Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
Leoch-Purchase Order.exe
|
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
|
initial sample
|
||
C:\Users\user\AppData\Roaming\uaAWu\uaAWu.exe
|
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\uaAWu\uaAWu.exe:Zone.Identifier
|
ASCII text, with CRLF line terminators
|
modified
|
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\Leoch-Purchase Order.exe
|
"C:\Users\user\Desktop\Leoch-Purchase Order.exe"
|
||
C:\Users\user\Desktop\Leoch-Purchase Order.exe
|
"C:\Users\user\Desktop\Leoch-Purchase Order.exe"
|
||
C:\Users\user\AppData\Roaming\uaAWu\uaAWu.exe
|
"C:\Users\user\AppData\Roaming\uaAWu\uaAWu.exe"
|
||
C:\Users\user\AppData\Roaming\uaAWu\uaAWu.exe
|
"C:\Users\user\AppData\Roaming\uaAWu\uaAWu.exe"
|
||
C:\Users\user\AppData\Roaming\uaAWu\uaAWu.exe
|
"C:\Users\user\AppData\Roaming\uaAWu\uaAWu.exe"
|
||
C:\Windows\SysWOW64\WerFault.exe
|
C:\Windows\SysWOW64\WerFault.exe -u -p 7660 -s 80
|
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
https://api.ipify.org/
|
172.67.74.152
|
||
https://api.ipify.org
|
unknown
|
||
http://mail.voivocars.com
|
unknown
|
||
http://www.microsoft.c
|
unknown
|
||
https://account.dyn.com/
|
unknown
|
||
http://microsoft.coo
|
unknown
|
||
https://api.ipify.org/t
|
unknown
|
||
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
|
unknown
|
Domains
Name
|
IP
|
Malicious
|
|
---|---|---|---|
mail.voivocars.com
|
46.175.145.107
|
||
api.ipify.org
|
172.67.74.152
|
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
46.175.145.107
|
mail.voivocars.com
|
Ukraine
|
||
172.67.74.152
|
api.ipify.org
|
United States
|
Registry
Path
|
Value
|
Malicious
|
|
---|---|---|---|
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Leoch-Purchase Order_RASAPI32
|
EnableFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Leoch-Purchase Order_RASAPI32
|
EnableAutoFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Leoch-Purchase Order_RASAPI32
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Leoch-Purchase Order_RASAPI32
|
FileTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Leoch-Purchase Order_RASAPI32
|
ConsoleTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Leoch-Purchase Order_RASAPI32
|
MaxFileSize
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Leoch-Purchase Order_RASAPI32
|
FileDirectory
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Leoch-Purchase Order_RASMANCS
|
EnableFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Leoch-Purchase Order_RASMANCS
|
EnableAutoFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Leoch-Purchase Order_RASMANCS
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Leoch-Purchase Order_RASMANCS
|
FileTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Leoch-Purchase Order_RASMANCS
|
ConsoleTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Leoch-Purchase Order_RASMANCS
|
MaxFileSize
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Leoch-Purchase Order_RASMANCS
|
FileDirectory
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
|
uaAWu
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\uaAWu_RASAPI32
|
EnableFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\uaAWu_RASAPI32
|
EnableAutoFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\uaAWu_RASAPI32
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\uaAWu_RASAPI32
|
FileTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\uaAWu_RASAPI32
|
ConsoleTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\uaAWu_RASAPI32
|
MaxFileSize
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\uaAWu_RASAPI32
|
FileDirectory
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\uaAWu_RASMANCS
|
EnableFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\uaAWu_RASMANCS
|
EnableAutoFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\uaAWu_RASMANCS
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\uaAWu_RASMANCS
|
FileTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\uaAWu_RASMANCS
|
ConsoleTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\uaAWu_RASMANCS
|
MaxFileSize
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\uaAWu_RASMANCS
|
FileDirectory
|
There are 20 hidden registries, click here to show them.
