Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
fresh_shrunk.exe
|
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
|
initial sample
|
||
C:\Users\user\AppData\Local\Temp\bddddsx\bddddsx.exe
|
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\RegAsm.exe.log
|
ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\bddddsx.exe.log
|
ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\fresh_shrunk.exe.log
|
ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\bddddsx\bddddsx.exe:Zone.Identifier
|
ASCII text, with CRLF line terminators
|
modified
|
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\fresh_shrunk.exe
|
"C:\Users\user\Desktop\fresh_shrunk.exe"
|
||
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
|
"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
|
||
C:\Windows\SysWOW64\cmd.exe
|
"cmd.exe" /C mkdir "C:\Users\user\AppData\Local\Temp\bddddsx"
|
||
C:\Windows\SysWOW64\cmd.exe
|
"cmd.exe" /C schtasks /create /sc minute /mo 10 /tn "Nano" /tr "'C:\Users\user\AppData\Local\Temp\bddddsx\bddddsx.exe'" /f
|
||
C:\Windows\SysWOW64\schtasks.exe
|
schtasks /create /sc minute /mo 10 /tn "Nano" /tr "'C:\Users\user\AppData\Local\Temp\bddddsx\bddddsx.exe'" /f
|
||
C:\Windows\SysWOW64\cmd.exe
|
"cmd.exe" /C copy "C:\Users\user\Desktop\fresh_shrunk.exe" "C:\Users\user\AppData\Local\Temp\bddddsx\bddddsx.exe"
|
||
C:\Users\user\AppData\Local\Temp\bddddsx\bddddsx.exe
|
C:\Users\user\AppData\Local\Temp\bddddsx\bddddsx.exe
|
||
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
|
"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
|
||
C:\Windows\SysWOW64\cmd.exe
|
"cmd.exe" /C mkdir "C:\Users\user\AppData\Local\Temp\bddddsx"
|
||
C:\Windows\SysWOW64\cmd.exe
|
"cmd.exe" /C schtasks /create /sc minute /mo 10 /tn "Nano" /tr "'C:\Users\user\AppData\Local\Temp\bddddsx\bddddsx.exe'" /f
|
||
C:\Windows\SysWOW64\schtasks.exe
|
schtasks /create /sc minute /mo 10 /tn "Nano" /tr "'C:\Users\user\AppData\Local\Temp\bddddsx\bddddsx.exe'" /f
|
||
C:\Windows\SysWOW64\cmd.exe
|
"cmd.exe" /C copy "C:\Users\user\AppData\Local\Temp\bddddsx\bddddsx.exe" "C:\Users\user\AppData\Local\Temp\bddddsx\bddddsx.exe"
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
There are 8 hidden processes, click here to show them.
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
vbdsg.duckdns.org
|
|||
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
|
unknown
|
Domains
Name
|
IP
|
Malicious
|
|
---|---|---|---|
vbdsg.duckdns.org
|
57.128.155.22
|
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
57.128.155.22
|
vbdsg.duckdns.org
|
Belgium
|
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
2861000
|
trusted library allocation
|
page read and write
|
||
402000
|
remote allocation
|
page execute and read and write
|
||
2FB1000
|
trusted library allocation
|
page read and write
|
||
2DF1000
|
trusted library allocation
|
page read and write
|
||
1266000
|
heap
|
page read and write
|
||
2E00000
|
trusted library allocation
|
page read and write
|
||
2DF5000
|
trusted library allocation
|
page read and write
|
||
31F0000
|
heap
|
page read and write
|
||
2FEE000
|
unkown
|
page read and write
|
||
1110000
|
trusted library allocation
|
page read and write
|
||
10F2000
|
trusted library allocation
|
page read and write
|
||
2674000
|
trusted library allocation
|
page read and write
|
||
1178000
|
heap
|
page read and write
|
||
2DA0000
|
heap
|
