Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\AppData\Local\Temp\Temp1_MDE_File_Sample_a180428075a5fd23e3c8a51395fe04afb13da029.zip\Keygen.exe
|
"C:\Users\user\AppData\Local\Temp\Temp1_MDE_File_Sample_a180428075a5fd23e3c8a51395fe04afb13da029.zip\Keygen.exe"
|
||
C:\Users\user\AppData\Local\Temp\Temp1_MDE_File_Sample_a180428075a5fd23e3c8a51395fe04afb13da029.zip\Keygen.exe
|
"C:\Users\user\AppData\Local\Temp\Temp1_MDE_File_Sample_a180428075a5fd23e3c8a51395fe04afb13da029.zip\Keygen.exe"
|
||
C:\Windows\System32\rundll32.exe
|
C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6}
-Embedding
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Users\user\Desktop\MDE_File_Sample_a180428075a5fd23e3c8a51395fe04afb13da029\Keygen.exe
|
"C:\Users\user\Desktop\MDE_File_Sample_a180428075a5fd23e3c8a51395fe04afb13da029\Keygen.exe"
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Users\user\Desktop\MDE_File_Sample_a180428075a5fd23e3c8a51395fe04afb13da029\Keygen.exe
|
"C:\Users\user\Desktop\MDE_File_Sample_a180428075a5fd23e3c8a51395fe04afb13da029\Keygen.exe"
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Users\user\Desktop\MDE_File_Sample_a180428075a5fd23e3c8a51395fe04afb13da029\Keygen.exe
|
"C:\Users\user\Desktop\MDE_File_Sample_a180428075a5fd23e3c8a51395fe04afb13da029\Keygen.exe"
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Users\user\Desktop\MDE_File_Sample_a180428075a5fd23e3c8a51395fe04afb13da029\Keygen.exe
|
"C:\Users\user\Desktop\MDE_File_Sample_a180428075a5fd23e3c8a51395fe04afb13da029\Keygen.exe"
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Users\user\Desktop\MDE_File_Sample_a180428075a5fd23e3c8a51395fe04afb13da029\Keygen.exe
|
"C:\Users\user\Desktop\MDE_File_Sample_a180428075a5fd23e3c8a51395fe04afb13da029\Keygen.exe"
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Users\user\Desktop\Keygen.exe
|
"C:\Users\user\Desktop\Keygen.exe"
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
There are 7 hidden processes, click here to show them.
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
6DF1BFF000
|
stack
|
page read and write
|
||
F9603FD000
|
stack
|
page read and write
|
||
C000078000
|
direct allocation
|
page read and write
|
||
19939870000
|
heap
|
page read and write
|
||
1BCE0450000
|
heap
|
page read and write
|
||
170B1589000
|
direct allocation
|
page read and write
|
||
C000017000
|
direct allocation
|
page read and write
|
||
216D1B00000
|
heap
|
page read and write
|
||
C000012000
|
direct allocation
|
page read and write
|
||
F96000
|
unkown
|
page execute and read and write
|
||
C000126000
|
direct allocation
|
page read and write
|
||
C000136000
|
direct allocation
|
page read and write
|
||
664000
|
unkown
|
page execute and read and write
|
||
CC331FF000
|
stack
|
page read and write
|
||
C000078000
|
direct allocation
|
page read and write
|
||
7C349FF000
|
stack
|
page read and write
|
||
43F000
|
unkown
|
page write copy
|
||
C00003A000
|
direct allocation
|
page read and write
|
||
170B1725000
|
heap
|
page read and write
|
||
19939890000
|
heap
|
page read and write
|
||
F9607FF000
|
stack
|
page read and write
|
||
C000122000
|
direct allocation
|
page read and write
|
||
C000004000
|
direct allocation
|
page read and write
|
||
FDF4BFE000
|
stack
|
page read and write
|
||
28816720000
|
direct allocation
|
page read and write
|
||
21B06784000
|
direct allocation
|
page read and write
|
||
C000100000
|
direct allocation
|
page read and write
|
||
C00001C000
