Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
ypdTgfE0o8.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
|
initial sample
|
||
C:\Users\user\AppData\Local\Temp\cbgsujmwws.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\jplmbcuny
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\jurqlvqzsu80j5x5
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\C79A3B\B52B3F.exe (copy)
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\C79A3B\B52B3F.lck
|
very short file (no magic)
|
dropped
|
||
C:\Users\user\AppData\Roaming\Microsoft\Crypto\RSA\S-1-5-21-3853321935-2125563209-4053062332-1002\21c8026919fd094ab07ec3c180a9f210_d06ed635-68f6-4e9a-955c-4899f5f57b9a
|
data
|
dropped
|
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\ypdTgfE0o8.exe
|
"C:\Users\user\Desktop\ypdTgfE0o8.exe"
|
||
C:\Users\user\AppData\Local\Temp\cbgsujmwws.exe
|
C:\Users\user\AppData\Local\Temp\cbgsujmwws.exe C:\Users\user\AppData\Local\Temp\jplmbcuny
|
||
C:\Users\user\AppData\Local\Temp\cbgsujmwws.exe
|
C:\Users\user\AppData\Local\Temp\cbgsujmwws.exe C:\Users\user\AppData\Local\Temp\jplmbcuny
|
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
http://45.133.1.20/oluwa/five/fre.php
|
45.133.1.20
|
||
http://kbfvzoboss.bid/alien/fre.php
|
|||
http://alphastand.win/alien/fre.php
|
|||
http://alphastand.trade/alien/fre.php
|
|||
45.133.1.20/oluwa/five/fre.php
|
|||
http://alphastand.top/alien/fre.php
|
|||
http://nsis.sf.net/NSIS_ErrorError
|
unknown
|
||
http://www.ibsensoftware.com/
|
unknown
|
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
45.133.1.20
|
unknown
|
Netherlands
|
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
9F0000
|
direct allocation
|
page read and write
|
||
400000
|
remote allocation
|
page execute and read and write
|
||
400000
|
remote allocation
|
page execute and read and write
|
||
400000
|
remote allocation
|
page execute and read and write
|
||
400000
|
remote allocation
|
page execute and read and write
|
||
400000
|
remote allocation
|
page execute and read and write
|
||
24FF000
|
direct allocation
|
page read and write
|
||
22FD1258000
|
heap
|
page read and write
|
||
630000
|
heap
|
page read and write
|
||
22FD1B00000
|
heap
|
page read and write
|
||
22FD6B00000
|
trusted library allocation
|
page read and write
|
||
650000
|
heap
|
page read and write
|
||
22FD19E0000
|
trusted library allocation
|
page read and write
|
||
1B948C7D000
|
heap
|
page read and write
|
||
22FD0FE0000
|
heap
|
page read and write
|
||
65A000
|
heap
|
page read and write
|
||
1A7B6B16000
|
heap
|
page read and write
|
||
68D000
|
heap
|
page read and write
|
||
25942802000
|
trusted library allocation
|
page read and write
|
||
22FD1B18000
|
heap
|
page read and write
|
||
1C0000
|
remote allocation
|
page read and write
|
||
22FD68A2000
|
heap
|
page read and write
|
||
22FD67E0000
|
trusted library allocation
|
page read and write
|
||
6B0000
|
heap
|
page read and write
|
||
1A7B7802000
|
heap
|
page read and write
|
||
22FD6A24000
|
trusted library allocation
|
page read and write
|
||
1A7B6A29000
|
heap
|
page read and write
|
||
D45D97F000
|
stack
|
page read and write
|
||
688000
|
heap
|
page read and write
|
||
2B692960000
|
heap
|
page read and write
|
||
2366000
|
direct allocation
|
page read and write
|
||
1B948C7C000
|
heap
|
page read and write
|
||
22FD1B59000
|
heap
|
page read and write
|
||
1AAD8D02000
|
heap
|
page read and write
|
||
24FF000
|
direct allocation
|
page read and write
|
||
22FD22C0000
|
