Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
GkYUK8VCrO.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
initial sample
|
||
C:\Users\user\AppData\Local\Temp\aut6482.tmp
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\aut64C1.tmp
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\aut679E.tmp
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\aut67CE.tmp
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\subbase
|
ASCII text, with very long lines (28756), with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\vaccinators
|
data
|
dropped
|
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\GkYUK8VCrO.exe
|
"C:\Users\user\Desktop\GkYUK8VCrO.exe"
|
||
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
|
"C:\Users\user\Desktop\GkYUK8VCrO.exe"
|
||
C:\Users\user\Desktop\GkYUK8VCrO.exe
|
"C:\Users\user\Desktop\GkYUK8VCrO.exe"
|
||
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
|
"C:\Users\user\Desktop\GkYUK8VCrO.exe"
|
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
https://api.ipify.org/
|
104.26.12.205
|
||
https://api.ipify.org
|
unknown
|
||
https://account.dyn.com/
|
unknown
|
||
http://mail.fasmacopy.gr
|
unknown
|
||
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
|
unknown
|
Domains
Name
|
IP
|
Malicious
|
|
---|---|---|---|
mail.fasmacopy.gr
|
79.170.44.32
|
||
api.ipify.org
|
104.26.12.205
|
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
79.170.44.32
|
mail.fasmacopy.gr
|
United Kingdom
|
||
104.26.12.205
|
api.ipify.org
|
United States
|
Registry
Path
|
Value
|
Malicious
|
|
---|---|---|---|
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASAPI32
|
EnableFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASAPI32
|
EnableAutoFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASAPI32
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASAPI32
|
FileTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASAPI32
|
ConsoleTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASAPI32
|
MaxFileSize
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASAPI32
|
FileDirectory
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASMANCS
|
EnableFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASMANCS
|
EnableAutoFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASMANCS
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASMANCS
|
FileTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASMANCS
|
ConsoleTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASMANCS
|
MaxFileSize
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASMANCS
|
FileDirectory
|
There are 5 hidden registries, click here to show them.
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
5870000
|
trusted library section
|
page read and write
|
||
44B5000
|
trusted library allocation
|
page read and write
|
||
347C000
|
trusted library allocation
|
page read and write
|
||
5900000
|
trusted library section
|
page read and write
|
||
2FBE000
|
heap
|
page read and write
|
||
3833000
|
direct allocation
|
page read and write
|
||
B63000
|
unkown
|
page write copy
|
||
12F1000
|
heap
|
page read and write
|
||
37B0000
|
trusted library allocation
|
page read and write
|
||
13D6000
|
heap
|
page read and write
|
||
EEE000
|
heap
|
page read and write
|
||
4557000
|
trusted library allocation
|
page read and write
|
||
5BBC000
|
stack
|
page read and write
|
||
39DD000
|
direct allocation
|
page read and write
|
||
E18000
|
heap
|
page read and write
|
||
B6C000
|
unkown
|
page readonly
|
||
3D09000
|
direct allocation
|
page read and write
|
||
322F000
|
stack
|
page read and write
|
||
45B7000
|
trusted library allocation
|
page read and write
|
||
4475000
|
trusted library allocation
|
page read and write
|
||
46B7000
|
trusted library allocation
|
page read and write
|
||
9BE000
|
stack
|
page read and write
|
||
F20000
|
heap
|
page read and write
|
||
3A29000
|
direct allocation
|
page read and write
|
||
340D000
|
stack
|
page read and write
|
||
EEF000
|
heap
|
page read and write
|
||
3883000
|
direct allocation
|
page read and write
|
||
B68000
|
unkown
|
