IOC Report
msedge.exe

loading gif

Files

File Path
Type
Category
Malicious
msedge.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
initial sample
malicious
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_msedge.exe_2c2ca92dcd483d7a57334730825da1e95a3edac_e2b55a38_ee85a960-0b5e-4b89-bdc6-b3f5bd0c3ccc\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\msedge.exe.log
CSV text
dropped
malicious
C:\Users\user\AppData\Local\msedge.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\ProgramData\Microsoft\Windows\WER\Temp\WER1A3A.tmp.dmp
Mini DuMP crash report, 16 streams, Mon Dec 2 17:48:02 2024, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER1D19.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER1D59.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\Log.tmp
Generic INItialization configuration [WIN]
modified
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\msedge.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Archive, ctime=Mon Dec 2 16:44:54 2024, mtime=Mon Dec 2 16:44:57 2024, atime=Mon Dec 2 16:44:57 2024, length=150016, window=hide
dropped
C:\Windows\appcompat\Programs\Amcache.hve
MS Windows registry file, NT/2000 or above
dropped

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\msedge.exe
"C:\Users\user\Desktop\msedge.exe"
malicious
C:\Windows\System32\schtasks.exe
"C:\Windows\System32\schtasks.exe" /create /f /RL HIGHEST /sc minute /mo 1 /tn "msedge" /tr "C:\Users\user\AppData\Local\msedge.exe"
malicious
C:\Users\user\AppData\Local\msedge.exe
C:\Users\user\AppData\Local\msedge.exe
malicious
C:\Users\user\AppData\Local\msedge.exe
"C:\Users\user\AppData\Local\msedge.exe"
malicious
C:\Users\user\AppData\Local\msedge.exe
"C:\Users\user\AppData\Local\msedge.exe"
malicious
C:\Users\user\AppData\Local\msedge.exe
C:\Users\user\AppData\Local\msedge.exe
malicious
C:\Users\user\AppData\Local\msedge.exe
C:\Users\user\AppData\Local\msedge.exe
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\WerFault.exe
C:\Windows\system32\WerFault.exe -u -p 6924 -s 1484

URLs

Name
IP
Malicious
https://pastebin.com/raw/ZnhxAV6a
104.20.3.235
https://i.ibb.co/Dwrj41N/Image.png
91.134.9.160
http://upx.sf.net
unknown
https://i.ibb.co
unknown
http://i.ibb.co
unknown
https://api.telegram.org/bot
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
https://api.telegram.org/bot7538644364:AAHEMV7mmxz6PSRgzo0ORf3_n0BaazmrAqk/sendMessage?chat_id=7541917888&text=%E2%98%A0%20%5BWizWorm%5D%0D%0A%0D%0ANew%20Clinet%20:%20%0D%0A4C67EC226C1C2FB3C434%0D%0A%0D%0AUserName%20:%20user%0D%0AOSFullName%20:%20Microsoft%20Windows%2010%20Pro
149.154.167.220

Domains

Name
IP
Malicious
upon-forming.gl.at.ply.gg
147.185.221.24
malicious
api.telegram.org
149.154.167.220
pastebin.com
104.20.3.235
i.ibb.co
91.134.9.160

IPs

IP
Domain
Country
Malicious
147.185.221.24
upon-forming.gl.at.ply.gg
United States
malicious
104.20.3.235
pastebin.com
United States
149.154.167.220
api.telegram.org
United Kingdom
91.134.9.160
i.ibb.co
France

