IOC Report
file.exe

loading gif

Files

File Path
Type
Category
Malicious
file.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\RegAsm.exe.log
ASCII text, with CRLF line terminators
dropped

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\file.exe
"C:\Users\user\Desktop\file.exe"
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
malicious

URLs

Name
IP
Malicious
20.52.165.210:39030
malicious
http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-soap-message-security-1.0#Text
unknown
http://schemas.xmlsoap.org/ws/2005/02/sc/sct
unknown
https://duckduckgo.com/chrome_newtab
unknown
http://schemas.xmlsoap.org/ws/2004/04/security/sc/dk
unknown
https://duckduckgo.com/ac/?q=
unknown
http://tempuri.org/Entity/Id14ResponseD
unknown
http://tempuri.org/Entity/Id23ResponseD
unknown
http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-soap-message-security-1.0#HexBinary
unknown
http://tempuri.org/Entity/Id12Response
unknown
http://tempuri.org/
unknown
http://tempuri.org/Entity/Id2Response
unknown
http://schemas.xmlsoap.org/ws/2005/02/sc/dk/p_sha1
unknown
http://tempuri.org/Entity/Id21Response
unknown
http://schemas.xmlsoap.org/2005/02/trust/spnego#GSS_Wrap
unknown
http://tempuri.org/Entity/Id9
unknown
http://docs.oasis-open.org/wss/oasis-wss-saml-token-profile-1.1#SAMLID
unknown
http://tempuri.org/Entity/Id8
unknown
http://tempuri.org/Entity/Id6ResponseD
unknown
http://tempuri.org/Entity/Id5
unknown
http://schemas.xmlsoap.org/ws/2004/10/wsat/Prepare
unknown
http://tempuri.org/Entity/Id4
unknown
http://tempuri.org/Entity/Id7
unknown
http://tempuri.org/Entity/Id6
unknown
http://schemas.xmlsoap.org/ws/2005/02/trust#BinarySecret
unknown
http://tempuri.org/Entity/Id19Response
unknown
http://docs.oasis-open.org/wss/oasis-wss-rel-token-profile-1.0.pdf#license
unknown
http://schemas.xmlsoap.org/ws/2005/02/trust/RSTR/Issue
unknown
http://schemas.xmlsoap.org/ws/2004/10/wsat/Aborted
unknown
http://schemas.xmlsoap.org/ws/2005/02/rm/TerminateSequence
unknown
http://tempuri.org/Entity/Id13ResponseD
unknown
http://schemas.xmlsoap.org/ws/2004/10/wsat/fault
unknown
http://schemas.xmlsoap.org/ws/2004/10/wsat
unknown
http://docs.oasis-open.org/wss/oasis-wss-soap-message-security-1.1#EncryptedKey
unknown
http://tempuri.org/Entity/Id15Response
unknown
http://tempuri.org/Entity/Id5ResponseD
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
http://schemas.xmlsoap.org/ws/2005/02/trust/RSTR/SCT/Renew
unknown
http://schemas.xmlsoap.org/ws/2004/10/wscoor/Register
unknown
http://tempuri.org/Entity/Id6Response
unknown
http://schemas.xmlsoap.org/ws/2004/04/trust/SymmetricKey
unknown
https://api.ip.sb/ip
unknown
http://schemas.xmlsoap.org/ws/2004/04/sc
unknown
http://tempuri.org/Entity/Id1ResponseD
unknown
http://schemas.xmlsoap.org/ws/2004/10/wsat/Volatile2PC
unknown
http://schemas.xmlsoap.org/ws/2005/02/trust/RSTR/SCT/Cancel
unknown
http://tempuri.org/Entity/Id9Response
unknown
