Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
SecuriteInfo.com.Win32.SpywareX-gen.26133.21931.dll
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
initial sample
|
||
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_rundll32.exe_1cfbaf5ca3181558ae23b5af2bc325da778f0_7522e4b5_14134091-3833-4e2b-8109-25cb573f144c\Report.wer
|
Unicode text, UTF-16, little-endian text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_rundll32.exe_dbcb93d956ac28a5c3196766f9d12867aad21a0_7522e4b5_15e6224a-47ff-4b73-8f65-4223cf6f8bc8\Report.wer
|
Unicode text, UTF-16, little-endian text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_rundll32.exe_dbcb93d956ac28a5c3196766f9d12867aad21a0_7522e4b5_64b4cab0-55cb-4fcf-9c67-4f15a83827f1\Report.wer
|
Unicode text, UTF-16, little-endian text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WER8FDD.tmp.dmp
|
Mini DuMP crash report, 14 streams, Sat Apr 27 01:31:56 2024, 0x1205a4 type
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WER9099.tmp.WERInternalMetadata.xml
|
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WER90BA.tmp.xml
|
XML 1.0 document, ASCII text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WERB4DA.tmp.dmp
|
Mini DuMP crash report, 14 streams, Sat Apr 27 01:32:06 2024, 0x1205a4 type
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WERB547.tmp.dmp
|
Mini DuMP crash report, 14 streams, Sat Apr 27 01:32:06 2024, 0x1205a4 type
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WERB5E4.tmp.WERInternalMetadata.xml
|
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WERB614.tmp.xml
|
XML 1.0 document, ASCII text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WERB671.tmp.WERInternalMetadata.xml
|
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WERB6EF.tmp.xml
|
XML 1.0 document, ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\3D003UC5\0304PT[1].zip
|
ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Windows\appcompat\Programs\Amcache.hve
|
MS Windows registry file, NT/2000 or above
|
dropped
|
||
C:\vstatic\user
|
ASCII text, with CRLF line terminators
|
dropped
|
There are 6 hidden files, click here to show them.
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Windows\SysWOW64\rundll32.exe
|
rundll32.exe C:\Users\user\Desktop\SecuriteInfo.com.Win32.SpywareX-gen.26133.21931.dll,A
|
||
C:\Windows\SysWOW64\rundll32.exe
|
rundll32.exe "C:\Users\user\Desktop\SecuriteInfo.com.Win32.SpywareX-gen.26133.21931.dll",#1
|
||
C:\Windows\SysWOW64\rundll32.exe
|
rundll32.exe C:\Users\user\Desktop\SecuriteInfo.com.Win32.SpywareX-gen.26133.21931.dll,ABACULEJOTOTALISTRAZIUNTESNAGANNINIANAX
|
||
C:\Windows\SysWOW64\rundll32.exe
|
rundll32.exe C:\Users\user\Desktop\SecuriteInfo.com.Win32.SpywareX-gen.26133.21931.dll,B
|
||
C:\Windows\SysWOW64\rundll32.exe
|
rundll32.exe "C:\Users\user\Desktop\SecuriteInfo.com.Win32.SpywareX-gen.26133.21931.dll",A
|
||
C:\Windows\SysWOW64\rundll32.exe
|
rundll32.exe "C:\Users\user\Desktop\SecuriteInfo.com.Win32.SpywareX-gen.26133.21931.dll",ABACULEJOTOTALISTRAZIUNTESNAGANNINIANAX
|
||
C:\Windows\SysWOW64\rundll32.exe
|
rundll32.exe "C:\Users\user\Desktop\SecuriteInfo.com.Win32.SpywareX-gen.26133.21931.dll",B
|
||
C:\Windows\SysWOW64\rundll32.exe
|
rundll32.exe "C:\Users\user\Desktop\SecuriteInfo.com.Win32.SpywareX-gen.26133.21931.dll",dbkFCallWrapperAddr
|
||
C:\Windows\SysWOW64\rundll32.exe
|
rundll32.exe "C:\Users\user\Desktop\SecuriteInfo.com.Win32.SpywareX-gen.26133.21931.dll",__dbk_fcall_wrapper
|
||
C:\Windows\SysWOW64\rundll32.exe
|
rundll32.exe "C:\Users\user\Desktop\SecuriteInfo.com.Win32.SpywareX-gen.26133.21931.dll",TMethodImplementationIntercept
|
||
C:\Windows\SysWOW64\rundll32.exe
|
rundll32.exe "C:\Users\user\Desktop\SecuriteInfo.com.Win32.SpywareX-gen.26133.21931.dll",F
|
||
C:\Windows\SysWOW64\rundll32.exe
|
rundll32.exe "C:\Users\user\Desktop\SecuriteInfo.com.Win32.SpywareX-gen.26133.21931.dll",E
|
||
C:\Windows\SysWOW64\rundll32.exe
|
rundll32.exe "C:\Users\user\Desktop\SecuriteInfo.com.Win32.SpywareX-gen.26133.21931.dll",C
|
||
C:\Windows\System32\loaddll32.exe
|
loaddll32.exe "C:\Users\user\Desktop\SecuriteInfo.com.Win32.SpywareX-gen.26133.21931.dll"
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\SysWOW64\cmd.exe
|
cmd.exe /C rundll32.exe "C:\Users\user\Desktop\SecuriteInfo.com.Win32.SpywareX-gen.26133.21931.dll",#1
|
||
C:\Windows\SysWOW64\WerFault.exe
|
C:\Windows\SysWOW64\WerFault.exe -u -p 4284 -s 672
|
||
C:\Windows\SysWOW64\WerFault.exe
|
C:\Windows\SysWOW64\WerFault.exe -u -p 7512 -s 652
|
||
C:\Windows\SysWOW64\WerFault.exe
|
C:\Windows\SysWOW64\WerFault.exe -u -p 7496 -s 656
|
There are 9 hidden processes, click here to show them.
