Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
Dhl-Awb 0865252 copy.exe
|
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
|
initial sample
|
||
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\Dhl-Awb 0865252 copy.exe.log
|
ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\M66J6bJL8
|
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 7, database pages 89, cookie
0x36, schema 4, UTF-8, version-valid-for 7
|
modified
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_nlwtd1st.ptf.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_qsmjhytb.gcl.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_stfz1vrw.hr1.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_ulgv3afq.pqz.psm1
|
ASCII text, with no line terminators
|
dropped
|
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\Dhl-Awb 0865252 copy.exe
|
"C:\Users\user\Desktop\Dhl-Awb 0865252 copy.exe"
|
||
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
|
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\Dhl-Awb
0865252 copy.exe"
|
||
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
|
"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"
|
||
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
|
"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"
|
||
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
|
"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"
|
||
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
|
"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"
|
||
C:\Program Files (x86)\XBgKvIQFrovHTutzJcerXFcNqqxMkcgiDCsgSTMXpLyxUKpNiZmgrSMdfGcyOirzOmMKAdrrpZNOwpWk\kyiMYcMGDSlDbpzjCWbWMcLM.exe
|
"C:\Program Files (x86)\XBgKvIQFrovHTutzJcerXFcNqqxMkcgiDCsgSTMXpLyxUKpNiZmgrSMdfGcyOirzOmMKAdrrpZNOwpWk\kyiMYcMGDSlDbpzjCWbWMcLM.exe"
|
||
C:\Windows\SysWOW64\shutdown.exe
|
"C:\Windows\SysWOW64\shutdown.exe"
|
||
C:\Program Files (x86)\XBgKvIQFrovHTutzJcerXFcNqqxMkcgiDCsgSTMXpLyxUKpNiZmgrSMdfGcyOirzOmMKAdrrpZNOwpWk\kyiMYcMGDSlDbpzjCWbWMcLM.exe
|
"C:\Program Files (x86)\XBgKvIQFrovHTutzJcerXFcNqqxMkcgiDCsgSTMXpLyxUKpNiZmgrSMdfGcyOirzOmMKAdrrpZNOwpWk\kyiMYcMGDSlDbpzjCWbWMcLM.exe"
|
||
C:\Program Files\Mozilla Firefox\firefox.exe
|
"C:\Program Files\Mozilla Firefox\Firefox.exe"
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
There are 1 hidden processes, click here to show them.
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
http://www.gaglianoart.com/tkc9/?841x=vt184X98OtQ0g&_vwlXV=oBKUUw+PclqsYqdEbKEtDVc/KDwoXvBo9DCIQrGFa5weHyD+5aoGXzWKFV94V9YGYodsnZaFejxXMPAHsIU+z85ddO8AZcXSXUhPW2rioxtiyDW4lIg6y/ts8OoE/eZmyRHUaj6EOYJE
|
199.59.243.225
|
||
http://www.miagronorte.com.ar/tkc9/?841x=vt184X98OtQ0g&_vwlXV=jqPrS3qTJTYQyqmIO2oWpvyY27IGuuAVZrk4CsYV4ggQpJ+Sx5jgDbQO/kTudxVD2P5+GF+5Rpgt0cv3wgHwIeUjeoNPKFTOlZjvghZGk1Gz0fMZGvYjZW3H9aCrqsEs2ZJyz2Rypk9D
|
200.58.112.243
|
||
http://www.gaglianoart.com/tkc9/
|
199.59.243.225
|
||
http://www.sacredcoven.video/tkc9/?_vwlXV=YCrPnyMK6N0xyWsUxbMCVm51Kr/VqTP9Vc/bNERWwPWSWPqcFUgEexJj0TZSGRta9epkHr3byMGCsT7E2VhvMhjbiZjKxfqWasqVt4+J8b4ItYUw6rfNer58xbkW0yWLnZZ/5+MZPYqk&841x=vt184X98OtQ0g
|
185.151.30.215
|
||
http://www.miagronorte.com.ar/tkc9/
|
200.58.112.243
|
||
http://www.sacredcoven.video/tkc9/
|
185.151.30.215
|
||
https://ac.ecosia.org/autocomplete?q=
|
unknown
|
||
https://www.google.com
|
unknown
|
||
https://duckduckgo.com/chrome_newtab
|
unknown
|
||
https://duckduckgo.com/ac/?q=
|
unknown
|
||
http://www.sacredcoven.video
|
unknown
|
||
https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
|
unknown
|
||
https://www.badai77resmi.net/tkc9/?_vwlXV=I0Jr0RVqPQejCQdrgaLPMsULlzKKGbEqp1Zfy2JBtnoMUPjBPr4UJ6ld1D
|
unknown
|
||
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
|
unknown
|
||
https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
|
unknown
|
||
https://www.ecosia.org/newtab/
|
unknown
|
||
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
|
unknown
|
||
https://www.chiark.greenend.org.uk/~sgtatham/putty/0
|
unknown
|
||
https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
|
unknown
|
There are 9 hidden URLs, click here to show them.
