Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
Loader.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
initial sample
|
||
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_Loader.exe_77471525334c8b14c8bdc1925498d9a2270c332_00a9e466_1e40f4b4-72b8-488c-93ed-b9672588f9e0\Report.wer
|
data
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_Loader.exe_b815356964293c838cede0c4a3c92463e86ea911_00a9e466_32e7d15c-7355-41ce-b09f-98a33d50d914\Report.wer
|
data
|
modified
|
||
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_Loader.exe_cb31ed643f3fc60e893b10d5662d7ffd15dc47_d9249e67_e58a3cdf-0c76-4fca-bfea-a73be3584e5f\Report.wer
|
Unicode text, UTF-16, little-endian text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WER1D9.tmp.dmp
|
Mini DuMP crash report, 15 streams, Sat Oct 12 20:36:15 2024, 0x1205a4 type
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WER3AF.tmp.WERInternalMetadata.xml
|
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WER3DF.tmp.xml
|
XML 1.0 document, ASCII text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WERCD7B.tmp.dmp
|
Mini DuMP crash report, 14 streams, Sat Oct 12 20:36:01 2024, 0x1205a4 type
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WERCDE9.tmp.WERInternalMetadata.xml
|
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WERCE19.tmp.xml
|
XML 1.0 document, ASCII text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WERF8FF.tmp.dmp
|
Mini DuMP crash report, 15 streams, Sat Oct 12 20:36:12 2024, 0x1205a4 type
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WERFA48.tmp.WERInternalMetadata.xml
|
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WERFA78.tmp.xml
|
XML 1.0 document, ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Windows\appcompat\Programs\Amcache.hve
|
MS Windows registry file, NT/2000 or above
|
dropped
|
There are 4 hidden files, click here to show them.
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\Loader.exe
|
"C:\Users\user\Desktop\Loader.exe"
|
||
C:\Users\user\Desktop\Loader.exe
|
"C:\Users\user\Desktop\Loader.exe"
|
||
C:\Users\user\Desktop\Loader.exe
|
"C:\Users\user\Desktop\Loader.exe"
|
||
C:\Windows\SysWOW64\WerFault.exe
|
C:\Windows\SysWOW64\WerFault.exe -u -p 7096 -s 284
|
||
C:\Windows\SysWOW64\WerFault.exe
|
C:\Windows\SysWOW64\WerFault.exe -u -p 5200 -s 1884
|
||
C:\Windows\SysWOW64\WerFault.exe
|
C:\Windows\SysWOW64\WerFault.exe -u -p 5200 -s 1904
|
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
enlargkiw.sbs
|
|||
allocatinow.sbs
|
|||
drawwyobstacw.sbs
|
|||
https://widdensmoywi.sbs/api
|
104.21.8.37
|
||
mathcucom.sbs
|
|||
https://steamcommunity.com/profiles/76561199724331900
|
104.102.49.254
|
||
https://vennurviot.sbs/api
|
172.67.140.193
|
||
https://steamcommunity.com/profiles/76561199724331900/inventory/
|
unknown
|
||
ehticsprocw.sbs
|
|||
condifendteu.sbs
|
|||
https://drawwyobstacw.sbs/api
|
188.114.96.3
|
||
widdensmoywi.sbs
|
|||
https://resinedyw.sbs/api
|
172.67.205.156
|
||
https://mathcucom.sbs/api
|
188.114.96.3
|
||
resinedyw.sbs
|
|||
vennurviot.sbs
|
|||
https://condifendteu.sbs/api
|
104.21.79.35
|
||
https://enlargkiw.sbs/api
|
104.21.33.249
|
||
https://sergei-esenin.com/api
