Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
b.exe
|
PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
initial sample
|
||
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_b.exe_6aed87d74fcac5fc678ad6e46e3a3777b5e2266d_f4d35178_8221b3c3-b7a5-460d-93de-9e5b89fe33c7\Report.wer
|
Unicode text, UTF-16, little-endian text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Roaming\gdi32.dll
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WER95AE.tmp.dmp
|
Mini DuMP crash report, 15 streams, Sat Nov 23 09:24:59 2024, 0x1205a4 type
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WER968A.tmp.WERInternalMetadata.xml
|
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WER96B9.tmp.xml
|
XML 1.0 document, ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Windows\appcompat\Programs\Amcache.hve
|
MS Windows registry file, NT/2000 or above
|
dropped
|
||
\Device\ConDrv
|
ASCII text, with very long lines (350), with CRLF, LF line terminators
|
dropped
|
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\b.exe
|
"C:\Users\user\Desktop\b.exe"
|
||
C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe
|
"C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe"
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\SysWOW64\WerFault.exe
|
C:\Windows\SysWOW64\WerFault.exe -u -p 7648 -s 1228
|
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
https://frogs-severz.sbs/api
|
104.21.88.250
|
||
https://revirepart.biz/api
|
104.21.43.198
|
||
https://duckduckgo.com/chrome_newtab
|
unknown
|
||
https://frogs-severz.sbs/J
|
unknown
|
||
https://duckduckgo.com/ac/?q=
|
unknown
|
||
https://www.google.com/images/branding/product/ico/googleg_lodp.ico
|
unknown
|
||
https://revirepart.biz/
|
unknown
|
||
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
|
unknown
|
||
https://frogs-severz.sbs/api;
|
unknown
|
||
http://crl.rootca1.amazontrust.com/rootca1.crl0
|
unknown
|
||
http://upx.sf.net
|
unknown
|
||
https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
|
unknown
|
||
https://frogs-severz.sbs/api8
|
unknown
|
||
http://ocsp.rootca1.amazontrust.com0:
|
unknown
|
||
https://support.office.com/article/7D48285B-20E8-4B9B-91AD-216E34163BAD?wt.mc_id=EnterPK2016
|
unknown
|
||
https://support.office.com/article/94ba2e0b-638e-4a92-8857-2cb5ac1d8e17
|
unknown
|
||
https://www.ecosia.org/newtab/
|
unknown
|
||
https://support.mozilla.org/kb/customize-firefox-controls-buttons-and-toolbars?utm_source=firefox-br
|
unknown
|
||
https://frogs-severz.sbs:443/api
|
unknown
|
||
https://ac.ecosia.org/autocomplete?q=
|
unknown
|
||
https://frogs-severz.sbs/
|
unknown
|
||
https://frogs-severz.sbs/apibu
|
unknown
|
||
http://x1.c.lencr.org/0
|
unknown
|
||
http://x1.i.lencr.org/0
|
unknown
|
||
revirepart.biz
|
|||
https://support.office.com/article/94ba2e0b-638e-4a92-8857-2cb5ac1d8e17Install
|
unknown
|
||
https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
|
unknown
|
||
https://support.microsof
|
unknown
|
||
http://crt.rootca1.amazontrust.com/rootca1.cer0?
|
unknown
|
||
https://frogs-severz.sbs/.
|
unknown
|
||
https://frogs-severz.sbs/pp
|
unknown
|
||
https://frogs-severz.sbs:443/apicuriz
|
unknown
|
||
https://support.office.com/article/7D48285B-20E8-4B9B-91AD-216E34163BAD?wt.mc_id=EnterPK2016Examples
|
unknown
|
||
https://frogs-severz.sbs/api$
|
unknown
|
||
https://support.mozilla.org/products/firefoxgro.all
|
unknown
|
||
https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
|
unknown
|
||
https://frogs-severz.sbs/apie
|
unknown
|
There are 27 hidden URLs, click here to show them.
