Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
SCAN Swift 054545676700000000000000001.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
|
initial sample
|
||
C:\Users\user\AppData\Local\Temp\Bllebrs.bar
|
ASCII text, with very long lines, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\Bluetooth Suite help_ITA.chm
|
MS Windows HtmlHelp Data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\CDMDataEventHandler.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\Pressekonferencens.maa
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\gspawn-win64-helper.exe
|
PE32+ executable (GUI) x86-64 (stripped to external PDB), for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\libLerc.dll
|
PE32+ executable (DLL) (console) x86-64 (stripped to external PDB), for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\libenchant-2.dll
|
PE32+ executable (DLL) (console) x86-64 (stripped to external PDB), for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\msvcr100.dll
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\nsk14B9.tmp\System.dll
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\system-shutdown.png
|
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\zoom-out-symbolic.svg
|
SVG Scalable Vector Graphics image
|
dropped
|
||
\Device\ConDrv
|
ASCII text, with CRLF line terminators
|
dropped
|
There are 3 hidden files, click here to show them.
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\SCAN Swift 054545676700000000000000001.exe
|
"C:\Users\user\Desktop\SCAN Swift 054545676700000000000000001.exe"
|
||
C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exe
|
"C:\Users\user\Desktop\SCAN Swift 054545676700000000000000001.exe"
|
||
C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exe
|
"C:\Users\user\Desktop\SCAN Swift 054545676700000000000000001.exe"
|
||
C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exe
|
"C:\Users\user\Desktop\SCAN Swift 054545676700000000000000001.exe"
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
http://donaldtrumpverse.com/HUMBLE%202022_esIXilivcW48.bin
|
103.211.219.10
|
||
http://donaldtrumpverse.com/HUMBLE%202022_esIXilivcW48.binH
|
unknown
|
||
http://127.0.0.1:HTTP/1.1
|
unknown
|
||
https://us1.api.ws-hp.com/clienttelemetry
|
unknown
|
||
http://DynDns.comDynDNS
|
unknown
|
||
https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip%tordir%%ha
|
unknown
|
||
https://pie-us1.api.ws-hp.com/clienttelemetry
|
unknown
|
||
http://MBStZn.com
|
unknown
|
||
http://donaldtrumpverse.com/HUMBLE%202022_esIXilivcW48.binG
|
unknown
|
||
https://schemaregistry.analysis.ext.hp.com/cdm/gun/com.hp.cdm.platform.software.domain.eventing.reso
|
unknown
|
||
https://schemaregistry.analysis.ext.hp.com/cdm/id/sw/sysInfoBase.schema.json
|
unknown
|
||
https://api.ipify.org%H
|
unknown
|
||
https://support.google.com/chrome/?p=plugin_flash
|
unknown
|
||
https://api.ipify.org%GETMozilla/5.0
|
unknown
|
||
https://stage-us1.api.ws-hp.com/clienttelemetry
|
unknown
|
||
http://nsis.sf.net/NSIS_ErrorError
|
unknown
|
||
https://schemaregistry.analysis.ext.hp.com/cdm/id/sw/originatorDetail.schema.json
|
unknown
|
There are 7 hidden URLs, click here to show them.
