|
||
C00012A000
|
direct allocation
|
page read and write
|
||
C0005D2000
|
direct allocation
|
page read and write
|
||
36DF000
|
unkown
|
page execute and write copy
|
||
2B0E9BF6000
|
direct allocation
|
page read and write
|
||
1F8FFC08000
|
direct allocation
|
page read and write
|
||
16F41A57000
|
heap
|
page read and write
|
||
C00076C000
|
direct allocation
|
page read and write
|
||
C000019000
|
direct allocation
|
page read and write
|
||
36D4000
|
unkown
|
page execute and read and write
|
||
C0002E0000
|
direct allocation
|
page read and write
|
||
C00014E000
|
direct allocation
|
page read and write
|
||
1F8FE560000
|
direct allocation
|
page read and write
|
||
C00022A000
|
direct allocation
|
page read and write
|
||
BDF000
|
unkown
|
page execute and read and write
|
||
C000660000
|
direct allocation
|
page read and write
|
||
D38000
|
unkown
|
page execute and read and write
|
||
C00004D000
|
direct allocation
|
page read and write
|
||
C000106000
|
direct allocation
|
page read and write
|
||
A99000
|
unkown
|
page execute and read and write
|
||
C00059F000
|
direct allocation
|
page read and write
|
||
1F8FE7E0000
|
direct allocation
|
page read and write
|
||
11D5000
|
unkown
|
page execute and read and write
|
||
359E000
|
unkown
|
page execute and read and write
|
||
C00092A000
|
direct allocation
|
page read and write
|
||
1F46000
|
unkown
|
page execute and read and write
|
||
C000934000
|
direct allocation
|
page read and write
|
||
C000762000
|
direct allocation
|
page read and write
|
||
C0007AC000
|
direct allocation
|
page read and write
|
||
8B35FFE000
|
stack
|
page read and write
|
||
C0002F0000
|
direct allocation
|
page read and write
|
||
CAE45FF000
|
stack
|
page read and write
|
||
2441000
|
unkown
|
page execute and read and write
|
||
1F8FFB57000
|
direct allocation
|
page read and write
|
||
BF5000
|
unkown
|
page execute and read and write
|
||
C000392000
|
direct allocation
|
page read and write
|
||
C000136000
|
direct allocation
|
page read and write
|
||
FAA000
|
unkown
|
page execute and read and write
|
||
C0003DC000
|
direct allocation
|
page read and write
|
||
16F419C0000
|
heap
|
page read and write
|
||
C00008C000
|
direct allocation
|
page read and write
|
||
1F8FE57C000
|
heap
|
page read and write
|
||
C0003C6000
|
direct allocation
|
page read and write
|
||
C0002FA000
|
direct allocation
|
page read and write
|
||
C000794000
|
direct allocation
|
page read and write
|
||
358D000
|
unkown
|
page execute and read and write
|
||
C000924000
|
direct allocation
|
page read and write
|
||
C000928000
|
direct allocation
|
page read and write
|
||
CBC000
|
unkown
|
page execute and read and write
|
||
C000918000
|
direct allocation
|
page read and write
|
||
36D4000
|
unkown
|
page execute and read and write
|
||
C000804000
|
direct allocation
|
page read and write
|
||
C000742000
|
direct allocation
|
page read and write
|
||
C000384000
|
direct allocation
|
page read and write
|
||
C000817000
|
direct allocation
|
page read and write
|
||
C000096000
|
direct allocation
|
page read and write
|
||
C0008F4000
|
direct allocation
|
page read and write
|
||
8B363FF000
|
stack
|
page read and write
|
||
C00092C000
|
direct allocation
|
page read and write
|
||
112D000
|
unkown
|
page execute and read and write
|
||
358B000
|
unkown
|
page execute and read and write
|
||
C0006FC000
|
direct allocation
|
page read and write
|
||
C00059D000
|
direct allocation
|
page read and write
|
||
C00082A000
|
direct allocation
|
