Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
SecuriteInfo.com.Win32.Banker-KIY.4860.1529.dll
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
initial sample
|
||
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_loaddll32.exe_ade2b41f16419841b7681477367dc14c3ee5ff6_952b8cde_78f6c6c3-ce07-45d0-bbd3-28b584ec73b1\Report.wer
|
Unicode text, UTF-16, little-endian text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_rundll32.exe_12d8b24ba337c4ffbc38bf67051b9f5e887f0_7522e4b5_200081de-f619-4ff5-a760-c1c16c82cd18\Report.wer
|
Unicode text, UTF-16, little-endian text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_rundll32.exe_12d8b24ba337c4ffbc38bf67051b9f5e887f0_7522e4b5_32b9c012-95e5-4329-97a3-e8b7df62eeb0\Report.wer
|
Unicode text, UTF-16, little-endian text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_rundll32.exe_12d8b24ba337c4ffbc38bf67051b9f5e887f0_7522e4b5_4e2f0bdc-2317-4671-b0a7-c3f9366c0101\Report.wer
|
Unicode text, UTF-16, little-endian text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_rundll32.exe_12d8b24ba337c4ffbc38bf67051b9f5e887f0_7522e4b5_f33b0487-2229-4e94-9fab-311b80f1fa3e\Report.wer
|
Unicode text, UTF-16, little-endian text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WERB352.tmp.dmp
|
Mini DuMP crash report, 14 streams, Thu Apr 25 03:35:45 2024, 0x1205a4 type
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WERB518.tmp.WERInternalMetadata.xml
|
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WERB548.tmp.xml
|
XML 1.0 document, ASCII text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WERBF77.tmp.dmp
|
Mini DuMP crash report, 14 streams, Thu Apr 25 03:35:48 2024, 0x1205a4 type
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WERC014.tmp.WERInternalMetadata.xml
|
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WERC054.tmp.xml
|
XML 1.0 document, ASCII text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WERCAC2.tmp.dmp
|
Mini DuMP crash report, 14 streams, Thu Apr 25 03:35:51 2024, 0x1205a4 type
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WERCB9D.tmp.WERInternalMetadata.xml
|
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WERCBCD.tmp.xml
|
XML 1.0 document, ASCII text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WERE956.tmp.dmp
|
Mini DuMP crash report, 14 streams, Thu Apr 25 03:35:59 2024, 0x1205a4 type
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WEREA03.tmp.WERInternalMetadata.xml
|
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WEREA32.tmp.xml
|
XML 1.0 document, ASCII text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WERF377.tmp.dmp
|
Mini DuMP crash report, 15 streams, Thu Apr 25 03:36:02 2024, 0x1205a4 type
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WERF3F5.tmp.WERInternalMetadata.xml
|
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WERF435.tmp.xml
|
XML 1.0 document, ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Windows\appcompat\Programs\Amcache.hve
|
MS Windows registry file, NT/2000 or above
|
dropped
|
There are 12 hidden files, click here to show them.
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Windows\System32\loaddll32.exe
|
loaddll32.exe "C:\Users\user\Desktop\SecuriteInfo.com.Win32.Banker-KIY.4860.1529.dll"
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\SysWOW64\cmd.exe
|
cmd.exe /C rundll32.exe "C:\Users\user\Desktop\SecuriteInfo.com.Win32.Banker-KIY.4860.1529.dll",#1
|
||
C:\Windows\SysWOW64\rundll32.exe
|
rundll32.exe C:\Users\user\Desktop\SecuriteInfo.com.Win32.Banker-KIY.4860.1529.dll,_??? 3 D
|
||
C:\Windows\SysWOW64\rundll32.exe
|
rundll32.exe "C:\Users\user\Desktop\SecuriteInfo.com.Win32.Banker-KIY.4860.1529.dll",#1
|
||
C:\Windows\SysWOW64\rundll32.exe
|
rundll32.exe C:\Users\user\Desktop\SecuriteInfo.com.Win32.Banker-KIY.4860.1529.dll,tyjyxethae
|
||
C:\Windows\SysWOW64\WerFault.exe
|
C:\Windows\SysWOW64\WerFault.exe -u -p 6344 -s 704
|
||
C:\Windows\SysWOW64\rundll32.exe
|
rundll32.exe C:\Users\user\Desktop\SecuriteInfo.com.Win32.Banker-KIY.4860.1529.dll, 3 D 2
|
||
C:\Windows\SysWOW64\WerFault.exe
|
C:\Windows\SysWOW64\WerFault.exe -u -p 4024 -s 700
|
||
C:\Windows\SysWOW64\WerFault.exe
|
C:\Windows\SysWOW64\WerFault.exe -u -p 6640 -s 704
|
||
C:\Windows\SysWOW64\WerFault.exe
|
C:\Windows\SysWOW64\WerFault.exe -u -p 1200 -s 696
|
||
C:\Windows\SysWOW64\WerFault.exe
|
C:\Windows\SysWOW64\WerFault.exe -u -p 5660 -s 632
|
There are 2 hidden processes, click here to show them.
