IOC Report
SecuriteInfo.com.Win32.Trojan.PSE.1G80G6X.7216.15072.exe

loading gif

Files

File Path
Type
Category
Malicious
SecuriteInfo.com.Win32.Trojan.PSE.1G80G6X.7216.15072.exe
PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows
initial sample
malicious
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_SecuriteInfo.com_204454340d62a71d08cbd555255239a29f2fb7_7335685e_02342cf2\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER1CE4.tmp.dmp
Mini DuMP crash report, 14 streams, Wed Feb 8 03:55:36 2023, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER1E1E.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER1EAB.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\Windows\appcompat\Programs\Amcache.hve
MS Windows registry file, NT/2000 or above
dropped
C:\Windows\appcompat\Programs\Amcache.hve.LOG1
MS Windows registry file, NT/2000 or above
dropped
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_SecuriteInfo.com_8b8aab2d3044b37bde8ae2665b0819910cdd8be_7335685e_095836a8\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER172A.tmp.dmp
Mini DuMP crash report, 14 streams, Wed Feb 8 03:47:54 2023, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER17F6.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER1864.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\SecuriteInfo.com.Win32.Trojan.PSE.1G80G6X.7216.15072.exe
C:\Users\user\Desktop\SecuriteInfo.com.Win32.Trojan.PSE.1G80G6X.7216.15072.exe
malicious
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 2104 -s 212
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 2368 -s 212

URLs

Name
IP
Malicious
https://images-ext-1.discordapp.net:
unknown
https://5bcfae2f38d0e143c888d07ec9733d8c.s
unknown
https://www.dogfight360.com/blog
unknown
https://countess.twitch.tv:
unknown
https://eaassets-a.akam
unknown
https://c58c9f027b8d0739f6b6d94b831e1010.steam302.xyz
unknown
https://cvp.twitch.tv:
unknown
https://status.discordapp.com:
unknown
https://dev.twitch.tv:
unknown
https://passport.twitch.tv:
unknown
https://bd4a0c7567edeaa0401463857c28ead7.steam302.xyz
unknown
https://gds-vhs-drops-campaign-images.twitch.tv:
unknown
https://id-cdn.twitch.tv:
unknown
https://usher.ttvnw.net:
unknown
https://104.16.52.111
unknown
https://aa88a8ab3fabc0c5d90ca85c9442a948.steam302.xyz
unknown
https://discordapp.com:
unknown
https://steamuserimages-a.akamaihd.net
unknown
https://95df2ea9aba3e1cad7f8f4526047b63b.steam302.xyz
unknown
https://5a895ed07aed1b254ee21cd78958ae0b.steam302.xyz
unknown
https://c2491d9d37e95faee1c67e314ae9a4bb.steam302.xyz
unknown
https://vod-metro.twitch.tv:
unknown
https://api.twitch.tv:
unknown
http://www.clamav.net
unknown
https://origin-a.akamaihd.net:
unknown
https://steamcommunity-a.akamaihd.ne
unknown
https://link.twitch.
