Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
asbpKOngY0.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
initial sample
|
||
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_asbpKOngY0.exe_2caf974d11786772f56eeade9062141c51f1e48_347c9851_fbf69d2b-2a12-4891-bf94-e897ad82cb62\Report.wer
|
Unicode text, UTF-16, little-endian text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WER7C35.tmp.dmp
|
Mini DuMP crash report, 15 streams, Mon Apr 22 19:44:08 2024, 0x1205a4 type
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WER7DEB.tmp.WERInternalMetadata.xml
|
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WER7E2B.tmp.xml
|
XML 1.0 document, ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Windows\appcompat\Programs\Amcache.hve
|
MS Windows registry file, NT/2000 or above
|
dropped
|
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\asbpKOngY0.exe
|
"C:\Users\user\Desktop\asbpKOngY0.exe"
|
||
C:\Windows\SysWOW64\WerFault.exe
|
C:\Windows\SysWOW64\WerFault.exe -u -p 4040 -s 1488
|
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
incredibleextedwj.shop
|
|||
shortsvelventysjo.shop
|
|||
tolerateilusidjukl.shop
|
|||
liabilitynighstjsko.shop
|
|||
shatterbreathepsw.shop
|
|||
demonstationfukewko.shop
|
|||
productivelookewr.shop
|
|||
strollheavengwu.shop
|
|||
alcojoldwograpciw.shop
|
|||
https://duckduckgo.com/chrome_newtab
|
unknown
|
||
https://duckduckgo.com/ac/?q=
|
unknown
|
||
https://contile-images.services.mozilla.com/0TegrVVRalreHILhR2WvtD_CFzj13HCDcLqqpvXSOuY.10862.jpg
|
unknown
|
||
https://www.google.com/images/branding/product/ico/googleg_lodp.ico
|
unknown
|
||
https://bridge.lga1.admarketplace.net/ctp?version=16.0.0&key=1696332238301000001.2&ci=1696332238417.
|
unknown
|
||
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
|
unknown
|
||
https://strollheavengwu.shop/api
|
172.67.163.209
|
||
http://crl.rootca1.amazontrust.com/rootca1.crl0
|
unknown
|
||
https://bridge.lga1.ap01.net/ctp?version=16.0.0&key=1696332238301000001.1&ci=1696332238417.12791&cta
|
unknown
|
||
http://upx.sf.net
|
unknown
|
||
https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
|
unknown
|
||
http://ocsp.rootca1.amazontrust.com0:
|
unknown
|
||
https://support.office.com/article/7D48285B-20E8-4B9B-91AD-216E34163BAD?wt.mc_id=EnterPK2016
|
unknown
|
||
https://support.office.com/article/94ba2e0b-638e-4a92-8857-2cb5ac1d8e17
|
unknown
|
||
https://www.ecosia.org/newtab/
|
unknown
|
||
https://support.mozilla.org/kb/customize-firefox-controls-buttons-and-toolbars?utm_source=firefox-br
|
unknown
|
||
https://ac.ecosia.org/autocomplete?q=
|
unknown
|
||
https://strollheavengwu.shop/apisE
|
unknown
|
||
https://strollheavengwu.shop/apir
|
unknown
|
||
https://contile-images.services.mozilla.com/obgoOYObjIFea_bXuT6L4LbBJ8j425AD87S1HMD3BWg.9991.jpg
|
unknown
|
||
https://imp.mt48.net/static?id=7RHzfOIXjFEYsBdvIpkX4QqmfZfYfQfafZbXfpbWfpbX7ReNxR3UIG8zInwYIFIVs9eYi
|
unknown
|
||
http://x1.c.lencr.org/0
|
unknown
|
||
http://x1.i.lencr.org/0
|
unknown
|
||
https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
|
unknown
|
||
https://support.microsof
|
unknown
|
||
http://crt.rootca1.amazontrust.com/rootca1.cer0?
|
unknown
|
||
https://strollheavengwu.shop/api7bu
|
unknown
|
||
https://strollheavengwu.shop/apiC
|
unknown
|
||
https://support.mozilla.org/products/firefoxgro.all
|
unknown
|
||
https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
|
unknown
|
||
https://www.amazon.com/?tag=admarketus-20&ref=pd_sl_7548d4575af019e4c148ccf1a78112802e66a0816a72fc94
|
unknown
|
||
https://strollheavengwu.shop/
|
unknown
|
There are 31 hidden URLs, click here to show them.
