Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
SecuriteInfo.com.FileRepMalware.16359.15944.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
|
initial sample
|
||
C:\Program Files (x86)\Common Files\Microsoft Shared\scheduler\jusched32.exe
|
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\Common Files\Microsoft Shared\scheduler\mssched.exe
|
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\nsl5176.tmp\DotNetChecker.dll
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\Common Files\Microsoft Shared\scheduler\AWSSDK.Core.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\Common Files\Microsoft Shared\scheduler\AWSSDK.S3.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\Common Files\Microsoft Shared\scheduler\KillProcPCTT.exe
|
PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\Common Files\Microsoft Shared\scheduler\Newtonsoft.Json.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\mssched.exe.log
|
CSV text
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\KillProcPCTT.exe.log
|
CSV text
|
modified
|
||
C:\Users\user\AppData\Local\Microsoft\mssched.exe_Url_4gcyhmu3ku50ql3oveaqzgvl21ncnjvy\1.0.0.71\user.config (copy)
|
XML 1.0 document, ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\mssched.exe_Url_4gcyhmu3ku50ql3oveaqzgvl21ncnjvy\1.0.0.71\xonhjdd2.newcfg
|
XML 1.0 document, ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Roaming\376483\user_ebteme\1729898892.jpg
|
JPEG image data, JFIF standard 1.01, resolution (DPI), density 96x96, segment length 16, baseline, precision 8, 1280x1024,
components 3
|
dropped
|
||
\Device\ConDrv
|
ASCII text, with CRLF line terminators
|
dropped
|
There are 4 hidden files, click here to show them.
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.16359.15944.exe
|
"C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.16359.15944.exe"
|
||
C:\Program Files (x86)\Common Files\Microsoft Shared\scheduler\mssched.exe
|
"C:\Program Files (x86)\Common Files\Microsoft Shared\scheduler\mssched.exe" -f SecuriteInfo.com.FileRepMalware.16359.15944.exe
|
||
C:\Program Files (x86)\Common Files\Microsoft Shared\scheduler\mssched.exe
|
"C:\Program Files (x86)\Common Files\Microsoft Shared\scheduler\mssched.exe"
|
||
C:\Program Files (x86)\Common Files\Microsoft Shared\scheduler\KillProcPCTT.exe
|
"C:\Program Files (x86)\Common Files\Microsoft Shared\scheduler\KillProcPCTT.exe
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
http://docs.aws.amazon.com/sdk-for-net/v3/developer-guide/net-dg-config-creds.html
|
unknown
|
||
https://sectigo.com/CPS0
|
unknown
|
||
http://169.254.170.2
|
unknown
|
||
http://crl.sectigo.com/SectigoPublicCodeSigningRootR46.crl0
|
unknown
|
||
http://ocsp.sectigo.com0
|
unknown
|
||
https://pctattletale.com/app/Authenticationv14.php/AddComputer
|
unknown
|
||
http://crt.sectigo.com/SectigoPublicCodeSigningCAR36.crt0#
|
unknown
|
||
https://www.newtonsoft.com/json
|
unknown
|
||
http://s3.amazonaws.com/doc/2006-03-01/
|
unknown
|
||
http://169.254.170.2aUnable
|
unknown
|
||
http://crt.sectigo.com/SectigoPublicCodeSigningRootR46.p7c0#
|
unknown
|
||
http://nsis.sf.net/NSIS_ErrorError
|
unknown
|
||
http://www.pctattletale.com/members/autologinfirstrun.php?AuthKey=
|
unknown
|
||
https://pctattletale.com/app/Authenticationv14.php/SendKeyStrokes
|
unknown
|
||
https://pctattletale.com/app/Authenticationv14.php/CreateAccount
|
unknown
|
||
http://james.newtonking.com/projects/json
|
unknown
|
||
https://pctattletale.com/app/Authenticationv14.php/AddExclusionAccount
|
unknown
|
||
http://pctattletale.com/amazonfix.php
|
unknown
|
||
https://pctattletale.com/app/Authenticationv14.php/DeleteComputer
|
unknown
|
||
https://pctattletale.com:443/app/Authenticationv14.php
|
unknown
|
||
http://crl.sectigo.com/SectigoPublicCodeSigningCAR36.crl0y
|
unknown
|
||
http://docs.aws.amazon.com/AmazonS3/latest/dev/BucketRestrictions.html)
|
unknown
|
||
http://www.pctattletale.com/members/forgotpassword.php
|
unknown
|
||
https://www.newtonsoft.com/jsonschema
|
unknown
|
||
https://ip-ranges.amazonaws.com/ip-ranges.json
|
unknown
|
||
https://www.nuget.org/packages/Newtonsoft.Json.Bson
|
unknown
|
||
http://www.pctattletale.com/removal.php
|
unknown
|
||
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
|
unknown
|
||
http://169.254.169.254
|
unknown
|
||
https://pctattletale.com/members/signup.php?source=PCTTSiteWinDownloadqhttp://www.pctattletale.com/m
|
unknown
|
||
https://pctattletale.com/app/Authenticationv14.php/GetComputerStatus
|
unknown
|
There are 21 hidden URLs, click here to show them.
