Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
SecuriteInfo.com.W32.ABRisk.NJSZ-2550.30267.8823.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
initial sample
|
||
C:\Program Files\Bat To Exe Converter\Bat_To_Exe_Converter.exe (copy)
|
PE32+ executable (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Program Files\Bat To Exe Converter\is-48PVO.tmp
|
PE32+ executable (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Program Files\Bat To Exe Converter\is-54DM0.tmp
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Program Files\Bat To Exe Converter\unins000.dat
|
InnoSetup Log 64-bit Bat To Exe Converter {60C29EC2-33E8-45EE-87E4-31FA3E35C539}, version 0x418, 4039 bytes, 258555\37\user\376,
C:\Program Files\Bat To Exe Converter\376\
|
dropped
|
||
C:\Program Files\Bat To Exe Converter\unins000.exe (copy)
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Bat To Exe Converter\Bat To Exe Converter.lnk
|
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Archive,
ctime=Thu Apr 25 17:40:25 2024, mtime=Thu Apr 25 17:40:26 2024, atime=Tue Jul 30 08:54:40 2019, length=2105856, window=hide
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Bat To Exe Converter\Uninstall Bat To Exe Converter.lnk
|
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Archive,
ctime=Thu Apr 25 17:40:25 2024, mtime=Thu Apr 25 17:40:25 2024, atime=Thu Apr 25 17:39:56 2024, length=1202385, window=hide
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\is-6FOPC.tmp\SecuriteInfo.com.W32.ABRisk.NJSZ-2550.30267.8823.tmp
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\is-DVABN.tmp\_isetup\_setup64.tmp
|
PE32+ executable (console) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\Bat To Exe Converter\662566134.cmd
|
very short file (no magic)
|
dropped
|
||
C:\Users\user\AppData\Roaming\Bat To Exe Converter\867292396.bat
|
very short file (no magic)
|
dropped
|
||
C:\Users\user\AppData\Roaming\Bat To Exe Converter\GoLink.exe
|
PE32 executable (console) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\Bat To Exe Converter\GoRC.exe
|
PE32 executable (console) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\Bat To Exe Converter\Scilexer.dll
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\Bat To Exe Converter\extd.chm
|
MS Windows HtmlHelp Data
|
dropped
|
||
C:\Users\user\AppData\Roaming\Bat To Exe Converter\lng\??? (Japanese).lng
|
Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Roaming\Bat To Exe Converter\lng\??? (Korean).lng
|
Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Roaming\Bat To Exe Converter\lng\???? (Chinese Simplified).lng
|
Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Roaming\Bat To Exe Converter\lng\???? (Chinese Traditional).lng
|
Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Roaming\Bat To Exe Converter\lng\????? (Hebrew).lng
|
Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Roaming\Bat To Exe Converter\lng\??????? (Arabic).lng
|
Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Roaming\Bat To Exe Converter\lng\??????? (Russian).lng
|
Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Roaming\Bat To Exe Converter\lng\???????? (Greek).lng
|
Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Roaming\Bat To Exe Converter\lng\Ce tina (Czech).lng
|
Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Roaming\Bat To Exe Converter\lng\Espa ol (Spanish).lng
|
Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Roaming\Bat To Exe Converter\lng\Fran ais (French).lng
|
Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Roaming\Bat To Exe Converter\lng\Italiano (Italian).lng
|
Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Roaming\Bat To Exe Converter\lng\Magyar (Hungarian).lng
|
Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Roaming\Bat To Exe Converter\lng\Nederlands (Dutch).lng
|
Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Roaming\Bat To Exe Converter\lng\Portugu s Brasileiro (Portuguese Brazilian).lng
|
Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Roaming\Bat To Exe Converter\lng\Slovensk (Slovak).lng
|
Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Roaming\Bat To Exe Converter\lng\T rk e (Turkish).lng
|
Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Roaming\Bat To Exe Converter\upx.exe
|
PE32 executable (console) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed
|
dropped
|
There are 24 hidden files, click here to show them.
