Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
TU1ocSt1kw.exe
|
PE32+ executable (console) x86-64, for MS Windows
|
initial sample
|
||
C:\Users\user~1\AppData\Local\Temp\Local Storage\leveldb_7.temp\CURRENT (copy)
|
ASCII text
|
dropped
|
||
C:\Users\user~1\AppData\Local\Temp\Session Storage_8.temp\CURRENT (copy)
|
ASCII text
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\Cookies_2.temp
|
SQLite 3.x database, last written using SQLite version 3042000, file counter 7, database pages 5, cookie 0x5, schema 4, UTF-8,
version-valid-for 7
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\History_4.temp
|
SQLite 3.x database, last written using SQLite version 3042000, file counter 1, database pages 38, cookie 0x1f, schema 4,
UTF-8, version-valid-for 1
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\History_5.temp
|
SQLite 3.x database, last written using SQLite version 3042000, file counter 1, database pages 38, cookie 0x1f, schema 4,
UTF-8, version-valid-for 1
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\Local State_0.temp
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\Local Storage\leveldb_7.temp\CURRENT
|
ASCII text
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\Local Storage\leveldb_7.temp\CURRENT.5
|
ASCII text
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\Local Storage\leveldb_7.temp\CURRENT.bak
|
ASCII text
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\Local Storage\leveldb_7.temp\LOG
|
Unicode text, UTF-8 text
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\Local Storage\leveldb_7.temp\LOG.old
|
ASCII text
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\Local Storage\leveldb_7.temp\MANIFEST-000001
|
OpenPGP Secret Key
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\Local Storage\leveldb_7.temp\MANIFEST-000005
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\Login Data_1.temp
|
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 25, cookie
0xe, schema 4, UTF-8, version-valid-for 1
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\Secure Preferences_9.temp
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\Session Storage_8.temp\000003.log
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\Session Storage_8.temp\000004.ldb
|
TeX font metric data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\Session Storage_8.temp\CURRENT
|
ASCII text
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\Session Storage_8.temp\CURRENT.5
|
ASCII text
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\Session Storage_8.temp\CURRENT.6
|
ASCII text
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\Session Storage_8.temp\CURRENT.bak
|
ASCII text
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\Session Storage_8.temp\LOG
|
Unicode text, UTF-8 text
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\Session Storage_8.temp\LOG.old
|
ASCII text
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\Session Storage_8.temp\MANIFEST-000001
|
OpenPGP Secret Key
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\Session Storage_8.temp\MANIFEST-000005
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\Session Storage_8.temp\MANIFEST-000006
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\Web Data_6.temp
|
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 7, database pages 89, cookie
0x36, schema 4, UTF-8, version-valid-for 7
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\cookies.sqlite_14.temp
|
SQLite 3.x database, user version 12, last written using SQLite version 3042000, page size 32768, writer version 2, read version
2, file counter 3, database pages 3, cookie 0x1, schema 4, UTF-8, version-valid-for 3
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\extensions.json_21.temp
|
JSON data
|
modified
|
||
C:\Users\user\AppData\Local\Temp\key4.db_12.temp
|
SQLite 3.x database, last written using SQLite version 3042000, page size 32768, file counter 2, database pages 9, cookie
0x6, schema 4, UTF-8, version-valid-for 2
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\places.sqlite_15.temp
|
SQLite 3.x database, user version 75, last written using SQLite version 3042000, page size 32768, writer version 2, read version
2, file counter 2, database pages 46, cookie 0x26, schema 4, UTF-8, version-valid-for 2
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\places.sqlite_16.temp
|
SQLite 3.x database, user version 75, last written using SQLite version 3042000, page size 32768, writer version 2, read version
2, file counter 2, database pages 46, cookie 0x26, schema 4, UTF-8, version-valid-for 2
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\places.sqlite_17.temp
|
SQLite 3.x database, user version 75, last written using SQLite version 3042000, page size 32768, writer version 2, read version
2, file counter 2, database pages 46, cookie 0x26, schema 4, UTF-8, version-valid-for 2
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\webappsstore.sqlite_19.temp
|
SQLite 3.x database, user version 2, last written using SQLite version 3042000, page size 32768, writer version 2, read version
2, file counter 2, database pages 3, cookie 0x2, schema 4, UTF-8, version-valid-for 2
|
dropped
|
||
C:\Users\user\Desktop\results\chrome_default_cookie.csv
|
CSV text
|
dropped
|
||
C:\Users\user\Desktop\results\chrome_default_sessionstorage.csv
|
Unicode text, UTF-8 (with BOM) text
|
dropped
|
||
C:\Users\user\Desktop\results\microsoft_edge_def_sessionstorage.csv
|
Unicode text, UTF-8 (with BOM) text
|
dropped
|
||
C:\Users\user\Desktop\results\microsoft_edge_default_extension.csv
|
Unicode text, UTF-8 (with BOM) text
|
dropped
|
||
C:\Users\user\Desktop\results\microsoft_edge_default_sessionstorage.csv
|
Unicode text, UTF-8 (with BOM) text
|
dropped
|
There are 30 hidden files, click here to show them.
