Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
SecuriteInfo.com.Heur.31681.xls
|
Composite Document File V2 Document, Little Endian, Os: Windows, Version 6.2, Code page: 1251, Last Saved By: 5, Name of Creating
Application: Microsoft Excel, Create Time/Date: Sat Sep 16 01:00:00 2006, Last Saved Time/Date: Mon May 3 13:21:14 2021,
Security: 0
|
initial sample
|
||
C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\History.bak
|
SQLite 3.x database, last written using SQLite version 3032001
|
dropped
|
||
C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login Data.bak
|
SQLite 3.x database, last written using SQLite version 3032001
|
dropped
|
||
C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Web Data.bak
|
SQLite 3.x database, last written using SQLite version 3032001
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\T4O403JZ\netmouser[1].dll
|
PE32 executable (DLL) (native) Intel 80386, for MS Windows
|
downloaded
|
||
C:\Users\user\fndskfnds.dfm
|
PE32 executable (DLL) (native) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\77EC63BDA74BD0D0E0426DC8F8008506
|
Microsoft Cabinet archive data, 58596 bytes, 1 file
|
dropped
|
||
C:\Users\user\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\77EC63BDA74BD0D0E0426DC8F8008506
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Google\Chrome\User Data\Local State.bak
|
ASCII text, with very long lines, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\83EE0000
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\CabEB4A.tmp
|
Microsoft Cabinet archive data, 58596 bytes, 1 file
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\TarEB4B.tmp
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\Microsoft\Office\Recent\Desktop.LNK
|
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Read-Only, Directory, ctime=Tue
Oct 17 10:04:00 2017, mtime=Tue May 4 12:48:43 2021, atime=Tue May 4 12:48:43 2021, length=8192, window=hide
|
dropped
|
||
C:\Users\user\AppData\Roaming\Microsoft\Office\Recent\SecuriteInfo.com.Heur.31681.LNK
|
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Archive, ctime=Tue May 4 12:48:28
2021, mtime=Tue May 4 12:48:43 2021, atime=Tue May 4 12:48:43 2021, length=111104, window=hide
|
dropped
|
||
C:\Users\user\AppData\Roaming\Microsoft\Office\Recent\index.dat
|
ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\Desktop\54EE0000
|
Applesoft BASIC program data, first line number 16
|
dropped
|
||
C:\Windows\System32\cn\aexsxmcq.txt
|
data
|
dropped
|
There are 7 hidden files, click here to show them.
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
|
'C:\Program Files\Microsoft Office\Office14\EXCEL.EXE' /automation -Embedding
|
||
C:\Windows\System32\rundll32.exe
|
rundll32 ..\fndskfnds.dfm,StartW
|
||
C:\Windows\SysWOW64\rundll32.exe
|
rundll32 ..\fndskfnds.dfm,StartW
|
||
C:\Windows\System32\wermgr.exe
|
C:\Windows\system32\wermgr.exe
|
||
C:\Windows\System32\rundll32.exe
|
C:\Windows\system32\rundll32.EXE 'C:\Users\user\AppData\Roaming\iDownloadManager1882563550\kufndskfndszi.dwn',StartW
|
||
C:\Windows\System32\cmd.exe
|
C:\Windows\system32\cmd.exe
|
||
C:\Windows\System32\cmd.exe
|
C:\Windows\system32\cmd.exe
|
||
C:\Windows\System32\taskeng.exe
|
taskeng.exe {A9986821-F5E8-4178-8C7A-712EEA14850B} S-1-5-18:NT AUTHORITY\System:Service:
|
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
http://www.windows.com/pctv.