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
https://cld.pt/dl/download/5a0d8a94-236d-4a83-b1ba-16bf33ac459c/0304PT.zip?user-English
|
unknown
|
||
http://upx.sf.net
|
unknown
|
||
https://cld.pt/
|
unknown
|
||
https://cld.pt/dl/download/5a0d8a94-236d-4a83-b1ba-16bf33ac459c/0304PT.zip
|
unknown
|
||
https://cld.pt/dl/download/5a0d8a94-236d-4a83-b1ba-16bf33ac459c/0304PT.zip?user-English%20(United%2
|
unknown
|
||
https://cld.pt/dl/download/5a0d8a94-236d-4a83-b1ba-16bf33ac459c/0304PT.zip?user-English%20(United%20Kingdom)
|
213.13.26.154
|
Domains
Name
|
IP
|
Malicious
|
|
---|---|---|---|
cld.pt
|
213.13.26.154
|
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
213.13.26.154
|
cld.pt
|
Portugal
|
Registry
Path
|
Value
|
Malicious
|
|
---|---|---|---|
\REGISTRY\A\{ae12a8fd-a499-1504-76f2-5440e25c6385}\Root\InventoryApplicationFile\rundll32.exe|ccf370e740f0e788
|
ProgramId
|
||
\REGISTRY\A\{ae12a8fd-a499-1504-76f2-5440e25c6385}\Root\InventoryApplicationFile\rundll32.exe|ccf370e740f0e788
|
FileId
|
||
\REGISTRY\A\{ae12a8fd-a499-1504-76f2-5440e25c6385}\Root\InventoryApplicationFile\rundll32.exe|ccf370e740f0e788
|
LowerCaseLongPath
|
||
\REGISTRY\A\{ae12a8fd-a499-1504-76f2-5440e25c6385}\Root\InventoryApplicationFile\rundll32.exe|ccf370e740f0e788
|
LongPathHash
|
||
\REGISTRY\A\{ae12a8fd-a499-1504-76f2-5440e25c6385}\Root\InventoryApplicationFile\rundll32.exe|ccf370e740f0e788
|
Name
|
||
\REGISTRY\A\{ae12a8fd-a499-1504-76f2-5440e25c6385}\Root\InventoryApplicationFile\rundll32.exe|ccf370e740f0e788
|
OriginalFileName
|
||
\REGISTRY\A\{ae12a8fd-a499-1504-76f2-5440e25c6385}\Root\InventoryApplicationFile\rundll32.exe|ccf370e740f0e788
|
Publisher
|
||
\REGISTRY\A\{ae12a8fd-a499-1504-76f2-5440e25c6385}\Root\InventoryApplicationFile\rundll32.exe|ccf370e740f0e788
|
Version
|
||
\REGISTRY\A\{ae12a8fd-a499-1504-76f2-5440e25c6385}\Root\InventoryApplicationFile\rundll32.exe|ccf370e740f0e788
|
BinFileVersion
|
||
\REGISTRY\A\{ae12a8fd-a499-1504-76f2-5440e25c6385}\Root\InventoryApplicationFile\rundll32.exe|ccf370e740f0e788
|
BinaryType
|
||
\REGISTRY\A\{ae12a8fd-a499-1504-76f2-5440e25c6385}\Root\InventoryApplicationFile\rundll32.exe|ccf370e740f0e788
|
ProductName
|
||
\REGISTRY\A\{ae12a8fd-a499-1504-76f2-5440e25c6385}\Root\InventoryApplicationFile\rundll32.exe|ccf370e740f0e788
|
ProductVersion
|
||
\REGISTRY\A\{ae12a8fd-a499-1504-76f2-5440e25c6385}\Root\InventoryApplicationFile\rundll32.exe|ccf370e740f0e788
|
LinkDate
|
||
\REGISTRY\A\{ae12a8fd-a499-1504-76f2-5440e25c6385}\Root\InventoryApplicationFile\rundll32.exe|ccf370e740f0e788
|
BinProductVersion
|
||
\REGISTRY\A\{ae12a8fd-a499-1504-76f2-5440e25c6385}\Root\InventoryApplicationFile\rundll32.exe|ccf370e740f0e788
|
AppxPackageFullName
|
||
\REGISTRY\A\{ae12a8fd-a499-1504-76f2-5440e25c6385}\Root\InventoryApplicationFile\rundll32.exe|ccf370e740f0e788
|
AppxPackageRelativeId
|
||
\REGISTRY\A\{ae12a8fd-a499-1504-76f2-5440e25c6385}\Root\InventoryApplicationFile\rundll32.exe|ccf370e740f0e788
|
Size
|
||
\REGISTRY\A\{ae12a8fd-a499-1504-76f2-5440e25c6385}\Root\InventoryApplicationFile\rundll32.exe|ccf370e740f0e788
|
Language
|
||
\REGISTRY\A\{ae12a8fd-a499-1504-76f2-5440e25c6385}\Root\InventoryApplicationFile\rundll32.exe|ccf370e740f0e788
|
IsOsComponent
|
||
\REGISTRY\A\{ae12a8fd-a499-1504-76f2-5440e25c6385}\Root\InventoryApplicationFile\rundll32.exe|ccf370e740f0e788
|
Usn
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\IdentityCRL\ClockData
|
ClockTimeSeconds
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\IdentityCRL\ClockData
|
TickCount
|
There are 12 hidden registries, click here to show them.
