Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
vy3mvlAaCZ.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
initial sample
|
||
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_vy3mvlAaCZ.exe_6074d93d852c1785169ec71e797e6a243c122_d0e789f3_15f13808\Report.wer
|
Little-endian UTF-16 Unicode text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WER2C8E.tmp.dmp
|
Mini DuMP crash report, 14 streams, Thu Sep 1 06:51:57 2022, 0x1205a4 type
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WER2EB2.tmp.WERInternalMetadata.xml
|
XML 1.0 document, Little-endian UTF-16 Unicode text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WER300B.tmp.xml
|
XML 1.0 document, ASCII text, with CRLF line terminators
|
dropped
|
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\vy3mvlAaCZ.exe
|
"C:\Users\user\Desktop\vy3mvlAaCZ.exe"
|
||
C:\Windows\SysWOW64\WerFault.exe
|
C:\Windows\SysWOW64\WerFault.exe -u -p 4876 -s 244
|
Registry
Path
|
Value
|
Malicious
|
|
---|---|---|---|
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\AppCompatFlags
|
AmiHivePermissionsCorrect
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\AppCompatFlags
|
AmiHiveOwnerCorrect
|
||
\REGISTRY\A\{be1f411e-38ba-7b6c-52b8-c8471f6bb0a1}\Root\InventoryApplicationFile\vy3mvlaacz.exe|9c7091c0
|
ProgramId
|
||
\REGISTRY\A\{be1f411e-38ba-7b6c-52b8-c8471f6bb0a1}\Root\InventoryApplicationFile\vy3mvlaacz.exe|9c7091c0
|
FileId
|
||
\REGISTRY\A\{be1f411e-38ba-7b6c-52b8-c8471f6bb0a1}\Root\InventoryApplicationFile\vy3mvlaacz.exe|9c7091c0
|
LowerCaseLongPath
|
||
\REGISTRY\A\{be1f411e-38ba-7b6c-52b8-c8471f6bb0a1}\Root\InventoryApplicationFile\vy3mvlaacz.exe|9c7091c0
|
LongPathHash
|
||
\REGISTRY\A\{be1f411e-38ba-7b6c-52b8-c8471f6bb0a1}\Root\InventoryApplicationFile\vy3mvlaacz.exe|9c7091c0
|
Name
|
||
\REGISTRY\A\{be1f411e-38ba-7b6c-52b8-c8471f6bb0a1}\Root\InventoryApplicationFile\vy3mvlaacz.exe|9c7091c0
|
Publisher
|
||
\REGISTRY\A\{be1f411e-38ba-7b6c-52b8-c8471f6bb0a1}\Root\InventoryApplicationFile\vy3mvlaacz.exe|9c7091c0
|
Version
|
||
\REGISTRY\A\{be1f411e-38ba-7b6c-52b8-c8471f6bb0a1}\Root\InventoryApplicationFile\vy3mvlaacz.exe|9c7091c0
|
BinFileVersion
|
||
\REGISTRY\A\{be1f411e-38ba-7b6c-52b8-c8471f6bb0a1}\Root\InventoryApplicationFile\vy3mvlaacz.exe|9c7091c0
|
BinaryType
|
||
\REGISTRY\A\{be1f411e-38ba-7b6c-52b8-c8471f6bb0a1}\Root\InventoryApplicationFile\vy3mvlaacz.exe|9c7091c0
|
ProductName
|
||
\REGISTRY\A\{be1f411e-38ba-7b6c-52b8-c8471f6bb0a1}\Root\InventoryApplicationFile\vy3mvlaacz.exe|9c7091c0
|
ProductVersion
|
||
\REGISTRY\A\{be1f411e-38ba-7b6c-52b8-c8471f6bb0a1}\Root\InventoryApplicationFile\vy3mvlaacz.exe|9c7091c0
|
LinkDate
|
||
\REGISTRY\A\{be1f411e-38ba-7b6c-52b8-c8471f6bb0a1}\Root\InventoryApplicationFile\vy3mvlaacz.exe|9c7091c0
|
BinProductVersion
|
||
\REGISTRY\A\{be1f411e-38ba-7b6c-52b8-c8471f6bb0a1}\Root\InventoryApplicationFile\vy3mvlaacz.exe|9c7091c0
|
Size
|
||
\REGISTRY\A\{be1f411e-38ba-7b6c-52b8-c8471f6bb0a1}\Root\InventoryApplicationFile\vy3mvlaacz.exe|9c7091c0
|
Language
|
||
\REGISTRY\A\{be1f411e-38ba-7b6c-52b8-c8471f6bb0a1}\Root\InventoryApplicationFile\vy3mvlaacz.exe|9c7091c0
|
IsPeFile
|
||
\REGISTRY\A\{be1f411e-38ba-7b6c-52b8-c8471f6bb0a1}\Root\InventoryApplicationFile\vy3mvlaacz.exe|9c7091c0
|
IsOsComponent
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\Windows Error Reporting\Debug
|
ExceptionRecord
|
There are 10 hidden registries, click here to show them.