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\TU1ocSt1kw.exe
|
"C:\Users\user\Desktop\TU1ocSt1kw.exe"
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
http://file://mailto:http://BINARY-x0X03.46.0
|
unknown
|
||
https://duckduckgo.com/chrome_newtab
|
unknown
|
||
https://github.com/moonD4rk/HackBrowserData
|
unknown
|
||
https://github.com/urfave/cli/blob/main/docs/CHANGELOG.mdsync:
|
unknown
|
||
https://duckduckgo.com/ac/?q=
|
unknown
|
||
https://github.com/urfave/cli/blob/main/docs/CHANGELOG.md#deprecated-cli-app-action-signatureC:
|
unknown
|
||
https://www.google.com/images/branding/product/ico/googleg_lodp.ico
|
unknown
|
||
https://drive-daily-2.corp.google.com/
|
unknown
|
||
https://drive-autopush.corp.google.com/
|
unknown
|
||
https://drive-daily-4.corp.google.com/
|
unknown
|
||
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
|
unknown
|
||
https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
|
unknown
|
||
https://www.ecosia.org/newtab/
|
unknown
|
||
https://drive-daily-1.corp.google.com/
|
unknown
|
||
https://support.mozilla.org/kb/customize-firefox-controls-buttons-and-toolbars?utm_source=firefox-br
|
unknown
|
||
https://drive-daily-5.corp.google.com/
|
unknown
|
||
https://chrome.google.com/webstore/detail/ghbmnnjooekpmoecnnnilnnbdlolhkhie
|
unknown
|
||
https://docs.google.com/
|
unknown
|
||
https://ac.ecosia.org/autocomplete?q=
|
unknown
|
||
https://drive-staging.corp.google.com/
|
unknown
|
||
https://drive-daily-6.corp.google.com/
|
unknown
|
||
https://drive.google.com/
|
unknown
|
||
https://drive-daily-0.corp.google.com/
|
unknown
|
||
https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
|
unknown
|
||
https://chrome.google.com/webstore/detail/ghbmnnjooekpmoecnnnilnnbdlolhkhi
|
unknown
|
||
https://chrome.google.com/webstore/detail/crypto/sha1:
|
unknown
|
||
https://github.com/urfave/cli/blob/main/docs/CHANGELOG.md#deprecated-cli-app-action-signature
|
unknown
|
||
https://drive-preprod.corp.google.com/
|
unknown
|
||
https://support.mozilla.org
|
unknown
|
||
https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
|
unknown
|
||
https://support.mozilla.org/products/firefoxgro.allizom.troppus.S3DiLP_FhcLK
|
unknown
|
||
https://drive-daily-3.corp.google.com/
|
unknown
|
There are 22 hidden URLs, click here to show them.
