Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
proforma invoice.exe
|
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
|
initial sample
|
||
C:\Users\user\AppData\Local\Temp\tmpC632.tmp
|
XML 1.0 document, ASCII text
|
dropped
|
||
C:\Users\user\AppData\Roaming\zsHSBdyxHEzyp.exe
|
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\proforma invoice.exe.log
|
ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\zsHSBdyxHEzyp.exe.log
|
ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_4emd4izv.juo.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_acibnpvi.ybg.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_o5xajurp.2hi.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_rhc0gjp4.xgy.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\tmpD17D.tmp
|
XML 1.0 document, ASCII text
|
dropped
|
||
C:\Users\user\AppData\Roaming\zsHSBdyxHEzyp.exe:Zone.Identifier
|
ASCII text, with CRLF line terminators
|
dropped
|
There are 2 hidden files, click here to show them.
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\proforma invoice.exe
|
"C:\Users\user\Desktop\proforma invoice.exe"
|
||
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
|
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\zsHSBdyxHEzyp.exe"
|
||
C:\Windows\SysWOW64\schtasks.exe
|
"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\zsHSBdyxHEzyp" /XML "C:\Users\user\AppData\Local\Temp\tmpC632.tmp"
|
||
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
|
"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"
|
||
C:\Users\user\AppData\Roaming\zsHSBdyxHEzyp.exe
|
C:\Users\user\AppData\Roaming\zsHSBdyxHEzyp.exe
|
||
C:\Windows\SysWOW64\schtasks.exe
|
"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\zsHSBdyxHEzyp" /XML "C:\Users\user\AppData\Local\Temp\tmpD17D.tmp"
|
||
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
|
"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\wbem\WmiPrvSE.exe
|
C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
There are 1 hidden processes, click here to show them.
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
https://api.ipify.org/
|
172.67.74.152
|
||
http://www.apache.org/licenses/LICENSE-2.0
|
unknown
|
||
http://www.fontbureau.com
|
unknown
|
||
http://www.fontbureau.com/designersG
|
unknown
|
||
http://www.fontbureau.com/designers/?
|
unknown
|
||
http://www.founder.com.cn/cn/bThe
|
unknown
|
||
https://account.dyn.com/
|
unknown
|
||
http://www.fontbureau.com/designers?
|
unknown
|
||
http://www.tiro.com
|
unknown
|
||
http://www.microsoft.
|
unknown
|
||
http://www.fontbureau.com/designers
|
unknown
|
||
http://www.goodfont.co.kr
|
unknown
|
||
https://api.ipify.org/t
|
unknown
|
||
http://www.carterandcone.coml
|
unknown
|
||
http://r3.i.lencr.org/0
|
unknown
|
||
http://www.sajatypeworks.com
|
unknown
|
||
http://www.typography.netD
|
unknown
|
||
http://www.fontbureau.com/designers/cabarga.htmlN
|
unknown
|
||
http://www.founder.com.cn/cn/cThe
|
unknown
|
||
http://www.galapagosdesign.com/staff/dennis.htm
|
unknown
|
||
https://api.ipify.org
|
unknown
|
||
http://www.founder.com.cn/cn
|
unknown
|
||
http://www.fontbureau.com/designers/frere-user.html
|
unknown
|
||
http://x1.c.lencr.org/0
|
unknown
|
||
http://x1.i.lencr.org/0
|
unknown
|
||
http://www.jiyu-kobo.co.jp/
|
unknown
|
||
http://r3.o.lencr.org0
|
unknown
|
||
http://www.galapagosdesign.com/DPlease
|
unknown
|
||
http://mail.satsllc.ae
|
unknown
|
||
http://www.fontbureau.com/designers8
|
unknown
|
||
http://www.fonts.com
|
unknown
|
||
http://www.sandoll.co.kr
|
unknown
|
||
http://www.urwpp.deDPlease
|
unknown
|
||
http://www.zhongyicts.com.cn
|
unknown
|
||
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
|
unknown
|
||
http://www.sakkal.com
|
unknown
|
There are 26 hidden URLs, click here to show them.
Domains
Name
|
IP
|
Malicious
|
|
---|---|---|---|
mail.satsllc.ae
|
92.205.14.36
|
||
api.ipify.org
|
172.67.74.152
|
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
92.205.14.36
|
mail.satsllc.ae
|
Germany
|
||
172.67.74.152
|
api.ipify.org
|
United States
|
Registry
Path
|
Value
|
Malicious
|
|
---|---|---|---|
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASAPI32
|
EnableFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASAPI32
|
EnableAutoFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASAPI32
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASAPI32
|
FileTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASAPI32
|
ConsoleTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASAPI32
|
MaxFileSize
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASAPI32
|
FileDirectory
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASMANCS
|
EnableFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASMANCS
|
EnableAutoFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASMANCS
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASMANCS
|
FileTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASMANCS
|
ConsoleTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASMANCS
|
MaxFileSize
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASMANCS
|
FileDirectory
|
There are 5 hidden registries, click here to show them.
