Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
PI.1.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
|
initial sample
|
||
C:\Users\user\AppData\Roaming\dyrekllers\Sanguine\Solano\Celebrates\Natkjole\Capron\Hovedperson16.Red
|
ASCII text, with very long lines (60671), with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Roaming\dyrekllers\Sanguine\Solano\Kisang\PI.1.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\ModuleAnalysisCache
|
data
|
modified
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_3xdlnc2t.ync.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_42hjicmt.id1.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Roaming\dyrekllers\Sanguine\Solano\Kisang\PI.1.exe:Zone.Identifier
|
ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Roaming\dyrekllers\Sanguine\Solano\Kisang\topchefs.fla
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\dyrekllers\Sanguine\Solano\Microhymenopteron\Unensured\retardment.txt
|
ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Roaming\dyrekllers\Sanguine\Solano\Microhymenopteron\Unensured\siegeable.dog
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\dyrekllers\Sanguine\Solano\Microhymenopteron\Unensured\slobberchops.fro
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\dyrekllers\Sanguine\Solano\Paracelsist.man
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\dyrekllers\Sanguine\Solano\Rousement252.out
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\dyrekllers\Sanguine\Solano\Vavs.Rid
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\dyrekllers\Sanguine\Solano\lgprdikantens.per
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\dyrekllers\Sanguine\Solano\mult.tre
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\dyrekllers\Sanguine\Solano\passewa.ami
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\dyrekllers\Sanguine\Solano\quango.pro
|
data
|
dropped
|
There are 8 hidden files, click here to show them.
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\PI.1.exe
|
C:\Users\user\Desktop\PI.1.exe
|
||
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
|
powershell" -windowstyle hidden "$Credibilities=Get-Content 'C:\Users\user\AppData\Roaming\dyrekllers\Sanguine\Solano\Celebrates\Natkjole\Capron\Hovedperson16.Red';$Skrupkedet=$Credibilities.SubString(60665,3);.$Skrupkedet($Credibilities)
|
||
C:\Windows\SysWOW64\cmd.exe
|
C:\Windows\system32\cmd.exe" /c "set /A 1^^0
|
||
C:\Program Files (x86)\Windows Mail\wab.exe
|
C:\Program Files (x86)\windows mail\wab.exe
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
http://pesterbdd.com/images/Pester.png
|
unknown
|
||
https://api.ipify.org/
|
104.26.13.205
|
||
http://nuget.org/NuGet.exe
|
unknown
|
||
https://api.ipify.org
|
unknown
|
||
https://aka.ms/pscore6lB_q
|
unknown
|
||
http://crl.microsoft
|
unknown
|
||
http://www.apache.org/licenses/LICENSE-2.0.html
|
unknown
|
||
https://contoso.com/
|
unknown
|
||
https://nuget.org/nuget.exe
|
unknown
|
||
https://contoso.com/License
|
unknown
|
||
https://contoso.com/Icon
|
unknown
|
||
http://scootero.cl
|
unknown
|
||
https://apwisulsel.sa.com/cM
|
unknown
|
||
http://nsis.sf.net/NSIS_ErrorError
|
unknown
|
||
https://api.ipify.org/t
|
unknown
|
||
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
|
unknown
|
||
http://mail.scootero.cl
|
unknown
|
||
https://apwisulsel.sa.com/
|
unknown
|
||
https://github.com/Pester/Pester
|
unknown
|
There are 9 hidden URLs, click here to show them.
Domains
Name
|
IP
|
Malicious
|
|
---|---|---|---|
scootero.cl
|
177.221.140.242
|
||
mail.scootero.cl
|
unknown
|
||
api.ipify.org
|
104.26.13.205
|
||
apwisulsel.sa.com
|
104.128.228.214
|
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
177.221.140.242
|
scootero.cl
|
unknown
|
||
104.128.228.214
|
apwisulsel.sa.com
|
United States
|
||
104.26.13.205
|
api.ipify.org
|
United States
|
Registry
Path
|
Value
|
Malicious
|
|
---|---|---|---|
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\faksimileringer\lyslederkabler
|
sofabordenes
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\wab_RASAPI32
|
EnableFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\wab_RASAPI32
|
EnableAutoFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\wab_RASAPI32
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\wab_RASAPI32
|
FileTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\wab_RASAPI32
|
ConsoleTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\wab_RASAPI32
|
MaxFileSize
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\wab_RASAPI32
|
FileDirectory
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\wab_RASMANCS
|
EnableFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\wab_RASMANCS
|
EnableAutoFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\wab_RASMANCS
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\wab_RASMANCS
|
FileTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\wab_RASMANCS
|
ConsoleTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\wab_RASMANCS
|
MaxFileSize
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\wab_RASMANCS
|
FileDirectory
|
There are 6 hidden registries, click here to show them.
