Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
7gA40t6M1y.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
initial sample
|
||
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_7gA40t6M1y.exe_d1143dfa83185f7ef81f4d243cc317ef368e41f6_a6f7c61e_762a87b1-1674-4a5a-8e2a-3eaf72c9bf2d\Report.wer
|
Unicode text, UTF-16, little-endian text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WER42E0.tmp.dmp
|
Mini DuMP crash report, 15 streams, Thu Mar 28 08:09:58 2024, 0x1205a4 type
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WER438D.tmp.WERInternalMetadata.xml
|
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WER43CC.tmp.xml
|
XML 1.0 document, ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Windows\appcompat\Programs\Amcache.hve
|
MS Windows registry file, NT/2000 or above
|
dropped
|
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\7gA40t6M1y.exe
|
"C:\Users\user\Desktop\7gA40t6M1y.exe"
|
||
C:\Windows\SysWOW64\WerFault.exe
|
C:\Windows\SysWOW64\WerFault.exe -u -p 2460 -s 1620
|
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
paintercrutcheniw.shop
|
|||
communicationgenerwo.shop
|
|||
pillowbrocccolipe.shop
|
|||
enthusiasimtitleow.shop
|
|||
worryfillvolcawoi.shop
|
|||
dismissalcylinderhostw.shop
|
|||
diskretainvigorousiw.shop
|
|||
cleartotalfisherwo.shop
|
|||
affordcharmcropwo.shop
|
|||
https://paintercrutcheniw.shop/api
|
172.67.187.135
|
||
https://paintercrutcheniw.shop/D
|
unknown
|
||
https://duckduckgo.com/chrome_newtab
|
unknown
|
||
https://duckduckgo.com/ac/?q=
|
unknown
|
||
https://www.google.com/images/branding/product/ico/googleg_lodp.ico
|
unknown
|
||
https://paintercrutcheniw.shop:443/api
|
unknown
|
||
https://paintercrutcheniw.shop/apie
|
unknown
|
||
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
|
unknown
|
||
http://crl.rootca1.amazontrust.com/rootca1.crl0
|
unknown
|
||
http://upx.sf.net
|
unknown
|
||
https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
|
unknown
|
||
http://ocsp.rootca1.amazontrust.com0:
|
unknown
|
||
https://paintercrutcheniw.shop/apiyhnncjkhggdhalmcnfklkD
|
unknown
|
||
https://paintercrutcheniw.shop/api;C
|
unknown
|
||
https://www.ecosia.org/newtab/
|
unknown
|
||
https://support.mozilla.org/kb/customize-firefox-controls-buttons-and-toolbars?utm_source=firefox-br
|
unknown
|
||
https://paintercrutcheniw.shop/y
|
unknown
|
||
https://ac.ecosia.org/autocomplete?q=
|
unknown
|
||
http://x1.c.lencr.org/0
|
unknown
|
||
http://x1.i.lencr.org/0
|
unknown
|
||
https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
|
unknown
|
||
http://crt.rootca1.amazontrust.com/rootca1.cer0?
|
unknown
|
||
https://paintercrutcheniw.shop/R
|
unknown
|
||
https://support.mozilla.org/products/firefoxgro.all
|
unknown
|
||
https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
|
unknown
|
||
https://paintercrutcheniw.shop/Y
|
unknown
|
||
https://paintercrutcheniw.shop/
|
unknown
|
There are 26 hidden URLs, click here to show them.
