Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
UC2DFXQIBiE2kQ.dll
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
initial sample
|
||
C:\Users\user\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\77EC63BDA74BD0D0E0426DC8F8008506
|
Microsoft Cabinet archive data, Windows 2000/XP setup, 62919 bytes, 1 file, at 0x2c +A "authroot.stl", number 1, 6 datablocks,
0x1 compression
|
dropped
|
||
C:\Users\user\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\77EC63BDA74BD0D0E0426DC8F8008506
|
data
|
modified
|
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Windows\System32\regsvr32.exe
|
regsvr32.exe /s C:\Users\user\Desktop\UC2DFXQIBiE2kQ.dll
|
||
C:\Windows\System32\rundll32.exe
|
rundll32.exe "C:\Users\user\Desktop\UC2DFXQIBiE2kQ.dll",#1
|
||
C:\Windows\System32\rundll32.exe
|
rundll32.exe C:\Users\user\Desktop\UC2DFXQIBiE2kQ.dll,ACeujVZMknFDjv
|
||
C:\Windows\System32\rundll32.exe
|
rundll32.exe C:\Users\user\Desktop\UC2DFXQIBiE2kQ.dll,AHuDGMflBfPryOEYjuTfbzJdEM
|
||
C:\Windows\System32\regsvr32.exe
|
C:\Windows\system32\regsvr32.exe "C:\Windows\system32\NzmNpNPvo\tzEWj.dll"
|
||
C:\Windows\System32\rundll32.exe
|
rundll32.exe C:\Users\user\Desktop\UC2DFXQIBiE2kQ.dll,ATjQPkInxPUGuUu
|
||
C:\Windows\System32\regsvr32.exe
|
C:\Windows\system32\regsvr32.exe" "C:\Windows\system32\NzmNpNPvo\tzEWj.dll
|
||
C:\Windows\System32\regsvr32.exe
|
C:\Windows\system32\regsvr32.exe "C:\Users\user\AppData\Local\VfjAKsbRVDLoO\aeuwPIzDFvIwK.dll"
|
||
C:\Windows\System32\loaddll64.exe
|
loaddll64.exe "C:\Users\user\Desktop\UC2DFXQIBiE2kQ.dll"
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\cmd.exe
|
cmd.exe /C rundll32.exe "C:\Users\user\Desktop\UC2DFXQIBiE2kQ.dll",#1
|
There are 1 hidden processes, click here to show them.
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
https://172.105.115.71:8080/
|
unknown
|
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
172.105.115.71
|
unknown
|
United States
|
||
188.165.79.151
|
unknown
|
France
|
||
196.44.98.190
|
unknown
|
Ghana
|
||
174.138.33.49
|
unknown
|
United States
|
||
36.67.23.59
|
unknown
|
Indonesia
|
||
103.41.204.169
|
unknown
|
Indonesia
|
||
85.214.67.203
|
unknown
|
Germany
|
||
83.229.80.93
|
unknown
|
United Kingdom
|
||
198.199.70.22
|
unknown
|
United States
|
||
93.104.209.107
|
unknown
|
Germany
|
||
186.250.48.5
|
unknown
|
Brazil
|
||
209.239.112.82
|
unknown
|
United States
|
||
175.126.176.79
|
unknown
|
Korea Republic of
|
||
128.199.242.164
|
unknown
|
United Kingdom
|
||
178.238.225.252
|
unknown
|
Germany
|
||
46.101.98.60
|
unknown
|
Netherlands
|
||
190.145.8.4
|
unknown
|
Colombia
|
||
82.98.180.154
|
unknown
|
Spain
|
||
103.71.99.57
|
unknown
|
India
|
||
87.106.97.83
|
unknown
|
Germany
|
||
103.254.12.236
|
unknown
|
Viet Nam
|
||
103.85.95.4
|
unknown
|
Indonesia
|
||
202.134.4.210
|
unknown
|
Indonesia
|
||
165.22.254.236
|
unknown
|
United States
|
||
78.47.204.80
|
unknown
|
Germany
|
||
118.98.72.86
|
unknown
|
Indonesia
|
||
139.59.80.108
|
unknown
|
Singapore
|
||
104.244.79.94
|
unknown
|
United States
|
||
37.44.244.177
|
unknown
|
Germany
|
||
51.75.33.122
|
unknown
|
France
|
||
160.16.143.191
|
unknown
|
Japan
|
||
103.56.149.105
|
unknown
|
Indonesia
|
||
85.25.120.45
|
unknown
|
Germany
|
||
139.196.72.155
|
unknown
|
China
|
||
115.178.55.22
|
unknown
|
Indonesia
|
||
103.126.216.86
|
unknown
|
Bangladesh
|
||
128.199.217.206
|
unknown
|
United Kingdom
|
||
114.79.130.68
|
unknown
|
India
|
||
103.224.241.74
|
unknown
|
India
|
||
210.57.209.142
|
unknown
|
Indonesia
|
||
202.28.34.99
|
unknown
|
Thailand
|
||
80.211.107.116
|
unknown
|
Italy
|
||
54.37.228.122
|
unknown
|
France
|
||
218.38.121.17
|
unknown
|
Korea Republic of
|
||
185.148.169.10
|
unknown
|
Germany
|
||
195.77.239.39
|
unknown
|
Spain
|
||
178.62.112.199
|
unknown
|
European Union
|
||
62.171.178.147
|
unknown
|
United Kingdom
|
||
64.227.55.231
|
unknown
|
United States
|
There are 39 hidden IPs, click here to show them.
