Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
Gy53Tq6BdK.exe
|
PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows
|
initial sample
|
||
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_Gy53Tq6BdK.exe_889e2fba9227189eadcce412837c98743734c3d_712c0000_4a3350ad-5789-46de-8efe-cfd0ca19d88c\Report.wer
|
Unicode text, UTF-16, little-endian text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WER68C3.tmp.dmp
|
Mini DuMP crash report, 15 streams, Mon Dec 23 06:25:25 2024, 0x1205a4 type
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WER6A4B.tmp.WERInternalMetadata.xml
|
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WER6A7B.tmp.xml
|
XML 1.0 document, ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Windows\appcompat\Programs\Amcache.hve
|
MS Windows registry file, NT/2000 or above
|
dropped
|
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\Gy53Tq6BdK.exe
|
"C:\Users\user\Desktop\Gy53Tq6BdK.exe"
|
||
C:\Windows\SysWOW64\WerFault.exe
|
C:\Windows\SysWOW64\WerFault.exe -u -p 2832 -s 1152
|
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
https://curl.se/docs/hsts.html
|
unknown
|
||
http://html4/loose.dtd
|
unknown
|
||
http://home.fivetk5ht.top/zldPR
|
unknown
|
||
http://home.fivetk5ht.top/zldPRFrmVFHTtKntGpOv1734579851http://home.fivetk5ht.top/zldPRFrmVFHTtKntGp
|
unknown
|
||
https://httpbin.org/ipbefore
|
unknown
|
||
https://curl.se/docs/http-cookies.html
|
unknown
|
||
http://home.fivetk5ht.top/zldPRFrmVFHTtKntGpOv173457985135a1
|
unknown
|
||
http://home.fivetk5ht.top/zldPRFrmVFHTtKntGpOv1734579851
|
unknown
|
||
http://home.fivetk5ht.top/zldPRFrmVFHTtKntGpOv17
|
unknown
|
||
http://upx.sf.net
|
unknown
|
||
https://curl.se/docs/alt-svc.html
|
unknown
|
||
http://.css
|
unknown
|
||
http://.jpg
|
unknown
|
||
https://httpbin.org/ip
|
34.226.108.155
|
||
http://home.fivetk5ht.top/zldPRFrmVFHTtKntGpOv1734579851PX
|
unknown
|
There are 5 hidden URLs, click here to show them.
Domains
Name
|
IP
|
Malicious
|
|
---|---|---|---|
httpbin.org
|
34.226.108.155
|
||
home.fivetk5ht.top
|
unknown
|
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
34.226.108.155
|
httpbin.org
|
United States
|
Registry
Path
|
Value
|
Malicious
|
|
---|---|---|---|
\REGISTRY\A\{427c9ee3-4ede-4f90-c75b-a9696bbe0199}\Root\InventoryApplicationFile\gy53tq6bdk.exe|cdfd2a59e7f399d
|
ProgramId
|
||
\REGISTRY\A\{427c9ee3-4ede-4f90-c75b-a9696bbe0199}\Root\InventoryApplicationFile\gy53tq6bdk.exe|cdfd2a59e7f399d
|
FileId
|
||
\REGISTRY\A\{427c9ee3-4ede-4f90-c75b-a9696bbe0199}\Root\InventoryApplicationFile\gy53tq6bdk.exe|cdfd2a59e7f399d
|
LowerCaseLongPath
|
||
\REGISTRY\A\{427c9ee3-4ede-4f90-c75b-a9696bbe0199}\Root\InventoryApplicationFile\gy53tq6bdk.exe|cdfd2a59e7f399d
|
LongPathHash
|
||
\REGISTRY\A\{427c9ee3-4ede-4f90-c75b-a9696bbe0199}\Root\InventoryApplicationFile\gy53tq6bdk.exe|cdfd2a59e7f399d
|
Name
|
||
\REGISTRY\A\{427c9ee3-4ede-4f90-c75b-a9696bbe0199}\Root\InventoryApplicationFile\gy53tq6bdk.exe|cdfd2a59e7f399d
|
OriginalFileName
|
||
\REGISTRY\A\{427c9ee3-4ede-4f90-c75b-a9696bbe0199}\Root\InventoryApplicationFile\gy53tq6bdk.exe|cdfd2a59e7f399d
|
Publisher
|
||
\REGISTRY\A\{427c9ee3-4ede-4f90-c75b-a9696bbe0199}\Root\InventoryApplicationFile\gy53tq6bdk.exe|cdfd2a59e7f399d
|
Version
|
||
\REGISTRY\A\{427c9ee3-4ede-4f90-c75b-a9696bbe0199}\Root\InventoryApplicationFile\gy53tq6bdk.exe|cdfd2a59e7f399d
|
BinFileVersion
|
||
