IOC Report
file.exe

loading gif

Files

File Path
Type
Category
Malicious
file.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_file.exe_e1b8ee67c28e1740921d4bcadce1f30172278_35621c73_1a34e8b5-95ff-4b09-8773-76e45477dcb2\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
malicious
C:\ProgramData\Microsoft\Windows\WER\Temp\WER10D5.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER1105.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WEREC0.tmp.dmp
Mini DuMP crash report, 15 streams, Tue Jul 2 17:02:12 2024, 0x1205a4 type
dropped
C:\Windows\appcompat\Programs\Amcache.hve
MS Windows registry file, NT/2000 or above
dropped

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\file.exe
"C:\Users\user\Desktop\file.exe"
malicious
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 3696 -s 1568

URLs

Name
IP
Malicious
radiationnopp.shop
malicious
publicitttyps.shop
malicious
answerrsdo.shop
malicious
benchillppwo.shop
malicious
bargainnykwo.shop
malicious
bouncedgowp.shop
malicious
bannngwko.shop
malicious
stationacutwo.shop
malicious
affecthorsedpo.shop
malicious
https://duckduckgo.com/chrome_newtab
unknown
https://duckduckgo.com/ac/?q=
unknown
https://contile-images.services.mozilla.com/0TegrVVRalreHILhR2WvtD_CFzj13HCDcLqqpvXSOuY.10862.jpg
unknown
https://www.google.com/images/branding/product/ico/googleg_lodp.ico
unknown
https://stationacutwo.shopnF2
unknown
https://bridge.lga1.admarketplace.net/ctp?version=16.0.0&key=1696332238301000001.2&ci=1696332238417.
unknown
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
unknown
http://crl.rootca1.amazontrust.com/rootca1.crl0
unknown
https://bridge.lga1.ap01.net/ctp?version=16.0.0&key=1696332238301000001.1&ci=1696332238417.12791&cta
unknown
http://upx.sf.net
unknown
https://stationacutwo.shopcF2
unknown
https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
unknown
http://ocsp.rootca1.amazontrust.com0:
unknown
https://support.office.com/article/7D48285B-20E8-4B9B-91AD-216E34163BAD?wt.mc_id=EnterPK2016
unknown
https://support.office.com/article/94ba2e0b-638e-4a92-8857-2cb5ac1d8e17
unknown
https://www.ecosia.org/newtab/
unknown
https://stationacutwo.shop/_V
unknown
https://support.mozilla.org/kb/customize-firefox-controls-buttons-and-toolbars?utm_source=firefox-br
unknown
https://stationacutwo.shop:4
unknown
https://ac.ecosia.org/autocomplete?q=
unknown
https://stationacutwo.shop/apicu
unknown
https://stationacutwo.shop/oVrc:
unknown
https://contile-images.services.mozilla.com/obgoOYObjIFea_bXuT6L4LbBJ8j425AD87S1HMD3BWg.9991.jpg
unknown
https://imp.mt48.net/static?id=7RHzfOIXjFEYsBdvIpkX4QqmfZfYfQfafZbXfpbWfpbX7ReNxR3UIG8zInwYIFIVs9eYi
unknown
https://stationacutwo.shop/
unknown
http://x1.c.lencr.org/0
unknown
http://x1.i.lencr.org/0
unknown
https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
unknown
https://support.microsof
unknown
http://crt.rootca1.amazontrust.com/rootca1.cer0?
