Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
file.exe
|
PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
initial sample
|
||
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_file.exe_f93284ae77ab4eed7e1e6983ffdeb6b8c8d517_2059615a_dc763f9f-12e3-4a02-b6ca-49570e84e160\Report.wer
|
Unicode text, UTF-16, little-endian text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Roaming\gdi32.dll
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WER4C58.tmp.dmp
|
Mini DuMP crash report, 15 streams, Sat Nov 23 13:59:49 2024, 0x1205a4 type
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WER4D53.tmp.WERInternalMetadata.xml
|
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WER4DA2.tmp.xml
|
XML 1.0 document, ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Windows\appcompat\Programs\Amcache.hve
|
MS Windows registry file, NT/2000 or above
|
dropped
|
||
\Device\ConDrv
|
ASCII text, with very long lines (354), with CRLF, LF line terminators
|
dropped
|
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\file.exe
|
"C:\Users\user\Desktop\file.exe"
|
||
C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe
|
"C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe"
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\SysWOW64\WerFault.exe
|
C:\Windows\SysWOW64\WerFault.exe -u -p 7132 -s 1224
|
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
https://disobey-curly.sbs/
|
unknown
|
||
https://disobey-curly.sbs/api
|
172.67.223.140
|
||
https://duckduckgo.com/chrome_newtab
|
unknown
|
||
https://duckduckgo.com/ac/?q=
|
unknown
|
||
https://contile-images.services.mozilla.com/0TegrVVRalreHILhR2WvtD_CFzj13HCDcLqqpvXSOuY.10862.jpg
|
unknown
|
||
https://www.google.com/images/branding/product/ico/googleg_lodp.ico
|
unknown
|
||
https://disobey-curly.sbs:443/apiO
|
unknown
|
||
https://bridge.lga1.admarketplace.net/ctp?version=16.0.0&key=1696332238301000001.2&ci=1696332238417.
|
unknown
|
||
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
|
unknown
|
||
http://crl.rootca1.amazontrust.com/rootca1.crl0
|
unknown
|
||
https://bridge.lga1.ap01.net/ctp?version=16.0.0&key=1696332238301000001.1&ci=1696332238417.12791&cta
|
unknown
|
||
http://upx.sf.net
|
unknown
|
||
https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
|
unknown
|
||
http://ocsp.rootca1.amazontrust.com0:
|
unknown
|
||
https://disobey-curly.sbs/apiI
|
unknown
|
||
https://support.office.com/article/7D48285B-20E8-4B9B-91AD-216E34163BAD?wt.mc_id=EnterPK2016
|
unknown
|
||
https://support.office.com/article/94ba2e0b-638e-4a92-8857-2cb5ac1d8e17
|
unknown
|
||
https://www.ecosia.org/newtab/
|
unknown
|
||
https://support.mozilla.org/kb/customize-firefox-controls-buttons-and-toolbars?utm_source=firefox-br
|
unknown
|
||
https://ac.ecosia.org/autocomplete?q=
|
unknown
|
||
https://disobey-curly.sbs/u
|
unknown
|
||
https://disobey-curly.sbs:443/api
|
unknown
|
||
https://disobey-curly.sbs/z
|
unknown
|
||
https://contile-images.services.mozilla.com/obgoOYObjIFea_bXuT6L4LbBJ8j425AD87S1HMD3BWg.9991.jpg
|
unknown
|
||
https://imp.mt48.net/static?id=7RHzfOIXjFEYsBdvIpkX4QqmfZfYfQfafZbXfpbWfpbX7ReNxR3UIG8zInwYIFIVs9eYi
|
unknown
|
||
http://x1.c.lencr.org/0
|
unknown
|
||
http://x1.i.lencr.org/0
|
unknown
|
||
https://support.office.com/article/94ba2e0b-638e-4a92-8857-2cb5ac1d8e17Install
|
unknown
|
||
https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
|
unknown
|
||
https://support.microsof
|
unknown
|
||
http://crt.rootca1.amazontrust.com/rootca1.cer0?
|
unknown
|
||
https://disobey-curly.sbs/api.
|
unknown
|
||
https://support.office.com/article/7D48285B-20E8-4B9B-91AD-216E34163BAD?wt.mc_id=EnterPK2016Examples
|
unknown
|
||
https://support.mozilla.org/products/firefoxgro.all
|
unknown
|
||
https://disobey-curly.sbs/apiu
|
unknown
|
||
https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
|
unknown
|
||
https://www.amazon.com/?tag=admarketus-20&ref=pd_sl_7548d4575af019e4c148ccf1a78112802e66a0816a72fc94
|
unknown
|
There are 27 hidden URLs, click here to show them.
