Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
7tjt3u68PZ.exe
|
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
|
initial sample
|
||
C:\Notepad.exe
|
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Notepad.exe:Zone.Identifier
|
ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Program Files (x86)\Explower.exe
|
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\Explower.exe:Zone.Identifier
|
ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Umbrella.flv.exe
|
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Umbrella.flv.exe:Zone.Identifier
|
ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Explower.exe
|
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\History\Explower.exe
|
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\Explower.exe
|
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\INetCookies\Explower.exe
|
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Explower.exe
|
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\Desktop\Explower.exe
|
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\Documents\Explower.exe
|
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\Favorites\Explower.exe
|
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Windows\SysWOW64\Explower.exe
|
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\autorun.inf
|
Microsoft Windows Autorun file
|
dropped
|
||
C:\system.exe
|
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\system.exe:Zone.Identifier
|
ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Explower.exe:Zone.Identifier
|
ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\CLR_v2.0_32\UsageLogs\Explower.exe.log
|
ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\History\Explower.exe:Zone.Identifier
|
ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\Explower.exe:Zone.Identifier
|
ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\INetCookies\Explower.exe:Zone.Identifier
|
ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Explower.exe:Zone.Identifier
|
ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Roaming\app
|
Unicode text, UTF-8 (with BOM) text, with no line terminators
|
dropped
|
||
C:\Users\user\Desktop\Explower.exe:Zone.Identifier
|
ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\Documents\Explower.exe:Zone.Identifier
|
ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\Favorites\Explower.exe:Zone.Identifier
|
ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Windows\SysWOW64\Explower.exe:Zone.Identifier
|
ASCII text, with CRLF line terminators
|
dropped
|
||
\Device\ConDrv
|
ASCII text, with CRLF line terminators
|
dropped
|
There are 21 hidden files, click here to show them.
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\7tjt3u68PZ.exe
|
"C:\Users\user\Desktop\7tjt3u68PZ.exe"
|
||
C:\Windows\SysWOW64\netsh.exe
|
netsh firewall add allowedprogram "C:\Users\user\Desktop\7tjt3u68PZ.exe" "7tjt3u68PZ.exe" ENABLE
|
||
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Explower.exe
|
"C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Explower.exe"
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
Domains
Name
|
IP
|
Malicious
|
|
---|---|---|---|
0.tcp.eu.ngrok.io
|
3.125.209.94
|
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
3.125.209.94
|
0.tcp.eu.ngrok.io
|
United States
|
||
18.192.31.165
|
unknown
|
United States
|
||
18.158.249.75
|
unknown
|
United States
|
Registry
Path
|
Value
|
Malicious
|
|
---|---|---|---|
HKEY_CURRENT_USER\Environment
|
SEE_MASK_NOZONECHECKS
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System
|
DisableTaskMgr
|
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
8B2000
|
unkown
|
page readonly
|
||
2F11000
|
trusted library allocation
|
page read and write
|
||
BE8D000
|
stack
|
page read and write
|
||
54ED000
|
stack
|
page read and write
|
||
BD4D000
|
stack
|
page read and write
|
||
B3CD000
|
stack
|
page read and write
|
||
A38E000
|
stack
|
page read and write
|
||
1182000
|
heap
|
page read and write
|
||
A28D000
|
stack
|
page read and write
|
||
8487000
|
heap
|
page read and write
|
||
95CE000
|
stack
|
page read and write
|
||
1BF95000
|
trusted library allocation
|
page read and write
|
||
1B794000
|
trusted library allocation
|
page read and write
|
||
A10E000
|
stack
|
page read and write
|
||
5707000
|
heap
|
page read and write
|
||
9D4E000
|
stack
|
page read and write
|
||
7C0D000
|
stack
|
page read and write
|
||
7FCE000
|
stack
|
page read and write
|
||
11E0000
|
heap
|
page read and write
|
||
11CC000
|
heap
|
page read and write
|
||
1220000
|
heap
|
page read and write
|
||
700000
|
heap
|
page read and write
|
||
EC8E000
|
stack
|
page read and write
|
||
A8CD000
|
stack
|
page read and write
|
||
673E000
|
stack
|
page read and write
|
||
E5B000
|
stack
|
page read and write
|
||
12F9E000
|
stack
|
page read and write
|
||
56F1000
|
heap
|
page read and write
|
||
810E000
|
stack
|
page read and write
|
||
11C5000
|
heap
|
page read and write
|
||
10FDD000
|
stack
|
page read and write
|
||
ADE000
|
stack
|
page read and write
|
||
A14D000
|
stack
|
page read and write
