Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
SecuriteInfo.com.Win32.MalwareX-gen.26437.13829.exe
|
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
|
initial sample
|
||
C:\Users\user\Desktop\cabal.exe
|
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Internet Explorer\MSIMGSIZ.DAT
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\53IVYM2Y\down[1]
|
PNG image data, 15 x 15, 8-bit colormap, non-interlaced
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\53IVYM2Y\errorPageStrings[1]
|
Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\9C680Q69\ErrorPageTemplate[1]
|
Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\9C680Q69\bullet[1]
|
PNG image data, 15 x 15, 8-bit colormap, non-interlaced
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\PMW3U6MX\background_gradient[1]
|
JPEG image data, JFIF standard 1.02, aspect ratio, density 100x100, segment length 16, baseline, precision 8, 1x800, components
3
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\PMW3U6MX\httpErrorPagesScripts[1]
|
Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\T9RRWRNL\http_404_webOC[1]
|
HTML document, Unicode text, UTF-8 (with BOM) text, with very long lines (312), with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\T9RRWRNL\info_48[1]
|
PNG image data, 47 x 48, 8-bit/color RGBA, non-interlaced
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\resources.xml
|
XML 1.0 document, ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\Desktop\main.dat
|
data
|
dropped
|
||
C:\Users\user\Desktop\mainEX.dat
|
data
|
dropped
|
There are 4 hidden files, click here to show them.
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.26437.13829.exe
|
"C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.26437.13829.exe"
|
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
http://foo/bar/classes/webbrowseroverlaywf/webbrowseroverlay.baml
|
unknown
|
||
http://217.15.164.94
|
unknown
|
||
http://fontfabrik.comQ
|
unknown
|
||
http://217.15.164.94/update/
|
unknown
|
||
http://defaultcontainer/update;component/classes/webbrowseroverlaywf/webbrowseroverlay.xamld
|
unknown
|
||
http://foo/classes/webbrowseroverlaywf/webbrowseroverlay.xamld
|
unknown
|
||
http://217.15.164.94/update//web/kmnkNIANBDUIbudbnIA.php?t=01/11/2024%2006:26:57
|
217.15.164.94
|
||
http://schemas.xmlsoap.org/soap/encoding/
|
unknown
|
||
http://217.15.164.94/update//web/kmnkNIANBDUIbudbnIA.php?t=01/11/2024
|
unknown
|
||
http://217.15.164.94/update//web/kmnkNIANBDUIbudbnIA.php?t=01/11/2024%2006:26:57Sl.R
|
unknown
|
||
http://217.15.164.94/update/client/cabal.exe
|
unknown
|
||
http://217.15.164.94/update//resources.xml
|
217.15.164.94
|
||
http://schemas.xmlsoap.org/wsdl/
|
unknown
|
||
http://defaultcontainer/update;component/classes/webbrowseroverlaywf/webbrowseroverlay.xaml
|
unknown
|
||
http://foo/classes/webbrowseroverlaywf/webbrowseroverlay.xaml
|
unknown
|
||
http://ww.micro
|
unknown
|
||
http://217.15.168
|
unknown
|
||
http://217.15.164.94/update//web/kmnkNIANBDUIbudbnIA.php?t=01/11/2024%2006:26:57652bf5c30805da9
|
unknown
|
||
http://foo/bar/classes/webbrowseroverlaywf/webbrowseroverlay.bamld
|
unknown
|
||
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
|
unknown
|
||
http://217.15.164.94/update/client/cabal.exeP
|
unknown
|
||
http://217.15.164.94/update//web/kmnkNIANBDUIbudbnIA.phpt=01/11/2024
|
unknown
|
There are 12 hidden URLs, click here to show them.
