Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
7ITPeT3VWW.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
initial sample
|
||
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_7ITPeT3VWW.exe_392958df52fafd03bf95a85ca8f5874405d8c_a80dd0fe_e452142c-69af-4a0a-ab2a-4b2fe8a9f3ad\Report.wer
|
Unicode text, UTF-16, little-endian text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WER14A2.tmp.dmp
|
Mini DuMP crash report, 15 streams, Fri Mar 29 07:59:02 2024, 0x1205a4 type
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WER154F.tmp.WERInternalMetadata.xml
|
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WER157F.tmp.xml
|
XML 1.0 document, ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Windows\appcompat\Programs\Amcache.hve
|
MS Windows registry file, NT/2000 or above
|
dropped
|
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\7ITPeT3VWW.exe
|
"C:\Users\user\Desktop\7ITPeT3VWW.exe"
|
||
C:\Windows\SysWOW64\WerFault.exe
|
C:\Windows\SysWOW64\WerFault.exe -u -p 7268 -s 1768
|
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
communicationgenerwo.shop
|
|||
pillowbrocccolipe.shop
|
|||
enthusiasimtitleow.shop
|
|||
wagonglidemonkywo.shop
|
|||
worryfillvolcawoi.shop
|
|||
dismissalcylinderhostw.shop
|
|||
diskretainvigorousiw.shop
|
|||
cleartotalfisherwo.shop
|
|||
affordcharmcropwo.shop
|
|||
https://duckduckgo.com/chrome_newtab
|
unknown
|
||
https://wagonglidemonkywo.shop/api$
|
unknown
|
||
https://wagonglidemonkywo.shop/m
|
unknown
|
||
https://duckduckgo.com/ac/?q=
|
unknown
|
||
https://www.google.com/images/branding/product/ico/googleg_lodp.ico
|
unknown
|
||
https://wagonglidemonkywo.shop/apiyX
|
unknown
|
||
https://wagonglidemonkywo.shop/
|
unknown
|
||
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
|
unknown
|
||
http://crl.rootca1.amazontrust.com/rootca1.crl0
|
unknown
|
||
http://upx.sf.net
|
unknown
|
||
https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
|
unknown
|
||
http://ocsp.rootca1.amazontrust.com0:
|
unknown
|
||
https://www.ecosia.org/newtab/
|
unknown
|
||
https://support.mozilla.org/kb/customize-firefox-controls-buttons-and-toolbars?utm_source=firefox-br
|
unknown
|
||
https://wagonglidemonkywo.shop/v
|
unknown
|
||
https://ac.ecosia.org/autocomplete?q=
|
unknown
|
||
https://wagonglidemonkywo.shop/744-1-2
|
unknown
|
||
https://wagonglidemonkywo.shop/api
|
104.21.38.98
|
||
http://x1.c.lencr.org/0
|
unknown
|
||
http://x1.i.lencr.org/0
|
unknown
|
||
https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
|
unknown
|
||
http://crt.rootca1.amazontrust.com/rootca1.cer0?
|
unknown
|
||
https://wagonglidemonkywo.shop/apiwyF
|
unknown
|
||
https://wagonglidemonkywo.shop/apio$
|
unknown
|
||
https://support.mozilla.org/products/firefoxgro.all
|
unknown
|
||
https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
|
unknown
|
||
https://wagonglidemonkywo.shop/apiK
|
unknown
|
There are 26 hidden URLs, click here to show them.
