Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
PO No. 2430800015.exe
|
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
|
initial sample
|
||
C:\Users\user\AppData\Local\Temp\tmp5967.tmp
|
XML 1.0 document, ASCII text
|
dropped
|
||
C:\Users\user\AppData\Roaming\yHoBWWkdpyxFI.exe
|
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\PO No. 2430800015.exe.log
|
ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\yHoBWWkdpyxFI.exe.log
|
ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_1nsl5gzm.ezb.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_bfjnjfoc.ai5.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_klxnq02u.dkd.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_lrnlb3zv.nnh.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\tmp69E2.tmp
|
XML 1.0 document, ASCII text
|
dropped
|
||
C:\Users\user\AppData\Roaming\yHoBWWkdpyxFI.exe:Zone.Identifier
|
ASCII text, with CRLF line terminators
|
dropped
|
There are 2 hidden files, click here to show them.
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\PO No. 2430800015.exe
|
"C:\Users\user\Desktop\PO No. 2430800015.exe"
|
||
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
|
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\yHoBWWkdpyxFI.exe"
|
||
C:\Windows\SysWOW64\schtasks.exe
|
"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\yHoBWWkdpyxFI" /XML "C:\Users\user\AppData\Local\Temp\tmp5967.tmp"
|
||
C:\Users\user\Desktop\PO No. 2430800015.exe
|
"C:\Users\user\Desktop\PO No. 2430800015.exe"
|
||
C:\Users\user\Desktop\PO No. 2430800015.exe
|
"C:\Users\user\Desktop\PO No. 2430800015.exe"
|
||
C:\Users\user\AppData\Roaming\yHoBWWkdpyxFI.exe
|
C:\Users\user\AppData\Roaming\yHoBWWkdpyxFI.exe
|
||
C:\Windows\SysWOW64\schtasks.exe
|
"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\yHoBWWkdpyxFI" /XML "C:\Users\user\AppData\Local\Temp\tmp69E2.tmp"
|
||
C:\Users\user\AppData\Roaming\yHoBWWkdpyxFI.exe
|
"C:\Users\user\AppData\Roaming\yHoBWWkdpyxFI.exe"
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\wbem\WmiPrvSE.exe
|
C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
There are 2 hidden processes, click here to show them.
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
https://api.ipify.org/
|
104.26.13.205
|
||
http://r3.o.lencr.org0
|
unknown
|
||
https://api.ipify.org
|
unknown
|
||
http://mail.leema.lk
|
unknown
|
||
https://account.dyn.com/
|
unknown
|
||
https://api.ipify.org/t
|
unknown
|
||
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
|
unknown
|
||
http://x1.c.lencr.org/0
|
unknown
|
||
http://x1.i.lencr.org/0
|
unknown
|
||
http://r3.i.lencr.org/0
|
unknown
|
Domains
Name
|
IP
|
Malicious
|
|
---|---|---|---|
mail.leema.lk
|
162.241.225.141
|
||
api.ipify.org
|
104.26.13.205
|
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
162.241.225.141
|
mail.leema.lk
|
United States
|
||
104.26.13.205
|
api.ipify.org
|
United States
|
Registry
Path
|
Value
|
Malicious
|
|
---|---|---|---|
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\PO No_RASAPI32
|
EnableFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\PO No_RASAPI32
|
EnableAutoFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\PO No_RASAPI32
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\PO No_RASAPI32
|
FileTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\PO No_RASAPI32
|
ConsoleTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\PO No_RASAPI32
|
MaxFileSize
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\PO No_RASAPI32
|
FileDirectory
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\PO No_RASMANCS
|
EnableFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\PO No_RASMANCS
|
EnableAutoFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\PO No_RASMANCS
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\PO No_RASMANCS
|
FileTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\PO No_RASMANCS
|
ConsoleTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\PO No_RASMANCS
|
MaxFileSize
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\PO No_RASMANCS
|
FileDirectory
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\yHoBWWkdpyxFI_RASAPI32
|
EnableFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\yHoBWWkdpyxFI_RASAPI32
|
EnableAutoFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\yHoBWWkdpyxFI_RASAPI32
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\yHoBWWkdpyxFI_RASAPI32
|
FileTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\yHoBWWkdpyxFI_RASAPI32
|
ConsoleTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\yHoBWWkdpyxFI_RASAPI32
|
MaxFileSize
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\yHoBWWkdpyxFI_RASAPI32
|
FileDirectory
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\yHoBWWkdpyxFI_RASMANCS
|
EnableFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\yHoBWWkdpyxFI_RASMANCS
|
EnableAutoFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\yHoBWWkdpyxFI_RASMANCS
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\yHoBWWkdpyxFI_RASMANCS
|
FileTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\yHoBWWkdpyxFI_RASMANCS
|
ConsoleTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\yHoBWWkdpyxFI_RASMANCS
|
MaxFileSize
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\yHoBWWkdpyxFI_RASMANCS
|
FileDirectory
|
There are 19 hidden registries, click here to show them.
