Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
iPUk65i3yI.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
initial sample
|
||
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_iPUk65i3yI.exe_2ec5395f16112ba3e812158ee989f8fd32d1fc_6086caad_64945b72-550f-47ce-b2ed-fb2dd609c044\Report.wer
|
Unicode text, UTF-16, little-endian text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WERE13.tmp.dmp
|
Mini DuMP crash report, 15 streams, Mon Apr 22 20:27:11 2024, 0x1205a4 type
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WERF2E.tmp.WERInternalMetadata.xml
|
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WERF5D.tmp.xml
|
XML 1.0 document, ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Windows\appcompat\Programs\Amcache.hve
|
MS Windows registry file, NT/2000 or above
|
dropped
|
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\iPUk65i3yI.exe
|
"C:\Users\user\Desktop\iPUk65i3yI.exe"
|
||
C:\Windows\SysWOW64\WerFault.exe
|
C:\Windows\SysWOW64\WerFault.exe -u -p 7352 -s 1548
|
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
incredibleextedwj.shop
|
|||
shortsvelventysjo.shop
|
|||
tolerateilusidjukl.shop
|
|||
liabilitynighstjsko.shop
|
|||
shatterbreathepsw.shop
|
|||
demonstationfukewko.shop
|
|||
productivelookewr.shop
|
|||
strollheavengwu.shop
|
|||
alcojoldwograpciw.shop
|
|||
https://duckduckgo.com/chrome_newtab
|
unknown
|
||
https://duckduckgo.com/ac/?q=
|
unknown
|
||
https://www.google.com/images/branding/product/ico/googleg_lodp.ico
|
unknown
|
||
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
|
unknown
|
||
https://strollheavengwu.shop/apif
|
unknown
|
||
https://strollheavengwu.shop/api
|
104.21.15.198
|
||
http://crl.rootca1.amazontrust.com/rootca1.crl0
|
unknown
|
||
http://upx.sf.net
|
unknown
|
||
https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
|
unknown
|
||
https://strollheavengwu.shop/.
|
unknown
|
||
http://ocsp.rootca1.amazontrust.com0:
|
unknown
|
||
https://support.office.com/article/7D48285B-20E8-4B9B-91AD-216E34163BAD?wt.mc_id=EnterPK2016
|
unknown
|
||
https://support.office.com/article/94ba2e0b-638e-4a92-8857-2cb5ac1d8e17
|
unknown
|
||
https://www.ecosia.org/newtab/
|
unknown
|
||
https://support.mozilla.org/kb/customize-firefox-controls-buttons-and-toolbars?utm_source=firefox-br
|
unknown
|
||
https://ac.ecosia.org/autocomplete?q=
|
unknown
|
||
http://x1.c.lencr.org/0
|
unknown
|
||
http://x1.i.lencr.org/0
|
unknown
|
||
https://strollheavengwu.shop/a
|
unknown
|
||
https://support.office.com/article/94ba2e0b-638e-4a92-8857-2cb5ac1d8e17Install
|
unknown
|
||
https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
|
unknown
|
||
https://support.microsof
|
unknown
|
||
http://crt.rootca1.amazontrust.com/rootca1.cer0?
|
unknown
|
||
https://support.office.com/article/7D48285B-20E8-4B9B-91AD-216E34163BAD?wt.mc_id=EnterPK2016Examples
|
unknown
|
||
https://strollheavengwu.shop/apipp
|
unknown
|
||
https://support.mozilla.org/products/firefoxgro.all
|
unknown
|
||
https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
|
unknown
|
||
https://strollheavengwu.shop/
|
unknown
|
There are 27 hidden URLs, click here to show them.