|
direct allocation
|
page read and write
|
||
C000114000
|
direct allocation
|
page read and write
|
||
216D1DD0000
|
direct allocation
|
page read and write
|
||
C000010000
|
direct allocation
|
page read and write
|
||
CC329FE000
|
stack
|
page read and write
|
||
C000146000
|
direct allocation
|
page read and write
|
||
C00005B000
|
direct allocation
|
page read and write
|
||
6D7497F000
|
stack
|
page read and write
|
||
19939B51000
|
direct allocation
|
page read and write
|
||
C000045000
|
direct allocation
|
page read and write
|
||
D2E000
|
unkown
|
page execute and read and write
|
||
170B1580000
|
direct allocation
|
page read and write
|
||
C000142000
|
direct allocation
|
page read and write
|
||
C000060000
|
direct allocation
|
page read and write
|
||
C00003A000
|
direct allocation
|
page read and write
|
||
C000060000
|
direct allocation
|
page read and write
|
||
C00005B000
|
direct allocation
|
page read and write
|
||
C00010E000
|
direct allocation
|
page read and write
|
||
633000
|
unkown
|
page execute and read and write
|
||
268D4236000
|
heap
|
page read and write
|
||
480E9FE000
|
stack
|
page read and write
|
||
C00003A000
|
direct allocation
|
page read and write
|
||
C000014000
|
direct allocation
|
page read and write
|
||
664000
|
unkown
|
page execute and read and write
|
||
636000
|
unkown
|
page execute and read and write
|
||
62F000
|
unkown
|
page execute and read and write
|
||
C000002000
|
direct allocation
|
page read and write
|
||
404000
|
unkown
|
page execute and read and write
|
||
54C000
|
unkown
|
page execute and read and write
|
||
C000060000
|
direct allocation
|
page read and write
|
||
C000064000
|
direct allocation
|
page read and write
|
||
C000025000
|
direct allocation
|
page read and write
|
||
C000014000
|
direct allocation
|
page read and write
|
||
C000002000
|
direct allocation
|
page read and write
|
||
C00015E000
|
direct allocation
|
page read and write
|
||
21B06560000
|
heap
|
page read and write
|
||
170B1584000
|
direct allocation
|
page read and write
|
||
C000050000
|
direct allocation
|
page read and write
|
||
7C347FF000
|
stack
|
page read and write
|
||
C00003A000
|
direct allocation
|
page read and write
|
||
480EBFE000
|
stack
|
page read and write
|
||
10B2000
|
unkown
|
page execute and read and write
|
||
170B1460000
|
heap
|
page read and write
|
||
268D4470000
|
direct allocation
|
page read and write
|
||
268D4404000
|
direct allocation
|
page read and write
|
||
22D67350000
|
direct allocation
|
page read and write
|
||
7C343FE000
|
stack
|
page read and write
|
||
9095FFE000
|
stack
|
page read and write
|
||
268F9ED1000
|
direct allocation
|
page read and write
|
||
C000030000
|
direct allocation
|
page read and write
|
||
216D1A60000
|
heap
|
page read and write
|
||
170B1720000
|
heap
|
page read and write
|
||
C000030000
|
direct allocation
|
page read and write
|
||
C00011C000
|
direct allocation
|
page read and write
|
||
C000030000
|
direct allocation
|
page read and write
|
||
C000030000
|
direct allocation
|
page read and write
|
||
C000025000
|
direct allocation
|
page read and write
|
||
C000030000
|
direct allocation
|
page read and write
|
||
C000022000
|
direct allocation
|
page read and write
|
||
10BE000
|
unkown
|
page execute and read and write
|
||
FDF51FF000
|
stack
|
page read and write
|
||
22D615FD000
|
heap
|
page read and write
|
||
506000
|
unkown
|
page execute and read and write
|
||
170D7031000
|
