IOC Report
Payload.exe.bin.exe

loading gifFilesProcessesURLsDomainsIPsRegistryMemdumps642010010Label

Files

File Path
Type
Category
Malicious
Download
Payload.exe.bin.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
initial sample
malicious
C:\ClickMe.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\ClickMe.exe:Zone.Identifier
ASCII text, with CRLF line terminators
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\CLR_v2.0_32\UsageLogs\Payload.exe.bin.exe.log
ASCII text, with CRLF line terminators
dropped
malicious
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\de7e1bdc0c3d602ad997d6c79062d369.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\de7e1bdc0c3d602ad997d6c79062d369.exe:Zone.Identifier
ASCII text, with CRLF line terminators
modified
malicious

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\Payload.exe.bin.exe
"C:\Users\user\Desktop\Payload.exe.bin.exe"
malicious
C:\Users\user\Desktop\Payload.exe.bin.exe
"C:\Users\user\Desktop\Payload.exe.bin.exe" ..
malicious
C:\Users\user\Desktop\Payload.exe.bin.exe
"C:\Users\user\Desktop\Payload.exe.bin.exe" ..
malicious
C:\Users\user\Desktop\Payload.exe.bin.exe
"C:\Users\user\Desktop\Payload.exe.bin.exe" ..
malicious

URLs

Name
IP
Malicious
http://go.microsoft.
unknown
http://go.microsoft.LinkId=42127
unknown
https://pastebin.com/raw/???
unknown

Domains

Name
IP
Malicious
size-ingredients.gl.at.ply.gg
147.185.221.27
malicious

IPs

IP
Domain
Country
Malicious
147.185.221.27
size-ingredients.gl.at.ply.gg
United States
malicious

Registry

Path
Value
Malicious
HKEY_CURRENT_USER
di
malicious
HKEY_CURRENT_USER\Environment
SEE_MASK_NOZONECHECKS
malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
de7e1bdc0c3d602ad997d6c79062d369
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run
de7e1bdc0c3d602ad997d6c79062d369
HKEY_CURRENT_USER\SOFTWARE\de7e1bdc0c3d602ad997d6c79062d369
[kl]