Domains
Name
|
IP
|
Malicious
|
|
---|---|---|---|
time.windows.com
|
unknown
|
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
4F1000
|
unkown
|
page execute and read and write
|
||
C00020E000
|
direct allocation
|
page read and write
|
||
24EFAFB6000
|
direct allocation
|
page read and write
|
||
D1AC3FE000
|
stack
|
page read and write
|
||
C000469000
|
direct allocation
|
page read and write
|
||
24EFAFC0000
|
direct allocation
|
page read and write
|
||
24EFAF90000
|
direct allocation
|
page read and write
|
||
C00042B000
|
direct allocation
|
page read and write
|
||
C0002CA000
|
direct allocation
|
page read and write
|
||
24EFACA0000
|
direct allocation
|
page read and write
|
||
C00027E000
|
direct allocation
|
page read and write
|
||
C00008E000
|
direct allocation
|
page read and write
|
||
C001153000
|
direct allocation
|
page read and write
|
||
C00027C000
|
direct allocation
|
page read and write
|
||
C000120000
|
direct allocation
|
page read and write
|
||
C000132000
|
direct allocation
|
page read and write
|
||
C000264000
|
direct allocation
|
page read and write
|
||
C00029E000
|
direct allocation
|
page read and write
|
||
C0003F7000
|
direct allocation
|
page read and write
|
||
C00012C000
|
direct allocation
|
page read and write
|
||
C000C51000
|
direct allocation
|
page read and write
|
||
C00013C000
|
direct allocation
|
page read and write
|
||
24EF5A10000
|
direct allocation
|
page read and write
|
||
C0001B8000
|
direct allocation
|
page read and write
|
||
C0001C7000
|
direct allocation
|
page read and write
|
||
C0002D4000
|
direct allocation
|
page read and write
|
||
C000178000
|
direct allocation
|
page read and write
|
||
C0000AE000
|
direct allocation
|
page read and write
|
||
C000441000
|
direct allocation
|
page read and write
|
||
C000DA1000
|
direct allocation
|
page read and write
|
||
C00042D000
|
direct allocation
|
page read and write
|
||
24EFAF40000
|
direct allocation
|
page read and write
|
||
C00022C000
|
direct allocation
|
page read and write
|
||
C00007A000
|
direct allocation
|
page read and write
|
||
C000126000
|
direct allocation
|
page read and write
|
||
C00037A000
|
direct allocation
|
page read and write
|
||
C000328000
|
direct allocation
|
page read and write
|
||
C00113A000
|
direct allocation
|
page read and write
|
||
C000010000
|
direct allocation
|
page read and write
|
||
C00034B000
|
direct allocation
|
page read and write
|
||
24EFAF26000
|
direct allocation
|
page read and write
|
||
C00018A000
|
direct allocation
|
page read and write
|
||
C0002FC000
|
direct allocation
|
page read and write
|
||
C000243000
|
direct allocation
|
page read and write
|
||
24EFAFC0000
|
direct allocation
|
page read and write
|
||
24EFB007000
|
direct allocation
|
page read and write
|
||
24EFAFA6000
|
direct allocation
|
page read and write
|
||
EAC000
|
unkown
|
page execute and read and write
|
||
C000108000
|
direct allocation
|
page read and write
|
||
C0000BC000
|
direct allocation
|
page read and write
|
||
C000248000
|
direct allocation
|
page read and write
|
||
C0002CE000
|
direct allocation
|
page read and write
|
||
24EFAF50000
|
direct allocation
|
page read and write
|
||
C000326000
|
direct allocation
|
page read and write
|
||
24EFAEF0000
|
direct allocation
|
page read and write
|
||
24EFAFB6000
|
direct allocation
|
page read and write
|
||
24EFAFB6000
|
direct allocation
|
page read and write
|
||
C000108000
|
direct allocation
|
page read and write
|
||
C000268000
|
direct allocation
|
page read and write
|
||
D1ACFFE000
|
stack
|
page read and write
|
||
4F0000
|
unkown
|
page readonly
|
||
C000308000
|
direct allocation
|
page read and write
|
||
24EFAFA9000
|
direct allocation
|
page read and write
|
||
24EFAF80000
|
direct allocation
|
page read and write
|
||
24EFAD20000
|
direct allocation
|
page read and write
|
||
24EFAF80000
|
direct allocation
|
page read and write
|
||
24EFAF20000
|
direct allocation
|
page read and write
|
||