|
172.67.206.204
|
||
https://ehticsprocw.sbs/api
|
172.67.173.224
|
||
https://steamcommunity.com/profiles/76561199724331900/badges
|
unknown
|
||
https://www.cloudflare.com/learning/access-management/phishing-attack/
|
unknown
|
||
https://community.akamai.steamstatic.com/public/shared/javascript/auth_refresh.js?v=WgUxSlKTb3W1&
|
unknown
|
||
https://steamcommunity.com/?subsection=broadcasts
|
unknown
|
||
https://sergei-esenin.com/
|
unknown
|
||
https://store.steampowered.com/subscriber_agreement/
|
unknown
|
||
https://community.akamai.steamstatic.com/public/javascript/applications/community/libraries~b28b7af6
|
unknown
|
||
https://resinedyw.sbs/v
|
unknown
|
||
http://www.valvesoftware.com/legal.htm
|
unknown
|
||
https://community.akamai.steamstatic.com/public/css/promo/summer2017/stickers.css?v=HA2Yr5oy3FFG&
|
unknown
|
||
https://community.akamai.steamstatic.com/public/shared/images/responsive/logo_valve_footer.png
|
unknown
|
||
https://community.akamai.steamstatic.com/public/shared/images/responsive/header_menu_hamburger.png
|
unknown
|
||
https://community.akamai.steamstatic.com/public/shared/css/shared_responsive.css?v=sHIIcMzCffX6&
|
unknown
|
||
https://www.valvesoftware.com/en/contact?contact-person=Translation%20Team%20Feedback
|
unknown
|
||
https://resinedyw.sbs/1w#U
|
unknown
|
||
https://community.akamai.steamstatic.com/public/javascript/scriptaculous/_combined.js?v=OeNIgrpEF8tL
|
unknown
|
||
https://allocatinow.sbs/piP
|
unknown
|
||
https://community.akamai.steamstatic.com/public/javascript/applications/community/manifest.js?v=hgPi
|
unknown
|
||
https://community.akamai.steamstatic.com/public/css/skin_1/header.css?v=NFoCa4OkAxRb&l=english
|
unknown
|
||
https://enlargkiw.sbs/apibs-
|
unknown
|
||
http://store.steampowered.com/privacy_agreement/
|
unknown
|
||
https://store.steampowered.com/points/shop/
|
unknown
|
||
https://enlargkiw.sbs/
|
unknown
|
||
https://avatars.akamai.steamstatic.com/fef49e7fa7e1997310d705b2a6158ff8dc1cdfeb_full.jpg
|
unknown
|
||
https://store.steampowered.com/privacy_agreement/
|
unknown
|
||
https://www.cloudflare.com/5xx-error-landing
|
unknown
|
||
https://community.akamai.steamstatic.com/public/shared/css/shared_global.css?v=ezWS9te9Zwm9&l=en
|
unknown
|
||
https://community.akamai.steamstatic.com/public/shared/javascript/tooltip.js?v=.zYHOpI1L3Rt0
|
unknown
|
||
https://community.akamai.steamstatic.com/public/css/applications/community/main.css?v=2Ih2WOq7ErXY&a
|
unknown
|
||
https://mathcucom.sbs/
|
unknown
|
||
https://community.akamai.steamstatic.com/public/shared/javascript/shared_global.js?v=REEGJU1hwkYl&am
|
unknown
|
||
https://community.akamai.steamstatic.com/public/css/globalv2.css?v=PAcV2zMBzzSV&l=english
|
unknown
|
||
https://community.akamai.steamstatic.com/public/javascript/modalv2.js?v=dfMhuy-Lrpyo&l=english
|
unknown
|
||
https://community.akamai.steamstatic.com/public/shared/images/responsive/header_logo.png
|
unknown
|
||
https://avatars.akamai.steamstatic
|
unknown
|
||
https://community.akamai.steamstatic.com/public/css/skin_1/profilev2.css?v=M_qL4gO2sKII&l=englis
|
unknown
|
||
https://community.akamai.steamstatic.com/public/javascript/jquery-1.11.1.min.js?v=.isFTSRckeNhC
