Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
jre-8u201-windows-i586.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
initial sample
|
||
C:\Users\user\AppData\LocalLow\Oracle\Java\jre1.8.0_201\jre1.8.0_201.msi
|
Composite Document File V2 Document, Little Endian, Os: Windows, Version 6.1, MSI Installer, Code page: 1252, Title: Installation
Database, Subject: Java SE Runtime Environment 8 Update 201, Author: Oracle Corporation, Keywords: Installer,MSI,Database,
Comments: Contact: Your local administrator, Create Time/Date: Sun Dec 16 09:00:12 2018, Name of Creating Application: Windows
Installer XML Toolset (3.11.1.2318), Security: 4, Template: Intel;1033, Last Saved By: Intel;1033, Revision Number: {26A24AE4-039D-4CA4-87B4-2F32180201F0}8.0.2010.9;{26A24AE4-039D-4CA4-87B4-2F32180201F0}8.0.2010.9;{57BDA5C6-443C-4D65-B233-282393218000},
Number of Pages: 200, Number of Characters: 131135
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Internet Explorer\MSIMGSIZ.DAT
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\3D003UC5\layout[1]
|
Unicode text, UTF-8 (with BOM) text
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\3D003UC5\masthead_fill[1]
|
PNG image data, 172 x 57, 8-bit/color RGBA, non-interlaced
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\3D003UC5\welcome[1]
|
HTML document, Unicode text, UTF-8 text, with CRLF, LF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\YLNGKWRH\common[1]
|
ASCII text
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\YLNGKWRH\host[1]
|
Unicode text, UTF-8 (with BOM) text
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\ZJCZETOO\l10n[1]
|
HTML document, Unicode text, UTF-8 (with BOM) text
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\ZJCZETOO\masthead_left[1]
|
PNG image data, 208 x 57, 8-bit/color RGB, non-interlaced
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\ZVZFKMB9\rtutils[1]
|
Unicode text, UTF-8 (with BOM) text
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\ZVZFKMB9\runtime[1]
|
ASCII text, with CRLF, LF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\ZVZFKMB9\welcome_en[1]
|
XML 1.0 document, ASCII text
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\jds5927828.tmp\jds5927843.tmp
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\jds5927828.tmp\jre-8u201-windows-i586.exe (copy)
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\jusched.log
|
ASCII text, with CRLF line terminators
|
modified
|
There are 6 hidden files, click here to show them.
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\jre-8u201-windows-i586.exe
|
"C:\Users\user\Desktop\jre-8u201-windows-i586.exe"
|
||
C:\Users\user\AppData\Local\Temp\jds5927828.tmp\jre-8u201-windows-i586.exe
|
"C:\Users\user\AppData\Local\Temp\jds5927828.tmp\jre-8u201-windows-i586.exe"
|
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
https://javadl-esd-secure.oracle.com/update/1.8.0/42970487e3af4f5aa5bca3f542482c60/1.8.0_201-b09.xml
|
unknown
|
||
http://www.tutorialspoint.com/javascript/array_map.htm
|
unknown
|
||
https://developer.mozilla.org/en-US/docs/Web/JavaScript/Reference/Global_Objects/Array/Reduce
|
unknown
|
||
https://rps-svcs.oracle.com/services/countrylookupD
|
unknown
|
||
https://developer.mozilla.org/en-US/docs/Web/JavaScript/Reference/Global_Objects/Array/filter
|
unknown
|
||
http://www.symauth.com/rpa00
|
unknown
|
||
http://stackoverflow.com/a/15123777)
|
unknown
|
||
http://stackoverflow.com/questions/1068834/object-comparison-in-javascript
|
unknown
|
||
http://www.computerhope.com/forum/index.php?topic=76293.0
|
unknown
|
||
https://developer.mozilla.org/en-US/docs/Web/JavaScript/Reference/Global_Objects/Array/indexOf
|
unknown
|
||
https://rps-svcs.oracle.com/
|
unknown
|
||
https://docs.oracle.com/javase/
|
unknown
|
||
http://www.symauth.com/cps0(
|
unknown
|
||
http://es5.github.io/#x15.4.4.21
|
unknown
|
||
https://rps-svcs.oracle.com/services/countrylookup
|
unknown
|
||
https://rps-svcs.oracle.com/services/countrylookup)
|
unknown
|
||
https://developer.mozilla.org/en-US/docs/Web/JavaScript/Reference/Global_Objects/String/startsWith
|
unknown
|
||
https://rps-svcs.oracle.com/h
|
unknown
|
There are 8 hidden URLs, click here to show them.
