IOC Report
SecuriteInfo.com.Win32.PWSX-gen.22053.10983.exe

loading gif

Files

File Path
Type
Category
Malicious
SecuriteInfo.com.Win32.PWSX-gen.22053.10983.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fu7wner3.default-release\cookies.sqlite-shm
data
dropped
malicious
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fu7wner3.default-release\places.sqlite-shm
data
dropped
malicious
C:\ProgramData\BFIDGDAKFHIEHJKFHDHD
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
dropped
C:\ProgramData\DAAFIIJD
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
C:\ProgramData\DAEGIIECGHCBFHJKEHDB
ASCII text, with very long lines (1769), with CRLF line terminators
dropped
C:\ProgramData\GDHCGDGIEBKJKFHJJKFC
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 25, cookie 0xe, schema 4, UTF-8, version-valid-for 1
dropped
C:\ProgramData\GHCGDAFCFHIDBGDHCFCBFBFIIJ
SQLite 3.x database, user version 75, last written using SQLite version 3042000, page size 32768, writer version 2, read version 2, file counter 2, database pages 46, cookie 0x26, schema 4, UTF-8, version-valid-for 2
dropped
C:\ProgramData\GHDHDBAECGCAFHJJDAKFHJJEBF
SQLite 3.x database, user version 12, last written using SQLite version 3042000, page size 32768, writer version 2, read version 2, file counter 3, database pages 3, cookie 0x1, schema 4, UTF-8, version-valid-for 3
dropped
C:\ProgramData\JJJKFBAA
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 7, database pages 89, cookie 0x36, schema 4, UTF-8, version-valid-for 7
dropped
C:\ProgramData\freebl3.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\ProgramData\mozglue.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\ProgramData\msvcp140.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\ProgramData\nss3.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\ProgramData\softokn3.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\ProgramData\vcruntime140.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\3753c378-695d-4a8c-8ed4-e7624310a22d.tmp
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\8622cb5b-be88-4cd3-9ac3-806ad17fa6cc.tmp
JSON data
modified
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\89de2cfc-e8f3-4a8c-88b0-bb12975adb40.tmp
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\907d5816-5e0c-4931-99b9-0190901e7b0b.tmp
JSON data
modified
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\BrowserMetrics\BrowserMetrics-67C9BD88-91C.pma
data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\BrowserMetrics\BrowserMetrics-67C9D091-FA8.pma
data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat
data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Last Version
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Local State (copy)
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Local State~RF2426e.TMP (copy)
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Local State~RF2427d.TMP (copy)
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Local State~RF25049.TMP (copy)
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Local State~RF25058.TMP (copy)
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Variations
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\dd112a0c-1f37-418a-8793-2f0837ecf2c8.tmp
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\FGDLZ049\freebl3[1].dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\FGDLZ049\mozglue[1].dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\FGDLZ049\msvcp140[1].dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\FGDLZ049\nss3[1].dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\FGDLZ049\softokn3[1].dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\FGDLZ049\vcruntime140[1].dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\W1DLB4AP\json[1].json
