Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
qrLdMv1QXG.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
initial sample
|
||
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_qrLdMv1QXG.exe_6f2fc2e5454b6ca343fbd4712c4948319d291f0_4915b7ca_140b9d2d-4e76-46c7-ad79-3a5aba1822de\Report.wer
|
Unicode text, UTF-16, little-endian text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_qrLdMv1QXG.exe_dab42b4fbe31c195557b22d8807203fa4c45350_4915b7ca_5670d64c-ae8b-4d92-80a6-a5bc086660b9\Report.wer
|
Unicode text, UTF-16, little-endian text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WERE1F1.tmp.dmp
|
Mini DuMP crash report, 15 streams, Sun Apr 21 08:03:08 2024, 0x1205a4 type
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WERE2DC.tmp.WERInternalMetadata.xml
|
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WERE31C.tmp.xml
|
XML 1.0 document, ASCII text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WERE637.tmp.dmp
|
Mini DuMP crash report, 15 streams, Sun Apr 21 08:03:10 2024, 0x1205a4 type
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WERF328.tmp.WERInternalMetadata.xml
|
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WERF358.tmp.xml
|
XML 1.0 document, ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Windows\appcompat\Programs\Amcache.hve
|
MS Windows registry file, NT/2000 or above
|
dropped
|
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\qrLdMv1QXG.exe
|
"C:\Users\user\Desktop\qrLdMv1QXG.exe"
|
||
C:\Windows\SysWOW64\WerFault.exe
|
C:\Windows\SysWOW64\WerFault.exe -u -p 2504 -s 1520
|
||
C:\Windows\SysWOW64\WerFault.exe
|
C:\Windows\SysWOW64\WerFault.exe -u -p 2504 -s 1656
|
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
incredibleextedwj.shop
|
|||
shortsvelventysjo.shop
|
|||
tolerateilusidjukl.shop
|
|||
liabilitynighstjsko.shop
|
|||
shatterbreathepsw.shop
|
|||
demonstationfukewko.shop
|
|||
productivelookewr.shop
|
|||
strollheavengwu.shop
|
|||
alcojoldwograpciw.shop
|
|||
https://duckduckgo.com/chrome_newtab
|
unknown
|
||
https://strollheavengwu.shop/9
|
unknown
|
||
https://duckduckgo.com/ac/?q=
|
unknown
|
||
https://www.google.com/images/branding/product/ico/googleg_lodp.ico
|
unknown
|
||
https://strollheavengwu.shop/E
|
unknown
|
||
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
|
unknown
|
||
https://strollheavengwu.shop/api
|
104.21.15.198
|
||
http://crl.rootca1.amazontrust.com/rootca1.crl0
|
unknown
|
||
http://upx.sf.net
|
unknown
|
||
https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
|
unknown
|
||
http://ocsp.rootca1.amazontrust.com0:
|
unknown
|
||
https://www.ecosia.org/newtab/
|
unknown
|
||
https://support.mozilla.org/kb/customize-firefox-controls-buttons-and-toolbars?utm_source=firefox-br
|
unknown
|
||
https://ac.ecosia.org/autocomplete?q=
|
unknown
|
||
http://x1.c.lencr.org/0
|
unknown
|
||
http://x1.i.lencr.org/0
|
unknown
|
||
https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
|
unknown
|
||
http://crt.rootca1.amazontrust.com/rootca1.cer0?
|
unknown
|
||
https://strollheavengwu.shop/apies:
|
unknown
|
||
https://strollheavengwu.shop/C1
|
unknown
|
||
https://support.mozilla.org/products/firefoxgro.all
|
unknown
|
||
https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
|
unknown
|
||
https://strollheavengwu.shop/
|
unknown
|
There are 22 hidden URLs, click here to show them.