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
http://i.sohu.com/p/=v2=NcBj5kbxSDk2zNM3Q20=/blog/view/252468084.htm
|
unknown
|
||
http://www.baidu.com/s?wd=CF%E7%B2%89%E7%BA%A2%E8%BE%85%E5%8A%A9&rsv_bp=0&ch=&tn=baidu&bar=&rsv_spt=
|
unknown
|
||
http://upx.sf.net
|
unknown
|
||
http://www.kmy0823.com
|
unknown
|
||
http://i.sohu.com/p/=v2=NcBj5kbxSDk2zNM3Q20=/blog/view/252468084.htm)
|
unknown
|
||
http://www.baidu.com/s?ie=utf-8&bs=CF%E7%B2%89%E7%BA%A2%E8%BE%85%E5%8A%A9&f=8&rsv_bp=1&rsv_spt=3&wd=
|
unknown
|
||
http://www.baidu.com/s?wd=cf%E7%B2%89%E7%BA%A2&rsv_bp=0&ch=&tn=baidu&bar=&rsv_spt=3&ie=utf-8&rsv_sug
|
unknown
|
Registry
Path
|
Value
|
Malicious
|
|
---|---|---|---|
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{430185AB-D8FA-E8A0-AB85-0143FAD8A0E8}
|
NULL
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{430185AB-D8FA-E8A0-AB85-0143FAD8A0E8}
|
NULL
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{430185AB-D8FA-E8A0-AB85-0143FAD8A0E8}
|
NULL
|
||
\REGISTRY\A\{e80d0f99-4502-a8ae-8178-23af111d4a12}\Root\InventoryApplicationFile\rundll32.exe|ccf370e740f0e788
|
ProgramId
|
||
\REGISTRY\A\{e80d0f99-4502-a8ae-8178-23af111d4a12}\Root\InventoryApplicationFile\rundll32.exe|ccf370e740f0e788
|
FileId
|
||
\REGISTRY\A\{e80d0f99-4502-a8ae-8178-23af111d4a12}\Root\InventoryApplicationFile\rundll32.exe|ccf370e740f0e788
|
LowerCaseLongPath
|
||
\REGISTRY\A\{e80d0f99-4502-a8ae-8178-23af111d4a12}\Root\InventoryApplicationFile\rundll32.exe|ccf370e740f0e788
|
LongPathHash
|
||
\REGISTRY\A\{e80d0f99-4502-a8ae-8178-23af111d4a12}\Root\InventoryApplicationFile\rundll32.exe|ccf370e740f0e788
|
Name
|
||
\REGISTRY\A\{e80d0f99-4502-a8ae-8178-23af111d4a12}\Root\InventoryApplicationFile\rundll32.exe|ccf370e740f0e788
|
OriginalFileName
|
||
\REGISTRY\A\{e80d0f99-4502-a8ae-8178-23af111d4a12}\Root\InventoryApplicationFile\rundll32.exe|ccf370e740f0e788
|
Publisher
|
||
\REGISTRY\A\{e80d0f99-4502-a8ae-8178-23af111d4a12}\Root\InventoryApplicationFile\rundll32.exe|ccf370e740f0e788
|
Version
|
||
\REGISTRY\A\{e80d0f99-4502-a8ae-8178-23af111d4a12}\Root\InventoryApplicationFile\rundll32.exe|ccf370e740f0e788
|
BinFileVersion
|
||
\REGISTRY\A\{e80d0f99-4502-a8ae-8178-23af111d4a12}\Root\InventoryApplicationFile\rundll32.exe|ccf370e740f0e788
|
BinaryType
|
||
\REGISTRY\A\{e80d0f99-4502-a8ae-8178-23af111d4a12}\Root\InventoryApplicationFile\rundll32.exe|ccf370e740f0e788
|
ProductName
|
||
\REGISTRY\A\{e80d0f99-4502-a8ae-8178-23af111d4a12}\Root\InventoryApplicationFile\rundll32.exe|ccf370e740f0e788
|
ProductVersion
|
||
\REGISTRY\A\{e80d0f99-4502-a8ae-8178-23af111d4a12}\Root\InventoryApplicationFile\rundll32.exe|ccf370e740f0e788
|
LinkDate
|
||
\REGISTRY\A\{e80d0f99-4502-a8ae-8178-23af111d4a12}\Root\InventoryApplicationFile\rundll32.exe|ccf370e740f0e788
|
BinProductVersion
|
||
\REGISTRY\A\{e80d0f99-4502-a8ae-8178-23af111d4a12}\Root\InventoryApplicationFile\rundll32.exe|ccf370e740f0e788
|
AppxPackageFullName
|
||
\REGISTRY\A\{e80d0f99-4502-a8ae-8178-23af111d4a12}\Root\InventoryApplicationFile\rundll32.exe|ccf370e740f0e788
|
AppxPackageRelativeId
|
||
\REGISTRY\A\{e80d0f99-4502-a8ae-8178-23af111d4a12}\Root\InventoryApplicationFile\rundll32.exe|ccf370e740f0e788
|
Size
|
||
