Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
opp.scr.exe
|
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
|
initial sample
|
||
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\opp.scr.exe.log
|
ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\13d6pS3
|
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 8, database pages 89, cookie
0x36, schema 4, UTF-8, version-valid-for 8
|
dropped
|
||
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Docs.lnk
|
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command
line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Thu May 2 12:56:21 2024, atime=Wed Sep 27 04:28:28
2023, length=1210144, window=hide
|
dropped
|
||
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Gmail.lnk
|
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command
line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Thu May 2 12:56:21 2024, atime=Wed Sep 27 04:28:28
2023, length=1210144, window=hide
|
dropped
|
||
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Google Drive.lnk
|
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command
line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Wed Oct 4 12:54:07 2023, atime=Wed Sep 27 04:28:28
2023, length=1210144, window=hide
|
dropped
|
||
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Sheets.lnk
|
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command
line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Thu May 2 12:56:21 2024, atime=Wed Sep 27 04:28:28
2023, length=1210144, window=hide
|
dropped
|
||
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Slides.lnk
|
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command
line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Thu May 2 12:56:21 2024, atime=Wed Sep 27 04:28:28
2023, length=1210144, window=hide
|
dropped
|
||
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\YouTube.lnk
|
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command
line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Thu May 2 12:56:21 2024, atime=Wed Sep 27 04:28:28
2023, length=1210144, window=hide
|
dropped
|
||
Chrome Cache Entry: 71
|
ASCII text, with very long lines (5435)
|
downloaded
|
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\opp.scr.exe
|
"C:\Users\user\Desktop\opp.scr.exe"
|
||
C:\Users\user\Desktop\opp.scr.exe
|
"C:\Users\user\Desktop\opp.scr.exe"
|
||
C:\Program Files (x86)\IbZIyGTNRRgnjGfKKCjfPwQYwyfKGixnBYPXdPAqeWGGHEs\oOOsxwAhjIw.exe
|
"C:\Program Files (x86)\IbZIyGTNRRgnjGfKKCjfPwQYwyfKGixnBYPXdPAqeWGGHEs\oOOsxwAhjIw.exe"
|
||
C:\Windows\SysWOW64\dfrgui.exe
|
"C:\Windows\SysWOW64\dfrgui.exe"
|
||
C:\Program Files (x86)\IbZIyGTNRRgnjGfKKCjfPwQYwyfKGixnBYPXdPAqeWGGHEs\oOOsxwAhjIw.exe
|
"C:\Program Files (x86)\IbZIyGTNRRgnjGfKKCjfPwQYwyfKGixnBYPXdPAqeWGGHEs\oOOsxwAhjIw.exe"
|
||
C:\Program Files\Mozilla Firefox\firefox.exe
|
"C:\Program Files\Mozilla Firefox\Firefox.exe"
|
||
C:\Program Files\Google\Chrome\Application\chrome.exe
|
"C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized --single-argument http:///
|
||
C:\Program Files\Google\Chrome\Application\chrome.exe
|
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US
--service-sandbox-type=none --mojo-platform-channel-handle=2052 --field-trial-handle=1940,i,10687501719211606552,13801376808827217908,262144
--disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction
/prefetch:8
|
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
http://www.terelprime.com/ufuh/?p80t2Pu=YGhnx96XAVFPN8tv1lUEEiUVdSmZ/iyWteKDUnkDVIOF49Ku923zDENpH5OUCIyJQHomPTwvfF1wQ0t1Y4t+Kv0hk37pk2XOQoNeMFqeOrHvpWJ1tST0YGmxjRv23ozT3g==&B6bX=zjl0
|
66.96.161.166
|
||
https://ac.ecosia.org/autocomplete?q=
|
unknown
|
||
https://www.google.com/async/ddljson?async=ntp:2
|
142.251.40.100
|
||
https://duckduckgo.com/chrome_newtab
|
unknown
|
||
https://duckduckgo.com/ac/?q=
|
unknown
|
||
https://www.google.com/complete/search?client=chrome-omni&gs_ri=chrome-ext-ansg&xssi=t&q=&oit=0&oft=1&pgcl=20&gs_rn=42&sugkey=AIzaSyBOti4mM-6x9WDnZIjIeyEU21OpBXqWBgw
|
142.251.40.100
|
||
http://www.searchvity.com/
|
unknown
|
||
https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
|
unknown
|
||
https://www.google.com/sorry/index?continue=https://www.google.com/async/newtab_promos&q=EgS_YJbhGIS3zrEGIjC0v607c_qYvTi5H8NDS3aYuCJmplAqD5Rl0JeJ4_KibV6kPGTEw6xAv1H63aOy6jsyAXJKGVNPUlJZX0FCVVNJVkVfTkVUX01FU1NBR0VaAUM
|
142.251.40.100
|
||
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
|
unknown
|
||
https://www.google.com/async/newtab_promos
|
142.251.40.100
|
||
https://www.google.com/async/newtab_ogb?hl=en-US&async=fixed:0
|
142.251.40.100
|
||
http://www.searchvity.com/?dn=
|
unknown
|
||
https://www.google.com/sorry/index?continue=https://www.google.com/async/newtab_ogb%3Fhl%3Den-US%26async%3Dfixed:0&hl=en-US&q=EgS_YJbhGIS3zrEGIjAy2SY_wKQfS3Qr9DIp4alnyJkCTUiOIWFLBr4l8U2O7-X7PjrHl9WYNHcJAlxWu-0yAXJKGVNPUlJZX0FCVVNJVkVfTkVUX01FU1NBR0VaAUM
|
142.251.40.100
|
||
https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&comm
|
unknown
|
||
https://www.ecosia.org/newtab/
|
unknown
|
||
https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
|
unknown
|
There are 7 hidden URLs, click here to show them.