Domains
Name
|
IP
|
Malicious
|
|
---|---|---|---|
javadl-esd-secure.oracle.com
|
unknown
|
||
rps-svcs.oracle.com
|
unknown
|
Registry
Path
|
Value
|
Malicious
|
|
---|---|---|---|
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\JavaSoft\Java Update\Policy
|
Country
|
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
86CE000
|
trusted library allocation
|
page read and write
|
||
8674000
|
trusted library allocation
|
page read and write
|
||
BDC0000
|
trusted library allocation
|
page read and write
|
||
7FFF000
|
heap
|
page read and write
|
||
4BC8000
|
heap
|
page read and write
|
||
86E2000
|
trusted library allocation
|
page read and write
|
||
1760000
|
unkown
|
page readonly
|
||
8378000
|
heap
|
page read and write
|
||
4BC5000
|
heap
|
page read and write
|
||
835D000
|
heap
|
page read and write
|
||
7D06000
|
trusted library allocation
|
page read and write
|
||
86D8000
|
trusted library allocation
|
page read and write
|
||
2E45000
|
unkown
|
page readonly
|
||
1045000
|
unkown
|
page readonly
|
||
4C00000
|
heap
|
page read and write
|
||
7CCC000
|
trusted library allocation
|
page read and write
|
||
7C9C000
|
trusted library allocation
|
page read and write
|
||
835A000
|
heap
|
page read and write
|
||
7CCC000
|
trusted library allocation
|
page read and write
|
||
836E000
|
heap
|
page read and write
|
||
836E000
|
heap
|
page read and write
|
||
867B000
|
trusted library allocation
|
page read and write
|
||
445A000
|
unkown
|
page readonly
|
||
8359000
|
heap
|
page read and write
|
||
835F000
|
heap
|
page read and write
|
||
7CFE000
|
trusted library allocation
|
page read and write
|
||
8677000
|
trusted library allocation
|
page read and write
|
||
86B1000
|
trusted library allocation
|
page read and write
|
||
836E000
|
heap
|
page read and write
|
||
74E0000
|
remote allocation
|
page read and write
|
||
838F000
|
heap
|
page read and write
|
||
7CD8000
|
trusted library allocation
|
page read and write
|
||
1045000
|
unkown
|
page readonly
|
||
7FC7000
|
heap
|
page read and write
|
||
4245000
|
unkown
|
page readonly
|
||
330000
|
unkown
|
page readonly
|
||
8682000
|
trusted library allocation
|
page read and write
|
||
8360000
|
heap
|
page read and write
|
||
838E000
|
heap
|
page read and write
|
||
3845000
|
unkown
|
page readonly
|
||
2445000
|
unkown
|
page readonly
|
||
4B6A000
|
heap
|
page read and write
|
||
836E000
|
heap
|
page read and write
|
||
2160000
|
unkown
|
page readonly
|
||
41BE000
|
unkown
|
page readonly
|
||
86D0000
|
trusted library allocation
|
page read and write
|
||
8366000
|
heap
|
page read and write
|
||
2B60000
|
unkown
|
page readonly
|
||
2B60000
|
unkown
|
page readonly
|
||
7CD8000
|
trusted library allocation
|
page read and write
|
||
8673000
|
trusted library allocation
|
page read and write
|
||
7CC8000
|
trusted library allocation
|
page read and write
|
||
8359000
|
heap
|
page read and write
|
||
86E5000
|
trusted library allocation
|
page read and write
|
||
82EA000
|
trusted library allocation
|
page read and write
|
||
836E000
|
heap
|
page read and write
|
||
8367000
|
heap
|
page read and write
|
||
40A3000
|
unkown
|
page readonly
|
||
BDA0000
|
trusted library allocation
|
page read and write
|
||
86B0000
|
trusted library allocation
|
page read and write
|
||
836E000
|
heap
|
page read and write
|
||
613000
|
unkown
|
page readonly
|
||
8359000
|
heap
|
page read and write
|
||
836E000
|
heap
|
page read and write
|
||
7C9C000
|
trusted library allocation
|
page read and write
|
||
86EC000
|
trusted library allocation
|
page read and write
|
||
7CC8000
|
trusted library allocation
|
page read and write
|
||
331000
|
unkown
|
page execute read
|
||
836E000
|
heap
|
page read and write
|
||
2445000
|
