Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
TET8iWY1w4.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
initial sample
|
||
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_TET8iWY1w4.exe_baf128c5aa94d11fcb5d518c1b53c94826195_ff764eae_7b82c7fd-01a7-4d29-b0e1-e1815c3e2fbd\Report.wer
|
Unicode text, UTF-16, little-endian text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WER1E.tmp.WERInternalMetadata.xml
|
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WER4E.tmp.xml
|
XML 1.0 document, ASCII text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WERF3F7.tmp.dmp
|
Mini DuMP crash report, 15 streams, Wed May 1 14:39:33 2024, 0x1205a4 type
|
dropped
|
||
C:\Windows\appcompat\Programs\Amcache.hve
|
MS Windows registry file, NT/2000 or above
|
dropped
|
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\TET8iWY1w4.exe
|
"C:\Users\user\Desktop\TET8iWY1w4.exe"
|
||
C:\Windows\SysWOW64\WerFault.exe
|
C:\Windows\SysWOW64\WerFault.exe -u -p 2132 -s 1528
|
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
accountasifkwosov.shop
|
|||
incredibleextedwj.shop
|
|||
shortsvelventysjo.shop
|
|||
tolerateilusidjukl.shop
|
|||
liabilitynighstjsko.shop
|
|||
shatterbreathepsw.shop
|
|||
demonstationfukewko.shop
|
|||
productivelookewr.shop
|
|||
alcojoldwograpciw.shop
|
|||
https://duckduckgo.com/chrome_newtab
|
unknown
|
||
https://accountasifkwosov.shop/
|
unknown
|
||
https://duckduckgo.com/ac/?q=
|
unknown
|
||
https://www.google.com/images/branding/product/ico/googleg_lodp.ico
|
unknown
|
||
https://accountasifkwosov.shop/rspy
|
unknown
|
||
https://accountasifkwosov.shop/X
|
unknown
|
||
https://imp.mt48.net/static?id=7RHzfOIXjFEYsBdvIpkX4Qqm4p8dfCfm4pbW1pbWfpbW7ReNxR3UIG8zInwYIFIVs9eYi
|
unknown
|
||
https://bridge.sfo1.admarketplace.net/ctp?version=16.0.0&key=1696425136400800000.2&ci=1696425136743.
|
unknown
|
||
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
|
unknown
|
||
http://crl.rootca1.amazontrust.com/rootca1.crl0
|
unknown
|
||
http://upx.sf.net
|
unknown
|
||
https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
|
unknown
|
||
http://ocsp.rootca1.amazontrust.com0:
|
unknown
|
||
https://accountasifkwosov.shop/apiyL
|
unknown
|
||
https://www.ecosia.org/newtab/
|
unknown
|
||
https://bridge.sfo1.ap01.net/ctp?version=16.0.0&key=1696425136400800000.1&ci=1696425136743.12791&cta
|
unknown
|
||
https://support.mozilla.org/kb/customize-firefox-controls-buttons-and-toolbars?utm_source=firefox-br
|
unknown
|
||
https://ac.ecosia.org/autocomplete?q=
|
unknown
|
||
https://accountasifkwosov.shop/apis
|
unknown
|
||
https://accountasifkwosov.shop:443/api
|
unknown
|
||
https://accountasifkwosov.shop/u
|
unknown
|
||
https://contile-images.services.mozilla.com/u1AuJcj32cbVUf9NjMipLXEYwu2uFIt4lsj-ccwVqEs.36904.jpg
|
unknown
|
||
https://contile-images.services.mozilla.com/obgoOYObjIFea_bXuT6L4LbBJ8j425AD87S1HMD3BWg.9991.jpg
|
unknown
|
||
http://x1.c.lencr.org/0
|
unknown
|
||
http://x1.i.lencr.org/0
|
unknown
|
||
https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
|
unknown
|
||
https://accountasifkwosov.shop/7
|
unknown
|
||
http://crt.rootca1.amazontrust.com/rootca1.cer0?
|
unknown
|
||
https://accountasifkwosov.shop/apir
|
unknown
|
||
https://www.bestbuy.com/site/electronics/top-deals/pcmcat1563299784494.c/?id=pcmcat1563299784494&ref
|
unknown
|
||
https://www.amazon.com/?tag=admarketus-20&ref=pd_sl_35787f1071928bc3a1aef90b79c9bee9c64ba6683fde7477
|
unknown
|
||
https://support.mozilla.org/products/firefoxgro.all
|
unknown
|
||
https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
|
unknown
|
||
https://accountasifkwosov.shop/api
|
172.67.141.11
|
||
https://accountasifkwosov.shop/api?
|
unknown
|
There are 34 hidden URLs, click here to show them.
