Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
DATASHEET.exe
|
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
|
initial sample
|
||
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\DATASHEET.exe.log
|
ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\tmp8AFA.tmp
|
XML 1.0 document, ASCII text
|
dropped
|
||
C:\Users\user\AppData\Roaming\jwvzGqkYNEejno.exe
|
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\jwvzGqkYNEejno.exe:Zone.Identifier
|
ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\jwvzGqkYNEejno.exe.log
|
ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
|
data
|
modified
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_0idfn5sd.sey.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_4ohgw5pf.2pt.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_foo002tp.i5k.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_qfghmcx1.3of.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_r5k3ypuk.01i.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_xmbm2xhz.loo.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_xxrvomvr.trt.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_yonm3dkw.rzk.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\tmp9C6E.tmp
|
XML 1.0 document, ASCII text
|
dropped
|
There are 6 hidden files, click here to show them.
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\DATASHEET.exe
|
"C:\Users\user\Desktop\DATASHEET.exe"
|
||
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
|
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\DATASHEET.exe"
|
||
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
|
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\jwvzGqkYNEejno.exe"
|
||
C:\Windows\SysWOW64\schtasks.exe
|
"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\jwvzGqkYNEejno" /XML "C:\Users\user\AppData\Local\Temp\tmp8AFA.tmp"
|
||
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
|
"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"
|
||
C:\Users\user\AppData\Roaming\jwvzGqkYNEejno.exe
|
C:\Users\user\AppData\Roaming\jwvzGqkYNEejno.exe
|
||
C:\Windows\SysWOW64\schtasks.exe
|
"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\jwvzGqkYNEejno" /XML "C:\Users\user\AppData\Local\Temp\tmp9C6E.tmp"
|
||
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
|
"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\wbem\WmiPrvSE.exe
|
C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
There are 3 hidden processes, click here to show them.
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
https://api.ipify.org/
|
172.67.74.152
|
||
http://www.apache.org/licenses/LICENSE-2.0
|
unknown
|
||
http://www.fontbureau.com
|
unknown
|
||
http://www.fontbureau.com/designersG
|
unknown
|
||
http://www.fontbureau.com/designers/?
|
unknown
|
||
http://www.founder.com.cn/cn/bThe
|
unknown
|
||
https://account.dyn.com/
|
unknown
|
||
https://www.globalsign.
|
unknown
|
||
http://www.fontbureau.com/designers?
|
unknown
|
||
http://www.tiro.com
|
unknown
|
||
http://www.fontbureau.com/designers
|
unknown
|
||
http://www.goodfont.co.kr
|
unknown
|
||
https://api.ipify.org/t
|
unknown
|
||
http://www.carterandcone.coml
|
unknown
|
||
http://www.sajatypeworks.com
|
unknown
|
||
http://www.typography.netD
|
unknown
|
||
http://www.fontbureau.com/designers/cabarga.htmlN
|
unknown
|
||
http://www.founder.com.cn/cn/cThe
|
unknown
|
||
http://www.galapagosdesign.com/staff/dennis.htm
|
unknown
|
||
https://api.ipify.org
|
unknown
|
||
http://www.founder.com.cn/cn
|
unknown
|
||
http://www.fontbureau.com/designers/frere-user.html
|
unknown
|
||
http://crl.gl
|
unknown
|
||
http://crl.gl(
|
unknown
|
||
http://www.jiyu-kobo.co.jp/
|
unknown
|
||
http://www.galapagosdesign.com/DPlease
|
unknown
|
||
http://www.fontbureau.com/designers8
|
unknown
|
||
http://www.fonts.com
|
unknown
|
||
http://www.sandoll.co.kr
|
unknown
|
||
http://www.urwpp.deDPlease
|
unknown
|
||
http://www.zhongyicts.com.cn
|
unknown
|
||
http://crl.globalsign?
|
unknown
|
||
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
|
unknown
|
||
http://www.sakkal.com
|
unknown
|
There are 24 hidden URLs, click here to show them.
Domains
Name
|
IP
|
Malicious
|
|
---|---|---|---|
smtp.yandex.ru
|
77.88.21.158
|
||
api.ipify.org
|
172.67.74.152
|
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
77.88.21.158
|
smtp.yandex.ru
|
Russian Federation
|
||
172.67.74.152
|
api.ipify.org
|
United States
|
Registry
Path
|
Value
|
Malicious
|
|
---|---|---|---|
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASAPI32
|
EnableFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASAPI32
|
EnableAutoFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASAPI32
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASAPI32
|
FileTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASAPI32
|
ConsoleTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASAPI32
|
MaxFileSize
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASAPI32
|
FileDirectory
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASMANCS
|
EnableFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASMANCS
|
EnableAutoFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASMANCS
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASMANCS
|
FileTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASMANCS
|
ConsoleTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASMANCS
|
MaxFileSize
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASMANCS
|
FileDirectory
|
There are 5 hidden registries, click here to show them.
