IOC Report
LisectAVT_2403002A_460.exe

loading gif

Files

File Path
Type
Category
Malicious
LisectAVT_2403002A_460.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Local\Dalymore\Laddonia.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Laddonia.vbs
data
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\My App.exe.log
ASCII text, with CRLF line terminators
modified
C:\Users\user\AppData\Local\Temp\aut1BC1.tmp
data
dropped
C:\Users\user\AppData\Local\Temp\aut1C00.tmp
data
dropped
C:\Users\user\AppData\Local\Temp\aut70BD.tmp
data
dropped
C:\Users\user\AppData\Local\Temp\aut713B.tmp
data
dropped
C:\Users\user\AppData\Local\Temp\autE716.tmp
data
dropped
C:\Users\user\AppData\Local\Temp\autE755.tmp
data
dropped
C:\Users\user\AppData\Local\Temp\kinematical
data
dropped
C:\Users\user\AppData\Local\Temp\uppishly
ASCII text, with very long lines (29718), with no line terminators
dropped
C:\Users\user\AppData\Roaming\My App\My App.exe
PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
modified
\Device\ConDrv
ASCII text, with CRLF line terminators
dropped
There are 4 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\LisectAVT_2403002A_460.exe
"C:\Users\user\Desktop\LisectAVT_2403002A_460.exe"
malicious
C:\Users\user\AppData\Local\Dalymore\Laddonia.exe
"C:\Users\user\Desktop\LisectAVT_2403002A_460.exe"
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
"C:\Users\user\Desktop\LisectAVT_2403002A_460.exe"
malicious
C:\Users\user\AppData\Roaming\My App\My App.exe
"C:\Users\user\AppData\Roaming\My App\My App.exe"
malicious
C:\Users\user\AppData\Roaming\My App\My App.exe
"C:\Users\user\AppData\Roaming\My App\My App.exe"
malicious
C:\Windows\System32\wscript.exe
"C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Laddonia.vbs"
malicious
C:\Users\user\AppData\Local\Dalymore\Laddonia.exe
"C:\Users\user\AppData\Local\Dalymore\Laddonia.exe"
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
"C:\Users\user\AppData\Local\Dalymore\Laddonia.exe"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1

URLs

Name
IP
Malicious
https://api.ipify.org/
104.26.13.205
https://api.ipify.org
unknown
https://sectigo.com/CPS0
unknown
http://mail.agrosparta.gr
unknown
https://account.dyn.com/
unknown
https://api.ipify.org/t
unknown
http://agrosparta.gr
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown

Domains

Name
IP
Malicious
agrosparta.gr
78.46.216.122
malicious
mail.agrosparta.gr
unknown
malicious
api.ipify.org
104.26.13.205

IPs

IP
Domain
Country
Malicious
78.46.216.122
agrosparta.gr
Germany
malicious
104.26.13.205
api.ipify.org
United States

Registry

Path
Value
Malicious
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASAPI32
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASAPI32
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASAPI32
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASAPI32
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASAPI32
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASAPI32
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASAPI32
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASMANCS
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASMANCS
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASMANCS
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASMANCS
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASMANCS
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASMANCS
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASMANCS
FileDirectory
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
My App
There are 6 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
30F3000
trusted library allocation
page read and write
malicious
35D0000
direct allocation
page read and write
malicious
3B2000
system
page execute and read and write
malicious
1190000
direct allocation
page read and write
malicious
30B1000
trusted library allocation
page read and write
malicious
271C000
trusted library allocation
page read and write
malicious
26F1000
trusted library allocation
page read and write
malicious
12AC000
heap
page read and write
196D000
stack
page read and write
112F000
heap
page read and write
77D000
trusted library allocation
page execute and read and write
700000
unkown
page readonly
1413000
heap
page read and write
261E000
trusted library allocation
page read and write
3C80000
direct allocation
page read and write
3610000
direct allocation
page read and write
10F9000
stack