\REGISTRY\A\{427c9ee3-4ede-4f90-c75b-a9696bbe0199}\Root\InventoryApplicationFile\gy53tq6bdk.exe|cdfd2a59e7f399d
|
BinaryType
|
||
\REGISTRY\A\{427c9ee3-4ede-4f90-c75b-a9696bbe0199}\Root\InventoryApplicationFile\gy53tq6bdk.exe|cdfd2a59e7f399d
|
ProductName
|
||
\REGISTRY\A\{427c9ee3-4ede-4f90-c75b-a9696bbe0199}\Root\InventoryApplicationFile\gy53tq6bdk.exe|cdfd2a59e7f399d
|
ProductVersion
|
||
\REGISTRY\A\{427c9ee3-4ede-4f90-c75b-a9696bbe0199}\Root\InventoryApplicationFile\gy53tq6bdk.exe|cdfd2a59e7f399d
|
LinkDate
|
||
\REGISTRY\A\{427c9ee3-4ede-4f90-c75b-a9696bbe0199}\Root\InventoryApplicationFile\gy53tq6bdk.exe|cdfd2a59e7f399d
|
BinProductVersion
|
||
\REGISTRY\A\{427c9ee3-4ede-4f90-c75b-a9696bbe0199}\Root\InventoryApplicationFile\gy53tq6bdk.exe|cdfd2a59e7f399d
|
AppxPackageFullName
|
||
\REGISTRY\A\{427c9ee3-4ede-4f90-c75b-a9696bbe0199}\Root\InventoryApplicationFile\gy53tq6bdk.exe|cdfd2a59e7f399d
|
AppxPackageRelativeId
|
||
\REGISTRY\A\{427c9ee3-4ede-4f90-c75b-a9696bbe0199}\Root\InventoryApplicationFile\gy53tq6bdk.exe|cdfd2a59e7f399d
|
Size
|
||
\REGISTRY\A\{427c9ee3-4ede-4f90-c75b-a9696bbe0199}\Root\InventoryApplicationFile\gy53tq6bdk.exe|cdfd2a59e7f399d
|
Language
|
||
\REGISTRY\A\{427c9ee3-4ede-4f90-c75b-a9696bbe0199}\Root\InventoryApplicationFile\gy53tq6bdk.exe|cdfd2a59e7f399d
|
Usn
|
There are 9 hidden registries, click here to show them.
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
681F000
|
stack
|
page read and write
|
||
6A61000
|
heap
|
page read and write
|
||
6A61000
|
heap
|
page read and write
|
||
6A61000
|
heap
|
page read and write
|
||
6A61000
|
heap
|
page read and write
|
||
6A61000
|
heap
|
page read and write
|
||
16F1000
|
heap
|
page read and write
|
||
430000
|
unkown
|
page read and write
|
||
6A61000
|
heap
|
page read and write
|
||
6A61000
|
heap
|
page read and write
|
||
71B0000
|
direct allocation
|
page execute and read and write
|
||
6A61000
|
heap
|
page read and write
|
||
6A61000
|
heap
|
page read and write
|
||
3D9F000
|
stack
|
page read and write
|
||
6A60000
|
heap
|
page read and write
|
||
6A61000
|
heap
|
page read and write
|
||
6A61000
|
heap
|
page read and write
|
||
6A61000
|
heap
|
page read and write
|
||
6A61000
|
heap
|
page read and write
|
||
3597000
|
heap
|
page read and write
|
||
6A61000
|
heap
|
page read and write
|
||
6A61000
|
heap
|
page read and write
|
||
6A61000
|
heap
|
page read and write
|
||
6A61000
|
heap
|
page read and write
|
||
6A61000
|
heap
|
page read and write
|
||
7180000
|
direct allocation
|
page execute and read and write
|
||
11C0000
|
heap
|
page read and write
|
||
7180000
|
direct allocation
|
page execute and read and write
|
||
6A61000
|
heap
|
page read and write
|
||
6A61000
|
heap
|
page read and write
|
||
6A61000
|
heap
|
page read and write
|
||
6A61000
|
heap
|
page read and write
|
||
7180000
|
direct allocation
|
page execute and read and write
|
||
6A61000
|
heap
|
page read and write
|
||
6A61000
|
heap
|
page read and write
|
||
4D5E000
|
stack
|
page read and write
|
||
6A61000
|
heap
|
page read and write
|
||
6A61000
|
heap
|
page read and write
|
||
6A61000
|
heap
|
page read and write
|
||
6A61000
|
heap
|
page read and write
|
||
6A61000
|
heap
|
page read and write
|
||
6A61000
|
heap
|
page read and write
|
||
6A61000
|
heap
|
page read and write
|
||
6A61000
|
heap
|
page read and write
|
||
7240000
|
direct allocation
|
