Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
VoGtelkHSn.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
initial sample
|
||
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_VoGtelkHSn.exe_f761c59d348b96dd452ab7afe8f633ac68302a8_1ce72faa_daaeda3a-c187-4474-9194-c28c6a83adde\Report.wer
|
Unicode text, UTF-16, little-endian text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WER43F.tmp.dmp
|
Mini DuMP crash report, 15 streams, Fri Apr 26 03:44:09 2024, 0x1205a4 type
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WER53A.tmp.WERInternalMetadata.xml
|
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WER56A.tmp.xml
|
XML 1.0 document, ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Windows\appcompat\Programs\Amcache.hve
|
MS Windows registry file, NT/2000 or above
|
dropped
|
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\VoGtelkHSn.exe
|
"C:\Users\user\Desktop\VoGtelkHSn.exe"
|
||
C:\Windows\SysWOW64\WerFault.exe
|
C:\Windows\SysWOW64\WerFault.exe -u -p 5444 -s 1612
|
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
incredibleextedwj.shop
|
|||
shortsvelventysjo.shop
|
|||
tolerateilusidjukl.shop
|
|||
liabilitynighstjsko.shop
|
|||
https://strollheavengwu.shop/api
|
172.67.163.209
|
||
shatterbreathepsw.shop
|
|||
demonstationfukewko.shop
|
|||
productivelookewr.shop
|
|||
strollheavengwu.shop
|
|||
alcojoldwograpciw.shop
|
|||
https://duckduckgo.com/chrome_newtab
|
unknown
|
||
https://strollheavengwu.shop/apiV
|
unknown
|
||
https://duckduckgo.com/ac/?q=
|
unknown
|
||
https://www.google.com/images/branding/product/ico/googleg_lodp.ico
|
unknown
|
||
https://imp.mt48.net/static?id=7RHzfOIXjFEYsBdvIpkX4Qqm4p8dfCfm4pbW1pbWfpbW7ReNxR3UIG8zInwYIFIVs9eYi
|
unknown
|
||
https://bridge.sfo1.admarketplace.net/ctp?version=16.0.0&key=1696425136400800000.2&ci=1696425136743.
|
unknown
|
||
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
|
unknown
|
||
http://crl.rootca1.amazontrust.com/rootca1.crl0
|
unknown
|
||
http://upx.sf.net
|
unknown
|
||
https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
|
unknown
|
||
http://ocsp.rootca1.amazontrust.com0:
|
unknown
|
||
https://www.ecosia.org/newtab/
|
unknown
|
||
https://bridge.sfo1.ap01.net/ctp?version=16.0.0&key=1696425136400800000.1&ci=1696425136743.12791&cta
|
unknown
|
||
https://support.mozilla.org/kb/customize-firefox-controls-buttons-and-toolbars?utm_source=firefox-br
|
unknown
|
||
https://ac.ecosia.org/autocomplete?q=
|
unknown
|
||
https://strollheavengwu.shop/apis
|
unknown
|
||
https://contile-images.services.mozilla.com/u1AuJcj32cbVUf9NjMipLXEYwu2uFIt4lsj-ccwVqEs.36904.jpg
|
unknown
|
||
https://contile-images.services.mozilla.com/obgoOYObjIFea_bXuT6L4LbBJ8j425AD87S1HMD3BWg.9991.jpg
|
unknown
|
||
http://x1.c.lencr.org/0
|
unknown
|
||
http://x1.i.lencr.org/0
|
unknown
|
||
https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
|
unknown
|
||
http://crt.rootca1.amazontrust.com/rootca1.cer0?
|
unknown
|
||
https://www.bestbuy.com/site/electronics/top-deals/pcmcat1563299784494.c/?id=pcmcat1563299784494&ref
|
unknown
|
||
https://www.amazon.com/?tag=admarketus-20&ref=pd_sl_35787f1071928bc3a1aef90b79c9bee9c64ba6683fde7477
|
unknown
|
||
https://strollheavengwu.shop/apiC
|
unknown
|
||
https://support.mozilla.org/products/firefoxgro.all
|
unknown
|
||
https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
|
unknown
|
||
https://strollheavengwu.shop/P
|
unknown
|
||
https://strollheavengwu.shop/
|
unknown
|
There are 29 hidden URLs, click here to show them.
