Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
SecuriteInfo.com.Win32.Trojan.PSE.1G80G6X.7216.15072.exe
|
PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows
|
initial sample
|
||
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_SecuriteInfo.com_8b8aab2d3044b37bde8ae2665b0819910cdd8be_7335685e_095836a8\Report.wer
|
Unicode text, UTF-16, little-endian text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WER172A.tmp.dmp
|
Mini DuMP crash report, 14 streams, Wed Feb 8 03:47:54 2023, 0x1205a4 type
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WER17F6.tmp.WERInternalMetadata.xml
|
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WER1864.tmp.xml
|
XML 1.0 document, ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Windows\appcompat\Programs\Amcache.hve
|
MS Windows registry file, NT/2000 or above
|
dropped
|
||
C:\Windows\appcompat\Programs\Amcache.hve.LOG1
|
MS Windows registry file, NT/2000 or above
|
dropped
|
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\SecuriteInfo.com.Win32.Trojan.PSE.1G80G6X.7216.15072.exe
|
C:\Users\user\Desktop\SecuriteInfo.com.Win32.Trojan.PSE.1G80G6X.7216.15072.exe
|
||
C:\Windows\SysWOW64\WerFault.exe
|
C:\Windows\SysWOW64\WerFault.exe -u -p 2368 -s 212
|
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
https://images-ext-1.discordapp.net:
|
unknown
|
||
https://5bcfae2f38d0e143c888d07ec9733d8c.s
|
unknown
|
||
https://www.dogfight360.com/blog
|
unknown
|
||
https://countess.twitch.tv:
|
unknown
|
||
https://eaassets-a.akam
|
unknown
|
||
https://c58c9f027b8d0739f6b6d94b831e1010.steam302.xyz
|
unknown
|
||
https://cvp.twitch.tv:
|
unknown
|
||
https://status.discordapp.com:
|
unknown
|
||
https://dev.twitch.tv:
|
unknown
|
||
https://passport.twitch.tv:
|
unknown
|
||
https://bd4a0c7567edeaa0401463857c28ead7.steam302.xyz
|
unknown
|
||
https://gds-vhs-drops-campaign-images.twitch.tv:
|
unknown
|
||
https://id-cdn.twitch.tv:
|
unknown
|
||
https://usher.ttvnw.net:
|
unknown
|
||
https://104.16.52.111
|
unknown
|
||
https://aa88a8ab3fabc0c5d90ca85c9442a948.steam302.xyz
|
unknown
|
||
https://discordapp.com:
|
unknown
|
||
https://steamuserimages-a.akamaihd.net
|
unknown
|
||
https://95df2ea9aba3e1cad7f8f4526047b63b.steam302.xyz
|
unknown
|
||
https://5a895ed07aed1b254ee21cd78958ae0b.steam302.xyz
|
unknown
|
||
https://c2491d9d37e95faee1c67e314ae9a4bb.steam302.xyz
|
unknown
|
||
https://vod-metro.twitch.tv:
|
unknown
|
||
https://api.twitch.tv:
|
unknown
|
||
http://www.clamav.net
|
unknown
|
||
https://origin-a.akamaihd.net:
|
unknown
|
||
https://steamcommunity-a.akamaihd.ne
|
unknown
|
||
https://link.twitch.
