IOC Report
6RVmzn1DzL.exe

loading gif

Files

File Path
Type
Category
Malicious
6RVmzn1DzL.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_6RVmzn1DzL.exe_7bfb277fee81bf1a20749b653394791c3aa9112c_462bbcf1_b313c709-504a-4fb8-84c2-c4704d4cf20e\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
malicious
C:\ProgramData\Microsoft\Windows\WER\Temp\WERA461.tmp.dmp
Mini DuMP crash report, 15 streams, Tue Jul 2 06:33:04 2024, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERA6A5.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERA6D4.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\Windows\appcompat\Programs\Amcache.hve
MS Windows registry file, NT/2000 or above
dropped

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\6RVmzn1DzL.exe
"C:\Users\user\Desktop\6RVmzn1DzL.exe"
malicious
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 3276 -s 1728

URLs

Name
IP
Malicious
https://contintnetksows.shop/
unknown
malicious
https://contintnetksows.shop/p1
unknown
malicious
https://contintnetksows.shop/apien0
unknown
malicious
https://contintnetksows.shop/apirofi
unknown
malicious
towerxxuytwi.xyz
malicious
https://contintnetksows.shop/apin
unknown
malicious
https://contintnetksows.shop/apiz
unknown
malicious
contintnetksows.shop
malicious
https://contintnetksows.shop/apiassw
unknown
malicious
https://contintnetksows.shop/pp
unknown
malicious
https://contintnetksows.shop/apih
unknown
malicious
https://contintnetksows.shop/a7
unknown
malicious
https://contintnetksows.shop/apieppgd
unknown
malicious
https://contintnetksows.shop/apiT
unknown
malicious
https://contintnetksows.shop/%%
unknown
malicious
penetratedpoopp.xyz
malicious
ellaboratepwsz.xyz
malicious
swellfrrgwwos.xyz
malicious
https://contintnetksows.shop/api
172.67.141.234
malicious
https://contintnetksows.shop/e
unknown
malicious
foodypannyjsud.shop
malicious
pedestriankodwu.xyz
malicious
https://contintnetksows.shop/a
unknown
malicious
https://contintnetksows.shop/s8
unknown
malicious
potterryisiw.shop
malicious
https://contintnetksows.shop/api$
unknown
malicious
https://contintnetksows.shop/s
unknown
malicious
https://contintnetksows.shop/api%
unknown
malicious
https://contintnetksows.shop/p
unknown
malicious
https://duckduckgo.com/chrome_newtab
unknown
https://duckduckgo.com/ac/?q=
unknown
https://www.yubsoft.com%dshell32.dllSHGetDesktopFolderSHCreateShellItem
unknown
https://imp.mt48.net/static?id=7RHzfOIXjFEYsBdvIpkX4Qqm4p8dfCfm4pbW1pbWfpbW7ReNxR3UIG8zInwYIFIVs9eYi
unknown
http://ocsps.ssl.com0?
unknown
http://www.ssl.com/repository/SSLcomRootCertificationAuthorityRSA.crt0
unknown
https://github.com/imgdrive/Folder2ISOhttps://github.com/imgdrive/Folder2ISO/issuesVIDEO_TSBDMVBDAVA
unknown
https://bridge.sfo1.admarketplace.net/ctp?version=16.0.0&key=1696425136400800000.2&ci=1696425136743.
