Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
PEbZthAqV9.exe
|
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
|
initial sample
|
||
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\PEbZthAqV9.exe.log
|
ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\tmp53D2.tmp
|
XML 1.0 document, ASCII text
|
dropped
|
||
C:\Users\user\AppData\Roaming\myTuDsvNcebev.exe
|
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\myTuDsvNcebev.exe:Zone.Identifier
|
ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\myTuDsvNcebev.exe.log
|
ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\3D003UC5\json[1].json
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_2nntabay.dmq.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_4oxii0eg.5dk.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_j0zpvfr3.jhz.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_jyg0glu1.50p.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_n3vsa3fc.cq5.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_qxi5tuxz.aqg.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_t3f2zrq2.ajw.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_xs2kztd3.s3t.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\tmp7C97.tmp
|
XML 1.0 document, ASCII text
|
dropped
|
There are 7 hidden files, click here to show them.
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\PEbZthAqV9.exe
|
"C:\Users\user\Desktop\PEbZthAqV9.exe"
|
||
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
|
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\PEbZthAqV9.exe"
|
||
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
|
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\myTuDsvNcebev.exe"
|
||
C:\Windows\SysWOW64\schtasks.exe
|
"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\myTuDsvNcebev" /XML "C:\Users\user\AppData\Local\Temp\tmp53D2.tmp"
|
||
C:\Users\user\Desktop\PEbZthAqV9.exe
|
"C:\Users\user\Desktop\PEbZthAqV9.exe"
|
||
C:\Users\user\AppData\Roaming\myTuDsvNcebev.exe
|
C:\Users\user\AppData\Roaming\myTuDsvNcebev.exe
|
||
C:\Windows\SysWOW64\schtasks.exe
|
"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\myTuDsvNcebev" /XML "C:\Users\user\AppData\Local\Temp\tmp7C97.tmp"
|
||
C:\Users\user\AppData\Roaming\myTuDsvNcebev.exe
|
"C:\Users\user\AppData\Roaming\myTuDsvNcebev.exe"
|
||
C:\Users\user\AppData\Roaming\myTuDsvNcebev.exe
|
"C:\Users\user\AppData\Roaming\myTuDsvNcebev.exe"
|
||
C:\Users\user\AppData\Roaming\myTuDsvNcebev.exe
|
"C:\Users\user\AppData\Roaming\myTuDsvNcebev.exe"
|
||
C:\Users\user\AppData\Roaming\myTuDsvNcebev.exe
|
"C:\Users\user\AppData\Roaming\myTuDsvNcebev.exe"
|
||
C:\Users\user\AppData\Roaming\myTuDsvNcebev.exe
|
"C:\Users\user\AppData\Roaming\myTuDsvNcebev.exe"
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\wbem\WmiPrvSE.exe
|
C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
There are 7 hidden processes, click here to show them.
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
http://www.apache.org/licenses/LICENSE-2.0
|
unknown
|
||
http://www.fontbureau.com
|
unknown
|
||
http://www.fontbureau.com/designersG
|
unknown
|
||
http://www.fontbureau.com/designers/?
|
unknown
|
||
http://www.founder.com.cn/cn/bThe
|
unknown
|
||
http://www.fontbureau.com/designers?
|
unknown
|
||
http://tempuri.org/DataSet1.xsd
|
unknown
|
||
http://www.tiro.com
|
unknown
|
||
http://www.fontbureau.com/designers
|
unknown
|
||
http://geoplugin.net/json.gpsystem32
|
unknown
|
||
http://www.goodfont.co.kr
|
unknown
|
||
https://www.chiark.greenend.org.uk/~sgtatham/putty/0
|
unknown
|
||
http://www.carterandcone.coml
|
unknown
|
||
http://www.sajatypeworks.com
|
unknown
|
||
http://geoplugin.net/json.gp
|
178.237.33.50
|
||
http://www.typography.netD
|
unknown
|
||
http://www.fontbureau.com/designers/cabarga.htmlN
|
unknown
|
||
http://www.founder.com.cn/cn/cThe
|
unknown
|
||
http://www.galapagosdesign.com/staff/dennis.htm
|
unknown
|
||
http://www.founder.com.cn/cn
|
unknown
|
||
http://www.fontbureau.com/designers/frere-user.html
|
unknown
|
||
http://geoplugin.net/json.gpi5H
|
unknown
|
||
http://geoplugin.net/json.gp/C
|
unknown
|
||
http://www.ascendercorp.com/typedesigners.htmls
|
unknown
|
||
http://www.jiyu-kobo.co.jp/
|
unknown
|
||
http://www.galapagosdesign.com/DPlease
|
unknown
|
||
http://www.fontbureau.com/designers8
|
unknown
|
||
http://www.fonts.com
|
unknown
|
||
http://www.sandoll.co.kr
|
unknown
|
||
http://www.urwpp.deDPlease
|
unknown
|
||
http://www.zhongyicts.com.cn
|
unknown
|
||
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
|
unknown
|
||
http://www.sakkal.com
|
unknown
|
There are 23 hidden URLs, click here to show them.
