IOC Report
file.exe

loading gif

Files

File Path
Type
Category
Malicious
file.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_file.exe_a35f85a9697e8c5bfcd541ff1e0c59facae73a9_33636041_10cb29f1-59b3-47ba-8a2b-bf10dbfe6815\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
malicious
C:\ProgramData\Microsoft\Windows\WER\Temp\WER1F49.tmp.dmp
Mini DuMP crash report, 14 streams, Tue Jul 2 15:18:55 2024, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER1FE7.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER2007.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\RegAsm.exe.log
ASCII text, with CRLF line terminators
dropped
C:\Windows\appcompat\Programs\Amcache.hve
MS Windows registry file, NT/2000 or above
dropped

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\file.exe
"C:\Users\user\Desktop\file.exe"
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
malicious
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 6724 -s 312

URLs

Name
IP
Malicious
77.105.135.107:3445
malicious
http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-soap-message-security-1.0#Text
unknown
http://schemas.xmlsoap.org/ws/2005/02/sc/sct
unknown
http://schemas.xmlsoap.org/ws/2004/04/security/sc/dk
unknown
https://duckduckgo.com/ac/?q=
unknown
http://tempuri.org/Entity/Id14ResponseD
unknown
http://tempuri.org/Entity/Id23ResponseD
unknown
http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-soap-message-security-1.0#HexBinary
unknown
http://tempuri.org/Entity/Id12Response
unknown
http://tempuri.org/
unknown
http://tempuri.org/Entity/Id2Response
unknown
http://schemas.xmlsoap.org/ws/2005/02/sc/dk/p_sha1
unknown
http://tempuri.org/Entity/Id21Response
unknown
http://schemas.xmlsoap.org/2005/02/trust/spnego#GSS_Wrap
unknown
http://tempuri.org/Entity/Id9
unknown
http://docs.oasis-open.org/wss/oasis-wss-saml-token-profile-1.1#SAMLID
unknown
http://tempuri.org/Entity/Id8
unknown
http://tempuri.org/Entity/Id6ResponseD
unknown
http://tempuri.org/Entity/Id5
unknown
http://schemas.xmlsoap.org/ws/2004/10/wsat/Prepare
unknown
http://tempuri.org/Entity/Id4
unknown
http://tempuri.org/Entity/Id7
unknown
http://tempuri.org/Entity/Id6
unknown
http://schemas.xmlsoap.org/ws/2005/02/trust#BinarySecret
unknown
http://tempuri.org/Entity/Id19Response
unknown
http://docs.oasis-open.org/wss/oasis-wss-rel-token-profile-1.0.pdf#license
unknown
http://schemas.xmlsoap.org/ws/2005/02/trust/RSTR/Issue
unknown
http://schemas.xmlsoap.org/ws/2004/10/wsat/Aborted
unknown
http://schemas.xmlsoap.org/ws/2005/02/rm/TerminateSequence
unknown
http://tempuri.org/Entity/Id13ResponseD
unknown
http://schemas.xmlsoap.org/ws/2004/10/wsat/fault
unknown
http://schemas.xmlsoap.org/ws/2004/10/wsat
unknown
http://docs.oasis-open.org/wss/oasis-wss-soap-message-security-1.1#EncryptedKey
unknown
http://tempuri.org/Entity/Id15Response
unknown
http://tempuri.org/Entity/Id5ResponseD
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
http://schemas.xmlsoap.org/ws/2005/02/trust/RSTR/SCT/Renew
unknown
http://schemas.xmlsoap.org/ws/2004/10/wscoor/Register
unknown
http://tempuri.org/Entity/Id6Response
unknown
http://schemas.xmlsoap.org/ws/2004/04/trust/SymmetricKey
unknown
https://api.ip.sb/ip
unknown
http://schemas.xmlsoap.org/ws/2004/04/sc
