Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
aeICl0Aabv.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
initial sample
|
||
C:\Users\user\AppData\Local\Temp\IXP000.TMP\y89Te35.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\IXP000.TMP\zap9052.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\IXP001.TMP\xJuGE71.exe
|
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\IXP001.TMP\zap9953.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\IXP002.TMP\w77lD51.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\IXP002.TMP\zap8476.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\IXP003.TMP\tz5602.exe
|
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\IXP003.TMP\v7930id.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\tz5602.exe.log
|
CSV text
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\v7930id.exe.log
|
ASCII text, with CRLF line terminators
|
dropped
|
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\aeICl0Aabv.exe
|
C:\Users\user\Desktop\aeICl0Aabv.exe
|
||
C:\Users\user\AppData\Local\Temp\IXP000.TMP\zap9052.exe
|
C:\Users\user\AppData\Local\Temp\IXP000.TMP\zap9052.exe
|
||
C:\Users\user\AppData\Local\Temp\IXP001.TMP\zap9953.exe
|
C:\Users\user\AppData\Local\Temp\IXP001.TMP\zap9953.exe
|
||
C:\Users\user\AppData\Local\Temp\IXP002.TMP\zap8476.exe
|
C:\Users\user\AppData\Local\Temp\IXP002.TMP\zap8476.exe
|
||
C:\Users\user\AppData\Local\Temp\IXP003.TMP\tz5602.exe
|
C:\Users\user\AppData\Local\Temp\IXP003.TMP\tz5602.exe
|
||
C:\Users\user\AppData\Local\Temp\IXP003.TMP\v7930id.exe
|
C:\Users\user\AppData\Local\Temp\IXP003.TMP\v7930id.exe
|
||
C:\Windows\System32\rundll32.exe
|
C:\Windows\system32\rundll32.exe" C:\Windows\system32\advpack.dll,DelNodeRunDLL32 "C:\Users\user\AppData\Local\Temp\IXP000.TMP\
|
||
C:\Windows\System32\rundll32.exe
|
C:\Windows\system32\rundll32.exe" C:\Windows\system32\advpack.dll,DelNodeRunDLL32 "C:\Users\user\AppData\Local\Temp\IXP001.TMP\
|
||
C:\Windows\System32\rundll32.exe
|
C:\Windows\system32\rundll32.exe" C:\Windows\system32\advpack.dll,DelNodeRunDLL32 "C:\Users\user\AppData\Local\Temp\IXP002.TMP\
|
||
C:\Windows\System32\rundll32.exe
|
C:\Windows\system32\rundll32.exe" C:\Windows\system32\advpack.dll,DelNodeRunDLL32 "C:\Users\user\AppData\Local\Temp\IXP003.TMP\
|
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
62.204.41.87/joomla/index.php
|
|||
193.233.20.30:4125
|
|||
https://api.ip.sb/ip
|
unknown
|
Registry
Path
|
Value
|
Malicious
|
|
---|---|---|---|
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection
|
DisableIOAVProtection
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection
|
DisableRealtimeMonitoring
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender Security Center\Notifications
|
DisableNotifications
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce
|
wextract_cleanup0
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce
|
wextract_cleanup1
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce
|
wextract_cleanup2
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce
|
wextract_cleanup3
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows Defender\Features
|
TamperProtection
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU
|
AUOptions
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU
|
AutoInstallMinorUpdates
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU
|
NoAutoRebootWithLoggedOnUsers
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU
|
UseWUServer
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate
|
DoNotConnectToWindowsUpdateInternetLocations
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features
|
TamperProtection
|
There are 4 hidden registries, click here to show them.
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
400000
|
unkown
|
page execute and read and write
|
||
104F000
|
heap
|
page read and write
|
||
4F0000
|
direct allocation
|
page execute and read and write
|
||
464E000
|
heap
|
page read and write
|
||
520000
|
direct allocation
|
page read and write
|
||
E59ABFF000
|
stack
|
page read and write
|
||
1F60000
|
heap
|
page read and write
|
||
1D1E4F13000
|
heap
|
page read and write
|
||
FE1000
|
trusted library allocation
|
page read and write
|
||
11E0000
|
heap
|
page read and write
|
||
AD0000
|
unkown
|
page readonly
|
||
B90000
|
heap
|
page read and write
|
||
17CB8A4B000
|
heap
|
page read and write
|
||
258C000
|
trusted library allocation
|
page read and write
|
||
AD3000
|
heap
|
page read and write
|
||
909000
|
heap
|
page read and write
|
||
4FA0000
|
trusted library allocation
|
page read and write
|
||
51000
|
unkown
|
page execute read
|
||
5070000
|
trusted library allocation
|
page read and write
|
||
DE4AE7C000
|
stack
|
page read and write
|
||
1D1E5732000
|
heap
|
page read and write
|
||
50E0000
|
trusted library allocation
|
page read and write