Memdumps

Base Address
Regiontype
Protect
Malicious
Download
F32000
unkown
page readonly
malicious
186A000
trusted library allocation
page execute and read and write
1AE0000
heap
page execute and read and write
6EAE000
stack
page read and write
187A000
trusted library allocation
page execute and read and write
CF2D000
stack
page read and write
A16D000
stack
page read and write
E70B000
trusted library allocation
page read and write
65ED000
stack
page read and write
AFA000
trusted library allocation
page execute and read and write
4A00000
trusted library allocation
page read and write
10DF000
stack
page read and write
185C000
trusted library allocation
page execute and read and write
52C6000
trusted library allocation
page read and write
4A23000
trusted library allocation
page read and write
1880000
trusted library allocation
page read and write
57CE000
stack
page read and write
3982000
trusted library allocation
page read and write
7B6E000
stack
page read and write
6EED000
stack
page read and write
4E8D000
stack
page read and write
32FC000
trusted library allocation
page read and write
583E000
stack
page read and write
A2B000
heap
page read and write
880000
heap
page read and write
4B00000
trusted library allocation
page read and write
3631000
trusted library allocation
page read and write
F2AE000
stack
page read and write
BFED000
stack
page read and write
AE72000
trusted library allocation
page read and write
10931000
trusted library allocation
page read and write
1710000
heap
page read and write
86AD000
stack
page read and write
C12E000
stack
page read and write
4FBD000
stack
page read and write
D50000
heap
page read and write
6B60000
heap
page read and write
4BDF000
stack
page read and write
74ED000
stack
page read and write
A62D000
stack
page read and write
5236000
trusted library allocation
page read and write
3885000
trusted library allocation
page read and write
AEC7000
trusted library allocation
page read and write
AB2D000
stack
page read and write
88EE000
stack
page read and write
D56E000
stack
page read and write
996E000
stack
page read and write
B2C9000
trusted library allocation
page read and write
4FF5000
trusted library allocation
page read and write
B821000
trusted library allocation
page read and write
AF2000
trusted library allocation
page execute and read and write
1450000
heap
page execute and read and write
6ABE000
stack
page read and write
51FE000
stack
page read and write
113E000
stack
page read and write
4741000
trusted library allocation
page read and write
55BE000
stack
page read and write
1C90000
trusted library allocation
page read and write
ADB1000
trusted library allocation
page read and write
944000
heap
page read and write
C7AD000
stack
page read and write
AFE7000
trusted library allocation
page read and write
5155000
trusted library allocation
page read and write
E0D1000
trusted library allocation
page read and write
B945000
trusted library allocation
page read and write
B32000
trusted library allocation
page execute and read and write
3821000
trusted library allocation
page read and write
2B6F000
stack
page read and write
C3AE000
stack
page read and write
84E000
stack
page read and write
E1F2000
trusted library allocation
page read and write
73AD000
stack
page read and write
1C2D000
stack
page read and write
3D4F000
trusted library allocation
page read and write
4F6A000
trusted library allocation
page read and write
DF66000
trusted library allocation
page read and write
4656000
trusted library allocation
page read and write
1430000
heap
page read and write
167D000
stack
page read and write
6070000
heap
page read and write
EB0F000
trusted library allocation
page read and write
90AD000
stack
page read and write
CF6000
stack
page read and write
CB2E000
stack
page read and write
CCAD000
stack
page read and write
4CDE000
stack
page read and write
B8BA000
trusted library allocation
page read and write
BEED000
stack
page read and write
A4ED000
stack
page read and write
842E000
stack
page read and write
1830000
trusted library allocation
page read and write
7A2E000
stack
page read and write
4B2C000
trusted library allocation
page read and write
C8AE000
stack
page read and write
B9F0000
trusted library allocation
page read and write
69BD000
stack
page read and write
1BEE000
stack
page read and write
ACAE000
stack
page read and write
1867000
trusted library allocation
page execute and read and write
623C000
heap
page read and write
946D000
stack
page read and write
8A2E000
stack
page read and write
C52D000
stack
page read and write
CDAE000
stack
page read and write
632C000
stack
page read and write
547E000
stack
page read and write
A26D000
stack
page read and write
6B3D000
stack
page read and write
E862000
trusted library allocation
page read and write
B99A000
trusted library allocation
page read and write
38C1000
trusted library allocation
page read and write
B57000
trusted library allocation
page execute and read and write
5120000
trusted library allocation
page read and write
143C000
heap
page read and write
38C4000
trusted library allocation
page read and write
E2D000
heap
page read and write
5C8E000
stack
page read and write
A9ED000
stack
page read and write
1348000
heap
page read and write
49ED000
trusted library allocation
page read and write
590E000
stack
page read and write
A8AD000
stack
page read and write
24DE000
stack
page read and write
B40000
heap
page read and write
E9B8000
trusted library allocation