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
2FB1000
|
trusted library allocation
|
page read and write
|
||
2FE4000
|
trusted library allocation
|
page read and write
|
||
330C000
|
trusted library allocation
|
page read and write
|
||
402000
|
remote allocation
|
page execute and read and write
|
||
2971000
|
trusted library allocation
|
page read and write
|
||
7510000
|
trusted library section
|
page read and write
|
||
32E1000
|
trusted library allocation
|
page read and write
|
||
3CB2000
|
trusted library allocation
|
page read and write
|
||
2FDC000
|
trusted library allocation
|
page read and write
|
||
3B53000
|
trusted library allocation
|
page read and write
|
||
45D2000
|
trusted library allocation
|
page read and write
|
||
2811000
|
trusted library allocation
|
page read and write
|
||
2FEF000
|
trusted library allocation
|
page read and write
|
||
6558000
|
heap
|
page read and write
|
||
2EC1000
|
trusted library allocation
|
page read and write
|
||
5825000
|
trusted library allocation
|
page read and write
|
||
70C0000
|
trusted library allocation
|
page execute and read and write
|
||
A28000
|
heap
|
page read and write
|
||
4E90000
|
heap
|
page read and write
|
||
66A9000
|
trusted library allocation
|
page read and write
|
||
87AE000
|
stack
|
page read and write
|
||
1040000
|
heap
|
page read and write
|
||
53A0000
|
heap
|
page read and write
|
||
6E95000
|
heap
|
page read and write
|
||
5460000
|
trusted library allocation
|
page read and write
|
||
17AB000
|
heap
|
page read and write
|
||
26F0000
|
trusted library allocation
|
page read and write
|
||
4DD1000
|
trusted library allocation
|
page read and write
|
||
536C000
|
stack
|
page read and write
|
||
4DB0000
|
heap
|
page read and write
|
||
4EC0000
|
trusted library allocation
|
page read and write
|
||
10E0000
|
trusted library allocation
|
page read and write
|
||
A81000
|
heap
|
page read and write
|
||
1164000
|
heap
|
page read and write
|
||
BED000
|
trusted library allocation
|
page execute and read and write
|
||
616A000
|
heap
|
page read and write
|
||
6B4E000
|
stack
|
page read and write
|
||
940000
|
heap
|
page read and write
|
||
2FCF000
|
stack
|
page read and write
|
||
70A0000
|
trusted library allocation
|
page execute and read and write
|
||
11A3000
|
heap
|
page read and write
|
||
1728000
|
heap
|
page read and write
|
||
3B4E000
|
trusted library allocation
|
page read and write
|
||
26DB000
|
trusted library allocation
|
page execute and read and write
|
||
BF0000
|
heap
|
page read and write
|
||
16D7000
|
trusted library allocation
|
page execute and read and write
|
||
4FEE000
|
stack
|
page read and write
|
||
2EBE000
|
trusted library allocation
|
page read and write
|
||
2ACA000
|
trusted library allocation
|
page read and write
|
||
5C70000
|
heap
|
page read and write
|
||
1450000
|
trusted library allocation
|
page read and write
|
||
3903000
|
trusted library allocation
|
page read and write
|
||
26D7000
|
trusted library allocation
|
page execute and read and write
|
||
F0E000
|
stack
|
page read and write
|
||
5AFB000
|
trusted library allocation
|
page read and write
|
||
2ECD000
|
trusted library allocation
|
page read and write
|
||
955000
|
heap
|
page read and write
|
||
4EA0000
|
trusted library allocation
|
page execute and read and write
|
||
4E00000
|
trusted library allocation
|
page read and write
|
||
6E65000
|
heap
|
page read and write
|
||
644E000
|
stack
|
page read and write
|
||
43E000
|
remote allocation
|
page execute and read and write
|
||
32C6000
|
trusted library allocation
|
page read and write
|
||
8B6E000
|
stack
|
page read and write
|
||
685D000
|
stack
|
page read and write
|
||
1470000
|
heap
|
page read and write
|
||
E90000
|
trusted library allocation
|
page read and write
|
||
531B000
|
stack
|
page read and write
|
||
6A0E000
|
stack
|
page read and write
|
||
6D20000
|
trusted library allocation
|
page execute and read and write
|
||
6800000
|
trusted library allocation
|
page read and write
|
||
4291000
|
trusted library allocation
|
page read and write
|
||
6E60000
|
heap
|
page read and write
|
||
960000
|
heap
|
page read and write
|
||
430000
|
heap
|
page read and write
|
||
2B4A000
|
stack
|
page read and write
|
||
1758000
|
heap
|