JSON data
dropped
Chrome Cache Entry: 83
ASCII text, with very long lines (846)
downloaded
There are 29 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.22053.10983.exe
"C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.22053.10983.exe"
malicious
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --remote-debugging-port=9229 --profile-directory=""
malicious
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2016 --field-trial-handle=1940,i,18391328260999041015,2170874192039568654,262144 /prefetch:8
malicious
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --remote-debugging-port=9229 --profile-directory=""
malicious
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-GB --service-sandbox-type=none --mojo-platform-channel-handle=2436 --field-trial-handle=2268,i,10759757327518874650,6369260558671183439,262144 /prefetch:3
malicious
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --remote-debugging-port=9229 --profile-directory --flag-switches-begin --flag-switches-end --disable-nacl --do-not-de-elevate
malicious
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-GB --service-sandbox-type=none --mojo-platform-channel-handle=2092 --field-trial-handle=2020,i,11552602797106846461,12959609762823924808,262144 /prefetch:3
malicious

URLs

Name
IP
Malicious
http://dugong.ydns.eu//kj2h34kj23h4/vcruntime140.dll
38.180.229.217
malicious
http://dugong.ydns.eu//kj2h34kj23h4/msvcp140.dll
38.180.229.217
malicious
http://dugong.ydns.eu//gtthfbsb2h.php
38.180.229.217
malicious
http://dugong.ydns.eu//kj2h34kj23h4/softokn3.dll
38.180.229.217
malicious
http://dugong.ydns.eu//kj2h34kj23h4/mozglue.dll
38.180.229.217
malicious
http://dugong.ydns.eu//kj2h34kj23h4/sqlite3.dll
38.180.229.217
malicious
http://dugong.ydns.eu//kj2h34kj23h4/freebl3.dll
38.180.229.217
malicious
http://dugong.ydns.eu//kj2h34kj23h4/nss3.dll
38.180.229.217
malicious
http://dugong.ydns.eu/
38.180.229.217
malicious
https://www.amazon.com/?tag=admarketus-20&ref=pd_sl_ef0fa27a12d43fbd45649e195429e8a63ddcad7cf7e128c0
unknown
https://duckduckgo.com/chrome_newtab
unknown
http://dugong.ydns.eu//gtthfbsb2h.phpe
unknown
https://duckduckgo.com/ac/?q=
unknown
http://dugong.ydns.eu//gtthfbsb2h.phpj
unknown
https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
unknown
http://dugong.ydns.eu//kj2h34kj23h4/nss3.dllllv
unknown
http://dugong.ydns.eu//gtthfbsb2h.phpD
unknown
http://dugong.ydns.eu//gtthfbsb2h.phpB
unknown
http://dugong.ydns.eu//gtthfbsb2h.phpC
unknown
https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
unknown
http://dugong.ydns.eu//gtthfbsb2h.phpAppData
unknown
https://www.google.com/async/newtab_ogb?hl=en-US&async=fixed:0
142.250.185.228
http://dugong.ydns.eu//kj2h34kj23h4/freebl3.dllQ
unknown
https://support.mozilla.org/products/firefoxgro.allizom.troppus.S3DiLP_FhcLK
unknown
http://dugong.ydns.eu//gtthfbsb2h.php:
unknown
http://www.sqlite.org/copyright.html.
unknown
http://dugong.ydns.eu//kj2h34kj23h4/msvcp140.dllll
unknown
http://www.mozilla.com/en-US/blocklist/
unknown
https://mozilla.org0/
unknown
https://www.google.com/images/branding/product/ico/googleg_lodp.ico
unknown
http://dugong.ydns.eu//kj2h34kj23h4/mozglue.dllG
unknown
http://dugong.ydns.eu/ata
unknown
http://dugong.ydns.eu//kj2h34kj23h4/nss3.dllr
unknown
https://bridge.sfo1.admarketplace.net/ctp?version=16.0.0&key=1696490019400400000.2&ci=1696490019252.
