Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
llD1w4ROY5.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
initial sample
|
||
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\SzvWIzD.exe.log
|
ASCII text, with CRLF line terminators
|
modified
|
||
C:\Users\user\AppData\Local\Temp\aut4D89.tmp
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\aut4DE8.tmp
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\hurtling
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\spiketop
|
ASCII text, with very long lines (28740), with no line terminators
|
modified
|
||
C:\Users\user\AppData\Roaming\SzvWIzD\SzvWIzD.exe
|
PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
modified
|
||
\Device\ConDrv
|
ASCII text, with CRLF line terminators
|
dropped
|
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\llD1w4ROY5.exe
|
"C:\Users\user\Desktop\llD1w4ROY5.exe"
|
||
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
|
"C:\Users\user\Desktop\llD1w4ROY5.exe"
|
||
C:\Users\user\AppData\Roaming\SzvWIzD\SzvWIzD.exe
|
"C:\Users\user\AppData\Roaming\SzvWIzD\SzvWIzD.exe"
|
||
C:\Users\user\AppData\Roaming\SzvWIzD\SzvWIzD.exe
|
"C:\Users\user\AppData\Roaming\SzvWIzD\SzvWIzD.exe"
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
https://api.ipify.org/
|
104.26.12.205
|
||
https://api.ipif8f
|
unknown
|
||
https://api.ipify.org
|
unknown
|
||
https://api.ipify.org/p
|
unknown
|
||
https://account.dyn.com/
|
unknown
|
||
https://api.ipify.org/T
|
unknown
|
||
https://api.ipify.org/t
|
unknown
|
||
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
|
unknown
|
||
http://ip-api.com/line/?fields=hosting
|
208.95.112.1
|
||
http://api.ipify.org
|
unknown
|
||
http://ip-api.com
|
unknown
|
There are 1 hidden URLs, click here to show them.
Domains
Name
|
IP
|
Malicious
|
|
---|---|---|---|
ip-api.com
|
208.95.112.1
|
||
api.ipify.org
|
104.26.12.205
|
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
208.95.112.1
|
ip-api.com
|
United States
|
||
104.26.12.205
|
api.ipify.org
|
United States
|
Registry
Path
|
Value
|
Malicious
|
|
---|---|---|---|
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASAPI32
|
EnableFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASAPI32
|
EnableAutoFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASAPI32
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASAPI32
|
FileTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASAPI32
|
ConsoleTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASAPI32
|
MaxFileSize
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASAPI32
|
FileDirectory
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASMANCS
|
EnableFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASMANCS
|
EnableAutoFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASMANCS
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASMANCS
|
FileTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASMANCS
|
ConsoleTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASMANCS
|
MaxFileSize
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASMANCS
|
FileDirectory
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
|
SzvWIzD
|
There are 6 hidden registries, click here to show them.
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
402000
|
system
|
page execute and read and write
|
||
3FE0000
|
direct allocation
|
page read and write
|
||
EE2000
|
unkown
|
page readonly
|
||
4E10000
|
trusted library allocation
|
page execute and read and write
|
||
31E0000
|
trusted library allocation
|
page read and write
|
||
17FF000
|
heap
|
page read and write
|
||
32CE000
|
trusted library allocation
|
page read and write
|
||
3359000
|
trusted library allocation
|
page read and write
|
||
6B0E000
|
stack
|
page read and write
|
||
1648000
|
heap
|
page read and write
|
||
538E000
|
stack
|
page read and write
|
||
4251000
|
trusted library allocation
|
page read and write
|
||
43E000
|
system
|
page execute and read and write
|
||
4339000
|
direct allocation
|
page read and write
|
||
42E9000
|
direct allocation
|
page read and write
|
||
14D4000
|
trusted library allocation
|
page read and write
|
||
530E000
|
stack
|
page read and write
|
||
1647000
|
heap
|
page read and write
|
||
1604000