page execute and read and write
|
||
6A61000
|
heap
|
page read and write
|
||
661E000
|
stack
|
page read and write
|
||
6A61000
|
heap
|
page read and write
|
||
6A61000
|
heap
|
page read and write
|
||
6A61000
|
heap
|
page read and write
|
||
6A61000
|
heap
|
page read and write
|
||
7230000
|
direct allocation
|
page execute and read and write
|
||
3580000
|
direct allocation
|
page read and write
|
||
16D7000
|
heap
|
page read and write
|
||
6A61000
|
heap
|
page read and write
|
||
519F000
|
stack
|
page read and write
|
||
6A61000
|
heap
|
page read and write
|
||
6A61000
|
heap
|
page read and write
|
||
6A61000
|
heap
|
page read and write
|
||
7180000
|
direct allocation
|
page execute and read and write
|
||
1790000
|
heap
|
page read and write
|
||
6A61000
|
heap
|
page read and write
|
||
4B1E000
|
stack
|
page read and write
|
||
441F000
|
stack
|
page read and write
|
||
7150000
|
direct allocation
|
page execute and read and write
|
||
6A61000
|
heap
|
page read and write
|
||
6A61000
|
heap
|
page read and write
|
||
3590000
|
heap
|
page read and write
|
||
7160000
|
direct allocation
|
page execute and read and write
|
||
53DF000
|
stack
|
page read and write
|
||
6A61000
|
heap
|
page read and write
|
||
7580000
|
heap
|
page read and write
|
||
6A61000
|
heap
|
page read and write
|
||
6A61000
|
heap
|
page read and write
|
||
6A61000
|
heap
|
page read and write
|
||
6A61000
|
heap
|
page read and write
|
||
7210000
|
direct allocation
|
page execute and read and write
|
||
6A61000
|
heap
|
page read and write
|
||
6A61000
|
heap
|
page read and write
|
||
431000
|
unkown
|
page execute and write copy
|
||
619E000
|
stack
|
page read and write
|
||
6A61000
|
heap
|
page read and write
|
||
6A61000
|
heap
|
page read and write
|
||
7640000
|
direct allocation
|
page read and write
|
||
4F9E000
|
stack
|
page read and write
|
||
6A61000
|
heap
|
page read and write
|
||
7568000
|
heap
|
page read and write
|
||
6A61000
|
heap
|
page read and write
|
||
6A61000
|
heap
|
page read and write
|
||
6A61000
|
heap
|
page read and write
|
||
6A61000
|
heap
|
page read and write
|
||
7180000
|
direct allocation
|
page execute and read and write
|
||
7280000
|
direct allocation
|
page execute and read and write
|
||
7180000
|
direct allocation
|
page execute and read and write
|
||
16E6000
|
heap
|
page read and write
|
||
6A61000
|
heap
|
page read and write
|
||
177E000
|
stack
|
page read and write
|
||
6A61000
|
heap
|
page read and write
|
||
6A61000
|
heap
|
page read and write
|
||
7180000
|
direct allocation
|
page execute and read and write
|
||
48DE000
|
stack
|
page read and write
|
||
6A61000
|
heap
|
page read and write
|
||
6A61000
|
heap
|
page read and write
|
||
7180000
|
direct allocation
|
page execute and read and write
|
||
71E0000
|
direct allocation
|
page execute and read and write
|
||
6A61000
|
heap
|
page read and write
|
||
6A61000
|
heap
|
page read and write
|
||
1698000
|
heap
|
page read and write
|
||
6A61000
|
heap
|
page read and write
|
||
41DF000
|
stack
|
page read and write
|
||
6A61000
|
heap
|
page read and write
|
||
7180000
|
direct allocation
|
page execute and read and write
|
||
6A61000
|
heap
|
page read and write
|
||
71C0000
|
direct allocation
|
page execute and read and write
|
||
6A61000
|
heap
|
page read and write
|
||
16C0000
|
heap
|
page read and write
|
||
7180000
|
direct allocation
