Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
72EED30398363-0983BNDJ0398763536.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
|
initial sample
|
||
C:\Users\user\AppData\Local\Temp\ARMOURY CRATE Message.VisualElementsManifest.xml
|
ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\Airplane_14.bmp
|
JPEG image data, JFIF standard 1.01, resolution (DPI), density 100x100, segment length 16, Exif Standard: [TIFF image data,
big-endian, direntries=3], baseline, precision 8, 110x110, frames 3
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\MapiProxy.dll
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\Microsoft.Practices.ObjectBuilder2.dll
|
PE32+ executable (DLL) (console) x86-64 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\Sports-Wallpapers-1.jpg
|
JPEG image data, JFIF standard 1.01, resolution (DPI), density 96x96, segment length 16, baseline, precision 8, 1280x786,
frames 3
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\TREDIVER.Und
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\format-justify-center-symbolic.svg
|
SVG Scalable Vector Graphics image
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\fzshellext_64.dll
|
PE32+ executable (DLL) (console) x86-64 (stripped to external PDB), for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\lang-1071.dll
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\mail-reply-all-symbolic.symbolic.png
|
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\media-playback-start-symbolic.symbolic.png
|
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\network-no-route-symbolic.svg
|
SVG Scalable Vector Graphics image
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\nsw5376.tmp\System.dll
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
modified
|
||
C:\Users\user\AppData\Local\Temp\system-reboot-symbolic.symbolic.png
|
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
|
dropped
|
There are 5 hidden files, click here to show them.
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\72EED30398363-0983BNDJ0398763536.exe
|
"C:\Users\user\Desktop\72EED30398363-0983BNDJ0398763536.exe"
|
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
http://crl.sectigo.com/SectigoRSACodeSigningCA.crl0s
|
unknown
|
||
http://www.avast.com0/
|
unknown
|
||
http://nsis.sf.net/NSIS_ErrorError
|
unknown
|
||
http://ocsp.sectigo.com0
|
unknown
|
||
http://crt.sectigo.com/SectigoRSACodeSigningCA.crt0#
|
unknown
|
||
https://mozilla.org0
|
unknown
|
||
https://sectigo.com/CPS0C
|
unknown
|
Registry
Path
|
Value
|
Malicious
|
|
---|---|---|---|
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Uninstall\FLOKDYRS
|
Fyrvrkeres
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\riffelgangens
|
Spydkasters198
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Eyebath\Qoph28
|
Expand String Value
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Specularity211\haandholdt
|
Screwdriver44
|
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
3060000
|
direct allocation
|
page execute and read and write
|
||
20F67894000
|
heap
|
page read and write
|
||
20F6CD30000
|
trusted library allocation
|
page read and write
|
||
3F4017F000
|
stack
|
page read and write
|
||
22D91802000
|
heap
|
page read and write
|
||
1485E03D000
|
heap
|
page read and write
|
||
22D9182A000
|
heap
|
page read and write
|
||
2BCF05E0000
|
trusted library allocation
|
page read and write
|
||
2B786802000
|
trusted library allocation
|
page read and write
|
||
D15EA7F000
|
stack
|
page read and write
|
||
20F67890000
|
heap
|
page read and write
|
||
1D91CB60000
|
trusted library allocation
|
page read and write
|
||
1D91D78B000
|
heap
|
page read and write
|
||
205B2526000
|
heap
|
page read and write
|
||
1F44A0E0000
|
heap
|
page read and write
|
||
1D91D785000
|
heap
|
page read and write
|
||
4011B78000
|
stack
|
page read and write
|
||
1485E063000
|
heap
|
page read and write
|
||
22DB7002000
|
trusted library allocation
|
page read and write
|
||
1485E031000
|
heap
|
page read and write
|
||
1D91D774000
|
heap
|
page read and write
|
||
1D91D78A000
|
heap
|
page read and write
|
||
1D91D7A7000
|
heap
|
page read and write
|
||
205B252E000
|
heap
|
page read and write
|
||
1D91DC18000
|
heap
|
page read and write
|
||
1D91D77E000
|
heap
|
page read and write
|
||
8F242FC000
|
stack
|
page read and write
|
||
1485E06A000
|
heap
|
page read and write
|
||
1DB6AB02000
|
heap
|
page read and write
|
||
5FF000
|
heap
|
page read and write
|
||
22DB6610000
|
heap
|
page read and write
|
||
D15E57F000
|
stack
|
page read and write
|
||
1D91D782000
|
heap
|
page read and write
|
||
401000
|
unkown
|
page execute read
|
||
1D91D78E000
|
heap
|
page read and write
|
||
1EF81540000
