Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
fatura.bat.exe
|
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
|
initial sample
|
||
C:\Users\user\AppData\Local\Temp\note\nots.dat
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\tmpAAA4.tmp
|
XML 1.0 document, ASCII text
|
dropped
|
||
C:\Users\user\AppData\Roaming\KGuxmqSTXgJca.exe
|
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\KGuxmqSTXgJca.exe.log
|
ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\fatura.bat.exe.log
|
ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\3D003UC5\json[1].json
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_2uamyaq1.zpv.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_bol0pcrw.z3l.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_gckufed5.0c3.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_yvsphlti.aln.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\tmpC233.tmp
|
XML 1.0 document, ASCII text
|
dropped
|
||
C:\Users\user\AppData\Roaming\KGuxmqSTXgJca.exe:Zone.Identifier
|
ASCII text, with CRLF line terminators
|
dropped
|
There are 4 hidden files, click here to show them.
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\fatura.bat.exe
|
"C:\Users\user\Desktop\fatura.bat.exe"
|
||
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
|
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\KGuxmqSTXgJca.exe"
|
||
C:\Windows\SysWOW64\schtasks.exe
|
"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\KGuxmqSTXgJca" /XML "C:\Users\user\AppData\Local\Temp\tmpAAA4.tmp"
|
||
C:\Users\user\Desktop\fatura.bat.exe
|
"C:\Users\user\Desktop\fatura.bat.exe"
|
||
C:\Users\user\Desktop\fatura.bat.exe
|
"C:\Users\user\Desktop\fatura.bat.exe"
|
||
C:\Users\user\AppData\Roaming\KGuxmqSTXgJca.exe
|
C:\Users\user\AppData\Roaming\KGuxmqSTXgJca.exe
|
||
C:\Windows\SysWOW64\schtasks.exe
|
"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\KGuxmqSTXgJca" /XML "C:\Users\user\AppData\Local\Temp\tmpC233.tmp"
|
||
C:\Users\user\AppData\Roaming\KGuxmqSTXgJca.exe
|
"C:\Users\user\AppData\Roaming\KGuxmqSTXgJca.exe"
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\wbem\WmiPrvSE.exe
|
C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
There are 2 hidden processes, click here to show them.
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
http://geoplugin.net/json.gp
|
178.237.33.50
|
||
sembe.duckdns.org
|
|||
http://geoplugin.net/json.gp/C
|
unknown
|
||
http://www.apache.org/licenses/LICENSE-2.0
|
unknown
|
||
http://www.fontbureau.com
|
unknown
|
||
http://www.fontbureau.com/designersG
|
unknown
|
||
http://www.fontbureau.com/designers/?
|
unknown
|
||
http://www.founder.com.cn/cn/bThe
|
unknown
|
||
http://www.fontbureau.com/designers?
|
unknown
|
||
http://www.tiro.com
|
unknown
|
||
http://www.fontbureau.com/designers
|
unknown
|
||
http://www.goodfont.co.kr
|
unknown
|
||
https://www.chiark.greenend.org.uk/~sgtatham/putty/0
|
unknown
|
||
http://geoplugin.net/json.gpSystem32
|
unknown
|
||
http://www.carterandcone.coml
|
unknown
|
||
http://www.sajatypeworks.com
|
unknown
|
||
http://www.typography.netD
|
unknown
|
||
http://www.fontbureau.com/designers/cabarga.htmlN
|
unknown
|
||
http://www.founder.com.cn/cn/cThe
|
unknown
|
||
http://www.galapagosdesign.com/staff/dennis.htm
|
unknown
|
||
http://www.founder.com.cn/cn
|
unknown
|
||
http://www.fontbureau.com/designers/frere-user.html
|
unknown
|
||
http://www.jiyu-kobo.co.jp/
|
unknown
|
||
http://www.galapagosdesign.com/DPlease
|
unknown
|
||
http://www.fontbureau.com/designers8
|
unknown
|
||
http://www.fonts.com
|
unknown
|
||
http://www.sandoll.co.kr
|
unknown
|
||
http://www.urwpp.deDPlease
|
unknown
|
||
http://ocsp.comodoca.co
|
unknown
|
||
http://www.zhongyicts.com.cn
|
unknown
|
||
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
|
unknown
|
||
http://www.sakkal.com
|
unknown
|
||
https://secure.comodo
|
unknown
|
There are 23 hidden URLs, click here to show them.