|
||
7FFBACE14000
|
trusted library allocation
|
page read and write
|
||
25CA000
|
trusted library allocation
|
page read and write
|
||
AD6000
|
heap
|
page read and write
|
||
58000
|
unkown
|
page write copy
|
||
A8E000
|
stack
|
page read and write
|
||
930000
|
heap
|
page read and write
|
||
7FFBACED0000
|
trusted library allocation
|
page execute and read and write
|
||
5100000
|
trusted library allocation
|
page read and write
|
||
A11000
|
unkown
|
page execute read
|
||
47C9000
|
heap
|
page read and write
|
||
2350000
|
trusted library allocation
|
page read and write
|
||
17CB8A44000
|
heap
|
page read and write
|
||
10E4000
|
heap
|
page read and write
|
||
20E0000
|
trusted library allocation
|
page execute and read and write
|
||
29895EF0000
|
trusted library allocation
|
page read and write
|
||
1000000
|
trusted library allocation
|
page read and write
|
||
7FFBACE20000
|
trusted library allocation
|
page read and write
|
||
78E0000
|
trusted library allocation
|
page read and write
|
||
25A1000
|
trusted library allocation
|
page read and write
|
||
29895EB0000
|
trusted library allocation
|
page read and write
|
||
175E4A37000
|
heap
|
page read and write
|
||
ACE000
|
heap
|
page read and write
|
||
199AF870000
|
heap
|
page read and write
|
||
25F82A13000
|
heap
|
page read and write
|
||
31F7000
|
heap
|
page read and write
|
||
DE4B9FF000
|
stack
|
page read and write
|
||
17CB8A74000
|
heap
|
page read and write
|
||
DE8000
|
unkown
|
page read and write
|
||
244097B000
|
stack
|
page read and write
|
||
17CB8A68000
|
heap
|
page read and write
|
||
19CBF902000
|
heap
|
page read and write
|
||
22F0000
|
trusted library allocation
|
page read and write
|
||
29895F70000
|
remote allocation
|
page read and write
|
||
42F000
|
unkown
|
page execute and read and write
|
||
12E09000
|
trusted library allocation
|
page read and write
|
||
5C101FC000
|
stack
|
page read and write
|
||
CA5000
|
heap
|
page read and write
|
||
19CBF7C0000
|
remote allocation
|
page read and write
|
||
2A613530000
|
heap
|
page read and write
|
||
2324000
|
trusted library allocation
|
page read and write
|
||
31E4000
|
heap
|
page read and write
|
||
197000
|
stack
|
page read and write
|
||
175E55F0000
|
trusted library allocation
|
page read and write
|
||
DE4B4FD000
|
stack
|
page read and write
|
||
17CB9202000
|
trusted library allocation
|
page read and write
|
||
19CBF826000
|
heap
|
page read and write
|
||
1D1E4E6D000
|
heap
|
page read and write
|
||
49A000
|
stack
|
page read and write
|
||
71A000
|
heap
|
page read and write
|
||
1D1E4D60000
|
heap
|
page read and write
|
||
256B000
|
trusted library allocation
|
page read and write
|
||
DE0000
|
unkown
|
page readonly
|
||
2989443D000
|
heap
|
page read and write
|
||
17CB8A45000
|
heap
|
page read and write
|
||
1AC94E69000
|
heap
|
page read and write
|
||
1DC7F2B0000
|
heap
|
page read and write
|
||
5C000
|
unkown
|
page readonly
|
||
2A0A000
|
heap
|
page read and write
|
||
17CB8A30000
|
heap
|
page read and write
|
||
1DC7F675000
|
heap
|
page read and write
|
||
2C9C000
|
stack
|
page read and write
|
||
1000000
|
trusted library allocation
|
page read and write
|
||
530000
|
trusted library allocation
|
page read and write
|
||
B69797E000
|
stack
|
page read and write
|
||
6EC000
|
heap
|
page read and write
|
||
175E4A39000
|
heap
|
page read and write
|
||
29E0000
|
heap
|
page read and write
|
||
5C106FC000
|
stack
|
page read and write
|
||
1010000
|
trusted library allocation
|
page read and write
|
||
20B0000
|
heap
|
page read and write
|
||
17CB8A84000
|
heap
|
page read and write
|
||
927000
|
trusted library allocation
|
page execute and read and write
|
||
175E4A37000
|
heap
|
page read and write
|
||
19CBF824000
|
heap
|
page read and write
|
||
252F000
|
stack
|
page read and write
|
||
2D8E000
|
stack
|
page read and write
|
||
A4E000
|
stack
|
page read and write
|
||
25F82A3D000
|
heap
|
page read and write
|
||
1DC7F150000
|
heap
|
page read and write
|
||
DEA000
|
unkown
|
page readonly
|
||
31E4000
|
heap
|
page read and write
|
||
5110000
|
trusted library allocation
|
page read and write
|
||
6EF9A7E000
|
stack
|
page read and write
|
||
17CB8A42000
|
heap
|
page read and write
|
||
4FB9000
|
trusted library allocation
|
page read and write
|
||
25C0000
|
trusted library allocation
|
page read and write
|
||
AD2000
|
unkown
|
page readonly
|
||
8DA000
|
heap
|
page read and write
|
||
175E4C35000
|
heap
|
page read and write
|
||
4F90000
|
trusted library allocation
|
page read and write
|
||
29894400000
|
heap
|
page read and write
|
||
2A613535000
|
heap
|
page read and write
|
||
1113000
|
heap
|
page read and write
|
||
5C000
|
unkown
|
page readonly
|
||
29894458000
|
heap
|
page read and write
|
||
29896002000
|
trusted library allocation
|
page read and write
|
||