|
unknown
|
||
https://id.twitch.tv:
|
unknown
|
||
https://link.twitch.tv:
|
unknown
|
||
https://eaassets-a.akamaihd.net
|
unknown
|
||
https://104.16.54.111
|
unknown
|
||
https://clips.twitch.tv:
|
unknown
|
||
https://aws.amazon.com
|
unknown
|
||
https://104.17.2.37
|
unknown
|
||
https://2f16aa2ed3889461cd1076540300a6b3.steam302.xyz
|
unknown
|
||
https://pubsub-edge.twitch.tv:
|
unknown
|
||
https://6d7b94f6a3142075c6e14f949daff580.steam302.xyz
|
unknown
|
||
https://gql.twitc
|
unknown
|
||
https://06b67885560f95cbdf0ba34722e8d33c.steam302.xyz
|
unknown
|
||
https://us-west-2.uploads-regional.twitch.tv:
|
unknown
|
||
https://steamcn.com/t419530-1-1
|
unknown
|
||
https://1da58962a7dd53edd9775f6f74ff14e5.steam302.xyz
|
unknown
|
||
https://dl.discordapp.net:
|
unknown
|
||
http://usher.steam302.xyz
|
unknown
|
||
https://steamcdn-a.akamaihd.net:
|
unknown
|
||
https://music.twitch.tv:
|
unknown
|
||
https://steamstore-a.akamaihd.net
|
unknown
|
||
https://player.twitch.tv:
|
unknown
|
||
https://www.twitch.tv:
|
unknown
|
||
https://162.159.129.233
|
unknown
|
||
https://162.159.129.232
|
unknown
|
||
https://clips-media-assets2.twitch.tv:
|
unknown
|
||
https://m.twitch.tv:
|
unknown
|
||
https://gateway.discord.gg:
|
unknown
|
||
https://2973c6ca0e111662ed293b57dbae9fbf.steam302.xyz
|
unknown
|
||
https://6d859be7aa0440f65c8a940ef5218337.steam302.xyz
|
unknown
|
||
https://gateway.discord.gg
|
unknown
|
||
https://images-ext-2.discordapp.net:
|
unknown
|
||
https://vod-storyboards.twitch.tv:
|
unknown
|
||
http://vluki-a.akamaihd.net
|
unknown
|
||
https://steamcommunity-a.akam
|
unknown
|
||
https://irc-ws.chat.twitch.tv:
|
unknown
|
||
https://2f9e9e61f7236db30c1ce0bb9d53581b.steam302.xyz
|
unknown
|
||
https://app.twitch.tv:
|
unknown
|
||
https://steamcommunity-a.akamai
|
unknown
|
||
https://104.16.51.111
|
unknown
|
||
https://7106a273bf3bbce901b765718ecbe69b.steam302.xyz
|
unknown
|
||
https://platform.twitter.com:
|
unknown
|
||
https://890c88446f94f25bd32a3f1e0df6c120.steam302.xyz
|
unknown
|
||
https://blog.twitch.tv:
|
unknown
|
||
https://b3a0f6b6d20e3408d1725780186c54d3.steam302.xyz
|
unknown
|
||
https://gql.twitch.tv:
|
unknown
|
||
https://extension-files.twitch.tv:
|
unknown
|
||
https://eaassets-a.akamaihd
|
unknown
|
||
https://fb96613da2b5475079b93f4be2e94cd3.steam302.xyz
|
unknown
|
||
https://43658a3dbcfbc284a9030abbc3691c30.steam302.xyz
|
unknown
|
||
https://client-event-reporter.twitch.tv:
|
unknown
|
||
https://twitch.tv:
|
unknown
|
||
https://104.16.53.111
|
unknown
|
||
https://inspector.twitch.tv:
|
unknown
|
||
http://cctv4-lh.akamaihd.net
|
unknown
|
||
https://e320c9db4f90dd219ab379f6a5e50dbd.steam302.xyz
|
unknown
|
||
https://dbc180c27b3635f9e5b006f3a037b87e.steam302.xyz
|
unknown
|
||
https://static2.cdn.ubi.com
|
unknown
|
||
https://steampipe.ak
|
unknown
|
||
http://toots-a.akamaihd.net
|
unknown
|
||
https://spade.twitch.tv:
|
unknown
|
||
https://media.discordapp.net:
|
unknown
|
||
http://hgtv-i.akamaihd.net
|
unknown
|
||
https://support.discordapp.com:
|
unknown
|
||
https://trowel.twitch.tv:
|
unknown
|
||
https://985a89155dd090eacda1b82388e334ed.steam302.xyz
|
unknown
|
||
https://store.steampowered.com:
|
unknown
|
||
https://104.16.55.111
|
unknown
|
||
https://help.twitch.tv:
|
unknown
|
||
http://upx.sf.net
|
unknown
|
||
https://5dd1e18eb1a29671b73c32e518b37111.steam302.xyz
|
unknown
|
||
https://91b1eb7256ac2992f03fe0c7e7ef998d.steam302.xyz
|
unknown
|
||
https://e8304b1598fbfa673d2055f0a3342d7a.steam302.xyz
|
unknown
|
||
https://1d23669ea58a590fd66d9204d4301563.steam302.xyz
|
unknown
|
There are 90 hidden URLs, click here to show them.