page read and write
3061000
trusted library allocation
page read and write
800000
heap
page read and write
3D71000
direct allocation
page read and write
3E1E000
direct allocation
page read and write
112E000
heap
page read and write
4BCF000
stack
page read and write
36A4000
heap
page read and write
3AE0000
direct allocation
page read and write
1428000
heap
page read and write
3C80000
direct allocation
page read and write
13DB000
stack
page read and write
14EE000
heap
page read and write
3050000
heap
page execute and read and write
6A50000
trusted library allocation
page read and write
3BCD000
direct allocation
page read and write
3C3E000
direct allocation
page read and write
12C0000
trusted library allocation
page read and write
13FF000
stack
page read and write
12D3000
trusted library allocation
page execute and read and write
3AE0000
direct allocation
page read and write
306C000
trusted library allocation
page read and write
860000
heap
page read and write
DF0000
heap
page read and write
121D000
heap
page read and write
4061000
trusted library allocation
page read and write
92B000
trusted library allocation
page execute and read and write
2919BFE000
stack
page read and write
123B000
heap
page read and write
BC2000
unkown
page readonly
D90000
heap
page read and write
2600000
trusted library allocation
page read and write
7C2000
unkown
page readonly
4D73000
heap
page read and write
7CA000
heap
page read and write
800000
heap
page read and write
FBF000
stack
page read and write
12DD000
trusted library allocation
page execute and read and write
2621000
trusted library allocation
page read and write
4F1F000
stack
page read and write
14EF000
stack
page read and write
3311000
trusted library allocation
page read and write
8F3000
trusted library allocation
page execute and read and write
784000
trusted library allocation
page read and write
10CC000
heap
page read and write
3A23000
direct allocation
page read and write
3D7E000
direct allocation
page read and write
657F000
heap
page read and write
6B50000
trusted library allocation
page read and write
12F0000
heap
page read and write
27A0000
heap
page execute and read and write
7CC000
unkown
page read and write
A6E000
stack
page read and write
6B47000
trusted library allocation
page read and write
FDB000
stack
page read and write
1226000
heap
page read and write
4CDE000
stack
page read and write
14EF000
heap
page read and write
740000
heap
page read and write
24AC000
stack
page read and write
303D000
trusted library allocation
page read and write
4D6D000
trusted library allocation
page read and write
14FA000
trusted library allocation
page execute and read and write
BCC000
unkown
page write copy
3BC9000
direct allocation
page read and write
291A2FE000
stack
page read and write
3016000
trusted library allocation
page read and write
990000
heap
page read and write
24E0000
trusted library allocation
page read and write
240B000
trusted library allocation
page execute and read and write
5320000
trusted library allocation
page read and write
61D0000
trusted library allocation
page read and write
4D60000
trusted library allocation
page read and write
517E000
direct allocation
page read and write
4C0E000
stack
page read and write
13EF000
stack
page read and write
14AA000
heap
page read and write
5620000
heap
page read and write
7CC000
unkown
page read and write
129E000
heap
page read and write
12ED000
trusted library allocation
page execute and read and write
1F30000
heap
page read and write
3AE0000
direct allocation
page read and write
2405000
trusted library allocation
page execute and read and write
3BC9000
direct allocation
page read and write
BCC000
unkown
page read and write
14F0000
heap
page read and write
3AE0000
direct allocation
page read and write
7D0000
unkown
page write copy
15C0000
trusted library allocation
page read and write
60F0000
trusted library allocation
page read and write
7F0000
trusted library allocation
page execute and read and write
1092000
heap
page read and write
1280000
heap
page read and write
3C80000
direct allocation
page read and write
5BC7000
trusted library allocation
page read and write
929000
stack
page read and write
68E000
stack
page read and write
103E000
stack
page read and write
1D6E000
stack
page read and write
192F000
stack
page read and write
580000
trusted library allocation
page read and write
7D8000
heap
page read and write
810000
heap
page read and write
780000