31E6000
|
heap
|
page read and write
|
||
8F7000
|
heap
|
page read and write
|
||
714000
|
heap
|
page read and write
|
||
19CBF802000
|
heap
|
page read and write
|
||
256F000
|
trusted library allocation
|
page read and write
|
||
19CBF7C0000
|
remote allocation
|
page read and write
|
||
2A55000
|
heap
|
page read and write
|
||
175E4A37000
|
heap
|
page read and write
|
||
29894518000
|
heap
|
page read and write
|
||
17CE1350000
|
heap
|
page read and write
|
||
25F82A02000
|
heap
|
page read and write
|
||
19CBF813000
|
heap
|
page read and write
|
||
20AE000
|
stack
|
page read and write
|
||
17CB8A4C000
|
heap
|
page read and write
|
||
CA0000
|
heap
|
page read and write
|
||
6C6000
|
heap
|
page read and write
|
||
25A3000
|
trusted library allocation
|
page read and write
|
||
B697C7D000
|
stack
|
page read and write
|
||
A10000
|
unkown
|
page readonly
|
||
12E0000
|
unkown
|
page readonly
|
||
199B1360000
|
heap
|
page read and write
|
||
1F0000
|
heap
|
page read and write
|
||
19CBF760000
|
heap
|
page read and write
|
||
1040000
|
heap
|
page execute and read and write
|
||
175E4C39000
|
heap
|
page read and write
|
||
925000
|
heap
|
page read and write
|
||
17CB8B02000
|
heap
|
page read and write
|
||
20D0000
|
trusted library allocation
|
page read and write
|
||
9A0000
|
heap
|
page read and write
|
||
1000000
|
trusted library allocation
|
page read and write
|
||
25F82A76000
|
heap
|
page read and write
|
||
2420000
|
heap
|
page execute and read and write
|
||
4F80000
|
trusted library allocation
|
page read and write
|
||
AE0000
|
heap
|
page read and write
|
||
175E4A30000
|
heap
|
page read and write
|
||
25F82B02000
|
heap
|
page read and write
|
||
25F82930000
|
heap
|
page read and write
|
||
AD9000
|
heap
|
page read and write
|
||
10AC000
|
heap
|
page read and write
|
||
2577000
|
trusted library allocation
|
page read and write
|
||
5BE000
|
stack
|
page read and write
|
||
19CBF700000
|
heap
|
page read and write
|
||
E59ACFC000
|
stack
|
page read and write
|
||
4F70000
|
trusted library allocation
|
page read and write
|
||
2A39000
|
heap
|
page read and write
|
||
2A2F000
|
heap
|
page read and write
|
||
1040000
|
trusted library allocation
|
page read and write
|
||
DE4B6FE000
|
stack
|
page read and write
|
||
2A33000
|
heap
|
page read and write
|
||
17CE0FE0000
|
heap
|
page read and write
|
||
113E000
|
stack
|
page read and write
|
||
ADD000
|
heap
|
page read and write
|
||
5F70000
|
heap
|
page read and write
|
||
17CB8A49000
|
heap
|
page read and write
|
||
12E1000
|
unkown
|
page execute read
|
||
400000
|
unkown
|
page readonly
|
||
310F000
|
stack
|
page read and write
|
||
1020000
|
trusted library allocation
|
page read and write
|
||
25F83202000
|
trusted library allocation
|
page read and write
|
||
5B7D4FE000
|
stack
|
page read and write
|
||
228E000
|
stack
|
page read and write
|
||
45D7EFE000
|
stack
|
page read and write
|
||
175E49A0000
|
trusted library allocation
|
page read and write
|
||
B70000
|
heap
|
page read and write
|
||
51A0000
|
trusted library allocation
|
page read and write
|
||
175E4A37000
|
heap
|
page read and write
|
||
F81A07C000
|
stack
|
page read and write
|
||
7FFBACE30000
|
trusted library allocation
|
page read and write
|
||
2A39000
|
heap
|
page read and write
|
||
17CE0F70000
|
heap
|
page read and write
|
||
25AD000
|
trusted library allocation
|
page read and write
|
||
175E4920000
|
heap
|
page read and write
|
||
298943C0000
|
heap
|
page read and write
|
||
29894402000
|
heap
|
page read and write
|
||
E59AFFE000
|
stack
|
page read and write
|
||
AD6000
|
unkown
|
page readonly
|
||
7FFBACE22000
|
trusted library allocation
|
page read and write
|
||
903000
|
heap
|
page read and write
|
||
A4E000
|
stack
|
page read and write
|
||
25D5000
|
trusted library allocation
|
page read and write
|
||
1D1E4DD0000
|
heap
|
page read and write
|
||
50F0000
|
trusted library allocation
|
page read and write
|
||
1AC94D30000
|
heap
|
page read and write
|
||
259F000
|
trusted library allocation
|
page read and write
|
||
2A36000
|
heap
|
page read and write
|
||
714000
|
heap
|
page read and write
|
||
AAA000
|
heap
|
page read and write
|
||
462F000
|
stack
|
page read and write
|
||
2140000
|
heap
|
page read and write
|
||
45D7E7E000
|
stack
|
page read and write
|
||
EF5000
|
stack
|
page read and write
|
||
17CB8A77000
|
heap
|
page read and write
|
||
22B0000
|
heap
|
page read and write
|
||
19CBF7C0000
|
remote allocation
|
page read and write
|
||
139F000
|
stack
|
page read and write
|
||
17CB8A65000
|
heap
|
page read and write
|
||
DE4B1FC000
|
stack
|
page read and write
|
||
10A0000
|
heap
|
page read and write
|
||
290F000
|
stack
|
page read and write
|
||
25CC000
|
trusted library allocation
|
page read and write
|
||
3BC7EC000
|
stack
|
page read and write
|
||