Domains
Name
|
IP
|
Malicious
|
|
---|---|---|---|
accountasifkwosov.shop
|
172.67.141.11
|
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
172.67.141.11
|
accountasifkwosov.shop
|
United States
|
Registry
Path
|
Value
|
Malicious
|
|
---|---|---|---|
\REGISTRY\A\{abeeed74-87dd-f494-bc26-9ebabb7e145c}\Root\InventoryApplicationFile\tet8iwy1w4.exe|81d1c971c5cf458a
|
ProgramId
|
||
\REGISTRY\A\{abeeed74-87dd-f494-bc26-9ebabb7e145c}\Root\InventoryApplicationFile\tet8iwy1w4.exe|81d1c971c5cf458a
|
FileId
|
||
\REGISTRY\A\{abeeed74-87dd-f494-bc26-9ebabb7e145c}\Root\InventoryApplicationFile\tet8iwy1w4.exe|81d1c971c5cf458a
|
LowerCaseLongPath
|
||
\REGISTRY\A\{abeeed74-87dd-f494-bc26-9ebabb7e145c}\Root\InventoryApplicationFile\tet8iwy1w4.exe|81d1c971c5cf458a
|
LongPathHash
|
||
\REGISTRY\A\{abeeed74-87dd-f494-bc26-9ebabb7e145c}\Root\InventoryApplicationFile\tet8iwy1w4.exe|81d1c971c5cf458a
|
Name
|
||
\REGISTRY\A\{abeeed74-87dd-f494-bc26-9ebabb7e145c}\Root\InventoryApplicationFile\tet8iwy1w4.exe|81d1c971c5cf458a
|
OriginalFileName
|
||
\REGISTRY\A\{abeeed74-87dd-f494-bc26-9ebabb7e145c}\Root\InventoryApplicationFile\tet8iwy1w4.exe|81d1c971c5cf458a
|
Publisher
|
||
\REGISTRY\A\{abeeed74-87dd-f494-bc26-9ebabb7e145c}\Root\InventoryApplicationFile\tet8iwy1w4.exe|81d1c971c5cf458a
|
Version
|
||
\REGISTRY\A\{abeeed74-87dd-f494-bc26-9ebabb7e145c}\Root\InventoryApplicationFile\tet8iwy1w4.exe|81d1c971c5cf458a
|
BinFileVersion
|
||
\REGISTRY\A\{abeeed74-87dd-f494-bc26-9ebabb7e145c}\Root\InventoryApplicationFile\tet8iwy1w4.exe|81d1c971c5cf458a
|
BinaryType
|
||
\REGISTRY\A\{abeeed74-87dd-f494-bc26-9ebabb7e145c}\Root\InventoryApplicationFile\tet8iwy1w4.exe|81d1c971c5cf458a
|
ProductName
|
||
\REGISTRY\A\{abeeed74-87dd-f494-bc26-9ebabb7e145c}\Root\InventoryApplicationFile\tet8iwy1w4.exe|81d1c971c5cf458a
|
ProductVersion
|
||
\REGISTRY\A\{abeeed74-87dd-f494-bc26-9ebabb7e145c}\Root\InventoryApplicationFile\tet8iwy1w4.exe|81d1c971c5cf458a
|
LinkDate
|
||
\REGISTRY\A\{abeeed74-87dd-f494-bc26-9ebabb7e145c}\Root\InventoryApplicationFile\tet8iwy1w4.exe|81d1c971c5cf458a
|
BinProductVersion
|
||
\REGISTRY\A\{abeeed74-87dd-f494-bc26-9ebabb7e145c}\Root\InventoryApplicationFile\tet8iwy1w4.exe|81d1c971c5cf458a
|
AppxPackageFullName
|
||
\REGISTRY\A\{abeeed74-87dd-f494-bc26-9ebabb7e145c}\Root\InventoryApplicationFile\tet8iwy1w4.exe|81d1c971c5cf458a
|
AppxPackageRelativeId
|
||
\REGISTRY\A\{abeeed74-87dd-f494-bc26-9ebabb7e145c}\Root\InventoryApplicationFile\tet8iwy1w4.exe|81d1c971c5cf458a
|
Size
|
||
\REGISTRY\A\{abeeed74-87dd-f494-bc26-9ebabb7e145c}\Root\InventoryApplicationFile\tet8iwy1w4.exe|81d1c971c5cf458a
|
Language
|
||
\REGISTRY\A\{abeeed74-87dd-f494-bc26-9ebabb7e145c}\Root\InventoryApplicationFile\tet8iwy1w4.exe|81d1c971c5cf458a
|
Usn
|
There are 9 hidden registries, click here to show them.