unknown
https://id.twitch.tv:
unknown
https://link.twitch.tv:
unknown
https://eaassets-a.akamaihd.net
unknown
https://104.16.54.111
unknown
https://clips.twitch.tv:
unknown
https://aws.amazon.com
unknown
https://104.17.2.37
unknown
https://2f16aa2ed3889461cd1076540300a6b3.steam302.xyz
unknown
https://pubsub-edge.twitch.tv:
unknown
https://6d7b94f6a3142075c6e14f949daff580.steam302.xyz
unknown
https://gql.twitc
unknown
https://06b67885560f95cbdf0ba34722e8d33c.steam302.xyz
unknown
https://us-west-2.uploads-regional.twitch.tv:
unknown
https://steamcn.com/t419530-1-1
unknown
https://1da58962a7dd53edd9775f6f74ff14e5.steam302.xyz
unknown
https://dl.discordapp.net:
unknown
http://usher.steam302.xyz
unknown
https://steamcdn-a.akamaihd.net:
unknown
https://music.twitch.tv:
unknown
https://steamstore-a.akamaihd.net
unknown
https://player.twitch.tv:
unknown
https://www.twitch.tv:
unknown
https://162.159.129.233
unknown
https://162.159.129.232
unknown
https://clips-media-assets2.twitch.tv:
unknown
https://m.twitch.tv:
unknown
https://gateway.discord.gg:
unknown
https://2973c6ca0e111662ed293b57dbae9fbf.steam302.xyz
unknown
https://6d859be7aa0440f65c8a940ef5218337.steam302.xyz
unknown
https://gateway.discord.gg
unknown
https://images-ext-2.discordapp.net:
unknown
https://vod-storyboards.twitch.tv:
unknown
http://vluki-a.akamaihd.net
unknown
https://steamcommunity-a.akam
unknown
https://irc-ws.chat.twitch.tv:
unknown
https://2f9e9e61f7236db30c1ce0bb9d53581b.steam302.xyz
unknown
https://app.twitch.tv:
unknown
https://steamcommunity-a.akamai
unknown
https://104.16.51.111
unknown
https://7106a273bf3bbce901b765718ecbe69b.steam302.xyz
unknown
https://platform.twitter.com:
unknown
https://890c88446f94f25bd32a3f1e0df6c120.steam302.xyz
unknown
https://blog.twitch.tv:
unknown
https://b3a0f6b6d20e3408d1725780186c54d3.steam302.xyz
unknown
https://gql.twitch.tv:
unknown
https://extension-files.twitch.tv:
unknown
https://eaassets-a.akamaihd
unknown
https://fb96613da2b5475079b93f4be2e94cd3.steam302.xyz
unknown
https://43658a3dbcfbc284a9030abbc3691c30.steam302.xyz
unknown
https://client-event-reporter.twitch.tv:
unknown
https://twitch.tv:
unknown
https://104.16.53.111
unknown
https://inspector.twitch.tv:
unknown
http://cctv4-lh.akamaihd.net
unknown
https://e320c9db4f90dd219ab379f6a5e50dbd.steam302.xyz
unknown
https://dbc180c27b3635f9e5b006f3a037b87e.steam302.xyz
unknown
https://static2.cdn.ubi.com
unknown
https://steampipe.ak
unknown
http://toots-a.akamaihd.net
unknown
https://spade.twitch.tv:
unknown
https://media.discordapp.net:
unknown
http://hgtv-i.akamaihd.net
unknown
https://support.discordapp.com:
unknown
https://trowel.twitch.tv:
unknown
https://985a89155dd090eacda1b82388e334ed.steam302.xyz
unknown
https://store.steampowered.com:
unknown
https://104.16.55.111
unknown
https://help.twitch.tv:
unknown
http://upx.sf.net
unknown
https://5dd1e18eb1a29671b73c32e518b37111.steam302.xyz
unknown
https://91b1eb7256ac2992f03fe0c7e7ef998d.steam302.xyz
unknown
https://e8304b1598fbfa673d2055f0a3342d7a.steam302.xyz
unknown
https://1d23669ea58a590fd66d9204d4301563.steam302.xyz
unknown
There are 90 hidden URLs, click here to show them.

