Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
12Jh49DCAj.exe
|
PE32+ executable (GUI) x86-64, for MS Windows
|
initial sample
|
||
C:\ProgramData\obuuzbczoxdo\jjlazghkkuth.exe
|
PE32+ executable (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Windows\Temp\ovabrjmyzhdo.sys
|
PE32+ executable (native) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_eivlhemw.dcb.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_jrepo3wb.v1p.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_tzt5kz4g.cir.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_wiecjbmf.q0f.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Windows\System32\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
|
data
|
dropped
|
||
C:\Windows\Temp\__PSScriptPolicyTest_0htk1wp1.uea.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Windows\Temp\__PSScriptPolicyTest_0xe1xeou.vfv.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Windows\Temp\__PSScriptPolicyTest_2a3dexgp.bsj.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Windows\Temp\__PSScriptPolicyTest_ixvurond.xkj.psm1
|
ASCII text, with no line terminators
|
dropped
|
There are 3 hidden files, click here to show them.
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\12Jh49DCAj.exe
|
"C:\Users\user\Desktop\12Jh49DCAj.exe"
|
||
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
|
C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramData)
-ExclusionExtension '.exe' -Force
|
||
C:\Windows\System32\powercfg.exe
|
C:\Windows\system32\powercfg.exe /x -hibernate-timeout-ac 0
|
||
C:\Windows\System32\powercfg.exe
|
C:\Windows\system32\powercfg.exe /x -hibernate-timeout-dc 0
|
||
C:\Windows\System32\powercfg.exe
|
C:\Windows\system32\powercfg.exe /x -standby-timeout-ac 0
|
||
C:\Windows\System32\powercfg.exe
|
C:\Windows\system32\powercfg.exe /x -standby-timeout-dc 0
|
||
C:\Windows\System32\sc.exe
|
C:\Windows\system32\sc.exe delete "ODTUTVYC"
|
||
C:\Windows\System32\sc.exe
|
C:\Windows\system32\sc.exe create "ODTUTVYC" binpath= "C:\ProgramData\obuuzbczoxdo\jjlazghkkuth.exe" start= "auto"
|
||
C:\Windows\System32\sc.exe
|
C:\Windows\system32\sc.exe stop eventlog
|
||
C:\Windows\System32\sc.exe
|
C:\Windows\system32\sc.exe start "ODTUTVYC"
|
||
C:\ProgramData\obuuzbczoxdo\jjlazghkkuth.exe
|
C:\ProgramData\obuuzbczoxdo\jjlazghkkuth.exe
|
||
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
|
C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramData)
-ExclusionExtension '.exe' -Force
|
||
C:\Windows\System32\powercfg.exe
|
C:\Windows\system32\powercfg.exe /x -hibernate-timeout-ac 0
|
||
C:\Windows\System32\powercfg.exe
|
C:\Windows\system32\powercfg.exe /x -hibernate-timeout-dc 0
|
||
C:\Windows\System32\powercfg.exe
|
C:\Windows\system32\powercfg.exe /x -standby-timeout-ac 0
|
||
C:\Windows\System32\powercfg.exe
|
C:\Windows\system32\powercfg.exe /x -standby-timeout-dc 0
|
||
C:\Windows\explorer.exe
|
explorer.exe
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\cmd.exe
|
C:\Windows\system32\cmd.exe /c wusa /uninstall /kb:890830 /quiet /norestart
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\wusa.exe
|
wusa /uninstall /kb:890830 /quiet /norestart
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\cmd.exe
|
C:\Windows\system32\cmd.exe /c wusa /uninstall /kb:890830 /quiet /norestart
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\wusa.exe
|
wusa /uninstall /kb:890830 /quiet /norestart
|
||
C:\Windows\System32\svchost.exe
|
C:\Windows\System32\svchost.exe -k LocalService -p -s LicenseManager
|
There are 29 hidden processes, click here to show them.
