Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
Request for Quotation (RFQ).xlsx
|
CDFV2 Encrypted
|
initial sample
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\ZAE7RW1P\dan[1].exe
|
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
|
downloaded
|
||
C:\Users\user\Desktop\~$Request for Quotation (RFQ).xlsx
|
data
|
dropped
|
||
C:\Users\Public\vbc.exe
|
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\77EC63BDA74BD0D0E0426DC8F8008506
|
Microsoft Cabinet archive data, 60080 bytes, 1 file
|
dropped
|
||
C:\Users\user\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\77EC63BDA74BD0D0E0426DC8F8008506
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\1499C3D2.png
|
PNG image data, 476 x 244, 8-bit/color RGB, non-interlaced
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\21A7353E.jpeg
|
gd-jpeg v1.0 (using IJG JPEG v80), quality = 90", baseline, precision 8, 700x990, frames 3
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\6A8387D5.emf
|
Windows Enhanced Metafile (EMF) image data version 0x10000
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\6F569DAB.png
|
PNG image data, 566 x 429, 8-bit/color RGBA, non-interlaced
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\7B58EFF1.jpeg
|
JPEG image data, JFIF standard 1.01, aspect ratio, density 1x1, segment length 16, baseline, precision 8, 191x263, frames
3
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\862DD3FC.png
|
PNG image data, 566 x 429, 8-bit/color RGBA, non-interlaced
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\87C26827.png
|
PNG image data, 476 x 244, 8-bit/color RGB, non-interlaced
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\8FEB23B0.png
|
PNG image data, 399 x 605, 8-bit/color RGBA, non-interlaced
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\B121FC63.jpeg
|
gd-jpeg v1.0 (using IJG JPEG v80), quality = 90", baseline, precision 8, 700x990, frames 3
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\C6662BCD.png
|
PNG image data, 399 x 605, 8-bit/color RGBA, non-interlaced
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\FA8E76A.jpeg
|
JPEG image data, JFIF standard 1.01, aspect ratio, density 1x1, segment length 16, baseline, precision 8, 191x263, frames
3
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\Cab71DC.tmp
|
Microsoft Cabinet archive data, 60080 bytes, 1 file
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\Tar71DD.tmp
|
data
|
modified
|
There are 9 hidden files, click here to show them.
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE
|
'C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE' -Embedding
|
||
C:\Users\Public\vbc.exe
|
'C:\Users\Public\vbc.exe'
|
||
C:\Users\Public\vbc.exe
|
C:\Users\Public\vbc.exe
|
||
C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
|
'C:\Program Files\Microsoft Office\Office14\EXCEL.EXE' /automation -Embedding
|
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
http://192.227.228.121/dan.exe
|
192.227.228.121
|
||
http://crt.sectigo.com/SectigoRSADomainValidationSecureServerCA.crt0#
|
unknown
|
||
http://127.0.0.1:HTTP/1.1
|
unknown
|
||
http://DynDns.comDynDNS
|
unknown
|
||
http://DPosyL.com
|
unknown
|
||
https://sectigo.com/CPS0
|
unknown
|
||
http://crl.entrust.net/server1.crl0
|
unknown
|
||
http://us2.smtp.mailhostbox.com
|
unknown
|
||
https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip%tordir%%ha
|
unknown
|
||
http://ocsp.entrust.net03
|
unknown
|
||
http://crl.pkioverheid.nl/DomOrganisatieLatestCRL-G2.crl0
|
unknown
|
||
http://www.diginotar.nl/cps/pkioverheid0
|
unknown
|
||
https://github.com/georgw777/MediaManager
|
unknown
|
||
https://stackpath.bootstrapcdn.com/bootstrap/4.5.0/css/bootstrap.min.css
|
unknown
|
||
https://github.com/georgw777/MediaManager;https://github.com/georgw777/
|
unknown
|
||
http://MzDfYxjI5Zul5lFh.org
|
unknown
|
||
http://crl.pkioverheid.nl/DomOvLatestCRL.crl0
|
unknown
|
||
http://schemas.xmlsoap.org/ws/2004/08/addressing/role/anonymous.
|
unknown
|
||
http://www.day.com/dam/1.0
|
unknown
|
||
http://ocsp.sectigo.com0A
|
unknown
|
||
http://www.%s.comPA
|
unknown
|
||
http://ocsp.entrust.net0D
|
unknown
|
||
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
|
unknown
|
||
https://secure.comodo.com/CPS0
|
unknown
|
||
https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip
|
unknown
|
||
http://servername/isapibackend.dll
|
unknown
|
||
http://crl.entrust.net/2048ca.crl0
|
unknown
|
||
https://github.com/georgw777/
|
unknown
|
There are 18 hidden URLs, click here to show them.
