Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
imfsbSvc.exe
|
PE32+ executable (GUI) x86-64, for MS Windows
|
initial sample
|
||
C:\ProgramData\IObit\DgApi.dll
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\ProgramData\IObit\imfsbDll.dll
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\ProgramData\IObit\imfsbSvc.exe
|
PE32+ executable (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\ProgramData\IObit\imfsbSvc.exe:Zone.Identifier
|
ASCII text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\IObit\dbindex.dat
|
data
|
modified
|
||
C:\ProgramData\Microsoft\Network\Downloader\edb.chk
|
data
|
dropped
|
||
C:\ProgramData\Microsoft\Network\Downloader\edb.log
|
data
|
dropped
|
||
C:\ProgramData\Microsoft\Network\Downloader\qmgr.db
|
Extensible storage engine DataBase, version 0x620, checksum 0x0bb51b49, page size 16384, Windows version 10.0
|
dropped
|
||
C:\ProgramData\Microsoft\Network\Downloader\qmgr.jfm
|
data
|
dropped
|
||
C:\Windows\ServiceProfiles\LocalService\AppData\Local\FontCache\Fonts\Download-1.tmp
|
JSON data
|
dropped
|
||
C:\Windows\ServiceProfiles\LocalService\AppData\Local\Temp\MpCmdRun.log
|
Unicode text, UTF-16, little-endian text, with CRLF line terminators
|
modified
|
There are 2 hidden files, click here to show them.
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\ProgramData\IObit\imfsbSvc.exe
|
C:\ProgramData\IObit\imfsbSvc.exe
|
||
C:\Windows\System32\winlogon.exe
|
C:\Windows\system32\winlogon.exe
|
||
C:\Windows\System32\svchost.exe
|
C:\Windows\System32\svchost.exe -k netsvcs -p -s BITS
|
||
C:\Windows\System32\svchost.exe
|
C:\Windows\System32\svchost.exe -k NetworkService -p
|
||
C:\Windows\System32\svchost.exe
|
C:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s StorSvc
|
||
C:\Windows\System32\svchost.exe
|
C:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p -s wscsvc
|
||
C:\Windows\System32\svchost.exe
|
C:\Windows\system32\svchost.exe -k UnistackSvcGroup
|
||
C:\Users\user\Desktop\imfsbSvc.exe
|
"C:\Users\user\Desktop\imfsbSvc.exe"
|
||
C:\Windows\System32\cmd.exe
|
C:\Windows\system32\cmd.exe
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\sc.exe
|
sc create "IObit" DisplayName= "Platinum user session wrapper" binPath= "C:\ProgramData\IObit\imfsbSvc.exe" type= own start=
auto error= ignore
|
||
C:\Windows\System32\SgrmBroker.exe
|
C:\Windows\system32\SgrmBroker.exe
|
||
C:\Windows\System32\sppsvc.exe
|
C:\Windows\system32\sppsvc.exe
|
||
C:\Program Files\Windows Defender\MpCmdRun.exe
|
"C:\Program Files\Windows Defender\mpcmdrun.exe" -wdenable
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
There are 5 hidden processes, click here to show them.
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
http://esh.hoovernamosong.com/00000000003C6DE800000000003C6DE8
|
160.16.200.77
|
||
http://esh.hoovernamosong.com/000000000039F835000000000039F835
|
160.16.200.77
|
||
https://esh.hoovernamosong.com/00000000003BB6CD00000000003BB6CD
|
160.16.200.77
|
||
http://esh.hoovernamosong.com/00000000003BBBAF00000000003BBBAF
|
160.16.200.77
|
||
https://esh.hoovernamosong.com/00000000003C68D800000000003C68D8
|
160.16.200.77
|
||
https://esh.hoovernamosong.com/000000000039F130000000000039F130
|
160.16.200.77
|
||
HTTP://esh.hoovernamosong.com:806
|
unknown
|
||
http://esh.hoovernamosong.com/00000000003BBBAF00000000003BBBAF(
|
unknown
|
||
https://dev.ditu.live.com/REST/v1/Routes/
|
unknown
|
||
https://dev.virtualearth.net/REST/v1/Routes/Driving
|
unknown
|
||
https://t0.ssl.ak.dynamic.tiles.virtualearth.net/comp/gen.ashx
|
unknown
|
||
https://esh.hoovernamosong.com/00000000003BB6CD00000000003BB6CDIDInfo
|
unknown
|
||
HTTP://esh.hoovernamosong.com:80B
|
unknown
|
||
http://esh.hoovernamosong.com/00000000003BBBAF00000000003BBBAF1
|
unknown
|
||
https://dev.virtualearth.net/REST/v1/Routes/Walking
|
unknown
|
||
