Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
new order 00041221.exe
|
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
|
initial sample
|
||
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\new order 00041221.exe.log
|
ASCII text, with CRLF line terminators
|
dropped
|
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\new order 00041221.exe
|
"C:\Users\user\Desktop\new order 00041221.exe"
|
||
C:\Users\user\Desktop\new order 00041221.exe
|
"C:\Users\user\Desktop\new order 00041221.exe"
|
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
https://www.office.com/
|
unknown
|
||
https://duckduckgo.com/chrome_newtab
|
unknown
|
||
https://duckduckgo.com/ac/?q=
|
unknown
|
||
https://api.telegram.org
|
unknown
|
||
https://www.google.com/images/branding/product/ico/googleg_lodp.ico
|
unknown
|
||
http://r11.o.lencr.org0#
|
unknown
|
||
https://api.telegram.org/bot
|
unknown
|
||
https://api.telegram.org/bot/sendMessage?chat_id=&text=%20%0D%0A%0D%0APC%20Name:899552%0D%0ADate%20and%20Time:%2027/07/2024%20/%2000:07:11%0D%0ACountry%20Name:%20United%20States%0D%0A%5B%20899552%20Clicked%20on%20the%20File%20If%20you%20see%20nothing%20this's%20mean%20the%20system%20storage's%20empty.%20%5D
|
149.154.167.220
|
||
https://www.office.com/lB
|
unknown
|
||
https://api.telegram.org/bot/sendMessage?chat_id=&text=%20%0D%0A%0D%0APC%20Name:899552%0D%0ADate%20a
|
unknown
|
||
https://chrome.google.com/webstore?hl=en0
|
unknown
|
||
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
|
unknown
|
||
http://checkip.dyndns.org
|
unknown
|
||
https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
|
unknown
|
||
https://reallyfreegeoip.org/xml/8.46.123.33
|
188.114.97.3
|
||
https://api.telegram.org/bot/sendMessage?chat_id=&text=
|
unknown
|
||
https://chrome.google.com/webstore?hl=en
|
unknown
|
||
https://www.ecosia.org/newtab/
|
unknown
|
||
http://varders.kozow.com:8081
|
unknown
|
||
http://aborters.duckdns.org:8081
|
unknown
|
||
https://ac.ecosia.org/autocomplete?q=
|
unknown
|
||
http://checkip.dyndns.org/
|
193.122.6.168
|
||
http://51.38.247.67:8081/_send_.php?L
|
unknown
|
||
http://r11.i.lencr.org/0Q
|
unknown
|
||
https://reallyfreegeoip.org/xml/8.46.123.33$
|
unknown
|
||
https://www.office.com/0
|
unknown
|
||
http://anotherarmy.dns.army:8081
|
unknown
|
||
http://x1.c.lencr.org/0
|
unknown
|
||
http://x1.i.lencr.org/0
|
unknown
|
||
https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
|
unknown
|
||
http://checkip.dyndns.org/q
|
unknown
|
||
https://chrome.google.com/webstore?hl=enlB
|
unknown
|
||
http://mail.moonbrosurgical.com
|
unknown
|
||
https://reallyfreegeoip.org
|
unknown
|
||
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
|
unknown
|
||
https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
|
unknown
|
||
http://51.38.247.67:8081/_send_.php?LCapplication/x-www-form-urlencoded
|
unknown
|
||
https://reallyfreegeoip.org/xml/
|
unknown
|
There are 28 hidden URLs, click here to show them.
Domains
Name
|
IP
|
Malicious
|
|
---|---|---|---|
reallyfreegeoip.org
|
188.114.97.3
|
||
api.telegram.org
|
149.154.167.220
|
||
15.164.165.52.in-addr.arpa
|
unknown
|
||
checkip.dyndns.org
|
unknown
|
||
mail.moonbrosurgical.com
|
203.124.44.4
|
||
checkip.dyndns.com
|
193.122.6.168
|
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
149.154.167.220
|
api.telegram.org
|
United Kingdom
|
||
188.114.97.3
|
reallyfreegeoip.org
|
European Union
|
||
203.124.44.4
|
mail.moonbrosurgical.com
|
Pakistan
|
||
193.122.6.168
|
checkip.dyndns.com
|
United States
|
Registry
Path
|
Value
|
Malicious
|
|
---|---|---|---|
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\new order 00041221_RASAPI32
|
EnableFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\new order 00041221_RASAPI32
|
EnableAutoFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\new order 00041221_RASAPI32
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\new order 00041221_RASAPI32
|
FileTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\new order 00041221_RASAPI32
|
ConsoleTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\new order 00041221_RASAPI32
|
MaxFileSize
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\new order 00041221_RASAPI32
|
FileDirectory
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\new order 00041221_RASMANCS
|
EnableFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\new order 00041221_RASMANCS
|
EnableAutoFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\new order 00041221_RASMANCS
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\new order 00041221_RASMANCS
|
FileTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\new order 00041221_RASMANCS
|
ConsoleTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\new order 00041221_RASMANCS
|
MaxFileSize
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\new order 00041221_RASMANCS
|
FileDirectory
|
There are 5 hidden registries, click here to show them.
