IOC Report
b.exe

loading gif

Files

File Path
Type
Category
Malicious
b.exe
PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
initial sample
malicious
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_b.exe_6aed87d74fcac5fc678ad6e46e3a3777b5e2266d_f4d35178_8221b3c3-b7a5-460d-93de-9e5b89fe33c7\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
malicious
C:\Users\user\AppData\Roaming\gdi32.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\ProgramData\Microsoft\Windows\WER\Temp\WER95AE.tmp.dmp
Mini DuMP crash report, 15 streams, Sat Nov 23 09:24:59 2024, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER968A.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER96B9.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\Windows\appcompat\Programs\Amcache.hve
MS Windows registry file, NT/2000 or above
dropped
\Device\ConDrv
ASCII text, with very long lines (350), with CRLF, LF line terminators
dropped

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\b.exe
"C:\Users\user\Desktop\b.exe"
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe
"C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 7648 -s 1228

URLs

Name
IP
Malicious
https://frogs-severz.sbs/api
104.21.88.250
malicious
https://revirepart.biz/api
104.21.43.198
malicious
https://duckduckgo.com/chrome_newtab
unknown
https://frogs-severz.sbs/J
unknown
https://duckduckgo.com/ac/?q=
unknown
https://www.google.com/images/branding/product/ico/googleg_lodp.ico
unknown
https://revirepart.biz/
unknown
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
unknown
https://frogs-severz.sbs/api;
unknown
http://crl.rootca1.amazontrust.com/rootca1.crl0
unknown
http://upx.sf.net
unknown
https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
unknown
https://frogs-severz.sbs/api8
unknown
http://ocsp.rootca1.amazontrust.com0:
unknown
https://support.office.com/article/7D48285B-20E8-4B9B-91AD-216E34163BAD?wt.mc_id=EnterPK2016
unknown
https://support.office.com/article/94ba2e0b-638e-4a92-8857-2cb5ac1d8e17
unknown
https://www.ecosia.org/newtab/
unknown
https://support.mozilla.org/kb/customize-firefox-controls-buttons-and-toolbars?utm_source=firefox-br
unknown
https://frogs-severz.sbs:443/api
unknown
https://ac.ecosia.org/autocomplete?q=
unknown
https://frogs-severz.sbs/
unknown
https://frogs-severz.sbs/apibu
unknown
http://x1.c.lencr.org/0
unknown
http://x1.i.lencr.org/0
unknown
revirepart.biz
https://support.office.com/article/94ba2e0b-638e-4a92-8857-2cb5ac1d8e17Install
unknown
https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
unknown
https://support.microsof
unknown
http://crt.rootca1.amazontrust.com/rootca1.cer0?
unknown
https://frogs-severz.sbs/.