trusted library section
|
page readonly
|
||
1B948C13000
|
heap
|
page read and write
|
||
22FD2660000
|
trusted library allocation
|
page read and write
|
||
68E000
|
heap
|
page read and write
|
||
AC094FB000
|
stack
|
page read and write
|
||
3312E77000
|
stack
|
page read and write
|
||
1C0000
|
remote allocation
|
page read and write
|
||
EBE10FE000
|
stack
|
page read and write
|
||
24FB000
|
direct allocation
|
page read and write
|
||
1A7B6A27000
|
heap
|
page read and write
|
||
4F5000
|
heap
|
page read and write
|
||
22FD1B59000
|
heap
|
page read and write
|
||
1A7B739A000
|
heap
|
page read and write
|
||
1A7B6A3C000
|
heap
|
page read and write
|
||
24FF000
|
direct allocation
|
page read and write
|
||
2B693810000
|
trusted library allocation
|
page read and write
|
||
1A7B6AB4000
|
heap
|
page read and write
|
||
1A7B73D5000
|
heap
|
page read and write
|
||
1A7B7862000
|
heap
|
page read and write
|
||
3312FFF000
|
unkown
|
page read and write
|
||
D45D8FF000
|
stack
|
page read and write
|
||
258F000
|
stack
|
page read and write
|
||
1FEEECF0000
|
heap
|
page read and write
|
||
1A7B73C4000
|
heap
|
page read and write
|
||
1A7B7388000
|
heap
|
page read and write
|
||
425000
|
unkown
|
page read and write
|
||
400000
|
unkown
|
page readonly
|
||
24FB000
|
direct allocation
|
page read and write
|
||
1FEEEDBF000
|
heap
|
page read and write
|
||
1A7B738F000
|
heap
|
page read and write
|
||
1A7B7803000
|
heap
|
page read and write
|
||
22FD0FD0000
|
heap
|
page read and write
|
||
1A7B7300000
|
heap
|
page read and write
|
||
9D000
|
stack
|
page read and write
|
||
24FB000
|
direct allocation
|
page read and write
|
||
22FD22F0000
|
trusted library section
|
page readonly
|
||
23E0000
|
direct allocation
|
page read and write
|
||
22FD1213000
|
heap
|
page read and write
|
||
402000
|
unkown
|
page readonly
|
||
1A7B7398000
|
heap
|
page read and write
|
||
1A7B7802000
|
heap
|
page read and write
|
||
43B000
|
unkown
|
page readonly
|
||
1AAD8C4B000
|
heap
|
page read and write
|
||
24FB000
|
direct allocation
|
page read and write
|
||
9E0000
|
direct allocation
|
page execute and read and write
|
||
1B948C3C000
|
heap
|
page read and write
|
||
1A7B6860000
|
heap
|
page read and write
|
||
6E1000
|
heap
|
page read and write
|
||
22FD6814000
|
heap
|
page read and write
|
||
25941F00000
|
heap
|
page read and write
|
||
1FEEEDB5000
|
heap
|
page read and write
|
||
4088E7F000
|
stack
|
page read and write
|
||
1A7B71E0000
|
remote allocation
|
page read and write
|
||
25941E79000
|
heap
|
page read and write
|
||
427000
|
unkown
|
page read and write
|
||
1A7B6ABE000
|
heap
|
page read and write
|
||
28E0000
|
heap
|
page read and write
|
||
1AAD8D13000
|
heap
|
page read and write
|
||
22FD6804000
|
trusted library allocation
|
page read and write
|
||
9CE000
|
stack
|
page read and write
|
||
2B692AC0000
|
trusted library allocation
|
page read and write
|
||
EBE1279000
|
stack
|
page read and write
|
||
22FD1200000
|
heap
|
page read and write
|
||
25941D50000
|
heap
|
page read and write
|
||
22FD1226000
|
heap
|
page read and write
|
||
3312C78000
|
stack
|
page read and write
|
||
1A7B6AEF000
|
heap
|
page read and write
|
||
404000
|
unkown
|
page readonly
|
||
1A7B7382000
|
heap
|
page read and write
|
||
24FF000
|
direct allocation
|
page read and write
|
||
4A0000
|
remote allocation
|
page execute and read and write
|
||
628000
|
heap
|
page read and write
|
||
22FD123D000
|
heap
|
page read and write
|
||