Domains
Name
|
IP
|
Malicious
|
|
---|---|---|---|
frogs-severz.sbs
|
104.21.88.250
|
||
revirepart.biz
|
104.21.43.198
|
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
104.21.88.250
|
frogs-severz.sbs
|
United States
|
||
104.21.43.198
|
revirepart.biz
|
United States
|
Registry
Path
|
Value
|
Malicious
|
|
---|---|---|---|
\REGISTRY\A\{5d97efda-53d6-7b97-62a9-e90c35988bd9}\Root\InventoryApplicationFile\b.exe|9a6245b95760f5f5
|
ProgramId
|
||
\REGISTRY\A\{5d97efda-53d6-7b97-62a9-e90c35988bd9}\Root\InventoryApplicationFile\b.exe|9a6245b95760f5f5
|
FileId
|
||
\REGISTRY\A\{5d97efda-53d6-7b97-62a9-e90c35988bd9}\Root\InventoryApplicationFile\b.exe|9a6245b95760f5f5
|
LowerCaseLongPath
|
||
\REGISTRY\A\{5d97efda-53d6-7b97-62a9-e90c35988bd9}\Root\InventoryApplicationFile\b.exe|9a6245b95760f5f5
|
LongPathHash
|
||
\REGISTRY\A\{5d97efda-53d6-7b97-62a9-e90c35988bd9}\Root\InventoryApplicationFile\b.exe|9a6245b95760f5f5
|
Name
|
||
\REGISTRY\A\{5d97efda-53d6-7b97-62a9-e90c35988bd9}\Root\InventoryApplicationFile\b.exe|9a6245b95760f5f5
|
OriginalFileName
|
||
\REGISTRY\A\{5d97efda-53d6-7b97-62a9-e90c35988bd9}\Root\InventoryApplicationFile\b.exe|9a6245b95760f5f5
|
Publisher
|
||
\REGISTRY\A\{5d97efda-53d6-7b97-62a9-e90c35988bd9}\Root\InventoryApplicationFile\b.exe|9a6245b95760f5f5
|
Version
|
||
\REGISTRY\A\{5d97efda-53d6-7b97-62a9-e90c35988bd9}\Root\InventoryApplicationFile\b.exe|9a6245b95760f5f5
|
BinFileVersion
|
||
\REGISTRY\A\{5d97efda-53d6-7b97-62a9-e90c35988bd9}\Root\InventoryApplicationFile\b.exe|9a6245b95760f5f5
|
BinaryType
|
||
\REGISTRY\A\{5d97efda-53d6-7b97-62a9-e90c35988bd9}\Root\InventoryApplicationFile\b.exe|9a6245b95760f5f5
|
ProductName
|
||
\REGISTRY\A\{5d97efda-53d6-7b97-62a9-e90c35988bd9}\Root\InventoryApplicationFile\b.exe|9a6245b95760f5f5
|
ProductVersion
|
||
\REGISTRY\A\{5d97efda-53d6-7b97-62a9-e90c35988bd9}\Root\InventoryApplicationFile\b.exe|9a6245b95760f5f5
|
LinkDate
|
||
\REGISTRY\A\{5d97efda-53d6-7b97-62a9-e90c35988bd9}\Root\InventoryApplicationFile\b.exe|9a6245b95760f5f5
|
BinProductVersion
|
||
\REGISTRY\A\{5d97efda-53d6-7b97-62a9-e90c35988bd9}\Root\InventoryApplicationFile\b.exe|9a6245b95760f5f5
|
AppxPackageFullName
|
||
\REGISTRY\A\{5d97efda-53d6-7b97-62a9-e90c35988bd9}\Root\InventoryApplicationFile\b.exe|9a6245b95760f5f5
|
AppxPackageRelativeId
|
||
\REGISTRY\A\{5d97efda-53d6-7b97-62a9-e90c35988bd9}\Root\InventoryApplicationFile\b.exe|9a6245b95760f5f5
|
Size
|
||
\REGISTRY\A\{5d97efda-53d6-7b97-62a9-e90c35988bd9}\Root\InventoryApplicationFile\b.exe|9a6245b95760f5f5
|
Language
|
||
\REGISTRY\A\{5d97efda-53d6-7b97-62a9-e90c35988bd9}\Root\InventoryApplicationFile\b.exe|9a6245b95760f5f5
|
Usn
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\IdentityCRL\ClockData
|
ClockTimeSeconds
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\IdentityCRL\ClockData
|
TickCount
|
There are 11 hidden registries, click here to show them.