Domains
Name
|
IP
|
Malicious
|
|
---|---|---|---|
www.sacredcoven.video
|
185.151.30.215
|
||
www.gaglianoart.com
|
199.59.243.225
|
||
badai77resmi.net
|
159.100.14.108
|
||
miagronorte.com.ar
|
200.58.112.243
|
||
www.blfyazilkd.net
|
unknown
|
||
www.prizesupermarket.com
|
unknown
|
||
www.badai77resmi.net
|
unknown
|
||
www.miagronorte.com.ar
|
unknown
|
||
www.bulkfun.top
|
203.161.46.103
|
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
159.100.14.108
|
badai77resmi.net
|
Germany
|
||
200.58.112.243
|
miagronorte.com.ar
|
Argentina
|
||
185.151.30.215
|
www.sacredcoven.video
|
United Kingdom
|
||
199.59.243.225
|
www.gaglianoart.com
|
United States
|
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
6230000
|
unkown
|
page execute and read and write
|
||
51C0000
|
trusted library section
|
page read and write
|
||
400000
|
remote allocation
|
page execute and read and write
|
||
5780000
|
system
|
page execute and read and write
|
||
2A71000
|
trusted library allocation
|
page read and write
|
||
2D30000
|
trusted library allocation
|
page read and write
|
||
2D6B000
|
trusted library allocation
|
page read and write
|
||
3610000
|
trusted library allocation
|
page read and write
|
||
1B70000
|
unclassified section
|
page execute and read and write
|
||
4DB0000
|
unclassified section
|
page execute and read and write
|
||
3280000
|
system
|
page execute and read and write
|
||
3760000
|
trusted library allocation
|
page read and write
|
||
12C0000
|
heap
|
page read and write
|
||
17AF000
|
stack
|
page read and write
|
||
11A0000
|
heap
|
page read and write
|
||
8540000
|
heap
|
page read and write
|
||
103C000
|
stack
|
page read and write
|
||
3A58000
|
unkown
|
page read and write
|
||
3661000
|
heap
|
page read and write
|
||
BB0000
|
trusted library allocation
|
page read and write
|
||
3661000
|
heap
|
page read and write
|
||
3661000
|
heap
|
page read and write
|
||
4B7000
|
unkown
|
page readonly
|
||
3661000
|
heap
|
page read and write
|
||
2D90000
|
heap
|
page read and write
|
||
3661000
|
heap
|
page read and write
|
||
34F7000
|
heap
|
page read and write
|
||
39D0000
|
direct allocation
|
page execute and read and write
|
||
1B30000
|
direct allocation
|
page read and write
|
||
1AC95DB0000
|
trusted library allocation
|
page read and write
|
||
1BB0000
|
unclassified section
|
page execute and read and write
|
||
3661000
|
heap
|
page read and write
|
||
9F7E000
|
stack
|
page read and write
|
||
C82000
|
heap
|
page read and write
|
||
1231000
|
unkown
|
page readonly
|
||
11D0000
|
unkown
|
page readonly
|
||
1270000
|
unkown
|
page readonly
|
||
3661000
|
heap
|
page read and write
|
||
3661000
|
heap
|
page read and write
|
||
57FE000
|
system
|
page execute and read and write
|
||
3661000
|
heap
|
page read and write
|
||
3540000
|
heap
|
page read and write
|
||
34E3000
|
heap
|
page read and write
|
||
3661000
|
heap
|
page read and write
|
||
C80000
|
heap
|
page read and write
|
||
3661000
|
heap
|
page read and write
|
||
3661000
|
heap
|
page read and write
|
||
1AC9445A000
|
heap
|
page read and write
|
||
3661000
|
heap
|
page read and write
|
||
106A000
|
stack
|
page read and write
|
||
1909000
|
direct allocation
|
page execute and read and write
|
||
3790000
|
heap
|
page read and write
|
||
34EA000
|
heap
|
page read and write
|
||
3661000
|
heap
|
page read and write
|
||
3661000
|
heap
|
page read and write
|
||
845E000
|
stack
|
page read and write
|
||
1090000
|
trusted library allocation
|
page read and write
|
||
1AC94354000
|
system
|
page execute and read and write
|
||
3481000
|
heap
|
page read and write
|
||
1346000
|
heap
|
page read and write
|
||
3482000
|
heap
|
page read and write
|
||
3661000
|
heap
|
page read and write
|
||
3661000
|
heap
|
page read and write
|
||
3525000
|
heap
|
page read and write
|
||
14AA6000
|
system
|
page read and write
|
||
1250000
|
unkown
|
page read and write
|
||
3661000
|
heap
|
page read and write
|
||
719B7FF000
|
stack
|
page read and write
|
||
C4E000
|
heap
|
page read and write
|
||
3661000
|
heap
|
page read and write
|
||
3661000
|
heap
|
page read and write
|
||
3470000
|
heap
|
page read and write
|
||
3D22000
|
unclassified section
|
page read and write
|
||
3525000
|
heap
|
page read and write
|
||
3661000
|
heap
|
page read and write
|
||
3946000
|
heap
|
page read and write
|
||
87A000
|
stack
|
page read and write
|
||
C48000
|
heap
|
page read and write
|
||
4AE000
|
unkown
|
page readonly
|
||
3661000
|
heap
|
page read and write
|
||
DF0000
|
unkown
|
page readonly
|
||
3661000
|
heap
|
page read and write
|
||
3661000
|
heap
|
page read and write
|
||
2A10000
|
trusted library allocation
|
page read and write
|
||
976000
|
stack
|
page read and write
|
||
15F0000
|
unkown
|
page readonly
|
||
542E000
|
stack
|
page read and write
|
||
3661000
|
heap
|
