Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
SecuriteInfo.com.TrojanLoader.MSIL.DaVinci.Heur.29424.1974.exe
|
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
|
initial sample
|
||
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\SecuriteInfo.com.TrojanLoader.MSIL.DaVinci.Heur.29424.1974.exe.log
|
ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\tmpA395.tmp
|
XML 1.0 document, ASCII text
|
dropped
|
||
C:\Users\user\AppData\Roaming\XClient.exe
|
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\xNgpESfQOvfb.exe
|
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\xNgpESfQOvfb.exe:Zone.Identifier
|
ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\xNgpESfQOvfb.exe.log
|
ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
|
data
|
modified
|
||
C:\Users\user\AppData\Local\Temp\Log.tmp
|
ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_2gfdxyox.cwz.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_ay0km4r1.gv4.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_d3gy1pex.vwy.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_nprvw5ue.ued.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_peon5yz0.ez2.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_tu5noxum.si2.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_vbnrrdtg.x1z.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_zt3jks1q.2x5.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\tmp9832.tmp
|
XML 1.0 document, ASCII text
|
dropped
|
||
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\XClient.lnk
|
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Archive, ctime=Thu Jul 18 13:29:12
2024, mtime=Thu Jul 18 13:29:12 2024, atime=Thu Jul 18 13:29:12 2024, length=641536, window=hide
|
dropped
|
There are 9 hidden files, click here to show them.
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\SecuriteInfo.com.TrojanLoader.MSIL.DaVinci.Heur.29424.1974.exe
|
"C:\Users\user\Desktop\SecuriteInfo.com.TrojanLoader.MSIL.DaVinci.Heur.29424.1974.exe"
|
||
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
|
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\SecuriteInfo.com.TrojanLoader.MSIL.DaVinci.Heur.29424.1974.exe"
|
||
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
|
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\xNgpESfQOvfb.exe"
|
||
C:\Windows\SysWOW64\schtasks.exe
|
"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\xNgpESfQOvfb" /XML "C:\Users\user\AppData\Local\Temp\tmpA395.tmp"
|
||
C:\Users\user\Desktop\SecuriteInfo.com.TrojanLoader.MSIL.DaVinci.Heur.29424.1974.exe
|
"C:\Users\user\Desktop\SecuriteInfo.com.TrojanLoader.MSIL.DaVinci.Heur.29424.1974.exe"
|
||
C:\Users\user\AppData\Roaming\xNgpESfQOvfb.exe
|
C:\Users\user\AppData\Roaming\xNgpESfQOvfb.exe
|
||
C:\Windows\SysWOW64\schtasks.exe
|
"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\xNgpESfQOvfb" /XML "C:\Users\user\AppData\Local\Temp\tmp9832.tmp"
|
||
C:\Users\user\AppData\Roaming\xNgpESfQOvfb.exe
|
"C:\Users\user\AppData\Roaming\xNgpESfQOvfb.exe"
|
||
C:\Users\user\AppData\Roaming\xNgpESfQOvfb.exe
|
"C:\Users\user\AppData\Roaming\xNgpESfQOvfb.exe"
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\wbem\WmiPrvSE.exe
|
C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
There are 4 hidden processes, click here to show them.