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
331B000
|
trusted library allocation
|
page read and write
|
||
2FA1000
|
trusted library allocation
|
page read and write
|
||
402000
|
remote allocation
|
page execute and read and write
|
||
3CA9000
|
trusted library allocation
|
page read and write
|
||
2FCC000
|
trusted library allocation
|
page read and write
|
||
5540000
|
trusted library allocation
|
page read and write
|
||
14B0000
|
trusted library allocation
|
page read and write
|
||
591C000
|
stack
|
page read and write
|
||
DA0000
|
heap
|
page read and write
|
||
3977000
|
trusted library allocation
|
page read and write
|
||
707C000
|
stack
|
page read and write
|
||
546D000
|
stack
|
page read and write
|
||
16E0000
|
heap
|
page execute and read and write
|
||
1461000
|
heap
|
page read and write
|
||
11AE000
|
stack
|
page read and write
|
||
5534000
|
trusted library allocation
|
page read and write
|
||
F90000
|
trusted library allocation
|
page read and write
|
||
7FAA000
|
heap
|
page read and write
|
||
71C0000
|
heap
|
page read and write
|
||
6A1D000
|
trusted library allocation
|
page read and write
|
||
50E000
|
stack
|
page read and write
|
||
15AE000
|
stack
|
page read and write
|
||
5E7B000
|
stack
|
page read and write
|
||
35ED000
|
trusted library allocation
|
page read and write
|
||
2DC8000
|
trusted library allocation
|
page read and write
|
||
4D60000
|
heap
|
page read and write
|
||
4F70000
|
heap
|
page execute and read and write
|
||
4CF0000
|
trusted library allocation
|
page read and write
|
||
1720000
|
heap
|
page read and write
|
||
309B000
|
trusted library allocation
|
page read and write
|
||
5E90000
|
trusted library allocation
|
page read and write
|
||
2871000
|
trusted library allocation
|
page read and write
|
||
6CB7000
|
trusted library allocation
|
page read and write
|
||
55F000
|
stack
|
page read and write
|
||
FF4000
|
heap
|
page read and write
|
||
FA2000
|
trusted library allocation
|
page read and write
|
||
7A01000
|
heap
|
page read and write
|
||
6B2F000
|
stack
|
page read and write
|
||
9206000
|
trusted library allocation
|
page read and write
|
||
4D20000
|
trusted library allocation
|
page read and write
|
||
AC0000
|
trusted library allocation
|
page read and write
|
||
675F000
|
stack
|
page read and write
|
||
2860000
|
heap
|
page execute and read and write
|
||
723E000
|
stack
|
page read and write
|
||
DFA000
|
trusted library allocation
|
page execute and read and write
|
||
4EC0000
|
trusted library allocation
|
page read and write
|
||
7F3F000
|
stack
|
page read and write
|
||
3F1D000
|
trusted library allocation
|
page read and write
|
||
FAB000
|
trusted library allocation
|
page execute and read and write
|
||
5EF5000
|
heap
|
page read and write
|
||
6100000
|
heap
|
page read and write
|
||
3AEE000
|
trusted library allocation
|
page read and write
|
||
3593000
|
trusted library allocation
|
page read and write
|
||
11C0000
|
trusted library allocation
|
page read and write
|
||
3F79000
|
trusted library allocation
|
page read and write
|
||
5B6F000
|
stack
|
page read and write
|
||
6CFD000
|
stack
|
page read and write
|
||
34E5000
|
trusted library allocation
|
page read and write
|
||
68EE000
|
stack
|
page read and write
|
||
6A00000
|
trusted library allocation
|
page read and write
|
||
1125000
|
heap
|
page read and write
|
||
82B0000
|
heap
|
page read and write
|
||
ADAF000
|
stack
|
page read and write
|
||
1470000
|
heap
|
page read and write
|
||
4D70000
|
trusted library allocation
|
page read and write
|
||
922E000
|
trusted library allocation
|
page read and write
|
||
F3D000
|
stack
|
page read and write
|
||
A580000
|
heap
|
page read and write
|
||
1696000
|
trusted library allocation
|
page execute and read and write
|
||
7DB0000
|
trusted library allocation
|
page execute and read and write
|
||
1950000
|
heap
|
page read and write
|
||
16A7000
|
trusted library allocation
|
page execute and read and write
|
||
70DE000
|
stack
|
page read and write
|
||
3628000
|
trusted library allocation
|
page read and write
|
||
7D7D000
|
stack
|
page read and write
|
||
2B00000
|
heap
|
page read and write
|
||
7EC4000
|
heap
|
page read and write
|
||
43DD000
|
trusted library allocation
|
page read and write
|
||
65C6000
|
heap
|
page read and write
|
||
14D0000
|
trusted library allocation
|
page read and write
|
||
AE8000
|
heap
|
page read and write
|
||
7A09000
|
heap
|
page read and write
|
||
9A0000
|
unkown
|
page readonly
|
||
6FBC000
|
stack
|
page read and write
|
||
FF6000
|
heap
|
page read and write
|
||
15F6000
|
trusted library allocation
|
page read and write
|
||
1186000
|
heap
|
page read and write
|
||
58D4000
|
heap
|
page read and write
|
||
2ABE000
|
stack
|
page read and write
|
||
7EE4000
|
heap
|
page read and write
|
||
265C000
|
stack
|
page read and write
|
||
7EDF000
|
heap
|
page read and write
|
||
6663000
|
heap
|
page read and write
|
||
182C000
|
stack
|
page read and write
|
||
51C3000
|
heap
|
page read and write
