IOC Report
file.exe

loading gif

Files

File Path
Type
Category
Malicious
file.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\Users\Public\Desktop\Google Chrome.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Description string, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:41 2023, mtime=Wed Oct 4 11:02:28 2023, atime=Wed Sep 27 04:28:27 2023, length=3242272, window=hide
dropped
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\RegAsm.exe.log
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\Tmp9897.tmp
data
dropped
C:\Users\user\AppData\Local\Temp\Tmp98C7.tmp
data
dropped
C:\Users\user\AppData\Roaming\Microsoft\Crypto\RSA\S-1-5-21-2246122658-3693405117-2476756634-1002\76b53b3ec448f7ccdda2063b15d2bfc3_9e146be9-c76a-4720-bcdb-53011b87bd06
data
dropped

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\file.exe
"C:\Users\user\Desktop\file.exe"
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
malicious

URLs

Name
IP
Malicious
http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-soap-message-security-1.0#Text
unknown
http://schemas.xmlsoap.org/ws/2005/02/sc/sct
unknown
https://duckduckgo.com/chrome_newtab
unknown
http://schemas.xmlsoap.org/ws/2004/04/security/sc/dk
unknown
https://duckduckgo.com/ac/?q=
unknown
http://tempuri.org/Entity/Id14ResponseD
unknown
http://tempuri.org/Entity/Id23ResponseD
unknown
http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-soap-message-security-1.0#HexBinary
unknown
http://tempuri.org/Entity/Id12Response
unknown
http://tempuri.org/
unknown
http://tempuri.org/Entity/Id2Response
unknown
http://schemas.xmlsoap.org/ws/2005/02/sc/dk/p_sha1
unknown
http://tempuri.org/Entity/Id21Response
unknown
http://schemas.xmlsoap.org/2005/02/trust/spnego#GSS_Wrap
unknown
http://tempuri.org/Entity/Id9
unknown
http://docs.oasis-open.org/wss/oasis-wss-saml-token-profile-1.1#SAMLID
unknown
http://tempuri.org/Entity/Id8
unknown
http://tempuri.org/Entity/Id6ResponseD
unknown
http://tempuri.org/Entity/Id5
unknown
http://schemas.xmlsoap.org/ws/2004/10/wsat/Prepare
unknown
http://tempuri.org/Entity/Id4
unknown
http://tempuri.org/Entity/Id7
unknown
http://tempuri.org/Entity/Id6
unknown
http://schemas.xmlsoap.org/ws/2005/02/trust#BinarySecret
unknown
http://docs.oasis-open.org/wss/oasis-wss-rel-token-profile-1.0.pdf#license
unknown
http://schemas.xmlsoap.org/ws/2005/02/trust/RSTR/Issue
unknown
http://schemas.xmlsoap.org/ws/2004/10/wsat/Aborted
unknown
http://schemas.xmlsoap.org/ws/2005/02/rm/TerminateSequence
unknown
http://tempuri.org/Entity/Id13ResponseD
unknown
http://schemas.xmlsoap.org/ws/2004/10/wsat/fault
unknown
http://schemas.xmlsoap.org/ws/2004/10/wsat
unknown
http://docs.oasis-open.org/wss/oasis-wss-soap-message-security-1.1#EncryptedKey
unknown
http://tempuri.org/Entity/Id15Response
unknown
http://tempuri.org/Entity/Id5ResponseD
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
http://schemas.xmlsoap.org/ws/2005/02/trust/RSTR/SCT/Renew
unknown
http://schemas.xmlsoap.org/ws/2004/08/addressing/faultp9
unknown
http://schemas.xmlsoap.org/ws/2004/10/wscoor/Register
unknown
http://tempuri.org/Entity/Id6Response
unknown
http://schemas.xmlsoap.org/ws/2004/04/trust/SymmetricKey
unknown
https://api.ip.sb/ip
unknown