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
42FF000
|
direct allocation
|
page read and write
|
||
288A000
|
heap
|
page read and write
|
||
2B40000
|
heap
|
page read and write
|
||
2B5E000
|
stack
|
page read and write
|
||
44CD000
|
direct allocation
|
page read and write
|
||
447F000
|
direct allocation
|
page read and write
|
||
4D26000
|
direct allocation
|
page read and write
|
||
6CD6A000
|
unkown
|
page readonly
|
||
2A7F000
|
stack
|
page read and write
|
||
2D3A000
|
stack
|
page read and write
|
||
4F78000
|
direct allocation
|
page read and write
|
||
2790000
|
heap
|
page read and write
|
||
29C0000
|
heap
|
page read and write
|
||
6CD50000
|
unkown
|
page read and write
|
||
4930000
|
trusted library allocation
|
page read and write
|
||
44A8000
|
direct allocation
|
page read and write
|
||
4B10000
|
direct allocation
|
page execute and read and write
|
||
29A0000
|
heap
|
page read and write
|
||
2820000
|
heap
|
page read and write
|
||
4B6E000
|
stack
|
page read and write
|
||
316A000
|
heap
|
page read and write
|
||
28A6000
|
heap
|
page read and write
|
||
4486000
|
direct allocation
|
page read and write
|
||
6CD4E000
|
unkown
|
page read and write
|
||
448B000
|
direct allocation
|
page read and write
|
||
4C3F000
|
direct allocation
|
page read and write
|
||
468A000
|
direct allocation
|
page read and write
|
||
4AD6000
|
direct allocation
|
page read and write
|
||
28C0000
|
heap
|
page read and write
|
||
6C7C1000
|
unkown
|
page execute read
|
||
4C44000
|
direct allocation
|
page read and write
|
||
4282000
|
direct allocation
|
page read and write
|
||
4F63000
|
direct allocation
|
page read and write
|
||
4499000
|
direct allocation
|
page read and write
|
||
432E000
|
stack
|
page read and write
|
||
4C22000
|
direct allocation
|
page read and write
|
||
6CD67000
|
unkown
|
page read and write
|
||
4691000
|
direct allocation
|
page read and write
|
||
2E94000
|
direct allocation
|
page read and write
|
||
2A5F000
|
stack
|
page read and write
|
||
4494000
|
direct allocation
|
page read and write
|
||
3430000
|
heap
|
page read and write
|
||
139E000
|
stack
|
page read and write
|
||
4AF3000
|
direct allocation
|
page read and write
|
||
6CD4E000
|
unkown
|
page read and write
|
||
4C78000
|
direct allocation
|
page read and write
|
||
2AEF000
|
stack
|
page read and write
|
||
2E74000
|
direct allocation
|
page read and write
|
||
2E3D000
|
heap
|
page read and write
|
||
1160000
|
heap
|
page read and write
|
||
27A0000
|
heap
|
page read and write
|
||
4B01000
|
direct allocation
|
page read and write
|
||
4F54000
|
heap
|
page read and write
|
||
444D000
|
direct allocation
|
page read and write
|
||
6CD59000
|
unkown
|
page write copy
|
||
4649000
|
direct allocation
|
page read and write
|
||
4C63000
|
direct allocation
|
page read and write
|
||
6C7C0000
|
unkown
|
page readonly
|
||
4ADD000
|
direct allocation
|
page read and write
|
||
4470000
|
direct allocation
|
page read and write
|
||
4430000
|
direct allocation
|
page read and write
|
||
45F0000
|
direct allocation
|
page read and write
|
||
432A000
|
direct allocation
|
page read and write
|
||
4B70000
|
heap
|
page read and write
|
||
4910000
|
heap
|
page read and write
|
||
580000
|
heap
|
page read and write
|
||
2EBF000
|
direct allocation
|
page read and write
|
||
43F8000
|
direct allocation
|
page read and write
|
||
34FF000
|
stack
|
page read and write
|
||
445B000
|
direct allocation
|
page read and write
|
||
6CD6A000
|
unkown
|
page readonly
|
||
4B10000
|
remote allocation
|
page read and write
|
||
6CD6A000
|
unkown
|
page readonly
|
||
4A27000
|
direct allocation
|
page read and write
|
||
4438000
|
direct allocation
|
page read and write
|
||
4330000
|
heap
|
page read and write
|
||
66C0000
|
trusted library allocation
|
page read and write
|
||
6CD5B000
|
unkown
|
page read and write
|
||
4F5C000
|
direct allocation
|
page read and write
|
||
2FA0000
|
direct allocation
|
page execute and read and write
|
||
446D000
|
direct allocation
|
page read and write
|
||
2E9B000
|
direct allocation
|
page read and write
|
||
4548000
|
direct allocation
|
page read and write
|
||
4A9E000
|
stack
|
page read and write
|
||
4C0B000
|
direct allocation
|
page read and write
|
||
4410000
|
direct allocation
|
page read and write
|
||
4462000
|
direct allocation
|
page read and write
|
||
6CD50000
|
unkown
|
page read and write
|
||
4C86000
|
direct allocation
|
page read and write
|
||
2C9F000
|
stack
|
page read and write
|
||
43B8000
|
direct allocation
|
page read and write
|
||
4F46000
|
direct allocation
|
page read and write
|
||
6CD68000
|
unkown
|
page readonly
|
||
44A0000
|
direct allocation
|
page read and write
|
||
4C4B000
|
direct allocation
|
page read and write
|
||
2B10000
|
heap
|
page read and write
|
||
29AA000
|
heap
|
page read and write
|
||
6CD53000
|
unkown
|
page write copy
|
||
58A000
|
stack
|
page read and write
|
||
6CD5B000
|
unkown
|
page read and write
|
||
6CD56000
|
unkown
|
page read and write
|
||
2DD0000
|
heap
|
page read and write
|
||
4F22000
|
direct allocation
|
page read and write
|
||
4C78000
|
direct allocation
|
page read and write
|
||
28E0000
|
heap
|
page read and write
|
||
2A3E000
|
stack
|
page read and write
