Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
file.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
initial sample
|
||
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_file.exe_e1b8ee67c28e1740921d4bcadce1f30172278_35621c73_1a34e8b5-95ff-4b09-8773-76e45477dcb2\Report.wer
|
Unicode text, UTF-16, little-endian text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WER10D5.tmp.WERInternalMetadata.xml
|
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WER1105.tmp.xml
|
XML 1.0 document, ASCII text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WEREC0.tmp.dmp
|
Mini DuMP crash report, 15 streams, Tue Jul 2 17:02:12 2024, 0x1205a4 type
|
dropped
|
||
C:\Windows\appcompat\Programs\Amcache.hve
|
MS Windows registry file, NT/2000 or above
|
dropped
|
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\file.exe
|
"C:\Users\user\Desktop\file.exe"
|
||
C:\Windows\SysWOW64\WerFault.exe
|
C:\Windows\SysWOW64\WerFault.exe -u -p 3696 -s 1568
|
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
radiationnopp.shop
|
|||
publicitttyps.shop
|
|||
answerrsdo.shop
|
|||
benchillppwo.shop
|
|||
bargainnykwo.shop
|
|||
bouncedgowp.shop
|
|||
bannngwko.shop
|
|||
stationacutwo.shop
|
|||
affecthorsedpo.shop
|
|||
https://duckduckgo.com/chrome_newtab
|
unknown
|
||
https://duckduckgo.com/ac/?q=
|
unknown
|
||
https://contile-images.services.mozilla.com/0TegrVVRalreHILhR2WvtD_CFzj13HCDcLqqpvXSOuY.10862.jpg
|
unknown
|
||
https://www.google.com/images/branding/product/ico/googleg_lodp.ico
|
unknown
|
||
https://stationacutwo.shopnF2
|
unknown
|
||
https://bridge.lga1.admarketplace.net/ctp?version=16.0.0&key=1696332238301000001.2&ci=1696332238417.
|
unknown
|
||
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
|
unknown
|
||
http://crl.rootca1.amazontrust.com/rootca1.crl0
|
unknown
|
||
https://bridge.lga1.ap01.net/ctp?version=16.0.0&key=1696332238301000001.1&ci=1696332238417.12791&cta
|
unknown
|
||
http://upx.sf.net
|
unknown
|
||
https://stationacutwo.shopcF2
|
unknown
|
||
https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
|
unknown
|
||
http://ocsp.rootca1.amazontrust.com0:
|
unknown
|
||
https://support.office.com/article/7D48285B-20E8-4B9B-91AD-216E34163BAD?wt.mc_id=EnterPK2016
|
unknown
|
||
https://support.office.com/article/94ba2e0b-638e-4a92-8857-2cb5ac1d8e17
|
unknown
|
||
https://www.ecosia.org/newtab/
|
unknown
|
||
https://stationacutwo.shop/_V
|
unknown
|
||
https://support.mozilla.org/kb/customize-firefox-controls-buttons-and-toolbars?utm_source=firefox-br
|
unknown
|
||
https://stationacutwo.shop:4
|
unknown
|
||
https://ac.ecosia.org/autocomplete?q=
|
unknown
|
||
https://stationacutwo.shop/apicu
|
unknown
|
||
https://stationacutwo.shop/oVrc:
|
unknown
|
||
https://contile-images.services.mozilla.com/obgoOYObjIFea_bXuT6L4LbBJ8j425AD87S1HMD3BWg.9991.jpg
|
unknown
|
||
https://imp.mt48.net/static?id=7RHzfOIXjFEYsBdvIpkX4QqmfZfYfQfafZbXfpbWfpbX7ReNxR3UIG8zInwYIFIVs9eYi
|
unknown
|
||
https://stationacutwo.shop/
|
unknown
|
||
http://x1.c.lencr.org/0
|
unknown
|
||
http://x1.i.lencr.org/0
|
unknown
|
||
https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
|
unknown
|
||
https://support.microsof
|
unknown
|
||
http://crt.rootca1.amazontrust.com/rootca1.cer0?
|
unknown
|
||
https://stationacutwo.shop/:
|
unknown
|
||
https://stationacutwo.shop/apili
|
unknown
|
||
https://stationacutwo.shop:443/api
|
unknown
|
||
https://stationacutwo.shop/api
|
188.114.97.3
|
||
https://support.mozilla.org/products/firefoxgro.all
|
unknown
|
||
https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
|
unknown
|
||
https://stationacutwo.shop/l
|
unknown
|
||
https://www.amazon.com/?tag=admarketus-20&ref=pd_sl_7548d4575af019e4c148ccf1a78112802e66a0816a72fc94
|
unknown
|
There are 37 hidden URLs, click here to show them.