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
unknown
http://tempuri.org/Entity/Id20
unknown
http://tempuri.org/Entity/Id21
unknown
http://tempuri.org/Entity/Id22
unknown
http://docs.oasis-open.org/wss/oasis-wss-kerberos-token-profile-1.1#Kerberosv5APREQSHA1
unknown
http://tempuri.org/Entity/Id23
unknown
http://schemas.xmlsoap.org/ws/2004/04/security/trust/CK/PSHA1
unknown
http://tempuri.org/Entity/Id24
unknown
http://schemas.xmlsoap.org/ws/2004/04/security/trust/RSTR/Issue
unknown
http://tempuri.org/Entity/Id24Response
unknown
https://www.ecosia.org/newtab/
unknown
http://tempuri.org/Entity/Id1Response
unknown
http://schemas.xmlsoap.org/ws/2005/02/rm/AckRequested
unknown
http://schemas.xmlsoap.org/ws/2004/10/wsat/ReadOnly
unknown
http://schemas.xmlsoap.org/ws/2004/10/wsat/Replay
unknown
http://schemas.xmlsoap.org/ws/2005/02/trust/tlsnego
unknown
http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-soap-message-security-1.0#Base64Binary
unknown
http://schemas.xmlsoap.org/ws/2004/10/wsat/Durable2PC
unknown
http://schemas.xmlsoap.org/ws/2004/04/security/trust/SymmetricKey
unknown
http://tempuri.org/Entity/Id21ResponseD
unknown
http://schemas.xmlsoap.org/ws/2004/08/addressing
unknown
http://schemas.xmlsoap.org/ws/2005/02/trust/RST/Issue
unknown
http://schemas.xmlsoap.org/ws/2004/10/wsat/Completion
unknown
http://schemas.xmlsoap.org/ws/2004/04/trust
unknown
http://tempuri.org/Entity/Id10
unknown
http://tempuri.org/Entity/Id11
unknown
http://tempuri.org/Entity/Id10ResponseD
unknown
http://tempuri.org/Entity/Id12
unknown
http://tempuri.org/Entity/Id16Response
unknown
http://schemas.xmlsoap.org/ws/2004/10/wscoor/CreateCoordinationContextResponse
unknown
http://schemas.xmlsoap.org/ws/2005/02/trust/RST/SCT/Cancel
unknown
http://tempuri.org/Entity/Id13
unknown
http://tempuri.org/Entity/Id14
unknown
http://tempuri.org/Entity/Id15
unknown
http://tempuri.org/Entity/Id16
unknown
http://schemas.xmlsoap.org/ws/2005/02/trust/Nonce
unknown
http://tempuri.org/Entity/Id17
unknown
http://tempuri.org/Entity/Id18
unknown
http://tempuri.org/Entity/Id5Response
unknown
http://tempuri.org/Entity/Id19
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/dns
unknown
http://tempuri.org/Entity/Id15ResponseD
unknown
http://tempuri.org/Entity/Id10Response
unknown
http://schemas.xmlsoap.org/ws/2005/02/trust/Renew
unknown
http://tempuri.org/Entity/Id11ResponseD
unknown
http://tempuri.org/Entity/Id8Response
unknown
http://schemas.xmlsoap.org/ws/2004/04/trust/PublicKey
unknown
http://docs.oasis-open.org/wss/oasis-wss-saml-token-profile-1.1#SAMLV2.0
unknown
http://docs.oasis-open.org/wss/oasis-wss-saml-token-profile-1.0#SAMLAssertionID
unknown
http://schemas.xmlsoap.org/ws/2004/04/security/trust/RST/SCT
unknown
http://schemas.xmlsoap.org/ws/2006/02/addressingidentity
unknown
http://tempuri.org/Entity/Id17ResponseD
unknown
http://schemas.xmlsoap.org/soap/envelope/
unknown
There are 90 hidden URLs, click here to show them.