https://esh.hoovernamosong.com/00000000003BB6CD00000000003BB6CD#
|
unknown
|
||
http://esh.hoovernamosong.com/00000000003C6DE800000000003C6DE8G
|
unknown
|
||
https://esh.hoovernamosong.com/
|
unknown
|
||
https://esh.hoovernamosong.com/r
|
unknown
|
||
https://esh.hoovernamosong.com/00000000003BB6CD00000000003BB6CD(
|
unknown
|
||
https://esh.hoovernamosong.com/ernamosong.com/00000000003BB6CD00000000003BB6CD#
|
unknown
|
||
https://dev.ditu.live.com/mapcontrol/logging.ashx
|
unknown
|
||
https://dev.ditu.live.com/REST/v1/Imagery/Copyright/
|
unknown
|
||
https://esh.hoovernamosong.com/000000000039F130000000000039F130c
|
unknown
|
||
https://t0.ssl.ak.dynamic.tiles.virtualearth.net/odvs/gri?pv=1&r=
|
unknown
|
||
https://esh.hoovernamosong.com/00000000003C68D800000000003C68D8g(P#
|
unknown
|
||
https://dev.virtualearth.net/REST/v1/Transit/Schedules/
|
unknown
|
||
https://t0.ssl.ak.dynamic.tiles.virtualearth.net/odvs/gdi?pv=
|
unknown
|
||
HTTP://esh.hoovernamosong.com:80%
|
unknown
|
||
http://esh.hoovernamosong.com/00000000003C6DE800000000003C6DE8#
|
unknown
|
||
HTTP://esh.hoovernamosong.com:80
|
unknown
|
||
https://ocsp.quovadisoffshore.com0
|
unknown
|
||
https://esh.hoovernamosong.com/00000000003C68D800000000003C68D8M
|
unknown
|
||
http://esh.hoovernamosong.com/00000000003C6DE800000000003C6DE83.0.30729;
|
unknown
|
||
http://www.bingmapsportal.com
|
unknown
|
||
https://dev.virtualearth.net/REST/v1/Imagery/Copyright/
|
unknown
|
||
https://ecn.dev.virtualearth.net/REST/v1/Imagery/Copyright/
|
unknown
|
||
http://esh.hoovernamosong.com/00000000003BBBAF00000000003BBBAFa
|
unknown
|
||
https://dynamic.t0.tiles.ditu.live.com/comp/gen.ashx
|
unknown
|
||
http://esh.hoovernamosong.com/00000000003C6DE800000000003C6DE8t
|
unknown
|
||
https://esh.hoovernamosong.com/00000000003C68D800000000003C68D81
|
unknown
|
||
https://dev.ditu.live.com/REST/v1/Transit/Stops/
|
unknown
|
||
https://dev.virtualearth.net/REST/v1/Routes/
|
unknown
|
||
https://dev.virtualearth.net/REST/v1/Traffic/Incidents/
|
unknown
|
||
https://t0.ssl.ak.dynamic.tiles.virtualearth.net/odvs/gdi?pv=1&r=
|
unknown
|
||
https://dynamic.api.tiles.ditu.live.com/odvs/gri?pv=1&r=
|
unknown
|
||
http://crl.ver)
|
unknown
|
||
https://dev.virtualearth.net/webservices/v1/LoggingService/LoggingService.svc/Log?
|
unknown
|
||
http://esh.hoovernamosong.com/000000000039F835000000000039F835M
|
unknown
|
||
https://t0.ssl.ak.dynamic.tiles.virtualearth.net/odvs/gd?pv=1&r=
|
unknown
|
||
https://dev.virtualearth.net/REST/v1/Locations
|
unknown
|
||
https://dev.ditu.live.com/REST/V1/MapControlConfiguration/native/
|
unknown
|
||
https://dev.virtualearth.net/mapcontrol/logging.ashx
|
unknown
|
||
https://esh.hoovernamosong.com/00000000003C68D800000000003C68D8(
|
unknown
|
||
https://g.live.com/odclientsettings/Prod/C:
|
unknown
|
||
https://dynamic.api.tiles.ditu.live.com/odvs/gdi?pv=1&r=
|
unknown
|
||
http://esh.hoovernamosong.com/00000000003C6DE800000000003C6DE8Y
|
unknown
|
||
https://dynamic.t
|
unknown
|
||
https://dev.virtualearth.net/REST/v1/Routes/Transit
|
unknown
|
||
https://dev.ditu.live.com/webservices/v1/LoggingService/LoggingService.svc/Log?
|
unknown
|
||
https://t0.ssl.ak.tiles.virtualearth.net/tiles/gen
|
unknown
|
||
https://dev.ditu.live.com/REST/v1/Transit/Schedules/
|
unknown
|
||
http://www.quovadis.bm0
|
unknown
|
||
https://tiles.virtualearth.net/tiles/cmd/StreetSideBubbleMetaData?north=
|
unknown
|
||
https://dynamic.api.tiles.ditu.live.com/odvs/gdv?pv=1&r=
|
unknown
|
||
https://dev.ditu.live.com/REST/v1/Locations
|
unknown
|
||
https://t0.ssl.ak.dynamic.tiles.virtu
|
unknown
|
||
http://esh.hoovernamosong.com/000000000039F835000000000039F835(
|
unknown
|
||
https://dev.ditu.live.com/REST/v1/JsonFilter/VenueMaps/data/
|
unknown
|
||
https://dynamic.api.tiles.ditu.live.com/odvs/gd?pv=1&r=
|
unknown
|
There are 60 hidden URLs, click here to show them.