page read and write
|
||
2D40000
|
trusted library allocation
|
page read and write
|
||
4DF0000
|
trusted library allocation
|
page read and write
|
||
2F97000
|
trusted library allocation
|
page read and write
|
||
535E000
|
stack
|
page read and write
|
||
56F000
|
unkown
|
page read and write
|
||
690D000
|
stack
|
page read and write
|
||
4F90000
|
trusted library allocation
|
page execute and read and write
|
||
7551000
|
heap
|
page read and write
|
||
79E0000
|
trusted library allocation
|
page read and write
|
||
6D90000
|
trusted library allocation
|
page read and write
|
||
4DD0000
|
trusted library allocation
|
page read and write
|
||
10ED000
|
trusted library allocation
|
page execute and read and write
|
||
2600000
|
heap
|
page execute and read and write
|
||
27CE000
|
stack
|
page read and write
|
||
4D1D000
|
trusted library allocation
|
page read and write
|
||
5970000
|
heap
|
page read and write
|
||
270F000
|
stack
|
page read and write
|
||
6A4E000
|
stack
|
page read and write
|
||
616F000
|
heap
|
page read and write
|
||
2B0D000
|
stack
|
page read and write
|
||
16A4000
|
trusted library allocation
|
page read and write
|
||
2EA6000
|
trusted library allocation
|
page read and write
|
||
E96000
|
trusted library allocation
|
page execute and read and write
|
||
A050000
|
trusted library allocation
|
page execute and read and write
|
||
11FF000
|
heap
|
page read and write
|
||
10F0000
|
trusted library allocation
|
page read and write
|
||
10E3000
|
trusted library allocation
|
page execute and read and write
|
||
5B10000
|
trusted library allocation
|
page execute and read and write
|
||
596C000
|
stack
|
page read and write
|
||
39EE000
|
trusted library allocation
|
page read and write
|
||
5BF0000
|
trusted library allocation
|
page execute and read and write
|
||
940000
|
heap
|
page read and write
|
||
115A000
|
heap
|
page read and write
|
||
5D90000
|
trusted library allocation
|
page read and write
|
||
2EA0000
|
trusted library allocation
|
page read and write
|
||
970000
|
heap
|
page read and write
|
||
BC0000
|
trusted library allocation
|
page read and write
|
||
16A3000
|
trusted library allocation
|
page execute and read and write
|
||
489D000
|
stack
|
page read and write
|
||
2E90000
|
heap
|
page read and write
|
||
5BB0000
|
trusted library allocation
|
page execute and read and write
|
||
315E000
|
stack
|
page read and write
|
||
6120000
|
heap
|
page read and write
|
||
1720000
|
heap
|
page read and write
|
||
A10000
|
trusted library allocation
|
page read and write
|
||
3A15000
|
trusted library allocation
|
page read and write
|
||
67EE000
|
stack
|
page read and write
|
||
EA7000
|
trusted library allocation
|
page execute and read and write
|
||
167E000
|
stack
|
page read and write
|
||
42FB000
|
trusted library allocation
|
page read and write
|
||
2E3F000
|
unkown
|
page read and write
|
||
3291000
|
trusted library allocation
|
page read and write
|
||
5980000
|
heap
|
page execute and read and write
|
||
968000
|
heap
|
page read and write
|
||
111B000
|
trusted library allocation
|
page execute and read and write
|
||
5C20000
|
heap
|
page read and write
|
||
4DE0000
|
trusted library allocation
|
page read and write
|
||
1112000
|
trusted library allocation
|
page read and write
|
||
6810000
|
trusted library allocation
|
page read and write
|
||
4850000
|
trusted library allocation
|
page read and write
|
||
16D5000
|
trusted library allocation
|
page execute and read and write
|
||
4DC0000
|
trusted library allocation
|
page execute and read and write
|
||
2780000
|
heap
|
page execute and read and write
|
||
54DE000
|
stack
|
page read and write
|
||
AD000
|
stack
|
page read and write
|
||
16A0000
|
trusted library allocation
|
page read and write
|
||
5A60000
|
trusted library allocation
|
page execute and read and write
|
||
2E8E000
|
stack
|
page read and write
|
||
1106000
|
trusted library allocation
|
page execute and read and write
|
||
1970000
|
heap
|
page read and write
|
||
AC6000
|
heap
|
page read and write
|
||
3A75000
|
trusted library allocation
|
page read and write
|
||
950000
|
heap
|
page read and write
|
||
AB4F000
|
stack
|
page read and write
|
||
4A6C000
|
stack
|
page read and write
|
||
896D000
|
stack
|
page read and write
|
||
4DDD000