Registry
Path
|
Value
|
Malicious
|
|
---|---|---|---|
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run
|
scheduler
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System
|
HideFastUserSwitching
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349
|
Blob
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349
|
Blob
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349
|
Blob
|
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
125E4BF8000
|
heap
|
page read and write
|
||
1FC13F20000
|
heap
|
page read and write
|
||
21DE000
|
stack
|
page read and write
|
||
40A000
|
unkown
|
page read and write
|
||
627000
|
heap
|
page read and write
|
||
1FC2E2B0000
|
heap
|
page execute and read and write
|
||
7FF848E30000
|
trusted library allocation
|
page execute and read and write
|
||
2A58FF000
|
stack
|
page read and write
|
||
1FC2E262000
|
trusted library section
|
page read and write
|
||
42C000
|
unkown
|
page read and write
|
||
2500000
|
trusted library allocation
|
page execute and read and write
|
||
125CA9F5000
|
heap
|
page read and write
|
||
7FF848F25000
|
trusted library allocation
|
page read and write
|
||
7FF848F30000
|
trusted library allocation
|
page execute and read and write
|
||
63E000
|
heap
|
page read and write
|
||
3C4000
|
unkown
|
page readonly
|
||
7FF848D53000
|
trusted library allocation
|
page execute and read and write
|
||
7FF848F60000
|
trusted library allocation
|
page execute and read and write
|
||
7C0000
|
heap
|
page read and write
|
||
1FC2E43F000
|
heap
|
page read and write
|
||
1FC13C70000
|
unkown
|
page readonly
|
||
2A50FE000
|
stack
|
page read and write
|
||
7FF848F55000
|
trusted library allocation
|
page read and write
|
||
1FC15C73000
|
trusted library allocation
|
page read and write
|
||
408000
|
unkown
|
page readonly
|
||
90E000
|
stack
|
page read and write
|
||
7FF848E0C000
|
trusted library allocation
|
page execute and read and write
|
||
1FC2E600000
|
heap
|
page read and write
|
||
125DC3A8000
|
trusted library allocation
|
page read and write
|
||
7FF848F50000
|
trusted library allocation
|
page read and write
|
||
36E1000
|
trusted library allocation
|
page read and write
|
||
125CC220000
|
heap
|
page read and write
|
||
3C0000
|
unkown
|
page readonly
|
||
1FC2FA10000
|
heap
|
page execute and read and write
|
||
24B0000
|
trusted library allocation
|
page read and write
|
||
7FF848D7B000
|
trusted library allocation
|
page execute and read and write
|
||
CB0000
|
heap
|
page read and write
|
||
1FC2E429000
|
heap
|
page read and write
|
||
7FF848D94000
|
trusted library allocation
|
page read and write
|
||
125CA7B8000
|
heap
|
page read and write
|
||
A50000
|
heap
|
page read and write
|
||
1FC15C8A000
|
trusted library allocation
|
page read and write
|
||
1FC15C96000
|
trusted library allocation
|
page read and write
|
||
1FC1402E000
|
heap
|
page read and write
|
||
36E4000
|
trusted library allocation
|
page read and write
|
||
624000
|
heap
|
page read and write
|
||
213E000
|
stack
|
page read and write
|
||
A1576FC000
|
stack
|
page read and write
|
||
1FC1403B000
|
heap
|
page read and write
|
||
1FC13FB0000
|
trusted library allocation
|
page read and write
|
||
1FC2E4B0000
|
heap
|
page read and write
|
||
449000
|
unkown
|
page readonly
|
||
1FC308F0000
|
heap
|
page read and write
|
||
125CC3A1000
|
trusted library allocation
|
page read and write
|
||
5C0000
|
heap
|
page read and write
|
||
7FF848D9D000
|
trusted library allocation
|
