Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
6RVmzn1DzL.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
initial sample
|
||
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_6RVmzn1DzL.exe_7bfb277fee81bf1a20749b653394791c3aa9112c_462bbcf1_b313c709-504a-4fb8-84c2-c4704d4cf20e\Report.wer
|
Unicode text, UTF-16, little-endian text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WERA461.tmp.dmp
|
Mini DuMP crash report, 15 streams, Tue Jul 2 06:33:04 2024, 0x1205a4 type
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WERA6A5.tmp.WERInternalMetadata.xml
|
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WERA6D4.tmp.xml
|
XML 1.0 document, ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Windows\appcompat\Programs\Amcache.hve
|
MS Windows registry file, NT/2000 or above
|
dropped
|
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\6RVmzn1DzL.exe
|
"C:\Users\user\Desktop\6RVmzn1DzL.exe"
|
||
C:\Windows\SysWOW64\WerFault.exe
|
C:\Windows\SysWOW64\WerFault.exe -u -p 3276 -s 1728
|
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
https://contintnetksows.shop/
|
unknown
|
||
https://contintnetksows.shop/p1
|
unknown
|
||
https://contintnetksows.shop/apien0
|
unknown
|
||
https://contintnetksows.shop/apirofi
|
unknown
|
||
towerxxuytwi.xyz
|
|||
https://contintnetksows.shop/apin
|
unknown
|
||
https://contintnetksows.shop/apiz
|
unknown
|
||
contintnetksows.shop
|
|||
https://contintnetksows.shop/apiassw
|
unknown
|
||
https://contintnetksows.shop/pp
|
unknown
|
||
https://contintnetksows.shop/apih
|
unknown
|
||
https://contintnetksows.shop/a7
|
unknown
|
||
https://contintnetksows.shop/apieppgd
|
unknown
|
||
https://contintnetksows.shop/apiT
|
unknown
|
||
https://contintnetksows.shop/%%
|
unknown
|
||
penetratedpoopp.xyz
|
|||
ellaboratepwsz.xyz
|
|||
swellfrrgwwos.xyz
|
|||
https://contintnetksows.shop/api
|
172.67.141.234
|
||
https://contintnetksows.shop/e
|
unknown
|
||
foodypannyjsud.shop
|
|||
pedestriankodwu.xyz
|
|||
https://contintnetksows.shop/a
|
unknown
|
||
https://contintnetksows.shop/s8
|
unknown
|
||
potterryisiw.shop
|
|||
https://contintnetksows.shop/api$
|
unknown
|
||
https://contintnetksows.shop/s
|
unknown
|
||
https://contintnetksows.shop/api%
|
unknown
|
||
https://contintnetksows.shop/p
|
unknown
|
||
https://duckduckgo.com/chrome_newtab
|
unknown
|
||
https://duckduckgo.com/ac/?q=
|
unknown
|
||
https://www.yubsoft.com%dshell32.dllSHGetDesktopFolderSHCreateShellItem
|
unknown
|
||
https://imp.mt48.net/static?id=7RHzfOIXjFEYsBdvIpkX4Qqm4p8dfCfm4pbW1pbWfpbW7ReNxR3UIG8zInwYIFIVs9eYi
|
unknown
|
||
http://ocsps.ssl.com0?
|
unknown
|
||
http://www.ssl.com/repository/SSLcomRootCertificationAuthorityRSA.crt0
|
unknown
|
||
https://github.com/imgdrive/Folder2ISOhttps://github.com/imgdrive/Folder2ISO/issuesVIDEO_TSBDMVBDAVA
|
unknown
|
||
https://bridge.sfo1.admarketplace.net/ctp?version=16.0.0&key=1696425136400800000.2&ci=1696425136743.
|
unknown
|
||
http://cert.ssl.com/SSL.com-timeStamping-I-RSA-R1.cer0Q
|
unknown
|
||
http://ocsps.ssl.com0
|
unknown
|
||
https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
|
unknown
|
||
http://crls.ssl.com/SSLcom-RootCA-EV-RSA-4096-R2.crl0
|
unknown
|
||
http://cert.ssl.com/SSLcom-SubCA-EV-CodeSigning-RSA-4096-R3.cer0_
|
unknown
|
||
http://crls.ssl.com/SSLcom-SubCA-EV-CodeSigning-RSA-4096-R3.crl0
|
unknown
|
||
http://x1.c.lencr.org/0
|
unknown
|
||
http://x1.i.lencr.org/0
|
unknown
|
||
https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
|
unknown
|
||
https://www.ssl.com/repository0
|
unknown
|
||
https://github.com/imgdrive/Folder2ISO/issues
|
unknown
|
||
https://contintnetksows.shop:443/apiK
|
unknown
|
||
https://support.mozilla.org/products/firefoxgro.all
|
unknown
|
||
https://contintnetksows.shop:443/api_storageCJ
|
unknown
|
||
https://www.google.com/images/branding/product/ico/googleg_lodp.ico
|
unknown
|
||
https://www.yubsoft.com
|
unknown
|
||
https://contintnetksows.shop:443/api
|
unknown
|
||
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
|
unknown
|
||
http://crl.rootca1.amazontrust.com/rootca1.crl0
|
unknown
|
||
http://upx.sf.net
|
unknown
|
||
https://contintnetksows.shop:443/api)
|
unknown
|
||
http://ocsp.rootca1.amazontrust.com0:
|
unknown
|
||
https://www.ecosia.org/newtab/
|
unknown
|
||
https://bridge.sfo1.ap01.net/ctp?version=16.0.0&key=1696425136400800000.1&ci=1696425136743.12791&cta
|
unknown
|
||
https://support.mozilla.org/kb/customize-firefox-controls-buttons-and-toolbars?utm_source=firefox-br
|
unknown
|
||
https://ac.ecosia.org/autocomplete?q=
|
unknown
|
||
http://crls.ssl.com/ssl.com-rsa-RootCA.crl0
|
unknown
|
||
https://contile-images.services.mozilla.com/u1AuJcj32cbVUf9NjMipLXEYwu2uFIt4lsj-ccwVqEs.36904.jpg
|
unknown
|
||
http://crls.ssl.com/SSL.com-timeStamping-I-RSA-R1.crl0
|
unknown
|
||
https://contile-images.services.mozilla.com/obgoOYObjIFea_bXuT6L4LbBJ8j425AD87S1HMD3BWg.9991.jpg
|
unknown
|
||
http://crt.rootca1.amazontrust.com/rootca1.cer0?