\REGISTRY\A\{e80d0f99-4502-a8ae-8178-23af111d4a12}\Root\InventoryApplicationFile\rundll32.exe|ccf370e740f0e788
|
Language
|
||
\REGISTRY\A\{e80d0f99-4502-a8ae-8178-23af111d4a12}\Root\InventoryApplicationFile\rundll32.exe|ccf370e740f0e788
|
IsOsComponent
|
||
\REGISTRY\A\{e80d0f99-4502-a8ae-8178-23af111d4a12}\Root\InventoryApplicationFile\rundll32.exe|ccf370e740f0e788
|
Usn
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{430185AB-D8FA-E8A0-AB85-0143FAD8A0E8}
|
NULL
|
There are 14 hidden registries, click here to show them.
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
2990000
|
heap
|
page read and write
|
||
3090000
|
heap
|
page read and write
|
||
5080000
|
heap
|
page read and write
|
||
2A40000
|
heap
|
page read and write
|
||
4A3B000
|
direct allocation
|
page read and write
|
||
4955000
|
direct allocation
|
page read and write
|
||
44E9000
|
direct allocation
|
page read and write
|
||
2F65000
|
heap
|
page read and write
|
||
3120000
|
heap
|
page read and write
|
||
301E000
|
stack
|
page read and write
|
||
4975000
|
direct allocation
|
page read and write
|
||
D7A000
|
heap
|
page read and write
|
||
2DE0000
|
heap
|
page read and write
|
||
BD0000
|
heap
|
page read and write
|
||
2E84000
|
heap
|
page read and write
|
||
306E000
|
heap
|
page read and write
|
||
2EB0000
|
heap
|
page read and write
|
||
4AD8000
|
direct allocation
|
page read and write
|
||
3075000
|
heap
|
page read and write
|
||
2C59000
|
stack
|
page read and write
|
||
5054000
|
heap
|
page read and write
|
||
44A5000
|
direct allocation
|
page read and write
|
||
2902000
|
direct allocation
|
page read and write
|
||
496F000
|
stack
|
page read and write
|
||
4AFD000
|
direct allocation
|
page read and write
|
||
4F24000
|
heap
|
page read and write
|
||
309E000
|
stack
|
page read and write
|
||
2ABF000
|
heap
|
page read and write
|
||
5084000
|
heap
|
page read and write
|
||
4930000
|
direct allocation
|
page read and write
|
||
4A90000
|
direct allocation
|
page read and write
|
||
2AB7000
|
heap
|
page read and write
|
||
B5C000
|
stack
|
page read and write
|
||
44E2000
|
direct allocation
|
page read and write
|
||
330E000
|
stack
|
page read and write
|
||
30EE000
|
heap
|
page read and write
|
||
2A00000
|
heap
|
page read and write
|
||
2F60000
|
heap
|
page read and write
|
||
457F000
|
stack
|
page read and write
|
||
44BC000
|
direct allocation
|
page read and write
|
||
4AD2000
|
direct allocation
|
page read and write
|
||
3076000
|
heap
|
page read and write
|
||
2F2E000
|
heap
|
page read and write
|
||
49B2000
|
direct allocation
|
page read and write
|
||
30A0000
|
heap
|
page read and write
|
||
2E59000
|
stack
|
page read and write
|
||
2AC4000
|
heap
|
page read and write
|
||
2F31000
|
heap
|
page read and write
|
||
4A97000
|
direct allocation
|
page read and write
|
||
3110000
|
heap
|
page read and write
|
||
2917000
|
direct allocation
|
page read and write
|
||
2A90000
|
heap
|
page read and write
|
||
49EC000
|
direct allocation
|
page read and write
|
||
D20000
|
heap
|
page read and write
|
||
107F000
|
stack
|
page read and write
|
||
2F28000
|
heap
|
page read and write
|
||
C40000
|
heap
|
page read and write
|
||
6110000
|
heap
|
page read and write
|
||
4B28000
|
direct allocation
|