http://schemas.xmlsoap.org/ws/2004/04/sc
unknown
http://tempuri.org/Entity/Id1ResponseD
unknown
http://schemas.xmlsoap.org/ws/2004/10/wsat/Volatile2PC
unknown
http://schemas.xmlsoap.org/ws/2005/02/trust/RSTR/SCT/Cancel
unknown
http://tempuri.org/Entity/Id9Response
unknown
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
unknown
http://tempuri.org/Entity/Id20
unknown
http://tempuri.org/Entity/Id21
unknown
http://tempuri.org/Entity/Id22
unknown
http://docs.oasis-open.org/wss/oasis-wss-kerberos-token-profile-1.1#Kerberosv5APREQSHA1
unknown
http://tempuri.org/Entity/Id23
unknown
http://schemas.xmlsoap.org/ws/2004/04/security/trust/CK/PSHA1
unknown
http://tempuri.org/Entity/Id24
unknown
http://schemas.xmlsoap.org/ws/2004/04/security/trust/RSTR/Issue
unknown
http://tempuri.org/Entity/Id24Response
unknown
https://www.ecosia.org/newtab/
unknown
http://tempuri.org/Entity/Id1Response
unknown
http://schemas.xmlsoap.org/ws/2005/02/rm/AckRequested
unknown
http://schemas.xmlsoap.org/ws/2004/10/wsat/ReadOnly
unknown
http://schemas.xmlsoap.org/ws/2004/10/wsat/Replay
unknown
http://schemas.xmlsoap.org/ws/2005/02/trust/tlsnego
unknown
http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-soap-message-security-1.0#Base64Binary
unknown
http://schemas.xmlsoap.org/ws/2004/10/wsat/Durable2PC
unknown
http://schemas.xmlsoap.org/ws/2004/04/security/trust/SymmetricKey
unknown
http://tempuri.org/Entity/Id21ResponseD
unknown
http://schemas.xmlsoap.org/ws/2004/08/addressing
unknown
http://schemas.xmlsoap.org/ws/2005/02/trust/RST/Issue
unknown
http://ns.adp/1.0//
unknown
http://schemas.xmlsoap.org/ws/2004/10/wsat/Completion
unknown
http://schemas.xmlsoap.org/ws/2004/04/trust
unknown
http://tempuri.org/Entity/Id10
unknown
http://tempuri.org/Entity/Id11
unknown
http://tempuri.org/Entity/Id10ResponseD
unknown
http://tempuri.org/Entity/Id12
unknown
http://tempuri.org/Entity/Id16Response
unknown
http://schemas.xmlsoap.org/ws/2004/10/wscoor/CreateCoordinationContextResponse
unknown
http://schemas.xmlsoap.org/ws/2005/02/trust/RST/SCT/Cancel
unknown
http://tempuri.org/Entity/Id13
unknown
http://tempuri.org/Entity/Id14
unknown
http://tempuri.org/Entity/Id15
unknown
http://tempuri.org/Entity/Id16
unknown
http://schemas.xmlsoap.org/ws/2005/02/trust/Nonce
unknown
http://tempuri.org/Entity/Id17
unknown
http://tempuri.org/Entity/Id18
unknown
http://tempuri.org/Entity/Id5Response
unknown
http://tempuri.org/Entity/Id19
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/dns
unknown
http://tempuri.org/Entity/Id15ResponseD
unknown
http://tempuri.org/Entity/Id10Response
unknown
http://schemas.xmlsoap.org/ws/2005/02/trust/Renew
unknown
http://tempuri.org/Entity/Id11ResponseD
unknown
http://tempuri.org/Entity/Id8Response
unknown
http://schemas.xmlsoap.org/ws/2004/04/trust/PublicKey
unknown
http://docs.oasis-open.org/wss/oasis-wss-saml-token-profile-1.1#SAMLV2.0
unknown
http://docs.oasis-open.org/wss/oasis-wss-saml-token-profile-1.0#SAMLAssertionID
unknown
http://schemas.xmlsoap.org/ws/2004/04/security/trust/RST/SCT
unknown
http://schemas.xmlsoap.org/ws/2006/02/addressingidentity
unknown
http://tempuri.org/Entity/Id17ResponseD
unknown
http://schemas.xmlsoap.org/soap/envelope/
unknown
There are 90 hidden URLs, click here to show them.