|
||
437D000
|
trusted library allocation
|
page read and write
|
||
A57D000
|
stack
|
page read and write
|
||
5F0000
|
heap
|
page read and write
|
||
1358000
|
stack
|
page read and write
|
||
7240000
|
trusted library allocation
|
page read and write
|
||
50EE000
|
stack
|
page read and write
|
||
1940000
|
trusted library allocation
|
page read and write
|
||
1AE000
|
unkown
|
page read and write
|
||
6A27000
|
trusted library allocation
|
page read and write
|
||
7F9A000
|
heap
|
page read and write
|
||
4CB4000
|
trusted library allocation
|
page read and write
|
||
3B09000
|
trusted library allocation
|
page read and write
|
||
1184000
|
heap
|
page read and write
|
||
2C9E000
|
stack
|
page read and write
|
||
4F40000
|
heap
|
page read and write
|
||
A44E000
|
stack
|
page read and write
|
||
276E000
|
stack
|
page read and write
|
||
552F000
|
stack
|
page read and write
|
||
3624000
|
trusted library allocation
|
page read and write
|
||
A6FD000
|
stack
|
page read and write
|
||
338A000
|
trusted library allocation
|
page read and write
|
||
39B2000
|
trusted library allocation
|
page read and write
|
||
596E000
|
stack
|
page read and write
|
||
81AC000
|
stack
|
page read and write
|
||
5A7E000
|
stack
|
page read and write
|
||
AA0E000
|
stack
|
page read and write
|
||
9229000
|
trusted library allocation
|
page read and write
|
||
FA000
|
stack
|
page read and write
|
||
4F50000
|
heap
|
page read and write
|
||
14C4000
|
trusted library allocation
|
page read and write
|
||
62DE000
|
stack
|
page read and write
|
||
3496000
|
trusted library allocation
|
page read and write
|
||
5EF0000
|
heap
|
page read and write
|
||
FB0000
|
heap
|
page read and write
|
||
4F2E000
|
stack
|
page read and write
|
||
2840000
|
trusted library allocation
|
page read and write
|
||
1680000
|
trusted library allocation
|
page read and write
|
||
A2CC000
|
stack
|
page read and write
|
||
37B0000
|
trusted library allocation
|
page read and write
|
||
7F78000
|
heap
|
page read and write
|
||
55F000
|
stack
|
page read and write
|
||
FE5000
|
heap
|
page read and write
|
||
667F000
|
heap
|
page read and write
|
||
4EE0000
|
trusted library allocation
|
page execute and read and write
|
||
73B0000
|
trusted library allocation
|
page read and write
|
||
F50000
|
trusted library allocation
|
page read and write
|
||
2B90000
|
heap
|
page read and write
|
||
42F9000
|
trusted library allocation
|
page read and write
|
||
439D000
|
trusted library allocation
|
page read and write
|
||
6CB0000
|
trusted library allocation
|
page read and write
|
||
2B50000
|
trusted library allocation
|
page read and write
|
||
1259000
|
stack
|
page read and write
|
||
A18F000
|
stack
|
page read and write
|
||
A20000
|
heap
|
page read and write
|
||
160000
|
heap
|
page read and write
|
||
150B000
|
trusted library allocation
|
page execute and read and write
|
||
6A3E000
|
stack
|
page read and write
|
||
5470000
|
trusted library section
|
page readonly
|
||
6D2E000
|
stack
|
page read and write
|
||
65E0000
|
heap
|
page read and write
|
||
2660000
|
heap
|
page read and write
|
||
ADD000
|
trusted library allocation
|
page execute and read and write
|
||
3902000
|
trusted library allocation
|
page read and write
|
||
14C0000
|
trusted library allocation
|
page read and write
|
||
323F000
|
stack
|
page read and write
|
||
2F40000
|
heap
|
page read and write
|
||
6665000
|
heap
|
page read and write
|
||
679E000
|
stack
|
page read and write
|
||
6E00000
|
trusted library allocation
|
page execute and read and write
|
||
1570000
|
heap
|
page read and write
|
||
5C0000
|
heap
|
page read and write
|
||
5A3E000
|
stack
|
page read and write
|
||
3F57000
|
trusted library allocation
|
page read and write
|
||
F63000
|
trusted library allocation
|
page execute and read and write
|
||
D37000
|
stack
|
page read and write
|
||
6DBE000
|
stack
|
page read and write
|
||
14E6000
|
trusted library allocation
|
page execute and read and write
|
||
5A50000
|
heap
|
page execute and read and write
|
||
1F0000
|
heap
|
page read and write
|
||
79D8000
|
heap
|
page read and write
|
||
6E0000
|
heap
|
page read and write
|
||
F60000
|
trusted library allocation
|
page read and write
|
||
71B0000
|
trusted library allocation
|
page execute and read and write
|
||
9210000
|
trusted library allocation
|
page read and write
|
||
3302000
|
trusted library allocation
|
page read and write
|
||
9F0E000
|
stack
|
page read and write
|
||
2B76000
|
trusted library allocation
|
page read and write
|
||
2855000
|
trusted library allocation
|
page read and write
|
||
4E3C000
|
stack
|
page read and write
|
||
5CDF000
|
stack
|
page read and write
|
||
7EFF000
|
heap
|
page read and write
|
||
11D0000
|
heap
|
page read and write
|
||
7EAC000
|
stack
|
page read and write
|
||
F88000
|
heap
|
page read and write
|
||
2F20000
|
heap
|
page read and write
|
||
3A8A000
|
trusted library allocation
|
page read and write
|
||
58FE000
|
stack
|
page read and write
|
||
CDE000
|