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
http://crl.cloudflare.com/origin_ca.crl0
|
unknown
|
||
http://ocsp.cloudflare.com/origin_ca
|
unknown
|
||
http://crl.cloudflare.com/origin_ca.crlC
|
unknown
|
||
http://ocsp.cloudflare.com/origin_ca0
|
unknown
|
||
http://crl.cloudflare.com/origin_ca.crl
|
unknown
|
Domains
Name
|
IP
|
Malicious
|
|
---|---|---|---|
xmr-eu1.nanopool.org
|
51.15.65.182
|
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
54.37.232.103
|
unknown
|
France
|
Registry
Path
|
Value
|
Malicious
|
|
---|---|---|---|
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\MRT
|
DontOfferThroughWUAU
|
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
100C000
|
heap
|
page read and write
|
||
F50000
|
heap
|
page read and write
|
||
F90000
|
heap
|
page read and write
|
||
F75000
|
heap
|
page read and write
|
||
20AEA0D5000
|
heap
|
page read and write
|
||
11E80000
|
trusted library allocation
|
page read and write
|
||
1DD0000
|
trusted library allocation
|
page read and write
|
||
165CCF40000
|
heap
|
page read and write
|
||
CAF8FF000
|
stack
|
page read and write
|
||
1DD0000
|
trusted library allocation
|
page read and write
|
||
1D10000
|
trusted library allocation
|
page read and write
|
||
1DD0000
|
trusted library allocation
|
page read and write
|
||
9B3887F000
|
stack
|
page read and write
|
||
1DD0000
|
trusted library allocation
|
page read and write
|
||
1DD0000
|
trusted library allocation
|
page read and write
|
||
23898BD0000
|
heap
|
page read and write
|
||
140009000
|
unkown
|
page read and write
|
||
2F730A39000
|
heap
|
page read and write
|
||
1DB0000
|
trusted library allocation
|
page read and write
|
||
20AEA0D0000
|
heap
|
page read and write
|
||
1C43C768000
|
heap
|
page read and write
|
||
11E80000
|
trusted library allocation
|
page read and write
|
||
1DD0000
|
trusted library allocation
|
page read and write
|
||
1FE187B0000
|
unkown
|
page read and write
|
||
1D10000
|
trusted library allocation
|
page read and write
|
||
1DD0000
|
trusted library allocation
|
page read and write
|
||
1D10000
|
trusted library allocation
|
page read and write
|
||
D1DD7F000
|
stack
|
page read and write
|
||
1DD0000
|
trusted library allocation
|
page read and write
|
||
1DB0000
|
trusted library allocation
|
page read and write
|
||
1DB0000
|
trusted library allocation
|
page read and write
|
||
1DB0000
|
trusted library allocation
|
page read and write
|
||
1DB0000
|
trusted library allocation
|
page read and write
|
||
1DD0000
|
trusted library allocation
|
page read and write
|
||
1A9DEFE0000
|
heap
|
page read and write
|
||
CC3EEFF000
|
stack
|
page read and write
|
||
1DB0000
|
trusted library allocation
|
page read and write
|
||
1DD0000
|
trusted library allocation
|
page read and write
|
||
11E80000
|
trusted library allocation
|
page read and write
|
||
259B32A0000
|
heap
|
page read and write
|
||
7FF759BF0000
|
unkown
|
page readonly
|
||
11E80000
|
trusted library allocation
|
page read and write
|
||
1DA0000
|
direct allocation
|
page execute and read and write
|
||
F30000
|
heap
|
page read and write
|
||
1DB0000
|
trusted library allocation
|
page read and write
|
||
1D10000
|
trusted library allocation
|
page read and write
|
||
1DB0000
|
trusted library allocation
|
page read and write
|
||
27ECF420000
|
heap
|
page read and write
|
||
11E80000
|
trusted library allocation
|
page read and write
|
||
259B2F99000
|
heap
|
page read and write
|
||
1D10000
|
trusted library allocation
|
page read and write
|
||
1DB0000
|
trusted library allocation
|
page read and write
|
||
1DC1000
|
direct allocation
|
page execute and read and write
|
||
F87E2FF000
|
stack
|
page read and write
|
||
11E80000
|
trusted library allocation
|
page read and write
|
||
1DB0000
|
trusted library allocation
|
page read and write
|
||
209695B0000
|
heap
|
page read and write
|
||
11E80000
|
trusted library allocation
|
page read and write
|
||
1D10000
|
trusted library allocation
|
page read and write
|
||
27ECF320000
|
heap
|
page read and write
|
||
23898800000
|
heap
|
page read and write
|
||
11E80000
|
trusted library allocation
|
page read and write
|
||
1C43CA30000
|
heap
|
page read and write
|
||
1992000
|
heap
|
page read and write
|
||
140001000
|
unkown
|
page execute read
|
||
11E80000
|
trusted library allocation
|
page read and write
|
||
1F58CA02000
|
heap
|
page read and write
|
||
1CD0000
|
trusted library allocation
|
page read and write
|
||
11E80000
|
trusted library allocation
|
page read and write
|
||
1DB0000
|
trusted library allocation
|
page read and write
|
||
7FF6C5320000
|
unkown
|
page readonly
|
||
209695D0000
|
unkown
|
page read and write
|
||
27ECF5A0000
|
heap
|
page read and write
|
||
1DD0000
|
trusted library allocation
|
page read and write
|
||
1A9E000
|
stack
|
page read and write
|
||
11E80000
|
trusted library allocation
|
page read and write
|
||
1DB0000
|
trusted library allocation
|
page read and write
|
||
11E80000
|
trusted library allocation
|
page read and write
|
||
1D10000
|
trusted library allocation
