Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
S#U043eftWare.exe
|
PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
initial sample
|
||
C:\Users\user\AppData\Roaming\gdi32.dll
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_S#U043eftWare.ex_c2eb22ee7582ddf93e8b655d587659adbaca8199_849bd03d_511f84fa-aed9-4bd6-a9fe-1d9ee9ac4087\Report.wer
|
Unicode text, UTF-16, little-endian text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WER87AC.tmp.dmp
|
Mini DuMP crash report, 15 streams, Sat Nov 23 14:09:59 2024, 0x1205a4 type
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WER88B7.tmp.WERInternalMetadata.xml
|
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WER88D7.tmp.xml
|
XML 1.0 document, ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Windows\appcompat\Programs\Amcache.hve
|
MS Windows registry file, NT/2000 or above
|
dropped
|
||
\Device\ConDrv
|
ASCII text, with very long lines (352), with CRLF, LF line terminators
|
dropped
|
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\S#U043eftWare.exe
|
"C:\Users\user\Desktop\S#U043eftWare.exe"
|
||
C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe
|
"C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe"
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\SysWOW64\WerFault.exe
|
C:\Windows\SysWOW64\WerFault.exe -u -p 7624 -s 1228
|
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
https://duckduckgo.com/chrome_newtab
|
unknown
|
||
https://duckduckgo.com/ac/?q=
|
unknown
|
||
https://property-imper.sbs:443/api
|
|||
https://contile-images.services.mozilla.com/0TegrVVRalreHILhR2WvtD_CFzj13HCDcLqqpvXSOuY.10862.jpg
|
unknown
|
||
https://www.google.com/images/branding/product/ico/googleg_lodp.ico
|
unknown
|
||
https://property-imper.sbs/api
|
104.21.33.116
|
||
https://bridge.lga1.admarketplace.net/ctp?version=16.0.0&key=1696332238301000001.2&ci=1696332238417.
|
unknown
|
||
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
|
unknown
|
||
http://crl.rootca1.amazontrust.com/rootca1.crl0
|
unknown
|
||
http://upx.sf.net
|
unknown
|
||
https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
|
unknown
|
||
http://ocsp.rootca1.amazontrust.com0:
|
unknown
|
||
https://support.office.com/article/7D48285B-20E8-4B9B-91AD-216E34163BAD?wt.mc_id=EnterPK2016
|
unknown
|
||
https://support.office.com/article/94ba2e0b-638e-4a92-8857-2cb5ac1d8e17
|
unknown
|
||
https://www.ecosia.org/newtab/
|
unknown
|
||
https://property-imper.sbs/
|
unknown
|
||
https://support.mozilla.org/kb/customize-firefox-controls-buttons-and-toolbars?utm_source=firefox-br
|
unknown
|
||
https://property-imper.sbs/l
|
unknown
|
||
https://ac.ecosia.org/autocomplete?q=
|
unknown
|
||
https://imp.mt48.net/static?id=7RHzfOIXjFEYsBdvIpkX4QqmfZfYfQfafZbXfpbWfpbX7ReNxR3UIG8zInwYIFIVs9eYi
|
unknown
|
||
http://x1.c.lencr.org/0
|
unknown
|
||
http://x1.i.lencr.org/0
|
unknown
|
||
https://support.office.com/article/94ba2e0b-638e-4a92-8857-2cb5ac1d8e17Install
|
unknown
|
||
https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
|
unknown
|
||
https://support.microsof
|
unknown
|
||
http://crt.rootca1.amazontrust.com/rootca1.cer0?
|
unknown
|
||
https://property-imper.sbs/U
|
unknown
|
||
https://support.office.com/article/7D48285B-20E8-4B9B-91AD-216E34163BAD?wt.mc_id=EnterPK2016Examples
|
unknown
|
||
https://property-imper.sbs/BW#?06
|
unknown
|
||
https://support.mozilla.org/products/firefoxgro.all
|
unknown
|
||
https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
|
unknown
|
||
https://property-imper.sbs/api;
|
unknown
|
There are 22 hidden URLs, click here to show them.