|
||
443F000
|
direct allocation
|
page read and write
|
||
431C000
|
direct allocation
|
page read and write
|
||
2F0B000
|
stack
|
page read and write
|
||
4278000
|
direct allocation
|
page read and write
|
||
1140000
|
direct allocation
|
page execute and read and write
|
||
6CD5B000
|
unkown
|
page read and write
|
||
45A4000
|
direct allocation
|
page read and write
|
||
6C7C1000
|
unkown
|
page execute read
|
||
6CD59000
|
unkown
|
page write copy
|
||
4560000
|
heap
|
page read and write
|
||
6CD4F000
|
unkown
|
page write copy
|
||
4C70000
|
direct allocation
|
page read and write
|
||
6CD5B000
|
unkown
|
page read and write
|
||
2E37000
|
heap
|
page read and write
|
||
2E2A000
|
heap
|
page read and write
|
||
44B0000
|
direct allocation
|
page read and write
|
||
4469000
|
direct allocation
|
page read and write
|
||
585000
|
heap
|
page read and write
|
||
343E000
|
stack
|
page read and write
|
||
2965000
|
heap
|
page read and write
|
||
520000
|
heap
|
page read and write
|
||
4A31000
|
direct allocation
|
page read and write
|
||
2A7A000
|
heap
|
page read and write
|
||
51A0000
|
heap
|
page read and write
|
||
4A7D000
|
direct allocation
|
page read and write
|
||
6C7DE000
|
unkown
|
page execute read
|
||
28DA000
|
direct allocation
|
page read and write
|
||
2A1E000
|
stack
|
page read and write
|
||
2F50000
|
heap
|
page read and write
|
||
4314000
|
direct allocation
|
page read and write
|
||
54B000
|
stack
|
page read and write
|
||
3040000
|
heap
|
page read and write
|
||
29C5000
|
heap
|
page read and write
|
||
2EDC000
|
direct allocation
|
page read and write
|
||
2ADE000
|
stack
|
page read and write
|
||
287B000
|
direct allocation
|
page read and write
|
||
44AA000
|
direct allocation
|
page read and write
|
||
2EE3000
|
direct allocation
|
page read and write
|
||
280A000
|
heap
|
page read and write
|
||
2EC6000
|
direct allocation
|
page read and write
|
||
4428000
|
direct allocation
|
page read and write
|
||
42AD000
|
direct allocation
|
page read and write
|
||
4A84000
|
direct allocation
|
page read and write
|
||
2892000
|
direct allocation
|
page read and write
|
||
501E000
|
stack
|
page read and write
|
||
291D000
|
heap
|
page read and write
|
||
4331000
|
direct allocation
|
page read and write
|
||
317E000
|
stack
|
page read and write
|
||
2828000
|
direct allocation
|
page read and write
|
||
2EF8000
|
direct allocation
|
page read and write
|
||
45E2000
|
direct allocation
|
page read and write
|
||
10F0000
|
heap
|
page read and write
|
||
2A70000
|
heap
|
page read and write
|
||
304A000
|
heap
|
page read and write
|
||
272B000
|
stack
|
page read and write
|
||
2AF0000
|
direct allocation
|
page execute and read and write
|
||
4471000
|
direct allocation
|
page read and write
|
||
2AFB000
|
stack
|
page read and write
|
||
28E1000
|
direct allocation
|
page read and write
|
||
6C7DE000
|
unkown
|
page execute read
|
||
45B2000
|
direct allocation
|
page read and write
|
||
2E40000
|
heap
|
page read and write
|
||
2EF0000
|
heap
|
page read and write
|
||
6CD6A000
|
unkown
|
page readonly
|
||
3580000
|
heap
|
page read and write
|
||
6CD68000
|
unkown
|
page readonly
|
||
4478000
|
direct allocation
|
page read and write
|
||
48F0000
|
heap
|
page read and write
|
||
2884000
|
direct allocation
|
page read and write
|
||
6C7DE000
|
unkown
|
page execute read
|
||
28A1000
|
heap
|
page read and write
|
||
45C8000
|
direct allocation
|
page read and write
|
||
2810000
|
direct allocation
|
page execute and read and write
|
||
6CD4E000
|
unkown
|
page read and write
|
||
4AAB000
|
direct allocation
|
page read and write
|
||
29D0000
|
heap
|
page read and write
|
||
4C30000
|
direct allocation
|
page read and write
|
||
42F8000
|
direct allocation
|
page read and write
|
||
4A5E000
|
stack
|
page read and write
|
||
4338000
|
direct allocation
|
page read and write
|
||
323A000
|
heap
|
page read and write
|
||
44B8000
|
direct allocation
|
page read and write
|
||
29BE000
|
stack
|
page read and write
|
||
2CFB000
|
stack
|
page read and write
|
||
425F000
|
stack
|
page read and write
|
||
4A0F000
|
stack
|
page read and write
|
||
315A000
|
heap
|
page read and write
|
||
441F000
|
stack
|
page read and write
|
||
4608000
|
direct allocation
|
page read and write
|
||
4AFA000
|
direct allocation
|
page read and write
|
||
444B000
|
direct allocation
|
page read and write
|
||
4584000
|
direct allocation
|
page read and write
|
||
2A3E000
|
stack
|
page read and write
|
||
28C4000
|
direct allocation
|
page read and write
|
||
2B61000
|
heap
|
page read and write
|
||
45DD000
|
direct allocation
|
page read and write
|
||
4CE4000
|
direct allocation
|
page read and write
|
||
34BE000
|
stack
|
page read and write
|
||
2E33000
|
heap
|
page read and write
|
||
47F0000
|
heap
|
page read and write
|
||
4CD4000
|
direct allocation
|
page read and write
|
||
4C1B000
|
direct allocation
|
page read and write
|
||
3230000
|
heap
|
page read and write
|
||
4F29000
|
direct allocation
|
page read and write
|
||
28A0000
|
direct allocation
|
page read and write
|
||
4C10000
|
heap
|
page read and write
|
||
4674000
|
direct allocation
|
page read and write
|
||
28D3000
|
direct allocation
|
page read and write
|
||
