Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
file.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
initial sample
|
||
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_file.exe_5c35b761e7b2886414fdd9b14cedcc55e7ebf4_79a0e859_5203bd44-6de2-4e4f-aad8-78095cede41a\Report.wer
|
Unicode text, UTF-16, little-endian text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_file.exe_8ec75631d1328d44a8219509d535bd4f6799dd4_79a0e859_3912fa46-8569-4c49-a3ef-ca2a8cc690e1\Report.wer
|
Unicode text, UTF-16, little-endian text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WERC87B.tmp.dmp
|
Mini DuMP crash report, 15 streams, Sun Apr 21 06:41:02 2024, 0x1205a4 type
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WERC985.tmp.WERInternalMetadata.xml
|
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WERC9A6.tmp.xml
|
XML 1.0 document, ASCII text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WERCBB7.tmp.dmp
|
Mini DuMP crash report, 15 streams, Sun Apr 21 06:41:03 2024, 0x1205a4 type
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WERD107.tmp.WERInternalMetadata.xml
|
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WERD127.tmp.xml
|
XML 1.0 document, ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Windows\appcompat\Programs\Amcache.hve
|
MS Windows registry file, NT/2000 or above
|
dropped
|
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\file.exe
|
"C:\Users\user\Desktop\file.exe"
|
||
C:\Windows\SysWOW64\WerFault.exe
|
C:\Windows\SysWOW64\WerFault.exe -u -p 6244 -s 1468
|
||
C:\Windows\SysWOW64\WerFault.exe
|
C:\Windows\SysWOW64\WerFault.exe -u -p 6244 -s 1688
|
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
incredibleextedwj.shop
|
|||
shortsvelventysjo.shop
|
|||
tolerateilusidjukl.shop
|
|||
liabilitynighstjsko.shop
|
|||
shatterbreathepsw.shop
|
|||
demonstationfukewko.shop
|
|||
productivelookewr.shop
|
|||
strollheavengwu.shop
|
|||
alcojoldwograpciw.shop
|
|||
https://duckduckgo.com/chrome_newtab
|
unknown
|
||
https://strollheavengwu.shop/9
|
unknown
|
||
https://duckduckgo.com/ac/?q=
|
unknown
|
||
https://www.google.com/images/branding/product/ico/googleg_lodp.ico
|
unknown
|
||
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
|
unknown
|
||
https://strollheavengwu.shop/api
|
172.67.163.209
|
||
http://crl.rootca1.amazontrust.com/rootca1.crl0
|
unknown
|
||
http://upx.sf.net
|
unknown
|
||
https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
|
unknown
|
||
https://strollheavengwu.shop/9my$
|
unknown
|
||
http://ocsp.rootca1.amazontrust.com0:
|
unknown
|
||
https://strollheavengwu.shop/o
|
unknown
|
||
https://support.office.com/article/7D48285B-20E8-4B9B-91AD-216E34163BAD?wt.mc_id=EnterPK2016
|
unknown
|
||
https://support.office.com/article/94ba2e0b-638e-4a92-8857-2cb5ac1d8e17
|
unknown
|
||
https://strollheavengwu.shop/api/
|
unknown
|
||
https://www.ecosia.org/newtab/
|
unknown
|
||
https://support.mozilla.org/kb/customize-firefox-controls-buttons-and-toolbars?utm_source=firefox-br
|
unknown
|
||
https://ac.ecosia.org/autocomplete?q=
|
unknown
|
||
https://strollheavengwu.shop/apiy
|
unknown
|
||
https://strollheavengwu.shop/hZyI
|
unknown
|
||
http://x1.c.lencr.org/0
|
unknown
|
||
http://x1.i.lencr.org/0
|
unknown
|
||
https://strollheavengwu.sh
|
unknown
|
||
https://strollheavengwu.shop/apiRO
|
unknown
|
||
https://support.office.com/article/94ba2e0b-638e-4a92-8857-2cb5ac1d8e17Install
|
unknown
|
||
https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
|
unknown
|
||
https://support.microsof
|
unknown
|
||
http://crt.rootca1.amazontrust.com/rootca1.cer0?
|
unknown
|
||
https://strollheavengwu.shop/d
|
unknown
|
||
https://support.office.com/article/7D48285B-20E8-4B9B-91AD-216E34163BAD?wt.mc_id=EnterPK2016Examples
|
unknown
|
||
https://support.mozilla.org/products/firefoxgro.all
|
unknown
|
||
https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
|
unknown
|
||
https://strollheavengwu.shop/
|
unknown
|
There are 32 hidden URLs, click here to show them.