Domains
Name
|
IP
|
Malicious
|
|
---|---|---|---|
strollheavengwu.shop
|
104.21.15.198
|
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
104.21.15.198
|
strollheavengwu.shop
|
United States
|
Registry
Path
|
Value
|
Malicious
|
|
---|---|---|---|
\REGISTRY\A\{95736e5c-def7-c70d-4b06-ba2ab6796163}\Root\InventoryApplicationFile\qrldmv1qxg.exe|b6ca8a5efc987b74
|
ProgramId
|
||
\REGISTRY\A\{95736e5c-def7-c70d-4b06-ba2ab6796163}\Root\InventoryApplicationFile\qrldmv1qxg.exe|b6ca8a5efc987b74
|
FileId
|
||
\REGISTRY\A\{95736e5c-def7-c70d-4b06-ba2ab6796163}\Root\InventoryApplicationFile\qrldmv1qxg.exe|b6ca8a5efc987b74
|
LowerCaseLongPath
|
||
\REGISTRY\A\{95736e5c-def7-c70d-4b06-ba2ab6796163}\Root\InventoryApplicationFile\qrldmv1qxg.exe|b6ca8a5efc987b74
|
LongPathHash
|
||
\REGISTRY\A\{95736e5c-def7-c70d-4b06-ba2ab6796163}\Root\InventoryApplicationFile\qrldmv1qxg.exe|b6ca8a5efc987b74
|
Name
|
||
\REGISTRY\A\{95736e5c-def7-c70d-4b06-ba2ab6796163}\Root\InventoryApplicationFile\qrldmv1qxg.exe|b6ca8a5efc987b74
|
OriginalFileName
|
||
\REGISTRY\A\{95736e5c-def7-c70d-4b06-ba2ab6796163}\Root\InventoryApplicationFile\qrldmv1qxg.exe|b6ca8a5efc987b74
|
Publisher
|
||
\REGISTRY\A\{95736e5c-def7-c70d-4b06-ba2ab6796163}\Root\InventoryApplicationFile\qrldmv1qxg.exe|b6ca8a5efc987b74
|
Version
|
||
\REGISTRY\A\{95736e5c-def7-c70d-4b06-ba2ab6796163}\Root\InventoryApplicationFile\qrldmv1qxg.exe|b6ca8a5efc987b74
|
BinFileVersion
|
||
\REGISTRY\A\{95736e5c-def7-c70d-4b06-ba2ab6796163}\Root\InventoryApplicationFile\qrldmv1qxg.exe|b6ca8a5efc987b74
|
BinaryType
|
||
\REGISTRY\A\{95736e5c-def7-c70d-4b06-ba2ab6796163}\Root\InventoryApplicationFile\qrldmv1qxg.exe|b6ca8a5efc987b74
|
ProductName
|
||
\REGISTRY\A\{95736e5c-def7-c70d-4b06-ba2ab6796163}\Root\InventoryApplicationFile\qrldmv1qxg.exe|b6ca8a5efc987b74
|
ProductVersion
|
||
\REGISTRY\A\{95736e5c-def7-c70d-4b06-ba2ab6796163}\Root\InventoryApplicationFile\qrldmv1qxg.exe|b6ca8a5efc987b74
|
LinkDate
|
||
\REGISTRY\A\{95736e5c-def7-c70d-4b06-ba2ab6796163}\Root\InventoryApplicationFile\qrldmv1qxg.exe|b6ca8a5efc987b74
|
BinProductVersion
|
||
\REGISTRY\A\{95736e5c-def7-c70d-4b06-ba2ab6796163}\Root\InventoryApplicationFile\qrldmv1qxg.exe|b6ca8a5efc987b74
|
AppxPackageFullName
|
||
\REGISTRY\A\{95736e5c-def7-c70d-4b06-ba2ab6796163}\Root\InventoryApplicationFile\qrldmv1qxg.exe|b6ca8a5efc987b74
|
AppxPackageRelativeId
|
||
\REGISTRY\A\{95736e5c-def7-c70d-4b06-ba2ab6796163}\Root\InventoryApplicationFile\qrldmv1qxg.exe|b6ca8a5efc987b74
|
Size
|
||
\REGISTRY\A\{95736e5c-def7-c70d-4b06-ba2ab6796163}\Root\InventoryApplicationFile\qrldmv1qxg.exe|b6ca8a5efc987b74
|
Language
|
||
\REGISTRY\A\{95736e5c-def7-c70d-4b06-ba2ab6796163}\Root\InventoryApplicationFile\qrldmv1qxg.exe|b6ca8a5efc987b74
|
Usn
|
There are 9 hidden registries, click here to show them.
