IOC Report
8f5WsFcnTc.exe

loading gif

Files

File Path
Type
Category
Malicious
8f5WsFcnTc.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Local\directory\name.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\name.vbs
data
dropped
malicious
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_bad_module_info_dcd3242e9fa4189184df4216daa4e4c7cdf1959_85207d7d_a7e47327-a6cd-4a75-a021-f666aba22f2d\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER645F.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER648F.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\newfile.exe.log
ASCII text, with CRLF line terminators
modified
C:\Users\user\AppData\Local\Temp\WER548F.tmp.WERDataCollectionStatus.txt
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\aut4E06.tmp
data
dropped
C:\Users\user\AppData\Local\Temp\aut4E46.tmp
data
dropped
C:\Users\user\AppData\Local\Temp\autD2CB.tmp
data
dropped
C:\Users\user\AppData\Local\Temp\autD32A.tmp
data
dropped
C:\Users\user\AppData\Local\Temp\autD74F.tmp
data
dropped
C:\Users\user\AppData\Local\Temp\autD899.tmp
data
dropped
C:\Users\user\AppData\Local\Temp\jailless
ASCII text, with very long lines (28674), with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\reindulging
data
dropped
C:\Users\user\AppData\Roaming\newfile\newfile.exe
PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
\Device\ConDrv
ASCII text, with CRLF line terminators
dropped
There are 8 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\8f5WsFcnTc.exe
"C:\Users\user\Desktop\8f5WsFcnTc.exe"
malicious
C:\Users\user\AppData\Local\directory\name.exe
"C:\Users\user\Desktop\8f5WsFcnTc.exe"
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
"C:\Users\user\Desktop\8f5WsFcnTc.exe"
malicious
C:\Users\user\AppData\Roaming\newfile\newfile.exe
"C:\Users\user\AppData\Roaming\newfile\newfile.exe"
malicious
C:\Users\user\AppData\Roaming\newfile\newfile.exe
"C:\Users\user\AppData\Roaming\newfile\newfile.exe"
malicious
C:\Windows\System32\wscript.exe
"C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\name.vbs"
malicious
C:\Users\user\AppData\Local\directory\name.exe
"C:\Users\user\AppData\Local\directory\name.exe"
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
"C:\Users\user\AppData\Local\directory\name.exe"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 2528 -s 24
There are 1 hidden processes, click here to show them.

URLs

Name
IP
Malicious
https://sectigo.com/CPS0
unknown
http://mail.jaszredony.hu
unknown
https://account.dyn.com/
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
http://ip-api.com/line/?fields=hosting
208.95.112.1
http://ip-api.com
unknown

Domains

Name
IP
Malicious
mail.jaszredony.hu
178.238.222.77
malicious
ip-api.com
208.95.112.1
malicious

IPs

IP
Domain
Country
Malicious
208.95.112.1
ip-api.com
United States
malicious
178.238.222.77
mail.jaszredony.hu
Hungary
malicious