Domains
Name
|
IP
|
Malicious
|
|
---|---|---|---|
us2.smtp.mailhostbox.com
|
208.91.198.143
|
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
192.227.228.121
|
unknown
|
United States
|
||
208.91.198.143
|
us2.smtp.mailhostbox.com
|
United States
|
Registry
Path
|
Value
|
Malicious
|
|
---|---|---|---|
C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
|
uq7
|
||
C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
|
MTTT
|
||
C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
|
ReviewToken
|
||
C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
|
EDA48
|
||
C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
|
VBAFiles
|
||
C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
|
DefaultSheetR2L
|
||
C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
|
UseSystemSeparators
|
||
C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
|
ThousandsSeparator
|
||
C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
|
DecimalSeparator
|
||
C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
|
;z7
|
||
C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
|
F254C
|
||
C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
|
F319B
|
||
C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
|
Max Display
|
||
C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
|
Item 1
|
||
C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
|
Max Display
|
||
C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
|
Item 1
|
||
C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
|
Item 2
|
||
C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
|
Item 3
|
||
C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
|
Item 4
|
||
C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
|
Item 5
|
||
C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
|
Item 6
|
||
C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
|
Item 7
|
||
C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
|
Item 8
|
||
C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
|
Item 9
|
||
C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
|
Item 10
|
||
C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
|
Item 11
|
||
C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
|
Item 12
|
||
C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
|
Item 13
|
||
C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
|
Item 14
|
||
C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
|
Item 15
|
||
C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
|
Item 16
|
||
C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
|
Item 17
|
||
C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
|
Item 18
|
||
C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
|
Item 19
|
||
C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
|
Item 20
|
||
C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
|
Item 21
|
||
C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
|
LastPurgeTime
|
||
C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
|
1033
|
||
C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
|
1033
|
||
C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
|
EXCELFiles
|
||
C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
|
ProductFiles
|
||
C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
|
SpellingAndGrammarFiles_3082
|
||
C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
|
SpellingAndGrammarFiles_3082
|
||
C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
|
SpellingAndGrammarFiles_1036
|
||
C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
|
SpellingAndGrammarFiles_1036
|
||
C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
|
SpellingAndGrammarFiles_1033
|
||
C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
|
SpellingAndGrammarFiles_1033
|
||
C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
|
SpellingAndGrammarFiles_3082
|
||
C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
|
SpellingAndGrammarFiles_3082
|
||
C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
|
SpellingAndGrammarFiles_1036
|
||
C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
|
SpellingAndGrammarFiles_1036
|
||
C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
|
SpellingAndGrammarFiles_1033
|
||
C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
|
SpellingAndGrammarFiles_1033
|
||
C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
|
ProductFiles
|
||
C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
|
ProductFiles
|
||
C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
|
ProductFiles
|
||
C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
|
ProductFiles
|
||
C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
|
F254C
|
||
C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE
|
EquationEditorFilesIntl_1033
|
||
C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE
|
SavedLegacySettings
|
||
C:\Users\Public\vbc.exe
|
Blob
|
||
C:\Users\Public\vbc.exe
|
Blob
|
||
C:\Users\Public\vbc.exe
|
Blob
|
||
C:\Users\Public\vbc.exe
|
Blob
|
||
C:\Users\Public\vbc.exe
|
Blob
|
||
C:\Users\Public\vbc.exe
|
Blob
|
There are 56 hidden registries, click here to show them.