Domains
Name
|
IP
|
Malicious
|
|
---|---|---|---|
wagonglidemonkywo.shop
|
104.21.38.98
|
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
104.21.38.98
|
wagonglidemonkywo.shop
|
United States
|
Registry
Path
|
Value
|
Malicious
|
|
---|---|---|---|
\REGISTRY\A\{5354d1d0-b66b-b325-344b-6002012e1c5d}\Root\InventoryApplicationFile\7itpet3vww.exe|1d2ee04cae0d7da0
|
ProgramId
|
||
\REGISTRY\A\{5354d1d0-b66b-b325-344b-6002012e1c5d}\Root\InventoryApplicationFile\7itpet3vww.exe|1d2ee04cae0d7da0
|
FileId
|
||
\REGISTRY\A\{5354d1d0-b66b-b325-344b-6002012e1c5d}\Root\InventoryApplicationFile\7itpet3vww.exe|1d2ee04cae0d7da0
|
LowerCaseLongPath
|
||
\REGISTRY\A\{5354d1d0-b66b-b325-344b-6002012e1c5d}\Root\InventoryApplicationFile\7itpet3vww.exe|1d2ee04cae0d7da0
|
LongPathHash
|
||
\REGISTRY\A\{5354d1d0-b66b-b325-344b-6002012e1c5d}\Root\InventoryApplicationFile\7itpet3vww.exe|1d2ee04cae0d7da0
|
Name
|
||
\REGISTRY\A\{5354d1d0-b66b-b325-344b-6002012e1c5d}\Root\InventoryApplicationFile\7itpet3vww.exe|1d2ee04cae0d7da0
|
OriginalFileName
|
||
\REGISTRY\A\{5354d1d0-b66b-b325-344b-6002012e1c5d}\Root\InventoryApplicationFile\7itpet3vww.exe|1d2ee04cae0d7da0
|
Publisher
|
||
\REGISTRY\A\{5354d1d0-b66b-b325-344b-6002012e1c5d}\Root\InventoryApplicationFile\7itpet3vww.exe|1d2ee04cae0d7da0
|
Version
|
||
\REGISTRY\A\{5354d1d0-b66b-b325-344b-6002012e1c5d}\Root\InventoryApplicationFile\7itpet3vww.exe|1d2ee04cae0d7da0
|
BinFileVersion
|
||
\REGISTRY\A\{5354d1d0-b66b-b325-344b-6002012e1c5d}\Root\InventoryApplicationFile\7itpet3vww.exe|1d2ee04cae0d7da0
|
BinaryType
|
||
\REGISTRY\A\{5354d1d0-b66b-b325-344b-6002012e1c5d}\Root\InventoryApplicationFile\7itpet3vww.exe|1d2ee04cae0d7da0
|
ProductName
|
||
\REGISTRY\A\{5354d1d0-b66b-b325-344b-6002012e1c5d}\Root\InventoryApplicationFile\7itpet3vww.exe|1d2ee04cae0d7da0
|
ProductVersion
|
||
\REGISTRY\A\{5354d1d0-b66b-b325-344b-6002012e1c5d}\Root\InventoryApplicationFile\7itpet3vww.exe|1d2ee04cae0d7da0
|
LinkDate
|
||
\REGISTRY\A\{5354d1d0-b66b-b325-344b-6002012e1c5d}\Root\InventoryApplicationFile\7itpet3vww.exe|1d2ee04cae0d7da0
|
BinProductVersion
|
||
\REGISTRY\A\{5354d1d0-b66b-b325-344b-6002012e1c5d}\Root\InventoryApplicationFile\7itpet3vww.exe|1d2ee04cae0d7da0
|
AppxPackageFullName
|
||
\REGISTRY\A\{5354d1d0-b66b-b325-344b-6002012e1c5d}\Root\InventoryApplicationFile\7itpet3vww.exe|1d2ee04cae0d7da0
|
AppxPackageRelativeId
|
||
\REGISTRY\A\{5354d1d0-b66b-b325-344b-6002012e1c5d}\Root\InventoryApplicationFile\7itpet3vww.exe|1d2ee04cae0d7da0
|
Size
|
||
\REGISTRY\A\{5354d1d0-b66b-b325-344b-6002012e1c5d}\Root\InventoryApplicationFile\7itpet3vww.exe|1d2ee04cae0d7da0
|
Language
|
||
\REGISTRY\A\{5354d1d0-b66b-b325-344b-6002012e1c5d}\Root\InventoryApplicationFile\7itpet3vww.exe|1d2ee04cae0d7da0
|
Usn
|
There are 9 hidden registries, click here to show them.