2874000
|
direct allocation
|
page read and write
|
||
2EA9000
|
direct allocation
|
page read and write
|
||
303A000
|
stack
|
page read and write
|
||
291A000
|
heap
|
page read and write
|
||
3251000
|
heap
|
page read and write
|
||
6CD4F000
|
unkown
|
page write copy
|
||
44A2000
|
direct allocation
|
page read and write
|
||
4464000
|
direct allocation
|
page read and write
|
||
116B000
|
heap
|
page read and write
|
||
29F0000
|
heap
|
page read and write
|
||
4BED000
|
direct allocation
|
page read and write
|
||
3160000
|
heap
|
page read and write
|
||
4CB1000
|
direct allocation
|
page read and write
|
||
4C14000
|
direct allocation
|
page read and write
|
||
49C0000
|
heap
|
page read and write
|
||
4ACF000
|
direct allocation
|
page read and write
|
||
4F71000
|
direct allocation
|
page read and write
|
||
2FB5000
|
heap
|
page read and write
|
||
4463000
|
direct allocation
|
page read and write
|
||
6CD56000
|
unkown
|
page read and write
|
||
44AF000
|
direct allocation
|
page read and write
|
||
287B000
|
stack
|
page read and write
|
||
44F8000
|
direct allocation
|
page read and write
|
||
6CD60000
|
unkown
|
page read and write
|
||
45FA000
|
direct allocation
|
page read and write
|
||
2EF1000
|
direct allocation
|
page read and write
|
||
48B000
|
stack
|
page read and write
|
||
4980000
|
heap
|
page read and write
|
||
6CD5B000
|
unkown
|
page read and write
|
||
268F000
|
stack
|
page read and write
|
||
4EC2000
|
direct allocation
|
page read and write
|
||
4438000
|
direct allocation
|
page read and write
|
||
6CD4F000
|
unkown
|
page write copy
|
||
2B00000
|
heap
|
page read and write
|
||
4AC8000
|
direct allocation
|
page read and write
|
||
6CD53000
|
unkown
|
page write copy
|
||
2899000
|
direct allocation
|
page read and write
|
||
4C02000
|
direct allocation
|
page read and write
|
||
4C46000
|
direct allocation
|
page read and write
|
||
4D43000
|
direct allocation
|
page read and write
|
||
41DF000
|
stack
|
page read and write
|
||
6CD59000
|
unkown
|
page write copy
|
||
2D80000
|
direct allocation
|
page execute and read and write
|
||
2B70000
|
heap
|
page read and write
|
||
4C69000
|
direct allocation
|
page read and write
|
||
4C62000
|
direct allocation
|
page read and write
|
||
4D1F000
|
direct allocation
|
page read and write
|
||
4C3D000
|
direct allocation
|
page read and write
|
||
4624000
|
direct allocation
|
page read and write
|
||
4A52000
|
direct allocation
|
page read and write
|
||
28BD000
|
direct allocation
|
page read and write
|
||
463B000
|
direct allocation
|
page read and write
|
||
4F0B000
|
direct allocation
|
page read and write
|
||
3186000
|
heap
|
page read and write
|
||
44A3000
|
direct allocation
|
page read and write
|
||
4C6A000
|
direct allocation
|
page read and write
|
||
570000
|
heap
|
page read and write
|
||
2ABA000
|
heap
|
page read and write
|
||
3157000
|
heap
|
page read and write
|
||
6CD68000
|
unkown
|
page readonly
|
||
6CD65000
|
unkown
|
page write copy
|
||
4C98000
|
direct allocation
|
page read and write
|
||
42EF000
|
stack
|
page read and write
|
||
28C5000
|
heap
|
page read and write
|
||
4EB8000
|
direct allocation
|
page read and write
|
||
42E2000
|
direct allocation
|
page read and write
|
||
2E33000
|
heap
|
page read and write
|
||
1120000
|
heap
|
page read and write
|
||
4F04000
|
direct allocation
|
page read and write
|
||
490000
|
heap
|
page read and write
|
||
278F000
|
stack
|
page read and write
|
||
44C0000
|
heap
|
page read and write
|
||
28B0000
|
heap
|
page read and write
|
||
2E6D000
|
direct allocation
|
page read and write
|
||
4698000
|
direct allocation
|
page read and write
|
||
4A60000
|
direct allocation
|
page read and write
|
||
4F0000
|
heap
|
page read and write
|
||
2880000
|
heap
|
page read and write
|
||
2B30000
|
heap
|
page read and write
|
||
44A9000
|
direct allocation
|
page read and write
|
||
4B30000
|
heap
|
page read and write
|
||
44E3000
|
direct allocation
|
page read and write
|
||
4C94000
|
direct allocation
|
page read and write
|
||
2DA0000
|
heap
|
page read and write
|
||
4A8D000
|
direct allocation
|
page read and write
|
||
3020000
|
direct allocation
|
page execute and read and write
|
||
330A000
|
heap
|
page read and write
|
||
4A9B000
|
direct allocation
|
page read and write
|
||
4C54000
|
direct allocation
|
page read and write
|
||
25D0000
|
heap
|
page read and write
|
||
4658000
|
direct allocation
|
page read and write
|
||
4770000
|
heap
|
page read and write
|
||
6C7C0000
|
unkown
|
page readonly
|
||
44EA000
|
direct allocation
|
page read and write
|
||
4414000
|
direct allocation
|
page read and write
|
||
6C7C0000
|
unkown
|
page readonly
|
||
51F0000
|
heap
|
page read and write
|
||
45EC000
|
direct allocation
|
page read and write
|
||
3300000
|
heap
|
page read and write
|
||
459B000
|
direct allocation
|
page read and write
|
||
4D58000
|
direct allocation
|
page read and write
|
||
4306000
|
direct allocation
|
page read and write
|
||
2840000
|
heap
|
page read and write
|
||
2D1F000
|
stack
|
page read and write
|
||
42B4000
|
direct allocation
|
page read and write
|
||
3181000
|
heap
|
page read and write
|
||
447B000
|
direct allocation
|
page read and write
|
||
28AA000
|
heap
|
