Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
Justificante de pago.exe
|
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
|
initial sample
|
||
C:\ProgramData\remcos\logs.dat
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\Justificante de pago.exe.log
|
ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\tmpEABB.tmp
|
XML 1.0 document, ASCII text
|
dropped
|
||
C:\Users\user\AppData\Roaming\TYLngHLuy.exe
|
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\TYLngHLuy.exe:Zone.Identifier
|
ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\TYLngHLuy.exe.log
|
ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
|
data
|
modified
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_001zlfkd.rgi.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_02xwf3ce.ved.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_15l3famr.dce.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_dmhs2hgq.lzt.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_ezzjak4j.ypw.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_geop2jay.okb.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_puf0bld0.v30.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_xovyzgp2.fzb.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\tmp529.tmp
|
XML 1.0 document, ASCII text
|
dropped
|
There are 7 hidden files, click here to show them.
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\Justificante de pago.exe
|
"C:\Users\user\Desktop\Justificante de pago.exe"
|
||
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
|
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\Justificante
de pago.exe"
|
||
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
|
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\TYLngHLuy.exe"
|
||
C:\Windows\SysWOW64\schtasks.exe
|
"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\TYLngHLuy" /XML "C:\Users\user\AppData\Local\Temp\tmpEABB.tmp"
|
||
C:\Users\user\Desktop\Justificante de pago.exe
|
"C:\Users\user\Desktop\Justificante de pago.exe"
|
||
C:\Users\user\AppData\Roaming\TYLngHLuy.exe
|
C:\Users\user\AppData\Roaming\TYLngHLuy.exe
|
||
C:\Windows\SysWOW64\schtasks.exe
|
"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\TYLngHLuy" /XML "C:\Users\user\AppData\Local\Temp\tmp529.tmp"
|
||
C:\Users\user\AppData\Roaming\TYLngHLuy.exe
|
"C:\Users\user\AppData\Roaming\TYLngHLuy.exe"
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\wbem\WmiPrvSE.exe
|
C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
There are 3 hidden processes, click here to show them.
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
1
|
|||
http://geoplugin.net/json.gp
|
unknown
|
||
http://localhost/arkanoid_server/requests.php
|
unknown
|
||
http://geoplugin.net/json.gp/C
|
unknown
|
||
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
|
unknown
|
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
127.0.0.1
|
unknown
|
unknown
|
Registry
Path
|
Value
|
Malicious
|
|
---|---|---|---|
HKEY_CURRENT_USER\SOFTWARE\Rmc-14OQCD
|
exepath
|
||
HKEY_CURRENT_USER\SOFTWARE\Rmc-14OQCD
|
licence
|
||
HKEY_CURRENT_USER\SOFTWARE\Rmc-14OQCD
|
time
|
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
400000
|
remote allocation
|
page execute and read and write
|
||
D57000
|
heap
|
page read and write
|
||
13EB000
|
heap
|
page read and write
|
||
3B52000
|
trusted library allocation
|
page read and write
|
||
2E6F000
|
stack
|
page read and write
|
||
4F93000
|
trusted library allocation
|
page read and write
|
||
1650000
|
heap
|
page read and write
|
||
1410000
|
trusted library allocation
|
page read and write
|
||
7F070000
|
trusted library allocation
|
page execute and read and write
|
||
8160000
|
heap
|
page read and write
|
||
DA80000
|
trusted library allocation
|
page execute and read and write
|
||
C79000
|
heap
|
page read and write
|
||
14A5000
|
heap
|
page read and write
|
||
29D0000
|
trusted library allocation
|
page read and write
|
||
79F0000
|
trusted library allocation
|
page read and write
|
||
74C6000
|
trusted library allocation
|
page read and write
|
||
79BE000
|
stack
|
page read and write
|
||
64EE000
|
stack
|
page read and write
|
||
662E000
|
stack
|
page read and write
|
||
6F1E000
|
stack
|
page read and write
|
||
D80000
|
unkown
|