Domains
Name
|
IP
|
Malicious
|
|
---|---|---|---|
disobey-curly.sbs
|
172.67.223.140
|
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
172.67.223.140
|
disobey-curly.sbs
|
United States
|
Registry
Path
|
Value
|
Malicious
|
|
---|---|---|---|
\REGISTRY\A\{b7a7ed61-1bbb-c9aa-bfc9-4270346fe8ea}\Root\InventoryApplicationFile\file.exe|ff8e65d6b06db8e5
|
ProgramId
|
||
\REGISTRY\A\{b7a7ed61-1bbb-c9aa-bfc9-4270346fe8ea}\Root\InventoryApplicationFile\file.exe|ff8e65d6b06db8e5
|
FileId
|
||
\REGISTRY\A\{b7a7ed61-1bbb-c9aa-bfc9-4270346fe8ea}\Root\InventoryApplicationFile\file.exe|ff8e65d6b06db8e5
|
LowerCaseLongPath
|
||
\REGISTRY\A\{b7a7ed61-1bbb-c9aa-bfc9-4270346fe8ea}\Root\InventoryApplicationFile\file.exe|ff8e65d6b06db8e5
|
LongPathHash
|
||
\REGISTRY\A\{b7a7ed61-1bbb-c9aa-bfc9-4270346fe8ea}\Root\InventoryApplicationFile\file.exe|ff8e65d6b06db8e5
|
Name
|
||
\REGISTRY\A\{b7a7ed61-1bbb-c9aa-bfc9-4270346fe8ea}\Root\InventoryApplicationFile\file.exe|ff8e65d6b06db8e5
|
OriginalFileName
|
||
\REGISTRY\A\{b7a7ed61-1bbb-c9aa-bfc9-4270346fe8ea}\Root\InventoryApplicationFile\file.exe|ff8e65d6b06db8e5
|
Publisher
|
||
\REGISTRY\A\{b7a7ed61-1bbb-c9aa-bfc9-4270346fe8ea}\Root\InventoryApplicationFile\file.exe|ff8e65d6b06db8e5
|
Version
|
||
\REGISTRY\A\{b7a7ed61-1bbb-c9aa-bfc9-4270346fe8ea}\Root\InventoryApplicationFile\file.exe|ff8e65d6b06db8e5
|
BinFileVersion
|
||
\REGISTRY\A\{b7a7ed61-1bbb-c9aa-bfc9-4270346fe8ea}\Root\InventoryApplicationFile\file.exe|ff8e65d6b06db8e5
|
BinaryType
|
||
\REGISTRY\A\{b7a7ed61-1bbb-c9aa-bfc9-4270346fe8ea}\Root\InventoryApplicationFile\file.exe|ff8e65d6b06db8e5
|
ProductName
|
||
\REGISTRY\A\{b7a7ed61-1bbb-c9aa-bfc9-4270346fe8ea}\Root\InventoryApplicationFile\file.exe|ff8e65d6b06db8e5
|
ProductVersion
|
||
\REGISTRY\A\{b7a7ed61-1bbb-c9aa-bfc9-4270346fe8ea}\Root\InventoryApplicationFile\file.exe|ff8e65d6b06db8e5
|
LinkDate
|
||
\REGISTRY\A\{b7a7ed61-1bbb-c9aa-bfc9-4270346fe8ea}\Root\InventoryApplicationFile\file.exe|ff8e65d6b06db8e5
|
BinProductVersion
|
||
\REGISTRY\A\{b7a7ed61-1bbb-c9aa-bfc9-4270346fe8ea}\Root\InventoryApplicationFile\file.exe|ff8e65d6b06db8e5
|
AppxPackageFullName
|
||
\REGISTRY\A\{b7a7ed61-1bbb-c9aa-bfc9-4270346fe8ea}\Root\InventoryApplicationFile\file.exe|ff8e65d6b06db8e5
|
AppxPackageRelativeId
|
||
\REGISTRY\A\{b7a7ed61-1bbb-c9aa-bfc9-4270346fe8ea}\Root\InventoryApplicationFile\file.exe|ff8e65d6b06db8e5
|
Size
|
||
\REGISTRY\A\{b7a7ed61-1bbb-c9aa-bfc9-4270346fe8ea}\Root\InventoryApplicationFile\file.exe|ff8e65d6b06db8e5
|
Language
|
||
\REGISTRY\A\{b7a7ed61-1bbb-c9aa-bfc9-4270346fe8ea}\Root\InventoryApplicationFile\file.exe|ff8e65d6b06db8e5
|
Usn
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\IdentityCRL\ClockData
|
ClockTimeSeconds
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\IdentityCRL\ClockData
|
TickCount
|
There are 11 hidden registries, click here to show them.