page readonly
|
||
1A60000
|
direct allocation
|
page execute and read and write
|
||
B68000
|
unkown
|
page readonly
|
||
445000
|
system
|
page execute and read and write
|
||
1518000
|
heap
|
page read and write
|
||
58DE000
|
trusted library allocation
|
page read and write
|
||
3230000
|
heap
|
page read and write
|
||
58CB000
|
trusted library allocation
|
page read and write
|
||
3DA000
|
stack
|
page read and write
|
||
114E000
|
heap
|
page read and write
|
||
661C000
|
stack
|
page read and write
|
||
39D9000
|
direct allocation
|
page read and write
|
||
6D6D000
|
stack
|
page read and write
|
||
1A0E000
|
stack
|
page read and write
|
||
6BBE000
|
stack
|
page read and write
|
||
9CE000
|
stack
|
page read and write
|
||
1031000
|
heap
|
page read and write
|
||
D8E000
|
stack
|
page read and write
|
||
4737000
|
trusted library allocation
|
page read and write
|
||
83E0000
|
heap
|
page read and write
|
||
3893000
|
trusted library allocation
|
page read and write
|
||
1142000
|
heap
|
page read and write
|
||
1110000
|
heap
|
page read and write
|
||
14D4000
|
trusted library allocation
|
page read and write
|
||
3A2D000
|
direct allocation
|
page read and write
|
||
150A000
|
trusted library allocation
|
page execute and read and write
|
||
9CD1000
|
trusted library allocation
|
page read and write
|
||
6B7E000
|
stack
|
page read and write
|
||
37D4000
|
trusted library allocation
|
page read and write
|
||
1350000
|
heap
|
page read and write
|
||
4757000
|
trusted library allocation
|
page read and write
|
||
AA1000
|
unkown
|
page execute read
|
||
4797000
|
trusted library allocation
|
page read and write
|
||
74D0000
|
trusted library allocation
|
page read and write
|
||
3713000
|
trusted library allocation
|
page read and write
|
||
4637000
|
trusted library allocation
|
page read and write
|
||
2F5C000
|
stack
|
page read and write
|
||
EEE000
|
heap
|
page read and write
|
||
11A3000
|
heap
|
page read and write
|
||
4717000
|
trusted library allocation
|
page read and write
|
||
3124000
|
heap
|
page read and write
|
||
15BD000
|
heap
|
page read and write
|
||
685E000
|
stack
|
page read and write
|
||
3260000
|
heap
|
page read and write
|
||
B2F000
|
unkown
|
page readonly
|
||
74C0000
|
heap
|
page read and write
|
||
84D0000
|
heap
|
page read and write
|
||
3B63000
|
direct allocation
|
page read and write
|
||
1506000
|
trusted library allocation
|
page execute and read and write
|
||
3903000
|
trusted library allocation
|
page read and write
|
||
386E000
|
trusted library allocation
|
page read and write
|
||
BA8000
|
unkown
|
page readonly
|
||
1480000
|
trusted library allocation
|
page read and write
|
||
36E9000
|
trusted library allocation
|
page read and write
|
||
3A4E000
|
direct allocation
|
page read and write
|
||
4697000
|
trusted library allocation
|
page read and write
|
||
EA0000
|
heap
|
page read and write
|
||
F9B000
|
heap
|
page read and write
|
||
96CC000
|
stack
|
page read and write
|
||
46D7000
|
trusted library allocation
|
page read and write
|
||
6A7E000
|
stack
|
page read and write
|
||
36C0000
|
direct allocation
|
page read and write
|
||
EB0000
|
heap
|
page read and write
|
||
1AE0000
|
heap
|
page read and write
|
||
154D000
|
heap
|
page read and write
|
||
B55000
|
unkown
|
page readonly
|
||
3739000
|
trusted library allocation
|
page read and write
|
||
4657000
|
trusted library allocation
|
page read and write
|
||
B6C000
|
unkown
|
page readonly
|
||
3D0D000
|
direct allocation
|
page read and write
|
||
38B9000
|
trusted library allocation
|
page read and write
|
||
100F000
|
stack
|
page read and write
|
||
586E000
|
stack
|
page read and write
|
||
157A000
|
heap
|
page read and write
|
||
B5F000
|
unkown
|
page write copy
|
||
F6B000
|
heap
|
page read and write
|
||
6D10000
|
trusted library allocation
|
page execute and read and write
|
||
68F0000
|
trusted library allocation
|
page execute and read and write
|
||
2F70000
|
trusted library allocation
|
page read and write
|
||
AA0000
|
unkown
|
page readonly
|
||
4536000
|
trusted library allocation