page read and write
|
||
4A3E000
|
direct allocation
|
page read and write
|
||
4AEF000
|
direct allocation
|
page read and write
|
||
2ABB000
|
heap
|
page read and write
|
||
2E7C000
|
stack
|
page read and write
|
||
308E000
|
heap
|
page read and write
|
||
2E80000
|
heap
|
page read and write
|
||
49AE000
|
stack
|
page read and write
|
||
29BE000
|
stack
|
page read and write
|
||
2ABC000
|
heap
|
page read and write
|
||
496E000
|
direct allocation
|
page read and write
|
||
499F000
|
stack
|
page read and write
|
||
303E000
|
stack
|
page read and write
|
||
6154000
|
heap
|
page read and write
|
||
4B1A000
|
direct allocation
|
page read and write
|
||
44FF000
|
direct allocation
|
page read and write
|
||
30F6000
|
heap
|
page read and write
|
||
49DD000
|
direct allocation
|
page read and write
|
||
3310000
|
heap
|
page read and write
|
||
D4F000
|
heap
|
page read and write
|
||
6620000
|
trusted library allocation
|
page read and write
|
||
2943000
|
direct allocation
|
page read and write
|
||
4A9C000
|
direct allocation
|
page read and write
|
||
4A08000
|
direct allocation
|
page read and write
|
||
449E000
|
direct allocation
|
page read and write
|
||
3109000
|
heap
|
page read and write
|
||
3317000
|
heap
|
page read and write
|
||
4AD9000
|
direct allocation
|
page read and write
|
||
308E000
|
heap
|
page read and write
|
||
4A8B000
|
direct allocation
|
page read and write
|
||
2F35000
|
heap
|
page read and write
|
||
4F10000
|
heap
|
page read and write
|
||
D93000
|
heap
|
page read and write
|
||
28C5000
|
direct allocation
|
page read and write
|
||
2D00000
|
heap
|
page read and write
|
||
30CA000
|
heap
|
page read and write
|
||
2974000
|
heap
|
page read and write
|
||
4940000
|
heap
|
page read and write
|
||
D76000
|
heap
|
page read and write
|
||
29F0000
|
heap
|
page read and write
|
||
4ABC000
|
direct allocation
|
page read and write
|
||
8F0000
|
heap
|
page read and write
|
||
2970000
|
heap
|
page read and write
|
||
304A000
|
heap
|
page read and write
|
||
BC0000
|
heap
|
page read and write
|
||
D4B000
|
heap
|
page read and write
|
||
A59000
|
stack
|
page read and write
|
||
61E0000
|
trusted library allocation
|
page read and write
|
||
2909000
|
direct allocation
|
page read and write
|
||
2F31000
|
heap
|
page read and write
|
||
2F35000
|
heap
|
page read and write
|
||
F3F000
|
stack
|
page read and write
|
||
4B30000
|
heap
|
page read and write
|
||
2E39000
|
stack
|
page read and write
|
||
49FA000
|
direct allocation
|
page read and write
|
||
452A000
|
direct allocation
|
page read and write
|
||
6700000
|
heap
|
page read and write
|
||
3040000
|
heap
|
page read and write
|
||
3110000
|
heap
|
page read and write
|
||
2F00000
|
heap
|
page read and write
|
||
4F20000
|
heap
|
page read and write
|
||
D40000
|
heap
|
page read and write
|
||
49B9000
|
direct allocation
|
page read and write
|
||
4514000
|
direct allocation
|
page read and write
|
||
2F28000
|
heap
|
page read and write
|
||
2ABF000
|
heap
|
page read and write
|
||
2880000
|
direct allocation
|
page read and write
|
||
2E5E000
|
stack
|
page read and write
|
||
451C000
|
direct allocation
|
page read and write
|
||
449B000
|
direct allocation
|
page read and write
|
||
