Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
SecuriteInfo.com.Gen.Variant.Nemesis.6939.7902.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
|
initial sample
|
||
C:\Users\user\AppData\Local\Temp\Adventure_12.bmp
|
JPEG image data, JFIF standard 1.01, resolution (DPI), density 100x100, segment length 16, Exif Standard: [TIFF image data,
big-endian, direntries=3], baseline, precision 8, 110x110, frames 3
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\Lydabsorberende2.Eks
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\Pilkedes4.AFM
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\System.IO.UnmanagedMemoryStream.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\applications-utilities-symbolic.svg
|
SVG Scalable Vector Graphics image
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\camera-photo-symbolic.symbolic.png
|
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\nsyEAEC.tmp\System.dll
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\resume-vm-default.bat
|
HTML document, ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\wab32res.dll.mui
|
HTML document, ASCII text, with CRLF line terminators
|
modified
|
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\SecuriteInfo.com.Gen.Variant.Nemesis.6939.7902.exe
|
"C:\Users\user\Desktop\SecuriteInfo.com.Gen.Variant.Nemesis.6939.7902.exe"
|
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
http://2.56.57.22/MY%20AIRTEL%20TELEGRAM%20STUB_iHQdRhQNdR56.bin
|
|||
http://crl.certum.pl/ctsca2021.crl0o
|
unknown
|
||
http://repository.certum.pl/ctnca.cer09
|
unknown
|
||
http://repository.certum.pl/ctsca2021.cer0
|
unknown
|
||
http://crl.certum.pl/ctnca.crl0k
|
unknown
|
||
http://subca.ocsp-certum.com05
|
unknown
|
||
http://subca.ocsp-certum.com02
|
unknown
|
||
http://subca.ocsp-certum.com01
|
unknown
|
||
http://crl.certum.pl/ctnca2.crl0l
|
unknown
|
||
http://repository.certum.pl/ctnca2.cer09
|
unknown
|
||
http://nsis.sf.net/NSIS_ErrorError
|
unknown
|
||
http://www.certum.pl/CPS0
|
unknown
|
||
https://github.com/dotnet/runtime
|
unknown
|
There are 3 hidden URLs, click here to show them.
Registry
Path
|
Value
|
Malicious
|
|
---|---|---|---|
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Architectonica49\Ukraine93
|
Expand String Value
|
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
3140000
|
direct allocation
|
page execute and read and write
|
||
23E50C50000
|
heap
|
page read and write
|
||
255F116D000
|
heap
|
page read and write
|
||
1D4A6458000
|
heap
|
page read and write
|
||
255F11A8000
|
heap
|
page read and write
|
||
255F117B000
|
heap
|
page read and write
|
||
255F0647000
|
heap
|
page read and write
|
||
255F0656000
|
heap
|
page read and write
|
||
1EBC7E4C000
|
heap
|
page read and write
|
||
1EBC7E13000
|
heap
|
page read and write
|
||
255F1185000
|
heap
|
page read and write
|
||
255F0654000
|
heap
|
page read and write
|
||
1D4A6428000
|
heap
|
page read and write
|
||
22910DA0000
|
trusted library allocation
|
page read and write
|
||
1A0D39B0000
|
heap
|
page read and write
|
||
1D4A62F0000
|
heap
|
page read and write
|
||
401000
|
unkown
|
page execute read
|
||
255F1185000
|
heap
|
page read and write
|
||
B9875EA000
|
stack
|
page read and write
|
||
451000
|
unkown
|
page read and write
|
||
22910648000
|
heap
|
page read and write
|
||
255F1162000
|
heap
|
page read and write
|
||
22910702000
|
heap
|
page read and write