|
heap
|
page read and write
|
||
205B2545000
|
heap
|
page read and write
|
||
20F6CEF0000
|
trusted library allocation
|
page read and write
|
||
1485E05A000
|
heap
|
page read and write
|
||
1D91D602000
|
heap
|
page read and write
|
||
925B3FF000
|
stack
|
page read and write
|
||
2B786026000
|
heap
|
page read and write
|
||
1D91D78C000
|
heap
|
page read and write
|
||
2394CA00000
|
heap
|
page read and write
|
||
2303EA64000
|
heap
|
page read and write
|
||
205B2524000
|
heap
|
page read and write
|
||
2BCF0779000
|
heap
|
page read and write
|
||
2BCF0730000
|
heap
|
page read and write
|
||
1D91D77E000
|
heap
|
page read and write
|
||
20F678A0000
|
heap
|
page read and write
|
||
22A60C00000
|
heap
|
page read and write
|
||
B32D37F000
|
stack
|
page read and write
|
||
1D91D7BA000
|
heap
|
page read and write
|
||
2394CA6E000
|
heap
|
page read and write
|
||
1D91D779000
|
heap
|
page read and write
|
||
20F6D000000
|
heap
|
page read and write
|
||
20F68113000
|
heap
|
page read and write
|
||
2303E8D0000
|
heap
|
page read and write
|
||
19D4647D000
|
heap
|
page read and write
|
||
22DB6900000
|
heap
|
page read and write
|
||
22DB6670000
|
heap
|
page read and write
|
||
22D91865000
|
heap
|
page read and write
|
||
B32D577000
|
stack
|
page read and write
|
||
1F44A263000
|
heap
|
page read and write
|
||
619000
|
heap
|
page read and write
|
||
EAF4EFD000
|
stack
|
page read and write
|
||
2394D402000
|
heap
|
page read and write
|
||
20F6D100000
|
heap
|
page read and write
|
||
2280000
|
heap
|
page read and write
|
||
22A60B80000
|
trusted library allocation
|
page read and write
|
||
1D91D7C5000
|
heap
|
page read and write
|
||
925BBFF000
|
stack
|
page read and write
|
||
1D91D798000
|
heap
|
page read and write
|
||
3F4007E000
|
stack
|
page read and write
|
||
1D91D7CF000
|
heap
|
page read and write
|
||
20F68158000
|
heap
|
page read and write
|
||
1EF8165C000
|
heap
|
page read and write
|
||
20F68100000
|
heap
|
page read and write
|
||
1D91D775000
|
heap
|
page read and write
|
||
1D91CD08000
|
heap
|
page read and write
|
||
1D91D782000
|
heap
|
page read and write
|
||
1D91D77A000
|
heap
|
page read and write
|
||
1D91D77E000
|
heap
|
page read and write
|
||
22D91710000
|
heap
|
page read and write
|
||
B32D77F000
|
stack
|
page read and write
|
||
1D91D760000
|
heap
|
page read and write
|
||
22A60C29000
|
heap
|
page read and write
|
||
19D46486000
|
heap
|
page read and write
|
||
2B786029000
|
heap
|
page read and write
|
||
8F2427E000
|
stack
|
page read and write
|
||
2394CAC3000
|
heap
|
page read and write
|
||
22DB6888000
|
heap
|
page read and write
|
||
D15E47C000
|
stack
|
page read and write
|
||
1D91D76D000
|
heap
|
page read and write
|
||
925B8F7000
|
stack
|
page read and write
|
||
20F678A9000
|
heap
|
page read and write
|
||
E3E0DF7000
|
stack
|
page read and write
|
||
1D91D796000
|
heap
|
page read and write
|
||
22D91800000
|
heap
|
page read and write
|
||
1D91D780000
|
heap
|
page read and write
|
||
20F6CEC0000
|
trusted library allocation
|
page read and write
|
||
22A60AF0000
|
heap
|
page read and write
|
||
20F6D330000
|
trusted library allocation
|
page read and write
|
||
1D91D7EA000
|
heap
|
page read and write
|
||
1D91D78A000
|
heap
|
page read and write
|
||
1F44A302000
|
heap
|
page read and write
|
||
20F68D20000
|
trusted library allocation
|
page read and write
|
||
422000
|
unkown
|
page read and write
|
||
22D91857000
|
heap
|
page read and write
|
||
925B37F000
|
stack
|
page read and write
|
||
20F6CDA0000
|
trusted library allocation
|
page read and write
|
||
1D91D490000
|
remote allocation
|
page read and write
|
||
2303E8C0000
|
heap
|
page read and write
|
||
3F4027F000
|
stack
|
page read and write
|
||
3D1317A000
|
stack
|
page read and write
|
||
20F6CF00000
|
trusted library allocation
|
page read and write
|
||
8F2417E000
|
stack
|
page read and write
|
||
2B786102000
|
heap
|
page read and write
|
||
925BAFF000
|
stack
|
page read and write
|
||
40113DE000
|
stack
|
page read and write
|
||
20F67907000
|
heap
|
page read and write
|
||
40112DB000
|
stack
|
page read and write
|
||
2BCF0860000
|
heap
|
page read and write
|
||
22DB6855000
|
heap
|
page read and write
|
||
217E000
|
stack
|
page read and write
|
||
22A60D13000
|
heap
|
page read and write
|
||
22A60C54000
|
heap
|
page read and write
|
||
1D91D77E000
|
heap
|
page read and write
|
||
205B2516000
|
heap
|
page read and write
|
||
1485E06E000
|
heap
|
page read and write
|
||
22A60C71000
|
heap
|
page read and write
|
||
97392FB000
|
stack
|
page read and write
|
||
22D917A0000
|
trusted library allocation
|
page read and write
|
||
1D91D7AB000
|
heap
|
page read and write
|
||
2394CAE1000
