Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
Installer64x.exe1.exe
|
PE32 executable (console) Intel 80386, for MS Windows
|
initial sample
|
||
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_Installer64x.exe_c7c4cca8971b4e367c7f72b9e75ca82c490be3f_a55bbe4c_84a80423-770a-4036-9e8d-3e4b9124b2fe\Report.wer
|
Unicode text, UTF-16, little-endian text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WER68B5.tmp.dmp
|
Mini DuMP crash report, 14 streams, Thu Mar 13 12:33:38 2025, 0x1205a4 type
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WER6981.tmp.WERInternalMetadata.xml
|
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WER69B1.tmp.xml
|
XML 1.0 document, ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Windows\appcompat\Programs\Amcache.hve
|
MS Windows registry file, NT/2000 or above
|
dropped
|
||
C:\Windows\appcompat\Programs\Amcache.hve.LOG1
|
MS Windows registry file, NT/2000 or above
|
dropped
|
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\Installer64x.exe1.exe
|
"C:\Users\user\Desktop\Installer64x.exe1.exe"
|
||
C:\Users\user\Desktop\Installer64x.exe1.exe
|
"C:\Users\user\Desktop\Installer64x.exe1.exe"
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\SysWOW64\WerFault.exe
|
C:\Windows\SysWOW64\WerFault.exe -u -p 7020 -s 688
|
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
https://citydisco.bet/.
|
unknown
|
||
https://citydisco.bet:443/gdJISi
|
unknown
|
||
https://duckduckgo.com/ac/?q=
|
unknown
|
||
https://citydisco.bet/2
|
unknown
|
||
https://bridge.sfo1.ap01.net/ctp?version=16.0.0&ci=1696500454657.12791&key=1696500454400500000.1&cta
|
unknown
|
||
bugildbett.top/bAuz
|
|||
https://imp.mt48.net/static?id=7RHzfOIXjFEYsBdvIpkX4Qqm4CbW4pDk4pbW4CbWfpbW7ReNxR3UIG8zInwYIFIVs9eYi
|
unknown
|
||
https://www.amazon.com/?tag=admarketus-20&ref=pd_sl_f6f292994d7c60be109e4c185cbc03032d36d17160d4e639
|
unknown
|
||
https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
|
unknown
|
||
https://citydisco.bet/gdJIS66/hI
|
unknown
|
||
https://citydisco.bet/E
|
unknown
|
||
citydisco.bet/gdJIS
|
|||
https://www.google.com/images/branding/product/ico/googleg_alldp.ico
|
unknown
|
||
https://citydisco.bet/ka
|
unknown
|
||
https://citydisco.bet/
|
unknown
|
||
http://x1.c.lencr.org/0
|
unknown
|
||
http://x1.i.lencr.org/0
|
unknown
|
||
https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
|
unknown
|
||
http://185.215.113.51/conhost.exe6
|
unknown
|
||
https://support.mozilla.org/products/firefoxgro.all
|
unknown
|
||
cjlaspcorne.icu/DbIps
|
|||
https://citydisco.bet:443/gdJIS
|
unknown
|
||
http://185.215.113.51/conhost.exeY
|
unknown
|
||
mrodularmall.top/aNzS
|
|||
http://185.215.113.51/a
|
unknown
|
||
http://185.215.113.51/conhost.exeR
|
unknown
|
||
http://185.215.113.51/
|
unknown
|
||
http://185.215.113.51/conhost.exe
|
unknown
|
||
https://citydisco.bet:443/gdJIS/
|
unknown
|
||
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
|
unknown
|
||
http://crl.rootca1.amazontrust.com/rootca1.crl0
|
unknown
|
||
https://ac.ecosia.org?q=
|
unknown
|
||
http://upx.sf.net
|
unknown
|
||
http://ocsp.rootca1.amazontrust.com0:
|
unknown
|
||
https://bridge.sfo1.admarketplace.net/ctp?version=16.0.0&ci=1696500454657.12791&key=1696500454400500
|
unknown
|
||
jowinjoinery.icu/bdWUa
|
|||
legenassedk.top/bdpWO
|
|||
https://citydisco.bet:443/gdJISsw2cld.default-release/key4.dbPK
|
unknown
|
||
http://185.215.113.51:80/conhost.exe
|
unknown
|
||
https://support.mozilla.org/kb/customize-firefox-controls-buttons-and-toolbars?utm_source=firefox-br
|
unknown
|
||
http://185.215.113.51/O
|
unknown
|
||
http://185.215.113.51/conhost.exeF
|
unknown
|
||
featureccus.shop/bdMAn
|
|||
https://www.ecosia.org/newtab/v20
|
unknown
|
||
htardwarehu.icu/Sbdsa
|
|||
https://contile-images.services.mozilla.com/obgoOYObjIFea_bXuT6L4LbBJ8j425AD87S1HMD3BWg.9991.jpg
|
unknown
|
||
https://duckduckgo.com/chrome_newtabv20
|
unknown
|
||
http://crt.rootca1.amazontrust.com/rootca1.cer0?