unknown
https://stationacutwo.shop/:
unknown
https://stationacutwo.shop/apili
unknown
https://stationacutwo.shop:443/api
unknown
https://stationacutwo.shop/api
188.114.97.3
https://support.mozilla.org/products/firefoxgro.all
unknown
https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
unknown
https://stationacutwo.shop/l
unknown
https://www.amazon.com/?tag=admarketus-20&ref=pd_sl_7548d4575af019e4c148ccf1a78112802e66a0816a72fc94
unknown
There are 37 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
stationacutwo.shop
188.114.97.3
malicious

IPs

IP
Domain
Country
Malicious
188.114.97.3
stationacutwo.shop
European Union
malicious

Registry

Path
Value
Malicious
\REGISTRY\A\{33c58208-2aa0-c140-8c5d-6e30688e10b8}\Root\InventoryApplicationFile\file.exe|ff8e65d6b06db8e5
ProgramId
malicious
\REGISTRY\A\{33c58208-2aa0-c140-8c5d-6e30688e10b8}\Root\InventoryApplicationFile\file.exe|ff8e65d6b06db8e5
FileId
malicious
\REGISTRY\A\{33c58208-2aa0-c140-8c5d-6e30688e10b8}\Root\InventoryApplicationFile\file.exe|ff8e65d6b06db8e5
LowerCaseLongPath
malicious
\REGISTRY\A\{33c58208-2aa0-c140-8c5d-6e30688e10b8}\Root\InventoryApplicationFile\file.exe|ff8e65d6b06db8e5
LongPathHash
malicious
\REGISTRY\A\{33c58208-2aa0-c140-8c5d-6e30688e10b8}\Root\InventoryApplicationFile\file.exe|ff8e65d6b06db8e5
Name
malicious
\REGISTRY\A\{33c58208-2aa0-c140-8c5d-6e30688e10b8}\Root\InventoryApplicationFile\file.exe|ff8e65d6b06db8e5
OriginalFileName
malicious
\REGISTRY\A\{33c58208-2aa0-c140-8c5d-6e30688e10b8}\Root\InventoryApplicationFile\file.exe|ff8e65d6b06db8e5
Publisher
malicious
\REGISTRY\A\{33c58208-2aa0-c140-8c5d-6e30688e10b8}\Root\InventoryApplicationFile\file.exe|ff8e65d6b06db8e5
Version
malicious
\REGISTRY\A\{33c58208-2aa0-c140-8c5d-6e30688e10b8}\Root\InventoryApplicationFile\file.exe|ff8e65d6b06db8e5
BinFileVersion
malicious
\REGISTRY\A\{33c58208-2aa0-c140-8c5d-6e30688e10b8}\Root\InventoryApplicationFile\file.exe|ff8e65d6b06db8e5
BinaryType
malicious
\REGISTRY\A\{33c58208-2aa0-c140-8c5d-6e30688e10b8}\Root\InventoryApplicationFile\file.exe|ff8e65d6b06db8e5
ProductName
malicious
\REGISTRY\A\{33c58208-2aa0-c140-8c5d-6e30688e10b8}\Root\InventoryApplicationFile\file.exe|ff8e65d6b06db8e5
ProductVersion
malicious
\REGISTRY\A\{33c58208-2aa0-c140-8c5d-6e30688e10b8}\Root\InventoryApplicationFile\file.exe|ff8e65d6b06db8e5
LinkDate
malicious
\REGISTRY\A\{33c58208-2aa0-c140-8c5d-6e30688e10b8}\Root\InventoryApplicationFile\file.exe|ff8e65d6b06db8e5
BinProductVersion
malicious
\REGISTRY\A\{33c58208-2aa0-c140-8c5d-6e30688e10b8}\Root\InventoryApplicationFile\file.exe|ff8e65d6b06db8e5
AppxPackageFullName
malicious
\REGISTRY\A\{33c58208-2aa0-c140-8c5d-6e30688e10b8}\Root\InventoryApplicationFile\file.exe|ff8e65d6b06db8e5
AppxPackageRelativeId
malicious
\REGISTRY\A\{33c58208-2aa0-c140-8c5d-6e30688e10b8}\Root\InventoryApplicationFile\file.exe|ff8e65d6b06db8e5
Size
malicious
\REGISTRY\A\{33c58208-2aa0-c140-8c5d-6e30688e10b8}\Root\InventoryApplicationFile\file.exe|ff8e65d6b06db8e5
Language
malicious
\REGISTRY\A\{33c58208-2aa0-c140-8c5d-6e30688e10b8}\Root\InventoryApplicationFile\file.exe|ff8e65d6b06db8e5
Usn
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\IdentityCRL\ClockData
ClockTimeSeconds
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\IdentityCRL\ClockData
TickCount
There are 11 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
400000
unkown
page execute and read and write
malicious
2B29000
heap
page read and write
19A000
stack
page read and write
4F7E000
trusted library allocation
page read and write
400000
unkown
page readonly
52BE000
trusted library allocation
page read and write
2B29000
heap
page read and write
4CCE000
stack
page read and write
2B27000
heap
page read and write
4F7E000
trusted library allocation
page read and write
2A9E000
heap
page read and write
4F57000
trusted library allocation
page read and write
2AC7000
heap
page read and write
4F38000
trusted library allocation
page read and write
4F54000
trusted library allocation
page read and write
2AB9000
heap
page read and write
2AC2000
heap
page read and write
2AB9000
heap
page read and write
2AA2000
