Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
13w4NM6mPa.exe
|
PE32 executable (console) Intel 80386, for MS Windows
|
initial sample
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\ZJCZETOO\promo[1].exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\Desktop\lWjPtDoy2N.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\3D003UC5\17[1].htm
|
HTML document, ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\3D003UC5\json[1].json
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\YLNGKWRH\0[1].htm
|
HTML document, Unicode text, UTF-8 (with BOM) text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\ZVZFKMB9\0[1].htm
|
Unicode text, UTF-8 text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\ZVZFKMB9\1[1].htm
|
HTML document, Unicode text, UTF-8 (with BOM) text, with no line terminators
|
dropped
|
||
C:\Users\user\Desktop\IqIzor5JSF.exe
|
HTML document, ASCII text, with no line terminators
|
dropped
|
||
C:\Windows\appcompat\Programs\Amcache.hve
|
MS Windows registry file, NT/2000 or above
|
dropped
|
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\13w4NM6mPa.exe
|
"C:\Users\user\Desktop\13w4NM6mPa.exe"
|
||
C:\Users\user\Desktop\lWjPtDoy2N.exe
|
lWjPtDoy2N.exe
|
||
C:\Windows\SysWOW64\cmd.exe
|
cmd.exe "start /min cmd.exe "/c timeout /t 3 /nobreak & del "C:\Users\user\Desktop\lWjPtDoy2N.exe"""
|
||
C:\Windows\SysWOW64\cmd.exe
|
"C:\Windows\system32\cmd.exe" /c ping 127.0.0.1 && del "C:\Users\user\Desktop\13w4NM6mPa.exe"
|
||
C:\Windows\SysWOW64\PING.EXE
|
ping 127.0.0.1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\SysWOW64\timeout.exe
|
timeout /t 3 /nobreak
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
http://38.180.21.197/stats/17/0/0
|
38.180.21.197
|
||
incredibleextedwj.shop
|
|||
http://38.180.21.197/stats/17/1/1
|
38.180.21.197
|
||
shortsvelventysjo.shop
|
|||
tolerateilusidjukl.shop
|
|||
poledoverglazedkilio.shop
|
|||
liabilitynighstjsko.shop
|
|||
shatterbreathepsw.shop
|
|||
http://38.180.21.197/archives/17
|
38.180.21.197
|
||
http://38.180.21.197/archives/5
|
38.180.21.197
|
||
http://38.180.21.197/stats/15/0/0
|
38.180.21.197
|
||
demonstationfukewko.shop
|
|||
productivelookewr.shop
|
|||
alcojoldwograpciw.shop
|
|||
https://duckduckgo.com/chrome_newtab
|
unknown
|
||
https://support.mozilla.org/products/firefoxgro.allizom.troppus.zvXrErQ5GYDF
|
unknown
|
||
https://duckduckgo.com/ac/?q=
|
unknown
|
||
https://poledoverglazedkilio.shop/
|
unknown
|
||
https://www.google.com/images/branding/product/ico/googleg_lodp.ico
|
unknown
|
||
http://38.180.21.197/archives/15
|
unknown
|
||
http://ip-api.com/json
|
208.95.112.1
|
||
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
|
unknown
|
||
http://crl.rootca1.amazontrust.com/rootca1.crl0
|
unknown
|
||
http://upx.sf.net
|
unknown
|
||
https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
|
unknown
|
||
http://ocsp.rootca1.amazontrust.com0:
|
unknown
|
||
https://support.office.com/article/7D48285B-20E8-4B9B-91AD-216E34163BAD?wt.mc_id=EnterPK2016
|
unknown
|
||
https://support.office.com/article/94ba2e0b-638e-4a92-8857-2cb5ac1d8e17
|
unknown
|
||
http://38.180.21.197/archives/17?