|
unknown
|
||
https://www.bestbuy.com/site/electronics/top-deals/pcmcat1563299784494.c/?id=pcmcat1563299784494&ref
|
unknown
|
||
https://github.com/imgdrive/Folder2ISO
|
unknown
|
||
https://www.amazon.com/?tag=admarketus-20&ref=pd_sl_35787f1071928bc3a1aef90b79c9bee9c64ba6683fde7477
|
unknown
|
||
http://www.ssl.com/repository/SSLcom-RootCA-EV-RSA-4096-R2.crt0
|
unknown
|
||
https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
|
unknown
|
There are 63 hidden URLs, click here to show them.
Domains
Name
|
IP
|
Malicious
|
|
---|---|---|---|
contintnetksows.shop
|
172.67.141.234
|
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
172.67.141.234
|
contintnetksows.shop
|
United States
|
Registry
Path
|
Value
|
Malicious
|
|
---|---|---|---|
\REGISTRY\A\{b22224c5-3890-9253-1af5-0f57a1aff382}\Root\InventoryApplicationFile\6rvmzn1dzl.exe|b4ba8ba8e08e79d4
|
ProgramId
|
||
\REGISTRY\A\{b22224c5-3890-9253-1af5-0f57a1aff382}\Root\InventoryApplicationFile\6rvmzn1dzl.exe|b4ba8ba8e08e79d4
|
FileId
|
||
\REGISTRY\A\{b22224c5-3890-9253-1af5-0f57a1aff382}\Root\InventoryApplicationFile\6rvmzn1dzl.exe|b4ba8ba8e08e79d4
|
LowerCaseLongPath
|
||
\REGISTRY\A\{b22224c5-3890-9253-1af5-0f57a1aff382}\Root\InventoryApplicationFile\6rvmzn1dzl.exe|b4ba8ba8e08e79d4
|
LongPathHash
|
||
\REGISTRY\A\{b22224c5-3890-9253-1af5-0f57a1aff382}\Root\InventoryApplicationFile\6rvmzn1dzl.exe|b4ba8ba8e08e79d4
|
Name
|
||
\REGISTRY\A\{b22224c5-3890-9253-1af5-0f57a1aff382}\Root\InventoryApplicationFile\6rvmzn1dzl.exe|b4ba8ba8e08e79d4
|
OriginalFileName
|
||
\REGISTRY\A\{b22224c5-3890-9253-1af5-0f57a1aff382}\Root\InventoryApplicationFile\6rvmzn1dzl.exe|b4ba8ba8e08e79d4
|
Publisher
|
||
\REGISTRY\A\{b22224c5-3890-9253-1af5-0f57a1aff382}\Root\InventoryApplicationFile\6rvmzn1dzl.exe|b4ba8ba8e08e79d4
|
Version
|
||
\REGISTRY\A\{b22224c5-3890-9253-1af5-0f57a1aff382}\Root\InventoryApplicationFile\6rvmzn1dzl.exe|b4ba8ba8e08e79d4
|
BinFileVersion
|
||
\REGISTRY\A\{b22224c5-3890-9253-1af5-0f57a1aff382}\Root\InventoryApplicationFile\6rvmzn1dzl.exe|b4ba8ba8e08e79d4
|
BinaryType
|
||
\REGISTRY\A\{b22224c5-3890-9253-1af5-0f57a1aff382}\Root\InventoryApplicationFile\6rvmzn1dzl.exe|b4ba8ba8e08e79d4
|
ProductName
|
||
\REGISTRY\A\{b22224c5-3890-9253-1af5-0f57a1aff382}\Root\InventoryApplicationFile\6rvmzn1dzl.exe|b4ba8ba8e08e79d4
|
ProductVersion
|
||
\REGISTRY\A\{b22224c5-3890-9253-1af5-0f57a1aff382}\Root\InventoryApplicationFile\6rvmzn1dzl.exe|b4ba8ba8e08e79d4
|
LinkDate
|
||
\REGISTRY\A\{b22224c5-3890-9253-1af5-0f57a1aff382}\Root\InventoryApplicationFile\6rvmzn1dzl.exe|b4ba8ba8e08e79d4
|
BinProductVersion
|
||
\REGISTRY\A\{b22224c5-3890-9253-1af5-0f57a1aff382}\Root\InventoryApplicationFile\6rvmzn1dzl.exe|b4ba8ba8e08e79d4
|
AppxPackageFullName
|
||
\REGISTRY\A\{b22224c5-3890-9253-1af5-0f57a1aff382}\Root\InventoryApplicationFile\6rvmzn1dzl.exe|b4ba8ba8e08e79d4
|
AppxPackageRelativeId
|
||
\REGISTRY\A\{b22224c5-3890-9253-1af5-0f57a1aff382}\Root\InventoryApplicationFile\6rvmzn1dzl.exe|b4ba8ba8e08e79d4
|
Size
|
||
\REGISTRY\A\{b22224c5-3890-9253-1af5-0f57a1aff382}\Root\InventoryApplicationFile\6rvmzn1dzl.exe|b4ba8ba8e08e79d4
|
Language
|
||
\REGISTRY\A\{b22224c5-3890-9253-1af5-0f57a1aff382}\Root\InventoryApplicationFile\6rvmzn1dzl.exe|b4ba8ba8e08e79d4
|
Usn
|
There are 9 hidden registries, click here to show them.
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
2D90000
|
direct allocation
|
page execute and read and write
|
||
642000
|
unkown
|
page readonly
|
||
12EE000
|
heap
|
page read and write
|
||
12C6000
|
heap
|
page read and write
|
||
3B2E000
|
trusted library allocation
|
page read and write
|
||
12BF000
|
heap
|
page read and write
|
||
12BF000
|
heap
|
page read and write
|
||
2E00000
|
heap
|
page read and write
|
||
1293000
|
heap
|
page read and write
|
||
12DF000
|
heap
|
page read and write
|
||
1293000
|
heap
|
page read and write
|
||
12D1000
|
heap
|
page read and write
|
||
122A000
|
heap
|
page read and write
|
||
122A000
|
heap
|
page read and write
|
||
12EE000
|
heap
|
page read and write
|
||
12EE000
|
heap
|
page read and write
|
||
328D000
|
