IOC Report
SOA.exe

loading gifFilesProcessesURLsDomainsIPsRegistryMemdumps642010010Label

Files

File Path
Type
Category
Malicious
Download
SOA.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
initial sample
malicious
C:\Users\user\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\77EC63BDA74BD0D0E0426DC8F8008506
Microsoft Cabinet archive data, Windows 2000/XP setup, 73305 bytes, 1 file, at 0x2c +A "authroot.stl", number 1, 6 datablocks, 0x1 compression
dropped
C:\Users\user\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\77EC63BDA74BD0D0E0426DC8F8008506
data
modified

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\SOA.exe
"C:\Users\user\Desktop\SOA.exe"
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe
"C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"
malicious

URLs

Name
IP
Malicious
https://www.office.com/
unknown
https://api.telegram.org/bot/sendMessage?chat_id=&text=%20%0D%0A%0D%0APC%20Name:128757%0D%0ADate%20and%20Time:%2027/03/2025%20/%2019:47:46%0D%0ACountry%20Name:%20United%20States%0D%0A%5B%20128757%20Clicked%20on%20the%20File%20If%20you%20see%20nothing%20this's%20mean%20the%20system%20storage's%20empty.%20%5D
149.154.167.220
https://duckduckgo.com/ac/?q=
unknown
https://stackoverflow.com/q/14436606/23354
unknown
https://api.telegram.org
unknown
https://github.com/mgravell/protobuf-netJ
unknown
https://api.telegram.org/bot
unknown
https://duckduckgo.com/chrome_newtabv20-
unknown
https://www.office.com/lB
unknown
https://github.com/mgravell/protobuf-net
unknown
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
unknown
https://ac.ecosia.org?q=
unknown
https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
unknown
https://chrome.google.com/webstore?hl=en4
unknown
https://reallyfreegeoip.org/xml/45.92.229.138$
unknown
https://api.telegram.org/bot/sendMessage?chat_id=&text=
unknown
https://chrome.google.com/webstore?hl=en
unknown
http://varders.kozow.com:8081
unknown
http://aborters.duckdns.org:8081
unknown
https://www.google.com/images/branding/product/ico/googleg_alldp.ico
unknown
https://api.telegram.org/bot/sendMessage?chat_id=&text=%20%0D%0A%0D%0APC%20Name:128757%0D%0ADate%20a
unknown
https://www.ecosia.org/newtab/v20
unknown
http://checkip.dyndns.org/
132.226.247.73
https://github.com/mgravell/protobuf-neti
unknown
https://www.office.com/4
unknown
http://51.38.247.67:8081/_send_.php?L
unknown
http://anotherarmy.dns.army:8081
unknown
https://stackoverflow.com/q/11564914/23354;
unknown
https://stackoverflow.com/q/2152978/23354
unknown
https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
unknown
http://checkip.dyndns.org/q
unknown
https://chrome.google.com/webstore?hl=enlB
unknown
https://reallyfreegeoip.org
unknown
https://reallyfreegeoip.org/xml/45.92.229.138
104.21.112.1
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
unknown
https://gemini.google.com/app?q=
unknown
http://51.38.247.67:8081/_send_.php?LCapplication/x-www-form-urlencoded
unknown
http://webmail.bindchocolate.com
unknown
https://reallyfreegeoip.org/xml/
unknown
There are 30 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
webmail.bindchocolate.com
185.81.237.152
malicious
bg.microsoft.map.fastly.net
199.232.90.172
reallyfreegeoip.org
104.21.112.1
api.telegram.org
149.154.167.220
checkip.dyndns.com
132.226.247.73
checkip.dyndns.org
unknown

IPs

IP
Domain
Country
Malicious
185.81.237.152
webmail.bindchocolate.com
Turkey
malicious
149.154.167.220
api.telegram.org
United Kingdom
104.21.112.1
reallyfreegeoip.org
United States
132.226.247.73
checkip.dyndns.com
United States