|
unknown
|
||
https://www.ecosia.org/newtab/
|
unknown
|
||
http://38.180.21.197/stats/17/1/1S
|
unknown
|
||
https://support.mozilla.org/kb/customize-firefox-controls-buttons-and-toolbars?utm_source=firefox-br
|
unknown
|
||
http://38.180.21.197/stats/15/1/1
|
unknown
|
||
http://38.180.21.197/stats/17/1/1I
|
unknown
|
||
https://ac.ecosia.org/autocomplete?q=
|
unknown
|
||
http://x1.c.lencr.org/0
|
unknown
|
||
http://x1.i.lencr.org/0
|
unknown
|
||
https://pwsafe.org:
|
unknown
|
||
https://support.office.com/article/94ba2e0b-638e-4a92-8857-2cb5ac1d8e17Install
|
unknown
|
||
https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
|
unknown
|
||
https://support.microsof
|
unknown
|
||
http://crt.rootca1.amazontrust.com/rootca1.cer0?
|
unknown
|
||
http://38.180.21.197/stats/17/0/0http://38.180.21.197/stats/15/0/0http://38.180.21.197/archives/5htt
|
unknown
|
||
https://support.mozilla.org
|
unknown
|
||
https://support.office.com/article/7D48285B-20E8-4B9B-91AD-216E34163BAD?wt.mc_id=EnterPK2016Examples
|
unknown
|
||
https://poledoverglazedkilio.shop/api
|
172.67.153.60
|
||
http://ip-api.com/jsonSOR_
|
unknown
|
||
https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
|
unknown
|
There are 38 hidden URLs, click here to show them.
Domains
Name
|
IP
|
Malicious
|
|
---|---|---|---|
poledoverglazedkilio.shop
|
172.67.153.60
|
||
ip-api.com
|
208.95.112.1
|
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
38.180.21.197
|
unknown
|
United States
|
||
172.67.153.60
|
poledoverglazedkilio.shop
|
United States
|
||
127.0.0.1
|
unknown
|
unknown
|
||
208.95.112.1
|
ip-api.com
|
United States
|
Registry
Path
|
Value
|
Malicious
|
|
---|---|---|---|
HKEY_CURRENT_USER\SOFTWARE\SitronicsTeam
|
ZeHuilo
|
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
D0D000
|
unkown
|
page readonly
|
||
4C21000
|
heap
|
page read and write
|
||
30F4000
|
heap
|
page read and write
|
||
30F4000
|
heap
|
page read and write
|
||
5439000
|
trusted library allocation
|
page read and write
|
||
C90000
|
heap
|
page read and write
|
||
542A000
|
trusted library allocation
|
page read and write
|
||
540A000
|
trusted library allocation
|
page read and write
|
||
5409000
|
trusted library allocation
|
page read and write
|
||
5409000
|
trusted library allocation
|
page read and write
|
||
540A000
|
trusted library allocation
|
page read and write
|
||
30F4000
|
heap
|
page read and write
|
||
4C21000
|
heap
|
page read and write
|
||
4C21000
|
heap
|
page read and write
|
||
4BF0000
|
remote allocation
|
page read and write
|
||
2EAB000
|
heap
|
page read and write
|
||
3205000
|
heap
|
page read and write
|
||
2EA2000
|
heap
|
page read and write
|
||
2EA2000
|
heap
|
page read and write
|
||
2EFC000
|
heap
|
page read and write
|
||
534E000
|
stack
|
page read and write
|
||
5409000
|
trusted library allocation
|
page read and write
|
||
509E000
|
stack
|
page read and write
|
||
2EA6000
|
heap
|
page read and write
|
||
541B000
|
trusted library allocation
|
page read and write
|
||
4C21000
|
heap
|
page read and write
|
||
5401000
|
trusted library allocation
|
page read and write
|
||
4C21000
|
heap
|
page read and write
|
||
4C21000
|
heap
|
page read and write
|
||
B70000
|
unkown
|
page readonly
|
||
30F4000
|
heap
|
page read and write
|
||
5600000
|
trusted library allocation
|
page read and write
|
||
2EAB000
|
heap
|
page read and write
|
||
5EE000
|
stack
|
page read and write
|
||
30F4000
|
heap
|
page read and write
|
||
2EAB000
|
heap
|
page read and write
|
||
4C21000
|
heap
|
page read and write
|
||
2EBC000
|
heap
|
