IOC Report
file.exe

loading gif

Files

File Path
Type
Category
Malicious
file.exe
PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\file.exe.log
ASCII text, with CRLF line terminators
dropped
malicious
C:\Users\Public\Desktop\Google Chrome.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Description string, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:41 2023, mtime=Wed Oct 4 13:16:53 2023, atime=Wed Sep 27 04:28:27 2023, length=3242272, window=hide
dropped
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\RegAsm.exe.log
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\Tmp911D.tmp
data
dropped
C:\Users\user\AppData\Local\Temp\Tmp914D.tmp
data
dropped
C:\Users\user\AppData\Roaming\Microsoft\Crypto\RSA\S-1-5-21-2246122658-3693405117-2476756634-1003\76b53b3ec448f7ccdda2063b15d2bfc3_9e146be9-c76a-4720-bcdb-53011b87bd06
data
dropped

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\file.exe
"C:\Users\user\Desktop\file.exe"
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1

URLs

Name
IP
Malicious
147.45.47.36:30035
malicious
http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-soap-message-security-1.0#Text
unknown
http://schemas.xmlsoap.org/ws/2005/02/sc/sct
unknown
https://duckduckgo.com/chrome_newtab
unknown
http://schemas.xmlsoap.org/ws/2004/04/security/sc/dk
unknown
https://duckduckgo.com/ac/?q=
unknown
http://tempuri.org/Entity/Id14ResponseD
unknown
http://tempuri.org/Entity/Id23ResponseD
unknown
http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-soap-message-security-1.0#HexBinary
unknown
http://tempuri.org/Entity/Id12Response
unknown
http://tempuri.org/
unknown
http://tempuri.org/Entity/Id2Response
unknown
http://schemas.xmlsoap.org/ws/2005/02/sc/dk/p_sha1
unknown
http://tempuri.org/Entity/Id21Response
unknown
http://schemas.xmlsoap.org/2005/02/trust/spnego#GSS_Wrap
unknown
http://tempuri.org/Entity/Id9
unknown
http://docs.oasis-open.org/wss/oasis-wss-saml-token-profile-1.1#SAMLID
unknown
http://tempuri.org/Entity/Id8
unknown
http://tempuri.org/Entity/Id6ResponseD
unknown
http://tempuri.org/Entity/Id5
unknown
http://schemas.xmlsoap.org/ws/2004/10/wsat/Prepare
unknown
http://tempuri.org/Entity/Id4
unknown
http://tempuri.org/Entity/Id7
unknown
http://tempuri.org/Entity/Id6
unknown
http://schemas.xmlsoap.org/ws/2005/02/trust#BinarySecret
unknown
http://tempuri.org/Entity/Id19Response
unknown
http://docs.oasis-open.org/wss/oasis-wss-rel-token-profile-1.0.pdf#license
unknown
http://schemas.xmlsoap.org/ws/2005/02/trust/RSTR/Issue
unknown
http://schemas.xmlsoap.org/ws/2004/10/wsat/Aborted
unknown
http://schemas.xmlsoap.org/ws/2005/02/rm/TerminateSequence
unknown
http://tempuri.org/Entity/Id13ResponseD
unknown
http://schemas.xmlsoap.org/ws/2004/10/wsat/fault
unknown
http://schemas.xmlsoap.org/ws/2004/10/wsat
unknown
http://docs.oasis-open.org/wss/oasis-wss-soap-message-security-1.1#EncryptedKey
unknown
http://tempuri.org/Entity/Id15Response
unknown
http://tempuri.org/Entity/Id5ResponseD
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
http://schemas.xmlsoap.org/ws/2005/02/trust/RSTR/SCT/Renew
unknown
http://schemas.xmlsoap.org/ws/2004/08/addressing/faultp9
unknown
http://schemas.xmlsoap.org/ws/2004/10/wscoor/Register
unknown
http://tempuri.org/Entity/Id6Response
unknown
http://schemas.xmlsoap.org/ws/2004/04/trust/SymmetricKey
unknown
https://api.ip.sb/ip
unknown
http://schemas.xmlsoap.org/ws/2004/04/sc
unknown
http://tempuri.org/Entity/Id1ResponseD
unknown
http://schemas.xmlsoap.org/ws/2004/10/wsat/Volatile2PC
unknown
http://schemas.xmlsoap.org/ws/2005/02/trust/RSTR/SCT/Cancel
unknown
http://tempuri.org/Entity/Id9Response
unknown
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
unknown
http://tempuri.org/Entity/Id20
unknown
http://tempuri.org/Entity/Id21
unknown
http://tempuri.org/Entity/Id22
unknown
http://docs.oasis-open.org/wss/oasis-wss-kerberos-token-profile-1.1#Kerberosv5APREQSHA1
unknown
http://tempuri.org/Entity/Id23
unknown
http://schemas.xmlsoap.org/ws/2004/04/security/trust/CK/PSHA1
unknown
http://tempuri.org/Entity/Id24
unknown
http://schemas.xmlsoap.org/ws/2004/04/security/trust/RSTR/Issue
unknown
http://tempuri.org/Entity/Id24Response
unknown
https://www.ecosia.org/newtab/
unknown
http://tempuri.org/Entity/Id1Response
unknown
http://schemas.xmlsoap.org/ws/2005/02/rm/AckRequested
unknown
http://schemas.xmlsoap.org/ws/2004/10/wsat/ReadOnly
unknown
http://schemas.xmlsoap.org/ws/2004/10/wsat/Replay
unknown
http://schemas.xmlsoap.org/ws/2005/02/trust/tlsnego
unknown
http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-soap-message-security-1.0#Base64Binary
unknown
http://schemas.xmlsoap.org/ws/2004/10/wsat/Durable2PC