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Program Files\Bat To Exe Converter\Bat_To_Exe_Converter.exe
|
"C:\Program Files\Bat To Exe Converter\Bat_To_Exe_Converter.exe"
|
||
C:\Users\user\Desktop\SecuriteInfo.com.W32.ABRisk.NJSZ-2550.30267.8823.exe
|
"C:\Users\user\Desktop\SecuriteInfo.com.W32.ABRisk.NJSZ-2550.30267.8823.exe"
|
||
C:\Users\user\AppData\Local\Temp\is-6FOPC.tmp\SecuriteInfo.com.W32.ABRisk.NJSZ-2550.30267.8823.tmp
|
"C:\Users\user\AppData\Local\Temp\is-6FOPC.tmp\SecuriteInfo.com.W32.ABRisk.NJSZ-2550.30267.8823.tmp" /SL5="$20438,4092287,121344,C:\Users\user\Desktop\SecuriteInfo.com.W32.ABRisk.NJSZ-2550.30267.8823.exe"
|
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
http://www.innosetup.com/
|
unknown
|
||
https://upx.github.io/upx-license.htmlKonverterAltStyleGPL
|
unknown
|
||
http://www.godevtool.com/GolinkFrame.htm
|
unknown
|
||
http://127.0.0.1:43110/17SWVnHoujG92yYGSZvCzPgZEpGVfRF8wi/thttp://127.0.0.1:43110/17SWVnHoujG92yYGSZ
|
unknown
|
||
http://127.0.0.1:43110/17SWVnHoujG92yYGSZvCzPgZEpGVfRF8wi/Submit
|
unknown
|
||
http://www.jrsoftware.org/ishelp/index.php?topic=setupcmdlineSetupU
|
unknown
|
||
http://curl.haxx.se/docs/http-cookies.html#
|
unknown
|
||
https://github.com/99fkDokumenteLetzte
|
unknown
|
||
https://www.scintilla.org/
|
unknown
|
||
https://www.scintilla.org/License.txt
|
unknown
|
||
http://127.0.0.1:43110/17SWVnHoujG92yYGSZvCzPgZEpGVfRF8wi/
|
unknown
|
||
https://github.com/99fk
|
unknown
|
||
http://www.godevtool.com/GorcFrame.htmPrivateBuildprivatebuildInterner
|
unknown
|
||
http://www.f2ko.de/de/cmd.php
|
unknown
|
||
http://127.0.0.1:43110/17SWVnHoujG92yYGSZvCzPgZEpGVfRF8wi/D
|
unknown
|
||
https://upx.github.io
|
unknown
|
||
https://upx.github.ioEine
|
unknown
|
||
https://aka.ms/Vh5j3k
|
unknown
|
||
https://upx.github.io/upx-license.html
|
unknown
|
||
http://curl.haxx.se/docs/http-cookies.html
|
unknown
|
||
http://www.godevtool.com/GorcFrame.htm
|
unknown
|
||
https://aka.ms/odirm
|
unknown
|
||
http://www.f2ko.de/en/cmd.phpVideosJapanese
|
unknown
|
||
http://127.0.0.1:43110/17SWVnHoujG92yYGSZvCzPgZEpGVfRF8wi/q
|
unknown
|
||
http://www.f2ko.de/de/cmd.phpDatei
|
unknown
|
||
http://www.godevtool.com
|
unknown
|
||
http://127.0.0.1:43110/17SWVnHoujG92yYGSZvCzPgZEpGVfRF8wi//b2e/downloads/v.zip
|
unknown
|
||
https://www.scintilla.org/ArchitekturAM/fileversionCouldn
|
unknown
|
||
https://upx.github.ioT
|
unknown
|
||
http://www.remobjects.com/ps
|
unknown
|
||
https://www.scintilla.org/License.txtBat
|
unknown
|
||
http://www.godevtool.com/GolinkFrame.htm/display
|
unknown
|
||
http://www.f2ko.de/en/cmd.php
|
unknown
|
||
http://127.0.0.1:43110/17SWVnHoujG92yYGSZvCzPgZEpGVfRF8wi/a
|
unknown
|
||
http://www.godevtool.comProduktversionCMD
|
unknown
|
||
https://www.everaldo.com/
|
unknown
|
There are 26 hidden URLs, click here to show them.
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
127.0.0.1
|
unknown
|
unknown
|
Registry
Path
|
Value
|
Malicious
|
|
---|---|---|---|
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
|
Owner
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
|
SessionHash
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
|
Sequence
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
|
RegFiles0000
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
|
RegFilesHash
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{60C29EC2-33E8-45EE-87E4-31FA3E35C539}_is1
|
Inno Setup: Setup Version
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{60C29EC2-33E8-45EE-87E4-31FA3E35C539}_is1
|
Inno Setup: App Path
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{60C29EC2-33E8-45EE-87E4-31FA3E35C539}_is1
|
InstallLocation
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{60C29EC2-33E8-45EE-87E4-31FA3E35C539}_is1
|
Inno Setup: Icon Group
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{60C29EC2-33E8-45EE-87E4-31FA3E35C539}_is1
|
Inno Setup: User
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{60C29EC2-33E8-45EE-87E4-31FA3E35C539}_is1
|
Inno Setup: Selected Tasks
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{60C29EC2-33E8-45EE-87E4-31FA3E35C539}_is1
|
Inno Setup: Deselected Tasks
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{60C29EC2-33E8-45EE-87E4-31FA3E35C539}_is1
|
Inno Setup: Language
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{60C29EC2-33E8-45EE-87E4-31FA3E35C539}_is1
|
DisplayName
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{60C29EC2-33E8-45EE-87E4-31FA3E35C539}_is1
|
UninstallString
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{60C29EC2-33E8-45EE-87E4-31FA3E35C539}_is1
|
QuietUninstallString
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{60C29EC2-33E8-45EE-87E4-31FA3E35C539}_is1
|
DisplayVersion
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{60C29EC2-33E8-45EE-87E4-31FA3E35C539}_is1
|
Publisher
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{60C29EC2-33E8-45EE-87E4-31FA3E35C539}_is1
|
URLInfoAbout
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{60C29EC2-33E8-45EE-87E4-31FA3E35C539}_is1
|
HelpLink
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{60C29EC2-33E8-45EE-87E4-31FA3E35C539}_is1
|
URLUpdateInfo
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{60C29EC2-33E8-45EE-87E4-31FA3E35C539}_is1
|
NoModify
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{60C29EC2-33E8-45EE-87E4-31FA3E35C539}_is1
|
NoRepair
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{60C29EC2-33E8-45EE-87E4-31FA3E35C539}_is1
|
InstallDate
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{60C29EC2-33E8-45EE-87E4-31FA3E35C539}_is1
|
MajorVersion
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{60C29EC2-33E8-45EE-87E4-31FA3E35C539}_is1
|
MinorVersion
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{60C29EC2-33E8-45EE-87E4-31FA3E35C539}_is1
|
VersionMajor
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{60C29EC2-33E8-45EE-87E4-31FA3E35C539}_is1
|
VersionMinor
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{60C29EC2-33E8-45EE-87E4-31FA3E35C539}_is1
|
EstimatedSize
|
There are 19 hidden registries, click here to show them.