unkown
|
page readonly
|
||
4C22000
|
heap
|
page read and write
|
||
8366000
|
heap
|
page read and write
|
||
82EC000
|
trusted library allocation
|
page read and write
|
||
645000
|
unkown
|
page readonly
|
||
836E000
|
heap
|
page read and write
|
||
835B000
|
heap
|
page read and write
|
||
360000
|
unkown
|
page readonly
|
||
8686000
|
trusted library allocation
|
page read and write
|
||
86ED000
|
trusted library allocation
|
page read and write
|
||
360000
|
unkown
|
page readonly
|
||
837F000
|
heap
|
page read and write
|
||
7FC2000
|
heap
|
page read and write
|
||
836E000
|
heap
|
page read and write
|
||
8366000
|
heap
|
page read and write
|
||
8375000
|
heap
|
page read and write
|
||
837F000
|
heap
|
page read and write
|
||
BDD0000
|
trusted library allocation
|
page read and write
|
||
835A000
|
heap
|
page read and write
|
||
838B000
|
heap
|
page read and write
|
||
4C3E000
|
heap
|
page read and write
|
||
7CD8000
|
trusted library allocation
|
page read and write
|
||
7CC8000
|
trusted library allocation
|
page read and write
|
||
4BC5000
|
heap
|
page read and write
|
||
836E000
|
heap
|
page read and write
|
||
3F60000
|
unkown
|
page readonly
|
||
7FD7000
|
heap
|
page read and write
|
||
410B000
|
unkown
|
page readonly
|
||
8359000
|
heap
|
page read and write
|
||
8684000
|
trusted library allocation
|
page read and write
|
||
8680000
|
trusted library allocation
|
page read and write
|
||
836E000
|
heap
|
page read and write
|
||
867D000
|
trusted library allocation
|
page read and write
|
||
7FC4000
|
heap
|
page read and write
|
||
7CCC000
|
trusted library allocation
|
page read and write
|
||
7D02000
|
trusted library allocation
|
page read and write
|
||
7CEE000
|
trusted library allocation
|
page read and write
|
||
7CAC000
|
trusted library allocation
|
page read and write
|
||
4B72000
|
heap
|
page read and write
|
||
836C000
|
heap
|
page read and write
|
||
82E5000
|
trusted library allocation
|
page read and write
|
||
7D06000
|
trusted library allocation
|
page read and write
|
||
7FEB000
|
heap
|
page read and write
|
||
86B8000
|
trusted library allocation
|
page read and write
|
||
86D5000
|
trusted library allocation
|
page read and write
|
||
836E000
|
heap
|
page read and write
|
||
86B5000
|
trusted library allocation
|
page read and write
|
||
7CFE000
|
trusted library allocation
|
page read and write
|
||
837F000
|
heap
|
page read and write
|
||
838E000
|
heap
|
page read and write
|
||
86DB000
|
trusted library allocation
|
page read and write
|
||
8354000
|
heap
|
page read and write
|
||
4B6D000
|
heap
|
page read and write
|
||
835B000
|
heap
|
page read and write
|
||
3560000
|
unkown
|
page readonly
|
||
4BC8000
|
heap
|
page read and write
|
||
353000
|
unkown
|
page readonly
|
||
836E000
|
heap
|
page read and write
|
||
867C000
|
trusted library allocation
|
page read and write
|
||
7FDE000
|
heap
|
page read and write
|
||
BDA0000
|
trusted library allocation
|
page read and write
|
||
7CDA000
|
trusted library allocation
|
page read and write
|
||
7CFE000
|
trusted library allocation
|
page read and write
|
||
7CD0000
|
trusted library allocation
|
page read and write
|
||
330000
|
unkown
|
page readonly
|
||
8376000
|
heap
|
page read and write
|
||
867F000
|
trusted library allocation
|
page read and write
|
||
8687000
|
trusted library allocation
|
page read and write
|
||
86B9000
|
trusted library allocation
|
page read and write
|
||
86C9000
|
trusted library allocation
|
page read and write
|
||
835F000
|
heap
|
page read and write
|
||
7CFE000
|
trusted library allocation
|
page read and write
|
||
8683000
|
trusted library allocation
|
page read and write
|
||
835F000
|
heap
|
page read and write
|
||
836E000
|
heap
|