direct allocation
|
page read and write
|
||
CC32DFF000
|
stack
|
page read and write
|
||
C000110000
|
direct allocation
|
page read and write
|
||
C00000E000
|
direct allocation
|
page read and write
|
||
28816729000
|
direct allocation
|
page read and write
|
||
E0000
|
unkown
|
page readonly
|
||
288167E5000
|
heap
|
page read and write
|
||
C000064000
|
direct allocation
|
page read and write
|
||
C000120000
|
direct allocation
|
page read and write
|
||
C000072000
|
direct allocation
|
page read and write
|
||
D2A000
|
unkown
|
page execute and read and write
|
||
90967FF000
|
stack
|
page read and write
|
||
C00000C000
|
direct allocation
|
page read and write
|
||
C000050000
|
direct allocation
|
page read and write
|
||
C000025000
|
direct allocation
|
page read and write
|
||
170B1473000
|
heap
|
page read and write
|
||
1BCE0263000
|
heap
|
page read and write
|
||
622000
|
unkown
|
page execute and read and write
|
||
C000072000
|
direct allocation
|
page read and write
|
||
F9611FF000
|
stack
|
page read and write
|
||
C00001C000
|
direct allocation
|
page read and write
|
||
C000045000
|
direct allocation
|
page read and write
|
||
C000060000
|
direct allocation
|
page read and write
|
||
268D4210000
|
heap
|
page read and write
|
||
634000
|
unkown
|
page execute and read and write
|
||
DD0000
|
unkown
|
page readonly
|
||
E0000
|
unkown
|
page readonly
|
||
C00000C000
|
direct allocation
|
page read and write
|
||
C000022000
|
direct allocation
|
page read and write
|
||
19939C25000
|
heap
|
page read and write
|
||
22D672B0000
|
direct allocation
|
page read and write
|
||
C00001C000
|
direct allocation
|
page read and write
|
||
C00007D000
|
direct allocation
|
page read and write
|
||
6D7487E000
|
stack
|
page read and write
|
||
22D61800000
|
heap
|
page read and write
|
||
C000116000
|
direct allocation
|
page read and write
|
||
C00007D000
|
direct allocation
|
page read and write
|
||
1BCE0455000
|
heap
|
page read and write
|
||
C00011C000
|
direct allocation
|
page read and write
|
||
C000072000
|
direct allocation
|
page read and write
|
||
28816500000
|
heap
|
page read and write
|
||
6D748FF000
|
stack
|
page read and write
|
||
C000050000
|
direct allocation
|
page read and write
|
||
F960DFF000
|
stack
|
page read and write
|
||
28816780000
|
direct allocation
|
page read and write
|
||
21B2C110000
|
direct allocation
|
page read and write
|
||
C000102000
|
direct allocation
|
page read and write
|
||
F9E000
|
unkown
|
page execute and read and write
|
||
1BCE0250000
|
heap
|
page read and write
|
||
4785FD000
|
stack
|
page read and write
|
||
C000060000
|
direct allocation
|
page read and write
|
||
68B000
|
unkown
|
page execute and read and write
|
||
C000118000
|
direct allocation
|
page read and write
|
||
C00007D000
|
direct allocation
|
page read and write
|
||
2883C1F1000
|
direct allocation
|
page read and write
|
||
C000064000
|
direct allocation
|
page read and write
|
||
22D61850000
|
direct allocation
|
page read and write
|
||
C000072000
|
direct allocation
|
page read and write
|
||
C00012A000
|
direct allocation
|
page read and write
|
||
57C000
|
unkown
|
page execute and read and write
|
||
1BCE0359000
|
direct allocation
|
page read and write
|
||
E4E000
|
unkown
|
page execute and read and write
|
||
C00003A000
|
direct allocation
|
page read and write
|
||
C000022000
|
direct allocation
|
page read and write
|
||
C00001A000
|
direct allocation
|
page read and write
|
||