Domains
Name
|
IP
|
Malicious
|
|
---|---|---|---|
paintercrutcheniw.shop
|
172.67.187.135
|
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
172.67.187.135
|
paintercrutcheniw.shop
|
United States
|
Registry
Path
|
Value
|
Malicious
|
|
---|---|---|---|
\REGISTRY\A\{aac4b263-49ab-2660-15e9-3926c320983f}\Root\InventoryApplicationFile\7ga40t6m1y.exe|98a56e675a3aafef
|
ProgramId
|
||
\REGISTRY\A\{aac4b263-49ab-2660-15e9-3926c320983f}\Root\InventoryApplicationFile\7ga40t6m1y.exe|98a56e675a3aafef
|
FileId
|
||
\REGISTRY\A\{aac4b263-49ab-2660-15e9-3926c320983f}\Root\InventoryApplicationFile\7ga40t6m1y.exe|98a56e675a3aafef
|
LowerCaseLongPath
|
||
\REGISTRY\A\{aac4b263-49ab-2660-15e9-3926c320983f}\Root\InventoryApplicationFile\7ga40t6m1y.exe|98a56e675a3aafef
|
LongPathHash
|
||
\REGISTRY\A\{aac4b263-49ab-2660-15e9-3926c320983f}\Root\InventoryApplicationFile\7ga40t6m1y.exe|98a56e675a3aafef
|
Name
|
||
\REGISTRY\A\{aac4b263-49ab-2660-15e9-3926c320983f}\Root\InventoryApplicationFile\7ga40t6m1y.exe|98a56e675a3aafef
|
OriginalFileName
|
||
\REGISTRY\A\{aac4b263-49ab-2660-15e9-3926c320983f}\Root\InventoryApplicationFile\7ga40t6m1y.exe|98a56e675a3aafef
|
Publisher
|
||
\REGISTRY\A\{aac4b263-49ab-2660-15e9-3926c320983f}\Root\InventoryApplicationFile\7ga40t6m1y.exe|98a56e675a3aafef
|
Version
|
||
\REGISTRY\A\{aac4b263-49ab-2660-15e9-3926c320983f}\Root\InventoryApplicationFile\7ga40t6m1y.exe|98a56e675a3aafef
|
BinFileVersion
|
||
\REGISTRY\A\{aac4b263-49ab-2660-15e9-3926c320983f}\Root\InventoryApplicationFile\7ga40t6m1y.exe|98a56e675a3aafef
|
BinaryType
|
||
\REGISTRY\A\{aac4b263-49ab-2660-15e9-3926c320983f}\Root\InventoryApplicationFile\7ga40t6m1y.exe|98a56e675a3aafef
|
ProductName
|
||
\REGISTRY\A\{aac4b263-49ab-2660-15e9-3926c320983f}\Root\InventoryApplicationFile\7ga40t6m1y.exe|98a56e675a3aafef
|
ProductVersion
|
||
\REGISTRY\A\{aac4b263-49ab-2660-15e9-3926c320983f}\Root\InventoryApplicationFile\7ga40t6m1y.exe|98a56e675a3aafef
|
LinkDate
|
||
\REGISTRY\A\{aac4b263-49ab-2660-15e9-3926c320983f}\Root\InventoryApplicationFile\7ga40t6m1y.exe|98a56e675a3aafef
|
BinProductVersion
|
||
\REGISTRY\A\{aac4b263-49ab-2660-15e9-3926c320983f}\Root\InventoryApplicationFile\7ga40t6m1y.exe|98a56e675a3aafef
|
AppxPackageFullName
|
||
\REGISTRY\A\{aac4b263-49ab-2660-15e9-3926c320983f}\Root\InventoryApplicationFile\7ga40t6m1y.exe|98a56e675a3aafef
|
AppxPackageRelativeId
|
||
\REGISTRY\A\{aac4b263-49ab-2660-15e9-3926c320983f}\Root\InventoryApplicationFile\7ga40t6m1y.exe|98a56e675a3aafef
|
Size
|
||
\REGISTRY\A\{aac4b263-49ab-2660-15e9-3926c320983f}\Root\InventoryApplicationFile\7ga40t6m1y.exe|98a56e675a3aafef
|
Language
|
||
\REGISTRY\A\{aac4b263-49ab-2660-15e9-3926c320983f}\Root\InventoryApplicationFile\7ga40t6m1y.exe|98a56e675a3aafef
|
Usn
|
There are 9 hidden registries, click here to show them.