page execute and read and write
|
||
1FC15BA2000
|
trusted library allocation
|
page read and write
|
||
1FC15C36000
|
trusted library allocation
|
page read and write
|
||
1FC15BE7000
|
trusted library allocation
|
page read and write
|
||
1FC2FAB2000
|
unkown
|
page readonly
|
||
125CA9F0000
|
heap
|
page read and write
|
||
450000
|
heap
|
page read and write
|
||
7FF848F10000
|
trusted library allocation
|
page read and write
|
||
A4E000
|
stack
|
page read and write
|
||
7EF000
|
stack
|
page read and write
|
||
125CA7BD000
|
heap
|
page read and write
|
||
440000
|
unkown
|
page read and write
|
||
1FC15B94000
|
trusted library allocation
|
page read and write
|
||
1FC15BCF000
|
trusted library allocation
|
page read and write
|
||
125CA9D0000
|
trusted library allocation
|
page read and write
|
||
1FC2F64B000
|
heap
|
page read and write
|
||
1FC15BE4000
|
trusted library allocation
|
page read and write
|
||
910000
|
heap
|
page read and write
|
||
125CA770000
|
heap
|
page read and write
|
||
1FC15C69000
|
trusted library allocation
|
page read and write
|
||
1FC15A14000
|
trusted library allocation
|
page read and write
|
||
1FC2E110000
|
trusted library section
|
page readonly
|
||
CA0000
|
trusted library allocation
|
page read and write
|
||
1FC2E605000
|
heap
|
page read and write
|
||
1FC14190000
|
heap
|
page read and write
|
||
125CA790000
|
heap
|
page read and write
|
||
A156DB4000
|
stack
|
page read and write
|
||
7FF848E00000
|
trusted library allocation
|
page read and write
|
||
1FC13EE0000
|
heap
|
page read and write
|
||
1FC2E406000
|
heap
|
page read and write
|
||
249B000
|
trusted library allocation
|
page execute and read and write
|
||
3705000
|
trusted library allocation
|
page read and write
|
||
1FC15C6E000
|
trusted library allocation
|
page read and write
|
||
23D0000
|
heap
|
page read and write
|
||
2464000
|
trusted library allocation
|
page read and write
|
||
125CA799000
|
heap
|
page read and write
|
||
638000
|
heap
|
page read and write
|
||
A1579FE000
|
stack
|
page read and write
|
||
1FC13FEA000
|
heap
|
page read and write
|
||
7FF848E06000
|
trusted library allocation
|
page read and write
|
||
19A000
|
stack
|
page read and write
|
||
125E4BF6000
|
heap
|
page read and write
|
||
1FC13FC0000
|
heap
|
page read and write
|
||
7FF4E1200000
|
trusted library allocation
|
page execute and read and write
|
||
7FF848E36000
|
trusted library allocation
|
page execute and read and write
|
||
2490000
|
trusted library allocation
|
page read and write
|
||
7FF848D74000
|
trusted library allocation
|
page read and write
|
||
7FF848E26000
|
trusted library allocation
|
page read and write
|
||
1FC15C5F000
|
trusted library allocation
|
page read and write
|
||
1FC14000000
|
heap
|
page read and write
|
||
63F000
|
heap
|
page read and write
|
||
1FC14110000
|
heap
|
page read and write
|
||
7FF848D90000
|
trusted library allocation
|
page read and write
|
||
1FC15BA8000
|
trusted library allocation
|
page read and write
|
||
7FF848D54000
|
trusted library allocation
|
page read and write
|
||
627000
|
heap
|
page read and write
|
||
1FC15CB5000
|
trusted library allocation
|
page read and write
|
||
1FC25951000
|
trusted library allocation
|
page read and write
|
||
1FC2E1E0000
|
heap
|
page read and write
|
||
1FC15BDB000
|
trusted library allocation
|
page read and write
|
||
2470000
|
trusted library allocation
|
page read and write
|
||
431000
|
unkown
|
page read and write
|
||
633000
|
heap
|