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
21B6000
|
unkown
|
page read and write
|
||
2318000
|
unkown
|
page read and write
|
||
3199000
|
unkown
|
page read and write
|
||
2291000
|
unkown
|
page read and write
|
||
402000
|
unkown
|
page execute and read and write
|
||
7309000
|
unkown
|
page read and write
|
||
8F0000
|
unkown
|
page read and write
|
||
1F30000
|
unkown
|
page read and write
|
||
260000
|
unkown
|
page read and write
|
||
67C0000
|
heap private
|
page read and write
|
||
900000
|
unkown image
|
page readonly
|
||
5280000
|
unkown
|
page read and write
|
||
280000
|
unkown
|
page read and write
|
||
9A000
|
unkown
|
page read and write
|
||
1ED2000
|
heap private
|
page read and write
|
||
280000
|
unkown
|
page read and write
|
||
2A0000
|
unkown
|
page execute and read and write
|
||
1F10000
|
unkown
|
page read and write
|
||
470000
|
unkown
|
page read and write
|
||
8F0000
|
unkown
|
page read and write
|
||
8F0000
|
unkown
|
page read and write
|
||
1F45000
|
unkown
|
page read and write
|
||
55E000
|
unkown
|
page read and write
|
||
2020000
|
heap private
|
page read and write
|
||
312000
|
unkown
|
page read and write
|
||
118000
|
heap private
|
page read and write
|
||
2042000
|
heap private
|
page read and write
|
||
50C0000
|
unkown
|
page read and write
|
||
4E00000
|
unkown
|
page read and write
|
||
61CF000
|
unkown
|
page read and write
|
||
270000
|
unkown
|
page read and write
|
||
285000
|
unkown
|
page read and write
|
||
250000
|
unkown
|
page read and write
|
||
250000
|
unkown
|
page read and write
|
||
272000
|
unkown
|
page read and write
|
||
4940000
|
heap private
|
page read and write
|
||
5E0000
|
unkown
|
page readonly
|
||
255000
|
unkown
|
page read and write
|
||
280000
|
unkown
|
page read and write
|
||
49EE000
|
unkown
|
page read and write
|
||
1E80000
|
unkown
|
page read and write
|
||
51C0000
|
unkown
|
page read and write
|
||
152000
|
unkown
|
page read and write
|
||
1E90000
|
unkown
|
page read and write
|
||
1F10000
|
unkown
|
page read and write
|
||
5211000
|
unkown
|
page read and write
|
||
8F6000
|
unkown
|
page read and write
|
||
5236000
|
unkown
|
page read and write
|
||
250000
|
unkown
|
page read and write
|
||
3C0000
|
unkown
|
page readonly
|
||
1DE0000
|
unkown
|
page read and write
|
||
492C000
|
unkown
|
page read and write
|
||
1F40000
|
unkown
|
page read and write
|
||
2186000
|
unkown
|
page read and write
|
||
AC2F000
|
unkown
|
page read and write
|
||
82D000
|
heap default
|
page read and write
|
||
7E7000
|
heap default
|
page read and write
|
||
9D0000
|
unkown image
|
page readonly
|
||
5D0000
|
heap private
|
page read and write
|
||
8E0000
|
unkown
|
page read and write
|
||
37C000
|
heap default
|
page read and write
|
||
2130000
|
unkown
|
page read and write
|
||
8F0000
|
unkown
|
page read and write
|
||
21A8000
|
unkown
|
page read and write
|
||
8E0000
|
unkown
|
page read and write
|
||
529D000
|
unkown
|
page read and write
|
||
8E0000
|
unkown
|
page read and write
|
||
2130000
|
unkown
|
page read and write
|
||
255000
|
unkown
|
page read and write
|
||
1E00000
|
unkown
|
page read and write
|
||
255000
|
unkown
|
page read and write
|
||
5461000
|
heap private
|
page read and write
|
||
280000
|
unkown
|
page read and write
|
||
900000
|
unkown image
|
page readonly
|
||
290000
|
unkown
|
page read and write
|
||
520C000
|
unkown
|
page read and write
|
||
289000
|
unkown
|
page read and write
|
||
280000
|
unkown
|
page read and write
|
||
2170000
|
unkown
|
page read and write
|
||
9D0000
|
unkown image
|
page readonly
|
||
5A0000
|
unkown
|
page read and write
|
||
2120000
|
unkown
|
page read and write
|
||
165000
|
unkown
|
page execute and read and write
|
||
5236000
|
unkown
|
page read and write
|
||
250000
|
unkown
|
page read and write
|
||
20000
|
unkown
|
page read and write
|
||
1DE0000
|
unkown
|
page read and write
|
||
2130000
|
unkown
|
page read and write
|
||
4D70000
|
heap private
|
page execute and read and write
|
||
250000
|
unkown
|
page read and write
|
||
1DE0000
|
unkown
