Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
Bjl3geiFEK.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
initial sample
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\3D003UC5\tdrpl[1].exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\229472814.exe
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\264162301.exe
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\33080.scr
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\818921588.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Windows\sysppvrdnvs.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\YLNGKWRH\1[1]
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\ZJCZETOO\dwntbl[1]
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_3rddolps.u41.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_bdgt3o4r.xla.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_ol2t3fun.mdp.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_pbs1l3jm.nlg.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\tbtcmds.dat
|
data
|
dropped
|
||
C:\Users\user\tbtnds.dat
|
data
|
dropped
|
There are 6 hidden files, click here to show them.
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\Bjl3geiFEK.exe
|
"C:\Users\user\Desktop\Bjl3geiFEK.exe"
|
||
C:\Users\user\AppData\Local\Temp\33080.scr
|
"C:\Users\user\AppData\Local\Temp\33080.scr" /S
|
||
C:\Windows\sysppvrdnvs.exe
|
C:\Windows\sysppvrdnvs.exe
|
||
C:\Windows\SysWOW64\cmd.exe
|
"C:\Windows\System32\cmd.exe" /c powershell -Command "Add-MpPreference -ExclusionPath $env:windir; Add-MpPreference -ExclusionPath
$env:TEMP; Add-MpPreference -ExclusionPath $env:USERPROFILE"
|
||
C:\Windows\SysWOW64\cmd.exe
|
"C:\Windows\System32\cmd.exe" /c sc stop UsoSvc & sc stop WaaSMedicSvc & sc stop wuauserv & sc stop DoSvc & sc stop BITS /wait
|
||
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
|
powershell -Command "Add-MpPreference -ExclusionPath $env:windir; Add-MpPreference -ExclusionPath $env:TEMP; Add-MpPreference
-ExclusionPath $env:USERPROFILE"
|
||
C:\Windows\SysWOW64\sc.exe
|
sc stop UsoSvc
|
||
C:\Windows\SysWOW64\sc.exe
|
sc stop WaaSMedicSvc
|
||
C:\Windows\SysWOW64\sc.exe
|
sc stop wuauserv
|
||
C:\Windows\SysWOW64\sc.exe
|
sc stop DoSvc
|
||
C:\Windows\SysWOW64\sc.exe
|
sc stop BITS /wait
|
||
C:\Windows\sysppvrdnvs.exe
|
"C:\Windows\sysppvrdnvs.exe"
|
||
C:\Users\user\AppData\Local\Temp\818921588.exe
|
C:\Users\user\AppData\Local\Temp\818921588.exe
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\wbem\WmiPrvSE.exe
|
C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding
|
There are 6 hidden processes, click here to show them.
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
http://91.202.233.141/
|
unknown
|
||
http://185.215.113.66/tdrpl.exe
|
185.215.113.66
|
||
http://185.215.113.66/
|
unknown
|
||
http://schemas.xmlsoap.org/soap/encoding/
|
unknown
|
||
http://185.215.113.66/http://91.202.233.141/12345%s%s%s:Zone.Identifier%userprofile%%windir%%s
|
unknown
|
||
http://91.202.233.141/dwntblan
|
unknown
|
||
http://185.215.113.66/tdrpl.exeb1E
|
unknown
|
||
http://185.215.113.66/1JJC:
|
unknown
|
||
http://schemas.xmlsoap.org/soap/envelope/
|
unknown
|
||
http://185.215.113.66/1G0td
|
unknown
|
||
http://185.215.113.66/2
|
unknown
|
||
http://91.202.233.141/dwntblt-InLMEMH
|
unknown
|
||
http://185.215.113.66/1C:
|
unknown
|
||
http://185.215.113.66/1LMEM0P
|
unknown
|
||
http://185.215.113.66/2C:
|
unknown
|
||
http://185.215.113.66/1
|
unknown
|
||
http://185.215.113.66/1aenh.dll
|
unknown
|
||
http://185.215.113.66/tdrp.exe%s:Zone.Identifier/c
|
unknown
|
||
http://91.202.233.141/dwntbl2C
|
unknown
|
||
http://91.202.233.141/dwntblhy
|
unknown
|
||
http://91.202.233.141/dwntbllvCkd
|
unknown
|
||
http://91.202.233.141/dwntbl
|
unknown
|
||
http://185.215.113.66/tdrp.exe
|
unknown
|
||
http://185.215.113.66/tdrpl.exek1L
|
unknown
|
||
http://185.215.113.66/2(Bf
|
unknown
|
||
http://185.215.113.66/1uK
|
unknown
|
||
http://185.215.113.66/tdrpl.exer
|
unknown
|
||
http://185.215.113.66/2JJC:
|
unknown
|
There are 18 hidden URLs, click here to show them.
