Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
Zahlung_09102024,jpg.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
initial sample
|
||
C:\Users\user\AppData\Local\Temp\Okeghem
|
data
|
dropped
|
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\Zahlung_09102024,jpg.exe
|
"C:\Users\user\Desktop\Zahlung_09102024,jpg.exe"
|
||
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
|
"C:\Users\user\Desktop\Zahlung_09102024,jpg.exe"
|
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
https://www.office.com/
|
unknown
|
||
https://duckduckgo.com/chrome_newtab
|
unknown
|
||
https://duckduckgo.com/ac/?q=
|
unknown
|
||
https://api.telegram.org
|
unknown
|
||
https://www.google.com/images/branding/product/ico/googleg_lodp.ico
|
unknown
|
||
https://api.telegram.org/bot
|
unknown
|
||
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
|
unknown
|
||
https://api.telegram.org/bot/sendMessage?chat_id=&text=%20%0D%0A%0D%0APC%20Name:284992%0D%0ADate%20and%20Time:%2010/10/2024%20/%2013:51:17%0D%0ACountry%20Name:%20United%20States%0D%0A%5B%20284992%20Clicked%20on%20the%20File%20If%20you%20see%20nothing%20this's%20mean%20the%20system%20storage's%20empty.%20%5D
|
149.154.167.220
|
||
http://checkip.dyndns.org
|
unknown
|
||
https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
|
unknown
|
||
https://www.office.com/lBjq
|
unknown
|
||
https://reallyfreegeoip.org/xml/8.46.123.33
|
188.114.96.3
|
||
https://api.telegram.org/bot/sendMessage?chat_id=&text=
|
unknown
|
||
https://chrome.google.com/webstore?hl=en
|
unknown
|
||
https://www.ecosia.org/newtab/
|
unknown
|
||
http://varders.kozow.com:8081
|
unknown
|
||
http://aborters.duckdns.org:8081
|
unknown
|
||
https://ac.ecosia.org/autocomplete?q=
|
unknown
|
||
http://checkip.dyndns.org/
|
193.122.130.0
|
||
https://reallyfreegeoip.org/xml/8.46.123.33$
|
unknown
|
||
http://anotherarmy.dns.army:8081
|
unknown
|
||
https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
|
unknown
|
||
http://checkip.dyndns.org/q
|
unknown
|
||
https://reallyfreegeoip.org
|
unknown
|
||
https://api.telegram.org/bot/sendMessage?chat_id=&text=%20%0D%0A%0D%0APC%20Name:284992%0D%0ADate%20a
|
unknown
|
||
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
|
unknown
|
||
https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
|
unknown
|
||
http://51.38.247.67:8081/_send_.php?LCapplication/x-www-form-urlencoded
|
unknown
|
||
https://chrome.google.com/webstore?hl=enlBjq
|
unknown
|
||
https://reallyfreegeoip.org/xml/
|
unknown
|
There are 20 hidden URLs, click here to show them.
Domains
Name
|
IP
|
Malicious
|
|
---|---|---|---|
reallyfreegeoip.org
|
188.114.96.3
|
||
api.telegram.org
|
149.154.167.220
|
||
checkip.dyndns.org
|
unknown
|
||
checkip.dyndns.com
|
193.122.130.0
|
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
149.154.167.220
|
api.telegram.org
|
United Kingdom
|
||
188.114.96.3
|
reallyfreegeoip.org
|
European Union
|
||
193.122.130.0
|
checkip.dyndns.com
|
United States
|
Registry
Path
|
Value
|
Malicious
|
|
---|---|---|---|
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASAPI32
|
EnableFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASAPI32
|
EnableAutoFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASAPI32
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASAPI32
|
FileTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASAPI32
|
ConsoleTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASAPI32
|
MaxFileSize
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASAPI32
|
FileDirectory
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASMANCS
|
EnableFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASMANCS
|
EnableAutoFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASMANCS
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASMANCS
|
FileTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASMANCS
|
ConsoleTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASMANCS
|
MaxFileSize
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASMANCS
|
FileDirectory
|
There are 5 hidden registries, click here to show them.