Registry

Path
Value
Malicious
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASAPI32
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASAPI32
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASAPI32
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASAPI32
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASAPI32
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASAPI32
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASAPI32
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASMANCS
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASMANCS
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASMANCS
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASMANCS
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASMANCS
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASMANCS
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASMANCS
FileDirectory
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
newfile
There are 5 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
402000
system
page execute and read and write
malicious
C70000
direct allocation
page read and write
malicious
2A31000
trusted library allocation
page read and write
malicious
1340000
direct allocation
page read and write
malicious
2A5E000
trusted library allocation
page read and write
malicious
1C1000
unkown
page execute read
2A70000
trusted library allocation
page read and write
6890000
trusted library allocation
page read and write
CB1000
heap
page read and write
2A5A000
trusted library allocation
page read and write
54DE000
stack
page read and write
35F0000
direct allocation
page read and write
FD0000
heap
page read and write
F50000
trusted library allocation
page read and write
504DFFF000
stack
page read and write
194E000
stack
page read and write
137E000
heap
page read and write
3719000
direct allocation
page read and write
2A3B000
trusted library allocation
page execute and read and write
DCA000
heap
page read and write
540F000
stack
page read and write
532E000
stack
page read and write
13F4000
trusted library allocation
page read and write
F57000
heap
page read and write
612E000
stack
page read and write
35F0000
direct allocation
page read and write
C4F000
heap
page read and write
6290000
trusted library allocation
page read and write
294000
unkown
page readonly
624D000
stack
page read and write
FDB000
trusted library allocation
page execute and read and write
5120000
trusted library allocation
page read and write
51C0000
trusted library allocation
page execute and read and write
C00000
trusted library allocation
page read and write
371D000
direct allocation
page read and write
D6C000
unkown
page read and write
35C0000
direct allocation
page read and write
AE5000
heap
page read and write
D52000
heap
page read and write
FC0000
trusted library allocation
page execute and read and write
1C0000
unkown
page readonly
B0E000
stack
page read and write
118E000
heap
page read and write
EA7000
heap
page read and write
11FB000
heap
page read and write
F4F000
stack
page read and write
21EB6ACE000
heap
page read and write
37DE000
direct allocation
page read and write
B8B000
trusted library allocation
page execute and read and write
3760000
direct allocation
page read and write
ABD000
heap
page read and write
504DBFE000
stack
page read and write
13E3000
trusted library allocation
page execute and read and write
B6E000
stack
page read and write
B1C000
heap
page read and write
4EC0000
trusted library allocation
page read and write
35C3000
direct allocation
page read and write
28F0000
heap
page read and write
504DAFE000
stack
page read and write
21EB6AC5000
heap
page read and write
294000
unkown
page readonly
1183000
heap
page read and write
DA4000
heap
page read and write
2A82000
trusted library allocation
page read and write
5BA000
unkown
page readonly
A50000
direct allocation
page execute and read and write
3760000
direct allocation
page read and write
EE2000
heap
page read and write
D70000
unkown
page write copy
21EB66E0000
heap
page read and write
549E000
stack
page read and write
CB0000
direct allocation
page read and write
D3C000
unkown
page readonly
C30000
heap
page read and write
9CE000
stack
page read and write
2B6F000
trusted library allocation
page read and write
D52000
heap
page read and write
AF4000
heap
page read and write
62A0000
trusted library allocation
page read and write
36E3000
direct allocation
page read and write
21EB6AC0000
heap
page read and write
2A7E000
trusted library allocation
page read and write
AF6000
heap
page read and write
4F10000
heap
page read and write
35C3000
direct allocation
page read and write
25C000
unkown
page readonly
28A0000
heap
page read and write
21EB67E0000
heap
page read and write
2A64000
trusted library allocation
page read and write
35C0000
direct allocation
page read and write
5D62000
heap
page read and write
38FE000
direct allocation
page read and write
133F000
stack
page read and write
7D0000
heap
page read and write
3573000
direct allocation
page read and write
C13000
trusted library allocation
page execute and read and write
68D0000
heap
page read and write
DB3000
heap
page read and write
D3C000
unkown
page readonly
2920000
heap
page read and write
4DC000
stack
page read and write
C4E000
heap
page read and write
4E8E000
trusted library allocation
page read and write
1174000
heap
page read and write
5070000
heap
page read and write
137C000
heap
page read and write
371D000
direct allocation
page read and write
1C0000
unkown
page readonly
AF6000
heap
page read and write
AAB000
heap
page read and write
505C000
stack
page read and write
562E000
stack
page read and write
F46000
heap
page read and write
544D000
stack