Domains
Name
|
IP
|
Malicious
|
|
---|---|---|---|
www.terelprime.com
|
66.96.161.166
|
||
www.besthomeincome24.com
|
unknown
|
||
www.google.com
|
142.251.40.100
|
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
192.168.2.5
|
unknown
|
unknown
|
||
66.96.161.166
|
www.terelprime.com
|
United States
|
||
142.251.40.100
|
www.google.com
|
United States
|
||
239.255.255.250
|
unknown
|
Reserved
|
||
192.168.2.23
|
unknown
|
unknown
|
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
4E70000
|
unkown
|
page execute and read and write
|
||
4E90000
|
system
|
page execute and read and write
|
||
400000
|
remote allocation
|
page execute and read and write
|
||
4130000
|
trusted library allocation
|
page read and write
|
||
4170000
|
trusted library allocation
|
page read and write
|
||
11C0000
|
unclassified section
|
page execute and read and write
|
||
41B0000
|
unclassified section
|
page execute and read and write
|
||
237000
|
unkown
|
page readonly
|
||
7731000
|
heap
|
page read and write
|
||
773E000
|
heap
|
page read and write
|
||
58A000
|
stack
|
page read and write
|
||
520000
|
unkown
|
page readonly
|
||
1911000
|
direct allocation
|
page execute and read and write
|
||
4F85000
|
system
|
page execute and read and write
|
||
4031000
|
heap
|
page read and write
|
||
25EC000
|
unkown
|
page read and write
|
||
3080000
|
trusted library allocation
|
page read and write
|
||
4031000
|
heap
|
page read and write
|
||
79D0000
|
heap
|
page read and write
|
||
1340000
|
heap
|
page read and write
|
||
56BA000
|
trusted library allocation
|
page read and write
|
||
4031000
|
heap
|
page read and write
|
||
166F000
|
stack
|
page read and write
|
||
4031000
|
heap
|
page read and write
|
||
4D8000
|
heap
|
page read and write
|
||
4031000
|
heap
|
page read and write
|
||
2782000
|
unkown
|
page read and write
|
||
4031000
|
heap
|
page read and write
|
||
22E000
|
unkown
|
page readonly
|
||
587E000
|
trusted library allocation
|
page read and write
|
||
3070000
|
unkown
|
page execute and read and write
|
||
4031000
|
heap
|
page read and write
|
||
4031000
|
heap
|
page read and write
|
||
220000
|
unkown
|
page readonly
|
||
7707000
|
heap
|
page read and write
|
||
4031000
|
heap
|
page read and write
|
||
4031000
|
heap
|
page read and write
|
||
4031000
|
heap
|
page read and write
|
||
792C000
|
stack
|
page read and write
|
||
2480000
|
unkown
|
page read and write
|
||
4031000
|
heap
|
page read and write
|
||
533000
|
heap
|
page read and write
|
||
4031000
|
heap
|
page read and write
|
||
4031000
|
heap
|
page read and write
|
||
4BB000
|
heap
|
page read and write
|
||
1350000
|
heap
|
page read and write
|
||
1288000
|
heap
|
page read and write
|
||
8FD000
|
stack
|
page read and write
|
||
4031000
|
heap
|
page read and write
|
||
4031000
|
heap
|
page read and write
|
||
4FA000
|
stack
|
page read and write
|
||
4031000
|
heap
|
page read and write
|
||
950000
|
unkown
|
page read and write
|
||
17FE000
|
direct allocation
|
page execute and read and write
|
||
51AF000
|
stack
|
page read and write
|
||
4514000
|
unclassified section
|
page execute and read and write
|
||
4031000
|
heap
|
page read and write
|
||
16A0000
|
trusted library allocation
|
page read and write
|
||
4031000
|
heap
|
page read and write
|
||
41EF000
|
heap
|
page read and write
|
||
4031000
|
heap
|
page read and write
|
||
4154000
|
heap
|
page read and write
|
||
262E000
|
stack
|
page read and write
|
||
4C8000
|
heap
|
page read and write
|
||
5F0000
|
unkown
|
page readonly
|
||
1176000
|
stack
|
page read and write
|
||
7746000
|
heap
|
page read and write
|
||
152E000
|