heap
page read and write
45CE000
stack
page read and write
4F5E000
trusted library allocation
page read and write
4FAB000
trusted library allocation
page read and write
2A9E000
heap
page read and write
4F96000
trusted library allocation
page read and write
4F60000
trusted library allocation
page read and write
4FB2000
trusted library allocation
page read and write
4F30000
trusted library allocation
page read and write
2B27000
heap
page read and write
5441000
trusted library allocation
page read and write
4F7E000
trusted library allocation
page read and write
4F59000
trusted library allocation
page read and write
2A61000
heap
page execute and read and write
2AAE000
heap
page read and write
2B27000
heap
page read and write
2AB9000
heap
page read and write
4F38000
trusted library allocation
page read and write
2AC7000
heap
page read and write
2AB9000
heap
page read and write
4F2D000
trusted library allocation
page read and write
4FDF000
trusted library allocation
page read and write
4F7C000
trusted library allocation
page read and write
2905000
heap
page read and write
4F58000
trusted library allocation
page read and write
2B21000
heap
page read and write
2B1E000
heap
page read and write
2AB9000
heap
page read and write
4F20000
trusted library allocation
page read and write
2AAE000
heap
page read and write
2B29000
heap
page read and write
2AC7000
heap
page read and write
4F78000
trusted library allocation
page read and write
2A97000
heap
page read and write
2B17000
heap
page read and write
2AC7000
heap
page read and write
4F54000
trusted library allocation
page read and write
2B27000
heap
page read and write
2A9E000
heap
page read and write
446D000
stack
page read and write
2AB9000
heap
page read and write
2AA2000
heap
page read and write
4FB6000
trusted library allocation
page read and write
2A9D000
heap
page read and write
4F38000
trusted library allocation
page read and write
5E5E000
trusted library allocation
page read and write
2A9E000
heap
page read and write
4FDF000
trusted library allocation
page read and write
4F65000
trusted library allocation
page read and write
2810000
heap
page read and write
4FE3000
trusted library allocation
page read and write
4F21000
trusted library allocation
page read and write
2AA2000
heap
page read and write
4F68000
trusted library allocation
page read and write
4F85000
trusted library allocation
page read and write
285E000
stack
page read and write
4F2D000
trusted library allocation
page read and write
2AB9000
heap
page read and write
2B21000
heap
page read and write
4F6C000
trusted library allocation
page read and write
4F57000
trusted library allocation
page read and write
4F85000
trusted library allocation
page read and write
2B27000
heap
page read and write
2A9E000
heap
page read and write
4F9E000
trusted library allocation
page read and write
4F3F000
trusted library allocation
page read and write
2B29000
heap
page read and write
4F38000
trusted library allocation
page read and write
2AB9000
heap
page read and write
4F60000
trusted library allocation
page read and write
4F92000
trusted library allocation
page read and write
2B29000
heap
page read and write
4F5A000
trusted library allocation
page read and write
2AA2000
heap
page read and write
4F57000
trusted library allocation
page read and write
2A92000
heap
page read and write
2AC7000
heap
page read and write
2B29000
heap
page read and write
2B22000
heap
page read and write
4FB6000
trusted library allocation
page read and write
2AB9000
heap
page read and write
2B1C000
heap
page read and write
4F3F000
trusted library allocation
page read and write
2AAB000
heap
page read and write
2A9E000
heap
page read and write
4F41000
trusted library allocation
page read and write
4F5E000
trusted library allocation
page read and write
4F2E000
trusted library allocation
page read and write
2ADA000
heap
page read and write
2B17000
heap
page read and write
2A9D000
heap
page read and write
4470000
heap
page read and write
2AA2000
heap
page read and write
4F38000
trusted library allocation
page read and write
436000
unkown
page readonly
4F30000
trusted library allocation
