Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
Quote List.scr.exe
|
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
|
initial sample
|
||
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\Quote List.scr.exe.log
|
CSV text
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\XenoManager\Quote List.scr.exe
|
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\XenoManager\Quote List.scr.exe:Zone.Identifier
|
ASCII text, with CRLF line terminators
|
modified
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\0ckz32p0.vg5
|
SQLite 3.x database, last written using SQLite version 3042000, file counter 7, database pages 5, cookie 0x5, schema 4, UTF-8,
version-valid-for 7
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_5ioiwjby.ake.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_bwqyhjhe.u2s.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_hbeov3or.p1k.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_hhbopwi4.atn.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_lm1ge354.lvx.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_pyxud3lx.p3m.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_tgun5iiv.pbv.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_zw4qovnv.0io.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\c0x15ytk.npd
|
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 25, cookie
0xe, schema 4, UTF-8, version-valid-for 1
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\c5oaqdws.cs1
|
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie
0xb, schema 4, UTF-8, version-valid-for 1
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\fsiukqpv.3qa
|
SQLite 3.x database, last written using SQLite version 3042000, file counter 1, database pages 39, cookie 0x20, schema 4,
UTF-8, version-valid-for 1
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\k0d4rjsb.fq1
|
SQLite 3.x database, last written using SQLite version 3042000, file counter 1, database pages 39, cookie 0x20, schema 4,
UTF-8, version-valid-for 1
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\m3w51req.inw
|
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie
0x21, schema 4, UTF-8, version-valid-for 3
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\nsajgeyy.fvp
|
SQLite 3.x database, last written using SQLite version 3042000, file counter 4, database pages 5, cookie 0x3, schema 4, UTF-8,
version-valid-for 4
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\s15sst01.ncp
|
SQLite 3.x database, last written using SQLite version 3042000, file counter 1, database pages 38, cookie 0x1f, schema 4,
UTF-8, version-valid-for 1
|
modified
|
||
C:\Users\user\AppData\Local\Temp\szy1nek2.2qr
|
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 8, database pages 89, cookie
0x36, schema 4, UTF-8, version-valid-for 8
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\xh1c3rgj.evp
|
SQLite 3.x database, last written using SQLite version 3042000, file counter 1, database pages 38, cookie 0x1f, schema 4,
UTF-8, version-valid-for 1
|
dropped
|
There are 13 hidden files, click here to show them.
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\Quote List.scr.exe
|
"C:\Users\user\Desktop\Quote List.scr.exe"
|
||
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
|
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\Quote List.scr.exe"
|
||
C:\Users\user\Desktop\Quote List.scr.exe
|
"C:\Users\user\Desktop\Quote List.scr.exe"
|
||
C:\Users\user\AppData\Local\Temp\XenoManager\Quote List.scr.exe
|
"C:\Users\user\AppData\Local\Temp\XenoManager\Quote List.scr.exe"
|
||
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
|
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Local\Temp\XenoManager\Quote
List.scr.exe"
|
||
C:\Users\user\AppData\Local\Temp\XenoManager\Quote List.scr.exe
|
"C:\Users\user\AppData\Local\Temp\XenoManager\Quote List.scr.exe"
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
66.63.168.142
|
|||
https://ac.ecosia.org/autocomplete?q=
|
unknown
|
||
https://duckduckgo.com/chrome_newtab
|
unknown
|
||
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
|
unknown
|
||
https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
|
unknown
|
||
https://duckduckgo.com/ac/?q=
|
unknown
|
||
https://www.google.com/images/branding/product/ico/googleg_lodp.ico
|
unknown
|
||
https://www.ecosia.org/newtab/
|
unknown
|
||
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
|
unknown
|
||
https://www.chiark.greenend.org.uk/~sgtatham/putty/0
|
unknown
|
||
https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
|
unknown
|
||
https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
|
unknown
|
There are 2 hidden URLs, click here to show them.
