IOC Report
file.exe

loading gif

Files

File Path
Type
Category
Malicious
file.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\Users\Public\Desktop\Google Chrome.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Description string, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:41 2023, mtime=Wed Oct 4 11:02:28 2023, atime=Wed Sep 27 04:28:27 2023, length=3242272, window=hide
dropped
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\RegAsm.exe.log
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\TmpF2FF.tmp
data
dropped
C:\Users\user\AppData\Local\Temp\TmpF310.tmp
data
dropped
C:\Users\user\AppData\Roaming\Microsoft\Crypto\RSA\S-1-5-21-2246122658-3693405117-2476756634-1002\76b53b3ec448f7ccdda2063b15d2bfc3_9e146be9-c76a-4720-bcdb-53011b87bd06
data
dropped

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\file.exe
"C:\Users\user\Desktop\file.exe"
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
malicious

URLs

Name
IP
Malicious
http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-soap-message-security-1.0#Text
unknown
http://schemas.xmlsoap.org/ws/2005/02/sc/sct
unknown
https://duckduckgo.com/chrome_newtab
unknown
http://schemas.xmlsoap.org/ws/2004/04/security/sc/dk
unknown
https://duckduckgo.com/ac/?q=
unknown
http://tempuri.org/Entity/Id14ResponseD
unknown
http://tempuri.org/Entity/Id23ResponseD
unknown
http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-soap-message-security-1.0#HexBinary
unknown
http://tempuri.org/Entity/Id12Response
unknown
http://tempuri.org/
unknown
http://tempuri.org/Entity/Id2Response
unknown
http://schemas.xmlsoap.org/ws/2005/02/sc/dk/p_sha1
unknown
http://tempuri.org/Entity/Id21Response
unknown
http://schemas.xmlsoap.org/2005/02/trust/spnego#GSS_Wrap
unknown
http://tempuri.org/Entity/Id9
unknown
http://docs.oasis-open.org/wss/oasis-wss-saml-token-profile-1.1#SAMLID
unknown
http://tempuri.org/Entity/Id8
unknown
http://tempuri.org/Entity/Id6ResponseD
unknown
http://tempuri.org/Entity/Id5
unknown
http://schemas.xmlsoap.org/ws/2004/10/wsat/Prepare
unknown
http://tempuri.org/Entity/Id4
unknown
http://tempuri.org/Entity/Id7
unknown
http://tempuri.org/Entity/Id6
unknown
http://schemas.xmlsoap.org/ws/2005/02/trust#BinarySecret
unknown
http://tempuri.org/Entity/Id19Response
unknown
http://ns.exif/1
unknown
http://docs.oasis-open.org/wss/oasis-wss-rel-token-profile-1.0.pdf#license
unknown
http://schemas.xmlsoap.org/ws/2005/02/trust/RSTR/Issue
unknown
http://schemas.xmlsoap.org/ws/2004/10/wsat/Aborted
unknown
http://schemas.xmlsoap.org/ws/2005/02/rm/TerminateSequence
unknown
http://tempuri.org/Entity/Id13ResponseD
unknown
http://schemas.xmlsoap.org/ws/2004/10/wsat/fault
unknown
http://schemas.xmlsoap.org/ws/2004/10/wsat
unknown
http://docs.oasis-open.org/wss/oasis-wss-soap-message-security-1.1#EncryptedKey
unknown
http://tempuri.org/Entity/Id15Response
unknown
http://tempuri.org/Entity/Id5ResponseD
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
http://schemas.xmlsoap.org/ws/2005/02/trust/RSTR/SCT/Renew
unknown
http://schemas.xmlsoap.org/ws/2004/08/addressing/faultp9
unknown
http://schemas.xmlsoap.org/ws/2004/10/wscoor/Register
unknown
http://tempuri.org/Entity/Id6Response
unknown
