Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
IMG-20241119-WA0006(162KB).Pdf.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
initial sample
|
||
C:\Users\user\AppData\Local\Wausaukee\silvexes.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\silvexes.vbs
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\aut3143.tmp
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\autF9F7.tmp
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\autFB.tmp
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\scroll
|
data
|
dropped
|
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\IMG-20241119-WA0006(162KB).Pdf.exe
|
"C:\Users\user\Desktop\IMG-20241119-WA0006(162KB).Pdf.exe"
|
||
C:\Users\user\AppData\Local\Wausaukee\silvexes.exe
|
"C:\Users\user\Desktop\IMG-20241119-WA0006(162KB).Pdf.exe"
|
||
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
|
"C:\Users\user\Desktop\IMG-20241119-WA0006(162KB).Pdf.exe"
|
||
C:\Windows\System32\wscript.exe
|
"C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\silvexes.vbs"
|
||
C:\Users\user\AppData\Local\Wausaukee\silvexes.exe
|
"C:\Users\user\AppData\Local\Wausaukee\silvexes.exe"
|
||
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
|
"C:\Users\user\AppData\Local\Wausaukee\silvexes.exe"
|
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
https://reallyfreegeoip.org
|
unknown
|
||
http://checkip.dyndns.org
|
unknown
|
||
http://checkip.dyndns.org/
|
193.122.6.168
|
||
http://checkip.dyndns.com
|
unknown
|
||
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
|
unknown
|
||
https://reallyfreegeoip.org/xml/8.46.123.75
|
172.67.177.134
|
||
https://reallyfreegeoip.org/xml/8.46.123.75$
|
unknown
|
||
http://checkip.dyndns.org/q
|
unknown
|
||
http://reallyfreegeoip.org
|
unknown
|
||
https://reallyfreegeoip.org/xml/
|
unknown
|
Domains
Name
|
IP
|
Malicious
|
|
---|---|---|---|
reallyfreegeoip.org
|
172.67.177.134
|
||
checkip.dyndns.com
|
193.122.6.168
|
||
checkip.dyndns.org
|
unknown
|
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
193.122.6.168
|
checkip.dyndns.com
|
United States
|
||
172.67.177.134
|
reallyfreegeoip.org
|
United States
|
Registry
Path
|
Value
|
Malicious
|
|
---|---|---|---|
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASAPI32
|
EnableFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASAPI32
|
EnableAutoFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASAPI32
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASAPI32
|
FileTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASAPI32
|
ConsoleTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASAPI32
|
MaxFileSize
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASAPI32
|
FileDirectory
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASMANCS
|
EnableFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASMANCS
|
EnableAutoFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASMANCS
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASMANCS
|
FileTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASMANCS
|
ConsoleTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASMANCS
|
MaxFileSize
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASMANCS
|
FileDirectory
|
There are 5 hidden registries, click here to show them.
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
2F3F000
|
trusted library allocation
|
page read and write
|
||
2A61000
|
trusted library allocation
|
page read and write
|
||
2D71000
|
trusted library allocation
|
page read and write
|
||
402000
|
system
|
page execute and read and write
|
||
19A0000
|
direct allocation
|
page read and write
|
||
1E60000
|
direct allocation
|
page read and write
|
||
2C2F000
|
trusted library allocation
|
page read and write
|
||
160D4023000
|
heap
|
page read and write
|
||
3DDB000
|
trusted library allocation
|
page read and write
|
||
5230000
|
trusted library allocation
|
page read and write
|
||
F10000
|
heap
|
page read and write
|
||
1120000
|
trusted library allocation
|
page read and write
|
||
2CE3000
|