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
140042000
|
unkown
|
page execute and read and write
|
||
2F74000
|
heap
|
page read and write
|
||
A0E000
|
stack
|
page read and write
|
||
21A5000
|
direct allocation
|
page read and write
|
||
2F39000
|
heap
|
page read and write
|
||
23B9000
|
direct allocation
|
page read and write
|
||
2F56000
|
heap
|
page read and write
|
||
2FB8000
|
heap
|
page read and write
|
||
6C8000
|
heap
|
page read and write
|
||
2F9D000
|
heap
|
page read and write
|
||
5F20000
|
direct allocation
|
page read and write
|
||
2F43000
|
heap
|
page read and write
|
||
69D000
|
heap
|
page read and write
|
||
387E000
|
stack
|
page read and write
|
||
217A000
|
direct allocation
|
page read and write
|
||
2F25000
|
heap
|
page read and write
|
||
3601000
|
heap
|
page read and write
|
||
2EEB000
|
heap
|
page read and write
|
||
2F7F000
|
heap
|
page read and write
|
||
2FC3000
|
heap
|
page read and write
|
||
3501000
|
heap
|
page read and write
|
||
2EFE000
|
heap
|
page read and write
|
||
2F1C000
|
heap
|
page read and write
|
||
3211000
|
heap
|
page read and write
|
||
1403C3000
|
unkown
|
page execute and read and write
|
||
224C000
|
direct allocation
|
page read and write
|
||
2FB8000
|
heap
|
page read and write
|
||
2FA7000
|
heap
|
page read and write
|
||
19C000
|
stack
|
page read and write
|
||
2F93000
|
heap
|
page read and write
|
||
2F56000
|
heap
|
page read and write
|
||
506000
|
unkown
|
page read and write
|
||
2FB1000
|
heap
|
page read and write
|
||
2F6A000
|
heap
|
page read and write
|
||
31FD000
|
heap
|
page read and write
|
||
714000
|
heap
|
page read and write
|
||
22C5000
|
heap
|
page read and write
|
||
2990000
|
trusted library allocation
|
page read and write
|
||
3AC4000
|
heap
|
page read and write
|
||
6A9000
|
heap
|
page read and write
|
||
6BF000
|
heap
|
page read and write
|
||
6A1000
|
heap
|
page read and write
|
||
3A50000
|
heap
|
page read and write
|
||
34A0000
|
direct allocation
|
page read and write
|
||
233A000
|
direct allocation
|
page read and write
|
||
2173000
|
direct allocation
|
page read and write
|
||
24C2000
|
direct allocation
|
page read and write
|
||
2EDB000
|
heap
|
page read and write
|
||
62C000
|
heap
|
page read and write
|
||
3211000
|
heap
|
page read and write
|
||
2EE1000
|
heap
|
page read and write
|
||
2F9D000
|
heap
|
page read and write
|
||
2F7F000
|
heap
|
page read and write
|
||
14039A000
|
unkown
|
page execute and read and write
|
||
2FB8000
|
heap
|
page read and write
|
||
7FD20000
|
direct allocation
|
page read and write
|
||
2F4D000
|
heap
|
page read and write
|
||
5E6000
|
heap
|
page read and write
|
||
2382000
|
direct allocation
|
page read and write
|
||
5F71000
|
heap
|
page read and write
|
||
22A0000
|
heap
|
page read and write
|
||
2F7B000
|
heap
|
page read and write
|
||
674000
|
heap
|
page read and write
|
||
682000
|
heap
|
page read and write
|
||
320A000
|
heap
|
page read and write
|
||
2401000
|
direct allocation
|
page read and write
|
||
5770000
|
trusted library allocation
|
page read and write
|
||
7FE2E000
|
direct allocation
|
page read and write
|
||
2FC3000
|
heap
|
page read and write
|
||
2ED5000
|
heap
|
page read and write
|
||
502000
|
unkown
|
page write copy
|
||
630000
|
heap
|
page read and write
|
||
2FB9000
|
heap
|
page read and write
|
||
3ACD000
|
heap
|
page read and write
|
||
3190000
|
direct allocation
|
page read and write
|
||
2F12000
|
heap
|
page read and write
|
||
39E0000
|
heap
|
page read and write
|
||
6C7000
|
heap
|
page read and write
|
||
2FAE000
|
heap
|
page read and write
|
||
2F08000
|
heap
|
page read and write
|
||
3190000
|
direct allocation
|
page read and write
|
||
690000
|
heap
|
page read and write
|
||
2FB8000
|
heap
|
page read and write
|
||
693000
|
heap
|
page read and write
|
||
3200000
|
heap
|
page read and write
|
||
57E000
|
stack
|
page read and write
|
||
18E000
|
stack
|
page read and write
|
||
3200000
|
heap
|
page read and write
|
||
6A0000
|
heap
|
page read and write
|
||
2EF5000
|
heap
|
page read and write
|
||
2FBB000
|
heap
|
page read and write
|
||
2EDC000
|
heap
|
page read and write
|
||
31A0000
|
direct allocation
|
page read and write
|
||
2F7F000
|
heap
|
page read and write
|
||