Domains
Name
|
IP
|
Malicious
|
|
---|---|---|---|
bg.microsoft.map.fastly.net
|
199.232.214.172
|
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
185.215.113.66
|
unknown
|
Portugal
|
||
5.75.95.114
|
unknown
|
Iran (ISLAMIC Republic Of)
|
||
91.202.233.141
|
unknown
|
Russian Federation
|
||
5.239.153.192
|
unknown
|
Iran (ISLAMIC Republic Of)
|
||
2.186.114.89
|
unknown
|
Iran (ISLAMIC Republic Of)
|
||
239.255.255.250
|
unknown
|
Reserved
|
||
2.63.29.22
|
unknown
|
Russian Federation
|
Registry
Path
|
Value
|
Malicious
|
|
---|---|---|---|
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center
|
FirewallOverride
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center
|
FirewallDisableNotify
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center
|
AntiSpywareOverride
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center
|
AntiVirusOverride
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center
|
AntiVirusDisableNotify
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center
|
UpdatesOverride
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center
|
UpdatesDisableNotify
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run
|
Windows Settings
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate
|
DisableWindowsUpdate
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU
|
AlwaysAutoUpdate
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU
|
OverrideNotice
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\BITS
|
Start
|
There are 2 hidden registries, click here to show them.
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
410000
|
unkown
|
page readonly
|
||
410000
|
unkown
|
page readonly
|
||
410000
|
unkown
|
page readonly
|
||
410000
|
unkown
|
page readonly
|
||
42E000
|
heap
|
page read and write
|
||
410000
|
unkown
|
page readonly
|
||
48C1000
|
heap
|
page read and write
|
||
410000
|
unkown
|
page readonly
|
||
410000
|
unkown
|
page readonly
|
||
410000
|
unkown
|
page readonly
|
||
3B3E000
|
stack
|
page read and write
|
||
520000
|
heap
|
page read and write
|
||
4B2000
|
unkown
|
page readonly
|
||
2BC0000
|
heap
|
page read and write
|
||
860000
|
heap
|
page read and write
|
||
387F000
|
stack
|
page read and write
|
||
64A000
|
heap
|
page read and write
|
||
61E000
|
heap
|
page read and write
|
||
76E000
|
stack
|
page read and write
|
||
363E000
|
stack
|
page read and write
|
||
610000
|
heap
|
page read and write
|
||
1670000
|
heap
|
page read and write
|
||
2AC8000
|
heap
|
page read and write
|
||
6AB000
|
heap
|
page read and write
|
||
65F000
|
heap
|
page read and write
|
||
6F8000
|
heap
|
page read and write
|
||
810000
|
heap
|
page read and write
|
||
27DE000
|
stack
|
page read and write
|
||
408000
|
heap
|
page read and write
|
||
79D000
|
stack
|
page read and write
|
||
69F000
|
heap
|
page read and write
|
||
453E000
|
stack
|
page read and write
|
||
6CB000
|
heap
|
page read and write
|
||
4AE000
|
stack
|
page read and write
|
||
380D000
|
stack
|
page read and write
|
||
2FEF000
|
stack
|
page read and write
|
||
9B000
|
stack
|
page read and write
|
||
702000
|
heap
|
page read and write
|
||
2D9D000
|
stack
|
page read and write
|
||
699000
|
heap
|
page read and write
|
||
709000
|
heap
|
page read and write
|
||
33C0000
|
heap
|
page read and write
|
||
570000
|
heap
|
page read and write
|
||
6FF000
|
heap
|
page read and write
|
||
688000
|
heap
|
page read and write
|
||
2A4E000
|
stack
|
page read and write
|
||
401000
|
unkown
|
page execute read
|
||
358E000
|
stack
|
page read and write
|
||
6F1000
|
heap
|
page read and write
|
||
6AA000
|
heap
|
page read and write
|
||
4C0000
|
heap
|
page read and write
|
||
31A0000
|
heap
|
page read and write
|
||
5A0D000
|
stack
|
page read and write
|
||
37CC000
|
stack
|
