Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
Payment_Volksbank_EUR36550-Bestellung -4500673541.com.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
|
initial sample
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\L2D128LW\json[1].json
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\BooConf.ini
|
ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\bhvF4C4.tmp
|
Extensible storage engine DataBase, version 0x620, checksum 0xadd8c841, page size 32768, DirtyShutdown, Windows version 10.0
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\hvglntqjpwxqeafzzxxpsjflkurl
|
Unicode text, UTF-16, little-endian text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\nsf961A.tmp\System.dll
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\tmc.ini
|
ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\classrooms\Hematologist\gutterblood.fri
|
data
|
dropped
|
||
C:\Users\user\classrooms\Hematologist\inexorable.aut
|
data
|
dropped
|
||
C:\Users\user\classrooms\Hematologist\milieustyrelses.byg
|
data
|
dropped
|
||
C:\Users\user\classrooms\Hematologist\traumatically.fra
|
data
|
dropped
|
||
C:\Users\user\classrooms\Hematologist\vennekredse.som
|
Matlab v4 mat-file (little endian) , numeric, rows 10092776, columns 0
|
dropped
|
||
C:\Users\user\classrooms\Navnefringers\Alkoholisters26.txt
|
ASCII text, with very long lines (377), with no line terminators
|
dropped
|
||
C:\Users\user\classrooms\Navnefringers\Mediumises.Res
|
data
|
dropped
|
||
C:\Users\user\classrooms\Navnefringers\Phagophobia.Unt
|
data
|
dropped
|
There are 5 hidden files, click here to show them.
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\Payment_Volksbank_EUR36550-Bestellung -4500673541.com.exe
|
"C:\Users\user\Desktop\Payment_Volksbank_EUR36550-Bestellung -4500673541.com.exe"
|
||
C:\Users\user\Desktop\Payment_Volksbank_EUR36550-Bestellung -4500673541.com.exe
|
"C:\Users\user\Desktop\Payment_Volksbank_EUR36550-Bestellung -4500673541.com.exe"
|
||
C:\Users\user\Desktop\Payment_Volksbank_EUR36550-Bestellung -4500673541.com.exe
|
"C:\Users\user\Desktop\Payment_Volksbank_EUR36550-Bestellung -4500673541.com.exe" /stext "C:\Users\user\AppData\Local\Temp\hvglntqjpwxqeafzzxxpsjflkurl"
|
||
C:\Users\user\Desktop\Payment_Volksbank_EUR36550-Bestellung -4500673541.com.exe
|
"C:\Users\user\Desktop\Payment_Volksbank_EUR36550-Bestellung -4500673541.com.exe" /stext "C:\Users\user\AppData\Local\Temp\sptdomaclepvggbdihsivorutbiuqfu"
|
||
C:\Users\user\Desktop\Payment_Volksbank_EUR36550-Bestellung -4500673541.com.exe
|
"C:\Users\user\Desktop\Payment_Volksbank_EUR36550-Bestellung -4500673541.com.exe" /stext "C:\Users\user\AppData\Local\Temp\cjzw"
|
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
https://cdnjs.cloudflare.com/ajax/libs/gsap/3.5.1/gsap.min.js
|
unknown
|
||
http://www.imvu.comr
|
unknown
|
||
https://account.live.com/Resources/images/Microsoft_Logotype_White_4MYDQRab31HKDWWN-1HafA2.svg
|
unknown
|
||
https://s1.adform.net/Banners/Elements/Files/2070608/10170131/bvpath_258/pics/k3.jpg
|
unknown
|
||
https://acctcdn.msftauth.net/oneds_MC5gQfpbTUjLu60sQCwU1w2.js?v=1
|
unknown
|
||
https://s1.adform.net/Banners/Elements/Files/2070608/10170131/bvpath_258/pics/footer.png
|
unknown
|
||
https://ajax.aspnetcdn.com/ajax/jquery/jquery-3.3.1.min.js
|
unknown
|
||
https://csp.withgoogle.com/csp/ads-programmable
|
unknown
|
||
https://aefd.nelreports.net/api/report?cat=bingaotak
|
unknown
|
||
https://assets.adobedtm.com/5ef092d1efb5/4d1d9f749fd3/2b6d8bd51279/RC0ee8c30f496b428a91d7f3289a2b8a2
|
unknown
|
||
https://assets.adobedtm.com/5ef092d1efb5/4d1d9f749fd3/2b6d8bd51279/RC784fc6783b2f45a09cb8efa184cc684
|
unknown
|
||
https://deff.nelreports.net/api/report?cat=msn
|
unknown
|
||
https://account.live.com/Resources/images/AppCentipede/AppCentipede_Microsoft_white_ufRYlllWOw4YyDRi
|
unknown
|
||
https://www.google.com/chrome/
|
unknown
|
||
http://cdp.thawte.com/ThawteRSACA2018.crl0L
|
unknown
|
||
https://cxcs.microsoft.net/static/public/tips/neutral/6c6740da-0bfe-48a6-83fc-c98d1919b060/3addf02b7
|
unknown
|
||
https://csp.withgoogle.com/csp/report-to/active-view-scs-read-write-acl
|
unknown
|
||
https://static-ecst.licdn.com/apc/trans.gif?ae11829b3d6e895a2a3516fac536a339
|
unknown
|
||
https://acctcdn.msftauth.net/confirmidentity_9m6e3jBPkyZiRdJxglsYsA2.js?v=1
|
unknown
|
||
http://crls.pki.goog/gts1c3/QOvJ0N1sT2A.crl0
|
unknown
|
||
https://www.msn.com
|
unknown
|
||
https://sync-t1.taboola.com/sg/criteortb-network/1/rtb-h/?taboola_hm=b2df1cf6-0873-4430-916b-9612e80
|
unknown
|
||
https://static2.sharepointonline.com/files/fabric/assets/fonts/segoeui-westeuropean/segoeui-light.wo
|
unknown
|
||
https://btloader.com/tag?o=6208086025961472&upapi=true
|
unknown
|
||
http://www.imvu.comata
|
unknown
|
||