Domains
Name
|
IP
|
Malicious
|
|
---|---|---|---|
stationacutwo.shop
|
188.114.97.3
|
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
188.114.97.3
|
stationacutwo.shop
|
European Union
|
Registry
Path
|
Value
|
Malicious
|
|
---|---|---|---|
\REGISTRY\A\{33c58208-2aa0-c140-8c5d-6e30688e10b8}\Root\InventoryApplicationFile\file.exe|ff8e65d6b06db8e5
|
ProgramId
|
||
\REGISTRY\A\{33c58208-2aa0-c140-8c5d-6e30688e10b8}\Root\InventoryApplicationFile\file.exe|ff8e65d6b06db8e5
|
FileId
|
||
\REGISTRY\A\{33c58208-2aa0-c140-8c5d-6e30688e10b8}\Root\InventoryApplicationFile\file.exe|ff8e65d6b06db8e5
|
LowerCaseLongPath
|
||
\REGISTRY\A\{33c58208-2aa0-c140-8c5d-6e30688e10b8}\Root\InventoryApplicationFile\file.exe|ff8e65d6b06db8e5
|
LongPathHash
|
||
\REGISTRY\A\{33c58208-2aa0-c140-8c5d-6e30688e10b8}\Root\InventoryApplicationFile\file.exe|ff8e65d6b06db8e5
|
Name
|
||
\REGISTRY\A\{33c58208-2aa0-c140-8c5d-6e30688e10b8}\Root\InventoryApplicationFile\file.exe|ff8e65d6b06db8e5
|
OriginalFileName
|
||
\REGISTRY\A\{33c58208-2aa0-c140-8c5d-6e30688e10b8}\Root\InventoryApplicationFile\file.exe|ff8e65d6b06db8e5
|
Publisher
|
||
\REGISTRY\A\{33c58208-2aa0-c140-8c5d-6e30688e10b8}\Root\InventoryApplicationFile\file.exe|ff8e65d6b06db8e5
|
Version
|
||
\REGISTRY\A\{33c58208-2aa0-c140-8c5d-6e30688e10b8}\Root\InventoryApplicationFile\file.exe|ff8e65d6b06db8e5
|
BinFileVersion
|
||
\REGISTRY\A\{33c58208-2aa0-c140-8c5d-6e30688e10b8}\Root\InventoryApplicationFile\file.exe|ff8e65d6b06db8e5
|
BinaryType
|
||
\REGISTRY\A\{33c58208-2aa0-c140-8c5d-6e30688e10b8}\Root\InventoryApplicationFile\file.exe|ff8e65d6b06db8e5
|
ProductName
|
||
\REGISTRY\A\{33c58208-2aa0-c140-8c5d-6e30688e10b8}\Root\InventoryApplicationFile\file.exe|ff8e65d6b06db8e5
|
ProductVersion
|
||
\REGISTRY\A\{33c58208-2aa0-c140-8c5d-6e30688e10b8}\Root\InventoryApplicationFile\file.exe|ff8e65d6b06db8e5
|
LinkDate
|
||
\REGISTRY\A\{33c58208-2aa0-c140-8c5d-6e30688e10b8}\Root\InventoryApplicationFile\file.exe|ff8e65d6b06db8e5
|
BinProductVersion
|
||
\REGISTRY\A\{33c58208-2aa0-c140-8c5d-6e30688e10b8}\Root\InventoryApplicationFile\file.exe|ff8e65d6b06db8e5
|
AppxPackageFullName
|
||
\REGISTRY\A\{33c58208-2aa0-c140-8c5d-6e30688e10b8}\Root\InventoryApplicationFile\file.exe|ff8e65d6b06db8e5
|
AppxPackageRelativeId
|
||
\REGISTRY\A\{33c58208-2aa0-c140-8c5d-6e30688e10b8}\Root\InventoryApplicationFile\file.exe|ff8e65d6b06db8e5
|
Size
|
||
\REGISTRY\A\{33c58208-2aa0-c140-8c5d-6e30688e10b8}\Root\InventoryApplicationFile\file.exe|ff8e65d6b06db8e5
|
Language
|
||
\REGISTRY\A\{33c58208-2aa0-c140-8c5d-6e30688e10b8}\Root\InventoryApplicationFile\file.exe|ff8e65d6b06db8e5
|
Usn
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\IdentityCRL\ClockData
|
ClockTimeSeconds
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\IdentityCRL\ClockData
|
TickCount
|
There are 11 hidden registries, click here to show them.