page read and write
|
||
34E5000
|
heap
|
page read and write
|
||
647B000
|
unkown
|
page execute and read and write
|
||
10A0000
|
heap
|
page read and write
|
||
122E000
|
stack
|
page read and write
|
||
11B0000
|
unkown
|
page readonly
|
||
2F80000
|
unkown
|
page readonly
|
||
B90000
|
trusted library allocation
|
page read and write
|
||
5455000
|
heap
|
page read and write
|
||
103E000
|
stack
|
page read and write
|
||
156F000
|
stack
|
page read and write
|
||
10C7000
|
heap
|
page read and write
|
||
1000000
|
unkown
|
page readonly
|
||
39B0000
|
unclassified section
|
page execute and read and write
|
||
3661000
|
heap
|
page read and write
|
||
366D000
|
heap
|
page read and write
|
||
11C0000
|
unkown
|
page readonly
|
||
3650000
|
heap
|
page read and write
|
||
4430000
|
unkown
|
page execute and read and write
|
||
34ED000
|
heap
|
page read and write
|
||
3661000
|
heap
|
page read and write
|
||
3661000
|
heap
|
page read and write
|
||
11D0000
|
heap
|
page read and write
|
||
BD7000
|
trusted library allocation
|
page execute and read and write
|
||
3661000
|
heap
|
page read and write
|
||
4B7000
|
unkown
|
page readonly
|
||
81F6000
|
heap
|
page read and write
|
||
5B00000
|
heap
|
page read and write
|
||
84DE000
|
stack
|
page read and write
|
||
88CE000
|
stack
|
page read and write
|
||
9BC0000
|
heap
|
page read and write
|
||
3661000
|
heap
|
page read and write
|
||
3661000
|
heap
|
page read and write
|
||
2A2E000
|
trusted library allocation
|
page read and write
|
||
4A0000
|
unkown
|
page readonly
|
||
DE0000
|
unkown
|
page readonly
|
||
3661000
|
heap
|
page read and write
|
||
4A1000
|
unkown
|
page execute read
|
||
3AC7000
|
trusted library allocation
|
page read and write
|
||
3661000
|
heap
|
page read and write
|
||
348C000
|
heap
|
page read and write
|
||
10C0000
|
heap
|
page read and write
|
||
1220000
|
unkown
|
page read and write
|
||
1AC9445F000
|
heap
|
page read and write
|
||
3661000
|
heap
|
page read and write
|
||
32F4000
|
heap
|
page read and write
|
||
3661000
|
heap
|
page read and write
|
||
3661000
|
heap
|
page read and write
|
||
3A79000
|
trusted library allocation
|
page read and write
|
||
11B0000
|
unkown
|
page readonly
|
||
197E000
|
direct allocation
|
page execute and read and write
|
||
2E70000
|
heap
|
page read and write
|
||
3661000
|
heap
|
page read and write
|
||
3661000
|
heap
|
page read and write
|
||
842E000
|
stack
|
page read and write
|
||
34D1000
|
heap
|
page read and write
|
||
4DB5000
|
trusted library allocation
|
page read and write
|
||
3661000
|
heap
|
page read and write
|
||
35F0000
|
trusted library allocation
|
page read and write
|
||
1AC9447F000
|
heap
|
page read and write
|
||
81FC000
|
heap
|
page read and write
|
||
3661000
|
heap
|
page read and write
|
||
3661000
|
heap
|
page read and write
|
||
BA0000
|
heap
|
page read and write
|
||
3661000
|
heap
|
page read and write
|
||
3661000
|
heap
|
page read and write
|
||
3661000
|
heap
|
page read and write
|
||
397D000
|
stack
|
page read and write
|
||
3661000
|
heap
|
page read and write
|
||
3661000
|
heap
|
page read and write
|
||
10B0000
|
trusted library allocation
|
page read and write
|
||
3478000
|
heap
|
page read and write
|
||
3D12000
|
direct allocation
|
page execute and read and write
|
||
1AC94450000
|
heap
|
page read and write
|
||
8191000
|
heap
|
page read and write
|
||
3661000
|
heap
|
page read and write
|
||
BC6000
|
trusted library allocation
|
page execute and read and write
|
||
1AC95F15000
|
trusted library allocation
|
page read and write
|
||
3661000
|
heap
|
page read and write
|
||
1230000
|
unkown
|
page read and write
|
||
37A0000
|
trusted library allocation
|
page read and write
|
||
F3E000
|
stack
|
page read and write
|
||
3661000
|
heap
|
page read and write
|
||
3661000
|
heap
|
page read and write
|
||
5540000
|
trusted library allocation
|
page execute and read and write
|
||
11A0000
|
unkown
|
page readonly
|
||
3B6E000
|
direct allocation
|
page execute and read and write
|
||
81A0000
|
heap
|
page read and write
|
||
1000000
|
unkown
|
page readonly
|
||
3661000
|
heap
|
page read and write
|
||
3661000
|
heap
|
page read and write
|
||
3661000
|
heap
|
page read and write
|
||
1010000
|
unkown
|
page readonly
|
||
1270000
|
unkown
|
page readonly
|
||
99CD000
|
stack
|
page read and write
|
||
3661000
|
heap
|
page read and write
|
||
3661000
|
heap
|
page read and write
|
||
15F0000
|
unkown
|
page readonly
|
||
CE4000
|
heap
|
page read and write
|
||
819B000
|
heap
|
page read and write
|
||
3661000
|
heap
|
page read and write
|
||
353A000
|
heap
|
page read and write
|
||
1900000
|
unkown
|
page readonly
|
||
3661000
|
heap
|
page read and write
|
||
28ED000
|
stack
|
page read and write
|
||
3661000
|
heap
|
page read and write
|
||
1000000
|
unkown
|
page readonly
|
