IOC Report
real-al-d7ya.exe

loading gif

Files

File Path
Type
Category
Malicious
real-al-d7ya.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
initial sample
malicious
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_real-al-d7ya.exe_8b8a742f78c3b3ba9d6ab9dc3f0483b183cda5d_d4ab0173_169ec0d9-760f-417d-853f-91af202d7383\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\real-al-d7ya.exe.log
CSV text
dropped
malicious
C:\Users\user\AppData\Roaming\real-al-d7ya.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\ProgramData\Microsoft\Windows\WER\Temp\WER8C7E.tmp.dmp
Mini DuMP crash report, 16 streams, Sun Jul 14 17:24:45 2024, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER8F00.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER8F2F.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\Windows\appcompat\Programs\Amcache.hve
MS Windows registry file, NT/2000 or above
dropped

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\real-al-d7ya.exe
"C:\Users\user\Desktop\real-al-d7ya.exe"
malicious
C:\Windows\System32\schtasks.exe
"C:\Windows\System32\schtasks.exe" /create /f /RL HIGHEST /sc minute /mo 1 /tn "real-al-d7ya" /tr "C:\Users\user\AppData\Roaming\real-al-d7ya.exe"
malicious
C:\Users\user\AppData\Roaming\real-al-d7ya.exe
C:\Users\user\AppData\Roaming\real-al-d7ya.exe
malicious
C:\Users\user\AppData\Roaming\real-al-d7ya.exe
"C:\Users\user\AppData\Roaming\real-al-d7ya.exe"
malicious
C:\Users\user\AppData\Roaming\real-al-d7ya.exe
"C:\Users\user\AppData\Roaming\real-al-d7ya.exe"
malicious
C:\Users\user\AppData\Roaming\real-al-d7ya.exe
C:\Users\user\AppData\Roaming\real-al-d7ya.exe
malicious
C:\Users\user\AppData\Roaming\real-al-d7ya.exe
C:\Users\user\AppData\Roaming\real-al-d7ya.exe
malicious
C:\Users\user\AppData\Roaming\real-al-d7ya.exe
C:\Users\user\AppData\Roaming\real-al-d7ya.exe
malicious
C:\Windows\System32\schtasks.exe
"C:\Windows\System32\schtasks.exe" /create /f /RL HIGHEST /sc minute /mo 1 /tn "real-al-d7ya" /tr "C:\Users\user\AppData\Roaming\real-al-d7ya.exe"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\WerFault.exe
C:\Windows\system32\WerFault.exe -u -p 7280 -s 2008
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
There are 2 hidden processes, click here to show them.

URLs

Name
IP
Malicious
k-infectious.gl.at.ply.gg
malicious
http://upx.sf.net
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown

Domains

Name
IP
Malicious
k-infectious.gl.at.ply.gg
147.185.221.20
malicious

IPs

IP
Domain
Country
Malicious
147.185.221.20
k-infectious.gl.at.ply.gg
United States
malicious