unknown
http://dugong.ydns.eu//kj2h34kj23h4/msvcp140.dlle
unknown
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
unknown
https://www.google.com/async/newtab_promos
142.250.185.228
http://dugong.ydns.eu//gtthfbsb2h.phpndary=----GV0LmRhdHwxfEJpdGNvaW4gQ29yZSBPbGR8MXxcQml0Y29pblx8Kn
unknown
https://www.ecosia.org/newtab/
unknown
http://dugong.ydns.eu//gtthfbsb2h.phpApplication
unknown
https://support.mozilla.org/kb/customize-firefox-controls-buttons-and-toolbars?utm_source=firefox-br
unknown
https://ac.ecosia.org/autocomplete?q=
unknown
https://www.google.com/async/ddljson?async=ntp:2
142.250.185.228
https://www.google.com/complete/search?client=chrome-omni&gs_ri=chrome-ext-ansg&xssi=t&q=&oit=0&oft=1&pgcl=20&gs_rn=42&sugkey=AIzaSyBOti4mM-6x9WDnZIjIeyEU21OpBXqWBgw
142.250.185.228
https://contile-images.services.mozilla.com/obgoOYObjIFea_bXuT6L4LbBJ8j425AD87S1HMD3BWg.9991.jpg
unknown
http://dugong.ydns.eu/DAK
unknown
https://www.invisalign.com/?utm_source=admarketplace&utm_medium=paidsearch&utm_campaign=Invisalign&u
unknown
http://dugong.ydns.eu//kj2h34kj23h4/softokn3.dllI
unknown
https://imp.mt48.net/static?id=7RHzfOIXjFEYsBdvIpkX4Qqm4pqWfpl%2B4pbW4pbWfpbW7ReNxR3UIG8zInwYIFIVs9e
unknown
https://contile-images.services.mozilla.com/CuERQnIs4CzqjKBh9os6_h9d4CUDCHO3oiqmAQO6VLM.25122.jpg
unknown
http://dugong.ydns.eu//kj2h34kj23h4/nss3.dlllla
unknown
https://support.mozilla.org
unknown
http://dugong.ydns.eu//gtthfbsb2h.phpq
unknown
https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
unknown
http://dugong.ydns.eu//kj2h34kj23h4/softokn3.dllll
unknown
https://bridge.sfo1.ap01.net/ctp?version=16.0.0&key=1696490019400400000.1&ci=1696490019252.12791&cta
unknown
There are 46 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
dugong.ydns.eu
38.180.229.217
malicious
www.google.com
142.250.185.228

IPs

IP
Domain
Country
Malicious
192.168.2.7
unknown
unknown
malicious
38.180.229.217
dugong.ydns.eu
United States
malicious
142.250.185.228
www.google.com
United States
239.255.255.250
unknown
Reserved
127.0.0.1
unknown
unknown

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\CTF\MSUTB
Left
HKEY_CURRENT_USER\SOFTWARE\Microsoft\CTF\MSUTB
Top
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\BLBeacon
state
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\ThirdParty
StatusCodes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\ThirdParty
StatusCodes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\BLBeacon
state
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\StabilityMetrics
user_experience_metrics.stability.exited_cleanly
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\BLBeacon
state
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\ThirdParty
StatusCodes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\ThirdParty
StatusCodes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\BLBeacon
state
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\StabilityMetrics
user_experience_metrics.stability.exited_cleanly
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\StabilityMetrics
user_experience_metrics.stability.exited_cleanly
There are 3 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
781000
unkown
page execute and read and write
malicious
102E000
heap
page read and write
malicious
4A40000
direct allocation
page read and write
malicious
504000
heap
page read and write
504000
heap
page read and write
19E000
stack
page read and write
5514000
heap
page read and write
6CD71000
unkown
page execute read
29BB000
heap
page read and write
550C000
heap
page read and write
504000
heap
page read and write
780000
unkown
page readonly
552A000
heap
page read and write
1000000
direct allocation
page read and write
1000000
direct allocation
page read and write
4F4F000
stack
page read and write
347E000
stack
page read and write
5610000
trusted library allocation
page read and write
504000
heap
page read and write
3A7F000
stack
page read and write
3E7E000
stack
page read and write
B5E1000
heap
page read and write
504000
heap
page read and write
504000
heap
page read and write
61ED4000
direct allocation
page readonly
198000
stack
page read and write
B680000
trusted library allocation
page read and write
343F000
stack
page read and write
61ED3000
direct allocation