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
4E89000
|
trusted library allocation
|
page read and write
|
||
2F17000
|
trusted library allocation
|
page read and write
|
||
432000
|
remote allocation
|
page execute and read and write
|
||
2FD5000
|
trusted library allocation
|
page read and write
|
||
2FC2000
|
trusted library allocation
|
page read and write
|
||
2EF1000
|
trusted library allocation
|
page read and write
|
||
2D20000
|
heap
|
page execute and read and write
|
||
1440000
|
trusted library allocation
|
page read and write
|
||
83A000
|
stack
|
page read and write
|
||
CF7F000
|
stack
|
page read and write
|
||
145D000
|
trusted library allocation
|
page execute and read and write
|
||
686E000
|
stack
|
page read and write
|
||
5A29000
|
trusted library allocation
|
page read and write
|
||
4A3C000
|
stack
|
page read and write
|
||
652E000
|
stack
|
page read and write
|
||
E90000
|
trusted library allocation
|
page read and write
|
||
3EC9000
|
trusted library allocation
|
page read and write
|
||
2BB2000
|
trusted library allocation
|
page read and write
|
||
4DF0000
|
trusted library allocation
|
page execute and read and write
|
||
8CD000
|
stack
|
page read and write
|
||
6648000
|
heap
|
page read and write
|
||
DB50000
|
heap
|
page read and write
|
||
D1FE000
|
stack
|
page read and write
|
||
E74000
|
trusted library allocation
|
page read and write
|
||
6A0D000
|
trusted library allocation
|
page read and write
|
||
53A6000
|
trusted library allocation
|
page read and write
|
||
CD3E000
|
stack
|
page read and write
|
||
400000
|
remote allocation
|
page execute and read and write
|
||
40B000
|
remote allocation
|
page execute and read and write
|
||
5EF0000
|
trusted library allocation
|
page execute and read and write
|
||
DCCE000
|
stack
|
page read and write
|
||
1176000
|
heap
|
page read and write
|
||
5328000
|
trusted library allocation
|
page read and write
|
||
2F96000
|
trusted library allocation
|
page read and write
|
||
54A1000
|
trusted library allocation
|
page read and write
|
||
B1D000
|
stack
|
page read and write
|
||
FE9000
|
stack
|
page read and write
|
||
1475000
|
trusted library allocation
|
page execute and read and write
|
||
5430000
|
heap
|
page read and write
|
||
11F2000
|
heap
|
page read and write
|
||
16DE000
|
stack
|
page read and write
|
||
40C000
|
remote allocation
|
page execute and read and write
|
||
2FBA000
|
trusted library allocation
|
page read and write
|
||
1190000
|
trusted library allocation
|
page read and write
|
||
4EA8000
|
trusted library allocation
|
page read and write
|
||
2FF6000
|
trusted library allocation
|
page read and write
|
||
DBE000
|
stack
|
page read and write
|
||
1090000
|
heap
|
page read and write
|
||
2FEE000
|
trusted library allocation
|
page read and write
|
||
2DE0000
|
heap
|
page read and write
|
||
5B39000
|
trusted library allocation
|
page read and write
|
||
11B0000
|
trusted library allocation
|
page read and write
|
||
503C000
|
stack
|
page read and write
|
||
461D000
|
trusted library allocation
|
page read and write
|
||
5150000
|
heap
|
page read and write
|
||
84D5000
|
heap
|
page read and write
|
||
3132000
|
trusted library allocation
|
page read and write
|
||
4692000
|
trusted library allocation
|
page read and write
|
||
6B2F000
|
stack
|
page read and write
|
||
581E000
|
trusted library allocation
|
page read and write
|
||
330C000
|
stack
|
page read and write
|
||
6B40000
|
trusted library allocation
|
page execute and read and write
|
||
5BC0000
|
trusted library allocation
|
page read and write
|
||
431E000
|
trusted library allocation
|
page read and write
|
||
6D2E000
|
heap
|
page read and write
|
||
6782000
|
heap
|
page read and write
|
||
402000
|
remote allocation
|
page execute and read and write
|
||
313B000
|
trusted library allocation
|
page execute and read and write
|
||
5570000
|
heap
|
page read and write
|
||
35FF000
|
stack
|
page read and write
|
||
5F00000
|
trusted library allocation
|
page read and write
|
||
1130000
|
heap
|
page read and write
|
||
503E000
|
stack
|
page read and write
|
||
15E7000
|
heap
|
page read and write
|
||
5480000
|
trusted library allocation
|
page read and write
|
||
312A000
|
trusted library allocation
|
page execute and read and write
|
||
3310000
|
heap
|
page execute and read and write
|
||
5890000
|
trusted library allocation
|