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
2EE1000
|
trusted library allocation
|
page read and write
|
||
402000
|
remote allocation
|
page execute and read and write
|
||
3859000
|
trusted library allocation
|
page read and write
|
||
38FA000
|
trusted library allocation
|
page read and write
|
||
5A14000
|
trusted library allocation
|
page read and write
|
||
79E000
|
heap
|
page read and write
|
||
1300000
|
heap
|
page read and write
|
||
121D000
|
trusted library allocation
|
page execute and read and write
|
||
3241000
|
trusted library allocation
|
page read and write
|
||
4DC0000
|
trusted library allocation
|
page read and write
|
||
5610000
|
heap
|
page read and write
|
||
AF0000
|
trusted library allocation
|
page read and write
|
||
40BC000
|
trusted library allocation
|
page read and write
|
||
2F83000
|
trusted library allocation
|
page read and write
|
||
6AD0000
|
trusted library section
|
page read and write
|
||
3275000
|
trusted library allocation
|
page read and write
|
||
B00000
|
trusted library allocation
|
page read and write
|
||
27CD000
|
trusted library allocation
|
page read and write
|
||
3186000
|
trusted library allocation
|
page read and write
|
||
2FE7000
|
trusted library allocation
|
page read and write
|
||
2800000
|
trusted library allocation
|
page read and write
|
||
6F7000
|
stack
|
page read and write
|
||
4C60000
|
heap
|
page read and write
|
||
3074000
|
trusted library allocation
|
page read and write
|
||
3193000
|
trusted library allocation
|
page read and write
|
||
2630000
|
trusted library allocation
|
page read and write
|
||
4186000
|
trusted library allocation
|
page read and write
|
||
666E000
|
stack
|
page read and write
|
||
6DC0000
|
trusted library allocation
|
page execute and read and write
|
||
6C40000
|
trusted library allocation
|
page execute and read and write
|
||
5A1A000
|
trusted library allocation
|
page read and write
|
||
3FD5000
|
trusted library allocation
|
page read and write
|
||
2F93000
|
trusted library allocation
|
page read and write
|
||
4F40000
|
heap
|
page read and write
|
||
318D000
|
trusted library allocation
|
page read and write
|
||
2F3C000
|
trusted library allocation
|
page read and write
|
||
69F4000
|
heap
|
page read and write
|
||
549E000
|
trusted library allocation
|
page read and write
|
||
6C9E000
|
stack
|
page read and write
|
||
31E3000
|
trusted library allocation
|
page read and write
|
||
790000
|
heap
|
page read and write
|
||
7F7000
|
heap
|
page read and write
|
||
AF3000
|
trusted library allocation
|
page execute and read and write
|
||
14FF000
|
stack
|
page read and write
|
||
4D90000
|
trusted library allocation
|
page read and write
|
||
3096000
|
trusted library allocation
|
page read and write
|
||
4094000
|
trusted library allocation
|
page read and write
|
||
6EE06000
|
unkown
|
page readonly
|
||
CC0000
|
trusted library allocation
|
page read and write
|
||
124B000
|
trusted library allocation
|
page execute and read and write
|
||
1240000
|
trusted library allocation
|
page read and write
|
||
413A000
|
trusted library allocation
|
page read and write
|
||
419E000
|
trusted library allocation
|
page read and write
|
||
6D00000
|
trusted library allocation
|
page read and write
|
||
5040000
|
heap
|
page read and write
|
||
2F47000
|
trusted library allocation
|
page read and write
|
||
326C000
|
trusted library allocation
|
page read and write
|
||
27BE000
|
trusted library allocation
|
page read and write
|
||
CAE000
|
stack
|
page read and write
|
||
2F9B000
|
trusted library allocation
|
page read and write
|
||
2851000
|
trusted library allocation
|
page read and write
|
||
4D7C000
|
trusted library allocation
|
page read and write
|
||
315F000
|
trusted library allocation
|
page read and write
|
||
6D70000
|
trusted library allocation
|
page read and write
|
||
54BD000
|
trusted library allocation
|
page read and write
|
||
6C2E000
|
stack
|
page read and write
|
||