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
20711000
|
trusted library allocation
|
page read and write
|
||
20737000
|
trusted library allocation
|
page read and write
|
||
2074C000
|
trusted library allocation
|
page read and write
|
||
9690000
|
direct allocation
|
page execute and read and write
|
||
34CE000
|
stack
|
page read and write
|
||
4E80000
|
direct allocation
|
page read and write
|
||
22E40000
|
trusted library allocation
|
page read and write
|
||
207DD000
|
trusted library allocation
|
page read and write
|
||
770B000
|
stack
|
page read and write
|
||
87F000
|
unkown
|
page read and write
|
||
4AD0000
|
heap
|
page read and write
|
||
22D9F000
|
stack
|
page read and write
|
||
23540000
|
trusted library allocation
|
page read and write
|
||
229CB000
|
heap
|
page read and write
|
||
8D00000
|
trusted library allocation
|
page read and write
|
||
22E60000
|
trusted library allocation
|
page read and write
|
||
22E40000
|
trusted library allocation
|
page read and write
|
||
7DD0000
|
trusted library allocation
|
page read and write
|
||
22E50000
|
trusted library allocation
|
page read and write
|
||
5128000
|
trusted library allocation
|
page read and write
|
||
4D40000
|
trusted library section
|
page read and write
|
||
754000
|
heap
|
page read and write
|
||
519E000
|
stack
|
page read and write
|
||
22E60000
|
trusted library allocation
|
page read and write
|
||
22E50000
|
trusted library allocation
|
page read and write
|
||
22A61000
|
heap
|
page read and write
|
||
22E50000
|
trusted library allocation
|
page read and write
|
||
8CFF000
|
stack
|
page read and write
|
||
72D0000
|
heap
|
page execute and read and write
|
||
7490000
|
direct allocation
|
page read and write
|
||
6A0000
|
heap
|
page read and write
|
||
8E30000
|
trusted library allocation
|
page execute and read and write
|
||
22E50000
|
trusted library allocation
|
page read and write
|
||
7510000
|
direct allocation
|
page read and write
|
||
22DDE000
|
stack
|
page read and write
|
||
22E40000
|
trusted library allocation
|
page read and write
|
||
20590000
|
trusted library allocation
|
page read and write
|
||
75C000
|
heap
|
page read and write
|
||
22E50000
|
trusted library allocation
|
page read and write
|
||
33BD000
|
heap
|
page read and write
|
||
64E000
|
unkown
|
page read and write
|
||
206C1000
|
trusted library allocation
|
page read and write
|
||
51C9000
|
heap
|
page read and write
|
||
2790000
|
heap
|
page read and write
|
||
758000
|
heap
|
page read and write
|
||
23550000
|
trusted library allocation
|
page execute and read and write
|
||
22E50000
|
trusted library allocation
|
page read and write
|
||
22E50000
|
trusted library allocation
|
page read and write
|
||
75C000
|
heap
|
page read and write
|
||
22A4D000
|
trusted library allocation
|
page read and write
|
||
23760000
|
trusted library allocation
|
page read and write
|
||
8B6F000
|
heap
|
page read and write
|
||
22E50000
|
trusted library allocation
|
page read and write
|
||
75EA000
|
stack
|
page read and write
|
||
3250000
|
heap
|
page read and write
|
||
22E50000
|
trusted library allocation
|
page read and write
|
||
236FE000
|
stack
|
page read and write
|
||
4DC0000
|
heap
|
page readonly
|
||
33C9000
|
heap
|
page read and write
|
||
227B2000
|
trusted library allocation
|
page read and write
|
||
8AB4000
|
heap
|
page read and write
|
||
23740000
|
trusted library allocation
|
page read and write
|
||
206A0000
|
trusted library allocation
|
page read and write
|
||
771000
|
heap
|
page read and write
|
||
22A40000
|
trusted library allocation
|
page read and write
|
||
23740000
|
trusted library allocation
|
page read and write
|
||
4D6D000
|
trusted library allocation
|
page execute and read and write
|
||
4DE0000
|
direct allocation
|
page read and write
|
||
758000
|
heap
|
page read and write
|
||
8A80000
|
heap
|
page read and write
|
||
75C000
|
heap
|
page read and write
|
||
2354E000
|
trusted library allocation
|
page read and write
|
||
4BD0000
|
heap
|
page read and write
|
||
2057D000
|
trusted library allocation
|
page execute and read and write
|
||
771000
|
heap
|
page read and write
|
||
748000
|
heap
|
page read and write
|
||
20690000
|
trusted library allocation
|
page read and write
|
||
5A72000
|
trusted library allocation
|
page read and write
|
||
8930000
|
trusted library allocation
|
page execute and read and write
|
||
7BF7000
|
trusted library allocation
|
page read and write
|
||
4D63000
|
trusted library allocation
|
page execute and read and write
|
||
22A40000
|
trusted library allocation
|
page read and write
|
||
758000
|
heap
|
page read and write
|
||
207E2000
|
trusted library allocation
|
page read and write
|
||
22E90000
|
trusted library allocation
|
page read and write
|
||
22E50000
|
trusted library allocation
|
page read and write
|
||
309F000
|
stack
|
page read and write
|
||
7B14000
|
heap
|
page read and write
|
||
7C20000
|
trusted library allocation
|
page read and write
|
||
22E90000
|
trusted library allocation
|
page read and write
|
||
22E50000
|
trusted library allocation
|
page read and write
|
||
22E50000
|
trusted library allocation
|
page read and write
|
||
69E000
|
stack
|
page read and write
|
||
202AE000
|
stack
|