Domains
Name
|
IP
|
Malicious
|
|
---|---|---|---|
donaldtrumpverse.com
|
103.211.219.10
|
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
103.211.219.10
|
donaldtrumpverse.com
|
Seychelles
|
Registry
Path
|
Value
|
Malicious
|
|
---|---|---|---|
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\HAAND\Benfisken85
|
detaljeprojektets
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\PARANTHRACENE
|
INTERPELLATION
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Valeward72\esc
|
Transfixation98
|
||
HKEY_CURRENT_USER\SOFTWARE\DOMMERASPIRANTER\ETHERIIDAE
|
internalising
|
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
1DBEE000
|
trusted library allocation
|
page read and write
|
||
2A80000
|
direct allocation
|
page execute and read and write
|
||
1DB21000
|
trusted library allocation
|
page read and write
|
||
1400000
|
remote allocation
|
page execute and read and write
|
||
1555000
|
trusted library allocation
|
page read and write
|
||
1C951000
|
heap
|
page read and write
|
||
1D902000
|
trusted library allocation
|
page execute and read and write
|
||
1400000
|
remote allocation
|
page execute and read and write
|
||
1DA15A30000
|
heap
|
page read and write
|
||
1D78A000
|
stack
|
page read and write
|
||
5B8000
|
heap
|
page read and write
|
||
1530000
|
heap
|
page read and write
|
||
1D912000
|
trusted library allocation
|
page read and write
|
||
1720000
|
trusted library allocation
|
page read and write
|
||
1C951000
|
heap
|
page read and write
|
||
46C000
|
unkown
|
page readonly
|
||
1C951000
|
heap
|
page read and write
|
||
19CA86C0000
|
heap
|
page read and write
|
||
11C0000
|
remote allocation
|
page read and write
|
||
1C951000
|
heap
|
page read and write
|
||
1720000
|
trusted library allocation
|
page read and write
|
||
1FDC0000
|
trusted library allocation
|
page read and write
|
||
157B000
|
trusted library allocation
|
page read and write
|
||
1DA1657C000
|
heap
|
page read and write
|
||
1740000
|
trusted library allocation
|
page read and write
|
||
1C951000
|
heap
|
page read and write
|
||
1570000
|
trusted library allocation
|
page read and write
|
||
19CA886D000
|
heap
|
page read and write
|
||
1A30000
|
trusted library allocation
|
page read and write
|
||
1C951000
|
heap
|
page read and write
|
||
1C951000
|
heap
|
page read and write
|
||
1940000
|
trusted library allocation
|
page read and write
|
||
1555000
|
trusted library allocation
|
page read and write
|
||
19CA885D000
|
heap
|
page read and write
|
||
1C951000
|
heap
|
page read and write
|
||
1930000
|
trusted library allocation
|
page read and write
|
||
19CA8760000
|
unclassified section
|
page readonly
|
||
1552000
|
trusted library allocation
|
page read and write
|
||
1C951000
|
heap
|
page read and write
|
||
1C951000
|
heap
|
page read and write
|
||
1DA1650E000
|
heap
|
page read and write
|
||
19CA9202000
|
trusted library allocation
|
page read and write
|
||
440000
|
unkown
|
page read and write
|
||
1720000
|
trusted library allocation
|
page read and write
|
||
1DACE000
|
stack
|
page read and write
|
||
1720000
|
trusted library allocation
|
page read and write
|
||
1C951000
|
heap
|
page read and write
|
||
1DA15B00000
|
heap
|
page read and write
|
||
1940000
|
trusted library allocation
|
page execute and read and write
|
||
1C951000
|
heap
|
page read and write
|
||
1550000
|
trusted library allocation
|
page read and write
|
||
1D900000
|
trusted library allocation
|
page read and write
|
||
1550000
|
trusted library allocation
|
page read and write
|
||
1550000
|
trusted library allocation
|
page read and write
|
||
5D3000
|
heap
|
page read and write
|
||
1DA15A00000
|
heap
|
page read and write
|
||
1DA15A6B000
|
heap
|
page read and write
|
||
1970000
|
trusted library allocation
|
page read and write
|
||
1D8C0000
|
trusted library allocation
|