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
3670000
|
direct allocation
|
page execute and read and write
|
||
1B3E000
|
heap
|
page read and write
|
||
4262000
|
trusted library allocation
|
page read and write
|
||
4218000
|
trusted library allocation
|
page read and write
|
||
371E000
|
stack
|
page read and write
|
||
1ACE000
|
heap
|
page read and write
|
||
4267000
|
trusted library allocation
|
page read and write
|
||
1B23000
|
heap
|
page read and write
|
||
4225000
|
trusted library allocation
|
page read and write
|
||
421E000
|
trusted library allocation
|
page read and write
|
||
1AA5000
|
heap
|
page read and write
|
||
1A30000
|
heap
|
page read and write
|
||
421F000
|
trusted library allocation
|
page read and write
|
||
1B54000
|
heap
|
page read and write
|
||
421A000
|
trusted library allocation
|
page read and write
|
||
4360000
|
trusted library allocation
|
page read and write
|
||
46AD000
|
trusted library allocation
|
page read and write
|
||
4258000
|
trusted library allocation
|
page read and write
|
||
420C000
|
trusted library allocation
|
page read and write
|
||
1B9C000
|
heap
|
page read and write
|
||
4267000
|
trusted library allocation
|
page read and write
|
||
425D000
|
trusted library allocation
|
page read and write
|
||
4256000
|
trusted library allocation
|
page read and write
|
||
1B3B000
|
heap
|
page read and write
|
||
455F000
|
stack
|
page read and write
|
||
42E2000
|
trusted library allocation
|
page read and write
|
||
425D000
|
trusted library allocation
|
page read and write
|
||
1B23000
|
heap
|
page read and write
|
||
4222000
|
trusted library allocation
|
page read and write
|
||
1B97000
|
heap
|
page read and write
|
||
4260000
|
trusted library allocation
|
page read and write
|
||
4266000
|
trusted library allocation
|
page read and write
|
||
4252000
|
trusted library allocation
|
page read and write
|
||
1B3B000
|
heap
|
page read and write
|
||
4280000
|
trusted library allocation
|
page read and write
|
||
424B000
|
trusted library allocation
|
page read and write
|
||
423E000
|
trusted library allocation
|
page read and write
|
||
4280000
|
trusted library allocation
|
page read and write
|
||
4253000
|
trusted library allocation
|
page read and write
|
||
9B000
|
stack
|
page read and write
|
||
1B4F000
|
heap
|
page read and write
|
||
1B3E000
|
heap
|
page read and write
|
||
4238000
|
trusted library allocation
|
page read and write
|
||
422E000
|
trusted library allocation
|
page read and write
|
||
428B000
|
trusted library allocation
|
page read and write
|
||
425C000
|
trusted library allocation
|
page read and write
|
||
4260000
|
trusted library allocation
|
page read and write
|
||
4244000
|
trusted library allocation
|
page read and write
|
||
1B3E000
|
heap
|
page read and write
|
||
420A000
|
trusted library allocation
|
page read and write
|
||
423E000
|
trusted library allocation
|
page read and write
|
||
4230000
|
trusted library allocation
|
page read and write
|
||
4238000
|
trusted library allocation
|
page read and write
|
||
4267000
|
trusted library allocation
|
page read and write
|
||
422F000
|
trusted library allocation
|
page read and write
|
||
42A0000
|
trusted library allocation
|
page read and write
|
||
4226000
|
trusted library allocation
|
page read and write
|
||
1ACA000
|
heap
|
page read and write
|
||
4262000
|
trusted library allocation
|
page read and write
|
||
4227000
|
trusted library allocation
|
page read and write
|
||
4214000
|
trusted library allocation
|
page read and write
|
||
448000
|
unkown
|
page execute and read and write
|
||
4260000
|
trusted library allocation
|
page read and write
|
||
422F000
|
trusted library allocation
|
page read and write
|
||
1BBB000
|
heap
|
page read and write
|
||
425C000
|
trusted library allocation
|
page read and write
|
||
420A000
|
trusted library allocation
|
page read and write
|
||
423A000
|
trusted library allocation
|
page read and write
|
||
