Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
SecuriteInfo.com.Win32.Trojan.Kryptik.DQOJJU.32487.4625.dll
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
initial sample
|
||
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_rundll32.exe_Sec_847e5933c7b68f10fff588c9d4be4118d8c5e594_a132e67f_5dfd797d-ff43-4b78-8031-391bd555f2ca\Report.wer
|
Unicode text, UTF-16, little-endian text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_rundll32.exe_Sec_84dfe926c8a473f70df6ff9eee142b124f3fe79_a132e67f_0cdc4759-0de7-40f8-8c28-aa5cc0333853\Report.wer
|
Unicode text, UTF-16, little-endian text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_rundll32.exe_Sec_84dfe926c8a473f70df6ff9eee142b124f3fe79_a132e67f_23825486-2bbf-45fb-9b0a-6d8c1a4fbf60\Report.wer
|
Unicode text, UTF-16, little-endian text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_rundll32.exe_Sec_84dfe926c8a473f70df6ff9eee142b124f3fe79_a132e67f_dea66e8e-942f-4a31-bba4-c04961d93161\Report.wer
|
Unicode text, UTF-16, little-endian text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WER1718.tmp.dmp
|
Mini DuMP crash report, 15 streams, Fri Oct 25 10:46:02 2024, 0x1205a4 type
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WER1787.tmp.dmp
|
Mini DuMP crash report, 15 streams, Fri Oct 25 10:46:02 2024, 0x1205a4 type
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WER17A6.tmp.WERInternalMetadata.xml
|
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WER1805.tmp.xml
|
XML 1.0 document, ASCII text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WER1A28.tmp.WERInternalMetadata.xml
|
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WER1A67.tmp.xml
|
XML 1.0 document, ASCII text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WER2215.tmp.dmp
|
Mini DuMP crash report, 15 streams, Fri Oct 25 10:46:05 2024, 0x1205a4 type
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WER23AC.tmp.WERInternalMetadata.xml
|
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WER23DC.tmp.xml
|
XML 1.0 document, ASCII text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WER2DFC.tmp.dmp
|
Mini DuMP crash report, 15 streams, Fri Oct 25 10:46:08 2024, 0x1205a4 type
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WER2F26.tmp.WERInternalMetadata.xml
|
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WER2F55.tmp.xml
|
XML 1.0 document, ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Windows\appcompat\Programs\Amcache.hve
|
MS Windows registry file, NT/2000 or above
|
dropped
|
There are 8 hidden files, click here to show them.
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Windows\System32\loaddll64.exe
|
loaddll64.exe "C:\Users\user\Desktop\SecuriteInfo.com.Win32.Trojan.Kryptik.DQOJJU.32487.4625.dll"
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\cmd.exe
|
cmd.exe /C rundll32.exe "C:\Users\user\Desktop\SecuriteInfo.com.Win32.Trojan.Kryptik.DQOJJU.32487.4625.dll",#1
|
||
C:\Windows\System32\rundll32.exe
|
rundll32.exe C:\Users\user\Desktop\SecuriteInfo.com.Win32.Trojan.Kryptik.DQOJJU.32487.4625.dll,HTMLayoutCallBehaviorMethod
|
||
C:\Windows\System32\rundll32.exe
|
rundll32.exe "C:\Users\user\Desktop\SecuriteInfo.com.Win32.Trojan.Kryptik.DQOJJU.32487.4625.dll",#1
|
||
C:\Windows\System32\WerFault.exe
|
C:\Windows\system32\WerFault.exe -u -p 2084 -s 344
|
||
C:\Windows\System32\WerFault.exe
|
C:\Windows\system32\WerFault.exe -u -p 3844 -s 288
|
||
C:\Windows\System32\rundll32.exe
|
rundll32.exe C:\Users\user\Desktop\SecuriteInfo.com.Win32.Trojan.Kryptik.DQOJJU.32487.4625.dll,HTMLayoutCreateElement
|
||
C:\Windows\System32\WerFault.exe
|
C:\Windows\system32\WerFault.exe -u -p 5416 -s 296
|
||
C:\Windows\System32\rundll32.exe
|
rundll32.exe C:\Users\user\Desktop\SecuriteInfo.com.Win32.Trojan.Kryptik.DQOJJU.32487.4625.dll,HTMLayoutDataReady
|
||
