Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
o7b91j8vnJ.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
initial sample
|
||
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_o7b91j8vnJ.exe_dfc5acfeaf57144235ca737a897d40b288f6a0b4_c3f06f9e_887bb615-5d50-4f8c-b092-fcd390f7cce2\Report.wer
|
Unicode text, UTF-16, little-endian text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WER17B9.tmp.dmp
|
Mini DuMP crash report, 15 streams, Thu Apr 25 00:00:00 2024, 0x1205a4 type
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WER1894.tmp.WERInternalMetadata.xml
|
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WER18B5.tmp.xml
|
XML 1.0 document, ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Windows\appcompat\Programs\Amcache.hve
|
MS Windows registry file, NT/2000 or above
|
dropped
|
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\o7b91j8vnJ.exe
|
"C:\Users\user\Desktop\o7b91j8vnJ.exe"
|
||
C:\Windows\SysWOW64\WerFault.exe
|
C:\Windows\SysWOW64\WerFault.exe -u -p 6856 -s 1516
|
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
shortsvelventysjo.shop
|
|||
tolerateilusidjukl.shop
|
|||
https://strollheavengwu.shop/api
|
172.67.163.209
|
||
shatterbreathepsw.shop
|
|||
demonstationfukewko.shop
|
|||
productivelookewr.shop
|
|||
strollheavengwu.shop
|
|||
alcojoldwograpciw.shop
|
|||
incredibleextedwj.shop
|
|||
liabilitynighstjsko.shop
|
|||
https://duckduckgo.com/chrome_newtab
|
unknown
|
||
https://strollheavengwu.shop/y
|
unknown
|
||
https://duckduckgo.com/ac/?q=
|
unknown
|
||
https://strollheavengwu.shop/apib2
|
unknown
|
||
https://bridge.lga1.admarketplace.net/ctp?version=16.0.0&key=1696332238301000001.2&ci=1696332238417.
|
unknown
|
||
https://strollheavengwu.shop/apime
|
unknown
|
||
https://strollheavengwu.shop/apih02
|
unknown
|
||
https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
|
unknown
|
||
https://strollheavengwu.shop/apie
|
unknown
|
||
https://support.office.com/article/94ba2e0b-638e-4a92-8857-2cb5ac1d8e17
|
unknown
|
||
https://strollheavengwu.shop/v
|
unknown
|
||
https://strollheavengwu.shop/apis
|
unknown
|
||
https://imp.mt48.net/static?id=7RHzfOIXjFEYsBdvIpkX4QqmfZfYfQfafZbXfpbWfpbX7ReNxR3UIG8zInwYIFIVs9eYi
|
unknown
|
||
http://x1.c.lencr.org/0
|
unknown
|
||
http://x1.i.lencr.org/0
|
unknown
|
||
https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
|
unknown
|
||
https://strollheavengwu.shop/d
|
unknown
|
||
https://strollheavengwu.shop/e
|
unknown
|
||
https://support.mozilla.org/products/firefoxgro.all
|
unknown
|
||
https://strollheavengwu.shop/9
|
unknown
|
||
https://contile-images.services.mozilla.com/0TegrVVRalreHILhR2WvtD_CFzj13HCDcLqqpvXSOuY.10862.jpg
|
unknown
|
||
https://www.google.com/images/branding/product/ico/googleg_lodp.ico
|
unknown
|
||
https://strollheavengwu.shop/D
|
unknown
|
||
https://strollheavengwu.shop/apior
|
unknown
|
||
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
|
unknown
|
||
http://crl.rootca1.amazontrust.com/rootca1.crl0
|
unknown
|
||
http://upx.sf.net
|
unknown
|
||
http://ocsp.rootca1.amazontrust.com0:
|
unknown
|
||
https://support.office.com/article/7D48285B-20E8-4B9B-91AD-216E34163BAD?wt.mc_id=EnterPK2016
|
unknown
|
||
https://www.ecosia.org/newtab/
|
unknown
|
||
https://support.mozilla.org/kb/customize-firefox-controls-buttons-and-toolbars?utm_source=firefox-br
|
unknown
|
||
https://strollheavengwu.shop/7
|
unknown
|
||
https://ac.ecosia.org/autocomplete?q=
|
unknown
|
||
https://support.microsof
|
unknown
|
||
https://strollheavengwu.shop/apiIF3
|
unknown
|
||
http://crt.rootca1.amazontrust.com/rootca1.cer0?
|
unknown
|
||
https://strollheavengwu.shop/apiN
|
unknown
|
||
https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
|
unknown
|
||
https://strollheavengwu.shop/
|
unknown
|
There are 39 hidden URLs, click here to show them.