|
trusted library allocation
|
page read and write
|
||
6D70000
|
trusted library allocation
|
page read and write
|
||
2EDA000
|
trusted library allocation
|
page execute and read and write
|
||
433D000
|
direct allocation
|
page read and write
|
||
6D80000
|
trusted library allocation
|
page read and write
|
||
F60000
|
trusted library allocation
|
page read and write
|
||
13CE000
|
stack
|
page read and write
|
||
DF0000
|
heap
|
page read and write
|
||
14E4000
|
trusted library allocation
|
page read and write
|
||
315F000
|
stack
|
page read and write
|
||
42E9000
|
direct allocation
|
page read and write
|
||
6D90000
|
trusted library allocation
|
page read and write
|
||
6B9E000
|
stack
|
page read and write
|
||
FE0000
|
heap
|
page execute and read and write
|
||
6D67000
|
trusted library allocation
|
page read and write
|
||
31B6000
|
trusted library allocation
|
page read and write
|
||
3251000
|
trusted library allocation
|
page read and write
|
||
4193000
|
direct allocation
|
page read and write
|
||
6ECE000
|
stack
|
page read and write
|
||
5710000
|
heap
|
page read and write
|
||
1583000
|
heap
|
page read and write
|
||
1610000
|
heap
|
page read and write
|
||
2EEB000
|
trusted library allocation
|
page execute and read and write
|
||
3000000
|
trusted library allocation
|
page read and write
|
||
31D0000
|
trusted library allocation
|
page read and write
|
||
D80000
|
trusted library allocation
|
page read and write
|
||
B95000
|
heap
|
page read and write
|
||
13B0000
|
heap
|
page read and write
|
||
3326000
|
trusted library allocation
|
page read and write
|
||
1490000
|
heap
|
page read and write
|
||
D6F000
|
stack
|
page read and write
|
||
32B0000
|
trusted library allocation
|
page read and write
|
||
42ED000
|
direct allocation
|
page read and write
|
||
6EDF1000
|
unkown
|
page execute read
|
||
1230000
|
heap
|
page read and write
|
||
6B5D000
|
stack
|
page read and write
|
||
1507000
|
trusted library allocation
|
page execute and read and write
|
||
D8A000
|
stack
|
page read and write
|
||
1641000
|
heap
|
page read and write
|
||
688E000
|
stack
|
page read and write
|
||
6EE0F000
|
unkown
|
page readonly
|
||
14C0000
|
trusted library allocation
|
page read and write
|
||
4E7E000
|
stack
|
page read and write
|
||
A1E000
|
stack
|
page read and write
|
||
3353000
|
trusted library allocation
|
page read and write
|
||
6D5F000
|
stack
|
page read and write
|
||
330F000
|
trusted library allocation
|
page read and write
|
||
58BE000
|
stack
|
page read and write
|
||
1568000
|
heap
|
page read and write
|
||
57BE000
|
stack
|
page read and write
|
||
14ED000
|
trusted library allocation
|
page execute and read and write
|
||
641F000
|
heap
|
page read and write
|
||
22C0000
|
direct allocation
|
page execute and read and write
|
||
42E9000
|
direct allocation
|
page read and write
|
||
3211000
|
trusted library allocation
|
page read and write
|
||
3240000
|
heap
|
page read and write
|
||
1540000
|
heap
|
page read and write
|
||
6CDE000
|
stack
|
page read and write
|
||
319B000
|
trusted library allocation
|
page read and write
|
||
1833000
|
heap
|
page read and write
|
||
678D000
|
stack
|
page read and write
|
||
3341000
|
trusted library allocation
|
page read and write
|
||
1600000
|
trusted library allocation
|
page read and write
|
||
6EE06000
|
unkown
|
page readonly
|
||
210000
|
unkown
|
page readonly
|
||
16F9000
|
heap
|
page read and write
|
||
17F0000
|
heap
|
page read and write
|
||
1285000
|
heap
|
page read and write
|
||
6DF0000
|
trusted library allocation
|
page read and write
|
||
AA3000
|
heap
|
page read and write
|
||
1881000
|
heap
|
page read and write
|
||
2ECD000
|
trusted library allocation
|
page execute and read and write
|
||
2F4E000
|
stack
|
page read and write
|
||
42ED000
|
direct allocation
|
page read and write
|
||
1641000
|
heap
|
page read and write
|
||
63D2000
|
heap
|
page read and write
|
||
1648000
|
heap
|
page read and write
|
||
64A1000
|
heap
|
page read and write
|
||
21AE000
|
stack
|
page read and write
|
||
6EE0000
|
heap
|
page read and write
|
||
433D000
|
direct allocation
|
page read and write
|
||
5A3E000
|
stack
|
page read and write
|
||
71BE000
|