C:\Windows\System32\WerFault.exe
|
C:\Windows\system32\WerFault.exe -u -p 7248 -s 288
|
||
C:\Windows\System32\rundll32.exe
|
rundll32.exe "C:\Users\user\Desktop\SecuriteInfo.com.Win32.Trojan.Kryptik.DQOJJU.32487.4625.dll",HTMLayoutCallBehaviorMethod
|
||
C:\Windows\System32\rundll32.exe
|
rundll32.exe "C:\Users\user\Desktop\SecuriteInfo.com.Win32.Trojan.Kryptik.DQOJJU.32487.4625.dll",HTMLayoutCreateElement
|
||
C:\Windows\System32\rundll32.exe
|
rundll32.exe "C:\Users\user\Desktop\SecuriteInfo.com.Win32.Trojan.Kryptik.DQOJJU.32487.4625.dll",HTMLayoutDataReady
|
||
C:\Windows\System32\rundll32.exe
|
rundll32.exe "C:\Users\user\Desktop\SecuriteInfo.com.Win32.Trojan.Kryptik.DQOJJU.32487.4625.dll",sqlite3_step
|
||
C:\Windows\System32\rundll32.exe
|
rundll32.exe "C:\Users\user\Desktop\SecuriteInfo.com.Win32.Trojan.Kryptik.DQOJJU.32487.4625.dll",sqlite3_prepare_v2
|
||
C:\Windows\System32\rundll32.exe
|
rundll32.exe "C:\Users\user\Desktop\SecuriteInfo.com.Win32.Trojan.Kryptik.DQOJJU.32487.4625.dll",sqlite3_open16
|
||
C:\Windows\System32\rundll32.exe
|
rundll32.exe "C:\Users\user\Desktop\SecuriteInfo.com.Win32.Trojan.Kryptik.DQOJJU.32487.4625.dll",sqlite3_column_text
|
||
C:\Windows\System32\rundll32.exe
|
rundll32.exe "C:\Users\user\Desktop\SecuriteInfo.com.Win32.Trojan.Kryptik.DQOJJU.32487.4625.dll",sqlite3_close
|
||
C:\Windows\System32\rundll32.exe
|
rundll32.exe "C:\Users\user\Desktop\SecuriteInfo.com.Win32.Trojan.Kryptik.DQOJJU.32487.4625.dll",HTMLayout_UseElement
|
||
C:\Windows\System32\rundll32.exe
|
rundll32.exe "C:\Users\user\Desktop\SecuriteInfo.com.Win32.Trojan.Kryptik.DQOJJU.32487.4625.dll",HTMLayout_UnuseElement
|
||
C:\Windows\System32\rundll32.exe
|
rundll32.exe "C:\Users\user\Desktop\SecuriteInfo.com.Win32.Trojan.Kryptik.DQOJJU.32487.4625.dll",HTMLayoutWindowDetachEventHandler
|
||
C:\Windows\System32\rundll32.exe
|
rundll32.exe "C:\Users\user\Desktop\SecuriteInfo.com.Win32.Trojan.Kryptik.DQOJJU.32487.4625.dll",HTMLayoutWindowAttachEventHandler
|
||
C:\Windows\System32\rundll32.exe
|
rundll32.exe "C:\Users\user\Desktop\SecuriteInfo.com.Win32.Trojan.Kryptik.DQOJJU.32487.4625.dll",HTMLayoutVisitElements
|
||
C:\Windows\System32\rundll32.exe
|
rundll32.exe "C:\Users\user\Desktop\SecuriteInfo.com.Win32.Trojan.Kryptik.DQOJJU.32487.4625.dll",HTMLayoutUpdateWindow
|
||
C:\Windows\System32\rundll32.exe
|
rundll32.exe "C:\Users\user\Desktop\SecuriteInfo.com.Win32.Trojan.Kryptik.DQOJJU.32487.4625.dll",HTMLayoutUpdateElementEx
|
||
C:\Windows\System32\rundll32.exe
|
rundll32.exe "C:\Users\user\Desktop\SecuriteInfo.com.Win32.Trojan.Kryptik.DQOJJU.32487.4625.dll",HTMLayoutUpdateElement
|
||
C:\Windows\System32\rundll32.exe
|
rundll32.exe "C:\Users\user\Desktop\SecuriteInfo.com.Win32.Trojan.Kryptik.DQOJJU.32487.4625.dll",HTMLayoutSetupDebugOutput
|
||
C:\Windows\System32\rundll32.exe
|
rundll32.exe "C:\Users\user\Desktop\SecuriteInfo.com.Win32.Trojan.Kryptik.DQOJJU.32487.4625.dll",HTMLayoutSetStyleAttribute
|
||
C:\Windows\System32\rundll32.exe
|
rundll32.exe "C:\Users\user\Desktop\SecuriteInfo.com.Win32.Trojan.Kryptik.DQOJJU.32487.4625.dll",HTMLayoutSetOption
|
||
C:\Windows\System32\rundll32.exe
|
rundll32.exe "C:\Users\user\Desktop\SecuriteInfo.com.Win32.Trojan.Kryptik.DQOJJU.32487.4625.dll",HTMLayoutSetElementState
|
||
C:\Windows\System32\rundll32.exe
|
rundll32.exe "C:\Users\user\Desktop\SecuriteInfo.com.Win32.Trojan.Kryptik.DQOJJU.32487.4625.dll",HTMLayoutSetElementInnerText16
|
||
C:\Windows\System32\rundll32.exe
|
rundll32.exe "C:\Users\user\Desktop\SecuriteInfo.com.Win32.Trojan.Kryptik.DQOJJU.32487.4625.dll",HTMLayoutSetElementHtml
|
||
C:\Windows\System32\rundll32.exe
|
rundll32.exe "C:\Users\user\Desktop\SecuriteInfo.com.Win32.Trojan.Kryptik.DQOJJU.32487.4625.dll",HTMLayoutSetCallback
|
There are 24 hidden processes, click here to show them.
