Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
ungziped_file.exe
|
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
|
initial sample
|
||
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\ungziped_file.exe.log
|
ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\tmp83C2.tmp
|
XML 1.0 document, ASCII text
|
dropped
|
||
C:\Users\user\AppData\Roaming\wcxUnWLNw.exe
|
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\wcxUnWLNw.exe:Zone.Identifier
|
ASCII text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\ios\logs.dat
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\wcxUnWLNw.exe.log
|
ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\ZJCZETOO\json[1].json
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\ZVZFKMB9\json[1].json
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
|
data
|
modified
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_1yqzxpwo.03o.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_3303b0gg.z24.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_aed25he4.2ve.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_l02lgsx5.lo0.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_mq5q1llf.gd1.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_p5ciq2ms.d5k.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_r2ju2pwh.vkc.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_y3ixx2nq.oon.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\tmp9556.tmp
|
XML 1.0 document, ASCII text
|
dropped
|
There are 9 hidden files, click here to show them.
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\ungziped_file.exe
|
"C:\Users\user\Desktop\ungziped_file.exe"
|
||
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
|
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\ungziped_file.exe"
|
||
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
|
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\wcxUnWLNw.exe"
|
||
C:\Windows\SysWOW64\schtasks.exe
|
"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\wcxUnWLNw" /XML "C:\Users\user\AppData\Local\Temp\tmp83C2.tmp"
|
||
C:\Users\user\Desktop\ungziped_file.exe
|
"C:\Users\user\Desktop\ungziped_file.exe"
|
||
C:\Users\user\AppData\Roaming\wcxUnWLNw.exe
|
C:\Users\user\AppData\Roaming\wcxUnWLNw.exe
|
||
C:\Windows\SysWOW64\schtasks.exe
|
"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\wcxUnWLNw" /XML "C:\Users\user\AppData\Local\Temp\tmp9556.tmp"
|
||
C:\Users\user\AppData\Roaming\wcxUnWLNw.exe
|
"C:\Users\user\AppData\Roaming\wcxUnWLNw.exe"
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\wbem\WmiPrvSE.exe
|
C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
There are 3 hidden processes, click here to show them.
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
oyo.work.gd
|
|||
http://www.apache.org/licenses/LICENSE-2.0
|
unknown
|
||
http://www.fontbureau.com
|
unknown
|
||
http://www.fontbureau.com/designersG
|
unknown
|
||
http://www.fontbureau.com/designers/?
|
unknown
|
||
http://www.founder.com.cn/cn/bThe
|
unknown
|
||
http://geoplugin.net/json.gpyl
|
unknown
|
||
http://www.fontbureau.com/designers?
|
unknown
|
||
http://www.tiro.com
|
unknown
|
||
http://www.fontbureau.com/designers
|
unknown
|
||
http://geoplugin.net/json.gpu
|
unknown
|
||
http://geoplugin.net/json.gp;
|
unknown
|
||
https://www.chiark.greenend.org.uk/~sgtatham/putty/0
|
unknown
|
||
http://www.carterandcone.coml
|
unknown
|
||
http://www.sajatypeworks.com
|
unknown
|
||
http://geoplugin.net/json.gp
|
178.237.33.50
|
||
http://www.typography.netD
|
unknown
|
||
http://www.fontbureau.com/designers/cabarga.htmlN
|
unknown
|
||
http://www.founder.com.cn/cn/cThe
|
unknown
|
||
http://www.galapagosdesign.com/staff/dennis.htm
|
unknown
|
||
http://www.founder.com.cn/cn
|
unknown
|
||
http://www.fontbureau.com/designers/frere-user.html
|
unknown
|
||
http://geoplugin.net/
|
unknown
|
||
http://geoplugin.net/json.gp/C
|
unknown
|
||
http://geoplugin.net/json.gpat
|
unknown
|
||
http://www.jiyu-kobo.co.jp/
|
unknown
|
||
http://www.galapagosdesign.com/DPlease
|
unknown
|
||
http://www.fontbureau.com/designers8
|
unknown
|
||
http://www.fonts.com
|
unknown
|
||
http://geoplugin.net/json.gpV
|
unknown
|
||
http://www.urwpp.deDPlease
|
unknown
|
||
http://www.zhongyicts.com.cn
|
unknown
|
||
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
|
unknown
|
||
http://www.sakkal.com
|
unknown
|
There are 24 hidden URLs, click here to show them.