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
2190000
|
direct allocation
|
page execute and read and write
|
||
2DE3000
|
trusted library allocation
|
page read and write
|
||
8C0000
|
heap
|
page read and write
|
||
2DF8000
|
trusted library allocation
|
page read and write
|
||
2E30000
|
trusted library allocation
|
page read and write
|
||
2E10000
|
trusted library allocation
|
page read and write
|
||
2DA5000
|
trusted library allocation
|
page read and write
|
||
2DA3000
|
trusted library allocation
|
page read and write
|
||
2D7A000
|
trusted library allocation
|
page read and write
|
||
2E21000
|
trusted library allocation
|
page read and write
|
||
2F2C000
|
trusted library allocation
|
page read and write
|
||
2D6E000
|
trusted library allocation
|
page read and write
|
||
2D75000
|
trusted library allocation
|
page read and write
|
||
2DE7000
|
trusted library allocation
|
page read and write
|
||
2E5D000
|
trusted library allocation
|
page read and write
|
||
2E01000
|
trusted library allocation
|
page read and write
|
||
2F51000
|
trusted library allocation
|
page read and write
|
||
2D9A000
|
trusted library allocation
|
page read and write
|
||
2D9D000
|
trusted library allocation
|
page read and write
|
||
2EB4000
|
trusted library allocation
|
page read and write
|
||
86A000
|
heap
|
page read and write
|
||
2D95000
|
trusted library allocation
|
page read and write
|
||
2E7C000
|
trusted library allocation
|
page read and write
|
||
2DFF000
|
trusted library allocation
|
page read and write
|
||
2DA3000
|
trusted library allocation
|
page read and write
|
||
2DA3000
|
trusted library allocation
|
page read and write
|
||
2DEC000
|
trusted library allocation
|
page read and write
|
||
2E30000
|
trusted library allocation
|
page read and write
|
||
2E15000
|
trusted library allocation
|
page read and write
|
||
2E20000
|
trusted library allocation
|
page read and write
|
||
2DF4000
|
trusted library allocation
|
page read and write
|
||
2D7A000
|
trusted library allocation
|
page read and write
|
||
2D9D000
|
trusted library allocation
|
page read and write
|
||
2DCE000
|
trusted library allocation
|
page read and write
|
||
2E03000
|
trusted library allocation
|
page read and write
|
||
2DF4000
|
trusted library allocation
|
page read and write
|
||
2DA3000
|
trusted library allocation
|
page read and write
|
||
2D95000
|
trusted library allocation
|
page read and write
|
||
2DAE000
|
trusted library allocation
|
page read and write
|
||
2E35000
|
trusted library allocation
|
page read and write
|
||
2D96000
|
trusted library allocation
|
page read and write
|
||
647000
|
heap
|
page read and write
|
||
2DF4000
|
trusted library allocation
|
page read and write
|
||
2D51000
|
trusted library allocation
|
page read and write
|
||
2DA3000
|
trusted library allocation
|
page read and write
|
||
8D3000
|
heap
|
page read and write
|
||
2E22000
|
trusted library allocation
|
page read and write
|
||
2DA3000
|
trusted library allocation
|
page read and write
|
||
2DE7000
|
trusted library allocation
|
page read and write
|
||
2D77000
|
trusted library allocation
|
page read and write
|
||
8EC000
|
heap
|
page read and write
|
||
2F5F000
|
trusted library allocation
|
page read and write
|
||
2DEA000
|
trusted library allocation
|
page read and write
|
||
2E13000
|
trusted library allocation
|
page read and write
|
||
2E4E000
|
trusted library allocation
|
page read and write
|
||
2E4A000
|
trusted library allocation
|
page read and write
|
||
2DA7000
|
trusted library allocation
|
page read and write
|
||
2E15000
|
trusted library allocation
|
page read and write
|
||
2D9D000
|
trusted library allocation
|
page read and write
|
||
8EC000
|
heap
|
page read and write
|
||
2D95000
|
trusted library allocation
|
page read and write
|
||
78F000
|
stack
|
page read and write
|
||
2D94000
|
trusted library allocation
|
page read and write
|
||
85C000
|
heap
|
page read and write
|
||
2E10000
|
trusted library allocation
|