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
http://upx.sf.net
|
unknown
|
Registry
Path
|
Value
|
Malicious
|
|
---|---|---|---|
\REGISTRY\A\{5b1b1107-ca74-5af0-c833-d29710b0674b}\Root\InventoryApplicationFile\rundll32.exe|c8d854bf61fafc41
|
ProgramId
|
||
\REGISTRY\A\{5b1b1107-ca74-5af0-c833-d29710b0674b}\Root\InventoryApplicationFile\rundll32.exe|c8d854bf61fafc41
|
FileId
|
||
\REGISTRY\A\{5b1b1107-ca74-5af0-c833-d29710b0674b}\Root\InventoryApplicationFile\rundll32.exe|c8d854bf61fafc41
|
LowerCaseLongPath
|
||
\REGISTRY\A\{5b1b1107-ca74-5af0-c833-d29710b0674b}\Root\InventoryApplicationFile\rundll32.exe|c8d854bf61fafc41
|
LongPathHash
|
||
\REGISTRY\A\{5b1b1107-ca74-5af0-c833-d29710b0674b}\Root\InventoryApplicationFile\rundll32.exe|c8d854bf61fafc41
|
Name
|
||
\REGISTRY\A\{5b1b1107-ca74-5af0-c833-d29710b0674b}\Root\InventoryApplicationFile\rundll32.exe|c8d854bf61fafc41
|
OriginalFileName
|
||
\REGISTRY\A\{5b1b1107-ca74-5af0-c833-d29710b0674b}\Root\InventoryApplicationFile\rundll32.exe|c8d854bf61fafc41
|
Publisher
|
||
\REGISTRY\A\{5b1b1107-ca74-5af0-c833-d29710b0674b}\Root\InventoryApplicationFile\rundll32.exe|c8d854bf61fafc41
|
Version
|
||
\REGISTRY\A\{5b1b1107-ca74-5af0-c833-d29710b0674b}\Root\InventoryApplicationFile\rundll32.exe|c8d854bf61fafc41
|
BinFileVersion
|
||
\REGISTRY\A\{5b1b1107-ca74-5af0-c833-d29710b0674b}\Root\InventoryApplicationFile\rundll32.exe|c8d854bf61fafc41
|
BinaryType
|
||
\REGISTRY\A\{5b1b1107-ca74-5af0-c833-d29710b0674b}\Root\InventoryApplicationFile\rundll32.exe|c8d854bf61fafc41
|
ProductName
|
||
\REGISTRY\A\{5b1b1107-ca74-5af0-c833-d29710b0674b}\Root\InventoryApplicationFile\rundll32.exe|c8d854bf61fafc41
|
ProductVersion
|
||
\REGISTRY\A\{5b1b1107-ca74-5af0-c833-d29710b0674b}\Root\InventoryApplicationFile\rundll32.exe|c8d854bf61fafc41
|
LinkDate
|
||
\REGISTRY\A\{5b1b1107-ca74-5af0-c833-d29710b0674b}\Root\InventoryApplicationFile\rundll32.exe|c8d854bf61fafc41
|
BinProductVersion
|
||
\REGISTRY\A\{5b1b1107-ca74-5af0-c833-d29710b0674b}\Root\InventoryApplicationFile\rundll32.exe|c8d854bf61fafc41
|
AppxPackageFullName
|
||
\REGISTRY\A\{5b1b1107-ca74-5af0-c833-d29710b0674b}\Root\InventoryApplicationFile\rundll32.exe|c8d854bf61fafc41
|
AppxPackageRelativeId
|
||
\REGISTRY\A\{5b1b1107-ca74-5af0-c833-d29710b0674b}\Root\InventoryApplicationFile\rundll32.exe|c8d854bf61fafc41
|
Size
|
||
\REGISTRY\A\{5b1b1107-ca74-5af0-c833-d29710b0674b}\Root\InventoryApplicationFile\rundll32.exe|c8d854bf61fafc41
|
Language
|
||
\REGISTRY\A\{5b1b1107-ca74-5af0-c833-d29710b0674b}\Root\InventoryApplicationFile\rundll32.exe|c8d854bf61fafc41
|
IsOsComponent
|
||
\REGISTRY\A\{5b1b1107-ca74-5af0-c833-d29710b0674b}\Root\InventoryApplicationFile\rundll32.exe|c8d854bf61fafc41
|
Usn
|
There are 10 hidden registries, click here to show them.