page read and write
|
||
7C40000
|
trusted library allocation
|
page read and write
|
||
74A0000
|
direct allocation
|
page read and write
|
||
7DE0000
|
trusted library allocation
|
page read and write
|
||
3CE0000
|
remote allocation
|
page execute and read and write
|
||
7E10000
|
trusted library allocation
|
page read and write
|
||
22E40000
|
trusted library allocation
|
page read and write
|
||
227C6000
|
trusted library allocation
|
page read and write
|
||
421000
|
unkown
|
page read and write
|
||
4D80000
|
trusted library allocation
|
page read and write
|
||
22EA0000
|
trusted library allocation
|
page execute and read and write
|
||
22E40000
|
trusted library allocation
|
page read and write
|
||
22E40000
|
trusted library allocation
|
page read and write
|
||
22E40000
|
trusted library allocation
|
page read and write
|
||
7B6F000
|
heap
|
page read and write
|
||
8B31000
|
heap
|
page read and write
|
||
88D0000
|
heap
|
page read and write
|
||
731F000
|
stack
|
page read and write
|
||
22E60000
|
trusted library allocation
|
page read and write
|
||
44B000
|
unkown
|
page readonly
|
||
206FF000
|
trusted library allocation
|
page read and write
|
||
22E90000
|
trusted library allocation
|
page read and write
|
||
205C0000
|
heap
|
page read and write
|
||
8E70000
|
trusted library allocation
|
page read and write
|
||
8D4C000
|
stack
|
page read and write
|
||
20568000
|
stack
|
page read and write
|
||
20F5000
|
heap
|
page read and write
|
||
2021D000
|
stack
|
page read and write
|
||
22E50000
|
trusted library allocation
|
page read and write
|
||
73DE000
|
stack
|
page read and write
|
||
23740000
|
trusted library allocation
|
page read and write
|
||
8EA0000
|
direct allocation
|
page read and write
|
||
22E50000
|
trusted library allocation
|
page read and write
|
||
3560000
|
trusted library section
|
page read and write
|
||
206B0000
|
heap
|
page execute and read and write
|
||
2039F000
|
stack
|
page read and write
|
||
756000
|
heap
|
page read and write
|
||
76CE000
|
stack
|
page read and write
|
||
22E90000
|
trusted library allocation
|
page read and write
|
||
7E50000
|
trusted library allocation
|
page read and write
|
||
7710000
|
heap
|
page read and write
|
||
4D92000
|
trusted library allocation
|
page read and write
|
||
7D90000
|
trusted library allocation
|
page read and write
|
||
22E90000
|
trusted library allocation
|
page read and write
|
||
4B8D000
|
heap
|
page read and write
|
||
2172A000
|
trusted library allocation
|
page read and write
|
||
22E90000
|
trusted library allocation
|
page read and write
|
||
4E00000
|
direct allocation
|
page read and write
|
||
23549000
|
trusted library allocation
|
page read and write
|
||
2794000
|
heap
|
page read and write
|
||
735E000
|
stack
|
page read and write
|
||
520F000
|
stack
|
page read and write
|
||
22E90000
|
trusted library allocation
|
page read and write
|
||
758000
|
heap
|
page read and write
|
||
22E50000
|
trusted library allocation
|
page read and write
|
||
790E000
|
stack
|
page read and write
|
||
450000
|
heap
|
page read and write
|
||
743000
|
heap
|
page read and write
|
||
23760000
|
trusted library allocation
|
page read and write
|
||
771000
|
heap
|
page read and write
|
||
22E90000
|
trusted library allocation
|
page read and write
|
||
2279E000
|
stack
|
page read and write
|
||
44B000
|
unkown
|
page readonly
|
||
229B7000
|
heap
|
page read and write
|
||
20570000
|
trusted library allocation
|
page read and write
|
||
4D8A000
|
trusted library allocation
|
page execute and read and write
|
||
23780000
|
trusted library allocation
|
page execute and read and write
|
||
8E20000
|
trusted library allocation
|
page read and write
|
||
22E90000
|
trusted library allocation
|
page read and write
|
||
892F000
|
stack
|
page read and write
|
||
20400000
|
remote allocation
|
page read and write
|
||
22E51000
|
trusted library allocation
|
page read and write
|
||
7C80000
|
trusted library allocation
|
page read and write
|
||
22A40000
|
trusted library allocation
|
page read and write
|
||
754000
|
heap
|
page read and write
|
||
22E50000
|
trusted library allocation
|
page read and write
|
||
3414000
|
heap
|
page read and write
|
||
205AB000
|
trusted library allocation
|
page execute and read and write
|
||
3D90000
|
remote allocation
|
page execute and read and write
|
||
22E50000
|
trusted library allocation
|
page read and write
|
||
4B3B000
|
heap
|
page read and write
|
||
22E40000
|
trusted library allocation
|
page read and write
|
||
19A000
|
stack
|
page read and write
|
||
3411000
|
heap
|
page read and write
|
||
354F000
|
stack
|
page read and write
|
||
23760000
|
trusted library allocation
|
page read and write
|
||
228E8000
|
trusted library allocation
|
page read and write
|
||
350E000
|
stack
|
page read and write
|
||
4D20000
|
heap
|
page read and write
|
||
78CE000
|
stack
|
page read and write
|
||
22E50000
|
trusted library allocation
|
page read and write
|
||
20510000
|
trusted library allocation
|
page read and write
|
||
22E50000
|
trusted library allocation
|
page read and write
|
||
537F000
|
heap
|
page read and write
|
||
8E1C000
|
stack
|
page read and write
|
||
22E40000
|
trusted library allocation
|
page read and write
|
||
4C00000
|