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
2F20000
|
direct allocation
|
page read and write
|
||
2E31000
|
trusted library allocation
|
page read and write
|
||
402000
|
system
|
page execute and read and write
|
||
6880000
|
trusted library allocation
|
page read and write
|
||
30E6000
|
trusted library allocation
|
page read and write
|
||
4239000
|
trusted library allocation
|
page read and write
|
||
492D000
|
direct allocation
|
page read and write
|
||
648E000
|
stack
|
page read and write
|
||
FF7000
|
heap
|
page read and write
|
||
4800000
|
direct allocation
|
page read and write
|
||
A79000
|
heap
|
page read and write
|
||
4660000
|
direct allocation
|
page read and write
|
||
4075000
|
heap
|
page read and write
|
||
2E95000
|
trusted library allocation
|
page read and write
|
||
402F000
|
heap
|
page read and write
|
||
41CA000
|
trusted library allocation
|
page read and write
|
||
2C20000
|
trusted library allocation
|
page execute and read and write
|
||
30A6000
|
trusted library allocation
|
page read and write
|
||
3EAD000
|
heap
|
page read and write
|
||
123F000
|
stack
|
page read and write
|
||
2C60000
|
trusted library allocation
|
page read and write
|
||
402F000
|
heap
|
page read and write
|
||
F30000
|
heap
|
page read and write
|
||
4783000
|
direct allocation
|
page read and write
|
||
4054000
|
trusted library allocation
|
page read and write
|
||
571E000
|
stack
|
page read and write
|
||
492D000
|
direct allocation
|
page read and write
|
||
402F000
|
heap
|
page read and write
|
||
4075000
|
heap
|
page read and write
|
||
402F000
|
heap
|
page read and write
|
||
402F000
|
heap
|
page read and write
|
||
401000
|
unkown
|
page execute read
|
||
2EDE000
|
trusted library allocation
|
page read and write
|
||
E20000
|
heap
|
page read and write
|
||
F2D000
|
trusted library allocation
|
page execute and read and write
|
||
4F2E000
|
stack
|
page read and write
|
||
F5A000
|
heap
|
page read and write
|
||
6E60000
|
heap
|
page read and write
|
||
2AB2000
|
trusted library allocation
|
page read and write
|
||
6750000
|
trusted library allocation
|
page read and write
|
||
4075000
|
heap
|
page read and write
|
||
A05000
|
heap
|
page read and write
|
||
4783000
|
direct allocation
|
page read and write
|
||
4660000
|
direct allocation
|
page read and write
|
||
4197000
|
trusted library allocation
|
page read and write
|
||
3117000
|
trusted library allocation
|
page read and write
|
||
4219000
|
trusted library allocation
|
page read and write
|
||
490000
|
unkown
|
page write copy
|
||
54C0000
|
trusted library allocation
|
page execute and read and write
|
||
4800000
|
direct allocation
|
page read and write
|
||
3DC0000
|
heap
|
page read and write
|
||
30A1000
|
trusted library allocation
|
page read and write
|
||
6760000
|
trusted library allocation
|
page execute and read and write
|
||
5300000
|
trusted library allocation
|
page execute and read and write
|
||
402F000
|
heap
|
page read and write
|
||
402F000
|
heap
|
page read and write
|
||
3B29000
|
heap
|
page read and write
|
||
3FE6000
|
heap
|
page read and write
|
||
940000
|
heap
|
page read and write
|
||
300D000
|
trusted library allocation
|
page read and write
|
||
492D000
|
direct allocation
|
page read and write
|
||
4075000
|
heap
|
page read and write
|
||
402F000
|
heap
|
page read and write
|
||
42D4000
|
trusted library allocation
|
page read and write
|
||
F4E000
|
heap
|
page read and write
|
||
402F000
|
heap
|
page read and write
|
||
A7B000
|
heap
|
page read and write
|
||
2FE1000
|
trusted library allocation
|
page read and write
|
||
42FE000
|
trusted library allocation
|
page read and write
|
||
499E000
|
direct allocation
|
page read and write
|
||
3F46000
|
heap
|
page read and write
|
||
F1D000
|
trusted library allocation
|
page execute and read and write
|
||
499E000
|
direct allocation
|
page read and write
|
||
312D000
|
trusted library allocation
|
page read and write
|
||
4050000
|
trusted library allocation
|
page read and write
|
||
3EB6000
|
trusted library allocation
|
page read and write
|
||
42C1000
|