|
page read and write
|
||
4290000
|
unkown
|
page read and write
|
||
3B7000
|
unkown
|
page read and write
|
||
2A0000
|
unkown
|
page read and write
|
||
250000
|
unkown
|
page read and write
|
||
1DF0000
|
unkown
|
page read and write
|
||
4C9000
|
heap private
|
page read and write
|
||
250000
|
unkown
|
page read and write
|
||
2140000
|
unkown
|
page read and write
|
||
72E2000
|
unkown
|
page read and write
|
||
43E0000
|
unkown
|
page read and write
|
||
1E9F000
|
unkown
|
page read and write
|
||
51FE000
|
unkown
|
page read and write
|
||
650000
|
unkown
|
page readonly
|
||
285000
|
unkown
|
page read and write
|
||
7EFDF000
|
unkown
|
page read and write
|
||
8F0000
|
unkown
|
page read and write
|
||
5C0000
|
unkown
|
page read and write
|
||
6E60000
|
unkown
|
page readonly
|
||
2140000
|
unkown
|
page read and write
|
||
83F000
|
heap default
|
page read and write
|
||
280000
|
unkown
|
page read and write
|
||
A8DE000
|
unkown
|
page read and write
|
||
1DE8000
|
unkown
|
page read and write
|
||
A83E000
|
unkown
|
page read and write
|
||
1FF0000
|
unkown
|
page read and write
|
||
902000
|
unkown image
|
page execute read
|
||
2123000
|
unkown
|
page read and write
|
||
280000
|
unkown
|
page read and write
|
||
452E000
|
unkown
|
page read and write
|
||
1E0000
|
unkown
|
page read and write
|
||
510000
|
unkown
|
page read and write
|
||
230000
|
unkown
|
page execute and read and write
|
||
6E5F000
|
unkown
|
page read and write
|
||
5211000
|
unkown
|
page read and write
|
||
255000
|
unkown
|
page read and write
|
||
263000
|
unkown
|
page execute and read and write
|
||
23F8000
|
unkown
|
page read and write
|
||
4FC1000
|
unkown
|
page read and write
|
||
582D000
|
unkown
|
page read and write
|
||
8E0000
|
unkown
|
page read and write
|
||
1EF0000
|
unkown
|
page read and write
|
||
59FE000
|
unkown
|
page read and write
|
||
650E000
|
unkown
|
page read and write
|
||
878000
|
heap default
|
page read and write
|
||
255000
|
unkown
|
page read and write
|
||
45F000
|
unkown
|
page read and write
|
||
4C0000
|
heap private
|
page read and write
|
||
397000
|
heap default
|
page read and write
|
||
45D0000
|
unkown
|
page readonly
|
||
8E0000
|
unkown
|
page read and write
|
||
4420000
|
unkown
|
page read and write
|
||
902000
|
unkown image
|
page execute read
|
||
8F0000
|
unkown
|
page read and write
|
||
726F000
|
unkown
|
page read and write
|
||
4D6E000
|
unkown
|
page read and write
|
||
8F0000
|
unkown
|
page read and write
|
||
3F0000
|
unkown
|
page execute and read and write
|
||
487E000
|
unkown
|
page read and write
|
||
240000
|
unkown
|
page read and write
|
||
51A6000
|
unkown
|
page read and write
|
||
20AE000
|
unkown
|
page read and write | page guard
|
||
250000
|
unkown
|
page read and write
|
||
AE0E000
|
unkown
|
page read and write
|
||
2130000
|
unkown
|
page read and write
|
||
1EF0000
|
unkown
|
page read and write
|
||
6CAE000
|
unkown
|
page read and write
|
||
1FB0000
|
unkown
|
page read and write
|
||
3F2000
|
heap default
|
page read and write
|
||
250000
|
unkown
|
page read and write
|
||
571D000
|
unkown
|
page read and write
|
||
270000
|
unkown
|
page read and write
|
||
51F000
|
unkown
|
page read and write
|
||
133000
|
unkown
|
page execute and read and write
|
||
2160000
|
unkown
|
page read and write
|
||
65E0000
|
heap private
|
page read and write
|
||
270000
|
heap default
|
page read and write
|
||
1EB0000
|
heap private
|
page read and write
|
||
4DB0000
|
unkown
|
page readonly
|
||
270000
|
unkown
|
page read and write
|
||
5220000
|
unkown
|
page read and write
|
||
8F0000
|
unkown
|
page read and write
|
||
2161000
|
unkown
|
page read and write
|
||
5A0000
|
unkown
|
page read and write
|
||
285000
|
unkown
|
page read and write
|
||
5203000
|
unkown
|
page read and write
|
||
8F1000
|
unkown
|
page read and write
|
||
20B0000
|
unkown
|
page readonly
|
||
51B4000
|
unkown
|
page read and write
|
||
285000
|
unkown
|
page read and write
|
||
370000
|
heap default
|
page read and write
|
||
1EFE000
|
unkown
|
page read and write
