Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
A290.dll
|
PE32 executable (DLL) (console) Intel 80386 (stripped to external PDB), for MS Windows
|
initial sample
|
||
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_rundll32.exe_4a2b263a88ec6871bb19ce2ee3f04564bd3fea_82810a17_16e0a0aa\Report.wer
|
Unicode text, UTF-16, little-endian text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_rundll32.exe_4a2b263a88ec6871bb19ce2ee3f04564bd3fea_82810a17_16e8a0e8\Report.wer
|
Unicode text, UTF-16, little-endian text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_rundll32.exe_4a2b263a88ec6871bb19ce2ee3f04564bd3fea_82810a17_1a6cb20f\Report.wer
|
Unicode text, UTF-16, little-endian text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_rundll32.exe_86b3cac39a2cad5204e578b2befa7f9972cac_82810a17_1ae0a1c3\Report.wer
|
Unicode text, UTF-16, little-endian text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_rundll32.exe_86b3cac39a2cad5204e578b2befa7f9972cac_82810a17_1afcb29b\Report.wer
|
Unicode text, UTF-16, little-endian text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WER8532.tmp.dmp
|
Mini DuMP crash report, 14 streams, Tue May 30 23:57:58 2023, 0x1205a4 type
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WER8581.tmp.dmp
|
Mini DuMP crash report, 14 streams, Tue May 30 23:57:58 2023, 0x1205a4 type
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WER868B.tmp.WERInternalMetadata.xml
|
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WER86AA.tmp.WERInternalMetadata.xml
|
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WER86EA.tmp.xml
|
XML 1.0 document, ASCII text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WER86FA.tmp.xml
|
XML 1.0 document, ASCII text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WER9A80.tmp.dmp
|
Mini DuMP crash report, 14 streams, Tue May 30 23:58:04 2023, 0x1205a4 type
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WER9BA9.tmp.WERInternalMetadata.xml
|
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WER9C47.tmp.xml
|
XML 1.0 document, ASCII text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WERA9D1.tmp.dmp
|
Mini DuMP crash report, 14 streams, Tue May 30 23:58:08 2023, 0x1205a4 type
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WERAACB.tmp.dmp
|
Mini DuMP crash report, 14 streams, Tue May 30 23:58:08 2023, 0x1205a4 type
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WERAC34.tmp.WERInternalMetadata.xml
|
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WERACC1.tmp.xml
|
XML 1.0 document, ASCII text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WERACEF.tmp.WERInternalMetadata.xml
|
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WERADAC.tmp.xml
|
XML 1.0 document, ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\2WF3MMUU\YWUEZVG8.htm
|
HTML document, ASCII text, with very long lines (64945)
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\2WF3MMUU\t5[1]
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Windows\appcompat\Programs\Amcache.hve
|
MS Windows registry file, NT/2000 or above
|
dropped
|
||
C:\Windows\appcompat\Programs\Amcache.hve.LOG1
|
MS Windows registry file, NT/2000 or above
|
dropped
|
There are 15 hidden files, click here to show them.
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Windows\System32\loaddll32.exe
|
loaddll32.exe "C:\Users\user\Desktop\A290.dll"
|
||
C:\Windows\SysWOW64\cmd.exe
|
cmd.exe /C rundll32.exe "C:\Users\user\Desktop\A290.dll",#1
|
||
C:\Windows\SysWOW64\rundll32.exe
|
rundll32.exe C:\Users\user\Desktop\A290.dll,mv_add_i
|
||
C:\Windows\SysWOW64\rundll32.exe
|
rundll32.exe "C:\Users\user\Desktop\A290.dll",#1
|
||
C:\Windows\SysWOW64\WerFault.exe
|
C:\Windows\SysWOW64\WerFault.exe -u -p 2460 -s 652
|
||
C:\Windows\SysWOW64\WerFault.exe
|
C:\Windows\SysWOW64\WerFault.exe -u -p 5508 -s 660
|
||
C:\Windows\SysWOW64\rundll32.exe
|
rundll32.exe C:\Users\user\Desktop\A290.dll,mv_add_q
|
||
C:\Windows\SysWOW64\rundll32.exe
|
rundll32.exe C:\Users\user\Desktop\A290.dll,mv_add_stable
|
||
C:\Windows\SysWOW64\WerFault.exe
|
C:\Windows\SysWOW64\WerFault.exe -u -p 5616 -s 652
|
||
C:\Windows\SysWOW64\rundll32.exe
|
rundll32.exe "C:\Users\user\Desktop\A290.dll",mv_add_i
|
||
C:\Windows\SysWOW64\rundll32.exe
|
rundll32.exe "C:\Users\user\Desktop\A290.dll",mv_add_q
|
||
C:\Windows\SysWOW64\rundll32.exe
|
rundll32.exe "C:\Users\user\Desktop\A290.dll",mv_add_stable
|
||
C:\Windows\SysWOW64\rundll32.exe
|
rundll32.exe "C:\Users\user\Desktop\A290.dll",next
|
||
C:\Windows\SysWOW64\rundll32.exe
|
rundll32.exe "C:\Users\user\Desktop\A290.dll",mvutil_license
|
||
C:\Windows\SysWOW64\WerFault.exe
|
C:\Windows\SysWOW64\WerFault.exe -u -p 6944 -s 652
|
||
C:\Windows\SysWOW64\rundll32.exe
|
rundll32.exe "C:\Users\user\Desktop\A290.dll",mvutil_configuration
|
||
C:\Windows\SysWOW64\WerFault.exe
|
C:\Windows\SysWOW64\WerFault.exe -u -p 5860 -s 652
|
||
C:\Windows\SysWOW64\wermgr.exe
|
C:\Windows\SysWOW64\wermgr.exe
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
There are 9 hidden processes, click here to show them.