unknown
http://tempuri.org/Entity/Id1ResponseD
unknown
http://schemas.xmlsoap.org/ws/2004/10/wsat/Volatile2PC
unknown
http://schemas.xmlsoap.org/ws/2005/02/trust/RSTR/SCT/Cancel
unknown
http://tempuri.org/Entity/Id9Response
unknown
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
unknown
http://tempuri.org/Entity/Id20
unknown
http://tempuri.org/Entity/Id21
unknown
http://tempuri.org/Entity/Id22
unknown
http://docs.oasis-open.org/wss/oasis-wss-kerberos-token-profile-1.1#Kerberosv5APREQSHA1
unknown
http://tempuri.org/Entity/Id23
unknown
http://schemas.xmlsoap.org/ws/2004/04/security/trust/CK/PSHA1
unknown
http://tempuri.org/Entity/Id24
unknown
http://schemas.xmlsoap.org/ws/2004/04/security/trust/RSTR/Issue
unknown
http://tempuri.org/Entity/Id24Response
unknown
https://www.ecosia.org/newtab/
unknown
http://tempuri.org/Entity/Id1Response
unknown
http://schemas.xmlsoap.org/ws/2005/02/rm/AckRequested
unknown
http://schemas.xmlsoap.org/ws/2004/10/wsat/ReadOnly
unknown
http://schemas.xmlsoap.org/ws/2004/10/wsat/Replay
unknown
http://schemas.xmlsoap.org/ws/2005/02/trust/tlsnego
unknown
http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-soap-message-security-1.0#Base64Binary
unknown
http://schemas.xmlsoap.org/ws/2004/10/wsat/Durable2PC
unknown
http://schemas.xmlsoap.org/ws/2004/04/security/trust/SymmetricKey
unknown
http://tempuri.org/Entity/Id21ResponseD
unknown
http://schemas.xmlsoap.org/ws/2004/08/addressing
unknown
http://schemas.xmlsoap.org/ws/2005/02/trust/RST/Issue
unknown
http://schemas.xmlsoap.org/ws/2004/10/wsat/Completion
unknown
http://schemas.xmlsoap.org/ws/2004/04/trust
unknown
http://tempuri.org/Entity/Id10
unknown
http://tempuri.org/Entity/Id11
unknown
http://tempuri.org/Entity/Id10ResponseD
unknown
http://tempuri.org/Entity/Id12
unknown
http://tempuri.org/Entity/Id16Response
unknown
http://schemas.xmlsoap.org/ws/2004/10/wscoor/CreateCoordinationContextResponse
unknown
http://schemas.xmlsoap.org/ws/2005/02/trust/RST/SCT/Cancel
unknown
http://tempuri.org/Entity/Id13
unknown
http://tempuri.org/Entity/Id14
unknown
http://tempuri.org/Entity/Id15
unknown
http://tempuri.org/Entity/Id16
unknown
http://schemas.xmlsoap.org/ws/2005/02/trust/Nonce
unknown
http://tempuri.org/Entity/Id17
unknown
http://tempuri.org/Entity/Id18
unknown
http://tempuri.org/Entity/Id5Response
unknown
http://tempuri.org/Entity/Id19
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/dns
unknown
http://tempuri.org/Entity/Id15ResponseD
unknown
http://tempuri.org/Entity/Id10Response
unknown
http://schemas.xmlsoap.org/ws/2005/02/trust/Renew
unknown
http://tempuri.org/Entity/Id11ResponseD
unknown
http://tempuri.org/Entity/Id8Response
unknown
http://schemas.xmlsoap.org/ws/2004/04/trust/PublicKey
unknown
http://docs.oasis-open.org/wss/oasis-wss-saml-token-profile-1.1#SAMLV2.0
unknown
http://docs.oasis-open.org/wss/oasis-wss-saml-token-profile-1.0#SAMLAssertionID
unknown
http://schemas.xmlsoap.org/ws/2004/04/security/trust/RST/SCT
unknown
http://schemas.xmlsoap.org/ws/2006/02/addressingidentity
unknown
http://tempuri.org/Entity/Id17ResponseD
unknown
http://schemas.xmlsoap.org/soap/envelope/
unknown
http://tempuri.org/Entity/Id8ResponseD
unknown
There are 90 hidden URLs, click here to show them.

