Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
file.exe
|
PE32+ executable (console) x86-64 Mono/.Net assembly, for MS Windows
|
initial sample
|
||
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_file.exe_1f403d983e4a5248d567d72b56e8042e651081_edd3b515_9dc1ee04-6c80-4698-8c9e-e110a755b055\Report.wer
|
Unicode text, UTF-16, little-endian text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Nexus.lnk
|
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Archive, ctime=Thu Sep 8 02:05:19
2022, mtime=Thu Oct 31 18:56:55 2024, atime=Thu Sep 8 02:05:19 2022, length=5141208, window=hide
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WERB5DA.tmp.dmp
|
Mini DuMP crash report, 16 streams, Thu Oct 31 19:56:56 2024, 0x1205a4 type
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WERB86B.tmp.WERInternalMetadata.xml
|
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WERB8AA.tmp.xml
|
XML 1.0 document, ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_1njmi1ls.ism.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_3phr1dxb.ozf.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_aqyoqvhr.nq3.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_bx5nuovw.a3f.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_dut21tn0.lmf.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_dyylvxkb.ixm.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Windows\appcompat\Programs\Amcache.hve
|
MS Windows registry file, NT/2000 or above
|
dropped
|
There are 4 hidden files, click here to show them.
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\file.exe
|
"C:\Users\user\Desktop\file.exe"
|
||
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
|
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\file.exe"
-Force
|
||
C:\Windows\explorer.exe
|
"C:\Windows\explorer.exe"
|
||
C:\Windows\explorer.exe
|
"C:\Windows\explorer.exe"
|
||
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
|
powershell -Command "$ws = New-Object -ComObject WScript.Shell; $s = $ws.CreateShortcut('C:\Users\user\AppData\Roaming\Microsoft\Windows\Start
Menu\Programs\Startup\Nexus.lnk'); $s.TargetPath = 'C:\Windows\explorer.exe'; $s.Save()"
|
||
C:\Windows\explorer.exe
|
"C:\Windows\explorer.exe"
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\WerFault.exe
|
C:\Windows\system32\WerFault.exe -u -p 5988 -s 1176
|
||
C:\Windows\System32\wbem\WmiPrvSE.exe
|
C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding
|
There are 1 hidden processes, click here to show them.
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
http://www.apache.org/licenses/LICENSE-2.0
|
unknown
|
||
http://pesterbdd.com/images/Pester.png
|
unknown
|
||
http://www.apache.org/licenses/LICENSE-2.0.html
|
unknown
|
||
https://go.micro
|
unknown
|
||
https://github.com/Pester/Pester
|
unknown
|
||
http://nuget.org/NuGet.exe
|
unknown
|
||
https://contoso.com/
|
unknown
|
||
https://nuget.org/nuget.exe
|
unknown
|
||
https://contoso.com/License
|
unknown
|
||
https://contoso.com/Icon
|
unknown
|
||
https://oneget.orgX
|
unknown
|
||
http://upx.sf.net
|
unknown
|
||
https://aka.ms/pscore68
|
unknown
|
||
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
|
unknown
|
||
https://oneget.org
|
unknown
|
There are 5 hidden URLs, click here to show them.