page read and write
|
||
5443000
|
trusted library allocation
|
page read and write
|
||
2EA6000
|
heap
|
page read and write
|
||
2C0B000
|
unkown
|
page readonly
|
||
2BA0000
|
trusted library allocation
|
page read and write
|
||
56D7000
|
trusted library allocation
|
page read and write
|
||
2EAB000
|
heap
|
page read and write
|
||
2EA1000
|
heap
|
page read and write
|
||
4C21000
|
heap
|
page read and write
|
||
30F4000
|
heap
|
page read and write
|
||
4EFE000
|
stack
|
page read and write
|
||
B5B000
|
stack
|
page read and write
|
||
BC7000
|
unkown
|
page read and write
|
||
542B000
|
trusted library allocation
|
page read and write
|
||
2EA9000
|
heap
|
page read and write
|
||
322E000
|
heap
|
page read and write
|
||
4C21000
|
heap
|
page read and write
|
||
538F000
|
stack
|
page read and write
|
||
4C21000
|
heap
|
page read and write
|
||
5427000
|
trusted library allocation
|
page read and write
|
||
2EAB000
|
heap
|
page read and write
|
||
4C21000
|
heap
|
page read and write
|
||
2EA6000
|
heap
|
page read and write
|
||
2EA6000
|
heap
|
page read and write
|
||
2EAB000
|
heap
|
page read and write
|
||
2ECD000
|
heap
|
page read and write
|
||
30F4000
|
heap
|
page read and write
|
||
2E56000
|
heap
|
page read and write
|
||
2EA6000
|
heap
|
page read and write
|
||
2EA6000
|
heap
|
page read and write
|
||
2ED3000
|
heap
|
page read and write
|
||
347E000
|
stack
|
page read and write
|
||
2EA6000
|
heap
|
page read and write
|
||
2EC2000
|
heap
|
page read and write
|
||
2EA2000
|
heap
|
page read and write
|
||
5409000
|
trusted library allocation
|
page read and write
|
||
2EC1000
|
heap
|
page read and write
|
||
5438000
|
trusted library allocation
|
page read and write
|
||
2EAB000
|
heap
|
page read and write
|
||
4C21000
|
heap
|
page read and write
|
||
2EAB000
|
heap
|
page read and write
|
||
541B000
|
trusted library allocation
|
page read and write
|
||
4BF0000
|
remote allocation
|
page read and write
|
||
4C21000
|
heap
|
page read and write
|
||
519F000
|
stack
|
page read and write
|
||
30F4000
|
heap
|
page read and write
|
||
2EFE000
|
heap
|
page read and write
|
||
2EA6000
|
heap
|
page read and write
|
||
540A000
|
trusted library allocation
|
page read and write
|
||
4C21000
|
heap
|
page read and write
|
||
2E3A000
|
heap
|
page read and write
|
||
4C21000
|
heap
|
page read and write
|
||
2EAB000
|
heap
|
page read and write
|
||
2EBB000
|
heap
|
page read and write
|
||
543A000
|
trusted library allocation
|
page read and write
|
||
2EEA000
|
heap
|
page read and write
|
||
C3E000
|
stack
|
page read and write
|
||
30F4000
|
heap
|
page read and write
|
||
542E000
|
trusted library allocation
|
page read and write
|
||
560F000
|
trusted library allocation
|
page read and write
|
||
2EBE000
|
heap
|
page read and write
|
||
5435000
|
trusted library allocation
|
page read and write
|
||
543B000
|
trusted library allocation
|
page read and write
|
||
2EA3000
|
heap
|
page read and write
|
||
4C21000
|
heap
|
page read and write
|
||
2EAB000
|
heap
|
page read and write
|
||
543B000
|
trusted library allocation
|
page read and write
|
||
5402000
|
trusted library allocation
|
page read and write
|
||
4C21000
|
heap
|
page read and write
|
||
2C13000
|
heap
|
page read and write
|
||
543B000
|
trusted library allocation
|
page read and write
|
||
2EAB000
|
heap
|
page read and write
|
||
2EA1000
|
heap
|
page read and write
|
||
2EAB000
|
heap
|
page read and write
|
||
5408000
|
trusted library allocation
|
page read and write
|
||
2EA2000
|
heap
|
page read and write
|
||
2E4D000
|
heap
|
