Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
diatomaceous.dat.dll
|
PE32 executable (DLL) (console) Intel 80386, for MS Windows
|
initial sample
|
||
C:\Users\user\Desktop\diatomaceous.dat.dll
|
PE32 executable (DLL) (console) Intel 80386, for MS Windows
|
dropped
|
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Windows\System32\loaddll32.exe
|
loaddll32.exe "C:\Users\user\Desktop\diatomaceous.dat.dll"
|
||
C:\Windows\SysWOW64\cmd.exe
|
cmd.exe /C rundll32.exe "C:\Users\user\Desktop\diatomaceous.dat.dll",#1
|
||
C:\Windows\SysWOW64\regsvr32.exe
|
regsvr32.exe /s C:\Users\user\Desktop\diatomaceous.dat.dll
|
||
C:\Windows\SysWOW64\rundll32.exe
|
rundll32.exe "C:\Users\user\Desktop\diatomaceous.dat.dll",#1
|
||
C:\Windows\SysWOW64\rundll32.exe
|
rundll32.exe C:\Users\user\Desktop\diatomaceous.dat.dll,DllRegisterServer
|
||
C:\Windows\SysWOW64\rundll32.exe
|
rundll32.exe C:\Users\user\Desktop\diatomaceous.dat.dll,DllUnregisterServer
|
||
C:\Windows\SysWOW64\wermgr.exe
|
C:\Windows\SysWOW64\wermgr.exe
|
||
C:\Windows\SysWOW64\wermgr.exe
|
C:\Windows\SysWOW64\wermgr.exe
|
||
C:\Windows\SysWOW64\wermgr.exe
|
C:\Windows\SysWOW64\wermgr.exe
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
Registry
Path
|
Value
|
Malicious
|
|
---|---|---|---|
HKEY_CURRENT_USER\Software\Microsoft\Eaiaomldskz
|
b501c7c4
|
||
HKEY_CURRENT_USER\Software\Microsoft\Eaiaomldskz
|
809e178a
|
||
HKEY_CURRENT_USER\Software\Microsoft\Eaiaomldskz
|
82df37f6
|
||
HKEY_CURRENT_USER\Software\Microsoft\Eaiaomldskz
|
3a635093
|
||
HKEY_CURRENT_USER\Software\Microsoft\Eaiaomldskz
|
476b1f19
|
||
HKEY_CURRENT_USER\Software\Microsoft\Eaiaomldskz
|
ffd7787c
|
||
HKEY_CURRENT_USER\Software\Microsoft\Eaiaomldskz
|
382270ef
|
||
HKEY_CURRENT_USER\Software\Microsoft\Eaiaomldskz
|
ca48a832
|
||
HKEY_CURRENT_USER\Software\Microsoft\Eaiaomldskz
|
b501c7c4
|
||
HKEY_CURRENT_USER\Software\Microsoft\Eaiaomldskz
|
b501c7c4
|
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
2520000
|
system
|
page execute and read and write
|
||
3000000
|
trusted library allocation
|
page read and write
|
||
4960000
|
trusted library allocation
|
page read and write
|
||
2BC0000
|
trusted library allocation
|
page execute and read and write
|
||
2B70000
|
trusted library allocation
|
page read and write
|
||
2520000
|
system
|
page execute and read and write
|
||
2BC0000
|
system
|
page execute and read and write
|
||
4AD0000
|
trusted library allocation
|
page execute and read and write
|
||
4AF0000
|
trusted library allocation
|
page execute and read and write
|
||
2580000
|
system
|
page execute and read and write
|
||
2580000
|
system
|
page execute and read and write
|
||
4C41000
|
heap
|
page read and write
|
||
6DAA6000
|
unkown
|
page readonly
|
||
4A35000
|
trusted library allocation
|
page read and write
|
||
4C16000
|
heap
|
page read and write
|
||
4460000
|
trusted library allocation
|
page read and write
|
||
6CB000
|
heap
|
page read and write
|
||
4A9F000
|
stack
|
page read and write
|
||
2DF0000
|
trusted library allocation
|
page read and write
|
||
2B90000
|
unkown
|
page readonly
|
||
2500000
|
unkown
|
page readonly
|
||
4C25000
|
heap
|
page read and write
|
||
2B6F000
|
stack
|
page read and write
|
||
26AE66C0000
|
heap
|
page readonly
|
||
43DF000
|
heap
|
page read and write
|
||
4A2E000
|
trusted library allocation
|
page read and write
|
||
4C25000
|
heap
|
page read and write