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
185.196.10.218
|
unknown
|
Switzerland
|
Registry
Path
|
Value
|
Malicious
|
|
---|---|---|---|
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System
|
EnableLUA
|
||
\REGISTRY\A\{7e85ee18-cbd4-bd91-6ce7-346844bd17fd}\Root\InventoryApplicationFile\file.exe|7bc5a156b3ccd649
|
ProgramId
|
||
\REGISTRY\A\{7e85ee18-cbd4-bd91-6ce7-346844bd17fd}\Root\InventoryApplicationFile\file.exe|7bc5a156b3ccd649
|
FileId
|
||
\REGISTRY\A\{7e85ee18-cbd4-bd91-6ce7-346844bd17fd}\Root\InventoryApplicationFile\file.exe|7bc5a156b3ccd649
|
LowerCaseLongPath
|
||
\REGISTRY\A\{7e85ee18-cbd4-bd91-6ce7-346844bd17fd}\Root\InventoryApplicationFile\file.exe|7bc5a156b3ccd649
|
LongPathHash
|
||
\REGISTRY\A\{7e85ee18-cbd4-bd91-6ce7-346844bd17fd}\Root\InventoryApplicationFile\file.exe|7bc5a156b3ccd649
|
Name
|
||
\REGISTRY\A\{7e85ee18-cbd4-bd91-6ce7-346844bd17fd}\Root\InventoryApplicationFile\file.exe|7bc5a156b3ccd649
|
OriginalFileName
|
||
\REGISTRY\A\{7e85ee18-cbd4-bd91-6ce7-346844bd17fd}\Root\InventoryApplicationFile\file.exe|7bc5a156b3ccd649
|
Publisher
|
||
\REGISTRY\A\{7e85ee18-cbd4-bd91-6ce7-346844bd17fd}\Root\InventoryApplicationFile\file.exe|7bc5a156b3ccd649
|
Version
|
||
\REGISTRY\A\{7e85ee18-cbd4-bd91-6ce7-346844bd17fd}\Root\InventoryApplicationFile\file.exe|7bc5a156b3ccd649
|
BinFileVersion
|
||
\REGISTRY\A\{7e85ee18-cbd4-bd91-6ce7-346844bd17fd}\Root\InventoryApplicationFile\file.exe|7bc5a156b3ccd649
|
BinaryType
|
||
\REGISTRY\A\{7e85ee18-cbd4-bd91-6ce7-346844bd17fd}\Root\InventoryApplicationFile\file.exe|7bc5a156b3ccd649
|
ProductName
|
||
\REGISTRY\A\{7e85ee18-cbd4-bd91-6ce7-346844bd17fd}\Root\InventoryApplicationFile\file.exe|7bc5a156b3ccd649
|
ProductVersion
|
||
\REGISTRY\A\{7e85ee18-cbd4-bd91-6ce7-346844bd17fd}\Root\InventoryApplicationFile\file.exe|7bc5a156b3ccd649
|
LinkDate
|
||
\REGISTRY\A\{7e85ee18-cbd4-bd91-6ce7-346844bd17fd}\Root\InventoryApplicationFile\file.exe|7bc5a156b3ccd649
|
BinProductVersion
|
||
\REGISTRY\A\{7e85ee18-cbd4-bd91-6ce7-346844bd17fd}\Root\InventoryApplicationFile\file.exe|7bc5a156b3ccd649
|
AppxPackageFullName
|
||
\REGISTRY\A\{7e85ee18-cbd4-bd91-6ce7-346844bd17fd}\Root\InventoryApplicationFile\file.exe|7bc5a156b3ccd649
|
AppxPackageRelativeId
|
||
\REGISTRY\A\{7e85ee18-cbd4-bd91-6ce7-346844bd17fd}\Root\InventoryApplicationFile\file.exe|7bc5a156b3ccd649
|
Size
|
||
\REGISTRY\A\{7e85ee18-cbd4-bd91-6ce7-346844bd17fd}\Root\InventoryApplicationFile\file.exe|7bc5a156b3ccd649
|
Language
|
||
\REGISTRY\A\{7e85ee18-cbd4-bd91-6ce7-346844bd17fd}\Root\InventoryApplicationFile\file.exe|7bc5a156b3ccd649
|
Usn
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Notifications\Settings\Windows.SystemToast.SecurityAndMaintenance
|
Enabled
|
||
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
|
LangID
|
||
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
|
C:\Windows\system32\explorerframe.dll.FriendlyAppName
|
||
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
|
C:\Windows\system32\explorerframe.dll.ApplicationCompany
|
||
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
|
C:\Windows\system32\shell32.dll.FriendlyAppName
|
||
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
|
C:\Windows\system32\shell32.dll.ApplicationCompany
|
There are 16 hidden registries, click here to show them.
