Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
HHGHJJUILn.exe
|
PE32+ executable (GUI) x86-64 Mono/.Net assembly, for MS Windows
|
initial sample
|
||
C:\Users\Public\vbsqlite3.dll
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows, UPX compressed
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\HHGHJJUILn.exe.log
|
CSV text
|
dropped
|
||
C:\Users\user\AppData\Roaming\A8EC33334FD0FF0355\LogvangVfuSkfsNcHkxYKVGcfUjjBLLTgabama
|
SQLite 3.x database, last written using SQLite version 3038005, page size 2048, file counter 3, database pages 45, cookie
0x3d, schema 4, UTF-8, version-valid-for 3
|
dropped
|
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\HHGHJJUILn.exe
|
C:\Users\user\Desktop\HHGHJJUILn.exe
|
||
C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe
|
C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe
|
||
C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe
|
C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe
|
||
C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe
|
C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe
|
||
C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe
|
C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe
|
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
https://ac.ecosia.org/autocomplete?q=
|
unknown
|
||
https://search.yahoo.com?fr=crmas_sfp
|
unknown
|
||
https://duckduckgo.com/chrome_newtab
|
unknown
|
||
http://schema.org
|
unknown
|
||
https://duckduckgo.com/ac/?q=
|
unknown
|
||
https://www.google.com/images/branding/product/ico/googleg_lodp.ico
|
unknown
|
||
https://api.telegram.org/bot
|
unknown
|
||
https://showip.net/
|
unknown
|
||
https://www.openstreetmap.org/copyright
|
unknown
|
||
https://unpkg.com/leaflet
|
unknown
|
||
https://search.yahoo.com?fr=crmas_sfpf
|
unknown
|
||
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
|
unknown
|
||
https://search.yahoo.com/favicon.icohttps://search.yahoo.com/search
|
unknown
|
||
http://www.maxmind.com
|
unknown
|
||
https://showip.net/?checkip=
|
unknown
|
||
https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
|
unknown
|
||
https://search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas_sfp&command=
|
unknown
|
||
http://showip.net/
|
162.55.60.2
|
There are 8 hidden URLs, click here to show them.
Domains
Name
|
IP
|
Malicious
|
|
---|---|---|---|
showip.net
|
162.55.60.2
|
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
162.55.60.2
|
showip.net
|
United States
|
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
401000
|
remote allocation
|
page execute and read and write
|
||
252D012D000
|
trusted library allocation
|
page read and write
|
||
2BD49C3D000
|
heap
|
page read and write
|
||
1BA9E04E000
|
heap
|
page read and write
|
||
1DE6D590000
|
heap
|
page read and write
|
||
1BA9E042000
|
heap
|
page read and write
|
||
252BE0F0000
|
trusted library allocation
|
page read and write
|
||
1DE6E002000
|
heap
|
page read and write
|
||
69D4000
|
heap
|
page read and write
|
||
252BE030000
|
heap
|
page read and write
|
||
252BE0F0000
|
trusted library allocation
|
page read and write
|
||
25DD0402000
|
heap
|
page read and write
|
||
2BD49C00000
|
heap
|
page read and write
|
||
777E000
|
stack
|
page read and write
|
||
1BA9E030000
|
heap
|
page read and write
|
||
252BF9A1000
|
trusted library allocation
|
page read and write
|
||
27A3E150000
|
heap
|
page read and write