stack
|
page read and write
|
||
5B70000
|
heap
|
page read and write
|
||
A0E000
|
stack
|
page read and write
|
||
689E000
|
stack
|
page read and write
|
||
79E7000
|
heap
|
page read and write
|
||
63E0000
|
heap
|
page read and write
|
||
67BE000
|
stack
|
page read and write
|
||
6E70000
|
heap
|
page read and write
|
||
6B6E000
|
stack
|
page read and write
|
||
66BE000
|
heap
|
page read and write
|
||
6000000
|
heap
|
page read and write
|
||
6E10000
|
trusted library allocation
|
page read and write
|
||
AD4000
|
trusted library allocation
|
page read and write
|
||
79D0000
|
heap
|
page read and write
|
||
169A000
|
trusted library allocation
|
page execute and read and write
|
||
AE0000
|
heap
|
page read and write
|
||
A30E000
|
stack
|
page read and write
|
||
4CCE000
|
trusted library allocation
|
page read and write
|
||
6D6E000
|
stack
|
page read and write
|
||
43FD000
|
trusted library allocation
|
page read and write
|
||
6EC0000
|
heap
|
page read and write
|
||
921F000
|
trusted library allocation
|
page read and write
|
||
16D0000
|
trusted library allocation
|
page execute and read and write
|
||
5250000
|
trusted library allocation
|
page read and write
|
||
6B7E000
|
stack
|
page read and write
|
||
496B000
|
stack
|
page read and write
|
||
68A0000
|
heap
|
page read and write
|
||
B21000
|
heap
|
page read and write
|
||
A7CE000
|
stack
|
page read and write
|
||
4ED0000
|
trusted library section
|
page readonly
|
||
A90D000
|
stack
|
page read and write
|
||
42D1000
|
trusted library allocation
|
page read and write
|
||
5565000
|
trusted library allocation
|
page read and write
|
||
2820000
|
trusted library allocation
|
page read and write
|
||
33E8000
|
trusted library allocation
|
page read and write
|
||
361C000
|
trusted library allocation
|
page read and write
|
||
14FC000
|
stack
|
page read and write
|
||
ABAC000
|
stack
|
page read and write
|
||
356D000
|
trusted library allocation
|
page read and write
|
||
4D00000
|
heap
|
page read and write
|
||
4D76000
|
trusted library allocation
|
page read and write
|
||
3B88000
|
trusted library allocation
|
page read and write
|
||
13C0000
|
heap
|
page read and write
|
||
5460000
|
trusted library allocation
|
page read and write
|
||
DFE000
|
stack
|
page read and write
|
||
1226000
|
heap
|
page read and write
|
||
82AC000
|
stack
|
page read and write
|
||
337A000
|
trusted library allocation
|
page read and write
|
||
3348000
|
trusted library allocation
|
page read and write
|
||
2CA1000
|
trusted library allocation
|
page read and write
|
||
A40F000
|
stack
|
page read and write
|
||
3871000
|
trusted library allocation
|
page read and write
|
||
32AD000
|
trusted library allocation
|
page read and write
|
||
3662000
|
trusted library allocation
|
page read and write
|
||
3638000
|
trusted library allocation
|
page read and write
|
||
3280000
|
trusted library allocation
|
page read and write
|
||
7EF9000
|
heap
|
page read and write
|
||
5480000
|
heap
|
page read and write
|
||
1505000
|
trusted library allocation
|
page execute and read and write
|
||
7EEE0000
|
trusted library allocation
|
page execute and read and write
|
||
3761000
|
trusted library allocation
|
page read and write
|
||
117A000
|
heap
|
page read and write
|
||
5FFE000
|
stack
|
page read and write
|
||
327C000
|
stack
|
page read and write
|
||
F7D000
|
trusted library allocation
|
page execute and read and write
|
||
7260000
|
trusted library allocation
|
page read and write
|
||
32A1000
|
trusted library allocation
|
page read and write
|
||
3664000
|
trusted library allocation
|
page read and write
|
||
924C000
|
trusted library allocation
|
page read and write
|
||
1502000
|
trusted library allocation
|
page read and write
|
||
160000
|
heap
|
page read and write
|
||
9242000
|
trusted library allocation
|
page read and write
|
||
6FFE000
|
stack
|
page read and write
|
||
1944000
|
trusted library allocation
|
page read and write
|
||
3647000
|
trusted library allocation
|
page read and write
|
||
5F7C000
|
stack
|
page read and write
|
||
A54E000
|
stack
|
page read and write
|
||
338E000
|
trusted library allocation
|
page read and write
|
||
FBE000
|
heap
|
page read and write
|
||
1500000
|
heap
|
page read and write
|
||
1670000
|
trusted library allocation
|
page read and write
|
||
6147000
|
heap
|
page read and write
|
||
5EE0000
|
heap
|
page read and write
|
||
2996000
|
trusted library allocation
|
page read and write
|
||
A550000
|
trusted library allocation
|
page execute and read and write
|
||
362C000
|
trusted library allocation
|
page read and write
|
||
A80000
|
heap
|
page read and write
|
||
3292000
|
trusted library allocation
|
page read and write
|
||
145E000
|
stack
|
page read and write
|
||
51E000
|
stack
|
page read and write
|
||
1930000
|
trusted library allocation
|
page read and write
|
||
F80000
|
heap
|
page read and write
|
||
9256000
|
trusted library allocation
|
page read and write
|
||
5EFA000
|
heap
|
page read and write
|
||
4F30000
|
