Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
Q7bAgeTZB8vmku7.exe
|
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
|
initial sample
|
||
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\Q7bAgeTZB8vmku7.exe.log
|
ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\tmpC03F.tmp
|
XML 1.0 document, ASCII text
|
dropped
|
||
C:\Users\user\AppData\Roaming\ODIlHgaFNJ.exe
|
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\ODIlHgaFNJ.exe:Zone.Identifier
|
ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\ODIlHgaFNJ.exe.log
|
ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_10dmezfp.n1a.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_efzbhu0s.akm.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_hll5coqd.ufc.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_kwiwdhbb.bdp.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\tmpD2AD.tmp
|
XML 1.0 document, ASCII text
|
dropped
|
There are 2 hidden files, click here to show them.
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\Q7bAgeTZB8vmku7.exe
|
"C:\Users\user\Desktop\Q7bAgeTZB8vmku7.exe"
|
||
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
|
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\ODIlHgaFNJ.exe"
|
||
C:\Windows\SysWOW64\schtasks.exe
|
"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\ODIlHgaFNJ" /XML "C:\Users\user\AppData\Local\Temp\tmpC03F.tmp"
|
||
C:\Users\user\Desktop\Q7bAgeTZB8vmku7.exe
|
"C:\Users\user\Desktop\Q7bAgeTZB8vmku7.exe"
|
||
C:\Users\user\AppData\Roaming\ODIlHgaFNJ.exe
|
C:\Users\user\AppData\Roaming\ODIlHgaFNJ.exe
|
||
C:\Windows\SysWOW64\schtasks.exe
|
"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\ODIlHgaFNJ" /XML "C:\Users\user\AppData\Local\Temp\tmpD2AD.tmp"
|
||
C:\Users\user\AppData\Roaming\ODIlHgaFNJ.exe
|
"C:\Users\user\AppData\Roaming\ODIlHgaFNJ.exe"
|
||
C:\Users\user\AppData\Roaming\ODIlHgaFNJ.exe
|
"C:\Users\user\AppData\Roaming\ODIlHgaFNJ.exe"
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\wbem\WmiPrvSE.exe
|
C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
There are 2 hidden processes, click here to show them.
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
http://x1.c.lo
|
unknown
|
||
http://pgsu.co.id
|
unknown
|
||
http://r10.o.lencr.org0#
|
unknown
|
||
https://account.dyn.com/
|
unknown
|
||
http://mail.pgsu.co.id
|
unknown
|
||
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
|
unknown
|
||
http://x1.c.lencr.org/0
|
unknown
|
||
http://x1.i.lencr.org/0
|
unknown
|
||
http://r10.i.lencr.org/0
|
unknown
|
Domains
Name
|
IP
|
Malicious
|
|
---|---|---|---|
pgsu.co.id
|
107.178.108.41
|
||
mail.pgsu.co.id
|
unknown
|
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
107.178.108.41
|
pgsu.co.id
|
United States
|
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
2E4E000
|
trusted library allocation
|
page read and write
|
||
4209000
|
trusted library allocation
|
page read and write
|
||
2E79000
|
trusted library allocation
|
page read and write
|
||
2E01000
|
trusted library allocation
|
page read and write
|
||
F48000
|
heap
|
page read and write
|
||
2320000
|
trusted library allocation
|
page read and write
|
||
30FE000
|
stack
|
page read and write
|
||
2AE2000
|
trusted library allocation
|
page read and write
|
||
7F7E000
|
stack
|
page read and write
|
||
49E0000
|
trusted library allocation
|
page read and write
|
||
5C0000
|
heap
|
page read and write
|
||
4A42000
|
trusted library allocation
|
page read and write
|
||
1730000
|
trusted library allocation
|
page read and write
|
||
7F6000
|
heap
|
page read and write
|
||
FD3000
|
heap
|
page read and write
|
||
65B0000
|
heap
|
page read and write
|
||
75A000
|
heap
|
page read and write
|
||
416000
|
remote allocation
|
page execute and read and write
|
||
937E000
|
stack
|
page read and write
|
||
90A000
|
stack
|
page read and write
|
||
F25000
|
trusted library allocation
|
page execute and read and write
|
||
4F7D000
|
trusted library allocation