|
page read and write
|
||
11D3000
|
heap
|
page read and write
|
||
1460000
|
trusted library allocation
|
page read and write
|
||
B5F000
|
unkown
|
page write copy
|
||
58F2000
|
trusted library allocation
|
page read and write
|
||
11D3000
|
heap
|
page read and write
|
||
BA8000
|
unkown
|
page readonly
|
||
1118000
|
heap
|
page read and write
|
||
3A9E000
|
direct allocation
|
page read and write
|
||
3A29000
|
direct allocation
|
page read and write
|
||
1355000
|
heap
|
page read and write
|
||
14A0000
|
trusted library section
|
page read and write
|
||
FA8000
|
stack
|
page read and write
|
||
1198000
|
heap
|
page read and write
|
||
5E60000
|
trusted library allocation
|
page read and write
|
||
14E0000
|
trusted library allocation
|
page read and write
|
||
9CAA000
|
trusted library allocation
|
page read and write
|
||
14DD000
|
trusted library allocation
|
page execute and read and write
|
||
9CD6000
|
trusted library allocation
|
page read and write
|
||
1502000
|
trusted library allocation
|
page read and write
|
||
3431000
|
trusted library allocation
|
page read and write
|
||
3D7E000
|
direct allocation
|
page read and write
|
||
3900000
|
direct allocation
|
page read and write
|
||
851D000
|
heap
|
page read and write
|
||
3BE0000
|
direct allocation
|
page read and write
|
||
6E40000
|
trusted library allocation
|
page read and write
|
||
79E000
|
stack
|
page read and write
|
||
9DB000
|
stack
|
page read and write
|
||
ED0000
|
heap
|
page read and write
|
||
6CF0000
|
trusted library allocation
|
page read and write
|
||
5CBA000
|
heap
|
page read and write
|
||
3955000
|
trusted library allocation
|
page read and write
|
||
34DC000
|
trusted library allocation
|
page read and write
|
||
3267000
|
heap
|
page read and write
|
||
85D4000
|
heap
|
page read and write
|
||
133D000
|
heap
|
page read and write
|
||
5960000
|
trusted library allocation
|
page read and write
|
||
11EF000
|
heap
|
page read and write
|
||
14E3000
|
trusted library allocation
|
page read and write
|
||
129B000
|
heap
|
page read and write
|
||
1550000
|
heap
|
page read and write
|
||
2F90000
|
heap
|
page read and write
|
||
3D7E000
|
direct allocation
|
page read and write
|
||
58ED000
|
trusted library allocation
|
page read and write
|
||
3900000
|
direct allocation
|
page read and write
|
||
8567000
|
heap
|
page read and write
|
||
1200000
|
heap
|
page read and write
|
||
9CBD000
|
trusted library allocation
|
page read and write
|
||
3A9E000
|
direct allocation
|
page read and write
|
||
3760000
|
direct allocation
|
page read and write
|
||
EA1000
|
heap
|
page read and write
|
||
5990000
|
heap
|
page read and write
|
||
B6C000
|
unkown
|
page readonly
|
||
3A2D000
|
direct allocation
|
page read and write
|
||
14ED000
|
trusted library allocation
|
page execute and read and write
|
||
ED0000
|
heap
|
page read and write
|
||
707F000
|
stack
|
page read and write
|
||
6D20000
|
trusted library allocation
|
page read and write
|
||
AA1000
|
unkown
|
page execute read
|
||
E46000
|
heap
|
page read and write
|
||
858B000
|
heap
|
page read and write
|
||
3100000
|
heap
|
page execute and read and write
|
||
38B0000
|
direct allocation
|
page read and write
|
||
38B0000
|
direct allocation
|
page read and write
|
||
1490000
|
heap
|
page read and write
|
||
190E000
|
stack
|
page read and write
|
||
369F000
|
trusted library allocation
|
page read and write
|
||
3A9E000
|
direct allocation
|
page read and write
|
||
3530000
|
direct allocation
|
page read and write
|
||
3463000
|
trusted library allocation
|
page read and write
|
||
5980000
|
heap
|
page read and write
|
||
1500000
|
trusted library allocation
|
page read and write
|
||
369D000
|
trusted library allocation
|
page read and write
|
||
1143000
|
heap
|
page read and write
|
||
11B4000
|
heap
|
page read and write
|
||
38B7000
|
trusted library allocation
|
page read and write
|
||
A20000
|
heap
|
page read and write
|
||
B68000
|
unkown
|
page readonly
|
||
38BB000
|
trusted library allocation
|
page read and write
|
||
13C7000
|
heap
|
