Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
AdobePhotoshop.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
initial sample
|
||
C:\Users\user\AppData\Local\Temp\is-7NLVQ.tmp\AdobePhotoshop.tmp
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\is-BP29Q.tmp\_isetup\_iscrypt.dll
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\is-BP29Q.tmp\_isetup\_isdecmp.dll
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\is-BP29Q.tmp\_isetup\_setup64.tmp
|
PE32+ executable (console) x86-64, for MS Windows
|
dropped
|
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\AdobePhotoshop.exe
|
C:\Users\user\Desktop\AdobePhotoshop.exe
|
||
C:\Users\user\AppData\Local\Temp\is-7NLVQ.tmp\AdobePhotoshop.tmp
|
"C:\Users\user\AppData\Local\Temp\is-7NLVQ.tmp\AdobePhotoshop.tmp" /SL5="$40258,909824,0,C:\Users\user\Desktop\AdobePhotoshop.exe"
|
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
http://www.haysoft.org%1-k
|
unknown
|
||
http://crl.sectigo.com/SectigoRSATimeStampingCA.crl0t
|
unknown
|
||
https://jrsoftware.org/ishelp/index.php?topic=setupcmdlineSetupU
|
unknown
|
||
https://sectigo.com/CPS0
|
unknown
|
||
http://repository.certum.pl/ctnca.cer09
|
unknown
|
||
http://repository.certum.pl/cscasha2.cer0
|
unknown
|
||
http://ocsp.sectigo.com0
|
unknown
|
||
http://crl.certum.pl/ctnca.crl0k
|
unknown
|
||
https://www.remobjects.com/ps
|
unknown
|
||
http://crt.sectigo.com/SectigoRSATimeStampingCA.crt0#
|
unknown
|
||
http://subca.ocsp-certum.com01
|
unknown
|
||
https://www.innosetup.com/
|
unknown
|
||
http://ocsp.usertru
|
unknown
|
||
https://sectigo.com/CPS0D
|
unknown
|
||
https://jrsoftware.org0
|
unknown
|
||
https://jrsoftware.org/
|
unknown
|
||
https://www.certum.pl/CPS0
|
unknown
|
||
http://crl.certum.pl/cscasha2.crl0q
|
unknown
|
||
http://www.certum.pl/CPS0
|
unknown
|
||
https://sectigo.com/CPS05
|
unknown
|
||
http://repository.certum.pl/cscasha
|
unknown
|
||
http://cscasha2.ocsp-certum.com04
|
unknown
|
There are 12 hidden URLs, click here to show them.
Registry
Path
|
Value
|
Malicious
|
|
---|---|---|---|
HKEY_CURRENT_USER\Software\Microsoft\RestartManager\Session0000
|
Owner
|
||
HKEY_CURRENT_USER\Software\Microsoft\RestartManager\Session0000
|
SessionHash
|
||
HKEY_CURRENT_USER\Software\Microsoft\RestartManager\Session0000
|
Sequence
|
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
1A016413000
|
heap
|
page read and write
|
||
B28067B000
|
stack
|
page read and write
|
||
1A01645A000
|
heap
|
page read and write
|
||
145ADC49000
|
heap
|
page read and write
|
||
2529000
|
direct allocation
|
page read and write
|
||
1A016400000
|
heap
|
page read and write
|
||
145ADC5A000
|
heap
|
page read and write
|
||
B28097F000
|
stack
|
page read and write
|
||
2554000
|
direct allocation
|
page read and write
|
||
8568FE000
|
stack
|
page read and write
|
||
25E98FE000
|
stack
|
page read and write
|
||
9C000
|
stack
|
page read and write
|
||
3714000
|
direct allocation
|
page read and write
|
||
375B000
|
direct allocation
|
page read and write
|
||
11B14202000
|
heap
|
page read and write
|
||
860D07B000
|
stack
|
page read and write
|
||
4E1357F000
|
stack
|
page read and write
|
||
13A0BD02000
|
heap
|
page read and write
|
||
25D1000
|
direct allocation
|
page read and write
|
||
6C8000
|