1A7B7392000
|
heap
|
page read and write
|
||
D45D3FA000
|
stack
|
page read and write
|
||
22FD67E8000
|
trusted library allocation
|
page read and write
|
||
19A000
|
stack
|
page read and write
|
||
435000
|
unkown
|
page read and write
|
||
1A7B73B0000
|
heap
|
page read and write
|
||
624000
|
heap
|
page read and write
|
||
55AF47F000
|
stack
|
page read and write
|
||
624000
|
heap
|
page read and write
|
||
1AAD8C78000
|
heap
|
page read and write
|
||
1B948C5A000
|
heap
|
page read and write
|
||
1A7B73B0000
|
heap
|
page read and write
|
||
22FD6850000
|
heap
|
page read and write
|
||
22FD19F0000
|
trusted library allocation
|
page read and write
|
||
25941E3F000
|
heap
|
page read and write
|
||
28DF000
|
stack
|
page read and write
|
||
601000
|
heap
|
page read and write
|
||
1A7B73A0000
|
heap
|
page read and write
|
||
400000
|
remote allocation
|
page execute and read and write
|
||
22FD68F3000
|
heap
|
page read and write
|
||
5FE000
|
heap
|
page read and write
|
||
1FEEEDCE000
|
heap
|
page read and write
|
||
22FD1273000
|
heap
|
page read and write
|
||
1A7B73A0000
|
heap
|
page read and write
|
||
1C0000
|
remote allocation
|
page read and write
|
||
2366000
|
direct allocation
|
page read and write
|
||
4088C77000
|
stack
|
page read and write
|
||
1FEEEDA2000
|
heap
|
page read and write
|
||
1A7B73A9000
|
heap
|
page read and write
|
||
22FD6800000
|
heap
|
page read and write
|
||
D45D77E000
|
stack
|
page read and write
|
||
1AAD8C4E000
|
heap
|
page read and write
|
||
1C0000
|
remote allocation
|
page read and write
|
||
2B6935B0000
|
trusted library allocation
|
page read and write
|
||
402000
|
unkown
|
page readonly
|
||
1C0000
|
remote allocation
|
page read and write
|
||
22FD2310000
|
trusted library section
|
page readonly
|
||
1A7B7388000
|
heap
|
page read and write
|
||
2B693870000
|
trusted library allocation
|
page read and write
|
||
24FB000
|
direct allocation
|
page read and write
|
||
22FD6A20000
|
trusted library allocation
|
page read and write
|
||
1A7B738A000
|
heap
|
page read and write
|
||
22FD6900000
|
heap
|
page read and write
|
||
22FD6B20000
|
trusted library allocation
|
page read and write
|
||
1A7B6AE3000
|
heap
|
page read and write
|
||
400000
|
unkown
|
page readonly
|
||
22FD1140000
|
trusted library allocation
|
page read and write
|
||
1AAD8C3C000
|
heap
|
page read and write
|
||
D45D9FF000
|
stack
|
page read and write
|
||
1FEEEDA7000
|
heap
|
page read and write
|
||
1FEEEDCD000
|
heap
|
page read and write
|
||
9AF000
|
stack
|
page read and write
|
||
22FD6B40000
|
remote allocation
|
page read and write
|
||
1AAD8C13000
|
heap
|
page read and write
|
||
1A7B7360000
|
heap
|
page read and write
|
||
55AF4FF000
|
stack
|
page read and write
|
||
2330000
|
heap
|
page read and write
|
||
2B692A07000
|
heap
|
page read and write
|
||
2B692760000
|
heap
|
page read and write
|
||
1A7B6AEC000
|
heap
|
page read and write
|
||
22FD1295000
|
heap
|
page read and write
|
||
1C0000
|
remote allocation
|
page read and write
|
||
2B6929C0000
|
heap
|
page read and write
|
||
1C0000
|
remote allocation
|
page read and write
|
||
1FEEEDBF000
|
heap
|
page read and write
|
||
414000
|
unkown
|
page read and write
|
||
EBE117E000
|
stack
|
page read and write
|
||
1A7B6B13000
|
heap
|
page read and write
|
||
1A7B739B000
|
heap
|
page read and write
|
||
401000
|
unkown
|
page execute read
|
||
22FD6B40000
|
remote allocation
|
page read and write
|
||
1A7B7396000
|
heap
|
page read and write
