IOC Report
Spoofer.exe

loading gif

Files

File Path
Type
Category
Malicious
Spoofer.exe
PE32+ executable (console) x86-64, for MS Windows
initial sample
malicious
C:
DOS/MBR boot sector, code offset 0x52+2, OEM-ID "NTFS ", sectors/cluster 8, Media descriptor 0xf8, sectors/track 63, heads 255, hidden sectors 239616, dos < 4.0 BootSector (0x80), FAT (1Y bit by descriptor); NTFS, sectors/track 63, sectors 103512102, $MFT start cluster 786432, $MFTMirror start cluster 2, bytes/RecordSegment 2^(-1*246), clusters/index block 1, serial number 0e6b81a761ae64d9a
dropped
malicious
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_Spoofer.exe_5ed0293ca218faa8dff17315f2dedc23bf426c7_70ccc5ba_7ceef89b-93f1-4bd1-8702-65623f27d4c0\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
malicious
C:\ProgramData\Microsoft\Windows\WER\Temp\WER3F01.tmp.dmp
Mini DuMP crash report, 14 streams, Thu Oct 31 05:51:07 2024, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER41E0.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER4210.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\Windows\appcompat\Programs\Amcache.hve
MS Windows registry file, NT/2000 or above
dropped
\Device\ConDrv
ISO-8859 text, with CRLF line terminators
dropped

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\Spoofer.exe
"C:\Users\user\Desktop\Spoofer.exe"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\WerFault.exe
C:\Windows\system32\WerFault.exe -u -p 1776 -s 1284

URLs

Name
IP
Malicious
http://upx.sf.net
unknown

Registry

Path
Value
Malicious
HKEY_LOCAL_MACHINE\SYSTEM\HardwareConfig\{c448340f-9fa7-aece-bb9e-5e111a13d127}
Id
HKEY_LOCAL_MACHINE\SYSTEM\HardwareConfig\{c448340f-9fa7-aece-bb9e-5e111a13d127}
LastUse
HKEY_LOCAL_MACHINE\SYSTEM\HardwareConfig\{c448340f-9fa7-aece-bb9e-5e111a13d127}
SystemBiosVersion
HKEY_LOCAL_MACHINE\SYSTEM\HardwareConfig\{c448340f-9fa7-aece-bb9e-5e111a13d127}
EnclosureType
HKEY_LOCAL_MACHINE\SYSTEM\HardwareConfig\{c448340f-9fa7-aece-bb9e-5e111a13d127}
SystemManufacturer
HKEY_LOCAL_MACHINE\SYSTEM\HardwareConfig\{c448340f-9fa7-aece-bb9e-5e111a13d127}
SystemProductName
HKEY_LOCAL_MACHINE\SYSTEM\HardwareConfig\{c448340f-9fa7-aece-bb9e-5e111a13d127}
BIOSVendor
HKEY_LOCAL_MACHINE\SYSTEM\HardwareConfig\{c448340f-9fa7-aece-bb9e-5e111a13d127}
BIOSVersion
HKEY_LOCAL_MACHINE\SYSTEM\HardwareConfig\{c448340f-9fa7-aece-bb9e-5e111a13d127}
BIOSReleaseDate
HKEY_LOCAL_MACHINE\SYSTEM\HardwareConfig\{c448340f-9fa7-aece-bb9e-5e111a13d127}
SystemVersion
HKEY_LOCAL_MACHINE\SYSTEM\HardwareConfig\{c448340f-9fa7-aece-bb9e-5e111a13d127}
BootDriverFlags
HKEY_LOCAL_MACHINE\SYSTEM\HardwareConfig\{c448340f-9fa7-aece-bb9e-5e111a13d127}\ComputerIds
{afd0bde3-d6cc-5df7-a63f-f8fa5623e5ea}
HKEY_LOCAL_MACHINE\SYSTEM\HardwareConfig\{c448340f-9fa7-aece-bb9e-5e111a13d127}\ComputerIds
{6a457f46-f2df-581d-8118-af53ddb13c1d}
HKEY_LOCAL_MACHINE\SYSTEM\HardwareConfig\{c448340f-9fa7-aece-bb9e-5e111a13d127}\ComputerIds
{baeaa7f3-89b5-53f3-b93c-d75328c29650}
HKEY_LOCAL_MACHINE\SYSTEM\HardwareConfig\{c448340f-9fa7-aece-bb9e-5e111a13d127}\ComputerIds
{4a8a248d-9e6b-5216-b83e-6cdf9bde8d0d}
HKEY_LOCAL_MACHINE\SYSTEM\HardwareConfig\{c448340f-9fa7-aece-bb9e-5e111a13d127}\ComputerIds
{27ba637b-843e-58ac-8d78-3006feac89d3}
HKEY_LOCAL_MACHINE\SYSTEM\HardwareConfig\{c448340f-9fa7-aece-bb9e-5e111a13d127}\ComputerIds
{1aaa6118-f19d-50ee-b799-86dfb0bfaf55}
HKEY_LOCAL_MACHINE\SYSTEM\HardwareConfig\{c448340f-9fa7-aece-bb9e-5e111a13d127}\ProductIds
{afd0bde3-d6cc-5df7-a63f-f8fa5623e5ea}_amd64
HKEY_LOCAL_MACHINE\SYSTEM\HardwareConfig\{c448340f-9fa7-aece-bb9e-5e111a13d127}\ProductIds
{6a457f46-f2df-581d-8118-af53ddb13c1d}_amd64
HKEY_LOCAL_MACHINE\SYSTEM\HardwareConfig\{c448340f-9fa7-aece-bb9e-5e111a13d127}\ProductIds
{baeaa7f3-89b5-53f3-b93c-d75328c29650}_amd64
HKEY_LOCAL_MACHINE\SYSTEM\HardwareConfig\{c448340f-9fa7-aece-bb9e-5e111a13d127}\ProductIds
