Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
file.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
initial sample
|
||
C:\Users\user\AppData\Local\Temp\RarSFX0\work.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\RarSFX1\podaw.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\RarSFX0\1.bat
|
DOS batch file, ASCII text, with CRLF line terminators
|
dropped
|
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\file.exe
|
"C:\Users\user\Desktop\file.exe"
|
||
C:\Users\user\AppData\Local\Temp\RarSFX0\work.exe
|
work.exe -priverdD
|
||
C:\Users\user\AppData\Local\Temp\RarSFX1\podaw.exe
|
"C:\Users\user\AppData\Local\Temp\RarSFX1\podaw.exe"
|
||
C:\Windows\SysWOW64\cmd.exe
|
C:\Windows\system32\cmd.exe /c ""C:\Users\user\AppData\Local\Temp\RarSFX0\1.bat" "
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
incredibleextedwj.shop
|
|||
shortsvelventysjo.shop
|
|||
tolerateilusidjukl.shop
|
|||
liabilitynighstjsko.shop
|
|||
shatterbreathepsw.shop
|
|||
demonstationfukewko.shop
|
|||
productivelookewr.shop
|
|||
https://incredibleextedwj.shop/api
|
172.67.218.63
|
||
alcojoldwograpciw.shop
|
|||
https://duckduckgo.com/chrome_newtab
|
unknown
|
||
https://duckduckgo.com/ac/?q=
|
unknown
|
||
https://contile-images.services.mozilla.com/0TegrVVRalreHILhR2WvtD_CFzj13HCDcLqqpvXSOuY.10862.jpg
|
unknown
|
||
https://www.google.com/images/branding/product/ico/googleg_lodp.ico
|
unknown
|
||
https://bridge.lga1.admarketplace.net/ctp?version=16.0.0&key=1696332238301000001.2&ci=1696332238417.
|
unknown
|
||
https://incredibleextedwj.shop/apiB
|
unknown
|
||
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
|
unknown
|
||
http://crl.rootca1.amazontrust.com/rootca1.crl0
|
unknown
|
||
https://bridge.lga1.ap01.net/ctp?version=16.0.0&key=1696332238301000001.1&ci=1696332238417.12791&cta
|
unknown
|
||
https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
|
unknown
|
||
http://ocsp.rootca1.amazontrust.com0:
|
unknown
|
||
https://support.office.com/article/7D48285B-20E8-4B9B-91AD-216E34163BAD?wt.mc_id=EnterPK2016
|
unknown
|
||
https://support.office.com/article/94ba2e0b-638e-4a92-8857-2cb5ac1d8e17
|
unknown
|
||
https://www.ecosia.org/newtab/
|
unknown
|
||
https://support.mozilla.org/kb/customize-firefox-controls-buttons-and-toolbars?utm_source=firefox-br
|
unknown
|
||
https://incredibleextedwj.shop/G
|
unknown
|
||
https://ac.ecosia.org/autocomplete?q=
|
unknown
|
||
https://incredibleextedwj.shop/apin)P
|
unknown
|
||
https://contile-images.services.mozilla.com/obgoOYObjIFea_bXuT6L4LbBJ8j425AD87S1HMD3BWg.9991.jpg
|
unknown
|
||
https://imp.mt48.net/static?id=7RHzfOIXjFEYsBdvIpkX4QqmfZfYfQfafZbXfpbWfpbX7ReNxR3UIG8zInwYIFIVs9eYi
|
unknown
|
||
https://incredibleextedwj.shop/R
|
unknown
|
||
http://x1.c.lencr.org/0
|
unknown
|
||
http://x1.i.lencr.org/0
|
unknown
|
||
https://support.office.com/article/94ba2e0b-638e-4a92-8857-2cb5ac1d8e17Install
|
unknown
|
||
https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
|
unknown
|
||
https://incredibleextedwj.shop/
|
unknown
|
||
https://support.microsof
|
unknown
|
||
http://crt.rootca1.amazontrust.com/rootca1.cer0?
|
unknown
|
||
https://incredibleextedwj.shop/Y
|
unknown
|
||
https://support.office.com/article/7D48285B-20E8-4B9B-91AD-216E34163BAD?wt.mc_id=EnterPK2016Examples
|
unknown
|
||
https://incredibleextedwj.shop/b
|
unknown
|
||
https://support.mozilla.org/products/firefoxgro.all
|
unknown
|
||
https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
|
unknown
|
||
https://www.amazon.com/?tag=admarketus-20&ref=pd_sl_7548d4575af019e4c148ccf1a78112802e66a0816a72fc94
|
unknown
|
||
https://incredibleextedwj.shop/apil
|
unknown
|
||
https://incredibleextedwj.shop/i
|
unknown
|
There are 35 hidden URLs, click here to show them.