C00011A000
|
direct allocation
|
page read and write
|
||
C000114000
|
direct allocation
|
page read and write
|
||
21B06780000
|
direct allocation
|
page read and write
|
||
622000
|
unkown
|
page execute and read and write
|
||
480F5FE000
|
stack
|
page read and write
|
||
C000110000
|
direct allocation
|
page read and write
|
||
268D4230000
|
heap
|
page read and write
|
||
C000072000
|
direct allocation
|
page read and write
|
||
6DF25FE000
|
stack
|
page read and write
|
||
C000072000
|
direct allocation
|
page read and write
|
||
C000002000
|
direct allocation
|
page read and write
|
||
22D672D1000
|
direct allocation
|
page read and write
|
||
7C345FF000
|
stack
|
page read and write
|
||
268D4400000
|
direct allocation
|
page read and write
|
||
22D615F6000
|
heap
|
page read and write
|
||
C000035000
|
direct allocation
|
page read and write
|
||
C000030000
|
direct allocation
|
page read and write
|
||
C000072000
|
direct allocation
|
page read and write
|
||
9095BFF000
|
stack
|
page read and write
|
||
C000037000
|
direct allocation
|
page read and write
|
||
21B06590000
|
heap
|
page read and write
|
||
C000054000
|
direct allocation
|
page read and write
|
||
C000025000
|
direct allocation
|
page read and write
|
||
FDF4DFF000
|
stack
|
page read and write
|
||
C00010C000
|
direct allocation
|
page read and write
|
||
C000054000
|
direct allocation
|
page read and write
|
||
C00010A000
|
direct allocation
|
page read and write
|
||
C000037000
|
direct allocation
|
page read and write
|
||
C00007D000
|
direct allocation
|
page read and write
|
||
170B16F0000
|
direct allocation
|
page read and write
|
||
C00011A000
|
direct allocation
|
page read and write
|
||
C000078000
|
direct allocation
|
page read and write
|
||
68B000
|
unkown
|
page execute and read and write
|
||
480E7FD000
|
stack
|
page read and write
|
||
216D1E85000
|
heap
|
page read and write
|
||
FDF55FF000
|
stack
|
page read and write
|
||
288165E0000
|
heap
|
page read and write
|
||
9095DFE000
|
stack
|
page read and write
|
||
C000012000
|
direct allocation
|
page read and write
|
||
FDF4FFE000
|
stack
|
page read and write
|
||
19F288C9000
|
heap
|
page read and write
|
||
C000004000
|
direct allocation
|
page read and write
|
||
268D4460000
|
direct allocation
|
page read and write
|
||
C00003E000
|
direct allocation
|
page read and write
|
||
C000030000
|
direct allocation
|
page read and write
|
||
268D41F0000
|
heap
|
page read and write
|
||
28816724000
|
direct allocation
|
page read and write
|
||
22D671A0000
|
direct allocation
|
page read and write
|
||
C000006000
|
direct allocation
|
page read and write
|
||
CC333FE000
|
stack
|
page read and write
|
||
C00001C000
|
direct allocation
|
page read and write
|
||
4789FF000
|
stack
|
page read and write
|
||
D26000
|
unkown
|
page execute and read and write
|
||
50A000
|
unkown
|
page execute and read and write
|
||
C000054000
|
direct allocation
|
page read and write
|
||
10AA000
|
unkown
|
page execute and read and write
|
||
C00005B000
|
direct allocation
|
page read and write
|
||
C00010E000
|
direct allocation
|
page read and write
|
||
42B000
|
unkown
|
page execute and read and write
|
||
1BCE03D0000
|
direct allocation
|
page read and write
|
||
21B06760000
|
heap
|
page read and write
|
||
216D1A30000
|
heap
|
page read and write
|
||
C000114000
|
direct allocation
|
page read and write
|
||
22D615F9000
|
heap
|
page read and write
|
||
C000045000
|
direct allocation