|
||
1DE6D896000
|
heap
|
page read and write
|
||
252BDC30000
|
unkown
|
page readonly
|
||
252BE120000
|
trusted library allocation
|
page read and write
|
||
B81B97B000
|
stack
|
page read and write
|
||
27A3E2CB000
|
heap
|
page read and write
|
||
1BA9E02D000
|
heap
|
page read and write
|
||
23277C45000
|
heap
|
page read and write
|
||
1DE6E1C8000
|
heap
|
page read and write
|
||
69A9B7F000
|
stack
|
page read and write
|
||
B74DC7D000
|
stack
|
page read and write
|
||
508F000
|
heap
|
page read and write
|
||
252BE0D0000
|
trusted library section
|
page read and write
|
||
50A3000
|
heap
|
page read and write
|
||
252D0003000
|
trusted library allocation
|
page read and write
|
||
252BE080000
|
trusted library allocation
|
page read and write
|
||
27A3E245000
|
heap
|
page read and write
|
||
507C000
|
heap
|
page read and write
|
||
252BE105000
|
heap
|
page read and write
|
||
54618FE000
|
stack
|
page read and write
|
||
C55487F000
|
stack
|
page read and write
|
||
1DE6E223000
|
heap
|
page read and write
|
||
23277C3A000
|
heap
|
page read and write
|
||
25DD0240000
|
heap
|
page read and write
|
||
69A99FB000
|
stack
|
page read and write
|
||
252BE0E0000
|
trusted library allocation
|
page read and write
|
||
6FA000
|
stack
|
page read and write
|
||
508F000
|
heap
|
page read and write
|
||
5091000
|
heap
|
page read and write
|
||
252BE0E0000
|
trusted library allocation
|
page read and write
|
||
252BDF9A000
|
heap
|
page read and write
|
||
B81BD7F000
|
stack
|
page read and write
|
||
74FD000
|
stack
|
page read and write
|
||
4FFA000
|
heap
|
page read and write
|
||
1DE6E102000
|
heap
|
page read and write
|
||
1BA9E057000
|
heap
|
page read and write
|
||
27A3E302000
|
heap
|
page read and write
|
||
1DE6D5A0000
|
heap
|
page read and write
|
||
5A0000
|
remote allocation
|
page read and write
|
||
27A3E2BD000
|
heap
|
page read and write
|
||
7FFDC86C2000
|
trusted library allocation
|
page read and write
|
||
252BE0E0000
|
trusted library allocation
|
page read and write
|
||
5461FFE000
|
stack
|
page read and write
|
||
1BA9E074000
|
heap
|
page read and write
|
||
50B8000
|
heap
|
page read and write
|
||
252BE130000
|
trusted library allocation
|
page read and write
|
||
43F000
|
remote allocation
|
page execute and read and write
|
||
23277C3C000
|
heap
|
page read and write
|
||
C553F6C000
|
stack
|
page read and write
|
||
4FE7000
|
heap
|
page read and write
|
||
2BD49C5A000
|
heap
|
page read and write
|
||
1BA9E07B000
|
heap
|
page read and write
|
||
1BA9DE80000
|
heap
|
page read and write
|
||
C55467F000
|
stack
|
page read and write
|
||
1DE6D700000
|
trusted library allocation
|
page read and write
|
||
27A3ED39000
|
heap
|
page read and write
|
||
25DD043C000
|
heap
|
page read and write
|
||
5057000
|
heap
|
page read and write
|
||
6BC0000
|
heap
|
page read and write
|
||
1DE6D829000
|
heap
|
page read and write
|
||
226E8FE000
|
stack
|
page read and write
|
||
27A3ED13000
|
heap
|
page read and write
|
||
27A3E268000
|
heap
|
page read and write
|
||
1BA9E075000
|
heap
|
page read and write
|
||
2BD49D13000
|
heap
|
page read and write
|
||
400000
|
remote allocation
|
page execute and read and write
|
||
69A9C7A000
|
stack
|
page read and write
|
||
1DE6E200000
|
heap
|
page read and write
|
||
23277AE0000
|
heap
|
page read and write
|
||
C55457C000
|
stack
|
page read and write
|
||
