Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
62402781, Fiyat Teklif Talebi.pdf.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
initial sample
|
||
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\ctsdvwT.exe.log
|
ASCII text, with CRLF line terminators
|
modified
|
||
C:\Users\user\AppData\Local\Temp\Keily
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\Maianthemum
|
ASCII text, with very long lines (28690), with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\aut32DD.tmp
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\aut332C.tmp
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\aut3686.tmp
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\aut36D6.tmp
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\ctsdvwT\ctsdvwT.exe
|
PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
\Device\ConDrv
|
ASCII text, with CRLF line terminators
|
dropped
|
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\62402781, Fiyat Teklif Talebi.pdf.exe
|
"C:\Users\user\Desktop\62402781, Fiyat Teklif Talebi.pdf.exe"
|
||
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
|
"C:\Users\user\Desktop\62402781, Fiyat Teklif Talebi.pdf.exe"
|
||
C:\Users\user\Desktop\62402781, Fiyat Teklif Talebi.pdf.exe
|
"C:\Users\user\Desktop\62402781, Fiyat Teklif Talebi.pdf.exe"
|
||
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
|
"C:\Users\user\Desktop\62402781, Fiyat Teklif Talebi.pdf.exe"
|
||
C:\Users\user\AppData\Roaming\ctsdvwT\ctsdvwT.exe
|
"C:\Users\user\AppData\Roaming\ctsdvwT\ctsdvwT.exe"
|
||
C:\Users\user\AppData\Roaming\ctsdvwT\ctsdvwT.exe
|
"C:\Users\user\AppData\Roaming\ctsdvwT\ctsdvwT.exe"
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
mail.musabody.com
|
|||
https://account.dyn.com/
|
unknown
|
||
http://mail.musabody.com
|
unknown
|
Domains
Name
|
IP
|
Malicious
|
|
---|---|---|---|
mail.musabody.com
|
108.167.140.123
|
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
108.167.140.123
|
mail.musabody.com
|
United States
|
Registry
Path
|
Value
|
Malicious
|
|
---|---|---|---|
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
|
ctsdvwT
|
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
5120000
|
trusted library section
|
page read and write
|
||
400000
|
system
|
page execute and read and write
|
||
280F000
|
heap
|
page read and write
|
||
4F80000
|
trusted library section
|
page read and write
|
||
3C01000
|
trusted library allocation
|
page read and write
|
||
11F0000
|
direct allocation
|
page read and write
|
||
3CF0000
|
direct allocation
|
page read and write
|
||
86D000
|
trusted library allocation
|
page execute and read and write
|
||
88C000
|
unkown
|
page read and write
|
||
43A0000
|
direct allocation
|
page read and write
|
||
3C73000
|
direct allocation
|
page read and write
|
||
2740000
|
heap
|
page read and write
|
||
7C1000
|
unkown
|
page execute read
|
||
19CB000
|
heap
|
page read and write
|
||
882000
|
unkown
|
page readonly
|
||
8EC000
|
heap
|
page read and write
|
||
CDF000
|
heap
|
page read and write
|
||
4BA0000
|
heap
|
page execute and read and write
|
||
3E8E000
|
direct allocation
|
page read and write
|
||
B70000
|
heap
|
page read and write
|
||
1498000
|
heap
|
page read and write
|
||
12CC000
|
heap
|
page read and write
|
||
16B0000
|
trusted library allocation
|
page read and write
|
||
12E5000
|
heap
|
page read and write
|
||
1320000
|
heap
|
page read and write
|
||
2680000
|
trusted library allocation
|
page read and write
|
||
1995000
|
heap
|
page read and write
|
||
4E4E000
|
stack
|
page read and write
|
||
26EB000
|
trusted library allocation
|
page execute and read and write
|
||
1305000
|
heap
|
page read and write
|
||
26E7000
|
trusted library allocation
|
page execute and read and write
|
||
131B000
|
heap
|
page read and write
|
||
88C000
|
unkown
|