Domains
Name
|
IP
|
Malicious
|
|
---|---|---|---|
strollheavengwu.shop
|
172.67.163.209
|
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
172.67.163.209
|
strollheavengwu.shop
|
United States
|
Registry
Path
|
Value
|
Malicious
|
|
---|---|---|---|
\REGISTRY\A\{cad42759-8f5b-ad76-0882-982625758231}\Root\InventoryApplicationFile\asbpkongy0.exe|955a7d4878f50f0c
|
ProgramId
|
||
\REGISTRY\A\{cad42759-8f5b-ad76-0882-982625758231}\Root\InventoryApplicationFile\asbpkongy0.exe|955a7d4878f50f0c
|
FileId
|
||
\REGISTRY\A\{cad42759-8f5b-ad76-0882-982625758231}\Root\InventoryApplicationFile\asbpkongy0.exe|955a7d4878f50f0c
|
LowerCaseLongPath
|
||
\REGISTRY\A\{cad42759-8f5b-ad76-0882-982625758231}\Root\InventoryApplicationFile\asbpkongy0.exe|955a7d4878f50f0c
|
LongPathHash
|
||
\REGISTRY\A\{cad42759-8f5b-ad76-0882-982625758231}\Root\InventoryApplicationFile\asbpkongy0.exe|955a7d4878f50f0c
|
Name
|
||
\REGISTRY\A\{cad42759-8f5b-ad76-0882-982625758231}\Root\InventoryApplicationFile\asbpkongy0.exe|955a7d4878f50f0c
|
OriginalFileName
|
||
\REGISTRY\A\{cad42759-8f5b-ad76-0882-982625758231}\Root\InventoryApplicationFile\asbpkongy0.exe|955a7d4878f50f0c
|
Publisher
|
||
\REGISTRY\A\{cad42759-8f5b-ad76-0882-982625758231}\Root\InventoryApplicationFile\asbpkongy0.exe|955a7d4878f50f0c
|
Version
|
||
\REGISTRY\A\{cad42759-8f5b-ad76-0882-982625758231}\Root\InventoryApplicationFile\asbpkongy0.exe|955a7d4878f50f0c
|
BinFileVersion
|
||
\REGISTRY\A\{cad42759-8f5b-ad76-0882-982625758231}\Root\InventoryApplicationFile\asbpkongy0.exe|955a7d4878f50f0c
|
BinaryType
|
||
\REGISTRY\A\{cad42759-8f5b-ad76-0882-982625758231}\Root\InventoryApplicationFile\asbpkongy0.exe|955a7d4878f50f0c
|
ProductName
|
||
\REGISTRY\A\{cad42759-8f5b-ad76-0882-982625758231}\Root\InventoryApplicationFile\asbpkongy0.exe|955a7d4878f50f0c
|
ProductVersion
|
||
\REGISTRY\A\{cad42759-8f5b-ad76-0882-982625758231}\Root\InventoryApplicationFile\asbpkongy0.exe|955a7d4878f50f0c
|
LinkDate
|
||
\REGISTRY\A\{cad42759-8f5b-ad76-0882-982625758231}\Root\InventoryApplicationFile\asbpkongy0.exe|955a7d4878f50f0c
|
BinProductVersion
|
||
\REGISTRY\A\{cad42759-8f5b-ad76-0882-982625758231}\Root\InventoryApplicationFile\asbpkongy0.exe|955a7d4878f50f0c
|
AppxPackageFullName
|
||
\REGISTRY\A\{cad42759-8f5b-ad76-0882-982625758231}\Root\InventoryApplicationFile\asbpkongy0.exe|955a7d4878f50f0c
|
AppxPackageRelativeId
|
||
\REGISTRY\A\{cad42759-8f5b-ad76-0882-982625758231}\Root\InventoryApplicationFile\asbpkongy0.exe|955a7d4878f50f0c
|
Size
|
||
\REGISTRY\A\{cad42759-8f5b-ad76-0882-982625758231}\Root\InventoryApplicationFile\asbpkongy0.exe|955a7d4878f50f0c
|
Language
|
||
\REGISTRY\A\{cad42759-8f5b-ad76-0882-982625758231}\Root\InventoryApplicationFile\asbpkongy0.exe|955a7d4878f50f0c
|
Usn
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\IdentityCRL\ClockData
|
ClockTimeSeconds
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\IdentityCRL\ClockData
|
TickCount
|
There are 11 hidden registries, click here to show them.