page read and write
139B000
heap
page read and write
EFC000
heap
page read and write
FC0000
trusted library allocation
page read and write
1184000
heap
page read and write
25C000
unkown
page readonly
38E1000
direct allocation
page read and write
F46000
heap
page read and write
D74000
unkown
page readonly
B05000
heap
page read and write
B4D000
trusted library allocation
page execute and read and write
BCE000
stack
page read and write
36E3000
direct allocation
page read and write
28C000
unkown
page read and write
11FB000
heap
page read and write
3640000
direct allocation
page read and write
282000
unkown
page readonly
A30000
heap
page read and write
5D57000
heap
page read and write
1D4E000
stack
page read and write
DEA000
heap
page read and write
68A0000
trusted library allocation
page read and write
4EA1000
trusted library allocation
page read and write
138B000
heap
page read and write
6140000
trusted library allocation
page read and write
C65000
heap
page read and write
38EE000
direct allocation
page read and write
2DD0000
heap
page execute and read and write
503E000
stack
page read and write
F46000
heap
page read and write
4A3C000
stack
page read and write
294000
unkown
page readonly
36E3000
direct allocation
page read and write
28E0000
trusted library allocation
page read and write
34A0000
direct allocation
page read and write
118E000
heap
page read and write
3450000
direct allocation
page read and write
F70000
heap
page read and write
282000
unkown
page readonly
370000
heap
page read and write
F60000
heap
page execute and read and write
5630000
trusted library allocation
page read and write
37DE000
direct allocation
page read and write
D50000
heap
page read and write
F60000
heap
page read and write
36E3000
direct allocation
page read and write
C2D000
trusted library allocation
page execute and read and write
BEE000
heap
page read and write
AF7000
heap
page read and write
36E3000
direct allocation
page read and write
129F000
heap
page read and write
85C000
stack
page read and write
3A29000
trusted library allocation
page read and write
21EB6835000
heap
page read and write
B95000
heap
page read and write
9DB000
stack
page read and write
B3B000
heap
page read and write
127E000
heap
page read and write
3573000
direct allocation
page read and write
1046000
heap
page read and write
11FB000
heap
page read and write
AA3000
heap
page read and write
B20000
heap
page read and write
61A0000
trusted library allocation
page execute and read and write
35C0000
direct allocation
page read and write
C7D000
stack
page read and write
AD0000
heap
page read and write
AF8000
stack
page read and write
C38000
heap
page read and write
AAE000
heap
page read and write
1158000
heap
page read and write
191E000
stack
page read and write
55DE000
stack
page read and write
2931000
trusted library allocation
page read and write
1C1000
unkown
page execute read
2A8C000
trusted library allocation
page read and write
301E000
stack
page read and write
AF4000
heap
page read and write
11E4000
heap
page read and write
EDE000
stack
page read and write
5CF0000
heap
page read and write
B6D000
trusted library allocation
page execute and read and write
9FF000
stack
page read and write
3889000
direct allocation
page read and write
6AC0000
trusted library allocation
page execute and read and write
2BD0000
heap
page read and write
DF7000
heap
page read and write
3DE1000
trusted library allocation
page read and write
880000
heap
page read and write
376D000
direct allocation
page read and write
4E8B000
trusted library allocation
page read and write
D28000
heap
page read and write
AF4000
heap
page read and write
530E000
stack
page read and write
1182000
heap
page read and write
34D0000
heap
page read and write
4E9E000
trusted library allocation
page read and write
F41000
heap
page read and write
D20000
heap
page read and write
3450000
direct allocation
page read and write
388D000
direct allocation
page read and write
11D3000
heap
page read and write
3889000
direct allocation
page read and write
3719000
direct allocation
page read and write
C10000
trusted library allocation
page read and write
3573000
direct allocation
page read and write
3769000
direct allocation
page read and write
28C000
unkown
page write copy
E2F000
stack
page read and write
11D4000
heap
page read and write
13B0000
heap
page read and write
EB8000
heap
page read and write
FD5000
trusted library allocation
page execute and read and write
959000
stack
page read and write
38FE000
direct allocation
page read and write
28C0000
heap
page execute and read and write
B43000
trusted library allocation
page execute and read and write
5D6D000
heap
page read and write
136C000
heap
page read and write
34D4000
heap
page read and write
400000
system
page execute and read and write
28C000
unkown
page write copy
118B000
heap
page read and write
E30000
trusted library allocation
page execute and read and write
CA0000
unkown
page readonly
4F20000
heap
page read and write
4D6F000
stack
page read and write
11FB000
heap
page read and write
ACE000
stack
page read and write
DCB000
heap
page read and write
B44000
trusted library allocation
page read and write
1C1000
unkown
page execute read
35C3000
direct allocation
page read and write
FD7000
trusted library allocation
page execute and read and write
1C0000
unkown
page readonly
9EF000
stack
page read and write
769000
stack
page read and write
2B9E000
stack
page read and write
3450000
direct allocation
page read and write
EBD000
heap
page read and write
21EB6800000
heap
page read and write
11FB000
heap
page read and write
3A01000
trusted library allocation
page read and write
6147000
trusted library allocation
page read and write
674F000