page read and write
|
||
1A60000
|
trusted library allocation
|
page read and write
|
||
1DA16537000
|
heap
|
page read and write
|
||
19CA8860000
|
heap
|
page read and write
|
||
5CA000
|
heap
|
page read and write
|
||
1C951000
|
heap
|
page read and write
|
||
1C951000
|
heap
|
page read and write
|
||
1550000
|
trusted library allocation
|
page read and write
|
||
1C951000
|
heap
|
page read and write
|
||
1DA1652C000
|
heap
|
page read and write
|
||
1550000
|
trusted library allocation
|
page read and write
|
||
1D980000
|
heap
|
page execute and read and write
|
||
1C951000
|
heap
|
page read and write
|
||
431000
|
unkown
|
page read and write
|
||
1DA16570000
|
heap
|
page read and write
|
||
1C951000
|
heap
|
page read and write
|
||
1720000
|
trusted library allocation
|
page read and write
|
||
1C951000
|
heap
|
page read and write
|
||
19CA886B000
|
heap
|
page read and write
|
||
1920000
|
trusted library allocation
|
page read and write
|
||
1C951000
|
heap
|
page read and write
|
||
1730000
|
trusted library allocation
|
page execute and read and write
|
||
19CA8802000
|
heap
|
page read and write
|
||
19CA8834000
|
heap
|
page read and write
|
||
1030000
|
heap
|
page read and write
|
||
11C0000
|
remote allocation
|
page read and write
|
||
1550000
|
trusted library allocation
|
page read and write
|
||
1C951000
|
heap
|
page read and write
|
||
1C951000
|
heap
|
page read and write
|
||
588000
|
heap
|
page read and write
|
||
1C951000
|
heap
|
page read and write
|
||
1C951000
|
heap
|
page read and write
|
||
1FE7D000
|
stack
|
page read and write
|
||
1550000
|
trusted library allocation
|
page read and write
|
||
1555000
|
trusted library allocation
|
page read and write
|
||
2041E000
|
stack
|
page read and write
|
||
1DA15A99000
|
heap
|
page read and write
|
||
1720000
|
trusted library allocation
|
page read and write
|
||
1DA1652C000
|
heap
|
page read and write
|
||
1555000
|
trusted library allocation
|
page read and write
|
||
1DA16500000
|
heap
|
page read and write
|
||
2C10000
|
heap
|
page read and write
|
||
1910000
|
trusted library allocation
|
page read and write
|
||
1C951000
|
heap
|
page read and write
|
||
1C951000
|
heap
|
page read and write
|
||
1C951000
|
heap
|
page read and write
|
||
1FE90000
|
trusted library allocation
|
page read and write
|
||
1555000
|
trusted library allocation
|
page read and write
|
||
3289000
|
trusted library allocation
|
page read and write
|
||
1C951000
|
heap
|
page read and write
|
||
1849000
|
heap
|
page read and write
|
||
1897000
|
heap
|
page read and write
|
||
1C951000
|
heap
|
page read and write
|
||
1550000
|
trusted library allocation
|
page read and write
|
||
1DA1657C000
|
heap
|
page read and write
|
||
1841000
|
heap
|
page read and write
|
||
1D8FA000
|
trusted library allocation
|
page execute and read and write
|
||
1720000
|
trusted library allocation
|
page read and write
|
||
1720000
|
trusted library allocation
|
page read and write
|
||
580000
|
remote allocation
|
page read and write
|
||
BA5000
|
heap
|
page read and write
|
||
1C951000
|
heap
|
page read and write
|
||
2B81000
|
trusted library allocation
|
page read and write
|
||
1863000
|
heap
|
page read and write
|
||
1950000
|
trusted library allocation
|
page read and write
|
||
1D0000
|
unclassified section
|
page readonly
|
||
18A0000
|
trusted library allocation
|
page read and write
|
||
1D90A000
|
trusted library allocation
|
page execute and read and write
|
||
1D410000
|
heap
|
page read and write
|
||
1555000
|
trusted library allocation
|
page read and write
|
||
1DA15AB5000
|
heap
|
page read and write
|
||
1DA15AAA000
|
heap
|
page read and write
|
||
6F426000
|
unkown
|
page readonly
|
||
40D000
|
unkown
|
page read and write
|
||
1C951000
|
heap
|
page read and write
|
||
1FDFC000
|
stack
|
page read and write
|
||
193E000
