Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
z56NF-Faturada-23042024.msi
|
Composite Document File V2 Document, Little Endian, Os: Windows, Version 10.0, MSI Installer, Security: 0, Code page: 1252,
Revision Number: {9B9B4B50-FADF-4D23-89DB-E711993CB95D}, Number of Words: 10, Subject: DaemonToolsPro, Author: Daemon Tools
Pro, Name of Creating Application: DaemonToolsPro, Template: ;1033, Comments: This installer database contains the logic and
data required to install DaemonToolsPro., Title: Installation Database, Keywords: Installer, MSI, Database, Create Time/Date:
Sat Apr 20 14:27:01 2024, Last Saved Time/Date: Sat Apr 20 14:27:01 2024, Last Printed: Sat Apr 20 14:27:01 2024, Number of
Pages: 450
|
initial sample
|
||
C:\Users\user\AppData\Roaming\DTCommonRes.dll
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Config.Msi\46a43c.rbs
|
data
|
modified
|
||
C:\Users\user\AppData\Roaming\FomsTudio .exe
|
PE32+ executable (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Windows\Installer\46a43a.msi
|
Composite Document File V2 Document, Little Endian, Os: Windows, Version 10.0, MSI Installer, Security: 0, Code page: 1252,
Revision Number: {9B9B4B50-FADF-4D23-89DB-E711993CB95D}, Number of Words: 10, Subject: DaemonToolsPro, Author: Daemon Tools
Pro, Name of Creating Application: DaemonToolsPro, Template: ;1033, Comments: This installer database contains the logic and
data required to install DaemonToolsPro., Title: Installation Database, Keywords: Installer, MSI, Database, Create Time/Date:
Sat Apr 20 14:27:01 2024, Last Saved Time/Date: Sat Apr 20 14:27:01 2024, Last Printed: Sat Apr 20 14:27:01 2024, Number of
Pages: 450
|
dropped
|
||
C:\Windows\Installer\MSIA573.tmp
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Windows\Installer\MSIA5F1.tmp
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Windows\Installer\MSIA620.tmp
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Windows\Installer\MSIA641.tmp
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Windows\Installer\MSIA690.tmp
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Windows\Installer\MSIA71D.tmp
|
data
|
dropped
|
||
C:\Windows\Installer\SourceHash{7CF68476-6C14-470A-B502-0AF87529D6C4}
|
Composite Document File V2 Document, Cannot read section info
|
dropped
|
||
C:\Windows\Installer\inprogressinstallinfo.ipi
|
Composite Document File V2 Document, Cannot read section info
|
dropped
|
||
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\ngen.log
|
Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
|
dropped
|
||
C:\Windows\Temp\~DF34F7AB5C439EFE8D.TMP
|
Composite Document File V2 Document, Cannot read section info
|
dropped
|
||
C:\Windows\Temp\~DF42FE5A672B0110E3.TMP
|
data
|
dropped
|
||
C:\Windows\Temp\~DF4E76FE9B182349A6.TMP
|
Composite Document File V2 Document, Cannot read section info
|
dropped
|
||
C:\Windows\Temp\~DF68384667919C48FC.TMP
|
data
|
dropped
|
||
C:\Windows\Temp\~DF6892E840199E0FC6.TMP
|
data
|
dropped
|
||
C:\Windows\Temp\~DF8DC66E98D8B05E2D.TMP
|
data
|
dropped
|
||
C:\Windows\Temp\~DF8FF182F2B9EDFE72.TMP
|
Composite Document File V2 Document, Cannot read section info
|
dropped
|
||
C:\Windows\Temp\~DF916064942B12AB8B.TMP
|
data
|
dropped
|
||
C:\Windows\Temp\~DFC5A88D1AF07560FE.TMP
|
data
|
dropped
|
||
C:\Windows\Temp\~DFCD723B255CBC27D9.TMP
|
Composite Document File V2 Document, Cannot read section info
|
dropped
|
||
C:\Windows\Temp\~DFE2B33A45B536F457.TMP
|
Composite Document File V2 Document, Cannot read section info
|
dropped
|
||
C:\Windows\Temp\~DFEB4DCF725B1B94B4.TMP
|
data
|
dropped
|
There are 16 hidden files, click here to show them.