Registry
Path
|
Value
|
Malicious
|
|
---|---|---|---|
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\AppCompatFlags
|
AmiHivePermissionsCorrect
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\AppCompatFlags
|
AmiHiveOwnerCorrect
|
||
\REGISTRY\A\{d0002fcf-02a9-b331-d719-93ce42d98bee}\Root\InventoryApplicationFile\securiteinfo.com|74c31352
|
ProgramId
|
||
\REGISTRY\A\{d0002fcf-02a9-b331-d719-93ce42d98bee}\Root\InventoryApplicationFile\securiteinfo.com|74c31352
|
FileId
|
||
\REGISTRY\A\{d0002fcf-02a9-b331-d719-93ce42d98bee}\Root\InventoryApplicationFile\securiteinfo.com|74c31352
|
LowerCaseLongPath
|
||
\REGISTRY\A\{d0002fcf-02a9-b331-d719-93ce42d98bee}\Root\InventoryApplicationFile\securiteinfo.com|74c31352
|
LongPathHash
|
||
\REGISTRY\A\{d0002fcf-02a9-b331-d719-93ce42d98bee}\Root\InventoryApplicationFile\securiteinfo.com|74c31352
|
Name
|
||
\REGISTRY\A\{d0002fcf-02a9-b331-d719-93ce42d98bee}\Root\InventoryApplicationFile\securiteinfo.com|74c31352
|
Publisher
|
||
\REGISTRY\A\{d0002fcf-02a9-b331-d719-93ce42d98bee}\Root\InventoryApplicationFile\securiteinfo.com|74c31352
|
Version
|
||
\REGISTRY\A\{d0002fcf-02a9-b331-d719-93ce42d98bee}\Root\InventoryApplicationFile\securiteinfo.com|74c31352
|
BinFileVersion
|
||
\REGISTRY\A\{d0002fcf-02a9-b331-d719-93ce42d98bee}\Root\InventoryApplicationFile\securiteinfo.com|74c31352
|
BinaryType
|
||
\REGISTRY\A\{d0002fcf-02a9-b331-d719-93ce42d98bee}\Root\InventoryApplicationFile\securiteinfo.com|74c31352
|
ProductName
|
||
\REGISTRY\A\{d0002fcf-02a9-b331-d719-93ce42d98bee}\Root\InventoryApplicationFile\securiteinfo.com|74c31352
|
ProductVersion
|
||
\REGISTRY\A\{d0002fcf-02a9-b331-d719-93ce42d98bee}\Root\InventoryApplicationFile\securiteinfo.com|74c31352
|
LinkDate
|
||
\REGISTRY\A\{d0002fcf-02a9-b331-d719-93ce42d98bee}\Root\InventoryApplicationFile\securiteinfo.com|74c31352
|
BinProductVersion
|
||
\REGISTRY\A\{d0002fcf-02a9-b331-d719-93ce42d98bee}\Root\InventoryApplicationFile\securiteinfo.com|74c31352
|
Size
|
||
\REGISTRY\A\{d0002fcf-02a9-b331-d719-93ce42d98bee}\Root\InventoryApplicationFile\securiteinfo.com|74c31352
|
Language
|
||
\REGISTRY\A\{d0002fcf-02a9-b331-d719-93ce42d98bee}\Root\InventoryApplicationFile\securiteinfo.com|74c31352
|
IsPeFile
|
||
\REGISTRY\A\{d0002fcf-02a9-b331-d719-93ce42d98bee}\Root\InventoryApplicationFile\securiteinfo.com|74c31352
|
IsOsComponent
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\Windows Error Reporting\Debug
|
ExceptionRecord
|
||
HKEY_CURRENT_USER\Software\Microsoft\IdentityCRL\Immersive\production\Property
|
001880093E844BFD
|
||
HKEY_CURRENT_USER\Software\Microsoft\IdentityCRL\Immersive\production\Token\{67082621-8D18-4333-9C64-10DE93676363}
|
DeviceTicket
|
||
HKEY_CURRENT_USER\Software\Microsoft\IdentityCRL\Immersive\production\Token\{67082621-8D18-4333-9C64-10DE93676363}
|
DeviceId
|
||
HKEY_CURRENT_USER\Software\Microsoft\IdentityCRL\Immersive\production\Token\{67082621-8D18-4333-9C64-10DE93676363}
|
ApplicationFlags
|
There are 14 hidden registries, click here to show them.