|
stack
|
page read and write
|
||
1550000
|
trusted library allocation
|
page read and write
|
||
408000
|
unkown
|
page readonly
|
||
1720000
|
trusted library allocation
|
page read and write
|
||
1560000
|
trusted library allocation
|
page read and write
|
||
1C951000
|
heap
|
page read and write
|
||
1DA1656D000
|
heap
|
page read and write
|
||
77EE27E000
|
stack
|
page read and write
|
||
1570000
|
trusted library allocation
|
page read and write
|
||
5E6000
|
heap
|
page read and write
|
||
1C951000
|
heap
|
page read and write
|
||
1C951000
|
heap
|
page read and write
|
||
1729000
|
trusted library allocation
|
page read and write
|
||
1DA1653B000
|
heap
|
page read and write
|
||
1552000
|
trusted library allocation
|
page read and write
|
||
1DA16540000
|
heap
|
page read and write
|
||
1C950000
|
heap
|
page read and write
|
||
1C951000
|
heap
|
page read and write
|
||
1573000
|
trusted library allocation
|
page read and write
|
||
1C951000
|
heap
|
page read and write
|
||
19CA8840000
|
heap
|
page read and write
|
||
1C951000
|
heap
|
page read and write
|
||
19F0000
|
trusted library allocation
|
page read and write
|
||
1C951000
|
heap
|
page read and write
|
||
1722000
|
trusted library allocation
|
page read and write
|
||
1DA1656B000
|
heap
|
page read and write
|
||
1C951000
|
heap
|
page read and write
|
||
1DA1652F000
|
heap
|
page read and write
|
||
1720000
|
trusted library allocation
|
page read and write
|
||
1DA15AA5000
|
heap
|
page read and write
|
||
17AB000
|
heap
|
page read and write
|
||
1DA1650F000
|
heap
|
page read and write
|
||
1C951000
|
heap
|
page read and write
|
||
1812000
|
heap
|
page read and write
|
||
5D5000
|
heap
|
page read and write
|
||
1C951000
|
heap
|
page read and write
|
||
2474000
|
heap
|
page read and write
|
||
1560000
|
trusted library allocation
|
page read and write
|
||
11C0000
|
remote allocation
|
page read and write
|
||
5ECF1CB000
|
stack
|
page read and write
|
||
46A000
|
unkown
|
page read and write
|
||
1D30E000
|
stack
|
page read and write
|
||
7F400000
|
trusted library allocation
|
page execute and read and write
|
||
1550000
|
trusted library allocation
|
page read and write
|
||
1C951000
|
heap
|
page read and write
|
||
1555000
|
trusted library allocation
|
page read and write
|
||
1730000
|
trusted library allocation
|
page read and write
|
||
1C951000
|
heap
|
page read and write
|
||
1DAE0000
|
trusted library allocation
|
page read and write
|
||
1DA16529000
|
heap
|
page read and write
|
||
1930000
|
trusted library allocation
|
page read and write
|
||
46C000
|
unkown
|
page readonly
|
||
1D8E2000
|
trusted library allocation
|
page execute and read and write
|
||
1555000
|
trusted library allocation
|
page read and write
|
||
1831000
|
heap
|
page read and write
|
||
1DA16574000
|
heap
|
page read and write
|
||
1180000
|
trusted library allocation
|
page execute and read and write
|
||
1C951000
|
heap
|
page read and write
|
||
1150000
|
trusted library allocation
|
page execute and read and write
|
||
1726000
|
trusted library allocation
|
page read and write
|
||
1720000
|
trusted library allocation
|
page read and write
|
||
19CA8813000
|
heap
|
page read and write
|
||
2051D000
|
stack
|
page read and write
|
||
1D910000
|
trusted library allocation
|
page read and write
|
||
1720000
|
trusted library allocation
|
page read and write
|
||
1C951000
|
heap
|
page read and write
|
||
1C951000
|
heap
|
page read and write
|
||
B0E000
|
stack
|
page read and write
|
||
1DA15A2A000
|
heap
|
page read and write
|
||
1DA16513000
|
heap
|
page read and write
|
||
1920000
|
trusted library allocation
|
page read and write
|
||
1C951000
|
heap
|
page read and write
|
||
1900000
|
trusted library allocation
|
page read and write
|
||
2055E000
|
stack
|
page read and write
|
||
10D0000
|
trusted library allocation
