Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
file.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
initial sample
|
||
C:\Users\user\AppData\Local\Temp\0d8f5eb8a7\explorti.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\0d8f5eb8a7\explorti.exe:Zone.Identifier
|
ASCII text, with CRLF line terminators
|
modified
|
||
C:\Windows\Tasks\explorti.job
|
data
|
dropped
|
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\file.exe
|
"C:\Users\user\Desktop\file.exe"
|
||
C:\Users\user\AppData\Local\Temp\0d8f5eb8a7\explorti.exe
|
"C:\Users\user\AppData\Local\Temp\0d8f5eb8a7\explorti.exe"
|
||
C:\Users\user\AppData\Local\Temp\0d8f5eb8a7\explorti.exe
|
C:\Users\user\AppData\Local\Temp\0d8f5eb8a7\explorti.exe
|
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
4980000
|
direct allocation
|
page read and write
|
||
4B1000
|
unkown
|
page execute and read and write
|
||
4CA0000
|
direct allocation
|
page read and write
|
||
4B1000
|
unkown
|
page execute and read and write
|
||
191000
|
unkown
|
page execute and read and write
|
||
51F0000
|
direct allocation
|
page read and write
|
||
44F1000
|
heap
|
page read and write
|
||
C7D000
|
heap
|
page read and write
|
||
4CA0000
|
heap
|
page read and write
|
||
C53000
|
heap
|
page read and write
|
||
3AEE000
|
stack
|
page read and write
|
||
44F1000
|
heap
|
page read and write
|
||
44F1000
|
heap
|
page read and write
|
||
D70000
|
heap
|
page read and write
|
||
281F000
|
stack
|
page read and write
|
||
4811000
|
heap
|
page read and write
|
||
4501000
|
heap
|
page read and write
|
||
44F1000
|
heap
|
page read and write
|
||
14D0000
|
direct allocation
|
page read and write
|
||
4C6E000
|
stack
|
page read and write
|
||
3FDF000
|
stack
|
page read and write
|
||
4811000
|
heap
|
page read and write
|
||
48F000
|
unkown
|
page execute and read and write
|
||
4D70000
|
heap
|
page read and write
|
||
51B000
|
unkown
|
page execute and read and write
|
||
44F1000
|
heap
|
page read and write
|
||
3E0F000
|
stack
|
page read and write
|
||
C69000
|
heap
|
page read and write
|
||
2B70000
|
direct allocation
|
page read and write
|
||
4B0000
|
unkown
|
page read and write
|
||
F10000
|
heap
|
page read and write
|
||
44F1000
|
heap
|
page read and write
|
||
4ACF000
|
stack
|
page read and write
|
||
5380000
|
direct allocation
|
page execute and read and write
|
||
D9E000
|
stack
|
page read and write
|
||
4980000
|
direct allocation
|
page read and write
|
||
4B1000
|
unkown
|
page execute and write copy
|
||
9FC000
|
stack
|
page read and write
|
||
44F1000
|
heap
|
page read and write
|
||
68C0000
|
heap
|
page read and write
|
||
44F1000
|
heap
|
page read and write
|
||
285B000
|
stack
|
page read and write
|
||
4CA0000
|
direct allocation
|
page read and write
|
||
C40000
|
heap
|
page read and write
|
||
2B70000
|
direct allocation
|
page read and write
|
||
166D000
|
heap
|
page read and write
|
||
4811000
|
heap
|
page read and write
|
||
4B00000
|
direct allocation
|
page execute and read and write
|
||
44F1000
|
heap
|
page read and write
|
||
4CA0000
|
direct allocation
|
page read and write
|
||
30EF000
|
stack
|
page read and write
|
||
44F1000
|
heap
|
page read and write
|
||
44F1000
|
heap
|
page read and write
|
||
5F1E000
|
stack
|
page read and write
|
||
5390000
|
direct allocation
|
page execute and read and write
|
||
26D7000
|
heap
|
page read and write
|
||
434E000
|
stack
|
page read and write
|
||
5380000
|
direct allocation
|
