Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
SecuriteInfo.com.Win32.PWSX-gen.16188.7094.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
initial sample
|
||
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_SecuriteInfo.com_c136f9839aaccad85a66b9f733bbb3cf4c588e0_e9cd6a7e_166ff3ee\Report.wer
|
Unicode text, UTF-16, little-endian text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WERE76B.tmp.dmp
|
Mini DuMP crash report, 14 streams, Wed Nov 30 00:56:12 2022, 0x1205a4 type
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WEREA98.tmp.WERInternalMetadata.xml
|
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WEREB55.tmp.xml
|
XML 1.0 document, ASCII text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_SecuriteInfo.com_c136f9839aaccad85a66b9f733bbb3cf4c588e0_e9cd6a7e_14ca5c69\Report.wer
|
Unicode text, UTF-16, little-endian text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WER3F7B.tmp.dmp
|
Mini DuMP crash report, 14 streams, Wed Nov 30 00:50:38 2022, 0x1205a4 type
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WER4141.tmp.WERInternalMetadata.xml
|
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WER41CE.tmp.xml
|
XML 1.0 document, ASCII text, with CRLF line terminators
|
dropped
|
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.16188.7094.exe
|
C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.16188.7094.exe
|
||
C:\Windows\SysWOW64\WerFault.exe
|
C:\Windows\SysWOW64\WerFault.exe -u -p 5640 -s 464
|
||
C:\Windows\SysWOW64\WerFault.exe
|
C:\Windows\SysWOW64\WerFault.exe -u -p 6116 -s 464
|
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
192.168.2.1
|
unknown
|
unknown
|
Registry
Path
|
Value
|
Malicious
|
|
---|---|---|---|
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\AppCompatFlags
|
AmiHivePermissionsCorrect
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\AppCompatFlags
|
AmiHiveOwnerCorrect
|
||
\REGISTRY\A\{efceb550-ce2d-c9ce-2fdc-03f454bdc669}\Root\InventoryApplicationFile\securiteinfo.com|cad89d86
|
ProgramId
|
||
\REGISTRY\A\{efceb550-ce2d-c9ce-2fdc-03f454bdc669}\Root\InventoryApplicationFile\securiteinfo.com|cad89d86
|
FileId
|
||
\REGISTRY\A\{efceb550-ce2d-c9ce-2fdc-03f454bdc669}\Root\InventoryApplicationFile\securiteinfo.com|cad89d86
|
LowerCaseLongPath
|
||
\REGISTRY\A\{efceb550-ce2d-c9ce-2fdc-03f454bdc669}\Root\InventoryApplicationFile\securiteinfo.com|cad89d86
|
LongPathHash
|
||
\REGISTRY\A\{efceb550-ce2d-c9ce-2fdc-03f454bdc669}\Root\InventoryApplicationFile\securiteinfo.com|cad89d86
|
Name
|
||
\REGISTRY\A\{efceb550-ce2d-c9ce-2fdc-03f454bdc669}\Root\InventoryApplicationFile\securiteinfo.com|cad89d86
|
Publisher
|
||
\REGISTRY\A\{efceb550-ce2d-c9ce-2fdc-03f454bdc669}\Root\InventoryApplicationFile\securiteinfo.com|cad89d86
|
Version
|
||
\REGISTRY\A\{efceb550-ce2d-c9ce-2fdc-03f454bdc669}\Root\InventoryApplicationFile\securiteinfo.com|cad89d86
|
BinFileVersion
|
||
\REGISTRY\A\{efceb550-ce2d-c9ce-2fdc-03f454bdc669}\Root\InventoryApplicationFile\securiteinfo.com|cad89d86
|
BinaryType
|
||
\REGISTRY\A\{efceb550-ce2d-c9ce-2fdc-03f454bdc669}\Root\InventoryApplicationFile\securiteinfo.com|cad89d86
|
ProductName
|
||
\REGISTRY\A\{efceb550-ce2d-c9ce-2fdc-03f454bdc669}\Root\InventoryApplicationFile\securiteinfo.com|cad89d86
|
ProductVersion
|
||
\REGISTRY\A\{efceb550-ce2d-c9ce-2fdc-03f454bdc669}\Root\InventoryApplicationFile\securiteinfo.com|cad89d86
|
LinkDate
|
||