|
page read and write
|
||
7FBE000
|
stack
|
page read and write
|
||
14DE000
|
stack
|
page read and write
|
||
77C0000
|
trusted library allocation
|
page read and write
|
||
F80000
|
heap
|
page read and write
|
||
3320000
|
heap
|
page read and write
|
||
1510000
|
heap
|
page read and write
|
||
625000
|
heap
|
page read and write
|
||
4C10000
|
trusted library allocation
|
page execute and read and write
|
||
A98E000
|
stack
|
page read and write
|
||
1027000
|
heap
|
page read and write
|
||
42D000
|
remote allocation
|
page execute and read and write
|
||
4C20000
|
heap
|
page execute and read and write
|
||
AA2000
|
trusted library allocation
|
page read and write
|
||
4F60000
|
trusted library allocation
|
page read and write
|
||
1737000
|
trusted library allocation
|
page execute and read and write
|
||
31CA000
|
heap
|
page read and write
|
||
77A0000
|
trusted library allocation
|
page execute and read and write
|
||
22FE000
|
stack
|
page read and write
|
||
4F62000
|
trusted library allocation
|
page read and write
|
||
790000
|
heap
|
page read and write
|
||
68C0000
|
trusted library allocation
|
page read and write
|
||
2330000
|
heap
|
page execute and read and write
|
||
55CF000
|
stack
|
page read and write
|
||
981E000
|
stack
|
page read and write
|
||
E32000
|
trusted library allocation
|
page read and write
|
||
1030000
|
heap
|
page read and write
|
||
57D2000
|
trusted library allocation
|
page read and write
|
||
4DA0000
|
trusted library allocation
|
page read and write
|
||
49FE000
|
trusted library allocation
|
page read and write
|
||
53DC000
|
stack
|
page read and write
|
||
61DF000
|
stack
|
page read and write
|
||
5EA0000
|
trusted library allocation
|
page read and write
|
||
101E000
|
heap
|
page read and write
|
||
2E30000
|
heap
|
page read and write
|
||
5790000
|
heap
|
page execute and read and write
|
||
15AA000
|
heap
|
page read and write
|
||
5B0000
|
heap
|
page read and write
|
||
CF9000
|
stack
|
page read and write
|
||
421000
|
remote allocation
|
page execute and read and write
|
||
102A000
|
heap
|
page read and write
|
||
4A80000
|
trusted library allocation
|
page read and write
|
||
170F000
|
stack
|
page read and write
|
||
49A0000
|
trusted library allocation
|
page read and write
|
||
3A19000
|
trusted library allocation
|
page read and write
|
||
2D5E000
|
trusted library allocation
|
page read and write
|
||
2D5B000
|
trusted library allocation
|
page read and write
|
||
9BE000
|
stack
|
page read and write
|
||
49D3000
|
heap
|
page read and write
|
||
4AB0000
|
heap
|
page read and write
|
||
60D0000
|
trusted library allocation
|
page read and write
|
||
57E0000
|
trusted library allocation
|
page execute and read and write
|
||
42C000
|
remote allocation
|
page execute and read and write
|
||
AB7000
|
trusted library allocation
|
page execute and read and write
|
||
436000
|
remote allocation
|
page execute and read and write
|
||
2AB4000
|
trusted library allocation
|
page read and write
|
||
3050000
|
trusted library allocation
|
page read and write
|
||
5CD0000
|
trusted library allocation
|
page read and write
|
||
4F6A000
|
trusted library allocation
|
page read and write
|
||
A88D000
|
stack
|
page read and write
|
||
13C0000
|
heap
|
page read and write
|
||
F00000
|
trusted library allocation
|
page read and write
|
||
39F1000
|
trusted library allocation
|
page read and write
|
||
5550000
|
heap
|
page read and write
|
||
FB0000
|
heap
|
page read and write
|
||
F1A000
|
trusted library allocation
|
page execute and read and write
|
||
1720000
|
trusted library allocation
|
page read and write
|
||
53A0000
|
heap
|
page read and write
|
||
7460000
|
heap
|
page read and write
|
||
995E000
|
stack
|
page read and write
|
||
E20000
|
trusted library allocation
|
page read and write
|
||
361A000
|
trusted library allocation
|
page read and write
|
||
ABB000
|
trusted library allocation
|
page execute and read and write
|
||
5257000
|
