IOC Report
1rjcA65eoG.exe

loading gifFilesProcessesURLsIPsRegistryMemdumps21010010Label

Files

File Path
Type
Category
Malicious
Download
1rjcA65eoG.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\1rjcA65eoG.exe.log
ASCII text, with CRLF line terminators
dropped
malicious

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\1rjcA65eoG.exe
"C:\Users\user\Desktop\1rjcA65eoG.exe"
malicious

URLs

Name
IP
Malicious
http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-soap-message-security-1.0#Text
unknown
http://schemas.xmlsoap.org/ws/2005/02/sc/sct
unknown
http://schemas.xmlsoap.org/ws/2004/04/security/sc/dk
unknown
http://tempuri.org/Entity/Id23ResponseD
unknown
http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-soap-message-security-1.0#HexBinary
unknown
http://tempuri.org/Entity/Id12Response
unknown
http://tempuri.org/
unknown
http://tempuri.org/Entity/Id2Response
unknown
http://schemas.xmlsoap.org/ws/2005/02/sc/dk/p_sha1
unknown
http://tempuri.org/Entity/Id21Response
unknown
http://schemas.xmlsoap.org/2005/02/trust/spnego#GSS_Wrap
unknown
http://tempuri.org/Entity/Id9
unknown
http://docs.oasis-open.org/wss/oasis-wss-saml-token-profile-1.1#SAMLID
unknown
http://tempuri.org/Entity/Id8
unknown
http://tempuri.org/Entity/Id5
unknown
http://schemas.xmlsoap.org/ws/2004/10/wsat/Prepare
unknown
http://tempuri.org/Entity/Id4
unknown
http://tempuri.org/Entity/Id7
unknown
http://purl.oen
unknown
http://tempuri.org/Entity/Id6
unknown
http://schemas.xmlsoap.org/ws/2005/02/trust#BinarySecret
unknown
http://tempuri.org/Entity/Id19Response
unknown
http://docs.oasis-open.org/wss/oasis-wss-rel-token-profile-1.0.pdf#license
unknown
http://schemas.xmlsoap.org/ws/2005/02/trust/RSTR/Issue
unknown
http://schemas.xmlsoap.org/ws/2004/10/wsat/Aborted
unknown
http://schemas.xmlsoap.org/ws/2005/02/rm/TerminateSequence
unknown
http://schemas.xmlsoap.org/ws/2004/10/wsat/fault
unknown
http://schemas.xmlsoap.org/ws/2004/10/wsat
unknown
http://docs.oasis-open.org/wss/oasis-wss-soap-message-security-1.1#EncryptedKey
unknown
http://tempuri.org/Entity/Id15Response
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
http://schemas.xmlsoap.org/ws/2005/02/trust/RSTR/SCT/Renew
unknown
http://schemas.xmlsoap.org/ws/2004/10/wscoor/Register
unknown
http://tempuri.org/Entity/Id6Response
unknown
http://schemas.xmlsoap.org/ws/2004/04/trust/SymmetricKey
unknown
https://api.ip.sb/ip
unknown
http://schemas.xmlsoap.org/ws/2004/04/sc
unknown
http://tempuri.org/Entity/Id1ResponseD
unknown
http://schemas.xmlsoap.org/ws/2004/10/wsat/Volatile2PC
unknown
http://schemas.xmlsoap.org/ws/2005/02/trust/RSTR/SCT/Cancel
unknown
http://tempuri.org/Entity/Id9Response
unknown
http://tempuri.org/Entity/Id20
unknown
http://tempuri.org/Entity/Id21
unknown
http://tempuri.org/Entity/Id22
unknown
http://docs.oasis-open.org/wss/oasis-wss-kerberos-token-profile-1.1#Kerberosv5APREQSHA1
unknown
http://tempuri.org/Entity/Id23
unknown
http://schemas.xmlsoap.org/ws/2004/04/security/trust/CK/PSHA1
unknown
http://tempuri.org/Entity/Id24
unknown