IPs

IP
Domain
Country
Malicious
5.42.65.115
unknown
Russian Federation
malicious

Registry

Path
Value
Malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\F1A578C4CB5DE79A370893983FD4DA8B67B2B064
Blob
malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
Owner
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
SessionHash
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
Sequence
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
RegFiles0000
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
RegFilesHash

Memdumps

Base Address
Regiontype
Protect
Malicious
407000
unkown
page read and write
malicious
402000
remote allocation
page execute and read and write
malicious
2C49000
trusted library allocation
page read and write
malicious
67E0000
trusted library allocation
page read and write
2EE4000
trusted library allocation
page read and write
4FF0000
trusted library allocation
page execute and read and write
3FAB000
trusted library allocation
page read and write
7720000
trusted library allocation
page read and write
3BD5000
trusted library allocation
page read and write
3D8E000
trusted library allocation
page read and write
6660000
trusted library allocation
page execute and read and write
308D000
trusted library allocation
page read and write
3E15000
trusted library allocation
page read and write
6800000
trusted library allocation
page read and write
3E0000
unkown
page readonly
3DBE000
trusted library allocation
page read and write
13C0000
heap
page read and write
2EDE000
trusted library allocation
page read and write
4041000
trusted library allocation
page read and write
73C9000
heap
page read and write
3FFF000
trusted library allocation
page read and write
54CD000
heap
page read and write
2EB3000
trusted library allocation
page read and write
405F000
trusted library allocation
page read and write
65B0000
trusted library allocation
page read and write
7860000
heap
page read and write
50B0000
heap
page read and write
65D0000
trusted library allocation
page read and write
3D81000
trusted library allocation
page read and write
3EBD000
trusted library allocation
page read and write
652A000
trusted library allocation
page read and write
6520000
trusted library allocation
page read and write
3FC1000
trusted library allocation
page read and write
3F57000
trusted library allocation
page read and write
3E66000
trusted library allocation
page read and write
2E26000
trusted library allocation
page read and write
3DA6000
trusted library allocation
page read and write
73A0000
heap
page read and write
2E6D000
trusted library allocation
page read and write
5D47000
heap
page read and write
DEE000
stack
page read and write
2DC0000
trusted library allocation
page read and write
2E13000
trusted library allocation
page read and write
7790000
heap
page read and write
303D000
trusted library allocation
page read and write
D4D000
trusted library allocation
page execute and read and write
774A000
trusted library allocation
page read and write
3D3D000
trusted library allocation
page read and write
7DC0000
trusted library allocation
page read and write
784E000
stack
page read and write
73CC000
heap
page read and write
3ED1000
trusted library allocation
page read and write
2D8F000
trusted library allocation
page read and write
3E69000
trusted library allocation
page read and write
3DE8000
trusted library allocation
page read and write
3F73000
trusted library allocation
page read and write
7DA000
stack
page read and write
D1E000
stack
page read and write
3E9C000
trusted library allocation
page read and write
2DD6000
trusted library allocation
page read and write
73B8000
heap
page read and write
2DAA000
trusted library allocation
page read and write
D8E000
stack
page read and write
6B40000
trusted library allocation
page read and write
400000
remote allocation
page execute and read and write
2ED2000
trusted library allocation
page read and write
3BD0000
trusted library allocation
page read and write
2E0D000
trusted library allocation
page read and write
54C2000
heap
page read and write
7735000
trusted library allocation
page read and write
3BE3000
trusted library allocation
page read and write
73EB000
heap
page read and write
3DD5000
trusted library allocation
page read and write
6B2E000
stack
page read and write
7748000
trusted library allocation
page read and write
3E4E000
trusted library allocation
page read and write
5579000
heap
page read and write
310E000
trusted library allocation
page read and write
67F0000
trusted library allocation
page read and write
C30000
heap
page read and write
7870000
trusted library allocation
page execute and read and write
3048000
trusted library allocation