page read and write
|
||
C0005BA000
|
direct allocation
|
page read and write
|
||
C0003F0000
|
direct allocation
|
page read and write
|
||
C000C94000
|
direct allocation
|
page read and write
|
||
2112000
|
unkown
|
page execute and read and write
|
||
C000922000
|
direct allocation
|
page read and write
|
||
C0008BA000
|
direct allocation
|
page read and write
|
||
641000
|
unkown
|
page execute and read and write
|
||
C000B96000
|
direct allocation
|
page read and write
|
||
C0008B4000
|
direct allocation
|
page read and write
|
||
C00003F000
|
direct allocation
|
page read and write
|
||
C00011E000
|
direct allocation
|
page read and write
|
||
C00012E000
|
direct allocation
|
page read and write
|
||
1112000
|
unkown
|
page execute and read and write
|
||
2B0E4744000
|
heap
|
page read and write
|
||
1F8FE840000
|
heap
|
page read and write
|
||
1F8FE7E7000
|
direct allocation
|
page read and write
|
||
16F419F0000
|
heap
|
page read and write
|
||
C000080000
|
direct allocation
|
page read and write
|
||
D4E000
|
unkown
|
page execute and read and write
|
||
C0008F8000
|
direct allocation
|
page read and write
|
||
208C000
|
unkown
|
page execute and read and write
|
||
C00006F000
|
direct allocation
|
page read and write
|
||
C0005A3000
|
direct allocation
|
page read and write
|
||
C000358000
|
direct allocation
|
page read and write
|
||
ACC000
|
unkown
|
page execute and read and write
|
||
1F04000
|
unkown
|
page execute and read and write
|
||
C0008AE000
|
direct allocation
|
page read and write
|
||
10D1000
|
unkown
|
page execute and read and write
|
||
8B35BFE000
|
stack
|
page read and write
|
||
C000598000
|
direct allocation
|
page read and write
|
||
C000856000
|
direct allocation
|
page read and write
|
||
1F8FE500000
|
heap
|
page read and write
|
||
C000936000
|
direct allocation
|
page read and write
|
||
1040000
|
unkown
|
page execute and read and write
|
||
D09000
|
unkown
|
page execute and read and write
|
||
C000920000
|
direct allocation
|
page read and write
|
||
C000236000
|
direct allocation
|
page read and write
|
||
C000932000
|
direct allocation
|
page read and write
|
||
1B55000
|
unkown
|
page execute and read and write
|
||
C0003EE000
|
direct allocation
|
page read and write
|
||
C000828000
|
direct allocation
|
page read and write
|
||
24C7000
|
unkown
|
page execute and read and write
|
||
C00089D000
|
direct allocation
|
page read and write
|
||
641000
|
unkown
|
page execute and read and write
|
||
C000CA4000
|
direct allocation
|
page read and write
|
||
2441000
|
unkown
|
page execute and read and write
|
||
2B51000
|
unkown
|
page execute and write copy
|
||
20B1000
|
unkown
|
page execute and read and write
|
||
C00091E000
|
direct allocation
|
page read and write
|
||
D70000
|
unkown
|
page execute and read and write
|
||
1244000
|
unkown
|
page execute and read and write
|
||
CAE37FF000
|
stack
|
page read and write
|
||
1F8FE748000
|
direct allocation
|
page read and write
|
||
C0003D7000
|
direct allocation
|
page read and write
|
||
C000160000
|
direct allocation
|
page read and write
|
||
36E0000
|
unkown
|
page write copy
|
||
C000064000
|
direct allocation
|
page read and write
|
||
C0002D6000
|
direct allocation
|
page read and write
|
||
CAE3BFE000
|
stack
|
page read and write
|
||
2B0E9B40000
|
direct allocation
|
page read and write
|
||
C000071000
|
direct allocation
|
page read and write
|
||
1F8FFAA0000
|
direct allocation
|
page read and write
|
||
C0003DA000
|
direct allocation
|
page read and write
|
||
105F000
|