|
||
1A0D3BC0000
|
heap
|
page read and write
|
||
72494000
|
unkown
|
page readonly
|
||
255F118D000
|
heap
|
page read and write
|
||
255F1621000
|
heap
|
page read and write
|
||
20D30C93000
|
heap
|
page read and write
|
||
255F06A9000
|
heap
|
page read and write
|
||
20D362F7000
|
heap
|
page read and write
|
||
7B6887D000
|
stack
|
page read and write
|
||
22910613000
|
heap
|
page read and write
|
||
926D9FE000
|
stack
|
page read and write
|
||
206D9EC6000
|
heap
|
page read and write
|
||
255F0648000
|
heap
|
page read and write
|
||
255F063C000
|
heap
|
page read and write
|
||
255F1163000
|
heap
|
page read and write
|
||
3640000
|
trusted library allocation
|
page read and write
|
||
20D31701000
|
trusted library allocation
|
page read and write
|
||
255F118B000
|
heap
|
page read and write
|
||
255F064D000
|
heap
|
page read and write
|
||
206D9DF0000
|
heap
|
page read and write
|
||
1A0D3AF0000
|
heap
|
page read and write
|
||
255F1162000
|
heap
|
page read and write
|
||
255F064C000
|
heap
|
page read and write
|
||
7B68AF8000
|
stack
|
page read and write
|
||
1EBC7F13000
|
heap
|
page read and write
|
||
255F1180000
|
heap
|
page read and write
|
||
255F116A000
|
heap
|
page read and write
|
||
255F111C000
|
heap
|
page read and write
|
||
255F118D000
|
heap
|
page read and write
|
||
255F1185000
|
heap
|
page read and write
|
||
255F117D000
|
heap
|
page read and write
|
||
255F161A000
|
heap
|
page read and write
|
||
3766F2B000
|
stack
|
page read and write
|
||
376727D000
|
stack
|
page read and write
|
||
255F1198000
|
heap
|
page read and write
|
||
368B27F000
|
stack
|
page read and write
|
||
206D9EDE000
|
heap
|
page read and write
|
||
20D30C13000
|
heap
|
page read and write
|
||
2291064E000
|
heap
|
page read and write
|
||
7C6E7FB000
|
stack
|
page read and write
|
||
255F1002000
|
heap
|
page read and write
|
||
73A000
|
heap
|
page read and write
|
||
206D9EE3000
|
heap
|
page read and write
|
||
22910651000
|
heap
|
page read and write
|
||
1A0D4800000
|
trusted library allocation
|
page read and write
|
||
926D8FF000
|
stack
|
page read and write
|
||
206D9EB6000
|
heap
|
page read and write
|
||
255F116C000
|
heap
|
page read and write
|
||
23E50C7F000
|
heap
|
page read and write
|
||
255F1621000
|
heap
|
page read and write
|
||
183B3413000
|
heap
|
page read and write
|
||
255F11AD000
|
heap
|
page read and write
|
||
3650000
|
trusted library allocation
|
page read and write
|
||
206D9EB7000
|
heap
|
page read and write
|
||
206D9EC7000
|
heap
|
page read and write
|
||
255F115C000
|
heap
|
page read and write
|
||
20D361C0000
|
trusted library allocation
|
page read and write
|
||
20D3623D000
|
heap
|
page read and write
|
||
255F11AF000
|
heap
|
page read and write
|
||
20D31402000
|
heap
|
page read and write
|
||
6E0000
|
heap
|
page read and write
|
||
206D9DF5000
|
heap
|
page read and write
|
||
183B3513000
|
heap
|
page read and write
|
||
23E50C4C000
|
heap
|
page read and write
|
||
1A0D4AC0000
|
trusted library allocation
|
page read and write
|
||
183B3448000
|
heap
|
page read and write
|
||
255F117D000
|
heap
|
page read and write
|
||
255F116A000
|
heap
|
page read and write
|
||
7C6E8FB000
|
stack
|
page read and write
|
||
255F117D000
|
heap
|
page read and write
|
||
72496000
|
unkown
|
page readonly
|
||
7B685AE000
|
stack
|
page read and write
|
||
183B3453000
|
heap
|
page read and write
|
||