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
29903B12000
|
trusted library allocation
|
page read and write
|
||
2F1A000
|
heap
|
page read and write
|
||
371B000
|
stack
|
page read and write
|
||
EA0000
|
heap
|
page read and write
|
||
1DF752C0000
|
heap
|
page read and write
|
||
1DF101B4000
|
trusted library allocation
|
page read and write
|
||
C0000D8000
|
direct allocation
|
page read and write
|
||
2991C6CB000
|
heap
|
page read and write
|
||
1DF77195000
|
heap
|
page read and write
|
||
7FF848FB0000
|
trusted library allocation
|
page read and write
|
||
C00018C000
|
direct allocation
|
page read and write
|
||
1DF10071000
|
trusted library allocation
|
page read and write
|
||
C00009E000
|
direct allocation
|
page read and write
|
||
7FF848FCA000
|
trusted library allocation
|
page read and write
|
||
1DF75350000
|
trusted library allocation
|
page read and write
|
||
7FF848EF6000
|
trusted library allocation
|
page execute and read and write
|
||
FB990FF000
|
stack
|
page read and write
|
||
F80000
|
heap
|
page read and write
|
||
7FF849110000
|
trusted library allocation
|
page read and write
|
||
2C4F000
|
stack
|
page read and write
|
||
C0000AE000
|
direct allocation
|
page read and write
|
||
E07000
|
heap
|
page read and write
|
||
1DF76EE3000
|
trusted library allocation
|
page read and write
|
||
C000002000
|
direct allocation
|
page read and write
|
||
1DF018E2000
|
trusted library allocation
|
page read and write
|
||
C000023000
|
direct allocation
|
page read and write
|
||
C8407FE000
|
stack
|
page read and write
|
||
C00004F000
|
direct allocation
|
page read and write
|
||
2F20000
|
heap
|
page read and write
|
||
FCC000
|
direct allocation
|
page read and write
|
||
7FF849000000
|
trusted library allocation
|
page execute and read and write
|
||
2FE5000
|
heap
|
page read and write
|
||
C8406FF000
|
stack
|
page read and write
|
||
C8408FD000
|
stack
|
page read and write
|
||
C000014000
|
direct allocation
|
page read and write
|
||
7FF848E3B000
|
trusted library allocation
|
page execute and read and write
|
||
29901FFC000
|
heap
|
page read and write
|
||
DA8000
|
heap
|
page read and write
|
||
C0000C2000
|
direct allocation
|
page read and write
|
||
C00002A000
|
direct allocation
|
page read and write
|
||
1DF77400000
|
heap
|
page read and write
|
||
7FF848E27000
|
trusted library allocation
|
page read and write
|
||
7FF848EC6000
|
trusted library allocation
|
page read and write
|
||
C840C3E000
|
stack
|
page read and write
|
||
467FF000
|
stack
|
page read and write
|
||
1080000
|
heap
|
page read and write
|
||
2991BB30000
|
trusted library allocation
|
page read and write
|
||
920000
|
heap
|
page read and write
|
||
C000028000
|
direct allocation
|
page read and write
|
||
306B000
|
heap
|
page read and write
|
||
7FF849070000
|
trusted library allocation
|
page read and write
|
||
D90000
|
heap
|
page read and write
|
||
C0000BA000
|
direct allocation
|
page read and write
|
||
29902064000
|
heap
|
page read and write
|
||
C8403DE000
|
stack
|
page read and write
|
||
FB98EFE000
|
stack
|
page read and write
|
||
DC3000
|
heap
|
page read and write
|
||
7FF848FC1000
|
trusted library allocation
|
page read and write
|
||
7FF848FC0000
|
trusted library allocation
|
page read and write
|
||
29901E82000
|
unkown
|
page readonly
|
||
7FF848FE0000
|
trusted library allocation
|
page read and write
|
||
C00000E000
|
direct allocation
|
page read and write
|
||
1DF10010000
|
trusted library allocation
|
page read and write
|
||
2FCC000
|
heap
|
page read and write
|
||
C0000DC000
|
direct allocation
|
page read and write
|
||
29902305000
|
heap
|
page read and write
|
||
C000186000
|
direct allocation
|
page read and write
|
||
C00005C000
|
direct allocation
|
page read and write
|
||
C000192000
|
direct allocation
|
page read and write
|
||
1DF01C2C000
|
trusted library allocation
|
page read and write
|
||
7FF848EC0000
|
trusted library allocation
|
page read and write
|
||
C000068000
|
direct allocation
|
page read and write
|
||
7FF849100000
|
trusted library allocation