Domains
Name
|
IP
|
Malicious
|
|
---|---|---|---|
esh.hoovernamosong.com
|
160.16.200.77
|
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
160.16.200.77
|
esh.hoovernamosong.com
|
Japan
|
||
127.0.0.1
|
unknown
|
unknown
|
Registry
Path
|
Value
|
Malicious
|
|
---|---|---|---|
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Security Center
|
cval
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\IObit\TMLYVTXTB
|
BPRJQEJQ
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\IObit\VSUBVZEHXI
|
YUVJYXLU
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\IObit\VSUBVZEHXI
|
YUVJYXLU
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\IObit\VSUBVZEHXI
|
YUVJYXLU
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\BITS
|
PerfMMFileName
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\WMI\Security
|
c688cf83-9945-5ff6-0e1e-1ff1f8a2ec9a
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\SoftwareProtectionPlatform
|
ServiceSessionId
|
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
19173C79000
|
heap
|
page read and write
|
||
70000
|
direct allocation
|
page read and write
|
||
79E9A7D000
|
stack
|
page read and write
|
||
19174713000
|
heap
|
page read and write
|
||
93000
|
direct allocation
|
page read and write
|
||
60000
|
direct allocation
|
page execute read
|
||
1917DCD0000
|
trusted library allocation
|
page read and write
|
||
1917DD50000
|
remote allocation
|
page read and write
|
||
289D0A23000
|
heap
|
page read and write
|
||
19173C6E000
|
heap
|
page read and write
|
||
1E6CF300000
|
heap
|
page read and write
|
||
289D1534000
|
heap
|
page read and write
|
||
1EB6AA87000
|
heap
|
page read and write
|
||
1BB26685000
|
heap
|
page read and write
|
||
60000
|
direct allocation
|
page execute read
|
||
219A682B000
|
heap
|
page read and write
|
||
26A09B00000
|
unclassified section
|
page readonly
|
||
100017000
|
direct allocation
|
page read and write
|
||
19173CA9000
|
heap
|
page read and write
|
||
289D0A0C000
|
heap
|
page read and write
|
||
96D8DBE000
|
stack
|
page read and write
|
||
1E6CF213000
|
heap
|
page read and write
|
||
1E6CFA15000
|
heap
|
page read and write
|
||
19175980000
|
trusted library allocation
|
page read and write
|
||
22000
|
direct allocation
|
page read and write
|
||
19173CDE000
|
heap
|
page read and write
|
||
1EB6AA6B000
|
heap
|
page read and write
|
||
289D0957000
|
heap
|
page read and write
|
||
219A67E0000
|
unclassified section
|
page readonly
|
||
289D0A0C000
|
heap
|
page read and write
|
||
3D4E30B000
|
stack
|
page read and write
|
||
B3D1A7D000
|
stack
|
page read and write
|
||
19175C00000
|
trusted library allocation
|
page read and write
|
||
7FF7EE198000
|
unkown
|
page readonly
|
||
1EB6AA0B000
|
heap
|
page read and write
|
||
93000
|
direct allocation
|
page read and write
|
||
19175A43000
|
heap
|
page read and write
|
||
1E6CF283000
|
heap
|
page read and write
|
||
13000
|
direct allocation
|
page read and write
|
||
1EB6AA13000
|
heap
|
page read and write
|
||
19175970000
|
trusted library allocation
|
page read and write
|
||
19173CC7000
|
heap
|
page read and write
|
||
1EB6AAAA000
|
heap
|
page read and write
|
||
26A09C00000
|
heap
|
page read and write
|
||
3D4E7FE000
|
stack
|
page read and write
|
||
289D09DC000
|
heap
|
page read and write
|
||
E8A90FE000
|
stack
|
page read and write
|
||
30000
|
direct allocation
|
page execute read
|
||
29F009E6000
|
heap
|
page read and write
|
||
289D0A0F000
|
heap
|
page read and write
|
||
19175A51000
|
heap
|
page read and write
|
||
1E6CFA00000
|
heap
|
page read and write
|
||
289D152B000
|
heap
|
page read and write
|
||
50000
|
direct allocation
|
page execute read
|
||
B3D18FD000
|
stack
|
page read and write
|
||
19175B02000
|
heap
|
page read and write
|
||
289D155B000
|
heap
|
page read and write
|
||
289D09DC000
|
heap
|
page read and write
|
||
289D098D000
|
heap
|
page read and write
|
||
19173CB2000
|
heap
|
page read and write
|
||
1917DF50000
|
trusted library allocation
|
page read and write
|
||
1E6CF1C0000
|
heap
|
page read and write
|
||
55A4E000
|
unkown
|
page readonly
|
||
26A09C85000
|
heap
|
page read and write
|
||
7FF797EA8000
|
unkown
|
page readonly
|
||
289D0A0C000
|
heap
|
page read and write
|
||
1E6CF200000
|
heap
|
page read and write
|
||
1EB6AA58000
|
heap
|
page read and write
|
||
7FF797E71000
|
unkown
|
page execute read
|
||
289D0975000