page read and write
|
||
9B000
|
stack
|
page read and write
|
||
2D9D000
|
trusted library allocation
|
page read and write
|
||
2E4E000
|
trusted library allocation
|
page read and write
|
||
2D77000
|
trusted library allocation
|
page read and write
|
||
640000
|
heap
|
page read and write
|
||
2DEB000
|
trusted library allocation
|
page read and write
|
||
8E8000
|
heap
|
page read and write
|
||
8EC000
|
heap
|
page read and write
|
||
8EA000
|
heap
|
page read and write
|
||
2E1F000
|
trusted library allocation
|
page read and write
|
||
2D9F000
|
trusted library allocation
|
page read and write
|
||
8EA000
|
heap
|
page read and write
|
||
2DA3000
|
trusted library allocation
|
page read and write
|
||
2DF8000
|
trusted library allocation
|
page read and write
|
||
2F81000
|
trusted library allocation
|
page read and write
|
||
7FE000
|
heap
|
page read and write
|
||
2360000
|
remote allocation
|
page read and write
|
||
2D95000
|
trusted library allocation
|
page read and write
|
||
2E4A000
|
trusted library allocation
|
page read and write
|
||
645000
|
heap
|
page read and write
|
||
2DEC000
|
trusted library allocation
|
page read and write
|
||
3DC6000
|
trusted library allocation
|
page read and write
|
||
411000
|
unkown
|
page readonly
|
||
329F000
|
stack
|
page read and write
|
||
2DE7000
|
trusted library allocation
|
page read and write
|
||
2E4A000
|
trusted library allocation
|
page read and write
|
||
2DF5000
|
trusted library allocation
|
page read and write
|
||
8E8000
|
heap
|
page read and write
|
||
2DFF000
|
trusted library allocation
|
page read and write
|
||
2D79000
|
trusted library allocation
|
page read and write
|
||
2D6F000
|
trusted library allocation
|
page read and write
|
||
2E13000
|
trusted library allocation
|
page read and write
|
||
2D87000
|
trusted library allocation
|
page read and write
|
||
84E000
|
heap
|
page read and write
|
||
2DF5000
|
trusted library allocation
|
page read and write
|
||
2F51000
|
trusted library allocation
|
page read and write
|
||
2D5D000
|
trusted library allocation
|
page read and write
|
||
2DE7000
|
trusted library allocation
|
page read and write
|
||
2DFF000
|
trusted library allocation
|
page read and write
|
||
2DEC000
|
trusted library allocation
|
page read and write
|
||
2DFF000
|
trusted library allocation
|
page read and write
|
||
2DE7000
|
trusted library allocation
|
page read and write
|
||
8CF000
|
heap
|
page read and write
|
||
2D9F000
|
trusted library allocation
|
page read and write
|
||
2E2B000
|
trusted library allocation
|
page read and write
|
||
2E4E000
|
trusted library allocation
|
page read and write
|
||
8C4000
|
heap
|
page read and write
|
||
2DA3000
|
trusted library allocation
|
page read and write
|
||
2D8D000
|
trusted library allocation
|
page read and write
|
||
2E1C000
|
trusted library allocation
|
page read and write
|
||
2DA7000
|
trusted library allocation
|
page read and write
|
||
2DFF000
|
trusted library allocation
|
page read and write
|
||
2D95000
|
trusted library allocation
|
page read and write
|
||
2DFF000
|
trusted library allocation
|
page read and write
|
||
54B000
|
unkown
|
page readonly
|
||
2D8D000
|
trusted library allocation
|
page read and write
|
||
2D85000
|
trusted library allocation
|
page read and write
|
||
2DEC000
|
trusted library allocation
|
page read and write
|
||
2DE7000
|
trusted library allocation
|
page read and write
|
||
85C000
|
heap
|
page read and write
|
||
23CE000
|
stack
|
page read and write
|
||
2D56000
|
trusted library allocation
|
page read and write
|
||
2DA3000
|
trusted library allocation
|
page read and write
|
||
2DA3000
|
trusted library allocation
|
page read and write
|
||
254E000
|
stack
|
page read and write
|
||
8CD000
|
heap
|
page read and write
|
||
86A000
|
heap
|
page read and write
|
||
2E27000
|
trusted library allocation
|
page read and write
|
||
2DE5000
|
trusted library allocation
|
page read and write
|
||
2FCC000
|
trusted library allocation
|