page execute and read and write
|
||
526A000
|
stack
|
page read and write
|
||
10ED000
|
trusted library allocation
|
page execute and read and write
|
||
2DA7000
|
trusted library allocation
|
page execute and read and write
|
||
63F9000
|
heap
|
page read and write
|
||
3240000
|
heap
|
page read and write
|
||
30CE000
|
stack
|
page read and write
|
||
D7B000
|
stack
|
page read and write
|
||
2D70000
|
trusted library allocation
|
page read and write
|
||
2E50000
|
trusted library allocation
|
page execute and read and write
|
||
366F000
|
stack
|
page read and write
|
||
1080000
|
heap
|
page read and write
|
||
2DC4000
|
trusted library allocation
|
page read and write
|
||
1120000
|
trusted library allocation
|
page read and write
|
||
FD1000
|
heap
|
page read and write
|
||
2670000
|
trusted library allocation
|
page read and write
|
||
1170000
|
heap
|
page read and write
|
||
5AF0000
|
heap
|
page read and write
|
||
14F0000
|
heap
|
page read and write
|
||
26A0000
|
trusted library allocation
|
page read and write
|
||
117E000
|
heap
|
page read and write
|
||
2D40000
|
trusted library allocation
|
page read and write
|
||
555E000
|
stack
|
page read and write
|
||
2EA0000
|
heap
|
page read and write
|
||
FD8000
|
heap
|
page read and write
|
||
1000000
|
heap
|
page read and write
|
||
2D96000
|
trusted library allocation
|
page execute and read and write
|
||
4F70000
|
heap
|
page execute and read and write
|
||
573F000
|
stack
|
page read and write
|
||
10D4000
|
trusted library allocation
|
page read and write
|
||
2E1D000
|
trusted library allocation
|
page read and write
|
||
2E80000
|
heap
|
page read and write
|
||
123E000
|
heap
|
page read and write
|
||
493C000
|
stack
|
page read and write
|
||
2DC0000
|
trusted library allocation
|
page read and write
|
||
5B0000
|
unkown
|
page readonly
|
||
285D000
|
stack
|
page read and write
|
||
50AD000
|
stack
|
page read and write
|
||
2E5E000
|
stack
|
page read and write
|
||
52D6000
|
trusted library allocation
|
page read and write
|
||
4EEE000
|
stack
|
page read and write
|
||
1150000
|
heap
|
page read and write
|
||
D78000
|
stack
|
page read and write
|
||
5295000
|
heap
|
page read and write
|
||
320E000
|
stack
|
page read and write
|
||
6A0D000
|
stack
|
page read and write
|
||
2B20000
|
heap
|
page read and write
|
||
7F170000
|
trusted library allocation
|
page execute and read and write
|
||
5A1E000
|
stack
|
page read and write
|
||
3DF1000
|
trusted library allocation
|
page read and write
|
||
112A000
|
trusted library allocation
|
page execute and read and write
|
||
2D10000
|
heap
|
page read and write
|
||
ACA000
|
heap
|
page read and write
|
||
268D000
|
trusted library allocation
|
page execute and read and write
|
||
2C80000
|
heap
|
page read and write
|
||
4DEB000
|
trusted library allocation
|
page read and write
|
||
2D20000
|
heap
|
page read and write
|
||
14EC000
|
stack
|
page read and write
|
||
6E0C000
|
stack
|
page read and write
|
||
54CE000
|
stack
|
page read and write
|
||
308F000
|
unkown
|
page read and write
|
||
110B000
|
trusted library allocation
|
page execute and read and write
|
||
4F2E000
|
stack
|
page read and write
|
||
4DD5000
|
trusted library allocation
|
page read and write
|
||
2D0E000
|
stack
|
page read and write
|
||
1212000
|
heap
|
page read and write
|
||
2DD0000
|
trusted library allocation
|
page execute and read and write