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
real-al-d7ya
malicious
\REGISTRY\A\{02f8576b-b4f2-2357-e1eb-cc2b0e9b03b6}\Root\InventoryApplicationFile\real-al-d7ya.exe|83970697b5914a14
ProgramId
malicious
\REGISTRY\A\{02f8576b-b4f2-2357-e1eb-cc2b0e9b03b6}\Root\InventoryApplicationFile\real-al-d7ya.exe|83970697b5914a14
FileId
malicious
\REGISTRY\A\{02f8576b-b4f2-2357-e1eb-cc2b0e9b03b6}\Root\InventoryApplicationFile\real-al-d7ya.exe|83970697b5914a14
LowerCaseLongPath
malicious
\REGISTRY\A\{02f8576b-b4f2-2357-e1eb-cc2b0e9b03b6}\Root\InventoryApplicationFile\real-al-d7ya.exe|83970697b5914a14
LongPathHash
malicious
\REGISTRY\A\{02f8576b-b4f2-2357-e1eb-cc2b0e9b03b6}\Root\InventoryApplicationFile\real-al-d7ya.exe|83970697b5914a14
Name
malicious
\REGISTRY\A\{02f8576b-b4f2-2357-e1eb-cc2b0e9b03b6}\Root\InventoryApplicationFile\real-al-d7ya.exe|83970697b5914a14
OriginalFileName
malicious
\REGISTRY\A\{02f8576b-b4f2-2357-e1eb-cc2b0e9b03b6}\Root\InventoryApplicationFile\real-al-d7ya.exe|83970697b5914a14
Publisher
malicious
\REGISTRY\A\{02f8576b-b4f2-2357-e1eb-cc2b0e9b03b6}\Root\InventoryApplicationFile\real-al-d7ya.exe|83970697b5914a14
Version
malicious
\REGISTRY\A\{02f8576b-b4f2-2357-e1eb-cc2b0e9b03b6}\Root\InventoryApplicationFile\real-al-d7ya.exe|83970697b5914a14
BinFileVersion
malicious
\REGISTRY\A\{02f8576b-b4f2-2357-e1eb-cc2b0e9b03b6}\Root\InventoryApplicationFile\real-al-d7ya.exe|83970697b5914a14
BinaryType
malicious
\REGISTRY\A\{02f8576b-b4f2-2357-e1eb-cc2b0e9b03b6}\Root\InventoryApplicationFile\real-al-d7ya.exe|83970697b5914a14
ProductName
malicious
\REGISTRY\A\{02f8576b-b4f2-2357-e1eb-cc2b0e9b03b6}\Root\InventoryApplicationFile\real-al-d7ya.exe|83970697b5914a14
ProductVersion
malicious
\REGISTRY\A\{02f8576b-b4f2-2357-e1eb-cc2b0e9b03b6}\Root\InventoryApplicationFile\real-al-d7ya.exe|83970697b5914a14
LinkDate
malicious
\REGISTRY\A\{02f8576b-b4f2-2357-e1eb-cc2b0e9b03b6}\Root\InventoryApplicationFile\real-al-d7ya.exe|83970697b5914a14
BinProductVersion
malicious
\REGISTRY\A\{02f8576b-b4f2-2357-e1eb-cc2b0e9b03b6}\Root\InventoryApplicationFile\real-al-d7ya.exe|83970697b5914a14
AppxPackageFullName
malicious
\REGISTRY\A\{02f8576b-b4f2-2357-e1eb-cc2b0e9b03b6}\Root\InventoryApplicationFile\real-al-d7ya.exe|83970697b5914a14
AppxPackageRelativeId
malicious
\REGISTRY\A\{02f8576b-b4f2-2357-e1eb-cc2b0e9b03b6}\Root\InventoryApplicationFile\real-al-d7ya.exe|83970697b5914a14
Size
malicious
\REGISTRY\A\{02f8576b-b4f2-2357-e1eb-cc2b0e9b03b6}\Root\InventoryApplicationFile\real-al-d7ya.exe|83970697b5914a14
Language
malicious
\REGISTRY\A\{02f8576b-b4f2-2357-e1eb-cc2b0e9b03b6}\Root\InventoryApplicationFile\real-al-d7ya.exe|83970697b5914a14
Usn
malicious
There are 10 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
EC2000
unkown
page readonly
malicious
520000
heap
page read and write
D09000
heap
page read and write
5C6F679000
stack
page read and write
3287000
trusted library allocation
page read and write
C40000
heap
page read and write
1CB0C000
stack
page read and write
A66000
heap
page read and write
C6F000
stack
page read and write
1CC4E000
stack
page read and write
ABB000
heap
page read and write
1206000
heap
page read and write
12968000
trusted library allocation
page read and write
1AFB0000
heap
page execute and read and write
7FFD9B830000
trusted library allocation
page read and write
820000
heap
page read and write
7FFD9B993000
trusted library allocation
page execute and read and write
7FFD9B856000
trusted library allocation
page execute and read and write
7FFD9B764000
trusted library allocation
page read and write
1B1DF000
stack
page read and write
2078A7F000
stack
page read and write
1AD1D000
stack
page read and write
1BA36E30000
heap
page read and write
C75000
heap
page read and write
1C3F4000
stack
page read and write
3230000
heap
page read and write
12FF3000
trusted library allocation
page read and write
2701000
trusted library allocation
page read and write
D11000
heap
page read and write
2D81000
trusted library allocation
page read and write
C43000
heap
page read and write
26EF000
stack
page read and write
2078769000
stack
page read and write
D48000
heap
page read and write
120C000
heap
page read and write
A2F000
heap
page read and write
55A000
heap
page read and write
1BD14000
stack
page read and write
1BA36E38000
heap
page read and write
7FFD9B782000
trusted library allocation
page read and write
A60000
heap
page read and write
AA6000
heap
page read and write
7FFD9BA4C000
trusted library allocation
page execute and read and write
126F1000