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
334C000
|
trusted library allocation
|
page read and write
|
||
2D21000
|
trusted library allocation
|
page read and write
|
||
2D4C000
|
trusted library allocation
|
page read and write
|
||
3A74000
|
trusted library allocation
|
page read and write
|
||
436000
|
remote allocation
|
page execute and read and write
|
||
4F60000
|
direct allocation
|
page execute and read and write
|
||
3321000
|
trusted library allocation
|
page read and write
|
||
F42000
|
trusted library allocation
|
page read and write
|
||
3311000
|
trusted library allocation
|
page read and write
|
||
1440000
|
heap
|
page read and write
|
||
CF4000
|
trusted library allocation
|
page read and write
|
||
F30000
|
trusted library allocation
|
page read and write
|
||
67D0000
|
trusted library allocation
|
page read and write
|
||
6F4D000
|
stack
|
page read and write
|
||
514E000
|
stack
|
page read and write
|
||
7050000
|
trusted library allocation
|
page read and write
|
||
D17000
|
trusted library allocation
|
page execute and read and write
|
||
6A0F000
|
stack
|
page read and write
|
||
D2D000
|
heap
|
page read and write
|
||
32D1000
|
trusted library allocation
|
page read and write
|
||
895000
|
heap
|
page read and write
|
||
1892000
|
trusted library allocation
|
page read and write
|
||
6660000
|
trusted library allocation
|
page read and write
|
||
F47000
|
trusted library allocation
|
page execute and read and write
|
||
1528000
|
heap
|
page read and write
|
||
5150000
|
heap
|
page read and write
|
||
3D3C000
|
trusted library allocation
|
page read and write
|
||
6F00000
|
trusted library allocation
|
page read and write
|
||
6C4E000
|
stack
|
page read and write
|
||
A7D000
|
trusted library allocation
|
page execute and read and write
|
||
7F100000
|
trusted library allocation
|
page execute and read and write
|
||
545E000
|
stack
|
page read and write
|
||
CF0000
|
trusted library allocation
|
page read and write
|
||
D28000
|
heap
|
page read and write
|
||
325E000
|
trusted library allocation
|
page read and write
|
||
F1D000
|
trusted library allocation
|
page execute and read and write
|
||
D1B000
|
trusted library allocation
|
page execute and read and write
|
||
6F70000
|
trusted library allocation
|
page execute and read and write
|
||
383B000
|
trusted library allocation
|
page read and write
|
||
572D000
|
stack
|
page read and write
|
||
79A000
|
stack
|
page read and write
|
||
402000
|
remote allocation
|
page execute and read and write
|
||
6B90000
|
heap
|
page read and write
|
||
68CE000
|
stack
|
page read and write
|
||
18C0000
|
trusted library allocation
|
page read and write
|
||
1874000
|
trusted library allocation
|
page read and write
|
||
3A71000
|
trusted library allocation
|
page read and write
|
||
3CD1000
|
trusted library allocation
|
page read and write
|
||
3354000
|
trusted library allocation
|
page read and write
|
||
25B0000
|
heap
|
page execute and read and write
|
||
17A0000
|
trusted library allocation
|
page read and write
|
||
5031000
|
trusted library allocation
|
page read and write
|
||
1380000
|
heap
|
page read and write
|
||
F50000
|
trusted library allocation
|
page read and write
|
||
501B000
|
trusted library allocation
|
page read and write
|
||
1870000
|
trusted library allocation
|
page read and write
|
||
3346000
|
trusted library allocation
|
page read and write
|
||
6A20000
|
heap
|
page read and write
|
||
335C000
|
trusted library allocation
|
page read and write
|
||
52D8000
|
trusted library allocation
|
page read and write
|
||
528F000
|
stack
|
page read and write
|
||
A9A000
|
trusted library allocation
|
page execute and read and write
|
||
1960000
|
trusted library allocation
|
page execute and read and write
|
||
5820000
|
heap
|
page read and write
|
||
6DCE000
|
stack
|
page read and write
|
||
1896000
|
trusted library allocation
|
page execute and read and write
|
||
65C000
|
stack
|
page read and write
|
||
163E000
|
stack
|
page read and write
|
||
F14000
|
trusted library allocation
|
page read and write
|
||
1670000
|
heap
|
page read and write
|
||
5070000
|
heap
|