page read and write
|
||
14B5000
|
heap
|
page read and write
|
||
3CF0000
|
direct allocation
|
page read and write
|
||
9B0000
|
heap
|
page read and write
|
||
2730000
|
trusted library allocation
|
page execute and read and write
|
||
19A2000
|
heap
|
page read and write
|
||
50E0000
|
trusted library allocation
|
page read and write
|
||
131B000
|
heap
|
page read and write
|
||
4FD0000
|
heap
|
page execute and read and write
|
||
2A08000
|
trusted library allocation
|
page read and write
|
||
2751000
|
trusted library allocation
|
page read and write
|
||
13BE000
|
heap
|
page read and write
|
||
3CF0000
|
direct allocation
|
page read and write
|
||
3E8E000
|
direct allocation
|
page read and write
|
||
116A000
|
stack
|
page read and write
|
||
1508000
|
heap
|
page read and write
|
||
131B000
|
heap
|
page read and write
|
||
19CB000
|
heap
|
page read and write
|
||
672E000
|
stack
|
page read and write
|
||
7C0000
|
unkown
|
page readonly
|
||
300E000
|
stack
|
page read and write
|
||
DC0000
|
trusted library allocation
|
page read and write
|
||
19CB000
|
heap
|
page read and write
|
||
1670000
|
heap
|
page read and write
|
||
930000
|
heap
|
page read and write
|
||
131B000
|
heap
|
page read and write
|
||
6050000
|
heap
|
page read and write
|
||
1239000
|
stack
|
page read and write
|
||
1950000
|
heap
|
page read and write
|
||
85C000
|
unkown
|
page readonly
|
||
FDB000
|
stack
|
page read and write
|
||
2C7D000
|
trusted library allocation
|
page read and write
|
||
B4E000
|
stack
|
page read and write
|
||
646A000
|
stack
|
page read and write
|
||
50DE000
|
stack
|
page read and write
|
||
8DB000
|
heap
|
page read and write
|
||
1120000
|
heap
|
page read and write
|
||
160F000
|
stack
|
page read and write
|
||
12C0000
|
heap
|
page read and write
|
||
3C73000
|
direct allocation
|
page read and write
|
||
5400000
|
heap
|
page read and write
|
||
2C01000
|
trusted library allocation
|
page read and write
|
||
53DC000
|
stack
|
page read and write
|
||
26D6000
|
trusted library allocation
|
page execute and read and write
|
||
887000
|
trusted library allocation
|
page execute and read and write
|
||
26CD000
|
trusted library allocation
|
page execute and read and write
|
||
27AE000
|
stack
|
page read and write
|
||
1958000
|
heap
|
page read and write
|
||
5112000
|
trusted library allocation
|
page read and write
|
||
BAE000
|
stack
|
page read and write
|
||
C6E000
|
stack
|
page read and write
|
||
88C000
|
unkown
|
page write copy
|
||
3C73000
|
direct allocation
|
page read and write
|
||
8B8000
|
heap
|
page read and write
|
||
1985000
|
heap
|
page read and write
|
||
14BA000
|
heap
|
page read and write
|
||
27C0000
|
heap
|
page read and write
|
||
16F7000
|
trusted library allocation
|
page execute and read and write
|
||
88C000
|
unkown
|
page write copy
|
||
2C71000
|
trusted library allocation
|
page read and write
|
||
1310000
|
heap
|
page read and write
|
||
5FFE000
|
trusted library allocation
|
page read and write
|
||
CD0000
|
heap
|
page read and write
|
||
12E4000
|
heap
|
page read and write
|
||
1994000
|
heap
|
page read and write
|
||
5680000
|
trusted library allocation
|
page read and write
|
||
BEE000
|
stack
|
page read and write
|
||
890000
|
unkown
|
page write copy
|
||
3E1D000
|
direct allocation
|
page read and write
|
||
26B0000
|
trusted library allocation
|
page read and write
|
||
85D000
|
trusted library allocation
|
page execute and read and write
|
||
14F8000
|
heap
|
page read and write
|
||
5FF3000
|
trusted library allocation
|
page read and write
|
||
3080000
|
trusted library allocation
|
page execute and read and write
|
||
B65000
|
heap
|
page read and write
|
||
197D000
|
heap
|
page read and write
|
||
85C000
|
unkown
|
page readonly
|
||
6130000
|
trusted library allocation
|
page read and write
