Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
file.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
|
initial sample
|
||
C:\Users\user\AppData\Local\TechMind360 Innovations Co\L
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\TechMind360 Innovations Co\MindTechPro360.js
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\TechMind360 Innovations Co\MindTechPro360.pif
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\812297\Shopzilla.pif
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
modified
|
||
C:\Users\user\AppData\Local\Temp\812297\g
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\Acoustic
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\Almost
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\Bb
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\Bee
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\Do
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\Dot
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\Extreme
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\Gnome
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\Praise
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\Predict
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\Random
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\Ready
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\Sandra
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\Shannon
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\Wright
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\After
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\Anticipated
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\Anyone
|
ASCII text, with very long lines (1797), with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\Anyone.cmd
|
ASCII text, with very long lines (1797), with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\Blessed
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\Cargo
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\Chase
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\Commercial
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\Complicated
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\Continental
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\Cunt
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\Dominant
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\Essential
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\Expenses
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\Halloween
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\Hdtv
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\Janet
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\Melissa
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\Opposite
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\Petersburg
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\Prisoners
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\Purchasing
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\Silk
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\Stadium
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\Stands
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\Success
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\Textile
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\Tolerance
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\nsb6504.tmp
|
data
|
dropped
|
There are 40 hidden files, click here to show them.
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\file.exe
|
"C:\Users\user\Desktop\file.exe"
|
||
C:\Windows\SysWOW64\cmd.exe
|
"C:\Windows\System32\cmd.exe" /c copy Anyone Anyone.cmd & Anyone.cmd
|
||
C:\Windows\SysWOW64\findstr.exe
|
findstr /I "wrsa.exe opssvc.exe"
|
||
C:\Windows\SysWOW64\findstr.exe
|
findstr /I "avastui.exe avgui.exe nswscsvc.exe sophoshealth.exe"
|
||
C:\Windows\SysWOW64\cmd.exe
|
cmd /c md 812297
|
||
C:\Windows\SysWOW64\findstr.exe
|
findstr /V "IndieBeachesHonIo" Janet
|
||
C:\Windows\SysWOW64\cmd.exe
|
cmd /c copy /b Praise + Bee + Random + Acoustic + Predict + Shannon + Extreme + Gnome + Sandra + Wright + Ready + Bb + Dot
+ Almost + Do + Continental 812297\g
|
||
C:\Users\user\AppData\Local\Temp\812297\Shopzilla.pif
|
812297\Shopzilla.pif 812297\g
|
||
C:\Windows\SysWOW64\schtasks.exe
|
schtasks.exe /create /tn "MindTechPro360" /tr "wscript //B 'C:\Users\user\AppData\Local\TechMind360 Innovations Co\MindTechPro360.js'"
/sc onlogon /F /RL HIGHEST
|
||
C:\Windows\System32\wscript.exe
|
C:\Windows\system32\wscript.EXE //B "C:\Users\user\AppData\Local\TechMind360 Innovations Co\MindTechPro360.js"
|
||
C:\Users\user\AppData\Local\TechMind360 Innovations Co\MindTechPro360.pif
|
"C:\Users\user\AppData\Local\TechMind360 Innovations Co\MindTechPro360.pif" "C:\Users\user\AppData\Local\TechMind360 Innovations
Co\L"
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\SysWOW64\tasklist.exe
|
tasklist
|
||
C:\Windows\SysWOW64\tasklist.exe
|
tasklist
|
||
C:\Windows\SysWOW64\timeout.exe
|
timeout 15
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
There are 6 hidden processes, click here to show them.