|
||
8E0000
|
unkown
|
page read and write
|
||
50DD000
|
unkown
|
page read and write
|
||
8F0000
|
unkown
|
page read and write
|
||
450000
|
unkown
|
page read and write
|
||
4A3E000
|
unkown
|
page read and write
|
||
23CA000
|
unkown
|
page read and write
|
||
5CB0000
|
unkown
|
page readonly
|
||
31B000
|
unkown
|
page execute and read and write
|
||
250000
|
unkown
|
page read and write
|
||
260000
|
unkown
|
page read and write
|
||
37A000
|
heap default
|
page read and write
|
||
4800000
|
unkown
|
page readonly
|
||
1DF0000
|
unkown
|
page read and write
|
||
255000
|
unkown
|
page read and write
|
||
290000
|
unkown
|
page read and write
|
||
250000
|
unkown
|
page read and write
|
||
1EB4000
|
heap private
|
page read and write
|
||
1F20000
|
unkown
|
page read and write
|
||
5236000
|
unkown
|
page read and write
|
||
400000
|
unkown
|
page execute and read and write
|
||
255000
|
unkown
|
page read and write
|
||
255000
|
unkown
|
page read and write
|
||
20E0000
|
heap private
|
page read and write
|
||
560000
|
heap private
|
page execute and read and write
|
||
55AE000
|
unkown
|
page read and write
|
||
22B000
|
unkown
|
page read and write
|
||
354000
|
heap default
|
page read and write
|
||
902000
|
unkown image
|
page execute read
|
||
1DE0000
|
unkown
|
page read and write
|
||
250000
|
unkown
|
page read and write
|
||
8E0000
|
unkown
|
page read and write
|
||
47EF000
|
unkown
|
page read and write
|
||
228000
|
unkown
|
page read and write
|
||
1FA0000
|
unkown
|
page read and write
|
||
1DF0000
|
unkown
|
page read and write
|
||
8E0000
|
unkown
|
page read and write
|
||
5D0000
|
heap default
|
page read and write
|
||
1DE0000
|
unkown
|
page read and write
|
||
16B000
|
unkown
|
page execute and read and write
|
||
22E5000
|
unkown
|
page read and write
|
||
26D000
|
unkown
|
page execute and read and write
|
||
4406000
|
unkown
|
page read and write
|
||
2120000
|
unkown
|
page read and write
|
||
8F0000
|
unkown
|
page read and write
|
||
2A0000
|
unkown
|
page read and write
|
||
2150000
|
unkown
|
page read and write
|
||
8F0000
|
unkown
|
page read and write
|
||
2F6000
|
unkown
|
page read and write
|
||
2064000
|
heap private
|
page read and write
|
||
20000
|
unkown
|
page read and write
|
||
510000
|
unkown
|
page read and write
|
||
42FE000
|
unkown
|
page read and write
|
||
C0000
|
unkown
|
page readonly
|
||
280000
|
unkown
|
page read and write
|
||
543E000
|
unkown
|
page read and write
|
||
255000
|
unkown
|
page read and write
|
||
2140000
|
unkown
|
page read and write
|
||
8F0000
|
unkown
|
page read and write
|
||
8F5000
|
unkown
|
page read and write
|
||
8F0000
|
unkown
|
page read and write
|
||
4A8D000
|
unkown
|
page read and write
|
||
5245000
|
unkown
|
page read and write
|
||
2120000
|
unkown
|
page read and write
|
||
250000
|
unkown
|
page read and write
|
||
280000
|
unkown
|
page read and write
|
||
8DF000
|
heap default
|
page read and write
|
||
520A000
|
unkown
|
page read and write
|
||
1DE0000
|
unkown
|
page read and write
|
||
250000
|
unkown
|
page read and write
|
||
5AFE000
|
unkown
|
page read and write
|
||
255000
|
unkown
|
page read and write
|
||
50C000
|
unkown
|
page read and write
|
||
2120000
|
unkown
|
page read and write
|
||
521A000
|
unkown
|
page read and write
|
||
228F000
|
unkown
|
page read and write
|
||
250000
|
unkown
|
page read and write
|
||
7EFDF000
|
unkown
|
page read and write
|
||
4FC0000
|
unkown
|
page read and write
|
||
3291000
|
unkown
|
page read and write
|
||
8E0000
|
unkown
|
page read and write
|
||
4530000
|
unkown
|
page readonly
|
||
285000
|
unkown
|
page read and write
|
||
8F0000
|
unkown
|
page read and write
|
||
4D0E000
|
unkown
|
page read and write
|
||
1F20000
|
unkown
|
page read and write
|
||
F0000
|
unkown
|
page read and write
|
||
2082000
|
heap private
|
page read and write
|
||
5150000
|
unkown
|
page read and write
|
||
15A000
|
unkown
|
page execute and read and write
|
||
120000
|
unkown
|
page read and write
|
||
1DE0000
|
unkown
|
page read and write
|
||
5CAC000
|
unkown
|