|
page read and write
|
||
1DF751C0000
|
heap
|
page read and write
|
||
7FF849018000
|
trusted library allocation
|
page read and write
|
||
FC4000
|
direct allocation
|
page read and write
|
||
2991C6C7000
|
heap
|
page read and write
|
||
7FF848FD0000
|
trusted library allocation
|
page read and write
|
||
62D000
|
remote allocation
|
page execute and read and write
|
||
2F21000
|
heap
|
page read and write
|
||
2FC2000
|
heap
|
page read and write
|
||
1DF01631000
|
trusted library allocation
|
page read and write
|
||
C000010000
|
direct allocation
|
page read and write
|
||
7FF849000000
|
trusted library allocation
|
page execute and read and write
|
||
7FF848E2B000
|
trusted library allocation
|
page read and write
|
||
7FF848E20000
|
trusted library allocation
|
page read and write
|
||
C000180000
|
direct allocation
|
page read and write
|
||
C840977000
|
stack
|
page read and write
|
||
DED000
|
heap
|
page read and write
|
||
7FF848FF0000
|
trusted library allocation
|
page read and write
|
||
C0000C0000
|
direct allocation
|
page read and write
|
||
2991C2D0000
|
trusted library section
|
page read and write
|
||
1475000
|
heap
|
page read and write
|
||
1DF75145000
|
heap
|
page read and write
|
||
2E21000
|
heap
|
page read and write
|
||
C840D3E000
|
stack
|
page read and write
|
||
C000044000
|
direct allocation
|
page read and write
|
||
29902115000
|
heap
|
page read and write
|
||
FC8000
|
direct allocation
|
page read and write
|
||
29915311000
|
trusted library allocation
|
page read and write
|
||
1DF771F6000
|
heap
|
page read and write
|
||
C000092000
|
direct allocation
|
page read and write
|
||
29902140000
|
heap
|
page read and write
|
||
C000088000
|
direct allocation
|
page read and write
|
||
1DF7723C000
|
heap
|
page read and write
|
||
7FF848FEE000
|
trusted library allocation
|
page read and write
|
||
1DF76F80000
|
heap
|
page execute and read and write
|
||
1DF77290000
|
heap
|
page read and write
|
||
C0000C8000
|
direct allocation
|
page read and write
|
||
C00010B000
|
direct allocation
|
page read and write
|
||
1DF771FA000
|
heap
|
page read and write
|
||
C00003F000
|
direct allocation
|
page read and write
|
||
1DF00001000
|
trusted library allocation
|
page read and write
|
||
7FF848E1D000
|
trusted library allocation
|
page execute and read and write
|
||
1DF7510C000
|
heap
|
page read and write
|
||
7FF848FB0000
|
trusted library allocation
|
page read and write
|
||
2991C640000
|
heap
|
page read and write
|
||
7FF849050000
|
trusted library allocation
|
page read and write
|
||
1DF75390000
|
trusted library allocation
|
page read and write
|
||
C000110000
|
direct allocation
|
page read and write
|
||
7FF848E1D000
|
trusted library allocation
|
page execute and read and write
|
||
7FF848E10000
|
trusted library allocation
|
page read and write
|
||
29901FF6000
|
heap
|
page read and write
|
||
1DF0185B000
|
trusted library allocation
|
page read and write
|
||
1085000
|
heap
|
page read and write
|
||
1DF75310000
|
heap
|
page read and write
|
||
C000016000
|
direct allocation
|
page read and write
|
||
4687E000
|
stack
|
page read and write
|
||
1DF0008A000
|
trusted library allocation
|
page read and write
|
||
2990205E000
|
heap
|
page read and write
|
||
299039F0000
|
heap
|
page execute and read and write
|
||
29902034000
|
heap
|
page read and write
|
||
C840A39000
|
stack
|
page read and write
|
||
C0000B2000
|
direct allocation
|
page read and write
|
||
E04000
|
heap
|
page read and write
|
||
8DC000
|
stack
|
page read and write
|
||
7FF848E12000
|
trusted library allocation
|
page read and write
|
||
1DF752A0000
|
heap
|
page read and write
|
||
29903AF0000
|
heap
|
page read and write
|
||
306E000
|
heap
|
page read and write
|
||
C84067F000
|
stack
|
page read and write
|
||
DA0000
|
heap
|
page read and write
|
||
C00010D000
|
direct allocation
|
page read and write
|
||
29902015000
|
heap
|
page read and write
|
||
46A7F000
|
stack
|
page read and write
|
||
C000117000
|
direct allocation
|
page read and write
|
||
7FF849160000
|