page read and write
|
||
1FC15B9A000
|
trusted library allocation
|
page read and write
|
||
5F8000
|
heap
|
page read and write
|
||
1FC14113000
|
heap
|
page read and write
|
||
1FC2FD12000
|
trusted library allocation
|
page read and write
|
||
125CA7CC000
|
heap
|
page read and write
|
||
1FC15C21000
|
trusted library allocation
|
page read and write
|
||
7FF848D52000
|
trusted library allocation
|
page read and write
|
||
1FC13FCC000
|
heap
|
page read and write
|
||
1FC15B7F000
|
trusted library allocation
|
page read and write
|
||
1FC13F00000
|
heap
|
page read and write
|
||
1FC2FCF4000
|
trusted library allocation
|
page read and write
|
||
1FC2E463000
|
heap
|
page read and write
|
||
1FC13FA0000
|
trusted library allocation
|
page read and write
|
||
60C000
|
heap
|
page read and write
|
||
1FC14150000
|
heap
|
page read and write
|
||
62B000
|
heap
|
page read and write
|
||
408000
|
unkown
|
page readonly
|
||
62B000
|
heap
|
page read and write
|
||
7FF848D5D000
|
trusted library allocation
|
page execute and read and write
|
||
2310000
|
heap
|
page read and write
|
||
7FF848D8D000
|
trusted library allocation
|
page execute and read and write
|
||
3C2000
|
unkown
|
page readonly
|
||
5F0000
|
heap
|
page read and write
|
||
23D4000
|
heap
|
page read and write
|
||
A1574FE000
|
stack
|
page read and write
|
||
65C000
|
stack
|
page read and write
|
||
1FC2F654000
|
heap
|
page read and write
|
||
1FC15BD5000
|
trusted library allocation
|
page read and write
|
||
7FF848F10000
|
trusted library allocation
|
page read and write
|
||
5BE000
|
stack
|
page read and write
|
||
1FC14059000
|
heap
|
page read and write
|
||
25D0000
|
heap
|
page read and write
|
||
291F000
|
stack
|
page read and write
|
||
1FC25941000
|
trusted library allocation
|
page read and write
|
||
125CC390000
|
heap
|
page execute and read and write
|
||
4A0000
|
heap
|
page read and write
|
||
1FC15BC8000
|
trusted library allocation
|
page read and write
|
||
125CA5B0000
|
unkown
|
page readonly
|
||
40A000
|
unkown
|
page write copy
|
||
7FF848D60000
|
trusted library allocation
|
page read and write
|
||
125E4BC0000
|
heap
|
page read and write
|
||
1FC14195000
|
heap
|
page read and write
|
||
91E000
|
heap
|
page read and write
|
||
759000
|
stack
|
page read and write
|
||
125CA9B0000
|
trusted library allocation
|
page read and write
|
||
1FC15C2A000
|
trusted library allocation
|
page read and write
|
||
C5E000
|
stack
|
page read and write
|
||
A1572FF000
|
stack
|
page read and write
|
||
125E4BD0000
|
heap
|
page read and write
|
||
7FF848F20000
|
trusted library allocation
|
page read and write
|
||
1FC14120000
|
heap
|
page execute and read and write
|
||
125DC3AD000
|
trusted library allocation
|
page read and write
|
||
2A51FE000
|
stack
|
page read and write
|
||
4B90000
|
heap
|
page read and write
|
||
1FC14038000
|
heap
|
page read and write
|
||
24FE000
|
stack
|
page read and write
|
||
1FC15C64000
|
trusted library allocation
|
page read and write
|
||
1FC2E4ED000
|
heap
|
page read and write
|
||
1FC2F710000
|
trusted library allocation
|
page read and write
|
||
7FF848D50000
|
trusted library allocation
|
page read and write
|
||
125CC480000
|
trusted library allocation
|
page read and write
|
||
125CAA00000
|
heap
|
page read and write
|
||
A1578FE000
|
stack
|
page read and write
|
||
A1573FC000
|
stack
|
page read and write
|
||
1FC15C58000
|
trusted library allocation
|
page read and write
|
||
1FC2E1C0000
|
trusted library allocation