unkown
|
page read and write
|
||
145ADC7B000
|
heap
|
page read and write
|
||
1A0163C0000
|
heap
|
page read and write
|
||
11B13C65000
|
heap
|
page read and write
|
||
145ADC6D000
|
heap
|
page read and write
|
||
11B143CF000
|
heap
|
page read and write
|
||
18EA9413000
|
heap
|
page read and write
|
||
18EA92A0000
|
heap
|
page read and write
|
||
1C5C6400000
|
heap
|
page read and write
|
||
145ADC57000
|
heap
|
page read and write
|
||
16DE7255000
|
heap
|
page read and write
|
||
11B13C71000
|
heap
|
page read and write
|
||
85647B000
|
stack
|
page read and write
|
||
CF6000
|
heap
|
page read and write
|
||
353B000
|
direct allocation
|
page read and write
|
||
25A6000
|
direct allocation
|
page read and write
|
||
253F000
|
direct allocation
|
page read and write
|
||
1A016402000
|
heap
|
page read and write
|
||
11B13C6D000
|
heap
|
page read and write
|
||
11B14354000
|
heap
|
page read and write
|
||
11B13C8C000
|
heap
|
page read and write
|
||
4C6000
|
unkown
|
page readonly
|
||
365E000
|
stack
|
page read and write
|
||
16DE7277000
|
heap
|
page read and write
|
||
18EA9240000
|
heap
|
page read and write
|
||
3F77BFE000
|
stack
|
page read and write
|
||
1A0163F0000
|
trusted library allocation
|
page read and write
|
||
370F000
|
direct allocation
|
page read and write
|
||
1A016500000
|
heap
|
page read and write
|
||
6C6000
|
unkown
|
page write copy
|
||
9A6000
|
heap
|
page read and write
|
||
18EA943C000
|
heap
|
page read and write
|
||
2530000
|
direct allocation
|
page read and write
|
||
975000
|
heap
|
page read and write
|
||
145ADC68000
|
heap
|
page read and write
|
||
145ADC42000
|
heap
|
page read and write
|
||
18EA9230000
|
heap
|
page read and write
|
||
1C5C6502000
|
heap
|
page read and write
|
||
11B13C13000
|
heap
|
page read and write
|
||
1004FA000
|
stack
|
page read and write
|
||
1A018002000
|
trusted library allocation
|
page read and write
|
||
4E1317F000
|
stack
|
page read and write
|
||
145AD9B0000
|
heap
|
page read and write
|
||
401000
|
unkown
|
page execute read
|
||
4E1327E000
|
stack
|
page read and write
|
||
860D7FC000
|
stack
|
page read and write
|
||
400000
|
unkown
|
page readonly
|
||
25BC000
|
direct allocation
|
page read and write
|
||
11B139D0000
|
heap
|
page read and write
|
||
6D5000
|
unkown
|
page read and write
|
||
18EA9466000
|
heap
|
page read and write
|
||
860D5FE000
|
stack
|
page read and write
|
||
34C0000
|
heap
|
page read and write
|
||
16DE7302000
|
heap
|
page read and write
|
||
4E12E7D000
|
stack
|
page read and write
|
||
145AE202000
|
trusted library allocation
|
page read and write
|
||
13A0BD13000
|
heap
|
page read and write
|
||
993000
|
heap
|
page read and write
|
||
986000
|
heap
|
page read and write
|
||
6CD000
|
unkown
|
page read and write
|
||
988000
|
heap
|
page read and write
|
||
4E127FC000
|
stack
|
page read and write
|
||
246D000
|
direct allocation
|
page read and write
|
||
236A000
|
direct allocation
|
page read and write
|
||
2759000
|
direct allocation
|
page read and write
|
||
2761000
|
direct allocation
|
page read and write
|
||
3762000
|
direct allocation
|
page read and write
|
||
19B000
|
stack
|
page read and write
|
||
11B14630000
|
heap
|
page read and write
|
||
145ADC13000
|
heap
|
page read and write
|
||