293C000
|
direct allocation
|
page read and write
|
||
2F00000
|
heap
|
page read and write
|
||
2F31000
|
heap
|
page read and write
|
||
2CF0000
|
heap
|
page read and write
|
||
2A9A000
|
heap
|
page read and write
|
||
3127000
|
heap
|
page read and write
|
||
3069000
|
heap
|
page read and write
|
||
2F36000
|
heap
|
page read and write
|
||
49CF000
|
direct allocation
|
page read and write
|
||
3110000
|
heap
|
page read and write
|
||
4AAC000
|
direct allocation
|
page read and write
|
||
65C0000
|
trusted library allocation
|
page read and write
|
||
4A95000
|
direct allocation
|
page read and write
|
||
D93000
|
heap
|
page read and write
|
||
44AC000
|
direct allocation
|
page read and write
|
||
2ABF000
|
heap
|
page read and write
|
||
2F0A000
|
heap
|
page read and write
|
||
30F3000
|
heap
|
page read and write
|
||
30A0000
|
heap
|
page read and write
|
||
28CC000
|
direct allocation
|
page read and write
|
||
4B13000
|
direct allocation
|
page read and write
|
||
3080000
|
heap
|
page read and write
|
||
30C0000
|
heap
|
page read and write
|
||
28BE000
|
direct allocation
|
page read and write
|
||
2E9C000
|
stack
|
page read and write
|
||
28A5000
|
direct allocation
|
page read and write
|
||
30F2000
|
heap
|
page read and write
|
||
4A25000
|
direct allocation
|
page read and write
|
||
49C7000
|
direct allocation
|
page read and write
|
||
49E4000
|
direct allocation
|
page read and write
|
||
2F32000
|
heap
|
page read and write
|
||
30EA000
|
heap
|
page read and write
|
||
4F00000
|
heap
|
page read and write
|
||
2F24000
|
heap
|
page read and write
|
||
C1E000
|
stack
|
page read and write
|
||
306D000
|
heap
|
page read and write
|
||
4A45000
|
direct allocation
|
page read and write
|
||
2C9C000
|
stack
|
page read and write
|
||
4E70000
|
heap
|
page read and write
|
||
2A8E000
|
stack
|
page read and write
|
||
4B0C000
|
direct allocation
|
page read and write
|
||
48C0000
|
heap
|
page read and write
|
||
4A4C000
|
direct allocation
|
page read and write
|
||
2958000
|
direct allocation
|
page read and write
|
||
C45000
|
heap
|
page read and write
|
||
3071000
|
heap
|
page read and write
|
||
44F7000
|
direct allocation
|
page read and write
|
||
2AC3000
|
heap
|
page read and write
|
||
3110000
|
heap
|
page read and write
|
||
2A00000
|
heap
|
page read and write
|
||
48D0000
|
heap
|
page read and write
|
||
2E9E000
|
stack
|
page read and write
|
||
3071000
|
heap
|
page read and write
|
||
927000
|
heap
|
page read and write
|
||
92A000
|
heap
|
page read and write
|
||
29FF000
|
stack
|
page read and write
|
||
6704000
|
heap
|
page read and write
|
||
30C4000
|
heap
|
page read and write
|
||
30A7000
|
heap
|
page read and write
|
||
2F31000
|
heap
|
page read and write
|
||
4A82000
|
direct allocation
|
page read and write
|
||
4460000
|
direct allocation
|
page read and write
|
||
5050000
|
heap
|
page read and write
|
||
D6E000
|
heap
|
page read and write
|
||
4FE0000
|
heap
|
page read and write
|
||
D76000
|
heap
|
page read and write
|
||
4538000
|
direct allocation
|
page read and write
|
||
2ED0000
|
heap
|
page read and write
|
||
496B000
|
direct allocation
|
page read and write
|
||
4AE7000
|
direct allocation
|
page read and write
|
||