IPs

IP
Domain
Country
Malicious
77.105.135.107
unknown
Russian Federation
malicious

Registry

Path
Value
Malicious
\REGISTRY\A\{fc41c855-b6bf-9245-3dbf-3a660598a0d0}\Root\InventoryApplicationFile\file.exe|ff8e65d6b06db8e5
ProgramId
malicious
\REGISTRY\A\{fc41c855-b6bf-9245-3dbf-3a660598a0d0}\Root\InventoryApplicationFile\file.exe|ff8e65d6b06db8e5
FileId
malicious
\REGISTRY\A\{fc41c855-b6bf-9245-3dbf-3a660598a0d0}\Root\InventoryApplicationFile\file.exe|ff8e65d6b06db8e5
LowerCaseLongPath
malicious
\REGISTRY\A\{fc41c855-b6bf-9245-3dbf-3a660598a0d0}\Root\InventoryApplicationFile\file.exe|ff8e65d6b06db8e5
LongPathHash
malicious
\REGISTRY\A\{fc41c855-b6bf-9245-3dbf-3a660598a0d0}\Root\InventoryApplicationFile\file.exe|ff8e65d6b06db8e5
Name
malicious
\REGISTRY\A\{fc41c855-b6bf-9245-3dbf-3a660598a0d0}\Root\InventoryApplicationFile\file.exe|ff8e65d6b06db8e5
OriginalFileName
malicious
\REGISTRY\A\{fc41c855-b6bf-9245-3dbf-3a660598a0d0}\Root\InventoryApplicationFile\file.exe|ff8e65d6b06db8e5
Publisher
malicious
\REGISTRY\A\{fc41c855-b6bf-9245-3dbf-3a660598a0d0}\Root\InventoryApplicationFile\file.exe|ff8e65d6b06db8e5
Version
malicious
\REGISTRY\A\{fc41c855-b6bf-9245-3dbf-3a660598a0d0}\Root\InventoryApplicationFile\file.exe|ff8e65d6b06db8e5
BinFileVersion
malicious
\REGISTRY\A\{fc41c855-b6bf-9245-3dbf-3a660598a0d0}\Root\InventoryApplicationFile\file.exe|ff8e65d6b06db8e5
BinaryType
malicious
\REGISTRY\A\{fc41c855-b6bf-9245-3dbf-3a660598a0d0}\Root\InventoryApplicationFile\file.exe|ff8e65d6b06db8e5
ProductName
malicious
\REGISTRY\A\{fc41c855-b6bf-9245-3dbf-3a660598a0d0}\Root\InventoryApplicationFile\file.exe|ff8e65d6b06db8e5
ProductVersion
malicious
\REGISTRY\A\{fc41c855-b6bf-9245-3dbf-3a660598a0d0}\Root\InventoryApplicationFile\file.exe|ff8e65d6b06db8e5
LinkDate
malicious
\REGISTRY\A\{fc41c855-b6bf-9245-3dbf-3a660598a0d0}\Root\InventoryApplicationFile\file.exe|ff8e65d6b06db8e5
BinProductVersion
malicious
\REGISTRY\A\{fc41c855-b6bf-9245-3dbf-3a660598a0d0}\Root\InventoryApplicationFile\file.exe|ff8e65d6b06db8e5
AppxPackageFullName
malicious
\REGISTRY\A\{fc41c855-b6bf-9245-3dbf-3a660598a0d0}\Root\InventoryApplicationFile\file.exe|ff8e65d6b06db8e5
AppxPackageRelativeId
malicious
\REGISTRY\A\{fc41c855-b6bf-9245-3dbf-3a660598a0d0}\Root\InventoryApplicationFile\file.exe|ff8e65d6b06db8e5
Size
malicious
\REGISTRY\A\{fc41c855-b6bf-9245-3dbf-3a660598a0d0}\Root\InventoryApplicationFile\file.exe|ff8e65d6b06db8e5
Language
malicious
\REGISTRY\A\{fc41c855-b6bf-9245-3dbf-3a660598a0d0}\Root\InventoryApplicationFile\file.exe|ff8e65d6b06db8e5
Usn
malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
Owner
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
SessionHash
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
Sequence
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
RegFiles0000
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
RegFilesHash
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\IdentityCRL\ClockData
ClockTimeSeconds
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\IdentityCRL\ClockData
TickCount
There are 16 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
2EA1000
trusted library allocation
page read and write
malicious
402000
remote allocation
page execute and read and write
malicious
2F35000
trusted library allocation
page read and write
malicious
17A000
unkown
page read and write
malicious
ACE000
stack
page read and write
55D0000
trusted library allocation
page read and write
33EC000
trusted library allocation
page read and write
6F0F000
heap
page read and write
757E000
stack
page read and write
11A4000
trusted library allocation
page read and write
3322000
trusted library allocation
page read and write
591C000
heap
page read and write
52EB000
trusted library allocation
page read and write
6FBE000
heap
page read and write
30B4000
trusted library allocation
page read and write
59B0000
trusted library allocation
page execute and read and write
E0000
unkown
page readonly
710F000
trusted library allocation
page read and write
5600000
heap
page read and write
30A9000
trusted library allocation
page read and write
7200000
trusted library allocation
page execute and read and write
3EC9000
trusted library allocation
page read and write
5360000
heap
page read and write
2890000
heap
page read and write
5400000
trusted library allocation
page read and write
1220000
trusted library allocation
page execute and read and write
105F000
heap
page read and write
11D7000
trusted library allocation
page execute and read and write
11C0000
trusted library allocation
page read and write
3EA1000
trusted library allocation
page read and write
7132000
trusted library allocation
page read and write
2FDD000
trusted library allocation
page read and write
3ED5000
trusted library allocation
page read and write
58BC000
heap
page read and write
763B000
stack
page read and write
2E5B000
stack
page read and write
B1E000
heap
page read and write
B1A000
heap
page read and write
6340000
trusted library allocation
page execute and read and write