Domains
Name
|
IP
|
Malicious
|
|
---|---|---|---|
strollheavengwu.shop
|
172.67.163.209
|
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
172.67.163.209
|
strollheavengwu.shop
|
United States
|
Registry
Path
|
Value
|
Malicious
|
|
---|---|---|---|
\REGISTRY\A\{1136f136-015e-ba46-707d-5fab3ed2a911}\Root\InventoryApplicationFile\vogtelkhsn.exe|302e56cd512786f8
|
ProgramId
|
||
\REGISTRY\A\{1136f136-015e-ba46-707d-5fab3ed2a911}\Root\InventoryApplicationFile\vogtelkhsn.exe|302e56cd512786f8
|
FileId
|
||
\REGISTRY\A\{1136f136-015e-ba46-707d-5fab3ed2a911}\Root\InventoryApplicationFile\vogtelkhsn.exe|302e56cd512786f8
|
LowerCaseLongPath
|
||
\REGISTRY\A\{1136f136-015e-ba46-707d-5fab3ed2a911}\Root\InventoryApplicationFile\vogtelkhsn.exe|302e56cd512786f8
|
LongPathHash
|
||
\REGISTRY\A\{1136f136-015e-ba46-707d-5fab3ed2a911}\Root\InventoryApplicationFile\vogtelkhsn.exe|302e56cd512786f8
|
Name
|
||
\REGISTRY\A\{1136f136-015e-ba46-707d-5fab3ed2a911}\Root\InventoryApplicationFile\vogtelkhsn.exe|302e56cd512786f8
|
OriginalFileName
|
||
\REGISTRY\A\{1136f136-015e-ba46-707d-5fab3ed2a911}\Root\InventoryApplicationFile\vogtelkhsn.exe|302e56cd512786f8
|
Publisher
|
||
\REGISTRY\A\{1136f136-015e-ba46-707d-5fab3ed2a911}\Root\InventoryApplicationFile\vogtelkhsn.exe|302e56cd512786f8
|
Version
|
||
\REGISTRY\A\{1136f136-015e-ba46-707d-5fab3ed2a911}\Root\InventoryApplicationFile\vogtelkhsn.exe|302e56cd512786f8
|
BinFileVersion
|
||
\REGISTRY\A\{1136f136-015e-ba46-707d-5fab3ed2a911}\Root\InventoryApplicationFile\vogtelkhsn.exe|302e56cd512786f8
|
BinaryType
|
||
\REGISTRY\A\{1136f136-015e-ba46-707d-5fab3ed2a911}\Root\InventoryApplicationFile\vogtelkhsn.exe|302e56cd512786f8
|
ProductName
|
||
\REGISTRY\A\{1136f136-015e-ba46-707d-5fab3ed2a911}\Root\InventoryApplicationFile\vogtelkhsn.exe|302e56cd512786f8
|
ProductVersion
|
||
\REGISTRY\A\{1136f136-015e-ba46-707d-5fab3ed2a911}\Root\InventoryApplicationFile\vogtelkhsn.exe|302e56cd512786f8
|
LinkDate
|
||
\REGISTRY\A\{1136f136-015e-ba46-707d-5fab3ed2a911}\Root\InventoryApplicationFile\vogtelkhsn.exe|302e56cd512786f8
|
BinProductVersion
|
||
\REGISTRY\A\{1136f136-015e-ba46-707d-5fab3ed2a911}\Root\InventoryApplicationFile\vogtelkhsn.exe|302e56cd512786f8
|
AppxPackageFullName
|
||
\REGISTRY\A\{1136f136-015e-ba46-707d-5fab3ed2a911}\Root\InventoryApplicationFile\vogtelkhsn.exe|302e56cd512786f8
|
AppxPackageRelativeId
|
||
\REGISTRY\A\{1136f136-015e-ba46-707d-5fab3ed2a911}\Root\InventoryApplicationFile\vogtelkhsn.exe|302e56cd512786f8
|
Size
|
||
\REGISTRY\A\{1136f136-015e-ba46-707d-5fab3ed2a911}\Root\InventoryApplicationFile\vogtelkhsn.exe|302e56cd512786f8
|
Language
|
||
\REGISTRY\A\{1136f136-015e-ba46-707d-5fab3ed2a911}\Root\InventoryApplicationFile\vogtelkhsn.exe|302e56cd512786f8
|
Usn
|
There are 9 hidden registries, click here to show them.