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
http://www.autoitscript.com/autoit3/J
|
unknown
|
||
http://nsis.sf.net/NSIS_ErrorError
|
unknown
|
||
http://www.autoitscript.com/autoit3/0
|
unknown
|
Domains
Name
|
IP
|
Malicious
|
|
---|---|---|---|
JzyWtlVaDZyw.JzyWtlVaDZyw
|
unknown
|
Registry
Path
|
Value
|
Malicious
|
|
---|---|---|---|
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows Script\Settings\Telemetry\wscript.exe
|
JScriptSetScriptStateStarted
|
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
27FD000
|
heap
|
page read and write
|
||
3DA1000
|
heap
|
page read and write
|
||
1FE71BD5000
|
heap
|
page read and write
|
||
7BC000
|
stack
|
page read and write
|
||
C51000
|
heap
|
page read and write
|
||
47FF000
|
stack
|
page read and write
|
||
8DF22FA000
|
stack
|
page read and write
|
||
924000
|
heap
|
page read and write
|
||
1FE7186E000
|
heap
|
page read and write
|
||
1FE71856000
|
heap
|
page read and write
|
||
8DF28FE000
|
stack
|
page read and write
|
||
36B1000
|
heap
|
page read and write
|
||
51A0000
|
heap
|
page read and write
|
||
317E000
|
heap
|
page read and write
|
||
3050000
|
heap
|
page read and write
|
||
3417000
|
heap
|
page read and write
|
||
40A000
|
unkown
|
page write copy
|
||
39A0000
|
heap
|
page read and write
|
||
27FD000
|
heap
|
page read and write
|
||
292E000
|
heap
|
page read and write
|
||
924000
|
heap
|
page read and write
|
||
2DEC000
|
stack
|
page read and write
|
||
DF6000
|
heap
|
page read and write
|
||
3083000
|
heap
|
page read and write
|
||
1FE71856000
|
heap
|
page read and write
|
||
2670000
|
heap
|
page read and write
|
||
1FE71BDC000
|
heap
|
page read and write
|
||
27B0000
|
heap
|
page read and write
|
||
36B1000
|
heap
|
page read and write
|
||
36B1000
|
heap
|
page read and write
|
||
728000
|
heap
|
page read and write
|
||
3DA1000
|
heap
|
page read and write
|
||
19A000
|
stack
|
page read and write
|
||
3DA1000
|
heap
|
page read and write
|
||
3364000
|
heap
|
page read and write
|
||
40A000
|
unkown
|
page read and write
|
||
309B000
|
heap
|
page read and write
|
||
1FE71884000
|
heap
|
page read and write
|
||
1FE71856000
|
heap
|
page read and write
|
||
36B1000
|
heap
|
page read and write
|
||
19E0000
|
trusted library allocation
|
page read and write
|
||
C5F000
|
unkown
|
page write copy
|
||
27FD000
|
heap
|
page read and write
|
||
28EF000
|
stack
|
page read and write
|
||
30C0000
|
heap
|
page read and write
|
||
6F0000
|
heap
|
page read and write
|
||
36B1000
|
heap
|
page read and write
|
||
1FE736D0000
|
heap
|
page read and write
|
||
3BB4000
|
heap
|
page read and write
|
||
3DA1000
|
heap
|
page read and write
|
||
3080000
|
heap
|
page read and write
|
||
3E0000
|
heap
|
page read and write
|
||
C90000
|
trusted library allocation
|
page read and write
|
||
924000
|
heap
|
page read and write
|
||
3AD4000
|
heap
|
page read and write
|
||
D54000
|
heap
|
page read and write
|
||
3B9A000
|
heap
|
page read and write
|
||
DB9000
|
heap
|
page read and write
|
||
27EA000
|
heap
|
page read and write
|
||
2780000
|
heap
|
page read and write
|
||
2990000
|
heap
|
page read and write
|
||
1FE71848000
|
heap
|
page read and write
|
||
43B000
|
unkown
|
page readonly
|
||
D43000
|
heap
|
page read and write
|
||
3DA1000
|
heap
|
page read and write
|
||