||
3661000
|
heap
|
page read and write
|
||
3487000
|
heap
|
page read and write
|
||
4F40000
|
heap
|
page read and write
|
||
3661000
|
heap
|
page read and write
|
||
81FF000
|
heap
|
page read and write
|
||
2D94000
|
heap
|
page read and write
|
||
1AC942C0000
|
system
|
page execute and read and write
|
||
3661000
|
heap
|
page read and write
|
||
57FC000
|
system
|
page execute and read and write
|
||
9ACE000
|
stack
|
page read and write
|
||
3661000
|
heap
|
page read and write
|
||
1AC9446C000
|
heap
|
page read and write
|
||
3661000
|
heap
|
page read and write
|
||
34F7000
|
heap
|
page read and write
|
||
9E7E000
|
stack
|
page read and write
|
||
719CFFF000
|
stack
|
page read and write
|
||
72FE000
|
stack
|
page read and write
|
||
3661000
|
heap
|
page read and write
|
||
841C000
|
stack
|
page read and write
|
||
1286000
|
heap
|
page read and write
|
||
3486000
|
heap
|
page read and write
|
||
3486000
|
heap
|
page read and write
|
||
851F000
|
stack
|
page read and write
|
||
3661000
|
heap
|
page read and write
|
||
3661000
|
heap
|
page read and write
|
||
E3E000
|
stack
|
page read and write
|
||
3900000
|
trusted library allocation
|
page read and write
|
||
12D0000
|
heap
|
page read and write
|
||
3661000
|
heap
|
page read and write
|
||
3661000
|
heap
|
page read and write
|
||
3661000
|
heap
|
page read and write
|
||
9E3F000
|
stack
|
page read and write
|
||
3661000
|
heap
|
page read and write
|
||
122E000
|
stack
|
page read and write
|
||
3661000
|
heap
|
page read and write
|
||
3661000
|
heap
|
page read and write
|
||
C67000
|
heap
|
page read and write
|
||
3661000
|
heap
|
page read and write
|
||
2D94000
|
heap
|
page read and write
|
||
3661000
|
heap
|
page read and write
|
||
3E3C000
|
unclassified section
|
page read and write
|
||
6C0E000
|
heap
|
page read and write
|
||
11F0000
|
heap
|
page read and write
|
||
4DB0000
|
trusted library allocation
|
page read and write
|
||
5460000
|
trusted library section
|
page read and write
|
||
3661000
|
heap
|
page read and write
|
||
3661000
|
heap
|
page read and write
|
||
4FFB000
|
unclassified section
|
page execute and read and write
|
||
3661000
|
heap
|
page read and write
|
||
34E5000
|
heap
|
page read and write
|
||
190D000
|
direct allocation
|
page execute and read and write
|
||
35F0000
|
heap
|
page read and write
|
||
8203000
|
heap
|
page read and write
|
||
3661000
|
heap
|
page read and write
|
||
BCA000
|
trusted library allocation
|
page execute and read and write
|
||
16AE000
|
stack
|
page read and write
|
||
1AC96000000
|
trusted library allocation
|
page read and write
|
||
3661000
|
heap
|
page read and write
|
||
3661000
|
heap
|
page read and write
|
||
3661000
|
heap
|
page read and write
|
||
34E3000
|
heap
|
page read and write
|
||
3486000
|
heap
|
page read and write
|
||
3661000
|
heap
|
page read and write
|
||
8196000
|
heap
|
page read and write
|
||
3661000
|
heap
|
page read and write
|
||
6EE5D000
|
unkown
|
page read and write
|
||
1AC95F00000
|
trusted library allocation
|
page read and write
|
||
1240000
|
unkown
|
page read and write
|
||
348F000
|
heap
|
page read and write
|
||
12AE000
|
stack
|
page read and write
|
||
1570000
|
unkown
|
page readonly
|
||
A1FC000
|
stack
|
page read and write
|
||
5A9F000
|
stack
|
page read and write
|
||
3661000
|
heap
|
page read and write
|
||
1320000
|
heap
|
page read and write
|
||
3661000
|
heap
|
page read and write
|
||
57F0000
|
system
|
page execute and read and write
|
||
34E0000
|
heap
|
page read and write
|
||
4BBE000
|
unclassified section
|
page read and write
|
||
3661000
|
heap
|
page read and write
|
||
3661000
|
heap
|
page read and write
|
||
34ED000
|
heap
|
page read and write
|
||
107A000
|
stack
|
page read and write
|
||
81A8000
|
heap
|
page read and write
|
||
38C6000
|
unkown
|
page read and write
|
||
B20000
|
heap
|
page read and write
|
||
640E000
|
unkown
|
page execute and read and write
|
||
12E0000
|
unkown
|
page read and write
|
||
11C0000
|
unkown
|
page readonly
|
||
5130000
|
heap
|
page execute and read and write
|
||
A0FC000
|
stack
|
page read and write
|
||
3661000
|
heap
|
page read and write
|
||
4E30000
|
trusted library allocation
|
page read and write
|
||
3DE2000
|
unclassified section
|
page read and write
|
||
43B0000
|
unclassified section
|
page execute and read and write
|
||
2A0C000
|
stack
|
page read and write
|
||
1AC960AF000
|
trusted library allocation
|
page read and write
|
||
3661000
|
heap
|
page read and write
|
||
5853000
|
system
|
page execute and read and write
|
||
1AC95D00000
|
heap
|
page read and write
|
||
3661000
|
heap
|
page read and write
|
||
3661000
|
heap
|
page read and write
|
||
998E000
|
stack
|
page read and write
|
||
3481000
|
heap
|
page read and write
|
||
1280000
|
heap
|
page read and write
|
||
3661000
|
heap