page read and write
|
||
8C8000
|
heap
|
page read and write
|
||
8E8000
|
heap
|
page read and write
|
||
2DE7000
|
trusted library allocation
|
page read and write
|
||
2DA3000
|
trusted library allocation
|
page read and write
|
||
2E4E000
|
trusted library allocation
|
page read and write
|
||
2D9D000
|
trusted library allocation
|
page read and write
|
||
2DFE000
|
trusted library allocation
|
page read and write
|
||
8E2000
|
heap
|
page read and write
|
||
2D62000
|
trusted library allocation
|
page read and write
|
||
2DF5000
|
trusted library allocation
|
page read and write
|
||
2D89000
|
trusted library allocation
|
page read and write
|
||
2DF4000
|
trusted library allocation
|
page read and write
|
||
8E7000
|
heap
|
page read and write
|
||
2D5A000
|
trusted library allocation
|
page read and write
|
||
2DF5000
|
trusted library allocation
|
page read and write
|
||
2D95000
|
trusted library allocation
|
page read and write
|
||
2D81000
|
trusted library allocation
|
page read and write
|
||
2EFA000
|
trusted library allocation
|
page read and write
|
||
2D5C000
|
trusted library allocation
|
page read and write
|
||
2E4E000
|
trusted library allocation
|
page read and write
|
||
2DA3000
|
trusted library allocation
|
page read and write
|
||
2D95000
|
trusted library allocation
|
page read and write
|
||
2D58000
|
trusted library allocation
|
page read and write
|
||
86D000
|
heap
|
page read and write
|
||
2DE3000
|
trusted library allocation
|
page read and write
|
||
2DF4000
|
trusted library allocation
|
page read and write
|
||
2D81000
|
trusted library allocation
|
page read and write
|
||
8C0000
|
heap
|
page read and write
|
||
2F89000
|
trusted library allocation
|
page read and write
|
||
2DA3000
|
trusted library allocation
|
page read and write
|
||
2F04000
|
trusted library allocation
|
page read and write
|
||
2D9D000
|
trusted library allocation
|
page read and write
|
||
2DA3000
|
trusted library allocation
|
page read and write
|
||
2D9E000
|
trusted library allocation
|
page read and write
|
||
233D000
|
stack
|
page read and write
|
||
8C8000
|
heap
|
page read and write
|
||
2380000
|
heap
|
page read and write
|
||
2D9D000
|
trusted library allocation
|
page read and write
|
||
2360000
|
remote allocation
|
page read and write
|
||
21E0000
|
direct allocation
|
page read and write
|
||
447000
|
unkown
|
page execute and read and write
|
||
2DA3000
|
trusted library allocation
|
page read and write
|
||
2DFF000
|
trusted library allocation
|
page read and write
|
||
2E30000
|
trusted library allocation
|
page read and write
|
||
2D8D000
|
trusted library allocation
|
page read and write
|
||
630000
|
heap
|
page read and write
|
||
2D9D000
|
trusted library allocation
|
page read and write
|
||
2DFF000
|
trusted library allocation
|
page read and write
|
||
8ED000
|
heap
|
page read and write
|
||
2DF3000
|
trusted library allocation
|
page read and write
|
||
2D96000
|
trusted library allocation
|
page read and write
|
||
2D9D000
|
trusted library allocation
|
page read and write
|
||
2D9D000
|
trusted library allocation
|
page read and write
|
||
2B0E000
|
stack
|
page read and write
|
||
2E35000
|
trusted library allocation
|
page read and write
|
||
2E4A000
|
trusted library allocation
|
page read and write
|
||
2D79000
|
trusted library allocation
|
page read and write
|
||
2DF4000
|
trusted library allocation
|
page read and write
|
||
8EA000
|
heap
|
page read and write
|
||
2DEC000
|
trusted library allocation
|
page read and write
|
||
2E30000
|
trusted library allocation
|
page read and write
|
||
24CD000
|
stack
|
page read and write
|
||
2D9D000
|
trusted library allocation
|
page read and write
|
||
2E10000
|
trusted library allocation
|
page read and write
|
||
2D74000
|
trusted library allocation
|
page read and write
|
||
2D9D000
|
trusted library allocation
|
page read and write
|
||
32D3000
|
trusted library allocation
|
page read and write
|
||
2D9D000
|
trusted library allocation
|
page read and write