page execute and read and write
|
||
1410000
|
heap
|
page read and write
|
||
14F4000
|
heap
|
page read and write
|
||
44F1000
|
heap
|
page read and write
|
||
44F1000
|
heap
|
page read and write
|
||
53A0000
|
direct allocation
|
page execute and read and write
|
||
4E50000
|
direct allocation
|
page execute and read and write
|
||
420E000
|
stack
|
page read and write
|
||
14E7000
|
heap
|
page read and write
|
||
48AE000
|
stack
|
page read and write
|
||
36CE000
|
stack
|
page read and write
|
||
44F1000
|
heap
|
page read and write
|
||
4E10000
|
direct allocation
|
page execute and read and write
|
||
2A2E000
|
stack
|
page read and write
|
||
44F1000
|
heap
|
page read and write
|
||
4811000
|
heap
|
page read and write
|
||
258E000
|
stack
|
page read and write
|
||
A40000
|
heap
|
page read and write
|
||
C1E000
|
heap
|
page read and write
|
||
44E0000
|
direct allocation
|
page read and write
|
||
44F1000
|
heap
|
page read and write
|
||
2E5F000
|
stack
|
page read and write
|
||
4E30000
|
direct allocation
|
page execute and read and write
|
||
4BA0000
|
direct allocation
|
page execute and read and write
|
||
7C8000
|
unkown
|
page execute and read and write
|
||
44F1000
|
heap
|
page read and write
|
||
44F1000
|
heap
|
page read and write
|
||
448E000
|
stack
|
page read and write
|
||
F1A000
|
heap
|
page read and write
|
||
44F1000
|
heap
|
page read and write
|
||
44F1000
|
heap
|
page read and write
|
||
472F000
|
stack
|
page read and write
|
||
408F000
|
stack
|
page read and write
|
||
C40000
|
heap
|
page read and write
|
||
14D0000
|
direct allocation
|
page read and write
|
||
3A4F000
|
stack
|
page read and write
|
||
44F1000
|
heap
|
page read and write
|
||
35AF000
|
stack
|
page read and write
|
||
C68000
|
heap
|
page read and write
|
||
4D01000
|
direct allocation
|
page read and write
|
||
4B10000
|
direct allocation
|
page execute and read and write
|
||
4EB0000
|
direct allocation
|
page execute and read and write
|
||
824C000
|
stack
|
page read and write
|
||
4B70000
|
direct allocation
|
page execute and read and write
|
||
CFD000
|
stack
|
page read and write
|
||
44F1000
|
heap
|
page read and write
|
||
C5B000
|
heap
|
page read and write
|
||
44F1000
|
heap
|
page read and write
|
||
44F1000
|
heap
|
page read and write
|
||
339E000
|
stack
|
page read and write
|
||
7FDE000
|
stack
|
page read and write
|
||
BAE000
|
heap
|
page read and write
|
||
14F4000
|
heap
|
page read and write
|
||
14BE000
|
stack
|
page read and write
|
||
629F000
|
stack
|
page read and write
|
||
44E0000
|
direct allocation
|
page read and write
|
||
14D0000
|
direct allocation
|
page read and write
|
||
4E30000
|
direct allocation
|
page execute and read and write
|
||
44F1000
|
heap
|
page read and write
|
||
44E0000
|
direct allocation
|
page read and write
|
||
4D71000
|
heap
|
page read and write
|
||
426E000
|
stack
|
page read and write
|
||
44F1000
|
heap
|
page read and write
|
||
5D96000
|
heap
|
page read and write
|
||
601F000
|
stack
|
page read and write
|
||
390F000
|
stack
|
page read and write
|
||
3B1E000
|
stack
|
page read and write
|
||
3EDE000
|
stack
|
page read and write
|
||
146E000
|
stack
|
page read and write
|
||
44F1000
|
heap
|
page read and write
|
||
3E4E000
|
stack
|
page read and write
|
||
4B50000
|
direct allocation
|
page execute and read and write
|
||
44F1000
|
heap
|
page read and write
|
||
44F1000
|
heap
|
page read and write
|
||
44AE000
|
stack
|
page read and write
|
||