stack
|
page read and write
|
||
4031000
|
heap
|
page read and write
|
||
4031000
|
heap
|
page read and write
|
||
25B0000
|
unkown
|
page readonly
|
||
5681000
|
trusted library allocation
|
page read and write
|
||
94E000
|
stack
|
page read and write
|
||
303E000
|
stack
|
page read and write
|
||
1789000
|
direct allocation
|
page execute and read and write
|
||
BF0000
|
heap
|
page read and write
|
||
4031000
|
heap
|
page read and write
|
||
16D6000
|
trusted library allocation
|
page execute and read and write
|
||
900000
|
heap
|
page read and write
|
||
4031000
|
heap
|
page read and write
|
||
4031000
|
heap
|
page read and write
|
||
4031000
|
heap
|
page read and write
|
||
4031000
|
heap
|
page read and write
|
||
4031000
|
heap
|
page read and write
|
||
4031000
|
heap
|
page read and write
|
||
4031000
|
heap
|
page read and write
|
||
5BD4000
|
unkown
|
page execute and read and write
|
||
4031000
|
heap
|
page read and write
|
||
5A5E000
|
stack
|
page read and write
|
||
4031000
|
heap
|
page read and write
|
||
4031000
|
heap
|
page read and write
|
||
156E000
|
stack
|
page read and write
|
||
38062000
|
system
|
page read and write
|
||
11CE000
|
heap
|
page read and write
|
||
860000
|
heap
|
page read and write
|
||
4031000
|
heap
|
page read and write
|
||
5E0000
|
heap
|
page read and write
|
||
4FA000
|
stack
|
page read and write
|
||
4031000
|
heap
|
page read and write
|
||
46F2000
|
unclassified section
|
page read and write
|
||
220000
|
unkown
|
page readonly
|
||
10C0000
|
heap
|
page read and write
|
||
4031000
|
heap
|
page read and write
|
||
192D000
|
direct allocation
|
page execute and read and write
|
||
19B0000
|
unclassified section
|
page execute and read and write
|
||
12E0000
|
heap
|
page read and write
|
||
4031000
|
heap
|
page read and write
|
||
4031000
|
heap
|
page read and write
|
||
44CD000
|
direct allocation
|
page execute and read and write
|
||
469000
|
heap
|
page read and write
|
||
160000
|
system
|
page execute and read and write
|
||
4031000
|
heap
|
page read and write
|
||
4031000
|
heap
|
page read and write
|
||
4031000
|
heap
|
page read and write
|
||
1283000
|
heap
|
page read and write
|
||
4031000
|
heap
|
page read and write
|
||
24A0000
|
heap
|
page read and write
|
||
4031000
|
heap
|
page read and write
|
||
14C0000
|
heap
|
page read and write
|
||
EFA000
|
stack
|
page read and write
|
||
13FF000
|
stack
|
page read and write
|
||
466D000
|
direct allocation
|
page execute and read and write
|
||
243E000
|
stack
|
page read and write
|
||
46E2000
|
direct allocation
|
page execute and read and write
|
||
4260000
|
trusted library allocation
|
page execute and read and write
|
||
830000
|
unkown
|
page readonly
|
||
23E0000
|
unkown
|
page read and write
|
||
5F0000
|
unkown
|
page readonly
|
||
4031000
|
heap
|
page read and write
|
||
5D0000
|
unkown
|
page readonly
|
||
4031000
|
heap
|
page read and write
|
||
500000
|
unkown
|
page readonly
|
||
4031000
|
heap
|
page read and write
|
||
447000
|
heap
|
page read and write
|
||
5FC000
|
stack
|
page read and write
|
||
502000
|
heap
|
page read and write
|
||
235000
|
unkown
|
page read and write
|
||
50AC000
|
unkown
|
page read and write
|
||
2880000
|
heap
|
page read and write
|
||
1010000
|
heap
|
page read and write
|
||
100E000
|
stack
|
page read and write
|
||
960000
|
heap
|
page read and write
|
||
FD1000
|
unkown
|
page readonly
|
||
2460000
|
unkown
|
page read and write
|
||
970000
|
unkown
|
page read and write
|
||
4031000
|
heap
|
page read and write
|
||
4031000
|
heap
|
page read and write
|
||
16E7000
|
trusted library allocation