Domains
Name
|
IP
|
Malicious
|
|
---|---|---|---|
sembe.duckdns.org
|
194.187.251.115
|
||
geoplugin.net
|
178.237.33.50
|
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
194.187.251.115
|
sembe.duckdns.org
|
United Kingdom
|
||
178.237.33.50
|
geoplugin.net
|
Netherlands
|
Registry
Path
|
Value
|
Malicious
|
|
---|---|---|---|
HKEY_CURRENT_USER\SOFTWARE\Rmc-999Z97
|
exepath
|
||
HKEY_CURRENT_USER\SOFTWARE\Rmc-999Z97
|
licence
|
||
HKEY_CURRENT_USER\SOFTWARE\Rmc-999Z97
|
time
|
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
2B21000
|
trusted library allocation
|
page read and write
|
||
3261000
|
trusted library allocation
|
page read and write
|
||
5C10000
|
trusted library section
|
page read and write
|
||
400000
|
remote allocation
|
page execute and read and write
|
||
A9B000
|
heap
|
page read and write
|
||
443E000
|
trusted library allocation
|
page read and write
|
||
ED7000
|
heap
|
page read and write
|
||
9FAE000
|
stack
|
page read and write
|
||
1401000
|
heap
|
page read and write
|
||
F55000
|
heap
|
page read and write
|
||
172B000
|
stack
|
page read and write
|
||
2610000
|
heap
|
page read and write
|
||
9ACE000
|
stack
|
page read and write
|
||
13B0000
|
trusted library allocation
|
page execute and read and write
|
||
1380000
|
trusted library allocation
|
page read and write
|
||
17B0000
|
trusted library allocation
|
page read and write
|
||
478000
|
remote allocation
|
page execute and read and write
|
||
2AA0000
|
trusted library allocation
|
page read and write
|
||
4353000
|
trusted library allocation
|
page read and write
|
||
103E000
|
stack
|
page read and write
|
||
B2E000
|
stack
|
page read and write
|
||
2D3F000
|
stack
|
page read and write
|
||
3CFE000
|
trusted library allocation
|
page read and write
|
||
D2A000
|
heap
|
page read and write
|
||
7760000
|
heap
|
page read and write
|
||
1350000
|
trusted library allocation
|
page read and write
|
||
75F000
|
stack
|
page read and write
|
||
4F20000
|
heap
|
page read and write
|
||
7A5F000
|
trusted library allocation
|
page read and write
|
||
145B000
|
heap
|
page read and write
|
||
CB7000
|
heap
|
page read and write
|
||
BB0000
|
trusted library allocation
|
page read and write
|
||
A0EE000
|
stack
|
page read and write
|
||
178E000
|
trusted library allocation
|
page read and write
|
||
530D000
|
stack
|
page read and write
|
||
17C0000
|
heap
|
page read and write
|
||
12F7000
|
stack
|
page read and write
|
||
2C3D000
|
stack
|
page read and write
|
||
CD2000
|
heap
|
page read and write
|
||
3FCB000
|
trusted library allocation
|
page read and write
|
||
5125000
|
heap
|
page read and write
|
||
AF7E000
|
stack
|
page read and write
|
||
3C13000
|
trusted library allocation
|
page read and write
|
||
16E0000
|
heap
|
page read and write
|
||
4F00000
|
heap
|
page read and write
|
||
5930000
|
trusted library section
|
page readonly
|
||
4E82000
|
trusted library allocation
|
page read and write
|
||
F4D000
|
heap
|
page read and write
|
||
56F3000
|
heap
|
page read and write
|
||
2A81000
|
trusted library allocation
|
page read and write
|
||
AE3F000
|
stack
|
page read and write
|
||
6D61000
|
heap
|
page read and write
|
||
5330000
|
heap
|
page read and write
|
||
A82E000
|
stack
|
page read and write
|
||
2BFF000
|
stack
|
page read and write
|
||
C60000
|
heap
|
page read and write
|
||
5350000
|
heap
|
page read and write
|
||
A60000
|
heap
|
page read and write
|
||
BFB000
|
trusted library allocation
|
page execute and read and write
|
||
B0BE000
|
stack
|
page read and write
|
||
6F30000
|
trusted library allocation
|
page read and write
|
||
620000
|
heap
|
page read and write
|
||
D36000
|
heap
|
page read and write
|
||
F50000
|
heap
|
page read and write
|
||
AAAE000
|
stack
|
page read and write