Domains
Name
|
IP
|
Malicious
|
|
---|---|---|---|
strollheavengwu.shop
|
172.67.163.209
|
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
172.67.163.209
|
strollheavengwu.shop
|
United States
|
Registry
Path
|
Value
|
Malicious
|
|
---|---|---|---|
\REGISTRY\A\{8b2b5152-f872-2fc3-3b27-a24b0939666f}\Root\InventoryApplicationFile\file.exe|ff8e65d6b06db8e5
|
ProgramId
|
||
\REGISTRY\A\{8b2b5152-f872-2fc3-3b27-a24b0939666f}\Root\InventoryApplicationFile\file.exe|ff8e65d6b06db8e5
|
FileId
|
||
\REGISTRY\A\{8b2b5152-f872-2fc3-3b27-a24b0939666f}\Root\InventoryApplicationFile\file.exe|ff8e65d6b06db8e5
|
LowerCaseLongPath
|
||
\REGISTRY\A\{8b2b5152-f872-2fc3-3b27-a24b0939666f}\Root\InventoryApplicationFile\file.exe|ff8e65d6b06db8e5
|
LongPathHash
|
||
\REGISTRY\A\{8b2b5152-f872-2fc3-3b27-a24b0939666f}\Root\InventoryApplicationFile\file.exe|ff8e65d6b06db8e5
|
Name
|
||
\REGISTRY\A\{8b2b5152-f872-2fc3-3b27-a24b0939666f}\Root\InventoryApplicationFile\file.exe|ff8e65d6b06db8e5
|
OriginalFileName
|
||
\REGISTRY\A\{8b2b5152-f872-2fc3-3b27-a24b0939666f}\Root\InventoryApplicationFile\file.exe|ff8e65d6b06db8e5
|
Publisher
|
||
\REGISTRY\A\{8b2b5152-f872-2fc3-3b27-a24b0939666f}\Root\InventoryApplicationFile\file.exe|ff8e65d6b06db8e5
|
Version
|
||
\REGISTRY\A\{8b2b5152-f872-2fc3-3b27-a24b0939666f}\Root\InventoryApplicationFile\file.exe|ff8e65d6b06db8e5
|
BinFileVersion
|
||
\REGISTRY\A\{8b2b5152-f872-2fc3-3b27-a24b0939666f}\Root\InventoryApplicationFile\file.exe|ff8e65d6b06db8e5
|
BinaryType
|
||
\REGISTRY\A\{8b2b5152-f872-2fc3-3b27-a24b0939666f}\Root\InventoryApplicationFile\file.exe|ff8e65d6b06db8e5
|
ProductName
|
||
\REGISTRY\A\{8b2b5152-f872-2fc3-3b27-a24b0939666f}\Root\InventoryApplicationFile\file.exe|ff8e65d6b06db8e5
|
ProductVersion
|
||
\REGISTRY\A\{8b2b5152-f872-2fc3-3b27-a24b0939666f}\Root\InventoryApplicationFile\file.exe|ff8e65d6b06db8e5
|
LinkDate
|
||
\REGISTRY\A\{8b2b5152-f872-2fc3-3b27-a24b0939666f}\Root\InventoryApplicationFile\file.exe|ff8e65d6b06db8e5
|
BinProductVersion
|
||
\REGISTRY\A\{8b2b5152-f872-2fc3-3b27-a24b0939666f}\Root\InventoryApplicationFile\file.exe|ff8e65d6b06db8e5
|
AppxPackageFullName
|
||
\REGISTRY\A\{8b2b5152-f872-2fc3-3b27-a24b0939666f}\Root\InventoryApplicationFile\file.exe|ff8e65d6b06db8e5
|
AppxPackageRelativeId
|
||
\REGISTRY\A\{8b2b5152-f872-2fc3-3b27-a24b0939666f}\Root\InventoryApplicationFile\file.exe|ff8e65d6b06db8e5
|
Size
|
||
\REGISTRY\A\{8b2b5152-f872-2fc3-3b27-a24b0939666f}\Root\InventoryApplicationFile\file.exe|ff8e65d6b06db8e5
|
Language
|
||
\REGISTRY\A\{8b2b5152-f872-2fc3-3b27-a24b0939666f}\Root\InventoryApplicationFile\file.exe|ff8e65d6b06db8e5
|
Usn
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\IdentityCRL\ClockData
|
ClockTimeSeconds
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\IdentityCRL\ClockData
|
TickCount
|
There are 11 hidden registries, click here to show them.