72490000
|
unkown
|
page readonly
|
||
206D9ED0000
|
heap
|
page read and write
|
||
6902EF9000
|
stack
|
page read and write
|
||
453000
|
unkown
|
page readonly
|
||
255F118C000
|
heap
|
page read and write
|
||
183B343C000
|
heap
|
page read and write
|
||
926D57B000
|
stack
|
page read and write
|
||
2291068C000
|
heap
|
page read and write
|
||
255F0653000
|
heap
|
page read and write
|
||
1EBC7E76000
|
heap
|
page read and write
|
||
B9878FF000
|
stack
|
page read and write
|
||
255F11A9000
|
heap
|
page read and write
|
||
255F1185000
|
heap
|
page read and write
|
||
23E50B50000
|
heap
|
page read and write
|
||
206D9EE5000
|
heap
|
page read and write
|
||
20D361C0000
|
trusted library allocation
|
page read and write
|
||
20D31559000
|
heap
|
page read and write
|
||
20D31D80000
|
trusted library section
|
page readonly
|
||
255F161A000
|
heap
|
page read and write
|
||
690299C000
|
stack
|
page read and write
|
||
926D47E000
|
stack
|
page read and write
|
||
20D365E0000
|
trusted library allocation
|
page read and write
|
||
368A87B000
|
stack
|
page read and write
|
||
23E50D08000
|
heap
|
page read and write
|
||
20D36120000
|
trusted library allocation
|
page read and write
|
||
2862000
|
trusted library allocation
|
page read and write
|
||
255F117D000
|
heap
|
page read and write
|
||
255F118F000
|
heap
|
page read and write
|
||
23E50C52000
|
heap
|
page read and write
|
||
728000
|
heap
|
page read and write
|
||
368AD7E000
|
stack
|
page read and write
|
||
1D4A6513000
|
heap
|
page read and write
|
||
368B0FF000
|
stack
|
page read and write
|
||
408000
|
unkown
|
page readonly
|
||
23DF000
|
stack
|
page read and write
|
||
255F11B9000
|
heap
|
page read and write
|
||
59FE7FD000
|
stack
|
page read and write
|
||
22910700000
|
heap
|
page read and write
|
||
B987AFC000
|
stack
|
page read and write
|
||
400000
|
unkown
|
page readonly
|
||
255F06E9000
|
heap
|
page read and write
|
||
20D30C74000
|
heap
|
page read and write
|
||
C0E000
|
stack
|
page read and write
|
||
1D4A6502000
|
heap
|
page read and write
|
||
20D362F9000
|
heap
|
page read and write
|
||
22910676000
|
heap
|
page read and write
|
||
255F1602000
|
heap
|
page read and write
|
||
738000
|
heap
|
page read and write
|
||
B98787F000
|
stack
|
page read and write
|
||
1D4A6470000
|
heap
|
page read and write
|
||
255F1185000
|
heap
|
page read and write
|
||
183B31F0000
|
heap
|
page read and write
|
||
183B3350000
|
trusted library allocation
|
page read and write
|
||
23E51602000
|
trusted library allocation
|
page read and write
|
||
183B3502000
|
heap
|
page read and write
|
||
255F1170000
|
heap
|
page read and write
|
||
183B3C02000
|
trusted library allocation
|
page read and write
|
||
255F1196000
|
heap
|
page read and write
|
||
926D1EE000
|
stack
|
page read and write
|
||
23E50AE0000
|
heap
|
page read and write
|
||
435000
|
unkown
|
page read and write
|
||
1A0D3C07000
|
heap
|
page read and write
|
||
206D9EC2000
|
heap
|
page read and write
|
||
20D3622C000
|
heap
|
page read and write
|
||
206D9EC1000
|
heap
|
page read and write
|
||
255F04D0000
|
heap
|
page read and write
|
||
926D7F7000
|
stack
|
page read and write
|
||
20D36521000
|
trusted library allocation
|
page read and write
|
||
183B3429000
|
heap
|
page read and write
|
||
255F11B1000
|
heap
|
page read and write
|
||
1A0D3C21000
|
heap
|
page read and write
|
||
255F11B2000
|
heap
|
