Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
file.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows, InnoSetup self-extracting archive
|
initial sample
|
||
C:\Program Files (x86)\Split Files\SplitFiles131.exe
|
PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows
|
modified
|
||
C:\Program Files (x86)\Split Files\is-5V8K4.tmp
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\Split Files\unins000.exe (copy)
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\is-GA371.tmp\is-EPSRP.tmp
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\is-R8QPS.tmp\_iscrypt.dll
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\is-R8QPS.tmp\_isetup\_setup64.tmp
|
PE32+ executable (console) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\{e6e9dfa8-98f2-11e9-90ce-806e6f6e6963}\rf6CwnLa.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\Split Files\ReadMe - EN.txt (copy)
|
ISO-8859 text, with CRLF line terminators
|
dropped
|
||
C:\Program Files (x86)\Split Files\ReadMe - RU.txt (copy)
|
ISO-8859 text, with very long lines (1053), with CRLF line terminators
|
dropped
|
||
C:\Program Files (x86)\Split Files\is-DPLT0.tmp
|
ISO-8859 text, with CRLF line terminators
|
dropped
|
||
C:\Program Files (x86)\Split Files\is-JPC2L.tmp
|
MS Windows 95 Internet shortcut text (URL=<http://www.altarsoft.com/split_files.shtml>), ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Program Files (x86)\Split Files\is-K6KAG.tmp
|
data
|
dropped
|
||
C:\Program Files (x86)\Split Files\is-MR54O.tmp
|
ISO-8859 text, with very long lines (1053), with CRLF line terminators
|
dropped
|
||
C:\Program Files (x86)\Split Files\language\Arabic.ini (copy)
|
ISO-8859 text, with CRLF line terminators
|
dropped
|
||
C:\Program Files (x86)\Split Files\language\Chinese.ini (copy)
|
ISO-8859 text, with CRLF line terminators
|
dropped
|
||
C:\Program Files (x86)\Split Files\language\Dutch.ini (copy)
|
ISO-8859 text, with CRLF line terminators
|
dropped
|
||
C:\Program Files (x86)\Split Files\language\English.ini (copy)
|
ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Program Files (x86)\Split Files\language\French.ini (copy)
|
ISO-8859 text, with CRLF line terminators
|
dropped
|
||
C:\Program Files (x86)\Split Files\language\Italian.ini (copy)
|
ISO-8859 text, with CRLF line terminators
|
dropped
|
||
C:\Program Files (x86)\Split Files\language\Russian.ini (copy)
|
ISO-8859 text, with CRLF line terminators
|
dropped
|
||
C:\Program Files (x86)\Split Files\language\Spanish.ini (copy)
|
ISO-8859 text, with CRLF line terminators
|
dropped
|
||
C:\Program Files (x86)\Split Files\language\Turkish.ini (copy)
|
ISO-8859 text, with CRLF line terminators
|
dropped
|
||
C:\Program Files (x86)\Split Files\language\is-2C8S0.tmp
|
ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Program Files (x86)\Split Files\language\is-2KTR4.tmp
|
ISO-8859 text, with CRLF line terminators
|
dropped
|
||
C:\Program Files (x86)\Split Files\language\is-4QNQO.tmp
|
ISO-8859 text, with CRLF line terminators
|
dropped
|
||
C:\Program Files (x86)\Split Files\language\is-8T8VP.tmp
|
ISO-8859 text, with CRLF line terminators
|
dropped
|
||
C:\Program Files (x86)\Split Files\language\is-BOL01.tmp
|