trusted library allocation
page read and write
3C3E000
direct allocation
page read and write
4CFE000
stack
page read and write
7A0000
heap
page read and write
700000
unkown
page readonly
4A4E000
stack
page read and write
19CF000
stack
page read and write
850000
heap
page execute and read and write
155F000
heap
page read and write
AD0000
heap
page read and write
12D2000
heap
page read and write
FCE000
stack
page read and write
DC0000
direct allocation
page execute and read and write
3A23000
direct allocation
page read and write
505F000
stack
page read and write
3FA000
unkown
page readonly
ABE000
stack
page read and write
113E000
stack
page read and write
3C3E000
direct allocation
page read and write
14F0000
trusted library allocation
page read and write
291A1FD000
stack
page read and write
656D000
heap
page read and write
3900000
direct allocation
page read and write
1203000
heap
page read and write
977E000
direct allocation
page read and write
109A000
heap
page read and write
5AF2000
heap
page read and write
730000
heap
page read and write
36FE000
trusted library allocation
page read and write
3900000
direct allocation
page read and write
1DEA1736000
heap
page read and write
C2F000
stack
page read and write
3AA0000
direct allocation
page read and write
3AE0000
direct allocation
page read and write
250E000
stack
page read and write
668D000
stack
page read and write
6F40000
heap
page read and write
3DAD000
direct allocation
page read and write
B00000
unkown
page readonly
701000
unkown
page execute read
1068000
heap
page read and write
AB7E000
direct allocation
page read and write
1286000
heap
page read and write
2626000
trusted library allocation
page read and write
1505000
trusted library allocation
page execute and read and write
26A1000
trusted library allocation
page read and write
4A80000
heap
page execute and read and write
1366000
heap
page read and write
1420000
heap
page read and write
FCF000
stack
page read and write
7A8000
heap
page read and write
5609000
trusted library allocation
page read and write
150B000
trusted library allocation
page execute and read and write
900000
trusted library allocation
page read and write
262D000
trusted library allocation
page read and write
68C000
stack
page read and write
1470000
heap
page read and write
14ED000
heap
page read and write
1286000
heap
page read and write
3900000
direct allocation
page read and write
640C000
stack
page read and write
2919AFA000
stack
page read and write
1500000
trusted library allocation
page read and write
3AE0000
direct allocation
page read and write
3B0000
system
page execute and read and write
36C9000
trusted library allocation
page read and write
30A1000
trusted library allocation
page read and write
1302000
heap
page read and write
7D4000
unkown
page readonly
3C03000
direct allocation
page read and write
24C0000
trusted library allocation
page read and write
13D0000
heap
page read and write
7C2000
unkown
page readonly
2402000
trusted library allocation
page read and write
1DEA189E000
heap
page read and write
10AE000
heap
page read and write
55A0000
heap
page execute and read and write
523D000
stack
page read and write
3C80000
direct allocation
page read and write
D0F000
stack
page read and write
16EE000
stack
page read and write
2400000
trusted library allocation
page read and write
527E000
stack
page read and write
7BE000
heap
page read and write
3DAD000
direct allocation
page read and write
948000
heap
page read and write
1523000
heap
page read and write
14AA000
heap
page read and write
16C6000
heap
page read and write
3C80000
direct allocation
page read and write
694000
heap
page read and write
1126000
heap
page read and write
14D9000
heap
page read and write
15B6000
trusted library allocation
page read and write
1DEA1890000
heap
page read and write
AA0000
heap
page read and write
50FE000
stack
page read and write
2640000
trusted library allocation
page read and write
120E000
heap
page read and write
52BD000
stack
page read and write
9D0000
heap
page read and write
4FBD000
stack
page read and write
121E000
heap
page read and write
5B77000
heap
page read and write
59DB000
stack
page read and write
61E0000
trusted library allocation
page read and write
35B4000
heap
page read and write
23D4000
trusted library allocation
page read and write
1502000
trusted library allocation
page read and write
3AA0000
direct allocation
page read and write
B27000
heap
page read and write
15AE000
