Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
SecuriteInfo.com.Win32.RATX-gen.1803.21030.exe
|
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
|
initial sample
|
||
C:\Users\user\AppData\Local\cvchost.exe
|
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\cvchost.exe:Zone.Identifier
|
ASCII text, with CRLF line terminators
|
modified
|
||
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\cvchost.vbs
|
ASCII text, with no line terminators
|
dropped
|
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\SecuriteInfo.com.Win32.RATX-gen.1803.21030.exe
|
"C:\Users\user\Desktop\SecuriteInfo.com.Win32.RATX-gen.1803.21030.exe"
|
||
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
|
"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"
|
||
C:\Windows\SysWOW64\WerFault.exe
|
C:\Windows\SysWOW64\WerFault.exe -u -p 7836 -s 1120
|
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
https://github.com/mgravell/protobuf-net
|
unknown
|
||
https://github.com/mgravell/protobuf-neti
|
unknown
|
||
https://stackoverflow.com/q/14436606/23354
|
unknown
|
||
https://github.com/mgravell/protobuf-netJ
|
unknown
|
||
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
|
unknown
|
||
https://stackoverflow.com/q/11564914/23354;
|
unknown
|
||
https://stackoverflow.com/q/2152978/23354
|
unknown
|
Domains
Name
|
IP
|
Malicious
|
|
---|---|---|---|
s-part-0017.t-0009.t-msedge.net
|
13.107.246.45
|
||
fp2e7a.wpc.phicdn.net
|
192.229.221.95
|
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
4AC4000
|
trusted library allocation
|
page read and write
|
||
37A6000
|
trusted library allocation
|
page read and write
|
||
6E90000
|
trusted library section
|
page read and write
|
||
3C64000
|
trusted library allocation
|
page read and write
|
||
3D69000
|
trusted library allocation
|
page read and write
|
||
7381000
|
trusted library allocation
|
page read and write
|
||
3AA2000
|
trusted library allocation
|
page read and write
|
||
3DAC000
|
trusted library allocation
|
page read and write
|
||
3C30000
|
trusted library allocation
|
page read and write
|
||
3C53000
|
trusted library allocation
|
page read and write
|
||
3BFA000
|
trusted library allocation
|
page read and write
|
||
5D1F000
|
stack
|
page read and write
|
||
3A84000
|
trusted library allocation
|
page read and write
|
||
3B22000
|
trusted library allocation
|
page read and write
|
||
4765000
|
trusted library allocation
|
page read and write
|
||
3DF5000
|
trusted library allocation
|
page read and write
|
||
1BB0000
|
trusted library allocation
|
page read and write
|
||
F38000
|
stack
|
page read and write
|
||
6620000
|
heap
|
page read and write
|
||
3D30000
|
trusted library allocation
|
page read and write
|
||
15D0000
|
heap
|
page read and write
|
||
3BAE000
|
trusted library allocation
|
page read and write
|
||
3D76000
|
trusted library allocation
|
page read and write
|
||
5EA5000
|
trusted library allocation
|
page read and write
|
||
3AC9000
|
trusted library allocation
|
page read and write
|
||
5C1E000
|
stack
|
page read and write
|
||
3B99000
|
trusted library allocation
|
page read and write
|
||
39F1000
|
trusted library allocation
|
page read and write
|
||
3AF2000
|
trusted library allocation
|
page read and write
|
||
1096000
|
heap
|
page read and write
|
||
6E0E000
|
stack
|
page read and write
|
||
5B1E000
|
stack
|
page read and write
|
||
661E000
|
stack
|
page read and write
|
||
1FB0000
|
heap
|
page read and write
|
||
6E20000
|
trusted library allocation
|
page execute and read and write
|
||
1058000
|
heap
|
page read and write
|
||
1A64000
|
heap
|
page read and write
|
||
E3C000
|
stack
|
page read and write
|
||
3DDA000
|
trusted library allocation
|
page read and write
|
||
61DE000
|
stack
|
page read and write
