Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
6medsM68NX.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
initial sample
|
||
C:\Users\user\AppData\Local\zero\xapp.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\xapp.vbs
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\ageless
|
data
|
dropped
|
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\6medsM68NX.exe
|
"C:\Users\user\Desktop\6medsM68NX.exe"
|
||
C:\Users\user\AppData\Local\zero\xapp.exe
|
"C:\Users\user\Desktop\6medsM68NX.exe"
|
||
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
|
"C:\Users\user\Desktop\6medsM68NX.exe"
|
||
C:\Windows\System32\wscript.exe
|
"C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\xapp.vbs"
|
||
C:\Users\user\AppData\Local\zero\xapp.exe
|
"C:\Users\user\AppData\Local\zero\xapp.exe"
|
||
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
|
"C:\Users\user\AppData\Local\zero\xapp.exe"
|
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
https://api.telegram.org/bot1749457201:AAGWIY2QPzrHZIumAIUsWjyRAEWcJrauccY/
|
unknown
|
||
http://127.0.0.1:HTTP/1.1
|
unknown
|
||
https://api.ipify.org%GETMozilla/5.0
|
unknown
|
||
http://DynDns.comDynDNS
|
unknown
|
||
https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip%tordir%%ha
|
unknown
|
||
http://mbKXcZ.com
|
unknown
|
||
https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip
|
unknown
|
||
https://api.ipify.org%4
|
unknown
|
||
https://api.telegram.org/bot1749457201:AAGWIY2QPzrHZIumAIUsWjyRAEWcJrauccY/sendDocumentdocument-----
|
unknown
|
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
2AD0000
|
direct allocation
|
page read and write
|
||
A40000
|
direct allocation
|
page read and write
|
||
2441000
|
trusted library allocation
|
page read and write
|
||
2621000
|
trusted library allocation
|
page read and write
|
||
702000
|
system
|
page execute and read and write
|
||
700000
|
system
|
page execute and read and write
|
||
4015000
|
heap
|
page read and write
|
||
5C2D000
|
stack
|
page read and write
|
||
85E000
|
heap
|
page read and write
|
||
46E0000
|
direct allocation
|
page read and write
|
||
5ABE000
|
stack
|
page read and write
|
||
42FA000
|
heap
|
page read and write
|
||
23F3000
|
trusted library allocation
|
page read and write
|
||
A5F000
|
heap
|
page read and write
|
||
4B64000
|
trusted library allocation
|
page read and write
|
||
2402000
|
trusted library allocation
|
page read and write
|
||
3AF0000
|
heap
|
page read and write
|
||
7A0000
|
heap
|
page read and write
|
||
5C50000
|
heap
|
page read and write
|
||
4089000
|
heap
|
page read and write
|
||
3FB5000
|
heap
|
page read and write
|
||
4663000
|
direct allocation
|
page read and write
|
||
9A000
|
stack
|
page read and write
|
||
4A7000
|
unkown
|
page read and write
|
||
4AF000
|
unkown
|
page readonly
|
||
3441000
|
trusted library allocation
|
page read and write
|
||
41FF000
|
heap
|
page read and write
|
||
4AF000
|
unkown
|
page readonly
|
||
2412000
|
trusted library allocation
|
page read and write
|
||
4F90000
|
heap
|
page read and write
|
||
A30000
|
heap
|
page read and write
|
||
807000
|
heap
|
page read and write
|
||
400000
|
unkown
|
page readonly
|
||
252DA744000
|
heap
|
page read and write
|
||
3D90000
|
heap
|
page read and write
|
||
9A5000
|
heap
|
page read and write
|
||
4AB000
|
unkown
|
page readonly
|
||
4061000
|
heap
|
page read and write
|
||
400000
|
unkown
|
page readonly
|
||
5423000
|
heap
|
page read and write
|
||
4663000
|
direct allocation
|
page read and write
|
||
38D7000
|
heap
|
page read and write
|
||
608000
|
trusted library allocation
|
page read and write
|
||
2B60000
|
heap
|
page read and write
|
||
7D8000