unknown
http://schemas.xmlsoap.org/ws/2004/04/security/trust/SymmetricKey
unknown
http://tempuri.org/Entity/Id21ResponseD
unknown
http://schemas.xmlsoap.org/ws/2004/08/addressing
unknown
http://schemas.xmlsoap.org/ws/2005/02/trust/RST/Issue
unknown
http://schemas.xmlsoap.org/ws/2004/10/wsat/Completion
unknown
http://schemas.xmlsoap.org/ws/2004/04/trust
unknown
http://tempuri.org/Entity/Id10
unknown
http://tempuri.org/Entity/Id11
unknown
http://tempuri.org/Entity/Id10ResponseD
unknown
http://tempuri.org/Entity/Id12
unknown
http://tempuri.org/Entity/Id16Response
unknown
http://schemas.xmlsoap.org/ws/2004/10/wscoor/CreateCoordinationContextResponse
unknown
http://schemas.xmlsoap.org/ws/2005/02/trust/RST/SCT/Cancel
unknown
http://tempuri.org/Entity/Id13
unknown
http://tempuri.org/Entity/Id14
unknown
http://tempuri.org/Entity/Id15
unknown
http://tempuri.org/Entity/Id16
unknown
http://schemas.xmlsoap.org/ws/2005/02/trust/Nonce
unknown
http://tempuri.org/Entity/Id17
unknown
http://tempuri.org/Entity/Id18
unknown
http://tempuri.org/Entity/Id5Response
unknown
http://tempuri.org/Entity/Id19
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/dns
unknown
http://tempuri.org/Entity/Id15ResponseD
unknown
http://tempuri.org/Entity/Id10Response
unknown
http://schemas.xmlsoap.org/ws/2005/02/trust/Renew
unknown
http://tempuri.org/Entity/Id11ResponseD
unknown
http://tempuri.org/Entity/Id8Response
unknown
http://schemas.xmlsoap.org/ws/2004/04/trust/PublicKey
unknown
http://docs.oasis-open.org/wss/oasis-wss-saml-token-profile-1.1#SAMLV2.0
unknown
http://docs.oasis-open.org/wss/oasis-wss-saml-token-profile-1.0#SAMLAssertionID
unknown
http://schemas.xmlsoap.org/ws/2004/04/security/trust/RST/SCT
unknown
http://schemas.xmlsoap.org/ws/2006/02/addressingidentity
unknown
http://tempuri.org/Entity/Id17ResponseD
unknown
There are 90 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
56.126.166.20.in-addr.arpa
unknown

IPs

IP
Domain
Country
Malicious
147.45.47.36
unknown
Russian Federation
malicious

Registry

Path
Value
Malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\F1A578C4CB5DE79A370893983FD4DA8B67B2B064
Blob
malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
Owner
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
SessionHash
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
Sequence
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
RegFiles0000
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
RegFilesHash

Memdumps

Base Address
Regiontype
Protect
Malicious
402000
remote allocation
page execute and read and write
malicious
3AF5000
trusted library allocation
page read and write
malicious
3177000
trusted library allocation
page read and write
malicious
4530000
trusted library allocation
page read and write
433A000
trusted library allocation
page read and write
2DE0000
trusted library allocation
page read and write
2F48000
trusted library allocation
page read and write
6B70000
trusted library allocation
page read and write
30B5000
trusted library allocation
page read and write
32C4000
trusted library allocation
page read and write
42C7000
trusted library allocation
page read and write
34D7000
trusted library allocation
page read and write
164D000
stack
page read and write
5580000
trusted library allocation
page read and write
D94000
heap
page read and write
42BA000
trusted library allocation
page read and write
2DB6000
trusted library allocation
page execute and read and write
EA0000
heap
page read and write
4512000
trusted library allocation
page read and write
D5F000
stack
page read and write
5A7E000
heap
page read and write
787F000
heap
page read and write
3082000
trusted library allocation
page read and write
442E000
trusted library allocation
page read and write
4702000
trusted library allocation
page read and write
5A0D000
heap
page read and write
63F0000
trusted library allocation
page read and write
4379000
trusted library allocation
page read and write
795C000
heap
page read and write
59EF000
heap
page read and write
331A000
trusted library allocation
page read and write
13C1000
heap
page read and write
5570000
heap
page read and write
784D000
heap
page read and write
6AD0000
trusted library allocation
page read and write
3030000
trusted library allocation
page read and write
7C70000
trusted library allocation
page read and write
6D90000
trusted library allocation
page read and write
4376000
trusted library allocation
page read and write
2DA0000
trusted library allocation
page read and write
34E9000
trusted library allocation
page read and write
46AA000
trusted library allocation
page read and write
4360000
trusted library allocation
page read and write
34FC000