|
heap
|
page read and write
|
||
20F6CEF0000
|
trusted library allocation
|
page read and write
|
||
1485E046000
|
heap
|
page read and write
|
||
613000
|
heap
|
page read and write
|
||
22D91848000
|
heap
|
page read and write
|
||
1D91D7CF000
|
heap
|
page read and write
|
||
20F6D0AF000
|
heap
|
page read and write
|
||
97393F7000
|
stack
|
page read and write
|
||
20F6CFF0000
|
trusted library allocation
|
page read and write
|
||
1D91D78A000
|
heap
|
page read and write
|
||
EA0497A000
|
stack
|
page read and write
|
||
1D91CC13000
|
heap
|
page read and write
|
||
22DB683C000
|
heap
|
page read and write
|
||
1D91D798000
|
heap
|
page read and write
|
||
1D91CCAB000
|
heap
|
page read and write
|
||
20F68102000
|
heap
|
page read and write
|
||
732A0000
|
unkown
|
page readonly
|
||
E3E07DC000
|
stack
|
page read and write
|
||
1D91D774000
|
heap
|
page read and write
|
||
1D91D7B8000
|
heap
|
page read and write
|
||
4011877000
|
stack
|
page read and write
|
||
22D91858000
|
heap
|
page read and write
|
||
1485DDE0000
|
heap
|
page read and write
|
||
20F6CEE4000
|
trusted library allocation
|
page read and write
|
||
2B785E40000
|
heap
|
page read and write
|
||
20F6D062000
|
heap
|
page read and write
|
||
22DB687D000
|
heap
|
page read and write
|
||
29465FF000
|
stack
|
page read and write
|
||
20F676C0000
|
heap
|
page read and write
|
||
40908FE000
|
stack
|
page read and write
|
||
20F678FB000
|
heap
|
page read and write
|
||
2BCF0775000
|
heap
|
page read and write
|
||
1EF81667000
|
heap
|
page read and write
|
||
19D46429000
|
heap
|
page read and write
|
||
1D91D774000
|
heap
|
page read and write
|
||
19D46400000
|
heap
|
page read and write
|
||
1D91D7DB000
|
heap
|
page read and write
|
||
1D91CC4D000
|
heap
|
page read and write
|
||
1DB6A8E0000
|
heap
|
page read and write
|
||
1D91D79D000
|
heap
|
page read and write
|
||
1D91D490000
|
remote allocation
|
page read and write
|
||
409097E000
|
stack
|
page read and write
|
||
1D91DC1A000
|
heap
|
page read and write
|
||
1485E045000
|
heap
|
page read and write
|
||
19D4643C000
|
heap
|
page read and write
|
||
2B785EB0000
|
heap
|
page read and write
|
||
2303E930000
|
heap
|
page read and write
|
||
1485E04E000
|
heap
|
page read and write
|
||
20F6CEE1000
|
trusted library allocation
|
page read and write
|
||
1DB6A9A0000
|
remote allocation
|
page read and write
|
||
1485E029000
|
heap
|
page read and write
|
||
B32D67F000
|
stack
|
page read and write
|
||
19D46513000
|
heap
|
page read and write
|
||
EAF4D7D000
|
stack
|
page read and write
|
||
97395FF000
|
stack
|
page read and write
|
||
474000
|
unkown
|
page readonly
|
||
20F6CECE000
|
trusted library allocation
|
page read and write
|
||
20F6D102000
|
heap
|
page read and write
|
||
20F6D010000
|
trusted library allocation
|
page read and write
|
||
8F2467E000
|
stack
|
page read and write
|
||
925B7FB000
|
stack
|
page read and write
|
||
1DB6AA02000
|
heap
|
page read and write
|
||
1D91D7A9000
|
heap
|
page read and write
|
||
2284000
|
heap
|
page read and write
|
||
1D91CCE9000
|
heap
|
page read and write
|
||
60D000
|
heap
|
page read and write
|
||
20F6D055000
|
heap
|
page read and write
|
||
2303EA57000
|
heap
|
page read and write
|
||
925B9FD000
|
stack
|
page read and write
|
||
1485E802000
|
trusted library allocation
|
page read and write
|
||
1D91CB30000
|
heap
|
page read and write
|
||
29464FA000
|
stack
|
page read and write
|
||
1D91D782000
|
heap
|
page read and write
|
||
2BCF1680000
|
trusted library allocation
|
page read and write
|
||
1F44A289000
|
heap
|
page read and write
|
||
22A60C77000
|
heap
|
page read and write
|
||
1D91CC56000
|
heap
|
page read and write
|
||
22D93402000
|
trusted library allocation
|
page read and write
|
||
3F4047C000
|
stack
|
page read and write
|
||
40A000
|
unkown
|
page write copy
|
||
205B2522000
|
heap
|
page read and write
|
||
20F68002000
|
heap
|
page read and write
|
||
1485E044000
|
heap
|
page read and write
|
||
1D91DC02000
|
heap
|
page read and write
|
||
29466FA000
|
stack
|
page read and write
|
||
22DB6829000
|
heap
|
page read and write
|
||
1F44A276000
|
heap
|
page read and write
|
||
22DB6600000
|
heap
|
page read and write
|
||
20F6CF04000
|
trusted library allocation
|
page read and write
|
||
1F44A200000
|
heap
|
page read and write
|
||
20F67879000
|
heap
|
page read and write
|
||
1D91D78A000
|
heap
|
page read and write
|
||
8F2457D000
|
stack
|
page read and write
|
||
2394D500000
|
heap
|
page read and write
|
||
8F2477D000
|
stack
|
page read and write
|
||
2394C9D0000
|
heap
|
page read and write
|
||
29469FF000
|
stack
|
page read and write
|
||
20F67914000
|
heap
|
page read and write
|
||
2BCF16E0000
|