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
1164000
|
unkown
|
page write copy
|
||
1164000
|
unkown
|
page write copy
|
||
1163000
|
unkown
|
page write copy
|
||
1164000
|
unkown
|
page write copy
|
||
19489D60000
|
trusted library allocation
|
page read and write
|
||
1B01486C000
|
heap
|
page read and write
|
||
6D965FB000
|
stack
|
page read and write
|
||
19489EFC000
|
heap
|
page read and write
|
||
1B602B00000
|
heap
|
page read and write
|
||
1B014800000
|
heap
|
page read and write
|
||
8FB2FA000
|
stack
|
page read and write
|
||
8D73E7A000
|
stack
|
page read and write
|
||
DF746FF000
|
stack
|
page read and write
|
||
194857E0000
|
trusted library section
|
page readonly
|
||
C3C000
|
stack
|
page read and write
|
||
19484677000
|
heap
|
page read and write
|
||
1C7C0A00000
|
heap
|
page read and write
|
||
1163000
|
unkown
|
page read and write
|
||
1B014869000
|
heap
|
page read and write
|
||
1C7C0A3C000
|
heap
|
page read and write
|
||
1C7C1202000
|
trusted library allocation
|
page read and write
|
||
DFA000
|
heap
|
page read and write
|
||
1B602B5B000
|
heap
|
page read and write
|
||
1C7C0A43000
|
heap
|
page read and write
|
||
19489E2C000
|
heap
|
page read and write
|
||
1B602B66000
|
heap
|
page read and write
|
||
1B6020A5000
|
heap
|
page read and write
|
||
1B6020A6000
|
heap
|
page read and write
|
||
23A4B580000
|
trusted library allocation
|
page read and write
|
||
4FEBF7D000
|
stack
|
page read and write
|
||
1B01487C000
|
heap
|
page read and write
|
||
1B602089000
|
heap
|
page read and write
|
||
19485000000
|
heap
|
page read and write
|
||
1B602B55000
|
heap
|
page read and write
|
||
1151000
|
unkown
|
page execute read
|
||
19489E64000
|
heap
|
page read and write
|
||
19484530000
|
heap
|
page read and write
|
||
1B602B57000
|
heap
|
page read and write
|
||
19485BA0000
|
trusted library allocation
|
page read and write
|
||
1B602B5A000
|
heap
|
page read and write
|
||
1B6020A3000
|
heap
|
page read and write
|
||
23A4B4F0000
|
heap
|
page read and write
|
||
1948B000000
|
heap
|
page read and write
|
||
1B01486B000
|
heap
|
page read and write
|
||
85986FE000
|
stack
|
page read and write
|
||
1B014885000
|
heap
|
page read and write
|
||
4FEC27E000
|
stack
|
page read and write
|
||
8598B7F000
|
stack
|
page read and write
|
||
1B014902000
|
heap
|
page read and write
|
||
1B014849000
|
heap
|
page read and write
|
||
10FE000
|
stack
|
page read and write
|
||
1B014845000
|
heap
|
page read and write
|
||
194857D0000
|
trusted library section
|
page readonly
|
||
1B602B5A000
|
heap
|
page read and write
|
||
23A4B65C000
|
heap
|
page read and write
|
||
1948463D000
|
heap
|
page read and write
|
||
1C7C0990000
|
trusted library allocation
|
page read and write
|
||
23A4B629000
|
heap
|
page read and write
|
||
19484626000
|
heap
|
page read and write
|
||
1B015002000
|
trusted library allocation
|
page read and write
|
||
1B602B72000
|
heap
|
page read and write
|
||
1B014670000
|
heap
|
page read and write
|
||
19489E00000
|
heap
|
page read and write
|
||
194846FD000
|
heap
|
page read and write
|
||
10FE000
|
stack
|
page read and write
|
||
23A4B613000