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\AppData\Roaming\FomsTudio .exe
|
"C:\Users\user\AppData\Roaming\FomsTudio .exe"
|
||
C:\Windows\System32\msiexec.exe
|
"C:\Windows\System32\msiexec.exe" /i "C:\Users\user\Desktop\z56NF-Faturada-23042024.msi"
|
||
C:\Windows\System32\msiexec.exe
|
C:\Windows\system32\msiexec.exe /V
|
||
C:\Windows\SysWOW64\msiexec.exe
|
C:\Windows\syswow64\MsiExec.exe -Embedding 82AB0033A19E1EB01243E1439C0A5B64
|
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
https://i.pinimg.com/236x/5b/f8/1a/5bf81a501ab9d26db806e7fec4edfa75.jpgr
|
unknown
|
||
https://www.daemon-tools.cc/contacts/producttechnicalsupporthttps://www.daemon-tools.cc/account/seri
|
unknown
|
||
https://i.pinimg.com/236x/5b/f8/1a/5bf81a501ab9d26db806e7fec4edfa75.jpgp
|
unknown
|
||
https://pix.servebbs.com/a
|
unknown
|
||
https://rdcontra.com/clientes/index.phpA
|
unknown
|
||
https://pix.servebbs.com
|
unknown
|
||
https://pix.servebbs.com/sendlog.php
|
unknown
|
||
https://pix.servebbs.com/sendonline.phphttp
|
unknown
|
||
https://pix.servebbs.com/b
|
unknown
|
||
https://pix.servebbs.com/gs
|
unknown
|
||
https://i.pinimg.com/236x/5b/f8/1a/5bf81a501ab9d26db806e7fec4edfa75.jpgl
|
unknown
|
||
https://www.daemon-tools.cc/account/serials?email=%shttps://www.daemon-tools.cc/cart/set_upgrade?con
|
unknown
|
||
https://pix.servebbs.com:443/sendonline.php
|
unknown
|
||
https://pix.servebbs.com/k
|
unknown
|
||
https://pix.servebbs.com/m
|
unknown
|
||
https://pix.servebbs.com/v
|
unknown
|
||
https://ix.servebbs.com/senddata.phppp
|
unknown
|
||
https://pix.servebbs.com/w
|
unknown
|
||
https://rdcontra.com/clientes/index.php
|
191.6.209.225
|
||
https://www.daemon-tools.cc/contacts/producttechnicalsupport?&product=%s&os=%s&hwkey=%sonFindSpecial
|
unknown
|
||
https://i.pinimg.com/236x/5b/f8/1a/5bf81a501ab9d26db806e7fec4edfa75.jpg
|
151.101.12.84
|
||
https://pix.servebbs.com/sendonline.php
|
178.128.15.164
|
||
https://rdcontra.com/clientes/index.phpmO
|
unknown
|
||
https://www.daemon-tools.cc/cart/buy_check?abbr=%s&coupon_code=20off%s&system_key=%s&utm_source=%s&u
|
unknown
|
||
https://pix.servebbs.com/comX
|
unknown
|
||
https://pix.servebbs.com/sendonline.php-
|
unknown
|
||
https://pix.servebbs.com/B
|
unknown
|
||
https://pix.servebbs.com/com
|
unknown
|
||
https://pix.servebbs.com/E
|
unknown
|
||
https://pix.servebbs.com/donline.