|
page read and write
|
||
1DB0000
|
trusted library allocation
|
page read and write
|
||
3B16A7D000
|
stack
|
page read and write
|
||
1DD0000
|
trusted library allocation
|
page read and write
|
||
1DB0000
|
trusted library allocation
|
page read and write
|
||
19DB000
|
heap
|
page read and write
|
||
21EBAFC0000
|
heap
|
page read and write
|
||
1DB0000
|
trusted library allocation
|
page read and write
|
||
1F4539E0000
|
heap
|
page read and write
|
||
1DB0000
|
trusted library allocation
|
page read and write
|
||
1D10000
|
trusted library allocation
|
page read and write
|
||
11E80000
|
trusted library allocation
|
page read and write
|
||
1DB0000
|
trusted library allocation
|
page read and write
|
||
199A000
|
heap
|
page read and write
|
||
165CCED0000
|
heap
|
page read and write
|
||
1F4539E5000
|
heap
|
page read and write
|
||
1D10000
|
trusted library allocation
|
page read and write
|
||
1DD0000
|
trusted library allocation
|
page read and write
|
||
18D78510000
|
heap
|
page read and write
|
||
1DB0000
|
trusted library allocation
|
page read and write
|
||
7FF6C55A4000
|
unkown
|
page readonly
|
||
21EBAF20000
|
heap
|
page read and write
|
||
1DB0000
|
trusted library allocation
|
page read and write
|
||
1DB0000
|
trusted library allocation
|
page read and write
|
||
1DB0000
|
trusted library allocation
|
page read and write
|
||
27ECF400000
|
heap
|
page read and write
|
||
6F3B0FE000
|
stack
|
page read and write
|
||
1A0E000
|
heap
|
page read and write
|
||
1F58C8C0000
|
heap
|
page read and write
|
||
1DB0000
|
trusted library allocation
|
page read and write
|
||
1DD0000
|
trusted library allocation
|
page read and write
|
||
11E80000
|
trusted library allocation
|
page read and write
|
||
22A824E0000
|
heap
|
page read and write
|
||
11E80000
|
trusted library allocation
|
page read and write
|
||
1DD0000
|
trusted library allocation
|
page read and write
|
||
7FF6C5320000
|
unkown
|
page readonly
|
||
1DB0000
|
trusted library allocation
|
page read and write
|
||
1DB0000
|
trusted library allocation
|
page read and write
|
||
7FF759BF9000
|
unkown
|
page readonly
|
||
22A82560000
|
heap
|
page read and write
|
||
189E000
|
stack
|
page read and write
|
||
1F58CA00000
|
heap
|
page read and write
|
||
14000A000
|
unkown
|
page readonly
|
||
DA3A96D000
|
stack
|
page read and write
|
||
1DB0000
|
trusted library allocation
|
page read and write
|
||
1F58D202000
|
trusted library allocation
|
page read and write
|
||
1CD0000
|
trusted library allocation
|
page read and write
|
||
1DB0000
|
trusted library allocation
|
page read and write
|
||
1DB0000
|
trusted library allocation
|
page read and write
|
||
2AE497F5000
|
heap
|
page read and write
|
||
1D90000
|
direct allocation
|
page execute and read and write
|
||
1DB0000
|
trusted library allocation
|
page read and write
|
||
1DB0000
|
trusted library allocation
|
page read and write
|
||
1960000
|
heap
|
page read and write
|
||
1DD0000
|
trusted library allocation
|
page read and write
|
||
1DB0000
|
trusted library allocation
|
page read and write
|
||
19E5000
|
heap
|
page read and write
|
||
11E80000
|
trusted library allocation
|
page read and write
|
||
1D10000
|
trusted library allocation
|
page read and write
|
||
11E80000
|
trusted library allocation
|
page read and write
|
||
1DB0000
|
trusted library allocation
|
page read and write
|
||
1DD0000
|
trusted library allocation
|
page read and write
|
||
1DB0000
|
trusted library allocation
|
page read and write
|
||
7FF759BFB000
|
unkown
|
page read and write
|
||
D1D91D000
|
stack
|
page read and write
|
||
1DB0000
|
trusted library allocation
|
page read and write
|
||
FA2000
|
heap
|
page read and write
|
||
1DD0000
|
trusted library allocation
|
page read and write
|
||
2AE495A8000
|
heap
|
page read and write
|
||
7FF6C5329000
|
unkown
|
page readonly
|
||
7FF759BFB000
|
unkown
|
page write copy
|
||
1DB0000
|
trusted library allocation
|
page read and write
|
||
20AE9E00000
|
heap
|
page read and write
|
||
1DB0000
|
trusted library allocation
|
page read and write
|
||
1CD0000
|
direct allocation
|
page execute and read and write
|
||
1DB0000
|
trusted library allocation
|
page read and write
|
||
1DD0000
|
trusted library allocation
|
page read and write
|
||
6F3B1FF000
|
stack
|
page read and write
|
||
1DD0000
|
trusted library allocation
|
page read and write
|
||
21EBAEF0000
|
heap
|
page read and write
|
||
1A9DF029000
|
heap
|
page read and write
|
||
1DB0000
|
trusted library allocation
|
page read and write
|
||
11E80000
|
trusted library allocation
|
page read and write
|
||
1D10000
|
trusted library allocation
|
page read and write
|
||
20969810000
|
heap
|
page read and write
|
||
1DD0000
|
trusted library allocation
|
page read and write
|
||
2AE49580000
|
heap
|
page read and write
|
||
1DB0000
|
trusted library allocation
|
page read and write
|
||
1A9DEFF0000
|
heap
|
page read and write
|
||
1D10000
|
trusted library allocation
|
page read and write
|
||
1DB0000
|
trusted library allocation
|
page read and write
|
||
1DB0000
|