trusted library allocation
|
page read and write
|
||
5280000
|
heap
|
page execute and read and write
|
||
15B5000
|
heap
|
page read and write
|
||
FCA000
|
heap
|
page read and write
|
||
AD0000
|
trusted library allocation
|
page read and write
|
||
42B000
|
remote allocation
|
page execute and read and write
|
||
101C000
|
heap
|
page read and write
|
||
E90000
|
heap
|
page read and write
|
||
2D96000
|
trusted library allocation
|
page read and write
|
||
2D1C000
|
stack
|
page read and write
|
||
765E000
|
stack
|
page read and write
|
||
AA0000
|
trusted library allocation
|
page read and write
|
||
1037000
|
heap
|
page read and write
|
||
15A7000
|
heap
|
page read and write
|
||
ED0000
|
trusted library allocation
|
page read and write
|
||
400000
|
remote allocation
|
page execute and read and write
|
||
3512000
|
trusted library allocation
|
page read and write
|
||
E1D000
|
trusted library allocation
|
page execute and read and write
|
||
3201000
|
trusted library allocation
|
page read and write
|
||
151E000
|
heap
|
page read and write
|
||
E92000
|
unkown
|
page readonly
|
||
5746000
|
trusted library allocation
|
page read and write
|
||
623B000
|
trusted library allocation
|
page read and write
|
||
303D000
|
stack
|
page read and write
|
||
6950000
|
trusted library allocation
|
page read and write
|
||
420000
|
remote allocation
|
page execute and read and write
|
||
6140000
|
trusted library allocation
|
page read and write
|
||
2EBB000
|
heap
|
page read and write
|
||
572B000
|
trusted library allocation
|
page read and write
|
||
5720000
|
trusted library allocation
|
page read and write
|
||
2B9D000
|
stack
|
page read and write
|
||
AECC000
|
stack
|
page read and write
|
||
56E0000
|
trusted library allocation
|
page read and write
|
||
9A9E000
|
stack
|
page read and write
|
||
AE8E000
|
stack
|
page read and write
|
||
F76000
|
heap
|
page read and write
|
||
777000
|
heap
|
page read and write
|
||
E4F000
|
stack
|
page read and write
|
||
333F000
|
unkown
|
page read and write
|
||
3040000
|
trusted library allocation
|
page execute and read and write
|
||
E90000
|
unkown
|
page readonly
|
||
58D0000
|
trusted library section
|
page readonly
|
||
2E67000
|
trusted library allocation
|
page read and write
|
||
B17000
|
heap
|
page read and write
|
||
32FE000
|
unkown
|
page read and write
|
||
4F5B000
|
trusted library allocation
|
page read and write
|
||
57D0000
|
trusted library allocation
|
page read and write
|
||
4A6B000
|
trusted library allocation
|
page read and write
|
||
2D20000
|
trusted library allocation
|
page execute and read and write
|
||
AAA000
|
trusted library allocation
|
page execute and read and write
|
||
690E000
|
stack
|
page read and write
|
||
2AE0000
|
trusted library allocation
|
page read and write
|
||
2C30000
|
heap
|
page read and write
|
||
1504000
|
trusted library allocation
|
page read and write
|
||
813E000
|
stack
|
page read and write
|
||
F69000
|
heap
|
page read and write
|
||
7677000
|
heap
|
page read and write
|
||
4FCC000
|
stack
|
page read and write
|
||
3698000
|
trusted library allocation
|
page read and write
|
||
4F5D000
|
stack
|
page read and write
|
||
EE3000
|
trusted library allocation
|
page execute and read and write
|
||
4A06000
|
trusted library allocation
|
page read and write
|
||
2C2E000
|
stack
|
page read and write
|
||
5040000
|
heap
|
page read and write
|
||
A74E000
|
stack
|
page read and write
|
||
1500000
|
trusted library allocation
|
page read and write
|
||
465B000
|
stack
|
page read and write
|
||
4201000
|
trusted library allocation
|
page read and write
|
||
E26000
|
trusted library allocation
|
page execute and read and write
|
||
4F71000
|
trusted library allocation
|
page read and write
|
||
6970000
|
heap
|
page read and write
|
||
A4E000
|
stack
|
page read and write
|
||
65E2000
|
heap
|
page read and write
|
||
313F000
|
stack
|
page read and write
|
||
52DB000
|
stack
|
page read and write