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
862000
|
unkown
|
page execute and read and write
|
||
2947000
|
heap
|
page read and write
|
||
4DF6000
|
trusted library allocation
|
page read and write
|
||
4DF2000
|
trusted library allocation
|
page read and write
|
||
4DE8000
|
trusted library allocation
|
page read and write
|
||
2948000
|
heap
|
page read and write
|
||
292F000
|
heap
|
page read and write
|
||
4DE2000
|
trusted library allocation
|
page read and write
|
||
4DD4000
|
trusted library allocation
|
page read and write
|
||
2441000
|
remote allocation
|
page execute read
|
||
50A0000
|
trusted library allocation
|
page read and write
|
||
4DDC000
|
trusted library allocation
|
page read and write
|
||
11AF000
|
stack
|
page read and write
|
||
4DD0000
|
trusted library allocation
|
page read and write
|
||
4E11000
|
trusted library allocation
|
page read and write
|
||
4DD8000
|
trusted library allocation
|
page read and write
|
||
4DCF000
|
trusted library allocation
|
page read and write
|
||
4DB3000
|
trusted library allocation
|
page read and write
|
||
4EFD000
|
trusted library allocation
|
page read and write
|
||
1200000
|
trusted library allocation
|
page read and write
|
||
420000
|
heap
|
page read and write
|
||
28A6000
|
heap
|
page read and write
|
||
4E5C000
|
trusted library allocation
|
page read and write
|
||
4DD9000
|
trusted library allocation
|
page read and write
|
||
4DF3000
|
trusted library allocation
|
page read and write
|
||
4DDA000
|
trusted library allocation
|
page read and write
|
||
8F2000
|
unkown
|
page readonly
|
||
2C09000
|
trusted library allocation
|
page read and write
|
||
4DCE000
|
trusted library allocation
|
page read and write
|
||
28CB000
|
heap
|
page read and write
|
||
4DC1000
|
trusted library allocation
|
page read and write
|
||
2936000
|
heap
|
page read and write
|
||
2948000
|
heap
|
page read and write
|
||
4DDF000
|
trusted library allocation
|
page read and write
|
||
2C04000
|
trusted library allocation
|
page read and write
|
||
2888000
|
heap
|
page read and write
|
||
4DCF000
|
trusted library allocation
|
page read and write
|
||
2BFA000
|
trusted library allocation
|
page read and write
|
||
28CB000
|
heap
|
page read and write
|
||
2948000
|
heap
|
page read and write
|
||
E55000
|
heap
|
page read and write
|
||
1207000
|
trusted library allocation
|
page execute and read and write
|
||
2948000
|
heap
|
page read and write
|
||
4E37000
|
trusted library allocation
|
page read and write
|
||
A86E000
|
stack
|
page read and write
|
||
4EDD000
|
trusted library allocation
|
page read and write
|
||
4DCF000
|
trusted library allocation
|
page read and write
|
||
4DEE000
|
trusted library allocation
|
page read and write
|
||
4E54000
|
trusted library allocation
|
page read and write
|
||
2948000
|
heap
|
page read and write
|
||
2936000
|
heap
|
page read and write
|
||
11DD000
|
trusted library allocation
|
page execute and read and write
|
||
2946000
|
heap
|
page read and write
|
||
2948000
|
heap
|
page read and write
|
||
4E16000
|
trusted library allocation
|
page read and write
|
||
4DCE000
|
trusted library allocation
|
page read and write
|
||
4E00000
|
trusted library allocation
|
page read and write
|
||
2948000
|
heap
|
page read and write
|
||
4DCF000
|
trusted library allocation
|
page read and write
|
||
4E33000
|
trusted library allocation
|
page read and write
|
||
2934000
|
heap
|
page read and write
|
||
4DB2000
|
trusted library allocation
|
page read and write
|
||
4DA9000
|
trusted library allocation
|
page read and write
|
||
29E0000
|
trusted library allocation
|
page read and write
|
||
4DDF000
|
trusted library allocation
|
page read and write
|
||
2943000
|
heap
|
page read and write
|
||
FD7000
|
heap
|
page read and write
|
||
4DB0000
|
trusted library allocation
|
page read and write
|
||
2946000
|
heap
|
page read and write
|
||
4DDF000
|
trusted library allocation
|
page read and write
|
||
4DDF000
|
trusted library allocation
|
page read and write
|
||
4DA1000
|
trusted library allocation
|
page read and write
|
||
2948000
|
heap
|
page read and write
|
||
294F000
|
heap
|
page read and write
|
||
294C000
|
heap
|
page read and write
|
||
4DC5000
|
trusted library allocation
|
page read and write
|
||
4DA8000
|
trusted library allocation
|
page read and write
|
||
4DC0000
|
trusted library allocation
|
page read and write
|
||
76EF000
|
stack
|
page read and write
|
||
11E0000