https://use.typekit.net/af/eaf09c/000000000000000000017703/27/d?subset_id=2&fvd=n7&v=3
|
unknown
|
||
https://assets.msn.com/weathermapdata/1/static/svg/72/MostlySunnyDay.svg
|
unknown
|
||
https://acctcdn.msftauth.net/hostfooterpackage_FOuGbot8yZGKyYkh5yNQBA2.js?v=1
|
unknown
|
||
https://img.img-taboola.com/taboola/image/fetch/f_jpg%2Cq_auto%2Ce_sharpen%2Ch_311%2Cw_207%2Cc_pad%2
|
unknown
|
||
https://assets.adobedtm.com/5ef092d1efb5/4d1d9f749fd3/2b6d8bd51279/RCe691e5baee9945259179326d0658843
|
unknown
|
||
http://ocsp.sca1b.amazontrust.com06
|
unknown
|
||
http://certs.godaddy.com/repository/1301
|
unknown
|
||
http://i.pki.goog/r1.crt0
|
unknown
|
||
http://www.imvu.com
|
unknown
|
||
https://acctcdn.msftauth.net/accountcorepackage_hSxsZy9Ymkhjr2rMMwej_g2.js?v=1
|
unknown
|
||
http://ocsp.rootca1.amazontrust.com0:
|
unknown
|
||
https://certs.godaddy.com/repository/0
|
unknown
|
||
https://pki.goog/repository/0
|
unknown
|
||
https://www.msn.com/
|
unknown
|
||
http://i.pki.goog/wr2.crt0
|
unknown
|
||
https://assets.adobedtm.com/5ef092d1efb5/4d1d9f749fd3/2b6d8bd51279/RCd01d50cad19649bf857a22be5995480
|
unknown
|
||
http://cacerts.thawte.com/ThawteRSACA2018.crt0
|
unknown
|
||
http://crl.godaddy.com/gdroot-g2.crl0F
|
unknown
|
||
http://crl.rootg2.amazontrust.com/rootg2.crl0
|
unknown
|
||
https://2542116.fls.doubleclick.net/activityi;src=2542116;type=2542116;cat=chrom0;ord=8672137916610;
|
unknown
|
||
https://account.live.com/Resources/images/favicon.ico
|
unknown
|
||
https://www.msn.com/?ocid=iehp
|
unknown
|
||
https://cvision.media.net/new/300x300/2/45/221/3/7d5dc6a9-5325-442d-926e-f2c668b8e65e.jpg?v=9
|
unknown
|
||
https://assets.adobedtm.com/5ef092d1efb5/4d1d9f749fd3/2b6d8bd51279/RC8cd6be4f72cf4da1aa891e7da23d144
|
unknown
|
||
https://aefd.nelreports.net/api/report?cat=bingrms
|
unknown
|
||
https://www.google.com/accounts/servicelogin
|
unknown
|
||
https://assets.adobedtm.com/5ef092d1efb5/4d1d9f749fd3/2b6d8bd51279/RC028e72ad6b944b8183346fecb32a729
|
unknown
|
||
https://acctcdn.msftauth.net/wlivepackagefull_stPwvW3-5mShoxrbkAw2qw2.js?v=1
|
unknown
|
||
https://cxcs.microsoft.net/api/settings/en-US/xml/settings-tipset?release=20h1&sku=Professional&plat
|
unknown
|
||
http://crl.pki.goog/gsr1/gsr1.crl0;
|
unknown
|
||
https://s1.adform.net/Banners/Elements/Files/2070608/10170131/bvpath_258/pics/k2.jpg
|
unknown
|
||
http://crl.godaddy.com/gdig2s1-2558.crl0
|
unknown
|
||
http://ocsp.sectigo.com0
|
unknown
|
||
http://certificates.godaddy.com/repository/0
|
unknown
|
||
https://aefd.nelreports.net/api/report?cat=bingth
|
unknown
|
||
https://s1.adform.net/banners/scripts/rmb/Adform.DHTML.js?bv=626
|
unknown
|
||
https://eb2.3lift.com/sync?
|
unknown
|
||
https://acdn.adnxs.com/dmp/async_usersync.html
|
unknown
|
||
https://assets.adobedtm.com/launch-EN7b3d710ac67a4a1195648458258f97dd.min.js
|
unknown
|
||
http://www.imvu.comhttp://www.ebuddy.comhttps://www.google.com
|
unknown
|
||
https://aefd.nelreports.net/api/report?cat=wsb&ndcParam=QUZE
|
unknown
|
||
http://crls.pki.goog/gts1c3/zdATt0Ex_Fk.crl0
|
unknown
|
||
https://csp.withgoogle.com/csp/report-to/adspam-signals-scs
|
unknown
|
||
http://pki.goog/repo/certs/gts1c3.der07
|
unknown
|
||
https://2542116.fls.doubleclick.net/activityi;src=2542116;type=clien612;cat=chromx;ord=1;num=7209567
|
unknown
|
||
https://contextual.media.net/checksync.php?&vsSync=1&cs=1&hb=1&cv=37&ndec=1&cid=8HBI57XIG&prvid=77%2
|
unknown
|
||
https://srtb.msn.com/auction?a=de-ch&b=bba24733ba4a487f8f8706bf3811269e&c=MSN&d=https%3A%2F%2Fwww.ms
|
unknown
|
||
http://c.pki.goog/r/r1.crl0
|
unknown
|
||
https://use.typekit.net/af/cb695f/000000000000000000017701/27/d?subset_id=2&fvd=n4&v=3
|
unknown
|
||
https://www.msn.com/de-ch/?ocid=iehp
|
unknown
|
||
https://account.live.com/Resources/images/AppCentipede/AppCentipede_Microsoft_HFeToeM4u6fzMQF_f_rQ5Q
|
unknown
|
||
https://www.google.com/chrome/thank-you.html?statcb=0&installdataindex=empty&defaultbrowser=0
|
unknown
|
||
https://www.googletagservices.com/activeview/js/current/rx_lidar.js?cache=r20110914
|
unknown
|
||
https://static.doubleclick.net/dynamic/5/283983386/11928812572019506176_2845462151855228713.jpeg
|
unknown
|
||
https://www.msn.com/spartan/en-gb/kernel/appcache/cache.appcache?locale=en-GB&market=GB&enableregula
|
unknown
|
||
https://www.msn.com/spartan/ientp?locale=en-GB&market=GB&enableregulatorypsm=0&enablecpsm=0&NTLogo=1
|
unknown
|
||
https://ecs.nel.measure.office.net?TenantId=ODSP_Sync_Client&DestinationEndpoint=Edge-Prod-BL2r8d&Fr
|
unknown
|
||
https://assets.adobedtm.com/5ef092d1efb5/4d1d9f749fd3/2b6d8bd51279/RCefb91313fdae420ebbea45d8f044894
|
unknown
|
||
https://account.live.com/identity/confirm?mkt=EN-US&uiflavor=win10host&client_id=1E0000480728C5&conn
|
unknown
|
||