|
heap
|
page read and write
|
||
1917DC1C000
|
trusted library allocation
|
page read and write
|
||
1917DC0A000
|
trusted library allocation
|
page read and write
|
||
E8A8CFC000
|
stack
|
page read and write
|
||
219A6885000
|
heap
|
page read and write
|
||
55A4B000
|
unkown
|
page read and write
|
||
219A687D000
|
heap
|
page read and write
|
||
1BB26531000
|
direct allocation
|
page read and write
|
||
1EB6A9C0000
|
heap
|
page read and write
|
||
E8A8FFE000
|
stack
|
page read and write
|
||
1917DC10000
|
trusted library allocation
|
page read and write
|
||
289D1510000
|
remote allocation
|
page read and write
|
||
1BB261D0000
|
heap
|
page read and write
|
||
30000
|
direct allocation
|
page execute read
|
||
19175B61000
|
heap
|
page read and write
|
||
19175A75000
|
heap
|
page read and write
|
||
80000
|
direct allocation
|
page execute read
|
||
100010000
|
direct allocation
|
page execute read
|
||
26A09C83000
|
heap
|
page read and write
|
||
83000
|
direct allocation
|
page read and write
|
||
1EB6AA63000
|
heap
|
page read and write
|
||
26A09C3E000
|
heap
|
page read and write
|
||
19173D06000
|
heap
|
page read and write
|
||
1BB26430000
|
heap
|
page read and write
|
||
1EB6AA61000
|
heap
|
page read and write
|
||
19173D16000
|
heap
|
page read and write
|
||
7FF94B651000
|
unkown
|
page execute read
|
||
289D0969000
|
heap
|
page read and write
|
||
7FF94B48F000
|
unkown
|
page readonly
|
||
19173CD8000
|
heap
|
page read and write
|
||
29F00AC1000
|
direct allocation
|
page read and write
|
||
1EB6AA4C000
|
heap
|
page read and write
|
||
7FF7EE160000
|
unkown
|
page readonly
|
||
289D099B000
|
heap
|
page read and write
|
||
1BB26369000
|
heap
|
page read and write
|
||
1EB6AA99000
|
heap
|
page read and write
|
||
875C77B000
|
stack
|
page read and write
|
||
289D09DC000
|
heap
|
page read and write
|
||
1E6CF1B0000
|
unclassified section
|
page readonly
|
||
19175A43000
|
heap
|
page read and write
|
||
289D1620000
|
trusted library allocation
|
page read and write
|
||
1EB6AB02000
|
heap
|
page read and write
|
||
289D0A0F000
|
heap
|
page read and write
|
||
7FF94B68F000
|
unkown
|
page read and write
|
||
1EB6AA5C000
|
heap
|
page read and write
|
||
26A09B60000
|
trusted library allocation
|
page read and write
|
||
1E6CF273000
|
heap
|
page read and write
|
||
219A6855000
|
heap
|
page read and write
|
||
26A09D02000
|
heap
|
page read and write
|
||
289D08A1000
|
remote allocation
|
page read and write
|
||
19175A84000
|
heap
|
page read and write
|
||
26A09C41000
|
heap
|
page read and write
|
||
1E6CF030000
|
heap
|
page read and write
|
||
19173C6C000
|
heap
|
page read and write
|
||
94C7B8B000
|
stack
|
page read and write
|
||
191759A0000
|
trusted library allocation
|
page read and write
|
||
10000
|
direct allocation
|
page execute read
|
||
3D4E9FE000
|
stack
|
page read and write
|
||
19174470000
|
trusted library allocation
|
page read and write
|
||
559C1000
|
unkown
|
page execute read
|
||
1EB6AA9E000
|
heap
|
page read and write
|
||
1EB6B280000
|
trusted library allocation
|
page read and write
|
||
1EB6AA55000
|
heap
|
page read and write
|
||
19173C00000
|
heap
|
page read and write
|
||
19173C9D000
|
heap
|
page read and write
|
||
191759C0000
|
trusted library allocation
|
page read and write
|
||
28348F19000
|
heap
|
page read and write
|
||
19173C52000
|
heap
|
page read and write
|
||
70000
|
direct allocation
|
page read and write
|
||
1EB6A9B0000
|
unclassified section
|
page readonly
|
||
96D937E000
|
stack
|
page read and write
|
||
1EB6AA66000
|
heap
|
page read and write
|
||
875C378000
|
stack
|
page read and write
|
||
93000
|
direct allocation
|
page read and write
|
||
1EB6AA34000
|
heap
|
page read and write
|
||
1EB6AA59000
|
heap
|
page read and write
|
||
19174700000
|
heap
|
page read and write
|
||
7FF7EE161000
|
unkown
|
page execute read
|
||
289D1510000
|
remote allocation
|
page read and write
|
||
1E6CF27E000
|
heap
|
page read and write
|
||
19174600000
|
heap
|
page read and write
|
||
26A09BD0000
|
remote allocation
|
page read and write
|
||
B3D17FF000
|
stack
|
page read and write
|
||
875CEFA000
|
stack
|
page read and write
|
||
289D14C0000
|
trusted library allocation
|
page read and write
|
||
289D0BD0000
|
direct allocation
|
page read and write
|
||
1917475A000
|
heap
|
page read and write
|
||
1BB2636B000
|
heap
|
page read and write
|
||