Domains
Name
|
IP
|
Malicious
|
|
---|---|---|---|
property-imper.sbs
|
104.21.33.116
|
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
104.21.33.116
|
property-imper.sbs
|
United States
|
Registry
Path
|
Value
|
Malicious
|
|
---|---|---|---|
\REGISTRY\A\{6be841c4-4e02-7965-3fbe-7e5a9e79876a}\Root\InventoryApplicationFile\s#u043eftware.ex|e1c47dda31648bbe
|
ProgramId
|
||
\REGISTRY\A\{6be841c4-4e02-7965-3fbe-7e5a9e79876a}\Root\InventoryApplicationFile\s#u043eftware.ex|e1c47dda31648bbe
|
FileId
|
||
\REGISTRY\A\{6be841c4-4e02-7965-3fbe-7e5a9e79876a}\Root\InventoryApplicationFile\s#u043eftware.ex|e1c47dda31648bbe
|
LowerCaseLongPath
|
||
\REGISTRY\A\{6be841c4-4e02-7965-3fbe-7e5a9e79876a}\Root\InventoryApplicationFile\s#u043eftware.ex|e1c47dda31648bbe
|
LongPathHash
|
||
\REGISTRY\A\{6be841c4-4e02-7965-3fbe-7e5a9e79876a}\Root\InventoryApplicationFile\s#u043eftware.ex|e1c47dda31648bbe
|
Name
|
||
\REGISTRY\A\{6be841c4-4e02-7965-3fbe-7e5a9e79876a}\Root\InventoryApplicationFile\s#u043eftware.ex|e1c47dda31648bbe
|
OriginalFileName
|
||
\REGISTRY\A\{6be841c4-4e02-7965-3fbe-7e5a9e79876a}\Root\InventoryApplicationFile\s#u043eftware.ex|e1c47dda31648bbe
|
Publisher
|
||
\REGISTRY\A\{6be841c4-4e02-7965-3fbe-7e5a9e79876a}\Root\InventoryApplicationFile\s#u043eftware.ex|e1c47dda31648bbe
|
Version
|
||
\REGISTRY\A\{6be841c4-4e02-7965-3fbe-7e5a9e79876a}\Root\InventoryApplicationFile\s#u043eftware.ex|e1c47dda31648bbe
|
BinFileVersion
|
||
\REGISTRY\A\{6be841c4-4e02-7965-3fbe-7e5a9e79876a}\Root\InventoryApplicationFile\s#u043eftware.ex|e1c47dda31648bbe
|
BinaryType
|
||
\REGISTRY\A\{6be841c4-4e02-7965-3fbe-7e5a9e79876a}\Root\InventoryApplicationFile\s#u043eftware.ex|e1c47dda31648bbe
|
ProductName
|
||
\REGISTRY\A\{6be841c4-4e02-7965-3fbe-7e5a9e79876a}\Root\InventoryApplicationFile\s#u043eftware.ex|e1c47dda31648bbe
|
ProductVersion
|
||
\REGISTRY\A\{6be841c4-4e02-7965-3fbe-7e5a9e79876a}\Root\InventoryApplicationFile\s#u043eftware.ex|e1c47dda31648bbe
|
LinkDate
|
||
\REGISTRY\A\{6be841c4-4e02-7965-3fbe-7e5a9e79876a}\Root\InventoryApplicationFile\s#u043eftware.ex|e1c47dda31648bbe
|
BinProductVersion
|
||
\REGISTRY\A\{6be841c4-4e02-7965-3fbe-7e5a9e79876a}\Root\InventoryApplicationFile\s#u043eftware.ex|e1c47dda31648bbe
|
AppxPackageFullName
|
||
\REGISTRY\A\{6be841c4-4e02-7965-3fbe-7e5a9e79876a}\Root\InventoryApplicationFile\s#u043eftware.ex|e1c47dda31648bbe
|
AppxPackageRelativeId
|
||
\REGISTRY\A\{6be841c4-4e02-7965-3fbe-7e5a9e79876a}\Root\InventoryApplicationFile\s#u043eftware.ex|e1c47dda31648bbe
|
Size
|
||
\REGISTRY\A\{6be841c4-4e02-7965-3fbe-7e5a9e79876a}\Root\InventoryApplicationFile\s#u043eftware.ex|e1c47dda31648bbe
|
Language
|
||
\REGISTRY\A\{6be841c4-4e02-7965-3fbe-7e5a9e79876a}\Root\InventoryApplicationFile\s#u043eftware.ex|e1c47dda31648bbe
|
Usn
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\IdentityCRL\ClockData
|
ClockTimeSeconds
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\IdentityCRL\ClockData
|
TickCount
|
There are 11 hidden registries, click here to show them.