24EFAF85000
|
direct allocation
|
page read and write
|
||
C000C89000
|
direct allocation
|
page read and write
|
||
24EFAF80000
|
direct allocation
|
page read and write
|
||
C000367000
|
direct allocation
|
page read and write
|
||
24EFAFA3000
|
direct allocation
|
page read and write
|
||
C0003FE000
|
direct allocation
|
page read and write
|
||
24EF5A30000
|
direct allocation
|
page read and write
|
||
C000304000
|
direct allocation
|
page read and write
|
||
C000298000
|
direct allocation
|
page read and write
|
||
C00001E000
|
direct allocation
|
page read and write
|
||
EE4000
|
unkown
|
page execute and read and write
|
||
C00005E000
|
direct allocation
|
page read and write
|
||
C00027A000
|
direct allocation
|
page read and write
|
||
C000C32000
|
direct allocation
|
page read and write
|
||
24EFB037000
|
direct allocation
|
page read and write
|
||
C00010E000
|
direct allocation
|
page read and write
|
||
C00042B000
|
direct allocation
|
page read and write
|
||
C0012A3000
|
direct allocation
|
page read and write
|
||
C000489000
|
direct allocation
|
page read and write
|
||
B72000
|
unkown
|
page execute and write copy
|
||
C0000A8000
|
direct allocation
|
page read and write
|
||
C0002A0000
|
direct allocation
|
page read and write
|
||
C0001FC000
|
direct allocation
|
page read and write
|
||
C000028000
|
direct allocation
|
page read and write
|
||
24EFACF0000
|
direct allocation
|
page read and write
|
||
C000268000
|
direct allocation
|
page read and write
|
||
C000C69000
|
direct allocation
|
page read and write
|
||
C0000A2000
|
direct allocation
|
page read and write
|
||
C0001BC000
|
direct allocation
|
page read and write
|
||
C00017E000
|
direct allocation
|
page read and write
|
||
C000004000
|
direct allocation
|
page read and write
|
||
C000370000
|
direct allocation
|
page read and write
|
||
24EFAF00000
|
direct allocation
|
page read and write
|
||
24EFAF70000
|
direct allocation
|
page read and write
|
||
C000100000
|
direct allocation
|
page read and write
|
||
C000106000
|
direct allocation
|
page read and write
|
||
C00004B000
|
direct allocation
|
page read and write
|
||
C000206000
|
direct allocation
|
page read and write
|
||
C000044000
|
direct allocation
|
page read and write
|
||
C000298000
|
direct allocation
|
page read and write
|
||
24EFAF40000
|
direct allocation
|
page read and write
|
||
C00027E000
|
direct allocation
|
page read and write
|
||
C0001C0000
|
direct allocation
|
page read and write
|
||
24EF5A45000
|
heap
|
page read and write
|
||
C000CD9000
|
direct allocation
|
page read and write
|
||
C0002B0000
|
direct allocation
|
page read and write
|
||
C00027A000
|
direct allocation
|
page read and write
|
||
EA3000
|
unkown
|
page execute and read and write
|
||
24EFAFC0000
|
direct allocation
|
page read and write
|
||
24EFAC9E000
|
direct allocation
|
page read and write
|
||
24EFAC97000
|
direct allocation
|
page read and write
|
||
C00005C000
|
direct allocation
|
page read and write
|
||
C00020C000
|
direct allocation
|
page read and write
|
||
C0000CA000
|
direct allocation
|
page read and write
|
||
D1AC9FE000
|
stack
|
page read and write
|
||
C00008C000
|
direct allocation
|
page read and write
|
||
C00003F000
|
direct allocation
|
page read and write
|
||
C000431000
|
direct allocation
|
page read and write
|
||
C0002A4000
|
direct allocation
|
page read and write
|
||
C0003EC000
|
direct allocation
|
page read and write
|
||
24EFAEF0000
|
direct allocation
|
page read and write
|
||
C00032F000
|
direct allocation
|
page read and write
|
||
C000451000
|
direct allocation
|
page read and write
|
||
C00017A000
|
direct allocation
|
page read and write
|
||
C0001EC000
|
direct allocation
|
page read and write
|
||
C0001FC000
|
direct allocation
|
page read and write
|
||
C000320000
|
direct allocation
|
page read and write
|
||
24EFAC7C000
|
direct allocation
|
page read and write
|
||
C000335000
|
direct allocation
|
page read and write
|
||
C000280000