unknown
https://frogs-severz.sbs/pp
unknown
https://frogs-severz.sbs:443/apicuriz
unknown
https://support.office.com/article/7D48285B-20E8-4B9B-91AD-216E34163BAD?wt.mc_id=EnterPK2016Examples
unknown
https://frogs-severz.sbs/api$
unknown
https://support.mozilla.org/products/firefoxgro.all
unknown
https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
unknown
https://frogs-severz.sbs/apie
unknown
There are 27 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
frogs-severz.sbs
104.21.88.250
malicious
revirepart.biz
104.21.43.198

IPs

IP
Domain
Country
Malicious
104.21.88.250
frogs-severz.sbs
United States
malicious
104.21.43.198
revirepart.biz
United States

Registry

Path
Value
Malicious
\REGISTRY\A\{5d97efda-53d6-7b97-62a9-e90c35988bd9}\Root\InventoryApplicationFile\b.exe|9a6245b95760f5f5
ProgramId
malicious
\REGISTRY\A\{5d97efda-53d6-7b97-62a9-e90c35988bd9}\Root\InventoryApplicationFile\b.exe|9a6245b95760f5f5
FileId
malicious
\REGISTRY\A\{5d97efda-53d6-7b97-62a9-e90c35988bd9}\Root\InventoryApplicationFile\b.exe|9a6245b95760f5f5
LowerCaseLongPath
malicious
\REGISTRY\A\{5d97efda-53d6-7b97-62a9-e90c35988bd9}\Root\InventoryApplicationFile\b.exe|9a6245b95760f5f5
LongPathHash
malicious
\REGISTRY\A\{5d97efda-53d6-7b97-62a9-e90c35988bd9}\Root\InventoryApplicationFile\b.exe|9a6245b95760f5f5
Name
malicious
\REGISTRY\A\{5d97efda-53d6-7b97-62a9-e90c35988bd9}\Root\InventoryApplicationFile\b.exe|9a6245b95760f5f5
OriginalFileName
malicious
\REGISTRY\A\{5d97efda-53d6-7b97-62a9-e90c35988bd9}\Root\InventoryApplicationFile\b.exe|9a6245b95760f5f5
Publisher
malicious
\REGISTRY\A\{5d97efda-53d6-7b97-62a9-e90c35988bd9}\Root\InventoryApplicationFile\b.exe|9a6245b95760f5f5
Version
malicious
\REGISTRY\A\{5d97efda-53d6-7b97-62a9-e90c35988bd9}\Root\InventoryApplicationFile\b.exe|9a6245b95760f5f5
BinFileVersion
malicious
\REGISTRY\A\{5d97efda-53d6-7b97-62a9-e90c35988bd9}\Root\InventoryApplicationFile\b.exe|9a6245b95760f5f5
BinaryType
malicious
\REGISTRY\A\{5d97efda-53d6-7b97-62a9-e90c35988bd9}\Root\InventoryApplicationFile\b.exe|9a6245b95760f5f5
ProductName
malicious
\REGISTRY\A\{5d97efda-53d6-7b97-62a9-e90c35988bd9}\Root\InventoryApplicationFile\b.exe|9a6245b95760f5f5
ProductVersion
malicious
\REGISTRY\A\{5d97efda-53d6-7b97-62a9-e90c35988bd9}\Root\InventoryApplicationFile\b.exe|9a6245b95760f5f5
LinkDate
malicious
\REGISTRY\A\{5d97efda-53d6-7b97-62a9-e90c35988bd9}\Root\InventoryApplicationFile\b.exe|9a6245b95760f5f5
BinProductVersion
malicious
\REGISTRY\A\{5d97efda-53d6-7b97-62a9-e90c35988bd9}\Root\InventoryApplicationFile\b.exe|9a6245b95760f5f5
AppxPackageFullName
malicious
\REGISTRY\A\{5d97efda-53d6-7b97-62a9-e90c35988bd9}\Root\InventoryApplicationFile\b.exe|9a6245b95760f5f5
AppxPackageRelativeId
malicious
\REGISTRY\A\{5d97efda-53d6-7b97-62a9-e90c35988bd9}\Root\InventoryApplicationFile\b.exe|9a6245b95760f5f5
Size
malicious
\REGISTRY\A\{5d97efda-53d6-7b97-62a9-e90c35988bd9}\Root\InventoryApplicationFile\b.exe|9a6245b95760f5f5
Language
malicious
\REGISTRY\A\{5d97efda-53d6-7b97-62a9-e90c35988bd9}\Root\InventoryApplicationFile\b.exe|9a6245b95760f5f5
Usn
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\IdentityCRL\ClockData
ClockTimeSeconds
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\IdentityCRL\ClockData
TickCount
There are 11 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
862000
unkown
page execute and read and write
malicious
2947000
heap
page read and write
4DF6000
trusted library allocation
page read and write
4DF2000
trusted library allocation
page read and write
4DE8000
trusted library allocation
page read and write
2948000
heap
page read and write
292F000
heap
page read and write
4DE2000
trusted library allocation
page read and write
4DD4000
trusted library allocation
page read and write
2441000
remote allocation
page execute read
50A0000
trusted library allocation
page read and write
4DDC000
trusted library allocation
page read and write
11AF000
stack
page read and write
4DD0000
trusted library allocation
page read and write
4E11000
trusted library allocation
page read and write
4DD8000
trusted library allocation
page read and write
4DCF000
trusted library allocation
page read and write
4DB3000
trusted library allocation
page read and write
4EFD000
trusted library allocation
page read and write
1200000
