Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
_2201S_BUSAN_HOCHIMINH_.xlsx
|
CDFV2 Encrypted
|
initial sample
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\ZAE7RW1P\.win32[1].exe
|
PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
|
downloaded
|
||
C:\Users\user\AppData\Local\Temp\xmtxpy.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\Desktop\~$_2201S_BUSAN_HOCHIMINH_.xlsx
|
data
|
dropped
|
||
C:\Users\Public\vbc.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\1582FF20.png
|
PNG image data, 139 x 180, 8-bit colormap, non-interlaced
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\3E8BE616.png
|
PNG image data, 139 x 180, 8-bit colormap, non-interlaced
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\4AB951BC.emf
|
Windows Enhanced Metafile (EMF) image data version 0x10000
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\611F4629.png
|
PNG image data, 413 x 220, 8-bit/color RGBA, non-interlaced
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\62ED731F.png
|
PNG image data, 139 x 180, 8-bit colormap, non-interlaced
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\902EBCC8.png
|
PNG image data, 458 x 211, 8-bit/color RGB, non-interlaced
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\92A0FADB.png
|
PNG image data, 413 x 220, 8-bit/color RGBA, non-interlaced
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\9C018985.png
|
PNG image data, 150 x 150, 8-bit/color RGBA, non-interlaced
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\9D560E8D.png
|
PNG image data, 139 x 180, 8-bit colormap, non-interlaced
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\A4FBAD23.png
|
PNG image data, 150 x 150, 8-bit/color RGBA, non-interlaced
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\B2EFEB2A.jpeg
|
JPEG image data, JFIF standard 1.01, aspect ratio, density 1x1, segment length 16, baseline, precision 8, 160x160, frames
3
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\DFF43294.jpeg
|
JPEG image data, JFIF standard 1.01, aspect ratio, density 1x1, segment length 16, baseline, precision 8, 160x160, frames
3
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\F6DBF9C2.png
|
PNG image data, 458 x 211, 8-bit/color RGB, non-interlaced
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\2v0cucir72x
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\npotbzd
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\nsk9C03.tmp
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\~DF4C8DE484D23B018C.TMP
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\~DF4CA76D9E63A218F3.TMP
|
CDFV2 Encrypted
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\~DF77B28016FA4D6C0D.TMP
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\~DFAC55491B3B868135.TMP
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\CF97F5\5879F5.exe (copy)
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\CF97F5\5879F5.lck
|
very short file (no magic)
|
dropped
|
||
C:\Users\user\AppData\Roaming\Microsoft\Crypto\RSA\S-1-5-21-966771315-3019405637-367336477-1006\f554348b930ff81505ce47f7c6b7d232_ea860e7a-a87f-4a88-92ef-38f744458171
|
data
|
dropped
|
There are 18 hidden files, click here to show them.
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE
|
"C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE" -Embedding
|
||
C:\Users\Public\vbc.exe
|
"C:\Users\Public\vbc.exe"
|
||
C:\Users\user\AppData\Local\Temp\xmtxpy.exe
|
C:\Users\user\AppData\Local\Temp\xmtxpy.exe C:\Users\user\AppData\Local\Temp\npotbzd
|
||
C:\Users\user\AppData\Local\Temp\xmtxpy.exe
|
C:\Users\user\AppData\Local\Temp\xmtxpy.exe C:\Users\user\AppData\Local\Temp\npotbzd
|
||
C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
|
"C:\Program Files\Microsoft Office\Office14\EXCEL.EXE" /automation -Embedding
|
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
http://198.46.132.195/windowSSH/.win32.exe
|
198.46.132.195
|
||
http://kbfvzoboss.bid/alien/fre.php
|
|||
http://alphastand.win/alien/fre.php
|
|||
http://alphastand.trade/alien/fre.php
|
|||
http://alphastand.top/alien/fre.php