|
trusted library allocation
|
page read and write
|
||
FDA000
|
heap
|
page read and write
|
||
4DBC000
|
trusted library allocation
|
page read and write
|
||
2948000
|
heap
|
page read and write
|
||
2DB000
|
stack
|
page read and write
|
||
4DBB000
|
trusted library allocation
|
page read and write
|
||
A72E000
|
stack
|
page read and write
|
||
4DB3000
|
trusted library allocation
|
page read and write
|
||
862000
|
unkown
|
page readonly
|
||
4F7D000
|
trusted library allocation
|
page read and write
|
||
FB0000
|
heap
|
page read and write
|
||
11C0000
|
trusted library allocation
|
page read and write
|
||
4DCF000
|
trusted library allocation
|
page read and write
|
||
295A000
|
heap
|
page read and write
|
||
4E42000
|
trusted library allocation
|
page read and write
|
||
294F000
|
heap
|
page read and write
|
||
4DAA000
|
trusted library allocation
|
page read and write
|
||
105E000
|
heap
|
page read and write
|
||
4E37000
|
trusted library allocation
|
page read and write
|
||
1210000
|
heap
|
page read and write
|
||
4DCF000
|
trusted library allocation
|
page read and write
|
||
5080000
|
heap
|
page read and write
|
||
4DD0000
|
trusted library allocation
|
page read and write
|
||
2948000
|
heap
|
page read and write
|
||
4DB9000
|
trusted library allocation
|
page read and write
|
||
4E37000
|
trusted library allocation
|
page read and write
|
||
4DDF000
|
trusted library allocation
|
page read and write
|
||
292F000
|
heap
|
page read and write
|
||
4EA1000
|
heap
|
page read and write
|
||
449D000
|
stack
|
page read and write
|
||
425000
|
heap
|
page read and write
|
||
6CDD0000
|
unkown
|
page readonly
|
||
E50000
|
heap
|
page read and write
|
||
4DDF000
|
trusted library allocation
|
page read and write
|
||
2943000
|
heap
|
page read and write
|
||
1220000
|
heap
|
page read and write
|
||
4E00000
|
trusted library allocation
|
page read and write
|
||
4DF7000
|
trusted library allocation
|
page read and write
|
||
4E04000
|
trusted library allocation
|
page read and write
|
||
4DEF000
|
trusted library allocation
|
page read and write
|
||
2947000
|
heap
|
page read and write
|
||
4BBE000
|
stack
|
page read and write
|
||
4DCF000
|
trusted library allocation
|
page read and write
|
||
4DC0000
|
trusted library allocation
|
page read and write
|
||
4DE6000
|
trusted library allocation
|
page read and write
|
||
2BE0000
|
heap
|
page read and write
|
||
4DD6000
|
trusted library allocation
|
page read and write
|
||
4DDF000
|
trusted library allocation
|
page read and write
|
||
2925000
|
heap
|
page read and write
|
||
2943000
|
heap
|
page read and write
|
||
2948000
|
heap
|
page read and write
|
||
2960000
|
heap
|
page read and write
|
||
2948000
|
heap
|
page read and write
|
||
4DA4000
|
trusted library allocation
|
page read and write
|
||
4EA6000
|
trusted library allocation
|
page read and write
|
||
2B7F000
|
stack
|
page read and write
|
||
283D000
|
stack
|
page read and write
|
||
496E000
|
stack
|
page read and write
|
||
2947000
|
heap
|
page read and write
|
||
2935000
|
heap
|
page read and write
|
||
43F5000
|
trusted library allocation
|
page read and write
|
||
435E000
|
stack
|
page read and write
|
||
2945000
|
heap
|
page read and write
|
||
DF0000
|
heap
|
page read and write
|
||
4DDF000
|
trusted library allocation
|
page read and write
|
||
4DDF000
|
trusted library allocation
|
page read and write
|
||
4DDF000
|
trusted library allocation
|
page read and write
|
||
4DDC000
|
trusted library allocation
|
page read and write
|
||
25DE000
|
stack
|
page read and write
|
||
2A2E000
|
stack
|
page read and write
|
||
2948000
|
heap
|
page read and write
|
||
4DF9000
|
trusted library allocation
|
page read and write
|
||
912000
|
unkown
|
page readonly
|
||
4DA5000
|
trusted library allocation
|
page read and write
|
||
4DBB000
|
trusted library allocation
|
page read and write
|
||
50D0000
|
trusted library allocation
|
page read and write
|
||
4DDF000
|
trusted library allocation
|
page read and write
|
||
4DBB000
|
trusted library allocation
|
page read and write
|
||
4DD0000
|
trusted library allocation
|
page read and write
|
||
2484000
|
remote allocation
|
page readonly
|
||
4DCF000
|
trusted library allocation
|
page read and write
|
||
B090000
|
trusted library allocation
|
page read and write
|
||
2948000
|
heap
|
page read and write
|
||
4DC1000
|
trusted library allocation
|
page read and write
|
||
4DD6000
|
trusted library allocation