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
3060000
|
direct allocation
|
page read and write
|
||
5631000
|
trusted library allocation
|
page read and write
|
||
2DFB000
|
heap
|
page read and write
|
||
546F000
|
trusted library allocation
|
page read and write
|
||
5478000
|
trusted library allocation
|
page read and write
|
||
548E000
|
trusted library allocation
|
page read and write
|
||
5487000
|
trusted library allocation
|
page read and write
|
||
5467000
|
trusted library allocation
|
page read and write
|
||
5438000
|
trusted library allocation
|
page read and write
|
||
4D6F000
|
stack
|
page read and write
|
||
5470000
|
trusted library allocation
|
page read and write
|
||
2CA5000
|
heap
|
page read and write
|
||
4E6F000
|
stack
|
page read and write
|
||
543E000
|
trusted library allocation
|
page read and write
|
||
30E0000
|
remote allocation
|
page read and write
|
||
5486000
|
trusted library allocation
|
page read and write
|
||
532E000
|
stack
|
page read and write
|
||
2DD4000
|
heap
|
page read and write
|
||
548E000
|
trusted library allocation
|
page read and write
|
||
5487000
|
trusted library allocation
|
page read and write
|
||
5534000
|
trusted library allocation
|
page read and write
|
||
2D51000
|
heap
|
page read and write
|
||
30DE000
|
stack
|
page read and write
|
||
449000
|
unkown
|
page execute and read and write
|
||
5631000
|
trusted library allocation
|
page read and write
|
||
5473000
|
trusted library allocation
|
page read and write
|
||
2D8E000
|
heap
|
page read and write
|
||
5484000
|
trusted library allocation
|
page read and write
|
||
5487000
|
trusted library allocation
|
page read and write
|
||
2DD7000
|
heap
|
page read and write
|
||
548E000
|
trusted library allocation
|
page read and write
|
||
5A92000
|
trusted library allocation
|
page read and write
|
||
546D000
|
trusted library allocation
|
page read and write
|
||
2D43000
|
heap
|
page read and write
|
||
5457000
|
trusted library allocation
|
page read and write
|
||
54B9000
|
trusted library allocation
|
page read and write
|
||
5432000
|
trusted library allocation
|
page read and write
|
||
2DD5000
|
heap
|
page read and write
|
||
5497000
|
trusted library allocation
|
page read and write
|
||
546F000
|
trusted library allocation
|
page read and write
|
||
544A000
|
trusted library allocation
|
page read and write
|
||
5484000
|
trusted library allocation
|
page read and write
|
||
5431000
|
trusted library allocation
|
page read and write
|
||
597F000
|
stack
|
page read and write
|
||
400000
|
unkown
|
page readonly
|
||
5484000
|
trusted library allocation
|
page read and write
|
||
2DD6000
|
heap
|
page read and write
|
||
2DF4000
|
heap
|
page read and write
|
||
54BC000
|
trusted library allocation
|
page read and write
|
||
54AC000
|
trusted library allocation
|
page read and write
|
||
2FCF000
|
stack
|
page read and write
|
||
5431000
|
trusted library allocation
|
page read and write
|
||
54B0000
|
trusted library allocation
|
page read and write
|
||
5638000
|
trusted library allocation
|
page read and write
|
||
546F000
|
trusted library allocation
|
page read and write
|
||
400000
|
unkown
|
page execute and read and write
|
||
5631000
|
trusted library allocation
|
page read and write
|
||
641F000
|
trusted library allocation
|
page read and write
|
||
2C40000
|
heap
|
page read and write
|
||
543D000
|
trusted library allocation
|
page read and write
|
||
543E000
|
trusted library allocation
|
page read and write
|
||
4C6D000
|
stack
|
page read and write
|
||
5493000
|
trusted library allocation
|
page read and write
|
||
5434000
|
trusted library allocation
|
page read and write
|