page read and write
|
||
37674FB000
|
stack
|
page read and write
|
||
59FE8F9000
|
stack
|
page read and write
|
||
20D313C0000
|
trusted library section
|
page read and write
|
||
255F06F8000
|
heap
|
page read and write
|
||
23E50AF0000
|
heap
|
page read and write
|
||
20D36110000
|
trusted library allocation
|
page read and write
|
||
724000
|
heap
|
page read and write
|
||
3766FAE000
|
stack
|
page read and write
|
||
20D36200000
|
heap
|
page read and write
|
||
23E50C13000
|
heap
|
page read and write
|
||
368AF7E000
|
stack
|
page read and write
|
||
255F116A000
|
heap
|
page read and write
|
||
206D9E00000
|
heap
|
page read and write
|
||
255F119E000
|
heap
|
page read and write
|
||
1EBC8602000
|
trusted library allocation
|
page read and write
|
||
6E024FE000
|
stack
|
page read and write
|
||
255F06C1000
|
heap
|
page read and write
|
||
255F114D000
|
heap
|
page read and write
|
||
1D4A643E000
|
heap
|
page read and write
|
||
255F0650000
|
heap
|
page read and write
|
||
20D36190000
|
trusted library allocation
|
page read and write
|
||
22910629000
|
heap
|
page read and write
|
||
1A0D3B90000
|
trusted library allocation
|
page read and write
|
||
22D0000
|
heap
|
page read and write
|
||
368AC7A000
|
stack
|
page read and write
|
||
255F11A7000
|
heap
|
page read and write
|
||
20D361E0000
|
trusted library allocation
|
page read and write
|
||
C10000
|
heap
|
page read and write
|
||
23E50C29000
|
heap
|
page read and write
|
||
255F04E0000
|
heap
|
page read and write
|
||
23E50C6F000
|
heap
|
page read and write
|
||
229104A0000
|
heap
|
page read and write
|
||
1A0D39C0000
|
trusted library allocation
|
page read and write
|
||
255F1164000
|
heap
|
page read and write
|
||
1A0D3B40000
|
heap
|
page read and write
|
||
22910E02000
|
trusted library allocation
|
page read and write
|
||
368B1FB000
|
stack
|
page read and write
|
||
710000
|
heap
|
page read and write
|
||
20D30C8A000
|
heap
|
page read and write
|
||
255F116B000
|
heap
|
page read and write
|
||
59FE5F7000
|
stack
|
page read and write
|
||
255F119E000
|
heap
|
page read and write
|
||
2410000
|
heap
|
page read and write
|
||
1A0D3B49000
|
heap
|
page read and write
|
||
6E021FB000
|
stack
|
page read and write
|
||
255F11BA000
|
heap
|
page read and write
|
||
183B3400000
|
heap
|
page read and write
|
||
368AE7B000
|
stack
|
page read and write
|
||
183B3481000
|
heap
|
page read and write
|
||
20D36213000
|
heap
|
page read and write
|
||
380E000
|
stack
|
page read and write
|
||
255F1186000
|
heap
|
page read and write
|
||
59FE6FE000
|
stack
|
page read and write
|
||
255F116A000
|
heap
|
page read and write
|
||
20D362E0000
|
heap
|
page read and write
|
||
255F06A2000
|
heap
|
page read and write
|
||
20D30C8D000
|
heap
|
page read and write
|
||
255F117D000
|
heap
|
page read and write
|
||
20D362FB000
|
heap
|
page read and write
|
||
206D9ED0000
|
heap
|
page read and write
|
||
255F11B1000
|
heap
|
page read and write
|
||
1A0D4A60000
|
trusted library allocation
|
page read and write
|
||
570000
|
trusted library allocation
|
page read and write
|
||
23E50C47000
|
heap
|
page read and write
|
||
1D4A6390000
|
trusted library allocation
|
page read and write
|
||
37675F7000
|
stack
|
page read and write
|
||
255F118E000
|
heap
|
page read and write
|
||
7B68EF7000
|
stack
|
page read and write
|
||
255F0658000
|
heap
|
page read and write
|
||
20D36610000
|