http://schemas.xmlsoap.org/ws/2004/04/security/trust/RSTR/Issue
unknown
http://tempuri.org/Entity/Id24Response
unknown
http://tempuri.org/Entity/Id1Response
unknown
http://schemas.xmlsoap.org/ws/2005/02/rm/AckRequested
unknown
http://schemas.xmlsoap.org/ws/2004/10/wsat/ReadOnly
unknown
http://schemas.xmlsoap.org/ws/2004/10/wsat/Replay
unknown
http://schemas.xmlsoap.org/ws/2005/02/trust/tlsnego
unknown
http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-soap-message-security-1.0#Base64Binary
unknown
http://schemas.xmlsoap.org/ws/2004/10/wsat/Durable2PC
unknown
http://schemas.xmlsoap.org/ws/2004/04/security/trust/SymmetricKey
unknown
http://schemas.xmlsoap.org/ws/2004/08/addressing
unknown
http://schemas.xmlsoap.org/ws/2005/02/trust/RST/Issue
unknown
http://schemas.xmlsoap.org/ws/2004/10/wsat/Completion
unknown
http://schemas.xmlsoap.org/ws/2004/04/trust
unknown
http://tempuri.org/Entity/Id10
unknown
http://tempuri.org/Entity/Id11
unknown
http://tempuri.org/Entity/Id12
unknown
http://tempuri.org/Entity/Id16Response
unknown
http://schemas.xmlsoap.org/ws/2004/10/wscoor/CreateCoordinationContextResponse
unknown
http://schemas.xmlsoap.org/ws/2005/02/trust/RST/SCT/Cancel
unknown
http://tempuri.org/Entity/Id13
unknown
http://tempuri.org/Entity/Id14
unknown
http://tempuri.org/Entity/Id15
unknown
http://tempuri.org/Entity/Id16
unknown
http://schemas.xmlsoap.org/ws/2005/02/trust/Nonce
unknown
http://tempuri.org/Entity/Id17
unknown
http://tempuri.org/Entity/Id18
unknown
http://tempuri.org/Entity/Id5Response
unknown
http://tempuri.org/Entity/Id19
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/dns
unknown
http://tempuri.org/Entity/Id10Response
unknown
http://schemas.xmlsoap.org/ws/2005/02/trust/Renew
unknown
http://tempuri.org/Entity/Id8Response
unknown
http://schemas.xmlsoap.org/ws/2004/04/trust/PublicKey
unknown
http://docs.oasis-open.org/wss/oasis-wss-saml-token-profile-1.1#SAMLV2.0
unknown
http://docs.oasis-open.org/wss/oasis-wss-saml-token-profile-1.0#SAMLAssertionID
unknown
http://schemas.xmlsoap.org/ws/2004/04/security/trust/RST/SCT
unknown
http://schemas.xmlsoap.org/ws/2006/02/addressingidentity
unknown
http://schemas.xmlsoap.org/soap/envelope/
unknown
http://schemas.xmlsoap.org/ws/2005/02/trust/PublicKey
unknown
http://docs.oasis-open.org/wss/oasis-wss-soap-message-security-1.1#EncryptedKeySHA1
unknown
http://schemas.xmlsoap.org/ws/2005/02/trust
unknown
http://schemas.xmlsoap.org/ws/2004/10/wsat/Rollback
unknown
http://tempuri.org/Entity/Id23Response
unknown
http://schemas.xmlsoap.org/ws/2004/04/security/trust/RSTR/SCT
unknown
http://tempuri.org/D
unknown
http://schemas.xmlsoap.org/ws/2004/06/addressingex
unknown
http://schemas.xmlsoap.org/ws/2004/10/wscoor
unknown
http://schemas.xmlsoap.org/ws/2004/04/security/trust/Nonce
unknown
http://schemas.xmlsoap.org/ws/2005/02/rm/CreateSequenceResponse
unknown
http://schemas.xmlsoap.org/ws/2004/08/addressing/fault
unknown
http://schemas.xmlsoap.org/ws/2005/02/trust/RST/SCT/Renew
unknown
There are 90 hidden URLs, click here to show them.