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
4FB7000
|
trusted library allocation
|
page read and write
|
||
2C84000
|
heap
|
page read and write
|
||
4FC5000
|
trusted library allocation
|
page read and write
|
||
2C71000
|
heap
|
page read and write
|
||
4F96000
|
trusted library allocation
|
page read and write
|
||
2C8D000
|
heap
|
page read and write
|
||
2C8D000
|
heap
|
page read and write
|
||
4FF8000
|
trusted library allocation
|
page read and write
|
||
4FBF000
|
trusted library allocation
|
page read and write
|
||
4F82000
|
trusted library allocation
|
page read and write
|
||
4B4D000
|
stack
|
page read and write
|
||
51CD000
|
trusted library allocation
|
page read and write
|
||
4FAF000
|
trusted library allocation
|
page read and write
|
||
4F82000
|
trusted library allocation
|
page read and write
|
||
2C63000
|
heap
|
page read and write
|
||
4FAF000
|
trusted library allocation
|
page read and write
|
||
4FE1000
|
trusted library allocation
|
page read and write
|
||
756E000
|
stack
|
page read and write
|
||
4F8F000
|
trusted library allocation
|
page read and write
|
||
4F94000
|
trusted library allocation
|
page read and write
|
||
29F0000
|
heap
|
page read and write
|
||
29E0000
|
heap
|
page read and write
|
||
5010000
|
trusted library allocation
|
page read and write
|
||
4FC7000
|
trusted library allocation
|
page read and write
|
||
4FC7000
|
trusted library allocation
|
page read and write
|
||
51E5000
|
trusted library allocation
|
page read and write
|
||
CBB000
|
heap
|
page read and write
|
||
4FB3000
|
trusted library allocation
|
page read and write
|
||
666000
|
unkown
|
page execute and read and write
|
||
2CA9000
|
heap
|
page read and write
|
||
FEE000
|
stack
|
page read and write
|
||
2BD0000
|
heap
|
page read and write
|
||
2C83000
|
heap
|
page read and write
|
||
4F66000
|
trusted library allocation
|
page read and write
|
||
2CAB000
|
heap
|
page read and write
|
||
4E10000
|
heap
|
page read and write
|
||
BE8000
|
heap
|
page read and write
|
||
28DE000
|
stack
|
page read and write
|
||
2C90000
|
heap
|
page read and write
|
||
5E2000
|
unkown
|
page readonly
|
||
6CD91000
|
unkown
|
page execute read
|
||
2C83000
|
heap
|
page read and write
|
||
4F82000
|
trusted library allocation
|
page read and write
|
||
4F8E000
|
trusted library allocation
|
page read and write
|
||
A66D000
|
stack
|
page read and write
|
||
5205000
|
trusted library allocation
|
page read and write
|
||
4FDF000
|
trusted library allocation
|
page read and write
|
||
4FDF000
|
trusted library allocation
|
page read and write
|
||
C22000
|
heap
|
page read and write
|
||
2C8E000
|
heap
|
page read and write
|
||
E40000
|
trusted library allocation
|
page read and write
|
||
6CDA7000
|
unkown
|
page read and write
|
||
4FCF000
|
trusted library allocation
|
page read and write
|
||
4FA9000
|
trusted library allocation
|
page read and write
|
||
72AC1000
|
remote allocation
|
page execute read
|
||
4F66000
|
trusted library allocation
|
page read and write
|
||
E44000
|
trusted library allocation
|
page read and write
|
||
4FDC000
|
trusted library allocation
|
page read and write
|
||
4F9C000
|
trusted library allocation
|
page read and write
|
||
2C99000
|
heap
|
page read and write
|
||
4FB7000
|
trusted library allocation
|
page read and write
|
||
780000
|
heap
|
page read and write
|
||
51AE000
|
trusted library allocation
|
page read and write
|
||
4F7A000
|
trusted library allocation
|
page read and write
|
||
4FA9000
|
trusted library allocation
|
page read and write
|
||
4F6E000
|
stack
|
page read and write
|
||
4F7C000
|
trusted library allocation
|
page read and write
|
||
4FAF000
|
trusted library allocation
|
page read and write
|
||
4BAE000
|
stack
|
page read and write
|
||
4F98000
|
trusted library allocation
|
page read and write
|
||
2C19000
|
heap
|
page read and write
|
||
AB7F000
|
stack
|