trusted library allocation
|
page read and write
|
||
29902120000
|
heap
|
page read and write
|
||
C000066000
|
direct allocation
|
page read and write
|
||
7FF848ECC000
|
trusted library allocation
|
page execute and read and write
|
||
1DF76F87000
|
heap
|
page execute and read and write
|
||
C00000C000
|
direct allocation
|
page read and write
|
||
C000012000
|
direct allocation
|
page read and write
|
||
7FF849090000
|
trusted library allocation
|
page read and write
|
||
C00008A000
|
direct allocation
|
page read and write
|
||
C000119000
|
direct allocation
|
page read and write
|
||
29902032000
|
heap
|
page read and write
|
||
C000004000
|
direct allocation
|
page read and write
|
||
3079000
|
heap
|
page read and write
|
||
29903973000
|
trusted library allocation
|
page read and write
|
||
D1E000
|
stack
|
page read and write
|
||
1DF77419000
|
heap
|
page read and write
|
||
7FF8490C0000
|
trusted library allocation
|
page read and write
|
||
1DF77370000
|
heap
|
page execute and read and write
|
||
E7C000
|
stack
|
page read and write
|
||
29901E86000
|
unkown
|
page readonly
|
||
C000064000
|
direct allocation
|
page read and write
|
||
2FCE000
|
heap
|
page read and write
|
||
7FF8490B0000
|
trusted library allocation
|
page read and write
|
||
46903000
|
direct allocation
|
page read and write
|
||
29903BEE000
|
trusted library allocation
|
page read and write
|
||
C840B3A000
|
stack
|
page read and write
|
||
7FF848E22000
|
trusted library allocation
|
page read and write
|
||
1DF77160000
|
heap
|
page read and write
|
||
1DF7741B000
|
heap
|
page read and write
|
||
2FDB000
|
heap
|
page read and write
|
||
C00018E000
|
direct allocation
|
page read and write
|
||
2991C6AA000
|
heap
|
page read and write
|
||
C00004B000
|
direct allocation
|
page read and write
|
||
7FF848E13000
|
trusted library allocation
|
page execute and read and write
|
||
7FF848E30000
|
trusted library allocation
|
page read and write
|
||
7FF849130000
|
trusted library allocation
|
page read and write
|
||
29913B01000
|
trusted library allocation
|
page read and write
|
||
2990205B000
|
heap
|
page read and write
|
||
C8409BE000
|
stack
|
page read and write
|
||
1020000
|
direct allocation
|
page read and write
|
||
C00006C000
|
direct allocation
|
page read and write
|
||
C00008E000
|
direct allocation
|
page read and write
|
||
29901E80000
|
unkown
|
page readonly
|
||
C00003D000
|
direct allocation
|
page read and write
|
||
1040000
|
heap
|
page read and write
|
||
C84178E000
|
stack
|
page read and write
|
||
1DF75102000
|
heap
|
page read and write
|
||
1DF77258000
|
heap
|
page read and write
|
||
C000049000
|
direct allocation
|
page read and write
|
||
7FF8490E0000
|
trusted library allocation
|
page read and write
|
||
2E20000
|
heap
|
page read and write
|
||
7FF848ED0000
|
trusted library allocation
|
page execute and read and write
|
||
1DF753C0000
|
heap
|
page read and write
|
||
46900000
|
direct allocation
|
page read and write
|
||
7FF848FD0000
|
trusted library allocation
|
page execute and read and write
|
||
FB994FF000
|
stack
|
page read and write
|
||
C840BBE000
|
stack
|
page read and write
|
||
695000
|
remote allocation
|
page execute and read and write
|
||
1DF7510A000
|
heap
|
page read and write
|
||
1DF750FE000
|
heap
|
page read and write
|
||
1DF01C28000
|
trusted library allocation
|
page read and write
|
||
C000098000
|
direct allocation
|
page read and write
|
||
FB995FE000
|
stack
|
page read and write
|
||
29903B01000
|
trusted library allocation
|
page read and write
|
||
2BCF000
|
stack
|
page read and write
|
||
2990201C000
|
heap
|
page read and write
|
||
C000052000
|
direct allocation
|
page read and write
|
||
1DF75315000
|
heap
|
page read and write
|
||
7FF848EC6000
|
trusted library allocation
|
page read and write
|
||
C0000CE000
|
direct allocation
|
page read and write
|
||
C00001E000
|
direct allocation
|
page read and write
|
||
C000070000
|
direct allocation
|
page read and write
|
||
7FF849120000
|
trusted library allocation
|
page read and write
|
||
29903BDB000
|