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
moneymaker-30608.portmap.host
|
|||
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
|
unknown
|
Domains
Name
|
IP
|
Malicious
|
|
---|---|---|---|
moneymaker-30608.portmap.host
|
193.161.193.99
|
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
193.161.193.99
|
moneymaker-30608.portmap.host
|
Russian Federation
|
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
2D21000
|
trusted library allocation
|
page read and write
|
||
2551000
|
trusted library allocation
|
page read and write
|
||
402000
|
remote allocation
|
page execute and read and write
|
||
2F71000
|
trusted library allocation
|
page read and write
|
||
7060000
|
trusted library section
|
page read and write
|
||
56FE000
|
stack
|
page read and write
|
||
6FBD000
|
stack
|
page read and write
|
||
2FF0000
|
heap
|
page read and write
|
||
122B000
|
heap
|
page read and write
|
||
142C000
|
stack
|
page read and write
|
||
716E000
|
stack
|
page read and write
|
||
7860000
|
trusted library allocation
|
page read and write
|
||
6480000
|
trusted library allocation
|
page execute and read and write
|
||
5390000
|
heap
|
page execute and read and write
|
||
1560000
|
trusted library allocation
|
page read and write
|
||
DB0000
|
heap
|
page read and write
|
||
527E000
|
stack
|
page read and write
|
||
580E000
|
stack
|
page read and write
|
||
744E000
|
stack
|
page read and write
|
||
26FC000
|
trusted library allocation
|
page read and write
|
||
299F000
|
unkown
|
page read and write
|
||
F7E000
|
stack
|
page read and write
|
||
52B3000
|
heap
|
page read and write
|
||
5F9B000
|
stack
|
page read and write
|
||
BFE000
|
stack
|
page read and write
|
||
6CE000
|
heap
|
page read and write
|
||
726E000
|
heap
|
page read and write
|
||
7830000
|
trusted library allocation
|
page read and write
|
||
1424000
|
heap
|
page read and write
|
||
12C6000
|
trusted library allocation
|
page execute and read and write
|
||
B8F0000
|
trusted library allocation
|
page read and write
|
||
60A0000
|
trusted library allocation
|
page read and write
|
||
6CA0000
|
trusted library allocation
|
page read and write
|
||
559E000
|
stack
|
page read and write
|
||
6AC4000
|
heap
|
page read and write
|
||
2F59000
|
trusted library allocation
|
page read and write
|
||
11C0000
|
heap
|
page read and write
|
||
B7FE000
|
stack
|
page read and write
|
||
9CF000
|
stack
|
page read and write
|
||
6F9E000
|
stack
|
page read and write
|
||
29F0000
|
heap
|
page read and write
|
||
B97B000
|
stack
|
page read and write
|
||
A6B000
|
trusted library allocation
|
page execute and read and write
|
||
75A0000
|
trusted library allocation
|
page read and write
|
||
2B26000
|
trusted library allocation
|
page read and write
|
||
56E0000
|
trusted library allocation
|
page execute and read and write
|
||
57A000
|
stack
|
page read and write
|
||
46EC000
|
stack
|
page read and write
|
||
1550000
|
trusted library allocation
|
page read and write
|
||
13A0000
|
trusted library allocation
|
page execute and read and write
|
||
B8C0000
|
heap
|
page read and write
|
||
9C0000
|
heap
|
page read and write
|
||
52A0000
|
trusted library allocation
|
page read and write
|
||
12A3000
|
trusted library allocation
|
page execute and read and write
|
||
59E5000
|
heap
|
page read and write
|
||
AF8000
|
heap
|
page read and write
|
||
8C7E000
|
stack
|
page read and write
|
||
5389000
|
trusted library allocation
|
page read and write
|
||
57CE000
|
stack
|
page read and write
|
||
12B7000
|
heap
|
page read and write
|
||
4B13000
|
heap
|
page read and write
|
||
3246000
|
trusted library allocation
|
page read and write
|
||
DF7000
|
stack
|
page read and write
|
||
56A0000
|