|
unknown
|
||
https://www.invisalign.com/?utm_source=admarketplace&utm_medium=paidsearch&utm_campaign=Invisalign&u
|
unknown
|
||
http://185.215.113.51/x
|
unknown
|
||
https://contile-images.services.mozilla.com/CuERQnIs4CzqjKBh9os6_h9d4CUDCHO3oiqmAQO6VLM.25122.jpg
|
unknown
|
||
https://citydisco.bet/gdJIS
|
188.114.96.3
|
||
https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
|
unknown
|
||
https://gemini.google.com/app?q=
|
unknown
|
||
https://citydisco.bet/gdJISD
|
unknown
|
There are 45 hidden URLs, click here to show them.
Domains
Name
|
IP
|
Malicious
|
|
---|---|---|---|
citydisco.bet
|
188.114.96.3
|
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
188.114.96.3
|
citydisco.bet
|
European Union
|
||
185.215.113.51
|
unknown
|
Portugal
|
Registry
Path
|
Value
|
Malicious
|
|
---|---|---|---|
\REGISTRY\A\{26f741bb-2deb-7c81-c06d-e24a9d11af8f}\Root\InventoryApplicationFile\installer64x.exe|80811851b0477f4e
|
ProgramId
|
||
\REGISTRY\A\{26f741bb-2deb-7c81-c06d-e24a9d11af8f}\Root\InventoryApplicationFile\installer64x.exe|80811851b0477f4e
|
FileId
|
||
\REGISTRY\A\{26f741bb-2deb-7c81-c06d-e24a9d11af8f}\Root\InventoryApplicationFile\installer64x.exe|80811851b0477f4e
|
LowerCaseLongPath
|
||
\REGISTRY\A\{26f741bb-2deb-7c81-c06d-e24a9d11af8f}\Root\InventoryApplicationFile\installer64x.exe|80811851b0477f4e
|
LongPathHash
|
||
\REGISTRY\A\{26f741bb-2deb-7c81-c06d-e24a9d11af8f}\Root\InventoryApplicationFile\installer64x.exe|80811851b0477f4e
|
Name
|
||
\REGISTRY\A\{26f741bb-2deb-7c81-c06d-e24a9d11af8f}\Root\InventoryApplicationFile\installer64x.exe|80811851b0477f4e
|
OriginalFileName
|
||
\REGISTRY\A\{26f741bb-2deb-7c81-c06d-e24a9d11af8f}\Root\InventoryApplicationFile\installer64x.exe|80811851b0477f4e
|
Publisher
|
||
\REGISTRY\A\{26f741bb-2deb-7c81-c06d-e24a9d11af8f}\Root\InventoryApplicationFile\installer64x.exe|80811851b0477f4e
|
Version
|
||
\REGISTRY\A\{26f741bb-2deb-7c81-c06d-e24a9d11af8f}\Root\InventoryApplicationFile\installer64x.exe|80811851b0477f4e
|
BinFileVersion
|
||
\REGISTRY\A\{26f741bb-2deb-7c81-c06d-e24a9d11af8f}\Root\InventoryApplicationFile\installer64x.exe|80811851b0477f4e
|
BinaryType
|
||
\REGISTRY\A\{26f741bb-2deb-7c81-c06d-e24a9d11af8f}\Root\InventoryApplicationFile\installer64x.exe|80811851b0477f4e
|
ProductName
|
||
\REGISTRY\A\{26f741bb-2deb-7c81-c06d-e24a9d11af8f}\Root\InventoryApplicationFile\installer64x.exe|80811851b0477f4e
|
ProductVersion
|
||
\REGISTRY\A\{26f741bb-2deb-7c81-c06d-e24a9d11af8f}\Root\InventoryApplicationFile\installer64x.exe|80811851b0477f4e
|
LinkDate
|
||
\REGISTRY\A\{26f741bb-2deb-7c81-c06d-e24a9d11af8f}\Root\InventoryApplicationFile\installer64x.exe|80811851b0477f4e
|
BinProductVersion
|
||
\REGISTRY\A\{26f741bb-2deb-7c81-c06d-e24a9d11af8f}\Root\InventoryApplicationFile\installer64x.exe|80811851b0477f4e
|
AppxPackageFullName
|
||
\REGISTRY\A\{26f741bb-2deb-7c81-c06d-e24a9d11af8f}\Root\InventoryApplicationFile\installer64x.exe|80811851b0477f4e
|
AppxPackageRelativeId
|
||
\REGISTRY\A\{26f741bb-2deb-7c81-c06d-e24a9d11af8f}\Root\InventoryApplicationFile\installer64x.exe|80811851b0477f4e
|
Size
|
||
\REGISTRY\A\{26f741bb-2deb-7c81-c06d-e24a9d11af8f}\Root\InventoryApplicationFile\installer64x.exe|80811851b0477f4e
|
Language
|
||
\REGISTRY\A\{26f741bb-2deb-7c81-c06d-e24a9d11af8f}\Root\InventoryApplicationFile\installer64x.exe|80811851b0477f4e
|
Usn
|
There are 9 hidden registries, click here to show them.