trusted library allocation
|
page read and write
|
||
2CEA000
|
trusted library allocation
|
page read and write
|
||
C6F000
|
unkown
|
page write copy
|
||
1E94000
|
heap
|
page read and write
|
||
DDE000
|
stack
|
page read and write
|
||
81000
|
unkown
|
page execute read
|
||
A60000
|
heap
|
page read and write
|
||
3A50000
|
direct allocation
|
page read and write
|
||
3A50000
|
direct allocation
|
page read and write
|
||
3A50000
|
direct allocation
|
page read and write
|
||
81000
|
unkown
|
page execute read
|
||
3ACB000
|
trusted library allocation
|
page read and write
|
||
2FD0000
|
trusted library allocation
|
page read and write
|
||
2BB9000
|
trusted library allocation
|
page read and write
|
||
4E6FFB000
|
stack
|
page read and write
|
||
3D8E000
|
direct allocation
|
page read and write
|
||
108C000
|
stack
|
page read and write
|
||
3F40000
|
direct allocation
|
page read and write
|
||
4069000
|
direct allocation
|
page read and write
|
||
6850000
|
trusted library allocation
|
page read and write
|
||
3BF0000
|
direct allocation
|
page read and write
|
||
13F000
|
unkown
|
page write copy
|
||
5040000
|
trusted library allocation
|
page execute and read and write
|
||
3EC3000
|
direct allocation
|
page read and write
|
||
3A0D000
|
direct allocation
|
page read and write
|
||
2CAD000
|
trusted library allocation
|
page read and write
|
||
3BF0000
|
direct allocation
|
page read and write
|
||
2EB1000
|
trusted library allocation
|
page read and write
|
||
2B28000
|
trusted library allocation
|
page read and write
|
||
3A89000
|
trusted library allocation
|
page read and write
|
||
60FF000
|
stack
|
page read and write
|
||
1190000
|
trusted library allocation
|
page execute and read and write
|
||
3610000
|
heap
|
page read and write
|
||
14D9000
|
heap
|
page read and write
|
||
EF7000
|
stack
|
page read and write
|
||
FDA000
|
heap
|
page read and write
|
||
2EE8000
|
trusted library allocation
|
page read and write
|
||
109F000
|
stack
|
page read and write
|
||
1165000
|
trusted library allocation
|
page execute and read and write
|
||
1510000
|
heap
|
page read and write
|
||
C3D000
|
unkown
|
page readonly
|
||
1300000
|
heap
|
page read and write
|
||
3F70000
|
direct allocation
|
page read and write
|
||
6870000
|
trusted library allocation
|
page read and write
|
||
2BB5000
|
trusted library allocation
|
page read and write
|
||
3DD0000
|
direct allocation
|
page read and write
|
||
52B0000
|
trusted library allocation
|
page read and write
|
||
6890000
|
trusted library allocation
|
page execute and read and write
|
||
1130000
|
trusted library allocation
|
page read and write
|
||
6820000
|
trusted library allocation
|
page read and write
|
||
62FE000
|
stack
|
page read and write
|
||
1005000
|
heap
|
page read and write
|
||
2E7D000
|
trusted library allocation
|
page read and write
|
||
1686000
|
heap
|
page read and write
|
||
80000
|
unkown
|
page readonly
|
||
4E6CFD000
|
stack
|
page read and write
|
||
1000000
|
heap
|
page read and write
|
||
3D8E000
|
direct allocation
|
page read and write
|
||
29F0000
|
trusted library allocation
|
page read and write
|
||
12FF000
|
heap
|
page read and write
|
||
400000
|
system
|
page execute and read and write
|
||
107E000
|
stack
|
page read and write
|
||
5060000
|
heap
|
page read and write
|
||
3000000
|
trusted library allocation
|
page read and write
|
||
110B000
|
heap
|
page read and write
|
||
1306000
|
trusted library allocation
|
page execute and read and write
|
||
2E2B000
|
trusted library allocation
|
page read and write
|
||
2F03000
|
trusted library allocation
|
page read and write
|
||
7FE000
|
stack
|
page read and write
|
||
6510000
|
trusted library allocation
|
page execute and read and write
|
||
3BF0000
|
direct allocation
|
page read and write
|
||
1340000
|
heap
|
page read and write
|
||
BB0000
|
unkown
|
page readonly
|
||
6049000
|
heap
|
page read and write
|
||
2A06000
|
trusted library allocation
|
page read and write
|
||
2A00000
|
trusted library allocation
|