heap
|
page read and write
|
||
DDF000
|
stack
|
page read and write
|
||
7282000
|
trusted library allocation
|
page read and write
|
||
1120000
|
heap
|
page read and write
|
||
E37000
|
heap
|
page read and write
|
||
376C000
|
trusted library allocation
|
page read and write
|
||
2B54000
|
trusted library allocation
|
page read and write
|
||
7DC0000
|
trusted library section
|
page read and write
|
||
3386000
|
trusted library allocation
|
page read and write
|
||
AEE000
|
heap
|
page read and write
|
||
66B6000
|
heap
|
page read and write
|
||
9E0E000
|
stack
|
page read and write
|
||
9233000
|
trusted library allocation
|
page read and write
|
||
7E0000
|
heap
|
page read and write
|
||
1560000
|
heap
|
page execute and read and write
|
||
ACAC000
|
stack
|
page read and write
|
||
DF6000
|
trusted library allocation
|
page execute and read and write
|
||
1150000
|
heap
|
page read and write
|
||
2F86000
|
trusted library allocation
|
page read and write
|
||
60FE000
|
stack
|
page read and write
|
||
557E000
|
stack
|
page read and write
|
||
7EB0000
|
heap
|
page read and write
|
||
BD8000
|
heap
|
page read and write
|
||
A6BD000
|
stack
|
page read and write
|
||
10F9000
|
stack
|
page read and write
|
||
AEAE000
|
stack
|
page read and write
|
||
A1CB000
|
stack
|
page read and write
|
||
3802000
|
trusted library allocation
|
page read and write
|
||
1673000
|
trusted library allocation
|
page execute and read and write
|
||
14CD000
|
trusted library allocation
|
page execute and read and write
|
||
510000
|
heap
|
page read and write
|
||
79CE000
|
stack
|
page read and write
|
||
5A9E000
|
stack
|
page read and write
|
||
337E000
|
trusted library allocation
|
page read and write
|
||
715E000
|
stack
|
page read and write
|
||
1727000
|
heap
|
page read and write
|
||
1029000
|
heap
|
page read and write
|
||
DE3000
|
trusted library allocation
|
page read and write
|
||
51A5000
|
trusted library allocation
|
page read and write
|
||
7660000
|
heap
|
page read and write
|
||
920B000
|
trusted library allocation
|
page read and write
|
||
3688000
|
trusted library allocation
|
page read and write
|
||
AD0000
|
trusted library allocation
|
page read and write
|
||
5EE0000
|
trusted library allocation
|
page read and write
|
||
8F7000
|
stack
|
page read and write
|
||
3620000
|
trusted library allocation
|
page read and write
|
||
2D15000
|
trusted library allocation
|
page read and write
|
||
63F2000
|
heap
|
page read and write
|
||
F9A000
|
trusted library allocation
|
page execute and read and write
|
||
FA7000
|
trusted library allocation
|
page execute and read and write
|
||
2F9D000
|
trusted library allocation
|
page read and write
|
||
2B30000
|
trusted library allocation
|
page read and write
|
||
35E9000
|
trusted library allocation
|
page read and write
|
||
6F80000
|
trusted library allocation
|
page execute and read and write
|
||
3F51000
|
trusted library allocation
|
page read and write
|
||
E20000
|
heap
|
page read and write
|
||
2B40000
|
heap
|
page execute and read and write
|
||
5400000
|
trusted library allocation
|
page read and write
|
||
6A10000
|
trusted library allocation
|
page read and write
|
||
52D8000
|
trusted library allocation
|
page read and write
|
||
524E000
|
stack
|
page read and write
|
||
14EA000
|
trusted library allocation
|
page execute and read and write
|
||
14F0000
|
heap
|
page read and write
|
||
4D80000
|
trusted library allocation
|
page execute and read and write
|
||
32A6000
|
trusted library allocation
|
page read and write
|
||
433D000
|
trusted library allocation
|
page read and write
|
||
1507000
|
trusted library allocation
|
page execute and read and write
|
||
A90000
|
heap
|
page read and write
|
||
AD3000
|
trusted library allocation
|
page execute and read and write
|
||
4CD1000
|
trusted library allocation
|
page read and write
|
||
168D000
|
trusted library allocation
|
page execute and read and write
|
||
7F32000
|
heap
|
page read and write
|
||
8DB0000
|
trusted library allocation
|
page read and write
|
||
16AB000
|
trusted library allocation
|
page execute and read and write
|
||
6CA3000
|
trusted library allocation
|
page read and write
|
||
400000
|
remote allocation
|
page execute and read and write
|
||
55EE000
|
stack
|
page read and write
|
||
328B000
|
trusted library allocation
|
page read and write
|
||
717C000
|
stack
|
page read and write
|
||
65C0000
|
heap
|
page read and write
|
||
13EA000
|
heap
|
page read and write
|
||
79E4000
|
heap
|
page read and write
|
||
6F60000
|
trusted library allocation
|
page read and write
|
||
BD000
|
stack
|
page read and write
|
||
4D72000
|
trusted library allocation
|
page read and write
|
||
4CA8000
|
trusted library allocation
|
page read and write
|
||
5E0000
|
heap
|
page read and write
|
||
2836000
|
trusted library allocation
|
page read and write
|
||
2D78000
|
trusted library allocation
|
page read and write
|
||
32DC000
|
trusted library allocation
|
page read and write
|
||
6DFB000
|
stack
|