Domains
Name
|
IP
|
Malicious
|
|
---|---|---|---|
geoplugin.net
|
178.237.33.50
|
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
41.216.183.238
|
unknown
|
South Africa
|
||
178.237.33.50
|
geoplugin.net
|
Netherlands
|
Registry
Path
|
Value
|
Malicious
|
|
---|---|---|---|
HKEY_CURRENT_USER\SOFTWARE\Rmc-Y7J88P
|
exepath
|
||
HKEY_CURRENT_USER\SOFTWARE\Rmc-Y7J88P
|
licence
|
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
4883000
|
trusted library allocation
|
page read and write
|
||
124B000
|
heap
|
page read and write
|
||
7410000
|
trusted library section
|
page read and write
|
||
400000
|
remote allocation
|
page execute and read and write
|
||
3D51000
|
trusted library allocation
|
page read and write
|
||
1257000
|
heap
|
page read and write
|
||
547D000
|
stack
|
page read and write
|
||
75DE000
|
stack
|
page read and write
|
||
EFE000
|
stack
|
page read and write
|
||
2D20000
|
heap
|
page read and write
|
||
610000
|
heap
|
page read and write
|
||
9DEE000
|
stack
|
page read and write
|
||
5591000
|
heap
|
page read and write
|
||
761E000
|
stack
|
page read and write
|
||
55B7000
|
heap
|
page read and write
|
||
2C90000
|
heap
|
page read and write
|
||
2D9F000
|
stack
|
page read and write
|
||
BD2000
|
trusted library allocation
|
page read and write
|
||
C54000
|
heap
|
page read and write
|
||
7530000
|
trusted library allocation
|
page read and write
|
||
F90000
|
trusted library allocation
|
page read and write
|
||
A5EE000
|
stack
|
page read and write
|
||
50A6000
|
trusted library allocation
|
page read and write
|
||
144F000
|
stack
|
page read and write
|
||
51F3000
|
heap
|
page read and write
|
||
2B50000
|
heap
|
page read and write
|
||
57AE000
|
stack
|
page read and write
|
||
7C0000
|
heap
|
page read and write
|
||
55B0000
|
trusted library allocation
|
page read and write
|
||
C10000
|
trusted library allocation
|
page execute and read and write
|
||
6DA0000
|
trusted library allocation
|
page read and write
|
||
2AE0000
|
trusted library allocation
|
page read and write
|
||
508B000
|
trusted library allocation
|
page read and write
|
||
10E5000
|
heap
|
page read and write
|
||
A0EF000
|
stack
|
page read and write
|
||
DF0000
|
heap
|
page read and write
|
||
51BB000
|
stack
|
page read and write
|
||
B90000
|
trusted library allocation
|
page read and write
|
||
F3E000
|
stack
|
page read and write
|
||
4C3B000
|
stack
|
page read and write
|
||
FA7000
|
trusted library allocation
|
page execute and read and write
|
||
50C0000
|
trusted library allocation
|
page read and write
|
||
5D70000
|
heap
|
page read and write
|
||
65E000
|
unkown
|
page read and write
|
||
FAB000
|
trusted library allocation
|
page execute and read and write
|
||
2B60000
|
heap
|
page execute and read and write
|
||
660000
|
heap
|
page read and write
|
||
1220000
|
trusted library allocation
|
page read and write
|
||
5670000
|
heap
|
page read and write
|
||
50B2000
|
trusted library allocation
|
page read and write
|
||
51F0000
|
heap
|
page read and write
|
||
840000
|
heap
|
page read and write
|
||
2D51000
|
trusted library allocation
|
page read and write
|
||
518A000
|
trusted library allocation
|
page read and write
|
||
7F610000
|
trusted library allocation
|
page execute and read and write
|
||
2F70000
|
heap
|
page read and write
|
||
4B68000
|
trusted library allocation
|
page read and write
|
||
50F0000
|
heap
|
page read and write
|
||
8EE000
|
stack
|
page read and write
|
||
82E000
|
unkown
|
page read and write
|
||
12B0000
|
heap
|
page read and write
|
||
FB0000
|
trusted library allocation
|
page read and write