Domains
Name
|
IP
|
Malicious
|
|
---|---|---|---|
shadowman.dnse.hu
|
185.6.188.137
|
||
s4.gtsystems.hu
|
unknown
|
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
217.15.164.94
|
unknown
|
European Union
|
Registry
Path
|
Value
|
Malicious
|
|
---|---|---|---|
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\SecuriteInfo_RASAPI32
|
EnableFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\SecuriteInfo_RASAPI32
|
EnableAutoFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\SecuriteInfo_RASAPI32
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\SecuriteInfo_RASAPI32
|
FileTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\SecuriteInfo_RASAPI32
|
ConsoleTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\SecuriteInfo_RASAPI32
|
MaxFileSize
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\SecuriteInfo_RASAPI32
|
FileDirectory
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\SecuriteInfo_RASMANCS
|
EnableFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\SecuriteInfo_RASMANCS
|
EnableAutoFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\SecuriteInfo_RASMANCS
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\SecuriteInfo_RASMANCS
|
FileTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\SecuriteInfo_RASMANCS
|
ConsoleTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\SecuriteInfo_RASMANCS
|
MaxFileSize
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\SecuriteInfo_RASMANCS
|
FileDirectory
|
There are 5 hidden registries, click here to show them.
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
63E0000
|
trusted library allocation
|
page read and write
|
||
7F78E000
|
trusted library allocation
|
page readonly
|
||
E9C1000
|
trusted library allocation
|
page read and write
|
||
DC70000
|
heap
|
page read and write
|
||
D990000
|
trusted library allocation
|
page read and write
|
||
7F806000
|
trusted library allocation
|
page execute read
|
||
6F40000
|
trusted library allocation
|
page read and write
|
||
666B000
|
heap
|
page read and write
|
||
7F786000
|
trusted library allocation
|
page readonly
|
||
1910000
|
trusted library allocation
|
page read and write
|
||
36D4000
|
trusted library allocation
|
page read and write
|
||
D694000
|
trusted library allocation
|
page read and write
|
||
193B000
|
trusted library allocation
|
page execute and read and write
|
||
1513000
|
heap
|
page read and write
|
||
EA7B000
|
trusted library allocation
|
page read and write
|
||
A26E000
|
stack
|
page read and write
|
||
D68A000
|
trusted library allocation
|
page read and write
|
||
EBF5000
|
trusted library allocation
|
page read and write
|
||
63F0000
|
trusted library allocation
|
page read and write
|
||
1904000
|
trusted library allocation
|
page read and write
|
||
D520000
|
heap
|
page read and write
|
||
7F781000
|
trusted library allocation
|
page execute read
|
||
7F80E000
|
trusted library allocation
|
page execute read
|
||
35E7000
|
trusted library allocation
|
page read and write
|
||
D9B0000
|
trusted library allocation
|
page read and write
|
||
6ED2000
|
heap
|
page read and write
|
||
192A000
|
trusted library allocation
|
page execute and read and write
|
||
D34E000
|
stack
|
page read and write
|
||
6F1A000
|
heap
|
page read and write
|
||
11BF000
|
stack
|
page read and write
|
||
667F000
|
heap
|
page read and write
|
||
6ED0000
|
heap
|
page read and write
|
||
1518000
|
heap
|
page read and write
|
||
7F80A000
|
trusted library allocation
|
page execute read
|
||
D628000
|
trusted library allocation
|
page read and write
|
||
7F773000
|
trusted library allocation
|
page execute read
|
||
1932000
|
trusted library allocation
