IOC Report
file.exe

loading gif

Files

File Path
Type
Category
Malicious
file.exe
PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
initial sample
malicious
C:\Users\Public\Desktop\Google Chrome.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Description string, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:41 2023, mtime=Thu Oct 5 08:16:11 2023, atime=Wed Sep 27 08:36:54 2023, length=3242272, window=hide
dropped
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\RegAsm.exe.log
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\file.exe.log
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\Tmp23FB.tmp
data
dropped
C:\Users\user\AppData\Local\Temp\Tmp240B.tmp
data
dropped
C:\Users\user\AppData\Roaming\Microsoft\Crypto\RSA\S-1-5-21-2246122658-3693405117-2476756634-1003\76b53b3ec448f7ccdda2063b15d2bfc3_9e146be9-c76a-4720-bcdb-53011b87bd06
data
dropped

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\file.exe
"C:\Users\user\Desktop\file.exe"
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1

URLs

Name
IP
Malicious
147.45.47.36:30035
malicious
http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-soap-message-security-1.0#Text
unknown
http://schemas.xmlsoap.org/ws/2005/02/sc/sct
unknown
http://schemas.xmlsoap.org/ws/2004/04/security/sc/dk
unknown
http://tempuri.org/Entity/Id14ResponseD
unknown
http://tempuri.org/Entity/Id23ResponseD
unknown
http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-soap-message-security-1.0#HexBinary
unknown
http://tempuri.org/Entity/Id12Response
unknown
http://tempuri.org/
unknown
http://tempuri.org/Entity/Id2Response
unknown
http://schemas.xmlsoap.org/ws/2005/02/sc/dk/p_sha1
unknown
http://tempuri.org/Entity/Id21Response
unknown
http://schemas.xmlsoap.org/2005/02/trust/spnego#GSS_Wrap
unknown
http://tempuri.org/Entity/Id9
unknown
http://docs.oasis-open.org/wss/oasis-wss-saml-token-profile-1.1#SAMLID
unknown
http://tempuri.org/Entity/Id8
unknown
http://tempuri.org/Entity/Id6ResponseD
unknown
http://tempuri.org/Entity/Id5
unknown
http://schemas.xmlsoap.org/ws/2004/10/wsat/Prepare
unknown
http://tempuri.org/Entity/Id4
unknown
http://tempuri.org/Entity/Id7
unknown
http://tempuri.org/Entity/Id6
unknown
http://schemas.xmlsoap.org/ws/2005/02/trust#BinarySecret
unknown
http://tempuri.org/Entity/Id19Response
unknown
http://docs.oasis-open.org/wss/oasis-wss-rel-token-profile-1.0.pdf#license
unknown
http://schemas.xmlsoap.org/ws/2005/02/trust/RSTR/Issue
unknown
http://schemas.xmlsoap.org/ws/2004/10/wsat/Aborted
unknown
http://schemas.xmlsoap.org/ws/2005/02/rm/TerminateSequence
unknown
http://tempuri.org/Entity/Id13ResponseD
unknown
http://schemas.xmlsoap.org/ws/2004/10/wsat/fault
unknown
http://schemas.xmlsoap.org/ws/2004/10/wsat
unknown
http://docs.oasis-open.org/wss/oasis-wss-soap-message-security-1.1#EncryptedKey
unknown
http://tempuri.org/Entity/Id15Response
unknown
http://tempuri.org/Entity/Id5ResponseD
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
http://schemas.xmlsoap.org/ws/2005/02/trust/RSTR/SCT/Renew
unknown
http://schemas.xmlsoap.org/ws/2004/08/addressing/faultp9
unknown
http://schemas.xmlsoap.org/ws/2004/10/wscoor/Register
unknown
http://tempuri.org/Entity/Id6Response
unknown
http://schemas.xmlsoap.org/ws/2004/04/trust/SymmetricKey
unknown