stack
|
page read and write
|
||
1550000
|
trusted library allocation
|
page read and write
|
||
189D000
|
heap
|
page read and write
|
||
13B5000
|
heap
|
page read and write
|
||
6BDE000
|
stack
|
page read and write
|
||
22A0000
|
heap
|
page read and write
|
||
D94000
|
trusted library allocation
|
page read and write
|
||
1320000
|
heap
|
page read and write
|
||
435E000
|
direct allocation
|
page read and write
|
||
185B000
|
heap
|
page read and write
|
||
520F000
|
stack
|
page read and write
|
||
DC7000
|
trusted library allocation
|
page execute and read and write
|
||
1601000
|
heap
|
page read and write
|
||
38F1000
|
trusted library allocation
|
page read and write
|
||
4219000
|
trusted library allocation
|
page read and write
|
||
4070000
|
direct allocation
|
page read and write
|
||
5770000
|
heap
|
page execute and read and write
|
||
6EDF0000
|
unkown
|
page readonly
|
||
28EE000
|
stack
|
page read and write
|
||
2ED6000
|
trusted library allocation
|
page execute and read and write
|
||
1630000
|
heap
|
page read and write
|
||
6A0E000
|
stack
|
page read and write
|
||
4020000
|
direct allocation
|
page read and write
|
||
4210000
|
direct allocation
|
page read and write
|
||
4239000
|
trusted library allocation
|
page read and write
|
||
319E000
|
trusted library allocation
|
page read and write
|
||
1560000
|
heap
|
page read and write
|
||
14E0000
|
trusted library allocation
|
page read and write
|
||
43AE000
|
direct allocation
|
page read and write
|
||
3332000
|
trusted library allocation
|
page read and write
|
||
4339000
|
direct allocation
|
page read and write
|
||
FC0000
|
heap
|
page read and write
|
||
2EE0000
|
trusted library allocation
|
page read and write
|
||
131E000
|
stack
|
page read and write
|
||
2308000
|
heap
|
page read and write
|
||
12D0000
|
heap
|
page read and write
|
||
435E000
|
direct allocation
|
page read and write
|
||
4210000
|
direct allocation
|
page read and write
|
||
150B000
|
trusted library allocation
|
page execute and read and write
|
||
32E8000
|
trusted library allocation
|
page read and write
|
||
13DB000
|
stack
|
page read and write
|
||
3010000
|
trusted library allocation
|
page read and write
|
||
1648000
|
heap
|
page read and write
|
||
1320000
|
trusted library allocation
|
page read and write
|
||
5B3F000
|
stack
|
page read and write
|
||
6D1E000
|
stack
|
page read and write
|
||
127E000
|
stack
|
page read and write
|
||
29F000
|
unkown
|
page readonly
|
||
A5D000
|
stack
|
page read and write
|
||
31A2000
|
trusted library allocation
|
page read and write
|
||
DF0000
|
trusted library allocation
|
page execute and read and write
|
||
EEA000
|
unkown
|
page readonly
|
||
4193000
|
direct allocation
|
page read and write
|
||
2D8000
|
unkown
|
page readonly
|
||
4143000
|
direct allocation
|
page read and write
|
||
2CF000
|
unkown
|
page write copy
|
||
96A000
|
stack
|
page read and write
|
||
1716000
|
heap
|
page read and write
|
||
ABA000
|
heap
|
page read and write
|
||
1620000
|
heap
|
page read and write
|
||
43AE000
|
direct allocation
|
page read and write
|
||
12D7000
|
heap
|
page read and write
|
||
63D6000
|
heap
|
page read and write
|
||
2F58000
|
trusted library allocation
|
page read and write
|
||
2C5000
|
unkown
|
page readonly
|
||
1646000
|
heap
|
page read and write
|
||
3AB0000
|
heap
|
page read and write
|
||
15A5000
|
heap
|
page read and write
|
||
312F000
|
stack
|
page read and write
|
||
15A5000
|
heap
|
page read and write
|
||
FC9000
|
stack
|
page read and write
|
||
3261000
|
trusted library allocation
|
page read and write
|
||
150E000
|
stack
|
page read and write
|
||
AFE000
|
heap
|
page read and write
|
||
6DE0000
|
trusted library allocation
|
page execute and read and write
|
||
15FF000
|
heap
|
page read and write
|
||
32B8000
|
trusted library allocation
|
page read and write
|
||
1280000
|
heap
|
page read and write
|
||
31BD000
|
trusted library allocation
|
page read and write
|
||
6DD0000
|
heap
|
page read and write
|
||
2ED2000
|
trusted library allocation
|
page read and write
|
||
211000
|
unkown
|
page execute read
|
||
6EE0D000
|
unkown
|
page read and write
|
||
1578000
|
heap
|
page read and write
|
||
41C0000
|