|
heap
|
page read and write
|
||
40B0000
|
heap
|
page read and write
|
||
3F8E000
|
heap
|
page read and write
|
||
2412000
|
trusted library allocation
|
page read and write
|
||
482000
|
unkown
|
page readonly
|
||
C80000
|
heap
|
page read and write
|
||
7445FFE000
|
stack
|
page read and write
|
||
846000
|
trusted library allocation
|
page execute and read and write
|
||
A90000
|
heap
|
page read and write
|
||
401000
|
unkown
|
page execute read
|
||
8AF000
|
stack
|
page read and write
|
||
490000
|
unkown
|
page read and write
|
||
5E7F000
|
unkown
|
page read and write
|
||
46E0000
|
direct allocation
|
page read and write
|
||
6E8000
|
heap
|
page read and write
|
||
3EE0000
|
heap
|
page read and write
|
||
4663000
|
direct allocation
|
page read and write
|
||
44AB000
|
heap
|
page read and write
|
||
38DF000
|
heap
|
page read and write
|
||
27D5000
|
trusted library allocation
|
page read and write
|
||
4DE0000
|
heap
|
page read and write
|
||
9A8000
|
heap
|
page read and write
|
||
3FA4000
|
heap
|
page read and write
|
||
100000
|
heap
|
page read and write
|
||
4AFE000
|
stack
|
page read and write
|
||
488E000
|
trusted library allocation
|
page read and write
|
||
74459FF000
|
stack
|
page read and write
|
||
187F000
|
stack
|
page read and write
|
||
4809000
|
direct allocation
|
page read and write
|
||
6F7000
|
stack
|
page read and write
|
||
23ED000
|
trusted library allocation
|
page execute and read and write
|
||
7D0000
|
heap
|
page read and write
|
||
3FD4000
|
heap
|
page read and write
|
||
1F0000
|
heap
|
page read and write
|
||
252DA6C0000
|
heap
|
page read and write
|
||
490000
|
unkown
|
page write copy
|
||
487E000
|
direct allocation
|
page read and write
|
||
492000
|
unkown
|
page read and write
|
||
5FDD000
|
stack
|
page read and write
|
||
44A0000
|
direct allocation
|
page read and write
|
||
453E000
|
stack
|
page read and write
|
||
4AF000
|
unkown
|
page readonly
|
||
3FC5000
|
heap
|
page read and write
|
||
4071000
|
heap
|
page read and write
|
||
5E3D000
|
stack
|
page read and write
|
||
491000
|
unkown
|
page write copy
|
||
3621000
|
trusted library allocation
|
page read and write
|
||
414E000
|
heap
|
page read and write
|
||
487E000
|
direct allocation
|
page read and write
|
||
4540000
|
direct allocation
|
page read and write
|
||
400000
|
unkown
|
page readonly
|
||
4663000
|
direct allocation
|
page read and write
|
||
4663000
|
direct allocation
|
page read and write
|
||
490000
|
unkown
|
page write copy
|
||
283F000
|
trusted library allocation
|
page read and write
|
||
24A0000
|
heap
|
page execute and read and write
|
||
8AF000
|
stack
|
page read and write
|
||
9C7000
|
heap
|
page read and write
|
||
482000
|
unkown
|
page readonly
|
||
4663000
|
direct allocation
|
page read and write
|
||
26CA000
|
trusted library allocation
|
page read and write
|
||
93E000
|
stack
|
page read and write
|
||
4B74000
|
trusted library allocation
|
page read and write
|
||
4B3E000
|
trusted library allocation
|
page read and write
|
||
4B78000
|
trusted library allocation
|
page read and write
|
||
44B0000
|
heap
|
page read and write
|
||
2260000
|
heap
|
page read and write
|
||
58BF000
|
stack
|
page read and write
|
||
46E0000
|
direct allocation
|
page read and write
|
||
855000
|
trusted library allocation
|
page execute and read and write
|
||
9A000
|
stack
|
page read and write
|
||
845000
|
heap
|
page read and write
|
||
4540000
|
direct allocation
|
page read and write
|
||
46E0000
|
direct allocation
|
page read and write
|
||
4AF000
|
unkown
|
page readonly
|
||
26D2000
|
trusted library allocation
|
page read and write
|
||
4B66000
|
trusted library allocation