Registry

Path
Value
Malicious
\REGISTRY\A\{b2da9ca4-045e-5ca8-79fe-11276234446b}\Root\InventoryApplicationFile\msedge.exe|195bf76ad49c6bcc
ProgramId
malicious
\REGISTRY\A\{b2da9ca4-045e-5ca8-79fe-11276234446b}\Root\InventoryApplicationFile\msedge.exe|195bf76ad49c6bcc
FileId
malicious
\REGISTRY\A\{b2da9ca4-045e-5ca8-79fe-11276234446b}\Root\InventoryApplicationFile\msedge.exe|195bf76ad49c6bcc
LowerCaseLongPath
malicious
\REGISTRY\A\{b2da9ca4-045e-5ca8-79fe-11276234446b}\Root\InventoryApplicationFile\msedge.exe|195bf76ad49c6bcc
LongPathHash
malicious
\REGISTRY\A\{b2da9ca4-045e-5ca8-79fe-11276234446b}\Root\InventoryApplicationFile\msedge.exe|195bf76ad49c6bcc
Name
malicious
\REGISTRY\A\{b2da9ca4-045e-5ca8-79fe-11276234446b}\Root\InventoryApplicationFile\msedge.exe|195bf76ad49c6bcc
OriginalFileName
malicious
\REGISTRY\A\{b2da9ca4-045e-5ca8-79fe-11276234446b}\Root\InventoryApplicationFile\msedge.exe|195bf76ad49c6bcc
Publisher
malicious
\REGISTRY\A\{b2da9ca4-045e-5ca8-79fe-11276234446b}\Root\InventoryApplicationFile\msedge.exe|195bf76ad49c6bcc
Version
malicious
\REGISTRY\A\{b2da9ca4-045e-5ca8-79fe-11276234446b}\Root\InventoryApplicationFile\msedge.exe|195bf76ad49c6bcc
BinFileVersion
malicious
\REGISTRY\A\{b2da9ca4-045e-5ca8-79fe-11276234446b}\Root\InventoryApplicationFile\msedge.exe|195bf76ad49c6bcc
BinaryType
malicious
\REGISTRY\A\{b2da9ca4-045e-5ca8-79fe-11276234446b}\Root\InventoryApplicationFile\msedge.exe|195bf76ad49c6bcc
ProductName
malicious
\REGISTRY\A\{b2da9ca4-045e-5ca8-79fe-11276234446b}\Root\InventoryApplicationFile\msedge.exe|195bf76ad49c6bcc
ProductVersion
malicious
\REGISTRY\A\{b2da9ca4-045e-5ca8-79fe-11276234446b}\Root\InventoryApplicationFile\msedge.exe|195bf76ad49c6bcc
LinkDate
malicious
\REGISTRY\A\{b2da9ca4-045e-5ca8-79fe-11276234446b}\Root\InventoryApplicationFile\msedge.exe|195bf76ad49c6bcc
BinProductVersion
malicious
\REGISTRY\A\{b2da9ca4-045e-5ca8-79fe-11276234446b}\Root\InventoryApplicationFile\msedge.exe|195bf76ad49c6bcc
AppxPackageFullName
malicious
\REGISTRY\A\{b2da9ca4-045e-5ca8-79fe-11276234446b}\Root\InventoryApplicationFile\msedge.exe|195bf76ad49c6bcc
AppxPackageRelativeId
malicious
\REGISTRY\A\{b2da9ca4-045e-5ca8-79fe-11276234446b}\Root\InventoryApplicationFile\msedge.exe|195bf76ad49c6bcc
Size
malicious
\REGISTRY\A\{b2da9ca4-045e-5ca8-79fe-11276234446b}\Root\InventoryApplicationFile\msedge.exe|195bf76ad49c6bcc
Language
malicious
\REGISTRY\A\{b2da9ca4-045e-5ca8-79fe-11276234446b}\Root\InventoryApplicationFile\msedge.exe|195bf76ad49c6bcc
Usn
malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
msedge
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\msedge_RASAPI32
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\msedge_RASAPI32
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\msedge_RASAPI32
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\msedge_RASAPI32
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\msedge_RASAPI32
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\msedge_RASAPI32
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\msedge_RASAPI32
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\msedge_RASMANCS
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\msedge_RASMANCS
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\msedge_RASMANCS
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\msedge_RASMANCS
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\msedge_RASMANCS
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\msedge_RASMANCS
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\msedge_RASMANCS
FileDirectory
There are 24 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
129D1000
trusted library allocation
page read and write
malicious
602000
unkown
page readonly
malicious
143B000
heap
page read and write
1BE8E000
stack
page read and write
7FFD9B830000
trusted library allocation
page execute and read and write
7FFD9B866000
trusted library allocation
page execute and read and write
C70000
trusted library allocation
page read and write
7FFD9B76D000
trusted library allocation
page execute and read and write
FC0000
heap
page read and write
1B380000
heap