http://schemas.xmlsoap.org/ws/2004/04/trust/SymmetricKey
unknown
https://api.ip.sb/ip
unknown
http://schemas.xmlsoap.org/ws/2004/04/sc
unknown
http://tempuri.org/Entity/Id1ResponseD
unknown
http://schemas.xmlsoap.org/ws/2004/10/wsat/Volatile2PC
unknown
http://schemas.xmlsoap.org/ws/2005/02/trust/RSTR/SCT/Cancel
unknown
http://tempuri.org/Entity/Id9Response
unknown
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
unknown
http://tempuri.org/Entity/Id20
unknown
http://tempuri.org/Entity/Id21
unknown
http://tempuri.org/Entity/Id22
unknown
http://docs.oasis-open.org/wss/oasis-wss-kerberos-token-profile-1.1#Kerberosv5APREQSHA1
unknown
http://tempuri.org/Entity/Id23
unknown
http://schemas.xmlsoap.org/ws/2004/04/security/trust/CK/PSHA1
unknown
http://tempuri.org/Entity/Id24
unknown
http://schemas.xmlsoap.org/ws/2004/04/security/trust/RSTR/Issue
unknown
http://tempuri.org/Entity/Id24Response
unknown
https://www.ecosia.org/newtab/
unknown
http://ns.adp/1.0/A
unknown
http://tempuri.org/Entity/Id1Response
unknown
http://schemas.xmlsoap.org/ws/2005/02/rm/AckRequested
unknown
http://schemas.xmlsoap.org/ws/2004/10/wsat/ReadOnly
unknown
http://schemas.xmlsoap.org/ws/2004/10/wsat/Replay
unknown
http://schemas.xmlsoap.org/ws/2005/02/trust/tlsnego
unknown
http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-soap-message-security-1.0#Base64Binary
unknown
http://schemas.xmlsoap.org/ws/2004/10/wsat/Durable2PC
unknown
http://schemas.xmlsoap.org/ws/2004/04/security/trust/SymmetricKey
unknown
http://tempuri.org/Entity/Id21ResponseD
unknown
http://schemas.xmlsoap.org/ws/2004/08/addressing
unknown
http://schemas.xmlsoap.org/ws/2005/02/trust/RST/Issue
unknown
http://schemas.xmlsoap.org/ws/2004/10/wsat/Completion
unknown
http://schemas.xmlsoap.org/ws/2004/04/trust
unknown
http://tempuri.org/Entity/Id10
unknown
http://tempuri.org/Entity/Id11
unknown
http://tempuri.org/Entity/Id10ResponseD
unknown
http://tempuri.org/Entity/Id12
unknown
http://tempuri.org/Entity/Id16Response
unknown
http://schemas.xmlsoap.org/ws/2004/10/wscoor/CreateCoordinationContextResponse
unknown
http://schemas.xmlsoap.org/ws/2005/02/trust/RST/SCT/Cancel
unknown
http://tempuri.org/Entity/Id13
unknown
http://tempuri.org/Entity/Id14
unknown
http://tempuri.org/Entity/Id15
unknown
http://tempuri.org/Entity/Id16
unknown
http://schemas.xmlsoap.org/ws/2005/02/trust/Nonce
unknown
http://tempuri.org/Entity/Id17
unknown
http://tempuri.org/Entity/Id18
unknown
http://tempuri.org/Entity/Id5Response
unknown
http://tempuri.org/Entity/Id19
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/dns
unknown
http://tempuri.org/Entity/Id15ResponseD
unknown
http://tempuri.org/Entity/Id10Response
unknown
http://schemas.xmlsoap.org/ws/2005/02/trust/Renew
unknown
http://tempuri.org/Entity/Id11ResponseD
unknown
http://tempuri.org/Entity/Id8Response
unknown
http://schemas.xmlsoap.org/ws/2004/04/trust/PublicKey
unknown
http://docs.oasis-open.org/wss/oasis-wss-saml-token-profile-1.1#SAMLV2.0
unknown
http://docs.oasis-open.org/wss/oasis-wss-saml-token-profile-1.0#SAMLAssertionID
unknown
http://schemas.xmlsoap.org/ws/2004/04/security/trust/RST/SCT
unknown
http://schemas.xmlsoap.org/ws/2006/02/addressingidentity
unknown
There are 90 hidden URLs, click here to show them.

