Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
z42MNA2024000000041-KWINTMADI-11310Y_K.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
|
initial sample
|
||
C:\Users\user\AppData\Local\australnegeren\indtgtskilden\Eksploderingers\Graasteneres.Sfa
|
ASCII text, with very long lines (58202), with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\australnegeren\indtgtskilden\Incoagulability\z42MNA2024000000041-KWINTMADI-11310Y_K.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
|
dropped
|
||
C:\Users\user\AppData\Roaming\mqerms.dat
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\T9RRWRNL\json[1].json
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\ModuleAnalysisCache
|
data
|
modified
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_lbg0zv3a.dzq.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_yaqdjhhs.boz.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\bhv71F5.tmp
|
Extensible storage engine DataBase, version 0x620, checksum 0xb20b6b62, page size 32768, DirtyShutdown, Windows version 10.0
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\dbrmaaaxofoayfrhavodhftpbvpppan
|
Unicode text, UTF-16, little-endian text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\australnegeren\indtgtskilden\Disproportionalt.Sve
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\australnegeren\indtgtskilden\Eksploderingers\Forstrkningsbjlken192.unu
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\australnegeren\indtgtskilden\Eksploderingers\Salvninger.ins
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\australnegeren\indtgtskilden\Eksploderingers\retsvidenskabs.con
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\australnegeren\indtgtskilden\Incoagulability\taxpayers.txt
|
ASCII text, with very long lines (340), with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\australnegeren\indtgtskilden\Incoagulability\z42MNA2024000000041-KWINTMADI-11310Y_K.exe:Zone.Identifier
|
ASCII text, with CRLF line terminators
|
dropped
|
There are 6 hidden files, click here to show them.
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\z42MNA2024000000041-KWINTMADI-11310Y_K.exe
|
"C:\Users\user\Desktop\z42MNA2024000000041-KWINTMADI-11310Y_K.exe"
|
||
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
|
"powershell.exe" -windowstyle hidden "$Accordionists=Get-Content 'C:\Users\user\AppData\Local\australnegeren\indtgtskilden\Eksploderingers\Graasteneres.Sfa';$zebraernes=$Accordionists.SubString(8504,3);.$zebraernes($Accordionists)"
|
||
C:\Windows\SysWOW64\cmd.exe
|
"C:\Windows\system32\cmd.exe" /c "set /A 1^^0"
|
||
C:\Program Files (x86)\Windows Mail\wab.exe
|
"C:\Program Files (x86)\windows mail\wab.exe"
|
||
C:\Windows\SysWOW64\cmd.exe
|
"C:\Windows\System32\cmd.exe" /c REG ADD HKCU\Software\Microsoft\Windows\CurrentVersion\Run /f /v "Startup key" /t REG_EXPAND_SZ
/d "%Oplagsmssigt19% -windowstyle minimized $Viceformnds=(Get-ItemProperty -Path 'HKCU:\Enecellens\').Bidslernes;%Oplagsmssigt19%
($Viceformnds)"
|
||
C:\Program Files (x86)\Windows Mail\wab.exe
|
"C:\Program Files (x86)\windows mail\wab.exe" /stext "C:\Users\user\AppData\Local\Temp\dbrmaaaxofoayfrhavodhftpbvpppan"
|
||
C:\Program Files (x86)\Windows Mail\wab.exe
|
"C:\Program Files (x86)\windows mail\wab.exe" /stext "C:\Users\user\AppData\Local\Temp\nvew"
|
||
C:\Program Files (x86)\Windows Mail\wab.exe
|
"C:\Program Files (x86)\windows mail\wab.exe" /stext "C:\Users\user\AppData\Local\Temp\xxkptdv"
|
||
C:\Program Files (x86)\Windows Mail\wab.exe
|
"C:\Program Files (x86)\windows mail\wab.exe" /stext "C:\Users\user\AppData\Local\Temp\xxkptdv"
|
||
C:\Program Files (x86)\Windows Mail\wab.exe
|
"C:\Program Files (x86)\windows mail\wab.exe" /stext "C:\Users\user\AppData\Local\Temp\xxkptdv"
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\SysWOW64\reg.exe
|
REG ADD HKCU\Software\Microsoft\Windows\CurrentVersion\Run /f /v "Startup key" /t REG_EXPAND_SZ /d "%Oplagsmssigt19% -windowstyle
minimized $Viceformnds=(Get-ItemProperty -Path 'HKCU:\Enecellens\').Bidslernes;%Oplagsmssigt19% ($Viceformnds)"
|
There are 3 hidden processes, click here to show them.
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
http://pesterbdd.com/images/Pester.png
|
unknown
|
||
learfo55ozj01.duckdns.org
|
|||
http://geoplugin.net/json.gp
|
178.237.33.50
|
||
http://geoplugin.net/json.gpcA=
|
unknown
|
||
http://nuget.org/NuGet.exe
|
unknown
|
||
http://www.imvu.comr
|
unknown
|
||
https://ricohltd.top/PIoDroeALMbPB243.bins
|
unknown
|
||
http://geoplugin.net/json.gphA
|
unknown
|
||
http://www.apache.org/licenses/LICENSE-2.0.html
|
unknown
|
||
https://contoso.com/License
|
unknown
|
||
http://www.imvu.com
|
unknown
|
||
https://contoso.com/Icon
|
unknown
|
||
http://www.nirsoft.net
|
unknown
|
||
http://nsis.sf.net/NSIS_ErrorError
|
unknown
|
||
https://github.com/Pester/Pester
|
unknown
|
||
http://www.imvu.comhttp://www.ebuddy.comhttps://www.google.com
|
unknown
|
||
https://ricohltd.top/
|
unknown
|
||
https://www.google.com
|
unknown
|
||
http://geoplugin.net/json.gpDA
|
unknown
|
||
http://geoplugin.net/json.gp)A
|
unknown
|
||
http://geoplugin.net/json.gpMA/
|
unknown
|
||
https://aka.ms/pscore6lB
|
unknown
|
||
https://contoso.com/
|
unknown
|
||
https://nuget.org/nuget.exe
|
unknown
|
||
https://ricohltd.top/PIoDroeALMbPB243.binoO
|
unknown
|
||
https://www.google.com/accounts/servicelogin
|
unknown
|
||
https://login.yahoo.com/config/login
|
unknown
|
||
http://geoplugin.net/json.gpLv
|
unknown
|
||
http://www.nirsoft.net/
|
unknown
|
||
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
|
unknown
|
||
https://ricohltd.top/PIoDroeALMbPB243.bin
|
172.67.191.112
|
||
http://geoplugin.net/json.gpAB
|
unknown
|
||
http://www.ebuddy.com
|
unknown
|
There are 23 hidden URLs, click here to show them.