https://dsm09prdapp01-canary-opaph.netmon.azure.com/apc/trans.gif?8f6ec558c7d1c621e0d5881446d586b0
|
unknown
|
||
https://adservice.google.com/ddm/fls/i/src=2542116;type=chrom322;cat=chrom01g;ord=3739368433491;gtm=
|
unknown
|
||
https://www.google.com/pagead/drt/ui
|
unknown
|
||
https://account.live.com/Resources/images/Arrows/left_qcwoJO81F7bEFg3Pj_fUEA2.svg
|
unknown
|
||
http://geoplugin.net/json.gpb9
|
unknown
|
||
http://geoplugin.net/json.gpgramFi
|
unknown
|
||
https://acctcdn.msftauth.net/jqueryshim_hlu0tTfjWJFWYNt1WZrVqg2.js?v=1
|
unknown
|
||
http://pki.goog/gsr1/gsr1.crt02
|
unknown
|
||
http://pki.goog/repo/certs/gts1c3.der0$
|
unknown
|
||
https://img.img-taboola.com/taboola/image/fetch/f_jpg%2Cq_auto%2Ch_368%2Cw_622%2Cc_fill%2Cg_faces:au
|
unknown
|
||
https://assets.adobedtm.com/5ef092d1efb5/4d1d9f749fd3/2b6d8bd51279/RCacc6c4ed30494f9fad065afe638a7ca
|
unknown
|
||
https://img.img-taboola.com/taboola/image/fetch/f_jpg%2Cq_auto%2Ch_311%2Cw_207%2Cc_fill%2Cg_faces:au
|
unknown
|
||
http://geoplugin.net/json.gp
|
178.237.33.50
|
||
https://cvision.media.net/new/300x300/2/75/165/127/fefc2984-60ee-407b-a704-0db527f30f53.jpg?v=9
|
unknown
|
||
https://ims-na1.adobelogin.com/ims/authorize/v1?locale=en_us&client_id=AdobeReader9&redirect_uri=htt
|
unknown
|
||
https://static2.sharepointonline.com/files/fabric/assets/fonts/segoeui-westeuropean/segoeui-bold.wof
|
unknown
|
There are 90 hidden URLs, click here to show them.
Domains
Name
|
IP
|
Malicious
|
|
---|---|---|---|
geoplugin.net
|
178.237.33.50
|
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
102.165.14.28
|
unknown
|
South Africa
|
||
178.237.33.50
|
geoplugin.net
|
Netherlands
|
Registry
Path
|
Value
|
Malicious
|
|
---|---|---|---|
HKEY_CURRENT_USER\SOFTWARE\Rmc-0V7E34
|
exepath
|
||
HKEY_CURRENT_USER\SOFTWARE\Rmc-0V7E34
|
licence
|
||
HKEY_CURRENT_USER\SOFTWARE\Rmc-0V7E34
|
time
|
||
HKEY_CURRENT_USER\svejtserfrancenes\bassangerens
|
metastatical
|
||
HKEY_CURRENT_USER\displayledning\Uninstall\Alacrities\boulevardize
|
whick
|
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
416E000
|
heap
|
page read and write
|
||
4180000
|
heap
|
page read and write
|
||
25B5000
|
remote allocation
|
page execute and read and write
|
||
55B5000
|
direct allocation
|
page execute and read and write
|
||
4175000
|
heap
|
page read and write
|
||
3496A000
|
heap
|
page read and write
|
||
28C1000
|
heap
|
page read and write
|
||
2E90000
|
direct allocation
|
page read and write
|
||
23B3000
|
heap
|
page read and write
|
||
2AC1000
|
heap
|
page read and write
|
||
408000
|
unkown
|
page readonly
|
||
2ADC000
|
heap
|
page read and write
|
||
5FF000
|
heap
|
page read and write
|
||
2741000
|
heap
|
page read and write
|
||
23B1000
|
heap
|
page read and write
|
||
2B32000
|
heap
|
page read and write
|
||
630000
|
heap
|
page read and write
|
||
23A2000
|
heap
|
page read and write
|
||
34969000
|
heap
|
page read and write
|
||
41A9000
|
heap
|
page read and write
|
||
34EFC000
|
unclassified section
|
page execute and read and write
|
||
2AD4000
|
heap
|
page read and write
|
||
23A9000
|
heap
|
page read and write
|
||
23A5000
|
heap
|
page read and write
|
||
23B8000
|
heap
|
page read and write
|
||
5E8000
|
heap
|
page read and write
|
||
2790000
|
direct allocation
|
page read and write
|
||
23AD000
|
heap
|
page read and write
|
||
2ADC000
|
heap
|
page read and write
|
||
2414000
|
heap
|
page read and write
|
||
23A1000
|
heap
|
page read and write
|
||
2AD2000
|
heap
|
page read and write
|
||
5E90000
|
heap
|
page read and write
|
||
348F0000
|
heap
|
page read and write
|
||
23BD000
|
heap
|
page read and write
|
||
5E4000
|
heap
|
page read and write
|
||
4110000
|
direct allocation
|
page read and write
|
||
2E50000
|
direct allocation
|
page read and write
|
||
2B32000
|
heap
|
page read and write
|
||
34C99000
|
heap
|
page read and write
|
||
41D7000
|
heap
|
page read and write
|
||
2B32000
|
heap
|
page read and write
|
||
4AE000
|
stack
|
page read and write
|
||
401000
|
unkown
|
page execute read
|
||
41B9000
|
heap
|
page read and write
|
||
5E5000
|
heap
|
page read and write
|
||
34D42000
|
heap
|
page read and write
|
||
34F56000
|
direct allocation
|
page execute and read and write
|
||
2AF5000
|
heap
|
page read and write
|
||
5E0000
|
heap
|
page read and write
|
||
34D77000
|
heap
|
page read and write
|
||
30000
|
heap
|
page read and write
|
||
4050000
|
direct allocation
|
page read and write
|
||
2B32000
|
heap
|
page read and write
|
||
27B0000
|
heap
|
page read and write
|
||
41C9000
|
heap
|
page read and write
|
||
2F53000
|
heap
|
page read and write
|
||
23B8000
|
heap
|
page read and write
|
||
41B9000
|
heap
|
page read and write
|
||
2B32000
|
heap
|
page read and write
|
||
2AC7000
|
heap
|
page read and write
|
||