page read and write
|
||
8F0000
|
unkown
|
page read and write
|
||
7D0000
|
unkown
|
page readonly
|
||
AADD000
|
unkown
|
page read and write
|
||
20DD000
|
unkown
|
page read and write
|
||
167000
|
unkown
|
page execute and read and write
|
||
285000
|
unkown
|
page read and write
|
||
285000
|
unkown
|
page read and write
|
||
72BB000
|
unkown
|
page read and write
|
||
1F20000
|
unkown
|
page read and write
|
||
599E000
|
unkown
|
page read and write
|
||
5090000
|
unkown
|
page write copy
|
||
AC2E000
|
unkown
|
page read and write | page guard
|
||
4F0000
|
heap private
|
page execute and read and write
|
||
769E000
|
unkown
|
page read and write
|
||
250000
|
unkown
|
page read and write
|
||
255000
|
unkown
|
page read and write
|
||
140000
|
unkown
|
page read and write
|
||
250000
|
unkown
|
page read and write
|
||
8F0000
|
unkown
|
page read and write
|
||
1FE0000
|
unkown
|
page read and write
|
||
285000
|
unkown
|
page read and write
|
||
2144000
|
unkown
|
page read and write
|
||
1F30000
|
unkown
|
page read and write
|
||
250000
|
unkown
|
page read and write
|
||
5C0000
|
unkown
|
page read and write
|
||
1FB0000
|
unkown
|
page readonly
|
||
520A000
|
unkown
|
page read and write
|
||
577000
|
heap private
|
page read and write
|
||
8E0000
|
unkown
|
page read and write
|
||
72BD000
|
unkown
|
page read and write
|
||
2150000
|
unkown
|
page read and write
|
||
8F0000
|
unkown
|
page read and write
|
||
156000
|
unkown
|
page execute and read and write
|
||
1F20000
|
unkown
|
page read and write
|
||
255000
|
unkown
|
page read and write
|
||
2191000
|
unkown
|
page read and write
|
||
250000
|
unkown
|
page read and write
|
||
2A0000
|
unkown
|
page read and write
|
||
2140000
|
unkown
|
page read and write
|
||
4400000
|
unkown
|
page read and write
|
||
900000
|
unkown image
|
page readonly
|
||
8F2000
|
unkown
|
page read and write
|
||
30A000
|
unkown
|
page execute and read and write
|
||
250000
|
unkown
|
page read and write
|
||
23DE000
|
unkown
|
page read and write
|
||
307000
|
unkown
|
page execute and read and write
|
||
80000
|
unkown
|
page readonly
|
||
8E0000
|
unkown
|
page read and write
|
||
56DF000
|
unkown
|
page read and write
|
||
8F0000
|
unkown
|
page read and write
|
||
520A000
|
unkown
|
page read and write
|
||
1F10000
|
unkown
|
page execute and read and write
|
||
8F0000
|
unkown
|
page read and write
|
||
280000
|
unkown
|
page read and write
|
||
14D000
|
unkown
|
page execute and read and write
|
||
255000
|
unkown
|
page read and write
|
||
2150000
|
unkown
|
page read and write
|
||
510000
|
unkown
|
page read and write
|
||
317000
|
unkown
|
page execute and read and write
|
||
1F10000
|
unkown
|
page read and write
|
||
8D6000
|
heap default
|
page read and write
|
||
4190000
|
unkown
|
page read and write
|
||
110000
|
heap private
|
page read and write
|
||
1F00000
|
unkown
|
page read and write
|
||
1F00000
|
unkown
|
page read and write
|
||
4BBD000
|
unkown
|
page read and write
|
||
150000
|
unkown
|
page read and write
|
||
2170000
|
unkown
|
page execute and read and write
|
||
1FDA000
|
unkown
|
page read and write
|
||
520C000
|
unkown
|
page read and write
|
||
280000
|
unkown
|
page read and write
|
||
1E10000
|
unkown
|
page read and write
|
||
3191000
|
unkown
|
page read and write
|
||
250000
|
unkown
|
page read and write
|
||
900000
|
unkown image
|
page readonly
|
||
5A8E000
|
unkown
|
page read and write
|
||
570000
|
heap private
|
page read and write
|
||
280000
|
unkown
|
page read and write
|
||
499E000
|
unkown
|
page read and write
|
||
250000
|
unkown
|
page read and write
|
||
2A0000
|
unkown
|
page read and write
|
||
1F2A000
|
unkown
|
page read and write
|
||
250000
|
unkown
|
page read and write
|
||
902000
|
unkown image
|
page execute read
|
||
258000
|
unkown
|
page read and write
|
||
255000
|
unkown
|
page read and write
|
||
255000
|
unkown
|
page read and write
|
||
494D000
|
unkown
|
page read and write
|
||
255000
|
unkown
|
page read and write
|
||
1F90000
|
unkown
|
page read and write
|
||
255000
|
unkown
|