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
https://188.28.19.84/t5
|
188.28.19.84
|
||
https://s.yimg.com/ss/rapid-3.53.38.js
|
unknown
|
||
https://s.yimg.com/aaq/vzm/cs_1.4.0.js
|
unknown
|
||
https://s.yimg.com/uu/api/res/1.2/h64YbbKcO2GsKYAy1QMRMw--~B/Zmk9c3RyaW07aD0zODY7cT04MDt3PTQ0MDthcHB
|
unknown
|
||
https://s.yimg.com/cx/pv/perf-vitals_3.1.0.js
|
unknown
|
||
https://s.yimg.com/uu/api/res/1.2/bgsoedXfbB0Gb9NBLPpSgA--~B/Zmk9c3RyaW07aD0zODY7cT04MDt3PTQ0MDthcHB
|
unknown
|
||
https://s.yimg.com/aaq/spotim/
|
unknown
|
||
https://s.yimg.com/uu/api/res/1.2/IOHHaqoGtz8E_nhSi9n_SA--~B/Zmk9c3RyaW07aD0xNDA7cT05MDt3PTE0MDthcHB
|
unknown
|
||
https://s.yimg.com/uu/api/res/1.2/JB3oERIZNZLPfu6X4e9z6A--~B/Zmk9c3RyaW07aD0yNDY7cT04MDt3PTQ0MDthcHB
|
unknown
|
||
https://fp-graviton-home-gateway.media.yahoo.com/
|
unknown
|
||
http://upx.sf.net
|
unknown
|
||
https://openweb.jac.yahoosandbox.com
|
unknown
|
||
https://s.yimg.com/uc/sf/0.1.322/js/safe.min.js
|
unknown
|
||
https://s.yimg.com/uu/api/res/1.2/xRSr.LEimIgdYlvzWwz1eg--~B/Zmk9c3RyaW07aD0xNDA7cT05MDt3PTE0MDthcHB
|
unknown
|
||
https://yahoo.com/
|
98.137.11.163
|
||
https://www.yahoo.com/
|
87.248.100.215
|
||
https://www.ad.com/?utm_source=yahoo-home&utm_medium=referral&utm_campaign=ad-feedback"
|
unknown
|
||
https://5.ras.yahoo.com/adcount%7C2.0%7C5113.1%7C4830441%7C0%7C225%7CAdId=11101911;BnId=2;ct=7654416
|
unknown
|
||
https://www.yahoo.com/px.gif
|
unknown
|
||
https://search.yahoo.com/search?p=
|
unknown
|
||
https://s.yimg.com/uu/api/res/1.2/_CIJXKXQDZkVo9bAyJDDdA--~B/Zmk9c3RyaW07aD0yNDY7cT04MDt3PTQ0MDthcHB
|
unknown
|
||
http://schema.org
|
unknown
|
||
http://www.opensource.org/licenses/mit-license.php
|
unknown
|
||
https://legal.yahoo.com/us/en/yahoo/privacy/adinfo/index.html"
|
unknown
|
||
https://streams.videolan.org/upload/
|
unknown
|
||
https://s.yimg.com/aaq/wf/wf-core-1.63.0.js
|
unknown
|
||
https://sb.scorecardresearch.com/p?c1=2&c2=7241469&c5=2023538075&c7=https%3A%2F%2Fwww.yahoo.com%2F&c
|
unknown
|
||
https://s.yimg.com/uu/api/res/1.2/DgW4vH5M_FUgIVI7P1drOg--~B/Zmk9c3RyaW07aD0yNDY7cT04MDt3PTQ0MDthcHB
|
unknown
|
||
https://s.yimg.com/uu/api/res/1.2/_thhUXx96QwnlqajJOOzag--~B/Zmk9c3RyaW07aD0yNDY7cT04MDt3PTQ0MDthcHB
|
unknown
|
||
https://5.ras.yahoo.com/adcount%7C2.0%7C5113.1%7C4830424%7C0%7C0%7CAdId=-41;BnId=0;ct=76544163;st=99
|
unknown
|
||
https://s.yimg.com/uu/api/res/1.2/M7GzoPQf97leZFwCZRF3Kg--~B/Zmk9c3RyaW07aD0xNDA7cT05MDt3PTE0MDthcHB
|
unknown
|
||
https://s.yimg.com/nn/lib/metro/g/myy/advertisement_0.0.19.js
|
unknown
|
||
https://s.yimg.com/aaq/nel/js/spotIm.custom.SpotIMJAC.modal.9d3270fa67932556c75baaed2c09c955.js
|
unknown
|
||
https://s.yimg.com/uu/api/res/1.2/YcilHawp_AKChrUBidk12w--~B/Zmk9c3RyaW07aD0zODg7cT05NTt3PTcyMDthcHB
|
unknown
|
||
https://yep.video.yahoo.com/oath/js/1/oath-player.js?ypv=8.5.43&lang=en-US
|
unknown
|
||
https://s.yimg.com/aaq/hc/homepage-pwa-defer-1.1.6.js
|
unknown
|
||
https://openweb.jac.yahoosandbox.com/1.5.0/jac.js
|
unknown
|
There are 27 hidden URLs, click here to show them.