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
400000
|
unkown
|
page execute and read and write
|
||
1CC0000
|
heap
|
page read and write
|
||
423A000
|
trusted library allocation
|
page read and write
|
||
442A000
|
trusted library allocation
|
page read and write
|
||
4439000
|
trusted library allocation
|
page read and write
|
||
42A4000
|
trusted library allocation
|
page read and write
|
||
4294000
|
trusted library allocation
|
page read and write
|
||
423B000
|
trusted library allocation
|
page read and write
|
||
1DB6000
|
heap
|
page read and write
|
||
1DAF000
|
heap
|
page read and write
|
||
4236000
|
trusted library allocation
|
page read and write
|
||
374E000
|
stack
|
page read and write
|
||
465E000
|
stack
|
page read and write
|
||
4237000
|
trusted library allocation
|
page read and write
|
||
51C7000
|
trusted library allocation
|
page read and write
|
||
1CCE000
|
heap
|
page read and write
|
||
1DAB000
|
heap
|
page read and write
|
||
1D8F000
|
heap
|
page read and write
|
||
4200000
|
trusted library allocation
|
page read and write
|
||
1DA8000
|
heap
|
page read and write
|
||
4478000
|
trusted library allocation
|
page read and write
|
||
400000
|
unkown
|
page readonly
|
||
3760000
|
remote allocation
|
page read and write
|
||
1DB2000
|
heap
|
page read and write
|
||
1DB6000
|
heap
|
page read and write
|
||
43D8000
|
trusted library allocation
|
page read and write
|
||
1DB4000
|
heap
|
page read and write
|
||
4250000
|
trusted library allocation
|
page read and write
|
||
4236000
|
trusted library allocation
|
page read and write
|
||
1B55000
|
heap
|
page read and write
|
||
421B000
|
trusted library allocation
|
page read and write
|
||
429B000
|
trusted library allocation
|
page read and write
|
||
420B000
|
trusted library allocation
|
page read and write
|
||
4236000
|
trusted library allocation
|
page read and write
|
||
1DA5000
|
heap
|
page read and write
|
||
42C6000
|
trusted library allocation
|
page read and write
|
||
42DC000
|
trusted library allocation
|
page read and write
|
||
1A13000
|
unkown
|
page readonly
|
||
3FAE000
|
stack
|
page read and write
|
||
1DB8000
|
heap
|
page read and write
|
||
427F000
|
trusted library allocation
|
page read and write
|
||
42A4000
|
trusted library allocation
|
page read and write
|
||
4CB1000
|
trusted library allocation
|
page read and write
|
||
425F000
|
trusted library allocation
|
page read and write
|
||
42BD000
|
trusted library allocation
|
page read and write
|
||
47BA000
|
trusted library allocation
|
page read and write
|
||
1CDE000
|
heap
|
page execute and read and write
|
||
4425000
|
trusted library allocation
|
page read and write
|
||
42D5000
|
trusted library allocation
|
page read and write
|
||
1B57000
|
heap
|
page read and write
|
||
3760000
|
remote allocation
|
page read and write
|
||
429D000
|
trusted library allocation
|
page read and write
|
||
43AA000
|
trusted library allocation
|
page read and write
|
||
4401000
|
trusted library allocation
|
page read and write
|
||
37CE000
|
stack
|
page read and write
|
||
4408000
|
trusted library allocation
|
page read and write
|
||
1DAF000
|
heap
|
page read and write
|
||
4429000
|
trusted library allocation
|
page read and write
|
||
40AF000
|
stack
|
page read and write
|
||
3C2F000
|
stack
|
page read and write
|
||
A1000
|
stack
|
page read and write
|
||
4205000
|
trusted library allocation
|
page read and write
|
||
1DB0000
|
heap
|
page read and write
|
||
4298000
|
trusted library allocation
|
page read and write
|
||
4233000
|
trusted library allocation
|
page read and write
|
||
423B000
|
trusted library allocation
|
page read and write
|
||
42B9000
|
trusted library allocation
|
page read and write
|
||
4295000
|
trusted library allocation
|
page read and write
|
||
4235000
|
trusted library allocation
|
page read and write
|
||
421B000
|
trusted library allocation
|
page read and write
|
||
442F000
|
trusted library allocation
|
page read and write
|
||
422A000
|
trusted library allocation
|
page read and write
|
||
42C9000
|
trusted library allocation