trusted library allocation
|
page read and write
|
||
23288FF000
|
stack
|
page read and write
|
||
1DB0000
|
trusted library allocation
|
page read and write
|
||
7FF6C532C000
|
unkown
|
page write copy
|
||
1DD0000
|
trusted library allocation
|
page read and write
|
||
1DB0000
|
trusted library allocation
|
page read and write
|
||
1DB0000
|
trusted library allocation
|
page read and write
|
||
1285000
|
heap
|
page read and write
|
||
1D10000
|
trusted library allocation
|
page read and write
|
||
3B16AFF000
|
stack
|
page read and write
|
||
1D10000
|
trusted library allocation
|
page read and write
|
||
19DD000
|
heap
|
page read and write
|
||
1DB1000
|
direct allocation
|
page execute and read and write
|
||
27ECF5A5000
|
heap
|
page read and write
|
||
1DD0000
|
trusted library allocation
|
page read and write
|
||
11E80000
|
trusted library allocation
|
page read and write
|
||
1DA0000
|
direct allocation
|
page execute and read and write
|
||
1F58CA13000
|
heap
|
page read and write
|
||
127E000
|
stack
|
page read and write
|
||
2D4A3CF000
|
stack
|
page read and write
|
||
1DD0000
|
trusted library allocation
|
page read and write
|
||
1DB0000
|
trusted library allocation
|
page read and write
|
||
1DB0000
|
trusted library allocation
|
page read and write
|
||
1DB0000
|
trusted library allocation
|
page read and write
|
||
1DD0000
|
trusted library allocation
|
page read and write
|
||
1DD0000
|
trusted library allocation
|
page read and write
|
||
23898830000
|
heap
|
page read and write
|
||
140007000
|
unkown
|
page readonly
|
||
1DD0000
|
trusted library allocation
|
page read and write
|
||
1982000
|
heap
|
page read and write
|
||
183F8B90000
|
heap
|
page read and write
|
||
E4D8FE000
|
unkown
|
page readonly
|
||
259B31A0000
|
heap
|
page read and write
|
||
11E80000
|
trusted library allocation
|
page read and write
|
||
92F9C7F000
|
stack
|
page read and write
|
||
7FF6C532B000
|
unkown
|
page read and write
|
||
1DB0000
|
trusted library allocation
|
page read and write
|
||
1DD0000
|
trusted library allocation
|
page read and write
|
||
11E80000
|
trusted library allocation
|
page read and write
|
||
1DB0000
|
trusted library allocation
|
page read and write
|
||
1F4535B0000
|
heap
|
page read and write
|
||
1DB0000
|
trusted library allocation
|
page read and write
|
||
145B62C0000
|
heap
|
page read and write
|
||
259B3180000
|
heap
|
page read and write
|
||
1F58CA3F000
|
heap
|
page read and write
|
||
2F730950000
|
heap
|
page read and write
|
||
7FF759BF1000
|
unkown
|
page execute read
|
||
1DD0000
|
trusted library allocation
|
page read and write
|
||
19E3000
|
heap
|
page read and write
|
||
1C43CA35000
|
heap
|
page read and write
|
||
165CCEB0000
|
heap
|
page read and write
|
||
11E80000
|
trusted library allocation
|
page read and write
|
||
419F8FF000
|
stack
|
page read and write
|
||
1DB0000
|
trusted library allocation
|
page read and write
|
||
209695D0000
|
unkown
|
page read and write
|
||
20969820000
|
unkown
|
page read and write
|
||
1DB0000
|
trusted library allocation
|
page read and write
|
||
1DD0000
|
trusted library allocation
|
page read and write
|
||
1DD0000
|
trusted library allocation
|
page read and write
|
||
CC3EE7D000
|
stack
|
page read and write
|
||
1DB0000
|
trusted library allocation
|
page read and write
|
||
1DB0000
|
trusted library allocation
|
page read and write
|
||
1DD0000
|
trusted library allocation
|
page read and write
|
||
1A9DF300000
|
heap
|
page read and write
|
||
1DB0000
|
trusted library allocation
|
page read and write
|
||
1D10000
|
trusted library allocation
|
page read and write
|
||
2800000
|
direct allocation
|
page read and write
|
||
1DB0000
|
trusted library allocation
|
page read and write
|
||
1DD0000
|
trusted library allocation
|
page read and write
|
||
1DD0000
|
trusted library allocation
|
page read and write
|
||
2D4A34D000
|
stack
|
page read and write
|
||
238988D0000
|
heap
|
page read and write
|
||
42ABF7F000
|
stack
|
page read and write
|
||
1D10000
|
trusted library allocation
|
page read and write
|
||
22A82510000
|
heap
|
page read and write
|
||
1DB0000
|
trusted library allocation
|
page read and write
|
||
1E00000
|
direct allocation
|
page read and write
|
||
1DB0000
|
trusted library allocation
|
page read and write
|
||
1DB0000
|
trusted library allocation
|
page read and write
|
||
1DB0000
|
trusted library allocation
|
page read and write
|
||
1DB0000
|
trusted library allocation
|
page read and write
|
||
1DB0000
|
trusted library allocation
|
page read and write
|
||
7FF759BF1000
|
unkown
|
page execute read
|
||
1DB0000
|
trusted library allocation
|
page read and write
|
||
3C00000
|
direct allocation
|
page read and write
|
||
1DB0000
|
trusted library allocation
|
page read and write
|
||
1DB0000
|
trusted library allocation
|
page read and write
|
||
18D78310000
|
heap
|
page read and write
|
||
165CCDD0000
|
heap
|
page read and write
|
||
1C43C760000
|
heap
|
page read and write
|
||
1DD0000
|
trusted library allocation
|
page read and write
|
||
1DB0000
|
trusted library allocation