23CE000
|
heap
|
page read and write
|
||
401000
|
unkown
|
page execute read
|
||
2AC1000
|
heap
|
page read and write
|
||
23B1000
|
heap
|
page read and write
|
||
4100000
|
direct allocation
|
page read and write
|
||
494000
|
heap
|
page read and write
|
||
23F0000
|
heap
|
page read and write
|
||
42F0000
|
heap
|
page read and write
|
||
2AC3000
|
heap
|
page read and write
|
||
23BE000
|
heap
|
page read and write
|
||
2740000
|
heap
|
page read and write
|
||
2EA0000
|
direct allocation
|
page read and write
|
||
C60000
|
heap
|
page read and write
|
||
23BE000
|
heap
|
page read and write
|
||
2AC1000
|
heap
|
page read and write
|
||
494000
|
heap
|
page read and write
|
||
3456C000
|
stack
|
page read and write
|
||
23B0000
|
heap
|
page read and write
|
||
34F40000
|
direct allocation
|
page read and write
|
||
4164000
|
heap
|
page read and write
|
||
2EC0000
|
trusted library allocation
|
page read and write
|
||
40AE000
|
stack
|
page read and write
|
||
401000
|
unkown
|
page execute read
|
||
34968000
|
heap
|
page read and write
|
||
2390000
|
heap
|
page read and write
|
||
494000
|
heap
|
page read and write
|
||
30000
|
heap
|
page read and write
|
||
400000
|
unkown
|
page readonly
|
||
5E4000
|
heap
|
page read and write
|
||
2AC7000
|
heap
|
page read and write
|
||
23BE000
|
heap
|
page read and write
|
||
41A6000
|
heap
|
page read and write
|
||
2AF5000
|
heap
|
page read and write
|
||
34DEF000
|
heap
|
page read and write
|
||
5E50000
|
direct allocation
|
page read and write
|
||
2EB0000
|
direct allocation
|
page read and write
|
||
2412000
|
heap
|
page read and write
|
||
34E20000
|
unclassified section
|
page execute and read and write
|
||
23A9000
|
heap
|
page read and write
|
||
23BE000
|
heap
|
page read and write
|
||
23BD000
|
heap
|
page read and write
|
||
5E4000
|
heap
|
page read and write
|
||
23AC000
|
heap
|
page read and write
|
||
5E4000
|
heap
|
page read and write
|
||
C66000
|
heap
|
page read and write
|
||
408000
|
unkown
|
page readonly
|
||
23C1000
|
heap
|
page read and write
|
||
910000
|
heap
|
page read and write
|
||
40A000
|
unkown
|
page write copy
|
||
9C000
|
stack
|
page read and write
|
||
34C21000
|
heap
|
page read and write
|
||
10003000
|
unkown
|
page readonly
|
||
2B32000
|
heap
|
page read and write
|
||
34D72000
|
heap
|
page read and write
|
||
23A1000
|
heap
|
page read and write
|
||
2AD8000
|
heap
|
page read and write
|
||
2ADC000
|
heap
|
page read and write
|
||
2ADC000
|
heap
|
page read and write
|
||
2AC3000
|
heap
|
page read and write
|
||
420D000
|
heap
|
page read and write
|
||
346AE000
|
stack
|
page read and write
|
||
297F000
|
heap
|
page read and write
|
||
7E3000
|
unkown
|
page readonly
|
||
400000
|
unkown
|
page readonly
|
||
34D13000
|
heap
|
page read and write
|
||
28C0000
|
heap
|
page read and write
|
||
2E60000
|
direct allocation
|
page read and write
|
||
2EC0000
|
trusted library allocation
|
page read and write
|
||
9E0000
|
heap
|
page read and write
|
||
23A9000
|
heap
|
page read and write
|
||
2AC6000
|
heap
|
page read and write
|
||
23B0000
|
heap
|
page read and write
|
||
23A4000
|
heap
|
page read and write
|
||
680000
|
heap
|
page read and write
|
||
A18000
|
heap
|
page read and write
|
||
3016000
|
heap
|
page read and write
|
||
27C1000
|
heap
|
page read and write
|
||
2FEF000
|
heap
|
page read and write
|
||
5E4000
|
heap
|
page read and write
|
||
2258000
|
heap
|
page read and write
|
||
2B32000
|
heap
|
page read and write
|
||
347ED000
|
stack
|
page read and write
|
||
34EA0000
|
unclassified section
|
page execute and read and write
|
||
7CA000
|
unkown
|
page read and write
|
||
473000
|
system
|
page execute and read and write
|
||
420D000
|
heap
|
page read and write
|
||
7A6000
|
unkown
|
page read and write
|
||
C30000
|
heap
|
page read and write
|
||
494000
|
heap
|
page read and write
|
||
41C4000
|
heap
|
page read and write
|
||
23B5000
|
heap
|
page read and write
|
||
401000
|
unkown
|
page execute read
|
||
494000
|
heap
|
page read and write
|
||
C33000
|
heap
|
page read and write
|
||
5F70000
|
heap
|
page read and write
|
||
348F1000
|
heap
|
page read and write
|
||
23BD000
|
heap
|
page read and write
|
||
41AC000
|
heap
|
page read and write
|
||
400000
|
unkown
|
page readonly
|
||
23A1000
|
heap
|
page read and write
|
||
408000
|
unkown
|
page readonly
|
||
2B32000
|
heap
|
page read and write
|
||
2AC1000
|
heap
|
page read and write
|
||
41E1000
|
heap
|
page read and write
|
||
2AC1000
|
heap
|
page read and write
|
||
2414000
|
heap
|
page read and write
|
||
C3D000
|
heap
|
page read and write
|
||
41C4000
|
heap
|
page read and write
|
||
CDF000
|
stack
|
page read and write
|
||
26FE000
|
stack
|
page read and write
|
||
494000
|
heap
|