page read and write
|
||
2C8D000
|
heap
|
page read and write
|
||
4F9F000
|
trusted library allocation
|
page read and write
|
||
4FAF000
|
trusted library allocation
|
page read and write
|
||
4F99000
|
trusted library allocation
|
page read and write
|
||
4F8E000
|
trusted library allocation
|
page read and write
|
||
4FF0000
|
trusted library allocation
|
page read and write
|
||
4F7C000
|
trusted library allocation
|
page read and write
|
||
2AC9000
|
trusted library allocation
|
page read and write
|
||
2C17000
|
heap
|
page read and write
|
||
4FA7000
|
trusted library allocation
|
page read and write
|
||
4FC7000
|
trusted library allocation
|
page read and write
|
||
2C61000
|
heap
|
page read and write
|
||
4F6D000
|
trusted library allocation
|
page read and write
|
||
4F9A000
|
trusted library allocation
|
page read and write
|
||
4F8F000
|
trusted library allocation
|
page read and write
|
||
4FCB000
|
trusted library allocation
|
page read and write
|
||
72AC0000
|
remote allocation
|
page execute and read and write
|
||
EA0000
|
heap
|
page read and write
|
||
4FC5000
|
trusted library allocation
|
page read and write
|
||
6CD90000
|
unkown
|
page readonly
|
||
2C83000
|
heap
|
page read and write
|
||
2BF6000
|
heap
|
page read and write
|
||
4F94000
|
trusted library allocation
|
page read and write
|
||
4F82000
|
trusted library allocation
|
page read and write
|
||
4FA0000
|
trusted library allocation
|
page read and write
|
||
4F82000
|
trusted library allocation
|
page read and write
|
||
4F8F000
|
trusted library allocation
|
page read and write
|
||
4FAF000
|
trusted library allocation
|
page read and write
|
||
4F82000
|
trusted library allocation
|
page read and write
|
||
C3E000
|
heap
|
page read and write
|
||
57BA000
|
trusted library allocation
|
page read and write
|
||
2C94000
|
heap
|
page read and write
|
||
4F76000
|
trusted library allocation
|
page read and write
|
||
4F9B000
|
trusted library allocation
|
page read and write
|
||
4F8E000
|
trusted library allocation
|
page read and write
|
||
4F8E000
|
trusted library allocation
|
page read and write
|
||
4F8F000
|
trusted library allocation
|
page read and write
|
||
4FAF000
|
trusted library allocation
|
page read and write
|
||
2CAE000
|
heap
|
page read and write
|
||
4F60000
|
trusted library allocation
|
page read and write
|
||
2CAE000
|
heap
|
page read and write
|
||
46C0000
|
remote allocation
|
page read and write
|
||
4FAF000
|
trusted library allocation
|
page read and write
|
||
C99000
|
heap
|
page read and write
|
||
2C61000
|
heap
|
page read and write
|
||
5014000
|
trusted library allocation
|
page read and write
|
||
4FA0000
|
trusted library allocation
|
page read and write
|
||
790000
|
heap
|
page read and write
|
||
4F7C000
|
trusted library allocation
|
page read and write
|
||
2CA9000
|
heap
|
page read and write
|
||
2C64000
|
heap
|
page read and write
|
||
A76D000
|
stack
|
page read and write
|
||
54B000
|
stack
|
page read and write
|
||
46AD000
|
stack
|
page read and write
|
||
4F92000
|
trusted library allocation
|
page read and write
|
||
4FC7000
|
trusted library allocation
|
page read and write
|
||
4F8F000
|
trusted library allocation
|
page read and write
|
||
4FE7000
|
trusted library allocation
|
page read and write
|
||
4F9F000
|
trusted library allocation
|
page read and write
|
||
6CDF5000
|
unkown
|
page readonly
|
||
E7B000
|
trusted library allocation
|
page execute and read and write
|
||
4F8F000
|
trusted library allocation
|
page read and write
|
||
5E0000
|
unkown
|
page execute and read and write
|
||
2C79000
|
heap
|
page read and write
|
||
4FC6000
|
trusted library allocation
|
page read and write
|
||
AFA000
|
stack
|
page read and write
|
||
46C0000
|
remote allocation
|
page read and write
|
||
4F9F000
|
trusted library allocation
|
page read and write
|
||
4FAA000
|
trusted library allocation
|