|
page read and write
|
||
1AA6000
|
direct allocation
|
page execute and read and write
|
||
3661000
|
heap
|
page read and write
|
||
1AC95DA0000
|
heap
|
page read and write
|
||
2A1B000
|
trusted library allocation
|
page read and write
|
||
3661000
|
heap
|
page read and write
|
||
34D6000
|
heap
|
page read and write
|
||
3661000
|
heap
|
page read and write
|
||
3661000
|
heap
|
page read and write
|
||
3661000
|
heap
|
page read and write
|
||
3661000
|
heap
|
page read and write
|
||
4DC0000
|
trusted library allocation
|
page read and write
|
||
3661000
|
heap
|
page read and write
|
||
3544000
|
heap
|
page read and write
|
||
9BEB000
|
heap
|
page read and write
|
||
3661000
|
heap
|
page read and write
|
||
3661000
|
heap
|
page read and write
|
||
D3B000
|
heap
|
page read and write
|
||
B9D000
|
trusted library allocation
|
page execute and read and write
|
||
350D000
|
heap
|
page read and write
|
||
156F000
|
stack
|
page read and write
|
||
3661000
|
heap
|
page read and write
|
||
3661000
|
heap
|
page read and write
|
||
39BE000
|
stack
|
page read and write
|
||
1AC943F0000
|
heap
|
page read and write
|
||
12A0000
|
heap
|
page read and write
|
||
3661000
|
heap
|
page read and write
|
||
347D000
|
heap
|
page read and write
|
||
4E3D000
|
trusted library allocation
|
page read and write
|
||
3661000
|
heap
|
page read and write
|
||
34EA000
|
heap
|
page read and write
|
||
3850000
|
trusted library allocation
|
page execute and read and write
|
||
354A000
|
heap
|
page read and write
|
||
2F40000
|
unkown
|
page readonly
|
||
11E0000
|
heap
|
page read and write
|
||
2D4E000
|
stack
|
page read and write
|
||
3072000
|
unkown
|
page read and write
|
||
394A000
|
heap
|
page read and write
|
||
34ED000
|
heap
|
page read and write
|
||
3661000
|
heap
|
page read and write
|
||
6C00000
|
heap
|
page read and write
|
||
3661000
|
heap
|
page read and write
|
||
3661000
|
heap
|
page read and write
|
||
3661000
|
heap
|
page read and write
|
||
1377000
|
heap
|
page read and write
|
||
3661000
|
heap
|
page read and write
|
||
2A14000
|
trusted library allocation
|
page read and write
|
||
C40000
|
heap
|
page read and write
|
||
57D6000
|
system
|
page execute and read and write
|
||
BC2000
|
trusted library allocation
|
page read and write
|
||
3661000
|
heap
|
page read and write
|
||
1901000
|
unkown
|
page readonly
|
||
988E000
|
stack
|
page read and write
|
||
4A1000
|
unkown
|
page execute read
|
||
9D3E000
|
stack
|
page read and write
|
||
3661000
|
heap
|
page read and write
|
||
5120000
|
trusted library allocation
|
page execute and read and write
|
||
11E0000
|
heap
|
page read and write
|
||
3486000
|
heap
|
page read and write
|
||
3C9D000
|
direct allocation
|
page execute and read and write
|
||
11EE000
|
stack
|
page read and write
|
||
3661000
|
heap
|
page read and write
|
||
719AFFB000
|
stack
|
page read and write
|
||
1570000
|
unkown
|
page readonly
|
||
3661000
|
heap
|
page read and write
|
||
3661000
|
heap
|
page read and write
|
||
8212000
|
heap
|
page read and write
|
||
5830000
|
unkown
|
page execute and read and write
|
||
899F000
|
stack
|
page read and write
|
||
A0BF000
|
stack
|
page read and write
|
||
DE0000
|
unkown
|
page readonly
|
||
3661000
|
heap
|
page read and write
|
||
2A3D000
|
trusted library allocation
|
page read and write
|
||
3072000
|
unkown
|
page read and write
|
||
1AC94410000
|
heap
|
page read and write
|
||
3661000
|
heap
|
page read and write
|
||
2F30000
|
heap
|
page read and write
|
||
4A1000
|
unkown
|
page execute read
|
||
11B0000
|
unkown
|
page readonly
|
||
3506000
|
heap
|
page read and write
|
||
1AC96001000
|
trusted library allocation
|
page read and write
|
||
4B5000
|
unkown
|
page read and write
|
||
3661000
|
heap
|
page read and write
|
||
1AC95E00000
|
trusted library allocation
|
page read and write
|
||
3661000
|
heap
|
page read and write
|
||
3661000
|
heap
|
page read and write
|
||
DF0000
|
unkown
|
page readonly
|
||
25B0000
|
unclassified section
|
page execute and read and write
|
||
8180000
|
trusted library allocation
|
page read and write
|
||
347B000
|
heap
|
page read and write
|
||
121E000
|
stack
|
page read and write
|
||
4DE0000
|
trusted library allocation
|
page read and write
|
||
1981000
|
unkown
|
page readonly
|
||
3B15000
|
trusted library allocation
|
page read and write
|
||
2F40000
|
unkown
|
page readonly
|
||
4F8E000
|
unclassified section
|
page execute and read and write
|
||
3661000
|
heap
|
page read and write
|
||
3661000
|
heap
|
page read and write
|
||
3661000
|
heap
|
page read and write
|
||
1270000
|
heap
|
page read and write
|
||
1328000
|
heap
|
page read and write
|
||
3661000
|
heap
|
page read and write
|
||
3661000
|
heap
|
page read and write
|
||
2E5E000
|
stack
|
page read and write
|
||
F10000
|
unkown
|
page read and write