ISO-8859 text, with CRLF line terminators
|
dropped
|
||
C:\Program Files (x86)\Split Files\language\is-IRLOP.tmp
|
ISO-8859 text, with CRLF line terminators
|
dropped
|
||
C:\Program Files (x86)\Split Files\language\is-KJUD7.tmp
|
ISO-8859 text, with CRLF line terminators
|
dropped
|
||
C:\Program Files (x86)\Split Files\language\is-L90L4.tmp
|
ISO-8859 text, with CRLF line terminators
|
dropped
|
||
C:\Program Files (x86)\Split Files\language\is-T2GFQ.tmp
|
ISO-8859 text, with CRLF line terminators
|
dropped
|
||
C:\Program Files (x86)\Split Files\unins000.dat
|
InnoSetup Log Split Files {215D64A9-0240-4952-9F4D-4D0A65391F2C}, version 0x2a, 4440 bytes, 760639\user, "C:\Program Files
(x86)\Split Files"
|
dropped
|
||
C:\Program Files (x86)\Split Files\webpage.url (copy)
|
MS Windows 95 Internet shortcut text (URL=<http://www.altarsoft.com/split_files.shtml>), ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\2WF3MMUU\count[1].htm
|
very short file (no magic)
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\2WF3MMUU\fuckingdllENCR[1].dll
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\9026IKNJ\library[1].htm
|
very short file (no magic)
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\CS6IXJW6\ping[1].htm
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\OR0WKIO1\library[1].htm
|
very short file (no magic)
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\is-R8QPS.tmp\_isetup\_shfoldr.dll
|
PE32 executable (DLL) (GUI) Intel 80386 (stripped to external PDB), for MS Windows
|
dropped
|
There are 30 hidden files, click here to show them.
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Program Files (x86)\Split Files\SplitFiles131.exe
|
"C:\Program Files (x86)\Split Files\SplitFiles131.exe"
|
||
C:\Users\user\AppData\Roaming\{e6e9dfa8-98f2-11e9-90ce-806e6f6e6963}\rf6CwnLa.exe
|
|
||
C:\Users\user\Desktop\file.exe
|
C:\Users\user\Desktop\file.exe
|
||
C:\Users\user\AppData\Local\Temp\is-GA371.tmp\is-EPSRP.tmp
|
"C:\Users\user\AppData\Local\Temp\is-GA371.tmp\is-EPSRP.tmp" /SL4 $502DC "C:\Users\user\Desktop\file.exe" 1694939 170496
|
||
C:\Windows\SysWOW64\cmd.exe
|
"C:\Windows\System32\cmd.exe" /c taskkill /im "SplitFiles131.exe" /f & erase "C:\Program Files (x86)\Split Files\SplitFiles131.exe"
& exit
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\SysWOW64\taskkill.exe
|
taskkill /im "SplitFiles131.exe" /f
|
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
http://45.139.105.171/itsnotmalware/count.php?sub=NOSUB&stream=mixtwo&substream=mixinte
|
45.139.105.171
|
||
http://107.182.129.235/storage/extension.php
|
107.182.129.235
|
||
http://107.182.129.235/storage/ping.php
|
107.182.129.235
|
||
http://171.22.30.106/library.php
|
171.22.30.106
|
||
http://www.innosetup.com/
|
unknown
|
||
http://107.182.129.235/storage/extension.php8
|
unknown
|
||
http://www.altarsoft.com/split_files.shtml
|
unknown
|
||
http://www.remobjects.com/?ps
|
unknown
|
||
http://rus.altarsoft.com/split_files.shtml
|
unknown
|
||
http://www.innosetup.com
|
unknown
|
||
http://107.182.129.235ibrary.php
|
unknown
|
||
http://www.innosetup.comDVarFileInfo$
|
unknown
|
||
http://www.remobjects.com/?psU
|
unknown
|
There are 3 hidden URLs, click here to show them.
