Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
inquiry for AP-103- FM-2400 project.exe
|
PE32+ executable (console) x86-64 Mono/.Net assembly, for MS Windows
|
initial sample
|
||
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_inquiry for AP-1_cdfe5c582c65621baa53dccb9fe1927a395898b_5d35286c_ccdce3e4-8663-4d4b-a58a-a2b8687938ba\Report.wer
|
Unicode text, UTF-16, little-endian text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WER80C9.tmp.dmp
|
Mini DuMP crash report, 16 streams, Fri Jul 12 07:52:57 2024, 0x1205a4 type
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WER8426.tmp.WERInternalMetadata.xml
|
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WER8456.tmp.xml
|
XML 1.0 document, ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\regsvcs.exe.log
|
ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Windows\appcompat\Programs\Amcache.hve
|
MS Windows registry file, NT/2000 or above
|
dropped
|
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\inquiry for AP-103- FM-2400 project.exe
|
"C:\Users\user\Desktop\inquiry for AP-103- FM-2400 project.exe"
|
||
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
|
"C:\Windows\Microsoft.NET\Framework\v4.0.30319\regsvcs.exe"
|
||
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
|
"C:\Windows\Microsoft.NET\Framework\v4.0.30319\regsvcs.exe"
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\WerFault.exe
|
C:\Windows\system32\WerFault.exe -u -p 7316 -s 1016
|
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
212.162.149.77:1912
|
|||
http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-soap-message-security-1.0#Text
|
unknown
|
||
http://schemas.xmlsoap.org/ws/2005/02/sc/sct
|
unknown
|
||
https://duckduckgo.com/chrome_newtab
|
unknown
|
||
http://schemas.xmlsoap.org/ws/2004/04/security/sc/dk
|
unknown
|
||
https://duckduckgo.com/ac/?q=
|
unknown
|
||
http://tempuri.org/Entity/Id23ResponseD
|
unknown
|
||
http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-soap-message-security-1.0#HexBinary
|
unknown
|
||
http://tempuri.org/Entity/Id12Response
|
unknown
|
||
http://tempuri.org/
|
unknown
|
||
http://tempuri.org/Entity/Id2Response
|
unknown
|
||
http://schemas.xmlsoap.org/ws/2005/02/sc/dk/p_sha1
|
unknown
|
||
http://tempuri.org/Entity/Id21Response
|
unknown
|
||
http://schemas.xmlsoap.org/2005/02/trust/spnego#GSS_Wrap
|
unknown
|
||
http://tempuri.org/Entity/Id9
|
unknown
|
||
http://docs.oasis-open.org/wss/oasis-wss-saml-token-profile-1.1#SAMLID
|
unknown
|
||
http://tempuri.org/Entity/Id8
|
unknown
|
||
http://tempuri.org/Entity/Id5
|
unknown
|
||
http://schemas.xmlsoap.org/ws/2004/10/wsat/Prepare
|
unknown
|
||
http://tempuri.org/Entity/Id4
|
unknown
|
||
http://tempuri.org/Entity/Id7
|
unknown
|
||
http://tempuri.org/Entity/Id6
|
unknown
|
||
http://schemas.xmlsoap.org/ws/2005/02/trust#BinarySecret
|
unknown
|
||
http://tempuri.org/Entity/Id19Response
|
unknown
|
||
http://docs.oasis-open.org/wss/oasis-wss-rel-token-profile-1.0.pdf#license
|
unknown
|
||
http://schemas.xmlsoap.org/ws/2005/02/trust/RSTR/Issue
|
unknown
|
||
http://schemas.xmlsoap.org/ws/2004/10/wsat/Aborted
|
unknown
|
||
http://schemas.xmlsoap.org/ws/2005/02/rm/TerminateSequence
|
unknown
|
||
http://schemas.xmlsoap.org/ws/2004/10/wsat/fault
|
unknown
|
||
http://schemas.xmlsoap.org/ws/2004/10/wsat
|
unknown
|
||
http://docs.oasis-open.org/wss/oasis-wss-soap-message-security-1.1#EncryptedKey
|
unknown
|
||
http://tempuri.org/Entity/Id15Response
|
unknown
|
||
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
|
unknown
|
||
http://schemas.xmlsoap.org/ws/2005/02/trust/RSTR/SCT/Renew
|
unknown
|
||
http://schemas.xmlsoap.org/ws/2004/10/wscoor/Register
|
unknown
|
||
http://tempuri.org/Entity/Id6Response
|
unknown
|
||
http://schemas.xmlsoap.org/ws/2004/04/trust/SymmetricKey
|
unknown
|
||
https://api.ip.sb/ip
|
unknown
|
||
http://schemas.xmlsoap.org/ws/2004/04/sc
|
unknown