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
400000
|
unkown
|
page execute and read and write
|
||
4275000
|
trusted library allocation
|
page read and write
|
||
4234000
|
trusted library allocation
|
page read and write
|
||
4226000
|
trusted library allocation
|
page read and write
|
||
425A000
|
trusted library allocation
|
page read and write
|
||
425C000
|
trusted library allocation
|
page read and write
|
||
426D000
|
trusted library allocation
|
page read and write
|
||
A1000
|
stack
|
page read and write
|
||
427D000
|
trusted library allocation
|
page read and write
|
||
424A000
|
trusted library allocation
|
page read and write
|
||
426C000
|
trusted library allocation
|
page read and write
|
||
425E000
|
trusted library allocation
|
page read and write
|
||
423C000
|
trusted library allocation
|
page read and write
|
||
1D10000
|
heap
|
page read and write
|
||
4229000
|
trusted library allocation
|
page read and write
|
||
1D80000
|
heap
|
page read and write
|
||
421F000
|
trusted library allocation
|
page read and write
|
||
422D000
|
trusted library allocation
|
page read and write
|
||
4256000
|
trusted library allocation
|
page read and write
|
||
1D8E000
|
heap
|
page read and write
|
||
1CF6000
|
heap
|
page read and write
|
||
4225000
|
trusted library allocation
|
page read and write
|
||
4266000
|
trusted library allocation
|
page read and write
|
||
4256000
|
trusted library allocation
|
page read and write
|
||
423E000
|
trusted library allocation
|
page read and write
|
||
423E000
|
trusted library allocation
|
page read and write
|
||
1D18000
|
heap
|
page read and write
|
||
4211000
|
trusted library allocation
|
page read and write
|
||
422D000
|
trusted library allocation
|
page read and write
|
||
422C000
|
trusted library allocation
|
page read and write
|
||
421A000
|
trusted library allocation
|
page read and write
|
||
421C000
|
trusted library allocation
|
page read and write
|
||
1D90000
|
heap
|
page read and write
|
||
427A000
|
trusted library allocation
|
page read and write
|
||
46F0000
|
heap
|
page read and write
|
||
42A6000
|
trusted library allocation
|
page read and write
|
||
1D04000
|
heap
|
page read and write
|
||
1D8B000
|
heap
|
page read and write
|
||
4266000
|
trusted library allocation
|
page read and write
|
||
3780000
|
remote allocation
|
page read and write
|
||
1D18000
|
heap
|
page read and write
|
||
1D04000
|
heap
|
page read and write
|
||
422F000
|
trusted library allocation
|
page read and write
|
||
4266000
|
trusted library allocation
|
page read and write
|
||
43BE000
|
trusted library allocation
|
page read and write
|
||
434E000
|
trusted library allocation
|
page read and write
|
||
1D93000
|
heap
|
page read and write
|
||
4229000
|
trusted library allocation
|
page read and write
|
||
4257000
|
trusted library allocation
|
page read and write
|
||
1D92000
|
heap
|
page read and write
|
||
421E000
|
trusted library allocation
|
page read and write
|
||
424C000
|
trusted library allocation
|
page read and write
|
||
4273000
|
trusted library allocation
|
page read and write
|
||
4229000
|
trusted library allocation
|
page read and write
|
||
4231000
|
trusted library allocation
|
page read and write
|
||
4234000
|
trusted library allocation
|
page read and write
|
||
1B85000
|
heap
|
page read and write
|
||
1D1D000
|
heap
|
page read and write
|
||
45AB000
|
trusted library allocation
|
page read and write
|
||
4257000
|
trusted library allocation
|
page read and write
|
||
41E000
|
unkown
|
page write copy
|
||
4220000
|
trusted library allocation
|
page read and write
|
||
4251000
|
trusted library allocation
|
page read and write
|
||
1D76000
|
heap
|
page read and write
|
||
42C2000
|
trusted library allocation
|
page read and write
|
||
421E000
|
trusted library allocation
|
page read and write
|
||
422D000
|
trusted library allocation
|
page read and write
|