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
66.63.168.142
|
unknown
|
United States
|
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
6870000
|
trusted library section
|
page read and write
|
||
293C000
|
trusted library allocation
|
page read and write
|
||
27EE000
|
trusted library allocation
|
page read and write
|
||
2C9E000
|
trusted library allocation
|
page read and write
|
||
402000
|
remote allocation
|
page execute and read and write
|
||
6A00000
|
heap
|
page read and write
|
||
6D5E000
|
heap
|
page read and write
|
||
6A68000
|
heap
|
page read and write
|
||
7A0E000
|
stack
|
page read and write
|
||
1680000
|
trusted library allocation
|
page read and write
|
||
4C3A000
|
trusted library allocation
|
page read and write
|
||
DED000
|
trusted library allocation
|
page execute and read and write
|
||
35DD000
|
trusted library allocation
|
page read and write
|
||
2366000
|
trusted library allocation
|
page execute and read and write
|
||
3619000
|
trusted library allocation
|
page read and write
|
||
3FE000
|
stack
|
page read and write
|
||
4C20000
|
trusted library allocation
|
page read and write
|
||
72E000
|
heap
|
page read and write
|
||
559000
|
stack
|
page read and write
|
||
26DA000
|
trusted library allocation
|
page read and write
|
||
69E0000
|
trusted library allocation
|
page execute and read and write
|
||
7C9E000
|
stack
|
page read and write
|
||
4F8A000
|
trusted library allocation
|
page read and write
|
||
5CBE000
|
stack
|
page read and write
|
||
1383000
|
heap
|
page read and write
|
||
10CC000
|
stack
|
page read and write
|
||
70B0000
|
trusted library allocation
|
page read and write
|
||
CD2E000
|
stack
|
page read and write
|
||
64B2000
|
trusted library allocation
|
page read and write
|
||
4061000
|
trusted library allocation
|
page read and write
|
||
DA5000
|
heap
|
page read and write
|
||
5DC0000
|
heap
|
page read and write
|
||
2710000
|
heap
|
page read and write
|
||
713D000
|
stack
|
page read and write
|
||
3F28000
|
trusted library allocation
|
page read and write
|
||
6712000
|
trusted library allocation
|
page read and write
|
||
4F96000
|
trusted library allocation
|
page read and write
|
||
133E000
|
stack
|
page read and write
|
||
DA8000
|
heap
|
page read and write
|
||
754000
|
heap
|
page read and write
|
||
EFE000
|
heap
|
page read and write
|
||
DF0000
|
heap
|
page read and write
|
||
B74000
|
trusted library allocation
|
page read and write
|
||
4C30000
|
trusted library allocation
|
page read and write
|
||
3C71000
|
trusted library allocation
|
page read and write
|
||
6F9D000
|
stack
|
page read and write
|
||
A65000
|
heap
|
page read and write
|
||
54C0000
|
heap
|
page execute and read and write
|
||
4F91000
|
trusted library allocation
|
page read and write
|
||
70F3000
|
heap
|
page read and write
|
||
4DEF000
|
stack
|
page read and write
|
||
70B5000
|
trusted library allocation
|
page read and write
|
||
15A4000
|
trusted library allocation
|
page read and write
|
||
584A000
|
stack
|
page read and write
|
||
70A0000
|
trusted library allocation
|
page read and write
|
||
4F74000
|
trusted library allocation
|
page read and write
|
||
7020000
|
trusted library allocation
|
page read and write
|
||
4C47000
|
trusted library allocation
|
page read and write
|
||
4AA0000
|
trusted library allocation
|
page read and write
|
||
DE0000
|
trusted library allocation
|
page read and write
|
||
2EF5000
|
trusted library allocation
|
page read and write
|
||
515E000
|
stack
|
page read and write
|
||
CECF000
|
stack
|
page read and write
|
||
6492000
|
trusted library allocation
|
page read and write
|
||
1340000
|
heap
|
page read and write
|
||
5891000
|
heap
|
page read and write
|
||
D00C000
|
stack
|
page read and write
|
||
5180000
|
heap
|
page read and write
|
||
2C2D000
|
stack
|
page read and write
|
||
E20000
|
trusted library allocation
|
page read and write
|
||
234D000
|
trusted library allocation
|
page execute and read and write
|
||
DA0000
|
heap
|
page read and write
|
||
6440000
|
heap
|
page read and write
|
||
820000
|
heap
|
page read and write
|
||
98C000
|
stack
|
page read and write
|
||
72FD000
|
stack
|
page read and write
|
||
30DB000
|
trusted library allocation
|
page read and write
|
||
6439000
|
stack
|
page read and write