|
heap
|
page read and write
|
||
1B601FC0000
|
heap
|
page read and write
|
||
250E3829000
|
heap
|
page read and write
|
||
1B014843000
|
heap
|
page read and write
|
||
19489C30000
|
trusted library allocation
|
page read and write
|
||
1B602B2A000
|
heap
|
page read and write
|
||
1B01487B000
|
heap
|
page read and write
|
||
1B602B56000
|
heap
|
page read and write
|
||
19489E8A000
|
heap
|
page read and write
|
||
19489EA1000
|
heap
|
page read and write
|
||
1B602B72000
|
heap
|
page read and write
|
||
6D9687E000
|
stack
|
page read and write
|
||
DF73CFC000
|
stack
|
page read and write
|
||
194856F0000
|
trusted library allocation
|
page read and write
|
||
4FEC0FD000
|
stack
|
page read and write
|
||
8D7407E000
|
stack
|
page read and write
|
||
19489D40000
|
trusted library allocation
|
page read and write
|
||
1B014875000
|
heap
|
page read and write
|
||
4FEBE7E000
|
stack
|
page read and write
|
||
1C7C0B00000
|
heap
|
page read and write
|
||
1177000
|
unkown
|
page read and write
|
||
19484600000
|
heap
|
page read and write
|
||
23A4B602000
|
heap
|
page read and write
|
||
1948A010000
|
trusted library allocation
|
page read and write
|
||
1B602B30000
|
heap
|
page read and write
|
||
1B014876000
|
heap
|
page read and write
|
||
DAE000
|
stack
|
page read and write
|
||
4FEBCFE000
|
stack
|
page read and write
|
||
D3C000
|
stack
|
page read and write
|
||
85987F9000
|
stack
|
page read and write
|
||
1C7C0820000
|
heap
|
page read and write
|
||
19484613000
|
heap
|
page read and write
|
||
1B602B32000
|
heap
|
page read and write
|
||
19485B93000
|
trusted library allocation
|
page read and write
|
||
1B602013000
|
heap
|
page read and write
|
||
1B602B73000
|
heap
|
page read and write
|
||
19489D84000
|
trusted library allocation
|
page read and write
|
||
859887F000
|
stack
|
page read and write
|
||
859897A000
|
stack
|
page read and write
|
||
1C7C0A5C000
|
heap
|
page read and write
|
||
1B602B13000
|
heap
|
page read and write
|
||
1C7C09B0000
|
trusted library allocation
|
page read and write
|
||
19489EE0000
|
heap
|
page read and write
|
||
19489E20000
|
heap
|
page read and write
|
||
19489EDA000
|
heap
|
page read and write
|
||
1C7C0B13000
|
heap
|
page read and write
|
||
1C7C0A53000
|
heap
|
page read and write
|
||
1B602082000
|
heap
|
page read and write
|
||
1B602097000
|
heap
|
page read and write
|
||
19485118000
|
heap
|
page read and write
|
||
1B603002000
|
heap
|
page read and write
|
||
1100000
|
remote allocation
|
page read and write
|
||
19485800000
|
trusted library section
|
page readonly
|
||
6D96B7F000
|
stack
|
page read and write
|
||
19489EE8000
|
heap
|
page read and write
|
||
6D96A7E000
|
stack
|
page read and write
|
||
1B014862000
|
heap
|
page read and write
|
||
19489EA0000
|
trusted library allocation
|
page read and write
|
||
859857F000
|
stack
|
page read and write
|
||
19489EA8000
|
heap
|
page read and write
|
||
1B60202A000
|
heap
|
page read and write
|
||
1B602074000
|
heap
|
page read and write
|
||
19485015000
|
heap
|
page read and write
|
||
23A4C002000
|
trusted library allocation
|
page read and write
|
||
1B602B02000
|
heap
|