Domains
Name
|
IP
|
Malicious
|
|
---|---|---|---|
incredibleextedwj.shop
|
172.67.218.63
|
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
172.67.218.63
|
incredibleextedwj.shop
|
United States
|
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
D9A000
|
unkown
|
page readonly
|
||
17D4000
|
heap
|
page read and write
|
||
4A40000
|
heap
|
page read and write
|
||
1B43000
|
heap
|
page read and write
|
||
28ED000
|
heap
|
page read and write
|
||
2B6A000
|
trusted library allocation
|
page read and write
|
||
2BAC000
|
heap
|
page read and write
|
||
423D000
|
trusted library allocation
|
page read and write
|
||
4317000
|
trusted library allocation
|
page read and write
|
||
4276000
|
trusted library allocation
|
page read and write
|
||
3771000
|
heap
|
page read and write
|
||
17D4000
|
heap
|
page read and write
|
||
1B52000
|
heap
|
page read and write
|
||
6AAF000
|
heap
|
page read and write
|
||
6F5C000
|
stack
|
page read and write
|
||
4312000
|
trusted library allocation
|
page read and write
|
||
1A9E000
|
heap
|
page read and write
|
||
4238000
|
trusted library allocation
|
page read and write
|
||
DD3000
|
unkown
|
page execute read
|
||
17D0000
|
heap
|
page read and write
|
||
17D4000
|
heap
|
page read and write
|
||
17D4000
|
heap
|
page read and write
|
||
42F2000
|
trusted library allocation
|
page read and write
|
||
4AE0000
|
heap
|
page read and write
|
||
477F000
|
stack
|
page read and write
|
||
424F000
|
trusted library allocation
|
page read and write
|
||
1AB7000
|
heap
|
page read and write
|
||
456E000
|
stack
|
page read and write
|
||
42ED000
|
trusted library allocation
|
page read and write
|
||
2AA0000
|
heap
|
page read and write
|
||
2BB4000
|
heap
|
page read and write
|
||
2ADE000
|
stack
|
page read and write
|
||
6CBD000
|
stack
|
page read and write
|
||
D1000
|
unkown
|
page execute read
|
||
4F7E000
|
stack
|
page read and write
|
||
4306000
|
trusted library allocation
|
page read and write
|
||
1AD5000
|
heap
|
page read and write
|
||
2B1B000
|
heap
|
page read and write
|
||
1E4E000
|
stack
|
page read and write
|
||
2E60000
|
heap
|
page read and write
|
||
423E000
|
trusted library allocation
|
page read and write
|
||
42C6000
|
trusted library allocation
|
page read and write
|
||
4312000
|
trusted library allocation
|
page read and write
|
||
3A6D000
|
stack
|
page read and write
|
||
A20000
|
unkown
|
page write copy
|
||
412D000
|
stack
|
page read and write
|
||
6980000
|
heap
|
page read and write
|
||
4AE4000
|
heap
|
page read and write
|
||
1AD5000
|
heap
|
page read and write
|
||
4249000
|
trusted library allocation
|
page read and write
|
||
287B000
|
heap
|
page read and write
|
||
9E1000
|
unkown
|
page execute read
|
||
431A000
|
trusted library allocation
|
page read and write
|
||
285C000
|
heap
|
page read and write
|
||
28EF000
|
heap
|
page read and write
|
||
135000
|
unkown
|
page readonly
|
||
4249000
|
trusted library allocation
|
page read and write
|
||
4238000
|
trusted library allocation
|
page read and write
|
||
1AB2000
|
heap
|
page read and write
|
||
42B9000
|
trusted library allocation
|
page read and write
|
||
4720000
|
trusted library allocation
|
page read and write
|
||
1AA1000
|
heap
|
page read and write
|
||
4278000
|
trusted library allocation
|
page read and write
|
||
3B6F000
|
stack
|
page read and write
|
||
2B46000
|
heap
|
page read and write
|
||
104000
|
unkown
|
page readonly
|
||
2B1C000
|
heap
|
page read and write
|
||
D0000
|
unkown
|
page readonly
|
||
8CD000
|
stack
|
page read and write
|
||
2BB4000
|
heap
|
page read and write
|
||
D60000
|
unkown
|
page readonly
|
||
431A000
|
trusted library allocation
|
page read and write
|
||
2AA4000
|
heap
|
page read and write
|
||
427E000
|
trusted library allocation
|
page read and write
|
||
2866000
|
heap
|
page read and write
|
||
24D7000
|
stack
|
page read and write
|
||
4306000
|
trusted library allocation
|
page read and write
|
||
4238000
|
trusted library allocation
|