|
page read and write
|
||
C000037000
|
direct allocation
|
page read and write
|
||
622000
|
unkown
|
page execute and read and write
|
||
68B000
|
unkown
|
page execute and read and write
|
||
C000054000
|
direct allocation
|
page read and write
|
||
C00001C000
|
direct allocation
|
page read and write
|
||
C00000E000
|
direct allocation
|
page read and write
|
||
664000
|
unkown
|
page execute and read and write
|
||
21B067F0000
|
heap
|
page read and write
|
||
C00005B000
|
direct allocation
|
page read and write
|
||
216D1AF0000
|
direct allocation
|
page read and write
|
||
268D44C0000
|
heap
|
page read and write
|
||
21B2C221000
|
direct allocation
|
page read and write
|
||
328000
|
unkown
|
page execute and write copy
|
||
C000114000
|
direct allocation
|
page read and write
|
||
C000064000
|
direct allocation
|
page read and write
|
||
4787FF000
|
stack
|
page read and write
|
||
62E000
|
unkown
|
page execute and read and write
|
||
7C34DFF000
|
stack
|
page read and write
|
||
622000
|
unkown
|
page execute and read and write
|
||
340000
|
unkown
|
page readonly
|
||
C00003A000
|
direct allocation
|
page read and write
|
||
268D4409000
|
direct allocation
|
page read and write
|
||
480EDFE000
|
stack
|
page read and write
|
||
C000037000
|
direct allocation
|
page read and write
|
||
43A000
|
unkown
|
page execute and read and write
|
||
4791FE000
|
stack
|
page read and write
|
||
CC32BFE000
|
stack
|
page read and write
|
||
111B000
|
unkown
|
page execute and read and write
|
||
C000037000
|
direct allocation
|
page read and write
|
||
C00001A000
|
direct allocation
|
page read and write
|
||
268D41E0000
|
heap
|
page read and write
|
||
E42000
|
unkown
|
page execute and read and write
|
||
19939920000
|
direct allocation
|
page read and write
|
||
199398B4000
|
direct allocation
|
page read and write
|
||
68B000
|
unkown
|
page execute and read and write
|
||
C000112000
|
direct allocation
|
page read and write
|
||
C00005B000
|
direct allocation
|
page read and write
|
||
FDF49FD000
|
stack
|
page read and write
|
||
D9C000
|
unkown
|
page execute and read and write
|
||
C000064000
|
direct allocation
|
page read and write
|
||
C00000C000
|
direct allocation
|
page read and write
|
||
1BCE03C0000
|
direct allocation
|
page read and write
|
||
C000012000
|
direct allocation
|
page read and write
|
||
C000022000
|
direct allocation
|
page read and write
|
||
22D61854000
|
direct allocation
|
page read and write
|
||
C000078000
|
direct allocation
|
page read and write
|
||
C000078000
|
direct allocation
|
page read and write
|
||
50E000
|
unkown
|
page execute and read and write
|
||
C00005B000
|
direct allocation
|
page read and write
|
||
22D61607000
|
heap
|
page read and write
|
||
C00004E000
|
direct allocation
|
page read and write
|
||
170B1700000
|
direct allocation
|
page read and write
|
||
216D1DF1000
|
direct allocation
|
page read and write
|
||
664000
|
unkown
|
page execute and read and write
|
||
7C341FF000
|
stack
|
page read and write
|
||
22D617E0000
|
heap
|
page read and write
|
||
6DF23FF000
|
stack
|
page read and write
|
||
478DFE000
|
stack
|
page read and write
|
||
43F000
|
unkown
|
page read and write
|
||
C00007D000
|
direct allocation
|
page read and write
|
||
21B067F5000
|
heap
|
page read and write
|
||
216D1A80000
|
direct allocation
|
page read and write
|
||
19F28870000
|
heap
|
page read and write
|
||
C00000C000
|
direct allocation
|
page read and write
|
||
