Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
1L8qjfD9J2.exe
|
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
|
initial sample
|
||
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\1L8qjfD9J2.exe.log
|
ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\tmp8E14.tmp
|
XML 1.0 document, ASCII text
|
dropped
|
||
C:\Users\user\AppData\Roaming\eEUHByXtioQ.exe
|
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\MSBuild.exe.log
|
ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\eEUHByXtioQ.exe.log
|
ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_1idprecd.j5j.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_dg01vz0j.xmc.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_jdbtjsx3.srr.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_k0zr0w0z.igo.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_oogz05jz.pn5.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_q3ppax1x.uwp.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_sytrkr4x.iy0.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_vmg3treg.xkk.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\tmpA1EA.tmp
|
XML 1.0 document, ASCII text
|
dropped
|
||
C:\Users\user\AppData\Roaming\eEUHByXtioQ.exe:Zone.Identifier
|
ASCII text, with CRLF line terminators
|
dropped
|
There are 7 hidden files, click here to show them.
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\1L8qjfD9J2.exe
|
"C:\Users\user\Desktop\1L8qjfD9J2.exe"
|
||
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
|
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\1L8qjfD9J2.exe"
|
||
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
|
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\eEUHByXtioQ.exe"
|
||
C:\Windows\SysWOW64\schtasks.exe
|
"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\eEUHByXtioQ" /XML "C:\Users\user\AppData\Local\Temp\tmp8E14.tmp"
|
||
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
|
"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"
|
||
C:\Users\user\AppData\Roaming\eEUHByXtioQ.exe
|
C:\Users\user\AppData\Roaming\eEUHByXtioQ.exe
|
||
C:\Windows\SysWOW64\schtasks.exe
|
"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\eEUHByXtioQ" /XML "C:\Users\user\AppData\Local\Temp\tmpA1EA.tmp"
|
||
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
|
"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\wbem\WmiPrvSE.exe
|
C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
There are 3 hidden processes, click here to show them.
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
|
unknown
|
Domains
Name
|
IP
|
Malicious
|
|
---|---|---|---|
ronymahmoud.casacam.net
|
52.201.248.168
|
||
bg.microsoft.map.fastly.net
|
199.232.210.172
|
||
s-part-0035.t-0009.t-msedge.net
|
13.107.246.63
|
||
fp2e7a.wpc.phicdn.net
|
192.229.221.95
|
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
52.201.248.168
|
ronymahmoud.casacam.net
|
United States
|
Registry
Path
|
Value
|
Malicious
|
|
---|---|---|---|
HKEY_CURRENT_USER
|
di
|
||
HKEY_CURRENT_USER\SOFTWARE\0100398783ec4727
|
[kl]
|
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
2948000
|
trusted library allocation
|
page read and write
|
||
402000
|
remote allocation
|
page execute and read and write
|
||
2960000
|
trusted library allocation
|
page read and write
|
||
29D1000
|
trusted library allocation
|
page read and write
|
||
33E8000
|
trusted library allocation
|
page read and write
|
||
3351000
|
trusted library allocation
|
page read and write
|
||
2958000
|
trusted library allocation
|
page read and write
|
||
3400000
|
