Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
C:\Users\user\Desktop\cmdline.out
|
ASCII text, with CRLF line terminators
|
modified
|
||
C:\Users\user\Desktop\download\OPNC-v1.1.25.0.msi
|
Composite Document File V2 Document, Little Endian, Os: Windows, Version 10.0, MSI Installer, Security: 0, Code page: 1252,
Revision Number: {E36AFA06-1EFD-49D1-8CD4-4C1A142E76B2}, Number of Words: 10, Subject: OPWC, Author: OPWC, Name of Creating
Application: OPWC, Template: ;1033, Comments: This installer database contains the logic and data required to install OPWC.,
Title: Installation Database, Keywords: Installer, MSI, Database, Create Time/Date: Thu Feb 1 04:04:35 2024, Last Saved Time/Date:
Thu Feb 1 04:04:35 2024, Last Printed: Thu Feb 1 04:04:35 2024, Number of Pages: 450
|
dropped
|
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Windows\SysWOW64\cmd.exe
|
C:\Windows\system32\cmd.exe /c wget -t 2 -v -T 60 -P "C:\Users\user\Desktop\download" --no-check-certificate --content-disposition
--user-agent="Mozilla/5.0 (Windows NT 6.1; WOW64; Trident/7.0; AS; rv:11.0) like Gecko" "https://d226ryxb715ss0.cloudfront.net/OPNC-v1.1.25.0.msi"
> cmdline.out 2>&1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\SysWOW64\wget.exe
|
wget -t 2 -v -T 60 -P "C:\Users\user\Desktop\download" --no-check-certificate --content-disposition --user-agent="Mozilla/5.0
(Windows NT 6.1; WOW64; Trident/7.0; AS; rv:11.0) like Gecko" "https://d226ryxb715ss0.cloudfront.net/OPNC-v1.1.25.0.msi"
|
||
C:\Windows\System32\OpenWith.exe
|
C:\Windows\system32\OpenWith.exe -Embedding
|
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
https://d226ryxb715ss0.cloudfront.net/OPNC-v1.1.25.0.msi
|
|||
https://d226ryxb715ss0.cloudfront.net/OPNC-v1.1.25.0.msi
|
3.160.156.148
|
||
https://d226ryxb715ss0.cloudfront.net/OPNC-v1.1.25.0.msir
|
unknown
|
||
https://d226ryxb715ss0.cloudfront.net/OPNC-v1.1.25.0.msi)
|
unknown
|
||
https://d226ryxb715ss0.cloudfront.net/OPNC-v1.1.25.0.msiNA-PCN
|
unknown
|
||
https://d226ryxb715ss0.cloudfront.net/OPNC-v1.1.25.0.msiCESSOR_
|
unknown
|
||
http://d2q8odwdblz94i.cloudfront.net
|
unknown
|
Domains
Name
|
IP
|
Malicious
|
|
---|---|---|---|
d226ryxb715ss0.cloudfront.net
|
3.160.156.148
|
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
3.160.156.148
|
d226ryxb715ss0.cloudfront.net
|
United States
|
Registry
Path
|
Value
|
Malicious
|
|
---|---|---|---|
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
|
C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe.FriendlyAppName
|
||
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
|
C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe.ApplicationCompany
|
||
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
|
C:\Program Files\Mozilla Firefox\firefox.exe.FriendlyAppName
|
||
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
|
C:\Program Files\Mozilla Firefox\firefox.exe.ApplicationCompany
|
||
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
|
C:\Program Files\Internet Explorer\iexplore.exe.FriendlyAppName
|
||
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
|
C:\Program Files\Internet Explorer\iexplore.exe.ApplicationCompany
|
||
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