IPs

IP
Domain
Country
Malicious
5.42.65.115
unknown
Russian Federation
malicious

Registry

Path
Value
Malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\F1A578C4CB5DE79A370893983FD4DA8B67B2B064
Blob
malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
Owner
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
SessionHash
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
Sequence
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
RegFiles0000
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
RegFilesHash

Memdumps

Base Address
Regiontype
Protect
Malicious
402000
remote allocation
page execute and read and write
malicious
3211000
trusted library allocation
page read and write
malicious
D27000
unkown
page read and write
malicious
3492000
trusted library allocation
page read and write
45D1000
trusted library allocation
page read and write
4701000
trusted library allocation
page read and write
4568000
trusted library allocation
page read and write
3478000
trusted library allocation
page read and write
D00000
unkown
page readonly
7F98000
trusted library allocation
page read and write
638E000
stack
page read and write
5750000
heap
page read and write
36A3000
trusted library allocation
page read and write
7EE90000
trusted library allocation
page execute and read and write
14D7000
trusted library allocation
page execute and read and write
3714000
trusted library allocation
page read and write
376B000
trusted library allocation
page read and write
340C000
trusted library allocation
page read and write
46AC000
trusted library allocation
page read and write
3369000
trusted library allocation
page read and write
6D30000
trusted library allocation
page read and write
3405000
trusted library allocation
page read and write
7E0B000
stack
page read and write
463D000
trusted library allocation
page read and write
64B2000
heap
page read and write
6B20000
trusted library allocation
page read and write
727C000
stack
page read and write
6FC0000
trusted library allocation
page read and write
6565000
heap
page read and write
4741000
trusted library allocation
page read and write
346D000
trusted library allocation
page read and write
4697000
trusted library allocation
page read and write
473B000
trusted library allocation
page read and write
4422000
trusted library allocation
page read and write
6D01000
trusted library allocation
page read and write
4660000
trusted library allocation
page read and write
35F4000
trusted library allocation
page read and write
34E6000
trusted library allocation
page read and write
440C000
trusted library allocation
page read and write
6CB8000
trusted library allocation
page read and write
35E7000
trusted library allocation
page read and write
3775000
trusted library allocation
page read and write
46B4000
trusted library allocation
page read and write
14AD000
trusted library allocation
page execute and read and write
45B9000
trusted library allocation
page read and write
6CB5000
trusted library allocation
page read and write
6DD0000
trusted library allocation
page read and write
4712000
trusted library allocation
page read and write
8070000
trusted library allocation
page execute and read and write
43A3000
trusted library allocation
page read and write
6D06000
trusted library allocation
page read and write
6560000
heap
page read and write
810E000
stack
page read and write
1520000
trusted library allocation
page execute and read and write
7F6A000
trusted library allocation
page read and write
7FB0000
trusted library allocation
page read and write
43E6000
trusted library allocation
page read and write
7C30000
trusted library allocation
page execute and read and write
4728000
trusted library allocation
page read and write
5711000
trusted library allocation
page read and write
4655000
trusted library allocation
page read and write
35F9000
trusted library allocation
page read and write
7C60000
trusted library allocation
page read and write
7C6C000
trusted library allocation
page read and write
3417000
trusted library allocation
page read and write
3780000
trusted library allocation
page read and write
6543000
heap
page read and write
36BC000
trusted library allocation
page read and write
14B0000
trusted library allocation
page read and write
1835000
heap
page read and write
441E000
trusted library allocation
page read and write
470F000
trusted library allocation
page read and write
7A49000
heap
page read and write
64E000
stack
page read and write
14A4000
trusted library allocation
page read and write
4472000
trusted library allocation
page read and write
5CA3000
heap
page read and write
660E000
stack
page read and write
1D0000
heap
page read and write
45E9000
trusted library allocation
page read and write
6D70000
trusted library allocation
page read and write
3568000
trusted library allocation
page read and write
4679000
trusted library allocation
page read and write
1560000
trusted library allocation
page read and write
3342000
trusted library allocation
page read and write
6498000
heap
page read and write
