Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
Payment Advice__Swift-MT103.pdf.bat.exe
|
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
|
initial sample
|
||
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\Payment Advice__Swift-MT103.pdf.bat.exe.log
|
ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\tmp319C.tmp
|
XML 1.0 document, ASCII text
|
dropped
|
||
C:\Users\user\AppData\Roaming\PQHcRKfCm.exe
|
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\PQHcRKfCm.exe:Zone.Identifier
|
ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\PQHcRKfCm.exe.log
|
ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\T9RRWRNL\json[1].json
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_calkz5xu.qtz.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_gwmnvu4c.4ut.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_l4m1sisr.doi.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_m5qythae.3o4.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_n4cejotj.wpc.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_tsteecit.dil.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_uxpc05bu.1xp.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_yuy2ahqh.b0p.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\tmp4459.tmp
|
XML 1.0 document, ASCII text
|
dropped
|
There are 7 hidden files, click here to show them.
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\Payment Advice__Swift-MT103.pdf.bat.exe
|
"C:\Users\user\Desktop\Payment Advice__Swift-MT103.pdf.bat.exe"
|
||
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
|
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\Payment
Advice__Swift-MT103.pdf.bat.exe"
|
||
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
|
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\PQHcRKfCm.exe"
|
||
C:\Windows\SysWOW64\schtasks.exe
|
"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\PQHcRKfCm" /XML "C:\Users\user\AppData\Local\Temp\tmp319C.tmp"
|
||
C:\Users\user\Desktop\Payment Advice__Swift-MT103.pdf.bat.exe
|
"C:\Users\user\Desktop\Payment Advice__Swift-MT103.pdf.bat.exe"
|
||
C:\Users\user\Desktop\Payment Advice__Swift-MT103.pdf.bat.exe
|
"C:\Users\user\Desktop\Payment Advice__Swift-MT103.pdf.bat.exe"
|
||
C:\Users\user\AppData\Roaming\PQHcRKfCm.exe
|
C:\Users\user\AppData\Roaming\PQHcRKfCm.exe
|
||
C:\Windows\SysWOW64\schtasks.exe
|
"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\PQHcRKfCm" /XML "C:\Users\user\AppData\Local\Temp\tmp4459.tmp"
|
||
C:\Users\user\AppData\Roaming\PQHcRKfCm.exe
|
"C:\Users\user\AppData\Roaming\PQHcRKfCm.exe"
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\wbem\WmiPrvSE.exe
|
C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
There are 4 hidden processes, click here to show them.
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
204.10.160.230
|
|||
http://geoplugin.net/json.gp
|
178.237.33.50
|
||
http://geoplugin.net/json.gpH
|
unknown
|
||
http://geoplugin.net/R
|
unknown
|
||
http://geoplugin.net/json.gp/C
|
unknown
|
||
http://geoplugin.net/json.gpL
|
unknown
|
||
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
|
unknown
|
||
https://www.chiark.greenend.org.uk/~sgtatham/putty/0
|
unknown
|
||
http://geoplugin.net/json.gpSystem32
|
unknown
|
Domains
Name
|
IP
|
Malicious
|
|
---|---|---|---|
geoplugin.net
|
178.237.33.50
|
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
204.10.160.230
|
unknown
|
Canada
|
||
178.237.33.50
|
geoplugin.net
|
Netherlands
|
Registry
Path
|
Value
|
Malicious
|
|
---|---|---|---|
HKEY_CURRENT_USER\SOFTWARE\Rmc-O7QOC3
|
exepath
|
||
HKEY_CURRENT_USER\SOFTWARE\Rmc-O7QOC3
|
licence
|
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
42AA000
|
trusted library allocation
|
page read and write
|
||
3B0B000
|
trusted library allocation
