Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
Fatura 002.xlam.xlsx
|
Microsoft Excel 2007+
|
initial sample
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\T4O403JZ\food[1].exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\coolz.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\Desktop\~$Fatura 002.xlam.xlsx
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\prespecialist
|
data
|
dropped
|
||
C:\Users\user\Desktop\~$Fatura 002.xlam.xls
|
data
|
dropped
|
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
|
"C:\Program Files\Microsoft Office\Office14\EXCEL.EXE" /automation -Embedding
|
||
C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE
|
"C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE" -Embedding
|
||
C:\Users\user\AppData\Local\Temp\coolz.exe
|
C:\Users\user\AppData\Local\Temp\coolz.exe
|
||
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
|
C:\Users\user\AppData\Local\Temp\coolz.exe
|
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
https://menyos.com/assets/home/js/bdg/food.exe
|
104.21.35.109
|
||
https://menyos.com/assets/home/js/bdg/food.exeiiC:
|
unknown
|
||
http://crl.pkioverheid.nl/DomOvLatestCRL.crl0
|
unknown
|
||
http://crl.entrust.net/server1.crl0
|
unknown
|
||
https://menyos.com/assets/home/js/bdg/food.exeC:
|
unknown
|
||
http://ocsp.entrust.net03
|
unknown
|
||
https://menyos.com/5m/
|
unknown
|
||
https://menyos.com/assets/home/js/bdg/food.exeuj
|
unknown
|
||
https://menyos.com//m/
|
unknown
|
||
http://crl.pkioverheid.nl/DomOrganisatieLatestCRL-G2.crl0
|
unknown
|
||
http://www.diginotar.nl/cps/pkioverheid0
|
unknown
|
||
http://ocsp.entrust.net0D
|
unknown
|
||
https://secure.comodo.com/CPS0
|
unknown
|
||
https://menyos.com/assets/home/js/bdg/food.exefj
|
unknown
|
||
https://menyos.com/assets/home/js/bdg/food.exej
|
unknown
|
||
http://crl.entrust.net/2048ca.crl0
|
unknown
|
There are 6 hidden URLs, click here to show them.
Domains
Name
|
IP
|
Malicious
|
|
---|---|---|---|
menyos.com
|
104.21.35.109
|
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
104.21.35.109
|
menyos.com
|
United States
|
Registry
Path
|
Value
|
Malicious
|
|
---|---|---|---|
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\3F728A35DE52B2C8994A4FB101A03B95E87B06C8
|
Blob
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\12891DF7B048CD69D0196C8AD7A754C8A812A08C
|
Blob
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\3F728A35DE52B2C8994A4FB101A03B95E87B06C8
|
Blob
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\3F728A35DE52B2C8994A4FB101A03B95E87B06C8
|
Blob
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\3F728A35DE52B2C8994A4FB101A03B95E87B06C8
|
Blob
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\3F728A35DE52B2C8994A4FB101A03B95E87B06C8
|
Blob
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\12891DF7B048CD69D0196C8AD7A754C8A812A08C
|
Blob
|
||
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\Resiliency\StartupItems
|
# /
|
||
HKEY_CURRENT_USER\Software\Microsoft\Shared Tools\Outlook\Journaling\Microsoft Excel
|
Enabled
|
||
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel
|
MTTT
|
||
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\ReviewCycle
|
ReviewToken
|
||
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\Resiliency\StartupItems
|
s$/
|
||
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\Security\Trusted Documents
|
LastPurgeTime
|
||
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\LanguageResources\EnabledLanguages
|
1033
|
||
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\LanguageResources\EnabledLanguages
|
1033
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109D30000000100000000F01FEC\Usage
|
EXCELFiles
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109D30000000100000000F01FEC\Usage
|
ProductFiles
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109D30000000100000000F01FEC\Usage
|
VBAFiles
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109E60090400100000000F01FEC\Usage
|
EquationEditorFilesIntl_1033
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109E60090400100000000F01FEC\Usage
|
EquationEditorFilesIntl_1033
|
||
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections
|
SavedLegacySettings
|
There are 11 hidden registries, click here to show them.