||
44C000
|
unkown
|
page write copy
|
||
5430000
|
trusted library allocation
|
page read and write
|
||
5467000
|
trusted library allocation
|
page read and write
|
||
2D0E000
|
heap
|
page read and write
|
||
5603000
|
trusted library allocation
|
page read and write
|
||
548E000
|
trusted library allocation
|
page read and write
|
||
2DD6000
|
heap
|
page read and write
|
||
2DF9000
|
heap
|
page read and write
|
||
2C8E000
|
stack
|
page read and write
|
||
548E000
|
trusted library allocation
|
page read and write
|
||
5434000
|
trusted library allocation
|
page read and write
|
||
5613000
|
trusted library allocation
|
page read and write
|
||
2DF8000
|
heap
|
page read and write
|
||
548D000
|
trusted library allocation
|
page read and write
|
||
56A3000
|
trusted library allocation
|
page read and write
|
||
543E000
|
trusted library allocation
|
page read and write
|
||
2DFB000
|
heap
|
page read and write
|
||
543D000
|
trusted library allocation
|
page read and write
|
||
2CA7000
|
heap
|
page read and write
|
||
5630000
|
trusted library allocation
|
page read and write
|
||
5490000
|
trusted library allocation
|
page read and write
|
||
54C7000
|
trusted library allocation
|
page read and write
|
||
2D62000
|
heap
|
page read and write
|
||
5497000
|
trusted library allocation
|
page read and write
|
||
544F000
|
trusted library allocation
|
page read and write
|
||
544A000
|
trusted library allocation
|
page read and write
|
||
30E0000
|
remote allocation
|
page read and write
|
||
548E000
|
trusted library allocation
|
page read and write
|
||
546E000
|
trusted library allocation
|
page read and write
|
||
5661000
|
trusted library allocation
|
page read and write
|
||
565F000
|
trusted library allocation
|
page read and write
|
||
5649000
|
trusted library allocation
|
page read and write
|
||
546D000
|
trusted library allocation
|
page read and write
|
||
5633000
|
trusted library allocation
|
page read and write
|
||
548C000
|
trusted library allocation
|
page read and write
|
||
2D7A000
|
heap
|
page read and write
|
||
5431000
|
trusted library allocation
|
page read and write
|
||
5438000
|
trusted library allocation
|
page read and write
|
||
5456000
|
trusted library allocation
|
page read and write
|
||
543E000
|
trusted library allocation
|
page read and write
|
||
2DF4000
|
heap
|
page read and write
|
||
5436000
|
trusted library allocation
|
page read and write
|
||
5449000
|
trusted library allocation
|
page read and write
|
||
547E000
|
trusted library allocation
|
page read and write
|
||
5465000
|
trusted library allocation
|
page read and write
|
||
545F000
|
trusted library allocation
|
page read and write
|
||
5495000
|
trusted library allocation
|
page read and write
|
||
5649000
|
trusted library allocation
|
page read and write
|
||
5451000
|
trusted library allocation
|
page read and write
|
||
587E000
|
stack
|
page read and write
|
||
5468000
|
trusted library allocation
|
page read and write
|
||
5495000
|
trusted library allocation
|
page read and write
|
||
5476000
|
trusted library allocation
|
page read and write
|
||
54AC000
|
trusted library allocation
|
page read and write
|
||
2C2F000
|
unkown
|
page readonly
|
||
2DE5000
|
heap
|
page read and write
|
||
5439000
|
trusted library allocation
|
page read and write
|
||
309D000
|
stack
|
page read and write
|
||
2D0A000
|
heap
|
page read and write
|
||
5432000
|
trusted library allocation
|
page read and write
|
||
546F000
|
trusted library allocation
|
page read and write
|
||
543D000
|
trusted library allocation
|
page read and write
|
||
5467000
|
trusted library allocation
|
page read and write
|
||
548D000
|
trusted library allocation