|
page read and write
|
||
DFA000
|
heap
|
page read and write
|
||
12BA000
|
heap
|
page read and write
|
||
400000
|
remote allocation
|
page execute and read and write
|
||
2A40000
|
trusted library allocation
|
page execute and read and write
|
||
28A5000
|
trusted library allocation
|
page read and write
|
||
5455000
|
heap
|
page read and write
|
||
3190000
|
trusted library allocation
|
page read and write
|
||
31A0000
|
trusted library allocation
|
page read and write
|
||
5C9E000
|
heap
|
page read and write
|
||
AF0000
|
trusted library allocation
|
page read and write
|
||
50CB000
|
stack
|
page read and write
|
||
2844000
|
trusted library allocation
|
page read and write
|
||
28BD000
|
stack
|
page read and write
|
||
28B0000
|
trusted library allocation
|
page read and write
|
||
7F300000
|
trusted library allocation
|
page execute and read and write
|
||
3140000
|
trusted library allocation
|
page read and write
|
||
2A80000
|
trusted library allocation
|
page read and write
|
||
B2A000
|
heap
|
page read and write
|
||
88E000
|
unkown
|
page read and write
|
||
B62000
|
heap
|
page read and write
|
||
2ED0000
|
trusted library allocation
|
page read and write
|
||
D20000
|
unkown
|
page readonly
|
||
AFD000
|
trusted library allocation
|
page execute and read and write
|
||
A1BE000
|
stack
|
page read and write
|
||
C5FF000
|
stack
|
page read and write
|
||
F77000
|
heap
|
page read and write
|
||
770000
|
heap
|
page read and write
|
||
73CE000
|
heap
|
page read and write
|
||
2880000
|
trusted library allocation
|
page read and write
|
||
4C1E000
|
trusted library allocation
|
page read and write
|
||
2A90000
|
heap
|
page execute and read and write
|
||
3548000
|
trusted library allocation
|
page read and write
|
||
C37C000
|
stack
|
page read and write
|
||
590000
|
heap
|
page read and write
|
||
B1A000
|
trusted library allocation
|
page execute and read and write
|
||
3241000
|
trusted library allocation
|
page read and write
|
||
1189D000
|
trusted library allocation
|
page read and write
|
||
107F000
|
stack
|
page read and write
|
||
58C0000
|
heap
|
page read and write
|
||
4269000
|
trusted library allocation
|
page read and write
|
||
284B000
|
trusted library allocation
|
page read and write
|
||
1882000
|
trusted library allocation
|
page read and write
|
||
1886000
|
trusted library allocation
|
page execute and read and write
|
||
B60000
|
heap
|
page read and write
|
||
5700000
|
heap
|
page read and write
|
||
784E000
|
stack
|
page read and write
|
||
2B6F000
|
stack
|
page read and write
|
||
5450000
|
heap
|
page read and write
|
||
5B70000
|
trusted library allocation
|
page read and write
|
||
29AF000
|
stack
|
page read and write
|
||
4A97000
|
trusted library allocation
|
page read and write
|
||
B12000
|
trusted library allocation
|
page read and write
|
||
2A20000
|
heap
|
page read and write
|
||
3080000
|
trusted library allocation
|
page read and write
|
||
2820000
|
trusted library allocation
|
page execute and read and write
|
||
12A0000
|
heap
|
page read and write
|
||
73B3000
|
heap
|
page read and write
|
||
5200000
|
heap
|
page read and write
|
||
E60000
|
heap
|
page read and write
|
||
780E000
|
stack
|
page read and write
|
||
B0D000
|
trusted library allocation
|
page execute and read and write
|
||
5AED000
|
stack
|
page read and write
|
||
34EF000
|
stack
|
page read and write
|
||
29FE000
|
stack
|
page read and write
|
||
70B0000
|
trusted library allocation
|
page execute and read and write
|
||
3060000
|
trusted library allocation
|
page read and write
|
||
4FD3000
|
heap
|
page read and write
|
||
13EB000
|
heap
|
page read and write
|
||
15B0000
|
trusted library allocation
|
page read and write
|
||
70A000
|
stack
|
page read and write
|
||