page read and write
2726000
unkown
page readonly
4F8C000
trusted library allocation
page read and write
2AC2000
heap
page read and write
4F21000
trusted library allocation
page read and write
2AA2000
heap
page read and write
2AAE000
heap
page read and write
4F85000
trusted library allocation
page read and write
4F2E000
trusted library allocation
page read and write
4F76000
trusted library allocation
page read and write
2B29000
heap
page read and write
2AC7000
heap
page read and write
2AC7000
heap
page read and write
1F0000
heap
page read and write
4F4F000
trusted library allocation
page read and write
2AAB000
heap
page read and write
2AC7000
heap
page read and write
2A9D000
heap
page read and write
4F8F000
trusted library allocation
page read and write
2A10000
remote allocation
page read and write
4F28000
trusted library allocation
page read and write
2AAE000
heap
page read and write
2A9D000
heap
page read and write
2B27000
heap
page read and write
4F26000
trusted library allocation
page read and write
2B1B000
heap
page read and write
2B29000
heap
page read and write
4F38000
trusted library allocation
page read and write
2AB9000
heap
page read and write
4F3E000
trusted library allocation
page read and write
2AC7000
heap
page read and write
2B27000
heap
page read and write
2B3E000
heap
page read and write
2B27000
heap
page read and write
2B27000
heap
page read and write
2AC7000
heap
page read and write
4FBE000
trusted library allocation
page read and write
2B3C000
heap
page read and write
2AC7000
heap
page read and write
4F78000
trusted library allocation
page read and write
2AA2000
heap
page read and write
4FCB000
trusted library allocation
page read and write
2A97000
heap
page read and write
50F5000
trusted library allocation
page read and write
2AAB000
heap
page read and write
4FE3000
trusted library allocation
page read and write
2B27000
heap
page read and write
2AC7000
heap
page read and write
5430000
heap
page read and write
2B3D000
heap
page read and write
2AC7000
heap
page read and write
2B29000
heap
page read and write
4F7F000
trusted library allocation
page read and write
4F3D000
trusted library allocation
page read and write
4F30000
trusted library allocation
page read and write
4F41000
trusted library allocation
page read and write
4FA5000
trusted library allocation
page read and write
2B27000
heap
page read and write
2AAE000
heap
page read and write
505D000
trusted library allocation
page read and write
2AC7000
heap
page read and write
452000
unkown
page execute and read and write
2AC7000
heap
page read and write
2B29000
heap
page read and write
2B27000
heap
page read and write
4F75000
trusted library allocation
page read and write
4F41000
trusted library allocation
page read and write
4F31000
trusted library allocation
page read and write
2AB9000
heap
page read and write
4F47000
trusted library allocation
page read and write
4F32000
trusted library allocation
page read and write
46CD000
stack
page read and write
2A8D000
heap
page read and write
4F57000
trusted library allocation
page read and write
2B27000
heap
page read and write
5045000
trusted library allocation
page read and write
2AC7000
heap
page read and write
4F30000
trusted library allocation
page read and write
2B27000
heap
page read and write
4F41000
trusted library allocation
page read and write
4F84000
trusted library allocation
page read and write
2AA2000
heap
page read and write
2AAE000
heap
page read and write
4F66000
trusted library allocation
page read and write
4FDF000
trusted library allocation
page read and write
4F69000
trusted library allocation
page read and write
4F22000
trusted library allocation
page read and write
4F30000
trusted library allocation
page read and write
4F67000
trusted library allocation
page read and write
2B17000
heap
page read and write
4F30000
trusted library allocation
page read and write
2B29000
heap
page read and write
4F30000
trusted library allocation
page read and write
480F000
stack
page read and write
5026000
trusted library allocation
page read and write
2A10000
remote allocation
page read and write
2B14000
heap