|
page read and write
|
||
252DA6A0000
|
heap
|
page read and write
|
||
2250000
|
trusted library allocation
|
page execute and read and write
|
||
4192000
|
heap
|
page read and write
|
||
810000
|
trusted library allocation
|
page read and write
|
||
4BE0000
|
trusted library allocation
|
page read and write
|
||
23FE000
|
trusted library allocation
|
page read and write
|
||
150000
|
heap
|
page read and write
|
||
ADE000
|
stack
|
page read and write
|
||
74461FB000
|
stack
|
page read and write
|
||
48A0000
|
trusted library allocation
|
page read and write
|
||
122E000
|
stack
|
page read and write
|
||
307F000
|
stack
|
page read and write
|
||
5EDE000
|
stack
|
page read and write
|
||
4809000
|
direct allocation
|
page read and write
|
||
240A000
|
trusted library allocation
|
page execute and read and write
|
||
247E000
|
stack
|
page read and write
|
||
772000
|
heap
|
page read and write
|
||
48E0000
|
trusted library allocation
|
page read and write
|
||
3EB5000
|
heap
|
page read and write
|
||
2FF0000
|
heap
|
page read and write
|
||
4540000
|
direct allocation
|
page read and write
|
||
38D6000
|
heap
|
page read and write
|
||
823000
|
trusted library allocation
|
page execute and read and write
|
||
4E40000
|
heap
|
page execute and read and write
|
||
480D000
|
direct allocation
|
page read and write
|
||
350E000
|
stack
|
page read and write
|
||
4408000
|
heap
|
page read and write
|
||
4070000
|
heap
|
page read and write
|
||
252DA885000
|
heap
|
page read and write
|
||
487E000
|
direct allocation
|
page read and write
|
||
4060000
|
heap
|
page execute and read and write
|
||
100000
|
heap
|
page read and write
|
||
742000
|
heap
|
page read and write
|
||
5A40000
|
trusted library allocation
|
page execute and read and write
|
||
3DDF000
|
heap
|
page read and write
|
||
74460FF000
|
stack
|
page read and write
|
||
56DE000
|
stack
|
page read and write
|
||
4E00000
|
trusted library allocation
|
page execute and read and write
|
||
4809000
|
direct allocation
|
page read and write
|
||
4663000
|
direct allocation
|
page read and write
|
||
3BF0000
|
heap
|
page read and write
|
||
4540000
|
direct allocation
|
page read and write
|
||
5436000
|
heap
|
page read and write
|
||
3E4B000
|
heap
|
page read and write
|
||
480D000
|
direct allocation
|
page read and write
|
||
603E000
|
stack
|
page read and write
|
||
4540000
|
direct allocation
|
page read and write
|
||
46E0000
|
direct allocation
|
page read and write
|
||
8C0000
|
heap
|
page read and write
|
||
5C9E000
|
stack
|
page read and write
|
||
5E1E000
|
stack
|
page read and write
|
||
4186000
|
heap
|
page read and write
|
||
3FC0000
|
heap
|
page read and write
|
||
46E0000
|
direct allocation
|
page read and write
|
||
487E000
|
direct allocation
|
page read and write
|
||
23E3000
|
trusted library allocation
|
page execute and read and write
|
||
8FE000
|
stack
|
page read and write
|
||
4C60000
|
heap
|
page read and write
|
||
4BA0000
|
trusted library allocation
|
page read and write
|
||
2839000
|
trusted library allocation
|
page read and write
|
||
4AB000
|
unkown
|
page readonly
|
||
4182000
|
heap
|
page execute and read and write
|
||
3F13000
|
heap
|
page read and write
|
||
490000
|
unkown
|
page read and write
|
||
487E000
|
direct allocation
|
page read and write
|
||
4663000
|
direct allocation
|
page read and write
|
||
9DE000
|
stack
|
page read and write
|
||
100000
|
heap
|
page read and write
|
||
2401000
|
trusted library allocation
|
page read and write
|
||
5FBF000
|
stack
|
page read and write
|
||
6E5000
|
heap
|
page read and write
|
||
3994000
|
heap
|
page read and write
|
||
480D000
|
direct allocation