|
page read and write
|
||
5446000
|
trusted library allocation
|
page read and write
|
||
565A000
|
trusted library allocation
|
page read and write
|
||
543E000
|
trusted library allocation
|
page read and write
|
||
4AAE000
|
stack
|
page read and write
|
||
546F000
|
trusted library allocation
|
page read and write
|
||
2D6E000
|
heap
|
page read and write
|
||
2DFE000
|
heap
|
page read and write
|
||
543E000
|
trusted library allocation
|
page read and write
|
||
543A000
|
trusted library allocation
|
page read and write
|
||
558B000
|
trusted library allocation
|
page read and write
|
||
2DE9000
|
heap
|
page read and write
|
||
5491000
|
trusted library allocation
|
page read and write
|
||
5431000
|
trusted library allocation
|
page read and write
|
||
548E000
|
trusted library allocation
|
page read and write
|
||
543D000
|
trusted library allocation
|
page read and write
|
||
5488000
|
trusted library allocation
|
page read and write
|
||
2D00000
|
heap
|
page read and write
|
||
3050000
|
heap
|
page read and write
|
||
54C2000
|
trusted library allocation
|
page read and write
|
||
54B8000
|
trusted library allocation
|
page read and write
|
||
4AEE000
|
stack
|
page read and write
|
||
5451000
|
trusted library allocation
|
page read and write
|
||
5463000
|
trusted library allocation
|
page read and write
|
||
5438000
|
trusted library allocation
|
page read and write
|
||
2DFB000
|
heap
|
page read and write
|
||
544C000
|
trusted library allocation
|
page read and write
|
||
2D17000
|
heap
|
page execute and read and write
|
||
544F000
|
trusted library allocation
|
page read and write
|
||
553A000
|
trusted library allocation
|
page read and write
|
||
5488000
|
trusted library allocation
|
page read and write
|
||
5631000
|
trusted library allocation
|
page read and write
|
||
5487000
|
trusted library allocation
|
page read and write
|
||
543E000
|
trusted library allocation
|
page read and write
|
||
5479000
|
trusted library allocation
|
page read and write
|
||
2DDE000
|
heap
|
page read and write
|
||
2DB7000
|
heap
|
page read and write
|
||
5442000
|
trusted library allocation
|
page read and write
|
||
5484000
|
trusted library allocation
|
page read and write
|
||
542E000
|
stack
|
page read and write
|
||
546F000
|
trusted library allocation
|
page read and write
|
||
54C1000
|
trusted library allocation
|
page read and write
|
||
54BB000
|
trusted library allocation
|
page read and write
|
||
5447000
|
trusted library allocation
|
page read and write
|
||
548E000
|
trusted library allocation
|
page read and write
|
||
549F000
|
trusted library allocation
|
page read and write
|
||
546F000
|
trusted library allocation
|
page read and write
|
||
2DFC000
|
heap
|
page read and write
|
||
2CA0000
|
heap
|
page read and write
|
||
2D77000
|
heap
|
page read and write
|
||
546D000
|
trusted library allocation
|
page read and write
|
||
5484000
|
trusted library allocation
|
page read and write
|
||
548C000
|
trusted library allocation
|
page read and write
|
||
5439000
|
trusted library allocation
|
page read and write
|
||
5484000
|
trusted library allocation
|
page read and write
|
||
548E000
|
trusted library allocation
|
page read and write
|
||
5444000
|
trusted library allocation
|
page read and write
|
||
5438000
|
trusted library allocation
|
page read and write
|
||
5431000
|
trusted library allocation
|
page read and write
|
||
2C2F000
|
unkown
|
page readonly
|
||
1F0000
|
heap
|
page read and write
|
||
54B8000
|
trusted library allocation
|
page read and write
|
||
5431000
|
trusted library allocation
|
page read and write
|
||
5BA9000
|
trusted library allocation
|
page read and write