|
|||
http://asiaoil.bar//bobby/five/fre.php
|
172.67.197.66
|
||
http://nsis.sf.net/NSIS_Error
|
unknown
|
||
http://nsis.sf.net/NSIS_ErrorError
|
unknown
|
||
http://www.ibsensoftware.com/
|
unknown
|
Domains
Name
|
IP
|
Malicious
|
|
---|---|---|---|
asiaoil.bar
|
172.67.197.66
|
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
198.46.132.195
|
unknown
|
United States
|
||
104.21.49.244
|
unknown
|
United States
|
||
172.67.197.66
|
asiaoil.bar
|
United States
|
Registry
Path
|
Value
|
Malicious
|
|
---|---|---|---|
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\Resiliency\StartupItems
|
3"-
|
||
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel
|
MTTT
|
||
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\ReviewCycle
|
ReviewToken
|
||
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\Resiliency\DocumentRecovery\2DAF4
|
2DAF4
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109D30000000100000000F01FEC\Usage
|
VBAFiles
|
||
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\Resiliency\StartupItems
|
**-
|
||
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\Resiliency\DocumentRecovery\326B3
|
326B3
|
||
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\Resiliency\DocumentRecovery\3365C
|
3365C
|
||
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\Place MRU
|
Max Display
|
||
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\Place MRU
|
Item 1
|
||
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
|
Max Display
|
||
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
|
Item 1
|
||
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
|
Item 2
|
||
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
|
Item 3
|
||
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
|
Item 4
|
||
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
|
Item 5
|
||
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
|
Item 6
|
||
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
|
Item 7
|
||
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
|
Item 8
|
||
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
|
Item 9
|
||
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
|
Item 10
|
||
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
|
Item 11
|
||
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
|
Item 12
|
||
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
|
Item 13
|
||
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
|
Item 14
|
||
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
|
Item 15
|
||
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
|
Item 16
|
||
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
|
Item 17
|
||
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
|
Item 18
|
||
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
|
Item 19
|
||
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
|
Item 20
|
||
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
|
Item 21
|
||
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\Security\Trusted Documents
|
LastPurgeTime
|
||
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\LanguageResources\EnabledLanguages
|
1033
|
||
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\LanguageResources\EnabledLanguages
|
1033
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109D30000000100000000F01FEC\Usage
|
EXCELFiles
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109D30000000100000000F01FEC\Usage
|
ProductFiles
|
||
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\Resiliency\DocumentRecovery\326B3
|
326B3
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109E60090400100000000F01FEC\Usage
|
EquationEditorFilesIntl_1033
|
||
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections
|
SavedLegacySettings
|
There are 30 hidden registries, click here to show them.
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
400000
|
remote allocation
|
page execute and read and write
|
||
130000
|
trusted library allocation
|
page read and write
|
||
400000
|
remote allocation
|
page execute and read and write
|
||
400000