|
||
3A7A000
|
trusted library allocation
|
page read and write
|
||
3DD2000
|
trusted library allocation
|
page read and write
|
||
3B0D000
|
trusted library allocation
|
page read and write
|
||
3C1D000
|
trusted library allocation
|
page read and write
|
||
3C49000
|
trusted library allocation
|
page read and write
|
||
3A2E000
|
trusted library allocation
|
page read and write
|
||
13E0000
|
heap
|
page read and write
|
||
3C3C000
|
trusted library allocation
|
page read and write
|
||
6E60000
|
trusted library allocation
|
page execute and read and write
|
||
3730000
|
heap
|
page read and write
|
||
47A5000
|
trusted library allocation
|
page read and write
|
||
F90000
|
heap
|
page read and write
|
||
3AEC000
|
trusted library allocation
|
page read and write
|
||
3A67000
|
trusted library allocation
|
page read and write
|
||
108A000
|
heap
|
page read and write
|
||
3C66000
|
trusted library allocation
|
page read and write
|
||
399E000
|
trusted library allocation
|
page read and write
|
||
C00000
|
unkown
|
page readonly
|
||
2CCD000
|
stack
|
page read and write
|
||
3AC7000
|
trusted library allocation
|
page read and write
|
||
1B90000
|
trusted library allocation
|
page read and write
|
||
3BAA000
|
trusted library allocation
|
page read and write
|
||
3D67000
|
trusted library allocation
|
page read and write
|
||
6E80000
|
trusted library allocation
|
page read and write
|
||
3E81000
|
trusted library allocation
|
page read and write
|
||
3D97000
|
trusted library allocation
|
page read and write
|
||
3B74000
|
trusted library allocation
|
page read and write
|
||
3C02000
|
trusted library allocation
|
page read and write
|
||
3D78000
|
trusted library allocation
|
page read and write
|
||
539E000
|
stack
|
page read and write
|
||
5E60000
|
trusted library allocation
|
page read and write
|
||
400000
|
remote allocation
|
page execute and read and write
|
||
3A97000
|
trusted library allocation
|
page read and write
|
||
3A08000
|
trusted library allocation
|
page read and write
|
||
1A30000
|
heap
|
page read and write
|
||
3DD0000
|
trusted library allocation
|
page read and write
|
||
13D0000
|
trusted library allocation
|
page execute and read and write
|
||
39D7000
|
trusted library allocation
|
page read and write
|
||
3D02000
|
trusted library allocation
|
page read and write
|
||
4741000
|
trusted library allocation
|
page read and write
|
||
2E81000
|
trusted library allocation
|
page read and write
|
||
3DAA000
|
trusted library allocation
|
page read and write
|
||
3D44000
|
trusted library allocation
|
page read and write
|
||
1A20000
|
trusted library allocation
|
page read and write
|
||
3720000
|
trusted library allocation
|
page read and write
|
||
5D90000
|
heap
|
page read and write
|
||
3C06000
|
trusted library allocation
|
page read and write
|
||
3ACB000
|
trusted library allocation
|
page read and write
|
||
39BC000
|
trusted library allocation
|
page read and write
|
||
5F00000
|
heap
|
page execute and read and write
|
||
3B3B000
|
trusted library allocation
|
page read and write
|
||
3A65000
|
trusted library allocation
|
page read and write
|
||
3A7E000
|
trusted library allocation
|
page read and write
|
||
1AFE000
|
heap
|
page read and write
|
||
3B3D000
|
trusted library allocation
|
page read and write
|
||
3C36000
|
trusted library allocation
|
page read and write
|
||
3C38000
|
trusted library allocation
|
page read and write
|
||
3B41000
|
trusted library allocation
|
page read and write
|
||
F85000
|
heap
|
page read and write
|
||
3B24000
|
trusted library allocation
|
page read and write
|
||
106E000
|
heap
|
page read and write
|
||
3A1D000
|
trusted library allocation
|
page read and write
|
||
3C1B000
|
trusted library allocation
|
page read and write