page readonly
|
||
2A3F000
|
unkown
|
page read and write
|
||
B5B0000
|
trusted library allocation
|
page read and write
|
||
2F40000
|
heap
|
page read and write
|
||
7BC0000
|
trusted library allocation
|
page read and write
|
||
CBE000
|
stack
|
page read and write
|
||
8292000
|
heap
|
page read and write
|
||
8140000
|
trusted library allocation
|
page read and write
|
||
29E0000
|
heap
|
page read and write
|
||
ECC000
|
stack
|
page read and write
|
||
7FC000
|
stack
|
page read and write
|
||
7FBE000
|
stack
|
page read and write
|
||
F0A000
|
stack
|
page read and write
|
||
DA7E000
|
stack
|
page read and write
|
||
7A00000
|
heap
|
page read and write
|
||
1470000
|
trusted library allocation
|
page read and write
|
||
4A75000
|
trusted library allocation
|
page read and write
|
||
4271000
|
trusted library allocation
|
page read and write
|
||
1950000
|
trusted library allocation
|
page read and write
|
||
15EE000
|
stack
|
page read and write
|
||
68BE000
|
stack
|
page read and write
|
||
E3BE000
|
stack
|
page read and write
|
||
8050000
|
trusted library section
|
page readonly
|
||
4331000
|
trusted library allocation
|
page read and write
|
||
74AB000
|
trusted library allocation
|
page read and write
|
||
7860000
|
trusted library allocation
|
page execute and read and write
|
||
2E2E000
|
stack
|
page read and write
|
||
9DCE000
|
stack
|
page read and write
|
||
701E000
|
stack
|
page read and write
|
||
1442000
|
trusted library allocation
|
page read and write
|
||
899000
|
stack
|
page read and write
|
||
4AF0000
|
trusted library allocation
|
page read and write
|
||
2F85000
|
trusted library allocation
|
page read and write
|
||
8922000
|
heap
|
page read and write
|
||
1446000
|
trusted library allocation
|
page execute and read and write
|
||
79E0000
|
trusted library allocation
|
page read and write
|
||
A06E000
|
stack
|
page read and write
|
||
6C9C000
|
stack
|
page read and write
|
||
E17E000
|
stack
|
page read and write
|
||
15CF000
|
stack
|
page read and write
|
||
8280000
|
heap
|
page read and write
|
||
1630000
|
trusted library allocation
|
page read and write
|
||
9F70000
|
trusted library section
|
page read and write
|
||
1423000
|
trusted library allocation
|
page execute and read and write
|
||
1969000
|
heap
|
page read and write
|
||
C00000
|
heap
|
page read and write
|
||
782B000
|
stack
|
page read and write
|
||
69BE000
|
stack
|
page read and write
|
||
818F000
|
heap
|
page read and write
|
||
3200000
|
trusted library allocation
|
page read and write
|
||
1424000
|
trusted library allocation
|
page read and write
|
||
7E30000
|
trusted library allocation
|
page execute and read and write
|
||
AE10000
|
trusted library allocation
|
page read and write
|
||
102B000
|
trusted library allocation
|
page execute and read and write
|
||
101A000
|
trusted library allocation
|
page execute and read and write
|
||
29C0000
|
trusted library allocation
|
page read and write
|
||
3704000
|
trusted library allocation
|
page read and write
|
||
5110000
|
heap
|
page read and write
|
||
813A000
|
trusted library allocation
|
page read and write
|
||
8030000
|
trusted library allocation
|
page read and write
|
||
47B6000
|
trusted library allocation
|
page read and write
|
||
2940000
|
trusted library allocation
|
page execute and read and write
|
||
1000000
|
trusted library allocation
|
page read and write
|
||
1440000
|
trusted library allocation
|
page read and write
|
||
13D7000
|
heap
|
page read and write
|
||
29B0000
|
trusted library allocation
|
page read and write
|
||
C10000
|
heap
|
page read and write
|
||
57CE000
|
trusted library allocation
|
page read and write
|
||
95D0000
|
trusted library allocation
|
page read and write
|
||
FE0000
|
trusted library allocation
|
page read and write
|
||
57AE000
|
stack
|
page read and write
|
||
57D6000
|
trusted library allocation
|
page read and write
|
||
4B3E000
|
stack
|
page read and write
|
||
4311000
|
trusted library allocation
|
page read and write
|
||
FFD000
|
trusted library allocation
|
page execute and read and write
|
||
29F9000
|
stack
|
page read and write
|
||
1960000
|
heap
|
page read and write
|
||
7875000
|
heap
|
page read and write
|
||
FBE000
|
stack
|
page read and write