\REGISTRY\A\{efceb550-ce2d-c9ce-2fdc-03f454bdc669}\Root\InventoryApplicationFile\securiteinfo.com|cad89d86
|
BinProductVersion
|
||
\REGISTRY\A\{efceb550-ce2d-c9ce-2fdc-03f454bdc669}\Root\InventoryApplicationFile\securiteinfo.com|cad89d86
|
Size
|
||
\REGISTRY\A\{efceb550-ce2d-c9ce-2fdc-03f454bdc669}\Root\InventoryApplicationFile\securiteinfo.com|cad89d86
|
Language
|
||
\REGISTRY\A\{efceb550-ce2d-c9ce-2fdc-03f454bdc669}\Root\InventoryApplicationFile\securiteinfo.com|cad89d86
|
IsPeFile
|
||
\REGISTRY\A\{efceb550-ce2d-c9ce-2fdc-03f454bdc669}\Root\InventoryApplicationFile\securiteinfo.com|cad89d86
|
IsOsComponent
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\Windows Error Reporting\Debug
|
ExceptionRecord
|
||
\REGISTRY\A\{d6a58a5f-bea4-b33a-0300-913d28ae3ab3}\Root\InventoryApplicationFile\securiteinfo.com|b8cce6a8
|
ProgramId
|
||
\REGISTRY\A\{d6a58a5f-bea4-b33a-0300-913d28ae3ab3}\Root\InventoryApplicationFile\securiteinfo.com|b8cce6a8
|
FileId
|
||
\REGISTRY\A\{d6a58a5f-bea4-b33a-0300-913d28ae3ab3}\Root\InventoryApplicationFile\securiteinfo.com|b8cce6a8
|
LowerCaseLongPath
|
||
\REGISTRY\A\{d6a58a5f-bea4-b33a-0300-913d28ae3ab3}\Root\InventoryApplicationFile\securiteinfo.com|b8cce6a8
|
LongPathHash
|
||
\REGISTRY\A\{d6a58a5f-bea4-b33a-0300-913d28ae3ab3}\Root\InventoryApplicationFile\securiteinfo.com|b8cce6a8
|
Name
|
||
\REGISTRY\A\{d6a58a5f-bea4-b33a-0300-913d28ae3ab3}\Root\InventoryApplicationFile\securiteinfo.com|b8cce6a8
|
Publisher
|
||
\REGISTRY\A\{d6a58a5f-bea4-b33a-0300-913d28ae3ab3}\Root\InventoryApplicationFile\securiteinfo.com|b8cce6a8
|
Version
|
||
\REGISTRY\A\{d6a58a5f-bea4-b33a-0300-913d28ae3ab3}\Root\InventoryApplicationFile\securiteinfo.com|b8cce6a8
|
BinFileVersion
|
||
\REGISTRY\A\{d6a58a5f-bea4-b33a-0300-913d28ae3ab3}\Root\InventoryApplicationFile\securiteinfo.com|b8cce6a8
|
BinaryType
|
||
\REGISTRY\A\{d6a58a5f-bea4-b33a-0300-913d28ae3ab3}\Root\InventoryApplicationFile\securiteinfo.com|b8cce6a8
|
ProductName
|
||
\REGISTRY\A\{d6a58a5f-bea4-b33a-0300-913d28ae3ab3}\Root\InventoryApplicationFile\securiteinfo.com|b8cce6a8
|
ProductVersion
|
||
\REGISTRY\A\{d6a58a5f-bea4-b33a-0300-913d28ae3ab3}\Root\InventoryApplicationFile\securiteinfo.com|b8cce6a8
|
LinkDate
|
||
\REGISTRY\A\{d6a58a5f-bea4-b33a-0300-913d28ae3ab3}\Root\InventoryApplicationFile\securiteinfo.com|b8cce6a8
|
BinProductVersion
|
||
\REGISTRY\A\{d6a58a5f-bea4-b33a-0300-913d28ae3ab3}\Root\InventoryApplicationFile\securiteinfo.com|b8cce6a8
|
Size
|
||
\REGISTRY\A\{d6a58a5f-bea4-b33a-0300-913d28ae3ab3}\Root\InventoryApplicationFile\securiteinfo.com|b8cce6a8
|
Language
|
||
\REGISTRY\A\{d6a58a5f-bea4-b33a-0300-913d28ae3ab3}\Root\InventoryApplicationFile\securiteinfo.com|b8cce6a8
|
IsPeFile
|
||
\REGISTRY\A\{d6a58a5f-bea4-b33a-0300-913d28ae3ab3}\Root\InventoryApplicationFile\securiteinfo.com|b8cce6a8
|
IsOsComponent
|
||
HKEY_CURRENT_USER\Software\Microsoft\IdentityCRL\Immersive\production\Property
|
0018800807EAAF0D
|
||
HKEY_CURRENT_USER\Software\Microsoft\IdentityCRL\Immersive\production\Token\{67082621-8D18-4333-9C64-10DE93676363}
|
DeviceTicket
|
||
HKEY_CURRENT_USER\Software\Microsoft\IdentityCRL\Immersive\production\Token\{67082621-8D18-4333-9C64-10DE93676363}
|
DeviceId
|
||
HKEY_CURRENT_USER\Software\Microsoft\IdentityCRL\Immersive\production\Token\{67082621-8D18-4333-9C64-10DE93676363}
|
ApplicationFlags
|
There are 31 hidden registries, click here to show them.