remote allocation
|
page read and write
|
||
20D30AB0000
|
heap
|
page read and write
|
||
453000
|
unkown
|
page readonly
|
||
255F116A000
|
heap
|
page read and write
|
||
20D362FC000
|
heap
|
page read and write
|
||
20D30C00000
|
heap
|
page read and write
|
||
255F116A000
|
heap
|
page read and write
|
||
20D30C9F000
|
heap
|
page read and write
|
||
255F118B000
|
heap
|
page read and write
|
||
255F0600000
|
heap
|
page read and write
|
||
23E50C4D000
|
heap
|
page read and write
|
||
368B07F000
|
stack
|
page read and write
|
||
B987979000
|
stack
|
page read and write
|
||
20D313B0000
|
trusted library allocation
|
page read and write
|
||
20D361B0000
|
trusted library allocation
|
page read and write
|
||
255F1190000
|
heap
|
page read and write
|
||
22910647000
|
heap
|
page read and write
|
||
255F1187000
|
heap
|
page read and write
|
||
6E0207F000
|
stack
|
page read and write
|
||
255F119C000
|
heap
|
page read and write
|
||
206D9EA0000
|
heap
|
page read and write
|
||
71F000
|
heap
|
page read and write
|
||
20D36300000
|
heap
|
page read and write
|
||
255F1600000
|
heap
|
page read and write
|
||
255F1100000
|
heap
|
page read and write
|
||
20D31D40000
|
trusted library section
|
page readonly
|
||
20D36261000
|
heap
|
page read and write
|
||
255F0713000
|
heap
|
page read and write
|
||
255F118B000
|
heap
|
page read and write
|
||
22910649000
|
heap
|
page read and write
|
||
20D30D02000
|
heap
|
page read and write
|
||
20D30B10000
|
heap
|
page read and write
|
||
20D36524000
|
trusted library allocation
|
page read and write
|
||
926D16C000
|
stack
|
page read and write
|
||
255F1162000
|
heap
|
page read and write
|
||
59FE4FB000
|
stack
|
page read and write
|
||
183B346F000
|
heap
|
page read and write
|
||
1EBC7E4F000
|
heap
|
page read and write
|
||
1EBC7C30000
|
heap
|
page read and write
|
||
20D31C60000
|
trusted library allocation
|
page read and write
|
||
255F064F000
|
heap
|
page read and write
|
||
1A0D3BB0000
|
trusted library allocation
|
page read and write
|
||
422000
|
unkown
|
page read and write
|
||
255F064A000
|
heap
|
page read and write
|
||
255F1602000
|
heap
|
page read and write
|
||
1EBC7E00000
|
heap
|
page read and write
|
||
255F1618000
|
heap
|
page read and write
|
||
255F06E2000
|
heap
|
page read and write
|
||
255F1174000
|
heap
|
page read and write
|
||
255F0649000
|
heap
|
page read and write
|
||
255F118D000
|
heap
|
page read and write
|
||
255F118D000
|
heap
|
page read and write
|
||
22CE000
|
stack
|
page read and write
|
||
20D32100000
|
trusted library allocation
|
page read and write
|
||
255F117B000
|
heap
|
page read and write
|
||
255F1618000
|
heap
|
page read and write
|
||
255F0629000
|
heap
|
page read and write
|
||
255F11D5000
|
heap
|
page read and write
|
||
20D30C8F000
|
heap
|
page read and write
|
||
22910490000
|
heap
|
page read and write
|
||
72491000
|
unkown
|
page execute read
|
||
183B3508000
|
heap
|
page read and write
|
||
59FDF8B000
|
stack
|
page read and write
|
||
20D31D90000
|
trusted library section
|
page readonly
|
||
255F11BA000
|
heap
|
page read and write
|
||
7C6E9FE000
|
stack
|
page read and write
|
||
1A0D3C0F000
|
heap
|
page read and write
|
||
255F1181000
|
heap
|
page read and write
|
||
427000
|
unkown
|
page read and write
|
||
255F0570000
|
trusted library allocation
|
page read and write
|
||
368B57E000
|
stack
|
page read and write
|
||
20D31518000
|