unknown
http://cert.ssl.com/SSL.com-timeStamping-I-RSA-R1.cer0Q
unknown
http://ocsps.ssl.com0
unknown
https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
unknown
http://crls.ssl.com/SSLcom-RootCA-EV-RSA-4096-R2.crl0
unknown
http://cert.ssl.com/SSLcom-SubCA-EV-CodeSigning-RSA-4096-R3.cer0_
unknown
http://crls.ssl.com/SSLcom-SubCA-EV-CodeSigning-RSA-4096-R3.crl0
unknown
http://x1.c.lencr.org/0
unknown
http://x1.i.lencr.org/0
unknown
https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
unknown
https://www.ssl.com/repository0
unknown
https://github.com/imgdrive/Folder2ISO/issues
unknown
https://contintnetksows.shop:443/apiK
unknown
https://support.mozilla.org/products/firefoxgro.all
unknown
https://contintnetksows.shop:443/api_storageCJ
unknown
https://www.google.com/images/branding/product/ico/googleg_lodp.ico
unknown
https://www.yubsoft.com
unknown
https://contintnetksows.shop:443/api
unknown
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
unknown
http://crl.rootca1.amazontrust.com/rootca1.crl0
unknown
http://upx.sf.net
unknown
https://contintnetksows.shop:443/api)
unknown
http://ocsp.rootca1.amazontrust.com0:
unknown
https://www.ecosia.org/newtab/
unknown
https://bridge.sfo1.ap01.net/ctp?version=16.0.0&key=1696425136400800000.1&ci=1696425136743.12791&cta
unknown
https://support.mozilla.org/kb/customize-firefox-controls-buttons-and-toolbars?utm_source=firefox-br
unknown
https://ac.ecosia.org/autocomplete?q=
unknown
http://crls.ssl.com/ssl.com-rsa-RootCA.crl0
unknown
https://contile-images.services.mozilla.com/u1AuJcj32cbVUf9NjMipLXEYwu2uFIt4lsj-ccwVqEs.36904.jpg
unknown
http://crls.ssl.com/SSL.com-timeStamping-I-RSA-R1.crl0
unknown
https://contile-images.services.mozilla.com/obgoOYObjIFea_bXuT6L4LbBJ8j425AD87S1HMD3BWg.9991.jpg
unknown
http://crt.rootca1.amazontrust.com/rootca1.cer0?
unknown
https://www.bestbuy.com/site/electronics/top-deals/pcmcat1563299784494.c/?id=pcmcat1563299784494&ref
unknown
https://github.com/imgdrive/Folder2ISO
unknown
https://www.amazon.com/?tag=admarketus-20&ref=pd_sl_35787f1071928bc3a1aef90b79c9bee9c64ba6683fde7477
unknown
http://www.ssl.com/repository/SSLcom-RootCA-EV-RSA-4096-R2.crt0
unknown
https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
unknown
There are 63 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
contintnetksows.shop
172.67.141.234
malicious

IPs

IP
Domain
Country
Malicious
172.67.141.234
contintnetksows.shop
United States
malicious

Registry

Path
Value
Malicious
\REGISTRY\A\{b22224c5-3890-9253-1af5-0f57a1aff382}\Root\InventoryApplicationFile\6rvmzn1dzl.exe|b4ba8ba8e08e79d4
ProgramId
\REGISTRY\A\{b22224c5-3890-9253-1af5-0f57a1aff382}\Root\InventoryApplicationFile\6rvmzn1dzl.exe|b4ba8ba8e08e79d4
FileId
\REGISTRY\A\{b22224c5-3890-9253-1af5-0f57a1aff382}\Root\InventoryApplicationFile\6rvmzn1dzl.exe|b4ba8ba8e08e79d4
LowerCaseLongPath
\REGISTRY\A\{b22224c5-3890-9253-1af5-0f57a1aff382}\Root\InventoryApplicationFile\6rvmzn1dzl.exe|b4ba8ba8e08e79d4
LongPathHash
\REGISTRY\A\{b22224c5-3890-9253-1af5-0f57a1aff382}\Root\InventoryApplicationFile\6rvmzn1dzl.exe|b4ba8ba8e08e79d4
Name
\REGISTRY\A\{b22224c5-3890-9253-1af5-0f57a1aff382}\Root\InventoryApplicationFile\6rvmzn1dzl.exe|b4ba8ba8e08e79d4
OriginalFileName
\REGISTRY\A\{b22224c5-3890-9253-1af5-0f57a1aff382}\Root\InventoryApplicationFile\6rvmzn1dzl.exe|b4ba8ba8e08e79d4
Publisher
\REGISTRY\A\{b22224c5-3890-9253-1af5-0f57a1aff382}\Root\InventoryApplicationFile\6rvmzn1dzl.exe|b4ba8ba8e08e79d4
Version
\REGISTRY\A\{b22224c5-3890-9253-1af5-0f57a1aff382}\Root\InventoryApplicationFile\6rvmzn1dzl.exe|b4ba8ba8e08e79d4
BinFileVersion
\REGISTRY\A\{b22224c5-3890-9253-1af5-0f57a1aff382}\Root\InventoryApplicationFile\6rvmzn1dzl.exe|b4ba8ba8e08e79d4
BinaryType
\REGISTRY\A\{b22224c5-3890-9253-1af5-0f57a1aff382}\Root\InventoryApplicationFile\6rvmzn1dzl.exe|b4ba8ba8e08e79d4
ProductName
\REGISTRY\A\{b22224c5-3890-9253-1af5-0f57a1aff382}\Root\InventoryApplicationFile\6rvmzn1dzl.exe|b4ba8ba8e08e79d4
ProductVersion
\REGISTRY\A\{b22224c5-3890-9253-1af5-0f57a1aff382}\Root\InventoryApplicationFile\6rvmzn1dzl.exe|b4ba8ba8e08e79d4
LinkDate
\REGISTRY\A\{b22224c5-3890-9253-1af5-0f57a1aff382}\Root\InventoryApplicationFile\6rvmzn1dzl.exe|b4ba8ba8e08e79d4
BinProductVersion