C554A7F000
|
stack
|
page read and write
|
||
54620FF000
|
stack
|
page read and write
|
||
5085000
|
heap
|
page read and write
|
||
252CFB18000
|
trusted library allocation
|
page read and write
|
||
7FFDC87E0000
|
trusted library allocation
|
page execute and read and write
|
||
2BD49C02000
|
heap
|
page read and write
|
||
1DE6E230000
|
heap
|
page read and write
|
||
7FFDC86CD000
|
trusted library allocation
|
page execute and read and write
|
||
252BE0E0000
|
trusted library allocation
|
page read and write
|
||
1BA9E05A000
|
heap
|
page read and write
|
||
1DE6D600000
|
heap
|
page read and write
|
||
B81B7FC000
|
stack
|
page read and write
|
||
7FFDC870C000
|
trusted library allocation
|
page execute and read and write
|
||
1BA9E802000
|
trusted library allocation
|
page read and write
|
||
25DD03D0000
|
remote allocation
|
page read and write
|
||
1BA9E079000
|
heap
|
page read and write
|
||
252BDDBE000
|
unkown
|
page readonly
|
||
5461BFE000
|
stack
|
page read and write
|
||
252CF9A3000
|
trusted library allocation
|
page read and write
|
||
F4601FE000
|
stack
|
page read and write
|
||
50BC000
|
heap
|
page read and write
|
||
23277C4C000
|
heap
|
page read and write
|
||
252CFA81000
|
trusted library allocation
|
page read and write
|
||
252BDC32000
|
unkown
|
page readonly
|
||
508A000
|
heap
|
page read and write
|
||
680000
|
heap
|
page read and write
|
||
50C1000
|
heap
|
page read and write
|
||
69D0000
|
heap
|
page read and write
|
||
252CFF77000
|
trusted library allocation
|
page read and write
|
||
252CFC58000
|
trusted library allocation
|
page read and write
|
||
69A9F7F000
|
stack
|
page read and write
|
||
2BD49C29000
|
heap
|
page read and write
|
||
5087000
|
heap
|
page read and write
|
||
5461EFE000
|
stack
|
page read and write
|
||
50BC000
|
heap
|
page read and write
|
||
50BD000
|
heap
|
page read and write
|
||
252CFECA000
|
trusted library allocation
|
page read and write
|
||
252BE110000
|
trusted library allocation
|
page read and write
|
||
6A49000
|
heap
|
page read and write
|
||
252D00AB000
|
trusted library allocation
|
page read and write
|
||
226EB7F000
|
stack
|
page read and write
|
||
252BDC30000
|
unkown
|
page readonly
|
||
7A10000
|
trusted library allocation
|
page read and write
|
||
252BE0E0000
|
trusted library allocation
|
page read and write
|
||
2BD4A402000
|
trusted library allocation
|
page read and write
|
||
25DD0413000
|
heap
|
page read and write
|
||
763E000
|
stack
|
page read and write
|
||
23278402000
|
trusted library allocation
|
page read and write
|
||
25DD0230000
|
heap
|
page read and write
|
||
252BDF3C000
|
heap
|
page read and write
|
||
690000
|
trusted library allocation
|
page readonly
|
||
7FFDC86B4000
|
trusted library allocation
|
page read and write
|
||
1DE6E197000
|
heap
|
page read and write
|
||
226EC7E000
|
stack
|
page read and write
|
||
1BA9E05F000
|
heap
|
page read and write
|
||
B81B77F000
|
stack
|
page read and write
|
||
7FFDC86BD000
|
trusted library allocation
|
page execute and read and write
|
||
252CFBC9000
|
trusted library allocation
|
page read and write
|
||
252D8350000
|
heap
|
page execute and read and write
|
||
69A931C000
|
stack
|
page read and write
|
||
23277C29000
|
heap
|
page read and write
|
||
50B9000
|
heap
|
page read and write
|
||
252BDF59000
|
heap
|
page read and write
|
||
69A9E7C000
|
stack
|
page read and write
|
||
