Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
EUR_Cert_3883774784847_CMR8494849.pdf.scr.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
|
initial sample
|
||
C:\Users\user\AppData\Local\Temp\Airplane_14.bmp
|
JPEG image data, JFIF standard 1.01, resolution (DPI), density 100x100, segment length 16, Exif Standard: [TIFF image data,
big-endian, direntries=3], baseline, precision 8, 110x110, frames 3
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\Baglommerne127.ini
|
ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\Colluvia.wad
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\System.Net.Quic.dll
|
PE32+ executable (DLL) (console) x86-64 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\Undergaaedes.ini
|
ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\euda.lnk
|
MS Windows shortcut, Item id list present, Has Relative path, Has Working directory, ctime=Sun Dec 31 23:06:32 1600, mtime=Sun
Dec 31 23:06:32 1600, atime=Sun Dec 31 23:06:32 1600, length=0, window=hide
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\folder-drag-accept-symbolic.symbolic.png
|
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\nso6177.tmp\System.dll
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\EUR_Cert_3883774784847_CMR8494849.pdf.scr.exe
|
"C:\Users\user\Desktop\EUR_Cert_3883774784847_CMR8494849.pdf.scr.exe"
|
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
http://graphicdes.com/bin_MpLvP21.bin
|
|||
http://nsis.sf.net/NSIS_ErrorError
|
unknown
|
||
https://github.com/dotnet/runtime
|
unknown
|
||
https://aka.ms/dotnetquic
|
unknown
|
Registry
Path
|
Value
|
Malicious
|
|
---|---|---|---|
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\metabolise\CERTIFIER
|
AMBULANCES
|
||
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Uninstall\Bay
|
Heatlike106
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\MACLES\smattedes
|
hormons
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\rudimentariness\TMNINGSORDNINGEN
|
Expand String Value
|
||
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Uninstall\farveprgtig
|
Noedvendigste
|
||
HKEY_CURRENT_USER\Software\domfldelsernes\isolators
|
curatorial
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\AFTERLOSS
|
Respirit
|
||
HKEY_CURRENT_USER\Software\Breakouts\Glamorous
|
aandsvidenskaben
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\metabolise\CERTIFIER
|
AMBULANCES
|
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
2CF0000
|
direct allocation
|
page execute and read and write
|
||
E4A57FC000
|
stack
|
page read and write
|
||
491E87B000
|
stack
|
page read and write
|
||
5C981FD000
|
stack
|
page read and write
|
||
20C4B84B000
|
heap
|
page read and write
|
||
970000
|
trusted library allocation
|
page read and write
|
||
1B15F450000
|
heap
|
page read and write
|
||
FCE16FD000
|
stack
|
page read and write
|
||
775DFB000
|
stack
|
page read and write
|
||
193AAB14000
|
heap
|
page read and write
|
||
732A4000
|
unkown
|
page readonly
|
||
193AAA00000
|
heap
|
page read and write
|
||
1D9FBB26000
|
trusted library allocation
|
page read and write
|
||
191CBE02000
|
trusted library allocation
|
page read and write
|
||
38F3D0C000
|
stack
|
page read and write
|
||
1D8FA570000
|
remote allocation
|
page read and write
|
||
1D9FBB20000
|
trusted library allocation
|
page read and write
|
||
193B025F000
|
heap
|
page read and write
|
||
2BE0000
|
trusted library allocation
|
page read and write
|
||
E4A5DFF000
|
stack
|
page read and write
|
||
193AB3E0000
|
trusted library allocation
|