page read and write
|
||
7F43000
|
heap
|
page read and write
|
||
6E7D000
|
heap
|
page read and write
|
||
51A0000
|
trusted library allocation
|
page read and write
|
||
6B3E000
|
stack
|
page read and write
|
||
16A0000
|
trusted library allocation
|
page read and write
|
||
F96000
|
trusted library allocation
|
page execute and read and write
|
||
13F5000
|
heap
|
page read and write
|
||
7F62000
|
heap
|
page read and write
|
||
1130000
|
heap
|
page read and write
|
||
7EE9000
|
heap
|
page read and write
|
||
A25000
|
heap
|
page read and write
|
||
2FCA000
|
trusted library allocation
|
page read and write
|
||
9224000
|
trusted library allocation
|
page read and write
|
||
2FC8000
|
trusted library allocation
|
page read and write
|
||
5190000
|
trusted library allocation
|
page read and write
|
||
2834000
|
trusted library allocation
|
page read and write
|
||
4E50000
|
trusted library allocation
|
page read and write
|
||
E30000
|
heap
|
page read and write
|
||
54F0000
|
heap
|
page execute and read and write
|
||
4D0000
|
heap
|
page read and write
|
||
6E77000
|
heap
|
page read and write
|
||
2AFC000
|
stack
|
page read and write
|
||
900000
|
unkown
|
page readonly
|
||
2EBE000
|
stack
|
page read and write
|
||
2778000
|
trusted library allocation
|
page read and write
|
||
3CA1000
|
trusted library allocation
|
page read and write
|
||
5559000
|
trusted library allocation
|
page read and write
|
||
6D10000
|
trusted library allocation
|
page read and write
|
||
4F58000
|
trusted library allocation
|
page read and write
|
||
16A5000
|
trusted library allocation
|
page execute and read and write
|
||
619E000
|
stack
|
page read and write
|
||
1550000
|
trusted library allocation
|
page read and write
|
||
1600000
|
trusted library allocation
|
page read and write
|
||
6E8E000
|
heap
|
page read and write
|
||
7F56000
|
heap
|
page read and write
|
||
5232000
|
trusted library allocation
|
page read and write
|
||
3879000
|
trusted library allocation
|
page read and write
|
||
6F6E000
|
trusted library allocation
|
page read and write
|
||
A8CE000
|
stack
|
page read and write
|
||
73CD000
|
stack
|
page read and write
|
||
7110000
|
trusted library allocation
|
page read and write
|
||
37B8000
|
trusted library allocation
|
page read and write
|
||
6C90000
|
trusted library allocation
|
page read and write
|
||
13F8000
|
heap
|
page read and write
|
||
9247000
|
trusted library allocation
|
page read and write
|
||
51E0000
|
trusted library allocation
|
page read and write
|
||
6F70000
|
trusted library allocation
|
page execute and read and write
|
||
9CCD000
|
stack
|
page read and write
|
||
7F19000
|
heap
|
page read and write
|
||
F64000
|
trusted library allocation
|
page read and write
|
||
16A2000
|
trusted library allocation
|
page read and write
|
||
1692000
|
trusted library allocation
|
page read and write
|
||
E20000
|
trusted library allocation
|
page read and write
|
||
3EDA000
|
trusted library allocation
|
page read and write
|
||
435D000
|
trusted library allocation
|
page read and write
|
||
14E2000
|
trusted library allocation
|
page read and write
|
||
71F0000
|
heap
|
page read and write
|
||
1EF000
|
unkown
|
page read and write
|
||
5600000
|
heap
|
page read and write
|
||
6690000
|
heap
|
page read and write
|
||
116E000
|
heap
|
page read and write
|
||
E02000
|
trusted library allocation
|
page read and write
|
||
703E000
|
stack
|
page read and write
|
||
1575000
|
heap
|
page read and write
|
||
4D03000
|
heap
|
page read and write
|
||
B08000
|
heap
|
page read and write
|
||
3FBD000
|
trusted library allocation
|
page read and write
|
||
902000
|
unkown
|
page readonly
|
||
5490000
|
trusted library allocation
|
page execute and read and write
|
||
2F51000
|
trusted library allocation
|
page read and write
|
||
1140000
|
heap
|
page read and write
|
||
6F90000
|
trusted library allocation
|
page read and write
|
||
6DAE000
|
stack
|
page read and write
|
||
5180000
|
trusted library allocation
|
page read and write
|
||
65C2000
|
heap
|
page read and write
|
||
330B000
|
trusted library allocation
|
page read and write
|
||
1500000
|
trusted library allocation
|
page read and write
|
||
520E000
|
stack
|
page read and write
|
||
7ECD000
|
heap
|
page read and write
|
||
DE0000
|
trusted library allocation
|
page read and write
|
||
9204000
|
trusted library allocation
|
page read and write
|
||
51C0000
|
heap
|
page read and write
|
||
4CE0000
|
trusted library allocation
|
page read and write
|
||
5A6E000
|
stack
|
page read and write
|
||
A08E000
|
stack
|
page read and write
|
||
57FC000
|
stack
|
page read and write
|
||
7160000
|
trusted library allocation
|
page read and write
|
||
3382000
|
trusted library allocation
|
page read and write
|
||
43E000
|
remote allocation
|
page execute and read and write
|
||
923D000
|
trusted library allocation
|
page read and write
|
||
5E2E000
|
stack
|
page read and write
|
||
B24000
|
heap
|
page read and write
|
||
192D000
|
stack
|
page read and write