|
page execute and read and write
|
||
6A61000
|
heap
|
page read and write
|
||
6A61000
|
heap
|
page read and write
|
||
6A61000
|
heap
|
page read and write
|
||
6A61000
|
heap
|
page read and write
|
||
6A61000
|
heap
|
page read and write
|
||
6A61000
|
heap
|
page read and write
|
||
16D8000
|
heap
|
page read and write
|
||
16E2000
|
heap
|
page read and write
|
||
6A61000
|
heap
|
page read and write
|
||
6A61000
|
heap
|
page read and write
|
||
16EE000
|
heap
|
page read and write
|
||
65DF000
|
stack
|
page read and write
|
||
6A61000
|
heap
|
page read and write
|
||
7270000
|
direct allocation
|
page execute and read and write
|
||
7180000
|
direct allocation
|
page execute and read and write
|
||
16E6000
|
heap
|
page read and write
|
||
6A61000
|
heap
|
page read and write
|
||
5F1F000
|
stack
|
page read and write
|
||
7180000
|
direct allocation
|
page execute and read and write
|
||
6A61000
|
heap
|
page read and write
|
||
3F9F000
|
stack
|
page read and write
|
||
6A61000
|
heap
|
page read and write
|
||
34DE000
|
stack
|
page read and write
|
||
6A61000
|
heap
|
page read and write
|
||
7312000
|
heap
|
page read and write
|
||
445E000
|
stack
|
page read and write
|
||
6A61000
|
heap
|
page read and write
|
||
3580000
|
direct allocation
|
page read and write
|
||
6A61000
|
heap
|
page read and write
|
||
6A61000
|
heap
|
page read and write
|
||
6A61000
|
heap
|
page read and write
|
||
6A61000
|
heap
|
page read and write
|
||
6A61000
|
heap
|
page read and write
|
||
16FC000
|
heap
|
page read and write
|
||
3580000
|
direct allocation
|
page read and write
|
||
6A61000
|
heap
|
page read and write
|
||
639F000
|
stack
|
page read and write
|
||
6A61000
|
heap
|
page read and write
|
||
6A61000
|
heap
|
page read and write
|
||
3580000
|
direct allocation
|
page read and write
|
||
6A61000
|
heap
|
page read and write
|
||
6A61000
|
heap
|
page read and write
|
||
6A61000
|
heap
|
page read and write
|
||
16E6000
|
heap
|
page read and write
|
||
6A61000
|
heap
|
page read and write
|
||
349C000
|
stack
|
page read and write
|
||
6A61000
|
heap
|
page read and write
|
||
7190000
|
direct allocation
|
page execute and read and write
|
||
6A61000
|
heap
|
page read and write
|
||
6A61000
|
heap
|
page read and write
|
||
589E000
|
stack
|
page read and write
|
||
75F3000
|
heap
|
page read and write
|
||
10B9000
|
unkown
|
page execute and read and write
|
||
15FB000
|
stack
|
page read and write
|
||
6A61000
|
heap
|
page read and write
|
||
7461000
|
heap
|
page read and write
|
||
6A61000
|
heap
|
page read and write
|
||
6A61000
|
heap
|
page read and write
|
||
6A61000
|
heap
|
page read and write
|
||
6A61000
|
heap
|
page read and write
|
||
3580000
|
direct allocation
|
page read and write
|
||
379F000
|
stack
|
page read and write
|
||
6A61000
|
heap
|
page read and write
|
||
6A61000
|
heap
|
page read and write
|
||
16E6000
|
heap
|
page read and write
|
||
6A61000
|
heap
|
page read and write
|
||
74DC000
|
direct allocation
|
page read and write
|
||
B71000
|
unkown
|
page execute and read and write
|
||
6A61000
|
heap
|
page read and write
|
||
6A61000
|
heap
|
page read and write
|
||
6A61000
|
heap
|
page read and write
|
||
6A61000
|
heap
|
page read and write
|
||
7291000
|
heap
|
page read and write
|
||
3560000
|
heap
|
page read and write
|
||
6A61000
|
heap
|
page read and write
|
||
6A61000