|
C:\Program Files (x86)\Microsoft Office\Root\VFS\ProgramFilesCommonX64\Microsoft Shared\OFFICE16\MSOXMLED.EXE.FriendlyAppName
|
||
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
|
C:\Program Files (x86)\Microsoft Office\Root\VFS\ProgramFilesCommonX64\Microsoft Shared\OFFICE16\MSOXMLED.EXE.ApplicationCompany
|
||
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
|
C:\Windows\system32\mspaint.exe.FriendlyAppName
|
||
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
|
C:\Windows\system32\mspaint.exe.ApplicationCompany
|
||
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
|
C:\Windows\system32\NOTEPAD.EXE.FriendlyAppName
|
||
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
|
C:\Windows\system32\NOTEPAD.EXE.ApplicationCompany
|
||
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
|
C:\Program Files (x86)\Microsoft Office\root\Office16\Winword.exe.FriendlyAppName
|
||
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
|
C:\Program Files (x86)\Microsoft Office\root\Office16\Winword.exe.ApplicationCompany
|
||
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
|
C:\Program Files (x86)\Windows Media Player\wmplayer.exe.FriendlyAppName
|
||
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
|
C:\Program Files (x86)\Windows Media Player\wmplayer.exe.ApplicationCompany
|
||
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
|
C:\Program Files\Windows NT\Accessories\WORDPAD.EXE.FriendlyAppName
|
||
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
|
C:\Program Files\Windows NT\Accessories\WORDPAD.EXE.ApplicationCompany
|
There are 8 hidden registries, click here to show them.
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
14E2A449000
|
heap
|
page read and write
|
||
14E2A3C9000
|
heap
|
page read and write
|
||
14E2A2DA000
|
heap
|
page read and write
|
||
14E2A2E9000
|
heap
|
page read and write
|
||
2B87000
|
heap
|
page read and write
|
||
14E2A442000
|
heap
|
page read and write
|
||
14E2A47D000
|
heap
|
page read and write
|
||
14E2845D000
|
heap
|
page read and write
|
||
2B81000
|
heap
|
page read and write
|
||
14E2A463000
|
heap
|
page read and write
|
||
14E284AF000
|
heap
|
page read and write
|
||
14E2A2DE000
|
heap
|
page read and write
|
||
14E2A452000
|
heap
|
page read and write
|
||
14E2846D000
|
heap
|
page read and write
|
||
14E2A44F000
|
heap
|
page read and write
|
||
14E2A3BD000
|
heap
|
page read and write
|
||
14E2A2D5000
|
heap
|
page read and write
|
||
14E2A491000
|
heap
|
page read and write
|
||
14E2847D000
|
heap
|
page read and write
|
||
14E28476000
|
heap
|
page read and write
|
||
14E2A462000
|
heap
|
page read and write
|
||
14E2A435000
|
heap
|
page read and write
|
||
14E2A2E9000
|
heap
|
page read and write
|
||
14E2A2F2000
|
heap
|
page read and write
|
||
14E2EE00000
|
heap
|
page readonly
|
||
14E2A2DE000
|
heap
|
page read and write
|
||
14E28488000
|
heap
|
page read and write
|
||
14E2A2DE000
|
heap
|
page read and write
|
||
14E2A3EB000
|
heap
|
page read and write
|
||
14E2A2DA000
|
heap
|
page read and write
|
||
14E2A2D5000
|
heap
|
page read and write
|
||
14E2A2D5000
|
heap
|
page read and write
|
||
9CC000
|
stack
|
page read and write