trusted library allocation
|
page read and write
|
||
2303EB02000
|
heap
|
page read and write
|
||
1D91DC02000
|
heap
|
page read and write
|
||
1D91D797000
|
heap
|
page read and write
|
||
570000
|
heap
|
page read and write
|
||
2394CA66000
|
heap
|
page read and write
|
||
732A6000
|
unkown
|
page readonly
|
||
20F67877000
|
heap
|
page read and write
|
||
435000
|
unkown
|
page read and write
|
||
19D4644C000
|
heap
|
page read and write
|
||
1D91D7A7000
|
heap
|
page read and write
|
||
19D462F0000
|
heap
|
page read and write
|
||
20F6CF00000
|
trusted library allocation
|
page read and write
|
||
19D46470000
|
heap
|
page read and write
|
||
3560000
|
trusted library allocation
|
page read and write
|
||
19D46413000
|
heap
|
page read and write
|
||
29468FF000
|
stack
|
page read and write
|
||
1D91DC02000
|
heap
|
page read and write
|
||
1F44A308000
|
heap
|
page read and write
|
||
610000
|
heap
|
page read and write
|
||
925B2FB000
|
stack
|
page read and write
|
||
1D91D772000
|
heap
|
page read and write
|
||
8F23BAB000
|
stack
|
page read and write
|
||
22D91700000
|
heap
|
page read and write
|
||
205B2511000
|
heap
|
page read and write
|
||
1DB6A9A0000
|
remote allocation
|
page read and write
|
||
1D91D72E000
|
heap
|
page read and write
|
||
1D91D782000
|
heap
|
page read and write
|
||
E3E0FFE000
|
stack
|
page read and write
|
||
EAF4AFC000
|
stack
|
page read and write
|
||
5345B7E000
|
stack
|
page read and write
|
||
1485E07F000
|
heap
|
page read and write
|
||
1D91D774000
|
heap
|
page read and write
|
||
408000
|
unkown
|
page readonly
|
||
3570000
|
trusted library allocation
|
page read and write
|
||
20F6CF90000
|
trusted library allocation
|
page read and write
|
||
1485E058000
|
heap
|
page read and write
|
||
EAF4DFF000
|
stack
|
page read and write
|
||
1EF82002000
|
trusted library allocation
|
page read and write
|
||
20F6CEC0000
|
trusted library allocation
|
page read and write
|
||
8F23FFC000
|
stack
|
page read and write
|
||
1D91D7DB000
|
heap
|
page read and write
|
||
278D000
|
trusted library allocation
|
page read and write
|
||
1D91D78E000
|
heap
|
page read and write
|
||
1485E062000
|
heap
|
page read and write
|
||
20F67829000
|
heap
|
page read and write
|
||
4E0000
|
trusted library allocation
|
page read and write
|
||
EA04A7E000
|
stack
|
page read and write
|
||
1D91D774000
|
heap
|
page read and write
|
||
4090BFF000
|
stack
|
page read and write
|
||
1D91D7BB000
|
heap
|
page read and write
|
||
1D91D7AB000
|
heap
|
page read and write
|
||
560000
|
heap
|
page read and write
|
||
1D91D7AE000
|
heap
|
page read and write
|
||
1EF81678000
|
heap
|
page read and write
|
||
EAF4B7E000
|
stack
|
page read and write
|
||
534536B000
|
stack
|
page read and write
|
||
20F67857000
|
heap
|
page read and write
|
||
1D91CCC1000
|
heap
|
page read and write
|
||
1F44AA02000
|
trusted library allocation
|
page read and write
|
||
22DB6870000
|
heap
|
page read and write
|
||
2303E960000
|
trusted library allocation
|
page read and write
|
||
1D91D794000
|
heap
|
page read and write
|
||
20F68118000
|
heap
|
page read and write
|
||
1D91D490000
|
remote allocation
|
page read and write
|
||
20F6D04A000
|
heap
|
page read and write
|
||
1D91DC02000
|
heap
|
page read and write
|
||
20F67813000
|
heap
|
page read and write
|
||
20F6D310000
|
trusted library allocation
|
page read and write
|
||
20F678FB000
|
heap
|
page read and write
|
||
1D91D75A000
|
heap
|
page read and write
|
||
2B785FE0000
|
remote allocation
|
page read and write
|
||
2BCF0910000
|
trusted library allocation
|
page read and write
|
||
20F6CEE0000
|
trusted library allocation
|
page read and write
|
||
1D91D778000
|
heap
|
page read and write
|
||
1DB6AA13000
|
heap
|
page read and write
|
||
22A60C4A000
|
heap
|
page read and write
|
||
2BCF0857000
|
heap
|
page read and write
|
||
1485E078000
|
heap
|
page read and write
|
||
2303EA13000
|
heap
|
page read and write
|
||
19D46459000
|
heap
|
page read and write
|
||
400000
|
unkown
|
page readonly
|
||
2B786000000
|
heap
|
page read and write
|
||
1D91D799000
|
heap
|
page read and write
|
||
2BCF07D0000
|
trusted library allocation
|
page read and write
|
||
205B2490000
|
heap
|
page read and write
|
||
80AB55A000
|
stack
|
page read and write
|
||
2BCF07B0000
|
trusted library allocation
|
page read and write
|
||
1D91D716000
|
heap
|
page read and write
|
||
1D91CC4E000
|
heap
|
page read and write
|
||
20F6CF90000
|
trusted library allocation
|
page read and write
|
||
1D91D79F000
|
heap
|
page read and write
|
||
2303EB00000
|
heap
|
page read and write
|
||
22DB6800000
|
heap
|
page read and write
|
||
20F6D108000
|
heap
|
page read and write
|
||
20F678AD000
|
heap
|