Domains
Name
|
IP
|
Malicious
|
|
---|---|---|---|
learfo55ozj01.duckdns.org
|
193.222.96.21
|
||
geoplugin.net
|
178.237.33.50
|
||
ricohltd.top
|
172.67.191.112
|
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
193.222.96.21
|
learfo55ozj01.duckdns.org
|
Germany
|
||
172.67.191.112
|
ricohltd.top
|
United States
|
||
178.237.33.50
|
geoplugin.net
|
Netherlands
|
Registry
Path
|
Value
|
Malicious
|
|
---|---|---|---|
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Ecchymosed236\schmidt
|
plagiostomi
|
||
HKEY_CURRENT_USER\SOFTWARE\ensidige\Prothetical
|
fremelskningens
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\Baadskatter170\Uninstall\anklet
|
gydes
|
||
HKEY_CURRENT_USER\Enecellens
|
Bidslernes
|
||
HKEY_CURRENT_USER\Environment
|
Oplagsmssigt19
|
||
HKEY_CURRENT_USER\SOFTWARE\alpwovnb-G3F5OR
|
exepath
|
||
HKEY_CURRENT_USER\SOFTWARE\alpwovnb-G3F5OR
|
licence
|
||
HKEY_CURRENT_USER\SOFTWARE\alpwovnb-G3F5OR
|
time
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
|
Startup key
|
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
CE05000
|
direct allocation
|
page execute and read and write
|
||
8580000
|
heap
|
page read and write
|
||
8581000
|
heap
|
page read and write
|
||
8580000
|
heap
|
page read and write
|
||
4BD1000
|
heap
|
page read and write
|
||
4BD1000
|
heap
|
page read and write
|
||
2411E000
|
stack
|
page read and write
|
||
2F90000
|
trusted library section
|
page read and write
|
||
7930000
|
trusted library allocation
|
page read and write
|
||
2838000
|
heap
|
page read and write
|
||
408000
|
unkown
|
page readonly
|
||
2E30000
|
direct allocation
|
page read and write
|
||
2D9F000
|
heap
|
page read and write
|
||
57BB000
|
heap
|
page read and write
|
||
84B0000
|
direct allocation
|
page read and write
|
||
7A1B000
|
stack
|
page read and write
|
||
4BE5000
|
heap
|
page read and write
|
||
304E000
|
stack
|
page read and write
|
||
3220000
|
trusted library allocation
|
page read and write
|
||
4BD0000
|
heap
|
page read and write
|
||
408000
|
unkown
|
page readonly
|
||
34CE000
|
stack
|
page read and write
|
||
4BD1000
|
heap
|
page read and write
|
||
76F5000
|
remote allocation
|
page execute and read and write
|
||
3430000
|
heap
|
page read and write
|
||
4E10000
|
heap
|
page execute and read and write
|
||
8540000
|
trusted library allocation
|
page read and write
|
||
50D1000
|
heap
|
page read and write
|
||
3134000
|
trusted library allocation
|
page read and write
|
||
7940000
|
trusted library allocation
|
page read and write
|
||
870C000
|
stack
|
page read and write
|
||
4BFC000
|
heap
|
page read and write
|
||
24A23000
|
unclassified section
|
page execute and read and write
|
||
2415C000
|
stack
|
page read and write
|
||
2B0C000
|
stack
|
page read and write
|
||
4BFA000
|
heap
|
page read and write
|
||
82FF000
|
stack
|
page read and write
|
||
8558000
|
heap
|
page read and write
|
||
2F80000
|
trusted library section
|
page read and write
|
||
23D1F000
|
stack
|
page read and write
|
||
2EA4000
|
stack
|
page read and write
|
||
340D000
|
heap
|
page read and write
|
||
31D0000
|
heap
|
page readonly
|
||
7920000
|
trusted library allocation
|
page read and write
|
||
7542000
|
heap
|
page read and write
|
||
7650000
|
heap
|
page execute and read and write
|
||
3040000
|
heap
|
page read and write
|
||
4BF8000
|
heap
|
page read and write
|
||
3060000
|
heap
|
page read and write
|
||
782E000
|
stack
|
page read and write
|
||
858B000
|
heap
|
page read and write
|
||
8490000
|
direct allocation
|
page read and write
|
||
295E000
|
stack
|
page read and write
|
||
2D9E000
|
heap
|
page read and write
|
||
4BE8000
|
heap
|
page read and write
|
||
2E60000
|
direct allocation
|
page read and write
|
||
2FF4000
|
heap
|
page read and write
|
||
2BD0000
|
heap
|
page read and write
|
||
4BFA000
|
heap
|
page read and write
|
||
2D78000
|
heap
|
page read and write
|
||
4BF5000
|
heap
|
page read and write
|
||
2BB0000
|
heap
|
page readonly
|
||
401000
|
unkown
|
page execute read
|
||
4BF1000
|
heap
|
page read and write
|
||
4C0F000
|
heap
|
page read and write
|
||
2FF4000
|
heap
|
page read and write
|
||
24201000
|
direct allocation
|
page execute and read and write
|
||
24A0D000
|
unclassified section
|
page execute and read and write
|
||
339E000
|
stack
|
page read and write
|
||
6FD000
|
stack
|
page read and write
|
||
243B0000
|
heap
|
page read and write
|
||
84F000
|
stack
|
page read and write
|
||
847E000
|
stack
|
page read and write
|
||
4C0F000
|
heap
|
page read and write
|
||
2BC0000
|
heap
|
page read and write
|
||
4C58000
|
heap
|
page read and write
|
||
338E000
|
unkown
|
page read and write
|
||
7960000
|
trusted library allocation
|
page read and write
|
||
56CE000
|