54AE000
|
trusted library allocation
|
page read and write
|
||
3EF4000
|
trusted library allocation
|
page read and write
|
||
6D60000
|
trusted library allocation
|
page read and write
|
||
6B70000
|
trusted library allocation
|
page execute and read and write
|
||
12D0000
|
trusted library allocation
|
page read and write
|
||
4D80000
|
trusted library allocation
|
page read and write
|
||
30E0000
|
trusted library allocation
|
page read and write
|
||
4DB0000
|
trusted library allocation
|
page read and write
|
||
28AB000
|
trusted library allocation
|
page read and write
|
||
B0D000
|
trusted library allocation
|
page execute and read and write
|
||
AE0000
|
trusted library allocation
|
page read and write
|
||
12E0000
|
trusted library allocation
|
page read and write
|
||
1204000
|
trusted library allocation
|
page read and write
|
||
1230000
|
heap
|
page read and write
|
||
31DF000
|
trusted library allocation
|
page read and write
|
||
6C50000
|
trusted library allocation
|
page read and write
|
||
DCE000
|
stack
|
page read and write
|
||
4C50000
|
heap
|
page read and write
|
||
3FC4000
|
trusted library allocation
|
page read and write
|
||
3F97000
|
trusted library allocation
|
page read and write
|
||
740000
|
heap
|
page read and write
|
||
2ED0000
|
heap
|
page execute and read and write
|
||
4037000
|
trusted library allocation
|
page read and write
|
||
4208000
|
trusted library allocation
|
page read and write
|
||
6A09000
|
heap
|
page read and write
|
||
B16000
|
trusted library allocation
|
page execute and read and write
|
||
798000
|
heap
|
page read and write
|
||
12E4000
|
trusted library allocation
|
page read and write
|
||
696E000
|
stack
|
page read and write
|
||
1247000
|
trusted library allocation
|
page execute and read and write
|
||
6D87000
|
trusted library allocation
|
page read and write
|
||
41E2000
|
trusted library allocation
|
page read and write
|
||
40EA000
|
trusted library allocation
|
page read and write
|
||
A7F000
|
stack
|
page read and write
|
||
315B000
|
trusted library allocation
|
page read and write
|
||
78E000
|
stack
|
page read and write
|
||
2640000
|
trusted library allocation
|
page read and write
|
||
400000
|
remote allocation
|
page execute and read and write
|
||
6A6E000
|
stack
|
page read and write
|
||
4E00000
|
trusted library section
|
page read and write
|
||
5230000
|
trusted library allocation
|
page execute and read and write
|
||
4D70000
|
trusted library allocation
|
page read and write
|
||
40E6000
|
trusted library allocation
|
page read and write
|
||
963E000
|
stack
|
page read and write
|
||
B27000
|
trusted library allocation
|
page execute and read and write
|
||
1226000
|
trusted library allocation
|
page execute and read and write
|
||
279C000
|
stack
|
page read and write
|
||
31D4000
|
trusted library allocation
|
page read and write
|
||
3851000
|
trusted library allocation
|
page read and write
|
||
2F8B000
|
trusted library allocation
|
page read and write
|
||
4D60000
|
heap
|
page read and write
|
||
6D14000
|
trusted library allocation
|
page read and write
|
||
4E30000
|
heap
|
page execute and read and write
|
||
4106000
|
trusted library allocation
|
page read and write
|
||
38BC000
|
trusted library allocation
|
page read and write
|
||
12CE000
|
stack
|
page read and write
|
||
B60000
|
heap
|
page read and write
|
||
6C80000
|
trusted library allocation
|
page execute and read and write
|
||
5A30000
|
trusted library allocation
|
page execute and read and write
|
||
4E20000
|
trusted library allocation
|
page read and write
|
||
6AAE000
|
stack
|
page read and write
|
||
31D9000
|
trusted library allocation
|
page read and write
|
||
42B8000
|
trusted library allocation
|
page read and write
|
||
1203000
|
trusted library allocation
|
page execute and read and write
|
||
C6F000
|
stack
|
page read and write
|
||
313D000
|
trusted library allocation
|
page read and write
|
||
3F09000
|
trusted library allocation