IPs

IP
Domain
Country
Malicious
185.153.198.36
unknown
Russian Federation
malicious

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
Owner
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
SessionHash
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
Sequence
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
RegFiles0000
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
RegFilesHash
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
Owner
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
SessionHash
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
Sequence
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
RegFiles0000
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
RegFilesHash

Memdumps

Base Address
Regiontype
Protect
Malicious
Download
2876000
trusted library allocation
page read and write
malicious
462000
unkown
page readonly
malicious
2D30000
trusted library allocation
page read and write
7430000
heap
page read and write
A73000
heap
page read and write
3B46000
trusted library allocation
page read and write
2ADB000
trusted library allocation
page read and write
5D55000
heap
page read and write
E0E000
stack
page read and write
2BF9000
trusted library allocation
page read and write
3BEC000
trusted library allocation
page read and write
4C8D000
trusted library allocation
page read and write
2960000
trusted library allocation
page read and write
5CD6000
heap
page read and write
9C5000
heap
page read and write
4F10000
trusted library allocation
page read and write
28E5000
trusted library allocation
page read and write
6A1F000
trusted library allocation
page read and write
714F000
stack
page read and write
97D000
stack
page read and write
590E000
stack
page read and write
69CD000
stack
page read and write
29A7000
trusted library allocation
page read and write
747B000
heap
page read and write
9B4000
trusted library allocation
page read and write
CC2000
trusted library allocation
page read and write
28DC000
trusted library allocation
page read and write
27DE000
stack
page read and write
295A000
trusted library allocation
page read and write
520E000
stack
page read and write
3923000
trusted library allocation
page read and write
3BF1000
trusted library allocation
page read and write
3AA0000
trusted library allocation
page read and write
530E000
stack
page read and write
3AF4000
trusted library allocation
page read and write
2C0C000
trusted library allocation
page read and write
29B6000
trusted library allocation
page read and write
508F000
stack
page read and write
2DCD000
trusted library allocation
page read and write
2CAD000
trusted library allocation
page read and write
CC7000
trusted library allocation
page execute and read and write
3B39000
trusted library allocation
page read and write
2905000
trusted library allocation
page read and write
6A32000
trusted library allocation
page read and write
684D000
stack
page read and write
2A10000
trusted library allocation
page read and write
392A000
trusted library allocation
page read and write
6ABD000
stack
page read and write
5DC3000
heap
page read and write
4CA0000
trusted library allocation
page read and write
6A0F000
trusted library allocation
page read and write
5A3E000
trusted library allocation
page read and write
7474000
heap
page read and write
2D20000
trusted library allocation
page read and write
39A5000
trusted library allocation
page read and write
2D4D000
trusted library allocation
page read and write
28CF000
trusted library allocation
page read and write
39BB000
trusted library allocation
page read and write
2956000
trusted library allocation
page read and write
8F7000
stack
page read and write
2B21000
trusted library allocation
page read and write
39D2000
trusted library allocation
page read and write
FDE000
stack
page read and write
39B2000
trusted library allocation
page read and write
29D6000
trusted library allocation
page read and write
3C36000
trusted library allocation
page read and write
26D0000
heap
page read and write
5C90000
trusted library allocation
page read and write
69F0000
trusted library allocation
page read and write
5DCE000
heap
page read and write
6B20000
trusted library allocation
page read and write
7A70000
heap
page read and write
5CA0000
trusted library allocation
page execute and read and write
5E40000
trusted library allocation
page execute and read and write
3C3B000
trusted library allocation
page read and write
2958000
trusted library allocation
page read and write
79D0000
trusted library allocation
page read and write
600A000
trusted library allocation
page read and write
4D40000
heap
page read and write
4F15000
trusted library allocation
page read and write
4F18000
trusted library allocation
page read and write
39C9000
trusted library allocation
page read and write
5A32000
trusted library allocation
page read and write
3C2B000
trusted library allocation
page read and write
93E000
stack
page read and write
3907000
trusted library allocation
page read and write
5DAE000
heap
page read and write
2C16000
trusted library allocation
page read and write
5A0F000