page read and write
|
||
2F01000
|
heap
|
page read and write
|
||
3170000
|
heap
|
page read and write
|
||
2EA2000
|
heap
|
page read and write
|
||
4C21000
|
heap
|
page read and write
|
||
2EA6000
|
heap
|
page read and write
|
||
4C21000
|
heap
|
page read and write
|
||
54CF000
|
stack
|
page read and write
|
||
5606000
|
trusted library allocation
|
page read and write
|
||
4C21000
|
heap
|
page read and write
|
||
5435000
|
trusted library allocation
|
page read and write
|
||
4C21000
|
heap
|
page read and write
|
||
2EAB000
|
heap
|
page read and write
|
||
542B000
|
trusted library allocation
|
page read and write
|
||
5441000
|
trusted library allocation
|
page read and write
|
||
2E12000
|
heap
|
page read and write
|
||
174A000
|
unkown
|
page execute read
|
||
CD0000
|
unkown
|
page readonly
|
||
2EA6000
|
heap
|
page read and write
|
||
5406000
|
trusted library allocation
|
page read and write
|
||
2EA6000
|
heap
|
page read and write
|
||
2BA0000
|
trusted library allocation
|
page read and write
|
||
2EC1000
|
heap
|
page read and write
|
||
4C21000
|
heap
|
page read and write
|
||
5408000
|
trusted library allocation
|
page read and write
|
||
30F4000
|
heap
|
page read and write
|
||
2E40000
|
heap
|
page read and write
|
||
2A5D000
|
unkown
|
page readonly
|
||
2EC4000
|
heap
|
page read and write
|
||
2A5D000
|
unkown
|
page readonly
|
||
540A000
|
trusted library allocation
|
page read and write
|
||
540A000
|
trusted library allocation
|
page read and write
|
||
B71000
|
unkown
|
page execute read
|
||
5657000
|
trusted library allocation
|
page read and write
|
||
4C21000
|
heap
|
page read and write
|
||
30F4000
|
heap
|
page read and write
|
||
4D75000
|
heap
|
page read and write
|
||
543A000
|
trusted library allocation
|
page read and write
|
||
5402000
|
trusted library allocation
|
page read and write
|
||
4C21000
|
heap
|
page read and write
|
||
524F000
|
stack
|
page read and write
|
||
5441000
|
trusted library allocation
|
page read and write
|
||
30F4000
|
heap
|
page read and write
|
||
2E9E000
|
heap
|
page read and write
|
||
2EA1000
|
heap
|
page read and write
|
||
D44000
|
unkown
|
page read and write
|
||
2EC8000
|
heap
|
page read and write
|
||
2EF1000
|
heap
|
page read and write
|
||
540C000
|
trusted library allocation
|
page read and write
|
||
2EAB000
|
heap
|
page read and write
|
||
30F4000
|
heap
|
page read and write
|
||
595E000
|
stack
|
page read and write
|
||
543A000
|
trusted library allocation
|
page read and write
|
||
2DB0000
|
heap
|
page read and write
|
||
2E9E000
|
heap
|
page read and write
|
||
4C21000
|
heap
|
page read and write
|
||
2ED5000
|
heap
|
page read and write
|
||
AF8000
|
stack
|
page read and write
|
||
5409000
|
trusted library allocation
|
page read and write
|
||
2EAB000
|
heap
|
page read and write
|
||
4EC000
|
stack
|
page read and write
|
||
540A000
|
trusted library allocation
|
page read and write
|
||
545C000
|
trusted library allocation
|
page read and write
|
||
2EAA000
|
heap
|
page read and write
|
||
543B000
|
trusted library allocation
|
page read and write
|
||
217E000
|
unkown
|
page execute read
|
||
2B4C000
|
unkown
|
page execute read
|
||
2F01000
|
heap
|
page read and write
|
||
4C21000
|
heap
|
page read and write
|
||
2E5E000
|
heap
|
page read and write
|
||
3150000
|
heap
|
page read and write
|
||
2EAB000
|
heap
|
page read and write
|
||
2EA6000
|
heap
|
page read and write
|
||
2E90000
|
heap
|
page read and write
|
||
2EA3000
|
heap
|
page read and write
|
||
30F4000
|
heap
|
page read and write
|
||
541A000
|