page read and write
|
||
2B9B000
|
stack
|
page read and write
|
||
440B000
|
direct allocation
|
page read and write
|
||
4492000
|
direct allocation
|
page read and write
|
||
4BF8000
|
direct allocation
|
page read and write
|
||
500000
|
heap
|
page read and write
|
||
44C4000
|
direct allocation
|
page read and write
|
||
287B000
|
stack
|
page read and write
|
||
4560000
|
direct allocation
|
page read and write
|
||
6CD56000
|
unkown
|
page read and write
|
||
42CB000
|
direct allocation
|
page read and write
|
||
4454000
|
direct allocation
|
page read and write
|
||
6CD67000
|
unkown
|
page read and write
|
||
2E50000
|
heap
|
page read and write
|
||
48FD000
|
stack
|
page read and write
|
||
2864000
|
direct allocation
|
page read and write
|
||
2D80000
|
heap
|
page read and write
|
||
1140000
|
heap
|
page read and write
|
||
4450000
|
direct allocation
|
page read and write
|
||
442D000
|
direct allocation
|
page read and write
|
||
264E000
|
stack
|
page read and write
|
||
4EF4000
|
direct allocation
|
page read and write
|
||
6CD4F000
|
unkown
|
page write copy
|
||
1177000
|
heap
|
page read and write
|
||
6CD50000
|
unkown
|
page read and write
|
||
2740000
|
heap
|
page read and write
|
||
6C7C1000
|
unkown
|
page execute read
|
||
4650000
|
direct allocation
|
page read and write
|
||
2830000
|
heap
|
page read and write
|
||
4B4E000
|
stack
|
page read and write
|
||
4B20000
|
heap
|
page read and write
|
||
4980000
|
heap
|
page read and write
|
||
46A0000
|
heap
|
page read and write
|
||
2E8B000
|
direct allocation
|
page read and write
|
||
43D0000
|
direct allocation
|
page read and write
|
||
4D0000
|
heap
|
page read and write
|
||
466D000
|
direct allocation
|
page read and write
|
||
4F6A000
|
direct allocation
|
page read and write
|
||
6CD56000
|
unkown
|
page read and write
|
||
2ECE000
|
stack
|
page read and write
|
||
2A50000
|
direct allocation
|
page execute and read and write
|
||
4C7F000
|
direct allocation
|
page read and write
|
||
6CD67000
|
unkown
|
page read and write
|
||
4601000
|
direct allocation
|
page read and write
|
||
4474000
|
direct allocation
|
page read and write
|
||
457D000
|
direct allocation
|
page read and write
|
||
2D3C000
|
stack
|
page read and write
|
||
4C4D000
|
direct allocation
|
page read and write
|
||
4D3C000
|
direct allocation
|
page read and write
|
||
4900000
|
heap
|
page read and write
|
||
4B08000
|
direct allocation
|
page read and write
|
||
4454000
|
direct allocation
|
page read and write
|
||
2EA2000
|
direct allocation
|
page read and write
|
||
4BF4000
|
direct allocation
|
page read and write
|
||
285D000
|
direct allocation
|
page read and write
|
||
497E000
|
stack
|
page read and write
|
||
4AB2000
|
direct allocation
|
page read and write
|
||
4CAA000
|
direct allocation
|
page read and write
|
||
DAB000
|
stack
|
page read and write
|
||
4C5B000
|
direct allocation
|
page read and write
|
||
4474000
|
direct allocation
|
page read and write
|
||
6CD59000
|
unkown
|
page write copy
|
||
4BE0000
|
heap
|
page read and write
|
||
446A000
|
direct allocation
|
page read and write
|
||
2CDE000
|
stack
|
page read and write
|
||
2ECD000
|
direct allocation
|
page read and write
|
||
44D4000
|
direct allocation
|
page read and write
|
||
347E000
|
stack
|
page read and write
|
||
6CD50000
|
unkown
|
page read and write
|
||
4484000
|
direct allocation
|
page read and write
|
||
2990000
|
heap
|
page read and write
|
||
445D000
|
direct allocation
|
page read and write
|
||
283B000
|
stack
|
page read and write
|
||
43A0000
|
heap
|
page read and write
|
||
2ECB000
|
stack
|
page read and write
|
||
30F0000
|
heap
|
page read and write
|
||
270E000
|
stack
|
page read and write
|
||
6CD53000
|
unkown
|
page write copy
|
||
4A9F000
|
stack
|
page read and write
|
||
4446000
|
direct allocation
|
page read and write
|
||
28A0000
|
heap
|
page read and write
|
||
3220000
|
heap
|
page read and write
|
||
28AF000
|
direct allocation
|
page read and write
|
||
6C7DE000
|
unkown
|
page execute read
|
||
45D8000
|
direct allocation
|
page read and write
|
||
2AE0000
|
heap
|
page read and write
|
||
283B000
|
stack
|
page read and write
|
||
2AD0000
|
direct allocation
|
page execute and read and write
|
||
48BD000
|
stack
|
page read and write
|
||
6C7C0000
|
unkown
|
page readonly
|
||
2904000
|
heap
|
page read and write
|
||
43ED000
|
direct allocation
|
page read and write
|
||
2910000
|
heap
|
page read and write
|
||
2E84000
|
direct allocation
|
page read and write
|
||
2BD0000
|
heap
|
page read and write
|
||
6C7C1000
|
unkown
|
page execute read
|
||
2E3A000
|
heap
|
page read and write
|
||
6CD4E000
|
unkown
|
page read and write
|
||
6CD60000
|
unkown
|
page read and write
|
||
4BAF000
|
stack
|
page read and write
|
||
4BD0000
|
direct allocation
|
page read and write
|
||
288B000
|
direct allocation
|
page read and write
|
||
2E50000
|
direct allocation
|
page read and write
|
||
2820000
|
heap
|
page read and write
|
||
2E00000
|
heap
|
page read and write
|
||
45CF000
|
direct allocation
|
page read and write
|
||
6C7C0000
|
unkown
|
page readonly
|
||
449C000
|
direct allocation
|
page read and write
|
||
493D000
|
stack
|
page read and write
|
||
4F30000
|
direct allocation
|