|
unknown
|
||
http://investor.msn.com
|
unknown
|
||
http://www.msnbc.com/news/ticker.txt
|
unknown
|
||
https://188.18.7.133:447/net9/035347_W617601.17B7997589EBB97D55BFB73DD1C2B3BB/5/pwgrabc64/O
|
unknown
|
||
http://crl.comodoca.c
|
unknown
|
||
http://crl.entrust.net/server1.crl0
|
unknown
|
||
http://ocsp.entrust.net03
|
unknown
|
||
https://117.54.250.246/net9/035347_W617601.17B7997589EBB97D55BFB73DD1C2B3BB/5/dpost/
|
unknown
|
||
http://api.ipify.org/?format=text
|
54.243.154.178
|
||
http://189.195.96.238:443
|
unknown
|
||
http://36.95.27.243:443
|
unknown
|
||
http://crl.pkioverheid.nl/DomOrganisatieLatestCRL-G2.crl0
|
unknown
|
||
http://www.diginotar.nl/cps/pkioverheid0
|
unknown
|
||
http://103.102.220.50:443W6
|
unknown
|
||
https://188.18.7.133:447/net9/035347_W617601.17B7997589EBB97D55BFB73DD1C2B3BB/5/pwgrabb64/k
|
unknown
|
||
https://103.102.220.50:443/net9/035347_W617601.17B7997589EBB97D55BFB73DD1C2B3BB/83/
|
103.102.220.50
|
||
http://115.241.244.185:443
|
unknown
|
||
http://windowsmedia.com/redir/services.asp?WMPFriendly=true
|
unknown
|
||
http://www.hotmail.com/oe
|
unknown
|
||
http://190.89.3.117:443
|
unknown
|
||
http://5.202.120.150:443
|
unknown
|
||
http://83.220.115.230:443
|
unknown
|
||
https://117.54.250.246/net9/035347_W617601.17B7997589EBB97D55BFB73DD1C2B3BB/64/pwgrabb/DEBG//
|
unknown
|
||
http://services.msn.com/svcs/oe/certpage.asp?name=%s&email=%s&&Check
|
unknown
|
||
http://185.119.120.213:443
|
unknown
|
||
http://crl.pkioverheid.nl/DomOvLatestCRL.crl0
|
unknown
|
||
http://www.icra.org/vocabulary/.
|
unknown
|
||
http://schemas.xmlsoap.org/ws/2004/08/addressing/role/anonymous.
|
unknown
|
||
http://103.102.220.50:443Edge
|
unknown
|
||
https://117.54.250.246/net9/035347_W617601.17B7997589EBB97D55BFB73DD1C2B3BB/64/pwgrabb/DPST//
|
unknown
|
||
http://investor.msn.com/
|
unknown
|
||
https://117.54.250.246/net9/035347_W617601.17B7997589EBB97D55BFB73DD1C2B3BB/10/62/DTJZZVZHXNDTX/1/
|
unknown
|
||
https://117.54.250.246/net9/035347_W617601.17B7997589EBB97D55BFB73DD1C2B3BB/14/NAT%20status/client%2
|
unknown
|
||
http://www.%s.comPA
|
unknown
|
||
https://117.54.250.246/net9/035347_W617601.17B7997589EBB97D55BFB73DD1C2B3BB/64/pwgrabb/VERS//
|
unknown
|
||
http://ocsp.entrust.net0D
|
unknown
|
||
https://secure.comodo.com/CPS0
|
unknown
|
||
http://103.102.220.50:443
|
unknown
|
||
http://103.102.220.50:443X6
|
unknown
|
||
http://crl.entrust.net/2048ca.crl0
|
unknown
|
||
http://177.84.63.252:443
|
unknown
|
||
https://117.54.250.246/net9/035347_W617601.17B7997589EBB97D55BFB73DD1C2B3BB/10/62/DTJZZVZHXNDTX/1/in
|
unknown
|
There are 32 hidden URLs, click here to show them.
Domains
Name
|
IP
|
Malicious
|
|
---|---|---|---|
elb097307-934924932.us-east-1.elb.amazonaws.com
|
54.243.154.178
|
||
3.52.17.84.cbl.abuseat.org
|
127.0.0.2
|
||
deluciaspizza.com
|
144.208.70.30
|
||
3.52.17.84.zen.spamhaus.org
|
unknown
|
||
api.ipify.org
|
unknown
|
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
117.54.250.246
|
unknown
|
Indonesia
|
||
188.18.7.133
|
unknown
|
Russian Federation
|
||
144.208.70.30
|
deluciaspizza.com
|
United States
|
||
103.102.220.50
|
unknown
|
Afghanistan
|
||
54.243.154.178
|
elb097307-934924932.us-east-1.elb.amazonaws.com
|
United States
|
Registry
Path
|
Value
|
Malicious
|
|
---|---|---|---|
C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
|
nf7
|
||
C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
|
MTTT
|
||
C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
|
ReviewToken
|
||
C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
|
EDAA6
|
||
C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
|
FontCachePath
|
||
C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
|
VBAFiles
|
||
C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
|
DefaultSheetR2L
|
||
C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
|
UseSystemSeparators
|
||
C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
|
ThousandsSeparator
|
||
C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
|
DecimalSeparator
|
||
C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
|
Max Display
|
||
C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
|
Max Display
|
||
C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
|
Item 1
|
||
C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
|
Item 2
|
||
C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
|
Item 3
|
||
C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
|
Item 4
|
||
C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
|
Item 5
|
||
C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
|
Item 6
|
||
C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
|
Item 7
|
||
C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
|
Item 8
|
||
C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
|
Item 9
|
||
C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
|
Item 10
|
||
C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
|
Item 11
|
||
C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
|
Item 12
|
||
C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
|
Item 13
|
||
C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
|
Item 14
|
||
C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
|
Item 15
|
||
C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
|
Item 16
|
||
C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
|
Item 17
|
||
C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
|
Item 18
|
||
C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
|
Item 19
|
||
C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
|
Item 20
|
||
C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
|
EE1F6
|
||
C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
|
EE292
|
||
C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
|
EE31E
|
||
C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
|
Max Display
|
||
C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
|
Max Display
|
||
C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
|
Item 1
|
||
C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
|
Item 2
|
||
C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