|
unknown
|
||
https://store.steampowered.com/about/
|
unknown
|
||
https://steamcommunity.com/my/wishlist/
|
unknown
|
||
https://community.akamai.steamstatic.com/public/javascript/global.js?v=9OzcxMXbaV84&l=english
|
unknown
|
||
https://enlargkiw.sbs/api%U
|
unknown
|
||
https://enlargkiw.sbs/1w#U
|
unknown
|
||
https://help.steampowered.com/en/
|
unknown
|
||
https://steamcommunity.com/market/
|
unknown
|
||
https://store.steampowered.com/news/
|
unknown
|
||
http://store.steampowered.com/subscriber_agreement/
|
unknown
|
||
https://allocatinow.sbs/api
|
unknown
|
||
https://steamcommunity.com/linkfilter/?u=http%3A%2F%2Fwww.geonames.org
|
unknown
|
||
https://community.akamai.steamstatic.com/public/css/skin_1/modalContent.css?v=.VpiwkLAYt9r1
|
unknown
|
||
https://community.akamai.steamstatic.com/public/javascript/promo/stickers.js?v=upl9NJ5D2xkP&l=en
|
unknown
|
||
https://steamcommunity.com/discussions/
|
unknown
|
||
https://store.steampowered.com/stats/
|
unknown
|
||
https://community.akamai.steamstatic.com/public/images/skin_1/footerLogo_valve.png?v=1
|
unknown
|
||
https://store.steampowered.com/steam_refunds/
|
unknown
|
||
https://resinedyw.sbs/
|
unknown
|
||
https://steamcommunity.com/login/home/?goto=profiles%2F76561199724331900
|
unknown
|
||
https://community.akamai.steamstatic.com/public/javascript/webui/clientcom.js?v=jGtzAgjYROne&l=e
|
unknown
|
||
https://resinedyw.sbs/api%U
|
unknown
|
||
https://resinedyw.sbs/api(
|
unknown
|
||
https://steamcommunity.com/workshop/
|
unknown
|
||
https://mathcucom.sbs/api4
|
unknown
|
||
https://store.steampowered.com/legal/
|
unknown
|
||
https://community.akamai.steamstatic.com/public/javascript/reportedcontent.js?v=dAtjbcZMWhSe&l=e
|
unknown
|
||
https://community.akamai.steamstatic.com/public/shared/javascript/shared_responsive_adapter.js?v=pSv
|
unknown
|
||
https://community.akamai.steamstatic.com/public/shared/css/motiva_sans.css?v=-DH0xTYpnVe2&l=engl
|
unknown
|
||
https://allocatinow.sbs/apis
|
unknown
|
||
http://upx.sf.net
|
unknown
|
||
https://store.steampowered.com/
|
unknown
|
||
https://community.akamai.steamstatic.com/public/javascript/prototype-1.7.js?v=.55t44gwuwgvw
|
unknown
|
||
https://community.akamai.steamstatic.com/public/images/skin_1/arrowDn9x5.gif
|
unknown
|
||
https://allocatinow.sbs/
|
unknown
|
||
https://community.akamai.steamstatic.com/public/shared/images/header/logo_steam.svg?t=962016
|
unknown
|
||
https://community.akamai.steamstatic.com/public/javascript/applications/community/main.js?v=bz0kMfQA
|
unknown
|
||
https://community.akamai.steamstatic.com/public/shared/css/buttons.css?v=PUJIfhtcQn7W&l=english
|
unknown
|
||
http://store.steampowered.com/account/cookiepreferences/
|
unknown
|
||
https://store.steampowered.com/mobile
|
unknown
|
||
https://steamcommunity.com/
|
unknown
|
||
https://community.akamai.steamstatic.com/public/javascript/profile.js?v=f3vWO7swdDqp&l=english
|
unknown
|
||
https://resinedyw.sbs:443/apii
|
unknown
|
||
https://community.akamai.steamstatic.com/public/javascript/modalContent.js?v=f2hMA1v9Zkc8&l=engl
|
unknown
|
There are 90 hidden URLs, click here to show them.