6F80000
trusted library allocation
page read and write
462A000
trusted library allocation
page read and write
4240000
trusted library allocation
page read and write
D1D000
unkown
page readonly
34D6000
trusted library allocation
page read and write
6CC0000
trusted library allocation
page read and write
3414000
trusted library allocation
page read and write
44A7000
trusted library allocation
page read and write
44AD000
trusted library allocation
page read and write
6562000
heap
page read and write
4630000
trusted library allocation
page read and write
6E50000
trusted library allocation
page execute and read and write
6DF0000
trusted library allocation
page execute and read and write
343B000
trusted library allocation
page read and write
57E3000
heap
page read and write
3443000
trusted library allocation
page read and write
7AF4000
heap
page read and write
6D4B000
trusted library allocation
page read and write
1F0000
direct allocation
page execute and read and write
44C6000
trusted library allocation
page read and write
468B000
trusted library allocation
page read and write
3348000
trusted library allocation
page read and write
347E000
trusted library allocation
page read and write
318E000
stack
page read and write
14CA000
trusted library allocation
page execute and read and write
14A3000
trusted library allocation
page execute and read and write
14D0000
trusted library allocation
page read and write
7F58000
trusted library allocation
page read and write
44D7000
trusted library allocation
page read and write
D27000
unkown
page write copy
14D2000
trusted library allocation
page read and write
424F000
trusted library allocation
page read and write
37E2000
trusted library allocation
page read and write
89A000
heap
page read and write
658B000
heap
page read and write
2F4F000
stack
page read and write
43F1000
trusted library allocation
page read and write
35B3000
trusted library allocation
page read and write
855E000
stack
page read and write
448E000
trusted library allocation
page read and write
4239000
trusted library allocation
page read and write
442C000
trusted library allocation
page read and write
4705000
trusted library allocation
page read and write
451A000
trusted library allocation
page read and write
7F49000
trusted library allocation
page read and write
D76000
unkown
page readonly
4405000
trusted library allocation
page read and write
7C50000
trusted library allocation
page read and write
37EB000
trusted library allocation
page read and write
657A000
heap
page read and write
452C000
trusted library allocation
page read and write
5716000
trusted library allocation
page read and write
3559000
trusted library allocation
page read and write
56FB000
trusted library allocation
page read and write
4476000
trusted library allocation
page read and write
379A000
trusted library allocation
page read and write
4483000
trusted library allocation
page read and write
4506000
trusted library allocation
page read and write
33B0000
trusted library allocation
page read and write
37A0000
trusted library allocation
page read and write
469C000
trusted library allocation
page read and write
4211000
trusted library allocation
page read and write
5A03000
heap
page execute and read and write
14C6000
trusted library allocation
page execute and read and write
446B000
trusted library allocation
page read and write
80BE000
stack
page read and write
D01000
unkown
page execute read
12F7000
stack
page read and write
6FD0000
trusted library allocation
page execute and read and write
64B7000
heap
page read and write
72BE000
stack
page read and write
43CE000
trusted library allocation
page read and write
59FE000
stack
page read and write
6CC7000
trusted library allocation
page read and write
467E000
trusted library allocation
page read and write
7B2C000
heap
page read and write
7B12000
heap
page read and write
46D2000
trusted library allocation
page read and write
4232000
trusted library allocation
page read and write
158B000
heap
page read and write
4554000
trusted library allocation
page read and write
46DA000
trusted library allocation
page read and write
5D90000
trusted library allocation
page read and write
149E000
stack
page read and write
474E000
trusted library allocation
page read and write
5780000
trusted library allocation
page read and write
6D60000
trusted library allocation
page read and write
33AA000
trusted library allocation
page read and write
6BE0000
trusted library allocation
page execute and read and write
5A00000
heap
page execute and read and write
4411000
trusted library allocation
page read and write
5B0F000
stack
page read and write
46FC000
trusted library allocation
page read and write
446000
remote allocation
page execute and read and write
7F30000
trusted library allocation
page read and write
5D92000
trusted library allocation
page read and write
31FE000
trusted library allocation
page read and write
35D8000
trusted library allocation
page read and write
3422000
trusted library allocation
page read and write
68E000
stack