page read and write
|
||
4FA8000
|
trusted library allocation
|
page read and write
|
||
290B000
|
stack
|
page read and write
|
||
4FCF000
|
trusted library allocation
|
page read and write
|
||
51B4000
|
trusted library allocation
|
page read and write
|
||
4F81000
|
trusted library allocation
|
page read and write
|
||
5285000
|
trusted library allocation
|
page read and write
|
||
4FAF000
|
trusted library allocation
|
page read and write
|
||
2C8E000
|
heap
|
page read and write
|
||
4F6B000
|
trusted library allocation
|
page read and write
|
||
C08000
|
heap
|
page read and write
|
||
4FA7000
|
trusted library allocation
|
page read and write
|
||
4F9B000
|
trusted library allocation
|
page read and write
|
||
2AA0000
|
heap
|
page execute and read and write
|
||
2C73000
|
heap
|
page read and write
|
||
4FB8000
|
trusted library allocation
|
page read and write
|
||
2C83000
|
heap
|
page read and write
|
||
2C82000
|
heap
|
page read and write
|
||
4FB3000
|
trusted library allocation
|
page read and write
|
||
4FB7000
|
trusted library allocation
|
page read and write
|
||
42B5000
|
trusted library allocation
|
page read and write
|
||
E50000
|
trusted library allocation
|
page read and write
|
||
4FB8000
|
trusted library allocation
|
page read and write
|
||
4F96000
|
trusted library allocation
|
page read and write
|
||
4FAF000
|
trusted library allocation
|
page read and write
|
||
4F99000
|
trusted library allocation
|
page read and write
|
||
2CAD000
|
heap
|
page read and write
|
||
2C02000
|
heap
|
page read and write
|
||
4FCC000
|
trusted library allocation
|
page read and write
|
||
C14000
|
heap
|
page read and write
|
||
2CB0000
|
heap
|
page read and write
|
||
6CDA1000
|
unkown
|
page readonly
|
||
E30000
|
trusted library allocation
|
page read and write
|
||
4F9F000
|
trusted library allocation
|
page read and write
|
||
CA2000
|
heap
|
page read and write
|
||
2C8D000
|
heap
|
page read and write
|
||
4FB7000
|
trusted library allocation
|
page read and write
|
||
4F6B000
|
trusted library allocation
|
page read and write
|
||
4CCE000
|
stack
|
page read and write
|
||
4FC5000
|
trusted library allocation
|
page read and write
|
||
5CC0000
|
trusted library allocation
|
page read and write
|
||
4F68000
|
trusted library allocation
|
page read and write
|
||
4F96000
|
trusted library allocation
|
page read and write
|
||
2C25000
|
heap
|
page read and write
|
||
4FAF000
|
trusted library allocation
|
page read and write
|
||
4F76000
|
trusted library allocation
|
page read and write
|
||
2C63000
|
heap
|
page read and write
|
||
ACFE000
|
stack
|
page read and write
|
||
C0D000
|
heap
|
page read and write
|
||
4F61000
|
trusted library allocation
|
page read and write
|
||
2C83000
|
heap
|
page read and write
|
||
2C8D000
|
heap
|
page read and write
|
||
4FCE000
|
stack
|
page read and write
|
||
4F8F000
|
trusted library allocation
|
page read and write
|
||
2C8D000
|
heap
|
page read and write
|
||
4F2E000
|
stack
|
page read and write
|
||
4FEA000
|
trusted library allocation
|
page read and write
|
||
4FC5000
|
trusted library allocation
|
page read and write
|
||
5343000
|
trusted library allocation
|
page read and write
|
||
545F000
|
trusted library allocation
|
page read and write
|
||
5000000
|
trusted library allocation
|
page read and write
|
||
4F74000
|
trusted library allocation
|
page read and write
|
||
5020000
|
trusted library allocation
|
page read and write
|
||
29F7000
|
heap
|
page read and write
|
||
4FAF000
|
trusted library allocation
|
page read and write
|
||
2AC4000
|
trusted library allocation
|
page read and write
|
||
4F9F000
|
trusted library allocation
|
page read and write
|
||
2CAC000
|
heap
|
page read and write
|
||
2C7B000
|
heap
|
page read and write
|
||
4700000
|
heap
|
page read and write
|
||
4FFB000
|
trusted library allocation
|
page read and write
|
||
4F6D000
|
trusted library allocation