page read and write
|
||
1350000
|
heap
|
page execute and read and write
|
||
64E0000
|
heap
|
page read and write
|
||
5030000
|
trusted library allocation
|
page read and write
|
||
1310000
|
trusted library allocation
|
page read and write
|
||
E20000
|
heap
|
page read and write
|
||
2C21000
|
trusted library allocation
|
page read and write
|
||
2BCA000
|
trusted library allocation
|
page read and write
|
||
149A000
|
heap
|
page read and write
|
||
53BD000
|
stack
|
page read and write
|
||
11EE000
|
stack
|
page read and write
|
||
3B73000
|
direct allocation
|
page read and write
|
||
3EC3000
|
direct allocation
|
page read and write
|
||
10EE000
|
stack
|
page read and write
|
||
406D000
|
direct allocation
|
page read and write
|
||
3B73000
|
direct allocation
|
page read and write
|
||
10AC000
|
stack
|
page read and write
|
||
684E000
|
trusted library allocation
|
page read and write
|
||
D50000
|
heap
|
page read and write
|
||
2FF4000
|
trusted library allocation
|
page read and write
|
||
2A2D000
|
trusted library allocation
|
page read and write
|
||
3E0B000
|
trusted library allocation
|
page read and write
|
||
2CEF000
|
trusted library allocation
|
page read and write
|
||
2C9D000
|
trusted library allocation
|
page read and write
|
||
40DE000
|
direct allocation
|
page read and write
|
||
5350000
|
heap
|
page execute and read and write
|
||
6D60000
|
heap
|
page read and write
|
||
12FD000
|
trusted library allocation
|
page execute and read and write
|
||
3530000
|
direct allocation
|
page read and write
|
||
3BF0000
|
direct allocation
|
page read and write
|
||
5236000
|
trusted library allocation
|
page read and write
|
||
14BB000
|
heap
|
page read and write
|
||
130A000
|
trusted library allocation
|
page execute and read and write
|
||
4B5E000
|
stack
|
page read and write
|
||
C6A000
|
unkown
|
page write copy
|
||
651E000
|
stack
|
page read and write
|
||
6910000
|
trusted library allocation
|
page read and write
|
||
12D0000
|
trusted library allocation
|
page read and write
|
||
2ECD000
|
trusted library allocation
|
page read and write
|
||
C3D000
|
unkown
|
page readonly
|
||
CE0000
|
heap
|
page read and write
|
||
3960000
|
direct allocation
|
page read and write
|
||
2FA9000
|
trusted library allocation
|
page read and write
|
||
2F1F000
|
trusted library allocation
|
page read and write
|
||
655E000
|
stack
|
page read and write
|
||
1312000
|
trusted library allocation
|
page read and write
|
||
C6A000
|
unkown
|
page read and write
|
||
10D000
|
unkown
|
page readonly
|
||
2EDA000
|
trusted library allocation
|
page read and write
|
||
81000
|
unkown
|
page execute read
|
||
560E000
|
stack
|
page read and write
|
||
7B0000
|
heap
|
page read and write
|
||
10FB000
|
heap
|
page read and write
|
||
110A000
|
heap
|
page read and write
|
||
BB0000
|
unkown
|
page readonly
|
||
2CB7000
|
trusted library allocation
|
page read and write
|
||
5FC0000
|
heap
|
page read and write
|
||
10D000
|
unkown
|
page readonly
|
||
52B6000
|
trusted library allocation
|
page read and write
|
||
DDD000
|
stack
|
page read and write
|
||
1C90000
|
heap
|
page read and write
|
||
1BDE000
|
stack
|
page read and write
|
||
10FC000
|
heap
|
page read and write
|
||
5290000
|
trusted library allocation
|
page execute and read and write
|
||
C6A000
|
unkown
|
page write copy
|
||
3AF2000
|
trusted library allocation
|
page read and write
|
||
52DD000
|
trusted library allocation
|
page read and write
|
||
BB0000
|
unkown
|
page readonly
|
||
130F000
|
heap
|
page read and write
|
||
1302000
|
trusted library allocation
|
page read and write
|
||
3A61000
|
trusted library allocation
|
page read and write
|
||
3BF0000
|
direct allocation
|
page read and write
|
||
FB4000
|
heap
|
page read and write
|
||
160D4060000
|
heap
|
page read and write
|
||
3D19000
|
direct allocation
|
page read and write
|
||
13BC000
|
stack
|
page read and write
|
||
7BA000
|
stack
|
page read and write
|
||
E8A000
|
heap
|
page read and write
|
||
3A1E000
|