Registry

Path
Value
Malicious
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\InstallUtil_RASAPI32
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\InstallUtil_RASAPI32
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\InstallUtil_RASAPI32
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\InstallUtil_RASAPI32
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\InstallUtil_RASAPI32
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\InstallUtil_RASAPI32
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\InstallUtil_RASAPI32
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\InstallUtil_RASMANCS
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\InstallUtil_RASMANCS
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\InstallUtil_RASMANCS
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\InstallUtil_RASMANCS
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\InstallUtil_RASMANCS
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\InstallUtil_RASMANCS
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\InstallUtil_RASMANCS
FileDirectory
There are 5 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
Download
402000
remote allocation
page execute and read and write
malicious
2881000
trusted library allocation
page read and write
malicious
3881000
trusted library allocation
page read and write
malicious
5B30000
trusted library section
page read and write
malicious
2B71000
trusted library allocation
page read and write
malicious
38D9000
trusted library allocation
page read and write
malicious
4F5E000
stack
page read and write
2BC7000
trusted library allocation
page read and write
2DA2000
trusted library allocation
page read and write
2E8A000
trusted library allocation
page read and write
29D3000
trusted library allocation
page read and write
2CCA000
trusted library allocation
page read and write
ACE000
heap
page read and write
3CCA000
trusted library allocation
page read and write
2D26000
trusted library allocation
page read and write
2A22000
trusted library allocation
page read and write
392000
unkown
page readonly
2E99000
trusted library allocation
page read and write
CC3000
trusted library allocation
page execute and read and write
29D1000
trusted library allocation
page read and write
2D95000
trusted library allocation
page read and write
2D32000
trusted library allocation
page read and write
2B2E000
trusted library allocation
page read and write
2EC0000
trusted library allocation
page read and write
2BD6000
trusted library allocation
page read and write
5960000
trusted library allocation
page execute and read and write
584E000
stack
page read and write
2C23000
trusted library allocation
page read and write
2BAE000
trusted library allocation
page read and write
CE0000
trusted library allocation
page read and write
CE6000
trusted library allocation
page execute and read and write
CF7000
trusted library allocation
page execute and read and write
E22000
heap
page read and write
6480000
trusted library allocation
page execute and read and write
DFF000
heap
page read and write
65A2000
trusted library allocation
page read and write
2ADA000
trusted library allocation
page read and write
2C1B000
trusted library allocation
page read and write
2A28000
trusted library allocation
page read and write
2D82000
trusted library allocation
page read and write
2D7A000
trusted library allocation
page read and write
D50000
heap
page read and write
AC8000
heap
page read and write
2D74000
trusted library allocation
page read and write
2A8F000
trusted library allocation
page read and write
685A000
heap
page read and write
2ACA000
trusted library allocation
page read and write
2D07000
trusted library allocation
page read and write
2CF1000
trusted library allocation
page read and write
2AD8000
trusted library allocation
page read and write
2BE4000
trusted library allocation
page read and write
2C87000
trusted library allocation
page read and write
5C8D000
heap
page read and write
2EED000
trusted library allocation
page read and write
D22000
trusted library allocation
page read and write
4E10000
heap
page execute and read and write
FF0000
heap
page read and write
D8B000
heap
page read and write
2E08000
trusted library allocation
page read and write
2C72000
trusted library allocation
page read and write
2E59000
trusted library allocation
page read and write
2D7A000
trusted library allocation
page read and write
2A58000
trusted library allocation
page read and write
2CA2000
trusted library allocation
page read and write
2BCE000
trusted library allocation
page read and write
2E06000
trusted library allocation
page read and write
2F64000
trusted library allocation
page read and write
CDD000
trusted library allocation
page execute and read and write
2BE6000
trusted library allocation
page read and write
2DC7000
trusted library allocation
page read and write
3BDA000
trusted library allocation
page read and write
68DE000
heap
page read and write
2B13000
trusted library allocation
page read and write
2EF3000
trusted library allocation
page read and write
2B5E000
trusted library allocation
page read and write
2B24000
trusted library allocation
page read and write
2DEB000
trusted library allocation
page read and write
2CEF000
trusted library allocation
page read and write
6490000
trusted library allocation
page read and write
2E9D000
trusted library allocation
page read and write
2D1E000
trusted library allocation
page read and write
E1E000
heap
page read and write
2C1A000
trusted library allocation
page read and write
52EE000
stack
page read and write
2D78000
trusted library allocation
page read and write
2D84000
trusted library allocation
page read and write
2EDC000
trusted library allocation
page read and write
2E04000
trusted library allocation
page read and write
2B15000
trusted library allocation
page read and write
2D2D000
trusted library allocation
page read and write
2F62000
trusted library allocation
page read and write
5A70000
trusted library allocation
page execute and read and write
6534000
trusted library allocation
page read and write
CD0000
heap
page read and write
5AE0000
trusted library allocation
page execute and read and write
59A0000
trusted library section
page read and write
3DA8000
trusted library allocation
page read and write
5B10000
trusted library allocation
page read and write
5BD0000
trusted library allocation
page execute and read and write
5A2F000
trusted library allocation
page read and write
2B64000
trusted library allocation
page read and write
29AE000
trusted library allocation
page read and write
2EEA000
trusted library allocation
page read and write
2D54000
trusted library allocation
page read and write
2F27000
trusted library allocation