page read and write
|
||
21BEEA4F000
|
heap
|
page read and write
|
||
193AB518000
|
heap
|
page read and write
|
||
732A1000
|
unkown
|
page execute read
|
||
21BEEA81000
|
heap
|
page read and write
|
||
AF9000
|
heap
|
page read and write
|
||
38F45FF000
|
stack
|
page read and write
|
||
2CF107A000
|
stack
|
page read and write
|
||
193AB3D3000
|
trusted library allocation
|
page read and write
|
||
16800200000
|
heap
|
page read and write
|
||
20C4B84C000
|
heap
|
page read and write
|
||
1D8F8A5B000
|
heap
|
page read and write
|
||
193AAA7A000
|
heap
|
page read and write
|
||
1D9FB169000
|
heap
|
page read and write
|
||
40A000
|
unkown
|
page read and write
|
||
2E286853000
|
heap
|
page read and write
|
||
191CB642000
|
heap
|
page read and write
|
||
193B01B0000
|
trusted library allocation
|
page read and write
|
||
1B15F413000
|
heap
|
page read and write
|
||
1D8F8B00000
|
heap
|
page read and write
|
||
20C4B829000
|
heap
|
page read and write
|
||
1BC528F0000
|
heap
|
page read and write
|
||
CF1207C000
|
stack
|
page read and write
|
||
20C4B900000
|
heap
|
page read and write
|
||
491EB7E000
|
stack
|
page read and write
|
||
1D8F89C0000
|
heap
|
page read and write
|
||
B0217E000
|
stack
|
page read and write
|
||
193AB502000
|
heap
|
page read and write
|
||
193B025C000
|
heap
|
page read and write
|
||
193AA970000
|
trusted library allocation
|
page read and write
|
||
2E286802000
|
heap
|
page read and write
|
||
1D9FBD90000
|
trusted library allocation
|
page read and write
|
||
38F3D8F000
|
stack
|
page read and write
|
||
7A4000
|
unkown
|
page read and write
|
||
1B15F508000
|
heap
|
page read and write
|
||
20C4B800000
|
heap
|
page read and write
|
||
1D8F8B13000
|
heap
|
page read and write
|
||
193B01B0000
|
trusted library allocation
|
page read and write
|
||
191CB679000
|
heap
|
page read and write
|
||
193B02B5000
|
heap
|
page read and write
|
||
1D9FB150000
|
trusted library allocation
|
page read and write
|
||
1EB96402000
|
heap
|
page read and write
|
||
1D8F8B29000
|
heap
|
page read and write
|
||
E913C7C000
|
stack
|
page read and write
|
||
491EA7F000
|
stack
|
page read and write
|
||
CF126FF000
|
stack
|
page read and write
|
||
193B02DC000
|
heap
|
page read and write
|
||
B0207B000
|
stack
|
page read and write
|
||
2CF0C7B000
|
stack
|
page read and write
|
||
B020FE000
|
stack
|
page read and write
|
||
1D9FBDE0000
|
trusted library allocation
|
page read and write
|
||
E4A5AFD000
|
stack
|
page read and write
|
||
207AD859000
|
heap
|
page read and write
|
||
1EB96400000
|
heap
|
page read and write
|
||
E4A51AC000
|
stack
|
page read and write
|
||
AEB000
|
heap
|
page read and write
|
||
191CB661000
|
heap
|
page read and write
|
||
193AAA29000
|
heap
|
page read and write
|
||
1D8F8A4C000
|
heap
|
page read and write
|
||
1D8F8A4B000
|
heap
|
page read and write
|
||
193B0101000
|
trusted library allocation
|
page read and write
|
||
491E67E000
|
stack
|
page read and write
|
||
1BC52880000
|
heap
|
page read and write
|
||
1D9FAE1F000
|
heap
|
page read and write
|
||
E91427A000
|
stack
|
page read and write
|
||
16800300000
|
heap
|
page read and write
|
||
2E2865B0000
|
heap
|
page read and write
|
||
2E286870000
|
heap
|
page read and write
|
||
732A6000
|
unkown
|
page readonly
|
||
20C4B5D0000
|
heap
|
page read and write
|
||
191CB641000
|
heap
|
page read and write
|
||
191CB646000
|
heap
|
page read and write
|
||
21BEEB13000
|
heap
|
page read and write
|
||
20C4B640000
|
heap
|
page read and write
|
||
E4A5EFE000
|
stack
|
page read and write