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
C93000
|
heap
|
page read and write
|
||
4B3F000
|
stack
|
page read and write
|
||
4C18000
|
trusted library allocation
|
page read and write
|
||
4C4D000
|
trusted library allocation
|
page read and write
|
||
704000
|
heap
|
page read and write
|
||
4C11000
|
trusted library allocation
|
page read and write
|
||
4C7A000
|
trusted library allocation
|
page read and write
|
||
4C28000
|
trusted library allocation
|
page read and write
|
||
4C14000
|
trusted library allocation
|
page read and write
|
||
4C04000
|
trusted library allocation
|
page read and write
|
||
4C20000
|
trusted library allocation
|
page read and write
|
||
5FD000
|
stack
|
page read and write
|
||
ABEF000
|
stack
|
page read and write
|
||
4C11000
|
trusted library allocation
|
page read and write
|
||
FA0000
|
trusted library section
|
page read and write
|
||
4C0F000
|
trusted library allocation
|
page read and write
|
||
4C11000
|
trusted library allocation
|
page read and write
|
||
4C29000
|
trusted library allocation
|
page read and write
|
||
A80000
|
heap
|
page read and write
|
||
4C23000
|
trusted library allocation
|
page read and write
|
||
4C24000
|
trusted library allocation
|
page read and write
|
||
4BE0000
|
heap
|
page read and write
|
||
722000
|
heap
|
page read and write
|
||
65D000
|
heap
|
page read and write
|
||
4C69000
|
trusted library allocation
|
page read and write
|
||
4C71000
|
trusted library allocation
|
page read and write
|
||
4C5A000
|
trusted library allocation
|
page read and write
|
||
671000
|
heap
|
page read and write
|
||
6FB000
|
heap
|
page read and write
|
||
4C06000
|
trusted library allocation
|
page read and write
|
||
4C28000
|
trusted library allocation
|
page read and write
|
||
4D10000
|
trusted library allocation
|
page read and write
|
||
90E000
|
stack
|
page read and write
|
||
4C5F000
|
trusted library allocation
|
page read and write
|
||
9B000
|
stack
|
page read and write
|
||
4C21000
|
trusted library allocation
|
page read and write
|
||
4C26000
|
trusted library allocation
|
page read and write
|
||
D1E000
|
heap
|
page read and write
|
||
560000
|
heap
|
page read and write
|
||
4A3E000
|
stack
|
page read and write
|
||
4C04000
|
trusted library allocation
|
page read and write
|
||
4D28000
|
trusted library allocation
|
page read and write
|
||
4C18000
|
trusted library allocation
|
page read and write
|
||
6E2000
|
heap
|
page read and write
|
||
4C11000
|
trusted library allocation
|
page read and write
|
||
706000
|
heap
|
page read and write
|
||
C87000
|
heap
|
page read and write
|
||
4C59000
|
trusted library allocation
|
page read and write
|
||
4C04000
|
trusted library allocation
|
page read and write
|
||
4C5F000
|
trusted library allocation
|
page read and write
|
||
4C3A000
|
trusted library allocation
|
page read and write
|
||
987000
|
remote allocation
|
page readonly
|
||
4C11000
|
trusted library allocation
|
page read and write
|
||
648000
|
heap
|
page read and write
|
||
4C49000
|
trusted library allocation
|
page read and write
|
||
2981000
|
trusted library allocation
|
page read and write
|
||
6CDDC000
|
unkown
|
page readonly
|
||
6CDC0000
|
unkown
|
page readonly
|
||
4C02000
|
trusted library allocation
|
page read and write
|
||
63D000
|
stack
|
page read and write
|
||
4C14000
|
trusted library allocation
|
page read and write
|
||
4C13000
|
trusted library allocation
|
page read and write
|
||
BFE000
|
stack
|
page read and write
|
||
666000
|
heap
|
page read and write
|
||
4C04000
|
trusted library allocation
|
page read and write
|
||
4C11000
|
trusted library allocation
|
page read and write
|
||
4C14000
|
trusted library allocation
|
page read and write
|
||
4C2D000
|
trusted library allocation
|
page read and write
|
||
4C22000
|
trusted library allocation
|
page read and write
|
||
4C53000
|
trusted library allocation
|
page read and write
|
||
4C91000
|
trusted library allocation
|
page read and write
|
||
A9AE000
|
stack
|
page read and write
|
||
4F2000
|
unkown
|
page execute and read and write
|
||
4C26000
|
trusted library allocation
|
page read and write
|
||
4C7A000
|
trusted library allocation
|
page read and write