Domains
Name
|
IP
|
Malicious
|
|
---|---|---|---|
strollheavengwu.shop
|
104.21.15.198
|
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
104.21.15.198
|
strollheavengwu.shop
|
United States
|
Registry
Path
|
Value
|
Malicious
|
|
---|---|---|---|
\REGISTRY\A\{1a39721a-ec9a-4363-2aa0-bddf247cddbc}\Root\InventoryApplicationFile\ipuk65i3yi.exe|acb535b2aef652ae
|
ProgramId
|
||
\REGISTRY\A\{1a39721a-ec9a-4363-2aa0-bddf247cddbc}\Root\InventoryApplicationFile\ipuk65i3yi.exe|acb535b2aef652ae
|
FileId
|
||
\REGISTRY\A\{1a39721a-ec9a-4363-2aa0-bddf247cddbc}\Root\InventoryApplicationFile\ipuk65i3yi.exe|acb535b2aef652ae
|
LowerCaseLongPath
|
||
\REGISTRY\A\{1a39721a-ec9a-4363-2aa0-bddf247cddbc}\Root\InventoryApplicationFile\ipuk65i3yi.exe|acb535b2aef652ae
|
LongPathHash
|
||
\REGISTRY\A\{1a39721a-ec9a-4363-2aa0-bddf247cddbc}\Root\InventoryApplicationFile\ipuk65i3yi.exe|acb535b2aef652ae
|
Name
|
||
\REGISTRY\A\{1a39721a-ec9a-4363-2aa0-bddf247cddbc}\Root\InventoryApplicationFile\ipuk65i3yi.exe|acb535b2aef652ae
|
OriginalFileName
|
||
\REGISTRY\A\{1a39721a-ec9a-4363-2aa0-bddf247cddbc}\Root\InventoryApplicationFile\ipuk65i3yi.exe|acb535b2aef652ae
|
Publisher
|
||
\REGISTRY\A\{1a39721a-ec9a-4363-2aa0-bddf247cddbc}\Root\InventoryApplicationFile\ipuk65i3yi.exe|acb535b2aef652ae
|
Version
|
||
\REGISTRY\A\{1a39721a-ec9a-4363-2aa0-bddf247cddbc}\Root\InventoryApplicationFile\ipuk65i3yi.exe|acb535b2aef652ae
|
BinFileVersion
|
||
\REGISTRY\A\{1a39721a-ec9a-4363-2aa0-bddf247cddbc}\Root\InventoryApplicationFile\ipuk65i3yi.exe|acb535b2aef652ae
|
BinaryType
|
||
\REGISTRY\A\{1a39721a-ec9a-4363-2aa0-bddf247cddbc}\Root\InventoryApplicationFile\ipuk65i3yi.exe|acb535b2aef652ae
|
ProductName
|
||
\REGISTRY\A\{1a39721a-ec9a-4363-2aa0-bddf247cddbc}\Root\InventoryApplicationFile\ipuk65i3yi.exe|acb535b2aef652ae
|
ProductVersion
|
||
\REGISTRY\A\{1a39721a-ec9a-4363-2aa0-bddf247cddbc}\Root\InventoryApplicationFile\ipuk65i3yi.exe|acb535b2aef652ae
|
LinkDate
|
||
\REGISTRY\A\{1a39721a-ec9a-4363-2aa0-bddf247cddbc}\Root\InventoryApplicationFile\ipuk65i3yi.exe|acb535b2aef652ae
|
BinProductVersion
|
||
\REGISTRY\A\{1a39721a-ec9a-4363-2aa0-bddf247cddbc}\Root\InventoryApplicationFile\ipuk65i3yi.exe|acb535b2aef652ae
|
AppxPackageFullName
|
||
\REGISTRY\A\{1a39721a-ec9a-4363-2aa0-bddf247cddbc}\Root\InventoryApplicationFile\ipuk65i3yi.exe|acb535b2aef652ae
|
AppxPackageRelativeId
|
||
\REGISTRY\A\{1a39721a-ec9a-4363-2aa0-bddf247cddbc}\Root\InventoryApplicationFile\ipuk65i3yi.exe|acb535b2aef652ae
|
Size
|
||
\REGISTRY\A\{1a39721a-ec9a-4363-2aa0-bddf247cddbc}\Root\InventoryApplicationFile\ipuk65i3yi.exe|acb535b2aef652ae
|
Language
|
||
\REGISTRY\A\{1a39721a-ec9a-4363-2aa0-bddf247cddbc}\Root\InventoryApplicationFile\ipuk65i3yi.exe|acb535b2aef652ae
|
Usn
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\IdentityCRL\ClockData
|
ClockTimeSeconds
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\IdentityCRL\ClockData
|
TickCount
|
There are 11 hidden registries, click here to show them.