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
400000
|
unkown
|
page execute and read and write
|
||
2B29000
|
heap
|
page read and write
|
||
19A000
|
stack
|
page read and write
|
||
4F7E000
|
trusted library allocation
|
page read and write
|
||
400000
|
unkown
|
page readonly
|
||
52BE000
|
trusted library allocation
|
page read and write
|
||
2B29000
|
heap
|
page read and write
|
||
4CCE000
|
stack
|
page read and write
|
||
2B27000
|
heap
|
page read and write
|
||
4F7E000
|
trusted library allocation
|
page read and write
|
||
2A9E000
|
heap
|
page read and write
|
||
4F57000
|
trusted library allocation
|
page read and write
|
||
2AC7000
|
heap
|
page read and write
|
||
4F38000
|
trusted library allocation
|
page read and write
|
||
4F54000
|
trusted library allocation
|
page read and write
|
||
2AB9000
|
heap
|
page read and write
|
||
2AC2000
|
heap
|
page read and write
|
||
2AB9000
|
heap
|
page read and write
|
||
2AA2000
|
heap
|
page read and write
|
||
45CE000
|
stack
|
page read and write
|
||
4F5E000
|
trusted library allocation
|
page read and write
|
||
4FAB000
|
trusted library allocation
|
page read and write
|
||
2A9E000
|
heap
|
page read and write
|
||
4F96000
|
trusted library allocation
|
page read and write
|
||
4F60000
|
trusted library allocation
|
page read and write
|
||
4FB2000
|
trusted library allocation
|
page read and write
|
||
4F30000
|
trusted library allocation
|
page read and write
|
||
2B27000
|
heap
|
page read and write
|
||
5441000
|
trusted library allocation
|
page read and write
|
||
4F7E000
|
trusted library allocation
|
page read and write
|
||
4F59000
|
trusted library allocation
|
page read and write
|
||
2A61000
|
heap
|
page execute and read and write
|
||
2AAE000
|
heap
|
page read and write
|
||
2B27000
|
heap
|
page read and write
|
||
2AB9000
|
heap
|
page read and write
|
||
4F38000
|
trusted library allocation
|
page read and write
|
||
2AC7000
|
heap
|
page read and write
|
||
2AB9000
|
heap
|
page read and write
|
||
4F2D000
|
trusted library allocation
|
page read and write
|
||
4FDF000
|
trusted library allocation
|
page read and write
|
||
4F7C000
|
trusted library allocation
|
page read and write
|
||
2905000
|
heap
|
page read and write
|
||
4F58000
|
trusted library allocation
|
page read and write
|
||
2B21000
|
heap
|
page read and write
|
||
2B1E000
|
heap
|
page read and write
|
||
2AB9000
|
heap
|
page read and write
|
||
4F20000
|
trusted library allocation
|
page read and write
|
||
2AAE000
|
heap
|
page read and write
|
||
2B29000
|
heap
|
page read and write
|
||
2AC7000
|
heap
|
page read and write
|
||
4F78000
|
trusted library allocation
|
page read and write
|
||
2A97000
|
heap
|
page read and write
|
||
2B17000
|
heap
|
page read and write
|
||
2AC7000
|
heap
|
page read and write
|
||
4F54000
|
trusted library allocation
|
page read and write
|
||
2B27000
|
heap
|
page read and write
|
||
2A9E000
|
heap
|
page read and write
|
||
446D000
|
stack
|
page read and write
|
||
2AB9000
|
heap
|
page read and write
|
||
2AA2000
|
heap
|
page read and write
|
||
4FB6000
|
trusted library allocation
|
page read and write
|
||
2A9D000
|
heap
|
page read and write
|
||
4F38000
|
trusted library allocation
|
page read and write
|
||
5E5E000
|
trusted library allocation
|
page read and write
|
||
2A9E000
|
heap
|
page read and write
|
||
4FDF000
|
trusted library allocation
|
page read and write
|
||
4F65000
|
trusted library allocation
|
page read and write
|
||
2810000
|
heap
|
page read and write
|
||
4FE3000
|
trusted library allocation
|
page read and write
|
||
4F21000
|
trusted library allocation
|
page read and write
|
||
2AA2000
|
heap
|
page read and write
|
||
4F68000
|
trusted library allocation
|
page read and write
|
||
4F85000
|
trusted library allocation
|
page read and write
|
||
285E000
|
stack
|
page read and write
|
||
4F2D000
|
trusted library allocation
|
page read and write
|
||
2AB9000
|
heap
|
page read and write
|
||
2B21000
|
heap
|
page read and write
|
||
4F6C000
|
trusted library allocation
|
page read and write
|
||
4F57000
|
trusted library allocation
|
page read and write
|
||
4F85000
|
trusted library allocation
|
page read and write
|
||
2B27000
|
heap
|
page read and write
|
||
2A9E000
|
heap
|
page read and write
|
||