heap
|
page read and write
|
||
4EEE000
|
stack
|
page read and write
|
||
207CD000
|
trusted library allocation
|
page read and write
|
||
227F0000
|
trusted library allocation
|
page read and write
|
||
3216000
|
heap
|
page read and write
|
||
74E0000
|
direct allocation
|
page read and write
|
||
771000
|
heap
|
page read and write
|
||
205A7000
|
trusted library allocation
|
page execute and read and write
|
||
22E90000
|
trusted library allocation
|
page read and write
|
||
7E20000
|
trusted library allocation
|
page read and write
|
||
748000
|
heap
|
page read and write
|
||
227AE000
|
trusted library allocation
|
page read and write
|
||
2330000
|
heap
|
page read and write
|
||
227A6000
|
trusted library allocation
|
page read and write
|
||
228E0000
|
trusted library allocation
|
page read and write
|
||
23790000
|
trusted library allocation
|
page read and write
|
||
22E50000
|
trusted library allocation
|
page read and write
|
||
22A60000
|
heap
|
page read and write
|
||
22E50000
|
trusted library allocation
|
page read and write
|
||
5A78000
|
trusted library allocation
|
page read and write
|
||
762E000
|
stack
|
page read and write
|
||
748000
|
heap
|
page read and write
|
||
627E000
|
trusted library allocation
|
page read and write
|
||
794E000
|
stack
|
page read and write
|
||
22E40000
|
trusted library allocation
|
page read and write
|
||
77A000
|
heap
|
page read and write
|
||
77A000
|
heap
|
page read and write
|
||
22E60000
|
trusted library allocation
|
page read and write
|
||
22E90000
|
trusted library allocation
|
page read and write
|
||
22E70000
|
trusted library allocation
|
page read and write
|
||
4D90000
|
trusted library allocation
|
page read and write
|
||
22E60000
|
trusted library allocation
|
page read and write
|
||
22E90000
|
trusted library allocation
|
page read and write
|
||
23546000
|
trusted library allocation
|
page read and write
|
||
228E0000
|
trusted library allocation
|
page read and write
|
||
2035E000
|
stack
|
page read and write
|
||
22E40000
|
trusted library allocation
|
page read and write
|
||
771000
|
heap
|
page read and write
|
||
22A43000
|
trusted library allocation
|
page read and write
|
||
75C000
|
heap
|
page read and write
|
||
22E40000
|
trusted library allocation
|
page read and write
|
||
205B0000
|
trusted library allocation
|
page execute and read and write
|
||
4790000
|
remote allocation
|
page execute and read and write
|
||
228F0000
|
heap
|
page read and write
|
||
3578000
|
heap
|
page read and write
|
||
433000
|
unkown
|
page read and write
|
||
9E0000
|
heap
|
page read and write
|
||
3720000
|
trusted library allocation
|
page read and write
|
||
22E60000
|
trusted library allocation
|
page read and write
|
||
75C000
|
heap
|
page read and write
|
||
3570000
|
heap
|
page read and write
|
||
2798000
|
heap
|
page read and write
|
||
22E47000
|
trusted library allocation
|
page read and write
|
||
7E40000
|
trusted library allocation
|
page read and write
|
||
22E50000
|
trusted library allocation
|
page read and write
|
||
8B0B000
|
heap
|
page read and write
|
||
20490000
|
direct allocation
|
page read and write
|
||
22E40000
|
trusted library allocation
|
page read and write
|
||
229CE000
|
heap
|
page read and write
|
||
2025C000
|
stack
|
page read and write
|
||
766B000
|
stack
|
page read and write
|
||
22E40000
|
trusted library allocation
|
page read and write
|
||
229BC000
|
heap
|
page read and write
|
||
22E50000
|
trusted library allocation
|
page read and write
|
||
22E43000
|
trusted library allocation
|
page read and write
|
||
22E90000
|
trusted library allocation
|
page read and write
|
||
74C0000
|
direct allocation
|
page read and write
|
||
22E50000
|
trusted library allocation
|
page read and write
|
||
89B000
|
heap
|
page read and write
|
||
4B2F000
|
heap
|
page read and write
|
||
23760000
|
trusted library allocation
|
page read and write
|
||
748000
|
heap
|
page read and write
|
||
4B41000
|
heap
|
page read and write
|
||
2353E000
|
stack
|
page read and write
|
||
600000
|
heap
|
page read and write
|
||
748000
|
heap
|
page read and write
|
||
748000
|
heap
|
page read and write
|
||
754000
|
heap
|
page read and write
|
||
227BE000
|
trusted library allocation
|
page read and write
|
||
2795000
|
heap
|
page read and write
|
||
20F9000
|
heap
|
page read and write
|
||
22A50000
|
heap
|
page execute and read and write
|
||
7BF0000
|
trusted library allocation
|
page read and write
|
||
63A9000
|
trusted library allocation
|
page read and write
|
||
8DDE000
|
stack
|
page read and write
|
||
7B8B000
|
heap
|
page read and write
|
||
2047F000
|
stack
|
page read and write
|
||
8975000
|
trusted library allocation
|
page read and write
|
||
771000
|
heap
|
page read and write
|
||
4BF0000
|
heap
|
page readonly
|
||
216C1000
|
trusted library allocation
|
page read and write
|
||
7E00000
|
trusted library allocation
|
page read and write
|
||
407000
|
unkown
|
page readonly
|
||
23740000
|
trusted library allocation
|
page read and write
|
||
22E50000
|
trusted library allocation
|
page read and write
|
||
7B57000
|
heap
|
page read and write
|
||
228E0000
|
trusted library allocation
|
page read and write
|
||
2A3E000
|
stack
|
page read and write
|
||
22E50000