|
||
1167000
|
heap
|
page read and write
|
||
566D000
|
stack
|
page read and write
|
||
DBCE000
|
stack
|
page read and write
|
||
A00D000
|
stack
|
page read and write
|
||
4C37000
|
trusted library allocation
|
page read and write
|
||
5A4D000
|
stack
|
page read and write
|
||
756000
|
heap
|
page read and write
|
||
12D1E000
|
stack
|
page read and write
|
||
1B780000
|
trusted library allocation
|
page read and write
|
||
11DA000
|
trusted library allocation
|
page execute and read and write
|
||
960D000
|
stack
|
page read and write
|
||
DE8D000
|
stack
|
page read and write
|
||
AC50000
|
heap
|
page read and write
|
||
12ED000
|
stack
|
page read and write
|
||
99E000
|
stack
|
page read and write
|
||
FCDD000
|
stack
|
page read and write
|
||
1BBFB000
|
trusted library allocation
|
page read and write
|
||
1185000
|
heap
|
page read and write
|
||
8484000
|
heap
|
page read and write
|
||
E50000
|
heap
|
page read and write
|
||
1BE7C000
|
trusted library allocation
|
page read and write
|
||
10ADD000
|
stack
|
page read and write
|
||
11B9E000
|
stack
|
page read and write
|
||
11BE000
|
heap
|
page read and write
|
||
7D4E000
|
stack
|
page read and write
|
||
9ECE000
|
stack
|
page read and write
|
||
10AE000
|
stack
|
page read and write
|
||
44AE000
|
trusted library allocation
|
page read and write
|
||
73A000
|
heap
|
page read and write
|
||
4900000
|
trusted library allocation
|
page read and write
|
||
842D000
|
heap
|
page read and write
|
||
5B2E000
|
heap
|
page read and write
|
||
65BE000
|
stack
|
page read and write
|
||
42B2000
|
trusted library allocation
|
page read and write
|
||
11AE000
|
stack
|
page read and write
|
||
B78E000
|
stack
|
page read and write
|
||
D70D000
|
stack
|
page read and write
|
||
489F000
|
trusted library allocation
|
page read and write
|
||
26FD000
|
trusted library allocation
|
page read and write
|
||
122E000
|
heap
|
page read and write
|
||
2BCF000
|
stack
|
page read and write
|
||
11A1000
|
heap
|
page read and write
|
||
1B5D4000
|
trusted library allocation
|
page read and write
|
||
4810000
|
trusted library allocation
|
page read and write
|
||
100DD000
|
stack
|
page read and write
|
||
8B0000
|
unkown
|
page readonly
|
||
5A60000
|
heap
|
page read and write
|
||
4203000
|
trusted library allocation
|
page read and write
|
||
BCCD000
|
stack
|
page read and write
|
||
BC8D000
|
stack
|
page read and write
|
||
7A4000
|
heap
|
page read and write
|
||
11BE000
|
heap
|
page read and write
|
||
F5E000
|
stack
|
page read and write
|
||
AE0000
|
heap
|
page read and write
|
||
1184000
|
heap
|
page read and write
|
||
7C4D000
|
stack
|
page read and write
|
||
A74E000
|
stack
|
page read and write
|
||
11C5000
|
heap
|
page read and write
|
||
4F1E000
|
stack
|
page read and write
|
||
46E4000
|
trusted library allocation
|
page read and write
|
||
6C0000
|
heap
|
page read and write
|
||
11D5000
|
heap
|
page read and write
|
||
121F000
|
heap
|
page read and write
|
||
232F5000
|
trusted library allocation
|
page read and write
|
||
942000
|
trusted library allocation
|
page execute and read and write
|
||
CDCD000
|
stack
|
page read and write
|
||
4C02000
|
trusted library allocation
|
page read and write
|
||
11D1000
|
heap
|
page read and write
|
||
1189000
|
heap
|
page read and write
|
||
29AAF000
|
trusted library allocation
|
page read and write
|
||
1B680000
|
trusted library allocation
|
page read and write
|
||
562D000
|
stack
|
page read and write
|
||
D58E000
|
stack
|
page read and write
|
||
6BE000
|
stack
|
page read and write
|
||
1B465000
|
trusted library allocation
|
page read and write
|
||
12FDE000
|
stack
|
page read and write
|
||
CF4E000
|
stack
|
page read and write
|
||
122B000
|
heap
|
page read and write
|
||
D44E000
|
stack
|
page read and write
|
||
E8CD000
|
stack
|
page read and write
|
||
670000
|
heap
|
page read and write
|
||
117C000
|
heap
|
page read and write
|
||
EF0E000
|
stack
|
page read and write
|
||
42EE000
|
trusted library allocation
|
page read and write
|
||
13D5D000
|
stack
|
page read and write
|
||
FF9E000
|
stack
|
page read and write
|
||
1217000
|
heap
|
page read and write
|
||
11BDE000
|
stack
|
page read and write
|
||
E90D000
|
stack
|
page read and write
|
||
1161000
|
heap
|
page read and write
|
||
A8C000
|
stack
|
page read and write
|
||
11BF000
|
heap
|
page read and write
|
||
11D7000
|
heap
|
page read and write
|
||
4832000
|
trusted library allocation
|
page read and write
|
||
4F4C000
|
stack
|
page read and write
|
||
11D0000
|
heap
|
page read and write
|
||
56F9000
|
heap
|
page read and write
|
||
970E000
|
stack
|
page read and write
|
||
FFE000
|
unkown
|
page read and write
|
||
1BC67000
|
trusted library allocation
|
page read and write
|
||
11BF000
|
heap
|
page read and write
|
||
720000
|
trusted library allocation
|
page read and write
|
||
94A000
|
trusted library allocation
|
page execute and read and write
|
||
590E000
|
stack
|
page read and write
|
||
637D000
|
stack
|
page read and write
|
||
4786000
|
trusted library allocation
|
page read and write