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
27C0000
|
direct allocation
|
page read and write
|
||
D4B000
|
heap
|
page read and write
|
||
32EF000
|
trusted library allocation
|
page read and write
|
||
33C4000
|
trusted library allocation
|
page read and write
|
||
D8E000
|
stack
|
page read and write
|
||
33E8000
|
trusted library allocation
|
page read and write
|
||
32EE000
|
trusted library allocation
|
page read and write
|
||
331B000
|
trusted library allocation
|
page read and write
|
||
3409000
|
trusted library allocation
|
page read and write
|
||
361F000
|
trusted library allocation
|
page read and write
|
||
3920000
|
heap
|
page read and write
|
||
318F000
|
stack
|
page read and write
|
||
3303000
|
trusted library allocation
|
page read and write
|
||
27FD000
|
stack
|
page read and write
|
||
32E7000
|
trusted library allocation
|
page read and write
|
||
338F000
|
trusted library allocation
|
page read and write
|
||
338B000
|
trusted library allocation
|
page read and write
|
||
D46000
|
heap
|
page read and write
|
||
D4B000
|
heap
|
page read and write
|
||
CF9000
|
heap
|
page read and write
|
||
D47000
|
heap
|
page read and write
|
||
35F0000
|
heap
|
page read and write
|
||
32E8000
|
trusted library allocation
|
page read and write
|
||
3377000
|
trusted library allocation
|
page read and write
|
||
3335000
|
trusted library allocation
|
page read and write
|
||
3305000
|
trusted library allocation
|
page read and write
|
||
D2E000
|
heap
|
page read and write
|
||
D47000
|
heap
|
page read and write
|
||
3411000
|
trusted library allocation
|
page read and write
|
||
3409000
|
trusted library allocation
|
page read and write
|
||
3303000
|
trusted library allocation
|
page read and write
|
||
AF5000
|
unkown
|
page read and write
|
||
33AF000
|
trusted library allocation
|
page read and write
|
||
33F9000
|
trusted library allocation
|
page read and write
|
||
32FA000
|
trusted library allocation
|
page read and write
|
||
D44000
|
heap
|
page read and write
|
||
3303000
|
trusted library allocation
|
page read and write
|
||
1F0000
|
heap
|
page read and write
|
||
3377000
|
trusted library allocation
|
page read and write
|
||
32E9000
|
trusted library allocation
|
page read and write
|
||
32E8000
|
trusted library allocation
|
page read and write
|
||
32F8000
|
trusted library allocation
|
page read and write
|
||
D47000
|
heap
|
page read and write
|
||
32E8000
|
trusted library allocation
|
page read and write
|
||
3757000
|
trusted library allocation
|
page read and write
|
||
387A000
|
trusted library allocation
|
page read and write
|
||
32F7000
|
trusted library allocation
|
page read and write
|
||
3419000
|
trusted library allocation
|
page read and write
|
||
338F000
|
trusted library allocation
|
page read and write
|
||
2ACE000
|
stack
|
page read and write
|
||
33A7000
|
trusted library allocation
|
page read and write
|
||
3304000
|
trusted library allocation
|
page read and write
|
||
33C4000
|
trusted library allocation
|
page read and write
|
||
32E5000
|
trusted library allocation
|
page read and write
|
||
2900000
|
heap
|
page read and write
|
||
400000
|
unkown
|
page readonly
|
||
33AE000
|
trusted library allocation
|
page read and write
|
||
33A7000
|
trusted library allocation
|
page read and write
|
||
3303000
|
trusted library allocation
|
page read and write
|
||
32E5000
|
trusted library allocation
|
page read and write
|
||
D47000
|
heap
|
page read and write
|
||
337E000
|
trusted library allocation
|
page read and write
|
||
383F000
|
stack
|
page read and write
|
||