|
||
14E2845E000
|
heap
|
page read and write
|
||
14E2A44F000
|
heap
|
page read and write
|
||
2B76000
|
heap
|
page read and write
|
||
14E2A3C1000
|
heap
|
page read and write
|
||
14E2A3C5000
|
heap
|
page read and write
|
||
14E2A3C1000
|
heap
|
page read and write
|
||
14E2A463000
|
heap
|
page read and write
|
||
9B000
|
stack
|
page read and write
|
||
14E28494000
|
heap
|
page read and write
|
||
14E2A434000
|
heap
|
page read and write
|
||
14E2A2B0000
|
heap
|
page read and write
|
||
105C000
|
heap
|
page read and write
|
||
14E2A2ED000
|
heap
|
page read and write
|
||
14E2A2E9000
|
heap
|
page read and write
|
||
14E2A3C3000
|
heap
|
page read and write
|
||
14E2A2DA000
|
heap
|
page read and write
|
||
105E000
|
heap
|
page read and write
|
||
14E2A441000
|
heap
|
page read and write
|
||
2B7E000
|
heap
|
page read and write
|
||
14E2A2C8000
|
heap
|
page read and write
|
||
14E2A3CB000
|
heap
|
page read and write
|
||
14E2CF60000
|
heap
|
page read and write
|
||
14E2845B000
|
heap
|
page read and write
|
||
14E2A3A2000
|
heap
|
page read and write
|
||
14E2A3CB000
|
heap
|
page read and write
|
||
14E28451000
|
heap
|
page read and write
|
||
14E2A464000
|
heap
|
page read and write
|
||
14E28459000
|
heap
|
page read and write
|
||
14E28250000
|
heap
|
page read and write
|
||
FCE000
|
stack
|
page read and write
|
||
14E2A2F2000
|
heap
|
page read and write
|
||
14E2A3DF000
|
heap
|
page read and write
|
||
14E2A3C9000
|
heap
|
page read and write
|
||
14E2A2DE000
|
heap
|
page read and write
|
||
14E283C9000
|
heap
|
page read and write
|
||
14E2A2B7000
|
heap
|
page read and write
|
||
14E2A2F2000
|
heap
|
page read and write
|
||
14E28457000
|
heap
|
page read and write
|
||
F0000
|
heap
|
page read and write
|
||
4B09B7E000
|
stack
|
page read and write
|
||
14E2842F000
|
heap
|
page read and write
|
||
2E3F000
|
stack
|
page read and write
|
||
F70000
|
heap
|
page read and write
|
||
14E2A2F2000
|
heap
|
page read and write
|
||
14E2A3DA000
|
heap
|
page read and write
|
||
14E28497000
|
heap
|
page read and write
|
||
14E2A2DA000
|
heap
|
page read and write
|
||
14E2A2E9000
|
heap
|
page read and write
|
||
14E2A2EA000
|
heap
|
page read and write
|
||
14E2847B000
|
heap
|
page read and write
|
||
14E2A2FA000
|
heap
|
page read and write
|
||
14E2A3D2000
|
heap
|
page read and write
|
||
14E2A2EA000
|
heap
|
page read and write
|
||
14E2A2CF000
|
heap
|
page read and write
|
||
14E2A2E9000
|
heap
|
page read and write
|
||
14E2A2E1000
|
heap
|
page read and write
|
||
14E2A2ED000
|
heap
|
page read and write
|
||
14E2A3D2000
|
heap
|
page read and write
|
||
14E2A2F2000
|
heap
|
page read and write
|
||
4B09AFF000
|
stack
|
page read and write
|
||
14E2A3D2000
|
heap
|
page read and write
|
||
14E2A2E4000
|
heap
|
page read and write
|
||
14E2A433000
|
heap
|
page read and write
|
||
14E28476000
|
heap
|
page read and write
|
||
14E28464000
|
heap
|
page read and write
|
||
14E2A428000
|
heap
|
page read and write
|
||
14E2A2ED000
|
heap
|
page read and write
|
||
14E2CD20000
|
heap
|
page read and write
|
||
14E2A2ED000
|
heap
|
page read and write
|
||
2B4D000
|
heap
|
page read and write
|
||
7DF4A5001000
|