direct allocation
|
page read and write
|
||
3D8E000
|
direct allocation
|
page read and write
|
||
2BE5000
|
trusted library allocation
|
page read and write
|
||
3D19000
|
direct allocation
|
page read and write
|
||
13DC000
|
stack
|
page read and write
|
||
3DA0000
|
direct allocation
|
page read and write
|
||
C6F000
|
unkown
|
page write copy
|
||
2E79000
|
trusted library allocation
|
page read and write
|
||
2FCC000
|
trusted library allocation
|
page read and write
|
||
FFA000
|
heap
|
page read and write
|
||
115F000
|
heap
|
page read and write
|
||
149E000
|
heap
|
page read and write
|
||
2EB9000
|
trusted library allocation
|
page read and write
|
||
12F0000
|
trusted library allocation
|
page read and write
|
||
12EE000
|
stack
|
page read and write
|
||
ECE000
|
stack
|
page read and write
|
||
63D7000
|
heap
|
page read and write
|
||
2A1E000
|
trusted library allocation
|
page read and write
|
||
6856000
|
trusted library allocation
|
page read and write
|
||
6430000
|
trusted library allocation
|
page execute and read and write
|
||
D10000
|
heap
|
page read and write
|
||
6420000
|
trusted library allocation
|
page execute and read and write
|
||
2EC5000
|
trusted library allocation
|
page read and write
|
||
2E3A000
|
trusted library allocation
|
page read and write
|
||
C74000
|
unkown
|
page readonly
|
||
160D3FF5000
|
heap
|
page read and write
|
||
4069000
|
direct allocation
|
page read and write
|
||
3A50000
|
direct allocation
|
page read and write
|
||
19D4000
|
heap
|
page read and write
|
||
4F4D000
|
stack
|
page read and write
|
||
BB1000
|
unkown
|
page execute read
|
||
641F000
|
trusted library allocation
|
page read and write
|
||
152F000
|
heap
|
page read and write
|
||
FC5000
|
heap
|
page read and write
|
||
C5E000
|
unkown
|
page readonly
|
||
2B42000
|
trusted library allocation
|
page read and write
|
||
63E3000
|
heap
|
page read and write
|
||
52CA000
|
trusted library allocation
|
page read and write
|
||
12E3000
|
trusted library allocation
|
page execute and read and write
|
||
613E000
|
stack
|
page read and write
|
||
3D8E000
|
direct allocation
|
page read and write
|
||
6450000
|
trusted library allocation
|
page read and write
|
||
548E000
|
stack
|
page read and write
|
||
4E69FE000
|
stack
|
page read and write
|
||
3EF3000
|
direct allocation
|
page read and write
|
||
406D000
|
direct allocation
|
page read and write
|
||
106C000
|
stack
|
page read and write
|
||
B9A000
|
stack
|
page read and write
|
||
11E1000
|
heap
|
page read and write
|
||
E80000
|
heap
|
page read and write
|
||
115C000
|
heap
|
page read and write
|
||
12E0000
|
trusted library allocation
|
page read and write
|
||
13A000
|
unkown
|
page read and write
|
||
E60000
|
heap
|
page read and write
|
||
144000
|
unkown
|
page readonly
|
||
52CE000
|
trusted library allocation
|
page read and write
|
||
3F70000
|
direct allocation
|
page read and write
|
||
104E000
|
stack
|
page read and write
|
||
52BE000
|
trusted library allocation
|
page read and write
|
||
1162000
|
trusted library allocation
|
page read and write
|
||
3EF3000
|
direct allocation
|
page read and write
|
||
3614000
|
heap
|
page read and write
|
||
410E000
|
direct allocation
|
page read and write
|
||
2EBD000
|
trusted library allocation
|
page read and write
|
||
3A5E000
|
stack
|
page read and write
|
||
2D6E000
|
stack
|
page read and write
|
||
167D000
|
heap
|
page read and write
|
||
52D6000
|
trusted library allocation
|
page read and write
|
||
5304000
|
trusted library allocation
|
page read and write
|
||
3BF0000
|
direct allocation
|
page read and write
|
||
3006000
|
trusted library allocation
|
page read and write
|
||
160D42D0000
|
heap
|
page read and write
|
||
5238000
|
trusted library allocation
|
page read and write
|
||
2B12000
|
trusted library allocation
|
page read and write
|
||
2E1A000
|
trusted library allocation
|
page read and write
|
||
1105000
|
heap
|
page read and write
|
||
410E000
|
direct allocation
|
page read and write
|
||
3AE5000