Domains
Name
|
IP
|
Malicious
|
|
---|---|---|---|
oyo.work.gd
|
176.65.141.49
|
||
geoplugin.net
|
178.237.33.50
|
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
176.65.141.49
|
oyo.work.gd
|
Germany
|
||
178.237.33.50
|
geoplugin.net
|
Netherlands
|
Registry
Path
|
Value
|
Malicious
|
|
---|---|---|---|
HKEY_CURRENT_USER\SOFTWARE\gig-Z5JY9I
|
exepath
|
||
HKEY_CURRENT_USER\SOFTWARE\gig-Z5JY9I
|
licence
|
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
400000
|
remote allocation
|
page execute and read and write
|
||
36A9000
|
trusted library allocation
|
page read and write
|
||
DAA000
|
heap
|
page read and write
|
||
BA7000
|
heap
|
page read and write
|
||
6FF5000
|
trusted library allocation
|
page read and write
|
||
ECE000
|
stack
|
page read and write
|
||
46E000
|
remote allocation
|
page execute and read and write
|
||
B70E000
|
stack
|
page read and write
|
||
4BB3000
|
heap
|
page read and write
|
||
8A0000
|
heap
|
page read and write
|
||
146B000
|
trusted library allocation
|
page execute and read and write
|
||
D35000
|
heap
|
page read and write
|
||
CFE000
|
stack
|
page read and write
|
||
4BA0000
|
trusted library allocation
|
page read and write
|
||
91F000
|
heap
|
page read and write
|
||
BD6000
|
trusted library allocation
|
page execute and read and write
|
||
6EEE000
|
stack
|
page read and write
|
||
BB4000
|
trusted library allocation
|
page read and write
|
||
2F9F000
|
stack
|
page read and write
|
||
12E0000
|
trusted library allocation
|
page read and write
|
||
727B000
|
heap
|
page read and write
|
||
5980000
|
trusted library allocation
|
page execute and read and write
|
||
4C90000
|
trusted library allocation
|
page read and write
|
||
2C70000
|
trusted library allocation
|
page read and write
|
||
282E000
|
stack
|
page read and write
|
||
2A7F000
|
stack
|
page read and write
|
||
5890000
|
heap
|
page read and write
|
||
6BAE000
|
heap
|
page read and write
|
||
2BBF000
|
stack
|
page read and write
|
||
79FE000
|
stack
|
page read and write
|
||
3F1E000
|
trusted library allocation
|
page read and write
|
||
1443000
|
trusted library allocation
|
page read and write
|
||
5580000
|
heap
|
page execute and read and write
|
||
2590000
|
heap
|
page execute and read and write
|
||
2D00000
|
heap
|
page read and write
|
||
2F0B000
|
trusted library allocation
|
page read and write
|
||
BA0000
|
heap
|
page read and write
|
||
279A000
|
stack
|
page read and write
|
||
888000
|
heap
|
page read and write
|
||
2ABC000
|
stack
|
page read and write
|
||
386E000
|
stack
|
page read and write
|
||
B90000
|
trusted library allocation
|
page read and write
|
||
C50000
|
trusted library allocation
|
page execute and read and write
|
||
FCE000
|
stack
|
page read and write
|
||
5040000
|
trusted library allocation
|
page execute and read and write
|
||
B1FE000
|
stack
|
page read and write
|
||
C1B000
|
heap
|
page read and write
|
||
B48E000
|
stack
|
page read and write
|
||
AFAE000
|
stack
|
page read and write
|
||
1440000
|
trusted library allocation
|
page read and write
|
||
71DE000
|
stack
|
page read and write
|
||
4FDB000
|
stack
|
page read and write
|
||
4E70000
|
heap
|
page read and write
|
||
BE7000
|
trusted library allocation
|
page execute and read and write
|
||
71E0000
|
heap
|
page read and write
|
||
2CCE000
|
stack
|
page read and write
|
||
BB3000
|
trusted library allocation
|
page execute and read and write
|
||
5320000
|
trusted library allocation
|
page read and write
|
||
756E000
|
stack
|
page read and write
|
||
4B80000
|
trusted library allocation
|
page read and write
|
||
352F000
|
stack
|
page read and write
|
||
3F94000
|
trusted library allocation
|
page read and write
|
||
7FD90000
|
trusted library allocation