2970000
|
heap
|
page read and write
|
||
50B0000
|
trusted library allocation
|
page read and write
|
||
401000
|
unkown
|
page execute read
|
||
AC0000
|
heap
|
page read and write
|
||
29895F70000
|
remote allocation
|
page read and write
|
||
50000
|
unkown
|
page readonly
|
||
45D7B9C000
|
stack
|
page read and write
|
||
2A613210000
|
heap
|
page read and write
|
||
17CB8910000
|
heap
|
page read and write
|
||
AD0000
|
unkown
|
page readonly
|
||
1010000
|
trusted library allocation
|
page read and write
|
||
4F25000
|
heap
|
page read and write
|
||
31F7000
|
heap
|
page read and write
|
||
A1A000
|
unkown
|
page readonly
|
||
17CB8A7A000
|
heap
|
page read and write
|
||
19CBF852000
|
heap
|
page read and write
|
||
17CB8A54000
|
heap
|
page read and write
|
||
772EC7C000
|
stack
|
page read and write
|
||
1AC94F02000
|
heap
|
page read and write
|
||
17CB8A4E000
|
heap
|
page read and write
|
||
544000
|
trusted library allocation
|
page read and write
|
||
117E000
|
stack
|
page read and write
|
||
1125000
|
heap
|
page read and write
|
||
17CB8A29000
|
heap
|
page read and write
|
||
1AC94D20000
|
heap
|
page read and write
|
||
2DF0000
|
heap
|
page execute and read and write
|
||
17CB8A00000
|
heap
|
page read and write
|
||
2575000
|
trusted library allocation
|
page read and write
|
||
25F82920000
|
heap
|
page read and write
|
||
17CB8A46000
|
heap
|
page read and write
|
||
A10000
|
unkown
|
page readonly
|
||
918000
|
heap
|
page read and write
|
||
10D4000
|
heap
|
page read and write
|
||
29894448000
|
heap
|
page read and write
|
||
B69747C000
|
stack
|
page read and write
|
||
2334000
|
trusted library allocation
|
page read and write
|
||
906000
|
heap
|
page read and write
|
||
255C000
|
trusted library allocation
|
page read and write
|
||
12EA000
|
unkown
|
page readonly
|
||
7FFBACE6C000
|
trusted library allocation
|
page execute and read and write
|
||
17CE108E000
|
heap
|
page read and write
|
||
1DC7F360000
|
heap
|
page read and write
|
||
8FE000
|
heap
|
page read and write
|
||
A1A000
|
unkown
|
page readonly
|
||
68A000
|
heap
|
page read and write
|
||
A0E000
|
stack
|
page read and write
|
||
175E4990000
|
trusted library allocation
|
page read and write
|
||
1010000
|
trusted library allocation
|
page read and write
|
||
DEC000
|
unkown
|
page readonly
|
||
6EF97EC000
|
stack
|
page read and write
|
||
5B7D47E000
|
stack
|
page read and write
|
||
25A5000
|
trusted library allocation
|
page read and write
|
||
19CBF6F0000
|
heap
|
page read and write
|
||
25C6000
|
trusted library allocation
|
page read and write
|
||
5A000
|
unkown
|
page readonly
|
||
2C30000
|
heap
|
page read and write
|
||
29894513000
|
heap
|
page read and write
|
||
2336000
|
trusted library allocation
|
page read and write
|
||
29894500000
|
heap
|
page read and write
|
||
25C2000
|
trusted library allocation
|
page read and write
|
||
29895E80000
|
trusted library allocation
|
page read and write
|
||
25C8000
|
trusted library allocation
|
page read and write
|
||
DEA000
|
unkown
|
page readonly
|
||
2440A7E000
|
stack
|
page read and write
|
||
175E4C30000
|
heap
|
page read and write
|
||
2D40000
|
heap
|
page read and write
|
||
426000
|
unkown
|
page execute and read and write
|
||
5C10AFE000
|
stack
|
page read and write
|
||
17CB8A3A000
|
heap
|
page read and write
|
||
17CE1000000
|
heap
|
page read and write
|
||
25AF000
|
trusted library allocation
|
page read and write
|
||
1DC7F670000
|
heap
|
page read and write
|
||
AD0000
|
heap
|
page read and write
|
||
24BA000
|
stack
|
page read and write
|
||
199AF620000
|
heap
|
page read and write
|
||
175E4A24000
|
heap
|
page read and write
|
||
1AC94D90000
|
heap
|
page read and write
|
||
12E1000
|
unkown
|
page execute read
|
||
25F829C0000
|
trusted library allocation
|
page read and write
|
||
680000
|
heap
|
page read and write
|
||
ACA000
|
heap
|
page read and write
|
||
50A0000
|
trusted library allocation
|
page read and write
|
||
6EF9AFF000
|
stack
|
page read and write
|
||
20F0000
|
heap
|
page read and write
|
||
4FD0000
|
trusted library allocation
|
page read and write
|
||
175E49C0000
|
heap
|
page read and write
|
||
7FFBACFB2000
|
trusted library allocation
|
page read and write
|
||
2A4E000
|
heap
|
page read and write
|
||
AD9000
|
heap
|
page read and write
|
||
17CB8A7D000
|
heap
|
page read and write
|
||
903000
|
heap
|
page read and write
|
||
DE4B7FF000
|
stack
|
page read and write
|
||
17CB8A5E000
|
heap
|
page read and write
|
||
51000
|
unkown
|
page execute read
|
||
12EA000
|
unkown
|
page readonly
|
||
17CB8A48000
|
heap
|
page read and write
|
||
1030000
|
trusted library allocation
|
page read and write
|
||
7FFBACE2D000
|
trusted library allocation
|
page execute and read and write
|
||
4FF0000
|
trusted library allocation
|
page read and write
|
||
5180000
|