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
2F40000
|
direct allocation
|
page read and write
|
||
544A000
|
trusted library allocation
|
page read and write
|
||
54F3000
|
trusted library allocation
|
page read and write
|
||
544F000
|
trusted library allocation
|
page read and write
|
||
5507000
|
trusted library allocation
|
page read and write
|
||
5497000
|
trusted library allocation
|
page read and write
|
||
54DB000
|
trusted library allocation
|
page read and write
|
||
544A000
|
trusted library allocation
|
page read and write
|
||
550C000
|
trusted library allocation
|
page read and write
|
||
2CD0000
|
heap
|
page read and write
|
||
2C7A000
|
heap
|
page read and write
|
||
5441000
|
trusted library allocation
|
page read and write
|
||
5534000
|
trusted library allocation
|
page read and write
|
||
5534000
|
trusted library allocation
|
page read and write
|
||
54D8000
|
trusted library allocation
|
page read and write
|
||
546F000
|
trusted library allocation
|
page read and write
|
||
54DB000
|
trusted library allocation
|
page read and write
|
||
544A000
|
trusted library allocation
|
page read and write
|
||
2CCE000
|
heap
|
page read and write
|
||
5515000
|
trusted library allocation
|
page read and write
|
||
544A000
|
trusted library allocation
|
page read and write
|
||
5534000
|
trusted library allocation
|
page read and write
|
||
2CCC000
|
heap
|
page read and write
|
||
5515000
|
trusted library allocation
|
page read and write
|
||
54BE000
|
trusted library allocation
|
page read and write
|
||
5443000
|
trusted library allocation
|
page read and write
|
||
54DF000
|
trusted library allocation
|
page read and write
|
||
2CD3000
|
heap
|
page read and write
|
||
54DE000
|
trusted library allocation
|
page read and write
|
||
54D3000
|
trusted library allocation
|
page read and write
|
||
543E000
|
stack
|
page read and write
|
||
54D6000
|
trusted library allocation
|
page read and write
|
||
545B000
|
trusted library allocation
|
page read and write
|
||
5627000
|
trusted library allocation
|
page read and write
|
||
56B7000
|
trusted library allocation
|
page read and write
|
||
54DD000
|
trusted library allocation
|
page read and write
|
||
2CCC000
|
heap
|
page read and write
|
||
2CB4000
|
heap
|
page read and write
|
||
54DB000
|
trusted library allocation
|
page read and write
|
||
5487000
|
trusted library allocation
|
page read and write
|
||
546A000
|
trusted library allocation
|
page read and write
|
||
552A000
|
trusted library allocation
|
page read and write
|
||
5659000
|
trusted library allocation
|
page read and write
|
||
2CD2000
|
heap
|
page read and write
|
||
5508000
|
trusted library allocation
|
page read and write
|
||
4C2E000
|
stack
|
page read and write
|
||
2F00000
|
heap
|
page read and write
|
||
544A000
|
trusted library allocation
|
page read and write
|
||
5460000
|
trusted library allocation
|
page read and write
|
||
54E4000
|
trusted library allocation
|
page read and write
|
||
546E000
|
trusted library allocation
|
page read and write
|
||
54E4000
|
trusted library allocation
|
page read and write
|
||
546A000
|
trusted library allocation
|
page read and write
|
||
2CBB000
|
heap
|
page read and write
|
||
2CCC000
|
heap
|
page read and write
|
||
5505000
|
trusted library allocation
|
page read and write
|
||
5490000
|
trusted library allocation
|
page read and write
|
||
54DB000
|
trusted library allocation
|
page read and write
|
||
5B30000
|
heap
|
page read and write
|
||
54DD000
|
trusted library allocation
|
page read and write
|
||
54DB000
|
trusted library allocation
|
page read and write
|
||
5450000
|
trusted library allocation
|
page read and write
|
||
2F80000
|