\REGISTRY\A\{b22224c5-3890-9253-1af5-0f57a1aff382}\Root\InventoryApplicationFile\6rvmzn1dzl.exe|b4ba8ba8e08e79d4
AppxPackageFullName
\REGISTRY\A\{b22224c5-3890-9253-1af5-0f57a1aff382}\Root\InventoryApplicationFile\6rvmzn1dzl.exe|b4ba8ba8e08e79d4
AppxPackageRelativeId
\REGISTRY\A\{b22224c5-3890-9253-1af5-0f57a1aff382}\Root\InventoryApplicationFile\6rvmzn1dzl.exe|b4ba8ba8e08e79d4
Size
\REGISTRY\A\{b22224c5-3890-9253-1af5-0f57a1aff382}\Root\InventoryApplicationFile\6rvmzn1dzl.exe|b4ba8ba8e08e79d4
Language
\REGISTRY\A\{b22224c5-3890-9253-1af5-0f57a1aff382}\Root\InventoryApplicationFile\6rvmzn1dzl.exe|b4ba8ba8e08e79d4
Usn
There are 9 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
2D90000
direct allocation
page execute and read and write
malicious
642000
unkown
page readonly
12EE000
heap
page read and write
12C6000
heap
page read and write
3B2E000
trusted library allocation
page read and write
12BF000
heap
page read and write
12BF000
heap
page read and write
2E00000
heap
page read and write
1293000
heap
page read and write
12DF000
heap
page read and write
1293000
heap
page read and write
12D1000
heap
page read and write
122A000
heap
page read and write
122A000
heap
page read and write
12EE000
heap
page read and write
12EE000
heap
page read and write
328D000
stack
page read and write
12EE000
heap
page read and write
1293000
heap
page read and write
12EE000
heap
page read and write
129B000
heap
page read and write
3B68000
trusted library allocation
page read and write
621000
unkown
page execute read
12EE000
heap
page read and write
12BD000
heap
page read and write
12C0000
heap
page read and write
13EE000
stack
page read and write
3B2B000
trusted library allocation
page read and write
12A9000
heap
page read and write
12AD000
heap
page read and write
12D0000
heap
page read and write
12EE000
heap
page read and write
12EE000
heap
page read and write
2DF1000
heap
page read and write
1292000
heap
page read and write
12EE000
heap
page read and write
3B17000
trusted library allocation
page read and write
12EE000
heap
page read and write
3B33000
trusted library allocation
page read and write
12C5000
heap
page read and write
12EE000
heap
page read and write
3AF0000
trusted library allocation
page read and write
129B000
heap
page read and write
3AF6000
trusted library allocation
page read and write
2DF0000
heap
page read and write
642000
unkown
page readonly
12ED000
heap
page read and write
3AFA000
trusted library allocation
page read and write
3B20000
trusted library allocation
page read and write
12C4000
heap
page read and write
3B43000
trusted library allocation
page read and write
3B4C000
trusted library allocation
page read and write
12EE000
heap
page read and write
12CD000
heap
page read and write
12CE000
heap
page read and write
3B1F000
trusted library allocation
page read and write
32C0000
heap
page read and write
12D0000
heap
page read and write
3AF6000
trusted library allocation
page read and write
12E8000
heap
page read and write
12C9000
heap
page read and write
3B26000
trusted library allocation
page read and write
12E7000
heap
page read and write
3AF6000
trusted library allocation
page read and write
12B9000
heap
page read and write
3AFD000
trusted library allocation
page read and write
2DF1000
heap
page read and write
12D0000
heap
page read and write
3CD5000
trusted library allocation
page read and write
12BF000
heap
page read and write
12EE000
heap
page read and write
1283000
heap
page read and write
12CF000
heap
page read and write
12EE000
heap
page read and write
123B000
heap
page read and write
12EE000
heap
page read and write
1292000
heap
page read and write
12EE000
heap
page read and write
1004000
heap
page read and write
3B35000
trusted library allocation
page read and write
12EE000
heap
page read and write
12C8000
heap
page read and write
12CF000
heap
page read and write
1293000
heap
page read and write
3B4A000
trusted library allocation
page read and write
12EE000
heap
page read and write
12EE000
heap
page read and write
15EF000
stack
page read and write
12EE000
heap
page read and write
3B44000
trusted library allocation
page read and write
12BD000
heap
page read and write
303F000
stack
page read and write
12C6000
heap
page read and write
1004000
heap
page read and write
12CD000
heap
page read and write
12B7000
heap