2372000
|
direct allocation
|
page read and write
|
||
2FA4000
|
heap
|
page read and write
|
||
2268000
|
direct allocation
|
page read and write
|
||
3540000
|
heap
|
page read and write
|
||
253F000
|
heap
|
page read and write
|
||
2FA7000
|
heap
|
page read and write
|
||
2F9A000
|
heap
|
page read and write
|
||
2FB8000
|
heap
|
page read and write
|
||
2244000
|
direct allocation
|
page read and write
|
||
2F25000
|
heap
|
page read and write
|
||
6C2000
|
heap
|
page read and write
|
||
2181000
|
direct allocation
|
page read and write
|
||
2EDC000
|
heap
|
page read and write
|
||
23B2000
|
direct allocation
|
page read and write
|
||
2F90000
|
heap
|
page read and write
|
||
22B0000
|
heap
|
page read and write
|
||
2FBB000
|
heap
|
page read and write
|
||
231E000
|
direct allocation
|
page read and write
|
||
2FB8000
|
heap
|
page read and write
|
||
2F4D000
|
heap
|
page read and write
|
||
216B000
|
direct allocation
|
page read and write
|
||
2FB1000
|
heap
|
page read and write
|
||
2F56000
|
heap
|
page read and write
|
||
7FFDFF24A000
|
unkown
|
page readonly
|
||
2300000
|
direct allocation
|
page read and write
|
||
2FBB000
|
heap
|
page read and write
|
||
965000
|
heap
|
page read and write
|
||
22E3000
|
direct allocation
|
page read and write
|
||
2F6A000
|
heap
|
page read and write
|
||
65A000
|
heap
|
page read and write
|
||
2F9D000
|
heap
|
page read and write
|
||
648000
|
heap
|
page read and write
|
||
2FAE000
|
heap
|
page read and write
|
||
2F56000
|
heap
|
page read and write
|
||
678000
|
heap
|
page read and write
|
||
3214000
|
heap
|
page read and write
|
||
3214000
|
heap
|
page read and write
|
||
2FB1000
|
heap
|
page read and write
|
||
346F000
|
direct allocation
|
page read and write
|
||
2FA7000
|
heap
|
page read and write
|
||
2197000
|
direct allocation
|
page read and write
|
||
664000
|
heap
|
page read and write
|
||
2F7B000
|
heap
|
page read and write
|
||
2F9A000
|
heap
|
page read and write
|
||
3500000
|
heap
|
page read and write
|
||
2ED5000
|
heap
|
page read and write
|
||
3211000
|
heap
|
page read and write
|
||
674000
|
heap
|
page read and write
|
||
140000000
|
unkown
|
page readonly
|
||
2FBB000
|
heap
|
page read and write
|
||
3207000
|
heap
|
page read and write
|
||
2F89000
|
heap
|
page read and write
|
||
2FA4000
|
heap
|
page read and write
|
||
23EC000
|
direct allocation
|
page read and write
|
||
3207000
|
heap
|
page read and write
|
||
8F3000
|
heap
|
page read and write
|
||
716000
|
heap
|
page read and write
|
||
5BE000
|
stack
|
page read and write
|
||
4C0000
|
heap
|
page read and write
|
||
2FB1000
|
heap
|
page read and write
|
||
2FB8000
|
heap
|
page read and write
|
||
2F90000
|
heap
|
page read and write
|
||
2F89000
|
heap
|
page read and write
|
||
2FA7000
|
heap
|
page read and write
|
||
2EE2000
|
heap
|
page read and write
|
||
2F43000
|
heap
|
page read and write
|
||
321F000
|
heap
|
page read and write
|
||
7FFDFF1C1000
|
unkown
|
page execute read
|
||
2F8F000
|
heap
|
page read and write
|
||
51F000
|
unkown
|
page readonly
|
||
2FC3000
|
heap
|
page read and write
|
||
21C3000
|
direct allocation
|
page read and write
|
||
3200000
|
heap
|
page read and write
|
||
23FA000
|
direct allocation
|
page read and write
|
||
960000
|
heap
|
page read and write
|
||
2164000
|
direct allocation
|
page read and write
|
||
5D0000
|
heap
|
page read and write
|
||
2F60000
|
heap
|
page read and write
|
||
2FB1000
|
heap
|
page read and write
|
||
2F89000
|
heap
|
page read and write
|
||
2F89000
|
heap
|
page read and write
|
||
31FD000
|
heap
|
page read and write
|
||
2363000
|
direct allocation
|
page read and write
|
||
2FA7000
|
heap
|
page read and write
|
||
34AD000
|
direct allocation
|
page read and write
|
||
2FC3000
|
heap
|
page read and write
|
||
2F9D000
|
heap
|
page read and write
|
||
383F000
|
stack
|
page read and write
|
||
239C000
|
direct allocation
|
page read and write
|
||
3207000
|
heap
|
page read and write
|
||
320A000
|
heap
|
page read and write
|
||
2ED6000
|
heap
|
page read and write
|
||
2219000
|
direct allocation
|
page read and write
|
||
321F000
|
heap
|
page read and write
|
||
2FAE000
|
heap
|
page read and write
|
||
22F1000
|
direct allocation
|
page read and write
|
||
6AC000
|