|
||
B1F000
|
stack
|
page read and write
|
||
6DA51000
|
unkown
|
page execute read
|
||
25B0000
|
remote allocation
|
page read and write
|
||
4BA0000
|
heap
|
page read and write
|
||
ABC000
|
stack
|
page read and write
|
||
2BA0000
|
unkown
|
page readonly
|
||
2550000
|
unkown
|
page readonly
|
||
4860000
|
heap
|
page read and write
|
||
2500000
|
unkown
|
page readonly
|
||
4EB0000
|
trusted library allocation
|
page read and write
|
||
B60000
|
heap
|
page read and write
|
||
A84000
|
heap
|
page read and write
|
||
4A20000
|
trusted library allocation
|
page read and write
|
||
4F31000
|
heap
|
page read and write
|
||
24AC000
|
stack
|
page read and write
|
||
26AE6730000
|
trusted library allocation
|
page read and write
|
||
4C1F000
|
heap
|
page read and write
|
||
2BA0000
|
unkown
|
page readonly
|
||
4CA0000
|
heap
|
page read and write
|
||
4A1F000
|
trusted library allocation
|
page read and write
|
||
5F7C000
|
trusted library allocation
|
page read and write
|
||
4A20000
|
trusted library allocation
|
page read and write
|
||
5F7C000
|
trusted library allocation
|
page read and write
|
||
2570000
|
unkown
|
page read and write
|
||
597A000
|
trusted library allocation
|
page read and write
|
||
4BF1000
|
heap
|
page read and write
|
||
4C0F000
|
heap
|
page read and write
|
||
4A31000
|
trusted library allocation
|
page read and write
|
||
560000
|
trusted library allocation
|
page read and write
|
||
4A1F000
|
trusted library allocation
|
page read and write
|
||
24F0000
|
unkown
|
page readonly
|
||
690000
|
heap
|
page read and write
|
||
4F31000
|
heap
|
page read and write
|
||
26AE571C000
|
heap
|
page read and write
|
||
4EB0000
|
trusted library allocation
|
page read and write
|
||
6DAA4000
|
unkown
|
page read and write
|
||
24EC000
|
stack
|
page read and write
|
||
D1D2D7B000
|
stack
|
page read and write
|
||
4A31000
|
trusted library allocation
|
page read and write
|
||
6569000
|
trusted library allocation
|
page read and write
|
||
24A0000
|
heap
|
page read and write
|
||
5F7C000
|
trusted library allocation
|
page read and write
|
||
4A35000
|
trusted library allocation
|
page read and write
|
||
47C0000
|
heap
|
page read and write
|
||
25B0000
|
remote allocation
|
page read and write
|
||
2BF0000
|
remote allocation
|
page read and write
|
||
2500000
|
unkown
|
page readonly
|
||
2560000
|
unkown
|
page readonly
|
||
495E000
|
stack
|
page read and write
|
||
4C0F000
|
heap
|
page read and write
|
||
4C0F000
|
heap
|
page read and write
|
||
2560000
|
unkown
|
page readonly
|
||
AFB000
|
stack
|
page read and write
|
||
D1D3179000
|
stack
|
page read and write
|
||
CD4000
|
heap
|
page read and write
|
||
25CE000
|
unkown
|
page read and write
|
||
483F000
|
heap
|
page read and write
|
||
49C3000
|
trusted library allocation
|
page read and write
|
||
6A62000
|
trusted library allocation
|
page read and write
|
||
4401000
|
trusted library allocation
|
page read and write
|
||
2510000
|
unkown
|
page read and write
|
||
26AE6490000
|
trusted library allocation
|
page read and write
|
||
26AE56D0000
|
heap
|
page read and write
|
||
4400000
|
trusted library allocation
|
page read and write
|
||
2560000
|
unkown
|
page readonly
|
||
2BA0000
|
unkown
|
page readonly
|
||
190000
|
heap
|
page read and write
|
||
D64000
|
heap
|
page read and write
|
||
6A67000
|
trusted library allocation
|
page read and write