|
trusted library allocation
|
page read and write
|
||
2B65000
|
trusted library allocation
|
page read and write
|
||
4E6EFF000
|
stack
|
page read and write
|
||
5310000
|
trusted library allocation
|
page read and write
|
||
5460000
|
heap
|
page read and write
|
||
4F2D000
|
stack
|
page read and write
|
||
C74000
|
unkown
|
page readonly
|
||
168C000
|
heap
|
page read and write
|
||
5220000
|
trusted library allocation
|
page read and write
|
||
1330000
|
trusted library allocation
|
page read and write
|
||
160D42D5000
|
heap
|
page read and write
|
||
14CB000
|
heap
|
page read and write
|
||
4EC0000
|
trusted library allocation
|
page read and write
|
||
68A0000
|
trusted library allocation
|
page read and write
|
||
3DFF000
|
trusted library allocation
|
page read and write
|
||
3D1D000
|
direct allocation
|
page read and write
|
||
115B000
|
heap
|
page execute and read and write
|
||
5050000
|
heap
|
page read and write
|
||
1152000
|
trusted library allocation
|
page read and write
|
||
1100000
|
heap
|
page read and write
|
||
DBC000
|
stack
|
page read and write
|
||
12ED000
|
trusted library allocation
|
page execute and read and write
|
||
1D5F000
|
stack
|
page read and write
|
||
2FFB000
|
trusted library allocation
|
page read and write
|
||
F10000
|
heap
|
page read and write
|
||
64DD000
|
stack
|
page read and write
|
||
6873000
|
trusted library allocation
|
page read and write
|
||
2BA1000
|
trusted library allocation
|
page read and write
|
||
2BB1000
|
trusted library allocation
|
page read and write
|
||
113D000
|
trusted library allocation
|
page execute and read and write
|
||
C3D000
|
unkown
|
page readonly
|
||
629E000
|
stack
|
page read and write
|
||
4E67FE000
|
stack
|
page read and write
|
||
E40000
|
heap
|
page read and write
|
||
11FB000
|
heap
|
page read and write
|
||
1153000
|
heap
|
page read and write
|
||
29EE000
|
stack
|
page read and write
|
||
1120000
|
heap
|
page read and write
|
||
2A12000
|
trusted library allocation
|
page read and write
|
||
1E90000
|
heap
|
page read and write
|
||
F3D000
|
heap
|
page read and write
|
||
409D000
|
direct allocation
|
page read and write
|
||
3570000
|
heap
|
page read and write
|
||
C5E000
|
unkown
|
page readonly
|
||
5306000
|
trusted library allocation
|
page read and write
|
||
11B6000
|
heap
|
page read and write
|
||
3D1D000
|
direct allocation
|
page read and write
|
||
12E000
|
unkown
|
page readonly
|
||
1133000
|
trusted library allocation
|
page execute and read and write
|
||
2B57000
|
trusted library allocation
|
page read and write
|
||
3A50000
|
direct allocation
|
page read and write
|
||
4E4E000
|
stack
|
page read and write
|
||
C5E000
|
unkown
|
page readonly
|
||
3DA0000
|
direct allocation
|
page read and write
|
||
2B17000
|
trusted library allocation
|
page read and write
|
||
2FB4000
|
trusted library allocation
|
page read and write
|
||
80000
|
unkown
|
page readonly
|
||
3EF3000
|
direct allocation
|
page read and write
|
||
2B0A000
|
trusted library allocation
|
page read and write
|
||
2E38000
|
trusted library allocation
|
page read and write
|
||
13FC000
|
stack
|
page read and write
|
||
2A0E000
|
trusted library allocation
|
page read and write
|
||
600A000
|
heap
|
page read and write
|
||
2E1F000
|
trusted library allocation
|
page read and write
|
||
687A000
|
trusted library allocation
|
page read and write
|
||
4E6AFF000
|
stack
|
page read and write
|
||
E7E000
|
heap
|
page read and write
|
||
40DE000
|
direct allocation
|
page read and write
|
||
2B1B000
|
trusted library allocation
|
page read and write
|
||
3D1D000
|
direct allocation
|
page read and write
|
||
2E27000
|
trusted library allocation
|
page read and write
|
||
68B0000
|
trusted library allocation
|
page read and write
|
||
2B0F000
|
trusted library allocation
|
page read and write
|
||
2E67000
|
trusted library allocation
|
page read and write
|
||
2F23000
|
trusted library allocation
|
page read and write
|
||
3D19000
|
direct allocation
|
page read and write