|
||
1B948D00000
|
heap
|
page read and write
|
||
1AAD8D26000
|
heap
|
page read and write
|
||
22FD68F7000
|
heap
|
page read and write
|
||
2366000
|
direct allocation
|
page read and write
|
||
33127CF000
|
stack
|
page read and write
|
||
AA0000
|
heap
|
page read and write
|
||
1B948B80000
|
trusted library allocation
|
page read and write
|
||
4088D7E000
|
stack
|
page read and write
|
||
22FD66D0000
|
trusted library allocation
|
page read and write
|
||
25941CF0000
|
heap
|
page read and write
|
||
22FD68DA000
|
heap
|
page read and write
|
||
24FB000
|
direct allocation
|
page read and write
|
||
BE0000
|
heap
|
page read and write
|
||
AC0977E000
|
stack
|
page read and write
|
||
25DE000
|
stack
|
page read and write
|
||
78E000
|
stack
|
page read and write
|
||
1FEEEC90000
|
heap
|
page read and write
|
||
1A7B6A4B000
|
heap
|
page read and write
|
||
1A7B7388000
|
heap
|
page read and write
|
||
1A7B73A0000
|
heap
|
page read and write
|
||
408000
|
unkown
|
page readonly
|
||
22FD6A10000
|
trusted library allocation
|
page read and write
|
||
24FF000
|
direct allocation
|
page read and write
|
||
EBE107B000
|
stack
|
page read and write
|
||
402000
|
unkown
|
page readonly
|
||
1A7B7802000
|
heap
|
page read and write
|
||
670000
|
direct allocation
|
page read and write
|
||
EBE11FF000
|
stack
|
page read and write
|
||
2B6937F0000
|
trusted library allocation
|
page read and write
|
||
2366000
|
direct allocation
|
page read and write
|
||
25941E00000
|
heap
|
page read and write
|
||
22FD6822000
|
heap
|
page read and write
|
||
25941E53000
|
heap
|
page read and write
|
||
784FA7E000
|
stack
|
page read and write
|
||
1A7B6B08000
|
heap
|
page read and write
|
||
408897E000
|
stack
|
page read and write
|
||
1AAD8B90000
|
trusted library allocation
|
page read and write
|
||
8CE000
|
stack
|
page read and write
|
||
43B000
|
unkown
|
page readonly
|
||
22FD21E0000
|
trusted library allocation
|
page read and write
|
||
1A7B73D5000
|
heap
|
page read and write
|
||
33130FA000
|
stack
|
page read and write
|
||
1AAD8C5C000
|
heap
|
page read and write
|
||
22FD1313000
|
heap
|
page read and write
|
||
6AE000
|
stack
|
page read and write
|
||
401000
|
unkown
|
page execute read
|
||
22FD682F000
|
heap
|
page read and write
|
||
1B948D13000
|
heap
|
page read and write
|
||
401000
|
unkown
|
page execute read
|
||
650000
|
heap
|
page read and write
|
||
25941F02000
|
heap
|
page read and write
|
||
402000
|
unkown
|
page readonly
|
||
401000
|
unkown
|
page execute read
|
||
3312D78000
|
stack
|
page read and write
|
||
22FD1A00000
|
heap
|
page read and write
|
||
784F76C000
|
stack
|
page read and write
|
||
1AAD8C00000
|
heap
|
page read and write
|
||
4F0000
|
heap
|
page read and write
|
||
2366000
|
direct allocation
|
page read and write
|
||
2B693820000
|
trusted library allocation
|
page read and write
|
||
1A7B7394000
|
heap
|
page read and write
|
||
22FD128B000
|
heap
|
page read and write
|
||
9B000
|
stack
|
page read and write
|
||
22FD12A2000
|
heap
|
page read and write
|
||
25941CE0000
|
heap
|
page read and write
|
||
2B6929F0000
|
heap
|
page read and write
|
||
1A7B68D0000
|
heap
|
page read and write
|
||
1A7B6AF8000
|
heap
|
page read and write
|
||
4A0000
|
remote allocation
|
page execute and read and write
|
||
22FD6A00000
|
trusted library allocation
|
page read and write
|
||
24FF000
|
direct allocation
|
page read and write
|
||
1B948C73000
|
heap
|
page read and write
|
||
19B000
|
stack
|
