Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
MACHINE SPECIFICATION.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
initial sample
|
||
C:\Users\user\AppData\Local\Temp\Melber
|
data
|
dropped
|
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\MACHINE SPECIFICATION.exe
|
"C:\Users\user\Desktop\MACHINE SPECIFICATION.exe"
|
||
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
|
"C:\Users\user\Desktop\MACHINE SPECIFICATION.exe"
|
||
C:\Users\user\Desktop\MACHINE SPECIFICATION.exe
|
"C:\Users\user\Desktop\MACHINE SPECIFICATION.exe"
|
||
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
|
"C:\Users\user\Desktop\MACHINE SPECIFICATION.exe"
|
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
http://checkip.dyndns.org/
|
193.122.130.0
|
||
https://reallyfreegeoip.org/xml/8.46.123.189
|
104.21.16.1
|
||
https://reallyfreegeoip.org/xml/8.46.123.189l
|
unknown
|
||
http://kianaenergy.com
|
unknown
|
||
https://api.telegram.org/bot
|
unknown
|
||
http://r10.i.lencr.org/0-
|
unknown
|
||
http://x1.c.lencr.org/0
|
unknown
|
||
http://x1.i.lencr.org/0
|
unknown
|
||
http://checkip.dyndns.org/q
|
unknown
|
||
http://reallyfreegeoip.org
|
unknown
|
||
https://reallyfreegeoip.org
|
unknown
|
||
http://r10.o.lencr.org0#
|
unknown
|
||
http://checkip.dyndns.org
|
unknown
|
||
http://checkip.dyndns.com
|
unknown
|
||
http://mail.kianaenergy.com
|
unknown
|
||
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
|
unknown
|
||
https://api.telegram.org/bot-/sendDocument?chat_id=
|
unknown
|
||
https://reallyfreegeoip.org/xml/
|
unknown
|
There are 8 hidden URLs, click here to show them.
Domains
Name
|
IP
|
Malicious
|
|
---|---|---|---|
kianaenergy.com
|
5.144.131.244
|
||
mail.kianaenergy.com
|
unknown
|
||
reallyfreegeoip.org
|
104.21.16.1
|
||
checkip.dyndns.com
|
193.122.130.0
|
||
checkip.dyndns.org
|
unknown
|
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
5.144.131.244
|
kianaenergy.com
|
Iran (ISLAMIC Republic Of)
|
||
104.21.16.1
|
reallyfreegeoip.org
|
United States
|
||
193.122.130.0
|
checkip.dyndns.com
|
United States
|
Registry
Path
|
Value
|
Malicious
|
|
---|---|---|---|
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASAPI32
|
EnableFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASAPI32
|
EnableAutoFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASAPI32
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASAPI32
|
FileTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASAPI32
|
ConsoleTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASAPI32
|
MaxFileSize
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASAPI32
|
FileDirectory
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASMANCS
|
EnableFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASMANCS
|
EnableAutoFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASMANCS
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASMANCS
|
FileTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASMANCS
|
ConsoleTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASMANCS
|
MaxFileSize
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASMANCS
|
FileDirectory
|
There are 5 hidden registries, click here to show them.