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
1ABCCC00000
|
heap
|
page read and write
|
||
21E693D0000
|
heap
|
page read and write
|
||
1ED442E5000
|
heap
|
page read and write
|
||
1B3C6EA0000
|
heap
|
page read and write
|
||
21CB5A50000
|
heap
|
page read and write
|
||
C8784FF000
|
stack
|
page read and write
|
||
2739B730000
|
heap
|
page readonly
|
||
2E7ECE1000
|
stack
|
page read and write
|
||
25642D20000
|
remote allocation
|
page read and write
|
||
F219A41000
|
stack
|
page read and write
|
||
146D27C000
|
stack
|
page read and write
|
||
2AD2A9A0000
|
heap
|
page read and write
|
||
23E353C3000
|
heap
|
page read and write
|
||
DA07C7F000
|
stack
|
page read and write
|
||
1ED44020000
|
heap
|
page read and write
|
||
19DC56F5000
|
heap
|
page read and write
|
||
1B3C6F30000
|
heap
|
page read and write
|
||
17B724D8000
|
heap
|
page read and write
|
||
1E9A3D65000
|
heap
|
page read and write
|
||
12587550000
|
heap
|
page read and write
|
||
2B28EBA0000
|
remote allocation
|
page read and write
|
||
3ACE07F000
|
stack
|
page read and write
|
||
DA079CC000
|
stack
|
page read and write
|
||
2B3B3390000
|
heap
|
page read and write
|
||
25642D90000
|
heap
|
page read and write
|
||
F219E7F000
|
stack
|
page read and write
|
||
21A14F90000
|
heap
|
page read and write
|
||
2452D0A0000
|
heap
|
page read and write
|
||
1B0A9F90000
|
heap
|
page readonly
|
||
2AD2ACA0000
|
heap
|
page read and write
|
||
27399E00000
|
heap
|
page read and write
|
||
7FFDE1660000
|
direct allocation
|
page execute read
|
||
3ACDD21000
|
stack
|
page read and write
|
||
1B0A8640000
|
heap
|
page read and write
|
||
24D6C180000
|
remote allocation
|
page read and write
|
||
2B28EBC5000
|
heap
|
page read and write
|
||
1C9F1570000
|
heap
|
page read and write
|
||
21A16900000
|
remote allocation
|
page read and write
|
||
149DB950000
|
remote allocation
|
page read and write
|
||
85F88F1000
|
stack
|
page read and write
|
||
24D6C040000
|
heap
|
page read and write
|
||
21CB5C80000
|
heap
|
page read and write
|
||
763CA7F000
|
stack
|
page read and write
|
||
21E696F5000
|
heap
|
page read and write
|
||
202CDB75000
|
heap
|
page read and write
|
||
2E7F07F000
|
stack
|
page read and write
|
||
1C9EFC60000
|
heap
|
page read and write
|
||
7FFDE1660000
|
direct allocation
|
page execute read
|
||
85F8D7F000
|
stack
|
page read and write
|
||
763C74F000
|
stack
|
page read and write
|
||
1ABCCCB0000
|
heap
|
page readonly
|
||
202CDB80000
|
heap
|
page readonly
|
||
1ABCCC45000
|
heap
|
page read and write
|
||
28CF7A80000
|
heap
|
page read and write
|
||
19DC5540000
|
heap
|
page read and write
|
||
19935758000
|
heap
|
page read and write
|
||
5FBDA7F000
|
stack
|
page read and write
|
||
2B28E7B0000
|
heap
|
page read and write
|
||
85F89EF000
|
stack
|
page read and write
|
||
BEFF18E000
|
stack
|
page read and write
|
||
24D6C200000
|
heap
|
page read and write
|
||
1E9A3AA0000
|
heap
|
page read and write
|
||
A2D7C7F000
|
stack
|
page read and write
|
||
CA97EFF000
|
stack
|
page read and write
|
||
7FFDE1660000
|
direct allocation
|
page execute read
|
||
2452E980000
|
heap
|
page read and write
|
||
2AD2AC20000
|
heap
|
page read and write
|
||
23E355C5000
|
heap
|
page read and write
|
||
7FFDE1660000
|
direct allocation
|
page execute read
|
||
2452CCF0000
|
heap
|
page read and write
|
||
2AD2AB18000
|
heap
|
page read and write
|
||
146D37F000
|
stack
|
page read and write
|
||
97758FE000
|
stack
|
page read and write
|
||
28CF60B0000
|
heap
|
page readonly
|
||
1CD42E90000
|
heap
|
page readonly
|
||
23E353A0000
|
heap
|
page read and write
|
||
7FFE1151F000
|
unkown
|
page read and write
|
||
A8EB1CF000
|
stack
|
page read and write
|
||
146D2FF000
|
stack
|
page read and write
|
||
1C9EFA60000
|
heap
|
page read and write
|
||
21E693A0000
|
heap
|
page read and write
|
||
1CD414E8000
|
heap
|
page read and write
|
||
7FFDE1660000
|
direct allocation
|