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
400000
|
remote allocation
|
page execute and read and write
|
||
2A7C000
|
heap
|
page read and write
|
||
3C46000
|
trusted library allocation
|
page read and write
|
||
151D000
|
heap
|
page read and write
|
||
148C000
|
heap
|
page read and write
|
||
151B000
|
heap
|
page read and write
|
||
3C0E000
|
trusted library allocation
|
page read and write
|
||
10FB000
|
stack
|
page read and write
|
||
14E2000
|
heap
|
page read and write
|
||
3BBB000
|
trusted library allocation
|
page read and write
|
||
AAB000
|
unkown
|
page readonly
|
||
3BE7000
|
trusted library allocation
|
page read and write
|
||
3BB1000
|
trusted library allocation
|
page read and write
|
||
3BB6000
|
trusted library allocation
|
page read and write
|
||
ABA000
|
unkown
|
page readonly
|
||
360F000
|
stack
|
page read and write
|
||
3BCA000
|
trusted library allocation
|
page read and write
|
||
1206000
|
heap
|
page read and write
|
||
3C0E000
|
trusted library allocation
|
page read and write
|
||
3BAF000
|
trusted library allocation
|
page read and write
|
||
13A0000
|
remote allocation
|
page read and write
|
||
3BAA000
|
trusted library allocation
|
page read and write
|
||
3BAA000
|
trusted library allocation
|
page read and write
|
||
3DB3000
|
trusted library allocation
|
page read and write
|
||
3BAE000
|
trusted library allocation
|
page read and write
|
||
3BE5000
|
trusted library allocation
|
page read and write
|
||
1515000
|
heap
|
page read and write
|
||
3BB0000
|
trusted library allocation
|
page read and write
|
||
151D000
|
heap
|
page read and write
|
||
3BEE000
|
trusted library allocation
|
page read and write
|
||
14E2000
|
heap
|
page read and write
|
||
3BD5000
|
trusted library allocation
|
page read and write
|
||
3D9A000
|
trusted library allocation
|
page read and write
|
||
3BAA000
|
trusted library allocation
|
page read and write
|
||
3BD3000
|
trusted library allocation
|
page read and write
|
||
3BAB000
|
trusted library allocation
|
page read and write
|
||
151B000
|
heap
|
page read and write
|
||
14E5000
|
heap
|
page read and write
|
||
3C1A000
|
trusted library allocation
|
page read and write
|
||
3BCA000
|
trusted library allocation
|
page read and write
|
||
3BEA000
|
trusted library allocation
|
page read and write
|
||
152E000
|
heap
|
page read and write
|
||
3BCA000
|
trusted library allocation
|
page read and write
|
||
3BC2000
|
trusted library allocation
|
page read and write
|
||
3BCA000
|
trusted library allocation
|
page read and write
|
||
402E000
|
stack
|
page read and write
|
||
11D0000
|
heap
|
page read and write
|
||
3BAA000
|
trusted library allocation
|
page read and write
|
||
3C90000
|
heap
|
page read and write
|
||
3BC1000
|
trusted library allocation
|
page read and write
|
||
3C1B000
|
trusted library allocation
|
page read and write
|
||
1472000
|
heap
|
page read and write
|
||
1517000
|
heap
|
page read and write
|
||
14E2000
|
heap
|
page read and write
|
||
3C46000
|
trusted library allocation
|
page read and write
|
||
39EE000
|
stack
|
page read and write
|
||
3BA4000
|
trusted library allocation
|
page read and write
|
||
146B000
|
heap
|
page read and write
|
||
148C000
|
heap
|
page read and write
|
||
1340000
|
heap
|
page read and write
|
||
3BC7000
|
trusted library allocation
|
page read and write
|
||
3BCA000
|
trusted library allocation
|
page read and write
|
||
3BC1000
|
trusted library allocation
|
page read and write
|
||
3C31000
|
trusted library allocation
|
page read and write
|
||
14E4000
|
heap
|
page read and write
|
||
138E000
|
stack
|
page read and write
|
||
3BBB000
|
trusted library allocation
|
page read and write
|
||
3BF6000
|
trusted library allocation
|
page read and write
|
||
151B000
|
heap
|
page read and write
|
||
14E4000
|
heap
|
page read and write
|
||
1471000
|
heap
|
page read and write
|
||
3D90000
|
trusted library allocation
|
page read and write
|
||
3C16000
|
trusted library allocation
|
page read and write
|
||
3C46000
|
trusted library allocation
|
page read and write
|
||
38ED000
|
stack
|
page read and write
|
||
14EC000
|
heap
|
page read and write
|
||
3C0A000
|
trusted library allocation
|
page read and write
|
||
AAB000
|
unkown
|
page readonly
|
||
3BE7000
|
trusted library allocation
|
page read and write
|
||
1471000
|
heap
|
page read and write
|
||
ABF000
|
unkown