|
||
105DD000
|
stack
|
page read and write
|
||
647E000
|
stack
|
page read and write
|
||
29A39000
|
trusted library allocation
|
page read and write
|
||
10BDD000
|
stack
|
page read and write
|
||
7ECD000
|
stack
|
page read and write
|
||
F04E000
|
stack
|
page read and write
|
||
40E6000
|
trusted library allocation
|
page read and write
|
||
122E000
|
heap
|
page read and write
|
||
29874000
|
trusted library allocation
|
page read and write
|
||
760D000
|
stack
|
page read and write
|
||
12E9D000
|
stack
|
page read and write
|
||
119A000
|
heap
|
page read and write
|
||
974D000
|
stack
|
page read and write
|
||
125E000
|
stack
|
page read and write
|
||
1B567000
|
trusted library allocation
|
page read and write
|
||
53AD000
|
stack
|
page read and write
|
||
C34D000
|
stack
|
page read and write
|
||
5FC4000
|
heap
|
page read and write
|
||
E78D000
|
stack
|
page read and write
|
||
5F0E000
|
stack
|
page read and write
|
||
114DE000
|
stack
|
page read and write
|
||
8A7A000
|
trusted library allocation
|
page read and write
|
||
6EFD000
|
stack
|
page read and write
|
||
9D0000
|
heap
|
page read and write
|
||
56CF000
|
stack
|
page read and write
|
||
798D000
|
stack
|
page read and write
|
||
48E2000
|
trusted library allocation
|
page read and write
|
||
6ABD000
|
stack
|
page read and write
|
||
11DA000
|
heap
|
page read and write
|
||
11D2000
|
heap
|
page read and write
|
||
11A9E000
|
stack
|
page read and write
|
||
10C1E000
|
stack
|
page read and write
|
||
1B80F000
|
trusted library allocation
|
page read and write
|
||
494D000
|
trusted library allocation
|
page read and write
|
||
8390000
|
heap
|
page read and write
|
||
5F4C000
|
stack
|
page read and write
|
||
11CA000
|
heap
|
page read and write
|
||
F1CD000
|
stack
|
page read and write
|
||
C44E000
|
stack
|
page read and write
|
||
10E9E000
|
stack
|
page read and write
|
||
B74E000
|
stack
|
page read and write
|
||
B00D000
|
stack
|
page read and write
|
||
1184000
|
heap
|
page read and write
|
||
49F8000
|
trusted library allocation
|
page read and write
|
||
99CD000
|
stack
|
page read and write
|
||
1205000
|
heap
|
page read and write
|
||
A50D000
|
stack
|
page read and write
|
||
1185000
|
heap
|
page read and write
|
||
1BC9D000
|
trusted library allocation
|
page read and write
|
||
11E0000
|
heap
|
page read and write
|
||
C64E000
|
stack
|
page read and write
|
||
847A000
|
heap
|
page read and write
|
||
467B000
|
trusted library allocation
|
page read and write
|
||
1121E000
|
stack
|
page read and write
|
||
56F2000
|
heap
|
page read and write
|
||
5DCE000
|
stack
|
page read and write
|
||
1099D000
|
stack
|
page read and write
|
||
52AC000
|
stack
|
page read and write
|
||
DFCD000
|
stack
|
page read and write
|
||
1071D000
|
stack
|
page read and write
|
||
E20D000
|
stack
|
page read and write
|
||
56F8000
|
heap
|
page read and write
|
||
415A000
|
trusted library allocation
|
page read and write
|
||
61D0000
|
trusted library allocation
|
page execute and read and write
|
||
EB8D000
|
stack
|
page read and write
|
||
4A10000
|
trusted library allocation
|
page read and write
|
||
5701000
|
heap
|
page read and write
|
||
5070000
|
trusted library allocation
|
page read and write
|
||
BE4D000
|
stack
|
page read and write
|
||
12C1D000
|
stack
|
page read and write
|
||
BD0D000
|
stack
|
page read and write
|
||
11A1000
|
heap
|
page read and write
|
||
4C5E000
|
stack
|
page read and write
|
||
CCCE000
|
stack
|
page read and write
|
||
232E0000
|
trusted library allocation
|
page read and write
|
||
BC4E000
|
stack
|
page read and write
|
||
3F38000
|
trusted library allocation
|
page read and write
|
||
11DC000
|
heap
|
page read and write
|
||
5706000
|
heap
|
page read and write
|
||
93A000
|
trusted library allocation
|
page execute and read and write
|
||
10A9E000
|
stack
|
page read and write
|
||
FE1D000
|
stack
|
page read and write
|
||
722000
|
trusted library allocation
|
page execute and read and write
|
||
11860000
|
heap
|
page read and write
|
||
5703000
|
heap
|
page read and write
|
||
1049D000
|
stack
|
page read and write
|
||
9B0E000
|
stack
|
page read and write
|
||
42B8000
|
trusted library allocation
|
page read and write
|
||
5704000
|
heap
|
page read and write
|
||
1B59E000
|
trusted library allocation
|
page read and write
|
||
734D000
|
stack
|
page read and write
|
||
B4CE000
|
stack
|
page read and write
|
||
64BD000
|
stack
|
page read and write
|
||
8491000
|
trusted library allocation
|
page read and write
|
||
EB4E000
|
stack
|
page read and write
|
||
5705000
|
heap
|
page read and write
|
||
11CC000
|
heap
|
page read and write
|
||
957000
|
trusted library allocation
|
page execute and read and write
|
||
101DE000
|
stack
|
page read and write
|
||
4237000
|
trusted library allocation
|
page read and write
|
||
1165000
|
heap
|
page read and write
|
||
540000
|
heap
|
page read and write
|
||
56F1000
|
heap
|
page read and write
|
||
1150000
|
heap
|
page read and write
|
||
EB0000
|
heap
|
page read and write
|
||
4DB2000
|
trusted library allocation