page read and write
|
||
6AA2000
|
heap
|
page read and write
|
||
18A5000
|
trusted library allocation
|
page execute and read and write
|
||
3876000
|
trusted library allocation
|
page read and write
|
||
A84000
|
trusted library allocation
|
page read and write
|
||
1480000
|
heap
|
page read and write
|
||
299E000
|
stack
|
page read and write
|
||
CE0000
|
trusted library allocation
|
page read and write
|
||
18A2000
|
trusted library allocation
|
page read and write
|
||
6A2F000
|
heap
|
page read and write
|
||
A74000
|
trusted library allocation
|
page read and write
|
||
279E000
|
trusted library allocation
|
page read and write
|
||
6F07000
|
trusted library allocation
|
page read and write
|
||
559E000
|
stack
|
page read and write
|
||
5022000
|
trusted library allocation
|
page read and write
|
||
1339000
|
stack
|
page read and write
|
||
BFF000
|
stack
|
page read and write
|
||
14F7000
|
heap
|
page read and write
|
||
AF9000
|
stack
|
page read and write
|
||
F40000
|
trusted library allocation
|
page execute and read and write
|
||
32B0000
|
heap
|
page execute and read and write
|
||
D60000
|
heap
|
page read and write
|
||
A60000
|
trusted library allocation
|
page read and write
|
||
42F9000
|
trusted library allocation
|
page read and write
|
||
AF0000
|
heap
|
page read and write
|
||
CC6000
|
heap
|
page read and write
|
||
1390000
|
heap
|
page read and write
|
||
6D2000
|
unkown
|
page readonly
|
||
67E0000
|
trusted library allocation
|
page read and write
|
||
66E0000
|
trusted library allocation
|
page execute and read and write
|
||
648E000
|
stack
|
page read and write
|
||
549F000
|
stack
|
page read and write
|
||
D40000
|
heap
|
page read and write
|
||
F32000
|
trusted library allocation
|
page read and write
|
||
F07000
|
heap
|
page read and write
|
||
518E000
|
stack
|
page read and write
|
||
F13000
|
trusted library allocation
|
page execute and read and write
|
||
BE0000
|
heap
|
page read and write
|
||
433000
|
remote allocation
|
page execute and read and write
|
||
F4B000
|
trusted library allocation
|
page execute and read and write
|
||
1530000
|
heap
|
page read and write
|
||
18A7000
|
trusted library allocation
|
page execute and read and write
|
||
326A000
|
trusted library allocation
|
page read and write
|
||
6F60000
|
trusted library allocation
|
page execute and read and write
|
||
3276000
|
trusted library allocation
|
page read and write
|
||
1650000
|
trusted library allocation
|
page read and write
|
||
6670000
|
trusted library allocation
|
page read and write
|
||
1520000
|
heap
|
page read and write
|
||
3250000
|
trusted library allocation
|
page read and write
|
||
26C1000
|
trusted library allocation
|
page read and write
|
||
D10000
|
heap
|
page read and write
|
||
6EF7000
|
trusted library allocation
|
page read and write
|
||
514E000
|
stack
|
page read and write
|
||
C90000
|
heap
|
page read and write
|
||
D20000
|
heap
|
page read and write
|
||
3271000
|
trusted library allocation
|
page read and write
|
||
6A10000
|
heap
|
page read and write
|
||
152C000
|
stack
|
page read and write
|
||
4BAE000
|
stack
|
page read and write
|
||
6EF0000
|
trusted library allocation
|
page read and write
|
||
2D48000
|
trusted library allocation
|
page read and write
|
||
B00000
|
heap
|
page read and write
|
||
1420000
|
heap
|
page read and write
|
||
F3A000
|
trusted library allocation
|
page execute and read and write
|
||
CE4000
|
trusted library allocation
|
page read and write
|
||
5010000
|
trusted library allocation
|
page read and write
|
||
19A0000
|
heap
|
page read and write
|
||
890000
|
heap
|
page read and write
|
||
C10000
|
heap
|
page read and write
|
||
3290000
|
trusted library allocation
|
page read and write
|
||
F70000
|
heap
|
page read and write
|
||
14B5000
|
heap
|
page read and write
|
||
32C0000
|
heap
|
page read and write
|
||
8A0000
|
heap
|
page read and write
|
||
664F000
|
stack
|
page read and write
|
||
330F000
|
trusted library allocation
|
page read and write
|
||
FBE000
|
stack
|
page read and write
|
||
19A7000
|
heap
|
page read and write
|
||
F36000
|
trusted library allocation
|
page execute and read and write