1DE6E1D3000
|
heap
|
page read and write
|
||
1BA9E03D000
|
heap
|
page read and write
|
||
7FFDC87D5000
|
trusted library allocation
|
page read and write
|
||
27A3E2CE000
|
heap
|
page read and write
|
||
252BE0F0000
|
trusted library allocation
|
page read and write
|
||
6AB6000
|
heap
|
page read and write
|
||
1DE6D843000
|
heap
|
page read and write
|
||
50AF000
|
heap
|
page read and write
|
||
23277C02000
|
heap
|
page read and write
|
||
F4600FE000
|
stack
|
page read and write
|
||
226E87E000
|
stack
|
page read and write
|
||
252BDDC0000
|
heap
|
page read and write
|
||
1DE6E154000
|
heap
|
page read and write
|
||
50B7000
|
heap
|
page read and write
|
||
7FFDC87D0000
|
trusted library allocation
|
page read and write
|
||
5461CFD000
|
stack
|
page read and write
|
||
1DE6E122000
|
heap
|
page read and write
|
||
1DE6D83C000
|
heap
|
page read and write
|
||
440000
|
remote allocation
|
page execute and read and write
|
||
25DD045C000
|
heap
|
page read and write
|
||
2BD49C8A000
|
heap
|
page read and write
|
||
252BDD15000
|
unkown
|
page readonly
|
||
1DE6D86A000
|
heap
|
page read and write
|
||
1BA9E065000
|
heap
|
page read and write
|
||
B81B08C000
|
stack
|
page read and write
|
||
C55437B000
|
stack
|
page read and write
|
||
787F000
|
stack
|
page read and write
|
||
50BA000
|
heap
|
page read and write
|
||
252BDF6C000
|
heap
|
page read and write
|
||
B74D57B000
|
stack
|
page read and write
|
||
B74D9FE000
|
stack
|
page read and write
|
||
1DE6D9B9000
|
heap
|
page read and write
|
||
1BA9E07E000
|
heap
|
page read and write
|
||
252BE0D0000
|
trusted library allocation
|
page read and write
|
||
1BA9E03B000
|
heap
|
page read and write
|
||
8A5000
|
heap
|
page read and write
|
||
1DE6E143000
|
heap
|
page read and write
|
||
6A2D000
|
stack
|
page read and write
|
||
1DE6E213000
|
heap
|
page read and write
|
||
1BA9E058000
|
heap
|
page read and write
|
||
252BE160000
|
trusted library allocation
|
page read and write
|
||
1DE6D865000
|
heap
|
page read and write
|
||
252CF9A5000
|
trusted library allocation
|
page read and write
|
||
252BE0E0000
|
trusted library allocation
|
page read and write
|
||
5461DFE000
|
stack
|
page read and write
|
||
25DD03D0000
|
remote allocation
|
page read and write
|
||
23277C26000
|
heap
|
page read and write
|
||
25DD0429000
|
heap
|
page read and write
|
||
1DE6D874000
|
heap
|
page read and write
|
||
23277D02000
|
heap
|
page read and write
|
||
B81BA7C000
|
stack
|
page read and write
|
||
6AC0000
|
trusted library allocation
|
page read and write
|
||
50BA000
|
heap
|
page read and write
|
||
2BD49C65000
|
heap
|
page read and write
|
||
252BE0B4000
|
trusted library allocation
|
page read and write
|
||
C554B7F000
|
stack
|
page read and write
|
||
4BF0000
|
trusted library allocation
|
page execute read
|
||
1BA9E07A000
|
heap
|
page read and write
|
||
5461AFF000
|
stack
|
page read and write
|
||
252CF9A1000
|
trusted library allocation
|
page read and write
|
||
1DE6E122000
|
heap
|
page read and write
|
||
252BDF98000
|
heap
|
page read and write
|
||
1DE6E1D0000
|
heap
|
page read and write
|
||
1BA9E035000
|
heap
|
page read and write
|
||
B81BB7E000
|
stack
|
page read and write
|
||
23277A90000
|
heap
|
page read and write
|
||
252BE120000
|
trusted library allocation
|
page read and write
|
||
C55497F000
|
stack
|
page read and write
|
||
50AF000
|
heap
|