|
||
191CB663000
|
heap
|
page read and write
|
||
1EB96380000
|
trusted library allocation
|
page read and write
|
||
1D9FB165000
|
heap
|
page read and write
|
||
E4A5CFF000
|
stack
|
page read and write
|
||
21BEEA71000
|
heap
|
page read and write
|
||
1D8F8960000
|
heap
|
page read and write
|
||
21BCF2E1000
|
heap
|
page read and write
|
||
B0237E000
|
stack
|
page read and write
|
||
FCE12FE000
|
stack
|
page read and write
|
||
21BCF287000
|
heap
|
page read and write
|
||
1EB96280000
|
heap
|
page read and write
|
||
1D8F8A2A000
|
heap
|
page read and write
|
||
207AD7C0000
|
remote allocation
|
page read and write
|
||
21BEEA54000
|
heap
|
page read and write
|
||
E4A56FF000
|
stack
|
page read and write
|
||
191CB702000
|
heap
|
page read and write
|
||
207AD83D000
|
heap
|
page read and write
|
||
20C4B87D000
|
heap
|
page read and write
|
||
191CB677000
|
heap
|
page read and write
|
||
21BCF000000
|
heap
|
page read and write
|
||
FCE107B000
|
stack
|
page read and write
|
||
5C97DFF000
|
stack
|
page read and write
|
||
193AB504000
|
heap
|
page read and write
|
||
193AB518000
|
heap
|
page read and write
|
||
2CF127B000
|
stack
|
page read and write
|
||
E4A5FFF000
|
stack
|
page read and write
|
||
2A1F000
|
stack
|
page read and write
|
||
1D9FBD60000
|
trusted library allocation
|
page read and write
|
||
21BCF213000
|
heap
|
page read and write
|
||
38F407E000
|
stack
|
page read and write
|
||
21BEE990000
|
trusted library allocation
|
page read and write
|
||
193AFFD0000
|
trusted library allocation
|
page read and write
|
||
16800263000
|
heap
|
page read and write
|
||
CF127FC000
|
stack
|
page read and write
|
||
5C97C7D000
|
stack
|
page read and write
|
||
191CB64A000
|
heap
|
page read and write
|
||
16800C02000
|
trusted library allocation
|
page read and write
|
||
193B0104000
|
trusted library allocation
|
page read and write
|
||
21BEEA29000
|
heap
|
page read and write
|
||
1D8FA570000
|
remote allocation
|
page read and write
|
||
1B15F400000
|
heap
|
page read and write
|
||
1B15F513000
|
heap
|
page read and write
|
||
E913E7E000
|
stack
|
page read and write
|
||
20C4B902000
|
heap
|
page read and write
|
||
24A0000
|
heap
|
page read and write
|
||
21BCFA02000
|
heap
|
page read and write
|
||
16800313000
|
heap
|
page read and write
|
||
21BCF268000
|
heap
|
page read and write
|
||
5C97EFB000
|
stack
|
page read and write
|
||
20C4B908000
|
heap
|
page read and write
|
||
193AAAAA000
|
heap
|
page read and write
|
||
207AD7C0000
|
remote allocation
|
page read and write
|
||
207AD700000
|
heap
|
page read and write
|
||
CF121FF000
|
stack
|
page read and write
|
||
CF1237C000
|
stack
|
page read and write
|
||
1D8F8A13000
|
heap
|
page read and write
|
||
193AAA13000
|
heap
|
page read and write
|
||
7DF000
|
unkown
|
page readonly
|
||
207AD823000
|
heap
|
page read and write
|
||
491E3EE000
|
stack
|
page read and write
|
||
193AA8D0000
|
heap
|
page read and write
|
||
2CF0E77000
|
stack
|
page read and write
|
||
5C97FF7000
|
stack
|
page read and write
|
||
191CB662000
|
heap
|
page read and write
|
||
168001F0000
|
heap
|
page read and write
|
||
21BEEA8B000
|
heap
|
page read and write
|
||
1BC52B00000
|
heap
|
page read and write
|
||
5C980FE000
|
stack
|
page read and write
|
||
1D8FA602000
|
trusted library allocation
|
page read and write
|
||
1D8F8A3E000
|
heap
|
page read and write
|
||
1BC52A84000
|
heap
|
page read and write
|
||
1D9FB130000
|
trusted library allocation
|
page read and write
|
||
384F9FE000
|
stack
|
page read and write
|