page read and write
B70F000
trusted library allocation
page read and write
4BCD000
stack
page read and write
DD0000
heap
page execute and read and write
109A6000
trusted library allocation
page read and write
49BF000
stack
page read and write
5D8E000
stack
page read and write
4FBF000
trusted library allocation
page read and write
8FB000
heap
page read and write
ACD6000
heap
page read and write
520E000
stack
page read and write
730000
heap
page read and write
4C2D000
trusted library allocation
page read and write
47EC000
trusted library allocation
page read and write
E17C000
trusted library allocation
page read and write
87E000
stack
page read and write
BEAD000
stack
page read and write
E09C000
trusted library allocation
page read and write
8F6000
trusted library allocation
page execute and read and write
E5B5000
trusted library allocation
page read and write
87EE000
stack
page read and write
DF11000
trusted library allocation
page read and write
3EB000
stack
page read and write
580D000
stack
page read and write
6370000
trusted library allocation
page execute and read and write
149E000
stack
page read and write
510D000
stack
page read and write
6F9000
stack
page read and write
568E000
stack
page read and write
4962000
trusted library allocation
page read and write
4A58000
trusted library allocation
page read and write
529E000
stack
page read and write
DFC000
trusted library allocation
page execute and read and write
F30000
unkown
page readonly
4D44000
trusted library allocation
page read and write
3FB4000
trusted library allocation
page read and write
B440000
trusted library allocation
page read and write
BEE000
stack
page read and write
F40000
unkown
page readonly
F16E000
stack
page read and write
4AD0000
heap
page read and write
A00000
trusted library allocation
page read and write
CC6E000
stack
page read and write
B093000
trusted library allocation
page read and write
518B000
trusted library allocation
page read and write
524E000
stack
page read and write
AC6D000
stack
page read and write
1364000
heap
page read and write
C2E000
stack
page read and write
8FA000
trusted library allocation
page execute and read and write
54CA000
trusted library allocation
page read and write
490C000
trusted library allocation
page read and write
4AA1000
trusted library allocation
page read and write
DCEE000
stack
page read and write
914000
heap
page read and write
5A50000
heap
page read and write
1850000
trusted library allocation
page read and write
5FEE000
stack
page read and write
6D6E000
stack
page read and write
B5B000
trusted library allocation
page execute and read and write
117E000
stack
page read and write
50BE000
stack
page read and write
AE0000
trusted library allocation
page read and write
E0A000
trusted library allocation
page execute and read and write
5A4E000
stack
page read and write
ADE6000
trusted library allocation
page read and write
F06E000
stack
page read and write
766D000
stack
page read and write
55B3000
trusted library allocation
page read and write
D02E000
stack
page read and write
98B000
stack
page read and write
4796000
trusted library allocation
page read and write
A76D000
stack
page read and write
4D99000
trusted library allocation
page read and write
B1C000
trusted library allocation
page execute and read and write
802D000
stack
page read and write
7B2D000
stack
page read and write
1842000
trusted library allocation
page execute and read and write
8A6E000
stack
page read and write
16BD000
stack
page read and write
C62E000
stack
page read and write
4EEF000
trusted library allocation
page read and write
906E000
stack
page read and write
4AD7000
trusted library allocation
page read and write
E10000
heap
page read and write
594D000
stack
page read and write
A3AD000
stack
page read and write
1280000
heap
page read and write
B9E000
stack
page read and write
992D000
stack
page read and write
B182000
trusted library allocation
page read and write
B00000
heap
page read and write
E474000
trusted library allocation
page read and write
DBAD000
stack
page read and write
5BAE000
stack
page read and write
DF6000
trusted library allocation
page execute and read and write
C8ED000
stack
page read and write
5DCE000
stack
page read and write
3824000
trusted library allocation
page read and write
725000
heap
page read and write
E047000
trusted library allocation
page read and write
CF9000
stack
page read and write
184A000
trusted library allocation
page execute and read and write
8C0000
heap
page execute and read and write
9D0000
heap
page read and write
920000
heap
page read and write
EBB8000
trusted library allocation
page read and write
4F25000
trusted library allocation
page read and write
C16E000
stack
page read and write
5534000
trusted library allocation
page read and write
8E8000
heap
page read and write
191E000
stack
page read and write
8DEE000
stack
page read and write
EB58000
trusted library allocation
page read and write
4E44000
trusted library allocation
page read and write
558A000
trusted library allocation
page read and write
3FD6000
trusted library allocation
page read and write
DDED000
stack
page read and write
942E000
stack
page read and write
DC0000
trusted library allocation
page execute and read and write
1220000
trusted library allocation
page read and write
61B6000
heap
page read and write
AE1C000
trusted library allocation
page read and write
5462000
trusted library allocation
page read and write
D8EE000