|
||
402000
|
remote allocation
|
page execute and read and write
|
||
61DF000
|
stack
|
page read and write
|
||
4F76000
|
trusted library allocation
|
page read and write
|
||
CF8000
|
stack
|
page read and write
|
||
4BE0000
|
heap
|
page read and write
|
||
7F470000
|
trusted library allocation
|
page execute and read and write
|
||
1350000
|
heap
|
page read and write
|
||
4BCD000
|
stack
|
page read and write
|
||
B00000
|
trusted library allocation
|
page execute and read and write
|
||
49EB000
|
trusted library allocation
|
page read and write
|
||
10DE000
|
stack
|
page read and write
|
||
2314000
|
trusted library allocation
|
page read and write
|
||
56F0000
|
trusted library allocation
|
page read and write
|
||
65A0000
|
heap
|
page read and write
|
||
184E000
|
stack
|
page read and write
|
||
33EF000
|
stack
|
page read and write
|
||
411000
|
remote allocation
|
page execute and read and write
|
||
801000
|
heap
|
page read and write
|
||
619D000
|
stack
|
page read and write
|
||
4A50000
|
trusted library allocation
|
page execute and read and write
|
||
5724000
|
trusted library allocation
|
page read and write
|
||
1503000
|
trusted library allocation
|
page execute and read and write
|
||
9E20000
|
trusted library allocation
|
page read and write
|
||
573E000
|
trusted library allocation
|
page read and write
|
||
2D71000
|
trusted library allocation
|
page read and write
|
||
FC3000
|
heap
|
page read and write
|
||
A8D000
|
trusted library allocation
|
page execute and read and write
|
||
1897000
|
heap
|
page read and write
|
||
E50000
|
heap
|
page read and write
|
||
417000
|
remote allocation
|
page execute and read and write
|
||
9CDC000
|
stack
|
page read and write
|
||
5770000
|
trusted library allocation
|
page read and write
|
||
2345000
|
trusted library allocation
|
page read and write
|
||
2DF0000
|
heap
|
page execute and read and write
|
||
63A0000
|
trusted library allocation
|
page execute and read and write
|
||
E03000
|
trusted library allocation
|
page execute and read and write
|
||
DF0000
|
trusted library allocation
|
page read and write
|
||
F0D000
|
trusted library allocation
|
page execute and read and write
|
||
6C50000
|
heap
|
page read and write
|
||
A84E000
|
stack
|
page read and write
|
||
F5E000
|
heap
|
page read and write
|
||
3E29000
|
trusted library allocation
|
page read and write
|
||
117E000
|
stack
|
page read and write
|
||
172A000
|
trusted library allocation
|
page execute and read and write
|
||
7692000
|
heap
|
page read and write
|
||
428000
|
remote allocation
|
page execute and read and write
|
||
4F4E000
|
stack
|
page read and write
|
||
31FF000
|
stack
|
page read and write
|
||
1870000
|
heap
|
page read and write
|
||
73E000
|
stack
|
page read and write
|
||
FDB000
|
heap
|
page read and write
|
||
4BB0000
|
trusted library allocation
|
page execute and read and write
|
||
10F0000
|
trusted library allocation
|
page read and write
|
||
10E0000
|
trusted library allocation
|
page read and write
|
||
30E0000
|
heap
|
page read and write
|
||
7FC0000
|
trusted library section
|
page read and write
|
||
5D00000
|
heap
|
page read and write
|
||
455B000
|
stack
|
page read and write
|
||
4A60000
|
trusted library allocation
|
page read and write
|
||
5384000
|
heap
|
page read and write
|
||
2D90000
|
trusted library allocation
|
page read and write
|
||
247E000
|
stack
|
page read and write
|
||
F90000
|
trusted library allocation
|
page read and write
|
||
F70000
|
trusted library allocation
|
page execute and read and write
|
||
2E81000
|
trusted library allocation
|
page read and write
|
||
15AC000
|
heap
|
page read and write
|
||
1100000
|
heap
|
page read and write
|
||
5150000
|
heap
|
page read and write
|
||
1710000
|
trusted library allocation
|
page read and write
|
||
AC0E000
|
stack
|
page read and write
|
||
63EE000
|
stack
|
page read and write
|
||
30BF000
|
unkown
|
page read and write
|
||
58E0000
|
heap
|
