Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
NXPYoHNSgv.exe
|
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
|
initial sample
|
||
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\NXPYoHNSgv.exe.log
|
ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_exhoishc.xrs.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_nv2p2dje.kec.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_pmps5ltr.ytq.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_uwl3as5g.ckd.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\Documents\VIPRecovery\Screenshot.png
|
PNG image data, 1280 x 1024, 8-bit/color RGBA, non-interlaced
|
dropped
|
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\NXPYoHNSgv.exe
|
"C:\Users\user\Desktop\NXPYoHNSgv.exe"
|
||
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
|
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\NXPYoHNSgv.exe"
|
||
C:\Users\user\Desktop\NXPYoHNSgv.exe
|
"C:\Users\user\Desktop\NXPYoHNSgv.exe"
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\wbem\WmiPrvSE.exe
|
C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding
|
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
https://api.telegram.org/bot/sendMessage?chat_id=&text=%20%0D%0A%0D%0APC%20Name:035347%0D%0ADate%20and%20Time:%2008/10/2024%20/%2017:20:50%0D%0ACountry%20Name:%20United%20States%0D%0A%5B%20035347%20Clicked%20on%20the%20File%20If%20you%20see%20nothing%20this's%20mean%20the%20system%20storage's%20empty.%20%5D
|
149.154.167.220
|
||
http://aborters.duckdns.org:8081
|
unknown
|
||
https://www.office.com/
|
unknown
|
||
http://checkip.dyndns.org/
|
132.226.247.73
|
||
http://51.38.247.67:8081/_send_.php?L
|
unknown
|
||
https://api.telegram.org/bot
|
unknown
|
||
http://anotherarmy.dns.army:8081
|
unknown
|
||
http://checkip.dyndns.org/q
|
unknown
|
||
https://reallyfreegeoip.org/xml/8.46.123.33
|
188.114.96.3
|
||
https://chrome.google.com/webstore?hl=en
|
unknown
|
||
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
|
unknown
|
||
http://varders.kozow.com:8081
|
unknown
|
||
http://51.38.247.67:8081/_send_.php?LCapplication/x-www-form-urlencoded
|
unknown
|
||
https://reallyfreegeoip.org/xml/
|
unknown
|
There are 4 hidden URLs, click here to show them.
Domains
Name
|
IP
|
Malicious
|
|
---|---|---|---|
reallyfreegeoip.org
|
188.114.96.3
|
||
api.telegram.org
|
149.154.167.220
|
||
mail.jhxkgroup.online
|
217.12.218.219
|
||
checkip.dyndns.org
|
unknown
|
||
checkip.dyndns.com
|
132.226.247.73
|
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
149.154.167.220
|
api.telegram.org
|
United Kingdom
|
||
217.12.218.219
|
mail.jhxkgroup.online
|
Ukraine
|
||
188.114.96.3
|
reallyfreegeoip.org
|
European Union
|
||
132.226.247.73
|
checkip.dyndns.com
|
United States
|
Registry
Path
|
Value
|
Malicious
|
|
---|---|---|---|
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\NXPYoHNSgv_RASAPI32
|
EnableFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\NXPYoHNSgv_RASAPI32
|
EnableAutoFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\NXPYoHNSgv_RASAPI32
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\NXPYoHNSgv_RASAPI32
|
FileTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\NXPYoHNSgv_RASAPI32
|
ConsoleTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\NXPYoHNSgv_RASAPI32
|
MaxFileSize
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\NXPYoHNSgv_RASAPI32
|
FileDirectory
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\NXPYoHNSgv_RASMANCS
|
EnableFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\NXPYoHNSgv_RASMANCS
|
EnableAutoFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\NXPYoHNSgv_RASMANCS
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\NXPYoHNSgv_RASMANCS
|
FileTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\NXPYoHNSgv_RASMANCS
|
ConsoleTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\NXPYoHNSgv_RASMANCS
|
MaxFileSize
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\NXPYoHNSgv_RASMANCS
|
FileDirectory
|
There are 5 hidden registries, click here to show them.