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
45.139.105.171
|
unknown
|
Italy
|
||
45.139.105.1
|
unknown
|
Italy
|
||
85.31.46.167
|
unknown
|
Germany
|
||
107.182.129.235
|
unknown
|
Reserved
|
||
171.22.30.106
|
unknown
|
Germany
|
Registry
Path
|
Value
|
Malicious
|
|
---|---|---|---|
HKEY_CURRENT_USER\Software\Avepoint Software\SplitFiles131
|
Language
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{215D64A9-0240-4952-9F4D-4D0A65391F2C}}_is1
|
Inno Setup: Setup Version
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{215D64A9-0240-4952-9F4D-4D0A65391F2C}}_is1
|
Inno Setup: App Path
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{215D64A9-0240-4952-9F4D-4D0A65391F2C}}_is1
|
InstallLocation
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{215D64A9-0240-4952-9F4D-4D0A65391F2C}}_is1
|
Inno Setup: Icon Group
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{215D64A9-0240-4952-9F4D-4D0A65391F2C}}_is1
|
Inno Setup: User
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{215D64A9-0240-4952-9F4D-4D0A65391F2C}}_is1
|
DisplayName
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{215D64A9-0240-4952-9F4D-4D0A65391F2C}}_is1
|
UninstallString
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{215D64A9-0240-4952-9F4D-4D0A65391F2C}}_is1
|
QuietUninstallString
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{215D64A9-0240-4952-9F4D-4D0A65391F2C}}_is1
|
DisplayVersion
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{215D64A9-0240-4952-9F4D-4D0A65391F2C}}_is1
|
Publisher
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{215D64A9-0240-4952-9F4D-4D0A65391F2C}}_is1
|
NoModify
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{215D64A9-0240-4952-9F4D-4D0A65391F2C}}_is1
|
NoRepair
|
There are 3 hidden registries, click here to show them.
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
3210000
|
direct allocation
|
page read and write
|
||
400000
|
unkown
|
page execute and read and write
|
||
3270000
|
direct allocation
|
page read and write
|
||
9C000
|
stack
|
page read and write
|
||
151D000
|
unkown
|
page execute and write copy
|
||
4667000
|
trusted library allocation
|
page read and write
|
||
417000
|
unkown
|
page readonly
|
||
6B0000
|
heap
|
page read and write
|
||
151F000
|
unkown
|
page execute and write copy
|
||
595000
|
heap
|
page read and write
|
||
550000
|
trusted library allocation
|
page read and write
|
||
39B1000
|
heap
|
page read and write
|
||
401000
|
unkown
|
page execute read
|
||
39B1000
|
heap
|
page read and write
|
||
44FE000
|
stack
|
page read and write
|
||
417E000
|
stack
|
page read and write
|
||
21C0000
|
heap
|
page read and write
|
||
10002000
|
unkown
|
page readonly
|
||
34C0000
|
direct allocation
|
page read and write
|
||
22CF000
|
stack
|
page read and write
|
||
2160000
|
direct allocation
|
page execute and read and write
|
||
4C4000
|
unkown
|
page readonly
|
||
39B1000
|
heap
|
page read and write
|
||
16A4000
|
heap
|
page read and write
|
||
16A4000
|
heap
|
page read and write
|
||
466D000
|
trusted library allocation
|
page read and write
|
||
3E7F000
|
stack
|
page read and write
|
||
19C000
|
stack
|
page read and write
|
||
16A4000
|
heap
|
page read and write
|
||
3AB0000
|
trusted library allocation
|
page read and write
|
||
39B1000
|
heap
|
page read and write
|
||
2024000
|
direct allocation
|
page read and write
|
||
6BA000
|
heap
|
page read and write
|
||
501B000
|
direct allocation
|
page read and write
|
||
1509000
|
unkown
|
page execute and write copy
|
||
400000
|
unkown
|
page readonly
|
||
46B9000
|
trusted library allocation
|
page read and write