D1D000
|
heap
|
page read and write
|
||
36B1000
|
heap
|
page read and write
|
||
691000
|
unkown
|
page execute read
|
||
3DA1000
|
heap
|
page read and write
|
||
F23000
|
heap
|
page read and write
|
||
36B1000
|
heap
|
page read and write
|
||
3DA1000
|
heap
|
page read and write
|
||
3DA1000
|
heap
|
page read and write
|
||
D0E000
|
stack
|
page read and write
|
||
5C0000
|
heap
|
page read and write
|
||
267F000
|
stack
|
page read and write
|
||
3DA1000
|
heap
|
page read and write
|
||
3DA1000
|
heap
|
page read and write
|
||
3DA1000
|
heap
|
page read and write
|
||
100F000
|
heap
|
page read and write
|
||
91F000
|
stack
|
page read and write
|
||
3E4000
|
heap
|
page read and write
|
||
3B16000
|
heap
|
page read and write
|
||
B4E000
|
stack
|
page read and write
|
||
2640000
|
heap
|
page read and write
|
||
3570000
|
heap
|
page read and write
|
||
36B1000
|
heap
|
page read and write
|
||
B3F000
|
stack
|
page read and write
|
||
401000
|
unkown
|
page execute read
|
||
19E0000
|
trusted library allocation
|
page read and write
|
||
36B1000
|
heap
|
page read and write
|
||
48A000
|
stack
|
page read and write
|
||
36B1000
|
heap
|
page read and write
|
||
319E000
|
stack
|
page read and write
|
||
AD0000
|
heap
|
page read and write
|
||
27CF000
|
heap
|
page read and write
|
||
3E4000
|
heap
|
page read and write
|
||
420B000
|
trusted library allocation
|
page read and write
|
||
1FE7183C000
|
heap
|
page read and write
|
||
924000
|
heap
|
page read and write
|
||
36B1000
|
heap
|
page read and write
|
||
340F000
|
stack
|
page read and write
|
||
BA1000
|
unkown
|
page execute read
|
||
309000
|
stack
|
page read and write
|
||
3B6F000
|
heap
|
page read and write
|
||
E22000
|
heap
|
page read and write
|
||
924000
|
heap
|
page read and write
|
||
8F0000
|
heap
|
page read and write
|
||
27FD000
|
heap
|
page read and write
|
||
1FE7186C000
|
heap
|
page read and write
|
||
EBC000
|
heap
|
page read and write
|
||
1FE71886000
|
heap
|
page read and write
|
||
A90000
|
heap
|
page read and write
|
||
3DA1000
|
heap
|
page read and write
|
||
27ED000
|
heap
|
page read and write
|
||
BA0000
|
unkown
|
page readonly
|
||
19B4000
|
heap
|
page read and write
|
||
691000
|
unkown
|
page execute read
|
||
309B000
|
heap
|
page read and write
|
||
3BC8000
|
heap
|
page read and write
|
||
26BE000
|
stack
|
page read and write
|
||
31DF000
|
stack
|
page read and write
|
||
8DF26FE000
|
stack
|
page read and write
|
||
1A30000
|
heap
|
page read and write
|
||
408000
|
unkown
|
page readonly
|
||
36B1000
|
heap
|
page read and write
|
||
18D0000
|
heap
|
page read and write
|
||
99E000
|
stack
|
page read and write
|
||
400000
|
unkown
|
page readonly
|
||
31F6000
|
heap
|
page read and write
|
||
3DA1000
|
heap
|
page read and write
|
||
3DA1000
|
heap
|
page read and write
|
||
3E4000
|
heap
|
page read and write
|
||
36B1000
|
heap
|
page read and write
|
||
3DA1000
|
heap
|
page read and write
|
||
401000
|
unkown
|
page execute read
|
||
C68000
|
unkown
|
page readonly
|
||
433000
|
unkown
|
page read and write
|
||
C55000
|
unkown
|
page readonly
|
||
C90000
|
trusted library allocation
|
page read and write
|
||
3DA1000
|
heap
|
page read and write
|
||
296F000
|
stack
|
page read and write
|
||
3DA1000
|
heap
|
page read and write
|
||
720000
|