Domains
Name
|
IP
|
Malicious
|
|
---|---|---|---|
condifendteu.sbs
|
104.21.79.35
|
||
steamcommunity.com
|
104.102.49.254
|
||
vennurviot.sbs
|
172.67.140.193
|
||
drawwyobstacw.sbs
|
188.114.96.3
|
||
mathcucom.sbs
|
188.114.96.3
|
||
widdensmoywi.sbs
|
104.21.8.37
|
||
sergei-esenin.com
|
172.67.206.204
|
||
ehticsprocw.sbs
|
172.67.173.224
|
||
resinedyw.sbs
|
172.67.205.156
|
||
enlargkiw.sbs
|
104.21.33.249
|
||
allocatinow.sbs
|
unknown
|
There are 1 hidden domains, click here to show them.
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
104.21.33.249
|
enlargkiw.sbs
|
United States
|
||
172.67.173.224
|
ehticsprocw.sbs
|
United States
|
||
188.114.96.3
|
drawwyobstacw.sbs
|
European Union
|
||
104.102.49.254
|
steamcommunity.com
|
United States
|
||
172.67.205.156
|
resinedyw.sbs
|
United States
|
||
172.67.140.193
|
vennurviot.sbs
|
United States
|
||
104.21.79.35
|
condifendteu.sbs
|
United States
|
||
104.21.8.37
|
widdensmoywi.sbs
|
United States
|
||
172.67.206.204
|
sergei-esenin.com
|
United States
|
Registry
Path
|
Value
|
Malicious
|
|
---|---|---|---|
\REGISTRY\A\{0e17818a-bf42-b7e5-8785-9695d29de973}\Root\InventoryApplicationFile\loader.exe|c922d00103a5d957
|
ProgramId
|
||
\REGISTRY\A\{0e17818a-bf42-b7e5-8785-9695d29de973}\Root\InventoryApplicationFile\loader.exe|c922d00103a5d957
|
FileId
|
||
\REGISTRY\A\{0e17818a-bf42-b7e5-8785-9695d29de973}\Root\InventoryApplicationFile\loader.exe|c922d00103a5d957
|
LowerCaseLongPath
|
||
\REGISTRY\A\{0e17818a-bf42-b7e5-8785-9695d29de973}\Root\InventoryApplicationFile\loader.exe|c922d00103a5d957
|
LongPathHash
|
||
\REGISTRY\A\{0e17818a-bf42-b7e5-8785-9695d29de973}\Root\InventoryApplicationFile\loader.exe|c922d00103a5d957
|
Name
|
||
\REGISTRY\A\{0e17818a-bf42-b7e5-8785-9695d29de973}\Root\InventoryApplicationFile\loader.exe|c922d00103a5d957
|
OriginalFileName
|
||
\REGISTRY\A\{0e17818a-bf42-b7e5-8785-9695d29de973}\Root\InventoryApplicationFile\loader.exe|c922d00103a5d957
|
Publisher
|
||
\REGISTRY\A\{0e17818a-bf42-b7e5-8785-9695d29de973}\Root\InventoryApplicationFile\loader.exe|c922d00103a5d957
|
Version
|
||
\REGISTRY\A\{0e17818a-bf42-b7e5-8785-9695d29de973}\Root\InventoryApplicationFile\loader.exe|c922d00103a5d957
|
BinFileVersion
|
||
\REGISTRY\A\{0e17818a-bf42-b7e5-8785-9695d29de973}\Root\InventoryApplicationFile\loader.exe|c922d00103a5d957
|
BinaryType
|
||
\REGISTRY\A\{0e17818a-bf42-b7e5-8785-9695d29de973}\Root\InventoryApplicationFile\loader.exe|c922d00103a5d957
|
ProductName
|
||
\REGISTRY\A\{0e17818a-bf42-b7e5-8785-9695d29de973}\Root\InventoryApplicationFile\loader.exe|c922d00103a5d957
|
ProductVersion
|
||
\REGISTRY\A\{0e17818a-bf42-b7e5-8785-9695d29de973}\Root\InventoryApplicationFile\loader.exe|c922d00103a5d957
|
LinkDate
|
||
\REGISTRY\A\{0e17818a-bf42-b7e5-8785-9695d29de973}\Root\InventoryApplicationFile\loader.exe|c922d00103a5d957
|
BinProductVersion
|
||
\REGISTRY\A\{0e17818a-bf42-b7e5-8785-9695d29de973}\Root\InventoryApplicationFile\loader.exe|c922d00103a5d957
|
AppxPackageFullName
|
||
\REGISTRY\A\{0e17818a-bf42-b7e5-8785-9695d29de973}\Root\InventoryApplicationFile\loader.exe|c922d00103a5d957
|