Domains
Name
|
IP
|
Malicious
|
|
---|---|---|---|
strollheavengwu.shop
|
172.67.163.209
|
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
172.67.163.209
|
strollheavengwu.shop
|
United States
|
Registry
Path
|
Value
|
Malicious
|
|
---|---|---|---|
\REGISTRY\A\{c9e459b5-07f9-a64f-106f-1481a3473949}\Root\InventoryApplicationFile\o7b91j8vnj.exe|cb12a0e67bfe11b9
|
ProgramId
|
||
\REGISTRY\A\{c9e459b5-07f9-a64f-106f-1481a3473949}\Root\InventoryApplicationFile\o7b91j8vnj.exe|cb12a0e67bfe11b9
|
FileId
|
||
\REGISTRY\A\{c9e459b5-07f9-a64f-106f-1481a3473949}\Root\InventoryApplicationFile\o7b91j8vnj.exe|cb12a0e67bfe11b9
|
LowerCaseLongPath
|
||
\REGISTRY\A\{c9e459b5-07f9-a64f-106f-1481a3473949}\Root\InventoryApplicationFile\o7b91j8vnj.exe|cb12a0e67bfe11b9
|
LongPathHash
|
||
\REGISTRY\A\{c9e459b5-07f9-a64f-106f-1481a3473949}\Root\InventoryApplicationFile\o7b91j8vnj.exe|cb12a0e67bfe11b9
|
Name
|
||
\REGISTRY\A\{c9e459b5-07f9-a64f-106f-1481a3473949}\Root\InventoryApplicationFile\o7b91j8vnj.exe|cb12a0e67bfe11b9
|
OriginalFileName
|
||
\REGISTRY\A\{c9e459b5-07f9-a64f-106f-1481a3473949}\Root\InventoryApplicationFile\o7b91j8vnj.exe|cb12a0e67bfe11b9
|
Publisher
|
||
\REGISTRY\A\{c9e459b5-07f9-a64f-106f-1481a3473949}\Root\InventoryApplicationFile\o7b91j8vnj.exe|cb12a0e67bfe11b9
|
Version
|
||
\REGISTRY\A\{c9e459b5-07f9-a64f-106f-1481a3473949}\Root\InventoryApplicationFile\o7b91j8vnj.exe|cb12a0e67bfe11b9
|
BinFileVersion
|
||
\REGISTRY\A\{c9e459b5-07f9-a64f-106f-1481a3473949}\Root\InventoryApplicationFile\o7b91j8vnj.exe|cb12a0e67bfe11b9
|
BinaryType
|
||
\REGISTRY\A\{c9e459b5-07f9-a64f-106f-1481a3473949}\Root\InventoryApplicationFile\o7b91j8vnj.exe|cb12a0e67bfe11b9
|
ProductName
|
||
\REGISTRY\A\{c9e459b5-07f9-a64f-106f-1481a3473949}\Root\InventoryApplicationFile\o7b91j8vnj.exe|cb12a0e67bfe11b9
|
ProductVersion
|
||
\REGISTRY\A\{c9e459b5-07f9-a64f-106f-1481a3473949}\Root\InventoryApplicationFile\o7b91j8vnj.exe|cb12a0e67bfe11b9
|
LinkDate
|
||
\REGISTRY\A\{c9e459b5-07f9-a64f-106f-1481a3473949}\Root\InventoryApplicationFile\o7b91j8vnj.exe|cb12a0e67bfe11b9
|
BinProductVersion
|
||
\REGISTRY\A\{c9e459b5-07f9-a64f-106f-1481a3473949}\Root\InventoryApplicationFile\o7b91j8vnj.exe|cb12a0e67bfe11b9
|
AppxPackageFullName
|
||
\REGISTRY\A\{c9e459b5-07f9-a64f-106f-1481a3473949}\Root\InventoryApplicationFile\o7b91j8vnj.exe|cb12a0e67bfe11b9
|
AppxPackageRelativeId
|
||
\REGISTRY\A\{c9e459b5-07f9-a64f-106f-1481a3473949}\Root\InventoryApplicationFile\o7b91j8vnj.exe|cb12a0e67bfe11b9
|
Size
|
||
\REGISTRY\A\{c9e459b5-07f9-a64f-106f-1481a3473949}\Root\InventoryApplicationFile\o7b91j8vnj.exe|cb12a0e67bfe11b9
|
Language
|
||
\REGISTRY\A\{c9e459b5-07f9-a64f-106f-1481a3473949}\Root\InventoryApplicationFile\o7b91j8vnj.exe|cb12a0e67bfe11b9
|
Usn
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\IdentityCRL\ClockData
|
ClockTimeSeconds
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\IdentityCRL\ClockData
|
TickCount
|
There are 11 hidden registries, click here to show them.