3331000
|
trusted library allocation
|
page read and write
|
||
E8F000
|
stack
|
page read and write
|
||
3307000
|
trusted library allocation
|
page read and write
|
||
33F3000
|
trusted library allocation
|
page read and write
|
||
33A0000
|
trusted library allocation
|
page read and write
|
||
D4B000
|
heap
|
page read and write
|
||
332E000
|
trusted library allocation
|
page read and write
|
||
D4B000
|
heap
|
page read and write
|
||
3303000
|
trusted library allocation
|
page read and write
|
||
CB6000
|
heap
|
page read and write
|
||
3302000
|
trusted library allocation
|
page read and write
|
||
337E000
|
trusted library allocation
|
page read and write
|
||
3326000
|
trusted library allocation
|
page read and write
|
||
33A3000
|
trusted library allocation
|
page read and write
|
||
33F1000
|
trusted library allocation
|
page read and write
|
||
339C000
|
trusted library allocation
|
page read and write
|
||
D24000
|
heap
|
page read and write
|
||
ECE000
|
stack
|
page read and write
|
||
3307000
|
trusted library allocation
|
page read and write
|
||
33F1000
|
trusted library allocation
|
page read and write
|
||
3329000
|
trusted library allocation
|
page read and write
|
||
3416000
|
trusted library allocation
|
page read and write
|
||
3305000
|
trusted library allocation
|
page read and write
|
||
3419000
|
trusted library allocation
|
page read and write
|
||
33F9000
|
trusted library allocation
|
page read and write
|
||
3300000
|
trusted library allocation
|
page read and write
|
||
3305000
|
trusted library allocation
|
page read and write
|
||
32E6000
|
trusted library allocation
|
page read and write
|
||
32E6000
|
trusted library allocation
|
page read and write
|
||
CCA000
|
heap
|
page read and write
|
||
3303000
|
trusted library allocation
|
page read and write
|
||
D4B000
|
heap
|
page read and write
|
||
3303000
|
trusted library allocation
|
page read and write
|
||
3390000
|
trusted library allocation
|
page read and write
|
||
CCA000
|
heap
|
page read and write
|
||
3419000
|
trusted library allocation
|
page read and write
|
||
D2F000
|
heap
|
page read and write
|
||
3311000
|
trusted library allocation
|
page read and write
|
||
3384000
|
trusted library allocation
|
page read and write
|
||
3303000
|
trusted library allocation
|
page read and write
|
||
373E000
|
stack
|
page read and write
|
||
D2D000
|
heap
|
page read and write
|
||
D29000
|
heap
|
page read and write
|
||
3409000
|
trusted library allocation
|
page read and write
|
||
3419000
|
trusted library allocation
|
page read and write
|
||
D4B000
|
heap
|
page read and write
|
||
32FD000
|
trusted library allocation
|
page read and write
|
||
CEB000
|
heap
|
page read and write
|
||
D4B000
|
heap
|
page read and write
|
||
32FD000
|
trusted library allocation
|
page read and write
|
||
36BF000
|
trusted library allocation
|
page read and write
|
||
AF7000
|
unkown
|
page readonly
|
||
FCF000
|
stack
|
page read and write
|
||
C5A000
|
heap
|
page read and write
|
||
3481000
|
trusted library allocation
|
page read and write
|
||
342E000
|
trusted library allocation
|
page read and write
|
||
D47000
|
heap
|
page read and write
|
||
3305000
|
trusted library allocation
|
page read and write
|
||
450000
|
unkown
|
page read and write
|
||
33E8000
|
trusted library allocation
|
page read and write
|
||
32F5000
|
trusted library allocation
|
page read and write
|
||
3397000
|
trusted library allocation
|
page read and write
|
||
340B000
|
trusted library allocation
|
page read and write
|
||
3335000
|
trusted library allocation
|
page read and write