|
page read and write
|
||
1BEB3000
|
trusted library allocation
|
page read and write
|
||
29791000
|
trusted library allocation
|
page read and write
|
||
92F000
|
stack
|
page read and write
|
||
1B994000
|
trusted library allocation
|
page read and write
|
||
E54D000
|
stack
|
page read and write
|
||
F5B000
|
stack
|
page read and write
|
||
295CC000
|
trusted library allocation
|
page read and write
|
||
36D1000
|
trusted library allocation
|
page read and write
|
||
1175000
|
heap
|
page read and write
|
||
C7CD000
|
stack
|
page read and write
|
||
AECD000
|
stack
|
page read and write
|
||
36D4000
|
trusted library allocation
|
page read and write
|
||
E60000
|
heap
|
page read and write
|
||
1327000
|
heap
|
page read and write
|
||
1BFCA000
|
trusted library allocation
|
page read and write
|
||
11CC000
|
heap
|
page read and write
|
||
990000
|
heap
|
page read and write
|
||
11BE000
|
heap
|
page read and write
|
||
11C2000
|
trusted library allocation
|
page execute and read and write
|
||
4AF1000
|
trusted library allocation
|
page read and write
|
||
D5CD000
|
stack
|
page read and write
|
||
A3CD000
|
stack
|
page read and write
|
||
1B382000
|
trusted library allocation
|
page read and write
|
||
3FF7000
|
trusted library allocation
|
page read and write
|
||
4DF1000
|
trusted library allocation
|
page read and write
|
||
43D1000
|
trusted library allocation
|
page read and write
|
||
1227000
|
heap
|
page read and write
|
||
4B29000
|
trusted library allocation
|
page read and write
|
||
43CF000
|
trusted library allocation
|
page read and write
|
||
5701000
|
heap
|
page read and write
|
||
724D000
|
stack
|
page read and write
|
||
11FA000
|
trusted library allocation
|
page execute and read and write
|
||
6200000
|
heap
|
page read and write
|
||
CE0D000
|
stack
|
page read and write
|
||
770D000
|
stack
|
page read and write
|
||
9C4E000
|
stack
|
page read and write
|
||
1125E000
|
stack
|
page read and write
|
||
CF0E000
|
stack
|
page read and write
|
||
29425000
|
trusted library allocation
|
page read and write
|
||
1B6B7000
|
trusted library allocation
|
page read and write
|
||
12AD000
|
stack
|
page read and write
|
||
4B7F000
|
trusted library allocation
|
page read and write
|
||
B28E000
|
stack
|
page read and write
|
||
294CF000
|
trusted library allocation
|
page read and write
|
||
106DE000
|
stack
|
page read and write
|
||
1205000
|
heap
|
page read and write
|
||
1188000
|
heap
|
page read and write
|
||
C78E000
|
stack
|
page read and write
|
||
29674000
|
trusted library allocation
|
page read and write
|
||
788E000
|
stack
|
page read and write
|
||
526B000
|
stack
|
page read and write
|
||
1229000
|
heap
|
page read and write
|
||
6D7D000
|
stack
|
page read and write
|
||
45FE000
|
trusted library allocation
|
page read and write
|
||
ECCD000
|
stack
|
page read and write
|
||
4CC5000
|
trusted library allocation
|
page read and write
|
||
9C0000
|
heap
|
page read and write
|
||
1B933000
|
trusted library allocation
|
page read and write
|
||
11CC000
|
heap
|
page read and write
|
||
3F11000
|
trusted library allocation
|
page read and write
|
||
66FD000
|
stack
|
page read and write
|
||
5701000
|
heap
|
page read and write
|
||
1BF09000
|
trusted library allocation
|
page read and write
|
||
620000
|
heap
|
page read and write
|
||
11D5000
|
heap
|
page read and write
|
||
86D0000
|
trusted library allocation
|
page read and write
|
||
B64D000
|
stack
|
page read and write
|
||
11CA000
|
heap
|
page read and write
|
||
D34D000
|
stack
|
page read and write
|
||
E44D000
|
stack
|
page read and write
|
||
847F000
|
heap
|
page read and write
|
||
720D000
|
stack
|
page read and write
|
||
6D3E000
|
stack
|
page read and write
|
||
4522000
|
trusted library allocation
|
page read and write
|
||
6C3E000
|
stack
|
page read and write
|
||
65FD000
|
stack
|
page read and write
|
||
631D000
|
stack
|
page read and write
|
||
113A000
|
heap
|
page read and write
|
||
11B0000
|
trusted library allocation
|
page read and write
|
||
5AE9000
|
heap
|
page read and write
|
||
A24E000
|
stack
|
page read and write
|
||
13D1E000
|
stack
|
page read and write
|
||
439B000
|
trusted library allocation
|
page read and write
|
||
11C8000
|
heap
|
page read and write
|
||
EB8000
|
heap
|
page read and write
|
||
1BD79000
|
trusted library allocation
|
page read and write
|
||
1202000
|
trusted library allocation
|
page read and write
|
||
12D5D000
|
stack
|
page read and write
|
||
E34D000
|
stack
|
page read and write
|
||
FF5D000
|
stack
|
page read and write
|
||
EA0000
|
heap
|
page execute and read and write
|
||
4D5D000
|
trusted library allocation
|
page read and write
|
||
DD4D000
|
stack
|
page read and write
|
||
120B000
|
trusted library allocation
|
page execute and read and write
|
||
7ACD000
|
stack
|
page read and write
|
||
5702000
|
heap
|
page read and write
|
||
AB0D000
|
stack
|
page read and write
|
||
AA0D000
|
stack
|
page read and write
|
||
DC0D000
|
stack
|
page read and write
|
||
46E7000
|
trusted library allocation
|
page read and write
|
||
D2CD000