heap
|
page read and write
|
||
4C17000
|
heap
|
page read and write
|
||
3248000
|
heap
|
page read and write
|
||
9205000
|
direct allocation
|
page execute and read and write
|
||
31E8000
|
trusted library allocation
|
page read and write
|
||
2A3C000
|
stack
|
page read and write
|
||
24216000
|
direct allocation
|
page execute and read and write
|
||
98F000
|
stack
|
page read and write
|
||
3037000
|
heap
|
page read and write
|
||
318B000
|
heap
|
page read and write
|
||
54D0000
|
trusted library allocation
|
page read and write
|
||
7950000
|
trusted library allocation
|
page read and write
|
||
23E3E000
|
stack
|
page read and write
|
||
8560000
|
trusted library allocation
|
page read and write
|
||
30FD000
|
stack
|
page read and write
|
||
54C0000
|
trusted library allocation
|
page read and write
|
||
2E8B000
|
stack
|
page read and write
|
||
3165000
|
trusted library allocation
|
page execute and read and write
|
||
85F0000
|
direct allocation
|
page read and write
|
||
2FF4000
|
heap
|
page read and write
|
||
6F2E000
|
stack
|
page read and write
|
||
2A1F000
|
stack
|
page read and write
|
||
2FE8000
|
heap
|
page read and write
|
||
78ED000
|
stack
|
page read and write
|
||
34A8000
|
heap
|
page read and write
|
||
2EAE000
|
stack
|
page read and write
|
||
401000
|
unkown
|
page execute read
|
||
4BBF000
|
stack
|
page read and write
|
||
4BEE000
|
heap
|
page read and write
|
||
84A0000
|
direct allocation
|
page read and write
|
||
7F640000
|
trusted library allocation
|
page execute and read and write
|
||
84F0000
|
heap
|
page read and write
|
||
4FC6000
|
trusted library allocation
|
page read and write
|
||
87BE000
|
heap
|
page read and write
|
||
849D000
|
trusted library allocation
|
page read and write
|
||
50D1000
|
heap
|
page read and write
|
||
30C0000
|
direct allocation
|
page read and write
|
||
2C64000
|
heap
|
page read and write
|
||
2390E000
|
stack
|
page read and write
|
||
4BDC000
|
heap
|
page read and write
|
||
54C0000
|
trusted library allocation
|
page read and write
|
||
83C0000
|
trusted library allocation
|
page execute and read and write
|
||
4BD9000
|
heap
|
page read and write
|
||
85C0000
|
heap
|
page read and write
|
||
24659000
|
heap
|
page read and write
|
||
2FF4000
|
heap
|
page read and write
|
||
BA05000
|
direct allocation
|
page execute and read and write
|
||
348F000
|
unkown
|
page read and write
|
||
4BDC000
|
heap
|
page read and write
|
||
2280000
|
heap
|
page read and write
|
||
4DAC000
|
stack
|
page read and write
|
||
2FF4000
|
heap
|
page read and write
|
||
23CDE000
|
stack
|
page read and write
|
||
8535000
|
heap
|
page read and write
|
||
2401E000
|
stack
|
page read and write
|
||
4C04000
|
heap
|
page read and write
|
||
2E00000
|
direct allocation
|
page read and write
|
||
8A50000
|
trusted library allocation
|
page read and write
|
||
2C64000
|
heap
|
page read and write
|
||
24641000
|
heap
|
page read and write
|
||
3130000
|
trusted library allocation
|
page read and write
|
||
4C1B000
|
heap
|
page read and write
|
||
786E000
|
stack
|
page read and write
|
||
4BDC000
|
heap
|
page read and write
|
||
79A0000
|
trusted library allocation
|
page read and write
|
||
8630000
|
direct allocation
|
page read and write
|
||
50D1000
|
heap
|
page read and write
|
||
2FB0000
|
heap
|
page read and write
|
||
76F9000
|
heap
|
page read and write
|
||
57DB000
|
trusted library allocation
|
page read and write
|
||
85D6000
|
heap
|
page read and write
|
||
8A30000
|
trusted library allocation
|
page execute and read and write
|
||
2820000
|
heap
|
page read and write
|
||
3240000
|
heap
|
page read and write
|
||
84C0000
|
direct allocation
|
page read and write
|
||
8490000
|
trusted library allocation
|
page read and write
|
||
4BE0000
|
heap
|
page read and write
|
||
24200000
|
direct allocation
|
page read and write
|
||
8505000
|
trusted library allocation
|
page read and write
|
||
2FF4000
|
heap
|
page read and write
|
||
23960000
|
heap
|
page read and write
|
||
2E20000
|
direct allocation
|
page read and write
|
||
882A000
|
heap
|
page read and write
|
||
4BE1000
|
heap
|
page read and write
|
||
4BE1000
|
heap
|
page read and write
|
||
752E000
|
stack
|
page read and write
|
||
6EEE000
|
stack
|
page read and write
|
||
50D1000
|
heap
|
page read and write
|
||
45D000
|
system
|
page execute and read and write
|
||
3180000
|
trusted library allocation
|
page read and write
|
||
32C0000
|
heap
|
page read and write
|
||
4BF1000
|
heap
|
page read and write
|
||
7990000
|
trusted library allocation
|
page read and write
|
||
4C17000
|
heap
|
page read and write
|
||
2D70000
|
heap
|
page read and write
|
||
24A8C000
|
unclassified section
|
page execute and read and write
|
||
8A80000