|
trusted library allocation
|
page read and write
|
||
125B000
|
stack
|
page read and write
|
||
2E80000
|
trusted library allocation
|
page read and write
|
||
24E0000
|
trusted library allocation
|
page read and write
|
||
657E000
|
stack
|
page read and write
|
||
EAB000
|
trusted library allocation
|
page execute and read and write
|
||
5BA0000
|
heap
|
page read and write
|
||
252E000
|
stack
|
page read and write
|
||
4E70000
|
heap
|
page read and write
|
||
E0E000
|
stack
|
page read and write
|
||
1130000
|
heap
|
page read and write
|
||
2EAB000
|
trusted library allocation
|
page read and write
|
||
E92000
|
trusted library allocation
|
page read and write
|
||
2890000
|
heap
|
page read and write
|
||
CFF000
|
stack
|
page read and write
|
||
7530000
|
heap
|
page read and write
|
||
8F7000
|
stack
|
page read and write
|
||
903D000
|
stack
|
page read and write
|
||
5AF0000
|
trusted library allocation
|
page read and write
|
||
26C6000
|
trusted library allocation
|
page execute and read and write
|
||
1115000
|
trusted library allocation
|
page execute and read and write
|
||
2850000
|
trusted library allocation
|
page read and write
|
||
16DB000
|
trusted library allocation
|
page execute and read and write
|
||
8C6F000
|
stack
|
page read and write
|
||
6FA0000
|
heap
|
page read and write
|
||
A84B000
|
stack
|
page read and write
|
||
1530000
|
heap
|
page read and write
|
||
703F000
|
stack
|
page read and write
|
||
BD0000
|
trusted library allocation
|
page read and write
|
||
25E4000
|
trusted library allocation
|
page read and write
|
||
6F9E000
|
stack
|
page read and write
|
||
2EB0000
|
heap
|
page read and write
|
||
96E000
|
heap
|
page read and write
|
||
5A7B000
|
stack
|
page read and write
|
||
6EB7000
|
heap
|
page read and write
|
||
1A0000
|
heap
|
page read and write
|
||
5800000
|
trusted library allocation
|
page read and write
|
||
97F000
|
heap
|
page read and write
|
||
26CA000
|
trusted library allocation
|
page execute and read and write
|
||
32DD000
|
trusted library allocation
|
page read and write
|
||
16C6000
|
trusted library allocation
|
page execute and read and write
|
||
521E000
|
stack
|
page read and write
|
||
259E000
|
stack
|
page read and write
|
||
4D0E000
|
trusted library allocation
|
page read and write
|
||
2E93000
|
heap
|
page read and write
|
||
E9A000
|
trusted library allocation
|
page execute and read and write
|
||
6CFD000
|
stack
|
page read and write
|
||
25E0000
|
trusted library allocation
|
page read and write
|
||
4DB4000
|
trusted library allocation
|
page read and write
|
||
52DE000
|
stack
|
page read and write
|
||
1535000
|
heap
|
page read and write
|
||
A261000
|
heap
|
page read and write
|
||
710A000
|
trusted library allocation
|
page read and write
|
||
292F000
|
trusted library allocation
|
page read and write
|
||
1936000
|
trusted library allocation
|
page read and write
|
||
5BD0000
|
trusted library allocation
|
page read and write
|
||
5080000
|
heap
|
page read and write
|
||
501E000
|
stack
|
page read and write
|
||
2830000
|
trusted library allocation
|
page execute and read and write
|
||
691F000
|
stack
|
page read and write
|
||
2EB2000
|
trusted library allocation
|
page read and write
|
||
4DF3000
|
heap
|
page read and write
|
||
1167000
|
heap
|
page read and write
|
||
4472000
|
trusted library allocation
|
page read and write
|
||
A6A0000
|
heap
|
page read and write
|
||
5000000
|
trusted library allocation
|
page read and write
|
||
2FD8000
|
trusted library allocation
|
page read and write
|
||
9FE000
|
stack
|
page read and write
|
||
26BD000
|
trusted library allocation
|
page execute and read and write
|
||
4D11000
|
trusted library allocation
|
page read and write
|
||
2EBA000
|
trusted library allocation
|
page read and write
|
||
709E000
|
stack
|
page read and write
|
||
6FFE000
|
stack
|
page read and write
|
||
3AF1000
|
trusted library allocation
|
page read and write
|
||
5D4E000
|
stack
|
page read and write
|
||
4ED0000
|
heap
|
page read and write
|
||
1930000
|
trusted library allocation
|
page read and write
|
||
1710000
|
trusted library allocation
|
page read and write
|
||
1430000
|
trusted library allocation
|
page read and write
|
||
2F6C000
|
trusted library allocation
|