page read and write
|
||
34F10000
|
unclassified section
|
page execute and read and write
|
||
400000
|
system
|
page execute and read and write
|
||
2B32000
|
heap
|
page read and write
|
||
19C000
|
stack
|
page read and write
|
||
41B9000
|
heap
|
page read and write
|
||
23BD000
|
heap
|
page read and write
|
||
23A4000
|
heap
|
page read and write
|
||
5E5000
|
heap
|
page read and write
|
||
494000
|
heap
|
page read and write
|
||
4196000
|
heap
|
page read and write
|
||
41B9000
|
heap
|
page read and write
|
||
34D77000
|
heap
|
page read and write
|
||
5E4000
|
heap
|
page read and write
|
||
34F41000
|
direct allocation
|
page execute and read and write
|
||
23B0000
|
heap
|
page read and write
|
||
2ADD000
|
heap
|
page read and write
|
||
34D77000
|
heap
|
page read and write
|
||
2B01000
|
heap
|
page read and write
|
||
23B0000
|
heap
|
page read and write
|
||
2ADC000
|
heap
|
page read and write
|
||
2AC6000
|
heap
|
page read and write
|
||
2ADC000
|
heap
|
page read and write
|
||
5E4000
|
heap
|
page read and write
|
||
494000
|
heap
|
page read and write
|
||
23B0000
|
heap
|
page read and write
|
||
34968000
|
heap
|
page read and write
|
||
34B8E000
|
heap
|
page read and write
|
||
34E93000
|
unclassified section
|
page execute and read and write
|
||
7E3000
|
unkown
|
page readonly
|
||
34E79000
|
unclassified section
|
page execute and read and write
|
||
C3E000
|
heap
|
page read and write
|
||
7DF000
|
unkown
|
page read and write
|
||
D1E000
|
stack
|
page read and write
|
||
2B32000
|
heap
|
page read and write
|
||
23BD000
|
heap
|
page read and write
|
||
23A2000
|
heap
|
page read and write
|
||
34DEC000
|
heap
|
page read and write
|
||
34F2B000
|
unclassified section
|
page execute and read and write
|
||
23EA000
|
heap
|
page read and write
|
||
3421E000
|
stack
|
page read and write
|
||
349E2000
|
heap
|
page read and write
|
||
494000
|
heap
|
page read and write
|
||
23B1000
|
heap
|
page read and write
|
||
7AD000
|
unkown
|
page read and write
|
||
401000
|
unkown
|
page execute read
|
||
2B32000
|
heap
|
page read and write
|
||
39B5000
|
remote allocation
|
page execute and read and write
|
||
5E60000
|
direct allocation
|
page read and write
|
||
23B0000
|
heap
|
page read and write
|
||
2AC1000
|
heap
|
page read and write
|
||
2AC1000
|
heap
|
page read and write
|
||
98000
|
stack
|
page read and write
|
||
2AC7000
|
heap
|
page read and write
|
||
27C1000
|
heap
|
page read and write
|
||
23B5000
|
heap
|
page read and write
|
||
30000
|
heap
|
page read and write
|
||
3431F000
|
stack
|
page read and write
|
||
41AA000
|
heap
|
page read and write
|
||
2AF5000
|
heap
|
page read and write
|
||
41C4000
|
heap
|
page read and write
|
||
2DF0000
|
heap
|
page read and write
|
||
400000
|
unkown
|
page readonly
|
||
2E70000
|
direct allocation
|
page read and write
|
||
C20000
|
heap
|
page read and write
|
||
34EF6000
|
unclassified section
|
page execute and read and write
|
||
34C20000
|
heap
|
page read and write
|
||
786000
|
unkown
|
page read and write
|
||
371C000
|
stack
|
page read and write
|
||
A0F000
|
heap
|
page read and write
|
||
2B32000
|
heap
|
page read and write
|
||
23A9000
|
heap
|
page read and write
|
||
2B32000
|
heap
|
page read and write
|
||
34D77000
|
heap
|
page read and write
|
||
A1C000
|
heap
|
page read and write
|
||
A0D000
|
heap
|
page read and write
|
||
5E5000
|
heap
|
page read and write
|
||
408000
|
unkown
|
page readonly
|
||
A3C000
|
heap
|
page read and write
|
||
2AD0000
|
heap
|
page read and write
|
||
2B32000
|
heap
|
page read and write
|
||
23B0000
|
heap
|
page read and write
|
||
23BD000
|
heap
|
page read and write
|
||
5E4000
|
heap
|
page read and write
|
||
2AC1000
|
heap
|
page read and write
|
||
23E3000
|
heap
|
page read and write
|
||
41AE000
|
heap
|
page read and write
|
||
9C000
|
stack
|
page read and write
|
||
2AC1000
|
heap
|
page read and write
|
||
5E4000
|
heap
|
page read and write
|
||
2B32000
|
heap
|
page read and write
|
||
2AC1000
|
heap
|
page read and write
|
||
2FB5000
|
remote allocation
|
page execute and read and write
|
||
2B32000
|
heap
|
page read and write
|
||
10005000
|
unkown
|
page readonly
|
||
2B32000
|
heap
|
page read and write
|
||
41A6000
|
heap
|
page read and write
|
||
916000
|
heap
|
page read and write
|
||
2ADD000
|
heap
|
page read and write
|
||
99E000
|
stack
|
page read and write
|
||
2AD3000
|
heap
|
page read and write
|
||
26BE000
|
stack
|
page read and write
|
||
27C1000
|
heap
|
page read and write
|
||
41A9000
|
heap
|
page read and write
|
||
420D000
|
heap
|
page read and write
|
||
2409000
|
heap
|
page read and write
|
||
4060000
|
heap
|
page read and write
|
||
2B32000
|
heap
|
page read and write
|
||
5FD000
|
heap
|
page read and write
|
||