||
4317000
|
trusted library allocation
|
page read and write
|
||
411000
|
unkown
|
page readonly
|
||
1CBE000
|
heap
|
page execute and read and write
|
||
4C02000
|
trusted library allocation
|
page read and write
|
||
1D3D000
|
heap
|
page read and write
|
||
4257000
|
trusted library allocation
|
page read and write
|
||
4263000
|
trusted library allocation
|
page read and write
|
||
4265000
|
trusted library allocation
|
page read and write
|
||
4229000
|
trusted library allocation
|
page read and write
|
||
4211000
|
trusted library allocation
|
page read and write
|
||
1D3E000
|
heap
|
page read and write
|
||
4220000
|
trusted library allocation
|
page read and write
|
||
423F000
|
trusted library allocation
|
page read and write
|
||
4263000
|
trusted library allocation
|
page read and write
|
||
422C000
|
trusted library allocation
|
page read and write
|
||
4220000
|
trusted library allocation
|
page read and write
|
||
1F0000
|
heap
|
page read and write
|
||
1D81000
|
heap
|
page read and write
|
||
1D95000
|
heap
|
page read and write
|
||
422C000
|
trusted library allocation
|
page read and write
|
||
1D8E000
|
heap
|
page read and write
|
||
4257000
|
trusted library allocation
|
page read and write
|
||
400000
|
unkown
|
page readonly
|
||
4225000
|
trusted library allocation
|
page read and write
|
||
4295000
|
trusted library allocation
|
page read and write
|
||
4295000
|
trusted library allocation
|
page read and write
|
||
1C8F000
|
stack
|
page read and write
|
||
4244000
|
trusted library allocation
|
page read and write
|
||
45AD000
|
trusted library allocation
|
page read and write
|
||
4275000
|
trusted library allocation
|
page read and write
|
||
426C000
|
trusted library allocation
|
page read and write
|
||
4226000
|
trusted library allocation
|
page read and write
|
||
422C000
|
trusted library allocation
|
page read and write
|
||
42C2000
|
trusted library allocation
|
page read and write
|
||
1D8A000
|
heap
|
page read and write
|
||
422D000
|
trusted library allocation
|
page read and write
|
||
4310000
|
heap
|
page read and write
|
||
1D2A000
|
heap
|
page read and write
|
||
1D76000
|
heap
|
page read and write
|
||
4212000
|
trusted library allocation
|
page read and write
|
||
421E000
|
trusted library allocation
|
page read and write
|
||
1D98000
|
heap
|
page read and write
|
||
4266000
|
trusted library allocation
|
page read and write
|
||
367F000
|
stack
|
page read and write
|
||
4259000
|
trusted library allocation
|
page read and write
|
||
421E000
|
trusted library allocation
|
page read and write
|
||
4211000
|
trusted library allocation
|
page read and write
|
||
4246000
|
trusted library allocation
|
page read and write
|
||
4267000
|
trusted library allocation
|
page read and write
|
||
427F000
|
trusted library allocation
|
page read and write
|
||
1D76000
|
heap
|
page read and write
|
||
422D000
|
trusted library allocation
|
page read and write
|
||
423F000
|
trusted library allocation
|
page read and write
|
||
1D18000
|
heap
|
page read and write
|
||
4211000
|
trusted library allocation
|
page read and write
|
||
1D95000
|
heap
|
page read and write
|
||
357E000
|
stack
|
page read and write
|
||
470B000
|
trusted library allocation
|
page read and write
|
||
1D2A000
|
heap
|
page read and write
|
||
418000
|
unkown
|
page write copy
|
||
4244000
|
trusted library allocation
|
page read and write
|
||
4264000
|
trusted library allocation
|
page read and write
|
||
4296000
|
trusted library allocation
|
page read and write
|
||
4237000
|
trusted library allocation
|
page read and write
|
||
3780000
|
remote allocation
|
page read and write
|
||
3700000
|
direct allocation
|
page read and write
|
||
1CEC000
|
heap
|
page read and write
|
||
1D8E000
|
heap
|
page read and write
|
||
40FE000
|
stack
|
page read and write
|
||
3790000
|
heap
|
page read and write
|
||
373E000
|
stack
|
page read and write