4F9E000
|
trusted library allocation
|
page read and write
|
||
4F3F000
|
trusted library allocation
|
page read and write
|
||
2B29000
|
heap
|
page read and write
|
||
4F38000
|
trusted library allocation
|
page read and write
|
||
2AB9000
|
heap
|
page read and write
|
||
4F60000
|
trusted library allocation
|
page read and write
|
||
4F92000
|
trusted library allocation
|
page read and write
|
||
2B29000
|
heap
|
page read and write
|
||
4F5A000
|
trusted library allocation
|
page read and write
|
||
2AA2000
|
heap
|
page read and write
|
||
4F57000
|
trusted library allocation
|
page read and write
|
||
2A92000
|
heap
|
page read and write
|
||
2AC7000
|
heap
|
page read and write
|
||
2B29000
|
heap
|
page read and write
|
||
2B22000
|
heap
|
page read and write
|
||
4FB6000
|
trusted library allocation
|
page read and write
|
||
2AB9000
|
heap
|
page read and write
|
||
2B1C000
|
heap
|
page read and write
|
||
4F3F000
|
trusted library allocation
|
page read and write
|
||
2AAB000
|
heap
|
page read and write
|
||
2A9E000
|
heap
|
page read and write
|
||
4F41000
|
trusted library allocation
|
page read and write
|
||
4F5E000
|
trusted library allocation
|
page read and write
|
||
4F2E000
|
trusted library allocation
|
page read and write
|
||
2ADA000
|
heap
|
page read and write
|
||
2B17000
|
heap
|
page read and write
|
||
2A9D000
|
heap
|
page read and write
|
||
4470000
|
heap
|
page read and write
|
||
2AA2000
|
heap
|
page read and write
|
||
4F38000
|
trusted library allocation
|
page read and write
|
||
436000
|
unkown
|
page readonly
|
||
4F30000
|
trusted library allocation
|
page read and write
|
||
2726000
|
unkown
|
page readonly
|
||
4F8C000
|
trusted library allocation
|
page read and write
|
||
2AC2000
|
heap
|
page read and write
|
||
4F21000
|
trusted library allocation
|
page read and write
|
||
2AA2000
|
heap
|
page read and write
|
||
2AAE000
|
heap
|
page read and write
|
||
4F85000
|
trusted library allocation
|
page read and write
|
||
4F2E000
|
trusted library allocation
|
page read and write
|
||
4F76000
|
trusted library allocation
|
page read and write
|
||
2B29000
|
heap
|
page read and write
|
||
2AC7000
|
heap
|
page read and write
|
||
2AC7000
|
heap
|
page read and write
|
||
1F0000
|
heap
|
page read and write
|
||
4F4F000
|
trusted library allocation
|
page read and write
|
||
2AAB000
|
heap
|
page read and write
|
||
2AC7000
|
heap
|
page read and write
|
||
2A9D000
|
heap
|
page read and write
|
||
4F8F000
|
trusted library allocation
|
page read and write
|
||
2A10000
|
remote allocation
|
page read and write
|
||
4F28000
|
trusted library allocation
|
page read and write
|
||
2AAE000
|
heap
|
page read and write
|
||
2A9D000
|
heap
|
page read and write
|
||
2B27000
|
heap
|
page read and write
|
||
4F26000
|
trusted library allocation
|
page read and write
|
||
2B1B000
|
heap
|
page read and write
|
||
2B29000
|
heap
|
page read and write
|
||
4F38000
|
trusted library allocation
|
page read and write
|
||
2AB9000
|
heap
|
page read and write
|
||
4F3E000
|
trusted library allocation
|
page read and write
|
||
2AC7000
|
heap
|
page read and write
|
||
2B27000
|
heap
|
page read and write
|
||
2B3E000
|
heap
|
page read and write
|
||
2B27000
|
heap
|
page read and write
|
||
2B27000
|
heap
|
page read and write
|
||
2AC7000
|
heap
|
page read and write
|
||
4FBE000
|
trusted library allocation
|
page read and write
|
||
2B3C000
|
heap
|
page read and write
|
||
2AC7000
|
heap
|
page read and write
|
||
4F78000
|
trusted library allocation
|
page read and write
|
||
2AA2000
|
heap
|
page read and write
|
||
4FCB000
|
trusted library allocation
|
page read and write
|
||
2A97000
|
heap
|
page read and write
|
||
50F5000
|
trusted library allocation
|
page read and write
|
||
2AAB000
|
heap
|
page read and write
|
||
4FE3000
|
trusted library allocation
|
page read and write
|
||
2B27000
|
heap
|
page read and write
|
||
2AC7000
|
heap
|
page read and write
|
||
5430000
|
heap
|
page read and write
|
||
2B3D000
|
heap
|
page read and write
|
||
2AC7000
|
heap
|
page read and write
|
||
2B29000
|
heap
|
page read and write
|
||
4F7F000
|
trusted library allocation
|
page read and write
|
||
4F3D000
|
trusted library allocation
|
page read and write
|
||
4F30000
|
trusted library allocation
|