unkown
|
page execute and read and write
|
||
C00063A000
|
direct allocation
|
page read and write
|
||
16F42202000
|
trusted library allocation
|
page read and write
|
||
C000834000
|
direct allocation
|
page read and write
|
||
C0005A8000
|
direct allocation
|
page read and write
|
||
2B0E9AD1000
|
direct allocation
|
page read and write
|
||
36E0000
|
unkown
|
page read and write
|
||
131B000
|
unkown
|
page execute and read and write
|
||
1A41000
|
unkown
|
page execute and read and write
|
||
10C6000
|
unkown
|
page execute and read and write
|
||
C0002EA000
|
direct allocation
|
page read and write
|
||
C0002CC000
|
direct allocation
|
page read and write
|
||
F26000
|
unkown
|
page execute and read and write
|
||
C0000C6000
|
direct allocation
|
page read and write
|
||
C0007B8000
|
direct allocation
|
page read and write
|
||
1E1C000
|
unkown
|
page execute and read and write
|
||
21BF000
|
unkown
|
page execute and read and write
|
||
2B0E4975000
|
heap
|
page read and write
|
||
C000820000
|
direct allocation
|
page read and write
|
||
D63000
|
unkown
|
page execute and read and write
|
||
C000086000
|
direct allocation
|
page read and write
|
||
1DD9000
|
unkown
|
page execute and read and write
|
||
C000002000
|
direct allocation
|
page read and write
|
||
C00006F000
|
direct allocation
|
page read and write
|
||
101D000
|
unkown
|
page execute and read and write
|
||
2053000
|
unkown
|
page execute and read and write
|
||
1FF3000
|
unkown
|
page execute and read and write
|
||
1F8FFB8C000
|
direct allocation
|
page read and write
|
||
3DB377E000
|
stack
|
page read and write
|
||
1F8FE830000
|
direct allocation
|
page read and write
|
||
C000058000
|
direct allocation
|
page read and write
|
||
C0003EB000
|
direct allocation
|
page read and write
|
||
16F42150000
|
trusted library allocation
|
page read and write
|
||
2390000
|
unkown
|
page execute and read and write
|
||
1F8FFB84000
|
direct allocation
|
page read and write
|
||
1F8FE740000
|
direct allocation
|
page read and write
|
||
2B0E4970000
|
heap
|
page read and write
|
||
C000808000
|
direct allocation
|
page read and write
|
||
C000140000
|
direct allocation
|
page read and write
|
||
2B0E9C13000
|
direct allocation
|
page read and write
|
||
C000182000
|
direct allocation
|
page read and write
|
||
C0008B2000
|
direct allocation
|
page read and write
|
||
C00005F000
|
direct allocation
|
page read and write
|
||
A73000
|
unkown
|
page execute and read and write
|
||
24BF000
|
unkown
|
page execute and read and write
|
||
C0000C0000
|
direct allocation
|
page read and write
|
||
C000346000
|
direct allocation
|
page read and write
|
||
2344000
|
unkown
|
page execute and read and write
|
||
1F8FE7B0000
|
direct allocation
|
page read and write
|
||
8B35DFE000
|
stack
|
page read and write
|
||
C000368000
|
direct allocation
|
page read and write
|
||
C000132000
|
direct allocation
|
page read and write
|
||
C000B74000
|
direct allocation
|
page read and write
|
||
16F41A3F000
|
heap
|
page read and write
|
||
C000824000
|
direct allocation
|
page read and write
|
||
1E56000
|
unkown
|
page execute and read and write
|
||
C0007F4000
|
direct allocation
|
page read and write
|
||
1EE0000
|
unkown
|
page execute and read and write
|
||
1F8FFB73000
|
direct allocation
|
page read and write
|
||
8B365FF000
|
stack
|
page read and write
|
||
C00087A000
|
direct allocation
|
page read and write
|
||
1F8FFB81000
|
direct allocation
|
page read and write
|
||
1F8FFBB0000
|
direct allocation
|