|
||
751F000
|
stack
|
page read and write
|
||
7780000
|
trusted library allocation
|
page read and write
|
||
64CA000
|
trusted library allocation
|
page read and write
|
||
1010000
|
heap
|
page read and write
|
||
4EFE000
|
stack
|
page read and write
|
||
7840000
|
heap
|
page execute and read and write
|
||
25CF000
|
stack
|
page read and write
|
||
722E000
|
stack
|
page read and write
|
||
F0B000
|
heap
|
page read and write
|
||
4C60000
|
trusted library allocation
|
page read and write
|
||
5210000
|
trusted library allocation
|
page read and write
|
||
B70000
|
trusted library allocation
|
page read and write
|
||
70FD000
|
stack
|
page read and write
|
||
26E0000
|
heap
|
page read and write
|
||
BB0000
|
trusted library allocation
|
page read and write
|
||
70A0000
|
trusted library allocation
|
page execute and read and write
|
||
69B0000
|
trusted library allocation
|
page read and write
|
||
3E86000
|
trusted library allocation
|
page read and write
|
||
C07000
|
heap
|
page read and write
|
||
2700000
|
heap
|
page execute and read and write
|
||
B90000
|
heap
|
page read and write
|
||
5C00000
|
trusted library allocation
|
page read and write
|
||
52AE000
|
stack
|
page read and write
|
||
151F000
|
stack
|
page read and write
|
||
141E000
|
stack
|
page read and write
|
||
574E000
|
stack
|
page read and write
|
||
6D50000
|
trusted library allocation
|
page read and write
|
||
15CB000
|
trusted library allocation
|
page execute and read and write
|
||
69A0000
|
trusted library allocation
|
page read and write
|
||
1670000
|
trusted library allocation
|
page execute and read and write
|
||
166E000
|
stack
|
page read and write
|
||
502E000
|
stack
|
page read and write
|
||
70B4000
|
heap
|
page read and write
|
||
78A0000
|
trusted library allocation
|
page read and write
|
||
4FD5000
|
trusted library allocation
|
page read and write
|
||
EE9000
|
heap
|
page read and write
|
||
A0E000
|
stack
|
page read and write
|
||
A90000
|
heap
|
page read and write
|
||
267F000
|
trusted library allocation
|
page read and write
|
||
731E000
|
stack
|
page read and write
|
||
4C2B000
|
trusted library allocation
|
page read and write
|
||
B80000
|
trusted library allocation
|
page read and write
|
||
1580000
|
trusted library allocation
|
page read and write
|
||
577E000
|
stack
|
page read and write
|
||
613C000
|
stack
|
page read and write
|
||
5C0E000
|
trusted library allocation
|
page read and write
|
||
235D000
|
trusted library allocation
|
page execute and read and write
|
||
5C04000
|
heap
|
page read and write
|
||
2961000
|
trusted library allocation
|
page read and write
|
||
58BD000
|
stack
|
page read and write
|
||
7949000
|
heap
|
page read and write
|
||
D4C000
|
stack
|
page read and write
|
||
6D50000
|
heap
|
page read and write
|
||
570E000
|
stack
|
page read and write
|
||
2360000
|
trusted library allocation
|
page read and write
|
||
7767000
|
trusted library allocation
|
page read and write
|
||
2350000
|
trusted library allocation
|
page read and write
|
||
5160000
|
trusted library section
|
page readonly
|
||
7050000
|
trusted library section
|
page read and write
|
||
23C3000
|
heap
|
page execute and read and write
|
||
2375000
|
trusted library allocation
|
page execute and read and write
|
||
DA0000
|
heap
|
page read and write
|
||
860000
|
heap
|
page read and write
|
||
646A000
|
trusted library allocation
|
page read and write
|
||
4F70000
|
trusted library allocation
|
page read and write
|
||
40E000
|
remote allocation
|
page execute and read and write
|
||
B8D000
|
trusted library allocation
|
page execute and read and write
|
||
5DD0000
|
heap
|
page read and write
|
||
53AE000
|
stack
|
page read and write
|
||
720000
|
heap
|
page read and write
|
||
26DE000
|
stack
|
page read and write
|
||
CF9000
|
stack
|
page read and write
|
||
78D0000
|
heap
|
page read and write
|
||
5040000
|
trusted library allocation
|
page execute and read and write
|
||
557F000
|
stack
|
page read and write
|
||
2356000
|
trusted library allocation
|
page read and write
|
||
DF0000
|
trusted library allocation
|
page read and write
|
||
2721000
|
trusted library allocation
|
page read and write
|
||
761000
|
heap
|
page read and write
|
||
2428000
|
trusted library allocation
|
page read and write
|
||