trusted library allocation
page read and write
420000
heap
page read and write
28A6000
heap
page read and write
4E5C000
trusted library allocation
page read and write
4DD9000
trusted library allocation
page read and write
4DF3000
trusted library allocation
page read and write
4DDA000
trusted library allocation
page read and write
8F2000
unkown
page readonly
2C09000
trusted library allocation
page read and write
4DCE000
trusted library allocation
page read and write
28CB000
heap
page read and write
4DC1000
trusted library allocation
page read and write
2936000
heap
page read and write
2948000
heap
page read and write
4DDF000
trusted library allocation
page read and write
2C04000
trusted library allocation
page read and write
2888000
heap
page read and write
4DCF000
trusted library allocation
page read and write
2BFA000
trusted library allocation
page read and write
28CB000
heap
page read and write
2948000
heap
page read and write
E55000
heap
page read and write
1207000
trusted library allocation
page execute and read and write
2948000
heap
page read and write
4E37000
trusted library allocation
page read and write
A86E000
stack
page read and write
4EDD000
trusted library allocation
page read and write
4DCF000
trusted library allocation
page read and write
4DEE000
trusted library allocation
page read and write
4E54000
trusted library allocation
page read and write
2948000
heap
page read and write
2936000
heap
page read and write
11DD000
trusted library allocation
page execute and read and write
2946000
heap
page read and write
2948000
heap
page read and write
4E16000
trusted library allocation
page read and write
4DCE000
trusted library allocation
page read and write
4E00000
trusted library allocation
page read and write
2948000
heap
page read and write
4DCF000
trusted library allocation
page read and write
4E33000
trusted library allocation
page read and write
2934000
heap
page read and write
4DB2000
trusted library allocation
page read and write
4DA9000
trusted library allocation
page read and write
29E0000
trusted library allocation
page read and write
4DDF000
trusted library allocation
page read and write
2943000
heap
page read and write
FD7000
heap
page read and write
4DB0000
trusted library allocation
page read and write
2946000
heap
page read and write
4DDF000
trusted library allocation
page read and write
4DDF000
trusted library allocation
page read and write
4DA1000
trusted library allocation
page read and write
2948000
heap
page read and write
294F000
heap
page read and write
294C000
heap
page read and write
4DC5000
trusted library allocation
page read and write
4DA8000
trusted library allocation
page read and write
4DC0000
trusted library allocation
page read and write
76EF000
stack
page read and write
11E0000
trusted library allocation
page read and write
FDA000
heap
page read and write
4DBC000
trusted library allocation
page read and write
2948000
heap
page read and write
2DB000
stack
page read and write
4DBB000
trusted library allocation
page read and write
A72E000
stack
page read and write
4DB3000
trusted library allocation
page read and write
862000
unkown
page readonly
4F7D000
trusted library allocation
page read and write
FB0000
heap
page read and write
11C0000
trusted library allocation
page read and write
4DCF000
trusted library allocation
page read and write
295A000
heap
page read and write
4E42000
trusted library allocation
page read and write
294F000
heap
page read and write
4DAA000
trusted library allocation
page read and write
105E000
heap
page read and write
4E37000
trusted library allocation
page read and write
1210000
heap
page read and write
4DCF000
trusted library allocation
page read and write
5080000
heap
page read and write
4DD0000
trusted library allocation
page read and write
2948000
heap
page read and write
4DB9000
trusted library allocation
page read and write
4E37000
trusted library allocation
page read and write
4DDF000
trusted library allocation
page read and write
292F000
heap
page read and write
4EA1000
heap
page read and write
449D000
stack
page read and write
425000
heap
page read and write
6CDD0000
unkown
page readonly
E50000
heap
page read and write
4DDF000
trusted library allocation
page read and write
2943000
heap
page read and write
1220000
heap
page read and write
4E00000