page read and write
|
||
4371000
|
trusted library allocation
|
page read and write
|
||
4317000
|
trusted library allocation
|
page read and write
|
||
26E5000
|
heap
|
page read and write
|
||
423E000
|
trusted library allocation
|
page read and write
|
||
2B23000
|
heap
|
page read and write
|
||
4694000
|
trusted library allocation
|
page read and write
|
||
4295000
|
trusted library allocation
|
page read and write
|
||
2BB4000
|
heap
|
page read and write
|
||
4337000
|
trusted library allocation
|
page read and write
|
||
4359000
|
trusted library allocation
|
page read and write
|
||
1AB2000
|
heap
|
page read and write
|
||
4361000
|
trusted library allocation
|
page read and write
|
||
1AD5000
|
heap
|
page read and write
|
||
2859000
|
heap
|
page read and write
|
||
2A5E000
|
stack
|
page read and write
|
||
1AB2000
|
heap
|
page read and write
|
||
424F000
|
trusted library allocation
|
page read and write
|
||
425F000
|
trusted library allocation
|
page read and write
|
||
430F000
|
trusted library allocation
|
page read and write
|
||
28EF000
|
heap
|
page read and write
|
||
4238000
|
trusted library allocation
|
page read and write
|
||
431C000
|
trusted library allocation
|
page read and write
|
||
42D2000
|
trusted library allocation
|
page read and write
|
||
2D5F000
|
stack
|
page read and write
|
||
28C3000
|
heap
|
page read and write
|
||
431C000
|
trusted library allocation
|
page read and write
|
||
42AC000
|
trusted library allocation
|
page read and write
|
||
431A000
|
trusted library allocation
|
page read and write
|
||
26E0000
|
heap
|
page read and write
|
||
A45000
|
unkown
|
page readonly
|
||
4369000
|
trusted library allocation
|
page read and write
|
||
4CAE000
|
stack
|
page read and write
|
||
4318000
|
trusted library allocation
|
page read and write
|
||
2B19000
|
heap
|
page read and write
|
||
4237000
|
trusted library allocation
|
page read and write
|
||
28EF000
|
heap
|
page read and write
|
||
4237000
|
trusted library allocation
|
page read and write
|
||
4FBC000
|
stack
|
page read and write
|
||
49D1000
|
trusted library allocation
|
page read and write
|
||
2B5E000
|
heap
|
page read and write
|
||
4233000
|
trusted library allocation
|
page read and write
|
||
427E000
|
trusted library allocation
|
page read and write
|
||
4269000
|
trusted library allocation
|
page read and write
|
||
42D2000
|
trusted library allocation
|
page read and write
|
||
424F000
|
trusted library allocation
|
page read and write
|
||
2BB4000
|
heap
|
page read and write
|
||
4231000
|
trusted library allocation
|
page read and write
|
||
4259000
|
trusted library allocation
|
page read and write
|
||
4269000
|
trusted library allocation
|
page read and write
|
||
1A80000
|
heap
|
page read and write
|
||
4BAE000
|
stack
|
page read and write
|
||
4317000
|
trusted library allocation
|
page read and write
|
||
44A9000
|
trusted library allocation
|
page read and write
|
||
4315000
|
trusted library allocation
|
page read and write
|
||
4D66000
|
trusted library allocation
|
page read and write
|
||
2B90000
|
heap
|
page read and write
|
||
17BE000
|
stack
|
page read and write
|
||
466F000
|
stack
|
page read and write
|
||
9E0000
|
unkown
|
page readonly
|
||
42B4000
|
trusted library allocation
|
page read and write
|
||
4E6B000
|
stack
|
page read and write
|
||
28B5000
|
heap
|
page read and write
|
||
1AB7000
|
heap
|
page read and write
|
||
396D000
|
stack
|
page read and write
|
||
4244000
|
trusted library allocation
|
page read and write
|
||
4AA0000
|
heap
|
page read and write
|
||
4CEA000
|
heap
|
page read and write
|
||
362D000
|
stack
|
page read and write
|
||
4259000
|
trusted library allocation
|
page read and write
|
||
8E7000
|
stack
|
page read and write
|
||
2BAB000
|
heap
|
page read and write
|
||
4231000
|
trusted library allocation
|
page read and write
|
||
28B5000
|
heap
|
page read and write
|
||
431C000
|
trusted library allocation
|
page read and write
|
||
D1000
|
unkown
|
page execute read