|
page read and write
|
||
ABE000
|
stack
|
page read and write
|
||
1270000
|
trusted library allocation
|
page execute and read and write
|
||
3EEF000
|
trusted library allocation
|
page read and write
|
||
40A9000
|
trusted library allocation
|
page read and write
|
||
8A0000
|
heap
|
page read and write
|
||
1610000
|
heap
|
page read and write
|
||
418F000
|
trusted library allocation
|
page read and write
|
||
3143000
|
trusted library allocation
|
page read and write
|
||
6D36000
|
trusted library allocation
|
page read and write
|
||
594F000
|
stack
|
page read and write
|
||
427B000
|
trusted library allocation
|
page read and write
|
||
3061000
|
trusted library allocation
|
page read and write
|
||
6D80000
|
trusted library allocation
|
page read and write
|
||
5383000
|
heap
|
page read and write
|
||
72A0000
|
heap
|
page read and write
|
||
269C000
|
stack
|
page read and write
|
||
861000
|
heap
|
page read and write
|
||
10F7000
|
stack
|
page read and write
|
||
411B000
|
trusted library allocation
|
page read and write
|
||
2DC8000
|
trusted library allocation
|
page read and write
|
||
4BCC000
|
stack
|
page read and write
|
||
7D55000
|
trusted library allocation
|
page read and write
|
||
5A2D000
|
trusted library allocation
|
page read and write
|
||
54B6000
|
trusted library allocation
|
page read and write
|
||
2830000
|
trusted library section
|
page readonly
|
||
6D90000
|
trusted library allocation
|
page read and write
|
||
4265000
|
trusted library allocation
|
page read and write
|
||
31C3000
|
trusted library allocation
|
page read and write
|
||
25C6000
|
trusted library allocation
|
page read and write
|
||
977D000
|
stack
|
page read and write
|
||
3F01000
|
trusted library allocation
|
page read and write
|
||
12F0000
|
trusted library allocation
|
page read and write
|
||
DF0000
|
heap
|
page read and write
|
||
6D20000
|
trusted library allocation
|
page execute and read and write
|
||
6C70000
|
trusted library allocation
|
page execute and read and write
|
||
1242000
|
trusted library allocation
|
page read and write
|
||
6EE0D000
|
unkown
|
page read and write
|
||
4198000
|
trusted library allocation
|
page read and write
|
||
6D62000
|
trusted library allocation
|
page read and write
|
||
4CB3000
|
heap
|
page read and write
|
||
7D3000
|
heap
|
page read and write
|
||
2F2F000
|
trusted library allocation
|
page read and write
|
||
98BD000
|
stack
|
page read and write
|
||
1280000
|
heap
|
page read and write
|
||
54B1000
|
trusted library allocation
|
page read and write
|
||
41D7000
|
trusted library allocation
|
page read and write
|
||
1260000
|
trusted library allocation
|
page read and write
|
||
B10000
|
trusted library allocation
|
page read and write
|
||
2F51000
|
trusted library allocation
|
page read and write
|
||
4E11000
|
trusted library allocation
|
page read and write
|
||
1245000
|
trusted library allocation
|
page execute and read and write
|
||
93FE000
|
stack
|
page read and write
|
||
6C60000
|
trusted library allocation
|
page execute and read and write
|
||
2F9F000
|
trusted library allocation
|
page read and write
|
||
3261000
|
trusted library allocation
|
page read and write
|
||
6AEE000
|
stack
|
page read and write
|
||
94FE000
|
stack
|
page read and write
|
||
5380000
|
heap
|
page read and write
|
||
3065000
|
trusted library allocation
|
page read and write
|
||
6678000
|
heap
|
page read and write
|
||
1220000
|
trusted library allocation
|
page read and write
|
||
CD7000
|
heap
|
page read and write
|
||
5300000
|
heap
|
page read and write
|
||
9780000
|
heap
|
page read and write
|
||
282000
|
unkown
|
page readonly
|
||
4CB0000
|
heap
|
page read and write
|
||
1210000
|
trusted library allocation
|
page read and write
|
||
27E0000
|
trusted library allocation
|
page read and write
|
||
6B2E000
|
stack
|
page read and write
|
||
41EF000
|
trusted library allocation
|
page read and write
|
||
D1A000
|
stack
|
page read and write