trusted library allocation
|
page execute read
|
||
14E2A2E4000
|
heap
|
page read and write
|
||
14E2CD35000
|
heap
|
page read and write
|
||
14E28457000
|
heap
|
page read and write
|
||
14E2A476000
|
heap
|
page read and write
|
||
14E2A2DA000
|
heap
|
page read and write
|
||
CFF000
|
stack
|
page read and write
|
||
F8000
|
heap
|
page read and write
|
||
14E28475000
|
heap
|
page read and write
|
||
14E2A2DE000
|
heap
|
page read and write
|
||
14E2A2CF000
|
heap
|
page read and write
|
||
14E2A2E9000
|
heap
|
page read and write
|
||
14E2A46B000
|
heap
|
page read and write
|
||
14E2A46B000
|
heap
|
page read and write
|
||
2B87000
|
heap
|
page read and write
|
||
14E2A44F000
|
heap
|
page read and write
|
||
AFE000
|
stack
|
page read and write
|
||
14E2A2FE000
|
heap
|
page read and write
|
||
14E2844D000
|
heap
|
page read and write
|
||
14E2C4F0000
|
trusted library allocation
|
page read and write
|
||
14E2A462000
|
heap
|
page read and write
|
||
14E2A434000
|
heap
|
page read and write
|
||
14E2A3C7000
|
heap
|
page read and write
|
||
2B7A000
|
heap
|
page read and write
|
||
14E2A2FE000
|
heap
|
page read and write
|
||
14E2A441000
|
heap
|
page read and write
|
||
14E2CD33000
|
heap
|
page read and write
|
||
14E2A47C000
|
heap
|
page read and write
|
||
14E2A2E4000
|
heap
|
page read and write
|
||
9E0000
|
heap
|
page read and write
|
||
14E2A2DE000
|
heap
|
page read and write
|
||
14E29DE0000
|
heap
|
page read and write
|
||
14E2A2E9000
|
heap
|
page read and write
|
||
14E2848A000
|
heap
|
page read and write
|
||
14E2A3F7000
|
heap
|
page read and write
|
||
14E2A434000
|
heap
|
page read and write
|
||
14E2CF20000
|
trusted library allocation
|
page read and write
|
||
14E2A44F000
|
heap
|
page read and write
|
||
14E2A434000
|
heap
|
page read and write
|
||
14E2A47D000
|
heap
|
page read and write
|
||
14E2A468000
|
heap
|
page read and write
|
||
14E2A2E9000
|
heap
|
page read and write
|
||
14E2A441000
|
heap
|
page read and write
|
||
4B09C7B000
|
stack
|
page read and write
|
||
14E2A476000
|
heap
|
page read and write
|
||
14E2A3D2000
|
heap
|
page read and write
|
||
14E2A433000
|
heap
|
page read and write
|
||
14E2A2ED000
|
heap
|
page read and write
|
||
14E2A2CF000
|
heap
|
page read and write
|
||
14E2A476000
|
heap
|
page read and write
|
||
14E2A3B1000
|
heap
|
page read and write
|
||
14E2A2E4000
|
heap
|
page read and write
|
||
14E2A2E4000
|
heap
|
page read and write
|
||
14E2A425000
|
heap
|
page read and write
|
||
14E2A2C7000
|
heap
|
page read and write
|
||
14E2A2D5000
|
heap
|
page read and write
|
||
14E2A2E9000
|
heap
|
page read and write
|
||
14E2845E000
|
heap
|
page read and write
|
||
14E2A2ED000
|
heap
|
page read and write
|
||
4B09A7E000
|
stack
|
page read and write
|
||
14E2A3C5000
|
heap
|
page read and write
|
||
14E2A3DF000
|
heap
|
page read and write
|
||
14E2A2F2000
|
heap
|
page read and write
|
||
14E2A2E4000
|
heap
|
page read and write
|
||
4B09E7D000
|
stack
|
page read and write
|
||
14E2A2E9000
|
heap
|
page read and write
|
||
14E2A2F9000
|
heap
|
page read and write
|
||
14E2A452000
|
heap
|
page read and write
|
||
14E2CD39000
|
heap
|
page read and write
|
||
14E2A2CB000