trusted library allocation
|
page read and write
|
||
3168000
|
trusted library allocation
|
page read and write
|
||
9B3E000
|
stack
|
page read and write
|
||
4552000
|
trusted library allocation
|
page read and write
|
||
5D30000
|
trusted library allocation
|
page read and write
|
||
A80000
|
heap
|
page read and write
|
||
4CD0000
|
trusted library allocation
|
page execute and read and write
|
||
8D9000
|
heap
|
page read and write
|
||
2CF0000
|
heap
|
page read and write
|
||
614D000
|
stack
|
page read and write
|
||
A36C000
|
stack
|
page read and write
|
||
4ACD000
|
stack
|
page read and write
|
||
8ED000
|
heap
|
page read and write
|
||
39D9000
|
trusted library allocation
|
page read and write
|
||
2801000
|
trusted library allocation
|
page read and write
|
||
A35E000
|
stack
|
page read and write
|
||
58B1000
|
trusted library allocation
|
page read and write
|
||
589B000
|
trusted library allocation
|
page read and write
|
||
5093000
|
heap
|
page execute and read and write
|
||
1678000
|
heap
|
page read and write
|
||
1884000
|
trusted library allocation
|
page read and write
|
||
4F80000
|
trusted library allocation
|
page read and write
|
||
4382000
|
trusted library allocation
|
page read and write
|
||
1886000
|
trusted library allocation
|
page read and write
|
||
5140000
|
heap
|
page read and write
|
||
E34000
|
trusted library allocation
|
page read and write
|
||
75F3000
|
heap
|
page read and write
|
||
59DE000
|
stack
|
page read and write
|
||
5DCE000
|
stack
|
page read and write
|
||
6EF2000
|
trusted library allocation
|
page read and write
|
||
280D000
|
trusted library allocation
|
page read and write
|
||
5784000
|
trusted library allocation
|
page read and write
|
||
38F2000
|
trusted library allocation
|
page read and write
|
||
EB0000
|
heap
|
page read and write
|
||
4F70000
|
trusted library allocation
|
page read and write
|
||
6DD8000
|
heap
|
page read and write
|
||
B38000
|
heap
|
page read and write
|
||
3412000
|
trusted library allocation
|
page read and write
|
||
9EBD000
|
stack
|
page read and write
|
||
1582000
|
trusted library allocation
|
page read and write
|
||
4E51000
|
trusted library allocation
|
page read and write
|
||
1587000
|
heap
|
page read and write
|
||
58B6000
|
trusted library allocation
|
page read and write
|
||
182E000
|
stack
|
page read and write
|
||
AE9000
|
heap
|
page read and write
|
||
5910000
|
trusted library allocation
|
page execute and read and write
|
||
5894000
|
trusted library allocation
|
page read and write
|
||
A5D0000
|
trusted library allocation
|
page read and write
|
||
408000
|
remote allocation
|
page execute and read and write
|
||
156D000
|
trusted library allocation
|
page execute and read and write
|
||
5125000
|
heap
|
page read and write
|
||
3340000
|
heap
|
page execute and read and write
|
||
84F000
|
heap
|
page read and write
|
||
17E0000
|
heap
|
page read and write
|
||
5796000
|
trusted library allocation
|
page read and write
|
||
143E000
|
stack
|
page read and write
|
||
7A69000
|
trusted library allocation
|
page read and write
|
||
BF0000
|
heap
|
page read and write
|
||
57C0000
|
trusted library allocation
|
page read and write
|
||
32C0000
|
heap
|
page execute and read and write
|
||
7A50000
|
trusted library allocation
|
page read and write
|
||
333E000
|
stack
|
page read and write
|
||
5900000
|
heap
|
page read and write
|
||
B5A000
|
trusted library allocation
|
page execute and read and write
|
||
13A0000
|
heap
|
page read and write
|
||
3510000
|
trusted library allocation
|
page read and write
|
||