C00010C000
|
direct allocation
|
page read and write
|
||
C00003C000
|
direct allocation
|
page read and write
|
||
C000110000
|
direct allocation
|
page read and write
|
||
6DF21FE000
|
stack
|
page read and write
|
||
28816609000
|
heap
|
page read and write
|
||
C000060000
|
direct allocation
|
page read and write
|
||
19939790000
|
heap
|
page read and write
|
||
6DF1DFF000
|
stack
|
page read and write
|
||
C000022000
|
direct allocation
|
page read and write
|
||
C00000C000
|
direct allocation
|
page read and write
|
||
C000012000
|
direct allocation
|
page read and write
|
||
22D6185B000
|
direct allocation
|
page read and write
|
||
21B06789000
|
direct allocation
|
page read and write
|
||
C000025000
|
direct allocation
|
page read and write
|
||
C000020000
|
direct allocation
|
page read and write
|
||
C000110000
|
direct allocation
|
page read and write
|
||
C00003C000
|
direct allocation
|
page read and write
|
||
90965FE000
|
stack
|
page read and write
|
||
19939930000
|
direct allocation
|
page read and write
|
||
19F28770000
|
heap
|
page read and write
|
||
664000
|
unkown
|
page execute and read and write
|
||
431000
|
unkown
|
page execute and read and write
|
||
C000045000
|
direct allocation
|
page read and write
|
||
C00003E000
|
direct allocation
|
page read and write
|
||
19939C20000
|
heap
|
page read and write
|
||
19939958000
|
heap
|
page read and write
|
||
C00007D000
|
direct allocation
|
page read and write
|
||
C000045000
|
direct allocation
|
page read and write
|
||
170B1560000
|
heap
|
page read and write
|
||
CC32FFF000
|
stack
|
page read and write
|
||
C000027000
|
direct allocation
|
page read and write
|
||
C000050000
|
direct allocation
|
page read and write
|
||
C000025000
|
direct allocation
|
page read and write
|
||
22D61859000
|
direct allocation
|
page read and write
|
||
C000114000
|
direct allocation
|
page read and write
|
||
CC327FD000
|
stack
|
page read and write
|
||
C000037000
|
direct allocation
|
page read and write
|
||
C000108000
|
direct allocation
|
page read and write
|
||
DD0000
|
unkown
|
page readonly
|
||
216D1A40000
|
heap
|
page read and write
|
||
7C33FFD000
|
stack
|
page read and write
|
||
C000064000
|
direct allocation
|
page read and write
|
||
19F28850000
|
heap
|
page read and write
|
||
C000035000
|
direct allocation
|
page read and write
|
||
C00005B000
|
direct allocation
|
page read and write
|
||
C000072000
|
direct allocation
|
page read and write
|
||
22D61840000
|
heap
|
page read and write
|
||
636000
|
unkown
|
page execute and read and write
|
||
C000128000
|
direct allocation
|
page read and write
|
||
C000025000
|
direct allocation
|
page read and write
|
||
21B06580000
|
direct allocation
|
page read and write
|
||
288167E0000
|
heap
|
page read and write
|
||
C00001C000
|
direct allocation
|
page read and write
|
||
636000
|
unkown
|
page execute and read and write
|
||
B60000
|
unkown
|
page readonly
|
||
28816790000
|
direct allocation
|
page read and write
|
||
19F2A380000
|
heap
|
page read and write
|
||
C000110000
|
direct allocation
|
page read and write
|
||
D8E000
|
unkown
|
page execute and read and write
|
||
C000074000
|
direct allocation
|
page read and write
|
||
216D1B13000
|
heap
|
page read and write
|
||
C000114000
|
direct allocation
|
page read and write
|
||
21B0659C000
|
heap
|
page read and write
|
||
C000035000
|
direct allocation
|
page read and write
|
||
C00003E000
|
direct allocation
|
page read and write