|
trusted library allocation
|
page read and write
|
||
4D50000
|
trusted library allocation
|
page read and write
|
||
754000
|
heap
|
page read and write
|
||
42B000
|
unkown
|
page read and write
|
||
754000
|
heap
|
page read and write
|
||
8840000
|
trusted library allocation
|
page execute and read and write
|
||
22A40000
|
trusted library allocation
|
page read and write
|
||
22D5D000
|
stack
|
page read and write
|
||
8CBE000
|
stack
|
page read and write
|
||
2287C000
|
stack
|
page read and write
|
||
8B15000
|
heap
|
page read and write
|
||
42D000
|
unkown
|
page read and write
|
||
51A0000
|
trusted library allocation
|
page read and write
|
||
22E40000
|
trusted library allocation
|
page read and write
|
||
237B0000
|
trusted library allocation
|
page read and write
|
||
754000
|
heap
|
page read and write
|
||
AF0000
|
heap
|
page read and write
|
||
22A4D000
|
trusted library allocation
|
page read and write
|
||
207BD000
|
trusted library allocation
|
page read and write
|
||
7D4E000
|
stack
|
page read and write
|
||
7DF0000
|
trusted library allocation
|
page read and write
|
||
A090000
|
direct allocation
|
page execute and read and write
|
||
741F000
|
stack
|
page read and write
|
||
88CD000
|
stack
|
page read and write
|
||
207CB000
|
trusted library allocation
|
page read and write
|
||
89A0000
|
trusted library allocation
|
page read and write
|
||
754000
|
heap
|
page read and write
|
||
7AD0000
|
trusted library allocation
|
page read and write
|
||
758000
|
heap
|
page read and write
|
||
4B47000
|
heap
|
page read and write
|
||
2283C000
|
stack
|
page read and write
|
||
2043E000
|
stack
|
page read and write
|
||
400000
|
unkown
|
page readonly
|
||
7500000
|
direct allocation
|
page read and write
|
||
724C000
|
stack
|
page read and write
|
||
754000
|
heap
|
page read and write
|
||
4AEB000
|
heap
|
page read and write
|
||
401000
|
unkown
|
page execute read
|
||
228C0000
|
trusted library allocation
|
page read and write
|
||
2296D000
|
heap
|
page read and write
|
||
22E90000
|
trusted library allocation
|
page read and write
|
||
202EF000
|
stack
|
page read and write
|
||
771000
|
heap
|
page read and write
|
||
2059A000
|
trusted library allocation
|
page execute and read and write
|
||
63C2000
|
trusted library allocation
|
page read and write
|
||
2A7F000
|
stack
|
page read and write
|
||
23750000
|
trusted library allocation
|
page read and write
|
||
20596000
|
trusted library allocation
|
page execute and read and write
|
||
22E40000
|
trusted library allocation
|
page read and write
|
||
22A40000
|
trusted library allocation
|
page read and write
|
||
22E80000
|
trusted library allocation
|
page read and write
|
||
75C000
|
heap
|
page read and write
|
||
22E50000
|
trusted library allocation
|
page read and write
|
||
8B23000
|
heap
|
page read and write
|
||
227D2000
|
trusted library allocation
|
page read and write
|
||
77A000
|
heap
|
page read and write
|
||
2F9C000
|
stack
|
page read and write
|
||
22E90000
|
trusted library allocation
|
page read and write
|
||
75C000
|
heap
|
page read and write
|
||
22E90000
|
trusted library allocation
|
page read and write
|
||
72D5000
|
heap
|
page execute and read and write
|
||
7BDC000
|
heap
|
page read and write
|
||
77A000
|
heap
|
page read and write
|
||
74F0000
|
direct allocation
|
page read and write
|
||
22E90000
|
trusted library allocation
|
page read and write
|
||
4E60000
|
direct allocation
|
page read and write
|
||
22E40000
|
trusted library allocation
|
page read and write
|
||
754000
|
heap
|
page read and write
|
||
23760000
|
trusted library allocation
|
page read and write
|
||
400000
|
unkown
|
page readonly
|
||
7CCE000
|
stack
|
page read and write
|
||
22A40000
|
trusted library allocation
|
page read and write
|
||
23460000
|
trusted library allocation
|
page read and write
|
||
5211000
|
trusted library allocation
|
page read and write
|
||
23770000
|
trusted library allocation
|
page read and write
|
||
4E70000
|
direct allocation
|
page read and write
|
||
7520000
|
direct allocation
|
page read and write
|
||
6DE000
|
stack
|
page read and write
|
||
22E50000
|
trusted library allocation
|
page read and write
|
||
22E50000
|
trusted library allocation
|
page read and write
|
||
8A94000
|
heap
|
page read and write
|
||
22E50000
|
trusted library allocation
|
page read and write
|
||
8A88000
|
heap
|
page read and write
|
||
7F510000
|
trusted library allocation
|
page execute and read and write
|
||
22A40000
|
trusted library allocation
|
page read and write
|
||
22E50000
|
trusted library allocation
|
page read and write
|
||
22E50000
|
trusted library allocation
|
page read and write
|
||
748000
|
heap
|
page read and write
|
||
758000
|
heap
|
page read and write
|
||
22E40000
|
trusted library allocation
|
page read and write
|
||
20F0000
|
heap
|
page read and write
|
||
2792000
|
heap
|
page read and write
|
||
23480000
|
trusted library allocation
|
page read and write
|
||
2190000
|
heap
|
page read and write
|
||
279B000
|
heap
|
page read and write
|
||
409000
|
unkown
|
page write copy
|
||
73D000
|
heap
|
page read and write
|
||
22E40000
|
trusted library allocation
|
page read and write
|
||
2799000
|
heap
|
page read and write
|
||
22E60000