|
direct allocation
|
page execute and read and write
|
||
2FF4000
|
heap
|
page read and write
|
||
8588000
|
heap
|
page read and write
|
||
2C64000
|
heap
|
page read and write
|
||
50D1000
|
heap
|
page read and write
|
||
4BD9000
|
heap
|
page read and write
|
||
847E000
|
stack
|
page read and write
|
||
87B0000
|
heap
|
page read and write
|
||
4BD1000
|
heap
|
page read and write
|
||
86D0000
|
heap
|
page read and write
|
||
760000
|
heap
|
page read and write
|
||
4EF5000
|
remote allocation
|
page execute and read and write
|
||
3000000
|
heap
|
page readonly
|
||
23E90000
|
heap
|
page read and write
|
||
325F000
|
stack
|
page read and write
|
||
2FF5000
|
heap
|
page read and write
|
||
23F5E000
|
stack
|
page read and write
|
||
4BE5000
|
heap
|
page read and write
|
||
843D000
|
stack
|
page read and write
|
||
5E99000
|
trusted library allocation
|
page read and write
|
||
50D1000
|
heap
|
page read and write
|
||
2FF5000
|
heap
|
page read and write
|
||
4BE6000
|
heap
|
page read and write
|
||
8480000
|
direct allocation
|
page read and write
|
||
85C6000
|
heap
|
page read and write
|
||
24659000
|
heap
|
page read and write
|
||
4C34000
|
heap
|
page read and write
|
||
4C16000
|
heap
|
page read and write
|
||
20F0000
|
heap
|
page read and write
|
||
3150000
|
trusted library allocation
|
page read and write
|
||
2B47000
|
stack
|
page read and write
|
||
7670000
|
heap
|
page read and write
|
||
29D0000
|
heap
|
page read and write
|
||
883A000
|
heap
|
page read and write
|
||
5E79000
|
trusted library allocation
|
page read and write
|
||
2A7A000
|
stack
|
page read and write
|
||
3045000
|
heap
|
page read and write
|
||
87D0000
|
heap
|
page read and write
|
||
41B000
|
system
|
page execute and read and write
|
||
4BE5000
|
heap
|
page read and write
|
||
431000
|
unkown
|
page read and write
|
||
2E40000
|
direct allocation
|
page read and write
|
||
22D5000
|
heap
|
page read and write
|
||
4E0000
|
heap
|
page read and write
|
||
8310000
|
direct allocation
|
page read and write
|
||
4BDC000
|
heap
|
page read and write
|
||
4BDC000
|
heap
|
page read and write
|
||
214E000
|
stack
|
page read and write
|
||
7735000
|
heap
|
page read and write
|
||
4C3A000
|
heap
|
page read and write
|
||
2250000
|
heap
|
page read and write
|
||
78AE000
|
stack
|
page read and write
|
||
53E000
|
stack
|
page read and write
|
||
4BD1000
|
heap
|
page read and write
|
||
3150000
|
heap
|
page read and write
|
||
2C64000
|
heap
|
page read and write
|
||
3081000
|
heap
|
page read and write
|
||
54C0000
|
trusted library allocation
|
page read and write
|
||
45B000
|
unkown
|
page readonly
|
||
340E000
|
heap
|
page read and write
|
||
4C19000
|
heap
|
page read and write
|
||
50D1000
|
heap
|
page read and write
|
||
7040000
|
direct allocation
|
page read and write
|
||
6CF5000
|
remote allocation
|
page execute and read and write
|
||
24642000
|
heap
|
page read and write
|
||
83D0000
|
trusted library allocation
|
page read and write
|
||
2E86000
|
stack
|
page read and write
|
||
50D1000
|
heap
|
page read and write
|
||
2FF4000
|
heap
|
page read and write
|
||
84B4000
|
trusted library allocation
|
page read and write
|
||
43F000
|
unkown
|
page read and write
|
||
8650000
|
direct allocation
|
page read and write
|
||
79D0000
|
trusted library allocation
|
page read and write
|
||
329E000
|
stack
|
page read and write
|
||
302B000
|
heap
|
page read and write
|
||
2FF4000
|
heap
|
page read and write
|
||
50D1000
|
heap
|
page read and write
|
||
4BF5000
|
heap
|
page read and write
|
||
4BE0000
|
heap
|
page read and write
|
||
2820000
|
heap
|
page read and write
|
||
4BD1000
|
heap
|
page read and write
|
||
2FF4000
|
heap
|
page read and write
|
||
56A5000
|
heap
|
page read and write
|
||
3160000
|
heap
|
page read and write
|
||
2E6C000
|
stack
|
page read and write
|
||
2C64000
|
heap
|
page read and write
|
||
24629000
|
heap
|
page read and write
|
||
400000
|
unkown
|
page readonly
|
||
223E000
|
stack
|
page read and write
|
||
2FA0000
|
trusted library allocation
|
page read and write
|
||
94F000
|
stack
|
page read and write
|
||
23B7E000
|
stack
|
page read and write
|
||
2C64000
|
heap
|
page read and write
|
||
77E0000
|
trusted library allocation
|
page read and write
|
||
3300000
|
heap
|
page read and write
|
||
2C64000
|
heap
|
page read and write
|
||
4C1B000
|
heap
|
page read and write
|
||
2FF4000
|
heap
|
page read and write
|
||
4BD0000
|
heap
|
page read and write
|
||
4BE1000
|
heap
|
page read and write
|
||
4DEE000
|
stack
|
page read and write
|
||
2FF5000
|
heap
|
page read and write
|
||
24391000
|
heap
|
page read and write
|
||
4BC1000
|
heap
|
page read and write
|
||
858B000
|
heap
|
page read and write
|
||