stack
page read and write
8E0000
trusted library allocation
page read and write
67E0000
heap
page read and write
1540000
trusted library allocation
page read and write
1328000
heap
page read and write
2740000
trusted library allocation
page read and write
1126000
heap
page read and write
120B000
heap
page read and write
9A0000
heap
page read and write
9F0000
direct allocation
page execute and read and write
4D49000
trusted library allocation
page read and write
2718000
trusted library allocation
page read and write
7F0000
heap
page read and write
9B9000
heap
page read and write
3DA9000
direct allocation
page read and write
1140000
heap
page read and write
79E000
stack
page read and write
11D0000
heap
page read and write
148E000
heap
page read and write
1560000
heap
page read and write
14A8000
heap
page read and write
3C03000
direct allocation
page read and write
79C000
unkown
page readonly
14EE000
heap
page read and write
309F000
trusted library allocation
page read and write
3036000
trusted library allocation
page read and write
79C000
unkown
page readonly
690000
heap
page read and write
5F5E000
stack
page read and write
1202000
heap
page read and write
A60000
heap
page read and write
1550000
trusted library allocation
page read and write
23E0000
trusted library allocation
page read and write
1DEA1789000
heap
page read and write
701000
unkown
page execute read
5BB7000
trusted library allocation
page read and write
26D6000
trusted library allocation
page read and write
43C000
system
page execute and read and write
DB4000
heap
page read and write
3C70000
direct allocation
page read and write
6A55000
trusted library allocation
page read and write
12D4000
trusted library allocation
page read and write
3F0000
unkown
page readonly
11A5000
heap
page read and write
40BF000
trusted library allocation
page read and write
A29000
stack
page read and write
15E0000
heap
page read and write
12D2000
heap
page read and write
700000
unkown
page readonly
1DEA1840000
heap
page read and write
7FC50000
trusted library allocation
page execute and read and write
3900000
direct allocation
page read and write
B01000
unkown
page execute read
8F4000
trusted library allocation
page read and write
904000
trusted library allocation
page read and write
302A000
trusted library allocation
page read and write
1331000
heap
page read and write
12B3000
heap
page read and write
B9C000
unkown
page readonly
3C03000
direct allocation
page read and write
1F0000
heap
page read and write
23ED000
trusted library allocation
page execute and read and write
5630000
heap
page read and write
3BC9000
direct allocation
page read and write
16BC000
heap
page read and write
4CBC000
stack
page read and write
3C3E000
direct allocation
page read and write
5068000
trusted library allocation
page read and write
15BD000
heap
page read and write
2724000
trusted library allocation
page read and write
3DA9000
direct allocation
page read and write
3C03000
direct allocation
page read and write
5B65000
heap
page read and write
1EE000
stack
page read and write
595000
heap
page read and write
131A000
heap
page read and write
5310000
trusted library allocation
page execute and read and write
BD4000
unkown
page readonly
797E000
direct allocation
page read and write
3BCD000
direct allocation
page read and write
84E000
stack
page read and write
670000
heap
page read and write
12BE000
heap
page read and write
85E000
stack
page read and write
13DB000
heap
page read and write
13E6000
heap
page read and write
8FD000
trusted library allocation
page execute and read and write
3BC9000
direct allocation
page read and write
52FE000
stack
page read and write
FDB000
stack
page read and write
3AA0000
direct allocation
page read and write
DB0000
heap
page read and write
112E000
heap
page read and write
12F8000
heap
page read and write
8D7E000
direct allocation
page read and write
3C03000
direct allocation
page read and write
260B000
trusted library allocation
page read and write
270C000
stack
page read and write
4089000
trusted library allocation
page read and write
7C2000
unkown
page readonly
3C80000
direct allocation
page read and write
4D30000
heap
page execute and read and write
4D10000
heap
page execute and read and write
260E000
trusted library allocation
page read and write
678E000
stack
page read and write
7D4000
unkown
page readonly
3A23000
direct allocation
page read and write
5B7E000
direct allocation
page read and write