|
||
546D000
|
trusted library allocation
|
page read and write
|
||
5488000
|
trusted library allocation
|
page read and write
|
||
5434000
|
trusted library allocation
|
page read and write
|
||
5442000
|
trusted library allocation
|
page read and write
|
||
3100000
|
heap
|
page read and write
|
||
5467000
|
trusted library allocation
|
page read and write
|
||
5530000
|
heap
|
page read and write
|
||
5432000
|
trusted library allocation
|
page read and write
|
||
543A000
|
trusted library allocation
|
page read and write
|
||
54B7000
|
trusted library allocation
|
page read and write
|
||
543E000
|
trusted library allocation
|
page read and write
|
||
548E000
|
trusted library allocation
|
page read and write
|
||
54B4000
|
trusted library allocation
|
page read and write
|
||
548F000
|
trusted library allocation
|
page read and write
|
||
54A8000
|
trusted library allocation
|
page read and write
|
||
5486000
|
trusted library allocation
|
page read and write
|
||
543E000
|
trusted library allocation
|
page read and write
|
||
5460000
|
trusted library allocation
|
page read and write
|
||
2DFD000
|
heap
|
page read and write
|
||
2DE4000
|
heap
|
page read and write
|
||
5460000
|
trusted library allocation
|
page read and write
|
||
5484000
|
trusted library allocation
|
page read and write
|
||
30E0000
|
remote allocation
|
page read and write
|
||
320F000
|
stack
|
page read and write
|
||
5661000
|
trusted library allocation
|
page read and write
|
||
5497000
|
trusted library allocation
|
page read and write
|
||
41F000
|
unkown
|
page readonly
|
||
544F000
|
trusted library allocation
|
page read and write
|
||
54C7000
|
trusted library allocation
|
page read and write
|
||
544F000
|
trusted library allocation
|
page read and write
|
||
55DB000
|
trusted library allocation
|
page read and write
|
||
44E000
|
unkown
|
page read and write
|
||
5460000
|
trusted library allocation
|
page read and write
|
||
5493000
|
trusted library allocation
|
page read and write
|
||
543E000
|
trusted library allocation
|
page read and write
|
||
5457000
|
trusted library allocation
|
page read and write
|
||
54AC000
|
trusted library allocation
|
page read and write
|
||
2DFB000
|
heap
|
page read and write
|
||
5446000
|
trusted library allocation
|
page read and write
|
||
548E000
|
trusted library allocation
|
page read and write
|
||
5464000
|
trusted library allocation
|
page read and write
|
||
5460000
|
trusted library allocation
|
page read and write
|
||
543D000
|
trusted library allocation
|
page read and write
|
||
5F09000
|
trusted library allocation
|
page read and write
|
||
2DF8000
|
heap
|
page read and write
|
||
544F000
|
trusted library allocation
|
page read and write
|
||
401000
|
unkown
|
page execute read
|
||
5437000
|
trusted library allocation
|
page read and write
|
||
5478000
|
trusted library allocation
|
page read and write
|
||
548E000
|
trusted library allocation
|
page read and write
|
||
546D000
|
trusted library allocation
|
page read and write
|
||
544A000
|
trusted library allocation
|
page read and write
|
||
5432000
|
trusted library allocation
|
page read and write
|
||
5475000
|
trusted library allocation
|
page read and write
|
||
545E000
|
trusted library allocation
|
page read and write
|
||
5669000
|
trusted library allocation
|
page read and write
|
||
5A07000
|
trusted library allocation
|
page read and write
|
||
5439000
|
trusted library allocation
|
page read and write
|
||
2DFC000
|
heap
|
page read and write
|
||
5460000
|
trusted library allocation
|
page read and write
|
||
2DF4000
|
heap
|
page read and write
|
||
5444000
|
trusted library allocation
|
page read and write