page read and write
|
||
E70000
|
trusted library allocation
|
page read and write
|
||
5870000
|
trusted library allocation
|
page read and write
|
||
58E0000
|
trusted library allocation
|
page execute and read and write
|
||
4B77000
|
trusted library allocation
|
page read and write
|
||
65EF000
|
stack
|
page read and write
|
||
3137000
|
trusted library allocation
|
page execute and read and write
|
||
669F000
|
heap
|
page read and write
|
||
5140000
|
heap
|
page read and write
|
||
5B0E000
|
stack
|
page read and write
|
||
1648000
|
heap
|
page read and write
|
||
5590000
|
heap
|
page read and write
|
||
5F30000
|
trusted library allocation
|
page read and write
|
||
B77000
|
trusted library allocation
|
page execute and read and write
|
||
3170000
|
trusted library allocation
|
page read and write
|
||
CCFF000
|
stack
|
page read and write
|
||
4329000
|
trusted library allocation
|
page read and write
|
||
5A70000
|
trusted library section
|
page readonly
|
||
A05000
|
heap
|
page read and write
|
||
27F4000
|
trusted library allocation
|
page read and write
|
||
35BE000
|
stack
|
page read and write
|
||
622E000
|
stack
|
page read and write
|
||
3FC5000
|
trusted library allocation
|
page read and write
|
||
6A50000
|
trusted library allocation
|
page read and write
|
||
4E10000
|
trusted library allocation
|
page read and write
|
||
6FF0000
|
trusted library allocation
|
page read and write
|
||
B57000
|
heap
|
page read and write
|
||
3100000
|
trusted library allocation
|
page read and write
|
||
3396000
|
trusted library allocation
|
page read and write
|
||
11A0000
|
heap
|
page read and write
|
||
1100000
|
heap
|
page read and write
|
||
5F40000
|
heap
|
page read and write
|
||
2FAD000
|
trusted library allocation
|
page read and write
|
||
11D0000
|
heap
|
page read and write
|
||
1466000
|
trusted library allocation
|
page execute and read and write
|
||
32E0000
|
heap
|
page read and write
|
||
6B1E000
|
stack
|
page read and write
|
||
6ADD000
|
trusted library allocation
|
page read and write
|
||
5486000
|
trusted library allocation
|
page read and write
|
||
14B0000
|
trusted library allocation
|
page read and write
|
||
4E0A000
|
trusted library allocation
|
page read and write
|
||
120C000
|
heap
|
page read and write
|
||
1193000
|
trusted library allocation
|
page execute and read and write
|
||
594E000
|
stack
|
page read and write
|
||
4C13000
|
trusted library allocation
|
page read and write
|
||
27FB000
|
trusted library allocation
|
page read and write
|
||
C04000
|
heap
|
page read and write
|
||
54A0000
|
heap
|
page read and write
|
||
B40000
|
trusted library allocation
|
page read and write
|
||
E00000
|
trusted library allocation
|
page execute and read and write
|
||
7250000
|
heap
|
page read and write
|
||
3160000
|
trusted library allocation
|
page execute and read and write
|
||
195F000
|
stack
|
page read and write
|
||
1000000
|
heap
|
page read and write
|
||
9BE000
|
unkown
|
page read and write
|
||
69EF000
|
stack
|
page read and write
|
||
12F7000
|
stack
|
page read and write
|
||
31CE000
|
stack
|
page read and write
|
||
696D000
|
stack
|
page read and write
|
||
3941000
|
trusted library allocation
|
page read and write
|
||
E08E000
|
stack
|
page read and write
|
||
29B2000
|
trusted library allocation
|
page read and write
|
||
E04F000
|
stack
|
page read and write
|
||
6730000
|
heap
|
page read and write
|
||
4E50000
|
heap
|
page read and write
|
||
67AE000
|
stack
|
page read and write
|
||
2DC4000
|
trusted library allocation
|
page read and write
|
||
147B000
|
trusted library allocation
|
page execute and read and write
|
||
BF7000
|
heap
|
page read and write
|
||
9CE000
|
stack
|
page read and write
|
||
15D6000
|
heap
|
page read and write
|
||
6B30000
|
heap
|
page read and write
|
||
5BF0000
|
trusted library allocation
|
page read and write
|
||
157E000
|
stack
|
page read and write
|
||
556E000
|
stack
|
page read and write
|
||
2C77000
|
trusted library allocation
|
page execute and read and write
|
||
CE3E000
|
stack
|
page read and write
|
||
8220000
|
trusted library allocation
|
page read and write
|
||
14A0000
|
trusted library allocation
|
page execute and read and write
|
||
11C0000
|
trusted library allocation
|
page read and write
|
||
5583000
|
heap
|
page read and write
|
||
3130000
|
trusted library allocation
|
page read and write