|
||
3328000
|
trusted library allocation
|
page read and write
|
||
32E0000
|
trusted library allocation
|
page read and write
|
||
D47000
|
heap
|
page read and write
|
||
33E8000
|
trusted library allocation
|
page read and write
|
||
33B2000
|
trusted library allocation
|
page read and write
|
||
3305000
|
trusted library allocation
|
page read and write
|
||
D4B000
|
heap
|
page read and write
|
||
CAB000
|
heap
|
page read and write
|
||
33E8000
|
trusted library allocation
|
page read and write
|
||
3416000
|
trusted library allocation
|
page read and write
|
||
3301000
|
trusted library allocation
|
page read and write
|
||
32EE000
|
trusted library allocation
|
page read and write
|
||
330A000
|
trusted library allocation
|
page read and write
|
||
2CE0000
|
remote allocation
|
page read and write
|
||
3305000
|
trusted library allocation
|
page read and write
|
||
33BC000
|
trusted library allocation
|
page read and write
|
||
3325000
|
trusted library allocation
|
page read and write
|
||
D4B000
|
heap
|
page read and write
|
||
C00000
|
heap
|
page read and write
|
||
2AD0000
|
heap
|
page read and write
|
||
3389000
|
trusted library allocation
|
page read and write
|
||
D4B000
|
heap
|
page read and write
|
||
32EC000
|
trusted library allocation
|
page read and write
|
||
CEB000
|
heap
|
page read and write
|
||
3306000
|
trusted library allocation
|
page read and write
|
||
335E000
|
trusted library allocation
|
page read and write
|
||
32EF000
|
trusted library allocation
|
page read and write
|
||
3303000
|
trusted library allocation
|
page read and write
|
||
D47000
|
heap
|
page read and write
|
||
32F8000
|
trusted library allocation
|
page read and write
|
||
32E5000
|
trusted library allocation
|
page read and write
|
||
C5E000
|
heap
|
page read and write
|
||
32E5000
|
trusted library allocation
|
page read and write
|
||
3375000
|
trusted library allocation
|
page read and write
|
||
32EF000
|
trusted library allocation
|
page read and write
|
||
3304000
|
trusted library allocation
|
page read and write
|
||
3375000
|
trusted library allocation
|
page read and write
|
||
D3F000
|
heap
|
page read and write
|
||
D4B000
|
heap
|
page read and write
|
||
D4B000
|
heap
|
page read and write
|
||
3373000
|
trusted library allocation
|
page read and write
|
||
D4B000
|
heap
|
page read and write
|
||
32FF000
|
trusted library allocation
|
page read and write
|
||
D46000
|
heap
|
page read and write
|
||
3303000
|
trusted library allocation
|
page read and write
|
||
339C000
|
trusted library allocation
|
page read and write
|
||
340B000
|
trusted library allocation
|
page read and write
|
||
401000
|
unkown
|
page execute read
|
||
3416000
|
trusted library allocation
|
page read and write
|
||
2BDF000
|
stack
|
page read and write
|
||
32EE000
|
trusted library allocation
|
page read and write
|
||
D47000
|
heap
|
page read and write
|
||
33B8000
|
trusted library allocation
|
page read and write
|
||
D47000
|
heap
|
page read and write
|
||
D4B000
|
heap
|
page read and write
|
||
C50000
|
heap
|
page read and write
|
||
3316000
|
trusted library allocation
|
page read and write
|
||
338B000
|
trusted library allocation
|
page read and write
|
||
32E8000
|
trusted library allocation
|
page read and write
|
||
342E000
|
trusted library allocation
|
page read and write
|
||
3514000
|
trusted library allocation
|
page read and write
|
||
D24000
|
heap
|
page read and write
|
||
32FC000
|
trusted library allocation
|
page read and write
|
||
33E1000
|
trusted library allocation
|
page read and write
|
||
33E8000
|