heap
|
page read and write
|
||
8BF000
|
stack
|
page read and write
|
||
2FC3000
|
heap
|
page read and write
|
||
23F3000
|
direct allocation
|
page read and write
|
||
2F90000
|
heap
|
page read and write
|
||
3211000
|
heap
|
page read and write
|
||
34B6000
|
direct allocation
|
page read and write
|
||
2F2F000
|
heap
|
page read and write
|
||
4BE000
|
stack
|
page read and write
|
||
2F90000
|
heap
|
page read and write
|
||
2307000
|
direct allocation
|
page read and write
|
||
2317000
|
direct allocation
|
page read and write
|
||
320A000
|
heap
|
page read and write
|
||
22A6000
|
heap
|
page read and write
|
||
2FBB000
|
heap
|
page read and write
|
||
2FA4000
|
heap
|
page read and write
|
||
34C8000
|
direct allocation
|
page read and write
|
||
3600000
|
heap
|
page read and write
|
||
2F7B000
|
heap
|
page read and write
|
||
93000
|
stack
|
page read and write
|
||
2FB8000
|
heap
|
page read and write
|
||
2F90000
|
heap
|
page read and write
|
||
2FC3000
|
heap
|
page read and write
|
||
2FAF000
|
heap
|
page read and write
|
||
2F7B000
|
heap
|
page read and write
|
||
320A000
|
heap
|
page read and write
|
||
2ED5000
|
heap
|
page read and write
|
||
2FB1000
|
heap
|
page read and write
|
||
2F9D000
|
heap
|
page read and write
|
||
2F39000
|
heap
|
page read and write
|
||
28D0000
|
heap
|
page read and write
|
||
2F9A000
|
heap
|
page read and write
|
||
353C000
|
heap
|
page read and write
|
||
2FC3000
|
heap
|
page read and write
|
||
2F8E000
|
heap
|
page read and write
|
||
22B3000
|
heap
|
page read and write
|
||
2110000
|
heap
|
page read and write
|
||
2211000
|
direct allocation
|
page read and write
|
||
21C4000
|
heap
|
page read and write
|
||
2F7F000
|
heap
|
page read and write
|
||
2F89000
|
heap
|
page read and write
|
||
22D0000
|
direct allocation
|
page read and write
|
||
31E2000
|
heap
|
page read and write
|
||
2F9A000
|
heap
|
page read and write
|
||
3360000
|
direct allocation
|
page read and write
|
||
2395000
|
direct allocation
|
page read and write
|
||
66D000
|
heap
|
page read and write
|
||
8FE000
|
heap
|
page read and write
|
||
31F6000
|
heap
|
page read and write
|
||
5460000
|
heap
|
page read and write
|
||
502000
|
unkown
|
page read and write
|
||
140000000
|
unkown
|
page readonly
|
||
21C0000
|
heap
|
page read and write
|
||
2188000
|
direct allocation
|
page read and write
|
||
2FB1000
|
heap
|
page read and write
|
||
349E000
|
direct allocation
|
page read and write
|
||
2F74000
|
heap
|
page read and write
|
||
2208000
|
direct allocation
|
page read and write
|
||
2F9D000
|
heap
|
page read and write
|
||
23C0000
|
direct allocation
|
page read and write
|
||
2FC3000
|
heap
|
page read and write
|
||
223D000
|
direct allocation
|
page read and write
|
||
3207000
|
heap
|
page read and write
|
||
2201000
|
direct allocation
|
page read and write
|
||
2F1C000
|
heap
|
page read and write
|
||
671000
|
heap
|
page read and write
|
||
980000
|
heap
|
page read and write
|
||
222F000
|
direct allocation
|
page read and write
|
||
31F6000
|
heap
|
page read and write
|
||
2F93000
|
heap
|
page read and write
|
||
2FA7000
|
heap
|
page read and write
|
||
3350000
|
unkown
|
page read and write
|
||
687000
|
heap
|
page read and write
|
||
6C4000
|
heap
|
page read and write
|
||
2F9D000
|
heap
|
page read and write
|
||
2F60000
|
heap
|
page read and write
|
||
321F000
|
heap
|
page read and write
|
||
1403C7000
|
unkown
|
page read and write
|
||
2FB8000
|
heap
|
page read and write
|
||
5C6000
|
heap
|
page read and write
|
||
412000
|
unkown
|
page write copy
|
||
1403C5000
|
unkown
|
page execute and write copy
|
||
31FD000
|
heap
|
page read and write
|
||
23CF000
|
direct allocation
|
page read and write
|
||
2F4D000
|
heap
|
page read and write
|
||
21CA000
|
direct allocation
|
page read and write
|
||
2F25000
|
heap
|
page read and write
|
||
2FBB000
|
heap
|
page read and write
|
||
2F9D000
|
heap
|
page read and write
|
||
2F56000
|
heap
|
page read and write
|
||
2F8E000
|
heap
|
page read and write
|
||
353E000
|
heap
|
page read and write
|
||
2F9A000
|
heap
|
page read and write
|
||
2ADE000
|
stack
|
page read and write
|
||
2FBB000
|
heap
|
page read and write
|
||
6C0000
|
heap
|
page read and write
|
||
2FAE000
|
heap
|
page read and write