|
page write copy
|
||
3BD9000
|
trusted library allocation
|
page read and write
|
||
3BCC000
|
trusted library allocation
|
page read and write
|
||
3BCA000
|
trusted library allocation
|
page read and write
|
||
3B9F000
|
trusted library allocation
|
page read and write
|
||
3BE6000
|
trusted library allocation
|
page read and write
|
||
14D0000
|
heap
|
page read and write
|
||
3BC3000
|
trusted library allocation
|
page read and write
|
||
3C0E000
|
trusted library allocation
|
page read and write
|
||
3BE7000
|
trusted library allocation
|
page read and write
|
||
3BAB000
|
trusted library allocation
|
page read and write
|
||
3BCA000
|
trusted library allocation
|
page read and write
|
||
1527000
|
heap
|
page read and write
|
||
150C000
|
heap
|
page read and write
|
||
150E000
|
heap
|
page read and write
|
||
3BD1000
|
trusted library allocation
|
page read and write
|
||
3C26000
|
trusted library allocation
|
page read and write
|
||
3BBB000
|
trusted library allocation
|
page read and write
|
||
1100000
|
heap
|
page read and write
|
||
3BCA000
|
trusted library allocation
|
page read and write
|
||
3BC1000
|
trusted library allocation
|
page read and write
|
||
13C6000
|
heap
|
page read and write
|
||
3BBA000
|
trusted library allocation
|
page read and write
|
||
3BC1000
|
trusted library allocation
|
page read and write
|
||
3BCA000
|
trusted library allocation
|
page read and write
|
||
1517000
|
heap
|
page read and write
|
||
3BCA000
|
trusted library allocation
|
page read and write
|
||
1518000
|
heap
|
page read and write
|
||
F50000
|
heap
|
page read and write
|
||
3C3B000
|
trusted library allocation
|
page read and write
|
||
3BAA000
|
trusted library allocation
|
page read and write
|
||
1504000
|
heap
|
page read and write
|
||
3BEE000
|
trusted library allocation
|
page read and write
|
||
1504000
|
heap
|
page read and write
|
||
152E000
|
heap
|
page read and write
|
||
148D000
|
heap
|
page read and write
|
||
A20000
|
unkown
|
page readonly
|
||
146B000
|
heap
|
page read and write
|
||
1498000
|
heap
|
page read and write
|
||
14CF000
|
heap
|
page read and write
|
||
14D1000
|
heap
|
page read and write
|
||
3BC7000
|
trusted library allocation
|
page read and write
|
||
10F0000
|
heap
|
page read and write
|
||
3BCA000
|
trusted library allocation
|
page read and write
|
||
152E000
|
heap
|
page read and write
|
||
151D000
|
heap
|
page read and write
|
||
ABF000
|
unkown
|
page write copy
|
||
3BA5000
|
trusted library allocation
|
page read and write
|
||
3BBB000
|
trusted library allocation
|
page read and write
|
||
1517000
|
heap
|
page read and write
|
||
3C09000
|
trusted library allocation
|
page read and write
|
||
1527000
|
heap
|
page read and write
|
||
3BAA000
|
trusted library allocation
|
page read and write
|
||
3C07000
|
trusted library allocation
|
page read and write
|
||
3BC6000
|
trusted library allocation
|
page read and write
|
||
151B000
|
heap
|
page read and write
|
||
3BBB000
|
trusted library allocation
|
page read and write
|
||
3BBB000
|
trusted library allocation
|
page read and write
|
||
150E000
|
heap
|
page read and write
|
||
3C02000
|
trusted library allocation
|
page read and write
|
||
1518000
|
heap
|
page read and write
|
||
3A02000
|
trusted library allocation
|
page readonly
|
||
3BCA000
|
trusted library allocation
|
page read and write
|
||
3BB9000
|
trusted library allocation
|
page read and write
|
||
3BD4000
|
trusted library allocation
|
page read and write
|
||
3C46000
|
trusted library allocation
|
page read and write
|
||
3BE3000
|
trusted library allocation
|
page read and write
|
||
3BDE000
|
trusted library allocation
|
page read and write
|
||
14E7000
|
heap
|
page read and write
|
||
3C0B000
|
trusted library allocation
|
page read and write
|
||
1517000
|
heap
|
page read and write
|
||
3BD4000
|
trusted library allocation
|
page read and write
|
||
3BDA000
|
trusted library allocation
|
page read and write
|
||
14EC000
|
heap
|
page read and write
|
||
11ED000
|
heap
|
page read and write
|
||
3C0E000
|
trusted library allocation
|
page read and write
|
||
3BC1000
|
trusted library allocation
|
page read and write
|
||
AB6000
|
unkown
|
page write copy
|
||
3BED000
|
trusted library allocation
|
page read and write
|
||
3BC4000
|
trusted library allocation
|
page read and write
|
||
1504000
|
heap
|
page read and write
|
||
14ED000