2833000
|
heap
|
page read and write
|
||
1A016518000
|
heap
|
page read and write
|
||
10097A000
|
stack
|
page read and write
|
||
3F77CFE000
|
stack
|
page read and write
|
||
1C5C62D0000
|
heap
|
page read and write
|
||
145ADC58000
|
heap
|
page read and write
|
||
145ADC59000
|
heap
|
page read and write
|
||
34E3000
|
unkown
|
page readonly
|
||
7FE75000
|
direct allocation
|
page read and write
|
||
1A01645A000
|
heap
|
page read and write
|
||
145ADC60000
|
heap
|
page read and write
|
||
145ADC65000
|
heap
|
page read and write
|
||
13A0C500000
|
heap
|
page read and write
|
||
6F7000
|
heap
|
page read and write
|
||
278C000
|
direct allocation
|
page read and write
|
||
25E967C000
|
stack
|
page read and write
|
||
6DC000
|
unkown
|
page read and write
|
||
11B13C50000
|
heap
|
page read and write
|
||
36C7000
|
direct allocation
|
page read and write
|
||
3A1F000
|
stack
|
page read and write
|
||
100779000
|
stack
|
page read and write
|
||
4E1347F000
|
stack
|
page read and write
|
||
3F77E7F000
|
stack
|
page read and write
|
||
11B13C5A000
|
heap
|
page read and write
|
||
2474000
|
direct allocation
|
page read and write
|
||
30000
|
heap
|
page read and write
|
||
CF0000
|
heap
|
page read and write
|
||
11B14343000
|
heap
|
page read and write
|
||
9AE000
|
heap
|
page read and write
|
||
11B14613000
|
heap
|
page read and write
|
||
25C3000
|
direct allocation
|
page read and write
|
||
1C5C642F000
|
heap
|
page read and write
|
||
3769000
|
direct allocation
|
page read and write
|
||
279A000
|
direct allocation
|
page read and write
|
||
145AD9A0000
|
heap
|
page read and write
|
||
1A017EF0000
|
trusted library allocation
|
page read and write
|
||
1A01648B000
|
heap
|
page read and write
|
||
277D000
|
direct allocation
|
page read and write
|
||
25B4000
|
direct allocation
|
page read and write
|
||
374C000
|
direct allocation
|
page read and write
|
||
145ADC5C000
|
heap
|
page read and write
|
||
18EA9502000
|
heap
|
page read and write
|
||
145ADC00000
|
heap
|
page read and write
|
||
13A0C402000
|
heap
|
page read and write
|
||
1C5C6320000
|
heap
|
page read and write
|
||
221CBD80000
|
trusted library allocation
|
page read and write
|
||
11B13C93000
|
heap
|
page read and write
|
||
3712000
|
direct allocation
|
page read and write
|
||
11B141B0000
|
trusted library allocation
|
page read and write
|
||
36EF000
|
direct allocation
|
page read and write
|
||
11B14394000
|
heap
|
page read and write
|
||
16DE7170000
|
heap
|
page read and write
|
||
1A016463000
|
heap
|
page read and write
|
||
1A017F70000
|
remote allocation
|
page read and write
|
||
2581000
|
direct allocation
|
page read and write
|
||
18EA9513000
|
heap
|
page read and write
|
||
1A017E80000
|
trusted library allocation
|
page read and write
|
||
10007B000
|
stack
|
page read and write
|
||
13A0BCCD000
|
heap
|
page read and write
|
||
8566FE000
|
stack
|
page read and write
|
||
6C6000
|
unkown
|
page read and write
|
||
221CBDB0000
|
remote allocation
|
page read and write
|
||
2741000
|
direct allocation
|
page read and write
|
||
1A016360000
|
heap
|
page read and write
|
||
145ADC64000
|
heap
|
page read and write
|
||
13A0C512000
|
heap
|
page read and write
|
||
2793000
|
direct allocation
|
page read and write
|
||
6DD000