{4a8a248d-9e6b-5216-b83e-6cdf9bde8d0d}_amd64
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\BitBucket\Volume\{1a4b1382-eeb5-4d59-b0fa-b93f83a518e1}
MaxCapacity
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\BitBucket\Volume\{1a4b1382-eeb5-4d59-b0fa-b93f83a518e1}
NukeOnDelete
HKEY_LOCAL_MACHINE\SYSTEM\HardwareConfig
LastConfig
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\TPM\WMI
WindowsAIKHash
HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\MultifunctionAdapter\0\DiskController\0\DiskPeripheral\0
Identifier
HKEY_LOCAL_MACHINE\HARDWARE\DEVICEMAP\Scsi\Scsi Port 0\Scsi Bus 0\Target Id 0\Logical Unit Id 0
Identifier
HKEY_LOCAL_MACHINE\HARDWARE\DEVICEMAP\Scsi\Scsi Port 3\Scsi Bus 0\Target Id 0\Logical Unit Id 0
Identifier
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography
MachineGuid
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\IDConfigDB\Hardware Profiles\0001
HwProfileGuid
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\WindowsUpdate
SusClientId
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\WindowsUpdate
SusClientIdValidation
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\Tcpip6\Parameters
Dhcpv6DUID
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\SystemInformation
ComputerHardwareId
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\SystemInformation
ComputerHardwareIds
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Internet Explorer\Migration
IE Installed Date
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SQMClient
MachineId
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SQMClient
WinSqmFirstSessionStartTime
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion
InstallTime
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion
InstallDate
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion
DigitalProductId
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion
DigitalProductId4
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion
BuildGUID
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion
ProductId
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion
BuildLab
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion
BuildLabEx
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Class\{4d36e972-e325-11ce-bfc1-08002be10318}\0000
NetworkInterfaceInstallTimestamp
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Class\{4d36e972-e325-11ce-bfc1-08002be10318}\0001
NetworkInterfaceInstallTimestamp
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Class\{4d36e972-e325-11ce-bfc1-08002be10318}\0002
NetworkInterfaceInstallTimestamp
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Class\{4d36e972-e325-11ce-bfc1-08002be10318}\0003
NetworkInterfaceInstallTimestamp
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Class\{4d36e972-e325-11ce-bfc1-08002be10318}\0004
NetworkInterfaceInstallTimestamp
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Class\{4d36e972-e325-11ce-bfc1-08002be10318}\0005
NetworkInterfaceInstallTimestamp
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Class\{4d36e972-e325-11ce-bfc1-08002be10318}\0006
NetworkInterfaceInstallTimestamp
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Class\{4d36e972-e325-11ce-bfc1-08002be10318}\0007
NetworkInterfaceInstallTimestamp
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Class\{4d36e972-e325-11ce-bfc1-08002be10318}\0008
NetworkInterfaceInstallTimestamp
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Class\{4d36e972-e325-11ce-bfc1-08002be10318}\0009
NetworkInterfaceInstallTimestamp
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Diagnostics\DiagTrack\SevilleEventlogManager
LastEventlogWrittenTime
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\SoftwareProtectionPlatform\Activation
ProductActivationTime