IPs

IP
Domain
Country
Malicious
20.52.165.210
unknown
United States
malicious

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
Owner
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
SessionHash
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
Sequence
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
RegFiles0000
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
RegFilesHash

Memdumps

Base Address
Regiontype
Protect
Malicious
EFC000
unkown
page read and write
malicious
30E1000
trusted library allocation
page read and write
malicious
402000
remote allocation
page execute and read and write
malicious
34B7000
trusted library allocation
page read and write
7244000
heap
page read and write
5580000
trusted library allocation
page read and write
320F000
trusted library allocation
page read and write
6610000
trusted library allocation
page execute and read and write
A18A000
heap
page read and write
8EAE000
heap
page read and write
105C000
stack
page read and write
9322000
trusted library allocation
page read and write
330F000
trusted library allocation
page read and write
6760000
trusted library allocation
page execute and read and write
4447000
trusted library allocation
page read and write
361D000
trusted library allocation
page read and write
5570000
trusted library allocation
page read and write
4471000
trusted library allocation
page read and write
1250000
heap
page read and write
1140000
heap
page read and write
4360000
trusted library allocation
page read and write
2EC8000
trusted library allocation
page read and write
4357000
trusted library allocation
page read and write
2E3D000
trusted library allocation
page execute and read and write
324A000
trusted library allocation
page read and write
331A000
trusted library allocation
page read and write
32FB000
trusted library allocation
page read and write
6A70000
trusted library allocation
page read and write
2E20000
trusted library allocation
page read and write
7170000
heap
page read and write
36F6000
trusted library allocation
page read and write
1358000
heap
page read and write
BF0000
direct allocation
page execute and read and write
EE9000
unkown
page readonly
434D000
trusted library allocation
page read and write
71FB000
heap
page read and write
6269000
stack
page read and write
940E000
trusted library allocation
page read and write
42B0000
trusted library allocation
page read and write
914C000
stack
page read and write
2E40000
trusted library allocation
page read and write
723E000
heap
page read and write
453E000
trusted library allocation
page read and write
34D2000
trusted library allocation
page read and write
92BF000
trusted library allocation
page read and write
7251000
heap
page read and write
724B000
heap
page read and write
4164000
trusted library allocation
page read and write
42EE000
trusted library allocation
page read and write
43B3000
trusted library allocation
page read and write
34AC000
trusted library allocation
page read and write
5620000
trusted library allocation
page read and write
3202000
trusted library allocation
page read and write
4363000
trusted library allocation
page read and write
6550000
trusted library allocation
page read and write
3554000
trusted library allocation
page read and write
435D000
trusted library allocation
page read and write
4336000
trusted library allocation
page read and write
71B5000
heap
page read and write
43CC000
trusted library allocation
page read and write
6A30000
trusted library allocation
page read and write
59BE000
stack
page read and write
9325000
trusted library allocation
page read and write
12B6000
heap
page read and write
156A000
heap
page read and write
445F000
trusted library allocation
page read and write
440C000
trusted library allocation
page read and write
11B0000
heap
page read and write
6750000
trusted library allocation
page read and write
8E2A000
heap
page read and write
3632000
trusted library allocation
page read and write
8E2F000
heap
page read and write
E3E000
stack
page read and write
35ED000
trusted library allocation
page read and write
5556000
trusted library allocation
page read and write
2C1F000
stack
page read and write
642E000
stack
page read and write
431A000
trusted library allocation
page read and write
43C5000
trusted library allocation
page read and write
42AB000
trusted library allocation
page read and write
9314000
trusted library allocation
page read and write
55C0000
heap
page read and write
5530000
trusted library allocation
page read and write
4321000
trusted library allocation
page read and write
F4B000
unkown
page readonly
2E70000
trusted library allocation
page read and write
3235000
trusted library allocation
page read and write
E60000
unkown
page readonly
947E000
stack
page read and write
44AB000
trusted library allocation
page read and write
8E0D000
stack
page read and write
6390000
trusted library allocation
page execute and read and write
5830000
heap
page execute and read and write
441B000
trusted library allocation
page read and write
F3E000
unkown
page read and write
68AC000
stack
page read and write
2D5F000
stack
page read and write
3587000
trusted library allocation
page read and write
E60000
unkown
page readonly
59FE000
stack
page read and write
4354000
trusted library allocation
page read and write
2E24000
trusted library allocation
page read and write
45CD000
trusted library allocation
page read and write
93AD000
stack
page read and write
42C4000
trusted library allocation
page read and write
43BA000
trusted library allocation
page read and write
5805000