|
page execute and read and write
|
||
16C0000
|
trusted library allocation
|
page read and write
|
||
25AF000
|
stack
|
page read and write
|
||
463000
|
heap
|
page read and write
|
||
30B7000
|
trusted library allocation
|
page read and write
|
||
1202000
|
heap
|
page read and write
|
||
480000
|
unkown
|
page readonly
|
||
24C0000
|
unkown
|
page readonly
|
||
5890000
|
heap
|
page execute and read and write
|
||
72E000
|
stack
|
page read and write
|
||
40D1000
|
trusted library allocation
|
page read and write
|
||
237000
|
unkown
|
page readonly
|
||
988000
|
heap
|
page read and write
|
||
492000
|
heap
|
page read and write
|
||
510000
|
unkown
|
page readonly
|
||
24A0000
|
heap
|
page read and write
|
||
4B2000
|
heap
|
page read and write
|
||
57D0000
|
trusted library section
|
page read and write
|
||
4031000
|
heap
|
page read and write
|
||
D60000
|
unkown
|
page readonly
|
||
43E000
|
stack
|
page read and write
|
||
431C000
|
heap
|
page read and write
|
||
4031000
|
heap
|
page read and write
|
||
24C0000
|
unkown
|
page readonly
|
||
56C0000
|
heap
|
page read and write
|
||
4031000
|
heap
|
page read and write
|
||
4031000
|
heap
|
page read and write
|
||
4031000
|
heap
|
page read and write
|
||
4031000
|
heap
|
page read and write
|
||
2440000
|
unkown
|
page readonly
|
||
4031000
|
heap
|
page read and write
|
||
5879000
|
trusted library allocation
|
page read and write
|
||
107B000
|
stack
|
page read and write
|
||
11E7000
|
heap
|
page read and write
|
||
4031000
|
heap
|
page read and write
|
||
23E0000
|
unkown
|
page read and write
|
||
463000
|
heap
|
page read and write
|
||
8FD000
|
stack
|
page read and write
|
||
76BE000
|
stack
|
page read and write
|
||
4031000
|
heap
|
page read and write
|
||
4031000
|
heap
|
page read and write
|
||
718000
|
unkown
|
page read and write
|
||
4031000
|
heap
|
page read and write
|
||
5E1E000
|
stack
|
page read and write
|
||
25D0000
|
unkown
|
page read and write
|
||
453E000
|
direct allocation
|
page execute and read and write
|
||
178D000
|
direct allocation
|
page execute and read and write
|
||
566B000
|
trusted library allocation
|
page read and write
|
||
30C0000
|
heap
|
page execute and read and write
|
||
2690000
|
unkown
|
page readonly
|
||
4031000
|
heap
|
page read and write
|
||
235000
|
unkown
|
page read and write
|
||
2680000
|
heap
|
page read and write
|
||
1720000
|
heap
|
page read and write
|
||
DEC000
|
unkown
|
page readonly
|
||
4C8000
|
heap
|
page read and write
|
||
4031000
|
heap
|
page read and write
|
||
4031000
|
heap
|
page read and write
|
||
388B6000
|
system
|
page read and write
|
||
11C0000
|
heap
|
page read and write
|
||
4031000
|
heap
|
page read and write
|
||
23B0000
|
unclassified section
|
page execute and read and write
|
||
16DA000
|
trusted library allocation
|
page execute and read and write
|
||
2660000
|
heap
|
page read and write
|
||
4031000
|
heap
|
page read and write
|
||
7D5F000
|
stack
|
page read and write
|
||
860000
|
heap
|
page read and write
|
||
1207000
|
heap
|
page read and write
|
||
4B2000
|
heap
|
page read and write
|
||
243E000
|
stack
|
page read and write
|
||
45A000
|
heap
|
page read and write
|
||
221000
|
unkown
|
page execute read
|
||
4031000
|
heap
|
page read and write
|
||
16EB000
|
trusted library allocation
|
page execute and read and write
|
||
10AE000
|
stack
|
page read and write
|
||
19A8000
|
direct allocation
|
page execute and read and write
|
||
4031000
|
heap
|
page read and write
|
||
4031000
|
heap
|
page read and write
|
||
57CE000
|
stack
|
page read and write
|
||
5D4000
|
heap
|
page read and write
|
||