|
||
2F2E000
|
trusted library allocation
|
page read and write
|
||
C82E000
|
stack
|
page read and write
|
||
B7B000
|
trusted library allocation
|
page execute and read and write
|
||
539E000
|
trusted library allocation
|
page read and write
|
||
59D0000
|
trusted library allocation
|
page read and write
|
||
A00000
|
heap
|
page read and write
|
||
1194000
|
trusted library allocation
|
page read and write
|
||
84EF000
|
heap
|
page read and write
|
||
7EF0000
|
trusted library section
|
page read and write
|
||
3321000
|
trusted library allocation
|
page read and write
|
||
2F61000
|
trusted library allocation
|
page read and write
|
||
2F80000
|
heap
|
page read and write
|
||
11D8000
|
heap
|
page read and write
|
||
2E90000
|
heap
|
page read and write
|
||
64AE000
|
stack
|
page read and write
|
||
542C000
|
stack
|
page read and write
|
||
F69000
|
stack
|
page read and write
|
||
5C30000
|
heap
|
page read and write
|
||
BC8000
|
heap
|
page read and write
|
||
1420000
|
heap
|
page read and write
|
||
2C90000
|
trusted library allocation
|
page read and write
|
||
8506000
|
heap
|
page read and write
|
||
15A0000
|
heap
|
page read and write
|
||
2E3C000
|
trusted library allocation
|
page read and write
|
||
FAF000
|
stack
|
page read and write
|
||
5F10000
|
trusted library section
|
page read and write
|
||
311D000
|
trusted library allocation
|
page execute and read and write
|
||
5BF9000
|
trusted library allocation
|
page read and write
|
||
5A0D000
|
stack
|
page read and write
|
||
B43000
|
trusted library allocation
|
page read and write
|
||
B20000
|
trusted library allocation
|
page read and write
|
||
59B3000
|
trusted library allocation
|
page read and write
|
||
C3E000
|
heap
|
page read and write
|
||
1460000
|
trusted library allocation
|
page read and write
|
||
1269000
|
heap
|
page read and write
|
||
53B2000
|
trusted library allocation
|
page read and write
|
||
936000
|
stack
|
page read and write
|
||
6B20000
|
trusted library allocation
|
page read and write
|
||
29B6000
|
trusted library allocation
|
page read and write
|
||
3113000
|
trusted library allocation
|
page read and write
|
||
C53000
|
heap
|
page read and write
|
||
1817000
|
heap
|
page read and write
|
||
45A1000
|
trusted library allocation
|
page read and write
|
||
5BBE000
|
stack
|
page read and write
|
||
6E8E000
|
stack
|
page read and write
|
||
144D000
|
trusted library allocation
|
page execute and read and write
|
||
5483000
|
heap
|
page read and write
|
||
342E000
|
unkown
|
page read and write
|
||
6AAF000
|
stack
|
page read and write
|
||
6FA0000
|
trusted library allocation
|
page read and write
|
||
6AD0000
|
trusted library allocation
|
page read and write
|
||
E40F000
|
stack
|
page read and write
|
||
323D000
|
stack
|
page read and write
|
||
1590000
|
heap
|
page read and write
|
||
E76000
|
trusted library allocation
|
page read and write
|
||
5800000
|
trusted library allocation
|
page read and write
|
||
346F000
|
unkown
|
page read and write
|
||
169A000
|
heap
|
page read and write
|
||
662D000
|
stack
|
page read and write
|
||
11BB000
|
heap
|
page read and write
|
||
66C4000
|
heap
|
page read and write
|
||
1140000
|
heap
|
page read and write
|
||
35A1000
|
trusted library allocation
|
page read and write
|
||
61EF000
|
stack
|
page read and write
|
||
5A0E000
|
stack
|
page read and write
|
||
6A08000
|
trusted library allocation
|
page read and write
|
||
656E000
|
stack
|
page read and write
|
||
666E000
|
stack
|
page read and write
|
||
612E000
|
stack
|
page read and write
|
||
970000
|
heap
|
page read and write
|
||
5830000
|
trusted library allocation
|
page read and write
|
||
B3D000
|
trusted library allocation
|
page execute and read and write
|
||
3EA1000
|
trusted library allocation
|
page read and write
|
||
6FE0000
|
trusted library allocation
|
page execute and read and write
|
||
1490000
|
trusted library allocation
|
page read and write
|
||
3F61000
|
trusted library allocation
|
page read and write
|
||
D0FE000
|
stack
|
page read and write
|
||
2DD0000
|
trusted library allocation
|
page read and write
|
||
B72000
|
trusted library allocation
|
page read and write
|
||
1430000
|
heap
|
page read and write
|
||
4DA0000
|
trusted library allocation
|
page read and write
|
||
2BC1000
|
trusted library allocation
|
page read and write
|
||
12A2000
|
heap
|
page read and write