Domains
Name
|
IP
|
Malicious
|
|
---|---|---|---|
new-fp-shed.wg1.b.yahoo.com
|
87.248.100.215
|
||
yahoo.com
|
98.137.11.163
|
||
www.yahoo.com
|
unknown
|
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
2.82.8.80
|
unknown
|
Portugal
|
||
70.160.67.203
|
unknown
|
United States
|
||
75.143.236.149
|
unknown
|
United States
|
||
83.110.223.61
|
unknown
|
United Arab Emirates
|
||
86.195.14.72
|
unknown
|
France
|
||
84.215.202.8
|
unknown
|
Norway
|
||
184.182.66.109
|
unknown
|
United States
|
||
92.186.69.229
|
unknown
|
France
|
||
174.4.89.3
|
unknown
|
Canada
|
||
161.142.103.187
|
unknown
|
Malaysia
|
||
114.143.176.236
|
unknown
|
India
|
||
14.192.241.76
|
unknown
|
Malaysia
|
||
173.88.135.179
|
unknown
|
United States
|
||
84.108.200.161
|
unknown
|
Israel
|
||
47.34.30.133
|
unknown
|
United States
|
||
183.87.163.165
|
unknown
|
India
|
||
184.181.75.148
|
unknown
|
United States
|
||
124.149.143.189
|
unknown
|
Australia
|
||
84.35.26.14
|
unknown
|
Netherlands
|
||
73.29.92.128
|
unknown
|
United States
|
||
68.203.69.96
|
unknown
|
United States
|
||
82.131.141.209
|
unknown
|
Hungary
|
||
64.121.161.102
|
unknown
|
United States
|
||
178.175.187.254
|
unknown
|
Moldova Republic of
|
||
96.56.197.26
|
unknown
|
United States
|
||
188.28.19.84
|
unknown
|
United Kingdom
|
||
186.64.67.30
|
unknown
|
Argentina
|
||
125.99.76.102
|
unknown
|
India
|
||
81.101.185.146
|
unknown
|
United Kingdom
|
||
59.28.84.65
|
unknown
|
Korea Republic of
|
||
105.186.128.181
|
unknown
|
South Africa
|
||
76.86.31.59
|
unknown
|
United States
|
||
147.147.30.126
|
unknown
|
United Kingdom
|
||
96.87.28.170
|
unknown
|
United States
|
||
75.109.111.89
|
unknown
|
United States
|
||
78.92.133.215
|
unknown
|
Hungary
|
||
124.122.47.148
|
unknown
|
Thailand
|
||
88.126.94.4
|
unknown
|
France
|
||
51.14.29.227
|
unknown
|
United Kingdom
|
||
85.57.212.13
|
unknown
|
Spain
|
||
47.205.25.170
|
unknown
|
United States
|
||
95.45.50.93
|
unknown
|
Ireland
|
||
80.12.88.148
|
unknown
|
France
|
||
69.133.162.35
|
unknown
|
United States
|
||
86.132.236.117
|
unknown
|
United Kingdom
|
||
151.62.238.176
|
unknown
|
Italy
|
||
70.112.206.5
|
unknown
|
United States
|
||
205.237.67.69
|
unknown
|
Canada
|
||
102.159.188.125
|
unknown
|
Tunisia
|
||
151.65.167.77
|
unknown
|
Italy
|
||
76.178.148.107
|
unknown
|
United States
|
||
89.36.206.69
|
unknown
|
Italy
|
||
69.242.31.249
|
unknown
|
United States
|
||
193.253.100.236
|
unknown
|
France
|
||
76.16.49.134
|
unknown
|
United States
|
||
94.207.104.225
|
unknown
|
United Arab Emirates
|
||
201.244.108.183
|
unknown
|
Colombia
|
||
103.42.86.42
|
unknown
|
India
|
||
78.18.105.11
|
unknown
|
Ireland
|
||
80.6.50.34
|
unknown
|
United Kingdom
|
||
103.144.201.56
|
unknown
|
unknown
|
||
27.0.48.233
|
unknown
|
India
|
||
70.28.50.223
|
unknown
|
Canada
|
||
98.145.23.67
|
unknown
|
United States
|
||
47.149.134.231
|
unknown
|
United States
|
||
82.125.44.236
|
unknown
|
France
|
||
81.229.117.95
|
unknown
|
Sweden
|
||
89.129.109.27
|
unknown
|
Spain
|
||
122.186.210.254
|
unknown
|
India
|
||
79.77.142.22
|
unknown
|
United Kingdom
|
||
90.78.147.141
|
unknown
|
France
|
||
122.184.143.86
|
unknown
|
India
|
||
186.75.95.6
|
unknown
|
Panama
|
||
50.68.186.195
|
unknown
|
Canada
|
||
12.172.173.82
|
unknown
|
United States
|
||
213.64.33.61
|
unknown
|
Sweden
|
||
86.97.55.89
|
unknown
|
United Arab Emirates
|
||
79.168.224.165
|
unknown
|
Portugal
|
||
176.142.207.63
|
unknown
|
France
|
||
92.154.17.149
|
unknown
|
France
|
||
174.58.146.57
|
unknown
|
United States
|
||
78.160.146.127
|
unknown
|
Turkey
|
||
58.186.75.42
|
unknown
|
Viet Nam
|
||
223.166.13.95
|
unknown
|
China
|
||
65.95.141.84
|
unknown
|
Canada
|
||
50.68.204.71
|
unknown
|
Canada
|
||
71.38.155.217
|
unknown
|
United States
|
||
104.35.24.154
|
unknown
|
United States
|
||
220.240.164.182
|
unknown
|
Australia
|
||
103.123.223.133
|
unknown
|
India
|
||
24.198.114.130
|
unknown
|
United States
|
||
2.36.64.159
|
unknown
|
Italy
|
||
198.2.51.242
|
unknown
|
United States
|
||
92.9.45.20
|
unknown
|
United Kingdom
|
||
113.11.92.30
|
unknown
|
Bangladesh
|
||
69.119.123.159
|
unknown
|
United States
|
||
69.123.4.221
|
unknown
|
United States
|
||
172.115.17.50
|
unknown
|
United States
|
||
98.137.11.163
|
yahoo.com
|
United States
|
||
87.248.100.215
|
new-fp-shed.wg1.b.yahoo.com
|
United Kingdom
|
There are 90 hidden IPs, click here to show them.