3DAD000
direct allocation
page read and write
129E000
heap
page read and write
2407000
trusted library allocation
page execute and read and write
5DA000
stack
page read and write
86B000
heap
page read and write
5BAE000
stack
page read and write
15B4000
trusted library allocation
page read and write
23F6000
trusted library allocation
page execute and read and write
33DF000
stack
page read and write
5ADC000
stack
page read and write
3A23000
direct allocation
page read and write
773000
trusted library allocation
page execute and read and write
60A0000
trusted library allocation
page execute and read and write
48AD000
stack
page read and write
4D40000
trusted library allocation
page read and write
12D0000
trusted library allocation
page read and write
13B4000
heap
page read and write
1530000
trusted library allocation
page execute and read and write
3E1E000
direct allocation
page read and write
1507000
trusted library allocation
page execute and read and write
1296000
heap
page read and write
95F000
heap
page read and write
23F0000
trusted library allocation
page read and write
1A0000
heap
page read and write
129E000
heap
page read and write
136D000
heap
page read and write
5BC0000
trusted library allocation
page read and write
6F7E000
direct allocation
page read and write
3BC9000
direct allocation
page read and write
112E000
heap
page read and write
300E000
stack
page read and write
130E000
heap
page read and write
1143000
heap
page read and write
1DEA16D0000
heap
page read and write
690E000
stack
page read and write
1504000
heap
page read and write
B00000
unkown
page readonly
4D0E000
stack
page read and write
129F000
heap
page read and write
10E7000
heap
page read and write
11A0000
heap
page read and write
5AE0000
heap
page read and write
3BCD000
direct allocation
page read and write
56E000
stack
page read and write
964000
heap
page read and write
2420000
trusted library allocation
page read and write
3BCD000
direct allocation
page read and write
A17E000
direct allocation
page read and write
172C000
stack
page read and write
6550000
heap
page read and write
7C2000
unkown
page readonly
8BE000
stack
page read and write
3CB0000
direct allocation
page read and write
2732000
trusted library allocation
page read and write
BD0000
unkown
page write copy
2919EFE000
stack
page read and write
55EE000
stack
page read and write
3DA9000
direct allocation
page read and write
14C9000
heap
page read and write
13CD000
heap
page read and write
875000
heap
page read and write
11D8000
heap
page read and write
1F20000
direct allocation
page execute and read and write
14EF000
heap
page read and write
7D5000
heap
page read and write
6A0E000
stack
page read and write
C0F000
stack
page read and write
16F7000
heap
page read and write
3900000
direct allocation
page read and write
B10000
trusted library allocation
page read and write
5BB5000
trusted library allocation
page read and write
131D000
heap
page read and write
55F0000
heap
page read and write
26CE000
stack
page read and write
6580000
trusted library allocation
page execute and read and write
2919FFF000
stack
page read and write
1060000
heap
page read and write
44EE000
stack
page read and write
3E1E000
direct allocation
page read and write
1257000
heap
page read and write
6530000
heap
page read and write
118E000
stack
page read and write
4F7E000
stack
page read and write
14F6000
trusted library allocation
page execute and read and write
AF0000
heap
page read and write
774000
trusted library allocation
page read and write
3900000
direct allocation
page read and write
3AA0000
direct allocation
page read and write
B01000
unkown
page execute read
16D9000
heap
page read and write
1454000
heap
page read and write
5BD0000
trusted library allocation
page execute and read and write
14EF000
heap
page read and write
125C000
heap
page read and write
48E0000
trusted library allocation
page execute and read and write
14D9000
heap
page read and write
837E000
direct allocation
page read and write
96F000
stack
page read and write
1DEA1706000
heap
page read and write
630E000
stack
page read and write
14EE000
heap
page read and write
291A4FF000
stack
page read and write
301B000
trusted library allocation
page read and write
12E0000
trusted library allocation
page read and write
68CE000
stack
page read and write
24D0000
trusted library allocation
page read and write
129D000
heap
page read and write
3DA9000
direct allocation
page read and write