remote allocation
|
page read and write
|
||
547D000
|
trusted library allocation
|
page read and write
|
||
5462000
|
trusted library allocation
|
page read and write
|
||
54F5000
|
trusted library allocation
|
page read and write
|
||
5505000
|
trusted library allocation
|
page read and write
|
||
54E4000
|
trusted library allocation
|
page read and write
|
||
54DD000
|
trusted library allocation
|
page read and write
|
||
421000
|
unkown
|
page readonly
|
||
59DC000
|
trusted library allocation
|
page read and write
|
||
2CB3000
|
heap
|
page read and write
|
||
54DA000
|
trusted library allocation
|
page read and write
|
||
552A000
|
trusted library allocation
|
page read and write
|
||
655F000
|
trusted library allocation
|
page read and write
|
||
5512000
|
trusted library allocation
|
page read and write
|
||
2CD0000
|
heap
|
page read and write
|
||
550B000
|
trusted library allocation
|
page read and write
|
||
2CB4000
|
heap
|
page read and write
|
||
54DB000
|
trusted library allocation
|
page read and write
|
||
2CCC000
|
heap
|
page read and write
|
||
2CCC000
|
heap
|
page read and write
|
||
2B20000
|
heap
|
page read and write
|
||
5480000
|
trusted library allocation
|
page read and write
|
||
54E4000
|
trusted library allocation
|
page read and write
|
||
51AF000
|
stack
|
page read and write
|
||
5648000
|
trusted library allocation
|
page read and write
|
||
548E000
|
trusted library allocation
|
page read and write
|
||
5465000
|
trusted library allocation
|
page read and write
|
||
5449000
|
trusted library allocation
|
page read and write
|
||
2B97000
|
heap
|
page read and write
|
||
5448000
|
trusted library allocation
|
page read and write
|
||
5669000
|
trusted library allocation
|
page read and write
|
||
2C4E000
|
heap
|
page read and write
|
||
545F000
|
trusted library allocation
|
page read and write
|
||
401000
|
unkown
|
page execute read
|
||
2B6E000
|
stack
|
page read and write
|
||
54E4000
|
trusted library allocation
|
page read and write
|
||
2C5C000
|
heap
|
page read and write
|
||
54DB000
|
trusted library allocation
|
page read and write
|
||
544F000
|
trusted library allocation
|
page read and write
|
||
5482000
|
trusted library allocation
|
page read and write
|
||
54E4000
|
trusted library allocation
|
page read and write
|
||
54D3000
|
trusted library allocation
|
page read and write
|
||
4BEF000
|
stack
|
page read and write
|
||
2CCC000
|
heap
|
page read and write
|
||
5540000
|
heap
|
page read and write
|
||
5507000
|
trusted library allocation
|
page read and write
|
||
54F5000
|
trusted library allocation
|
page read and write
|
||
544A000
|
trusted library allocation
|
page read and write
|
||
545F000
|
trusted library allocation
|
page read and write
|
||
2CBB000
|
heap
|
page read and write
|
||
552A000
|
trusted library allocation
|
page read and write
|
||
5534000
|
trusted library allocation
|
page read and write
|
||
54F5000
|
trusted library allocation
|
page read and write
|
||
2CD0000
|
heap
|
page read and write
|
||
30CF000
|
stack
|
page read and write
|
||
5463000
|
trusted library allocation
|
page read and write
|
||
54D4000
|
trusted library allocation
|
page read and write
|
||
54E4000
|
trusted library allocation
|
page read and write
|
||
2CCE000
|
heap
|
page read and write
|
||
5534000
|
trusted library allocation
|
page read and write
|
||
566A000
|
trusted library allocation
|
page read and write
|
||
544A000
|
trusted library allocation
|
page read and write
|
||
5443000
|
trusted library allocation
|
page read and write
|
||
5471000
|
trusted library allocation
|
page read and write
|
||
5447000
|
trusted library allocation
|
page read and write
|
||
2CCC000
|
heap
|
page read and write