|
direct allocation
|
page read and write
|
||
24EFAF80000
|
direct allocation
|
page read and write
|
||
C00120B000
|
direct allocation
|
page read and write
|
||
C0001EE000
|
direct allocation
|
page read and write
|
||
C0002BA000
|
direct allocation
|
page read and write
|
||
24EF5980000
|
heap
|
page read and write
|
||
C000184000
|
direct allocation
|
page read and write
|
||
C00017A000
|
direct allocation
|
page read and write
|
||
C0003F2000
|
direct allocation
|
page read and write
|
||
C000214000
|
direct allocation
|
page read and write
|
||
C000D01000
|
direct allocation
|
page read and write
|
||
C0001BA000
|
direct allocation
|
page read and write
|
||
C0001FE000
|
direct allocation
|
page read and write
|
||
C00004F000
|
direct allocation
|
page read and write
|
||
C000D69000
|
direct allocation
|
page read and write
|
||
C0003B5000
|
direct allocation
|
page read and write
|
||
EDD000
|
unkown
|
page execute and read and write
|
||
C00040A000
|
direct allocation
|
page read and write
|
||
C00037A000
|
direct allocation
|
page read and write
|
||
C000422000
|
direct allocation
|
page read and write
|
||
C00126B000
|
direct allocation
|
page read and write
|
||
C00026A000
|
direct allocation
|
page read and write
|
||
C000501000
|
direct allocation
|
page read and write
|
||
24EFAFC0000
|
direct allocation
|
page read and write
|
||
C000100000
|
direct allocation
|
page read and write
|
||
C000200000
|
direct allocation
|
page read and write
|
||
24EFAEA0000
|
direct allocation
|
page read and write
|
||
24EFAF90000
|
direct allocation
|
page read and write
|
||
C000002000
|
direct allocation
|
page read and write
|
||
C0002FA000
|
direct allocation
|
page read and write
|
||
24EF59B8000
|
direct allocation
|
page read and write
|
||
D1ACBFE000
|
stack
|
page read and write
|
||
24EFB048000
|
direct allocation
|
page read and write
|
||
C0000AE000
|
direct allocation
|
page read and write
|
||
24EFAF66000
|
direct allocation
|
page read and write
|
||
C0002B4000
|
direct allocation
|
page read and write
|
||
C0001F7000
|
direct allocation
|
page read and write
|
||
C000360000
|
direct allocation
|
page read and write
|
||
C000049000
|
direct allocation
|
page read and write
|
||
C000312000
|
direct allocation
|
page read and write
|
||
C000D09000
|
direct allocation
|
page read and write
|
||
C000345000
|
direct allocation
|
page read and write
|
||
24EFAFD0000
|
direct allocation
|
page read and write
|
||
C000D01000
|
direct allocation
|
page read and write
|
||
C00033F000
|
direct allocation
|
page read and write
|
||
C000042000
|
direct allocation
|
page read and write
|
||
C000233000
|
direct allocation
|
page read and write
|
||
C001143000
|
direct allocation
|
page read and write
|
||
C0001FC000
|
direct allocation
|
page read and write
|
||
24EFAFB6000
|
direct allocation
|
page read and write
|
||
C00028B000
|
direct allocation
|
page read and write
|
||
C000104000
|
direct allocation
|
page read and write
|
||
C001203000
|
direct allocation
|
page read and write
|
||
C00034D000
|
direct allocation
|
page read and write
|
||
24EFAEF5000
|
direct allocation
|
page read and write
|
||
C000118000
|
direct allocation
|
page read and write
|
||
24EFAF80000
|
direct allocation
|
page read and write
|
||
C0000AC000
|
direct allocation
|
page read and write
|
||
C00042F000
|
direct allocation
|
page read and write
|
||
C000316000
|
direct allocation
|
page read and write
|
||
C000385000
|
direct allocation
|
page read and write
|
||
C000511000
|
direct allocation
|
page read and write
|
||
C0001D0000
|
direct allocation
|
page read and write
|
||
C00016A000
|
direct allocation
|
page read and write
|
||
C0003A4000
|
direct allocation
|
page read and write
|
||
C001213000
|
direct allocation
|
page read and write
|
||
C000C89000
|
direct allocation
|
page read and write
|
||
C0002E0000
|
direct allocation
|
page read and write
|
||
C000164000
|
direct allocation
|
page read and write
|
||
C000136000