8E0000
|
heap
|
page read and write
|
||
7E3000
|
unkown
|
page readonly
|
||
41AB000
|
heap
|
page read and write
|
||
7E3000
|
unkown
|
page readonly
|
||
2F5D000
|
heap
|
page read and write
|
||
5E5000
|
heap
|
page read and write
|
||
C00000
|
heap
|
page read and write
|
||
4128000
|
heap
|
page read and write
|
||
494000
|
heap
|
page read and write
|
||
494000
|
heap
|
page read and write
|
||
2B32000
|
heap
|
page read and write
|
||
23BD000
|
heap
|
page read and write
|
||
A33000
|
heap
|
page read and write
|
||
23B1000
|
heap
|
page read and write
|
||
44EF000
|
stack
|
page read and write
|
||
4066000
|
heap
|
page read and write
|
||
9E8000
|
heap
|
page read and write
|
||
5E4000
|
heap
|
page read and write
|
||
789000
|
unkown
|
page read and write
|
||
5E4000
|
heap
|
page read and write
|
||
A30000
|
heap
|
page read and write
|
||
2AC7000
|
heap
|
page read and write
|
||
23BD000
|
heap
|
page read and write
|
||
7DD000
|
stack
|
page read and write
|
||
177000
|
stack
|
page read and write
|
||
34DBB000
|
heap
|
page read and write
|
||
C0C000
|
heap
|
page read and write
|
||
408000
|
unkown
|
page readonly
|
||
2B32000
|
heap
|
page read and write
|
||
87D000
|
stack
|
page read and write
|
||
2B32000
|
heap
|
page read and write
|
||
2AD4000
|
heap
|
page read and write
|
||
23BD000
|
heap
|
page read and write
|
||
239C000
|
heap
|
page read and write
|
||
23BD000
|
heap
|
page read and write
|
||
41A6000
|
heap
|
page read and write
|
||
782000
|
unkown
|
page read and write
|
||
41B9000
|
heap
|
page read and write
|
||
23BD000
|
heap
|
page read and write
|
||
62E000
|
stack
|
page read and write
|
||
23BD000
|
heap
|
page read and write
|
||
41A9000
|
heap
|
page read and write
|
||
C0C000
|
heap
|
page read and write
|
||
2AC6000
|
heap
|
page read and write
|
||
BDF000
|
stack
|
page read and write
|
||
5E4000
|
heap
|
page read and write
|
||
5AE000
|
stack
|
page read and write
|
||
5E5000
|
heap
|
page read and write
|
||
4A80000
|
direct allocation
|
page execute and read and write
|
||
2EC0000
|
trusted library allocation
|
page read and write
|
||
22C0000
|
heap
|
page read and write
|
||
239C000
|
heap
|
page read and write
|
||
2370000
|
heap
|
page read and write
|
||
2390000
|
heap
|
page read and write
|
||
2B32000
|
heap
|
page read and write
|
||
494000
|
heap
|
page read and write
|
||
348F1000
|
heap
|
page read and write
|
||
2280000
|
trusted library allocation
|
page read and write
|
||
5E4000
|
heap
|
page read and write
|
||
2AC6000
|
heap
|
page read and write
|
||
2AC9000
|
heap
|
page read and write
|
||
5E40000
|
direct allocation
|
page read and write
|
||
23A1000
|
heap
|
page read and write
|
||
2F63000
|
heap
|
page read and write
|
||
2E30000
|
trusted library allocation
|
page read and write
|
||
239D000
|
heap
|
page read and write
|
||
2EC2000
|
heap
|
page read and write
|
||
41C4000
|
heap
|
page read and write
|
||
19E000
|
stack
|
page read and write
|
||
23BD000
|
heap
|
page read and write
|
||
A35000
|
heap
|
page read and write
|
||
34C9A000
|
heap
|
page read and write
|
||
6B4000
|
heap
|
page read and write
|
||
2413000
|
heap
|
page read and write
|
||
50E000
|
heap
|
page read and write
|
||
28C1000
|
heap
|
page read and write
|
||
2AC1000
|
heap
|
page read and write
|
||
401000
|
unkown
|
page execute read
|
||
348EF000
|
stack
|
page read and write
|
||
41AC000
|
heap
|
page read and write
|
||
9C000
|
stack
|
page read and write
|
||
23B0000
|
heap
|
page read and write
|
||
4630000
|
heap
|
page read and write
|
||
41C4000
|
heap
|
page read and write
|
||
2AC1000
|
heap
|
page read and write
|
||
30000
|
heap
|
page read and write
|
||
2AD3000
|
heap
|
page read and write
|
||
2AC6000
|
heap
|
page read and write
|
||
2AC1000
|
heap
|
page read and write
|
||
1BB5000
|
remote allocation
|
page execute and read and write
|
||
41A9000
|
heap
|
page read and write
|
||
23BD000
|
heap
|
page read and write
|
||
41C9000
|
heap
|
page read and write
|
||
41E1000
|
heap
|
page read and write
|
||
2B32000
|
heap
|
page read and write
|
||
381B000
|
stack
|
page read and write
|
||
2ADD000
|
heap
|
page read and write
|
||
23B3000
|
heap
|
page read and write
|
||
25F4000
|
heap
|
page read and write
|
||
23AC000
|
heap
|
page read and write
|
||
41B9000
|
heap
|
page read and write
|
||
41C4000
|
heap
|
page read and write
|
||
400000
|
system
|
page execute and read and write
|
||
17C000
|
stack
|
page read and write
|
||
5E4000
|
heap
|
page read and write
|
||
30000
|
heap
|
page read and write
|
||
23A1000
|
heap
|
page read and write
|
||
193000
|
stack
|
page read and write
|
||
23B1000
|
heap
|
page read and write
|
||
23BD000
|
heap
|
page read and write
|
||
408000
|
unkown
|
page readonly
|
||
2AC1000
|
heap
|