page read and write
|
||
4CF0000
|
trusted library allocation
|
page read and write
|
||
4DE2000
|
trusted library allocation
|
page read and write
|
||
16CA000
|
trusted library allocation
|
page execute and read and write
|
||
2F9F000
|
trusted library allocation
|
page read and write
|
||
A69E000
|
stack
|
page read and write
|
||
A3D000
|
trusted library allocation
|
page execute and read and write
|
||
2882000
|
trusted library allocation
|
page read and write
|
||
3306000
|
trusted library allocation
|
page read and write
|
||
270F000
|
stack
|
page read and write
|
||
280E000
|
stack
|
page read and write
|
||
330A000
|
trusted library allocation
|
page read and write
|
||
25DC000
|
stack
|
page read and write
|
||
400000
|
remote allocation
|
page execute and read and write
|
||
4DE0000
|
trusted library allocation
|
page read and write
|
||
519E000
|
stack
|
page read and write
|
||
ADA000
|
heap
|
page read and write
|
||
546E000
|
stack
|
page read and write
|
||
29E2000
|
trusted library allocation
|
page read and write
|
||
5830000
|
heap
|
page read and write
|
||
5B7D000
|
stack
|
page read and write
|
||
6970000
|
trusted library allocation
|
page read and write
|
||
17F7000
|
heap
|
page read and write
|
||
6D10000
|
heap
|
page read and write
|
||
5BC0000
|
trusted library allocation
|
page read and write
|
||
6CA0000
|
trusted library allocation
|
page read and write
|
||
6D20000
|
trusted library allocation
|
page execute and read and write
|
||
10D0000
|
trusted library allocation
|
page read and write
|
||
3BF5000
|
trusted library allocation
|
page read and write
|
||
5B55000
|
heap
|
page read and write
|
||
4DD4000
|
trusted library allocation
|
page read and write
|
||
6588000
|
heap
|
page read and write
|
||
584E000
|
stack
|
page read and write
|
||
3971000
|
trusted library allocation
|
page read and write
|
||
560C000
|
stack
|
page read and write
|
||
9140000
|
trusted library allocation
|
page execute and read and write
|
||
6100000
|
heap
|
page read and write
|
||
5B50000
|
heap
|
page read and write
|
||
49AC000
|
stack
|
page read and write
|
||
8EBC000
|
stack
|
page read and write
|
||
3FCB000
|
trusted library allocation
|
page read and write
|
||
5B90000
|
heap
|
page read and write
|
||
2C68000
|
trusted library allocation
|
page read and write
|
||
4E30000
|
heap
|
page read and write
|
||
17B9000
|
heap
|
page read and write
|
||
3C72000
|
trusted library allocation
|
page read and write
|
||
570E000
|
stack
|
page read and write
|
||
5C00000
|
heap
|
page read and write
|
||
110A000
|
trusted library allocation
|
page execute and read and write
|
||
16AD000
|
trusted library allocation
|
page execute and read and write
|
||
4D70000
|
trusted library allocation
|
page read and write
|
||
2C5E000
|
stack
|
page read and write
|
||
BDD000
|
trusted library allocation
|
page execute and read and write
|
||
2FF6000
|
trusted library allocation
|
page read and write
|
||
25E6000
|
trusted library allocation
|
page read and write
|
||
2FAD000
|
trusted library allocation
|
page read and write
|
||
A39D000
|
stack
|
page read and write
|
||
174A000
|
heap
|
page read and write
|
||
5A8C000
|
stack
|
page read and write
|
||
505E000
|
stack
|
page read and write
|
||
F10000
|
heap
|
page read and write
|
||
3314000
|
trusted library allocation
|
page read and write
|
||
680D000
|
trusted library allocation
|
page read and write
|
||
54F0000
|
heap
|
page read and write
|
||
5ACE000
|
stack
|
page read and write
|
||
2E40000
|
heap
|
page read and write
|
||
16C0000
|
trusted library allocation
|
page read and write
|
||
6808000
|
trusted library allocation
|
page read and write
|
||
1700000
|
trusted library allocation
|
page execute and read and write
|
||
7100000
|
trusted library allocation
|
page read and write
|
||
740E000
|
stack
|
page read and write
|
||
A19000
|
heap
|
page read and write
|
||
668E000
|
stack
|
page read and write
|
||
3F61000
|
trusted library allocation
|
page read and write
|
||
1476000
|
heap
|
page read and write
|
||
A59E000
|
stack
|
page read and write
|
||
308A000
|
heap
|
page read and write
|
||
2BFE000
|
unkown
|
page read and write
|
||
9A0000
|
heap
|
page read and write
|
||
7F1B0000
|
trusted library allocation
|
page execute and read and write
|
||