page read and write
|
||
7F9000
|
heap
|
page read and write
|
||
970000
|
heap
|
page read and write
|
||
9C0000
|
heap
|
page read and write
|
||
7F270000
|
trusted library allocation
|
page execute and read and write
|
||
4AA0000
|
trusted library section
|
page readonly
|
||
E00000
|
heap
|
page read and write
|
||
5377000
|
trusted library allocation
|
page read and write
|
||
502E000
|
stack
|
page read and write
|
||
746E000
|
heap
|
page read and write
|
||
5250000
|
trusted library allocation
|
page read and write
|
||
40C000
|
remote allocation
|
page execute and read and write
|
||
6640000
|
heap
|
page read and write
|
||
3090000
|
trusted library allocation
|
page read and write
|
||
9B9E000
|
stack
|
page read and write
|
||
2310000
|
trusted library allocation
|
page read and write
|
||
94A000
|
stack
|
page read and write
|
||
1860000
|
trusted library allocation
|
page read and write
|
||
FDA000
|
stack
|
page read and write
|
||
5044000
|
heap
|
page read and write
|
||
1732000
|
trusted library allocation
|
page read and write
|
||
677E000
|
stack
|
page read and write
|
||
42A000
|
remote allocation
|
page execute and read and write
|
||
A90000
|
trusted library allocation
|
page read and write
|
||
2E90000
|
trusted library allocation
|
page read and write
|
||
2D6E000
|
trusted library allocation
|
page read and write
|
||
66DC000
|
stack
|
page read and write
|
||
681E000
|
stack
|
page read and write
|
||
61D000
|
stack
|
page read and write
|
||
31C0000
|
heap
|
page read and write
|
||
1130000
|
heap
|
page read and write
|
||
3270000
|
trusted library allocation
|
page read and write
|
||
E00000
|
trusted library allocation
|
page read and write
|
||
DD0000
|
heap
|
page read and write
|
||
AD8E000
|
stack
|
page read and write
|
||
5288000
|
trusted library allocation
|
page read and write
|
||
F60000
|
trusted library allocation
|
page read and write
|
||
39F9000
|
trusted library allocation
|
page read and write
|
||
403000
|
remote allocation
|
page execute and read and write
|
||
FD6000
|
heap
|
page read and write
|
||
5E9E000
|
stack
|
page read and write
|
||
2D76000
|
trusted library allocation
|
page read and write
|
||
4DB0000
|
heap
|
page read and write
|
||
AE0000
|
heap
|
page read and write
|
||
40B000
|
remote allocation
|
page execute and read and write
|
||
29F1000
|
trusted library allocation
|
page read and write
|
||
EED000
|
trusted library allocation
|
page execute and read and write
|
||
3A58000
|
trusted library allocation
|
page read and write
|
||
2E9E000
|
unkown
|
page read and write
|
||
171D000
|
trusted library allocation
|
page execute and read and write
|
||
F22000
|
trusted library allocation
|
page read and write
|
||
84A000
|
heap
|
page read and write
|
||
6B7D000
|
stack
|
page read and write
|
||
4F6E000
|
trusted library allocation
|
page read and write
|
||
1890000
|
heap
|
page read and write
|
||
29E0000
|
heap
|
page execute and read and write
|
||
54CC000
|
stack
|
page read and write
|
||
A80000
|
trusted library allocation
|
page read and write
|
||
529C000
|
trusted library allocation
|
page read and write
|
||
DD0000
|
heap
|
page read and write
|
||
A70000
|
trusted library allocation
|
page read and write
|
||
9B0000
|
heap
|
page read and write
|
||
5CC0000
|
trusted library allocation
|
page execute and read and write
|
||
2D40000
|
trusted library allocation
|
page read and write
|
||
150D000
|
trusted library allocation
|
page execute and read and write
|
||
173B000
|
trusted library allocation
|
page execute and read and write
|
||
24EE000
|
trusted library allocation
|
page read and write
|
||
4A40000
|
trusted library allocation
|
page read and write
|
||
5936000
|
trusted library allocation
|
page read and write
|
||
49D0000
|
heap
|
page read and write
|
||
1740000
|
heap
|
page read and write
|
||
2BDA000
|
stack
|
page read and write
|
||
FA8000
|
heap
|
page read and write
|
||
65DE000
|
stack
|
page read and write
|
||