|
||
1AE000
|
unkown
|
page read and write
|
||
C39000
|
stack
|
page read and write
|
||
5240000
|
trusted library allocation
|
page execute and read and write
|
||
55AC000
|
stack
|
page read and write
|
||
5760000
|
trusted library section
|
page read and write
|
||
66AF000
|
heap
|
page read and write
|
||
32D1000
|
trusted library allocation
|
page read and write
|
||
9251000
|
trusted library allocation
|
page read and write
|
||
51B0000
|
trusted library allocation
|
page read and write
|
||
5EF0000
|
heap
|
page read and write
|
||
7F5C000
|
heap
|
page read and write
|
||
6CFE000
|
heap
|
page read and write
|
||
593E000
|
stack
|
page read and write
|
||
1540000
|
trusted library allocation
|
page read and write
|
||
FB8000
|
heap
|
page read and write
|
||
1660000
|
trusted library allocation
|
page read and write
|
||
4D90000
|
trusted library allocation
|
page read and write
|
||
2B82000
|
trusted library allocation
|
page read and write
|
||
9B90000
|
heap
|
page read and write
|
||
2994000
|
trusted library allocation
|
page read and write
|
||
149A000
|
heap
|
page read and write
|
||
3630000
|
trusted library allocation
|
page read and write
|
||
2850000
|
trusted library allocation
|
page read and write
|
||
4EB0000
|
heap
|
page read and write
|
||
43BD000
|
trusted library allocation
|
page read and write
|
||
DB0000
|
heap
|
page read and write
|
||
32C0000
|
heap
|
page read and write
|
||
71A0000
|
trusted library allocation
|
page read and write
|
||
5EB0000
|
trusted library allocation
|
page execute and read and write
|
||
2B6E000
|
trusted library allocation
|
page read and write
|
||
1F0000
|
heap
|
page read and write
|
||
5220000
|
heap
|
page read and write
|
||
55F0000
|
heap
|
page execute and read and write
|
||
A6E000
|
stack
|
page read and write
|
||
378C000
|
trusted library allocation
|
page read and write
|
||
293A000
|
trusted library allocation
|
page read and write
|
||
313E000
|
stack
|
page read and write
|
||
2B71000
|
trusted library allocation
|
page read and write
|
||
14C3000
|
trusted library allocation
|
page execute and read and write
|
||
9238000
|
trusted library allocation
|
page read and write
|
||
E07000
|
trusted library allocation
|
page execute and read and write
|
||
1610000
|
heap
|
page read and write
|
||
57D0000
|
heap
|
page read and write
|
||
5E0000
|
heap
|
page read and write
|
||
6A08000
|
trusted library allocation
|
page read and write
|
||
925B000
|
trusted library allocation
|
page read and write
|
||
629C000
|
stack
|
page read and write
|
||
4CD6000
|
trusted library allocation
|
page read and write
|
||
9215000
|
trusted library allocation
|
page read and write
|
||
660C000
|
heap
|
page read and write
|
||
2EFE000
|
stack
|
page read and write
|
||
328E000
|
trusted library allocation
|
page read and write
|
||
6A6D000
|
stack
|
page read and write
|
||
329E000
|
trusted library allocation
|
page read and write
|
||
2FD4000
|
trusted library allocation
|
page read and write
|
||
6E8B000
|
heap
|
page read and write
|
||
7EBD000
|
heap
|
page read and write
|
||
57A000
|
stack
|
page read and write
|
||
11DE000
|
heap
|
page read and write
|
||
6CAD000
|
trusted library allocation
|
page read and write
|
||
57E0000
|
heap
|
page read and write
|
||
393D000
|
trusted library allocation
|
page read and write
|
||
343C000
|
trusted library allocation
|
page read and write
|
||
F73000
|
trusted library allocation
|
page read and write
|
||
334D000
|
trusted library allocation
|
page read and write
|
||
553E000
|
stack
|
page read and write
|
||
F70000
|
trusted library allocation
|
page read and write
|
||
666F000
|
heap
|
page read and write
|
||
6A90000
|
trusted library allocation
|
page execute and read and write
|
||
167D000
|
trusted library allocation
|
page execute and read and write
|
||
3317000
|
trusted library allocation
|
page read and write
|
||
13B0000
|
heap
|
page read and write
|
||
6110000
|
heap
|
page read and write
|
||
1956000
|
heap
|
page read and write
|
||
7164000
|
trusted library allocation
|
page read and write
|
||
758F000
|
stack
|
page read and write
|
||
1214000
|
heap
|
page read and write
|
||
5BDE000
|
stack
|
page read and write
|
||
261E000
|
stack
|
page read and write
|
||
6CA8000
|
trusted library allocation
|
page read and write
|
||
1710000
|
trusted library allocation
|
page read and write
|
||
63DD000
|
stack
|
page read and write
|
||
5580000
|
heap
|
page read and write
|
||
5EC0000
|
trusted library allocation
|
page execute and read and write
|
||
14E0000
|
trusted library allocation
|
page read and write
|
||
54E0000
|
heap
|
page read and write
|
||
15F0000
|
trusted library allocation
|
page read and write
|
||
1674000
|
trusted library allocation
|
page read and write
|
||
330F000
|
trusted library allocation
|
page read and write
|
||
1433000
|
heap
|
page read and write
|
||
16F0000
|
heap
|
page read and write
|
||
28E5000
|
trusted library allocation
|
page read and write
|
||
9B8D000
|
stack
|
page read and write