page execute read
|
||
AE59851000
|
stack
|
page read and write
|
||
1E9A3C30000
|
remote allocation
|
page read and write
|
||
1B3C6DA0000
|
heap
|
page read and write
|
||
5BB537E000
|
stack
|
page read and write
|
||
202CDBD8000
|
heap
|
page read and write
|
||
24D6C048000
|
heap
|
page read and write
|
||
2AD2AC40000
|
remote allocation
|
page read and write
|
||
202CDBF3000
|
heap
|
page read and write
|
||
2452CF90000
|
remote allocation
|
page read and write
|
||
7FFE11513000
|
unkown
|
page readonly
|
||
12588D30000
|
heap
|
page read and write
|
||
17B726C0000
|
heap
|
page read and write
|
||
1B0A9FC0000
|
heap
|
page read and write
|
||
1B3C6E80000
|
heap
|
page read and write
|
||
7FFE11501000
|
unkown
|
page execute read
|
||
9775411000
|
stack
|
page read and write
|
||
17B724C0000
|
heap
|
page read and write
|
||
24D6DAD0000
|
heap
|
page read and write
|
||
E2682B1000
|
stack
|
page read and write
|
||
5BB527F000
|
stack
|
page read and write
|
||
7FFDE1660000
|
direct allocation
|
page execute read
|
||
28CF6185000
|
heap
|
page read and write
|
||
1B0A8970000
|
heap
|
page read and write
|
||
21CB5AD0000
|
heap
|
page readonly
|
||
1C9EFA50000
|
heap
|
page read and write
|
||
AE59CFF000
|
stack
|
page read and write
|
||
5FBD621000
|
stack
|
page read and write
|
||
A8EB051000
|
stack
|
page read and write
|
||
202CDB90000
|
remote allocation
|
page read and write
|
||
1C9EFC30000
|
heap
|
page read and write
|
||
149DB838000
|
heap
|
page read and write
|
||
286389F0000
|
heap
|
page read and write
|
||
2B28E830000
|
heap
|
page read and write
|
||
21CB5AE8000
|
heap
|
page read and write
|
||
2B28EBC0000
|
heap
|
page read and write
|
||
21A14EB0000
|
heap
|
page read and write
|
||
2B28E780000
|
heap
|
page read and write
|
||
28638A10000
|
heap
|
page read and write
|
||
1B0A8688000
|
heap
|
page read and write
|
||
19935930000
|
heap
|
page read and write
|
||
12587450000
|
heap
|
page read and write
|
||
1ABCCB20000
|
heap
|
page read and write
|
||
2452CEE0000
|
heap
|
page read and write
|
||
202CD9F0000
|
heap
|
page read and write
|
||
E2683AF000
|
stack
|
page read and write
|
||
19DC56F0000
|
heap
|
page read and write
|
||
2B3B18B8000
|
heap
|
page read and write
|
||
25642AA0000
|
heap
|
page read and write
|
||
2739B7F0000
|
heap
|
page read and write
|
||
1B0A8975000
|
heap
|
page read and write
|
||
286389F8000
|
heap
|
page read and write
|
||
28CF6030000
|
heap
|
page read and write
|
||
1C9F1480000
|
heap
|
page readonly
|
||
1B3C6F20000
|
heap
|
page readonly
|
||
149DB940000
|
heap
|
page readonly
|
||
A2D7861000
|
stack
|
page read and write
|
||
23E353A8000
|
heap
|
page read and write
|
||
1E9A3CC0000
|
heap
|
page read and write
|
||
19DC6F60000
|
heap
|
page read and write
|
||
5BB52FF000
|
stack
|
page read and write
|
||
202CDBD0000
|
heap
|
page read and write
|
||
19935890000
|
remote allocation
|
page read and write
|
||
C3D7D7F000
|
stack
|
page read and write
|
||
1ED442E0000
|
heap
|
page read and write
|
||
3ACDF1F000
|
stack
|
page read and write
|
||
1E9A3AF0000
|
heap
|
page read and write
|
||
1CD41870000
|
heap
|
page read and write
|
||
19DC5548000
|
heap
|
page read and write
|
||
3ACE0FF000
|
stack
|
page read and write
|
||
1E9A3AF8000
|
heap
|
page read and write
|
||
17B72885000
|
heap
|
page read and write
|
||
7FFDE1660000
|
direct allocation
|
page execute read
|
||
1B0A8680000
|
heap
|
page read and write
|
||
5FBD71F000
|
stack
|
page read and write
|
||
977558E000
|
stack
|
page read and write
|
||
21E69460000
|
heap
|
page read and write
|
||
21AC9FF000
|
stack
|
page read and write
|
||
286389D0000
|
heap
|
page readonly
|
||
F5ADEFF000
|
stack
|
page read and write
|
||
1E9A3D60000
|
heap
|
page read and write
|
||
146D47F000
|
stack
|
page read and write
|
||
7FFDE1660000
|
direct allocation
|
page execute read
|
||
2D55CD90000
|
heap
|
page read and write
|
||
2B3B19E0000
|
heap
|
page read and write