stack
page read and write
912000
trusted library allocation
page execute and read and write
18CE000
stack
page read and write
91EE000
stack
page read and write
CEEE000
stack
page read and write
4FD0000
heap
page read and write
E228000
trusted library allocation
page read and write
E80C000
trusted library allocation
page read and write
73ED000
stack
page read and write
6C6E000
stack
page read and write
57CE000
stack
page read and write
62AD000
stack
page read and write
806D000
stack
page read and write
548E000
stack
page read and write
E761000
trusted library allocation
page read and write
8CAE000
stack
page read and write
B844000
trusted library allocation
page read and write
A12E000
stack
page read and write
4D0E000
trusted library allocation
page read and write
3CB000
stack
page read and write
E313000
trusted library allocation
page read and write
502A000
trusted library allocation
page read and write
E90D000
trusted library allocation
page read and write
DA2E000
stack
page read and write
4C83000
trusted library allocation
page read and write
B80F000
trusted library allocation
page read and write
AB6E000
stack
page read and write
64AD000
stack
page read and write
61EB000
heap
page read and write
5EEE000
stack
page read and write
188B000
trusted library allocation
page execute and read and write
4D8D000
stack
page read and write
EA0E000
trusted library allocation
page read and write
4B82000
trusted library allocation
page read and write
890000
heap
page read and write
662D000
stack
page read and write
533E000
stack
page read and write
3A3E000
trusted library allocation
page read and write
181E000
stack
page read and write
72AD000
stack
page read and write
5095000
trusted library allocation
page read and write
56FE000
stack
page read and write
D3ED000
stack
page read and write
DFA000
trusted library allocation
page execute and read and write
1860000
trusted library allocation
page read and write
537D000
stack
page read and write
531C000
trusted library allocation
page read and write
54FF000
trusted library allocation
page read and write
E44000
heap
page read and write
55FE000
stack
page read and write
6F6000
stack
page read and write
4FB8000
trusted library allocation
page read and write
850000
heap
page read and write
D40000
heap
page read and write
81AD000
stack
page read and write
B2A000
trusted library allocation
page execute and read and write
140C000
heap
page read and write
57FD000
stack
page read and write
6F6000
stack
page read and write
83EE000
stack
page read and write
8FD000
heap
page read and write
49FE000
stack
page read and write
50AE000
heap
page read and write
2C3B000
trusted library allocation
page read and write
AF92000
trusted library allocation
page read and write
1CB0000
trusted library allocation
page read and write
6B50000
heap
page read and write
8E0000
heap
page read and write
ACBE000
heap
page read and write
885000
heap
page read and write
AF5C000
trusted library allocation
page read and write
C2AE000
stack
page read and write
4897000
trusted library allocation
page read and write
4997000
trusted library allocation
page read and write
A2AD000
stack
page read and write
636C000
stack
page read and write
E963000
trusted library allocation
page read and write
E3B3000
trusted library allocation
page read and write
D52D000
stack
page read and write
7CAD000
stack
page read and write
F02E000
stack
page read and write
EA64000
trusted library allocation
page read and write
B2B4000
trusted library allocation
page read and write
9BED000
stack
page read and write
8F0000
trusted library allocation
page read and write
A8EE000
stack
page read and write
82AD000
stack
page read and write
1CA0000
trusted library allocation
page execute and read and write
E8B7000
trusted library allocation
page read and write
D90000
heap
page read and write
8E2D000
stack
page read and write
D10000
heap
page read and write
ACB0000
heap
page read and write
D1AD000
stack
page read and write
523E000
stack
page read and write
5ECE000
stack
page read and write
3FB1000
trusted library allocation
page read and write
1340000
heap
page read and write
E7B6000
trusted library allocation
page read and write
F530000
heap
page read and write
DEA000
trusted library allocation
page execute and read and write
C0F000
stack
page read and write
1852000
trusted library allocation
page execute and read and write
DD0000
trusted library allocation
page read and write
4CB9000
trusted library allocation
page read and write
4BE0000
heap
page read and write
7DEE000
stack
page read and write
B4DA000
trusted library allocation
page read and write
B564000
trusted library allocation
page read and write
56CE000
stack
page read and write
982D000
stack
page read and write
D3E000
stack
page read and write
B683000
trusted library allocation
page read and write
EB7A000
trusted library allocation
page read and write
AF1D000
trusted library allocation
page read and write
956E000
stack
page read and write
50FE000
stack
page read and write
6380000
trusted library allocation
page read and write
A04000
trusted library allocation
page read and write
8E2000
trusted library allocation
page execute and read and write
B12000
trusted library allocation
page execute and read and write
D6AD000
stack
page read and write
580E000
stack
page read and write
C3EE000
stack
page read and write
7EED000
stack
page read and write
A18000
heap
page read and write
EB5B000
trusted library allocation