16B0000
|
heap
|
page read and write
|
||
3729000
|
trusted library allocation
|
page read and write
|
||
134D000
|
heap
|
page read and write
|
||
A50000
|
trusted library allocation
|
page read and write
|
||
5C3E000
|
stack
|
page read and write
|
||
B6F000
|
stack
|
page read and write
|
||
BA0000
|
trusted library allocation
|
page read and write
|
||
D8E0000
|
trusted library allocation
|
page execute and read and write
|
||
1030000
|
trusted library allocation
|
page read and write
|
||
4D10000
|
trusted library allocation
|
page read and write
|
||
15E0000
|
trusted library allocation
|
page read and write
|
||
580C000
|
stack
|
page read and write
|
||
A4E000
|
stack
|
page read and write
|
||
3EDA000
|
trusted library allocation
|
page read and write
|
||
CC9000
|
heap
|
page read and write
|
||
59FE000
|
stack
|
page read and write
|
||
6450000
|
trusted library allocation
|
page read and write
|
||
47FB000
|
stack
|
page read and write
|
||
7030000
|
trusted library allocation
|
page read and write
|
||
4C50000
|
trusted library allocation
|
page read and write
|
||
5F51000
|
heap
|
page read and write
|
||
6723000
|
heap
|
page read and write
|
||
513E000
|
stack
|
page read and write
|
||
E69000
|
heap
|
page read and write
|
||
7070000
|
trusted library allocation
|
page execute and read and write
|
||
400000
|
remote allocation
|
page execute and read and write
|
||
5DBE000
|
stack
|
page read and write
|
||
E07000
|
trusted library allocation
|
page execute and read and write
|
||
741E000
|
stack
|
page read and write
|
||
7000000
|
trusted library allocation
|
page read and write
|
||
A80000
|
trusted library allocation
|
page read and write
|
||
DD0000
|
trusted library allocation
|
page read and write
|
||
DDF000
|
stack
|
page read and write
|
||
10F0000
|
heap
|
page read and write
|
||
7075000
|
trusted library allocation
|
page read and write
|
||
6461000
|
trusted library allocation
|
page read and write
|
||
6688000
|
trusted library allocation
|
page read and write
|
||
4F7B000
|
trusted library allocation
|
page read and write
|
||
64B9000
|
trusted library allocation
|
page read and write
|
||
12E0000
|
heap
|
page read and write
|
||
5F67000
|
heap
|
page read and write
|
||
4FFE000
|
stack
|
page read and write
|
||
C14000
|
heap
|
page read and write
|
||
3B0000
|
heap
|
page read and write
|
||
70A0000
|
heap
|
page read and write
|
||
790C000
|
heap
|
page read and write
|
||
520D000
|
stack
|
page read and write
|
||
5770000
|
trusted library allocation
|
page read and write
|
||
7779000
|
trusted library allocation
|
page read and write
|
||
DD3000
|
trusted library allocation
|
page execute and read and write
|
||
6480000
|
heap
|
page read and write
|
||
2EBB000
|
trusted library allocation
|
page read and write
|
||
5230000
|
heap
|
page execute and read and write
|
||
78EA000
|
heap
|
page read and write
|
||
108E000
|
stack
|
page read and write
|
||
77B0000
|
trusted library allocation
|
page read and write
|
||
5C7E000
|
stack
|
page read and write
|
||
4C4D000
|
trusted library allocation
|
page read and write
|
||
7761000
|
trusted library allocation
|
page read and write
|
||
5AFE000
|
stack
|
page read and write
|
||
25D1000
|
trusted library allocation
|
page read and write
|
||
236A000
|
trusted library allocation
|
page execute and read and write
|
||
840000
|
heap
|
page read and write
|
||
7B9E000
|
stack
|
page read and write
|
||
BA2000
|
trusted library allocation
|
page read and write
|
||
4C3E000
|
trusted library allocation
|
page read and write
|
||
5C32000
|
trusted library allocation
|
page read and write
|
||
2F20000
|
heap
|
page execute and read and write
|
||
C21000
|
heap
|
page read and write
|
||
E0B000
|
trusted library allocation
|
page execute and read and write
|
||
59FD000
|
stack
|
page read and write
|
||
1040000
|
heap
|
page execute and read and write
|
||
B73000
|
trusted library allocation
|
page execute and read and write
|
||
5DD2000
|
heap
|
page read and write
|
||
35D9000
|
trusted library allocation
|
page read and write
|
||
3F75000
|
trusted library allocation
|
page read and write
|
||
5C70000
|
heap
|
page read and write
|
||
5C2D000
|
trusted library allocation
|
page read and write
|
||
30D5000
|
trusted library allocation
|
page read and write
|