|
||
5460000
|
trusted library allocation
|
page read and write
|
||
543E000
|
trusted library allocation
|
page read and write
|
||
5476000
|
trusted library allocation
|
page read and write
|
||
9B000
|
stack
|
page read and write
|
||
40C000
|
unkown
|
page readonly
|
||
2DE2000
|
heap
|
page read and write
|
||
556B000
|
trusted library allocation
|
page read and write
|
||
5446000
|
trusted library allocation
|
page read and write
|
||
5466000
|
trusted library allocation
|
page read and write
|
||
5467000
|
trusted library allocation
|
page read and write
|
||
5460000
|
trusted library allocation
|
page read and write
|
||
5444000
|
trusted library allocation
|
page read and write
|
||
5450000
|
trusted library allocation
|
page read and write
|
||
3020000
|
heap
|
page read and write
|
||
54C8000
|
trusted library allocation
|
page read and write
|
||
544C000
|
trusted library allocation
|
page read and write
|
||
5455000
|
trusted library allocation
|
page read and write
|
||
54C7000
|
trusted library allocation
|
page read and write
|
||
5531000
|
heap
|
page read and write
|
||
544F000
|
trusted library allocation
|
page read and write
|
||
544F000
|
trusted library allocation
|
page read and write
|
||
543A000
|
trusted library allocation
|
page read and write
|
||
546E000
|
trusted library allocation
|
page read and write
|
||
5446000
|
trusted library allocation
|
page read and write
|
||
5441000
|
trusted library allocation
|
page read and write
|
||
5464000
|
trusted library allocation
|
page read and write
|
||
2DF4000
|
heap
|
page read and write
|
||
560B000
|
trusted library allocation
|
page read and write
|
||
54BF000
|
trusted library allocation
|
page read and write
|
||
5432000
|
trusted library allocation
|
page read and write
|
||
5476000
|
trusted library allocation
|
page read and write
|
||
544D000
|
trusted library allocation
|
page read and write
|
||
5478000
|
trusted library allocation
|
page read and write
|
||
544C000
|
trusted library allocation
|
page read and write
|
||
5454000
|
trusted library allocation
|
page read and write
|
||
54B8000
|
trusted library allocation
|
page read and write
|
||
548E000
|
trusted library allocation
|
page read and write
|
||
5553000
|
trusted library allocation
|
page read and write
|
||
4B2E000
|
stack
|
page read and write
|
||
5434000
|
trusted library allocation
|
page read and write
|
||
2DE7000
|
heap
|
page read and write
|
||
2CEE000
|
stack
|
page read and write
|
||
5440000
|
trusted library allocation
|
page read and write
|
||
548E000
|
trusted library allocation
|
page read and write
|
||
5669000
|
trusted library allocation
|
page read and write
|
||
51EE000
|
stack
|
page read and write
|
||
59F0000
|
heap
|
page read and write
|
||
548E000
|
trusted library allocation
|
page read and write
|
||
5638000
|
trusted library allocation
|
page read and write
|
||
4B60000
|
heap
|
page read and write
|
||
198000
|
stack
|
page read and write
|
||
544F000
|
trusted library allocation
|
page read and write
|
||
2DD4000
|
heap
|
page read and write
|
||
5467000
|
trusted library allocation
|
page read and write
|
||
548E000
|
trusted library allocation
|
page read and write
|
||
5484000
|
trusted library allocation
|
page read and write
|
||
5476000
|
trusted library allocation
|
page read and write
|
||
547E000
|
trusted library allocation
|
page read and write
|
||
2FD0000
|
direct allocation
|
page execute and read and write
|
||
54C7000
|
trusted library allocation
|
page read and write
|
||
54B8000
|
trusted library allocation
|
page read and write
|
||
52EF000
|
stack
|
page read and write
|
There are 305 hidden memdumps, click here to show them.