|
||
http://tempuri.org/Entity/Id1ResponseD
|
unknown
|
||
http://schemas.xmlsoap.org/ws/2004/10/wsat/Volatile2PC
|
unknown
|
||
http://schemas.xmlsoap.org/ws/2005/02/trust/RSTR/SCT/Cancel
|
unknown
|
||
http://tempuri.org/Entity/Id9Response
|
unknown
|
||
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
|
unknown
|
||
http://tempuri.org/Entity/Id20
|
unknown
|
||
http://tempuri.org/Entity/Id21
|
unknown
|
||
http://tempuri.org/Entity/Id22
|
unknown
|
||
http://docs.oasis-open.org/wss/oasis-wss-kerberos-token-profile-1.1#Kerberosv5APREQSHA1
|
unknown
|
||
http://tempuri.org/Entity/Id23
|
unknown
|
||
http://schemas.xmlsoap.org/ws/2004/04/security/trust/CK/PSHA1
|
unknown
|
||
http://tempuri.org/Entity/Id24
|
unknown
|
||
http://schemas.xmlsoap.org/ws/2004/04/security/trust/RSTR/Issue
|
unknown
|
||
http://tempuri.org/Entity/Id24Response
|
unknown
|
||
https://www.ecosia.org/newtab/
|
unknown
|
||
http://tempuri.org/Entity/Id1Response
|
unknown
|
||
http://schemas.xmlsoap.org/ws/2005/02/rm/AckRequested
|
unknown
|
||
http://schemas.xmlsoap.org/ws/2004/10/wsat/ReadOnly
|
unknown
|
||
http://schemas.xmlsoap.org/ws/2004/10/wsat/Replay
|
unknown
|
||
http://schemas.xmlsoap.org/ws/2005/02/trust/tlsnego
|
unknown
|
||
http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-soap-message-security-1.0#Base64Binary
|
unknown
|
||
http://schemas.xmlsoap.org/ws/2004/10/wsat/Durable2PC
|
unknown
|
||
http://schemas.xmlsoap.org/ws/2004/04/security/trust/SymmetricKey
|
unknown
|
||
http://schemas.xmlsoap.org/ws/2004/08/addressing
|
unknown
|
||
http://schemas.xmlsoap.org/ws/2005/02/trust/RST/Issue
|
unknown
|
||
http://schemas.xmlsoap.org/ws/2004/10/wsat/Completion
|
unknown
|
||
http://schemas.xmlsoap.org/ws/2004/04/trust
|
unknown
|
||
http://tempuri.org/Entity/Id10
|
unknown
|
||
http://tempuri.org/Entity/Id11
|
unknown
|
||
http://tempuri.org/Entity/Id12
|
unknown
|
||
http://tempuri.org/Entity/Id16Response
|
unknown
|
||
http://schemas.xmlsoap.org/ws/2004/10/wscoor/CreateCoordinationContextResponse
|
unknown
|
||
http://schemas.xmlsoap.org/ws/2005/02/trust/RST/SCT/Cancel
|
unknown
|
||
http://tempuri.org/Entity/Id13
|
unknown
|
||
http://tempuri.org/Entity/Id14
|
unknown
|
||
http://tempuri.org/Entity/Id15
|
unknown
|
||
http://tempuri.org/Entity/Id16
|
unknown
|
||
http://schemas.xmlsoap.org/ws/2005/02/trust/Nonce
|
unknown
|
||
http://tempuri.org/Entity/Id17
|
unknown
|
||
http://tempuri.org/Entity/Id18
|
unknown
|
||
http://tempuri.org/Entity/Id5Response
|
unknown
|
||
http://tempuri.org/Entity/Id19
|
unknown
|
||
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/dns
|
unknown
|
||
http://tempuri.org/Entity/Id10Response
|
unknown
|
||
http://schemas.xmlsoap.org/ws/2005/02/trust/Renew
|
unknown
|
||
http://tempuri.org/Entity/Id8Response
|
unknown
|
||
http://schemas.xmlsoap.org/ws/2004/04/trust/PublicKey
|
unknown
|
||
http://docs.oasis-open.org/wss/oasis-wss-saml-token-profile-1.1#SAMLV2.0
|
unknown
|
||
http://docs.oasis-open.org/wss/oasis-wss-saml-token-profile-1.0#SAMLAssertionID
|
unknown
|
||
http://schemas.xmlsoap.org/ws/2004/04/security/trust/RST/SCT
|
unknown
|
||
http://schemas.xmlsoap.org/ws/2006/02/addressingidentity
|
unknown
|
||
http://schemas.xmlsoap.org/soap/envelope/
|
unknown
|
||
http://schemas.xmlsoap.org/ws/2005/02/trust/PublicKey
|
unknown
|
||
http://docs.oasis-open.org/wss/oasis-wss-soap-message-security-1.1#EncryptedKeySHA1
|
unknown
|
||
https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
|
unknown
|
||
http://schemas.xmlsoap.org/ws/2005/02/trust
|
unknown
|
||
https://duckduckgo.com/chrome_newtabS
|
unknown
|
||
http://schemas.xmlsoap.org/ws/2004/10/wsat/Rollback
|
unknown
|
||
http://tempuri.org/Entity/Id3ResponseD
|
unknown
|
||
http://tempuri.org/Entity/Id23Response
|
unknown
|
||
http://schemas.xmlsoap.org/ws/2004/04/security/trust/RSTR/SCT
|
unknown
|
There are 90 hidden URLs, click here to show them.