trusted library allocation
page read and write
2AF5000
trusted library allocation
page execute and read and write
4384000
trusted library allocation
page read and write
6AC8000
trusted library allocation
page read and write
597F000
stack
page read and write
59C2000
heap
page read and write
6BD0000
trusted library allocation
page read and write
AFB000
stack
page read and write
2D94000
trusted library allocation
page read and write
45D2000
trusted library allocation
page read and write
1469000
heap
page read and write
46F3000
trusted library allocation
page read and write
793C000
heap
page read and write
5582000
trusted library allocation
page read and write
33F4000
trusted library allocation
page read and write
684E000
stack
page read and write
400000
remote allocation
page execute and read and write
3400000
trusted library allocation
page read and write
7F3B0000
trusted library allocation
page execute and read and write
44C1000
trusted library allocation
page read and write
2DBA000
trusted library allocation
page execute and read and write
6B16000
trusted library allocation
page read and write
32E9000
trusted library allocation
page read and write
143C000
heap
page read and write
78B9000
heap
page read and write
4519000
trusted library allocation
page read and write
2AE0000
heap
page execute and read and write
4452000
trusted library allocation
page read and write
446000
remote allocation
page execute and read and write
6B55000
trusted library allocation
page read and write
4344000
trusted library allocation
page read and write
454A000
trusted library allocation
page read and write
FF0000
trusted library allocation
page read and write
7C28000
trusted library allocation
page read and write
3405000
trusted library allocation
page read and write
4567000
trusted library allocation
page read and write
1389000
heap
page read and write
46BB000
trusted library allocation
page read and write
471B000
trusted library allocation
page read and write
42FB000
trusted library allocation
page read and write
2F30000
heap
page read and write
5590000
heap
page execute and read and write
3216000
trusted library allocation
page read and write
4405000
trusted library allocation
page read and write
DC6000
heap
page read and write
46E4000
trusted library allocation
page read and write
4728000
trusted library allocation
page read and write
42D0000
trusted library allocation
page read and write
2DC2000
trusted library allocation
page read and write
45C5000
trusted library allocation
page read and write
42C1000
trusted library allocation
page read and write
10F7000
stack
page read and write
45E4000
trusted library allocation
page read and write
42DF000
trusted library allocation
page read and write
7BA0000
trusted library allocation
page read and write
44B8000
trusted library allocation
page read and write
3040000
trusted library allocation
page read and write
4153000
trusted library allocation
page read and write
46ED000
trusted library allocation
page read and write
4535000
trusted library allocation
page read and write
31BC000
trusted library allocation
page read and write
6DB0000
heap
page execute and read and write
3325000
trusted library allocation
page read and write
4649000
trusted library allocation
page read and write
1380000
heap
page read and write
6B40000
trusted library allocation
page read and write
45F0000
trusted library allocation
page read and write
40F2000
trusted library allocation
page read and write
46B1000
trusted library allocation
page read and write
472F000
trusted library allocation
page read and write
7C00000
trusted library allocation
page read and write
7D7B000
trusted library allocation
page read and write
448A000
trusted library allocation
page read and write
137E000
heap
page read and write
2A50000
trusted library allocation
page read and write
2DAD000
trusted library allocation
page execute and read and write
474B000
trusted library allocation
page read and write
6B11000
trusted library allocation
page read and write
33F7000
trusted library allocation
page read and write
1004000
trusted library allocation
page read and write
32BB000
trusted library allocation
page read and write
2D93000
trusted library allocation
page execute and read and write
6AC0000
trusted library allocation
page read and write
34A8000
trusted library allocation
page read and write
7BAC000
trusted library allocation
page read and write
32DC000
trusted library allocation
page read and write
7C45000
trusted library allocation
page read and write
2DCB000
trusted library allocation
page execute and read and write
4671000
trusted library allocation
page read and write
1375000
heap
page read and write
D60000
heap
page read and write