|
||
10F0000
|
trusted library allocation
|
page read and write
|
||
1490000
|
trusted library allocation
|
page read and write
|
||
A5D000
|
heap
|
page read and write
|
||
3250000
|
heap
|
page read and write
|
||
1059000
|
heap
|
page read and write
|
||
2C40000
|
heap
|
page read and write
|
||
3E58000
|
trusted library allocation
|
page read and write
|
||
322F000
|
stack
|
page read and write
|
||
9E0000
|
heap
|
page read and write
|
||
5330000
|
heap
|
page read and write
|
||
40C000
|
remote allocation
|
page execute and read and write
|
||
11B3000
|
trusted library allocation
|
page execute and read and write
|
||
7F4D0000
|
trusted library allocation
|
page execute and read and write
|
||
1020000
|
heap
|
page read and write
|
||
6A4C000
|
stack
|
page read and write
|
||
2D90000
|
trusted library allocation
|
page read and write
|
||
C2E000
|
stack
|
page read and write
|
||
2FAE000
|
stack
|
page read and write
|
||
104E000
|
heap
|
page read and write
|
||
254D000
|
stack
|
page read and write
|
||
507E000
|
stack
|
page read and write
|
||
52B0000
|
trusted library allocation
|
page read and write
|
||
11FE000
|
heap
|
page read and write
|
||
5480000
|
trusted library allocation
|
page read and write
|
||
2ACE000
|
stack
|
page read and write
|
||
25FE000
|
unkown
|
page read and write
|
||
267D000
|
trusted library allocation
|
page execute and read and write
|
||
9A0000
|
heap
|
page read and write
|
||
623E000
|
stack
|
page read and write
|
||
2E09000
|
trusted library allocation
|
page read and write
|
||
4DA4000
|
trusted library allocation
|
page read and write
|
||
F3E000
|
stack
|
page read and write
|
||
2E3F000
|
unkown
|
page read and write
|
||
2730000
|
trusted library allocation
|
page read and write
|
||
2D90000
|
trusted library allocation
|
page read and write
|
||
10C0000
|
trusted library allocation
|
page read and write
|
||
146E000
|
stack
|
page read and write
|
||
1130000
|
trusted library allocation
|
page read and write
|
||
4DFD000
|
trusted library allocation
|
page read and write
|
||
1176000
|
heap
|
page read and write
|
||
2D70000
|
heap
|
page execute and read and write
|
||
1510000
|
trusted library allocation
|
page execute and read and write
|
||
ACE000
|
heap
|
page read and write
|
||
1100000
|
trusted library allocation
|
page read and write
|
||
59DE000
|
stack
|
page read and write
|
||
1160000
|
trusted library allocation
|
page read and write
|
||
2E0B000
|
trusted library allocation
|
page read and write
|
||
2D80000
|
heap
|
page read and write
|
||
54D9000
|
stack
|
page read and write
|
||
52C2000
|
trusted library allocation
|
page read and write
|
||
1090000
|
heap
|
page read and write
|
||
323E000
|
stack
|
page read and write
|
||
340C000
|
heap
|
page read and write
|
||
304F000
|
trusted library allocation
|
page read and write
|
||
35FF000
|
unkown
|
page read and write
|
||
63E8000
|
heap
|
page read and write
|
||
31CF000
|
stack
|
page read and write
|
||
1102000
|
trusted library allocation
|
page read and write
|
||
FC4000
|
heap
|
page read and write
|
||
10F7000
|
stack
|
page read and write
|
||
A2A000
|
heap
|
page read and write
|
||
58E1000
|
trusted library allocation
|
page read and write
|
||
4DE9000
|
trusted library allocation
|
page read and write
|
||
2C0D000
|
stack
|
page read and write
|
||
680E000
|
stack
|
page read and write
|
||
2C4B000
|
heap
|