6EE0000
heap
page read and write
3EE3000
trusted library allocation
page read and write
58E0000
heap
page read and write
3394000
trusted library allocation
page read and write
33E1000
trusted library allocation
page read and write
633C000
stack
page read and write
711A000
trusted library allocation
page read and write
11C2000
trusted library allocation
page read and write
B69000
stack
page read and write
77EE000
stack
page read and write
1200000
heap
page read and write
711F000
trusted library allocation
page read and write
1240000
trusted library allocation
page read and write
347B000
trusted library allocation
page read and write
2D0E000
trusted library allocation
page read and write
3056000
trusted library allocation
page read and write
7130000
trusted library allocation
page read and write
58FB000
heap
page read and write
5670000
trusted library allocation
page read and write
2E65000
trusted library allocation
page read and write
2E60000
trusted library allocation
page read and write
7120000
trusted library allocation
page read and write
3017000
trusted library allocation
page read and write
7210000
trusted library allocation
page read and write
83C000
stack
page read and write
5710000
trusted library allocation
page execute and read and write
52FE000
trusted library allocation
page read and write
E0000
unkown
page readonly
30B8000
trusted library allocation
page read and write
3316000
trusted library allocation
page read and write
53A0000
trusted library allocation
page read and write
435000
remote allocation
page execute and read and write
3ED0000
trusted library allocation
page read and write
70F0000
trusted library allocation
page read and write
D0E000
stack
page read and write
2C0F000
stack
page read and write
5850000
heap
page read and write
33FA000
trusted library allocation
page read and write
726E000
stack
page read and write
5946000
heap
page read and write
3148000
trusted library allocation
page read and write
76E0000
heap
page read and write
EF7000
stack
page read and write
58CC000
heap
page read and write
3046000
trusted library allocation
page read and write
990000
heap
page read and write
70E3000
trusted library allocation
page read and write
594D000
heap
page read and write
3050000
trusted library allocation
page read and write
B0E000
stack
page read and write
11D2000
trusted library allocation
page read and write
FFB000
heap
page read and write
5393000
heap
page execute and read and write
3EDF000
trusted library allocation
page read and write
56E0000
trusted library allocation
page execute and read and write
53E2000
trusted library allocation
page read and write
3373000
trusted library allocation
page read and write
649E000
stack
page read and write
11BD000
trusted library allocation
page execute and read and write
71EE000
stack
page read and write
332F000
trusted library allocation
page read and write
10D3000
heap
page read and write
1BC000
unkown
page read and write
11D0000
trusted library allocation
page read and write
53EE000
trusted library allocation
page read and write
6F6D000
heap
page read and write
B2D000
heap
page read and write
70F2000
trusted library allocation
page read and write
53CB000
trusted library allocation
page read and write
5620000
trusted library allocation
page read and write
2FEF000
trusted library allocation
page read and write
2B0F000
stack
page read and write
E1000
unkown
page execute read
52E4000
trusted library allocation
page read and write
311C000
trusted library allocation
page read and write
55DE000
trusted library allocation
page read and write
3402000
trusted library allocation
page read and write
10E0000
heap
page read and write
5950000
trusted library allocation
page execute and read and write
3140000
trusted library allocation
page read and write
3439000
trusted library allocation
page read and write
33D6000
trusted library allocation
page read and write
3EC1000
trusted library allocation
page read and write
2E70000
trusted library allocation
page read and write
53C0000
trusted library allocation
page read and write
300F000
trusted library allocation
page read and write
6D37000
trusted library allocation
page read and write
7640000
trusted library allocation
page read and write
61FE000
stack
page read and write
6EEC000
heap
page read and write
10DA000
heap
page read and write
3EAF000
trusted library allocation
page read and write
56D0000
trusted library allocation
page execute and read and write
70F5000
trusted library allocation
page read and write
32FE000
trusted library allocation
page read and write
53D6000
trusted library allocation
page read and write
6F09000
heap
page read and write
6C2E000
stack
page read and write
5840000
trusted library allocation
page read and write
BE0000
heap
page read and write
5918000
heap
page read and write
3077000
trusted library allocation
page read and write
2E1E000
stack
page read and write
1031000
heap
page read and write
6F17000
heap
page read and write
6E40000
trusted library allocation