A68000
|
heap
|
page read and write
|
||
A23E000
|
stack
|
page read and write
|
||
322000
|
unkown
|
page readonly
|
||
ABEE000
|
stack
|
page read and write
|
||
2BBB000
|
trusted library allocation
|
page read and write
|
||
E30000
|
heap
|
page read and write
|
||
5D39000
|
trusted library allocation
|
page read and write
|
||
142E000
|
stack
|
page read and write
|
||
310E000
|
stack
|
page read and write
|
||
A9AE000
|
stack
|
page read and write
|
||
400000
|
remote allocation
|
page execute and read and write
|
||
18A0000
|
trusted library allocation
|
page read and write
|
||
6AB8000
|
heap
|
page read and write
|
||
2CBF000
|
unkown
|
page read and write
|
||
5BB0000
|
heap
|
page read and write
|
||
E33000
|
trusted library allocation
|
page execute and read and write
|
||
2F4D000
|
trusted library allocation
|
page read and write
|
||
B33000
|
trusted library allocation
|
page execute and read and write
|
||
6DD0000
|
trusted library allocation
|
page read and write
|
||
6AA0000
|
heap
|
page read and write
|
||
5B8E000
|
stack
|
page read and write
|
||
123A000
|
stack
|
page read and write
|
||
E30000
|
trusted library allocation
|
page read and write
|
||
5799000
|
trusted library allocation
|
page read and write
|
||
57B0000
|
trusted library allocation
|
page read and write
|
||
B56000
|
trusted library allocation
|
page execute and read and write
|
||
5120000
|
heap
|
page read and write
|
||
5230000
|
heap
|
page read and write
|
||
15FE000
|
heap
|
page read and write
|
||
1632000
|
heap
|
page read and write
|
||
871000
|
heap
|
page read and write
|
||
5730000
|
trusted library allocation
|
page read and write
|
||
4E80000
|
trusted library allocation
|
page read and write
|
||
83E000
|
heap
|
page read and write
|
||
5922000
|
trusted library allocation
|
page read and write
|
||
6DD0000
|
heap
|
page read and write
|
||
77A9000
|
heap
|
page read and write
|
||
19BE000
|
stack
|
page read and write
|
||
157A000
|
heap
|
page read and write
|
||
2A10000
|
trusted library allocation
|
page read and write
|
||
5F25000
|
heap
|
page read and write
|
||
4D83000
|
heap
|
page read and write
|
||
4F90000
|
heap
|
page read and write
|
||
810000
|
heap
|
page read and write
|
||
B50000
|
trusted library allocation
|
page read and write
|
||
7A60000
|
trusted library allocation
|
page read and write
|
||
155D000
|
trusted library allocation
|
page execute and read and write
|
||
2BA3000
|
trusted library allocation
|
page read and write
|
||
B7A000
|
stack
|
page read and write
|
||
4E5D000
|
trusted library allocation
|
page read and write
|
||
4E4A000
|
trusted library allocation
|
page read and write
|
||
790E000
|
stack
|
page read and write
|
||
3B9000
|
stack
|
page read and write
|
||
7790000
|
heap
|
page read and write
|
||
E80000
|
trusted library allocation
|
page read and write
|
||
9C7E000
|
stack
|
page read and write
|
||
E5A000
|
trusted library allocation
|
page execute and read and write
|
||
36BB000
|
trusted library allocation
|
page read and write
|
||
A60000
|
heap
|
page read and write
|
||
930000
|
heap
|
page read and write
|
||
13F0000
|
heap
|
page read and write
|
||
57B6000
|
trusted library allocation
|
page read and write
|
||
573A000
|
trusted library allocation
|
page read and write
|
||
A7E000
|
heap
|
page read and write
|
||
5B80000
|
heap
|
page read and write
|
||
5FAE000
|
stack
|
page read and write
|
||
2CD0000
|
heap
|
page read and write
|
||
BE0000
|
heap
|
page read and write
|
||
6EE0000
|
heap
|
page read and write
|
||
5890000
|
trusted library allocation