page read and write
|
||
1202000
|
heap
|
page read and write
|
||
126B000
|
heap
|
page read and write
|
||
28C4000
|
trusted library allocation
|
page read and write
|
||
125C000
|
stack
|
page read and write
|
||
A10000
|
heap
|
page read and write
|
||
5288000
|
heap
|
page read and write
|
||
2E80000
|
heap
|
page execute and read and write
|
||
558E000
|
stack
|
page read and write
|
||
2E92000
|
trusted library allocation
|
page read and write
|
||
1256000
|
heap
|
page read and write
|
||
2E10000
|
trusted library allocation
|
page read and write
|
||
3800000
|
heap
|
page read and write
|
||
2D60000
|
trusted library allocation
|
page read and write
|
||
303D000
|
stack
|
page read and write
|
||
1104000
|
trusted library allocation
|
page read and write
|
||
1231000
|
heap
|
page read and write
|
||
2D30000
|
trusted library allocation
|
page read and write
|
||
3180000
|
heap
|
page read and write
|
||
116E000
|
stack
|
page read and write
|
||
52CA000
|
trusted library allocation
|
page read and write
|
||
52E2000
|
trusted library allocation
|
page read and write
|
||
EF7000
|
stack
|
page read and write
|
||
1197000
|
heap
|
page read and write
|
||
2D9A000
|
trusted library allocation
|
page execute and read and write
|
||
57F7000
|
heap
|
page read and write
|
||
2ADE000
|
unkown
|
page read and write
|
||
3377000
|
heap
|
page read and write
|
||
2C5D000
|
stack
|
page read and write
|
||
DF0000
|
heap
|
page read and write
|
||
2B0E000
|
stack
|
page read and write
|
||
121D000
|
heap
|
page read and write
|
||
A47000
|
heap
|
page read and write
|
||
5D6000
|
unkown
|
page readonly
|
||
ABE000
|
heap
|
page read and write
|
||
F90000
|
heap
|
page read and write
|
||
5C7000
|
unkown
|
page readonly
|
||
A50000
|
heap
|
page read and write
|
||
26A7000
|
trusted library allocation
|
page execute and read and write
|
||
AC6000
|
heap
|
page read and write
|
||
2CFD000
|
stack
|
page read and write
|
||
6F0E000
|
stack
|
page read and write
|
||
11F2000
|
heap
|
page read and write
|
||
F7C000
|
stack
|
page read and write
|
||
11A1000
|
heap
|
page read and write
|
||
1137000
|
trusted library allocation
|
page execute and read and write
|
||
2CA1000
|
heap
|
page read and write
|
||
1243000
|
heap
|
page read and write
|
||
3320000
|
direct allocation
|
page read and write
|
||
2660000
|
trusted library allocation
|
page read and write
|
||
2680000
|
trusted library allocation
|
page read and write
|
||
2DA0000
|
heap
|
page execute and read and write
|
||
125D000
|
heap
|
page read and write
|
||
2C8E000
|
stack
|
page read and write
|
||
2B1E000
|
stack
|
page read and write
|
||
513E000
|
stack
|
page read and write
|
||
2D10000
|
trusted library allocation
|
page execute and read and write
|
||
10AE000
|
stack
|
page read and write
|
||
6C4E000
|
stack
|
page read and write
|
||
DC5000
|
heap
|
page read and write
|
||
3FB1000
|
trusted library allocation
|
page read and write
|
||
52D1000
|
trusted library allocation
|
page read and write
|
||
2D8F000
|
stack
|
page read and write
|
||
559E000
|
stack
|
page read and write
|
||
1494000
|
trusted library allocation
|
page read and write
|
||
111D000
|
trusted library allocation
|
page execute and read and write
|
||
5ADF000
|
stack
|
page read and write
|
||
10DD000
|
trusted library allocation
|
page execute and read and write
|
||
1120000
|
trusted library allocation
|