trusted library allocation
|
page read and write
|
||
3F3B000
|
heap
|
page read and write
|
||
3CC0000
|
heap
|
page read and write
|
||
54B0000
|
trusted library allocation
|
page read and write
|
||
C7A000
|
stack
|
page read and write
|
||
499E000
|
direct allocation
|
page read and write
|
||
492D000
|
direct allocation
|
page read and write
|
||
A10000
|
heap
|
page read and write
|
||
DE0000
|
heap
|
page read and write
|
||
4A7000
|
unkown
|
page read and write
|
||
41D4000
|
trusted library allocation
|
page read and write
|
||
4075000
|
heap
|
page read and write
|
||
2EA0000
|
trusted library allocation
|
page read and write
|
||
3B1F000
|
stack
|
page read and write
|
||
424F000
|
trusted library allocation
|
page read and write
|
||
2FDE000
|
trusted library allocation
|
page read and write
|
||
402F000
|
heap
|
page read and write
|
||
658E000
|
stack
|
page read and write
|
||
4075000
|
heap
|
page read and write
|
||
2F36000
|
trusted library allocation
|
page read and write
|
||
6790000
|
trusted library allocation
|
page execute and read and write
|
||
101D000
|
heap
|
page read and write
|
||
4333000
|
trusted library allocation
|
page read and write
|
||
402F000
|
heap
|
page read and write
|
||
4660000
|
direct allocation
|
page read and write
|
||
4075000
|
heap
|
page read and write
|
||
400000
|
unkown
|
page readonly
|
||
402F000
|
heap
|
page read and write
|
||
2EEE000
|
trusted library allocation
|
page read and write
|
||
4075000
|
heap
|
page read and write
|
||
62D0000
|
heap
|
page read and write
|
||
A4E000
|
heap
|
page read and write
|
||
40BB000
|
heap
|
page read and write
|
||
4085000
|
trusted library allocation
|
page read and write
|
||
41B1000
|
trusted library allocation
|
page read and write
|
||
2F84000
|
heap
|
page read and write
|
||
4075000
|
heap
|
page read and write
|
||
A40000
|
heap
|
page read and write
|
||
2F14000
|
trusted library allocation
|
page read and write
|
||
A73000
|
heap
|
page read and write
|
||
2E16000
|
trusted library allocation
|
page read and write
|
||
6860000
|
trusted library allocation
|
page execute and read and write
|
||
499E000
|
direct allocation
|
page read and write
|
||
4800000
|
direct allocation
|
page read and write
|
||
8B4000
|
stack
|
page read and write
|
||
9A000
|
stack
|
page read and write
|
||
3FFD000
|
trusted library allocation
|
page read and write
|
||
402F000
|
heap
|
page read and write
|
||
402F000
|
heap
|
page read and write
|
||
54D0000
|
heap
|
page execute and read and write
|
||
93E000
|
stack
|
page read and write
|
||
3E51000
|
trusted library allocation
|
page read and write
|
||
4075000
|
heap
|
page read and write
|
||
3130000
|
trusted library allocation
|
page read and write
|
||
9AE000
|
stack
|
page read and write
|
||
4075000
|
heap
|
page read and write
|
||
FBE000
|
heap
|
page read and write
|
||
402F000
|
heap
|
page read and write
|
||
402F000
|
heap
|
page read and write
|
||
2D5E000
|
trusted library allocation
|
page read and write
|
||
4783000
|
direct allocation
|
page read and write
|
||
44DC000
|
heap
|
page read and write
|
||
482000
|
unkown
|
page readonly
|
||
3BA3000
|
heap
|
page read and write
|
||
4013000
|
trusted library allocation
|
page read and write
|
||
4660000
|
direct allocation
|
page read and write
|
||
632D000
|
heap
|
page read and write
|
||
402F000
|
heap
|
page read and write
|
||
3016000
|
trusted library allocation
|
page read and write
|
||
674E000
|
stack
|
page read and write
|
||
4108000
|
trusted library allocation
|
page read and write
|
||
4800000
|
direct allocation
|
page read and write
|
||
4075000
|
heap
|
page read and write
|
||
2EE2000
|
trusted library allocation
|
page read and write
|
||
402F000
|
heap
|
page read and write
|
||
402F000
|
heap
|
page read and write
|
||
2F38000
|
trusted library allocation
|
page read and write
|
||
41ED000
|
trusted library allocation
|
page read and write
|
||
6338000
|
heap
|
page read and write
|
||
402F000
|
heap
|
page read and write
|
||
402F000
|
heap
|
page read and write
|
||
2FDC000
|
trusted library allocation
|
page read and write
|
||
4800000