2840000
|
heap
|
page read and write
|
||
524000
|
heap
|
page read and write
|
||
B8C000
|
stack
|
page read and write
|
||
4470000
|
unkown
|
page execute and read and write
|
||
1020000
|
direct allocation
|
page read and write
|
||
4031000
|
heap
|
page read and write
|
||
5686000
|
trusted library allocation
|
page read and write
|
||
968000
|
heap
|
page read and write
|
||
16B0000
|
trusted library allocation
|
page read and write
|
||
4EA000
|
heap
|
page read and write
|
||
2782000
|
unkown
|
page read and write
|
||
4031000
|
heap
|
page read and write
|
||
30A0000
|
trusted library allocation
|
page read and write
|
||
16B3000
|
trusted library allocation
|
page execute and read and write
|
||
4031000
|
heap
|
page read and write
|
||
830000
|
unkown
|
page readonly
|
||
58B0000
|
trusted library allocation
|
page read and write
|
||
16BD000
|
trusted library allocation
|
page execute and read and write
|
||
4031000
|
heap
|
page read and write
|
||
4F2E000
|
system
|
page execute and read and write
|
||
7702000
|
heap
|
page read and write
|
||
C2F000
|
stack
|
page read and write
|
||
C30000
|
unkown
|
page readonly
|
||
4031000
|
heap
|
page read and write
|
||
4031000
|
heap
|
page read and write
|
||
4031000
|
heap
|
page read and write
|
||
5850000
|
trusted library allocation
|
page read and write
|
||
1660000
|
direct allocation
|
page execute and read and write
|
||
5C0000
|
unkown
|
page readonly
|
||
2FD6000
|
unkown
|
page read and write
|
||
1926000
|
direct allocation
|
page execute and read and write
|
||
5A1E000
|
stack
|
page read and write
|
||
56A8000
|
trusted library allocation
|
page read and write
|
||
4031000
|
heap
|
page read and write
|
||
4031000
|
heap
|
page read and write
|
||
22E000
|
unkown
|
page readonly
|
||
567E000
|
trusted library allocation
|
page read and write
|
||
3A70000
|
unkown
|
page execute and read and write
|
||
1710000
|
trusted library allocation
|
page execute and read and write
|
||
58A000
|
stack
|
page read and write
|
||
4031000
|
heap
|
page read and write
|
||
2F3E000
|
stack
|
page read and write
|
||
4031000
|
heap
|
page read and write
|
||
5E5000
|
heap
|
page read and write
|
||
480000
|
unkown
|
page readonly
|
||
F51000
|
unkown
|
page readonly
|
||
4031000
|
heap
|
page read and write
|
||
653E000
|
stack
|
page read and write
|
||
EB000
|
stack
|
page read and write
|
||
4031000
|
heap
|
page read and write
|
||
4031000
|
heap
|
page read and write
|
||
FD1000
|
unkown
|
page readonly
|
||
4031000
|
heap
|
page read and write
|
||
7D9E000
|
stack
|
page read and write
|
||
BBF000
|
stack
|
page read and write
|
||
79AE000
|
stack
|
page read and write
|
||
4310000
|
trusted library allocation
|
page read and write
|
||
961000
|
unkown
|
page readonly
|
||
41BB000
|
trusted library allocation
|
page read and write
|
||
221000
|
unkown
|
page execute read
|
||
4031000
|
heap
|
page read and write
|
||
5664000
|
trusted library allocation
|
page read and write
|
||
23AE000
|
stack
|
page read and write
|
||
58C0000
|
trusted library section
|
page read and write
|
||
1355000
|
heap
|
page read and write
|
||
1700000
|
trusted library allocation
|
page read and write
|
||
4031000
|
heap
|
page read and write
|
||
41B0000
|
trusted library allocation
|
page read and write
|
||
4031000
|
heap
|
page read and write
|
||
900000
|
heap
|
page read and write
|
||
1200000
|
heap
|
page read and write
|
||
133E000
|
stack
|
page read and write
|
||
4031000
|
heap
|
page read and write
|
||
2684000
|
heap
|
page read and write
|
||
5D4000
|
heap
|
page read and write
|
||
4031000
|
heap
|
page read and write
|
||
438D000