|
||
CD0000
|
heap
|
page read and write
|
||
31C4000
|
heap
|
page read and write
|
||
4A41000
|
trusted library allocation
|
page read and write
|
||
4A35000
|
trusted library allocation
|
page read and write
|
||
2BF0000
|
trusted library allocation
|
page read and write
|
||
4C0F000
|
heap
|
page read and write
|
||
4A41000
|
trusted library allocation
|
page read and write
|
||
4C0F000
|
heap
|
page read and write
|
||
25F0000
|
trusted library allocation
|
page read and write
|
||
4A1F000
|
trusted library allocation
|
page read and write
|
||
4C0F000
|
heap
|
page read and write
|
||
26AE571C000
|
heap
|
page read and write
|
||
C0A000
|
heap
|
page read and write
|
||
26AE5999000
|
heap
|
page read and write
|
||
5F4C000
|
trusted library allocation
|
page read and write
|
||
2AE0000
|
heap
|
page read and write
|
||
4A25000
|
trusted library allocation
|
page read and write
|
||
2A6E000
|
unkown
|
page read and write
|
||
5F7C000
|
trusted library allocation
|
page read and write
|
||
2BB0000
|
heap
|
page read and write
|
||
A84000
|
heap
|
page read and write
|
||
4A25000
|
trusted library allocation
|
page read and write
|
||
4C0F000
|
heap
|
page read and write
|
||
3055000
|
heap
|
page read and write
|
||
4C25000
|
heap
|
page read and write
|
||
D1D30F9000
|
stack
|
page read and write
|
||
4A20000
|
trusted library allocation
|
page read and write
|
||
6F72000
|
trusted library allocation
|
page read and write
|
||
2BB0000
|
unkown
|
page read and write
|
||
A80000
|
heap
|
page read and write
|
||
4C0F000
|
heap
|
page read and write
|
||
2510000
|
unkown
|
page read and write
|
||
4C25000
|
heap
|
page read and write
|
||
24F0000
|
unkown
|
page readonly
|
||
4C25000
|
heap
|
page read and write
|
||
4A35000
|
trusted library allocation
|
page read and write
|
||
2550000
|
unkown
|
page readonly
|
||
4C16000
|
heap
|
page read and write
|
||
2500000
|
unkown
|
page readonly
|
||
4A41000
|
trusted library allocation
|
page read and write
|
||
2BB0000
|
unkown
|
page read and write
|
||
4960000
|
trusted library allocation
|
page read and write
|
||
4D40000
|
trusted library allocation
|
page read and write
|
||
2AD0000
|
trusted library allocation
|
page read and write
|
||
4D1F000
|
heap
|
page read and write
|
||
2BA0000
|
unkown
|
page readonly
|
||
C3B000
|
stack
|
page read and write
|
||
4A1F000
|
trusted library allocation
|
page read and write
|
||
4A41000
|
trusted library allocation
|
page read and write
|
||
4C0F000
|
heap
|
page read and write
|
||
24F0000
|
unkown
|
page readonly
|
||
2570000
|
unkown
|
page read and write
|
||
5477000
|
trusted library allocation
|
page read and write
|
||
CD4000
|
heap
|
page read and write
|
||
D6F000
|
stack
|
page read and write
|
||
D70000
|
heap
|
page read and write
|
||
4A1F000
|
trusted library allocation
|
page read and write
|
||
CD4000
|
heap
|
page read and write
|
||
26AE5719000
|
heap
|
page read and write
|
||
656A000
|
trusted library allocation
|
page read and write
|
||
5531000
|
trusted library allocation
|
page read and write
|
||
2570000
|
unkown
|
page read and write
|
||
2828000
|
heap
|
page read and write
|
||
A50000
|
heap
|
page read and write
|
||
A84000
|
heap
|
page read and write
|
||
2EF7000
|
heap
|
page read and write
|
||
4EB0000
|
trusted library allocation
|
page read and write
|
||
CD4000
|
heap
|
page read and write
|
||
2570000
|
unkown
|
