Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
24314_DellFW_UPGRADE_DOCK_UTILITY_v1.2.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
initial sample
|
||
C:\Program Files (x86)\DellDockFW_UPGRADE_UTILITY\DellFW_UPGRADE_DOCK_UTILITY_v1.2.exe (copy)
|
PE32+ executable (console) x86-64, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\DellDockFW_UPGRADE_UTILITY\Patch64.exe (copy)
|
PE32+ executable (console) x86-64, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\DellDockFW_UPGRADE_UTILITY\RtlDirectDiagLib64.dll (copy)
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\DellDockFW_UPGRADE_UTILITY\SalomonFwUpdaterI2C64W.exe (copy)
|
PE32+ executable (console) x86-64, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\DellDockFW_UPGRADE_UTILITY\devcon64.exe (copy)
|
PE32+ executable (console) x86-64, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\DellDockFW_UPGRADE_UTILITY\is-5BRVH.tmp
|
PE32+ executable (console) x86-64, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\DellDockFW_UPGRADE_UTILITY\is-90SFQ.tmp
|
PE32+ executable (console) x86-64, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\DellDockFW_UPGRADE_UTILITY\is-AJDB4.tmp
|
PE32+ executable (console) x86-64, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\DellDockFW_UPGRADE_UTILITY\is-CJ3T3.tmp
|
PE32+ executable (console) x86-64, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\DellDockFW_UPGRADE_UTILITY\is-DD05B.tmp
|
PE32+ executable (console) x86-64, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\DellDockFW_UPGRADE_UTILITY\is-LBEQK.tmp
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\DellDockFW_UPGRADE_UTILITY\is-LES54.tmp
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\DellDockFW_UPGRADE_UTILITY\unins000.exe (copy)
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\is-11DL1.tmp\24314_DellFW_UPGRADE_DOCK_UTILITY_v1.2.tmp
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
modified
|
||
C:\Users\user\AppData\Local\Temp\is-T91OE.tmp\_isetup\_isdecmp.dll
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\DellDockFW_UPGRADE_UTILITY\EF8153BvB.dat (copy)
|
ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Program Files (x86)\DellDockFW_UPGRADE_UTILITY\EF8153BvC.dat (copy)
|
ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Program Files (x86)\DellDockFW_UPGRADE_UTILITY\cfg.dat (copy)
|
ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Program Files (x86)\DellDockFW_UPGRADE_UTILITY\check0.log
|
ASCII text, with CRLF line terminators
|
modified
|
||
C:\Program Files (x86)\DellDockFW_UPGRADE_UTILITY\ec_01.01.00.05.bin (copy)
|
data
|
dropped
|
||
C:\Program Files (x86)\DellDockFW_UPGRADE_UTILITY\ec_01.01.00.07.bin (copy)
|
data
|
dropped
|
||
C:\Program Files (x86)\DellDockFW_UPGRADE_UTILITY\ec_89.01.03.05.bin (copy)
|
data
|
dropped
|
||
C:\Program Files (x86)\DellDockFW_UPGRADE_UTILITY\is-1U24J.tmp
|
ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Program Files (x86)\DellDockFW_UPGRADE_UTILITY\is-5RNOL.tmp
|
data
|
dropped
|
||
C:\Program Files (x86)\DellDockFW_UPGRADE_UTILITY\is-85VN5.tmp
|
data
|
dropped
|
||
C:\Program Files (x86)\DellDockFW_UPGRADE_UTILITY\is-93IT0.tmp
|
ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Program Files (x86)\DellDockFW_UPGRADE_UTILITY\is-ED6D2.tmp
|
ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Program Files (x86)\DellDockFW_UPGRADE_UTILITY\is-GB31N.tmp
|
ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Program Files (x86)\DellDockFW_UPGRADE_UTILITY\is-T4OSG.tmp
|
data
|
dropped
|
||
C:\Program Files (x86)\DellDockFW_UPGRADE_UTILITY\patch.log (copy)
|
ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Program Files (x86)\DellDockFW_UPGRADE_UTILITY\unins000.dat
|
InnoSetup Log DellDockFW_UPGRADE_UTILITY {598FF4F3-A5CE-4782-9F8E-B615F4B2880D}, version 0x418, 4542 bytes, 663680\37\user,
C:\Program Files (x86)\DellDockFW_UPGRADE_
|
modified
|
||
C:\ProgramData\Microsoft\Windows\Start Menu\Programs\DellDockFW_UPGRADE_UTILITY\DellDockFW_UPGRADE_UTILITY.lnk
|
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Archive,
ctime=Wed Oct 30 15:00:09 2024, mtime=Wed Oct 30 15:00:09 2024, atime=Thu Mar 14 06:03:42 2024, length=150528, window=hide
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\9B10.tmp\9B11.tmp\9B12.bat
|
ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\is-T91OE.tmp\_isetup\_setup64.tmp
|
PE32+ executable (console) x86-64, for MS Windows
|
dropped
|
There are 25 hidden files, click here to show them.