page read and write
B7B9000
trusted library allocation
page read and write
49BE000
stack
page read and write
82ED000
stack
page read and write
B10000
trusted library allocation
page read and write
1882000
trusted library allocation
page read and write
856D000
stack
page read and write
10A1C000
trusted library allocation
page read and write
EAB9000
trusted library allocation
page read and write
1947000
heap
page read and write
134E000
heap
page read and write
514F000
stack
page read and write
8CEE000
stack
page read and write
A66D000
stack
page read and write
5A4E000
stack
page read and write
726E000
stack
page read and write
53FC000
trusted library allocation
page read and write
DCAE000
stack
page read and write
10FB000
trusted library allocation
page execute and read and write
E147000
trusted library allocation
page read and write
9AAE000
stack
page read and write
D16E000
stack
page read and write
D42E000
stack
page read and write
DFD1000
trusted library allocation
page read and write
38E3000
trusted library allocation
page read and write
52E0000
heap
page read and write
1CD0000
heap
page read and write
A7AD000
stack
page read and write
7DAD000
stack
page read and write
53A7000
trusted library allocation
page read and write
CDED000
stack
page read and write
9F0000
heap
page read and write
712E000
stack
page read and write
185A000
trusted library allocation
page execute and read and write
762E000
stack
page read and write
6DAE000
stack
page read and write
4DCF000
trusted library allocation
page read and write
87AE000
stack
page read and write
4ABF000
stack
page read and write
4828000
trusted library allocation
page read and write
E409000
trusted library allocation
page read and write
79ED000
stack
page read and write
B6B9000
trusted library allocation
page read and write
93B000
trusted library allocation
page execute and read and write
97E000
stack
page read and write
A43000
heap
page read and write
D75000
heap
page read and write
D0F000
stack
page read and write
B60E000
trusted library allocation
page read and write
E25D000
trusted library allocation
page read and write
C02D000
stack
page read and write
DF0000
trusted library allocation
page read and write
720000
heap
page read and write
892D000
stack
page read and write
B12D000
trusted library allocation
page read and write
9C2E000
stack
page read and write
1717000
heap
page read and write
D06D000
stack
page read and write
140E000
heap
page read and write
B309000
trusted library allocation
page read and write
7C6D000
stack
page read and write
65AE000
stack
page read and write
8EA000
trusted library allocation
page execute and read and write
6FED000
stack
page read and write
10F0000
trusted library allocation
page read and write
8D0000
trusted library allocation
page read and write
937000
trusted library allocation
page execute and read and write
B8EF000
trusted library allocation
page read and write
8F2000
trusted library allocation
page execute and read and write
3317000
trusted library allocation
page read and write
5291000
trusted library allocation
page read and write
A10000
heap
page read and write
12F6000
stack
page read and write
EF2E000
stack
page read and write
B16000
trusted library allocation
page execute and read and write
A02E000
stack
page read and write
8BAE000
stack
page read and write
1940000
heap
page read and write
2BB0000
trusted library allocation
page read and write
95AE000
stack
page read and write
46B6000
trusted library allocation
page read and write
4BD7000
trusted library allocation
page read and write
880000
heap
page read and write
4AC0000
heap
page read and write
D92E000
stack
page read and write
B50F000
trusted library allocation
page read and write
8B6E000
stack
page read and write
1210000
trusted library allocation
page execute and read and write
8F6D000
stack
page read and write
9C30000
heap
page read and write
9D30000
heap
page read and write
E55F000
trusted library allocation
page read and write
510B000
trusted library allocation
page read and write
697E000
stack
page read and write
600E000
stack
page read and write
8F2E000
stack
page read and write
4E7A000
trusted library allocation
page read and write
2821000
trusted library allocation
page read and write
590E000
stack
page read and write
E18000
heap
page read and write
DE2000
trusted library allocation
page execute and read and write
D2AE000
stack
page read and write
29C8000
trusted library allocation
page read and write
932D000
stack
page read and write
760000
heap
page read and write
11CE000
stack
page read and write
1204000
trusted library allocation
page read and write
D70000
heap
page read and write
E4F4000
trusted library allocation
page read and write
606D000
stack
page read and write
90A000
trusted library allocation
page execute and read and write
DB6E000
stack
page read and write
2FB3000
trusted library allocation
page read and write
11F0000
heap
page read and write
B5BA000
trusted library allocation
page read and write
C76E000
stack
page read and write
10E2000
trusted library allocation
page execute and read and write
816D000
stack
page read and write
5BB0000
heap
page read and write
10EA000
trusted library allocation
page execute and read and write
4841000
trusted library allocation
page read and write
B1D8000
trusted library allocation
page read and write
602D000
stack
page read and write
5CEE000
stack
page read and write
E2B000
heap
page read and write
F565000
heap
page read and write