trusted library allocation
|
page read and write
|
||
2A613470000
|
heap
|
page read and write
|
||
2960000
|
heap
|
page read and write
|
||
5050000
|
trusted library allocation
|
page read and write
|
||
7FFBACEF6000
|
trusted library allocation
|
page execute and read and write
|
||
5190000
|
trusted library allocation
|
page read and write
|
||
175E4A2B000
|
heap
|
page read and write
|
||
110E000
|
heap
|
page read and write
|
||
1AC94E28000
|
heap
|
page read and write
|
||
50000
|
unkown
|
page readonly
|
||
3430000
|
heap
|
page read and write
|
||
17CB8A3D000
|
heap
|
page read and write
|
||
12E03000
|
trusted library allocation
|
page read and write
|
||
A1C000
|
unkown
|
page readonly
|
||
175E4A2B000
|
heap
|
page read and write
|
||
8FB000
|
heap
|
page read and write
|
||
550000
|
heap
|
page read and write
|
||
2A24000
|
heap
|
page read and write
|
||
5120000
|
trusted library allocation
|
page read and write
|
||
3BCD79000
|
stack
|
page read and write
|
||
2588000
|
trusted library allocation
|
page read and write
|
||
7FFBACF30000
|
trusted library allocation
|
page execute and read and write
|
||
22E0000
|
trusted library allocation
|
page read and write
|
||
12EC000
|
unkown
|
page readonly
|
||
175E48A0000
|
trusted library allocation
|
page read and write
|
||
1AC94F13000
|
heap
|
page read and write
|
||
50C9000
|
trusted library allocation
|
page read and write
|
||
17CB8A2E000
|
heap
|
page read and write
|
||
5090000
|
trusted library allocation
|
page read and write
|
||
4E0000
|
heap
|
page read and write
|
||
1D1E4E00000
|
heap
|
page read and write
|
||
5060000
|
trusted library allocation
|
page read and write
|
||
2370000
|
heap
|
page read and write
|
||
17CB8A7B000
|
heap
|
page read and write
|
||
29894458000
|
heap
|
page read and write
|
||
AD5000
|
heap
|
page read and write
|
||
9C000
|
stack
|
page read and write
|
||
91A000
|
trusted library allocation
|
page execute and read and write
|
||
5C1067F000
|
stack
|
page read and write
|
||
244077B000
|
stack
|
page read and write
|
||
1010000
|
trusted library allocation
|
page read and write
|
||
17CB8A63000
|
heap
|
page read and write
|
||
31CA000
|
heap
|
page read and write
|
||
1DC7F38B000
|
heap
|
page read and write
|
||
25CE000
|
stack
|
page read and write
|
||
1000000
|
trusted library allocation
|
page read and write
|
||
5B7D87F000
|
stack
|
page read and write
|
||
90D000
|
heap
|
page read and write
|
||
175E4A01000
|
heap
|
page read and write
|
||
25F82A5A000
|
heap
|
page read and write
|
||
1000000
|
trusted library allocation
|
page read and write
|
||
8FF000
|
heap
|
page read and write
|
||
A18000
|
unkown
|
page read and write
|
||
12E07000
|
trusted library allocation
|
page read and write
|
||
702000
|
heap
|
page read and write
|
||
2A6131A0000
|
heap
|
page read and write
|
||
7610000
|
trusted library allocation
|
page read and write
|
||
258A000
|
trusted library allocation
|
page read and write
|
||
19CBF857000
|
heap
|
page read and write
|
||
1002000
|
trusted library allocation
|
page read and write
|
||
17CB8A41000
|
heap
|
page read and write
|
||
1002000
|
trusted library allocation
|
page read and write
|
||
CA9000
|
heap
|
page read and write
|
||
175E4A2E000
|
heap
|
page read and write
|
||
50D0000
|
trusted library allocation
|
page read and write
|
||
AEE000
|
heap
|
page read and write
|
||
2A2A000
|
heap
|
page read and write
|
||
29894447000
|
heap
|
page read and write
|
||
2CE9000
|
heap
|
page read and write
|
||
5165000
|
trusted library allocation
|
page read and write
|
||
2350000
|
trusted library section
|
page read and write
|
||
772EDFF000
|
stack
|
page read and write
|
||
7FFBACE3D000
|
trusted library allocation
|
page execute and read and write
|
||
9A5000
|
heap
|
page read and write
|
||
5160000
|
trusted library allocation
|
page read and write
|
||
AB0000
|
heap
|
page read and write
|
||
E59ADFC000
|
stack
|
page read and write
|
||
175E5860000
|
trusted library allocation
|
page read and write
|
||
1AC94F00000
|
heap
|
page read and write
|
||
1020000
|
trusted library allocation
|
page read and write
|
||
4AC000
|
unkown
|
page readonly
|
||
17CB8A13000
|
heap
|
page read and write
|
||
E59A9FF000
|
stack
|
page read and write
|
||
772ECFE000
|
stack
|
page read and write
|
||
430000
|
heap
|
page read and write
|
||
5A000
|
unkown
|
page readonly
|
||
29894489000
|
heap
|
page read and write
|
||
199AF6A7000
|
heap
|
page read and write
|
||
29894457000
|
heap
|
page read and write
|
||
25A9000
|
trusted library allocation
|
page read and write
|
||
199AFA35000
|
heap
|
page read and write
|
||
4970000
|
heap
|
page read and write
|
||
1D1E4E3E000
|
heap
|
page read and write
|
||
5A000
|
unkown
|
page readonly
|
||
1AC94E40000
|
heap
|
page read and write
|
||
2A33000
|
heap
|
page read and write
|
||
199AF890000
|