|
direct allocation
|
page read and write
|
||
24EFACD0000
|
direct allocation
|
page read and write
|
||
C000C41000
|
direct allocation
|
page read and write
|
||
D1AC5FF000
|
stack
|
page read and write
|
||
C000014000
|
direct allocation
|
page read and write
|
||
C0001E0000
|
direct allocation
|
page read and write
|
||
24EFAFA3000
|
direct allocation
|
page read and write
|
||
C00004D000
|
direct allocation
|
page read and write
|
||
24EFB028000
|
direct allocation
|
page read and write
|
||
C000088000
|
direct allocation
|
page read and write
|
||
24EF59B4000
|
direct allocation
|
page read and write
|
||
C0001A0000
|
direct allocation
|
page read and write
|
||
C000016000
|
direct allocation
|
page read and write
|
||
C000228000
|
direct allocation
|
page read and write
|
||
C000288000
|
direct allocation
|
page read and write
|
||
24EFAFC0000
|
direct allocation
|
page read and write
|
||
C000038000
|
direct allocation
|
page read and write
|
||
C00031A000
|
direct allocation
|
page read and write
|
||
24EFAF80000
|
direct allocation
|
page read and write
|
||
C000118000
|
direct allocation
|
page read and write
|
||
24EFAF90000
|
direct allocation
|
page read and write
|
||
C000353000
|
direct allocation
|
page read and write
|
||
C000438000
|
direct allocation
|
page read and write
|
||
C00042F000
|
direct allocation
|
page read and write
|
||
C000092000
|
direct allocation
|
page read and write
|
||
C00008E000
|
direct allocation
|
page read and write
|
||
C00020A000
|
direct allocation
|
page read and write
|
||
24EFAF45000
|
direct allocation
|
page read and write
|
||
C000314000
|
direct allocation
|
page read and write
|
||
C000380000
|
direct allocation
|
page read and write
|
||
C000324000
|
direct allocation
|
page read and write
|
||
C0001D0000
|
direct allocation
|
page read and write
|
||
C00010E000
|
direct allocation
|
page read and write
|
||
C00015C000
|
direct allocation
|
page read and write
|
||
C0001EC000
|
direct allocation
|
page read and write
|
||
C000178000
|
direct allocation
|
page read and write
|
||
C000266000
|
direct allocation
|
page read and write
|
||
C0001FE000
|
direct allocation
|
page read and write
|
||
24EFAFB0000
|
direct allocation
|
page read and write
|
||
C00029C000
|
direct allocation
|
page read and write
|
||
C0001A0000
|
direct allocation
|
page read and write
|
||
24EFAF00000
|
direct allocation
|
page read and write
|
||
C00033C000
|
direct allocation
|
page read and write
|
||
C0001F0000
|
direct allocation
|
page read and write
|
||
C000112000
|
direct allocation
|
page read and write
|
||
C000254000
|
direct allocation
|
page read and write
|
||
C000404000
|
direct allocation
|
page read and write
|
||
C000092000
|
direct allocation
|
page read and write
|
||
24EF5A40000
|
heap
|
page read and write
|
||
C00032F000
|
direct allocation
|
page read and write
|
||
C0001B2000
|
direct allocation
|
page read and write
|
||
C000104000
|
direct allocation
|
page read and write
|
||
C000306000
|
direct allocation
|
page read and write
|
||
24EFAF90000
|
direct allocation
|
page read and write
|
||
C00031E000
|
direct allocation
|
page read and write
|
||
C0005A1000
|
direct allocation
|
page read and write
|
||
C000021000
|
direct allocation
|
page read and write
|
||
C00022D000
|
direct allocation
|
page read and write
|
||
C000C61000
|
direct allocation
|
page read and write
|
||
C000130000
|
direct allocation
|
page read and write
|
||
24EFAFC0000
|
direct allocation
|
page read and write
|
||
24EFAF25000
|
direct allocation
|
page read and write
|
||
24EFAF30000
|
direct allocation
|
page read and write
|
||
C00027E000
|
direct allocation
|
page read and write
|
||
C00008A000
|
direct allocation
|
page read and write
|
||
C00003D000
|
direct allocation
|
page read and write
|
||
C000158000
|
direct allocation
|
page read and write
|
||
24EF5874000
|
heap
|
page read and write
|
||
C000218000
|
direct allocation
|
page read and write
|
||
C00015C000
|