3FEE000
|
stack
|
page read and write
|
||
36EF000
|
stack
|
page read and write
|
||
2A9F000
|
stack
|
page read and write
|
||
44F1000
|
heap
|
page read and write
|
||
DC0000
|
heap
|
page read and write
|
||
41CF000
|
stack
|
page read and write
|
||
4B80000
|
direct allocation
|
page execute and read and write
|
||
14F4000
|
heap
|
page read and write
|
||
44E0000
|
direct allocation
|
page read and write
|
||
4CEE000
|
stack
|
page read and write
|
||
7AF000
|
unkown
|
page execute and read and write
|
||
44E0000
|
direct allocation
|
page read and write
|
||
4D71000
|
heap
|
page read and write
|
||
44E0000
|
direct allocation
|
page read and write
|
||
44F1000
|
heap
|
page read and write
|
||
5D90000
|
heap
|
page read and write
|
||
4E30000
|
direct allocation
|
page execute and read and write
|
||
110E000
|
stack
|
page read and write
|
||
44F1000
|
heap
|
page read and write
|
||
44F1000
|
heap
|
page read and write
|
||
4DEF000
|
stack
|
page read and write
|
||
163E000
|
stack
|
page read and write
|
||
335F000
|
stack
|
page read and write
|
||
2FDE000
|
stack
|
page read and write
|
||
430F000
|
stack
|
page read and write
|
||
344E000
|
stack
|
page read and write
|
||
3D6E000
|
stack
|
page read and write
|
||
49A000
|
unkown
|
page execute and read and write
|
||
1650000
|
heap
|
page read and write
|
||
32CF000
|
stack
|
page read and write
|
||
44F1000
|
heap
|
page read and write
|
||
45CE000
|
stack
|
page read and write
|
||
44F1000
|
heap
|
page read and write
|
||
44F1000
|
heap
|
page read and write
|
||
44F1000
|
heap
|
page read and write
|
||
44F1000
|
heap
|
page read and write
|
||
140E000
|
stack
|
page read and write
|
||
44F1000
|
heap
|
page read and write
|
||
429E000
|
stack
|
page read and write
|
||
C00000
|
heap
|
page read and write
|
||
372E000
|
stack
|
page read and write
|
||
C40000
|
heap
|
page read and write
|
||
C19000
|
heap
|
page read and write
|
||
34DE000
|
stack
|
page read and write
|
||
14E0000
|
heap
|
page read and write
|
||
519000
|
unkown
|
page read and write
|
||
4B2E000
|
stack
|
page read and write
|
||
4980000
|
direct allocation
|
page read and write
|
||
C80000
|
heap
|
page read and write
|
||
44F1000
|
heap
|
page read and write
|
||
44F1000
|
heap
|
page read and write
|
||
3A8E000
|
stack
|
page read and write
|
||
470E000
|
stack
|
page read and write
|
||
44F1000
|
heap
|
page read and write
|
||
3C5E000
|
stack
|
page read and write
|
||
5350000
|
direct allocation
|
page execute and read and write
|
||
44F1000
|
heap
|
page read and write
|
||
14D0000
|
direct allocation
|
page read and write
|
||
C68000
|
heap
|
page read and write
|
||
458F000
|
stack
|
page read and write
|
||
14F4000
|
heap
|
page read and write
|
||
44F1000
|
heap
|
page read and write
|
||
2F0F000
|
stack
|
page read and write
|
||
BF3000
|
heap
|
page read and write
|
||
4AEF000
|
stack
|
page read and write
|
||
14F4000
|
heap
|
page read and write
|
||
40EF000
|
stack
|
page read and write
|
||
7AF000
|
unkown
|
page execute and read and write
|
||
3D0E000
|
stack
|
page read and write
|
||
44F1000
|
heap
|
page read and write
|
||
EEE000
|
stack
|
page read and write
|
||
4811000
|
heap
|
page read and write
|
||
A60000
|
heap
|
page read and write
|
||
3F8E000
|
stack
|
page read and write
|
||
C53000
|
heap
|
page read and write
|
||
14D0000
|
direct allocation
|
page read and write
|
||
C40000
|
heap
|
page read and write
|
||
4C2F000
|
stack
|
page read and write
|
||
7C8000