https://api.ip.sb/ip
unknown
http://schemas.xmlsoap.org/ws/2004/04/sc
unknown
http://tempuri.org/Entity/Id1ResponseD
unknown
http://schemas.xmlsoap.org/ws/2004/10/wsat/Volatile2PC
unknown
http://schemas.xmlsoap.org/ws/2005/02/trust/RSTR/SCT/Cancel
unknown
http://tempuri.org/Entity/Id9Response
unknown
http://tempuri.org/Entity/Id20
unknown
http://tempuri.org/Entity/Id21
unknown
http://tempuri.org/Entity/Id22
unknown
http://docs.oasis-open.org/wss/oasis-wss-kerberos-token-profile-1.1#Kerberosv5APREQSHA1
unknown
http://tempuri.org/Entity/Id23
unknown
http://schemas.xmlsoap.org/ws/2004/04/security/trust/CK/PSHA1
unknown
http://tempuri.org/Entity/Id24
unknown
http://schemas.xmlsoap.org/ws/2004/04/security/trust/RSTR/Issue
unknown
http://tempuri.org/Entity/Id24Response
unknown
http://tempuri.org/Entity/Id1Response
unknown
http://schemas.xmlsoap.org/ws/2005/02/rm/AckRequested
unknown
http://schemas.xmlsoap.org/ws/2004/10/wsat/ReadOnly
unknown
http://schemas.xmlsoap.org/ws/2004/10/wsat/Replay
unknown
http://schemas.xmlsoap.org/ws/2005/02/trust/tlsnego
unknown
http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-soap-message-security-1.0#Base64Binary
unknown
http://schemas.xmlsoap.org/ws/2004/10/wsat/Durable2PC
unknown
http://schemas.xmlsoap.org/ws/2004/04/security/trust/SymmetricKey
unknown
http://tempuri.org/Entity/Id21ResponseD
unknown
http://schemas.xmlsoap.org/ws/2004/08/addressing
unknown
http://schemas.xmlsoap.org/ws/2005/02/trust/RST/Issue
unknown
http://ns.adp/1.0/
unknown
http://schemas.xmlsoap.org/ws/2004/10/wsat/Completion
unknown
http://schemas.xmlsoap.org/ws/2004/04/trust
unknown
http://tempuri.org/Entity/Id10
unknown
http://tempuri.org/Entity/Id11
unknown
http://tempuri.org/Entity/Id10ResponseD
unknown
http://tempuri.org/Entity/Id12
unknown
http://tempuri.org/Entity/Id16Response
unknown
http://schemas.xmlsoap.org/ws/2004/10/wscoor/CreateCoordinationContextResponse
unknown
http://schemas.xmlsoap.org/ws/2005/02/trust/RST/SCT/Cancel
unknown
http://tempuri.org/Entity/Id13
unknown
http://tempuri.org/Entity/Id14
unknown
http://tempuri.org/Entity/Id15
unknown
http://tempuri.org/Entity/Id16
unknown
http://schemas.xmlsoap.org/ws/2005/02/trust/Nonce
unknown
http://tempuri.org/Entity/Id17
unknown
http://tempuri.org/Entity/Id18
unknown
http://tempuri.org/Entity/Id5Response
unknown
http://tempuri.org/Entity/Id19
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/dns
unknown
http://tempuri.org/Entity/Id15ResponseD
unknown
http://tempuri.org/Entity/Id10Response
unknown
http://schemas.xmlsoap.org/ws/2005/02/trust/Renew
unknown
http://tempuri.org/Entity/Id11ResponseD
unknown
http://tempuri.org/Entity/Id8Response
unknown
http://schemas.xmlsoap.org/ws/2004/04/trust/PublicKey
unknown
http://docs.oasis-open.org/wss/oasis-wss-saml-token-profile-1.1#SAMLV2.0
unknown
http://docs.oasis-open.org/wss/oasis-wss-saml-token-profile-1.0#SAMLAssertionID
unknown
http://schemas.xmlsoap.org/ws/2004/04/security/trust/RST/SCT
unknown
http://schemas.xmlsoap.org/ws/2006/02/addressingidentity
unknown
http://tempuri.org/Entity/Id17ResponseD
unknown
http://schemas.xmlsoap.org/soap/envelope/
unknown
http://tempuri.org/Entity/Id8ResponseD
unknown
http://schemas.xmlsoap.org/ws/2005/02/trust/PublicKey
unknown
There are 90 hidden URLs, click here to show them.