trusted library allocation
page read and write
42A5000
trusted library allocation
page read and write
726E000
heap
page read and write
2E52000
trusted library allocation
page read and write
9430000
trusted library allocation
page execute and read and write
34AE000
trusted library allocation
page read and write
65B0000
trusted library allocation
page read and write
BB0000
heap
page read and write
8E5C000
heap
page read and write
92AA000
trusted library allocation
page read and write
724F000
heap
page read and write
4399000
trusted library allocation
page read and write
5534000
trusted library allocation
page read and write
6A41000
trusted library allocation
page read and write
3460000
trusted library allocation
page read and write
35AC000
trusted library allocation
page read and write
2E10000
trusted library allocation
page read and write
449E000
trusted library allocation
page read and write
BD0000
heap
page read and write
3223000
trusted library allocation
page read and write
1200000
heap
page read and write
71E4000
heap
page read and write
12A9000
heap
page read and write
4365000
trusted library allocation
page read and write
343E000
trusted library allocation
page read and write
6A3B000
trusted library allocation
page read and write
4544000
trusted library allocation
page read and write
8D0E000
stack
page read and write
5820000
trusted library allocation
page read and write
44AE000
trusted library allocation
page read and write
3477000
trusted library allocation
page read and write
4466000
trusted library allocation
page read and write
34DD000
trusted library allocation
page read and write
5808000
trusted library allocation
page read and write
43D1000
trusted library allocation
page read and write
92B5000
trusted library allocation
page read and write
1361000
heap
page read and write
3337000
trusted library allocation
page read and write
435000
remote allocation
page execute and read and write
9292000
trusted library allocation
page read and write
32E0000
trusted library allocation
page read and write
92AF000
trusted library allocation
page read and write
427F000
trusted library allocation
page read and write
3389000
trusted library allocation
page read and write
342A000
trusted library allocation
page read and write
622F000
stack
page read and write
34D7000
trusted library allocation
page read and write
4416000
trusted library allocation
page read and write
1566000
heap
page read and write
6540000
trusted library allocation
page read and write
444000
remote allocation
page execute and read and write
322E000
trusted library allocation
page read and write
30BC000
stack
page read and write
4552000
trusted library allocation
page read and write
636C000
stack
page read and write
4452000
trusted library allocation
page read and write
3457000
trusted library allocation
page read and write
2E0E000
stack
page read and write
341B000
trusted library allocation
page read and write
6790000
trusted library allocation
page read and write
124E000
stack
page read and write
2F60000
trusted library allocation
page execute and read and write
725B000
heap
page read and write
B4C000
stack
page read and write
6B3E000
trusted library allocation
page read and write
4580000
trusted library allocation
page read and write
43F9000
trusted library allocation
page read and write
2EBE000
stack
page read and write
92A8000
trusted library allocation
page read and write
36FC000
trusted library allocation
page read and write
1355000
heap
page read and write
6B10000
trusted library allocation
page read and write
458D000
trusted library allocation
page read and write
454C000
trusted library allocation
page read and write
32EE000
trusted library allocation
page read and write
448D000
trusted library allocation
page read and write
131E000
heap
page read and write
5A10000
heap
page read and write
68EE000
stack
page read and write
9260000
heap
page read and write
370B000
trusted library allocation
page read and write
42BB000
trusted library allocation
page read and write
40EF000
trusted library allocation
page read and write
3326000
trusted library allocation
page read and write
44B4000
trusted library allocation
page read and write
6B20000
trusted library allocation
page read and write
6B26000
trusted library allocation
page read and write
44D6000
trusted library allocation
page read and write
8E24000
heap
page read and write
35CF000
trusted library allocation
page read and write
4534000
trusted library allocation
page read and write
6620000
trusted library allocation
page execute and read and write
5562000
trusted library allocation
page read and write
9410000
trusted library allocation
page execute and read and write
5630000
trusted library allocation
page execute and read and write
451C000
trusted library allocation
page read and write
30C0000
trusted library allocation
page read and write
5590000
trusted library allocation
page read and write
2E23000
trusted library allocation
page execute and read and write
4347000
trusted library allocation
page read and write
2E42000
trusted library allocation
page read and write
4547000
trusted library allocation
page read and write
1369000
heap
page read and write
44C2000
trusted library allocation
page read and write
114E000
heap
page read and write
6B29000
trusted library allocation
page read and write
6B30000
trusted library allocation
page read and write
E61000
unkown
page execute read
400000
remote allocation
page execute and read and write
5B1F000
stack
page read and write
4573000
trusted library allocation
page read and write
6B35000
trusted library allocation