|
||
56D0000
|
heap
|
page read and write
|
||
35EA000
|
trusted library allocation
|
page read and write
|
||
5CF000
|
unkown
|
page read and write
|
||
629E000
|
heap
|
page read and write
|
||
7D00000
|
trusted library allocation
|
page execute and read and write
|
||
CC5000
|
heap
|
page read and write
|
||
E9E000
|
stack
|
page read and write
|
||
2AC0000
|
trusted library allocation
|
page read and write
|
||
6D7B000
|
heap
|
page read and write
|
||
2AE0000
|
trusted library allocation
|
page read and write
|
||
3B29000
|
trusted library allocation
|
page read and write
|
||
4305000
|
trusted library allocation
|
page read and write
|
||
2E3F000
|
stack
|
page read and write
|
||
747F000
|
stack
|
page read and write
|
||
9D6E000
|
stack
|
page read and write
|
||
3190000
|
heap
|
page read and write
|
||
93C000
|
stack
|
page read and write
|
||
78B3000
|
heap
|
page read and write
|
||
13CE000
|
heap
|
page read and write
|
||
31D0000
|
heap
|
page read and write
|
||
2A20000
|
heap
|
page read and write
|
||
40AF000
|
trusted library allocation
|
page read and write
|
||
A22C000
|
stack
|
page read and write
|
||
CFC000
|
stack
|
page read and write
|
||
5950000
|
heap
|
page read and write
|
||
E98000
|
trusted library allocation
|
page read and write
|
||
C5E000
|
stack
|
page read and write
|
||
6F40000
|
trusted library allocation
|
page read and write
|
||
5160000
|
heap
|
page execute and read and write
|
||
4EF4000
|
trusted library section
|
page readonly
|
||
F70000
|
heap
|
page read and write
|
||
48AF000
|
trusted library allocation
|
page read and write
|
||
1796000
|
trusted library allocation
|
page read and write
|
||
2A60000
|
trusted library allocation
|
page read and write
|
||
D40000
|
heap
|
page read and write
|
||
3010000
|
heap
|
page read and write
|
||
318F000
|
unkown
|
page read and write
|
||
16CE000
|
stack
|
page read and write
|
||
3220000
|
trusted library allocation
|
page read and write
|
||
BDD000
|
trusted library allocation
|
page execute and read and write
|
||
9FEE000
|
stack
|
page read and write
|
||
3E80000
|
trusted library allocation
|
page read and write
|
||
A50000
|
heap
|
page read and write
|
||
59B0000
|
trusted library section
|
page read and write
|
||
138B000
|
trusted library allocation
|
page execute and read and write
|
||
332E000
|
stack
|
page read and write
|
||
2A86000
|
trusted library allocation
|
page read and write
|
||
2D7D000
|
stack
|
page read and write
|
||
A00000
|
heap
|
page read and write
|
||
7F7E000
|
stack
|
page read and write
|
||
13A0000
|
trusted library allocation
|
page read and write
|
||
5130000
|
trusted library allocation
|
page read and write
|
||
7A7000
|
stack
|
page read and write
|
||
737E000
|
stack
|
page read and write
|
||
3B21000
|
trusted library allocation
|
page read and write
|
||
5730000
|
trusted library allocation
|
page execute and read and write
|
||
83C000
|
stack
|
page read and write
|
||
32F9000
|
trusted library allocation
|
page read and write
|
||
133E000
|
stack
|
page read and write
|
||
31FB000
|
heap
|
page read and write
|
||
3FF5000
|
trusted library allocation
|
page read and write
|
||
B23B000
|
stack
|
page read and write
|
||
1BD000
|
stack
|
page read and write
|
||
F18000
|
heap
|
page read and write
|
||
11A0000
|
trusted library allocation
|
page read and write
|
||
314E000
|
unkown
|
page read and write
|
||
C80000
|
trusted library allocation
|
page execute and read and write
|
||
1750000
|
trusted library allocation
|
page read and write
|
||
4F10000
|
heap
|
page read and write
|
||
AC10000
|
heap
|
page read and write
|
||
460000
|
heap
|
page read and write
|
||
5710000
|
trusted library allocation
|
page read and write
|
||
2EBE000
|
stack
|
page read and write
|
||