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
1A1000
|
unkown
|
page execute read
|
||
28A09B56000
|
heap
|
page read and write
|
||
22C8265F000
|
heap
|
page read and write
|
||
28A09B5A000
|
heap
|
page read and write
|
||
28A08F40000
|
heap
|
page read and write
|
||
28A09B52000
|
heap
|
page read and write
|
||
F39AE7E000
|
stack
|
page read and write
|
||
D6B317E000
|
stack
|
page read and write
|
||
28A08F50000
|
heap
|
page read and write
|
||
99826FE000
|
stack
|
page read and write
|
||
23DD3E2A000
|
heap
|
page read and write
|
||
19E000
|
stack
|
page read and write
|
||
2891AA43000
|
heap
|
page read and write
|
||
1A1000
|
unkown
|
page execute read
|
||
28A09094000
|
heap
|
page read and write
|
||
998267B000
|
stack
|
page read and write
|
||
6C0000
|
heap
|
page read and write
|
||
281A9024000
|
heap
|
page read and write
|
||
AB0000
|
heap
|
page read and write
|
||
9982BFE000
|
stack
|
page read and write
|
||
B20FCAC000
|
stack
|
page read and write
|
||
265CED40000
|
heap
|
page read and write
|
||
8BE000
|
stack
|
page read and write
|
||
28A09B63000
|
heap
|
page read and write
|
||
23DD3E13000
|
heap
|
page read and write
|
||
23DD3BE0000
|
heap
|
page read and write
|
||
28A090C2000
|
heap
|
page read and write
|
||
28A09B52000
|
heap
|
page read and write
|
||
EC000
|
stack
|
page read and write
|
||
DA9AC7F000
|
stack
|
page read and write
|
||
1C9000
|
unkown
|
page readonly
|
||
265CEE5A000
|
heap
|
page read and write
|
||
28A09B57000
|
heap
|
page read and write
|
||
281A8ED0000
|
heap
|
page read and write
|
||
2891AA54000
|
heap
|
page read and write
|
||
23DD3E39000
|
heap
|
page read and write
|
||
265CEE13000
|
heap
|
page read and write
|
||
28A09B52000
|
heap
|
page read and write
|
||
281A9A02000
|
heap
|
page read and write
|
||
28A09B66000
|
heap
|
page read and write
|
||
265CEE58000
|
heap
|
page read and write
|
||
DA9A87E000
|
stack
|
page read and write
|
||
23DD3E43000
|
heap
|
page read and write
|
||
28A09B53000
|
heap
|
page read and write
|
||
23DD3E48000
|
heap
|
page read and write
|
||
28A09B32000
|
heap
|
page read and write
|
||
2891AA43000
|
heap
|
page read and write
|
||
998277E000
|
stack
|
page read and write
|
||
15404E63000
|
heap
|
page read and write
|
||
28A09B52000
|
heap
|
page read and write
|
||
1A1000
|
unkown
|
page execute read
|
||
D6B367E000
|
stack
|
page read and write
|
||
23DD3E7B000
|
heap
|
page read and write
|
||
99829FE000
|
stack
|
page read and write
|
||
1BC000
|
unkown
|
page readonly
|
||
D770FF000
|
stack
|
page read and write
|
||
15404E00000
|
heap
|
page read and write
|
||
28A09B6A000
|
heap
|
page read and write
|
||
22C82E70000
|
trusted library allocation
|
page read and write
|
||
28A090AB000
|
heap
|
page read and write
|
||
281A90C4000
|
heap
|
page read and write
|
||
23DD3E70000
|
heap
|
page read and write
|
||
28A09B32000
|
heap
|
page read and write
|
||
1BC000
|
unkown
|
page readonly
|
||
265CEF13000
|
heap
|
page read and write
|
||
B20000
|
heap
|
page read and write
|
||
B21027A000
|
stack
|
page read and write
|
||
8BE000
|
stack
|
page read and write
|
||
B21037F000
|
stack
|
page read and write
|
||
AB0000
|
trusted library allocation
|
page read and write
|
||
15404E28000
|
heap
|
page read and write
|
||
23DD3E45000
|
heap
|
page read and write
|
||
28A09B52000
|
heap