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
2430000
|
trusted library section
|
page read and write
|
||
4AD0000
|
trusted library section
|
page read and write
|
||
3471000
|
trusted library allocation
|
page read and write
|
||
2631000
|
trusted library allocation
|
page read and write
|
||
21B0000
|
heap
|
page read and write
|
||
4A60000
|
trusted library allocation
|
page read and write
|
||
403E000
|
heap
|
page read and write
|
||
E1B000
|
stack
|
page read and write
|
||
137A000
|
heap
|
page read and write
|
||
52B0000
|
trusted library allocation
|
page read and write
|
||
24AB000
|
trusted library allocation
|
page read and write
|
||
1B1E000
|
heap
|
page read and write
|
||
1360000
|
heap
|
page read and write
|
||
1360000
|
heap
|
page read and write
|
||
1A70000
|
heap
|
page read and write
|
||
1B18000
|
heap
|
page read and write
|
||
3EDE000
|
direct allocation
|
page read and write
|
||
1B1C000
|
heap
|
page read and write
|
||
5C00000
|
trusted library allocation
|
page execute and read and write
|
||
17E0000
|
heap
|
page read and write
|
||
1360000
|
heap
|
page read and write
|
||
6C0000
|
unkown
|
page write copy
|
||
182B000
|
heap
|
page read and write
|
||
25EE000
|
trusted library allocation
|
page read and write
|
||
1823000
|
heap
|
page read and write
|
||
4A6B000
|
trusted library allocation
|
page read and write
|
||
F7D000
|
stack
|
page read and write
|
||
5E30000
|
trusted library allocation
|
page read and write
|
||
137A000
|
heap
|
page read and write
|
||
3EDE000
|
direct allocation
|
page read and write
|
||
1FD4000
|
trusted library allocation
|
page read and write
|
||
1FEE000
|
stack
|
page read and write
|
||
1377000
|
heap
|
page read and write
|
||
1A7E000
|
heap
|
page read and write
|
||
5CAE000
|
stack
|
page read and write
|
||
3571000
|
trusted library allocation
|
page read and write
|
||
1357000
|
heap
|
page read and write
|
||
248A000
|
trusted library allocation
|
page read and write
|
||
61D0000
|
trusted library allocation
|
page execute and read and write
|
||
3BA0000
|
direct allocation
|
page read and write
|
||
5BB0000
|
trusted library allocation
|
page read and write
|
||
6BC000
|
unkown
|
page write copy
|
||
68C000
|
unkown
|
page readonly
|
||
3BA0000
|
direct allocation
|
page read and write
|
||
24A1000
|
trusted library allocation
|
page read and write
|
||
2497000
|
trusted library allocation
|
page read and write
|
||
4A50000
|
trusted library allocation
|
page read and write
|
||
6C4000
|
unkown
|
page readonly
|
||
24BC000
|
trusted library allocation
|
page read and write
|
||
4A92000
|
trusted library allocation
|
page read and write
|
||
24D9000
|
trusted library allocation
|
page read and write
|
||
1A63000
|
heap
|
page read and write
|
||
3CC3000
|
direct allocation
|
page read and write
|
||
4BAE000
|
stack
|
page read and write
|
||
1FB3000
|
heap
|
page read and write
|
||
6DE000
|
unkown
|
page readonly
|
||
10E0000
|
heap
|
page read and write
|
||
182F000
|
heap
|
page read and write
|
||
1221000
|
heap
|
page read and write
|
||
1357000
|
heap
|
page read and write
|
||
24CF000
|
trusted library allocation
|
page read and write
|
||
1A87000
|
heap
|
page read and write
|
||
4A7E000
|
trusted library allocation
|
page read and write
|
||
568000
|
heap
|
page read and write
|
||
A9000
|
stack
|
page read and write
|
||
3D40000
|
direct allocation
|
page read and write
|
||
24C4000
|
trusted library allocation
|
page read and write
|
||
26B3000
|
trusted library allocation
|
page read and write
|
||
17F0000
|
heap
|
page read and write
|
||
45BE000
|
direct allocation
|
page read and write
|
||
1352000
|
heap
|
page read and write
|
||
11A1000
|
heap
|
page read and write
|
||
2544000
|
trusted library allocation
|
page read and write
|
||
3D40000
|
direct allocation
|
page read and write
|
||
1352000
|
heap
|
page read and write
|
||
4B30000
|
trusted library allocation
|
page execute and read and write
|
||
26F5000
|
trusted library allocation
|
page read and write
|
||
2050000
|
heap
|
page execute and read and write
|
||
135D000
|
heap
|