page read and write
|
||
4F41000
|
trusted library allocation
|
page read and write
|
||
4FA5000
|
trusted library allocation
|
page read and write
|
||
2B27000
|
heap
|
page read and write
|
||
2AAE000
|
heap
|
page read and write
|
||
505D000
|
trusted library allocation
|
page read and write
|
||
2AC7000
|
heap
|
page read and write
|
||
452000
|
unkown
|
page execute and read and write
|
||
2AC7000
|
heap
|
page read and write
|
||
2B29000
|
heap
|
page read and write
|
||
2B27000
|
heap
|
page read and write
|
||
4F75000
|
trusted library allocation
|
page read and write
|
||
4F41000
|
trusted library allocation
|
page read and write
|
||
4F31000
|
trusted library allocation
|
page read and write
|
||
2AB9000
|
heap
|
page read and write
|
||
4F47000
|
trusted library allocation
|
page read and write
|
||
4F32000
|
trusted library allocation
|
page read and write
|
||
46CD000
|
stack
|
page read and write
|
||
2A8D000
|
heap
|
page read and write
|
||
4F57000
|
trusted library allocation
|
page read and write
|
||
2B27000
|
heap
|
page read and write
|
||
5045000
|
trusted library allocation
|
page read and write
|
||
2AC7000
|
heap
|
page read and write
|
||
4F30000
|
trusted library allocation
|
page read and write
|
||
2B27000
|
heap
|
page read and write
|
||
4F41000
|
trusted library allocation
|
page read and write
|
||
4F84000
|
trusted library allocation
|
page read and write
|
||
2AA2000
|
heap
|
page read and write
|
||
2AAE000
|
heap
|
page read and write
|
||
4F66000
|
trusted library allocation
|
page read and write
|
||
4FDF000
|
trusted library allocation
|
page read and write
|
||
4F69000
|
trusted library allocation
|
page read and write
|
||
4F22000
|
trusted library allocation
|
page read and write
|
||
4F30000
|
trusted library allocation
|
page read and write
|
||
4F67000
|
trusted library allocation
|
page read and write
|
||
2B17000
|
heap
|
page read and write
|
||
4F30000
|
trusted library allocation
|
page read and write
|
||
2B29000
|
heap
|
page read and write
|
||
4F30000
|
trusted library allocation
|
page read and write
|
||
480F000
|
stack
|
page read and write
|
||
5026000
|
trusted library allocation
|
page read and write
|
||
2A10000
|
remote allocation
|
page read and write
|
||
2B14000
|
heap
|
page read and write
|
||
2B27000
|
heap
|
page read and write
|
||
2A9D000
|
heap
|
page read and write
|
||
4F4B000
|
trusted library allocation
|
page read and write
|
||
2B27000
|
heap
|
page read and write
|
||
2B16000
|
heap
|
page read and write
|
||
28AE000
|
stack
|
page read and write
|
||
4F2B000
|
trusted library allocation
|
page read and write
|
||
2ABB000
|
heap
|
page read and write
|
||
2A9E000
|
heap
|
page read and write
|
||
4F76000
|
trusted library allocation
|
page read and write
|
||
2A98000
|
heap
|
page read and write
|
||
2A9D000
|
heap
|
page read and write
|
||
2B2A000
|
heap
|
page read and write
|
||
2AC7000
|
heap
|
page read and write
|
||
2B16000
|
heap
|
page read and write
|
||
2B18000
|
heap
|
page read and write
|
||
2AAE000
|
heap
|
page read and write
|
||
4FAA000
|
trusted library allocation
|
page read and write
|
||
2A9E000
|
heap
|
page read and write
|
||
4F38000
|
trusted library allocation
|
page read and write
|
||
2B1E000
|
heap
|
page read and write
|
||
2A10000
|
remote allocation
|
page read and write
|
||
4F44000
|
trusted library allocation
|
page read and write
|
||
4F68000
|
trusted library allocation
|
page read and write
|
||
2AC2000
|
heap
|
page read and write
|
||
2A91000
|
heap
|
page read and write
|
||
4F3D000
|
trusted library allocation
|
page read and write
|
||
4F7F000
|
trusted library allocation
|
page read and write
|
||
2AAB000
|
heap
|
page read and write
|
||
2B27000
|
heap
|
page read and write
|
||
2AA2000
|
heap
|
page read and write
|
||
2AA1000
|
heap
|
page read and write
|
||
2A8D000
|
heap
|
page read and write
|
||
4F5A000
|
trusted library allocation
|
page read and write
|
||
2AAE000
|
heap
|
page read and write
|
||
2B3B000
|
heap
|
page read and write
|
||
2AAE000
|
heap
|
page read and write
|
||
2B31000
|
heap
|
page read and write
|
||
2B22000
|
heap
|
page read and write
|
||
4F83000
|
trusted library allocation
|
page read and write
|
||
2AAE000
|
heap
|
page read and write
|
||
4F41000
|
trusted library allocation
|