||
191CBDB0000
|
trusted library allocation
|
page read and write
|
||
996000
|
heap
|
page read and write
|
||
1D9FAD60000
|
heap
|
page read and write
|
||
1B15F310000
|
trusted library allocation
|
page read and write
|
||
1EB9645A000
|
heap
|
page read and write
|
||
191CB600000
|
heap
|
page read and write
|
||
193B021D000
|
heap
|
page read and write
|
||
193AAA75000
|
heap
|
page read and write
|
||
21BCFB00000
|
heap
|
page read and write
|
||
40A000
|
unkown
|
page write copy
|
||
16800180000
|
heap
|
page read and write
|
||
7B3000
|
unkown
|
page read and write
|
||
2E286730000
|
remote allocation
|
page read and write
|
||
2E28683E000
|
heap
|
page read and write
|
||
1D9FAE1F000
|
heap
|
page read and write
|
||
193B0300000
|
heap
|
page read and write
|
||
1D9FADD8000
|
heap
|
page read and write
|
||
1BC52A52000
|
heap
|
page read and write
|
||
6D87BF7000
|
stack
|
page read and write
|
||
193B02FB000
|
heap
|
page read and write
|
||
193AAA9F000
|
heap
|
page read and write
|
||
191CB66D000
|
heap
|
page read and write
|
||
384F49C000
|
stack
|
page read and write
|
||
7756DC000
|
stack
|
page read and write
|
||
191CB66B000
|
heap
|
page read and write
|
||
7A0000
|
unkown
|
page read and write
|
||
E4A59FF000
|
stack
|
page read and write
|
||
193AB400000
|
heap
|
page read and write
|
||
1D9FB170000
|
trusted library allocation
|
page read and write
|
||
16800190000
|
heap
|
page read and write
|
||
193AB500000
|
heap
|
page read and write
|
||
2E286858000
|
heap
|
page read and write
|
||
193B02E8000
|
heap
|
page read and write
|
||
193B02DC000
|
heap
|
page read and write
|
||
408000
|
unkown
|
page readonly
|
||
21BCF2CC000
|
heap
|
page read and write
|
||
6D87DFE000
|
stack
|
page read and write
|
||
B0C000
|
heap
|
page read and write
|
||
6D8758F000
|
stack
|
page read and write
|
||
21BCF2BB000
|
heap
|
page read and write
|
||
1EB96210000
|
heap
|
page read and write
|
||
21BCF26E000
|
heap
|
page read and write
|
||
97F38FC000
|
stack
|
page read and write
|
||
19A000
|
stack
|
page read and write
|
||
21BCF229000
|
heap
|
page read and write
|
||
191CB668000
|
heap
|
page read and write
|
||
1BC52A78000
|
heap
|
page read and write
|
||
1BC52A4F000
|
heap
|
page read and write
|
||
191CB643000
|
heap
|
page read and write
|
||
2E286813000
|
heap
|
page read and write
|
||
193AFFC0000
|
trusted library allocation
|
page read and write
|
||
1D8F8A76000
|
heap
|
page read and write
|
||
16800268000
|
heap
|
page read and write
|
||
193B0440000
|
remote allocation
|
page read and write
|
||
1B15F402000
|
heap
|
page read and write
|
||
193B0100000
|
trusted library allocation
|
page read and write
|
||
16800302000
|
heap
|
page read and write
|
||
1EB96456000
|
heap
|
page read and write
|
||
207AD902000
|
heap
|
page read and write
|
||
AEF000
|
heap
|
page read and write
|
||
1BC52B13000
|
heap
|
page read and write
|
||
16800202000
|
heap
|
page read and write
|
||
E91417E000
|
stack
|
page read and write
|
||
193B0550000
|
trusted library allocation
|
page read and write
|
||
193AAAAD000
|
heap
|
page read and write
|
||
1B15F210000
|
heap
|
page read and write
|
||
21BCF2C3000
|
heap
|
page read and write
|
||
6D87AFB000
|
stack
|
page read and write
|
||
16800279000
|
heap
|
page read and write
|
||
97F36FF000
|
stack
|
page read and write
|
||
193B02AB000
|
heap
|
page read and write
|
||
191CB680000
|
heap
|
page read and write
|
||
21BEEA5E000
|
heap
|
page read and write
|
||
1D8F8A02000
|
heap
|
page read and write
|
||
1D8F8A5C000
|
heap
|
page read and write