|
stack
|
page read and write
|
||
61A0000
|
unclassified section
|
page read and write
|
||
D08D000
|
stack
|
page read and write
|
||
2983E000
|
trusted library allocation
|
page read and write
|
||
1B6EB000
|
trusted library allocation
|
page read and write
|
||
5C8E000
|
stack
|
page read and write
|
||
1B55E000
|
trusted library allocation
|
page read and write
|
||
1BB2F000
|
trusted library allocation
|
page read and write
|
||
1160000
|
heap
|
page read and write
|
||
29504000
|
trusted library allocation
|
page read and write
|
||
4D27000
|
trusted library allocation
|
page read and write
|
||
E64D000
|
stack
|
page read and write
|
||
11A1000
|
heap
|
page read and write
|
||
4C8F000
|
trusted library allocation
|
page read and write
|
||
D18E000
|
stack
|
page read and write
|
||
12F0000
|
trusted library allocation
|
page execute and read and write
|
||
117B000
|
heap
|
page read and write
|
||
F53000
|
stack
|
page read and write
|
||
F3DD000
|
stack
|
page read and write
|
||
6AFD000
|
stack
|
page read and write
|
||
110DE000
|
stack
|
page read and write
|
||
1223000
|
heap
|
page read and write
|
||
11D2000
|
heap
|
page read and write
|
||
11D2000
|
trusted library allocation
|
page execute and read and write
|
||
DACD000
|
stack
|
page read and write
|
||
6320000
|
heap
|
page read and write
|
||
75CD000
|
stack
|
page read and write
|
||
1224000
|
heap
|
page read and write
|
||
F6DE000
|
stack
|
page read and write
|
||
11CA000
|
heap
|
page read and write
|
||
11FF000
|
heap
|
page read and write
|
||
B10E000
|
stack
|
page read and write
|
||
9FCE000
|
stack
|
page read and write
|
||
1BE4E000
|
trusted library allocation
|
page read and write
|
||
D94E000
|
stack
|
page read and write
|
||
11CD000
|
heap
|
page read and write
|
||
1B4E6000
|
trusted library allocation
|
page read and write
|
||
CF6000
|
stack
|
page read and write
|
||
7FCC0000
|
trusted library allocation
|
page execute and read and write
|
||
72C000
|
trusted library allocation
|
page execute and read and write
|
||
9E8D000
|
stack
|
page read and write
|
||
5F90000
|
heap
|
page read and write
|
||
1B9CA000
|
trusted library allocation
|
page read and write
|
||
1185000
|
heap
|
page read and write
|
||
AE8D000
|
stack
|
page read and write
|
||
848A000
|
heap
|
page read and write
|
||
95B000
|
trusted library allocation
|
page execute and read and write
|
||
5F8B000
|
stack
|
page read and write
|
||
AFCD000
|
stack
|
page read and write
|
||
1BA1F000
|
trusted library allocation
|
page read and write
|
||
29920000
|
trusted library allocation
|
page read and write
|
||
47DC000
|
trusted library allocation
|
page read and write
|
||
1BD25000
|
trusted library allocation
|
page read and write
|
||
AC4D000
|
stack
|
page read and write
|
||
40B2000
|
trusted library allocation
|
page read and write
|
||
119F000
|
heap
|
page read and write
|
||
4BB6000
|
trusted library allocation
|
page read and write
|
||
55EE000
|
stack
|
page read and write
|
||
1045E000
|
stack
|
page read and write
|
||
FA8000
|
heap
|
page read and write
|
||
738D000
|
stack
|
page read and write
|
||
504E000
|
stack
|
page read and write
|
||
4868000
|
trusted library allocation
|
page read and write
|
||
C20D000
|
stack
|
page read and write
|
||
1111E000
|
stack
|
page read and write
|
||
4910000
|
heap
|
page read and write
|
||
F91D000
|
stack
|
page read and write
|
||
1B430000
|
trusted library allocation
|
page read and write
|
||
B88E000
|
stack
|
page read and write
|
||
5708000
|
heap
|
page read and write
|
||
14FF000
|
stack
|
page read and write
|
||
FE5D000
|
stack
|
page read and write
|
||
687D000
|
stack
|
page read and write
|
||
11CD000
|
heap
|
page read and write
|
||
11D9000
|
heap
|
page read and write
|
||
710E000
|
stack
|
page read and write
|
||
13C1D000
|
stack
|
page read and write
|
||
11DC000
|
heap
|
page read and write
|
||
1135E000
|
stack
|
page read and write
|
||
1188000
|
heap
|
page read and write
|
||
53ED000
|
stack
|
page read and write
|
||
FA5D000
|
stack
|
page read and write
|
||
10D1E000
|
stack
|
page read and write
|
||
1BDC5000
|
trusted library allocation
|
page read and write
|
||
4920000
|
trusted library allocation
|
page execute and read and write
|
||
5701000
|
heap
|
page read and write
|
||
5E0D000
|
stack
|
page read and write
|
||
297C7000
|
trusted library allocation
|
page read and write
|
||
B9CE000
|
stack
|
page read and write
|
||
11D2000
|
heap
|
page read and write
|
||
11BE000
|
heap
|
page read and write
|
||
11C5000
|
heap
|
page read and write
|
||
1176000
|
heap
|
page read and write
|
||
122E000
|
heap
|
page read and write
|
||
10F9E000
|
stack
|
page read and write
|
||
122A000
|
heap
|
page read and write
|
||
5701000
|
heap
|
page read and write
|
||
FBDE000
|
stack
|
page read and write
|
||
1189000
|
heap
|
page read and write
|
||
814D000
|
stack
|
page read and write
|
||
DF8E000
|
stack
|
page read and write
|
||
1B60A000
|
trusted library allocation
|
page read and write
|
||
11D0000
|
trusted library allocation
|
page read and write
|
||
9D8D000
|
stack