page read and write
|
||
4A28000
|
trusted library allocation
|
page read and write
|
||
5F7C000
|
trusted library allocation
|
page read and write
|
||
1FC000
|
stack
|
page read and write
|
||
2E00000
|
direct allocation
|
page execute and read and write
|
||
2B50000
|
heap
|
page read and write
|
||
6DA51000
|
unkown
|
page execute read
|
||
26AE56B0000
|
heap
|
page read and write
|
||
2EF7000
|
heap
|
page read and write
|
||
BFB000
|
stack
|
page read and write
|
||
6DA83000
|
unkown
|
page read and write
|
||
2570000
|
unkown
|
page read and write
|
||
4C25000
|
heap
|
page read and write
|
||
B70000
|
trusted library allocation
|
page read and write
|
||
2B90000
|
unkown
|
page readonly
|
||
254C000
|
stack
|
page read and write
|
||
BEE000
|
stack
|
page read and write
|
||
4A41000
|
trusted library allocation
|
page read and write
|
||
BBC000
|
stack
|
page read and write
|
||
4EB0000
|
trusted library allocation
|
page read and write
|
||
D30000
|
trusted library allocation
|
page read and write
|
||
4C0F000
|
heap
|
page read and write
|
||
2BB0000
|
unkown
|
page read and write
|
||
2DEE000
|
stack
|
page read and write
|
||
4BF1000
|
heap
|
page read and write
|
||
D3F000
|
stack
|
page read and write
|
||
2510000
|
unkown
|
page read and write
|
||
2950000
|
heap
|
page read and write
|
||
4BF1000
|
heap
|
page read and write
|
||
26AE5995000
|
heap
|
page read and write
|
||
BFC000
|
stack
|
page read and write
|
||
24F0000
|
unkown
|
page readonly
|
||
4BF1000
|
heap
|
page read and write
|
||
4C0F000
|
heap
|
page read and write
|
||
4FC000
|
stack
|
page read and write
|
||
2B30000
|
trusted library allocation
|
page read and write
|
||
287E000
|
stack
|
page read and write
|
||
B90000
|
heap
|
page read and write
|
||
D64000
|
heap
|
page read and write
|
||
2510000
|
unkown
|
page read and write
|
||
2570000
|
unkown
|
page read and write
|
||
2BA0000
|
unkown
|
page readonly
|
||
4A41000
|
trusted library allocation
|
page read and write
|
||
2EE0000
|
heap
|
page read and write
|
||
4A1F000
|
trusted library allocation
|
page read and write
|
||
2550000
|
remote allocation
|
page read and write
|
||
6DA83000
|
unkown
|
page read and write
|
||
A84000
|
heap
|
page read and write
|
||
4A35000
|
trusted library allocation
|
page read and write
|
||
4C16000
|
heap
|
page read and write
|
||
4F31000
|
heap
|
page read and write
|
||
4C25000
|
heap
|
page read and write
|
||
2B90000
|
unkown
|
page readonly
|
||
2B90000
|
unkown
|
page readonly
|
||
483F000
|
heap
|
page read and write
|
||
94B000
|
stack
|
page read and write
|
||
4A1F000
|
trusted library allocation
|
page read and write
|
||
2BB0000
|
unkown
|
page read and write
|
||
2510000
|
unkown
|
page read and write
|
||
CD4000
|
heap
|
page read and write
|
||
2560000
|
unkown
|
page readonly
|
||
5F34000
|
trusted library allocation
|
page read and write
|
||
2550000
|
remote allocation
|
page read and write
|
||
5FE000
|
stack
|
page read and write
|
||
A84000
|
heap
|
page read and write
|
||
49CF000
|
trusted library allocation
|
page read and write
|
||
4C0F000
|
heap
|
page read and write
|
||
4BF1000
|
heap
|
page read and write
|
||
D2E000
|
stack
|
page read and write
|
||
4BF1000
|
heap
|
page read and write
|
||
26AE5960000
|
trusted library allocation
|
page read and write
|
||
4A22000
|
trusted library allocation
|
page read and write
|
||
4EB0000
|
trusted library allocation