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
21324657000
|
heap
|
page read and write
|
||
25C6A0C0000
|
heap
|
page read and write
|
||
16E74C7A000
|
heap
|
page read and write
|
||
13E80829000
|
heap
|
page read and write
|
||
16E74C67000
|
heap
|
page read and write
|
||
1DDEEF10000
|
heap
|
page read and write
|
||
84F7E79000
|
stack
|
page read and write
|
||
1DDEF1E6000
|
heap
|
page read and write
|
||
1C229A02000
|
trusted library allocation
|
page read and write
|
||
A08FFFC000
|
stack
|
page read and write
|
||
1DDEF943000
|
heap
|
page read and write
|
||
50B000
|
unkown
|
page execute and read and write
|
||
13E80700000
|
heap
|
page read and write
|
||
22B80960000
|
heap
|
page read and write
|
||
16E74C63000
|
heap
|
page read and write
|
||
22B81202000
|
heap
|
page read and write
|
||
25C6AA02000
|
trusted library allocation
|
page read and write
|
||
21326610000
|
remote allocation
|
page read and write
|
||
25C6A213000
|
heap
|
page read and write
|
||
1E167E3D000
|
heap
|
page read and write
|
||
213244B0000
|
heap
|
page read and write
|
||
84F77BB000
|
stack
|
page read and write
|
||
84F807F000
|
stack
|
page read and write
|
||
16E74C3B000
|
heap
|
page read and write
|
||
1DDEF000000
|
heap
|
page read and write
|
||
16E74C32000
|
heap
|
page read and write
|
||
1C229302000
|
heap
|
page read and write
|
||
33E2FE000
|
stack
|
page read and write
|
||
1E167DB0000
|
trusted library allocation
|
page read and write
|
||
22B81312000
|
heap
|
page read and write
|
||
1C2291C0000
|
trusted library allocation
|
page read and write
|
||
16E74C46000
|
heap
|
page read and write
|
||
1DDEF058000
|
heap
|
page read and write
|
||
1DDEFA02000
|
heap
|
page read and write
|
||
1DDEF02F000
|
heap
|
page read and write
|
||
33E3FD000
|
stack
|
page read and write
|
||
1C229313000
|
heap
|
page read and write
|
||
13CAB4B000
|
stack
|
page read and write
|
||
84F7F7A000
|
stack
|
page read and write
|
||
1DDEEF20000
|
heap
|
page read and write
|
||
1E167D20000
|
heap
|
page read and write
|
||
21326210000
|
trusted library allocation
|
page read and write
|
||
84F7B7E000
|
stack
|
page read and write
|
||
4E3CAAC000
|
stack
|
page read and write
|
||
16E74BD0000
|
heap
|
page read and write
|
||
1DDEF802000
|
heap
|
page read and write
|
||
1DDEFA23000
|
heap
|
page read and write
|
||
1C229213000
|
heap
|
page read and write
|
||
25C6A202000
|
heap
|
page read and write
|
||
A09067E000
|
stack
|
page read and write
|
||
21324658000
|
heap
|
page read and write
|
||
1DDEF013000
|
heap
|
page read and write
|
||
16E74C6B000
|
heap
|
page read and write
|
||
1DDEF029000
|
heap
|
page read and write
|
||
16E74C62000
|
heap
|
page read and write
|
||
16E74C42000
|
heap
|
page read and write
|
||
1DDEF1BA000
|
heap
|
page read and write
|
||
16E74C64000
|
heap
|
page read and write
|
||
2132462A000
|
heap
|
page read and write
|
||
19E000
|
stack
|
page read and write
|
||
1DDEEFD0000
|
trusted library allocation
|
page read and write
|
||
8E29DFF000
|
stack
|
page read and write
|
||
1E167E13000
|
heap
|
page read and write
|
||
22B81300000
|
heap
|
page read and write
|
||
4E3D07F000
|
stack
|
page read and write
|
||
7CDE0FB000
|
stack
|
page read and write
|
||
22B80B13000
|
heap
|
page read and write
|
||