|
unkown
|
page execute and write copy
|
||
C27000
|
heap
|
page read and write
|
||
2B70000
|
direct allocation
|
page read and write
|
||
519000
|
unkown
|
page write copy
|
||
BFE000
|
heap
|
page read and write
|
||
5380000
|
direct allocation
|
page execute and read and write
|
||
14F4000
|
heap
|
page read and write
|
||
2D5E000
|
stack
|
page read and write
|
||
519000
|
unkown
|
page write copy
|
||
44F1000
|
heap
|
page read and write
|
||
354F000
|
stack
|
page read and write
|
||
7BA000
|
unkown
|
page execute and read and write
|
||
BF4000
|
heap
|
page read and write
|
||
3ADF000
|
stack
|
page read and write
|
||
A50000
|
heap
|
page read and write
|
||
3C1F000
|
stack
|
page read and write
|
||
444F000
|
stack
|
page read and write
|
||
44F1000
|
heap
|
page read and write
|
||
4810000
|
heap
|
page read and write
|
||
619E000
|
stack
|
page read and write
|
||
512000
|
unkown
|
page execute and read and write
|
||
533F000
|
stack
|
page read and write
|
||
49CE000
|
stack
|
page read and write
|
||
14D0000
|
direct allocation
|
page read and write
|
||
14D0000
|
direct allocation
|
page read and write
|
||
439F000
|
stack
|
page read and write
|
||
1F9000
|
unkown
|
page read and write
|
||
191000
|
unkown
|
page execute and write copy
|
||
14F4000
|
heap
|
page read and write
|
||
44E0000
|
direct allocation
|
page read and write
|
||
44F1000
|
heap
|
page read and write
|
||
966000
|
unkown
|
page execute and read and write
|
||
436F000
|
stack
|
page read and write
|
||
4930000
|
trusted library allocation
|
page read and write
|
||
44F1000
|
heap
|
page read and write
|
||
49AF000
|
stack
|
page read and write
|
||
4A9000
|
unkown
|
page execute and write copy
|
||
F6C000
|
stack
|
page read and write
|
||
35EE000
|
stack
|
page read and write
|
||
46CF000
|
stack
|
page read and write
|
||
44F1000
|
heap
|
page read and write
|
||
49E1000
|
direct allocation
|
page read and write
|
||
44F1000
|
heap
|
page read and write
|
||
389E000
|
stack
|
page read and write
|
||
35DF000
|
stack
|
page read and write
|
||
4E60000
|
direct allocation
|
page execute and read and write
|
||
44F1000
|
heap
|
page read and write
|
||
44F1000
|
heap
|
page read and write
|
||
349F000
|
stack
|
page read and write
|
||
4B30000
|
direct allocation
|
page execute and read and write
|
||
44F1000
|
heap
|
page read and write
|
||
44F1000
|
heap
|
page read and write
|
||
8285000
|
heap
|
page read and write
|
||
2B70000
|
direct allocation
|
page read and write
|
||
44F1000
|
heap
|
page read and write
|
||
523E000
|
stack
|
page read and write
|
||
26D0000
|
heap
|
page read and write
|
||
4BB0000
|
direct allocation
|
page execute and read and write
|
||
7C9000
|
unkown
|
page execute and write copy
|
||
44E0000
|
direct allocation
|
page read and write
|
||
486F000
|
stack
|
page read and write
|
||
295F000
|
stack
|
page read and write
|
||
783000
|
unkown
|
page execute and read and write
|
||
C69000
|
heap
|
page read and write
|
||
4E30000
|
direct allocation
|
page execute and read and write
|
||
1FB000
|
unkown
|
page execute and read and write
|
||
44F1000
|
heap
|
page read and write
|
||
6A6000
|
unkown
|
page execute and read and write
|
||
4EC0000
|
direct allocation
|
page execute and read and write
|
||
C00000
|
heap
|
page read and write
|
||
B9E000
|
stack
|
page read and write
|
||
44E0000
|
direct allocation
|
page read and write
|
||
4B10000
|
direct allocation
|
page execute and read and write
|
||
4E80000
|