trusted library allocation
page read and write
4DF7000
trusted library allocation
page read and write
4E04000
trusted library allocation
page read and write
4DEF000
trusted library allocation
page read and write
2947000
heap
page read and write
4BBE000
stack
page read and write
4DCF000
trusted library allocation
page read and write
4DC0000
trusted library allocation
page read and write
4DE6000
trusted library allocation
page read and write
2BE0000
heap
page read and write
4DD6000
trusted library allocation
page read and write
4DDF000
trusted library allocation
page read and write
2925000
heap
page read and write
2943000
heap
page read and write
2948000
heap
page read and write
2960000
heap
page read and write
2948000
heap
page read and write
4DA4000
trusted library allocation
page read and write
4EA6000
trusted library allocation
page read and write
2B7F000
stack
page read and write
283D000
stack
page read and write
496E000
stack
page read and write
2947000
heap
page read and write
2935000
heap
page read and write
43F5000
trusted library allocation
page read and write
435E000
stack
page read and write
2945000
heap
page read and write
DF0000
heap
page read and write
4DDF000
trusted library allocation
page read and write
4DDF000
trusted library allocation
page read and write
4DDF000
trusted library allocation
page read and write
4DDC000
trusted library allocation
page read and write
25DE000
stack
page read and write
2A2E000
stack
page read and write
2948000
heap
page read and write
4DF9000
trusted library allocation
page read and write
912000
unkown
page readonly
4DA5000
trusted library allocation
page read and write
4DBB000
trusted library allocation
page read and write
50D0000
trusted library allocation
page read and write
4DDF000
trusted library allocation
page read and write
4DBB000
trusted library allocation
page read and write
4DD0000
trusted library allocation
page read and write
2484000
remote allocation
page readonly
4DCF000
trusted library allocation
page read and write
B090000
trusted library allocation
page read and write
2948000
heap
page read and write
4DC1000
trusted library allocation
page read and write
4DD6000
trusted library allocation
page read and write
4DB2000
trusted library allocation
page read and write
4DA1000
trusted library allocation
page read and write
2943000
heap
page read and write
4DCF000
trusted library allocation
page read and write
25E0000
heap
page read and write
2944000
heap
page read and write
4DE7000
trusted library allocation
page read and write
4DB0000
trusted library allocation
page read and write
120B000
trusted library allocation
page execute and read and write
4DB6000
trusted library allocation
page read and write
4DF6000
trusted library allocation
page read and write
2948000
heap
page read and write
2948000
heap
page read and write
4DDF000
trusted library allocation
page read and write
290E000
heap
page read and write
4DBB000
trusted library allocation
page read and write
4DB9000
trusted library allocation
page read and write
4DCF000
trusted library allocation
page read and write
106E000
heap
page read and write
4DCF000
trusted library allocation
page read and write
4DCF000
trusted library allocation
page read and write
2948000
heap
page read and write
5160000
heap
page execute and read and write
B07F000
stack
page read and write
4DBA000
trusted library allocation
page read and write
2948000
heap
page read and write
2AD0000
heap
page execute and read and write
4DBB000
trusted library allocation
page read and write
4DCE000
trusted library allocation
page read and write
2BDE000
stack
page read and write
4E20000
trusted library allocation
page read and write
4DDF000
trusted library allocation
page read and write
2948000
heap
page read and write
4DA5000
trusted library allocation
page read and write
B080000
trusted library allocation
page read and write
4DCE000
trusted library allocation
page read and write
295A000
heap
page read and write
4EA0000
heap
page read and write
2920000
heap
page read and write
2948000
heap
page read and write
11F0000
trusted library allocation
page read and write
4DBA000
trusted library allocation
page read and write
2499000
remote allocation
page readonly
4DBB000
trusted library allocation
page read and write
4E10000
trusted library allocation