|
page read and write
|
||
1DB0000
|
trusted library allocation
|
page read and write
|
||
179B000
|
stack
|
page read and write
|
||
11E80000
|
trusted library allocation
|
page read and write
|
||
41355FF000
|
stack
|
page read and write
|
||
1DB0000
|
trusted library allocation
|
page read and write
|
||
1DD0000
|
trusted library allocation
|
page read and write
|
||
1FE18340000
|
heap
|
page read and write
|
||
1DB0000
|
trusted library allocation
|
page read and write
|
||
1C9F000
|
stack
|
page read and write
|
||
1DB0000
|
trusted library allocation
|
page read and write
|
||
1DB0000
|
trusted library allocation
|
page read and write
|
||
1DB0000
|
trusted library allocation
|
page read and write
|
||
1DB0000
|
trusted library allocation
|
page read and write
|
||
1DB0000
|
trusted library allocation
|
page read and write
|
||
1D10000
|
trusted library allocation
|
page read and write
|
||
1DD0000
|
trusted library allocation
|
page read and write
|
||
E4DFFD000
|
stack
|
page read and write
|
||
1DD0000
|
trusted library allocation
|
page read and write
|
||
1DD0000
|
trusted library allocation
|
page read and write
|
||
11E80000
|
trusted library allocation
|
page read and write
|
||
1DB0000
|
trusted library allocation
|
page read and write
|
||
1D10000
|
trusted library allocation
|
page read and write
|
||
1DB0000
|
trusted library allocation
|
page read and write
|
||
11E80000
|
trusted library allocation
|
page read and write
|
||
3B16B7F000
|
stack
|
page read and write
|
||
11E80000
|
trusted library allocation
|
page read and write
|
||
2AE49560000
|
heap
|
page read and write
|
||
2AE49480000
|
heap
|
page read and write
|
||
1DD0000
|
trusted library allocation
|
page read and write
|
||
145B5FC0000
|
heap
|
page read and write
|
||
1280000
|
heap
|
page read and write
|
||
19DF000
|
heap
|
page read and write
|
||
22A828C5000
|
heap
|
page read and write
|
||
1A9DF305000
|
heap
|
page read and write
|
||
259B32A5000
|
heap
|
page read and write
|
||
1DB0000
|
trusted library allocation
|
page read and write
|
||
21EBAF10000
|
heap
|
page read and write
|
||
1F453590000
|
heap
|
page read and write
|
||
1DD0000
|
trusted library allocation
|
page read and write
|
||
11E80000
|
trusted library allocation
|
page read and write
|
||
1DD0000
|
trusted library allocation
|
page read and write
|
||
18D78328000
|
heap
|
page read and write
|
||
11E80000
|
trusted library allocation
|
page read and write
|
||
183F8F20000
|
heap
|
page read and write
|
||
11E80000
|
trusted library allocation
|
page read and write
|
||
21EBAF40000
|
heap
|
page read and write
|
||
1DB0000
|
trusted library allocation
|
page read and write
|
||
1C43C6A0000
|
heap
|
page read and write
|
||
5A00000
|
direct allocation
|
page read and write
|
||
1F58CB02000
|
heap
|
page read and write
|
||
FC5000
|
heap
|
page read and write
|
||
19FF000
|
heap
|
page read and write
|
||
6400000
|
direct allocation
|
page read and write
|
||
1DB0000
|
trusted library allocation
|
page read and write
|
||
11E80000
|
trusted library allocation
|
page read and write
|
||
B9B000
|
stack
|
page read and write
|
||
1DB0000
|
trusted library allocation
|
page read and write
|
||
1DD0000
|
trusted library allocation
|
page read and write
|
||
7FF6C532B000
|
unkown
|
page write copy
|
||
2F730D30000
|
heap
|
page read and write
|
||
11E80000
|
trusted library allocation
|
page read and write
|
||
165CCCC8000
|
heap
|
page read and write
|
||
1DB0000
|
trusted library allocation
|
page read and write
|
||
1DB0000
|
trusted library allocation
|
page read and write
|
||
1DD0000
|
trusted library allocation
|
page read and write
|
||
1DD0000
|
trusted library allocation
|
page read and write
|
||
197A000
|
heap
|
page read and write
|
||
1DB0000
|
trusted library allocation
|
page read and write
|
||
92F995D000
|
stack
|
page read and write
|
||
1DB0000
|
trusted library allocation
|
page read and write
|
||
92F99DF000
|
stack
|
page read and write
|
||
112E000
|
stack
|
page read and write
|
||
11E80000
|
trusted library allocation
|
page read and write
|
||
1DB0000
|
trusted library allocation
|
page read and write
|
||
1D10000
|
trusted library allocation
|
page read and write
|
||
11E80000
|
trusted library allocation
|
page read and write
|
||
1DB0000
|
trusted library allocation
|
page read and write
|
||
11E80000
|
trusted library allocation
|
page read and write
|
||
259B2F90000
|
heap
|
page read and write
|
||
EE0000
|
direct allocation
|
page execute read
|
||
209694D0000
|
heap
|
page read and write
|
||
1DB0000
|
trusted library allocation
|
page read and write
|
||
22A824F0000
|
heap
|
page read and write
|
||
1A9DF1F0000
|
heap
|
page read and write
|
||
1D10000
|
trusted library allocation
|
page read and write
|
||
145B5FB0000
|
heap
|
page read and write
|
||
171E000
|
stack
|
page read and write
|
||
1DB0000
|
trusted library allocation
|
page read and write
|
||
2D4A67F000
|
stack
|
page read and write
|
||
23898810000
|
heap
|
page read and write
|
||
11E80000
|
trusted library allocation
|
page read and write