stack
|
page read and write
|
||
12EE000
|
heap
|
page read and write
|
||
1293000
|
heap
|
page read and write
|
||
12EE000
|
heap
|
page read and write
|
||
129B000
|
heap
|
page read and write
|
||
3B68000
|
trusted library allocation
|
page read and write
|
||
621000
|
unkown
|
page execute read
|
||
12EE000
|
heap
|
page read and write
|
||
12BD000
|
heap
|
page read and write
|
||
12C0000
|
heap
|
page read and write
|
||
13EE000
|
stack
|
page read and write
|
||
3B2B000
|
trusted library allocation
|
page read and write
|
||
12A9000
|
heap
|
page read and write
|
||
12AD000
|
heap
|
page read and write
|
||
12D0000
|
heap
|
page read and write
|
||
12EE000
|
heap
|
page read and write
|
||
12EE000
|
heap
|
page read and write
|
||
2DF1000
|
heap
|
page read and write
|
||
1292000
|
heap
|
page read and write
|
||
12EE000
|
heap
|
page read and write
|
||
3B17000
|
trusted library allocation
|
page read and write
|
||
12EE000
|
heap
|
page read and write
|
||
3B33000
|
trusted library allocation
|
page read and write
|
||
12C5000
|
heap
|
page read and write
|
||
12EE000
|
heap
|
page read and write
|
||
3AF0000
|
trusted library allocation
|
page read and write
|
||
129B000
|
heap
|
page read and write
|
||
3AF6000
|
trusted library allocation
|
page read and write
|
||
2DF0000
|
heap
|
page read and write
|
||
642000
|
unkown
|
page readonly
|
||
12ED000
|
heap
|
page read and write
|
||
3AFA000
|
trusted library allocation
|
page read and write
|
||
3B20000
|
trusted library allocation
|
page read and write
|
||
12C4000
|
heap
|
page read and write
|
||
3B43000
|
trusted library allocation
|
page read and write
|
||
3B4C000
|
trusted library allocation
|
page read and write
|
||
12EE000
|
heap
|
page read and write
|
||
12CD000
|
heap
|
page read and write
|
||
12CE000
|
heap
|
page read and write
|
||
3B1F000
|
trusted library allocation
|
page read and write
|
||
32C0000
|
heap
|
page read and write
|
||
12D0000
|
heap
|
page read and write
|
||
3AF6000
|
trusted library allocation
|
page read and write
|
||
12E8000
|
heap
|
page read and write
|
||
12C9000
|
heap
|
page read and write
|
||
3B26000
|
trusted library allocation
|
page read and write
|
||
12E7000
|
heap
|
page read and write
|
||
3AF6000
|
trusted library allocation
|
page read and write
|
||
12B9000
|
heap
|
page read and write
|
||
3AFD000
|
trusted library allocation
|
page read and write
|
||
2DF1000
|
heap
|
page read and write
|
||
12D0000
|
heap
|
page read and write
|
||
3CD5000
|
trusted library allocation
|
page read and write
|
||
12BF000
|
heap
|
page read and write
|
||
12EE000
|
heap
|
page read and write
|
||
1283000
|
heap
|
page read and write
|
||
12CF000
|
heap
|
page read and write
|
||
12EE000
|
heap
|
page read and write
|
||
123B000
|
heap
|
page read and write
|
||
12EE000
|
heap
|
page read and write
|
||
1292000
|
heap
|
page read and write
|
||
12EE000
|
heap
|
page read and write
|
||
1004000
|
heap
|
page read and write
|
||
3B35000
|
trusted library allocation
|
page read and write
|
||
12EE000
|
heap
|
page read and write
|
||
12C8000
|
heap
|
page read and write
|
||
12CF000
|
heap
|
page read and write
|
||
1293000
|
heap
|
page read and write
|
||
3B4A000
|
trusted library allocation
|
page read and write
|
||
12EE000
|
heap
|
page read and write
|
||
12EE000
|
heap
|
page read and write
|
||
15EF000
|
stack
|
page read and write
|
||
12EE000
|
heap
|
page read and write
|
||
3B44000
|
trusted library allocation
|
page read and write
|
||
12BD000
|
heap
|
page read and write
|
||
303F000
|
stack
|
page read and write
|
||
12C6000
|
heap
|
page read and write
|
||
1004000
|
heap
|
page read and write
|
||
12CD000
|
heap
|
page read and write
|
||
12B7000
|
heap
|
page read and write
|
||
12B9000
|
heap
|
page read and write
|
||
3D4F000
|
stack
|
page read and write
|
||
12EE000
|
heap
|
page read and write
|
||
12EE000
|
heap
|
page read and write
|
||
12A0000
|
heap
|
page read and write
|
||
3B24000
|
trusted library allocation
|
page read and write
|
||
3B68000
|
trusted library allocation
|
page read and write