page read and write
295A000
heap
page read and write
4DDF000
trusted library allocation
page read and write
FB8000
heap
page read and write
2947000
heap
page read and write
4DCF000
trusted library allocation
page read and write
294B000
heap
page read and write
4E06000
trusted library allocation
page read and write
2948000
heap
page read and write
AF3E000
stack
page read and write
4DAA000
trusted library allocation
page read and write
2927000
heap
page read and write
2948000
heap
page read and write
E3E000
stack
page read and write
4DB6000
trusted library allocation
page read and write
2946000
heap
page read and write
2487000
remote allocation
page execute and read and write
4DBC000
trusted library allocation
page read and write
D10000
heap
page read and write
4DD6000
trusted library allocation
page read and write
4DC7000
trusted library allocation
page read and write
2927000
heap
page read and write
4DCF000
trusted library allocation
page read and write
6CDEB000
unkown
page readonly
860000
unkown
page readonly
4DBA000
trusted library allocation
page read and write
2948000
heap
page read and write
4DDF000
trusted library allocation
page read and write
2935000
heap
page read and write
4DCF000
trusted library allocation
page read and write
427000
heap
page read and write
11D0000
trusted library allocation
page read and write
4DCF000
trusted library allocation
page read and write
4DCF000
trusted library allocation
page read and write
1088000
heap
page read and write
4DA9000
trusted library allocation
page read and write
4DDF000
trusted library allocation
page read and write
295A000
heap
page read and write
2948000
heap
page read and write
9AC000
stack
page read and write
2948000
heap
page read and write
4DDF000
trusted library allocation
page read and write
4D1F000
stack
page read and write
4E64000
trusted library allocation
page read and write
4DB6000
trusted library allocation
page read and write
4DB7000
trusted library allocation
page read and write
6CE42000
unkown
page readonly
FBE000
heap
page read and write
4E07000
trusted library allocation
page read and write
4E58000
trusted library allocation
page read and write
4E30000
trusted library allocation
page read and write
4DE9000
trusted library allocation
page read and write
2948000
heap
page read and write
515E000
stack
page read and write
4DDF000
trusted library allocation
page read and write
2948000
heap
page read and write
4DDD000
trusted library allocation
page read and write
ACFE000
stack
page read and write
4E0E000
trusted library allocation
page read and write
2935000
heap
page read and write
5070000
trusted library allocation
page execute and read and write
28C8000
heap
page read and write
4DB5000
trusted library allocation
page read and write
4DEE000
trusted library allocation
page read and write
2948000
heap
page read and write
4DF6000
trusted library allocation
page read and write
4DB6000
trusted library allocation
page read and write
4DF6000
trusted library allocation
page read and write
4DB0000
trusted library allocation
page read and write
FDC000
heap
page read and write
2943000
heap
page read and write
4DCF000
trusted library allocation
page read and write
FF2000
heap
page read and write
2850000
heap
page read and write
4DCE000
trusted library allocation
page read and write
106A000
heap
page read and write
2948000
heap
page read and write
4EC5000
trusted library allocation
page read and write
2A7F000
stack
page read and write
2935000
heap
page read and write
4DDF000
trusted library allocation
page read and write
2948000
heap
page read and write
AE3E000
stack
page read and write
2943000
heap
page read and write
4E44000
trusted library allocation
page read and write
3DB000
stack
page read and write
1019000
heap
page read and write
291C000
heap
page read and write
4DCF000
trusted library allocation
page read and write
2948000
heap
page read and write
4DDF000
trusted library allocation
page read and write
4DBB000
trusted library allocation
page read and write
4DDB000
trusted library allocation
page read and write
4DDF000
trusted library allocation
page read and write
F5F000
stack
page read and write
4DDF000
trusted library allocation
page read and write
28E6000
heap
page read and write
44B0000
remote allocation
page read and write
4DB2000
trusted library allocation