7970000
heap
page read and write
437C000
trusted library allocation
page read and write
44C5000
trusted library allocation
page read and write
821E000
stack
page read and write
4505000
trusted library allocation
page read and write
284E000
stack
page read and write
80DE000
stack
page read and write
1420000
heap
page read and write
63E8000
trusted library allocation
page read and write
4600000
trusted library allocation
page read and write
5510000
trusted library allocation
page read and write
28F0000
trusted library allocation
page execute and read and write
45B8000
trusted library allocation
page read and write
43F5000
trusted library allocation
page read and write
34CF000
trusted library allocation
page read and write
2D6F000
stack
page read and write
301C000
stack
page read and write
460A000
trusted library allocation
page read and write
4328000
trusted library allocation
page read and write
4389000
trusted library allocation
page read and write
3050000
trusted library allocation
page read and write
34F3000
trusted library allocation
page read and write
4617000
trusted library allocation
page read and write
46F1000
trusted library allocation
page read and write
46C7000
trusted library allocation
page read and write
7858000
heap
page read and write
6DA0000
trusted library allocation
page read and write
459A000
trusted library allocation
page read and write
DF0000
heap
page read and write
1230000
heap
page read and write
32DF000
trusted library allocation
page read and write
6F4C000
stack
page read and write
306E000
trusted library allocation
page read and write
448F000
trusted library allocation
page read and write
43D9000
trusted library allocation
page read and write
4314000
trusted library allocation
page read and write
4561000
trusted library allocation
page read and write
55E3000
heap
page read and write
4473000
trusted library allocation
page read and write
3213000
trusted library allocation
page read and write
43EA000
trusted library allocation
page read and write
628E000
stack
page read and write
35FC000
trusted library allocation
page read and write
6C0000
unkown
page readonly
34E2000
trusted library allocation
page read and write
13B4000
heap
page read and write
59E4000
heap
page read and write
4635000
trusted library allocation
page read and write
434F000
trusted library allocation
page read and write
FAF000
stack
page read and write
C55000
heap
page read and write
45A5000
trusted library allocation
page read and write
4698000
trusted library allocation
page read and write
42B4000
trusted library allocation
page read and write
6C60000
trusted library allocation
page execute and read and write
44F8000
trusted library allocation
page read and write
35DC000
trusted library allocation
page read and write
D79000
stack
page read and write
458E000
trusted library allocation
page read and write
30C0000
heap
page execute and read and write
4421000
trusted library allocation
page read and write
426E000
trusted library allocation
page read and write
63E0000
trusted library allocation
page read and write
44BC000
trusted library allocation
page read and write
442A000
trusted library allocation
page read and write
43AC000
trusted library allocation
page read and write
3AF1000
trusted library allocation
page read and write
7E0E000
stack
page read and write
6B31000
trusted library allocation
page read and write
44C7000
trusted library allocation
page read and write
34B5000
trusted library allocation
page read and write
2900000
heap
page read and write
55E0000
heap
page read and write
462F000
trusted library allocation
page read and write
6E00000
trusted library allocation
page execute and read and write
5A14000
heap
page read and write
410B000
trusted library allocation
page read and write
4255000
trusted library allocation
page read and write
33FD000
trusted library allocation
page read and write
6B2E000
trusted library allocation
page read and write
1014000
trusted library allocation
page read and write
2D90000
trusted library allocation
page read and write
34C2000
trusted library allocation
page read and write
42D4000
trusted library allocation
page read and write
7C58000
trusted library allocation
page read and write
1003000
trusted library allocation
page execute and read and write
7095000
trusted library allocation
page read and write
7930000
heap
page read and write
436D000
trusted library allocation
page read and write
1020000
heap
page read and write
2800000
trusted library allocation
page read and write
1010000
trusted library allocation
page read and write
46D7000
trusted library allocation
page read and write
7B90000
trusted library allocation
page read and write
305B000