445E000
|
stack
|
page read and write
|
||
40AF000
|
stack
|
page read and write
|
||
1A0D000
|
unkown
|
page read and write
|
||
3900000
|
heap
|
page read and write
|
||
4266000
|
trusted library allocation
|
page read and write
|
||
38F0000
|
remote allocation
|
page read and write
|
||
4286000
|
trusted library allocation
|
page read and write
|
||
4270000
|
trusted library allocation
|
page read and write
|
||
4265000
|
trusted library allocation
|
page read and write
|
||
38F0000
|
remote allocation
|
page read and write
|
||
1BB2000
|
heap
|
page read and write
|
||
1B23000
|
heap
|
page read and write
|
||
422E000
|
trusted library allocation
|
page read and write
|
||
1B1D000
|
heap
|
page read and write
|
||
1B3E000
|
heap
|
page read and write
|
||
420F000
|
trusted library allocation
|
page read and write
|
||
1BB9000
|
heap
|
page read and write
|
||
4213000
|
trusted library allocation
|
page read and write
|
||
425B000
|
trusted library allocation
|
page read and write
|
||
4201000
|
trusted library allocation
|
page read and write
|
||
4224000
|
trusted library allocation
|
page read and write
|
||
36C0000
|
heap
|
page read and write
|
||
1B54000
|
heap
|
page read and write
|
||
420D000
|
trusted library allocation
|
page read and write
|
||
422C000
|
trusted library allocation
|
page read and write
|
||
1D8F000
|
stack
|
page read and write
|
||
423D000
|
trusted library allocation
|
page read and write
|
||
423B000
|
trusted library allocation
|
page read and write
|
||
1B54000
|
heap
|
page read and write
|
||
421F000
|
trusted library allocation
|
page read and write
|
||
422F000
|
trusted library allocation
|
page read and write
|
||
422B000
|
trusted library allocation
|
page read and write
|
||
1B3B000
|
heap
|
page read and write
|
||
420F000
|
trusted library allocation
|
page read and write
|
||
425C000
|
trusted library allocation
|
page read and write
|
||
423D000
|
trusted library allocation
|
page read and write
|
||
4262000
|
trusted library allocation
|
page read and write
|
||
425D000
|
trusted library allocation
|
page read and write
|
||
4252000
|
trusted library allocation
|
page read and write
|
||
1B2D000
|
heap
|
page read and write
|
||
4328000
|
trusted library allocation
|
page read and write
|
||
1B01000
|
heap
|
page read and write
|
||
423B000
|
trusted library allocation
|
page read and write
|
||
1B9C000
|
heap
|
page read and write
|
||
401000
|
unkown
|
page execute read
|
||
1B3B000
|
heap
|
page read and write
|
||
1B2A000
|
heap
|
page read and write
|
||
4267000
|
trusted library allocation
|
page read and write
|
||
1B23000
|
heap
|
page read and write
|
||
421E000
|
trusted library allocation
|
page read and write
|
||
4259000
|
trusted library allocation
|
page read and write
|
||
430D000
|
trusted library allocation
|
page read and write
|
||
1B42000
|
heap
|
page read and write
|
||
42AA000
|
trusted library allocation
|
page read and write
|
||
36C0000
|
direct allocation
|
page read and write
|
||
422B000
|
trusted library allocation
|
page read and write
|
||
4206000
|
trusted library allocation
|
page read and write
|
||
4213000
|
trusted library allocation
|
page read and write
|
||
420A000
|
trusted library allocation
|
page read and write
|
||
1B23000
|
heap
|
page read and write
|
||
425B000
|
trusted library allocation
|
page read and write
|
||
1BBE000
|
heap
|
page read and write
|
||
422E000
|
trusted library allocation
|
page read and write
|
||
43B0000
|
trusted library allocation
|
page read and write
|
||
4230000
|
trusted library allocation
|
page read and write
|
||
4213000
|
trusted library allocation
|
page read and write
|
||
1A0F000
|
unkown
|
page readonly
|
||
1AA7000
|
heap
|
page read and write
|
||
1AC0000
|
heap
|
page read and write
|
||
1B3B000
|
heap
|
page read and write
|
||
1B1E000
|
heap
|
page read and write
|
||
38AD000
|
stack
|
page read and write
|
||
446000
|
unkown
|
page read and write
|
||
425C000
|