|
page read and write
|
||
42A4000
|
trusted library allocation
|
page read and write
|
||
4224000
|
trusted library allocation
|
page read and write
|
||
42A4000
|
trusted library allocation
|
page read and write
|
||
1DA8000
|
heap
|
page read and write
|
||
1DAB000
|
heap
|
page read and write
|
||
42B5000
|
trusted library allocation
|
page read and write
|
||
47A0000
|
heap
|
page read and write
|
||
4300000
|
heap
|
page read and write
|
||
42A5000
|
trusted library allocation
|
page read and write
|
||
36B0000
|
heap
|
page read and write
|
||
42C2000
|
trusted library allocation
|
page read and write
|
||
4296000
|
trusted library allocation
|
page read and write
|
||
370D000
|
stack
|
page read and write
|
||
1DAD000
|
heap
|
page read and write
|
||
4222000
|
trusted library allocation
|
page read and write
|
||
417000
|
unkown
|
page write copy
|
||
1D95000
|
heap
|
page read and write
|
||
4235000
|
trusted library allocation
|
page read and write
|
||
4294000
|
trusted library allocation
|
page read and write
|
||
1D39000
|
heap
|
page read and write
|
||
427D000
|
trusted library allocation
|
page read and write
|
||
1DA8000
|
heap
|
page read and write
|
||
1DB8000
|
heap
|
page read and write
|
||
42C6000
|
trusted library allocation
|
page read and write
|
||
4309000
|
trusted library allocation
|
page read and write
|
||
421B000
|
trusted library allocation
|
page read and write
|
||
4295000
|
trusted library allocation
|
page read and write
|
||
42BC000
|
trusted library allocation
|
page read and write
|
||
42A3000
|
trusted library allocation
|
page read and write
|
||
1DAB000
|
heap
|
page read and write
|
||
4203000
|
trusted library allocation
|
page read and write
|
||
4328000
|
trusted library allocation
|
page read and write
|
||
1D96000
|
heap
|
page read and write
|
||
42A4000
|
trusted library allocation
|
page read and write
|
||
1DAB000
|
heap
|
page read and write
|
||
42D3000
|
trusted library allocation
|
page read and write
|
||
42A6000
|
trusted library allocation
|
page read and write
|
||
4360000
|
trusted library allocation
|
page read and write
|
||
42A4000
|
trusted library allocation
|
page read and write
|
||
1DB6000
|
heap
|
page read and write
|
||
42CC000
|
trusted library allocation
|
page read and write
|
||
3760000
|
remote allocation
|
page read and write
|
||
1DB8000
|
heap
|
page read and write
|
||
42C4000
|
trusted library allocation
|
page read and write
|
||
1DAA000
|
heap
|
page read and write
|
||
1A13000
|
unkown
|
page readonly
|
||
42B4000
|
trusted library allocation
|
page read and write
|
||
401000
|
unkown
|
page execute read
|
||
1A11000
|
unkown
|
page read and write
|
||
1DAD000
|
heap
|
page read and write
|
||
4258000
|
trusted library allocation
|
page read and write
|
||
420F000
|
trusted library allocation
|
page read and write
|
||
4227000
|
trusted library allocation
|
page read and write
|
||
4203000
|
trusted library allocation
|
page read and write
|
||
422B000
|
trusted library allocation
|
page read and write
|
||
4419000
|
trusted library allocation
|
page read and write
|
||
4294000
|
trusted library allocation
|
page read and write
|
||
42B0000
|
trusted library allocation
|
page read and write
|
||
42D3000
|
trusted library allocation
|
page read and write
|
||
42BF000
|
trusted library allocation
|
page read and write
|
||
1DB0000
|
heap
|
page read and write
|
||
1DB0000
|
heap
|
page read and write
|
||
1DAF000
|
heap
|
page read and write
|
||
429E000
|
trusted library allocation
|
page read and write
|
||
42D5000
|
trusted library allocation
|
page read and write
|
||
42C8000
|
trusted library allocation
|
page read and write
|
||
1D3C000
|
heap
|
page read and write
|
||
420B000
|
trusted library allocation
|
page read and write
|
||
4208000
|
trusted library allocation
|
page read and write
|
||
4203000
|
trusted library allocation
|
page read and write
|
||
4294000
|
trusted library allocation
|
page read and write
|
||
4400000
|
trusted library allocation
|
page read and write
|
||
43B0000
|
trusted library allocation
|
