IOC Report
Acal BFi UK - Products List 020240704PDF.exe

loading gif

Files

File Path
Type
Category
Malicious
Acal BFi UK - Products List 020240704PDF.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\Acal BFi UK - Products List 020240704PDF.exe.log
ASCII text, with CRLF line terminators
dropped
malicious

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\Acal BFi UK - Products List 020240704PDF.exe
"C:\Users\user\Desktop\Acal BFi UK - Products List 020240704PDF.exe"
malicious
C:\Users\user\Desktop\Acal BFi UK - Products List 020240704PDF.exe
"C:\Users\user\Desktop\Acal BFi UK - Products List 020240704PDF.exe"
malicious

URLs

Name
IP
Malicious
79.110.62.16:1912
malicious
http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-soap-message-security-1.0#Text
unknown
http://schemas.xmlsoap.org/ws/2005/02/sc/sct
unknown
http://schemas.xmlsoap.org/ws/2004/04/security/sc/dk
unknown
http://tempuri.org/Entity/Id23ResponseD
unknown
http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-soap-message-security-1.0#HexBinary
unknown
http://tempuri.org/Entity/Id12Response
unknown
http://tempuri.org/DataSet1.xsd
unknown
http://tempuri.org/
unknown
http://tempuri.org/Entity/Id2Response
unknown
http://schemas.xmlsoap.org/ws/2005/02/sc/dk/p_sha1
unknown
http://tempuri.org/Entity/Id21Response
unknown
http://schemas.xmlsoap.org/2005/02/trust/spnego#GSS_Wrap
unknown
http://tempuri.org/Entity/Id9
unknown
http://docs.oasis-open.org/wss/oasis-wss-saml-token-profile-1.1#SAMLID
unknown
http://tempuri.org/Entity/Id8
unknown
http://tempuri.org/Entity/Id5
unknown
http://schemas.xmlsoap.org/ws/2004/10/wsat/Prepare
unknown
http://tempuri.org/Entity/Id4
unknown
http://tempuri.org/Entity/Id7
unknown
http://tempuri.org/Entity/Id6
unknown
http://schemas.xmlsoap.org/ws/2005/02/trust#BinarySecret
unknown
http://tempuri.org/Entity/Id19Response
unknown
http://docs.oasis-open.org/wss/oasis-wss-rel-token-profile-1.0.pdf#license
unknown
http://schemas.xmlsoap.org/ws/2005/02/trust/RSTR/Issue
unknown
http://schemas.xmlsoap.org/ws/2004/10/wsat/Aborted
unknown
http://schemas.xmlsoap.org/ws/2005/02/rm/TerminateSequence
unknown
http://schemas.xmlsoap.org/ws/2004/10/wsat/fault
unknown
http://schemas.xmlsoap.org/ws/2004/10/wsat
unknown
http://docs.oasis-open.org/wss/oasis-wss-soap-message-security-1.1#EncryptedKey
unknown
http://tempuri.org/Entity/Id15Response
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
http://schemas.xmlsoap.org/ws/2005/02/trust/RSTR/SCT/Renew
unknown
http://schemas.xmlsoap.org/ws/2004/10/wscoor/Register
unknown
http://tempuri.org/Entity/Id6Response
unknown
http://schemas.xmlsoap.org/ws/2004/04/trust/SymmetricKey
unknown
https://api.ip.sb/ip
unknown
http://schemas.xmlsoap.org/ws/2004/04/sc
unknown
http://tempuri.org/Entity/Id1ResponseD
unknown
http://schemas.xmlsoap.org/ws/2004/10/wsat/Volatile2PC
unknown
http://schemas.xmlsoap.org/ws/2005/02/trust/RSTR/SCT/Cancel
unknown
http://tempuri.org/Entity/Id9Response
unknown
http://tempuri.org/Entity/Id20
unknown
http://tempuri.org/Entity/Id21
unknown
http://tempuri.org/Entity/Id22
unknown
http://docs.oasis-open.org/wss/oasis-wss-kerberos-token-profile-1.1#Kerberosv5APREQSHA1