|
page read and write
|
||
1FC13C72000
|
unkown
|
page readonly
|
||
7FF848D74000
|
trusted library allocation
|
page read and write
|
||
400000
|
unkown
|
page readonly
|
||
7FF848D6D000
|
trusted library allocation
|
page execute and read and write
|
||
8C5000
|
heap
|
page read and write
|
||
1FC2F646000
|
heap
|
page read and write
|
||
7FF848EF0000
|
trusted library allocation
|
page read and write
|
||
7FF848E90000
|
trusted library allocation
|
page execute and read and write
|
||
1FC30FF9000
|
heap
|
page read and write
|
||
7FF848E70000
|
trusted library allocation
|
page execute and read and write
|
||
1FC2FAB0000
|
unkown
|
page readonly
|
||
248A000
|
trusted library allocation
|
page execute and read and write
|
||
1FC15BEE000
|
trusted library allocation
|
page read and write
|
||
1FC15CB2000
|
trusted library allocation
|
page read and write
|
||
125CC250000
|
heap
|
page read and write
|
||
125CA7CA000
|
heap
|
page read and write
|
||
C60000
|
heap
|
page read and write
|
||
7FF848D73000
|
trusted library allocation
|
page execute and read and write
|
||
1FC15C3F000
|
trusted library allocation
|
page read and write
|
||
1FC2FB28000
|
unkown
|
page readonly
|
||
638000
|
heap
|
page read and write
|
||
125CA7BA000
|
heap
|
page read and write
|
||
125DC3B1000
|
trusted library allocation
|
page read and write
|
||
1FC1403E000
|
heap
|
page read and write
|
||
2474000
|
trusted library allocation
|
page read and write
|
||
25C0000
|
trusted library allocation
|
page read and write
|
||
49E000
|
stack
|
page read and write
|
||
98000
|
stack
|
page read and write
|
||
7FF848E56000
|
trusted library allocation
|
page execute and read and write
|
||
125CA7FA000
|
heap
|
page read and write
|
||
2A55FF000
|
stack
|
page read and write
|
||
915000
|
heap
|
page read and write
|
||
7FF848D63000
|
trusted library allocation
|
page read and write
|
||
125CA750000
|
heap
|
page read and write
|
||
7FF848F00000
|
trusted library allocation
|
page read and write
|
||
21E0000
|
heap
|
page read and write
|
||
1FC15C14000
|
trusted library allocation
|
page read and write
|
||
1FC14003000
|
heap
|
page read and write
|
||
60F000
|
heap
|
page read and write
|
||
1FC15941000
|
trusted library allocation
|
page read and write
|
||
2A59FE000
|
stack
|
page read and write
|
||
8A0000
|
heap
|
page read and write
|
||
1FC13E00000
|
heap
|
page read and write
|
||
1FC15BF6000
|
trusted library allocation
|
page read and write
|
||
7FF848E20000
|
trusted library allocation
|
page read and write
|
||
26DF000
|
stack
|
page read and write
|
||
2320000
|
heap
|
page read and write
|
||
2A56FE000
|
stack
|
page read and write
|
||
1FC13F75000
|
heap
|
page read and write
|
||
1FC2E2B6000
|
heap
|
page execute and read and write
|
||
22EF000
|
stack
|
page read and write
|
||
1FC15C0F000
|
trusted library allocation
|
page read and write
|
||
638000
|
heap
|
page read and write
|
||
125CC240000
|
heap
|
page read and write
|
||
7FF848F20000
|
trusted library allocation
|
page read and write
|
||
952000
|
heap
|
page read and write
|
||
125CAA05000
|
heap
|
page read and write
|
||
1FC13FB3000
|
trusted library allocation
|
page read and write
|
||
125CA740000
|
heap
|
page read and write
|
||
1FC15BB1000
|
trusted library allocation
|
page read and write
|
||
125DC3A1000
|
trusted library allocation
|
page read and write
|
||
1FC2E4C0000
|
heap
|
page read and write
|
||
125CA7CF000
|
heap
|
page read and write
|
||
400000
|
unkown
|
page readonly
