Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
rJUSTIFICANTEDEPAGO.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
|
initial sample
|
||
C:\Users\user\AppData\Local\Temp\Musicalises34\Coleman\Biarcuated\Biofeedback\Zonar187\Fgtedes\Kisser\battery-level-90-charging-symbolic.svg
|
SVG Scalable Vector Graphics image
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\Musicalises34\Coleman\Biarcuated\Nonconcessive\Gennemgaas\Dispend70\colorimeter-colorhug-symbolic.symbolic.png
|
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\Musicalises34\Coleman\Biarcuated\Nonconcessive\Gennemgaas\Dispend70\media-playlist-consecutive-symbolic.svg
|
SVG Scalable Vector Graphics image
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\Musicalises34\Coleman\Biarcuated\Nonconcessive\Gennemgaas\Dispend70\network-offline-symbolic.svg
|
SVG Scalable Vector Graphics image
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\Musicalises34\Coleman\Biarcuated\Nonconcessive\Gennemgaas\Dispend70\network-wireless.png
|
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\Musicalises34\Coleman\Biarcuated\Nonteachable\Bekmpelsesforanstaltninger\Carcinoid2\Efterplaprer\System.Reflection.Primitives.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\Musicalises34\Coleman\Biarcuated\Rntgenstraaler\Overholde\Wingdings\Preaddition.Bor
|
ASCII text, with very long lines (36518), with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\Musicalises34\Coleman\Biarcuated\Rntgenstraaler\Overholde\Wingdings\System.Reflection.TypeExtensions.dll
|
PE32+ executable (DLL) (console) x86-64 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\Musicalises34\Coleman\Biarcuated\Stereoing\preferences-desktop-font-symbolic.symbolic.png
|
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\Musicalises34\Coleman\Biarcuated\Stereoing\task-due-symbolic.symbolic.png
|
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\Musicalises34\Coleman\Biarcuated\Stereoing\window-close.png
|
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\Musicalises34\Coleman\Biarcuated\Stersfarterne\Svigermdrenes.Hip
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\nspE9CE.tmp\AdvSplash.dll
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\nspE9CE.tmp\System.dll
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
There are 5 hidden files, click here to show them.
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\rJUSTIFICANTEDEPAGO.exe
|
C:\Users\user\Desktop\rJUSTIFICANTEDEPAGO.exe
|
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
http://creativecommons.org/ns#DerivativeWorks
|
unknown
|
||
http://crl.certum.pl/ctsca2021.crl0o
|
unknown
|
||
http://creativecommons.org/licenses/by-sa/4.0/
|
unknown
|
||
http://creativecommons.org/ns#Distribution
|
unknown
|
||
http://repository.certum.pl/ctnca.cer09
|
unknown
|
||
http://repository.certum.pl/ctsca2021.cer0
|
unknown
|
||
http://crl.certum.pl/ctnca.crl0k
|
unknown
|
||
http://subca.ocsp-certum.com05
|
unknown
|
||
http://creativecommons.org/ns#Attribution
|
unknown
|
||
http://subca.ocsp-certum.com02
|
unknown
|
||
http://subca.ocsp-certum.com01
|
unknown
|
||
http://crl.certum.pl/ctnca2.crl0l
|
unknown
|
||
http://repository.certum.pl/ctnca2.cer09
|
unknown
|
||
http://creativecommons.org/ns#ShareAlike
|
unknown
|
||
https://github.com/dotnet/runtimeBSJB
|
unknown
|
||
http://nsis.sf.net/NSIS_ErrorError
|
unknown
|
||
http://creativecommons.org/ns#Notice
|
unknown
|
||
http://creativecommons.org/ns#Reproduction
|
unknown
|
||
http://www.certum.pl/CPS0
|
unknown
|
||
http://creativecommons.org/ns#
|
unknown
|
||
https://github.com/dotnet/runtime
|
unknown
|
There are 11 hidden URLs, click here to show them.