||
5C26000
|
trusted library allocation
|
page read and write
|
||
2370000
|
trusted library allocation
|
page read and write
|
||
865000
|
heap
|
page read and write
|
||
10F9000
|
stack
|
page read and write
|
||
D3D000
|
stack
|
page read and write
|
||
6D9D000
|
stack
|
page read and write
|
||
440000
|
unkown
|
page readonly
|
||
2641000
|
trusted library allocation
|
page read and write
|
||
64D5000
|
trusted library allocation
|
page read and write
|
||
DC0000
|
trusted library allocation
|
page read and write
|
||
5C12000
|
trusted library allocation
|
page read and write
|
||
10D0000
|
trusted library allocation
|
page read and write
|
||
64CF000
|
trusted library allocation
|
page read and write
|
||
60FC000
|
stack
|
page read and write
|
||
71E0000
|
trusted library allocation
|
page execute and read and write
|
||
2C50000
|
heap
|
page read and write
|
||
2343000
|
trusted library allocation
|
page execute and read and write
|
||
5B0000
|
heap
|
page read and write
|
||
64B5000
|
trusted library allocation
|
page read and write
|
||
2F0E000
|
trusted library allocation
|
page read and write
|
||
11D0000
|
heap
|
page read and write
|
||
D76E000
|
stack
|
page read and write
|
||
4D00000
|
heap
|
page read and write
|
||
24C0000
|
heap
|
page read and write
|
||
BAA000
|
trusted library allocation
|
page execute and read and write
|
||
9E0000
|
heap
|
page read and write
|
||
57CE000
|
stack
|
page read and write
|
||
3E32000
|
trusted library allocation
|
page read and write
|
||
66A0000
|
trusted library allocation
|
page read and write
|
||
6990000
|
trusted library allocation
|
page execute and read and write
|
||
4DFD000
|
stack
|
page read and write
|
||
3061000
|
trusted library allocation
|
page read and write
|
||
4CE4000
|
heap
|
page read and write
|
||
5150000
|
heap
|
page read and write
|
||
517E000
|
stack
|
page read and write
|
||
400F000
|
trusted library allocation
|
page read and write
|
||
E5E000
|
heap
|
page read and write
|
||
6674000
|
trusted library allocation
|
page read and write
|
||
74E0000
|
trusted library section
|
page read and write
|
||
D08E000
|
stack
|
page read and write
|
||
27CF000
|
trusted library allocation
|
page read and write
|
||
2F19000
|
trusted library allocation
|
page read and write
|
||
58BC000
|
stack
|
page read and write
|
||
372D000
|
trusted library allocation
|
page read and write
|
||
6F7000
|
stack
|
page read and write
|
||
7903000
|
heap
|
page read and write
|
||
BA6000
|
trusted library allocation
|
page execute and read and write
|
||
B86000
|
trusted library allocation
|
page read and write
|
||
B89000
|
trusted library allocation
|
page read and write
|
||
BB7000
|
trusted library allocation
|
page execute and read and write
|
||
4EE0000
|
trusted library allocation
|
page read and write
|
||
BB5000
|
trusted library allocation
|
page execute and read and write
|
||
7860000
|
trusted library allocation
|
page read and write
|
||
E00000
|
trusted library allocation
|
page read and write
|
||
23C0000
|
heap
|
page execute and read and write
|
||
4C80000
|
trusted library allocation
|
page read and write
|
||
30B0000
|
trusted library allocation
|
page read and write
|
||
6FDE000
|
stack
|
page read and write
|
||
2340000
|
trusted library allocation
|
page read and write
|
||
59B8000
|
stack
|
page read and write
|
||
BEE000
|
heap
|
page read and write
|
||
5DE0000
|
heap
|
page read and write
|
||
543C000
|
stack
|
page read and write
|
||
2D5D000
|
trusted library allocation
|
page read and write
|
||
DD4000
|
trusted library allocation
|
page read and write
|
||
F88000
|
heap
|
page read and write
|
||
4F8E000
|
trusted library allocation
|
page read and write
|
||
514E000
|
stack
|
page read and write
|
||
59BE000
|
stack
|
page read and write
|
||
3FC2000
|
trusted library allocation
|
page read and write
|
||
4FD0000
|
trusted library allocation
|
page read and write
|
||
2791000
|
trusted library allocation
|
page read and write
|
||
587E000
|
stack
|
page read and write
|
||
51CB000
|
stack
|
page read and write
|
||
8F8000
|
stack
|
page read and write
|
||
E05000
|
trusted library allocation
|
page execute and read and write
|
||
3601000
|
trusted library allocation
|
page read and write
|
||
4EF0000
|
heap
|
page execute and read and write
|
||