|
page read and write
|
||
4DB2000
|
trusted library allocation
|
page read and write
|
||
4DA1000
|
trusted library allocation
|
page read and write
|
||
2943000
|
heap
|
page read and write
|
||
4DCF000
|
trusted library allocation
|
page read and write
|
||
25E0000
|
heap
|
page read and write
|
||
2944000
|
heap
|
page read and write
|
||
4DE7000
|
trusted library allocation
|
page read and write
|
||
4DB0000
|
trusted library allocation
|
page read and write
|
||
120B000
|
trusted library allocation
|
page execute and read and write
|
||
4DB6000
|
trusted library allocation
|
page read and write
|
||
4DF6000
|
trusted library allocation
|
page read and write
|
||
2948000
|
heap
|
page read and write
|
||
2948000
|
heap
|
page read and write
|
||
4DDF000
|
trusted library allocation
|
page read and write
|
||
290E000
|
heap
|
page read and write
|
||
4DBB000
|
trusted library allocation
|
page read and write
|
||
4DB9000
|
trusted library allocation
|
page read and write
|
||
4DCF000
|
trusted library allocation
|
page read and write
|
||
106E000
|
heap
|
page read and write
|
||
4DCF000
|
trusted library allocation
|
page read and write
|
||
4DCF000
|
trusted library allocation
|
page read and write
|
||
2948000
|
heap
|
page read and write
|
||
5160000
|
heap
|
page execute and read and write
|
||
B07F000
|
stack
|
page read and write
|
||
4DBA000
|
trusted library allocation
|
page read and write
|
||
2948000
|
heap
|
page read and write
|
||
2AD0000
|
heap
|
page execute and read and write
|
||
4DBB000
|
trusted library allocation
|
page read and write
|
||
4DCE000
|
trusted library allocation
|
page read and write
|
||
2BDE000
|
stack
|
page read and write
|
||
4E20000
|
trusted library allocation
|
page read and write
|
||
4DDF000
|
trusted library allocation
|
page read and write
|
||
2948000
|
heap
|
page read and write
|
||
4DA5000
|
trusted library allocation
|
page read and write
|
||
B080000
|
trusted library allocation
|
page read and write
|
||
4DCE000
|
trusted library allocation
|
page read and write
|
||
295A000
|
heap
|
page read and write
|
||
4EA0000
|
heap
|
page read and write
|
||
2920000
|
heap
|
page read and write
|
||
2948000
|
heap
|
page read and write
|
||
11F0000
|
trusted library allocation
|
page read and write
|
||
4DBA000
|
trusted library allocation
|
page read and write
|
||
2499000
|
remote allocation
|
page readonly
|
||
4DBB000
|
trusted library allocation
|
page read and write
|
||
4E10000
|
trusted library allocation
|
page read and write
|
||
295A000
|
heap
|
page read and write
|
||
4DDF000
|
trusted library allocation
|
page read and write
|
||
FB8000
|
heap
|
page read and write
|
||
2947000
|
heap
|
page read and write
|
||
4DCF000
|
trusted library allocation
|
page read and write
|
||
294B000
|
heap
|
page read and write
|
||
4E06000
|
trusted library allocation
|
page read and write
|
||
2948000
|
heap
|
page read and write
|
||
AF3E000
|
stack
|
page read and write
|
||
4DAA000
|
trusted library allocation
|
page read and write
|
||
2927000
|
heap
|
page read and write
|
||
2948000
|
heap
|
page read and write
|
||
E3E000
|
stack
|
page read and write
|
||
4DB6000
|
trusted library allocation
|
page read and write
|
||
2946000
|
heap
|
page read and write
|
||
2487000
|
remote allocation
|
page execute and read and write
|
||
4DBC000
|
trusted library allocation
|
page read and write
|
||
D10000
|
heap
|
page read and write
|
||
4DD6000
|
trusted library allocation
|
page read and write
|
||
4DC7000
|
trusted library allocation
|
page read and write
|
||
2927000
|
heap
|
page read and write
|
||
4DCF000
|
trusted library allocation
|
page read and write
|
||
6CDEB000
|
unkown
|
page readonly
|
||
860000
|
unkown
|
page readonly
|
||
4DBA000
|
trusted library allocation
|
page read and write
|
||
2948000
|
heap
|
page read and write
|
||
4DDF000
|
trusted library allocation
|
page read and write
|
||
2935000
|
heap
|
page read and write
|
||
4DCF000
|
trusted library allocation
|
page read and write
|
||
427000
|
heap
|
page read and write
|
||
11D0000
|
trusted library allocation
|
page read and write
|
||
4DCF000
|
trusted library allocation
|
page read and write
|
||
4DCF000
|
trusted library allocation
|
page read and write
|
||
1088000
|
heap
|
page read and write
|
||
4DA9000
|
trusted library allocation
|
page read and write
|
||
4DDF000
|
trusted library allocation
|
page read and write
|
||
295A000
|
heap
|
page read and write