79C000
unkown
page readonly
1694000
heap
page read and write
1162000
heap
page read and write
FFF000
stack
page read and write
831000
heap
page read and write
927000
trusted library allocation
page execute and read and write
5A6F000
stack
page read and write
15B0000
trusted library allocation
page read and write
1DEA15F0000
heap
page read and write
1382000
heap
page read and write
3E1E000
direct allocation
page read and write
3BC9000
direct allocation
page read and write
1767000
heap
page read and write
26ED000
trusted library allocation
page read and write
4E1F000
stack
page read and write
60EE000
stack
page read and write
3E1E000
direct allocation
page read and write
112D000
heap
page read and write
51FE000
stack
page read and write
477E000
direct allocation
page read and write
7D0000
unkown
page write copy
302E000
trusted library allocation
page read and write
640000
heap
page read and write
3EE000
system
page execute and read and write
4830000
trusted library allocation
page read and write
3DAD000
direct allocation
page read and write
109F000
heap
page read and write
6AFF000
stack
page read and write
5300000
trusted library allocation
page read and write
60F7000
trusted library allocation
page read and write
6ED000
heap
page read and write
BD4000
unkown
page readonly
557C000
stack
page read and write
14EF000
heap
page read and write
2612000
trusted library allocation
page read and write
2311000
trusted library allocation
page read and write
50BE000
stack
page read and write
1DEA1895000
heap
page read and write
3AA0000
direct allocation
page read and write
1520000
trusted library allocation
page read and write
3010000
trusted library allocation
page read and write
817000
heap
page read and write
27B1000
trusted library allocation
page read and write
FEF000
stack
page read and write
1296000
heap
page read and write
1209000
heap
page read and write
5307000
trusted library allocation
page read and write
3E1E000
direct allocation
page read and write
582C000
stack
page read and write
6EC0000
trusted library allocation
page read and write
145C000
heap
page read and write
25C0000
heap
page read and write
10AE000
heap
page read and write
1116000
heap
page read and write
1326000
heap
page read and write
1286000
heap
page read and write
3097000
trusted library allocation
page read and write
24F0000
heap
page read and write
130E000
heap
page read and write
13BF000
stack
page read and write
23DD000
trusted library allocation
page execute and read and write
3022000
trusted library allocation
page read and write
3E1E000
direct allocation
page read and write
700000
unkown
page readonly
2919CFE000
stack
page read and write
1294000
heap
page read and write
271A000
trusted library allocation
page read and write
158D000
heap
page read and write
1116000
heap
page read and write
978000
heap
page read and write
90D000
trusted library allocation
page execute and read and write
930000
heap
page read and write
129E000
heap
page read and write
4ACE000
stack
page read and write
1470000
heap
page read and write
2690000
heap
page execute and read and write
4D20000
heap
page read and write
D10000
heap
page read and write
67CE000
stack
page read and write
46A8000
trusted library allocation
page read and write
68F000
heap
page read and write
5AAD000
stack
page read and write
7CC000
unkown
page write copy
B20000
heap
page read and write
1DEA17D0000
heap
page read and write
14EF000
heap
page read and write
3DAD000
direct allocation
page read and write
D8A000
stack
page read and write
25FE000
stack
page read and write
1760000
heap
page read and write
13CE000
stack
page read and write
520000
heap
page read and write
7CC000
unkown
page write copy
112E000
heap
page read and write
5600000
trusted library allocation
page read and write
DE0000
heap
page read and write
6F9000
stack
page read and write
25B0000
trusted library allocation
page execute and read and write
3DA9000
direct allocation
page read and write
24B0000
trusted library allocation
page execute and read and write
3DAD000
direct allocation
page read and write
14F2000
trusted library allocation
page read and write
9B3000
heap
page read and write
FFF000
stack
page read and write
301E000
trusted library allocation
page read and write
FEF000
stack
page read and write
1498000
heap
page read and write
10E7000
heap
page read and write
78D000
trusted library allocation
page execute and read and write
5E1F000
stack
page read and write