30C0000
|
heap
|
page read and write
|
||
659E000
|
stack
|
page read and write
|
||
2E8C000
|
trusted library allocation
|
page read and write
|
||
5AD0000
|
heap
|
page read and write
|
||
5390000
|
heap
|
page read and write
|
||
30A0000
|
trusted library allocation
|
page read and write
|
||
4F80000
|
trusted library allocation
|
page execute and read and write
|
||
96E0000
|
heap
|
page read and write
|
||
655E000
|
stack
|
page read and write
|
||
33AE000
|
stack
|
page read and write
|
||
9BDB000
|
stack
|
page read and write
|
||
F40000
|
heap
|
page read and write
|
||
F12000
|
trusted library allocation
|
page read and write
|
||
4A0D000
|
trusted library allocation
|
page read and write
|
||
2C48000
|
trusted library allocation
|
page read and write
|
||
4ACC000
|
stack
|
page read and write
|
||
557000
|
stack
|
page read and write
|
||
991F000
|
stack
|
page read and write
|
||
429000
|
remote allocation
|
page execute and read and write
|
||
A84000
|
trusted library allocation
|
page read and write
|
||
4F50000
|
trusted library allocation
|
page read and write
|
||
94E000
|
stack
|
page read and write
|
||
3489000
|
trusted library allocation
|
page read and write
|
||
426000
|
remote allocation
|
page execute and read and write
|
||
2EA0000
|
heap
|
page read and write
|
||
3080000
|
trusted library allocation
|
page read and write
|
||
58F0000
|
heap
|
page read and write
|
||
2AAE000
|
trusted library allocation
|
page read and write
|
||
75E000
|
heap
|
page read and write
|
||
3095000
|
trusted library allocation
|
page read and write
|
||
2300000
|
trusted library allocation
|
page read and write
|
||
A83000
|
trusted library allocation
|
page execute and read and write
|
||
2D94000
|
trusted library allocation
|
page read and write
|
||
3340000
|
heap
|
page read and write
|
||
5540000
|
heap
|
page read and write
|
||
6230000
|
trusted library allocation
|
page read and write
|
||
3717000
|
trusted library allocation
|
page read and write
|
||
94BE000
|
stack
|
page read and write
|
||
354C000
|
trusted library allocation
|
page read and write
|
||
1110000
|
trusted library allocation
|
page read and write
|
||
F2B000
|
trusted library allocation
|
page execute and read and write
|
||
63DD000
|
stack
|
page read and write
|
||
687F000
|
stack
|
page read and write
|
||
6DAF000
|
stack
|
page read and write
|
||
6940000
|
heap
|
page read and write
|
||
6410000
|
heap
|
page read and write
|
||
66DE000
|
stack
|
page read and write
|
||
151A000
|
heap
|
page read and write
|
||
7760000
|
trusted library allocation
|
page read and write
|
||
9E1E000
|
stack
|
page read and write
|
||
36D3000
|
trusted library allocation
|
page read and write
|
||
6100000
|
trusted library allocation
|
page read and write
|
||
B10000
|
heap
|
page read and write
|
||
95B0000
|
heap
|
page read and write
|
||
EE4000
|
trusted library allocation
|
page read and write
|
||
2DA0000
|
trusted library allocation
|
page read and write
|
||
5A2C000
|
stack
|
page read and write
|
||
2E75000
|
trusted library allocation
|
page read and write
|
||
427000
|
remote allocation
|
page execute and read and write
|
||
F16000
|
trusted library allocation
|
page execute and read and write
|
||
56E7000
|
trusted library allocation
|
page read and write
|
||
49F8000
|
trusted library allocation
|
page read and write
|
||
52A0000
|
heap
|
page execute and read and write
|
||
5D24000
|
heap
|
page read and write
|
||
93BE000
|
stack
|
page read and write
|
||
1713000
|
trusted library allocation
|
page read and write
|
||
E55000
|
heap
|
page read and write
|
||
5930000
|
trusted library allocation
|
page read and write
|
||
5290000
|
trusted library allocation
|
page read and write
|
||
AFE1000
|
trusted library allocation
|
page read and write
|
||
3E67000
|
trusted library allocation
|
page read and write
|
||
E10000
|
trusted library allocation
|
page read and write
|
||
15D8000
|
heap
|
page read and write
|
||
574D000