Registry
Path
|
Value
|
Malicious
|
|
---|---|---|---|
HKEY_CURRENT_USER\Software\InstallDir32
|
Path
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\Micos\Irises\Kandissens\Raceblanding
|
Sulphammonium164
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Hermeneutics\Ophjedes\Amtsraadsmedlemmet
|
Printerproblemernes
|
||
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Uninstall\Replyingly\Avnbgen\Spisekamrenes
|
Rumfartscenterets
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Fetichry
|
Isobase
|
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
4E36000
|
direct allocation
|
page execute and read and write
|
||
191553F0000
|
heap
|
page read and write
|
||
D48C17E000
|
stack
|
page read and write
|
||
2C8A72A0000
|
remote allocation
|
page read and write
|
||
1A646300000
|
heap
|
page read and write
|
||
6236000
|
direct allocation
|
page execute and read and write
|
||
2143C002000
|
heap
|
page read and write
|
||
1A646402000
|
heap
|
page read and write
|
||
1A645A58000
|
heap
|
page read and write
|
||
19155450000
|
heap
|
page read and write
|
||
1A6463C3000
|
heap
|
page read and write
|
||
74232FF000
|
stack
|
page read and write
|
||
742357C000
|
stack
|
page read and write
|
||
1A6463C9000
|
heap
|
page read and write
|
||
1A646302000
|
heap
|
page read and write
|
||
2CD4C840000
|
heap
|
page read and write
|
||
1A645A13000
|
heap
|
page read and write
|
||
1A6457D0000
|
heap
|
page read and write
|
||
1A5217E000
|
stack
|
page read and write
|
||
2463D313000
|
heap
|
page read and write
|
||
2463D030000
|
heap
|
page read and write
|
||
19155700000
|
heap
|
page read and write
|
||
2A4AAAC000
|
stack
|
page read and write
|
||
2C8A6970000
|
heap
|
page read and write
|
||
D48C47E000
|
stack
|
page read and write
|
||
2CD4C858000
|
heap
|
page read and write
|
||
D48BD7E000
|
stack
|
page read and write
|
||
2CD4C86D000
|
heap
|
page read and write
|
||
18FCFE02000
|
heap
|
page read and write
|
||
2CD4C83C000
|
heap
|
page read and write
|
||
18FCFF02000
|
heap
|
page read and write
|
||
F3D2CFE000
|
stack
|
page read and write
|
||
2143B650000
|
heap
|
page read and write
|
||
2A4B1FF000
|
stack
|
page read and write
|
||
2143B870000
|
heap
|
page read and write
|
||
30000
|
heap
|
page read and write
|
||
2B80000
|
heap
|
page read and write
|
||
F3D297E000
|
stack
|
page read and write
|
||
AAB000
|
heap
|
page read and write
|
||
2463DA02000
|
trusted library allocation
|
page read and write
|
||
F3D2DFF000
|
stack
|
page read and write
|
||
7AB000
|
unkown
|
page read and write
|
||
222A3059000
|
heap
|
page read and write
|
||
24B4000
|
heap
|
page read and write
|
||
4436000
|
direct allocation
|
page execute and read and write
|
||
40A000
|
unkown
|
page write copy
|
||
1A646413000
|
heap
|
page read and write
|
||
222A306F000
|
heap
|
page read and write
|
||
7636000
|
direct allocation
|
page execute and read and write
|
||
1915565B000
|
heap
|
page read and write
|
||
1A646423000
|
heap
|
page read and write
|
||
2CD4C84E000
|
heap
|
page read and write
|
||
222A305B000
|
heap
|
page read and write
|
||
2143B843000
|
heap
|
page read and write
|
||
D5FAEFD000
|
stack
|
page read and write
|
||
191555A0000
|
trusted library allocation
|