page read and write
2B27000
heap
page read and write
2A9D000
heap
page read and write
4F4B000
trusted library allocation
page read and write
2B27000
heap
page read and write
2B16000
heap
page read and write
28AE000
stack
page read and write
4F2B000
trusted library allocation
page read and write
2ABB000
heap
page read and write
2A9E000
heap
page read and write
4F76000
trusted library allocation
page read and write
2A98000
heap
page read and write
2A9D000
heap
page read and write
2B2A000
heap
page read and write
2AC7000
heap
page read and write
2B16000
heap
page read and write
2B18000
heap
page read and write
2AAE000
heap
page read and write
4FAA000
trusted library allocation
page read and write
2A9E000
heap
page read and write
4F38000
trusted library allocation
page read and write
2B1E000
heap
page read and write
2A10000
remote allocation
page read and write
4F44000
trusted library allocation
page read and write
4F68000
trusted library allocation
page read and write
2AC2000
heap
page read and write
2A91000
heap
page read and write
4F3D000
trusted library allocation
page read and write
4F7F000
trusted library allocation
page read and write
2AAB000
heap
page read and write
2B27000
heap
page read and write
2AA2000
heap
page read and write
2AA1000
heap
page read and write
2A8D000
heap
page read and write
4F5A000
trusted library allocation
page read and write
2AAE000
heap
page read and write
2B3B000
heap
page read and write
2AAE000
heap
page read and write
2B31000
heap
page read and write
2B22000
heap
page read and write
4F83000
trusted library allocation
page read and write
2AAE000
heap
page read and write
4F41000
trusted library allocation
page read and write
4F28000
trusted library allocation
page read and write
4F30000
trusted library allocation
page read and write
502C000
trusted library allocation
page read and write
2AB9000
heap
page read and write
2AC7000
heap
page read and write
2AA2000
heap
page read and write
2B23000
heap
page read and write
4F6C000
trusted library allocation
page read and write
517E000
stack
page read and write
4F2F000
trusted library allocation
page read and write
2AA2000
heap
page read and write
2B18000
heap
page read and write
4F28000
trusted library allocation
page read and write
4F3F000
trusted library allocation
page read and write
2AA2000
heap
page read and write
2AB9000
heap
page read and write
2AA2000
heap
page read and write
28C0000
heap
page read and write
2AA2000
heap
page read and write
4F45000
trusted library allocation
page read and write
507D000
trusted library allocation
page read and write
4F39000
trusted library allocation
page read and write
2B27000
heap
page read and write
2900000
heap
page read and write
4F38000
trusted library allocation
page read and write
2B16000
heap
page read and write
2AC7000
heap
page read and write
2B27000
heap
page read and write
2B27000
heap
page read and write
4F22000
trusted library allocation
page read and write
2AAE000
heap
page read and write
4F41000
trusted library allocation
page read and write
4F26000
trusted library allocation
page read and write
9B000
stack
page read and write
4F2E000
trusted library allocation
page read and write
4F3F000
trusted library allocation
page read and write
2AB9000
heap
page read and write
2AAE000
heap
page read and write
2AC2000
heap
page read and write
2AC7000
heap
page read and write
4F7D000
trusted library allocation
page read and write
2A97000
heap
page read and write
2AC7000
heap
page read and write
4F22000
trusted library allocation
page read and write
4FE3000
trusted library allocation
page read and write
4F30000
trusted library allocation
page read and write
2AB9000
heap
page read and write
2B29000
heap
page read and write
2B27000
heap
page read and write
4F30000
trusted library allocation
page read and write
4F69000
trusted library allocation
page read and write
4F41000
trusted library allocation
page read and write
2AAE000
heap
page read and write
2B3D000
heap
page read and write
4F32000
trusted library allocation
page read and write
2A9D000
heap
page read and write
4F30000
trusted library allocation
page read and write
2AC7000