page read and write
12B9000
heap
page read and write
3D4F000
stack
page read and write
12EE000
heap
page read and write
12EE000
heap
page read and write
12A0000
heap
page read and write
3B24000
trusted library allocation
page read and write
3B68000
trusted library allocation
page read and write
3C4D000
trusted library allocation
page read and write
129B000
heap
page read and write
12A9000
heap
page read and write
3B03000
trusted library allocation
page read and write
3AFC000
trusted library allocation
page read and write
1293000
heap
page read and write
111E000
stack
page read and write
653000
unkown
page readonly
12EE000
heap
page read and write
12B9000
heap
page read and write
1004000
heap
page read and write
12A7000
heap
page read and write
12A6000
heap
page read and write
12EE000
heap
page read and write
3B2E000
trusted library allocation
page read and write
3B43000
trusted library allocation
page read and write
2DF1000
heap
page read and write
1224000
heap
page read and write
1293000
heap
page read and write
3C9E000
trusted library allocation
page read and write
12BD000
heap
page read and write
3B2B000
trusted library allocation
page read and write
12C6000
heap
page read and write
3B19000
trusted library allocation
page read and write
1224000
heap
page read and write
12D0000
heap
page read and write
3AF6000
trusted library allocation
page read and write
129B000
heap
page read and write
12C5000
heap
page read and write
3B20000
trusted library allocation
page read and write
12D3000
heap
page read and write
1293000
heap
page read and write
3B2E000
trusted library allocation
page read and write
3B20000
trusted library allocation
page read and write
12EE000
heap
page read and write
123E000
heap
page read and write
3B1C000
trusted library allocation
page read and write
129B000
heap
page read and write
129B000
heap
page read and write
3F93000
trusted library allocation
page read and write
1293000
heap
page read and write
12B9000
heap
page read and write
122A000
heap
page read and write
1293000
heap
page read and write
3AF6000
trusted library allocation
page read and write
12D0000
heap
page read and write
12BF000
heap
page read and write
129B000
heap
page read and write
3AF8000
trusted library allocation
page read and write
12D0000
heap
page read and write
12EE000
heap
page read and write
12EE000
heap
page read and write
12B8000
heap
page read and write
2DF1000
heap
page read and write
12B0000
heap
page read and write
129B000
heap
page read and write
12BF000
heap
page read and write
12E7000
heap
page read and write
12E7000
heap
page read and write
3B0E000
trusted library allocation
page read and write
3B1F000
trusted library allocation
page read and write
12EE000
heap
page read and write
3B45000
trusted library allocation
page read and write
12BC000
heap
page read and write
3B34000
trusted library allocation
page read and write
39DE000
stack
page read and write
12EE000
heap
page read and write
12C6000
heap
page read and write
12EE000
heap
page read and write
3B1B000
trusted library allocation
page read and write
12C0000
heap
page read and write
12C4000
heap
page read and write
1292000
heap
page read and write
11AE000
stack
page read and write
31D1000
unclassified section
page execute read
12B6000
heap
page read and write
2F3E000
stack
page read and write
3B46000
trusted library allocation
page read and write
12EE000
heap
page read and write
12D0000
heap
page read and write
12C4000
heap
page read and write
12BF000
heap
page read and write
3B14000
trusted library allocation
page read and write
12EE000
heap
page read and write
64E000
unkown
page read and write
12EE000
heap
page read and write
E8C000
stack
page read and write
340D000
stack
page read and write
12C4000
heap
page read and write
1293000
heap
page read and write
3218000
unclassified section
page read and write
3B02000
trusted library allocation
page read and write
3AFC000
trusted library allocation
page read and write
1160000
heap
page read and write
1293000
heap
page read and write
32D3000
trusted library allocation
page read and write
12C3000
heap
page read and write
12BF000
heap
page read and write
32A0000
remote allocation
page read and write
12B0000
heap
page read and write
1004000
heap
page read and write
12BF000
heap
page read and write