page read and write
|
||
2C8A7270000
|
trusted library allocation
|
page read and write
|
||
F3D28FE000
|
stack
|
page read and write
|
||
18FCFE13000
|
heap
|
page read and write
|
||
2CD4C863000
|
heap
|
page read and write
|
||
2143C132000
|
heap
|
page read and write
|
||
2CD4C86F000
|
heap
|
page read and write
|
||
2CD4C896000
|
heap
|
page read and write
|
||
25D6000
|
heap
|
page read and write
|
||
19155613000
|
heap
|
page read and write
|
||
D5FA87B000
|
stack
|
page read and write
|
||
2143B887000
|
heap
|
page read and write
|
||
2A4AEFF000
|
stack
|
page read and write
|
||
D5FAAFC000
|
stack
|
page read and write
|
||
4360000
|
direct allocation
|
page execute and read and write
|
||
1A645840000
|
heap
|
page read and write
|
||
1A645A3C000
|
heap
|
page read and write
|
||
25BF000
|
stack
|
page read and write
|
||
2CD4C831000
|
heap
|
page read and write
|
||
D5FB07E000
|
stack
|
page read and write
|
||
1A5227E000
|
stack
|
page read and write
|
||
1A645A00000
|
heap
|
page read and write
|
||
2463D267000
|
heap
|
page read and write
|
||
2143C100000
|
heap
|
page read and write
|
||
248E000
|
stack
|
page read and write
|
||
2463D040000
|
heap
|
page read and write
|
||
7E9000
|
unkown
|
page readonly
|
||
2463D0A0000
|
heap
|
page read and write
|
||
222A3053000
|
heap
|
page read and write
|
||
18FD0802000
|
trusted library allocation
|
page read and write
|
||
1A6463AF000
|
heap
|
page read and write
|
||
1A645A72000
|
heap
|
page read and write
|
||
2C8A72A0000
|
remote allocation
|
page read and write
|
||
1A645A43000
|
heap
|
page read and write
|
||
2CD4C860000
|
heap
|
page read and write
|
||
7D0000
|
unkown
|
page readonly
|
||
2CD4C87A000
|
heap
|
page read and write
|
||
74239FE000
|
stack
|
page read and write
|
||
222A3002000
|
heap
|
page read and write
|
||
1A645BB9000
|
heap
|
page read and write
|
||
2CDD000
|
stack
|
page read and write
|
||
98EFF8C000
|
stack
|
page read and write
|
||
2CD4C800000
|
heap
|
page read and write
|
||
18FCFE2E000
|
heap
|
page read and write
|
||
83CE87E000
|
stack
|
page read and write
|
||
2C8A6A13000
|
heap
|
page read and write
|
||
AA4000
|
heap
|
page read and write
|
||
F3D287C000
|
stack
|
page read and write
|
||
2CD4C640000
|
heap
|
page read and write
|
||
2463D1A0000
|
trusted library allocation
|
page read and write
|
||
7A4000
|
unkown
|
page read and write
|
||
98F07FE000
|
stack
|
page read and write
|
||
19155702000
|
heap
|
page read and write
|
||
2463D302000
|
heap
|
page read and write
|
||
1915562A000
|
heap
|
page read and write
|
||
2463D200000
|
heap
|
page read and write
|
||
1A646322000
|
heap
|
page read and write
|
||
1A646430000
|
heap
|
page read and write
|
||
7E0000
|
unkown
|
page readonly
|
||
1A646427000
|
heap
|
page read and write
|
||
1915569C000
|
heap
|
page read and write
|
||
7422D0B000
|
stack
|
page read and write
|
||
1A646322000
|
heap
|
page read and write
|
||
7E9000
|
unkown
|
page readonly
|
||
2CD4C877000
|
heap
|
page read and write
|
||
222A3029000
|
heap
|
page read and write
|
||
83CE27F000
|
stack
|
page read and write
|
||
222A3A02000
|
trusted library allocation
|
page read and write
|
||
1915565A000
|
heap
|
page read and write
|
||
2143B7B0000
|
trusted library allocation