|
Item 3
|
||
C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
|
Item 4
|
||
C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
|
Item 5
|
||
C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
|
Item 6
|
||
C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
|
Item 7
|
||
C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
|
Item 8
|
||
C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
|
Item 9
|
||
C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
|
Item 10
|
||
C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
|
Item 11
|
||
C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
|
Item 12
|
||
C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
|
Item 13
|
||
C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
|
Item 14
|
||
C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
|
Item 15
|
||
C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
|
Item 16
|
||
C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
|
Item 17
|
||
C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
|
Item 18
|
||
C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
|
Item 19
|
||
C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
|
Item 20
|
||
C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
|
EE418
|
||
C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
|
EE4B4
|
||
C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
|
{E7E4BC40-E76A-11CE-A9BB-00AA004AE837} {000214E6-0000-0000-C000-000000000046} 0xFFFF
|
||
C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
|
ou7
|
||
C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
|
@%SystemRoot%\system32\qagentrt.dll,-10
|
||
C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
|
@%SystemRoot%\System32\fveui.dll,-843
|
||
C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
|
@%SystemRoot%\System32\fveui.dll,-844
|
||
C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
|
@%SystemRoot%\System32\wuaueng.dll,-400
|
||
C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
|
F5763
|
||
C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
|
Max Display
|
||
C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
|
Max Display
|
||
C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
|
Item 1
|
||
C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
|
Item 2
|
||
C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
|
Item 3
|
||
C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
|
Item 4
|
||
C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
|
Item 5
|
||
C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
|
Item 6
|
||
C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
|
Item 7
|
||
C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
|
Item 8
|
||
C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
|
Item 9
|
||
C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
|
Item 10
|
||
C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
|
Item 11
|
||
C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
|
Item 12
|
||
C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
|
Item 13
|
||
C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
|
Item 14
|
||
C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
|
Item 15
|
||
C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
|
Item 16
|
||
C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
|
Item 17
|
||
C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
|
Item 18
|
||
C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
|
Item 19
|
||
C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
|
Item 20
|
||
C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
|
F58DA
|
||
C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
|
LastPurgeTime
|
||
C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
|
1033
|
||
C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
|
1033
|
||
C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
|
EXCELFiles
|
||
C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
|
ProductFiles
|
||
C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
|
ProductFiles
|
||
C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
|
SpellingAndGrammarFiles_3082
|
||
C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
|
SpellingAndGrammarFiles_3082
|
||
C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
|
SpellingAndGrammarFiles_1036
|
||
C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
|
SpellingAndGrammarFiles_1036
|
||
C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
|
SpellingAndGrammarFiles_1033
|
||
C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
|
SpellingAndGrammarFiles_1033
|
||
C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
|
SpellingAndGrammarFiles_3082
|
||
C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
|
SpellingAndGrammarFiles_3082
|
||
C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
|
SpellingAndGrammarFiles_1036
|
||
C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
|
SpellingAndGrammarFiles_1036
|
||
C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
|
SpellingAndGrammarFiles_1033
|
||
C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
|
SpellingAndGrammarFiles_1033
|
||
C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
|
ProductFiles
|
||
C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
|
ProductFiles
|
||
C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
|
ProductFiles
|
||
C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
|
ProductFiles
|
||
C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
|
SavedLegacySettings
|
||
C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
|
Blob
|
||
C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
|
Blob
|
||
C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
|
Blob
|
||
C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
|
Blob
|
||
C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
|
Blob
|
||
C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
|
Blob
|
||
C:\Windows\System32\wermgr.exe
|
Blob
|
||
C:\Windows\System32\taskeng.exe
|
data
|
||
C:\Windows\System32\cmd.exe
|
SavedLegacySettings
|
There are 111 hidden registries, click here to show them.