|
direct allocation
|
page read and write
|
||
402F000
|
heap
|
page read and write
|
||
490000
|
unkown
|
page read and write
|
||
6890000
|
trusted library allocation
|
page execute and read and write
|
||
3E95000
|
trusted library allocation
|
page read and write
|
||
3EAA000
|
heap
|
page read and write
|
||
2EDA000
|
trusted library allocation
|
page read and write
|
||
2D66000
|
trusted library allocation
|
page read and write
|
||
41C3000
|
trusted library allocation
|
page read and write
|
||
2E1A000
|
trusted library allocation
|
page read and write
|
||
4075000
|
heap
|
page read and write
|
||
3E31000
|
trusted library allocation
|
page read and write
|
||
3E59000
|
trusted library allocation
|
page read and write
|
||
3E44000
|
trusted library allocation
|
page read and write
|
||
F10000
|
trusted library allocation
|
page read and write
|
||
2ED2000
|
trusted library allocation
|
page read and write
|
||
2FD0000
|
heap
|
page read and write
|
||
402F000
|
heap
|
page read and write
|
||
4075000
|
heap
|
page read and write
|
||
2AB0000
|
trusted library allocation
|
page read and write
|
||
2D6D000
|
trusted library allocation
|
page read and write
|
||
401000
|
unkown
|
page execute read
|
||
402F000
|
heap
|
page read and write
|
||
2E20000
|
heap
|
page execute and read and write
|
||
3ED0000
|
heap
|
page read and write
|
||
2FEB000
|
trusted library allocation
|
page read and write
|
||
3FB7000
|
heap
|
page read and write
|
||
3081000
|
trusted library allocation
|
page read and write
|
||
4075000
|
heap
|
page read and write
|
||
2F10000
|
heap
|
page read and write
|
||
EEE000
|
stack
|
page read and write
|
||
6870000
|
trusted library allocation
|
page read and write
|
||
EA0000
|
heap
|
page read and write
|
||
A7E000
|
heap
|
page read and write
|
||
2D40000
|
trusted library allocation
|
page read and write
|
||
F38000
|
heap
|
page read and write
|
||
3124000
|
trusted library allocation
|
page read and write
|
||
3FE1000
|
heap
|
page execute and read and write
|
||
2D90000
|
trusted library allocation
|
page read and write
|
||
2FF0000
|
trusted library allocation
|
page read and write
|
||
3EEA000
|
heap
|
page read and write
|
||
2D4B000
|
trusted library allocation
|
page read and write
|
||
3EA3000
|
trusted library allocation
|
page read and write
|
||
2E97000
|
trusted library allocation
|
page read and write
|
||
2EEA000
|
trusted library allocation
|
page read and write
|
||
660E000
|
stack
|
page read and write
|
||
492D000
|
direct allocation
|
page read and write
|
||
664E000
|
stack
|
page read and write
|
||
2AA6000
|
trusted library allocation
|
page execute and read and write
|
||
53B0000
|
heap
|
page read and write
|
||
A00000
|
heap
|
page read and write
|
||
2AA2000
|
trusted library allocation
|
page read and write
|
||
3F96000
|
heap
|
page read and write
|
||
2D4E000
|
trusted library allocation
|
page read and write
|
||
2C30000
|
trusted library allocation
|
page read and write
|
||
3FA9000
|
heap
|
page read and write
|
||
43CC000
|
heap
|
page read and write
|
||
2FAA000
|
trusted library allocation
|
page read and write
|
||
3E67000
|
heap
|
page read and write
|
||
42AC000
|
trusted library allocation
|
page read and write
|
||
4075000
|
heap
|
page read and write
|
||
6857000
|
trusted library allocation
|
page read and write
|
||
4075000
|
heap
|
page read and write
|
||
6840000
|
trusted library allocation
|
page read and write
|
||
2C50000
|
heap
|
page read and write
|
||
A4A000
|
heap
|
page read and write
|
||
402E000
|
heap
|
page read and write
|
||
4025000
|
trusted library allocation
|
page read and write
|
||
3EA5000
|
heap
|
page read and write
|
||
41B8000
|
trusted library allocation
|
page read and write
|
||
6850000
|
trusted library allocation
|
page read and write
|
||
30D7000
|
trusted library allocation
|
page read and write
|
||
2AD0000
|
trusted library allocation
|
page read and write
|
||
12FE000
|
stack
|
page read and write
|
||
3012000
|
trusted library allocation
|
page read and write
|
||
3FA0000
|
trusted library allocation
|
page read and write
|
||
4075000
|
heap
|