direct allocation
|
page read and write
|
||
140F000
|
heap
|
page read and write
|
||
15C2000
|
heap
|
page read and write
|
||
13AE000
|
stack
|
page read and write
|
||
2FF0000
|
trusted library allocation
|
page execute and read and write
|
||
332C000
|
trusted library allocation
|
page read and write
|
||
3345000
|
trusted library allocation
|
page read and write
|
||
191F000
|
stack
|
page read and write
|
||
4275000
|
trusted library allocation
|
page read and write
|
||
211000
|
unkown
|
page execute read
|
||
1570000
|
heap
|
page read and write
|
||
3250000
|
trusted library allocation
|
page read and write
|
||
158A000
|
heap
|
page read and write
|
||
4020000
|
direct allocation
|
page read and write
|
||
2300000
|
heap
|
page read and write
|
||
4143000
|
direct allocation
|
page read and write
|
||
31AA000
|
trusted library allocation
|
page read and write
|
||
32EE000
|
trusted library allocation
|
page read and write
|
||
FF0000
|
heap
|
page read and write
|
||
1500000
|
trusted library allocation
|
page read and write
|
||
433D000
|
direct allocation
|
page read and write
|
||
15E2000
|
heap
|
page read and write
|
||
59BC000
|
stack
|
page read and write
|
||
DCB000
|
trusted library allocation
|
page execute and read and write
|
||
58FE000
|
stack
|
page read and write
|
||
5723000
|
heap
|
page read and write
|
||
9D0000
|
heap
|
page read and write
|
||
510E000
|
stack
|
page read and write
|
||
3200000
|
heap
|
page execute and read and write
|
||
A88000
|
heap
|
page read and write
|
||
2214000
|
heap
|
page read and write
|
||
2EE7000
|
trusted library allocation
|
page execute and read and write
|
||
15C2000
|
heap
|
page read and write
|
||
142D000
|
heap
|
page read and write
|
||
B90000
|
heap
|
page read and write
|
||
2F00000
|
trusted library allocation
|
page read and write
|
||
1D6D000
|
stack
|
page read and write
|
||
13D4000
|
heap
|
page read and write
|
||
1648000
|
heap
|
page read and write
|
||
5700000
|
trusted library allocation
|
page read and write
|
||
1647000
|
heap
|
page read and write
|
||
3274000
|
trusted library allocation
|
page read and write
|
||
2EC0000
|
trusted library allocation
|
page read and write
|
||
1648000
|
heap
|
page read and write
|
||
4070000
|
direct allocation
|
page read and write
|
||
6D98000
|
trusted library allocation
|
page read and write
|
||
1365000
|
heap
|
page read and write
|
||
17BC000
|
heap
|
page read and write
|
||
6D60000
|
trusted library allocation
|
page read and write
|
||
A80000
|
heap
|
page read and write
|
||
1530000
|
trusted library allocation
|
page execute and read and write
|
||
F70000
|
heap
|
page read and write
|
||
41C0000
|
direct allocation
|
page read and write
|
||
4FC0000
|
heap
|
page execute and read and write
|
||
1647000
|
heap
|
page read and write
|
||
136E000
|
stack
|
page read and write
|
||
50CE000
|
stack
|
page read and write
|
||
4FBE000
|
stack
|
page read and write
|
||
58B0000
|
heap
|
page execute and read and write
|
||
14DD000
|
trusted library allocation
|
page execute and read and write
|
||
1602000
|
heap
|
page read and write
|
||
1040000
|
heap
|
page read and write
|
||
13FC000
|
stack
|
page read and write
|
||
1649000
|
heap
|
page read and write
|
||
2D8000
|
unkown
|
page readonly
|
||
1601000
|
heap
|
page read and write
|
||
A60000
|
heap
|
page read and write
|
||
43AE000
|
direct allocation
|
page read and write
|
||
1540000
|
trusted library allocation
|
page read and write
|
||
4143000
|
direct allocation
|
page read and write
|
||
1603000
|
trusted library allocation
|
page execute and read and write
|
||
32D2000
|
trusted library allocation
|
page read and write
|
||
31B1000
|
trusted library allocation
|
page read and write
|
||
15D1000
|
heap
|
page read and write
|
||
3330000
|
trusted library allocation
|
page read and write
|
||
15AD000
|
heap
|
page read and write
|
||
D93000
|
trusted library allocation
|
page execute and read and write
|
||
DAD000
|
trusted library allocation
|
page execute and read and write
|
||
EE0000
|
unkown
|
page readonly
|
||
F7C000
|
stack
|
page read and write
|
||
F1E000
|
stack
|
page read and write
|
||
31AE000
|
trusted library allocation
|
page read and write
|
||