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\24314_DellFW_UPGRADE_DOCK_UTILITY_v1.2.exe
|
"C:\Users\user\Desktop\24314_DellFW_UPGRADE_DOCK_UTILITY_v1.2.exe"
|
||
C:\Users\user\AppData\Local\Temp\is-11DL1.tmp\24314_DellFW_UPGRADE_DOCK_UTILITY_v1.2.tmp
|
"C:\Users\user~1\AppData\Local\Temp\is-11DL1.tmp\24314_DellFW_UPGRADE_DOCK_UTILITY_v1.2.tmp" /SL5="$103E8,2740915,793600,C:\Users\user\Desktop\24314_DellFW_UPGRADE_DOCK_UTILITY_v1.2.exe"
|
||
C:\Program Files (x86)\DellDockFW_UPGRADE_UTILITY\DellFW_UPGRADE_DOCK_UTILITY_v1.2.exe
|
"C:\Program Files (x86)\DellDockFW_UPGRADE_UTILITY\DellFW_UPGRADE_DOCK_UTILITY_v1.2.exe"
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\cmd.exe
|
"C:\Windows\system32\cmd" /c "C:\Users\user\AppData\Local\Temp\9B10.tmp\9B11.tmp\9B12.bat "C:\Program Files (x86)\DellDockFW_UPGRADE_UTILITY\DellFW_UPGRADE_DOCK_UTILITY_v1.2.exe""
|
||
C:\Program Files (x86)\DellDockFW_UPGRADE_UTILITY\SalomonFwUpdaterI2C64W.exe
|
SalomonFwUpdaterI2C64W.exe /dockinfo
|
||
C:\Windows\System32\find.exe
|
find /i check0.log "GetSalomonDockInfo Failed, check if Dock is connected to system"
|
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
http://crl.entrust.net/g2ca.crl0
|
unknown
|
||
https://jrsoftware.org/ishelp/index.php?topic=setupcmdlineSetupU
|
unknown
|
||
https://sectigo.com/CPS0
|
unknown
|
||
http://repository.certum.pl/ctnca.cer09
|
unknown
|
||
http://repository.certum.pl/cscasha2.cer0
|
unknown
|
||
http://ocsp.sectigo.com0
|
unknown
|
||
http://crl.certum.pl/ctnca.crl0k
|
unknown
|
||
http://ocsp.entrust.net03
|
unknown
|
||
http://ocsp.entrust.net02
|
unknown
|
||
http://ocsp.entrust.net01
|
unknown
|
||
http://www.entrust.net/rpa03
|
unknown
|
||
http://ocsp.entrust.net00
|
unknown
|
||
https://www.dell.com/support/home/en-us
|
unknown
|
||
https://www.certum.pl/CPS0
|
unknown
|
||
http://crl.certum.pl/cscasha2.crl0q
|
unknown
|
||
http://aia.entrust.net/ts2-chain256.p7c01
|
unknown
|
||
http://cscasha2.ocsp-certum.com04
|
unknown
|
||
http://crl.entrust.net/ovcs2.crl0
|
unknown
|
||
http://crl.sectigo.com/SectigoRSATimeStampingCA.crl0t
|
unknown
|
||
http://crl.entrust.net/csbr1.crl0
|
unknown
|
||
https://www.remobjects.com/ps
|
unknown
|
||
http://aia.entrust.net/ovcs2-chain.p7c01
|
unknown
|
||
http://crt.sectigo.com/SectigoRSATimeStampingCA.crt0#
|
unknown
|
||
http://subca.ocsp-certum.com01
|
unknown
|
||
https://www.innosetup.com/
|
unknown
|
||
https://sectigo.com/CPS0D
|
unknown
|
||
https://www.dell.com/support/home/en-usNhttps://www.dell.com/support/home/en-usNhttps://www.dell.com
|
unknown
|
||
https://jrsoftware.org0
|
unknown
|
||
https://jrsoftware.org/
|
unknown
|
||
http://crl.entrust.net/ts2ca.crl0
|
unknown
|
||
http://www.entrust.net/rpa0
|
unknown
|
||
http://www.certum.pl/CPS0
|
unknown
|
||
https://www.entrust.net/rpa0
|
unknown
|
There are 23 hidden URLs, click here to show them.