page read and write
504000
heap
page read and write
558F000
heap
page read and write
45BF000
stack
page read and write
BAB000
unkown
page execute and read and write
5515000
heap
page read and write
504000
heap
page read and write
2BBF000
stack
page read and write
504000
heap
page read and write
46C0000
trusted library allocation
page read and write
504000
heap
page read and write
3CFF000
stack
page read and write
1000000
direct allocation
page read and write
5515000
heap
page read and write
C82000
unkown
page execute and read and write
53DE000
stack
page read and write
504000
heap
page read and write
5530000
heap
page read and write
504000
heap
page read and write
B870000
heap
page read and write
550F000
heap
page read and write
4BB0000
direct allocation
page execute and read and write
8E7000
unkown
page execute and read and write
397E000
stack
page read and write
550A000
heap
page read and write
9B8000
unkown
page execute and read and write
B5A0000
heap
page read and write
550C000
heap
page read and write
5529000
heap
page read and write
5530000
heap
page read and write
5522000
heap
page read and write
32FF000
stack
page read and write
29B7000
heap
page read and write
504000
heap
page read and write
504000
heap
page read and write
509F000
stack
page read and write
504000
heap
page read and write
54FB000
heap
page read and write
550D000
heap
page read and write
504000
heap
page read and write
3ABE000
stack
page read and write
CC2000
unkown
page execute and write copy
5530000
heap
page read and write
7012E000
unkown
page read and write
504000
heap
page read and write
504000
heap
page read and write
54F1000
heap
page read and write
54FB000
heap
page read and write
5530000
heap
page read and write
2CBF000
stack
page read and write
45C1000
heap
page read and write
30BF000
stack
page read and write
423E000
stack
page read and write
504000
heap
page read and write
4B90000
direct allocation
page execute and read and write
504000
heap
page read and write
64E000
stack
page read and write
10F6000
heap
page read and write
70132000
unkown
page readonly
54FB000
heap
page read and write
504000
heap
page read and write
2990000
direct allocation
page execute and read and write
54F1000
heap
page read and write
5320000
heap
page read and write
504000
heap
page read and write
383E000
stack
page read and write
CC2000
unkown
page execute and read and write
5530000
heap
page read and write
561C000
heap
page read and write
54E0000
heap
page read and write
CAC000
unkown
page execute and read and write
550D000
heap
page read and write
504000
heap
page read and write
531D000
stack
page read and write
5511000
heap
page read and write
E7D000
unkown
page execute and read and write
504000
heap
page read and write
29A0000
direct allocation
page execute and read and write
5522000
heap
page read and write
550D000
heap
page read and write
5515000
heap
page read and write
5515000
heap
page read and write
40FE000
stack
page read and write
293E000
stack
page read and write
61ECD000
direct allocation
page readonly
6EE000
stack
page read and write
5515000
heap
page read and write
10B3000
heap
page read and write
550F000
heap
page read and write
504000
heap
page read and write
504000
heap
page read and write
504000
heap
page read and write
504000
heap
page read and write
504000
heap
page read and write
28FE000
stack
page read and write
550C000
heap
page read and write
54E2000
heap
page read and write
550F000
heap
page read and write
6CF55000
unkown
page readonly
5522000
heap
page read and write
5512000
heap
page read and write
5522000
heap
page read and write
B580000
trusted library allocation
page read and write
357F000
stack
page read and write
10A5000
heap
page read and write
29BE000
heap
page read and write
550D000
heap
page read and write
5522000
heap
page read and write
5522000
heap
page read and write
6CD70000
unkown
page readonly
68E000
stack
page read and write
5515000
heap
page read and write
10B1000
heap
page read and write
504000
heap
page read and write
504000
heap
page read and write
36FE000
stack
page read and write
4A3E000
stack
page read and write
504000
heap
page read and write
84C000
unkown
page execute and read and write
1020000
heap
page read and write
550A000
heap
page read and write
4A7C000