trusted library allocation
page read and write
3223000
trusted library allocation
page read and write
6B90000
trusted library allocation
page read and write
586E000
stack
page read and write
46FB000
trusted library allocation
page read and write
2AF1000
trusted library allocation
page read and write
51CC000
stack
page read and write
7C30000
heap
page read and write
4412000
trusted library allocation
page read and write
6B5B000
trusted library allocation
page read and write
449A000
trusted library allocation
page read and write
7C10000
trusted library allocation
page read and write
44CF000
trusted library allocation
page read and write
7BAA000
trusted library allocation
page read and write
78AF000
heap
page read and write
7C80000
trusted library allocation
page read and write
78DB000
heap
page read and write
3377000
trusted library allocation
page read and write
4621000
trusted library allocation
page read and write
3330000
trusted library allocation
page read and write
122E000
stack
page read and write
69D0000
trusted library allocation
page execute and read and write
FB0000
heap
page read and write
2A0F000
stack
page read and write
433F000
trusted library allocation
page read and write
6F8E000
stack
page read and write
6BA0000
trusted library allocation
page read and write
3310000
trusted library allocation
page read and write
DE0000
heap
page read and write
3020000
trusted library allocation
page execute and read and write
7C65000
trusted library allocation
page read and write
30A0000
trusted library allocation
page read and write
788B000
heap
page read and write
4587000
trusted library allocation
page read and write
4446000
trusted library allocation
page read and write
2E2E000
stack
page read and write
3431000
trusted library allocation
page read and write
6C00000
trusted library allocation
page execute and read and write
5A71000
heap
page read and write
59C7000
heap
page read and write
D6E000
heap
page read and write
4359000
trusted library allocation
page read and write
3460000
trusted library allocation
page read and write
456D000
trusted library allocation
page read and write
70C0000
trusted library allocation
page read and write
7C42000
trusted library allocation
page read and write
3054000
trusted library allocation
page read and write
441B000
trusted library allocation
page read and write
7D80000
trusted library allocation
page execute and read and write
2DC5000
trusted library allocation
page execute and read and write
470E000
trusted library allocation
page read and write
4757000
trusted library allocation
page read and write
7740000
heap
page read and write
3411000
trusted library allocation
page read and write
2F2E000
stack
page read and write
6AD5000
trusted library allocation
page read and write
4627000
trusted library allocation
page read and write
32FE000
trusted library allocation
page read and write
473A000
trusted library allocation
page read and write
46DE000
trusted library allocation
page read and write
7C49000
trusted library allocation
page read and write
4294000
trusted library allocation
page read and write
694F000
stack
page read and write
4307000
trusted library allocation
page read and write
7C5A000
trusted library allocation
page read and write
6B0B000
trusted library allocation
page read and write
5A46000
heap
page read and write
3416000
trusted library allocation
page read and write
69F0000
trusted library allocation
page execute and read and write
3394000
trusted library allocation
page read and write
5870000
heap
page read and write
59E0000
heap
page read and write
7BF0000
trusted library allocation
page execute and read and write
6B80000
trusted library allocation
page read and write
4551000
trusted library allocation
page read and write
446C000
trusted library allocation
page read and write
6AD7000
trusted library allocation
page read and write
33F1000
trusted library allocation
page read and write
27EB000
trusted library allocation
page execute and read and write
6ACA000
trusted library allocation
page read and write
6DD0000
trusted library allocation
page read and write
1650000
heap
page read and write
7847000
heap
page read and write
35D1000
trusted library allocation
page read and write
2AF6000
trusted library allocation
page read and write
825E000
stack
page read and write
33A0000
trusted library allocation
page read and write
B10000
heap
page read and write
4366000
trusted library allocation
page read and write
341B000
trusted library allocation
page read and write
C50000
heap
page read and write
340C000
trusted library allocation
page read and write
DA9000
heap
page read and write
4581000
trusted library allocation
page read and write
135F000