10F7000
|
heap
|
page read and write
|
||
70CE000
|
heap
|
page read and write
|
||
4EF3000
|
heap
|
page execute and read and write
|
||
23B0000
|
trusted library allocation
|
page read and write
|
||
6D55000
|
trusted library allocation
|
page read and write
|
||
2390000
|
trusted library allocation
|
page read and write
|
||
5BCD000
|
stack
|
page read and write
|
||
442000
|
unkown
|
page readonly
|
||
503E000
|
stack
|
page read and write
|
||
A60000
|
heap
|
page read and write
|
||
23D0000
|
heap
|
page execute and read and write
|
||
4FA2000
|
trusted library allocation
|
page read and write
|
||
D50E000
|
stack
|
page read and write
|
||
4EBF000
|
stack
|
page read and write
|
||
77A0000
|
trusted library allocation
|
page read and write
|
||
305E000
|
stack
|
page read and write
|
||
15A0000
|
trusted library allocation
|
page read and write
|
||
7771000
|
trusted library allocation
|
page read and write
|
||
DF2000
|
trusted library allocation
|
page read and write
|
||
550B000
|
stack
|
page read and write
|
||
E75000
|
heap
|
page read and write
|
||
307F000
|
trusted library allocation
|
page read and write
|
||
4A60000
|
trusted library allocation
|
page read and write
|
||
2359000
|
trusted library allocation
|
page read and write
|
||
5760000
|
trusted library allocation
|
page execute and read and write
|
||
2BEE000
|
stack
|
page read and write
|
||
4C80000
|
trusted library allocation
|
page read and write
|
||
28EB000
|
trusted library allocation
|
page read and write
|
||
7921000
|
heap
|
page read and write
|
||
4FE0000
|
trusted library allocation
|
page read and write
|
||
A7E000
|
stack
|
page read and write
|
||
2F05000
|
trusted library allocation
|
page read and write
|
||
E30000
|
trusted library allocation
|
page execute and read and write
|
||
1540000
|
heap
|
page read and write
|
||
70BF000
|
heap
|
page read and write
|
||
518E000
|
stack
|
page read and write
|
||
6680000
|
trusted library allocation
|
page read and write
|
||
4A90000
|
heap
|
page read and write
|
||
4CA0000
|
trusted library allocation
|
page read and write
|
||
70B0000
|
trusted library allocation
|
page read and write
|
||
587E000
|
stack
|
page read and write
|
||
D040000
|
trusted library allocation
|
page execute and read and write
|
||
633F000
|
stack
|
page read and write
|
||
4FC0000
|
trusted library allocation
|
page read and write
|
||
55BE000
|
stack
|
page read and write
|
||
48FC000
|
stack
|
page read and write
|
||
54C5000
|
heap
|
page read and write
|
||
54B0000
|
heap
|
page read and write
|
||
5860000
|
trusted library allocation
|
page read and write
|
||
25DE000
|
stack
|
page read and write
|
||
30CE000
|
trusted library allocation
|
page read and write
|
||
4C70000
|
trusted library allocation
|
page read and write
|
||
BFF000
|
heap
|
page read and write
|
||
1590000
|
trusted library allocation
|
page read and write
|
||
E40000
|
heap
|
page read and write
|
||
3CC9000
|
trusted library allocation
|
page read and write
|
||
D7C000
|
stack
|
page read and write
|
||
4CDE000
|
stack
|
page read and write
|
||
402F000
|
trusted library allocation
|
page read and write
|
||
30E5000
|
trusted library allocation
|
page read and write
|
||
417F000
|
trusted library allocation
|
page read and write
|
||
2F16000
|
trusted library allocation
|
page read and write
|
||
6DDE000
|
stack
|
page read and write
|
||
7010000
|
heap
|
page execute and read and write
|
||
776B000
|
trusted library allocation
|
page read and write
|
||
9F0000
|
heap
|
page read and write
|
||
12E8000
|
heap
|
page read and write
|
||
BE0000
|
heap
|
page read and write
|
||
7452000
|
trusted library allocation
|
page read and write
|
||
CC2E000
|
stack
|
page read and write
|
||
DDD000
|
trusted library allocation
|
page execute and read and write
|
||
4C7E000
|
stack
|
page read and write
|
||
233F000
|
stack
|
page read and write
|
||
5C06000
|
trusted library allocation
|
page read and write
|
||
BB2000
|
trusted library allocation
|
page read and write
|
||
4C90000
|
trusted library allocation
|
page read and write
|
||
1593000
|
trusted library allocation
|
page execute and read and write
|
||
303F000
|
trusted library allocation
|
page read and write
|
||
740000
|
heap
|
page read and write
|
||
DFA000
|
trusted library allocation
|