IPs

IP
Domain
Country
Malicious
147.45.47.36
unknown
Russian Federation
malicious

Registry

Path
Value
Malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\F1A578C4CB5DE79A370893983FD4DA8B67B2B064
Blob
malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
Owner
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
SessionHash
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
Sequence
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
RegFiles0000
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
RegFilesHash

Memdumps

Base Address
Regiontype
Protect
Malicious
402000
remote allocation
page execute and read and write
malicious
31E7000
trusted library allocation
page read and write
malicious
4375000
trusted library allocation
page read and write
malicious
5933000
heap
page execute and read and write
469A000
trusted library allocation
page read and write
4345000
trusted library allocation
page read and write
6CA0000
trusted library allocation
page read and write
14F4000
heap
page read and write
8C10000
heap
page read and write
6BF1000
trusted library allocation
page read and write
4630000
trusted library allocation
page read and write
6D20000
trusted library allocation
page execute and read and write
3795000
trusted library allocation
page read and write
6AB0000
trusted library allocation
page execute and read and write
32BD000
trusted library allocation
page read and write
359B000
trusted library allocation
page read and write
334C000
trusted library allocation
page read and write
6C40000
trusted library allocation
page read and write
36CE000
trusted library allocation
page read and write
452F000
trusted library allocation
page read and write
469C000
trusted library allocation
page read and write
45A3000
trusted library allocation
page read and write
4471000
trusted library allocation
page read and write
5650000
trusted library allocation
page read and write
1680000
heap
page read and write
14AC000
heap
page read and write
4634000
trusted library allocation
page read and write
10DC000
stack
page read and write
3386000
trusted library allocation
page read and write
3321000
trusted library allocation
page read and write
55A1000
trusted library allocation
page read and write
43BA000
trusted library allocation
page read and write
704D000
stack
page read and write
432000
remote allocation
page execute and read and write
5A82000
heap
page read and write
7E6A000
trusted library allocation
page read and write
44A1000
trusted library allocation
page read and write
5A3F000
stack
page read and write
14C2000
heap
page read and write
6C30000
trusted library allocation
page read and write
1924000
trusted library allocation
page read and write
2E60000
trusted library allocation
page read and write
6A00000
trusted library allocation
page read and write
36EA000
trusted library allocation
page read and write
35C9000
trusted library allocation
page read and write
45BF000
trusted library allocation
page read and write
2E72000
trusted library allocation
page read and write
156B000
heap
page read and write
466A000
trusted library allocation
page read and write
11A0000
heap
page read and write
43D5000
trusted library allocation
page read and write
1320000
trusted library allocation
page read and write
7928000
heap
page read and write
348B000
trusted library allocation
page read and write
4396000
trusted library allocation
page read and write
2E7A000
trusted library allocation
page execute and read and write
337F000
trusted library allocation
page read and write
6303000
heap
page read and write
3030000
heap
page execute and read and write
2E70000
trusted library allocation
page read and write
1450000
heap
page read and write
6307000
heap
page read and write
1335000
heap
page read and write
42F1000
trusted library allocation
page read and write
7983000
heap
page read and write
69DE000
stack
page read and write
83EE000
stack
page read and write
7995000
heap
page read and write
6B90000
trusted library allocation
page read and write
30FB000
trusted library allocation
page execute and read and write
313E000
stack
page read and write
6CB0000
trusted library allocation
page execute and read and write
3590000
trusted library allocation
page read and write
441D000
trusted library allocation
page read and write
43F4000
trusted library allocation
page read and write
4318000
trusted library allocation
page read and write
6C15000
trusted library allocation
page read and write
1914000
trusted library allocation
page read and write
7B30000
trusted library allocation
page read and write
7E7F000
trusted library allocation
page read and write
4322000
trusted library allocation
page read and write
7DE0000
trusted library allocation
page read and write
5A50000
heap
page read and write
3528000
trusted library allocation
page read and write
7DDE000
stack
page read and write
3371000
trusted library allocation
page execute and read and write
1920000
trusted library allocation
page read and write
5620000
heap
page read and write
7E80000
trusted library allocation