|
heap
|
page read and write
|
||
14E2A2E4000
|
heap
|
page read and write
|
||
14E2A2E4000
|
heap
|
page read and write
|
||
14E2A2F2000
|
heap
|
page read and write
|
||
14E2CD2E000
|
heap
|
page read and write
|
||
14E28477000
|
heap
|
page read and write
|
||
14E283C0000
|
heap
|
page read and write
|
||
14E2A2F2000
|
heap
|
page read and write
|
||
14E2A2E4000
|
heap
|
page read and write
|
||
14E2A441000
|
heap
|
page read and write
|
||
14E2CD3D000
|
heap
|
page read and write
|
||
14E2CD42000
|
heap
|
page read and write
|
||
4B09708000
|
stack
|
page read and write
|
||
14E2A476000
|
heap
|
page read and write
|
||
14E2A3AA000
|
heap
|
page read and write
|
||
14E2A496000
|
heap
|
page read and write
|
||
14E2A2D5000
|
heap
|
page read and write
|
||
14E2CD14000
|
heap
|
page read and write
|
||
14E2A442000
|
heap
|
page read and write
|
||
2B85000
|
heap
|
page read and write
|
||
E0000
|
heap
|
page read and write
|
||
14E28451000
|
heap
|
page read and write
|
||
14E2A441000
|
heap
|
page read and write
|
||
1055000
|
heap
|
page read and write
|
||
14E2CD38000
|
heap
|
page read and write
|
||
14E2A44F000
|
heap
|
page read and write
|
||
14E28474000
|
heap
|
page read and write
|
||
14E28457000
|
heap
|
page read and write
|
||
14E2A2A0000
|
heap
|
page read and write
|
||
14E2A2D5000
|
heap
|
page read and write
|
||
14E2A2D5000
|
heap
|
page read and write
|
||
14E2CD10000
|
heap
|
page read and write
|
||
14E2A471000
|
heap
|
page read and write
|
||
14E2A2D5000
|
heap
|
page read and write
|
||
14E2A2C2000
|
heap
|
page read and write
|
||
14E29D00000
|
heap
|
page read and write
|
||
14E284BE000
|
heap
|
page read and write
|
||
14E2A2F5000
|
heap
|
page read and write
|
||
14E2A2D5000
|
heap
|
page read and write
|
||
14E2A2DA000
|
heap
|
page read and write
|
||
14E2846E000
|
heap
|
page read and write
|
||
14E2849F000
|
heap
|
page read and write
|
||
14E2A463000
|
heap
|
page read and write
|
||
14E2845E000
|
heap
|
page read and write
|
||
14E2A2B5000
|
heap
|
page read and write
|
||
14E2A3B6000
|
heap
|
page read and write
|
||
105D000
|
heap
|
page read and write
|
||
14E2A44F000
|
heap
|
page read and write
|
||
E6000
|
heap
|
page read and write
|
||
2F00000
|
heap
|
page read and write
|
||
14E2847C000
|
heap
|
page read and write
|
||
14E2A2E9000
|
heap
|
page read and write
|
||
14E2A2DE000
|
heap
|
page read and write
|
||
14E2845E000
|
heap
|
page read and write
|
||
14E28489000
|
heap
|
page read and write
|
||
14E2A2BB000
|
heap
|
page read and write
|
||
14E2A3EA000
|
heap
|
page read and write
|
||
14E2A442000
|
heap
|
page read and write
|
||
14E2A2CA000
|
heap
|
page read and write
|
||
14E2CD2D000
|
heap
|
page read and write
|
||
14E2A3C3000
|
heap
|
page read and write
|
||
14E2A3F7000
|
heap
|
page read and write
|
||
14E2A2DE000
|
heap
|
page read and write
|
||
14E28491000
|
heap
|
page read and write
|
||
14E2A2DE000
|
heap
|
page read and write
|
||
14E2A2E5000
|
heap
|
page read and write
|
||
14E2845E000
|
heap
|
page read and write
|
||
14E2A493000
|
heap
|
page read and write
|
||
4B09BFC000
|
stack
|
page read and write
|
||
14E2A2DE000
|
heap
|
page read and write
|
||
F40000
|
heap
|