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
402D000
|
trusted library allocation
|
page read and write
|
||
402000
|
remote allocation
|
page execute and read and write
|
||
3381000
|
trusted library allocation
|
page read and write
|
||
33EC000
|
trusted library allocation
|
page read and write
|
||
3E09000
|
trusted library allocation
|
page read and write
|
||
34B4000
|
trusted library allocation
|
page read and write
|
||
32ED000
|
trusted library allocation
|
page read and write
|
||
78BE000
|
stack
|
page read and write
|
||
117C000
|
stack
|
page read and write
|
||
31E0000
|
trusted library allocation
|
page read and write
|
||
32D8000
|
trusted library allocation
|
page read and write
|
||
3270000
|
heap
|
page read and write
|
||
31B6000
|
trusted library allocation
|
page read and write
|
||
3369000
|
trusted library allocation
|
page read and write
|
||
2CC0000
|
heap
|
page read and write
|
||
5700000
|
heap
|
page read and write
|
||
313A000
|
trusted library allocation
|
page read and write
|
||
7B8E000
|
heap
|
page read and write
|
||
379D000
|
trusted library allocation
|
page read and write
|
||
7105000
|
trusted library allocation
|
page read and write
|
||
7B80000
|
heap
|
page read and write
|
||
1505000
|
trusted library allocation
|
page execute and read and write
|
||
444D000
|
trusted library allocation
|
page read and write
|
||
14C0000
|
trusted library allocation
|
page read and write
|
||
57DE000
|
trusted library allocation
|
page read and write
|
||
1090000
|
trusted library allocation
|
page read and write
|
||
3095000
|
trusted library allocation
|
page read and write
|
||
31FC000
|
stack
|
page read and write
|
||
100E000
|
stack
|
page read and write
|
||
10D0000
|
trusted library allocation
|
page read and write
|
||
73D0000
|
heap
|
page read and write
|
||
69EE000
|
stack
|
page read and write
|
||
118E000
|
heap
|
page read and write
|
||
7090000
|
trusted library allocation
|
page read and write
|
||
5EB4000
|
trusted library allocation
|
page read and write
|
||
73AC000
|
stack
|
page read and write
|
||
6FD0000
|
trusted library allocation
|
page read and write
|
||
6A2E000
|
stack
|
page read and write
|
||
A4D9000
|
heap
|
page read and write
|
||
7A7E000
|
stack
|
page read and write
|
||
74F9000
|
trusted library allocation
|
page read and write
|
||
1410000
|
heap
|
page read and write
|
||
1230000
|
heap
|
page read and write
|
||
7B7F000
|
stack
|
page read and write
|
||
30FD000
|
trusted library allocation
|
page read and write
|
||
6B63000
|
heap
|
page read and write
|
||
7CA0000
|
trusted library allocation
|
page read and write
|
||
31F4000
|
trusted library allocation
|
page read and write
|
||
5240000
|
trusted library allocation
|
page read and write
|
||
ABFE000
|
stack
|
page read and write
|
||
33B1000
|
trusted library allocation
|
page read and write
|
||
6F3E000
|
heap
|
page read and write
|
||
14ED000
|
trusted library allocation
|
page execute and read and write
|
||
A8BE000
|
stack
|
page read and write
|
||
55FB000
|
stack
|
page read and write
|
||
A87E000
|
stack
|
page read and write
|
||
5E40000
|
heap
|
page read and write
|
||
3FD2000
|
trusted library allocation
|
page read and write
|
||
10B0000
|
heap
|
page read and write
|
||
59B0000
|
trusted library allocation
|
page read and write
|
||
70B6000
|
trusted library allocation
|
page read and write
|
||
5690000
|
heap
|
page read and write
|
||
7460000
|
trusted library section
|
page read and write
|
||
7020000
|
trusted library allocation
|
page execute and read and write
|
||
33B9000
|
trusted library allocation
|
page read and write
|
||
70F4000
|
trusted library allocation