direct allocation
|
page read and write
|
||
C000431000
|
direct allocation
|
page read and write
|
||
C000106000
|
direct allocation
|
page read and write
|
||
C000206000
|
direct allocation
|
page read and write
|
||
C0001E2000
|
direct allocation
|
page read and write
|
||
EE6000
|
unkown
|
page execute and write copy
|
||
24EFAD00000
|
direct allocation
|
page read and write
|
||
C00000A000
|
direct allocation
|
page read and write
|
||
C0001BE000
|
direct allocation
|
page read and write
|
||
C0011DB000
|
direct allocation
|
page read and write
|
||
C000348000
|
direct allocation
|
page read and write
|
||
24EFAF80000
|
direct allocation
|
page read and write
|
||
C0001F0000
|
direct allocation
|
page read and write
|
||
C0000BC000
|
direct allocation
|
page read and write
|
||
C000122000
|
direct allocation
|
page read and write
|
||
C0002C6000
|
direct allocation
|
page read and write
|
||
C0001FE000
|
direct allocation
|
page read and write
|
||
C000112000
|
direct allocation
|
page read and write
|
||
C000DA1000
|
direct allocation
|
page read and write
|
||
24EF5780000
|
heap
|
page read and write
|
||
C000080000
|
direct allocation
|
page read and write
|
||
EE8000
|
unkown
|
page write copy
|
||
C00008C000
|
direct allocation
|
page read and write
|
||
C000168000
|
direct allocation
|
page read and write
|
||
C00018A000
|
direct allocation
|
page read and write
|
||
24EFAF83000
|
direct allocation
|
page read and write
|
||
EE8000
|
unkown
|
page read and write
|
||
C0001DE000
|
direct allocation
|
page read and write
|
||
24EFAFA2000
|
direct allocation
|
page read and write
|
||
24EFAFA9000
|
direct allocation
|
page read and write
|
||
24EFAF83000
|
direct allocation
|
page read and write
|
||
C000000000
|
direct allocation
|
page read and write
|
||
C000298000
|
direct allocation
|
page read and write
|
||
24EFAC50000
|
direct allocation
|
page read and write
|
||
C000056000
|
direct allocation
|
page read and write
|
||
C000158000
|
direct allocation
|
page read and write
|
||
24EF586C000
|
heap
|
page read and write
|
||
C00116B000
|
direct allocation
|
page read and write
|
||
D1ACDFE000
|
stack
|
page read and write
|
||
24EFAFB6000
|
direct allocation
|
page read and write
|
||
C00026A000
|
direct allocation
|
page read and write
|
||
24EF5960000
|
heap
|
page read and write
|
||
C0000C6000
|
direct allocation
|
page read and write
|
||
C0000AC000
|
direct allocation
|
page read and write
|
||
C00029A000
|
direct allocation
|
page read and write
|
||
C000D11000
|
direct allocation
|
page read and write
|
||
C00118B000
|
direct allocation
|
page read and write
|
||
C000282000
|
direct allocation
|
page read and write
|
||
24EFAF83000
|
direct allocation
|
page read and write
|
||
C000D11000
|
direct allocation
|
page read and write
|
||
24EFAFA3000
|
direct allocation
|
page read and write
|
||
C0002D2000
|
direct allocation
|
page read and write
|
||
24EFAD2D000
|
direct allocation
|
page read and write
|
||
C000284000
|
direct allocation
|
page read and write
|
||
C00022A000
|
direct allocation
|
page read and write
|
||
C000262000
|
direct allocation
|
page read and write
|
||
C00017E000
|
direct allocation
|
page read and write
|
||
C000176000
|
direct allocation
|
page read and write
|
||
24EFAFC0000
|
direct allocation
|
page read and write
|
||
C0000DA000
|
direct allocation
|
page read and write
|
||
C000D09000
|
direct allocation
|
page read and write
|
||
C0000BA000
|
direct allocation
|
page read and write
|
||
C0001B1000
|
direct allocation
|
page read and write
|
||
24EFAFA9000
|
direct allocation
|
page read and write
|
||
24EFAD28000
|
direct allocation
|
page read and write
|
||
C00027C000
|
direct allocation
|
page read and write
|
||
C00017C000
|
direct allocation
|
page read and write
|
||
C000C38000
|
direct allocation
|
page read and write
|
||
24EFAF85000
|
direct allocation
|
page read and write
|
||
24EF5869000
|
heap
|
page read and write
|
||
C0004D9000
|
direct allocation