Registry
Path
|
Value
|
Malicious
|
|
---|---|---|---|
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
|
tzEWj.dll
|
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
2A2C5F01000
|
direct allocation
|
page execute read
|
||
1EEA9950000
|
direct allocation
|
page execute and read and write
|
||
1350000
|
direct allocation
|
page execute and read and write
|
||
4D0000
|
direct allocation
|
page execute and read and write
|
||
2A2C4510000
|
direct allocation
|
page execute and read and write
|
||
1E000100000
|
direct allocation
|
page execute and read and write
|
||
731000
|
direct allocation
|
page execute read
|
||
C90000
|
direct allocation
|
page execute and read and write
|
||
1E000141000
|
direct allocation
|
page execute read
|
||
2C41000
|
direct allocation
|
page execute read
|
||
2731000
|
direct allocation
|
page execute read
|
||
1EEA9991000
|
direct allocation
|
page execute read
|
||
7DE000
|
stack
|
page read and write
|
||
1EEA99F1000
|
heap
|
page read and write
|
||
11DB000
|
heap
|
page read and write
|
||
1187000
|
heap
|
page read and write
|
||
1EEA9990000
|
direct allocation
|
page read and write
|
||
11A4000
|
heap
|
page read and write
|
||
ACF6EFF000
|
stack
|
page read and write
|
||
2055000
|
heap
|
page read and write
|
||
1239BB50000
|
heap
|
page read and write
|
||
2580000
|
remote allocation
|
page read and write
|
||
CC8000
|
heap
|
page read and write
|
||
2C6B000
|
direct allocation
|
page readonly
|
||
18009B000
|
unkown
|
page readonly
|
||
29A0000
|
trusted library allocation
|
page read and write
|
||
648000
|
heap
|
page read and write
|
||
1EEA99BD000
|
direct allocation
|
page readonly
|
||
18004C000
|
unkown
|
page readonly
|
||
1239B8AD000
|
heap
|
page read and write
|
||
2970000
|
heap
|
page read and write
|
||
1120000
|
heap
|
page read and write
|
||
623000
|
heap
|
page read and write
|
||
1EEA9A2B000
|
heap
|
page read and write
|
||
C70000
|
direct allocation
|
page execute and read and write
|
||
1EEA9BC5000
|
heap
|
page read and write
|
||
2A2C457E000
|
heap
|
page read and write
|
||
2A2C4550000
|
heap
|
page readonly
|
||
2053000
|
heap
|
page read and write
|
||
27FE000
|
stack
|
page read and write
|
||
5FE000
|
heap
|
page read and write
|
||
2749000
|
heap
|
page read and write
|
||
1EEA9A39000
|
heap
|
page read and write
|
||
63C000
|
heap
|
page read and write
|
||
180000
|
remote allocation
|
page read and write
|
||
617000
|
heap
|
page read and write
|
||
1EEA99DE000
|
heap
|
page read and write
|
||
275D000
|
direct allocation
|
page readonly
|
||
11AF000
|
heap
|
page read and write
|
||
61D000
|
heap
|
page read and write
|
||
DCE000
|
heap
|
page read and write
|
||
ACF6BDC000
|
stack
|
page read and write
|
||
635000
|
heap
|
page read and write
|
||
1EEA9A3C000
|
heap
|
page read and write
|
||
1187000
|
heap
|
page read and write
|
||
2A2C45C9000
|
heap
|
page read and write
|
||
2E2F000
|
stack
|
page read and write
|
||
609000
|
heap
|
page read and write
|
||
930000
|
remote allocation
|
page read and write
|
||
730000
|
direct allocation
|
page read and write
|
||
190000
|
heap
|
page read and write
|
||
1239EBD3000
|
heap
|
page read and write
|
||
D18000
|
heap
|
page read and write
|
||
1EEA9A5C000
|
heap
|
page read and write
|
||
6AE000
|
heap
|
page read and write
|
||
2C80000
|
trusted library allocation
|
page read and write
|
||
1EEA9A42000
|
heap
|
page read and write