5960000
|
heap
|
page read and write
|
||
CD0000
|
heap
|
page read and write
|
||
5CA0000
|
trusted library allocation
|
page read and write
|
||
136D000
|
trusted library allocation
|
page execute and read and write
|
||
D10000
|
heap
|
page read and write
|
||
3210000
|
trusted library allocation
|
page read and write
|
||
1354000
|
trusted library allocation
|
page read and write
|
||
6D40000
|
heap
|
page read and write
|
||
5940000
|
heap
|
page read and write
|
||
535B000
|
stack
|
page read and write
|
||
7D4E000
|
stack
|
page read and write
|
||
4E70000
|
heap
|
page read and write
|
||
7F3E000
|
stack
|
page read and write
|
||
A80000
|
heap
|
page read and write
|
||
3030000
|
heap
|
page read and write
|
||
7A50000
|
trusted library allocation
|
page read and write
|
||
11B7000
|
heap
|
page read and write
|
||
474000
|
remote allocation
|
page execute and read and write
|
||
50FB000
|
stack
|
page read and write
|
||
5D0000
|
heap
|
page read and write
|
||
D82000
|
unkown
|
page readonly
|
||
2BC3000
|
trusted library allocation
|
page read and write
|
||
2A8D000
|
trusted library allocation
|
page read and write
|
||
7360000
|
trusted library allocation
|
page read and write
|
||
5120000
|
heap
|
page read and write
|
||
7A90000
|
trusted library allocation
|
page read and write
|
||
BCD000
|
trusted library allocation
|
page execute and read and write
|
||
FCE000
|
stack
|
page read and write
|
||
62B0000
|
heap
|
page read and write
|
||
7860000
|
heap
|
page read and write
|
||
9EAE000
|
stack
|
page read and write
|
||
5A60000
|
trusted library allocation
|
page read and write
|
||
F35000
|
heap
|
page read and write
|
||
6279000
|
heap
|
page read and write
|
||
62AC000
|
heap
|
page read and write
|
||
776C000
|
heap
|
page read and write
|
||
2A6B000
|
trusted library allocation
|
page read and write
|
||
62A000
|
heap
|
page read and write
|
||
6270000
|
heap
|
page read and write
|
||
1730000
|
heap
|
page read and write
|
||
7FBE000
|
stack
|
page read and write
|
||
17A2000
|
trusted library allocation
|
page read and write
|
||
474000
|
remote allocation
|
page execute and read and write
|
||
5990000
|
trusted library allocation
|
page read and write
|
||
6AA000
|
stack
|
page read and write
|
||
BF7000
|
trusted library allocation
|
page execute and read and write
|
||
13F4000
|
heap
|
page read and write
|
||
2FBF000
|
stack
|
page read and write
|
||
A12C000
|
stack
|
page read and write
|
||
61E000
|
stack
|
page read and write
|
||
6F3E000
|
trusted library allocation
|
page read and write
|
||
177B000
|
trusted library allocation
|
page read and write
|
||
BC4000
|
trusted library allocation
|
page read and write
|
||
BE6000
|
trusted library allocation
|
page execute and read and write
|
||
31F0000
|
heap
|
page read and write
|
||
1433000
|
heap
|
page read and write
|
||
4ED0000
|
trusted library allocation
|
page read and write
|
||
13C0000
|
heap
|
page read and write
|
||
3F3B000
|
trusted library allocation
|
page read and write
|
||
2ABF000
|
stack
|
page read and write
|
||
1FA000
|
stack
|
page read and write
|
||
59C0000
|
heap
|
page execute and read and write
|
||
B95000
|
heap
|
page read and write
|
||
5C20000
|
heap
|
page read and write
|
||
F27000
|
heap
|
page read and write
|
||
1774000
|
trusted library allocation
|
page read and write
|
||
BF2000
|
trusted library allocation
|
page read and write
|
||
29BC000
|
stack
|
page read and write
|
||
5329000
|
trusted library allocation
|
page read and write
|
||
BE0000
|
trusted library allocation
|
page read and write
|
||
2AB0000
|
trusted library allocation
|
page read and write
|
||
3215000
|
trusted library allocation
|
page read and write
|
||
3E3E000
|
trusted library allocation
|
page read and write
|
||
AC00000