page read and write
|
||
4075000
|
heap
|
page read and write
|
||
F13000
|
trusted library allocation
|
page execute and read and write
|
||
2E8A000
|
trusted library allocation
|
page read and write
|
||
1E0000
|
heap
|
page read and write
|
||
301C000
|
trusted library allocation
|
page read and write
|
||
4075000
|
heap
|
page read and write
|
||
3F2B000
|
trusted library allocation
|
page read and write
|
||
3E9C000
|
trusted library allocation
|
page read and write
|
||
40E3000
|
trusted library allocation
|
page read and write
|
||
100000
|
heap
|
page read and write
|
||
89F000
|
stack
|
page read and write
|
||
3EA9000
|
trusted library allocation
|
page read and write
|
||
4929000
|
direct allocation
|
page read and write
|
||
431E000
|
trusted library allocation
|
page read and write
|
||
492D000
|
direct allocation
|
page read and write
|
||
3021000
|
trusted library allocation
|
page read and write
|
||
163E000
|
stack
|
page read and write
|
||
52AD000
|
stack
|
page read and write
|
||
4075000
|
heap
|
page read and write
|
||
3F6A000
|
trusted library allocation
|
page read and write
|
||
4075000
|
heap
|
page read and write
|
||
EA5000
|
heap
|
page read and write
|
||
402F000
|
heap
|
page read and write
|
||
30AB000
|
trusted library allocation
|
page read and write
|
||
40F9000
|
trusted library allocation
|
page read and write
|
||
E6E000
|
stack
|
page read and write
|
||
3FE2000
|
heap
|
page read and write
|
||
499E000
|
direct allocation
|
page read and write
|
||
2DF0000
|
heap
|
page read and write
|
||
3133000
|
trusted library allocation
|
page read and write
|
||
4075000
|
heap
|
page read and write
|
||
9FE000
|
stack
|
page read and write
|
||
400000
|
unkown
|
page readonly
|
||
3FE2000
|
heap
|
page read and write
|
||
30E0000
|
trusted library allocation
|
page read and write
|
||
4302000
|
trusted library allocation
|
page read and write
|
||
4660000
|
direct allocation
|
page read and write
|
||
30B4000
|
trusted library allocation
|
page read and write
|
||
2E00000
|
trusted library allocation
|
page read and write
|
||
65CE000
|
stack
|
page read and write
|
||
4075000
|
heap
|
page read and write
|
||
406F000
|
trusted library allocation
|
page read and write
|
||
30B0000
|
trusted library allocation
|
page read and write
|
||
2EE6000
|
trusted library allocation
|
page read and write
|
||
4800000
|
direct allocation
|
page read and write
|
||
4075000
|
heap
|
page read and write
|
||
402F000
|
heap
|
page read and write
|
||
2AA0000
|
trusted library allocation
|
page read and write
|
||
2D3C000
|
stack
|
page read and write
|
||
2D80000
|
trusted library allocation
|
page read and write
|
||
402F000
|
heap
|
page read and write
|
||
632F000
|
heap
|
page read and write
|
||
2D61000
|
trusted library allocation
|
page read and write
|
||
4075000
|
heap
|
page read and write
|
||
418B000
|
trusted library allocation
|
page read and write
|
||
67F0000
|
trusted library allocation
|
page read and write
|
||
4075000
|
heap
|
page read and write
|
||
402F000
|
heap
|
page read and write
|
||
402F000
|
heap
|
page read and write
|
||
3F17000
|
heap
|
page read and write
|
||
68C0000
|
heap
|
page read and write
|
||
41DF000
|
trusted library allocation
|
page read and write
|
||
4929000
|
direct allocation
|
page read and write
|
||
402F000
|
heap
|
page read and write
|
||
4075000
|
heap
|
page read and write
|
||
3EAD000
|
trusted library allocation
|
page read and write
|
||
2ABB000
|
trusted library allocation
|
page execute and read and write
|
||
E00000
|
heap
|
page read and write
|
||
3EA0000
|
heap
|
page read and write
|
||
4929000
|
direct allocation
|
page read and write
|
||
4783000
|
direct allocation
|
page read and write
|
||
402F000
|
heap
|
page read and write
|
||
3F15000
|
trusted library allocation
|
page read and write
|
||
2D5A000
|
trusted library allocation
|
page read and write
|
||
3EBB000
|
trusted library allocation
|
page read and write
|
||
2E2B000
|
heap
|
page read and write
|
||
4075000
|
heap
|
page read and write
|
||
8FE000
|
stack
|
page read and write
|
||
30A9000
|
trusted library allocation