75DE000
|
stack
|
page read and write
|
||
1270000
|
heap
|
page read and write
|
||
122EE000
|
stack
|
page read and write
|
||
18B7000
|
heap
|
page read and write
|
||
2A66000
|
trusted library allocation
|
page read and write
|
||
8EC000
|
stack
|
page read and write
|
||
3AC9000
|
trusted library allocation
|
page read and write
|
||
5250000
|
heap
|
page execute and read and write
|
||
5690000
|
trusted library allocation
|
page execute and read and write
|
||
D22000
|
unkown
|
page readonly
|
||
3176000
|
trusted library allocation
|
page read and write
|
||
31C0000
|
trusted library allocation
|
page read and write
|
||
702E000
|
stack
|
page read and write
|
||
583C000
|
stack
|
page read and write
|
||
5B90000
|
heap
|
page read and write
|
||
6BAB000
|
heap
|
page read and write
|
||
6B60000
|
heap
|
page read and write
|
||
2850000
|
trusted library allocation
|
page read and write
|
||
57F000
|
unkown
|
page read and write
|
||
28D0000
|
trusted library allocation
|
page read and write
|
||
AA5000
|
heap
|
page read and write
|
||
13A9000
|
heap
|
page read and write
|
||
30DE000
|
stack
|
page read and write
|
||
BD6000
|
heap
|
page read and write
|
||
BCA000
|
heap
|
page read and write
|
||
1499000
|
heap
|
page read and write
|
||
4AE5000
|
trusted library allocation
|
page read and write
|
||
BB7000
|
heap
|
page read and write
|
||
3050000
|
heap
|
page read and write
|
||
AA0000
|
heap
|
page read and write
|
||
E62000
|
heap
|
page read and write
|
||
EAA000
|
stack
|
page read and write
|
||
16AE000
|
stack
|
page read and write
|
||
9EC000
|
stack
|
page read and write
|
||
1220000
|
heap
|
page read and write
|
||
43E000
|
unkown
|
page read and write
|
||
B16000
|
trusted library allocation
|
page execute and read and write
|
||
306E000
|
trusted library allocation
|
page read and write
|
||
B10000
|
trusted library allocation
|
page read and write
|
||
5D90000
|
trusted library section
|
page read and write
|
||
B4EE000
|
stack
|
page read and write
|
||
B54000
|
heap
|
page read and write
|
||
E3C000
|
heap
|
page read and write
|
||
1897000
|
trusted library allocation
|
page execute and read and write
|
||
15CD000
|
trusted library allocation
|
page execute and read and write
|
||
E10000
|
trusted library allocation
|
page read and write
|
||
5710000
|
heap
|
page read and write
|
||
5210000
|
trusted library allocation
|
page read and write
|
||
BFDE000
|
stack
|
page read and write
|
||
C0DE000
|
stack
|
page read and write
|
||
5460000
|
heap
|
page read and write
|
||
3090000
|
trusted library allocation
|
page read and write
|
||
EF0000
|
heap
|
page read and write
|
||
BB3000
|
heap
|
page read and write
|
||
7F9F0000
|
trusted library allocation
|
page execute and read and write
|
||
A13D000
|
stack
|
page read and write
|
||
BE9D000
|
stack
|
page read and write
|
||
5BC1000
|
heap
|
page read and write
|
||
448000
|
heap
|
page read and write
|
||
4393000
|
trusted library allocation
|
page read and write
|
||
B58C000
|
stack
|
page read and write
|
||
78B0000
|
trusted library allocation
|
page execute and read and write
|
||
189B000
|
trusted library allocation
|
page execute and read and write
|
||
2A30000
|
trusted library allocation
|
page read and write
|
||
15AE000
|
stack
|
page read and write
|
||
BD2000
|
heap
|
page read and write
|
||
57F0000
|
heap
|
page read and write
|
||
6EF000
|
stack
|
page read and write
|
||
57F3000
|
heap
|
page read and write
|
||
2890000
|
trusted library allocation
|
page read and write
|
||
FA7000
|
stack
|
page read and write
|
||
EE0000
|
heap
|
page read and write
|
||
7405000
|
heap
|
page read and write
|
||
4B33000
|
trusted library allocation
|
page read and write
|
||
292F000
|
unkown
|
page read and write
|
||
1F0000
|
heap
|