|
page read and write
|
||
1720000
|
trusted library allocation
|
page read and write
|
||
19CA8848000
|
heap
|
page read and write
|
||
1D90C000
|
trusted library allocation
|
page execute and read and write
|
||
1C951000
|
heap
|
page read and write
|
||
408000
|
unkown
|
page readonly
|
||
19CA885B000
|
heap
|
page read and write
|
||
505000
|
heap
|
page read and write
|
||
1550000
|
trusted library allocation
|
page read and write
|
||
1C951000
|
heap
|
page read and write
|
||
77EDB9B000
|
stack
|
page read and write
|
||
1C951000
|
heap
|
page read and write
|
||
1560000
|
trusted library allocation
|
page read and write
|
||
1DA1655B000
|
heap
|
page read and write
|
||
1DA15AB0000
|
heap
|
page read and write
|
||
19CA8800000
|
heap
|
page read and write
|
||
1550000
|
trusted library allocation
|
page read and write
|
||
1D8DA000
|
trusted library allocation
|
page execute and read and write
|
||
1C951000
|
heap
|
page read and write
|
||
1740000
|
trusted library section
|
page read and write
|
||
1C951000
|
heap
|
page read and write
|
||
1DA16415000
|
heap
|
page read and write
|
||
401000
|
unkown
|
page execute read
|
||
30000
|
heap
|
page read and write
|
||
1DA16574000
|
heap
|
page read and write
|
||
1C951000
|
heap
|
page read and write
|
||
1DA15A80000
|
heap
|
page read and write
|
||
1C951000
|
heap
|
page read and write
|
||
1DA15A9F000
|
heap
|
page read and write
|
||
15B4000
|
heap
|
page read and write
|
||
201CD000
|
stack
|
page read and write
|
||
1550000
|
trusted library allocation
|
page read and write
|
||
180D000
|
heap
|
page read and write
|
||
1720000
|
trusted library allocation
|
page read and write
|
||
1750000
|
trusted library allocation
|
page read and write
|
||
194C000
|
trusted library allocation
|
page read and write
|
||
1550000
|
trusted library allocation
|
page read and write
|
||
1DA15AB8000
|
heap
|
page read and write
|
||
1720000
|
trusted library allocation
|
page read and write
|
||
1A40000
|
trusted library allocation
|
page read and write
|
||
1C951000
|
heap
|
page read and write
|
||
1C951000
|
heap
|
page read and write
|
||
1C951000
|
heap
|
page read and write
|
||
1C951000
|
heap
|
page read and write
|
||
1DA15A40000
|
heap
|
page read and write
|
||
1C951000
|
heap
|
page read and write
|
||
1C951000
|
heap
|
page read and write
|
||
1CD80000
|
heap
|
page read and write
|
||
1550000
|
trusted library allocation
|
page read and write
|
||
1C951000
|
heap
|
page read and write
|
||
1C951000
|
heap
|
page read and write
|
||
1C951000
|
heap
|
page read and write
|
||
1DA15AA7000
|
heap
|
page read and write
|
||
1DA15A83000
|
heap
|
page read and write
|
||
42C000
|
unkown
|
page read and write
|
||
1550000
|
trusted library allocation
|
page read and write
|
||
1A36000
|
trusted library allocation
|
page read and write
|
||
1C951000
|
heap
|
page read and write
|
||
1EB21000
|
trusted library allocation
|
page read and write
|
||
19CA887D000
|
heap
|
page read and write
|
||
1DA15B13000
|
heap
|
page read and write
|
||
1740000
|
trusted library allocation
|
page read and write
|
||
1DA15B02000
|
heap
|
page read and write
|
||
188B000
|
heap
|
page read and write
|
||
1C951000
|
heap
|
page read and write
|
||
46E0000
|
trusted library allocation
|
page read and write
|
||
400000
|
unkown
|
page readonly
|
||
1D886000
|
stack
|
page read and write
|
||
5B0000
|
heap
|
page read and write
|
||
11D0000
|
unclassified section
|
page readonly
|
||
1C951000
|
heap
|
page read and write
|
||
1730000
|
trusted library allocation
|
page read and write
|
||
1DA16270000
|
trusted library allocation
|
page read and write
|
||
6F420000
|
unkown
|
page readonly
|
||
11C0000
|
remote allocation
|
page read and write
|
||
1C951000
|
heap
|
page read and write
|
||
1DA15AB0000
|
heap
|
page read and write
|
||
244F000
|
stack