|
page read and write
|
||
4C25000
|
heap
|
page read and write
|
||
4A31000
|
trusted library allocation
|
page read and write
|
||
2AD1000
|
trusted library allocation
|
page read and write
|
||
6DA74000
|
unkown
|
page readonly
|
||
26AE5739000
|
heap
|
page read and write
|
||
4C0F000
|
heap
|
page read and write
|
||
4A1F000
|
trusted library allocation
|
page read and write
|
||
319A000
|
heap
|
page read and write
|
||
4A22000
|
trusted library allocation
|
page read and write
|
||
6568000
|
trusted library allocation
|
page read and write
|
||
90C000
|
stack
|
page read and write
|
||
6DA74000
|
unkown
|
page readonly
|
||
2440000
|
heap
|
page read and write
|
||
7268000
|
trusted library allocation
|
page read and write
|
||
4A20000
|
trusted library allocation
|
page read and write
|
||
4A20000
|
trusted library allocation
|
page read and write
|
||
4960000
|
heap
|
page read and write
|
||
25B0000
|
remote allocation
|
page read and write
|
||
4A22000
|
trusted library allocation
|
page read and write
|
||
2C40000
|
heap
|
page read and write
|
||
26AE5990000
|
heap
|
page read and write
|
||
A90000
|
trusted library allocation
|
page read and write
|
||
26AE5980000
|
trusted library allocation
|
page read and write
|
||
4A35000
|
trusted library allocation
|
page read and write
|
||
433F000
|
stack
|
page read and write
|
||
4BF1000
|
heap
|
page read and write
|
||
2BB0000
|
unkown
|
page read and write
|
||
26AE5737000
|
heap
|
page read and write
|
||
28AD000
|
heap
|
page read and write
|
||
2BB0000
|
unkown
|
page read and write
|
||
4A41000
|
trusted library allocation
|
page read and write
|
||
4C40000
|
heap
|
page read and write
|
||
26AE66D0000
|
trusted library allocation
|
page read and write
|
||
3190000
|
heap
|
page read and write
|
||
4C41000
|
heap
|
page read and write
|
||
4A00000
|
heap
|
page read and write
|
||
2DE0000
|
heap
|
page read and write
|
||
5BE000
|
stack
|
page read and write
|
||
6F73000
|
trusted library allocation
|
page read and write
|
||
4AA0000
|
direct allocation
|
page execute and read and write
|
||
4A20000
|
trusted library allocation
|
page read and write
|
||
4C16000
|
heap
|
page read and write
|
||
5F7C000
|
trusted library allocation
|
page read and write
|
||
6F7E000
|
trusted library allocation
|
page read and write
|
||
D50000
|
heap
|
page read and write
|
||
3200000
|
heap
|
page read and write
|
||
4A41000
|
trusted library allocation
|
page read and write
|
||
4A41000
|
trusted library allocation
|
page read and write
|
||
4460000
|
trusted library allocation
|
page read and write
|
||
4C25000
|
heap
|
page read and write
|
||
6DA50000
|
unkown
|
page readonly
|
||
6F71000
|
trusted library allocation
|
page read and write
|
||
6DA83000
|
unkown
|
page read and write
|
||
4A1F000
|
trusted library allocation
|
page read and write
|
||
5F7C000
|
trusted library allocation
|
page read and write
|
||
2ACF000
|
stack
|
page read and write
|
||
6DA50000
|
unkown
|
page readonly
|
||
4D1F000
|
heap
|
page read and write
|
||
4A1F000
|
trusted library allocation
|
page read and write
|
||
2F0D000
|
heap
|
page read and write
|
||
6DA50000
|
unkown
|
page readonly
|
||
C00000
|
heap
|
page read and write
|
||
4C0F000
|
heap
|
page read and write
|
||
2550000
|
unkown
|
page readonly
|
||
4C1F000
|
heap
|
page read and write
|
||
4BA1000
|
heap
|
page read and write
|
||
4D40000
|