|
page read and write
|
||
6C1E000
|
stack
|
page read and write
|
||
7F807000
|
trusted library allocation
|
page readonly
|
||
5BDC000
|
stack
|
page read and write
|
||
6EE2000
|
heap
|
page read and write
|
||
605E000
|
stack
|
page read and write
|
||
1530000
|
heap
|
page read and write
|
||
6650000
|
heap
|
page read and write
|
||
EA74000
|
trusted library allocation
|
page read and write
|
||
EC30000
|
trusted library allocation
|
page execute
|
||
DA10000
|
trusted library allocation
|
page read and write
|
||
6EE6000
|
heap
|
page read and write
|
||
7F795000
|
trusted library allocation
|
page execute read
|
||
D1CE000
|
stack
|
page read and write
|
||
3100000
|
trusted library allocation
|
page read and write
|
||
DC20000
|
heap
|
page read and write
|
||
5AC5000
|
heap
|
page read and write
|
||
D280000
|
heap
|
page read and write
|
||
66A0000
|
heap
|
page read and write
|
||
EC5C000
|
trusted library allocation
|
page read and write
|
||
DC7D000
|
heap
|
page read and write
|
||
6EAB000
|
heap
|
page read and write
|
||
6D30000
|
heap
|
page read and write
|
||
58F4000
|
heap
|
page execute and read and write
|
||
7F80C000
|
trusted library allocation
|
page execute read
|
||
7F784000
|
trusted library allocation
|
page execute read
|
||
1532000
|
heap
|
page read and write
|
||
145E000
|
heap
|
page read and write
|
||
6D1C000
|
stack
|
page read and write
|
||
D63A000
|
trusted library allocation
|
page read and write
|
||
7F804000
|
trusted library allocation
|
page execute read
|
||
D27E000
|
stack
|
page read and write
|
||
6F27000
|
heap
|
page read and write
|
||
D750000
|
trusted library allocation
|
page read and write
|
||
EBF0000
|
trusted library allocation
|
page read and write
|
||
1903000
|
trusted library allocation
|
page execute and read and write
|
||
DCEA000
|
heap
|
page read and write
|
||
DCDA000
|
heap
|
page read and write
|
||
7F78D000
|
trusted library allocation
|
page execute read
|
||
D65E000
|
trusted library allocation
|
page read and write
|
||
D6BA000
|
trusted library allocation
|
page read and write
|
||
D287000
|
heap
|
page read and write
|
||
6DB2000
|
heap
|
page read and write
|
||
32E0000
|
heap
|
page read and write
|
||
D283000
|
heap
|
page read and write
|
||
D7A0000
|
trusted library allocation
|
page read and write
|
||
6ADC000
|
stack
|
page read and write
|
||
EC06000
|
trusted library allocation
|
page read and write
|
||
EE4C000
|
stack
|
page read and write
|
||
EBFE000
|
trusted library allocation
|
page read and write
|
||
3404000
|
trusted library allocation
|
page read and write
|
||
D730000
|
heap
|
page read and write
|
||
1935000
|
trusted library allocation
|
page execute and read and write
|
||
18F0000
|
trusted library allocation
|
page read and write
|
||
5EBB000
|
heap
|
page read and write
|
||
D7C0000
|
trusted library allocation
|
page read and write
|
||
6605000
|
heap
|
page read and write
|
||
1524000
|
heap
|
page read and write
|
||
D678000
|
trusted library allocation
|
page read and write
|
||
154A000
|
heap
|
page read and write
|
||
5974000
|
heap
|
page read and write
|
||
17B0000
|
heap
|
page read and write
|
||
D220000
|
trusted library allocation
|
page read and write
|
||
6607000
|
heap
|
page read and write
|
||
6D3D000
|
heap
|
page read and write
|
||
6E19000
|
heap
|
page read and write
|
||
5E05000
|
heap
|
page read and write
|
||
324E000
|
stack
|
page read and write
|
||
DD93000
|
heap
|
page read and write
|
||
5970000
|
heap
|
page read and write
|
||
EF4E000
|
stack
|
page read and write
|
||
17B7000
|
heap
|
page read and write
|
||
3567000
|
trusted library allocation
|