Registry
Path
|
Value
|
Malicious
|
|
---|---|---|---|
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\AppCompatFlags
|
AmiHivePermissionsCorrect
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\AppCompatFlags
|
AmiHiveOwnerCorrect
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\Windows Error Reporting\Debug
|
ExceptionRecord
|
||
HKEY_CURRENT_USER\Software\Microsoft\IdentityCRL\Immersive\production\Property
|
0018C0094A94BB2A
|
||
HKEY_CURRENT_USER\Software\Microsoft\IdentityCRL\Immersive\production\Token\{67082621-8D18-4333-9C64-10DE93676363}
|
DeviceTicket
|
||
HKEY_CURRENT_USER\Software\Microsoft\IdentityCRL\Immersive\production\Token\{67082621-8D18-4333-9C64-10DE93676363}
|
DeviceId
|
||
HKEY_CURRENT_USER\Software\Microsoft\IdentityCRL\Immersive\production\Token\{67082621-8D18-4333-9C64-10DE93676363}
|
ApplicationFlags
|
||
\REGISTRY\A\{739976cc-0044-a06b-0ee6-f7f12567d727}\Root\InventoryApplicationFile\rundll32.exe|ab97b57a
|
ProgramId
|
||
\REGISTRY\A\{739976cc-0044-a06b-0ee6-f7f12567d727}\Root\InventoryApplicationFile\rundll32.exe|ab97b57a
|
FileId
|
||
\REGISTRY\A\{739976cc-0044-a06b-0ee6-f7f12567d727}\Root\InventoryApplicationFile\rundll32.exe|ab97b57a
|
LowerCaseLongPath
|
||
\REGISTRY\A\{739976cc-0044-a06b-0ee6-f7f12567d727}\Root\InventoryApplicationFile\rundll32.exe|ab97b57a
|
LongPathHash
|
||
\REGISTRY\A\{739976cc-0044-a06b-0ee6-f7f12567d727}\Root\InventoryApplicationFile\rundll32.exe|ab97b57a
|
Name
|
||
\REGISTRY\A\{739976cc-0044-a06b-0ee6-f7f12567d727}\Root\InventoryApplicationFile\rundll32.exe|ab97b57a
|
Publisher
|
||
\REGISTRY\A\{739976cc-0044-a06b-0ee6-f7f12567d727}\Root\InventoryApplicationFile\rundll32.exe|ab97b57a
|
Version
|
||
\REGISTRY\A\{739976cc-0044-a06b-0ee6-f7f12567d727}\Root\InventoryApplicationFile\rundll32.exe|ab97b57a
|
BinFileVersion
|
||
\REGISTRY\A\{739976cc-0044-a06b-0ee6-f7f12567d727}\Root\InventoryApplicationFile\rundll32.exe|ab97b57a
|
BinaryType
|
||
\REGISTRY\A\{739976cc-0044-a06b-0ee6-f7f12567d727}\Root\InventoryApplicationFile\rundll32.exe|ab97b57a
|
ProductName
|
||
\REGISTRY\A\{739976cc-0044-a06b-0ee6-f7f12567d727}\Root\InventoryApplicationFile\rundll32.exe|ab97b57a
|
ProductVersion
|
||
\REGISTRY\A\{739976cc-0044-a06b-0ee6-f7f12567d727}\Root\InventoryApplicationFile\rundll32.exe|ab97b57a
|
LinkDate
|
||
\REGISTRY\A\{739976cc-0044-a06b-0ee6-f7f12567d727}\Root\InventoryApplicationFile\rundll32.exe|ab97b57a
|
BinProductVersion
|
||
\REGISTRY\A\{739976cc-0044-a06b-0ee6-f7f12567d727}\Root\InventoryApplicationFile\rundll32.exe|ab97b57a
|
Size
|
||
\REGISTRY\A\{739976cc-0044-a06b-0ee6-f7f12567d727}\Root\InventoryApplicationFile\rundll32.exe|ab97b57a
|
Language
|
||
\REGISTRY\A\{739976cc-0044-a06b-0ee6-f7f12567d727}\Root\InventoryApplicationFile\rundll32.exe|ab97b57a
|
IsPeFile
|
||
\REGISTRY\A\{739976cc-0044-a06b-0ee6-f7f12567d727}\Root\InventoryApplicationFile\rundll32.exe|ab97b57a
|
IsOsComponent
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\Windows Error Reporting\Debug
|
ExceptionRecord
|
||
HKEY_CURRENT_USER\Software\Microsoft\IdentityCRL\Immersive\production\Property
|
0018C0094A94BB2A
|
||
HKEY_CURRENT_USER\Software\Microsoft\IdentityCRL\Immersive\production\Token\{67082621-8D18-4333-9C64-10DE93676363}
|
DeviceTicket
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\IdentityCRL\ClockData
|
ClockTimeSeconds
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\IdentityCRL\ClockData
|
TickCount
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\Windows Error Reporting\Debug
|
ExceptionRecord
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\Windows Error Reporting\Debug
|
ExceptionRecord
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\Windows Error Reporting\Debug
|
ExceptionRecord
|
||
HKEY_CURRENT_USER\Software\Microsoft\Ccaxunpk
|
bc6cfb72
|
||
HKEY_CURRENT_USER\Software\Microsoft\Ccaxunpk
|
89f32b3c
|
||
HKEY_CURRENT_USER\Software\Microsoft\Ccaxunpk
|
8bb20b40
|
||
HKEY_CURRENT_USER\Software\Microsoft\Ccaxunpk
|
330e6c25
|
||
HKEY_CURRENT_USER\Software\Microsoft\Ccaxunpk
|
4e0623af
|
||
HKEY_CURRENT_USER\Software\Microsoft\Ccaxunpk
|
f6ba44ca
|
||
HKEY_CURRENT_USER\Software\Microsoft\Ccaxunpk
|
314f4c59
|
||
HKEY_CURRENT_USER\Software\Microsoft\Ccaxunpk
|
c3259484
|
||
HKEY_CURRENT_USER\Software\Microsoft\Ccaxunpk
|
bc6cfb72
|
||
HKEY_CURRENT_USER\Software\Microsoft\Ccaxunpk
|
bc6cfb72
|
||
HKEY_CURRENT_USER\Software\Microsoft\Ccaxunpk
|
bc6cfb72
|
There are 33 hidden registries, click here to show them.