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
212.162.149.77
|
unknown
|
Netherlands
|
Registry
Path
|
Value
|
Malicious
|
|
---|---|---|---|
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
|
Owner
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
|
SessionHash
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
|
Sequence
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
|
RegFiles0000
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
|
RegFilesHash
|
||
\REGISTRY\A\{9b308f5d-6d13-7284-975d-27ab5a488ac9}\Root\InventoryApplicationFile\inquiry for ap-1|e038f9cabf21bdb3
|
ProgramId
|
||
\REGISTRY\A\{9b308f5d-6d13-7284-975d-27ab5a488ac9}\Root\InventoryApplicationFile\inquiry for ap-1|e038f9cabf21bdb3
|
FileId
|
||
\REGISTRY\A\{9b308f5d-6d13-7284-975d-27ab5a488ac9}\Root\InventoryApplicationFile\inquiry for ap-1|e038f9cabf21bdb3
|
LowerCaseLongPath
|
||
\REGISTRY\A\{9b308f5d-6d13-7284-975d-27ab5a488ac9}\Root\InventoryApplicationFile\inquiry for ap-1|e038f9cabf21bdb3
|
LongPathHash
|
||
\REGISTRY\A\{9b308f5d-6d13-7284-975d-27ab5a488ac9}\Root\InventoryApplicationFile\inquiry for ap-1|e038f9cabf21bdb3
|
Name
|
||
\REGISTRY\A\{9b308f5d-6d13-7284-975d-27ab5a488ac9}\Root\InventoryApplicationFile\inquiry for ap-1|e038f9cabf21bdb3
|
OriginalFileName
|
||
\REGISTRY\A\{9b308f5d-6d13-7284-975d-27ab5a488ac9}\Root\InventoryApplicationFile\inquiry for ap-1|e038f9cabf21bdb3
|
Publisher
|
||
\REGISTRY\A\{9b308f5d-6d13-7284-975d-27ab5a488ac9}\Root\InventoryApplicationFile\inquiry for ap-1|e038f9cabf21bdb3
|
Version
|
||
\REGISTRY\A\{9b308f5d-6d13-7284-975d-27ab5a488ac9}\Root\InventoryApplicationFile\inquiry for ap-1|e038f9cabf21bdb3
|
BinFileVersion
|
||
\REGISTRY\A\{9b308f5d-6d13-7284-975d-27ab5a488ac9}\Root\InventoryApplicationFile\inquiry for ap-1|e038f9cabf21bdb3
|
BinaryType
|
||
\REGISTRY\A\{9b308f5d-6d13-7284-975d-27ab5a488ac9}\Root\InventoryApplicationFile\inquiry for ap-1|e038f9cabf21bdb3
|
ProductName
|
||
\REGISTRY\A\{9b308f5d-6d13-7284-975d-27ab5a488ac9}\Root\InventoryApplicationFile\inquiry for ap-1|e038f9cabf21bdb3
|
ProductVersion
|
||
\REGISTRY\A\{9b308f5d-6d13-7284-975d-27ab5a488ac9}\Root\InventoryApplicationFile\inquiry for ap-1|e038f9cabf21bdb3
|
LinkDate
|
||
\REGISTRY\A\{9b308f5d-6d13-7284-975d-27ab5a488ac9}\Root\InventoryApplicationFile\inquiry for ap-1|e038f9cabf21bdb3
|
BinProductVersion
|
||
\REGISTRY\A\{9b308f5d-6d13-7284-975d-27ab5a488ac9}\Root\InventoryApplicationFile\inquiry for ap-1|e038f9cabf21bdb3
|
AppxPackageFullName
|
||
\REGISTRY\A\{9b308f5d-6d13-7284-975d-27ab5a488ac9}\Root\InventoryApplicationFile\inquiry for ap-1|e038f9cabf21bdb3
|
AppxPackageRelativeId
|
||
\REGISTRY\A\{9b308f5d-6d13-7284-975d-27ab5a488ac9}\Root\InventoryApplicationFile\inquiry for ap-1|e038f9cabf21bdb3
|
Size
|
||
\REGISTRY\A\{9b308f5d-6d13-7284-975d-27ab5a488ac9}\Root\InventoryApplicationFile\inquiry for ap-1|e038f9cabf21bdb3
|
Language
|
||
\REGISTRY\A\{9b308f5d-6d13-7284-975d-27ab5a488ac9}\Root\InventoryApplicationFile\inquiry for ap-1|e038f9cabf21bdb3
|
Usn
|
There are 14 hidden registries, click here to show them.
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
29A7000
|
trusted library allocation
|
page read and write
|
||
402000
|
remote allocation
|
page execute and read and write
|
||
28367793000
|
trusted library allocation
|
page read and write
|
||
2837752B000
|
trusted library allocation
|
page read and write
|
||
283775B9000
|
trusted library allocation
|
page read and write
|
||
2E55000
|
trusted library allocation
|
page read and write
|
||
2F87000
|
trusted library allocation
|
page read and write
|
||
3AD2000
|
trusted library allocation
|
page read and write
|
||
7D65000
|
trusted library allocation
|
page read and write
|
||
3C7B000
|
trusted library allocation
|
page read and write
|
||
87B3000
|
heap
|
page read and write
|
||
7FFD9B853000
|
trusted library allocation
|
page execute and read and write
|
||
D0B000
|
stack
|
page read and write
|
||
F6E000
|
stack
|
page read and write
|
||
99DA000
|
heap
|
page read and write
|
||
5E20000
|
heap
|
page execute and read and write
|
||
7FF4D25A0000
|
trusted library allocation
|
page execute and read and write
|
||
2C1F000
|
trusted library allocation
|
page read and write
|
||
6310000
|
trusted library allocation
|
page read and write
|
||
7FFD9B9F0000
|
trusted library allocation
|
page read and write
|
||
27D0000
|
trusted library allocation
|
page read and write
|
||
7FFD9B85D000
|
trusted library allocation
|
page execute and read and write
|
||
3C60000
|
trusted library allocation
|
page read and write
|
||
B38000
|
heap
|
page read and write
|
||
2836560E000
|
heap
|
page read and write
|
||
3C95000
|
trusted library allocation
|
page read and write
|
||
3C7E000
|
trusted library allocation
|
page read and write
|
||
3C6D000
|
trusted library allocation
|
page read and write
|
||
28367190000
|
trusted library section
|
page read and write
|
||
2C9D000
|
trusted library allocation
|
page read and write
|
||
9DE000
|
stack
|
page read and write
|
||
5AE4000
|
heap
|
page read and write
|
||