|
page read and write
|
||
660000
|
heap
|
page read and write
|
||
8CD0000
|
trusted library allocation
|
page read and write
|
||
1179000
|
heap
|
page read and write
|
||
B8CD000
|
stack
|
page read and write
|
||
7D8D000
|
stack
|
page read and write
|
||
BF8E000
|
stack
|
page read and write
|
||
F5DD000
|
stack
|
page read and write
|
||
1149E000
|
stack
|
page read and write
|
||
1031E000
|
stack
|
page read and write
|
||
E68E000
|
stack
|
page read and write
|
||
4364000
|
trusted library allocation
|
page read and write
|
||
1B94A000
|
trusted library allocation
|
page read and write
|
||
12ADD000
|
stack
|
page read and write
|
||
4EDE000
|
stack
|
page read and write
|
||
1B4B2000
|
trusted library allocation
|
page read and write
|
||
11CDE000
|
stack
|
page read and write
|
||
74CD000
|
stack
|
page read and write
|
||
E24D000
|
stack
|
page read and write
|
||
11D2000
|
heap
|
page read and write
|
||
29B1C000
|
trusted library allocation
|
page read and write
|
||
A64D000
|
stack
|
page read and write
|
||
121F000
|
heap
|
page read and write
|
||
1BDFA000
|
trusted library allocation
|
page read and write
|
||
1B34B000
|
trusted library allocation
|
page read and write
|
||
E7CD000
|
stack
|
page read and write
|
||
1021E000
|
stack
|
page read and write
|
||
D84D000
|
stack
|
page read and write
|
||
122D000
|
heap
|
page read and write
|
||
8467000
|
heap
|
page read and write
|
||
580E000
|
stack
|
page read and write
|
||
3FA3000
|
trusted library allocation
|
page read and write
|
||
73E000
|
heap
|
page read and write
|
||
11D4000
|
heap
|
page read and write
|
||
683E000
|
stack
|
page read and write
|
||
1187000
|
heap
|
page read and write
|
||
CB8D000
|
stack
|
page read and write
|
||
83AC000
|
heap
|
page read and write
|
||
5701000
|
heap
|
page read and write
|
||
1085E000
|
stack
|
page read and write
|
||
4F6000
|
stack
|
page read and write
|
||
11A1000
|
heap
|
page read and write
|
||
984E000
|
stack
|
page read and write
|
||
13E5E000
|
stack
|
page read and write
|
||
11CA000
|
trusted library allocation
|
page execute and read and write
|
||
D04D000
|
stack
|
page read and write
|
||
1059E000
|
stack
|
page read and write
|
||
1186000
|
heap
|
page read and write
|
||
E4D000
|
stack
|
page read and write
|
||
4725000
|
trusted library allocation
|
page read and write
|
||
4556000
|
trusted library allocation
|
page read and write
|
||
1210000
|
heap
|
page read and write
|
||
5A92000
|
heap
|
page read and write
|
||
A78D000
|
stack
|
page read and write
|
||
5702000
|
heap
|
page read and write
|
||
1175000
|
heap
|
page read and write
|
||
1BCD1000
|
trusted library allocation
|
page read and write
|
||
4406000
|
trusted library allocation
|
page read and write
|
||
83F0000
|
heap
|
page read and write
|
||
DA8E000
|
stack
|
page read and write
|
||
1066000
|
heap
|
page read and write
|
||
1B3B7000
|
trusted library allocation
|
page read and write
|
||
29AE5000
|
trusted library allocation
|
page read and write
|
||
418F000
|
trusted library allocation
|
page read and write
|
||
11E7000
|
trusted library allocation
|
page execute and read and write
|
||
844E000
|
heap
|
page read and write
|
||
1085000
|
heap
|
page read and write
|
||
EE0D000
|
stack
|
page read and write
|
||
DD0E000
|
stack
|
page read and write
|
||
11C2000
|
heap
|
page read and write
|
||
29A19000
|
trusted library allocation
|
page read and write
|
||
1161D000
|
stack
|
page read and write
|
||
6EBD000
|
stack
|
page read and write
|
||
C24E000
|
stack
|
page read and write
|
||
11BE000
|
heap
|
page read and write
|
||
72A000
|
trusted library allocation
|
page execute and read and write
|
||
D80E000
|
stack
|
page read and write
|
||
2971B000
|
trusted library allocation
|
page read and write
|
||
6190000
|
trusted library allocation
|
page read and write
|
||
A60D000
|
stack
|
page read and write
|
||
117F000
|
heap
|
page read and write
|
||
4BEA000
|
trusted library allocation
|
page read and write
|
||
9C0E000
|
stack
|
page read and write
|
||
4A7B000
|
trusted library allocation
|
page read and write
|
||
5FCE000
|
heap
|
page read and write
|
||
AD8D000
|
stack
|
page read and write
|
||
E0E000
|
stack
|
page read and write
|
||
D98D000
|
stack
|
page read and write
|
||
130DE000
|
stack
|
page read and write
|
||
119A000
|
heap
|
page read and write
|
||
6F0000
|
trusted library allocation
|
page read and write
|
||
1189000
|
heap
|
page read and write
|
||
47CC000
|
stack
|
page read and write
|
||
26F4000
|
trusted library allocation
|
page read and write
|
||
988D000
|
stack
|
page read and write
|
||
576D000
|
stack
|
page read and write
|
||
11C7000
|
heap
|
page read and write
|
||
998E000
|
stack
|
page read and write
|
||
7B0D000
|
stack
|
page read and write
|
||
E40D000
|
stack
|
page read and write
|
||
CB4E000
|
stack
|
page read and write
|
||
49C4000
|
trusted library allocation
|
page read and write
|
||
CA0E000
|
stack
|
page read and write
|
||
4A47000
|
trusted library allocation
|
page read and write
|
||
11CA000
|
heap
|
page read and write
|
||
1B7D9000
|