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
5DA000
|
heap
|
page read and write
|
||
DC0000
|
heap
|
page read and write
|
||
101E3000
|
unkown
|
page write copy
|
||
10C0000
|
heap
|
page readonly
|
||
E1D1E7C000
|
stack
|
page read and write
|
||
539B000
|
heap
|
page read and write
|
||
5330000
|
heap
|
page read and write
|
||
710000
|
heap
|
page read and write
|
||
52FC000
|
heap
|
page read and write
|
||
536D000
|
heap
|
page read and write
|
||
7013000
|
heap
|
page read and write
|
||
DBC000
|
stack
|
page read and write
|
||
539D000
|
heap
|
page read and write
|
||
52FC000
|
heap
|
page read and write
|
||
101FE000
|
unkown
|
page readonly
|
||
1CB000
|
stack
|
page read and write
|
||
5330000
|
heap
|
page read and write
|
||
538F000
|
heap
|
page read and write
|
||
5330000
|
heap
|
page read and write
|
||
1F2C6800000
|
unkown
|
page read and write
|
||
AF0000
|
heap
|
page read and write
|
||
1F2C6887000
|
heap
|
page read and write
|
||
1F8EDFA9000
|
heap
|
page read and write
|
||
E61000
|
heap
|
page read and write
|
||
1F2C6847000
|
heap
|
page read and write
|
||
5330000
|
heap
|
page read and write
|
||
F0F000
|
stack
|
page read and write
|
||
52F8000
|
heap
|
page read and write
|
||
16CE000
|
stack
|
page read and write
|
||
AF2000
|
direct allocation
|
page readonly
|
||
574000
|
heap
|
page read and write
|
||
52F8000
|
heap
|
page read and write
|
||
6B09000
|
heap
|
page read and write
|
||
574000
|
heap
|
page read and write
|
||
536C000
|
heap
|
page read and write
|
||
122E000
|
stack
|
page read and write
|
||
1F2C6885000
|
heap
|
page read and write
|
||
5330000
|
heap
|
page read and write
|
||
101DF000
|
unkown
|
page read and write
|
||
3370000
|
heap
|
page readonly
|
||
5330000
|
heap
|
page read and write
|
||
ACC000
|
stack
|
page read and write
|
||
AD0000
|
direct allocation
|
page read and write
|
||
6244000
|
heap
|
page read and write
|
||
E3F000
|
heap
|
page read and write
|
||
101DF000
|
unkown
|
page read and write
|
||
1290000
|
heap
|
page read and write
|
||
538F000
|
heap
|
page read and write
|
||
A0E000
|
stack
|
page read and write
|
||
3D0000
|
heap
|
page read and write
|
||
103F000
|
stack
|
page read and write
|
||
101E0000
|
unkown
|
page write copy
|
||
5330000
|
heap
|
page read and write
|
||
1F2C6D13000
|
heap
|
page read and write
|
||
E5C000
|
stack
|
page read and write
|
||
E1D1BF9000
|
stack
|
page read and write
|
||
5330000
|
heap
|
page read and write
|
||
F00000
|
heap
|
page read and write
|
||
C7F000
|
stack
|
page read and write
|
||
52F8000
|
heap
|
page read and write
|
||
52FC000
|
heap
|
page read and write
|
||
7309000
|
heap
|
page read and write
|
||
433C000
|
heap
|
page read and write
|
||
67B000
|
stack
|
page read and write
|
||
AEA000
|
direct allocation
|
page readonly
|
||
10AF000
|
stack
|
page read and write
|
||
1F2C67B0000
|
heap
|
page read and write
|
||
FFC000
|
stack
|
page read and write
|
||
1F2C6C00000
|
heap
|
page read and write
|
||
6244000
|
heap
|
page read and write
|
||
539B000
|
heap
|
page read and write
|
||
1090000
|
heap
|
page read and write
|
||
1F8EDB60000
|
trusted library allocation
|
page read and write
|
||
434C000
|
heap
|
page read and write
|
||
51E0000
|
trusted library allocation
|
page read and write
|
||
F20000
|
heap
|
page read and write
|
||
1F8EDC48000
|
heap
|
page read and write
|
||
1F2C6D02000
|
heap
|
page read and write
|
||
91C000
|
stack
|
page read and write
|
||
820000
|
heap
|
page read and write
|
||
101E0000
|
unkown
|
page write copy
|
||
1F2C6923000
|
heap
|
page read and write
|
||
10000000
|
unkown
|
page readonly
|
||
5330000
|
heap
|
page read and write
|
||
1F2C6D17000
|
heap
|
page read and write
|
||
10000000
|
unkown
|
page readonly
|
||
538F000
|
heap
|
page read and write
|
||
1F8EEC60000
|
trusted library allocation
|
page read and write
|
||
342A000
|
heap
|
page read and write
|
||
3400000
|
heap
|
page read and write
|
||
D50000
|
heap
|
page read and write
|
||
5330000
|
heap
|
page read and write
|
||
6B0B000
|
heap
|
page read and write
|
||
4270000
|
trusted library allocation
|
page read and write
|
||
100AE000
|
unkown
|
page readonly
|
||
10F0000
|
heap
|
page read and write
|
||
5330000
|
heap
|
page read and write
|
||
127B000
|
stack
|
page read and write
|
||
5330000
|
heap
|
page read and write
|
||
FC0000
|
heap
|
page read and write
|
||
52FC000
|
heap
|
page read and write
|
||
101DA000
|
unkown
|
page readonly
|
||
1170000
|
heap
|
page read and write
|
||
F90000
|
heap
|
page read and write
|
||
3310000
|
heap
|
page read and write
|
||
DE3000
|
heap
|
page read and write
|
||
500000
|
heap
|
page read and write
|
||
4270000
|
trusted library allocation
|
page read and write
|
||
101E3000
|
unkown
|
page write copy
|
||
9C0000
|
heap
|
page read and write
|
||
5330000
|
heap
|
page read and write
|
||
C18000
|
heap
|
page read and write
|
||
1010000
|
heap
|
page readonly
|
||
B8457F9000
|
stack
|
page read and write
|
||
5330000
|
heap
|
page read and write