2F6E000
|
trusted library allocation
|
page read and write
|
||
4A0C000
|
stack
|
page read and write
|
||
3D31000
|
trusted library allocation
|
page read and write
|
||
28367180000
|
heap
|
page read and write
|
||
3D23000
|
trusted library allocation
|
page read and write
|
||
8806000
|
heap
|
page read and write
|
||
2D6E000
|
trusted library allocation
|
page read and write
|
||
3ACF000
|
trusted library allocation
|
page read and write
|
||
391F000
|
trusted library allocation
|
page read and write
|
||
5E00000
|
trusted library allocation
|
page read and write
|
||
3B19000
|
trusted library allocation
|
page read and write
|
||
7FFD9BA49000
|
trusted library allocation
|
page read and write
|
||
28365612000
|
heap
|
page read and write
|
||
7FFD9BA50000
|
trusted library allocation
|
page execute and read and write
|
||
2C17000
|
trusted library allocation
|
page read and write
|
||
7D56000
|
trusted library allocation
|
page read and write
|
||
7D8A000
|
trusted library allocation
|
page read and write
|
||
2E46000
|
trusted library allocation
|
page read and write
|
||
968D6FF000
|
stack
|
page read and write
|
||
7D58000
|
trusted library allocation
|
page read and write
|
||
968D1F2000
|
stack
|
page read and write
|
||
3D4A000
|
trusted library allocation
|
page read and write
|
||
8826000
|
heap
|
page read and write
|
||
CCE000
|
stack
|
page read and write
|
||
7FFD9B850000
|
trusted library allocation
|
page read and write
|
||
28A0000
|
heap
|
page read and write
|
||
A52000
|
trusted library allocation
|
page read and write
|
||
28365800000
|
heap
|
page read and write
|
||
503E000
|
stack
|
page read and write
|
||
7FFD9BA42000
|
trusted library allocation
|
page read and write
|
||
3D0E000
|
trusted library allocation
|
page read and write
|
||
F70000
|
trusted library allocation
|
page read and write
|
||
2EE3000
|
trusted library allocation
|
page read and write
|
||
8774000
|
heap
|
page read and write
|
||
7D8F000
|
trusted library allocation
|
page read and write
|
||
7D40000
|
trusted library allocation
|
page read and write
|
||
5E10000
|
trusted library allocation
|
page execute and read and write
|
||
5DD0000
|
trusted library allocation
|
page execute and read and write
|
||
B76000
|
heap
|
page read and write
|
||
87F6000
|
heap
|
page read and write
|
||
2CE1000
|
trusted library allocation
|
page read and write
|
||
8884000
|
heap
|
page read and write
|
||
8799000
|
heap
|
page read and write
|
||
8898000
|
heap
|
page read and write
|
||
28365850000
|
trusted library allocation
|
page read and write
|
||
7D00000
|
trusted library allocation
|
page read and write
|
||
F80000
|
heap
|
page read and write
|
||
7CF0000
|
trusted library allocation
|
page read and write
|
||
3B6B000
|
trusted library allocation
|
page read and write
|
||
5E30000
|
trusted library allocation
|
page read and write
|
||
5BA3000
|
heap
|
page read and write
|
||
7FFD9BA60000
|
trusted library allocation
|
page read and write
|
||
2AE0000
|
trusted library allocation
|
page read and write
|
||
5040000
|
heap
|
page read and write
|
||
27EE000
|
trusted library allocation
|
page read and write
|
||
5D00000
|
trusted library allocation
|
page read and write
|
||
5B7A000
|
heap
|
page read and write
|
||
2840000
|
trusted library allocation
|
page read and write
|
||
5B70000
|
heap
|
page read and write
|
||
28365870000
|
trusted library allocation
|
page read and write
|
||
28365890000
|
heap
|
page read and write
|
||
5B80000
|
heap
|
page read and write
|
||
53E5000
|
trusted library allocation
|
page read and write
|
||
5B2C000
|
heap
|
page read and write
|
||
7FFD9BA09000
|
trusted library allocation
|
page read and write
|
||
28365610000
|
heap
|
page read and write
|
||
7FFD9B970000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9B862000
|
trusted library allocation
|
page read and write
|
||
AAE000
|
heap
|
page read and write
|
||
2DCE000
|
trusted library allocation
|
page read and write
|
||
A30000
|
trusted library allocation
|
page read and write
|
||
3AAD000
|
trusted library allocation
|
page read and write
|
||
8720000
|
heap
|
page read and write
|
||
2837F330000
|
trusted library allocation
|
page read and write
|
||
F8A000
|
heap
|
page read and write
|
||
3C71000
|
trusted library allocation
|
page read and write
|
||
5D70000
|
trusted library allocation
|
page execute and read and write
|
||
2D9F000
|
trusted library allocation
|
page read and write
|
||
3AB4000
|
trusted library allocation
|
page read and write
|
||
8892000
|
heap
|
page read and write
|
||
7D90000
|
trusted library allocation
|
page read and write
|
||
967E000
|
stack
|
page read and write
|
||
3AC5000
|
trusted library allocation
|
page read and write
|
||
3C59000
|
trusted library allocation
|
page read and write
|
||
3CF6000
|
trusted library allocation
|
page read and write
|
||
28B0000
|
trusted library allocation
|
page read and write
|
||
96BF000
|
stack
|
page read and write
|
||
3D62000
|
trusted library allocation
|
page read and write
|
||
7F20000
|
trusted library allocation