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
402000
|
system
|
page execute and read and write
|
||
3AC0000
|
heap
|
page read and write
|
||
3AC0000
|
heap
|
page read and write
|
||
40F0000
|
heap
|
page read and write
|
||
3A20000
|
heap
|
page read and write
|
||
7040000
|
heap
|
page read and write
|
||
36B1000
|
heap
|
page read and write
|
||
28DF000
|
stack
|
page read and write
|
||
36A6000
|
heap
|
page read and write
|
||
3AC0000
|
direct allocation
|
page read and write
|
||
D0000
|
heap
|
page read and write
|
||
64E0000
|
heap
|
page read and write
|
||
36B0000
|
heap
|
page read and write
|
||
3A20000
|
heap
|
page read and write
|
||
89000
|
stack
|
page read and write
|
||
3F9000
|
stack
|
page read and write
|
||
3A20000
|
heap
|
page read and write
|
||
36B0000
|
heap
|
page read and write
|
||
3A4A000
|
direct allocation
|
page read and write
|
||
36B1000
|
heap
|
page read and write
|
||
36B0000
|
heap
|
page read and write
|
||
3A20000
|
heap
|
page read and write
|
||
36B0000
|
heap
|
page read and write
|
||
3AC0000
|
heap
|
page read and write
|
||
362B000
|
heap
|
page read and write
|
||
401000
|
unkown
|
page execute read
|
||
2001000
|
trusted library allocation
|
page read and write
|
||
36B1000
|
heap
|
page read and write
|
||
3AC0000
|
heap
|
page read and write
|
||
36B1000
|
heap
|
page read and write
|
||
3BC7000
|
direct allocation
|
page read and write
|
||
36B0000
|
heap
|
page read and write
|
||
2D0000
|
heap
|
page read and write
|
||
3BD0000
|
direct allocation
|
page read and write
|
||
10000
|
heap
|
page read and write
|
||
520000
|
heap
|
page read and write
|
||
3BC7000
|
direct allocation
|
page read and write
|
||
3AC0000
|
heap
|
page read and write
|
||
3A20000
|
heap
|
page read and write
|
||
3AC0000
|
heap
|
page read and write
|
||
36B0000
|
heap
|
page read and write
|
||
6524000
|
heap
|
page read and write
|
||
36B0000
|
heap
|
page read and write
|
||
3BB0000
|
direct allocation
|
page read and write
|
||
3A20000
|
heap
|
page read and write
|
||
1EE0000
|
heap
|
page read and write
|
||
68FF000
|
stack
|
page read and write
|
||
3970000
|
heap
|
page read and write
|
||
50D000
|
stack
|
page read and write
|
||
2C08000
|
heap
|
page read and write
|
||
3C30000
|
direct allocation
|
page read and write
|
||
3BC1000
|
direct allocation
|
page read and write
|
||
36B0000
|
heap
|
page read and write
|
||
3AC0000
|
heap
|
page read and write
|
||
7061000
|
heap
|
page read and write
|
||
5700000
|
heap
|
page read and write
|
||
3AC0000
|
heap
|
page read and write
|
||
1FFE000
|
stack
|
page read and write | page guard
|
||
36B0000
|
heap
|
page read and write
|
||
2DF000
|
heap
|
page read and write
|
||
3A20000
|
heap
|
page read and write
|
||
7B0000
|
heap
|
page read and write
|
||
650F000
|
heap
|
page read and write
|
||
5C8000
|
heap
|
page read and write
|
||
36B0000
|
heap
|
page read and write
|
||
36B0000
|
heap
|
page read and write
|
||
36B0000
|
heap
|
page read and write
|
||
2076000
|
trusted library allocation
|
page read and write
|
||
3A20000
|
heap
|
page read and write
|
||
36B0000
|
heap
|
page read and write
|
||
3A20000
|
heap
|
page read and write
|
||
3BB0000
|
direct allocation
|
page read and write
|
||
367C000
|
heap
|