|
unknown
|
||
https://pix.servebbs.com/Q
|
unknown
|
||
https://pix.servebbs.com/gsine.php
|
unknown
|
||
https://pix.servebbs.com/sendonline.php2
|
unknown
|
||
https://pix.servebbs.com/V
|
unknown
|
||
https://pix.servebbs.com:443/
|
unknown
|
||
https://pix.servebbs.com/R
|
unknown
|
||
https://pix.servebbs.com/
|
178.128.15.164
|
||
https://pix.servebbs.com/&
|
unknown
|
||
https://pix.servebbs.com/sendonline.phpA03;
|
unknown
|
||
https://pix.serv
|
unknown
|
||
https://pix.servebbs.com/fM
|
unknown
|
||
https://pix.servebbs.com/jpg
|
unknown
|
||
https://rdcontra.com/
|
unknown
|
||
https://pix.servebbs.com/.
|
unknown
|
||
https://pix.servebbs.com/senddata.php03;
|
unknown
|
||
https://pix.servebbs.com:443/ws
|
unknown
|
||
https://pix.servebbs.com/sendonl
|
unknown
|
||
https://pix.servebbs.com/2
|
unknown
|
||
https://pix.servebbs.com/sendonline.phpc
|
unknown
|
||
https://pix.servebbs.com/sendonline.phpebbs
|
unknown
|
||
https://i.pinimg.com/236x/5b/f8/1a/5bf81a501ab9d26db806e7fec4edfa75.jpgP
|
unknown
|
||
https://pix.servebbscom/
|
unknown
|
||
https://pix.servebbs.com:443/f
|
unknown
|
||
https://pix.servebbs.com/Pphp
|
unknown
|
||
https://pix.servebbs.com/senddataB.php
|
unknown
|
||
https://pix.servebbs.comq
|
unknown
|
||
https://www.daemon-tools.cc/account/serialsAdd
|
unknown
|
||
https://pix.servebbs.com/sendonline.phpy
|
unknown
|
There are 48 hidden URLs, click here to show them.
Domains
Name
|
IP
|
Malicious
|
|
---|---|---|---|
pix.servebbs.com
|
178.128.15.164
|
||
dualstack.pinterest.map.fastly.net
|
151.101.12.84
|
||
rdcontra.com
|
191.6.209.225
|
||
i.pinimg.com
|
unknown
|
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
178.128.15.164
|
pix.servebbs.com
|
Netherlands
|
||
151.101.12.84
|
dualstack.pinterest.map.fastly.net
|
United States
|
||
191.6.209.225
|
rdcontra.com
|
Brazil
|
Registry
Path
|
Value
|
Malicious
|
|
---|---|---|---|
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
|
Owner
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
|
SessionHash
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
|
Sequence
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\Folders
|
C:\Config.Msi\
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\Rollback\Scripts
|
C:\Config.Msi\46a43c.rbs
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\Rollback\Scripts
|
C:\Config.Msi\46a43c.rbsLow
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\Folders
|
C:\Users\user\AppData\Roaming\Microsoft\Installer\
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-21-2246122658-3693405117-2476756634-1002\Components\3CB28F16924C1634DB4E15C25BA5C054
|
67486FC741C6A0745B20A08F57926D4C
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-21-2246122658-3693405117-2476756634-1002\Components\81D5FA2980CB71E4DA56BA9BAC29F70C
|
67486FC741C6A0745B20A08F57926D4C
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-21-2246122658-3693405117-2476756634-1002\Components\3D9F9F883D04F91488E349689A01DAD5
|
67486FC741C6A0745B20A08F57926D4C
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-21-2246122658-3693405117-2476756634-1002\Components\4387993669AF29D4AA93C889D57DA013
|
67486FC741C6A0745B20A08F57926D4C