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
2460000
|
unkown
|
page execute and read and write
|
||
1D0000
|
unkown
|
page read and write
|
||
290000
|
unkown
|
page execute and read and write
|
||
13D2000
|
unkown
|
page readonly
|
||
33F4C000
|
unkown
|
page read and write
|
||
2459000
|
unkown
|
page read and write
|
||
430000
|
heap private
|
page read and write
|
||
570000
|
heap default
|
page read and write
|
||
2EE000
|
heap default
|
page read and write
|
||
15C2000
|
unkown
|
page readonly
|
||
2B60000
|
unkown
|
page readonly
|
||
60000
|
unkown
|
page readonly
|
||
350000
|
unkown
|
page read and write
|
||
510000
|
unkown
|
page read and write
|
||
760000
|
unkown
|
page readonly
|
||
520000
|
unkown
|
page read and write
|
||
1302000
|
unkown
|
page readonly
|
||
1294000
|
unkown
|
page readonly
|
||
1402000
|
unkown
|
page readonly
|
||
1F40000
|
heap private
|
page read and write
|
||
231C000
|
unkown
|
page read and write
|
||
3E6000
|
unkown
|
page read and write
|
||
257000
|
heap default
|
page read and write
|
||
1375000
|
unkown
|
page readonly
|
||
25C000
|
unkown
|
page read and write
|
||
3C40000
|
unkown
|
page read and write
|
||
4D4000
|
heap private
|
page read and write
|
||
4E0000
|
unkown
|
page readonly
|
||
240000
|
heap default
|
page read and write
|
||
520000
|
unkown
|
page read and write
|
||
2360000
|
unkown
|
page read and write
|
||
3BA0000
|
unkown
|
page read and write
|
||
1332000
|
unkown
|
page readonly
|
||
3339B000
|
unkown
|
page read and write
|
||
23CA000
|
unkown
|
page read and write
|
||
4E0000
|
unkown
|
page read and write
|
||
520000
|
unkown
|
page read and write
|
||
3E8000
|
unkown
|
page read and write
|
||
2460000
|
heap private
|
page read and write
|
||
10000
|
heap private
|
page read and write
|
||
36B0000
|
unkown
|
page read and write
|
||
46E000
|
heap default
|
page read and write
|
||
2424000
|
heap private
|
page read and write
|
||
2A0000
|
unkown
|
page readonly
|
||
34B0000
|
unkown
|
page read and write
|
||
11D2000
|
unkown
|
page readonly
|
||
2FD0000
|
heap private
|
page read and write
|
||
12D4000
|
unkown
|
page readonly
|
||
245A000
|
unkown
|
page read and write
|
||
D0000
|
unkown
|
page read and write
|
||
33B9F000
|
unkown
|
page read and write
|
||
D0000
|
unkown
|
page read and write
|
||
1D0000
|
unkown
|
page read and write
|
||
23C1000
|
unkown
|
page read and write
|
||
100000
|
unkown
|
page read and write
|
||
319000
|
unkown
|
page read and write
|
||
3640000
|
heap private
|
page read and write
|
||
6E823000
|
unkown image
|
page readonly
|
||
3344B000
|
heap private
|
page read and write
|
||
510000
|
unkown
|
page read and write
|
||
520000
|
unkown
|
page read and write
|
||
430000
|
heap default
|
page read and write
|
||
23BC000
|
unkown
|
page read and write
|
||
34B0000
|
unkown
|
page read and write
|
||
23B0000
|
unkown
|
page read and write
|
||
31C40000
|
heap private
|
page read and write
|
||
90000
|
unkown
|
page readonly
|
||
4C0000
|
unkown
|
page readonly
|
||
437000
|
heap default
|
page read and write
|
||
1F60000
|
unkown
|
page readonly
|
||
660000
|
unkown
|
page readonly
|
||
2FE0000
|
unkown
|
page read and write
|
||
6E88A000
|
unkown image
|
page write copy
|
||
530000
|
heap private
|
page read and write
|
||
540000
|
unkown
|
page readonly
|
||
32D3F000
|
unkown
|
page read and write
|
||
650000
|
unkown
|
page readonly
|
||
23C6000
|
unkown
|
page read and write
|
||
60000
|
unkown
|
page readonly
|
||
440000
|
unkown
|
page readonly
|
||
1BF0000
|
unkown
|
page readonly
|
||
2BA000
|
unkown
|
page read and write
|
||
1D1D000
|
unkown
|
page read and write
|
||
6E88F000
|
unkown image
|
page readonly
|
||
3B0000
|