trusted library allocation
|
page read and write
|
||
4224000
|
trusted library allocation
|
page read and write
|
||
4259000
|
trusted library allocation
|
page read and write
|
||
4265000
|
trusted library allocation
|
page read and write
|
||
400000
|
unkown
|
page readonly
|
||
4201000
|
trusted library allocation
|
page read and write
|
||
4252000
|
trusted library allocation
|
page read and write
|
||
1A7E000
|
stack
|
page read and write
|
||
4BA1000
|
trusted library allocation
|
page read and write
|
||
4228000
|
trusted library allocation
|
page read and write
|
||
1B2A000
|
heap
|
page read and write
|
||
420D000
|
trusted library allocation
|
page read and write
|
||
1B97000
|
heap
|
page read and write
|
||
1B1E000
|
heap
|
page read and write
|
||
42AE000
|
trusted library allocation
|
page read and write
|
||
1B3E000
|
heap
|
page read and write
|
||
4232000
|
trusted library allocation
|
page read and write
|
||
1B50000
|
heap
|
page read and write
|
||
4206000
|
trusted library allocation
|
page read and write
|
||
1B2A000
|
heap
|
page read and write
|
||
1BBB000
|
heap
|
page read and write
|
||
420C000
|
trusted library allocation
|
page read and write
|
||
1B54000
|
heap
|
page read and write
|
||
4240000
|
trusted library allocation
|
page read and write
|
||
425C000
|
trusted library allocation
|
page read and write
|
||
4309000
|
trusted library allocation
|
page read and write
|
||
43E0000
|
trusted library allocation
|
page read and write
|
||
43E8000
|
trusted library allocation
|
page read and write
|
||
423E000
|
trusted library allocation
|
page read and write
|
||
4219000
|
trusted library allocation
|
page read and write
|
||
1B1F000
|
heap
|
page read and write
|
||
1BB6000
|
heap
|
page read and write
|
||
1B2D000
|
heap
|
page read and write
|
||
1B42000
|
heap
|
page read and write
|
||
444A000
|
trusted library allocation
|
page read and write
|
||
4252000
|
trusted library allocation
|
page read and write
|
||
4236000
|
trusted library allocation
|
page read and write
|
||
4265000
|
trusted library allocation
|
page read and write
|
||
38EE000
|
stack
|
page read and write
|
||
375D000
|
stack
|
page read and write
|
||
1B3E000
|
heap
|
page read and write
|
||
1B97000
|
heap
|
page read and write
|
||
4223000
|
trusted library allocation
|
page read and write
|
||
42AE000
|
trusted library allocation
|
page read and write
|
||
1BBE000
|
heap
|
page read and write
|
||
4226000
|
trusted library allocation
|
page read and write
|
||
4270000
|
trusted library allocation
|
page read and write
|
||
1B1D000
|
heap
|
page read and write
|
||
41EE000
|
stack
|
page read and write
|
||
424D000
|
trusted library allocation
|
page read and write
|
||
4201000
|
trusted library allocation
|
page read and write
|
||
4229000
|
trusted library allocation
|
page read and write
|
||
4200000
|
trusted library allocation
|
page read and write
|
||
4235000
|
trusted library allocation
|
page read and write
|
||
4300000
|
heap
|
page read and write
|
||
4219000
|
trusted library allocation
|
page read and write
|
||
1B42000
|
heap
|
page read and write
|
||
1BB8000
|
heap
|
page read and write
|
||
40EE000
|
stack
|
page read and write
|
||
43B5000
|
trusted library allocation
|
page read and write
|
||
4241000
|
trusted library allocation
|
page read and write
|
||
4235000
|
trusted library allocation
|
page read and write
|
||
1B4F000
|
heap
|
page read and write
|
||
1B9A000
|
heap
|
page read and write
|
||
4270000
|
trusted library allocation
|
page read and write
|
||
1B2A000
|
heap
|
page read and write
|
||
1B3B000
|
heap
|
page read and write
|
||
4240000
|
trusted library allocation
|
page read and write
|
||
4282000
|
trusted library allocation
|
page read and write
|
||
1BBE000
|
heap
|
page read and write
|
||
4245000
|
trusted library allocation
|
page read and write
|
||
1B9C000
|
heap
|
page read and write
|
||
4201000
|
trusted library allocation
|
page read and write
|
||
1BB7000
|
heap
|