|
||
11A7000
|
heap
|
page read and write
|
||
7000000
|
trusted library allocation
|
page read and write
|
||
54BC000
|
stack
|
page read and write
|
||
580B000
|
trusted library allocation
|
page read and write
|
||
1470000
|
trusted library allocation
|
page read and write
|
||
59A3000
|
heap
|
page read and write
|
||
5386000
|
trusted library allocation
|
page read and write
|
||
5860000
|
trusted library allocation
|
page read and write
|
||
3660000
|
heap
|
page read and write
|
||
420000
|
remote allocation
|
page execute and read and write
|
||
6610000
|
heap
|
page read and write
|
||
548E000
|
trusted library allocation
|
page read and write
|
||
5480000
|
heap
|
page read and write
|
||
826D000
|
trusted library allocation
|
page read and write
|
||
90A000
|
stack
|
page read and write
|
||
3180000
|
heap
|
page read and write
|
||
CFBC000
|
stack
|
page read and write
|
||
970000
|
heap
|
page read and write
|
||
1265000
|
heap
|
page read and write
|
||
CBFE000
|
stack
|
page read and write
|
||
549A000
|
trusted library allocation
|
page read and write
|
||
6C10000
|
trusted library allocation
|
page read and write
|
||
3392000
|
trusted library allocation
|
page read and write
|
||
4525000
|
trusted library allocation
|
page read and write
|
||
548B000
|
trusted library allocation
|
page read and write
|
||
59D4000
|
heap
|
page read and write
|
||
1174000
|
heap
|
page read and write
|
||
C01000
|
heap
|
page read and write
|
||
5C30000
|
heap
|
page read and write
|
||
2FA1000
|
trusted library allocation
|
page read and write
|
||
580E000
|
stack
|
page read and write
|
||
CA7E000
|
stack
|
page read and write
|
||
E10000
|
trusted library allocation
|
page read and write
|
||
3126000
|
trusted library allocation
|
page execute and read and write
|
||
2DC0000
|
trusted library allocation
|
page read and write
|
||
11FA000
|
heap
|
page read and write
|
||
E20000
|
heap
|
page execute and read and write
|
||
5392000
|
trusted library allocation
|
page read and write
|
||
2758000
|
trusted library allocation
|
page read and write
|
||
54B2000
|
trusted library allocation
|
page read and write
|
||
9430000
|
trusted library allocation
|
page read and write
|
||
2E64000
|
trusted library allocation
|
page read and write
|
||
6FF5000
|
trusted library allocation
|
page read and write
|
||
5400000
|
trusted library allocation
|
page execute and read and write
|
||
15E5000
|
heap
|
page read and write
|
||
6FD0000
|
heap
|
page read and write
|
||
1270000
|
heap
|
page read and write
|
||
8270000
|
trusted library allocation
|
page read and write
|
||
53A1000
|
trusted library allocation
|
page read and write
|
||
6A00000
|
trusted library allocation
|
page read and write
|
||
430000
|
remote allocation
|
page execute and read and write
|
||
146A000
|
trusted library allocation
|
page execute and read and write
|
||
7F950000
|
trusted library allocation
|
page execute and read and write
|
||
1800000
|
trusted library allocation
|
page read and write
|
||
2E7E000
|
trusted library allocation
|
page read and write
|
||
9470000
|
trusted library allocation
|
page read and write
|
||
2C7B000
|
trusted library allocation
|
page execute and read and write
|
||
293F000
|
stack
|
page read and write
|
||
120A000
|
heap
|
page read and write
|
||
57CB000
|
stack
|
page read and write
|
||
E1CE000
|
stack
|
page read and write
|
||
6E30000
|
trusted library allocation
|
page execute and read and write
|
||
5090000
|
heap
|
page read and write
|
||
15AE000
|
heap
|
page read and write
|
||
1137000
|
heap
|
page read and write
|
||
4E53000
|
heap
|
page read and write
|
||
549E000
|
trusted library allocation
|
page read and write
|
||
381C000
|
trusted library allocation
|
page read and write
|
||
4D80000
|
trusted library allocation
|
page read and write
|
||
63EF000
|
stack
|
page read and write
|
||
4F68000
|
trusted library allocation
|
page read and write
|
||
2EA1000
|
trusted library allocation
|
page read and write
|
||
2F36000
|
trusted library allocation
|
page read and write
|
||
2DB0000
|
trusted library allocation
|
page read and write
|
||
E6C000
|
stack
|
page read and write
|
||
E30E000
|
stack
|
page read and write
|
||
2E60000
|
trusted library allocation
|
page read and write
|
||
7F10000
|
trusted library section
|
page read and write
|
||
7F00000
|
trusted library allocation
|
page execute and read and write