stack
page read and write
428D000
trusted library allocation
page read and write
7918000
heap
page read and write
31B4000
trusted library allocation
page read and write
30B0000
trusted library allocation
page read and write
46B7000
trusted library allocation
page read and write
7988000
heap
page read and write
4524000
trusted library allocation
page read and write
45AC000
trusted library allocation
page read and write
7AC000
stack
page read and write
6392000
trusted library allocation
page read and write
46D1000
trusted library allocation
page read and write
6D80000
trusted library allocation
page read and write
E9E000
stack
page read and write
8370000
trusted library allocation
page read and write
3282000
trusted library allocation
page read and write
7D2E000
stack
page read and write
7954000
heap
page read and write
7C6F000
trusted library allocation
page read and write
43A0000
trusted library allocation
page read and write
3076000
trusted library allocation
page read and write
7090000
trusted library allocation
page read and write
43E5000
trusted library allocation
page read and write
78A6000
heap
page read and write
6B00000
trusted library allocation
page read and write
34EE000
trusted library allocation
page read and write
27E7000
trusted library allocation
page execute and read and write
6B5E000
trusted library allocation
page read and write
43FF000
trusted library allocation
page read and write
43C6000
trusted library allocation
page read and write
6E4C000
stack
page read and write
7898000
heap
page read and write
708C000
stack
page read and write
4BED000
stack
page read and write
638F000
stack
page read and write
4321000
trusted library allocation
page read and write
4557000
trusted library allocation
page read and write
44A4000
trusted library allocation
page read and write
5A76000
heap
page read and write
714000
unkown
page readonly
5593000
heap
page execute and read and write
445F000
trusted library allocation
page read and write
6C2000
unkown
page readonly
2A4E000
stack
page read and write
6BE0000
trusted library allocation
page read and write
3369000
trusted library allocation
page read and write
670E000
stack
page read and write
3090000
trusted library allocation
page read and write
3735000
trusted library allocation
page read and write
1255000
heap
page read and write
6BF0000
trusted library allocation
page execute and read and write
4591000
trusted library allocation
page read and write
835E000
stack
page read and write
3315000
trusted library allocation
page read and write
4416000
trusted library allocation
page read and write
2DB2000
trusted library allocation
page read and write
1370000
heap
page read and write
32F7000
trusted library allocation
page read and write
C3E000
stack
page read and write
1250000
heap
page read and write
462D000
trusted library allocation
page read and write
3254000
trusted library allocation
page read and write
6AC5000
trusted library allocation
page read and write
7D70000
trusted library allocation
page read and write
4424000
trusted library allocation
page read and write
6DC0000
trusted library allocation
page read and write
44AB000
trusted library allocation
page read and write
323D000
trusted library allocation
page read and write
42AA000
trusted library allocation
page read and write
441F000
trusted library allocation
page read and write
70B0000
trusted library allocation
page execute and read and write
45D9000
trusted library allocation
page read and write
34A0000
trusted library allocation
page read and write
7868000
heap
page read and write
5980000
heap
page read and write
30AE000
trusted library allocation
page read and write
6162000
heap
page read and write
40DF000
trusted library allocation
page read and write
437E000
trusted library allocation
page read and write
45F5000
trusted library allocation
page read and write
7DCE000
stack
page read and write
452B000
trusted library allocation
page read and write
462A000
trusted library allocation
page read and write
4597000
trusted library allocation
page read and write
469F000
trusted library allocation
page read and write
6C50000
trusted library allocation
page execute and read and write
BF0000
heap
page read and write
42D9000
trusted library allocation
page read and write
6AD9000
trusted library allocation
page read and write
6173000
heap
page read and write
35C7000
trusted library allocation
page read and write
7910000
heap
page read and write
46E8000
trusted library allocation
page read and write
553E000
trusted library allocation
page read and write
4485000
trusted library allocation
page read and write
30D1000
trusted library allocation
page read and write
5B7E000
stack
page read and write