|
||
1DB0000
|
trusted library allocation
|
page read and write
|
||
11E80000
|
trusted library allocation
|
page read and write
|
||
1DB0000
|
trusted library allocation
|
page read and write
|
||
1DB0000
|
trusted library allocation
|
page read and write
|
||
11E80000
|
trusted library allocation
|
page read and write
|
||
1DB0000
|
trusted library allocation
|
page read and write
|
||
1DD0000
|
trusted library allocation
|
page read and write
|
||
1D10000
|
trusted library allocation
|
page read and write
|
||
1DB0000
|
trusted library allocation
|
page read and write
|
||
1DB0000
|
trusted library allocation
|
page read and write
|
||
7FF759E74000
|
unkown
|
page readonly
|
||
D1DC7E000
|
stack
|
page read and write
|
||
1DB0000
|
trusted library allocation
|
page read and write
|
||
1DD0000
|
trusted library allocation
|
page read and write
|
||
1DB0000
|
trusted library allocation
|
page read and write
|
||
FA0000
|
heap
|
page read and write
|
||
1DB0000
|
trusted library allocation
|
page read and write
|
||
1FE187A5000
|
heap
|
page read and write
|
||
F87E27F000
|
stack
|
page read and write
|
||
20969815000
|
heap
|
page read and write
|
||
1DB0000
|
trusted library allocation
|
page read and write
|
||
1DB0000
|
trusted library allocation
|
page read and write
|
||
1DB0000
|
trusted library allocation
|
page read and write
|
||
238988D8000
|
heap
|
page read and write
|
||
1C43C680000
|
heap
|
page read and write
|
||
1DB0000
|
trusted library allocation
|
page read and write
|
||
1DB0000
|
trusted library allocation
|
page read and write
|
||
1DD0000
|
trusted library allocation
|
page read and write
|
||
19E1000
|
heap
|
page read and write
|
||
419F87F000
|
stack
|
page read and write
|
||
1DB0000
|
trusted library allocation
|
page read and write
|
||
E4D7FD000
|
stack
|
page read and write
|
||
183F8F25000
|
heap
|
page read and write
|
||
1D10000
|
trusted library allocation
|
page read and write
|
||
1DB0000
|
trusted library allocation
|
page read and write
|
||
27ECF460000
|
heap
|
page read and write
|
||
1F58C9A0000
|
heap
|
page read and write
|
||
1DD0000
|
trusted library allocation
|
page read and write
|
||
183F8C59000
|
heap
|
page read and write
|
||
11E80000
|
trusted library allocation
|
page read and write
|
||
20AE9D20000
|
heap
|
page read and write
|
||
1DB0000
|
trusted library allocation
|
page read and write
|
||
3200000
|
direct allocation
|
page read and write
|
||
11E80000
|
trusted library allocation
|
page read and write
|
||
191F000
|
stack
|
page read and write
|
||
7FF6C55A2000
|
unkown
|
page read and write
|
||
1B9E000
|
stack
|
page read and write
|
||
7FF6C5321000
|
unkown
|
page execute read
|
||
11E80000
|
trusted library allocation
|
page read and write
|
||
2F730B30000
|
heap
|
page read and write
|
||
1D10000
|
trusted library allocation
|
page read and write
|
||
11E80000
|
trusted library allocation
|
page read and write
|
||
1FE18350000
|
heap
|
page read and write
|
||
11E80000
|
trusted library allocation
|
page read and write
|
||
1DD0000
|
trusted library allocation
|
page read and write
|
||
7FF759BF0000
|
unkown
|
page readonly
|
||
1DB0000
|
trusted library allocation
|
page read and write
|
||
1920000
|
heap
|
page read and write
|
||
877AC7F000
|
stack
|
page read and write
|
||
11E80000
|
trusted library allocation
|
page read and write
|
||
20AE9E20000
|
heap
|
page read and write
|
||
BB0000
|
heap
|
page read and write
|
||
22A82568000
|
heap
|
page read and write
|
||
11E80000
|
trusted library allocation
|
page read and write
|
||
1CD0000
|
trusted library allocation
|
page read and write
|
||
1DB0000
|
trusted library allocation
|
page read and write
|
||
1FE187A0000
|
heap
|
page read and write
|
||
1DB0000
|
trusted library allocation
|
page read and write
|
||
9F8F27D000
|
stack
|
page read and write
|
||
41354FD000
|
stack
|
page read and write
|
||
1DB0000
|
trusted library allocation
|
page read and write
|
||
CAF5CC000
|
stack
|
page read and write
|
||
2F730A30000
|
heap
|
page read and write
|
||
1DB0000
|
trusted library allocation
|
page read and write
|
||
11E80000
|
trusted library allocation
|
page read and write
|
||
198A000
|
heap
|
page read and write
|
||
1DB0000
|
trusted library allocation
|
page read and write
|
||
1DD0000
|
trusted library allocation
|
page read and write
|
||
1D10000
|
trusted library allocation
|
page read and write
|
||
165CCF45000
|
heap
|
page read and write
|
||
1D10000
|
trusted library allocation
|
page read and write
|
||
145B5FF0000
|
heap
|
page read and write
|
||
11E80000
|
trusted library allocation
|
page read and write
|
||
1D10000
|
trusted library allocation
|
page read and write
|
||
1DD0000
|
trusted library allocation
|
page read and write
|
||
1D8F000
|
stack
|
page read and write
|
||
11E80000
|
trusted library allocation
|
page read and write
|
||
11E80000
|
trusted library allocation
|
page read and write
|
||
11E80000
|
trusted library allocation
|
page read and write
|
||
1DB0000
|
trusted library allocation
|
page read and write
|
||
1DD0000
|