trusted library allocation
|
page read and write
|
||
2EA2000
|
heap
|
page read and write
|
||
2EAB000
|
heap
|
page read and write
|
||
4C21000
|
heap
|
page read and write
|
||
318A000
|
heap
|
page read and write
|
||
2EA6000
|
heap
|
page read and write
|
||
2EA6000
|
heap
|
page read and write
|
||
30F4000
|
heap
|
page read and write
|
||
2E33000
|
heap
|
page read and write
|
||
D1B000
|
unkown
|
page execute read
|
||
4C21000
|
heap
|
page read and write
|
||
4C21000
|
heap
|
page read and write
|
||
2EAB000
|
heap
|
page read and write
|
||
5402000
|
trusted library allocation
|
page read and write
|
||
562F000
|
stack
|
page read and write
|
||
561F000
|
trusted library allocation
|
page read and write
|
||
2EC1000
|
heap
|
page read and write
|
||
56FF000
|
stack
|
page read and write
|
||
4C21000
|
heap
|
page read and write
|
||
2EA2000
|
heap
|
page read and write
|
||
541B000
|
trusted library allocation
|
page read and write
|
||
2EA2000
|
heap
|
page read and write
|
||
2EF2000
|
heap
|
page read and write
|
||
214C000
|
unkown
|
page execute read
|
||
2ECD000
|
heap
|
page read and write
|
||
2EA1000
|
heap
|
page read and write
|
||
547B000
|
trusted library allocation
|
page read and write
|
||
4C21000
|
heap
|
page read and write
|
||
4C21000
|
heap
|
page read and write
|
||
542B000
|
trusted library allocation
|
page read and write
|
||
50F0000
|
heap
|
page read and write
|
||
5419000
|
trusted library allocation
|
page read and write
|
||
2EA6000
|
heap
|
page read and write
|
||
2EDA000
|
heap
|
page read and write
|
||
2EA6000
|
heap
|
page read and write
|
||
4D70000
|
heap
|
page read and write
|
||
5474000
|
trusted library allocation
|
page read and write
|
||
30F4000
|
heap
|
page read and write
|
||
2EBC000
|
heap
|
page read and write
|
||
4C21000
|
heap
|
page read and write
|
||
4C21000
|
heap
|
page read and write
|
||
4C21000
|
heap
|
page read and write
|
||
2EA6000
|
heap
|
page read and write
|
||
2EA6000
|
heap
|
page read and write
|
||
5401000
|
trusted library allocation
|
page read and write
|
||
2C13000
|
heap
|
page read and write
|
||
5409000
|
trusted library allocation
|
page read and write
|
||
2EAB000
|
heap
|
page read and write
|
||
57BD000
|
stack
|
page read and write
|
||
542D000
|
trusted library allocation
|
page read and write
|
||
56CF000
|
trusted library allocation
|
page read and write
|
||
2EA2000
|
heap
|
page read and write
|
||
30F4000
|
heap
|
page read and write
|
||
2EA1000
|
heap
|
page read and write
|
||
2EA2000
|
heap
|
page read and write
|
||
4C20000
|
heap
|
page read and write
|
||
2EA6000
|
heap
|
page read and write
|
||
542B000
|
trusted library allocation
|
page read and write
|
||
4C21000
|
heap
|
page read and write
|
||
2ED4000
|
heap
|
page read and write
|
||
4C21000
|
heap
|
page read and write
|
||
2EC1000
|
heap
|
page read and write
|
||
30F4000
|
heap
|
page read and write
|
||
2EAB000
|
heap
|
page read and write
|
||
2EA2000
|
heap
|
page read and write
|
||
CD0000
|
unkown
|
page readonly
|
||
5409000
|
trusted library allocation
|
page read and write
|
||
5F0000
|
heap
|
page read and write
|
||
2EA6000
|
heap
|
page read and write
|
||
174C000
|
unkown
|
page execute read
|
||
4C21000
|
heap
|
page read and write
|
||
2E2B000
|
heap
|
page read and write
|
||
2C0B000
|
unkown
|
page readonly
|
||
541B000
|
trusted library allocation
|
page read and write
|
||
5737000
|
trusted library allocation
|
page read and write
|
||
D4A000
|
unkown
|
page execute read
|
||
5452000
|
trusted library allocation
|
page read and write
|
||
541A000
|