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-21-2246122658-3693405117-2476756634-1002\Components\5DFB1026E44FA28489E6330EA50CFA1B
|
67486FC741C6A0745B20A08F57926D4C
|
||
HKEY_CURRENT_USER\SOFTWARE\Daemon Tools Pro\DaemonToolsPro
|
Version
|
||
HKEY_CURRENT_USER\SOFTWARE\Daemon Tools Pro\DaemonToolsPro
|
Path
|
||
HKEY_CURRENT_USER_Classes\Local Settings\MuiCache\24\417C44EB
|
@%SystemRoot%\System32\ci.dll,-100
|
||
HKEY_CURRENT_USER_Classes\Local Settings\MuiCache\24\417C44EB
|
@%SystemRoot%\System32\ci.dll,-101
|
||
HKEY_CURRENT_USER_Classes\Local Settings\MuiCache\24\417C44EB
|
@%SystemRoot%\system32\dnsapi.dll,-103
|
||
HKEY_CURRENT_USER_Classes\Local Settings\MuiCache\24\417C44EB
|
@%SystemRoot%\System32\fveui.dll,-843
|
||
HKEY_CURRENT_USER_Classes\Local Settings\MuiCache\24\417C44EB
|
@%SystemRoot%\System32\fveui.dll,-844
|
||
HKEY_CURRENT_USER_Classes\Local Settings\MuiCache\24\417C44EB
|
@%SystemRoot%\System32\wuaueng.dll,-400
|
||
HKEY_CURRENT_USER_Classes\Local Settings\MuiCache\24\417C44EB
|
@%SystemRoot%\system32\WindowsPowerShell\v1.0\powershell.exe,-124
|
||
HKEY_CURRENT_USER_Classes\Local Settings\MuiCache\24\417C44EB
|
@%SystemRoot%\system32\NgcRecovery.dll,-100
|
There are 12 hidden registries, click here to show them.
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
26D88A0F000
|
heap
|
page read and write
|
||
26D8A327000
|
direct allocation
|
page read and write
|
||
26D88A15000
|
heap
|
page read and write
|
||
26D8C45C000
|
heap
|
page read and write
|
||
66687000
|
unkown
|
page write copy
|
||
26D8C451000
|
heap
|
page read and write
|
||
26D88A98000
|
heap
|
page read and write
|
||
7FC0CF9000
|
stack
|
page read and write
|
||
26D8C459000
|
heap
|
page read and write
|
||
26D8A2CB000
|
direct allocation
|
page read and write
|
||
26D8C3B9000
|
heap
|
page read and write
|
||
26D8C4B4000
|
trusted library allocation
|
page read and write
|
||
26D8C250000
|
heap
|
page read and write
|
||
26D8C456000
|
heap
|
page read and write
|
||
7FF60A250000
|
unkown
|
page readonly
|
||
26D88A98000
|
heap
|
page read and write
|
||
7FC04FA000
|
stack
|
page read and write
|
||
26D8C42E000
|
heap
|
page read and write
|
||
26D88A77000
|
heap
|
page read and write
|
||
26D88A4E000
|
heap
|
page read and write
|
||
26D8A34D000
|
direct allocation
|
page read and write
|
||
26D8C464000
|
heap
|
page read and write
|
||
26D88A80000
|
heap
|
page read and write
|
||
26D8C1D0000
|
heap
|
page read and write
|
||
26D88A80000
|
heap
|
page read and write
|
||
26D8A2EA000
|
direct allocation
|
page read and write
|
||
26D8C45E000
|
heap
|
page read and write
|
||
26D88A6A000
|
heap
|
page read and write
|
||
26D88A80000
|
heap
|
page read and write
|
||
26D8C41B000
|
heap
|
page read and write
|
||
26D8A373000
|
direct allocation
|
page read and write
|
||
26D88A4E000
|
heap
|
page read and write
|
||
26D8ADB0000
|
heap
|
page read and write
|
||
26D8C453000
|
heap
|
page read and write
|
||
26D8C458000
|
heap
|
page read and write
|
||
26D88A6E000
|
heap
|
page read and write
|
||
26D88A85000
|
heap
|
page read and write
|
||
26D88A66000
|
heap
|
page read and write
|
||
26D88A98000
|
heap
|