|
||
A1577FE000
|
stack
|
page read and write
|
||
1FC2E3D3000
|
heap
|
page read and write
|
||
93E000
|
heap
|
page read and write
|
||
1FC15C2F000
|
trusted library allocation
|
page read and write
|
||
7FF848D83000
|
trusted library allocation
|
page read and write
|
||
2A54FF000
|
stack
|
page read and write
|
||
7FF848E10000
|
trusted library allocation
|
page execute and read and write
|
||
1FC15BB7000
|
trusted library allocation
|
page read and write
|
||
2A4D34000
|
stack
|
page read and write
|
||
8C0000
|
heap
|
page read and write
|
||
125E4C0D000
|
heap
|
page read and write
|
||
125CC1E0000
|
heap
|
page execute and read and write
|
||
946000
|
heap
|
page read and write
|
||
7FF848D80000
|
trusted library allocation
|
page read and write
|
||
1FC15C27000
|
trusted library allocation
|
page read and write
|
||
125CA960000
|
heap
|
page read and write
|
||
1FC13F80000
|
trusted library allocation
|
page read and write
|
||
281F000
|
stack
|
page read and write
|
||
B5F000
|
stack
|
page read and write
|
||
2A52FF000
|
stack
|
page read and write
|
||
449000
|
unkown
|
page readonly
|
||
8EF000
|
stack
|
page read and write
|
||
1FC13D38000
|
unkown
|
page readonly
|
||
401000
|
unkown
|
page execute read
|
||
1FC13F70000
|
heap
|
page read and write
|
||
1FC15C4B000
|
trusted library allocation
|
page read and write
|
||
1FC2E402000
|
heap
|
page read and write
|
||
2497000
|
trusted library allocation
|
page execute and read and write
|
||
1FC15AA7000
|
trusted library allocation
|
page read and write
|
||
471E000
|
stack
|
page read and write
|
||
1FC2E481000
|
heap
|
page read and write
|
||
1FC15C49000
|
trusted library allocation
|
page read and write
|
||
1FC14030000
|
heap
|
page read and write
|
||
1FC2E3B0000
|
heap
|
page read and write
|
||
1FC15BBF000
|
trusted library allocation
|
page read and write
|
||
26E1000
|
trusted library allocation
|
page read and write
|
||
7FF848D88000
|
trusted library allocation
|
page read and write
|
||
20FE000
|
stack
|
page read and write
|
||
1FC15B9C000
|
trusted library allocation
|
page read and write
|
||
42F000
|
unkown
|
page read and write
|
||
2A57FF000
|
stack
|
page read and write
|
||
91A000
|
heap
|
page read and write
|
||
910000
|
heap
|
page read and write
|
||
2463000
|
trusted library allocation
|
page execute and read and write
|
||
7FF848D7D000
|
trusted library allocation
|
page execute and read and write
|
||
7FF848DCC000
|
trusted library allocation
|
page execute and read and write
|
||
2A53FD000
|
stack
|
page read and write
|
||
1FC2E1A0000
|
heap
|
page read and write
|
||
401000
|
unkown
|
page execute read
|
||
125CC243000
|
heap
|
page read and write
|
||
7FF848F40000
|
trusted library allocation
|
page execute and read and write
|
||
641000
|
heap
|
page read and write
|
||
7FF848E2C000
|
trusted library allocation
|
page execute and read and write
|
||
1FC140E0000
|
heap
|
page read and write
|
||
632000
|
heap
|
page read and write
|
||
1FC2F610000
|
heap
|
page read and write
|
||
481E000
|
stack
|
page read and write
|
||
2510000
|
heap
|
page execute and read and write
|
||
1FC2F63F000
|
heap
|
page read and write
|
||
7FF848DAC000
|
trusted library allocation
|
page execute and read and write
|
||
7FF848D7D000
|
trusted library allocation
|
page execute and read and write
|
||
7FF848D70000
|
trusted library allocation
|
page read and write
|
||
1FC2E44A000
|
heap
|
page read and write
|
There are 301 hidden memdumps, click here to show them.