trusted library allocation
|
page execute and read and write
|
||
11E0000
|
trusted library allocation
|
page read and write
|
||
13B0000
|
heap
|
page read and write
|
||
6419000
|
stack
|
page read and write
|
||
F90000
|
trusted library allocation
|
page read and write
|
||
60A7000
|
trusted library allocation
|
page read and write
|
||
2CEE000
|
stack
|
page read and write
|
||
4A50000
|
trusted library allocation
|
page read and write
|
||
594E000
|
stack
|
page read and write
|
||
3932000
|
trusted library allocation
|
page read and write
|
||
4A40000
|
trusted library allocation
|
page read and write
|
||
A52000
|
trusted library allocation
|
page read and write
|
||
12EC000
|
heap
|
page read and write
|
||
6120000
|
heap
|
page read and write
|
||
4558000
|
trusted library allocation
|
page read and write
|
||
316E000
|
stack
|
page read and write
|
||
71D0000
|
trusted library allocation
|
page execute and read and write
|
||
AD0000
|
trusted library allocation
|
page execute and read and write
|
||
1070000
|
heap
|
page read and write
|
||
B2AD000
|
stack
|
page read and write
|
||
78EB000
|
heap
|
page read and write
|
||
A50000
|
trusted library allocation
|
page read and write
|
||
5370000
|
trusted library allocation
|
page execute and read and write
|
||
83E000
|
unkown
|
page read and write
|
||
6BF0000
|
heap
|
page read and write
|
||
60A4000
|
trusted library allocation
|
page read and write
|
||
FA6000
|
trusted library allocation
|
page execute and read and write
|
||
12D0000
|
trusted library allocation
|
page read and write
|
||
E08000
|
heap
|
page read and write
|
||
2C70000
|
trusted library allocation
|
page read and write
|
||
2D10000
|
heap
|
page execute and read and write
|
||
70A0000
|
trusted library allocation
|
page read and write
|
||
4E3E000
|
stack
|
page read and write
|
||
CFB000
|
stack
|
page read and write
|
||
3F6000
|
stack
|
page read and write
|
||
2D00000
|
heap
|
page read and write
|
||
1280000
|
heap
|
page read and write
|
||
2B2F000
|
stack
|
page read and write
|
||
13EE000
|
stack
|
page read and write
|
||
A2D000
|
trusted library allocation
|
page execute and read and write
|
||
4CFE000
|
stack
|
page read and write
|
||
2540000
|
heap
|
page execute and read and write
|
||
6D30000
|
heap
|
page read and write
|
||
6D32000
|
heap
|
page read and write
|
||
7820000
|
trusted library allocation
|
page execute and read and write
|
||
156B000
|
trusted library allocation
|
page execute and read and write
|
||
796E000
|
stack
|
page read and write
|
||
10F7000
|
stack
|
page read and write
|
||
783F000
|
trusted library allocation
|
page read and write
|
||
13E7000
|
heap
|
page read and write
|
||
77E0000
|
trusted library section
|
page read and write
|
||
2B0F000
|
stack
|
page read and write
|
||
A80000
|
trusted library allocation
|
page read and write
|
||
749E000
|
stack
|
page read and write
|
||
712E000
|
stack
|
page read and write
|
||
16AF000
|
stack
|
page read and write
|
||
6140000
|
trusted library allocation
|
page read and write
|
||
400000
|
remote allocation
|
page execute and read and write
|
||
E84000
|
heap
|
page read and write
|
||
758D000
|
stack
|
page read and write
|
||
6AF6000
|
heap
|
page read and write
|
||
11F7000
|
heap
|
page read and write
|
||
25DF000
|
trusted library allocation
|
page read and write
|
||
583E000
|
stack
|
page read and write
|
||
6155000
|
heap
|
page read and write
|
||
4FBE000
|
stack
|
page read and write
|
||
A62000
|
trusted library allocation
|
page read and write
|
||
60D0000
|
trusted library allocation
|
page read and write
|
||
70C0000
|
trusted library allocation
|
page read and write
|
||
3100000
|
trusted library allocation
|
page read and write
|