page read and write
|
||
5B55000
|
heap
|
page read and write
|
||
DC8E000
|
heap
|
page read and write
|
||
615F000
|
stack
|
page read and write
|
||
EC59000
|
trusted library allocation
|
page read and write
|
||
EC10000
|
trusted library allocation
|
page read and write
|
||
E15F000
|
stack
|
page read and write
|
||
32C0000
|
trusted library allocation
|
page read and write
|
||
6609000
|
heap
|
page read and write
|
||
EC53000
|
trusted library allocation
|
page read and write
|
||
71D0000
|
trusted library allocation
|
page read and write
|
||
D980000
|
trusted library allocation
|
page read and write
|
||
912000
|
unkown
|
page readonly
|
||
DCD8000
|
heap
|
page read and write
|
||
DE14000
|
heap
|
page read and write
|
||
3698000
|
trusted library allocation
|
page read and write
|
||
D2FE000
|
stack
|
page read and write
|
||
7210000
|
trusted library allocation
|
page read and write
|
||
DCE3000
|
heap
|
page read and write
|
||
314E000
|
stack
|
page read and write
|
||
6440000
|
trusted library allocation
|
page read and write
|
||
DC91000
|
heap
|
page read and write
|
||
548E000
|
stack
|
page read and write
|
||
D684000
|
trusted library allocation
|
page read and write
|
||
1958000
|
heap
|
page read and write
|
||
D7B0000
|
trusted library allocation
|
page read and write
|
||
D688000
|
trusted library allocation
|
page read and write
|
||
DD74000
|
heap
|
page read and write
|
||
668E000
|
heap
|
page read and write
|
||
D9F0000
|
trusted library allocation
|
page read and write
|
||
EA84000
|
trusted library allocation
|
page read and write
|
||
58F0000
|
heap
|
page execute and read and write
|
||
7F801000
|
trusted library allocation
|
page readonly
|
||
6EE0000
|
heap
|
page read and write
|
||
EDFE000
|
stack
|
page read and write
|
||
D52F000
|
heap
|
page read and write
|
||
DE31000
|
heap
|
page read and write
|
||
36E4000
|
trusted library allocation
|
page read and write
|
||
619E000
|
stack
|
page read and write
|
||
D7F0000
|
trusted library allocation
|
page read and write
|
||
D686000
|
trusted library allocation
|
page read and write
|
||
7F793000
|
trusted library allocation
|
page execute read
|
||
EC72000
|
trusted library allocation
|
page read and write
|
||
A483000
|
trusted library allocation
|
page read and write
|
||
D67C000
|
trusted library allocation
|
page read and write
|
||
1919000
|
trusted library allocation
|
page read and write
|
||
7F800000
|
trusted library allocation
|
page execute read
|
||
7F78B000
|
trusted library allocation
|
page execute read
|
||
8490000
|
trusted library allocation
|
page read and write
|
||
66F0000
|
heap
|
page read and write
|
||
5CE0000
|
heap
|
page read and write
|
||
5EA3000
|
heap
|
page read and write
|
||
7220000
|
trusted library allocation
|
page read and write
|
||
6685000
|
heap
|
page read and write
|
||
4321000
|
trusted library allocation
|
page read and write
|
||
EA6F000
|
stack
|
page read and write
|
||
DC6D000
|
heap
|
page read and write
|
||
D69D000
|
trusted library allocation
|
page read and write
|
||
ECFE000
|
stack
|
page read and write
|
||
1920000
|
trusted library allocation
|
page read and write
|
||
7F79B000
|
trusted library allocation
|
page execute read
|
||
8602000
|
trusted library allocation
|
page read and write
|
||
D673000
|
trusted library allocation
|
page read and write
|
||
D680000
|
trusted library allocation
|
page read and write
|
||
D9C0000
|
trusted library allocation
|
page read and write
|
||
D760000
|
trusted library allocation
|
page read and write
|
||
5B94000
|
heap
|
page read and write
|
||
EBCE000
|
stack
|
page read and write
|
||
151C000
|
heap
|
page read and write