|
page read and write
|
||
2420000
|
trusted library allocation
|
page read and write
|
||
2837000
|
trusted library allocation
|
page read and write
|
||
397C000
|
heap
|
page read and write
|
||
4663000
|
direct allocation
|
page read and write
|
||
23B0000
|
trusted library allocation
|
page read and write
|
||
4043000
|
heap
|
page read and write
|
||
7EE000
|
heap
|
page read and write
|
||
4028000
|
heap
|
page read and write
|
||
4A8000
|
unkown
|
page read and write
|
||
9A0000
|
heap
|
page read and write
|
||
85B000
|
trusted library allocation
|
page execute and read and write
|
||
5FFE000
|
stack
|
page read and write
|
||
9C6000
|
heap
|
page read and write
|
||
492000
|
unkown
|
page read and write
|
||
4B3F000
|
stack
|
page read and write
|
||
4062000
|
heap
|
page read and write
|
||
4B20000
|
trusted library allocation
|
page read and write
|
||
4663000
|
direct allocation
|
page read and write
|
||
4540000
|
direct allocation
|
page read and write
|
||
5F0000
|
trusted library allocation
|
page read and write
|
||
147F000
|
stack
|
page read and write
|
||
129E000
|
stack
|
page read and write
|
||
4AF000
|
unkown
|
page readonly
|
||
3510000
|
heap
|
page read and write
|
||
4809000
|
direct allocation
|
page read and write
|
||
487E000
|
direct allocation
|
page read and write
|
||
3E89000
|
heap
|
page read and write
|
||
401000
|
unkown
|
page execute read
|
||
4B29000
|
trusted library allocation
|
page read and write
|
||
4014000
|
heap
|
page read and write
|
||
4809000
|
direct allocation
|
page read and write
|
||
770000
|
heap
|
page read and write
|
||
7FA000
|
heap
|
page read and write
|
||
5EBE000
|
unkown
|
page read and write
|
||
3E80000
|
heap
|
page read and write
|
||
1B7000
|
stack
|
page read and write
|
||
4B95000
|
trusted library allocation
|
page read and write
|
||
1320000
|
heap
|
page read and write
|
||
480D000
|
direct allocation
|
page read and write
|
||
3BBF000
|
stack
|
page read and write
|
||
26C7000
|
trusted library allocation
|
page read and write
|
||
3649000
|
trusted library allocation
|
page read and write
|
||
8B9000
|
stack
|
page read and write
|
||
56C0000
|
heap
|
page read and write
|
||
37BE000
|
stack
|
page read and write
|
||
7445EFE000
|
stack
|
page read and write
|
||
356E000
|
stack
|
page read and write
|
||
4A7000
|
unkown
|
page read and write
|
||
40BA000
|
heap
|
page read and write
|
||
3E74000
|
heap
|
page read and write
|
||
4B38000
|
trusted library allocation
|
page read and write
|
||
3EC9000
|
heap
|
page read and write
|
||
26EE000
|
trusted library allocation
|
page read and write
|
||
4B40000
|
trusted library allocation
|
page read and write
|
||
780000
|
heap
|
page read and write
|
||
4540000
|
direct allocation
|
page read and write
|
||
46E0000
|
direct allocation
|
page read and write
|
||
480D000
|
direct allocation
|
page read and write
|
||
93E000
|
stack
|
page read and write
|
||
236E000
|
stack
|
page read and write
|
||
46E0000
|
direct allocation
|
page read and write
|
||
396F000
|
stack
|
page read and write
|
||
8B0000
|
heap
|
page read and write
|
||
4183000
|
heap
|
page read and write
|
||
482000
|
unkown
|
page readonly
|
||
735000
|
heap
|
page read and write
|
||
9F0000
|
heap
|
page read and write
|
||
9A000
|
stack
|
page read and write
|
||
5A5000
|
heap
|
page read and write
|
||
890000
|
heap
|
page read and write
|
||
400000
|
unkown
|
page readonly
|
||
A30000
|
heap
|
page read and write
|
||
401000
|
unkown
|
page execute read
|
||
46E0000
|
direct allocation
|
page read and write
|
||
4B50000
|
heap
|
page read and write
|
||
3EA1000
|
heap
|
page read and write
|
||
C1E000
|
stack
|
page read and write