|
heap
|
page read and write
|
||
4031000
|
heap
|
page read and write
|
||
5FC000
|
stack
|
page read and write
|
||
16C4000
|
trusted library allocation
|
page read and write
|
||
56BD000
|
trusted library allocation
|
page read and write
|
||
4031000
|
heap
|
page read and write
|
||
12F0000
|
heap
|
page read and write
|
||
526E000
|
stack
|
page read and write
|
||
4671000
|
direct allocation
|
page execute and read and write
|
||
2684000
|
heap
|
page read and write
|
||
16D0000
|
trusted library allocation
|
page read and write
|
||
470000
|
unkown
|
page readonly
|
||
4318000
|
heap
|
page read and write
|
||
ABE000
|
stack
|
page read and write
|
||
5874000
|
trusted library allocation
|
page read and write
|
||
25AF000
|
stack
|
page read and write
|
||
5660000
|
trusted library allocation
|
page read and write
|
||
4031000
|
heap
|
page read and write
|
||
16E0000
|
trusted library allocation
|
page read and write
|
||
2460000
|
unkown
|
page read and write
|
||
4031000
|
heap
|
page read and write
|
||
4031000
|
heap
|
page read and write
|
||
4031000
|
heap
|
page read and write
|
||
470000
|
unkown
|
page readonly
|
||
4031000
|
heap
|
page read and write
|
||
E31000
|
unkown
|
page readonly
|
||
94E000
|
stack
|
page read and write
|
||
520000
|
unkown
|
page readonly
|
||
4031000
|
heap
|
page read and write
|
||
16B4000
|
trusted library allocation
|
page read and write
|
||
643E000
|
stack
|
page read and write
|
||
25D0000
|
unkown
|
page read and write
|
||
4031000
|
heap
|
page read and write
|
||
5D4000
|
heap
|
page read and write
|
||
F51000
|
unkown
|
page readonly
|
||
4031000
|
heap
|
page read and write
|
||
4031000
|
heap
|
page read and write
|
||
235000
|
unkown
|
page read and write
|
||
7E5F000
|
stack
|
page read and write
|
||
57E000
|
stack
|
page read and write
|
||
463000
|
heap
|
page read and write
|
||
458000
|
heap
|
page read and write
|
||
4031000
|
heap
|
page read and write
|
||
24B0000
|
heap
|
page read and write
|
||
58B5000
|
trusted library allocation
|
page read and write
|
||
44A6000
|
unclassified section
|
page execute and read and write
|
||
4E0000
|
heap
|
page read and write
|
||
4031000
|
heap
|
page read and write
|
||
4031000
|
heap
|
page read and write
|
||
463000
|
heap
|
page read and write
|
||
5880000
|
trusted library allocation
|
page read and write
|
||
76FC000
|
heap
|
page read and write
|
||
11C8000
|
heap
|
page read and write
|
||
4031000
|
heap
|
page read and write
|
||
49CC000
|
unclassified section
|
page read and write
|
||
5166000
|
unkown
|
page execute and read and write
|
||
772A000
|
heap
|
page read and write
|
||
870000
|
heap
|
page read and write
|
||
4031000
|
heap
|
page read and write
|
||
4F14000
|
unclassified section
|
page execute and read and write
|
||
30D1000
|
trusted library allocation
|
page read and write
|
||
27B0000
|
trusted library allocation
|
page read and write
|
||
235000
|
unkown
|
page read and write
|
||
4F09000
|
system
|
page execute and read and write
|
||
4031000
|
heap
|
page read and write
|
||
4031000
|
heap
|
page read and write
|
||
4031000
|
heap
|
page read and write
|
||
5D0000
|
unkown
|
page readonly
|
||
2A5C000
|
unkown
|
page read and write
|
||
4031000
|
heap
|
page read and write
|
||
2A5C000
|
unkown
|
page read and write
|
||
4031000
|
heap
|
page read and write
|
||
4F46000
|
unclassified section
|
page read and write
|
||
980000
|
heap
|
page read and write
|
||
4031000
|
heap
|
page read and write
|
||
968000
|
heap
|
page read and write
|
||
519000
|
heap
|
page read and write
|
||
2664000
|
heap
|
page read and write
|
||
514000
|
heap
|