|
||
3517000
|
heap
|
page read and write
|
||
12A8000
|
heap
|
page read and write
|
||
3661000
|
heap
|
page read and write
|
||
3A71000
|
trusted library allocation
|
page read and write
|
||
3661000
|
heap
|
page read and write
|
||
1328000
|
heap
|
page read and write
|
||
3661000
|
heap
|
page read and write
|
||
4EF0000
|
trusted library allocation
|
page execute and read and write
|
||
3300000
|
heap
|
page read and write
|
||
50D0000
|
trusted library allocation
|
page read and write
|
||
3661000
|
heap
|
page read and write
|
||
3661000
|
heap
|
page read and write
|
||
6EE40000
|
unkown
|
page readonly
|
||
3661000
|
heap
|
page read and write
|
||
3486000
|
heap
|
page read and write
|
||
3661000
|
heap
|
page read and write
|
||
350D000
|
heap
|
page read and write
|
||
6EE5F000
|
unkown
|
page readonly
|
||
1250000
|
unkown
|
page read and write
|
||
3661000
|
heap
|
page read and write
|
||
2E8F000
|
stack
|
page read and write
|
||
2E70000
|
heap
|
page read and write
|
||
381D000
|
heap
|
page read and write
|
||
4E20000
|
heap
|
page read and write
|
||
3278000
|
stack
|
page read and write
|
||
3661000
|
heap
|
page read and write
|
||
2D90000
|
heap
|
page read and write
|
||
3661000
|
heap
|
page read and write
|
||
116D000
|
stack
|
page read and write
|
||
CAB000
|
heap
|
page read and write
|
||
3661000
|
heap
|
page read and write
|
||
3661000
|
heap
|
page read and write
|
||
4AE000
|
unkown
|
page readonly
|
||
1A91000
|
direct allocation
|
page execute and read and write
|
||
3661000
|
heap
|
page read and write
|
||
2F34000
|
heap
|
page read and write
|
||
4A1000
|
unkown
|
page execute read
|
||
C3E000
|
stack
|
page read and write
|
||
A310000
|
trusted library allocation
|
page read and write
|
||
3661000
|
heap
|
page read and write
|
||
1AC95F21000
|
trusted library allocation
|
page read and write
|
||
3510000
|
heap
|
page read and write
|
||
81ED000
|
heap
|
page read and write
|
||
4F93000
|
heap
|
page read and write
|
||
2F80000
|
unkown
|
page readonly
|
||
3661000
|
heap
|
page read and write
|
||
A2FE000
|
stack
|
page read and write
|
||
3661000
|
heap
|
page read and write
|
||
1370000
|
heap
|
page read and write
|
||
1010000
|
unkown
|
page readonly
|
||
1250000
|
heap
|
page read and write
|
||
5100000
|
trusted library allocation
|
page read and write
|
||
83DC000
|
stack
|
page read and write
|
||
3661000
|
heap
|
page read and write
|
||
3F0E000
|
unkown
|
page read and write
|
||
530000
|
unkown
|
page readonly
|
||
12B0000
|
unkown
|
page readonly
|
||
57E0000
|
system
|
page execute and read and write
|
||
3661000
|
heap
|
page read and write
|
||
3661000
|
heap
|
page read and write
|
||
3661000
|
heap
|
page read and write
|
||
1AC94356000
|
system
|
page execute and read and write
|
||
3661000
|
heap
|
page read and write
|
||
3661000
|
heap
|
page read and write
|
||
537D000
|
stack
|
page read and write
|
||
3661000
|
heap
|
page read and write
|
||
81A5000
|
heap
|
page read and write
|
||
11B0000
|
unkown
|
page readonly
|
||
2E1E000
|
stack
|
page read and write
|
||
8182000
|
heap
|
page read and write
|
||
3661000
|
heap
|
page read and write
|
||
3661000
|
heap
|
page read and write
|
||
820C000
|
heap
|
page read and write
|
||
3661000
|
heap
|
page read and write
|
||
4B5000
|
unkown
|
page read and write
|
||
3661000
|
heap
|
page read and write
|
||
9FBE000
|
stack
|
page read and write
|
||
3661000
|
heap
|
page read and write
|
||
117D000
|
stack
|
page read and write
|
||
6EE41000
|
unkown
|
page execute read
|
||
3661000
|
heap
|
page read and write
|
||
3661000
|
heap
|
page read and write
|
||
1AC95F0F000
|
trusted library allocation
|
page read and write
|
||
BC0000
|
trusted library allocation
|
page read and write
|
||
3661000
|
heap
|
page read and write
|
||
1000000
|
unkown
|
page readonly
|
||
1AC960C4000
|
trusted library allocation
|
page read and write
|
||
12D0000
|
heap
|
page read and write
|
||
17E0000
|
direct allocation
|
page execute and read and write
|
||
7320000
|
trusted library allocation
|
page execute and read and write
|
||
4B5000
|
unkown
|
page read and write
|
||
2B0B000
|
trusted library allocation
|
page read and write
|
||
3661000
|
heap
|
page read and write
|
||
3661000
|
heap
|
page read and write
|
||
4F90000
|
heap
|
page read and write
|
||
B94000
|
trusted library allocation
|
page read and write
|
||
81D9000
|
heap
|
page read and write
|
||
3C4E000
|
trusted library allocation
|
page read and write
|
||
106A000
|
stack
|
page read and write
|
||
2D60000
|
unkown
|
page read and write
|
||
1241000
|
unkown
|
page readonly
|
||
BD2000
|
trusted library allocation
|
page read and write
|
||
32F0000
|
heap
|
page read and write
|
||
1240000
|
unkown
|
page read and write
|
||
4A2C000
|
unclassified section
|
page read and write
|
||
3661000
|
heap
|