|
||
4C0A000
|
trusted library allocation
|
page read and write
|
||
B35000
|
heap
|
page read and write
|
||
4DC0000
|
trusted library allocation
|
page read and write
|
||
4C3A000
|
trusted library allocation
|
page read and write
|
||
930000
|
remote allocation
|
page execute and read and write
|
||
CBD000
|
heap
|
page read and write
|
||
972000
|
remote allocation
|
page readonly
|
||
4ED0000
|
heap
|
page execute and read and write
|
||
4C0A000
|
trusted library allocation
|
page read and write
|
||
706000
|
heap
|
page read and write
|
||
722000
|
heap
|
page read and write
|
||
723000
|
heap
|
page read and write
|
||
D29000
|
heap
|
page read and write
|
||
2B5F000
|
stack
|
page read and write
|
||
688000
|
heap
|
page read and write
|
||
4C13000
|
trusted library allocation
|
page read and write
|
||
4C0F000
|
trusted library allocation
|
page read and write
|
||
473D000
|
stack
|
page read and write
|
||
6FD000
|
heap
|
page read and write
|
||
4C5A000
|
trusted library allocation
|
page read and write
|
||
4F2000
|
unkown
|
page readonly
|
||
4C0D000
|
trusted library allocation
|
page read and write
|
||
4C7A000
|
trusted library allocation
|
page read and write
|
||
722000
|
heap
|
page read and write
|
||
4BFB000
|
trusted library allocation
|
page read and write
|
||
6F3000
|
heap
|
page read and write
|
||
4C11000
|
trusted library allocation
|
page read and write
|
||
4C4B000
|
trusted library allocation
|
page read and write
|
||
4C08000
|
trusted library allocation
|
page read and write
|
||
4C14000
|
trusted library allocation
|
page read and write
|
||
4C61000
|
trusted library allocation
|
page read and write
|
||
4C18000
|
trusted library allocation
|
page read and write
|
||
4BFA000
|
trusted library allocation
|
page read and write
|
||
4BF3000
|
trusted library allocation
|
page read and write
|
||
4C14000
|
trusted library allocation
|
page read and write
|
||
4C22000
|
trusted library allocation
|
page read and write
|
||
4C11000
|
trusted library allocation
|
page read and write
|
||
6FE000
|
heap
|
page read and write
|
||
713000
|
heap
|
page read and write
|
||
4BFE000
|
trusted library allocation
|
page read and write
|
||
4C0D000
|
trusted library allocation
|
page read and write
|
||
722000
|
heap
|
page read and write
|
||
FB0000
|
trusted library allocation
|
page read and write
|
||
4C11000
|
trusted library allocation
|
page read and write
|
||
4C0D000
|
trusted library allocation
|
page read and write
|
||
4BF1000
|
trusted library allocation
|
page read and write
|
||
D0A000
|
heap
|
page read and write
|
||
693000
|
heap
|
page read and write
|
||
4BF6000
|
trusted library allocation
|
page read and write
|
||
4B4F000
|
trusted library allocation
|
page read and write
|
||
910000
|
heap
|
page read and write
|
||
4EBE000
|
stack
|
page read and write
|
||
6F3000
|
heap
|
page read and write
|
||
4DD0000
|
trusted library allocation
|
page read and write
|
||
6FD000
|
heap
|
page read and write
|
||
4C0F000
|
trusted library allocation
|
page read and write
|
||
4C1C000
|
trusted library allocation
|
page read and write
|
||
4C24000
|
trusted library allocation
|
page read and write
|
||
6D1000
|
heap
|
page read and write
|
||
6FD000
|
heap
|
page read and write
|
||
4C0D000
|
trusted library allocation
|
page read and write
|
||
4C22000
|
trusted library allocation
|
page read and write
|
||
4C04000
|
trusted library allocation
|
page read and write
|
||
52FF000
|
trusted library allocation
|
page read and write
|
||
6FE000
|
heap
|
page read and write
|
||
4C2F000
|
trusted library allocation
|
page read and write
|
||
4CF1000
|
trusted library allocation
|
page read and write
|
||
722000
|
heap
|
page read and write
|
||
4BFE000
|
trusted library allocation
|
page read and write
|
||
70D000
|
heap
|
page read and write
|
||
4C14000
|
trusted library allocation
|
page read and write
|
||
4C04000
|
trusted library allocation
|
page read and write
|
||
4C04000
|
trusted library allocation
|
page read and write
|
||
2994000
|
trusted library allocation
|
page read and write
|
||
4C49000
|
trusted library allocation
|
page read and write
|
||
4C02000
|
trusted library allocation
|
page read and write
|
||
4C11000