page read and write
|
||
285E000
|
stack
|
page read and write
|
||
2720000
|
heap
|
page execute and read and write
|
||
4F52000
|
trusted library allocation
|
page read and write
|
||
136F000
|
stack
|
page read and write
|
||
3861000
|
trusted library allocation
|
page read and write
|
||
DF0000
|
heap
|
page read and write
|
||
3E19000
|
trusted library allocation
|
page read and write
|
||
ED0000
|
heap
|
page read and write
|
||
5333000
|
heap
|
page read and write
|
||
517E000
|
stack
|
page read and write
|
||
5AC1000
|
trusted library allocation
|
page read and write
|
||
270E000
|
stack
|
page read and write
|
||
10FA000
|
trusted library allocation
|
page execute and read and write
|
||
D2E000
|
stack
|
page read and write
|
||
F9B000
|
heap
|
page read and write
|
||
1219000
|
heap
|
page read and write
|
||
2DB0000
|
trusted library allocation
|
page read and write
|
||
26AB000
|
trusted library allocation
|
page execute and read and write
|
||
2DE0000
|
heap
|
page read and write
|
||
A20000
|
heap
|
page read and write
|
||
2A0E000
|
stack
|
page read and write
|
||
1259000
|
heap
|
page read and write
|
||
26C0000
|
trusted library allocation
|
page read and write
|
||
AA9000
|
heap
|
page read and write
|
||
14A0000
|
heap
|
page read and write
|
||
BDC000
|
stack
|
page read and write
|
||
569F000
|
stack
|
page read and write
|
||
25B0000
|
heap
|
page read and write
|
||
DC0000
|
heap
|
page read and write
|
||
E6F000
|
stack
|
page read and write
|
||
2E0E000
|
stack
|
page read and write
|
||
52BB000
|
trusted library allocation
|
page read and write
|
||
554E000
|
stack
|
page read and write
|
||
527F000
|
stack
|
page read and write
|
||
11A0000
|
trusted library allocation
|
page read and write
|
||
31CE000
|
unkown
|
page read and write
|
||
29AD000
|
stack
|
page read and write
|
||
2A4E000
|
stack
|
page read and write
|
||
664D000
|
stack
|
page read and write
|
||
2710000
|
trusted library allocation
|
page execute and read and write
|
||
32D0000
|
heap
|
page read and write
|
||
2B30000
|
direct allocation
|
page read and write
|
||
2D80000
|
trusted library allocation
|
page execute and read and write
|
||
110D000
|
trusted library allocation
|
page execute and read and write
|
||
2BCF000
|
unkown
|
page read and write
|
||
269A000
|
trusted library allocation
|
page execute and read and write
|
||
300F000
|
trusted library allocation
|
page read and write
|
||
1107000
|
trusted library allocation
|
page execute and read and write
|
||
A7C000
|
heap
|
page read and write
|
||
690C000
|
stack
|
page read and write
|
||
5B80000
|
heap
|
page read and write
|
||
1221000
|
heap
|
page read and write
|
||
58DE000
|
stack
|
page read and write
|
||
31A0000
|
heap
|
page read and write
|
||
D6E000
|
stack
|
page read and write
|
||
28BF000
|
trusted library allocation
|
page read and write
|
||
C7B000
|
stack
|
page read and write
|
||
10E0000
|
trusted library allocation
|
page read and write
|
||
11B4000
|
trusted library allocation
|
page read and write
|
||
300A000
|
trusted library allocation
|
page read and write
|
||
33F0000
|
heap
|
page read and write
|
||
52B6000
|
trusted library allocation
|
page read and write
|
||
2E60000
|
trusted library allocation
|
page read and write
|
||
57E0000
|
heap
|
page read and write
|
||
2D40000
|
heap
|
page read and write
|
||
106E000
|
stack
|
page read and write
|
||
11F3000
|
heap
|