page read and write
|
||
66631000
|
unkown
|
page write copy
|
||
7FC0AFD000
|
stack
|
page read and write
|
||
26D8C430000
|
heap
|
page read and write
|
||
26D8C4B9000
|
trusted library allocation
|
page read and write
|
||
7FC0FFE000
|
stack
|
page read and write
|
||
66657000
|
unkown
|
page read and write
|
||
26D8A903000
|
heap
|
page read and write
|
||
666A2000
|
unkown
|
page write copy
|
||
26D88A9E000
|
heap
|
page read and write
|
||
26D88A98000
|
heap
|
page read and write
|
||
26D8A337000
|
direct allocation
|
page read and write
|
||
26D8AA10000
|
heap
|
page read and write
|
||
66650000
|
unkown
|
page read and write
|
||
26D88A85000
|
heap
|
page read and write
|
||
26D8C4B0000
|
trusted library allocation
|
page read and write
|
||
26D88A40000
|
heap
|
page read and write
|
||
6666E000
|
unkown
|
page write copy
|
||
666A9000
|
unkown
|
page readonly
|
||
66640000
|
unkown
|
page read and write
|
||
26D88A9E000
|
heap
|
page read and write
|
||
26D88A4E000
|
heap
|
page read and write
|
||
26D88A85000
|
heap
|
page read and write
|
||
7FF60A488000
|
unkown
|
page readonly
|
||
26D88A98000
|
heap
|
page read and write
|
||
26D8A2B7000
|
direct allocation
|
page read and write
|
||
26D8C4B6000
|
trusted library allocation
|
page read and write
|
||
26D8C40D000
|
heap
|
page read and write
|
||
26D8C1B0000
|
heap
|
page read and write
|
||
26D8A33E000
|
direct allocation
|
page read and write
|
||
26D8AB50000
|
heap
|
page read and write
|
||
26D8A354000
|
direct allocation
|
page read and write
|
||
26D88C70000
|
heap
|
page read and write
|
||
6664F000
|
unkown
|
page write copy
|
||
26D888D0000
|
heap
|
page read and write
|
||
6664B000
|
unkown
|
page read and write
|
||
26D88A2F000
|
heap
|
page read and write
|
||
26D8C40C000
|
heap
|
page read and write
|
||
666A8000
|
unkown
|
page write copy
|
||
7FF60A551000
|
unkown
|
page read and write
|
||
26D8C453000
|
heap
|
page read and write
|
||
26D8C255000
|
heap
|
page read and write
|
||
26D8C435000
|
heap
|
page read and write
|
||
26D88A80000
|
heap
|
page read and write
|
||
6663A000
|
unkown
|
page write copy
|
||
26D8A3BA000
|
direct allocation
|
page read and write
|
||
26D8A38F000
|
direct allocation
|
page read and write
|
||
66664000
|
unkown
|
page write copy
|
||
26D8C435000
|
heap
|
page read and write
|
||
66630000
|
unkown
|
page read and write
|
||
26D8C430000
|
heap
|
page read and write
|
||
26D88A9E000
|
heap
|
page read and write
|
||
26D88A80000
|
heap
|
page read and write
|
||
26D8A3AC000
|
direct allocation
|
page read and write
|
||
666A5000
|
unkown
|
page write copy
|
||
26D8C435000
|
heap
|
page read and write
|
||
26D8C451000
|
heap
|
page read and write
|
||
26D88A98000
|
heap
|
page read and write
|
||
26D88A50000
|
heap
|
page read and write
|
||
66641000
|
unkown
|
page write copy
|
||
66633000
|
unkown
|
page read and write
|
||
26D8C455000
|
heap
|
page read and write
|
||
26D8A345000
|
direct allocation
|
page read and write
|
||
26D8ABE0000
|
heap
|
page read and write
|
||
6668C000
|
unkown
|
page write copy
|
||
26D88A98000
|
heap
|
page read and write
|
||
26D88A98000
|
heap
|
page read and write
|
||
6664C000