|
trusted library allocation
|
page read and write
|
||
F74000
|
heap
|
page read and write
|
||
423000
|
remote allocation
|
page execute and read and write
|
||
49E4000
|
trusted library allocation
|
page read and write
|
||
514F000
|
stack
|
page read and write
|
||
3430000
|
heap
|
page read and write
|
||
A9D000
|
trusted library allocation
|
page execute and read and write
|
||
30B0000
|
heap
|
page execute and read and write
|
||
EF0000
|
heap
|
page read and write
|
||
5AB0000
|
heap
|
page read and write
|
||
5280000
|
trusted library allocation
|
page read and write
|
||
2ACD000
|
trusted library allocation
|
page read and write
|
||
7661000
|
heap
|
page read and write
|
||
359A000
|
trusted library allocation
|
page read and write
|
||
784000
|
heap
|
page read and write
|
||
56D0000
|
trusted library allocation
|
page read and write
|
||
9FE000
|
stack
|
page read and write
|
||
425000
|
remote allocation
|
page execute and read and write
|
||
E2A000
|
trusted library allocation
|
page execute and read and write
|
||
30FE000
|
stack
|
page read and write
|
||
AB2000
|
trusted library allocation
|
page read and write
|
||
4F5E000
|
trusted library allocation
|
page read and write
|
||
613D000
|
stack
|
page read and write
|
||
5380000
|
heap
|
page read and write
|
||
2ADB000
|
trusted library allocation
|
page read and write
|
||
60DB000
|
trusted library allocation
|
page read and write
|
||
60C0000
|
trusted library allocation
|
page execute and read and write
|
||
3481000
|
trusted library allocation
|
page read and write
|
||
2E50000
|
heap
|
page read and write
|
||
1553000
|
heap
|
page read and write
|
||
AA6000
|
trusted library allocation
|
page execute and read and write
|
||
412000
|
remote allocation
|
page execute and read and write
|
||
F10000
|
trusted library allocation
|
page read and write
|
||
13C5000
|
heap
|
page read and write
|
||
67DE000
|
stack
|
page read and write
|
||
57C0000
|
heap
|
page read and write
|
||
60B0000
|
trusted library allocation
|
page execute and read and write
|
||
2370000
|
heap
|
page read and write
|
||
325B000
|
trusted library allocation
|
page read and write
|
||
40D000
|
remote allocation
|
page execute and read and write
|
||
2340000
|
trusted library allocation
|
page read and write
|
||
5CF0000
|
heap
|
page read and write
|
||
56CC000
|
stack
|
page read and write
|
||
6960000
|
trusted library allocation
|
page execute and read and write
|
||
2D62000
|
trusted library allocation
|
page read and write
|
||
AFCC000
|
stack
|
page read and write
|
||
2D7D000
|
trusted library allocation
|
page read and write
|
||
E22000
|
trusted library allocation
|
page read and write
|
||
57F0000
|
trusted library allocation
|
page read and write
|
||
FBE000
|
heap
|
page read and write
|
||
12F7000
|
stack
|
page read and write
|
||
750000
|
heap
|
page read and write
|
||
5CE5000
|
heap
|
page read and write
|
||
1340000
|
heap
|
page read and write
|
||
E04000
|
trusted library allocation
|
page read and write
|
||
76F000
|
heap
|
page read and write
|
||
5C7E000
|
stack
|
page read and write
|
||
5208000
|
trusted library allocation
|
page read and write
|
||
56DA000
|
trusted library allocation
|
page read and write
|
||
4A30000
|
heap
|
page read and write
|
||
58B0000
|
trusted library allocation
|
page read and write
|
||
5CE0000
|
heap
|
page read and write
|
||
1722000
|
trusted library allocation
|
page read and write
|
||
620000
|
heap
|
page read and write
|
||
58F3000
|
heap
|
page read and write
|
||
E05000
|
heap
|
page read and write
|
||
691F000
|
stack
|
page read and write
|
||
1545000
|
heap
|
page read and write
|
||
83D000
|
heap
|
page read and write
|
||
4BA0000
|
heap
|
page read and write
|
||
5AC0000
|
trusted library allocation
|
page execute and read and write
|
||
2D50000
|
trusted library allocation
|
page read and write
|
||
2A66000
|
trusted library allocation
|
page read and write
|
||
422000
|
remote allocation
|