|
page read and write
|
||
5ECF7FC000
|
stack
|
page read and write
|
||
1720000
|
trusted library allocation
|
page read and write
|
||
1DA15A7E000
|
heap
|
page read and write
|
||
1170000
|
trusted library allocation
|
page execute and read and write
|
||
1DA15A13000
|
heap
|
page read and write
|
||
1555000
|
trusted library allocation
|
page read and write
|
||
1DA15A8F000
|
heap
|
page read and write
|
||
1D40F000
|
stack
|
page read and write
|
||
1C951000
|
heap
|
page read and write
|
||
B10000
|
heap
|
page read and write
|
||
40A000
|
unkown
|
page write copy
|
||
203CF000
|
stack
|
page read and write
|
||
1C951000
|
heap
|
page read and write
|
||
1DA15AB5000
|
heap
|
page read and write
|
||
11C0000
|
remote allocation
|
page read and write
|
||
1960000
|
trusted library allocation
|
page read and write
|
||
84E000
|
stack
|
page read and write
|
||
1720000
|
trusted library allocation
|
page read and write
|
||
1720000
|
trusted library allocation
|
page read and write
|
||
580000
|
heap
|
page read and write
|
||
1DBE8000
|
trusted library allocation
|
page read and write
|
||
1C951000
|
heap
|
page read and write
|
||
1DAF0000
|
trusted library allocation
|
page execute and read and write
|
||
1750000
|
trusted library allocation
|
page read and write
|
||
1C951000
|
heap
|
page read and write
|
||
ACF000
|
stack
|
page read and write
|
||
1C951000
|
heap
|
page read and write
|
||
400000
|
unkown
|
page readonly
|
||
1730000
|
trusted library allocation
|
page read and write
|
||
580000
|
remote allocation
|
page read and write
|
||
40A000
|
unkown
|
page read and write
|
||
950000
|
trusted library allocation
|
page read and write
|
||
19CA8826000
|
heap
|
page read and write
|
||
1D8F6000
|
trusted library allocation
|
page execute and read and write
|
||
1900000
|
trusted library allocation
|
page read and write
|
||
1D8F2000
|
trusted library allocation
|
page read and write
|
||
400000
|
remote allocation
|
page read and write
|
||
19CA8867000
|
heap
|
page read and write
|
||
1C951000
|
heap
|
page read and write
|
||
1FE80000
|
heap
|
page read and write
|
||
1740000
|
trusted library allocation
|
page read and write
|
||
19CA8770000
|
heap
|
page read and write
|
||
1720000
|
trusted library allocation
|
page read and write
|
||
1EBA0000
|
trusted library allocation
|
page read and write
|
||
1D917000
|
trusted library allocation
|
page execute and read and write
|
||
19CA8869000
|
heap
|
page read and write
|
||
1DA16576000
|
heap
|
page read and write
|
||
1C951000
|
heap
|
page read and write
|
||
1C951000
|
heap
|
page read and write
|
||
1C951000
|
heap
|
page read and write
|
||
19CA8844000
|
heap
|
page read and write
|
||
1570000
|
trusted library allocation
|
page read and write
|
||
580000
|
remote allocation
|
page read and write
|
||
1C951000
|
heap
|
page read and write
|
||
1570000
|
trusted library allocation
|
page read and write
|
||
1720000
|
trusted library allocation
|
page read and write
|
||
1DA16402000
|
heap
|
page read and write
|
||
1C951000
|
heap
|
page read and write
|
||
1EB47000
|
trusted library allocation
|
page read and write
|
||
1720000
|
trusted library allocation
|
page read and write
|
||
1A30000
|
trusted library allocation
|
page read and write
|
||
1720000
|
trusted library allocation
|
page read and write
|
||
1555000
|
trusted library allocation
|
page read and write
|
||
1C951000
|
heap
|
page read and write
|
||
1DA1652D000
|
heap
|
page read and write
|
||
19A000
|
stack
|
page read and write
|
||
1570000
|
trusted library allocation
|
page read and write
|
||
1DA159A0000
|
unclassified section
|
page readonly
|
||
1C951000
|
heap
|
page read and write
|
||
1C951000
|
heap
|
page read and write
|
||
1C951000
|
heap
|
page read and write
|
||
1C951000
|
heap
|
page read and write
|
||
1720000
|
trusted library allocation