|
unkown
|
page write copy
|
||
26D8C453000
|
heap
|
page read and write
|
||
66686000
|
unkown
|
page read and write
|
||
26D88A9E000
|
heap
|
page read and write
|
||
26D8AA55000
|
heap
|
page read and write
|
||
26D8C4B0000
|
trusted library allocation
|
page read and write
|
||
26D88A53000
|
heap
|
page read and write
|
||
7FF60A569000
|
unkown
|
page readonly
|
||
26D8C45A000
|
heap
|
page read and write
|
||
7FF60A569000
|
unkown
|
page readonly
|
||
26D8A309000
|
direct allocation
|
page read and write
|
||
26D8C406000
|
heap
|
page read and write
|
||
26D88A48000
|
heap
|
page read and write
|
||
7FF60A554000
|
unkown
|
page write copy
|
||
26D8A39D000
|
direct allocation
|
page read and write
|
||
26D8C489000
|
heap
|
page read and write
|
||
26D8C42F000
|
heap
|
page read and write
|
||
66698000
|
unkown
|
page read and write
|
||
26D88A72000
|
heap
|
page read and write
|
||
26D88A85000
|
heap
|
page read and write
|
||
26D8AB20000
|
heap
|
page read and write
|
||
26D8C453000
|
heap
|
page read and write
|
||
26D88A98000
|
heap
|
page read and write
|
||
26D8A9A0000
|
trusted library allocation
|
page read and write
|
||
26D8A37B000
|
direct allocation
|
page read and write
|
||
66654000
|
unkown
|
page read and write
|
||
26D88A77000
|
heap
|
page read and write
|
||
26D8C45E000
|
heap
|
page read and write
|
||
7FF60A5E7000
|
unkown
|
page readonly
|
||
26D88A50000
|
heap
|
page read and write
|
||
26D88A9E000
|
heap
|
page read and write
|
||
26D88C75000
|
heap
|
page read and write
|
||
26D8C40C000
|
heap
|
page read and write
|
||
26D8C41A000
|
heap
|
page read and write
|
||
66240000
|
unkown
|
page readonly
|
||
26D8C3B5000
|
heap
|
page read and write
|
||
26D8A900000
|
heap
|
page read and write
|
||
26D8A363000
|
direct allocation
|
page read and write
|
||
26D8A388000
|
direct allocation
|
page read and write
|
||
26D88A80000
|
heap
|
page read and write
|
||
66658000
|
unkown
|
page write copy
|
||
26D889A0000
|
heap
|
page read and write
|
||
26D8C4B5000
|
trusted library allocation
|
page read and write
|
||
26D8A301000
|
direct allocation
|
page read and write
|
||
26D8C460000
|
heap
|
page read and write
|
||
26D8C451000
|
heap
|
page read and write
|
||
26D8C500000
|
trusted library allocation
|
page read and write
|
||
26D88A79000
|
heap
|
page read and write
|
||
26D8AA50000
|
heap
|
page read and write
|
||
66241000
|
unkown
|
page execute read
|
||
26D88A98000
|
heap
|
page read and write
|
||
6668B000
|
unkown
|
page read and write
|
||
26D88A50000
|
heap
|
page read and write
|
||
7FC0DFF000
|
stack
|
page read and write
|
||
7FC0BFB000
|
stack
|
page read and write
|
||
6669A000
|
unkown
|
page read and write
|
||
26D8C4F0000
|
heap
|
page read and write
|
||
26D8C3A0000
|
heap
|
page read and write
|
||
26D88A18000
|
heap
|
page read and write
|
||
66694000
|
unkown
|
page read and write
|
||
26D8C451000
|
heap
|
page read and write
|
||
26D8C120000
|
remote allocation
|
page read and write
|
||
26D8A3B3000
|
direct allocation
|
page read and write
|
||
7FC0EFB000
|
stack
|
page read and write
|
||
26D88A4E000
|
heap
|
page read and write
|
||
6664D000
|
unkown
|
page read and write
|