|
page read and write
|
||
7F630000
|
trusted library allocation
|
page execute and read and write
|
||
3254000
|
trusted library allocation
|
page read and write
|
||
1450000
|
heap
|
page read and write
|
||
7ECD000
|
stack
|
page read and write
|
||
3285000
|
trusted library allocation
|
page read and write
|
||
6FAD000
|
stack
|
page read and write
|
||
10C6000
|
trusted library allocation
|
page execute and read and write
|
||
6B2E000
|
stack
|
page read and write
|
||
5261000
|
trusted library allocation
|
page read and write
|
||
321E000
|
trusted library allocation
|
page read and write
|
||
77A0000
|
trusted library allocation
|
page read and write
|
||
AAFC000
|
stack
|
page read and write
|
||
34BC000
|
trusted library allocation
|
page read and write
|
||
5340000
|
trusted library allocation
|
page execute and read and write
|
||
3200000
|
heap
|
page execute and read and write
|
||
4381000
|
trusted library allocation
|
page read and write
|
||
32C3000
|
trusted library allocation
|
page read and write
|
||
57E6000
|
trusted library allocation
|
page read and write
|
||
A4C0000
|
heap
|
page read and write
|
||
7120000
|
trusted library allocation
|
page read and write
|
||
1604000
|
heap
|
page read and write
|
||
77E0000
|
trusted library allocation
|
page execute and read and write
|
||
3439000
|
trusted library allocation
|
page read and write
|
||
BFD000
|
stack
|
page read and write
|
||
337E000
|
trusted library allocation
|
page read and write
|
||
311E000
|
stack
|
page read and write
|
||
2DE0000
|
trusted library allocation
|
page read and write
|
||
3178000
|
trusted library allocation
|
page read and write
|
||
98B0000
|
heap
|
page read and write
|
||
5860000
|
trusted library section
|
page read and write
|
||
5272000
|
trusted library allocation
|
page read and write
|
||
33B4000
|
trusted library allocation
|
page read and write
|
||
5290000
|
trusted library allocation
|
page read and write
|
||
30E8000
|
trusted library allocation
|
page read and write
|
||
1500000
|
trusted library allocation
|
page read and write
|
||
A9FC000
|
stack
|
page read and write
|
||
6BAD000
|
heap
|
page read and write
|
||
3220000
|
heap
|
page read and write
|
||
2DD0000
|
trusted library allocation
|
page execute and read and write
|
||
7B85000
|
heap
|
page read and write
|
||
6FF0000
|
trusted library allocation
|
page read and write
|
||
56A0000
|
heap
|
page read and write
|
||
5EA0000
|
trusted library allocation
|
page read and write
|
||
5320000
|
heap
|
page read and write
|
||
1180000
|
heap
|
page read and write
|
||
3209000
|
trusted library allocation
|
page read and write
|
||
782B000
|
stack
|
page read and write
|
||
10B5000
|
heap
|
page read and write
|
||
52E0000
|
trusted library allocation
|
page read and write
|
||
57ED000
|
trusted library allocation
|
page read and write
|
||
7052000
|
trusted library allocation
|
page read and write
|
||
337F000
|
stack
|
page read and write
|
||
10D7000
|
trusted library allocation
|
page execute and read and write
|
||
6FC0000
|
trusted library allocation
|
page execute and read and write
|
||
14B0000
|
trusted library allocation
|
page read and write
|
||
3126000
|
trusted library allocation
|
page read and write
|
||
6CED000
|
stack
|
page read and write
|
||
77C0000
|
heap
|
page read and write
|
||
52B0000
|
trusted library allocation
|
page read and write
|
||
1093000
|
trusted library allocation
|
page execute and read and write
|
||
3E01000
|
trusted library allocation
|
page read and write
|
||
7840000
|
trusted library allocation
|
page read and write
|
||
10DB000
|
trusted library allocation
|
page execute and read and write