12EE000
heap
page read and write
3B1E000
trusted library allocation
page read and write
12B6000
heap
page read and write
3B03000
trusted library allocation
page read and write
3B0E000
trusted library allocation
page read and write
12C9000
heap
page read and write
12EE000
heap
page read and write
11F8000
heap
page read and write
12CF000
heap
page read and write
12BD000
heap
page read and write
3B76000
trusted library allocation
page read and write
12AC000
heap
page read and write
3AF6000
trusted library allocation
page read and write
129B000
heap
page read and write
3AFD000
trusted library allocation
page read and write
12EE000
heap
page read and write
12A9000
heap
page read and write
F8C000
stack
page read and write
3B2D000
trusted library allocation
page read and write
12C6000
heap
page read and write
12CF000
heap
page read and write
3C9D000
trusted library allocation
page read and write
121F000
heap
page read and write
3B26000
trusted library allocation
page read and write
3B14000
trusted library allocation
page read and write
1000000
heap
page read and write
12BA000
heap
page read and write
129B000
heap
page read and write
3BF3000
trusted library allocation
page read and write
12CF000
heap
page read and write
12EE000
heap
page read and write
12EE000
heap
page read and write
3B04000
trusted library allocation
page read and write
3AFC000
trusted library allocation
page read and write
3BF6000
trusted library allocation
page read and write
3BFC000
trusted library allocation
page read and write
1293000
heap
page read and write
129B000
heap
page read and write
3B1E000
trusted library allocation
page read and write
129B000
heap
page read and write
12EE000
heap
page read and write
12C0000
heap
page read and write
1292000
heap
page read and write
12B6000
heap
page read and write
3B1E000
trusted library allocation
page read and write
3B4E000
trusted library allocation
page read and write
3B92000
trusted library allocation
page read and write
12B7000
heap
page read and write
12D0000
heap
page read and write
1295000
heap
page read and write
12EE000
heap
page read and write
1293000
heap
page read and write
3B43000
trusted library allocation
page read and write
3C4E000
stack
page read and write
2DF1000
heap
page read and write
3AF6000
trusted library allocation
page read and write
1004000
heap
page read and write
3B24000
trusted library allocation
page read and write
12BF000
heap
page read and write
129B000
heap
page read and write
3AFA000
trusted library allocation
page read and write
129B000
heap
page read and write
3B43000
trusted library allocation
page read and write
3B25000
trusted library allocation
page read and write
12EE000
heap
page read and write
389E000
stack
page read and write
3AFD000
trusted library allocation
page read and write
12D0000
heap
page read and write
3B20000
trusted library allocation
page read and write
FF0000
heap
page read and write
12CF000
heap
page read and write
1293000
heap
page read and write
3D3F000
trusted library allocation
page read and write
3B4B000
trusted library allocation
page read and write
1293000
heap
page read and write
121D000
heap
page read and write
2F00000
trusted library allocation
page read and write
3D65000
trusted library allocation
page read and write
3B1C000
trusted library allocation
page read and write
12E7000
heap
page read and write
3B19000
trusted library allocation
page read and write
12DF000
heap
page read and write
12EE000
heap
page read and write
653000
unkown
page readonly
3B2A000
trusted library allocation
page read and write
12B0000
heap
page read and write
3B2E000
trusted library allocation
page read and write
1004000
heap
page read and write
12B0000
heap
page read and write
129C000
heap
page read and write
12A1000
heap
page read and write
3AFC000
trusted library allocation
page read and write
3AFD000
trusted library allocation
page read and write
3B4E000
trusted library allocation
page read and write
12EE000
heap
page read and write
32A0000
remote allocation
page read and write
1292000
heap
page read and write
12BF000
heap
page read and write
12BD000
heap
page read and write
1224000
heap
page read and write
3B68000
trusted library allocation
page read and write
3B7D000
trusted library allocation
page read and write
399E000
stack