91A000
trusted library allocation
page execute and read and write
56CE000
stack
page read and write
E529000
trusted library allocation
page read and write
28C3000
trusted library allocation
page read and write
C4EE000
stack
page read and write
B1A000
trusted library allocation
page execute and read and write
A52E000
stack
page read and write
6AFE000
stack
page read and write
39E0000
trusted library allocation
page read and write
2C62000
trusted library allocation
page read and write
1887000
trusted library allocation
page execute and read and write
3924000
trusted library allocation
page read and write
1C6D000
stack
page read and write
FDA000
stack
page read and write
2A10000
trusted library allocation
page read and write
4631000
trusted library allocation
page read and write
16E0000
heap
page read and write
28C1000
trusted library allocation
page read and write
B3EA000
trusted library allocation
page read and write
4D7D000
stack
page read and write
776D000
stack
page read and write
C26E000
stack
page read and write
1872000
trusted library allocation
page execute and read and write
14A5000
heap
page read and write
F1AE000
stack
page read and write
1450000
heap
page read and write
4B10000
trusted library allocation
page execute and read and write
CB6D000
stack
page read and write
C30000
heap
page read and write
716E000
stack
page read and write
A3ED000
stack
page read and write
ADF000
stack
page read and write
57BD000
stack
page read and write
9A6D000
stack
page read and write
544D000
stack
page read and write
2A9A000
trusted library allocation
page read and write
1440000
heap
page read and write
558D000
stack
page read and write
78EE000
stack
page read and write
7F2D000
stack
page read and write
D7ED000
stack
page read and write
DA6D000
stack
page read and write
B764000
trusted library allocation
page read and write
5371000
trusted library allocation
page read and write
702E000
stack
page read and write
DF9C000
trusted library allocation
page read and write
91AE000
stack
page read and write
97EE000
stack
page read and write
B0F7000
trusted library allocation
page read and write
4CEE000
stack
page read and write
96ED000
stack
page read and write
52DD000
stack
page read and write
14A0000
heap
page read and write
B25E000
trusted library allocation
page read and write
594F000
stack
page read and write
B475000
trusted library allocation
page read and write
46EB000
trusted library allocation
page read and write
4ECD000
stack
page read and write
62EB000
stack
page read and write
E660000
trusted library allocation
page read and write
D7AD000
stack
page read and write
5DEE000
stack
page read and write
534E000
stack
page read and write
5A4E000
stack
page read and write
9CE000
stack
page read and write
E43E000
trusted library allocation
page read and write
A2D000
heap
page read and write
5490000
heap
page read and write
C9EE000
stack
page read and write
B864000
trusted library allocation
page read and write
4E80000
heap
page read and write
468C000
trusted library allocation
page read and write
1200000
trusted library allocation
page read and write
B3A000
trusted library allocation
page execute and read and write
4AAD000
stack
page read and write
D28000
trusted library allocation
page read and write
5F0E000
stack
page read and write
5840000
heap
page read and write
866E000
stack
page read and write
95D000
heap
page read and write
1CD7000
heap
page read and write
B33F000
trusted library allocation
page read and write
AE92000
trusted library allocation
page read and write
77AE000
stack
page read and write
CA2E000
stack
page read and write
E60A000
trusted library allocation
page read and write
9BAE000
stack
page read and write
4B20000
trusted library allocation
page read and write
6B40000
heap
page read and write
5450000
heap
page read and write
60B5000
heap
page read and write
594E000
stack
page read and write
4E7D000
stack
page read and write
96AE000
stack
page read and write
538D000
stack
page read and write
3633000
trusted library allocation
page read and write
D66E000
stack
page read and write
2FB1000
trusted library allocation
page read and write
78AD000
stack
page read and write
D2ED000
stack
page read and write
958000
heap
page read and write
1F58D000
trusted library allocation
page read and write
6390000
unclassified section
page read and write
54BE000
stack
page read and write
5060000
trusted library allocation
page read and write
C66E000
stack
page read and write
572E000
stack
page read and write
9E30000
heap
page read and write
B394000
trusted library allocation
page read and write
E349000
trusted library allocation
page read and write
687E000
stack
page read and write
DF2000
trusted library allocation
page execute and read and write
92EE000
stack
page read and write
8FC000
trusted library allocation
page execute and read and write
4FCE000
stack
page read and write
AA2D000
stack
page read and write
10F7000
trusted library allocation
page execute and read and write
752E000
stack
page read and write
B5D8000
trusted library allocation
page read and write
127E000
stack
page read and write
B03D000
trusted library allocation
page read and write
3904000
trusted library allocation
page read and write
E6B5000
trusted library allocation
page read and write
5216000
trusted library allocation
page read and write
2C6F000
stack
page read and write
852E000
stack
page read and write
There are 616 hidden memdumps, click here to show them.