page read and write
|
||
4F28000
|
trusted library allocation
|
page read and write
|
||
4F30000
|
trusted library allocation
|
page read and write
|
||
502C000
|
trusted library allocation
|
page read and write
|
||
2AB9000
|
heap
|
page read and write
|
||
2AC7000
|
heap
|
page read and write
|
||
2AA2000
|
heap
|
page read and write
|
||
2B23000
|
heap
|
page read and write
|
||
4F6C000
|
trusted library allocation
|
page read and write
|
||
517E000
|
stack
|
page read and write
|
||
4F2F000
|
trusted library allocation
|
page read and write
|
||
2AA2000
|
heap
|
page read and write
|
||
2B18000
|
heap
|
page read and write
|
||
4F28000
|
trusted library allocation
|
page read and write
|
||
4F3F000
|
trusted library allocation
|
page read and write
|
||
2AA2000
|
heap
|
page read and write
|
||
2AB9000
|
heap
|
page read and write
|
||
2AA2000
|
heap
|
page read and write
|
||
28C0000
|
heap
|
page read and write
|
||
2AA2000
|
heap
|
page read and write
|
||
4F45000
|
trusted library allocation
|
page read and write
|
||
507D000
|
trusted library allocation
|
page read and write
|
||
4F39000
|
trusted library allocation
|
page read and write
|
||
2B27000
|
heap
|
page read and write
|
||
2900000
|
heap
|
page read and write
|
||
4F38000
|
trusted library allocation
|
page read and write
|
||
2B16000
|
heap
|
page read and write
|
||
2AC7000
|
heap
|
page read and write
|
||
2B27000
|
heap
|
page read and write
|
||
2B27000
|
heap
|
page read and write
|
||
4F22000
|
trusted library allocation
|
page read and write
|
||
2AAE000
|
heap
|
page read and write
|
||
4F41000
|
trusted library allocation
|
page read and write
|
||
4F26000
|
trusted library allocation
|
page read and write
|
||
9B000
|
stack
|
page read and write
|
||
4F2E000
|
trusted library allocation
|
page read and write
|
||
4F3F000
|
trusted library allocation
|
page read and write
|
||
2AB9000
|
heap
|
page read and write
|
||
2AAE000
|
heap
|
page read and write
|
||
2AC2000
|
heap
|
page read and write
|
||
2AC7000
|
heap
|
page read and write
|
||
4F7D000
|
trusted library allocation
|
page read and write
|
||
2A97000
|
heap
|
page read and write
|
||
2AC7000
|
heap
|
page read and write
|
||
4F22000
|
trusted library allocation
|
page read and write
|
||
4FE3000
|
trusted library allocation
|
page read and write
|
||
4F30000
|
trusted library allocation
|
page read and write
|
||
2AB9000
|
heap
|
page read and write
|
||
2B29000
|
heap
|
page read and write
|
||
2B27000
|
heap
|
page read and write
|
||
4F30000
|
trusted library allocation
|
page read and write
|
||
4F69000
|
trusted library allocation
|
page read and write
|
||
4F41000
|
trusted library allocation
|
page read and write
|
||
2AAE000
|
heap
|
page read and write
|
||
2B3D000
|
heap
|
page read and write
|
||
4F32000
|
trusted library allocation
|
page read and write
|
||
2A9D000
|
heap
|
page read and write
|
||
4F30000
|
trusted library allocation
|
page read and write
|
||
2AC7000
|
heap
|
page read and write
|
||
2AB9000
|
heap
|
page read and write
|
||
2AB9000
|
heap
|
page read and write
|
||
594E000
|
trusted library allocation
|
page read and write
|
||
2AA2000
|
heap
|
page read and write
|
||
2726000
|
unkown
|
page readonly
|
||
2B25000
|
heap
|
page read and write
|
||
4F38000
|
trusted library allocation
|
page read and write
|
||
4580000
|
heap
|
page read and write
|
||
4F30000
|
trusted library allocation
|
page read and write
|
||
2AA2000
|
heap
|
page read and write
|
||
4FF8000
|
trusted library allocation
|
page read and write
|
||
2A9E000
|
heap
|
page read and write
|
||
4F2E000
|
trusted library allocation
|
page read and write
|
||
4F41000
|
trusted library allocation
|
page read and write
|
||
2AB9000
|
heap
|
page read and write
|
||
494F000
|
stack
|
page read and write
|
||
4F41000
|
trusted library allocation
|
page read and write
|
||
2A9E000
|
heap
|
page read and write
|
||
2B27000
|
heap
|
page read and write
|
||
4F0E000
|
stack
|
page read and write
|
||
2B29000
|
heap
|
page read and write
|
||
439000
|
unkown
|
page write copy
|
||
2AB9000
|
heap
|
page read and write
|
||
4F63000
|
trusted library allocation
|
page read and write
|
||
2B29000
|
heap
|
page read and write
|
||
2B31000
|
heap
|
page read and write
|
||
2B1B000
|
heap
|
page read and write
|
||