|
||
A14000
|
unkown
|
page readonly
|
||
2B22000
|
heap
|
page read and write
|
||
2BB4000
|
heap
|
page read and write
|
||
4263000
|
trusted library allocation
|
page read and write
|
||
427E000
|
trusted library allocation
|
page read and write
|
||
427E000
|
trusted library allocation
|
page read and write
|
||
8DD000
|
stack
|
page read and write
|
||
427E000
|
trusted library allocation
|
page read and write
|
||
2846000
|
heap
|
page read and write
|
||
425F000
|
trusted library allocation
|
page read and write
|
||
28F5000
|
heap
|
page read and write
|
||
4317000
|
trusted library allocation
|
page read and write
|
||
D9D000
|
unkown
|
page read and write
|
||
6440000
|
trusted library allocation
|
page read and write
|
||
2BB4000
|
heap
|
page read and write
|
||
40EF000
|
stack
|
page read and write
|
||
4285000
|
trusted library allocation
|
page read and write
|
||
2861000
|
heap
|
page read and write
|
||
42F2000
|
trusted library allocation
|
page read and write
|
||
427E000
|
trusted library allocation
|
page read and write
|
||
5C0000
|
heap
|
page readonly
|
||
9E1000
|
unkown
|
page execute read
|
||
1B47000
|
heap
|
page read and write
|
||
2A1D000
|
stack
|
page read and write
|
||
42BB000
|
trusted library allocation
|
page read and write
|
||
287B000
|
heap
|
page read and write
|
||
42BA000
|
trusted library allocation
|
page read and write
|
||
1B49000
|
heap
|
page read and write
|
||
427E000
|
trusted library allocation
|
page read and write
|
||
17D4000
|
heap
|
page read and write
|
||
4246000
|
trusted library allocation
|
page read and write
|
||
430A000
|
trusted library allocation
|
page read and write
|
||
1AB7000
|
heap
|
page read and write
|
||
4CE0000
|
trusted library allocation
|
page read and write
|
||
50BD000
|
stack
|
page read and write
|
||
4317000
|
trusted library allocation
|
page read and write
|
||
1AE1000
|
heap
|
page read and write
|
||
289F000
|
heap
|
page read and write
|
||
8FA000
|
stack
|
page read and write
|
||
49EA000
|
trusted library allocation
|
page read and write
|
||
2851000
|
heap
|
page read and write
|
||
42D2000
|
trusted library allocation
|
page read and write
|
||
4231000
|
trusted library allocation
|
page read and write
|
||
110000
|
unkown
|
page write copy
|
||
4319000
|
trusted library allocation
|
page read and write
|
||
6170000
|
heap
|
page read and write
|
||
4238000
|
trusted library allocation
|
page read and write
|
||
4293000
|
trusted library allocation
|
page read and write
|
||
4238000
|
trusted library allocation
|
page read and write
|
||
427E000
|
trusted library allocation
|
page read and write
|
||
4260000
|
trusted library allocation
|
page read and write
|
||
424A000
|
trusted library allocation
|
page read and write
|
||
2AE0000
|
heap
|
page read and write
|
||
1760000
|
heap
|
page read and write
|
||
2860000
|
heap
|
page read and write
|
||
422E000
|
stack
|
page read and write
|
||
3FEE000
|
stack
|
page read and write
|
||
4331000
|
trusted library allocation
|
page read and write
|
||
1AC3000
|
heap
|
page read and write
|
||
42EA000
|
trusted library allocation
|
page read and write
|
||
366D000
|
stack
|
page read and write
|
||
2BAC000
|
heap
|
page read and write
|
||
24FA000
|
stack
|
page read and write
|
||
285C000
|
heap
|
page read and write
|
||
4249000
|
trusted library allocation
|
page read and write
|
||
135000
|
unkown
|
page write copy
|
||
469D000
|
trusted library allocation
|
page read and write
|
||
2B5E000
|
heap
|
page read and write
|
||
2AE8000
|
heap
|
page read and write
|
||
424F000
|
trusted library allocation
|
page read and write
|
||
42F2000
|
trusted library allocation
|
page read and write
|
||
427D000
|
trusted library allocation
|
page read and write
|
||
427E000
|
trusted library allocation
|
page read and write
|
||
1AC3000
|
heap
|
page read and write
|
||
289F000
|
heap
|
page read and write
|
||
1185000
|
unkown
|
page execute read
|
||
8E5000
|
stack
|
page read and write
|
||
42CB000
|