stack
page read and write
61E01000
direct allocation
page execute read
4E0F000
stack
page read and write
504000
heap
page read and write
5515000
heap
page read and write
504000
heap
page read and write
5507000
heap
page read and write
54FC000
heap
page read and write
5515000
heap
page read and write
3E3F000
stack
page read and write
781000
unkown
page execute and write copy
504000
heap
page read and write
54F2000
heap
page read and write
3F7F000
stack
page read and write
504000
heap
page read and write
54E6000
heap
page read and write
504000
heap
page read and write
54FB000
heap
page read and write
504000
heap
page read and write
504000
heap
page read and write
4BC0000
direct allocation
page execute and read and write
504000
heap
page read and write
504000
heap
page read and write
102A000
heap
page read and write
54FB000
heap
page read and write
504000
heap
page read and write
45CA000
heap
page read and write
504000
heap
page read and write
504000
heap
page read and write
504000
heap
page read and write
B8AF000
heap
page read and write
504000
heap
page read and write
5530000
heap
page read and write
61EB7000
direct allocation
page readonly
5528000
heap
page read and write
10FC000
heap
page read and write
1000000
direct allocation
page read and write
504000
heap
page read and write
2DBF000
stack
page read and write
504000
heap
page read and write
504000
heap
page read and write
504000
heap
page read and write
54FB000
heap
page read and write
1000000
direct allocation
page read and write
504000
heap
page read and write
700A0000
unkown
page readonly
5522000
heap
page read and write
504000
heap
page read and write
4B7F000
stack
page read and write
1000000
direct allocation
page read and write
5518000
heap
page read and write
54F9000
heap
page read and write
504000
heap
page read and write
12863000
heap
page read and write
504000
heap
page read and write
9B000
stack
page read and write
504000
heap
page read and write
552C000
heap
page read and write
297E000
stack
page read and write
31FE000
stack
page read and write
552D000
heap
page read and write
5530000
heap
page read and write
4D0000
heap
page read and write
550C000
heap
page read and write
5511000
heap
page read and write
4F9E000
stack
page read and write
B8A4000
heap
page read and write
780000
unkown
page read and write
504000
heap
page read and write
393F000
stack
page read and write
550F000
heap
page read and write
12D70000
heap
page read and write
5515000
heap
page read and write
1088000
heap
page read and write
504000
heap
page read and write
504000
heap
page read and write
61ECC000
direct allocation
page read and write
5515000
heap
page read and write
1074000
heap
page read and write
4E4E000
stack
page read and write
B8AA000
heap
page read and write
5507000
heap
page read and write
54FB000
heap
page read and write
1108000
heap
page read and write
700A1000
unkown
page execute read
504000
heap
page read and write
54DD000
stack
page read and write
10F1000
heap
page read and write
192000
stack
page read and write
504000
heap
page read and write
76E000
stack
page read and write
333E000
stack
page read and write
4BA0000
direct allocation
page execute and read and write
6CF50000
unkown
page read and write
41FF000
stack
page read and write
1000000
direct allocation
page read and write
504000
heap
page read and write
44BE000
stack
page read and write
6CF0F000
unkown
page readonly
FFE000
stack
page read and write
3BFE000
stack
page read and write
770000
heap
page read and write
4B90000
direct allocation
page execute and read and write
B89E000
heap
page read and write
3FBE000
stack
page read and write
504000
heap
page read and write
504000
heap
page read and write
72B000
stack
page read and write
2ABF000
stack
page read and write
5530000
heap
page read and write
5530000
heap
page read and write
504000
heap
page read and write
504000
heap
page read and write
552C000
heap
page read and write
45C1000
heap
page read and write
61ED0000
direct allocation
page read and write
504000
heap
page read and write
504000
heap
page read and write
5522000
heap
page read and write
433F000
stack
page read and write
5530000
heap
page read and write
54FB000
heap
page read and write
550D000
heap
page read and write
504000
heap
page read and write
B8A0000
heap