trusted library allocation
page read and write
D1C000
heap
page read and write
7FFD9B890000
trusted library allocation
page execute and read and write
7FFD9B99D000
trusted library allocation
page execute and read and write
1320000
trusted library allocation
page read and write
5D8000
heap
page read and write
7FFD9B794000
trusted library allocation
page read and write
7FFD9B910000
trusted library allocation
page read and write
7FFD9B78D000
trusted library allocation
page execute and read and write
7FFD9B910000
trusted library allocation
page read and write
231F000
stack
page read and write
7FFD9B773000
trusted library allocation
page execute and read and write
12961000
trusted library allocation
page read and write
810000
heap
page read and write
7FFD9B7CC000
trusted library allocation
page execute and read and write
885000
heap
page read and write
1B250000
heap
page execute and read and write
988000
heap
page read and write
7FFD9B9EC000
trusted library allocation
page execute and read and write
7FFD9BB40000
trusted library allocation
page execute and read and write
7FFD9BA46000
trusted library allocation
page read and write
9BA000
heap
page read and write
15C0000
heap
page execute and read and write
14599D90000
heap
page read and write
1241000
heap
page read and write
A08000
heap
page read and write
8F0000
heap
page read and write
122D000
heap
page read and write
126F3000
trusted library allocation
page read and write
126B000
heap
page read and write
7FFD9B810000
trusted library allocation
page read and write
FA0000
heap
page read and write
1180000
heap
page read and write
7FFD9B9A2000
trusted library allocation
page read and write
1BFFE000
stack
page read and write
1C063000
heap
page read and write
960000
heap
page read and write
A89000
heap
page read and write
32C9000
trusted library allocation
page read and write
C00000
trusted library allocation
page read and write
B66000
heap
page read and write
9E0000
heap
page read and write
7FFD9B78D000
trusted library allocation
page execute and read and write
FF0000
trusted library allocation
page read and write
914000
stack
page read and write
9B0000
heap
page read and write
1935000
heap
page read and write
1C33E000
stack
page read and write
920000
heap
page read and write
7FFD9B78D000
trusted library allocation
page execute and read and write
1B50F000
stack
page read and write
27DC000
trusted library allocation
page read and write
127D1000
trusted library allocation
page read and write
26FC000
trusted library allocation
page read and write
7FFD9B990000
trusted library allocation
page read and write
980000
heap
page read and write
11F0000
trusted library allocation
page read and write
2321000
trusted library allocation
page read and write
16C0000
heap
page execute and read and write
7FFD9BB30000
trusted library allocation
page read and write
1C830000
heap
page read and write
1C53A000
stack
page read and write
9E5000
heap
page read and write
7FFD9B8A0000
trusted library allocation
page execute and read and write
7FFD9B77D000
trusted library allocation
page execute and read and write
EC0000
unkown
page readonly
F15000
heap
page read and write
2FEF000
stack
page read and write
2791000
trusted library allocation
page read and write
1ACEE000
stack
page read and write
26F1000
trusted library allocation
page read and write
1310000
trusted library allocation
page read and write
7FFD9B792000
trusted library allocation
page read and write
7FFD9B900000
trusted library allocation
page read and write
A68000
heap
page read and write
BB0000
heap
page read and write
3289000
trusted library allocation
page read and write
A00000
heap
page read and write
138F000
heap
page read and write
1BF5C000
stack
page read and write
1BCFF000
stack
page read and write
1C63B000
stack
page read and write
7FFD9B77D000
trusted library allocation
page execute and read and write
2FFC000
trusted library allocation
page read and write
27CE000
stack
page read and write
13BE000
heap
page read and write
25D0000
heap
page execute and read and write
1130000
heap
page read and write
1930000
heap
page read and write
A90000
trusted library allocation
page read and write
1ADB0000
heap
page read and write
7FFD9B920000
trusted library allocation
page read and write
7FFD9B772000
trusted library allocation
page read and write
321F000
stack
page read and write
9C0000
heap
page read and write
7FFD9BA76000
trusted library allocation
page execute and read and write
7FFD9B780000
trusted library allocation
page read and write
4F4000
stack
page read and write