|
||
2570000
|
direct allocation
|
page execute and read and write
|
||
6F50000
|
heap
|
page read and write
|
||
1860000
|
trusted library allocation
|
page read and write
|
||
5CEE000
|
stack
|
page read and write
|
||
8EE000
|
stack
|
page read and write
|
||
188D000
|
trusted library allocation
|
page execute and read and write
|
||
1980000
|
trusted library allocation
|
page read and write
|
||
51CC000
|
stack
|
page read and write
|
||
545E000
|
stack
|
page read and write
|
||
5A2C000
|
stack
|
page read and write
|
||
2D4A000
|
trusted library allocation
|
page read and write
|
||
3800000
|
trusted library allocation
|
page read and write
|
||
654E000
|
stack
|
page read and write
|
||
940000
|
heap
|
page read and write
|
||
EF0000
|
trusted library allocation
|
page read and write
|
||
5823000
|
heap
|
page read and write
|
||
D4B000
|
heap
|
page read and write
|
||
14AA000
|
heap
|
page read and write
|
||
6EFD000
|
trusted library allocation
|
page read and write
|
||
6ECE000
|
stack
|
page read and write
|
||
435000
|
remote allocation
|
page execute and read and write
|
||
4F7E000
|
stack
|
page read and write
|
||
3307000
|
trusted library allocation
|
page read and write
|
||
9C2000
|
heap
|
page read and write
|
||
1445000
|
heap
|
page read and write
|
||
980000
|
heap
|
page read and write
|
||
502A000
|
trusted library allocation
|
page read and write
|
||
6EF5000
|
trusted library allocation
|
page read and write
|
||
667D000
|
trusted library allocation
|
page read and write
|
||
D62000
|
heap
|
page read and write
|
||
75D000
|
stack
|
page read and write
|
||
DA5000
|
heap
|
page read and write
|
||
6687000
|
trusted library allocation
|
page read and write
|
||
AAB000
|
trusted library allocation
|
page execute and read and write
|
||
324F000
|
stack
|
page read and write
|
||
433D000
|
trusted library allocation
|
page read and write
|
||
5B6F000
|
stack
|
page read and write
|
||
189A000
|
trusted library allocation
|
page execute and read and write
|
||
255D000
|
stack
|
page read and write
|
||
D3E000
|
stack
|
page read and write
|
||
1873000
|
trusted library allocation
|
page execute and read and write
|
||
D1E000
|
heap
|
page read and write
|
||
36C4000
|
trusted library allocation
|
page read and write
|
||
1794000
|
trusted library allocation
|
page read and write
|
||
B20000
|
heap
|
page read and write
|
||
518D000
|
stack
|
page read and write
|
||
502E000
|
trusted library allocation
|
page read and write
|
||
D65000
|
heap
|
page read and write
|
||
66CE000
|
stack
|
page read and write
|
||
606E000
|
stack
|
page read and write
|
||
D70000
|
heap
|
page read and write
|
||
2D46000
|
trusted library allocation
|
page read and write
|
||
4DFE000
|
stack
|
page read and write
|
||
F00000
|
heap
|
page read and write
|
||
3CF9000
|
trusted library allocation
|
page read and write
|
||
26BE000
|
stack
|
page read and write
|
||
759000
|
stack
|
page read and write
|
||
67E7000
|
trusted library allocation
|
page read and write
|
||
6499000
|
heap
|
page read and write
|
||
7054000
|
trusted library allocation
|
page read and write
|
||
18AB000
|
trusted library allocation
|
page execute and read and write
|
||
D47000
|
heap
|
page read and write
|
||
4AAE000
|
stack
|
page read and write
|
||
325B000
|
trusted library allocation
|
page read and write
|
||
F2D000
|
trusted library allocation
|
page execute and read and write
|
||
65C000
|
stack
|
page read and write
|
||
5050000
|
heap
|
page read and write
|
||
1790000
|
trusted library allocation
|
page read and write
|
||
400000
|
remote allocation
|
page execute and read and write
|
||
1890000
|
trusted library allocation
|
page read and write
|
||
4FE0000
|
trusted library allocation
|
page read and write
|
||
57EC000
|
stack
|
page read and write
|
||
1458000
|
trusted library allocation
|
page read and write
|
||
5DD0000
|
heap
|
page read and write
|
||
503D000
|
trusted library allocation
|
page read and write
|
||
7B0000
|
heap
|
page read and write
|
||
5042000
|
trusted library allocation
|
page read and write
|
||
CBA000
|
heap
|
page read and write
|
||
A80000
|
trusted library allocation