|
||
2F9F000
|
trusted library allocation
|
page read and write
|
||
9480000
|
trusted library allocation
|
page read and write
|
||
54FC000
|
stack
|
page read and write
|
||
58CC000
|
stack
|
page read and write
|
||
40D000
|
remote allocation
|
page execute and read and write
|
||
6F80000
|
trusted library allocation
|
page read and write
|
||
127E000
|
heap
|
page read and write
|
||
3949000
|
trusted library allocation
|
page read and write
|
||
11BD000
|
trusted library allocation
|
page execute and read and write
|
||
E18E000
|
stack
|
page read and write
|
||
1200000
|
heap
|
page read and write
|
||
119D000
|
trusted library allocation
|
page execute and read and write
|
||
4E13000
|
trusted library allocation
|
page read and write
|
||
660D000
|
stack
|
page read and write
|
||
4BC5000
|
trusted library allocation
|
page read and write
|
||
35B7000
|
trusted library allocation
|
page read and write
|
||
32CE000
|
stack
|
page read and write
|
||
14C0000
|
heap
|
page read and write
|
||
11C2000
|
trusted library allocation
|
page read and write
|
||
A20000
|
heap
|
page read and write
|
||
6BBF000
|
stack
|
page read and write
|
||
69F0000
|
trusted library allocation
|
page execute and read and write
|
||
6D20000
|
heap
|
page read and write
|
||
E54C000
|
stack
|
page read and write
|
||
3150000
|
trusted library allocation
|
page read and write
|
||
642D000
|
stack
|
page read and write
|
||
6F90000
|
trusted library allocation
|
page read and write
|
||
DB0000
|
heap
|
page read and write
|
||
6AED000
|
stack
|
page read and write
|
||
3480000
|
heap
|
page read and write
|
||
DF4E000
|
stack
|
page read and write
|
||
5832000
|
trusted library allocation
|
page read and write
|
||
280E000
|
trusted library allocation
|
page read and write
|
||
5D90000
|
trusted library section
|
page read and write
|
||
1477000
|
trusted library allocation
|
page execute and read and write
|
||
69AE000
|
stack
|
page read and write
|
||
7FBB0000
|
trusted library allocation
|
page execute and read and write
|
||
2941000
|
trusted library allocation
|
page read and write
|
||
E69000
|
stack
|
page read and write
|
||
15AA000
|
heap
|
page read and write
|
||
58FA000
|
trusted library allocation
|
page read and write
|
||
6712000
|
heap
|
page read and write
|
||
2FD0000
|
heap
|
page read and write
|
||
7710000
|
heap
|
page read and write
|
||
1148000
|
heap
|
page read and write
|
||
4CFE000
|
trusted library allocation
|
page read and write
|
||
5B30000
|
trusted library allocation
|
page read and write
|
||
32D0000
|
heap
|
page read and write
|
||
60EF000
|
stack
|
page read and write
|
||
5A90000
|
heap
|
page execute and read and write
|
||
2830000
|
heap
|
page read and write
|
||
5E6B000
|
stack
|
page read and write
|
||
7902000
|
trusted library allocation
|
page read and write
|
||
CB7E000
|
stack
|
page read and write
|
||
5520000
|
heap
|
page execute and read and write
|
||
41F000
|
remote allocation
|
page execute and read and write
|
||
2E70000
|
trusted library allocation
|
page read and write
|
||
2C70000
|
trusted library allocation
|
page read and write
|
||
8260000
|
trusted library allocation
|
page read and write
|
||
5A20000
|
trusted library allocation
|
page read and write
|
||
431000
|
remote allocation
|
page execute and read and write
|
||
C82000
|
heap
|
page read and write
|
||
2811000
|
trusted library allocation
|
page read and write
|
||
1697000
|
heap
|
page read and write
|
||
8500000
|
heap
|
page read and write
|
||
59A0000
|
heap
|
page read and write
|
||
672E000
|
stack
|
page read and write
|
||
2FB1000
|
trusted library allocation
|
page read and write
|
||
59B0000
|
trusted library allocation
|
page read and write
|
||
B6A000
|
trusted library allocation
|
page execute and read and write
|
||
2ED6000
|
trusted library allocation
|
page read and write
|
||
A00000
|
heap
|
page read and write
|
||
2C75000
|
trusted library allocation
|
page execute and read and write
|
||
5080000
|
trusted library section
|
page readonly
|
||
11D5000
|
heap
|
page read and write
|
||
2CDE000
|
stack
|
page read and write
|
||
FC0000
|
heap
|
page read and write
|
||
3103000
|
trusted library allocation
|
page execute and read and write
|
||
7020000
|
trusted library allocation
|
page read and write
|
||
5804000
|
trusted library allocation
|
page read and write
|
||
442B000
|