trusted library allocation
|
page read and write
|
||
33A0000
|
trusted library allocation
|
page read and write
|
||
33E0000
|
trusted library allocation
|
page read and write
|
||
D42000
|
heap
|
page read and write
|
||
340B000
|
trusted library allocation
|
page read and write
|
||
330A000
|
trusted library allocation
|
page read and write
|
||
D2E000
|
heap
|
page read and write
|
||
339C000
|
trusted library allocation
|
page read and write
|
||
D40000
|
heap
|
page read and write
|
||
387F000
|
trusted library allocation
|
page read and write
|
||
D4B000
|
heap
|
page read and write
|
||
CCC000
|
heap
|
page read and write
|
||
3304000
|
trusted library allocation
|
page read and write
|
||
CA2000
|
heap
|
page read and write
|
||
3416000
|
trusted library allocation
|
page read and write
|
||
3311000
|
trusted library allocation
|
page read and write
|
||
D2B000
|
heap
|
page read and write
|
||
D47000
|
heap
|
page read and write
|
||
337E000
|
trusted library allocation
|
page read and write
|
||
36B7000
|
trusted library allocation
|
page read and write
|
||
3419000
|
trusted library allocation
|
page read and write
|
||
3375000
|
trusted library allocation
|
page read and write
|
||
3373000
|
trusted library allocation
|
page read and write
|
||
CAF000
|
heap
|
page read and write
|
||
CB1000
|
heap
|
page read and write
|
||
32EE000
|
trusted library allocation
|
page read and write
|
||
C27000
|
heap
|
page read and write
|
||
3306000
|
trusted library allocation
|
page read and write
|
||
32E5000
|
trusted library allocation
|
page read and write
|
||
33E8000
|
trusted library allocation
|
page read and write
|
||
3320000
|
trusted library allocation
|
page read and write
|
||
CA1000
|
heap
|
page read and write
|
||
D2D000
|
heap
|
page read and write
|
||
32EE000
|
trusted library allocation
|
page read and write
|
||
3337000
|
trusted library allocation
|
page read and write
|
||
446000
|
unkown
|
page execute and read and write
|
||
32FD000
|
trusted library allocation
|
page read and write
|
||
BE0000
|
heap
|
page read and write
|
||
3375000
|
trusted library allocation
|
page read and write
|
||
D48000
|
heap
|
page read and write
|
||
2A4D000
|
stack
|
page read and write
|
||
D47000
|
heap
|
page read and write
|
||
CB6000
|
heap
|
page read and write
|
||
D2D000
|
heap
|
page read and write
|
||
C6E000
|
heap
|
page execute and read and write
|
||
D3F000
|
heap
|
page read and write
|
||
363F000
|
trusted library allocation
|
page read and write
|
||
31CE000
|
stack
|
page read and write
|
||
33BA000
|
trusted library allocation
|
page read and write
|
||
35F1000
|
heap
|
page read and write
|
||
339A000
|
trusted library allocation
|
page read and write
|
||
335C000
|
trusted library allocation
|
page read and write
|
||
3316000
|
trusted library allocation
|
page read and write
|
||
417000
|
unkown
|
page write copy
|
||
3373000
|
trusted library allocation
|
page read and write
|
||
C25000
|
heap
|
page read and write
|
||
339A000
|
trusted library allocation
|
page read and write
|
||
D29000
|
heap
|
page read and write
|
||
3409000
|
trusted library allocation
|
page read and write
|
||
33E8000
|
trusted library allocation
|
page read and write
|
||
D46000
|
heap
|
page read and write
|
||
CB6000
|
heap
|
page read and write
|
||
36C7000
|
trusted library allocation
|
page read and write
|
||
3305000
|
trusted library allocation
|
page read and write
|
||
3317000
|
trusted library allocation
|
page read and write
|
||
3414000
|
trusted library allocation
|
page read and write
|
||
D4A000
|
heap
|
page read and write