unknown
http://tempuri.org/Entity/Id23
unknown
http://schemas.xmlsoap.org/ws/2004/04/security/trust/CK/PSHA1
unknown
http://tempuri.org/Entity/Id24
unknown
http://schemas.xmlsoap.org/ws/2004/04/security/trust/RSTR/Issue
unknown
http://tempuri.org/Entity/Id24Response
unknown
http://tempuri.org/Entity/Id1Response
unknown
http://schemas.xmlsoap.org/ws/2005/02/rm/AckRequested
unknown
http://schemas.xmlsoap.org/ws/2004/10/wsat/ReadOnly
unknown
http://schemas.xmlsoap.org/ws/2004/10/wsat/Replay
unknown
http://schemas.xmlsoap.org/ws/2005/02/trust/tlsnego
unknown
http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-soap-message-security-1.0#Base64Binary
unknown
http://schemas.xmlsoap.org/ws/2004/10/wsat/Durable2PC
unknown
http://schemas.xmlsoap.org/ws/2004/04/security/trust/SymmetricKey
unknown
http://schemas.xmlsoap.org/ws/2004/08/addressing
unknown
http://schemas.xmlsoap.org/ws/2005/02/trust/RST/Issue
unknown
http://schemas.xmlsoap.org/ws/2004/10/wsat/Completion
unknown
http://schemas.xmlsoap.org/ws/2004/04/trust
unknown
http://tempuri.org/Entity/Id10
unknown
http://tempuri.org/Entity/Id11
unknown
http://tempuri.org/Entity/Id12
unknown
http://tempuri.org/Entity/Id16Response
unknown
http://schemas.xmlsoap.org/ws/2004/10/wscoor/CreateCoordinationContextResponse
unknown
http://schemas.xmlsoap.org/ws/2005/02/trust/RST/SCT/Cancel
unknown
http://tempuri.org/Entity/Id13
unknown
http://tempuri.org/Entity/Id14
unknown
http://tempuri.org/Entity/Id15
unknown
http://tempuri.org/Entity/Id16
unknown
http://schemas.xmlsoap.org/ws/2005/02/trust/Nonce
unknown
http://tempuri.org/Entity/Id17
unknown
http://tempuri.org/Entity/Id18
unknown
http://tempuri.org/Entity/Id5Response
unknown
http://tempuri.org/Entity/Id19
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/dns
unknown
http://tempuri.org/Entity/Id10Response
unknown
http://schemas.xmlsoap.org/ws/2005/02/trust/Renew
unknown
http://tempuri.org/Entity/Id8Response
unknown
http://schemas.xmlsoap.org/ws/2004/04/trust/PublicKey
unknown
http://docs.oasis-open.org/wss/oasis-wss-saml-token-profile-1.1#SAMLV2.0
unknown
http://docs.oasis-open.org/wss/oasis-wss-saml-token-profile-1.0#SAMLAssertionID
unknown
http://schemas.xmlsoap.org/ws/2004/04/security/trust/RST/SCT
unknown
http://schemas.xmlsoap.org/ws/2006/02/addressingidentity
unknown
http://schemas.xmlsoap.org/soap/envelope/
unknown
http://schemas.xmlsoap.org/ws/2005/02/trust/PublicKey
unknown
http://docs.oasis-open.org/wss/oasis-wss-soap-message-security-1.1#EncryptedKeySHA1
unknown
http://schemas.xmlsoap.org/ws/2005/02/trust
unknown
http://schemas.xmlsoap.org/ws/2004/10/wsat/Rollback
unknown
http://tempuri.org/Entity/Id3ResponseD
unknown
http://tempuri.org/Entity/Id23Response
unknown
http://schemas.xmlsoap.org/ws/2004/04/security/trust/RSTR/SCT
unknown
http://tempuri.org/D
unknown
http://schemas.xmlsoap.org/ws/2004/06/addressingex
unknown
http://schemas.xmlsoap.org/ws/2004/10/wscoor
unknown
http://schemas.xmlsoap.org/ws/2004/04/security/trust/Nonce
unknown
http://schemas.xmlsoap.org/ws/2005/02/rm/CreateSequenceResponse
unknown
There are 90 hidden URLs, click here to show them.