page read and write
|
||
1D91CC82000
|
heap
|
page read and write
|
||
B32D2FB000
|
stack
|
page read and write
|
||
2BCF1660000
|
trusted library allocation
|
page read and write
|
||
1DB6B402000
|
trusted library allocation
|
page read and write
|
||
1DB6AA70000
|
heap
|
page read and write
|
||
1D91DC02000
|
heap
|
page read and write
|
||
1DB6AA00000
|
heap
|
page read and write
|
||
D15EB7E000
|
stack
|
page read and write
|
||
19D46290000
|
heap
|
page read and write
|
||
1D91CCF7000
|
heap
|
page read and write
|
||
19D46280000
|
heap
|
page read and write
|
||
22A60C4F000
|
heap
|
page read and write
|
||
534597F000
|
stack
|
page read and write
|
||
20F6D0F2000
|
heap
|
page read and write
|
||
1485E05E000
|
heap
|
page read and write
|
||
4090DFE000
|
stack
|
page read and write
|
||
1D91D788000
|
heap
|
page read and write
|
||
1485E060000
|
heap
|
page read and write
|
||
20F67889000
|
heap
|
page read and write
|
||
20F6D02C000
|
heap
|
page read and write
|
||
22D91848000
|
heap
|
page read and write
|
||
19D46502000
|
heap
|
page read and write
|
||
1D91CCD1000
|
heap
|
page read and write
|
||
2394CA87000
|
heap
|
page read and write
|
||
22A60C3C000
|
heap
|
page read and write
|
||
1485E067000
|
heap
|
page read and write
|
||
20F67800000
|
heap
|
page read and write
|
||
1485E085000
|
heap
|
page read and write
|
||
205B2480000
|
heap
|
page read and write
|
||
1D91D7B8000
|
heap
|
page read and write
|
||
30000
|
heap
|
page read and write
|
||
1485E000000
|
heap
|
page read and write
|
||
1D91D721000
|
heap
|
page read and write
|
||
277F000
|
stack
|
page read and write
|
||
1DB6AA3F000
|
heap
|
page read and write
|
||
408000
|
unkown
|
page readonly
|
||
3F3FADB000
|
stack
|
page read and write
|
||
2BCF085E000
|
heap
|
page read and write
|
||
1D91CD16000
|
heap
|
page read and write
|
||
19D46452000
|
heap
|
page read and write
|
||
1485E065000
|
heap
|
page read and write
|
||
80AB87E000
|
stack
|
page read and write
|
||
2303EA02000
|
heap
|
page read and write
|
||
80AB5DF000
|
stack
|
page read and write
|
||
3D12B7B000
|
stack
|
page read and write
|
||
1EF81629000
|
heap
|
page read and write
|
||
20F6D020000
|
trusted library allocation
|
page read and write
|
||
2394CA29000
|
heap
|
page read and write
|
||
1D91CC50000
|
heap
|
page read and write
|
||
9738D5B000
|
stack
|
page read and write
|
||
1485E042000
|
heap
|
page read and write
|
||
2303EA00000
|
heap
|
page read and write
|
||
22D917F0000
|
remote allocation
|
page read and write
|
||
1D91D772000
|
heap
|
page read and write
|
||
205B2547000
|
heap
|
page read and write
|
||
427000
|
unkown
|
page read and write
|
||
22DB6853000
|
heap
|
page read and write
|
||
2303EA3E000
|
heap
|
page read and write
|
||
29467FE000
|
stack
|
page read and write
|
||
22D91847000
|
heap
|
page read and write
|
||
8F2447C000
|
stack
|
page read and write
|
||
1EF81672000
|
heap
|
page read and write
|
||
20F68000000
|
heap
|
page read and write
|
||
1485DDD0000
|
heap
|
page read and write
|
||
19D4644F000
|
heap
|
page read and write
|
||
20F68870000
|
trusted library allocation
|
page read and write
|
||
1D91D782000
|
heap
|
page read and write
|
||
22A60C4D000
|
heap
|
page read and write
|
||
8F243FC000
|
stack
|
page read and write
|
||
22D91913000
|
heap
|
page read and write
|
||
20F6CDB0000
|
trusted library allocation
|
page read and write
|
||
1DB6A9A0000
|
remote allocation
|
page read and write
|
||
1485DF40000
|
trusted library allocation
|
page read and write
|
||
1D91DC18000
|
heap
|
page read and write
|
||
205B2485000
|
heap
|
page read and write
|
||
2303EB13000
|
heap
|
page read and write
|
||
205B2527000
|
heap
|
page read and write
|
||
5EF000
|
heap
|
page read and write
|
||
20F678AD000
|
heap
|
page read and write
|
||
22D917C0000
|
trusted library allocation
|
page read and write
|
||
19D46C02000
|
trusted library allocation
|
page read and write
|
||
372E000
|
stack
|
page read and write
|
||
20F6CFD0000
|
trusted library allocation
|
page read and write
|
||
20F67902000
|
heap
|
page read and write
|
||
22A60D00000
|
heap
|
page read and write
|
||
1D91CC54000
|
heap
|
page read and write
|
||
2BCF07C0000
|
trusted library allocation
|
page read and write
|
||
E3E0A7F000
|
stack
|
page read and write
|
||
1F44A25E000
|
heap
|
page read and write
|
||
B32CE8C000
|
stack
|
page read and write
|
||
2394D270000
|
trusted library allocation
|
page read and write
|
||
1D91CC4C000
|
heap
|
page read and write
|
||
22D91858000
|
heap
|
page read and write
|
||
1DB6AA58000
|
heap
|
page read and write
|
||
2303EA68000
|
heap
|
page read and write
|
||
973907E000
|
stack
|
page read and write
|
||
1485E03A000
|
heap
|
page read and write
|
||
97394FE000
|