|
||
3C4D000
|
trusted library allocation
|
page read and write
|
||
129B000
|
heap
|
page read and write
|
||
12A9000
|
heap
|
page read and write
|
||
3B03000
|
trusted library allocation
|
page read and write
|
||
3AFC000
|
trusted library allocation
|
page read and write
|
||
1293000
|
heap
|
page read and write
|
||
111E000
|
stack
|
page read and write
|
||
653000
|
unkown
|
page readonly
|
||
12EE000
|
heap
|
page read and write
|
||
12B9000
|
heap
|
page read and write
|
||
1004000
|
heap
|
page read and write
|
||
12A7000
|
heap
|
page read and write
|
||
12A6000
|
heap
|
page read and write
|
||
12EE000
|
heap
|
page read and write
|
||
3B2E000
|
trusted library allocation
|
page read and write
|
||
3B43000
|
trusted library allocation
|
page read and write
|
||
2DF1000
|
heap
|
page read and write
|
||
1224000
|
heap
|
page read and write
|
||
1293000
|
heap
|
page read and write
|
||
3C9E000
|
trusted library allocation
|
page read and write
|
||
12BD000
|
heap
|
page read and write
|
||
3B2B000
|
trusted library allocation
|
page read and write
|
||
12C6000
|
heap
|
page read and write
|
||
3B19000
|
trusted library allocation
|
page read and write
|
||
1224000
|
heap
|
page read and write
|
||
12D0000
|
heap
|
page read and write
|
||
3AF6000
|
trusted library allocation
|
page read and write
|
||
129B000
|
heap
|
page read and write
|
||
12C5000
|
heap
|
page read and write
|
||
3B20000
|
trusted library allocation
|
page read and write
|
||
12D3000
|
heap
|
page read and write
|
||
1293000
|
heap
|
page read and write
|
||
3B2E000
|
trusted library allocation
|
page read and write
|
||
3B20000
|
trusted library allocation
|
page read and write
|
||
12EE000
|
heap
|
page read and write
|
||
123E000
|
heap
|
page read and write
|
||
3B1C000
|
trusted library allocation
|
page read and write
|
||
129B000
|
heap
|
page read and write
|
||
129B000
|
heap
|
page read and write
|
||
3F93000
|
trusted library allocation
|
page read and write
|
||
1293000
|
heap
|
page read and write
|
||
12B9000
|
heap
|
page read and write
|
||
122A000
|
heap
|
page read and write
|
||
1293000
|
heap
|
page read and write
|
||
3AF6000
|
trusted library allocation
|
page read and write
|
||
12D0000
|
heap
|
page read and write
|
||
12BF000
|
heap
|
page read and write
|
||
129B000
|
heap
|
page read and write
|
||
3AF8000
|
trusted library allocation
|
page read and write
|
||
12D0000
|
heap
|
page read and write
|
||
12EE000
|
heap
|
page read and write
|
||
12EE000
|
heap
|
page read and write
|
||
12B8000
|
heap
|
page read and write
|
||
2DF1000
|
heap
|
page read and write
|
||
12B0000
|
heap
|
page read and write
|
||
129B000
|
heap
|
page read and write
|
||
12BF000
|
heap
|
page read and write
|
||
12E7000
|
heap
|
page read and write
|
||
12E7000
|
heap
|
page read and write
|
||
3B0E000
|
trusted library allocation
|
page read and write
|
||
3B1F000
|
trusted library allocation
|
page read and write
|
||
12EE000
|
heap
|
page read and write
|
||
3B45000
|
trusted library allocation
|
page read and write
|
||
12BC000
|
heap
|
page read and write
|
||
3B34000
|
trusted library allocation
|
page read and write
|
||
39DE000
|
stack
|
page read and write
|
||
12EE000
|
heap
|
page read and write
|
||
12C6000
|
heap
|
page read and write
|
||
12EE000
|
heap
|
page read and write
|
||
3B1B000
|
trusted library allocation
|
page read and write
|
||
12C0000
|
heap
|
page read and write
|
||
12C4000
|
heap
|
page read and write
|
||
1292000
|
heap
|
page read and write
|
||
11AE000
|
stack
|
page read and write
|
||
31D1000
|
unclassified section
|
page execute read
|
||
12B6000
|
heap
|
page read and write
|
||
2F3E000
|
stack
|
page read and write
|
||
3B46000
|
trusted library allocation
|
page read and write
|
||
12EE000
|
heap
|
page read and write
|
||
12D0000
|
heap
|
page read and write
|
||
12C4000
|
heap
|
page read and write
|
||
12BF000
|
heap
|
page read and write
|
||
3B14000
|
trusted library allocation
|
page read and write
|
||
12EE000
|
heap
|
page read and write
|
||
64E000
|
unkown
|
page read and write
|
||