|
||
3B7E000
|
trusted library allocation
|
page read and write
|
||
FA2000
|
trusted library allocation
|
page read and write
|
||
5D0000
|
unkown
|
page readonly
|
||
36D000
|
stack
|
page read and write
|
||
11CE000
|
stack
|
page read and write
|
||
A4B0000
|
heap
|
page read and write
|
||
3B61000
|
trusted library allocation
|
page read and write
|
||
128F000
|
heap
|
page read and write
|
||
51D4000
|
trusted library section
|
page readonly
|
||
5565000
|
heap
|
page read and write
|
||
A6EF000
|
stack
|
page read and write
|
||
4D3C000
|
stack
|
page read and write
|
||
BAD000
|
trusted library allocation
|
page execute and read and write
|
||
BA3000
|
trusted library allocation
|
page execute and read and write
|
||
3DCC000
|
trusted library allocation
|
page read and write
|
||
7EE000
|
unkown
|
page read and write
|
||
BA0000
|
trusted library allocation
|
page read and write
|
||
1250000
|
heap
|
page read and write
|
||
8F0000
|
heap
|
page read and write
|
||
3EAC000
|
trusted library allocation
|
page read and write
|
||
680000
|
heap
|
page read and write
|
||
1220000
|
trusted library allocation
|
page read and write
|
||
12C7000
|
heap
|
page read and write
|
||
A87E000
|
stack
|
page read and write
|
||
51E0000
|
heap
|
page read and write
|
||
EFC000
|
stack
|
page read and write
|
||
11D0000
|
heap
|
page read and write
|
||
705E000
|
stack
|
page read and write
|
||
5230000
|
heap
|
page read and write
|
||
F7D000
|
trusted library allocation
|
page execute and read and write
|
||
1206000
|
trusted library allocation
|
page read and write
|
||
475000
|
remote allocation
|
page execute and read and write
|
||
5D2000
|
unkown
|
page readonly
|
||
55C5000
|
heap
|
page read and write
|
||
46E000
|
remote allocation
|
page execute and read and write
|
||
103F000
|
heap
|
page read and write
|
||
11EE000
|
trusted library allocation
|
page read and write
|
||
10A0000
|
heap
|
page read and write
|
||
A4AD000
|
stack
|
page read and write
|
||
F60000
|
trusted library allocation
|
page read and write
|
||
129E000
|
stack
|
page read and write
|
||
5122000
|
trusted library allocation
|
page read and write
|
||
AF7000
|
stack
|
page read and write
|
||
1010000
|
heap
|
page read and write
|
||
C63000
|
heap
|
page read and write
|
||
11D4000
|
trusted library allocation
|
page read and write
|
||
103C000
|
stack
|
page read and write
|
||
5560000
|
heap
|
page read and write
|
||
50AD000
|
trusted library allocation
|
page read and write
|
||
56CE000
|
stack
|
page read and write
|
||
12AE000
|
heap
|
page read and write
|
||
471000
|
remote allocation
|
page execute and read and write
|
||
2B30000
|
trusted library allocation
|
page read and write
|
||
EEE000
|
stack
|
page read and write
|
||
F73000
|
trusted library allocation
|
page execute and read and write
|
||
12B7000
|
heap
|
page read and write
|
||
5420000
|
trusted library allocation
|
page execute and read and write
|
||
3C59000
|
trusted library allocation
|
page read and write
|
||
5599000
|
heap
|
page read and write
|
||
BE0000
|
heap
|
page read and write
|
||
11DB000
|
trusted library allocation
|
page read and write
|
||
C57000
|
heap
|
page read and write
|
||
9C6E000
|
stack
|
page read and write
|
||
5780000
|
trusted library allocation
|
page read and write
|
||
7452000
|
heap
|
page read and write
|
||
1247000
|
heap
|
page read and write
|
||
5084000
|
trusted library allocation
|
page read and write
|
||
CE0000
|
heap
|
page read and write
|
||
A3BF000
|
stack
|
page read and write
|
||
9DAE000
|
stack
|
page read and write
|
||
2E9F000
|
stack
|
page read and write