stack
|
page read and write
|
||
1D91D7A9000
|
heap
|
page read and write
|
||
1D91CC58000
|
heap
|
page read and write
|
||
1D91D7AE000
|
heap
|
page read and write
|
||
2BCF1670000
|
heap
|
page readonly
|
||
1F44A25C000
|
heap
|
page read and write
|
||
20F678A6000
|
heap
|
page read and write
|
||
3D1307A000
|
stack
|
page read and write
|
||
362D000
|
stack
|
page read and write
|
||
1D91D772000
|
heap
|
page read and write
|
||
D15DF7C000
|
stack
|
page read and write
|
||
80AB979000
|
stack
|
page read and write
|
||
1F44A22C000
|
heap
|
page read and write
|
||
1485E06C000
|
heap
|
page read and write
|
||
1485E032000
|
heap
|
page read and write
|
||
1D91CC51000
|
heap
|
page read and write
|
||
E3E0EFE000
|
stack
|
page read and write
|
||
2B785E50000
|
heap
|
page read and write
|
||
E3E0BFB000
|
stack
|
page read and write
|
||
1EF815A0000
|
heap
|
page read and write
|
||
B26000
|
heap
|
page read and write
|
||
401177E000
|
stack
|
page read and write
|
||
1485E057000
|
heap
|
page read and write
|
||
1D91D783000
|
heap
|
page read and write
|
||
22D91918000
|
heap
|
page read and write
|
||
1F44A23C000
|
heap
|
page read and write
|
||
22DB6849000
|
heap
|
page read and write
|
||
1D91D79C000
|
heap
|
page read and write
|
||
2B786057000
|
heap
|
page read and write
|
||
22A60AE0000
|
heap
|
page read and write
|
||
22D932B0000
|
trusted library allocation
|
page read and write
|
||
1D91CC3C000
|
heap
|
page read and write
|
||
22DB6770000
|
trusted library allocation
|
page read and write
|
||
1EF81530000
|
heap
|
page read and write
|
||
2394CACC000
|
heap
|
page read and write
|
||
20F6788E000
|
heap
|
page read and write
|
||
22A61602000
|
trusted library allocation
|
page read and write
|
||
205B2450000
|
heap
|
page read and write
|
||
1D91D7B9000
|
heap
|
page read and write
|
||
1D91D78E000
|
heap
|
page read and write
|
||
2303EA28000
|
heap
|
page read and write
|
||
1D91DC21000
|
heap
|
page read and write
|
||
EA049F9000
|
stack
|
page read and write
|
||
2BCF05D0000
|
heap
|
page read and write
|
||
1DB6A980000
|
trusted library allocation
|
page read and write
|
||
61D000
|
heap
|
page read and write
|
||
20F6D220000
|
remote allocation
|
page read and write
|
||
1485E07C000
|
heap
|
page read and write
|
||
227F000
|
stack
|
page read and write
|
||
1D91D776000
|
heap
|
page read and write
|
||
1485E05C000
|
heap
|
page read and write
|
||
1D91D79F000
|
heap
|
page read and write
|
||
D15EC7F000
|
stack
|
page read and write
|
||
20F68159000
|
heap
|
page read and write
|
||
400000
|
unkown
|
page readonly
|
||
1D91CCC7000
|
heap
|
page read and write
|
||
1D91CC4B000
|
heap
|
page read and write
|
||
1D91CAD0000
|
heap
|
page read and write
|
||
20F6D08F000
|
heap
|
page read and write
|
||
20F6D200000
|
trusted library allocation
|
page read and write
|
||
1485E041000
|
heap
|
page read and write
|
||
205B252E000
|
heap
|
page read and write
|
||
1D91CD13000
|
heap
|
page read and write
|
||
22A60C78000
|
heap
|
page read and write
|
||
19D46508000
|
heap
|
page read and write
|
||
D15E97F000
|
stack
|
page read and write
|
||
20F678AB000
|
heap
|
page read and write
|
||
22A60D02000
|
heap
|
page read and write
|
||
29461BF000
|
stack
|
page read and write
|
||
20F6783E000
|
heap
|
page read and write
|
||
1D91D7AA000
|
heap
|
page read and write
|
||
1D91D7BD000
|
heap
|
page read and write
|
||
2BCF1450000
|
trusted library allocation
|
page read and write
|
||
1D91D7A7000
|
heap
|
page read and write
|
||
1D91D756000
|
heap
|
page read and write
|
||
20F6D220000
|
remote allocation
|
page read and write
|
||
1D91D774000
|
heap
|
page read and write
|
||
2394CABB000
|
heap
|
page read and write
|
||
1DB6A950000
|
heap
|
page read and write
|
||
22D917F0000
|
remote allocation
|
page read and write
|
||
1F44A261000
|
heap
|
page read and write
|
||
D15E87F000
|
stack
|
page read and write
|
||
1EF81600000
|
heap
|
page read and write
|
||
1F44A28B000
|
heap
|
page read and write
|
||
22DB6813000
|
heap
|
page read and write
|
||
1F44A313000
|
heap
|
page read and write
|
||
1D91D7A0000
|
heap
|
page read and write
|
||
1EF81668000
|
heap
|
page read and write
|
||
1D91D783000
|
heap
|
page read and write
|
||
409087B000
|
stack
|
page read and write
|
||
19D46473000
|
heap
|
page read and write
|
||
1D91DC02000
|
heap
|
page read and write
|
||
1F44A300000
|
heap
|
page read and write
|
||
20F67902000
|
heap
|
page read and write
|
||
3F4037C000
|
stack
|
page read and write
|
||
1D91D796000
|
heap
|
page read and write
|
||
19D46455000
|
heap
|
page read and write
|
||
2303EA7B000
|
heap
|
page read and write
|
||
1D91CC29000
|
heap
|
page read and write
|
||
22A60D08000
|
heap
|
page read and write
|
||