trusted library allocation
|
page read and write
|
||
2EEA000
|
heap
|
page read and write
|
||
A84000
|
heap
|
page read and write
|
||
4A35000
|
trusted library allocation
|
page read and write
|
||
2560000
|
unkown
|
page readonly
|
||
250C000
|
stack
|
page read and write
|
||
4A31000
|
trusted library allocation
|
page read and write
|
||
4A1F000
|
trusted library allocation
|
page read and write
|
||
26AE5900000
|
trusted library allocation
|
page read and write
|
||
6DA83000
|
unkown
|
page read and write
|
||
26AE571A000
|
heap
|
page read and write
|
||
D1D31FF000
|
stack
|
page read and write
|
||
31D1000
|
heap
|
page read and write
|
||
D64000
|
heap
|
page read and write
|
||
D64000
|
heap
|
page read and write
|
||
4510000
|
heap
|
page read and write
|
||
CD4000
|
heap
|
page read and write
|
||
2B2E000
|
stack
|
page read and write
|
||
A84000
|
heap
|
page read and write
|
||
4C0F000
|
heap
|
page read and write
|
||
CA0000
|
trusted library allocation
|
page read and write
|
||
4861000
|
heap
|
page read and write
|
||
2898000
|
heap
|
page read and write
|
||
25D0000
|
trusted library allocation
|
page read and write
|
||
6DAA6000
|
unkown
|
page readonly
|
||
6DA51000
|
unkown
|
page execute read
|
||
4A20000
|
trusted library allocation
|
page read and write
|
||
A1F000
|
stack
|
page read and write
|
||
26AE5630000
|
trusted library allocation
|
page read and write
|
||
4C0F000
|
heap
|
page read and write
|
||
4C0F000
|
heap
|
page read and write
|
||
4A2A000
|
trusted library allocation
|
page read and write
|
||
2AAF000
|
unkown
|
page read and write
|
||
31D0000
|
heap
|
page read and write
|
||
4BA1000
|
heap
|
page read and write
|
||
6567000
|
trusted library allocation
|
page read and write
|
||
6DA74000
|
unkown
|
page readonly
|
||
2550000
|
unkown
|
page readonly
|
||
283E000
|
unkown
|
page read and write
|
||
2EF7000
|
heap
|
page read and write
|
||
283D000
|
heap
|
page read and write
|
||
4C25000
|
heap
|
page read and write
|
||
302A000
|
heap
|
page read and write
|
||
26AE5715000
|
heap
|
page read and write
|
||
4A62000
|
trusted library allocation
|
page read and write
|
||
5030000
|
trusted library allocation
|
page read and write
|
||
2550000
|
remote allocation
|
page read and write
|
||
6DA51000
|
unkown
|
page execute read
|
||
2550000
|
unkown
|
page readonly
|
||
458F000
|
heap
|
page read and write
|
||
6DA84000
|
unkown
|
page write copy
|
||
B50000
|
heap
|
page read and write
|
||
D64000
|
heap
|
page read and write
|
||
4A25000
|
trusted library allocation
|
page read and write
|
||
43DF000
|
heap
|
page read and write
|
||
4A1F000
|
trusted library allocation
|
page read and write
|
||
7279000
|
trusted library allocation
|
page read and write
|
||
26AE58F0000
|
trusted library allocation
|
page read and write
|
||
2820000
|
heap
|
page read and write
|
||
D64000
|
heap
|
page read and write
|
||
4A25000
|
trusted library allocation
|
page read and write
|
||
26AE66E0000
|
trusted library allocation
|
page read and write
|
||
620000
|
heap
|
page read and write
|
||
2510000
|
unkown
|
page read and write
|
||
4A2A000
|
trusted library allocation
|
page read and write
|
||
CD4000
|
heap
|
page read and write
|
||
4861000
|
heap
|
page read and write
|
||
4A25000
|
trusted library allocation
|
page read and write
|
||
D60000
|
heap
|
page read and write
|
||
4990000
|
heap
|
page read and write
|