12EE000
|
heap
|
page read and write
|
||
E8C000
|
stack
|
page read and write
|
||
340D000
|
stack
|
page read and write
|
||
12C4000
|
heap
|
page read and write
|
||
1293000
|
heap
|
page read and write
|
||
3218000
|
unclassified section
|
page read and write
|
||
3B02000
|
trusted library allocation
|
page read and write
|
||
3AFC000
|
trusted library allocation
|
page read and write
|
||
1160000
|
heap
|
page read and write
|
||
1293000
|
heap
|
page read and write
|
||
32D3000
|
trusted library allocation
|
page read and write
|
||
12C3000
|
heap
|
page read and write
|
||
12BF000
|
heap
|
page read and write
|
||
32A0000
|
remote allocation
|
page read and write
|
||
12B0000
|
heap
|
page read and write
|
||
1004000
|
heap
|
page read and write
|
||
12BF000
|
heap
|
page read and write
|
||
12EE000
|
heap
|
page read and write
|
||
3B1E000
|
trusted library allocation
|
page read and write
|
||
12B6000
|
heap
|
page read and write
|
||
3B03000
|
trusted library allocation
|
page read and write
|
||
3B0E000
|
trusted library allocation
|
page read and write
|
||
12C9000
|
heap
|
page read and write
|
||
12EE000
|
heap
|
page read and write
|
||
11F8000
|
heap
|
page read and write
|
||
12CF000
|
heap
|
page read and write
|
||
12BD000
|
heap
|
page read and write
|
||
3B76000
|
trusted library allocation
|
page read and write
|
||
12AC000
|
heap
|
page read and write
|
||
3AF6000
|
trusted library allocation
|
page read and write
|
||
129B000
|
heap
|
page read and write
|
||
3AFD000
|
trusted library allocation
|
page read and write
|
||
12EE000
|
heap
|
page read and write
|
||
12A9000
|
heap
|
page read and write
|
||
F8C000
|
stack
|
page read and write
|
||
3B2D000
|
trusted library allocation
|
page read and write
|
||
12C6000
|
heap
|
page read and write
|
||
12CF000
|
heap
|
page read and write
|
||
3C9D000
|
trusted library allocation
|
page read and write
|
||
121F000
|
heap
|
page read and write
|
||
3B26000
|
trusted library allocation
|
page read and write
|
||
3B14000
|
trusted library allocation
|
page read and write
|
||
1000000
|
heap
|
page read and write
|
||
12BA000
|
heap
|
page read and write
|
||
129B000
|
heap
|
page read and write
|
||
3BF3000
|
trusted library allocation
|
page read and write
|
||
12CF000
|
heap
|
page read and write
|
||
12EE000
|
heap
|
page read and write
|
||
12EE000
|
heap
|
page read and write
|
||
3B04000
|
trusted library allocation
|
page read and write
|
||
3AFC000
|
trusted library allocation
|
page read and write
|
||
3BF6000
|
trusted library allocation
|
page read and write
|
||
3BFC000
|
trusted library allocation
|
page read and write
|
||
1293000
|
heap
|
page read and write
|
||
129B000
|
heap
|
page read and write
|
||
3B1E000
|
trusted library allocation
|
page read and write
|
||
129B000
|
heap
|
page read and write
|
||
12EE000
|
heap
|
page read and write
|
||
12C0000
|
heap
|
page read and write
|
||
1292000
|
heap
|
page read and write
|
||
12B6000
|
heap
|
page read and write
|
||
3B1E000
|
trusted library allocation
|
page read and write
|
||
3B4E000
|
trusted library allocation
|
page read and write
|
||
3B92000
|
trusted library allocation
|
page read and write
|
||
12B7000
|
heap
|
page read and write
|
||
12D0000
|
heap
|
page read and write
|
||
1295000
|
heap
|
page read and write
|
||
12EE000
|
heap
|
page read and write
|
||
1293000
|
heap
|
page read and write
|
||
3B43000
|
trusted library allocation
|
page read and write
|
||
3C4E000
|
stack
|
page read and write
|
||
2DF1000
|
heap
|
page read and write
|
||
3AF6000
|
trusted library allocation
|
page read and write
|
||
1004000
|
heap
|
page read and write
|
||
3B24000
|
trusted library allocation
|
page read and write
|
||
12BF000
|
heap
|
page read and write
|
||
129B000
|
heap
|
page read and write
|
||
3AFA000
|
trusted library allocation
|
page read and write
|
||
129B000
|
heap
|
page read and write
|
||
3B43000
|
trusted library allocation
|
page read and write
|
||
3B25000
|
trusted library allocation
|
page read and write
|
||
12EE000
|
heap
|
page read and write
|
||
389E000