150000
|
heap
|
page read and write
|
||
10E4000
|
trusted library allocation
|
page read and write
|
||
B80000
|
heap
|
page read and write
|
||
4D20000
|
trusted library allocation
|
page read and write
|
||
6570000
|
heap
|
page read and write
|
||
5A70000
|
trusted library allocation
|
page read and write
|
||
6B8E000
|
stack
|
page read and write
|
||
5C10000
|
heap
|
page read and write
|
||
FF0000
|
heap
|
page read and write
|
||
A40000
|
heap
|
page read and write
|
||
27D0000
|
trusted library allocation
|
page read and write
|
||
6803000
|
trusted library allocation
|
page read and write
|
||
5090000
|
heap
|
page execute and read and write
|
||
4DB0000
|
trusted library allocation
|
page read and write
|
||
4D35000
|
trusted library allocation
|
page read and write
|
||
A25D000
|
stack
|
page read and write
|
||
328E000
|
stack
|
page read and write
|
||
930000
|
heap
|
page read and write
|
||
BD3000
|
trusted library allocation
|
page execute and read and write
|
||
7290000
|
trusted library section
|
page read and write
|
||
1490000
|
heap
|
page read and write
|
||
1950000
|
heap
|
page read and write
|
||
7190000
|
heap
|
page read and write
|
||
EB7000
|
heap
|
page read and write
|
||
277B000
|
stack
|
page read and write
|
||
653E000
|
stack
|
page read and write
|
||
5FFE000
|
stack
|
page read and write
|
||
6DB2000
|
trusted library allocation
|
page read and write
|
||
19E000
|
unkown
|
page read and write
|
||
1976000
|
heap
|
page read and write
|
||
2F61000
|
trusted library allocation
|
page read and write
|
||
6CB7000
|
trusted library allocation
|
page read and write
|
||
4295000
|
trusted library allocation
|
page read and write
|
||
1117000
|
trusted library allocation
|
page execute and read and write
|
||
3A63000
|
trusted library allocation
|
page read and write
|
||
72C0000
|
trusted library allocation
|
page execute and read and write
|
||
4DD6000
|
trusted library allocation
|
page read and write
|
||
26CE000
|
stack
|
page read and write
|
||
2860000
|
heap
|
page read and write
|
||
72A0000
|
trusted library allocation
|
page execute and read and write
|
||
5BCE000
|
stack
|
page read and write
|
||
3180000
|
heap
|
page execute and read and write
|
||
6DBE000
|
stack
|
page read and write
|
||
A4E000
|
heap
|
page read and write
|
||
6E87000
|
heap
|
page read and write
|
||
2A91000
|
trusted library allocation
|
page read and write
|
||
2D50000
|
heap
|
page read and write
|
||
4D16000
|
trusted library allocation
|
page read and write
|
||
6C8E000
|
stack
|
page read and write
|
||
1934000
|
trusted library allocation
|
page read and write
|
||
2D3C000
|
stack
|
page read and write
|
||
16D0000
|
trusted library allocation
|
page read and write
|
||
5070000
|
trusted library section
|
page readonly
|
||
5C9000
|
stack
|
page read and write
|
||
2863000
|
trusted library allocation
|
page read and write
|
||
4EB0000
|
trusted library allocation
|
page read and write
|
||
29C3000
|
trusted library allocation
|
page read and write
|
||
4D22000
|
trusted library allocation
|
page read and write
|
||
5804000
|
trusted library allocation
|
page read and write
|
||
1510000
|
heap
|
page read and write
|
||
5074000
|
trusted library section
|
page readonly
|
||
5470000
|
trusted library allocation
|
page read and write
|
||
3979000
|
trusted library allocation
|
page read and write
|
||
3811000
|
trusted library allocation
|
page read and write
|
||
5298000
|
trusted library allocation
|
page read and write
|
||
6CB0000
|
trusted library allocation
|
page read and write
|
||
2840000
|
trusted library allocation
|
page read and write
|
||
163E000
|
stack
|
page read and write
|
||
4DDB000
|
trusted library allocation
|
page read and write
|
||
545F000
|
stack
|
page read and write
|
||
57E0000
|
heap
|
page read and write
|
||
26D0000
|
trusted library allocation
|
page read and write
|
||
25F0000
|
trusted library allocation
|
page read and write
|
||
2E60000
|
heap
|
page read and write
|
||
66EE000
|
stack
|
page read and write
|
||
5E0000
|
heap
|
page read and write
|
||
1755000
|
heap
|
page read and write
|
||
BAA000
|
stack
|
page read and write
|
||
4FF0000
|
trusted library allocation
|
page read and write
|
||
7780000
|
trusted library allocation
|
page read and write
|