page read and write
4DDF000
trusted library allocation
page read and write
4DB0000
trusted library allocation
page read and write
4DDF000
trusted library allocation
page read and write
4DCF000
trusted library allocation
page read and write
2948000
heap
page read and write
4DCF000
trusted library allocation
page read and write
4DCE000
trusted library allocation
page read and write
11D3000
trusted library allocation
page execute and read and write
4DB6000
trusted library allocation
page read and write
4DE7000
trusted library allocation
page read and write
289C000
heap
page read and write
4DAF000
trusted library allocation
page read and write
4DDF000
trusted library allocation
page read and write
2948000
heap
page read and write
8F2000
unkown
page execute and read and write
4DB3000
trusted library allocation
page read and write
4DCF000
trusted library allocation
page read and write
4DCF000
trusted library allocation
page read and write
4DFE000
trusted library allocation
page read and write
445D000
stack
page read and write
4DFE000
trusted library allocation
page read and write
2948000
heap
page read and write
295A000
heap
page read and write
2948000
heap
page read and write
4DE3000
trusted library allocation
page read and write
295A000
heap
page read and write
2948000
heap
page read and write
4DDF000
trusted library allocation
page read and write
4E48000
trusted library allocation
page read and write
4DA9000
trusted library allocation
page read and write
4E0E000
trusted library allocation
page read and write
295A000
heap
page read and write
4DE3000
trusted library allocation
page read and write
4DDF000
trusted library allocation
page read and write
4DD6000
trusted library allocation
page read and write
44B0000
remote allocation
page read and write
4DB0000
trusted library allocation
page read and write
AF7E000
stack
page read and write
4DB9000
trusted library allocation
page read and write
2948000
heap
page read and write
4E03000
trusted library allocation
page read and write
4DA8000
trusted library allocation
page read and write
2946000
heap
page read and write
4DC5000
trusted library allocation
page read and write
4DCF000
trusted library allocation
page read and write
4DAF000
trusted library allocation
page read and write
2927000
heap
page read and write
4DC0000
trusted library allocation
page read and write
11E4000
trusted library allocation
page read and write
4F85000
trusted library allocation
page read and write
4DDF000
trusted library allocation
page read and write
4DF9000
trusted library allocation
page read and write
4DB3000
trusted library allocation
page read and write
4DB7000
trusted library allocation
page read and write
2948000
heap
page read and write
1078000
heap
page read and write
4E37000
trusted library allocation
page read and write
4DD5000
trusted library allocation
page read and write
2440000
remote allocation
page execute and read and write
4DCF000
trusted library allocation
page read and write
4ABD000
stack
page read and write
44E0000
heap
page read and write
4DFE000
trusted library allocation
page read and write
295A000
heap
page read and write
4EAC000
trusted library allocation
page read and write
4E4F000
trusted library allocation
page read and write
4DCF000
trusted library allocation
page read and write
2880000
heap
page read and write
4DB0000
trusted library allocation
page read and write
FE4000
heap
page read and write
4DB3000
trusted library allocation
page read and write
6CDD1000
unkown
page execute read
4DDF000
trusted library allocation
page read and write
4DEA000
trusted library allocation
page read and write
2946000
heap
page read and write
860000
unkown
page execute and read and write
4DA6000
trusted library allocation
page read and write
4DDF000
trusted library allocation
page read and write
4DCF000
trusted library allocation
page read and write
4DA7000
trusted library allocation
page read and write
2933000
heap
page read and write
4DB0000
trusted library allocation
page read and write
2946000
heap
page read and write
4E1F000
trusted library allocation
page read and write
4DA0000
trusted library allocation
page read and write
4DDF000
trusted library allocation
page read and write
2937000
heap
page read and write
4E03000
trusted library allocation
page read and write
4DDD000