page read and write
|
||
3210000
|
heap
|
page read and write
|
||
2673000
|
trusted library allocation
|
page execute and read and write
|
||
313D000
|
stack
|
page read and write
|
||
2D20000
|
trusted library allocation
|
page read and write
|
||
28BA000
|
trusted library allocation
|
page read and write
|
||
5B70000
|
trusted library allocation
|
page execute and read and write
|
||
2D59000
|
trusted library allocation
|
page read and write
|
||
3016000
|
trusted library allocation
|
page read and write
|
||
2F8F000
|
stack
|
page read and write
|
||
14AE000
|
stack
|
page read and write
|
||
10E3000
|
trusted library allocation
|
page read and write
|
||
4DE0000
|
trusted library allocation
|
page read and write
|
||
5B2000
|
unkown
|
page readonly
|
||
5B10000
|
heap
|
page read and write
|
||
3390000
|
heap
|
page read and write
|
||
1068000
|
heap
|
page read and write
|
||
F40000
|
heap
|
page read and write
|
||
9A5000
|
heap
|
page read and write
|
||
532C000
|
stack
|
page read and write
|
||
2DA0000
|
trusted library allocation
|
page read and write
|
||
63D0000
|
heap
|
page read and write
|
||
550E000
|
stack
|
page read and write
|
||
2F8E000
|
unkown
|
page read and write
|
||
2D50000
|
trusted library allocation
|
page read and write
|
||
86C000
|
stack
|
page read and write
|
||
4A3D000
|
stack
|
page read and write
|
||
56E0000
|
heap
|
page read and write
|
||
5B30000
|
trusted library allocation
|
page read and write
|
||
4041000
|
trusted library allocation
|
page read and write
|
||
2E4D000
|
stack
|
page read and write
|
||
1229000
|
heap
|
page read and write
|
||
113B000
|
trusted library allocation
|
page execute and read and write
|
||
3400000
|
heap
|
page read and write
|
||
57D0000
|
heap
|
page execute and read and write
|
||
55DD000
|
stack
|
page read and write
|
||
5A9E000
|
stack
|
page read and write
|
||
3370000
|
heap
|
page read and write
|
||
2B50000
|
heap
|
page read and write
|
||
52CE000
|
trusted library allocation
|
page read and write
|
||
2A8E000
|
stack
|
page read and write
|
||
4DF0000
|
trusted library allocation
|
page read and write
|
||
1140000
|
heap
|
page read and write
|
||
2E7F000
|
stack
|
page read and write
|
||
2F60000
|
heap
|
page read and write
|
||
A2E000
|
heap
|
page read and write
|
||
1040000
|
heap
|
page read and write
|
||
DD0000
|
heap
|
page read and write
|
||
1127000
|
trusted library allocation
|
page execute and read and write
|
||
1520000
|
heap
|
page read and write
|
||
10F6000
|
trusted library allocation
|
page execute and read and write
|
||
52DD000
|
trusted library allocation
|
page read and write
|
||
1103000
|
trusted library allocation
|
page execute and read and write
|
||
5485000
|
trusted library allocation
|
page read and write
|
||
AD6000
|
heap
|
page read and write
|
||
2DAB000
|
trusted library allocation
|
page execute and read and write
|
||
10B5000
|
heap
|
page read and write
|
||
10D0000
|
trusted library allocation
|
page read and write
|
||
2A10000
|
heap
|
page read and write
|
||
2E05000
|
heap
|
page read and write
|
||
A43000
|
heap
|
page read and write
|
||
AFB000
|
heap
|
page read and write
|
||
1193000
|
heap
|
page read and write
|
||
2750000
|
heap
|
page read and write
|
||
1170000
|
heap
|
page read and write
|
||
312E000
|
stack
|
page read and write
|
||
10D3000
|
trusted library allocation
|
page execute and read and write
|
||