trusted library allocation
|
page read and write
|
||
266E000
|
stack
|
page read and write
|
||
2A9E000
|
stack
|
page read and write
|
||
1A70000
|
remote allocation
|
page read and write
|
||
4264000
|
trusted library allocation
|
page read and write
|
||
4238000
|
trusted library allocation
|
page read and write
|
||
427E000
|
trusted library allocation
|
page read and write
|
||
28EE000
|
heap
|
page read and write
|
||
24C0000
|
stack
|
page read and write
|
||
35F0000
|
trusted library allocation
|
page read and write
|
||
21D6000
|
stack
|
page read and write
|
||
4331000
|
trusted library allocation
|
page read and write
|
||
2BAC000
|
heap
|
page read and write
|
||
4232000
|
trusted library allocation
|
page read and write
|
||
1B43000
|
heap
|
page read and write
|
||
4319000
|
trusted library allocation
|
page read and write
|
||
424A000
|
trusted library allocation
|
page read and write
|
||
DCD000
|
unkown
|
page read and write
|
||
6E5F000
|
stack
|
page read and write
|
||
4419000
|
trusted library allocation
|
page read and write
|
||
4349000
|
trusted library allocation
|
page read and write
|
||
287B000
|
heap
|
page read and write
|
||
1B3F000
|
heap
|
page read and write
|
||
6AA9000
|
heap
|
page read and write
|
||
4318000
|
trusted library allocation
|
page read and write
|
||
42D2000
|
trusted library allocation
|
page read and write
|
||
284D000
|
heap
|
page read and write
|
||
6AA7000
|
heap
|
page read and write
|
||
2E5E000
|
stack
|
page read and write
|
||
26B0000
|
heap
|
page read and write
|
||
42BB000
|
trusted library allocation
|
page read and write
|
||
1AFD000
|
heap
|
page read and write
|
||
6B9F000
|
stack
|
page read and write
|
||
2B38000
|
heap
|
page read and write
|
||
1A70000
|
remote allocation
|
page read and write
|
||
4312000
|
trusted library allocation
|
page read and write
|
||
1B33000
|
heap
|
page read and write
|
||
4267000
|
trusted library allocation
|
page read and write
|
||
1B51000
|
heap
|
page read and write
|
||
1B33000
|
heap
|
page read and write
|
||
4CEE000
|
stack
|
page read and write
|
||
DA8000
|
unkown
|
page execute read
|
||
28EE000
|
heap
|
page read and write
|
||
2BB4000
|
heap
|
page read and write
|
||
42C1000
|
trusted library allocation
|
page read and write
|
||
1B3B000
|
heap
|
page read and write
|
||
6D63000
|
heap
|
page read and write
|
||
1D4E000
|
stack
|
page read and write
|
||
4238000
|
trusted library allocation
|
page read and write
|
||
2B0A000
|
heap
|
page read and write
|
||
372E000
|
stack
|
page read and write
|
||
4249000
|
trusted library allocation
|
page read and write
|
||
1ACB000
|
heap
|
page read and write
|
||
A27000
|
unkown
|
page read and write
|
||
4312000
|
trusted library allocation
|
page read and write
|
||
4267000
|
trusted library allocation
|
page read and write
|
||
3C6E000
|
stack
|
page read and write
|
||
1AB1000
|
heap
|
page read and write
|
||
427D000
|
trusted library allocation
|
page read and write
|
||
4244000
|
trusted library allocation
|
page read and write
|
||
1ADD000
|
heap
|
page read and write
|
||
6180000
|
trusted library allocation
|
page read and write
|
||
4CE8000
|
heap
|
page read and write
|
||
42AC000
|
trusted library allocation
|
page read and write
|
||
4330000
|
trusted library allocation
|
page read and write
|
||
4232000
|
trusted library allocation
|
page read and write
|
||
2BB4000
|
heap
|
page read and write
|
||
17D4000
|
heap
|
page read and write
|
||
17D4000
|
heap
|
page read and write
|
||
1ACB000
|
heap
|
page read and write
|
||
4266000
|
trusted library allocation
|
page read and write
|
||
423D000
|
trusted library allocation
|
page read and write
|
||
2BB4000
|
heap
|
page read and write
|
||
1B33000
|
heap
|
page read and write
|
||
D60000
|
unkown
|
page readonly
|
||
42AC000
|
trusted library allocation
|
page read and write
|
||
4249000
|
trusted library allocation
|
page read and write
|
||
8D7000
|
stack
|
page read and write
|
||
1B56000
|
heap
|
page read and write
|
||
433B000
|