IPs

IP
Domain
Country
Malicious
79.110.62.16
unknown
Germany
malicious

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
Owner
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
SessionHash
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
Sequence
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
RegFiles0000
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
RegFilesHash

Memdumps

Base Address
Regiontype
Protect
Malicious
3266000
trusted library allocation
page read and write
malicious
38C9000
trusted library allocation
page read and write
malicious
390C000
trusted library allocation
page read and write
malicious
3957000
trusted library allocation
page read and write
malicious
402000
remote allocation
page execute and read and write
malicious
7372000
trusted library allocation
page read and write
5704000
trusted library allocation
page read and write
885F000
stack
page read and write
7440000
trusted library allocation
page read and write
69EC000
stack
page read and write
77A3000
heap
page read and write
7312000
trusted library allocation
page read and write
8E8E000
stack
page read and write
7F6C0000
trusted library allocation
page execute and read and write
37D4000
trusted library allocation
page read and write
4E18000
trusted library allocation
page read and write
C4E000
stack
page read and write
3775000
trusted library allocation
page read and write
6EB0000
trusted library section
page read and write
57D0000
heap
page read and write
37A5000
trusted library allocation
page read and write
2930000
trusted library allocation
page read and write
5000000
trusted library allocation
page read and write
18B0000
heap
page execute and read and write
5770000
trusted library allocation
page read and write
7442000
heap
page read and write
28A0000
trusted library allocation
page read and write
5F6000
stack
page read and write
A99000
heap
page read and write
37E6000
trusted library allocation
page read and write
441B000
trusted library allocation
page read and write
41D1000
trusted library allocation
page read and write
7CEB000
stack
page read and write
EC0000
trusted library allocation
page read and write
73ED000
stack
page read and write
191E000
stack
page read and write
6760000
heap
page read and write
72CD000
trusted library allocation
page read and write
4D66000
trusted library allocation
page read and write
6580000
trusted library allocation
page read and write
4E20000
trusted library allocation
page execute and read and write
1239000
stack
page read and write
67CD000
heap
page read and write
3714000
trusted library allocation
page read and write
357D000
trusted library allocation
page read and write
13B0000
heap
page read and write
B02000
heap
page read and write
4D85000
trusted library allocation
page read and write
7A1E000
stack
page read and write
5110000
heap
page read and write
7375000
trusted library allocation
page read and write
359A000
trusted library allocation
page read and write
26A0000
trusted library allocation
page read and write
5765000
trusted library allocation
page read and write
5D5B000
trusted library allocation
page read and write
4E10000
trusted library allocation
page read and write
28C1000
trusted library allocation
page read and write
E0B0000
trusted library allocation
page read and write
A86000
heap
page read and write
14A7000
trusted library allocation
page execute and read and write
6620000
trusted library allocation
page read and write
5840000
trusted library allocation
page read and write
68E0000
trusted library allocation
page execute and read and write
5B4F000
stack
page read and write
7335000
trusted library allocation
page read and write
41DF000
trusted library allocation
page read and write
9270000
heap
page read and write
7CF0000
heap
page read and write
4D72000
trusted library allocation
page read and write
E70000
trusted library allocation
page read and write
189F000
stack
page read and write
4D40000
trusted library allocation
page read and write
EA2000
trusted library allocation
page read and write
36CE000
trusted library allocation
page read and write
353D000
trusted library allocation
page read and write
7355000
trusted library allocation
page read and write
6B40000
trusted library allocation
page read and write
3672000
trusted library allocation
page read and write
7320000
trusted library allocation
page execute and read and write
8830000
trusted library allocation
page read and write
7348000
trusted library allocation
page read and write
7430000
trusted library allocation
page read and write
6791000
heap
page read and write
147D000
trusted library allocation
page execute and read and write
400000
remote allocation
page execute and read and write
74FE000
stack
page read and write
653E000
stack
page read and write
41F1000
trusted library allocation
page read and write
28B0000
heap
page execute and read and write
745B000
heap
page read and write
3A0000
unkown
page readonly
437000
remote allocation
page execute and read and write
5250000
heap
page read and write
A2E000
stack
page read and write
742E000
stack
page read and write
1927000
heap
page read and write
6860000
trusted library allocation
page read and write