|
heap
|
page read and write
|
||
6A61000
|
heap
|
page read and write
|
||
6A61000
|
heap
|
page read and write
|
||
6EB0000
|
trusted library allocation
|
page read and write
|
||
6A61000
|
heap
|
page read and write
|
||
163E000
|
stack
|
page read and write
|
||
6A61000
|
heap
|
page read and write
|
||
6EB0000
|
trusted library allocation
|
page read and write
|
||
6A61000
|
heap
|
page read and write
|
||
7C97000
|
heap
|
page read and write
|
||
6A61000
|
heap
|
page read and write
|
||
6A61000
|
heap
|
page read and write
|
||
6A61000
|
heap
|
page read and write
|
||
6A61000
|
heap
|
page read and write
|
||
6A61000
|
heap
|
page read and write
|
||
6A61000
|
heap
|
page read and write
|
||
6A61000
|
heap
|
page read and write
|
||
3580000
|
direct allocation
|
page read and write
|
||
3580000
|
direct allocation
|
page read and write
|
||
63DE000
|
stack
|
page read and write
|
||
3580000
|
direct allocation
|
page read and write
|
||
6A61000
|
heap
|
page read and write
|
||
6A61000
|
heap
|
page read and write
|
||
6A61000
|
heap
|
page read and write
|
||
7180000
|
direct allocation
|
page execute and read and write
|
||
6A61000
|
heap
|
page read and write
|
||
6A61000
|
heap
|
page read and write
|
||
6A61000
|
heap
|
page read and write
|
||
6A61000
|
heap
|
page read and write
|
||
6A61000
|
heap
|
page read and write
|
||
1C7E000
|
stack
|
page read and write
|
||
16D6000
|
heap
|
page read and write
|
||
7290000
|
heap
|
page read and write
|
||
16E2000
|
heap
|
page read and write
|
||
6A61000
|
heap
|
page read and write
|
||
6A61000
|
heap
|
page read and write
|
||
6A61000
|
heap
|
page read and write
|
||
73D0000
|
heap
|
page read and write
|
||
6A61000
|
heap
|
page read and write
|
||
7180000
|
direct allocation
|
page execute and read and write
|
||
6A61000
|
heap
|
page read and write
|
||
7180000
|
direct allocation
|
page execute and read and write
|
||
6A61000
|
heap
|
page read and write
|
||
6A61000
|
heap
|
page read and write
|
||
3580000
|
direct allocation
|
page read and write
|
||
6A61000
|
heap
|
page read and write
|
||
6A61000
|
heap
|
page read and write
|
||
6A61000
|
heap
|
page read and write
|
||
6A61000
|
heap
|
page read and write
|
||
6A61000
|
heap
|
page read and write
|
||
7312000
|
heap
|
page read and write
|
||
469E000
|
stack
|
page read and write
|
||
6A61000
|
heap
|
page read and write
|
||
6A61000
|
heap
|
page read and write
|
||
3580000
|
direct allocation
|
page read and write
|
||
EE7000
|
unkown
|
page execute and read and write
|
||
6A61000
|
heap
|
page read and write
|
||
6A61000
|
heap
|
page read and write
|
||
6A61000
|
heap
|
page read and write
|
||
16F1000
|
heap
|
page read and write
|
||
6A61000
|
heap
|
page read and write
|
||
B73000
|
unkown
|
page execute and read and write
|
||
6A61000
|
heap
|
page read and write
|
||
6A61000
|
heap
|
page read and write
|
||
6A61000
|
heap
|
page read and write
|
||
6A61000
|
heap
|
page read and write
|
||
6A61000
|
heap
|
page read and write
|
||
6A61000
|
heap
|
page read and write
|
||
16D9000
|
heap
|
page read and write
|
||
7200000
|
direct allocation
|
page execute and read and write
|
||
6A61000
|
heap
|
page read and write
|
||
3FDE000
|
stack
|
page read and write
|
||
355E000
|
stack
|
page read and write
|
||
6EF0000
|
direct allocation
|
page read and write
|
||
6A61000
|
heap
|
page read and write
|
||
F00000