|
||
198000
|
stack
|
page read and write
|
||
1F0000
|
heap
|
page read and write
|
||
545B000
|
trusted library allocation
|
page read and write
|
||
533E000
|
stack
|
page read and write
|
||
2BEA000
|
heap
|
page read and write
|
||
54F5000
|
trusted library allocation
|
page read and write
|
||
2CD0000
|
heap
|
page read and write
|
||
2CCC000
|
heap
|
page read and write
|
||
5541000
|
heap
|
page read and write
|
||
54D8000
|
trusted library allocation
|
page read and write
|
||
2F7E000
|
stack
|
page read and write
|
||
50AE000
|
stack
|
page read and write
|
||
5534000
|
trusted library allocation
|
page read and write
|
||
552A000
|
trusted library allocation
|
page read and write
|
||
2CD0000
|
heap
|
page read and write
|
||
557F000
|
trusted library allocation
|
page read and write
|
||
544A000
|
trusted library allocation
|
page read and write
|
||
2CD0000
|
heap
|
page read and write
|
||
2CCC000
|
heap
|
page read and write
|
||
5641000
|
trusted library allocation
|
page read and write
|
||
559F000
|
trusted library allocation
|
page read and write
|
||
54D3000
|
trusted library allocation
|
page read and write
|
||
5659000
|
trusted library allocation
|
page read and write
|
||
54DB000
|
trusted library allocation
|
page read and write
|
||
2F80000
|
remote allocation
|
page read and write
|
||
544D000
|
trusted library allocation
|
page read and write
|
||
2CCC000
|
heap
|
page read and write
|
||
2CD0000
|
heap
|
page read and write
|
||
54DB000
|
trusted library allocation
|
page read and write
|
||
54BC000
|
trusted library allocation
|
page read and write
|
||
54D4000
|
trusted library allocation
|
page read and write
|
||
2CBA000
|
heap
|
page read and write
|
||
549E000
|
trusted library allocation
|
page read and write
|
||
54E4000
|
trusted library allocation
|
page read and write
|
||
2BE0000
|
heap
|
page read and write
|
||
2B0C000
|
unkown
|
page readonly
|
||
5462000
|
trusted library allocation
|
page read and write
|
||
5467000
|
trusted library allocation
|
page read and write
|
||
5679000
|
trusted library allocation
|
page read and write
|
||
55E7000
|
trusted library allocation
|
page read and write
|
||
54D9000
|
trusted library allocation
|
page read and write
|
||
54DB000
|
trusted library allocation
|
page read and write
|
||
400000
|
unkown
|
page execute and read and write
|
||
54DF000
|
trusted library allocation
|
page read and write
|
||
40E000
|
unkown
|
page readonly
|
||
54D4000
|
trusted library allocation
|
page read and write
|
||
2CCC000
|
heap
|
page read and write
|
||
2F30000
|
heap
|
page read and write
|
||
5490000
|
trusted library allocation
|
page read and write
|
||
2CB7000
|
heap
|
page read and write
|
||
544F000
|
trusted library allocation
|
page read and write
|
||
2BF7000
|
heap
|
page execute and read and write
|
||
5534000
|
trusted library allocation
|
page read and write
|
||
5472000
|
trusted library allocation
|
page read and write
|
||
5515000
|
trusted library allocation
|
page read and write
|
||
2CD0000
|
heap
|
page read and write
|
||
5476000
|
trusted library allocation
|
page read and write
|
||
567B000
|
trusted library allocation
|
page read and write
|
||
547E000
|
trusted library allocation
|
page read and write
|
||
5567000
|
trusted library allocation
|
page read and write
|
||
2FC0000
|
heap
|
page read and write
|
||
52EE000
|
stack
|
page read and write
|
||
2CD3000
|
heap
|
page read and write
|
||
544A000
|
trusted library allocation
|
page read and write
|
||
54D9000
|
trusted library allocation
|
page read and write
|
||
44E000
|
unkown
|
page read and write
|
||
2CD0000
|
heap
|
page read and write
|
||
5443000
|
trusted library allocation
|