page read and write
7B3F000
trusted library allocation
page read and write
3532000
trusted library allocation
page read and write
79EE000
heap
page read and write
4548000
trusted library allocation
page read and write
5B3B000
heap
page read and write
3573000
trusted library allocation
page read and write
466F000
trusted library allocation
page read and write
53AD000
stack
page read and write
6BC0000
trusted library allocation
page read and write
43EF000
trusted library allocation
page read and write
6B85000
trusted library allocation
page read and write
157D000
heap
page read and write
4339000
trusted library allocation
page read and write
55C5000
trusted library allocation
page read and write
17CF000
stack
page read and write
3316000
trusted library allocation
page read and write
3561000
trusted library allocation
page read and write
446000
remote allocation
page execute and read and write
4611000
trusted library allocation
page read and write
7906000
heap
page read and write
45B5000
trusted library allocation
page read and write
69E0000
trusted library allocation
page read and write
4513000
trusted library allocation
page read and write
7BA0000
heap
page read and write
12F5000
heap
page read and write
4372000
trusted library allocation
page read and write
353B000
trusted library allocation
page read and write
1323000
trusted library allocation
page execute and read and write
2E8B000
trusted library allocation
page execute and read and write
700C000
stack
page read and write
439D000
trusted library allocation
page read and write
4687000
trusted library allocation
page read and write
459C000
trusted library allocation
page read and write
55A6000
trusted library allocation
page read and write
3472000
trusted library allocation
page read and write
34A0000
trusted library allocation
page read and write
3479000
trusted library allocation
page read and write
7190000
trusted library allocation
page execute and read and write
5B35000
heap
page read and write
3130000
heap
page read and write
7E40000
trusted library allocation
page read and write
4545000
trusted library allocation
page read and write
6BE2000
trusted library allocation
page read and write
137E000
stack
page read and write
2F50000
trusted library allocation
page read and write
33B9000
trusted library allocation
page read and write
44C9000
trusted library allocation
page read and write
3539000
trusted library allocation
page read and write
44D6000
trusted library allocation
page read and write
449B000
trusted library allocation
page read and write
414F000
trusted library allocation
page read and write
7DF0000
trusted library allocation
page read and write
400000
remote allocation
page execute and read and write
689E000
stack
page read and write
71B4000
trusted library allocation
page read and write
1506000
heap
page read and write
7EEE000
stack
page read and write
523C000
stack
page read and write
2E85000
trusted library allocation
page execute and read and write
55AD000
trusted library allocation
page read and write
3372000
trusted library allocation
page read and write
7E75000
trusted library allocation
page read and write
6E80000
trusted library allocation
page read and write
43E6000
trusted library allocation
page read and write
7E6F000
trusted library allocation
page read and write
6BD1000
trusted library allocation
page read and write
4492000
trusted library allocation
page read and write
458F000
trusted library allocation
page read and write
3010000
trusted library allocation
page read and write
148E000
heap
page read and write
42DD000
trusted library allocation
page read and write
5D2E000
stack
page read and write
7B20000
trusted library allocation
page read and write
3228000
trusted library allocation
page read and write
2E80000
trusted library allocation
page read and write
3398000
trusted library allocation
page read and write
1440000
heap
page read and write
357A000
trusted library allocation
page read and write
5B25000
heap
page read and write
6E70000
heap
page execute and read and write
5C7E000
stack
page read and write
3240000
trusted library allocation
page read and write
35AD000
trusted library allocation
page read and write
437C000
trusted library allocation
page read and write
797B000
heap
page read and write
466C000
trusted library allocation
page read and write
37CC000
trusted library allocation
page read and write
7E59000
trusted library allocation
page read and write
7E30000
trusted library allocation
page execute and read and write
55FE000
trusted library allocation
page read and write
4558000
trusted library allocation
page read and write
12C0000
heap
page read and write
4365000
trusted library allocation
page read and write
103A000
stack
page read and write
44A6000
trusted library allocation
page read and write
43C5000
trusted library allocation
page read and write
3484000
trusted library allocation
page read and write
45CB000
trusted library allocation
page read and write
45BA000
trusted library allocation
page read and write
576E000
stack
page read and write