Registry

Path
Value
Malicious
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\AppCompatFlags
AmiHivePermissionsCorrect
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\AppCompatFlags
AmiHiveOwnerCorrect
\REGISTRY\A\{ed05a684-a93a-a759-9ee9-599b2bf9b9c7}\Root\InventoryApplicationFile\securiteinfo.com|34595f7e
ProgramId
\REGISTRY\A\{ed05a684-a93a-a759-9ee9-599b2bf9b9c7}\Root\InventoryApplicationFile\securiteinfo.com|34595f7e
FileId
\REGISTRY\A\{ed05a684-a93a-a759-9ee9-599b2bf9b9c7}\Root\InventoryApplicationFile\securiteinfo.com|34595f7e
LowerCaseLongPath
\REGISTRY\A\{ed05a684-a93a-a759-9ee9-599b2bf9b9c7}\Root\InventoryApplicationFile\securiteinfo.com|34595f7e
LongPathHash
\REGISTRY\A\{ed05a684-a93a-a759-9ee9-599b2bf9b9c7}\Root\InventoryApplicationFile\securiteinfo.com|34595f7e
Name
\REGISTRY\A\{ed05a684-a93a-a759-9ee9-599b2bf9b9c7}\Root\InventoryApplicationFile\securiteinfo.com|34595f7e
Publisher
\REGISTRY\A\{ed05a684-a93a-a759-9ee9-599b2bf9b9c7}\Root\InventoryApplicationFile\securiteinfo.com|34595f7e
Version
\REGISTRY\A\{ed05a684-a93a-a759-9ee9-599b2bf9b9c7}\Root\InventoryApplicationFile\securiteinfo.com|34595f7e
BinFileVersion
\REGISTRY\A\{ed05a684-a93a-a759-9ee9-599b2bf9b9c7}\Root\InventoryApplicationFile\securiteinfo.com|34595f7e
BinaryType
\REGISTRY\A\{ed05a684-a93a-a759-9ee9-599b2bf9b9c7}\Root\InventoryApplicationFile\securiteinfo.com|34595f7e
ProductName
\REGISTRY\A\{ed05a684-a93a-a759-9ee9-599b2bf9b9c7}\Root\InventoryApplicationFile\securiteinfo.com|34595f7e
ProductVersion
\REGISTRY\A\{ed05a684-a93a-a759-9ee9-599b2bf9b9c7}\Root\InventoryApplicationFile\securiteinfo.com|34595f7e
LinkDate
\REGISTRY\A\{ed05a684-a93a-a759-9ee9-599b2bf9b9c7}\Root\InventoryApplicationFile\securiteinfo.com|34595f7e
BinProductVersion
\REGISTRY\A\{ed05a684-a93a-a759-9ee9-599b2bf9b9c7}\Root\InventoryApplicationFile\securiteinfo.com|34595f7e
Size
\REGISTRY\A\{ed05a684-a93a-a759-9ee9-599b2bf9b9c7}\Root\InventoryApplicationFile\securiteinfo.com|34595f7e
Language
\REGISTRY\A\{ed05a684-a93a-a759-9ee9-599b2bf9b9c7}\Root\InventoryApplicationFile\securiteinfo.com|34595f7e
IsPeFile
\REGISTRY\A\{ed05a684-a93a-a759-9ee9-599b2bf9b9c7}\Root\InventoryApplicationFile\securiteinfo.com|34595f7e
IsOsComponent
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\Windows Error Reporting\Debug
ExceptionRecord
HKEY_CURRENT_USER\Software\Microsoft\IdentityCRL\Immersive\production\Property
001880093E8CB651
HKEY_CURRENT_USER\Software\Microsoft\IdentityCRL\Immersive\production\Token\{67082621-8D18-4333-9C64-10DE93676363}
DeviceTicket
HKEY_CURRENT_USER\Software\Microsoft\IdentityCRL\Immersive\production\Token\{67082621-8D18-4333-9C64-10DE93676363}
DeviceId
HKEY_CURRENT_USER\Software\Microsoft\IdentityCRL\Immersive\production\Token\{67082621-8D18-4333-9C64-10DE93676363}
ApplicationFlags
\REGISTRY\A\{d0002fcf-02a9-b331-d719-93ce42d98bee}\Root\InventoryApplicationFile\securiteinfo.com|74c31352
ProgramId
\REGISTRY\A\{d0002fcf-02a9-b331-d719-93ce42d98bee}\Root\InventoryApplicationFile\securiteinfo.com|74c31352
FileId
\REGISTRY\A\{d0002fcf-02a9-b331-d719-93ce42d98bee}\Root\InventoryApplicationFile\securiteinfo.com|74c31352
LowerCaseLongPath
\REGISTRY\A\{d0002fcf-02a9-b331-d719-93ce42d98bee}\Root\InventoryApplicationFile\securiteinfo.com|74c31352
LongPathHash
\REGISTRY\A\{d0002fcf-02a9-b331-d719-93ce42d98bee}\Root\InventoryApplicationFile\securiteinfo.com|74c31352
Name
\REGISTRY\A\{d0002fcf-02a9-b331-d719-93ce42d98bee}\Root\InventoryApplicationFile\securiteinfo.com|74c31352
Publisher
\REGISTRY\A\{d0002fcf-02a9-b331-d719-93ce42d98bee}\Root\InventoryApplicationFile\securiteinfo.com|74c31352
Version