page read and write
|
||
420000
|
heap
|
page read and write
|
||
19C000
|
stack
|
page read and write
|
||
DB9000
|
stack
|
page read and write
|
||
42BE000
|
stack
|
page read and write
|
||
69A000
|
heap
|
page read and write
|
||
139C000
|
heap
|
page read and write
|
||
3000000
|
heap
|
page read and write
|
||
8EE000
|
stack
|
page read and write
|
||
3C7E000
|
stack
|
page read and write
|
||
38BE000
|
stack
|
page read and write
|
||
97F000
|
stack
|
page read and write
|
||
2F30000
|
heap
|
page read and write
|
||
32C0000
|
heap
|
page read and write
|
||
9C000
|
stack
|
page read and write
|
||
7AE000
|
stack
|
page read and write
|
||
6EC000
|
heap
|
page read and write
|
||
6ED000
|
heap
|
page read and write
|
||
520000
|
heap
|
page read and write
|
||
291F000
|
stack
|
page read and write
|
||
2DE3000
|
heap
|
page read and write
|
||
9CF000
|
stack
|
page read and write
|
||
2AC0000
|
heap
|
page read and write
|
||
46E000
|
stack
|
page read and write
|
||
210F000
|
stack
|
page read and write
|
||
540000
|
heap
|
page read and write
|
||
2AF0000
|
heap
|
page read and write
|
||
98E000
|
stack
|
page read and write
|
||
80F000
|
stack
|
page read and write
|
||
315F000
|
stack
|
page read and write
|
||
414000
|
unkown
|
page write copy
|
||
3FFF000
|
stack
|
page read and write
|
||
75F000
|
stack
|
page read and write
|
||
320F000
|
stack
|
page read and write
|
||
400000
|
unkown
|
page readonly
|
||
170000
|
heap
|
page read and write
|
||
463F000
|
stack
|
page read and write
|
||
400000
|
unkown
|
page readonly
|
||
1680000
|
heap
|
page read and write
|
||
1F0000
|
heap
|
page read and write
|
||
69A000
|
heap
|
page read and write
|
||
47BE000
|
stack
|
page read and write
|
||
414000
|
unkown
|
page write copy
|
||
6AE000
|
heap
|
page read and write
|
||
85E000
|
stack
|
page read and write
|
||
3EBF000
|
stack
|
page read and write
|
||
427F000
|
stack
|
page read and write
|
||
3270000
|
heap
|
page read and write
|
||
429000
|
heap
|
page read and write
|
||
36CB000
|
stack
|
page read and write
|
||
118E000
|
stack
|
page read and write
|
||
6AD000
|
heap
|
page read and write
|
||
377E000
|
stack
|
page read and write
|
||
4B1000
|
unkown
|
page execute read
|
||
1F0000
|
heap
|
page read and write
|
||
709000
|
heap
|
page read and write
|
||
6CB000
|
heap
|
page read and write
|
||
2A4F000
|
stack
|
page read and write
|
||
705000
|
heap
|
page read and write
|
||
4F0000
|
heap
|
page read and write
|
||
69F000
|
heap
|
page read and write
|
||
414000
|
unkown
|
page write copy
|
||
6F4000
|
heap
|
page read and write
|
||
414000
|
unkown
|
page write copy
|
||
319E000
|
stack
|
page read and write
|
||
2A5F000
|
stack
|
page read and write
|
||
6F6000
|
heap
|
page read and write
|
||
6B6000
|
heap
|
page read and write
|
||
650000
|
heap
|
page read and write
|
||
3C3F000
|
stack
|
page read and write
|
||
BD000
|
stack
|
page read and write
|
||
4B2000
|
unkown
|
page readonly
|
||
400000
|
unkown
|
page readonly
|
||
1BE000
|
stack
|
page read and write
|
||
32F8000
|
heap
|
page read and write
|
||
199000
|
stack
|
page read and write
|
||
79E000
|
stack
|
page read and write
|
||
330E000
|
stack
|
page read and write
|
||
591000
|
heap
|
page read and write
|
||
6FD000
|
heap
|
page read and write
|
||
95E000
|
stack
|
page read and write
|
||
860000
|
heap
|
page read and write
|
||
34FE000
|
stack
|
page read and write
|
||
6F2000
|
heap
|
page read and write
|
||
2F38000
|
heap
|
page read and write
|
||
2A8F000
|
stack
|
page read and write
|
||
390E000
|
stack
|
page read and write
|
||
99F000
|
stack
|
page read and write
|
||
CBB000
|
stack
|
page read and write
|
||
9C000
|
stack
|
page read and write
|
||
1F0000
|
heap
|
page read and write
|
||
61A000
|
heap
|
page read and write