|
page read and write
|
||
327D000
|
trusted library allocation
|
page read and write
|
||
7420000
|
trusted library allocation
|
page execute and read and write
|
||
690E000
|
stack
|
page read and write
|
||
AD0000
|
trusted library allocation
|
page execute and read and write
|
||
2A71000
|
trusted library allocation
|
page read and write
|
||
CAE000
|
heap
|
page read and write
|
||
CD0000
|
trusted library allocation
|
page read and write
|
||
94E000
|
heap
|
page read and write
|
||
10FF000
|
stack
|
page read and write
|
||
2D0F000
|
trusted library allocation
|
page read and write
|
||
5052000
|
heap
|
page read and write
|
||
4CA0000
|
trusted library allocation
|
page read and write
|
||
195C000
|
stack
|
page read and write
|
||
7067000
|
trusted library allocation
|
page read and write
|
||
1970000
|
trusted library allocation
|
page read and write
|
||
73D0000
|
trusted library allocation
|
page read and write
|
||
507E000
|
stack
|
page read and write
|
||
AF9000
|
stack
|
page read and write
|
||
1640000
|
trusted library allocation
|
page execute and read and write
|
||
528D000
|
stack
|
page read and write
|
||
187D000
|
trusted library allocation
|
page execute and read and write
|
||
1555000
|
heap
|
page read and write
|
||
D37000
|
heap
|
page read and write
|
||
FF0000
|
heap
|
page read and write
|
||
6A60000
|
heap
|
page read and write
|
||
144E000
|
stack
|
page read and write
|
||
678E000
|
stack
|
page read and write
|
||
948000
|
heap
|
page read and write
|
||
6D8E000
|
stack
|
page read and write
|
||
555E000
|
stack
|
page read and write
|
||
1680000
|
heap
|
page execute and read and write
|
||
5DAD000
|
stack
|
page read and write
|
||
334A000
|
trusted library allocation
|
page read and write
|
||
62EE000
|
stack
|
page read and write
|
||
546E000
|
stack
|
page read and write
|
||
422000
|
remote allocation
|
page execute and read and write
|
||
6BA0000
|
trusted library allocation
|
page execute and read and write
|
||
5BAE000
|
stack
|
page read and write
|
||
1559000
|
heap
|
page read and write
|
||
149E000
|
heap
|
page read and write
|
||
974000
|
heap
|
page read and write
|
||
6EE0000
|
trusted library allocation
|
page read and write
|
||
6680000
|
trusted library allocation
|
page read and write
|
||
5016000
|
trusted library allocation
|
page read and write
|
||
A73000
|
trusted library allocation
|
page execute and read and write
|
||
1990000
|
trusted library allocation
|
page read and write
|
||
52CE000
|
stack
|
page read and write
|
||
64B5000
|
heap
|
page read and write
|
||
D2E000
|
heap
|
page read and write
|
||
CC8000
|
heap
|
page read and write
|
||
F60000
|
heap
|
page read and write
|
||
CFF000
|
stack
|
page read and write
|
||
569E000
|
stack
|
page read and write
|
||
66F0000
|
trusted library allocation
|
page execute and read and write
|
||
14B7000
|
heap
|
page read and write
|
||
2D5C000
|
trusted library allocation
|
page read and write
|
||
602E000
|
stack
|
page read and write
|
||
326E000
|
trusted library allocation
|
page read and write
|
||
18A0000
|
trusted library allocation
|
page read and write
|
||
61AE000
|
stack
|
page read and write
|
||
504E000
|
stack
|
page read and write
|
||
1673000
|
heap
|
page read and write
|
||
123A000
|
stack
|
page read and write
|
||
F1E000
|
stack
|
page read and write
|
||
6B50000
|
trusted library allocation
|
page read and write
|
||
66D0000
|
heap
|
page read and write
|
||
3762000
|
trusted library allocation
|
page read and write
|
||
190E000
|
stack
|
page read and write
|
||
5CAE000
|
stack
|
page read and write
|
||
5A6E000
|
stack
|
page read and write
|
||
531E000
|
stack
|
page read and write
|
||
6A95000
|
heap
|
page read and write
|
||
B30000
|
heap
|
page read and write
|
||
1880000
|
trusted library allocation
|
page read and write
|
||
62AE000
|
stack
|
page read and write
|
||
2D11000
|
trusted library allocation
|
page read and write
|
||
F45000
|
trusted library allocation
|
page execute and read and write
|
||
1400000
|
trusted library allocation
|
page read and write
|
||
2D1D000
|
trusted library allocation
|
page read and write
|
||
C98000
|