|
||
501F000
|
direct allocation
|
page read and write
|
||
39B1000
|
heap
|
page read and write
|
||
39B1000
|
heap
|
page read and write
|
||
410000
|
unkown
|
page readonly
|
||
16A4000
|
heap
|
page read and write
|
||
5011000
|
direct allocation
|
page read and write
|
||
33D1000
|
trusted library allocation
|
page read and write
|
||
4F4F000
|
direct allocation
|
page read and write
|
||
322E000
|
stack
|
page read and write
|
||
144B000
|
unkown
|
page execute and write copy
|
||
39B1000
|
heap
|
page read and write
|
||
16A4000
|
heap
|
page read and write
|
||
16A4000
|
heap
|
page read and write
|
||
151B000
|
unkown
|
page execute and write copy
|
||
4C4000
|
unkown
|
page readonly
|
||
2300000
|
direct allocation
|
page read and write
|
||
3AFE000
|
stack
|
page read and write
|
||
493D000
|
stack
|
page read and write
|
||
16A4000
|
heap
|
page read and write
|
||
10001000
|
unkown
|
page execute read
|
||
474A000
|
trusted library allocation
|
page read and write
|
||
16A0000
|
heap
|
page read and write
|
||
1275000
|
unkown
|
page readonly
|
||
4F56000
|
direct allocation
|
page read and write
|
||
46B9000
|
trusted library allocation
|
page read and write
|
||
4F61000
|
direct allocation
|
page read and write
|
||
1935000
|
heap
|
page read and write
|
||
4AE000
|
unkown
|
page read and write
|
||
39B1000
|
heap
|
page read and write
|
||
410000
|
unkown
|
page readonly
|
||
468B000
|
trusted library allocation
|
page read and write
|
||
143E000
|
unkown
|
page execute and write copy
|
||
30000
|
heap
|
page read and write
|
||
1519000
|
unkown
|
page execute and write copy
|
||
6B8000
|
heap
|
page read and write
|
||
20CF000
|
stack
|
page read and write
|
||
39B1000
|
heap
|
page read and write
|
||
474A000
|
trusted library allocation
|
page read and write
|
||
400000
|
unkown
|
page readonly
|
||
1920000
|
direct allocation
|
page read and write
|
||
1314000
|
unkown
|
page readonly
|
||
1613000
|
heap
|
page read and write
|
||
352D000
|
stack
|
page read and write
|
||
39B1000
|
heap
|
page read and write
|
||
2190000
|
trusted library allocation
|
page read and write
|
||
46B9000
|
trusted library allocation
|
page read and write
|
||
6CC000
|
heap
|
page read and write
|
||
46B9000
|
trusted library allocation
|
page read and write
|
||
16A4000
|
heap
|
page read and write
|
||
32B0000
|
heap
|
page read and write
|
||
452000
|
unkown
|
page execute and read and write
|
||
474A000
|
trusted library allocation
|
page read and write
|
||
20E8000
|
direct allocation
|
page read and write
|
||
86F000
|
stack
|
page read and write
|
||
6A0000
|
trusted library allocation
|
page read and write
|
||
501D000
|
direct allocation
|
page read and write
|
||
468B000
|
trusted library allocation
|
page read and write
|
||
16A4000
|
heap
|
page read and write
|
||
3FD0000
|
heap
|
page read and write
|
||
31EF000
|
stack
|
page read and write
|
||
46B9000
|
trusted library allocation
|
page read and write
|
||
16A4000
|
heap
|
page read and write
|
||
466D000
|
trusted library allocation
|
page read and write
|
||
39B1000
|
heap
|
page read and write
|
||
34E0000
|
direct allocation
|
page read and write
|
||
164B000
|
heap
|
page read and write
|
||
39B1000
|
heap
|
page read and write
|
||
18F000
|
stack
|
page read and write
|
||
4D96000
|
direct allocation
|
page read and write
|
||
34FE000
|
stack
|
page read and write
|
||
10001000
|
direct allocation
|
page execute read
|
||
1930000
|
heap
|
page read and write
|
||
16A4000
|
heap
|
page read and write
|
||
4D00000
|
direct allocation
|
page read and write
|
||
12E0000
|
trusted library allocation