page read and write
FE0000
heap
page read and write
7A44000
heap
page read and write
7A96000
heap
page read and write
4684000
trusted library allocation
page read and write
65CE000
stack
page read and write
43FF000
trusted library allocation
page read and write
814E000
stack
page read and write
440A000
trusted library allocation
page read and write
7AEC000
heap
page read and write
45CE000
trusted library allocation
page read and write
3633000
trusted library allocation
page read and write
4625000
trusted library allocation
page read and write
4652000
trusted library allocation
page read and write
7A51000
heap
page read and write
6490000
heap
page read and write
4658000
trusted library allocation
page read and write
4617000
trusted library allocation
page read and write
342D000
trusted library allocation
page read and write
3630000
trusted library allocation
page read and write
6584000
heap
page read and write
37F9000
trusted library allocation
page read and write
3345000
trusted library allocation
page read and write
6E40000
trusted library allocation
page execute and read and write
6DC0000
trusted library allocation
page read and write
6FA0000
heap
page execute and read and write
37EE000
trusted library allocation
page read and write
35AD000
trusted library allocation
page read and write
7C6A000
trusted library allocation
page read and write
460C000
trusted library allocation
page read and write
3200000
heap
page read and write
3403000
trusted library allocation
page read and write
D1D000
unkown
page readonly
335B000
trusted library allocation
page read and write
5782000
trusted library allocation
page read and write
7A39000
heap
page read and write
4501000
trusted library allocation
page read and write
4643000
trusted library allocation
page read and write
31D0000
trusted library allocation
page read and write
6B30000
trusted library allocation
page read and write
59BE000
stack
page read and write
5218000
trusted library allocation
page read and write
46EF000
trusted library allocation
page read and write
43A0000
trusted library allocation
page read and write
6CB0000
trusted library allocation
page read and write
36FA000
trusted library allocation
page read and write
648F000
stack
page read and write
183E000
heap
page read and write
64F6000
heap
page read and write
165F000
heap
page read and write
6F90000
trusted library allocation
page read and write
5C92000
heap
page read and write
44DA000
trusted library allocation
page read and write
7ABD000
heap
page read and write
3556000
trusted library allocation
page read and write
7A6D000
heap
page read and write
3721000
trusted library allocation
page read and write
308E000
stack
page read and write
14F0000
trusted library allocation
page read and write
4FD000
stack
page read and write
341A000
trusted library allocation
page read and write
656C000
heap
page read and write
365F000
trusted library allocation
page read and write
6D90000
trusted library allocation
page read and write
363E000
trusted library allocation
page read and write
358D000
trusted library allocation
page read and write
1621000
heap
page read and write
15C1000
heap
page read and write
46BF000
trusted library allocation
page read and write
3636000
trusted library allocation
page read and write
46DF000
trusted library allocation
page read and write
45B6000
trusted library allocation
page read and write
32FC000
trusted library allocation
page read and write
7A66000
heap
page read and write
6D12000
trusted library allocation
page read and write
7F5A000
trusted library allocation
page read and write
378E000
trusted library allocation
page read and write
34A7000
trusted library allocation
page read and write
4743000
trusted library allocation
page read and write
372A000
trusted library allocation
page read and write
6C0000
heap
page read and write
1530000
heap
page execute and read and write
D00000
unkown
page readonly
3350000
trusted library allocation
page read and write
4432000
trusted library allocation
page read and write
36C4000
trusted library allocation
page read and write
33D1000
trusted library allocation
page read and write
4715000
trusted library allocation
page read and write
45F4000
trusted library allocation
page read and write
6580000
heap
page read and write
3822000
trusted library allocation
page read and write
44B9000
trusted library allocation
page read and write
7A30000
heap
page read and write
3657000
trusted library allocation
page read and write
4604000
trusted library allocation
page read and write
4459000
trusted library allocation
page read and write
35FF000
trusted library allocation
page read and write
32BB000
trusted library allocation
page read and write
D76000
unkown
page readonly
3698000
trusted library allocation
page read and write
44E2000
trusted library allocation
page read and write
43D8000
trusted library allocation
page read and write
44D4000
trusted library allocation
page read and write
1830000
heap
page read and write
4417000
trusted library allocation
page read and write
471D000