trusted library allocation
|
page read and write
|
||
469BF000
|
stack
|
page read and write
|
||
FB996FF000
|
stack
|
page read and write
|
||
1DF75380000
|
heap
|
page readonly
|
||
C00000A000
|
direct allocation
|
page read and write
|
||
7FF8490F0000
|
trusted library allocation
|
page read and write
|
||
7FF849010000
|
trusted library allocation
|
page read and write
|
||
1DF750C8000
|
heap
|
page read and write
|
||
FB98BA2000
|
stack
|
page read and write
|
||
C00004D000
|
direct allocation
|
page read and write
|
||
400000
|
remote allocation
|
page execute and read and write
|
||
46A80000
|
direct allocation
|
page read and write
|
||
1DF75370000
|
trusted library allocation
|
page read and write
|
||
C84087E000
|
stack
|
page read and write
|
||
299020F0000
|
heap
|
page read and write
|
||
1DF01B63000
|
trusted library allocation
|
page read and write
|
||
29903970000
|
trusted library allocation
|
page read and write
|
||
7FF848E2B000
|
trusted library allocation
|
page read and write
|
||
2F1D000
|
heap
|
page read and write
|
||
C84077D000
|
stack
|
page read and write
|
||
29902110000
|
heap
|
page read and write
|
||
1DF1007D000
|
trusted library allocation
|
page read and write
|
||
699000
|
remote allocation
|
page execute and read and write
|
||
C00002F000
|
direct allocation
|
page read and write
|
||
C80000
|
heap
|
page read and write
|
||
7FF848FC9000
|
trusted library allocation
|
page read and write
|
||
7FF848E14000
|
trusted library allocation
|
page read and write
|
||
1DF01887000
|
trusted library allocation
|
page read and write
|
||
C00018A000
|
direct allocation
|
page read and write
|
||
1DF00231000
|
trusted library allocation
|
page read and write
|
||
7FF848ECC000
|
trusted library allocation
|
page execute and read and write
|
||
7FF848ED0000
|
trusted library allocation
|
page execute and read and write
|
||
1470000
|
heap
|
page read and write
|
||
2A56000
|
stack
|
page read and write
|
||
2F52000
|
heap
|
page read and write
|
||
7FF848E34000
|
trusted library allocation
|
page read and write
|
||
1440000
|
heap
|
page read and write
|
||
7FF848F30000
|
trusted library allocation
|
page execute and read and write
|
||
1DF773A0000
|
heap
|
page read and write
|
||
1DF016B1000
|
trusted library allocation
|
page read and write
|
||
7FF848FE0000
|
trusted library allocation
|
page execute and read and write
|
||
C000038000
|
direct allocation
|
page read and write
|
||
7DF418660000
|
trusted library allocation
|
page execute and read and write
|
||
7FF848FF4000
|
trusted library allocation
|
page read and write
|
||
7FF8490D0000
|
trusted library allocation
|
page read and write
|
||
6DF000
|
remote allocation
|
page execute and read and write
|
||
C000113000
|
direct allocation
|
page read and write
|
||
1DF7511E000
|
heap
|
page read and write
|
||
1DF76FC0000
|
heap
|
page execute and read and write
|
||
1DF753C5000
|
heap
|
page read and write
|
||
29901F10000
|
heap
|
page read and write
|
||
2F1D000
|
heap
|
page read and write
|
||
2CCE000
|
stack
|
page read and write
|
||
FC0000
|
direct allocation
|
page read and write
|
||
FB999FD000
|
stack
|
page read and write
|
||
C840AB8000
|
stack
|
page read and write
|
||
3070000
|
heap
|
page read and write
|
||
7FF848F30000
|
trusted library allocation
|
page execute and read and write
|
||
2FD9000
|
heap
|
page read and write
|
||
C00009A000
|
direct allocation
|
page read and write
|
||
C00006E000
|
direct allocation
|
page read and write
|
||
29913B07000
|
trusted library allocation
|
page read and write
|
||
1DF75320000
|
heap
|
page read and write
|
||
1DF75106000
|
heap
|
page read and write
|
||
1048000
|
heap
|
page read and write
|
||
7FF849010000
|
trusted library allocation
|
page read and write
|
||
7FF848E14000
|
trusted library allocation
|
page read and write
|
||
7FF849170000
|
trusted library allocation
|
page read and write
|
||
FB0000
|
heap
|
page readonly
|
||
1DF00C31000
|
trusted library allocation
|
page read and write
|
||
7FF849020000
|
trusted library allocation
|
page read and write
|
||
7FF849080000