7900000
heap
page read and write
377A000
trusted library allocation
page read and write
7B3C000
trusted library allocation
page read and write
71A0000
trusted library allocation
page execute and read and write
14C0000
heap
page read and write
4650000
trusted library allocation
page read and write
4461000
trusted library allocation
page read and write
430D000
trusted library allocation
page read and write
3677000
trusted library allocation
page read and write
3020000
trusted library allocation
page read and write
7E55000
trusted library allocation
page read and write
3150000
heap
page read and write
6C60000
trusted library allocation
page read and write
1455000
heap
page read and write
7959000
heap
page read and write
5C3E000
stack
page read and write
434D000
trusted library allocation
page read and write
4618000
trusted library allocation
page read and write
3442000
trusted library allocation
page read and write
5B20000
heap
page read and write
12FE000
heap
page read and write
4370000
trusted library allocation
page read and write
559E000
trusted library allocation
page read and write
5930000
heap
page execute and read and write
363B000
trusted library allocation
page read and write
856E000
stack
page read and write
7E10000
trusted library allocation
page read and write
44F0000
trusted library allocation
page read and write
3623000
trusted library allocation
page read and write
4691000
trusted library allocation
page read and write
14CB000
heap
page read and write
4680000
trusted library allocation
page read and write
5773000
heap
page read and write
33A2000
trusted library allocation
page read and write
7E18000
trusted library allocation
page read and write
7F80000
trusted library allocation
page execute and read and write
6EA0000
trusted library allocation
page execute and read and write
799E000
heap
page read and write
1569000
heap
page read and write
69F0000
trusted library allocation
page read and write
6C10000
trusted library allocation
page read and write
6E40000
trusted library allocation
page read and write
36D9000
trusted library allocation
page read and write
417B000
trusted library allocation
page read and write
3260000
heap
page execute and read and write
5580000
trusted library allocation
page read and write
41C2000
trusted library allocation
page read and write
43E2000
trusted library allocation
page read and write
64DE000
stack
page read and write
336F000
stack
page read and write
679E000
stack
page read and write
11DB000
stack
page read and write
319E000
stack
page read and write
43A9000
trusted library allocation
page read and write
362F000
trusted library allocation
page read and write
6B99000
trusted library allocation
page read and write
3554000
trusted library allocation
page read and write
3495000
trusted library allocation
page read and write
468D000
trusted library allocation
page read and write
6B97000
trusted library allocation
page read and write
7E20000
trusted library allocation
page read and write
3580000
trusted library allocation
page read and write
1913000
trusted library allocation
page execute and read and write
2F40000
heap
page read and write
68DE000
stack
page read and write
44F7000
trusted library allocation
page read and write
2EA0000
trusted library allocation
page read and write
445C000
trusted library allocation
page read and write
2F58000
trusted library allocation
page read and write
714C000
stack
page read and write
3141000
trusted library allocation
page read and write
6F0C000
stack
page read and write
795D000
heap
page read and write
4582000
trusted library allocation
page read and write
4308000
trusted library allocation
page read and write
4488000
trusted library allocation
page read and write
6E50000
trusted library allocation
page read and write
43EB000
trusted library allocation
page read and write
467A000
trusted library allocation
page read and write
6EC0000
trusted library allocation
page execute and read and write
132D000
trusted library allocation
page execute and read and write
3308000
trusted library allocation
page read and write
4502000
trusted library allocation
page read and write
4604000
trusted library allocation
page read and write
36E5000
trusted library allocation
page read and write
6E60000
trusted library allocation
page read and write
2FF0000
trusted library allocation
page read and write
62F2000
heap
page read and write
4303000
trusted library allocation
page read and write
43FE000
trusted library allocation
page read and write
454B000
trusted library allocation
page read and write
37A0000
trusted library allocation
page read and write
8570000
trusted library allocation
page read and write
1280000
heap
page read and write
4553000
trusted library allocation
page read and write
1324000
trusted library allocation
page read and write
147F000
stack
page read and write
14B4000
heap
page read and write
718E000
stack
page read and write
79B1000
heap
page read and write
3465000
trusted library allocation
page read and write
329A000
trusted library allocation
page read and write