|
||
2C40000
|
direct allocation
|
page read and write
|
||
2D7E000
|
stack
|
page read and write
|
||
D2201AF000
|
stack
|
page read and write
|
||
1EEA9900000
|
heap
|
page read and write
|
||
2069000
|
heap
|
page read and write
|
||
2054000
|
heap
|
page read and write
|
||
CED000
|
heap
|
page read and write
|
||
2460000
|
trusted library allocation
|
page read and write
|
||
180000000
|
unkown
|
page readonly
|
||
D39000
|
heap
|
page read and write
|
||
275B000
|
direct allocation
|
page readonly
|
||
605000
|
heap
|
page read and write
|
||
1187000
|
heap
|
page read and write
|
||
7F0000
|
heap
|
page read and write
|
||
180000000
|
unkown
|
page readonly
|
||
629000
|
heap
|
page read and write
|
||
2A2C5F2B000
|
direct allocation
|
page readonly
|
||
1380000
|
heap
|
page read and write
|
||
1E07E6AE000
|
heap
|
page read and write
|
||
15B000
|
stack
|
page read and write
|
||
940000
|
heap
|
page read and write
|
||
1239EBE0000
|
trusted library allocation
|
page read and write
|
||
1EEA9A2B000
|
heap
|
page read and write
|
||
2A2C45B8000
|
heap
|
page read and write
|
||
1EEA9980000
|
direct allocation
|
page execute and read and write
|
||
1239B990000
|
heap
|
page read and write
|
||
5F8000
|
heap
|
page read and write
|
||
1E000140000
|
direct allocation
|
page read and write
|
||
2730000
|
direct allocation
|
page read and write
|
||
1195000
|
heap
|
page read and write
|
||
1198000
|
heap
|
page read and write
|
||
116C000
|
heap
|
page read and write
|
||
1FCC000
|
heap
|
page read and write
|
||
18004C000
|
unkown
|
page readonly
|
||
5EB000
|
heap
|
page read and write
|
||
C20000
|
heap
|
page read and write
|
||
1EEA9A2B000
|
heap
|
page read and write
|
||
2A2C44B0000
|
heap
|
page read and write
|
||
61D000
|
heap
|
page read and write
|
||
7F5000
|
heap
|
page read and write
|
||
DF2000
|
heap
|
page read and write
|
||
2C6C000
|
direct allocation
|
page read and write
|
||
2580000
|
remote allocation
|
page read and write
|
||
5EF000
|
heap
|
page read and write
|
||
CED000
|
heap
|
page read and write
|
||
D80000
|
heap
|
page read and write
|
||
1E000350000
|
heap
|
page read and write
|
||
1128000
|
heap
|
page read and write
|
||
180000
|
remote allocation
|
page read and write
|
||
117B000
|
heap
|
page read and write
|
||
180000000
|
unkown
|
page readonly
|
||
75D000
|
direct allocation
|
page readonly
|
||
2A2C4540000
|
direct allocation
|
page execute and read and write
|
||
1BD8FBF000
|
stack
|
page read and write
|
||
1E00002C000
|
heap
|
page read and write
|
||
11B8000
|
heap
|
page read and write
|
||
D4E000
|
stack
|
page read and write
|
||
2721000
|
heap
|
page read and write
|
||
20F801C5000
|
heap
|
page read and write
|
||
2A2C458E000
|
heap
|
page read and write
|
||
6AE000
|
heap
|
page read and write
|
||
6AD000
|
heap
|
page read and write
|
||
10E0000
|
heap
|
page read and write
|
||
1239B87E000
|
heap
|
page read and write
|
||
20F80000000
|
heap
|
page read and write
|
||
617000
|
heap
|
page read and write
|
||
20F800E0000
|
heap
|
page read and write
|
||
1E07E69E000
|
heap
|
page read and write
|
||
DDB000
|
stack
|
page read and write
|
||
909000
|
stack
|
page read and write
|
||
CED000
|
heap
|
page read and write
|
||
26AF000
|
stack
|
page read and write
|
||
2DF7000
|
stack
|
page read and write
|
||
DD6000
|
heap
|
page read and write
|
||
61D000
|
heap
|
page read and write
|
||
C00000