4F58000
|
trusted library allocation
|
page read and write
|
||
4F32000
|
trusted library allocation
|
page read and write
|
||
2B14000
|
heap
|
page read and write
|
||
2B27000
|
heap
|
page read and write
|
||
4F5A000
|
trusted library allocation
|
page read and write
|
||
2B29000
|
heap
|
page read and write
|
||
4F30000
|
trusted library allocation
|
page read and write
|
||
2AAE000
|
heap
|
page read and write
|
||
2AAE000
|
heap
|
page read and write
|
||
2B2A000
|
heap
|
page read and write
|
||
4F70000
|
trusted library allocation
|
page read and write
|
||
527F000
|
stack
|
page read and write
|
||
2AB9000
|
heap
|
page read and write
|
||
52BC000
|
trusted library allocation
|
page read and write
|
||
2AC7000
|
heap
|
page read and write
|
||
4F39000
|
trusted library allocation
|
page read and write
|
||
2B23000
|
heap
|
page read and write
|
||
2AA2000
|
heap
|
page read and write
|
||
2B29000
|
heap
|
page read and write
|
||
2AB9000
|
heap
|
page read and write
|
||
2B31000
|
heap
|
page read and write
|
||
2A9E000
|
heap
|
page read and write
|
||
2A48000
|
heap
|
page read and write
|
||
2A9E000
|
heap
|
page read and write
|
||
2AC7000
|
heap
|
page read and write
|
||
4F7E000
|
trusted library allocation
|
page read and write
|
||
4F68000
|
trusted library allocation
|
page read and write
|
||
2A9E000
|
heap
|
page read and write
|
||
2B27000
|
heap
|
page read and write
|
||
2B27000
|
heap
|
page read and write
|
||
2AB9000
|
heap
|
page read and write
|
||
2B29000
|
heap
|
page read and write
|
||
4F78000
|
trusted library allocation
|
page read and write
|
||
4FB6000
|
trusted library allocation
|
page read and write
|
||
2B3D000
|
heap
|
page read and write
|
||
4FE3000
|
trusted library allocation
|
page read and write
|
||
4F21000
|
trusted library allocation
|
page read and write
|
||
2A9E000
|
heap
|
page read and write
|
||
2AAE000
|
heap
|
page read and write
|
||
2B33000
|
heap
|
page read and write
|
||
2907000
|
heap
|
page read and write
|
||
2B29000
|
heap
|
page read and write
|
||
4F30000
|
trusted library allocation
|
page read and write
|
||
4F53000
|
trusted library allocation
|
page read and write
|
||
5020000
|
heap
|
page read and write
|
||
2AAE000
|
heap
|
page read and write
|
||
2AB9000
|
heap
|
page read and write
|
||
4F66000
|
trusted library allocation
|
page read and write
|
||
5021000
|
heap
|
page read and write
|
||
2B3C000
|
heap
|
page read and write
|
||
2A9E000
|
heap
|
page read and write
|
||
4F27000
|
trusted library allocation
|
page read and write
|
||
4F2E000
|
trusted library allocation
|
page read and write
|
||
2B22000
|
heap
|
page read and write
|
||
457D000
|
stack
|
page read and write
|
||
4F68000
|
trusted library allocation
|
page read and write
|
||
4F41000
|
trusted library allocation
|
page read and write
|
||
2AB9000
|
heap
|
page read and write
|
||
28D0000
|
heap
|
page read and write
|
||
2AA2000
|
heap
|
page read and write
|
||
2AAE000
|
heap
|
page read and write
|
||
4F81000
|
trusted library allocation
|
page read and write
|
||
2AA2000
|
heap
|
page read and write
|
||
4F2A000
|
trusted library allocation
|
page read and write
|
||
4F3A000
|
trusted library allocation
|
page read and write
|
||
2AC7000
|
heap
|
page read and write
|
||
2B29000
|
heap
|
page read and write
|
||
4F41000
|
trusted library allocation
|
page read and write
|
||
2B16000
|
heap
|
page read and write
|
||
2AA2000
|
heap
|
page read and write
|
||
4F91000
|
trusted library allocation
|
page read and write
|
||
470E000
|
stack
|
page read and write
|
||
4F41000
|
trusted library allocation
|
page read and write
|
||
2B1F000
|
heap
|
page read and write
|
||
2AB9000
|
heap
|
page read and write
|
||
2AC7000
|
heap
|
page read and write
|
||
4F3A000
|
trusted library allocation
|
page read and write
|
||
2AA2000
|
heap
|
page read and write
|
||
4F3F000
|
trusted library allocation
|
page read and write
|
||
2AB9000
|
heap
|
page read and write
|
||
4F21000
|
trusted library allocation
|
page read and write
|
||
2AAE000
|
heap
|
page read and write
|
||
2A9E000
|
heap
|
page read and write
|
||
4DCF000
|
stack
|
page read and write
|
||
4F81000
|
trusted library allocation
|
page read and write
|
||
4F68000
|
trusted library allocation
|
page read and write
|
||
2AB9000
|
heap
|