trusted library allocation
|
page read and write
|
||
18D785A5000
|
heap
|
page read and write
|
||
1DD0000
|
trusted library allocation
|
page read and write
|
||
1DB0000
|
trusted library allocation
|
page read and write
|
||
1DD0000
|
trusted library allocation
|
page read and write
|
||
11E80000
|
trusted library allocation
|
page read and write
|
||
11E80000
|
trusted library allocation
|
page read and write
|
||
1DD0000
|
trusted library allocation
|
page read and write
|
||
1DD0000
|
trusted library allocation
|
page read and write
|
||
F10000
|
trusted library allocation
|
page read and write
|
||
1D10000
|
trusted library allocation
|
page read and write
|
||
1DB0000
|
trusted library allocation
|
page read and write
|
||
1DB0000
|
trusted library allocation
|
page read and write
|
||
1DB0000
|
trusted library allocation
|
page read and write
|
||
183F8BA0000
|
heap
|
page read and write
|
||
1DD0000
|
trusted library allocation
|
page read and write
|
||
1DB0000
|
trusted library allocation
|
page read and write
|
||
1A9DF020000
|
heap
|
page read and write
|
||
21EBAF15000
|
heap
|
page read and write
|
||
11E80000
|
trusted library allocation
|
page read and write
|
||
1DB0000
|
trusted library allocation
|
page read and write
|
||
1D10000
|
trusted library allocation
|
page read and write
|
||
11E80000
|
trusted library allocation
|
page read and write
|
||
1DB0000
|
trusted library allocation
|
page read and write
|
||
4600000
|
direct allocation
|
page read and write
|
||
7FF6C55A4000
|
unkown
|
page readonly
|
||
7FF759E74000
|
unkown
|
page readonly
|
||
1DB0000
|
trusted library allocation
|
page read and write
|
||
11E80000
|
trusted library allocation
|
page read and write
|
||
20AE9EF0000
|
heap
|
page read and write
|
||
1F58C9D0000
|
trusted library allocation
|
page read and write
|
||
1DD0000
|
trusted library allocation
|
page read and write
|
||
11E80000
|
trusted library allocation
|
page read and write
|
||
2F730B50000
|
heap
|
page read and write
|
||
1DB0000
|
trusted library allocation
|
page read and write
|
||
20AE9EF7000
|
heap
|
page read and write
|
||
419F59C000
|
stack
|
page read and write
|
||
1F58CA45000
|
heap
|
page read and write
|
||
1DD0000
|
trusted library allocation
|
page read and write
|
||
232887D000
|
stack
|
page read and write
|
||
1D10000
|
trusted library allocation
|
page read and write
|
||
145B5FF8000
|
heap
|
page read and write
|
||
1DB0000
|
trusted library allocation
|
page read and write
|
||
42ABE7E000
|
stack
|
page read and write
|
||
1DD0000
|
trusted library allocation
|
page read and write
|
||
145B61C0000
|
heap
|
page read and write
|
||
1F453644000
|
heap
|
page read and write
|
||
1DB0000
|
trusted library allocation
|
page read and write
|
||
877A93C000
|
stack
|
page read and write
|
||
1DB0000
|
trusted library allocation
|
page read and write
|
||
1D10000
|
trusted library allocation
|
page read and write
|
||
7FF6C5321000
|
unkown
|
page execute read
|
||
1DB0000
|
trusted library allocation
|
page read and write
|
||
11E80000
|
trusted library allocation
|
page read and write
|
||
1DD0000
|
trusted library allocation
|
page read and write
|
||
1FE18400000
|
heap
|
page read and write
|
||
2AE495A0000
|
heap
|
page read and write
|
||
1DD0000
|
trusted library allocation
|
page read and write
|
||
1DB0000
|
trusted library allocation
|
page read and write
|
||
1F453630000
|
heap
|
page read and write
|
||
5000000
|
direct allocation
|
page read and write
|
||
27ECF468000
|
heap
|
page read and write
|
||
9B385BF000
|
stack
|
page read and write
|
||
1DB0000
|
trusted library allocation
|
page read and write
|
||
1DD0000
|
trusted library allocation
|
page read and write
|
||
1DB0000
|
trusted library allocation
|
page read and write
|
||
11E80000
|
trusted library allocation
|
page read and write
|
||
11E80000
|
trusted library allocation
|
page read and write
|
||
3BBC17C000
|
stack
|
page read and write
|
||
E4E0FE000
|
unkown
|
page readonly
|
||
7FF6C5329000
|
unkown
|
page readonly
|
||
11E00000
|
direct allocation
|
page read and write
|
||
11E80000
|
trusted library allocation
|
page read and write
|
||
1D10000
|
trusted library allocation
|
page read and write
|
||
1D10000
|
trusted library allocation
|
page read and write
|
||
1DB0000
|
trusted library allocation
|
page read and write
|
||
1DD0000
|
trusted library allocation
|
page read and write
|
||
11E80000
|
trusted library allocation
|
page read and write
|
||
1D10000
|
trusted library allocation
|
page read and write
|
||
1CD0000
|
trusted library allocation
|
page read and write
|
||
18D784F0000
|
heap
|
page read and write
|
||
1D10000
|
trusted library allocation
|
page read and write
|
||
F87DFDD000
|
stack
|
page read and write
|
||
1DB0000
|
trusted library allocation
|
page read and write
|
||
1DB0000
|
trusted library allocation
|
page read and write
|
||
1DB0000
|
trusted library allocation
|
page read and write
|
||
1DD0000
|
trusted library allocation
|
page read and write
|
||
1F58C8A0000
|
heap
|
page read and write
|
||
1C43C5A0000
|
heap
|