page execute and read and write
|
||
7936000
|
heap
|
page read and write
|
||
4C85000
|
trusted library allocation
|
page read and write
|
||
139A000
|
heap
|
page read and write
|
||
801000
|
heap
|
page read and write
|
||
4FA0000
|
trusted library allocation
|
page read and write
|
||
A3F000
|
stack
|
page read and write
|
||
D40F000
|
stack
|
page read and write
|
||
5880000
|
heap
|
page read and write
|
||
5B3E000
|
stack
|
page read and write
|
||
5FFC000
|
stack
|
page read and write
|
||
7070000
|
trusted library allocation
|
page read and write
|
||
2F09000
|
trusted library allocation
|
page read and write
|
||
3075000
|
trusted library allocation
|
page read and write
|
||
533E000
|
stack
|
page read and write
|
||
623C000
|
stack
|
page read and write
|
||
11FB000
|
stack
|
page read and write
|
||
4FB0000
|
trusted library allocation
|
page read and write
|
||
7B50000
|
trusted library allocation
|
page execute and read and write
|
||
4C52000
|
trusted library allocation
|
page read and write
|
||
D8AC000
|
stack
|
page read and write
|
||
5DBC000
|
stack
|
page read and write
|
||
51A0000
|
heap
|
page read and write
|
||
F80000
|
heap
|
page read and write
|
||
6497000
|
trusted library allocation
|
page read and write
|
||
1316000
|
heap
|
page read and write
|
||
5C21000
|
trusted library allocation
|
page read and write
|
||
12FC000
|
stack
|
page read and write
|
||
4C24000
|
trusted library allocation
|
page read and write
|
||
4C41000
|
trusted library allocation
|
page read and write
|
||
748000
|
heap
|
page read and write
|
||
5C1A000
|
trusted library allocation
|
page read and write
|
||
5EC0000
|
heap
|
page read and write
|
||
2372000
|
trusted library allocation
|
page read and write
|
||
460C000
|
stack
|
page read and write
|
||
1380000
|
heap
|
page read and write
|
||
2C61000
|
trusted library allocation
|
page read and write
|
||
D92D000
|
stack
|
page read and write
|
||
4728000
|
trusted library allocation
|
page read and write
|
||
DF6000
|
trusted library allocation
|
page execute and read and write
|
||
4AA9000
|
trusted library allocation
|
page read and write
|
||
6490000
|
trusted library allocation
|
page read and write
|
||
844000
|
heap
|
page read and write
|
||
646D000
|
trusted library allocation
|
page read and write
|
||
54C0000
|
heap
|
page read and write
|
||
5170000
|
heap
|
page read and write
|
||
241E000
|
stack
|
page read and write
|
||
4CE0000
|
heap
|
page read and write
|
||
4AAB000
|
trusted library allocation
|
page read and write
|
||
72B000
|
heap
|
page read and write
|
||
2344000
|
trusted library allocation
|
page read and write
|
||
D66E000
|
stack
|
page read and write
|
||
CF0C000
|
stack
|
page read and write
|
||
5C0B000
|
trusted library allocation
|
page read and write
|
||
3098000
|
trusted library allocation
|
page read and write
|
||
5BD0000
|
heap
|
page read and write
|
||
2362000
|
trusted library allocation
|
page read and write
|
||
4CE0000
|
trusted library allocation
|
page read and write
|
||
72DE000
|
stack
|
page read and write
|
||
54AE000
|
stack
|
page read and write
|
||
56BC000
|
stack
|
page read and write
|
||
5AFE000
|
stack
|
page read and write
|
||
7060000
|
trusted library allocation
|
page read and write
|
||
64A0000
|
trusted library allocation
|
page read and write
|
||
69D0000
|
trusted library allocation
|
page execute and read and write
|
||
E48000
|
heap
|
page read and write
|
||
349000
|
stack
|
page read and write
|
||
1560000
|
heap
|
page read and write
|
||
7D4000
|
heap
|
page read and write
|
||
279B000
|
trusted library allocation
|
page read and write
|
||
162E000
|
stack
|
page read and write
|
||
D18E000
|
stack
|
page read and write
|
||
69C0000
|
trusted library allocation
|
page execute and read and write
|
||
7020000
|
trusted library allocation
|
page execute and read and write
|
||
2DFD000
|
trusted library allocation
|
page read and write
|
||
7B0E000
|
stack
|
page read and write
|
||
5BE0000
|
heap
|
page read and write
|
||
5EBC000
|
stack
|
page read and write
|
||
553E000
|
stack
|
page read and write
|
||
4AB4000
|
heap
|
page read and write
|
||
7830000
|
trusted library allocation
|
page read and write
|
||
6710000
|
trusted library allocation
|
page read and write
|
||
237B000
|
trusted library allocation
|