|
||
1B15F44B000
|
heap
|
page read and write
|
||
732A0000
|
unkown
|
page readonly
|
||
384FAFD000
|
stack
|
page read and write
|
||
207AD829000
|
heap
|
page read and write
|
||
1D8FA4B0000
|
trusted library allocation
|
page read and write
|
||
21BCF100000
|
trusted library allocation
|
page read and write
|
||
193B0249000
|
heap
|
page read and write
|
||
97F327B000
|
stack
|
page read and write
|
||
193B0240000
|
trusted library allocation
|
page read and write
|
||
2E286902000
|
heap
|
page read and write
|
||
193AB3D0000
|
trusted library allocation
|
page read and write
|
||
193AB559000
|
heap
|
page read and write
|
||
1BC52A4D000
|
heap
|
page read and write
|
||
2E286825000
|
heap
|
page read and write
|
||
2E286800000
|
heap
|
page read and write
|
||
408000
|
unkown
|
page readonly
|
||
1EB96513000
|
heap
|
page read and write
|
||
FCE157D000
|
stack
|
page read and write
|
||
20C4B852000
|
heap
|
page read and write
|
||
193B0305000
|
heap
|
page read and write
|
||
20C4B84F000
|
heap
|
page read and write
|
||
193B0299000
|
heap
|
page read and write
|
||
2B1F000
|
stack
|
page read and write
|
||
7AD000
|
unkown
|
page read and write
|
||
B09000
|
heap
|
page read and write
|
||
193B00E0000
|
trusted library allocation
|
page read and write
|
||
193AA940000
|
heap
|
page read and write
|
||
193AB402000
|
heap
|
page read and write
|
||
AB8000
|
heap
|
page read and write
|
||
20C4B86F000
|
heap
|
page read and write
|
||
1D9FB140000
|
trusted library allocation
|
page read and write
|
||
1BC52A00000
|
heap
|
page read and write
|
||
1B15F502000
|
heap
|
page read and write
|
||
1D8F8A64000
|
heap
|
page read and write
|
||
FCE15FF000
|
stack
|
page read and write
|
||
193AAAFE000
|
heap
|
page read and write
|
||
1B15F481000
|
heap
|
page read and write
|
||
1BC52A29000
|
heap
|
page read and write
|
||
207AD813000
|
heap
|
page read and write
|
||
193B00E0000
|
trusted library allocation
|
page read and write
|
||
207AE202000
|
trusted library allocation
|
page read and write
|
||
775EFE000
|
stack
|
page read and write
|
||
401000
|
unkown
|
page execute read
|
||
193B0303000
|
heap
|
page read and write
|
||
191CB649000
|
heap
|
page read and write
|
||
2E286610000
|
heap
|
page read and write
|
||
21BEEA49000
|
heap
|
page read and write
|
||
193AAAFE000
|
heap
|
page read and write
|
||
7DF000
|
unkown
|
page readonly
|
||
193AB415000
|
heap
|
page read and write
|
||
30000
|
heap
|
page read and write
|
||
20C4B83C000
|
heap
|
page read and write
|
||
7A9000
|
unkown
|
page read and write
|
||
20C4B5E0000
|
heap
|
page read and write
|
||
2CF0F7B000
|
stack
|
page read and write
|
||
97F37FF000
|
stack
|
page read and write
|
||
E913D7F000
|
stack
|
page read and write
|
||
21BCF302000
|
heap
|
page read and write
|
||
25A0000
|
trusted library allocation
|
page read and write
|
||
193AAA94000
|
heap
|
page read and write
|
||
193AAA70000
|
heap
|
page read and write
|
||
191CB613000
|
heap
|
page read and write
|
||
786000
|
unkown
|
page read and write
|
||
193AAA58000
|
heap
|
page read and write
|
||
1BC52A50000
|
heap
|
page read and write
|
||
1B15F43C000
|
heap
|
page read and write
|
||
1D9FACD0000
|
heap
|
page read and write
|
||
193AAA3E000
|
heap
|
page read and write
|
||
B0257F000
|
stack
|
page read and write
|
||
1EB9643D000
|
heap
|
page read and write
|
||
38F417C000
|
stack
|
page read and write
|
||
193AAA78000
|
heap
|
page read and write
|
||
CF1247C000
|
stack
|
page read and write
|
||
99000
|
stack
|
page read and write
|
||
1D8F8B02000
|
heap
|