trusted library allocation
page read and write
6FF0000
trusted library allocation
page execute and read and write
7F5F000
trusted library allocation
page read and write
6B0F000
stack
page read and write
1550000
trusted library allocation
page read and write
6CC5000
trusted library allocation
page read and write
6D40000
trusted library allocation
page read and write
347B000
trusted library allocation
page read and write
458C000
trusted library allocation
page read and write
8060000
trusted library allocation
page read and write
859E000
stack
page read and write
31CC000
stack
page read and write
7A8F000
heap
page read and write
46F4000
trusted library allocation
page read and write
4637000
trusted library allocation
page read and write
1E0000
heap
page read and write
1400000
trusted library allocation
page read and write
45FE000
trusted library allocation
page read and write
7F65000
trusted library allocation
page read and write
466B000
trusted library allocation
page read and write
46A9000
trusted library allocation
page read and write
717E000
stack
page read and write
5CA7000
heap
page read and write
44ED000
trusted library allocation
page read and write
443A000
trusted library allocation
page read and write
14D5000
trusted library allocation
page execute and read and write
45A8000
trusted library allocation
page read and write
56F0000
trusted library allocation
page read and write
36FE000
trusted library allocation
page read and write
89E000
heap
page read and write
4573000
trusted library allocation
page read and write
69CE000
stack
page read and write
1500000
heap
page read and write
3509000
trusted library allocation
page read and write
3695000
trusted library allocation
page read and write
703C000
stack
page read and write
5C7E000
stack
page read and write
33A0000
trusted library allocation
page read and write
7AAB000
heap
page read and write
44B2000
trusted library allocation
page read and write
7F70000
heap
page read and write
7A79000
heap
page read and write
845E000
stack
page read and write
33D9000
trusted library allocation
page read and write
6D21000
trusted library allocation
page read and write
4486000
trusted library allocation
page read and write
3625000
trusted library allocation
page read and write
43A6000
trusted library allocation
page read and write
44CA000
trusted library allocation
page read and write
3371000
trusted library allocation
page read and write
45DC000
trusted library allocation
page read and write
7B26000
heap
page read and write
7CD0000
heap
page read and write
32B7000
trusted library allocation
page read and write
6D45000
trusted library allocation
page read and write
6BC0000
trusted library allocation
page execute and read and write
14A0000
trusted library allocation
page read and write
37DE000
trusted library allocation
page read and write
4453000
trusted library allocation
page read and write
6DE0000
trusted library allocation
page execute and read and write
364A000
trusted library allocation
page read and write
437000
remote allocation
page execute and read and write
7AD9000
heap
page read and write
359A000
trusted library allocation
page read and write
421F000
trusted library allocation
page read and write
890000
heap
page read and write
6FB0000
trusted library allocation
page read and write
14C2000
trusted library allocation
page read and write
424C000
trusted library allocation
page read and write
3708000
trusted library allocation
page read and write
3553000
trusted library allocation
page read and write
4245000
trusted library allocation
page read and write
4513000
trusted library allocation
page read and write
43DB000
trusted library allocation
page read and write
F6A000
stack
page read and write
400000
remote allocation
page execute and read and write
45E6000
trusted library allocation
page read and write
4648000
trusted library allocation
page read and write
56F4000
trusted library allocation
page read and write
FD0000
heap
page read and write
46E5000
trusted library allocation
page read and write
6D80000
trusted library allocation
page read and write
4581000
trusted library allocation
page read and write
1415000
heap
page read and write
3565000
trusted library allocation
page read and write
33AD000
trusted library allocation
page read and write
72E0000
trusted library allocation
page read and write
33C4000
trusted library allocation
page read and write
432000
remote allocation
page execute and read and write
7F6F000
trusted library allocation
page read and write
6B18000
trusted library allocation
page read and write
4754000
trusted library allocation
page read and write
3336000
trusted library allocation
page read and write
6CC9000
trusted library allocation
page read and write
4736000
trusted library allocation
page read and write
1540000
heap
page read and write
5790000
trusted library allocation
page execute and read and write
3700000
trusted library allocation
page read and write
442F000
trusted library allocation
page read and write
7A34000
heap
page read and write
35E4000