1423000
heap
page read and write
100F000
stack
page read and write
D99000
heap
page read and write
1510000
heap
page read and write
ABD000
heap
page read and write
55C000
heap
page read and write
D1A000
heap
page read and write
1BBFE000
stack
page read and write
7FFD9B790000
trusted library allocation
page read and write
910000
heap
page read and write
BE0000
trusted library allocation
page read and write
27EB000
trusted library allocation
page read and write
1AEBE000
stack
page read and write
1BA36D60000
heap
page read and write
7FFD9B880000
trusted library allocation
page execute and read and write
9E7000
heap
page read and write
17EC000
stack
page read and write
1BAF3000
heap
page read and write
7FFD9B856000
trusted library allocation
page execute and read and write
545000
heap
page read and write
7FFD9B9BD000
trusted library allocation
page execute and read and write
1B270000
trusted library allocation
page read and write
1C2F9000
stack
page read and write
1B5EE000
stack
page read and write
A80000
heap
page read and write
7FFD9B774000
trusted library allocation
page read and write
1B4EE000
stack
page read and write
1050000
trusted library allocation
page read and write
1640000
heap
page read and write
1BBBE000
stack
page read and write
13241000
trusted library allocation
page read and write
12791000
trusted library allocation
page read and write
1B1BE000
stack
page read and write
7FFD9B900000
trusted library allocation
page read and write
586000
heap
page read and write
137B000
heap
page read and write
C23000
trusted library allocation
page read and write
528000
heap
page read and write
AA0000
heap
page read and write
A25000
heap
page read and write
1AD6D000
stack
page read and write
12FF1000
trusted library allocation
page read and write
B80000
heap
page read and write
1B3EE000
stack
page read and write
1BA36D90000
heap
page read and write
2971000
trusted library allocation
page read and write
10F4000
stack
page read and write
14D5000
heap
page read and write
1356000
heap
page read and write
3241000
trusted library allocation
page read and write
7FFD9B910000
trusted library allocation
page read and write
7FFD9B770000
trusted library allocation
page read and write
5A4000
stack
page read and write
12323000
trusted library allocation
page read and write
7FFD9B7BC000
trusted library allocation
page execute and read and write
C45000
heap
page read and write
9A8000
heap
page read and write
1645000
heap
page read and write
25D0000
heap
page execute and read and write
1BDFE000
stack
page read and write
1350000
heap
page read and write
F10000
heap
page read and write
7FFD9B820000
trusted library allocation
page read and write
58B000
heap
page read and write
1B890000
heap
page read and write
DA0000
unkown
page readonly
1BABF000
stack
page read and write
1CD4A000
stack
page read and write
1085000
heap
page read and write
7FFD9B7BC000
trusted library allocation
page execute and read and write
7FFD9B7A0000
trusted library allocation
page read and write
7FFD9B7DC000
trusted library allocation
page execute and read and write
2780000
heap
page read and write
7FF42B540000
trusted library allocation
page execute and read and write
1BA371D0000
heap
page read and write
1BCBE000
stack
page read and write
F80000
heap
page read and write
7FFD9B840000
trusted library allocation
page execute and read and write
12328000
trusted library allocation
page read and write
7FFD9B774000
trusted library allocation
page read and write
13C6000
heap
page read and write
12FF8000
trusted library allocation
page read and write
ABB000
heap
page read and write
A43000
heap
page read and write
F60000
heap
page read and write
1412000
heap
page read and write
1392000
heap
page read and write
271E000
stack
page read and write
7FFD9B820000
trusted library allocation
page read and write
CBE000
stack
page read and write
7FFD9B780000
trusted library allocation
page read and write
12321000
trusted library allocation
page read and write
F00000
heap
page read and write
7FFD9B780000
trusted library allocation
page read and write
126D000
heap
page read and write
9B0000
trusted library allocation
page read and write
20F0000
heap
page read and write
295E000
stack
page read and write
7FFD9B82C000
trusted library allocation
page execute and read and write
8D0000
heap
page read and write
27DF000
trusted library allocation
page read and write
1C05E000
heap
page read and write
7FFD9B784000
trusted library allocation
page read and write
2331000
trusted library allocation
page read and write