56A0000
|
heap
|
page read and write
|
||
2FF4000
|
heap
|
page read and write
|
||
58D8000
|
heap
|
page read and write
|
||
2DDD000
|
stack
|
page read and write
|
||
80F5000
|
remote allocation
|
page execute and read and write
|
||
4C58000
|
heap
|
page read and write
|
||
4BF4000
|
heap
|
page read and write
|
||
2EA2000
|
stack
|
page read and write
|
||
4BF1000
|
heap
|
page read and write
|
||
530E000
|
stack
|
page read and write
|
||
4BD8000
|
heap
|
page read and write
|
||
2FF4000
|
heap
|
page read and write
|
||
3090000
|
trusted library allocation
|
page read and write
|
||
6013000
|
trusted library allocation
|
page read and write
|
||
5E81000
|
trusted library allocation
|
page read and write
|
||
5ED4000
|
trusted library allocation
|
page read and write
|
||
2FB8000
|
heap
|
page read and write
|
||
4BE0000
|
heap
|
page read and write
|
||
4BFE000
|
heap
|
page read and write
|
||
246BA000
|
heap
|
page read and write
|
||
588000
|
heap
|
page read and write
|
||
54C0000
|
trusted library allocation
|
page read and write
|
||
8A60000
|
trusted library allocation
|
page execute and read and write
|
||
54C0000
|
heap
|
page read and write
|
||
886C000
|
heap
|
page read and write
|
||
23E7F000
|
stack
|
page read and write
|
||
315A000
|
trusted library allocation
|
page execute and read and write
|
||
4C2D000
|
heap
|
page read and write
|
||
4BDC000
|
heap
|
page read and write
|
||
2FF0000
|
heap
|
page read and write
|
||
2C00000
|
heap
|
page read and write
|
||
4ECF000
|
trusted library allocation
|
page read and write
|
||
4BD1000
|
heap
|
page read and write
|
||
23C60000
|
direct allocation
|
page read and write
|
||
4BE5000
|
heap
|
page read and write
|
||
4BC0000
|
heap
|
page read and write
|
||
4BF1000
|
heap
|
page read and write
|
||
9170000
|
direct allocation
|
page execute and read and write
|
||
84C0000
|
heap
|
page read and write
|
||
7900000
|
trusted library allocation
|
page execute and read and write
|
||
545E000
|
stack
|
page read and write
|
||
85D6000
|
heap
|
page read and write
|
||
2FF5000
|
heap
|
page read and write
|
||
58F5000
|
remote allocation
|
page execute and read and write
|
||
22D9000
|
heap
|
page read and write
|
||
4BD1000
|
heap
|
page read and write
|
||
40A000
|
unkown
|
page read and write
|
||
8480000
|
heap
|
page read and write
|
||
4BE1000
|
heap
|
page read and write
|
||
2194000
|
heap
|
page read and write
|
||
2FF5000
|
heap
|
page read and write
|
||
4DE000
|
stack
|
page read and write
|
||
23C70000
|
direct allocation
|
page read and write
|
||
24639000
|
heap
|
page read and write
|
||
50D0000
|
heap
|
page read and write
|
||
580000
|
heap
|
page read and write
|
||
33D0000
|
heap
|
page read and write
|
||
458000
|
unkown
|
page read and write
|
||
5B5000
|
heap
|
page read and write
|
||
459000
|
system
|
page execute and read and write
|
||
2FF4000
|
heap
|
page read and write
|
||
8325000
|
heap
|
page read and write
|
||
50D1000
|
heap
|
page read and write
|
||
84F8000
|
heap
|
page read and write
|
||
2FF4000
|
heap
|
page read and write
|
||
54DE000
|
heap
|
page read and write
|
||
2EA6000
|
heap
|
page read and write
|
||
2C64000
|
heap
|
page read and write
|
||
2C64000
|
heap
|
page read and write
|
||
2FF4000
|
heap
|
page read and write
|
||
245B1000
|
heap
|
page read and write
|
||
883E000
|
heap
|
page read and write
|
||
74EE000
|
stack
|
page read and write
|
||
87A0000
|
trusted library allocation
|
page read and write
|
||
4BF4000
|
heap
|
page read and write
|
||
242A1000
|
heap
|
page read and write
|
||
6A0000
|
heap
|
page read and write
|
||
4E60000
|
heap
|
page read and write
|
||
8320000
|
heap
|
page read and write
|
||
251D000
|
stack
|
page read and write
|
||
8CE000
|
stack
|
page read and write
|
||
3A60000
|
remote allocation
|
page execute and read and write
|
||
340C000
|
heap
|
page read and write
|
||
2FF4000
|
heap
|
page read and write
|
||
4BD0000
|
heap
|
page read and write
|
||
5B9000
|
heap
|
page read and write
|
||
3ED000
|
stack
|
page read and write
|
||
3210000
|
trusted library allocation
|
page execute and read and write
|
||
24659000
|
heap
|
page read and write
|
||
44F5000
|
remote allocation
|
page execute and read and write
|
||
856F000
|
heap
|
page read and write
|
||
4C0B000
|
heap
|
page read and write
|
||
19A000
|
stack
|
page read and write
|
||
56C2000
|
heap
|
page read and write
|
||
282B000
|
heap
|
page read and write
|
||
4BE0000
|
heap
|
page read and write
|
||
50D1000
|
heap
|
page read and write
|
||
24A09000
|
unclassified section
|
page execute and read and write
|
||
241D0000
|
unclassified section
|
page execute and read and write
|
||
30E0000
|
direct allocation
|
page read and write
|
||
54D5000
|
heap
|
page read and write