A70000
heap
page read and write
592F000
stack
page read and write
870000
heap
page read and write
36A0000
heap
page read and write
261A000
trusted library allocation
page read and write
3BCD000
direct allocation
page read and write
1DEA17F0000
heap
page read and write
6A0000
heap
page read and write
120E000
heap
page read and write
6A7000
heap
page read and write
24C0000
trusted library allocation
page read and write
483E000
stack
page read and write
62CB000
stack
page read and write
605E000
stack
page read and write
37A000
stack
page read and write
1461000
heap
page read and write
4840000
trusted library allocation
page read and write
6EF0000
heap
page read and write
1276000
heap
page read and write
4B80000
heap
page read and write
3DA9000
direct allocation
page read and write
657E000
direct allocation
page read and write
6A4D000
stack
page read and write
291A3FE000
stack
page read and write
745000
heap
page read and write
7D4000
unkown
page readonly
6A60000
trusted library allocation
page execute and read and write
13C000
stack
page read and write
129E000
heap
page read and write
3C3E000
direct allocation
page read and write
3BCD000
direct allocation
page read and write
6F3000
heap
page read and write
4F9000
stack
page read and write
7AB000
trusted library allocation
page execute and read and write
4F5E000
stack
page read and write
2730000
trusted library allocation
page read and write
6B40000
trusted library allocation
page read and write
5BBD000
trusted library allocation
page read and write
701000
unkown
page execute read
14A9000
heap
page read and write
79C000
unkown
page readonly
291A5FC000
stack
page read and write
37B1000
trusted library allocation
page read and write
30AD000
trusted library allocation
page read and write
112E000
heap
page read and write
23F2000
trusted library allocation
page read and write
590000
heap
page read and write
B9C000
unkown
page readonly
3C80000
direct allocation
page read and write
3F2000
unkown
page readonly
92E000
stack
page read and write
3C03000
direct allocation
page read and write
9D0000
heap
page read and write
494E000
stack
page read and write
3AA0000
direct allocation
page read and write
4E7C000
stack
page read and write
678000
heap
page read and write
43EC000
stack
page read and write
BC2000
unkown
page readonly
3DAD000
direct allocation
page read and write
1461000
heap
page read and write
23D3000
trusted library allocation
page execute and read and write
3A23000
direct allocation
page read and write
609E000
stack
page read and write
5BB0000
trusted library allocation
page read and write
5F1E000
stack
page read and write
1257000
heap
page read and write
5623000
heap
page read and write
35B0000
heap
page read and write
940000
heap
page read and write
7A7000
trusted library allocation
page execute and read and write
2716000
trusted library allocation
page read and write
1F00000
heap
page read and write
A6F000
stack
page read and write
1106000
heap
page read and write
4D70000
heap
page read and write
FBF000
stack
page read and write
2710000
heap
page read and write
3031000
trusted library allocation
page read and write
1453000
heap
page read and write
7FDF0000
trusted library allocation
page execute and read and write
750000
heap
page read and write
3C03000
direct allocation
page read and write
230E000
stack
page read and write
137C000
heap
page read and write
701000
unkown
page execute read
26DF000
trusted library allocation
page read and write
7D0000
heap
page read and write
1093000
heap
page read and write
246E000
stack
page read and write
144B000
heap
page read and write
78A000
stack
page read and write
23D0000
trusted library allocation
page read and write
4C9E000
stack
page read and write
23FA000
trusted library allocation
page execute and read and write
3DA9000
direct allocation
page read and write
6F00000
trusted library allocation
page execute and read and write
51FE000
stack
page read and write
109F000
heap
page read and write
3AE0000
direct allocation
page read and write
7D4000
unkown
page readonly
61CE000
stack
page read and write
596E000
stack
page read and write
36A1000
trusted library allocation
page read and write
129E000
heap
page read and write
4C30000
trusted library allocation
page execute and read and write
3C3E000
direct allocation
page read and write
9AB000
heap
page read and write
3A23000
direct allocation
page read and write
There are 656 hidden memdumps, click here to show them.