|
||
5E20000
|
trusted library allocation
|
page read and write
|
||
57B0000
|
trusted library allocation
|
page read and write
|
||
9DCE000
|
stack
|
page read and write
|
||
3313000
|
trusted library allocation
|
page read and write
|
||
6CA0000
|
trusted library allocation
|
page read and write
|
||
2B7D000
|
trusted library allocation
|
page read and write
|
||
69FE000
|
stack
|
page read and write
|
||
54DE000
|
stack
|
page read and write
|
||
2810000
|
trusted library allocation
|
page execute and read and write
|
||
665D000
|
stack
|
page read and write
|
||
5A1C000
|
stack
|
page read and write
|
||
7EFE0000
|
trusted library allocation
|
page execute and read and write
|
||
6C7E000
|
stack
|
page read and write
|
||
15EC000
|
stack
|
page read and write
|
||
DF2000
|
trusted library allocation
|
page read and write
|
||
58D0000
|
heap
|
page read and write
|
||
1617000
|
heap
|
page read and write
|
||
383E000
|
trusted library allocation
|
page read and write
|
||
FA000
|
stack
|
page read and write
|
||
7ED9000
|
heap
|
page read and write
|
||
1690000
|
trusted library allocation
|
page read and write
|
||
34F1000
|
trusted library allocation
|
page read and write
|
||
E0B000
|
trusted library allocation
|
page execute and read and write
|
||
1EF000
|
unkown
|
page read and write
|
||
33C9000
|
trusted library allocation
|
page read and write
|
||
6EA000
|
heap
|
page read and write
|
||
7A34000
|
heap
|
page read and write
|
||
82C0000
|
heap
|
page read and write
|
||
6D06000
|
trusted library allocation
|
page read and write
|
||
3A0B000
|
trusted library allocation
|
page read and write
|
||
6CF0000
|
heap
|
page read and write
|
||
6A20000
|
trusted library allocation
|
page read and write
|
||
7C5E000
|
stack
|
page read and write
|
||
15F4000
|
trusted library allocation
|
page read and write
|
||
382D000
|
trusted library allocation
|
page read and write
|
||
5230000
|
trusted library allocation
|
page read and write
|
||
545B000
|
stack
|
page read and write
|
||
2B20000
|
trusted library allocation
|
page execute and read and write
|
||
5E80000
|
trusted library allocation
|
page read and write
|
||
5FDE000
|
stack
|
page read and write
|
||
69EE000
|
stack
|
page read and write
|
||
63E2000
|
heap
|
page read and write
|
||
6D20000
|
trusted library allocation
|
page execute and read and write
|
||
7F87000
|
heap
|
page read and write
|
||
3542000
|
trusted library allocation
|
page read and write
|
||
5B7E000
|
stack
|
page read and write
|
||
13DE000
|
heap
|
page read and write
|
||
5ED0000
|
trusted library allocation
|
page read and write
|
||
7F05000
|
heap
|
page read and write
|
||
BD000
|
stack
|
page read and write
|
||
4EAB000
|
stack
|
page read and write
|
||
2F8F000
|
trusted library allocation
|
page read and write
|
||
5236000
|
trusted library allocation
|
page read and write
|
||
1158000
|
heap
|
page read and write
|
||
E25000
|
heap
|
page read and write
|
||
F6D000
|
trusted library allocation
|
page execute and read and write
|
||
4CB0000
|
trusted library allocation
|
page read and write
|
||
766E000
|
heap
|
page read and write
|
||
2830000
|
trusted library allocation
|
page read and write
|
||
6D00000
|
trusted library allocation
|
page read and write
|
||
4CDD000
|
trusted library allocation
|
page read and write
|
||
3AAA000
|
trusted library allocation
|
page read and write
|
||
135E000
|
stack
|
page read and write
|
||
12DE000
|
stack
|
page read and write
|
||
921A000
|
trusted library allocation
|
page read and write
|
||
5B9E000
|
stack
|
page read and write
|
||
573D000
|
stack
|
page read and write
|
||
65F3000
|
heap
|
page read and write
|
||
6FDE000
|
stack
|
page read and write
|
||
5F3C000
|
stack
|
page read and write
|
||
1530000
|
trusted library allocation
|
page execute and read and write
|
||
4ED4000
|
trusted library section
|
page readonly
|
||
B00000
|
heap
|
page read and write
|
||
4CE2000
|
trusted library allocation
|
page read and write
|
||
7F15000
|
heap
|
page read and write
|
||
DED000
|
trusted library allocation
|
page execute and read and write
|
||
154B000
|
stack
|
page read and write
|
||
DBB000
|
stack
|
page read and write
|
||
16C0000
|
trusted library allocation
|
page read and write
|
||
7F90000
|
heap
|
page read and write
|
||
1520000
|
trusted library allocation
|
page read and write
|
||
5770000
|
trusted library allocation
|
page read and write
|
||
6EB0000
|
heap
|
page read and write
|
||
DF0000
|
trusted library allocation
|
page read and write
|
||
5B80000
|
heap
|
page read and write
|
||
5544000
|
trusted library allocation
|
page read and write
|
||
5C7000
|
heap
|
page read and write
|
||
4EB5000
|
heap
|
page read and write
|
||
528E000
|
stack
|
page read and write
|
||
5EDC000
|
stack
|
page read and write
|
||
6C98000
|
trusted library allocation
|
page read and write
|
||
6696000
|
heap
|
page read and write
|
||
F92000
|
trusted library allocation
|
page read and write
|
There are 646 hidden memdumps, click here to show them.