page read and write
|
||
C0006EC000
|
direct allocation
|
page read and write
|
||
1CCE000
|
unkown
|
page execute and read and write
|
||
C000061000
|
direct allocation
|
page read and write
|
||
1041000
|
unkown
|
page execute and read and write
|
||
3580000
|
unkown
|
page execute and read and write
|
||
C000822000
|
direct allocation
|
page read and write
|
||
C00036A000
|
direct allocation
|
page read and write
|
||
2B0E9B30000
|
direct allocation
|
page read and write
|
||
C0002F4000
|
direct allocation
|
page read and write
|
||
C000162000
|
direct allocation
|
page read and write
|
||
1200000
|
unkown
|
page execute and read and write
|
||
C00084A000
|
direct allocation
|
page read and write
|
||
F72000
|
unkown
|
page execute and read and write
|
||
1F8FFA90000
|
direct allocation
|
page read and write
|
||
2A98000
|
unkown
|
page execute and read and write
|
||
24CF000
|
unkown
|
page execute and read and write
|
||
CA4000
|
unkown
|
page execute and read and write
|
||
8B355FC000
|
stack
|
page read and write
|
||
C0008C6000
|
direct allocation
|
page read and write
|
||
C0005E2000
|
direct allocation
|
page read and write
|
||
B4E000
|
unkown
|
page execute and read and write
|
||
F55000
|
unkown
|
page execute and read and write
|
||
C0008C0000
|
direct allocation
|
page read and write
|
||
C0003CB000
|
direct allocation
|
page read and write
|
||
1F8FFAF9000
|
direct allocation
|
page read and write
|
||
C000796000
|
direct allocation
|
page read and write
|
||
1F8FFAE0000
|
direct allocation
|
page read and write
|
||
1F8FFAA9000
|
direct allocation
|
page read and write
|
||
BCF000
|
unkown
|
page execute and read and write
|
||
C00005D000
|
direct allocation
|
page read and write
|
||
C00012A000
|
direct allocation
|
page read and write
|
||
C00005D000
|
direct allocation
|
page read and write
|
||
2B0E46A0000
|
heap
|
page read and write
|
||
C0007A6000
|
direct allocation
|
page read and write
|
||
CAE43FF000
|
stack
|
page read and write
|
||
C000C7E000
|
direct allocation
|
page read and write
|
||
C00002C000
|
direct allocation
|
page read and write
|
||
C0005B4000
|
direct allocation
|
page read and write
|
||
CAE35FB000
|
stack
|
page read and write
|
||
C000806000
|
direct allocation
|
page read and write
|
||
C0008AA000
|
direct allocation
|
page read and write
|
||
1F8FE845000
|
heap
|
page read and write
|
||
D1F000
|
unkown
|
page execute and read and write
|
||
D89000
|
unkown
|
page execute and read and write
|
||
36E0000
|
unkown
|
page read and write
|
||
C0008B6000
|
direct allocation
|
page read and write
|
||
C0002AE000
|
direct allocation
|
page read and write
|
||
C00006D000
|
direct allocation
|
page read and write
|
||
C64000
|
unkown
|
page execute and read and write
|
||
1F87000
|
unkown
|
page execute and read and write
|
||
2B0E4730000
|
heap
|
page read and write
|
||
C000046000
|
direct allocation
|
page read and write
|
||
36E0000
|
unkown
|
page write copy
|
||
C0008C2000
|
direct allocation
|
page read and write
|
||
2B0E4759000
|
heap
|
page read and write
|
||
1D00000
|
unkown
|
page execute and read and write
|
||
C0007FE000
|
direct allocation
|
page read and write
|
||
2B0E9B00000
|
direct allocation
|
page read and write
|
||
3DB347E000
|
unkown
|
page readonly
|
||
1219000
|
unkown
|
page execute and read and write
|
||
36D2000
|
unkown
|
page execute and read and write
|
||
C0001D8000
|
direct allocation
|
page read and write
|
||
C00031D000
|
direct allocation
|
page read and write
|
||
C00012C000
|
direct allocation
|