page read and write
|
||
3A4A000
|
direct allocation
|
page read and write
|
||
3AC0000
|
heap
|
page read and write
|
||
36B1000
|
heap
|
page read and write
|
||
CD000
|
trusted library allocation
|
page execute and read and write
|
||
3A20000
|
heap
|
page read and write
|
||
3A4A000
|
direct allocation
|
page read and write
|
||
36AE000
|
heap
|
page read and write
|
||
24D4000
|
heap
|
page read and write
|
||
67A0000
|
remote allocation
|
page read and write
|
||
3A20000
|
heap
|
page read and write
|
||
3A20000
|
heap
|
page read and write
|
||
3A20000
|
heap
|
page read and write
|
||
162000
|
trusted library allocation
|
page read and write
|
||
3631000
|
heap
|
page read and write
|
||
3A20000
|
heap
|
page read and write
|
||
36B1000
|
heap
|
page read and write
|
||
367F000
|
heap
|
page read and write
|
||
3AC0000
|
heap
|
page read and write
|
||
527000
|
heap
|
page read and write
|
||
3BB0000
|
direct allocation
|
page read and write
|
||
36B0000
|
heap
|
page read and write
|
||
6D2C000
|
stack
|
page read and write
|
||
15D000
|
trusted library allocation
|
page execute and read and write
|
||
2C00000
|
heap
|
page read and write
|
||
166000
|
trusted library allocation
|
page execute and read and write
|
||
36B0000
|
heap
|
page read and write
|
||
58E000
|
heap
|
page read and write
|
||
3AC0000
|
heap
|
page read and write
|
||
362B000
|
heap
|
page read and write
|
||
3A20000
|
heap
|
page read and write
|
||
3BD0000
|
direct allocation
|
page read and write
|
||
482000
|
unkown
|
page readonly
|
||
3A20000
|
heap
|
page read and write
|
||
362B000
|
heap
|
page read and write
|
||
69A0000
|
heap
|
page read and write
|
||
3BC1000
|
direct allocation
|
page read and write
|
||
3AC0000
|
heap
|
page read and write
|
||
36B0000
|
heap
|
page read and write
|
||
4BD0000
|
heap
|
page execute and read and write
|
||
3970000
|
direct allocation
|
page read and write
|
||
36B0000
|
heap
|
page read and write
|
||
3AC0000
|
heap
|
page read and write
|
||
260000
|
trusted library allocation
|
page execute and read and write
|
||
3A20000
|
heap
|
page read and write
|
||
371A000
|
heap
|
page read and write
|
||
371A000
|
heap
|
page read and write
|
||
3AC0000
|
heap
|
page read and write
|
||
3AC0000
|
heap
|
page read and write
|
||
3AC0000
|
heap
|
page read and write
|
||
24D0000
|
heap
|
page read and write
|
||
477000
|
heap
|
page read and write
|
||
3AC0000
|
heap
|
page read and write
|
||
36B0000
|
heap
|
page read and write
|
||
36B0000
|
heap
|
page read and write
|
||
36B0000
|
heap
|
page read and write
|
||
3670000
|
heap
|
page read and write
|
||
3BC4000
|
direct allocation
|
page read and write
|
||
3A4D000
|
direct allocation
|
page read and write
|
||
3AC0000
|
heap
|
page read and write
|
||
3AC0000
|
heap
|
page read and write
|
||
4CE000
|
stack
|
page read and write
|
||
42EE000
|
stack
|
page read and write
|
||
36B0000
|
heap
|
page read and write
|
||
36AB000
|
heap
|
page read and write
|
||
36B0000
|
heap
|
page read and write
|
||
651F000
|
heap
|
page read and write
|
||
582000
|
heap
|
page read and write
|
||
1FFF000
|
stack
|
page read and write
|
||
3AC0000
|
heap
|
page read and write
|
||
4AB000
|
unkown
|
page readonly
|
||
51F000
|
heap
|
page read and write
|
||
42C000