page read and write
|
||
26B0000
|
heap
|
page read and write
|
||
31FE000
|
stack
|
page read and write
|
||
4429000
|
direct allocation
|
page read and write
|
||
42E9000
|
direct allocation
|
page read and write
|
||
4B10000
|
remote allocation
|
page read and write
|
||
3290000
|
heap
|
page read and write
|
||
4C34000
|
direct allocation
|
page read and write
|
||
44DC000
|
direct allocation
|
page read and write
|
||
4D2D000
|
direct allocation
|
page read and write
|
||
26EB000
|
stack
|
page read and write
|
||
441B000
|
direct allocation
|
page read and write
|
||
6CD53000
|
unkown
|
page write copy
|
||
2E34000
|
heap
|
page read and write
|
||
449B000
|
direct allocation
|
page read and write
|
||
2B4A000
|
heap
|
page read and write
|
||
4B8F000
|
stack
|
page read and write
|
||
4444000
|
direct allocation
|
page read and write
|
||
CAB000
|
stack
|
page read and write
|
||
129E000
|
stack
|
page read and write
|
||
6CD59000
|
unkown
|
page write copy
|
||
2B66000
|
heap
|
page read and write
|
||
436F000
|
stack
|
page read and write
|
||
2AB0000
|
heap
|
page read and write
|
||
4A94000
|
direct allocation
|
page read and write
|
||
2F80000
|
heap
|
page read and write
|
||
4614000
|
direct allocation
|
page read and write
|
||
4F50000
|
heap
|
page read and write
|
||
4CB0000
|
direct allocation
|
page read and write
|
||
42DB000
|
direct allocation
|
page read and write
|
||
6CD65000
|
unkown
|
page write copy
|
||
45B9000
|
direct allocation
|
page read and write
|
||
4494000
|
direct allocation
|
page read and write
|
||
4940000
|
trusted library allocation
|
page read and write
|
||
4CF4000
|
direct allocation
|
page read and write
|
||
47B000
|
stack
|
page read and write
|
||
44C6000
|
direct allocation
|
page read and write
|
||
4CB8000
|
direct allocation
|
page read and write
|
||
6CD68000
|
unkown
|
page readonly
|
||
2DA0000
|
heap
|
page read and write
|
||
44B6000
|
direct allocation
|
page read and write
|
||
6CD67000
|
unkown
|
page read and write
|
||
42F0000
|
direct allocation
|
page read and write
|
||
28A8000
|
direct allocation
|
page read and write
|
||
4640000
|
heap
|
page read and write
|
||
4F1B000
|
direct allocation
|
page read and write
|
||
31BF000
|
stack
|
page read and write
|
||
6CD53000
|
unkown
|
page write copy
|
||
4ED0000
|
direct allocation
|
page read and write
|
||
3150000
|
heap
|
page read and write
|
||
4D4A000
|
direct allocation
|
page read and write
|
||
13DD000
|
stack
|
page read and write
|
||
6CD65000
|
unkown
|
page write copy
|
||
32E0000
|
direct allocation
|
page execute and read and write
|
||
1125000
|
heap
|
page read and write
|
||
4323000
|
direct allocation
|
page read and write
|
||
4D02000
|
direct allocation
|
page read and write
|
||
4C04000
|
direct allocation
|
page read and write
|
||
44B000
|
stack
|
page read and write
|
||
4E30000
|
heap
|
page read and write
|
||
2ACE000
|
stack
|
page read and write
|
||
2E37000
|
heap
|
page read and write
|
||
6CD50000
|
unkown
|
page read and write
|
||
2710000
|
direct allocation
|
page execute and read and write
|
||
453F000
|
stack
|
page read and write
|
||
460D000
|
direct allocation
|
page read and write
|
||
42C4000
|
direct allocation
|
page read and write
|
||
4AEC000
|
direct allocation
|
page read and write
|
||
4C10000
|
direct allocation
|
page read and write
|
||
283B000
|
stack
|
page read and write
|
||
4AC0000
|
direct allocation
|
page read and write
|
||
4AB9000
|
direct allocation
|
page read and write
|
||
4CCD000
|
direct allocation
|
page read and write
|
||
4D10000
|
direct allocation
|
page read and write
|
||
6CD67000
|
unkown
|
page read and write
|
||
4D51000
|
direct allocation
|
page read and write
|
||
42B000
|
stack
|
page read and write
|
||
4C29000
|
direct allocation
|
page read and write
|
||
4478000
|
direct allocation
|
page read and write
|
||
4D34000
|
direct allocation
|
page read and write
|
||
4B10000
|
remote allocation
|
page read and write
|
||
2840000
|
direct allocation
|
page read and write
|
||
44B8000
|
direct allocation
|
page read and write
|
||
421E000
|
stack
|
page read and write
|
||
2EB8000
|
direct allocation
|
page read and write
|
||
4EED000
|
direct allocation
|
page read and write
|
||
2960000
|
heap
|
page read and write
|
||
32D0000
|
heap
|
page read and write
|
||
6C7DE000
|
unkown
|
page execute read
|
||
430D000
|
direct allocation
|
page read and write
|
||
4A67000
|
direct allocation
|
page read and write
|
||
2810000
|
heap
|
page read and write
|
||
4404000
|
direct allocation
|
page read and write
|
||
4C9C000
|
direct allocation
|
page read and write
|
||
3080000
|
heap
|
page read and write
|
||
2E34000
|
heap
|
page read and write
|
||
4AE4000
|
direct allocation
|
page read and write
|
||
4CEB000
|
direct allocation
|
page read and write
|
||
2AE0000
|
direct allocation
|
page execute and read and write
|
||
4F4D000
|
direct allocation
|
page read and write
|
||
2DB0000
|
heap
|
page read and write
|
||
29C0000
|
heap
|
page read and write
|
||
2E3A000
|
heap
|
page read and write
|
||
4C8D000
|
direct allocation
|
page read and write
|
||
28B6000
|
direct allocation
|
page read and write
|
||
2920000
|
heap
|
page read and write
|
||
6CD60000
|
unkown
|
page read and write