heap private
|
page read and write
|
||
110000
|
unkown
|
page read and write
|
||
23C8000
|
unkown
|
page read and write
|
||
FC0000
|
unkown
|
page read and write
|
||
20000
|
unkown
|
page readonly
|
||
13B6000
|
unkown
|
page readonly
|
||
32B31000
|
heap private
|
page read and write
|
||
32933000
|
heap private
|
page read and write
|
||
26E000
|
heap default
|
page read and write
|
||
2350000
|
unkown
|
page read and write
|
||
5D0000
|
heap private
|
page read and write
|
||
23A6000
|
unkown
|
page read and write
|
||
23CB000
|
unkown
|
page read and write
|
||
3BB0000
|
unkown
|
page read and write
|
||
3E0000
|
unkown
|
page readonly
|
||
386000
|
unkown
|
page read and write
|
||
520000
|
unkown
|
page read and write
|
||
24F0000
|
unkown
|
page read and write
|
||
320000
|
heap default
|
page read and write
|
||
510000
|
unkown
|
page read and write
|
||
366000
|
unkown
|
page read and write
|
||
3213B000
|
heap private
|
page read and write
|
||
377000
|
heap default
|
page read and write
|
||
3BB0000
|
unkown
|
page read and write
|
||
3B0000
|
unkown
|
page read and write
|
||
780000
|
unkown
|
page readonly
|
||
31A42000
|
heap private
|
page read and write
|
||
520000
|
unkown
|
page read and write
|
||
19C000
|
unkown
|
page read and write
|
||
577000
|
heap default
|
page read and write
|
||
140000
|
unkown
|
page read and write
|
||
476000
|
unkown
|
page read and write
|
||
31844000
|
heap private
|
page read and write
|
||
143D000
|
unkown
|
page read and write
|
||
140000
|
unkown
|
page read and write
|
||
560000
|
unkown
|
page readonly
|
||
6E821000
|
unkown image
|
page execute read
|
||
2F00000
|
unkown
|
page read and write
|
||
1455000
|
unkown
|
page readonly
|
||
1600000
|
unkown
|
page readonly
|
||
1392000
|
unkown
|
page readonly
|
||
180001000
|
unkown
|
page read and write
|
||
31E3E000
|
heap private
|
page read and write
|
||
2969000
|
unkown
|
page read and write
|
||
510000
|
unkown
|
page read and write
|
||
800000
|
unkown
|
page readonly
|
||
860000
|
unkown
|
page readonly
|
||
33395000
|
unkown
|
page read and write
|
||
2350000
|
unkown
|
page read and write
|
||
3223A000
|
heap private
|
page read and write
|
||
3BB0000
|
unkown
|
page read and write
|
||
6C0000
|
unkown
|
page readonly
|
||
23C3000
|
unkown
|
page read and write
|
||
33300000
|
unkown
|
page read and write
|
||
27E000
|
heap default
|
page read and write
|
||
31A42000
|
heap private
|
page read and write
|
||
333000
|
heap default
|
page read and write
|
||
240000
|
heap private
|
page read and write
|
||
32339000
|
heap private
|
page read and write
|
||
319000
|
heap default
|
page read and write
|
||
430000
|
heap private
|
page read and write
|
||
1D0000
|
unkown
|
page read and write
|
||
3F8000
|
unkown
|
page read and write
|
||
420000
|
unkown
|
page write copy
|
||
6C0000
|
unkown
|
page readonly
|
||
2F20000
|
unkown
|
page read and write
|
||
2450000
|
unkown
|
page read and write
|
||
F1F000
|
unkown
|
page read and write
|
||
32C31000
|
heap private
|
page read and write
|
||
2459000
|
unkown
|
page read and write
|
||
36B0000
|
unkown
|
page read and write
|
||
100000
|
unkown
|
page read and write
|
||
2B7000
|
heap default
|
page read and write
|
||
32339000
|
heap private
|
page read and write
|
||
3610000
|
unkown
|
page read and write
|
||
120000
|
unkown
|
page readonly
|
||
534000
|
heap private
|
page read and write
|
||
250000
|
heap default
|
page read and write
|
||
33570000
|
heap private
|
page read and write
|
||
32933000
|
heap private
|
page read and write
|
||
1F0000
|
unkown
|
page read and write
|
||
360000
|
heap default
|
page read and write
|
||
318000
|
unkown
|
page read and write
|
||
274000
|
heap private