page read and write
|
||
42D1000
|
trusted library allocation
|
page read and write
|
||
1C5F000
|
stack
|
page read and write
|
||
42A4000
|
trusted library allocation
|
page read and write
|
||
4401000
|
trusted library allocation
|
page read and write
|
||
1DB9000
|
heap
|
page read and write
|
||
1DA4000
|
heap
|
page read and write
|
||
42D3000
|
trusted library allocation
|
page read and write
|
||
42D5000
|
trusted library allocation
|
page read and write
|
||
1DB2000
|
heap
|
page read and write
|
||
1DA7000
|
heap
|
page read and write
|
||
4295000
|
trusted library allocation
|
page read and write
|
||
1DB2000
|
heap
|
page read and write
|
||
42B4000
|
trusted library allocation
|
page read and write
|
||
4401000
|
trusted library allocation
|
page read and write
|
||
423B000
|
trusted library allocation
|
page read and write
|
||
420B000
|
trusted library allocation
|
page read and write
|
||
421B000
|
trusted library allocation
|
page read and write
|
||
4298000
|
trusted library allocation
|
page read and write
|
||
1B4E000
|
stack
|
page read and write
|
||
4220000
|
trusted library allocation
|
page read and write
|
||
392D000
|
stack
|
page read and write
|
||
4235000
|
trusted library allocation
|
page read and write
|
||
4309000
|
trusted library allocation
|
page read and write
|
||
1D93000
|
heap
|
page read and write
|
||
3780000
|
heap
|
page read and write
|
||
3820000
|
heap
|
page read and write
|
||
421B000
|
trusted library allocation
|
page read and write
|
||
42AA000
|
trusted library allocation
|
page read and write
|
||
422B000
|
trusted library allocation
|
page read and write
|
||
420B000
|
trusted library allocation
|
page read and write
|
||
4408000
|
trusted library allocation
|
page read and write
|
||
1D99000
|
heap
|
page read and write
|
||
4301000
|
heap
|
page read and write
|
||
1DAA000
|
heap
|
page read and write
|
||
41D000
|
unkown
|
page write copy
|
||
42D4000
|
trusted library allocation
|
page read and write
|
||
4253000
|
trusted library allocation
|
page read and write
|
||
42A5000
|
trusted library allocation
|
page read and write
|
||
4296000
|
trusted library allocation
|
page read and write
|
||
429B000
|
trusted library allocation
|
page read and write
|
||
4407000
|
trusted library allocation
|
page read and write
|
||
4220000
|
trusted library allocation
|
page read and write
|
||
42CF000
|
trusted library allocation
|
page read and write
|
||
42C6000
|
trusted library allocation
|
page read and write
|
||
4225000
|
trusted library allocation
|
page read and write
|
||
1DA6000
|
heap
|
page read and write
|
||
42AA000
|
trusted library allocation
|
page read and write
|
||
365F000
|
stack
|
page read and write
|
||
1D59000
|
heap
|
page read and write
|
||
4237000
|
trusted library allocation
|
page read and write
|
||
1B00000
|
heap
|
page read and write
|
||
42C7000
|
trusted library allocation
|
page read and write
|
||
43E8000
|
trusted library allocation
|
page read and write
|
||
42C7000
|
trusted library allocation
|
page read and write
|
||
42CC000
|
trusted library allocation
|
page read and write
|
||
41FE000
|
stack
|
page read and write
|
||
1B50000
|
heap
|
page read and write
|
||
1DAB000
|
heap
|
page read and write
|
||
4845000
|
trusted library allocation
|
page read and write
|
||
4239000
|
trusted library allocation
|
page read and write
|
||
42D5000
|
trusted library allocation
|
page read and write
|
||
42C6000
|
trusted library allocation
|
page read and write
|
||
1DAD000
|
heap
|
page read and write
|
||
42D3000
|
trusted library allocation
|
page read and write
|
||
42D3000
|
trusted library allocation
|
page read and write
|
||
4248000
|
trusted library allocation
|
page read and write
|
||
429D000
|
trusted library allocation
|
page read and write
|
||
36B0000
|
direct allocation
|
page read and write
|
||
495F000
|
trusted library allocation
|
page read and write
|
||
1DB0000
|
heap
|
page read and write
|
||
1DA3000
|
heap
|
page read and write
|
||
1D94000
|
heap
|
page read and write
|
||
420F000
|
trusted library allocation
|