\REGISTRY\A\{d0002fcf-02a9-b331-d719-93ce42d98bee}\Root\InventoryApplicationFile\securiteinfo.com|74c31352
BinFileVersion
\REGISTRY\A\{d0002fcf-02a9-b331-d719-93ce42d98bee}\Root\InventoryApplicationFile\securiteinfo.com|74c31352
BinaryType
\REGISTRY\A\{d0002fcf-02a9-b331-d719-93ce42d98bee}\Root\InventoryApplicationFile\securiteinfo.com|74c31352
ProductName
\REGISTRY\A\{d0002fcf-02a9-b331-d719-93ce42d98bee}\Root\InventoryApplicationFile\securiteinfo.com|74c31352
ProductVersion
\REGISTRY\A\{d0002fcf-02a9-b331-d719-93ce42d98bee}\Root\InventoryApplicationFile\securiteinfo.com|74c31352
LinkDate
\REGISTRY\A\{d0002fcf-02a9-b331-d719-93ce42d98bee}\Root\InventoryApplicationFile\securiteinfo.com|74c31352
BinProductVersion
\REGISTRY\A\{d0002fcf-02a9-b331-d719-93ce42d98bee}\Root\InventoryApplicationFile\securiteinfo.com|74c31352
Size
\REGISTRY\A\{d0002fcf-02a9-b331-d719-93ce42d98bee}\Root\InventoryApplicationFile\securiteinfo.com|74c31352
Language
\REGISTRY\A\{d0002fcf-02a9-b331-d719-93ce42d98bee}\Root\InventoryApplicationFile\securiteinfo.com|74c31352
IsPeFile
\REGISTRY\A\{d0002fcf-02a9-b331-d719-93ce42d98bee}\Root\InventoryApplicationFile\securiteinfo.com|74c31352
IsOsComponent
HKEY_CURRENT_USER\Software\Microsoft\IdentityCRL\Immersive\production\Property
001880093E844BFD
There are 32 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
1C3B6213000
unkown
page read and write
8EE58FF000
stack
page read and write
1F1838BB000
heap
page read and write
24012E50000
heap
page read and write
1DC35202000
trusted library allocation
page read and write
B27C4AB000
stack
page read and write
8EE5AFC000
stack
page read and write
1C3B6238000
heap
page read and write
1DC34A52000
heap
page read and write
24013802000
trusted library allocation
page read and write
21319D13000
heap
page read and write
22AF37B000
stack
page read and write
241E7092000
heap
page read and write
24012E46000
heap
page read and write
241E702F000
heap
page read and write
B27CC7E000
stack
page read and write
1C3B6500000
heap
page read and write
8EE5BFE000
stack
page read and write
1C3B6502000
heap
page read and write
22AF67C000
stack
page read and write
69561CD000
stack
page read and write
241E7C28000
heap
page read and write
400000
unkown
page readonly
BF9F7FF000
stack
page read and write
1F183780000
heap
page read and write
BAF65FF000
stack
page read and write
241E7090000
heap
page read and write
1F1838E9000
heap
page read and write
24012E4E000
heap
page read and write
241E7083000
heap
page read and write
401000
unkown
page execute and read and write
1F183845000
heap
page read and write
400000
unkown
page readonly
1C3B6302000
trusted library allocation
page read and write
1C3B6228000
heap
page read and write
1DC34810000
heap
page read and write
50B000
unkown
page execute and read and write
1C3B5F90000
heap
page read and write
BF9F87F000
stack
page read and write
1F183813000
heap
page read and write
1F1838E1000
heap
page read and write
21319C02000
heap
page read and write
B27CB7E000
stack
page read and write
1DC34A45000
heap
page read and write
1AE99A51000
heap
page read and write
6956979000
stack
page read and write
241E706A000
heap
page read and write
1AE99B02000
heap
page read and write
241E7C13000
heap
page read and write
19E000
stack
page read and write
21319C70000
heap
page read and write
BF9FAFC000
stack
page read and write
1C3B6300000
trusted library allocation
page read and write
24012E47000
heap
page read and write
BAF61FB000
stack
page read and write
1F18387F000
heap
page read and write
241E6FC0000
heap
page read and write
24012E65000
heap
page read and write
BAF5BDB000
stack
page read and write
24012E7B000
heap
page read and write