|
page read and write
|
||
E3D000
|
trusted library allocation
|
page execute and read and write
|
||
A86C000
|
stack
|
page read and write
|
||
5A1E000
|
stack
|
page read and write
|
||
80D000
|
stack
|
page read and write
|
||
6C2E000
|
stack
|
page read and write
|
||
5FCD000
|
stack
|
page read and write
|
||
494C000
|
stack
|
page read and write
|
||
1695000
|
heap
|
page read and write
|
||
1573000
|
heap
|
page read and write
|
||
17B0000
|
trusted library allocation
|
page read and write
|
||
E4D000
|
trusted library allocation
|
page execute and read and write
|
||
5B90000
|
heap
|
page execute and read and write
|
||
1570000
|
trusted library allocation
|
page read and write
|
||
ADE000
|
heap
|
page read and write
|
||
5050000
|
trusted library allocation
|
page read and write
|
||
BA0000
|
heap
|
page read and write
|
||
4E10000
|
trusted library allocation
|
page read and write
|
||
A8A000
|
heap
|
page read and write
|
||
1580000
|
trusted library allocation
|
page read and write
|
||
4CE2000
|
trusted library allocation
|
page read and write
|
||
4E45000
|
trusted library allocation
|
page read and write
|
||
6DD5000
|
trusted library allocation
|
page read and write
|
||
4F5B000
|
stack
|
page read and write
|
||
296B000
|
trusted library allocation
|
page read and write
|
||
4E70000
|
trusted library allocation
|
page read and write
|
||
5E9C000
|
stack
|
page read and write
|
||
B34000
|
trusted library allocation
|
page read and write
|
||
2851000
|
trusted library allocation
|
page read and write
|
||
B6B000
|
trusted library allocation
|
page execute and read and write
|
||
1764000
|
trusted library allocation
|
page read and write
|
||
A5DE000
|
stack
|
page read and write
|
||
9C0000
|
heap
|
page read and write
|
||
BA5000
|
heap
|
page read and write
|
||
4CE0000
|
trusted library allocation
|
page read and write
|
||
7A65000
|
trusted library allocation
|
page read and write
|
||
1337000
|
stack
|
page read and write
|
||
57A0000
|
heap
|
page read and write
|
||
4351000
|
trusted library allocation
|
page read and write
|
||
E37000
|
heap
|
page read and write
|
||
77D4000
|
heap
|
page read and write
|
||
196D000
|
stack
|
page read and write
|
||
282000
|
unkown
|
page readonly
|
||
A4AE000
|
stack
|
page read and write
|
||
4E34000
|
trusted library allocation
|
page read and write
|
||
1587000
|
trusted library allocation
|
page execute and read and write
|
||
6AF1000
|
heap
|
page read and write
|
||
864000
|
heap
|
page read and write
|
||
1550000
|
trusted library allocation
|
page read and write
|
||
280000
|
unkown
|
page readonly
|
||
5F30000
|
trusted library allocation
|
page read and write
|
||
604B000
|
heap
|
page read and write
|
||
5920000
|
trusted library allocation
|
page read and write
|
||
7F7000
|
stack
|
page read and write
|
||
E00000
|
trusted library allocation
|
page read and write
|
||
720000
|
heap
|
page read and write
|
||
500C000
|
stack
|
page read and write
|
||
5960000
|
trusted library allocation
|
page execute and read and write
|
||
27FE000
|
trusted library allocation
|
page read and write
|
||
B3D000
|
heap
|
page read and write
|
||
4D40000
|
trusted library section
|
page readonly
|
||
192E000
|
stack
|
page read and write
|
||
5B60000
|
trusted library section
|
page readonly
|
||
5B70000
|
heap
|
page read and write
|
||
699E000
|
stack
|
page read and write
|
||
4D50000
|
heap
|
page read and write
|
||
5090000
|
heap
|
page execute and read and write
|
||
179B000
|
trusted library allocation
|
page execute and read and write
|
||
4E57000
|