2BCF0818000
|
heap
|
page read and write
|
||
B32CF0E000
|
stack
|
page read and write
|
||
1D91DC1A000
|
heap
|
page read and write
|
||
20F67720000
|
heap
|
page read and write
|
||
1F44A213000
|
heap
|
page read and write
|
||
1D91DC21000
|
heap
|
page read and write
|
||
609000
|
heap
|
page read and write
|
||
4011977000
|
stack
|
page read and write
|
||
20F68D10000
|
trusted library allocation
|
page read and write
|
||
1D91D7AA000
|
heap
|
page read and write
|
||
EAF49FE000
|
stack
|
page read and write
|
||
2BCF1690000
|
trusted library allocation
|
page read and write
|
||
1D91D7A3000
|
heap
|
page read and write
|
||
1F44A229000
|
heap
|
page read and write
|
||
20F67FC0000
|
trusted library allocation
|
page read and write
|
||
1D91D78E000
|
heap
|
page read and write
|
||
3D1387B000
|
stack
|
page read and write
|
||
1D91D774000
|
heap
|
page read and write
|
||
1D91D7A9000
|
heap
|
page read and write
|
||
20F676B0000
|
heap
|
page read and write
|
||
22CE000
|
stack
|
page read and write
|
||
20F6D0AC000
|
heap
|
page read and write
|
||
2BCF0810000
|
heap
|
page read and write
|
||
8F2487E000
|
stack
|
page read and write
|
||
20F6CEC8000
|
trusted library allocation
|
page read and write
|
||
22DB6908000
|
heap
|
page read and write
|
||
4090AFE000
|
stack
|
page read and write
|
||
1EF815D0000
|
trusted library allocation
|
page read and write
|
||
1D91D78B000
|
heap
|
page read and write
|
||
2394D532000
|
heap
|
page read and write
|
||
2330000
|
heap
|
page read and write
|
||
1D91D782000
|
heap
|
page read and write
|
||
4090CFE000
|
stack
|
page read and write
|
||
22D93270000
|
trusted library allocation
|
page read and write
|
||
1F44A080000
|
heap
|
page read and write
|
||
2394CB13000
|
heap
|
page read and write
|
||
1EF81702000
|
heap
|
page read and write
|
||
1D91CD02000
|
heap
|
page read and write
|
||
3F4067C000
|
stack
|
page read and write
|
||
80ABA7C000
|
stack
|
page read and write
|
||
E3E0CFB000
|
stack
|
page read and write
|
||
1D91D78C000
|
heap
|
page read and write
|
||
29460BC000
|
stack
|
page read and write
|
||
20F68015000
|
heap
|
page read and write
|
||
2BCF085E000
|
heap
|
page read and write
|
||
1D91D77E000
|
heap
|
page read and write
|
||
3D1347B000
|
stack
|
page read and write
|
||
20F6D09E000
|
heap
|
page read and write
|
||
2B786013000
|
heap
|
page read and write
|
||
1485E102000
|
heap
|
page read and write
|
||
5C0000
|
heap
|
page read and write
|
||
1D91CCD8000
|
heap
|
page read and write
|
||
EA04B7F000
|
stack
|
page read and write
|
||
1D91D7A0000
|
heap
|
page read and write
|
||
19D463F0000
|
trusted library allocation
|
page read and write
|
||
B32D47B000
|
stack
|
page read and write
|
||
1F44A252000
|
heap
|
page read and write
|
||
22DB684B000
|
heap
|
page read and write
|
||
22D91902000
|
heap
|
page read and write
|
||
205B2542000
|
heap
|
page read and write
|
||
1D91D798000
|
heap
|
page read and write
|
||
20F6D220000
|
remote allocation
|
page read and write
|
||
22DB684E000
|
heap
|
page read and write
|
||
1D91D780000
|
heap
|
page read and write
|
||
1D91D783000
|
heap
|
page read and write
|
||
20F68118000
|
heap
|
page read and write
|
||
20F6D01F000
|
heap
|
page read and write
|
||
20F68CF1000
|
trusted library allocation
|
page read and write
|
||
1D91D717000
|
heap
|
page read and write
|
||
20F6D0F7000
|
heap
|
page read and write
|
||
40A000
|
unkown
|
page read and write
|
||
20F67872000
|
heap
|
page read and write
|
||
3D1327F000
|
stack
|
page read and write
|
||
22D91889000
|
heap
|
page read and write
|
||
22D917F0000
|
remote allocation
|
page read and write
|
||
4011A7F000
|
stack
|
page read and write
|
||
22D91770000
|
heap
|
page read and write
|
||
2394CA13000
|
heap
|
page read and write
|
||
1D91D788000
|
heap
|
page read and write
|
||
205B2516000
|
heap
|
page read and write
|
||
1D91CAC0000
|
heap
|
page read and write
|
||
2BCF0770000
|
heap
|
page read and write
|
||
2394CB02000
|
heap
|
page read and write
|
||
1DB6A8F0000
|
heap
|
page read and write
|
||
1DB6AA55000
|
heap
|
page read and write
|
||
E3E0AFF000
|
stack
|
page read and write
|
||
1D91D783000
|
heap
|
page read and write
|
||
1EF81713000
|
heap
|
page read and write
|
||
2BCF085E000
|
heap
|
page read and write
|
||
1D91D7D1000
|
heap
|
page read and write
|
||
20F6D03D000
|
heap
|
page read and write
|
||
3F3FEFE000
|
stack
|
page read and write
|
||
3D13A7E000
|
stack
|
page read and write
|
||
B32CF8F000
|
stack
|
page read and write
|
||
474000
|
unkown
|
page readonly
|
||
22D9185F000
|
heap
|
page read and write
|
||
3D12F77000
|
stack
|
page read and write
|
||
2394C970000
|
heap
|
page read and write
|
||
20F6CD20000
|
trusted library allocation
|