|
||
B60000
|
trusted library allocation
|
page execute and read and write
|
||
2710000
|
trusted library allocation
|
page execute and read and write
|
||
57A0000
|
heap
|
page execute and read and write
|
||
11D0000
|
heap
|
page read and write
|
||
453E000
|
direct allocation
|
page read and write
|
||
C80000
|
heap
|
page read and write
|
||
3E19000
|
direct allocation
|
page read and write
|
||
2CCA000
|
trusted library allocation
|
page read and write
|
||
1470000
|
heap
|
page read and write
|
||
2750000
|
trusted library allocation
|
page read and write
|
||
B50000
|
heap
|
page read and write
|
||
168F000
|
stack
|
page read and write
|
||
DD0000
|
heap
|
page read and write
|
||
1996000
|
heap
|
page read and write
|
||
2D32000
|
trusted library allocation
|
page read and write
|
||
6140000
|
trusted library allocation
|
page execute and read and write
|
||
3DC0000
|
heap
|
page read and write
|
||
2D46000
|
trusted library allocation
|
page read and write
|
||
3CF0000
|
direct allocation
|
page read and write
|
||
790000
|
heap
|
page read and write
|
||
2C91000
|
trusted library allocation
|
page read and write
|
||
2ADC000
|
stack
|
page read and write
|
||
162F000
|
stack
|
page read and write
|
||
7DE000
|
stack
|
page read and write
|
||
50EE000
|
trusted library allocation
|
page read and write
|
||
9AD000
|
stack
|
page read and write
|
||
12D5000
|
heap
|
page read and write
|
||
1305000
|
heap
|
page read and write
|
||
2CD3000
|
trusted library allocation
|
page read and write
|
||
553E000
|
stack
|
page read and write
|
||
11C0000
|
heap
|
page read and write
|
||
2740000
|
heap
|
page execute and read and write
|
||
7F580000
|
trusted library allocation
|
page execute and read and write
|
||
26DA000
|
trusted library allocation
|
page execute and read and write
|
||
3CF0000
|
direct allocation
|
page read and write
|
||
1996000
|
heap
|
page read and write
|
||
27B0000
|
trusted library allocation
|
page read and write
|
||
FCE000
|
stack
|
page read and write
|
||
16C4000
|
trusted library allocation
|
page read and write
|
||
29EE000
|
stack
|
page read and write
|
||
1A26000
|
heap
|
page read and write
|
||
3070000
|
trusted library allocation
|
page read and write
|
||
4200000
|
direct allocation
|
page read and write
|
||
740000
|
heap
|
page read and write
|
||
5463000
|
heap
|
page read and write
|
||
8D6000
|
heap
|
page read and write
|
||
6010000
|
trusted library allocation
|
page read and write
|
||
19CB000
|
heap
|
page read and write
|
||
3E8E000
|
direct allocation
|
page read and write
|
||
921000
|
heap
|
page read and write
|
||
1900000
|
direct allocation
|
page execute and read and write
|
||
19B5000
|
heap
|
page read and write
|
||
18D0000
|
heap
|
page read and write
|
||
864000
|
trusted library allocation
|
page read and write
|
||
3C73000
|
direct allocation
|
page read and write
|
||
890000
|
unkown
|
page write copy
|
||
261E000
|
stack
|
page read and write
|
||
2680000
|
trusted library section
|
page read and write
|
||
88B000
|
trusted library allocation
|
page execute and read and write
|
||
34A000
|
unkown
|
page readonly
|
||
26C0000
|
trusted library allocation
|
page read and write
|
||
CA0000
|
heap
|
page read and write
|
||
1A6E000
|
heap
|
page read and write
|
||
4C0E000
|
stack
|
page read and write
|
||
18F0000
|
heap
|
page read and write
|
||
12F2000
|
heap
|
page read and write
|
||
484E000
|
stack
|
page read and write
|
||
78E000
|
stack
|
page read and write
|
||
567E000
|
stack
|
page read and write
|
||
44CD000
|
direct allocation
|
page read and write
|
||
2760000
|
heap
|
page read and write
|
||
27E0000
|
heap
|
page read and write
|
||
DBC000
|
stack
|
page read and write
|
||
3804000
|
heap
|
page read and write
|
||
26A0000
|
trusted library allocation
|
page read and write
|
||
7C0000
|