|
||
4BF3000
|
heap
|
page read and write
|
||
6F6E000
|
stack
|
page read and write
|
||
23EDC000
|
stack
|
page read and write
|
||
4BE5000
|
heap
|
page read and write
|
||
2EDD000
|
heap
|
page read and write
|
||
31CE000
|
stack
|
page read and write
|
||
54C0000
|
trusted library allocation
|
page read and write
|
||
79C0000
|
trusted library allocation
|
page read and write
|
||
C405000
|
direct allocation
|
page execute and read and write
|
||
35CF000
|
stack
|
page read and write
|
||
63D000
|
stack
|
page read and write
|
||
473000
|
system
|
page execute and read and write
|
||
2C60000
|
heap
|
page read and write
|
||
4BEB000
|
heap
|
page read and write
|
||
4E55000
|
heap
|
page execute and read and write
|
||
400000
|
unkown
|
page readonly
|
||
790000
|
heap
|
page read and write
|
||
3048000
|
heap
|
page read and write
|
||
7790000
|
trusted library allocation
|
page read and write
|
||
249B0000
|
unclassified section
|
page execute and read and write
|
||
6FEF000
|
stack
|
page read and write
|
||
23FDB000
|
stack
|
page read and write
|
||
245B1000
|
heap
|
page read and write
|
||
50D1000
|
heap
|
page read and write
|
||
4BD0000
|
heap
|
page read and write
|
||
85C5000
|
heap
|
page read and write
|
||
4BDC000
|
heap
|
page read and write
|
||
239EF000
|
stack
|
page read and write
|
||
2C64000
|
heap
|
page read and write
|
||
8A70000
|
heap
|
page read and write
|
||
4BED000
|
heap
|
page read and write
|
||
680000
|
heap
|
page read and write
|
||
8690000
|
heap
|
page read and write
|
||
7970000
|
trusted library allocation
|
page read and write
|
||
34A0000
|
heap
|
page read and write
|
||
84B0000
|
trusted library allocation
|
page read and write
|
||
5576000
|
heap
|
page read and write
|
||
2BFE000
|
stack
|
page read and write
|
||
2E50000
|
direct allocation
|
page read and write
|
||
2ED0000
|
heap
|
page read and write
|
||
4C1B000
|
heap
|
page read and write
|
||
4BD1000
|
heap
|
page read and write
|
||
4C04000
|
heap
|
page read and write
|
||
86CC000
|
stack
|
page read and write
|
||
4C1B000
|
heap
|
page read and write
|
||
3180000
|
heap
|
page read and write
|
||
2431A000
|
heap
|
page read and write
|
||
2C64000
|
heap
|
page read and write
|
||
58E3000
|
heap
|
page read and write
|
||
50D1000
|
heap
|
page read and write
|
||
2BAF000
|
unkown
|
page read and write
|
||
4BD0000
|
heap
|
page read and write
|
||
90F000
|
stack
|
page read and write
|
||
86D7000
|
heap
|
page read and write
|
||
4BE1000
|
heap
|
page read and write
|
||
2FF5000
|
heap
|
page read and write
|
||
8600000
|
direct allocation
|
page read and write
|
||
23E00000
|
remote allocation
|
page read and write
|
||
4C3A000
|
heap
|
page read and write
|
||
3160000
|
trusted library allocation
|
page read and write
|
||
A587000
|
trusted library allocation
|
page read and write
|
||
84A0000
|
trusted library allocation
|
page execute and read and write
|
||
3743000
|
heap
|
page read and write
|
||
23DAC000
|
stack
|
page read and write
|
||
740000
|
heap
|
page read and write
|
||
2E10000
|
direct allocation
|
page read and write
|
||
D805000
|
direct allocation
|
page execute and read and write
|
||
242A0000
|
heap
|
page read and write
|
||
4BF3000
|
heap
|
page read and write
|
||
881B000
|
heap
|
page read and write
|
||
7729000
|
heap
|
page read and write
|
||
2FDC000
|
heap
|
page read and write
|
||
40A000
|
unkown
|
page write copy
|
||
8640000
|
direct allocation
|
page read and write
|
||
307D000
|
heap
|
page read and write
|
||
4BDE000
|
heap
|
page read and write
|
||
313D000
|
trusted library allocation
|
page execute and read and write
|
||
23F1C000
|
stack
|
page read and write
|
||
325C000
|
stack
|
page read and write
|
||
4BF5000
|
heap
|
page read and write
|
||
24A30000
|
unclassified section
|
page execute and read and write
|
||
A605000
|
direct allocation
|
page execute and read and write
|
||
73E000
|
unkown
|
page read and write
|
||
540F000
|
stack
|
page read and write
|
||
50D1000
|
heap
|
page read and write
|
||
240DD000
|
stack
|
page read and write
|
||
8610000
|
direct allocation
|
page read and write
|
||
2442A000
|
heap
|
page read and write
|
||
2FF4000
|
heap
|
page read and write
|
||
4C10000
|
heap
|
page read and write
|
||
239AD000
|
stack
|
page read and write
|
||
85C6000
|
heap
|
page read and write
|
||
3740000
|
heap
|
page read and write
|
||
881F000
|
heap
|
page read and write
|
||
2405C000
|
stack
|
page read and write
|
||
84D0000
|
direct allocation
|
page read and write
|
||
3068000
|
heap
|
page read and write
|
||
4C0E000
|
heap
|
page read and write
|
||
3133000
|
trusted library allocation
|
page execute and read and write
|
||
57E1000
|
trusted library allocation
|
page read and write
|
||