stack
page read and write
5638000
trusted library allocation
page read and write
DDE000
heap
page read and write
E8C000
heap
page read and write
390000
heap
page read and write
613D000
trusted library allocation
page read and write
1400000
heap
page read and write
E8F000
heap
page read and write
B50000
heap
page read and write
13B4000
heap
page read and write
522E000
stack
page read and write
13FD000
trusted library allocation
page execute and read and write
3760000
direct allocation
page read and write
2890000
trusted library allocation
page execute and read and write
C20000
trusted library allocation
page read and write
4F30000
heap
page execute and read and write
D94000
heap
page read and write
504DDFE000
stack
page read and write
504D6FA000
stack
page read and write
137D000
heap
page read and write
34A0000
direct allocation
page read and write
3760000
direct allocation
page read and write
388D000
direct allocation
page read and write
C80000
heap
page read and write
DCA000
heap
page read and write
118B000
heap
page read and write
C35000
heap
page read and write
282000
unkown
page readonly
28C000
unkown
page read and write
504DEFE000
stack
page read and write
1150000
heap
page read and write
FC6000
trusted library allocation
page execute and read and write
35C0000
direct allocation
page read and write
D55000
heap
page read and write
F24000
heap
page read and write
38FE000
direct allocation
page read and write
294000
unkown
page readonly
B1B000
heap
page read and write
DB3000
heap
page read and write
B1B000
heap
page read and write
38FE000
direct allocation
page read and write
AA4000
heap
page read and write
2A01000
trusted library allocation
page read and write
11FB000
heap
page read and write
DC7000
heap
page read and write
B1B000
heap
page read and write
290000
unkown
page write copy
F30000
heap
page read and write
D62000
unkown
page readonly
376D000
direct allocation
page read and write
C92000
heap
page read and write
4EB2000
trusted library allocation
page read and write
21EB6864000
heap
page read and write
9DB000
stack
page read and write
F57000
heap
page read and write
5080000
heap
page execute and read and write
3820000
direct allocation
page read and write
CA2000
heap
page read and write
F55000
heap
page read and write
C30000
heap
page read and write
11FC000
heap
page read and write
3270000
heap
page read and write
B1B000
heap
page read and write
B64000
trusted library allocation
page read and write
378E000
direct allocation
page read and write
2BC0000
trusted library allocation
page execute and read and write
5CA000
stack
page read and write
38FE000
direct allocation
page read and write
3889000
direct allocation
page read and write
DCA000
heap
page read and write
378E000
direct allocation
page read and write
BEF000
stack
page read and write
D3A000
stack
page read and write
1110000
direct allocation
page read and write
BEE000
stack
page read and write
C54000
heap
page read and write
602E000
stack
page read and write
290000
unkown
page write copy
628E000
stack
page read and write
DCA000
heap
page read and write
11C4000
heap
page read and write
3450000
direct allocation
page read and write
F50000
direct allocation
page execute and read and write
35F0000
direct allocation
page read and write
5B2000
unkown
page readonly
2A9E000
stack
page read and write
AAE000
heap
page read and write
C30000
heap
page read and write
CA1000
heap
page read and write
118E000
heap
page read and write
52CE000
stack
page read and write
AAB000
heap
page read and write
36E000
stack
page read and write
DA5000
heap
page read and write
9EF000
stack
page read and write
FD2000
trusted library allocation
page read and write
A70000
heap
page read and write
4EA6000
trusted library allocation
page read and write
388D000
direct allocation
page read and write
21EB67C0000
heap
page read and write
C1D000
trusted library allocation
page execute and read and write
D74000
unkown
page readonly
F97000
heap
page read and write
9B0000
heap
page read and write
C60000
direct allocation
page execute and read and write
E8B000
heap
page read and write
371D000
direct allocation
page read and write
13D0000
trusted library allocation
page read and write
B60000
trusted library allocation
page read and write
E76000
heap
page read and write
D6D000
heap
page read and write
C01000
heap
page read and write
A78000
heap
page read and write
388D000
direct allocation
page read and write
119D000
heap
page read and write
37DE000
direct allocation
page read and write
21EB68B2000
heap
page read and write
C67000
heap
page read and write
CA0000
unkown
page readonly
1040000
heap
page read and write
320000
heap
page read and write
5B0000
unkown
page readonly
C94000
heap
page read and write
3E0000
heap
page read and write
3931000
trusted library allocation
page read and write
9FF000
stack
page read and write
523F000
stack
page read and write
27F8000
trusted library allocation
page read and write
B1B000
heap
page read and write
A94000
heap
page read and write
3889000
direct allocation
page read and write
18A000
stack
page read and write
376D000
direct allocation
page read and write
E90000
heap
page read and write
3640000
direct allocation
page read and write
36E3000
direct allocation
page read and write
CD0000
heap
page read and write
13E4000
trusted library allocation
page read and write
21EB6808000
heap
page read and write
388D000
direct allocation
page read and write
F56000
heap
page read and write
B1B000
heap
page read and write
F55000
heap
page read and write
E4E000
heap
page read and write
35C0000
direct allocation
page read and write
3640000
direct allocation
page read and write
3DE000
stack
page read and write
3769000