|
||
3DED000
|
trusted library allocation
|
page read and write
|
||
3A27000
|
trusted library allocation
|
page read and write
|
||
1AA4000
|
heap
|
page read and write
|
||
3DD6000
|
trusted library allocation
|
page read and write
|
||
3ACD000
|
trusted library allocation
|
page read and write
|
||
5790000
|
remote allocation
|
page read and write
|
||
3BB6000
|
trusted library allocation
|
page read and write
|
||
5E6B000
|
trusted library allocation
|
page read and write
|
||
1B8A000
|
trusted library allocation
|
page execute and read and write
|
||
3C08000
|
trusted library allocation
|
page read and write
|
||
3D91000
|
trusted library allocation
|
page read and write
|
||
1A8E000
|
heap
|
page read and write
|
||
3D7A000
|
trusted library allocation
|
page read and write
|
||
3D72000
|
trusted library allocation
|
page read and write
|
||
6DC0000
|
trusted library allocation
|
page execute and read and write
|
||
1380000
|
trusted library allocation
|
page read and write
|
||
3B61000
|
trusted library allocation
|
page read and write
|
||
1A57000
|
heap
|
page read and write
|
||
111C000
|
heap
|
page read and write
|
||
39BA000
|
trusted library allocation
|
page read and write
|
||
3E08000
|
trusted library allocation
|
page read and write
|
||
15D5000
|
heap
|
page read and write
|
||
2F1B000
|
trusted library allocation
|
page read and write
|
||
2D0C000
|
trusted library allocation
|
page read and write
|
||
5680000
|
heap
|
page read and write
|
||
3E0A000
|
trusted library allocation
|
page read and write
|
||
1B70000
|
trusted library allocation
|
page read and write
|
||
1A24000
|
trusted library allocation
|
page read and write
|
||
57EE000
|
stack
|
page read and write
|
||
1B76000
|
trusted library allocation
|
page read and write
|
||
1BC0000
|
heap
|
page execute and read and write
|
||
39DB000
|
trusted library allocation
|
page read and write
|
||
1B92000
|
trusted library allocation
|
page read and write
|
||
586E000
|
stack
|
page read and write
|
||
6653000
|
heap
|
page read and write
|
||
2D7D000
|
heap
|
page read and write
|
||
3C21000
|
trusted library allocation
|
page read and write
|
||
3A53000
|
trusted library allocation
|
page read and write
|
||
3A95000
|
trusted library allocation
|
page read and write
|
||
3DEB000
|
trusted library allocation
|
page read and write
|
||
3AF4000
|
trusted library allocation
|
page read and write
|
||
1367000
|
trusted library allocation
|
page execute and read and write
|
||
3C3A000
|
trusted library allocation
|
page read and write
|
||
3D61000
|
trusted library allocation
|
page read and write
|
||
1A10000
|
trusted library allocation
|
page read and write
|
||
3C15000
|
trusted library allocation
|
page read and write
|
||
3A0A000
|
trusted library allocation
|
page read and write
|
||
1357000
|
trusted library allocation
|
page execute and read and write
|
||
1050000
|
heap
|
page read and write
|
||
3A42000
|
trusted library allocation
|
page read and write
|
||
1A3E000
|
heap
|
page read and write
|
||
39DD000
|
trusted library allocation
|
page read and write
|
||
600F000
|
stack
|
page read and write
|
||
3A1B000
|
trusted library allocation
|
page read and write
|
||
2D00000
|
trusted library allocation
|
page read and write
|
||
3B2D000
|
trusted library allocation
|
page read and write
|
||
3823000
|
trusted library allocation
|
page read and write
|
||
1AB2000
|
heap
|
page read and write
|
||
3A99000
|
trusted library allocation
|
page read and write
|
||
3ADE000
|
trusted library allocation
|
page read and write
|
||
3E06000
|
trusted library allocation
|
page read and write
|
||
1A3A000
|
heap
|
page read and write
|
||
3AF6000
|
trusted library allocation
|
page read and write
|
||
2D20000
|
heap
|
page execute and read and write