241EB000
|
unclassified section
|
page execute and read and write
|
||
7647000
|
trusted library allocation
|
page read and write
|
||
307A000
|
heap
|
page read and write
|
||
2FF4000
|
heap
|
page read and write
|
||
8660000
|
direct allocation
|
page read and write
|
||
400000
|
system
|
page execute and read and write
|
||
21EE000
|
stack
|
page read and write
|
||
3400000
|
heap
|
page read and write
|
||
5D4000
|
heap
|
page read and write
|
||
3790000
|
heap
|
page read and write
|
||
4688000
|
heap
|
page read and write
|
||
5E71000
|
trusted library allocation
|
page read and write
|
||
2C64000
|
heap
|
page read and write
|
||
243B1000
|
heap
|
page read and write
|
||
400000
|
system
|
page execute and read and write
|
||
4BFC000
|
heap
|
page read and write
|
||
3162000
|
trusted library allocation
|
page read and write
|
||
4BE7000
|
heap
|
page read and write
|
||
2C64000
|
heap
|
page read and write
|
||
50D1000
|
heap
|
page read and write
|
||
25D0000
|
heap
|
page read and write
|
||
400000
|
system
|
page execute and read and write
|
||
3149000
|
trusted library allocation
|
page read and write
|
||
3409000
|
heap
|
page read and write
|
||
50D1000
|
heap
|
page read and write
|
||
8A40000
|
trusted library allocation
|
page read and write
|
||
506F000
|
stack
|
page read and write
|
||
2E70000
|
direct allocation
|
page read and write
|
||
3207000
|
heap
|
page read and write
|
||
4BF6000
|
heap
|
page read and write
|
||
271F000
|
stack
|
page read and write
|
||
4BF7000
|
heap
|
page read and write
|
||
2B4D000
|
stack
|
page read and write
|
||
2FF5000
|
heap
|
page read and write
|
||
83A7000
|
stack
|
page read and write
|
||
2FF4000
|
heap
|
page read and write
|
||
54C0000
|
trusted library allocation
|
page read and write
|
||
435000
|
unkown
|
page read and write
|
||
8530000
|
trusted library allocation
|
page read and write
|
||
4FFF000
|
heap
|
page read and write
|
||
4C12000
|
heap
|
page read and write
|
||
23F9F000
|
stack
|
page read and write
|
||
4E69000
|
heap
|
page read and write
|
||
6FAE000
|
stack
|
page read and write
|
||
502E000
|
stack
|
page read and write
|
||
857C000
|
heap
|
page read and write
|
||
7640000
|
trusted library allocation
|
page read and write
|
||
4BF1000
|
heap
|
page read and write
|
||
8832000
|
heap
|
page read and write
|
||
25F0000
|
heap
|
page readonly
|
||
2468B000
|
heap
|
page read and write
|
||
23E00000
|
remote allocation
|
page read and write
|
||
4BF3000
|
heap
|
page read and write
|
||
79B0000
|
trusted library allocation
|
page read and write
|
||
4BF3000
|
heap
|
page read and write
|
||
2451C000
|
heap
|
page read and write
|
||
50D1000
|
heap
|
page read and write
|
||
4C23000
|
heap
|
page read and write
|
||
2FF5000
|
heap
|
page read and write
|
||
4C58000
|
heap
|
page read and write
|
||
30D0000
|
direct allocation
|
page read and write
|
||
4C1B000
|
heap
|
page read and write
|
||
255E000
|
stack
|
page read and write
|
||
4BF1000
|
heap
|
page read and write
|
||
4BF5000
|
heap
|
page read and write
|
||
2CAF000
|
stack
|
page read and write
|
||
4F5000
|
heap
|
page read and write
|
||
7050000
|
direct allocation
|
page read and write
|
||
4BD9000
|
heap
|
page read and write
|
||
340A000
|
heap
|
page read and write
|
||
244A2000
|
heap
|
page read and write
|
||
82BE000
|
stack
|
page read and write
|
||
4BB0000
|
heap
|
page read and write
|
||
51D0000
|
trusted library allocation
|
page read and write
|
||
245B0000
|
heap
|
page read and write
|
||
2FF4000
|
heap
|
page read and write
|
||
45C000
|
system
|
page execute and read and write
|
||
4BEE000
|
heap
|
page read and write
|
||
4BEE000
|
heap
|
page read and write
|
||
2C64000
|
heap
|
page read and write
|
||
4BD1000
|
heap
|
page read and write
|
||
7684000
|
heap
|
page read and write
|
||
2D6F000
|
stack
|
page read and write
|
||
2CB0000
|
heap
|
page read and write
|
||
71C0000
|
heap
|
page read and write
|
||
6019000
|
trusted library allocation
|
page read and write
|
||
30B0000
|
direct allocation
|
page read and write
|
||
4BC1000
|
heap
|
page read and write
|
||
9C05000
|
direct allocation
|
page execute and read and write
|
||
52CF000
|
stack
|
page read and write
|
||
2F10000
|
heap
|
page read and write
|
||
456000
|
system
|
page execute and read and write
|
||
4BD1000
|
heap
|
page read and write
|
||
7780000
|
trusted library allocation
|
page read and write
|
||
22D0000
|
heap
|
page read and write
|
||
558B000
|
heap
|
page read and write
|
||
2270000
|
heap
|
page read and write
|
||
50D1000
|
heap
|
page read and write
|
||
7700000
|
heap
|
page read and write
|
||
50AE000
|
stack
|
page read and write
|
||
76C9000
|
heap
|
page read and write
|
||
7694000
|
heap
|
page read and write
|
||
57D5000