Registry
Path
|
Value
|
Malicious
|
|
---|---|---|---|
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\.exe\OpenWithProgids
|
DellDockFW_UPGRADE_UTILITYFile.exe
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
|
Owner
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
|
SessionHash
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
|
Sequence
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
|
RegFiles0000
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
|
RegFilesHash
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\DellDockFW_UPGRADE_UTILITYFile.exe
|
NULL
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\DellDockFW_UPGRADE_UTILITYFile.exe\DefaultIcon
|
NULL
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\DellDockFW_UPGRADE_UTILITYFile.exe\shell\open\command
|
NULL
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Applications\DellFW_UPGRADE_DOCK_UTILITY_v1.2.exe\SupportedTypes
|
.myp
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{598FF4F3-A5CE-4782-9F8E-B615F4B2880D}_is1
|
Inno Setup: Setup Version
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{598FF4F3-A5CE-4782-9F8E-B615F4B2880D}_is1
|
Inno Setup: App Path
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{598FF4F3-A5CE-4782-9F8E-B615F4B2880D}_is1
|
InstallLocation
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{598FF4F3-A5CE-4782-9F8E-B615F4B2880D}_is1
|
Inno Setup: Icon Group
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{598FF4F3-A5CE-4782-9F8E-B615F4B2880D}_is1
|
Inno Setup: User
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{598FF4F3-A5CE-4782-9F8E-B615F4B2880D}_is1
|
Inno Setup: Language
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{598FF4F3-A5CE-4782-9F8E-B615F4B2880D}_is1
|
DisplayName
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{598FF4F3-A5CE-4782-9F8E-B615F4B2880D}_is1
|
DisplayIcon
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{598FF4F3-A5CE-4782-9F8E-B615F4B2880D}_is1
|
UninstallString
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{598FF4F3-A5CE-4782-9F8E-B615F4B2880D}_is1
|
QuietUninstallString
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{598FF4F3-A5CE-4782-9F8E-B615F4B2880D}_is1
|
DisplayVersion
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{598FF4F3-A5CE-4782-9F8E-B615F4B2880D}_is1
|
Publisher
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{598FF4F3-A5CE-4782-9F8E-B615F4B2880D}_is1
|
URLInfoAbout
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{598FF4F3-A5CE-4782-9F8E-B615F4B2880D}_is1
|
HelpLink
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{598FF4F3-A5CE-4782-9F8E-B615F4B2880D}_is1
|
URLUpdateInfo
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{598FF4F3-A5CE-4782-9F8E-B615F4B2880D}_is1
|
NoModify
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{598FF4F3-A5CE-4782-9F8E-B615F4B2880D}_is1
|
NoRepair
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{598FF4F3-A5CE-4782-9F8E-B615F4B2880D}_is1
|
InstallDate
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{598FF4F3-A5CE-4782-9F8E-B615F4B2880D}_is1
|
MajorVersion
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{598FF4F3-A5CE-4782-9F8E-B615F4B2880D}_is1
|
MinorVersion
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{598FF4F3-A5CE-4782-9F8E-B615F4B2880D}_is1
|
VersionMajor
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{598FF4F3-A5CE-4782-9F8E-B615F4B2880D}_is1
|
VersionMinor
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{598FF4F3-A5CE-4782-9F8E-B615F4B2880D}_is1
|
EstimatedSize
|
There are 23 hidden registries, click here to show them.