|
unkown
|
page readonly
|
||
221CBDB0000
|
remote allocation
|
page read and write
|
||
6DF000
|
unkown
|
page readonly
|
||
8567FE000
|
stack
|
page read and write
|
||
11B13A30000
|
heap
|
page read and write
|
||
11B143C6000
|
heap
|
page read and write
|
||
4E12F7E000
|
stack
|
page read and write
|
||
18EA9429000
|
heap
|
page read and write
|
||
372F000
|
direct allocation
|
page read and write
|
||
30000
|
heap
|
page read and write
|
||
948000
|
heap
|
page read and write
|
||
145ADC75000
|
heap
|
page read and write
|
||
4E1307D000
|
stack
|
page read and write
|
||
1C5C643E000
|
heap
|
page read and write
|
||
391E000
|
stack
|
page read and write
|
||
85657E000
|
stack
|
page read and write
|
||
250A000
|
direct allocation
|
page read and write
|
||
1C5C6A80000
|
trusted library allocation
|
page read and write
|
||
373E000
|
direct allocation
|
page read and write
|
||
11B14322000
|
heap
|
page read and write
|
||
2588000
|
direct allocation
|
page read and write
|
||
145ADC63000
|
heap
|
page read and write
|
||
145ADC31000
|
heap
|
page read and write
|
||
145ADC2D000
|
heap
|
page read and write
|
||
2378000
|
direct allocation
|
page read and write
|
||
11B14627000
|
heap
|
page read and write
|
||
221CBDB0000
|
remote allocation
|
page read and write
|
||
400000
|
unkown
|
page readonly
|
||
25E93FE000
|
stack
|
page read and write
|
||
19C000
|
stack
|
page read and write
|
||
11B13C43000
|
heap
|
page read and write
|
||
16DE7263000
|
heap
|
page read and write
|
||
1A017F70000
|
remote allocation
|
page read and write
|
||
11B139C0000
|
heap
|
page read and write
|
||
16DE7279000
|
heap
|
page read and write
|
||
13A0BC64000
|
heap
|
page read and write
|
||
18EA93A0000
|
trusted library allocation
|
page read and write
|
||
145ADC7A000
|
heap
|
page read and write
|
||
25E97FC000
|
stack
|
page read and write
|
||
4B7000
|
unkown
|
page write copy
|
||
2458000
|
direct allocation
|
page read and write
|
||
13A0BC45000
|
heap
|
page read and write
|
||
1A016513000
|
heap
|
page read and write
|
||
1A016459000
|
heap
|
page read and write
|
||
860D6FC000
|
stack
|
page read and write
|
||
10002000
|
unkown
|
page readonly
|
||
138ACFB000
|
stack
|
page read and write
|
||
27A8000
|
direct allocation
|
page read and write
|
||
1A016449000
|
heap
|
page read and write
|
||
25D8000
|
direct allocation
|
page read and write
|
||
13A0BCC6000
|
heap
|
page read and write
|
||
145ADC3D000
|
heap
|
page read and write
|
||
16DE7110000
|
heap
|
page read and write
|
||
13A0BC6F000
|
heap
|
page read and write
|
||
1005FF000
|
stack
|
page read and write
|
||
11B143BC000
|
heap
|
page read and write
|
||
11B14300000
|
heap
|
page read and write
|
||
3F776EC000
|
stack
|
page read and write
|
||
27B7000
|
direct allocation
|
page read and write
|
||
1C5C6438000
|
heap
|
page read and write
|
||
2371000
|
direct allocation
|
page read and write
|
||
38DF000
|
stack
|
page read and write
|
||
2680000
|
direct allocation
|
page read and write
|
||
16DE723C000
|
heap
|
page read and write
|
||
16DE7213000
|
heap
|
page read and write
|
||
28A9000
|
direct allocation
|
page read and write
|
||
1C5C6445000
|
heap
|
page read and write
|
||
25E99FE000
|
stack
|
page read and write
|
||
1A016442000
|
heap
|
page read and write
|
||