|
heap
|
page read and write
|
||
2E80000
|
heap
|
page read and write
|
||
3409000
|
heap
|
page read and write
|
||
329C000
|
stack
|
page read and write
|
||
4BF1000
|
heap
|
page read and write
|
||
24629000
|
heap
|
page read and write
|
||
2C64000
|
heap
|
page read and write
|
||
24A86000
|
unclassified section
|
page execute and read and write
|
||
549F000
|
stack
|
page read and write
|
||
4BD9000
|
heap
|
page read and write
|
||
374C000
|
heap
|
page read and write
|
||
2E9F000
|
stack
|
page read and write
|
||
23E00000
|
remote allocation
|
page read and write
|
||
843E000
|
stack
|
page read and write
|
||
84E0000
|
direct allocation
|
page read and write
|
||
24642000
|
heap
|
page read and write
|
||
3140000
|
trusted library allocation
|
page read and write
|
||
50D1000
|
heap
|
page read and write
|
||
4C58000
|
heap
|
page read and write
|
||
4BF3000
|
heap
|
page read and write
|
||
4BEE000
|
heap
|
page read and write
|
||
23D6D000
|
stack
|
page read and write
|
||
2190000
|
heap
|
page read and write
|
||
4C0F000
|
heap
|
page read and write
|
||
25C0000
|
heap
|
page read and write
|
||
8670000
|
direct allocation
|
page read and write
|
||
50D1000
|
heap
|
page read and write
|
||
7980000
|
trusted library allocation
|
page read and write
|
||
798000
|
heap
|
page read and write
|
||
23C90000
|
direct allocation
|
page read and write
|
||
2419E000
|
stack
|
page read and write
|
||
6EAE000
|
stack
|
page read and write
|
||
50D1000
|
heap
|
page read and write
|
||
45B000
|
unkown
|
page readonly
|
||
50D1000
|
heap
|
page read and write
|
||
50D1000
|
heap
|
page read and write
|
||
2FF4000
|
heap
|
page read and write
|
||
2FF5000
|
heap
|
page read and write
|
||
40D000
|
unkown
|
page read and write
|
||
2FF4000
|
heap
|
page read and write
|
||
33E0000
|
heap
|
page readonly
|
||
35D0000
|
heap
|
page read and write
|
||
340B000
|
heap
|
page read and write
|
||
4C39000
|
heap
|
page read and write
|
||
4BDC000
|
heap
|
page read and write
|
||
50D1000
|
heap
|
page read and write
|
||
2842000
|
heap
|
page read and write
|
||
2409E000
|
stack
|
page read and write
|
||
24638000
|
heap
|
page read and write
|
||
62F5000
|
remote allocation
|
page execute and read and write
|
||
23C80000
|
direct allocation
|
page read and write
|
||
4E50000
|
heap
|
page execute and read and write
|
||
4C26000
|
heap
|
page read and write
|
||
305A000
|
heap
|
page read and write
|
||
281F000
|
stack
|
page read and write
|
||
4BFE000
|
heap
|
page read and write
|
||
2EA0000
|
heap
|
page read and write
|
||
94E000
|
stack
|
page read and write
|
||
851D000
|
heap
|
page read and write
|
||
3F0000
|
heap
|
page read and write
|
||
50D0000
|
heap
|
page read and write
|
||
2D9E000
|
heap
|
page read and write
|
||
3AF5000
|
remote allocation
|
page execute and read and write
|
||
50D1000
|
heap
|
page read and write
|
||
2C64000
|
heap
|
page read and write
|
||
780000
|
heap
|
page read and write
|
||
7708000
|
heap
|
page read and write
|
||
9A0000
|
heap
|
page read and write
|
||
38D000
|
stack
|
page read and write
|
||
4E71000
|
trusted library allocation
|
page read and write
|
||
8300000
|
direct allocation
|
page read and write
|
||
3200000
|
heap
|
page read and write
|
||
7910000
|
trusted library allocation
|
page read and write
|
||
2C64000
|
heap
|
page read and write
|
||
8550000
|
trusted library allocation
|
page read and write
|
||
2FF4000
|
heap
|
page read and write
|
||
7770000
|
trusted library allocation
|
page read and write
|
||
24318000
|
heap
|
page read and write
|
||
2AD0000
|
heap
|
page read and write
|
||
4BF1000
|
heap
|
page read and write
|
||
85D7000
|
heap
|
page read and write
|
||
2FF4000
|
heap
|
page read and write
|
||
78F0000
|
trusted library allocation
|
page read and write
|
||
3050000
|
heap
|
page read and write
|
||
2FF4000
|
heap
|
page read and write
|
||
42C000
|
unkown
|
page read and write
|
||
4D6F000
|
stack
|
page read and write
|
||
244A2000
|
heap
|
page read and write
|
||
8620000
|
direct allocation
|
page read and write
|
||
490000
|
heap
|
page read and write
|
||
4C1B000
|
heap
|
page read and write
|
||
98000
|
stack
|
page read and write
|
||
4F0000
|
heap
|
page read and write
|
||
4BE5000
|
heap
|
page read and write
|
||
4BD1000
|
heap
|
page read and write
|
||
2394E000
|
stack
|
page read and write
|
||
4BF3000
|
heap
|
page read and write
|
||
77D0000
|
trusted library allocation
|
page read and write
|
||
3140000
|
heap
|
page read and write
|
||
50D1000
|
heap
|
page read and write
|
||
83B0000
|
heap
|
page read and write
|
||
23BBF000
|
stack
|
page read and write
|
||
B005000
|
direct allocation
|
page execute and read and write
|
There are 675 hidden memdumps, click here to show them.