1E167E29000
|
heap
|
page read and write
|
||
50B000
|
unkown
|
page execute and read and write
|
||
1DDEF093000
|
heap
|
page read and write
|
||
33E27D000
|
stack
|
page read and write
|
||
1C229060000
|
heap
|
page read and write
|
||
1C229267000
|
heap
|
page read and write
|
||
13E80852000
|
heap
|
page read and write
|
||
21324600000
|
heap
|
page read and write
|
||
1DDEF087000
|
heap
|
page read and write
|
||
1DDEF954000
|
heap
|
page read and write
|
||
21324647000
|
heap
|
page read and write
|
||
13E8083C000
|
heap
|
page read and write
|
||
84F817E000
|
stack
|
page read and write
|
||
21324658000
|
heap
|
page read and write
|
||
4E3CBAE000
|
stack
|
page read and write
|
||
16E74C40000
|
heap
|
page read and write
|
||
1DDEF96D000
|
heap
|
page read and write
|
||
22B80A44000
|
heap
|
page read and write
|
||
A09027F000
|
stack
|
page read and write
|
||
21324520000
|
heap
|
page read and write
|
||
13E80800000
|
heap
|
page read and write
|
||
25C6A1C0000
|
trusted library allocation
|
page read and write
|
||
16E74C5A000
|
heap
|
page read and write
|
||
13E80813000
|
heap
|
page read and write
|
||
84F7DFB000
|
stack
|
page read and write
|
||
16E74C5E000
|
heap
|
page read and write
|
||
22B80B02000
|
heap
|
page read and write
|
||
1DDEF9D1000
|
heap
|
page read and write
|
||
21324689000
|
heap
|
page read and write
|
||
13CB17E000
|
stack
|
page read and write
|
||
1E167E57000
|
heap
|
page read and write
|
||
1DDEF9BC000
|
heap
|
page read and write
|
||
A09057D000
|
stack
|
page read and write
|
||
25C6A300000
|
heap
|
page read and write
|
||
21324700000
|
heap
|
page read and write
|
||
1C22923D000
|
heap
|
page read and write
|
||
22B80A00000
|
heap
|
page read and write
|
||
21326610000
|
remote allocation
|
page read and write
|
||
1E167DE0000
|
remote allocation
|
page read and write
|
||
33E07E000
|
stack
|
page read and write
|
||
22B8133A000
|
heap
|
page read and write
|
||
21324662000
|
heap
|
page read and write
|
||
25C6A258000
|
heap
|
page read and write
|
||
16E74B60000
|
heap
|
page read and write
|
||
16E74C79000
|
heap
|
page read and write
|
||
25C6A266000
|
heap
|
page read and write
|
||
517000
|
unkown
|
page execute and read and write
|
||
1C229050000
|
heap
|
page read and write
|
||
25C6A262000
|
heap
|
page read and write
|
||
22B80ACA000
|
heap
|
page read and write
|
||
1C229202000
|
heap
|
page read and write
|
||
21324648000
|
heap
|
page read and write
|
||
1DDEF03D000
|
heap
|
page read and write
|
||
401000
|
unkown
|
page execute and read and write
|
||
25C6A27E000
|
heap
|
page read and write
|
||
7CDE1FE000
|
stack
|
page read and write
|
||
A09047B000
|
stack
|
page read and write
|
||
16E74C5F000
|
heap
|
page read and write
|
||
16E74C3D000
|
heap
|
page read and write
|
||
4E3CB2E000
|
stack
|
page read and write
|
||
30000
|
heap
|
page read and write
|
||
21326002000
|
trusted library allocation
|
page read and write
|
||
33DB2B000
|
stack
|
page read and write
|
||
16E74C13000
|
heap
|
page read and write
|
||
22B80AC7000
|
heap
|
page read and write
|
||
1E167DE0000
|
remote allocation
|
page read and write
|
||
16E74C41000
|
heap
|
page read and write
|
||
22B80AE3000
|
heap
|
page read and write
|
||
A08FBCB000
|
stack
|
page read and write
|
||
9D000
|