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
400000
|
unkown
|
page execute and read and write
|
||
2C8E000
|
stack
|
page read and write
|
||
30EE000
|
stack
|
page read and write
|
||
5575000
|
trusted library allocation
|
page read and write
|
||
5510000
|
trusted library allocation
|
page read and write
|
||
5575000
|
trusted library allocation
|
page read and write
|
||
5564000
|
trusted library allocation
|
page read and write
|
||
552D000
|
trusted library allocation
|
page read and write
|
||
54FF000
|
trusted library allocation
|
page read and write
|
||
2C40000
|
heap
|
page read and write
|
||
5519000
|
trusted library allocation
|
page read and write
|
||
55C0000
|
trusted library allocation
|
page read and write
|
||
54FC000
|
trusted library allocation
|
page read and write
|
||
5528000
|
trusted library allocation
|
page read and write
|
||
54E3000
|
trusted library allocation
|
page read and write
|
||
2D6A000
|
heap
|
page read and write
|
||
556B000
|
trusted library allocation
|
page read and write
|
||
2E49000
|
heap
|
page read and write
|
||
54EA000
|
trusted library allocation
|
page read and write
|
||
2E41000
|
heap
|
page read and write
|
||
551B000
|
trusted library allocation
|
page read and write
|
||
54EB000
|
trusted library allocation
|
page read and write
|
||
5573000
|
trusted library allocation
|
page read and write
|
||
550B000
|
trusted library allocation
|
page read and write
|
||
54E4000
|
trusted library allocation
|
page read and write
|
||
550E000
|
trusted library allocation
|
page read and write
|
||
2DF6000
|
heap
|
page read and write
|
||
54DE000
|
stack
|
page read and write
|
||
557B000
|
trusted library allocation
|
page read and write
|
||
55C0000
|
trusted library allocation
|
page read and write
|
||
55E0000
|
trusted library allocation
|
page read and write
|
||
2E56000
|
heap
|
page read and write
|
||
2E47000
|
heap
|
page read and write
|
||
557A000
|
trusted library allocation
|
page read and write
|
||
555C000
|
trusted library allocation
|
page read and write
|
||
3110000
|
heap
|
page read and write
|
||
55A9000
|
trusted library allocation
|
page read and write
|
||
2E49000
|
heap
|
page read and write
|
||
54EB000
|
trusted library allocation
|
page read and write
|
||
551B000
|
trusted library allocation
|
page read and write
|
||
2DC3000
|
heap
|
page read and write
|
||
56F9000
|
trusted library allocation
|
page read and write
|
||
5506000
|
trusted library allocation
|
page read and write
|
||
2DA3000
|
heap
|
page read and write
|
||
2DC9000
|
heap
|
page read and write
|
||
558C000
|
trusted library allocation
|
page read and write
|
||
550D000
|
trusted library allocation
|
page read and write
|
||
5516000
|
trusted library allocation
|
page read and write
|
||
55C8000
|
trusted library allocation
|
page read and write
|
||
4B2E000
|
stack
|
page read and write
|
||
2E4D000
|
heap
|
page read and write
|
||
556E000
|
trusted library allocation
|
page read and write
|
||
5519000
|
trusted library allocation
|
page read and write
|
||
54EA000
|
trusted library allocation
|
page read and write
|
||
5719000
|
trusted library allocation
|
page read and write
|
||
2E41000
|
heap
|
page read and write
|
||
55B2000
|
trusted library allocation
|
page read and write
|
||
557B000
|
trusted library allocation
|
page read and write
|
||
5B2E000
|
trusted library allocation
|
page read and write
|
||
30AD000
|
stack
|
page read and write
|
||
558B000
|
trusted library allocation
|
page read and write
|
||
2C2F000
|
unkown
|
page readonly
|
||
55C0000
|
trusted library allocation
|
page read and write
|
||
56E0000
|
trusted library allocation
|
page read and write
|
||
5516000
|
trusted library allocation
|
page read and write
|
||
55C0000
|
trusted library allocation
|
page read and write
|
||
2D77000
|
heap
|
page execute and read and write
|
||
55C9000
|
trusted library allocation
|
page read and write
|
||
9B000
|
stack
|
page read and write
|
||
553C000
|
trusted library allocation
|
page read and write
|
||
2CD5000
|
heap
|
page read and write
|
||
54FD000
|
trusted library allocation
|
page read and write
|