heap
|
page read and write
|
||
175E4A25000
|
heap
|
page read and write
|
||
25F82B13000
|
heap
|
page read and write
|
||
50C0000
|
trusted library allocation
|
page read and write
|
||
1D1E5700000
|
heap
|
page read and write
|
||
17CB8A64000
|
heap
|
page read and write
|
||
F81A17E000
|
stack
|
page read and write
|
||
1D1E4F02000
|
heap
|
page read and write
|
||
2531000
|
trusted library allocation
|
page read and write
|
||
2CDB000
|
stack
|
page read and write
|
||
AA0000
|
heap
|
page read and write
|
||
175E49B0000
|
trusted library allocation
|
page read and write
|
||
10E2000
|
heap
|
page read and write
|
||
2290000
|
trusted library section
|
page read and write
|
||
1AC94E64000
|
heap
|
page read and write
|
||
6D9000
|
heap
|
page read and write
|
||
1D1E4E13000
|
heap
|
page read and write
|
||
5125000
|
heap
|
page read and write
|
||
7FFBACEC0000
|
trusted library allocation
|
page read and write
|
||
AC7000
|
heap
|
page read and write
|
||
2450000
|
heap
|
page read and write
|
||
5C10A7D000
|
stack
|
page read and write
|
||
1B37D000
|
stack
|
page read and write
|
||
17CB8A31000
|
heap
|
page read and write
|
||
702000
|
heap
|
page read and write
|
||
199AF6A0000
|
heap
|
page read and write
|
||
51CF000
|
stack
|
page read and write
|
||
13E5000
|
heap
|
page read and write
|
||
1290000
|
heap
|
page read and write
|
||
4FE0000
|
trusted library allocation
|
page read and write
|
||
8FD000
|
heap
|
page read and write
|
||
40D000
|
unkown
|
page write copy
|
||
3535000
|
trusted library allocation
|
page read and write
|
||
175E5800000
|
trusted library allocation
|
page read and write
|
||
2A00000
|
heap
|
page read and write
|
||
DE4B8FE000
|
stack
|
page read and write
|
||
5B7D18C000
|
stack
|
page read and write
|
||
244087E000
|
stack
|
page read and write
|
||
1AC94DC0000
|
trusted library allocation
|
page read and write
|
||
A11000
|
unkown
|
page execute read
|
||
2A2A000
|
heap
|
page read and write
|
||
124F000
|
heap
|
page read and write
|
||
5FE000
|
stack
|
page read and write
|
||
29894350000
|
heap
|
page read and write
|
||
8F4000
|
heap
|
page read and write
|
||
175E4C40000
|
trusted library allocation
|
page read and write
|
||
3559000
|
trusted library allocation
|
page read and write
|
||
4840000
|
heap
|
page read and write
|
||
543000
|
trusted library allocation
|
page execute and read and write
|
||
2569000
|
trusted library allocation
|
page read and write
|
||
1000000
|
trusted library allocation
|
page read and write
|
||
175E4890000
|
heap
|
page read and write
|
||
5B7D67E000
|
stack
|
page read and write
|
||
1D1E4EB9000
|
heap
|
page read and write
|
||
30000
|
heap
|
page read and write
|
||
29894466000
|
heap
|
page read and write
|
||
772ED7E000
|
stack
|
page read and write
|
||
199AFA30000
|
heap
|
page read and write
|
||
5C108FE000
|
stack
|
page read and write
|
||
2567000
|
trusted library allocation
|
page read and write
|
||
DE4B07B000
|
stack
|
page read and write
|
||
670000
|
trusted library allocation
|
page read and write
|
||
1AC94E00000
|
heap
|
page read and write
|
||
1000000
|
trusted library allocation
|
page read and write
|
||
2594000
|
trusted library allocation
|
page read and write
|
||
AD5000
|
heap
|
page read and write
|
||
17CB8A4D000
|
heap
|
page read and write
|
||
5F74000
|
heap
|
page read and write
|
||
2586000
|
trusted library allocation
|
page read and write
|
||
2590000
|
trusted library allocation
|
page read and write
|
||
B6979FC000
|
stack
|
page read and write
|
||
2E01000
|
trusted library allocation
|
page read and write
|
||
2A3D000
|
heap
|
page read and write
|
||
175E4A14000
|
heap
|
page read and write
|
||
2A613110000
|
heap
|
page read and write
|
||
7690000
|
trusted library allocation
|
page read and write
|
||
31C0000
|
heap
|
page read and write
|
||
B697F7E000
|
stack
|
page read and write
|
||
FE4000
|
trusted library allocation
|
page read and write
|
||
3BCBF9000
|
stack
|
page read and write
|
||
575000
|
heap
|
page read and write
|
||
25F82A29000
|
heap
|
page read and write
|
||
2A27000
|
heap
|
page read and write
|
||
17CB8A6B000
|
heap
|
page read and write
|
||
13E0000
|
heap
|
page read and write
|
||
B69787F000
|
stack
|
page read and write
|
||
7FFBACE1D000
|
trusted library allocation
|
page execute and read and write
|
||
530F000
|
stack
|
page read and write
|
||
AB4000
|
heap
|
page read and write
|
||
2571000
|
trusted library allocation
|
page read and write
|
||
A18000
|
unkown
|
page write copy
|
||
5170000
|
trusted library allocation
|
page read and write
|
||
F81A0FF000
|
stack
|
page read and write
|
||
175E4900000
|
heap
|
page read and write
|
||
58000
|
unkown
|
page read and write
|
||
5B7D97F000
|
stack
|
page read and write
|
||
25AB000
|
trusted library allocation
|
page read and write
|
||
5C1097E000
|
stack
|