|
page execute and read and write
|
||
40F0000
|
trusted library allocation
|
page read and write
|
||
2570000
|
heap
|
page read and write
|
||
2E80000
|
heap
|
page read and write
|
||
73B0000
|
trusted library allocation
|
page read and write
|
||
471000
|
remote allocation
|
page execute and read and write
|
||
C04000
|
heap
|
page read and write
|
||
788E000
|
stack
|
page read and write
|
||
54FB000
|
stack
|
page read and write
|
||
716E000
|
stack
|
page read and write
|
||
2CCE000
|
stack
|
page read and write
|
||
396D000
|
stack
|
page read and write
|
||
A5C000
|
stack
|
page read and write
|
||
12F0000
|
heap
|
page read and write
|
||
4C82000
|
trusted library allocation
|
page read and write
|
||
5870000
|
heap
|
page read and write
|
||
5510000
|
heap
|
page read and write
|
||
86A000
|
heap
|
page read and write
|
||
300000
|
unkown
|
page readonly
|
||
C80000
|
heap
|
page read and write
|
||
14A0000
|
heap
|
page read and write
|
||
256B000
|
stack
|
page read and write
|
||
5403000
|
heap
|
page read and write
|
||
86E000
|
heap
|
page read and write
|
||
12CE000
|
stack
|
page read and write
|
||
4BE1000
|
trusted library allocation
|
page read and write
|
||
293F000
|
stack
|
page read and write
|
||
B80E000
|
stack
|
page read and write
|
||
100A000
|
heap
|
page read and write
|
||
F60000
|
heap
|
page read and write
|
||
4BC0000
|
trusted library allocation
|
page read and write
|
||
2CCB000
|
heap
|
page read and write
|
||
8A2000
|
heap
|
page read and write
|
||
6BC2000
|
heap
|
page read and write
|
||
1490000
|
trusted library allocation
|
page execute and read and write
|
||
BCD000
|
trusted library allocation
|
page execute and read and write
|
||
4EC0000
|
heap
|
page read and write
|
||
5065000
|
heap
|
page read and write
|
||
6EA0000
|
trusted library allocation
|
page read and write
|
||
550A000
|
trusted library section
|
page readonly
|
||
BD0000
|
trusted library allocation
|
page read and write
|
||
73FE000
|
stack
|
page read and write
|
||
14A7000
|
heap
|
page read and write
|
||
2C90000
|
heap
|
page read and write
|
||
297B000
|
stack
|
page read and write
|
||
36A1000
|
trusted library allocation
|
page read and write
|
||
5060000
|
heap
|
page read and write
|
||
4F10000
|
trusted library allocation
|
page read and write
|
||
1460000
|
trusted library allocation
|
page read and write
|
||
5341000
|
trusted library allocation
|
page read and write
|
||
5324000
|
trusted library allocation
|
page read and write
|
||
4BE6000
|
trusted library allocation
|
page read and write
|
||
145A000
|
trusted library allocation
|
page execute and read and write
|
||
AFD000
|
stack
|
page read and write
|
||
7030000
|
trusted library allocation
|
page execute and read and write
|
||
7F0000
|
heap
|
page read and write
|
||
573E000
|
stack
|
page read and write
|
||
BFA000
|
stack
|
page read and write
|
||
32AF000
|
unkown
|
page read and write
|
||
C60000
|
heap
|
page read and write
|
||
2E5D000
|
stack
|
page read and write
|
||
6CE2000
|
heap
|
page read and write
|
||
71FC000
|
heap
|
page read and write
|
||
2EF6000
|
trusted library allocation
|
page read and write
|
||
4E60000
|
heap
|
page read and write
|
||
6BA0000
|
heap
|
page read and write
|
||
109B000
|
heap
|
page read and write
|
||
BBD000
|
trusted library allocation
|
page execute and read and write
|
||
EF7000
|
stack
|
page read and write
|
||
104E000
|
stack
|
page read and write
|
||
5400000
|
heap
|
page read and write
|
||
746E000
|
stack
|
page read and write
|
||
4BCB000
|
trusted library allocation
|
page read and write
|
||
12E4000
|
trusted library allocation
|
page read and write
|
||
B5CC000
|
stack
|
page read and write
|
||
BA0000
|
heap
|