stack
page read and write
2BE5000
trusted library allocation
page read and write
2C8E000
trusted library allocation
page read and write
2C11000
trusted library allocation
page read and write
3966000
trusted library allocation
page read and write
2E04000
trusted library allocation
page read and write
6A20000
trusted library allocation
page read and write
5D51000
heap
page read and write
5A10000
trusted library allocation
page read and write
3918000
trusted library allocation
page read and write
9D0000
heap
page read and write
76EE000
stack
page read and write
3940000
trusted library allocation
page read and write
3C12000
trusted library allocation
page read and write
3978000
trusted library allocation
page read and write
2AA8000
trusted library allocation
page read and write
3B8A000
trusted library allocation
page read and write
5B50000
trusted library allocation
page execute and read and write
4C92000
trusted library allocation
page read and write
9BD000
trusted library allocation
page execute and read and write
5D35000
heap
page read and write
3C18000
trusted library allocation
page read and write
2DD5000
trusted library allocation
page read and write
6A08000
trusted library allocation
page read and write
3BB9000
trusted library allocation
page read and write
4C64000
trusted library allocation
page read and write
4D50000
trusted library allocation
page read and write
5A1B000
trusted library allocation
page read and write
FF0000
heap
page read and write
78E1000
heap
page read and write
5A21000
trusted library allocation
page read and write
C9E000
stack
page read and write
39E3000
trusted library allocation
page read and write
4A6000
unkown
page readonly
2AF1000
trusted library allocation
page read and write
70CE000
stack
page read and write
3B2E000
trusted library allocation
page read and write
5A26000
trusted library allocation
page read and write
3C30000
trusted library allocation
page read and write
6890000
trusted library allocation
page read and write
2CB3000
trusted library allocation
page read and write
6A1A000
trusted library allocation
page read and write
9DE000
heap
page read and write
CF0000
trusted library allocation
page execute and read and write
2B42000
trusted library allocation
page read and write
5D64000
heap
page read and write
3916000
trusted library allocation
page read and write
2618000
trusted library allocation
page read and write
26B0000
heap
page execute and read and write
5FA0000
trusted library allocation
page read and write
29DD000
trusted library allocation
page read and write
CCB000
trusted library allocation
page execute and read and write
5D7A000
heap
page read and write
2E0F000
trusted library allocation
page read and write
50CE000
stack
page read and write
2B2B000
trusted library allocation
page read and write
6B6E000
stack
page read and write
497000
unkown
page readonly
3B66000
trusted library allocation
page read and write
3BE5000
trusted library allocation
page read and write
5A80000
trusted library allocation
page read and write
FE0000
trusted library allocation
page read and write
391E000
trusted library allocation
page read and write
5DA2000
heap
page read and write
CE0000
trusted library allocation
page read and write
2C84000
trusted library allocation
page read and write
5DD0000
trusted library allocation
page execute and read and write
3B8F000
trusted library allocation
page read and write
5E0000
heap
page read and write
29AA000
trusted library allocation
page read and write
743E000
heap
page read and write
73D0000
heap
page read and write
CAD000
trusted library allocation
page execute and read and write
2952000
trusted library allocation
page read and write
75E7000
trusted library allocation
page read and write
2D29000
trusted library allocation
page read and write
3BC6000
trusted library allocation
page read and write
3B27000
trusted library allocation
page read and write
2C05000
trusted library allocation
page read and write
5DBC000
heap
page read and write
AB9000
heap
page read and write
2AE5000
trusted library allocation
page read and write
3B1A000
trusted library allocation
page read and write
6BAE000
stack
page read and write
2E20000
trusted library allocation
page read and write
3801000
trusted library allocation
page read and write
29B3000
trusted library allocation
page read and write
3C1F000
trusted library allocation
page read and write
729F000
stack
page read and write
69F2000
trusted library allocation
page read and write
69F9000
trusted library allocation
page read and write
4F70000
trusted library allocation
page read and write
5B0000
heap
page read and write
710E000
stack
page read and write
2AC9000
trusted library allocation
page read and write
688B000
stack
page read and write
460000
unkown
page readonly
28BF000
trusted library allocation
page read and write
3BDA000
trusted library allocation
page read and write
2DC4000
trusted library allocation
page read and write
3C28000
trusted library allocation
page read and write
2A04000
trusted library allocation
page read and write
7453000
heap
page read and write
3A90000