unkown
|
page readonly
|
||
CE1000
|
heap
|
page read and write
|
||
92A000
|
stack
|
page read and write
|
||
32A1000
|
trusted library allocation
|
page read and write
|
||
1720000
|
heap
|
page read and write
|
||
12A0000
|
heap
|
page read and write
|
||
6A6F000
|
stack
|
page read and write
|
||
5101000
|
trusted library allocation
|
page read and write
|
||
3B50000
|
direct allocation
|
page read and write
|
||
D81000
|
heap
|
page read and write
|
||
882000
|
unkown
|
page readonly
|
||
131B000
|
heap
|
page read and write
|
||
6000000
|
trusted library allocation
|
page execute and read and write
|
||
12D4000
|
heap
|
page read and write
|
||
1315000
|
heap
|
page read and write
|
||
3DC000
|
stack
|
page read and write
|
||
894000
|
unkown
|
page readonly
|
||
304C000
|
stack
|
page read and write
|
||
D06000
|
heap
|
page read and write
|
||
2C89000
|
trusted library allocation
|
page read and write
|
||
5408000
|
heap
|
page read and write
|
||
60EE000
|
stack
|
page read and write
|
||
1974000
|
heap
|
page read and write
|
||
6F9000
|
stack
|
page read and write
|
||
323E000
|
stack
|
page read and write
|
||
4200000
|
direct allocation
|
page read and write
|
||
3E1D000
|
direct allocation
|
page read and write
|
||
1376000
|
heap
|
page read and write
|
||
3E19000
|
direct allocation
|
page read and write
|
||
26C3000
|
trusted library allocation
|
page read and write
|
||
26E0000
|
trusted library allocation
|
page read and write
|
||
62F2000
|
trusted library allocation
|
page read and write
|
||
7C8000
|
stack
|
page read and write
|
||
2700000
|
trusted library allocation
|
page read and write
|
||
A30000
|
heap
|
page read and write
|
||
3E8E000
|
direct allocation
|
page read and write
|
||
15FF000
|
stack
|
page read and write
|
||
19CB000
|
heap
|
page read and write
|
||
50FE000
|
trusted library allocation
|
page read and write
|
||
6C9000
|
stack
|
page read and write
|
||
254E000
|
stack
|
page read and write
|
||
445000
|
system
|
page execute and read and write
|
||
19CB000
|
heap
|
page read and write
|
||
D99000
|
heap
|
page read and write
|
||
4D0E000
|
stack
|
page read and write
|
||
800000
|
heap
|
page read and write
|
||
29F0000
|
heap
|
page read and write
|
||
12F2000
|
heap
|
page read and write
|
||
1E9F000
|
stack
|
page read and write
|
||
4D4E000
|
stack
|
page read and write
|
||
592E000
|
stack
|
page read and write
|
||
3E19000
|
direct allocation
|
page read and write
|
||
1376000
|
heap
|
page read and write
|
||
1994000
|
heap
|
page read and write
|
||
8CF000
|
heap
|
page read and write
|
||
662E000
|
stack
|
page read and write
|
||
4F7E000
|
stack
|
page read and write
|
||
5D3E000
|
stack
|
page read and write
|
||
3E8E000
|
direct allocation
|
page read and write
|
||
2720000
|
trusted library allocation
|
page read and write
|
||
50E4000
|
trusted library allocation
|
page read and write
|
||
2C65000
|
trusted library allocation
|
page read and write
|
||
16C3000
|
trusted library allocation
|
page execute and read and write
|
||
563E000
|
stack
|
page read and write
|
||
58EE000
|
stack
|
page read and write
|
||
12C4000
|
heap
|
page read and write
|
||
17CE000
|
stack
|
page read and write
|
||
3E19000
|
direct allocation
|
page read and write
|
||
860000
|
trusted library allocation
|
page read and write
|
||
3B50000
|
direct allocation
|
page read and write
|
||
FBF000
|
stack
|
page read and write
|
||
27D0000
|
trusted library allocation
|
page read and write
|
||
43A0000
|
direct allocation
|
page read and write
|
||
8B0000
|
heap
|
page read and write
|
||
5180000
|
trusted library allocation
|
page read and write
|
||
6020000
|
trusted library allocation
|
page read and write
|
||
342000
|
unkown
|
page readonly
|
||
44C9000
|
direct allocation
|
page read and write
|
||
3B50000
|
direct allocation
|