page read and write
|
||
5C97D7C000
|
stack
|
page read and write
|
||
191CB666000
|
heap
|
page read and write
|
||
1BC52A4B000
|
heap
|
page read and write
|
||
193B0200000
|
heap
|
page read and write
|
||
38F41FE000
|
stack
|
page read and write
|
||
97F39FC000
|
stack
|
page read and write
|
||
1EB96C02000
|
trusted library allocation
|
page read and write
|
||
1BC529F0000
|
trusted library allocation
|
page read and write
|
||
E4A5BFF000
|
stack
|
page read and write
|
||
2CF197E000
|
stack
|
page read and write
|
||
B29000
|
heap
|
page read and write
|
||
491E77B000
|
stack
|
page read and write
|
||
193B00E8000
|
trusted library allocation
|
page read and write
|
||
1D9FBD70000
|
heap
|
page readonly
|
||
193B0400000
|
trusted library allocation
|
page read and write
|
||
E4A55FB000
|
stack
|
page read and write
|
||
20C4B813000
|
heap
|
page read and write
|
||
1D8F8A00000
|
heap
|
page read and write
|
||
21BEEA5E000
|
heap
|
page read and write
|
||
21BEEB08000
|
heap
|
page read and write
|
||
AB0000
|
heap
|
page read and write
|
||
191CB510000
|
heap
|
page read and write
|
||
193AAA8D000
|
heap
|
page read and write
|
||
1B15F463000
|
heap
|
page read and write
|
||
16800228000
|
heap
|
page read and write
|
||
21BEF202000
|
trusted library allocation
|
page read and write
|
||
CF124FB000
|
stack
|
page read and write
|
||
1EB96413000
|
heap
|
page read and write
|
||
193B0530000
|
trusted library allocation
|
page read and write
|
||
193B0124000
|
trusted library allocation
|
page read and write
|
||
1EB96471000
|
heap
|
page read and write
|
||
77C000
|
unkown
|
page read and write
|
||
2CF117E000
|
stack
|
page read and write
|
||
193B0305000
|
heap
|
page read and write
|
||
193B0420000
|
trusted library allocation
|
page read and write
|
||
1D8F8A4A000
|
heap
|
page read and write
|
||
193B022B000
|
heap
|
page read and write
|
||
193B01F0000
|
trusted library allocation
|
page read and write
|
||
191CB66F000
|
heap
|
page read and write
|
||
97F3BFD000
|
stack
|
page read and write
|
||
207AD6F0000
|
heap
|
page read and write
|
||
193AAB02000
|
heap
|
page read and write
|
||
193B02FF000
|
heap
|
page read and write
|
||
2E286730000
|
remote allocation
|
page read and write
|
||
193ABF60000
|
trusted library allocation
|
page read and write
|
||
21BEEA00000
|
heap
|
page read and write
|
||
1680023C000
|
heap
|
page read and write
|
||
191CB671000
|
heap
|
page read and write
|
||
20C4B740000
|
trusted library allocation
|
page read and write
|
||
252E000
|
stack
|
page read and write
|
||
207AD7C0000
|
remote allocation
|
page read and write
|
||
CF125FC000
|
stack
|
page read and write
|
||
384FA79000
|
stack
|
page read and write
|
||
21BEEA02000
|
heap
|
page read and write
|
||
191CB63A000
|
heap
|
page read and write
|
||
400000
|
unkown
|
page readonly
|
||
1BC52B08000
|
heap
|
page read and write
|
||
1BC52A13000
|
heap
|
page read and write
|
||
990000
|
heap
|
page read and write
|
||
21BEEA13000
|
heap
|
page read and write
|
||
2E286829000
|
heap
|
page read and write
|
||
193AAB07000
|
heap
|
page read and write
|
||
6D879FF000
|
stack
|
page read and write
|
||
7A6000
|
unkown
|
page read and write
|
||
21BCF243000
|
heap
|
page read and write
|
||
1B15F1B0000
|
heap
|
page read and write
|
||
775CFF000
|
stack
|
page read and write
|
||
20C4B88C000
|
heap
|
page read and write
|
||
193AAA9D000
|
heap
|
page read and write
|
||
1B15F429000
|
heap
|
page read and write
|
||
21BEEA4D000
|
heap
|
page read and write
|
||
193B0303000
|
heap
|
page read and write
|
||