|
page read and write
|
||
11FE000
|
stack
|
page read and write
|
||
371E000
|
stack
|
page read and write
|
||
4075000
|
heap
|
page read and write
|
||
E70000
|
heap
|
page read and write
|
||
4075000
|
heap
|
page read and write
|
||
4075000
|
heap
|
page read and write
|
||
4075000
|
heap
|
page read and write
|
||
2D46000
|
trusted library allocation
|
page read and write
|
||
644F000
|
stack
|
page read and write
|
||
3E3F000
|
trusted library allocation
|
page read and write
|
||
52FD000
|
trusted library allocation
|
page read and write
|
||
402F000
|
heap
|
page read and write
|
||
402F000
|
heap
|
page read and write
|
||
403F000
|
heap
|
page read and write
|
||
2D72000
|
trusted library allocation
|
page read and write
|
||
4AB000
|
unkown
|
page readonly
|
||
3EB2000
|
trusted library allocation
|
page read and write
|
||
2DF3000
|
heap
|
page read and write
|
||
3EC1000
|
trusted library allocation
|
page read and write
|
||
61CE000
|
stack
|
page read and write
|
||
402F000
|
heap
|
page read and write
|
||
4075000
|
heap
|
page read and write
|
||
4660000
|
direct allocation
|
page read and write
|
||
2E14000
|
trusted library allocation
|
page read and write
|
||
2ECE000
|
trusted library allocation
|
page read and write
|
||
4929000
|
direct allocation
|
page read and write
|
||
4075000
|
heap
|
page read and write
|
||
326E000
|
trusted library allocation
|
page read and write
|
||
499E000
|
direct allocation
|
page read and write
|
||
F00000
|
trusted library allocation
|
page read and write
|
||
4783000
|
direct allocation
|
page read and write
|
||
400000
|
system
|
page execute and read and write
|
||
D77000
|
stack
|
page read and write
|
||
2AAA000
|
trusted library allocation
|
page execute and read and write
|
||
4075000
|
heap
|
page read and write
|
||
41A4000
|
trusted library allocation
|
page read and write
|
||
2EA8000
|
trusted library allocation
|
page read and write
|
||
2AB7000
|
trusted library allocation
|
page execute and read and write
|
||
4929000
|
direct allocation
|
page read and write
|
||
3EB8000
|
trusted library allocation
|
page read and write
|
||
62CE000
|
stack
|
page read and write
|
||
402F000
|
heap
|
page read and write
|
||
2ED6000
|
trusted library allocation
|
page read and write
|
||
52F0000
|
trusted library allocation
|
page read and write
|
||
6780000
|
trusted library allocation
|
page execute and read and write
|
||
4929000
|
direct allocation
|
page read and write
|
||
F20000
|
trusted library allocation
|
page read and write
|
||
3F8A000
|
trusted library allocation
|
page read and write
|
||
402F000
|
heap
|
page read and write
|
||
2C1E000
|
stack
|
page read and write
|
||
A7E000
|
heap
|
page read and write
|
||
41CF000
|
trusted library allocation
|
page read and write
|
||
4783000
|
direct allocation
|
page read and write
|
||
2AB5000
|
trusted library allocation
|
page execute and read and write
|
||
402F000
|
heap
|
page read and write
|
||
F6A000
|
heap
|
page read and write
|
||
2EA4000
|
trusted library allocation
|
page read and write
|
||
6770000
|
trusted library allocation
|
page execute and read and write
|
||
1800000
|
heap
|
page read and write
|
||
3E4B000
|
trusted library allocation
|
page read and write
|
||
2C68000
|
trusted library allocation
|
page read and write
|
||
3FC0000
|
heap
|
page read and write
|
||
402F000
|
heap
|
page read and write
|
||
2F80000
|
heap
|
page read and write
|
||
2E7E000
|
trusted library allocation
|
page read and write
|
||
482000
|
unkown
|
page readonly
|
||
640D000
|
stack
|
page read and write
|
||
4075000
|
heap
|
page read and write
|
||
F14000
|
trusted library allocation
|
page read and write
|
||
3F3E000
|
trusted library allocation
|
page read and write
|
||
2B1E000
|
stack
|
page read and write
|
||
2C40000
|
trusted library allocation
|
page read and write
|
||
4AB000
|
unkown
|
page readonly
|
||
DF0000
|
heap
|
page read and write
|
||
2FD5000
|
heap
|
page read and write
|
||
3E5B000
|
heap
|
page read and write
|
||
8AF000
|
stack
|
page read and write
|
There are 381 hidden memdumps, click here to show them.