page read and write
3B1E000
trusted library allocation
page read and write
125A000
heap
page read and write
12EE000
heap
page read and write
12EE000
heap
page read and write
14EE000
stack
page read and write
3B1C000
trusted library allocation
page read and write
12EE000
heap
page read and write
12CF000
heap
page read and write
12C6000
heap
page read and write
3B08000
trusted library allocation
page read and write
129B000
heap
page read and write
12EE000
heap
page read and write
12CF000
heap
page read and write
3B71000
trusted library allocation
page read and write
12EE000
heap
page read and write
12EE000
heap
page read and write
3DF8000
trusted library allocation
page read and write
3B08000
trusted library allocation
page read and write
12A8000
heap
page read and write
12EE000
heap
page read and write
12EE000
heap
page read and write
3B4C000
trusted library allocation
page read and write
3230000
heap
page read and write
123B000
heap
page read and write
3223000
unclassified section
page readonly
1293000
heap
page read and write
12BF000
heap
page read and write
3B43000
trusted library allocation
page read and write
3B7B000
trusted library allocation
page read and write
3B0F000
trusted library allocation
page read and write
33CD000
stack
page read and write
3AFA000
trusted library allocation
page read and write
3ADE000
stack
page read and write
620000
unkown
page readonly
3B90000
trusted library allocation
page read and write
3B1E000
trusted library allocation
page read and write
1292000
heap
page read and write
1004000
heap
page read and write
121D000
heap
page read and write
3C15000
trusted library allocation
page read and write
12CD000
heap
page read and write
1295000
heap
page read and write
12EE000
heap
page read and write
3B4E000
trusted library allocation
page read and write
12EE000
heap
page read and write
12C0000
heap
page read and write
3DE0000
heap
page read and write
3B2E000
trusted library allocation
page read and write
12EE000
heap
page read and write
3B35000
trusted library allocation
page read and write
12D0000
heap
page read and write
12EE000
heap
page read and write
12EE000
heap
page read and write
129B000
heap
page read and write
3B3D000
trusted library allocation
page read and write
12EE000
heap
page read and write
3B34000
trusted library allocation
page read and write
129B000
heap
page read and write
12CE000
heap
page read and write
3B7B000
trusted library allocation
page read and write
129B000
heap
page read and write
12CF000
heap
page read and write
3B2E000
trusted library allocation
page read and write
12C5000
heap
page read and write
12EE000
heap
page read and write
3B3C000
trusted library allocation
page read and write
1259000
heap
page read and write
12C5000
heap
page read and write
32A0000
remote allocation
page read and write
12EE000
heap
page read and write
3B18000
trusted library allocation
page read and write
3B35000
trusted library allocation
page read and write
3B2E000
trusted library allocation
page read and write
307B000
stack
page read and write
12C6000
heap
page read and write
12EE000
heap
page read and write
3B4E000
trusted library allocation
page read and write
350C000
stack
page read and write
12EE000
heap
page read and write
123E000
heap
page read and write
3B5D000
trusted library allocation
page read and write
3CCD000
trusted library allocation
page read and write
3B19000
trusted library allocation
page read and write
1004000
heap
page read and write
12CD000
heap
page read and write
2EF0000
heap
page read and write
129B000
heap
page read and write
3B2C000
trusted library allocation
page read and write
3AFD000
trusted library allocation
page read and write
12B9000
heap
page read and write
12EE000
heap
page read and write
3B2C000
trusted library allocation
page read and write
129B000
heap
page read and write
1004000
heap
page read and write
3B2E000
trusted library allocation
page read and write
3B44000
trusted library allocation
page read and write
3180000
direct allocation
page read and write
120E000
heap
page read and write
12EE000
heap
page read and write
11F0000
heap
page read and write
12B7000
heap
page read and write
12EE000
heap
page read and write
3B53000
trusted library allocation
page read and write
115E000
stack
page read and write
3B2D000