|
||
2F2D000
|
stack
|
page read and write
|
||
890E000
|
stack
|
page read and write
|
||
9400000
|
heap
|
page read and write
|
||
473000
|
remote allocation
|
page execute and read and write
|
||
476000
|
remote allocation
|
page execute and read and write
|
||
57B0000
|
trusted library allocation
|
page read and write
|
||
8145000
|
heap
|
page read and write
|
||
100D000
|
trusted library allocation
|
page execute and read and write
|
||
8195000
|
heap
|
page read and write
|
||
8130000
|
trusted library allocation
|
page read and write
|
||
8060000
|
trusted library allocation
|
page execute and read and write
|
||
1450000
|
trusted library allocation
|
page read and write
|
||
43FA000
|
trusted library allocation
|
page read and write
|
||
28C0000
|
heap
|
page read and write
|
||
8020000
|
trusted library allocation
|
page read and write
|
||
3260000
|
heap
|
page read and write
|
||
CDE000
|
heap
|
page read and write
|
||
74D0000
|
trusted library allocation
|
page read and write
|
||
31C0000
|
heap
|
page read and write
|
||
8910000
|
heap
|
page read and write
|
||
8733000
|
heap
|
page read and write
|
||
9A90000
|
heap
|
page read and write
|
||
9CCE000
|
stack
|
page read and write
|
||
31AD000
|
stack
|
page read and write
|
||
2C60000
|
heap
|
page read and write
|
||
6770000
|
heap
|
page read and write
|
||
2960000
|
heap
|
page execute and read and write
|
||
7F7C0000
|
trusted library allocation
|
page execute and read and write
|
||
DE7D000
|
stack
|
page read and write
|
||
162C000
|
stack
|
page read and write
|
||
3271000
|
trusted library allocation
|
page read and write
|
||
FCC000
|
stack
|
page read and write
|
||
2EEC000
|
stack
|
page read and write
|
||
771A000
|
trusted library allocation
|
page read and write
|
||
7C4B000
|
stack
|
page read and write
|
||
194F000
|
stack
|
page read and write
|
||
FC0000
|
heap
|
page read and write
|
||
3205000
|
trusted library allocation
|
page read and write
|
||
42F9000
|
trusted library allocation
|
page read and write
|
||
63EF000
|
stack
|
page read and write
|
||
D12000
|
heap
|
page read and write
|
||
95CB000
|
trusted library allocation
|
page read and write
|
||
1027000
|
trusted library allocation
|
page execute and read and write
|
||
4AB1000
|
trusted library allocation
|
page read and write
|
||
FCE000
|
stack
|
page read and write
|
||
8000000
|
trusted library section
|
page read and write
|
||
D51000
|
heap
|
page read and write
|
||
1010000
|
trusted library allocation
|
page read and write
|
||
9C8E000
|
stack
|
page read and write
|
||
7BF0000
|
heap
|
page read and write
|
||
13D0000
|
heap
|
page read and write
|
||
144A000
|
trusted library allocation
|
page execute and read and write
|
||
142D000
|
trusted library allocation
|
page execute and read and write
|
||
290E000
|
unkown
|
page read and write
|
||
1696000
|
heap
|
page read and write
|
||
7FFE000
|
stack
|
page read and write
|
||
57B4000
|
trusted library allocation
|
page read and write
|
||
8075000
|
heap
|
page read and write
|
||
7510000
|
trusted library allocation
|
page read and write
|
||
2D80000
|
heap
|
page read and write
|
||
A192000
|
trusted library allocation
|
page read and write
|
||
894D000
|
heap
|
page read and write
|
||
7720000
|
trusted library allocation
|
page read and write
|
||
8155000
|
trusted library allocation
|
page read and write
|
||
29BD000
|
stack
|
page read and write
|
||
1677000
|
heap
|
page read and write
|
||
5113000
|
heap
|
page read and write
|
||
29C4000
|
trusted library allocation
|
page read and write
|
||
165E000
|
heap
|
page read and write
|
||
997000
|
stack
|
page read and write
|
||
12F7000
|
stack
|
page read and write
|
||
7550000
|
heap
|
page read and write
|
||
74E5000
|
trusted library allocation
|
page read and write
|
||
7E10000
|
heap
|
page read and write
|
||
324F000
|
stack
|
page read and write
|
||
57D1000
|
trusted library allocation
|
page read and write
|
||
CD0000
|
heap
|
page read and write
|
||
1040000
|
trusted library allocation
|
page read and write
|
||
C40000
|
heap
|
page read and write
|
||
29AB000
|
stack
|
page read and write
|
||
7BB0000
|
trusted library allocation
|
page execute and read and write
|
||
13BD000
|
stack
|
page read and write
|