|
page read and write
|
||
222A2F20000
|
heap
|
page read and write
|
||
8036000
|
direct allocation
|
page execute and read and write
|
||
74238FC000
|
stack
|
page read and write
|
||
2C8A69D0000
|
heap
|
page read and write
|
||
1A645960000
|
trusted library allocation
|
page read and write
|
||
1A646400000
|
heap
|
page read and write
|
||
1A645A29000
|
heap
|
page read and write
|
||
742317C000
|
stack
|
page read and write
|
||
D5FADFE000
|
stack
|
page read and write
|
||
D48BA7B000
|
stack
|
page read and write
|
||
7EF000
|
unkown
|
page readonly
|
||
2143B902000
|
heap
|
page read and write
|
||
19155718000
|
heap
|
page read and write
|
||
2A4AFFA000
|
stack
|
page read and write
|
||
789000
|
unkown
|
page read and write
|
||
D48C27F000
|
stack
|
page read and write
|
||
1915566A000
|
heap
|
page read and write
|
||
222A3000000
|
heap
|
page read and write
|
||
99000
|
stack
|
page read and write
|
||
1915563D000
|
heap
|
page read and write
|
||
18FCFE4A000
|
heap
|
page read and write
|
||
19155600000
|
heap
|
page read and write
|
||
401000
|
unkown
|
page execute read
|
||
2143B6B0000
|
heap
|
page read and write
|
||
83CE5FE000
|
stack
|
page read and write
|
||
D48C07D000
|
stack
|
page read and write
|
||
74235FB000
|
stack
|
page read and write
|
||
83CE7FB000
|
stack
|
page read and write
|
||
1A646343000
|
heap
|
page read and write
|
||
2CD4C845000
|
heap
|
page read and write
|
||
2143B8C7000
|
heap
|
page read and write
|
||
2C8A6A02000
|
heap
|
page read and write
|
||
1A645B13000
|
heap
|
page read and write
|
||
2463D240000
|
heap
|
page read and write
|
||
870000
|
heap
|
page read and write
|
||
2C8A6B02000
|
heap
|
page read and write
|
||
7B3000
|
unkown
|
page read and write
|
||
2CD4C865000
|
heap
|
page read and write
|
||
2CD4C861000
|
heap
|
page read and write
|
||
98F04FB000
|
stack
|
page read and write
|
||
222A303D000
|
heap
|
page read and write
|
||
2A4B0FF000
|
stack
|
page read and write
|
||
74237FE000
|
stack
|
page read and write
|
||
2463D300000
|
heap
|
page read and write
|
||
7A6000
|
unkown
|
page read and write
|
||
1A5257D000
|
stack
|
page read and write
|
||
1A645A89000
|
heap
|
page read and write
|
||
1A646392000
|
heap
|
page read and write
|
||
6C36000
|
direct allocation
|
page execute and read and write
|
||
298E000
|
stack
|
page read and write
|
||
2CD4C5D0000
|
heap
|
page read and write
|
||
1A5247C000
|
stack
|
page read and write
|
||
222A3065000
|
heap
|
page read and write
|
||
1915564E000
|
heap
|
page read and write
|
||
83CDD3B000
|
stack
|
page read and write
|
||
1A51FFC000
|
stack
|
page read and write
|
||
3090000
|
trusted library allocation
|
page read and write
|
||
2CD4C829000
|
heap
|
page read and write
|
||
2C8A6960000
|
heap
|
page read and write
|
||
222A2F10000
|
heap
|
page read and write
|
||
2CD4C883000
|
heap
|
page read and write
|
||
782000
|
unkown
|
page read and write
|
||
1A645A55000
|
heap
|
page read and write
|
||
5836000
|
direct allocation
|
page execute and read and write
|
||
2C8A6A25000
|
heap
|
page read and write
|
||
2C8A72A0000
|
remote allocation
|
page read and write
|
||
1A645940000
|
trusted library allocation
|
page read and write
|
||
1A64636F000
|
heap
|
page read and write
|