unkown
|
page readonly
|
||
9F0000
|
heap
|
page read and write
|
||
C90000
|
trusted library allocation
|
page read and write
|
||
924000
|
heap
|
page read and write
|
||
3DA1000
|
heap
|
page read and write
|
||
37A0000
|
heap
|
page read and write
|
||
36B1000
|
heap
|
page read and write
|
||
26FE000
|
stack
|
page read and write
|
||
3DA1000
|
heap
|
page read and write
|
||
C4F000
|
heap
|
page read and write
|
||
3AA8000
|
heap
|
page read and write
|
||
1FE71BD0000
|
heap
|
page read and write
|
||
3DA1000
|
heap
|
page read and write
|
||
31BE000
|
stack
|
page read and write
|
||
C90000
|
trusted library allocation
|
page read and write
|
||
C90000
|
trusted library allocation
|
page read and write
|
||
B5D000
|
stack
|
page read and write
|
||
924000
|
heap
|
page read and write
|
||
C3F000
|
heap
|
page read and write
|
||
D07000
|
heap
|
page read and write
|
||
19E0000
|
trusted library allocation
|
page read and write
|
||
437000
|
unkown
|
page read and write
|
||
1FE7188E000
|
heap
|
page read and write
|
||
27EE000
|
heap
|
page read and write
|
||
279E000
|
stack
|
page read and write
|
||
3892000
|
heap
|
page read and write
|
||
8DF2BFF000
|
stack
|
page read and write
|
||
36B1000
|
heap
|
page read and write
|
||
36B1000
|
heap
|
page read and write
|
||
3850000
|
heap
|
page read and write
|
||
307F000
|
heap
|
page read and write
|
||
307F000
|
heap
|
page read and write
|
||
9B000
|
stack
|
page read and write
|
||
50FE000
|
stack
|
page read and write
|
||
4113000
|
trusted library allocation
|
page read and write
|
||
36B1000
|
heap
|
page read and write
|
||
C55000
|
unkown
|
page readonly
|
||
30C5000
|
heap
|
page read and write
|
||
88C000
|
stack
|
page read and write
|
||
3A2E000
|
heap
|
page read and write
|
||
C90000
|
trusted library allocation
|
page read and write
|
||
400000
|
unkown
|
page readonly
|
||
85E000
|
stack
|
page read and write
|
||
27CF000
|
heap
|
page read and write
|
||
36B1000
|
heap
|
page read and write
|
||
37E2000
|
heap
|
page read and write
|
||
30AD000
|
heap
|
page read and write
|
||
33CE000
|
stack
|
page read and write
|
||
3DA1000
|
heap
|
page read and write
|
||
3850000
|
heap
|
page read and write
|
||
1FE7188E000
|
heap
|
page read and write
|
||
3DA1000
|
heap
|
page read and write
|
||
3B0E000
|
heap
|
page read and write
|
||
6CF000
|
stack
|
page read and write
|
||
330E000
|
stack
|
page read and write
|
||
38D4000
|
heap
|
page read and write
|
||
43FF000
|
stack
|
page read and write
|
||
24DC000
|
stack
|
page read and write
|
||
2DF0000
|
heap
|
page read and write
|
||
427000
|
unkown
|
page read and write
|
||
1FE7187E000
|
heap
|
page read and write
|
||
1FE719F0000
|
heap
|
page read and write
|
||
309B000
|
heap
|
page read and write
|
||
FA5000
|
heap
|
page read and write
|
||
D99000
|
heap
|
page read and write
|
||
2DCF000
|
stack
|
page read and write
|
||
8DF24FF000
|
stack
|
page read and write
|
||
720000
|
heap
|
page read and write
|
||
36B1000
|
heap
|
page read and write
|
||
3C0000
|
heap
|
page read and write
|
||
27B9000
|
heap
|
page read and write
|
||
19E0000
|
trusted library allocation
|
page read and write
|
||
3DA1000
|
heap
|
page read and write
|
||
924000
|
heap
|
page read and write
|
||
414A000
|
trusted library allocation
|
page read and write
|
||
334E000