|
||
5233000
|
heap
|
page read and write
|
||
3DD9000
|
trusted library allocation
|
page read and write
|
||
12B9000
|
heap
|
page read and write
|
||
9A0000
|
heap
|
page read and write
|
||
2A90000
|
trusted library allocation
|
page read and write
|
||
11F6000
|
trusted library allocation
|
page read and write
|
||
BE2000
|
trusted library allocation
|
page read and write
|
||
1250000
|
heap
|
page execute and read and write
|
||
7930000
|
trusted library section
|
page read and write
|
||
A22F000
|
stack
|
page read and write
|
||
477D000
|
trusted library allocation
|
page read and write
|
||
A83E000
|
stack
|
page read and write
|
||
121E000
|
stack
|
page read and write
|
||
11CE000
|
stack
|
page read and write
|
||
8A0000
|
heap
|
page read and write
|
||
56D0000
|
trusted library allocation
|
page read and write
|
||
1210000
|
trusted library allocation
|
page read and write
|
||
F70000
|
heap
|
page read and write
|
||
A26E000
|
stack
|
page read and write
|
||
55C0000
|
heap
|
page read and write
|
||
2B40000
|
trusted library section
|
page readonly
|
||
B3D000
|
stack
|
page read and write
|
||
7AEE000
|
stack
|
page read and write
|
||
9EEE000
|
stack
|
page read and write
|
||
5120000
|
trusted library allocation
|
page read and write
|
||
729E000
|
stack
|
page read and write
|
||
5080000
|
trusted library allocation
|
page read and write
|
||
1200000
|
trusted library allocation
|
page read and write
|
||
7F150000
|
trusted library allocation
|
page execute and read and write
|
||
7430000
|
heap
|
page read and write
|
||
7580000
|
trusted library allocation
|
page read and write
|
||
C28000
|
heap
|
page read and write
|
||
5580000
|
heap
|
page read and write
|
||
92A000
|
stack
|
page read and write
|
||
51F0000
|
heap
|
page read and write
|
||
68B000
|
heap
|
page read and write
|
||
1240000
|
heap
|
page read and write
|
||
11F0000
|
trusted library allocation
|
page read and write
|
||
BD0000
|
trusted library allocation
|
page read and write
|
||
2D30000
|
trusted library allocation
|
page execute and read and write
|
||
9F2D000
|
stack
|
page read and write
|
||
2B00000
|
trusted library allocation
|
page read and write
|
||
7469000
|
heap
|
page read and write
|
||
C00000
|
trusted library allocation
|
page read and write
|
||
7450000
|
heap
|
page read and write
|
||
BD6000
|
trusted library allocation
|
page execute and read and write
|
||
830000
|
heap
|
page read and write
|
||
BB0000
|
heap
|
page read and write
|
||
11D0000
|
trusted library allocation
|
page read and write
|
||
29F8000
|
trusted library allocation
|
page read and write
|
||
BE7000
|
trusted library allocation
|
page execute and read and write
|
||
1237000
|
heap
|
page read and write
|
||
F6B000
|
stack
|
page read and write
|
||
6DC2000
|
trusted library allocation
|
page read and write
|
||
BDA000
|
trusted library allocation
|
page execute and read and write
|
||
F74000
|
trusted library allocation
|
page read and write
|
||
FD8000
|
heap
|
page read and write
|
||
11E0000
|
trusted library allocation
|
page execute and read and write
|
||
A8E0000
|
trusted library allocation
|
page execute and read and write
|
||
6E60000
|
heap
|
page read and write
|
||
1230000
|
heap
|
page read and write
|
||
BA4000
|
trusted library allocation
|
page read and write
|
||
AD5E000
|
stack
|
page read and write
|
||
5140000
|
trusted library allocation
|
page read and write
|
||
BB5000
|
heap
|
page read and write
|
||
B7E000
|
stack
|
page read and write
|
||
748A000
|
heap
|
page read and write
|
||
C61000
|
heap
|
page read and write
|
||
7598000
|