|
remote allocation
|
page execute and read and write
|
||
400000
|
remote allocation
|
page execute and read and write
|
||
400000
|
remote allocation
|
page execute and read and write
|
||
8A1000
|
unkown
|
page execute read
|
||
6CD000
|
trusted library allocation
|
page read and write
|
||
2619000
|
trusted library allocation
|
page read and write
|
||
720000
|
trusted library allocation
|
page read and write
|
||
8C2000
|
unkown
|
page readonly
|
||
320000
|
heap
|
page read and write
|
||
18B000
|
stack
|
page read and write
|
||
24FE000
|
stack
|
page read and write
|
||
8A0000
|
unkown
|
page readonly
|
||
B11000
|
heap
|
page read and write
|
||
8B9000
|
unkown
|
page readonly
|
||
1E60000
|
heap
|
page read and write
|
||
24D7000
|
trusted library allocation
|
page read and write
|
||
24D4000
|
trusted library allocation
|
page read and write
|
||
877000
|
heap
|
page read and write
|
||
8A1000
|
unkown
|
page execute read
|
||
2500000
|
trusted library allocation
|
page read and write
|
||
401000
|
unkown
|
page execute read
|
||
37E000
|
stack
|
page read and write
|
||
8A1000
|
unkown
|
page execute read
|
||
5F0000
|
trusted library allocation
|
page read and write
|
||
2830000
|
trusted library allocation
|
page read and write
|
||
23D0000
|
trusted library allocation
|
page read and write
|
||
8A0000
|
unkown
|
page readonly
|
||
2540000
|
trusted library allocation
|
page read and write
|
||
8BE000
|
unkown
|
page write copy
|
||
2630000
|
trusted library allocation
|
page read and write
|
||
8B9000
|
unkown
|
page readonly
|
||
2830000
|
trusted library allocation
|
page read and write
|
||
23E0000
|
trusted library allocation
|
page read and write
|
||
AC7000
|
heap
|
page read and write
|
||
24D7000
|
trusted library allocation
|
page read and write
|
||
5F0000
|
trusted library allocation
|
page read and write
|
||
24D1000
|
trusted library allocation
|
page read and write
|
||
8A0000
|
unkown
|
page readonly
|
||
8B9000
|
unkown
|
page readonly
|
||
23E0000
|
trusted library allocation
|
page read and write
|
||
870000
|
heap
|
page read and write
|
||
409000
|
unkown
|
page read and write
|
||
421000
|
unkown
|
page read and write
|
||
8BE000
|
unkown
|
page write copy
|
||
8B9000
|
unkown
|
page readonly
|
||
302000
|
heap
|
page read and write
|
||
8A1000
|
unkown
|
page execute read
|
||
6CA000
|
trusted library allocation
|
page read and write
|
||
8A1000
|
unkown
|
page execute read
|
||
24D4000
|
trusted library allocation
|
page read and write
|
||
8A1000
|
unkown
|
page execute read
|
||
5F0000
|
trusted library allocation
|
page read and write
|
||
8A1000
|
unkown
|
page execute read
|
||
326000
|
heap
|
page read and write
|
||
24D7000
|
trusted library allocation
|
page read and write
|
||
8A0000
|
unkown
|
page readonly
|
||
8C2000
|
unkown
|
page readonly
|
||
8C2000
|
unkown
|
page readonly
|
||
740000
|
heap
|
page read and write
|
||
6A0000
|
heap
|
page read and write
|
||
8A1000
|
unkown
|
page execute read
|
||
8C2000
|
unkown
|
page readonly
|
||
24E0000
|
trusted library allocation
|
page read and write
|
||
8CF000
|
heap
|
page read and write
|
||
8BE000
|
unkown
|
page write copy
|
||
610000
|
heap
|
page read and write
|
||
42C000
|
unkown
|
page readonly
|
||
170000
|
heap
|
page read and write
|
||
100000
|
trusted library allocation
|
page read and write
|
||
8C2000
|
unkown
|
page readonly
|
||
8C2000
|
unkown
|
page readonly
|
||
8BE000
|
unkown
|
page write copy
|
||
660000
|
heap
|
page read and write
|
||
120000
|
trusted library allocation
|
page execute and read and write
|
||
8C2000
|
unkown
|
page readonly
|
||
8BE000
|
unkown
|
page write copy
|
||
2540000
|
trusted library allocation
|
page read and write
|
||
24D1000
|
trusted library allocation
|
page read and write
|
||
5F0000
|
trusted library allocation
|
page read and write
|
||
8A0000
|
unkown
|
page readonly
|
||
AFE000
|
heap
|
page read and write
|
||
8C2000
|
unkown
|
page readonly
|
||
4A0000
|
remote allocation
|
page execute and read and write
|
||
2C7E000
|
stack
|