|
stack
|
page read and write
|
||
3370000
|
heap
|
page read and write
|
||
3DA1000
|
heap
|
page read and write
|
||
3068000
|
heap
|
page read and write
|
||
32FE000
|
stack
|
page read and write
|
||
2997000
|
heap
|
page read and write
|
||
4640000
|
heap
|
page read and write
|
||
312A000
|
heap
|
page read and write
|
||
296E000
|
stack
|
page read and write
|
||
BA0000
|
unkown
|
page readonly
|
||
3E4000
|
heap
|
page read and write
|
||
19E0000
|
trusted library allocation
|
page read and write
|
||
DEF000
|
heap
|
page read and write
|
||
440000
|
heap
|
page read and write
|
||
1FE7188E000
|
heap
|
page read and write
|
||
3DA0000
|
heap
|
page read and write
|
||
19E0000
|
heap
|
page read and write
|
||
309B000
|
heap
|
page read and write
|
||
B60000
|
heap
|
page read and write
|
||
EFB000
|
heap
|
page read and write
|
||
1FE71887000
|
heap
|
page read and write
|
||
36B1000
|
heap
|
page read and write
|
||
EF7000
|
heap
|
page read and write
|
||
19E0000
|
trusted library allocation
|
page read and write
|
||
19E0000
|
trusted library allocation
|
page read and write
|
||
C00000
|
heap
|
page read and write
|
||
C68000
|
unkown
|
page readonly
|
||
19E0000
|
trusted library allocation
|
page read and write
|
||
D20000
|
heap
|
page read and write
|
||
19E0000
|
trusted library allocation
|
page read and write
|
||
C90000
|
trusted library allocation
|
page read and write
|
||
2DAC000
|
stack
|
page read and write
|
||
309F000
|
heap
|
page read and write
|
||
273F000
|
stack
|
page read and write
|
||
3866000
|
heap
|
page read and write
|
||
4105000
|
trusted library allocation
|
page read and write
|
||
F41000
|
heap
|
page read and write
|
||
1FE71810000
|
heap
|
page read and write
|
||
E83000
|
heap
|
page read and write
|
||
C40000
|
heap
|
page read and write
|
||
758000
|
unkown
|
page readonly
|
||
50BF000
|
stack
|
page read and write
|
||
3BBE000
|
heap
|
page read and write
|
||
463F000
|
stack
|
page read and write
|
||
1FE7186C000
|
heap
|
page read and write
|
||
D28000
|
heap
|
page read and write
|
||
27FD000
|
heap
|
page read and write
|
||
30A8000
|
heap
|
page read and write
|
||
309E000
|
heap
|
page read and write
|
||
924000
|
heap
|
page read and write
|
||
680000
|
heap
|
page read and write
|
||
E1B000
|
heap
|
page read and write
|
||
2520000
|
heap
|
page read and write
|
||
C90000
|
trusted library allocation
|
page read and write
|
||
74F000
|
unkown
|
page write copy
|
||
27EA000
|
heap
|
page read and write
|
||
3A40000
|
heap
|
page read and write
|
||
8DF23FF000
|
stack
|
page read and write
|
||
1FE71847000
|
heap
|
page read and write
|
||
396E000
|
heap
|
page read and write
|
||
B80000
|
heap
|
page read and write
|
||
5C5000
|
heap
|
page read and write
|
||
95E000
|
stack
|
page read and write
|
||
F7A000
|
heap
|
page read and write
|
||
330D000
|
stack
|
page read and write
|
||
1FE71A10000
|
heap
|
page read and write
|
||
1992000
|
heap
|
page read and write
|
||
3DA1000
|
heap
|
page read and write
|
||
745000
|
unkown
|
page readonly
|
||
84E000
|
stack
|
page read and write
|
||
249C000
|
stack
|
page read and write
|
||
4830000
|
heap
|
page read and write
|
||
1FE7187B000
|
heap
|
page read and write
|
||
74F000
|
unkown
|
page read and write
|
||
3DA1000
|
heap
|
page read and write
|
||
36B1000
|