450D000
|
direct allocation
|
page read and write
|
||
4ACA000
|
direct allocation
|
page read and write
|
||
4AAD000
|
direct allocation
|
page read and write
|
||
305F000
|
stack
|
page read and write
|
||
3040000
|
heap
|
page read and write
|
||
30EF000
|
heap
|
page read and write
|
||
4E90000
|
heap
|
page read and write
|
||
308E000
|
heap
|
page read and write
|
||
2AD7000
|
heap
|
page read and write
|
||
4A00000
|
direct allocation
|
page read and write
|
||
2ED5000
|
heap
|
page read and write
|
||
4AC3000
|
direct allocation
|
page read and write
|
||
8E0000
|
heap
|
page read and write
|
||
6710000
|
heap
|
page read and write
|
||
2ABF000
|
heap
|
page read and write
|
||
2D05000
|
heap
|
page read and write
|
||
28DC000
|
direct allocation
|
page read and write
|
||
839000
|
stack
|
page read and write
|
||
49F3000
|
direct allocation
|
page read and write
|
||
2F2B000
|
heap
|
page read and write
|
||
294A000
|
direct allocation
|
page read and write
|
||
4523000
|
direct allocation
|
page read and write
|
||
920000
|
heap
|
page read and write
|
||
6150000
|
heap
|
page read and write
|
||
4AE0000
|
heap
|
page read and write
|
||
30F7000
|
heap
|
page read and write
|
||
2AD5000
|
heap
|
page read and write
|
||
2AB7000
|
heap
|
page read and write
|
||
2934000
|
direct allocation
|
page read and write
|
||
4A50000
|
direct allocation
|
page read and write
|
||
44F0000
|
direct allocation
|
page read and write
|
||
4485000
|
direct allocation
|
page read and write
|
||
497C000
|
direct allocation
|
page read and write
|
||
4AB4000
|
direct allocation
|
page read and write
|
||
2EC0000
|
heap
|
page read and write
|
||
30C0000
|
heap
|
page read and write
|
||
498C000
|
direct allocation
|
page read and write
|
||
30F2000
|
heap
|
page read and write
|
||
30F2000
|
heap
|
page read and write
|
||
4A8E000
|
direct allocation
|
page read and write
|
||
4944000
|
heap
|
page read and write
|
||
4A9F000
|
direct allocation
|
page read and write
|
||
2EF0000
|
heap
|
page read and write
|
||
3071000
|
heap
|
page read and write
|
||
2EED000
|
stack
|
page read and write
|
||
3114000
|
heap
|
page read and write
|
||
D93000
|
heap
|
page read and write
|
||
4AE0000
|
direct allocation
|
page read and write
|
||
291F000
|
direct allocation
|
page read and write
|
||
2910000
|
direct allocation
|
page read and write
|
||
30F2000
|
heap
|
page read and write
|
||
4A89000
|
direct allocation
|
page read and write
|
||
4A75000
|
direct allocation
|
page read and write
|
||
312A000
|
heap
|
page read and write
|
||
87C000
|
stack
|
page read and write
|
||
2A46000
|
heap
|
page read and write
|
||
4B04000
|
direct allocation
|
page read and write
|
||
49EF000
|
stack
|
page read and write
|
||
4A5C000
|
direct allocation
|
page read and write
|
||
67A0000
|
trusted library allocation
|
page read and write
|
||
30EA000
|
heap
|
page read and write
|
||
331A000
|
heap
|
page read and write
|
||
30AA000
|
heap
|
page read and write
|
||
F7E000
|
stack
|
page read and write
|
||
49C0000
|
direct allocation
|
page read and write
|
||
292D000
|
direct allocation
|
page read and write
|
||
28BB000
|
direct allocation
|
page read and write
|
There are 255 hidden memdumps, click here to show them.