|
||
1F2C6900000
|
trusted library allocation
|
page read and write
|
||
101E3000
|
unkown
|
page write copy
|
||
100AD000
|
unkown
|
page read and write
|
||
5330000
|
heap
|
page read and write
|
||
8AF000
|
stack
|
page read and write
|
||
5330000
|
heap
|
page read and write
|
||
1F8EDBC0000
|
heap
|
page read and write
|
||
5330000
|
heap
|
page read and write
|
||
B8453ED000
|
stack
|
page read and write
|
||
1F2C6828000
|
heap
|
page read and write
|
||
800000
|
heap
|
page readonly
|
||
5330000
|
heap
|
page read and write
|
||
3420000
|
heap
|
page read and write
|
||
5330000
|
heap
|
page read and write
|
||
1F2C6D02000
|
heap
|
page read and write
|
||
C3E000
|
stack
|
page read and write
|
||
E61000
|
heap
|
page read and write
|
||
539D000
|
heap
|
page read and write
|
||
5330000
|
heap
|
page read and write
|
||
1F2C6821000
|
unkown
|
page read and write
|
||
52EC000
|
heap
|
page read and write
|
||
5C60000
|
heap
|
page read and write
|
||
A60000
|
heap
|
page read and write
|
||
536D000
|
heap
|
page read and write
|
||
5330000
|
heap
|
page read and write
|
||
5330000
|
heap
|
page read and write
|
||
4270000
|
trusted library allocation
|
page read and write
|
||
5330000
|
heap
|
page read and write
|
||
4314000
|
heap
|
page read and write
|
||
1F8EE990000
|
trusted library allocation
|
page read and write
|
||
BEE000
|
stack
|
page read and write
|
||
54B000
|
stack
|
page read and write
|
||
AC0000
|
direct allocation
|
page execute read
|
||
6220000
|
heap
|
page read and write
|
||
5330000
|
heap
|
page read and write
|
||
5330000
|
heap
|
page read and write
|
||
50E1000
|
heap
|
page read and write
|
||
5330000
|
heap
|
page read and write
|
||
100AE000
|
unkown
|
page readonly
|
||
ECA000
|
heap
|
page read and write
|
||
100AD000
|
unkown
|
page read and write
|
||
54CC000
|
heap
|
page read and write
|
||
BEF000
|
stack
|
page read and write
|
||
5330000
|
heap
|
page read and write
|
||
AEF000
|
direct allocation
|
page read and write
|
||
10D0000
|
heap
|
page read and write
|
||
101FE000
|
unkown
|
page readonly
|
||
6220000
|
heap
|
page read and write
|
||
5CF1000
|
heap
|
page read and write
|
||
B70000
|
heap
|
page read and write
|
||
E1D1A7C000
|
stack
|
page read and write
|
||
100AD000
|
unkown
|
page read and write
|
||
4270000
|
trusted library allocation
|
page read and write
|
||
5330000
|
heap
|
page read and write
|
||
1F2C684C000
|
heap
|
page read and write
|
||
101FE000
|
unkown
|
page readonly
|
||
6604000
|
heap
|
page read and write
|
||
1F8EDC47000
|
heap
|
page read and write
|
||
6B15000
|
heap
|
page read and write
|
||
436F000
|
heap
|
page read and write
|
||
52F0000
|
heap
|
page read and write
|
||
4DA0000
|
heap
|
page read and write
|
||
33C0000
|
heap
|
page read and write
|
||
120000
|
heap
|
page read and write
|
||
52F8000
|
heap
|
page read and write
|
||
5330000
|
heap
|
page read and write
|
||
5330000
|
heap
|
page read and write
|
||
574000
|
heap
|
page read and write
|
||
10000000
|
unkown
|
page readonly
|
||
5B0000
|
heap
|
page read and write
|
||
5330000
|
heap
|
page read and write
|
||
940000
|
heap
|
page read and write
|
||
48A0000
|
heap
|
page read and write
|
||
539B000
|
heap
|
page read and write
|
||
1F8EDB50000
|
heap
|
page read and write
|
||
14D0000
|
heap
|
page read and write
|
||
4379000
|
heap
|
page read and write
|
||
FFE000
|
stack
|
page read and write
|
||
E1D1C79000
|
stack
|
page read and write
|
||
6604000
|
heap
|
page read and write
|
||
5330000
|
heap
|
page read and write
|
||
101E3000
|
unkown
|
page write copy
|
||
536D000
|
heap
|
page read and write
|
||
101DF000
|
unkown
|
page read and write
|
||
101FE000
|
unkown
|
page readonly
|
||
14BF000
|
stack
|
page read and write
|
||
101DA000
|
unkown
|
page readonly
|
||
5330000
|
heap
|
page read and write
|
||
101FE000
|
unkown
|
page readonly
|
||
101DA000
|
unkown
|
page readonly
|
||
1F8EDC4F000
|
heap
|
page read and write
|
||
7B0F000
|
heap
|
page read and write
|
||
B40000
|
heap
|
page read and write
|
||
AB0000
|
heap
|
page readonly
|
||
539D000
|
heap
|
page read and write
|
||
6244000
|
heap
|
page read and write
|
||
5330000
|
heap
|
page read and write
|
||
660F000
|
heap
|
page read and write
|
||
1F8EE920000
|
trusted library allocation
|
page read and write
|
||
14E6000
|
heap
|
page read and write
|
||
117A000
|
heap
|
page read and write
|
||
E1D1CFE000
|
stack
|
page read and write
|
||
AD1000
|
direct allocation
|
page execute read
|
||
32C0000
|
heap
|
page read and write
|
||
116C000
|
stack
|
page read and write
|
||
6244000
|
heap
|
page read and write
|
||
436F000
|
heap
|
page read and write
|
||
10001000
|
unkown
|
page execute read
|
||
1F8EEBF0000
|
heap
|
page readonly
|
||
14EC000
|
heap
|
page read and write
|
||
12A0000
|
heap
|
page read and write
|
||
6607000
|
heap
|
page read and write
|
||
539D000
|
heap
|
page read and write
|
||
A20000
|
heap
|
page read and write
|
||
5330000
|
heap
|
page read and write
|
||
10F0000
|
heap
|
page read and write