||
A23000
|
trusted library allocation
|
page execute and read and write
|
||
1250000
|
heap
|
page read and write
|
||
23EB000
|
trusted library allocation
|
page read and write
|
||
4B10000
|
heap
|
page read and write
|
||
5F76000
|
trusted library allocation
|
page read and write
|
||
11F0000
|
heap
|
page read and write
|
||
23DC000
|
stack
|
page read and write
|
||
11C7000
|
heap
|
page read and write
|
||
1210000
|
heap
|
page read and write
|
||
6BEE000
|
stack
|
page read and write
|
||
57FE000
|
stack
|
page read and write
|
||
2C52000
|
trusted library allocation
|
page read and write
|
||
5B8E000
|
stack
|
page read and write
|
||
9D0000
|
heap
|
page read and write
|
||
2C3E000
|
trusted library allocation
|
page read and write
|
||
5F1F000
|
stack
|
page read and write
|
||
6170000
|
heap
|
page read and write
|
||
4072000
|
trusted library allocation
|
page read and write
|
||
538C000
|
trusted library allocation
|
page read and write
|
||
15AE000
|
stack
|
page read and write
|
||
1390000
|
heap
|
page read and write
|
||
FA2000
|
trusted library allocation
|
page read and write
|
||
3120000
|
trusted library allocation
|
page read and write
|
||
77CE000
|
stack
|
page read and write
|
||
8CE000
|
stack
|
page read and write
|
||
58FD000
|
stack
|
page read and write
|
||
5F5F000
|
stack
|
page read and write
|
||
7090000
|
trusted library allocation
|
page execute and read and write
|
||
2ED0000
|
heap
|
page execute and read and write
|
||
5F5B000
|
trusted library allocation
|
page read and write
|
||
BA7C000
|
stack
|
page read and write
|
||
5A4E000
|
stack
|
page read and write
|
||
1020000
|
heap
|
page read and write
|
||
12CA000
|
trusted library allocation
|
page execute and read and write
|
||
15CE000
|
stack
|
page read and write
|
||
FAA000
|
trusted library allocation
|
page execute and read and write
|
||
4F7D000
|
stack
|
page read and write
|
||
2C2B000
|
trusted library allocation
|
page read and write
|
||
2C1C000
|
stack
|
page read and write
|
||
11BE000
|
stack
|
page read and write
|
||
152E000
|
stack
|
page read and write
|
||
1552000
|
trusted library allocation
|
page read and write
|
||
2A0E000
|
stack
|
page read and write
|
||
3643000
|
trusted library allocation
|
page read and write
|
||
29FB000
|
heap
|
page read and write
|
||
DD5000
|
heap
|
page read and write
|
||
5F6E000
|
trusted library allocation
|
page read and write
|
||
60B0000
|
trusted library allocation
|
page read and write
|
||
13B8000
|
heap
|
page read and write
|
||
59C0000
|
trusted library allocation
|
page read and write
|
||
5A24000
|
heap
|
page read and write
|
||
2F40000
|
heap
|
page read and write
|
||
D4B000
|
stack
|
page read and write
|
||
3EB9000
|
trusted library allocation
|
page read and write
|
||
31E1000
|
trusted library allocation
|
page read and write
|
||
4FC0000
|
trusted library allocation
|
page read and write
|
||
1010000
|
heap
|
page read and write
|
||
12F0000
|
trusted library allocation
|
page read and write
|
||
3F05000
|
trusted library allocation
|
page read and write
|
||
5860000
|
trusted library section
|
page readonly
|
||
1060000
|
heap
|
page read and write
|
||
7590000
|
trusted library allocation
|
page execute and read and write
|
||
6130000
|
heap
|
page read and write
|
||
FBB000
|
trusted library allocation
|
page execute and read and write
|
||
597E000
|
stack
|
page read and write
|
||
A4D000
|
trusted library allocation
|
page execute and read and write
|
||
59BE000
|
stack
|
page read and write
|
||
B4AE000
|
stack
|
page read and write
|
||
DD0000
|
heap
|
page read and write
|
||
2F50000
|
trusted library allocation
|
page read and write
|
||
734C000
|
stack
|
page read and write
|
||
B3BE000
|
stack