page read and write
|
||
8F0000
|
unkown
|
page read and write
|
||
4BE000
|
unkown
|
page read and write
|
||
4FBE000
|
unkown
|
page read and write
|
||
1FD0000
|
unkown
|
page read and write
|
||
270000
|
unkown
|
page read and write
|
||
55EE000
|
unkown
|
page read and write
|
||
1F40000
|
unkown
|
page read and write
|
||
1FAE000
|
unkown
|
page read and write
|
||
23C4000
|
unkown
|
page read and write
|
||
2395000
|
unkown
|
page read and write
|
||
250000
|
unkown
|
page read and write
|
||
8E0000
|
unkown
|
page read and write
|
||
483E000
|
unkown
|
page read and write
|
||
5BC000
|
unkown
|
page read and write
|
||
270000
|
unkown
|
page readonly
|
||
8F0000
|
unkown
|
page read and write
|
||
460000
|
unkown
|
page execute and read and write
|
||
282000
|
unkown
|
page read and write
|
||
290000
|
unkown
|
page read and write
|
||
520C000
|
unkown
|
page read and write
|
||
270000
|
unkown
|
page read and write
|
||
270000
|
unkown
|
page read and write
|
||
180000
|
heap private
|
page execute and read and write
|
||
8F0000
|
unkown
|
page read and write
|
||
134000
|
unkown
|
page read and write
|
||
5236000
|
unkown
|
page read and write
|
||
280000
|
unkown
|
page read and write
|
||
5203000
|
unkown
|
page read and write
|
||
1E00000
|
unkown
|
page read and write
|
||
1F20000
|
unkown
|
page read and write
|
||
280000
|
unkown
|
page readonly
|
||
8B3000
|
heap default
|
page read and write
|
||
89F000
|
heap default
|
page read and write
|
||
6620000
|
unkown
|
page read and write
|
||
515000
|
unkown
|
page read and write
|
||
290000
|
unkown
|
page read and write
|
||
2F0000
|
unkown
|
page read and write
|
||
255000
|
unkown
|
page read and write
|
||
264000
|
unkown
|
page read and write
|
||
255000
|
unkown
|
page read and write
|
||
285000
|
unkown
|
page read and write
|
||
72BD000
|
unkown
|
page read and write
|
||
5B0000
|
unkown
|
page read and write
|
||
2185000
|
unkown
|
page read and write
|
||
2170000
|
unkown
|
page read and write
|
||
760000
|
unkown
|
page readonly
|
||
2150000
|
unkown
|
page read and write
|
||
43F0000
|
unkown
|
page read and write
|
||
250000
|
unkown
|
page read and write
|
||
7E0000
|
heap default
|
page read and write
|
||
2180000
|
unkown
|
page read and write
|
||
8E1000
|
unkown
|
page read and write
|
||
40A000
|
unkown
|
page read and write
|
||
280000
|
unkown
|
page read and write
|
||
5450000
|
heap private
|
page read and write
|
||
337000
|
heap default
|
page read and write
|
||
255000
|
unkown
|
page read and write
|
||
7561000
|
unkown
|
page read and write
|
||
553E000
|
unkown
|
page read and write
|
||
250000
|
unkown
|
page read and write
|
||
280000
|
unkown
|
page read and write
|
||
255000
|
unkown
|
page read and write
|
||
8F0000
|
unkown
|
page read and write
|
||
2150000
|
unkown
|
page read and write
|
||
510000
|
unkown
|
page read and write
|
||
51FE000
|
unkown
|
page read and write
|
||
260000
|
unkown
|
page read and write
|
||
8E5000
|
unkown
|
page read and write
|
||
510000
|
unkown
|
page read and write
|
||
1F04000
|
unkown
|
page read and write
|
||
255000
|
unkown
|
page read and write
|
||
1F10000
|
unkown
|
page read and write
|
||
250000
|
unkown
|
page read and write
|
||
280000
|
unkown
|
page read and write
|
||
2120000
|
unkown
|
page read and write
|
||
1F50000
|
heap private
|
page read and write
|
||
804000
|
heap default
|
page read and write
|
||
250000
|
unkown
|
page read and write
|
||
162000
|
unkown
|
page read and write
|
||
2A5000
|
unkown
|
page read and write
|
||
5660000
|
heap private
|
page read and write
|
||
8F0000
|
unkown
|
page read and write
|
||
270000
|
unkown
|
page read and write
|
||
25B000
|
unkown
|
page read and write
|
||
4AA0000
|
unkown
|
page readonly
|
||
8FB000
|
unkown
|
page read and write
|
||
43DF000
|
unkown
|
page read and write
|
||
AFBE000
|
unkown
|
page read and write
|
||
3D0000
|
unkown
|
page readonly
|
||
7271000
|
unkown
|
page read and write
|
||
2392000
|
unkown
|
page read and write
|
||
48B0000
|
heap private
|
page execute and read and write
|
||
250000