trusted library allocation
page read and write
3210000
unclassified section
page write copy
12D0000
heap
page read and write
12EE000
heap
page read and write
3B43000
trusted library allocation
page read and write
12C4000
heap
page read and write
12AC000
heap
page read and write
3B0E000
trusted library allocation
page read and write
3B68000
trusted library allocation
page read and write
12EE000
heap
page read and write
1004000
heap
page read and write
3B32000
trusted library allocation
page read and write
12EE000
heap
page read and write
3B4A000
trusted library allocation
page read and write
12CF000
heap
page read and write
12EE000
heap
page read and write
3B04000
trusted library allocation
page read and write
1293000
heap
page read and write
3B20000
trusted library allocation
page read and write
12ED000
heap
page read and write
129B000
heap
page read and write
621000
unkown
page execute read
12EE000
heap
page read and write
12EE000
heap
page read and write
3B04000
trusted library allocation
page read and write
129B000
heap
page read and write
12B7000
heap
page read and write
12CF000
heap
page read and write
12EE000
heap
page read and write
3AFD000
trusted library allocation
page read and write
3B2E000
trusted library allocation
page read and write
3B14000
trusted library allocation
page read and write
42FD000
trusted library allocation
page read and write
12C3000
heap
page read and write
123B000
heap
page read and write
3AFF000
trusted library allocation
page read and write
3B2B000
trusted library allocation
page read and write
3B7B000
trusted library allocation
page read and write
3B6E000
trusted library allocation
page read and write
3B2B000
trusted library allocation
page read and write
2DF1000
heap
page read and write
12ED000
heap
page read and write
3B2E000
trusted library allocation
page read and write
2DF1000
heap
page read and write
3B56000
trusted library allocation
page read and write
12B6000
heap
page read and write
3B2E000
trusted library allocation
page read and write
12EE000
heap
page read and write
12EE000
heap
page read and write
12A7000
heap
page read and write
12EE000
heap
page read and write
3B02000
trusted library allocation
page read and write
3AFD000
trusted library allocation
page read and write
12EE000
heap
page read and write
12BF000
heap
page read and write
3B43000
trusted library allocation
page read and write
1004000
heap
page read and write
1218000
heap
page read and write
320D000
unclassified section
page readonly
129C000
heap
page read and write
129B000
heap
page read and write
12D0000
heap
page read and write
2DF1000
heap
page read and write
12EE000
heap
page read and write
12EE000
heap
page read and write
12EE000
heap
page read and write
129B000
heap
page read and write
3B23000
trusted library allocation
page read and write
1288000
heap
page read and write
3B26000
trusted library allocation
page read and write
3E89000
trusted library allocation
page read and write
317A000
stack
page read and write
3CC5000
trusted library allocation
page read and write
12C0000
heap
page read and write
129B000
heap
page read and write
3B03000
trusted library allocation
page read and write
3B75000
trusted library allocation
page read and write
1004000
heap
page read and write
3B43000
trusted library allocation
page read and write
3B1F000
trusted library allocation
page read and write
3B1E000
trusted library allocation
page read and write
3B12000
trusted library allocation
page read and write
12A7000
heap
page read and write
3AF6000
trusted library allocation
page read and write
12BF000
heap
page read and write
3B14000
trusted library allocation
page read and write
123E000
heap
page read and write
4804000
trusted library allocation
page read and write
620000
unkown
page readonly
12CD000
heap
page read and write
64E000
unkown
page write copy
12EE000
heap
page read and write
3B15000
trusted library allocation
page read and write
12BD000
heap
page read and write
3C2D000
trusted library allocation
page read and write
129B000
heap
page read and write
3B73000
trusted library allocation
page read and write
1004000
heap
page read and write
12A6000
heap
page read and write
129B000
heap
page read and write
1293000
heap
page read and write
There are 503 hidden memdumps, click here to show them.