page read and write
|
||
1D10000
|
trusted library allocation
|
page read and write
|
||
1D90000
|
direct allocation
|
page execute and read and write
|
||
183F8F30000
|
unkown
|
page read and write
|
||
11E80000
|
trusted library allocation
|
page read and write
|
||
1DD0000
|
trusted library allocation
|
page read and write
|
||
1F453639000
|
heap
|
page read and write
|
||
19D9000
|
heap
|
page read and write
|
||
CAF87E000
|
stack
|
page read and write
|
||
41354EE000
|
stack
|
page read and write
|
||
1DB0000
|
trusted library allocation
|
page read and write
|
||
DA3AC7F000
|
stack
|
page read and write
|
||
1CD0000
|
trusted library allocation
|
page read and write
|
||
1DB0000
|
trusted library allocation
|
page read and write
|
||
BC0000
|
heap
|
page read and write
|
||
1DB0000
|
trusted library allocation
|
page read and write
|
||
1DB0000
|
trusted library allocation
|
page read and write
|
||
1DB0000
|
trusted library allocation
|
page read and write
|
||
1DB0000
|
trusted library allocation
|
page read and write
|
||
11E80000
|
trusted library allocation
|
page read and write
|
||
183F8C50000
|
heap
|
page read and write
|
||
259B30A0000
|
heap
|
page read and write
|
||
11E80000
|
trusted library allocation
|
page read and write
|
||
11E80000
|
trusted library allocation
|
page read and write
|
||
232897F000
|
stack
|
page read and write
|
||
11E80000
|
trusted library allocation
|
page read and write
|
||
1DD0000
|
trusted library allocation
|
page read and write
|
||
1DD0000
|
trusted library allocation
|
page read and write
|
||
1F58CA2B000
|
heap
|
page read and write
|
||
1DB0000
|
trusted library allocation
|
page read and write
|
||
1DB0000
|
trusted library allocation
|
page read and write
|
||
1DD0000
|
trusted library allocation
|
page read and write
|
||
1DB0000
|
trusted library allocation
|
page read and write
|
||
1DB0000
|
trusted library allocation
|
page read and write
|
||
42ABB5D000
|
stack
|
page read and write
|
||
1DB0000
|
trusted library allocation
|
page read and write
|
||
2F730D35000
|
heap
|
page read and write
|
||
F39000
|
heap
|
page read and write
|
||
21EBAFC8000
|
heap
|
page read and write
|
||
165CE8A0000
|
heap
|
page read and write
|
||
1D10000
|
trusted library allocation
|
page read and write
|
||
1DB0000
|
trusted library allocation
|
page read and write
|
||
1DB0000
|
trusted library allocation
|
page read and write
|
||
1D10000
|
trusted library allocation
|
page read and write
|
||
1DB0000
|
trusted library allocation
|
page read and write
|
||
23898BD5000
|
heap
|
page read and write
|
||
19F7000
|
heap
|
page read and write
|
||
11E80000
|
trusted library allocation
|
page read and write
|
||
7FF759BF9000
|
unkown
|
page readonly
|
||
1DB0000
|
trusted library allocation
|
page read and write
|
||
1DD0000
|
trusted library allocation
|
page read and write
|
||
1DD0000
|
trusted library allocation
|
page read and write
|
||
11E80000
|
trusted library allocation
|
page read and write
|
||
1DB0000
|
trusted library allocation
|
page read and write
|
||
1D10000
|
trusted library allocation
|
page read and write
|
||
11E80000
|
trusted library allocation
|
page read and write
|
||
11E80000
|
trusted library allocation
|
page read and write
|
||
1DB0000
|
trusted library allocation
|
page read and write
|
||
181F000
|
stack
|
page read and write
|
||
1DB0000
|
trusted library allocation
|
page read and write
|
||
11E80000
|
trusted library allocation
|
page read and write
|
||
1D10000
|
trusted library allocation
|
page read and write
|
||
140000000
|
unkown
|
page read and write
|
||
11E80000
|
trusted library allocation
|
page read and write
|
||
1D10000
|
trusted library allocation
|
page read and write
|
||
22A828C0000
|
heap
|
page read and write
|
||
1DD0000
|
trusted library allocation
|
page read and write
|
||
1DB0000
|
trusted library allocation
|
page read and write
|
||
9B3853D000
|
stack
|
page read and write
|
||
1DB0000
|
trusted library allocation
|
page read and write
|
||
F10000
|
heap
|
page readonly
|
||
11E80000
|
trusted library allocation
|
page read and write
|
||
1DB0000
|
trusted library allocation
|
page read and write
|
||
FC9000
|
heap
|
page read and write
|
||
20969630000
|
heap
|
page read and write
|
||
6F3B0ED000
|
stack
|
page read and write
|
||
1DB0000
|
trusted library allocation
|
page read and write
|
||
1DD0000
|
trusted library allocation
|
page read and write
|
||
11E80000
|
trusted library allocation
|
page read and write
|
||
2AE497F0000
|
heap
|
page read and write
|
||
165CCCC0000
|
heap
|
page read and write
|
||
E4D47B000
|
stack
|
page read and write
|
||
BE0000
|
heap
|
page read and write
|
||
CC3EF7F000
|
stack
|
page read and write
|
||
18D78320000
|
heap
|
page read and write
|
||
18D785A0000
|
heap
|
page read and write
|
||
145B62C5000
|
heap
|
page read and write
|
||
11E80000
|
trusted library allocation
|
page read and write
|
||
1F453580000
|
heap
|
page read and write
|
||
1DB0000
|
trusted library allocation
|
page read and write
|
There are 610 hidden memdumps, click here to show them.