7FFD9B77D000
trusted library allocation
page execute and read and write
1AB1A000
heap
page read and write
7FFD9B782000
trusted library allocation
page read and write
7FF498380000
trusted library allocation
page execute and read and write
BB5000
heap
page read and write
7FFD9B782000
trusted library allocation
page read and write
1070000
heap
page read and write
1BAF0000
heap
page read and write
14599DE0000
heap
page read and write
7FFD9B780000
trusted library allocation
page read and write
12C1000
heap
page read and write
9BC000
heap
page read and write
7EF000
stack
page read and write
BFE000
stack
page read and write
1B2FE000
stack
page read and write
1B1F0000
heap
page read and write
7FFD9B9B0000
trusted library allocation
page read and write
27E6000
trusted library allocation
page read and write
1B1EE000
stack
page read and write
A40000
heap
page read and write
1B300000
heap
page read and write
1C63C000
stack
page read and write
1B2EE000
stack
page read and write
AE7000
heap
page read and write
1BBBE000
stack
page read and write
14599FE0000
heap
page read and write
1530000
heap
page execute and read and write
12963000
trusted library allocation
page read and write
C40000
heap
page read and write
D07000
heap
page read and write
7FFD9B866000
trusted library allocation
page execute and read and write
A9B000
heap
page read and write
CE8000
heap
page read and write
1BA36D70000
heap
page read and write
16E5000
heap
page read and write
7FFD9B9AD000
trusted library allocation
page execute and read and write
27D1000
trusted library allocation
page read and write
14599DB0000
heap
page read and write
1B3FE000
stack
page read and write
2850000
heap
page execute and read and write
7FFD9B880000
trusted library allocation
page execute and read and write
25E0000
heap
page read and write
7FFD9B770000
trusted library allocation
page read and write
127D3000
trusted library allocation
page read and write
1080000
heap
page read and write
7FFD9BAB0000
trusted library allocation
page execute and read and write
1383000
heap
page read and write
7FFD9B9A0000
trusted library allocation
page read and write
27E2000
trusted library allocation
page read and write
7FFD9B830000
trusted library allocation
page execute and read and write
2210000
heap
page execute and read and write
7FFD9B77D000
trusted library allocation
page execute and read and write
1B2DE000
stack
page read and write
7FFD9B890000
trusted library allocation
page execute and read and write
296C000
trusted library allocation
page read and write
1AC7D000
stack
page read and write
12D1000
heap
page read and write
1C000000
heap
page read and write
34FF000
trusted library allocation
page read and write
155F000
unkown
page read and write
1BA10000
heap
page read and write
1330000
heap
page execute and read and write
D4E000
stack
page read and write
7FFD9B790000
trusted library allocation
page read and write
1B8C4000
heap
page read and write
1B0D0000
heap
page read and write
1270000
heap
page read and write
1200000
heap
page read and write
1B6BC000
stack
page read and write
1A7C0000
trusted library allocation
page read and write
7FFD9B784000
trusted library allocation
page read and write
7FFD9B7CC000
trusted library allocation
page execute and read and write
9B0000
heap
page read and write
A3C000
heap
page read and write
1B9BF000
stack
page read and write
DA5000
heap
page read and write
1AEED000
stack
page read and write
54F000
heap
page read and write
14CF000
stack
page read and write
1BB7A000
stack
page read and write
14599DE8000
heap
page read and write
5C6F77F000
stack
page read and write
C70000
heap
page read and write
1B9BE000
stack
page read and write
232C000
trusted library allocation
page read and write
1B8ED000
heap
page read and write
1160000
heap
page read and write
2580000
heap
page execute and read and write
5C6F6FF000
unkown
page read and write
1C077000
heap
page read and write
1B8E0000
heap
page read and write
12798000
trusted library allocation
page read and write
7FFD9B77D000
trusted library allocation
page execute and read and write
7FFD9B770000
trusted library allocation
page read and write
135C000
heap
page read and write
1B40F000
stack
page read and write
B65000
heap
page read and write
1C080000
heap
page read and write
D6F000
stack
page read and write
20787EE000
unkown
page read and write
1B0E0000
heap
page execute and read and write
C20000
trusted library allocation
page read and write
7FFD9B820000
trusted library allocation
page execute and read and write
7FFD9B846000
trusted library allocation