|
||
2F50000
|
trusted library allocation
|
page read and write
|
||
2E33000
|
trusted library allocation
|
page read and write
|
||
2F51000
|
trusted library allocation
|
page read and write
|
||
2E4E000
|
trusted library allocation
|
page read and write
|
||
2F3C000
|
trusted library allocation
|
page read and write
|
||
2D56000
|
trusted library allocation
|
page read and write
|
||
2D97000
|
trusted library allocation
|
page read and write
|
||
41A000
|
unkown
|
page readonly
|
||
2E4E000
|
trusted library allocation
|
page read and write
|
||
2F7D000
|
trusted library allocation
|
page read and write
|
||
7CE000
|
stack
|
page read and write
|
||
2D74000
|
trusted library allocation
|
page read and write
|
||
2DA3000
|
trusted library allocation
|
page read and write
|
||
2DF4000
|
trusted library allocation
|
page read and write
|
||
2E4E000
|
trusted library allocation
|
page read and write
|
||
2E30000
|
trusted library allocation
|
page read and write
|
||
7F0000
|
heap
|
page read and write
|
||
2DFD000
|
trusted library allocation
|
page read and write
|
||
2E4E000
|
trusted library allocation
|
page read and write
|
||
2DCC000
|
trusted library allocation
|
page read and write
|
||
2DA3000
|
trusted library allocation
|
page read and write
|
||
2D8E000
|
trusted library allocation
|
page read and write
|
||
8EA000
|
heap
|
page read and write
|
||
2D70000
|
trusted library allocation
|
page read and write
|
||
2580000
|
heap
|
page read and write
|
||
2D72000
|
trusted library allocation
|
page read and write
|
||
86A000
|
heap
|
page read and write
|
||
2DA3000
|
trusted library allocation
|
page read and write
|
||
2E30000
|
trusted library allocation
|
page read and write
|
||
2D80000
|
trusted library allocation
|
page read and write
|
||
2DA3000
|
trusted library allocation
|
page read and write
|
||
2DA3000
|
trusted library allocation
|
page read and write
|
||
197000
|
stack
|
page read and write
|
||
2DFF000
|
trusted library allocation
|
page read and write
|
||
2D74000
|
trusted library allocation
|
page read and write
|
||
2D50000
|
trusted library allocation
|
page read and write
|
||
2E20000
|
trusted library allocation
|
page read and write
|
||
2360000
|
remote allocation
|
page read and write
|
||
8E2000
|
heap
|
page read and write
|
||
2DF4000
|
trusted library allocation
|
page read and write
|
||
2E4E000
|
trusted library allocation
|
page read and write
|
||
2D86000
|
trusted library allocation
|
page read and write
|
||
2E30000
|
trusted library allocation
|
page read and write
|
||
54B000
|
unkown
|
page readonly
|
||
2E63000
|
trusted library allocation
|
page read and write
|
||
857000
|
heap
|
page read and write
|
||
2DF8000
|
trusted library allocation
|
page read and write
|
||
278F000
|
stack
|
page read and write
|
||
2DA3000
|
trusted library allocation
|
page read and write
|
||
8ED000
|
heap
|
page read and write
|
||
2DE7000
|
trusted library allocation
|
page read and write
|
||
2E19000
|
trusted library allocation
|
page read and write
|
||
8C4000
|
heap
|
page read and write
|
||
2D95000
|
trusted library allocation
|
page read and write
|
||
2DF4000
|
trusted library allocation
|
page read and write
|
||
857000
|
heap
|
page read and write
|
||
2C0F000
|
stack
|
page read and write
|
||
2DE7000
|
trusted library allocation
|
page read and write
|
||
7FA000
|
heap
|
page read and write
|
||
32D0000
|
trusted library allocation
|
page read and write
|
||
2D87000
|
trusted library allocation
|
page read and write
|
||
2D9E000
|
trusted library allocation
|
page read and write
|
||
2D95000
|
trusted library allocation
|
page read and write
|
||
2DE3000
|
trusted library allocation
|
page read and write
|
||
8C1000
|
heap
|
page read and write
|
||
2E4E000
|
trusted library allocation
|
page read and write
|
||
2D6E000
|
trusted library allocation
|
page read and write
|
||
268F000
|
stack
|
page read and write
|
||
2DA3000
|
trusted library allocation
|
page read and write
|
||
2DF4000