page read and write
|
||
BFC000
|
heap
|
page read and write
|
||
AF3000
|
trusted library allocation
|
page execute and read and write
|
||
759F000
|
stack
|
page read and write
|
||
76DE000
|
stack
|
page read and write
|
||
475000
|
remote allocation
|
page execute and read and write
|
||
315B000
|
trusted library allocation
|
page read and write
|
||
46E000
|
remote allocation
|
page execute and read and write
|
||
471000
|
remote allocation
|
page execute and read and write
|
||
15C3000
|
trusted library allocation
|
page execute and read and write
|
||
73DB000
|
heap
|
page read and write
|
||
333A000
|
trusted library allocation
|
page read and write
|
||
51F0000
|
heap
|
page read and write
|
||
DE7000
|
heap
|
page read and write
|
||
3171000
|
trusted library allocation
|
page read and write
|
||
E65000
|
heap
|
page read and write
|
||
73C8000
|
heap
|
page read and write
|
||
15C4000
|
trusted library allocation
|
page read and write
|
||
7710000
|
trusted library section
|
page read and write
|
||
B20000
|
heap
|
page read and write
|
||
C50000
|
heap
|
page read and write
|
||
AF4000
|
trusted library allocation
|
page read and write
|
||
126E000
|
stack
|
page read and write
|
||
BD50000
|
heap
|
page read and write
|
||
C3BD000
|
stack
|
page read and write
|
||
6FEE000
|
stack
|
page read and write
|
||
159E000
|
stack
|
page read and write
|
||
EBC000
|
stack
|
page read and write
|
||
33EE000
|
stack
|
page read and write
|
||
2FA0000
|
heap
|
page read and write
|
||
56D0000
|
trusted library allocation
|
page read and write
|
||
306A000
|
trusted library allocation
|
page read and write
|
||
BA4F000
|
stack
|
page read and write
|
||
73D6000
|
heap
|
page read and write
|
||
1200000
|
heap
|
page read and write
|
||
313B000
|
stack
|
page read and write
|
||
5B80000
|
heap
|
page read and write
|
||
29C0000
|
heap
|
page read and write
|
||
2870000
|
trusted library allocation
|
page read and write
|
||
301F000
|
stack
|
page read and write
|
||
DEF000
|
stack
|
page read and write
|
||
28F0000
|
heap
|
page read and write
|
||
2884000
|
trusted library allocation
|
page read and write
|
||
A9E000
|
stack
|
page read and write
|
||
6DDE000
|
stack
|
page read and write
|
||
51CE000
|
stack
|
page read and write
|
||
317D000
|
trusted library allocation
|
page read and write
|
||
123ED000
|
stack
|
page read and write
|
||
A00000
|
heap
|
page read and write
|
||
FBC000
|
stack
|
page read and write
|
||
5260000
|
heap
|
page read and write
|
||
FF0000
|
heap
|
page read and write
|
||
3220000
|
heap
|
page read and write
|
||
749E000
|
stack
|
page read and write
|
||
B2EE000
|
stack
|
page read and write
|
||
E9B000
|
stack
|
page read and write
|
||
E5A000
|
heap
|
page read and write
|
||
15C0000
|
trusted library allocation
|
page read and write
|
||
A534000
|
trusted library allocation
|
page read and write
|
||
BFF000
|
heap
|
page read and write
|
||
3020000
|
heap
|
page read and write
|
||
2872000
|
trusted library allocation
|
page read and write
|
||
2830000
|
trusted library allocation
|
page read and write
|
||
BD4D000
|
stack
|
page read and write
|
||
2C8A000
|
heap
|
page read and write
|
||
5240000
|
trusted library allocation
|
page read and write
|
||
70AD000
|
stack
|
page read and write
|
||
4249000
|
trusted library allocation
|
page read and write
|
||
440000
|
heap
|
page read and write
|
||
780000
|
heap
|
page read and write
|
||
147F000
|
heap
|
page read and write
|
||
C25000
|
heap
|
page read and write
|
||
3040000
|
trusted library allocation
|
page execute and read and write
|
||
33F0000
|
trusted library allocation
|
page read and write
|
||
2861000
|
trusted library allocation
|
page read and write
|
||
F30000
|
trusted library allocation
|
page read and write
|