page execute and read and write
|
||
D210000
|
heap
|
page read and write
|
||
5F00000
|
heap
|
page read and write
|
||
7B10000
|
trusted library section
|
page read and write
|
||
5030000
|
trusted library allocation
|
page read and write
|
||
1594000
|
trusted library allocation
|
page read and write
|
||
2829000
|
trusted library allocation
|
page read and write
|
||
3A0000
|
heap
|
page read and write
|
||
4AB0000
|
heap
|
page read and write
|
||
5750000
|
trusted library section
|
page read and write
|
||
5D7E000
|
stack
|
page read and write
|
||
64DA000
|
trusted library allocation
|
page read and write
|
||
CA30000
|
heap
|
page read and write
|
||
4CD0000
|
heap
|
page read and write
|
||
5C40000
|
trusted library allocation
|
page execute and read and write
|
||
5F5E000
|
heap
|
page read and write
|
||
5C0000
|
heap
|
page read and write
|
||
30D0000
|
trusted library allocation
|
page read and write
|
||
470C000
|
stack
|
page read and write
|
||
15C0000
|
trusted library allocation
|
page read and write
|
||
6D40000
|
trusted library allocation
|
page read and write
|
||
4F9D000
|
trusted library allocation
|
page read and write
|
||
3C89000
|
trusted library allocation
|
page read and write
|
||
7103000
|
heap
|
page read and write
|
||
2C30000
|
trusted library allocation
|
page read and write
|
||
DED000
|
stack
|
page read and write
|
||
733E000
|
stack
|
page read and write
|
||
30C8000
|
trusted library allocation
|
page read and write
|
||
5BFC000
|
stack
|
page read and write
|
||
2377000
|
trusted library allocation
|
page execute and read and write
|
||
130A000
|
heap
|
page read and write
|
||
2F50000
|
heap
|
page read and write
|
||
7850000
|
trusted library allocation
|
page execute and read and write
|
||
1347000
|
heap
|
page read and write
|
||
1690000
|
trusted library allocation
|
page read and write
|
||
5850000
|
trusted library allocation
|
page read and write
|
||
64DF000
|
trusted library allocation
|
page read and write
|
||
E02000
|
trusted library allocation
|
page read and write
|
||
12DE000
|
stack
|
page read and write
|
||
23A0000
|
trusted library allocation
|
page execute and read and write
|
||
64B0000
|
trusted library allocation
|
page read and write
|
||
5870000
|
heap
|
page read and write
|
||
6720000
|
heap
|
page read and write
|
||
D7AC000
|
stack
|
page read and write
|
||
5185000
|
heap
|
page read and write
|
||
64C8000
|
trusted library allocation
|
page read and write
|
||
66B0000
|
trusted library allocation
|
page read and write
|
||
15C7000
|
trusted library allocation
|
page execute and read and write
|
||
7030000
|
trusted library allocation
|
page read and write
|
||
1303000
|
heap
|
page read and write
|
||
7E3000
|
heap
|
page read and write
|
||
6690000
|
trusted library allocation
|
page read and write
|
||
3F82000
|
trusted library allocation
|
page read and write
|
||
CC7000
|
heap
|
page read and write
|
||
5780000
|
trusted library allocation
|
page read and write
|
||
5510000
|
heap
|
page read and write
|
||
4CF0000
|
trusted library allocation
|
page execute and read and write
|
||
DA2E000
|
stack
|
page read and write
|
||
B7D000
|
trusted library allocation
|
page execute and read and write
|
||
7775000
|
trusted library allocation
|
page read and write
|
||
70D2000
|
heap
|
page read and write
|
||
BBB000
|
trusted library allocation
|
page execute and read and write
|
||
2860000
|
trusted library allocation
|
page read and write
|
||
11D5000
|
heap
|
page read and write
|
||
3721000
|
trusted library allocation
|
page read and write
|
||
3C61000
|
trusted library allocation
|
page read and write
|
||
F70000
|
trusted library allocation
|
page execute and read and write
|
||
4C60000
|
trusted library allocation
|
page read and write
|
||
35D1000
|
trusted library allocation
|
page read and write
|
||
4C68000
|
trusted library allocation
|
page read and write
|
||
5050000
|
trusted library allocation
|
page read and write
|
||
BD0000
|
trusted library allocation
|
page read and write
|
||
5190000
|
trusted library section
|
page readonly
|
||
5C1E000
|
trusted library allocation
|
page read and write
|
||
6670000
|
trusted library allocation
|
page read and write
|
||
5670000
|
heap
|
page read and write
|
There are 542 hidden memdumps, click here to show them.