trusted library allocation
page read and write
7411000
heap
page read and write
4CF0000
heap
page execute and read and write
9B3000
trusted library allocation
page execute and read and write
5CD0000
heap
page read and write
3AA8000
trusted library allocation
page read and write
CB0000
trusted library allocation
page read and write
54A000
stack
page read and write
491C000
stack
page read and write
5CB0000
trusted library allocation
page read and write
A75000
heap
page read and write
4F80000
heap
page read and write
9A0000
trusted library allocation
page read and write
3C0B000
trusted library allocation
page read and write
396D000
trusted library allocation
page read and write
2BCB000
trusted library allocation
page read and write
9B0000
trusted library allocation
page read and write
4F6E000
stack
page read and write
3BD3000
trusted library allocation
page read and write
4F00000
trusted library allocation
page execute and read and write
293C000
trusted library allocation
page read and write
2BBA000
trusted library allocation
page read and write
492000
unkown
page readonly
3C01000
trusted library allocation
page read and write
3913000
trusted library allocation
page read and write
74C1000
heap
page read and write
390A000
trusted library allocation
page read and write
68C0000
heap
page read and write
6A30000
trusted library allocation
page read and write
73D6000
heap
page read and write
4D63000
heap
page read and write
69F5000
trusted library allocation
page read and write
5CF4000
heap
page read and write
3B40000
trusted library allocation
page read and write
78D0000
heap
page read and write
6000000
trusted library allocation
page read and write
29C9000
trusted library allocation
page read and write
6A24000
trusted library allocation
page read and write
3B7C000
trusted library allocation
page read and write
39CE000
trusted library allocation
page read and write
78E6000
heap
page read and write
5D00000
heap
page read and write
2DF0000
trusted library allocation
page read and write
5A65000
trusted library allocation
page read and write
3BF6000
trusted library allocation
page read and write
39BF000
trusted library allocation
page read and write
5B00000
trusted library allocation
page read and write
FF6000
heap
page read and write
29EF000
trusted library allocation
page read and write
6B00000
trusted library allocation
page read and write
4CBE000
trusted library allocation
page read and write
6A15000
trusted library allocation
page read and write
5D29000
heap
page read and write
3B73000
trusted library allocation
page read and write
5B60000
trusted library allocation
page execute and read and write
39B6000
trusted library allocation
page read and write
CC0000
trusted library allocation
page read and write
6A35000
trusted library allocation
page read and write
3989000
trusted library allocation
page read and write
2E16000
trusted library allocation
page read and write
27E1000
trusted library allocation
page read and write
4CC0000
trusted library allocation
page read and write
5E2C000
stack
page read and write
FFE000
heap
page read and write
73F6000
heap
page read and write
5AA0000
trusted library allocation
page execute and read and write
2A9A000
trusted library allocation
page read and write
2A3C000
trusted library allocation
page read and write
39AC000
trusted library allocation
page read and write
4C81000
trusted library allocation
page read and write
2B26000
trusted library allocation
page read and write
3984000
trusted library allocation
page read and write
3B85000
trusted library allocation
page read and write
2DFD000
trusted library allocation
page read and write
5AD0000
trusted library allocation
page read and write
2915000
trusted library allocation
page read and write
A13000
heap
page read and write
4D60000
heap
page read and write
5B70000
trusted library allocation
page read and write
719E000
stack
page read and write
4C60000
trusted library allocation
page read and write
6A0A000
trusted library allocation
page read and write
5A60000
trusted library allocation
page read and write
29BC000
trusted library allocation
page read and write
295E000
trusted library allocation
page read and write
399E000
trusted library allocation
page read and write
39C1000
trusted library allocation
page read and write
4CD0000
trusted library allocation
page read and write
75E0000
trusted library allocation
page read and write
3C22000
trusted library allocation
page read and write
29F4000
trusted library allocation
page read and write
4D52000
trusted library allocation
page read and write
5CF0000
heap
page read and write
5D91000
heap
page read and write
5A90000
trusted library allocation
page read and write
2C7B000
trusted library allocation
page read and write
3B77000
trusted library allocation
page read and write
2BF2000
trusted library allocation
page read and write
2C97000
trusted library allocation
page read and write
7FC10000
trusted library allocation
page execute and read and write
5CF2000
heap
page read and write
3B60000
trusted library allocation
page read and write
4C7E000
trusted library allocation