2DC0000
trusted library allocation
page read and write
459D000
trusted library allocation
page read and write
4370000
trusted library allocation
page read and write
147C000
heap
page read and write
455E000
trusted library allocation
page read and write
6390000
trusted library allocation
page read and write
456A000
trusted library allocation
page read and write
43B9000
trusted library allocation
page read and write
55A0000
trusted library allocation
page execute and read and write
D68000
heap
page read and write
6DE0000
trusted library allocation
page execute and read and write
2D80000
trusted library allocation
page read and write
3426000
trusted library allocation
page read and write
44D4000
trusted library allocation
page read and write
459F000
trusted library allocation
page read and write
35EA000
trusted library allocation
page read and write
457A000
trusted library allocation
page read and write
2DB0000
trusted library allocation
page read and write
7C5F000
trusted library allocation
page read and write
4113000
trusted library allocation
page read and write
35F5000
trusted library allocation
page read and write
4575000
trusted library allocation
page read and write
27E0000
trusted library allocation
page read and write
429A000
trusted library allocation
page read and write
456F000
trusted library allocation
page read and write
7C40000
trusted library allocation
page read and write
3248000
trusted library allocation
page read and write
59CE000
heap
page read and write
43CE000
trusted library allocation
page read and write
4747000
trusted library allocation
page read and write
4741000
trusted library allocation
page read and write
63DE000
stack
page read and write
461E000
trusted library allocation
page read and write
437000
remote allocation
page execute and read and write
57BE000
stack
page read and write
5530000
trusted library allocation
page read and write
7B8D000
stack
page read and write
4333000
trusted library allocation
page read and write
42E3000
trusted library allocation
page read and write
66CF000
stack
page read and write
70A0000
trusted library allocation
page execute and read and write
3071000
trusted library allocation
page read and write
3367000
trusted library allocation
page read and write
6400000
trusted library allocation
page read and write
81DE000
stack
page read and write
307D000
trusted library allocation
page read and write
6B50000
trusted library allocation
page read and write
7C6A000
trusted library allocation
page read and write
45EB000
trusted library allocation
page read and write
3309000
trusted library allocation
page read and write
44EC000
trusted library allocation
page read and write
43DF000
trusted library allocation
page read and write
7901000
heap
page read and write
432000
remote allocation
page execute and read and write
5994000
heap
page read and write
3230000
trusted library allocation
page read and write
46F6000
trusted library allocation
page read and write
7C20000
trusted library allocation
page read and write
2DC7000
trusted library allocation
page execute and read and write
6B22000
trusted library allocation
page read and write
4540000
trusted library allocation
page read and write
6B60000
trusted library allocation
page read and write
6177000
heap
page read and write
468B000
trusted library allocation
page read and write
7CED000
stack
page read and write
32CF000
trusted library allocation
page read and write
5B90000
heap
page read and write
4261000
trusted library allocation
page read and write
429F000
trusted library allocation
page read and write
447E000
trusted library allocation
page read and write
44B1000
trusted library allocation
page read and write
711C000
stack
page read and write
7D6E000
stack
page read and write
3497000
trusted library allocation
page read and write
440C000
trusted library allocation
page read and write
4282000
trusted library allocation
page read and write
42D6000
trusted library allocation
page read and write
4611000
trusted library allocation
page read and write
427B000
trusted library allocation
page read and write
680E000
stack
page read and write
2D9D000
trusted library allocation
page execute and read and write
40D1000
trusted library allocation
page read and write
5A64000
heap
page read and write
78C5000
heap
page read and write
7840000
heap
page read and write
D9C000
heap
page read and write
787A000
heap
page read and write
3B38000
trusted library allocation
page read and write
7C14000
trusted library allocation
page read and write
44CA000
trusted library allocation
page read and write
42CB000
trusted library allocation
page read and write
There are 500 hidden memdumps, click here to show them.