page read and write
3FC4000
trusted library allocation
page read and write
4006000
trusted library allocation
page read and write
29A0000
trusted library allocation
page read and write
65F0000
trusted library allocation
page read and write
2E01000
trusted library allocation
page read and write
2D8C000
trusted library allocation
page read and write
27FF000
stack
page read and write
CD0000
heap
page read and write
6430000
trusted library allocation
page execute and read and write
2DCE000
trusted library allocation
page read and write
3E90000
trusted library allocation
page read and write
7DC6000
trusted library allocation
page read and write
3108000
trusted library allocation
page read and write
3C23000
trusted library allocation
page read and write
6576000
trusted library allocation
page read and write
3FF9000
trusted library allocation
page read and write
DA0000
trusted library allocation
page read and write
555D000
heap
page read and write
40C9000
trusted library allocation
page read and write
3EE9000
trusted library allocation
page read and write
7407000
heap
page read and write
6525000
trusted library allocation
page read and write
554E000
heap
page read and write
3FC7000
trusted library allocation
page read and write
3F37000
trusted library allocation
page read and write
2E80000
trusted library allocation
page read and write
2FF9000
trusted library allocation
page read and write
7723000
trusted library allocation
page read and write
2B9E000
stack
page read and write
B40000
heap
page read and write
2E66000
trusted library allocation
page read and write
5F1E000
stack
page read and write
10EF000
stack
page read and write
3D75000
trusted library allocation
page read and write
5D1E000
stack
page read and write
3DAD000
trusted library allocation
page read and write
2A40000
trusted library allocation
page read and write
3D2F000
trusted library allocation
page read and write
5516000
heap
page read and write
3EF0000
trusted library allocation
page read and write
C65000
heap
page read and write
50B3000
heap
page read and write
61DE000
stack
page read and write
2DAD000
trusted library allocation
page read and write
5270000
trusted library allocation
page read and write
505E000
stack
page read and write
69EE000
stack
page read and write
2E82000
trusted library allocation
page read and write
7E0E000
stack
page read and write
7F4E000
stack
page read and write
B3D000
stack
page read and write
E30000
trusted library allocation
page execute and read and write
2FE4000
trusted library allocation
page read and write
556C000
heap
page read and write
77A0000
trusted library allocation
page read and write
5220000
heap
page read and write
7732000
trusted library allocation
page read and write
3D32000
trusted library allocation
page read and write
DFA000
heap
page read and write
3BAF000
trusted library allocation
page read and write
656B000
trusted library allocation
page read and write
6650000
trusted library allocation
page execute and read and write
DFE000
heap
page read and write
F0F000
heap
page read and write
2D97000
trusted library allocation
page read and write
6640000
trusted library allocation
page read and write
65BE000
trusted library allocation
page read and write
40C3000
trusted library allocation
page read and write
4087000
trusted library allocation
page read and write
7D7E000
stack
page read and write
2A15000
trusted library allocation
page read and write
D75000
trusted library allocation
page execute and read and write
432000
remote allocation
page execute and read and write
30C0000
trusted library allocation
page read and write
3E1D000
trusted library allocation
page read and write
AF7000
stack
page read and write
3E1000
unkown
page execute read
744C000
heap
page read and write
3EBA000
trusted library allocation
page read and write
2CD2000
trusted library allocation
page read and write
76E0000
trusted library allocation
page execute and read and write
309C000
trusted library allocation
page read and write
6582000
trusted library allocation
page read and write
3E63000
trusted library allocation
page read and write
E60000
heap
page read and write
5260000
trusted library allocation
page read and write
6820000
trusted library allocation
page read and write
3E59000
trusted library allocation
page read and write
D66000
trusted library allocation
page execute and read and write
6840000
trusted library allocation
page execute and read and write
6630000
trusted library allocation
page read and write
402E000
trusted library allocation
page read and write
72A0000
heap
page read and write
29D0000
trusted library allocation
page read and write
F0B000
heap
page read and write