\REGISTRY\A\{2a5fad3c-a61d-df15-81ce-2b0812ffbcd6}\Root\InventoryApplicationFile\spoofer.exe|980e62c703a5a972
ProgramId
\REGISTRY\A\{2a5fad3c-a61d-df15-81ce-2b0812ffbcd6}\Root\InventoryApplicationFile\spoofer.exe|980e62c703a5a972
FileId
\REGISTRY\A\{2a5fad3c-a61d-df15-81ce-2b0812ffbcd6}\Root\InventoryApplicationFile\spoofer.exe|980e62c703a5a972
LowerCaseLongPath
\REGISTRY\A\{2a5fad3c-a61d-df15-81ce-2b0812ffbcd6}\Root\InventoryApplicationFile\spoofer.exe|980e62c703a5a972
LongPathHash
\REGISTRY\A\{2a5fad3c-a61d-df15-81ce-2b0812ffbcd6}\Root\InventoryApplicationFile\spoofer.exe|980e62c703a5a972
Name
\REGISTRY\A\{2a5fad3c-a61d-df15-81ce-2b0812ffbcd6}\Root\InventoryApplicationFile\spoofer.exe|980e62c703a5a972
OriginalFileName
\REGISTRY\A\{2a5fad3c-a61d-df15-81ce-2b0812ffbcd6}\Root\InventoryApplicationFile\spoofer.exe|980e62c703a5a972
Publisher
\REGISTRY\A\{2a5fad3c-a61d-df15-81ce-2b0812ffbcd6}\Root\InventoryApplicationFile\spoofer.exe|980e62c703a5a972
Version
\REGISTRY\A\{2a5fad3c-a61d-df15-81ce-2b0812ffbcd6}\Root\InventoryApplicationFile\spoofer.exe|980e62c703a5a972
BinFileVersion
\REGISTRY\A\{2a5fad3c-a61d-df15-81ce-2b0812ffbcd6}\Root\InventoryApplicationFile\spoofer.exe|980e62c703a5a972
BinaryType
\REGISTRY\A\{2a5fad3c-a61d-df15-81ce-2b0812ffbcd6}\Root\InventoryApplicationFile\spoofer.exe|980e62c703a5a972
ProductName
\REGISTRY\A\{2a5fad3c-a61d-df15-81ce-2b0812ffbcd6}\Root\InventoryApplicationFile\spoofer.exe|980e62c703a5a972
ProductVersion
\REGISTRY\A\{2a5fad3c-a61d-df15-81ce-2b0812ffbcd6}\Root\InventoryApplicationFile\spoofer.exe|980e62c703a5a972
LinkDate
\REGISTRY\A\{2a5fad3c-a61d-df15-81ce-2b0812ffbcd6}\Root\InventoryApplicationFile\spoofer.exe|980e62c703a5a972
BinProductVersion
\REGISTRY\A\{2a5fad3c-a61d-df15-81ce-2b0812ffbcd6}\Root\InventoryApplicationFile\spoofer.exe|980e62c703a5a972
AppxPackageFullName
\REGISTRY\A\{2a5fad3c-a61d-df15-81ce-2b0812ffbcd6}\Root\InventoryApplicationFile\spoofer.exe|980e62c703a5a972
AppxPackageRelativeId
\REGISTRY\A\{2a5fad3c-a61d-df15-81ce-2b0812ffbcd6}\Root\InventoryApplicationFile\spoofer.exe|980e62c703a5a972
Size
\REGISTRY\A\{2a5fad3c-a61d-df15-81ce-2b0812ffbcd6}\Root\InventoryApplicationFile\spoofer.exe|980e62c703a5a972
Language
\REGISTRY\A\{2a5fad3c-a61d-df15-81ce-2b0812ffbcd6}\Root\InventoryApplicationFile\spoofer.exe|980e62c703a5a972
Usn
There are 67 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
21C2603B000
heap
page read and write
21C26035000
heap
page read and write
21C2426A000
heap
page read and write
21C2603E000
heap
page read and write
21C24250000
heap
page read and write
21C24225000
heap
page read and write
21C2606A000
heap
page read and write
21C2602E000
heap
page read and write
21C2426B000
heap
page read and write
21C2423D000
heap
page read and write
21C2426C000
heap
page read and write
86F63FB000
stack
page read and write
21C24225000
heap
page read and write
21C24240000
heap
page read and write
21C2426C000
heap
page read and write
21C26034000
heap
page read and write
21C24276000
heap
page read and write
21C24237000
heap
page read and write
21C2426A000
heap
page read and write
21C24214000
heap
page read and write
21C2426D000
heap
page read and write
21C24232000
heap
page read and write
21C26037000
heap
page read and write
21C26021000
heap
page read and write
21C24258000
heap
page read and write
21C24246000
heap
page read and write
21C24241000
heap
page read and write
21C24241000
heap
page read and write
21C2426C000
heap
page read and write
21C26048000
heap
page read and write
21C2424A000
heap
page read and write
21C24215000
heap
page read and write
21C24214000
heap
page read and write
21C2424E000
heap
page read and write
21C24231000
heap
page read and write
21C24211000
heap
page read and write
21C2426A000
heap
page read and write
21C2424E000
heap
page read and write
21C2603A000
heap
page read and write
21C24247000
heap
page read and write
21C24246000
heap