|
||
C000045000
|
direct allocation
|
page read and write
|
||
C000014000
|
direct allocation
|
page read and write
|
||
C00003A000
|
direct allocation
|
page read and write
|
||
C00007D000
|
direct allocation
|
page read and write
|
||
E1000
|
unkown
|
page execute and read and write
|
||
28816613000
|
heap
|
page read and write
|
||
C000004000
|
direct allocation
|
page read and write
|
||
C00003A000
|
direct allocation
|
page read and write
|
||
C00014E000
|
direct allocation
|
page read and write
|
||
90959FD000
|
stack
|
page read and write
|
||
F9609FF000
|
stack
|
page read and write
|
||
268D423D000
|
heap
|
page read and write
|
||
C000025000
|
direct allocation
|
page read and write
|
||
C000054000
|
direct allocation
|
page read and write
|
||
C000045000
|
direct allocation
|
page read and write
|
||
C00003C000
|
direct allocation
|
page read and write
|
||
C000050000
|
direct allocation
|
page read and write
|
||
FFE000
|
unkown
|
page execute and read and write
|
||
C000050000
|
direct allocation
|
page read and write
|
||
E84000
|
unkown
|
page execute and read and write
|
||
340000
|
unkown
|
page readonly
|
||
28816700000
|
heap
|
page read and write
|
||
C000107000
|
direct allocation
|
page read and write
|
||
6D7459C000
|
stack
|
page read and write
|
||
1BCE0354000
|
direct allocation
|
page read and write
|
||
268D44C5000
|
heap
|
page read and write
|
||
C00003C000
|
direct allocation
|
page read and write
|
||
622000
|
unkown
|
page execute and read and write
|
||
288167A0000
|
direct allocation
|
page read and write
|
||
FDF53FE000
|
stack
|
page read and write
|
||
22D61845000
|
heap
|
page read and write
|
||
EAB000
|
unkown
|
page execute and read and write
|
||
22D61700000
|
heap
|
page read and write
|
||
478FFF000
|
stack
|
page read and write
|
||
B60000
|
unkown
|
page readonly
|
||
19F28A45000
|
heap
|
page read and write
|
||
10F4000
|
unkown
|
page execute and read and write
|
||
C00010E000
|
direct allocation
|
page read and write
|
||
E3A000
|
unkown
|
page execute and read and write
|
||
C00000C000
|
direct allocation
|
page read and write
|
||
F9A000
|
unkown
|
page execute and read and write
|
||
6DF17FD000
|
stack
|
page read and write
|
||
C000050000
|
direct allocation
|
page read and write
|
||
C000078000
|
direct allocation
|
page read and write
|
||
C000022000
|
direct allocation
|
page read and write
|
||
C00003C000
|
direct allocation
|
page read and write
|
||
1BCE03F1000
|
direct allocation
|
page read and write
|
||
C000037000
|
direct allocation
|
page read and write
|
||
C000030000
|
direct allocation
|
page read and write
|
||
C000054000
|
direct allocation
|
page read and write
|
||
C000050000
|
direct allocation
|
page read and write
|
||
C000074000
|
direct allocation
|
page read and write
|
||
268D4480000
|
direct allocation
|
page read and write
|
||
C00011A000
|
direct allocation
|
page read and write
|
||
19939910000
|
direct allocation
|
page read and write
|
||
90961FE000
|
stack
|
page read and write
|
||
478BFE000
|
stack
|
page read and write
|
||
22D67190000
|
direct allocation
|
page read and write
|
||
1BCE0350000
|
direct allocation
|
page read and write
|
||
61A000
|
unkown
|
page execute and read and write
|
||
21B06550000
|
heap
|
page read and write
|
||
C000110000
|
direct allocation
|
page read and write
|
||
170B1440000
|
heap
|
page read and write
|
||
100C000
|
unkown
|
page execute and read and write
|
||
1BCE0130000
|
heap
|