page read and write
|
||
1B602B59000
|
heap
|
page read and write
|
||
23A4B550000
|
heap
|
page read and write
|
||
115E000
|
unkown
|
page readonly
|
||
1B602B7E000
|
heap
|
page read and write
|
||
10BF000
|
stack
|
page read and write
|
||
23A4B5B0000
|
remote allocation
|
page read and write
|
||
1B602B76000
|
heap
|
page read and write
|
||
4FEBFFF000
|
stack
|
page read and write
|
||
23A4B600000
|
heap
|
page read and write
|
||
250E3720000
|
heap
|
page read and write
|
||
1B602B55000
|
heap
|
page read and write
|
||
1B014866000
|
heap
|
page read and write
|
||
DF740FB000
|
stack
|
page read and write
|
||
1179000
|
unkown
|
page read and write
|
||
1B01487E000
|
heap
|
page read and write
|
||
8597FFB000
|
stack
|
page read and write
|
||
1177000
|
unkown
|
page read and write
|
||
1B014858000
|
heap
|
page read and write
|
||
1B01485D000
|
heap
|
page read and write
|
||
1B602B58000
|
heap
|
page read and write
|
||
19484694000
|
heap
|
page read and write
|
||
1B602B57000
|
heap
|
page read and write
|
||
19489BB0000
|
trusted library allocation
|
page read and write
|
||
1B014860000
|
heap
|
page read and write
|
||
19484671000
|
heap
|
page read and write
|
||
19484679000
|
heap
|
page read and write
|
||
10FE000
|
stack
|
page read and write
|
||
1B602113000
|
heap
|
page read and write
|
||
194846A1000
|
heap
|
page read and write
|
||
1C7C0B02000
|
heap
|
page read and write
|
||
1B602B63000
|
heap
|
page read and write
|
||
1B014660000
|
heap
|
page read and write
|
||
DF745FE000
|
stack
|
page read and write
|
||
10BF000
|
stack
|
page read and write
|
||
4FEBD7E000
|
stack
|
page read and write
|
||
1179000
|
unkown
|
page read and write
|
||
1B01483E000
|
heap
|
page read and write
|
||
250E3876000
|
heap
|
page read and write
|
||
1100000
|
remote allocation
|
page read and write
|
||
85982FF000
|
stack
|
page read and write
|
||
1B602B80000
|
heap
|
page read and write
|
||
1B602B6F000
|
heap
|
page read and write
|
||
1B602B32000
|
heap
|
page read and write
|
||
1B014865000
|
heap
|
page read and write
|
||
250E3856000
|
heap
|
page read and write
|
||
1948A0A0000
|
remote allocation
|
page read and write
|
||
6D96C7E000
|
stack
|
page read and write
|
||
1B014847000
|
heap
|
page read and write
|
||
85984FC000
|
stack
|
page read and write
|
||
194845A0000
|
heap
|
page read and write
|
||
19484713000
|
heap
|
page read and write
|
||
117A000
|
unkown
|
page readonly
|
||
115E000
|
unkown
|
page readonly
|
||
1B602B52000
|
heap
|
page read and write
|
||
1B01482A000
|
heap
|
page read and write
|
||
1B601F50000
|
heap
|
page read and write
|
||
1B602B72000
|
heap
|
page read and write
|
||
250E37B0000
|
trusted library allocation
|
page read and write
|
||
1B602100000
|
heap
|
page read and write
|
||
19489D48000
|
trusted library allocation
|
page read and write
|
||
1948469F000
|
heap
|
page read and write
|
||
1B602B64000
|
heap
|
page read and write
|
||
8D738FF000
|
stack
|
page read and write
|
||
1179000
|
unkown
|
page read and write
|
||
DAE000
|
stack
|
page read and write
|
||
1B602086000
|
heap
|
page read and write
|
||
1B602102000
|
heap
|
page read and write
|
||
8D73BFC000