|
trusted library allocation
|
page read and write
|
||
84E000
|
heap
|
page read and write
|
||
2F34000
|
trusted library allocation
|
page read and write
|
||
88C000
|
heap
|
page read and write
|
||
2DF5000
|
trusted library allocation
|
page read and write
|
||
2DEB000
|
trusted library allocation
|
page read and write
|
||
2E09000
|
trusted library allocation
|
page read and write
|
||
2F58000
|
trusted library allocation
|
page read and write
|
||
2DA3000
|
trusted library allocation
|
page read and write
|
||
2DF4000
|
trusted library allocation
|
page read and write
|
||
2D5F000
|
trusted library allocation
|
page read and write
|
||
33B1000
|
trusted library allocation
|
page read and write
|
||
2DE7000
|
trusted library allocation
|
page read and write
|
||
8CD000
|
heap
|
page read and write
|
||
319E000
|
stack
|
page read and write
|
||
863000
|
heap
|
page read and write
|
||
2D7C000
|
trusted library allocation
|
page read and write
|
||
2D9D000
|
trusted library allocation
|
page read and write
|
||
2E22000
|
trusted library allocation
|
page read and write
|
||
2E94000
|
trusted library allocation
|
page read and write
|
||
8EC000
|
heap
|
page read and write
|
||
8ED000
|
heap
|
page read and write
|
||
2E22000
|
trusted library allocation
|
page read and write
|
||
2DA3000
|
trusted library allocation
|
page read and write
|
||
2D9D000
|
trusted library allocation
|
page read and write
|
||
2DA3000
|
trusted library allocation
|
page read and write
|
||
8DD000
|
heap
|
page read and write
|
||
2D4E000
|
stack
|
page read and write
|
||
2E4E000
|
trusted library allocation
|
page read and write
|
||
2E22000
|
trusted library allocation
|
page read and write
|
||
223D000
|
stack
|
page read and write
|
||
2E51000
|
heap
|
page read and write
|
||
2DEC000
|
trusted library allocation
|
page read and write
|
||
8EC000
|
heap
|
page read and write
|
||
2D9D000
|
trusted library allocation
|
page read and write
|
||
400000
|
unkown
|
page execute and read and write
|
||
2DA3000
|
trusted library allocation
|
page read and write
|
||
2F69000
|
trusted library allocation
|
page read and write
|
||
2DA3000
|
trusted library allocation
|
page read and write
|
||
8E0000
|
heap
|
page read and write
|
||
2DA3000
|
trusted library allocation
|
page read and write
|
||
2E4A000
|
trusted library allocation
|
page read and write
|
||
8EA000
|
heap
|
page read and write
|
||
8E7000
|
heap
|
page read and write
|
||
2D5C000
|
trusted library allocation
|
page read and write
|
||
2D9D000
|
trusted library allocation
|
page read and write
|
||
2E04000
|
trusted library allocation
|
page read and write
|
||
2D5D000
|
trusted library allocation
|
page read and write
|
||
38B2000
|
trusted library allocation
|
page read and write
|
||
8EE000
|
heap
|
page read and write
|
||
86D000
|
heap
|
page read and write
|
||
2D9D000
|
trusted library allocation
|
page read and write
|
||
2DA3000
|
trusted library allocation
|
page read and write
|
||
2D95000
|
trusted library allocation
|
page read and write
|
||
8C8000
|
heap
|
page read and write
|
||
2E53000
|
trusted library allocation
|
page read and write
|
||
8EA000
|
heap
|
page read and write
|
||
2D70000
|
trusted library allocation
|
page read and write
|
||
2E04000
|
trusted library allocation
|
page read and write
|
||
446000
|
unkown
|
page write copy
|
||
8E0000
|
heap
|
page read and write
|
||
2E4E000
|
trusted library allocation
|
page read and write
|
||
2DE5000
|
trusted library allocation
|
page read and write
|
||
2E30000
|
trusted library allocation
|
page read and write
|
||
80F000
|
heap
|
page execute and read and write
|
||
2DFD000
|
trusted library allocation
|
page read and write
|
||
401000
|
unkown
|
page execute read
|
||
2C4E000
|
stack
|
page read and write
|
||
2DE3000
|
trusted library allocation
|
page read and write
|
||
2DFF000
|
trusted library allocation
|
page read and write
|
||
2DA1000
|
trusted library allocation
|
page read and write
|
||
2E30000
|