|
page read and write
|
||
4F8E000
|
trusted library allocation
|
page read and write
|
||
4FB3000
|
trusted library allocation
|
page read and write
|
||
4FE0000
|
heap
|
page execute and read and write
|
||
4F6C000
|
trusted library allocation
|
page read and write
|
||
4FE2000
|
trusted library allocation
|
page read and write
|
||
4FC4000
|
trusted library allocation
|
page read and write
|
||
4F7B000
|
trusted library allocation
|
page read and write
|
||
2CB1000
|
heap
|
page read and write
|
||
4F66000
|
trusted library allocation
|
page read and write
|
||
4F81000
|
trusted library allocation
|
page read and write
|
||
2CAD000
|
heap
|
page read and write
|
||
ABBE000
|
stack
|
page read and write
|
||
4F9C000
|
trusted library allocation
|
page read and write
|
||
4FAA000
|
trusted library allocation
|
page read and write
|
||
5B0000
|
heap
|
page read and write
|
||
2C7B000
|
heap
|
page read and write
|
||
4F82000
|
trusted library allocation
|
page read and write
|
||
2BBD000
|
stack
|
page read and write
|
||
4F9F000
|
trusted library allocation
|
page read and write
|
||
2C83000
|
heap
|
page read and write
|
||
ACBE000
|
stack
|
page read and write
|
||
E43000
|
trusted library allocation
|
page execute and read and write
|
||
2C7A000
|
heap
|
page read and write
|
||
E54000
|
trusted library allocation
|
page read and write
|
||
4FA1000
|
trusted library allocation
|
page read and write
|
||
4FAF000
|
trusted library allocation
|
page read and write
|
||
FAE000
|
stack
|
page read and write
|
||
7DE000
|
stack
|
page read and write
|
||
4F91000
|
trusted library allocation
|
page read and write
|
||
2910000
|
heap
|
page read and write
|
||
3AB1000
|
trusted library allocation
|
page read and write
|
||
4F9F000
|
trusted library allocation
|
page read and write
|
||
2BF6000
|
heap
|
page read and write
|
||
2C8E000
|
heap
|
page read and write
|
||
4FEF000
|
trusted library allocation
|
page read and write
|
||
5255000
|
trusted library allocation
|
page read and write
|
||
4F96000
|
trusted library allocation
|
page read and write
|
||
4FF8000
|
trusted library allocation
|
page read and write
|
||
4F76000
|
trusted library allocation
|
page read and write
|
||
5E0000
|
unkown
|
page readonly
|
||
531D000
|
trusted library allocation
|
page read and write
|
||
5005000
|
trusted library allocation
|
page read and write
|
||
BD0000
|
heap
|
page read and write
|
||
2AB1000
|
trusted library allocation
|
page read and write
|
||
2C8D000
|
heap
|
page read and write
|
||
501B000
|
trusted library allocation
|
page read and write
|
||
C0B000
|
heap
|
page read and write
|
||
4FD8000
|
trusted library allocation
|
page read and write
|
||
4F7C000
|
trusted library allocation
|
page read and write
|
||
4FC5000
|
trusted library allocation
|
page read and write
|
||
4F8F000
|
trusted library allocation
|
page read and write
|
||
2C63000
|
heap
|
page read and write
|
||
519E000
|
stack
|
page read and write
|
||
2C1A000
|
heap
|
page read and write
|
||
2C79000
|
heap
|
page read and write
|
||
4F81000
|
trusted library allocation
|
page read and write
|
||
2CAE000
|
heap
|
page read and write
|
||
BE0000
|
heap
|
page read and write
|
||
4FA3000
|
trusted library allocation
|
page read and write
|
||
4F8F000
|
trusted library allocation
|
page read and write
|
||
466D000
|
stack
|
page read and write
|
||
4FAD000
|
trusted library allocation
|
page read and write
|
||
2CAD000
|
heap
|
page read and write
|
||
456E000
|
stack
|
page read and write
|
||
4FF8000
|
trusted library allocation
|
page read and write
|
||
2BE8000
|
heap
|
page read and write
|
||
4F8E000
|
trusted library allocation
|
page read and write
|
||
51A1000
|
heap
|
page read and write
|
||
4F96000
|
trusted library allocation
|
page read and write
|
||
528D000
|
trusted library allocation
|
page read and write
|
||
2CAD000
|
heap
|
page read and write
|
||