|
||
1D95000
|
heap
|
page read and write
|
||
422C000
|
trusted library allocation
|
page read and write
|
||
4217000
|
trusted library allocation
|
page read and write
|
||
1CFE000
|
heap
|
page read and write
|
||
1D78000
|
heap
|
page read and write
|
||
43F6000
|
trusted library allocation
|
page read and write
|
||
41FE000
|
stack
|
page read and write
|
||
427B000
|
trusted library allocation
|
page read and write
|
||
425D000
|
trusted library allocation
|
page read and write
|
||
446E000
|
stack
|
page read and write
|
||
4234000
|
trusted library allocation
|
page read and write
|
||
1CA8000
|
heap
|
page read and write
|
||
4249000
|
trusted library allocation
|
page read and write
|
||
4258000
|
trusted library allocation
|
page read and write
|
||
1D1C000
|
heap
|
page read and write
|
||
42C2000
|
trusted library allocation
|
page read and write
|
||
4258000
|
trusted library allocation
|
page read and write
|
||
4234000
|
trusted library allocation
|
page read and write
|
||
3780000
|
remote allocation
|
page read and write
|
||
4261000
|
trusted library allocation
|
page read and write
|
||
1B80000
|
heap
|
page read and write
|
||
1D1B000
|
heap
|
page read and write
|
||
4253000
|
trusted library allocation
|
page read and write
|
||
425E000
|
trusted library allocation
|
page read and write
|
||
1D94000
|
heap
|
page read and write
|
||
4254000
|
trusted library allocation
|
page read and write
|
||
1A12000
|
unkown
|
page read and write
|
||
4256000
|
trusted library allocation
|
page read and write
|
||
3FBE000
|
stack
|
page read and write
|
||
421E000
|
trusted library allocation
|
page read and write
|
||
4258000
|
trusted library allocation
|
page read and write
|
||
1D00000
|
heap
|
page read and write
|
||
422F000
|
trusted library allocation
|
page read and write
|
||
422D000
|
trusted library allocation
|
page read and write
|
||
421E000
|
trusted library allocation
|
page read and write
|
||
3ADF000
|
stack
|
page read and write
|
||
1D7B000
|
heap
|
page read and write
|
||
422D000
|
trusted library allocation
|
page read and write
|
||
39DE000
|
stack
|
page read and write
|
||
1D76000
|
heap
|
page read and write
|
||
422D000
|
trusted library allocation
|
page read and write
|
||
422D000
|
trusted library allocation
|
page read and write
|
||
4264000
|
trusted library allocation
|
page read and write
|
||
1D8B000
|
heap
|
page read and write
|
||
1D2A000
|
heap
|
page read and write
|
||
1D76000
|
heap
|
page read and write
|
||
4256000
|
trusted library allocation
|
page read and write
|
||
4271000
|
trusted library allocation
|
page read and write
|
||
4336000
|
trusted library allocation
|
page read and write
|
||
436E000
|
trusted library allocation
|
page read and write
|
||
1D93000
|
heap
|
page read and write
|
||
422C000
|
trusted library allocation
|
page read and write
|
||
422D000
|
trusted library allocation
|
page read and write
|
||
4218000
|
trusted library allocation
|
page read and write
|
||
4285000
|
trusted library allocation
|
page read and write
|
||
44B000
|
unkown
|
page execute and read and write
|
||
1CFC000
|
heap
|
page read and write
|
||
422D000
|
trusted library allocation
|
page read and write
|
||
429E000
|
trusted library allocation
|
page read and write
|
||
4264000
|
trusted library allocation
|
page read and write
|
||
4215000
|
trusted library allocation
|
page read and write
|
||
425C000
|
trusted library allocation
|
page read and write
|
||
4247000
|
trusted library allocation
|
page read and write
|
||
427D000
|
trusted library allocation
|
page read and write
|
||
426D000
|
trusted library allocation
|
page read and write
|
||
40BF000
|
stack
|
page read and write
|
||
1D2A000
|
heap
|
page read and write
|
||
1D92000
|
heap
|
page read and write
|
||
3B1E000
|
stack
|
page read and write
|
||
4266000
|
trusted library allocation
|
page read and write
|
||
4251000