|
||
3AB2000
|
trusted library allocation
|
page read and write
|
||
F80000
|
heap
|
page read and write
|
||
6D90000
|
trusted library allocation
|
page read and write
|
||
3BB4000
|
trusted library allocation
|
page read and write
|
||
57A0000
|
trusted library allocation
|
page execute and read and write
|
||
3D5F000
|
trusted library allocation
|
page read and write
|
||
3B43000
|
trusted library allocation
|
page read and write
|
||
1107000
|
heap
|
page read and write
|
||
3A51000
|
trusted library allocation
|
page read and write
|
||
39CF000
|
trusted library allocation
|
page read and write
|
||
3AA6000
|
trusted library allocation
|
page read and write
|
||
3C34000
|
trusted library allocation
|
page read and write
|
||
6720000
|
trusted library allocation
|
page execute and read and write
|
||
39F4000
|
trusted library allocation
|
page read and write
|
||
6730000
|
trusted library allocation
|
page read and write
|
||
55B0000
|
trusted library section
|
page read and write
|
||
1350000
|
trusted library allocation
|
page read and write
|
||
3B5F000
|
trusted library allocation
|
page read and write
|
||
3D80000
|
trusted library allocation
|
page read and write
|
||
3C23000
|
trusted library allocation
|
page read and write
|
||
1AFB000
|
heap
|
page read and write
|
||
3B97000
|
trusted library allocation
|
page read and write
|
||
5760000
|
trusted library allocation
|
page execute and read and write
|
||
1BD0000
|
heap
|
page read and write
|
||
663D000
|
heap
|
page read and write
|
||
3036000
|
trusted library allocation
|
page read and write
|
||
15A0000
|
heap
|
page read and write
|
||
5E50000
|
trusted library allocation
|
page read and write
|
||
1B7D000
|
trusted library allocation
|
page execute and read and write
|
||
2D70000
|
heap
|
page read and write
|
||
3DA8000
|
trusted library allocation
|
page read and write
|
||
3B3F000
|
trusted library allocation
|
page read and write
|
||
1333000
|
trusted library allocation
|
page execute and read and write
|
||
4E88000
|
trusted library allocation
|
page read and write
|
||
3A87000
|
trusted library allocation
|
page read and write
|
||
53A0000
|
heap
|
page execute and read and write
|
||
39BE000
|
trusted library allocation
|
page read and write
|
||
15B0000
|
heap
|
page read and write
|
||
3C6A000
|
trusted library allocation
|
page read and write
|
||
19E0000
|
trusted library allocation
|
page read and write
|
||
110B000
|
heap
|
page read and write
|
||
3A6B000
|
trusted library allocation
|
page read and write
|
||
5E30000
|
trusted library allocation
|
page read and write
|
||
3A45000
|
trusted library allocation
|
page read and write
|
||
3710000
|
trusted library allocation
|
page execute and read and write
|
||
402000
|
remote allocation
|
page execute and read and write
|
||
5EB0000
|
trusted library allocation
|
page read and write
|
||
C02000
|
unkown
|
page readonly
|
||
FB0000
|
heap
|
page read and write
|
||
7090000
|
heap
|
page read and write
|
||
1334000
|
trusted library allocation
|
page read and write
|
||
3D9D000
|
trusted library allocation
|
page read and write
|
||
3A10000
|
trusted library allocation
|
page read and write
|
||
3882000
|
trusted library allocation
|
page read and write
|
||
3B2A000
|
trusted library allocation
|
page read and write
|
||
39DF000
|
trusted library allocation
|
page read and write
|
||
3B11000
|
trusted library allocation
|
page read and write
|
||
71B0000
|
trusted library allocation
|
page execute and read and write
|
||
6D20000
|
trusted library section
|
page read and write
|
||
3AF9000
|
trusted library allocation
|
page read and write
|
||
7370000
|
heap
|
page read and write
|
||
582E000
|
stack
|
page read and write
|
||
39C2000
|
trusted library allocation
|