3E3C000
trusted library allocation
page read and write
2E8C000
trusted library allocation
page read and write
406D000
trusted library allocation
page read and write
D43000
trusted library allocation
page execute and read and write
C20000
heap
page read and write
3E55000
trusted library allocation
page read and write
3E0F000
trusted library allocation
page read and write
73FF000
heap
page read and write
3EB7000
trusted library allocation
page read and write
3FD000
unkown
page readonly
3FF6000
trusted library allocation
page read and write
3FA5000
trusted library allocation
page read and write
29B0000
trusted library allocation
page read and write
7850000
trusted library allocation
page read and write
3D99000
trusted library allocation
page read and write
5577000
heap
page read and write
2FD9000
trusted library allocation
page read and write
6535000
trusted library allocation
page read and write
29F6000
trusted library allocation
page read and write
7726000
trusted library allocation
page read and write
2E34000
trusted library allocation
page read and write
3EE4000
trusted library allocation
page read and write
3DA0000
trusted library allocation
page read and write
3D49000
trusted library allocation
page read and write
F23000
heap
page read and write
547F000
stack
page read and write
BA0000
heap
page read and write
2D9E000
trusted library allocation
page read and write
404A000
trusted library allocation
page read and write
520E000
stack
page read and write
2E74000
trusted library allocation
page read and write
E6B000
heap
page read and write
29F1000
trusted library allocation
page read and write
40BC000
trusted library allocation
page read and write
73BF000
heap
page read and write
774F000
trusted library allocation
page read and write
550C000
heap
page read and write
6571000
trusted library allocation
page read and write
76DD000
stack
page read and write
2DB5000
trusted library allocation
page read and write
2EA5000
trusted library allocation
page read and write
62DF000
stack
page read and write
BB0000
direct allocation
page execute and read and write
2EE6000
trusted library allocation
page read and write
7778000
trusted library allocation
page read and write
4054000
trusted library allocation
page read and write
F44000
heap
page read and write
2D9B000
trusted library allocation
page read and write
3BDF000
trusted library allocation
page read and write
729D000
stack
page read and write
3F94000
trusted library allocation
page read and write
2A4E000
trusted library allocation
page read and write
3E0000
unkown
page readonly
29D4000
trusted library allocation
page read and write
3023000
trusted library allocation
page read and write
3E41000
trusted library allocation
page read and write
2E7E000
trusted library allocation
page read and write
3F62000
trusted library allocation
page read and write
3F55000
trusted library allocation
page read and write
775A000
trusted library allocation
page read and write
3EA9000
trusted library allocation
page read and write
7DBF000
stack
page read and write
3EFD000
trusted library allocation
page read and write
4023000
trusted library allocation
page read and write
3EF6000
trusted library allocation
page read and write
3FDA000
trusted library allocation
page read and write
6539000
trusted library allocation
page read and write
7890000
trusted library allocation
page execute and read and write
3FE8000
trusted library allocation
page read and write
5D43000
heap
page read and write
3EDE000
trusted library allocation
page read and write
2DA7000
trusted library allocation
page read and write
2D42000
trusted library allocation
page read and write
3F6D000
trusted library allocation
page read and write
3E01000
trusted library allocation
page read and write
65B5000
trusted library allocation
page read and write
3DE2000
trusted library allocation
page read and write
C60000
heap
page read and write
4015000
trusted library allocation
page read and write
7880000
trusted library allocation
page read and write
557D000
heap
page read and write
D60000
trusted library allocation
page read and write
3F7A000
trusted library allocation
page read and write
3DFA000
trusted library allocation
page read and write
28FE000
stack
page read and write
2A90000
heap
page execute and read and write
D90000
heap
page read and write
3D6D000
trusted library allocation
page read and write
6AEC000
stack
page read and write
29FD000
trusted library allocation
page read and write
5480000
heap
page read and write
2E03000
trusted library allocation
page read and write
7435000
heap
page read and write
CB0000
heap
page read and write
D77000
trusted library allocation
page execute and read and write