direct allocation
|
page execute and read and write
|
||
4B40000
|
direct allocation
|
page execute and read and write
|
||
44F1000
|
heap
|
page read and write
|
||
346F000
|
stack
|
page read and write
|
||
2F9F000
|
stack
|
page read and write
|
||
44F1000
|
heap
|
page read and write
|
||
4B10000
|
direct allocation
|
page execute and read and write
|
||
31CE000
|
stack
|
page read and write
|
||
C40000
|
heap
|
page read and write
|
||
3D2F000
|
stack
|
page read and write
|
||
44F1000
|
heap
|
page read and write
|
||
44F1000
|
heap
|
page read and write
|
||
44F1000
|
heap
|
page read and write
|
||
44F1000
|
heap
|
page read and write
|
||
4B0000
|
unkown
|
page readonly
|
||
4B1000
|
unkown
|
page execute and write copy
|
||
2B2F000
|
stack
|
page read and write
|
||
7C60000
|
heap
|
page read and write
|
||
4E30000
|
direct allocation
|
page execute and read and write
|
||
44F1000
|
heap
|
page read and write
|
||
7D9B000
|
stack
|
page read and write
|
||
968000
|
unkown
|
page execute and write copy
|
||
2B70000
|
direct allocation
|
page read and write
|
||
39AE000
|
stack
|
page read and write
|
||
4B10000
|
direct allocation
|
page execute and read and write
|
||
14D0000
|
direct allocation
|
page read and write
|
||
44F1000
|
heap
|
page read and write
|
||
44F1000
|
heap
|
page read and write
|
||
44F1000
|
heap
|
page read and write
|
||
190000
|
unkown
|
page readonly
|
||
34AE000
|
stack
|
page read and write
|
||
7C9000
|
unkown
|
page execute and write copy
|
||
4CA4000
|
heap
|
page read and write
|
||
5410000
|
direct allocation
|
page execute and read and write
|
||
14C0000
|
heap
|
page read and write
|
||
53B0000
|
direct allocation
|
page execute and read and write
|
||
44F1000
|
heap
|
page read and write
|
||
4E30000
|
direct allocation
|
page execute and read and write
|
||
44F1000
|
heap
|
page read and write
|
||
14F4000
|
heap
|
page read and write
|
||
44F1000
|
heap
|
page read and write
|
||
C20000
|
heap
|
page read and write
|
||
C66000
|
heap
|
page read and write
|
||
14F4000
|
heap
|
page read and write
|
||
51F0000
|
direct allocation
|
page read and write
|
||
519000
|
unkown
|
page read and write
|
||
3D9E000
|
stack
|
page read and write
|
||
44F1000
|
heap
|
page read and write
|
||
DD0000
|
heap
|
page read and write
|
||
5380000
|
direct allocation
|
page execute and read and write
|
||
4B90000
|
direct allocation
|
page execute and read and write
|
||
39DE000
|
stack
|
page read and write
|
||
44F1000
|
heap
|
page read and write
|
||
368F000
|
stack
|
page read and write
|
||
14D0000
|
direct allocation
|
page read and write
|
||
BFE000
|
heap
|
page read and write
|
||
C29000
|
heap
|
page read and write
|
||
44F1000
|
heap
|
page read and write
|
||
3EAE000
|
stack
|
page read and write
|
||
2C8F000
|
stack
|
page read and write
|
||
411F000
|
stack
|
page read and write
|
||
5420000
|
direct allocation
|
page execute and read and write
|
||
330E000
|
stack
|
page read and write
|
||
43DE000
|
stack
|
page read and write
|
||
340F000
|
stack
|
page read and write
|
||
BAA000
|
heap
|
page read and write
|
||
44F1000
|
heap
|
page read and write
|
||
4D6F000
|
stack
|
page read and write
|
||
3C2E000
|
stack
|
page read and write
|
||
2B6B000
|
stack
|
page read and write
|
||
43AE000
|
stack
|
page read and write
|
||
C63000
|
heap
|
page read and write
|
||
425F000
|
stack
|
page read and write
|
||
814B000
|
stack
|
page read and write
|
||
44F1000
|
heap
|
page read and write