|
page read and write
|
||
2E7F000
|
unkown
|
page read and write
|
||
573C000
|
stack
|
page read and write
|
||
569E000
|
stack
|
page read and write
|
||
5740000
|
heap
|
page read and write
|
||
B6AE000
|
stack
|
page read and write
|
||
5690000
|
heap
|
page read and write
|
||
6FF000
|
heap
|
page read and write
|
||
23E0000
|
trusted library allocation
|
page read and write
|
||
7720000
|
trusted library allocation
|
page read and write
|
||
7BCE000
|
stack
|
page read and write
|
||
6CB000
|
heap
|
page read and write
|
||
6AB0000
|
heap
|
page read and write
|
||
6160000
|
heap
|
page read and write
|
||
F3E000
|
stack
|
page read and write
|
||
3E66000
|
trusted library allocation
|
page read and write
|
||
F84000
|
trusted library allocation
|
page read and write
|
||
125A000
|
heap
|
page read and write
|
||
6B15000
|
heap
|
page read and write
|
||
2BB0000
|
heap
|
page read and write
|
||
510E000
|
stack
|
page read and write
|
||
71FC000
|
stack
|
page read and write
|
||
5D0A000
|
stack
|
page read and write
|
||
240D000
|
trusted library allocation
|
page read and write
|
||
1543000
|
trusted library allocation
|
page read and write
|
||
1380000
|
heap
|
page read and write
|
||
B5BE000
|
stack
|
page read and write
|
||
B6BE000
|
stack
|
page read and write
|
||
31E9000
|
trusted library allocation
|
page read and write
|
||
54E0000
|
trusted library allocation
|
page read and write
|
||
64E0000
|
trusted library allocation
|
page execute and read and write
|
||
1530000
|
trusted library allocation
|
page read and write
|
||
B6FE000
|
stack
|
page read and write
|
||
1556000
|
trusted library allocation
|
page execute and read and write
|
||
5740000
|
trusted library section
|
page readonly
|
||
A30000
|
heap
|
page read and write
|
||
12B0000
|
trusted library allocation
|
page read and write
|
||
3F51000
|
trusted library allocation
|
page read and write
|
||
DF0000
|
trusted library allocation
|
page read and write
|
||
CF6000
|
stack
|
page read and write
|
||
2406000
|
trusted library allocation
|
page read and write
|
||
252E000
|
stack
|
page read and write
|
||
56BE000
|
stack
|
page read and write
|
||
56B0000
|
trusted library allocation
|
page read and write
|
||
153D000
|
trusted library allocation
|
page execute and read and write
|
||
6D4D000
|
heap
|
page read and write
|
||
E00000
|
heap
|
page read and write
|
||
4E1C000
|
stack
|
page read and write
|
||
1567000
|
trusted library allocation
|
page execute and read and write
|
||
4AFE000
|
stack
|
page read and write
|
||
30C2000
|
trusted library allocation
|
page read and write
|
||
6A0000
|
heap
|
page read and write
|
||
2F9000
|
stack
|
page read and write
|
||
5380000
|
trusted library allocation
|
page read and write
|
||
5A7E000
|
stack
|
page read and write
|
||
DFE000
|
stack
|
page read and write
|
||
56C0000
|
trusted library allocation
|
page read and write
|
||
B5AE000
|
stack
|
page read and write
|
||
7300000
|
heap
|
page read and write
|
||
4F3E000
|
stack
|
page read and write
|
||
597E000
|
stack
|
page read and write
|
||
5F90000
|
heap
|
page read and write
|
||
5360000
|
heap
|
page read and write
|
||
5A00000
|
heap
|
page read and write
|
||
2C4D000
|
trusted library allocation
|
page read and write
|
||
2C80000
|
trusted library allocation
|
page read and write
|
||
5F4B000
|
stack
|
page read and write
|
||
4036000
|
trusted library allocation
|
page read and write
|
||
15E7000
|
heap
|
page read and write
|
||
631C000
|
stack
|
page read and write
|
||
2EBE000
|
stack
|
page read and write
|
||
A56000
|
trusted library allocation
|
page execute and read and write
|
||
3F9C000
|
trusted library allocation
|
page read and write
|
||
12DC000
|
heap
|