|
page read and write
|
||
24EFAF83000
|
direct allocation
|
page read and write
|
||
4F0000
|
unkown
|
page readonly
|
||
C000214000
|
direct allocation
|
page read and write
|
||
C00017C000
|
direct allocation
|
page read and write
|
||
D1AC7FE000
|
stack
|
page read and write
|
||
24EFAEF0000
|
direct allocation
|
page read and write
|
||
C0000F0000
|
direct allocation
|
page read and write
|
||
24EFAFA9000
|
direct allocation
|
page read and write
|
||
24EFAF16000
|
direct allocation
|
page read and write
|
||
24EFAF70000
|
direct allocation
|
page read and write
|
||
C001134000
|
direct allocation
|
page read and write
|
||
24EFAFA3000
|
direct allocation
|
page read and write
|
||
C0000DA000
|
direct allocation
|
page read and write
|
||
C0002B8000
|
direct allocation
|
page read and write
|
||
C0003DF000
|
direct allocation
|
page read and write
|
||
C0000C8000
|
direct allocation
|
page read and write
|
||
24EFAFC4000
|
direct allocation
|
page read and write
|
||
C0001DE000
|
direct allocation
|
page read and write
|
||
24EFAFC0000
|
direct allocation
|
page read and write
|
||
C000509000
|
direct allocation
|
page read and write
|
||
C001163000
|
direct allocation
|
page read and write
|
||
C00042D000
|
direct allocation
|
page read and write
|
||
C00038D000
|
direct allocation
|
page read and write
|
||
C00000E000
|
direct allocation
|
page read and write
|
||
C000D69000
|
direct allocation
|
page read and write
|
||
C00013C000
|
direct allocation
|
page read and write
|
||
C0000F0000
|
direct allocation
|
page read and write
|
||
C0002B0000
|
direct allocation
|
page read and write
|
||
24EFAEF3000
|
direct allocation
|
page read and write
|
||
C000088000
|
direct allocation
|
page read and write
|
||
E35000
|
unkown
|
page execute and read and write
|
||
24EFAF83000
|
direct allocation
|
page read and write
|
||
24EFAC90000
|
direct allocation
|
page read and write
|
||
24EFAF90000
|
direct allocation
|
page read and write
|
||
C000241000
|
direct allocation
|
page read and write
|
||
24EFAFA5000
|
direct allocation
|
page read and write
|
||
C0000A2000
|
direct allocation
|
page read and write
|
||
24EFB010000
|
direct allocation
|
page read and write
|
||
C00006E000
|
direct allocation
|
page read and write
|
||
C000408000
|
direct allocation
|
page read and write
|
||
C000164000
|
direct allocation
|
page read and write
|
||
24EFACE0000
|
direct allocation
|
page read and write
|
||
C000126000
|
direct allocation
|
page read and write
|
||
24EF59B0000
|
direct allocation
|
page read and write
|
||
24EFAF12000
|
direct allocation
|
page read and write
|
||
C00029E000
|
direct allocation
|
page read and write
|
||
24EFAFA6000
|
direct allocation
|
page read and write
|
||
C00005A000
|
direct allocation
|
page read and write
|
||
24EFAF90000
|
direct allocation
|
page read and write
|
||
24EF5860000
|
heap
|
page read and write
|
||
24EFAD10000
|
direct allocation
|
page read and write
|
||
C000086000
|
direct allocation
|
page read and write
|
||
C000212000
|
direct allocation
|
page read and write
|
||
C0002A0000
|
direct allocation
|
page read and write
|
||
24EFAFE6000
|
direct allocation
|
page read and write
|
||
C000569000
|
direct allocation
|
page read and write
|
||
C000306000
|
direct allocation
|
page read and write
|
||
C00028E000
|
direct allocation
|
page read and write
|
||
C000461000
|
direct allocation
|
page read and write
|
||
24EFAF90000
|
direct allocation
|
page read and write
|
||
C000CD9000
|
direct allocation
|
page read and write
|
||
C000286000
|
direct allocation
|
page read and write
|
||
C0002DC000
|
direct allocation
|
page read and write
|
||
D1AC1FD000
|
stack
|
page read and write
|
||
C0003CC000
|
direct allocation
|
page read and write
|
||
C000245000
|
direct allocation
|
page read and write
|
||
C0003DC000
|
direct allocation
|
page read and write
|
||
24EFAFB0000
|
direct allocation
|
page read and write
|
There are 403 hidden memdumps, click here to show them.