|
stack
|
page read and write
|
||
3AFD000
|
trusted library allocation
|
page read and write
|
||
12D0000
|
heap
|
page read and write
|
||
3B20000
|
trusted library allocation
|
page read and write
|
||
FF0000
|
heap
|
page read and write
|
||
12CF000
|
heap
|
page read and write
|
||
1293000
|
heap
|
page read and write
|
||
3D3F000
|
trusted library allocation
|
page read and write
|
||
3B4B000
|
trusted library allocation
|
page read and write
|
||
1293000
|
heap
|
page read and write
|
||
121D000
|
heap
|
page read and write
|
||
2F00000
|
trusted library allocation
|
page read and write
|
||
3D65000
|
trusted library allocation
|
page read and write
|
||
3B1C000
|
trusted library allocation
|
page read and write
|
||
12E7000
|
heap
|
page read and write
|
||
3B19000
|
trusted library allocation
|
page read and write
|
||
12DF000
|
heap
|
page read and write
|
||
12EE000
|
heap
|
page read and write
|
||
653000
|
unkown
|
page readonly
|
||
3B2A000
|
trusted library allocation
|
page read and write
|
||
12B0000
|
heap
|
page read and write
|
||
3B2E000
|
trusted library allocation
|
page read and write
|
||
1004000
|
heap
|
page read and write
|
||
12B0000
|
heap
|
page read and write
|
||
129C000
|
heap
|
page read and write
|
||
12A1000
|
heap
|
page read and write
|
||
3AFC000
|
trusted library allocation
|
page read and write
|
||
3AFD000
|
trusted library allocation
|
page read and write
|
||
3B4E000
|
trusted library allocation
|
page read and write
|
||
12EE000
|
heap
|
page read and write
|
||
32A0000
|
remote allocation
|
page read and write
|
||
1292000
|
heap
|
page read and write
|
||
12BF000
|
heap
|
page read and write
|
||
12BD000
|
heap
|
page read and write
|
||
1224000
|
heap
|
page read and write
|
||
3B68000
|
trusted library allocation
|
page read and write
|
||
3B7D000
|
trusted library allocation
|
page read and write
|
||
399E000
|
stack
|
page read and write
|
||
3B1E000
|
trusted library allocation
|
page read and write
|
||
125A000
|
heap
|
page read and write
|
||
12EE000
|
heap
|
page read and write
|
||
12EE000
|
heap
|
page read and write
|
||
14EE000
|
stack
|
page read and write
|
||
3B1C000
|
trusted library allocation
|
page read and write
|
||
12EE000
|
heap
|
page read and write
|
||
12CF000
|
heap
|
page read and write
|
||
12C6000
|
heap
|
page read and write
|
||
3B08000
|
trusted library allocation
|
page read and write
|
||
129B000
|
heap
|
page read and write
|
||
12EE000
|
heap
|
page read and write
|
||
12CF000
|
heap
|
page read and write
|
||
3B71000
|
trusted library allocation
|
page read and write
|
||
12EE000
|
heap
|
page read and write
|
||
12EE000
|
heap
|
page read and write
|
||
3DF8000
|
trusted library allocation
|
page read and write
|
||
3B08000
|
trusted library allocation
|
page read and write
|
||
12A8000
|
heap
|
page read and write
|
||
12EE000
|
heap
|
page read and write
|
||
12EE000
|
heap
|
page read and write
|
||
3B4C000
|
trusted library allocation
|
page read and write
|
||
3230000
|
heap
|
page read and write
|
||
123B000
|
heap
|
page read and write
|
||
3223000
|
unclassified section
|
page readonly
|
||
1293000
|
heap
|
page read and write
|
||
12BF000
|
heap
|
page read and write
|
||
3B43000
|
trusted library allocation
|
page read and write
|
||
3B7B000
|
trusted library allocation
|
page read and write
|
||
3B0F000
|
trusted library allocation
|
page read and write
|
||
33CD000
|
stack
|
page read and write
|
||
3AFA000
|
trusted library allocation
|
page read and write
|
||
3ADE000
|
stack
|
page read and write
|
||
620000
|
unkown
|
page readonly
|
||
3B90000
|
trusted library allocation
|
page read and write
|
||
3B1E000
|
trusted library allocation
|
page read and write
|
||
1292000
|
heap
|
page read and write
|
||
1004000
|
heap
|
page read and write
|
||
121D000
|
heap
|
page read and write
|
||
3C15000
|
trusted library allocation
|
page read and write
|
||
12CD000
|
heap
|
page read and write
|
||
1295000
|
heap
|
page read and write
|
||
12EE000
|
heap
|
page read and write
|
||
3B4E000
|
trusted library allocation
|