||
26D88C30000
|
heap
|
page read and write
|
||
26D88A85000
|
heap
|
page read and write
|
||
26D8C460000
|
heap
|
page read and write
|
||
26D8C435000
|
heap
|
page read and write
|
||
666A7000
|
unkown
|
page read and write
|
||
7FC09FE000
|
stack
|
page read and write
|
||
26D8C459000
|
heap
|
page read and write
|
||
26D88A6F000
|
heap
|
page read and write
|
||
26D8AC20000
|
heap
|
page read and write
|
||
26D8C424000
|
heap
|
page read and write
|
||
26D8C457000
|
heap
|
page read and write
|
||
26D889BC000
|
heap
|
page read and write
|
||
26D8C466000
|
heap
|
page read and write
|
||
26D8A2DA000
|
direct allocation
|
page read and write
|
||
26D88A85000
|
heap
|
page read and write
|
||
26D88A9E000
|
heap
|
page read and write
|
||
6665F000
|
unkown
|
page read and write
|
||
26D88A6E000
|
heap
|
page read and write
|
||
26D88960000
|
direct allocation
|
page execute and read and write
|
||
26D8C41B000
|
heap
|
page read and write
|
||
26D88900000
|
heap
|
page read and write
|
||
26D8A9C0000
|
heap
|
page read and write
|
||
26D8C4B1000
|
trusted library allocation
|
page read and write
|
||
26D88A6E000
|
heap
|
page read and write
|
||
26D8C4B7000
|
trusted library allocation
|
page read and write
|
||
26D8C4B2000
|
trusted library allocation
|
page read and write
|
||
66651000
|
unkown
|
page write copy
|
||
26D8ABF0000
|
heap
|
page read and write
|
||
66663000
|
unkown
|
page read and write
|
||
26D8A319000
|
direct allocation
|
page read and write
|
||
26D88A80000
|
heap
|
page read and write
|
||
26D88A85000
|
heap
|
page read and write
|
||
666A3000
|
unkown
|
page read and write
|
||
26D8C3BD000
|
heap
|
page read and write
|
||
26D8ADA0000
|
heap
|
page read and write
|
||
26D8C466000
|
heap
|
page read and write
|
||
26D88A85000
|
heap
|
page read and write
|
||
26D88A11000
|
heap
|
page read and write
|
||
26D8C435000
|
heap
|
page read and write
|
||
26D8C100000
|
heap
|
page read and write
|
||
66659000
|
unkown
|
page read and write
|
||
7FF60A54F000
|
unkown
|
page write copy
|
||
26D8C45A000
|
heap
|
page read and write
|
||
7FF60A5A0000
|
unkown
|
page readonly
|
||
7FF60A54E000
|
unkown
|
page read and write
|
||
26D88A6F000
|
heap
|
page read and write
|
||
26D887F0000
|
heap
|
page read and write
|
||
26D8AA00000
|
heap
|
page read and write
|
||
26D8A396000
|
direct allocation
|
page read and write
|
||
26D88A72000
|
heap
|
page read and write
|
||
26D8C421000
|
heap
|
page read and write
|
||
26D8C42A000
|
heap
|
page read and write
|
||
66645000
|
unkown
|
page write copy
|
||
26D88A80000
|
heap
|
page read and write
|
||
26D8C3B0000
|
heap
|
page read and write
|
||
26D8C435000
|
heap
|
page read and write
|
||
26D88A6E000
|
heap
|
page read and write
|
||
26D8C464000
|
heap
|
page read and write
|
||
26D8A2D3000
|
direct allocation
|
page read and write
|
||
66268000
|
unkown
|
page execute read
|
||
26D8C120000
|
remote allocation
|
page read and write
|
||
7FF60A251000
|
unkown
|
page execute read
|
||
26D889D1000
|
heap
|
page read and write
|
||
26D8C42B000
|
heap
|
page read and write
|
||
26D8C455000
|
heap
|
page read and write
|
||
6665B000
|
unkown
|
page write copy
|
||
26D88A9E000