7B39000
trusted library allocation
page read and write
7E7A000
trusted library allocation
page read and write
433F000
trusted library allocation
page read and write
5640000
heap
page read and write
14FF000
heap
page read and write
2EEE000
stack
page read and write
148A000
heap
page read and write
448F000
trusted library allocation
page read and write
6E90000
trusted library allocation
page read and write
5CEE000
stack
page read and write
6A90000
trusted library allocation
page execute and read and write
3584000
trusted library allocation
page read and write
44AB000
trusted library allocation
page read and write
842F000
stack
page read and write
69E8000
trusted library allocation
page read and write
43B8000
trusted library allocation
page read and write
43B5000
trusted library allocation
page read and write
7955000
heap
page read and write
451E000
trusted library allocation
page read and write
379A000
trusted library allocation
page read and write
3568000
trusted library allocation
page read and write
5700000
trusted library allocation
page execute and read and write
3373000
trusted library allocation
page read and write
43DC000
trusted library allocation
page read and write
3644000
trusted library allocation
page read and write
3391000
trusted library allocation
page read and write
465D000
trusted library allocation
page read and write
43FA000
trusted library allocation
page read and write
6CC0000
trusted library allocation
page execute and read and write
78FD000
stack
page read and write
3771000
trusted library allocation
page read and write
44E3000
trusted library allocation
page read and write
7E68000
trusted library allocation
page read and write
45E4000
trusted library allocation
page read and write
71B0000
trusted library allocation
page read and write
55F0000
trusted library allocation
page read and write
6C1E000
trusted library allocation
page read and write
7FCE000
stack
page read and write
6C20000
trusted library allocation
page read and write
180E000
stack
page read and write
55C0000
trusted library allocation
page read and write
3439000
trusted library allocation
page read and write
7DF4000
trusted library allocation
page read and write
3343000
trusted library allocation
page read and write
591E000
stack
page read and write
1310000
trusted library allocation
page read and write
4696000
trusted library allocation
page read and write
14BE000
stack
page read and write
7E00000
heap
page read and write
159C000
heap
page read and write
5584000
trusted library allocation
page read and write
4466000
trusted library allocation
page read and write
6D10000
trusted library allocation
page execute and read and write
6B8A000
trusted library allocation
page read and write
330B000
trusted library allocation
page read and write
1137000
stack
page read and write
364B000
trusted library allocation
page read and write
1460000
heap
page read and write
36BD000
trusted library allocation
page read and write
4436000
trusted library allocation
page read and write
1480000
heap
page read and write
2E5F000
stack
page read and write
7CDB000
stack
page read and write
453F000
trusted library allocation
page read and write
7944000
heap
page read and write
3490000
trusted library allocation
page read and write
447B000
trusted library allocation
page read and write
79C7000
heap
page read and write
1501000
heap
page read and write
416A000
trusted library allocation
page read and write
3120000
trusted library allocation
page execute and read and write
791E000
heap
page read and write
5A40000
heap
page read and write
3784000
trusted library allocation
page read and write
6C50000
trusted library allocation
page read and write
5AEB000
heap
page read and write
7B00000
trusted library allocation
page read and write
437000
remote allocation
page execute and read and write
3721000
trusted library allocation
page read and write
7935000
heap
page read and write
45AE000
trusted library allocation
page read and write
12F0000
heap
page read and write
4661000
trusted library allocation
page read and write
4576000
trusted library allocation
page read and write
2E6D000
trusted library allocation
page execute and read and write
55B2000
trusted library allocation
page read and write
444A000
trusted library allocation
page read and write
7F6E000
stack
page read and write
55D0000
trusted library allocation
page read and write
4509000
trusted library allocation
page read and write
7F2E000
stack
page read and write
4455000
trusted library allocation
page read and write
4162000
trusted library allocation
page read and write
1537000
heap
page read and write
6B95000
trusted library allocation
page read and write
558B000
trusted library allocation
page read and write
42EA000
trusted library allocation
page read and write
4347000
trusted library allocation
page read and write
6B80000
trusted library allocation
page read and write
3768000
trusted library allocation
page read and write
42D0000
trusted library allocation
page read and write
449E000
trusted library allocation
page read and write