|
page read and write
|
||
28A09B82000
|
heap
|
page read and write
|
||
B21017E000
|
stack
|
page read and write
|
||
22C825D0000
|
heap
|
page read and write
|
||
265CEE75000
|
heap
|
page read and write
|
||
23DD3E76000
|
heap
|
page read and write
|
||
23DD3E4F000
|
heap
|
page read and write
|
||
265CEF02000
|
heap
|
page read and write
|
||
19E000
|
stack
|
page read and write
|
||
DA9B07E000
|
stack
|
page read and write
|
||
2891A850000
|
heap
|
page read and write
|
||
265CEDA0000
|
heap
|
page read and write
|
||
80000
|
heap
|
page read and write
|
||
2891AA65000
|
heap
|
page read and write
|
||
23DD3E47000
|
heap
|
page read and write
|
||
28A09B13000
|
heap
|
page read and write
|
||
28A09B72000
|
heap
|
page read and write
|
||
28A09A02000
|
heap
|
page read and write
|
||
CD1E2FB000
|
stack
|
page read and write
|
||
23DD3BF0000
|
heap
|
page read and write
|
||
28A09B5B000
|
heap
|
page read and write
|
||
28A09083000
|
heap
|
page read and write
|
||
28A09B2A000
|
heap
|
page read and write
|
||
23DD3E4A000
|
heap
|
page read and write
|
||
80000
|
unkown
|
page read and write
|
||
5C0000
|
heap
|
page read and write
|
||
28A09102000
|
heap
|
page read and write
|
||
281A8F30000
|
heap
|
page read and write
|
||
DA9AD7E000
|
stack
|
page read and write
|
||
28A0903D000
|
heap
|
page read and write
|
||
2891A970000
|
trusted library allocation
|
page read and write
|
||
23DD3E39000
|
heap
|
page read and write
|
||
22C83002000
|
trusted library allocation
|
page read and write
|
||
28A09091000
|
heap
|
page read and write
|
||
2891A950000
|
trusted library allocation
|
page read and write
|
||
28A090AF000
|
heap
|
page read and write
|
||
23DD3E52000
|
heap
|
page read and write
|
||
15404E40000
|
heap
|
page read and write
|
||
28A09029000
|
heap
|
page read and write
|
||
23DD3F02000
|
heap
|
page read and write
|
||
28A09B52000
|
heap
|
page read and write
|
||
22C82657000
|
heap
|
page read and write
|
||
23DD3E37000
|
heap
|
page read and write
|
||
2891A7E0000
|
heap
|
page read and write
|
||
22C82638000
|
heap
|
page read and write
|
||
23DD3E7A000
|
heap
|
page read and write
|
||
23DD3E7C000
|
heap
|
page read and write
|
||
1C4000
|
unkown
|
page read and write
|
||
28A09B2A000
|
heap
|
page read and write
|
||
23DD3E37000
|
heap
|
page read and write
|
||
28A09B73000
|
heap
|
page read and write
|
||
281A9088000
|
heap
|
page read and write
|
||
28A09B30000
|
heap
|
page read and write
|
||
2891AB13000
|
heap
|
page read and write
|
||
D768CC000
|
stack
|
page read and write
|
||
28A09000000
|
heap
|
page read and write
|
||
B21047B000
|
stack
|
page read and write
|
||
281A9B12000
|
heap
|
page read and write
|
||
2891AA13000
|
heap
|
page read and write
|
||
281A9040000
|
heap
|
page read and write
|
||
D6B33FC000
|
stack
|
page read and write
|
||
15404D60000
|
heap
|
page read and write
|
||
22C82560000
|
heap
|
page read and write
|
||
28A09B55000
|
heap
|
page read and write
|
||
2891AA58000
|
heap
|
page read and write
|
||
28A09B32000
|
heap
|
page read and write
|
||
D6B2FFC000
|
stack
|
page read and write
|
||
28A09A15000
|
heap
|
page read and write
|
||
23DD3E51000
|
heap
|
page read and write
|
||
28A09B32000
|
heap
|
page read and write
|
||
DA9A77A000
|
stack
|
page read and write
|
||
265CEE02000
|
heap
|
page read and write
|
||
53E000
|
stack