253C000
|
direct allocation
|
page read and write
|
||
145ADC6A000
|
heap
|
page read and write
|
||
CF9000
|
heap
|
page read and write
|
||
221CBC20000
|
heap
|
page read and write
|
||
248A000
|
direct allocation
|
page read and write
|
||
3F77F7D000
|
stack
|
page read and write
|
||
18EA9C02000
|
trusted library allocation
|
page read and write
|
||
18EA9402000
|
heap
|
page read and write
|
||
2598000
|
direct allocation
|
page read and write
|
||
1A016502000
|
heap
|
page read and write
|
||
2785000
|
direct allocation
|
page read and write
|
||
2564000
|
direct allocation
|
page read and write
|
||
860D8FE000
|
stack
|
page read and write
|
||
1006FB000
|
stack
|
page read and write
|
||
2441000
|
direct allocation
|
page read and write
|
||
145ADC62000
|
heap
|
page read and write
|
||
145ADBE0000
|
trusted library allocation
|
page read and write
|
||
97D000
|
heap
|
page read and write
|
||
13A0C536000
|
heap
|
page read and write
|
||
11B13D8E000
|
heap
|
page read and write
|
||
2466000
|
direct allocation
|
page read and write
|
||
221CBE13000
|
heap
|
page read and write
|
||
2420000
|
direct allocation
|
page read and write
|
||
245F000
|
direct allocation
|
page read and write
|
||
221CBE00000
|
heap
|
page read and write
|
||
145ADC3A000
|
heap
|
page read and write
|
||
860D4FF000
|
stack
|
page read and write
|
||
25E907B000
|
stack
|
page read and write
|
||
145ADC61000
|
heap
|
page read and write
|
||
145ADC2E000
|
heap
|
page read and write
|
||
B28087E000
|
stack
|
page read and write
|
||
2546000
|
direct allocation
|
page read and write
|
||
145ADC41000
|
heap
|
page read and write
|
||
13A0BC13000
|
heap
|
page read and write
|
||
2830000
|
heap
|
page read and write
|
||
11B14602000
|
heap
|
page read and write
|
||
16DE7100000
|
heap
|
page read and write
|
||
221CC602000
|
trusted library allocation
|
page read and write
|
||
255D000
|
direct allocation
|
page read and write
|
||
13A0BB50000
|
heap
|
page read and write
|
||
25E927C000
|
stack
|
page read and write
|
||
13A0BC2A000
|
heap
|
page read and write
|
||
16DE71A0000
|
trusted library allocation
|
page read and write
|
||
3516000
|
direct allocation
|
page read and write
|
||
7FB90000
|
direct allocation
|
page read and write
|
||
16DE7228000
|
heap
|
page read and write
|
||
11B14600000
|
heap
|
page read and write
|
||
145ADC74000
|
heap
|
page read and write
|
||
25CA000
|
direct allocation
|
page read and write
|
||
10087F000
|
stack
|
page read and write
|
||
4C2000
|
unkown
|
page write copy
|
||
3745000
|
direct allocation
|
page read and write
|
||
221CBE5C000
|
heap
|
page read and write
|
||
11B13DE5000
|
heap
|
page read and write
|
||
13A0BCBC000
|
heap
|
page read and write
|
||
145ADC46000
|
heap
|
page read and write
|
||
16DE7A02000
|
trusted library allocation
|
page read and write
|
||
7C5000
|
heap
|
page read and write
|
||
4B7000
|
unkown
|
page read and write
|
||
4B9000
|
unkown
|
page read and write
|
||
18EA9471000
|
heap
|
page read and write
|
||
247C000
|
direct allocation
|
page read and write
|
||
34E0000
|
unkown
|
page readonly
|
||
11B13C00000
|
heap
|
page read and write
|
||
34E1000
|
unkown
|
page execute read
|
||
13A0BBF0000
|
trusted library allocation
|
page read and write
|
||
221CBE02000
|
heap
|