|
||
2948000
|
heap
|
page read and write
|
||
9AC000
|
stack
|
page read and write
|
||
2948000
|
heap
|
page read and write
|
||
4DDF000
|
trusted library allocation
|
page read and write
|
||
4D1F000
|
stack
|
page read and write
|
||
4E64000
|
trusted library allocation
|
page read and write
|
||
4DB6000
|
trusted library allocation
|
page read and write
|
||
4DB7000
|
trusted library allocation
|
page read and write
|
||
6CE42000
|
unkown
|
page readonly
|
||
FBE000
|
heap
|
page read and write
|
||
4E07000
|
trusted library allocation
|
page read and write
|
||
4E58000
|
trusted library allocation
|
page read and write
|
||
4E30000
|
trusted library allocation
|
page read and write
|
||
4DE9000
|
trusted library allocation
|
page read and write
|
||
2948000
|
heap
|
page read and write
|
||
515E000
|
stack
|
page read and write
|
||
4DDF000
|
trusted library allocation
|
page read and write
|
||
2948000
|
heap
|
page read and write
|
||
4DDD000
|
trusted library allocation
|
page read and write
|
||
ACFE000
|
stack
|
page read and write
|
||
4E0E000
|
trusted library allocation
|
page read and write
|
||
2935000
|
heap
|
page read and write
|
||
5070000
|
trusted library allocation
|
page execute and read and write
|
||
28C8000
|
heap
|
page read and write
|
||
4DB5000
|
trusted library allocation
|
page read and write
|
||
4DEE000
|
trusted library allocation
|
page read and write
|
||
2948000
|
heap
|
page read and write
|
||
4DF6000
|
trusted library allocation
|
page read and write
|
||
4DB6000
|
trusted library allocation
|
page read and write
|
||
4DF6000
|
trusted library allocation
|
page read and write
|
||
4DB0000
|
trusted library allocation
|
page read and write
|
||
FDC000
|
heap
|
page read and write
|
||
2943000
|
heap
|
page read and write
|
||
4DCF000
|
trusted library allocation
|
page read and write
|
||
FF2000
|
heap
|
page read and write
|
||
2850000
|
heap
|
page read and write
|
||
4DCE000
|
trusted library allocation
|
page read and write
|
||
106A000
|
heap
|
page read and write
|
||
2948000
|
heap
|
page read and write
|
||
4EC5000
|
trusted library allocation
|
page read and write
|
||
2A7F000
|
stack
|
page read and write
|
||
2935000
|
heap
|
page read and write
|
||
4DDF000
|
trusted library allocation
|
page read and write
|
||
2948000
|
heap
|
page read and write
|
||
AE3E000
|
stack
|
page read and write
|
||
2943000
|
heap
|
page read and write
|
||
4E44000
|
trusted library allocation
|
page read and write
|
||
3DB000
|
stack
|
page read and write
|
||
1019000
|
heap
|
page read and write
|
||
291C000
|
heap
|
page read and write
|
||
4DCF000
|
trusted library allocation
|
page read and write
|
||
2948000
|
heap
|
page read and write
|
||
4DDF000
|
trusted library allocation
|
page read and write
|
||
4DBB000
|
trusted library allocation
|
page read and write
|
||
4DDB000
|
trusted library allocation
|
page read and write
|
||
4DDF000
|
trusted library allocation
|
page read and write
|
||
F5F000
|
stack
|
page read and write
|
||
4DDF000
|
trusted library allocation
|
page read and write
|
||
28E6000
|
heap
|
page read and write
|
||
44B0000
|
remote allocation
|
page read and write
|
||
4DB2000
|
trusted library allocation
|
page read and write
|
||
4DDF000
|
trusted library allocation
|
page read and write
|
||
4DB0000
|
trusted library allocation
|
page read and write
|
||
4DDF000
|
trusted library allocation
|
page read and write
|
||
4DCF000
|
trusted library allocation
|
page read and write
|
||
2948000
|
heap
|
page read and write
|
||
4DCF000
|
trusted library allocation
|
page read and write
|
||
4DCE000
|
trusted library allocation
|
page read and write
|
||
11D3000
|
trusted library allocation
|
page execute and read and write
|
||
4DB6000
|
trusted library allocation
|
page read and write
|
||
4DE7000
|
trusted library allocation
|
page read and write
|
||
289C000
|
heap
|
page read and write
|
||
4DAF000
|
trusted library allocation
|
page read and write
|
||
4DDF000
|
trusted library allocation
|
page read and write
|
||
2948000
|
heap
|
page read and write
|
||
8F2000
|
unkown
|
page execute and read and write
|
||
4DB3000
|
trusted library allocation
|
page read and write
|
||
4DCF000
|
trusted library allocation
|
page read and write
|
||
4DCF000
|
trusted library allocation
|
page read and write
|
||
4DFE000
|
trusted library allocation
|
page read and write
|
||
445D000
|
stack
|
page read and write
|
||
4DFE000
|
trusted library allocation