trusted library allocation
|
page read and write
|
||
8D1000
|
heap
|
page read and write
|
||
2D5F000
|
trusted library allocation
|
page read and write
|
||
8E5000
|
heap
|
page read and write
|
||
83A000
|
heap
|
page read and write
|
||
2DEC000
|
trusted library allocation
|
page read and write
|
||
2D77000
|
trusted library allocation
|
page read and write
|
||
2D5C000
|
trusted library allocation
|
page read and write
|
||
2D86000
|
trusted library allocation
|
page read and write
|
||
2D56000
|
trusted library allocation
|
page read and write
|
||
2DA3000
|
trusted library allocation
|
page read and write
|
||
8E8000
|
heap
|
page read and write
|
||
250E000
|
stack
|
page read and write
|
||
2D95000
|
trusted library allocation
|
page read and write
|
||
86D000
|
heap
|
page read and write
|
||
2D9F000
|
trusted library allocation
|
page read and write
|
||
2D5F000
|
trusted library allocation
|
page read and write
|
||
2D86000
|
trusted library allocation
|
page read and write
|
||
2F8D000
|
trusted library allocation
|
page read and write
|
||
2DA3000
|
trusted library allocation
|
page read and write
|
||
2E30000
|
trusted library allocation
|
page read and write
|
||
21E0000
|
heap
|
page read and write
|
||
9EE000
|
stack
|
page read and write
|
||
84C000
|
heap
|
page read and write
|
||
2DE7000
|
trusted library allocation
|
page read and write
|
||
2DE5000
|
trusted library allocation
|
page read and write
|
||
2E10000
|
trusted library allocation
|
page read and write
|
||
85C000
|
heap
|
page read and write
|
||
2D86000
|
trusted library allocation
|
page read and write
|
||
2E28000
|
trusted library allocation
|
page read and write
|
||
84B000
|
heap
|
page read and write
|
||
2D79000
|
trusted library allocation
|
page read and write
|
||
2350000
|
heap
|
page read and write
|
||
1F0000
|
heap
|
page read and write
|
||
857000
|
heap
|
page read and write
|
||
2DA5000
|
trusted library allocation
|
page read and write
|
||
68E000
|
stack
|
page read and write
|
||
2DF1000
|
trusted library allocation
|
page read and write
|
||
2E25000
|
trusted library allocation
|
page read and write
|
||
2DA3000
|
trusted library allocation
|
page read and write
|
||
2D96000
|
trusted library allocation
|
page read and write
|
||
84D000
|
heap
|
page read and write
|
||
2D9E000
|
trusted library allocation
|
page read and write
|
||
2D8D000
|
trusted library allocation
|
page read and write
|
||
2D95000
|
trusted library allocation
|
page read and write
|
||
400000
|
unkown
|
page readonly
|
||
2D74000
|
trusted library allocation
|
page read and write
|
||
2E4E000
|
trusted library allocation
|
page read and write
|
||
2DF4000
|
trusted library allocation
|
page read and write
|
||
2E50000
|
heap
|
page read and write
|
||
2E4E000
|
trusted library allocation
|
page read and write
|
||
8E0000
|
heap
|
page read and write
|
||
2D8C000
|
trusted library allocation
|
page read and write
|
||
2DF4000
|
trusted library allocation
|
page read and write
|
||
2DA3000
|
trusted library allocation
|
page read and write
|
||
33A0000
|
heap
|
page read and write
|
||
2D91000
|
trusted library allocation
|
page read and write
|
||
8D1000
|
heap
|
page read and write
|
||
2D9D000
|
trusted library allocation
|
page read and write
|
||
2DE7000
|
trusted library allocation
|
page read and write
|
||
2E10000
|
trusted library allocation
|
page read and write
|
||
2D9D000
|
trusted library allocation
|
page read and write
|
||
2D96000
|
trusted library allocation
|
page read and write
|
||
2D9E000
|
trusted library allocation
|
page read and write
|
||
2E04000
|
trusted library allocation
|
page read and write
|
||
2DEC000
|
trusted library allocation
|
page read and write
|
||
2D57000
|
trusted library allocation
|
page read and write
|
||
2DEC000
|
trusted library allocation
|
page read and write
|
||
8C8000
|
heap
|
page read and write
|
||
2D9D000
|
trusted library allocation
|
page read and write
|
There are 403 hidden memdumps, click here to show them.