|
trusted library allocation
|
page read and write
|
||
19A000
|
stack
|
page read and write
|
||
4C14000
|
trusted library allocation
|
page read and write
|
||
666000
|
heap
|
page read and write
|
||
4C6C000
|
trusted library allocation
|
page read and write
|
||
6F7000
|
heap
|
page read and write
|
||
C10000
|
heap
|
page read and write
|
||
580000
|
unkown
|
page readonly
|
||
299B000
|
trusted library allocation
|
page read and write
|
||
4C24000
|
trusted library allocation
|
page read and write
|
||
4C27000
|
trusted library allocation
|
page read and write
|
||
1000000
|
heap
|
page read and write
|
||
4C13000
|
trusted library allocation
|
page read and write
|
||
FD0000
|
heap
|
page read and write
|
||
B74000
|
trusted library allocation
|
page read and write
|
||
4BF3000
|
trusted library allocation
|
page read and write
|
||
6E7000
|
heap
|
page read and write
|
||
4C0F000
|
trusted library allocation
|
page read and write
|
||
4C21000
|
trusted library allocation
|
page read and write
|
||
4C04000
|
trusted library allocation
|
page read and write
|
||
6D9000
|
heap
|
page read and write
|
||
6FF000
|
heap
|
page read and write
|
||
570000
|
heap
|
page read and write
|
||
4C11000
|
trusted library allocation
|
page read and write
|
||
C30000
|
heap
|
page read and write
|
||
6F9000
|
heap
|
page read and write
|
||
6F3000
|
heap
|
page read and write
|
||
B60000
|
trusted library allocation
|
page read and write
|
||
B97000
|
trusted library allocation
|
page execute and read and write
|
||
4C51000
|
trusted library allocation
|
page read and write
|
||
4C14000
|
trusted library allocation
|
page read and write
|
||
4CF7000
|
trusted library allocation
|
page read and write
|
||
4C0D000
|
trusted library allocation
|
page read and write
|
||
4C11000
|
trusted library allocation
|
page read and write
|
||
C00000
|
trusted library allocation
|
page execute and read and write
|
||
4C04000
|
trusted library allocation
|
page read and write
|
||
4C72000
|
trusted library allocation
|
page read and write
|
||
4C28000
|
trusted library allocation
|
page read and write
|
||
4C11000
|
trusted library allocation
|
page read and write
|
||
4C0F000
|
trusted library allocation
|
page read and write
|
||
4C41000
|
trusted library allocation
|
page read and write
|
||
B6D000
|
trusted library allocation
|
page execute and read and write
|
||
E4F000
|
stack
|
page read and write
|
||
715000
|
heap
|
page read and write
|
||
4C05000
|
trusted library allocation
|
page read and write
|
||
55E000
|
stack
|
page read and write
|
||
ACE000
|
stack
|
page read and write
|
||
4C2A000
|
trusted library allocation
|
page read and write
|
||
72B000
|
heap
|
page read and write
|
||
4C04000
|
trusted library allocation
|
page read and write
|
||
4BF9000
|
trusted library allocation
|
page read and write
|
||
701000
|
heap
|
page read and write
|
||
4C64000
|
trusted library allocation
|
page read and write
|
||
4C27000
|
trusted library allocation
|
page read and write
|
||
4C0D000
|
trusted library allocation
|
page read and write
|
||
6F9000
|
heap
|
page read and write
|
||
4C2B000
|
trusted library allocation
|
page read and write
|
||
4C0D000
|
trusted library allocation
|
page read and write
|
||
6CDC1000
|
unkown
|
page execute read
|
||
4C21000
|
trusted library allocation
|
page read and write
|
||
A65D000
|
stack
|
page read and write
|
||
4C5A000
|
trusted library allocation
|
page read and write
|
||
6D1000
|
heap
|
page read and write
|
||
4BF3000
|
trusted library allocation
|
page read and write
|
||
4C29000
|
trusted library allocation
|
page read and write
|
||
4C04000
|
trusted library allocation
|
page read and write
|
||
722000
|
heap
|
page read and write
|
||
4C0D000
|
trusted library allocation
|
page read and write
|
||
4C91000
|
trusted library allocation
|
page read and write
|
||
4C3D000
|
trusted library allocation
|
page read and write
|
||
4C0F000
|
trusted library allocation
|
page read and write
|
||
711000
|
heap
|
page read and write
|
||
4C04000
|
trusted library allocation
|
page read and write
|
||
6E7000
|
heap
|
page read and write
|
||
AD2F000
|
stack
|
page read and write
|
||
4C0F000
|
trusted library allocation
|