|
page read and write
|
||
2948000
|
heap
|
page read and write
|
||
295A000
|
heap
|
page read and write
|
||
2948000
|
heap
|
page read and write
|
||
4DE3000
|
trusted library allocation
|
page read and write
|
||
295A000
|
heap
|
page read and write
|
||
2948000
|
heap
|
page read and write
|
||
4DDF000
|
trusted library allocation
|
page read and write
|
||
4E48000
|
trusted library allocation
|
page read and write
|
||
4DA9000
|
trusted library allocation
|
page read and write
|
||
4E0E000
|
trusted library allocation
|
page read and write
|
||
295A000
|
heap
|
page read and write
|
||
4DE3000
|
trusted library allocation
|
page read and write
|
||
4DDF000
|
trusted library allocation
|
page read and write
|
||
4DD6000
|
trusted library allocation
|
page read and write
|
||
44B0000
|
remote allocation
|
page read and write
|
||
4DB0000
|
trusted library allocation
|
page read and write
|
||
AF7E000
|
stack
|
page read and write
|
||
4DB9000
|
trusted library allocation
|
page read and write
|
||
2948000
|
heap
|
page read and write
|
||
4E03000
|
trusted library allocation
|
page read and write
|
||
4DA8000
|
trusted library allocation
|
page read and write
|
||
2946000
|
heap
|
page read and write
|
||
4DC5000
|
trusted library allocation
|
page read and write
|
||
4DCF000
|
trusted library allocation
|
page read and write
|
||
4DAF000
|
trusted library allocation
|
page read and write
|
||
2927000
|
heap
|
page read and write
|
||
4DC0000
|
trusted library allocation
|
page read and write
|
||
11E4000
|
trusted library allocation
|
page read and write
|
||
4F85000
|
trusted library allocation
|
page read and write
|
||
4DDF000
|
trusted library allocation
|
page read and write
|
||
4DF9000
|
trusted library allocation
|
page read and write
|
||
4DB3000
|
trusted library allocation
|
page read and write
|
||
4DB7000
|
trusted library allocation
|
page read and write
|
||
2948000
|
heap
|
page read and write
|
||
1078000
|
heap
|
page read and write
|
||
4E37000
|
trusted library allocation
|
page read and write
|
||
4DD5000
|
trusted library allocation
|
page read and write
|
||
2440000
|
remote allocation
|
page execute and read and write
|
||
4DCF000
|
trusted library allocation
|
page read and write
|
||
4ABD000
|
stack
|
page read and write
|
||
44E0000
|
heap
|
page read and write
|
||
4DFE000
|
trusted library allocation
|
page read and write
|
||
295A000
|
heap
|
page read and write
|
||
4EAC000
|
trusted library allocation
|
page read and write
|
||
4E4F000
|
trusted library allocation
|
page read and write
|
||
4DCF000
|
trusted library allocation
|
page read and write
|
||
2880000
|
heap
|
page read and write
|
||
4DB0000
|
trusted library allocation
|
page read and write
|
||
FE4000
|
heap
|
page read and write
|
||
4DB3000
|
trusted library allocation
|
page read and write
|
||
6CDD1000
|
unkown
|
page execute read
|
||
4DDF000
|
trusted library allocation
|
page read and write
|
||
4DEA000
|
trusted library allocation
|
page read and write
|
||
2946000
|
heap
|
page read and write
|
||
860000
|
unkown
|
page execute and read and write
|
||
4DA6000
|
trusted library allocation
|
page read and write
|
||
4DDF000
|
trusted library allocation
|
page read and write
|
||
4DCF000
|
trusted library allocation
|
page read and write
|
||
4DA7000
|
trusted library allocation
|
page read and write
|
||
2933000
|
heap
|
page read and write
|
||
4DB0000
|
trusted library allocation
|
page read and write
|
||
2946000
|
heap
|
page read and write
|
||
4E1F000
|
trusted library allocation
|
page read and write
|
||
4DA0000
|
trusted library allocation
|
page read and write
|
||
4DDF000
|
trusted library allocation
|
page read and write
|
||
2937000
|
heap
|
page read and write
|
||
4E03000
|
trusted library allocation
|
page read and write
|
||
4DDD000
|
trusted library allocation
|
page read and write
|
||
2943000
|
heap
|
page read and write
|
||
4DDF000
|
trusted library allocation
|
page read and write
|
||
4E44000
|
trusted library allocation
|
page read and write
|
||
2936000
|
heap
|
page read and write
|
||
4DD7000
|
trusted library allocation
|
page read and write
|
||
4D2E000
|
stack
|
page read and write
|
||
4DA9000
|
trusted library allocation
|
page read and write
|
||
4DB2000
|
trusted library allocation
|
page read and write
|
||
6CDF1000
|
unkown
|
page read and write
|
||
2947000
|
heap
|
page read and write
|
||
2927000
|
heap
|
page read and write
|
||
4DB9000