79E9B7E000
|
stack
|
page read and write
|
||
289D098D000
|
heap
|
page read and write
|
||
79E9BFD000
|
stack
|
page read and write
|
||
289D0A24000
|
heap
|
page read and write
|
||
19175A54000
|
heap
|
page read and write
|
||
219A6740000
|
heap
|
page read and write
|
||
1E6CF24C000
|
heap
|
page read and write
|
||
19173CC2000
|
heap
|
page read and write
|
||
40000
|
direct allocation
|
page execute read
|
||
289D09BF000
|
heap
|
page read and write
|
||
55A61000
|
unkown
|
page execute read
|
||
19174702000
|
heap
|
page read and write
|
||
26A09C28000
|
heap
|
page read and write
|
||
20000
|
direct allocation
|
page execute read
|
||
19173BA0000
|
heap
|
page read and write
|
||
10000
|
direct allocation
|
page execute read
|
||
7FF7EE1AC000
|
unkown
|
page read and write
|
||
19173B50000
|
heap
|
page read and write
|
||
D2767F000
|
stack
|
page read and write
|
||
1BB26530000
|
direct allocation
|
page execute read
|
||
19175B5C000
|
heap
|
page read and write
|
||
289D1578000
|
heap
|
page read and write
|
||
191758D1000
|
trusted library allocation
|
page read and write
|
||
1EB6AA98000
|
heap
|
page read and write
|
||
289D0A0F000
|
heap
|
page read and write
|
||
19173CBA000
|
heap
|
page read and write
|
||
19173CA3000
|
heap
|
page read and write
|
||
1E6CF265000
|
heap
|
page read and write
|
||
219A6850000
|
heap
|
page read and write
|
||
55A4A000
|
unkown
|
page write copy
|
||
14921450000
|
heap
|
page read and write
|
||
875CDFB000
|
stack
|
page read and write
|
||
29F00760000
|
heap
|
page read and write
|
||
19174602000
|
heap
|
page read and write
|
||
29F00AE0000
|
direct allocation
|
page read and write
|
||
29F00940000
|
heap
|
page read and write
|
||
1BB26680000
|
heap
|
page read and write
|
||
1EB6AA00000
|
heap
|
page read and write
|
||
289D0941000
|
heap
|
page read and write
|
||
289D1578000
|
heap
|
page read and write
|
||
1BB2633C000
|
heap
|
page read and write
|
||
1E6CF263000
|
heap
|
page read and write
|
||
1BB26369000
|
heap
|
page read and write
|
||
19175A88000
|
heap
|
page read and write
|
||
289D0930000
|
heap
|
page read and write
|
||
7FF797EA8000
|
unkown
|
page readonly
|
||
7FF797E70000
|
unkown
|
page readonly
|
||
B3D1B7E000
|
stack
|
page read and write
|
||
19175A46000
|
heap
|
page read and write
|
||
1EB6AA68000
|
heap
|
page read and write
|
||
965CAFE000
|
unkown
|
page read and write
|
||
19173C41000
|
heap
|
page read and write
|
||
875CC7F000
|
stack
|
page read and write
|
||
1917DC16000
|
trusted library allocation
|
page read and write
|
||
289D0B20000
|
heap
|
page readonly
|
||
83000
|
direct allocation
|
page read and write
|
||
1EB6AA62000
|
heap
|
page read and write
|
||
96D8D3E000
|
stack
|
page read and write
|
||
79E9E7D000
|
stack
|
page read and write
|
||
19175A73000
|
heap
|
page read and write
|
||
100010000
|
direct allocation
|
page execute read
|
||
289D0996000
|
heap
|
page read and write
|
||
1E6CF23B000
|
heap
|
page read and write
|
||
289D0A1A000
|
heap
|
page read and write
|
||
19175B65000
|
heap
|
page read and write
|
||
22000
|
direct allocation
|
page read and write
|
||
875CAFB000
|
stack
|
page read and write
|
||
1EB6AA52000
|
heap
|
page read and write
|
||
289D0BB0000
|
direct allocation
|
page read and write
|
||
19175910000
|
trusted library allocation
|
page read and write
|
||
26A09D17000
|
heap
|
page read and write
|
||
19173B90000
|
unclassified section
|
page readonly
|
||
1EB6AA56000
|
heap
|
page read and write
|
||
289D09DB000
|
heap
|
page read and write
|
||
3D4E6FD000
|
stack
|
page read and write
|
||
14921710000
|
heap
|
page read and write
|
||
219A683E000
|
heap
|
page read and write
|
||
14921620000
|
heap
|
page read and write
|
||
1917DC70000
|
trusted library allocation
|
page read and write
|
||
289D09DB000
|
heap
|
page read and write
|
||
289D1567000
|
heap
|
page read and write
|
||
1BB26396000
|
heap
|
page read and write
|
||
1E6CF9B0000
|
trusted library allocation
|
page read and write
|
||
50000
|
direct allocation
|
page execute read
|
||
219A6889000
|
heap
|
page read and write
|
||
19174719000
|
heap
|
page read and write
|
||
3D4E8FE000
|
stack
|
page read and write
|
||
33CBFCB000
|
stack
|
page read and write
|
||
7FF7EE1AE000
|
unkown
|
page readonly
|
||
26A09CA2000
|
heap
|
page read and write
|
||
1917DC0D000
|
trusted library allocation
|
page read and write
|
||
1BB264B0000
|
heap
|