|
unkown
|
page execute and write copy
|
||
6A61000
|
heap
|
page read and write
|
||
6A61000
|
heap
|
page read and write
|
||
6A61000
|
heap
|
page read and write
|
||
7566000
|
heap
|
page read and write
|
||
7180000
|
direct allocation
|
page execute and read and write
|
||
4ADF000
|
stack
|
page read and write
|
||
EFF000
|
unkown
|
page execute and write copy
|
||
7180000
|
direct allocation
|
page execute and read and write
|
||
6A61000
|
heap
|
page read and write
|
||
6A61000
|
heap
|
page read and write
|
||
6A61000
|
heap
|
page read and write
|
||
51DE000
|
stack
|
page read and write
|
||
6A61000
|
heap
|
page read and write
|
||
6A61000
|
heap
|
page read and write
|
||
6A61000
|
heap
|
page read and write
|
||
6A61000
|
heap
|
page read and write
|
||
6A61000
|
heap
|
page read and write
|
||
6EF0000
|
direct allocation
|
page read and write
|
||
6A61000
|
heap
|
page read and write
|
||
6A61000
|
heap
|
page read and write
|
||
16C0000
|
heap
|
page read and write
|
||
6A61000
|
heap
|
page read and write
|
||
6A61000
|
heap
|
page read and write
|
||
6A61000
|
heap
|
page read and write
|
||
7180000
|
direct allocation
|
page execute and read and write
|
||
6A61000
|
heap
|
page read and write
|
||
6A61000
|
heap
|
page read and write
|
||
6A61000
|
heap
|
page read and write
|
||
6A61000
|
heap
|
page read and write
|
||
6A61000
|
heap
|
page read and write
|
||
6A61000
|
heap
|
page read and write
|
||
3580000
|
direct allocation
|
page read and write
|
||
16E2000
|
heap
|
page read and write
|
||
1682000
|
heap
|
page read and write
|
||
6A61000
|
heap
|
page read and write
|
||
6A61000
|
heap
|
page read and write
|
||
6A61000
|
heap
|
page read and write
|
||
6A61000
|
heap
|
page read and write
|
||
6A61000
|
heap
|
page read and write
|
||
6A61000
|
heap
|
page read and write
|
||
6A61000
|
heap
|
page read and write
|
||
6A61000
|
heap
|
page read and write
|
||
6A61000
|
heap
|
page read and write
|
||
17A5000
|
heap
|
page read and write
|
||
114B000
|
stack
|
page read and write
|
||
7180000
|
direct allocation
|
page execute and read and write
|
||
6A61000
|
heap
|
page read and write
|
||
16E6000
|
heap
|
page read and write
|
||
5A9F000
|
stack
|
page read and write
|
||
1A7F000
|
stack
|
page read and write
|
||
164E000
|
heap
|
page read and write
|
||
6A61000
|
heap
|
page read and write
|
||
6A61000
|
heap
|
page read and write
|
||
6A61000
|
heap
|
page read and write
|
||
6A61000
|
heap
|
page read and write
|
||
6A61000
|
heap
|
page read and write
|
||
6A61000
|
heap
|
page read and write
|
||
6A61000
|
heap
|
page read and write
|
||
6A61000
|
heap
|
page read and write
|
||
6A61000
|
heap
|
page read and write
|
||
3B9F000
|
stack
|
page read and write
|
||
6A61000
|
heap
|
page read and write
|
||
7180000
|
direct allocation
|
page execute and read and write
|
||
6A61000
|
heap
|
page read and write
|
||
CF8000
|
unkown
|
page execute and read and write
|
||
5D1E000
|
stack
|
page read and write
|
||
6A61000
|
heap
|
page read and write
|
||
6A61000
|
heap
|
page read and write
|
||
7180000
|
direct allocation
|
page execute and read and write
|
||
6A61000
|
heap
|
page read and write
|
||
164A000
|
heap
|
page read and write
|
||
6EF0000
|
direct allocation
|
page read and write
|
||
6A61000
|
heap
|
page read and write
|
||
3580000
|
direct allocation
|
page read and write
|
||
16F5000
|
heap
|