|
trusted library allocation
|
page read and write
|
||
4258000
|
trusted library allocation
|
page read and write
|
||
4258000
|
trusted library allocation
|
page read and write
|
||
4234000
|
trusted library allocation
|
page read and write
|
||
1D96000
|
heap
|
page read and write
|
||
4268000
|
trusted library allocation
|
page read and write
|
||
4259000
|
trusted library allocation
|
page read and write
|
||
4234000
|
trusted library allocation
|
page read and write
|
||
1B5E000
|
stack
|
page read and write
|
||
3680000
|
direct allocation
|
page execute and read and write
|
||
1A14000
|
unkown
|
page readonly
|
||
4245000
|
trusted library allocation
|
page read and write
|
||
422C000
|
trusted library allocation
|
page read and write
|
||
1CAE000
|
heap
|
page read and write
|
||
43EE000
|
trusted library allocation
|
page read and write
|
||
9B000
|
stack
|
page read and write
|
||
421F000
|
trusted library allocation
|
page read and write
|
||
4244000
|
trusted library allocation
|
page read and write
|
||
4247000
|
trusted library allocation
|
page read and write
|
||
4486000
|
trusted library allocation
|
page read and write
|
||
377D000
|
stack
|
page read and write
|
||
399E000
|
stack
|
page read and write
|
||
1D04000
|
heap
|
page read and write
|
||
42AB000
|
trusted library allocation
|
page read and write
|
||
1D1A000
|
heap
|
page read and write
|
||
1D76000
|
heap
|
page read and write
|
||
422C000
|
trusted library allocation
|
page read and write
|
||
4276000
|
trusted library allocation
|
page read and write
|
||
1D8E000
|
heap
|
page read and write
|
||
4246000
|
trusted library allocation
|
page read and write
|
||
4244000
|
trusted library allocation
|
page read and write
|
||
421D000
|
trusted library allocation
|
page read and write
|
||
4311000
|
heap
|
page read and write
|
||
4211000
|
trusted library allocation
|
page read and write
|
||
423C000
|
trusted library allocation
|
page read and write
|
||
4232000
|
trusted library allocation
|
page read and write
|
||
1D8B000
|
heap
|
page read and write
|
||
1D2A000
|
heap
|
page read and write
|
||
1A14000
|
unkown
|
page readonly
|
||
1D92000
|
heap
|
page read and write
|
||
4243000
|
trusted library allocation
|
page read and write
|
||
1CFF000
|
heap
|
page read and write
|
||
424A000
|
trusted library allocation
|
page read and write
|
||
4286000
|
trusted library allocation
|
page read and write
|
||
421E000
|
trusted library allocation
|
page read and write
|
||
422C000
|
trusted library allocation
|
page read and write
|
||
421E000
|
trusted library allocation
|
page read and write
|
||
4263000
|
trusted library allocation
|
page read and write
|
||
1D8E000
|
heap
|
page read and write
|
||
422C000
|
trusted library allocation
|
page read and write
|
||
4295000
|
trusted library allocation
|
page read and write
|
||
42C2000
|
trusted library allocation
|
page read and write
|
||
4240000
|
trusted library allocation
|
page read and write
|
||
422B000
|
trusted library allocation
|
page read and write
|
||
425C000
|
trusted library allocation
|
page read and write
|
||
4229000
|
trusted library allocation
|
page read and write
|
||
4268000
|
trusted library allocation
|
page read and write
|
||
1D7D000
|
heap
|
page read and write
|
||
422D000
|
trusted library allocation
|
page read and write
|
||
43E6000
|
trusted library allocation
|
page read and write
|
||
1D90000
|
heap
|
page read and write
|
||
1D90000
|
heap
|
page read and write
|
||
422F000
|
trusted library allocation
|
page read and write
|
||
424C000
|
trusted library allocation
|
page read and write
|
||
426E000
|
trusted library allocation
|
page read and write
|
||
4245000
|
trusted library allocation
|
page read and write
|
||
4231000
|
trusted library allocation
|
page read and write
|
||
42B6000
|
trusted library allocation
|
page read and write
|
||
422C000
|
trusted library allocation
|