||
FF0000
|
trusted library allocation
|
page read and write
|
||
1430000
|
trusted library allocation
|
page read and write
|
||
7BCA000
|
trusted library allocation
|
page read and write
|
||
8150000
|
trusted library allocation
|
page read and write
|
||
145B000
|
trusted library allocation
|
page execute and read and write
|
||
F70000
|
heap
|
page read and write
|
||
1016000
|
trusted library allocation
|
page execute and read and write
|
||
140E000
|
stack
|
page read and write
|
||
D00000
|
heap
|
page read and write
|
||
FF3000
|
trusted library allocation
|
page execute and read and write
|
||
B60000
|
heap
|
page read and write
|
||
69FD000
|
stack
|
page read and write
|
||
8187000
|
heap
|
page read and write
|
||
74F0000
|
trusted library allocation
|
page read and write
|
||
6AFE000
|
stack
|
page read and write
|
||
6D9C000
|
stack
|
page read and write
|
||
2ABF000
|
stack
|
page read and write
|
||
463D000
|
trusted library allocation
|
page read and write
|
||
652E000
|
stack
|
page read and write
|
||
9A00000
|
trusted library allocation
|
page execute and read and write
|
||
7BC2000
|
trusted library allocation
|
page read and write
|
||
1709000
|
heap
|
page read and write
|
||
CAE000
|
stack
|
page read and write
|
||
3210000
|
trusted library allocation
|
page read and write
|
||
339B000
|
trusted library allocation
|
page read and write
|
||
FF4000
|
trusted library allocation
|
page read and write
|
||
124F000
|
stack
|
page read and write
|
||
74A0000
|
trusted library allocation
|
page read and write
|
||
AFC000
|
stack
|
page read and write
|
||
1050000
|
heap
|
page read and write
|
||
2F75000
|
trusted library allocation
|
page read and write
|
||
D98000
|
heap
|
page read and write
|
||
29C6000
|
trusted library allocation
|
page read and write
|
||
1240000
|
heap
|
page read and write
|
||
6DDE000
|
stack
|
page read and write
|
||
1420000
|
trusted library allocation
|
page read and write
|
||
2950000
|
trusted library allocation
|
page read and write
|
||
3AF1000
|
trusted library allocation
|
page read and write
|
||
2EAC000
|
stack
|
page read and write
|
||
95C0000
|
trusted library allocation
|
page read and write
|
||
7560000
|
heap
|
page read and write
|
||
473000
|
remote allocation
|
page execute and read and write
|
||
31EE000
|
stack
|
page read and write
|
||
2F10000
|
heap
|
page read and write
|
||
666D000
|
stack
|
page read and write
|
||
940F000
|
heap
|
page read and write
|
||
7DF0000
|
heap
|
page read and write
|
||
5810000
|
heap
|
page read and write
|
||
C70000
|
heap
|
page read and write
|
||
DD3E000
|
stack
|
page read and write
|
||
D04000
|
heap
|
page read and write
|
||
2AD0000
|
heap
|
page read and write
|
||
D82000
|
unkown
|
page readonly
|
||
4C8D000
|
stack
|
page read and write
|
||
1640000
|
trusted library allocation
|
page read and write
|
||
42F5000
|
trusted library allocation
|
page read and write
|
||
8100000
|
heap
|
page read and write
|
||
7760000
|
heap
|
page read and write
|
||
2F1B000
|
heap
|
page read and write
|
||
8765000
|
heap
|
page read and write
|
||
8763000
|
heap
|
page read and write
|
||
797D000
|
stack
|
page read and write
|
||
DA3E000
|
stack
|
page read and write
|
||
74C1000
|
trusted library allocation
|
page read and write
|
||
2DEF000
|
unkown
|
page read and write
|
||
D50000
|
heap
|
page read and write
|
||
DF7D000
|
stack
|
page read and write
|
||
DE0000
|
heap
|
page read and write
|
||
DE3E000
|
stack
|
page read and write
|
||
7A40000
|
trusted library section
|
page readonly
|
||
7750000
|
trusted library allocation
|
page read and write
|
||
F80000
|
heap
|
page read and write
|
||
4B7E000
|
stack
|
page read and write
|
||
8119000
|
heap
|
page read and write
|
||
16DA000
|
heap
|
page read and write
|
||
470000
|
remote allocation
|
page execute and read and write
|
||
2AEF000
|
stack
|
page read and write
|
||
8710000
|
heap
|
page read and write
|
||
1020000
|
trusted library allocation
|
page read and write
|
||
500E000
|
stack
|
page read and write
|
||
7870000
|
heap
|
page read and write
|
||
31F0000
|
trusted library allocation
|
page read and write
|
||
1457000
|
trusted library allocation
|
page execute and read and write
|
||
1490000
|
trusted library allocation