page read and write
|
||
4269000
|
trusted library allocation
|
page read and write
|
||
4206000
|
trusted library allocation
|
page read and write
|
||
421F000
|
trusted library allocation
|
page read and write
|
||
420C000
|
trusted library allocation
|
page read and write
|
||
423D000
|
trusted library allocation
|
page read and write
|
||
1B54000
|
heap
|
page read and write
|
||
425A000
|
trusted library allocation
|
page read and write
|
||
1B9C000
|
heap
|
page read and write
|
||
1B9A000
|
heap
|
page read and write
|
||
4478000
|
trusted library allocation
|
page read and write
|
||
422E000
|
trusted library allocation
|
page read and write
|
||
4265000
|
trusted library allocation
|
page read and write
|
||
1B2D000
|
heap
|
page read and write
|
||
424B000
|
trusted library allocation
|
page read and write
|
||
1B2D000
|
heap
|
page read and write
|
||
1BBB000
|
heap
|
page read and write
|
||
425C000
|
trusted library allocation
|
page read and write
|
||
4232000
|
trusted library allocation
|
page read and write
|
||
4262000
|
trusted library allocation
|
page read and write
|
||
4244000
|
trusted library allocation
|
page read and write
|
||
4301000
|
heap
|
page read and write
|
||
3C0F000
|
stack
|
page read and write
|
||
423A000
|
trusted library allocation
|
page read and write
|
||
411000
|
unkown
|
page readonly
|
||
4247000
|
trusted library allocation
|
page read and write
|
||
4228000
|
trusted library allocation
|
page read and write
|
||
420D000
|
trusted library allocation
|
page read and write
|
||
1B54000
|
heap
|
page read and write
|
||
1B2A000
|
heap
|
page read and write
|
||
420F000
|
trusted library allocation
|
page read and write
|
||
420C000
|
trusted library allocation
|
page read and write
|
||
430F000
|
trusted library allocation
|
page read and write
|
||
422B000
|
trusted library allocation
|
page read and write
|
||
3FAE000
|
stack
|
page read and write
|
||
1B9C000
|
heap
|
page read and write
|
||
4245000
|
trusted library allocation
|
page read and write
|
||
4209000
|
trusted library allocation
|
page read and write
|
||
400000
|
unkown
|
page execute and read and write
|
||
366F000
|
stack
|
page read and write
|
||
1B2A000
|
heap
|
page read and write
|
||
426F000
|
trusted library allocation
|
page read and write
|
||
4256000
|
trusted library allocation
|
page read and write
|
||
425F000
|
trusted library allocation
|
page read and write
|
||
4214000
|
trusted library allocation
|
page read and write
|
||
4236000
|
trusted library allocation
|
page read and write
|
||
4271000
|
trusted library allocation
|
page read and write
|
||
427E000
|
trusted library allocation
|
page read and write
|
||
4269000
|
trusted library allocation
|
page read and write
|
||
42E2000
|
trusted library allocation
|
page read and write
|
||
4251000
|
trusted library allocation
|
page read and write
|
||
4596000
|
trusted library allocation
|
page read and write
|
||
1B50000
|
heap
|
page read and write
|
||
1BBD000
|
heap
|
page read and write
|
||
4262000
|
trusted library allocation
|
page read and write
|
||
420D000
|
trusted library allocation
|
page read and write
|
||
3B0F000
|
stack
|
page read and write
|
||
1F0000
|
heap
|
page read and write
|
||
1B2A000
|
heap
|
page read and write
|
||
420E000
|
trusted library allocation
|
page read and write
|
||
4215000
|
trusted library allocation
|
page read and write
|
||
425C000
|
trusted library allocation
|
page read and write
|
||
356E000
|
stack
|
page read and write
|
||
423E000
|
trusted library allocation
|
page read and write
|
||
1B3E000
|
heap
|
page read and write
|
||
424A000
|
trusted library allocation
|
page read and write
|
||
423D000
|
trusted library allocation
|
page read and write
|
||
422E000
|
trusted library allocation
|
page read and write
|
||
422B000
|
trusted library allocation
|
page read and write
|
||
4226000
|
trusted library allocation
|
page read and write
|
||
1A0F000
|
unkown
|
page readonly
|
||