||
1A5237E000
|
stack
|
page read and write
|
||
2C8A6A00000
|
heap
|
page read and write
|
||
1A645A90000
|
heap
|
page read and write
|
||
1A51BDB000
|
stack
|
page read and write
|
||
2CD4C842000
|
heap
|
page read and write
|
||
ABC000
|
heap
|
page read and write
|
||
191555E0000
|
remote allocation
|
page read and write
|
||
19155713000
|
heap
|
page read and write
|
||
2CD4C875000
|
heap
|
page read and write
|
||
2C8A6A55000
|
heap
|
page read and write
|
||
2C8A6A29000
|
heap
|
page read and write
|
||
D5FAD7D000
|
stack
|
page read and write
|
||
2143B800000
|
heap
|
page read and write
|
||
83CE37C000
|
stack
|
page read and write
|
||
83CE4FA000
|
stack
|
page read and write
|
||
408000
|
unkown
|
page readonly
|
||
1915566B000
|
heap
|
page read and write
|
||
19155570000
|
trusted library allocation
|
page read and write
|
||
400000
|
unkown
|
page readonly
|
||
1A645A7D000
|
heap
|
page read and write
|
||
2C8A7402000
|
trusted library allocation
|
page read and write
|
||
A70000
|
heap
|
page read and write
|
||
1A645A43000
|
heap
|
page read and write
|
||
2463D25A000
|
heap
|
page read and write
|
||
A78000
|
heap
|
page read and write
|
||
D48BC7B000
|
stack
|
page read and write
|
||
2CD4C846000
|
heap
|
page read and write
|
||
1A6457E0000
|
heap
|
page read and write
|
||
18FCFD70000
|
heap
|
page read and write
|
||
2BDD000
|
stack
|
page read and write
|
||
2CD4C87D000
|
heap
|
page read and write
|
||
2143B8CD000
|
heap
|
page read and write
|
||
191555E0000
|
remote allocation
|
page read and write
|
||
19157002000
|
trusted library allocation
|
page read and write
|
||
786000
|
unkown
|
page read and write
|
||
2CD4C85C000
|
heap
|
page read and write
|
||
2143B8BC000
|
heap
|
page read and write
|
||
40A000
|
unkown
|
page read and write
|
||
840000
|
heap
|
page read and write
|
||
D48BE7C000
|
stack
|
page read and write
|
||
19156FA0000
|
trusted library allocation
|
page read and write
|
||
D48C57E000
|
stack
|
page read and write
|
||
AAE000
|
heap
|
page read and write
|
||
2CD4C874000
|
heap
|
page read and write
|
||
7E0000
|
unkown
|
page readonly
|
||
222A3102000
|
heap
|
page read and write
|
||
25D0000
|
heap
|
page read and write
|
||
7D0000
|
unkown
|
page readonly
|
||
F3D2AFE000
|
stack
|
page read and write
|
||
2463D279000
|
heap
|
page read and write
|
||
83CE0FE000
|
stack
|
page read and write
|
||
1A645BE5000
|
heap
|
page read and write
|
||
222A2F80000
|
heap
|
page read and write
|
||
83CE6FE000
|
stack
|
page read and write
|
||
2CD4C85A000
|
heap
|
page read and write
|
||
98F06FB000
|
stack
|
page read and write
|
||
408000
|
unkown
|
page readonly
|
||
2CD4C87E000
|
heap
|
page read and write
|
||
2CD4C847000
|
heap
|
page read and write
|
||
7CE000
|
unkown
|
page read and write
|
||
742347C000
|
stack
|
page read and write
|
||
AAE000
|
heap
|
page read and write
|
||
2143B913000
|
heap
|
page read and write
|
||
2463D213000
|
heap
|
page read and write
|
||
1915566B000
|
heap
|
page read and write
|
||
1A646354000
|
heap
|
page read and write
|
||
2CD4C868000
|
heap
|
page read and write
|
||
74233FE000
|
stack
|
page read and write
|
||
2CD4C86C000
|
heap
|
page read and write
|
||
18FCFDC0000
|
heap
|
page read and write
|
||