page read and write
|
||
6200000
|
heap
|
page read and write
|
||
24A5000
|
trusted library allocation
|
page read and write
|
||
470000
|
heap
|
page read and write
|
||
3EDE000
|
direct allocation
|
page read and write
|
||
2060000
|
trusted library allocation
|
page read and write
|
||
1377000
|
heap
|
page read and write
|
||
68C000
|
unkown
|
page readonly
|
||
1415000
|
heap
|
page read and write
|
||
1824000
|
heap
|
page read and write
|
||
25FA000
|
trusted library allocation
|
page read and write
|
||
26F1000
|
trusted library allocation
|
page read and write
|
||
4AC0000
|
heap
|
page execute and read and write
|
||
40EA000
|
heap
|
page read and write
|
||
3BAB000
|
heap
|
page read and write
|
||
68C000
|
unkown
|
page readonly
|
||
4420000
|
direct allocation
|
page read and write
|
||
1A7E000
|
heap
|
page read and write
|
||
2460000
|
heap
|
page read and write
|
||
68C000
|
unkown
|
page readonly
|
||
45BE000
|
direct allocation
|
page read and write
|
||
40E0000
|
heap
|
page read and write
|
||
2482000
|
trusted library allocation
|
page read and write
|
||
E3F000
|
stack
|
page read and write
|
||
1357000
|
heap
|
page read and write
|
||
1A63000
|
heap
|
page read and write
|
||
2010000
|
heap
|
page read and write
|
||
3CC3000
|
direct allocation
|
page read and write
|
||
24B6000
|
trusted library allocation
|
page read and write
|
||
5AAE000
|
stack
|
page read and write
|
||
3E69000
|
direct allocation
|
page read and write
|
||
1A87000
|
heap
|
page read and write
|
||
426000
|
system
|
page execute and read and write
|
||
2547000
|
trusted library allocation
|
page read and write
|
||
1790000
|
heap
|
page read and write
|
||
FBE000
|
stack
|
page read and write
|
||
137A000
|
heap
|
page read and write
|
||
25BB000
|
trusted library allocation
|
page read and write
|
||
395A000
|
heap
|
page read and write
|
||
1122000
|
heap
|
page read and write
|
||
18A3000
|
heap
|
page read and write
|
||
1133000
|
heap
|
page read and write
|
||
1352000
|
heap
|
page read and write
|
||
2090000
|
heap
|
page read and write
|
||
52BC000
|
trusted library allocation
|
page read and write
|
||
4AA0000
|
trusted library allocation
|
page read and write
|
||
1E0000
|
heap
|
page read and write
|
||
112E000
|
heap
|
page execute and read and write
|
||
4280000
|
direct allocation
|
page read and write
|
||
4A81000
|
trusted library allocation
|
page read and write
|
||
460000
|
heap
|
page read and write
|
||
1415000
|
heap
|
page read and write
|
||
4DF2000
|
heap
|
page read and write
|
||
24C0000
|
trusted library allocation
|
page read and write
|
||
15CF000
|
stack
|
page read and write
|
||
248E000
|
trusted library allocation
|
page read and write
|
||
24AD000
|
trusted library allocation
|
page read and write
|
||
247C000
|
trusted library allocation
|
page read and write
|
||
4A6E000
|
trusted library allocation
|
page read and write
|
||
2484000
|
trusted library allocation
|
page read and write
|
||
3D40000
|
direct allocation
|
page read and write
|
||
1A7A000
|
heap
|
page read and write
|
||
F9E000
|
stack
|
page read and write
|
||
18EF000
|
stack
|
page read and write
|
||
4960000
|
heap
|
page read and write
|
||
255C000
|
trusted library allocation
|
page read and write
|
||
3E6D000
|
direct allocation
|
page read and write
|
||
6C4000
|
unkown
|
page readonly
|
||
23DF000
|
stack
|
page read and write
|
||
22DE000
|
stack
|
page read and write
|
||
1B17000
|
heap
|
page execute and read and write
|
||
11A2000
|
heap
|
page read and write
|
||
1377000
|
heap
|
page read and write
|
||
5BDD000
|
trusted library allocation
|
page read and write
|
||
418D000
|
heap
|
page read and write
|
||
5F1000
|
unkown
|
page execute read
|
||
135D000
|
heap
|
page read and write
|
||
3CC3000
|
direct allocation
|
page read and write
|
||
1FB0000
|
heap
|
page read and write
|
||
1240000
|
heap
|
page read and write
|
||
4549000
|
direct allocation
|
page read and write
|
||
3BA0000
|
direct allocation
|
page read and write
|
||
1A87000
|
heap
|
page read and write
|
||
1FFA000
|
trusted library allocation
|
page execute and read and write