|
||
1440000
|
heap
|
page read and write
|
||
D950000
|
trusted library allocation
|
page read and write
|
||
7F775000
|
trusted library allocation
|
page execute read
|
||
6D68000
|
heap
|
page read and write
|
||
5AF0000
|
heap
|
page read and write
|
||
EA1E000
|
stack
|
page read and write
|
||
5B52000
|
heap
|
page read and write
|
||
52F0000
|
trusted library allocation
|
page read and write
|
||
DDAD000
|
heap
|
page read and write
|
||
6F21000
|
heap
|
page read and write
|
||
7F80B000
|
trusted library allocation
|
page readonly
|
||
DD43000
|
heap
|
page read and write
|
||
DD64000
|
heap
|
page read and write
|
||
DC1E000
|
stack
|
page read and write
|
||
6687000
|
heap
|
page read and write
|
||
643D000
|
stack
|
page read and write
|
||
6EB0000
|
heap
|
page read and write
|
||
339E000
|
trusted library allocation
|
page read and write
|
||
D93E000
|
stack
|
page read and write
|
||
D230000
|
trusted library allocation
|
page read and write
|
||
6D91000
|
heap
|
page read and write
|
||
D630000
|
trusted library allocation
|
page read and write
|
||
5B00000
|
heap
|
page read and write
|
||
5A80000
|
trusted library allocation
|
page read and write
|
||
5AB3000
|
heap
|
page read and write
|
||
C8D0000
|
trusted library allocation
|
page read and write
|
||
6F06000
|
heap
|
page read and write
|
||
65B5000
|
heap
|
page read and write
|
||
7039000
|
heap
|
page read and write
|
||
5B9C000
|
heap
|
page read and write
|
||
D524000
|
heap
|
page read and write
|
||
7F772000
|
trusted library allocation
|
page readonly
|
||
E770000
|
heap
|
page read and write
|
||
DDA2000
|
heap
|
page read and write
|
||
661C000
|
heap
|
page read and write
|
||
DA00000
|
trusted library allocation
|
page read and write
|
||
6BDD000
|
stack
|
page read and write
|
||
3463000
|
trusted library allocation
|
page read and write
|
||
DCE6000
|
heap
|
page read and write
|
||
D9A0000
|
trusted library allocation
|
page read and write
|
||
7F774000
|
trusted library allocation
|
page readonly
|
||
1493000
|
heap
|
page read and write
|
||
6636000
|
heap
|
page read and write
|
||
6F75000
|
heap
|
page read and write
|
||
7008000
|
heap
|
page read and write
|
||
6EF9000
|
heap
|
page read and write
|
||
A2E0000
|
heap
|
page execute and read and write
|
||
42F1000
|
trusted library allocation
|
page read and write
|
||
EC5E000
|
trusted library allocation
|
page read and write
|
||
DC62000
|
heap
|
page read and write
|
||
328C000
|
stack
|
page read and write
|
||
65DE000
|
heap
|
page read and write
|
||
6E0A000
|
heap
|
page read and write
|
||
1486000
|
heap
|
page read and write
|
||
D6B2000
|
trusted library allocation
|
page read and write
|
||
E76E000
|
stack
|
page read and write
|
||
32F1000
|
trusted library allocation
|
page read and write
|
||
662C000
|
heap
|
page read and write
|
||
D650000
|
trusted library allocation
|
page read and write
|
||
DCFC000
|
heap
|
page read and write
|
||
5D63000
|
heap
|
page read and write
|
||
D648000
|
trusted library allocation
|
page read and write
|
||
10C7000
|
stack
|
page read and write
|
||
7180000
|
trusted library allocation
|
page read and write
|
||
1522000
|
heap
|
page read and write
|
||
629E000
|
stack
|
page read and write
|
||
7F79D000
|
trusted library allocation
|
page execute read
|
||
F04D000
|
trusted library allocation
|
page read and write
|
||
D800000
|
trusted library allocation
|
page read and write
|
||
7F77A000
|
trusted library allocation
|
page execute read
|
||
1450000
|
heap
|
page read and write
|
||
D6C0000
|
trusted library allocation
|
page read and write
|
||
1926000
|
trusted library allocation
|