page execute and read and write
B60000
heap
page read and write
12EA8000
trusted library allocation
page read and write
2A4B000
trusted library allocation
page read and write
1BF8E000
stack
page read and write
273C000
trusted library allocation
page read and write
F90000
heap
page read and write
1A9BD000
stack
page read and write
7F0000
heap
page read and write
7FFD9B846000
trusted library allocation
page execute and read and write
7FFD9B763000
trusted library allocation
page execute and read and write
2A1F000
stack
page read and write
958000
heap
page read and write
12433000
trusted library allocation
page read and write
10EC000
heap
page read and write
29C0000
heap
page execute and read and write
10EA000
heap
page read and write
761000
stack
page read and write
7FFD9B770000
trusted library allocation
page read and write
6D0000
heap
page read and write
7FFD9B870000
trusted library allocation
page execute and read and write
D47000
heap
page read and write
1400000
trusted library allocation
page read and write
12EA3000
trusted library allocation
page read and write
13208000
trusted library allocation
page read and write
D88000
heap
page read and write
7FFD9B910000
trusted library allocation
page read and write
7FFD9B81C000
trusted library allocation
page execute and read and write
7AC000
heap
page read and write
D4F000
heap
page read and write
1CA89000
stack
page read and write
3F5000
heap
page read and write
1459000
heap
page read and write
1BA4A000
heap
page read and write
243C000
trusted library allocation
page read and write
AD0000
heap
page read and write
143D000
heap
page read and write
10E0000
heap
page read and write
F50000
trusted library allocation
page read and write
1C94C000
stack
page read and write
1B35E000
stack
page read and write
1ACBD000
stack
page read and write
7FFD9B754000
trusted library allocation
page read and write
1B1CF000
stack
page read and write
7FFD9B764000
trusted library allocation
page read and write
D20000
heap
page read and write
1B48E000
stack
page read and write
D5C000
heap
page read and write
7FFD9B784000
trusted library allocation
page read and write
1C0D9000
heap
page read and write
3211000
trusted library allocation
page read and write
7FFD9B856000
trusted library allocation
page execute and read and write
7FFD9B910000
trusted library allocation
page execute and read and write
D10000
heap
page read and write
312E000
stack
page read and write
B55000
heap
page read and write
31F0000
heap
page read and write
1C420000
heap
page execute and read and write
1C0C0000
heap
page read and write
E20000
heap
page read and write
BBD000
heap
page read and write
1116000
heap
page read and write
7FFD9B770000
trusted library allocation
page read and write
1B110000
heap
page read and write
7FFD9B836000
trusted library allocation
page execute and read and write
7FFD9B780000
trusted library allocation
page read and write
7FFD9B7A0000
trusted library allocation
page read and write
7FFD9B846000
trusted library allocation
page execute and read and write
10D5000
heap
page read and write
1B350000
heap
page read and write
7FFD9B794000
trusted library allocation
page read and write
7FFD9B820000
trusted library allocation
page execute and read and write
D8B000
heap
page read and write
FD0000
heap
page read and write
600000
unkown
page readonly
2AC3000
trusted library allocation
page read and write
7FFD9B764000
trusted library allocation
page read and write
1B0FF000
stack
page read and write
7FFD9B810000
trusted library allocation
page read and write
2431000
trusted library allocation
page read and write
1B4B0000
heap
page read and write
1AD5E000
heap
page read and write
1CE21765000
heap
page read and write
1010000
heap
page read and write
12A28000
trusted library allocation
page read and write
F3E000
stack
page read and write
1B6BE000
stack
page read and write
D00000
heap
page execute and read and write
F95000
heap
page read and write
1B373000
heap
page execute and read and write
1C3BB000
stack
page read and write
D30000
heap
page read and write
1300000
heap
page read and write
1B370000
heap
page execute and read and write
7FFD9B784000
trusted library allocation