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
41D0000
|
direct allocation
|
page execute and read and write
|
||
433F000
|
heap
|
page read and write
|
||
6892000
|
trusted library allocation
|
page read and write
|
||
6895000
|
trusted library allocation
|
page read and write
|
||
4326000
|
heap
|
page read and write
|
||
6BB3000
|
trusted library allocation
|
page read and write
|
||
6874000
|
trusted library allocation
|
page read and write
|
||
433E000
|
heap
|
page read and write
|
||
400000
|
unkown
|
page readonly
|
||
6829000
|
trusted library allocation
|
page read and write
|
||
42C9000
|
heap
|
page read and write
|
||
42E8000
|
heap
|
page read and write
|
||
66CF000
|
stack
|
page read and write
|
||
433E000
|
heap
|
page read and write
|
||
6842000
|
trusted library allocation
|
page read and write
|
||
6826000
|
trusted library allocation
|
page read and write
|
||
6826000
|
trusted library allocation
|
page read and write
|
||
6895000
|
trusted library allocation
|
page read and write
|
||
6836000
|
trusted library allocation
|
page read and write
|
||
5D90000
|
remote allocation
|
page read and write
|
||
6842000
|
trusted library allocation
|
page read and write
|
||
433E000
|
heap
|
page read and write
|
||
682B000
|
trusted library allocation
|
page read and write
|
||
418E000
|
stack
|
page read and write
|
||
4324000
|
heap
|
page read and write
|
||
685B000
|
trusted library allocation
|
page read and write
|
||
683B000
|
trusted library allocation
|
page read and write
|
||
6835000
|
trusted library allocation
|
page read and write
|
||
685C000
|
trusted library allocation
|
page read and write
|
||
6887000
|
trusted library allocation
|
page read and write
|
||
6830000
|
trusted library allocation
|
page read and write
|
||
6830000
|
trusted library allocation
|
page read and write
|
||
4332000
|
heap
|
page read and write
|
||
682C000
|
trusted library allocation
|
page read and write
|
||
42CC000
|
heap
|
page read and write
|
||
6854000
|
trusted library allocation
|
page read and write
|
||
5FAD000
|
stack
|
page read and write
|
||
6835000
|
trusted library allocation
|
page read and write
|
||
686B000
|
trusted library allocation
|
page read and write
|
||
682E000
|
trusted library allocation
|
page read and write
|
||
42CC000
|
heap
|
page read and write
|
||
686D000
|
trusted library allocation
|
page read and write
|
||
6887000
|
trusted library allocation
|
page read and write
|
||
684D000
|
trusted library allocation
|
page read and write
|
||
433A000
|
heap
|
page read and write
|
||
686B000
|
trusted library allocation
|
page read and write
|
||
6864000
|
trusted library allocation
|
page read and write
|
||
6830000
|
trusted library allocation
|
page read and write
|
||
6921000
|
heap
|
page read and write
|
||
6830000
|
trusted library allocation
|
page read and write
|
||
6843000
|
trusted library allocation
|
page read and write
|
||
682C000
|
trusted library allocation
|
page read and write
|
||
69F8000
|
trusted library allocation
|
page read and write
|
||
6921000
|
trusted library allocation
|
page read and write
|
||
4340000
|
heap
|
page read and write
|
||
6826000
|
trusted library allocation
|
page read and write
|
||
42A3000
|
heap
|
page read and write
|
||
6830000
|
trusted library allocation
|
page read and write
|
||
6836000
|
trusted library allocation
|
page read and write
|
||
434A000
|
heap
|
page read and write
|
||
6821000
|
trusted library allocation
|
page read and write
|
||
4346000
|
heap
|
page read and write
|
||
4265000
|
heap
|
page execute and read and write
|
||
682F000
|
trusted library allocation
|
page read and write
|
||
6830000
|
trusted library allocation
|
page read and write
|
||
433A000
|
heap
|
page read and write
|
||
433E000
|
heap
|
page read and write
|
||
6B7F000
|
stack
|
page read and write
|
||
6826000
|
trusted library allocation
|
page read and write
|
||
418000
|
unkown
|
page write copy
|
||
6895000
|
trusted library allocation
|
page read and write
|
||
686D000
|
trusted library allocation