page read and write
|
||
1E6CF22A000
|
heap
|
page read and write
|
||
1EB6AA5D000
|
heap
|
page read and write
|
||
19173CDE000
|
heap
|
page read and write
|
||
26A09D00000
|
heap
|
page read and write
|
||
1917DC1F000
|
trusted library allocation
|
page read and write
|
||
289D0937000
|
heap
|
page read and write
|
||
875C67C000
|
stack
|
page read and write
|
||
28348D47000
|
heap
|
page read and write
|
||
100017000
|
direct allocation
|
page read and write
|
||
1E6CF240000
|
heap
|
page read and write
|
||
34000
|
direct allocation
|
page read and write
|
||
19175990000
|
trusted library allocation
|
page read and write
|
||
7FF797EBC000
|
unkown
|
page read and write
|
||
29F00AC0000
|
direct allocation
|
page execute read
|
||
289D09A9000
|
heap
|
page read and write
|
||
1E6CF279000
|
heap
|
page read and write
|
||
289D0A0C000
|
heap
|
page read and write
|
||
26A09C13000
|
heap
|
page read and write
|
||
42000
|
direct allocation
|
page read and write
|
||
289D0969000
|
heap
|
page read and write
|
||
B3D13CE000
|
stack
|
page read and write
|
||
19175900000
|
trusted library allocation
|
page read and write
|
||
D2731D000
|
stack
|
page read and write
|
||
7FF797E71000
|
unkown
|
page execute read
|
||
1EB6AA5B000
|
heap
|
page read and write
|
||
26A09C79000
|
heap
|
page read and write
|
||
1BB26570000
|
direct allocation
|
page read and write
|
||
1EB6AA4F000
|
heap
|
page read and write
|
||
100017000
|
direct allocation
|
page read and write
|
||
1917DD50000
|
remote allocation
|
page read and write
|
||
219A6902000
|
heap
|
page read and write
|
||
19175A9B000
|
heap
|
page read and write
|
||
34000
|
direct allocation
|
page read and write
|
||
19175ADF000
|
heap
|
page read and write
|
||
875C47E000
|
stack
|
page read and write
|
||
28348D47000
|
heap
|
page read and write
|
||
1EB6AA42000
|
heap
|
page read and write
|
||
289D1520000
|
heap
|
page read and write
|
||
19175A00000
|
heap
|
page read and write
|
||
19173D13000
|
heap
|
page read and write
|
||
1EB6AA31000
|
heap
|
page read and write
|
||
289D09DC000
|
heap
|
page read and write
|
||
55ACE000
|
unkown
|
page readonly
|
||
289D095C000
|
heap
|
page read and write
|
||
219A6813000
|
heap
|
page read and write
|
||
34000
|
direct allocation
|
page read and write
|
||
26A099F0000
|
heap
|
page read and write
|
||
19175B58000
|
heap
|
page read and write
|
||
7FF797EBC000
|
unkown
|
page write copy
|
||
1EB6A970000
|
heap
|
page read and write
|
||
289D1510000
|
remote allocation
|
page read and write
|
||
19175AA2000
|
heap
|
page read and write
|
||
80000
|
direct allocation
|
page execute read
|
||
1EB6AA6E000
|
heap
|
page read and write
|
||
219A7202000
|
trusted library allocation
|
page read and write
|
||
191759A0000
|
trusted library allocation
|
page read and write
|
||
1917DC90000
|
trusted library allocation
|
page read and write
|
||
1917DC60000
|
trusted library allocation
|
page read and write
|
||
54000
|
direct allocation
|
page read and write
|
||
28348D2B000
|
heap
|
page read and write
|
||
55A2E000
|
unkown
|
page readonly
|
||
60000
|
direct allocation
|
page execute read
|
||
289D1538000
|
heap
|
page read and write
|
||
1917DC13000
|
trusted library allocation
|
page read and write
|
||
1EB6AA69000
|
heap
|
page read and write
|
||
289D09D2000
|
heap
|
page read and write
|
||
55AEE000
|
unkown
|
page readonly
|
||
1EB6AA43000
|
heap
|
page read and write
|
||
289D09B1000
|
heap
|
page read and write
|
||
7FF7EE161000
|
unkown
|
page execute read
|
||
E8A8DFD000
|
stack
|
page read and write
|
||
79E9D7E000
|
stack
|
page read and write
|
||
19175A65000
|
heap
|
page read and write
|
||
1EB6AA70000
|
heap
|
page read and write
|
||
29F008C0000
|
heap
|
page read and write
|
||
1BB26365000
|
heap
|
page read and write
|
||
1917DC23000
|
trusted library allocation
|
page read and write
|
||
7FF7EE198000
|
unkown
|
page readonly
|
||
19173C84000
|
heap
|
page read and write
|
||
7FF94B49F000
|
unkown
|
page read and write
|
||
20000
|
direct allocation
|
page execute read
|
||
26A09980000
|
heap
|
page read and write
|
||
289D098D000
|
heap
|
page read and write
|
||
1E6CF302000
|
heap
|
page read and write
|
||
19175A4E000
|
heap
|
page read and write
|
||
875D0FF000
|
stack
|
page read and write
|
||
28348F20000
|
heap
|
page read and write
|
||
1BB26369000
|
heap
|
page read and write
|
||
289D09B0000
|
heap
|
page read and write