page read and write
|
||
2B32000
|
heap
|
page read and write
|
||
2AC7000
|
heap
|
page read and write
|
||
A7F000
|
stack
|
page read and write
|
||
2B32000
|
heap
|
page read and write
|
||
5E0000
|
heap
|
page read and write
|
||
34DEF000
|
heap
|
page read and write
|
||
2AC9000
|
heap
|
page read and write
|
||
A5F000
|
stack
|
page read and write
|
||
A42000
|
heap
|
page read and write
|
||
5E4000
|
heap
|
page read and write
|
||
2AC1000
|
heap
|
page read and write
|
||
23A1000
|
heap
|
page read and write
|
||
2600000
|
heap
|
page read and write
|
||
2380000
|
heap
|
page read and write
|
||
2AD8000
|
heap
|
page read and write
|
||
2B32000
|
heap
|
page read and write
|
||
688000
|
heap
|
page read and write
|
||
40A000
|
unkown
|
page write copy
|
||
2AC6000
|
heap
|
page read and write
|
||
27C0000
|
heap
|
page read and write
|
||
400000
|
unkown
|
page readonly
|
||
41A6000
|
heap
|
page read and write
|
||
1A80000
|
remote allocation
|
page execute and read and write
|
||
5E30000
|
direct allocation
|
page read and write
|
||
5E5000
|
heap
|
page read and write
|
||
41B000
|
system
|
page execute and read and write
|
||
2EC8000
|
heap
|
page read and write
|
||
7E3000
|
unkown
|
page readonly
|
||
494000
|
heap
|
page read and write
|
||
2AD8000
|
heap
|
page read and write
|
||
92E000
|
stack
|
page read and write
|
||
34D8B000
|
heap
|
page read and write
|
||
3620000
|
heap
|
page read and write
|
||
5FB5000
|
direct allocation
|
page execute and read and write
|
||
2B32000
|
heap
|
page read and write
|
||
5CE000
|
stack
|
page read and write
|
||
2AD3000
|
heap
|
page read and write
|
||
34968000
|
heap
|
page read and write
|
||
41C4000
|
heap
|
page read and write
|
||
459000
|
system
|
page execute and read and write
|
||
2B32000
|
heap
|
page read and write
|
||
23BD000
|
heap
|
page read and write
|
||
10000000
|
unkown
|
page readonly
|
||
41A9000
|
heap
|
page read and write
|
||
23A7000
|
heap
|
page read and write
|
||
23CA000
|
heap
|
page read and write
|
||
2414000
|
heap
|
page read and write
|
||
23BD000
|
heap
|
page read and write
|
||
41A9000
|
heap
|
page read and write
|
||
40A000
|
unkown
|
page write copy
|
||
23BD000
|
heap
|
page read and write
|
||
34968000
|
heap
|
page read and write
|
||
2AC1000
|
heap
|
page read and write
|
||
6A7000
|
heap
|
page read and write
|
||
2AC1000
|
heap
|
page read and write
|
||
7E3000
|
unkown
|
page readonly
|
||
2EC0000
|
direct allocation
|
page read and write
|
||
2EC0000
|
heap
|
page read and write
|
||
4120000
|
heap
|
page read and write
|
||
2AC8000
|
heap
|
page read and write
|
||
2B32000
|
heap
|
page read and write
|
||
7B3000
|
unkown
|
page read and write
|
||
2B32000
|
heap
|
page read and write
|
||
4196000
|
heap
|
page read and write
|
||
19A000
|
stack
|
page read and write
|
||
2B32000
|
heap
|
page read and write
|
||
5E4000
|
heap
|
page read and write
|
||
2741000
|
heap
|
page read and write
|
||
10012000
|
trusted library allocation
|
page read and write
|
||
40A000
|
unkown
|
page read and write
|
||
23B5000
|
heap
|
page read and write
|
||
2E40000
|
direct allocation
|
page read and write
|
||
2B32000
|
heap
|
page read and write
|
||
2AC0000
|
heap
|
page read and write
|
||
58E000
|
stack
|
page read and write
|
||
2ECD000
|
heap
|
page read and write
|
||
2AC1000
|
heap
|
page read and write
|
||
5E5000
|
heap
|
page read and write
|
||
95E000
|
stack
|
page read and write
|
||
2ED0000
|
direct allocation
|
page read and write
|
||
2FF0000
|
heap
|
page read and write
|
||
41A6000
|
heap
|
page read and write
|
||
45C000
|
system
|
page execute and read and write
|
||
5E10000
|
direct allocation
|
page read and write
|
||
41B9000
|
heap
|
page read and write
|
||
34D8B000
|
heap
|
page read and write
|
||
2B29000
|
heap
|
page read and write
|
||
4E8000
|
heap
|
page read and write
|
||
3466D000
|
stack
|
page read and write
|
||
34D8B000
|
heap
|
page read and write
|
||
23A7000
|
heap
|
page read and write
|
||
401000
|
unkown
|
page execute read
|
||
2AC6000
|
heap
|
page read and write
|
||
2610000
|
heap
|
page read and write
|
||
400000
|
unkown
|
page readonly
|
||
420D000
|
heap
|
page read and write
|
||
40A000
|
unkown
|
page write copy
|
||
408000
|
unkown
|
page readonly
|
||
23B1000
|
heap
|
page read and write
|
||
41AC000
|
heap
|
page read and write
|
||
77C000
|
unkown
|
page read and write
|
||
2EC0000
|
trusted library allocation
|
page read and write
|
||
2AC1000
|
heap
|
page read and write
|
||
2AD0000
|
heap
|
page read and write
|
||
349E2000
|
heap
|
page read and write
|
||
9D000
|
stack
|
page read and write
|
||
23BD000
|
heap
|
page read and write
|
||
5E5000
|
heap
|
page read and write
|
||
23A9000
|
heap
|
page read and write
|
||
41AD000
|
heap
|
page read and write