|
||
2F7B000
|
heap
|
page read and write
|
||
5EC000
|
heap
|
page read and write
|
||
321F000
|
heap
|
page read and write
|
||
2342000
|
direct allocation
|
page read and write
|
||
2EDC000
|
heap
|
page read and write
|
||
2FBB000
|
heap
|
page read and write
|
||
22C9000
|
heap
|
page read and write
|
||
6BB000
|
heap
|
page read and write
|
||
6070000
|
heap
|
page read and write
|
||
401000
|
unkown
|
page execute read
|
||
2F60000
|
heap
|
page read and write
|
||
2EFE000
|
heap
|
page read and write
|
||
31EC000
|
heap
|
page read and write
|
||
2F7F000
|
heap
|
page read and write
|
||
950000
|
heap
|
page read and write
|
||
51A000
|
unkown
|
page readonly
|
||
6AE000
|
heap
|
page read and write
|
||
2F9A000
|
heap
|
page read and write
|
||
2F08000
|
heap
|
page read and write
|
||
50D000
|
unkown
|
page write copy
|
||
50D000
|
unkown
|
page read and write
|
||
8F6000
|
heap
|
page read and write
|
||
2F9D000
|
heap
|
page read and write
|
||
2FBB000
|
heap
|
page read and write
|
||
2333000
|
direct allocation
|
page read and write
|
||
2FB1000
|
heap
|
page read and write
|
||
2522000
|
heap
|
page read and write
|
||
65B000
|
heap
|
page read and write
|
||
530000
|
heap
|
page read and write
|
||
6A1000
|
heap
|
page read and write
|
||
401000
|
unkown
|
page execute read
|
||
2F89000
|
heap
|
page read and write
|
||
21FA000
|
direct allocation
|
page read and write
|
||
6B1000
|
heap
|
page read and write
|
||
50A000
|
unkown
|
page read and write
|
||
419000
|
unkown
|
page write copy
|
||
353C000
|
heap
|
page read and write
|
||
2FB1000
|
heap
|
page read and write
|
||
2F74000
|
heap
|
page read and write
|
||
1C0000
|
heap
|
page read and write
|
||
2FA4000
|
heap
|
page read and write
|
||
5C0000
|
heap
|
page read and write
|
||
3214000
|
heap
|
page read and write
|
||
7FFDFF239000
|
unkown
|
page readonly
|
||
3C4F000
|
stack
|
page read and write
|
||
2F93000
|
heap
|
page read and write
|
||
2F60000
|
heap
|
page read and write
|
||
23E4000
|
direct allocation
|
page read and write
|
||
2FAE000
|
heap
|
page read and write
|
||
714000
|
heap
|
page read and write
|
||
2FBB000
|
heap
|
page read and write
|
||
23B0000
|
direct allocation
|
page read and write
|
||
21E5000
|
direct allocation
|
page read and write
|
||
2FC3000
|
heap
|
page read and write
|
||
2FC3000
|
heap
|
page read and write
|
||
2FA4000
|
heap
|
page read and write
|
||
2F39000
|
heap
|
page read and write
|
||
5E0000
|
heap
|
page read and write
|
||
3211000
|
heap
|
page read and write
|
||
2900000
|
heap
|
page read and write
|
||
2EDA000
|
heap
|
page read and write
|
||
2F89000
|
heap
|
page read and write
|
||
2236000
|
direct allocation
|
page read and write
|
||
68F000
|
heap
|
page read and write
|
||
2FAE000
|
heap
|
page read and write
|
||
70C000
|
heap
|
page read and write
|
||
2F12000
|
heap
|
page read and write
|
||
3AC6000
|
heap
|
page read and write
|
||
21B3000
|
direct allocation
|
page read and write
|
||
2FB1000
|
heap
|
page read and write
|
||
321B000
|
heap
|
page read and write
|
||
2F90000
|
heap
|
page read and write
|
||
24BA000
|
heap
|
page read and write
|
||
60A000
|
heap
|
page read and write
|
||
237B000
|
direct allocation
|
page read and write
|
||
2F90000
|
heap
|
page read and write
|
||
2408000
|
direct allocation
|
page read and write
|
||
2F4D000
|
heap
|
page read and write
|
||
3214000
|
heap
|
page read and write
|
||
400000
|
unkown
|
page readonly
|
||
2FAE000
|
heap
|
page read and write
|
||
2F39000
|
heap
|
page read and write
|
||
321F000
|
heap
|
page read and write
|
||
430000
|
heap
|
page read and write
|
||
2220000
|
direct allocation
|
page read and write
|
||
230E000
|
direct allocation
|
page read and write
|
||
321B000
|
heap
|
page read and write
|
||
5463000
|
heap
|
page read and write
|
||
348F000
|
direct allocation
|
page read and write
|
||
2253000
|
direct allocation
|
page read and write
|
||
2FA4000
|
heap
|
page read and write
|
||
2FB1000
|
heap
|
page read and write
|
||
321F000
|
heap
|
page read and write
|
||
31FD000
|
heap
|
page read and write
|
||
22A9000
|
heap
|
page read and write
|
||
2F90000
|
heap
|
page read and write
|
||
397F000
|
stack
|
page read and write
|
||
2FA4000
|
heap
|
page read and write
|
||
2F7F000
|