||
4A25000
|
trusted library allocation
|
page read and write
|
||
4A31000
|
trusted library allocation
|
page read and write
|
||
6DAA6000
|
unkown
|
page readonly
|
||
2BF0000
|
remote allocation
|
page read and write
|
||
4A22000
|
trusted library allocation
|
page read and write
|
||
4990000
|
direct allocation
|
page execute and read and write
|
||
26AE571C000
|
heap
|
page read and write
|
||
31C4000
|
heap
|
page read and write
|
||
D64000
|
heap
|
page read and write
|
||
48DF000
|
stack
|
page read and write
|
||
5F7C000
|
trusted library allocation
|
page read and write
|
||
A84000
|
heap
|
page read and write
|
||
4C0F000
|
heap
|
page read and write
|
||
5988000
|
trusted library allocation
|
page read and write
|
||
4C0F000
|
heap
|
page read and write
|
||
5F7C000
|
trusted library allocation
|
page read and write
|
||
49C1000
|
trusted library allocation
|
page read and write
|
||
4A31000
|
trusted library allocation
|
page read and write
|
||
4C0F000
|
heap
|
page read and write
|
||
4EB0000
|
trusted library allocation
|
page read and write
|
||
24F0000
|
unkown
|
page readonly
|
||
D64000
|
heap
|
page read and write
|
||
2E90000
|
trusted library allocation
|
page read and write
|
||
6DA74000
|
unkown
|
page readonly
|
||
4A20000
|
trusted library allocation
|
page read and write
|
||
6A68000
|
trusted library allocation
|
page read and write
|
||
4A22000
|
trusted library allocation
|
page read and write
|
||
2B2E000
|
stack
|
page read and write
|
||
3020000
|
heap
|
page read and write
|
||
8A0000
|
heap
|
page read and write
|
||
2550000
|
unkown
|
page readonly
|
||
458F000
|
heap
|
page read and write
|
||
31DB000
|
heap
|
page read and write
|
||
24F0000
|
unkown
|
page readonly
|
||
2B30000
|
trusted library allocation
|
page read and write
|
||
6DA50000
|
unkown
|
page readonly
|
||
2B90000
|
unkown
|
page readonly
|
||
4A2E000
|
trusted library allocation
|
page read and write
|
||
6DAA6000
|
unkown
|
page readonly
|
||
4A28000
|
trusted library allocation
|
page read and write
|
||
26AE56D8000
|
heap
|
page read and write
|
||
2B90000
|
unkown
|
page readonly
|
||
2500000
|
unkown
|
page readonly
|
||
4360000
|
heap
|
page read and write
|
||
4A35000
|
trusted library allocation
|
page read and write
|
||
4A35000
|
trusted library allocation
|
page read and write
|
||
6C0000
|
heap
|
page read and write
|
||
4A35000
|
trusted library allocation
|
page read and write
|
||
4A41000
|
trusted library allocation
|
page read and write
|
||
26AE5733000
|
heap
|
page read and write
|
||
2BA0000
|
unkown
|
page readonly
|
||
29B0000
|
heap
|
page read and write
|
||
26AE59A0000
|
trusted library allocation
|
page read and write
|
||
2890000
|
heap
|
page read and write
|
||
6A6C000
|
trusted library allocation
|
page read and write
|
||
26AE5690000
|
heap
|
page read and write
|
||
4BA0000
|
heap
|
page read and write
|
||
CD4000
|
heap
|
page read and write
|
||
4BF1000
|
heap
|
page read and write
|
||
D1D327B000
|
stack
|
page read and write
|
||
4BF1000
|
heap
|
page read and write
|
||
4EB0000
|
trusted library allocation
|
page read and write
|
||
4A20000
|
trusted library allocation
|
page read and write
|
||
26AE5714000
|
heap
|
page read and write
|
||
2560000
|
unkown
|
page readonly
|
||
2500000
|
unkown
|
page readonly
|
||
26AE5620000
|
heap
|
page read and write
|
There are 430 hidden memdumps, click here to show them.