page execute and read and write
|
||
410000
|
remote allocation
|
page execute and read and write
|
||
2E4C000
|
trusted library allocation
|
page read and write
|
||
4488000
|
trusted library allocation
|
page read and write
|
||
4B9C000
|
stack
|
page read and write
|
||
10F4000
|
trusted library allocation
|
page read and write
|
||
29DE000
|
stack
|
page read and write
|
||
7FB000
|
heap
|
page read and write
|
||
4F82000
|
trusted library allocation
|
page read and write
|
||
2D30000
|
trusted library allocation
|
page read and write
|
||
45A000
|
stack
|
page read and write
|
||
437000
|
remote allocation
|
page execute and read and write
|
||
641E000
|
stack
|
page read and write
|
||
3060000
|
trusted library allocation
|
page read and write
|
||
AB0E000
|
stack
|
page read and write
|
||
3070000
|
heap
|
page read and write
|
||
1538000
|
heap
|
page read and write
|
||
4F70000
|
trusted library allocation
|
page read and write
|
||
2350000
|
trusted library allocation
|
page read and write
|
||
EE0000
|
trusted library allocation
|
page read and write
|
||
6220000
|
trusted library allocation
|
page execute and read and write
|
||
139E000
|
stack
|
page read and write
|
||
792000
|
heap
|
page read and write
|
||
4A01000
|
trusted library allocation
|
page read and write
|
||
F27000
|
trusted library allocation
|
page execute and read and write
|
||
4EFE000
|
stack
|
page read and write
|
||
4F54000
|
trusted library allocation
|
page read and write
|
||
EA0000
|
heap
|
page read and write
|
||
2AC8000
|
trusted library allocation
|
page read and write
|
||
61E0000
|
heap
|
page read and write
|
||
107E000
|
unkown
|
page read and write
|
||
3E01000
|
trusted library allocation
|
page read and write
|
||
2B2E000
|
stack
|
page read and write
|
||
E37000
|
trusted library allocation
|
page execute and read and write
|
||
1550000
|
heap
|
page read and write
|
||
FA0000
|
heap
|
page read and write
|
||
AD4F000
|
stack
|
page read and write
|
||
9A5E000
|
stack
|
page read and write
|
||
2EB0000
|
heap
|
page read and write
|
||
AC4E000
|
stack
|
page read and write
|
||
F48000
|
unkown
|
page readonly
|
||
651D000
|
stack
|
page read and write
|
||
2316000
|
trusted library allocation
|
page read and write
|
||
E3B000
|
trusted library allocation
|
page execute and read and write
|
||
5370000
|
trusted library allocation
|
page read and write
|
||
9D1E000
|
stack
|
page read and write
|
||
5CB0000
|
trusted library section
|
page read and write
|
||
1073000
|
heap
|
page read and write
|
||
4BE5000
|
heap
|
page read and write
|
||
E0D000
|
trusted library allocation
|
page execute and read and write
|
||
E35000
|
trusted library allocation
|
page execute and read and write
|
||
3796000
|
trusted library allocation
|
page read and write
|
||
5741000
|
trusted library allocation
|
page read and write
|
||
2481000
|
trusted library allocation
|
page read and write
|
||
24DB000
|
trusted library allocation
|
page read and write
|
||
60F0000
|
trusted library allocation
|
page execute and read and write
|
||
7B62000
|
trusted library allocation
|
page read and write
|
||
F5F000
|
stack
|
page read and write
|
||
1726000
|
trusted library allocation
|
page execute and read and write
|
||
307A000
|
stack
|
page read and write
|
||
370E000
|
trusted library allocation
|
page read and write
|
||
1041000
|
heap
|
page read and write
|
||
621D000
|
stack
|
page read and write
|
||
14F0000
|
trusted library allocation
|
page read and write
|
||
5D0000
|
heap
|
page read and write
|
||
102D000
|
heap
|
page read and write
|
||
53B0000
|
heap
|
page read and write
|
||
413000
|
remote allocation
|
page execute and read and write
|
||
651E000
|
stack
|
page read and write
|
||
780E000
|
stack
|
page read and write
|
||
527C000
|
stack
|
page read and write
|
||
96EC000
|
heap
|
page read and write
|
||
A93000
|
trusted library allocation
|
page read and write
|
There are 524 hidden memdumps, click here to show them.