|
heap
|
page read and write
|
||
275C000
|
direct allocation
|
page read and write
|
||
2A2C5E00000
|
heap
|
page read and write
|
||
DC1000
|
heap
|
page read and write
|
||
75B000
|
direct allocation
|
page readonly
|
||
1E07E850000
|
heap
|
page read and write
|
||
2A2C45B8000
|
heap
|
page read and write
|
||
1187000
|
heap
|
page read and write
|
||
205B000
|
heap
|
page read and write
|
||
1239B88D000
|
heap
|
page read and write
|
||
98C000
|
heap
|
page read and write
|
||
180098000
|
unkown
|
page read and write
|
||
1239BB30000
|
heap
|
page read and write
|
||
119D000
|
heap
|
page read and write
|
||
C85000
|
heap
|
page read and write
|
||
1E07E4D0000
|
heap
|
page read and write
|
||
5FC000
|
heap
|
page read and write
|
||
635000
|
heap
|
page read and write
|
||
1EEA9A4A000
|
heap
|
page read and write
|
||
1E07E855000
|
heap
|
page read and write
|
||
D27000
|
heap
|
page read and write
|
||
5DF000
|
heap
|
page read and write
|
||
1BD8F3F000
|
stack
|
page read and write
|
||
2460000
|
trusted library allocation
|
page read and write
|
||
2D5C000
|
stack
|
page read and write
|
||
206B000
|
heap
|
page read and write
|
||
2769000
|
heap
|
page read and write
|
||
930000
|
remote allocation
|
page read and write
|
||
1E07E69E000
|
heap
|
page read and write
|
||
7E0000
|
trusted library allocation
|
page read and write
|
||
5DD000
|
heap
|
page read and write
|
||
2054000
|
heap
|
page read and write
|
||
6AE000
|
heap
|
page read and write
|
||
55094C000
|
stack
|
page read and write
|
||
980000
|
heap
|
page read and write
|
||
1E07E688000
|
heap
|
page read and write
|
||
1EEA9BC0000
|
heap
|
page read and write
|
||
255C000
|
stack
|
page read and write
|
||
1239B886000
|
heap
|
page read and write
|
||
2997000
|
stack
|
page read and write
|
||
1E07E6D8000
|
heap
|
page read and write
|
||
1EEA9A48000
|
heap
|
page read and write
|
||
5B0000
|
heap
|
page read and write
|
||
2053000
|
heap
|
page read and write
|
||
5960000
|
trusted library allocation
|
page read and write
|
||
2A2C457E000
|
heap
|
page read and write
|
||
2069000
|
heap
|
page read and write
|
||
DA0000
|
heap
|
page read and write
|
||
1EEA98E0000
|
heap
|
page read and write
|
||
1E07E69E000
|
heap
|
page read and write
|
||
2A2C4560000
|
heap
|
page read and write
|
||
ACF6F7F000
|
stack
|
page read and write
|
||
1FA0000
|
heap
|
page read and write
|
||
1E07E680000
|
heap
|
page read and write
|
||
2810000
|
heap
|
page read and write
|
||
CC0000
|
heap
|
page read and write
|
||
1EEA99C0000
|
heap
|
page readonly
|
||
272E000
|
stack
|
page read and write
|
||
28BF000
|
heap
|
page read and write
|
||
5EB000
|
heap
|
page read and write
|
||
1EEA9A2B000
|
heap
|
page read and write
|
||
18009B000
|
unkown
|
page readonly
|
||
31BE000
|
stack
|
page read and write
|
||
ACF6E7E000
|
stack
|
page read and write
|
||
D2200AC000
|
stack
|
page read and write
|
||
15E04FD000
|
stack
|
page read and write
|
||
2EAC000
|
stack
|
page read and write
|
||
2B30000
|
heap
|
page read and write
|
||
D0C000
|
heap
|
page read and write
|
||
1E07E6D8000
|
heap
|
page read and write
|
||
211B000
|
stack
|
page read and write
|
||
1EEA9A4A000
|
heap
|
page read and write
|
||
520000
|
heap
|
page read and write
|
||
623000
|
heap
|
page read and write
|
||
1EEA9A7F000
|
heap
|
page read and write
|
||
1EEAB610000
|
heap
|
page read and write
|
||
DA8000
|
heap
|
page read and write