page read and write
3652000
trusted library allocation
page read and write
2E46000
trusted library allocation
page execute and read and write
153E000
stack
page read and write
42E2000
trusted library allocation
page read and write
3435000
trusted library allocation
page read and write
323A000
trusted library allocation
page read and write
7200000
heap
page read and write
4326000
trusted library allocation
page read and write
2E57000
trusted library allocation
page execute and read and write
323F000
trusted library allocation
page read and write
6B3B000
trusted library allocation
page read and write
8E79000
heap
page read and write
3592000
trusted library allocation
page read and write
A170000
heap
page read and write
7F8C0000
trusted library allocation
page execute and read and write
7234000
heap
page read and write
4517000
trusted library allocation
page read and write
93EF000
stack
page read and write
44A4000
trusted library allocation
page read and write
3627000
trusted library allocation
page read and write
4478000
trusted library allocation
page read and write
8E1A000
heap
page read and write
7230000
heap
page read and write
94BE000
stack
page read and write
6530000
trusted library allocation
page read and write
114A000
heap
page read and write
4504000
trusted library allocation
page read and write
2C5E000
stack
page read and write
1180000
heap
page read and write
127B000
heap
page read and write
5551000
trusted library allocation
page read and write
597E000
stack
page read and write
6A0C000
trusted library allocation
page read and write
EFC000
unkown
page write copy
332B000
trusted library allocation
page read and write
3379000
trusted library allocation
page read and write
43A6000
trusted library allocation
page read and write
65A0000
trusted library allocation
page read and write
9290000
trusted library allocation
page read and write
453B000
trusted library allocation
page read and write
3321000
trusted library allocation
page read and write
430000
remote allocation
page execute and read and write
E61000
unkown
page execute read
6EE0D000
unkown
page read and write
6EDF0000
unkown
page readonly
454A000
trusted library allocation
page read and write
32CC000
trusted library allocation
page read and write
92BA000
trusted library allocation
page read and write
69EC000
stack
page read and write
5610000
heap
page read and write
3715000
trusted library allocation
page read and write
51DC000
stack
page read and write
9320000
trusted library allocation
page read and write
2E2D000
trusted library allocation
page execute and read and write
1137000
stack
page read and write
3712000
trusted library allocation
page read and write
43FF000
trusted library allocation
page read and write
558E000
trusted library allocation
page read and write
6EDF1000
unkown
page execute read
6A52000
trusted library allocation
page read and write
2EC0000
heap
page read and write
6A10000
trusted library allocation
page execute and read and write
459F000
trusted library allocation
page read and write
7227000
heap
page read and write
4340000
trusted library allocation
page read and write
4101000
trusted library allocation
page read and write
44F7000
trusted library allocation
page read and write
3175000
trusted library allocation
page read and write
438D000
trusted library allocation
page read and write
5B70000
heap
page read and write
652F000
stack
page read and write
436B000
trusted library allocation
page read and write
8E4B000
heap
page read and write
4403000
trusted library allocation
page read and write
8E9A000
heap
page read and write
6A46000
trusted library allocation
page read and write
555D000
trusted library allocation
page read and write
4522000
trusted library allocation
page read and write
429E000
trusted library allocation
page read and write
3709000
trusted library allocation
page read and write
3342000
trusted library allocation
page read and write
9310000
trusted library allocation
page read and write
8E10000
heap
page read and write
31FB000
trusted library allocation
page read and write
4497000
trusted library allocation
page read and write
9010000
heap
page read and write
344A000
trusted library allocation
page read and write
450E000
trusted library allocation
page read and write
43F2000
trusted library allocation
page read and write
4594000
trusted library allocation
page read and write
4527000
trusted library allocation
page read and write
1350000
heap
page read and write
71DF000
heap
page read and write
723C000
heap
page read and write
5595000
trusted library allocation
page read and write
45BB000
trusted library allocation
page read and write
447D000
trusted library allocation
page read and write
BC0000
heap
page read and write
364C000
trusted library allocation
page read and write
451A000
trusted library allocation
page read and write
9295000
trusted library allocation
page read and write
341E000
trusted library allocation
page read and write
4293000
trusted library allocation
page read and write
55D0000
trusted library allocation
page read and write
5800000
trusted library allocation
page read and write
992E000
stack
page read and write
133F000
stack
page read and write
43E2000
trusted library allocation
page read and write
9299000
trusted library allocation
page read and write
452E000
trusted library allocation
page read and write
2E30000
trusted library allocation
page read and write
11B5000
heap
page read and write
A181000
heap
page read and write
6590000
trusted library allocation
page read and write
132A000
heap
page read and write
6A20000