page read and write
|
||
B2F000
|
unkown
|
page readonly
|
||
9FC000
|
stack
|
page read and write
|
||
4495000
|
trusted library allocation
|
page read and write
|
||
85A8000
|
heap
|
page read and write
|
||
98CC000
|
stack
|
page read and write
|
||
11EE000
|
heap
|
page read and write
|
||
373B000
|
trusted library allocation
|
page read and write
|
||
58C0000
|
trusted library allocation
|
page read and write
|
||
3957000
|
trusted library allocation
|
page read and write
|
||
3872000
|
trusted library allocation
|
page read and write
|
||
1A5C000
|
stack
|
page read and write
|
||
71C0000
|
trusted library allocation
|
page read and write
|
||
B2F000
|
unkown
|
page readonly
|
||
1330000
|
heap
|
page read and write
|
||
3A4E000
|
direct allocation
|
page read and write
|
||
10C7000
|
heap
|
page read and write
|
||
5ABC000
|
stack
|
page read and write
|
||
100D000
|
heap
|
page read and write
|
||
4597000
|
trusted library allocation
|
page read and write
|
||
154A000
|
heap
|
page read and write
|
||
720000
|
heap
|
page read and write
|
||
3A2D000
|
direct allocation
|
page read and write
|
||
10BA000
|
heap
|
page read and write
|
||
EB1000
|
heap
|
page read and write
|
||
137F000
|
heap
|
page read and write
|
||
1572000
|
heap
|
page read and write
|
||
3760000
|
direct allocation
|
page read and write
|
||
9CB3000
|
trusted library allocation
|
page read and write
|
||
14D0000
|
trusted library allocation
|
page read and write
|
||
2F60000
|
trusted library allocation
|
page execute and read and write
|
||
44F3000
|
trusted library allocation
|
page read and write
|
||
6D00000
|
trusted library allocation
|
page read and write
|
||
FFF000
|
heap
|
page read and write
|
||
3580000
|
trusted library allocation
|
page read and write
|
||
3833000
|
direct allocation
|
page read and write
|
||
4431000
|
trusted library allocation
|
page read and write
|
||
689C000
|
stack
|
page read and write
|
||
B55000
|
unkown
|
page readonly
|
||
3B63000
|
direct allocation
|
page read and write
|
||
9CFE000
|
trusted library allocation
|
page read and write
|
||
145E000
|
stack
|
page read and write
|
||
1210000
|
heap
|
page read and write
|
||
3679000
|
trusted library allocation
|
page read and write
|
||
3A29000
|
direct allocation
|
page read and write
|
||
1540000
|
heap
|
page read and write
|
||
B5F000
|
unkown
|
page read and write
|
||
2F1E000
|
stack
|
page read and write
|
||
6AA000
|
stack
|
page read and write
|
||
3478000
|
trusted library allocation
|
page read and write
|
||
11D3000
|
heap
|
page read and write
|
||
AA1000
|
unkown
|
page execute read
|
||
384A000
|
trusted library allocation
|
page read and write
|
||
E42000
|
heap
|
page read and write
|
||
AA1000
|
unkown
|
page execute read
|
||
BA8000
|
unkown
|
page readonly
|
||
ED0000
|
heap
|
page read and write
|
||
7DD000
|
stack
|
page read and write
|
||
1A94000
|
heap
|
page read and write
|
||
2EB5000
|
trusted library allocation
|
page execute and read and write
|
||
AA0000
|
unkown
|
page readonly
|
||
103C000
|
stack
|
page read and write
|
||
10DA000
|
heap
|
page read and write
|
||
39DD000
|
direct allocation
|
page read and write
|
||
4577000
|
trusted library allocation
|
page read and write
|
||
4777000
|
trusted library allocation
|
page read and write
|
||
A8A7000
|
trusted library allocation
|
page read and write
|
||
14B0000
|
trusted library section
|
page read and write
|
||
A50000
|
heap
|
page read and write
|
||
B63000
|
unkown
|
page write copy
|
||
710000
|
heap
|
page read and write
|
||
9CEA000
|
trusted library allocation
|
page read and write
|
||
9CB8000
|
trusted library allocation
|
page read and write
|
||
1A90000
|
heap
|
page read and write
|
||
5BE0000
|
heap
|
page read and write
|
||
A40000
|
direct allocation
|
page execute and read and write
|
||
346A000
|
trusted library allocation
|
page read and write
|
||
45F7000
|
trusted library allocation
|
page read and write
|
||
3240000
|
trusted library allocation
|
page read and write
|
||
EAA000
|
stack
|
page read and write
|
||
6CF8000
|
trusted library allocation