|
||
504000
|
heap
|
page read and write
|
||
E0F000
|
stack
|
page read and write
|
||
2550000
|
trusted library allocation
|
page read and write
|
||
3E6D000
|
direct allocation
|
page read and write
|
||
1357000
|
heap
|
page read and write
|
||
A3A000
|
stack
|
page read and write
|
||
25B7000
|
trusted library allocation
|
page read and write
|
||
6B2000
|
unkown
|
page readonly
|
||
4A66000
|
trusted library allocation
|
page read and write
|
||
3BA0000
|
direct allocation
|
page read and write
|
||
3BA0000
|
direct allocation
|
page read and write
|
||
10C0000
|
heap
|
page read and write
|
||
FC0000
|
heap
|
page read and write
|
||
258D000
|
trusted library allocation
|
page read and write
|
||
15BF000
|
stack
|
page read and write
|
||
43A3000
|
direct allocation
|
page read and write
|
||
2488000
|
trusted library allocation
|
page read and write
|
||
255A000
|
trusted library allocation
|
page read and write
|
||
582000
|
heap
|
page read and write
|
||
460E000
|
stack
|
page read and write
|
||
135D000
|
heap
|
page read and write
|
||
1FF6000
|
trusted library allocation
|
page execute and read and write
|
||
1352000
|
heap
|
page read and write
|
||
34FA000
|
trusted library allocation
|
page read and write
|
||
ECA000
|
stack
|
page read and write
|
||
50EE000
|
stack
|
page read and write
|
||
34E4000
|
trusted library allocation
|
page read and write
|
||
1FC0000
|
trusted library allocation
|
page read and write
|
||
570000
|
heap
|
page read and write
|
||
24C2000
|
trusted library allocation
|
page read and write
|
||
2002000
|
trusted library allocation
|
page read and write
|
||
400000
|
system
|
page execute and read and write
|
||
3EDE000
|
direct allocation
|
page read and write
|
||
4A8D000
|
trusted library allocation
|
page read and write
|
||
25E0000
|
heap
|
page read and write
|
||
3D40000
|
direct allocation
|
page read and write
|
||
4DCC000
|
heap
|
page read and write
|
||
18A2000
|
heap
|
page read and write
|
||
2591000
|
trusted library allocation
|
page read and write
|
||
135D000
|
heap
|
page read and write
|
||
436000
|
system
|
page execute and read and write
|
||
25D9000
|
trusted library allocation
|
page read and write
|
||
5F0000
|
unkown
|
page readonly
|
||
4950000
|
heap
|
page read and write
|
||
6C0000
|
unkown
|
page write copy
|
||
509000
|
heap
|
page read and write
|
||
24CB000
|
trusted library allocation
|
page read and write
|
||
1B27000
|
heap
|
page read and write
|
||
2490000
|
trusted library allocation
|
page read and write
|
||
52B9000
|
trusted library allocation
|
page read and write
|
||
135D000
|
heap
|
page read and write
|
||
2471000
|
trusted library allocation
|
page read and write
|
||
F30000
|
heap
|
page read and write
|
||
3E6D000
|
direct allocation
|
page read and write
|
||
1377000
|
heap
|
page read and write
|
||
254D000
|
trusted library allocation
|
page read and write
|
||
1A7A000
|
heap
|
page read and write
|
||
25C2000
|
trusted library allocation
|
page read and write
|
||
4DB0000
|
heap
|
page read and write
|
||
1A70000
|
heap
|
page read and write
|
||
4A8000
|
heap
|
page read and write
|
||
4D0E000
|
stack
|
page read and write
|
||
1377000
|
heap
|
page read and write
|
||
1921000
|
heap
|
page read and write
|
||
113E000
|
heap
|
page read and write
|
||
1FF2000
|
trusted library allocation
|
page read and write
|
||
3611000
|
heap
|
page read and write
|
||
2040000
|
trusted library allocation
|
page execute and read and write
|
||
5F0000
|
unkown
|
page readonly
|
||
5BE0000
|
trusted library allocation
|
page execute and read and write
|
||
17F8000
|
heap
|
page read and write
|
||
2601000
|
trusted library allocation
|
page read and write
|
||
52BF000
|
trusted library allocation
|
page read and write
|
||
1352000
|
heap
|
page read and write
|
||
137A000
|
heap
|
page read and write
|
||
5F0000
|
unkown
|
page readonly
|
||
4AB0000
|
trusted library allocation
|
page read and write
|
||
1A87000
|
heap
|
page read and write
|
||
1360000
|
heap
|
page read and write
|
||
2070000
|
heap
|
page read and write
|
||
24A9000
|
trusted library allocation