trusted library allocation
|
page read and write
|
||
2852000
|
heap
|
page read and write
|
||
427E000
|
trusted library allocation
|
page read and write
|
||
1ADD000
|
heap
|
page read and write
|
||
387D000
|
trusted library allocation
|
page read and write
|
||
1650000
|
unkown
|
page readonly
|
||
428E000
|
trusted library allocation
|
page read and write
|
||
24F2000
|
stack
|
page read and write
|
||
1B43000
|
heap
|
page read and write
|
||
4314000
|
trusted library allocation
|
page read and write
|
||
4312000
|
trusted library allocation
|
page read and write
|
||
4259000
|
trusted library allocation
|
page read and write
|
||
431F000
|
trusted library allocation
|
page read and write
|
||
24EB000
|
stack
|
page read and write
|
||
4338000
|
trusted library allocation
|
page read and write
|
||
2C56000
|
heap
|
page read and write
|
||
136000
|
unkown
|
page readonly
|
||
425B000
|
trusted library allocation
|
page read and write
|
||
1ACB000
|
heap
|
page read and write
|
||
117000
|
unkown
|
page read and write
|
||
24DA000
|
stack
|
page read and write
|
||
4267000
|
trusted library allocation
|
page read and write
|
||
1AD5000
|
heap
|
page read and write
|
||
42F0000
|
trusted library allocation
|
page read and write
|
||
4278000
|
trusted library allocation
|
page read and write
|
||
3772000
|
heap
|
page read and write
|
||
1B3F000
|
heap
|
page read and write
|
||
3760000
|
heap
|
page read and write
|
||
4231000
|
trusted library allocation
|
page read and write
|
||
2B1B000
|
heap
|
page read and write
|
||
5B0000
|
heap
|
page read and write
|
||
427E000
|
trusted library allocation
|
page read and write
|
||
9E0000
|
unkown
|
page readonly
|
||
42BA000
|
trusted library allocation
|
page read and write
|
||
431A000
|
trusted library allocation
|
page read and write
|
||
427E000
|
trusted library allocation
|
page read and write
|
||
427E000
|
trusted library allocation
|
page read and write
|
||
1B3F000
|
heap
|
page read and write
|
||
5D0000
|
heap
|
page read and write
|
||
1A40000
|
heap
|
page read and write
|
||
2B5F000
|
heap
|
page read and write
|
||
427E000
|
trusted library allocation
|
page read and write
|
||
284A000
|
heap
|
page read and write
|
||
4259000
|
trusted library allocation
|
page read and write
|
||
1A3E000
|
stack
|
page read and write
|
||
431D000
|
trusted library allocation
|
page read and write
|
||
A20000
|
unkown
|
page read and write
|
||
28F5000
|
heap
|
page read and write
|
||
2B18000
|
heap
|
page read and write
|
||
1ADD000
|
heap
|
page read and write
|
||
513C000
|
stack
|
page read and write
|
||
1A70000
|
remote allocation
|
page read and write
|
||
2B1B000
|
heap
|
page read and write
|
||
427E000
|
trusted library allocation
|
page read and write
|
||
4321000
|
trusted library allocation
|
page read and write
|
||
431F000
|
trusted library allocation
|
page read and write
|
||
1B3B000
|
heap
|
page read and write
|
||
4910000
|
heap
|
page read and write
|
||
431A000
|
trusted library allocation
|
page read and write
|
||
427E000
|
trusted library allocation
|
page read and write
|
||
17D4000
|
heap
|
page read and write
|
||
104000
|
unkown
|
page readonly
|
||
3771000
|
heap
|
page read and write
|
||
4312000
|
trusted library allocation
|
page read and write
|
||
4238000
|
trusted library allocation
|
page read and write
|
||
42C1000
|
trusted library allocation
|
page read and write
|
||
1B43000
|
heap
|
page read and write
|
||
28F5000
|
heap
|
page read and write
|
||
4312000
|
trusted library allocation
|
page read and write
|
||
D61000
|
unkown
|
page execute read
|
||
110000
|
unkown
|
page read and write
|
||
431F000
|
trusted library allocation
|
page read and write
|
||
4EAB000
|
stack
|
page read and write
|
||
427E000
|
trusted library allocation
|
page read and write
|
||
4231000
|
trusted library allocation
|
page read and write
|
||
4234000
|
trusted library allocation
|
page read and write
|
||
2B51000
|
trusted library allocation
|
page read and write
|
||
4267000