page read and write
1CE213F0000
heap
page read and write
977000
heap
page read and write
291F000
stack
page read and write
29D1000
trusted library allocation
page read and write
1BA2E000
stack
page read and write
1305000
heap
page read and write
7FFD9B800000
trusted library allocation
page read and write
145D000
heap
page read and write
1E0000
unkown
page readonly
1B47E000
stack
page read and write
833000
heap
page read and write
1020000
heap
page read and write
1BA5E000
heap
page read and write
5E0000
heap
page read and write
7FFD9B930000
trusted library allocation
page read and write
1B86E000
stack
page read and write
950000
heap
page read and write
2E17000
trusted library allocation
page read and write
750000
heap
page execute and read and write
DE5000
heap
page read and write
1CE213E0000
heap
page read and write
7FFD9B77D000
trusted library allocation
page execute and read and write
F83000
heap
page read and write
1AE40000
heap
page execute and read and write
98D000
heap
page read and write
3201000
trusted library allocation
page read and write
145B000
heap
page read and write
7FFD9B810000
trusted library allocation
page execute and read and write
1CB7D000
stack
page read and write
12B0000
trusted library allocation
page read and write
1AA00000
trusted library allocation
page read and write
1B77E000
stack
page read and write
7FFD9B774000
trusted library allocation
page read and write
981000
heap
page read and write
7FFD9B816000
trusted library allocation
page read and write
1420000
heap
page read and write
AF0000
heap
page read and write
7FFD9B784000
trusted library allocation
page read and write
856000
heap
page read and write
1C750000
heap
page read and write
2A1C000
trusted library allocation
page read and write
2731000
trusted library allocation
page read and write
7FFD9B76D000
trusted library allocation
page execute and read and write
1C159000
heap
page read and write
B50000
heap
page read and write
2420000
heap
page read and write
E25000
heap
page read and write
7FFD9B780000
trusted library allocation
page read and write
7FF4B7700000
trusted library allocation
page execute and read and write
2D90000
heap
page execute and read and write
7FFD9B830000
trusted library allocation
page read and write
1450000
heap
page read and write
1BCBE000
stack
page read and write
1B5BE000
stack
page read and write
1BA72000
heap
page read and write
2810000
heap
page read and write
7F5000
heap
page read and write
7FFD9B77D000
trusted library allocation
page execute and read and write
7C4000
heap
page read and write
1CE21480000
heap
page read and write
7FFD9B770000
trusted library allocation
page read and write
31D0000
heap
page execute and read and write
2EB1000
trusted library allocation
page read and write
1B980000
heap
page read and write
2C90000
heap
page read and write
7FFD9B75D000
trusted library allocation
page execute and read and write
2A31000
trusted library allocation
page read and write
1090000
trusted library allocation
page read and write
1BC9F000
stack
page read and write
23FE000
stack
page read and write
7FFD9B870000
trusted library allocation
page execute and read and write
27D0000
heap
page execute and read and write
7FFD9B79D000
trusted library allocation
page execute and read and write
F30000
trusted library allocation
page read and write
1487000
heap
page read and write
2EA1000
trusted library allocation
page read and write
1C0D6000
heap
page read and write
2741000
trusted library allocation
page read and write
7FFD9B760000
trusted library allocation
page read and write
7FFD9B7AC000
trusted library allocation
page execute and read and write
920000
heap
page read and write
D15000
heap
page read and write
78C000
heap
page read and write
7FFD9B78B000
trusted library allocation
page execute and read and write
1B920000
heap
page read and write
900000
heap
page read and write
2E03000
trusted library allocation
page read and write
7FFD9B810000
trusted library allocation
page read and write
D28000
heap
page read and write
7FFD9B880000
trusted library allocation
page execute and read and write
3A0000
heap
page read and write
1BFB5000
stack