|
||
482000
|
unkown
|
page readonly
|
||
3F77000
|
heap
|
page read and write
|
||
4809000
|
direct allocation
|
page read and write
|
||
A80000
|
direct allocation
|
page read and write
|
||
4880000
|
trusted library allocation
|
page read and write
|
||
403A000
|
heap
|
page read and write
|
||
490000
|
unkown
|
page read and write
|
||
4809000
|
direct allocation
|
page read and write
|
||
41D2000
|
heap
|
page read and write
|
||
3F98000
|
heap
|
page read and write
|
||
4B86000
|
trusted library allocation
|
page read and write
|
||
4BB0000
|
heap
|
page execute and read and write
|
||
880000
|
trusted library allocation
|
page read and write
|
||
241B000
|
trusted library allocation
|
page execute and read and write
|
||
3B0C000
|
heap
|
page read and write
|
||
7B0000
|
heap
|
page read and write
|
||
8B4000
|
stack
|
page read and write
|
||
874000
|
heap
|
page read and write
|
||
2417000
|
trusted library allocation
|
page execute and read and write
|
||
23EB000
|
trusted library allocation
|
page read and write
|
||
2C70000
|
heap
|
page read and write
|
||
400000
|
unkown
|
page readonly
|
||
2410000
|
trusted library allocation
|
page read and write
|
||
27DC000
|
trusted library allocation
|
page read and write
|
||
1E0000
|
heap
|
page read and write
|
||
487E000
|
direct allocation
|
page read and write
|
||
482000
|
unkown
|
page readonly
|
||
4B6E000
|
trusted library allocation
|
page read and write
|
||
487E000
|
direct allocation
|
page read and write
|
||
9EE000
|
stack
|
page read and write
|
||
2430000
|
trusted library allocation
|
page read and write
|
||
6EE000
|
heap
|
page read and write
|
||
9D0000
|
heap
|
page read and write
|
||
252DC170000
|
heap
|
page read and write
|
||
4E0E000
|
stack
|
page read and write
|
||
4EC0000
|
trusted library allocation
|
page execute and read and write
|
||
480D000
|
direct allocation
|
page read and write
|
||
23FD000
|
trusted library allocation
|
page execute and read and write
|
||
A10000
|
heap
|
page read and write
|
||
6B0000
|
heap
|
page read and write
|
||
3FDD000
|
heap
|
page read and write
|
||
3F90000
|
heap
|
page read and write
|
||
A6F000
|
heap
|
page read and write
|
||
8B4000
|
stack
|
page read and write
|
||
3DEB000
|
heap
|
page read and write
|
||
4890000
|
trusted library allocation
|
page read and write
|
||
23C0000
|
trusted library allocation
|
page read and write
|
||
59BF000
|
stack
|
page read and write
|
||
3CF0000
|
heap
|
page read and write
|
||
5A0000
|
heap
|
page read and write
|
||
BA000
|
stack
|
page read and write
|
||
7AB000
|
heap
|
page read and write
|
||
492000
|
unkown
|
page read and write
|
||
57E000
|
stack
|
page read and write
|
||
840000
|
trusted library allocation
|
page read and write
|
||
2510000
|
heap
|
page read and write
|
||
252DA794000
|
heap
|
page read and write
|
||
4075000
|
heap
|
page read and write
|
||
4535000
|
direct allocation
|
page read and write
|
||
4809000
|
direct allocation
|
page read and write
|
||
252DA70F000
|
heap
|
page read and write
|
||
4809000
|
direct allocation
|
page read and write
|
||
162F000
|
stack
|
page read and write
|
||
437000
|
system
|
page execute and read and write
|
||
23E0000
|
trusted library allocation
|
page read and write
|
||
4663000
|
direct allocation
|
page read and write
|
||
4540000
|
direct allocation
|
page read and write
|
||
950000
|
heap
|
page read and write
|
||
2429000
|
trusted library allocation
|
page read and write
|
||
3E1C000
|
heap
|
page read and write
|
||
580000
|
heap
|
page read and write
|
||
6A0000
|
trusted library allocation
|
page read and write
|
||
A3A000
|
heap
|
page read and write
|
||
4540000
|
direct allocation