page read and write
|
||
4031000
|
heap
|
page read and write
|
||
45E000
|
heap
|
page read and write
|
||
4031000
|
heap
|
page read and write
|
||
950000
|
unkown
|
page read and write
|
||
4031000
|
heap
|
page read and write
|
||
D62000
|
unkown
|
page readonly
|
||
4B6000
|
heap
|
page read and write
|
||
5D0000
|
heap
|
page read and write
|
||
5C1E000
|
stack
|
page read and write
|
||
4031000
|
heap
|
page read and write
|
||
4031000
|
heap
|
page read and write
|
||
4031000
|
heap
|
page read and write
|
||
1E0000
|
heap
|
page read and write
|
||
4A3000
|
heap
|
page read and write
|
||
4031000
|
heap
|
page read and write
|
||
1D0000
|
heap
|
page read and write
|
||
4A7000
|
heap
|
page read and write
|
||
4031000
|
heap
|
page read and write
|
||
3833C000
|
system
|
page read and write
|
||
C30000
|
unkown
|
page readonly
|
||
2664000
|
heap
|
page read and write
|
||
BC0000
|
unkown
|
page readonly
|
||
4031000
|
heap
|
page read and write
|
||
4B6000
|
heap
|
page read and write
|
||
4031000
|
heap
|
page read and write
|
||
4031000
|
heap
|
page read and write
|
||
44C9000
|
direct allocation
|
page execute and read and write
|
||
7DDF000
|
stack
|
page read and write
|
||
4031000
|
heap
|
page read and write
|
||
4E4000
|
heap
|
page read and write
|
||
4031000
|
heap
|
page read and write
|
||
237000
|
unkown
|
page readonly
|
||
4031000
|
heap
|
page read and write
|
||
128000
|
stack
|
page read and write
|
||
4031000
|
heap
|
page read and write
|
||
4031000
|
heap
|
page read and write
|
||
7737000
|
heap
|
page read and write
|
||
56A0000
|
trusted library allocation
|
page read and write
|
||
6EE000
|
stack
|
page read and write
|
||
469000
|
heap
|
page read and write
|
||
4031000
|
heap
|
page read and write
|
||
715000
|
unkown
|
page read and write
|
||
48A000
|
heap
|
page read and write
|
||
22E000
|
unkown
|
page readonly
|
||
51D4000
|
unkown
|
page execute and read and write
|
||
796D000
|
stack
|
page read and write
|
||
988000
|
heap
|
page read and write
|
||
220000
|
unkown
|
page readonly
|
||
4031000
|
heap
|
page read and write
|
||
4031000
|
heap
|
page read and write
|
||
2DB0000
|
unclassified section
|
page execute and read and write
|
||
5D1F000
|
stack
|
page read and write
|
||
870000
|
heap
|
page read and write
|
||
4031000
|
heap
|
page read and write
|
||
960000
|
heap
|
page read and write
|
||
4031000
|
heap
|
page read and write
|
||
56B0000
|
trusted library allocation
|
page read and write
|
||
4BB000
|
heap
|
page read and write
|
||
4031000
|
heap
|
page read and write
|
||
2ED0000
|
heap
|
page read and write
|
||
4031000
|
heap
|
page read and write
|
||
500000
|
unkown
|
page readonly
|
||
770C000
|
heap
|
page read and write
|
||
22E000
|
unkown
|
page readonly
|
||
2680000
|
heap
|
page read and write
|
||
4031000
|
heap
|
page read and write
|
||
4031000
|
heap
|
page read and write
|
||
56B5000
|
trusted library allocation
|
page read and write
|
||
490000
|
unkown
|
page readonly
|
||
4031000
|
heap
|
page read and write
|
||
4031000
|
heap
|
page read and write
|
||
4031000
|
heap
|
page read and write
|
||
5870000
|
trusted library allocation
|
page read and write
|
||
50F000
|
heap
|
page read and write
|
||
7E1E000
|
stack
|
page read and write
|
||
511000
|
heap
|
page read and write
|
||
980000
|
heap
|
page read and write
|
||
950000
|
unkown
|
page read and write
|
||
5695000
|
trusted library allocation
|
page read and write
|
||
840000
|
unkown
|
page readonly
|
||
4031000
|
heap
|
page read and write
|
||
4031000
|
heap
|
page read and write
|
||
840000
|
unkown
|
page readonly
|
||
7721000
|
heap
|