|
heap
|
page read and write
|
||
1517000
|
heap
|
page read and write
|
||
14E7000
|
heap
|
page read and write
|
||
3BAF000
|
trusted library allocation
|
page read and write
|
||
3C0B000
|
trusted library allocation
|
page read and write
|
||
3BFA000
|
trusted library allocation
|
page read and write
|
||
2CD5000
|
trusted library allocation
|
page read and write
|
||
3BC2000
|
trusted library allocation
|
page read and write
|
||
1463000
|
heap
|
page read and write
|
||
45E000
|
remote allocation
|
page execute and read and write
|
||
3C31000
|
trusted library allocation
|
page read and write
|
||
1236000
|
heap
|
page read and write
|
||
3B9F000
|
trusted library allocation
|
page read and write
|
||
1510000
|
heap
|
page read and write
|
||
3BBA000
|
trusted library allocation
|
page read and write
|
||
1504000
|
heap
|
page read and write
|
||
A21000
|
unkown
|
page execute read
|
||
14FA000
|
heap
|
page read and write
|
||
150E000
|
heap
|
page read and write
|
||
3BAA000
|
trusted library allocation
|
page read and write
|
||
3BBA000
|
trusted library allocation
|
page read and write
|
||
ABF000
|
unkown
|
page write copy
|
||
3BB7000
|
trusted library allocation
|
page read and write
|
||
3BBB000
|
trusted library allocation
|
page read and write
|
||
3C3B000
|
trusted library allocation
|
page read and write
|
||
133E000
|
stack
|
page read and write
|
||
3BB4000
|
trusted library allocation
|
page read and write
|
||
3BDE000
|
trusted library allocation
|
page read and write
|
||
3BA6000
|
trusted library allocation
|
page read and write
|
||
3DCC000
|
stack
|
page read and write
|
||
AAB000
|
unkown
|
page readonly
|
||
3B91000
|
trusted library allocation
|
page read and write
|
||
12FD000
|
stack
|
page read and write
|
||
3B98000
|
trusted library allocation
|
page read and write
|
||
14E5000
|
heap
|
page read and write
|
||
150C000
|
heap
|
page read and write
|
||
3C0B000
|
trusted library allocation
|
page read and write
|
||
3BE9000
|
trusted library allocation
|
page read and write
|
||
3BD9000
|
trusted library allocation
|
page read and write
|
||
3C01000
|
trusted library allocation
|
page read and write
|
||
3BB4000
|
trusted library allocation
|
page read and write
|
||
3BEC000
|
trusted library allocation
|
page read and write
|
||
3BCA000
|
trusted library allocation
|
page read and write
|
||
3C3B000
|
trusted library allocation
|
page read and write
|
||
3E6B000
|
trusted library allocation
|
page read and write
|
||
3BBA000
|
trusted library allocation
|
page read and write
|
||
13A0000
|
remote allocation
|
page read and write
|
||
3BFC000
|
trusted library allocation
|
page read and write
|
||
11E0000
|
heap
|
page read and write
|
||
3BAE000
|
trusted library allocation
|
page read and write
|
||
150C000
|
heap
|
page read and write
|
||
3BA4000
|
trusted library allocation
|
page read and write
|
||
1527000
|
heap
|
page read and write
|
||
3BBA000
|
trusted library allocation
|
page read and write
|
||
3C31000
|
trusted library allocation
|
page read and write
|
||
150E000
|
heap
|
page read and write
|
||
1504000
|
heap
|
page read and write
|
||
EFC000
|
stack
|
page read and write
|
||
3BED000
|
trusted library allocation
|
page read and write
|
||
3BEE000
|
trusted library allocation
|
page read and write
|
||
3BAA000
|
trusted library allocation
|
page read and write
|
||
3F03000
|
trusted library allocation
|
page read and write
|
||
1517000
|
heap
|
page read and write
|
||
1474000
|
heap
|
page read and write
|
||
3BEA000
|
trusted library allocation
|
page read and write
|
||
3BBA000
|
trusted library allocation
|
page read and write
|
||
A21000
|
unkown
|
page execute read
|
||
375F000
|
stack
|
page read and write
|
||
365E000
|
stack
|
page read and write
|
||
3BCB000
|
trusted library allocation
|
page read and write
|
||
3BB7000
|
trusted library allocation
|
page read and write
|
||
3C17000
|
trusted library allocation
|
page read and write
|
||
3C02000
|
trusted library allocation
|
page read and write
|
||
3E73000
|
trusted library allocation
|
page read and write
|
||
1518000
|
heap
|
page read and write
|
||
3BBA000
|
trusted library allocation
|
page read and write
|
||
3E63000
|
trusted library allocation
|
page read and write
|
||
3B9F000
|
trusted library allocation
|
page read and write
|
||
14E7000
|
heap
|
page read and write
|
||
3BE7000
|
trusted library allocation