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
9A0000
|
heap
|
page read and write
|
||
600000
|
heap
|
page read and write
|
||
38E1000
|
heap
|
page read and write
|
||
910000
|
heap
|
page read and write
|
||
2B8C5350000
|
heap
|
page read and write
|
||
391E000
|
heap
|
page read and write
|
||
8D7000
|
heap
|
page read and write
|
||
23E1000
|
direct allocation
|
page read and write
|
||
34D0000
|
unkown
|
page readonly
|
||
7FF719A22000
|
unkown
|
page readonly
|
||
2468000
|
direct allocation
|
page read and write
|
||
253A000
|
direct allocation
|
page read and write
|
||
2820000
|
heap
|
page read and write
|
||
B0E000
|
heap
|
page read and write
|
||
870000
|
heap
|
page read and write
|
||
2598000
|
direct allocation
|
page read and write
|
||
2346000
|
direct allocation
|
page read and write
|
||
14001F000
|
unkown
|
page write copy
|
||
AC8000
|
heap
|
page read and write
|
||
916000
|
heap
|
page read and write
|
||
C097AF000
|
stack
|
page read and write
|
||
500000
|
heap
|
page read and write
|
||
401000
|
unkown
|
page execute read
|
||
233F000
|
direct allocation
|
page read and write
|
||
B65000
|
heap
|
page read and write
|
||
7FF7199FF000
|
unkown
|
page read and write
|
||
6F4000
|
unkown
|
page readonly
|
||
7FF7199F8000
|
unkown
|
page write copy
|
||
1C0000
|
heap
|
page read and write
|
||
7FF7199F8000
|
unkown
|
page read and write
|
||
238A000
|
direct allocation
|
page read and write
|
||
2471000
|
direct allocation
|
page read and write
|
||
24A7000
|
direct allocation
|
page read and write
|
||
2420000
|
heap
|
page read and write
|
||
61C000
|
heap
|
page read and write
|
||
2583000
|
direct allocation
|
page read and write
|
||
22F7000
|
direct allocation
|
page read and write
|
||
2B8C53B0000
|
heap
|
page read and write
|
||
B24000
|
heap
|
page read and write
|
||
24FF000
|
direct allocation
|
page read and write
|
||
2570000
|
direct allocation
|
page read and write
|
||
34CD000
|
direct allocation
|
page read and write
|
||
93000
|
stack
|
page read and write
|
||
24D2000
|
direct allocation
|
page read and write
|
||
140022000
|
unkown
|
page readonly
|
||
24FC000
|
direct allocation
|
page read and write
|
||
2B8C5179000
|
heap
|
page read and write
|
||
885000
|
heap
|
page read and write
|
||
400000
|
unkown
|
page readonly
|
||
34D3000
|
unkown
|
page readonly
|
||
2B8C518D000
|
heap
|
page read and write
|
||
18E000
|
stack
|
page read and write
|
||
255F000
|
direct allocation
|
page read and write
|
||
265A000
|
direct allocation
|
page read and write
|
||
258A000
|
direct allocation
|
page read and write
|
||
234D000
|
direct allocation
|
page read and write
|
||
14001F000
|
unkown
|
page read and write
|
||
38E1000
|
heap
|
page read and write
|
||
2B8C518D000
|
heap
|
page read and write
|
||
22E9000
|
direct allocation
|
page read and write
|
||
236B000
|
direct allocation
|
page read and write
|
||
2280000
|
heap
|
page read and write
|
||
34B0000
|
direct allocation
|
page read and write
|
||
7FF719953000
|
unkown
|
page readonly
|
||
2532000
|
direct allocation
|
page read and write
|
||
140001000
|
unkown
|
page execute read
|
||
2B8C4FE0000
|
heap
|
page read and write
|
||
2514000
|
direct allocation
|
page read and write
|
||
2305000
|
direct allocation
|
page read and write
|
||
4F0000
|
heap
|
page read and write
|
||
2314000
|
direct allocation
|
page read and write
|
||
257C000
|
direct allocation
|
page read and write
|
||
2381000
|
direct allocation
|
page read and write
|
||
22F0000
|
direct allocation
|
page read and write
|
||
2B8C5179000
|
heap
|
page read and write
|
||
4C6000
|
unkown
|
page readonly
|
||
4B7000
|
unkown
|
page write copy
|
||
3960000
|
heap
|
page read and write
|
||
401000
|
unkown
|
page execute read
|
||
4B7000
|
unkown
|
page read and write
|
||
6CE000
|
unkown
|
page read and write
|
||
889000
|
heap
|
page read and write
|
||
17B51C20000
|
heap
|
page read and write
|
||
2B8C6D40000
|
heap
|
page read and write