page read and write
|
||
4F0000
|
heap
|
page read and write
|
||
23E0000
|
trusted library allocation
|
page read and write
|
||
77E000
|
stack
|
page read and write
|
||
24D1000
|
trusted library allocation
|
page read and write
|
||
8A1000
|
unkown
|
page execute read
|
||
24E0000
|
trusted library allocation
|
page read and write
|
||
8B9000
|
unkown
|
page readonly
|
||
4F7000
|
heap
|
page read and write
|
||
2B0000
|
trusted library allocation
|
page read and write
|
||
8C2000
|
unkown
|
page readonly
|
||
8B9000
|
unkown
|
page readonly
|
||
400000
|
unkown
|
page readonly
|
||
24C0000
|
trusted library allocation
|
page read and write
|
||
8B9000
|
unkown
|
page readonly
|
||
5F0000
|
trusted library allocation
|
page read and write
|
||
8B9000
|
unkown
|
page readonly
|
||
23D0000
|
trusted library allocation
|
page read and write
|
||
24D7000
|
trusted library allocation
|
page read and write
|
||
24D1000
|
trusted library allocation
|
page read and write
|
||
8C2000
|
unkown
|
page readonly
|
||
8B9000
|
unkown
|
page readonly
|
||
24C0000
|
trusted library allocation
|
page read and write
|
||
100000
|
heap
|
page read and write
|
||
245F000
|
stack
|
page read and write
|
||
401000
|
unkown
|
page execute read
|
||
40B000
|
unkown
|
page read and write
|
||
24D7000
|
trusted library allocation
|
page read and write
|
||
8C2000
|
unkown
|
page readonly
|
||
8C2000
|
unkown
|
page readonly
|
||
6CD000
|
trusted library allocation
|
page read and write
|
||
2AA000
|
stack
|
page read and write
|
||
2540000
|
trusted library allocation
|
page read and write
|
||
400000
|
remote allocation
|
page execute and read and write
|
||
2AE000
|
stack
|
page read and write
|
||
8BE000
|
unkown
|
page write copy
|
||
400000
|
unkown
|
page readonly
|
||
3C0000
|
heap
|
page read and write
|
||
2E4000
|
heap
|
page read and write
|
||
24D1000
|
trusted library allocation
|
page read and write
|
||
6CA000
|
trusted library allocation
|
page read and write
|
||
8B9000
|
unkown
|
page readonly
|
||
2E0000
|
heap
|
page read and write
|
||
2600000
|
trusted library allocation
|
page read and write
|
||
8A0000
|
unkown
|
page readonly
|
||
24E0000
|
trusted library allocation
|
page read and write
|
||
22C000
|
stack
|
page read and write
|
||
8A1000
|
unkown
|
page execute read
|
||
8A1000
|
unkown
|
page execute read
|
||
2540000
|
trusted library allocation
|
page read and write
|
||
3FC000
|
stack
|
page read and write
|
||
23D0000
|
trusted library allocation
|
page read and write
|
||
24E0000
|
trusted library allocation
|
page read and write
|
||
8A0000
|
unkown
|
page readonly
|
||
313F000
|
stack
|
page read and write
|
||
8A1000
|
unkown
|
page execute read
|
||
49F000
|
remote allocation
|
page execute and read and write
|
||
5F0000
|
trusted library allocation
|
page read and write
|
||
8BE000
|
unkown
|
page write copy
|
||
24D1000
|
trusted library allocation
|
page read and write
|
||
323F000
|
stack
|
page read and write
|
||
6CD000
|
trusted library allocation
|
page read and write
|
||
8BE000
|
unkown
|
page write copy
|
||
24D4000
|
trusted library allocation
|
page read and write
|
||
24D7000
|
trusted library allocation
|
page read and write
|
||
2613000
|
trusted library allocation
|
page read and write
|
||
23D0000
|
trusted library allocation
|
page read and write
|
||
24C0000
|
trusted library allocation
|
page read and write
|
||
AAE000
|
stack
|
page read and write
|
||
4A0000
|
remote allocation
|
page execute and read and write
|
||
8B000
|
stack
|
page read and write
|
||
8B9000
|
unkown
|
page readonly
|
||
23D0000
|
trusted library allocation
|
page read and write
|
||
24C0000
|
trusted library allocation
|
page read and write
|
||
24D7000
|
trusted library allocation
|
page read and write
|
||
6CA000
|
trusted library allocation
|
page read and write
|
||
49B000
|
remote allocation
|
page execute and read and write
|
||
AC0000
|
heap
|
page read and write
|
||
2FB0000
|
heap
|
page read and write
|
||
2830000
|
trusted library allocation
|
page read and write
|
||