heap
|
page read and write
|
||
8C0000
|
heap
|
page read and write
|
||
FD0000
|
heap
|
page read and write
|
||
6ABB000
|
heap
|
page read and write
|
||
2CD1000
|
trusted library allocation
|
page read and write
|
||
1910000
|
heap
|
page execute and read and write
|
||
6A62000
|
heap
|
page read and write
|
||
7410000
|
heap
|
page read and write
|
||
96C000
|
heap
|
page read and write
|
||
1488000
|
heap
|
page read and write
|
||
6B4E000
|
stack
|
page read and write
|
||
AA7000
|
trusted library allocation
|
page execute and read and write
|
||
43E000
|
remote allocation
|
page execute and read and write
|
||
7060000
|
trusted library allocation
|
page read and write
|
||
1450000
|
heap
|
page read and write
|
||
616E000
|
stack
|
page read and write
|
||
36C1000
|
trusted library allocation
|
page read and write
|
||
4F3E000
|
stack
|
page read and write
|
||
6452000
|
heap
|
page read and write
|
||
6EE8000
|
trusted library allocation
|
page read and write
|
||
75B0000
|
heap
|
page read and write
|
||
155F000
|
heap
|
page read and write
|
||
AE0000
|
trusted library allocation
|
page read and write
|
||
541E000
|
stack
|
page read and write
|
||
7BC000
|
stack
|
page read and write
|
||
4CFE000
|
stack
|
page read and write
|
||
5830000
|
heap
|
page read and write
|
||
F10000
|
trusted library allocation
|
page read and write
|
||
63EE000
|
stack
|
page read and write
|
||
421000
|
remote allocation
|
page execute and read and write
|
||
501E000
|
trusted library allocation
|
page read and write
|
||
C9E000
|
stack
|
page read and write
|
||
530E000
|
stack
|
page read and write
|
||
F20000
|
trusted library allocation
|
page read and write
|
||
6410000
|
heap
|
page read and write
|
||
6414000
|
heap
|
page read and write
|
||
4E3E000
|
stack
|
page read and write
|
||
485D000
|
stack
|
page read and write
|
||
73E0000
|
trusted library allocation
|
page read and write
|
||
CE3000
|
trusted library allocation
|
page execute and read and write
|
||
1796000
|
trusted library allocation
|
page read and write
|
||
510D000
|
stack
|
page read and write
|
||
52CE000
|
stack
|
page read and write
|
||
2D07000
|
trusted library allocation
|
page read and write
|
||
1660000
|
trusted library allocation
|
page read and write
|
||
5730000
|
heap
|
page read and write
|
||
1553000
|
heap
|
page read and write
|
||
FC0000
|
direct allocation
|
page execute and read and write
|
||
C30000
|
heap
|
page read and write
|
||
2D54000
|
trusted library allocation
|
page read and write
|
||
D48000
|
heap
|
page read and write
|
||
6D0000
|
unkown
|
page readonly
|
||
423000
|
remote allocation
|
page execute and read and write
|
||
A70000
|
trusted library allocation
|
page read and write
|
||
53CF000
|
stack
|
page read and write
|
||
42D1000
|
trusted library allocation
|
page read and write
|
||
700F000
|
stack
|
page read and write
|
||
3348000
|
trusted library allocation
|
page read and write
|
||
7FA40000
|
trusted library allocation
|
page execute and read and write
|
||
331D000
|
trusted library allocation
|
page read and write
|
||
6C8E000
|
stack
|
page read and write
|
||
2A60000
|
heap
|
page execute and read and write
|
||
6668000
|
trusted library allocation
|
page read and write
|
||
5060000
|
heap
|
page read and write
|
||
D0A000
|
trusted library allocation
|
page execute and read and write
|
||
3262000
|
trusted library allocation
|
page read and write
|
||
5036000
|
trusted library allocation
|
page read and write
|
||
D54000
|
heap
|
page read and write
|
||
4FF0000
|
heap
|
page execute and read and write
|
||
6D90000
|
heap
|
page read and write
|
||
178E000
|
stack
|
page read and write
|
||
6B60000
|
trusted library allocation
|
page read and write
|
||
25A0000
|
heap
|
page execute and read and write
|
||
5180000
|
heap
|
page execute and read and write
|
||
C5E000
|
stack
|
page read and write
|
||
52CC000
|
stack
|
page read and write
|
||
CED000
|
trusted library allocation
|
page execute and read and write
|
||
92E000
|
stack
|
page read and write
|
||
434000
|
remote allocation
|
page execute and read and write
|
There are 376 hidden memdumps, click here to show them.