page read and write
|
||
71E5000
|
trusted library allocation
|
page read and write
|
||
B8BC000
|
stack
|
page read and write
|
||
62DD000
|
stack
|
page read and write
|
||
F9D000
|
trusted library allocation
|
page execute and read and write
|
||
2B30000
|
heap
|
page read and write
|
||
FB2000
|
trusted library allocation
|
page read and write
|
||
1C0000
|
unkown
|
page readonly
|
||
6B2A000
|
heap
|
page read and write
|
||
1580000
|
trusted library allocation
|
page read and write
|
||
611E000
|
stack
|
page read and write
|
||
57E0000
|
heap
|
page read and write
|
||
13D4000
|
heap
|
page read and write
|
||
523E000
|
stack
|
page read and write
|
||
75C0000
|
trusted library allocation
|
page read and write
|
||
2E3E000
|
unkown
|
page read and write
|
||
2E8E000
|
stack
|
page read and write
|
||
770E000
|
stack
|
page read and write
|
||
FA0000
|
trusted library allocation
|
page read and write
|
||
54D0000
|
trusted library allocation
|
page read and write
|
||
6CF4000
|
heap
|
page read and write
|
||
120E000
|
stack
|
page read and write
|
||
748C000
|
stack
|
page read and write
|
||
B3FE000
|
stack
|
page read and write
|
||
F8D000
|
trusted library allocation
|
page execute and read and write
|
||
30C0000
|
trusted library allocation
|
page read and write
|
||
7710000
|
trusted library allocation
|
page read and write
|
||
B900000
|
trusted library allocation
|
page read and write
|
||
4A45000
|
trusted library allocation
|
page read and write
|
||
609D000
|
stack
|
page read and write
|
||
124C000
|
heap
|
page read and write
|
||
2CD0000
|
heap
|
page read and write
|
||
75A2000
|
trusted library allocation
|
page read and write
|
||
5F50000
|
trusted library allocation
|
page read and write
|
||
31D0000
|
heap
|
page execute and read and write
|
||
B7BB000
|
stack
|
page read and write
|
||
59E0000
|
heap
|
page read and write
|
||
52FD000
|
stack
|
page read and write
|
||
ACE000
|
stack
|
page read and write
|
||
29DE000
|
stack
|
page read and write
|
||
573E000
|
stack
|
page read and write
|
||
56F0000
|
heap
|
page execute and read and write
|
||
137D000
|
stack
|
page read and write
|
||
702000
|
heap
|
page read and write
|
||
12D7000
|
trusted library allocation
|
page execute and read and write
|
||
6C0000
|
heap
|
page read and write
|
||
133E000
|
stack
|
page read and write
|
||
72FD000
|
stack
|
page read and write
|
||
4AB0000
|
heap
|
page execute and read and write
|
||
6120000
|
trusted library allocation
|
page execute and read and write
|
||
2530000
|
trusted library allocation
|
page read and write
|
||
5F71000
|
trusted library allocation
|
page read and write
|
||
34DC000
|
trusted library allocation
|
page read and write
|
||
586F000
|
trusted library section
|
page readonly
|
||
23FE000
|
trusted library allocation
|
page read and write
|
||
64CB000
|
stack
|
page read and write
|
||
4A30000
|
trusted library allocation
|
page read and write
|
||
2EE0000
|
trusted library allocation
|
page read and write
|
||
71C0000
|
trusted library allocation
|
page read and write
|
||
70B0000
|
trusted library section
|
page read and write
|
||
2C20000
|
trusted library allocation
|
page read and write
|
||
7580000
|
trusted library allocation
|
page execute and read and write
|
||
2B48000
|
trusted library allocation
|
page read and write
|
||
703E000
|
stack
|
page read and write
|
||
2F40000
|
trusted library allocation
|
page read and write
|
||
FB7000
|
trusted library allocation
|
page execute and read and write
|
||
A37000
|
heap
|
page read and write
|
||
294D000
|
stack
|
page read and write
|
||
5E09000
|
stack
|
page read and write
|
||
1285000
|
heap
|
page read and write
|
||
A67000
|
trusted library allocation
|
page execute and read and write