|
page read and write
|
||
15404DF0000
|
trusted library allocation
|
page read and write
|
||
EC000
|
stack
|
page read and write
|
||
281A906E000
|
heap
|
page read and write
|
||
28A09B85000
|
heap
|
page read and write
|
||
6C0000
|
heap
|
page read and write
|
||
150000
|
trusted library allocation
|
page read and write
|
||
6CA000
|
heap
|
page read and write
|
||
28A09B52000
|
heap
|
page read and write
|
||
22C82EA0000
|
remote allocation
|
page read and write
|
||
8BE000
|
stack
|
page read and write
|
||
2891A7F0000
|
heap
|
page read and write
|
||
28A090A4000
|
heap
|
page read and write
|
||
D6B387E000
|
stack
|
page read and write
|
||
28A09B80000
|
heap
|
page read and write
|
||
1A0000
|
unkown
|
page readonly
|
||
265CED30000
|
heap
|
page read and write
|
||
D6B347B000
|
stack
|
page read and write
|
||
281A8F60000
|
trusted library allocation
|
page read and write
|
||
28A090BE000
|
heap
|
page read and write
|
||
53E000
|
stack
|
page read and write
|
||
28A09B59000
|
heap
|
page read and write
|
||
281A90CB000
|
heap
|
page read and write
|
||
2891AA3C000
|
heap
|
page read and write
|
||
1C9000
|
unkown
|
page readonly
|
||
22C82EA0000
|
remote allocation
|
page read and write
|
||
28A09B02000
|
heap
|
page read and write
|
||
B20000
|
heap
|
page read and write
|
||
D6B357C000
|
stack
|
page read and write
|
||
28A09B2A000
|
heap
|
page read and write
|
||
5C0000
|
heap
|
page read and write
|
||
281A9000000
|
heap
|
page read and write
|
||
D6B377D000
|
stack
|
page read and write
|
||
265CEE3D000
|
heap
|
page read and write
|
||
DA9AB7D000
|
stack
|
page read and write
|
||
28A090AF000
|
heap
|
page read and write
|
||
28A0905D000
|
heap
|
page read and write
|
||
28A09086000
|
heap
|
page read and write
|
||
9BE000
|
stack
|
page read and write
|
||
23DD3C50000
|
heap
|
page read and write
|
||
F39AD7C000
|
stack
|
page read and write
|
||
28A09B74000
|
heap
|
page read and write
|
||
D76FFB000
|
stack
|
page read and write
|
||
15404F02000
|
heap
|
page read and write
|
||
28A09026000
|
heap
|
page read and write
|
||
23DD3E7F000
|
heap
|
page read and write
|
||
CD1E1FE000
|
stack
|
page read and write
|
||
B2100FA000
|
stack
|
page read and write
|
||
150000
|
trusted library allocation
|
page read and write
|
||
CD1E37E000
|
stack
|
page read and write
|
||
28A09B29000
|
heap
|
page read and write
|
||
CD1E77F000
|
stack
|
page read and write
|
||
28A09B57000
|
heap
|
page read and write
|
||
28A09023000
|
heap
|
page read and write
|
||
4FC000
|
stack
|
page read and write
|
||
28A09B55000
|
heap
|
page read and write
|
||
F39AF7D000
|
stack
|
page read and write
|
||
CD1E87B000
|
stack
|
page read and write
|
||
28A09B4D000
|
heap
|
page read and write
|
||
28A09B33000
|
heap
|
page read and write
|
||
9BE000
|
stack
|
page read and write
|
||
540000
|
remote allocation
|
page read and write
|
||
23DD3D50000
|
trusted library allocation
|
page read and write
|
||
28A090BA000
|
heap
|
page read and write
|
||
28A09B82000
|
heap
|
page read and write
|
||
15404DC0000
|
heap
|
page read and write
|
||
B21067E000
|
stack
|
page read and write
|
||
28A09B52000
|
heap
|
page read and write
|
||
28A09B6F000
|
heap
|
page read and write
|
||
28A09B62000
|
heap
|
page read and write
|
||
28A09B52000
|
heap
|
page read and write
|
||
23DD3E75000
|
heap
|