|
system
|
page execute and read and write
|
||
3AC0000
|
heap
|
page read and write
|
||
36B0000
|
heap
|
page read and write
|
||
36B0000
|
heap
|
page read and write
|
||
490000
|
unkown
|
page write copy
|
||
4B7E000
|
stack
|
page read and write
|
||
36B0000
|
heap
|
page read and write
|
||
3632000
|
heap
|
page read and write
|
||
36B1000
|
heap
|
page read and write
|
||
3A20000
|
heap
|
page read and write
|
||
3AC0000
|
heap
|
page read and write
|
||
1ECE000
|
stack
|
page read and write
|
||
3AC0000
|
heap
|
page read and write
|
||
3C30000
|
direct allocation
|
page read and write
|
||
18A000
|
stack
|
page read and write
|
||
36B0000
|
heap
|
page read and write
|
||
3AD0000
|
direct allocation
|
page read and write
|
||
36B1000
|
heap
|
page read and write
|
||
3AC0000
|
heap
|
page read and write
|
||
3BC4000
|
direct allocation
|
page read and write
|
||
36B0000
|
heap
|
page read and write
|
||
36B0000
|
heap
|
page read and write
|
||
36B0000
|
heap
|
page read and write
|
||
5CC000
|
heap
|
page read and write
|
||
1CB000
|
stack
|
page read and write
|
||
36B0000
|
heap
|
page read and write
|
||
2B0000
|
trusted library allocation
|
page read and write
|
||
20B9000
|
trusted library allocation
|
page read and write
|
||
3A20000
|
heap
|
page read and write
|
||
3A20000
|
heap
|
page read and write
|
||
3EF000
|
stack
|
page read and write
|
||
36B0000
|
heap
|
page read and write
|
||
665E000
|
stack
|
page read and write
|
||
4F40000
|
heap
|
page read and write
|
||
20BC000
|
trusted library allocation
|
page read and write
|
||
363A000
|
heap
|
page read and write
|
||
3A20000
|
heap
|
page read and write
|
||
36B1000
|
heap
|
page read and write
|
||
577000
|
trusted library allocation
|
page read and write
|
||
36B0000
|
heap
|
page read and write
|
||
C0000
|
trusted library allocation
|
page read and write
|
||
676F000
|
stack
|
page read and write
|
||
3970000
|
direct allocation
|
page read and write
|
||
3A4D000
|
direct allocation
|
page read and write
|
||
3AC0000
|
heap
|
page read and write
|
||
3A20000
|
heap
|
page read and write
|
||
36B0000
|
heap
|
page read and write
|
||
2D7000
|
heap
|
page read and write
|
||
29DF000
|
stack
|
page read and write
|
||
1F40000
|
direct allocation
|
page read and write
|
||
7060000
|
heap
|
page read and write
|
||
400000
|
unkown
|
page readonly
|
||
416D000
|
stack
|
page read and write
|
||
66B0000
|
heap
|
page read and write
|
||
3AC0000
|
direct allocation
|
page read and write
|
||
56FF000
|
stack
|
page read and write
|
||
3A20000
|
heap
|
page read and write
|
||
2DD0000
|
heap
|
page read and write
|
||
36B0000
|
heap
|
page read and write
|
||
4BD000
|
heap
|
page read and write
|
||
5C7000
|
heap
|
page read and write
|
||
10000
|
heap
|
page read and write
|
||
3AC0000
|
heap
|
page read and write
|
||
270000
|
heap
|
page execute and read and write
|
||
3A20000
|
heap
|
page read and write
|
||
47FF000
|
stack
|
page read and write
|
||
36B0000
|
heap
|
page read and write
|
||
54F000
|
heap
|
page read and write
|
||
4F3E000
|
stack
|
page read and write
|
||
3A20000
|
heap
|
page read and write
|
||
362B000
|
heap
|
page read and write
|
||
1DE8000
|
trusted library allocation
|
page read and write
|
||
36B0000
|
heap
|