trusted library allocation
|
page read and write
|
||
3F6E000
|
trusted library allocation
|
page read and write
|
||
6330000
|
heap
|
page read and write
|
||
94CD000
|
stack
|
page read and write
|
||
13FF000
|
unkown
|
page read and write
|
||
122B000
|
heap
|
page read and write
|
||
774D000
|
stack
|
page read and write
|
||
1139E000
|
stack
|
page read and write
|
||
1B865000
|
trusted library allocation
|
page read and write
|
||
1080000
|
heap
|
page read and write
|
||
847C000
|
heap
|
page read and write
|
||
46B0000
|
trusted library allocation
|
page read and write
|
||
56D0000
|
heap
|
page read and write
|
||
824D000
|
stack
|
page read and write
|
||
700E000
|
stack
|
page read and write
|
||
675000
|
heap
|
page read and write
|
||
122B000
|
heap
|
page read and write
|
||
4FDE000
|
stack
|
page read and write
|
||
121F000
|
heap
|
page read and write
|
||
117C000
|
heap
|
page read and write
|
||
EDCE000
|
stack
|
page read and write
|
||
C90D000
|
stack
|
page read and write
|
||
FD1E000
|
stack
|
page read and write
|
||
959000
|
stack
|
page read and write
|
||
697E000
|
stack
|
page read and write
|
||
119A000
|
heap
|
page read and write
|
||
1BF5F000
|
trusted library allocation
|
page read and write
|
||
8470000
|
heap
|
page read and write
|
||
10E5D000
|
stack
|
page read and write
|
||
299AC000
|
trusted library allocation
|
page read and write
|
||
29596000
|
trusted library allocation
|
page read and write
|
||
1B89A000
|
trusted library allocation
|
page read and write
|
||
C0CD000
|
stack
|
page read and write
|
||
BB4D000
|
stack
|
page read and write
|
||
1B8F3000
|
trusted library allocation
|
page read and write
|
||
D6CE000
|
stack
|
page read and write
|
||
DE4E000
|
stack
|
page read and write
|
||
5709000
|
heap
|
page read and write
|
||
1BAF8000
|
trusted library allocation
|
page read and write
|
||
5080000
|
trusted library allocation
|
page execute and read and write
|
||
79CD000
|
stack
|
page read and write
|
||
11CE000
|
heap
|
page read and write
|
||
5180000
|
heap
|
page read and write
|
||
F1E0000
|
heap
|
page read and write
|
||
293F1000
|
trusted library allocation
|
page read and write
|
||
E38D000
|
stack
|
page read and write
|
||
FB9D000
|
stack
|
page read and write
|
||
712000
|
trusted library allocation
|
page execute and read and write
|
||
FB0000
|
heap
|
page read and write
|
||
AB4D000
|
stack
|
page read and write
|
||
1009D000
|
stack
|
page read and write
|
||
1207000
|
trusted library allocation
|
page execute and read and write
|
||
E0CE000
|
stack
|
page read and write
|
||
1227000
|
heap
|
page read and write
|
||
8410000
|
heap
|
page read and write
|
||
F08D000
|
stack
|
page read and write
|
||
BFCD000
|
stack
|
page read and write
|
||
C8CE000
|
stack
|
page read and write
|
||
48CF000
|
stack
|
page read and write
|
||
10CE000
|
stack
|
page read and write
|
||
1000000
|
heap
|
page read and write
|
||
B38E000
|
stack
|
page read and write
|
||
121F000
|
heap
|
page read and write
|
||
11F2000
|
trusted library allocation
|
page execute and read and write
|
||
1185000
|
heap
|
page read and write
|
||
6BFD000
|
stack
|
page read and write
|
||
12BDE000
|
stack
|
page read and write
|
||
4D5E000
|
stack
|
page read and write
|
||
9ACE000
|
stack
|
page read and write
|
||
1B63F000
|
trusted library allocation
|
page read and write
|
||
730000
|
heap
|
page read and write
|
||
122E000
|
heap
|
page read and write
|
||
29B52000
|
trusted library allocation
|
page read and write
|
||
F18E000
|
stack
|
page read and write
|
||
A90000
|
heap
|
page execute and read and write
|
||
CC8E000
|
stack
|
page read and write
|
||
1179000
|
heap
|
page read and write
|
||
838D000
|
stack
|
page read and write
|
||
E3CD000
|
stack
|
page read and write
|
||
5050000
|
trusted library allocation
|
page read and write
|
||
11BF000
|
heap
|
page read and write
|
||
7AB000
|
heap
|
page read and write
|
||
1095E000
|
stack
|
page read and write
|
||
1081E000
|
stack
|
page read and write
|
||
1130000
|
heap
|
page read and write
|
||
825E000
|
heap
|
page read and write
|
||
E57000
|
heap
|
page read and write
|
||
11EA000
|
trusted library allocation
|
page execute and read and write
|
||
1BC31000
|
trusted library allocation
|
page read and write
|
||
5B8D000
|
stack
|
page read and write
|
||
1BB9B000
|
trusted library allocation
|
page read and write
|
||
299E3000
|
trusted library allocation
|
page read and write
|
||
1171E000
|
stack
|
page read and write
|
||
EA0D000
|
stack
|
page read and write
|
||
4D9E000
|
stack
|
page read and write
|
||
1B317000
|
trusted library allocation
|
page read and write
|
||
11D9000
|
heap
|
page read and write
|
||
11BE000
|
heap
|
page read and write
|
||
1010000
|
heap
|
page read and write
|
||
C10D000
|
stack
|
page read and write
|
||
784D000
|
stack
|
page read and write
|
||
1205000
|
heap
|
page read and write
|
||
1035D000
|
stack
|
page read and write
|
||
26D1000
|
trusted library allocation
|
page read and write
|
||
1060000
|
heap
|
page read and write
|
||
11C0000
|
heap
|
page read and write
|
||