page read and write
21C2422B000
heap
page read and write
21C24210000
heap
page read and write
21C26042000
heap
page read and write
21C2423D000
heap
page read and write
21C2423D000
heap
page read and write
21C24130000
heap
page read and write
21C2427D000
heap
page read and write
21C26029000
heap
page read and write
21C2426A000
heap
page read and write
21C2426B000
heap
page read and write
21C2426A000
heap
page read and write
21C2426A000
heap
page read and write
21C24274000
heap
page read and write
21C24276000
heap
page read and write
21C2423A000
heap
page read and write
21C2426F000
heap
page read and write
21C2426A000
heap
page read and write
21C2427A000
heap
page read and write
21C2426A000
heap
page read and write
21C2426A000
heap
page read and write
21C24237000
heap
page read and write
21C2426A000
heap
page read and write
21C2426A000
heap
page read and write
21C24210000
heap
page read and write
21C26037000
heap
page read and write
21C24234000
heap
page read and write
86F64FE000
stack
page read and write
21C24211000
heap
page read and write
21C2426C000
heap
page read and write
21C24258000
heap
page read and write
21C2426A000
heap
page read and write
21C2422B000
heap
page read and write
21C24245000
heap
page read and write
21C2426B000
heap
page read and write
21C24211000
heap
page read and write
21C2426E000
heap
page read and write
21C24273000
heap
page read and write
21C2426A000
heap
page read and write
21C2424A000
heap
page read and write
21C26032000
heap
page read and write
21C2426B000
heap
page read and write
21C24258000
heap
page read and write
21C2426A000
heap
page read and write
21C24248000
heap
page read and write
21C26041000
heap
page read and write
21C24277000
heap
page read and write
86F67FB000
stack
page read and write
21C24210000
heap
page read and write
21C2426A000
heap
page read and write
21C2603E000
heap
page read and write
7FF79FA4A000
unkown
page readonly
21C2603E000
heap
page read and write
21C24241000
heap
page read and write
21C2427D000
heap
page read and write
21C2427D000
heap
page read and write
21C2426A000
heap
page read and write
21C2426A000
heap
page read and write
21C24272000
heap
page read and write
21C2426B000
heap
page read and write
21C2426A000
heap
page read and write
7FF79FA31000
unkown
page execute read
21C24231000
heap
page read and write
21C26030000
heap
page read and write
21C2427E000
heap
page read and write
21C24273000
heap
page read and write
21C2426A000
heap
page read and write
21C2426B000
heap
page read and write
21C24214000
heap
page read and write
21C2603E000
heap
page read and write
21C2427B000
heap
page read and write
21C24248000
heap
page read and write
21C2424A000
heap
page read and write
21C2424E000
heap
page read and write
21C2603E000
heap
page read and write
21C2602C000
heap
page read and write
21C2423A000
heap
page read and write
21C24248000
heap
page read and write
21C2423A000
heap
page read and write
21C24241000
heap
page read and write
21C24258000
heap
page read and write
21C2602B000
heap
page read and write
21C24245000
heap
page read and write
7FF79FA57000
unkown
page read and write
21C2426A000
heap
page read and write
21C2426C000
heap
page read and write
21C24250000
heap
page read and write
21C24277000
heap
page read and write
7FF79FA30000
unkown
page readonly
21C2427E000
heap
page read and write
21C2426B000
heap
page read and write
21C24211000
heap
page read and write
21C2427B000
heap
page read and write
21C2602B000
heap
page read and write
21C2426F000
heap
page read and write
21C24258000
heap
page read and write
21C2423A000
heap
page read and write
21C2426F000
heap
page read and write
21C2426A000
heap
page read and write
21C2426A000
heap
page read and write
21C26049000
heap
page read and write
21C24279000
heap
page read and write
21C2602B000
heap
page read and write
21C24234000
heap
page read and write
21C24237000
heap