page read and write
65A5A7F000
stack
page read and write
B66000
heap
page read and write
1AFCE000
stack
page read and write
7FFD9B78D000
trusted library allocation
page execute and read and write
1BA14000
heap
page read and write
2A2C000
trusted library allocation
page read and write
320C000
trusted library allocation
page read and write
161F000
stack
page read and write
1015000
heap
page read and write
A7E000
stack
page read and write
F80000
heap
page read and write
D44000
heap
page read and write
1B97C000
stack
page read and write
2720000
heap
page read and write
10B0000
heap
page read and write
7FFD9B920000
trusted library allocation
page execute and read and write
971000
heap
page read and write
1C41E000
stack
page read and write
1880000
heap
page read and write
7FFD9B920000
trusted library allocation
page read and write
7FFD9B790000
trusted library allocation
page read and write
7FFD9B764000
trusted library allocation
page read and write
7FFD9B820000
trusted library allocation
page execute and read and write
D20000
trusted library allocation
page read and write
2A2F000
trusted library allocation
page read and write
F20000
heap
page read and write
1B21F000
stack
page read and write
7CA000
heap
page read and write
D86000
heap
page read and write
7FFD9B840000
trusted library allocation
page execute and read and write
14E3000
heap
page read and write
1C0F3000
heap
page read and write
1CE21760000
heap
page read and write
FD5000
heap
page read and write
7FFD9B8F2000
trusted library allocation
page read and write
12A23000
trusted library allocation
page read and write
710000
trusted library allocation
page read and write
1C148000
heap
page read and write
1885000
heap
page read and write
1B250000
heap
page execute and read and write
12EA1000
trusted library allocation
page read and write
7C0000
heap
page read and write
7FFD9B76D000
trusted library allocation
page execute and read and write
7E0000
heap
page read and write
1CD8A000
stack
page read and write
F25000
heap
page read and write
AFC000
heap
page read and write
D5A000
heap
page read and write
12438000
trusted library allocation
page read and write
780000
heap
page read and write
16D5000
heap
page read and write
1CC88000
stack
page read and write
7FFD9B780000
trusted library allocation
page read and write
1446000
heap
page read and write
7FFD9B774000
trusted library allocation
page read and write
C1E000
stack
page read and write
1040000
heap
page read and write
2E9F000
stack
page read and write
7FFD9B764000
trusted library allocation
page read and write
390000
heap
page read and write
13203000
trusted library allocation
page read and write
7FFD9B761000
trusted library allocation
page read and write
1BD80000
heap
page execute and read and write
D3C000
heap
page read and write
1C140000
heap
page read and write
1BB90000
heap
page read and write
13E0000
trusted library allocation
page read and write
F1F000
stack
page read and write
7FFD9B7BC000
trusted library allocation
page execute and read and write
C20000
heap
page read and write
1BB2E000
stack
page read and write
1461000
heap
page read and write
2EAF000
trusted library allocation
page read and write
1CE21488000
heap
page read and write
9B9000
heap
page read and write
1B42D000
stack
page read and write
7FFD9B7CC000
trusted library allocation
page execute and read and write
140F000
stack
page read and write
12F1000
stack
page read and write
7FFD9B77D000
trusted library allocation
page execute and read and write
7B6000
heap
page read and write
1B8F0000
heap
page execute and read and write
DE7000
heap
page read and write
2EAC000
trusted library allocation
page read and write
1C0B3000
stack
page read and write
2A21000
trusted library allocation
page read and write
FF0000
heap
page read and write
1C0E6000
heap
page read and write
F10000
heap
page read and write
A15000
heap
page read and write
65A578F000
unkown
page read and write
1CE21410000
heap
page read and write
1C0C8000
heap
page read and write
616000
unkown
page readonly
7FFD9B760000
trusted library allocation
page read and write
1CE214A8000
heap
page read and write
F70000
heap
page read and write
B15000