page read and write
|
||
1AAD000
|
direct allocation
|
page execute and read and write
|
||
3B63000
|
trusted library allocation
|
page read and write
|
||
3661000
|
heap
|
page read and write
|
||
820F000
|
heap
|
page read and write
|
||
318C000
|
unkown
|
page read and write
|
||
3661000
|
heap
|
page read and write
|
||
2A31000
|
trusted library allocation
|
page read and write
|
||
34E0000
|
heap
|
page read and write
|
||
3661000
|
heap
|
page read and write
|
||
4A0000
|
unkown
|
page readonly
|
||
2D70000
|
unkown
|
page read and write
|
||
32F4000
|
heap
|
page read and write
|
||
C75000
|
heap
|
page read and write
|
||
347B000
|
heap
|
page read and write
|
||
5B9F000
|
stack
|
page read and write
|
||
4F60000
|
trusted library allocation
|
page read and write
|
||
1250000
|
heap
|
page read and write
|
||
15EF000
|
stack
|
page read and write
|
||
1AC94481000
|
heap
|
page read and write
|
||
4B5000
|
unkown
|
page read and write
|
||
DF0000
|
unkown
|
page readonly
|
||
599C000
|
unkown
|
page read and write
|
||
2D50000
|
unkown
|
page read and write
|
||
348C000
|
heap
|
page read and write
|
||
3661000
|
heap
|
page read and write
|
||
12A8000
|
heap
|
page read and write
|
||
113B000
|
stack
|
page read and write
|
||
34EA000
|
heap
|
page read and write
|
||
3661000
|
heap
|
page read and write
|
||
BDB000
|
trusted library allocation
|
page execute and read and write
|
||
5450000
|
heap
|
page read and write
|
||
2A36000
|
trusted library allocation
|
page read and write
|
||
3661000
|
heap
|
page read and write
|
||
3661000
|
heap
|
page read and write
|
||
1230000
|
unkown
|
page read and write
|
||
1B28000
|
direct allocation
|
page execute and read and write
|
||
3661000
|
heap
|
page read and write
|
||
3661000
|
heap
|
page read and write
|
||
81D4000
|
heap
|
page read and write
|
||
3661000
|
heap
|
page read and write
|
||
1231000
|
unkown
|
page readonly
|
||
3661000
|
heap
|
page read and write
|
||
3661000
|
heap
|
page read and write
|
||
34F7000
|
heap
|
page read and write
|
||
3500000
|
heap
|
page read and write
|
||
1280000
|
heap
|
page read and write
|
||
2A60000
|
heap
|
page execute and read and write
|
||
3661000
|
heap
|
page read and write
|
||
2A42000
|
trusted library allocation
|
page read and write
|
||
2D50000
|
unkown
|
page read and write
|
||
BF0000
|
trusted library allocation
|
page read and write
|
||
81B4000
|
heap
|
page read and write
|
||
34E0000
|
heap
|
page read and write
|
||
BB3000
|
trusted library allocation
|
page read and write
|
||
3661000
|
heap
|
page read and write
|
||
3661000
|
heap
|
page read and write
|
||
34E5000
|
heap
|
page read and write
|
||
1AC94352000
|
system
|
page execute and read and write
|
||
719BFFE000
|
stack
|
page read and write
|
||
1470000
|
heap
|
page read and write
|
||
3661000
|
heap
|
page read and write
|
||
D36000
|
heap
|
page read and write
|
||
3661000
|
heap
|
page read and write
|
||
3661000
|
heap
|
page read and write
|
||
3660000
|
heap
|
page read and write
|
||
3661000
|
heap
|
page read and write
|
||
4F30000
|
trusted library section
|
page readonly
|
||
849F000
|
stack
|
page read and write
|
||
2A50000
|
trusted library allocation
|
page read and write
|
||
4A0000
|
unkown
|
page readonly
|
||
28AE000
|
stack
|
page read and write
|
||
AFE000
|
stack
|
page read and write
|
||
2F7F000
|
stack
|
page read and write
|
||
CC9000
|
heap
|
page read and write
|
||
6FE0000
|
trusted library section
|
page read and write
|
||
3661000
|
heap
|
page read and write
|
||
1AC95F0A000
|
trusted library allocation
|
page read and write
|
||
3D7C000
|
unkown
|
page read and write
|
||
1AC9447A000
|
heap
|
page read and write
|
||
3517000
|
heap
|
page read and write
|
||
3661000
|
heap
|
page read and write
|
||
3661000
|
heap
|
page read and write
|
||
323B000
|
stack
|
page read and write
|
||
895E000
|
stack
|
page read and write
|
||
4E40000
|
trusted library allocation
|
page execute and read and write
|
||
34E3000
|
heap
|
page read and write
|
||
3661000
|
heap
|
page read and write
|
||
14252000
|
system
|
page read and write
|
||
5440000
|
trusted library allocation
|
page read and write
|
||
3661000
|
heap
|
page read and write
|
||
3661000
|
heap
|
page read and write
|
||
9D0000
|
heap
|
page read and write
|
||
B6E000
|
stack
|
page read and write
|
||
3661000
|
heap
|
page read and write
|
||
81CF000
|
heap
|
page read and write
|
||
51D0000
|
trusted library allocation
|
page read and write
|
||
1AC95F03000
|
trusted library allocation
|
page read and write
|
||
2DDC000
|
unkown
|
page read and write
|
||
1AC960CE000
|
trusted library allocation
|
page read and write
|
||
3132000
|
unkown
|
page read and write
|
||
6EE56000
|
unkown
|
page readonly
|
||
1080000
|
trusted library allocation
|
page execute and read and write
|
||
3661000
|
heap
|
page read and write
|