page read and write
|
||
3B9C000
|
trusted library allocation
|
page read and write
|
||
3B5D000
|
trusted library allocation
|
page read and write
|
||
5D57000
|
stack
|
page read and write
|
||
39AB000
|
trusted library allocation
|
page read and write
|
||
1B6E000
|
stack
|
page read and write
|
||
1340000
|
trusted library allocation
|
page read and write
|
||
3DA6000
|
trusted library allocation
|
page read and write
|
||
3A4F000
|
trusted library allocation
|
page read and write
|
||
3A04000
|
trusted library allocation
|
page read and write
|
||
402C000
|
trusted library allocation
|
page read and write
|
||
6740000
|
trusted library allocation
|
page execute and read and write
|
||
3C4D000
|
trusted library allocation
|
page read and write
|
||
3D2E000
|
trusted library allocation
|
page read and write
|
||
3B95000
|
trusted library allocation
|
page read and write
|
||
3BEC000
|
trusted library allocation
|
page read and write
|
||
3D82000
|
trusted library allocation
|
page read and write
|
||
536F000
|
trusted library allocation
|
page read and write
|
||
39D5000
|
trusted library allocation
|
page read and write
|
||
3D4D000
|
trusted library allocation
|
page read and write
|
||
5EC0000
|
trusted library allocation
|
page read and write
|
||
1B97000
|
trusted library allocation
|
page execute and read and write
|
||
1320000
|
trusted library allocation
|
page read and write
|
||
3D2C000
|
trusted library allocation
|
page read and write
|
||
5E80000
|
trusted library allocation
|
page read and write
|
||
621E000
|
stack
|
page read and write
|
||
1AC7000
|
heap
|
page read and write
|
||
2D50000
|
trusted library section
|
page read and write
|
||
3AB0000
|
trusted library allocation
|
page read and write
|
||
1FAE000
|
stack
|
page read and write
|
||
3741000
|
trusted library allocation
|
page read and write
|
||
63DE000
|
stack
|
page read and write
|
||
3A38000
|
trusted library allocation
|
page read and write
|
||
3B28000
|
trusted library allocation
|
page read and write
|
||
1A2D000
|
trusted library allocation
|
page execute and read and write
|
||
58DE000
|
stack
|
page read and write
|
||
1B82000
|
trusted library allocation
|
page read and write
|
||
3C4F000
|
trusted library allocation
|
page read and write
|
||
3B7C000
|
trusted library allocation
|
page read and write
|
||
14A8000
|
unkown
|
page readonly
|
||
7F4B0000
|
trusted library allocation
|
page execute and read and write
|
||
3A9D000
|
trusted library allocation
|
page read and write
|
||
4314000
|
trusted library allocation
|
page read and write
|
||
3C00000
|
trusted library allocation
|
page read and write
|
||
1142000
|
heap
|
page read and write
|
||
3A80000
|
trusted library allocation
|
page read and write
|
||
3B1E000
|
trusted library allocation
|
page read and write
|
||
58D0000
|
trusted library allocation
|
page read and write
|
||
2CFF000
|
trusted library allocation
|
page read and write
|
||
3D46000
|
trusted library allocation
|
page read and write
|
||
3AB4000
|
trusted library allocation
|
page read and write
|
||
3B8F000
|
trusted library allocation
|
page read and write
|
||
3C68000
|
trusted library allocation
|
page read and write
|
||
153C000
|
stack
|
page read and write
|
||
6010000
|
trusted library section
|
page read and write
|
||
3D48000
|
trusted library allocation
|
page read and write
|
||
3B59000
|
trusted library allocation
|
page read and write
|
||
3A82000
|
trusted library allocation
|
page read and write
|
||
3B7A000
|
trusted library allocation
|
page read and write
|
||
3B0F000
|
trusted library allocation
|
page read and write
|
||
3A3C000
|
trusted library allocation
|
page read and write
|
||
3E0E000
|
trusted library allocation
|
page read and write
|
||
1136000
|
heap
|