page read and write
|
||
1D91000
|
heap
|
page read and write
|
||
4234000
|
trusted library allocation
|
page read and write
|
||
4218000
|
trusted library allocation
|
page read and write
|
||
4256000
|
trusted library allocation
|
page read and write
|
||
4266000
|
trusted library allocation
|
page read and write
|
||
4220000
|
trusted library allocation
|
page read and write
|
||
4244000
|
trusted library allocation
|
page read and write
|
||
1D8E000
|
heap
|
page read and write
|
||
4266000
|
trusted library allocation
|
page read and write
|
||
1D95000
|
heap
|
page read and write
|
||
4210000
|
trusted library allocation
|
page read and write
|
||
1D78000
|
heap
|
page read and write
|
||
4216000
|
trusted library allocation
|
page read and write
|
||
4225000
|
trusted library allocation
|
page read and write
|
||
4212000
|
trusted library allocation
|
page read and write
|
||
421C000
|
trusted library allocation
|
page read and write
|
||
1D9E000
|
heap
|
page read and write
|
||
5114000
|
trusted library allocation
|
page read and write
|
||
4231000
|
trusted library allocation
|
page read and write
|
||
4212000
|
trusted library allocation
|
page read and write
|
||
389D000
|
stack
|
page read and write
|
||
1CA0000
|
heap
|
page read and write
|
||
1D76000
|
heap
|
page read and write
|
||
422D000
|
trusted library allocation
|
page read and write
|
||
1B87000
|
heap
|
page read and write
|
||
1D2A000
|
heap
|
page read and write
|
||
1D90000
|
heap
|
page read and write
|
||
4256000
|
trusted library allocation
|
page read and write
|
||
4227000
|
trusted library allocation
|
page read and write
|
||
4246000
|
trusted library allocation
|
page read and write
|
||
1D1A000
|
heap
|
page read and write
|
||
422C000
|
trusted library allocation
|
page read and write
|
||
4295000
|
trusted library allocation
|
page read and write
|
||
421A000
|
trusted library allocation
|
page read and write
|
||
421E000
|
trusted library allocation
|
page read and write
|
||
4275000
|
trusted library allocation
|
page read and write
|
||
1D90000
|
heap
|
page read and write
|
||
421E000
|
trusted library allocation
|
page read and write
|
||
422D000
|
trusted library allocation
|
page read and write
|
||
4211000
|
trusted library allocation
|
page read and write
|
||
426C000
|
trusted library allocation
|
page read and write
|
||
4256000
|
trusted library allocation
|
page read and write
|
||
421E000
|
trusted library allocation
|
page read and write
|
||
4244000
|
trusted library allocation
|
page read and write
|
||
4251000
|
trusted library allocation
|
page read and write
|
||
4214000
|
trusted library allocation
|
page read and write
|
||
425D000
|
trusted library allocation
|
page read and write
|
||
422D000
|
trusted library allocation
|
page read and write
|
||
1B10000
|
heap
|
page read and write
|
||
456F000
|
stack
|
page read and write
|
||
1D95000
|
heap
|
page read and write
|
||
431D000
|
trusted library allocation
|
page read and write
|
||
422D000
|
trusted library allocation
|
page read and write
|
||
424A000
|
trusted library allocation
|
page read and write
|
||
4242000
|
trusted library allocation
|
page read and write
|
||
427A000
|
trusted library allocation
|
page read and write
|
||
422A000
|
trusted library allocation
|
page read and write
|
||
4229000
|
trusted library allocation
|
page read and write
|
||
3C1F000
|
stack
|
page read and write
|
||
36D0000
|
heap
|
page read and write
|
||
422C000
|
trusted library allocation
|
page read and write
|
||
4276000
|
trusted library allocation
|
page read and write
|
||
423D000
|
trusted library allocation
|
page read and write
|
||
36F0000
|
heap
|
page read and write
|
||
423E000
|
trusted library allocation
|
page read and write
|
||
4229000
|
trusted library allocation
|
page read and write
|
||
401000
|
unkown
|
page execute read
|
There are 334 hidden memdumps, click here to show them.