|
||
4AE0000
|
direct allocation
|
page execute and read and write
|
||
2B87000
|
heap
|
page read and write
|
||
C7D000
|
heap
|
page read and write
|
||
C64000
|
heap
|
page read and write
|
||
4AF0000
|
direct allocation
|
page execute and read and write
|
||
7C8000
|
unkown
|
page execute and read and write
|
||
44EE000
|
stack
|
page read and write
|
||
4B10000
|
direct allocation
|
page execute and read and write
|
||
14D0000
|
direct allocation
|
page read and write
|
||
53E0000
|
direct allocation
|
page execute and read and write
|
||
C69000
|
heap
|
page read and write
|
||
44F0000
|
heap
|
page read and write
|
||
BE6000
|
heap
|
page read and write
|
||
371F000
|
stack
|
page read and write
|
||
3BCE000
|
stack
|
page read and write
|
||
2B70000
|
direct allocation
|
page read and write
|
||
14F4000
|
heap
|
page read and write
|
||
4ED0000
|
direct allocation
|
page execute and read and write
|
||
2B70000
|
direct allocation
|
page read and write
|
||
68D0000
|
heap
|
page read and write
|
||
4B0000
|
unkown
|
page read and write
|
||
5400000
|
direct allocation
|
page execute and read and write
|
||
4E00000
|
direct allocation
|
page execute and read and write
|
||
480F000
|
stack
|
page read and write
|
||
C5C000
|
heap
|
page read and write
|
||
44F1000
|
heap
|
page read and write
|
||
14F4000
|
heap
|
page read and write
|
||
1F2000
|
unkown
|
page execute and read and write
|
||
C00000
|
heap
|
page read and write
|
||
386000
|
unkown
|
page execute and read and write
|
||
51B000
|
unkown
|
page execute and read and write
|
||
14F4000
|
heap
|
page read and write
|
||
4980000
|
direct allocation
|
page read and write
|
||
6DB000
|
stack
|
page read and write
|
||
44F1000
|
heap
|
page read and write
|
||
394E000
|
stack
|
page read and write
|
||
4A8000
|
unkown
|
page execute and read and write
|
||
14D0000
|
direct allocation
|
page read and write
|
||
12FD000
|
stack
|
page read and write
|
||
318F000
|
stack
|
page read and write
|
||
49EE000
|
stack
|
page read and write
|
||
53F0000
|
direct allocation
|
page execute and read and write
|
||
4EA0000
|
direct allocation
|
page execute and read and write
|
||
5370000
|
direct allocation
|
page execute and read and write
|
||
415E000
|
stack
|
page read and write
|
||
44F1000
|
heap
|
page read and write
|
||
2B70000
|
direct allocation
|
page read and write
|
||
C5C000
|
heap
|
page read and write
|
||
321F000
|
stack
|
page read and write
|
||
4E20000
|
direct allocation
|
page execute and read and write
|
||
44F1000
|
heap
|
page read and write
|
||
386E000
|
stack
|
page read and write
|
||
463000
|
unkown
|
page execute and read and write
|
||
361E000
|
stack
|
page read and write
|
||
2BDF000
|
stack
|
page read and write
|
||
2B70000
|
direct allocation
|
page read and write
|
||
FD0000
|
heap
|
page read and write
|
||
325E000
|
stack
|
page read and write
|
||
308E000
|
stack
|
page read and write
|
||
966000
|
unkown
|
page execute and read and write
|
||
53D0000
|
direct allocation
|
page execute and read and write
|
||
412E000
|
stack
|
page read and write
|
||
44F1000
|
heap
|
page read and write
|
||
304F000
|
stack
|
page read and write
|
||
44E0000
|
direct allocation
|
page read and write
|
||
422F000
|
stack
|
page read and write
|
||
3D5F000
|
stack
|
page read and write
|
||
44F1000
|
heap
|
page read and write
|
||
7C8000
|
unkown
|
page execute and write copy
|
||
396F000
|
stack
|
page read and write
|
||
44F1000
|
heap
|
page read and write