7755000
trusted library allocation
page read and write
742C000
heap
page read and write
63DF000
stack
page read and write
3DED000
trusted library allocation
page read and write
2D89000
trusted library allocation
page read and write
3DBB000
trusted library allocation
page read and write
2F6B000
trusted library allocation
page read and write
D44000
trusted library allocation
page read and write
6B50000
trusted library allocation
page execute and read and write
3D6A000
trusted library allocation
page read and write
3DF4000
trusted library allocation
page read and write
3DC9000
trusted library allocation
page read and write
2E10000
trusted library allocation
page read and write
D97000
heap
page read and write
2A10000
trusted library allocation
page read and write
2F7C000
trusted library allocation
page read and write
658E000
trusted library allocation
page read and write
6B30000
trusted library allocation
page read and write
6860000
trusted library allocation
page execute and read and write
7D3E000
stack
page read and write
5D32000
heap
page read and write
5564000
heap
page read and write
66B0000
trusted library allocation
page execute and read and write
554B000
heap
page read and write
407000
unkown
page write copy
3DB1000
trusted library allocation
page read and write
55BE000
stack
page read and write
7730000
trusted library allocation
page read and write
3BA1000
trusted library allocation
page read and write
3EC5000
trusted library allocation
page read and write
3E7D000
trusted library allocation
page read and write
D72000
trusted library allocation
page read and write
4082000
trusted library allocation
page read and write
3E05000
trusted library allocation
page read and write
55FD000
stack
page read and write
3035000
trusted library allocation
page read and write
DF0000
heap
page read and write
6810000
heap
page execute and read and write
2E8F000
trusted library allocation
page read and write
4094000
trusted library allocation
page read and write
5533000
heap
page read and write
D30000
trusted library allocation
page read and write
6528000
trusted library allocation
page read and write
5240000
heap
page read and write
804E000
stack
page read and write
6560000
trusted library allocation
page read and write
4FE0000
trusted library allocation
page read and write
2E7A000
trusted library allocation
page read and write
E9F000
heap
page read and write
73A4000
heap
page read and write
408E000
trusted library allocation
page read and write
E2C000
stack
page read and write
7760000
trusted library allocation
page read and write
780D000
stack
page read and write
3FD000
unkown
page readonly
7739000
trusted library allocation
page read and write
68AC000
stack
page read and write
3110000
trusted library allocation
page read and write
2F4B000
trusted library allocation
page read and write
3056000
trusted library allocation
page read and write
7417000
heap
page read and write
D70000
trusted library allocation
page read and write
29DB000
trusted library allocation
page read and write
2F65000
trusted library allocation
page read and write
456000
unkown
page readonly
7C3E000
stack
page read and write
2BA1000
trusted library allocation
page read and write
3E36000
trusted library allocation
page read and write
65C0000
trusted library allocation
page read and write
4C9B000
stack
page read and write
6450000
trusted library allocation
page execute and read and write
563E000
stack
page read and write
73A7000
heap
page read and write
3D25000
trusted library allocation
page read and write
2E77000
trusted library allocation
page read and write
3D35000
trusted library allocation
page read and write
5574000
heap
page read and write
3BDC000
trusted library allocation
page read and write
3F9E000
trusted library allocation
page read and write
6B70000
trusted library allocation
page read and write
509E000
stack
page read and write
446000
remote allocation
page execute and read and write
E50000
trusted library allocation
page read and write
40D0000
trusted library allocation
page read and write
7F0E000
stack
page read and write
3FED000
trusted library allocation
page read and write
E40000
trusted library allocation
page read and write
2E9A000
trusted library allocation
page read and write
5280000
heap
page execute and read and write
D40000
trusted library allocation
page read and write
3E71000
trusted library allocation
page read and write
302F000
trusted library allocation
page read and write
305E000
trusted library allocation
page read and write
73DE000
heap
page read and write
D4E000
stack
page read and write
B90000
heap
page read and write
4FE2000
trusted library allocation
page read and write
F0D000