|
||
2F55000
|
trusted library allocation
|
page read and write
|
||
30F2000
|
trusted library allocation
|
page read and write
|
||
27C1000
|
trusted library allocation
|
page read and write
|
||
3F47000
|
trusted library allocation
|
page read and write
|
||
6EDF1000
|
unkown
|
page execute read
|
||
30A5000
|
trusted library allocation
|
page read and write
|
||
2840000
|
heap
|
page execute and read and write
|
||
31D1000
|
trusted library allocation
|
page read and write
|
||
120D000
|
trusted library allocation
|
page execute and read and write
|
||
549B000
|
trusted library allocation
|
page read and write
|
||
7B7000
|
heap
|
page read and write
|
||
B1A000
|
trusted library allocation
|
page execute and read and write
|
||
CB0000
|
trusted library allocation
|
page read and write
|
||
99BE000
|
stack
|
page read and write
|
||
B12000
|
trusted library allocation
|
page read and write
|
||
6C30000
|
trusted library allocation
|
page read and write
|
||
730000
|
heap
|
page read and write
|
||
25C0000
|
trusted library allocation
|
page read and write
|
||
7FBF000
|
stack
|
page read and write
|
||
3067000
|
trusted library allocation
|
page read and write
|
||
7FB20000
|
trusted library allocation
|
page execute and read and write
|
||
5A20000
|
trusted library allocation
|
page read and write
|
||
4001000
|
trusted library allocation
|
page read and write
|
||
6C90000
|
trusted library allocation
|
page execute and read and write
|
||
1337000
|
heap
|
page read and write
|
||
2620000
|
trusted library allocation
|
page read and write
|
||
5496000
|
trusted library allocation
|
page read and write
|
||
967D000
|
stack
|
page read and write
|
||
6CF0000
|
trusted library allocation
|
page read and write
|
||
1308000
|
heap
|
page read and write
|
||
3270000
|
trusted library allocation
|
page read and write
|
||
3214000
|
trusted library allocation
|
page read and write
|
||
326A000
|
trusted library allocation
|
page read and write
|
||
3138000
|
trusted library allocation
|
page read and write
|
||
3FAD000
|
trusted library allocation
|
page read and write
|
||
3CA000
|
stack
|
page read and write
|
||
4FDE000
|
stack
|
page read and write
|
||
2F87000
|
trusted library allocation
|
page read and write
|
||
41E9000
|
trusted library allocation
|
page read and write
|
||
CD0000
|
heap
|
page read and write
|
||
B22000
|
trusted library allocation
|
page read and write
|
||
9AFE000
|
stack
|
page read and write
|
||
4166000
|
trusted library allocation
|
page read and write
|
||
4021000
|
trusted library allocation
|
page read and write
|
||
3EE1000
|
trusted library allocation
|
page read and write
|
||
4DD0000
|
trusted library allocation
|
page execute and read and write
|
||
4195000
|
trusted library allocation
|
page read and write
|
||
27AB000
|
trusted library allocation
|
page read and write
|
||
5490000
|
trusted library allocation
|
page read and write
|
||
2E9C000
|
stack
|
page read and write
|
||
30D0000
|
trusted library allocation
|
page read and write
|
||
4DF0000
|
trusted library allocation
|
page execute and read and write
|
||
1222000
|
trusted library allocation
|
page read and write
|
||
27A0000
|
trusted library allocation
|
page read and write
|
||
99FD000
|
stack
|
page read and write
|
||
309A000
|
trusted library allocation
|
page read and write
|
||
66E6000
|
heap
|
page read and write
|
||
53D0000
|
trusted library allocation
|
page read and write
|
||
41F2000
|
trusted library allocation
|
page read and write
|
||
AFD000
|
trusted library allocation
|
page execute and read and write
|
||
68AE000
|
stack
|
page read and write
|
||
338000
|
unkown
|
page readonly
|
||
5560000
|
trusted library allocation
|
page read and write
|
||
6EDF0000
|
unkown
|
page readonly
|
||
260E000
|
stack
|
page read and write
|
||
31DD000
|
trusted library allocation
|
page read and write
|
||
1334000
|
heap
|
page read and write
|
||
692E000
|
stack
|
page read and write
|
||
4F3E000