|
||
2BDC000
|
stack
|
page read and write
|
||
2D7B000
|
stack
|
page read and write
|
||
16CE000
|
stack
|
page read and write
|
||
12DF000
|
stack
|
page read and write
|
||
30EE000
|
stack
|
page read and write
|
||
6B9000
|
heap
|
page read and write
|
||
64F000
|
stack
|
page read and write
|
||
414000
|
unkown
|
page write copy
|
||
48BF000
|
stack
|
page read and write
|
||
1020000
|
heap
|
page read and write
|
||
400000
|
unkown
|
page readonly
|
||
6BA000
|
heap
|
page read and write
|
||
60E000
|
stack
|
page read and write
|
||
1FF000
|
stack
|
page read and write
|
||
69F000
|
heap
|
page read and write
|
||
65E000
|
stack
|
page read and write
|
||
44FF000
|
stack
|
page read and write
|
||
2DBE000
|
stack
|
page read and write
|
||
19C000
|
stack
|
page read and write
|
||
9A0000
|
heap
|
page read and write
|
||
281E000
|
stack
|
page read and write
|
||
2EF0000
|
heap
|
page read and write
|
||
820000
|
heap
|
page read and write
|
||
688000
|
heap
|
page read and write
|
||
467E000
|
stack
|
page read and write
|
||
703000
|
heap
|
page read and write
|
||
4B0000
|
unkown
|
page readonly
|
||
448000
|
heap
|
page read and write
|
||
A17000
|
heap
|
page read and write
|
||
400000
|
unkown
|
page readonly
|
||
72D000
|
stack
|
page read and write
|
||
98E000
|
stack
|
page read and write
|
||
57E000
|
heap
|
page read and write
|
||
354F000
|
stack
|
page read and write
|
||
25FD000
|
stack
|
page read and write
|
||
32F0000
|
heap
|
page read and write
|
||
65F000
|
heap
|
page read and write
|
||
2D5D000
|
stack
|
page read and write
|
||
2D2C000
|
stack
|
page read and write
|
||
130E000
|
heap
|
page read and write
|
||
6F5000
|
heap
|
page read and write
|
||
48C3000
|
heap
|
page read and write
|
||
610000
|
heap
|
page read and write
|
||
395E000
|
stack
|
page read and write
|
||
6B6000
|
heap
|
page read and write
|
||
2FB0000
|
heap
|
page read and write
|
||
70A000
|
heap
|
page read and write
|
||
76D000
|
stack
|
page read and write
|
||
401000
|
unkown
|
page execute read
|
||
477F000
|
stack
|
page read and write
|
||
6F8000
|
heap
|
page read and write
|
||
79E000
|
stack
|
page read and write
|
||
3EFE000
|
stack
|
page read and write
|
||
65E000
|
stack
|
page read and write
|
||
32C2000
|
heap
|
page read and write
|
||
414000
|
unkown
|
page write copy
|
||
3C5C000
|
stack
|
page read and write
|
||
7AD000
|
stack
|
page read and write
|
||
6B8000
|
heap
|
page read and write
|
||
3D5C000
|
stack
|
page read and write
|
||
9BE000
|
stack
|
page read and write
|
||
4B0000
|
unkown
|
page readonly
|
||
48C0000
|
heap
|
page read and write
|
||
702000
|
heap
|
page read and write
|
||
3AFE000
|
stack
|
page read and write
|
||
6FF000
|
heap
|
page read and write
|
||
702000
|
heap
|
page read and write
|
||
700000
|
heap
|
page read and write
|
||
32CE000
|
stack
|
page read and write
|
||
43BF000
|
stack
|
page read and write
|
||
75F000
|
stack
|
page read and write
|
||
135B000
|
heap
|
page read and write
|
||
6BA000
|
heap
|
page read and write
|
||
1300000
|
heap
|
page read and write
|
||
114D000
|
stack
|
page read and write
|
||
401000
|
unkown
|
page execute read
|
||
3D7F000
|
stack
|
page read and write
|
||
9C0000
|
heap
|
page read and write
|
||
6AD000
|
heap
|
page read and write
|
||
6F8000
|
heap
|
page read and write
|
||
2AF8000
|
heap
|
page read and write
|
||
6FD000
|
heap
|
page read and write
|
||
401000
|
unkown
|
page execute read
|
||
688000
|
heap
|
page read and write
|
||
7D0000
|
heap
|
page read and write
|
||
400000
|
heap
|
page read and write
|
||
57A000
|
heap
|
page read and write
|
||
6F6000
|
heap
|
page read and write
|
||
92F000
|
stack
|
page read and write
|
||
414000
|
unkown
|
page read and write
|
||
31C0000
|
heap
|
page read and write
|