heap
|
page read and write
|
||
255F066F000
|
heap
|
page read and write
|
||
1D4A6E02000
|
trusted library allocation
|
page read and write
|
||
255F11AD000
|
heap
|
page read and write
|
||
20D362A1000
|
heap
|
page read and write
|
||
23E50C3C000
|
heap
|
page read and write
|
||
1D4A6402000
|
heap
|
page read and write
|
||
255F1153000
|
heap
|
page read and write
|
||
1D4A6413000
|
heap
|
page read and write
|
||
183B3250000
|
heap
|
page read and write
|
||
7B6852B000
|
stack
|
page read and write
|
||
1A0D4A70000
|
trusted library allocation
|
page read and write
|
||
183B31E0000
|
heap
|
page read and write
|
||
20D31518000
|
heap
|
page read and write
|
||
20D361A0000
|
trusted library allocation
|
page read and write
|
||
3130000
|
trusted library allocation
|
page read and write
|
||
20D31558000
|
heap
|
page read and write
|
||
1EBC7E8F000
|
heap
|
page read and write
|
||
5D0000
|
heap
|
page read and write
|
||
20D30D13000
|
heap
|
page read and write
|
||
30000
|
heap
|
page read and write
|
||
23E50C4B000
|
heap
|
page read and write
|
||
6902DF9000
|
stack
|
page read and write
|
||
206D9EB2000
|
heap
|
page read and write
|
||
23E50D02000
|
heap
|
page read and write
|
||
255F1151000
|
heap
|
page read and write
|
||
255F1164000
|
heap
|
page read and write
|
||
37677FF000
|
stack
|
page read and write
|
||
7C6E6FB000
|
stack
|
page read and write
|
||
183B3450000
|
heap
|
page read and write
|
||
23E50C4F000
|
heap
|
page read and write
|
||
20D31513000
|
heap
|
page read and write
|
||
926D5FF000
|
stack
|
page read and write
|
||
183B344D000
|
heap
|
page read and write
|
||
22910713000
|
heap
|
page read and write
|
||
255F1602000
|
heap
|
page read and write
|
||
6902E7E000
|
stack
|
page read and write
|
||
255F11DC000
|
heap
|
page read and write
|
||
1EBC7C20000
|
heap
|
page read and write
|
||
20D36610000
|
remote allocation
|
page read and write
|
||
255F05E0000
|
remote allocation
|
page read and write
|
||
1D4A6300000
|
heap
|
page read and write
|
||
7B68F7F000
|
unkown
|
page read and write
|
||
B987A7E000
|
stack
|
page read and write
|
||
20D365F0000
|
trusted library allocation
|
page read and write
|
||
285F000
|
stack
|
page read and write
|
||
1A0D3B45000
|
heap
|
page read and write
|
||
255F1196000
|
heap
|
page read and write
|
||
255F1187000
|
heap
|
page read and write
|
||
23E50D00000
|
heap
|
page read and write
|
||
183B3449000
|
heap
|
page read and write
|
||
23E50C46000
|
heap
|
page read and write
|
||
255F118B000
|
heap
|
page read and write
|
||
206D9EC8000
|
heap
|
page read and write
|
||
368AB7A000
|
stack
|
page read and write
|
||
255F06B0000
|
heap
|
page read and write
|
||
20D362F1000
|
heap
|
page read and write
|
||
206D9EC4000
|
heap
|
page read and write
|
||
22D4000
|
heap
|
page read and write
|
||
59FE3FB000
|
stack
|
page read and write
|
||
255F0659000
|
heap
|
page read and write
|
||
255F1602000
|
heap
|
page read and write
|
||
1A0D3BC8000
|
heap
|
page read and write
|
||
370D000
|
stack
|
page read and write
|
||
20D36255000
|
heap
|
page read and write
|
||
20D361F4000
|
trusted library allocation
|
page read and write
|
||
255F118B000
|
heap
|
page read and write
|
||
1A0D3BA0000
|
trusted library allocation
|
page read and write
|
||
37676FE000
|
stack
|
page read and write
|
||
7B68DF8000
|
stack
|
page read and write
|
||
20D36500000
|
trusted library allocation
|
page read and write