|
page read and write
|
||
56C000
|
heap
|
page read and write
|
||
4A0000
|
heap
|
page read and write
|
||
2477000
|
trusted library allocation
|
page read and write
|
||
24D7000
|
trusted library allocation
|
page read and write
|
||
2493000
|
trusted library allocation
|
page read and write
|
||
4DC4000
|
heap
|
page read and write
|
||
3CC3000
|
direct allocation
|
page read and write
|
||
1B28000
|
heap
|
page read and write
|
||
3E69000
|
direct allocation
|
page read and write
|
||
15FF000
|
stack
|
page read and write
|
||
11A1000
|
heap
|
page read and write
|
||
11A1000
|
heap
|
page read and write
|
||
3BA0000
|
direct allocation
|
page read and write
|
||
4C0E000
|
stack
|
page read and write
|
||
3E69000
|
direct allocation
|
page read and write
|
||
1FDD000
|
trusted library allocation
|
page execute and read and write
|
||
5C10000
|
trusted library allocation
|
page read and write
|
||
3AB3000
|
heap
|
page read and write
|
||
DFF000
|
stack
|
page read and write
|
||
2578000
|
trusted library allocation
|
page read and write
|
||
24A7000
|
trusted library allocation
|
page read and write
|
||
1360000
|
heap
|
page read and write
|
||
10F8000
|
heap
|
page read and write
|
||
1360000
|
heap
|
page read and write
|
||
34EE000
|
trusted library allocation
|
page read and write
|
||
1FA0000
|
heap
|
page read and write
|
||
4E7A000
|
heap
|
page read and write
|
||
113F000
|
heap
|
page read and write
|
||
4549000
|
direct allocation
|
page read and write
|
||
3531000
|
trusted library allocation
|
page read and write
|
||
454D000
|
direct allocation
|
page read and write
|
||
3E69000
|
direct allocation
|
page read and write
|
||
1FE0000
|
trusted library allocation
|
page read and write
|
||
24B4000
|
trusted library allocation
|
page read and write
|
||
4A7A000
|
trusted library allocation
|
page read and write
|
||
3E69000
|
direct allocation
|
page read and write
|
||
6B2000
|
unkown
|
page readonly
|
||
5F1000
|
unkown
|
page execute read
|
||
182F000
|
heap
|
page read and write
|
||
2030000
|
trusted library allocation
|
page read and write
|
||
1FE3000
|
trusted library allocation
|
page read and write
|
||
454D000
|
direct allocation
|
page read and write
|
||
112F000
|
heap
|
page read and write
|
||
1B18000
|
heap
|
page read and write
|
||
248C000
|
trusted library allocation
|
page read and write
|
||
1377000
|
heap
|
page read and write
|
||
24C9000
|
trusted library allocation
|
page read and write
|
||
E2F000
|
stack
|
page read and write
|
||
6DE000
|
unkown
|
page readonly
|
||
1FF0000
|
trusted library allocation
|
page read and write
|
||
137A000
|
heap
|
page read and write
|
||
13A0000
|
heap
|
page read and write
|
||
3E69000
|
direct allocation
|
page read and write
|
||
4A86000
|
trusted library allocation
|
page read and write
|
||
4287000
|
heap
|
page read and write
|
||
2583000
|
trusted library allocation
|
page read and write
|
||
253F000
|
trusted library allocation
|
page read and write
|
||
526D000
|
stack
|
page read and write
|
||
3E6D000
|
direct allocation
|
page read and write
|
||
52AE000
|
stack
|
page read and write
|
||
1FD0000
|
trusted library allocation
|
page read and write
|
||
FA0000
|
heap
|
page read and write
|
||
1FD3000
|
trusted library allocation
|
page execute and read and write
|
||
23EE000
|
stack
|
page read and write
|
||
1A7A000
|
heap
|
page read and write
|
||
24C6000
|
trusted library allocation
|
page read and write
|
||
5BF0000
|
trusted library allocation
|
page read and write
|
||
1400000
|
heap
|
page read and write
|
||
1A70000
|
heap
|
page read and write
|
||
1A7E000
|
heap
|
page read and write
|
||
112F000
|
heap
|
page read and write
|
||
1940000
|
heap
|
page read and write
|
||
3EDE000
|
direct allocation
|
page read and write
|
||
5BD0000
|
trusted library allocation
|
page read and write
|
||
1123000
|
heap
|
page read and write
|
||
5BAE000
|
stack
|
page read and write
|
||
4DC000
|
heap
|
page read and write
|
||
3CC3000
|
direct allocation
|
page read and write
|
||
3600000
|
heap
|
page read and write
|
||
2595000
|
trusted library allocation