|
||
26A0000
|
heap
|
page read and write
|
||
31EF000
|
stack
|
page read and write
|
||
44F1000
|
heap
|
page read and write
|
||
7DA000
|
stack
|
page read and write
|
||
C54000
|
heap
|
page read and write
|
||
44F1000
|
heap
|
page read and write
|
||
C1B000
|
heap
|
page read and write
|
||
D60000
|
heap
|
page read and write
|
||
44F1000
|
heap
|
page read and write
|
||
44F1000
|
heap
|
page read and write
|
||
44E0000
|
direct allocation
|
page read and write
|
||
44F1000
|
heap
|
page read and write
|
||
512000
|
unkown
|
page execute and read and write
|
||
7E9C000
|
stack
|
page read and write
|
||
5380000
|
direct allocation
|
page execute and read and write
|
||
8250000
|
heap
|
page read and write
|
||
44F1000
|
heap
|
page read and write
|
||
44F1000
|
heap
|
page read and write
|
||
44F1000
|
heap
|
page read and write
|
||
44F1000
|
heap
|
page read and write
|
||
382F000
|
stack
|
page read and write
|
||
51F0000
|
direct allocation
|
page read and write
|
||
2B70000
|
direct allocation
|
page read and write
|
||
2B70000
|
direct allocation
|
page read and write
|
||
53C0000
|
direct allocation
|
page execute and read and write
|
||
462E000
|
stack
|
page read and write
|
||
322E000
|
stack
|
page read and write
|
||
14D0000
|
direct allocation
|
page read and write
|
||
C7D000
|
heap
|
page read and write
|
||
401E000
|
stack
|
page read and write
|
||
44F1000
|
heap
|
page read and write
|
||
C1E000
|
heap
|
page read and write
|
||
6A6000
|
unkown
|
page execute and read and write
|
||
BF0000
|
heap
|
page read and write
|
||
EF0000
|
heap
|
page read and write
|
||
3E9F000
|
stack
|
page read and write
|
||
44F1000
|
heap
|
page read and write
|
||
C7E000
|
heap
|
page read and write
|
||
4C50000
|
trusted library allocation
|
page read and write
|
||
A65000
|
heap
|
page read and write
|
||
14D0000
|
direct allocation
|
page read and write
|
||
2B80000
|
heap
|
page read and write
|
||
44E0000
|
direct allocation
|
page read and write
|
||
44F1000
|
heap
|
page read and write
|
||
4D71000
|
heap
|
page read and write
|
||
3AAF000
|
stack
|
page read and write
|
||
14D0000
|
direct allocation
|
page read and write
|
||
646000
|
unkown
|
page execute and read and write
|
||
4E40000
|
direct allocation
|
page execute and read and write
|
||
15FF000
|
stack
|
page read and write
|
||
2B70000
|
direct allocation
|
page read and write
|
||
165A000
|
heap
|
page read and write
|
||
4B20000
|
direct allocation
|
page execute and read and write
|
||
C7D000
|
heap
|
page read and write
|
||
3F4F000
|
stack
|
page read and write
|
||
2B70000
|
direct allocation
|
page read and write
|
||
44F1000
|
heap
|
page read and write
|
||
311E000
|
stack
|
page read and write
|
||
C69000
|
heap
|
page read and write
|
||
375E000
|
stack
|
page read and write
|
||
476E000
|
stack
|
page read and write
|
||
3B8F000
|
stack
|
page read and write
|
||
F1E000
|
heap
|
page read and write
|
||
44F1000
|
heap
|
page read and write
|
||
114E000
|
stack
|
page read and write
|
||
44F1000
|
heap
|
page read and write
|
||
783000
|
unkown
|
page execute and read and write
|
||
336E000
|
stack
|
page read and write
|
||
4E90000
|
direct allocation
|
page execute and read and write
|
||
5360000
|
direct allocation
|
page execute and read and write
|
||
44F1000
|
heap
|
page read and write
|
||
44F1000
|
heap
|
page read and write
|
||
62A0000
|
heap
|
page read and write
|
||
44E0000
|
direct allocation
|
page read and write
|
||