page read and write
|
||
8DF000
|
stack
|
page read and write
|
||
40A000
|
unkown
|
page write copy
|
||
2366000
|
direct allocation
|
page read and write
|
||
22FD1A15000
|
heap
|
page read and write
|
||
D45D1F7000
|
stack
|
page read and write
|
||
5E0000
|
heap
|
page read and write
|
||
1FEEEDA7000
|
heap
|
page read and write
|
||
24FF000
|
direct allocation
|
page read and write
|
||
2250000
|
direct allocation
|
page read and write
|
||
55AF67C000
|
stack
|
page read and write
|
||
1A7B739E000
|
heap
|
page read and write
|
||
1B948D08000
|
heap
|
page read and write
|
||
29E8000
|
trusted library allocation
|
page read and write
|
||
1A7B6A8C000
|
heap
|
page read and write
|
||
22FD1B02000
|
heap
|
page read and write
|
||
4088B7B000
|
stack
|
page read and write
|
||
1AAD8B00000
|
heap
|
page read and write
|
||
1AAD8C82000
|
heap
|
page read and write
|
||
688000
|
heap
|
page read and write
|
||
D45D7FE000
|
stack
|
page read and write
|
||
401000
|
unkown
|
page execute read
|
||
1B948D02000
|
heap
|
page read and write
|
||
25941E28000
|
heap
|
page read and write
|
||
2250000
|
direct allocation
|
page read and write
|
||
2366000
|
direct allocation
|
page read and write
|
||
1A7B736F000
|
heap
|
page read and write
|
||
1A7B7394000
|
heap
|
page read and write
|
||
22FD1276000
|
heap
|
page read and write
|
||
1B948C00000
|
heap
|
page read and write
|
||
227E000
|
stack
|
page read and write
|
||
2B692950000
|
trusted library allocation
|
page read and write
|
||
677000
|
direct allocation
|
page read and write
|
||
22FD2300000
|
trusted library section
|
page readonly
|
||
4B0000
|
heap
|
page read and write
|
||
4EE000
|
stack
|
page read and write
|
||
404000
|
unkown
|
page readonly
|
||
1A7B7802000
|
heap
|
page read and write
|
||
223E000
|
stack
|
page read and write
|
||
1AAD8C29000
|
heap
|
page read and write
|
||
22FD22E0000
|
trusted library section
|
page readonly
|
||
1A7B6A4A000
|
heap
|
page read and write
|
||
1A7B7802000
|
heap
|
page read and write
|
||
22FD6A10000
|
trusted library allocation
|
page read and write
|
||
1A7B736F000
|
heap
|
page read and write
|
||
784FC7B000
|
stack
|
page read and write
|
||
30000
|
heap
|
page read and write
|
||
5CE000
|
stack
|
page read and write
|
||
1A7B7202000
|
heap
|
page read and write
|
||
1B948AE0000
|
heap
|
page read and write
|
||
D45D4FF000
|
stack
|
page read and write
|
||
2B692940000
|
trusted library allocation
|
page read and write
|
||
2B692930000
|
trusted library allocation
|
page read and write
|
||
24FF000
|
direct allocation
|
page read and write
|
||
1B949602000
|
trusted library allocation
|
page read and write
|
||
7B0000
|
heap
|
page read and write
|
||
1FEEF125000
|
heap
|
page read and write
|
||
404000
|
unkown
|
page readonly
|
||
AC08FAB000
|
stack
|
page read and write
|
||
3312B7E000
|
stack
|
page read and write
|
||
5E7000
|
heap
|
page read and write
|
||
1AAD8C53000
|
heap
|
page read and write
|
||
22FD12B0000
|
heap
|
page read and write
|
||
402000
|
unkown
|
page readonly
|
||
2366000
|
direct allocation
|
page read and write
|
||
22FD68F2000
|
heap
|
page read and write
|
||
2B693800000
|
heap
|
page readonly
|
||
1A7B735E000
|
heap
|
page read and write
|
||
25941E6F000
|
heap
|
page read and write
|
||
1C0000
|
remote allocation
|
page read and write
|
||
D45D2F9000
|
stack
|
page read and write
|
||
22FD6856000
|
heap
|
page read and write
|
||
22FD19B1000
|
trusted library allocation
|
page read and write
|
||
3312AFB000
|