|
heap
|
page read and write
|
||
7FF60A5E7000
|
unkown
|
page readonly
|
||
66655000
|
unkown
|
page write copy
|
||
26D88A72000
|
heap
|
page read and write
|
||
26D88A9E000
|
heap
|
page read and write
|
||
26D88A6E000
|
heap
|
page read and write
|
||
26D8A2BD000
|
direct allocation
|
page read and write
|
||
26D88A80000
|
heap
|
page read and write
|
||
26D8A320000
|
direct allocation
|
page read and write
|
||
26D88A9E000
|
heap
|
page read and write
|
||
26D88A50000
|
heap
|
page read and write
|
||
26D8AB90000
|
heap
|
page read and write
|
||
26D88A40000
|
heap
|
page read and write
|
||
26D8C4B8000
|
trusted library allocation
|
page read and write
|
||
26D88A74000
|
heap
|
page read and write
|
||
26D8C451000
|
heap
|
page read and write
|
||
66644000
|
unkown
|
page read and write
|
||
26D8C8B0000
|
heap
|
page read and write
|
||
26D889DB000
|
heap
|
page read and write
|
||
26D8C453000
|
heap
|
page read and write
|
||
7FF60A564000
|
unkown
|
page read and write
|
||
26D8C45E000
|
heap
|
page read and write
|
||
6669F000
|
unkown
|
page read and write
|
||
7FF60A55D000
|
unkown
|
page read and write
|
||
26D8AA40000
|
heap
|
page read and write
|
||
26D8C422000
|
heap
|
page read and write
|
||
26D8C466000
|
heap
|
page read and write
|
||
26D8AAA0000
|
heap
|
page read and write
|
||
26D889A8000
|
heap
|
page read and write
|
||
7FF60A488000
|
unkown
|
page readonly
|
||
26D88A0C000
|
heap
|
page read and write
|
||
26D88A80000
|
heap
|
page read and write
|
||
26D88A85000
|
heap
|
page read and write
|
||
7FF60A250000
|
unkown
|
page readonly
|
||
26D8C4B3000
|
trusted library allocation
|
page read and write
|
||
26D8C409000
|
heap
|
page read and write
|
||
26D8C423000
|
heap
|
page read and write
|
||
26D88A9E000
|
heap
|
page read and write
|
||
7FC07E2000
|
stack
|
page read and write
|
||
66660000
|
unkown
|
page write copy
|
||
26D88A40000
|
heap
|
page read and write
|
||
26D8A2F2000
|
direct allocation
|
page read and write
|
||
7FF60A251000
|
unkown
|
page execute read
|
||
7FC08FE000
|
stack
|
page read and write
|
||
26D8C42B000
|
heap
|
page read and write
|
||
26D8C456000
|
heap
|
page read and write
|
||
26D88A41000
|
heap
|
page read and write
|
||
26D8C210000
|
heap
|
page read and write
|
||
26D8C424000
|
heap
|
page read and write
|
||
26D88A71000
|
heap
|
page read and write
|
||
26D8C460000
|
heap
|
page read and write
|
||
666AB000
|
unkown
|
page readonly
|
||
26D8A36C000
|
direct allocation
|
page read and write
|
||
26D8AD00000
|
heap
|
page read and write
|
||
26D8C421000
|
heap
|
page read and write
|
||
7FF60A54E000
|
unkown
|
page write copy
|
||
26D88A9E000
|
heap
|
page read and write
|
||
26D889E7000
|
heap
|
page read and write
|
||
26D8A3C1000
|
direct allocation
|
page read and write
|
||
26D88A72000
|
heap
|
page read and write
|
||
26D88A4E000
|
heap
|
page read and write
|
||
7FF60A5A0000
|
unkown
|
page readonly
|
||
26D88A85000
|
heap
|
page read and write
|
||
26D88A50000
|
heap
|
page read and write
|
||
26D8C120000
|
remote allocation
|
page read and write
|
||
26D88A1B000
|
heap
|
page read and write
|
There are 293 hidden memdumps, click here to show them.