|
||
23E50D13000
|
heap
|
page read and write
|
||
1A0D4A50000
|
heap
|
page readonly
|
||
1EBC7F08000
|
heap
|
page read and write
|
||
1EBC7F00000
|
heap
|
page read and write
|
||
1EBC7F02000
|
heap
|
page read and write
|
||
183B3475000
|
heap
|
page read and write
|
||
255F11B0000
|
heap
|
page read and write
|
||
20D36580000
|
trusted library allocation
|
page read and write
|
||
20D361F0000
|
trusted library allocation
|
page read and write
|
||
22910708000
|
heap
|
page read and write
|
||
20D31502000
|
heap
|
page read and write
|
||
255F068A000
|
heap
|
page read and write
|
||
2291063C000
|
heap
|
page read and write
|
||
255F118E000
|
heap
|
page read and write
|
||
1EBC7E81000
|
heap
|
page read and write
|
||
400000
|
unkown
|
page readonly
|
||
22910681000
|
heap
|
page read and write
|
||
1A0D3B10000
|
heap
|
page read and write
|
||
255F116A000
|
heap
|
page read and write
|
||
20D3624A000
|
heap
|
page read and write
|
||
7B689FF000
|
stack
|
page read and write
|
||
255F1162000
|
heap
|
page read and write
|
||
20D365D0000
|
trusted library allocation
|
page read and write
|
||
2291064A000
|
heap
|
page read and write
|
||
255F118B000
|
heap
|
page read and write
|
||
1EBC7E6A000
|
heap
|
page read and write
|
||
206D9ED0000
|
heap
|
page read and write
|
||
6902D79000
|
stack
|
page read and write
|
||
255F1602000
|
heap
|
page read and write
|
||
23E50B80000
|
trusted library allocation
|
page read and write
|
||
20D30D26000
|
heap
|
page read and write
|
||
255F1185000
|
heap
|
page read and write
|
||
206D9DC0000
|
heap
|
page read and write
|
||
B9879F9000
|
stack
|
page read and write
|
||
255F1123000
|
heap
|
page read and write
|
||
255F0613000
|
heap
|
page read and write
|
||
20D31415000
|
heap
|
page read and write
|
||
20D30C3D000
|
heap
|
page read and write
|
||
255F05E0000
|
remote allocation
|
page read and write
|
||
255F118B000
|
heap
|
page read and write
|
||
7B68BF7000
|
stack
|
page read and write
|
||
59FE27F000
|
stack
|
page read and write
|
||
206D9C90000
|
heap
|
page read and write
|
||
23E50C00000
|
heap
|
page read and write
|
||
20D31D70000
|
trusted library section
|
page readonly
|
||
6E01DCC000
|
stack
|
page read and write
|
||
255F118D000
|
heap
|
page read and write
|
||
255F0651000
|
heap
|
page read and write
|
||
255F0708000
|
heap
|
page read and write
|
||
368AA78000
|
stack
|
page read and write
|
||
59FE2FF000
|
stack
|
page read and write
|
||
376737C000
|
stack
|
page read and write
|
||
1EBC7D90000
|
trusted library allocation
|
page read and write
|
||
23E50C02000
|
heap
|
page read and write
|
||
20D31D60000
|
trusted library section
|
page readonly
|
||
1EBC7E29000
|
heap
|
page read and write
|
||
20D361E0000
|
trusted library allocation
|
page read and write
|
||
1EBC7C90000
|
heap
|
page read and write
|
||
2291064C000
|
heap
|
page read and write
|
||
6E023F7000
|
stack
|
page read and write
|
||
1D4A6360000
|
heap
|
page read and write
|
||
20D30C57000
|
heap
|
page read and write
|
||
6E022FB000
|
stack
|
page read and write
|
||
20D3621E000
|
heap
|
page read and write
|
||
2291064F000
|
heap
|
page read and write
|
||
255F06C7000
|
heap
|
page read and write
|
||
40A000
|
unkown
|
page read and write
|
||
20D362AD000
|
heap
|
page read and write
|
||
255F111A000
|
heap
|
page read and write
|
||
20D30CAF000
|
heap
|
page read and write
|
||
99000
|
stack
|
page read and write
|
||