trusted library allocation
|
page read and write
|
||
5438000
|
trusted library allocation
|
page read and write
|
||
2EA6000
|
heap
|
page read and write
|
||
580000
|
heap
|
page read and write
|
||
2EAB000
|
heap
|
page read and write
|
||
5D0C000
|
stack
|
page read and write
|
||
5404000
|
trusted library allocation
|
page read and write
|
||
540A000
|
trusted library allocation
|
page read and write
|
||
B70000
|
unkown
|
page readonly
|
||
30F4000
|
heap
|
page read and write
|
||
2C00000
|
heap
|
page read and write
|
||
4C21000
|
heap
|
page read and write
|
||
5432000
|
trusted library allocation
|
page read and write
|
||
56DF000
|
trusted library allocation
|
page read and write
|
||
52DE000
|
stack
|
page read and write
|
||
2EC6000
|
heap
|
page read and write
|
||
2EA1000
|
heap
|
page read and write
|
||
7F0000
|
heap
|
page read and write
|
||
4F3D000
|
stack
|
page read and write
|
||
541A000
|
trusted library allocation
|
page read and write
|
||
577B000
|
stack
|
page read and write
|
||
CD1000
|
unkown
|
page execute read
|
||
30F4000
|
heap
|
page read and write
|
||
79C000
|
stack
|
page read and write
|
||
5A0000
|
heap
|
page read and write
|
||
543B000
|
trusted library allocation
|
page read and write
|
||
214C000
|
unkown
|
page execute read
|
||
540A000
|
trusted library allocation
|
page read and write
|
||
2EBB000
|
heap
|
page read and write
|
||
2EA6000
|
heap
|
page read and write
|
||
318E000
|
heap
|
page read and write
|
||
4C21000
|
heap
|
page read and write
|
||
30F4000
|
heap
|
page read and write
|
||
4E00000
|
trusted library allocation
|
page read and write
|
||
4C21000
|
heap
|
page read and write
|
||
51DE000
|
stack
|
page read and write
|
||
2EAB000
|
heap
|
page read and write
|
||
5401000
|
trusted library allocation
|
page read and write
|
||
2B9F000
|
stack
|
page read and write
|
||
30F4000
|
heap
|
page read and write
|
||
30F0000
|
heap
|
page read and write
|
||
2EAB000
|
heap
|
page read and write
|
||
2EA6000
|
heap
|
page read and write
|
||
4C21000
|
heap
|
page read and write
|
||
2EAB000
|
heap
|
page read and write
|
||
547C000
|
trusted library allocation
|
page read and write
|
||
2EA1000
|
heap
|
page read and write
|
||
5637000
|
trusted library allocation
|
page read and write
|
||
2EAB000
|
heap
|
page read and write
|
||
177E000
|
unkown
|
page execute read
|
||
2EBC000
|
heap
|
page read and write
|
||
541B000
|
trusted library allocation
|
page read and write
|
||
2EA6000
|
heap
|
page read and write
|
||
543B000
|
trusted library allocation
|
page read and write
|
||
4C21000
|
heap
|
page read and write
|
||
4C21000
|
heap
|
page read and write
|
||
4C21000
|
heap
|
page read and write
|
||
2EBC000
|
heap
|
page read and write
|
||
2E3C000
|
heap
|
page read and write
|
||
2EA1000
|
heap
|
page read and write
|
||
2EC2000
|
heap
|
page read and write
|
||
503C000
|
stack
|
page read and write
|
||
2EA2000
|
heap
|
page read and write
|
||
2C13000
|
heap
|
page read and write
|
||
5BB0000
|
heap
|
page read and write
|
||
52C000
|
stack
|
page read and write
|
||
2EA6000
|
heap
|
page read and write
|
||
177E000
|
unkown
|
page execute read
|
||
5405000
|
trusted library allocation
|
page read and write
|
||
2EAB000
|
heap
|
page read and write
|
||
58BE000
|
stack
|
page read and write
|
||
89E000
|
stack
|
page read and write
|
||
2E4A000
|
heap
|
page read and write
|
||
541A000
|
trusted library allocation
|
page read and write
|
||
4BF0000
|
remote allocation
|
page read and write
|
||
5483000
|
trusted library allocation
|
page read and write
|
||
2EBB000