page read and write
|
||
12EE000
|
heap
|
page read and write
|
||
12C0000
|
heap
|
page read and write
|
||
3DE0000
|
heap
|
page read and write
|
||
3B2E000
|
trusted library allocation
|
page read and write
|
||
12EE000
|
heap
|
page read and write
|
||
3B35000
|
trusted library allocation
|
page read and write
|
||
12D0000
|
heap
|
page read and write
|
||
12EE000
|
heap
|
page read and write
|
||
12EE000
|
heap
|
page read and write
|
||
129B000
|
heap
|
page read and write
|
||
3B3D000
|
trusted library allocation
|
page read and write
|
||
12EE000
|
heap
|
page read and write
|
||
3B34000
|
trusted library allocation
|
page read and write
|
||
129B000
|
heap
|
page read and write
|
||
12CE000
|
heap
|
page read and write
|
||
3B7B000
|
trusted library allocation
|
page read and write
|
||
129B000
|
heap
|
page read and write
|
||
12CF000
|
heap
|
page read and write
|
||
3B2E000
|
trusted library allocation
|
page read and write
|
||
12C5000
|
heap
|
page read and write
|
||
12EE000
|
heap
|
page read and write
|
||
3B3C000
|
trusted library allocation
|
page read and write
|
||
1259000
|
heap
|
page read and write
|
||
12C5000
|
heap
|
page read and write
|
||
32A0000
|
remote allocation
|
page read and write
|
||
12EE000
|
heap
|
page read and write
|
||
3B18000
|
trusted library allocation
|
page read and write
|
||
3B35000
|
trusted library allocation
|
page read and write
|
||
3B2E000
|
trusted library allocation
|
page read and write
|
||
307B000
|
stack
|
page read and write
|
||
12C6000
|
heap
|
page read and write
|
||
12EE000
|
heap
|
page read and write
|
||
3B4E000
|
trusted library allocation
|
page read and write
|
||
350C000
|
stack
|
page read and write
|
||
12EE000
|
heap
|
page read and write
|
||
123E000
|
heap
|
page read and write
|
||
3B5D000
|
trusted library allocation
|
page read and write
|
||
3CCD000
|
trusted library allocation
|
page read and write
|
||
3B19000
|
trusted library allocation
|
page read and write
|
||
1004000
|
heap
|
page read and write
|
||
12CD000
|
heap
|
page read and write
|
||
2EF0000
|
heap
|
page read and write
|
||
129B000
|
heap
|
page read and write
|
||
3B2C000
|
trusted library allocation
|
page read and write
|
||
3AFD000
|
trusted library allocation
|
page read and write
|
||
12B9000
|
heap
|
page read and write
|
||
12EE000
|
heap
|
page read and write
|
||
3B2C000
|
trusted library allocation
|
page read and write
|
||
129B000
|
heap
|
page read and write
|
||
1004000
|
heap
|
page read and write
|
||
3B2E000
|
trusted library allocation
|
page read and write
|
||
3B44000
|
trusted library allocation
|
page read and write
|
||
3180000
|
direct allocation
|
page read and write
|
||
120E000
|
heap
|
page read and write
|
||
12EE000
|
heap
|
page read and write
|
||
11F0000
|
heap
|
page read and write
|
||
12B7000
|
heap
|
page read and write
|
||
12EE000
|
heap
|
page read and write
|
||
3B53000
|
trusted library allocation
|
page read and write
|
||
115E000
|
stack
|
page read and write
|
||
3B2D000
|
trusted library allocation
|
page read and write
|
||
3210000
|
unclassified section
|
page write copy
|
||
12D0000
|
heap
|
page read and write
|
||
12EE000
|
heap
|
page read and write
|
||
3B43000
|
trusted library allocation
|
page read and write
|
||
12C4000
|
heap
|
page read and write
|
||
12AC000
|
heap
|
page read and write
|
||
3B0E000
|
trusted library allocation
|
page read and write
|
||
3B68000
|
trusted library allocation
|
page read and write
|
||
12EE000
|
heap
|
page read and write
|
||
1004000
|
heap
|
page read and write
|
||
3B32000
|
trusted library allocation
|
page read and write
|
||
12EE000
|
heap
|
page read and write
|
||
3B4A000
|
trusted library allocation
|
page read and write
|
||
12CF000
|
heap
|
page read and write
|
||
12EE000
|
heap
|
page read and write
|
||
3B04000
|
trusted library allocation
|
page read and write
|
||
1293000
|
heap
|
page read and write
|
||
3B20000
|
trusted library allocation
|
page read and write
|
||
12ED000
|
heap
|
page read and write
|
||
129B000
|
heap
|
page read and write
|
||
621000
|
unkown
|