|
page read and write
|
||
23A9000
|
direct allocation
|
page read and write
|
||
1300000
|
unkown
|
page readonly
|
||
16A4000
|
heap
|
page read and write
|
||
203C000
|
direct allocation
|
page read and write
|
||
1750000
|
heap
|
page read and write
|
||
466D000
|
trusted library allocation
|
page read and write
|
||
412E000
|
stack
|
page read and write
|
||
39B1000
|
heap
|
page read and write
|
||
401000
|
unkown
|
page execute read
|
||
1710000
|
heap
|
page read and write
|
||
156A000
|
heap
|
page read and write
|
||
43FE000
|
stack
|
page read and write
|
||
468B000
|
trusted library allocation
|
page read and write
|
||
1506000
|
unkown
|
page execute and write copy
|
||
465F000
|
trusted library allocation
|
page read and write
|
||
10010000
|
direct allocation
|
page readonly
|
||
10019000
|
direct allocation
|
page readonly
|
||
31E0000
|
direct allocation
|
page read and write
|
||
1301000
|
unkown
|
page execute read
|
||
400000
|
unkown
|
page readonly
|
||
16A4000
|
heap
|
page read and write
|
||
4D78000
|
direct allocation
|
page read and write
|
||
466D000
|
trusted library allocation
|
page read and write
|
||
34BF000
|
stack
|
page read and write
|
||
42BE000
|
stack
|
page read and write
|
||
39C0000
|
heap
|
page read and write
|
||
3D3F000
|
stack
|
page read and write
|
||
39B1000
|
heap
|
page read and write
|
||
14F6000
|
unkown
|
page execute and write copy
|
||
39B1000
|
heap
|
page read and write
|
||
43BF000
|
stack
|
page read and write
|
||
466D000
|
trusted library allocation
|
page read and write
|
||
129C000
|
unkown
|
page execute and write copy
|
||
16A4000
|
heap
|
page read and write
|
||
6D5000
|
heap
|
page read and write
|
||
30EE000
|
stack
|
page read and write
|
||
165C000
|
heap
|
page read and write
|
||
39B1000
|
heap
|
page read and write
|
||
39B1000
|
heap
|
page read and write
|
||
32FE000
|
stack
|
page read and write
|
||
3BFF000
|
stack
|
page read and write
|
||
39B1000
|
heap
|
page read and write
|
||
26D0000
|
trusted library allocation
|
page read and write
|
||
970000
|
heap
|
page read and write
|
||
203C000
|
direct allocation
|
page read and write
|
||
39B1000
|
heap
|
page read and write
|
||
468B000
|
trusted library allocation
|
page read and write
|
||
468B000
|
trusted library allocation
|
page read and write
|
||
580000
|
heap
|
page read and write
|
||
6A8000
|
heap
|
page read and write
|
||
130C000
|
unkown
|
page readonly
|
||
474A000
|
trusted library allocation
|
page read and write
|
||
39B1000
|
heap
|
page read and write
|
||
20E1000
|
direct allocation
|
page read and write
|
||
20E1000
|
direct allocation
|
page read and write
|
||
1FCE000
|
stack
|
page read and write
|
||
1540000
|
heap
|
page read and write
|
||
16A4000
|
heap
|
page read and write
|
||
1312000
|
unkown
|
page read and write
|
||
16A4000
|
heap
|
page read and write
|
||
45BB000
|
trusted library allocation
|
page read and write
|
||
3D7E000
|
stack
|
page read and write
|
||
3EBE000
|
stack
|
page read and write
|
||
402E000
|
stack
|
page read and write
|
||
1001A000
|
direct allocation
|
page read and write
|
||
32A0000
|
direct allocation
|
page read and write
|
||
3AB0000
|
trusted library allocation
|
page read and write
|
||
16A4000
|
heap
|
page read and write
|
||
1312000
|
unkown
|
page write copy
|
||
463D000
|
trusted library allocation
|
page read and write
|
||
417000
|
unkown
|
page readonly
|
||
16A4000
|
heap
|
page read and write
|
||
362F000
|
stack
|
page read and write
|
||
40A000
|
unkown
|
page read and write
|
||
670000
|
heap
|
page read and write
|
||
16A4000
|
heap
|