page read and write
|
||
86EF000
|
trusted library allocation
|
page read and write
|
||
7D02000
|
trusted library allocation
|
page read and write
|
||
7CFE000
|
trusted library allocation
|
page read and write
|
||
7CFE000
|
trusted library allocation
|
page read and write
|
||
7CEE000
|
trusted library allocation
|
page read and write
|
||
7D06000
|
trusted library allocation
|
page read and write
|
||
7D02000
|
trusted library allocation
|
page read and write
|
||
8376000
|
heap
|
page read and write
|
||
7D02000
|
trusted library allocation
|
page read and write
|
||
835F000
|
heap
|
page read and write
|
||
8685000
|
trusted library allocation
|
page read and write
|
||
63E000
|
unkown
|
page read and write
|
||
8359000
|
heap
|
page read and write
|
||
8359000
|
heap
|
page read and write
|
||
836E000
|
heap
|
page read and write
|
||
1A45000
|
unkown
|
page readonly
|
||
86BA000
|
trusted library allocation
|
page read and write
|
||
7FF7000
|
heap
|
page read and write
|
||
4BC2000
|
heap
|
page read and write
|
||
4BC8000
|
heap
|
page read and write
|
||
86EA000
|
trusted library allocation
|
page read and write
|
||
835C000
|
heap
|
page read and write
|
||
BDD0000
|
trusted library allocation
|
page read and write
|
||
7C98000
|
trusted library allocation
|
page read and write
|
||
86B2000
|
trusted library allocation
|
page read and write
|
||
868A000
|
trusted library allocation
|
page read and write
|
||
4041000
|
unkown
|
page readonly
|
||
360000
|
unkown
|
page readonly
|
||
8372000
|
heap
|
page read and write
|
||
86B7000
|
trusted library allocation
|
page read and write
|
||
7FB8000
|
heap
|
page read and write
|
||
3560000
|
unkown
|
page readonly
|
||
835F000
|
heap
|
page read and write
|
||
8359000
|
heap
|
page read and write
|
||
3845000
|
unkown
|
page readonly
|
||
839B000
|
heap
|
page read and write
|
||
836E000
|
heap
|
page read and write
|
||
35C000
|
unkown
|
page write copy
|
||
7CEE000
|
trusted library allocation
|
page read and write
|
||
835F000
|
heap
|
page read and write
|
||
836E000
|
heap
|
page read and write
|
||
7FEB000
|
heap
|
page read and write
|
||
86F3000
|
trusted library allocation
|
page read and write
|
||
837F000
|
heap
|
page read and write
|
||
1760000
|
unkown
|
page readonly
|
||
8366000
|
heap
|
page read and write
|
||
BDB0000
|
trusted library allocation
|
page read and write
|
||
82E7000
|
trusted library allocation
|
page read and write
|
||
BDC0000
|
trusted library allocation
|
page read and write
|
||
86DF000
|
trusted library allocation
|
page read and write
|
||
8366000
|
heap
|
page read and write
|
||
835F000
|
heap
|
page read and write
|
||
838B000
|
heap
|
page read and write
|
||
86BB000
|
trusted library allocation
|
page read and write
|
||
7CB6000
|
trusted library allocation
|
page read and write
|
||
591000
|
unkown
|
page execute read
|
||
613000
|
unkown
|
page readonly
|
||
7FDC000
|
heap
|
page read and write
|
||
7CC1000
|
trusted library allocation
|
page read and write
|
||
86F0000
|
trusted library allocation
|
page read and write
|
||
838B000
|
heap
|
page read and write
|
||
86CC000
|
trusted library allocation
|
page read and write
|
||
868E000
|
trusted library allocation
|
page read and write
|
||
836E000
|
heap
|
page read and write
|
||
836E000
|
heap
|
page read and write
|
||
82ED000
|
trusted library allocation
|
page read and write
|
||
4B75000
|
heap
|
page read and write
|
||
838B000
|
heap
|
page read and write
|
||
2E45000
|
unkown
|
page readonly
|
||
645000
|
unkown
|
page readonly
|
||
8671000
|
trusted library allocation
|
page read and write
|
||
8366000
|
heap
|
page read and write
|
||
836E000
|
heap
|
page read and write
|
||
835F000
|
heap
|
page read and write
|
||
8367000
|