trusted library allocation
page read and write
7F0E000
stack
page read and write
14BD000
trusted library allocation
page execute and read and write
7F42000
trusted library allocation
page read and write
1570000
trusted library allocation
page read and write
33B8000
trusted library allocation
page read and write
3597000
trusted library allocation
page read and write
1825000
trusted library allocation
page read and write
43C7000
trusted library allocation
page read and write
1580000
heap
page read and write
869E000
stack
page read and write
17D000
stack
page read and write
349F000
trusted library allocation
page read and write
7F80000
trusted library allocation
page read and write
7F45000
trusted library allocation
page read and write
64D1000
heap
page read and write
8D80000
heap
page read and write
713C000
stack
page read and write
7AFD000
heap
page read and write
46A6000
trusted library allocation
page read and write
46EB000
trusted library allocation
page read and write
571D000
trusted library allocation
page read and write
6F70000
trusted library allocation
page read and write
46D8000
trusted library allocation
page read and write
72F0000
trusted library allocation
page execute and read and write
B8F000
stack
page read and write
45AC000
trusted library allocation
page read and write
A8F000
stack
page read and write
6CF0000
trusted library allocation
page read and write
7A5A000
heap
page read and write
6CFB000
trusted library allocation
page read and write
570E000
trusted library allocation
page read and write
841E000
stack
page read and write
14DB000
trusted library allocation
page execute and read and write
4596000
trusted library allocation
page read and write
37F4000
trusted library allocation
page read and write
5D80000
heap
page read and write
445E000
trusted library allocation
page read and write
72E3000
trusted library allocation
page read and write
3486000
trusted library allocation
page read and write
4748000
trusted library allocation
page read and write
801E000
stack
page read and write
37AE000
trusted library allocation
page read and write
450D000
trusted library allocation
page read and write
6D4E000
trusted library allocation
page read and write
810000
heap
page read and write
7F84000
trusted library allocation
page read and write
86A0000
trusted library allocation
page read and write
7F90000
trusted library allocation
page read and write
4691000
trusted library allocation
page read and write
1410000
heap
page read and write
68CE000
stack
page read and write
5770000
heap
page read and write
57E0000
heap
page read and write
45C4000
trusted library allocation
page read and write
6B10000
trusted library allocation
page read and write
7C70000
trusted library allocation
page execute and read and write
43B9000
trusted library allocation
page read and write
6D50000
trusted library allocation
page read and write
369B000
trusted library allocation
page read and write
7FA0000
trusted library allocation
page read and write
4465000
trusted library allocation
page read and write
53AC000
stack
page read and write
44FB000
trusted library allocation
page read and write
4499000
trusted library allocation
page read and write
1820000
trusted library allocation
page read and write
36EF000
trusted library allocation
page read and write
36AF000
trusted library allocation
page read and write
1810000
trusted library allocation
page read and write
459B000
trusted library allocation
page read and write
7A2D000
stack
page read and write
7F40000
trusted library allocation
page read and write
4601000
trusted library allocation
page read and write
356C000
trusted library allocation
page read and write
43DE000
trusted library allocation
page read and write
46CD000
trusted library allocation
page read and write
7300000
trusted library allocation
page read and write
6D1E000
trusted library allocation
page read and write
805E000
stack
page read and write
45A2000
trusted library allocation
page read and write
4396000
trusted library allocation
page read and write
649A000
heap
page read and write
7A40000
heap
page read and write
4253000
trusted library allocation
page read and write
7AA0000
heap
page read and write
4445000
trusted library allocation
page read and write
14C0000
trusted library allocation
page read and write
D01000
unkown
page execute read
6CBA000
trusted library allocation
page read and write
15B4000
heap
page read and write
6A0E000
stack
page read and write
7AC5000
heap
page read and write
304F000
stack
page read and write
368A000
trusted library allocation
page read and write
4294000
trusted library allocation
page read and write
44BF000
trusted library allocation
page read and write
35A8000
trusted library allocation
page read and write
145D000
stack
page read and write
43AE000
trusted library allocation
page read and write
31F0000
trusted library allocation
page read and write
4480000
trusted library allocation
page read and write
3561000
trusted library allocation
page read and write
There are 482 hidden memdumps, click here to show them.