||
54EB000
|
trusted library allocation
|
page read and write
|
||
55C0000
|
trusted library allocation
|
page read and write
|
||
54EB000
|
trusted library allocation
|
page read and write
|
||
54F3000
|
trusted library allocation
|
page read and write
|
||
2DC3000
|
heap
|
page read and write
|
||
5570000
|
trusted library allocation
|
page read and write
|
||
44C000
|
unkown
|
page write copy
|
||
54F2000
|
trusted library allocation
|
page read and write
|
||
550B000
|
trusted library allocation
|
page read and write
|
||
4D9E000
|
stack
|
page read and write
|
||
5543000
|
trusted library allocation
|
page read and write
|
||
5565000
|
trusted library allocation
|
page read and write
|
||
54F4000
|
trusted library allocation
|
page read and write
|
||
54EE000
|
trusted library allocation
|
page read and write
|
||
555C000
|
trusted library allocation
|
page read and write
|
||
2DBC000
|
heap
|
page read and write
|
||
56E8000
|
trusted library allocation
|
page read and write
|
||
54E6000
|
trusted library allocation
|
page read and write
|
||
557F000
|
trusted library allocation
|
page read and write
|
||
2E0B000
|
heap
|
page read and write
|
||
54EE000
|
trusted library allocation
|
page read and write
|
||
5576000
|
trusted library allocation
|
page read and write
|
||
558B000
|
trusted library allocation
|
page read and write
|
||
574F000
|
trusted library allocation
|
page read and write
|
||
5528000
|
trusted library allocation
|
page read and write
|
||
2DBD000
|
heap
|
page read and write
|
||
2E4D000
|
heap
|
page read and write
|
||
54FF000
|
trusted library allocation
|
page read and write
|
||
54E8000
|
trusted library allocation
|
page read and write
|
||
54E4000
|
trusted library allocation
|
page read and write
|
||
5518000
|
trusted library allocation
|
page read and write
|
||
55A2000
|
trusted library allocation
|
page read and write
|
||
54F2000
|
trusted library allocation
|
page read and write
|
||
54E8000
|
trusted library allocation
|
page read and write
|
||
2CD7000
|
heap
|
page read and write
|
||
55E1000
|
heap
|
page read and write
|
||
2DC3000
|
heap
|
page read and write
|
||
3160000
|
remote allocation
|
page read and write
|
||
5581000
|
trusted library allocation
|
page read and write
|
||
551B000
|
trusted library allocation
|
page read and write
|
||
55FF000
|
trusted library allocation
|
page read and write
|
||
5517000
|
trusted library allocation
|
page read and write
|
||
54F6000
|
trusted library allocation
|
page read and write
|
||
5514000
|
trusted library allocation
|
page read and write
|
||
5575000
|
trusted library allocation
|
page read and write
|
||
6539000
|
trusted library allocation
|
page read and write
|
||
55A2000
|
trusted library allocation
|
page read and write
|
||
2E41000
|
heap
|
page read and write
|
||
558C000
|
trusted library allocation
|
page read and write
|
||
55D1000
|
trusted library allocation
|
page read and write
|
||
198000
|
stack
|
page read and write
|
||
55C0000
|
trusted library allocation
|
page read and write
|
||
56E1000
|
trusted library allocation
|
page read and write
|
||
315E000
|
stack
|
page read and write
|
||
5719000
|
trusted library allocation
|
page read and write
|
||
55E0000
|
heap
|
page read and write
|
||
2DF6000
|
heap
|
page read and write
|
||
5545000
|
trusted library allocation
|
page read and write
|
||
56E1000
|
trusted library allocation
|
page read and write
|
||
54FC000
|
trusted library allocation
|
page read and write
|
||
55AB000
|
trusted library allocation
|
page read and write
|
||
55C4000
|
trusted library allocation
|
page read and write
|
||
54EB000
|
trusted library allocation
|
page read and write
|
||
2DC9000
|
heap
|
page read and write
|
||
55A2000
|
trusted library allocation
|
page read and write
|
||
2E41000
|
heap
|
page read and write
|
||
54E4000
|
trusted library allocation
|
page read and write
|
||
551B000
|
trusted library allocation
|
page read and write
|
||
54FB000
|
trusted library allocation
|
page read and write
|
||
54F2000
|
trusted library allocation
|
page read and write
|
||
54E1000
|
trusted library allocation
|
page read and write