|
page execute and read and write
|
||
6EDE000
|
stack
|
page read and write
|
||
2A7E000
|
stack
|
page read and write
|
||
293E000
|
stack
|
page read and write
|
||
7E40000
|
heap
|
page execute and read and write
|
||
87A1000
|
heap
|
page read and write
|
||
2920000
|
heap
|
page read and write
|
||
DF80000
|
heap
|
page read and write
|
||
1707000
|
heap
|
page read and write
|
||
14A0000
|
heap
|
page read and write
|
||
CDA000
|
heap
|
page read and write
|
||
1360000
|
heap
|
page read and write
|
||
8070000
|
heap
|
page read and write
|
||
2E6F000
|
stack
|
page read and write
|
||
2BCC000
|
trusted library allocation
|
page read and write
|
||
E27C000
|
stack
|
page read and write
|
||
135E000
|
stack
|
page read and write
|
||
C5E000
|
stack
|
page read and write
|
||
74D2000
|
trusted library allocation
|
page read and write
|
||
115E000
|
stack
|
page read and write
|
||
74A4000
|
trusted library allocation
|
page read and write
|
||
5823000
|
heap
|
page read and write
|
||
1694000
|
heap
|
page read and write
|
||
4F56000
|
trusted library allocation
|
page read and write
|
||
1685000
|
heap
|
page read and write
|
||
7DE0000
|
trusted library allocation
|
page read and write
|
||
143D000
|
trusted library allocation
|
page execute and read and write
|
||
3240000
|
trusted library allocation
|
page read and write
|
||
7712000
|
trusted library allocation
|
page read and write
|
||
3B15000
|
trusted library allocation
|
page read and write
|
||
80FE000
|
stack
|
page read and write
|
||
1480000
|
heap
|
page read and write
|
||
287A000
|
stack
|
page read and write
|
||
1230000
|
heap
|
page read and write
|
||
2ADA000
|
heap
|
page read and write
|
||
7030000
|
trusted library allocation
|
page execute and read and write
|
||
4A79000
|
trusted library allocation
|
page read and write
|
||
2910000
|
heap
|
page read and write
|
||
46FA000
|
trusted library allocation
|
page read and write
|
||
9F6C000
|
stack
|
page read and write
|
||
2AF1000
|
trusted library allocation
|
page read and write
|
||
74E0000
|
trusted library allocation
|
page read and write
|
||
314E000
|
stack
|
page read and write
|
||
57E2000
|
trusted library allocation
|
page read and write
|
||
44C2000
|
trusted library allocation
|
page read and write
|
||
C60000
|
heap
|
page read and write
|
||
2DA0000
|
heap
|
page read and write
|
||
3220000
|
heap
|
page execute and read and write
|
||
184E000
|
stack
|
page read and write
|
||
314F000
|
stack
|
page read and write
|
||
328E000
|
stack
|
page read and write
|
||
CEE000
|
stack
|
page read and write
|
||
CEF000
|
heap
|
page read and write
|
||
4580000
|
trusted library allocation
|
page read and write
|
||
815E000
|
heap
|
page read and write
|
||
1022000
|
trusted library allocation
|
page read and write
|
||
74CD000
|
trusted library allocation
|
page read and write
|
||
2D7E000
|
unkown
|
page read and write
|
||
5820000
|
heap
|
page read and write
|
||
338F000
|
stack
|
page read and write
|
||
74BE000
|
trusted library allocation
|
page read and write
|
||
7570000
|
trusted library allocation
|
page execute and read and write
|
||
D54000
|
heap
|
page read and write
|
||
283D000
|
stack
|
page read and write
|
||
172B000
|
heap
|
page read and write
|
||
DC3E000
|
stack
|
page read and write
|
||
57DD000
|
trusted library allocation
|
page read and write
|
||
7BD0000
|
trusted library allocation
|
page read and write
|
||
304F000
|
stack
|
page read and write
|
||
1452000
|
trusted library allocation
|
page read and write
|
||
8040000
|
heap
|
page read and write
|
||
D10000
|
heap
|
page read and write
|
||
7770000
|
heap
|
page execute and read and write
|
||
E2BD000
|
stack
|
page read and write
|
||
F4F000
|
stack
|
page read and write
|
||
510E000
|
stack
|
page read and write
|
||
536D000
|
stack
|
page read and write
|
||
57BB000
|
trusted library allocation
|
page read and write
|
||
7710000
|
trusted library allocation
|
page read and write
|
||
DE5000
|
heap
|
page read and write
|
||
15AE000
|
stack
|
page read and write
|
||
1012000
|
trusted library allocation
|
page read and write
|
||
676D000
|
stack
|
page read and write
|
||
2DB0000
|
heap
|
page read and write
|
There are 338 hidden memdumps, click here to show them.