F7DD000
|
stack
|
page read and write
|
||
BA0D000
|
stack
|
page read and write
|
||
1BA53000
|
trusted library allocation
|
page read and write
|
||
5CCE000
|
stack
|
page read and write
|
||
117A000
|
heap
|
page read and write
|
||
4E27000
|
trusted library allocation
|
page read and write
|
||
F81E000
|
stack
|
page read and write
|
||
117B000
|
heap
|
page read and write
|
||
5120000
|
heap
|
page read and write
|
||
4DBA000
|
trusted library allocation
|
page read and write
|
||
748E000
|
stack
|
page read and write
|
||
4E9E000
|
stack
|
page read and write
|
||
1B47B000
|
trusted library allocation
|
page read and write
|
||
C68D000
|
stack
|
page read and write
|
||
BB0E000
|
stack
|
page read and write
|
||
76E000
|
heap
|
page read and write
|
||
7E8E000
|
stack
|
page read and write
|
||
2700000
|
trusted library allocation
|
page read and write
|
||
119A000
|
heap
|
page read and write
|
||
B60E000
|
stack
|
page read and write
|
||
48E0000
|
trusted library allocation
|
page read and write
|
||
501E000
|
stack
|
page read and write
|
||
EA4D000
|
stack
|
page read and write
|
||
5A50000
|
heap
|
page read and write
|
||
594D000
|
stack
|
page read and write
|
||
407C000
|
trusted library allocation
|
page read and write
|
||
11D2000
|
heap
|
page read and write
|
||
430E000
|
trusted library allocation
|
page read and write
|
||
B50D000
|
stack
|
page read and write
|
||
83D3000
|
heap
|
page read and write
|
||
11FF000
|
heap
|
page read and write
|
||
11DF000
|
heap
|
page read and write
|
||
12E5E000
|
stack
|
page read and write
|
||
EBE000
|
heap
|
page read and write
|
||
F4E000
|
stack
|
page read and write
|
||
A88E000
|
stack
|
page read and write
|
||
B14D000
|
stack
|
page read and write
|
||
800D000
|
stack
|
page read and write
|
||
296E5000
|
trusted library allocation
|
page read and write
|
||
A9CE000
|
stack
|
page read and write
|
||
26F6000
|
trusted library allocation
|
page read and write
|
||
1175E000
|
stack
|
page read and write
|
||
1B2E1000
|
trusted library allocation
|
page read and write
|
||
1B3F9000
|
trusted library allocation
|
page read and write
|
||
1182000
|
heap
|
page read and write
|
||
4ACB000
|
stack
|
page read and write
|
||
995000
|
heap
|
page read and write
|
||
121F000
|
heap
|
page read and write
|
||
238F000
|
stack
|
page read and write
|
||
11D9000
|
heap
|
page read and write
|
||
516C000
|
stack
|
page read and write
|
||
FA9D000
|
stack
|
page read and write
|
||
1189000
|
heap
|
page read and write
|
||
1182000
|
heap
|
page read and write
|
||
1320000
|
heap
|
page read and write
|
||
49CC000
|
stack
|
page read and write
|
||
F4DD000
|
stack
|
page read and write
|
||
D30D000
|
stack
|
page read and write
|
||
1B72B000
|
trusted library allocation
|
page read and write
|
||
11D9000
|
heap
|
page read and write
|
||
CA4E000
|
stack
|
page read and write
|
||
29620000
|
trusted library allocation
|
page read and write
|
||
4918000
|
trusted library allocation
|
page read and write
|
||
1185E000
|
stack
|
page read and write
|
||
11FF000
|
heap
|
page read and write
|
||
69BD000
|
stack
|
page read and write
|
||
10D0000
|
heap
|
page read and write
|
||
71A000
|
trusted library allocation
|
page execute and read and write
|
||
511E000
|
stack
|
page read and write
|
||
1188000
|
heap
|
page read and write
|
||
1EB000
|
stack
|
page read and write
|
||
11A1000
|
heap
|
page read and write
|
||
1BB64000
|
trusted library allocation
|
page read and write
|
||
1200000
|
trusted library allocation
|
page read and write
|
||
A4CD000
|
stack
|
page read and write
|
||
1151000
|
heap
|
page read and write
|
||
5190000
|
heap
|
page read and write
|
||
F95E000
|
stack
|
page read and write
|
||
8250000
|
heap
|
page read and write
|
||
D48D000
|
stack
|
page read and write
|
||
296A8000
|
trusted library allocation
|
page read and write
|
||
298EA000
|
trusted library allocation
|
page read and write
|
||
1189000
|
heap
|
page read and write
|
||
FA5000
|
heap
|
page read and write
|
||
4B1C000
|
stack
|
page read and write
|
||
10D5E000
|
stack
|
page read and write
|
||
4F80000
|
heap
|
page read and write
|
||
11D4000
|
heap
|
page read and write
|
||
115DE000
|
stack
|
page read and write
|
||
C54E000
|
stack
|
page read and write
|
||
11CC000
|
heap
|
page read and write
|
||
4C1C000
|
stack
|
page read and write
|
||
6E7D000
|
stack
|
page read and write
|
||
D1CD000
|
stack
|
page read and write
|
||
1205000
|
heap
|
page read and write
|
||
B24E000
|
stack
|
page read and write
|
||
45CA000
|
trusted library allocation
|
page read and write
|
||
447A000
|
trusted library allocation
|
page read and write
|
||
E10D000
|
stack
|
page read and write
|
||
2945A000
|
trusted library allocation
|
page read and write
|
||
5709000
|
heap
|
page read and write
|
||
EF4E000
|
stack
|
page read and write
|
||
11C7000
|
heap
|
page read and write
|
||
298CA000
|
trusted library allocation
|
page read and write
|
||
11DD000
|
heap
|
page read and write
|
||
11D1000
|
heap
|
page read and write
|
There are 755 hidden memdumps, click here to show them.