page execute and read and write
10F0000
heap
page read and write
3495000
trusted library allocation
page read and write
710A000
trusted library allocation
page read and write
60BE000
stack
page read and write
75BE000
stack
page read and write
3119000
trusted library allocation
page read and write
3186000
trusted library allocation
page read and write
6D2D000
stack
page read and write
5660000
trusted library allocation
page execute and read and write
6F79000
heap
page read and write
56F0000
trusted library allocation
page read and write
6BD0000
heap
page read and write
2FE0000
trusted library allocation
page read and write
76CE000
stack
page read and write
E0F000
stack
page read and write
5960000
heap
page execute and read and write
7290000
trusted library allocation
page read and write
6F52000
heap
page read and write
55B0000
trusted library allocation
page read and write
59AE000
stack
page read and write
71F0000
trusted library allocation
page read and write
3387000
trusted library allocation
page read and write
2C4E000
stack
page read and write
6F2E000
heap
page read and write
305E000
trusted library allocation
page read and write
75FF000
stack
page read and write
32D2000
trusted library allocation
page read and write
400000
remote allocation
page execute and read and write
2CF0000
trusted library allocation
page read and write
33D3000
trusted library allocation
page read and write
9A0000
heap
page read and write
10DC000
heap
page read and write
34CD000
trusted library allocation
page read and write
343F000
trusted library allocation
page read and write
5700000
trusted library allocation
page read and write
7806000
heap
page read and write
530D000
trusted library allocation
page read and write
330E000
trusted library allocation
page read and write
6FA5000
heap
page read and write
339C000
trusted library allocation
page read and write
55F0000
trusted library allocation
page read and write
168000
unkown
page readonly
659C000
stack
page read and write
592C000
heap
page read and write
70F9000
trusted library allocation
page read and write
7124000
trusted library allocation
page read and write
113E000
stack
page read and write
5830000
trusted library allocation
page read and write
6FDB000
heap
page read and write
58F5000
heap
page read and write
3489000
trusted library allocation
page read and write
768E000
stack
page read and write
307F000
trusted library allocation
page read and write
7270000
trusted library allocation
page execute and read and write
71AD000
stack
page read and write
58FF000
heap
page read and write
78F1000
trusted library allocation
page read and write
7280000
trusted library allocation
page execute and read and write
6D40000
heap
page read and write
3470000
trusted library allocation
page read and write
8EDE000
stack
page read and write
310F000
trusted library allocation
page read and write
7115000
trusted library allocation
page read and write
11A3000
trusted library allocation
page execute and read and write
30C2000
trusted library allocation
page read and write
2FF6000
trusted library allocation
page read and write
6D35000
trusted library allocation
page read and write
3460000
trusted library allocation
page read and write
5906000
heap
page read and write
7108000
trusted library allocation
page read and write
77F0000
heap
page read and write
2FEB000
trusted library allocation
page read and write
11C6000
trusted library allocation
page execute and read and write
10F5000
heap
page read and write
6EE2000
heap
page read and write
6F4C000
heap
page read and write
6F36000
heap
page read and write
3053000
trusted library allocation
page read and write
273D000
stack
page read and write
1C9000
unkown
page readonly
11DB000
trusted library allocation
page execute and read and write
31F8000
trusted library allocation
page read and write
168000
unkown
page readonly
283D000
stack
page read and write
3127000
trusted library allocation
page read and write
93D000
stack
page read and write
6F63000
heap
page read and write
2FE3000
trusted library allocation
page read and write
1236000
heap
page read and write
70E6000
trusted library allocation
page read and write
B10000
heap
page read and write
5680000
trusted library allocation
page read and write
5372000
trusted library allocation
page read and write
55E0000
trusted library allocation
page read and write
6BC0000
trusted library allocation
page read and write
5301000
trusted library allocation
page read and write
3452000
trusted library allocation
page read and write
5390000
heap
page execute and read and write
2E90000
heap
page execute and read and write
62FF000
stack
page read and write
5926000
heap
page read and write
25FE000
stack
page read and write
2D10000
heap
page read and write
40CB000
trusted library allocation
page read and write
2F7F000
trusted library allocation
page read and write
52E0000
trusted library allocation
page read and write
5410000
heap
page read and write
7140000
trusted library allocation
page read and write
58A9000
heap
page read and write
349B000