heap
page read and write
7FFD9B836000
trusted library allocation
page execute and read and write
7FFD9B790000
trusted library allocation
page read and write
B1E000
heap
page read and write
1B67E000
stack
page read and write
DE1000
heap
page read and write
12431000
trusted library allocation
page read and write
1AEC0000
heap
page read and write
12AF000
stack
page read and write
3F0000
heap
page read and write
10D8000
heap
page read and write
1C450000
heap
page read and write
7FFD9B8A0000
trusted library allocation
page execute and read and write
1B7BE000
stack
page read and write
1AF5C000
stack
page read and write
730000
trusted library allocation
page read and write
2840000
heap
page read and write
7FFD9B890000
trusted library allocation
page execute and read and write
963000
heap
page read and write
97E000
stack
page read and write
F80000
heap
page read and write
12A21000
trusted library allocation
page read and write
7FFD9B78D000
trusted library allocation
page execute and read and write
F63000
trusted library allocation
page read and write
FA0000
heap
page read and write
7F2000
heap
page read and write
7FFD9B880000
trusted library allocation
page execute and read and write
1175000
heap
page read and write
9B0000
heap
page read and write
294E000
stack
page read and write
7FFD9B773000
trusted library allocation
page read and write
B34000
heap
page read and write
1BEBE000
stack
page read and write
7FFD9B76D000
trusted library allocation
page execute and read and write
7AE000
heap
page read and write
E3C000
stack
page read and write
12738000
trusted library allocation
page read and write
320F000
trusted library allocation
page read and write
7FFD9B900000
trusted library allocation
page read and write
65A5709000
stack
page read and write
B62000
heap
page read and write
7C1000
heap
page read and write
1BDBD000
stack
page read and write
1178000
heap
page read and write
F60000
trusted library allocation
page read and write
98F000
heap
page read and write
7FFD9B902000
trusted library allocation
page read and write
1BA34000
heap
page read and write
12733000
trusted library allocation
page read and write
13201000
trusted library allocation
page read and write
1C14D000
heap
page read and write
7FFD9B7DC000
trusted library allocation
page execute and read and write
7FFD9B7AC000
trusted library allocation
page execute and read and write
12A4D000
trusted library allocation
page read and write
9E0000
heap
page read and write
AF6000
heap
page read and write
C50000
trusted library allocation
page read and write
3C0000
heap
page read and write
16D0000
heap
page read and write
1440000
heap
page read and write
7FFD9B902000
trusted library allocation
page read and write
12731000
trusted library allocation
page read and write
2FDD000
trusted library allocation
page read and write
961000
stack
page read and write
1B0CE000
stack
page read and write
7FFD9B820000
trusted library allocation
page read and write
2A49000
trusted library allocation
page read and write
7FFD9B78D000
trusted library allocation
page execute and read and write
10B8000
heap
page read and write
26CF000
stack
page read and write
8F1000
stack
page read and write
1118000
heap
page read and write
CD0000
heap
page read and write
7FFD9B7BC000
trusted library allocation
page execute and read and write
1428000
heap
page read and write
341000
stack
page read and write
1B78D000
stack
page read and write
1C0CB000
heap
page read and write
273F000
trusted library allocation
page read and write
EF1000
stack
page read and write
D35000
heap
page read and write
9C0000
heap
page read and write
E1F000
stack
page read and write
7FFD9B8F0000
trusted library allocation
page read and write
7B0000
heap
page read and write
C2E000
unkown
page read and write
7FFD9B75D000
trusted library allocation
page execute and read and write
1ADFE000
stack
page read and write
1AFAD000
stack
page read and write
786000
heap
page read and write
17DE000
stack
page read and write
DDF000
heap
page read and write
F50000
trusted library allocation
page read and write
992000
heap
page read and write
There are 377 hidden memdumps, click here to show them.