page read and write
|
||
7B5000
|
heap
|
page read and write
|
||
B34E000
|
stack
|
page read and write
|
||
2CD8000
|
trusted library allocation
|
page read and write
|
||
534D000
|
trusted library allocation
|
page read and write
|
||
2A00000
|
heap
|
page read and write
|
||
D7F000
|
stack
|
page read and write
|
||
CB0000
|
heap
|
page read and write
|
||
6D3E000
|
heap
|
page read and write
|
||
5530000
|
trusted library allocation
|
page read and write
|
||
4BF2000
|
trusted library allocation
|
page read and write
|
||
5875000
|
heap
|
page read and write
|
||
5030000
|
trusted library allocation
|
page read and write
|
||
775D000
|
stack
|
page read and write
|
||
B0AE000
|
stack
|
page read and write
|
||
777000
|
stack
|
page read and write
|
||
6CEF000
|
heap
|
page read and write
|
||
B820000
|
trusted library allocation
|
page execute and read and write
|
||
1450000
|
trusted library allocation
|
page read and write
|
||
2DFE000
|
unkown
|
page read and write
|
||
73AA000
|
trusted library allocation
|
page read and write
|
||
4F00000
|
trusted library section
|
page read and write
|
||
585D000
|
stack
|
page read and write
|
||
29ED000
|
stack
|
page read and write
|
||
3EA1000
|
trusted library allocation
|
page read and write
|
||
E10000
|
heap
|
page read and write
|
||
5740000
|
trusted library allocation
|
page read and write
|
||
3FFF000
|
trusted library allocation
|
page read and write
|
||
1456000
|
trusted library allocation
|
page execute and read and write
|
||
2830000
|
heap
|
page read and write
|
||
7BC000
|
stack
|
page read and write
|
||
2AA0000
|
heap
|
page read and write
|
||
2D70000
|
trusted library allocation
|
page read and write
|
||
FCF000
|
stack
|
page read and write
|
||
BEB000
|
trusted library allocation
|
page execute and read and write
|
||
39AD000
|
stack
|
page read and write
|
||
4BC4000
|
trusted library allocation
|
page read and write
|
||
74FE000
|
stack
|
page read and write
|
||
3FE8000
|
trusted library allocation
|
page read and write
|
||
5860000
|
trusted library allocation
|
page execute and read and write
|
||
1452000
|
trusted library allocation
|
page read and write
|
||
302000
|
unkown
|
page readonly
|
||
2A90000
|
heap
|
page read and write
|
||
2C60000
|
trusted library allocation
|
page read and write
|
||
C00000
|
trusted library allocation
|
page read and write
|
||
2D75000
|
trusted library allocation
|
page read and write
|
||
D90000
|
heap
|
page read and write
|
||
2CCF000
|
heap
|
page read and write
|
||
67A000
|
stack
|
page read and write
|
||
4EDC000
|
stack
|
page read and write
|
||
1462000
|
trusted library allocation
|
page read and write
|
||
B58E000
|
stack
|
page read and write
|
||
12E3000
|
trusted library allocation
|
page execute and read and write
|
||
7258000
|
heap
|
page read and write
|
||
533E000
|
trusted library allocation
|
page read and write
|
||
7231000
|
heap
|
page read and write
|
||
D8E000
|
stack
|
page read and write
|
||
7FA80000
|
trusted library allocation
|
page execute and read and write
|
||
B2FF000
|
stack
|
page read and write
|
||
2D0F000
|
stack
|
page read and write
|
||
6E90000
|
trusted library allocation
|
page read and write
|
||
5500000
|
trusted library section
|
page readonly
|
||
B67C000
|
stack
|
page read and write
|
||
2D80000
|
trusted library allocation
|
page read and write
|
||
6FEF000
|
stack
|
page read and write
|
||
67C2000
|
trusted library allocation
|
page read and write
|
||
7274000
|
heap
|
page read and write
|
||
275D000
|
stack
|
page read and write
|
||
6CA0000
|
heap
|
page read and write
|
||
2C39000
|
stack
|
page read and write
|
||
4C20000
|
trusted library allocation
|
page read and write
|
||
B6E000
|
stack
|
page read and write
|