trusted library allocation
page read and write
5660000
trusted library allocation
page read and write
45AB000
trusted library allocation
page read and write
EE9000
unkown
page readonly
6EE0F000
unkown
page readonly
3720000
trusted library allocation
page read and write
9330000
trusted library allocation
page read and write
55C3000
heap
page read and write
1039000
stack
page read and write
4411000
trusted library allocation
page read and write
4482000
trusted library allocation
page read and write
63A0000
heap
page execute and read and write
2E55000
trusted library allocation
page execute and read and write
553B000
trusted library allocation
page read and write
371B000
trusted library allocation
page read and write
6780000
trusted library allocation
page read and write
31B6000
trusted library allocation
page read and write
2B1E000
stack
page read and write
8E67000
heap
page read and write
720F000
heap
page read and write
34CD000
trusted library allocation
page read and write
4370000
trusted library allocation
page read and write
1560000
heap
page read and write
44FE000
trusted library allocation
page read and write
97AE000
stack
page read and write
6370000
trusted library allocation
page read and write
34C1000
trusted library allocation
page read and write
5622000
trusted library allocation
page read and write
71E7000
heap
page read and write
32D6000
trusted library allocation
page read and write
4408000
trusted library allocation
page read and write
F4B000
unkown
page readonly
55A0000
trusted library allocation
page read and write
43D6000
trusted library allocation
page read and write
440E000
trusted library allocation
page read and write
2F70000
heap
page read and write
4438000
trusted library allocation
page read and write
723A000
heap
page read and write
33AC000
trusted library allocation
page read and write
587E000
stack
page read and write
8E6B000
heap
page read and write
721D000
heap
page read and write
982E000
stack
page read and write
428C000
trusted library allocation
page read and write
3705000
trusted library allocation
page read and write
2E4A000
trusted library allocation
page execute and read and write
346B000
trusted library allocation
page read and write
3256000
trusted library allocation
page read and write
131A000
heap
page read and write
67A0000
trusted library allocation
page execute and read and write
2E50000
trusted library allocation
page read and write
44B7000
trusted library allocation
page read and write
6560000
trusted library allocation
page read and write
6630000
trusted library allocation
page read and write
63EC000
stack
page read and write
44BC000
trusted library allocation
page read and write
1270000
heap
page read and write
84D0000
trusted library allocation
page read and write
32E2000
trusted library allocation
page read and write
3427000
trusted library allocation
page read and write
36F2000
trusted library allocation
page read and write
307E000
stack
page read and write
8E8A000
heap
page read and write
6A5E000
trusted library allocation
page read and write
554E000
trusted library allocation
page read and write
6380000
trusted library allocation
page execute and read and write
4266000
trusted library allocation
page read and write
450B000
trusted library allocation
page read and write
3640000
trusted library allocation
page read and write
3421000
trusted library allocation
page read and write
45A6000
trusted library allocation
page read and write
430F000
trusted library allocation
page read and write
580A000
trusted library allocation
page read and write
353F000
trusted library allocation
page read and write
35B2000
trusted library allocation
page read and write
1170000
heap
page read and write
5833000
heap
page execute and read and write
4272000
trusted library allocation
page read and write
93F0000
trusted library allocation
page read and write
343C000
trusted library allocation
page read and write
9340000
trusted library allocation
page execute and read and write
45B0000
trusted library allocation
page read and write
9400000
trusted library allocation
page read and write
30D0000
heap
page execute and read and write
354B000
trusted library allocation
page read and write
6A00000
trusted library allocation
page read and write
3308000
trusted library allocation
page read and write
4445000
trusted library allocation
page read and write
8EFF000
heap
page read and write
432B000
trusted library allocation
page read and write
F2F000
unkown
page read and write
42FB000
trusted library allocation
page read and write
97EF000
stack
page read and write
5520000
trusted library allocation
page read and write
35A1000
trusted library allocation
page read and write
6B01000
trusted library allocation
page read and write
4308000
trusted library allocation
page read and write
4557000
trusted library allocation
page read and write
2E5B000
trusted library allocation
page execute and read and write
4123000
trusted library allocation
page read and write
31F5000
trusted library allocation
page read and write
4514000
trusted library allocation
page read and write
321C000
trusted library allocation
page read and write
65C0000
trusted library allocation
page execute and read and write
43EC000
trusted library allocation
page read and write
6EE06000
unkown
page readonly
4567000
trusted library allocation
page read and write
40E1000
trusted library allocation
page read and write
11FE000
stack
page read and write
44BA000
trusted library allocation
page read and write
924D000
stack
page read and write
There are 434 hidden memdumps, click here to show them.