|
page read and write
|
||
3BAE000
|
trusted library allocation
|
page read and write
|
||
3BAA000
|
trusted library allocation
|
page read and write
|
||
1504000
|
heap
|
page read and write
|
||
3BCA000
|
trusted library allocation
|
page read and write
|
||
14FD000
|
heap
|
page read and write
|
||
1030000
|
heap
|
page read and write
|
||
3BAF000
|
trusted library allocation
|
page read and write
|
||
3BCA000
|
trusted library allocation
|
page read and write
|
||
3BCA000
|
trusted library allocation
|
page read and write
|
||
350D000
|
stack
|
page read and write
|
||
37AD000
|
stack
|
page read and write
|
||
3BCA000
|
trusted library allocation
|
page read and write
|
||
1490000
|
heap
|
page read and write
|
||
3BF2000
|
trusted library allocation
|
page read and write
|
||
ABA000
|
unkown
|
page readonly
|
||
3BCC000
|
trusted library allocation
|
page read and write
|
||
3BCA000
|
trusted library allocation
|
page read and write
|
||
151B000
|
heap
|
page read and write
|
||
1230000
|
heap
|
page read and write
|
||
1504000
|
heap
|
page read and write
|
||
3BB5000
|
trusted library allocation
|
page read and write
|
||
3C3B000
|
trusted library allocation
|
page read and write
|
||
3BD3000
|
trusted library allocation
|
page read and write
|
||
3C3B000
|
trusted library allocation
|
page read and write
|
||
3BBB000
|
trusted library allocation
|
page read and write
|
||
3BE3000
|
trusted library allocation
|
page read and write
|
||
3BBA000
|
trusted library allocation
|
page read and write
|
||
3BC6000
|
trusted library allocation
|
page read and write
|
||
151B000
|
heap
|
page read and write
|
||
14E0000
|
heap
|
page read and write
|
||
3BCA000
|
trusted library allocation
|
page read and write
|
||
3BC6000
|
trusted library allocation
|
page read and write
|
||
1517000
|
heap
|
page read and write
|
||
3BCB000
|
trusted library allocation
|
page read and write
|
||
3BB7000
|
trusted library allocation
|
page read and write
|
||
3BC4000
|
trusted library allocation
|
page read and write
|
||
3BEB000
|
trusted library allocation
|
page read and write
|
||
150C000
|
heap
|
page read and write
|
||
3B9F000
|
trusted library allocation
|
page read and write
|
||
14E7000
|
heap
|
page read and write
|
||
3B91000
|
trusted library allocation
|
page read and write
|
||
3BFA000
|
trusted library allocation
|
page read and write
|
||
3BD7000
|
trusted library allocation
|
page read and write
|
||
3B9F000
|
trusted library allocation
|
page read and write
|
||
3B96000
|
trusted library allocation
|
page read and write
|
||
3A00000
|
trusted library allocation
|
page readonly
|
||
3BA4000
|
trusted library allocation
|
page read and write
|
||
3BCA000
|
trusted library allocation
|
page read and write
|
||
3BDA000
|
trusted library allocation
|
page read and write
|
||
1430000
|
heap
|
page read and write
|
||
3BBB000
|
trusted library allocation
|
page read and write
|
||
3BBB000
|
trusted library allocation
|
page read and write
|
||
3BCA000
|
trusted library allocation
|
page read and write
|
||
BFC000
|
stack
|
page read and write
|
||
3BE2000
|
trusted library allocation
|
page read and write
|
||
3BB9000
|
trusted library allocation
|
page read and write
|
||
1518000
|
heap
|
page read and write
|
||
A20000
|
unkown
|
page readonly
|
||
3C3A000
|
trusted library allocation
|
page read and write
|
||
1504000
|
heap
|
page read and write
|
||
1504000
|
heap
|
page read and write
|
||
3BD6000
|
trusted library allocation
|
page read and write
|
||
1469000
|
heap
|
page read and write
|
||
11C0000
|
heap
|
page read and write
|
||
3BB4000
|
trusted library allocation
|
page read and write
|
||
3BCA000
|
trusted library allocation
|
page read and write
|
||
3BE0000
|
trusted library allocation
|
page read and write
|
||
3BAE000
|
trusted library allocation
|
page read and write
|
||
3BE7000
|
trusted library allocation
|
page read and write
|
||
3B9A000
|
trusted library allocation
|
page read and write
|
||
1517000
|
heap
|
page read and write
|
||
14D1000
|
heap
|
page read and write
|
||
3BCA000
|
trusted library allocation
|
page read and write
|
||
AB7000
|
unkown
|
page read and write
|
||
3BE9000
|
trusted library allocation
|
page read and write
|
||
14CF000
|
heap
|
page read and write
|
||
3BBA000
|
trusted library allocation
|
page read and write
|
||
3BC6000
|
trusted library allocation
|