||
6D36000
|
heap
|
page read and write
|
||
1034000
|
heap
|
page read and write
|
||
3EA9000
|
trusted library allocation
|
page read and write
|
||
2D90000
|
heap
|
page execute and read and write
|
||
BE6000
|
heap
|
page read and write
|
||
3AAB000
|
stack
|
page read and write
|
||
E20000
|
heap
|
page read and write
|
||
6CB8000
|
heap
|
page read and write
|
||
53D2000
|
trusted library allocation
|
page read and write
|
||
B6E000
|
stack
|
page read and write
|
||
4BDE000
|
trusted library allocation
|
page read and write
|
||
4C60000
|
heap
|
page read and write
|
||
B70000
|
heap
|
page read and write
|
||
F80000
|
heap
|
page read and write
|
||
2F5E000
|
stack
|
page read and write
|
||
50B7000
|
heap
|
page read and write
|
||
C70000
|
trusted library allocation
|
page read and write
|
||
5346000
|
trusted library allocation
|
page read and write
|
||
6F7E000
|
heap
|
page read and write
|
||
D97000
|
heap
|
page read and write
|
||
B57B000
|
stack
|
page read and write
|
||
895000
|
heap
|
page read and write
|
||
5750000
|
heap
|
page read and write
|
||
100F000
|
stack
|
page read and write
|
||
6FF0000
|
trusted library allocation
|
page read and write
|
||
BD2000
|
trusted library allocation
|
page read and write
|
||
4C00000
|
trusted library allocation
|
page read and write
|
||
4B90000
|
trusted library allocation
|
page read and write
|
||
4BB0000
|
heap
|
page read and write
|
||
2715000
|
trusted library allocation
|
page read and write
|
||
6CBC000
|
heap
|
page read and write
|
||
53B0000
|
heap
|
page read and write
|
||
779E000
|
stack
|
page read and write
|
||
C26000
|
heap
|
page read and write
|
||
C87000
|
heap
|
page read and write
|
||
371E000
|
stack
|
page read and write
|
||
732E000
|
stack
|
page read and write
|
||
4C70000
|
trusted library allocation
|
page execute and read and write
|
||
12ED000
|
trusted library allocation
|
page execute and read and write
|
||
5070000
|
heap
|
page read and write
|
||
5370000
|
trusted library allocation
|
page read and write
|
||
40E3000
|
trusted library allocation
|
page read and write
|
||
BE2000
|
trusted library allocation
|
page read and write
|
||
B43E000
|
stack
|
page read and write
|
||
B53E000
|
stack
|
page read and write
|
||
B5B000
|
stack
|
page read and write
|
||
6F92000
|
heap
|
page read and write
|
||
1042000
|
heap
|
page read and write
|
||
26F6000
|
trusted library allocation
|
page read and write
|
||
6CF2000
|
heap
|
page read and write
|
||
BC0000
|
trusted library allocation
|
page read and write
|
||
BC3000
|
trusted library allocation
|
page read and write
|
||
2F13000
|
trusted library allocation
|
page read and write
|
||
381F000
|
stack
|
page read and write
|
||
4F20000
|
heap
|
page execute and read and write
|
||
2BFD000
|
stack
|
page read and write
|
||
2CC0000
|
heap
|
page read and write
|
||
D00000
|
heap
|
page read and write
|
||
483C000
|
stack
|
page read and write
|
||
53C0000
|
trusted library allocation
|
page execute and read and write
|
||
28F0000
|
heap
|
page read and write
|
||
133E000
|
stack
|
page read and write
|
||
B6CC000
|
stack
|
page read and write
|
||
2C50000
|
trusted library allocation
|
page read and write
|
||
502D000
|
stack
|
page read and write
|
||
471000
|
remote allocation
|
page execute and read and write
|
||
2B90000
|
heap
|
page read and write
|
||
2B9A000
|
heap
|
page read and write
|
||
7205000
|
heap
|
page read and write
|
||
269E000
|
stack
|
page read and write
|
||
144D000
|
trusted library allocation
|
page execute and read and write
|
||
53D0000
|
trusted library allocation
|
page read and write
|
||
71F5000
|
heap
|
page read and write
|
||
76F4000
|
trusted library allocation
|
page read and write
|
||
67A0000