page read and write
|
||
C000BB9000
|
direct allocation
|
page read and write
|
||
C0003D0000
|
direct allocation
|
page read and write
|
||
11AB000
|
unkown
|
page execute and read and write
|
||
C000726000
|
direct allocation
|
page read and write
|
||
C000603000
|
direct allocation
|
page read and write
|
||
C000048000
|
direct allocation
|
page read and write
|
||
C000598000
|
direct allocation
|
page read and write
|
||
10B2000
|
unkown
|
page execute and read and write
|
||
C0001A6000
|
direct allocation
|
page read and write
|
||
C000802000
|
direct allocation
|
page read and write
|
||
2035000
|
unkown
|
page execute and read and write
|
||
C54000
|
unkown
|
page execute and read and write
|
||
C000256000
|
direct allocation
|
page read and write
|
||
C000BA2000
|
direct allocation
|
page read and write
|
||
C00012E000
|
direct allocation
|
page read and write
|
||
2B0E4680000
|
heap
|
page read and write
|
||
C000BAE000
|
direct allocation
|
page read and write
|
||
C0002CA000
|
direct allocation
|
page read and write
|
||
2B0E9C89000
|
direct allocation
|
page read and write
|
||
C0002FA000
|
direct allocation
|
page read and write
|
||
1D9F000
|
unkown
|
page execute and read and write
|
||
3DB317E000
|
stack
|
page read and write
|
||
1C73000
|
unkown
|
page execute and read and write
|
||
C000000000
|
direct allocation
|
page read and write
|
||
3DB307E000
|
unkown
|
page readonly
|
||
1F8FFA60000
|
direct allocation
|
page read and write
|
||
C00077C000
|
direct allocation
|
page read and write
|
||
FBA000
|
unkown
|
page execute and read and write
|
||
36DC000
|
unkown
|
page execute and read and write
|
||
23F6000
|
unkown
|
page execute and read and write
|
||
2A98000
|
unkown
|
page execute and read and write
|
||
AFC000
|
unkown
|
page execute and read and write
|
||
C000C6B000
|
direct allocation
|
page read and write
|
||
CAE41FE000
|
stack
|
page read and write
|
||
CAE3FFF000
|
stack
|
page read and write
|
||
36A9000
|
unkown
|
page execute and read and write
|
||
2B0E46D0000
|
direct allocation
|
page read and write
|
||
24DE000
|
unkown
|
page execute and read and write
|
||
358D000
|
unkown
|
page execute and read and write
|
||
10A3000
|
unkown
|
page execute and read and write
|
||
641000
|
unkown
|
page execute and read and write
|
||
36A9000
|
unkown
|
page execute and read and write
|
||
8B357FE000
|
stack
|
page read and write
|
||
C0003E1000
|
direct allocation
|
page read and write
|
||
C000084000
|
direct allocation
|
page read and write
|
||
C0001D0000
|
direct allocation
|
page read and write
|
||
C00006D000
|
direct allocation
|
page read and write
|
||
C95000
|
unkown
|
page execute and read and write
|
||
C00012C000
|
direct allocation
|
page read and write
|
||
640000
|
unkown
|
page readonly
|
||
2B0E9AF5000
|
direct allocation
|
page read and write
|
||
C00007E000
|
direct allocation
|
page read and write
|
||
B21000
|
unkown
|
page execute and read and write
|
||
C000650000
|
direct allocation
|
page read and write
|
||
8B353FF000
|
stack
|
page read and write
|
||
C14000
|
unkown
|
page execute and read and write
|
||
C00059A000
|
direct allocation
|
page read and write
|
||
10FB000
|
unkown
|
page execute and read and write
|
||
1009000
|
unkown
|
page execute and read and write
|
||
F8D000
|
unkown
|
page execute and read and write
|
||
C00010C000
|
direct allocation
|
page read and write
|
||
C000C68000
|
direct allocation
|
page read and write
|
||
3DB367E000
|
unkown
|
page readonly
|
||
8B34FFB000
|
stack
|
page read and write