stack
|
page read and write
|
||
16E74C48000
|
heap
|
page read and write
|
||
213244C0000
|
heap
|
page read and write
|
||
8E29EFE000
|
stack
|
page read and write
|
||
21325FC0000
|
trusted library allocation
|
page read and write
|
||
84F827B000
|
stack
|
page read and write
|
||
33E4FD000
|
stack
|
page read and write
|
||
16E74C45000
|
heap
|
page read and write
|
||
1DDEEF80000
|
heap
|
page read and write
|
||
2132467E000
|
heap
|
page read and write
|
||
21324702000
|
heap
|
page read and write
|
||
1DDEF08D000
|
heap
|
page read and write
|
||
400000
|
unkown
|
page readonly
|
||
1DDEF05A000
|
heap
|
page read and write
|
||
13E806B0000
|
heap
|
page read and write
|
||
517000
|
unkown
|
page execute and read and write
|
||
A09087E000
|
stack
|
page read and write
|
||
21324613000
|
heap
|
page read and write
|
||
25C6A23D000
|
heap
|
page read and write
|
||
8E29BFF000
|
stack
|
page read and write
|
||
E10FE7E000
|
stack
|
page read and write
|
||
33E57F000
|
stack
|
page read and write
|
||
8E29FFF000
|
stack
|
page read and write
|
||
1E168602000
|
trusted library allocation
|
page read and write
|
||
21326250000
|
trusted library allocation
|
page read and write
|
||
16E74C73000
|
heap
|
page read and write
|
||
1DDEFA28000
|
heap
|
page read and write
|
||
400000
|
unkown
|
page readonly
|
||
21326610000
|
remote allocation
|
page read and write
|
||
1C229200000
|
heap
|
page read and write
|
||
7CDDACB000
|
stack
|
page read and write
|
||
16E75330000
|
trusted library allocation
|
page read and write
|
||
1E167D10000
|
heap
|
page read and write
|
||
13E80902000
|
heap
|
page read and write
|
||
33DFFE000
|
stack
|
page read and write
|
||
25C6A302000
|
heap
|
page read and write
|
||
1DDEF113000
|
heap
|
page read and write
|
||
16E74C58000
|
heap
|
page read and write
|
||
1DDEF9C6000
|
heap
|
page read and write
|
||
84F7BFF000
|
stack
|
page read and write
|
||
1DDEF9AE000
|
heap
|
page read and write
|
||
1C229229000
|
heap
|
page read and write
|
||
1E167E02000
|
heap
|
page read and write
|
||
8E2A1FE000
|
stack
|
page read and write
|
||
E11047C000
|
stack
|
page read and write
|
||
E11037E000
|
stack
|
page read and write
|
||
13CB27F000
|
stack
|
page read and write
|
||
4E3CF7E000
|
stack
|
page read and write
|
||
1E167DE0000
|
remote allocation
|
page read and write
|
||
1E167F02000
|
heap
|
page read and write
|
||
16E74C57000
|
heap
|
page read and write
|
||
16E74C44000
|
heap
|
page read and write
|
||
16E74C4E000
|
heap
|
page read and write
|
||
7CDE2FE000
|
stack
|
page read and write
|
||
1C2290C0000
|
heap
|
page read and write
|
||
1E167E00000
|
heap
|
page read and write
|
||
A09077C000
|
stack
|
page read and write
|
||
16E74C76000
|
heap
|
page read and write
|
||
8E2967B000
|
stack
|
page read and write
|
||
22B80AB9000
|
heap
|
page read and write
|
||
1DDEF18F000
|
heap
|
page read and write
|
||
25C6A060000
|
heap
|
page read and write
|
||
E11007F000
|
stack
|
page read and write
|
||
21324718000
|
heap
|
page read and write
|
||
21324648000
|
heap
|
page read and write
|
||
16E74C61000
|
heap
|
page read and write
|
||
1E167D80000
|
heap
|
page read and write
|
||
E11017D000
|
stack
|
page read and write
|
||
25C6A200000
|
heap
|
page read and write
|
||
16E74C82000
|
heap
|