|
||
E0E000
|
heap
|
page read and write
|
||
12DB000
|
trusted library allocation
|
page execute and read and write
|
||
6B17000
|
heap
|
page read and write
|
||
A40000
|
trusted library allocation
|
page read and write
|
||
548E000
|
stack
|
page read and write
|
||
5B0000
|
heap
|
page read and write
|
||
155A000
|
trusted library allocation
|
page execute and read and write
|
||
73E000
|
heap
|
page read and write
|
||
72F2000
|
trusted library allocation
|
page read and write
|
||
5E49000
|
stack
|
page read and write
|
||
31AE000
|
stack
|
page read and write
|
||
6D50000
|
heap
|
page read and write
|
||
12A4000
|
trusted library allocation
|
page read and write
|
||
7080000
|
trusted library allocation
|
page execute and read and write
|
||
1018000
|
heap
|
page read and write
|
||
6D08000
|
heap
|
page read and write
|
||
2F10000
|
heap
|
page read and write
|
||
56A0000
|
trusted library allocation
|
page read and write
|
||
30FE000
|
stack
|
page read and write
|
||
7260000
|
heap
|
page read and write
|
||
41E1000
|
trusted library allocation
|
page read and write
|
||
2401000
|
trusted library allocation
|
page read and write
|
||
12C0000
|
trusted library allocation
|
page read and write
|
||
AF0000
|
heap
|
page read and write
|
||
5F0000
|
heap
|
page read and write
|
||
593E000
|
stack
|
page read and write
|
||
6FFF000
|
stack
|
page read and write
|
||
A24000
|
trusted library allocation
|
page read and write
|
||
1230000
|
heap
|
page read and write
|
||
57D0000
|
heap
|
page read and write
|
||
298A000
|
stack
|
page read and write
|
||
A5A000
|
trusted library allocation
|
page execute and read and write
|
||
E82000
|
heap
|
page read and write
|
||
E37000
|
heap
|
page read and write
|
||
7770000
|
trusted library allocation
|
page read and write
|
||
2F60000
|
heap
|
page read and write
|
||
BB8F000
|
stack
|
page read and write
|
||
2C46000
|
trusted library allocation
|
page read and write
|
||
593E000
|
stack
|
page read and write
|
||
6D04000
|
heap
|
page read and write
|
||
A0E000
|
stack
|
page read and write
|
||
739E000
|
stack
|
page read and write
|
||
7835000
|
trusted library allocation
|
page read and write
|
||
2CF0000
|
heap
|
page read and write
|
||
7870000
|
heap
|
page read and write
|
||
1226000
|
heap
|
page read and write
|
||
122F000
|
stack
|
page read and write
|
||
A20000
|
trusted library allocation
|
page read and write
|
||
1223000
|
heap
|
page read and write
|
||
54C0000
|
heap
|
page execute and read and write
|
||
3124000
|
trusted library allocation
|
page read and write
|
||
749000
|
heap
|
page read and write
|
||
4F78000
|
trusted library allocation
|
page read and write
|
||
2420000
|
heap
|
page read and write
|
||
53D000
|
stack
|
page read and write
|
||
3F71000
|
trusted library allocation
|
page read and write
|
||
2C41000
|
trusted library allocation
|
page read and write
|
||
6FA0000
|
trusted library section
|
page read and write
|
||
2EFF000
|
stack
|
page read and write
|
||
2ECC000
|
stack
|
page read and write
|
||
112F000
|
stack
|
page read and write
|
||
2B10000
|
trusted library allocation
|
page read and write
|
||
2C75000
|
trusted library allocation
|
page read and write
|
||
3E13000
|
trusted library allocation
|
page read and write
|
||
59D0000
|
trusted library allocation
|
page read and write
|
||
1281000
|
heap
|
page read and write
|
||
57F0000
|
heap
|
page read and write
|
||
E29000
|
heap
|
page read and write
|
||
29F0000
|
heap
|
page read and write
|
||
E78000
|
heap
|
page read and write
|
||
5840000
|
trusted library allocation
|
page execute and read and write
|
||
52B0000
|
heap
|
page read and write
|
||
15D0000
|
trusted library allocation
|