|
||
3355000
|
trusted library allocation
|
page read and write
|
||
6FE0000
|
trusted library allocation
|
page execute and read and write
|
||
1518000
|
heap
|
page read and write
|
||
3398000
|
trusted library allocation
|
page read and write
|
||
185D000
|
stack
|
page read and write
|
||
38E3000
|
trusted library allocation
|
page read and write
|
||
5244000
|
trusted library allocation
|
page read and write
|
||
3271000
|
trusted library allocation
|
page read and write
|
||
30BF000
|
trusted library allocation
|
page read and write
|
||
7000000
|
trusted library allocation
|
page execute and read and write
|
||
10F0000
|
trusted library allocation
|
page read and write
|
||
181D000
|
stack
|
page read and write
|
||
68EE000
|
stack
|
page read and write
|
||
5C8E000
|
stack
|
page read and write
|
||
31A2000
|
trusted library allocation
|
page read and write
|
||
15DB000
|
heap
|
page read and write
|
||
98A0000
|
heap
|
page read and write
|
||
7F7E000
|
stack
|
page read and write
|
||
5903000
|
heap
|
page read and write
|
||
34B8000
|
trusted library allocation
|
page read and write
|
||
10AD000
|
trusted library allocation
|
page execute and read and write
|
||
11BF000
|
heap
|
page read and write
|
||
70A0000
|
trusted library allocation
|
page execute and read and write
|
||
8F7E000
|
trusted library allocation
|
page read and write
|
||
3128000
|
trusted library allocation
|
page read and write
|
||
547D000
|
stack
|
page read and write
|
||
1080000
|
trusted library allocation
|
page read and write
|
||
70B0000
|
trusted library allocation
|
page read and write
|
||
3340000
|
trusted library allocation
|
page read and write
|
||
1197000
|
stack
|
page read and write
|
||
3111000
|
trusted library allocation
|
page read and write
|
||
70C6000
|
trusted library allocation
|
page read and write
|
||
1502000
|
trusted library allocation
|
page read and write
|
||
7130000
|
trusted library allocation
|
page read and write
|
||
1538000
|
heap
|
page read and write
|
||
2DF0000
|
heap
|
page execute and read and write
|
||
30D0000
|
trusted library allocation
|
page read and write
|
||
B3A000
|
stack
|
page read and write
|
||
150B000
|
trusted library allocation
|
page execute and read and write
|
||
43E6000
|
trusted library allocation
|
page read and write
|
||
3384000
|
trusted library allocation
|
page read and write
|
||
7102000
|
trusted library allocation
|
page read and write
|
||
1030000
|
heap
|
page read and write
|
||
BB0000
|
heap
|
page read and write
|
||
147F000
|
stack
|
page read and write
|
||
314F000
|
trusted library allocation
|
page read and write
|
||
7C80000
|
trusted library allocation
|
page read and write
|
||
A02000
|
unkown
|
page readonly
|
||
57E1000
|
trusted library allocation
|
page read and write
|
||
7C90000
|
trusted library allocation
|
page read and write
|
||
33D9000
|
trusted library allocation
|
page read and write
|
||
33E0000
|
trusted library allocation
|
page read and write
|
||
3240000
|
trusted library allocation
|
page read and write
|
||
78FE000
|
stack
|
page read and write
|
||
6CAF000
|
stack
|
page read and write
|
||
5350000
|
trusted library allocation
|
page read and write
|
||
3302000
|
trusted library allocation
|
page read and write
|
||
11C2000
|
heap
|
page read and write
|
||
7F95000
|
heap
|
page read and write
|
||
A4AE000
|
stack
|
page read and write
|
||
7110000
|
trusted library allocation
|
page read and write
|
||
BA0000
|
heap
|
page read and write
|
||
A00000
|
unkown
|
page readonly
|
||
1225000
|
heap
|
page read and write
|
||
1507000
|
trusted library allocation
|
page execute and read and write
|
||
14F0000
|