|
unkown
|
page read and write
|
||
1EA0000
|
unkown
|
page read and write
|
||
23C0000
|
unkown
|
page read and write
|
||
5830000
|
unkown
|
page read and write
|
||
3E0000
|
unkown
|
page read and write
|
||
72E2000
|
unkown
|
page read and write
|
||
2160000
|
unkown
|
page read and write
|
||
250000
|
unkown
|
page read and write
|
||
510000
|
heap private
|
page read and write
|
||
510000
|
unkown
|
page read and write
|
||
21AC000
|
unkown
|
page read and write
|
||
8F0000
|
unkown
|
page read and write
|
||
510000
|
unkown
|
page read and write
|
||
330000
|
heap default
|
page read and write
|
||
2120000
|
unkown
|
page read and write
|
||
1F30000
|
unkown
|
page read and write
|
||
2025000
|
heap private
|
page read and write
|
||
280000
|
unkown
|
page read and write
|
||
4300000
|
unkown
|
page readonly
|
||
255000
|
unkown
|
page read and write
|
||
1FC0000
|
unkown
|
page read and write
|
||
8F0000
|
unkown
|
page read and write
|
||
4290000
|
unkown
|
page read and write
|
||
63DE000
|
unkown
|
page read and write
|
||
280000
|
unkown
|
page read and write
|
||
280000
|
unkown
|
page read and write
|
||
255000
|
unkown
|
page read and write
|
||
7270000
|
unkown
|
page read and write
|
||
2150000
|
unkown
|
page read and write
|
||
46ED000
|
unkown
|
page read and write
|
||
250000
|
unkown
|
page read and write
|
||
2140000
|
unkown
|
page read and write
|
||
4A9F000
|
unkown
|
page read and write
|
||
2120000
|
unkown
|
page readonly
|
||
9D0000
|
unkown image
|
page readonly
|
||
5236000
|
unkown
|
page read and write
|
||
5B9E000
|
unkown
|
page read and write
|
||
13D000
|
unkown
|
page execute and read and write
|
||
8E0000
|
unkown
|
page read and write
|
||
820000
|
heap default
|
page read and write
|
||
8E4000
|
unkown
|
page read and write
|
||
228E000
|
unkown
|
page read and write | page guard
|
||
8E0000
|
unkown
|
page read and write
|
||
4410000
|
unkown
|
page read and write
|
||
8E0000
|
unkown
|
page read and write
|
||
6920000
|
heap private
|
page read and write
|
||
42DE000
|
unkown
|
page read and write
|
||
2060000
|
heap private
|
page read and write
|
||
900000
|
unkown image
|
page readonly
|
||
8F0000
|
unkown
|
page read and write
|
||
1F20000
|
unkown
|
page read and write
|
||
23F0000
|
unkown
|
page read and write
|
||
2150000
|
unkown
|
page read and write
|
||
250000
|
unkown
|
page read and write
|
||
61CE000
|
unkown
|
page read and write | page guard
|
||
62CF000
|
unkown
|
page read and write
|
||
255000
|
unkown
|
page read and write
|
||
1F20000
|
unkown
|
page read and write
|
||
8F3000
|
unkown
|
page read and write
|
||
5203000
|
unkown
|
page read and write
|
||
20AF000
|
unkown
|
page read and write
|
||
258000
|
unkown
|
page read and write
|
||
B70000
|
unkown
|
page readonly
|
||
4D80000
|
unkown
|
page read and write
|
||
8E0000
|
unkown
|
page read and write
|
||
255000
|
unkown
|
page read and write
|
||
2150000
|
heap private
|
page execute and read and write
|
||
8F0000
|
unkown
|
page read and write
|
||
285000
|
unkown
|
page read and write
|
||
23EC000
|
unkown
|
page read and write
|
||
285000
|
unkown
|
page read and write
|
||
23D0000
|
unkown
|
page read and write
|
||
5037000
|
unkown
|
page read and write
|
||
2120000
|
unkown
|
page read and write
|
||
6A3E000
|
unkown
|
page read and write
|
||
5211000
|
unkown
|
page read and write
|
||
285000
|
unkown
|
page read and write
|
||
9D0000
|
unkown image
|
page readonly
|
||
5C0000
|
unkown
|
page read and write
|
||
2180000
|
unkown
|
page read and write
|
||
1DE7000
|
unkown
|
page read and write
|
||
1F90000
|
unkown
|
page read and write
|
||
280000
|
unkown
|
page read and write
|
||
1F30000
|
unkown
|
page read and write
|
||
4E0000
|
unkown
|
page readonly
|
||
56E000
|
unkown
|
page read and write
|
||
2FD000
|
unkown
|
page execute and read and write
|
||
900000
|
unkown image
|
page readonly
|
||
1F20000
|
unkown
|
page read and write
|
||
8F0000
|
unkown
|
page read and write
|
||
1FA0000
|
unkown
|
page read and write
|
There are 538 hidden memdumps, click here to show them.