heap
|
page read and write
|
||
8366000
|
heap
|
page read and write
|
||
836E000
|
heap
|
page read and write
|
||
42D8000
|
unkown
|
page readonly
|
||
836E000
|
heap
|
page read and write
|
||
4C29000
|
heap
|
page read and write
|
||
D60000
|
unkown
|
page readonly
|
||
835F000
|
heap
|
page read and write
|
||
D60000
|
unkown
|
page readonly
|
||
7D06000
|
trusted library allocation
|
page read and write
|
||
7CEE000
|
trusted library allocation
|
page read and write
|
||
835F000
|
heap
|
page read and write
|
||
8379000
|
heap
|
page read and write
|
||
837F000
|
heap
|
page read and write
|
||
86BC000
|
trusted library allocation
|
page read and write
|
||
7C84000
|
trusted library allocation
|
page read and write
|
||
86DC000
|
trusted library allocation
|
page read and write
|
||
835F000
|
heap
|
page read and write
|
||
429D000
|
unkown
|
page readonly
|
||
8385000
|
heap
|
page read and write
|
||
8678000
|
trusted library allocation
|
page read and write
|
||
839B000
|
heap
|
page read and write
|
||
86D9000
|
trusted library allocation
|
page read and write
|
||
836E000
|
heap
|
page read and write
|
||
8372000
|
heap
|
page read and write
|
||
BDA0000
|
trusted library allocation
|
page read and write
|
||
2160000
|
unkown
|
page readonly
|
||
7D06000
|
trusted library allocation
|
page read and write
|
||
8366000
|
heap
|
page read and write
|
||
7D02000
|
trusted library allocation
|
page read and write
|
||
835F000
|
heap
|
page read and write
|
||
836E000
|
heap
|
page read and write
|
||
836E000
|
heap
|
page read and write
|
||
4A00000
|
trusted library allocation
|
page read and write
|
||
7C86000
|
trusted library allocation
|
page read and write
|
||
8688000
|
trusted library allocation
|
page read and write
|
||
8359000
|
heap
|
page read and write
|
||
35C000
|
unkown
|
page read and write
|
||
836E000
|
heap
|
page read and write
|
||
86DD000
|
trusted library allocation
|
page read and write
|
||
591000
|
unkown
|
page execute read
|
||
836E000
|
heap
|
page read and write
|
||
837A000
|
heap
|
page read and write
|
||
7FDE000
|
heap
|
page read and write
|
||
590000
|
unkown
|
page readonly
|
||
836E000
|
heap
|
page read and write
|
||
7CEE000
|
trusted library allocation
|
page read and write
|
||
836E000
|
heap
|
page read and write
|
||
86D3000
|
trusted library allocation
|
page read and write
|
||
835A000
|
heap
|
page read and write
|
||
836E000
|
heap
|
page read and write
|
||
63E000
|
unkown
|
page write copy
|
||
835F000
|
heap
|
page read and write
|
||
836E000
|
heap
|
page read and write
|
||
7CC1000
|
trusted library allocation
|
page read and write
|
||
331000
|
unkown
|
page execute read
|
||
868D000
|
trusted library allocation
|
page read and write
|
||
7FBC000
|
heap
|
page read and write
|
||
43F3000
|
unkown
|
page readonly
|
||
838B000
|
heap
|
page read and write
|
||
836E000
|
heap
|
page read and write
|
||
645000
|
unkown
|
page readonly
|
||
838B000
|
heap
|
page read and write
|
||
7D02000
|
trusted library allocation
|
page read and write
|
||
8359000
|
heap
|
page read and write
|
||
7CDA000
|
trusted library allocation
|
page read and write
|
||
8360000
|
heap
|
page read and write
|
||
86B4000
|
trusted library allocation
|
page read and write
|
||
836E000
|
heap
|
page read and write
|
||
7C90000
|
trusted library allocation
|
page read and write
|
||
7CD0000
|
trusted library allocation
|
page read and write
|
||
8359000
|
heap
|
page read and write
|
||
8389000
|
heap
|
page read and write
|
||
1A45000
|
unkown
|
page readonly
|
||
835F000
|
heap
|
page read and write
|
||
7FDC000
|
heap
|
page read and write
|
||
835F000
|
heap
|
page read and write
|
||
82E6000
|
trusted library allocation
|
page read and write
|
||
837A000
|