page read and write
21C26042000
heap
page read and write
21C24246000
heap
page read and write
21C26037000
heap
page read and write
21C26046000
heap
page read and write
21C24211000
heap
page read and write
21C26029000
heap
page read and write
86F69FF000
stack
page read and write
21C2423A000
heap
page read and write
21C24242000
heap
page read and write
21C2426A000
heap
page read and write
21C2426C000
heap
page read and write
21C24250000
heap
page read and write
21C26035000
heap
page read and write
21C2426E000
heap
page read and write
21C2426A000
heap
page read and write
21C24248000
heap
page read and write
21C26038000
heap
page read and write
21C2422B000
heap
page read and write
21C2424A000
heap
page read and write
21C24231000
heap
page read and write
21C24214000
heap
page read and write
21C2426A000
heap
page read and write
21C24241000
heap
page read and write
21C24231000
heap
page read and write
21C24210000
heap
page read and write
21C24240000
heap
page read and write
21C2427D000
heap
page read and write
21C2426A000
heap
page read and write
21C2426D000
heap
page read and write
21C2602E000
heap
page read and write
21C24274000
heap
page read and write
21C2603A000
heap
page read and write
21C241BE000
heap
page read and write
21C2426A000
heap
page read and write
21C24231000
heap
page read and write
21C2426A000
heap
page read and write
21C2424A000
heap
page read and write
86F62FB000
stack
page read and write
21C24241000
heap
page read and write
21C24120000
heap
page read and write
21C24258000
heap
page read and write
21C24231000
heap
page read and write
21C24274000
heap
page read and write
21C26046000
heap
page read and write
21C2426A000
heap
page read and write
21C24274000
heap
page read and write
21C24233000
heap
page read and write
21C24248000
heap
page read and write
21C24273000
heap
page read and write
21C2423D000
heap
page read and write
21C25F70000
heap
page read and write
21C24215000
heap
page read and write
21C24272000
heap
page read and write
21C24237000
heap
page read and write
21C24214000
heap
page read and write
21C24231000
heap
page read and write
21C24237000
heap
page read and write
21C24276000
heap
page read and write
21C2426F000
heap
page read and write
21C2422B000
heap
page read and write
21C24237000
heap
page read and write
21C24160000
heap
page read and write
21C24250000
heap
page read and write
21C241F1000
heap
page read and write
21C26045000
heap
page read and write
7FF79FA57000
unkown
page write copy
21C2426B000
heap
page read and write
21C2426B000
heap
page read and write
21C2426B000
heap
page read and write
21C26030000
heap
page read and write
21C2426B000
heap
page read and write
21C241C6000
heap
page read and write
21C24258000
heap
page read and write
21C2424A000
heap
page read and write
21C24248000
heap
page read and write
21C241E9000
heap
page read and write
21C24237000
heap
page read and write
21C24238000
heap
page read and write
21C2426A000
heap
page read and write
21C2426A000
heap
page read and write
21C2418B000
heap
page read and write
21C24231000
heap
page read and write
21C24231000
heap
page read and write
21C2426F000
heap
page read and write
21C26046000
heap
page read and write
21C2427E000
heap
page read and write
21C26037000
heap
page read and write
21C2426B000
heap
page read and write
21C24225000
heap
page read and write
21C2426F000
heap
page read and write
21C24273000
heap
page read and write
21C25B95000
heap
page read and write
21C24278000
heap
page read and write
21C24214000
heap
page read and write
21C24242000
heap
page read and write
21C24210000
heap
page read and write
21C25B90000
heap
page read and write
21C24248000
heap
page read and write
21C24237000
heap
page read and write
21C24234000
heap
page read and write
21C24225000
heap
page read and write
21C24215000
heap
page read and write
21C2426A000
heap
page read and write
21C24237000