page read and write
|
||
2768000
|
direct allocation
|
page read and write
|
||
11B13C89000
|
heap
|
page read and write
|
||
B280B7E000
|
stack
|
page read and write
|
||
145ADC73000
|
heap
|
page read and write
|
||
983000
|
heap
|
page read and write
|
||
B280A79000
|
stack
|
page read and write
|
||
145ADC40000
|
heap
|
page read and write
|
||
97000
|
stack
|
page read and write
|
||
3778000
|
direct allocation
|
page read and write
|
||
3470000
|
direct allocation
|
page read and write
|
||
16DE7313000
|
heap
|
page read and write
|
||
138A58B000
|
stack
|
page read and write
|
||
221CBC10000
|
heap
|
page read and write
|
||
11B13C78000
|
heap
|
page read and write
|
||
1C5C6C02000
|
trusted library allocation
|
page read and write
|
||
16DE7202000
|
heap
|
page read and write
|
||
138ADFF000
|
stack
|
page read and write
|
||
256B000
|
direct allocation
|
page read and write
|
||
13A0BBC0000
|
heap
|
page read and write
|
||
2522000
|
direct allocation
|
page read and write
|
||
6D0000
|
unkown
|
page read and write
|
||
2C70000
|
trusted library allocation
|
page read and write
|
||
2483000
|
direct allocation
|
page read and write
|
||
1C5C6413000
|
heap
|
page read and write
|
||
8F0000
|
heap
|
page read and write
|
||
11B14623000
|
heap
|
page read and write
|
||
11B13C94000
|
heap
|
page read and write
|
||
254D000
|
direct allocation
|
page read and write
|
||
4C0000
|
unkown
|
page read and write
|
||
145ADC29000
|
heap
|
page read and write
|
||
6D8000
|
unkown
|
page write copy
|
||
145ADC79000
|
heap
|
page read and write
|
||
2363000
|
direct allocation
|
page read and write
|
||
2776000
|
direct allocation
|
page read and write
|
||
860D3FF000
|
stack
|
page read and write
|
||
2491000
|
direct allocation
|
page read and write
|
||
276F000
|
direct allocation
|
page read and write
|
||
27C0000
|
direct allocation
|
page read and write
|
||
25E94FE000
|
stack
|
page read and write
|
||
11B13D13000
|
heap
|
page read and write
|
||
259F000
|
direct allocation
|
page read and write
|
||
100AFE000
|
stack
|
page read and write
|
||
25E957C000
|
stack
|
page read and write
|
||
C80000
|
heap
|
page read and write
|
||
145ADC4E000
|
heap
|
page read and write
|
||
2360000
|
direct allocation
|
page read and write
|
||
100B7E000
|
stack
|
page read and write
|
||
940000
|
heap
|
page read and write
|
||
1C5C6402000
|
heap
|
page read and write
|
||
B90000
|
heap
|
page read and write
|
||
3F77DFD000
|
stack
|
page read and write
|
||
6F3000
|
unkown
|
page readonly
|
||
993000
|
heap
|
page read and write
|
||
36E6000
|
direct allocation
|
page read and write
|
||
145ADC5F000
|
heap
|
page read and write
|
||
243A000
|
direct allocation
|
page read and write
|
||
4E12BFB000
|
stack
|
page read and write
|
||
145ADC45000
|
heap
|
page read and write
|
||
610000
|
heap
|
page read and write
|
||
27B0000
|
direct allocation
|
page read and write
|
||
138AAFB000
|
stack
|
page read and write
|
||
25AD000
|
direct allocation
|
page read and write
|
||
11B13C3C000
|
heap
|
page read and write
|
||
24A0000
|
direct allocation
|
page read and write
|
||
2448000
|
direct allocation
|
page read and write
|
||
11B1436F000
|
heap
|
page read and write
|
||
2572000
|
direct allocation
|
page read and write
|
||
11B14190000
|