page read and write
|
||
50BA000
|
heap
|
page read and write
|
||
1BA9E083000
|
heap
|
page read and write
|
||
252BE050000
|
heap
|
page read and write
|
||
2BD49A80000
|
heap
|
page read and write
|
||
1DE6D88A000
|
heap
|
page read and write
|
||
252BE100000
|
heap
|
page read and write
|
||
507A000
|
heap
|
page read and write
|
||
B81B8FD000
|
stack
|
page read and write
|
||
23277BE0000
|
trusted library allocation
|
page read and write
|
||
1BA9DEF0000
|
heap
|
page read and write
|
||
1DE6E100000
|
heap
|
page read and write
|
||
B81BC7C000
|
stack
|
page read and write
|
||
B81B4FC000
|
stack
|
page read and write
|
||
23277A80000
|
heap
|
page read and write
|
||
69C0000
|
trusted library allocation
|
page read and write
|
||
27A3E213000
|
heap
|
page read and write
|
||
50A8000
|
heap
|
page read and write
|
||
50BD000
|
heap
|
page read and write
|
||
1DE6D720000
|
trusted library allocation
|
page read and write
|
||
2BD49C65000
|
heap
|
page read and write
|
||
252D8363000
|
heap
|
page read and write
|
||
1DE6D9E5000
|
heap
|
page read and write
|
||
1BA9E063000
|
heap
|
page read and write
|
||
5085000
|
heap
|
page read and write
|
||
B74DB7E000
|
stack
|
page read and write
|
||
252BE0C0000
|
heap
|
page execute and read and write
|
||
F4602F9000
|
stack
|
page read and write
|
||
27A3E289000
|
heap
|
page read and write
|
||
50C4000
|
heap
|
page read and write
|
||
1DE6E227000
|
heap
|
page read and write
|
||
507C000
|
heap
|
page read and write
|
||
C554C7F000
|
stack
|
page read and write
|
||
25DD0400000
|
heap
|
page read and write
|
||
2BD49C6D000
|
heap
|
page read and write
|
||
7FFDC86DD000
|
trusted library allocation
|
page execute and read and write
|
||
1BA9E013000
|
heap
|
page read and write
|
||
7FFDC8770000
|
trusted library allocation
|
page execute and read and write
|
||
1BA9DFF0000
|
trusted library allocation
|
page read and write
|
||
50B0000
|
heap
|
page read and write
|
||
1DE6E171000
|
heap
|
page read and write
|
||
C55447E000
|
stack
|
page read and write
|
||
50C2000
|
heap
|
page read and write
|
||
2BD49D02000
|
heap
|
page read and write
|
||
79BF000
|
stack
|
page read and write
|
||
252BE0A0000
|
trusted library allocation
|
page read and write
|
||
50BD000
|
heap
|
page read and write
|
||
226E5BB000
|
stack
|
page read and write
|
||
1DE6D855000
|
heap
|
page read and write
|
||
252BE150000
|
trusted library allocation
|
page read and write
|
||
252CFD91000
|
trusted library allocation
|
page read and write
|
||
5059000
|
heap
|
page read and write
|
||
F45FA8B000
|
stack
|
page read and write
|
||
27A3EC02000
|
heap
|
page read and write
|
||
252BDD15000
|
unkown
|
page readonly
|
||
50A9000
|
heap
|
page read and write
|
||
F45FFFA000
|
stack
|
page read and write
|
||
252CF9A9000
|
trusted library allocation
|
page read and write
|
||
50CE000
|
heap
|
page read and write
|
||
27A3E0E0000
|
heap
|
page read and write
|
||
69A977B000
|
stack
|
page read and write
|
||
25DD03D0000
|
remote allocation
|
page read and write
|
||
890000
|
trusted library allocation
|
page read and write
|
||
1BA9E02E000
|
heap
|
page read and write
|
||
1BA9E035000
|
heap
|
page read and write
|
||
1DE6D85B000
|
heap
|
page read and write
|
||
69A0000
|
trusted library allocation
|
page read and write
|
||
252BE0E0000
|
trusted library allocation
|
page read and write
|
||
7FFDC86D0000
|
trusted library allocation