4CA0000
|
direct allocation
|
page read and write
|
||
51F0000
|
direct allocation
|
page read and write
|
||
44E0000
|
direct allocation
|
page read and write
|
||
DD5000
|
heap
|
page read and write
|
||
4E70000
|
direct allocation
|
page execute and read and write
|
||
44F1000
|
heap
|
page read and write
|
||
380E000
|
stack
|
page read and write
|
||
8276000
|
heap
|
page read and write
|
||
605E000
|
stack
|
page read and write
|
||
332F000
|
stack
|
page read and write
|
||
3E6F000
|
stack
|
page read and write
|
||
271E000
|
stack
|
page read and write
|
||
68CE000
|
heap
|
page read and write
|
||
2FEF000
|
stack
|
page read and write
|
||
2D1F000
|
stack
|
page read and write
|
||
1F9000
|
unkown
|
page write copy
|
||
C00000
|
heap
|
page read and write
|
||
968000
|
unkown
|
page execute and write copy
|
||
44F1000
|
heap
|
page read and write
|
||
44F1000
|
heap
|
page read and write
|
||
4B10000
|
direct allocation
|
page execute and read and write
|
||
2ADE000
|
stack
|
page read and write
|
||
68C1000
|
heap
|
page read and write
|
||
44DF000
|
stack
|
page read and write
|
||
4B0000
|
unkown
|
page readonly
|
||
44F1000
|
heap
|
page read and write
|
||
44F1000
|
heap
|
page read and write
|
||
5380000
|
direct allocation
|
page execute and read and write
|
||
4A8000
|
unkown
|
page execute and write copy
|
||
2B70000
|
direct allocation
|
page read and write
|
||
44F1000
|
heap
|
page read and write
|
||
26B0000
|
heap
|
page read and write
|
||
44F1000
|
heap
|
page read and write
|
||
3FAF000
|
stack
|
page read and write
|
||
190000
|
unkown
|
page read and write
|
||
399F000
|
stack
|
page read and write
|
||
14F4000
|
heap
|
page read and write
|
||
3CCF000
|
stack
|
page read and write
|
||
2E9E000
|
stack
|
page read and write
|
||
385F000
|
stack
|
page read and write
|
||
45EF000
|
stack
|
page read and write
|
||
44F1000
|
heap
|
page read and write
|
||
2C1E000
|
stack
|
page read and write
|
||
648000
|
unkown
|
page execute and write copy
|
||
3BEF000
|
stack
|
page read and write
|
||
14F0000
|
heap
|
page read and write
|
||
44F1000
|
heap
|
page read and write
|
||
30DF000
|
stack
|
page read and write
|
||
4B60000
|
direct allocation
|
page execute and read and write
|
||
14F4000
|
heap
|
page read and write
|
||
44F1000
|
heap
|
page read and write
|
||
44F1000
|
heap
|
page read and write
|
||
2E0E000
|
stack
|
page read and write
|
||
124F000
|
stack
|
page read and write
|
||
68D0000
|
heap
|
page read and write
|
||
44F1000
|
heap
|
page read and write
|
||
14F4000
|
heap
|
page read and write
|
||
44F1000
|
heap
|
page read and write
|
||
615F000
|
stack
|
page read and write
|
||
44F1000
|
heap
|
page read and write
|
||
2F4E000
|
stack
|
page read and write
|
||
37CF000
|
stack
|
page read and write
|
||
2CCE000
|
stack
|
page read and write
|
||
7BA000
|
unkown
|
page execute and read and write
|
||
268E000
|
stack
|
page read and write
|
||
40CE000
|
stack
|
page read and write
|
||
4811000
|
heap
|
page read and write
|
||
51B0000
|
trusted library allocation
|
page read and write
|
||
7EDE000
|
stack
|
page read and write
|
||
5D95000
|
heap
|
page read and write
|
||
2DCF000
|
stack
|
page read and write
|
||
299E000
|
stack
|
page read and write
|
||
44F1000
|
heap
|
page read and write
|
||
358E000
|
stack
|
page read and write
|
||
BA0000
|
heap
|
page read and write
|
||
5251000
|
direct allocation
|
page read and write
|
There are 569 hidden memdumps, click here to show them.