|
page read and write
|
||
5DF0000
|
trusted library allocation
|
page read and write
|
||
3B23000
|
trusted library allocation
|
page read and write
|
||
2CA5000
|
trusted library allocation
|
page read and write
|
||
8764000
|
heap
|
page read and write
|
||
3CC1000
|
trusted library allocation
|
page read and write
|
||
2802000
|
trusted library allocation
|
page read and write
|
||
968DCFD000
|
stack
|
page read and write
|
||
28365880000
|
trusted library allocation
|
page read and write
|
||
2C14000
|
trusted library allocation
|
page read and write
|
||
D50000
|
trusted library allocation
|
page read and write
|
||
8779000
|
heap
|
page read and write
|
||
2E6C000
|
trusted library allocation
|
page read and write
|
||
3AC0000
|
trusted library allocation
|
page read and write
|
||
7D7F000
|
trusted library allocation
|
page read and write
|
||
7CDC000
|
stack
|
page read and write
|
||
3ADD000
|
trusted library allocation
|
page read and write
|
||
963E000
|
stack
|
page read and write
|
||
A4A000
|
trusted library allocation
|
page execute and read and write
|
||
7CFE000
|
trusted library allocation
|
page read and write
|
||
87C7000
|
heap
|
page read and write
|
||
6200000
|
trusted library allocation
|
page read and write
|
||
7FFD9BA20000
|
trusted library allocation
|
page read and write
|
||
8AE000
|
stack
|
page read and write
|
||
2836734B000
|
trusted library allocation
|
page read and write
|
||
2C6B000
|
trusted library allocation
|
page read and write
|
||
3CD2000
|
trusted library allocation
|
page read and write
|
||
2D02000
|
trusted library allocation
|
page read and write
|
||
4E50000
|
heap
|
page read and write
|
||
2810000
|
trusted library allocation
|
page read and write
|
||
5BAE000
|
heap
|
page read and write
|
||
2DE3000
|
trusted library allocation
|
page read and write
|
||
5DE0000
|
trusted library allocation
|
page execute and read and write
|
||
3B4F000
|
trusted library allocation
|
page read and write
|
||
8861000
|
heap
|
page read and write
|
||
6222000
|
trusted library allocation
|
page read and write
|
||
3AF6000
|
trusted library allocation
|
page read and write
|
||
8740000
|
heap
|
page read and write
|
||
283657E0000
|
heap
|
page read and write
|
||
5CFE000
|
stack
|
page read and write
|
||
2C90000
|
trusted library allocation
|
page read and write
|
||
5360000
|
trusted library allocation
|
page execute and read and write
|
||
5BBB000
|
heap
|
page read and write
|
||
3B4A000
|
trusted library allocation
|
page read and write
|
||
895D000
|
stack
|
page read and write
|
||
3CA2000
|
trusted library allocation
|
page read and write
|
||
3C4E000
|
trusted library allocation
|
page read and write
|
||
2D59000
|
trusted library allocation
|
page read and write
|
||
A20000
|
trusted library allocation
|
page read and write
|
||
2D34000
|
trusted library allocation
|
page read and write
|
||
4E53000
|
heap
|
page read and write
|
||
2CCF000
|
trusted library allocation
|
page read and write
|
||
3AD5000
|
trusted library allocation
|
page read and write
|
||
28F0000
|
trusted library allocation
|
page read and write
|
||
8782000
|
heap
|
page read and write
|
||
7FFD9B90C000
|
trusted library allocation
|
page execute and read and write
|
||
A5B000
|
trusted library allocation
|
page execute and read and write
|
||
3D15000
|
trusted library allocation
|
page read and write
|
||
8960000
|
trusted library allocation
|
page execute and read and write
|
||
2C11000
|
trusted library allocation
|
page read and write
|
||
2E3D000
|
trusted library allocation
|
page read and write
|
||
A46000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9B86D000
|
trusted library allocation
|
page execute and read and write
|
||
627E000
|
stack
|
page read and write
|
||
620B000
|
trusted library allocation
|
page read and write
|
||
3B31000
|
trusted library allocation
|
page read and write
|
||
2DFC000
|
trusted library allocation
|
page read and write
|
||
2DD8000
|
trusted library allocation
|
page read and write
|
||
6280000
|
heap
|
page read and write
|
||
5E50000
|
trusted library allocation
|
page execute and read and write
|
||
7D5C000
|
trusted library allocation
|
page read and write
|
||
28367400000
|
trusted library allocation
|
page read and write
|
||
5D80000
|
trusted library allocation
|
page read and write
|
||
2836743F000
|
trusted library allocation
|
page read and write
|
||
A40000
|
trusted library allocation
|
page read and write
|
||
D40000
|
trusted library allocation
|
page read and write
|
||
875E000
|
heap
|
page read and write
|
||
8880000
|
heap
|
page read and write
|
||
28C0000
|
trusted library allocation
|
page execute and read and write
|
||
968DAFE000
|
stack
|
page read and write
|
||
2837FC40000
|
heap
|
page read and write
|
||
3CBA000
|
trusted library allocation
|
page read and write
|
||
53AC000
|
stack
|
page read and write
|
||
3AFB000
|
trusted library allocation
|
page read and write
|
||
7FFD9B906000
|
trusted library allocation
|
page read and write
|
||
7FFD9B8AC000
|
trusted library allocation
|