7339000
trusted library allocation
page read and write
52AC000
stack
page read and write
35B0000
trusted library allocation
page read and write
5D60000
trusted library allocation
page read and write
18A0000
trusted library allocation
page execute and read and write
7380000
trusted library allocation
page read and write
370D000
trusted library allocation
page read and write
15CA000
heap
page read and write
2690000
trusted library allocation
page read and write
7793000
heap
page read and write
5D4A000
trusted library allocation
page read and write
575E000
trusted library allocation
page read and write
6A5E000
stack
page read and write
26FE000
stack
page read and write
57B0000
heap
page read and write
6843000
heap
page read and write
7364000
trusted library allocation
page read and write
3641000
trusted library allocation
page read and write
6A3E000
stack
page read and write
67DA000
heap
page read and write
4E50000
trusted library allocation
page execute and read and write
67CB000
heap
page read and write
366D000
trusted library allocation
page read and write
5800000
trusted library allocation
page read and write
8D8E000
stack
page read and write
34D8000
trusted library allocation
page read and write
364E000
trusted library allocation
page read and write
67F9000
heap
page read and write
27FE000
stack
page read and write
7450000
trusted library allocation
page read and write
3655000
trusted library allocation
page read and write
1561000
heap
page read and write
294B000
trusted library allocation
page read and write
6824000
heap
page read and write
372A000
trusted library allocation
page read and write
14C0000
trusted library allocation
page read and write
48FC000
stack
page read and write
7A9E000
stack
page read and write
379B000
trusted library allocation
page read and write
6610000
trusted library allocation
page read and write
7BA0000
heap
page read and write
7B9E000
stack
page read and write
6816000
heap
page read and write
6B3C000
stack
page read and write
E400000
trusted library section
page read and write
5D10000
trusted library allocation
page read and write
5850000
trusted library allocation
page read and write
778D000
heap
page read and write
6640000
trusted library allocation
page read and write
8D0000
heap
page read and write
1445000
heap
page read and write
3458000
trusted library allocation
page read and write
5D50000
trusted library allocation
page read and write
14A2000
trusted library allocation
page read and write
11ECE000
stack
page read and write
5130000
heap
page read and write
432000
remote allocation
page execute and read and write
192B000
heap
page read and write
72CA000
trusted library allocation
page read and write
7332000
trusted library allocation
page read and write
870000
heap
page read and write
14F9000
heap
page read and write
746C000
heap
page read and write
5CCE000
stack
page read and write
E7D000
trusted library allocation
page execute and read and write
7330000
trusted library allocation
page read and write
6870000
trusted library allocation
page execute and read and write
67FF000
heap
page read and write
6EF0000
trusted library section
page read and write
7400000
heap
page read and write
1480000
trusted library allocation
page read and write
335A000
trusted library allocation
page read and write
2BBE000
trusted library allocation
page read and write
860000
heap
page read and write
1440000
heap
page read and write
3358000
trusted library allocation
page read and write
13FE000
stack
page read and write
4DC0000
trusted library allocation
page read and write
14A5000
trusted library allocation
page execute and read and write
5C8E000
stack
page read and write
6540000
trusted library allocation
page execute and read and write
EE0000
heap
page read and write
E92000
trusted library allocation
page read and write
7A5E000
stack
page read and write
6F10000
trusted library allocation
page execute and read and write
7022000
trusted library allocation
page read and write
7370000
trusted library allocation
page read and write
5825000
trusted library allocation
page read and write
31D1000
trusted library allocation
page read and write
6630000
trusted library allocation
page execute and read and write
E9A000
trusted library allocation
page execute and read and write
67EE000
heap
page read and write
6CDE000
stack
page read and write
EA7000
trusted library allocation
page execute and read and write
6920000
heap
page read and write
9260000
heap
page read and write
3803000
trusted library allocation
page read and write
1470000
trusted library allocation
page read and write
5340000
trusted library allocation
page execute and read and write
4D90000
trusted library allocation
page read and write
2960000
trusted library allocation
page read and write
68CC000
stack
page read and write
148D000
trusted library allocation
page execute and read and write
A70000
heap
page read and write
7460000
trusted library allocation
page execute and read and write
5760000
trusted library allocation
page read and write
8A6E000
stack
page read and write
5D26000
trusted library allocation
page read and write
5750000
trusted library allocation
page read and write
3588000
trusted library allocation