|
||
A30000
|
heap
|
page read and write
|
||
502E000
|
stack
|
page read and write
|
||
C3D000
|
unkown
|
page readonly
|
||
144000
|
unkown
|
page readonly
|
||
1E50000
|
heap
|
page read and write
|
||
671E000
|
stack
|
page read and write
|
||
FDB000
|
heap
|
page read and write
|
||
409D000
|
direct allocation
|
page read and write
|
||
1084000
|
heap
|
page read and write
|
||
160D5BC0000
|
heap
|
page read and write
|
||
C5E000
|
unkown
|
page readonly
|
||
F5D000
|
heap
|
page read and write
|
||
2E52000
|
trusted library allocation
|
page read and write
|
||
CD0000
|
heap
|
page read and write
|
||
5FBF000
|
stack
|
page read and write
|
||
6400000
|
trusted library allocation
|
page execute and read and write
|
||
4E639A000
|
stack
|
page read and write
|
||
2EB5000
|
trusted library allocation
|
page read and write
|
||
2B61000
|
trusted library allocation
|
page read and write
|
||
3B73000
|
direct allocation
|
page read and write
|
||
3B73000
|
direct allocation
|
page read and write
|
||
6960000
|
trusted library allocation
|
page execute and read and write
|
||
116B000
|
trusted library allocation
|
page execute and read and write
|
||
1180000
|
trusted library allocation
|
page read and write
|
||
3D19000
|
direct allocation
|
page read and write
|
||
2FAE000
|
trusted library allocation
|
page read and write
|
||
52A0000
|
trusted library allocation
|
page read and write
|
||
1558000
|
heap
|
page read and write
|
||
160D3F10000
|
heap
|
page read and write
|
||
523B000
|
trusted library allocation
|
page read and write
|
||
2A26000
|
trusted library allocation
|
page read and write
|
||
160D3F30000
|
heap
|
page read and write
|
||
D9E000
|
stack
|
page read and write
|
||
115A000
|
trusted library allocation
|
page execute and read and write
|
||
1300000
|
trusted library allocation
|
page read and write
|
||
E30000
|
heap
|
page read and write
|
||
1197000
|
heap
|
page read and write
|
||
3D1D000
|
direct allocation
|
page read and write
|
||
6830000
|
trusted library allocation
|
page execute and read and write
|
||
127C000
|
heap
|
page read and write
|
||
2CF5000
|
trusted library allocation
|
page read and write
|
||
12E000
|
unkown
|
page readonly
|
||
114D000
|
trusted library allocation
|
page execute and read and write
|
||
2C99000
|
trusted library allocation
|
page read and write
|
||
BB1000
|
unkown
|
page execute read
|
||
2BAD000
|
trusted library allocation
|
page read and write
|
||
669E000
|
stack
|
page read and write
|
||
4099000
|
direct allocation
|
page read and write
|
||
3D19000
|
direct allocation
|
page read and write
|
||
6413000
|
trusted library allocation
|
page read and write
|
||
14D5000
|
heap
|
page read and write
|
||
6844000
|
trusted library allocation
|
page read and write
|
||
1150000
|
trusted library allocation
|
page read and write
|
||
5300000
|
trusted library allocation
|
page read and write
|
||
1557000
|
heap
|
page read and write
|
||
406D000
|
direct allocation
|
page read and write
|
||
2CA4000
|
trusted library allocation
|
page read and write
|
||
3D8E000
|
direct allocation
|
page read and write
|
||
D2E000
|
stack
|
page read and write
|
||
11D0000
|
heap
|
page read and write
|
||
2B2A000
|
trusted library allocation
|
page read and write
|
||
E85000
|
heap
|
page read and write
|
||
2CBB000
|
trusted library allocation
|
page read and write
|
||
19D0000
|
heap
|
page read and write
|
||
2C6E000
|
stack
|
page read and write
|
||
3EC3000
|
direct allocation
|
page read and write
|
||
1200000
|
heap
|
page read and write
|
||
2B6D000
|
trusted library allocation
|
page read and write
|
||
1C80000
|
heap
|
page read and write
|
||
1380000
|
heap
|
page read and write
|
||
1140000
|
trusted library allocation
|
page read and write
|
||
3DA0000
|
direct allocation
|
page read and write
|
||
2C13000
|
trusted library allocation
|
page read and write
|
||
5053000
|
heap
|
page read and write
|
||
BA9000
|
stack
|
page read and write
|
||
11E0000
|
heap
|
page read and write
|
||
3DD0000
|