|
page read and write
|
||
6DFE000
|
stack
|
page read and write
|
||
A40000
|
heap
|
page read and write
|
||
357E000
|
trusted library allocation
|
page read and write
|
||
A8AE000
|
trusted library allocation
|
page read and write
|
||
373D000
|
trusted library allocation
|
page read and write
|
||
114E000
|
heap
|
page read and write
|
||
B55000
|
unkown
|
page readonly
|
||
B6C000
|
unkown
|
page readonly
|
||
5E5C000
|
stack
|
page read and write
|
||
58E6000
|
trusted library allocation
|
page read and write
|
||
3604000
|
heap
|
page read and write
|
||
3D0D000
|
direct allocation
|
page read and write
|
||
3A4E000
|
direct allocation
|
page read and write
|
||
3278000
|
trusted library allocation
|
page read and write
|
||
160E000
|
stack
|
page read and write
|
||
3784000
|
trusted library allocation
|
page read and write
|
||
9CF4000
|
trusted library allocation
|
page read and write
|
||
115C000
|
heap
|
page read and write
|
||
750000
|
heap
|
page read and write
|
||
3600000
|
heap
|
page read and write
|
||
3710000
|
direct allocation
|
page read and write
|
||
11A4000
|
heap
|
page read and write
|
||
9CCC000
|
trusted library allocation
|
page read and write
|
||
1333000
|
heap
|
page read and write
|
||
11EE000
|
heap
|
page read and write
|
||
58E1000
|
trusted library allocation
|
page read and write
|
||
5C43000
|
heap
|
page read and write
|
||
D4E000
|
stack
|
page read and write
|
||
30A0000
|
heap
|
page read and write
|
||
7FDE0000
|
trusted library allocation
|
page execute and read and write
|
||
F01000
|
heap
|
page read and write
|
||
71D0000
|
trusted library allocation
|
page read and write
|
||
68E0000
|
heap
|
page read and write
|
||
15A6000
|
heap
|
page read and write
|
||
12DB000
|
heap
|
page read and write
|
||
39D9000
|
direct allocation
|
page read and write
|
||
85A3000
|
heap
|
page read and write
|
||
3883000
|
direct allocation
|
page read and write
|
||
7ED0000
|
trusted library allocation
|
page read and write
|
||
1A9C000
|
stack
|
page read and write
|
||
364E000
|
trusted library allocation
|
page read and write
|
||
34DA000
|
trusted library allocation
|
page read and write
|
||
4455000
|
trusted library allocation
|
page read and write
|
||
83D0000
|
heap
|
page read and write
|
||
3250000
|
trusted library allocation
|
page read and write
|
||
39D9000
|
direct allocation
|
page read and write
|
||
1586000
|
heap
|
page read and write
|
||
4677000
|
trusted library allocation
|
page read and write
|
||
B68000
|
unkown
|
page readonly
|
||
37D6000
|
trusted library allocation
|
page read and write
|
||
AA0000
|
unkown
|
page readonly
|
||
8582000
|
heap
|
page read and write
|
||
B55000
|
unkown
|
page readonly
|
||
3870000
|
trusted library allocation
|
page read and write
|
||
3883000
|
direct allocation
|
page read and write
|
||
14D3000
|
trusted library allocation
|
page execute and read and write
|
||
58CE000
|
trusted library allocation
|
page read and write
|
||
38B0000
|
direct allocation
|
page read and write
|
||
3A40000
|
direct allocation
|
page read and write
|
||
3715000
|
trusted library allocation
|
page read and write
|
||
13C5000
|
heap
|
page read and write
|
||
EB2000
|
heap
|
page read and write
|
||
5C22000
|
heap
|
page read and write
|
||
5D1E000
|
stack
|
page read and write
|
||
4617000
|
trusted library allocation
|
page read and write
|
||
11A2000
|
heap
|
page read and write
|
||
6CBE000
|
stack
|
page read and write
|
||
A70000
|
heap
|
page read and write
|
||
A8A9000
|
trusted library allocation
|
page read and write
|
||
2EB0000
|
trusted library allocation
|
page read and write
|
||
3710000
|
direct allocation
|
page read and write
|
||
B2F000
|
unkown
|
page readonly
|
||
68DA000
|
heap
|
page read and write
|
||
703E000
|
stack
|
page read and write
|
||
2ED0000
|
trusted library allocation
|
page read and write
|
||
45D7000
|
trusted library allocation
|
page read and write
|
||
5E6D000
|
trusted library allocation
|
page read and write
|
||
9CC2000
|
trusted library allocation
|
page read and write
|
||
675D000
|
stack
|