|
page read and write
|
||
1BA9E077000
|
heap
|
page read and write
|
||
252D0000000
|
trusted library allocation
|
page read and write
|
||
2BD49C13000
|
heap
|
page read and write
|
||
27A3E22A000
|
heap
|
page read and write
|
||
50B1000
|
heap
|
page read and write
|
||
69A9A79000
|
stack
|
page read and write
|
||
252BDC43000
|
unkown
|
page readonly
|
||
25DD0C02000
|
trusted library allocation
|
page read and write
|
||
4FE0000
|
heap
|
page read and write
|
||
252CFB15000
|
trusted library allocation
|
page read and write
|
||
252D836C000
|
heap
|
page read and write
|
||
2BD49A90000
|
heap
|
page read and write
|
||
50C3000
|
heap
|
page read and write
|
||
23277C00000
|
heap
|
page read and write
|
||
23277C36000
|
heap
|
page read and write
|
||
27A3ED00000
|
heap
|
page read and write
|
||
50CC000
|
heap
|
page read and write
|
||
5067000
|
heap
|
page read and write
|
||
252BE170000
|
heap
|
page read and write
|
||
1BA9E056000
|
heap
|
page read and write
|
||
1BA9E060000
|
heap
|
page read and write
|
||
252BDDAA000
|
unkown
|
page readonly
|
||
1DE6D893000
|
heap
|
page read and write
|
||
6990000
|
heap
|
page read and write
|
||
506F000
|
heap
|
page read and write
|
||
252BE150000
|
trusted library allocation
|
page read and write
|
||
252CF9AE000
|
trusted library allocation
|
page read and write
|
||
252BF9FC000
|
trusted library allocation
|
page read and write
|
||
1BA9DE90000
|
heap
|
page read and write
|
||
B74DA7E000
|
stack
|
page read and write
|
||
6BF0000
|
heap
|
page read and write
|
||
23277C2E000
|
heap
|
page read and write
|
||
54615D6000
|
stack
|
page read and write
|
||
252BE1F5000
|
heap
|
page read and write
|
||
27A3E270000
|
heap
|
page read and write
|
||
B81B67E000
|
stack
|
page read and write
|
||
505D000
|
heap
|
page read and write
|
||
1BA9E040000
|
heap
|
page read and write
|
||
27A3E284000
|
heap
|
page read and write
|
||
252BDDBC000
|
unkown
|
page readonly
|
||
252BDC32000
|
unkown
|
page readonly
|
||
2BD49C77000
|
heap
|
page read and write
|
||
1BA9E026000
|
heap
|
page read and write
|
||
C55477D000
|
stack
|
page read and write
|
||
27A3E313000
|
heap
|
page read and write
|
||
1BA9E06C000
|
heap
|
page read and write
|
||
78BE000
|
stack
|
page read and write
|
||
226ED7F000
|
stack
|
page read and write
|
||
252D8173000
|
heap
|
page read and write
|
||
2BD49C75000
|
heap
|
page read and write
|
||
5085000
|
heap
|
page read and write
|
||
5096000
|
heap
|
page read and write
|
||
54619FF000
|
stack
|
page read and write
|
||
5090000
|
heap
|
page read and write
|
||
1BA9E032000
|
heap
|
page read and write
|
||
25DD0502000
|
heap
|
page read and write
|
||
25DD03A0000
|
trusted library allocation
|
page read and write
|
||
27A3E2C4000
|
heap
|
page read and write
|
||
8A0000
|
heap
|
page read and write
|
||
252BDF30000
|
heap
|
page read and write
|
||
50BA000
|
heap
|
page read and write
|
||
6A40000
|
heap
|
page read and write
|
||
252BE140000
|
heap
|
page read and write
|
||
252CFEC7000
|
trusted library allocation
|
page read and write
|
||
1BA9E000000
|
heap
|
page read and write
|
||
1BA9E061000
|
heap
|
page read and write
|
||
50B0000
|
heap
|
page read and write
|
||
7FFDC86C0000
|
trusted library allocation
|
page read and write
|
||
6AB0000
|
heap
|
page read and write
|
||
1DE6D98C000
|
heap
|
page read and write
|
||
69A98FF000
|
stack
|
page read and write
|
||