trusted library allocation
|
page read and write
|
||
138ABFB000
|
stack
|
page read and write
|
||
145ADA10000
|
heap
|
page read and write
|
||
221CBE3D000
|
heap
|
page read and write
|
||
11B13C27000
|
heap
|
page read and write
|
||
221CBE29000
|
heap
|
page read and write
|
||
16DE7300000
|
heap
|
page read and write
|
||
257A000
|
direct allocation
|
page read and write
|
||
18EA9464000
|
heap
|
page read and write
|
||
1A01644A000
|
heap
|
page read and write
|
||
3F7807D000
|
stack
|
page read and write
|
||
100A7E000
|
stack
|
page read and write
|
||
6F0000
|
heap
|
page read and write
|
||
11B143D1000
|
heap
|
page read and write
|
||
600000
|
heap
|
page read and write
|
||
1A016471000
|
heap
|
page read and write
|
||
145ADC7E000
|
heap
|
page read and write
|
||
13A0BB60000
|
heap
|
page read and write
|
||
145ADC44000
|
heap
|
page read and write
|
||
1A01644A000
|
heap
|
page read and write
|
||
221CBE20000
|
heap
|
page read and write
|
||
11B143AF000
|
heap
|
page read and write
|
||
900000
|
direct allocation
|
page execute and read and write
|
||
145ADC77000
|
heap
|
page read and write
|
||
11B14302000
|
heap
|
page read and write
|
||
1C5C6452000
|
heap
|
page read and write
|
||
13A0BC00000
|
heap
|
page read and write
|
||
27A1000
|
direct allocation
|
page read and write
|
||
1C5C62C0000
|
heap
|
page read and write
|
||
221CBF02000
|
heap
|
page read and write
|
||
221CBC80000
|
heap
|
page read and write
|
||
16DE7200000
|
heap
|
page read and write
|
||
1A01642A000
|
heap
|
page read and write
|
||
11B14322000
|
heap
|
page read and write
|
||
C90000
|
direct allocation
|
page read and write
|
||
145ADC72000
|
heap
|
page read and write
|
||
860D9FF000
|
stack
|
page read and write
|
||
371E000
|
direct allocation
|
page read and write
|
||
BB0000
|
heap
|
page read and write
|
||
3753000
|
direct allocation
|
page read and write
|
||
9AE000
|
heap
|
page read and write
|
||
1A017F70000
|
remote allocation
|
page read and write
|
||
3F7776E000
|
stack
|
page read and write
|
||
4C4000
|
unkown
|
page readonly
|
||
401000
|
unkown
|
page execute read
|
||
1C5C6429000
|
heap
|
page read and write
|
||
18EA945A000
|
heap
|
page read and write
|
||
145ADD02000
|
heap
|
page read and write
|
||
770000
|
heap
|
page read and write
|
||
351F000
|
direct allocation
|
page read and write
|
||
1A017EB0000
|
trusted library allocation
|
page read and write
|
||
11B13C7A000
|
heap
|
page read and write
|
||
13A0BC89000
|
heap
|
page read and write
|
||
145ADC84000
|
heap
|
page read and write
|
||
4E12D7D000
|
stack
|
page read and write
|
||
10001000
|
unkown
|
page execute read
|
||
8564FE000
|
stack
|
page read and write
|
||
8569FF000
|
stack
|
page read and write
|
||
2498000
|
direct allocation
|
page read and write
|
||
1A016350000
|
heap
|
page read and write
|
||
25E96FB000
|
stack
|
page read and write
|
||
3529000
|
direct allocation
|
page read and write
|
||
7C0000
|
heap
|
page read and write
|
||
10000000
|
unkown
|
page readonly
|
||
3F77B7F000
|
stack
|
page read and write
|
||
145ADC6B000
|
heap
|
page read and write
|
||
18EA9400000
|
heap
|
page read and write
|
||
11B13DB9000
|
heap
|
page read and write
|
||
4E1337F000
|
stack
|
page read and write
|
There are 418 hidden memdumps, click here to show them.