2E87000
trusted library allocation
page execute and read and write
4443000
trusted library allocation
page read and write
3313000
trusted library allocation
page read and write
4657000
trusted library allocation
page read and write
3458000
trusted library allocation
page read and write
2F30000
trusted library allocation
page execute and read and write
36F5000
trusted library allocation
page read and write
82AE000
stack
page read and write
33AD000
trusted library allocation
page read and write
4482000
trusted library allocation
page read and write
34E2000
trusted library allocation
page read and write
7F7B000
trusted library allocation
page read and write
33F2000
trusted library allocation
page read and write
3640000
trusted library allocation
page read and write
54AD000
stack
page read and write
190F000
stack
page read and write
4352000
trusted library allocation
page read and write
453C000
trusted library allocation
page read and write
344A000
trusted library allocation
page read and write
464A000
trusted library allocation
page read and write
FF2000
unkown
page readonly
4666000
trusted library allocation
page read and write
7F70000
trusted library allocation
page read and write
4183000
trusted library allocation
page read and write
469F000
trusted library allocation
page read and write
1940000
heap
page read and write
5C90000
heap
page read and write
846E000
stack
page read and write
432F000
trusted library allocation
page read and write
36C6000
trusted library allocation
page read and write
4389000
trusted library allocation
page read and write
5770000
heap
page read and write
4528000
trusted library allocation
page read and write
4674000
trusted library allocation
page read and write
79DE000
heap
page read and write
30F0000
trusted library allocation
page read and write
302E000
trusted library allocation
page read and write
43CF000
trusted library allocation
page read and write
42C4000
trusted library allocation
page read and write
3753000
trusted library allocation
page read and write
4640000
trusted library allocation
page read and write
34AC000
trusted library allocation
page read and write
3000000
trusted library allocation
page read and write
3365000
trusted library allocation
page read and write
4535000
trusted library allocation
page read and write
339D000
trusted library allocation
page read and write
1330000
heap
page read and write
12B0000
heap
page read and write
6C1B000
trusted library allocation
page read and write
42FC000
trusted library allocation
page read and write
4429000
trusted library allocation
page read and write
5B2D000
heap
page read and write
2F2B000
stack
page read and write
2E76000
trusted library allocation
page execute and read and write
3613000
trusted library allocation
page read and write
3547000
trusted library allocation
page read and write
4623000
trusted library allocation
page read and write
83AE000
stack
page read and write
6BEE000
trusted library allocation
page read and write
4336000
trusted library allocation
page read and write
36EF000
trusted library allocation
page read and write
6C90000
trusted library allocation
page read and write
450E000
trusted library allocation
page read and write
FF0000
unkown
page readonly
6B88000
trusted library allocation
page read and write
44D8000
trusted library allocation
page read and write
6BD6000
trusted library allocation
page read and write
331F000
trusted library allocation
page read and write
46A4000
trusted library allocation
page read and write
6BCB000
trusted library allocation
page read and write
7E52000
trusted library allocation
page read and write
36D0000
trusted library allocation
page read and write
7E50000
trusted library allocation
page read and write
79E6000
heap
page read and write
2E82000
trusted library allocation
page read and write
4498000
trusted library allocation
page read and write
15BB000
heap
page read and write
3790000
trusted library allocation
page read and write
6C00000
trusted library allocation
page read and write
3110000
trusted library allocation
page read and write
7916000
heap
page read and write
7F140000
trusted library allocation
page execute and read and write
43AF000
trusted library allocation
page read and write
462A000
trusted library allocation
page read and write
43F1000
trusted library allocation
page read and write
4342000
trusted library allocation
page read and write
3357000
trusted library allocation
page read and write
1670000
trusted library allocation
page read and write
4141000
trusted library allocation
page read and write
4329000
trusted library allocation
page read and write
361C000
trusted library allocation
page read and write
5652000
trusted library allocation
page read and write
5A93000
heap
page read and write
16CE000
stack
page read and write
35B2000
trusted library allocation
page read and write
7987000
heap
page read and write
35BE000
trusted library allocation
page read and write
454D000
trusted library allocation
page read and write
There are 481 hidden memdumps, click here to show them.