|
page read and write
|
||
170000
|
heap
|
page read and write
|
||
2E90000
|
heap
|
page read and write
|
||
B1E000
|
stack
|
page read and write
|
||
9D0000
|
heap
|
page read and write
|
||
4539000
|
direct allocation
|
page read and write
|
||
3F69000
|
heap
|
page read and write
|
||
4B7E000
|
trusted library allocation
|
page read and write
|
||
26E8000
|
trusted library allocation
|
page read and write
|
||
4AB000
|
unkown
|
page readonly
|
||
23F2000
|
trusted library allocation
|
page read and write
|
||
24F0000
|
trusted library allocation
|
page execute and read and write
|
||
A3E000
|
heap
|
page read and write
|
||
4809000
|
direct allocation
|
page read and write
|
||
3B00000
|
direct allocation
|
page read and write
|
||
4B70000
|
heap
|
page read and write
|
||
4540000
|
direct allocation
|
page read and write
|
||
4B00000
|
trusted library allocation
|
page read and write
|
||
3B07000
|
heap
|
page read and write
|
||
492E000
|
stack
|
page read and write
|
||
C6E000
|
stack
|
page read and write
|
||
2500000
|
trusted library allocation
|
page read and write
|
||
5D1E000
|
unkown
|
page read and write
|
||
1C0000
|
heap
|
page read and write
|
||
252DA77B000
|
heap
|
page read and write
|
||
480D000
|
direct allocation
|
page read and write
|
||
8B9000
|
stack
|
page read and write
|
||
3BA000
|
stack
|
page read and write
|
||
607E000
|
stack
|
page read and write
|
||
82D000
|
trusted library allocation
|
page execute and read and write
|
||
4540000
|
direct allocation
|
page read and write
|
||
4AB000
|
unkown
|
page readonly
|
||
4BA0000
|
trusted library allocation
|
page execute and read and write
|
||
4183000
|
heap
|
page read and write
|
||
9BE000
|
stack
|
page read and write
|
||
3E29000
|
heap
|
page read and write
|
||
6B8000
|
heap
|
page read and write
|
||
2AD2000
|
heap
|
page read and write
|
||
4117000
|
heap
|
page read and write
|
||
4061000
|
heap
|
page read and write
|
||
4540000
|
direct allocation
|
page read and write
|
||
510E000
|
stack
|
page read and write
|
||
8A1000
|
heap
|
page read and write
|
||
401000
|
unkown
|
page execute read
|
||
26DB000
|
trusted library allocation
|
page read and write
|
||
3FD5000
|
heap
|
page read and write
|
||
4663000
|
direct allocation
|
page read and write
|
||
C8E000
|
heap
|
page read and write
|
||
5CFE000
|
stack
|
page read and write
|
||
1230000
|
heap
|
page read and write
|
||
460000
|
heap
|
page read and write
|
||
3E96000
|
heap
|
page read and write
|
||
46E0000
|
direct allocation
|
page read and write
|
||
4183000
|
heap
|
page read and write
|
||
4395000
|
heap
|
page read and write
|
||
2406000
|
trusted library allocation
|
page read and write
|
||
2480000
|
heap
|
page read and write
|
||
617F000
|
stack
|
page read and write
|
||
50CC000
|
stack
|
page read and write
|
||
21AE000
|
stack
|
page read and write
|
||
7445BFE000
|
stack
|
page read and write
|
||
1255000
|
heap
|
page read and write
|
||
852000
|
trusted library allocation
|
page read and write
|
||
9A0000
|
heap
|
page read and write
|
||
3FC4000
|
heap
|
page execute and read and write
|
||
3E12000
|
heap
|
page read and write
|
||
490000
|
unkown
|
page write copy
|
||
A15000
|
heap
|
page read and write
|
||
401000
|
unkown
|
page execute read
|
||
3DD6000
|
heap
|
page read and write
|
||
34A4000
|
trusted library allocation
|
page read and write
|
||
487E000
|
direct allocation
|
page read and write
|
||
26D8000
|
trusted library allocation
|
page read and write
|
||
487E000
|
direct allocation
|
page read and write
|
||
620000
|
trusted library allocation
|
page execute and read and write
|
||
5A20000
|
trusted library allocation
|
page execute and read and write