|
heap
|
page read and write
|
||
30F4000
|
heap
|
page read and write
|
||
4C21000
|
heap
|
page read and write
|
||
552E000
|
stack
|
page read and write
|
||
2DA0000
|
heap
|
page read and write
|
||
5800000
|
trusted library allocation
|
page read and write
|
||
4C21000
|
heap
|
page read and write
|
||
2ED5000
|
heap
|
page read and write
|
||
BCD000
|
unkown
|
page execute read
|
||
540A000
|
trusted library allocation
|
page read and write
|
||
2EA6000
|
heap
|
page read and write
|
||
5C0C000
|
stack
|
page read and write
|
||
542D000
|
trusted library allocation
|
page read and write
|
||
30FE000
|
stack
|
page read and write
|
||
5A5E000
|
stack
|
page read and write
|
||
567D000
|
stack
|
page read and write
|
||
2E3A000
|
heap
|
page read and write
|
||
542B000
|
trusted library allocation
|
page read and write
|
||
4C21000
|
heap
|
page read and write
|
||
2EAD000
|
heap
|
page read and write
|
||
30F4000
|
heap
|
page read and write
|
||
2EAB000
|
heap
|
page read and write
|
||
30F4000
|
heap
|
page read and write
|
||
30F4000
|
heap
|
page read and write
|
||
5403000
|
trusted library allocation
|
page read and write
|
||
2C13000
|
heap
|
page read and write
|
||
543B000
|
trusted library allocation
|
page read and write
|
||
B9C000
|
unkown
|
page read and write
|
||
2EBC000
|
heap
|
page read and write
|
||
2A48000
|
heap
|
page read and write
|
||
4C21000
|
heap
|
page read and write
|
||
542D000
|
trusted library allocation
|
page read and write
|
||
5463000
|
trusted library allocation
|
page read and write
|
||
4D20000
|
trusted library allocation
|
page read and write
|
||
541A000
|
trusted library allocation
|
page read and write
|
||
2EA2000
|
heap
|
page read and write
|
||
2EAB000
|
heap
|
page read and write
|
||
562F000
|
trusted library allocation
|
page read and write
|
||
4C21000
|
heap
|
page read and write
|
||
5438000
|
trusted library allocation
|
page read and write
|
||
5401000
|
trusted library allocation
|
page read and write
|
||
2EAB000
|
heap
|
page read and write
|
||
2EA6000
|
heap
|
page read and write
|
||
5402000
|
trusted library allocation
|
page read and write
|
||
2EA6000
|
heap
|
page read and write
|
||
30F4000
|
heap
|
page read and write
|
||
528E000
|
stack
|
page read and write
|
||
2EA6000
|
heap
|
page read and write
|
||
2E00000
|
heap
|
page read and write
|
||
CC0000
|
heap
|
page read and write
|
||
313E000
|
stack
|
page read and write
|
||
30F4000
|
heap
|
page read and write
|
||
5402000
|
trusted library allocation
|
page read and write
|
||
5406000
|
trusted library allocation
|
page read and write
|
||
C7E000
|
stack
|
page read and write
|
||
5436000
|
trusted library allocation
|
page read and write
|
||
2E6F000
|
heap
|
page read and write
|
||
2EBD000
|
heap
|
page read and write
|
||
5430000
|
trusted library allocation
|
page read and write
|
||
2EC8000
|
heap
|
page read and write
|
||
2A40000
|
heap
|
page read and write
|
||
5409000
|
trusted library allocation
|
page read and write
|
||
2EA6000
|
heap
|
page read and write
|
||
2EAB000
|
heap
|
page read and write
|
||
4C21000
|
heap
|
page read and write
|
||
2EA2000
|
heap
|
page read and write
|
||
4C21000
|
heap
|
page read and write
|
||
541B000
|
trusted library allocation
|
page read and write
|
||
540A000
|
trusted library allocation
|
page read and write
|
||
30F4000
|
heap
|
page read and write
|
||
5406000
|
trusted library allocation
|
page read and write
|
||
53CD000
|
stack
|
page read and write
|
||
2DFE000
|
stack
|
page read and write
|
||
30F4000
|
heap
|
page read and write
|
||