page read and write
|
||
4112000
|
heap
|
page read and write
|
||
36AF000
|
heap
|
page read and write
|
||
3AC0000
|
heap
|
page read and write
|
||
3A20000
|
heap
|
page read and write
|
||
36B1000
|
heap
|
page read and write
|
||
583000
|
heap
|
page read and write
|
||
46BE000
|
stack
|
page read and write
|
||
3AC0000
|
heap
|
page read and write
|
||
36B0000
|
heap
|
page read and write
|
||
366D000
|
stack
|
page read and write
|
||
36B1000
|
heap
|
page read and write
|
||
36B1000
|
heap
|
page read and write
|
||
369F000
|
heap
|
page read and write
|
||
36B0000
|
heap
|
page read and write
|
||
3A20000
|
heap
|
page read and write
|
||
3AC0000
|
heap
|
page read and write
|
||
3BC1000
|
direct allocation
|
page read and write
|
||
36B0000
|
heap
|
page read and write
|
||
36B0000
|
heap
|
page read and write
|
||
36B1000
|
heap
|
page read and write
|
||
3A20000
|
heap
|
page read and write
|
||
36B0000
|
heap
|
page read and write
|
||
7000000
|
heap
|
page read and write
|
||
3AC0000
|
heap
|
page read and write
|
||
36B0000
|
heap
|
page read and write
|
||
3970000
|
direct allocation
|
page read and write
|
||
69F0000
|
heap
|
page read and write
|
||
3A20000
|
heap
|
page read and write
|
||
3A20000
|
heap
|
page read and write
|
||
36B0000
|
heap
|
page read and write
|
||
3A4D000
|
direct allocation
|
page read and write
|
||
5D4000
|
heap
|
page read and write
|
||
517E000
|
stack
|
page read and write
|
||
36B1000
|
heap
|
page read and write
|
||
2C0B000
|
heap
|
page read and write
|
||
36B1000
|
heap
|
page read and write
|
||
1E8F000
|
stack
|
page read and write
|
||
3AC0000
|
heap
|
page read and write
|
||
250000
|
heap
|
page read and write
|
||
3AC0000
|
heap
|
page read and write
|
||
3AC0000
|
heap
|
page read and write
|
||
3A20000
|
heap
|
page read and write
|
||
203F000
|
trusted library allocation
|
page read and write
|
||
36B1000
|
heap
|
page read and write
|
||
6B2E000
|
stack
|
page read and write
|
||
2BDE000
|
stack
|
page read and write
|
||
40F4000
|
heap
|
page read and write
|
||
5930000
|
heap
|
page read and write
|
||
3BC1000
|
direct allocation
|
page read and write
|
||
150000
|
trusted library allocation
|
page read and write
|
||
3AC0000
|
heap
|
page read and write
|
||
3A20000
|
heap
|
page read and write
|
||
3A20000
|
heap
|
page read and write
|
||
3A20000
|
heap
|
page read and write
|
||
3AD0000
|
direct allocation
|
page read and write
|
||
2070000
|
trusted library allocation
|
page read and write
|
||
2ADF000
|
stack
|
page read and write
|
||
67A0000
|
remote allocation
|
page read and write
|
||
612000
|
heap
|
page read and write
|
||
2C04000
|
heap
|
page read and write
|
||
36B1000
|
heap
|
page read and write
|
||
3A4A000
|
direct allocation
|
page read and write
|
||
3AC0000
|
heap
|
page read and write
|
||
36B0000
|
heap
|
page read and write
|
||
3AC0000
|
heap
|
page read and write
|
||
36B0000
|
heap
|
page read and write
|
||
5708000
|
heap
|
page read and write
|
||
369F000
|
heap
|
page read and write
|
||
3029000
|
trusted library allocation
|
page read and write
|
||
51BE000
|
stack
|
page read and write
|
||
36B0000
|
heap
|
page read and write
|
||
581000
|
heap
|
page read and write
|
||
58F000
|
heap
|
page read and write
|
||
604000
|
heap