page read and write
1000000
direct allocation
page read and write
5530000
heap
page read and write
504000
heap
page read and write
45C1000
heap
page read and write
5530000
heap
page read and write
4607000
heap
page read and write
36BF000
stack
page read and write
5515000
heap
page read and write
5530000
heap
page read and write
F7F000
stack
page read and write
5517000
heap
page read and write
504000
heap
page read and write
504000
heap
page read and write
B64C000
heap
page read and write
521D000
stack
page read and write
B580000
trusted library allocation
page read and write
9CC000
unkown
page execute and read and write
5512000
heap
page read and write
1000000
direct allocation
page read and write
54F9000
heap
page read and write
504000
heap
page read and write
504000
heap
page read and write
B8A7000
heap
page read and write
54F3000
heap
page read and write
50DE000
stack
page read and write
504000
heap
page read and write
504000
heap
page read and write
5522000
heap
page read and write
B5C1000
heap
page read and write
4B80000
direct allocation
page execute and read and write
6CF4E000
unkown
page read and write
54F2000
heap
page read and write
54FB000
heap
page read and write
504000
heap
page read and write
4D0E000
stack
page read and write
504000
heap
page read and write
504000
heap
page read and write
504000
heap
page read and write
4CCF000
stack
page read and write
5515000
heap
page read and write
3D3E000
stack
page read and write
504000
heap
page read and write
504000
heap
page read and write
504000
heap
page read and write
B6FE000
stack
page read and write
2980000
direct allocation
page read and write
5522000
heap
page read and write
61EB4000
direct allocation
page read and write
29B0000
heap
page read and write
504000
heap
page read and write
2980000
direct allocation
page read and write
550D000
heap
page read and write
51DC000
stack
page read and write
5519000
heap
page read and write
3BBF000
stack
page read and write
437E000
stack
page read and write
504000
heap
page read and write
CC3000
unkown
page execute and write copy
54FB000
heap
page read and write
37FF000
stack
page read and write
1000000
direct allocation
page read and write
504000
heap
page read and write
1F0000
heap
page read and write
54EF000
heap
page read and write
550B000
heap
page read and write
B800000
trusted library allocation
page read and write
54FB000
heap
page read and write
504000
heap
page read and write
504000
heap
page read and write
550F000
heap
page read and write
5515000
heap
page read and write
5530000
heap
page read and write
FBE000
stack
page read and write
54F1000
heap
page read and write
504000
heap
page read and write
550F000
heap
page read and write
2FBF000
stack
page read and write
54FB000
heap
page read and write
B580000
heap
page read and write
40BF000
stack
page read and write
5507000
heap
page read and write
1000000
direct allocation
page read and write
504000
heap
page read and write
504000
heap
page read and write
1000000
direct allocation
page read and write
552A000
heap
page read and write
5515000
heap
page read and write
500000
heap
page read and write
447F000
stack
page read and write
45C1000
heap
page read and write
B7FF000
stack
page read and write
7011D000
unkown
page readonly
54F1000
heap
page read and write
1000000
direct allocation
page read and write
35BE000
stack
page read and write
5515000
heap
page read and write
1000000
direct allocation
page read and write
504000
heap
page read and write
835000
unkown
page execute and read and write
1103000
heap
page read and write
552A000
heap
page read and write
504000
heap
page read and write
B896000
heap
page read and write
804000
unkown
page execute and read and write
5511000
heap
page read and write
6CF4F000
unkown
page write copy
504000
heap
page read and write
5509000
heap
page read and write
504000
heap
page read and write
61E00000
direct allocation
page execute and read and write
31BF000
stack
page read and write
54E000
stack
page read and write
5522000
heap
page read and write
504000
heap
page read and write
504000
heap
page read and write
2EBF000
stack
page read and write
504000
heap
page read and write
504000
heap
page read and write
504000
heap
page read and write
There are 383 hidden memdumps, click here to show them.