DA4000
|
trusted library allocation
|
page read and write
|
||
330B000
|
trusted library allocation
|
page read and write
|
||
1596000
|
heap
|
page read and write
|
||
568C000
|
stack
|
page read and write
|
||
2210000
|
heap
|
page read and write
|
||
3200000
|
heap
|
page execute and read and write
|
||
185F000
|
stack
|
page read and write
|
||
32FD000
|
trusted library allocation
|
page read and write
|
||
15A3000
|
heap
|
page read and write
|
||
86C000
|
stack
|
page read and write
|
||
2EE2000
|
trusted library allocation
|
page read and write
|
||
5720000
|
heap
|
page read and write
|
||
15A1000
|
heap
|
page read and write
|
||
59FE000
|
stack
|
page read and write
|
||
FE0000
|
heap
|
page read and write
|
||
6483000
|
heap
|
page read and write
|
||
12FA000
|
stack
|
page read and write
|
||
2ED0000
|
trusted library allocation
|
page read and write
|
||
15B3000
|
heap
|
page read and write
|
||
1367000
|
heap
|
page read and write
|
||
1290000
|
heap
|
page read and write
|
||
15B3000
|
heap
|
page read and write
|
||
165E000
|
heap
|
page read and write
|
||
4A8E000
|
stack
|
page read and write
|
||
4339000
|
direct allocation
|
page read and write
|
||
28F1000
|
trusted library allocation
|
page read and write
|
||
D9D000
|
trusted library allocation
|
page execute and read and write
|
||
FBC000
|
stack
|
page read and write
|
||
4210000
|
direct allocation
|
page read and write
|
||
1520000
|
trusted library allocation
|
page read and write
|
||
AAF000
|
heap
|
page read and write
|
||
63D0000
|
heap
|
page read and write
|
||
7F5F0000
|
trusted library allocation
|
page execute and read and write
|
||
18A9000
|
heap
|
page read and write
|
||
528C000
|
stack
|
page read and write
|
||
2C5000
|
unkown
|
page readonly
|
||
AA8000
|
heap
|
page read and write
|
||
3246000
|
trusted library allocation
|
page read and write
|
||
E10000
|
heap
|
page read and write
|
||
6493000
|
heap
|
page read and write
|
||
175F000
|
stack
|
page read and write
|
||
1530000
|
heap
|
page read and write
|
||
E00000
|
trusted library allocation
|
page read and write
|
||
1510000
|
heap
|
page read and write
|
||
3020000
|
heap
|
page read and write
|
||
41C0000
|
direct allocation
|
page read and write
|
||
2D3000
|
unkown
|
page write copy
|
||
42ED000
|
direct allocation
|
page read and write
|
||
1648000
|
heap
|
page read and write
|
||
1A40000
|
heap
|
page read and write
|
||
4193000
|
direct allocation
|
page read and write
|
||
1338000
|
heap
|
page read and write
|
||
F5E000
|
stack
|
page read and write
|
||
2CF000
|
unkown
|
page read and write
|
||
4211000
|
trusted library allocation
|
page read and write
|
||
6DC0000
|
trusted library allocation
|
page execute and read and write
|
||
EC9000
|
stack
|
page read and write
|
||
4020000
|
direct allocation
|
page read and write
|
||
4070000
|
direct allocation
|
page read and write
|
||
15A5000
|
heap
|
page read and write
|
||
316C000
|
stack
|
page read and write
|
||
6405000
|
heap
|
page read and write
|
||
4F7F000
|
stack
|
page read and write
|
||
1893000
|
heap
|
page read and write
|
||
64AC000
|
heap
|
page read and write
|
||
1A30000
|
trusted library allocation
|
page execute and read and write
|
||
325D000
|
trusted library allocation
|
page read and write
|
||
1330000
|
heap
|
page read and write
|
||
13FA000
|
heap
|
page read and write
|
||
1A2E000
|
stack
|
page read and write
|
||
160D000
|
trusted library allocation
|
page execute and read and write
|
||
15DE000
|
heap
|
page read and write
|
||
210000
|
unkown
|
page readonly
|
||
400000
|
system
|
page execute and read and write
|
||
DA0000
|
trusted library allocation
|
page read and write
|
||
167D000
|
heap
|
page read and write
|
||
5730000
|
heap
|
page read and write
|
||
3190000
|
trusted library allocation
|
page read and write
|
||
3170000
|
heap
|
page read and write
|
||
1DAE000
|
stack
|
page read and write
|
||
13BF000
|
stack
|
page read and write
|
||
435E000
|
direct allocation
|
page read and write
|
||
15FF000
|
stack
|
page read and write
|
||
29F000
|
unkown
|
page readonly
|
||
14D3000
|
trusted library allocation
|
page execute and read and write
|
There are 341 hidden memdumps, click here to show them.