page read and write
|
||
B70000
|
trusted library allocation
|
page read and write
|
||
4C18000
|
trusted library allocation
|
page read and write
|
||
4C38000
|
trusted library allocation
|
page read and write
|
||
4B41000
|
trusted library allocation
|
page read and write
|
||
6F0000
|
heap
|
page read and write
|
||
4BFB000
|
trusted library allocation
|
page read and write
|
||
4DF7000
|
trusted library allocation
|
page read and write
|
||
4C4D000
|
trusted library allocation
|
page read and write
|
||
4C64000
|
trusted library allocation
|
page read and write
|
||
4C11000
|
trusted library allocation
|
page read and write
|
||
C5E000
|
heap
|
page read and write
|
||
4C11000
|
trusted library allocation
|
page read and write
|
||
4C01000
|
trusted library allocation
|
page read and write
|
||
4C11000
|
trusted library allocation
|
page read and write
|
||
B63000
|
trusted library allocation
|
page execute and read and write
|
||
4C53000
|
trusted library allocation
|
page read and write
|
||
6CE30000
|
unkown
|
page readonly
|
||
5812000
|
trusted library allocation
|
page read and write
|
||
4C9A000
|
trusted library allocation
|
page read and write
|
||
65D000
|
heap
|
page read and write
|
||
4C0D000
|
trusted library allocation
|
page read and write
|
||
4BF0000
|
trusted library allocation
|
page read and write
|
||
4C2F000
|
trusted library allocation
|
page read and write
|
||
4C4C000
|
trusted library allocation
|
page read and write
|
||
4C04000
|
trusted library allocation
|
page read and write
|
||
2870000
|
heap
|
page execute and read and write
|
||
4C25000
|
trusted library allocation
|
page read and write
|
||
4BF1000
|
trusted library allocation
|
page read and write
|
||
4C11000
|
trusted library allocation
|
page read and write
|
||
722000
|
heap
|
page read and write
|
||
5A0000
|
heap
|
page read and write
|
||
4C0B000
|
trusted library allocation
|
page read and write
|
||
4C28000
|
trusted library allocation
|
page read and write
|
||
4C11000
|
trusted library allocation
|
page read and write
|
||
4E7E000
|
stack
|
page read and write
|
||
4C45000
|
trusted library allocation
|
page read and write
|
||
4CF1000
|
heap
|
page read and write
|
||
4C0F000
|
trusted library allocation
|
page read and write
|
||
4C0F000
|
trusted library allocation
|
page read and write
|
||
688000
|
heap
|
page read and write
|
||
4C04000
|
trusted library allocation
|
page read and write
|
||
6FC000
|
heap
|
page read and write
|
||
4C41000
|
trusted library allocation
|
page read and write
|
||
C40000
|
trusted library allocation
|
page read and write
|
||
4C04000
|
trusted library allocation
|
page read and write
|
||
4C38000
|
trusted library allocation
|
page read and write
|
||
4C04000
|
trusted library allocation
|
page read and write
|
||
3981000
|
trusted library allocation
|
page read and write
|
||
4C82000
|
trusted library allocation
|
page read and write
|
||
4C28000
|
trusted library allocation
|
page read and write
|
||
B30000
|
heap
|
page read and write
|
||
4C13000
|
trusted library allocation
|
page read and write
|
||
4C14000
|
trusted library allocation
|
page read and write
|
||
4C22000
|
trusted library allocation
|
page read and write
|
||
4C4D000
|
trusted library allocation
|
page read and write
|
||
4C0A000
|
trusted library allocation
|
page read and write
|
||
4C21000
|
trusted library allocation
|
page read and write
|
||
4DC8000
|
trusted library allocation
|
page read and write
|
||
711000
|
heap
|
page read and write
|
||
4C3A000
|
trusted library allocation
|
page read and write
|
||
693000
|
heap
|
page read and write
|
||
4C0F000
|
trusted library allocation
|
page read and write
|
||
4C29000
|
trusted library allocation
|
page read and write
|
||
83C000
|
stack
|
page read and write
|
||
4C61000
|
trusted library allocation
|
page read and write
|
||
4C59000
|
trusted library allocation
|
page read and write
|
||
4C11000
|
trusted library allocation
|
page read and write
|
||
4BFF000
|
trusted library allocation
|
page read and write
|
||
4C4E000
|
trusted library allocation
|
page read and write
|
||
4C2D000
|
trusted library allocation
|
page read and write
|
||
4C36000
|
trusted library allocation
|
page read and write