|
page read and write
|
||
683B000
|
trusted library allocation
|
page read and write
|
||
683C000
|
trusted library allocation
|
page read and write
|
||
4147000
|
heap
|
page read and write
|
||
6830000
|
trusted library allocation
|
page read and write
|
||
4325000
|
heap
|
page read and write
|
||
4335000
|
heap
|
page read and write
|
||
6864000
|
trusted library allocation
|
page read and write
|
||
6835000
|
trusted library allocation
|
page read and write
|
||
5CF0000
|
direct allocation
|
page read and write
|
||
5FEE000
|
stack
|
page read and write
|
||
6865000
|
trusted library allocation
|
page read and write
|
||
4145000
|
heap
|
page read and write
|
||
4346000
|
heap
|
page read and write
|
||
6843000
|
trusted library allocation
|
page read and write
|
||
6822000
|
trusted library allocation
|
page read and write
|
||
6821000
|
trusted library allocation
|
page read and write
|
||
5D8E000
|
stack
|
page read and write
|
||
5D90000
|
remote allocation
|
page read and write
|
||
6850000
|
trusted library allocation
|
page read and write
|
||
6826000
|
trusted library allocation
|
page read and write
|
||
6C60000
|
heap
|
page read and write
|
||
433E000
|
heap
|
page read and write
|
||
6824000
|
trusted library allocation
|
page read and write
|
||
6864000
|
trusted library allocation
|
page read and write
|
||
6881000
|
trusted library allocation
|
page read and write
|
||
42B2000
|
heap
|
page read and write
|
||
685E000
|
trusted library allocation
|
page read and write
|
||
5D2D000
|
stack
|
page read and write
|
||
684D000
|
trusted library allocation
|
page read and write
|
||
6820000
|
trusted library allocation
|
page read and write
|
||
433A000
|
heap
|
page read and write
|
||
60EF000
|
stack
|
page read and write
|
||
6830000
|
trusted library allocation
|
page read and write
|
||
68CA000
|
trusted library allocation
|
page read and write
|
||
6853000
|
trusted library allocation
|
page read and write
|
||
68C2000
|
trusted library allocation
|
page read and write
|
||
69F0000
|
trusted library allocation
|
page read and write
|
||
6978000
|
trusted library allocation
|
page read and write
|
||
425E000
|
heap
|
page read and write
|
||
6830000
|
trusted library allocation
|
page read and write
|
||
683E000
|
trusted library allocation
|
page read and write
|
||
6830000
|
trusted library allocation
|
page read and write
|
||
68BB000
|
trusted library allocation
|
page read and write
|
||
1F0000
|
heap
|
page read and write
|
||
6830000
|
trusted library allocation
|
page read and write
|
||
684E000
|
trusted library allocation
|
page read and write
|
||
6843000
|
trusted library allocation
|
page read and write
|
||
68A3000
|
trusted library allocation
|
page read and write
|
||
434C000
|
heap
|
page read and write
|
||
6886000
|
trusted library allocation
|
page read and write
|
||
683C000
|
trusted library allocation
|
page read and write
|
||
4326000
|
heap
|
page read and write
|
||
6940000
|
trusted library allocation
|
page read and write
|
||
433E000
|
heap
|
page read and write
|
||
433E000
|
heap
|
page read and write
|
||
6835000
|
trusted library allocation
|
page read and write
|
||
6C74000
|
trusted library allocation
|
page read and write
|
||
433A000
|
heap
|
page read and write
|
||
6875000
|
trusted library allocation
|
page read and write
|
||
6859000
|
trusted library allocation
|
page read and write
|
||
4038000
|
unkown
|
page readonly
|
||
4338000
|
heap
|
page read and write
|
||
6883000
|
trusted library allocation
|
page read and write
|
||
688A000
|
trusted library allocation
|
page read and write
|
||
68B5000
|
trusted library allocation
|
page read and write
|
||
6830000
|
trusted library allocation
|
page read and write
|
||
683C000
|
trusted library allocation
|
page read and write
|
||
4346000
|
heap
|
page read and write
|
||
411000
|
unkown
|
page readonly
|
||
6835000
|
trusted library allocation
|
page read and write
|
||
683A000
|
trusted library allocation
|
page read and write
|
||
717D000
|
trusted library allocation