||
5020000
|
heap
|
page read and write
|
||
A33000
|
trusted library allocation
|
page execute and read and write
|
||
5020000
|
heap
|
page execute and read and write
|
||
506E000
|
stack
|
page read and write
|
||
A34000
|
trusted library allocation
|
page read and write
|
||
70B0000
|
trusted library allocation
|
page read and write
|
||
65F3000
|
heap
|
page read and write
|
||
2868000
|
heap
|
page read and write
|
||
4FDE000
|
stack
|
page read and write
|
||
6817000
|
trusted library allocation
|
page read and write
|
||
579000
|
stack
|
page read and write
|
||
750E000
|
stack
|
page read and write
|
||
913E000
|
stack
|
page read and write
|
||
3C71000
|
trusted library allocation
|
page read and write
|
||
9BE000
|
stack
|
page read and write
|
||
A3DD000
|
stack
|
page read and write
|
||
5C60000
|
heap
|
page read and write
|
||
E9000
|
stack
|
page read and write
|
||
995000
|
heap
|
page read and write
|
||
43B000
|
heap
|
page read and write
|
||
3B11000
|
trusted library allocation
|
page read and write
|
||
5C05000
|
heap
|
page read and write
|
||
4ED3000
|
heap
|
page read and write
|
||
7FCE0000
|
trusted library allocation
|
page execute and read and write
|
||
B6E000
|
stack
|
page read and write
|
||
42B9000
|
trusted library allocation
|
page read and write
|
||
2F50000
|
heap
|
page execute and read and write
|
||
281D000
|
stack
|
page read and write
|
||
4D60000
|
heap
|
page read and write
|
||
872E000
|
stack
|
page read and write
|
||
1460000
|
trusted library allocation
|
page read and write
|
||
16D2000
|
trusted library allocation
|
page read and write
|
||
72B0000
|
trusted library allocation
|
page read and write
|
||
8497000
|
trusted library allocation
|
page read and write
|
||
5F0000
|
heap
|
page read and write
|
||
3080000
|
heap
|
page read and write
|
||
6967000
|
trusted library allocation
|
page read and write
|
||
4DDD000
|
trusted library allocation
|
page read and write
|
||
529E000
|
stack
|
page read and write
|
||
3316000
|
trusted library allocation
|
page read and write
|
||
6960000
|
trusted library allocation
|
page read and write
|
||
430000
|
unkown
|
page readonly
|
||
4EB4000
|
trusted library allocation
|
page read and write
|
||
678D000
|
stack
|
page read and write
|
||
191E000
|
stack
|
page read and write
|
||
93E000
|
stack
|
page read and write
|
||
1100000
|
trusted library allocation
|
page read and write
|
||
9A3000
|
heap
|
page read and write
|
||
2E5E000
|
stack
|
page read and write
|
||
2550000
|
heap
|
page read and write
|
||
4CF4000
|
trusted library allocation
|
page read and write
|
||
53A0000
|
heap
|
page read and write
|
||
4E40000
|
trusted library allocation
|
page read and write
|
||
11B3000
|
heap
|
page read and write
|
||
6CE0000
|
trusted library allocation
|
page read and write
|
||
2BB0000
|
heap
|
page read and write
|
||
4FA0000
|
trusted library allocation
|
page execute and read and write
|
||
5500000
|
heap
|
page execute and read and write
|
||
8DBB000
|
stack
|
page read and write
|
||
AA4E000
|
stack
|
page read and write
|
||
432000
|
unkown
|
page readonly
|
||
4E10000
|
trusted library allocation
|
page read and write
|
||
3290000
|
heap
|
page read and write
|
||
14C0000
|
heap
|
page read and write
|
||
4DCE000
|
trusted library allocation
|
page read and write
|
||
A94C000
|
stack
|
page read and write
|
||
6880000
|
trusted library allocation
|
page execute and read and write
|
||
1440000
|
trusted library allocation
|
page execute and read and write
|
||
6860000
|
trusted library allocation
|
page execute and read and write
|
||
6D60000
|
heap
|
page read and write
|
||
4DE000
|
unkown
|
page readonly
|
||
13B0000
|
heap
|
page read and write
|
||
655A000
|
heap
|
page read and write
|
||
A30000
|
trusted library allocation
|
page read and write
|
||
6104000
|
heap
|
page read and write
|
||
EA2000
|
trusted library allocation
|
page read and write
|
||
4D40000
|
trusted library allocation
|
page read and write
|
||
2EAE000
|
trusted library allocation
|
page read and write
|
||
2530000
|
trusted library allocation
|
page execute and read and write
|
||
150E000
|
stack
|
page read and write
|
||
3F89000
|
trusted library allocation
|
page read and write
|
||
2F2C000
|
stack
|
page read and write
|
||
6FBE000