222A2FB0000
|
trusted library allocation
|
page read and write
|
||
18FCFDF0000
|
trusted library allocation
|
page read and write
|
||
2CD4C740000
|
trusted library allocation
|
page read and write
|
||
1A645A86000
|
heap
|
page read and write
|
||
1A645B8E000
|
heap
|
page read and write
|
||
18FCFE3C000
|
heap
|
page read and write
|
||
1915565B000
|
heap
|
page read and write
|
||
18FCFE46000
|
heap
|
page read and write
|
||
222A3113000
|
heap
|
page read and write
|
||
2A8F000
|
stack
|
page read and write
|
||
2CD4C85F000
|
heap
|
page read and write
|
||
AD4000
|
heap
|
page read and write
|
||
2B90000
|
heap
|
page read and write
|
||
401000
|
unkown
|
page execute read
|
||
2CD4C830000
|
heap
|
page read and write
|
||
18FCFE29000
|
heap
|
page read and write
|
||
7EF000
|
unkown
|
page readonly
|
||
1A645A76000
|
heap
|
page read and write
|
||
2CD4C839000
|
heap
|
page read and write
|
||
AB0000
|
heap
|
page read and write
|
||
2C8A6A5C000
|
heap
|
page read and write
|
||
24B0000
|
heap
|
page read and write
|
||
2CD4C5E0000
|
heap
|
page read and write
|
||
2CD4D002000
|
trusted library allocation
|
page read and write
|
||
222A3013000
|
heap
|
page read and write
|
||
191555E0000
|
remote allocation
|
page read and write
|
||
2143B813000
|
heap
|
page read and write
|
||
D5FAB7E000
|
stack
|
page read and write
|
||
77C000
|
unkown
|
page read and write
|
||
2463D228000
|
heap
|
page read and write
|
||
1A646202000
|
heap
|
page read and write
|
||
2143B640000
|
heap
|
page read and write
|
||
18FCFE00000
|
heap
|
page read and write
|
||
2463D202000
|
heap
|
page read and write
|
||
2CD4C902000
|
heap
|
page read and write
|
||
2CD4C857000
|
heap
|
page read and write
|
||
10000000
|
unkown
|
page readonly
|
||
AB1000
|
heap
|
page read and write
|
||
2143B8E1000
|
heap
|
page read and write
|
||
AC6000
|
heap
|
page read and write
|
||
D48C37F000
|
stack
|
page read and write
|
||
F3D2BFE000
|
stack
|
page read and write
|
||
74236FD000
|
stack
|
page read and write
|
||
18FCFE54000
|
heap
|
page read and write
|
||
10003000
|
unkown
|
page readonly
|
||
1A5277C000
|
stack
|
page read and write
|
||
222A3075000
|
heap
|
page read and write
|
||
1A645A90000
|
heap
|
page read and write
|
||
19155624000
|
heap
|
page read and write
|
||
2CD4C879000
|
heap
|
page read and write
|
||
1A6463D1000
|
heap
|
page read and write
|
||
19155602000
|
heap
|
page read and write
|
||
18FCFD60000
|
heap
|
page read and write
|
||
AD0000
|
heap
|
page read and write
|
||
2CD4C87B000
|
heap
|
page read and write
|
||
ACE000
|
heap
|
page read and write
|
||
1A6463BD000
|
heap
|
page read and write
|
||
19A000
|
stack
|
page read and write
|
||
98F05FF000
|
stack
|
page read and write
|
||
400000
|
unkown
|
page readonly
|
||
10001000
|
unkown
|
page execute read
|
||
83CE3F9000
|
stack
|
page read and write
|
||
19155550000
|
trusted library allocation
|
page read and write
|
||
2143B829000
|
heap
|
page read and write
|
||
2C8A6A3D000
|
heap
|
page read and write
|
||
191553E0000
|
heap
|
page read and write
|
||
2CD4C813000
|
heap
|
page read and write
|
||
10005000
|
unkown
|
page readonly
|
||
2CD4C844000
|
heap
|
page read and write
|
There are 322 hidden memdumps, click here to show them.