direct allocation
page read and write
3760000
direct allocation
page read and write
25C000
unkown
page readonly
4B3D000
stack
page read and write
1C1000
unkown
page execute read
DCA000
heap
page read and write
CA1000
unkown
page execute read
D90000
heap
page read and write
4EAD000
trusted library allocation
page read and write
2A30000
trusted library allocation
page read and write
4E9A000
trusted library allocation
page read and write
34A0000
direct allocation
page read and write
BF0000
heap
page read and write
4E6E000
stack
page read and write
BDB000
stack
page read and write
119D000
heap
page read and write
3889000
direct allocation
page read and write
111F000
stack
page read and write
CB5000
heap
page read and write
B05000
heap
page read and write
CA1000
unkown
page execute read
FB0000
trusted library allocation
page read and write
C14000
trusted library allocation
page read and write
7E0000
heap
page read and write
539E000
stack
page read and write
C40000
heap
page read and write
378E000
direct allocation
page read and write
1C0000
unkown
page readonly
4ED0000
trusted library allocation
page read and write
D5E000
heap
page read and write
DCA000
heap
page read and write
C2C000
stack
page read and write
37A000
stack
page read and write
38FE000
direct allocation
page read and write
3A6B000
trusted library allocation
page read and write
D5B000
heap
page read and write
4EAE000
stack
page read and write
4E92000
trusted library allocation
page read and write
121B000
heap
page read and write
2A5C000
trusted library allocation
page read and write
2DE1000
trusted library allocation
page read and write
371D000
direct allocation
page read and write
D5E000
heap
page read and write
B87000
trusted library allocation
page execute and read and write
13F0000
trusted library allocation
page read and write
282000
unkown
page readonly
3889000
direct allocation
page read and write
DEA000
heap
page read and write
2BA0000
heap
page read and write
FCA000
trusted library allocation
page execute and read and write
137E000
heap
page read and write
D43000
heap
page read and write
1470000
heap
page read and write
121E000
stack
page read and write
EDE000
stack
page read and write
35F0000
direct allocation
page read and write
518C000
stack
page read and write
9BE000
stack
page read and write
D62000
unkown
page readonly
68E0000
heap
page read and write
E70000
heap
page read and write
554E000
stack
page read and write
C3C000
stack
page read and write
35C0000
direct allocation
page read and write
291E000
stack
page read and write
BE2000
heap
page read and write
504D8FE000
stack
page read and write
AA3000
heap
page read and write
DC0000
heap
page read and write
119D000
heap
page read and write
F20000
heap
page read and write
F1E000
stack
page read and write
3274000
heap
page read and write
2A37000
trusted library allocation
page execute and read and write
BBE000
stack
page read and write
C8D000
heap
page read and write
28D0000
trusted library allocation
page read and write
29FF000
stack
page read and write
D6C000
unkown
page write copy
55EE000
stack
page read and write
4E80000
trusted library allocation
page read and write
3719000
direct allocation
page read and write
B30000
trusted library allocation
page read and write
F8D000
heap
page read and write
151F000
stack
page read and write
9BF000
stack
page read and write
AF0000
heap
page read and write
4EEE000
stack
page read and write
C5A000
heap
page read and write
C5B000
heap
page read and write
378E000
direct allocation
page read and write
DCA000
heap
page read and write
6130000
trusted library allocation
page read and write
B55000
heap
page read and write
B1B000
heap
page read and write
2DC0000
trusted library allocation
page read and write
B04000
heap
page read and write
11D3000
heap
page read and write
25C000
unkown
page readonly
2A50000
trusted library allocation
page read and write
3760000
direct allocation
page read and write
C93000
heap
page read and write
F3C000
heap
page read and write
4E86000
trusted library allocation
page read and write
513E000
stack
page read and write
136D000
heap
page read and write
FC2000
trusted library allocation
page read and write
F57000
heap
page read and write
103E000
stack
page read and write
664E000
stack
page read and write
CA3000
heap
page read and write
FF0000
trusted library allocation
page read and write
DCA000
heap
page read and write
504D7FF000
stack
page read and write
FAE000
stack
page read and write
C35000
heap
page read and write
F4A000
heap
page read and write
3719000
direct allocation
page read and write
E40000
heap
page read and write
BFF000
stack
page read and write
11FB000
heap
page read and write
F28000
heap
page read and write
388D000
direct allocation
page read and write
DF5000
heap
page read and write
E91000
heap
page read and write
5350000
heap
page execute and read and write
9CF000
stack
page read and write
2DBD000
stack
page read and write
4F13000
heap
page read and write
62A7000
trusted library allocation
page read and write
C1E000
heap
page read and write
138A000
heap
page read and write
3573000
direct allocation
page read and write
51CE000
stack
page read and write
3769000
direct allocation
page read and write
13ED000
trusted library allocation
page execute and read and write
61B0000
trusted library allocation
page execute and read and write
2CBC000
stack
page read and write
11FB000
heap
page read and write
D54000
heap
page read and write
504E0FC000
stack
page read and write
3F0000
heap
page read and write
7FC80000
trusted library allocation
page execute and read and write
21EB6AB0000
heap
page read and write
D6C000
heap
page read and write
There are 539 hidden memdumps, click here to show them.