page read and write
|
||
3C0B000
|
trusted library allocation
|
page read and write
|
||
3BBE000
|
trusted library allocation
|
page read and write
|
||
3C46000
|
trusted library allocation
|
page read and write
|
||
3BBA000
|
trusted library allocation
|
page read and write
|
||
1471000
|
heap
|
page read and write
|
||
3D92000
|
trusted library allocation
|
page read and write
|
||
3BB4000
|
trusted library allocation
|
page read and write
|
||
1518000
|
heap
|
page read and write
|
||
1517000
|
heap
|
page read and write
|
||
14E5000
|
heap
|
page read and write
|
||
3BA4000
|
trusted library allocation
|
page read and write
|
||
3BE2000
|
trusted library allocation
|
page read and write
|
||
3BCA000
|
trusted library allocation
|
page read and write
|
||
3BE9000
|
trusted library allocation
|
page read and write
|
||
3BA5000
|
trusted library allocation
|
page read and write
|
||
1490000
|
heap
|
page read and write
|
||
3C31000
|
trusted library allocation
|
page read and write
|
||
3BCA000
|
trusted library allocation
|
page read and write
|
||
3BBA000
|
trusted library allocation
|
page read and write
|
||
150C000
|
heap
|
page read and write
|
||
14EC000
|
heap
|
page read and write
|
||
3BC6000
|
trusted library allocation
|
page read and write
|
||
3BD6000
|
trusted library allocation
|
page read and write
|
||
146D000
|
heap
|
page read and write
|
||
38AE000
|
stack
|
page read and write
|
||
3BBB000
|
trusted library allocation
|
page read and write
|
||
3BC7000
|
trusted library allocation
|
page read and write
|
||
ABA000
|
unkown
|
page readonly
|
||
1518000
|
heap
|
page read and write
|
||
3DEB000
|
trusted library allocation
|
page read and write
|
||
3BFA000
|
trusted library allocation
|
page read and write
|
||
ABA000
|
unkown
|
page readonly
|
||
1410000
|
heap
|
page read and write
|
||
3BCA000
|
trusted library allocation
|
page read and write
|
||
3BCA000
|
trusted library allocation
|
page read and write
|
||
3C10000
|
trusted library allocation
|
page read and write
|
||
1518000
|
heap
|
page read and write
|
||
3BCA000
|
trusted library allocation
|
page read and write
|
||
3C2B000
|
trusted library allocation
|
page read and write
|
||
151B000
|
heap
|
page read and write
|
||
1504000
|
heap
|
page read and write
|
||
1504000
|
heap
|
page read and write
|
||
14EC000
|
heap
|
page read and write
|
||
3BF2000
|
trusted library allocation
|
page read and write
|
||
A20000
|
unkown
|
page readonly
|
||
3BBB000
|
trusted library allocation
|
page read and write
|
||
3BF2000
|
trusted library allocation
|
page read and write
|
||
1517000
|
heap
|
page read and write
|
||
3BAF000
|
trusted library allocation
|
page read and write
|
||
3BA4000
|
trusted library allocation
|
page read and write
|
||
150C000
|
heap
|
page read and write
|
||
3BCA000
|
trusted library allocation
|
page read and write
|
||
1517000
|
heap
|
page read and write
|
||
3D94000
|
trusted library allocation
|
page read and write
|
||
3BBA000
|
trusted library allocation
|
page read and write
|
||
152E000
|
heap
|
page read and write
|
||
A20000
|
unkown
|
page readonly
|
||
148E000
|
heap
|
page read and write
|
||
AB6000
|
unkown
|
page write copy
|
||
3BF4000
|
trusted library allocation
|
page read and write
|
||
3DCB000
|
trusted library allocation
|
page read and write
|
||
3BAA000
|
trusted library allocation
|
page read and write
|
||
3BE5000
|
trusted library allocation
|
page read and write
|
||
3BCA000
|
trusted library allocation
|
page read and write
|
||
3BBF000
|
trusted library allocation
|
page read and write
|
||
1527000
|
heap
|
page read and write
|
||
3BCA000
|
trusted library allocation
|
page read and write
|
||
AAB000
|
unkown
|
page readonly
|
||
3BBB000
|
trusted library allocation
|
page read and write
|
||
3BE3000
|
trusted library allocation
|
page read and write
|
||
3BBB000
|
trusted library allocation
|
page read and write
|
||
3BBB000
|
trusted library allocation
|
page read and write
|
||
3B90000
|
trusted library allocation
|
page read and write
|
||
3C0E000
|
trusted library allocation
|
page read and write
|
||
3BBB000
|
trusted library allocation
|
page read and write
|
||
3BAB000
|
trusted library allocation
|
page read and write
|
||
140E000
|
stack
|
page read and write
|
||
151D000
|
heap
|
page read and write
|
||
A21000
|
unkown
|
page execute read
|
||
3BBA000
|
trusted library allocation
|