page read and write
26C0000
trusted library allocation
page read and write
5A51000
trusted library allocation
page read and write
5AF0000
trusted library allocation
page read and write
5CD4000
heap
page read and write
5D12000
heap
page read and write
2E1B000
trusted library allocation
page read and write
3959000
trusted library allocation
page read and write
2E2B000
trusted library allocation
page read and write
39C4000
trusted library allocation
page read and write
2BC3000
trusted library allocation
page read and write
5CC0000
trusted library allocation
page read and write
2936000
trusted library allocation
page read and write
D00000
heap
page read and write
3B56000
trusted library allocation
page read and write
A7F000
heap
page read and write
2B1A000
trusted library allocation
page read and write
4CB0000
trusted library allocation
page read and write
9C0000
heap
page read and write
CBA000
trusted library allocation
page execute and read and write
2A9C000
trusted library allocation
page read and write
CB2000
trusted library allocation
page read and write
2B36000
trusted library allocation
page read and write
2CA8000
trusted library allocation
page read and write
3B6D000
trusted library allocation
page read and write
4C6B000
trusted library allocation
page read and write
2DD7000
trusted library allocation
page read and write
747E000
heap
page read and write
A04000
heap
page read and write
2D51000
trusted library allocation
page read and write
2C21000
trusted library allocation
page read and write
29E8000
trusted library allocation
page read and write
3C2E000
trusted library allocation
page read and write
2AFC000
trusted library allocation
page read and write
37E1000
trusted library allocation
page read and write
397F000
trusted library allocation
page read and write
75E9000
trusted library allocation
page read and write
4C86000
trusted library allocation
page read and write
5F4C000
stack
page read and write
29F9000
trusted library allocation
page read and write
9F7000
heap
page read and write
5A4A000
trusted library allocation
page read and write
4CC5000
trusted library allocation
page read and write
6B19000
trusted library allocation
page read and write
394C000
trusted library allocation
page read and write
5A6B000
trusted library allocation
page read and write
2A93000
trusted library allocation
page read and write
7150000
trusted library allocation
page execute and read and write
2CA3000
trusted library allocation
page read and write
5310000
trusted library allocation
page read and write
A11000
heap
page read and write
2AD4000
trusted library allocation
page read and write
2D57000
trusted library allocation
page read and write
2DE3000
trusted library allocation
page read and write
2D3C000
trusted library allocation
page read and write
3995000
trusted library allocation
page read and write
68A0000
heap
page read and write
CB6000
trusted library allocation
page execute and read and write
6AFF000
stack
page read and write
674C000
stack
page read and write
28C3000
trusted library allocation
page read and write
2AC2000
trusted library allocation
page read and write
5A6E000
trusted library allocation
page read and write
73DF000
heap
page read and write
2C2D000
trusted library allocation
page read and write
5CED000
heap
page read and write
3B4A000
trusted library allocation
page read and write
5AE0000
trusted library allocation
page read and write
37EF000
trusted library allocation
page read and write
3B82000
trusted library allocation
page read and write
5DA8000
heap
page read and write
2AB5000
trusted library allocation
page read and write
5C0000
heap
page read and write
3910000
trusted library allocation
page read and write
4D00000
trusted library allocation
page read and write
CA0000
trusted library allocation
page read and write
2A89000
trusted library allocation
page read and write
6A70000
trusted library allocation
page execute and read and write
72DE000
stack
page read and write
CC5000
trusted library allocation
page execute and read and write
3BAD000
trusted library allocation
page read and write
2E37000
trusted library allocation
page read and write
2BD8000
trusted library allocation
page read and write
5DE0000
trusted library allocation
page execute and read and write
3B80000
trusted library allocation
page read and write
5D45000
heap
page read and write
6B10000
trusted library allocation
page read and write
5A70000
trusted library allocation
page read and write
5A41000
trusted library allocation
page read and write
51CE000
stack
page read and write
5F9E000
stack
page read and write
5D8A000
heap
page read and write
481B000
stack
page read and write
6A40000
trusted library allocation
page read and write
2AE0000
trusted library allocation
page read and write
5FFE000
stack
page read and write
4F1A000
trusted library allocation
page read and write
2D48000
trusted library allocation
page read and write
5D6B000
heap
page read and write
6020000
trusted library allocation
page execute and read and write
6FCE000
stack
page read and write
There are 384 hidden memdumps, click here to show them.