page read and write
|
||
5534000
|
trusted library allocation
|
page read and write
|
||
54F5000
|
trusted library allocation
|
page read and write
|
||
4AAE000
|
stack
|
page read and write
|
||
545F000
|
trusted library allocation
|
page read and write
|
||
400000
|
unkown
|
page readonly
|
||
2CCC000
|
heap
|
page read and write
|
||
44E000
|
unkown
|
page write copy
|
||
4AEE000
|
stack
|
page read and write
|
||
54DB000
|
trusted library allocation
|
page read and write
|
||
59D5000
|
trusted library allocation
|
page read and write
|
||
2B90000
|
heap
|
page read and write
|
||
2C31000
|
heap
|
page read and write
|
||
2C3A000
|
heap
|
page read and write
|
||
5445000
|
trusted library allocation
|
page read and write
|
||
547A000
|
trusted library allocation
|
page read and write
|
||
544A000
|
trusted library allocation
|
page read and write
|
||
5534000
|
trusted library allocation
|
page read and write
|
||
54DB000
|
trusted library allocation
|
page read and write
|
||
2F80000
|
remote allocation
|
page read and write
|
||
5671000
|
trusted library allocation
|
page read and write
|
||
544A000
|
trusted library allocation
|
page read and write
|
||
5679000
|
trusted library allocation
|
page read and write
|
||
5505000
|
trusted library allocation
|
page read and write
|
||
5534000
|
trusted library allocation
|
page read and write
|
||
5515000
|
trusted library allocation
|
page read and write
|
||
54D4000
|
trusted library allocation
|
page read and write
|
||
547D000
|
trusted library allocation
|
page read and write
|
||
5460000
|
trusted library allocation
|
page read and write
|
||
5510000
|
trusted library allocation
|
page read and write
|
||
54F5000
|
trusted library allocation
|
page read and write
|
||
564B000
|
trusted library allocation
|
page read and write
|
||
5515000
|
trusted library allocation
|
page read and write
|
||
2CD0000
|
heap
|
page read and write
|
||
544A000
|
trusted library allocation
|
page read and write
|
||
2BEE000
|
heap
|
page read and write
|
||
2C56000
|
heap
|
page read and write
|
||
5515000
|
trusted library allocation
|
page read and write
|
||
54DB000
|
trusted library allocation
|
page read and write
|
||
54D3000
|
trusted library allocation
|
page read and write
|
||
54D3000
|
trusted library allocation
|
page read and write
|
||
544A000
|
trusted library allocation
|
page read and write
|
||
2C42000
|
heap
|
page read and write
|
||
54DD000
|
trusted library allocation
|
page read and write
|
||
2CB9000
|
heap
|
page read and write
|
||
54E4000
|
trusted library allocation
|
page read and write
|
||
54DE000
|
trusted library allocation
|
page read and write
|
||
5534000
|
trusted library allocation
|
page read and write
|
||
2C23000
|
heap
|
page read and write
|
||
51EE000
|
stack
|
page read and write
|
||
2CC8000
|
heap
|
page read and write
|
||
54DB000
|
trusted library allocation
|
page read and write
|
||
545A000
|
trusted library allocation
|
page read and write
|
||
54F3000
|
trusted library allocation
|
page read and write
|
||
5648000
|
trusted library allocation
|
page read and write
|
||
5548000
|
trusted library allocation
|
page read and write
|
||
550C000
|
trusted library allocation
|
page read and write
|
||
54F5000
|
trusted library allocation
|
page read and write
|
||
5450000
|
trusted library allocation
|
page read and write
|
||
54DB000
|
trusted library allocation
|
page read and write
|
||
2CD2000
|
heap
|
page read and write
|
||
5505000
|
trusted library allocation
|
page read and write
|
||
2BDE000
|
stack
|
page read and write
|
||
566F000
|
trusted library allocation
|
page read and write
|
||
5B49000
|
trusted library allocation
|
page read and write
|
||
2EAF000
|
stack
|