4F82000
|
trusted library allocation
|
page read and write
|
||
4F96000
|
trusted library allocation
|
page read and write
|
||
4F8E000
|
trusted library allocation
|
page read and write
|
||
FF0000
|
heap
|
page read and write
|
||
2C8D000
|
heap
|
page read and write
|
||
2C17000
|
heap
|
page read and write
|
||
2A7E000
|
stack
|
page read and write
|
||
E4D000
|
trusted library allocation
|
page execute and read and write
|
||
4FA8000
|
trusted library allocation
|
page read and write
|
||
C4A000
|
heap
|
page read and write
|
||
2C8E000
|
heap
|
page read and write
|
||
289E000
|
stack
|
page read and write
|
||
4F81000
|
trusted library allocation
|
page read and write
|
||
4E5E000
|
stack
|
page read and write
|
||
4F90000
|
trusted library allocation
|
page read and write
|
||
4F8F000
|
trusted library allocation
|
page read and write
|
||
2CAA000
|
heap
|
page read and write
|
||
4F8F000
|
trusted library allocation
|
page read and write
|
||
4F7C000
|
trusted library allocation
|
page read and write
|
||
2BEC000
|
heap
|
page read and write
|
||
2C92000
|
heap
|
page read and write
|
||
2C25000
|
heap
|
page read and write
|
||
4F82000
|
trusted library allocation
|
page read and write
|
||
4FA9000
|
trusted library allocation
|
page read and write
|
||
4FD7000
|
trusted library allocation
|
page read and write
|
||
2BEC000
|
heap
|
page read and write
|
||
4F6C000
|
trusted library allocation
|
page read and write
|
||
4F76000
|
trusted library allocation
|
page read and write
|
||
2B60000
|
heap
|
page read and write
|
||
4FAF000
|
trusted library allocation
|
page read and write
|
||
2CA9000
|
heap
|
page read and write
|
||
72B05000
|
remote allocation
|
page execute and read and write
|
||
4F6B000
|
trusted library allocation
|
page read and write
|
||
4F64000
|
trusted library allocation
|
page read and write
|
||
4FA3000
|
trusted library allocation
|
page read and write
|
||
4FAB000
|
trusted library allocation
|
page read and write
|
||
51A0000
|
heap
|
page read and write
|
||
4F73000
|
trusted library allocation
|
page read and write
|
||
4FB9000
|
trusted library allocation
|
page read and write
|
||
E77000
|
trusted library allocation
|
page execute and read and write
|
||
2CA9000
|
heap
|
page read and write
|
||
2C25000
|
heap
|
page read and write
|
||
4F79000
|
trusted library allocation
|
page read and write
|
||
4F9F000
|
trusted library allocation
|
page read and write
|
||
29F5000
|
heap
|
page read and write
|
||
2C79000
|
heap
|
page read and write
|
||
4F9F000
|
trusted library allocation
|
page read and write
|
||
2CAA000
|
heap
|
page read and write
|
||
4F7C000
|
trusted library allocation
|
page read and write
|
||
4FA8000
|
trusted library allocation
|
page read and write
|
||
2AFF000
|
stack
|
page read and write
|
||
29F0000
|
trusted library allocation
|
page read and write
|
||
72B17000
|
remote allocation
|
page readonly
|
||
4F81000
|
trusted library allocation
|
page read and write
|
||
4FF8000
|
trusted library allocation
|
page read and write
|
||
4F8F000
|
trusted library allocation
|
page read and write
|
||
4DCE000
|
stack
|
page read and write
|
||
4FC5000
|
trusted library allocation
|
page read and write
|
||
28F0000
|
heap
|
page read and write
|
||
4F8F000
|
trusted library allocation
|
page read and write
|
||
2C90000
|
heap
|
page read and write
|
||
4F8E000
|
trusted library allocation
|
page read and write
|
||
5003000
|
trusted library allocation
|
page read and write
|
||
71C000
|
stack
|
page read and write
|
||
4B8E000
|
stack
|
page read and write
|
||
5018000
|
trusted library allocation
|
page read and write
|
||
5015000
|
trusted library allocation
|
page read and write
|
||
4F9F000
|
trusted library allocation
|
page read and write
|
||
4FC3000
|
trusted library allocation
|
page read and write
|
||
4FA8000
|
trusted library allocation
|
page read and write
|
||
4FAC000
|