page execute read
|
||
12EE000
|
heap
|
page read and write
|
||
12EE000
|
heap
|
page read and write
|
||
3B04000
|
trusted library allocation
|
page read and write
|
||
129B000
|
heap
|
page read and write
|
||
12B7000
|
heap
|
page read and write
|
||
12CF000
|
heap
|
page read and write
|
||
12EE000
|
heap
|
page read and write
|
||
3AFD000
|
trusted library allocation
|
page read and write
|
||
3B2E000
|
trusted library allocation
|
page read and write
|
||
3B14000
|
trusted library allocation
|
page read and write
|
||
42FD000
|
trusted library allocation
|
page read and write
|
||
12C3000
|
heap
|
page read and write
|
||
123B000
|
heap
|
page read and write
|
||
3AFF000
|
trusted library allocation
|
page read and write
|
||
3B2B000
|
trusted library allocation
|
page read and write
|
||
3B7B000
|
trusted library allocation
|
page read and write
|
||
3B6E000
|
trusted library allocation
|
page read and write
|
||
3B2B000
|
trusted library allocation
|
page read and write
|
||
2DF1000
|
heap
|
page read and write
|
||
12ED000
|
heap
|
page read and write
|
||
3B2E000
|
trusted library allocation
|
page read and write
|
||
2DF1000
|
heap
|
page read and write
|
||
3B56000
|
trusted library allocation
|
page read and write
|
||
12B6000
|
heap
|
page read and write
|
||
3B2E000
|
trusted library allocation
|
page read and write
|
||
12EE000
|
heap
|
page read and write
|
||
12EE000
|
heap
|
page read and write
|
||
12A7000
|
heap
|
page read and write
|
||
12EE000
|
heap
|
page read and write
|
||
3B02000
|
trusted library allocation
|
page read and write
|
||
3AFD000
|
trusted library allocation
|
page read and write
|
||
12EE000
|
heap
|
page read and write
|
||
12BF000
|
heap
|
page read and write
|
||
3B43000
|
trusted library allocation
|
page read and write
|
||
1004000
|
heap
|
page read and write
|
||
1218000
|
heap
|
page read and write
|
||
320D000
|
unclassified section
|
page readonly
|
||
129C000
|
heap
|
page read and write
|
||
129B000
|
heap
|
page read and write
|
||
12D0000
|
heap
|
page read and write
|
||
2DF1000
|
heap
|
page read and write
|
||
12EE000
|
heap
|
page read and write
|
||
12EE000
|
heap
|
page read and write
|
||
12EE000
|
heap
|
page read and write
|
||
129B000
|
heap
|
page read and write
|
||
3B23000
|
trusted library allocation
|
page read and write
|
||
1288000
|
heap
|
page read and write
|
||
3B26000
|
trusted library allocation
|
page read and write
|
||
3E89000
|
trusted library allocation
|
page read and write
|
||
317A000
|
stack
|
page read and write
|
||
3CC5000
|
trusted library allocation
|
page read and write
|
||
12C0000
|
heap
|
page read and write
|
||
129B000
|
heap
|
page read and write
|
||
3B03000
|
trusted library allocation
|
page read and write
|
||
3B75000
|
trusted library allocation
|
page read and write
|
||
1004000
|
heap
|
page read and write
|
||
3B43000
|
trusted library allocation
|
page read and write
|
||
3B1F000
|
trusted library allocation
|
page read and write
|
||
3B1E000
|
trusted library allocation
|
page read and write
|
||
3B12000
|
trusted library allocation
|
page read and write
|
||
12A7000
|
heap
|
page read and write
|
||
3AF6000
|
trusted library allocation
|
page read and write
|
||
12BF000
|
heap
|
page read and write
|
||
3B14000
|
trusted library allocation
|
page read and write
|
||
123E000
|
heap
|
page read and write
|
||
4804000
|
trusted library allocation
|
page read and write
|
||
620000
|
unkown
|
page readonly
|
||
12CD000
|
heap
|
page read and write
|
||
64E000
|
unkown
|
page write copy
|
||
12EE000
|
heap
|
page read and write
|
||
3B15000
|
trusted library allocation
|
page read and write
|
||
12BD000
|
heap
|
page read and write
|
||
3C2D000
|
trusted library allocation
|
page read and write
|
||
129B000
|
heap
|
page read and write
|
||
3B73000
|
trusted library allocation
|
page read and write
|
||
1004000
|
heap
|
page read and write
|
||
12A6000
|
heap
|
page read and write
|
||
129B000
|
heap
|
page read and write
|
||
1293000
|
heap
|
page read and write
|
There are 503 hidden memdumps, click here to show them.