|
trusted library allocation
|
page read and write
|
||
2F1A000
|
heap
|
page read and write
|
||
29901FF0000
|
heap
|
page read and write
|
||
C840353000
|
stack
|
page read and write
|
||
299039B0000
|
heap
|
page execute and read and write
|
||
C7F000
|
stack
|
page read and write
|
||
C000198000
|
direct allocation
|
page read and write
|
||
7FF849040000
|
trusted library allocation
|
page read and write
|
||
7FF849140000
|
trusted library allocation
|
page read and write
|
||
C0000B7000
|
direct allocation
|
page read and write
|
||
1DF750C0000
|
heap
|
page read and write
|
||
7FF848E13000
|
trusted library allocation
|
page execute and read and write
|
||
C840DBB000
|
stack
|
page read and write
|
||
7FF849150000
|
trusted library allocation
|
page read and write
|
||
29902300000
|
heap
|
page read and write
|
||
C000006000
|
direct allocation
|
page read and write
|
||
7FF848EF6000
|
trusted library allocation
|
page execute and read and write
|
||
FCA000
|
direct allocation
|
page read and write
|
||
C000080000
|
direct allocation
|
page read and write
|
||
7FF848E6C000
|
trusted library allocation
|
page execute and read and write
|
||
1DF77406000
|
heap
|
page read and write
|
||
D20000
|
heap
|
page read and write
|
||
FB99BFB000
|
stack
|
page read and write
|
||
C0000DA000
|
direct allocation
|
page read and write
|
||
C000018000
|
direct allocation
|
page read and write
|
||
C00005A000
|
direct allocation
|
page read and write
|
||
FB99AFE000
|
stack
|
page read and write
|
||
1DF76EE0000
|
trusted library allocation
|
page read and write
|
||
C000109000
|
direct allocation
|
page read and write
|
||
7FF848E12000
|
trusted library allocation
|
page read and write
|
||
C000094000
|
direct allocation
|
page read and write
|
||
C00002C000
|
direct allocation
|
page read and write
|
||
2991C8F0000
|
heap
|
page read and write
|
||
C0000BE000
|
direct allocation
|
page read and write
|
||
7FF848E2D000
|
trusted library allocation
|
page execute and read and write
|
||
FB98FFE000
|
stack
|
page read and write
|
||
C0000CC000
|
direct allocation
|
page read and write
|
||
1DF77408000
|
heap
|
page read and write
|
||
1DF75149000
|
heap
|
page read and write
|
||
7FF848E3D000
|
trusted library allocation
|
page execute and read and write
|
||
C0000C6000
|
direct allocation
|
page read and write
|
||
2FB4000
|
heap
|
page read and write
|
||
C000056000
|
direct allocation
|
page read and write
|
||
7FF849060000
|
trusted library allocation
|
page read and write
|
||
C00001A000
|
direct allocation
|
page read and write
|
||
7FF849030000
|
trusted library allocation
|
page read and write
|
||
C000078000
|
direct allocation
|
page read and write
|
||
C000107000
|
direct allocation
|
page read and write
|
||
C0000C4000
|
direct allocation
|
page read and write
|
||
FB992FD000
|
stack
|
page read and write
|
||
2D7E000
|
stack
|
page read and write
|
||
1DF77040000
|
heap
|
page read and write
|
||
7FF848E20000
|
trusted library allocation
|
page read and write
|
||
7FF8490A0000
|
trusted library allocation
|
page read and write
|
||
C000058000
|
direct allocation
|
page read and write
|
||
29903940000
|
trusted library allocation
|
page read and write
|
||
FB991FE000
|
stack
|
page read and write
|
||
468FE000
|
stack
|
page read and write
|
||
29903BE3000
|
trusted library allocation
|
page read and write
|
||
2991C682000
|
heap
|
page read and write
|
||
DCE000
|
heap
|
page read and write
|
||
2E7A000
|
heap
|
page read and write
|
||
7FF848FF7000
|
trusted library allocation
|
page read and write
|
||
7FF849021000
|
trusted library allocation
|
page read and write
|
||
7FF848EC0000
|
trusted library allocation
|
page read and write
|
||
1DF7705B000
|
heap
|
page read and write
|
||
1DF10001000
|
trusted library allocation
|
page read and write
|
||
7FF848FF2000
|
trusted library allocation
|
page read and write
|
||
29903B8C000
|
trusted library allocation
|
page read and write
|
||
29903960000
|
trusted library allocation
|
page read and write
|
There are 350 hidden memdumps, click here to show them.