4C21000
|
heap
|
page read and write
|
||
2C13000
|
heap
|
page read and write
|
||
2B4C000
|
unkown
|
page execute read
|
||
B9E000
|
unkown
|
page execute read
|
||
2EA1000
|
heap
|
page read and write
|
||
2EAB000
|
heap
|
page read and write
|
||
4C01000
|
trusted library allocation
|
page read and write
|
||
2EAB000
|
heap
|
page read and write
|
||
541B000
|
trusted library allocation
|
page read and write
|
||
2C02000
|
heap
|
page read and write
|
||
31D3000
|
heap
|
page read and write
|
||
D10000
|
unkown
|
page read and write
|
||
2EA2000
|
heap
|
page read and write
|
||
2EE2000
|
heap
|
page read and write
|
||
337E000
|
stack
|
page read and write
|
||
544B000
|
trusted library allocation
|
page read and write
|
||
2EAB000
|
heap
|
page read and write
|
||
4C21000
|
heap
|
page read and write
|
||
7D0000
|
heap
|
page read and write
|
||
4440000
|
heap
|
page read and write
|
||
4C21000
|
heap
|
page read and write
|
||
2EA6000
|
heap
|
page read and write
|
||
514E000
|
stack
|
page read and write
|
||
2EA6000
|
heap
|
page read and write
|
||
2EAB000
|
heap
|
page read and write
|
||
541F000
|
trusted library allocation
|
page read and write
|
||
2EA6000
|
heap
|
page read and write
|
||
3180000
|
heap
|
page read and write
|
||
4C21000
|
heap
|
page read and write
|
||
4C21000
|
heap
|
page read and write
|
||
2EA6000
|
heap
|
page read and write
|
||
2EA6000
|
heap
|
page read and write
|
||
15CD000
|
unkown
|
page execute read
|
||
30F4000
|
heap
|
page read and write
|
||
2EA5000
|
heap
|
page read and write
|
||
B8E000
|
unkown
|
page readonly
|
||
29BF000
|
stack
|
page read and write
|
||
4C21000
|
heap
|
page read and write
|
||
5402000
|
trusted library allocation
|
page read and write
|
||
2EAB000
|
heap
|
page read and write
|
||
174C000
|
unkown
|
page execute read
|
||
83F000
|
stack
|
page read and write
|
||
2EAB000
|
heap
|
page read and write
|
||
5402000
|
trusted library allocation
|
page read and write
|
||
2EAB000
|
heap
|
page read and write
|
||
5D4E000
|
stack
|
page read and write
|
||
56A7000
|
trusted library allocation
|
page read and write
|
||
2EA2000
|
heap
|
page read and write
|
||
4C21000
|
heap
|
page read and write
|
||
2D4B000
|
stack
|
page read and write
|
||
4C21000
|
heap
|
page read and write
|
||
30F4000
|
heap
|
page read and write
|
||
4C21000
|
heap
|
page read and write
|
||
2EAB000
|
heap
|
page read and write
|
||
2EE9000
|
heap
|
page read and write
|
||
543B000
|
trusted library allocation
|
page read and write
|
||
2EA2000
|
heap
|
page read and write
|
||
2EA6000
|
heap
|
page read and write
|
||
B20000
|
heap
|
page read and write
|
||
4C30000
|
heap
|
page read and write
|
||
2EA6000
|
heap
|
page read and write
|
||
542D000
|
trusted library allocation
|
page read and write
|
||
5404000
|
trusted library allocation
|
page read and write
|
||
2EAB000
|
heap
|
page read and write
|
||
2EA1000
|
heap
|
page read and write
|
||
217E000
|
unkown
|
page execute read
|
||
576F000
|
trusted library allocation
|
page read and write
|
||
5402000
|
trusted library allocation
|
page read and write
|
||
2EAB000
|
heap
|
page read and write
|
||
5438000
|
trusted library allocation
|
page read and write
|
||
2EA6000
|
heap
|
page read and write
|
||
31EE000
|
heap
|
page read and write
|
||
2BED000
|
stack
|
page read and write
|
||
2EA6000
|
heap
|
page read and write
|
||
5E4F000
|
stack
|
page read and write
|
||
2EA6000
|
heap
|
page read and write
|
||
5400000
|
trusted library allocation
|
page read and write
|
There are 483 hidden memdumps, click here to show them.