379E000
|
stack
|
page read and write
|
||
1BBE000
|
heap
|
page read and write
|
||
1B12000
|
heap
|
page read and write
|
||
421E000
|
trusted library allocation
|
page read and write
|
||
4235000
|
trusted library allocation
|
page read and write
|
||
1BB6000
|
heap
|
page read and write
|
||
1B54000
|
heap
|
page read and write
|
||
4690000
|
heap
|
page read and write
|
||
4229000
|
trusted library allocation
|
page read and write
|
||
42DB000
|
trusted library allocation
|
page read and write
|
||
197000
|
stack
|
page read and write
|
||
1B9C000
|
heap
|
page read and write
|
||
38F0000
|
remote allocation
|
page read and write
|
||
423E000
|
trusted library allocation
|
page read and write
|
||
37A0000
|
heap
|
page read and write
|
||
42DB000
|
trusted library allocation
|
page read and write
|
||
425F000
|
trusted library allocation
|
page read and write
|
||
1B23000
|
heap
|
page read and write
|
||
4229000
|
trusted library allocation
|
page read and write
|
||
423B000
|
trusted library allocation
|
page read and write
|
||
4230000
|
trusted library allocation
|
page read and write
|
||
4228000
|
trusted library allocation
|
page read and write
|
||
421E000
|
trusted library allocation
|
page read and write
|
||
4212000
|
trusted library allocation
|
page read and write
|
||
1B3B000
|
heap
|
page read and write
|
||
4265000
|
trusted library allocation
|
page read and write
|
||
4229000
|
trusted library allocation
|
page read and write
|
||
425C000
|
trusted library allocation
|
page read and write
|
||
4235000
|
trusted library allocation
|
page read and write
|
||
1BBE000
|
heap
|
page read and write
|
||
4212000
|
trusted library allocation
|
page read and write
|
||
4270000
|
trusted library allocation
|
page read and write
|
||
1B23000
|
heap
|
page read and write
|
||
4213000
|
trusted library allocation
|
page read and write
|
||
4213000
|
trusted library allocation
|
page read and write
|
||
1AD5000
|
heap
|
page execute and read and write
|
||
4240000
|
trusted library allocation
|
page read and write
|
||
1B54000
|
heap
|
page read and write
|
||
1B4F000
|
heap
|
page read and write
|
||
4597000
|
trusted library allocation
|
page read and write
|
||
1B23000
|
heap
|
page read and write
|
||
4238000
|
trusted library allocation
|
page read and write
|
||
4262000
|
trusted library allocation
|
page read and write
|
||
428B000
|
trusted library allocation
|
page read and write
|
||
4224000
|
trusted library allocation
|
page read and write
|
||
4340000
|
trusted library allocation
|
page read and write
|
||
1B3E000
|
heap
|
page read and write
|
||
1B3B000
|
heap
|
page read and write
|
||
4249000
|
trusted library allocation
|
page read and write
|
||
1B2A000
|
heap
|
page read and write
|
||
4255000
|
trusted library allocation
|
page read and write
|
||
1B1E000
|
heap
|
page read and write
|
||
4256000
|
trusted library allocation
|
page read and write
|
||
4213000
|
trusted library allocation
|
page read and write
|
||
4235000
|
trusted library allocation
|
page read and write
|
||
425B000
|
trusted library allocation
|
page read and write
|
||
4206000
|
trusted library allocation
|
page read and write
|
||
419000
|
unkown
|
page write copy
|
||
3A0E000
|
stack
|
page read and write
|
||
423A000
|
trusted library allocation
|
page read and write
|
||
1B1F000
|
heap
|
page read and write
|
||
50BA000
|
trusted library allocation
|
page read and write
|
||
4260000
|
trusted library allocation
|
page read and write
|
||
4223000
|
trusted library allocation
|
page read and write
|
||
4234000
|
trusted library allocation
|
page read and write
|
||
420C000
|
trusted library allocation
|
page read and write
|
||
425C000
|
trusted library allocation
|
page read and write
|
||
1AA0000
|
heap
|
page read and write
|
||
43D8000
|
trusted library allocation
|
page read and write
|
||
4260000
|
trusted library allocation
|
page read and write
|
There are 345 hidden memdumps, click here to show them.