|
heap
|
page read and write
|
||
5340000
|
heap
|
page read and write
|
||
2AFC000
|
stack
|
page read and write
|
||
1360000
|
trusted library allocation
|
page read and write
|
||
AE7E000
|
stack
|
page read and write
|
||
1760000
|
heap
|
page read and write
|
||
AE0000
|
heap
|
page read and write
|
||
FE0000
|
heap
|
page read and write
|
||
A96E000
|
stack
|
page read and write
|
||
4EC0000
|
trusted library allocation
|
page execute and read and write
|
||
1363000
|
trusted library allocation
|
page read and write
|
||
FD0000
|
heap
|
page read and write
|
||
9BCE000
|
stack
|
page read and write
|
||
470000
|
heap
|
page read and write
|
||
2AB5000
|
trusted library allocation
|
page read and write
|
||
387E000
|
stack
|
page read and write
|
||
A9AE000
|
stack
|
page read and write
|
||
1372000
|
trusted library allocation
|
page read and write
|
||
E5E000
|
stack
|
page read and write
|
||
42B7000
|
trusted library allocation
|
page read and write
|
||
F09000
|
stack
|
page read and write
|
||
137A000
|
trusted library allocation
|
page execute and read and write
|
||
4FEF000
|
trusted library allocation
|
page read and write
|
||
345F000
|
stack
|
page read and write
|
||
13C8000
|
heap
|
page read and write
|
||
4ED4000
|
trusted library allocation
|
page read and write
|
||
1180000
|
heap
|
page execute and read and write
|
||
13FF000
|
heap
|
page read and write
|
||
4261000
|
trusted library allocation
|
page read and write
|
||
7382000
|
trusted library allocation
|
page read and write
|
||
C90000
|
heap
|
page read and write
|
||
6F60000
|
trusted library allocation
|
page execute and read and write
|
||
1791000
|
trusted library allocation
|
page read and write
|
||
B33C000
|
stack
|
page read and write
|
||
56E2000
|
trusted library allocation
|
page read and write
|
||
A36E000
|
stack
|
page read and write
|
||
135D000
|
trusted library allocation
|
page execute and read and write
|
||
4E8B000
|
trusted library allocation
|
page read and write
|
||
18CE000
|
stack
|
page read and write
|
||
2B10000
|
heap
|
page read and write
|
||
7330000
|
trusted library allocation
|
page execute and read and write
|
||
7868000
|
heap
|
page read and write
|
||
2EAA000
|
trusted library allocation
|
page read and write
|
||
7A60000
|
trusted library allocation
|
page read and write
|
||
5C25000
|
heap
|
page read and write
|
||
5320000
|
trusted library allocation
|
page read and write
|
||
5A50000
|
trusted library allocation
|
page execute and read and write
|
||
4EA0000
|
trusted library allocation
|
page read and write
|
||
4EF0000
|
trusted library section
|
page readonly
|
||
D3E000
|
heap
|
page read and write
|
||
AD3E000
|
stack
|
page read and write
|
||
1376000
|
trusted library allocation
|
page execute and read and write
|
||
3240000
|
trusted library allocation
|
page read and write
|
||
C98000
|
heap
|
page read and write
|
||
2DB9000
|
stack
|
page read and write
|
||
11B0000
|
heap
|
page read and write
|
||
C10000
|
trusted library allocation
|
page read and write
|
||
BD0000
|
trusted library allocation
|
page read and write
|
||
A87000
|
heap
|
page read and write
|
||
579B000
|
stack
|
page read and write
|
||
F30000
|
heap
|
page read and write
|
||
6C3E000
|
stack
|
page read and write
|
||
2A5B000
|
stack
|
page read and write
|
||
3178000
|
trusted library allocation
|
page read and write
|
||
58E000
|
unkown
|
page read and write
|
||
AFBE000
|
stack
|
page read and write
|
||
3250000
|
heap
|
page execute and read and write
|
||
D45000
|
heap
|
page read and write
|
||
6260000
|
heap
|
page read and write
|
||
2A92000
|
trusted library allocation
|
page read and write
|
||
80BE000
|
stack
|
page read and write
|
||
56E0000
|
trusted library allocation
|
page read and write
|
||