|
||
6244000
|
heap
|
page read and write
|
||
4270000
|
trusted library allocation
|
page read and write
|
||
7B0000
|
heap
|
page read and write
|
||
1F8EEC10000
|
trusted library allocation
|
page read and write
|
||
10000000
|
unkown
|
page readonly
|
||
5330000
|
heap
|
page read and write
|
||
89F000
|
stack
|
page read and write
|
||
54C4000
|
heap
|
page read and write
|
||
CC0000
|
heap
|
page read and write
|
||
5330000
|
heap
|
page read and write
|
||
6244000
|
heap
|
page read and write
|
||
5330000
|
heap
|
page read and write
|
||
52FC000
|
heap
|
page read and write
|
||
5330000
|
heap
|
page read and write
|
||
C90000
|
heap
|
page readonly
|
||
52FC000
|
heap
|
page read and write
|
||
536D000
|
heap
|
page read and write
|
||
101FE000
|
unkown
|
page readonly
|
||
4A80000
|
heap
|
page read and write
|
||
1F8EDC09000
|
heap
|
page read and write
|
||
C60000
|
heap
|
page read and write
|
||
52F8000
|
heap
|
page read and write
|
||
52EC000
|
heap
|
page read and write
|
||
1F2C684B000
|
heap
|
page read and write
|
||
52EC000
|
heap
|
page read and write
|
||
101E0000
|
unkown
|
page write copy
|
||
AC0000
|
heap
|
page read and write
|
||
101DF000
|
unkown
|
page read and write
|
||
1F8EDFA5000
|
heap
|
page read and write
|
||
5330000
|
heap
|
page read and write
|
||
5BE000
|
stack
|
page read and write
|
||
101E0000
|
unkown
|
page write copy
|
||
539D000
|
heap
|
page read and write
|
||
539D000
|
heap
|
page read and write
|
||
1F8EEC00000
|
trusted library allocation
|
page read and write
|
||
1F8EEBE0000
|
trusted library allocation
|
page read and write
|
||
574000
|
heap
|
page read and write
|
||
52EC000
|
heap
|
page read and write
|
||
52EC000
|
heap
|
page read and write
|
||
5330000
|
heap
|
page read and write
|
||
8D0000
|
heap
|
page read and write
|
||
1F2C6D13000
|
heap
|
page read and write
|
||
3360000
|
heap
|
page read and write
|
||
36C0000
|
heap
|
page read and write
|
||
574000
|
heap
|
page read and write
|
||
100AE000
|
unkown
|
page readonly
|
||
8B0000
|
heap
|
page read and write
|
||
10001000
|
unkown
|
page execute read
|
||
52EC000
|
heap
|
page read and write
|
||
86E000
|
stack
|
page read and write
|
||
4270000
|
trusted library allocation
|
page read and write
|
||
6244000
|
heap
|
page read and write
|
||
4270000
|
trusted library allocation
|
page read and write
|
||
50F1000
|
heap
|
page read and write
|
||
B0B000
|
stack
|
page read and write
|
||
E1D1D79000
|
stack
|
page read and write
|
||
14F1000
|
heap
|
page read and write
|
||
5330000
|
heap
|
page read and write
|
||
4D5F000
|
stack
|
page read and write
|
||
1000000
|
heap
|
page read and write
|
||
10001000
|
unkown
|
page execute read
|
||
1F2C6D00000
|
heap
|
page read and write
|
||
F40000
|
heap
|
page read and write
|
||
BE0000
|
heap
|
page read and write
|
||
1000000
|
heap
|
page read and write
|
||
F10000
|
heap
|
page readonly
|
||
1F8EDFA0000
|
heap
|
page read and write
|
||
5330000
|
heap
|
page read and write
|
||
1020000
|
heap
|
page read and write
|
||
4F80000
|
heap
|
page read and write
|
||
5330000
|
heap
|
page read and write
|
||
6220000
|
heap
|
page read and write
|
||
6220000
|
heap
|
page read and write
|
||
106E000
|
stack
|
page read and write
|
||
5330000
|
heap
|
page read and write
|
||
10001000
|
unkown
|
page execute read
|
||
4321000
|
heap
|
page read and write
|
||
5330000
|
heap
|
page read and write
|
||
100AE000
|
unkown
|
page readonly
|
||
1120000
|
heap
|
page read and write
|
||
14DB000
|
heap
|
page read and write
|
||
1F8EDFB0000
|
trusted library allocation
|
page read and write
|
||
574000
|
heap
|
page read and write
|
||
50C000
|
stack
|
page read and write
|
||
B00000
|
trusted library allocation
|
page read and write
|
||
437C000
|
heap
|
page read and write
|
||
101E0000
|
unkown
|
page write copy
|
||
3030000
|
heap
|
page read and write
|
||
1F8EDC4E000
|
heap
|
page read and write
|
||
437C000
|
heap
|
page read and write
|
||
101DF000
|
unkown
|
page read and write
|
||
539B000
|
heap
|
page read and write
|
||
1F2C6750000
|
trusted library allocation
|
page read and write
|
||
539D000
|
heap
|
page read and write
|
||
5330000
|
heap
|
page read and write
|
||
5330000
|
heap
|
page read and write
|
||
52FC000
|
heap
|
page read and write
|
||
A4F000
|
stack
|
page read and write
|
||
5304000
|
heap
|
page read and write
|
||
100AD000
|
unkown
|
page read and write
|
||
8A0000
|
heap
|
page read and write
|
||
A60000
|
heap
|
page readonly
|
||
6220000
|
heap
|
page read and write
|
||
63C000
|
stack
|
page read and write
|
||
101E3000
|
unkown
|
page write copy
|
||
E60000
|
heap
|
page read and write
|
||
5330000
|
heap
|
page read and write
|
||
1F8EE9A0000
|
trusted library allocation
|
page read and write
|
||
5330000
|
heap
|
page read and write
|
||
100AE000
|
unkown
|
page readonly
|
||
100AD000
|
unkown
|
page read and write
|
||
10001000
|
unkown
|
page execute read
|
||
1F2C6C02000
|
heap
|
page read and write
|
||
E9B000
|
stack
|
page read and write