|
trusted library allocation
|
page read and write
|
||
4D90000
|
heap
|
page read and write
|
||
28A6000
|
heap
|
page read and write
|
||
4DDF000
|
trusted library allocation
|
page read and write
|
||
4C1E000
|
stack
|
page read and write
|
||
4DE8000
|
trusted library allocation
|
page read and write
|
||
4DD8000
|
trusted library allocation
|
page read and write
|
||
4DDF000
|
trusted library allocation
|
page read and write
|
||
4DC0000
|
trusted library allocation
|
page read and write
|
||
2948000
|
heap
|
page read and write
|
||
2943000
|
heap
|
page read and write
|
||
4E01000
|
trusted library allocation
|
page read and write
|
||
2BF1000
|
trusted library allocation
|
page read and write
|
||
4DD8000
|
trusted library allocation
|
page read and write
|
||
4E07000
|
trusted library allocation
|
page read and write
|
||
4C2E000
|
stack
|
page read and write
|
||
24C0000
|
heap
|
page read and write
|
||
4DB6000
|
trusted library allocation
|
page read and write
|
||
4DC5000
|
trusted library allocation
|
page read and write
|
||
2898000
|
heap
|
page read and write
|
||
4DA5000
|
trusted library allocation
|
page read and write
|
||
4DDF000
|
trusted library allocation
|
page read and write
|
||
4F75000
|
trusted library allocation
|
page read and write
|
||
4DD5000
|
trusted library allocation
|
page read and write
|
||
4DAF000
|
trusted library allocation
|
page read and write
|
||
1049000
|
heap
|
page read and write
|
||
4E2C000
|
trusted library allocation
|
page read and write
|
||
4DCE000
|
trusted library allocation
|
page read and write
|
||
3BF1000
|
trusted library allocation
|
page read and write
|
||
2910000
|
heap
|
page read and write
|
||
11D4000
|
trusted library allocation
|
page read and write
|
||
4DCF000
|
trusted library allocation
|
page read and write
|
||
4DA6000
|
trusted library allocation
|
page read and write
|
||
4DDF000
|
trusted library allocation
|
page read and write
|
||
4F4D000
|
trusted library allocation
|
page read and write
|
||
4DB0000
|
trusted library allocation
|
page read and write
|
||
2948000
|
heap
|
page read and write
|
||
4E1F000
|
trusted library allocation
|
page read and write
|
||
A96D000
|
stack
|
page read and write
|
||
4DDF000
|
trusted library allocation
|
page read and write
|
||
2935000
|
heap
|
page read and write
|
||
4DA6000
|
trusted library allocation
|
page read and write
|
||
28B2000
|
heap
|
page read and write
|
||
4E11000
|
trusted library allocation
|
page read and write
|
||
A82E000
|
stack
|
page read and write
|
||
28B2000
|
heap
|
page read and write
|
||
44B0000
|
remote allocation
|
page read and write
|
||
295A000
|
heap
|
page read and write
|
||
4DDF000
|
trusted library allocation
|
page read and write
|
||
2948000
|
heap
|
page read and write
|
||
4A6F000
|
stack
|
page read and write
|
||
2948000
|
heap
|
page read and write
|
||
289C000
|
heap
|
page read and write
|
||
CFA000
|
stack
|
page read and write
|
||
ADFF000
|
stack
|
page read and write
|
||
492E000
|
stack
|
page read and write
|
||
4DB9000
|
trusted library allocation
|
page read and write
|
||
2935000
|
heap
|
page read and write
|
||
4DB9000
|
trusted library allocation
|
page read and write
|
||
50C0000
|
trusted library section
|
page read and write
|
||
4DBA000
|
trusted library allocation
|
page read and write
|
||
4DBC000
|
trusted library allocation
|
page read and write
|
||
4DF9000
|
trusted library allocation
|
page read and write
|
||
28C8000
|
heap
|
page read and write
|
||
5015000
|
trusted library allocation
|
page read and write
|
||
4DD1000
|
trusted library allocation
|
page read and write
|
||
4DC7000
|
trusted library allocation
|
page read and write
|
||
2946000
|
heap
|
page read and write
|
||
4DBF000
|
trusted library allocation
|
page read and write
|
||
4DC0000
|
trusted library allocation
|
page read and write
|
||
4DDF000
|
trusted library allocation
|
page read and write
|
||
4DFF000
|
trusted library allocation
|
page read and write
|
||
2937000
|
heap
|
page read and write
|
||
4DDF000
|
trusted library allocation
|
page read and write
|
||
4DDF000
|
trusted library allocation
|
page read and write
|
||
2947000
|
heap
|
page read and write
|
||
F9E000
|
stack
|
page read and write
|
||
4E06000
|
trusted library allocation
|
page read and write
|
||
4DB9000
|
trusted library allocation
|
page read and write
|
||
2948000
|
heap
|
page read and write
|
There are 477 hidden memdumps, click here to show them.