stack
|
page read and write
|
||
1FEEEDB8000
|
heap
|
page read and write
|
||
1A7B739A000
|
heap
|
page read and write
|
||
30000
|
heap
|
page read and write
|
||
2250000
|
direct allocation
|
page read and write
|
||
1A7B6A00000
|
heap
|
page read and write
|
||
22FD66C0000
|
trusted library allocation
|
page read and write
|
||
22FD12FF000
|
heap
|
page read and write
|
||
63D000
|
stack
|
page read and write
|
||
1A7B7802000
|
heap
|
page read and write
|
||
61B000
|
heap
|
page read and write
|
||
22FD67EE000
|
trusted library allocation
|
page read and write
|
||
D45CDEB000
|
stack
|
page read and write
|
||
22FD1302000
|
heap
|
page read and write
|
||
22FD1040000
|
heap
|
page read and write
|
||
AC095FB000
|
stack
|
page read and write
|
||
404000
|
unkown
|
page readonly
|
||
1A7B7360000
|
heap
|
page read and write
|
||
33126CB000
|
stack
|
page read and write
|
||
408000
|
unkown
|
page readonly
|
||
4E0000
|
heap
|
page read and write
|
||
4F0000
|
trusted library allocation
|
page read and write
|
||
22FD67E0000
|
trusted library allocation
|
page read and write
|
||
2B6929C7000
|
heap
|
page read and write
|
||
1A7B7392000
|
heap
|
page read and write
|
||
23E0000
|
direct allocation
|
page read and write
|
||
1A7B734C000
|
heap
|
page read and write
|
||
1A7B71E0000
|
remote allocation
|
page read and write
|
||
1A7B73A0000
|
heap
|
page read and write
|
||
22FD68F7000
|
heap
|
page read and write
|
||
1A7B7394000
|
heap
|
page read and write
|
||
22FD12A8000
|
heap
|
page read and write
|
||
D45D87F000
|
stack
|
page read and write
|
||
2250000
|
direct allocation
|
page read and write
|
||
688000
|
heap
|
page read and write
|
||
1FEEF120000
|
heap
|
page read and write
|
||
22FD1229000
|
heap
|
page read and write
|
||
1A7B6B02000
|
heap
|
page read and write
|
||
627000
|
heap
|
page read and write
|
||
22FD126D000
|
heap
|
page read and write
|
||
23E0000
|
direct allocation
|
page read and write
|
||
EBE12F9000
|
stack
|
page read and write
|
||
784FFFF000
|
stack
|
page read and write
|
||
1A7B7398000
|
heap
|
page read and write
|
||
22FD68EF000
|
heap
|
page read and write
|
||
1A7B7398000
|
heap
|
page read and write
|
||
55AF1FF000
|
stack
|
page read and write
|
||
1A7B7382000
|
heap
|
page read and write
|
||
400000
|
unkown
|
page readonly
|
||
1A7B7394000
|
heap
|
page read and write
|
||
7C0000
|
heap
|
page read and write
|
||
2B692A0F000
|
heap
|
page read and write
|
||
1A7B739A000
|
heap
|
page read and write
|
||
1FEEEDBF000
|
heap
|
page read and write
|
||
2250000
|
direct allocation
|
page read and write
|
||
1A7B69D0000
|
trusted library allocation
|
page read and write
|
||
1A7B6AAA000
|
heap
|
page read and write
|
||
22FD6930000
|
trusted library allocation
|
page read and write
|
||
22FD1A02000
|
heap
|
page read and write
|
||
1A7B7802000
|
heap
|
page read and write
|
||
23E0000
|
direct allocation
|
page read and write
|
||
27DF000
|
stack
|
page read and write
|
||
1AAD8D08000
|
heap
|
page read and write
|
||
1B948C88000
|
heap
|
page read and write
|
||
400000
|
remote allocation
|
page execute and read and write
|
||
22FD1290000
|
heap
|
page read and write
|
||
784FEFE000
|
stack
|
page read and write
|
||
22FD68F5000
|
heap
|
page read and write
|
||
23E0000
|
direct allocation
|
page read and write
|
||
1A7B7388000
|
heap
|
page read and write
|
||
1A7B7360000
|
heap
|
page read and write
|
||
408887B000
|
stack
|
page read and write
|
||
1B948AF0000
|
heap
|
page read and write
|
||
88E000