page read and write
|
||
590000
|
heap
|
page read and write
|
||
16A4000
|
heap
|
page read and write
|
||
466D000
|
trusted library allocation
|
page read and write
|
||
4BC000
|
unkown
|
page readonly
|
||
16A4000
|
heap
|
page read and write
|
||
39B0000
|
heap
|
page read and write
|
||
48C000
|
unkown
|
page read and write
|
||
130C000
|
unkown
|
page readonly
|
||
4AF000
|
unkown
|
page write copy
|
||
1449000
|
unkown
|
page execute and write copy
|
||
21C4000
|
heap
|
page read and write
|
||
3AB0000
|
trusted library allocation
|
page read and write
|
||
203C000
|
direct allocation
|
page read and write
|
||
67A000
|
heap
|
page read and write
|
||
39B1000
|
heap
|
page read and write
|
||
6C8000
|
heap
|
page read and write
|
||
6CF000
|
heap
|
page read and write
|
||
2300000
|
direct allocation
|
page read and write
|
||
46B9000
|
trusted library allocation
|
page read and write
|
||
401000
|
unkown
|
page execute read
|
||
141C000
|
stack
|
page read and write
|
||
1459000
|
unkown
|
page execute and write copy
|
||
870000
|
heap
|
page read and write
|
||
40C000
|
unkown
|
page write copy
|
||
87A000
|
heap
|
page read and write
|
||
39B1000
|
heap
|
page read and write
|
||
468B000
|
trusted library allocation
|
page read and write
|
||
427A000
|
stack
|
page read and write
|
||
3C3E000
|
stack
|
page read and write
|
||
401000
|
unkown
|
page execute read
|
||
468B000
|
trusted library allocation
|
page read and write
|
||
468B000
|
trusted library allocation
|
page read and write
|
||
1301000
|
unkown
|
page execute read
|
||
217E000
|
direct allocation
|
page read and write
|
||
466D000
|
trusted library allocation
|
page read and write
|
||
203C000
|
direct allocation
|
page read and write
|
||
16A4000
|
heap
|
page read and write
|
||
5013000
|
direct allocation
|
page read and write
|
||
97000
|
stack
|
page read and write
|
||
218D000
|
direct allocation
|
page read and write
|
||
400000
|
unkown
|
page readonly
|
||
39B1000
|
heap
|
page read and write
|
||
39B1000
|
heap
|
page read and write
|
||
150D000
|
unkown
|
page execute and write copy
|
||
1300000
|
unkown
|
page readonly
|
||
3080000
|
direct allocation
|
page read and write
|
||
466D000
|
trusted library allocation
|
page read and write
|
||
401000
|
unkown
|
page execute read
|
||
39B1000
|
heap
|
page read and write
|
||
2020000
|
direct allocation
|
page read and write
|
||
4640000
|
trusted library allocation
|
page read and write
|
||
2045000
|
direct allocation
|
page read and write
|
||
1452000
|
unkown
|
page execute and write copy
|
||
4660000
|
trusted library allocation
|
page read and write
|
||
39B1000
|
heap
|
page read and write
|
||
4BC000
|
unkown
|
page readonly
|
||
39B1000
|
heap
|
page read and write
|
||
16A4000
|
heap
|
page read and write
|
||
30000
|
heap
|
page read and write
|
||
16A4000
|
heap
|
page read and write
|
||
46B9000
|
trusted library allocation
|
page read and write
|
||
3FBF000
|
stack
|
page read and write
|
||
39B1000
|
heap
|
page read and write
|
||
5021000
|
direct allocation
|
page read and write
|
||
39B1000
|
heap
|
page read and write
|
||
33BE000
|
stack
|
page read and write
|
||
127C000
|
stack
|
page read and write
|
||
6CF000
|
heap
|
page read and write
|
||
470000
|
unkown
|
page readonly
|
||
4F4D000
|
direct allocation
|
page read and write
|
||
46B9000
|
trusted library allocation
|
page read and write
|
||
39B1000
|
heap
|
page read and write
|
||
39B1000
|
heap
|
page read and write
|
||
16A4000
|
heap
|
page read and write
|
||
14FA000
|
unkown
|
page execute and write copy
|
||
44FC000
|
stack
|
page read and write
|