page read and write
|
||
22D9183D000
|
heap
|
page read and write
|
||
294613F000
|
stack
|
page read and write
|
||
D15E77D000
|
stack
|
page read and write
|
||
1EF81662000
|
heap
|
page read and write
|
||
732A1000
|
unkown
|
page execute read
|
||
1485DE40000
|
heap
|
page read and write
|
||
1D91D787000
|
heap
|
page read and write
|
||
1EF8163D000
|
heap
|
page read and write
|
||
20F6CFE0000
|
trusted library allocation
|
page read and write
|
||
1D91D716000
|
heap
|
page read and write
|
||
9738DDE000
|
stack
|
page read and write
|
||
2394CA40000
|
heap
|
page read and write
|
||
22DB6856000
|
heap
|
page read and write
|
||
4011CF9000
|
stack
|
page read and write
|
||
EA04AF9000
|
stack
|
page read and write
|
||
22A60C13000
|
heap
|
page read and write
|
||
1D91CCFD000
|
heap
|
page read and write
|
||
1DB6AA5D000
|
heap
|
page read and write
|
||
1D91CC71000
|
heap
|
page read and write
|
||
205B2543000
|
heap
|
page read and write
|
||
1485E047000
|
heap
|
page read and write
|
||
99000
|
stack
|
page read and write
|
||
19D46500000
|
heap
|
page read and write
|
||
22A60B50000
|
heap
|
page read and write
|
||
19A000
|
stack
|
page read and write
|
||
1DB6AA29000
|
heap
|
page read and write
|
||
2394C960000
|
heap
|
page read and write
|
||
2B78603D000
|
heap
|
page read and write
|
||
EA0454B000
|
stack
|
page read and write
|
||
534587B000
|
stack
|
page read and write
|
||
22DB6913000
|
heap
|
page read and write
|
||
205B2320000
|
heap
|
page read and write
|
||
1D91D778000
|
heap
|
page read and write
|
||
1D91D796000
|
heap
|
page read and write
|
||
1D91CC00000
|
heap
|
page read and write
|
||
1EF81602000
|
heap
|
page read and write
|
||
97391FE000
|
stack
|
page read and write
|
||
1485E05F000
|
heap
|
page read and write
|
||
20F6CFB0000
|
trusted library allocation
|
page read and write
|
||
1D91D7DC000
|
heap
|
page read and write
|
||
1D91D721000
|
heap
|
page read and write
|
||
2394CA68000
|
heap
|
page read and write
|
||
4011BFF000
|
unkown
|
page read and write
|
||
973917C000
|
stack
|
page read and write
|
||
20F68104000
|
heap
|
page read and write
|
||
1D91DC00000
|
heap
|
page read and write
|
||
5C8000
|
heap
|
page read and write
|
||
20F6CF90000
|
trusted library allocation
|
page read and write
|
||
1F44A1E0000
|
trusted library allocation
|
page read and write
|
||
22D91900000
|
heap
|
page read and write
|
||
22D91813000
|
heap
|
page read and write
|
||
401135F000
|
stack
|
page read and write
|
||
1D91D700000
|
heap
|
page read and write
|
||
2BCF0710000
|
heap
|
page read and write
|
||
1485E07B000
|
heap
|
page read and write
|
||
1D91D782000
|
heap
|
page read and write
|
||
3D1337D000
|
stack
|
page read and write
|
||
1D91D721000
|
heap
|
page read and write
|
||
20F68D13000
|
trusted library allocation
|
page read and write
|
||
1F44A284000
|
heap
|
page read and write
|
||
732A4000
|
unkown
|
page readonly
|
||
1D91D783000
|
heap
|
page read and write
|
||
1F44A260000
|
heap
|
page read and write
|
||
5345A7B000
|
stack
|
page read and write
|
||
1D91D797000
|
heap
|
page read and write
|
||
205B252E000
|
heap
|
page read and write
|
||
401000
|
unkown
|
page execute read
|
||
22DB688E000
|
heap
|
page read and write
|
||
1D91D787000
|
heap
|
page read and write
|
||
80AB8F8000
|
stack
|
page read and write
|
||
1F44A27D000
|
heap
|
page read and write
|
||
1D91D779000
|
heap
|
page read and write
|
||
205B2500000
|
heap
|
page read and write
|
||
1F44A27C000
|
heap
|
page read and write
|
||
EAF487B000
|
stack
|
page read and write
|
||
2303F402000
|
trusted library allocation
|
page read and write
|
||
22A60C83000
|
heap
|
page read and write
|
||
565000
|
heap
|
page read and write
|
||
80AB9FF000
|
stack
|
page read and write
|
||
D15E37B000
|
stack
|
page read and write
|
||
1F44A070000
|
heap
|
page read and write
|
||
613000
|
heap
|
page read and write
|
||
1D91D783000
|
heap
|
page read and write
|
||
1D91CCA4000
|
heap
|
page read and write
|
||
3050000
|
trusted library allocation
|
page read and write
|
||
2B786002000
|
heap
|
page read and write
|
||
2B785FE0000
|
remote allocation
|
page read and write
|
||
22DB6851000
|
heap
|
page read and write
|
||
2B785FE0000
|
remote allocation
|
page read and write
|
||
1D91D7C5000
|
heap
|
page read and write
|
||
19D4643A000
|
heap
|
page read and write
|
||
22DB6902000
|
heap
|
page read and write
|
||
1EF81613000
|
heap
|
page read and write
|
||
1485E013000
|
heap
|
page read and write
|
||
B20000
|
heap
|
page read and write
|
||
1D91D780000
|
heap
|
page read and write
|
||
2B785FB0000
|
trusted library allocation
|
page read and write
|
||
1D91D774000
|
heap
|
page read and write
|
There are 712 hidden memdumps, click here to show them.