||
35FF000
|
stack
|
page read and write
|
||
1600000
|
heap
|
page read and write
|
||
70B000
|
heap
|
page read and write
|
||
6FF000
|
heap
|
page read and write
|
||
940000
|
heap
|
page read and write
|
||
6EE000
|
heap
|
page read and write
|
||
340E000
|
stack
|
page read and write
|
||
4B4000
|
unkown
|
page readonly
|
||
6F5000
|
heap
|
page read and write
|
||
414000
|
unkown
|
page write copy
|
||
FE000
|
stack
|
page read and write
|
||
700000
|
heap
|
page read and write
|
||
295E000
|
stack
|
page read and write
|
||
B2F000
|
stack
|
page read and write
|
||
76F000
|
stack
|
page read and write
|
||
9C0000
|
heap
|
page read and write
|
||
1100000
|
heap
|
page read and write
|
||
9C000
|
stack
|
page read and write
|
||
373F000
|
stack
|
page read and write
|
||
A00000
|
heap
|
page read and write
|
||
94E000
|
stack
|
page read and write
|
||
2EEC000
|
stack
|
page read and write
|
||
2DE0000
|
heap
|
page read and write
|
||
6F1000
|
heap
|
page read and write
|
||
130A000
|
heap
|
page read and write
|
||
6EC000
|
heap
|
page read and write
|
||
56E000
|
stack
|
page read and write
|
||
401000
|
unkown
|
page execute read
|
||
709000
|
heap
|
page read and write
|
||
69F000
|
heap
|
page read and write
|
||
15FF000
|
stack
|
page read and write
|
||
1F0000
|
heap
|
page read and write
|
||
4B1000
|
unkown
|
page execute read
|
||
4B4000
|
unkown
|
page readonly
|
||
417E000
|
stack
|
page read and write
|
||
14FF000
|
stack
|
page read and write
|
||
39FE000
|
stack
|
page read and write
|
||
322F000
|
stack
|
page read and write
|
||
7DE000
|
stack
|
page read and write
|
||
11CE000
|
stack
|
page read and write
|
||
5B0D000
|
stack
|
page read and write
|
||
440000
|
heap
|
page read and write
|
||
89F000
|
stack
|
page read and write
|
||
70B000
|
heap
|
page read and write
|
||
312E000
|
stack
|
page read and write
|
||
39BF000
|
stack
|
page read and write
|
||
403E000
|
stack
|
page read and write
|
||
DB6000
|
stack
|
page read and write
|
||
32A0000
|
heap
|
page read and write
|
||
4C5000
|
heap
|
page read and write
|
||
69A000
|
heap
|
page read and write
|
||
33D0000
|
heap
|
page read and write
|
||
A10000
|
heap
|
page read and write
|
||
400000
|
unkown
|
page readonly
|
||
5B0000
|
heap
|
page read and write
|
||
11D5000
|
heap
|
page read and write
|
||
420000
|
heap
|
page read and write
|
||
11D0000
|
heap
|
page read and write
|
||
344E000
|
stack
|
page read and write
|
||
2B9F000
|
stack
|
page read and write
|
||
413F000
|
stack
|
page read and write
|
||
2CDC000
|
stack
|
page read and write
|
||
368E000
|
stack
|
page read and write
|
||
400000
|
unkown
|
page readonly
|
||
3230000
|
heap
|
page read and write
|
||
43FE000
|
stack
|
page read and write
|
||
136A000
|
heap
|
page read and write
|
||
401000
|
unkown
|
page execute read
|
||
3A5F000
|
stack
|
page read and write
|
||
1377000
|
heap
|
page read and write
|
||
26D0000
|
heap
|
page read and write
|
||
16E0000
|
heap
|
page read and write
|
||
2A9E000
|
stack
|
page read and write
|
||
401000
|
unkown
|
page execute read
|
||
3DBE000
|
stack
|
page read and write
|
||
130000
|
heap
|
page read and write
|
||
19D000
|
stack
|
page read and write
|
||
90F000
|
stack
|
page read and write
|
||
401000
|
unkown
|
page execute read
|
||
840000
|
heap
|
page read and write
|
||
70A000
|
heap
|
page read and write
|
||
420000
|
heap
|
page read and write
|
||
400000
|
unkown
|
page readonly
|
||
1379000
|
heap
|
page read and write
|
||
311E000
|
stack
|
page read and write
|
||
710000
|
heap
|
page read and write
|
||
70C000
|
heap
|
page read and write
|
||
49C1000
|
heap
|
page read and write
|
||
6EC000
|
heap
|
page read and write
|
||
930000
|
heap
|
page read and write
|
There are 316 hidden memdumps, click here to show them.