page read and write
|
||
318F000
|
stack
|
page read and write
|
||
22D0000
|
heap
|
page read and write
|
||
1D1E4E29000
|
heap
|
page read and write
|
||
25F82A00000
|
heap
|
page read and write
|
||
1DC7F290000
|
heap
|
page read and write
|
||
1AC95602000
|
trusted library allocation
|
page read and write
|
||
17CB9070000
|
trusted library allocation
|
page read and write
|
||
9C0000
|
heap
|
page read and write
|
||
DEC000
|
unkown
|
page readonly
|
||
92B000
|
trusted library allocation
|
page execute and read and write
|
||
ACF000
|
heap
|
page read and write
|
||
2A613180000
|
heap
|
page read and write
|
||
1010000
|
trusted library allocation
|
page read and write
|
||
175E4A2B000
|
heap
|
page read and write
|
||
17CB88B0000
|
heap
|
page read and write
|
||
2330000
|
trusted library allocation
|
page read and write
|
||
4FB0000
|
trusted library allocation
|
page read and write
|
||
1001000
|
trusted library allocation
|
page read and write
|
||
B697B7B000
|
stack
|
page read and write
|
||
8D0000
|
heap
|
page read and write
|
||
25F82990000
|
heap
|
page read and write
|
||
25B2000
|
trusted library allocation
|
page read and write
|
||
199AF6AB000
|
heap
|
page read and write
|
||
17CB88A0000
|
heap
|
page read and write
|
||
4770000
|
heap
|
page read and write
|
||
20C0000
|
heap
|
page execute and read and write
|
||
4AC000
|
unkown
|
page readonly
|
||
673000
|
trusted library allocation
|
page read and write
|
||
DE0000
|
unkown
|
page readonly
|
||
1AC94E50000
|
heap
|
page read and write
|
||
B697D7F000
|
stack
|
page read and write
|
||
7FFBACE13000
|
trusted library allocation
|
page execute and read and write
|
||
909000
|
heap
|
page read and write
|
||
A1C000
|
unkown
|
page readonly
|
||
E59AAFF000
|
stack
|
page read and write
|
||
2989451C000
|
heap
|
page read and write
|
||
1001000
|
trusted library allocation
|
page read and write
|
||
17CB8A40000
|
heap
|
page read and write
|
||
10E7000
|
heap
|
page read and write
|
||
DE8000
|
unkown
|
page write copy
|
||
4DB000
|
stack
|
page read and write
|
||
17CB8A60000
|
heap
|
page read and write
|
||
AF5000
|
heap
|
page read and write
|
||
175E49A0000
|
trusted library allocation
|
page read and write
|
||
DE1000
|
unkown
|
page execute read
|
||
29894413000
|
heap
|
page read and write
|
||
1D1E5530000
|
trusted library allocation
|
page read and write
|
||
5130000
|
trusted library allocation
|
page read and write
|
||
17CB8A31000
|
heap
|
page read and write
|
||
2573000
|
trusted library allocation
|
page read and write
|
||
5020000
|
trusted library allocation
|
page read and write
|
||
19CBF829000
|
heap
|
page read and write
|
||
5040000
|
trusted library allocation
|
page read and write
|
||
175E4A0C000
|
heap
|
page read and write
|
||
2060000
|
trusted library allocation
|
page read and write
|
||
940000
|
heap
|
page read and write
|
||
224F000
|
stack
|
page read and write
|
||
2D90000
|
heap
|
page read and write
|
||
DE4B5FE000
|
stack
|
page read and write
|
||
4FC0000
|
trusted library allocation
|
page read and write
|
||
25C4000
|
trusted library allocation
|
page read and write
|
||
5090000
|
trusted library allocation
|
page read and write
|
||
29BF000
|
stack
|
page read and write
|
||
19CBF820000
|
heap
|
page read and write
|
||
17CB8A61000
|
heap
|
page read and write
|
||
2592000
|
trusted library allocation
|
page read and write
|
||
17CE1355000
|
heap
|
page read and write
|
||
17CB8A6A000
|
heap
|
page read and write
|
||
7FF439610000
|
trusted library allocation
|
page execute and read and write
|
||
FF0000
|
heap
|
page read and write
|
||
54D000
|
trusted library allocation
|
page execute and read and write
|
||
29894448000
|
heap
|
page read and write
|
||
AD3000
|
heap
|
page read and write
|
||
540000
|
heap
|
page read and write
|
||
256D000
|
trusted library allocation
|
page read and write
|
||
DE1000
|
unkown
|
page execute read
|
||
25F82A56000
|
heap
|
page read and write
|
||
9E0000
|
heap
|
page read and write
|
||
540000
|
trusted library allocation
|
page read and write
|
||
298943F0000
|
trusted library allocation
|
page read and write
|
||
5BA000
|
stack
|
page read and write
|
||
8FB000
|
heap
|
page read and write
|
||
19CBF790000
|
trusted library allocation
|
page read and write
|
||
2A2E000
|
heap
|
page read and write
|
||
AD9000
|
heap
|
page read and write
|
||
244047B000
|
stack
|
page read and write
|
||
175E4A16000
|
heap
|
page read and write
|
||
17CB8A62000
|
heap
|
page read and write
|
||
175E4A37000
|
heap
|
page read and write
|
||
5FB000
|
stack
|
page read and write
|
||
24FB000
|
stack
|
page read and write
|
||
AE8000
|
heap
|
page read and write
|
||
6E0000
|
heap
|
page read and write
|
||
2CE0000
|
heap
|
page read and write
|
||
5030000
|
trusted library allocation
|
page read and write
|
||
175E5860000
|
trusted library allocation