trusted library allocation
|
page read and write
|
||
574E000
|
stack
|
page read and write
|
||
F8D000
|
trusted library allocation
|
page execute and read and write
|
||
2B61000
|
trusted library allocation
|
page read and write
|
||
A02D000
|
stack
|
page read and write
|
||
51CC000
|
stack
|
page read and write
|
||
14FE000
|
stack
|
page read and write
|
||
57EE000
|
stack
|
page read and write
|
||
A2BE000
|
stack
|
page read and write
|
||
A030000
|
heap
|
page read and write
|
||
75A000
|
stack
|
page read and write
|
||
C47000
|
heap
|
page read and write
|
||
379F000
|
stack
|
page read and write
|
||
BCD000
|
trusted library allocation
|
page execute and read and write
|
||
2D98000
|
trusted library allocation
|
page read and write
|
||
F92000
|
trusted library allocation
|
page read and write
|
||
CF7000
|
stack
|
page read and write
|
||
A12E000
|
stack
|
page read and write
|
||
BC0000
|
trusted library allocation
|
page read and write
|
||
9EE000
|
stack
|
page read and write
|
||
C2E000
|
heap
|
page read and write
|
||
1220000
|
heap
|
page read and write
|
||
5220000
|
trusted library allocation
|
page read and write
|
||
1012000
|
heap
|
page read and write
|
||
51D0000
|
trusted library section
|
page readonly
|
||
6D0000
|
heap
|
page read and write
|
||
AC5E000
|
stack
|
page read and write
|
||
1180000
|
heap
|
page read and write
|
||
2AE2000
|
trusted library allocation
|
page read and write
|
||
F2E000
|
stack
|
page read and write
|
||
471000
|
remote allocation
|
page execute and read and write
|
||
A79E000
|
stack
|
page read and write
|
||
69C000
|
heap
|
page read and write
|
||
5110000
|
heap
|
page read and write
|
||
1235000
|
trusted library allocation
|
page read and write
|
||
113C000
|
stack
|
page read and write
|
||
A69E000
|
stack
|
page read and write
|
||
8CF000
|
stack
|
page read and write
|
||
5570000
|
heap
|
page read and write
|
||
3AA000
|
stack
|
page read and write
|
||
990000
|
heap
|
page read and write
|
||
670000
|
heap
|
page read and write
|
||
A8DF000
|
stack
|
page read and write
|
||
63D000
|
stack
|
page read and write
|
||
1100000
|
heap
|
page read and write
|
||
A17E000
|
stack
|
page read and write
|
||
A73D000
|
stack
|
page read and write
|
||
12C2000
|
heap
|
page read and write
|
||
512B000
|
trusted library allocation
|
page read and write
|
||
F9A000
|
trusted library allocation
|
page execute and read and write
|
||
10E0000
|
heap
|
page read and write
|
||
11D0000
|
trusted library allocation
|
page read and write
|
||
5797000
|
trusted library allocation
|
page read and write
|
||
743C000
|
heap
|
page read and write
|
||
5410000
|
heap
|
page read and write
|
||
8F7000
|
heap
|
page read and write
|
||
AB1C000
|
stack
|
page read and write
|
||
AD60000
|
trusted library allocation
|
page execute and read and write
|
||
1240000
|
trusted library allocation
|
page read and write
|
||
764F000
|
stack
|
page read and write
|
||
7540000
|
trusted library allocation
|
page execute and read and write
|
||
A97E000
|
stack
|
page read and write
|
||
1202000
|
trusted library allocation
|
page read and write
|
||
FDE000
|
heap
|
page read and write
|
||
88E000
|
stack
|
page read and write
|
||
92F000
|
stack
|
page read and write
|
||
5180000
|
trusted library allocation
|
page read and write
|
||
2B5E000
|
stack
|
page read and write
|
||
100E000
|
stack
|
page read and write
|
||
369E000
|
stack
|
page read and write
|
||
DD0000
|
heap
|
page read and write
|
||
52C0000
|
trusted library allocation
|
page execute and read and write
|
||
2C7C000
|
stack
|
page read and write
|
||
FD0000
|
heap
|