page execute and read and write
|
||
446000
|
remote allocation
|
page execute and read and write
|
||
3C89000
|
trusted library allocation
|
page read and write
|
||
3931000
|
trusted library allocation
|
page read and write
|
||
3CE9000
|
trusted library allocation
|
page read and write
|
||
283658C5000
|
heap
|
page read and write
|
||
3B55000
|
trusted library allocation
|
page read and write
|
||
3D5C000
|
trusted library allocation
|
page read and write
|
||
2E9F000
|
trusted library allocation
|
page read and write
|
||
A55000
|
trusted library allocation
|
page execute and read and write
|
||
28365883000
|
trusted library allocation
|
page read and write
|
||
B20000
|
heap
|
page read and write
|
||
5B69000
|
heap
|
page read and write
|
||
3D01000
|
trusted library allocation
|
page read and write
|
||
5BA9000
|
heap
|
page read and write
|
||
2DF1000
|
trusted library allocation
|
page read and write
|
||
5F5C000
|
stack
|
page read and write
|
||
A2D000
|
trusted library allocation
|
page execute and read and write
|
||
535A000
|
stack
|
page read and write
|
||
7FFD9BA04000
|
trusted library allocation
|
page read and write
|
||
3B0D000
|
trusted library allocation
|
page read and write
|
||
2900000
|
heap
|
page read and write
|
||
3C66000
|
trusted library allocation
|
page read and write
|
||
3AA2000
|
trusted library allocation
|
page read and write
|
||
393A000
|
trusted library allocation
|
page read and write
|
||
28377307000
|
trusted library allocation
|
page read and write
|
||
2C7C000
|
trusted library allocation
|
page read and write
|
||
7FFD9BA30000
|
trusted library allocation
|
page read and write
|
||
2853000
|
heap
|
page execute and read and write
|
||
3AA7000
|
trusted library allocation
|
page read and write
|
||
3911000
|
trusted library allocation
|
page read and write
|
||
3CD5000
|
trusted library allocation
|
page read and write
|
||
2CF4000
|
trusted library allocation
|
page read and write
|
||
53E0000
|
trusted library allocation
|
page read and write
|
||
970E000
|
stack
|
page read and write
|
||
A23000
|
trusted library allocation
|
page execute and read and write
|
||
8726000
|
heap
|
page read and write
|
||
7FFD9B874000
|
trusted library allocation
|
page read and write
|
||
D10000
|
heap
|
page read and write
|
||
9E60000
|
heap
|
page read and write
|
||
7FFD9B900000
|
trusted library allocation
|
page read and write
|
||
3B01000
|
trusted library allocation
|
page read and write
|
||
283656E0000
|
heap
|
page read and write
|
||
8835000
|
heap
|
page read and write
|
||
5D10000
|
trusted library allocation
|
page read and write
|
||
4FA000
|
stack
|
page read and write
|
||
3CAD000
|
trusted library allocation
|
page read and write
|
||
2EF1000
|
trusted library allocation
|
page read and write
|
||
53D0000
|
trusted library allocation
|
page read and write
|
||
3CDD000
|
trusted library allocation
|
page read and write
|
||
5B9E000
|
heap
|
page read and write
|
||
2F64000
|
trusted library allocation
|
page read and write
|
||
878D000
|
heap
|
page read and write
|
||
2E68000
|
trusted library allocation
|
page read and write
|
||
7DA0000
|
trusted library allocation
|
page read and write
|
||
7FFD9B87D000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9B87B000
|
trusted library allocation
|
page execute and read and write
|
||
7D60000
|
trusted library allocation
|
page read and write
|
||
28365895000
|
heap
|
page read and write
|
||
3B68000
|
trusted library allocation
|
page read and write
|
||
953E000
|
stack
|
page read and write
|
||
2837FBF0000
|
heap
|
page read and write
|
||
2837FBE2000
|
trusted library section
|
page read and write
|
||
968D4FE000
|
stack
|
page read and write
|
||
5D50000
|
trusted library allocation
|
page read and write
|
||
2C79000
|
trusted library allocation
|
page read and write
|
||
7DE0000
|
trusted library allocation
|
page read and write
|
||
508E000
|
stack
|
page read and write
|
||
3C81000
|
trusted library allocation
|
page read and write
|
||
5F9E000
|
stack
|
page read and write
|
||
7D44000
|
trusted library allocation
|
page read and write
|
||
400000
|
remote allocation
|
page execute and read and write
|
||
27DB000
|
trusted library allocation
|
page read and write
|
||
D60000
|
heap
|
page read and write
|
||
3AB9000
|
trusted library allocation
|
page read and write
|
||
3CFC000
|
trusted library allocation
|
page read and write
|
||
881A000
|
heap
|
page read and write
|
||
27F1000
|
trusted library allocation
|
page read and write
|
||
61E0000
|
trusted library allocation
|
page execute and read and write
|
||
2815000
|
trusted library allocation
|
page read and write
|
||
283672F0000
|
heap
|
page execute and read and write
|
||
2E5E000
|
trusted library allocation
|
page read and write
|
||
A80000
|
trusted library allocation
|
page execute and read and write
|
||
28367468000
|
trusted library allocation
|
page read and write
|
||
968D9FE000
|
stack
|
page read and write
|
||
2850000
|
heap
|
page execute and read and write
|
||
2ADD000
|
trusted library allocation
|
page read and write