page read and write
|
||
2891AB02000
|
heap
|
page read and write
|
||
265CEE69000
|
heap
|
page read and write
|
||
23DD3E66000
|
heap
|
page read and write
|
||
28A09B2C000
|
heap
|
page read and write
|
||
1BC000
|
unkown
|
page readonly
|
||
DA9AE7F000
|
stack
|
page read and write
|
||
6CA000
|
heap
|
page read and write
|
||
28A09B00000
|
heap
|
page read and write
|
||
28A09B40000
|
heap
|
page read and write
|
||
28A09B59000
|
heap
|
page read and write
|
||
28A090AF000
|
heap
|
page read and write
|
||
CD1DCEB000
|
stack
|
page read and write
|
||
5C0000
|
heap
|
page read and write
|
||
1C9000
|
unkown
|
page readonly
|
||
22C82629000
|
heap
|
page read and write
|
||
1A0000
|
unkown
|
page readonly
|
||
28A09B53000
|
heap
|
page read and write
|
||
28A09A00000
|
heap
|
page read and write
|
||
CD1E47A000
|
stack
|
page read and write
|
||
265CEE3F000
|
heap
|
page read and write
|
||
28A09B30000
|
heap
|
page read and write
|
||
22C82EA0000
|
remote allocation
|
page read and write
|
||
F39AFFE000
|
stack
|
page read and write
|
||
28A09100000
|
heap
|
page read and write
|
||
6C0000
|
heap
|
page read and write
|
||
CD1E07F000
|
stack
|
page read and write
|
||
D76DFB000
|
stack
|
page read and write
|
||
265CEE00000
|
heap
|
page read and write
|
||
23DD3E41000
|
heap
|
page read and write
|
||
15404D50000
|
heap
|
page read and write
|
||
281A9013000
|
heap
|
page read and write
|
||
D6B32FC000
|
stack
|
page read and write
|
||
28A09B53000
|
heap
|
page read and write
|
||
281A9102000
|
heap
|
page read and write
|
||
28A090A7000
|
heap
|
page read and write
|
||
15404E7B000
|
heap
|
page read and write
|
||
281A90BA000
|
heap
|
page read and write
|
||
22C82570000
|
heap
|
page read and write
|
||
23DD3E3E000
|
heap
|
page read and write
|
||
22C82641000
|
heap
|
page read and write
|
||
23DD4602000
|
trusted library allocation
|
page read and write
|
||
2891AA02000
|
heap
|
page read and write
|
||
15404F00000
|
heap
|
page read and write
|
||
D6B327F000
|
stack
|
page read and write
|
||
28A09B78000
|
heap
|
page read and write
|
||
22C82602000
|
heap
|
page read and write
|
||
22C82600000
|
heap
|
page read and write
|
||
23DD3E32000
|
heap
|
page read and write
|
||
23DD3E42000
|
heap
|
page read and write
|
||
99828FE000
|
stack
|
page read and write
|
||
265CEDD0000
|
trusted library allocation
|
page read and write
|
||
1A0000
|
unkown
|
page readonly
|
||
2891AA60000
|
heap
|
page read and write
|
||
28A09B5F000
|
heap
|
page read and write
|
||
15404E68000
|
heap
|
page read and write
|
||
28A09091000
|
heap
|
page read and write
|
||
28A08FE0000
|
trusted library allocation
|
page read and write
|
||
15405802000
|
trusted library allocation
|
page read and write
|
||
23DD3E6B000
|
heap
|
page read and write
|
||
F39AA7B000
|
stack
|
page read and write
|
||
1C4000
|
unkown
|
page read and write
|
||
28A09B65000
|
heap
|
page read and write
|
||
6CA000
|
heap
|
page read and write
|
||
28A09094000
|
heap
|
page read and write
|
||
DA9AF7F000
|
stack
|
page read and write
|
||
1C4000
|
unkown
|
page write copy
|
||
23DD3E46000
|
heap
|
page read and write
|
||
B21057E000
|
stack
|
page read and write
|
||
1C9000
|
unkown
|
page readonly
|
||
2891B202000
|
trusted library allocation
|
page read and write
|
||
23DD3E2E000
|
heap
|
page read and write
|
||
22C82613000
|
heap