trusted library allocation
|
page read and write
|
||
ADFE000
|
stack
|
page read and write
|
||
E1E000
|
stack
|
page read and write
|
||
72B02000
|
remote allocation
|
page readonly
|
||
4F6B000
|
trusted library allocation
|
page read and write
|
||
2C8D000
|
heap
|
page read and write
|
||
4F8F000
|
trusted library allocation
|
page read and write
|
||
4F8E000
|
trusted library allocation
|
page read and write
|
||
46C0000
|
remote allocation
|
page read and write
|
||
4FBF000
|
trusted library allocation
|
page read and write
|
||
4F8E000
|
trusted library allocation
|
page read and write
|
||
4FB6000
|
trusted library allocation
|
page read and write
|
||
4F7A000
|
trusted library allocation
|
page read and write
|
||
4F61000
|
trusted library allocation
|
page read and write
|
||
5FE000
|
stack
|
page read and write
|
||
4F9F000
|
trusted library allocation
|
page read and write
|
||
4F61000
|
trusted library allocation
|
page read and write
|
||
4F61000
|
trusted library allocation
|
page read and write
|
||
4FAF000
|
trusted library allocation
|
page read and write
|
||
4F6C000
|
trusted library allocation
|
page read and write
|
||
4FA1000
|
trusted library allocation
|
page read and write
|
||
2CBC000
|
heap
|
page read and write
|
||
28E0000
|
trusted library allocation
|
page execute and read and write
|
||
2C84000
|
heap
|
page read and write
|
||
4F8F000
|
trusted library allocation
|
page read and write
|
||
4FBD000
|
trusted library allocation
|
page read and write
|
||
29C0000
|
trusted library allocation
|
page read and write
|
||
2B4E000
|
stack
|
page read and write
|
||
4F5F000
|
stack
|
page read and write
|
||
4FAF000
|
trusted library allocation
|
page read and write
|
||
4C8F000
|
stack
|
page read and write
|
||
4F8F000
|
trusted library allocation
|
page read and write
|
||
4F6B000
|
trusted library allocation
|
page read and write
|
||
4FA8000
|
trusted library allocation
|
page read and write
|
||
4FA5000
|
trusted library allocation
|
page read and write
|
||
DDE000
|
stack
|
page read and write
|
||
2ABA000
|
trusted library allocation
|
page read and write
|
||
509E000
|
stack
|
page read and write
|
||
4F76000
|
trusted library allocation
|
page read and write
|
||
29E0000
|
trusted library section
|
page read and write
|
||
CAD000
|
heap
|
page read and write
|
||
4FAF000
|
trusted library allocation
|
page read and write
|
||
4FC0000
|
trusted library allocation
|
page read and write
|
||
4FD1000
|
trusted library allocation
|
page read and write
|
||
4F82000
|
trusted library allocation
|
page read and write
|
||
2C61000
|
heap
|
page read and write
|
||
4F9F000
|
trusted library allocation
|
page read and write
|
||
BD5000
|
heap
|
page read and write
|
||
2C8D000
|
heap
|
page read and write
|
||
2C02000
|
heap
|
page read and write
|
||
4FC7000
|
trusted library allocation
|
page read and write
|
||
4FAF000
|
trusted library allocation
|
page read and write
|
||
5E2000
|
unkown
|
page execute and read and write
|
||
4FA6000
|
trusted library allocation
|
page read and write
|
||
527D000
|
trusted library allocation
|
page read and write
|
||
52B5000
|
trusted library allocation
|
page read and write
|
||
666000
|
unkown
|
page readonly
|
||
4F6D000
|
trusted library allocation
|
page read and write
|
||
4FF8000
|
trusted library allocation
|
page read and write
|
||
4F8F000
|
trusted library allocation
|
page read and write
|
||
2C63000
|
heap
|
page read and write
|
||
2C8D000
|
heap
|
page read and write
|
||
4FBF000
|
trusted library allocation
|
page read and write
|
||
BEE000
|
heap
|
page read and write
|
||
4F6C000
|
trusted library allocation
|
page read and write
|
||
4FAF000
|
trusted library allocation
|
page read and write
|
||
4F9F000
|
trusted library allocation
|
page read and write
|
||
4F82000
|
trusted library allocation
|
page read and write
|
There are 411 hidden memdumps, click here to show them.