|
page read and write
|
||
6889000
|
trusted library allocation
|
page read and write
|
||
6826000
|
trusted library allocation
|
page read and write
|
||
6887000
|
trusted library allocation
|
page read and write
|
||
4349000
|
heap
|
page read and write
|
||
6826000
|
trusted library allocation
|
page read and write
|
||
42AD000
|
heap
|
page read and write
|
||
6927000
|
trusted library allocation
|
page read and write
|
||
684E000
|
trusted library allocation
|
page read and write
|
||
6830000
|
trusted library allocation
|
page read and write
|
||
622F000
|
stack
|
page read and write
|
||
6830000
|
trusted library allocation
|
page read and write
|
||
4340000
|
heap
|
page read and write
|
||
6854000
|
trusted library allocation
|
page read and write
|
||
686D000
|
trusted library allocation
|
page read and write
|
||
612E000
|
stack
|
page read and write
|
||
683C000
|
trusted library allocation
|
page read and write
|
||
6885000
|
trusted library allocation
|
page read and write
|
||
42C9000
|
heap
|
page read and write
|
||
4038000
|
unkown
|
page readonly
|
||
449000
|
unkown
|
page execute and read and write
|
||
6920000
|
heap
|
page read and write
|
||
686E000
|
trusted library allocation
|
page read and write
|
||
6881000
|
trusted library allocation
|
page read and write
|
||
4325000
|
heap
|
page read and write
|
||
686C000
|
trusted library allocation
|
page read and write
|
||
4250000
|
heap
|
page read and write
|
||
6A00000
|
trusted library allocation
|
page read and write
|
||
685E000
|
trusted library allocation
|
page read and write
|
||
682C000
|
trusted library allocation
|
page read and write
|
||
4347000
|
heap
|
page read and write
|
||
6853000
|
trusted library allocation
|
page read and write
|
||
686D000
|
trusted library allocation
|
page read and write
|
||
6874000
|
trusted library allocation
|
page read and write
|
||
6A7E000
|
stack
|
page read and write
|
||
6830000
|
trusted library allocation
|
page read and write
|
||
6882000
|
trusted library allocation
|
page read and write
|
||
685F000
|
trusted library allocation
|
page read and write
|
||
6871000
|
trusted library allocation
|
page read and write
|
||
6830000
|
trusted library allocation
|
page read and write
|
||
685C000
|
trusted library allocation
|
page read and write
|
||
686D000
|
trusted library allocation
|
page read and write
|
||
4220000
|
heap
|
page read and write
|
||
68CA000
|
trusted library allocation
|
page read and write
|
||
6854000
|
trusted library allocation
|
page read and write
|
||
686D000
|
trusted library allocation
|
page read and write
|
||
425A000
|
heap
|
page read and write
|
||
686D000
|
trusted library allocation
|
page read and write
|
||
68C2000
|
trusted library allocation
|
page read and write
|
||
683B000
|
trusted library allocation
|
page read and write
|
||
6871000
|
trusted library allocation
|
page read and write
|
||
6826000
|
trusted library allocation
|
page read and write
|
||
5CEF000
|
stack
|
page read and write
|
||
433E000
|
heap
|
page read and write
|
||
670E000
|
stack
|
page read and write
|
||
6855000
|
trusted library allocation
|
page read and write
|
||
6826000
|
trusted library allocation
|
page read and write
|
||
683D000
|
trusted library allocation
|
page read and write
|
||
4324000
|
heap
|
page read and write
|
||
6825000
|
trusted library allocation
|
page read and write
|
||
4036000
|
unkown
|
page read and write
|
||
6858000
|
trusted library allocation
|
page read and write
|
||
68BA000
|
trusted library allocation
|
page read and write
|
||
433E000
|
heap
|
page read and write
|
||
682D000
|
trusted library allocation
|
page read and write
|
||
4340000
|
heap
|
page read and write
|
||
401000
|
unkown
|
page execute read
|
||
4332000
|
heap
|
page read and write
|
||
4325000
|
heap
|
page read and write
|
||
6895000
|
trusted library allocation
|
page read and write
|
||
196000
|
stack
|
page read and write
|
||
6830000
|
trusted library allocation
|
page read and write
|
||
683C000
|
trusted library allocation
|