|
page read and write
|
||
20000
|
heap private
|
page read and write
|
||
2AA000
|
heap default
|
page read and write
|
||
1C60000
|
unkown
|
page readonly
|
||
32D40000
|
unkown
|
page readonly
|
||
540000
|
unkown
|
page readonly
|
||
333A8000
|
unkown
|
page read and write
|
||
2390000
|
unkown
|
page read and write
|
||
2450000
|
unkown
|
page read and write
|
||
3BB000
|
heap default
|
page read and write
|
||
1386000
|
unkown
|
page readonly
|
||
3090000
|
unkown
|
page read and write
|
||
16D000
|
unkown
|
page read and write
|
||
2450000
|
unkown
|
page read and write
|
||
1D80000
|
heap private
|
page read and write
|
||
1E0000
|
unkown
|
page read and write
|
||
1CB000
|
unkown
|
page read and write
|
||
1425000
|
unkown
|
page readonly
|
||
2B6000
|
unkown
|
page read and write
|
||
33CEE000
|
unkown
|
page read and write
|
||
1D4000
|
heap private
|
page read and write
|
||
967000
|
unkown
|
page readonly
|
||
520000
|
unkown
|
page read and write
|
||
20000
|
unkown
|
page readonly
|
||
23C3000
|
unkown
|
page read and write
|
||
170000
|
unkown
|
page execute and read and write
|
||
10D2000
|
unkown
|
page readonly
|
||
23C8000
|
unkown
|
page read and write
|
||
1409000
|
unkown
|
page readonly
|
||
3030000
|
unkown
|
page read and write
|
||
23B2000
|
unkown
|
page read and write
|
||
3BC0000
|
unkown
|
page read and write
|
||
2420000
|
unkown
|
page read and write
|
||
DC0000
|
heap private
|
page read and write
|
||
60000
|
unkown
|
page execute and read and write
|
||
365000
|
heap default
|
page read and write
|
||
6E820000
|
unkown image
|
page readonly
|
||
31E3E000
|
heap private
|
page read and write
|
||
40D000
|
unkown
|
page read and write
|
||
1315000
|
unkown
|
page readonly
|
||
13B9000
|
unkown
|
page readonly
|
||
1345000
|
unkown
|
page readonly
|
||
33410000
|
heap private
|
page read and write
|
||
3540000
|
unkown
|
page read and write
|
||
2B3000
|
heap default
|
page read and write
|
||
3130000
|
unkown
|
page read and write
|
||
32834000
|
heap private
|
page read and write
|
||
180001000
|
unkown
|
page execute read
|
||
370000
|
heap default
|
page read and write
|
||
3D7000
|
heap default
|
page read and write
|
||
520000
|
unkown
|
page read and write
|
||
18009A000
|
unkown
|
page readonly
|
||
B60000
|
unkown
|
page write copy
|
||
408000
|
unkown
|
page read and write
|
||
33720000
|
unkown
|
page readonly
|
||
280000
|
unkown
|
page read and write
|
||
1432000
|
unkown
|
page readonly
|
||
40E000
|
heap default
|
page read and write
|
||
4D0000
|
unkown
|
page readonly
|
||
1B60000
|
unkown
|
page readonly
|
||
330000
|
unkown
|
page read and write
|
||
C39000
|
heap private
|
page read and write
|
||
520000
|
unkown
|
page read and write
|
||
800000
|
unkown
|
page readonly
|
||
1D0000
|
heap private
|
page read and write
|
||
90000
|
unkown
|
page readonly
|
||
D9F000
|
unkown
|
page read and write
|
||
130000
|
unkown
|
page read and write
|
||
3580000
|
unkown
|
page read and write
|
||
BE0000
|
unkown
|
page readonly
|
||
19C000
|
unkown
|
page read and write
|
||
3740000
|
unkown
|
page read and write
|
||
140000
|
unkown
|
page read and write
|
||
1326000
|
unkown
|
page readonly
|
||
3BA0000
|
unkown
|
page read and write
|
||
440000
|
unkown
|
page read and write
|
||
2442000
|
heap private
|
page read and write
|
||
2F40000
|
unkown
|
page read and write
|
||
230000
|
heap default
|
page read and write
|
||
2ED0000
|
unkown
|
page read and write
|
||
2B0000
|
heap default
|
page read and write
|
||
5C0000
|
unkown
|
page readonly
|
||
323FD000
|
heap private
|
page read and write
|
||
32C36000
|
heap private
|
page read and write
|
||
336B3000
|
heap private
|
page read and write
|
||
6E820000
|