page read and write
|
||
3D09000
|
direct allocation
|
page read and write
|
||
9CE5000
|
trusted library allocation
|
page read and write
|
||
13B8000
|
heap
|
page read and write
|
||
9CE0000
|
trusted library allocation
|
page read and write
|
||
3A40000
|
direct allocation
|
page read and write
|
||
3833000
|
direct allocation
|
page read and write
|
||
B5F000
|
unkown
|
page read and write
|
||
3420000
|
heap
|
page execute and read and write
|
||
1303000
|
heap
|
page read and write
|
||
101B000
|
stack
|
page read and write
|
||
E10000
|
heap
|
page read and write
|
||
8515000
|
heap
|
page read and write
|
||
2EB7000
|
trusted library allocation
|
page execute and read and write
|
||
AA0000
|
unkown
|
page readonly
|
||
7240000
|
trusted library allocation
|
page execute and read and write
|
||
392F000
|
trusted library allocation
|
page read and write
|
||
10CA000
|
heap
|
page read and write
|
||
39A0000
|
trusted library allocation
|
page read and write
|
||
3526000
|
trusted library allocation
|
page read and write
|
||
10CA000
|
heap
|
page read and write
|
||
357C000
|
trusted library allocation
|
page read and write
|
||
400000
|
system
|
page execute and read and write
|
||
6D04000
|
trusted library allocation
|
page read and write
|
||
3553000
|
trusted library allocation
|
page read and write
|
||
9CF9000
|
trusted library allocation
|
page read and write
|
||
9CEF000
|
trusted library allocation
|
page read and write
|
||
3110000
|
trusted library allocation
|
page read and write
|
||
651C000
|
stack
|
page read and write
|
||
FFF000
|
stack
|
page read and write
|
||
3953000
|
trusted library allocation
|
page read and write
|
||
2EBB000
|
trusted library allocation
|
page execute and read and write
|
||
46F7000
|
trusted library allocation
|
page read and write
|
||
9CAE000
|
trusted library allocation
|
page read and write
|
||
15F1000
|
heap
|
page read and write
|
||
3959000
|
trusted library allocation
|
page read and write
|
||
10DA000
|
heap
|
page read and write
|
||
19DB000
|
stack
|
page read and write
|
||
E43000
|
heap
|
page read and write
|
||
BA8000
|
unkown
|
page readonly
|
||
1A1B000
|
stack
|
page read and write
|
||
E4B000
|
heap
|
page read and write
|
||
14F0000
|
heap
|
page read and write
|
||
39DD000
|
direct allocation
|
page read and write
|
||
3760000
|
direct allocation
|
page read and write
|
||
A60000
|
heap
|
page read and write
|
||
1510000
|
heap
|
page read and write
|
||
37E5000
|
trusted library allocation
|
page read and write
|
||
E4B000
|
heap
|
page read and write
|
||
EC0000
|
heap
|
page read and write
|
||
E99000
|
heap
|
page read and write
|
||
85B2000
|
heap
|
page read and write
|
||
126B000
|
heap
|
page read and write
|
||
6E50000
|
trusted library allocation
|
page execute and read and write
|
||
9CDB000
|
trusted library allocation
|
page read and write
|
||
3710000
|
direct allocation
|
page read and write
|
||
7200000
|
heap
|
page read and write
|
||
1D0E000
|
stack
|
page read and write
|
||
11C3000
|
heap
|
page read and write
|
||
3BE0000
|
direct allocation
|
page read and write
|
||
14F7000
|
heap
|
page read and write
|
||
5E1E000
|
stack
|
page read and write
|
||
381E000
|
trusted library allocation
|
page read and write
|
||
58D2000
|
trusted library allocation
|
page read and write
|
||
30FE000
|
stack
|
page read and write
|
||
2EB2000
|
trusted library allocation
|
page read and write
|
||
1146000
|
heap
|
page read and write
|
||
6E46000
|
trusted library allocation
|
page read and write
|
||
68D0000
|
heap
|
page read and write
|
||
5BE4000
|
heap
|
page read and write
|
||
121F000
|
heap
|
page read and write
|
||
132E000
|
stack
|
page read and write
|
||
3900000
|
direct allocation
|
page read and write
|
||
14C0000
|
trusted library allocation
|
page read and write
|
||
3120000
|
heap
|
page read and write
|
||
1A40000
|
heap
|
page read and write
|
||
392D000
|
trusted library allocation
|
page read and write
|
||
9CC7000
|
trusted library allocation
|
page read and write
|
There are 413 hidden memdumps, click here to show them.