2F7907E000
stack
page read and write
24012E67000
heap
page read and write
50B000
unkown
page execute and read and write
24012E40000
heap
page read and write
1AE99A29000
heap
page read and write
24012E75000
heap
page read and write
24012E84000
heap
page read and write
1F1837F0000
heap
page read and write
241E7013000
heap
page read and write
241E7BBD000
heap
page read and write
1AE9A2A0000
remote allocation
page read and write
24012E00000
heap
page read and write
24012E60000
heap
page read and write
241E706C000
heap
page read and write
24012E64000
heap
page read and write
241E71A1000
heap
page read and write
5D0000
heap
page read and write
1DC34B02000
heap
page read and write
517000
unkown
page execute and read and write
21319AE0000
heap
page read and write
24012E61000
heap
page read and write
24012DD0000
heap
page read and write
21319C13000
heap
page read and write
1AE99A02000
heap
page read and write
8EE59FA000
stack
page read and write
241E7B6F000
heap
page read and write
1AE9A270000
trusted library allocation
page read and write
1F184090000
trusted library allocation
page read and write
1F1838C4000
heap
page read and write
1DC34A2E000
heap
page read and write
1DC34A3D000
heap
page read and write
1AE99A13000
heap
page read and write
2F78C7C000
stack
page read and write
241E7BB1000
heap
page read and write
1DC34910000
trusted library allocation
page read and write
241E705A000
heap
page read and write
1AE99A00000
heap
page read and write
1C3B6513000
heap
page read and write
BF9FD7F000
stack
page read and write
1F1838CC000
heap
page read and write
24012E39000
heap
page read and write
241E71E8000
heap
page read and write
1C3B5FA0000
trusted library allocation
page read and write
24012E4B000
heap
page read and write
241E7B02000
heap
page read and write
241E7BD2000
heap
page read and write
8EE5CF9000
stack
page read and write
241E7029000
heap
page read and write
241E7B22000
heap
page read and write
24012E42000
heap
page read and write
690000
heap
page read and write
24012E74000
heap
page read and write
1C3B6315000
trusted library allocation
page read and write
1DC34A3B000
heap
page read and write
1DC34A00000
heap
page read and write
1F183900000
heap
page read and write
401000
unkown
page execute and read and write
24012E6A000
heap
page read and write
21319C5B000
heap
page read and write
22AF57F000
stack
page read and write
1DC347C0000
heap
page read and write
1AE9A2A0000
remote allocation
page read and write
1DC34A24000
heap
page read and write
24012E63000
heap
page read and write
241E7B22000
heap
page read and write
1C3B6202000
unkown
page read and write
1F184300000
heap
page read and write
21319AF0000
heap
page read and write
1DC347B0000
heap
page read and write
BAF64FF000
stack
page read and write
241E7A02000
heap
page read and write
24012E68000
heap
page read and write
22AF07F000
stack
page read and write
24012E48000
heap
page read and write
BAF5FFB000
stack
page read and write
1DC34A68000
heap
page read and write
24012E30000
heap
page read and write
2F78DFE000
stack
page read and write
24012E6B000
heap
page read and write
1DC34A13000
heap
page read and write
BAF63FD000
stack
page read and write
1C3B6000000
heap
page read and write
241E7C23000
heap
page read and write
21319C58000
heap
page read and write
24012E6D000
heap
page read and write
22AF47F000
stack
page read and write
1F183829000
heap
page read and write
2F792FD000
stack
page read and write
24012E49000
heap
page read and write
2131A602000
trusted library allocation
page read and write
22AF1FC000
stack
page read and write
241E7B92000
heap
page read and write
B27C97E000
stack
page read and write
2F78EFF000
stack