|
||
875BEEB000
|
stack
|
page read and write
|
||
D2739E000
|
stack
|
page read and write
|
||
7FF94B693000
|
unkown
|
page readonly
|
||
19175A46000
|
heap
|
page read and write
|
||
1917DF40000
|
trusted library allocation
|
page read and write
|
||
1EB6AA5A000
|
heap
|
page read and write
|
||
83000
|
direct allocation
|
page read and write
|
||
1EB6AA89000
|
heap
|
page read and write
|
||
289D0B35000
|
heap
|
page read and write
|
||
1917DD50000
|
remote allocation
|
page read and write
|
||
7FF797EBE000
|
unkown
|
page readonly
|
||
1917DC26000
|
trusted library allocation
|
page read and write
|
||
26A09D13000
|
heap
|
page read and write
|
||
10000
|
direct allocation
|
page execute read
|
||
289D0A0C000
|
heap
|
page read and write
|
||
219A6800000
|
heap
|
page read and write
|
||
289D09DC000
|
heap
|
page read and write
|
||
289D0966000
|
heap
|
page read and write
|
||
28348D20000
|
heap
|
page read and write
|
||
50000
|
direct allocation
|
page execute read
|
||
29F00C30000
|
heap
|
page read and write
|
||
26A09C9B000
|
heap
|
page read and write
|
||
219A6876000
|
heap
|
page read and write
|
||
1EB6A900000
|
heap
|
page read and write
|
||
19173CCE000
|
heap
|
page read and write
|
||
1917475A000
|
heap
|
page read and write
|
||
55AEB000
|
unkown
|
page read and write
|
||
1917DCC0000
|
trusted library allocation
|
page read and write
|
||
1EB6AA4A000
|
heap
|
page read and write
|
||
42000
|
direct allocation
|
page read and write
|
||
1BB26550000
|
direct allocation
|
page read and write
|
||
1BB26330000
|
heap
|
page read and write
|
||
26A09C63000
|
heap
|
page read and write
|
||
54000
|
direct allocation
|
page read and write
|
||
219A6802000
|
heap
|
page read and write
|
||
96D927F000
|
stack
|
page read and write
|
||
33CC2FF000
|
stack
|
page read and write
|
||
26A09BD0000
|
remote allocation
|
page read and write
|
||
219A6AD0000
|
heap
|
page read and write
|
||
219A687F000
|
heap
|
page read and write
|
||
1917DC00000
|
trusted library allocation
|
page read and write
|
||
96D8CBC000
|
stack
|
page read and write
|
||
29F00B00000
|
direct allocation
|
page read and write
|
||
19174615000
|
heap
|
page read and write
|
||
289D0B30000
|
heap
|
page read and write
|
||
7FF94B67F000
|
unkown
|
page readonly
|
||
1E6CFA02000
|
heap
|
page read and write
|
||
100010000
|
direct allocation
|
page execute read
|
||
1EB6AA5F000
|
heap
|
page read and write
|
||
19173CE1000
|
heap
|
page read and write
|
||
289D1538000
|
heap
|
page read and write
|
||
90000
|
direct allocation
|
page execute read
|
||
28348B90000
|
heap
|
page read and write
|
||
29F009DB000
|
heap
|
page read and write
|
||
19173CA5000
|
heap
|
page read and write
|
||
289D099B000
|
heap
|
page read and write
|
||
289D1578000
|
heap
|
page read and write
|
||
30000
|
direct allocation
|
page execute read
|
||
79E949B000
|
stack
|
page read and write
|
||
19174704000
|
heap
|
page read and write
|
||
94C817E000
|
stack
|
page read and write
|
||
289D0A0F000
|
heap
|
page read and write
|
||
289D09A9000
|
heap
|
page read and write
|
||
191754B0000
|
trusted library allocation
|
page read and write
|
||
7FF7EE1AE000
|
unkown
|
page readonly
|
||
7FF7EE1AC000
|
unkown
|
page write copy
|
||
14921715000
|
heap
|
page read and write
|
||
1917DC19000
|
trusted library allocation
|
page read and write
|
||
19173C13000
|
heap
|
page read and write
|
||
54000
|
direct allocation
|
page read and write
|
||
40000
|
direct allocation
|
page execute read
|
||
79E9EFE000
|
stack
|
page read and write
|
||
96D907E000
|
stack
|
page read and write
|
||
7FF94B650000
|
unkown
|
page readonly
|
||
289D09DC000
|
heap
|
page read and write
|
||
1EB6AA6D000
|
heap
|
page read and write
|
||
B3D1876000
|
stack
|
page read and write
|
||
29F009CC000
|
heap
|
page read and write
|
||
19173CDA000
|
heap
|
page read and write
|
||
1917DC80000
|
trusted library allocation
|
page read and write
|
||
19173CD5000
|
heap
|
page read and write
|
||
19173CB0000
|
heap
|
page read and write
|
||
40000
|
direct allocation
|
page execute read
|
||
28348E20000
|
heap
|
page read and write
|
||
26A09BA0000
|
trusted library allocation
|
page read and write
|
||
1EB6AA25000
|
heap
|
page read and write
|
||
289D1578000
|
heap
|
page read and write
|
||
289D09D2000
|
heap
|
page read and write
|
||
B3D16FF000
|
stack
|
page read and write
|
||
19173AE0000
|
heap
|