AppxPackageRelativeId
|
||
\REGISTRY\A\{0e17818a-bf42-b7e5-8785-9695d29de973}\Root\InventoryApplicationFile\loader.exe|c922d00103a5d957
|
Size
|
||
\REGISTRY\A\{0e17818a-bf42-b7e5-8785-9695d29de973}\Root\InventoryApplicationFile\loader.exe|c922d00103a5d957
|
Language
|
||
\REGISTRY\A\{0e17818a-bf42-b7e5-8785-9695d29de973}\Root\InventoryApplicationFile\loader.exe|c922d00103a5d957
|
Usn
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\IdentityCRL\Immersive\production\Token\{67082621-8D18-4333-9C64-10DE93676363}
|
DeviceTicket
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\IdentityCRL\Immersive\production\Token\{67082621-8D18-4333-9C64-10DE93676363}
|
DeviceId
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\IdentityCRL\Immersive\production\Token\{67082621-8D18-4333-9C64-10DE93676363}
|
ApplicationFlags
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\IdentityCRL\Immersive\production\Property
|
0018000DDABBE6B3
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\IdentityCRL\ClockData
|
ClockTimeSeconds
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\IdentityCRL\ClockData
|
TickCount
|
There are 15 hidden registries, click here to show them.
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
400000
|
remote allocation
|
page execute and read and write
|
||
CBE000
|
stack
|
page read and write
|
||
215000
|
unkown
|
page read and write
|
||
D27000
|
heap
|
page read and write
|
||
D99000
|
heap
|
page read and write
|
||
D3F000
|
stack
|
page read and write
|
||
2ABE000
|
stack
|
page read and write
|
||
191000
|
unkown
|
page execute read
|
||
D43000
|
heap
|
page read and write
|
||
305F000
|
stack
|
page read and write
|
||
191000
|
unkown
|
page execute read
|
||
26AE000
|
trusted library allocation
|
page read and write
|
||
D1C000
|
heap
|
page read and write
|
||
C7F000
|
stack
|
page read and write
|
||
DB0000
|
heap
|
page read and write
|
||
D46000
|
heap
|
page read and write
|
||
2730000
|
heap
|
page read and write
|
||
D2D000
|
heap
|
page read and write
|
||
309D000
|
stack
|
page read and write
|
||
1BE000
|
unkown
|
page write copy
|
||
DA6000
|
heap
|
page read and write
|
||
D9E000
|
heap
|
page read and write
|
||
190000
|
unkown
|
page readonly
|
||
1BE000
|
unkown
|
page write copy
|
||
D9E000
|
heap
|
page read and write
|
||
D46000
|
heap
|
page read and write
|
||
B75000
|
heap
|
page read and write
|
||
D00000
|
heap
|
page read and write
|
||
D6E000
|
heap
|
page read and write
|
||
CC0000
|
heap
|
page read and write
|
||
190000
|
unkown
|
page readonly
|
||
B50000
|
heap
|
page read and write
|
||
216000
|
unkown
|
page readonly
|
||
D91000
|
heap
|
page read and write
|
||
7D0000
|
heap
|
page read and write
|
||
B60000
|
heap
|
page read and write
|
||
31B0000
|
trusted library allocation
|
page read and write
|
||
2720000
|
remote allocation
|
page read and write
|
||
A30000
|
heap
|
page read and write
|
||
2A7D000
|
stack
|
page read and write
|
||
D4F000
|
heap
|
page read and write
|
||
6DB000
|
stack
|
page read and write
|
||
D6A000
|
heap
|
page read and write
|
||
297D000
|
stack
|
page read and write
|
||
D43000