trusted library allocation
|
page read and write
|
||
6A9E000
|
stack
|
page read and write
|
||
54F0000
|
trusted library allocation
|
page read and write
|
||
5774000
|
trusted library allocation
|
page read and write
|
||
5BEB000
|
heap
|
page read and write
|
||
E90000
|
heap
|
page read and write
|
||
42D5000
|
trusted library allocation
|
page read and write
|
||
900000
|
heap
|
page read and write
|
||
DD0000
|
heap
|
page read and write
|
||
5790000
|
heap
|
page read and write
|
||
1470000
|
heap
|
page read and write
|
||
3220000
|
trusted library allocation
|
page read and write
|
||
BF0000
|
heap
|
page read and write
|
||
27DC000
|
stack
|
page read and write
|
||
32D1000
|
trusted library allocation
|
page read and write
|
||
B67000
|
trusted library allocation
|
page execute and read and write
|
||
1890000
|
trusted library allocation
|
page read and write
|
||
13EE000
|
stack
|
page read and write
|
||
26E0000
|
trusted library allocation
|
page read and write
|
||
27DC000
|
stack
|
page read and write
|
||
1572000
|
trusted library allocation
|
page read and write
|
||
123B000
|
stack
|
page read and write
|
||
E43000
|
trusted library allocation
|
page read and write
|
||
28B3000
|
heap
|
page read and write
|
||
1450000
|
heap
|
page read and write
|
||
1689000
|
heap
|
page read and write
|
||
E40000
|
trusted library allocation
|
page read and write
|
||
4435000
|
trusted library allocation
|
page read and write
|
||
BE0000
|
trusted library allocation
|
page read and write
|
||
710000
|
heap
|
page read and write
|
||
5480000
|
heap
|
page read and write
|
||
1576000
|
trusted library allocation
|
page execute and read and write
|
||
1750000
|
trusted library allocation
|
page read and write
|
||
E20000
|
trusted library allocation
|
page read and write
|
||
5056000
|
trusted library allocation
|
page read and write
|
||
857000
|
heap
|
page read and write
|
||
B70000
|
heap
|
page read and write
|
||
9D7D000
|
stack
|
page read and write
|
||
FF5E0000
|
trusted library allocation
|
page execute and read and write
|
||
3230000
|
heap
|
page read and write
|
||
2CC0000
|
heap
|
page read and write
|
||
28A0000
|
trusted library allocation
|
page read and write
|
||
4506000
|
trusted library allocation
|
page read and write
|
||
6010000
|
trusted library allocation
|
page read and write
|
||
6D8E000
|
stack
|
page read and write
|
||
A61E000
|
stack
|
page read and write
|
||
15B0000
|
heap
|
page read and write
|
||
A5C0000
|
trusted library allocation
|
page read and write
|
||
B62000
|
trusted library allocation
|
page read and write
|
||
735E000
|
stack
|
page read and write
|
||
5CCE000
|
stack
|
page read and write
|
||
A4DD000
|
stack
|
page read and write
|
||
A49D000
|
stack
|
page read and write
|
||
1553000
|
trusted library allocation
|
page execute and read and write
|
||
321E000
|
stack
|
page read and write
|
||
4D80000
|
heap
|
page read and write
|
||
186C000
|
stack
|
page read and write
|
||
13A0000
|
heap
|
page read and write
|
||
1790000
|
trusted library allocation
|
page read and write
|
||
DFE000
|
stack
|
page read and write
|
||
2C7E000
|
unkown
|
page read and write
|
||
83A000
|
heap
|
page read and write
|
||
9C3F000
|
stack
|
page read and write
|
||
B20000
|
trusted library allocation
|
page read and write
|
||
43F2000
|
trusted library allocation
|
page read and write
|
||
15D0000
|
heap
|
page read and write
|
||
1550000
|
heap
|
page read and write
|
||
DBF000
|
stack
|
page read and write
|
||
3474000
|
trusted library allocation
|
page read and write
|
||
27EB000