|
||
4C55000
|
trusted library allocation
|
page read and write
|
||
6FA000
|
heap
|
page read and write
|
||
4185000
|
trusted library allocation
|
page read and write
|
||
493F000
|
stack
|
page read and write
|
||
745F000
|
stack
|
page read and write
|
||
860000
|
remote allocation
|
page read and write
|
||
4C27000
|
trusted library allocation
|
page read and write
|
||
4C04000
|
trusted library allocation
|
page read and write
|
||
4C51000
|
trusted library allocation
|
page read and write
|
||
4C5C000
|
trusted library allocation
|
page read and write
|
||
4CF0000
|
heap
|
page read and write
|
||
4C4D000
|
trusted library allocation
|
page read and write
|
||
70D000
|
heap
|
page read and write
|
||
4E60000
|
trusted library allocation
|
page read and write
|
||
400000
|
heap
|
page read and write
|
||
4C05000
|
trusted library allocation
|
page read and write
|
||
4C14000
|
trusted library allocation
|
page read and write
|
||
4C0D000
|
trusted library allocation
|
page read and write
|
||
4C61000
|
trusted library allocation
|
page read and write
|
||
9FE000
|
stack
|
page read and write
|
||
4C11000
|
trusted library allocation
|
page read and write
|
||
4C22000
|
trusted library allocation
|
page read and write
|
||
4C11000
|
trusted library allocation
|
page read and write
|
||
4C0D000
|
trusted library allocation
|
page read and write
|
||
4C14000
|
trusted library allocation
|
page read and write
|
||
B9B000
|
trusted library allocation
|
page execute and read and write
|
||
4BF4000
|
trusted library allocation
|
page read and write
|
||
4C09000
|
trusted library allocation
|
page read and write
|
||
706000
|
heap
|
page read and write
|
||
706000
|
heap
|
page read and write
|
||
8CE000
|
stack
|
page read and write
|
||
4C14000
|
trusted library allocation
|
page read and write
|
||
860000
|
remote allocation
|
page read and write
|
||
4C50000
|
trusted library allocation
|
page read and write
|
||
4C11000
|
trusted library allocation
|
page read and write
|
||
4C14000
|
trusted library allocation
|
page read and write
|
||
4C01000
|
trusted library allocation
|
page read and write
|
||
4C0D000
|
trusted library allocation
|
page read and write
|
||
4C0F000
|
trusted library allocation
|
page read and write
|
||
860000
|
remote allocation
|
page read and write
|
||
640000
|
heap
|
page read and write
|
||
975000
|
remote allocation
|
page execute and read and write
|
||
4F0000
|
unkown
|
page execute and read and write
|
||
4BFE000
|
trusted library allocation
|
page read and write
|
||
4C5A000
|
trusted library allocation
|
page read and write
|
||
4BFA000
|
trusted library allocation
|
page read and write
|
||
4C0D000
|
trusted library allocation
|
page read and write
|
||
4C0D000
|
trusted library allocation
|
page read and write
|
||
4C11000
|
trusted library allocation
|
page read and write
|
||
4C14000
|
trusted library allocation
|
page read and write
|
||
4BF1000
|
trusted library allocation
|
page read and write
|
||
C7D000
|
heap
|
page read and write
|
||
4C14000
|
trusted library allocation
|
page read and write
|
||
4C7A000
|
trusted library allocation
|
page read and write
|
||
CEE000
|
heap
|
page read and write
|
||
9A0000
|
heap
|
page read and write
|
||
C50000
|
heap
|
page read and write
|
||
722000
|
heap
|
page read and write
|
||
297F000
|
stack
|
page read and write
|
||
B50000
|
trusted library allocation
|
page read and write
|
||
4C0A000
|
trusted library allocation
|
page read and write
|
||
658000
|
heap
|
page read and write
|
||
4BF8000
|
trusted library allocation
|
page read and write
|
||
4C09000
|
trusted library allocation
|
page read and write
|
||
6FD000
|
heap
|
page read and write
|
||
70D000
|
heap
|
page read and write
|
||
4C4D000
|
trusted library allocation
|
page read and write
|
||
4C0D000
|
trusted library allocation
|
page read and write
|
||
931000
|
remote allocation
|
page execute read
|
||
F4F000
|
stack
|
page read and write
|
||
51E000
|
stack
|
page read and write
|
||
4C8F000
|
trusted library allocation
|
page read and write
|
||
4C30000
|
trusted library allocation
|
page read and write
|
||
4C04000
|
trusted library allocation
|
page read and write
|
||
483D000
|
stack