page read and write
|
||
7E5000
|
heap
|
page read and write
|
||
19CB000
|
heap
|
page read and write
|
||
1994000
|
heap
|
page read and write
|
||
3CC4000
|
trusted library allocation
|
page read and write
|
||
3C73000
|
direct allocation
|
page read and write
|
||
19B5000
|
heap
|
page read and write
|
||
1490000
|
heap
|
page read and write
|
||
2F0E000
|
stack
|
page read and write
|
||
106C000
|
stack
|
page read and write
|
||
197D000
|
heap
|
page read and write
|
||
26B3000
|
trusted library allocation
|
page execute and read and write
|
||
D0E000
|
heap
|
page read and write
|
||
9FE000
|
stack
|
page read and write
|
||
163F000
|
stack
|
page read and write
|
||
131B000
|
heap
|
page read and write
|
||
1301000
|
heap
|
page read and write
|
||
3B50000
|
direct allocation
|
page read and write
|
||
2BDD000
|
stack
|
page read and write
|
||
2CD0000
|
trusted library allocation
|
page read and write
|
||
16FB000
|
trusted library allocation
|
page execute and read and write
|
||
7C1000
|
unkown
|
page execute read
|
||
19B1000
|
heap
|
page read and write
|
||
1710000
|
trusted library allocation
|
page read and write
|
||
57EE000
|
stack
|
page read and write
|
||
16CD000
|
trusted library allocation
|
page execute and read and write
|
||
214E000
|
stack
|
page read and write
|
||
17D0000
|
heap
|
page read and write
|
||
19AA000
|
heap
|
page read and write
|
||
2D59000
|
trusted library allocation
|
page read and write
|
||
1376000
|
heap
|
page read and write
|
||
161B000
|
stack
|
page read and write
|
||
3E1D000
|
direct allocation
|
page read and write
|
||
2D2C000
|
trusted library allocation
|
page read and write
|
||
840000
|
trusted library allocation
|
page read and write
|
||
894000
|
unkown
|
page readonly
|
||
12A8000
|
heap
|
page read and write
|
||
62F0000
|
trusted library allocation
|
page read and write
|
||
12CC000
|
heap
|
page read and write
|
||
ABE000
|
stack
|
page read and write
|
||
426000
|
system
|
page execute and read and write
|
||
3DC4000
|
heap
|
page read and write
|
||
4F8E000
|
stack
|
page read and write
|
||
44CD000
|
direct allocation
|
page read and write
|
||
16F0000
|
trusted library allocation
|
page read and write
|
||
3CFF000
|
trusted library allocation
|
page read and write
|
||
D19000
|
heap
|
page read and write
|
||
3751000
|
trusted library allocation
|
page read and write
|
||
3E1D000
|
direct allocation
|
page read and write
|
||
26BD000
|
trusted library allocation
|
page execute and read and write
|
||
3E19000
|
direct allocation
|
page read and write
|
||
7C1000
|
unkown
|
page execute read
|
||
51A0000
|
heap
|
page read and write
|
||
1985000
|
heap
|
page read and write
|
||
960000
|
heap
|
page read and write
|
||
2764000
|
heap
|
page read and write
|
||
882000
|
unkown
|
page readonly
|
||
131B000
|
heap
|
page read and write
|
||
1A26000
|
heap
|
page read and write
|
||
19CB000
|
heap
|
page read and write
|
||
145E000
|
stack
|
page read and write
|
||
853000
|
trusted library allocation
|
page execute and read and write
|
||
7C1000
|
unkown
|
page execute read
|
||
882000
|
unkown
|
page readonly
|
||
1240000
|
heap
|
page read and write
|
||
3CF0000
|
direct allocation
|
page read and write
|
||
FEF000
|
stack
|
page read and write
|
||
D50000
|
heap
|
page read and write
|
||
3E8E000
|
direct allocation
|
page read and write
|
||
1984000
|
heap
|
page read and write
|
||
2D5F000
|
trusted library allocation
|
page read and write
|
||
4323000
|
direct allocation
|
page read and write
|
||
131B000
|
heap
|
page read and write
|
||
B60000
|
heap
|
page read and write
|
||
C2E000
|
stack
|
page read and write
|
||
5FC0000
|
trusted library allocation
|
page execute and read and write
|
||
2CC5000
|
trusted library allocation
|
page read and write
|
||
854000
|
trusted library allocation
|