page read and write
|
||
2B14000
|
heap
|
page read and write
|
||
50FD000
|
trusted library allocation
|
page read and write
|
||
4F41000
|
trusted library allocation
|
page read and write
|
||
2B23000
|
heap
|
page read and write
|
||
2B2A000
|
heap
|
page read and write
|
||
4FAC000
|
trusted library allocation
|
page read and write
|
||
4F4F000
|
trusted library allocation
|
page read and write
|
||
4F41000
|
trusted library allocation
|
page read and write
|
||
43E0000
|
direct allocation
|
page execute and read and write
|
||
4F2A000
|
trusted library allocation
|
page read and write
|
||
4E0E000
|
stack
|
page read and write
|
||
4F21000
|
trusted library allocation
|
page read and write
|
||
5195000
|
trusted library allocation
|
page read and write
|
||
4F68000
|
trusted library allocation
|
page read and write
|
||
4F24000
|
trusted library allocation
|
page read and write
|
||
4F3D000
|
trusted library allocation
|
page read and write
|
||
5105000
|
trusted library allocation
|
page read and write
|
||
2B29000
|
heap
|
page read and write
|
||
4F30000
|
trusted library allocation
|
page read and write
|
||
50CD000
|
trusted library allocation
|
page read and write
|
||
4F41000
|
trusted library allocation
|
page read and write
|
||
2AAE000
|
heap
|
page read and write
|
||
2AC7000
|
heap
|
page read and write
|
||
4F74000
|
trusted library allocation
|
page read and write
|
||
2AA2000
|
heap
|
page read and write
|
||
4F7D000
|
trusted library allocation
|
page read and write
|
||
4FB1000
|
trusted library allocation
|
page read and write
|
||
4F26000
|
trusted library allocation
|
page read and write
|
||
4FB6000
|
trusted library allocation
|
page read and write
|
||
4F26000
|
trusted library allocation
|
page read and write
|
||
484E000
|
stack
|
page read and write
|
||
2AA2000
|
heap
|
page read and write
|
||
4F83000
|
trusted library allocation
|
page read and write
|
||
4F3F000
|
trusted library allocation
|
page read and write
|
||
2AA2000
|
heap
|
page read and write
|
||
2B20000
|
heap
|
page read and write
|
||
4FDF000
|
trusted library allocation
|
page read and write
|
||
2B14000
|
heap
|
page read and write
|
||
4FB6000
|
trusted library allocation
|
page read and write
|
||
2B14000
|
heap
|
page read and write
|
||
2B29000
|
heap
|
page read and write
|
||
4F7F000
|
trusted library allocation
|
page read and write
|
||
4F50000
|
trusted library allocation
|
page read and write
|
||
401000
|
unkown
|
page execute read
|
||
4F85000
|
trusted library allocation
|
page read and write
|
||
4F67000
|
trusted library allocation
|
page read and write
|
||
4430000
|
direct allocation
|
page read and write
|
||
4F41000
|
trusted library allocation
|
page read and write
|
||
4F69000
|
trusted library allocation
|
page read and write
|
||
4F49000
|
trusted library allocation
|
page read and write
|
||
4F41000
|
trusted library allocation
|
page read and write
|
||
2AAE000
|
heap
|
page read and write
|
||
2B20000
|
heap
|
page read and write
|
||
2B20000
|
heap
|
page read and write
|
||
4F32000
|
trusted library allocation
|
page read and write
|
||
4F55000
|
trusted library allocation
|
page read and write
|
||
2A4E000
|
heap
|
page read and write
|
||
2A9D000
|
heap
|
page read and write
|
||
2B27000
|
heap
|
page read and write
|
||
4F3F000
|
trusted library allocation
|
page read and write
|
||
2AAE000
|
heap
|
page read and write
|
||
2AA2000
|
heap
|
page read and write
|
||
2AAE000
|
heap
|
page read and write
|
||
2B27000
|
heap
|
page read and write
|
||
2AA2000
|
heap
|
page read and write
|
||
2AC7000
|
heap
|
page read and write
|
||
4F70000
|
trusted library allocation
|
page read and write
|
||
2A9E000
|
heap
|
page read and write
|
||
2B29000
|
heap
|
page read and write
|
||
4F2B000
|
trusted library allocation
|
page read and write
|
||
2A0F000
|
stack
|
page read and write
|
||
2B27000
|
heap
|
page read and write
|
||
2A40000
|
heap
|
page read and write
|
||
2AAE000
|
heap
|
page read and write
|
||
2AA2000
|
heap
|
page read and write
|
||
2B27000
|
heap
|
page read and write
|
||
4F25000
|
trusted library allocation
|
page read and write
|
||
4F57000
|
trusted library allocation
|
page read and write
|
||
43DF000
|
stack
|
page read and write
|
There are 493 hidden memdumps, click here to show them.