page execute and read and write
|
||
15E0000
|
heap
|
page read and write
|
||
3FE8000
|
trusted library allocation
|
page read and write
|
||
3551000
|
trusted library allocation
|
page read and write
|
||
13D9000
|
heap
|
page read and write
|
||
590D000
|
stack
|
page read and write
|
||
5F7D000
|
trusted library allocation
|
page read and write
|
||
1562000
|
trusted library allocation
|
page read and write
|
||
2D0A000
|
heap
|
page read and write
|
||
E42000
|
heap
|
page read and write
|
||
1540000
|
trusted library allocation
|
page read and write
|
||
78B2000
|
heap
|
page read and write
|
||
6440000
|
heap
|
page read and write
|
||
8D7E000
|
stack
|
page read and write
|
||
2B24000
|
trusted library allocation
|
page read and write
|
||
154D000
|
trusted library allocation
|
page execute and read and write
|
||
6B1B000
|
heap
|
page read and write
|
||
59F0000
|
heap
|
page read and write
|
||
4DFE000
|
stack
|
page read and write
|
||
7FDC0000
|
trusted library allocation
|
page execute and read and write
|
||
78D3000
|
heap
|
page read and write
|
||
786E000
|
stack
|
page read and write
|
||
71E0000
|
trusted library allocation
|
page read and write
|
||
959000
|
stack
|
page read and write
|
||
2B20000
|
trusted library allocation
|
page read and write
|
||
660000
|
heap
|
page read and write
|
||
12B4000
|
trusted library allocation
|
page read and write
|
||
F80000
|
trusted library allocation
|
page read and write
|
||
A10000
|
trusted library allocation
|
page read and write
|
||
FE0000
|
heap
|
page read and write
|
||
549E000
|
stack
|
page read and write
|
||
10A0000
|
heap
|
page read and write
|
||
670000
|
heap
|
page read and write
|
||
1251000
|
heap
|
page read and write
|
||
5A8E000
|
stack
|
page read and write
|
||
56B9000
|
trusted library allocation
|
page read and write
|
||
4102000
|
trusted library allocation
|
page read and write
|
||
3D21000
|
trusted library allocation
|
page read and write
|
||
707E000
|
stack
|
page read and write
|
||
2ECC000
|
trusted library allocation
|
page read and write
|
||
724000
|
heap
|
page read and write
|
||
7F8E0000
|
trusted library allocation
|
page execute and read and write
|
||
7F340000
|
trusted library allocation
|
page execute and read and write
|
||
1290000
|
trusted library allocation
|
page read and write
|
||
6450000
|
trusted library allocation
|
page read and write
|
||
E45000
|
heap
|
page read and write
|
||
F83000
|
trusted library allocation
|
page execute and read and write
|
||
1000000
|
trusted library allocation
|
page execute and read and write
|
||
1C2000
|
unkown
|
page readonly
|
||
2F00000
|
trusted library allocation
|
page read and write
|
||
2F13000
|
heap
|
page read and write
|
||
4CBF000
|
stack
|
page read and write
|
||
6E3E000
|
stack
|
page read and write
|
||
75D0000
|
heap
|
page read and write
|
||
6E9E000
|
stack
|
page read and write
|
||
FD0000
|
trusted library allocation
|
page read and write
|
||
840000
|
heap
|
page read and write
|
||
788C000
|
heap
|
page read and write
|
||
6430000
|
trusted library allocation
|
page read and write
|
||
AE0000
|
trusted library allocation
|
page read and write
|
||
7878000
|
heap
|
page read and write
|
||
2F4F000
|
stack
|
page read and write
|
||
533E000
|
stack
|
page read and write
|
||
2C60000
|
trusted library allocation
|
page read and write
|
||
120E000
|
heap
|
page read and write
|
||
6F4000
|
heap
|
page read and write
|
||
6150000
|
heap
|
page read and write
|
||
1534000
|
trusted library allocation
|
page read and write
|
||
4018000
|
trusted library allocation
|
page read and write
|
||
1533000
|
trusted library allocation
|
page execute and read and write
|
There are 480 hidden memdumps, click here to show them.