trusted library allocation
page read and write
2943000
heap
page read and write
4DDF000
trusted library allocation
page read and write
4E44000
trusted library allocation
page read and write
2936000
heap
page read and write
4DD7000
trusted library allocation
page read and write
4D2E000
stack
page read and write
4DA9000
trusted library allocation
page read and write
4DB2000
trusted library allocation
page read and write
6CDF1000
unkown
page read and write
2947000
heap
page read and write
2927000
heap
page read and write
4DB9000
trusted library allocation
page read and write
4D90000
heap
page read and write
28A6000
heap
page read and write
4DDF000
trusted library allocation
page read and write
4C1E000
stack
page read and write
4DE8000
trusted library allocation
page read and write
4DD8000
trusted library allocation
page read and write
4DDF000
trusted library allocation
page read and write
4DC0000
trusted library allocation
page read and write
2948000
heap
page read and write
2943000
heap
page read and write
4E01000
trusted library allocation
page read and write
2BF1000
trusted library allocation
page read and write
4DD8000
trusted library allocation
page read and write
4E07000
trusted library allocation
page read and write
4C2E000
stack
page read and write
24C0000
heap
page read and write
4DB6000
trusted library allocation
page read and write
4DC5000
trusted library allocation
page read and write
2898000
heap
page read and write
4DA5000
trusted library allocation
page read and write
4DDF000
trusted library allocation
page read and write
4F75000
trusted library allocation
page read and write
4DD5000
trusted library allocation
page read and write
4DAF000
trusted library allocation
page read and write
1049000
heap
page read and write
4E2C000
trusted library allocation
page read and write
4DCE000
trusted library allocation
page read and write
3BF1000
trusted library allocation
page read and write
2910000
heap
page read and write
11D4000
trusted library allocation
page read and write
4DCF000
trusted library allocation
page read and write
4DA6000
trusted library allocation
page read and write
4DDF000
trusted library allocation
page read and write
4F4D000
trusted library allocation
page read and write
4DB0000
trusted library allocation
page read and write
2948000
heap
page read and write
4E1F000
trusted library allocation
page read and write
A96D000
stack
page read and write
4DDF000
trusted library allocation
page read and write
2935000
heap
page read and write
4DA6000
trusted library allocation
page read and write
28B2000
heap
page read and write
4E11000
trusted library allocation
page read and write
A82E000
stack
page read and write
28B2000
heap
page read and write
44B0000
remote allocation
page read and write
295A000
heap
page read and write
4DDF000
trusted library allocation
page read and write
2948000
heap
page read and write
4A6F000
stack
page read and write
2948000
heap
page read and write
289C000
heap
page read and write
CFA000
stack
page read and write
ADFF000
stack
page read and write
492E000
stack
page read and write
4DB9000
trusted library allocation
page read and write
2935000
heap
page read and write
4DB9000
trusted library allocation
page read and write
50C0000
trusted library section
page read and write
4DBA000
trusted library allocation
page read and write
4DBC000
trusted library allocation
page read and write
4DF9000
trusted library allocation
page read and write
28C8000
heap
page read and write
5015000
trusted library allocation
page read and write
4DD1000
trusted library allocation
page read and write
4DC7000
trusted library allocation
page read and write
2946000
heap
page read and write
4DBF000
trusted library allocation
page read and write
4DC0000
trusted library allocation
page read and write
4DDF000
trusted library allocation
page read and write
4DFF000
trusted library allocation
page read and write
2937000
heap
page read and write
4DDF000
trusted library allocation
page read and write
4DDF000
trusted library allocation
page read and write
2947000
heap
page read and write
F9E000
stack
page read and write
4E06000
trusted library allocation
page read and write
4DB9000
trusted library allocation
page read and write
2948000
heap
page read and write
There are 477 hidden memdumps, click here to show them.