heap
page read and write
CDE000
heap
page read and write
3D67000
trusted library allocation
page read and write
401B000
trusted library allocation
page read and write
3F70000
trusted library allocation
page read and write
54D6000
heap
page read and write
2E92000
trusted library allocation
page read and write
6830000
trusted library allocation
page read and write
4078000
trusted library allocation
page read and write
D6A000
trusted library allocation
page execute and read and write
65E0000
trusted library allocation
page read and write
400A000
trusted library allocation
page read and write
78DE000
stack
page read and write
73B4000
heap
page read and write
5258000
trusted library allocation
page read and write
5510000
heap
page read and write
3FCF000
trusted library allocation
page read and write
29BE000
trusted library allocation
page read and write
3E12000
trusted library allocation
page read and write
3E48000
trusted library allocation
page read and write
7770000
trusted library allocation
page read and write
3F86000
trusted library allocation
page read and write
2EEA000
trusted library allocation
page read and write
5283000
heap
page execute and read and write
CD5000
heap
page read and write
5494000
heap
page read and write
3BC9000
trusted library allocation
page read and write
3DC1000
trusted library allocation
page read and write
66C0000
trusted library allocation
page execute and read and write
7F0A0000
trusted library allocation
page execute and read and write
D5D000
trusted library allocation
page execute and read and write
44A000
unkown
page read and write
3D56000
trusted library allocation
page read and write
A3D000
stack
page read and write
6591000
trusted library allocation
page read and write
3E95000
trusted library allocation
page read and write
3FF3000
trusted library allocation
page read and write
2908000
trusted library allocation
page read and write
456000
unkown
page readonly
2A20000
trusted library allocation
page read and write
3FB2000
trusted library allocation
page read and write
775F000
trusted library allocation
page read and write
2EBB000
trusted library allocation
page read and write
7780000
trusted library allocation
page read and write
D62000
trusted library allocation
page read and write
EA1000
heap
page read and write
4018000
trusted library allocation
page read and write
2E3B000
trusted library allocation
page read and write
5250000
trusted library allocation
page read and write
3E8A000
trusted library allocation
page read and write
3F0F000
trusted library allocation
page read and write
D50000
trusted library allocation
page read and write
29EE000
trusted library allocation
page read and write
3EAD000
trusted library allocation
page read and write
403C000
trusted library allocation
page read and write
8060000
trusted library allocation
page read and write
6537000
trusted library allocation
page read and write
E94000
heap
page read and write
6600000
trusted library allocation
page read and write
7764000
trusted library allocation
page read and write
3E29000
trusted library allocation
page read and write
3EA2000
trusted library allocation
page read and write
3F4A000
trusted library allocation
page read and write
2A02000
trusted library allocation
page read and write
3D94000
trusted library allocation
page read and write
43B000
unkown
page read and write
2F59000
trusted library allocation
page read and write
3BC2000
trusted library allocation
page read and write
6530000
trusted library allocation
page read and write
69AC000
stack
page read and write
3FA2000
trusted library allocation
page read and write
3032000
trusted library allocation
page read and write
65BB000
trusted library allocation
page read and write
29C0000
heap
page read and write
3F99000
trusted library allocation
page read and write
437000
remote allocation
page execute and read and write
D7B000
trusted library allocation
page execute and read and write
796E000
stack
page read and write
3E1000
unkown
page execute read
CAD000
stack
page read and write
7854000
trusted library allocation
page read and write
75DB000
stack
page read and write
73F3000
heap
page read and write
65A0000
trusted library allocation
page read and write
3D5D000
trusted library allocation
page read and write
748A000
heap
page read and write
3FB6000
trusted library allocation
page read and write
2E1B000
trusted library allocation
page read and write
7444000
heap
page read and write
11EF000
stack
page read and write
2A80000
heap
page read and write
2FF2000
trusted library allocation
page read and write
3025000
trusted library allocation
page read and write
There are 452 hidden memdumps, click here to show them.