|
stack
|
page read and write
|
||
627000
|
heap
|
page read and write
|
||
25941E13000
|
heap
|
page read and write
|
||
2B692770000
|
trusted library allocation
|
page read and write
|
||
22FD6AF0000
|
trusted library allocation
|
page read and write
|
||
1A7B7310000
|
heap
|
page read and write
|
||
24FB000
|
direct allocation
|
page read and write
|
||
2250000
|
direct allocation
|
page read and write
|
||
1A7B6870000
|
heap
|
page read and write
|
||
437000
|
unkown
|
page read and write
|
||
1FEEED10000
|
heap
|
page read and write
|
||
BB0000
|
heap
|
page read and write
|
||
22FD6863000
|
heap
|
page read and write
|
||
1B948C62000
|
heap
|
page read and write
|
||
2B6928A0000
|
heap
|
page read and write
|
||
400000
|
unkown
|
page readonly
|
||
55AF17A000
|
stack
|
page read and write
|
||
A1F000
|
stack
|
page read and write
|
||
AC0927E000
|
stack
|
page read and write
|
||
23E0000
|
direct allocation
|
page read and write
|
||
401000
|
unkown
|
page execute read
|
||
2B692A0F000
|
heap
|
page read and write
|
||
1A7B73AB000
|
heap
|
page read and write
|
||
1A7B6A70000
|
heap
|
page read and write
|
||
22FD6940000
|
trusted library allocation
|
page read and write
|
||
7DF000
|
stack
|
page read and write
|
||
1FEEED9B000
|
heap
|
page read and write
|
||
1A7B7324000
|
heap
|
page read and write
|
||
2390000
|
heap
|
page read and write
|
||
1B948C60000
|
heap
|
page read and write
|
||
D45D6FB000
|
stack
|
page read and write
|
||
61B000
|
heap
|
page read and write
|
||
401000
|
unkown
|
page execute read
|
||
1AAD8D00000
|
heap
|
page read and write
|
||
24FB000
|
direct allocation
|
page read and write
|
||
401000
|
unkown
|
page execute read
|
||
25941E02000
|
heap
|
page read and write
|
||
22FD6801000
|
trusted library allocation
|
page read and write
|
||
1A7B7394000
|
heap
|
page read and write
|
||
1A7B7394000
|
heap
|
page read and write
|
||
2B692965000
|
heap
|
page read and write
|
||
670000
|
direct allocation
|
page read and write
|
||
2B692A0F000
|
heap
|
page read and write
|
||
1A7B7800000
|
heap
|
page read and write
|
||
2B6928C0000
|
heap
|
page read and write
|
||
1A7B735D000
|
heap
|
page read and write
|
||
22FD22D0000
|
trusted library section
|
page readonly
|
||
1FEEEDB7000
|
heap
|
page read and write
|
||
1B948C55000
|
heap
|
page read and write
|
||
4A0000
|
remote allocation
|
page execute and read and write
|
||
1AAD8C5C000
|
heap
|
page read and write
|
||
1AAD9602000
|
trusted library allocation
|
page read and write
|
||
1A7B6AC5000
|
heap
|
page read and write
|
||
784F7EE000
|
stack
|
page read and write
|
||
22FD68F7000
|
heap
|
page read and write
|
||
4B5000
|
heap
|
page read and write
|
||
400000
|
unkown
|
page readonly
|
||
25941F13000
|
heap
|
page read and write
|
||
1A7B738A000
|
heap
|
page read and write
|
||
331274E000
|
stack
|
page read and write
|
||
784FCFE000
|
stack
|
page read and write
|
||
400000
|
unkown
|
page readonly
|
||
1A7B6AAB000
|
heap
|
page read and write
|
||
2250000
|
direct allocation
|
page read and write
|
||
1AAD8C48000
|
heap
|
page read and write
|
||
22FD1150000
|
trusted library section
|
page read and write
|
||
1A7B7362000
|
heap
|
page read and write
|
||
22FD6902000
|
heap
|
page read and write
|
||
1AAD8B60000
|
heap
|
page read and write
|
||
91E000
|
stack
|
page read and write
|
||
3312F7F000
|
stack
|
page read and write
|
||
19C000
|
stack
|
page read and write
|
||
1A7B73C1000
|
heap
|
page read and write
|
||
480000
|
trusted library allocation