direct allocation
|
page read and write
|
||
522E000
|
trusted library allocation
|
page read and write
|
||
681F000
|
stack
|
page read and write
|
||
2CC0000
|
trusted library allocation
|
page read and write
|
||
1180000
|
heap
|
page read and write
|
||
4099000
|
direct allocation
|
page read and write
|
||
1110000
|
heap
|
page read and write
|
||
623F000
|
stack
|
page read and write
|
||
3DD0000
|
direct allocation
|
page read and write
|
||
E98000
|
heap
|
page read and write
|
||
7BA000
|
stack
|
page read and write
|
||
3AEF000
|
trusted library allocation
|
page read and write
|
||
160D3FC9000
|
heap
|
page read and write
|
||
F4D000
|
heap
|
page read and write
|
||
579F000
|
stack
|
page read and write
|
||
12E4000
|
trusted library allocation
|
page read and write
|
||
2BA9000
|
trusted library allocation
|
page read and write
|
||
52F0000
|
heap
|
page read and write
|
||
1317000
|
trusted library allocation
|
page execute and read and write
|
||
409D000
|
direct allocation
|
page read and write
|
||
1360000
|
heap
|
page read and write
|
||
AF7000
|
stack
|
page read and write
|
||
E2F000
|
stack
|
page read and write
|
||
1160000
|
trusted library allocation
|
page read and write
|
||
11CE000
|
stack
|
page read and write
|
||
11D8000
|
heap
|
page read and write
|
||
DFD000
|
stack
|
page read and write
|
||
3D1D000
|
direct allocation
|
page read and write
|
||
627E000
|
stack
|
page read and write
|
||
5240000
|
heap
|
page execute and read and write
|
||
5330000
|
trusted library allocation
|
page read and write
|
||
1144000
|
heap
|
page read and write
|
||
558E000
|
stack
|
page read and write
|
||
55CE000
|
stack
|
page read and write
|
||
CCE000
|
stack
|
page read and write
|
||
160D3FC0000
|
heap
|
page read and write
|
||
2C0F000
|
trusted library allocation
|
page read and write
|
||
3E02000
|
trusted library allocation
|
page read and write
|
||
14D4000
|
heap
|
page execute and read and write
|
||
FF0000
|
heap
|
page read and write
|
||
1EB0000
|
heap
|
page read and write
|
||
12F0000
|
heap
|
page read and write
|
||
4EA0000
|
trusted library allocation
|
page read and write
|
||
3D1D000
|
direct allocation
|
page read and write
|
||
6858000
|
trusted library allocation
|
page read and write
|
||
6500000
|
heap
|
page read and write
|
||
CE5000
|
heap
|
page read and write
|
||
11A0000
|
heap
|
page read and write
|
||
641A000
|
trusted library allocation
|
page read and write
|
||
13CE000
|
stack
|
page read and write
|
||
66DE000
|
stack
|
page read and write
|
||
4E6DFE000
|
stack
|
page read and write
|
||
3F70000
|
direct allocation
|
page read and write
|
||
2E71000
|
trusted library allocation
|
page read and write
|
||
14D5000
|
heap
|
page read and write
|
||
1167000
|
trusted library allocation
|
page execute and read and write
|
||
F1A000
|
heap
|
page read and write
|
||
4099000
|
direct allocation
|
page read and write
|
||
6440000
|
trusted library allocation
|
page read and write
|
||
131B000
|
trusted library allocation
|
page execute and read and write
|
||
A20000
|
heap
|
page read and write
|
||
C74000
|
unkown
|
page readonly
|
||
3D19000
|
direct allocation
|
page read and write
|
||
52E2000
|
trusted library allocation
|
page read and write
|
||
3B73000
|
direct allocation
|
page read and write
|
||
1315000
|
trusted library allocation
|
page execute and read and write
|
||
6037000
|
heap
|
page read and write
|
||
160D42DC000
|
heap
|
page read and write
|
||
6860000
|
trusted library allocation
|
page execute and read and write
|
||
63FE000
|
stack
|
page read and write
|
||
3B73000
|
direct allocation
|
page read and write
|
||
665E000
|
stack
|
page read and write
|
||
2A40000
|
trusted library allocation
|
page read and write
|
||
1156000
|
trusted library allocation
|
page execute and read and write
|
||
4069000
|
direct allocation
|
page read and write
|
||
3F40000
|
direct allocation
|
page read and write
|
||
2F31000
|
trusted library allocation
|
page read and write
|
||
64B0000
|