page read and write
|
||
14E2A434000
|
heap
|
page read and write
|
||
14E2A3BD000
|
heap
|
page read and write
|
||
14E2A2E9000
|
heap
|
page read and write
|
||
14E2A2E9000
|
heap
|
page read and write
|
||
14E2A2DE000
|
heap
|
page read and write
|
||
14E2A2ED000
|
heap
|
page read and write
|
||
14E2A44F000
|
heap
|
page read and write
|
||
14E2A2E9000
|
heap
|
page read and write
|
||
14E2A2ED000
|
heap
|
page read and write
|
||
14E2A438000
|
heap
|
page read and write
|
||
1050000
|
heap
|
page read and write
|
||
14E2A2DB000
|
heap
|
page read and write
|
||
14E2A463000
|
heap
|
page read and write
|
||
14E2A3F4000
|
heap
|
page read and write
|
||
14E28457000
|
heap
|
page read and write
|
||
14E2A2DE000
|
heap
|
page read and write
|
||
14E2A3DF000
|
heap
|
page read and write
|
||
2B82000
|
heap
|
page read and write
|
||
2B84000
|
heap
|
page read and write
|
||
14E2A463000
|
heap
|
page read and write
|
||
14E2A3BD000
|
heap
|
page read and write
|
||
14E2A2E4000
|
heap
|
page read and write
|
||
14E28491000
|
heap
|
page read and write
|
||
14E2849C000
|
heap
|
page read and write
|
||
14E2A2CF000
|
heap
|
page read and write
|
||
14E29DE5000
|
heap
|
page read and write
|
||
14E2A2E4000
|
heap
|
page read and write
|
||
14E2846F000
|
heap
|
page read and write
|
||
14E28468000
|
heap
|
page read and write
|
||
14E28463000
|
heap
|
page read and write
|
||
F3F000
|
stack
|
page read and write
|
||
14E2A2DA000
|
heap
|
page read and write
|
||
14E2A3A0000
|
heap
|
page read and write
|
||
2B4A000
|
heap
|
page read and write
|
||
2B87000
|
heap
|
page read and write
|
||
14E2A2E4000
|
heap
|
page read and write
|
||
14E2A2E9000
|
heap
|
page read and write
|
||
105B000
|
heap
|
page read and write
|
||
14E2A431000
|
heap
|
page read and write
|
||
14E28469000
|
heap
|
page read and write
|
||
14E2A2DA000
|
heap
|
page read and write
|
||
14E2A2ED000
|
heap
|
page read and write
|
||
14E2A3DA000
|
heap
|
page read and write
|
||
14E2A2CF000
|
heap
|
page read and write
|
||
F60000
|
heap
|
page read and write
|
||
14E2A2EE000
|
heap
|
page read and write
|
||
14E2A2B9000
|
heap
|
page read and write
|
||
14E2A2C5000
|
heap
|
page read and write
|
||
D3E000
|
stack
|
page read and write
|
||
14E28330000
|
heap
|
page read and write
|
||
14E28370000
|
heap
|
page read and write
|
||
4B09EFB000
|
stack
|
page read and write
|
||
14E2A2BB000
|
heap
|
page read and write
|
||
14E2A3C7000
|
heap
|
page read and write
|
||
14E2A2ED000
|
heap
|
page read and write
|
||
14E2A2B1000
|
heap
|
page read and write
|
||
2B87000
|
heap
|
page read and write
|
||
14E2A2FE000
|
heap
|
page read and write
|
||
2B40000
|
heap
|
page read and write
|
||
14E28451000
|
heap
|
page read and write
|
||
4B0978E000
|
stack
|
page read and write
|
||
14E2A3D2000
|
heap
|
page read and write
|
||
14E28470000
|
heap
|
page read and write
|
||
14E2A2CB000
|
heap
|
page read and write
|
||
14E284BB000
|
heap
|
page read and write
|
||
14E2A463000
|
heap
|
page read and write
|
||
14E2A2D0000
|
heap
|
page read and write
|
||
14E2A497000
|
heap
|
page read and write
|
||
14E2A44F000
|
heap
|
page read and write
|
There are 302 hidden memdumps, click here to show them.