|
||
28CF5E40000
|
heap
|
page read and write
|
||
28638930000
|
heap
|
page read and write
|
||
1B0A868E000
|
heap
|
page read and write
|
||
2AD2AB10000
|
heap
|
page read and write
|
||
27399E90000
|
heap
|
page read and write
|
||
28CF5E68000
|
heap
|
page read and write
|
||
14D57A08000
|
heap
|
page read and write
|
||
21CB5970000
|
heap
|
page read and write
|
||
7FFDE1660000
|
direct allocation
|
page execute read
|
||
A2D795F000
|
stack
|
page read and write
|
||
149DB6C0000
|
heap
|
page read and write
|
||
94785CE000
|
stack
|
page read and write
|
||
23E35350000
|
heap
|
page read and write
|
||
7FFE11500000
|
unkown
|
page readonly
|
||
19935700000
|
heap
|
page read and write
|
||
85F8C7F000
|
stack
|
page read and write
|
||
1ED43EF0000
|
heap
|
page read and write
|
||
C3D7C7C000
|
stack
|
page read and write
|
||
F5ADE01000
|
stack
|
page read and write
|
||
2D55E7E0000
|
remote allocation
|
page read and write
|
||
21E6B090000
|
heap
|
page read and write
|
||
DA07CFD000
|
stack
|
page read and write
|
||
7FFDE1660000
|
direct allocation
|
page execute read
|
||
2B28E790000
|
heap
|
page read and write
|
||
17B72750000
|
remote allocation
|
page read and write
|
||
1ED43FD0000
|
heap
|
page read and write
|
||
2E7F17E000
|
stack
|
page read and write
|
||
28CF6180000
|
heap
|
page read and write
|
||
14D578A0000
|
heap
|
page read and write
|
||
12588ED0000
|
heap
|
page read and write
|
||
2452CCF8000
|
heap
|
page read and write
|
||
149DB7A0000
|
heap
|
page read and write
|
||
849F061000
|
stack
|
page read and write
|
||
149DB830000
|
heap
|
page read and write
|
||
14D57C15000
|
heap
|
page read and write
|
||
1ABCCC40000
|
heap
|
page read and write
|
||
2B3B18D1000
|
heap
|
page read and write
|
||
2AD2ACA5000
|
heap
|
page read and write
|
||
26A87F000
|
stack
|
page read and write
|
||
21AC35C000
|
stack
|
page read and write
|
||
C87847F000
|
stack
|
page read and write
|
||
25642D95000
|
heap
|
page read and write
|
||
24D6C170000
|
heap
|
page readonly
|
||
87A107F000
|
stack
|
page read and write
|
||
14D579A0000
|
heap
|
page read and write
|
||
1CD414E0000
|
heap
|
page read and write
|
||
28638CC0000
|
heap
|
page read and write
|
||
19DC53D0000
|
heap
|
page read and write
|
||
1CD41490000
|
heap
|
page read and write
|
||
1ABCCCC0000
|
remote allocation
|
page read and write
|
||
19DC5650000
|
heap
|
page readonly
|
||
25642B18000
|
heap
|
page read and write
|
||
19DC5660000
|
remote allocation
|
page read and write
|
||
21E696F0000
|
heap
|
page read and write
|
||
26A5CF000
|
stack
|
page read and write
|
||
2B3B31B0000
|
heap
|
page readonly
|
||
1CD42F50000
|
heap
|
page read and write
|
||
7FFDE1660000
|
direct allocation
|
page execute read
|
||
1C9F1490000
|
remote allocation
|
page read and write
|
||
23E36F10000
|
heap
|
page read and write
|
||
AE5994F000
|
stack
|
page read and write
|
||
947897F000
|
stack
|
page read and write
|
||
1CD41875000
|
heap
|
page read and write
|
||
17B72740000
|
heap
|
page readonly
|
||
2B290210000
|
heap
|
page read and write
|
||
7FFDE1660000
|
direct allocation
|
page execute read
|
||
25642B10000
|
heap
|
page read and write
|
||
2AD2AA80000
|
heap
|
page read and write
|
||
1ABCCCE8000
|
heap
|
page read and write
|
||
12587370000
|
heap
|
page read and write
|
||
3A6F36F000
|
stack
|
page read and write
|
||
7FFDE1660000
|
direct allocation
|
page execute read
|
||
2AD2AAA0000
|
heap
|
page read and write
|
||
286389E0000
|
remote allocation
|
page read and write
|
||
2D55CFC0000
|
heap
|
page read and write
|
||
F3AAD1C000
|
stack
|
page read and write
|
||
947887E000
|
stack
|
page read and write
|
||
F219B3F000
|
stack
|
page read and write
|
||
26A4D1000
|
stack
|
page read and write
|
||
27399D00000
|
heap
|
page read and write
|
||
21E69468000
|
heap
|
page read and write
|
||
14D57A00000
|
heap
|
page read and write
|
||
7FFDE1660000
|
direct allocation
|
page execute read
|
||