|
||
60F000
|
heap
|
page read and write
|
||
2769000
|
heap
|
page read and write
|
||
1239B889000
|
heap
|
page read and write
|
||
6AE000
|
heap
|
page read and write
|
||
69D000
|
heap
|
page read and write
|
||
1E07E6E9000
|
heap
|
page read and write
|
||
1187000
|
heap
|
page read and write
|
||
2820000
|
heap
|
page read and write
|
||
1EEAB39C000
|
heap
|
page read and write
|
||
69D000
|
heap
|
page read and write
|
||
2A2C4490000
|
heap
|
page read and write
|
||
2069000
|
heap
|
page read and write
|
||
1239B892000
|
heap
|
page read and write
|
||
1239B88E000
|
heap
|
page read and write
|
||
32BB000
|
stack
|
page read and write
|
||
985000
|
heap
|
page read and write
|
||
180098000
|
unkown
|
page read and write
|
||
5DD000
|
heap
|
page read and write
|
||
11A6000
|
heap
|
page read and write
|
||
A0000
|
heap
|
page read and write
|
||
1EEA97A0000
|
heap
|
page read and write
|
||
1E000170000
|
heap
|
page readonly
|
||
2000000
|
heap
|
page read and write
|
||
1EEA9A6D000
|
heap
|
page read and write
|
||
1385000
|
heap
|
page read and write
|
||
1239B889000
|
heap
|
page read and write
|
||
61D000
|
heap
|
page read and write
|
||
1EEA9A53000
|
heap
|
page read and write
|
||
1FD9000
|
heap
|
page read and write
|
||
5509CF000
|
stack
|
page read and write
|
||
510000
|
heap
|
page readonly
|
||
608000
|
heap
|
page read and write
|
||
5FE000
|
heap
|
page read and write
|
||
1239B877000
|
heap
|
page read and write
|
||
DCA000
|
heap
|
page read and write
|
||
623000
|
heap
|
page read and write
|
||
11A6000
|
heap
|
page read and write
|
||
2055000
|
heap
|
page read and write
|
||
180098000
|
unkown
|
page read and write
|
||
60F000
|
heap
|
page read and write
|
||
20F801B8000
|
heap
|
page read and write
|
||
24DC000
|
stack
|
page read and write
|
||
5FE000
|
heap
|
page read and write
|
||
2A2C5F00000
|
direct allocation
|
page read and write
|
||
D22012F000
|
stack
|
page read and write
|
||
1B0000
|
heap
|
page read and write
|
||
2A2C44F5000
|
heap
|
page read and write
|
||
2A2C5E2C000
|
heap
|
page read and write
|
||
635000
|
heap
|
page read and write
|
||
1239EA90000
|
heap
|
page read and write
|
||
960000
|
heap
|
page read and write
|
||
5EF000
|
heap
|
page read and write
|
||
D20000
|
heap
|
page read and write
|
||
CFE000
|
heap
|
page read and write
|
||
2C30000
|
direct allocation
|
page execute and read and write
|
||
75C000
|
direct allocation
|
page read and write
|
||
1239B8B5000
|
heap
|
page read and write
|
||
2A2C44F0000
|
heap
|
page read and write
|
||
DF2000
|
heap
|
page read and write
|
||
5F7000
|
heap
|
page read and write
|
||
2A2C5F50000
|
heap
|
page read and write
|
||
647000
|
heap
|
page read and write
|
||
1239B89C000
|
heap
|
page read and write
|
||
60F000
|
heap
|
page read and write
|
||
2580000
|
remote allocation
|
page read and write
|
||
26AF000
|
stack
|
page read and write
|
||
114E000
|
heap
|
page read and write
|
||
2069000
|
heap
|
page read and write
|
||
2021000
|
heap
|
page read and write
|
||
2C70000
|
heap
|
page readonly
|
||
1EEA99D0000
|
heap
|
page read and write
|
||
C80000
|
heap
|
page read and write
|
||
1E00016B000
|
direct allocation
|
page readonly
|
||
180001000
|
unkown
|
page execute read
|
||
69D000
|
heap
|
page read and write
|
||
1EEAB370000
|
heap
|
page read and write
|
||
2120000
|
trusted library allocation
|
page read and write
|
||
2A2C457E000
|