|
||
32EE000
|
trusted library allocation
|
page read and write
|
||
3419000
|
trusted library allocation
|
page read and write
|
||
CAF000
|
heap
|
page read and write
|
||
D4B000
|
heap
|
page read and write
|
||
CA8000
|
heap
|
page read and write
|
||
CCC000
|
heap
|
page read and write
|
||
D29000
|
heap
|
page read and write
|
||
33D1000
|
trusted library allocation
|
page read and write
|
||
3318000
|
trusted library allocation
|
page read and write
|
||
D47000
|
heap
|
page read and write
|
||
9B000
|
stack
|
page read and write
|
||
339C000
|
trusted library allocation
|
page read and write
|
||
D4B000
|
heap
|
page read and write
|
||
D43000
|
heap
|
page read and write
|
||
3326000
|
trusted library allocation
|
page read and write
|
||
3305000
|
trusted library allocation
|
page read and write
|
||
CCD000
|
heap
|
page read and write
|
||
3E3D000
|
trusted library allocation
|
page read and write
|
||
3419000
|
trusted library allocation
|
page read and write
|
||
32FD000
|
trusted library allocation
|
page read and write
|
||
2CE0000
|
remote allocation
|
page read and write
|
||
393B000
|
trusted library allocation
|
page read and write
|
||
CCA000
|
heap
|
page read and write
|
||
D4B000
|
heap
|
page read and write
|
||
195000
|
stack
|
page read and write
|
||
D4B000
|
heap
|
page read and write
|
||
33A9000
|
trusted library allocation
|
page read and write
|
||
32FD000
|
trusted library allocation
|
page read and write
|
||
33EA000
|
trusted library allocation
|
page read and write
|
||
3384000
|
trusted library allocation
|
page read and write
|
||
3607000
|
trusted library allocation
|
page read and write
|
||
32EF000
|
trusted library allocation
|
page read and write
|
||
32F7000
|
trusted library allocation
|
page read and write
|
||
33AC000
|
trusted library allocation
|
page read and write
|
||
3303000
|
trusted library allocation
|
page read and write
|
||
3300000
|
trusted library allocation
|
page read and write
|
||
33F9000
|
trusted library allocation
|
page read and write
|
||
3385000
|
trusted library allocation
|
page read and write
|
||
3409000
|
trusted library allocation
|
page read and write
|
||
368F000
|
trusted library allocation
|
page read and write
|
||
C9C000
|
heap
|
page read and write
|
||
33E8000
|
trusted library allocation
|
page read and write
|
||
33BA000
|
trusted library allocation
|
page read and write
|
||
3337000
|
trusted library allocation
|
page read and write
|
||
32E8000
|
trusted library allocation
|
page read and write
|
||
33B6000
|
trusted library allocation
|
page read and write
|
||
28FE000
|
stack
|
page read and write
|
||
4347000
|
trusted library allocation
|
page read and write
|
||
308E000
|
stack
|
page read and write
|
||
3373000
|
trusted library allocation
|
page read and write
|
||
2770000
|
direct allocation
|
page execute and read and write
|
||
3305000
|
trusted library allocation
|
page read and write
|
||
3305000
|
trusted library allocation
|
page read and write
|
||
410000
|
unkown
|
page readonly
|
||
41C000
|
unkown
|
page write copy
|
||
3300000
|
trusted library allocation
|
page read and write
|
||
D47000
|
heap
|
page read and write
|
||
3387000
|
trusted library allocation
|
page read and write
|
||
3419000
|
trusted library allocation
|
page read and write
|
||
32F8000
|
trusted library allocation
|
page read and write
|
||
32CE000
|
stack
|
page read and write
|
||
3327000
|
trusted library allocation
|
page read and write
|
||
35EE000
|
trusted library allocation
|
page read and write
|
||
D43000
|
heap
|
page read and write
|
||
C20000
|
heap