||
31B0000
|
trusted library allocation
|
page read and write
|
||
149D000
|
heap
|
page read and write
|
||
D70000
|
heap
|
page read and write
|
||
DF2000
|
trusted library allocation
|
page read and write
|
||
BF9E000
|
stack
|
page read and write
|
||
2A60000
|
trusted library allocation
|
page read and write
|
||
2A1E000
|
stack
|
page read and write
|
||
120EE000
|
stack
|
page read and write
|
||
4B9C000
|
stack
|
page read and write
|
||
1444000
|
heap
|
page read and write
|
||
12A7000
|
heap
|
page read and write
|
||
76E0000
|
trusted library section
|
page read and write
|
||
6C7E000
|
stack
|
page read and write
|
||
6D7F000
|
stack
|
page read and write
|
||
C20000
|
heap
|
page read and write
|
||
79C2000
|
trusted library allocation
|
page read and write
|
||
A10000
|
heap
|
page read and write
|
||
6CD000
|
stack
|
page read and write
|
||
F35000
|
trusted library allocation
|
page read and write
|
||
2840000
|
trusted library allocation
|
page read and write
|
||
7A7000
|
stack
|
page read and write
|
||
135E000
|
stack
|
page read and write
|
||
BC4F000
|
stack
|
page read and write
|
||
1890000
|
trusted library allocation
|
page read and write
|
||
4FD0000
|
heap
|
page read and write
|
||
56B0000
|
trusted library allocation
|
page read and write
|
||
3182000
|
trusted library allocation
|
page read and write
|
||
3150000
|
trusted library allocation
|
page read and write
|
||
316E000
|
trusted library allocation
|
page read and write
|
||
1210000
|
heap
|
page read and write
|
||
E1E000
|
heap
|
page read and write
|
||
DE0000
|
heap
|
page read and write
|
||
1240000
|
heap
|
page read and write
|
||
4241000
|
trusted library allocation
|
page read and write
|
||
F06000
|
trusted library allocation
|
page read and write
|
||
DFB000
|
trusted library allocation
|
page execute and read and write
|
||
13D000
|
stack
|
page read and write
|
||
139E000
|
stack
|
page read and write
|
||
5C90000
|
heap
|
page read and write
|
||
2F1E000
|
stack
|
page read and write
|
||
1457000
|
heap
|
page read and write
|
||
1E0000
|
heap
|
page read and write
|
||
179000
|
stack
|
page read and write
|
||
144B000
|
heap
|
page read and write
|
||
33FB000
|
trusted library allocation
|
page read and write
|
||
2886000
|
trusted library allocation
|
page read and write
|
||
6A9000
|
stack
|
page read and write
|
||
3AA9000
|
trusted library allocation
|
page read and write
|
||
13E3000
|
heap
|
page read and write
|
||
F20000
|
trusted library allocation
|
page read and write
|
||
296E000
|
stack
|
page read and write
|
||
2BB1000
|
trusted library allocation
|
page read and write
|
||
3070000
|
trusted library allocation
|
page execute and read and write
|
||
2A60000
|
heap
|
page read and write
|
||
13A0000
|
heap
|
page read and write
|
||
28A0000
|
trusted library allocation
|
page read and write
|
||
DF7000
|
trusted library allocation
|
page execute and read and write
|
||
16EE000
|
stack
|
page read and write
|
||
5216000
|
trusted library allocation
|
page read and write
|
||
E60D000
|
stack
|
page read and write
|
||
5680000
|
trusted library allocation
|
page read and write
|
||
31B5000
|
trusted library allocation
|
page read and write
|
||
BC2000
|
heap
|
page read and write
|
||
B00000
|
trusted library allocation
|
page read and write
|
||
F10000
|
trusted library allocation
|
page execute and read and write
|
||
533C000
|
stack
|
page read and write
|
||
18B0000
|
heap
|
page read and write
|
||
A17E000
|
stack
|
page read and write
|
||
F0A000
|
trusted library allocation
|
page read and write
|
||
F0E000
|
trusted library allocation
|
page read and write
|
||
F00000
|
trusted library allocation
|
page read and write
|
||
EA0000
|
heap
|
page read and write
|
||
5580000
|
trusted library allocation