page read and write
|
||
135A000
|
trusted library allocation
|
page execute and read and write
|
||
110D000
|
heap
|
page read and write
|
||
6695000
|
heap
|
page read and write
|
||
3B63000
|
trusted library allocation
|
page read and write
|
||
3D7E000
|
trusted library allocation
|
page read and write
|
||
2CD0000
|
heap
|
page read and write
|
||
6D00000
|
trusted library allocation
|
page read and write
|
||
3B5B000
|
trusted library allocation
|
page read and write
|
||
3E0C000
|
trusted library allocation
|
page read and write
|
||
3A29000
|
trusted library allocation
|
page read and write
|
||
3A9F000
|
trusted library allocation
|
page read and write
|
||
3D65000
|
trusted library allocation
|
page read and write
|
||
2ECF000
|
trusted library allocation
|
page read and write
|
||
3B14000
|
trusted library allocation
|
page read and write
|
||
3B20000
|
trusted library allocation
|
page read and write
|
||
3C1F000
|
trusted library allocation
|
page read and write
|
||
3C4B000
|
trusted library allocation
|
page read and write
|
||
1D90000
|
trusted library section
|
page read and write
|
||
3C2C000
|
trusted library allocation
|
page read and write
|
||
36CF000
|
stack
|
page read and write
|
||
3A55000
|
trusted library allocation
|
page read and write
|
||
3A2B000
|
trusted library allocation
|
page read and write
|
||
3A3A000
|
trusted library allocation
|
page read and write
|
||
3DF3000
|
trusted library allocation
|
page read and write
|
||
3DD8000
|
trusted library allocation
|
page read and write
|
||
71E3000
|
trusted library allocation
|
page read and write
|
||
3AFF000
|
trusted library allocation
|
page read and write
|
||
3D63000
|
trusted library allocation
|
page read and write
|
||
847F000
|
stack
|
page read and write
|
||
3A7C000
|
trusted library allocation
|
page read and write
|
||
665F000
|
heap
|
page read and write
|
||
5E84000
|
trusted library allocation
|
page read and write
|
||
708E000
|
stack
|
page read and write
|
||
3D4A000
|
trusted library allocation
|
page read and write
|
||
2E7E000
|
stack
|
page read and write
|
||
3D7C000
|
trusted library allocation
|
page read and write
|
||
3A69000
|
trusted library allocation
|
page read and write
|
||
3D85000
|
trusted library allocation
|
page read and write
|
||
6D70000
|
trusted library allocation
|
page read and write
|
||
3B91000
|
trusted library allocation
|
page read and write
|
||
3C19000
|
trusted library allocation
|
page read and write
|
||
3D95000
|
trusted library allocation
|
page read and write
|
||
370C000
|
stack
|
page read and write
|
||
3BFE000
|
trusted library allocation
|
page read and write
|
||
3BB0000
|
trusted library allocation
|
page read and write
|
||
3B26000
|
trusted library allocation
|
page read and write
|
||
6D80000
|
trusted library allocation
|
page execute and read and write
|
||
39C0000
|
trusted library allocation
|
page read and write
|
||
1B73000
|
trusted library allocation
|
page read and write
|
||
3ABA000
|
trusted library allocation
|
page read and write
|
||
3AF0000
|
trusted library allocation
|
page read and write
|
||
1A23000
|
trusted library allocation
|
page execute and read and write
|
||
1344000
|
trusted library allocation
|
page read and write
|
||
39C6000
|
trusted library allocation
|
page read and write
|
||
3AB8000
|
trusted library allocation
|
page read and write
|
||
39AE000
|
trusted library allocation
|
page read and write
|
||
3ABC000
|
trusted library allocation
|
page read and write
|
||
39EF000
|
trusted library allocation
|
page read and write
|
||
1120000
|
heap
|
page read and write
|
||
1B9B000
|
trusted library allocation
|
page execute and read and write
|
||
6D10000
|
trusted library allocation
|
page read and write
|
||
4BA000
|
remote allocation
|