|
||
950000
|
heap
|
page read and write
|
||
9CE000
|
stack
|
page read and write
|
||
5A1D000
|
stack
|
page read and write
|
||
3BC3000
|
heap
|
page read and write
|
||
252DA5C0000
|
heap
|
page read and write
|
||
4B81000
|
trusted library allocation
|
page read and write
|
||
491000
|
unkown
|
page write copy
|
||
3469000
|
trusted library allocation
|
page read and write
|
||
3CB4000
|
heap
|
page read and write
|
||
47BE000
|
stack
|
page read and write
|
||
8B9000
|
stack
|
page read and write
|
||
4B30000
|
trusted library allocation
|
page read and write
|
||
252DA88E000
|
heap
|
page read and write
|
||
9F4000
|
heap
|
page read and write
|
||
2406000
|
trusted library allocation
|
page execute and read and write
|
||
24EE000
|
stack
|
page read and write
|
||
4AB000
|
unkown
|
page readonly
|
||
4E8E000
|
stack
|
page read and write
|
||
3DF5000
|
heap
|
page read and write
|
||
14E000
|
stack
|
page read and write
|
||
4041000
|
heap
|
page read and write
|
||
4B92000
|
trusted library allocation
|
page read and write
|
||
1E0000
|
heap
|
page read and write
|
||
46E0000
|
direct allocation
|
page read and write
|
||
862000
|
heap
|
page read and write
|
||
830000
|
trusted library allocation
|
page read and write
|
||
8FE000
|
stack
|
page read and write
|
||
252DA880000
|
heap
|
page read and write
|
||
46E0000
|
direct allocation
|
page read and write
|
||
480D000
|
direct allocation
|
page read and write
|
||
870000
|
heap
|
page read and write
|
||
3F43000
|
heap
|
page read and write
|
||
1C5000
|
heap
|
page read and write
|
||
3DE4000
|
heap
|
page read and write
|
||
857000
|
trusted library allocation
|
page execute and read and write
|
||
480D000
|
direct allocation
|
page read and write
|
||
8B4000
|
heap
|
page read and write
|
||
4AB000
|
unkown
|
page readonly
|
||
55DF000
|
stack
|
page read and write
|
||
4AF000
|
unkown
|
page readonly
|
||
7445CFF000
|
stack
|
page read and write
|
||
261F000
|
stack
|
page read and write
|
||
3EF0000
|
heap
|
page read and write
|
||
4809000
|
direct allocation
|
page read and write
|
||
119F000
|
stack
|
page read and write
|
||
7FAF0000
|
trusted library allocation
|
page execute and read and write
|
||
6EC000
|
heap
|
page read and write
|
||
23AC000
|
stack
|
page read and write
|
||
480D000
|
direct allocation
|
page read and write
|
||
842000
|
trusted library allocation
|
page read and write
|
||
2830000
|
trusted library allocation
|
page read and write
|
||
23F0000
|
trusted library allocation
|
page read and write
|
||
11DE000
|
stack
|
page read and write
|
||
4064000
|
heap
|
page read and write
|
||
5CDE000
|
unkown
|
page read and write
|
||
2C74000
|
heap
|
page read and write
|
||
3B5C000
|
heap
|
page read and write
|
||
23E4000
|
trusted library allocation
|
page read and write
|
||
38CE000
|
stack
|
page read and write
|
||
4E10000
|
trusted library allocation
|
page read and write
|
||
824000
|
trusted library allocation
|
page read and write
|
||
756000
|
heap
|
page read and write
|
||
775000
|
heap
|
page read and write
|
||
3EAF000
|
stack
|
page read and write
|
||
4006000
|
heap
|
page read and write
|
||
3CB0000
|
heap
|
page read and write
|
||
21B8000
|
trusted library allocation
|
page read and write
|
||
491000
|
unkown
|
page write copy
|
||
84A000
|
trusted library allocation
|
page execute and read and write
|
||
487E000
|
direct allocation
|
page read and write
|
||
8B4000
|
stack
|
page read and write
|
||
46E0000
|
direct allocation
|
page read and write
|
||
A95000
|
heap
|
page read and write
|
||
487E000
|
direct allocation
|
page read and write
|
||
252DA715000
|
heap
|
page read and write
|
||
3F30000
|
heap