unkown image
|
page readonly
|
||
7EFDF000
|
unkown
|
page read and write
|
||
260D000
|
unkown
|
page read and write
|
||
DC4000
|
heap private
|
page read and write
|
||
C30000
|
heap private
|
page read and write
|
||
260C000
|
unkown
|
page read and write | page guard
|
||
1640000
|
unkown
|
page readonly
|
||
8C0000
|
unkown
|
page readonly
|
||
23CD000
|
unkown
|
page read and write
|
||
23B5000
|
unkown
|
page read and write
|
||
12B4000
|
unkown
|
page readonly
|
||
379000
|
heap private
|
page read and write
|
||
2B5C000
|
unkown
|
page read and write
|
||
28E000
|
heap default
|
page read and write
|
||
3336F000
|
unkown
|
page read and write
|
||
60000
|
unkown
|
page execute and read and write
|
||
2350000
|
unkown
|
page read and write
|
||
2390000
|
unkown
|
page read and write
|
||
3213B000
|
heap private
|
page read and write
|
||
4E0000
|
unkown
|
page read and write
|
||
28C000
|
unkown
|
page read and write
|
||
1DD7000
|
unkown
|
page readonly
|
||
270000
|
heap private
|
page read and write
|
||
60000
|
unkown
|
page readonly
|
||
510000
|
unkown
|
page read and write
|
||
237000
|
heap default
|
page read and write
|
||
23C3000
|
unkown
|
page read and write
|
||
D0000
|
unkown
|
page read and write
|
||
20000
|
heap private
|
page read and write
|
||
33415000
|
heap private
|
page read and write
|
||
31844000
|
heap private
|
page read and write
|
||
333000
|
unkown
|
page read and write
|
||
D0000
|
unkown
|
page read and write
|
||
410000
|
unkown
|
page readonly
|
||
10D8000
|
unkown
|
page readonly
|
||
2350000
|
unkown
|
page read and write
|
||
2E0000
|
heap private
|
page read and write
|
||
1292000
|
unkown
|
page readonly
|
||
520000
|
unkown
|
page read and write
|
||
4E0000
|
unkown
|
page read and write
|
||
DFB000
|
heap private
|
page read and write
|
||
3D0000
|
heap default
|
page read and write
|
||
2420000
|
unkown
|
page read and write
|
||
5AF000
|
unkown
|
page read and write
|
||
31745000
|
heap private
|
page read and write
|
||
32C30000
|
heap private
|
page read and write
|
||
20000
|
unkown
|
page read and write
|
||
E0000
|
unkown
|
page read and write
|
||
3190000
|
heap private
|
page read and write
|
||
2450000
|
unkown
|
page read and write
|
||
2A00000
|
unkown
|
page read and write
|
||
FBF000
|
unkown
|
page read and write
|
||
2420000
|
unkown
|
page read and write
|
||
250000
|
unkown
|
page read and write
|
||
3BB0000
|
unkown
|
page read and write
|
||
10000
|
heap private
|
page read and write
|
||
2459000
|
unkown
|
page read and write
|
||
247000
|
heap default
|
page read and write
|
||
9E7000
|
unkown
|
page readonly
|
||
280000
|
unkown
|
page execute and read and write
|
||
3580000
|
unkown
|
page read and write
|
||
6C0000
|
unkown
|
page readonly
|
||
106000
|
unkown
|
page read and write
|
||
2450000
|
unkown
|
page read and write
|
||
1800BA000
|
unkown
|
page readonly
|
||
220000
|
heap private
|
page read and write
|
||
510000
|
unkown
|
page read and write
|
||
2970000
|
unkown
|
page write copy
|
||
2BD000
|
heap default
|
page read and write
|
||
F0000
|
unkown
|
page readonly
|
||
1439000
|
unkown
|
page readonly
|
||
260000
|
unkown
|
page execute and read and write
|
||
3130000
|
unkown
|
page read and write
|
||
100000
|
unkown
|
page readonly
|
||
23A0000
|
heap private
|
page read and write
|
||
2430000
|
unkown
|
page read and write
|
||
20000
|
unkown
|
page readonly
|
||
110000
|
unkown
|
page execute and read and write
|
||
23C1000
|
unkown
|
page read and write
|
||
CE0000
|
heap private
|
page read and write
|
||
4D0000
|
heap private
|
page read and write
|
||
13D9000
|
unkown
|
page readonly
|
||
2E50000
|
unkown
|
page read and write
|
||
860000
|
unkown
|
page readonly