page read and write
|
||
C000122000
|
direct allocation
|
page read and write
|
||
C00001C000
|
direct allocation
|
page read and write
|
||
C000004000
|
direct allocation
|
page read and write
|
||
22D67194000
|
direct allocation
|
page read and write
|
||
170B1468000
|
heap
|
page read and write
|
||
F9605FF000
|
stack
|
page read and write
|
||
C000045000
|
direct allocation
|
page read and write
|
||
C000060000
|
direct allocation
|
page read and write
|
||
C000014000
|
direct allocation
|
page read and write
|
||
90963FE000
|
stack
|
page read and write
|
||
C000120000
|
direct allocation
|
page read and write
|
||
C000112000
|
direct allocation
|
page read and write
|
||
CC335FF000
|
stack
|
page read and write
|
||
1BCE0259000
|
heap
|
page read and write
|
||
634000
|
unkown
|
page execute and read and write
|
||
C000064000
|
direct allocation
|
page read and write
|
||
C00005B000
|
direct allocation
|
page read and write
|
||
C000035000
|
direct allocation
|
page read and write
|
||
C000054000
|
direct allocation
|
page read and write
|
||
C000037000
|
direct allocation
|
page read and write
|
||
7C34BFE000
|
stack
|
page read and write
|
||
C00012C000
|
direct allocation
|
page read and write
|
||
C000116000
|
direct allocation
|
page read and write
|
||
56E000
|
unkown
|
page execute and read and write
|
||
216D1B08000
|
heap
|
page read and write
|
||
F960FFE000
|
stack
|
page read and write
|
||
C000054000
|
direct allocation
|
page read and write
|
||
C000078000
|
direct allocation
|
page read and write
|
||
6DF1FFE000
|
stack
|
page read and write
|
||
C000002000
|
direct allocation
|
page read and write
|
||
1BCE0210000
|
heap
|
page read and write
|
||
480EFFF000
|
stack
|
page read and write
|
||
216D1E80000
|
heap
|
page read and write
|
||
C000022000
|
direct allocation
|
page read and write
|
||
1BCE0230000
|
heap
|
page read and write
|
||
C000022000
|
direct allocation
|
page read and write
|
||
19939950000
|
heap
|
page read and write
|
||
216D1A89000
|
direct allocation
|
page read and write
|
||
4793FF000
|
stack
|
page read and write
|
||
F960BFF000
|
stack
|
page read and write
|
||
C00000C000
|
direct allocation
|
page read and write
|
||
C00000C000
|
direct allocation
|
page read and write
|
||
170B1360000
|
heap
|
page read and write
|
||
19F28A40000
|
heap
|
page read and write
|
||
634000
|
unkown
|
page execute and read and write
|
||
6DF19FF000
|
stack
|
page read and write
|
||
199398B0000
|
direct allocation
|
page read and write
|
||
28816600000
|
heap
|
page read and write
|
||
C00011E000
|
direct allocation
|
page read and write
|
||
480F3FE000
|
stack
|
page read and write
|
||
C000064000
|
direct allocation
|
page read and write
|
||
FDC000
|
unkown
|
page execute and read and write
|
||
C000020000
|
direct allocation
|
page read and write
|
||
D6C000
|
unkown
|
page execute and read and write
|
||
68B000
|
unkown
|
page execute and read and write
|
||
C000124000
|
direct allocation
|
page read and write
|
||
480F1FF000
|
stack
|
page read and write
|
||
1BCE03B0000
|
direct allocation
|
page read and write
|
||
19F288C0000
|
heap
|
page read and write
|
||
C000110000
|
direct allocation
|
page read and write
|
||
22D615F0000
|
heap
|
page read and write
|
||
C00001C000
|
direct allocation
|
page read and write
|
||
216D1A84000
|
direct allocation
|
page read and write
|
||
199398B9000
|
direct allocation
|
page read and write
|
There are 468 hidden memdumps, click here to show them.