page read and write
|
||
685E000
|
stack
|
page read and write
|
||
565E000
|
stack
|
page read and write
|
||
6A61000
|
heap
|
page read and write
|
||
6A61000
|
heap
|
page read and write
|
||
6A61000
|
heap
|
page read and write
|
||
431000
|
unkown
|
page execute and read and write
|
||
758A000
|
heap
|
page read and write
|
||
6A61000
|
heap
|
page read and write
|
||
541E000
|
stack
|
page read and write
|
||
6A61000
|
heap
|
page read and write
|
||
EF1000
|
unkown
|
page execute and read and write
|
||
345E000
|
stack
|
page read and write
|
||
6A61000
|
heap
|
page read and write
|
||
6A61000
|
heap
|
page read and write
|
||
6A61000
|
heap
|
page read and write
|
||
6A61000
|
heap
|
page read and write
|
||
6A61000
|
heap
|
page read and write
|
||
6A61000
|
heap
|
page read and write
|
||
6A61000
|
heap
|
page read and write
|
||
7311000
|
heap
|
page read and write
|
||
7460000
|
heap
|
page read and write
|
||
6A61000
|
heap
|
page read and write
|
||
6A61000
|
heap
|
page read and write
|
||
713F000
|
stack
|
page read and write
|
||
6A61000
|
heap
|
page read and write
|
||
6A61000
|
heap
|
page read and write
|
||
6A61000
|
heap
|
page read and write
|
||
6A61000
|
heap
|
page read and write
|
||
74E6000
|
direct allocation
|
page read and write
|
||
71A0000
|
direct allocation
|
page execute and read and write
|
||
6A61000
|
heap
|
page read and write
|
||
6A61000
|
heap
|
page read and write
|
||
3580000
|
direct allocation
|
page read and write
|
||
6A61000
|
heap
|
page read and write
|
||
6A61000
|
heap
|
page read and write
|
||
16D8000
|
heap
|
page read and write
|
||
6A61000
|
heap
|
page read and write
|
||
6A61000
|
heap
|
page read and write
|
||
6A61000
|
heap
|
page read and write
|
||
399F000
|
stack
|
page read and write
|
||
6A61000
|
heap
|
page read and write
|
||
7291000
|
heap
|
page read and write
|
||
6A61000
|
heap
|
page read and write
|
||
EFF000
|
unkown
|
page execute and read and write
|
||
6A61000
|
heap
|
page read and write
|
||
6A61000
|
heap
|
page read and write
|
||
6A61000
|
heap
|
page read and write
|
||
6A61000
|
heap
|
page read and write
|
||
6A61000
|
heap
|
page read and write
|
||
6F3C000
|
stack
|
page read and write
|
||
6A61000
|
heap
|
page read and write
|
||
6A61000
|
heap
|
page read and write
|
||
561F000
|
stack
|
page read and write
|
||
6A61000
|
heap
|
page read and write
|
||
6A61000
|
heap
|
page read and write
|
||
6A61000
|
heap
|
page read and write
|
||
6A61000
|
heap
|
page read and write
|
||
6A61000
|
heap
|
page read and write
|
||
6A61000
|
heap
|
page read and write
|
||
6A61000
|
heap
|
page read and write
|
||
10BB000
|
unkown
|
page execute and write copy
|
||
465F000
|
stack
|
page read and write
|
||
6A61000
|
heap
|
page read and write
|
||
6A61000
|
heap
|
page read and write
|
||
6A61000
|
heap
|
page read and write
|
||
489F000
|
stack
|
page read and write
|
||
6A61000
|
heap
|
page read and write
|
||
351E000
|
stack
|
page read and write
|
||
6A61000
|
heap
|
page read and write
|
||
6A61000
|
heap
|
page read and write
|
||
6A61000
|
heap
|
page read and write
|
||
6A61000
|
heap
|
page read and write
|
||
7642000
|
direct allocation
|
page read and write
|
||
6A61000
|
heap
|
page read and write
|
||
6A61000
|
heap
|
page read and write
|
||
E12000
|
unkown
|
page execute and read and write
|
||
6A61000
|
heap
|
page read and write
|
||
7170000