page read and write
|
||
19175B2C000
|
heap
|
page read and write
|
||
55A60000
|
unkown
|
page readonly
|
||
42000
|
direct allocation
|
page read and write
|
||
19175A98000
|
heap
|
page read and write
|
||
1917DC29000
|
trusted library allocation
|
page read and write
|
||
1E6CF202000
|
heap
|
page read and write
|
||
191759C0000
|
trusted library allocation
|
page read and write
|
||
289D096E000
|
heap
|
page read and write
|
||
13000
|
direct allocation
|
page read and write
|
||
1EB6AA81000
|
heap
|
page read and write
|
||
289D0830000
|
heap
|
page read and write
|
||
19175A8E000
|
heap
|
page read and write
|
||
289D0A0C000
|
heap
|
page read and write
|
||
7FF94B4A3000
|
unkown
|
page readonly
|
||
289D1620000
|
trusted library allocation
|
page read and write
|
||
7FF797EBE000
|
unkown
|
page readonly
|
||
289D08C0000
|
heap
|
page read and write
|
||
28348F19000
|
heap
|
page read and write
|
||
289D0A0C000
|
heap
|
page read and write
|
||
219A6828000
|
heap
|
page read and write
|
||
19173D02000
|
heap
|
page read and write
|
||
28348D4A000
|
heap
|
page read and write
|
||
28348E90000
|
heap
|
page read and write
|
||
219A6840000
|
heap
|
page read and write
|
||
14921458000
|
heap
|
page read and write
|
||
26A09BD0000
|
remote allocation
|
page read and write
|
||
1EB6AA95000
|
heap
|
page read and write
|
||
22000
|
direct allocation
|
page read and write
|
||
289D0A0D000
|
heap
|
page read and write
|
||
26A09B10000
|
heap
|
page read and write
|
||
19174719000
|
heap
|
page read and write
|
||
289D0B40000
|
heap
|
page read and write
|
||
90000
|
direct allocation
|
page execute read
|
||
289D09D8000
|
heap
|
page read and write
|
||
289D09D9000
|
heap
|
page read and write
|
||
1EB6AA5E000
|
heap
|
page read and write
|
||
19173C5D000
|
heap
|
page read and write
|
||
80000
|
direct allocation
|
page execute read
|
||
19173D29000
|
heap
|
page read and write
|
||
219A67A0000
|
heap
|
page read and write
|
||
289D098D000
|
heap
|
page read and write
|
||
7FF797E70000
|
unkown
|
page readonly
|
||
26A0B602000
|
trusted library allocation
|
page read and write
|
||
7FF94B461000
|
unkown
|
page execute read
|
||
90000
|
direct allocation
|
page execute read
|
||
1E6CF28E000
|
heap
|
page read and write
|
||
1E6CF313000
|
heap
|
page read and write
|
||
14921390000
|
heap
|
page read and write
|
||
1EB6AA40000
|
heap
|
page read and write
|
||
289D098D000
|
heap
|
page read and write
|
||
7FF7EE160000
|
unkown
|
page readonly
|
||
7FF94B460000
|
unkown
|
page readonly
|
||
29F009C0000
|
heap
|
page read and write
|
||
289D09D2000
|
heap
|
page read and write
|
||
1EB6B402000
|
trusted library allocation
|
page read and write
|
||
289D08A0000
|
remote allocation
|
page execute read
|
||
14921320000
|
heap
|
page read and write
|
||
289D0969000
|
heap
|
page read and write
|
||
965C72A000
|
stack
|
page read and write
|
||
55AEA000
|
unkown
|
page write copy
|
||
96D947E000
|
stack
|
page read and write
|
||
70000
|
direct allocation
|
page read and write
|
||
1BB26356000
|
heap
|
page read and write
|
||
20000
|
direct allocation
|
page execute read
|
||
19175990000
|
trusted library allocation
|
page read and write
|
||
E8A8EFF000
|
stack
|
page read and write
|
||
559C0000
|
unkown
|
page readonly
|
||
1917DC60000
|
trusted library allocation
|
page read and write
|
||
875C57A000
|
stack
|
page read and write
|
||
19175B07000
|
heap
|
page read and write
|
||
191759D4000
|
trusted library allocation
|
page read and write
|
||
1EB6AA27000
|
heap
|
page read and write
|
||
289D1577000
|
heap
|
page read and write
|
||
B3D197F000
|
stack
|
page read and write
|
||
13000
|
direct allocation
|
page read and write
|
||
965CBFE000
|
stack
|
page read and write
|
||
1917E000000
|
heap
|
page read and write
|
||
191759D0000
|
trusted library allocation
|
page read and write
|
||
1917DC80000
|
trusted library allocation
|
page read and write
|
||
1EB6AA6C000
|
heap
|
page read and write
|
||
28348D4A000
|
heap
|
page read and write
|
||
94C7EFF000
|
stack
|
page read and write
|
||
289D0A24000
|
heap
|
page read and write
|
||
28348F10000
|
heap
|
page read and write
|
||
19173C2A000
|
heap
|
page read and write
|
||
79E9FFE000
|
stack
|
page read and write
|
||
219A70B0000
|
trusted library allocation
|
page read and write
|
||
1E6CF0A0000
|
heap
|
page read and write
|
There are 506 hidden memdumps, click here to show them.