page read and write
|
||
5448000
|
trusted library allocation
|
page read and write
|
||
2EB0000
|
direct allocation
|
page execute and read and write
|
||
2C37000
|
heap
|
page read and write
|
||
449000
|
unkown
|
page execute and read and write
|
||
5641000
|
trusted library allocation
|
page read and write
|
||
2CCE000
|
heap
|
page read and write
|
||
5476000
|
trusted library allocation
|
page read and write
|
||
54DB000
|
trusted library allocation
|
page read and write
|
||
54D7000
|
trusted library allocation
|
page read and write
|
||
5617000
|
trusted library allocation
|
page read and write
|
||
5513000
|
trusted library allocation
|
page read and write
|
||
2C56000
|
heap
|
page read and write
|
||
5476000
|
trusted library allocation
|
page read and write
|
||
54DB000
|
trusted library allocation
|
page read and write
|
||
5495000
|
trusted library allocation
|
page read and write
|
||
5443000
|
trusted library allocation
|
page read and write
|
||
5468000
|
trusted library allocation
|
page read and write
|
||
5440000
|
trusted library allocation
|
page read and write
|
||
2B95000
|
heap
|
page read and write
|
||
5447000
|
trusted library allocation
|
page read and write
|
||
599F000
|
stack
|
page read and write
|
||
544D000
|
trusted library allocation
|
page read and write
|
||
554E000
|
trusted library allocation
|
page read and write
|
||
5534000
|
trusted library allocation
|
page read and write
|
||
2C4C000
|
heap
|
page read and write
|
||
2C5C000
|
heap
|
page read and write
|
||
2CD2000
|
heap
|
page read and write
|
||
496D000
|
stack
|
page read and write
|
||
566D000
|
trusted library allocation
|
page read and write
|
||
4D2F000
|
stack
|
page read and write
|
||
552E000
|
trusted library allocation
|
page read and write
|
||
589E000
|
stack
|
page read and write
|
||
544D000
|
trusted library allocation
|
page read and write
|
||
5464000
|
trusted library allocation
|
page read and write
|
||
5515000
|
trusted library allocation
|
page read and write
|
||
5546000
|
trusted library allocation
|
page read and write
|
||
55EF000
|
trusted library allocation
|
page read and write
|
||
5477000
|
trusted library allocation
|
page read and write
|
||
2F90000
|
heap
|
page read and write
|
||
54DB000
|
trusted library allocation
|
page read and write
|
||
544B000
|
trusted library allocation
|
page read and write
|
||
54E4000
|
trusted library allocation
|
page read and write
|
||
561F000
|
trusted library allocation
|
page read and write
|
||
5473000
|
trusted library allocation
|
page read and write
|
||
2CD0000
|
heap
|
page read and write
|
||
5534000
|
trusted library allocation
|
page read and write
|
||
54D9000
|
trusted library allocation
|
page read and write
|
||
49AD000
|
stack
|
page read and write
|
||
2CD0000
|
heap
|
page read and write
|
||
5515000
|
trusted library allocation
|
page read and write
|
||
9B000
|
stack
|
page read and write
|
||
2CB7000
|
heap
|
page read and write
|
||
2CCC000
|
heap
|
page read and write
|
||
544A000
|
trusted library allocation
|
page read and write
|
||
2CC0000
|
heap
|
page read and write
|
||
544D000
|
trusted library allocation
|
page read and write
|
||
5456000
|
trusted library allocation
|
page read and write
|
||
2B0C000
|
unkown
|
page readonly
|
||
6042000
|
trusted library allocation
|
page read and write
|
||
5640000
|
trusted library allocation
|
page read and write
|
||
54D3000
|
trusted library allocation
|
page read and write
|
||
2CC8000
|
heap
|
page read and write
|
||
2C42000
|
heap
|
page read and write
|
||
2CD2000
|
heap
|
page read and write
|
||
550D000
|
trusted library allocation
|
page read and write
|
There are 316 hidden memdumps, click here to show them.