|
page read and write
|
||
618000
|
heap
|
page read and write
|
||
3A4A000
|
direct allocation
|
page read and write
|
||
3AC0000
|
heap
|
page read and write
|
||
46FF000
|
stack
|
page read and write
|
||
3AC0000
|
direct allocation
|
page read and write
|
||
172000
|
trusted library allocation
|
page read and write
|
||
3AC0000
|
heap
|
page read and write
|
||
3A20000
|
heap
|
page read and write
|
||
24F2000
|
heap
|
page read and write
|
||
7B7000
|
heap
|
page read and write
|
||
362B000
|
heap
|
page read and write
|
||
3632000
|
heap
|
page read and write
|
||
36B1000
|
heap
|
page read and write
|
||
3AC0000
|
heap
|
page read and write
|
||
36B0000
|
heap
|
page read and write
|
||
45FD000
|
stack
|
page read and write
|
||
5CC000
|
heap
|
page read and write
|
||
3AC0000
|
heap
|
page read and write
|
||
3AC0000
|
heap
|
page read and write
|
||
5CC000
|
heap
|
page read and write
|
||
544E000
|
stack
|
page read and write
|
||
3A20000
|
heap
|
page read and write
|
||
3A20000
|
heap
|
page read and write
|
||
36B0000
|
heap
|
page read and write
|
||
7EF40000
|
trusted library allocation
|
page execute and read and write
|
||
3A20000
|
heap
|
page read and write
|
||
370B000
|
heap
|
page read and write
|
||
4C0000
|
heap
|
page read and write
|
||
3A20000
|
heap
|
page read and write
|
||
16A000
|
trusted library allocation
|
page execute and read and write
|
||
36B0000
|
heap
|
page read and write
|
||
3C30000
|
direct allocation
|
page read and write
|
||
3A20000
|
heap
|
page read and write
|
||
36B0000
|
heap
|
page read and write
|
||
36B0000
|
heap
|
page read and write
|
||
175000
|
trusted library allocation
|
page execute and read and write
|
||
3A20000
|
heap
|
page read and write
|
||
160000
|
trusted library allocation
|
page read and write
|
||
1E4F000
|
stack
|
page read and write
|
||
3AC0000
|
heap
|
page read and write
|
||
17B000
|
trusted library allocation
|
page execute and read and write
|
||
366F000
|
heap
|
page read and write
|
||
3AC0000
|
heap
|
page read and write
|
||
6E2F000
|
stack
|
page read and write
|
||
3AC0000
|
heap
|
page read and write
|
||
36B0000
|
heap
|
page read and write
|
||
3AD0000
|
direct allocation
|
page read and write
|
||
4B90000
|
heap
|
page read and write
|
||
544000
|
heap
|
page read and write
|
||
3AC0000
|
heap
|
page read and write
|
||
3AC0000
|
heap
|
page read and write
|
||
630000
|
heap
|
page read and write
|
||
36B0000
|
heap
|
page read and write
|
||
3970000
|
direct allocation
|
page read and write
|
||
36B1000
|
heap
|
page read and write
|
||
3A20000
|
heap
|
page read and write
|
||
36B0000
|
heap
|
page read and write
|
||
3001000
|
trusted library allocation
|
page read and write
|
||
362B000
|
heap
|
page read and write
|
||
36B0000
|
heap
|
page read and write
|
||
36B0000
|
heap
|
page read and write
|
||
C3000
|
trusted library allocation
|
page execute and read and write
|
||
C4000
|
trusted library allocation
|
page read and write
|
||
36AF000
|
heap
|
page read and write
|
||
3AC0000
|
heap
|
page read and write
|
||
36B1000
|
heap
|
page read and write
|
||
460000
|
trusted library allocation
|
page execute and read and write
|
||
2E0000
|
heap
|
page read and write
|
||
470000
|
heap
|
page read and write
|
||
3AD0000
|