|
page read and write
|
||
2400000
|
trusted library allocation
|
page read and write
|
||
240D000
|
trusted library allocation
|
page read and write
|
||
A62000
|
heap
|
page read and write
|
||
121E000
|
stack
|
page read and write
|
||
760000
|
heap
|
page read and write
|
||
4C2E000
|
stack
|
page read and write
|
||
4193000
|
heap
|
page read and write
|
||
4B8D000
|
trusted library allocation
|
page read and write
|
||
3EB0000
|
heap
|
page read and write
|
||
940000
|
heap
|
page read and write
|
||
48D0000
|
trusted library allocation
|
page read and write
|
||
283B000
|
trusted library allocation
|
page read and write
|
||
6DA000
|
heap
|
page read and write
|
||
9D0000
|
heap
|
page read and write
|
||
83D000
|
trusted library allocation
|
page execute and read and write
|
||
74458FE000
|
stack
|
page read and write
|
||
4DF0000
|
trusted library allocation
|
page execute and read and write
|
||
1D0000
|
heap
|
page read and write
|
||
3184000
|
heap
|
page read and write
|
||
252DA6E0000
|
heap
|
page read and write
|
||
7EE000
|
stack
|
page read and write
|
||
2430000
|
heap
|
page execute and read and write
|
||
3180000
|
heap
|
page read and write
|
||
480D000
|
direct allocation
|
page read and write
|
||
3DE9000
|
heap
|
page read and write
|
||
4B60000
|
trusted library allocation
|
page read and write
|
||
610000
|
trusted library allocation
|
page read and write
|
||
488B000
|
trusted library allocation
|
page read and write
|
||
4809000
|
direct allocation
|
page read and write
|
||
4061000
|
heap
|
page read and write
|
||
3FC8000
|
heap
|
page read and write
|
||
3FCA000
|
heap
|
page read and write
|
||
4663000
|
direct allocation
|
page read and write
|
||
3FC5000
|
heap
|
page read and write
|
||
400000
|
unkown
|
page readonly
|
||
4540000
|
direct allocation
|
page read and write
|
||
23E0000
|
trusted library allocation
|
page read and write
|
||
744555A000
|
stack
|
page read and write
|
||
5DFC000
|
stack
|
page read and write
|
||
1250000
|
heap
|
page read and write
|
||
4EB0000
|
trusted library allocation
|
page execute and read and write
|
||
3FE4000
|
heap
|
page read and write
|
||
C8A000
|
heap
|
page read and write
|
||
480D000
|
direct allocation
|
page read and write
|
||
9FB000
|
heap
|
page read and write
|
||
23EE000
|
trusted library allocation
|
page read and write
|
||
2FF5000
|
heap
|
page read and write
|
||
4809000
|
direct allocation
|
page read and write
|
||
3F1F000
|
heap
|
page read and write
|
||
4DBC000
|
stack
|
page read and write
|
||
4D60000
|
trusted library allocation
|
page execute and read and write
|
||
8AF000
|
stack
|
page read and write
|
||
5463000
|
heap
|
page read and write
|
||
820000
|
trusted library allocation
|
page read and write
|
||
73C000
|
heap
|
page read and write
|
||
283D000
|
trusted library allocation
|
page read and write
|
||
CB7000
|
heap
|
page read and write
|
||
23D0000
|
trusted library allocation
|
page read and write
|
||
60DE000
|
stack
|
page read and write
|
||
4BD0000
|
trusted library allocation
|
page read and write
|
||
482000
|
unkown
|
page readonly
|
||
480D000
|
direct allocation
|
page read and write
|
||
487E000
|
direct allocation
|
page read and write
|
||
7F8D0000
|
trusted library allocation
|
page execute and read and write
|
||
40FF000
|
heap
|
page read and write
|
||
4B89000
|
trusted library allocation
|
page read and write
|
||
3FC5000
|
heap
|
page read and write
|
||
600000
|
trusted library allocation
|
page read and write
|
||
252DA71C000
|
heap
|
page read and write
|
||
401000
|
unkown
|
page execute read
|
||
5702000
|
heap
|
page read and write
|
There are 557 hidden memdumps, click here to show them.