trusted library allocation
|
page read and write
|
||
52D1000
|
trusted library allocation
|
page read and write
|
||
2E22000
|
trusted library allocation
|
page read and write
|
||
191F000
|
stack
|
page read and write
|
||
BB0000
|
unkown
|
page readonly
|
||
410E000
|
direct allocation
|
page read and write
|
||
F53000
|
heap
|
page read and write
|
||
114F000
|
stack
|
page read and write
|
||
361F000
|
stack
|
page read and write
|
||
2EF6000
|
trusted library allocation
|
page read and write
|
||
2BA5000
|
trusted library allocation
|
page read and write
|
||
6940000
|
heap
|
page read and write
|
||
12B6000
|
heap
|
page read and write
|
||
160D42DE000
|
heap
|
page read and write
|
||
E7E000
|
stack
|
page read and write
|
||
160D3F00000
|
heap
|
page read and write
|
||
17DE000
|
stack
|
page read and write
|
||
125A000
|
heap
|
page read and write
|
||
13A000
|
unkown
|
page write copy
|
||
4E66FE000
|
stack
|
page read and write
|
||
2E75000
|
trusted library allocation
|
page read and write
|
||
3F40000
|
direct allocation
|
page read and write
|
||
2FBD000
|
trusted library allocation
|
page read and write
|
||
2BF3000
|
trusted library allocation
|
page read and write
|
||
1611000
|
heap
|
page read and write
|
||
E68000
|
heap
|
page read and write
|
||
6880000
|
trusted library allocation
|
page execute and read and write
|
||
2FC7000
|
trusted library allocation
|
page read and write
|
||
C6A000
|
unkown
|
page read and write
|
||
D00000
|
heap
|
page read and write
|
||
F95000
|
heap
|
page read and write
|
||
2B69000
|
trusted library allocation
|
page read and write
|
||
167C000
|
heap
|
page read and write
|
||
148E000
|
stack
|
page read and write
|
||
6410000
|
trusted library allocation
|
page read and write
|
||
BB1000
|
unkown
|
page execute read
|
||
62BF000
|
stack
|
page read and write
|
||
533F000
|
trusted library allocation
|
page read and write
|
||
2EC9000
|
trusted library allocation
|
page read and write
|
||
3DA0000
|
direct allocation
|
page read and write
|
||
6840000
|
trusted library allocation
|
page read and write
|
||
1577000
|
heap
|
page read and write
|
||
2A1A000
|
trusted library allocation
|
page read and write
|
||
63A0000
|
heap
|
page read and write
|
||
115C000
|
heap
|
page read and write
|
||
F59000
|
heap
|
page execute and read and write
|
||
2A50000
|
heap
|
page execute and read and write
|
||
BB1000
|
unkown
|
page execute read
|
||
685B000
|
trusted library allocation
|
page read and write
|
||
3A50000
|
direct allocation
|
page read and write
|
||
52C2000
|
trusted library allocation
|
page read and write
|
||
1490000
|
heap
|
page read and write
|
||
C74000
|
unkown
|
page readonly
|
||
F1E000
|
heap
|
page read and write
|
||
687F000
|
trusted library allocation
|
page read and write
|
||
F5A000
|
heap
|
page read and write
|
||
3AFB000
|
trusted library allocation
|
page read and write
|
||
3D8E000
|
direct allocation
|
page read and write
|
||
2A0B000
|
trusted library allocation
|
page read and write
|
||
DCF000
|
stack
|
page read and write
|
||
2EC1000
|
trusted library allocation
|
page read and write
|
||
2A21000
|
trusted library allocation
|
page read and write
|
||
52BB000
|
trusted library allocation
|
page read and write
|
||
3D99000
|
trusted library allocation
|
page read and write
|
||
3D71000
|
trusted library allocation
|
page read and write
|
||
2BBD000
|
trusted library allocation
|
page read and write
|
||
3DF5000
|
trusted library allocation
|
page read and write
|
||
1A70000
|
heap
|
page read and write
|
||
74A000
|
stack
|
page read and write
|
||
639F000
|
stack
|
page read and write
|
||
52F3000
|
heap
|
page read and write
|
||
684A000
|
trusted library allocation
|
page read and write
|
||
1134000
|
trusted library allocation
|
page read and write
|
||
1208000
|
heap
|
page read and write
|
||
B7E000
|
stack
|
page read and write
|
||
1128000
|
heap
|
page read and write
|
||
40DE000
|
direct allocation
|
page read and write
|
There are 538 hidden memdumps, click here to show them.