|
||
49CE000
|
stack
|
page read and write
|
||
2ED4000
|
direct allocation
|
page read and write
|
||
4F3F000
|
direct allocation
|
page read and write
|
||
28E8000
|
direct allocation
|
page read and write
|
||
6CD6A000
|
unkown
|
page readonly
|
||
44BD000
|
direct allocation
|
page read and write
|
||
42BD000
|
direct allocation
|
page read and write
|
||
6CD60000
|
unkown
|
page read and write
|
||
467C000
|
direct allocation
|
page read and write
|
||
14DE000
|
stack
|
page read and write
|
||
6C7C1000
|
unkown
|
page execute read
|
||
4290000
|
direct allocation
|
page read and write
|
||
4C2D000
|
direct allocation
|
page read and write
|
||
58E000
|
stack
|
page read and write
|
||
445C000
|
direct allocation
|
page read and write
|
||
57B000
|
stack
|
page read and write
|
||
3EB000
|
stack
|
page read and write
|
||
4642000
|
direct allocation
|
page read and write
|
||
4632000
|
direct allocation
|
page read and write
|
||
2E38000
|
direct allocation
|
page read and write
|
||
2936000
|
heap
|
page read and write
|
||
4A5E000
|
stack
|
page read and write
|
||
4F54000
|
direct allocation
|
page read and write
|
||
465F000
|
direct allocation
|
page read and write
|
||
2EEA000
|
direct allocation
|
page read and write
|
||
4BB8000
|
direct allocation
|
page read and write
|
||
4F38000
|
direct allocation
|
page read and write
|
||
2DDB000
|
stack
|
page read and write
|
||
6CD4F000
|
unkown
|
page write copy
|
||
2B9F000
|
stack
|
page read and write
|
||
45AB000
|
direct allocation
|
page read and write
|
||
2AB7000
|
stack
|
page read and write
|
||
4CFB000
|
direct allocation
|
page read and write
|
||
310E000
|
stack
|
page read and write
|
||
6CD56000
|
unkown
|
page read and write
|
||
6CD4E000
|
unkown
|
page read and write
|
||
4422000
|
direct allocation
|
page read and write
|
||
462B000
|
direct allocation
|
page read and write
|
||
2B80000
|
heap
|
page read and write
|
||
3400000
|
heap
|
page read and write
|
||
43F4000
|
direct allocation
|
page read and write
|
||
116F000
|
heap
|
page read and write
|
||
6CD65000
|
unkown
|
page write copy
|
||
44F1000
|
direct allocation
|
page read and write
|
||
4C71000
|
direct allocation
|
page read and write
|
||
25E0000
|
direct allocation
|
page execute and read and write
|
||
30E0000
|
heap
|
page read and write
|
||
28CC000
|
direct allocation
|
page read and write
|
||
2FD0000
|
heap
|
page read and write
|
||
2D7E000
|
stack
|
page read and write
|
||
2AF0000
|
heap
|
page read and write
|
||
43B000
|
stack
|
page read and write
|
||
29C6000
|
heap
|
page read and write
|
||
2B60000
|
heap
|
page read and write
|
||
44B1000
|
direct allocation
|
page read and write
|
||
6CD60000
|
unkown
|
page read and write
|
||
2E30000
|
heap
|
page read and write
|
||
1610000
|
heap
|
page read and write
|
||
45D6000
|
direct allocation
|
page read and write
|
||
4434000
|
direct allocation
|
page read and write
|
||
4F12000
|
direct allocation
|
page read and write
|
||
4C52000
|
direct allocation
|
page read and write
|
||
448D000
|
direct allocation
|
page read and write
|
||
45C0000
|
direct allocation
|
page read and write
|
||
2E0A000
|
heap
|
page read and write
|
||
300F000
|
stack
|
page read and write
|
||
1010000
|
heap
|
page read and write
|
||
6CD65000
|
unkown
|
page write copy
|
||
4A59000
|
direct allocation
|
page read and write
|
||
461D000
|
direct allocation
|
page read and write
|
||
4A48000
|
direct allocation
|
page read and write
|
||
2BDB000
|
stack
|
page read and write
|
||
314F000
|
stack
|
page read and write
|
||
4C38000
|
direct allocation
|
page read and write
|
||
2AD0000
|
heap
|
page read and write
|
||
27A0000
|
heap
|
page read and write
|
||
2FB0000
|
heap
|
page read and write
|
||
2EB0000
|
direct allocation
|
page read and write
|
||
4AB0000
|
direct allocation
|
page execute and read and write
|
||
4D09000
|
direct allocation
|
page read and write
|
||
4594000
|
direct allocation
|
page read and write
|
||
6CD68000
|
unkown
|
page readonly
|
||
4666000
|
direct allocation
|
page read and write
|
||
4FDF000
|
stack
|
page read and write
|
||
4CA3000
|
direct allocation
|
page read and write
|
||
3090000
|
heap
|
page read and write
|
||
4440000
|
direct allocation
|
page read and write
|
||
4484000
|
direct allocation
|
page read and write
|
||
2F70000
|
heap
|
page read and write
|
||
505F000
|
stack
|
page read and write
|
||
45F3000
|
direct allocation
|
page read and write
|
||
45E4000
|
direct allocation
|
page read and write
|
||
4683000
|
direct allocation
|
page read and write
|
||
448B000
|
direct allocation
|
page read and write
|
||
42D2000
|
direct allocation
|
page read and write
|
||
2800000
|
heap
|
page read and write
|
||
4D18000
|
direct allocation
|
page read and write
|
||
2DB0000
|
heap
|
page read and write
|
||
4AA2000
|
direct allocation
|
page read and write
|
||
4B0F000
|
stack
|
page read and write
|
||
2826000
|
heap
|
page read and write
|
||
4F9E000
|
stack
|
page read and write
|
||
44BF000
|
direct allocation
|
page read and write
|
||
4EFD000
|
direct allocation
|
page read and write
|
||
28EB000
|
heap
|
page read and write
|
||
4C5C000
|
direct allocation
|
page read and write
|
There are 633 hidden memdumps, click here to show them.