|
trusted library allocation
|
page read and write
|
||
424F000
|
trusted library allocation
|
page read and write
|
||
42BA000
|
trusted library allocation
|
page read and write
|
||
24E7000
|
stack
|
page read and write
|
||
28EE000
|
heap
|
page read and write
|
||
4317000
|
trusted library allocation
|
page read and write
|
||
424F000
|
trusted library allocation
|
page read and write
|
||
2820000
|
heap
|
page read and write
|
||
42C2000
|
trusted library allocation
|
page read and write
|
||
1B4E000
|
heap
|
page read and write
|
||
4259000
|
trusted library allocation
|
page read and write
|
||
2620000
|
heap
|
page readonly
|
||
2540000
|
heap
|
page read and write
|
||
1AE1000
|
heap
|
page read and write
|
||
D0000
|
unkown
|
page readonly
|
||
1B55000
|
heap
|
page read and write
|
||
423D000
|
trusted library allocation
|
page read and write
|
||
2B4D000
|
heap
|
page read and write
|
||
4257000
|
trusted library allocation
|
page read and write
|
||
42D3000
|
trusted library allocation
|
page read and write
|
||
42C1000
|
trusted library allocation
|
page read and write
|
||
1650000
|
unkown
|
page readonly
|
||
2BAC000
|
heap
|
page read and write
|
||
4269000
|
trusted library allocation
|
page read and write
|
||
2C50000
|
heap
|
page read and write
|
||
42C1000
|
trusted library allocation
|
page read and write
|
||
1758000
|
stack
|
page read and write
|
||
4246000
|
trusted library allocation
|
page read and write
|
||
4267000
|
trusted library allocation
|
page read and write
|
||
4264000
|
trusted library allocation
|
page read and write
|
||
2B97000
|
heap
|
page read and write
|
||
A14000
|
unkown
|
page readonly
|
||
527D000
|
trusted library allocation
|
page read and write
|
||
17D4000
|
heap
|
page read and write
|
||
42AC000
|
trusted library allocation
|
page read and write
|
||
36AE000
|
stack
|
page read and write
|
||
644B000
|
heap
|
page read and write
|
||
2866000
|
heap
|
page read and write
|
||
1ADD000
|
heap
|
page read and write
|
||
425F000
|
trusted library allocation
|
page read and write
|
||
28C3000
|
heap
|
page read and write
|
||
2866000
|
heap
|
page read and write
|
||
4315000
|
trusted library allocation
|
page read and write
|
||
4340000
|
trusted library allocation
|
page read and write
|
||
4231000
|
trusted library allocation
|
page read and write
|
||
4DEF000
|
stack
|
page read and write
|
||
4269000
|
trusted library allocation
|
page read and write
|
||
2B22000
|
heap
|
page read and write
|
||
4241000
|
trusted library allocation
|
page read and write
|
||
2E6B000
|
heap
|
page read and write
|
||
10D7000
|
unkown
|
page execute read
|
||
4850000
|
heap
|
page read and write
|
||
8C0000
|
stack
|
page read and write
|
||
2E68000
|
heap
|
page read and write
|
||
4AC0000
|
heap
|
page read and write
|
||
42BF000
|
trusted library allocation
|
page read and write
|
||
423A000
|
trusted library allocation
|
page read and write
|
||
17D4000
|
heap
|
page read and write
|
||
428C000
|
trusted library allocation
|
page read and write
|
||
4314000
|
trusted library allocation
|
page read and write
|
||
4230000
|
trusted library allocation
|
page read and write
|
||
8DA000
|
stack
|
page read and write
|
||
1AB7000
|
heap
|
page read and write
|
||
4267000
|
trusted library allocation
|
page read and write
|
||
425B000
|
trusted library allocation
|
page read and write
|
||
4236000
|
trusted library allocation
|
page read and write
|
||
4238000
|
trusted library allocation
|
page read and write
|
||
6C40000
|
heap
|
page read and write
|
||
2B22000
|
heap
|
page read and write
|
||
A46000
|
unkown
|
page readonly
|
||
4A30000
|
heap
|
page read and write
|
||
4247000
|
trusted library allocation
|
page read and write
|
||
2B0E000
|
heap
|
page read and write
|
||
4237000
|
trusted library allocation
|
page read and write
|
||
289F000
|
heap
|
page read and write
|
||
1B3D000
|
heap
|
page read and write
|
||
4231000
|
trusted library allocation
|
page read and write
|
||
43E1000
|