page execute and read and write
7FFD9B846000
trusted library allocation
page execute and read and write
5D4000
stack
page read and write
A40000
heap
page read and write
232F000
trusted library allocation
page read and write
990000
trusted library allocation
page read and write
7FFD9B774000
trusted library allocation
page read and write
7FFD9B79D000
trusted library allocation
page execute and read and write
1B60E000
stack
page read and write
EE0000
heap
page read and write
F05000
heap
page read and write
1B0BF000
stack
page read and write
ECC000
unkown
page readonly
D1E000
heap
page read and write
CE0000
heap
page read and write
30E7000
heap
page read and write
900000
heap
page read and write
A3A000
heap
page read and write
7FFD9B772000
trusted library allocation
page read and write
8D5000
heap
page read and write
7FFD9B784000
trusted library allocation
page read and write
7FFD9B76D000
trusted library allocation
page execute and read and write
1C900000
heap
page read and write
EDF000
stack
page read and write
14599CB0000
heap
page read and write
7FFD9B774000
trusted library allocation
page read and write
27E9000
trusted library allocation
page read and write
7FFD9B994000
trusted library allocation
page read and write
14599FE5000
heap
page read and write
940000
heap
page read and write
5E8000
heap
page read and write
7FFD9B7CC000
trusted library allocation
page execute and read and write
7FFD9B920000
trusted library allocation
page execute and read and write
2EEE000
stack
page read and write
1B8E3000
heap
page read and write
7FFD9BA40000
trusted library allocation
page read and write
126F8000
trusted library allocation
page read and write
1A8AD000
stack
page read and write
C10000
heap
page execute and read and write
18EF000
stack
page read and write
5F0000
heap
page read and write
26C0000
heap
page read and write
F50000
heap
page read and write
D97000
heap
page read and write
1B902000
heap
page read and write
7FFD9B78D000
trusted library allocation
page execute and read and write
1B1AE000
stack
page read and write
7FFD9B830000
trusted library allocation
page execute and read and write
7FFD9B826000
trusted library allocation
page read and write
1B1D0000
heap
page execute and read and write
965000
heap
page read and write
D21000
heap
page read and write
1140000
heap
page read and write
9A5000
heap
page read and write
27E1000
trusted library allocation
page read and write
7FFD9B790000
trusted library allocation
page read and write
2A2F000
trusted library allocation
page read and write
11D0000
trusted library allocation
page read and write
2961000
trusted library allocation
page read and write
7FFD9B79D000
trusted library allocation
page execute and read and write
16E0000
heap
page read and write
AAD000
heap
page read and write
1BA371D5000
heap
page read and write
547000
heap
page read and write
1323000
trusted library allocation
page read and write
7FFD9BA50000
trusted library allocation
page execute and read and write
1CE4C000
stack
page read and write
21FE000
stack
page read and write
860000
trusted library allocation
page read and write
12F4000
stack
page read and write
1B0BE000
stack
page read and write
970000
trusted library allocation
page read and write
B60000
heap
page read and write
26FF000
trusted library allocation
page read and write
1235000
heap
page read and write
7FFD9B794000
trusted library allocation
page read and write
588000
heap
page read and write
960000
heap
page read and write
880000
heap
page read and write
D9C000
heap
page read and write
8D0000
heap
page read and write
123F000
heap
page read and write
127D8000
trusted library allocation
page read and write
1030000
trusted library allocation
page read and write
7FFD9B890000
trusted library allocation
page execute and read and write
296F000
trusted library allocation
page read and write
13BC000
heap
page read and write
7FFD9B76D000
trusted library allocation
page execute and read and write
14D0000
heap
page read and write
1F0000
heap
page read and write
5DC000
heap
page read and write
964000
stack
page read and write
13248000
trusted library allocation
page read and write
890000
trusted library allocation
page read and write
7F0000
heap
page read and write
500000
heap
page read and write
1610000
heap
page read and write
1C130000
heap
page read and write
7FFD9B856000
trusted library allocation
page execute and read and write
2FF1000
trusted library allocation
page read and write
1B57D000
stack
page read and write
There are 439 hidden memdumps, click here to show them.