page read and write
5060000
trusted library section
page readonly
74BE000
stack
page read and write
734F000
trusted library allocation
page read and write
1496000
trusted library allocation
page execute and read and write
572D000
trusted library allocation
page read and write
7410000
heap
page read and write
37F8000
trusted library allocation
page read and write
4DB0000
heap
page read and write
3595000
trusted library allocation
page read and write
E73000
trusted library allocation
page execute and read and write
5D41000
trusted library allocation
page read and write
7735000
heap
page read and write
1473000
trusted library allocation
page execute and read and write
429E000
trusted library allocation
page read and write
67D3000
heap
page read and write
67BF000
heap
page read and write
B18000
heap
page read and write
14D0000
heap
page read and write
734A000
trusted library allocation
page read and write
5D21000
trusted library allocation
page read and write
15BF000
heap
page read and write
E90000
trusted library allocation
page read and write
67A4000
heap
page read and write
6857000
heap
page read and write
5732000
trusted library allocation
page read and write
4117000
trusted library allocation
page read and write
523D000
stack
page read and write
42F3000
trusted library allocation
page read and write
6590000
trusted library allocation
page read and write
41B3000
trusted library allocation
page read and write
4D6D000
trusted library allocation
page read and write
354F000
trusted library allocation
page read and write
836E000
stack
page read and write
1505000
heap
page read and write
37F3000
trusted library allocation
page read and write
14D8000
heap
page read and write
3507000
trusted library allocation
page read and write
149A000
trusted library allocation
page execute and read and write
6ED0000
trusted library section
page read and write
72C0000
trusted library allocation
page read and write
1920000
heap
page read and write
6B5E000
stack
page read and write
57F0000
heap
page read and write
6810000
heap
page read and write
5820000
trusted library allocation
page read and write
5120000
trusted library allocation
page read and write
56F0000
trusted library allocation
page read and write
4D80000
trusted library allocation
page read and write
3627000
trusted library allocation
page read and write
692E000
heap
page read and write
4D5E000
trusted library allocation
page read and write
446000
remote allocation
page execute and read and write
A50000
heap
page read and write
49FB000
stack
page read and write
39A2000
trusted library allocation
page read and write
7470000
trusted library allocation
page read and write
371E000
trusted library allocation
page read and write
5721000
trusted library allocation
page read and write
7444000
trusted library allocation
page read and write
3702000
trusted library allocation
page read and write
1380000
heap
page read and write
D4F000
stack
page read and write
6EE0000
trusted library allocation
page read and write
37C7000
trusted library allocation
page read and write
2850000
trusted library allocation
page read and write
179E000
stack
page read and write
5744000
trusted library allocation
page read and write
5802000
trusted library allocation
page read and write
361F000
trusted library allocation
page read and write
681A000
heap
page read and write
4E30000
trusted library allocation
page read and write
5070000
heap
page read and write
37DB000
trusted library allocation
page read and write
143D000
stack
page read and write
8860000
trusted library section
page read and write
5D5E000
trusted library allocation
page read and write
4DB3000
heap
page read and write
896E000
stack
page read and write
3615000
trusted library allocation
page read and write
4FF0000
heap
page execute and read and write
5740000
trusted library allocation
page read and write
6830000
heap
page read and write
65A0000
trusted library allocation
page read and write
14AB000
trusted library allocation
page execute and read and write
2852000
trusted library allocation
page read and write
5B8E000
stack
page read and write
1490000
trusted library allocation
page read and write
A5E000
heap
page read and write
7360000
trusted library allocation
page read and write
5D70000
trusted library allocation
page read and write
846F000
stack
page read and write
358F000
trusted library allocation
page read and write
5790000
trusted library allocation
page read and write
6E8E000
stack
page read and write
776B000
heap
page read and write
3A2000
unkown
page readonly
5085000
heap
page read and write
746A000
heap
page read and write
67E1000
heap
page read and write
735A000
trusted library allocation
page read and write
34CC000
trusted library allocation
page read and write
7718000
heap
page read and write
4D61000
trusted library allocation
page read and write
1474000
trusted library allocation
page read and write
1370000
heap
page read and write
9250000
trusted library allocation
page read and write
3735000
trusted library allocation
page read and write
3576000
trusted library allocation
page read and write
34D2000
trusted library allocation
page read and write
53AB000
stack
page read and write