19DC54D0000
|
heap
|
page read and write
|
||
2D55CFB5000
|
heap
|
page read and write
|
||
27399DE0000
|
heap
|
page read and write
|
||
A8EB14E000
|
stack
|
page read and write
|
||
202CF5F0000
|
heap
|
page read and write
|
||
21CB5AE0000
|
heap
|
page read and write
|
||
21A14FF0000
|
heap
|
page read and write
|
||
19935880000
|
heap
|
page readonly
|
||
202CDB70000
|
heap
|
page read and write
|
||
C3D7DFE000
|
stack
|
page read and write
|
||
149DD1B0000
|
heap
|
page read and write
|
||
7FFDE1660000
|
direct allocation
|
page execute read
|
||
7FFDE1660000
|
direct allocation
|
page execute read
|
||
19935600000
|
heap
|
page read and write
|
||
24D6C205000
|
heap
|
page read and write
|
||
849F1DF000
|
stack
|
page read and write
|
||
28CF60C0000
|
remote allocation
|
page read and write
|
||
24D6BFF0000
|
heap
|
page read and write
|
||
2B3B18B0000
|
heap
|
page read and write
|
||
1CD42EA0000
|
remote allocation
|
page read and write
|
||
21CB5D10000
|
heap
|
page read and write
|
||
F3AB07E000
|
stack
|
page read and write
|
||
21A16A40000
|
heap
|
page read and write
|
||
1E9A39A0000
|
heap
|
page read and write
|
||
28CF5E60000
|
heap
|
page read and write
|
||
27399E45000
|
heap
|
page read and write
|
||
27399E98000
|
heap
|
page read and write
|
||
F3AB0FF000
|
stack
|
page read and write
|
||
21A15155000
|
heap
|
page read and write
|
||
2B3B19E5000
|
heap
|
page read and write
|
||
CA97F7E000
|
stack
|
page read and write
|
||
23E35330000
|
heap
|
page read and write
|
||
1B0A8560000
|
heap
|
page read and write
|
||
14D57980000
|
heap
|
page read and write
|
||
7FFDE1660000
|
direct allocation
|
page execute read
|
||
7FFDE1660000
|
direct allocation
|
page execute read
|
||
3ACE27F000
|
stack
|
page read and write
|
||
F5AE07E000
|
stack
|
page read and write
|
||
199356E0000
|
heap
|
page read and write
|
||
3ACE2FE000
|
stack
|
page read and write
|
||
94784D1000
|
stack
|
page read and write
|
||
2739B740000
|
remote allocation
|
page read and write
|
||
23E355C0000
|
heap
|
page read and write
|
||
1E9A3B0F000
|
heap
|
page read and write
|
||
1ED45930000
|
remote allocation
|
page read and write
|
||
5E7273F000
|
stack
|
page read and write
|
||
2B28E838000
|
heap
|
page read and write
|
||
2863A400000
|
heap
|
page read and write
|
||
C3D7CFF000
|
stack
|
page read and write
|
||
1C9EFC55000
|
heap
|
page read and write
|
||
1ABCCCE0000
|
heap
|
page read and write
|
||
14D57C10000
|
heap
|
page read and write
|
||
24D6BEF0000
|
heap
|
page read and write
|
||
2E7EDDF000
|
stack
|
page read and write
|
||
7FFDE1660000
|
direct allocation
|
page execute read
|
||
19935750000
|
heap
|
page read and write
|
||
CA97E7E000
|
stack
|
page read and write
|
||
7FFE11521000
|
unkown
|
page readonly
|
||
1B3C70D0000
|
heap
|
page read and write
|
||
7FFDE1660000
|
direct allocation
|
page execute read
|
||
25642A70000
|
heap
|
page read and write
|
||
1ABCE5F0000
|
heap
|
page read and write
|
||
1C9EFA68000
|
heap
|
page read and write
|
||
1C9EFC50000
|
heap
|
page read and write
|
||
2D55E920000
|
heap
|
page read and write
|
||
2AD2AB2E000
|
heap
|
page read and write
|
||
21E693B0000
|
heap
|
page read and write
|
||
25642B33000
|
heap
|
page read and write
|
||
977550E000
|
stack
|
page read and write
|
||
21E69640000
|
remote allocation
|
page read and write
|
||
21A15150000
|
heap
|
page read and write
|
||
12587459000
|
heap
|
page read and write
|
||
21A14FB0000
|
heap
|
page read and write
|
||
2452D0A5000
|
heap
|
page read and write
|
||
1E9A3A80000
|
heap
|
page read and write
|
||
28638850000
|
heap
|
page read and write
|
||
F5ADF7E000
|
stack
|
page read and write
|
||
3ACE1FF000
|
stack
|
page read and write
|
||
24D6BFD0000
|
heap
|
page read and write
|
||
1ED43FF0000
|
heap
|
page read and write
|
||
19935935000
|
heap
|
page read and write
|
||
1258745D000
|
heap
|
page read and write
|
||
2B3B18BE000
|
heap
|
page read and write
|
||