400000
|
unkown
|
page readonly
|
||
6D8787E000
|
stack
|
page read and write
|
||
329A000
|
stack
|
page read and write
|
||
193B01D0000
|
trusted library allocation
|
page read and write
|
||
193AAA56000
|
heap
|
page read and write
|
||
9A0000
|
heap
|
page read and write
|
||
E91437E000
|
stack
|
page read and write
|
||
1D9FAE20000
|
heap
|
page read and write
|
||
20C4B84D000
|
heap
|
page read and write
|
||
193B0440000
|
remote allocation
|
page read and write
|
||
193B00EE000
|
trusted library allocation
|
page read and write
|
||
491E977000
|
stack
|
page read and write
|
||
193B0410000
|
trusted library allocation
|
page read and write
|
||
20C4B888000
|
heap
|
page read and write
|
||
1D9FBD80000
|
trusted library allocation
|
page read and write
|
||
21BEEA3C000
|
heap
|
page read and write
|
||
2590000
|
trusted library allocation
|
page read and write
|
||
193AAB02000
|
heap
|
page read and write
|
||
20C4C002000
|
trusted library allocation
|
page read and write
|
||
21BCEF90000
|
heap
|
page read and write
|
||
CF11E7B000
|
stack
|
page read and write
|
||
193B0304000
|
heap
|
page read and write
|
||
B0247E000
|
stack
|
page read and write
|
||
38F43F7000
|
stack
|
page read and write
|
||
5C982FF000
|
stack
|
page read and write
|
||
E91407A000
|
stack
|
page read and write
|
||
2E286877000
|
heap
|
page read and write
|
||
1B15F500000
|
heap
|
page read and write
|
||
191CB67C000
|
heap
|
page read and write
|
||
2E286710000
|
trusted library allocation
|
page read and write
|
||
2E2865A0000
|
heap
|
page read and write
|
||
193AB513000
|
heap
|
page read and write
|
||
1D8F89F0000
|
trusted library allocation
|
page read and write
|
||
CF122FF000
|
stack
|
page read and write
|
||
207AD760000
|
heap
|
page read and write
|
||
16800A90000
|
trusted library allocation
|
page read and write
|
||
193B02E0000
|
heap
|
page read and write
|
||
1BC52890000
|
heap
|
page read and write
|
||
191CB4B0000
|
heap
|
page read and write
|
||
2E28685F000
|
heap
|
page read and write
|
||
21BEEB00000
|
heap
|
page read and write
|
||
191CB66C000
|
heap
|
page read and write
|
||
1D8FA480000
|
trusted library allocation
|
page read and write
|
||
191CB645000
|
heap
|
page read and write
|
||
191CB631000
|
heap
|
page read and write
|
||
207AD790000
|
trusted library allocation
|
page read and write
|
||
2CF15F9000
|
stack
|
page read and write
|
||
788000
|
unkown
|
page read and write
|
||
191CB64F000
|
heap
|
page read and write
|
||
207AD800000
|
heap
|
page read and write
|
||
E913CFF000
|
stack
|
page read and write
|
||
193B023C000
|
heap
|
page read and write
|
||
AFF000
|
heap
|
page read and write
|
||
21BCF266000
|
heap
|
page read and write
|
||
2E28685D000
|
heap
|
page read and write
|
||
193AB559000
|
heap
|
page read and write
|
||
21BCEFA0000
|
heap
|
page read and write
|
||
FCE11FE000
|
stack
|
page read and write
|
||
193ABAE0000
|
trusted library allocation
|
page read and write
|
||
193B0120000
|
trusted library allocation
|
page read and write
|
||
5C979EF000
|
stack
|
page read and write
|
||
97F35FE000
|
stack
|
page read and write
|
||
2E287002000
|
trusted library allocation
|
page read and write
|
||
1B15F48B000
|
heap
|
page read and write
|
||
384F97A000
|
stack
|
page read and write
|
||
21BEEB02000
|
heap
|
page read and write
|
||
CF128FF000
|
stack
|
page read and write
|
||
1BC53202000
|
trusted library allocation
|
page read and write
|
||
1D8FA570000
|
remote allocation
|
page read and write
|
||
191CB629000
|
heap
|
page read and write
|
||
1D9FADD0000
|
heap
|