heap
page read and write
2AB9000
heap
page read and write
2AB9000
heap
page read and write
594E000
trusted library allocation
page read and write
2AA2000
heap
page read and write
2726000
unkown
page readonly
2B25000
heap
page read and write
4F38000
trusted library allocation
page read and write
4580000
heap
page read and write
4F30000
trusted library allocation
page read and write
2AA2000
heap
page read and write
4FF8000
trusted library allocation
page read and write
2A9E000
heap
page read and write
4F2E000
trusted library allocation
page read and write
4F41000
trusted library allocation
page read and write
2AB9000
heap
page read and write
494F000
stack
page read and write
4F41000
trusted library allocation
page read and write
2A9E000
heap
page read and write
2B27000
heap
page read and write
4F0E000
stack
page read and write
2B29000
heap
page read and write
439000
unkown
page write copy
2AB9000
heap
page read and write
4F63000
trusted library allocation
page read and write
2B29000
heap
page read and write
2B31000
heap
page read and write
2B1B000
heap
page read and write
4F58000
trusted library allocation
page read and write
4F32000
trusted library allocation
page read and write
2B14000
heap
page read and write
2B27000
heap
page read and write
4F5A000
trusted library allocation
page read and write
2B29000
heap
page read and write
4F30000
trusted library allocation
page read and write
2AAE000
heap
page read and write
2AAE000
heap
page read and write
2B2A000
heap
page read and write
4F70000
trusted library allocation
page read and write
527F000
stack
page read and write
2AB9000
heap
page read and write
52BC000
trusted library allocation
page read and write
2AC7000
heap
page read and write
4F39000
trusted library allocation
page read and write
2B23000
heap
page read and write
2AA2000
heap
page read and write
2B29000
heap
page read and write
2AB9000
heap
page read and write
2B31000
heap
page read and write
2A9E000
heap
page read and write
2A48000
heap
page read and write
2A9E000
heap
page read and write
2AC7000
heap
page read and write
4F7E000
trusted library allocation
page read and write
4F68000
trusted library allocation
page read and write
2A9E000
heap
page read and write
2B27000
heap
page read and write
2B27000
heap
page read and write
2AB9000
heap
page read and write
2B29000
heap
page read and write
4F78000
trusted library allocation
page read and write
4FB6000
trusted library allocation
page read and write
2B3D000
heap
page read and write
4FE3000
trusted library allocation
page read and write
4F21000
trusted library allocation
page read and write
2A9E000
heap
page read and write
2AAE000
heap
page read and write
2B33000
heap
page read and write
2907000
heap
page read and write
2B29000
heap
page read and write
4F30000
trusted library allocation
page read and write
4F53000
trusted library allocation
page read and write
5020000
heap
page read and write
2AAE000
heap
page read and write
2AB9000
heap
page read and write
4F66000
trusted library allocation
page read and write
5021000
heap
page read and write
2B3C000
heap
page read and write
2A9E000
heap
page read and write
4F27000
trusted library allocation
page read and write
4F2E000
trusted library allocation
page read and write
2B22000
heap
page read and write
457D000
stack
page read and write
4F68000
trusted library allocation
page read and write
4F41000
trusted library allocation
page read and write
2AB9000
heap
page read and write
28D0000
heap
page read and write
2AA2000
heap
page read and write
2AAE000
heap
page read and write
4F81000
trusted library allocation
page read and write
2AA2000
heap
page read and write
4F2A000
trusted library allocation
page read and write
4F3A000
trusted library allocation
page read and write
2AC7000
heap
page read and write
2B29000
heap
page read and write
4F41000
trusted library allocation
page read and write
2B16000
heap
page read and write
2AA2000
heap
page read and write
4F91000
trusted library allocation
page read and write
470E000
stack
page read and write
4F41000
trusted library allocation
page read and write
2B1F000
heap
page read and write
2AB9000