page read and write
|
||
4241000
|
trusted library allocation
|
page read and write
|
||
4206000
|
trusted library allocation
|
page read and write
|
||
4225000
|
trusted library allocation
|
page read and write
|
||
1DB1000
|
heap
|
page read and write
|
||
1DAF000
|
heap
|
page read and write
|
||
380E000
|
stack
|
page read and write
|
||
1DA3000
|
heap
|
page read and write
|
||
44B000
|
unkown
|
page execute and read and write
|
||
4231000
|
trusted library allocation
|
page read and write
|
||
4221000
|
trusted library allocation
|
page read and write
|
||
4224000
|
trusted library allocation
|
page read and write
|
||
4297000
|
trusted library allocation
|
page read and write
|
||
1DAC000
|
heap
|
page read and write
|
||
42C6000
|
trusted library allocation
|
page read and write
|
||
4221000
|
trusted library allocation
|
page read and write
|
||
1DB7000
|
heap
|
page read and write
|
||
421B000
|
trusted library allocation
|
page read and write
|
||
4295000
|
trusted library allocation
|
page read and write
|
||
4237000
|
trusted library allocation
|
page read and write
|
||
4250000
|
trusted library allocation
|
page read and write
|
||
1CCA000
|
heap
|
page read and write
|
||
9B000
|
stack
|
page read and write
|
||
42D5000
|
trusted library allocation
|
page read and write
|
||
1D98000
|
heap
|
page read and write
|
||
40FE000
|
stack
|
page read and write
|
||
1DB2000
|
heap
|
page read and write
|
||
1DB9000
|
heap
|
page read and write
|
||
42A4000
|
trusted library allocation
|
page read and write
|
||
1DAB000
|
heap
|
page read and write
|
||
4439000
|
trusted library allocation
|
page read and write
|
||
42CF000
|
trusted library allocation
|
page read and write
|
||
1DB7000
|
heap
|
page read and write
|
||
4203000
|
trusted library allocation
|
page read and write
|
||
4294000
|
trusted library allocation
|
page read and write
|
||
1DB2000
|
heap
|
page read and write
|
||
4419000
|
trusted library allocation
|
page read and write
|
||
475F000
|
stack
|
page read and write
|
||
420F000
|
trusted library allocation
|
page read and write
|
||
3660000
|
direct allocation
|
page execute and read and write
|
||
4208000
|
trusted library allocation
|
page read and write
|
||
424E000
|
trusted library allocation
|
page read and write
|
||
1D0C000
|
heap
|
page read and write
|
||
1F0000
|
heap
|
page read and write
|
||
4293000
|
trusted library allocation
|
page read and write
|
||
430F000
|
trusted library allocation
|
page read and write
|
||
4340000
|
trusted library allocation
|
page read and write
|
||
1DB8000
|
heap
|
page read and write
|
||
429C000
|
trusted library allocation
|
page read and write
|
||
3A2D000
|
stack
|
page read and write
|
||
4295000
|
trusted library allocation
|
page read and write
|
||
3B2F000
|
stack
|
page read and write
|
||
1DB2000
|
heap
|
page read and write
|
||
1CAE000
|
stack
|
page read and write
|
||
410000
|
unkown
|
page readonly
|
||
429D000
|
trusted library allocation
|
page read and write
|
||
4206000
|
trusted library allocation
|
page read and write
|
||
429D000
|
trusted library allocation
|
page read and write
|
||
4435000
|
trusted library allocation
|
page read and write
|
||
42D5000
|
trusted library allocation
|
page read and write
|
||
420B000
|
trusted library allocation
|
page read and write
|
||
42D5000
|
trusted library allocation
|
page read and write
|
||
42C6000
|
trusted library allocation
|
page read and write
|
||
1D8F000
|
heap
|
page read and write
|
||
42D5000
|
trusted library allocation
|
page read and write
|
||
429D000
|
trusted library allocation
|
page read and write
|
||
4431000
|
trusted library allocation
|
page read and write
|
||
4238000
|
trusted library allocation
|
page read and write
|
||
4298000
|
trusted library allocation
|
page read and write
|
||
43E0000
|
trusted library allocation
|
page read and write
|
||
42B6000
|
trusted library allocation
|
page read and write
|
||
420A000
|
trusted library allocation
|
page read and write
|
||
1DA9000
|
heap
|
page read and write
|
There are 281 hidden memdumps, click here to show them.