||
3661000
|
heap
|
page read and write
|
||
1AC960BE000
|
trusted library allocation
|
page read and write
|
||
11A0000
|
unkown
|
page readonly
|
||
3AFD000
|
direct allocation
|
page execute and read and write
|
||
1241000
|
unkown
|
page readonly
|
||
4708000
|
unclassified section
|
page read and write
|
||
3661000
|
heap
|
page read and write
|
||
4A0000
|
unkown
|
page readonly
|
||
5B10000
|
heap
|
page read and write
|
||
1320000
|
heap
|
page read and write
|
||
1230000
|
heap
|
page read and write
|
||
50CB000
|
stack
|
page read and write
|
||
B93000
|
trusted library allocation
|
page execute and read and write
|
||
3661000
|
heap
|
page read and write
|
||
3661000
|
heap
|
page read and write
|
||
B80000
|
trusted library allocation
|
page read and write
|
||
8190000
|
heap
|
page read and write
|
||
117D000
|
stack
|
page read and write
|
||
3661000
|
heap
|
page read and write
|
||
347D000
|
heap
|
page read and write
|
||
3900000
|
trusted library allocation
|
page read and write
|
||
3506000
|
heap
|
page read and write
|
||
2F34000
|
heap
|
page read and write
|
||
3661000
|
heap
|
page read and write
|
||
3661000
|
heap
|
page read and write
|
||
11C0000
|
unkown
|
page readonly
|
||
3661000
|
heap
|
page read and write
|
||
3661000
|
heap
|
page read and write
|
||
3661000
|
heap
|
page read and write
|
||
3CA1000
|
direct allocation
|
page execute and read and write
|
||
32F4000
|
heap
|
page read and write
|
||
11C0000
|
unkown
|
page readonly
|
||
3661000
|
heap
|
page read and write
|
||
2FB0000
|
unclassified section
|
page execute and read and write
|
||
3661000
|
heap
|
page read and write
|
||
3661000
|
heap
|
page read and write
|
||
3661000
|
heap
|
page read and write
|
||
116D000
|
stack
|
page read and write
|
||
BBD000
|
trusted library allocation
|
page execute and read and write
|
||
3500000
|
heap
|
page read and write
|
||
4E30000
|
unkown
|
page execute and read and write
|
||
DF0000
|
unkown
|
page readonly
|
||
3661000
|
heap
|
page read and write
|
||
6720000
|
trusted library allocation
|
page read and write
|
||
3661000
|
heap
|
page read and write
|
||
107A000
|
stack
|
page read and write
|
||
1AC94481000
|
heap
|
page read and write
|
||
12A0000
|
heap
|
page read and write
|
||
166F000
|
stack
|
page read and write
|
||
3661000
|
heap
|
page read and write
|
||
3661000
|
heap
|
page read and write
|
||
5110000
|
heap
|
page read and write
|
||
39BB000
|
heap
|
page read and write
|
||
12B0000
|
unkown
|
page readonly
|
||
12E0000
|
unkown
|
page read and write
|
||
3510000
|
heap
|
page read and write
|
||
532000
|
unkown
|
page readonly
|
||
3661000
|
heap
|
page read and write
|
||
8209000
|
heap
|
page read and write
|
||
4B7000
|
unkown
|
page readonly
|
||
355E000
|
heap
|
page read and write
|
||
1980000
|
unkown
|
page readonly
|
||
7086000
|
trusted library allocation
|
page read and write
|
||
3661000
|
heap
|
page read and write
|
||
2F30000
|
heap
|
page read and write
|
||
890F000
|
stack
|
page read and write
|
||
3661000
|
heap
|
page read and write
|
||
3460000
|
heap
|
page read and write
|
||
57D8000
|
system
|
page execute and read and write
|
||
3661000
|
heap
|
page read and write
|
||
719C7FE000
|
stack
|
page read and write
|
||
3661000
|
heap
|
page read and write
|
||
107C000
|
stack
|
page read and write
|
||
4AE000
|
unkown
|
page readonly
|
||
3A30000
|
unkown
|
page execute and read and write
|
||
9750000
|
heap
|
page read and write
|
||
3661000
|
heap
|
page read and write
|
||
3661000
|
heap
|
page read and write
|
||
5430000
|
trusted library allocation
|
page read and write
|
||
AB0000
|
heap
|
page read and write
|
||
11D0000
|
unkown
|
page readonly
|
||
3661000
|
heap
|
page read and write
|
||
1220000
|
unkown
|
page read and write
|
||
4576000
|
unclassified section
|
page read and write
|
||
4B7000
|
unkown
|
page readonly
|
||
3AF9000
|
direct allocation
|
page execute and read and write
|
||
4F50000
|
heap
|
page read and write
|
||
3661000
|
heap
|
page read and write
|
||
8290000
|
trusted library allocation
|
page read and write
|
||
81C9000
|
heap
|
page read and write
|
||
3661000
|
heap
|
page read and write
|
||
F0D000
|
unkown
|
page read and write
|
||
1AC95DB0000
|
trusted library allocation
|
page read and write
|
||
3900000
|
trusted library allocation
|
page read and write
|
||
4AE000
|
unkown
|
page readonly
|
||
3661000
|
heap
|
page read and write
|
||
14312000
|
system
|
page read and write
|
||
2B16000
|
trusted library allocation
|
page read and write
|
||
3661000
|
heap
|
page read and write
|
||
50F0000
|
trusted library section
|
page read and write
|
||
11D0000
|
heap
|
page read and write
|
||
4F10000
|
trusted library allocation
|
page read and write
|
||
3030000
|
unkown
|
page execute and read and write
|
There are 706 hidden memdumps, click here to show them.