7FFDC86C4000
|
trusted library allocation
|
page read and write
|
||
252BE1F0000
|
heap
|
page read and write
|
||
252BDDBE000
|
unkown
|
page readonly
|
||
69A9D7E000
|
stack
|
page read and write
|
||
5006000
|
heap
|
page read and write
|
||
7FFDC87D2000
|
trusted library allocation
|
page read and write
|
||
252D8167000
|
heap
|
page read and write
|
||
1BA9E049000
|
heap
|
page read and write
|
||
23277C13000
|
heap
|
page read and write
|
||
252BE180000
|
trusted library allocation
|
page read and write
|
||
23277C52000
|
heap
|
page read and write
|
||
1DE6D88E000
|
heap
|
page read and write
|
||
252BDF00000
|
heap
|
page read and write
|
||
252CFD8E000
|
trusted library allocation
|
page read and write
|
||
2BD49BF0000
|
trusted library allocation
|
page read and write
|
||
1DE6D913000
|
heap
|
page read and write
|
||
25DD02A0000
|
heap
|
page read and write
|
||
1BA9E05C000
|
heap
|
page read and write
|
||
7FFDC8796000
|
trusted library allocation
|
page execute and read and write
|
||
1DE6E202000
|
heap
|
page read and write
|
||
75FA000
|
stack
|
page read and write
|
||
2BD49AF0000
|
heap
|
page read and write
|
||
252CFC56000
|
trusted library allocation
|
page read and write
|
||
1BA9E068000
|
heap
|
page read and write
|
||
27A3E180000
|
trusted library allocation
|
page read and write
|
||
1BA9E102000
|
heap
|
page read and write
|
||
B74DEFD000
|
stack
|
page read and write
|
||
252BE130000
|
trusted library allocation
|
page read and write
|
||
69A9EFE000
|
stack
|
page read and write
|
||
252BDDBC000
|
unkown
|
page readonly
|
||
7FA000
|
stack
|
page read and write
|
||
1DE6D876000
|
heap
|
page read and write
|
||
252D8160000
|
heap
|
page read and write
|
||
252BE0D0000
|
trusted library allocation
|
page read and write
|
||
B74D8FE000
|
stack
|
page read and write
|
||
27A3E200000
|
heap
|
page read and write
|
||
1BA9E029000
|
heap
|
page read and write
|
||
506F000
|
heap
|
page read and write
|
||
252BDF6E000
|
heap
|
page read and write
|
||
6C00000
|
trusted library allocation
|
page read and write
|
||
1DE6D813000
|
heap
|
page read and write
|
||
1DE6E1C0000
|
heap
|
page read and write
|
||
1DE6D800000
|
heap
|
page read and write
|
||
27A3E0F0000
|
heap
|
page read and write
|
||
7FF46BA90000
|
trusted library allocation
|
page execute and read and write
|
||
5055000
|
heap
|
page read and write
|
||
252BE110000
|
trusted library allocation
|
page read and write
|
||
50B5000
|
heap
|
page read and write
|
||
5087000
|
heap
|
page read and write
|
||
5076000
|
heap
|
page read and write
|
||
252BF9FA000
|
trusted library allocation
|
page read and write
|
||
2BD49C72000
|
heap
|
page read and write
|
||
7FFDC8760000
|
trusted library allocation
|
page read and write
|
||
50A9000
|
heap
|
page read and write
|
||
773E000
|
stack
|
page read and write
|
||
B74DDFD000
|
stack
|
page read and write
|
||
252BDDAA000
|
unkown
|
page readonly
|
||
1DE6E1B2000
|
heap
|
page read and write
|
||
B74DCFF000
|
stack
|
page read and write
|
||
252BE0B0000
|
trusted library allocation
|
page read and write
|
||
6A8D000
|
stack
|
page read and write
|
||
252CFD06000
|
trusted library allocation
|
page read and write
|
||
226EA7E000
|
stack
|
page read and write
|
||
252CFE3E000
|
trusted library allocation
|
page read and write
|
||
252BDC43000
|
unkown
|
page readonly
|
There are 413 hidden memdumps, click here to show them.