trusted library allocation
|
page read and write
|
||
5380000
|
trusted library allocation
|
page read and write
|
||
2E66000
|
trusted library allocation
|
page read and write
|
||
BE8000
|
heap
|
page read and write
|
||
68EE000
|
stack
|
page read and write
|
||
4DE0000
|
heap
|
page read and write
|
||
B90000
|
trusted library allocation
|
page read and write
|
||
7007000
|
trusted library allocation
|
page read and write
|
||
B66000
|
trusted library allocation
|
page execute and read and write
|
||
7010000
|
trusted library allocation
|
page read and write
|
||
43A5000
|
trusted library allocation
|
page read and write
|
||
53E0000
|
heap
|
page execute and read and write
|
||
590E000
|
stack
|
page read and write
|
||
7060000
|
trusted library allocation
|
page execute and read and write
|
||
2BCE000
|
stack
|
page read and write
|
||
7EFD0000
|
trusted library allocation
|
page execute and read and write
|
||
5C20000
|
heap
|
page read and write
|
||
3F05000
|
trusted library allocation
|
page read and write
|
||
9FF000
|
unkown
|
page read and write
|
||
3122000
|
trusted library allocation
|
page read and write
|
||
11C6000
|
trusted library allocation
|
page execute and read and write
|
||
2C72000
|
trusted library allocation
|
page read and write
|
||
E80000
|
trusted library allocation
|
page read and write
|
||
4321000
|
trusted library allocation
|
page read and write
|
||
5D8E000
|
stack
|
page read and write
|
||
5C8E000
|
stack
|
page read and write
|
||
3380000
|
trusted library allocation
|
page read and write
|
||
84D0000
|
heap
|
page read and write
|
||
B30000
|
trusted library allocation
|
page read and write
|
||
675D000
|
heap
|
page read and write
|
||
59C0000
|
heap
|
page read and write
|
||
5A10000
|
heap
|
page read and write
|
||
6620000
|
heap
|
page read and write
|
||
5C10000
|
heap
|
page read and write
|
||
EB2000
|
unkown
|
page readonly
|
||
2E2E000
|
stack
|
page read and write
|
||
529E000
|
stack
|
page read and write
|
||
6AC0000
|
trusted library allocation
|
page execute and read and write
|
||
15C1000
|
heap
|
page read and write
|
||
2816000
|
trusted library allocation
|
page read and write
|
||
FD0000
|
heap
|
page read and write
|
||
B33000
|
trusted library allocation
|
page execute and read and write
|
||
44A9000
|
trusted library allocation
|
page read and write
|
||
10F8000
|
stack
|
page read and write
|
||
2E2E000
|
stack
|
page read and write
|
||
41E000
|
remote allocation
|
page execute and read and write
|
||
980000
|
heap
|
page read and write
|
||
538B000
|
trusted library allocation
|
page read and write
|
||
1450000
|
trusted library allocation
|
page read and write
|
||
BC0000
|
heap
|
page read and write
|
||
8280000
|
trusted library allocation
|
page execute and read and write
|
||
2E50000
|
heap
|
page execute and read and write
|
||
1472000
|
trusted library allocation
|
page read and write
|
||
3120000
|
trusted library allocation
|
page read and write
|
||
2D1C000
|
stack
|
page read and write
|
||
5840000
|
trusted library allocation
|
page read and write
|
||
513E000
|
stack
|
page read and write
|
||
1250000
|
trusted library allocation
|
page read and write
|
||
6A57000
|
trusted library allocation
|
page read and write
|
||
BCE000
|
heap
|
page read and write
|
||
5A80000
|
heap
|
page read and write
|
||
1340000
|
heap
|
page read and write
|
||
B4D000
|
trusted library allocation
|
page execute and read and write
|
||
9490000
|
trusted library allocation
|
page execute and read and write
|
||
2E40000
|
trusted library allocation
|
page read and write
|
||
4658000
|
trusted library allocation
|
page read and write
|
||
DC8E000
|
stack
|
page read and write
|
||
53AD000
|
trusted library allocation
|
page read and write
|
||
72B0000
|
heap
|
page read and write
|
||
3104000
|
trusted library allocation
|
page read and write
|
||
2E50000
|
trusted library allocation
|
page read and write
|
||
17DE000
|
stack
|
page read and write
|
||
B60000
|
trusted library allocation
|
page read and write
|
||
3110000
|
trusted library allocation
|
page read and write
|
||
64ED000
|
stack
|
page read and write
|
||
519E000
|
stack
|
page read and write
|
||
116A000
|
heap
|
page read and write
|
||
1443000
|
trusted library allocation
|
page execute and read and write
|
||
4FF0000
|
heap
|
page execute and read and write
|
||
539A000
|
trusted library allocation
|