page read and write
241E7C02000
heap
page read and write
1C3B621F000
unkown
page read and write
1AE99970000
heap
page read and write
24012E3D000
heap
page read and write
24012E13000
heap
page read and write
21319C77000
heap
page read and write
B27CA7E000
stack
page read and write
241E7B43000
heap
page read and write
1F183790000
heap
page read and write
22AF2FD000
stack
page read and write
24013670000
trusted library allocation
page read and write
24012D70000
heap
page read and write
1AE99A4C000
heap
page read and write
241E7043000
heap
page read and write
1F18433A000
heap
page read and write
BF9FF7A000
stack
page read and write
1C3B6413000
heap
page read and write
30000
heap
page read and write
24012E7D000
heap
page read and write
241E6FF0000
trusted library allocation
page read and write
2F78E7C000
stack
page read and write
1AE999D0000
heap
page read and write
BAF60FF000
stack
page read and write
241E6F60000
heap
page read and write
241E7C31000
heap
page read and write
8EE54BB000
stack
page read and write
22AEAFB000
stack
page read and write
241E6F50000
heap
page read and write
1AE9A402000
trusted library allocation
page read and write
21319B50000
heap
page read and write
24012E62000
heap
page read and write
24012E29000
heap
page read and write
1DC34A36000
heap
page read and write
1C3B6323000
heap
page read and write
21319B80000
trusted library allocation
page read and write
2F78F7E000
stack
page read and write
21319C00000
heap
page read and write
24012F02000
heap
page read and write
BAF66FF000
stack
page read and write
1F183913000
heap
page read and write
BF9FE7E000
stack
page read and write
21319C41000
heap
page read and write
1C3B6200000
unkown
page read and write
24012E45000
heap
page read and write
1F184312000
heap
page read and write
2F791FF000
stack
page read and write
BAF67FF000
stack
page read and write
24012E55000
heap
page read and write
241E7C00000
heap
page read and write
24012E6F000
heap
page read and write
B27C5AE000
stack
page read and write
24012E4F000
heap
page read and write
1F18388A000
heap
page read and write
BAF68FF000
stack
page read and write
1AE9A2A0000
remote allocation
page read and write
1DC34A02000
heap
page read and write
24012E41000
heap
page read and write
241E7113000
heap
page read and write
241E7000000
heap
page read and write
22AF17F000
stack
page read and write
9D000
stack
page read and write
22AF77E000
stack
page read and write
241E708A000
heap
page read and write
24012E7E000
heap
page read and write
21319C2A000
heap
page read and write
241E7880000
trusted library allocation
page read and write
BF9FB79000
stack
page read and write
1C3B6402000
heap
page read and write
BF9F67C000
stack
page read and write
241E71BA000
heap
page read and write
24012D60000
heap
page read and write
1AE99960000
heap
page read and write
BF9F9FF000
stack
page read and write
241E7B00000
heap
page read and write
1F183800000
heap
page read and write
21319D02000
heap
page read and write
241E7B54000
heap
page read and write
1F184202000
heap
page read and write
24012E56000
heap
page read and write
BF9FC7A000
stack
page read and write
1F183874000
heap
page read and write
241E705D000
heap
page read and write
241E703D000
heap
page read and write
1C3B620D000
unkown
page read and write
2F7917D000
stack
page read and write
1AE99A3C000
heap
page read and write
24012E44000
heap
page read and write
241E7BC7000
heap
page read and write
695657E000
stack
page read and write
517000
unkown
page execute and read and write
B27C52E000
stack
page read and write
22AEEFB000
stack
page read and write
1F183902000
heap
page read and write
There are 237 hidden memdumps, click here to show them.