heap
page read and write
2AC7000
heap
page read and write
4F3A000
trusted library allocation
page read and write
2AA2000
heap
page read and write
4F3F000
trusted library allocation
page read and write
2AB9000
heap
page read and write
4F21000
trusted library allocation
page read and write
2AAE000
heap
page read and write
2A9E000
heap
page read and write
4DCF000
stack
page read and write
4F81000
trusted library allocation
page read and write
4F68000
trusted library allocation
page read and write
2AB9000
heap
page read and write
2B14000
heap
page read and write
50FD000
trusted library allocation
page read and write
4F41000
trusted library allocation
page read and write
2B23000
heap
page read and write
2B2A000
heap
page read and write
4FAC000
trusted library allocation
page read and write
4F4F000
trusted library allocation
page read and write
4F41000
trusted library allocation
page read and write
43E0000
direct allocation
page execute and read and write
4F2A000
trusted library allocation
page read and write
4E0E000
stack
page read and write
4F21000
trusted library allocation
page read and write
5195000
trusted library allocation
page read and write
4F68000
trusted library allocation
page read and write
4F24000
trusted library allocation
page read and write
4F3D000
trusted library allocation
page read and write
5105000
trusted library allocation
page read and write
2B29000
heap
page read and write
4F30000
trusted library allocation
page read and write
50CD000
trusted library allocation
page read and write
4F41000
trusted library allocation
page read and write
2AAE000
heap
page read and write
2AC7000
heap
page read and write
4F74000
trusted library allocation
page read and write
2AA2000
heap
page read and write
4F7D000
trusted library allocation
page read and write
4FB1000
trusted library allocation
page read and write
4F26000
trusted library allocation
page read and write
4FB6000
trusted library allocation
page read and write
4F26000
trusted library allocation
page read and write
484E000
stack
page read and write
2AA2000
heap
page read and write
4F83000
trusted library allocation
page read and write
4F3F000
trusted library allocation
page read and write
2AA2000
heap
page read and write
2B20000
heap
page read and write
4FDF000
trusted library allocation
page read and write
2B14000
heap
page read and write
4FB6000
trusted library allocation
page read and write
2B14000
heap
page read and write
2B29000
heap
page read and write
4F7F000
trusted library allocation
page read and write
4F50000
trusted library allocation
page read and write
401000
unkown
page execute read
4F85000
trusted library allocation
page read and write
4F67000
trusted library allocation
page read and write
4430000
direct allocation
page read and write
4F41000
trusted library allocation
page read and write
4F69000
trusted library allocation
page read and write
4F49000
trusted library allocation
page read and write
4F41000
trusted library allocation
page read and write
2AAE000
heap
page read and write
2B20000
heap
page read and write
2B20000
heap
page read and write
4F32000
trusted library allocation
page read and write
4F55000
trusted library allocation
page read and write
2A4E000
heap
page read and write
2A9D000
heap
page read and write
2B27000
heap
page read and write
4F3F000
trusted library allocation
page read and write
2AAE000
heap
page read and write
2AA2000
heap
page read and write
2AAE000
heap
page read and write
2B27000
heap
page read and write
2AA2000
heap
page read and write
2AC7000
heap
page read and write
4F70000
trusted library allocation
page read and write
2A9E000
heap
page read and write
2B29000
heap
page read and write
4F2B000
trusted library allocation
page read and write
2A0F000
stack
page read and write
2B27000
heap
page read and write
2A40000
heap
page read and write
2AAE000
heap
page read and write
2AA2000
heap
page read and write
2B27000
heap
page read and write
4F25000
trusted library allocation
page read and write
4F57000
trusted library allocation
page read and write
43DF000
stack
page read and write
There are 493 hidden memdumps, click here to show them.