heap
|
page read and write
|
||
235B000
|
direct allocation
|
page read and write
|
||
3AC0000
|
heap
|
page read and write
|
||
2FC3000
|
heap
|
page read and write
|
||
2261000
|
direct allocation
|
page read and write
|
||
34A5000
|
direct allocation
|
page read and write
|
||
2F43000
|
heap
|
page read and write
|
||
34C0000
|
direct allocation
|
page read and write
|
||
140001000
|
unkown
|
page execute and read and write
|
||
21D1000
|
direct allocation
|
page read and write
|
||
2F7B000
|
heap
|
page read and write
|
||
2EDD000
|
heap
|
page read and write
|
||
238D000
|
direct allocation
|
page read and write
|
||
693000
|
heap
|
page read and write
|
||
5C7000
|
heap
|
page read and write
|
||
697000
|
heap
|
page read and write
|
||
2F9D000
|
heap
|
page read and write
|
||
2F74000
|
heap
|
page read and write
|
||
320A000
|
heap
|
page read and write
|
||
691000
|
heap
|
page read and write
|
||
500000
|
unkown
|
page execute read
|
||
2FA7000
|
heap
|
page read and write
|
||
1401E8000
|
unkown
|
page execute and write copy
|
||
39C0000
|
heap
|
page read and write
|
||
3B40000
|
heap
|
page read and write
|
||
2F7F000
|
heap
|
page read and write
|
||
90F000
|
stack
|
page read and write
|
||
2EE2000
|
heap
|
page read and write
|
||
2F2F000
|
heap
|
page read and write
|
||
2F93000
|
heap
|
page read and write
|
||
2F9A000
|
heap
|
page read and write
|
||
69A000
|
heap
|
page read and write
|
||
2FAE000
|
heap
|
page read and write
|
||
3200000
|
heap
|
page read and write
|
||
23C8000
|
direct allocation
|
page read and write
|
||
232C000
|
direct allocation
|
page read and write
|
||
41C000
|
unkown
|
page readonly
|
||
417000
|
unkown
|
page read and write
|
||
2EDC000
|
heap
|
page read and write
|
||
2FC3000
|
heap
|
page read and write
|
||
2EDC000
|
heap
|
page read and write
|
||
2F7B000
|
heap
|
page read and write
|
||
2FA7000
|
heap
|
page read and write
|
||
2F89000
|
heap
|
page read and write
|
||
2F9A000
|
heap
|
page read and write
|
||
24B8000
|
heap
|
page read and write
|
||
2F4D000
|
heap
|
page read and write
|
||
321B000
|
heap
|
page read and write
|
||
2F12000
|
heap
|
page read and write
|
||
2FC3000
|
heap
|
page read and write
|
||
2FC3000
|
heap
|
page read and write
|
||
24C6000
|
direct allocation
|
page read and write
|
||
513000
|
unkown
|
page readonly
|
||
2F6A000
|
heap
|
page read and write
|
||
2F89000
|
heap
|
page read and write
|
||
2F1C000
|
heap
|
page read and write
|
||
23B0000
|
direct allocation
|
page read and write
|
||
2F43000
|
heap
|
page read and write
|
||
2FC3000
|
heap
|
page read and write
|
||
6A4000
|
heap
|
page read and write
|
||
2FA4000
|
heap
|
page read and write
|
||
34D8000
|
direct allocation
|
page read and write
|
||
6A7000
|
heap
|
page read and write
|
||
2FB8000
|
heap
|
page read and write
|
||
2FB1000
|
heap
|
page read and write
|
||
2F25000
|
heap
|
page read and write
|
||
21AC000
|
direct allocation
|
page read and write
|
||
2F39000
|
heap
|
page read and write
|
||
31A0000
|
heap
|
page read and write
|
||
2F4D000
|
heap
|
page read and write
|
||
2F90000
|
heap
|
page read and write
|
||
2FB1000
|
heap
|
page read and write
|
||
685000
|
heap
|
page read and write
|
||
697000
|
heap
|
page read and write
|
||
2FA4000
|
heap
|
page read and write
|
||
2F74000
|
heap
|
page read and write
|
||
24EF000
|
heap
|
page read and write
|
||
3214000
|
heap
|
page read and write
|
||
25A0000
|
heap
|
page read and write
|
||
2230000
|
heap
|
page read and write
|
||
2522000
|
heap
|
page read and write
|
||
2FC3000
|
heap
|
page read and write
|
||
23AB000
|
direct allocation
|
page read and write
|
||
920000
|
heap
|
page read and write
|
||
2F60000
|
heap
|
page read and write
|
||
2F2F000
|
heap
|
page read and write
|
||
3C50000
|
heap
|
page read and write
|
||
2FB8000
|
heap
|
page read and write
|
||
2FAE000
|
heap
|
page read and write
|
||
21BC000
|
direct allocation
|
page read and write
|
||
693000
|
heap
|
page read and write
|
||
2FAE000
|
heap
|
page read and write
|
||
3207000
|
heap
|
page read and write
|
||
2F43000
|
heap
|
page read and write
|
||
31F6000
|
heap
|
page read and write
|
||
253F000
|
heap
|
page read and write
|
||
321B000
|
heap
|
page read and write
|
||
2FBB000
|
heap
|
page read and write