|
page read and write
|
||
1D1E4D70000
|
heap
|
page read and write
|
||
1008000
|
trusted library allocation
|
page read and write
|
||
17CB8A47000
|
heap
|
page read and write
|
||
10D6000
|
heap
|
page read and write
|
||
213E000
|
stack
|
page read and write
|
||
3BCB79000
|
stack
|
page read and write
|
||
175E4A13000
|
heap
|
page read and write
|
||
FD0000
|
trusted library allocation
|
page read and write
|
||
17CB8A39000
|
heap
|
page read and write
|
||
1AC94E02000
|
heap
|
page read and write
|
||
175E4B9E000
|
trusted library allocation
|
page read and write
|
||
1D1E5602000
|
heap
|
page read and write
|
||
2989447B000
|
heap
|
page read and write
|
||
1000000
|
trusted library allocation
|
page read and write
|
||
1000000
|
trusted library allocation
|
page read and write
|
||
2599000
|
trusted library allocation
|
page read and write
|
||
2560000
|
heap
|
page read and write
|
||
2340000
|
trusted library allocation
|
page read and write
|
||
1000000
|
trusted library allocation
|
page read and write
|
||
990000
|
heap
|
page read and write
|
||
1000000
|
trusted library allocation
|
page read and write
|
||
472E000
|
stack
|
page read and write
|
||
1DC7F380000
|
heap
|
page read and write
|
||
AD9000
|
heap
|
page read and write
|
||
50CE000
|
stack
|
page read and write
|
||
25A7000
|
trusted library allocation
|
page read and write
|
||
ACA000
|
heap
|
page read and write
|
||
19CBF83D000
|
heap
|
page read and write
|
||
550000
|
heap
|
page read and write
|
||
555000
|
heap
|
page read and write
|
||
1AC94E7D000
|
heap
|
page read and write
|
||
29894502000
|
heap
|
page read and write
|
||
19CBF800000
|
heap
|
page read and write
|
||
570000
|
heap
|
page read and write
|
||
91E000
|
heap
|
page read and write
|
||
A90000
|
heap
|
page read and write
|
||
12E8000
|
unkown
|
page read and write
|
||
B50000
|
heap
|
page read and write
|
||
E59A67B000
|
stack
|
page read and write
|
||
5000000
|
trusted library allocation
|
page read and write
|
||
12E8000
|
unkown
|
page write copy
|
||
B697E7C000
|
stack
|
page read and write
|
||
2989442A000
|
heap
|
page read and write
|
||
3BCCF9000
|
stack
|
page read and write
|
||
2A61321E000
|
heap
|
page read and write
|
||
12EC000
|
unkown
|
page readonly
|
||
1AC94E13000
|
heap
|
page read and write
|
||
25CE000
|
trusted library allocation
|
page read and write
|
||
2A48000
|
heap
|
page read and write
|
||
2CE5000
|
heap
|
page read and write
|
||
917000
|
trusted library allocation
|
page execute and read and write
|
||
17CB8A75000
|
heap
|
page read and write
|
||
905000
|
heap
|
page read and write
|
||
484E000
|
heap
|
page read and write
|
||
294E000
|
stack
|
page read and write
|
||
3531000
|
trusted library allocation
|
page read and write
|
||
5B7D77E000
|
stack
|
page read and write
|
||
19CC0002000
|
trusted library allocation
|
page read and write
|
||
2A39000
|
heap
|
page read and write
|
||
175E4A13000
|
heap
|
page read and write
|
||
17CE1080000
|
heap
|
page read and write
|
||
17CB8A2D000
|
heap
|
page read and write
|
||
5C000
|
unkown
|
page readonly
|
||
29895F70000
|
remote allocation
|
page read and write
|
||
66E000
|
stack
|
page read and write
|
||
12E01000
|
trusted library allocation
|
page read and write
|
||
314E000
|
stack
|
page read and write
|
||
6A6000
|
heap
|
page execute and read and write
|
||
1DC7F387000
|
heap
|
page read and write
|
||
AC4000
|
heap
|
page read and write
|
||
2561000
|
trusted library allocation
|
page read and write
|
||
258E000
|
trusted library allocation
|
page read and write
|
||
DE4B2FF000
|
stack
|
page read and write
|
||
5080000
|
trusted library allocation
|
page read and write
|
||
2DDE000
|
stack
|
page read and write
|
||
2C8F000
|
stack
|
page read and write
|
||
B697AFD000
|
stack
|
page read and write
|
||
17CE12A0000
|
heap
|
page read and write
|
||
909000
|
heap
|
page read and write
|
||
3BCC7E000
|
stack
|
page read and write
|
||
29894360000
|
heap
|
page read and write
|
||
175E5810000
|
trusted library allocation
|
page read and write
|
||
1D1E4EC8000
|
heap
|
page read and write
|
||
1000000
|
trusted library allocation
|
page read and write
|
||
12E0000
|
unkown
|
page readonly
|
||
11E4000
|
heap
|
page read and write
|
||
19CBF837000
|
heap
|
page read and write
|
||
175E4C10000
|
trusted library allocation
|
page read and write
|
||
17CB8A6D000
|
heap
|
page read and write
|
||
1D1E4ECA000
|
heap
|
page read and write
|
||
4F90000
|
heap
|
page read and write
|
||
B69767C000
|
stack
|
page read and write
|
||
2A35000
|
heap
|
page read and write
|
||
175E4C20000
|
heap
|
page readonly
|
||
5010000
|
trusted library allocation
|
page read and write
|
||
BE0000
|
trusted library allocation
|
page read and write
|
||
520E000
|
stack
|
page read and write
|
There are 695 hidden memdumps, click here to show them.