|
heap
|
page read and write
|
||
3430000
|
heap
|
page read and write
|
||
2BBF000
|
stack
|
page read and write
|
||
1B3000
|
unkown
|
page readonly
|
||
DB0000
|
heap
|
page read and write
|
||
216000
|
unkown
|
page readonly
|
||
E9E000
|
stack
|
page read and write
|
||
F9F000
|
stack
|
page read and write
|
||
190000
|
unkown
|
page readonly
|
||
191000
|
unkown
|
page execute read
|
||
D2D000
|
heap
|
page read and write
|
||
D07000
|
heap
|
page read and write
|
||
B4E000
|
stack
|
page read and write
|
||
1B3000
|
unkown
|
page readonly
|
||
1B3000
|
unkown
|
page readonly
|
||
191000
|
unkown
|
page execute read
|
||
1BE000
|
unkown
|
page write copy
|
||
DA6000
|
heap
|
page read and write
|
||
1BE000
|
unkown
|
page write copy
|
||
271E000
|
stack
|
page read and write
|
||
7DB000
|
stack
|
page read and write
|
||
DE9000
|
heap
|
page read and write
|
||
D43000
|
heap
|
page read and write
|
||
319E000
|
stack
|
page read and write
|
||
190000
|
unkown
|
page readonly
|
||
DA7000
|
heap
|
page read and write
|
||
DA2000
|
heap
|
page read and write
|
||
D27000
|
heap
|
page read and write
|
||
1B3000
|
unkown
|
page readonly
|
||
D9F000
|
heap
|
page read and write
|
||
D2D000
|
heap
|
page read and write
|
||
191000
|
unkown
|
page execute read
|
||
213000
|
unkown
|
page execute and read and write
|
||
340F000
|
stack
|
page read and write
|
||
283C000
|
stack
|
page read and write
|
||
216000
|
unkown
|
page readonly
|
||
D46000
|
heap
|
page read and write
|
||
2720000
|
remote allocation
|
page read and write
|
||
77D000
|
stack
|
page read and write
|
||
D46000
|
heap
|
page read and write
|
||
DA1000
|
heap
|
page read and write
|
||
1BE000
|
unkown
|
page read and write
|
||
B3E000
|
stack
|
page read and write
|
||
1BE000
|
unkown
|
page write copy
|
||
269E000
|
stack
|
page read and write
|
||
AFD000
|
stack
|
page read and write
|
||
2F5E000
|
stack
|
page read and write
|
||
DA0000
|
heap
|
page read and write
|
||
26DD000
|
stack
|
page read and write
|
||
D26000
|
heap
|
page read and write
|
||
190000
|
unkown
|
page readonly
|
||
DB4000
|
heap
|
page read and write
|
||
D43000
|
heap
|
page read and write
|
||
216000
|
unkown
|
page readonly
|
||
D28000
|
heap
|
page read and write
|
||
D2D000
|
heap
|
page read and write
|
||
7E0000
|
heap
|
page read and write
|
||
31B7000
|
trusted library allocation
|
page read and write
|
||
293F000
|
stack
|
page read and write
|
||
DA7000
|
heap
|
page read and write
|
||
D60000
|
heap
|
page read and write
|
||
2720000
|
remote allocation
|
page read and write
|
||
330E000
|
stack
|
page read and write
|
||
191000
|
unkown
|
page execute read
|
||
216000
|
unkown
|
page readonly
|
||
216000
|
unkown
|
page readonly
|
||
D4F000
|
heap
|
page read and write
|
||
1B3000
|
unkown
|
page readonly
|
||
B70000
|
heap
|
page read and write
|
||
DE4000
|
heap
|
page read and write
|
||
D4C000
|
heap
|
page read and write
|
||
1B3000
|
unkown
|
page readonly
|
||
190000
|
unkown
|
page readonly
|
||
45C000
|
remote allocation
|
page execute and read and write
|
There are 108 hidden memdumps, click here to show them.