page execute and read and write
|
||
7F799000
|
trusted library allocation
|
page execute read
|
||
D770000
|
trusted library allocation
|
page read and write
|
||
5B8C000
|
heap
|
page read and write
|
||
6EB2000
|
heap
|
page read and write
|
||
32C3000
|
trusted library allocation
|
page read and write
|
||
7F797000
|
trusted library allocation
|
page execute read
|
||
52F8000
|
trusted library allocation
|
page read and write
|
||
E9D0000
|
trusted library allocation
|
page read and write
|
||
D6AB000
|
trusted library allocation
|
page read and write
|
||
7F777000
|
trusted library allocation
|
page execute read
|
||
7F771000
|
trusted library allocation
|
page execute read
|
||
DCC5000
|
heap
|
page read and write
|
||
D790000
|
trusted library allocation
|
page read and write
|
||
7F79F000
|
trusted library allocation
|
page execute read
|
||
6616000
|
heap
|
page read and write
|
||
6FFE000
|
heap
|
page read and write
|
||
7F787000
|
trusted library allocation
|
page execute read
|
||
EC08000
|
trusted library allocation
|
page read and write
|
||
D940000
|
trusted library allocation
|
page read and write
|
||
6D46000
|
heap
|
page read and write
|
||
EACE000
|
stack
|
page read and write
|
||
D6A0000
|
trusted library allocation
|
page read and write
|
||
DD38000
|
heap
|
page read and write
|
||
DCCD000
|
heap
|
page read and write
|
||
32A0000
|
trusted library allocation
|
page read and write
|
||
DD41000
|
heap
|
page read and write
|
||
EC57000
|
trusted library allocation
|
page read and write
|
||
5DC9000
|
heap
|
page read and write
|
||
191D000
|
trusted library allocation
|
page execute and read and write
|
||
DCDD000
|
heap
|
page read and write
|
||
6611000
|
heap
|
page read and write
|
||
85E4000
|
trusted library allocation
|
page read and write
|
||
DD36000
|
heap
|
page read and write
|
||
65F9000
|
heap
|
page read and write
|
||
3290000
|
trusted library allocation
|
page execute and read and write
|
||
707D000
|
stack
|
page read and write
|
||
6DEA000
|
heap
|
page read and write
|
||
6450000
|
trusted library allocation
|
page read and write
|
||
DD84000
|
heap
|
page read and write
|
||
5AB1000
|
heap
|
page read and write
|
||
5980000
|
heap
|
page read and write
|
||
5EC0000
|
heap
|
page read and write
|
||
15D0000
|
heap
|
page read and write
|
||
D720000
|
heap
|
page read and write
|
||
D6A6000
|
trusted library allocation
|
page read and write
|
||
DE36000
|
heap
|
page read and write
|
||
35CE000
|
trusted library allocation
|
page read and write
|
||
D632000
|
trusted library allocation
|
page read and write
|
||
6FBC000
|
heap
|
page read and write
|
||
5B89000
|
heap
|
page read and write
|
||
DCD6000
|
heap
|
page read and write
|
||
7F7A0000
|
trusted library allocation
|
page execute and read and write
|
||
D670000
|
trusted library allocation
|
page read and write
|
||
DE22000
|
heap
|
page read and write
|
||
7F78C000
|
trusted library allocation
|
page readonly
|
||
910000
|
unkown
|
page readonly
|
||
7F789000
|
trusted library allocation
|
page execute read
|
||
65B2000
|
heap
|
page read and write
|
||
7F78F000
|
trusted library allocation
|
page execute read
|
||
7F802000
|
trusted library allocation
|
page execute read
|
||
D6B8000
|
trusted library allocation
|
page read and write
|
||
D68C000
|
trusted library allocation
|
page read and write
|
||
EC03000
|
trusted library allocation
|
page read and write
|
||
356C000
|
trusted library allocation
|
page read and write
|
||
65B9000
|
heap
|
page read and write
|
||
E05C000
|
stack
|
page read and write
|
||
190D000
|
trusted library allocation
|
page execute and read and write
|
||
E8BB000
|
stack
|