|
direct allocation
|
page execute and read and write
|
||
585F000
|
stack
|
page read and write
|
||
11B0000
|
heap
|
page read and write
|
||
6A61000
|
heap
|
page read and write
|
||
6A61000
|
heap
|
page read and write
|
||
7260000
|
direct allocation
|
page execute and read and write
|
||
6A61000
|
heap
|
page read and write
|
||
6A61000
|
heap
|
page read and write
|
||
7180000
|
direct allocation
|
page execute and read and write
|
||
6A61000
|
heap
|
page read and write
|
||
6A61000
|
heap
|
page read and write
|
||
615F000
|
stack
|
page read and write
|
||
6A61000
|
heap
|
page read and write
|
||
6A61000
|
heap
|
page read and write
|
||
6A61000
|
heap
|
page read and write
|
||
E07000
|
unkown
|
page execute and read and write
|
||
71D0000
|
direct allocation
|
page execute and read and write
|
||
B78000
|
unkown
|
page execute and read and write
|
||
A0D000
|
unkown
|
page execute and read and write
|
||
6A61000
|
heap
|
page read and write
|
||
B76000
|
unkown
|
page read and write
|
||
7180000
|
direct allocation
|
page execute and read and write
|
||
6A5F000
|
stack
|
page read and write
|
||
7250000
|
direct allocation
|
page execute and read and write
|
||
6A61000
|
heap
|
page read and write
|
||
6A61000
|
heap
|
page read and write
|
||
6A61000
|
heap
|
page read and write
|
||
6A61000
|
heap
|
page read and write
|
||
6A61000
|
heap
|
page read and write
|
||
6A61000
|
heap
|
page read and write
|
||
6A61000
|
heap
|
page read and write
|
||
7470000
|
heap
|
page read and write
|
||
4D1F000
|
stack
|
page read and write
|
||
6A61000
|
heap
|
page read and write
|
||
5CDF000
|
stack
|
page read and write
|
||
6A61000
|
heap
|
page read and write
|
||
6A61000
|
heap
|
page read and write
|
||
6A61000
|
heap
|
page read and write
|
||
7220000
|
direct allocation
|
page execute and read and write
|
||
6A61000
|
heap
|
page read and write
|
||
6A61000
|
heap
|
page read and write
|
||
6A61000
|
heap
|
page read and write
|
||
5F5E000
|
stack
|
page read and write
|
||
72B2000
|
heap
|
page read and write
|
||
1640000
|
heap
|
page read and write
|
||
4F5F000
|
stack
|
page read and write
|
||
6A61000
|
heap
|
page read and write
|
||
6A61000
|
heap
|
page read and write
|
||
6A61000
|
heap
|
page read and write
|
||
5ADE000
|
stack
|
page read and write
|
||
17A0000
|
heap
|
page read and write
|
||
430000
|
unkown
|
page readonly
|
||
6A61000
|
heap
|
page read and write
|
||
6EB0000
|
trusted library allocation
|
page read and write
|
||
3580000
|
direct allocation
|
page read and write
|
||
6A61000
|
heap
|
page read and write
|
||
B76000
|
unkown
|
page write copy
|
||
6A61000
|
heap
|
page read and write
|
||
7180000
|
direct allocation
|
page execute and read and write
|
||
6EA0000
|
trusted library allocation
|
page read and write
|
||
6A61000
|
heap
|
page read and write
|
||
6A61000
|
heap
|
page read and write
|
||
6A61000
|
heap
|
page read and write
|
||
71F0000
|
direct allocation
|
page execute and read and write
|
||
16E2000
|
heap
|
page read and write
|
||
6A61000
|
heap
|
page read and write
|
||
6A61000
|
heap
|
page read and write
|
||
6A61000
|
heap
|
page read and write
|
||
6A61000
|
heap
|
page read and write
|
||
6F00000
|
direct allocation
|
page read and write
|
||
421E000
|
stack
|
page read and write
|
||
6A61000
|
heap
|
page read and write
|
There are 482 hidden memdumps, click here to show them.