|
||
C0005D0000
|
direct allocation
|
page read and write
|
||
1D85000
|
unkown
|
page execute and read and write
|
||
C000B9E000
|
direct allocation
|
page read and write
|
||
C0001E0000
|
direct allocation
|
page read and write
|
||
C000850000
|
direct allocation
|
page read and write
|
||
C0001BE000
|
direct allocation
|
page read and write
|
||
C000672000
|
direct allocation
|
page read and write
|
||
C000106000
|
direct allocation
|
page read and write
|
||
16F41B02000
|
heap
|
page read and write
|
||
2B0E473C000
|
heap
|
page read and write
|
||
C000780000
|
direct allocation
|
page read and write
|
||
3498000
|
unkown
|
page execute and read and write
|
||
C000910000
|
direct allocation
|
page read and write
|
||
C000632000
|
direct allocation
|
page read and write
|
||
C00013E000
|
direct allocation
|
page read and write
|
||
C000138000
|
direct allocation
|
page read and write
|
||
1A41000
|
unkown
|
page execute and read and write
|
||
C0007A4000
|
direct allocation
|
page read and write
|
||
C0002A4000
|
direct allocation
|
page read and write
|
||
1F8FE7B7000
|
direct allocation
|
page read and write
|
||
C00003C000
|
direct allocation
|
page read and write
|
||
C00080A000
|
direct allocation
|
page read and write
|
||
C0000DE000
|
direct allocation
|
page read and write
|
||
C000634000
|
direct allocation
|
page read and write
|
||
C000605000
|
direct allocation
|
page read and write
|
||
C45000
|
unkown
|
page execute and read and write
|
||
C0003EE000
|
direct allocation
|
page read and write
|
||
C0007EC000
|
direct allocation
|
page read and write
|
||
358B000
|
unkown
|
page execute and read and write
|
||
C000A7C000
|
direct allocation
|
page read and write
|
||
16F41A00000
|
heap
|
page read and write
|
||
C0005A1000
|
direct allocation
|
page read and write
|
||
C000322000
|
direct allocation
|
page read and write
|
||
C000838000
|
direct allocation
|
page read and write
|
||
C00027E000
|
direct allocation
|
page read and write
|
||
C0008A4000
|
direct allocation
|
page read and write
|
||
C000074000
|
direct allocation
|
page read and write
|
||
C000080000
|
direct allocation
|
page read and write
|
||
C000300000
|
direct allocation
|
page read and write
|
||
C0003F9000
|
direct allocation
|
page read and write
|
||
1089000
|
unkown
|
page execute and read and write
|
||
24B1000
|
unkown
|
page execute and read and write
|
||
1E38000
|
unkown
|
page execute and read and write
|
||
C000752000
|
direct allocation
|
page read and write
|
||
12CA000
|
unkown
|
page execute and read and write
|
||
2174000
|
unkown
|
page execute and read and write
|
||
C0002DC000
|
direct allocation
|
page read and write
|
||
C0008FE000
|
direct allocation
|
page read and write
|
||
C0001B4000
|
direct allocation
|
page read and write
|
||
C000766000
|
direct allocation
|
page read and write
|
||
1D3B000
|
unkown
|
page execute and read and write
|
||
C0000F2000
|
direct allocation
|
page read and write
|
||
1C04000
|
unkown
|
page execute and read and write
|
||
C0007E8000
|
direct allocation
|
page read and write
|
||
1E04000
|
unkown
|
page execute and read and write
|
||
C000770000
|
direct allocation
|
page read and write
|
||
1F8FE7A0000
|
direct allocation
|
page read and write
|
||
C000800000
|
direct allocation
|
page read and write
|
||
C000124000
|
direct allocation
|
page read and write
|
||
206D000
|
unkown
|
page execute and read and write
|
||
213A000
|
unkown
|
page execute and read and write
|
There are 570 hidden memdumps, click here to show them.