page read and write
|
||
7F280000
|
trusted library allocation
|
page execute and read and write
|
||
BA0000
|
heap
|
page read and write
|
||
538E000
|
trusted library allocation
|
page read and write
|
||
6B27000
|
trusted library allocation
|
page read and write
|
||
B50000
|
heap
|
page read and write
|
||
2B8E000
|
stack
|
page read and write
|
||
1444000
|
trusted library allocation
|
page read and write
|
||
185E000
|
stack
|
page read and write
|
||
3F89000
|
trusted library allocation
|
page read and write
|
||
5F45000
|
heap
|
page read and write
|
||
2FDB000
|
heap
|
page read and write
|
||
4E00000
|
trusted library allocation
|
page read and write
|
||
6670000
|
heap
|
page read and write
|
||
7F5E000
|
stack
|
page read and write
|
||
D0BC000
|
stack
|
page read and write
|
||
29A0000
|
trusted library allocation
|
page read and write
|
||
54A6000
|
trusted library allocation
|
page read and write
|
||
B34000
|
trusted library allocation
|
page read and write
|
||
AAD0000
|
trusted library section
|
page read and write
|
||
348A000
|
heap
|
page read and write
|
||
5C15000
|
heap
|
page read and write
|
||
30AE000
|
trusted library allocation
|
page read and write
|
||
5580000
|
heap
|
page read and write
|
||
6F87000
|
trusted library allocation
|
page read and write
|
||
5826000
|
trusted library allocation
|
page read and write
|
||
537B000
|
stack
|
page read and write
|
||
2E30000
|
trusted library allocation
|
page execute and read and write
|
||
3310000
|
heap
|
page read and write
|
||
1462000
|
trusted library allocation
|
page read and write
|
||
670B000
|
heap
|
page read and write
|
||
1810000
|
heap
|
page read and write
|
||
7050000
|
heap
|
page read and write
|
||
2BD3000
|
trusted library allocation
|
page read and write
|
||
63AD000
|
stack
|
page read and write
|
||
11DE000
|
heap
|
page read and write
|
||
147D000
|
stack
|
page read and write
|
||
6F8F000
|
stack
|
page read and write
|
||
59CE000
|
stack
|
page read and write
|
||
6A03000
|
trusted library allocation
|
page read and write
|
||
DDCE000
|
stack
|
page read and write
|
||
EA0000
|
heap
|
page read and write
|
||
1180000
|
trusted library allocation
|
page read and write
|
||
11CA000
|
trusted library allocation
|
page execute and read and write
|
||
54AD000
|
trusted library allocation
|
page read and write
|
||
D5A000
|
stack
|
page read and write
|
||
5490000
|
heap
|
page read and write
|
||
1220000
|
heap
|
page read and write
|
||
310D000
|
trusted library allocation
|
page execute and read and write
|
||
2F5E000
|
stack
|
page read and write
|
||
5492000
|
trusted library allocation
|
page read and write
|
||
2EDF000
|
trusted library allocation
|
page read and write
|
||
27F0000
|
trusted library allocation
|
page read and write
|
||
58F0000
|
trusted library allocation
|
page read and write
|
||
4E30000
|
trusted library allocation
|
page read and write
|
||
582D000
|
trusted library allocation
|
page read and write
|
||
5850000
|
trusted library allocation
|
page read and write
|
||
805F000
|
stack
|
page read and write
|
||
598E000
|
stack
|
page read and write
|
||
CE7E000
|
stack
|
page read and write
|
||
327A000
|
stack
|
page read and write
|
||
1260000
|
heap
|
page read and write
|
||
DFE000
|
stack
|
page read and write
|
||
E2CE000
|
stack
|
page read and write
|
||
EB0000
|
unkown
|
page readonly
|
||
B62000
|
trusted library allocation
|
page read and write
|
||
281D000
|
trusted library allocation
|
page read and write
|
||
4E1B000
|
trusted library allocation
|
page read and write
|
||
1096000
|
heap
|
page read and write
|
||
6C00000
|
trusted library allocation
|
page execute and read and write
|
||
5C40000
|
heap
|
page read and write
|
||
2EED000
|
trusted library allocation
|
page read and write
|
||
E64E000
|
stack
|
page read and write
|
||
68AD000
|
stack
|
page read and write
|
||
2FEE000
|
trusted library allocation
|
page read and write
|
||
58D0000
|
heap
|
page read and write
|
||
59EA000
|
heap
|
page read and write
|
||
E44B000
|
stack
|
page read and write
|
||
5821000
|
trusted library allocation
|
page read and write
|
||
4233000
|
trusted library allocation
|
page read and write
|
||
40E000
|
remote allocation
|
page execute and read and write
|
||
C92E000
|
stack
|
page read and write
|
||
11DC000
|
heap
|
page read and write
|
There are 553 hidden memdumps, click here to show them.