|
||
321F000
|
heap
|
page read and write
|
||
2F93000
|
heap
|
page read and write
|
||
674000
|
heap
|
page read and write
|
||
3B43000
|
heap
|
page read and write
|
||
2F93000
|
heap
|
page read and write
|
||
147000
|
stack
|
page read and write
|
||
2F9D000
|
heap
|
page read and write
|
||
2FAE000
|
heap
|
page read and write
|
||
2FA7000
|
heap
|
page read and write
|
||
2F90000
|
heap
|
page read and write
|
||
31EC000
|
heap
|
page read and write
|
||
2F93000
|
heap
|
page read and write
|
||
714000
|
heap
|
page read and write
|
||
219E000
|
direct allocation
|
page read and write
|
||
7FFDFF1C0000
|
unkown
|
page readonly
|
||
7FE32000
|
direct allocation
|
page read and write
|
||
23D6000
|
direct allocation
|
page read and write
|
||
373E000
|
stack
|
page read and write
|
||
253F000
|
heap
|
page read and write
|
||
22C0000
|
heap
|
page read and write
|
||
2F74000
|
heap
|
page read and write
|
||
2FAE000
|
heap
|
page read and write
|
||
2FA4000
|
heap
|
page read and write
|
||
2F9A000
|
heap
|
page read and write
|
||
2FBB000
|
heap
|
page read and write
|
||
2F7F000
|
heap
|
page read and write
|
||
24CE000
|
heap
|
page read and write
|
||
2F6A000
|
heap
|
page read and write
|
||
190000
|
heap
|
page read and write
|
||
2FA7000
|
heap
|
page read and write
|
||
2FC3000
|
heap
|
page read and write
|
||
2F7F000
|
heap
|
page read and write
|
||
2F9A000
|
heap
|
page read and write
|
||
2F6A000
|
heap
|
page read and write
|
||
66A000
|
heap
|
page read and write
|
||
2BDE000
|
stack
|
page read and write
|
||
9B000
|
stack
|
page read and write
|
||
2FB8000
|
heap
|
page read and write
|
||
2F6A000
|
heap
|
page read and write
|
||
2ED5000
|
heap
|
page read and write
|
||
2FC3000
|
heap
|
page read and write
|
||
2FA4000
|
heap
|
page read and write
|
||
2FA7000
|
heap
|
page read and write
|
||
2F7B000
|
heap
|
page read and write
|
||
6AE000
|
heap
|
page read and write
|
||
2F6A000
|
heap
|
page read and write
|
||
3214000
|
heap
|
page read and write
|
||
2FC3000
|
heap
|
page read and write
|
||
1A0000
|
heap
|
page read and write
|
||
8F0000
|
heap
|
page read and write
|
||
321B000
|
heap
|
page read and write
|
||
640000
|
heap
|
page read and write
|
||
2F93000
|
heap
|
page read and write
|
||
3A00000
|
heap
|
page read and write
|
||
218F000
|
direct allocation
|
page read and write
|
||
23DD000
|
direct allocation
|
page read and write
|
||
214C000
|
direct allocation
|
page read and write
|
||
321B000
|
heap
|
page read and write
|
||
2FA7000
|
heap
|
page read and write
|
||
2FBB000
|
heap
|
page read and write
|
||
2F74000
|
heap
|
page read and write
|
||
424000
|
unkown
|
page readonly
|
||
321B000
|
heap
|
page read and write
|
||
67C000
|
heap
|
page read and write
|
||
556F000
|
stack
|
page read and write
|
||
2F60000
|
heap
|
page read and write
|
||
2F93000
|
heap
|
page read and write
|
||
688000
|
heap
|
page read and write
|
||
6720000
|
heap
|
page read and write
|
||
2ED0000
|
heap
|
page read and write
|
||
1403C7000
|
unkown
|
page write copy
|
||
2F56000
|
heap
|
page read and write
|
||
225A000
|
direct allocation
|
page read and write
|
||
2325000
|
direct allocation
|
page read and write
|
||
400000
|
unkown
|
page readonly
|
||
68A000
|
heap
|
page read and write
|
||
2FB8000
|
heap
|
page read and write
|
||
576E000
|
stack
|
page read and write
|
||
2FC3000
|
heap
|
page read and write
|
||
22F8000
|
direct allocation
|
page read and write
|
||
2F2F000
|
heap
|
page read and write
|
||
6A9000
|
heap
|
page read and write
|
||
2F89000
|
heap
|
page read and write
|
||
2F9A000
|
heap
|
page read and write
|
||
2F7B000
|
heap
|
page read and write
|
||
412000
|
unkown
|
page read and write
|
||
31A0000
|
direct allocation
|
page read and write
|
||
2F74000
|
heap
|
page read and write
|
||
2F60000
|
heap
|
page read and write
|
||
661000
|
heap
|
page read and write
|
||
21EC000
|
direct allocation
|
page read and write
|
||
2F93000
|
heap
|
page read and write
|
||
7FFDFF244000
|
unkown
|
page read and write
|
||
22A0000
|
direct allocation
|
page execute and read and write
|
||
2F8E000
|
heap
|
page read and write
|
||
2F85000
|
heap
|
page read and write
|
||
2FBB000
|
heap
|
page read and write
|
There are 570 hidden memdumps, click here to show them.