page read and write
|
||
1930000
|
trusted library allocation
|
page read and write
|
||
1937000
|
trusted library allocation
|
page execute and read and write
|
||
35CA000
|
trusted library allocation
|
page read and write
|
||
5EB7000
|
heap
|
page read and write
|
||
D526000
|
heap
|
page read and write
|
||
5A90000
|
heap
|
page read and write
|
||
6EB6000
|
heap
|
page read and write
|
||
1900000
|
trusted library allocation
|
page read and write
|
||
DCE8000
|
heap
|
page read and write
|
||
E87E000
|
stack
|
page read and write
|
||
58E0000
|
heap
|
page read and write
|
||
D9D0000
|
trusted library allocation
|
page read and write
|
||
1950000
|
heap
|
page read and write
|
||
D638000
|
trusted library allocation
|
page read and write
|
||
7F791000
|
trusted library allocation
|
page execute read
|
||
1032000
|
unkown
|
page readonly
|
||
D62C000
|
trusted library allocation
|
page read and write
|
||
D660000
|
trusted library allocation
|
page read and write
|
||
D6C8000
|
trusted library allocation
|
page read and write
|
||
D740000
|
trusted library allocation
|
page read and write
|
||
DCD4000
|
heap
|
page read and write
|
||
6D85000
|
heap
|
page read and write
|
||
D210000
|
trusted library allocation
|
page read and write
|
||
D780000
|
trusted library allocation
|
page read and write
|
||
5D95000
|
heap
|
page read and write
|
||
36D6000
|
trusted library allocation
|
page read and write
|
||
6627000
|
heap
|
page read and write
|
||
7F803000
|
trusted library allocation
|
page readonly
|
||
D7E0000
|
trusted library allocation
|
page read and write
|
||
EC61000
|
trusted library allocation
|
page read and write
|
||
1430000
|
heap
|
page read and write
|
||
65E1000
|
heap
|
page read and write
|
||
6E17000
|
heap
|
page read and write
|
||
5CD8000
|
stack
|
page read and write
|
||
5E8C000
|
heap
|
page read and write
|
||
D9E0000
|
trusted library allocation
|
page read and write
|
||
EA76000
|
trusted library allocation
|
page read and write
|
||
7F808000
|
trusted library allocation
|
page execute read
|
||
7F776000
|
trusted library allocation
|
page readonly
|
||
6E5D000
|
heap
|
page read and write
|
||
6F2E000
|
heap
|
page read and write
|
||
36E6000
|
trusted library allocation
|
page read and write
|
||
E9BE000
|
stack
|
page read and write
|
||
6EB4000
|
heap
|
page read and write
|
||
DCF3000
|
heap
|
page read and write
|
||
1922000
|
trusted library allocation
|
page read and write
|
||
6F1E000
|
heap
|
page read and write
|
||
32B0000
|
heap
|
page execute and read and write
|
||
5EB5000
|
heap
|
page read and write
|
||
65A0000
|
heap
|
page read and write
|
||
DC68000
|
heap
|
page read and write
|
||
32C9000
|
trusted library allocation
|
page read and write
|
||
DD0B000
|
heap
|
page read and write
|
||
E9C4000
|
trusted library allocation
|
page read and write
|
||
4361000
|
trusted library allocation
|
page read and write
|
||
D970000
|
trusted library allocation
|
page read and write
|
||
6F50000
|
trusted library allocation
|
page read and write
|
||
717C000
|
stack
|
page read and write
|
||
6ED6000
|
heap
|
page read and write
|
||
D67E000
|
trusted library allocation
|
page read and write
|
||
DD53000
|
heap
|
page read and write
|
||
D63C000
|
trusted library allocation
|
page read and write
|
||
D7D0000
|
trusted library allocation
|
page read and write
|
||
E9D6000
|
trusted library allocation
|
page read and write
|
||
D658000
|
trusted library allocation
|
page read and write
|
||
D960000
|
trusted library allocation
|
page read and write
|
||
7F78A000
|
trusted library allocation
|
page readonly
|
There are 375 hidden memdumps, click here to show them.