|
||
553D000
|
trusted library allocation
|
page read and write
|
||
55C0000
|
trusted library allocation
|
page read and write
|
||
553E000
|
trusted library allocation
|
page read and write
|
||
2D40000
|
heap
|
page read and write
|
||
2CD0000
|
heap
|
page read and write
|
||
56E8000
|
trusted library allocation
|
page read and write
|
||
2CF0000
|
direct allocation
|
page execute and read and write
|
||
4AEE000
|
stack
|
page read and write
|
||
5535000
|
trusted library allocation
|
page read and write
|
||
2E53000
|
heap
|
page read and write
|
||
55A4000
|
trusted library allocation
|
page read and write
|
||
54EA000
|
trusted library allocation
|
page read and write
|
||
54FF000
|
trusted library allocation
|
page read and write
|
||
449000
|
unkown
|
page execute and read and write
|
||
5585000
|
trusted library allocation
|
page read and write
|
||
4E9F000
|
stack
|
page read and write
|
||
55C0000
|
trusted library allocation
|
page read and write
|
||
55D1000
|
trusted library allocation
|
page read and write
|
||
5577000
|
trusted library allocation
|
page read and write
|
||
302F000
|
stack
|
page read and write
|
||
54E8000
|
trusted library allocation
|
page read and write
|
||
55CF000
|
trusted library allocation
|
page read and write
|
||
41F000
|
unkown
|
page readonly
|
||
56AF000
|
trusted library allocation
|
page read and write
|
||
306E000
|
stack
|
page read and write
|
||
55E6000
|
trusted library allocation
|
page read and write
|
||
55A9000
|
trusted library allocation
|
page read and write
|
||
5517000
|
trusted library allocation
|
page read and write
|
||
5578000
|
trusted library allocation
|
page read and write
|
||
55D1000
|
trusted library allocation
|
page read and write
|
||
56EF000
|
trusted library allocation
|
page read and write
|
||
558B000
|
trusted library allocation
|
page read and write
|
||
3160000
|
remote allocation
|
page read and write
|
||
55A2000
|
trusted library allocation
|
page read and write
|
||
5B10000
|
heap
|
page read and write
|
||
55B2000
|
trusted library allocation
|
page read and write
|
||
570A000
|
trusted library allocation
|
page read and write
|
||
2DE6000
|
heap
|
page read and write
|
||
55A3000
|
trusted library allocation
|
page read and write
|
||
5581000
|
trusted library allocation
|
page read and write
|
||
4C9D000
|
stack
|
page read and write
|
||
602A000
|
trusted library allocation
|
page read and write
|
||
55AB000
|
trusted library allocation
|
page read and write
|
||
557A000
|
trusted library allocation
|
page read and write
|
||
4F9F000
|
stack
|
page read and write
|
||
5581000
|
trusted library allocation
|
page read and write
|
||
55A4000
|
trusted library allocation
|
page read and write
|
||
4B90000
|
heap
|
page read and write
|
||
55D1000
|
trusted library allocation
|
page read and write
|
||
550F000
|
trusted library allocation
|
page read and write
|
||
2CCE000
|
stack
|
page read and write
|
||
551E000
|
trusted library allocation
|
page read and write
|
||
54EA000
|
trusted library allocation
|
page read and write
|
||
554F000
|
trusted library allocation
|
page read and write
|
||
55A4000
|
trusted library allocation
|
page read and write
|
||
2E57000
|
heap
|
page read and write
|
||
55CF000
|
trusted library allocation
|
page read and write
|
||
557B000
|
trusted library allocation
|
page read and write
|
||
56B7000
|
trusted library allocation
|
page read and write
|
||
54E3000
|
trusted library allocation
|
page read and write
|
||
558B000
|
trusted library allocation
|
page read and write
|
||
5711000
|
trusted library allocation
|
page read and write
|
||
5517000
|
trusted library allocation
|
page read and write
|
||
59DF000
|
stack
|
page read and write
|
||
5513000
|
trusted library allocation
|
page read and write
|
||
54EE000
|
trusted library allocation
|
page read and write
|
||
2D6E000
|
heap
|
page read and write
|
||
557A000
|
trusted library allocation
|
page read and write
|
||
5637000
|
trusted library allocation
|
page read and write
|
||
56EB000
|
trusted library allocation
|
page read and write
|
||
2DE6000
|
heap
|
page read and write
|
||
55C0000
|