|
trusted library allocation
|
page read and write
|
||
A71E000
|
stack
|
page read and write
|
||
A5AE000
|
stack
|
page read and write
|
||
77AE000
|
heap
|
page read and write
|
||
7BAE000
|
stack
|
page read and write
|
||
A1E000
|
stack
|
page read and write
|
||
4D60000
|
heap
|
page execute and read and write
|
||
E67000
|
trusted library allocation
|
page execute and read and write
|
||
785000
|
heap
|
page read and write
|
||
A39D000
|
stack
|
page read and write
|
||
18A5000
|
trusted library allocation
|
page read and write
|
||
6F7000
|
stack
|
page read and write
|
||
5D70000
|
heap
|
page read and write
|
||
5710000
|
heap
|
page read and write
|
||
3851000
|
trusted library allocation
|
page read and write
|
||
9A3E000
|
stack
|
page read and write
|
||
A5F000
|
stack
|
page read and write
|
||
58AE000
|
trusted library allocation
|
page read and write
|
||
A25E000
|
stack
|
page read and write
|
||
6040000
|
heap
|
page read and write
|
||
77CA000
|
heap
|
page read and write
|
||
4E3B000
|
trusted library allocation
|
page read and write
|
||
4E36000
|
trusted library allocation
|
page read and write
|
||
5B5B000
|
stack
|
page read and write
|
||
4E20000
|
trusted library allocation
|
page read and write
|
||
43D2000
|
trusted library allocation
|
page read and write
|
||
5FC0000
|
trusted library allocation
|
page execute and read and write
|
||
15F0000
|
heap
|
page read and write
|
||
1970000
|
heap
|
page read and write
|
||
15E0000
|
trusted library allocation
|
page execute and read and write
|
||
9BF000
|
unkown
|
page read and write
|
||
5049000
|
stack
|
page read and write
|
||
1624000
|
heap
|
page read and write
|
||
1560000
|
trusted library allocation
|
page read and write
|
||
1455000
|
heap
|
page read and write
|
||
1880000
|
trusted library allocation
|
page read and write
|
||
B3D000
|
trusted library allocation
|
page execute and read and write
|
||
2806000
|
trusted library allocation
|
page read and write
|
||
B80000
|
trusted library allocation
|
page read and write
|
||
A5E0000
|
trusted library allocation
|
page execute and read and write
|
||
4E3E000
|
trusted library allocation
|
page read and write
|
||
6ABD000
|
heap
|
page read and write
|
||
7AAE000
|
stack
|
page read and write
|
||
5080000
|
trusted library allocation
|
page execute and read and write
|
||
9FFE000
|
stack
|
page read and write
|
||
E20000
|
trusted library allocation
|
page read and write
|
||
E28000
|
trusted library allocation
|
page read and write
|
||
A5D2000
|
trusted library allocation
|
page read and write
|
||
5EA0000
|
trusted library allocation
|
page read and write
|
||
76E000
|
stack
|
page read and write
|
||
AFE000
|
stack
|
page read and write
|
||
5C8E000
|
stack
|
page read and write
|
||
9D80000
|
heap
|
page read and write
|
||
161B000
|
heap
|
page read and write
|
||
279E000
|
stack
|
page read and write
|
||
2969000
|
trusted library allocation
|
page read and write
|
||
26F0000
|
heap
|
page read and write
|
||
5EC0000
|
trusted library allocation
|
page execute and read and write
|
||
78CE000
|
stack
|
page read and write
|
||
8CA000
|
stack
|
page read and write
|
||
97E000
|
unkown
|
page read and write
|
||
4CC0000
|
heap
|
page read and write
|
||
9D0000
|
heap
|
page read and write
|
||
A15F000
|
stack
|
page read and write
|
||
9FBE000
|
stack
|
page read and write
|
||
158B000
|
trusted library allocation
|
page execute and read and write
|
||
AAEE000
|
stack
|
page read and write
|
||
1338000
|
stack
|
page read and write
|
||
6AD7000
|
heap
|
page read and write
|
||