3634000
trusted library allocation
page read and write
E8D000
trusted library allocation
page execute and read and write
37ED000
trusted library allocation
page read and write
570B000
trusted library allocation
page read and write
9EE000
stack
page read and write
E0AF000
trusted library allocation
page read and write
772A000
heap
page read and write
E96000
trusted library allocation
page execute and read and write
5700000
trusted library allocation
page read and write
643E000
stack
page read and write
880000
heap
page read and write
9240000
trusted library allocation
page execute and read and write
36FB000
trusted library allocation
page read and write
51D8000
trusted library allocation
page read and write
5871000
trusted library allocation
page read and write
67E6000
heap
page read and write
6880000
trusted library allocation
page execute and read and write
34D0000
trusted library allocation
page read and write
678B000
heap
page read and write
37A1000
trusted library allocation
page read and write
4D44000
trusted library allocation
page read and write
6DDF000
stack
page read and write
7749000
heap
page read and write
5D55000
trusted library allocation
page read and write
5D1B000
trusted library allocation
page read and write
293E000
trusted library allocation
page read and write
76D0000
heap
page read and write
72BD000
stack
page read and write
5810000
trusted library allocation
page execute and read and write
5240000
heap
page read and write
EE7000
heap
page read and write
26B0000
heap
page read and write
5D0E000
stack
page read and write
38C1000
trusted library allocation
page read and write
35A5000
trusted library allocation
page read and write
9286000
heap
page read and write
67BC000
heap
page read and write
4E00000
heap
page read and write
283E000
stack
page read and write
571E000
trusted library allocation
page read and write
38FD000
trusted library allocation
page read and write
6768000
heap
page read and write
1337000
stack
page read and write
34DE000
trusted library allocation
page read and write
71BE000
stack
page read and write
3569000
trusted library allocation
page read and write
4165000
trusted library allocation
page read and write
E74000
trusted library allocation
page read and write
4E12000
trusted library allocation
page read and write
5726000
trusted library allocation
page read and write
3688000
trusted library allocation
page read and write
33DC000
trusted library allocation
page read and write
E0A0000
trusted library allocation
page read and write
37BA000
trusted library allocation
page read and write
34DA000
trusted library allocation
page read and write
E80000
trusted library allocation
page read and write
6F00000
trusted library allocation
page read and write
7310000
trusted library allocation
page read and write
E4E000
stack
page read and write
582A000
trusted library allocation
page read and write
51D0000
trusted library allocation
page read and write
15B6000
heap
page read and write
31CE000
stack
page read and write
6C9E000
stack
page read and write
5080000
heap
page read and write
B4D000
heap
page read and write
57D3000
heap
page read and write
65B0000
trusted library allocation
page execute and read and write
ED0000
trusted library allocation
page execute and read and write
8CE000
stack
page read and write
3765000
trusted library allocation
page read and write
E60000
trusted library allocation
page read and write
777C000
heap
page read and write
5860000
heap
page execute and read and write
683E000
heap
page read and write
11501000
trusted library allocation
page read and write
67F2000
heap
page read and write
735F000
trusted library allocation
page read and write
5D80000
trusted library allocation
page read and write
5360000
trusted library allocation
page read and write
505B000
stack
page read and write
740C000
heap
page read and write
5A4E000
stack
page read and write
A8A000
heap
page read and write
367D000
trusted library allocation
page read and write
4FA000
stack
page read and write
18C0000
trusted library allocation
page read and write
6B9E000
stack
page read and write
6550000
trusted library allocation
page read and write
5270000
heap
page read and write
35DF000
trusted library allocation
page read and write
6600000
trusted library allocation
page execute and read and write
EAB000
trusted library allocation
page execute and read and write
5D3E000
trusted library allocation
page read and write
3667000
trusted library allocation
page read and write
A97000
heap
page read and write
18D0000
heap
page read and write
37AD000
trusted library allocation
page read and write
7DFD000
stack
page read and write
1492000
trusted library allocation
page read and write
14A0000
trusted library allocation
page read and write
3660000
trusted library allocation
page read and write
3719000
trusted library allocation
page read and write
3547000
trusted library allocation
page read and write
355C000
trusted library allocation
page read and write
1460000
trusted library allocation
page read and write
5D32000
trusted library allocation
page read and write
44E8000
trusted library allocation
page read and write
There are 415 hidden memdumps, click here to show them.