direct allocation
|
page read and write
|
||
3AC0000
|
heap
|
page read and write
|
||
36B1000
|
heap
|
page read and write
|
||
3A20000
|
heap
|
page read and write
|
||
2C0000
|
trusted library allocation
|
page read and write
|
||
64FD000
|
heap
|
page read and write
|
||
3BD0000
|
direct allocation
|
page read and write
|
||
3AD0000
|
direct allocation
|
page read and write
|
||
570000
|
trusted library allocation
|
page read and write
|
||
3A20000
|
heap
|
page read and write
|
||
1ECE000
|
stack
|
page read and write
|
||
36A8000
|
heap
|
page read and write
|
||
1F30000
|
heap
|
page read and write
|
||
36B1000
|
heap
|
page read and write
|
||
400000
|
system
|
page execute and read and write
|
||
3C30000
|
direct allocation
|
page read and write
|
||
5B0000
|
trusted library allocation
|
page read and write
|
||
3BC4000
|
direct allocation
|
page read and write
|
||
604000
|
heap
|
page read and write
|
||
3BC7000
|
direct allocation
|
page read and write
|
||
3A4D000
|
direct allocation
|
page read and write
|
||
494000
|
heap
|
page read and write
|
||
3BD0000
|
direct allocation
|
page read and write
|
||
243F000
|
stack
|
page read and write
|
||
672F000
|
stack
|
page read and write
|
||
3A20000
|
heap
|
page read and write
|
||
36B1000
|
heap
|
page read and write
|
||
3A20000
|
heap
|
page read and write
|
||
661E000
|
stack
|
page read and write
|
||
3AC0000
|
heap
|
page read and write
|
||
3A20000
|
heap
|
page read and write
|
||
3970000
|
direct allocation
|
page read and write
|
||
4B4000
|
heap
|
page read and write
|
||
3A4D000
|
direct allocation
|
page read and write
|
||
3BC7000
|
direct allocation
|
page read and write
|
||
36B0000
|
heap
|
page read and write
|
||
6C2F000
|
stack
|
page read and write
|
||
3A20000
|
heap
|
page read and write
|
||
67C0000
|
heap
|
page read and write
|
||
36B0000
|
heap
|
page read and write
|
||
58E000
|
heap
|
page read and write
|
||
3BB0000
|
direct allocation
|
page read and write
|
||
3A20000
|
heap
|
page read and write
|
||
36B0000
|
heap
|
page read and write
|
||
36B0000
|
heap
|
page read and write
|
||
B0000
|
trusted library allocation
|
page read and write
|
||
36B0000
|
heap
|
page read and write
|
||
5CD000
|
heap
|
page read and write
|
||
3BC4000
|
direct allocation
|
page read and write
|
||
4E1C000
|
stack
|
page read and write
|
||
3AC0000
|
direct allocation
|
page read and write
|
||
3AC0000
|
heap
|
page read and write
|
||
680000
|
heap
|
page execute and read and write
|
||
36B0000
|
heap
|
page read and write
|
||
36B0000
|
heap
|
page read and write
|
||
36B0000
|
heap
|
page read and write
|
||
1F2E000
|
stack
|
page read and write
|
||
3AC0000
|
direct allocation
|
page read and write
|
||
36B1000
|
heap
|
page read and write
|
||
36B0000
|
heap
|
page read and write
|
||
669C000
|
stack
|
page read and write
|
||
36B0000
|
heap
|
page read and write
|
||
6F2F000
|
stack
|
page read and write
|
||
177000
|
trusted library allocation
|
page execute and read and write
|
||
61E000
|
stack
|
page read and write
|
||
36B0000
|
heap
|
page read and write
|
||
36B0000
|
heap
|
page read and write
|
||
36B0000
|
heap
|
page read and write
|
||
3A20000
|
heap
|
page read and write
|
There are 419 hidden memdumps, click here to show them.