|
trusted library allocation
|
page read and write
|
||
51C0000
|
heap
|
page read and write
|
||
226C8000
|
trusted library allocation
|
page read and write
|
||
23470000
|
trusted library allocation
|
page read and write
|
||
227E0000
|
trusted library allocation
|
page read and write
|
||
22E60000
|
trusted library allocation
|
page read and write
|
||
336E000
|
stack
|
page read and write
|
||
22A40000
|
trusted library allocation
|
page read and write
|
||
89D0000
|
trusted library allocation
|
page read and write
|
||
2075A000
|
trusted library allocation
|
page read and write
|
||
7D8D000
|
stack
|
page read and write
|
||
650000
|
heap
|
page read and write
|
||
279D000
|
heap
|
page read and write
|
||
22E40000
|
trusted library allocation
|
page read and write
|
||
227C1000
|
trusted library allocation
|
page read and write
|
||
754000
|
heap
|
page read and write
|
||
74B0000
|
direct allocation
|
page read and write
|
||
23760000
|
trusted library allocation
|
page read and write
|
||
7C10000
|
trusted library allocation
|
page read and write
|
||
7E9B000
|
stack
|
page read and write
|
||
4D60000
|
trusted library allocation
|
page read and write
|
||
4D70000
|
trusted library allocation
|
page read and write
|
||
22E50000
|
trusted library allocation
|
page read and write
|
||
23540000
|
trusted library allocation
|
page read and write
|
||
89C0000
|
trusted library allocation
|
page read and write
|
||
23760000
|
trusted library allocation
|
page read and write
|
||
595000
|
heap
|
page read and write
|
||
3690000
|
heap
|
page read and write
|
||
22E40000
|
trusted library allocation
|
page read and write
|
||
227AB000
|
trusted library allocation
|
page read and write
|
||
5A70000
|
trusted library allocation
|
page read and write
|
||
758000
|
heap
|
page read and write
|
||
23760000
|
trusted library allocation
|
page read and write
|
||
798E000
|
stack
|
page read and write
|
||
22E40000
|
trusted library allocation
|
page read and write
|
||
7C30000
|
trusted library allocation
|
page read and write
|
||
22E60000
|
trusted library allocation
|
page read and write
|
||
279C000
|
heap
|
page read and write
|
||
2340000
|
heap
|
page read and write
|
||
205A5000
|
trusted library allocation
|
page execute and read and write
|
||
22E50000
|
trusted library allocation
|
page read and write
|
||
7B29000
|
heap
|
page read and write
|
||
77A000
|
heap
|
page read and write
|
||
5150000
|
heap
|
page execute and read and write
|
||
23760000
|
trusted library allocation
|
page read and write
|
||
4E90000
|
direct allocation
|
page read and write
|
||
22A40000
|
trusted library allocation
|
page read and write
|
||
228C0000
|
trusted library allocation
|
page read and write
|
||
20574000
|
trusted library allocation
|
page read and write
|
||
56E000
|
stack
|
page read and write
|
||
229AB000
|
heap
|
page read and write
|
||
739E000
|
stack
|
page read and write
|
||
23740000
|
trusted library allocation
|
page read and write
|
||
234FE000
|
stack
|
page read and write
|
||
7480000
|
direct allocation
|
page read and write
|
||
758000
|
heap
|
page read and write
|
||
426000
|
unkown
|
page read and write
|
||
771000
|
heap
|
page read and write
|
||
2344000
|
heap
|
page read and write
|
||
227A0000
|
trusted library allocation
|
page read and write
|
||
75C000
|
heap
|
page read and write
|
||
710000
|
heap
|
page read and write
|
||
217E000
|
stack
|
page read and write
|
||
229F000
|
stack
|
page read and write
|
||
75AE000
|
stack
|
page read and write
|
||
407000
|
unkown
|
page readonly
|
||
22E50000
|
trusted library allocation
|
page read and write
|
||
4D64000
|
trusted library allocation
|
page read and write
|
||
4E50000
|
direct allocation
|
page read and write
|
||
5273000
|
trusted library allocation
|
page read and write
|
||
2795000
|
heap
|
page read and write
|
||
22E60000
|
trusted library allocation
|
page read and write
|
||
20751000
|
trusted library allocation
|
page read and write
|
||
748000
|
heap
|
page read and write
|
||
3370000
|
heap
|
page read and write
|
||
4E40000
|
direct allocation
|
page read and write
|
||
8B41000
|
heap
|
page read and write
|
||
207D8000
|
trusted library allocation
|
page read and write
|
||
3210000
|
heap
|
page read and write
|
||
22E50000
|
trusted library allocation
|
page read and write
|
||
8D8C000
|
stack
|
page read and write
|
||
77A000
|
heap
|
page read and write
|
||
22E40000
|
trusted library allocation
|
page read and write
|
||
8827000
|
stack
|
page read and write
|
||
79D2000
|
heap
|
page read and write
|
||
23750000
|
trusted library allocation
|
page read and write
|
||
75C000
|
heap
|
page read and write
|
||
4C05000
|
heap
|
page read and write
|
||
22E80000
|
trusted library allocation
|
page read and write
|
||
22E50000
|
trusted library allocation
|
page read and write
|
||
771000
|
heap
|
page read and write
|
||
7AF0000
|
heap
|
page read and write
|
||
213E000
|
stack
|
page read and write
|
||
23760000
|
trusted library allocation
|
page read and write
|
||
2296D000
|
heap
|
page read and write
|
||
22900000
|
heap
|
page read and write
|
||
22E40000
|
trusted library allocation
|
page read and write
|
||
22A40000
|
trusted library allocation
|
page read and write
|
||
2058D000
|