|
||
10001000
|
unkown
|
page execute and read and write
|
||
20000
|
unkown
|
page readonly
|
||
32A000
|
unkown
|
page read and write
|
||
1E8E000
|
unkown
|
page read and write
|
||
80000
|
unkown
|
page readonly
|
||
60000
|
unkown
|
page execute and read and write
|
||
33010000
|
unkown
|
page write copy
|
||
2E90000
|
unkown
|
page read and write
|
||
80000
|
unkown
|
page readonly
|
||
317C2000
|
heap private
|
page read and write
|
||
340000
|
heap private
|
page read and write
|
||
D50000
|
unkown
|
page readonly
|
||
D30000
|
unkown
|
page readonly
|
||
33220000
|
unkown
|
page readonly
|
||
CF0000
|
unkown
|
page execute and read and write
|
||
23CC000
|
unkown
|
page read and write
|
||
210000
|
unkown
|
page read and write
|
||
1800B5000
|
unkown
|
page read and write
|
||
330000
|
unkown
|
page read and write
|
||
2150000
|
heap private
|
page read and write
|
||
32C6D000
|
heap private
|
page read and write
|
||
2A0000
|
heap default
|
page read and write
|
||
2450000
|
unkown
|
page read and write
|
||
510000
|
unkown
|
page read and write
|
||
12D2000
|
unkown
|
page readonly
|
||
510000
|
unkown
|
page read and write
|
||
1D70000
|
heap private
|
page read and write
|
||
2390000
|
unkown
|
page read and write
|
||
E0000
|
unkown
|
page read and write
|
||
2F90000
|
unkown
|
page read and write
|
||
434000
|
heap private
|
page read and write
|
||
594000
|
heap default
|
page read and write
|
||
130000
|
unkown
|
page readonly
|
||
AAF000
|
unkown
|
page read and write
|
||
140000
|
unkown
|
page read and write
|
||
37D000
|
heap default
|
page read and write
|
||
12B2000
|
unkown
|
page readonly
|
||
2450000
|
unkown
|
page read and write
|
||
3BA0000
|
unkown
|
page read and write
|
||
5A7000
|
heap default
|
page read and write
|
||
3315D000
|
unkown
|
page read and write
|
||
2E90000
|
unkown
|
page read and write
|
||
2450000
|
unkown
|
page read and write
|
||
90000
|
unkown
|
page read and write
|
||
25D000
|
unkown
|
page read and write
|
||
27F0000
|
heap private
|
page read and write
|
||
CB0000
|
heap private
|
page read and write
|
||
2420000
|
heap private
|
page read and write
|
||
5AD000
|
heap default
|
page read and write
|
||
278F000
|
unkown
|
page read and write
|
||
1620000
|
unkown
|
page readonly
|
||
10C0000
|
unkown
|
page readonly
|
||
13BD000
|
unkown
|
page readonly
|
||
3AD000
|
heap default
|
page read and write
|
||
3BB0000
|
unkown
|
page read and write
|
||
434000
|
heap private
|
page read and write
|
||
1A0000
|
unkown
|
page readonly
|
||
1362000
|
unkown
|
page readonly
|
||
140000
|
unkown
|
page read and write
|
||
730000
|
unkown
|
page readonly
|
||
5D4000
|
heap private
|
page read and write
|
||
27E0000
|
unkown
|
page read and write
|
||
3B6000
|
heap default
|
page read and write
|
||
156D000
|
unkown
|
page read and write
|
||
106000
|
unkown
|
page read and write
|
||
13F5000
|
unkown
|
page readonly
|
||
60000
|
unkown
|
page readonly
|
||
33DD0000
|
heap private
|
page read and write
|
||
370000
|
heap private
|
page read and write
|
||
13A5000
|
unkown
|
page readonly
|
||
336A0000
|
heap private
|
page read and write
|
||
1356000
|
unkown
|
page readonly
|
||
2F00000
|
unkown
|
page read and write
|
||
520000
|
unkown
|
page read and write
|
||
1DC000
|
unkown
|
page read and write
|
||
2FE000
|
unkown
|
page read and write
|
||
290000
|
unkown
|
page readonly
|
||
520000
|
unkown
|
page read and write
|
||
1CA000
|
unkown
|
page read and write
|
||
32D000
|
heap default
|
page read and write
|
||
2AC000
|
unkown
|
page read and write
|
||
33E000
|
heap default
|
page read and write
|
||
4E0000
|
unkown
|
page read and write
|
There are 409 hidden memdumps, click here to show them.