|
||
7BB000
|
stack
|
page read and write
|
||
437C000
|
heap
|
page read and write
|
||
1F2C6813000
|
unkown
|
page read and write
|
||
C6A000
|
heap
|
page read and write
|
||
6B0B000
|
heap
|
page read and write
|
||
4A0000
|
heap
|
page read and write
|
||
126F000
|
stack
|
page read and write
|
||
1F8EDC00000
|
heap
|
page read and write
|
||
1770000
|
heap
|
page read and write
|
||
1F2C684B000
|
heap
|
page read and write
|
||
10FA000
|
heap
|
page read and write
|
||
1F8EDC71000
|
heap
|
page read and write
|
||
1F8EDBE0000
|
heap
|
page read and write
|
||
33CF000
|
stack
|
page read and write
|
||
1060000
|
heap
|
page read and write
|
||
52F8000
|
heap
|
page read and write
|
||
1F8EDC4E000
|
heap
|
page read and write
|
||
1F2C6915000
|
trusted library allocation
|
page read and write
|
||
5330000
|
heap
|
page read and write
|
||
5330000
|
heap
|
page read and write
|
||
106C000
|
stack
|
page read and write
|
||
660E000
|
heap
|
page read and write
|
||
6B17000
|
heap
|
page read and write
|
||
3380000
|
heap
|
page read and write
|
||
574000
|
heap
|
page read and write
|
||
5330000
|
heap
|
page read and write
|
||
6220000
|
heap
|
page read and write
|
||
660D000
|
heap
|
page read and write
|
||
52FC000
|
heap
|
page read and write
|
||
5330000
|
heap
|
page read and write
|
||
5330000
|
heap
|
page read and write
|
||
6220000
|
heap
|
page read and write
|
||
1F2C6887000
|
heap
|
page read and write
|
||
33F0000
|
heap
|
page readonly
|
||
13B0000
|
heap
|
page read and write
|
||
8DA000
|
heap
|
page read and write
|
||
8C0000
|
heap
|
page read and write
|
||
5330000
|
heap
|
page read and write
|
||
539D000
|
heap
|
page read and write
|
||
52EC000
|
heap
|
page read and write
|
||
123B000
|
stack
|
page read and write
|
||
FA0000
|
heap
|
page read and write
|
||
101DA000
|
unkown
|
page readonly
|
||
5330000
|
heap
|
page read and write
|
||
101DA000
|
unkown
|
page readonly
|
||
10000000
|
unkown
|
page readonly
|
||
6244000
|
heap
|
page read and write
|
||
18C000
|
stack
|
page read and write
|
||
4D20000
|
heap
|
page read and write
|
||
42F1000
|
heap
|
page read and write
|
||
E3F000
|
heap
|
page read and write
|
||
5C0000
|
heap
|
page read and write
|
||
114A000
|
heap
|
page read and write
|
||
B845AF9000
|
stack
|
page read and write
|
||
4D1E000
|
stack
|
page read and write
|
||
6220000
|
heap
|
page read and write
|
||
431F000
|
heap
|
page read and write
|
||
550000
|
heap
|
page readonly
|
||
10000000
|
unkown
|
page readonly
|
||
1F2C6C13000
|
heap
|
page read and write
|
||
1140000
|
heap
|
page read and write
|
||
1F8EE930000
|
trusted library allocation
|
page read and write
|
||
5330000
|
heap
|
page read and write
|
||
5330000
|
heap
|
page read and write
|
||
5330000
|
heap
|
page read and write
|
||
6B1B000
|
heap
|
page read and write
|
||
101E3000
|
unkown
|
page write copy
|
||
4270000
|
trusted library allocation
|
page read and write
|
||
4348000
|
heap
|
page read and write
|
||
5330000
|
heap
|
page read and write
|
||
1F2C6740000
|
heap
|
page read and write
|
||
A9E000
|
stack
|
page read and write
|
||
4270000
|
trusted library allocation
|
page read and write
|
||
52F8000
|
heap
|
page read and write
|
||
100AE000
|
unkown
|
page readonly
|
||
6224000
|
heap
|
page read and write
|
||
5330000
|
heap
|
page read and write
|
||
5330000
|
heap
|
page read and write
|
||
132E000
|
stack
|
page read and write
|
||
5330000
|
heap
|
page read and write
|
||
59B0000
|
heap
|
page read and write
|
||
100AD000
|
unkown
|
page read and write
|
||
1F2C684B000
|
heap
|
page read and write
|
||
5D0000
|
heap
|
page read and write
|
||
101DA000
|
unkown
|
page readonly
|
||
538F000
|
heap
|
page read and write
|
||
12EE000
|
stack
|
page read and write
|
||
52F8000
|
heap
|
page read and write
|
||
548C000
|
heap
|
page read and write
|
||
DFB000
|
stack
|
page read and write
|
||
1F2C6902000
|
trusted library allocation
|
page read and write
|
||
1F2C6D02000
|
heap
|
page read and write
|
||
101E0000
|
unkown
|
page write copy
|
||
574000
|
heap
|
page read and write
|
||
539D000
|
heap
|
page read and write
|
||
5330000
|
heap
|
page read and write
|
||
57E5000
|
heap
|
page read and write
|
||
334E000
|
stack
|
page read and write
|
||
10001000
|
unkown
|
page execute read
|
||
101DF000
|
unkown
|
page read and write
|
||
5330000
|
heap
|
page read and write
|
||
340A000
|
heap
|
page read and write
|
||
77C000
|
stack
|
page read and write
|
||
437C000
|
heap
|
page read and write
|
||
95B000
|
stack
|
page read and write
|
||
570000
|
heap
|
page read and write
|
||
AD0000
|
heap
|
page read and write
|
||
3400000
|
heap
|
page read and write
|
||
5330000
|
heap
|
page read and write
|
||
94A000
|
heap
|
page read and write
|
||
52EC000
|
heap
|
page read and write
|
||
123C000
|
stack
|
page read and write
|
||
52FC000
|
heap
|
page read and write
|
||
EC0000
|
heap
|
page read and write
|
||
1110000
|
heap
|
page read and write
|
There are 450 hidden memdumps, click here to show them.