|
||
2574000
|
direct allocation
|
page read and write
|
||
4C2000
|
unkown
|
page write copy
|
||
8D0000
|
heap
|
page read and write
|
||
608000
|
heap
|
page read and write
|
||
246B000
|
direct allocation
|
page read and write
|
||
400000
|
unkown
|
page readonly
|
||
248A000
|
direct allocation
|
page read and write
|
||
2322000
|
direct allocation
|
page read and write
|
||
256D000
|
direct allocation
|
page read and write
|
||
23B6000
|
direct allocation
|
page read and write
|
||
2B8C516E000
|
heap
|
page read and write
|
||
34E0000
|
direct allocation
|
page read and write
|
||
2558000
|
direct allocation
|
page read and write
|
||
140000000
|
unkown
|
page readonly
|
||
6D6000
|
unkown
|
page read and write
|
||
4D0000
|
heap
|
page read and write
|
||
9B000
|
stack
|
page read and write
|
||
37B6000
|
direct allocation
|
page read and write
|
||
6C7000
|
unkown
|
page write copy
|
||
2B8C5140000
|
heap
|
page read and write
|
||
2331000
|
direct allocation
|
page read and write
|
||
A90000
|
direct allocation
|
page read and write
|
||
2B8C5169000
|
heap
|
page read and write
|
||
C09A7F000
|
stack
|
page read and write
|
||
C0972C000
|
stack
|
page read and write
|
||
2B8C6D43000
|
heap
|
page read and write
|
||
2B8C50E0000
|
heap
|
page read and write
|
||
24F0000
|
direct allocation
|
page read and write
|
||
2B8C518D000
|
heap
|
page read and write
|
||
B22000
|
heap
|
page read and write
|
||
2B8C5146000
|
heap
|
page read and write
|
||
4B9000
|
unkown
|
page read and write
|
||
2364000
|
direct allocation
|
page read and write
|
||
B21000
|
heap
|
page read and write
|
||
3860000
|
heap
|
page read and write
|
||
24B5000
|
direct allocation
|
page read and write
|
||
2CB0000
|
trusted library allocation
|
page read and write
|
||
B37000
|
heap
|
page read and write
|
||
252B000
|
direct allocation
|
page read and write
|
||
23DA000
|
direct allocation
|
page read and write
|
||
140001000
|
unkown
|
page execute read
|
||
24E5000
|
direct allocation
|
page read and write
|
||
37AB000
|
direct allocation
|
page read and write
|
||
550000
|
heap
|
page read and write
|
||
140000000
|
unkown
|
page readonly
|
||
34D1000
|
unkown
|
page execute read
|
||
880000
|
heap
|
page read and write
|
||
24AE000
|
direct allocation
|
page read and write
|
||
2356000
|
direct allocation
|
page read and write
|
||
38E1000
|
heap
|
page read and write
|
||
CA467FF000
|
stack
|
page read and write
|
||
2591000
|
direct allocation
|
page read and write
|
||
1A0000
|
heap
|
page read and write
|
||
24CB000
|
direct allocation
|
page read and write
|
||
6D1000
|
unkown
|
page read and write
|
||
2150000
|
heap
|
page read and write
|
||
A00000
|
direct allocation
|
page execute and read and write
|
||
230D000
|
direct allocation
|
page read and write
|
||
17B51CB0000
|
heap
|
page read and write
|
||
2524000
|
direct allocation
|
page read and write
|
||
37E7000
|
direct allocation
|
page read and write
|
||
710000
|
heap
|
page read and write
|
||
970000
|
heap
|
page read and write
|
||
140022000
|
unkown
|
page readonly
|
||
556000
|
heap
|
page read and write
|
||
7FF719A08000
|
unkown
|
page readonly
|
||
2B8C518D000
|
heap
|
page read and write
|
||
4C0000
|
unkown
|
page read and write
|
||
7FB50000
|
direct allocation
|
page read and write
|
||
34BB000
|
direct allocation
|
page read and write
|
||
B1A000
|
heap
|
page read and write
|
||
2B8C53B4000
|
heap
|
page read and write
|
||
2391000
|
direct allocation
|
page read and write
|
||
38E1000
|
heap
|
page read and write
|
||
B08000
|
heap
|
page read and write
|
||
23C4000
|
direct allocation
|
page read and write
|
||
C09AFF000
|
stack
|
page read and write
|
||
7FF719A08000
|
unkown
|
page readonly
|
||
2460000
|
direct allocation
|
page read and write
|
||
2B8C516B000
|
heap
|
page read and write
|
||
AC0000
|
heap
|
page read and write
|
||
235D000
|
direct allocation
|
page read and write
|
||
17B51CBB000
|
heap
|
page read and write