|
stack
|
page read and write
|
||
1150000
|
unkown
|
page readonly
|
||
2A1F000
|
stack
|
page read and write
|
||
1B601F60000
|
heap
|
page read and write
|
||
1150000
|
unkown
|
page readonly
|
||
1B014830000
|
heap
|
page read and write
|
||
250E3902000
|
heap
|
page read and write
|
||
250E3913000
|
heap
|
page read and write
|
||
DF749FF000
|
stack
|
page read and write
|
||
DF747FE000
|
stack
|
page read and write
|
||
1B602B53000
|
heap
|
page read and write
|
||
1C7C0A43000
|
heap
|
page read and write
|
||
1151000
|
unkown
|
page execute read
|
||
1C7C0830000
|
heap
|
page read and write
|
||
6D96D7F000
|
stack
|
page read and write
|
||
1948A070000
|
trusted library allocation
|
page read and write
|
||
1B602B6B000
|
heap
|
page read and write
|
||
19489E3F000
|
heap
|
page read and write
|
||
1163000
|
unkown
|
page read and write
|
||
8D7357C000
|
stack
|
page read and write
|
||
1B602093000
|
heap
|
page read and write
|
||
1B602B7E000
|
heap
|
page read and write
|
||
1B602B2A000
|
heap
|
page read and write
|
||
85980FF000
|
stack
|
page read and write
|
||
1B602B2C000
|
heap
|
page read and write
|
||
19485B90000
|
trusted library allocation
|
page read and write
|
||
1B014846000
|
heap
|
page read and write
|
||
1C7C0A2A000
|
heap
|
page read and write
|
||
8FB57C000
|
stack
|
page read and write
|
||
19484629000
|
heap
|
page read and write
|
||
19489D64000
|
trusted library allocation
|
page read and write
|
||
194857F0000
|
trusted library section
|
page readonly
|
||
1B602026000
|
heap
|
page read and write
|
||
1B014813000
|
heap
|
page read and write
|
||
250E3780000
|
heap
|
page read and write
|
||
1B602B56000
|
heap
|
page read and write
|
||
19489D40000
|
trusted library allocation
|
page read and write
|
||
DB0000
|
heap
|
page read and write
|
||
1B602B5B000
|
heap
|
page read and write
|
||
1B602B52000
|
heap
|
page read and write
|
||
859799B000
|
stack
|
page read and write
|
||
19485118000
|
heap
|
page read and write
|
||
1948A060000
|
trusted library allocation
|
page read and write
|
||
DF743FF000
|
stack
|
page read and write
|
||
1B014859000
|
heap
|
page read and write
|
||
1948A080000
|
trusted library allocation
|
page read and write
|
||
1B602B57000
|
heap
|
page read and write
|
||
DF0000
|
heap
|
page read and write
|
||
19489E4C000
|
heap
|
page read and write
|
||
1B603000000
|
heap
|
page read and write
|
||
1B01486E000
|
heap
|
page read and write
|
||
1B602B30000
|
heap
|
page read and write
|
||
1B01484E000
|
heap
|
page read and write
|
||
2A1F000
|
stack
|
page read and write
|
||
1B602000000
|
heap
|
page read and write
|
||
115E000
|
unkown
|
page readonly
|
||
1B602A15000
|
heap
|
page read and write
|
||
D3C000
|
stack
|
page read and write
|
||
1151000
|
unkown
|
page execute read
|
||
250E3854000
|
heap
|
page read and write
|
||
250E385A000
|
heap
|
page read and write
|
||
8D73D7F000
|
stack
|
page read and write
|
||
D60000
|
trusted library allocation
|
page read and write
|
||
1B602B40000
|
heap
|
page read and write
|
||
194845E0000
|
trusted library section
|
page read and write
|
||
1B01482E000
|
heap
|
page read and write
|
||
19489D70000
|