heap
|
page read and write
|
||
3060000
|
heap
|
page read and write
|
||
3DA1000
|
heap
|
page read and write
|
||
3DA1000
|
heap
|
page read and write
|
||
C90000
|
trusted library allocation
|
page read and write
|
||
3DA1000
|
heap
|
page read and write
|
||
4670000
|
heap
|
page read and write
|
||
39DC000
|
heap
|
page read and write
|
||
42E000
|
unkown
|
page read and write
|
||
924000
|
heap
|
page read and write
|
||
3A24000
|
heap
|
page read and write
|
||
41FD000
|
trusted library allocation
|
page read and write
|
||
690000
|
unkown
|
page readonly
|
||
86D000
|
stack
|
page read and write
|
||
3410000
|
heap
|
page read and write
|
||
2F68000
|
heap
|
page read and write
|
||
36B1000
|
heap
|
page read and write
|
||
19E0000
|
trusted library allocation
|
page read and write
|
||
392C000
|
heap
|
page read and write
|
||
263E000
|
stack
|
page read and write
|
||
38EA000
|
heap
|
page read and write
|
||
1FE7188E000
|
heap
|
page read and write
|
||
C90000
|
trusted library allocation
|
page read and write
|
||
32BF000
|
heap
|
page read and write
|
||
32A0000
|
heap
|
page read and write
|
||
5170000
|
heap
|
page read and write
|
||
55E000
|
stack
|
page read and write
|
||
40C000
|
unkown
|
page read and write
|
||
36B1000
|
heap
|
page read and write
|
||
3DA1000
|
heap
|
page read and write
|
||
36B1000
|
heap
|
page read and write
|
||
1FE71841000
|
heap
|
page read and write
|
||
920000
|
heap
|
page read and write
|
||
30A7000
|
heap
|
page read and write
|
||
F36000
|
heap
|
page read and write
|
||
3DA1000
|
heap
|
page read and write
|
||
924000
|
heap
|
page read and write
|
||
32BF000
|
stack
|
page read and write
|
||
43B000
|
unkown
|
page readonly
|
||
3A50000
|
heap
|
page read and write
|
||
30AD000
|
heap
|
page read and write
|
||
3916000
|
heap
|
page read and write
|
||
29AF000
|
stack
|
page read and write
|
||
765000
|
heap
|
page read and write
|
||
19E0000
|
trusted library allocation
|
page read and write
|
||
27D0000
|
heap
|
page read and write
|
||
399A000
|
heap
|
page read and write
|
||
3DA1000
|
heap
|
page read and write
|
||
720000
|
unkown
|
page readonly
|
||
5A0000
|
heap
|
page read and write
|
||
27F3000
|
heap
|
page read and write
|
||
370000
|
heap
|
page read and write
|
||
710000
|
heap
|
page read and write
|
||
3DA1000
|
heap
|
page read and write
|
||
39E2000
|
heap
|
page read and write
|
||
38A8000
|
heap
|
page read and write
|
||
36B0000
|
heap
|
page read and write
|
||
36B1000
|
heap
|
page read and write
|
||
C30000
|
unkown
|
page readonly
|
||
924000
|
heap
|
page read and write
|
||
C63000
|
unkown
|
page write copy
|
||
36B1000
|
heap
|
page read and write
|
||
30AD000
|
heap
|
page read and write
|
||
77C000
|
stack
|
page read and write
|
||
36B1000
|
heap
|
page read and write
|
||
3958000
|
heap
|
page read and write
|
||
36B1000
|
heap
|
page read and write
|
||
3E4000
|
heap
|
page read and write
|
||
820000
|
heap
|
page read and write
|
||
690000
|
unkown
|
page readonly
|
||
1FE71820000
|
heap
|
page read and write
|
||
30AD000
|
heap
|
page read and write
|
||
513F000
|
stack
|
page read and write
|
||
283D000
|
heap
|
page read and write
|
||
507E000
|
stack
|
page read and write
|
||
75E000
|
heap
|
page read and write
|
||
900000
|
heap
|
page read and write
|
||
C08000
|
heap
|