|
page read and write
|
||
19E000
|
stack
|
page read and write
|
||
9982AFE000
|
stack
|
page read and write
|
||
DA9A32C000
|
stack
|
page read and write
|
||
D6B2BDB000
|
stack
|
page read and write
|
||
28A09B52000
|
heap
|
page read and write
|
||
F39B17E000
|
stack
|
page read and write
|
||
281A8EC0000
|
heap
|
page read and write
|
||
2891AB00000
|
heap
|
page read and write
|
||
23DD3E69000
|
heap
|
page read and write
|
||
28A09B57000
|
heap
|
page read and write
|
||
2891AA0B000
|
heap
|
page read and write
|
||
80000
|
unkown
|
page read and write
|
||
4FC000
|
stack
|
page read and write
|
||
15404F13000
|
heap
|
page read and write
|
||
28A09B30000
|
heap
|
page read and write
|
||
15404E58000
|
heap
|
page read and write
|
||
28A08FB0000
|
heap
|
page read and write
|
||
23DD3E4C000
|
heap
|
page read and write
|
||
53E000
|
stack
|
page read and write
|
||
28A09B40000
|
heap
|
page read and write
|
||
EC000
|
stack
|
page read and write
|
||
CD1E57F000
|
stack
|
page read and write
|
||
23DD3E6E000
|
heap
|
page read and write
|
||
150000
|
trusted library allocation
|
page read and write
|
||
28A090B3000
|
heap
|
page read and write
|
||
1A0000
|
unkown
|
page readonly
|
||
28A09B2F000
|
heap
|
page read and write
|
||
28A09B80000
|
heap
|
page read and write
|
||
28A09B56000
|
heap
|
page read and write
|
||
23DD3E30000
|
heap
|
page read and write
|
||
28A09B7A000
|
heap
|
page read and write
|
||
F39ACFE000
|
stack
|
page read and write
|
||
23DD3E85000
|
heap
|
page read and write
|
||
265CF802000
|
trusted library allocation
|
page read and write
|
||
28A09B52000
|
heap
|
page read and write
|
||
9BE000
|
stack
|
page read and write
|
||
1C4000
|
unkown
|
page read and write
|
||
281A9113000
|
heap
|
page read and write
|
||
1BC000
|
unkown
|
page readonly
|
||
28A090CA000
|
heap
|
page read and write
|
||
540000
|
remote allocation
|
page read and write
|
||
281A9029000
|
heap
|
page read and write
|
||
265CEE6F000
|
heap
|
page read and write
|
||
DA9A97C000
|
stack
|
page read and write
|
||
28A09B57000
|
heap
|
page read and write
|
||
23DD3E78000
|
heap
|
page read and write
|
||
281A9B00000
|
heap
|
page read and write
|
||
22C82702000
|
heap
|
page read and write
|
||
2891AA29000
|
heap
|
page read and write
|
||
D76EFB000
|
stack
|
page read and write
|
||
AB0000
|
trusted library allocation
|
page read and write
|
||
28A09B29000
|
heap
|
page read and write
|
||
28A09B5B000
|
heap
|
page read and write
|
||
28A09B37000
|
heap
|
page read and write
|
||
2891AA00000
|
heap
|
page read and write
|
||
22C82659000
|
heap
|
page read and write
|
||
28A09013000
|
heap
|
page read and write
|
||
28A09B59000
|
heap
|
page read and write
|
||
23DD3E49000
|
heap
|
page read and write
|
||
23DD3E50000
|
heap
|
page read and write
|
||
1A1000
|
unkown
|
page execute read
|
||
23DD3E00000
|
heap
|
page read and write
|
||
28A09113000
|
heap
|
page read and write
|
||
28A09B52000
|
heap
|
page read and write
|
||
15404E02000
|
heap
|
page read and write
|
||
B20000
|
heap
|
page read and write
|
||
F39B0FD000
|
stack
|
page read and write
|
||
281A90E1000
|
heap
|
page read and write
|
||
15404E13000
|
heap
|
page read and write
|
||
265CEE29000
|
heap
|
page read and write
|
||
4FC000
|
stack
|
page read and write
|
There are 349 hidden memdumps, click here to show them.