page read and write
|
||
5130000
|
trusted library allocation
|
page execute and read and write
|
||
5790000
|
trusted library allocation
|
page read and write
|
||
5700000
|
trusted library allocation
|
page execute and read and write
|
||
A3AE000
|
stack
|
page read and write
|
||
F90000
|
trusted library allocation
|
page read and write
|
||
56F0000
|
trusted library allocation
|
page read and write
|
||
A27E000
|
stack
|
page read and write
|
||
11CE000
|
stack
|
page read and write
|
||
DF5000
|
heap
|
page read and write
|
||
9CAE000
|
stack
|
page read and write
|
||
F96000
|
trusted library allocation
|
page execute and read and write
|
||
56E0000
|
trusted library allocation
|
page execute and read and write
|
||
50A1000
|
trusted library allocation
|
page read and write
|
||
C67000
|
heap
|
page read and write
|
||
15FE000
|
stack
|
page read and write
|
||
3C79000
|
trusted library allocation
|
page read and write
|
||
1086000
|
heap
|
page read and write
|
||
52D0000
|
trusted library allocation
|
page read and write
|
||
1204000
|
trusted library allocation
|
page read and write
|
||
4693000
|
trusted library allocation
|
page read and write
|
||
67A000
|
stack
|
page read and write
|
||
A55C000
|
stack
|
page read and write
|
||
1230000
|
trusted library allocation
|
page read and write
|
||
509E000
|
trusted library allocation
|
page read and write
|
||
FC0000
|
heap
|
page read and write
|
||
7D0000
|
heap
|
page read and write
|
||
C20000
|
heap
|
page read and write
|
||
10CF000
|
stack
|
page read and write
|
||
715E000
|
stack
|
page read and write
|
||
3E93000
|
trusted library allocation
|
page read and write
|
||
A70000
|
heap
|
page read and write
|
||
109D000
|
stack
|
page read and write
|
||
FB0000
|
heap
|
page read and write
|
||
2B70000
|
heap
|
page read and write
|
||
2BA8000
|
trusted library allocation
|
page read and write
|
||
11F1000
|
trusted library allocation
|
page read and write
|
||
3B93000
|
trusted library allocation
|
page read and write
|
||
BF0000
|
heap
|
page read and write
|
||
5D60000
|
heap
|
page read and write
|
||
740E000
|
stack
|
page read and write
|
||
11FD000
|
trusted library allocation
|
page read and write
|
||
4708000
|
trusted library allocation
|
page read and write
|
||
A65C000
|
stack
|
page read and write
|
||
B7C000
|
stack
|
page read and write
|
||
FA0000
|
trusted library allocation
|
page read and write
|
||
1005000
|
heap
|
page read and write
|
||
F80000
|
trusted library allocation
|
page read and write
|
||
7499000
|
heap
|
page read and write
|
||
AC1C000
|
stack
|
page read and write
|
||
88F000
|
unkown
|
page read and write
|
||
F70000
|
trusted library allocation
|
page read and write
|
||
5170000
|
heap
|
page execute and read and write
|
||
2AF0000
|
trusted library allocation
|
page execute and read and write
|
||
2AD0000
|
heap
|
page read and write
|
||
A7DE000
|
stack
|
page read and write
|
||
BEB000
|
trusted library allocation
|
page execute and read and write
|
||
1215000
|
trusted library allocation
|
page read and write
|
||
9B6E000
|
stack
|
page read and write
|
||
A36F000
|
stack
|
page read and write
|
||
122E000
|
stack
|
page read and write
|
||
3E69000
|
trusted library allocation
|
page read and write
|
||
7590000
|
trusted library allocation
|
page read and write
|
||
1210000
|
heap
|
page read and write
|
||
FF7000
|
heap
|
page read and write
|
||
10F0000
|
heap
|
page read and write
|
||
3CBE000
|
trusted library allocation
|
page read and write
|
||
2D40000
|
heap
|
page execute and read and write
|
There are 332 hidden memdumps, click here to show them.