page read and write
|
||
45FE000
|
stack
|
page read and write
|
||
27EA000
|
heap
|
page read and write
|
||
924000
|
heap
|
page read and write
|
||
B7D000
|
stack
|
page read and write
|
||
8DF27FF000
|
stack
|
page read and write
|
||
3E4000
|
heap
|
page read and write
|
||
3BF3000
|
heap
|
page read and write
|
||
444F000
|
stack
|
page read and write
|
||
399E000
|
heap
|
page read and write
|
||
C5F000
|
unkown
|
page read and write
|
||
3360000
|
heap
|
page read and write
|
||
3AEA000
|
heap
|
page read and write
|
||
27D3000
|
heap
|
page read and write
|
||
33FF000
|
stack
|
page read and write
|
||
3BE1000
|
heap
|
page read and write
|
||
CCE000
|
stack
|
page read and write
|
||
27FD000
|
heap
|
page read and write
|
||
36B1000
|
heap
|
page read and write
|
||
19E0000
|
trusted library allocation
|
page read and write
|
||
C3F000
|
heap
|
page read and write
|
||
484F000
|
stack
|
page read and write
|
||
1FE71889000
|
heap
|
page read and write
|
||
36B1000
|
heap
|
page read and write
|
||
31E0000
|
heap
|
page read and write
|
||
924000
|
heap
|
page read and write
|
||
36B1000
|
heap
|
page read and write
|
||
3A92000
|
heap
|
page read and write
|
||
753000
|
unkown
|
page write copy
|
||
36B1000
|
heap
|
page read and write
|
||
8DF29FF000
|
stack
|
page read and write
|
||
C90000
|
trusted library allocation
|
page read and write
|
||
3DA1000
|
heap
|
page read and write
|
||
C90000
|
trusted library allocation
|
page read and write
|
||
3DA1000
|
heap
|
page read and write
|
||
C30000
|
unkown
|
page readonly
|
||
292E000
|
stack
|
page read and write
|
||
3A66000
|
heap
|
page read and write
|
||
D2A000
|
heap
|
page read and write
|
||
BA1000
|
unkown
|
page execute read
|
||
2676000
|
heap
|
page read and write
|
||
1FE73200000
|
heap
|
page read and write
|
||
3DA1000
|
heap
|
page read and write
|
||
29FE000
|
stack
|
page read and write
|
||
334E000
|
stack
|
page read and write
|
||
36B1000
|
heap
|
page read and write
|
||
31F0000
|
heap
|
page read and write
|
||
3E4000
|
heap
|
page read and write
|
||
36B1000
|
heap
|
page read and write
|
||
408000
|
unkown
|
page readonly
|
||
36B1000
|
heap
|
page read and write
|
||
36B1000
|
heap
|
page read and write
|
||
343C000
|
stack
|
page read and write
|
||
8DF2AFF000
|
stack
|
page read and write
|
||
745000
|
unkown
|
page readonly
|
||
353D000
|
stack
|
page read and write
|
||
316C000
|
heap
|
page read and write
|
||
27F4000
|
heap
|
page read and write
|
||
4052000
|
trusted library allocation
|
page read and write
|
||
3824000
|
heap
|
page read and write
|
||
31AA000
|
heap
|
page read and write
|
||
C90000
|
trusted library allocation
|
page read and write
|
||
E4F000
|
heap
|
page read and write
|
||
59E000
|
stack
|
page read and write
|
||
3B16000
|
heap
|
page read and write
|
||
924000
|
heap
|
page read and write
|
||
900000
|
heap
|
page read and write
|
||
277F000
|
stack
|
page read and write
|
||
3188000
|
heap
|
page read and write
|
||
30AE000
|
heap
|
page read and write
|
||
2F60000
|
heap
|
page read and write
|
||
32A4000
|
heap
|
page read and write
|
||
1FE7188E000
|
heap
|
page read and write
|
||
758000
|
unkown
|
page readonly
|
||
3DA1000
|
heap
|
page read and write
|
||
27EA000
|
heap
|
page read and write
|
There are 436 hidden memdumps, click here to show them.