trusted library allocation
|
page read and write
|
||
332B000
|
trusted library allocation
|
page read and write
|
||
190E000
|
stack
|
page read and write
|
||
446000
|
remote allocation
|
page execute and read and write
|
||
57C0000
|
trusted library allocation
|
page read and write
|
||
10A0000
|
trusted library allocation
|
page read and write
|
||
10D2000
|
trusted library allocation
|
page read and write
|
||
32AF000
|
trusted library allocation
|
page read and write
|
||
30AA000
|
trusted library allocation
|
page read and write
|
||
3260000
|
trusted library allocation
|
page read and write
|
||
77D0000
|
heap
|
page read and write
|
||
109D000
|
trusted library allocation
|
page execute and read and write
|
||
14F2000
|
trusted library allocation
|
page read and write
|
||
EF7000
|
stack
|
page read and write
|
||
56A5000
|
heap
|
page read and write
|
||
5330000
|
trusted library allocation
|
page read and write
|
||
6F30000
|
heap
|
page read and write
|
||
3164000
|
trusted library allocation
|
page read and write
|
||
4464000
|
trusted library allocation
|
page read and write
|
||
6FB0000
|
trusted library allocation
|
page read and write
|
||
2C28000
|
trusted library allocation
|
page read and write
|
||
5E30000
|
heap
|
page read and write
|
||
6FBD000
|
trusted library allocation
|
page read and write
|
||
2E01000
|
trusted library allocation
|
page read and write
|
||
33AD000
|
trusted library allocation
|
page read and write
|
||
14A0000
|
heap
|
page read and write
|
||
5EBA000
|
trusted library allocation
|
page read and write
|
||
52C0000
|
heap
|
page read and write
|
||
75A9000
|
stack
|
page read and write
|
||
10CA000
|
trusted library allocation
|
page execute and read and write
|
||
52C3000
|
heap
|
page read and write
|
||
3250000
|
trusted library allocation
|
page read and write
|
||
3210000
|
trusted library allocation
|
page execute and read and write
|
||
11B4000
|
heap
|
page read and write
|
||
6E2E000
|
stack
|
page read and write
|
||
57F2000
|
trusted library allocation
|
page read and write
|
||
524B000
|
trusted library allocation
|
page read and write
|
||
7C85000
|
trusted library allocation
|
page read and write
|
||
14F6000
|
trusted library allocation
|
page execute and read and write
|
||
1465000
|
heap
|
page read and write
|
||
31CB000
|
trusted library allocation
|
page read and write
|
||
329A000
|
trusted library allocation
|
page read and write
|
||
3232000
|
trusted library allocation
|
page read and write
|
||
400000
|
remote allocation
|
page execute and read and write
|
||
A9BF000
|
stack
|
page read and write
|
||
33CD000
|
trusted library allocation
|
page read and write
|
||
1547000
|
heap
|
page read and write
|
||
5E5E000
|
heap
|
page read and write
|
||
57CB000
|
trusted library allocation
|
page read and write
|
||
A63E000
|
stack
|
page read and write
|
||
5570000
|
heap
|
page execute and read and write
|
||
8F76000
|
trusted library allocation
|
page read and write
|
||
5800000
|
heap
|
page read and write
|
||
1037000
|
heap
|
page read and write
|
||
120C000
|
heap
|
page read and write
|
||
6C6D000
|
stack
|
page read and write
|
||
57CE000
|
trusted library allocation
|
page read and write
|
||
14FA000
|
trusted library allocation
|
page execute and read and write
|
||
171D000
|
stack
|
page read and write
|
||
5900000
|
heap
|
page read and write
|
||
1094000
|
trusted library allocation
|
page read and write
|
||
7400000
|
trusted library allocation
|
page read and write
|
||
113E000
|
stack
|
page read and write
|
||
14D0000
|
heap
|
page read and write
|
||
33E4000
|
trusted library allocation
|
page read and write
|
||
3427000
|
trusted library allocation