2D55E7D0000
|
heap
|
page readonly
|
||
BEFF4FF000
|
stack
|
page read and write
|
||
25642A80000
|
heap
|
page read and write
|
||
17B726A0000
|
heap
|
page read and write
|
||
2452CE00000
|
heap
|
page read and write
|
||
CA97BCF000
|
stack
|
page read and write
|
||
7FFDE1660000
|
direct allocation
|
page execute read
|
||
202CDAD0000
|
heap
|
page read and write
|
||
C87814F000
|
stack
|
page read and write
|
||
19937240000
|
heap
|
page read and write
|
||
2D55CFB0000
|
heap
|
page read and write
|
||
F3AAD9F000
|
stack
|
page read and write
|
||
17B72880000
|
heap
|
page read and write
|
||
149DB7C0000
|
heap
|
page read and write
|
||
7FFDE1660000
|
direct allocation
|
page execute read
|
||
21A15013000
|
heap
|
page read and write
|
||
1B3C6F38000
|
heap
|
page read and write
|
||
21CB5AEF000
|
heap
|
page read and write
|
||
763C7CE000
|
stack
|
page read and write
|
||
2D55CEA0000
|
heap
|
page read and write
|
||
7FFDE1660000
|
direct allocation
|
page execute read
|
||
F219EFF000
|
stack
|
page read and write
|
||
A2D7CFE000
|
stack
|
page read and write
|
||
7FFDE1660000
|
direct allocation
|
page execute read
|
||
21A14FF8000
|
heap
|
page read and write
|
||
3A6F271000
|
stack
|
page read and write
|
||
7FFDE1660000
|
direct allocation
|
page execute read
|
||
763C6CC000
|
stack
|
page read and write
|
||
7FFDE1660000
|
direct allocation
|
page execute read
|
||
2B28EB90000
|
heap
|
page readonly
|
||
1B3C7030000
|
remote allocation
|
page read and write
|
||
19DC54B0000
|
heap
|
page read and write
|
||
849F15F000
|
stack
|
page read and write
|
||
21CB5A70000
|
heap
|
page read and write
|
||
2D55CF80000
|
heap
|
page read and write
|
||
17B741B0000
|
heap
|
page read and write
|
||
1B3C7145000
|
heap
|
page read and write
|
||
7FFDE1660000
|
direct allocation
|
page execute read
|
||
CA97AD1000
|
stack
|
page read and write
|
||
27399E40000
|
heap
|
page read and write
|
||
17B724D0000
|
heap
|
page read and write
|
||
2B3B1880000
|
heap
|
page read and write
|
||
2B3B17A0000
|
heap
|
page read and write
|
||
2D55CD98000
|
heap
|
page read and write
|
||
2AD2AC30000
|
heap
|
page readonly
|
||
1B3C7140000
|
heap
|
page read and write
|
||
2452CF80000
|
heap
|
page readonly
|
||
3A6F3EF000
|
stack
|
page read and write
|
||
BEFF47F000
|
stack
|
page read and write
|
||
1CD41470000
|
heap
|
page read and write
|
||
2452CF00000
|
heap
|
page read and write
|
||
5BB4F21000
|
stack
|
page read and write
|
||
21CB5D15000
|
heap
|
page read and write
|
||
23E354F0000
|
remote allocation
|
page read and write
|
||
149DB9A0000
|
heap
|
page read and write
|
||
14D57BE0000
|
heap
|
page read and write
|
||
202CDAF0000
|
heap
|
page read and write
|
||
C878051000
|
stack
|
page read and write
|
||
1B0A8660000
|
heap
|
page read and write
|
||
3ACDE21000
|
stack
|
page read and write
|
||
23E35250000
|
heap
|
page read and write
|
||
1ED44028000
|
heap
|
page read and write
|
||
28638CC5000
|
heap
|
page read and write
|
||
7FFDE1660000
|
direct allocation
|
page execute read
|
||
1E9A3C20000
|
heap
|
page readonly
|
||
87A0D71000
|
stack
|
page read and write
|
||
1ABCCC20000
|
heap
|
page read and write
|
||
2B3B19B0000
|
heap
|
page read and write
|
||
5E72641000
|
stack
|
page read and write
|
||
1ED45920000
|
heap
|
page readonly
|
||
28CF5E30000
|
heap
|
page read and write
|
||
1ED459C0000
|
heap
|
page read and write
|
||
1CD41460000
|
heap
|
page read and write
|
||
5FBDAFE000
|
stack
|
page read and write
|
||
25642CF0000
|
heap
|
page read and write
|
||
14D57B20000
|
heap
|
page readonly
|
||
BEFF091000
|
stack
|
page read and write
|
||
87A10FF000
|
stack
|
page read and write
|
||
7FFE11528000
|
unkown
|
page readonly
|
||
28638950000
|
heap
|
page read and write
|
||
DA07D7F000
|
stack
|
page read and write
|
||
149DB9A5000
|
heap
|
page read and write
|
||
AE59C7F000
|
stack
|
page read and write
|
There are 406 hidden memdumps, click here to show them.