page read and write
|
||
6841000
|
trusted library allocation
|
page read and write
|
||
4140000
|
heap
|
page read and write
|
||
433F000
|
heap
|
page read and write
|
||
68AD000
|
trusted library allocation
|
page read and write
|
||
6830000
|
trusted library allocation
|
page read and write
|
||
685E000
|
trusted library allocation
|
page read and write
|
||
6836000
|
trusted library allocation
|
page read and write
|
||
6BB0000
|
trusted library allocation
|
page read and write
|
||
686C000
|
trusted library allocation
|
page read and write
|
||
68C2000
|
trusted library allocation
|
page read and write
|
||
9B000
|
stack
|
page read and write
|
||
431F000
|
heap
|
page read and write
|
||
6821000
|
trusted library allocation
|
page read and write
|
||
6842000
|
trusted library allocation
|
page read and write
|
||
5D90000
|
remote allocation
|
page read and write
|
||
6858000
|
trusted library allocation
|
page read and write
|
||
686C000
|
trusted library allocation
|
page read and write
|
||
685B000
|
trusted library allocation
|
page read and write
|
||
6895000
|
trusted library allocation
|
page read and write
|
||
41CE000
|
stack
|
page read and write
|
||
686C000
|
trusted library allocation
|
page read and write
|
||
686C000
|
trusted library allocation
|
page read and write
|
||
6828000
|
trusted library allocation
|
page read and write
|
||
6826000
|
trusted library allocation
|
page read and write
|
||
683C000
|
trusted library allocation
|
page read and write
|
||
6869000
|
trusted library allocation
|
page read and write
|
||
4335000
|
heap
|
page read and write
|
||
683D000
|
trusted library allocation
|
page read and write
|
||
682F000
|
trusted library allocation
|
page read and write
|
||
6857000
|
trusted library allocation
|
page read and write
|
||
6852000
|
trusted library allocation
|
page read and write
|
||
6858000
|
trusted library allocation
|
page read and write
|
||
683B000
|
trusted library allocation
|
page read and write
|
||
6821000
|
trusted library allocation
|
page read and write
|
||
688A000
|
trusted library allocation
|
page read and write
|
||
5EAD000
|
stack
|
page read and write
|
||
4332000
|
heap
|
page read and write
|
||
6839000
|
trusted library allocation
|
page read and write
|
||
687C000
|
trusted library allocation
|
page read and write
|
||
683C000
|
trusted library allocation
|
page read and write
|
||
6847000
|
trusted library allocation
|
page read and write
|
||
686A000
|
trusted library allocation
|
page read and write
|
||
6835000
|
trusted library allocation
|
page read and write
|
||
683D000
|
trusted library allocation
|
page read and write
|
||
6839000
|
trusted library allocation
|
page read and write
|
||
683A000
|
trusted library allocation
|
page read and write
|
||
6830000
|
trusted library allocation
|
page read and write
|
||
685B000
|
trusted library allocation
|
page read and write
|
||
688A000
|
trusted library allocation
|
page read and write
|
||
444F000
|
stack
|
page read and write
|
||
6893000
|
trusted library allocation
|
page read and write
|
||
6872000
|
trusted library allocation
|
page read and write
|
||
4291000
|
heap
|
page read and write
|
||
400000
|
unkown
|
page execute and read and write
|
||
686D000
|
trusted library allocation
|
page read and write
|
||
6826000
|
trusted library allocation
|
page read and write
|
||
42B2000
|
heap
|
page read and write
|
||
5D40000
|
heap
|
page read and write
|
||
6829000
|
trusted library allocation
|
page read and write
|
||
6882000
|
trusted library allocation
|
page read and write
|
||
4332000
|
heap
|
page read and write
|
||
433E000
|
heap
|
page read and write
|
||
684D000
|
trusted library allocation
|
page read and write
|
||
6889000
|
trusted library allocation
|
page read and write
|
||
682F000
|
trusted library allocation
|
page read and write
|
||
6843000
|
trusted library allocation
|
page read and write
|
||
433A000
|
heap
|
page read and write
|
||
42BF000
|
heap
|
page read and write
|
||
6837000
|
trusted library allocation
|
page read and write