|
trusted library allocation
|
page read and write
|
||
342E000
|
stack
|
page read and write
|
||
2A4E000
|
unkown
|
page read and write
|
||
D30000
|
heap
|
page read and write
|
||
1480000
|
trusted library allocation
|
page read and write
|
||
BDA000
|
trusted library allocation
|
page execute and read and write
|
||
30B0000
|
heap
|
page read and write
|
||
2CA0000
|
heap
|
page read and write
|
||
12D0000
|
trusted library allocation
|
page read and write
|
||
76F0000
|
trusted library allocation
|
page read and write
|
||
5050000
|
trusted library allocation
|
page execute and read and write
|
||
7B0000
|
heap
|
page read and write
|
||
4ED0000
|
trusted library allocation
|
page read and write
|
||
6F70000
|
heap
|
page read and write
|
||
4EBC000
|
stack
|
page read and write
|
||
860000
|
heap
|
page read and write
|
||
4C80000
|
trusted library allocation
|
page read and write
|
||
B20000
|
heap
|
page read and write
|
||
B3FE000
|
stack
|
page read and write
|
||
BA0000
|
heap
|
page read and write
|
||
2E00000
|
heap
|
page read and write
|
||
7277000
|
heap
|
page read and write
|
||
5520000
|
heap
|
page read and write
|
||
5880000
|
heap
|
page read and write
|
||
2A8F000
|
unkown
|
page read and write
|
||
7A3E000
|
stack
|
page read and write
|
||
B44F000
|
stack
|
page read and write
|
||
B20E000
|
stack
|
page read and write
|
||
10D0000
|
heap
|
page read and write
|
||
B30E000
|
stack
|
page read and write
|
||
2C66000
|
trusted library allocation
|
page read and write
|
||
5540000
|
trusted library allocation
|
page execute and read and write
|
||
2E1F000
|
stack
|
page read and write
|
||
1040000
|
heap
|
page read and write
|
||
2EA1000
|
trusted library allocation
|
page read and write
|
||
2F1E000
|
unkown
|
page read and write
|
||
1467000
|
trusted library allocation
|
page execute and read and write
|
||
7246000
|
heap
|
page read and write
|
||
4E50000
|
trusted library section
|
page readonly
|
||
26A1000
|
trusted library allocation
|
page read and write
|
||
4BA5000
|
trusted library allocation
|
page read and write
|
||
46A8000
|
trusted library allocation
|
page read and write
|
||
B2E000
|
stack
|
page read and write
|
||
100E000
|
heap
|
page read and write
|
||
73A0000
|
trusted library allocation
|
page read and write
|
||
BB0000
|
trusted library allocation
|
page read and write
|
||
800000
|
heap
|
page read and write
|
||
53E0000
|
trusted library allocation
|
page read and write
|
||
41AA000
|
trusted library allocation
|
page read and write
|
||
5080000
|
heap
|
page read and write
|
||
722E000
|
heap
|
page read and write
|
||
4029000
|
trusted library allocation
|
page read and write
|
||
C4E000
|
stack
|
page read and write
|
||
2E9E000
|
stack
|
page read and write
|
||
10AE000
|
heap
|
page read and write
|
||
6DD0000
|
trusted library section
|
page read and write
|
||
79BE000
|
stack
|
page read and write
|
||
532B000
|
trusted library allocation
|
page read and write
|
||
2C64000
|
trusted library allocation
|
page read and write
|
||
475000
|
remote allocation
|
page execute and read and write
|
||
2CFF000
|
stack
|
page read and write
|
||
F70000
|
heap
|
page read and write
|
||
1000000
|
heap
|
page read and write
|
||
143F000
|
stack
|
page read and write
|
||
84E000
|
stack
|
page read and write
|
||
4BED000
|
trusted library allocation
|
page read and write
|
||
5086000
|
heap
|
page read and write
|
||
2C80000
|
heap
|
page read and write
|
||
1099000
|
heap
|
page read and write
|
||
5570000
|
trusted library allocation
|
page read and write
|
||
B77E000
|
stack
|
page read and write
|
||
4EE0000
|
trusted library allocation
|
page execute and read and write
|
There are 345 hidden memdumps, click here to show them.