4E42000
|
trusted library allocation
|
page read and write
|
||
B60000
|
heap
|
page read and write
|
||
42D1000
|
trusted library allocation
|
page read and write
|
||
2E00000
|
heap
|
page read and write
|
||
1870000
|
trusted library allocation
|
page read and write
|
||
CFE000
|
stack
|
page read and write
|
||
50DE000
|
stack
|
page read and write
|
||
27F8000
|
trusted library allocation
|
page read and write
|
||
54E0000
|
heap
|
page execute and read and write
|
||
16AD000
|
heap
|
page read and write
|
||
27E0000
|
heap
|
page read and write
|
||
13EE000
|
stack
|
page read and write
|
||
5950000
|
trusted library allocation
|
page read and write
|
||
3934000
|
trusted library allocation
|
page read and write
|
||
5745000
|
trusted library allocation
|
page read and write
|
||
52DE000
|
stack
|
page read and write
|
||
4E62000
|
trusted library allocation
|
page read and write
|
||
A13E000
|
stack
|
page read and write
|
||
160F000
|
heap
|
page read and write
|
||
AAAE000
|
stack
|
page read and write
|
||
5130000
|
heap
|
page read and write
|
||
B4D000
|
trusted library allocation
|
page execute and read and write
|
||
E25000
|
trusted library allocation
|
page read and write
|
||
1770000
|
trusted library allocation
|
page read and write
|
||
58DE000
|
stack
|
page read and write
|
||
5F0E000
|
stack
|
page read and write
|
||
4E4E000
|
trusted library allocation
|
page read and write
|
||
5460000
|
heap
|
page read and write
|
||
ABF1000
|
trusted library allocation
|
page read and write
|
||
88D000
|
stack
|
page read and write
|
||
39D1000
|
trusted library allocation
|
page read and write
|
||
18B0000
|
heap
|
page read and write
|
||
BD0000
|
trusted library allocation
|
page execute and read and write
|
||
5D50000
|
heap
|
page read and write
|
||
4D20000
|
trusted library allocation
|
page execute and read and write
|
||
72D0000
|
trusted library section
|
page read and write
|
||
E56000
|
trusted library allocation
|
page execute and read and write
|
||
27E0000
|
trusted library allocation
|
page read and write
|
||
57B4000
|
trusted library allocation
|
page read and write
|
||
1475000
|
heap
|
page read and write
|
||
17D0000
|
trusted library allocation
|
page execute and read and write
|
||
BCE000
|
stack
|
page read and write
|
||
AD6000
|
heap
|
page read and write
|
||
4D10000
|
trusted library allocation
|
page read and write
|
||
B46000
|
heap
|
page read and write
|
||
1554000
|
trusted library allocation
|
page read and write
|
||
5D40000
|
trusted library allocation
|
page read and write
|
||
4F8C000
|
stack
|
page read and write
|
||
4F60000
|
trusted library section
|
page read and write
|
||
1774000
|
trusted library allocation
|
page read and write
|
||
4E74000
|
trusted library allocation
|
page read and write
|
||
2840000
|
heap
|
page execute and read and write
|
||
2708000
|
trusted library allocation
|
page read and write
|
||
600B000
|
stack
|
page read and write
|
||
44BA000
|
trusted library allocation
|
page read and write
|
||
36AC000
|
trusted library allocation
|
page read and write
|
||
E6B000
|
trusted library allocation
|
page execute and read and write
|
||
5B4F000
|
stack
|
page read and write
|
||
2CFB000
|
heap
|
page read and write
|
||
26DF000
|
stack
|
page read and write
|
||
446E000
|
trusted library allocation
|
page read and write
|
||
5161000
|
heap
|
page read and write
|
||
4EA0000
|
trusted library allocation
|
page read and write
|
||
5C9D000
|
stack
|
page read and write
|
||
830000
|
heap
|
page read and write
|
||
EB6000
|
heap
|
page read and write