|
||
23AF000
|
direct allocation
|
page read and write
|
||
22D0000
|
direct allocation
|
page read and write
|
||
17B51CB8000
|
heap
|
page read and write
|
||
6C7000
|
unkown
|
page read and write
|
||
23CC000
|
direct allocation
|
page read and write
|
||
231B000
|
direct allocation
|
page read and write
|
||
2B8C50C0000
|
heap
|
page read and write
|
||
82E000
|
stack
|
page read and write
|
||
7FF719953000
|
unkown
|
page readonly
|
||
2B8C514C000
|
heap
|
page read and write
|
||
CA466FF000
|
stack
|
page read and write
|
||
17B51C50000
|
heap
|
page read and write
|
||
7FF719A22000
|
unkown
|
page readonly
|
||
3961000
|
heap
|
page read and write
|
||
2B8C5179000
|
heap
|
page read and write
|
||
250D000
|
direct allocation
|
page read and write
|
||
AFF000
|
heap
|
page read and write
|
||
7FF719781000
|
unkown
|
page execute read
|
||
B13000
|
heap
|
page read and write
|
||
2483000
|
direct allocation
|
page read and write
|
||
4C4000
|
unkown
|
page readonly
|
||
24BD000
|
direct allocation
|
page read and write
|
||
9DF000
|
stack
|
page read and write
|
||
B2F000
|
heap
|
page read and write
|
||
7FF719781000
|
unkown
|
page execute read
|
||
17B51B20000
|
heap
|
page read and write
|
||
2B8C517A000
|
heap
|
page read and write
|
||
530000
|
heap
|
page read and write
|
||
8D6000
|
heap
|
page read and write
|
||
7FF7199FB000
|
unkown
|
page write copy
|
||
19D000
|
stack
|
page read and write
|
||
34C4000
|
direct allocation
|
page read and write
|
||
23D3000
|
direct allocation
|
page read and write
|
||
2B8C5179000
|
heap
|
page read and write
|
||
38E1000
|
heap
|
page read and write
|
||
A80000
|
heap
|
page read and write
|
||
23E8000
|
direct allocation
|
page read and write
|
||
2499000
|
direct allocation
|
page read and write
|
||
2640000
|
heap
|
page read and write
|
||
B26000
|
heap
|
page read and write
|
||
190000
|
heap
|
page read and write
|
||
34B0000
|
direct allocation
|
page read and write
|
||
34B0000
|
heap
|
page read and write
|
||
B1A000
|
heap
|
page read and write
|
||
CA463CB000
|
stack
|
page read and write
|
||
520000
|
heap
|
page read and write
|
||
140018000
|
unkown
|
page readonly
|
||
7FF719780000
|
unkown
|
page readonly
|
||
2329000
|
direct allocation
|
page read and write
|
||
7FE36000
|
direct allocation
|
page read and write
|
||
22FE000
|
direct allocation
|
page read and write
|
||
2338000
|
direct allocation
|
page read and write
|
||
2B8C5171000
|
heap
|
page read and write
|
||
2B8C5146000
|
heap
|
page read and write
|
||
14C000
|
stack
|
page read and write
|
||
7FF719780000
|
unkown
|
page readonly
|
||
2823000
|
heap
|
page read and write
|
||
A90000
|
direct allocation
|
page read and write
|
||
55C000
|
heap
|
page read and write
|
||
2B8C517B000
|
heap
|
page read and write
|
||
24C4000
|
direct allocation
|
page read and write
|
||
23BD000
|
direct allocation
|
page read and write
|
||
17B51C54000
|
heap
|
page read and write
|
||
2491000
|
direct allocation
|
page read and write
|
||
2566000
|
direct allocation
|
page read and write
|
||
2570000
|
direct allocation
|
page read and write
|
||
24A0000
|
direct allocation
|
page read and write
|
||
2541000
|
direct allocation
|
page read and write
|
||
2548000
|
direct allocation
|
page read and write
|
||
140018000
|
unkown
|
page readonly
|
||
2B8C514C000
|
heap
|
page read and write
|
||
6DE000
|
unkown
|
page readonly
|
||
7FF719A03000
|
unkown
|
page read and write
|
||
2398000
|
direct allocation
|
page read and write
|
||
9F0000
|
heap
|
page read and write
|
||
24E8000
|
direct allocation
|
page read and write
|
||
2506000
|
direct allocation
|
page read and write
|
||
B00000
|
heap
|
page read and write
|
||
17B51C00000
|
heap
|
page read and write
|
||
23A8000
|
direct allocation
|
page read and write
|
||
6E0000
|
unkown
|
page readonly
|
||
6DD000
|
unkown
|
page read and write
|
||
6D9000
|
unkown
|
page write copy
|
There are 240 hidden memdumps, click here to show them.