|
page read and write
|
||
14D7000
|
heap
|
page read and write
|
||
8F79000
|
trusted library allocation
|
page read and write
|
||
7F90000
|
heap
|
page read and write
|
||
6B30000
|
heap
|
page read and write
|
||
525E000
|
trusted library allocation
|
page read and write
|
||
74F0000
|
trusted library allocation
|
page read and write
|
||
318D000
|
trusted library allocation
|
page read and write
|
||
5332000
|
trusted library allocation
|
page read and write
|
||
8A9D000
|
stack
|
page read and write
|
||
5D8E000
|
stack
|
page read and write
|
||
6B9C000
|
heap
|
page read and write
|
||
7DBE000
|
stack
|
page read and write
|
||
14C4000
|
trusted library allocation
|
page read and write
|
||
33B7000
|
trusted library allocation
|
page read and write
|
||
7100000
|
trusted library allocation
|
page read and write
|
||
14CD000
|
trusted library allocation
|
page execute and read and write
|
||
7FA0000
|
trusted library allocation
|
page read and write
|
||
7500000
|
trusted library allocation
|
page read and write
|
||
6E6E000
|
stack
|
page read and write
|
||
3087000
|
trusted library allocation
|
page read and write
|
||
1252000
|
heap
|
page read and write
|
||
757E000
|
stack
|
page read and write
|
||
5B8D000
|
stack
|
page read and write
|
||
A77E000
|
stack
|
page read and write
|
||
2DCE000
|
stack
|
page read and write
|
||
717A000
|
stack
|
page read and write
|
||
580E000
|
stack
|
page read and write
|
||
5266000
|
trusted library allocation
|
page read and write
|
||
3247000
|
trusted library allocation
|
page read and write
|
||
A73E000
|
stack
|
page read and write
|
||
10C2000
|
trusted library allocation
|
page read and write
|
||
55A0000
|
trusted library allocation
|
page execute and read and write
|
||
10C0000
|
trusted library allocation
|
page read and write
|
||
767F000
|
stack
|
page read and write
|
||
1545000
|
heap
|
page read and write
|
||
6EAD000
|
stack
|
page read and write
|
||
1060000
|
heap
|
page read and write
|
||
5EB6000
|
trusted library allocation
|
page read and write
|
||
5600000
|
trusted library section
|
page readonly
|
||
5B40000
|
heap
|
page execute and read and write
|
||
30D3000
|
trusted library allocation
|
page read and write
|
||
6DED000
|
stack
|
page read and write
|
||
14E0000
|
trusted library allocation
|
page read and write
|
||
7190000
|
trusted library allocation
|
page execute and read and write
|
||
73E0000
|
heap
|
page read and write
|
||
1400000
|
heap
|
page read and write
|
||
137E000
|
stack
|
page read and write
|
||
7030000
|
trusted library allocation
|
page execute and read and write
|
||
325C000
|
trusted library allocation
|
page read and write
|
||
14A7000
|
heap
|
page read and write
|
||
109A000
|
stack
|
page read and write
|
||
5280000
|
trusted library allocation
|
page read and write
|
||
7530000
|
trusted library allocation
|
page execute and read and write
|
||
526D000
|
trusted library allocation
|
page read and write
|
||
1460000
|
heap
|
page read and write
|
||
7180000
|
trusted library allocation
|
page read and write
|
||
14C3000
|
trusted library allocation
|
page execute and read and write
|
||
3316000
|
trusted library allocation
|
page read and write
|
||
52A5000
|
trusted library allocation
|
page read and write
|
||
1510000
|
heap
|
page read and write
|
||
1050000
|
heap
|
page read and write
|
||
56B0000
|
heap
|
page read and write
|
||
10A3000
|
trusted library allocation
|
page read and write
|
||
52A0000
|
trusted library allocation
|
page read and write
|
||
76AD000
|
stack
|
page read and write
|
||
4EFC000
|
stack
|
page read and write
|
There are 316 hidden memdumps, click here to show them.