|
||
8758000
|
heap
|
page read and write
|
||
3CB4000
|
trusted library allocation
|
page read and write
|
||
518E000
|
stack
|
page read and write
|
||
2F79000
|
trusted library allocation
|
page read and write
|
||
2CDB000
|
trusted library allocation
|
page read and write
|
||
8C5000
|
heap
|
page read and write
|
||
53C0000
|
trusted library allocation
|
page execute and read and write
|
||
2CDE000
|
trusted library allocation
|
page read and write
|
||
AC8000
|
heap
|
page read and write
|
||
2F35000
|
trusted library allocation
|
page read and write
|
||
3CA8000
|
trusted library allocation
|
page read and write
|
||
52CE000
|
stack
|
page read and write
|
||
2D0A000
|
trusted library allocation
|
page read and write
|
||
F86000
|
heap
|
page read and write
|
||
7D7A000
|
trusted library allocation
|
page read and write
|
||
7FFD9B854000
|
trusted library allocation
|
page read and write
|
||
5B93000
|
heap
|
page read and write
|
||
53EA000
|
trusted library allocation
|
page read and write
|
||
283655DC000
|
heap
|
page read and write
|
||
3B3C000
|
trusted library allocation
|
page read and write
|
||
8845000
|
heap
|
page read and write
|
||
2D66000
|
trusted library allocation
|
page read and write
|
||
7C9F000
|
stack
|
page read and write
|
||
2F99000
|
trusted library allocation
|
page read and write
|
||
8C0000
|
heap
|
page read and write
|
||
283656AA000
|
heap
|
page read and write
|
||
2C84000
|
trusted library allocation
|
page read and write
|
||
3D29000
|
trusted library allocation
|
page read and write
|
||
27D4000
|
trusted library allocation
|
page read and write
|
||
3CC5000
|
trusted library allocation
|
page read and write
|
||
51CE000
|
stack
|
page read and write
|
||
2D45000
|
trusted library allocation
|
page read and write
|
||
8890000
|
heap
|
page read and write
|
||
7FFD9B870000
|
trusted library allocation
|
page read and write
|
||
3D19000
|
trusted library allocation
|
page read and write
|
||
7CFB000
|
trusted library allocation
|
page read and write
|
||
28377301000
|
trusted library allocation
|
page read and write
|
||
2E3B000
|
trusted library allocation
|
page read and write
|
||
2C76000
|
trusted library allocation
|
page read and write
|
||
3B26000
|
trusted library allocation
|
page read and write
|
||
60D0000
|
trusted library allocation
|
page read and write
|
||
A42000
|
trusted library allocation
|
page read and write
|
||
2836563D000
|
heap
|
page read and write
|
||
2911000
|
trusted library allocation
|
page read and write
|
||
968DBFE000
|
stack
|
page read and write
|
||
3B08000
|
trusted library allocation
|
page read and write
|
||
5ABC000
|
stack
|
page read and write
|
||
7E00000
|
trusted library allocation
|
page read and write
|
||
ABB000
|
heap
|
page read and write
|
||
7D50000
|
trusted library allocation
|
page read and write
|
||
968D5FE000
|
stack
|
page read and write
|
||
2836563B000
|
heap
|
page read and write
|
||
E6E000
|
stack
|
page read and write
|
||
3B77000
|
trusted library allocation
|
page read and write
|
||
7FFD9B936000
|
trusted library allocation
|
page execute and read and write
|
||
D30000
|
trusted library allocation
|
page read and write
|
||
5E40000
|
trusted library allocation
|
page read and write
|
||
2D80000
|
trusted library allocation
|
page read and write
|
||
860000
|
heap
|
page read and write
|
||
7D62000
|
trusted library allocation
|
page read and write
|
||
8ABD000
|
stack
|
page read and write
|
||
87DD000
|
heap
|
page read and write
|
||
283655D0000
|
heap
|
page read and write
|
||
7FFD9B910000
|
trusted library allocation
|
page execute and read and write
|
||
2890000
|
heap
|
page execute and read and write
|
||
3D26000
|
trusted library allocation
|
page read and write
|
||
3D08000
|
trusted library allocation
|
page read and write
|
||
7D92000
|
trusted library allocation
|
page read and write
|
||
53F0000
|
trusted library allocation
|
page read and write
|
||
2EFD000
|
trusted library allocation
|
page read and write
|
||
3D50000
|
trusted library allocation
|
page read and write
|
||
7FFD9BA10000
|
trusted library allocation
|
page read and write
|
||
6211000
|
trusted library allocation
|
page read and write
|
||
2D42000
|
trusted library allocation
|
page read and write
|
||
A57000
|
trusted library allocation
|
page execute and read and write
|
||
609C000
|
stack
|
page read and write
|
||
28365552000
|
unkown
|
page readonly
|
||
28B2000
|
trusted library allocation
|
page read and write
|
||
2F03000
|
trusted library allocation
|
page read and write
|
||
5AE0000
|
heap
|
page read and write
|
||
B5C000
|
heap
|
page read and write
|
||
7E0E000
|
trusted library allocation
|
page read and write
|
||
7FFD9B9F5000
|
trusted library allocation
|
page read and write
|
||
2ED8000
|
trusted library allocation
|
page read and write
|
||
7FFD9B852000
|
trusted library allocation
|
page read and write
|
||
28365550000
|
unkown
|
page readonly
|
||
3C2B000
|
trusted library allocation
|
page read and write
|
||
2820000
|
trusted library allocation
|
page read and write
|
||