trusted library allocation
|
page execute and read and write
|
||
2079C000
|
trusted library allocation
|
page read and write
|
||
90F000
|
stack
|
page read and write
|
||
20400000
|
remote allocation
|
page read and write
|
||
7AC0000
|
heap
|
page execute and read and write
|
||
22E50000
|
trusted library allocation
|
page read and write
|
||
22E76000
|
trusted library allocation
|
page read and write
|
||
2070D000
|
trusted library allocation
|
page read and write
|
||
22E70000
|
trusted library allocation
|
page read and write
|
||
22E50000
|
trusted library allocation
|
page read and write
|
||
23760000
|
trusted library allocation
|
page read and write
|
||
23740000
|
trusted library allocation
|
page read and write
|
||
7470000
|
direct allocation
|
page read and write
|
||
2291D000
|
heap
|
page read and write
|
||
237A0000
|
trusted library allocation
|
page read and write
|
||
23460000
|
trusted library allocation
|
page execute and read and write
|
||
207E7000
|
trusted library allocation
|
page read and write
|
||
22A40000
|
trusted library allocation
|
page read and write
|
||
22E70000
|
trusted library allocation
|
page read and write
|
||
2799000
|
heap
|
page read and write
|
||
777000
|
heap
|
page read and write
|
||
88E0000
|
heap
|
page read and write
|
||
2294C000
|
heap
|
page read and write
|
||
771000
|
heap
|
page read and write
|
||
22E50000
|
trusted library allocation
|
page read and write
|
||
23760000
|
trusted library allocation
|
page read and write
|
||
69E000
|
stack
|
page read and write
|
||
4D79000
|
trusted library allocation
|
page read and write
|
||
22E50000
|
trusted library allocation
|
page read and write
|
||
8E50000
|
trusted library allocation
|
page execute and read and write
|
||
20260000
|
trusted library allocation
|
page read and write
|
||
237A0000
|
trusted library allocation
|
page read and write
|
||
23770000
|
trusted library allocation
|
page read and write
|
||
22E50000
|
trusted library allocation
|
page read and write
|
||
22E40000
|
trusted library allocation
|
page read and write
|
||
20300000
|
heap
|
page read and write
|
||
22800000
|
trusted library allocation
|
page read and write
|
||
22E90000
|
trusted library allocation
|
page read and write
|
||
23760000
|
trusted library allocation
|
page read and write
|
||
29D000
|
stack
|
page read and write
|
||
2060E000
|
stack
|
page read and write
|
||
72CE000
|
stack
|
page read and write
|
||
20400000
|
remote allocation
|
page read and write
|
||
39D000
|
stack
|
page read and write
|
||
4E30000
|
direct allocation
|
page read and write
|
||
22E90000
|
trusted library allocation
|
page read and write
|
||
22E40000
|
trusted library allocation
|
page read and write
|
||
20573000
|
trusted library allocation
|
page execute and read and write
|
||
6211000
|
trusted library allocation
|
page read and write
|
||
22E52000
|
trusted library allocation
|
page read and write
|
||
22E70000
|
trusted library allocation
|
page read and write
|
||
7FCE0000
|
trusted library allocation
|
page execute and read and write
|
||
2068C000
|
stack
|
page read and write
|
||
22E40000
|
trusted library allocation
|
page read and write
|
||
89B0000
|
trusted library allocation
|
page read and write
|
||
590000
|
heap
|
page read and write
|
||
8B2D000
|
heap
|
page read and write
|
||
4B44000
|
heap
|
page read and write
|
||
22E40000
|
trusted library allocation
|
page read and write
|
||
23760000
|
trusted library allocation
|
page read and write
|
||
77A000
|
heap
|
page read and write
|
||
22E40000
|
trusted library allocation
|
page read and write
|
||
754000
|
heap
|
page read and write
|
||
748000
|
heap
|
page read and write
|
||
8E40000
|
trusted library allocation
|
page read and write
|
||
22EA0000
|
trusted library allocation
|
page read and write
|
||
205A2000
|
trusted library allocation
|
page read and write
|
||
7D0E000
|
stack
|
page read and write
|
||
7DA0000
|
trusted library allocation
|
page read and write
|
||
227CD000
|
trusted library allocation
|
page read and write
|
||
21753000
|
trusted library allocation
|
page read and write
|
||
22E60000
|
trusted library allocation
|
page read and write
|
||
63BD000
|
trusted library allocation
|
page read and write
|
||
22E90000
|
trusted library allocation
|
page read and write
|
||
20580000
|
trusted library allocation
|
page read and write
|
||
728E000
|
stack
|
page read and write
|
||
409000
|
unkown
|
page read and write
|
||
206F6000
|
trusted library allocation
|
page read and write
|
||
2373F000
|
stack
|
page read and write
|
||
718000
|
heap
|
page read and write
|
||
22E90000
|
trusted library allocation
|
page read and write
|
||
4BBC000
|
heap
|
page read and write
|
||
7DB0000
|
trusted library allocation
|
page read and write
|
||
4DB0000
|
trusted library allocation
|
page read and write
|
||
401000
|
unkown
|
page execute read
|
||
22E60000
|
trusted library allocation
|
page read and write
|
||
8830000
|
heap
|
page read and write
|
||
4AD8000
|
heap
|
page read and write
|
||
4F20000
|
heap
|
page read and write
|
||
279C000
|
heap
|
page read and write
|
||
22E41000
|
trusted library allocation
|
page read and write
|
||
22E8D000
|
stack
|
page read and write
|
||
205A0000
|
trusted library allocation
|