|
stack
|
page read and write
|
||
428D000
|
trusted library allocation
|
page read and write
|
||
13EC000
|
heap
|
page read and write
|
||
3298000
|
trusted library allocation
|
page read and write
|
||
3092000
|
trusted library allocation
|
page read and write
|
||
3A2E000
|
trusted library allocation
|
page read and write
|
||
6DE0000
|
heap
|
page read and write
|
||
13AF000
|
heap
|
page read and write
|
||
AF4000
|
trusted library allocation
|
page read and write
|
||
DD0000
|
heap
|
page read and write
|
||
5510000
|
heap
|
page execute and read and write
|
||
122A000
|
trusted library allocation
|
page execute and read and write
|
||
656E000
|
stack
|
page read and write
|
||
4D78000
|
trusted library allocation
|
page read and write
|
||
25BE000
|
stack
|
page read and write
|
||
3098000
|
trusted library allocation
|
page read and write
|
||
4C80000
|
trusted library allocation
|
page execute and read and write
|
||
2F8F000
|
trusted library allocation
|
page read and write
|
||
B50000
|
trusted library allocation
|
page execute and read and write
|
||
7D1000
|
heap
|
page read and write
|
||
4C90000
|
heap
|
page read and write
|
||
550D000
|
stack
|
page read and write
|
||
306F000
|
trusted library allocation
|
page read and write
|
||
69E2000
|
heap
|
page read and write
|
||
4193000
|
trusted library allocation
|
page read and write
|
||
6670000
|
heap
|
page read and write
|
||
314D000
|
trusted library allocation
|
page read and write
|
||
6EE0F000
|
unkown
|
page readonly
|
||
42BB000
|
trusted library allocation
|
page read and write
|
||
6DA0000
|
trusted library allocation
|
page read and write
|
||
93BE000
|
stack
|
page read and write
|
||
280000
|
unkown
|
page readonly
|
||
67AE000
|
stack
|
page read and write
|
||
3180000
|
trusted library allocation
|
page read and write
|
||
1200000
|
trusted library allocation
|
page read and write
|
||
132A000
|
heap
|
page read and write
|
||
6D65000
|
trusted library allocation
|
page read and write
|
||
3267000
|
trusted library allocation
|
page read and write
|
||
2FC7000
|
trusted library allocation
|
page read and write
|
||
27C6000
|
trusted library allocation
|
page read and write
|
||
15FE000
|
stack
|
page read and write
|
||
4C95000
|
heap
|
page read and write
|
||
953E000
|
stack
|
page read and write
|
||
804000
|
heap
|
page read and write
|
||
52EE000
|
stack
|
page read and write
|
||
7FB000
|
heap
|
page read and write
|
||
3069000
|
trusted library allocation
|
page read and write
|
||
4F50000
|
heap
|
page read and write
|
||
54C2000
|
trusted library allocation
|
page read and write
|
||
D80000
|
heap
|
page read and write
|
||
2FC5000
|
trusted library allocation
|
page read and write
|
||
257E000
|
stack
|
page read and write
|
||
11F0000
|
trusted library allocation
|
page read and write
|
||
54AA000
|
trusted library allocation
|
page read and write
|
||
5A16000
|
trusted library allocation
|
page read and write
|
||
3156000
|
trusted library allocation
|
page read and write
|
||
2F97000
|
trusted library allocation
|
page read and write
|
||
30A0000
|
trusted library allocation
|
page read and write
|
||
2650000
|
heap
|
page read and write
|
||
6CA0000
|
trusted library section
|
page read and write
|
||
131E000
|
heap
|
page read and write
|
||
52F0000
|
trusted library section
|
page read and write
|
||
B2B000
|
trusted library allocation
|
page execute and read and write
|
||
31D7000
|
trusted library allocation
|
page read and write
|
||
41DC000
|
trusted library allocation
|
page read and write
|
||
1600000
|
trusted library allocation
|
page read and write
|
||
3EFB000
|
trusted library allocation
|
page read and write
|
||
B40000
|
trusted library allocation
|
page read and write
|
||
68ED000
|
stack
|
page read and write
|
||
2F5A000
|
trusted library allocation
|
page read and write
|
||
418A000
|
trusted library allocation
|
page read and write
|
There are 333 hidden memdumps, click here to show them.