trusted library allocation
|
page read and write
|
||
401000
|
unkown
|
page execute read
|
||
54EF000
|
trusted library allocation
|
page read and write
|
||
2DE6000
|
heap
|
page read and write
|
||
55C4000
|
trusted library allocation
|
page read and write
|
||
2E47000
|
heap
|
page read and write
|
||
5711000
|
trusted library allocation
|
page read and write
|
||
56E1000
|
trusted library allocation
|
page read and write
|
||
559D000
|
trusted library allocation
|
page read and write
|
||
2E41000
|
heap
|
page read and write
|
||
56E1000
|
trusted library allocation
|
page read and write
|
||
56BF000
|
trusted library allocation
|
page read and write
|
||
59E7000
|
trusted library allocation
|
page read and write
|
||
54EB000
|
trusted library allocation
|
page read and write
|
||
55A9000
|
trusted library allocation
|
page read and write
|
||
5514000
|
trusted library allocation
|
page read and write
|
||
557C000
|
trusted library allocation
|
page read and write
|
||
55D1000
|
trusted library allocation
|
page read and write
|
||
5576000
|
trusted library allocation
|
page read and write
|
||
56F9000
|
trusted library allocation
|
page read and write
|
||
54EB000
|
trusted library allocation
|
page read and write
|
||
53DF000
|
stack
|
page read and write
|
||
44E000
|
unkown
|
page read and write
|
||
5538000
|
trusted library allocation
|
page read and write
|
||
2E0C000
|
heap
|
page read and write
|
||
2D60000
|
heap
|
page read and write
|
||
557A000
|
trusted library allocation
|
page read and write
|
||
55AB000
|
trusted library allocation
|
page read and write
|
||
5578000
|
trusted library allocation
|
page read and write
|
||
5526000
|
trusted library allocation
|
page read and write
|
||
5573000
|
trusted library allocation
|
page read and write
|
||
54E0000
|
trusted library allocation
|
page read and write
|
||
54E5000
|
trusted library allocation
|
page read and write
|
||
2DE8000
|
heap
|
page read and write
|
||
5574000
|
trusted library allocation
|
page read and write
|
||
1F0000
|
heap
|
page read and write
|
||
3160000
|
remote allocation
|
page read and write
|
||
5526000
|
trusted library allocation
|
page read and write
|
||
59ED000
|
trusted library allocation
|
page read and write
|
||
5573000
|
trusted library allocation
|
page read and write
|
||
55D1000
|
trusted library allocation
|
page read and write
|
||
54EC000
|
trusted library allocation
|
page read and write
|
||
5577000
|
trusted library allocation
|
page read and write
|
||
2DC9000
|
heap
|
page read and write
|
||
550D000
|
trusted library allocation
|
page read and write
|
||
555C000
|
trusted library allocation
|
page read and write
|
||
40C000
|
unkown
|
page readonly
|
||
556E000
|
trusted library allocation
|
page read and write
|
||
54F6000
|
trusted library allocation
|
page read and write
|
||
55B2000
|
trusted library allocation
|
page read and write
|
||
400000
|
unkown
|
page readonly
|
||
54EF000
|
trusted library allocation
|
page read and write
|
||
2C2F000
|
unkown
|
page readonly
|
||
5617000
|
trusted library allocation
|
page read and write
|
||
5517000
|
trusted library allocation
|
page read and write
|
||
558B000
|
trusted library allocation
|
page read and write
|
||
55C9000
|
trusted library allocation
|
page read and write
|
||
54FB000
|
trusted library allocation
|
page read and write
|
||
3030000
|
direct allocation
|
page read and write
|
||
5528000
|
trusted library allocation
|
page read and write
|
||
5687000
|
trusted library allocation
|
page read and write
|
||
5592000
|
trusted library allocation
|
page read and write
|
||
55C9000
|
trusted library allocation
|
page read and write
|
||
3200000
|
heap
|
page read and write
|
||
2DBC000
|
heap
|
page read and write
|
||
55D1000
|
trusted library allocation
|
page read and write
|
||
31CE000
|
stack
|
page read and write
|
||
330F000
|
stack
|
page read and write
|
||
54FE000
|
trusted library allocation
|
page read and write
|
||
5573000
|
trusted library allocation
|
page read and write
|
||
55D0000
|
trusted library allocation
|
page read and write
|
There are 275 hidden memdumps, click here to show them.