|
page read and write
|
||
1C951000
|
heap
|
page read and write
|
||
4719000
|
trusted library allocation
|
page read and write
|
||
1550000
|
trusted library allocation
|
page read and write
|
||
1C951000
|
heap
|
page read and write
|
||
2470000
|
heap
|
page read and write
|
||
1DA16570000
|
heap
|
page read and write
|
||
1C951000
|
heap
|
page read and write
|
||
1FCBE000
|
stack
|
page read and write
|
||
1C951000
|
heap
|
page read and write
|
||
5ECF6FE000
|
stack
|
page read and write
|
||
5ECF679000
|
stack
|
page read and write
|
||
1DA1657C000
|
heap
|
page read and write
|
||
1CD86000
|
heap
|
page read and write
|
||
1DA16502000
|
heap
|
page read and write
|
||
1C951000
|
heap
|
page read and write
|
||
1DCED000
|
trusted library allocation
|
page read and write
|
||
1C951000
|
heap
|
page read and write
|
||
19CA883C000
|
heap
|
page read and write
|
||
1DA15A92000
|
heap
|
page read and write
|
||
1750000
|
trusted library allocation
|
page read and write
|
||
1C951000
|
heap
|
page read and write
|
||
15B0000
|
heap
|
page read and write
|
||
1EBD9000
|
trusted library allocation
|
page read and write
|
||
1D20E000
|
unkown
|
page read and write
|
||
1DA16400000
|
heap
|
page read and write
|
||
BA0000
|
heap
|
page read and write
|
||
336C000
|
stack
|
page read and write
|
||
B20000
|
heap
|
page read and write
|
||
1DB10000
|
heap
|
page read and write
|
||
1552000
|
trusted library allocation
|
page read and write
|
||
54E000
|
stack
|
page read and write
|
||
1DA15A7B000
|
heap
|
page read and write
|
||
1D8D2000
|
trusted library allocation
|
page execute and read and write
|
||
3270000
|
trusted library allocation
|
page read and write
|
||
1D8F0000
|
trusted library allocation
|
page read and write
|
||
1DA159B0000
|
heap
|
page read and write
|
||
1550000
|
trusted library allocation
|
page read and write
|
||
1C951000
|
heap
|
page read and write
|
||
1727000
|
trusted library allocation
|
page read and write
|
||
1720000
|
trusted library allocation
|
page read and write
|
||
5BC000
|
heap
|
page read and write
|
||
5D0000
|
heap
|
page read and write
|
||
1550000
|
trusted library allocation
|
page read and write
|
||
1D10B000
|
stack
|
page read and write
|
||
1DA1652C000
|
heap
|
page read and write
|
||
1510000
|
unclassified section
|
page readonly
|
||
1DA16576000
|
heap
|
page read and write
|
||
1DA15AA5000
|
heap
|
page read and write
|
||
1760000
|
trusted library allocation
|
page read and write
|
||
6F424000
|
unkown
|
page readonly
|
||
1910000
|
trusted library allocation
|
page read and write
|
||
1C951000
|
heap
|
page read and write
|
||
6F421000
|
unkown
|
page execute read
|
||
1850000
|
heap
|
page read and write
|
||
19CA886D000
|
heap
|
page read and write
|
||
1C951000
|
heap
|
page read and write
|
||
19CA8902000
|
heap
|
page read and write
|
||
1D960000
|
trusted library allocation
|
page read and write
|
||
1C951000
|
heap
|
page read and write
|
||
1C951000
|
heap
|
page read and write
|
||
1980000
|
trusted library allocation
|
page read and write
|
||
19CA8864000
|
heap
|
page read and write
|
||
400000
|
remote allocation
|
page read and write
|
||
1DA15A8F000
|
heap
|
page read and write
|
||
500000
|
heap
|
page read and write
|
||
1DA16510000
|
heap
|
page read and write
|
||
400000
|
remote allocation
|
page read and write
|
||
1C951000
|
heap
|
page read and write
|
||
1C951000
|
heap
|
page read and write
|
||
1DA158F0000
|
heap
|
page read and write
|
||
1C951000
|
heap
|
page read and write
|
||
1DA16529000
|
heap
|
page read and write
|
||
1A50000
|
trusted library allocation
|
page read and write
|
||
1DA16541000
|
heap
|
page read and write
|
||
1555000
|
trusted library allocation
|
page read and write
|
||
1DA15A7C000
|
heap
|
page read and write
|
||
2065E000
|
stack
|
page read and write
|
||
1720000
|