|
||
6853000
|
trusted library allocation
|
page read and write
|
||
682F000
|
trusted library allocation
|
page read and write
|
||
685B000
|
trusted library allocation
|
page read and write
|
||
6821000
|
trusted library allocation
|
page read and write
|
||
6850000
|
trusted library allocation
|
page read and write
|
||
683D000
|
trusted library allocation
|
page read and write
|
||
6821000
|
trusted library allocation
|
page read and write
|
||
6854000
|
trusted library allocation
|
page read and write
|
||
4120000
|
heap
|
page read and write
|
||
685E000
|
trusted library allocation
|
page read and write
|
||
4343000
|
heap
|
page read and write
|
||
4327000
|
heap
|
page read and write
|
||
6830000
|
trusted library allocation
|
page read and write
|
||
4340000
|
heap
|
page read and write
|
||
68C3000
|
trusted library allocation
|
page read and write
|
||
680E000
|
stack
|
page read and write
|
||
41E000
|
unkown
|
page write copy
|
||
65CE000
|
stack
|
page read and write
|
||
6830000
|
trusted library allocation
|
page read and write
|
||
685F000
|
trusted library allocation
|
page read and write
|
||
433E000
|
heap
|
page read and write
|
||
6830000
|
trusted library allocation
|
page read and write
|
||
683C000
|
trusted library allocation
|
page read and write
|
||
685C000
|
trusted library allocation
|
page read and write
|
||
6843000
|
trusted library allocation
|
page read and write
|
||
68CA000
|
trusted library allocation
|
page read and write
|
||
6826000
|
trusted library allocation
|
page read and write
|
||
6884000
|
trusted library allocation
|
page read and write
|
||
686D000
|
trusted library allocation
|
page read and write
|
||
4335000
|
heap
|
page read and write
|
||
6A90000
|
trusted library allocation
|
page read and write
|
||
685C000
|
trusted library allocation
|
page read and write
|
||
6830000
|
trusted library allocation
|
page read and write
|
||
6865000
|
trusted library allocation
|
page read and write
|
||
6825000
|
trusted library allocation
|
page read and write
|
||
5DA0000
|
heap
|
page read and write
|
||
6958000
|
trusted library allocation
|
page read and write
|
||
682C000
|
trusted library allocation
|
page read and write
|
||
684E000
|
trusted library allocation
|
page read and write
|
||
6821000
|
trusted library allocation
|
page read and write
|
||
686C000
|
trusted library allocation
|
page read and write
|
||
42A9000
|
heap
|
page read and write
|
||
6826000
|
trusted library allocation
|
page read and write
|
||
7683000
|
trusted library allocation
|
page read and write
|
||
4335000
|
heap
|
page read and write
|
||
6875000
|
trusted library allocation
|
page read and write
|
||
687C000
|
trusted library allocation
|
page read and write
|
||
6843000
|
trusted library allocation
|
page read and write
|
||
69C8000
|
trusted library allocation
|
page read and write
|
||
433E000
|
heap
|
page read and write
|
||
6835000
|
trusted library allocation
|
page read and write
|
||
4347000
|
heap
|
page read and write
|
||
6830000
|
trusted library allocation
|
page read and write
|
||
6830000
|
trusted library allocation
|
page read and write
|
||
6839000
|
trusted library allocation
|
page read and write
|
||
68C2000
|
trusted library allocation
|
page read and write
|
||
6829000
|
trusted library allocation
|
page read and write
|
||
6871000
|
trusted library allocation
|
page read and write
|
||
686D000
|
trusted library allocation
|
page read and write
|
||
68CA000
|
trusted library allocation
|
page read and write
|
||
6843000
|
trusted library allocation
|
page read and write
|
||
6880000
|
trusted library allocation
|
page read and write
|
||
6826000
|
trusted library allocation
|
page read and write
|
||
4347000
|
heap
|
page read and write
|
||
685E000
|
trusted library allocation
|
page read and write
|
||
6835000
|
trusted library allocation
|
page read and write
|
||
6885000
|
trusted library allocation
|
page read and write
|
||
433A000
|
heap
|
page read and write
|
There are 343 hidden memdumps, click here to show them.