page read and write
|
||
21BEE890000
|
heap
|
page read and write
|
||
193B0440000
|
remote allocation
|
page read and write
|
||
401000
|
unkown
|
page execute read
|
||
1B15F44D000
|
heap
|
page read and write
|
||
1BC52A89000
|
heap
|
page read and write
|
||
193B0230000
|
trusted library allocation
|
page read and write
|
||
38F44FF000
|
stack
|
page read and write
|
||
384F8F9000
|
stack
|
page read and write
|
||
191CB4A0000
|
heap
|
page read and write
|
||
21BEE820000
|
heap
|
page read and write
|
||
1EB96475000
|
heap
|
page read and write
|
||
2E286730000
|
remote allocation
|
page read and write
|
||
193B02FD000
|
heap
|
page read and write
|
||
193B0110000
|
trusted library allocation
|
page read and write
|
||
1BC52A70000
|
heap
|
page read and write
|
||
1D8F8A5A000
|
heap
|
page read and write
|
||
6D8750B000
|
stack
|
page read and write
|
||
1B15F1A0000
|
heap
|
page read and write
|
||
1D8FA4F0000
|
trusted library allocation
|
page read and write
|
||
FCE137C000
|
stack
|
page read and write
|
||
24EE000
|
stack
|
page read and write
|
||
193AAA9F000
|
heap
|
page read and write
|
||
16800256000
|
heap
|
page read and write
|
||
191CB64C000
|
heap
|
page read and write
|
||
21BCF2E8000
|
heap
|
page read and write
|
||
6D8797B000
|
stack
|
page read and write
|
||
191CB64B000
|
heap
|
page read and write
|
||
191CB686000
|
heap
|
page read and write
|
||
21BCF200000
|
heap
|
page read and write
|
||
1B15F452000
|
heap
|
page read and write
|
||
1BC52A3C000
|
heap
|
page read and write
|
||
193AA8E0000
|
heap
|
page read and write
|
||
AE2000
|
heap
|
page read and write
|
||
207AD802000
|
heap
|
page read and write
|
||
191CB63E000
|
heap
|
page read and write
|
||
21BEE830000
|
heap
|
page read and write
|
||
1D9FAD40000
|
heap
|
page read and write
|
||
491E36C000
|
stack
|
page read and write
|
||
1D9FAE19000
|
heap
|
page read and write
|
||
191CB664000
|
heap
|
page read and write
|
||
38F42FB000
|
stack
|
page read and write
|
||
1D9FAE18000
|
heap
|
page read and write
|
||
775BFB000
|
stack
|
page read and write
|
||
193B0110000
|
trusted library allocation
|
page read and write
|
||
193AAB26000
|
heap
|
page read and write
|
||
1D9FACE0000
|
trusted library allocation
|
page read and write
|
||
191CB650000
|
heap
|
page read and write
|
||
25D4000
|
heap
|
page read and write
|
||
1B15FC02000
|
trusted library allocation
|
page read and write
|
||
E913F7D000
|
stack
|
page read and write
|
||
1D9FB160000
|
heap
|
page read and write
|
||
319D000
|
stack
|
page read and write
|
||
2CF177A000
|
stack
|
page read and write
|
||
16800213000
|
heap
|
page read and write
|
||
193B01B0000
|
trusted library allocation
|
page read and write
|
||
193B02B5000
|
heap
|
page read and write
|
||
191CB67D000
|
heap
|
page read and write
|
||
1EB96502000
|
heap
|
page read and write
|
||
191CB674000
|
heap
|
page read and write
|
||
1D8F8950000
|
heap
|
page read and write
|
||
25D0000
|
heap
|
page read and write
|
||
1EB96220000
|
heap
|
page read and write
|
||
20C4B913000
|
heap
|
page read and write
|
||
5C9796B000
|
stack
|
page read and write
|
||
1EB96429000
|
heap
|
page read and write
|
||
193AB3F0000
|
trusted library allocation
|
page read and write
|
||
6D87CFF000
|
stack
|
page read and write
|
||
1BC52B02000
|
heap
|
page read and write
|
||
21BCF313000
|
heap
|
page read and write
|
||
193B020C000
|
heap
|
page read and write
|
||
20C4B850000
|
heap
|
page read and write
|
||
782000
|
unkown
|
page read and write
|
There are 523 hidden memdumps, click here to show them.