trusted library allocation
|
page read and write
|
||
1720000
|
trusted library allocation
|
page read and write
|
||
27FE000
|
stack
|
page read and write
|
||
1DA16532000
|
heap
|
page read and write
|
||
1C951000
|
heap
|
page read and write
|
||
1FDC2000
|
trusted library allocation
|
page read and write
|
||
19CA8851000
|
heap
|
page read and write
|
||
1555000
|
trusted library allocation
|
page read and write
|
||
1DC5F000
|
trusted library allocation
|
page read and write
|
||
77EE17F000
|
stack
|
page read and write
|
||
1990000
|
trusted library allocation
|
page read and write
|
||
346D000
|
stack
|
page read and write
|
||
94F000
|
stack
|
page read and write
|
||
1550000
|
trusted library allocation
|
page read and write
|
||
1DC59000
|
trusted library allocation
|
page read and write
|
||
5ECF9FF000
|
stack
|
page read and write
|
||
1560000
|
trusted library allocation
|
page read and write
|
||
1C951000
|
heap
|
page read and write
|
||
17E6000
|
heap
|
page read and write
|
||
19CA8862000
|
heap
|
page read and write
|
||
1C951000
|
heap
|
page read and write
|
||
1D95E000
|
stack
|
page read and write
|
||
1550000
|
trusted library allocation
|
page read and write
|
||
1550000
|
trusted library allocation
|
page read and write
|
||
1C951000
|
heap
|
page read and write
|
||
1572000
|
trusted library allocation
|
page read and write
|
||
1DA1652C000
|
heap
|
page read and write
|
||
4DE000
|
stack
|
page read and write
|
||
1C951000
|
heap
|
page read and write
|
||
1550000
|
trusted library allocation
|
page read and write
|
||
32B0000
|
trusted library allocation
|
page read and write
|
||
1C951000
|
heap
|
page read and write
|
||
1D91B000
|
trusted library allocation
|
page execute and read and write
|
||
1550000
|
trusted library allocation
|
page read and write
|
||
77EE37A000
|
stack
|
page read and write
|
||
1C951000
|
heap
|
page read and write
|
||
1570000
|
trusted library allocation
|
page read and write
|
||
1555000
|
trusted library allocation
|
page read and write
|
||
1540000
|
trusted library allocation
|
page execute and read and write
|
||
19A0000
|
trusted library allocation
|
page read and write
|
||
1720000
|
trusted library allocation
|
page read and write
|
||
19CA8720000
|
heap
|
page read and write
|
||
17A0000
|
heap
|
page read and write
|
||
1C951000
|
heap
|
page read and write
|
||
1C951000
|
heap
|
page read and write
|
||
1DCF1000
|
trusted library allocation
|
page read and write
|
||
1DA1652A000
|
heap
|
page read and write
|
||
9CE000
|
stack
|
page read and write
|
||
1720000
|
trusted library allocation
|
page read and write
|
||
1DA16556000
|
heap
|
page read and write
|
||
1C951000
|
heap
|
page read and write
|
||
1C951000
|
heap
|
page read and write
|
||
1C951000
|
heap
|
page read and write
|
||
19CA87C0000
|
trusted library allocation
|
page read and write
|
||
1C951000
|
heap
|
page read and write
|
||
1C951000
|
heap
|
page read and write
|
||
401000
|
unkown
|
page execute read
|
||
1CB4E000
|
stack
|
page read and write
|
||
1C951000
|
heap
|
page read and write
|
||
19CA882A000
|
heap
|
page read and write
|
||
98000
|
stack
|
page read and write
|
||
28FF000
|
stack
|
page read and write
|
||
1DA8F000
|
stack
|
page read and write
|
||
1DA15A51000
|
heap
|
page read and write
|
||
1740000
|
trusted library allocation
|
page read and write
|
||
1550000
|
trusted library allocation
|
page read and write
|
||
1804000
|
heap
|
page read and write
|
||
1722000
|
trusted library allocation
|
page read and write
|
||
1060000
|
trusted library allocation
|
page read and write
|
||
1740000
|
trusted library allocation
|
page read and write
|
||
5C2000
|
heap
|
page read and write
|
||
1DA15960000
|
heap
|
page read and write
|
||
2A40000
|
trusted library allocation
|
page read and write
|
There are 499 hidden memdumps, click here to show them.