|
page read and write
|
||
57C0000
|
trusted library allocation
|
page read and write
|
||
B5CD000
|
stack
|
page read and write
|
||
E18000
|
unkown
|
page readonly
|
||
121EE000
|
stack
|
page read and write
|
||
31E0000
|
trusted library allocation
|
page read and write
|
||
2C80000
|
heap
|
page read and write
|
||
C4FE000
|
stack
|
page read and write
|
||
890000
|
heap
|
page read and write
|
||
2F00000
|
heap
|
page read and write
|
||
B3EE000
|
stack
|
page read and write
|
||
51E0000
|
heap
|
page read and write
|
||
188A000
|
trusted library allocation
|
page execute and read and write
|
||
125EE000
|
stack
|
page read and write
|
||
15DD000
|
trusted library allocation
|
page execute and read and write
|
||
59C0000
|
trusted library allocation
|
page read and write
|
||
76F0000
|
trusted library section
|
page read and write
|
||
73D9000
|
heap
|
page read and write
|
||
C4BE000
|
stack
|
page read and write
|
||
56F0000
|
trusted library section
|
page readonly
|
||
3180000
|
trusted library allocation
|
page read and write
|
||
3AA1000
|
trusted library allocation
|
page read and write
|
||
5270000
|
heap
|
page read and write
|
||
2BAF000
|
trusted library allocation
|
page read and write
|
||
E5E000
|
stack
|
page read and write
|
||
C27C000
|
stack
|
page read and write
|
||
2867000
|
trusted library allocation
|
page read and write
|
||
6AE000
|
stack
|
page read and write
|
||
E53000
|
heap
|
page read and write
|
||
2A70000
|
trusted library allocation
|
page execute and read and write
|
||
59E0000
|
heap
|
page execute and read and write
|
||
7700000
|
trusted library allocation
|
page read and write
|
||
2DB0000
|
heap
|
page read and write
|
||
AE0000
|
trusted library allocation
|
page read and write
|
||
2B63000
|
trusted library allocation
|
page read and write
|
||
285E000
|
trusted library allocation
|
page read and write
|
||
156F000
|
stack
|
page read and write
|
||
5B85000
|
heap
|
page read and write
|
||
5B60000
|
trusted library allocation
|
page execute and read and write
|
||
15D0000
|
trusted library allocation
|
page read and write
|
||
13E1000
|
heap
|
page read and write
|
||
1892000
|
trusted library allocation
|
page read and write
|
||
147D000
|
heap
|
page read and write
|
||
1245000
|
heap
|
page read and write
|
||
3096000
|
trusted library allocation
|
page read and write
|
||
1880000
|
trusted library allocation
|
page read and write
|
||
51D0000
|
trusted library section
|
page readonly
|
||
B47000
|
heap
|
page read and write
|
||
B2E000
|
heap
|
page read and write
|
||
56C0000
|
trusted library allocation
|
page execute and read and write
|
||
EC0000
|
trusted library allocation
|
page read and write
|
||
13CA000
|
heap
|
page read and write
|
||
F70000
|
heap
|
page read and write
|
||
7360000
|
heap
|
page read and write
|
||
471000
|
remote allocation
|
page execute and read and write
|
||
5570000
|
trusted library allocation
|
page execute and read and write
|
||
286D000
|
trusted library allocation
|
page read and write
|
||
56B6000
|
trusted library allocation
|
page read and write
|
||
A5E000
|
stack
|
page read and write
|
||
706E000
|
stack
|
page read and write
|
||
A000000
|
heap
|
page read and write
|
||
3230000
|
heap
|
page execute and read and write
|
||
15E0000
|
heap
|
page read and write
|
||
BD60000
|
heap
|
page read and write
|
||
F50000
|
heap
|
page read and write
|
||
BB4E000
|
stack
|
page read and write
|
||
5BA0000
|
heap
|
page read and write
|
||
6EDF000
|
stack
|
page read and write
|
||
124EC000
|
stack
|
page read and write
|
||
2AA1000
|
trusted library allocation
|
page read and write
|
||
13AE000
|
heap
|
page read and write
|
||
29BF000
|
stack
|
page read and write
|
There are 357 hidden memdumps, click here to show them.