heap
|
page read and write
|
||
4A10000
|
trusted library allocation
|
page read and write
|
||
82EF000
|
trusted library allocation
|
page read and write
|
||
82E8000
|
trusted library allocation
|
page read and write
|
||
835F000
|
heap
|
page read and write
|
||
8676000
|
trusted library allocation
|
page read and write
|
||
838B000
|
heap
|
page read and write
|
||
8366000
|
heap
|
page read and write
|
||
4B76000
|
heap
|
page read and write
|
||
835F000
|
heap
|
page read and write
|
||
7FD7000
|
heap
|
page read and write
|
||
836E000
|
heap
|
page read and write
|
||
8372000
|
heap
|
page read and write
|
||
7CAC000
|
trusted library allocation
|
page read and write
|
||
7CB6000
|
trusted library allocation
|
page read and write
|
||
86E7000
|
trusted library allocation
|
page read and write
|
||
7D06000
|
trusted library allocation
|
page read and write
|
||
8354000
|
heap
|
page read and write
|
||
837B000
|
heap
|
page read and write
|
||
86C0000
|
trusted library allocation
|
page read and write
|
||
835D000
|
heap
|
page read and write
|
||
868B000
|
trusted library allocation
|
page read and write
|
||
7CD0000
|
trusted library allocation
|
page read and write
|
||
836E000
|
heap
|
page read and write
|
||
7CC1000
|
trusted library allocation
|
page read and write
|
||
868F000
|
trusted library allocation
|
page read and write
|
||
86D6000
|
trusted library allocation
|
page read and write
|
||
836E000
|
heap
|
page read and write
|
||
837B000
|
heap
|
page read and write
|
||
86D1000
|
trusted library allocation
|
page read and write
|
||
836E000
|
heap
|
page read and write
|
||
86B3000
|
trusted library allocation
|
page read and write
|
||
4B75000
|
heap
|
page read and write
|
||
86E1000
|
trusted library allocation
|
page read and write
|
||
74E0000
|
remote allocation
|
page read and write
|
||
590000
|
unkown
|
page readonly
|
||
7CDA000
|
trusted library allocation
|
page read and write
|
||
8681000
|
trusted library allocation
|
page read and write
|
||
74E0000
|
remote allocation
|
page read and write
|
||
8679000
|
trusted library allocation
|
page read and write
|
||
7CB6000
|
trusted library allocation
|
page read and write
|
||
4C16000
|
heap
|
page read and write
|
||
835A000
|
heap
|
page read and write
|
||
7CD8000
|
trusted library allocation
|
page read and write
|
||
7D02000
|
trusted library allocation
|
page read and write
|
||
82E4000
|
trusted library allocation
|
page read and write
|
||
86E4000
|
trusted library allocation
|
page read and write
|
||
836D000
|
heap
|
page read and write
|
||
8360000
|
heap
|
page read and write
|
||
8396000
|
heap
|
page read and write
|
||
7D06000
|
trusted library allocation
|
page read and write
|
||
835F000
|
heap
|
page read and write
|
||
7FD0000
|
heap
|
page read and write
|
||
4225000
|
unkown
|
page readonly
|
||
8372000
|
heap
|
page read and write
|
||
8650000
|
trusted library allocation
|
page read and write
|
||
86C5000
|
trusted library allocation
|
page read and write
|
||
8379000
|
heap
|
page read and write
|
||
8689000
|
trusted library allocation
|
page read and write
|
||
7CDA000
|
trusted library allocation
|
page read and write
|
||
868C000
|
trusted library allocation
|
page read and write
|
||
835B000
|
heap
|
page read and write
|
||
867A000
|
trusted library allocation
|
page read and write
|
||
353000
|
unkown
|
page readonly
|
||
86B6000
|
trusted library allocation
|
page read and write
|
||
4276000
|
unkown
|
page readonly
|
||
8359000
|
heap
|
page read and write
|
||
837F000
|
heap
|
page read and write
|
||
8672000
|
trusted library allocation
|
page read and write
|
||
7D06000
|
trusted library allocation
|
page read and write
|
There are 356 hidden memdumps, click here to show them.