page read and write
|
||
894000
|
unkown
|
page readonly
|
||
7C0000
|
unkown
|
page readonly
|
||
3060000
|
trusted library allocation
|
page read and write
|
||
D7E000
|
stack
|
page read and write
|
||
19D0000
|
heap
|
page read and write
|
||
3B50000
|
direct allocation
|
page read and write
|
||
62E0000
|
heap
|
page read and write
|
||
26E0000
|
heap
|
page execute and read and write
|
||
4E8E000
|
stack
|
page read and write
|
||
3C73000
|
direct allocation
|
page read and write
|
||
7E0000
|
heap
|
page read and write
|
||
3B50000
|
direct allocation
|
page read and write
|
||
50F2000
|
trusted library allocation
|
page read and write
|
||
16D4000
|
trusted library allocation
|
page read and write
|
||
CA8000
|
heap
|
page read and write
|
||
696F000
|
stack
|
page read and write
|
||
62FA000
|
trusted library allocation
|
page read and write
|
||
340000
|
unkown
|
page readonly
|
||
12E6000
|
heap
|
page read and write
|
||
510D000
|
trusted library allocation
|
page read and write
|
||
26B4000
|
trusted library allocation
|
page read and write
|
||
7C0000
|
unkown
|
page readonly
|
||
85C000
|
unkown
|
page readonly
|
||
FFF000
|
stack
|
page read and write
|
||
612F000
|
stack
|
page read and write
|
||
3050000
|
trusted library allocation
|
page execute and read and write
|
||
12FA000
|
heap
|
page read and write
|
||
85C000
|
unkown
|
page readonly
|
||
4323000
|
direct allocation
|
page read and write
|
||
1A9E000
|
stack
|
page read and write
|
||
453E000
|
direct allocation
|
page read and write
|
||
6300000
|
heap
|
page read and write
|
||
1A26000
|
heap
|
page read and write
|
||
50EB000
|
trusted library allocation
|
page read and write
|
||
178E000
|
stack
|
page read and write
|
||
3E1D000
|
direct allocation
|
page read and write
|
||
26D2000
|
trusted library allocation
|
page read and write
|
||
12D5000
|
heap
|
page read and write
|
||
26D0000
|
trusted library allocation
|
page read and write
|
||
3290000
|
heap
|
page execute and read and write
|
||
8D4000
|
heap
|
page read and write
|
||
5106000
|
trusted library allocation
|
page read and write
|
||
52DC000
|
stack
|
page read and write
|
||
14C7000
|
heap
|
page read and write
|
||
652E000
|
stack
|
page read and write
|
||
C7F000
|
stack
|
page read and write
|
||
5442000
|
heap
|
page read and write
|
||
130D000
|
stack
|
page read and write
|
||
2690000
|
trusted library section
|
page read and write
|
||
3E1D000
|
direct allocation
|
page read and write
|
||
2CC2000
|
trusted library allocation
|
page read and write
|
||
12B0000
|
heap
|
page read and write
|
||
2BF0000
|
heap
|
page read and write
|
||
42A1000
|
trusted library allocation
|
page read and write
|
||
3090000
|
heap
|
page read and write
|
||
26E2000
|
trusted library allocation
|
page read and write
|
||
131B000
|
heap
|
page read and write
|
||
16D0000
|
trusted library allocation
|
page read and write
|
||
577F000
|
stack
|
page read and write
|
||
5A2E000
|
stack
|
page read and write
|
||
131B000
|
heap
|
page read and write
|
||
3800000
|
heap
|
page read and write
|
||
3E19000
|
direct allocation
|
page read and write
|
||
27C6000
|
heap
|
page read and write
|
||
3CF0000
|
direct allocation
|
page read and write
|
||
894000
|
unkown
|
page readonly
|
||
636C000
|
stack
|
page read and write
|
||
2D4A000
|
trusted library allocation
|
page read and write
|
||
17F0000
|
heap
|
page read and write
|
||
44C9000
|
direct allocation
|
page read and write
|
||
19A2000
|
heap
|
page read and write
|
||
16DD000
|
trusted library allocation
|
page execute and read and write
|
||
141E000
|
stack
|
page read and write
|
||
11E0000
|
direct allocation
|
page execute and read and write
|
||
12E5000
|
heap
|
page read and write
|
||
267E000
|
stack
|
page read and write
|
There are 407 hidden memdumps, click here to show them.