183B3500000
|
heap
|
page read and write
|
||
22910662000
|
heap
|
page read and write
|
||
255F0540000
|
heap
|
page read and write
|
||
20D31500000
|
heap
|
page read and write
|
||
255F1162000
|
heap
|
page read and write
|
||
20D3650E000
|
trusted library allocation
|
page read and write
|
||
255F11CF000
|
heap
|
page read and write
|
||
926D6FB000
|
stack
|
page read and write
|
||
1A0D3CC0000
|
trusted library allocation
|
page read and write
|
||
20D361B0000
|
trusted library allocation
|
page read and write
|
||
20D30C78000
|
heap
|
page read and write
|
||
1D4A6467000
|
heap
|
page read and write
|
||
1A0D3BD0000
|
heap
|
page read and write
|
||
255F0702000
|
heap
|
page read and write
|
||
255F0716000
|
heap
|
page read and write
|
||
20D36302000
|
heap
|
page read and write
|
||
255F116A000
|
heap
|
page read and write
|
||
255F1191000
|
heap
|
page read and write
|
||
40A000
|
unkown
|
page write copy
|
||
7B68CFF000
|
stack
|
page read and write
|
||
401000
|
unkown
|
page execute read
|
||
255F117D000
|
heap
|
page read and write
|
||
20D30AA0000
|
heap
|
page read and write
|
||
6E020FF000
|
stack
|
page read and write
|
||
20D3629E000
|
heap
|
page read and write
|
||
408000
|
unkown
|
page readonly
|
||
1A0D3C0F000
|
heap
|
page read and write
|
||
20D32103000
|
trusted library allocation
|
page read and write
|
||
183B3446000
|
heap
|
page read and write
|
||
6E026FF000
|
stack
|
page read and write
|
||
1EBC7E3C000
|
heap
|
page read and write
|
||
20D32110000
|
trusted library allocation
|
page read and write
|
||
6E8000
|
heap
|
page read and write
|
||
20D36508000
|
trusted library allocation
|
page read and write
|
||
1EBC7E65000
|
heap
|
page read and write
|
||
20D31D50000
|
trusted library section
|
page readonly
|
||
20D30C55000
|
heap
|
page read and write
|
||
22910500000
|
heap
|
page read and write
|
||
20D30CFC000
|
heap
|
page read and write
|
||
255F119C000
|
heap
|
page read and write
|
||
255F117D000
|
heap
|
page read and write
|
||
20D320E1000
|
trusted library allocation
|
page read and write
|
||
19A000
|
stack
|
page read and write
|
||
22910600000
|
heap
|
page read and write
|
||
255F05E0000
|
remote allocation
|
page read and write
|
||
20D36302000
|
heap
|
page read and write
|
||
368AEFE000
|
stack
|
page read and write
|
||
20D30C29000
|
heap
|
page read and write
|
||
20D36610000
|
remote allocation
|
page read and write
|
||
1D4A6500000
|
heap
|
page read and write
|
||
255F06B3000
|
heap
|
page read and write
|
||
7C6E1CB000
|
stack
|
page read and write
|
||
255F1602000
|
heap
|
page read and write
|
||
C16000
|
heap
|
page read and write
|
||
20D30C6E000
|
heap
|
page read and write
|
||
1A0D4A40000
|
trusted library allocation
|
page read and write
|
||
6E025FD000
|
stack
|
page read and write
|
||
368B37C000
|
stack
|
page read and write
|
||
206D9EAB000
|
heap
|
page read and write
|
||
23E50C89000
|
heap
|
page read and write
|
||
1A0D3C0F000
|
heap
|
page read and write
|
||
37673FF000
|
stack
|
page read and write
|
||
20D31400000
|
heap
|
page read and write
|
||
255F11AF000
|
heap
|
page read and write
|
||
255F11B9000
|
heap
|
page read and write
|
||
20D365C0000
|
trusted library allocation
|
page read and write
|
||
368AFFE000
|
stack
|
page read and write
|
||
206D9EE0000
|
heap
|
page read and write
|
||
1D4A6400000
|
heap
|
page read and write
|
There are 508 hidden memdumps, click here to show them.