trusted library allocation
page read and write
11A0000
trusted library allocation
page read and write
5370000
trusted library allocation
page read and write
427E000
trusted library allocation
page read and write
1260000
heap
page read and write
53FA000
trusted library allocation
page read and write
3308000
trusted library allocation
page read and write
2C58000
trusted library allocation
page read and write
5413000
heap
page read and write
11D5000
trusted library allocation
page execute and read and write
58E5000
heap
page read and write
3132000
trusted library allocation
page read and write
11F0000
trusted library allocation
page read and write
342F000
trusted library allocation
page read and write
BD0000
heap
page read and write
336D000
trusted library allocation
page read and write
32FC000
trusted library allocation
page read and write
33C9000
trusted library allocation
page read and write
32BC000
trusted library allocation
page read and write
6FB1000
heap
page read and write
3337000
trusted library allocation
page read and write
330B000
trusted library allocation
page read and write
30E3000
trusted library allocation
page read and write
8DDF000
stack
page read and write
430000
remote allocation
page execute and read and write
1024000
heap
page read and write
1230000
heap
page read and write
1190000
trusted library allocation
page read and write
7EE0000
heap
page read and write
9B0000
heap
page read and write
FF0000
heap
page read and write
3EDC000
trusted library allocation
page read and write
53AA000
trusted library allocation
page read and write
342D000
trusted library allocation
page read and write
1C9000
unkown
page readonly
3370000
trusted library allocation
page read and write
6D30000
trusted library allocation
page read and write
53F1000
trusted library allocation
page read and write
2840000
direct allocation
page execute and read and write
26FE000
stack
page read and write
5320000
trusted library allocation
page read and write
30DC000
trusted library allocation
page read and write
2FF2000
trusted library allocation
page read and write
7220000
trusted library allocation
page read and write
7135000
trusted library allocation
page read and write
53A8000
trusted library allocation
page read and write
6F05000
heap
page read and write
644C000
stack
page read and write
31AA000
trusted library allocation
page read and write
6EF8000
heap
page read and write
17A000
unkown
page write copy
444000
remote allocation
page execute and read and write
5380000
trusted library allocation
page execute and read and write
10D7000
heap
page read and write
6F43000
heap
page read and write
58F2000
heap
page read and write
1250000
trusted library allocation
page read and write
337B000
trusted library allocation
page read and write
33D9000
trusted library allocation
page read and write
55D5000
trusted library allocation
page read and write
3069000
trusted library allocation
page read and write
123B000
heap
page read and write
61BE000
stack
page read and write
4F9B000
stack
page read and write
11AD000
trusted library allocation
page execute and read and write
31FA000
trusted library allocation
page read and write
5610000
trusted library allocation
page read and write
53D1000
trusted library allocation
page read and write
6F2B000
heap
page read and write
3F22000
trusted library allocation
page read and write
3044000
trusted library allocation
page read and write
55C1000
trusted library allocation
page read and write
311F000
trusted library allocation
page read and write
3001000
trusted library allocation
page read and write
55DB000
trusted library allocation
page read and write
5650000
trusted library allocation
page read and write
33C7000
trusted library allocation
page read and write
7FCB0000
trusted library allocation
page execute and read and write
3362000
trusted library allocation
page read and write
343C000
trusted library allocation
page read and write
70E0000
trusted library allocation
page read and write
6F87000
heap
page read and write
3447000
trusted library allocation
page read and write
590E000
heap
page read and write
30CE000
trusted library allocation
page read and write
117E000
stack
page read and write
E1000
unkown
page execute read
10CB000
heap
page read and write
2C50000
trusted library allocation
page read and write
2D00000
trusted library allocation
page read and write
2F77000
trusted library allocation
page read and write
607E000
stack
page read and write
11B0000
trusted library allocation
page read and write
5312000
trusted library allocation
page read and write
30BA000
trusted library allocation
page read and write
310D000
trusted library allocation
page read and write
31F2000
trusted library allocation
page read and write
11CA000
trusted library allocation
page execute and read and write
53A5000
trusted library allocation
page read and write
32CA000
trusted library allocation
page read and write
5306000
trusted library allocation
page read and write
There are 345 hidden memdumps, click here to show them.