|
page read and write
|
||
5A6F000
|
stack
|
page read and write
|
||
6B2000
|
unkown
|
page readonly
|
||
1EEF000
|
stack
|
page read and write
|
||
6DE000
|
unkown
|
page readonly
|
||
1352000
|
heap
|
page read and write
|
||
1A7E000
|
heap
|
page read and write
|
||
25CB000
|
trusted library allocation
|
page read and write
|
||
1A7000
|
stack
|
page read and write
|
||
18A2000
|
heap
|
page read and write
|
||
E70000
|
heap
|
page read and write
|
||
4280000
|
direct allocation
|
page read and write
|
||
1822000
|
heap
|
page read and write
|
||
6DE000
|
unkown
|
page readonly
|
||
5F0000
|
unkown
|
page readonly
|
||
4BC0000
|
trusted library allocation
|
page read and write
|
||
3D40000
|
direct allocation
|
page read and write
|
||
3D40000
|
direct allocation
|
page read and write
|
||
25F6000
|
trusted library allocation
|
page read and write
|
||
6BC000
|
unkown
|
page read and write
|
||
6BC000
|
unkown
|
page write copy
|
||
4420000
|
direct allocation
|
page read and write
|
||
6C4000
|
unkown
|
page readonly
|
||
5F1000
|
unkown
|
page execute read
|
||
6400000
|
heap
|
page read and write
|
||
11A1000
|
heap
|
page read and write
|
||
3E6D000
|
direct allocation
|
page read and write
|
||
11A1000
|
heap
|
page read and write
|
||
24A3000
|
trusted library allocation
|
page read and write
|
||
512E000
|
stack
|
page read and write
|
||
10F0000
|
heap
|
page read and write
|
||
FFE000
|
stack
|
page read and write
|
||
4CF000
|
heap
|
page read and write
|
||
3EDE000
|
direct allocation
|
page read and write
|
||
137A000
|
heap
|
page read and write
|
||
F50000
|
heap
|
page read and write
|
||
3590000
|
direct allocation
|
page read and write
|
||
1750000
|
heap
|
page read and write
|
||
112A000
|
heap
|
page read and write
|
||
3604000
|
heap
|
page read and write
|
||
3A0E000
|
heap
|
page read and write
|
||
2486000
|
trusted library allocation
|
page read and write
|
||
490000
|
trusted library section
|
page read and write
|
||
3C04000
|
heap
|
page read and write
|
||
43A3000
|
direct allocation
|
page read and write
|
||
5BC0000
|
trusted library allocation
|
page execute and read and write
|
||
241E000
|
stack
|
page read and write
|
||
1754000
|
heap
|
page read and write
|
||
25F4000
|
trusted library allocation
|
page read and write
|
||
5F1000
|
unkown
|
page execute read
|
||
6B2000
|
unkown
|
page readonly
|
||
1A63000
|
heap
|
page read and write
|
||
3CC3000
|
direct allocation
|
page read and write
|
||
15DB000
|
stack
|
page read and write
|
||
5CEE000
|
stack
|
page read and write
|
||
1A63000
|
heap
|
page read and write
|
||
15EF000
|
stack
|
page read and write
|
||
529000
|
heap
|
page read and write
|
||
3A06000
|
heap
|
page read and write
|
||
253C000
|
trusted library allocation
|
page read and write
|
||
135D000
|
heap
|
page read and write
|
||
6C4000
|
unkown
|
page readonly
|
||
3E6D000
|
direct allocation
|
page read and write
|
||
596E000
|
stack
|
page read and write
|
||
1357000
|
heap
|
page read and write
|
||
2005000
|
trusted library allocation
|
page execute and read and write
|
||
1357000
|
heap
|
page read and write
|
||
1A70000
|
heap
|
page read and write
|
||
1122000
|
heap
|
page read and write
|
||
2007000
|
trusted library allocation
|
page execute and read and write
|
||
1A7A000
|
heap
|
page read and write
|
||
522E000
|
stack
|
page read and write
|
||
2580000
|
direct allocation
|
page read and write
|
||
24BE000
|
trusted library allocation
|
page read and write
|
||
25D5000
|
trusted library allocation
|
page read and write
|
||
200B000
|
trusted library allocation
|
page execute and read and write
|
||
1FED000
|
trusted library allocation
|
page execute and read and write
|
||
4B20000
|
trusted library allocation
|
page read and write
|
||
25DE000
|
trusted library allocation
|
page read and write
|
||
5BB6000
|
trusted library allocation
|
page read and write
|
||
1E5000
|
heap
|
page read and write
|
||
6BC000
|
unkown
|
page read and write
|
||
4A72000
|
trusted library allocation
|
page read and write
|
There are 395 hidden memdumps, click here to show them.