page read and write
|
||
22E40000
|
trusted library allocation
|
page read and write
|
||
7B0B000
|
heap
|
page read and write
|
||
2015E000
|
stack
|
page read and write
|
||
771000
|
heap
|
page read and write
|
||
98000
|
stack
|
page read and write
|
||
758000
|
heap
|
page read and write
|
||
23750000
|
trusted library allocation
|
page read and write
|
||
74D0000
|
direct allocation
|
page read and write
|
||
2078F000
|
trusted library allocation
|
page read and write
|
||
4E20000
|
direct allocation
|
page read and write
|
||
75C000
|
heap
|
page read and write
|
||
8B3D000
|
heap
|
page read and write
|
||
7BCF000
|
heap
|
page read and write
|
||
20592000
|
trusted library allocation
|
page read and write
|
||
20520000
|
heap
|
page read and write
|
||
3390000
|
heap
|
page read and write
|
||
8850000
|
trusted library allocation
|
page read and write
|
||
AEF000
|
stack
|
page read and write
|
||
8E60000
|
heap
|
page read and write
|
||
22E40000
|
trusted library allocation
|
page read and write
|
||
201DE000
|
stack
|
page read and write
|
||
4B12000
|
heap
|
page read and write
|
||
22E70000
|
trusted library allocation
|
page read and write
|
||
77A000
|
heap
|
page read and write
|
||
22E50000
|
trusted library allocation
|
page read and write
|
||
22E40000
|
trusted library allocation
|
page read and write
|
||
748000
|
heap
|
page read and write
|
||
2FD8000
|
stack
|
page read and write
|
||
758000
|
heap
|
page read and write
|
||
5140000
|
trusted library allocation
|
page execute and read and write
|
||
228C0000
|
trusted library allocation
|
page read and write
|
||
448000
|
unkown
|
page read and write
|
||
4E10000
|
direct allocation
|
page read and write
|
||
22E40000
|
trusted library allocation
|
page read and write
|
||
4DD7000
|
heap
|
page read and write
|
||
95E0000
|
direct allocation
|
page execute and read and write
|
||
22E40000
|
trusted library allocation
|
page read and write
|
||
890000
|
heap
|
page read and write
|
||
340F000
|
heap
|
page read and write
|
||
4C07000
|
heap
|
page read and write
|
||
22E90000
|
trusted library allocation
|
page read and write
|
||
8860000
|
trusted library allocation
|
page read and write
|
||
23760000
|
trusted library allocation
|
page read and write
|
||
216E9000
|
trusted library allocation
|
page read and write
|
||
22E40000
|
trusted library allocation
|
page read and write
|
||
4B3D000
|
heap
|
page read and write
|
||
4F27000
|
heap
|
page read and write
|
||
7E30000
|
trusted library allocation
|
page read and write
|
||
2019D000
|
stack
|
page read and write
|
||
6239000
|
trusted library allocation
|
page read and write
|
||
228C0000
|
heap
|
page read and write
|
||
230E000
|
stack
|
page read and write
|
||
2363E000
|
stack
|
page read and write
|
||
22E40000
|
trusted library allocation
|
page read and write
|
||
8E90000
|
direct allocation
|
page read and write
|
||
22E80000
|
trusted library allocation
|
page read and write
|
||
204EA000
|
stack
|
page read and write
|
||
22E40000
|
trusted library allocation
|
page read and write
|
||
4DF0000
|
direct allocation
|
page read and write
|
||
22A40000
|
trusted library allocation
|
page read and write
|
||
4B47000
|
heap
|
page read and write
|
||
77A000
|
heap
|
page read and write
|
||
22EA0000
|
trusted library allocation
|
page read and write
|
||
570000
|
heap
|
page read and write
|
||
204A0000
|
direct allocation
|
page read and write
|
||
22E50000
|
trusted library allocation
|
page read and write
|
||
22E1E000
|
stack
|
page read and write
|
||
22E60000
|
trusted library allocation
|
page read and write
|
||
7B39000
|
heap
|
page read and write
|
||
758000
|
heap
|
page read and write
|
||
5366000
|
trusted library allocation
|
page read and write
|
||
22E80000
|
trusted library allocation
|
page read and write
|
||
8A9A000
|
heap
|
page read and write
|
||
344D000
|
heap
|
page read and write
|
||
22E40000
|
trusted library allocation
|
page read and write
|
||
278F000
|
stack
|
page read and write
|
||
227A4000
|
trusted library allocation
|
page read and write
|
||
22E40000
|
trusted library allocation
|
page read and write
|
||
75C000
|
heap
|
page read and write
|
||
22E40000
|
trusted library allocation
|
page read and write
|
||
7AE0000
|
trusted library allocation
|
page execute and read and write
|
||
2064E000
|
stack
|
page read and write
|
||
22E40000
|
trusted library allocation
|
page read and write
|
||
20B0000
|
heap
|
page read and write
|
||
22E50000
|
trusted library allocation
|
page read and write
|
||
22E50000
|
trusted library allocation
|
page read and write
|
||
3398000
|
heap
|
page read and write
|
||
4DD0000
|
heap
|
page read and write
|
||
7DC0000
|
trusted library allocation
|
page read and write
|
||
7B4A000
|
heap
|
page read and write
|
||
8E80000
|
direct allocation
|
page execute and read and write
|
||
77A000
|
heap
|
page read and write
|
||
4D95000
|
trusted library allocation
|
page execute and read and write
|
||
23540000
|
trusted library allocation
|
page read and write
|
||
23770000
|
trusted library allocation
|
page read and write
|
||
4AC0000
|
heap
|
page read and write
|
||
23750000
|
trusted library allocation
|
page read and write
|
There are 664 hidden memdumps, click here to show them.