|
page read and write
|
||
22FD689F000
|
heap
|
page read and write
|
||
EBE137F000
|
stack
|
page read and write
|
||
1A7B7821000
|
heap
|
page read and write
|
||
1A7B738F000
|
heap
|
page read and write
|
||
1FEEEDB3000
|
heap
|
page read and write
|
||
1A7B6AEF000
|
heap
|
page read and write
|
||
1A7B6A13000
|
heap
|
page read and write
|
||
D45D5FA000
|
stack
|
page read and write
|
||
25941D80000
|
trusted library allocation
|
page read and write
|
||
22FD68F8000
|
heap
|
page read and write
|
||
23E0000
|
direct allocation
|
page read and write
|
||
2250000
|
direct allocation
|
page read and write
|
||
22FD1B18000
|
heap
|
page read and write
|
||
1C0000
|
remote allocation
|
page read and write
|
||
1AAD8AF0000
|
heap
|
page read and write
|
||
1A7B7388000
|
heap
|
page read and write
|
||
22FD6843000
|
heap
|
page read and write
|
||
40888FD000
|
stack
|
page read and write
|
||
1A7B7388000
|
heap
|
page read and write
|
||
1A7B6A4D000
|
heap
|
page read and write
|
||
AC0987B000
|
stack
|
page read and write
|
||
400000
|
unkown
|
page readonly
|
||
30000
|
heap
|
page read and write
|
||
1A7B738A000
|
heap
|
page read and write
|
||
22FD68EB000
|
heap
|
page read and write
|
||
1A7B6A85000
|
heap
|
page read and write
|
||
404000
|
unkown
|
page readonly
|
||
26DF000
|
stack
|
page read and write
|
||
1C0000
|
remote allocation
|
page read and write
|
||
1B948B50000
|
heap
|
page read and write
|
||
1A7B71E0000
|
remote allocation
|
page read and write
|
||
22FD19D3000
|
trusted library allocation
|
page read and write
|
||
400000
|
unkown
|
page readonly
|
||
22FD68FB000
|
heap
|
page read and write
|
||
1B948C29000
|
heap
|
page read and write
|
||
22FD68F1000
|
heap
|
page read and write
|
||
40C000
|
unkown
|
page read and write
|
||
1B948C5E000
|
heap
|
page read and write
|
||
22FD12BC000
|
heap
|
page read and write
|
||
23E0000
|
direct allocation
|
page read and write
|
||
1A7B7394000
|
heap
|
page read and write
|
||
1A7B7394000
|
heap
|
page read and write
|
||
1B948C5C000
|
heap
|
page read and write
|
||
1A7B7383000
|
heap
|
page read and write
|
||
40A000
|
unkown
|
page read and write
|
||
22FD6B40000
|
remote allocation
|
page read and write
|
||
1A7B7313000
|
heap
|
page read and write
|
||
1A7B7398000
|
heap
|
page read and write
|
||
22FD19D0000
|
trusted library allocation
|
page read and write
|
||
1A7B73AB000
|
heap
|
page read and write
|
||
D45DBFF000
|
stack
|
page read and write
|
||
1A7B7388000
|
heap
|
page read and write
|
||
55AF579000
|
stack
|
page read and write
|
||
784FDF7000
|
stack
|
page read and write
|
||
9D000
|
stack
|
page read and write
|
||
2B692969000
|
heap
|
page read and write
|
||
688000
|
heap
|
page read and write
|
||
53E000
|
stack
|
page read and write
|
||
1A7B6ADB000
|
heap
|
page read and write
|
||
402000
|
unkown
|
page readonly
|
||
404000
|
unkown
|
page readonly
|
||
22FD1B13000
|
heap
|
page read and write
|
||
1AAD8C71000
|
heap
|
page read and write
|
||
55AF5FE000
|
stack
|
page read and write
|
||
22FD6AB0000
|
trusted library allocation
|
page read and write
|
||
1FEEED90000
|
heap
|
page read and write
|
||
610000
|
trusted library allocation
|
page read and write
|
||
1A7B738F000
|
heap
|
page read and write
|
||
6B8000
|
heap
|
page read and write
|
||
EBE13F9000
|
stack
|
page read and write
|
||
47E000
|
stack
|
page read and write
|
||
22FD6B10000
|
trusted library allocation
|
page read and write
|
There are 534 hidden memdumps, click here to show them.