||
39B1000
|
heap
|
page read and write
|
||
16A4000
|
heap
|
page read and write
|
||
14F8000
|
unkown
|
page execute and write copy
|
||
474A000
|
trusted library allocation
|
page read and write
|
||
150F000
|
unkown
|
page execute and write copy
|
||
1530000
|
trusted library allocation
|
page read and write
|
||
145D000
|
unkown
|
page execute and write copy
|
||
400000
|
unkown
|
page readonly
|
||
39B1000
|
heap
|
page read and write
|
||
39B1000
|
heap
|
page read and write
|
||
39B1000
|
heap
|
page read and write
|
||
468B000
|
trusted library allocation
|
page read and write
|
||
48FF000
|
stack
|
page read and write
|
||
20D0000
|
direct allocation
|
page read and write
|
||
500000
|
trusted library allocation
|
page read and write
|
||
10000000
|
direct allocation
|
page read and write
|
||
9C000
|
stack
|
page read and write
|
||
2F90000
|
heap
|
page read and write
|
||
1517000
|
unkown
|
page execute and write copy
|
||
1446000
|
unkown
|
page execute and write copy
|
||
39B1000
|
heap
|
page read and write
|
||
199000
|
stack
|
page read and write
|
||
204C000
|
direct allocation
|
page read and write
|
||
1560000
|
heap
|
page read and write
|
||
876000
|
heap
|
page read and write
|
||
54E000
|
stack
|
page read and write
|
||
39B1000
|
heap
|
page read and write
|
||
175A000
|
heap
|
page read and write
|
||
6CC000
|
heap
|
page read and write
|
||
1550000
|
trusted library allocation
|
page read and write
|
||
1444000
|
unkown
|
page execute and write copy
|
||
40A000
|
unkown
|
page write copy
|
||
16A4000
|
heap
|
page read and write
|
||
520000
|
heap
|
page read and write
|
||
10000000
|
unkown
|
page readonly
|
||
46B9000
|
trusted library allocation
|
page read and write
|
||
468B000
|
trusted library allocation
|
page read and write
|
||
48C000
|
unkown
|
page write copy
|
||
474A000
|
trusted library allocation
|
page read and write
|
||
39B1000
|
heap
|
page read and write
|
||
21A8000
|
direct allocation
|
page read and write
|
||
2034000
|
direct allocation
|
page read and write
|
||
39B1000
|
heap
|
page read and write
|
||
39B1000
|
heap
|
page read and write
|
||
143A000
|
unkown
|
page execute and write copy
|
||
3080000
|
direct allocation
|
page read and write
|
||
46B9000
|
trusted library allocation
|
page read and write
|
||
10017000
|
direct allocation
|
page read and write
|
||
16A4000
|
heap
|
page read and write
|
||
FF0000
|
heap
|
page read and write
|
||
169E000
|
stack
|
page read and write
|
||
466D000
|
trusted library allocation
|
page read and write
|
||
5023000
|
direct allocation
|
page read and write
|
||
215E000
|
stack
|
page read and write
|
||
30000
|
heap
|
page read and write
|
||
2750000
|
trusted library allocation
|
page read and write
|
||
39B1000
|
heap
|
page read and write
|
||
16A4000
|
heap
|
page read and write
|
||
1314000
|
unkown
|
page readonly
|
||
39B1000
|
heap
|
page read and write
|
||
468B000
|
trusted library allocation
|
page read and write
|
||
1457000
|
unkown
|
page execute and write copy
|
||
46B9000
|
trusted library allocation
|
page read and write
|
||
332F000
|
stack
|
page read and write
|
||
474A000
|
trusted library allocation
|
page read and write
|
||
4F0000
|
trusted library allocation
|
page read and write
|
||
16A4000
|
heap
|
page read and write
|
||
1560000
|
heap
|
page read and write
|
||
3080000
|
heap
|
page read and write
|
||
500D000
|
direct allocation
|
page read and write
|
||
39B1000
|
heap
|
page read and write
|
||
309F000
|
stack
|
page read and write
|
||
39B1000
|
heap
|
page read and write
|
There are 327 hidden memdumps, click here to show them.