28FD000
|
stack
|
page read and write
|
||
2E03000
|
heap
|
page read and write
|
||
1188000
|
trusted library allocation
|
page read and write
|
||
1100000
|
trusted library allocation
|
page read and write
|
||
581E000
|
stack
|
page read and write
|
||
2DE0000
|
heap
|
page read and write
|
||
2D3D000
|
trusted library allocation
|
page read and write
|
||
11AE000
|
heap
|
page read and write
|
||
2DC0000
|
heap
|
page read and write
|
||
5D0000
|
unkown
|
page readonly
|
||
29C0000
|
heap
|
page read and write
|
||
2D5D000
|
stack
|
page read and write
|
||
3030000
|
heap
|
page execute and read and write
|
||
4F61000
|
trusted library allocation
|
page read and write
|
||
2740000
|
trusted library allocation
|
page execute and read and write
|
||
2DE8000
|
heap
|
page read and write
|
||
5A5E000
|
stack
|
page read and write
|
||
66CD000
|
stack
|
page read and write
|
||
52BE000
|
trusted library allocation
|
page read and write
|
||
36FF000
|
stack
|
page read and write
|
||
5AB0000
|
heap
|
page read and write
|
||
1100000
|
heap
|
page read and write
|
||
6B4E000
|
stack
|
page read and write
|
||
2E80000
|
heap
|
page read and write
|
||
FCF000
|
heap
|
page read and write
|
||
10B0000
|
heap
|
page read and write
|
||
356F000
|
unkown
|
page read and write
|
||
670E000
|
stack
|
page read and write
|
||
2697000
|
trusted library allocation
|
page execute and read and write
|
||
5590000
|
heap
|
page read and write
|
||
591F000
|
stack
|
page read and write
|
||
11E2000
|
heap
|
page read and write
|
||
2DD0000
|
heap
|
page read and write
|
||
10F0000
|
trusted library allocation
|
page read and write
|
||
2C54000
|
heap
|
page read and write
|
||
56DE000
|
stack
|
page read and write
|
||
31EE000
|
unkown
|
page read and write
|
||
122D000
|
heap
|
page read and write
|
||
FF0000
|
heap
|
page read and write
|
||
295B000
|
stack
|
page read and write
|
||
4EED000
|
stack
|
page read and write
|
||
30EF000
|
unkown
|
page read and write
|
||
11C0000
|
heap
|
page read and write
|
||
2F3F000
|
stack
|
page read and write
|
||
148E000
|
stack
|
page read and write
|
||
313D000
|
stack
|
page read and write
|
||
52AE000
|
stack
|
page read and write
|
||
967000
|
stack
|
page read and write
|
||
2D4B000
|
heap
|
page read and write
|
||
57DF000
|
stack
|
page read and write
|
||
400000
|
remote allocation
|
page execute and read and write
|
||
2AC0000
|
heap
|
page read and write
|
||
5280000
|
heap
|
page read and write
|
||
1225000
|
heap
|
page read and write
|
||
7F690000
|
trusted library allocation
|
page execute and read and write
|
||
2690000
|
trusted library allocation
|
page read and write
|
||
3041000
|
trusted library allocation
|
page read and write
|
||
11EB000
|
heap
|
page read and write
|
||
2D80000
|
trusted library allocation
|
page read and write
|
||
2C8B000
|
heap
|
page read and write
|
||
118E000
|
stack
|
page read and write
|
||
1260000
|
heap
|
page read and write
|
||
4D90000
|
trusted library allocation
|
page read and write
|
||
56D9000
|
stack
|
page read and write
|
||
4EAE000
|
stack
|
page read and write
|
||
303D000
|
stack
|
page read and write
|
||
9F0000
|
heap
|
page read and write
|
||
2E70000
|
heap
|
page read and write
|
||
2E02000
|
heap
|
page read and write
|
||
11F6000
|
heap
|
page read and write
|
||
1267000
|
heap
|
page read and write
|
There are 408 hidden memdumps, click here to show them.