heap
|
page read and write
|
||
DCE000
|
heap
|
page read and write
|
||
1E000130000
|
direct allocation
|
page execute and read and write
|
||
5DD000
|
heap
|
page read and write
|
||
2048000
|
heap
|
page read and write
|
||
2748000
|
heap
|
page read and write
|
||
2A2C4350000
|
heap
|
page read and write
|
||
2C80000
|
trusted library allocation
|
page read and write
|
||
1EEA9A2B000
|
heap
|
page read and write
|
||
DC6000
|
heap
|
page read and write
|
||
1239EBD0000
|
heap
|
page read and write
|
||
DF2000
|
heap
|
page read and write
|
||
1239B720000
|
heap
|
page read and write
|
||
1239BB5B000
|
heap
|
page read and write
|
||
2760000
|
heap
|
page readonly
|
||
1BD8EBB000
|
stack
|
page read and write
|
||
550C7F000
|
stack
|
page read and write
|
||
1E00016D000
|
direct allocation
|
page readonly
|
||
69D000
|
heap
|
page read and write
|
||
69D000
|
heap
|
page read and write
|
||
2A2C4567000
|
heap
|
page read and write
|
||
12CF000
|
stack
|
page read and write
|
||
9CB000
|
stack
|
page read and write
|
||
D27000
|
heap
|
page read and write
|
||
1E07E630000
|
heap
|
page read and write
|
||
1E07E610000
|
heap
|
page read and write
|
||
26B0000
|
heap
|
page read and write
|
||
1239B870000
|
heap
|
page read and write
|
||
D83000
|
heap
|
page read and write
|
||
11C9000
|
heap
|
page read and write
|
||
5FA000
|
heap
|
page read and write
|
||
910000
|
heap
|
page read and write
|
||
1239B8A1000
|
heap
|
page read and write
|
||
323E000
|
stack
|
page read and write
|
||
1100000
|
heap
|
page read and write
|
||
DCE000
|
heap
|
page read and write
|
||
DDD000
|
heap
|
page read and write
|
||
5F7000
|
heap
|
page read and write
|
||
6AE000
|
heap
|
page read and write
|
||
CFB000
|
heap
|
page read and write
|
||
180001000
|
unkown
|
page execute read
|
||
1239B898000
|
heap
|
page read and write
|
||
2CF0000
|
heap
|
page read and write
|
||
2048000
|
heap
|
page read and write
|
||
1EEA99BB000
|
direct allocation
|
page readonly
|
||
134F000
|
stack
|
page read and write
|
||
850000
|
heap
|
page read and write
|
||
6AA000
|
heap
|
page read and write
|
||
D50000
|
heap
|
page read and write
|
||
2062000
|
heap
|
page read and write
|
||
1E000000000
|
heap
|
page read and write
|
||
1239B89C000
|
heap
|
page read and write
|
||
27ED000
|
stack
|
page read and write
|
||
CF2000
|
heap
|
page read and write
|
||
2721000
|
heap
|
page read and write
|
||
261D000
|
stack
|
page read and write
|
||
18004C000
|
unkown
|
page readonly
|
||
69D000
|
heap
|
page read and write
|
||
1239BB55000
|
heap
|
page read and write
|
||
1239B892000
|
heap
|
page read and write
|
||
1239B970000
|
heap
|
page read and write
|
||
2C6D000
|
direct allocation
|
page readonly
|
||
20F801B0000
|
heap
|
page read and write
|
||
623000
|
heap
|
page read and write
|
||
180001000
|
unkown
|
page execute read
|
||
11B8000
|
heap
|
page read and write
|
||
69A000
|
heap
|
page read and write
|
||
284C000
|
heap
|
page read and write
|
||
2A2C5F2D000
|
direct allocation
|
page readonly
|
||
DF2000
|
heap
|
page read and write
|
||
500000
|
direct allocation
|
page execute and read and write
|
||
1187000
|
heap
|
page read and write
|
||
27F0000
|
trusted library allocation
|
page read and write
|
||
5B8000
|
heap
|
page read and write
|
||
2053000
|
heap
|
page read and write
|
||
18009B000
|
unkown
|
page readonly
|
There are 362 hidden memdumps, click here to show them.