heap
page read and write
86F60FF000
stack
page read and write
7FF79FA4A000
unkown
page readonly
21C2423A000
heap
page read and write
21C26047000
heap
page read and write
21C2426A000
heap
page read and write
21C2422D000
heap
page read and write
21C24213000
heap
page read and write
7FF79FA31000
unkown
page execute read
21C24237000
heap
page read and write
21C241E1000
heap
page read and write
86F66FF000
stack
page read and write
21C24247000
heap
page read and write
21C2424A000
heap
page read and write
21C24276000
heap
page read and write
21C241B6000
heap
page read and write
21C241E9000
heap
page read and write
21C24258000
heap
page read and write
21C24237000
heap
page read and write
21C24238000
heap
page read and write
21C24276000
heap
page read and write
21C24242000
heap
page read and write
21C2603E000
heap
page read and write
21C24244000
heap
page read and write
21C2424E000
heap
page read and write
21C24232000
heap
page read and write
21C24272000
heap
page read and write
86F65FF000
stack
page read and write
21C2424A000
heap
page read and write
21C24243000
heap
page read and write
21C2426A000
heap
page read and write
21C26025000
heap
page read and write
21C2422E000
heap
page read and write
7FF79FA59000
unkown
page readonly
21C2426D000
heap
page read and write
21C24237000
heap
page read and write
86F5D64000
stack
page read and write
21C2602B000
heap
page read and write
21C24210000
heap
page read and write
21C2424A000
heap
page read and write
21C24225000
heap
page read and write
21C2424A000
heap
page read and write
21C26028000
heap
page read and write
21C24215000
heap
page read and write
21C24225000
heap
page read and write
21C24239000
heap
page read and write
86F5D8C000
stack
page read and write
21C2604B000
heap
page read and write
21C24211000
heap
page read and write
21C24277000
heap
page read and write
21C26029000
heap
page read and write
21C2422D000
heap
page read and write
21C2602C000
heap
page read and write
21C24272000
heap
page read and write
21C2426C000
heap
page read and write
21C24212000
heap
page read and write
21C24242000
heap
page read and write
21C24246000
heap
page read and write
21C26020000
heap
page read and write
86F61FE000
stack
page read and write
21C24231000
heap
page read and write
21C2426C000
heap
page read and write
21C2426A000
heap
page read and write
21C2422B000
heap
page read and write
21C2426A000
heap
page read and write
21C24258000
heap
page read and write
21C2602E000
heap
page read and write
21C2426A000
heap
page read and write
21C24272000
heap
page read and write
86F68FB000
stack
page read and write
21C2426B000
heap
page read and write
21C2424E000
heap
page read and write
21C241BE000
heap
page read and write
21C24248000
heap
page read and write
21C24273000
heap
page read and write
21C2426A000
heap
page read and write
21C24225000
heap
page read and write
21C2426E000
heap
page read and write
21C24180000
heap
page read and write
21C2427E000
heap
page read and write
21C24246000
heap
page read and write
7FF79FA30000
unkown
page readonly
21C24246000
heap
page read and write
7FF79FA59000
unkown
page readonly
21C2426A000
heap
page read and write
21C2426D000
heap
page read and write
21C2426A000
heap
page read and write
21C24258000
heap
page read and write
21C2426A000
heap
page read and write
21C24249000
heap
page read and write
21C241EB000
heap
page read and write
21C2426A000
heap
page read and write
21C26052000
heap
page read and write
21C2424A000
heap
page read and write
21C24258000
heap
page read and write
21C24238000
heap
page read and write
21C2426A000
heap
page read and write
21C24237000
heap
page read and write
21C24235000
heap
page read and write
21C2426A000
heap
page read and write
21C26049000
heap
page read and write
21C26041000
heap
page read and write
21C24231000
heap
page read and write
There are 341 hidden memdumps, click here to show them.