C9E000
|
heap
|
page read and write
|
||
D20000
|
heap
|
page read and write
|
||
17C7000
|
heap
|
page read and write
|
||
296F000
|
stack
|
page read and write
|
||
1479000
|
heap
|
page read and write
|
||
F80000
|
heap
|
page read and write
|
||
2A7E000
|
trusted library allocation
|
page read and write
|
||
13E7000
|
heap
|
page read and write
|
||
B6D000
|
stack
|
page read and write
|
||
1340000
|
trusted library allocation
|
page read and write
|
||
1370000
|
trusted library allocation
|
page read and write
|
||
1190000
|
trusted library allocation
|
page read and write
|
||
5C0D000
|
stack
|
page read and write
|
||
9A8E000
|
stack
|
page read and write
|
||
5310000
|
trusted library allocation
|
page execute and read and write
|
||
B0FE000
|
stack
|
page read and write
|
||
7C30000
|
trusted library section
|
page read and write
|
||
471000
|
remote allocation
|
page execute and read and write
|
||
7A80000
|
trusted library allocation
|
page execute and read and write
|
||
B90000
|
heap
|
page read and write
|
||
3319000
|
trusted library allocation
|
page read and write
|
||
5322000
|
trusted library allocation
|
page read and write
|
||
56F0000
|
heap
|
page read and write
|
||
316E000
|
stack
|
page read and write
|
||
BC0000
|
trusted library allocation
|
page read and write
|
||
B1FE000
|
stack
|
page read and write
|
||
11A4000
|
trusted library allocation
|
page read and write
|
||
1353000
|
trusted library allocation
|
page execute and read and write
|
||
6D3E000
|
stack
|
page read and write
|
||
54D0000
|
trusted library allocation
|
page read and write
|
||
179D000
|
trusted library allocation
|
page read and write
|
||
9BC000
|
stack
|
page read and write
|
||
A26E000
|
stack
|
page read and write
|
||
117B000
|
stack
|
page read and write
|
||
16D0000
|
trusted library allocation
|
page read and write
|
||
A86D000
|
stack
|
page read and write
|
||
4E80000
|
trusted library allocation
|
page read and write
|
||
6A90000
|
heap
|
page read and write
|
||
970000
|
heap
|
page read and write
|
||
2970000
|
heap
|
page read and write
|
||
113E000
|
stack
|
page read and write
|
||
ED0000
|
heap
|
page read and write
|
||
BE2000
|
trusted library allocation
|
page read and write
|
||
3FB3000
|
trusted library allocation
|
page read and write
|
||
397F000
|
stack
|
page read and write
|
||
1461000
|
heap
|
page read and write
|
||
998E000
|
stack
|
page read and write
|
||
4E90000
|
trusted library allocation
|
page execute and read and write
|
||
D58000
|
heap
|
page read and write
|
||
1405000
|
heap
|
page read and write
|
||
142B000
|
heap
|
page read and write
|
||
3DC5000
|
trusted library allocation
|
page read and write
|
||
F45000
|
heap
|
page read and write
|
||
BC3000
|
trusted library allocation
|
page execute and read and write
|
||
D80000
|
unkown
|
page readonly
|
||
BD3000
|
trusted library allocation
|
page read and write
|
||
168E000
|
stack
|
page read and write
|
||
EA0000
|
heap
|
page read and write
|
||
9E6E000
|
stack
|
page read and write
|
||
1387000
|
trusted library allocation
|
page execute and read and write
|
||
11A6000
|
trusted library allocation
|
page read and write
|
||
2A64000
|
trusted library allocation
|
page read and write
|
||
BEA000
|
trusted library allocation
|
page execute and read and write
|
||
1770000
|
trusted library allocation
|
page read and write
|
||
5700000
|
trusted library allocation
|
page execute and read and write
|
||
E8F000
|
stack
|
page read and write
|
||
4269000
|
trusted library allocation
|
page read and write
|
||
4F23000
|
heap
|
page read and write
|
||
1382000
|
trusted library allocation
|
page read and write
|
||
5740000
|
trusted library allocation
|
page read and write
|
There are 343 hidden memdumps, click here to show them.