page read and write
|
||
1DDEEFB0000
|
trusted library allocation
|
page read and write
|
||
16E74B70000
|
heap
|
page read and write
|
||
1DDEF07F000
|
heap
|
page read and write
|
||
7CDDFFB000
|
stack
|
page read and write
|
||
21325FE0000
|
trusted library allocation
|
page read and write
|
||
1C22924E000
|
heap
|
page read and write
|
||
1DDEF922000
|
heap
|
page read and write
|
||
22B80A29000
|
heap
|
page read and write
|
||
21324602000
|
heap
|
page read and write
|
||
8E2987B000
|
stack
|
page read and write
|
||
E10FCFC000
|
stack
|
page read and write
|
||
A09017F000
|
stack
|
page read and write
|
||
1DDEFA13000
|
heap
|
page read and write
|
||
16E74C7C000
|
heap
|
page read and write
|
||
1DDEFA31000
|
heap
|
page read and write
|
||
8E2A0FE000
|
stack
|
page read and write
|
||
13E81002000
|
trusted library allocation
|
page read and write
|
||
13E80844000
|
heap
|
page read and write
|
||
13CB079000
|
stack
|
page read and write
|
||
8E299FE000
|
stack
|
page read and write
|
||
6E0000
|
heap
|
page read and write
|
||
1C229275000
|
heap
|
page read and write
|
||
16E75402000
|
trusted library allocation
|
page read and write
|
||
E10FF7F000
|
stack
|
page read and write
|
||
21324640000
|
heap
|
page read and write
|
||
4E3D27E000
|
stack
|
page read and write
|
||
21324713000
|
heap
|
page read and write
|
||
16E74C5C000
|
heap
|
page read and write
|
||
850000
|
heap
|
page read and write
|
||
16E74C29000
|
heap
|
page read and write
|
||
4E3D17E000
|
stack
|
page read and write
|
||
16E74C74000
|
heap
|
page read and write
|
||
22B80A13000
|
heap
|
page read and write
|
||
13E80802000
|
heap
|
page read and write
|
||
13E806A0000
|
heap
|
page read and write
|
||
16E74C59000
|
heap
|
page read and write
|
||
A0903FD000
|
stack
|
page read and write
|
||
401000
|
unkown
|
page execute and read and write
|
||
1DDEF043000
|
heap
|
page read and write
|
||
25C6A050000
|
heap
|
page read and write
|
||
22B80970000
|
heap
|
page read and write
|
||
8E29CFD000
|
stack
|
page read and write
|
||
1DDEFA00000
|
heap
|
page read and write
|
||
22B81130000
|
trusted library allocation
|
page read and write
|
||
25C6A313000
|
heap
|
page read and write
|
||
1DDEF076000
|
heap
|
page read and write
|
||
A0902FC000
|
stack
|
page read and write
|
||
13E80E60000
|
trusted library allocation
|
page read and write
|
||
1DDEF900000
|
heap
|
page read and write
|
||
16E74D02000
|
heap
|
page read and write
|
||
1DDEF990000
|
heap
|
page read and write
|
||
84F7CFF000
|
stack
|
page read and write
|
||
E10F8FC000
|
stack
|
page read and write
|
||
8E29AFC000
|
stack
|
page read and write
|
||
13E8082E000
|
heap
|
page read and write
|
||
16E74C60000
|
heap
|
page read and write
|
||
E11027C000
|
stack
|
page read and write
|
||
33E17E000
|
stack
|
page read and write
|
||
1DDEF093000
|
heap
|
page read and write
|
||
16E74C00000
|
heap
|
page read and write
|
||
22B80A67000
|
heap
|
page read and write
|
||
22B80A6E000
|
heap
|
page read and write
|
||
22B809D0000
|
heap
|
page read and write
|
||
1DDEF902000
|
heap
|
page read and write
|
||
25C6A229000
|
heap
|
page read and write
|
||
1DDEF922000
|
heap
|
page read and write
|
||
13E80848000
|
heap
|
page read and write
|
There are 263 hidden memdumps, click here to show them.