|
||
2B32000
|
heap
|
page read and write
|
||
23B0000
|
heap
|
page read and write
|
||
10001000
|
unkown
|
page execute read
|
||
5FF000
|
heap
|
page read and write
|
||
2AD8000
|
heap
|
page read and write
|
||
400000
|
unkown
|
page readonly
|
||
19C000
|
stack
|
page read and write
|
||
C03000
|
heap
|
page read and write
|
||
2AC1000
|
heap
|
page read and write
|
||
40A000
|
unkown
|
page write copy
|
||
7AF000
|
stack
|
page read and write
|
||
347AF000
|
stack
|
page read and write
|
||
40F0000
|
direct allocation
|
page read and write
|
||
494000
|
heap
|
page read and write
|
||
97F000
|
stack
|
page read and write
|
||
494000
|
heap
|
page read and write
|
||
2AC1000
|
heap
|
page read and write
|
||
A30000
|
heap
|
page read and write
|
||
494000
|
heap
|
page read and write
|
||
419A000
|
heap
|
page read and write
|
||
2EC0000
|
trusted library allocation
|
page read and write
|
||
2605000
|
heap
|
page read and write
|
||
23B1000
|
heap
|
page read and write
|
||
456000
|
system
|
page execute and read and write
|
||
40A000
|
unkown
|
page write copy
|
||
4197000
|
heap
|
page read and write
|
||
2BFF000
|
stack
|
page read and write
|
||
2E80000
|
direct allocation
|
page read and write
|
||
2B32000
|
heap
|
page read and write
|
||
2ADC000
|
heap
|
page read and write
|
||
A2F000
|
stack
|
page read and write
|
||
7E3000
|
unkown
|
page readonly
|
||
41C4000
|
heap
|
page read and write
|
||
27C6000
|
heap
|
page read and write
|
||
2AC7000
|
heap
|
page read and write
|
||
23A7000
|
heap
|
page read and write
|
||
23B5000
|
heap
|
page read and write
|
||
2ACC000
|
heap
|
page read and write
|
||
C20000
|
trusted library allocation
|
page read and write
|
||
348F1000
|
heap
|
page read and write
|
||
A2A000
|
heap
|
page read and write
|
||
2B32000
|
heap
|
page read and write
|
||
2E30000
|
trusted library allocation
|
page read and write
|
||
7A4000
|
unkown
|
page read and write
|
||
41F4000
|
heap
|
page read and write
|
||
41B9000
|
heap
|
page read and write
|
||
C66000
|
heap
|
page read and write
|
||
420D000
|
heap
|
page read and write
|
||
23B0000
|
heap
|
page read and write
|
||
2B29000
|
heap
|
page read and write
|
||
2EC0000
|
trusted library allocation
|
page read and write
|
||
239C000
|
heap
|
page read and write
|
||
23A1000
|
heap
|
page read and write
|
||
23A5000
|
heap
|
page read and write
|
||
2B32000
|
heap
|
page read and write
|
||
4BB5000
|
direct allocation
|
page execute and read and write
|
||
5E20000
|
direct allocation
|
page read and write
|
||
239E000
|
heap
|
page read and write
|
||
2B32000
|
heap
|
page read and write
|
||
E1F000
|
stack
|
page read and write
|
||
8EF000
|
stack
|
page read and write
|
||
34D72000
|
heap
|
page read and write
|
||
23B0000
|
heap
|
page read and write
|
||
4E0000
|
heap
|
page read and write
|
||
23AD000
|
heap
|
page read and write
|
||
2B32000
|
heap
|
page read and write
|
||
7EE000
|
stack
|
page read and write
|
||
41A9000
|
heap
|
page read and write
|
||
490000
|
heap
|
page read and write
|
||
23B4000
|
heap
|
page read and write
|
||
95E000
|
stack
|
page read and write
|
||
34330000
|
heap
|
page read and write
|
||
2B32000
|
heap
|
page read and write
|
||
46E000
|
stack
|
page read and write
|
||
25F0000
|
heap
|
page read and write
|
||
2E30000
|
direct allocation
|
page read and write
|
||
23BD000
|
heap
|
page read and write
|
||
2AF5000
|
heap
|
page read and write
|
||
2AD8000
|
heap
|
page read and write
|
||
2F83000
|
heap
|
page read and write
|
||
23BD000
|
heap
|
page read and write
|
||
28C1000
|
heap
|
page read and write
|
||
23A9000
|
heap
|
page read and write
|
||
228B000
|
heap
|
page read and write
|
||
23AC000
|
heap
|
page read and write
|
||
C3D000
|
heap
|
page read and write
|
||
41A6000
|
heap
|
page read and write
|
||
4D0000
|
heap
|
page read and write
|
||
2AC7000
|
heap
|
page read and write
|
||
2AC7000
|
heap
|
page read and write
|
||
18F000
|
stack
|
page read and write
|
||
34D13000
|
heap
|
page read and write
|
||
2AC1000
|
heap
|
page read and write
|
||
23B8000
|
heap
|
page read and write
|
||
19F000
|
stack
|
page read and write
|
||
69B5000
|
direct allocation
|
page execute and read and write
|
||
23A4000
|
heap
|
page read and write
|
||
23B5000
|
heap
|
page read and write
|
||
9A0000
|
heap
|
page read and write
|
||
19A000
|
stack
|
page read and write
|
||
400000
|
system
|
page execute and read and write
|
||
8DF000
|
stack
|
page read and write
|
||
2B32000
|
heap
|
page read and write
|
||
23A1000
|
heap
|
page read and write
|
||
494000
|
heap
|
page read and write
|
||
34D72000
|
heap
|
page read and write
|
||
239C000
|
heap
|
page read and write
|
||
2CFF000
|
stack
|
page read and write
|
There are 600 hidden memdumps, click here to show them.