page read and write
|
||
27B4000
|
heap
|
page read and write
|
||
237000
|
unkown
|
page readonly
|
||
4031000
|
heap
|
page read and write
|
||
11F5000
|
heap
|
page read and write
|
||
565E000
|
stack
|
page read and write
|
||
850000
|
unkown
|
page readonly
|
||
508000
|
heap
|
page read and write
|
||
4D2000
|
heap
|
page read and write
|
||
4030000
|
heap
|
page read and write
|
||
490000
|
unkown
|
page readonly
|
||
4031000
|
heap
|
page read and write
|
||
279F000
|
stack
|
page read and write
|
||
37B0000
|
unclassified section
|
page execute and read and write
|
||
10B0000
|
heap
|
page read and write
|
||
5860000
|
trusted library allocation
|
page read and write
|
||
4031000
|
heap
|
page read and write
|
||
4031000
|
heap
|
page read and write
|
||
307E000
|
stack
|
page read and write
|
||
463000
|
heap
|
page read and write
|
||
4031000
|
heap
|
page read and write
|
||
97F000
|
heap
|
page read and write
|
||
7744000
|
heap
|
page read and write
|
||
5BE000
|
stack
|
page read and write
|
||
458000
|
heap
|
page read and write
|
||
961000
|
unkown
|
page readonly
|
||
5C0000
|
unkown
|
page readonly
|
||
4031000
|
heap
|
page read and write
|
||
220000
|
unkown
|
page readonly
|
||
76F5000
|
heap
|
page read and write
|
||
4031000
|
heap
|
page read and write
|
||
E31000
|
unkown
|
page readonly
|
||
4031000
|
heap
|
page read and write
|
||
43A0000
|
direct allocation
|
page execute and read and write
|
||
4031000
|
heap
|
page read and write
|
||
2470000
|
unkown
|
page read and write
|
||
7734000
|
heap
|
page read and write
|
||
4031000
|
heap
|
page read and write
|
||
4031000
|
heap
|
page read and write
|
||
4031000
|
heap
|
page read and write
|
||
4031000
|
heap
|
page read and write
|
||
25B0000
|
unkown
|
page readonly
|
||
1285000
|
heap
|
page read and write
|
||
46A000
|
heap
|
page read and write
|
||
5662000
|
trusted library allocation
|
page read and write
|
||
15CF000
|
stack
|
page read and write
|
||
40D5000
|
trusted library allocation
|
page read and write
|
||
BC0000
|
unkown
|
page readonly
|
||
221000
|
unkown
|
page execute read
|
||
2440000
|
unkown
|
page readonly
|
||
4031000
|
heap
|
page read and write
|
||
4031000
|
heap
|
page read and write
|
||
4031000
|
heap
|
page read and write
|
||
2660000
|
heap
|
page read and write
|
||
4031000
|
heap
|
page read and write
|
||
4031000
|
heap
|
page read and write
|
||
45E000
|
heap
|
page read and write
|
||
4031000
|
heap
|
page read and write
|
||
4031000
|
heap
|
page read and write
|
||
4031000
|
heap
|
page read and write
|
||
440000
|
heap
|
page read and write
|
||
24B0000
|
heap
|
page read and write
|
||
970000
|
unkown
|
page read and write
|
||
438D000
|
stack
|
page read and write
|
||
4F6000
|
heap
|
page read and write
|
||
2690000
|
unkown
|
page readonly
|
||
2EF0000
|
heap
|
page read and write
|
||
4310000
|
trusted library allocation
|
page read and write
|
||
850000
|
unkown
|
page readonly
|
||
950000
|
unkown
|
page read and write
|
||
463000
|
heap
|
page read and write
|
||
4031000
|
heap
|
page read and write
|
||
4310000
|
trusted library allocation
|
page read and write
|
||
510000
|
unkown
|
page readonly
|
||
30B0000
|
trusted library allocation
|
page read and write
|
||
221000
|
unkown
|
page execute read
|
||
4031000
|
heap
|
page read and write
|
||
24AF000
|
stack
|
page read and write
|
||
590D000
|
stack
|
page read and write
|
||
4031000
|
heap
|
page read and write
|
||
2670000
|
unkown
|
page execute and read and write
|
||
C2F000
|
stack
|
page read and write
|
||
5E0000
|
heap
|
page read and write
|
There are 538 hidden memdumps, click here to show them.