page read and write
|
||
3BDA000
|
trusted library allocation
|
page read and write
|
||
3A01000
|
trusted library allocation
|
page execute read
|
||
13A0000
|
remote allocation
|
page read and write
|
||
3BC1000
|
trusted library allocation
|
page read and write
|
||
3BCA000
|
trusted library allocation
|
page read and write
|
||
3BCA000
|
trusted library allocation
|
page read and write
|
||
3BCA000
|
trusted library allocation
|
page read and write
|
||
3BBF000
|
trusted library allocation
|
page read and write
|
||
150E000
|
heap
|
page read and write
|
||
3C3B000
|
trusted library allocation
|
page read and write
|
||
AB6000
|
unkown
|
page execute and read and write
|
||
340E000
|
stack
|
page read and write
|
||
3BCA000
|
trusted library allocation
|
page read and write
|
||
3BB7000
|
trusted library allocation
|
page read and write
|
||
3BBA000
|
trusted library allocation
|
page read and write
|
||
3BBA000
|
trusted library allocation
|
page read and write
|
||
3BF7000
|
trusted library allocation
|
page read and write
|
||
14DD000
|
heap
|
page read and write
|
||
3BC1000
|
trusted library allocation
|
page read and write
|
||
3BCA000
|
trusted library allocation
|
page read and write
|
||
13C0000
|
heap
|
page read and write
|
||
3760000
|
trusted library allocation
|
page read and write
|
||
1504000
|
heap
|
page read and write
|
||
3BB7000
|
trusted library allocation
|
page read and write
|
||
3BA6000
|
trusted library allocation
|
page read and write
|
||
3BAA000
|
trusted library allocation
|
page read and write
|
||
3BE8000
|
trusted library allocation
|
page read and write
|
||
3BB6000
|
trusted library allocation
|
page read and write
|
||
3C33000
|
trusted library allocation
|
page read and write
|
||
1499000
|
heap
|
page read and write
|
||
150E000
|
heap
|
page read and write
|
||
3BEB000
|
trusted library allocation
|
page read and write
|
||
1500000
|
heap
|
page read and write
|
||
3BCA000
|
trusted library allocation
|
page read and write
|
||
3BAA000
|
trusted library allocation
|
page read and write
|
||
151A000
|
heap
|
page read and write
|
||
3BAB000
|
trusted library allocation
|
page read and write
|
||
AB6000
|
unkown
|
page write copy
|
||
14DD000
|
heap
|
page read and write
|
||
1517000
|
heap
|
page read and write
|
||
3C27000
|
trusted library allocation
|
page read and write
|
||
3BA6000
|
trusted library allocation
|
page read and write
|
||
3BCA000
|
trusted library allocation
|
page read and write
|
||
3BAA000
|
trusted library allocation
|
page read and write
|
||
150E000
|
heap
|
page read and write
|
||
3BAA000
|
trusted library allocation
|
page read and write
|
||
11DB000
|
heap
|
page read and write
|
||
3BF6000
|
trusted library allocation
|
page read and write
|
||
47A1000
|
trusted library allocation
|
page read and write
|
||
150E000
|
heap
|
page read and write
|
||
148C000
|
heap
|
page read and write
|
||
3BDB000
|
trusted library allocation
|
page read and write
|
||
14FF000
|
heap
|
page read and write
|
||
3BCA000
|
trusted library allocation
|
page read and write
|
||
3E2C000
|
trusted library allocation
|
page read and write
|
||
3BAA000
|
trusted library allocation
|
page read and write
|
||
3BC7000
|
trusted library allocation
|
page read and write
|
||
ABF000
|
unkown
|
page write copy
|
||
3BCC000
|
trusted library allocation
|
page read and write
|
||
3BBA000
|
trusted library allocation
|
page read and write
|
||
DAB000
|
stack
|
page read and write
|
||
148C000
|
heap
|
page read and write
|
||
3BCA000
|
trusted library allocation
|
page read and write
|
||
3BAA000
|
trusted library allocation
|
page read and write
|
||
1517000
|
heap
|
page read and write
|
||
3E3B000
|
trusted library allocation
|
page read and write
|
||
3BBB000
|
trusted library allocation
|
page read and write
|
||
3BC2000
|
trusted library allocation
|
page read and write
|
||
4299000
|
trusted library allocation
|
page read and write
|
||
A21000
|
unkown
|
page execute read
|
||
1070000
|
heap
|
page read and write
|
||
330D000
|
stack
|
page read and write
|
||
148E000
|
heap
|
page read and write
|
||
3BAF000
|
trusted library allocation
|
page read and write
|
||
3BA4000
|
trusted library allocation
|
page read and write
|
||
3BBB000
|
trusted library allocation
|
page read and write
|
||
143A000
|
heap
|
page read and write
|
There are 466 hidden memdumps, click here to show them.