trusted library allocation
|
page read and write
|
||
23A4B640000
|
heap
|
page read and write
|
||
1B0147D0000
|
trusted library allocation
|
page read and write
|
||
1B014825000
|
heap
|
page read and write
|
||
8FB77E000
|
stack
|
page read and write
|
||
19485820000
|
trusted library section
|
page readonly
|
||
1948468F000
|
heap
|
page read and write
|
||
250E3802000
|
heap
|
page read and write
|
||
19484540000
|
heap
|
page read and write
|
||
8D73F7F000
|
stack
|
page read and write
|
||
DFA000
|
heap
|
page read and write
|
||
1B602079000
|
heap
|
page read and write
|
||
D3C000
|
stack
|
page read and write
|
||
C3C000
|
stack
|
page read and write
|
||
4FEC1FD000
|
stack
|
page read and write
|
||
85983FF000
|
stack
|
page read and write
|
||
1B601FF0000
|
trusted library allocation
|
page read and write
|
||
DF744FD000
|
stack
|
page read and write
|
||
1B01485A000
|
heap
|
page read and write
|
||
1C7C0890000
|
heap
|
page read and write
|
||
1948A0A0000
|
remote allocation
|
page read and write
|
||
1B602B56000
|
heap
|
page read and write
|
||
1948467B000
|
heap
|
page read and write
|
||
23A4B4E0000
|
heap
|
page read and write
|
||
1150000
|
unkown
|
page readonly
|
||
D60000
|
trusted library allocation
|
page read and write
|
||
C3C000
|
stack
|
page read and write
|
||
1B602B37000
|
heap
|
page read and write
|
||
8D73C7E000
|
stack
|
page read and write
|
||
1B60203F000
|
heap
|
page read and write
|
||
19485201000
|
trusted library allocation
|
page read and write
|
||
4FEBA7B000
|
stack
|
page read and write
|
||
250E4202000
|
trusted library allocation
|
page read and write
|
||
2A1F000
|
stack
|
page read and write
|
||
DF0000
|
heap
|
page read and write
|
||
1177000
|
unkown
|
page read and write
|
||
DAE000
|
stack
|
page read and write
|
||
1B602B6D000
|
heap
|
page read and write
|
||
1B602B6A000
|
heap
|
page read and write
|
||
8FAE8C000
|
stack
|
page read and write
|
||
1B603012000
|
heap
|
page read and write
|
||
9A0000
|
heap
|
page read and write
|
||
1B602B52000
|
heap
|
page read and write
|
||
6D968FE000
|
stack
|
page read and write
|
||
9A0000
|
unkown
|
page read and write
|
||
DB0000
|
heap
|
page read and write
|
||
19489EFC000
|
heap
|
page read and write
|
||
19489C20000
|
trusted library allocation
|
page read and write
|
||
117A000
|
unkown
|
page readonly
|
||
1B014863000
|
heap
|
page read and write
|
||
1B602B74000
|
heap
|
page read and write
|
||
19489E0F000
|
heap
|
page read and write
|
||
19484702000
|
heap
|
page read and write
|
||
23A4B702000
|
heap
|
page read and write
|
||
19485113000
|
heap
|
page read and write
|
||
250E3710000
|
heap
|
page read and write
|
||
1C7C0A64000
|
heap
|
page read and write
|
||
23A4B5B0000
|
remote allocation
|
page read and write
|
||
250E3800000
|
heap
|
page read and write
|
||
19489D70000
|
trusted library allocation
|
page read and write
|
||
DB0000
|
heap
|
page read and write
|
||
1B602B72000
|
heap
|
page read and write
|
||
19485810000
|
trusted library section
|
page readonly
|
||
8FB67E000
|
stack
|
page read and write
|
||
1B602B80000
|
heap
|
page read and write
|
||
19485002000
|
heap
|
page read and write