trusted library allocation
|
page read and write
|
||
424F000
|
trusted library allocation
|
page read and write
|
||
50FE000
|
stack
|
page read and write
|
||
1AE2000
|
heap
|
page read and write
|
||
17D4000
|
heap
|
page read and write
|
||
427D000
|
trusted library allocation
|
page read and write
|
||
4312000
|
trusted library allocation
|
page read and write
|
||
42BA000
|
trusted library allocation
|
page read and write
|
||
3771000
|
heap
|
page read and write
|
||
8EB000
|
stack
|
page read and write
|
||
4278000
|
trusted library allocation
|
page read and write
|
||
27EE000
|
stack
|
page read and write
|
||
42BF000
|
trusted library allocation
|
page read and write
|
||
427E000
|
trusted library allocation
|
page read and write
|
||
4288000
|
trusted library allocation
|
page read and write
|
||
A45000
|
unkown
|
page write copy
|
||
28EF000
|
heap
|
page read and write
|
||
4E7D000
|
stack
|
page read and write
|
||
4314000
|
trusted library allocation
|
page read and write
|
||
28F5000
|
heap
|
page read and write
|
||
26AE000
|
stack
|
page read and write
|
||
424F000
|
trusted library allocation
|
page read and write
|
||
1AC3000
|
heap
|
page read and write
|
||
617D000
|
heap
|
page read and write
|
||
546000
|
stack
|
page read and write
|
||
24DD000
|
stack
|
page read and write
|
||
2828000
|
heap
|
page read and write
|
||
2B1B000
|
heap
|
page read and write
|
||
429F000
|
trusted library allocation
|
page read and write
|
||
6179000
|
heap
|
page read and write
|
||
1A8E000
|
heap
|
page read and write
|
||
1770000
|
heap
|
page read and write
|
||
6DBC000
|
stack
|
page read and write
|
||
42D2000
|
trusted library allocation
|
page read and write
|
||
4269000
|
trusted library allocation
|
page read and write
|
||
1AC3000
|
heap
|
page read and write
|
||
D0B000
|
stack
|
page read and write
|
||
A44000
|
unkown
|
page read and write
|
||
4266000
|
trusted library allocation
|
page read and write
|
||
2B70000
|
heap
|
page read and write
|
||
17D4000
|
heap
|
page read and write
|
||
4409000
|
trusted library allocation
|
page read and write
|
||
4411000
|
trusted library allocation
|
page read and write
|
||
428D000
|
trusted library allocation
|
page read and write
|
||
4312000
|
trusted library allocation
|
page read and write
|
||
4269000
|
trusted library allocation
|
page read and write
|
||
1A8A000
|
heap
|
page read and write
|
||
426F000
|
trusted library allocation
|
page read and write
|
||
4E2E000
|
stack
|
page read and write
|
||
1B3B000
|
heap
|
page read and write
|
||
431E000
|
trusted library allocation
|
page read and write
|
||
24D2000
|
stack
|
page read and write
|
||
433A000
|
trusted library allocation
|
page read and write
|
||
4269000
|
trusted library allocation
|
page read and write
|
||
4239000
|
trusted library allocation
|
page read and write
|
||
427E000
|
trusted library allocation
|
page read and write
|
||
48F0000
|
heap
|
page read and write
|
||
4391000
|
trusted library allocation
|
page read and write
|
||
4A10000
|
trusted library allocation
|
page read and write
|
||
42E2000
|
trusted library allocation
|
page read and write
|
||
2B46000
|
heap
|
page read and write
|
||
4312000
|
trusted library allocation
|
page read and write
|
||
4306000
|
trusted library allocation
|
page read and write
|
||
36E0000
|
heap
|
page read and write
|
||
4315000
|
trusted library allocation
|
page read and write
|
||
24CD000
|
stack
|
page read and write
|
||
285C000
|
heap
|
page read and write
|
||
2B4D000
|
heap
|
page read and write
|
||
6442000
|
heap
|
page read and write
|
||
2B9B000
|
heap
|
page read and write
|
||
1B3F000
|
heap
|
page read and write
|
||
285C000
|
heap
|
page read and write
|
||
1ACB000
|
heap
|
page read and write
|
||
134000
|
unkown
|
page read and write
|
||
427E000
|
trusted library allocation
|
page read and write
|
||
1B32000
|
heap
|
page read and write
|
||
425B000
|
trusted library allocation
|
page read and write
|
There are 530 hidden memdumps, click here to show them.