|
page read and write
|
||
3419000
|
trusted library allocation
|
page read and write
|
||
D2D000
|
heap
|
page read and write
|
||
CC4000
|
heap
|
page read and write
|
||
2A8E000
|
stack
|
page read and write
|
||
3303000
|
trusted library allocation
|
page read and write
|
||
D2D000
|
heap
|
page read and write
|
||
33F9000
|
trusted library allocation
|
page read and write
|
||
D47000
|
heap
|
page read and write
|
||
33F1000
|
trusted library allocation
|
page read and write
|
||
D4B000
|
heap
|
page read and write
|
||
C99000
|
heap
|
page read and write
|
||
3316000
|
trusted library allocation
|
page read and write
|
||
3377000
|
trusted library allocation
|
page read and write
|
||
32E9000
|
trusted library allocation
|
page read and write
|
||
340B000
|
trusted library allocation
|
page read and write
|
||
338A000
|
trusted library allocation
|
page read and write
|
||
33EB000
|
trusted library allocation
|
page read and write
|
||
33D1000
|
trusted library allocation
|
page read and write
|
||
3316000
|
trusted library allocation
|
page read and write
|
||
D2D000
|
heap
|
page read and write
|
||
D47000
|
heap
|
page read and write
|
||
35E8000
|
trusted library allocation
|
page read and write
|
||
3375000
|
trusted library allocation
|
page read and write
|
||
3325000
|
trusted library allocation
|
page read and write
|
||
33A2000
|
trusted library allocation
|
page read and write
|
||
333E000
|
trusted library allocation
|
page read and write
|
||
D44000
|
heap
|
page read and write
|
||
3305000
|
trusted library allocation
|
page read and write
|
||
D2B000
|
heap
|
page read and write
|
||
400000
|
unkown
|
page execute and read and write
|
||
2CDF000
|
stack
|
page read and write
|
||
D4B000
|
heap
|
page read and write
|
||
33A6000
|
trusted library allocation
|
page read and write
|
||
3409000
|
trusted library allocation
|
page read and write
|
||
33BC000
|
trusted library allocation
|
page read and write
|
||
CB6000
|
heap
|
page read and write
|
||
33AF000
|
trusted library allocation
|
page read and write
|
||
294E000
|
stack
|
page read and write
|
||
331D000
|
trusted library allocation
|
page read and write
|
||
D47000
|
heap
|
page read and write
|
||
32EC000
|
trusted library allocation
|
page read and write
|
||
32F8000
|
trusted library allocation
|
page read and write
|
||
32FC000
|
trusted library allocation
|
page read and write
|
||
3320000
|
trusted library allocation
|
page read and write
|
||
32F8000
|
trusted library allocation
|
page read and write
|
||
D4B000
|
heap
|
page read and write
|
||
D47000
|
heap
|
page read and write
|
||
33E8000
|
trusted library allocation
|
page read and write
|
||
3300000
|
trusted library allocation
|
page read and write
|
||
32E5000
|
trusted library allocation
|
page read and write
|
||
3306000
|
trusted library allocation
|
page read and write
|
||
CCA000
|
heap
|
page read and write
|
||
32FF000
|
trusted library allocation
|
page read and write
|
||
3317000
|
trusted library allocation
|
page read and write
|
||
33C5000
|
trusted library allocation
|
page read and write
|
||
D29000
|
heap
|
page read and write
|
||
CB2000
|
heap
|
page read and write
|
||
3319000
|
trusted library allocation
|
page read and write
|
||
D4B000
|
heap
|
page read and write
|
||
2CE0000
|
remote allocation
|
page read and write
|
||
AF7000
|
unkown
|
page readonly
|
||
D46000
|
heap
|
page read and write
|
||
3375000
|
trusted library allocation
|
page read and write
|
||
32F5000
|
trusted library allocation
|
page read and write
|
There are 377 hidden memdumps, click here to show them.