7D69000
|
trusted library allocation
|
page read and write
|
||
7CE1000
|
trusted library allocation
|
page read and write
|
||
2836737C000
|
trusted library allocation
|
page read and write
|
||
5AC6000
|
heap
|
page read and write
|
||
2E71000
|
trusted library allocation
|
page read and write
|
||
A10000
|
trusted library allocation
|
page read and write
|
||
3C54000
|
trusted library allocation
|
page read and write
|
||
283657C0000
|
heap
|
page read and write
|
||
3D6B000
|
trusted library allocation
|
page read and write
|
||
980E000
|
stack
|
page read and write
|
||
880E000
|
heap
|
page read and write
|
||
27FD000
|
trusted library allocation
|
page read and write
|
||
60D6000
|
trusted library allocation
|
page read and write
|
||
3AE8000
|
trusted library allocation
|
page read and write
|
||
2D3F000
|
trusted library allocation
|
page read and write
|
||
99C0000
|
heap
|
page read and write
|
||
A70000
|
trusted library allocation
|
page read and write
|
||
2738000
|
trusted library allocation
|
page read and write
|
||
3D55000
|
trusted library allocation
|
page read and write
|
||
2E03000
|
trusted library allocation
|
page read and write
|
||
3B29000
|
trusted library allocation
|
page read and write
|
||
2C3F000
|
trusted library allocation
|
page read and write
|
||
6216000
|
trusted library allocation
|
page read and write
|
||
3D3D000
|
trusted library allocation
|
page read and write
|
||
A90000
|
heap
|
page read and write
|
||
5B74000
|
heap
|
page read and write
|
||
283672C0000
|
heap
|
page execute and read and write
|
||
94FF000
|
stack
|
page read and write
|
||
7F890000
|
trusted library allocation
|
page execute and read and write
|
||
A3D000
|
trusted library allocation
|
page execute and read and write
|
||
A98000
|
heap
|
page read and write
|
||
622E000
|
trusted library allocation
|
page read and write
|
||
5BFE000
|
stack
|
page read and write
|
||
2F92000
|
trusted library allocation
|
page read and write
|
||
87C2000
|
heap
|
page read and write
|
||
2837F9C0000
|
trusted library section
|
page read and write
|
||
7FFD9BA00000
|
trusted library allocation
|
page read and write
|
||
87EA000
|
heap
|
page read and write
|
||
968D7FE000
|
stack
|
page read and write
|
||
3B61000
|
trusted library allocation
|
page read and write
|
||
99D1000
|
heap
|
page read and write
|
||
283658C0000
|
heap
|
page read and write
|
||
283655F9000
|
heap
|
page read and write
|
||
7D10000
|
trusted library allocation
|
page read and write
|
||
3B14000
|
trusted library allocation
|
page read and write
|
||
394B000
|
trusted library allocation
|
page read and write
|
||
5D20000
|
trusted library allocation
|
page read and write
|
||
5B5B000
|
heap
|
page read and write
|
||
5B98000
|
heap
|
page read and write
|
||
5D60000
|
trusted library allocation
|
page read and write
|
||
3CCF000
|
trusted library allocation
|
page read and write
|
||
28365646000
|
heap
|
page read and write
|
||
2CD1000
|
trusted library allocation
|
page read and write
|
||
A50000
|
trusted library allocation
|
page read and write
|
||
5F7000
|
stack
|
page read and write
|
||
A24000
|
trusted library allocation
|
page read and write
|
||
7D95000
|
trusted library allocation
|
page read and write
|
||
2CE9000
|
trusted library allocation
|
page read and write
|
||
7CF5000
|
trusted library allocation
|
page read and write
|
||
7D78000
|
trusted library allocation
|
page read and write
|
||
8732000
|
heap
|
page read and write
|
||
28367301000
|
trusted library allocation
|
page read and write
|
||
2AED000
|
trusted library allocation
|
page read and write
|
||
876E000
|
heap
|
page read and write
|
||
3953000
|
trusted library allocation
|
page read and write
|
||
7DD0000
|
trusted library allocation
|
page execute and read and write
|
||
7D85000
|
trusted library allocation
|
page read and write
|
||
61F0000
|
trusted library allocation
|
page read and write
|
||
3B5C000
|
trusted library allocation
|
page read and write
|
||
3997000
|
trusted library allocation
|
page read and write
|
||
60E0000
|
heap
|
page read and write
|
||
4F3E000
|
stack
|
page read and write
|
||
968D8FD000
|
stack
|
page read and write
|
||
27F6000
|
trusted library allocation
|
page read and write
|
||
8B0000
|
heap
|
page read and write
|
||
87E5000
|
heap
|
page read and write
|
||
C8E000
|
stack
|
page read and write
|
||
884F000
|
heap
|
page read and write
|
||
2D4D000
|
trusted library allocation
|
page read and write
|
||
2C2A000
|
trusted library allocation
|
page read and write
|
||
432000
|
remote allocation
|
page execute and read and write
|
||
437000
|
remote allocation
|
page execute and read and write
|
||
3D69000
|
trusted library allocation
|
page read and write
|
||
5B57000
|
heap
|
page read and write
|
||
2C38000
|
trusted library allocation
|
page read and write
|
||
7DF0000
|
heap
|
page read and write
|
||
28367492000
|
trusted library allocation
|
page read and write
|
||
7FFD9B860000
|
trusted library allocation
|
page read and write
|
There are 458 hidden memdumps, click here to show them.