|
page read and write
|
||
C7F000
|
heap
|
page read and write
|
||
4C04000
|
trusted library allocation
|
page read and write
|
||
4C0A000
|
trusted library allocation
|
page read and write
|
||
4C16000
|
trusted library allocation
|
page read and write
|
||
580000
|
unkown
|
page execute and read and write
|
||
70E000
|
heap
|
page read and write
|
||
4C65000
|
trusted library allocation
|
page read and write
|
||
4BF8000
|
trusted library allocation
|
page read and write
|
||
4C40000
|
trusted library allocation
|
page read and write
|
||
4C14000
|
trusted library allocation
|
page read and write
|
||
298B000
|
trusted library allocation
|
page read and write
|
||
4C08000
|
trusted library allocation
|
page read and write
|
||
AAEE000
|
stack
|
page read and write
|
||
4BF1000
|
trusted library allocation
|
page read and write
|
||
6CDE2000
|
unkown
|
page read and write
|
||
4C6F000
|
trusted library allocation
|
page read and write
|
||
4CA2000
|
trusted library allocation
|
page read and write
|
||
4C69000
|
trusted library allocation
|
page read and write
|
||
4C61000
|
trusted library allocation
|
page read and write
|
||
93A000
|
stack
|
page read and write
|
||
4F0000
|
unkown
|
page readonly
|
||
70D000
|
heap
|
page read and write
|
||
4A7E000
|
stack
|
page read and write
|
||
671000
|
heap
|
page read and write
|
||
4C11000
|
trusted library allocation
|
page read and write
|
||
4C0D000
|
trusted library allocation
|
page read and write
|
||
4C0D000
|
trusted library allocation
|
page read and write
|
||
4C4D000
|
trusted library allocation
|
page read and write
|
||
4C29000
|
trusted library allocation
|
page read and write
|
||
4C11000
|
trusted library allocation
|
page read and write
|
||
6E7000
|
heap
|
page read and write
|
||
6FE000
|
heap
|
page read and write
|
||
4C55000
|
trusted library allocation
|
page read and write
|
||
C5A000
|
heap
|
page read and write
|
||
719000
|
heap
|
page read and write
|
||
A55D000
|
stack
|
page read and write
|
||
711000
|
heap
|
page read and write
|
||
AAAE000
|
stack
|
page read and write
|
||
4C02000
|
trusted library allocation
|
page read and write
|
||
4D48000
|
trusted library allocation
|
page read and write
|
||
B64000
|
trusted library allocation
|
page read and write
|
||
4C0D000
|
trusted library allocation
|
page read and write
|
||
706000
|
heap
|
page read and write
|
||
4D98000
|
trusted library allocation
|
page read and write
|
||
4C11000
|
trusted library allocation
|
page read and write
|
||
4C11000
|
trusted library allocation
|
page read and write
|
||
4C7D000
|
trusted library allocation
|
page read and write
|
||
701000
|
heap
|
page read and write
|
||
83F000
|
stack
|
page read and write
|
||
4C45000
|
trusted library allocation
|
page read and write
|
||
6FD000
|
heap
|
page read and write
|
||
575000
|
heap
|
page read and write
|
||
AC2E000
|
stack
|
page read and write
|
||
4C95000
|
trusted library allocation
|
page read and write
|
||
4E3E000
|
stack
|
page read and write
|
||
4BF7000
|
trusted library allocation
|
page read and write
|
||
4C45000
|
trusted library allocation
|
page read and write
|
||
B0E000
|
stack
|
page read and write
|
||
5A0000
|
unkown
|
page readonly
|
||
4C21000
|
trusted library allocation
|
page read and write
|
||
4C38000
|
trusted library allocation
|
page read and write
|
||
4C04000
|
trusted library allocation
|
page read and write
|
||
701000
|
heap
|
page read and write
|
||
4C45000
|
trusted library allocation
|
page read and write
|
||
4C0D000
|
trusted library allocation
|
page read and write
|
||
4C08000
|
trusted library allocation
|
page read and write
|
||
4C2D000
|
trusted library allocation
|
page read and write
|
||
577000
|
heap
|
page read and write
|
||
4C3E000
|
trusted library allocation
|
page read and write
|
||
4C9D000
|
trusted library allocation
|
page read and write
|
||
F8E000
|
stack
|
page read and write
|
||
4C04000
|
trusted library allocation
|
page read and write
|
||
722000
|
heap
|
page read and write
|
||
6F3000
|
heap
|
page read and write
|
||
713000
|
heap
|
page read and write
|
||
4C1F000
|
trusted library allocation
|
page read and write
|
There are 439 hidden memdumps, click here to show them.