400000
|
remote allocation
|
page execute and read and write
|
||
2540000
|
trusted library allocation
|
page read and write
|
||
2BEF000
|
stack
|
page read and write
|
||
8A0000
|
unkown
|
page readonly
|
||
8B9000
|
unkown
|
page readonly
|
||
8BE000
|
unkown
|
page write copy
|
||
14A000
|
trusted library allocation
|
page read and write
|
||
23E0000
|
trusted library allocation
|
page read and write
|
||
14B000
|
stack
|
page read and write
|
||
8BE000
|
unkown
|
page write copy
|
||
8BF000
|
heap
|
page read and write
|
||
2540000
|
trusted library allocation
|
page read and write
|
||
223E000
|
stack
|
page read and write
|
||
8BE000
|
unkown
|
page write copy
|
||
6CD000
|
trusted library allocation
|
page read and write
|
||
407000
|
unkown
|
page readonly
|
||
8C2000
|
unkown
|
page readonly
|
||
6CA000
|
trusted library allocation
|
page read and write
|
||
10000
|
heap
|
page read and write
|
||
24E0000
|
trusted library allocation
|
page read and write
|
||
8A0000
|
unkown
|
page readonly
|
||
24D1000
|
trusted library allocation
|
page read and write
|
||
2830000
|
trusted library allocation
|
page read and write
|
||
24C0000
|
trusted library allocation
|
page read and write
|
||
8B9000
|
unkown
|
page readonly
|
||
8BE000
|
unkown
|
page write copy
|
||
8A0000
|
unkown
|
page readonly
|
||
6CD000
|
trusted library allocation
|
page read and write
|
||
6CA000
|
trusted library allocation
|
page read and write
|
||
8A0000
|
unkown
|
page readonly
|
||
668000
|
heap
|
page read and write
|
||
23D0000
|
trusted library allocation
|
page read and write
|
||
6CD000
|
trusted library allocation
|
page read and write
|
||
24D4000
|
trusted library allocation
|
page read and write
|
||
2470000
|
heap
|
page read and write
|
||
10000
|
heap
|
page read and write
|
||
24D4000
|
trusted library allocation
|
page read and write
|
||
8A0000
|
unkown
|
page readonly
|
||
23D0000
|
trusted library allocation
|
page read and write
|
||
2540000
|
trusted library allocation
|
page read and write
|
||
8A1000
|
unkown
|
page execute read
|
||
720000
|
trusted library allocation
|
page read and write
|
||
514000
|
heap
|
page read and write
|
||
8A0000
|
unkown
|
page readonly
|
||
24C0000
|
trusted library allocation
|
page read and write
|
||
23E0000
|
trusted library allocation
|
page read and write
|
||
8BE000
|
unkown
|
page read and write
|
||
8A0000
|
unkown
|
page readonly
|
||
2DEF000
|
stack
|
page read and write
|
||
8BE000
|
unkown
|
page write copy
|
||
8B9000
|
unkown
|
page readonly
|
||
8C2000
|
unkown
|
page readonly
|
||
AE4000
|
heap
|
page read and write
|
||
42C000
|
unkown
|
page readonly
|
||
23E0000
|
trusted library allocation
|
page read and write
|
||
24D4000
|
trusted library allocation
|
page read and write
|
||
3200000
|
heap
|
page read and write
|
||
83E000
|
stack
|
page read and write
|
||
190000
|
heap
|
page read and write
|
||
2CD000
|
trusted library allocation
|
page read and write
|
||
24E0000
|
trusted library allocation
|
page read and write
|
||
894000
|
heap
|
page read and write
|
||
24E0000
|
trusted library allocation
|
page read and write
|
||
6CA000
|
trusted library allocation
|
page read and write
|
||
10000
|
heap
|
page read and write
|
||
6CD000
|
trusted library allocation
|
page read and write
|
||
6CA000
|
trusted library allocation
|
page read and write
|
||
407000
|
unkown
|
page readonly
|
||
107000
|
trusted library allocation
|
page read and write
|
||
429000
|
unkown
|
page read and write
|
||
686000
|
heap
|
page read and write
|
||
5F0000
|
trusted library allocation
|
page read and write
|
||
409000
|
unkown
|
page write copy
|
||
23E0000
|
trusted library allocation
|
page read and write
|
||
8A1000
|
unkown
|
page execute read
|
||
24C0000
|
trusted library allocation
|
page read and write
|
||
24D4000
|
trusted library allocation
|
page read and write
|
||
282F000
|
stack
|
page read and write
|
||
196000
|
heap
|
page read and write
|
||
2F70000
|
heap
|
page read and write
|
There are 236 hidden memdumps, click here to show them.