|
||
3200000
|
trusted library allocation
|
page read and write
|
||
58BD000
|
trusted library allocation
|
page read and write
|
||
E10000
|
trusted library allocation
|
page read and write
|
||
18EE000
|
stack
|
page read and write
|
||
A97000
|
heap
|
page read and write
|
||
28B0000
|
heap
|
page read and write
|
||
5A40000
|
heap
|
page execute and read and write
|
||
2890000
|
trusted library allocation
|
page execute and read and write
|
||
A94000
|
heap
|
page read and write
|
||
157A000
|
trusted library allocation
|
page execute and read and write
|
||
B30000
|
trusted library allocation
|
page read and write
|
||
6BA0000
|
trusted library allocation
|
page read and write
|
||
7CE000
|
stack
|
page read and write
|
||
B36000
|
heap
|
page read and write
|
||
544C000
|
stack
|
page read and write
|
||
17EE000
|
stack
|
page read and write
|
||
17C0000
|
heap
|
page read and write
|
||
314F000
|
stack
|
page read and write
|
||
28C0000
|
heap
|
page execute and read and write
|
||
15A0000
|
trusted library allocation
|
page read and write
|
||
B08000
|
heap
|
page read and write
|
||
15D7000
|
heap
|
page read and write
|
||
178A000
|
trusted library allocation
|
page execute and read and write
|
||
B3D000
|
stack
|
page read and write
|
||
340F000
|
trusted library allocation
|
page read and write
|
||
5741000
|
trusted library allocation
|
page read and write
|
||
1390000
|
heap
|
page read and write
|
||
53CE000
|
stack
|
page read and write
|
||
5788000
|
trusted library allocation
|
page read and write
|
||
5A23000
|
heap
|
page read and write
|
||
6DA0000
|
trusted library allocation
|
page execute and read and write
|
||
5D60000
|
heap
|
page read and write
|
||
5750000
|
heap
|
page read and write
|
||
174F000
|
stack
|
page read and write
|
||
57A5000
|
trusted library allocation
|
page read and write
|
||
77CC000
|
heap
|
page read and write
|
||
1780000
|
trusted library allocation
|
page read and write
|
||
A96C000
|
stack
|
page read and write
|
||
6ACA000
|
heap
|
page read and write
|
||
5130000
|
heap
|
page read and write
|
||
E62000
|
trusted library allocation
|
page read and write
|
||
1558000
|
heap
|
page read and write
|
||
7590000
|
heap
|
page read and write
|
||
A0FE000
|
stack
|
page read and write
|
||
A46C000
|
stack
|
page read and write
|
||
6ED0000
|
heap
|
page read and write
|
||
29CF000
|
stack
|
page read and write
|
||
1540000
|
trusted library allocation
|
page read and write
|
||
5A20000
|
heap
|
page read and write
|
||
745E000
|
stack
|
page read and write
|
||
5F20000
|
heap
|
page read and write
|
||
4FC9000
|
stack
|
page read and write
|
||
4E90000
|
trusted library allocation
|
page read and write
|
||
E50000
|
trusted library allocation
|
page read and write
|
||
6FA000
|
stack
|
page read and write
|
||
509D000
|
stack
|
page read and write
|
||
4D70000
|
heap
|
page read and write
|
||
2830000
|
trusted library allocation
|
page read and write
|
||
B40000
|
trusted library allocation
|
page read and write
|
||
6BEE000
|
stack
|
page read and write
|
||
780000
|
heap
|
page read and write
|
||
1763000
|
trusted library allocation
|
page execute and read and write
|
||
1797000
|
trusted library allocation
|
page execute and read and write
|
||
15FA000
|
heap
|
page read and write
|
||
4E30000
|
trusted library allocation
|
page read and write
|
||
CBE000
|
stack
|
page read and write
|
||
778F000
|
stack
|
page read and write
|
||
156E000
|
heap
|
page read and write
|
||
B10000
|
heap
|
page read and write
|
There are 473 hidden memdumps, click here to show them.