|
||
9A0000
|
unkown
|
page read and write
|
||
1B014861000
|
heap
|
page read and write
|
||
19489BA0000
|
trusted library allocation
|
page read and write
|
||
DF748FF000
|
stack
|
page read and write
|
||
DF0000
|
heap
|
page read and write
|
||
1B602B78000
|
heap
|
page read and write
|
||
1B602A02000
|
heap
|
page read and write
|
||
8D73AFF000
|
stack
|
page read and write
|
||
1B602B64000
|
heap
|
page read and write
|
||
DF742FC000
|
stack
|
page read and write
|
||
1B60205E000
|
heap
|
page read and write
|
||
10BF000
|
stack
|
page read and write
|
||
859867E000
|
stack
|
page read and write
|
||
1B01485B000
|
heap
|
page read and write
|
||
1B01483B000
|
heap
|
page read and write
|
||
19489EF3000
|
heap
|
page read and write
|
||
8FB37E000
|
stack
|
page read and write
|
||
117A000
|
unkown
|
page readonly
|
||
DFA000
|
heap
|
page read and write
|
||
8D7417B000
|
stack
|
page read and write
|
||
19489D80000
|
trusted library allocation
|
page read and write
|
||
1B014864000
|
heap
|
page read and write
|
||
85981FB000
|
stack
|
page read and write
|
||
19485100000
|
heap
|
page read and write
|
||
859837E000
|
stack
|
page read and write
|
||
1B014878000
|
heap
|
page read and write
|
||
1B602A00000
|
heap
|
page read and write
|
||
1B0146D0000
|
heap
|
page read and write
|
||
19484656000
|
heap
|
page read and write
|
||
117A000
|
unkown
|
page readonly
|
||
1150000
|
unkown
|
page readonly
|
||
8FB479000
|
stack
|
page read and write
|
||
8597EFC000
|
stack
|
page read and write
|
||
D60000
|
trusted library allocation
|
page read and write
|
||
19489D61000
|
trusted library allocation
|
page read and write
|
||
1B014841000
|
heap
|
page read and write
|
||
1B014831000
|
heap
|
page read and write
|
||
1B602B56000
|
heap
|
page read and write
|
||
1B602B29000
|
heap
|
page read and write
|
||
19489E90000
|
trusted library allocation
|
page read and write
|
||
250E3841000
|
heap
|
page read and write
|
||
1B014842000
|
heap
|
page read and write
|
||
1948468D000
|
heap
|
page read and write
|
||
19485B71000
|
trusted library allocation
|
page read and write
|
||
1B602B62000
|
heap
|
page read and write
|
||
8597DF8000
|
stack
|
page read and write
|
||
DF741FF000
|
stack
|
page read and write
|
||
1B602093000
|
heap
|
page read and write
|
||
1C7C0A13000
|
heap
|
page read and write
|
||
1B602095000
|
heap
|
page read and write
|
||
1C7C0A02000
|
heap
|
page read and write
|
||
115E000
|
unkown
|
page readonly
|
||
1B602B53000
|
heap
|
page read and write
|
||
1163000
|
unkown
|
page read and write
|
||
1948A050000
|
trusted library allocation
|
page read and write
|
||
250E3813000
|
heap
|
page read and write
|
||
19485102000
|
heap
|
page read and write
|
||
19489D4E000
|
trusted library allocation
|
page read and write
|
||
1B602B5F000
|
heap
|
page read and write
|
||
8FB87F000
|
stack
|
page read and write
|
||
1948A0A0000
|
remote allocation
|
page read and write
|
||
194845D0000
|
trusted library allocation
|
page read and write
|
||
1151000
|
unkown
|
page execute read
|
||
23A4B5B0000
|
remote allocation
|
page read and write
|
There are 383 hidden memdumps, click here to show them.