|
stack
|
page read and write
|
||
6CAD000
|
trusted library allocation
|
page read and write
|
||
2D44000
|
trusted library allocation
|
page read and write
|
||
2540000
|
trusted library allocation
|
page read and write
|
||
6870000
|
trusted library allocation
|
page read and write
|
||
16B0000
|
trusted library allocation
|
page read and write
|
||
1045000
|
heap
|
page read and write
|
||
5C5E000
|
stack
|
page read and write
|
||
531E000
|
stack
|
page read and write
|
||
1359000
|
stack
|
page read and write
|
||
D0F000
|
stack
|
page read and write
|
||
57F4000
|
trusted library allocation
|
page read and write
|
||
A55E000
|
stack
|
page read and write
|
||
610E000
|
heap
|
page read and write
|
||
6DFE000
|
stack
|
page read and write
|
||
1050000
|
heap
|
page read and write
|
||
3308000
|
trusted library allocation
|
page read and write
|
||
A4A000
|
heap
|
page read and write
|
||
1690000
|
trusted library allocation
|
page read and write
|
||
32CF000
|
trusted library allocation
|
page read and write
|
||
1D0000
|
heap
|
page read and write
|
||
2EC6000
|
trusted library allocation
|
page read and write
|
||
8EFE000
|
stack
|
page read and write
|
||
296E000
|
stack
|
page read and write
|
||
1102000
|
trusted library allocation
|
page read and write
|
||
7960000
|
trusted library section
|
page read and write
|
||
A84000
|
heap
|
page read and write
|
||
876E000
|
stack
|
page read and write
|
||
26D2000
|
trusted library allocation
|
page read and write
|
||
4E05000
|
trusted library allocation
|
page read and write
|
||
7110000
|
trusted library allocation
|
page read and write
|
||
5A5F000
|
stack
|
page read and write
|
||
2A35000
|
trusted library allocation
|
page read and write
|
||
8F7000
|
stack
|
page read and write
|
||
594E000
|
stack
|
page read and write
|
||
EB0000
|
heap
|
page read and write
|
||
484E000
|
stack
|
page read and write
|
||
26C2000
|
trusted library allocation
|
page read and write
|
||
39C7000
|
trusted library allocation
|
page read and write
|
||
2FDA000
|
trusted library allocation
|
page read and write
|
||
1940000
|
trusted library allocation
|
page read and write
|
||
A0AE000
|
stack
|
page read and write
|
||
10FD000
|
trusted library allocation
|
page execute and read and write
|
||
16F0000
|
trusted library allocation
|
page read and write
|
||
6E8E000
|
heap
|
page read and write
|
||
3819000
|
trusted library allocation
|
page read and write
|
||
8CAE000
|
stack
|
page read and write
|
||
A20000
|
heap
|
page read and write
|
||
A3C000
|
heap
|
page read and write
|
||
4EBB000
|
trusted library allocation
|
page read and write
|
||
8FFE000
|
stack
|
page read and write
|
||
273E000
|
stack
|
page read and write
|
||
5D99000
|
trusted library allocation
|
page read and write
|
||
27DA000
|
trusted library allocation
|
page read and write
|
||
5D0F000
|
stack
|
page read and write
|
||
1920000
|
trusted library allocation
|
page read and write
|
||
BE0000
|
trusted library allocation
|
page read and write
|
||
26C0000
|
trusted library allocation
|
page read and write
|
||
6550000
|
heap
|
page read and write
|
||
61AD000
|
heap
|
page read and write
|
||
5C57000
|
heap
|
page read and write
|
||
4DF0000
|
heap
|
page read and write
|
||
8A08000
|
trusted library allocation
|
page read and write
|
||
16C2000
|
trusted library allocation
|
page read and write
|
||
5C0E000
|
stack
|
page read and write
|
||
5D8E000
|
stack
|
page read and write
|
||
BD4000
|
trusted library allocation
|
page read and write
|
||
26B0000
|
trusted library allocation
|
page read and write
|
||
5B80000
|
trusted library section
|
page readonly
|
||
4D30000
|
trusted library allocation
|
page read and write
|
||
1110000
|
trusted library allocation
|
page read and write
|
||
588D000
|
stack
|
page read and write
|
||
66A0000
|
trusted library allocation
|
page read and write
|
||
667D000
|
stack
|
page read and write
|
||
8970000
|
heap
|
page read and write
|
||
A77000
|
heap
|
page read and write
|
||
2558000
|
heap
|
page read and write
|
||
654B000
|
stack
|
page read and write
|
||
574E000
|
stack
|
page read and write
|
||
5819000
|
trusted library allocation
|
page read and write
|
||
EF9000
|
stack
|
page read and write
|
There are 545 hidden memdumps, click here to show them.