page execute and read and write
|
||
3D99000
|
trusted library allocation
|
page read and write
|
||
3C28000
|
trusted library allocation
|
page read and write
|
||
39C4000
|
trusted library allocation
|
page read and write
|
||
6E30000
|
trusted library allocation
|
page read and write
|
||
3A0C000
|
trusted library allocation
|
page read and write
|
||
3AB6000
|
trusted library allocation
|
page read and write
|
||
3D5B000
|
trusted library allocation
|
page read and write
|
||
3A1F000
|
trusted library allocation
|
page read and write
|
||
39D9000
|
trusted library allocation
|
page read and write
|
||
1B86000
|
trusted library allocation
|
page execute and read and write
|
||
3B0B000
|
trusted library allocation
|
page read and write
|
||
3C51000
|
trusted library allocation
|
page read and write
|
||
5ED0000
|
trusted library allocation
|
page read and write
|
||
3DF8000
|
trusted library allocation
|
page read and write
|
||
3D5D000
|
trusted library allocation
|
page read and write
|
||
3C32000
|
trusted library allocation
|
page read and write
|
||
39ED000
|
trusted library allocation
|
page read and write
|
||
13CE000
|
stack
|
page read and write
|
||
1B07000
|
heap
|
page read and write
|
||
3B66000
|
trusted library allocation
|
page read and write
|
||
F70000
|
heap
|
page read and write
|
||
6220000
|
trusted library allocation
|
page read and write
|
||
18FC000
|
stack
|
page read and write
|
||
3AEE000
|
trusted library allocation
|
page read and write
|
||
5E2E000
|
stack
|
page read and write
|
||
107E000
|
heap
|
page read and write
|
||
651E000
|
stack
|
page read and write
|
||
3B76000
|
trusted library allocation
|
page read and write
|
||
2CF0000
|
trusted library allocation
|
page read and write
|
||
663B000
|
heap
|
page read and write
|
||
501D000
|
stack
|
page read and write
|
||
3A06000
|
trusted library allocation
|
page read and write
|
||
5C5B000
|
stack
|
page read and write
|
||
3C04000
|
trusted library allocation
|
page read and write
|
||
3D93000
|
trusted library allocation
|
page read and write
|
||
2D30000
|
heap
|
page read and write
|
||
6734000
|
trusted library allocation
|
page read and write
|
||
3A21000
|
trusted library allocation
|
page read and write
|
||
3A93000
|
trusted library allocation
|
page read and write
|
||
3A02000
|
trusted library allocation
|
page read and write
|
||
53B0000
|
heap
|
page read and write
|
||
3A25000
|
trusted library allocation
|
page read and write
|
||
5E40000
|
trusted library allocation
|
page read and write
|
||
39E2000
|
trusted library allocation
|
page read and write
|
||
55AE000
|
stack
|
page read and write
|
||
3DD4000
|
trusted library allocation
|
page read and write
|
||
3BFC000
|
trusted library allocation
|
page read and write
|
||
133D000
|
trusted library allocation
|
page execute and read and write
|
||
3BA8000
|
trusted library allocation
|
page read and write
|
||
6E10000
|
trusted library allocation
|
page execute and read and write
|
||
1A71000
|
heap
|
page read and write
|
||
3B78000
|
trusted library allocation
|
page read and write
|
||
3A3E000
|
trusted library allocation
|
page read and write
|
||
3A9B000
|
trusted library allocation
|
page read and write
|
||
3A40000
|
trusted library allocation
|
page read and write
|
||
1360000
|
trusted library allocation
|
page read and write
|
||
1B80000
|
trusted library allocation
|
page read and write
|
||
3BB2000
|
trusted library allocation
|
page read and write
|
||
502D000
|
trusted library allocation
|
page read and write
|
||
3B45000
|
trusted library allocation
|
page read and write
|
||
64DE000
|
stack
|
page read and write
|
||
136B000
|
trusted library allocation
|
page execute and read and write
|
There are 406 hidden memdumps, click here to show them.