page read and write
29E8000
trusted library allocation
page read and write
CCD000
trusted library allocation
page execute and read and write
6848000
heap
page read and write
2A56000
trusted library allocation
page read and write
3E97000
trusted library allocation
page read and write
3E40000
trusted library allocation
page read and write
2D99000
trusted library allocation
page read and write
2F4B000
trusted library allocation
page read and write
2E7E000
trusted library allocation
page read and write
2D5C000
trusted library allocation
page read and write
2F01000
trusted library allocation
page read and write
3DD9000
trusted library allocation
page read and write
D32000
trusted library allocation
page read and write
2B09000
trusted library allocation
page read and write
2AA4000
trusted library allocation
page read and write
3E3B000
trusted library allocation
page read and write
3F4E000
trusted library allocation
page read and write
2D3F000
trusted library allocation
page read and write
2D4E000
trusted library allocation
page read and write
2EE2000
trusted library allocation
page read and write
2C98000
trusted library allocation
page read and write
2BBF000
trusted library allocation
page read and write
D98000
heap
page read and write
5B00000
trusted library allocation
page execute and read and write
2B3F000
trusted library allocation
page read and write
2E8E000
trusted library allocation
page read and write
2B49000
trusted library allocation
page read and write
2EA7000
trusted library allocation
page read and write
65A0000
trusted library allocation
page read and write
2E22000
trusted library allocation
page read and write
512D000
stack
page read and write
2C64000
trusted library allocation
page read and write
B55000
heap
page read and write
2DA0000
trusted library allocation
page read and write
594E000
stack
page read and write
E42000
heap
page read and write
2B31000
trusted library allocation
page read and write
29E0000
trusted library allocation
page read and write
64A0000
trusted library allocation
page execute and read and write
2E28000
trusted library allocation
page read and write
2B60000
trusted library allocation
page read and write
2F18000
trusted library allocation
page read and write
1010000
trusted library allocation
page read and write
2C85000
trusted library allocation
page read and write
2D7E000
trusted library allocation
page read and write
2B8F000
trusted library allocation
page read and write
2D76000
trusted library allocation
page read and write
2700000
trusted library allocation
page read and write
65E0000
trusted library allocation
page read and write
4F9E000
stack
page read and write
2CF6000
trusted library allocation
page read and write
2F6B000
trusted library allocation
page read and write
2AC3000
trusted library allocation
page read and write
2B9E000
trusted library allocation
page read and write
2CB5000
trusted library allocation
page read and write
2EBC000
trusted library allocation
page read and write
2BAC000
trusted library allocation
page read and write
2D3B000
trusted library allocation
page read and write
2BDA000
trusted library allocation
page read and write
3C82000
trusted library allocation
page read and write
2B0B000
trusted library allocation
page read and write
50ED000
stack
page read and write
5306000
trusted library allocation
page read and write
446000
remote allocation
page execute and read and write
2E82000
trusted library allocation
page read and write
2D72000
trusted library allocation
page read and write
52AF000
stack
page read and write
2BE9000
trusted library allocation
page read and write
2BD0000
trusted library allocation
page read and write
6594000
trusted library allocation
page read and write
2D39000
trusted library allocation
page read and write
2EFD000
trusted library allocation
page read and write
2DD2000
trusted library allocation
page read and write
2C9A000
trusted library allocation
page read and write
3F64000
trusted library allocation
page read and write
5304000
trusted library allocation
page read and write
2E55000
trusted library allocation
page read and write
3E52000
trusted library allocation
page read and write
5C99000
heap
page read and write
2F50000
trusted library allocation
page read and write
2A3F000
trusted library allocation
page read and write
2D4C000
trusted library allocation
page read and write
3EA4000
trusted library allocation
page read and write
2C0E000
trusted library allocation
page read and write
5B1A000
trusted library allocation
page read and write
2A03000
trusted library allocation
page read and write
F9E000
stack
page read and write
2DCB000
trusted library allocation
page read and write
FD0000
trusted library allocation
page read and write
2A14000
trusted library allocation
page read and write
CFB000
trusted library allocation
page execute and read and write
D26000
trusted library allocation
page execute and read and write
2DE2000
trusted library allocation
page read and write
2D28000
trusted library allocation
page read and write
D3B000
trusted library allocation
page execute and read and write
2D0D000
trusted library allocation
page read and write
2CD8000
trusted library allocation
page read and write
5A60000
trusted library allocation
page read and write
2C9C000
trusted library allocation
page read and write
2D27000
trusted library allocation
page read and write
5A20000
trusted library allocation
page read and write
2C16000
trusted library allocation
page read and write
2B67000
trusted library allocation
page read and write
3B71000
trusted library allocation
page read and write
29D9000
trusted library allocation
page read and write
56C0000
trusted library section
page read and write
CD0000
trusted library allocation
page read and write
2F04000
trusted library allocation
page read and write
2A0F000
trusted library allocation
page read and write
2EA3000
trusted library allocation
page read and write
2A87000
trusted library allocation
page read and write
CF0000
trusted library allocation
page read and write
3E68000
trusted library allocation
page read and write
2B8D000
trusted library allocation
page read and write
AF4000
heap
page read and write
2C11000
trusted library allocation
page read and write
2EE8000
trusted library allocation
page read and write
2ABF000
trusted library allocation
page read and write
53EE000
stack
page read and write
2DF8000
trusted library allocation
page read and write
D30000
heap
page read and write
2E02000
trusted library allocation
page read and write
559F000
stack
page read and write
2D05000
trusted library allocation
page read and write
2F47000
trusted library allocation
page read and write
3E46000
trusted library allocation
page read and write
2B0D000
trusted library allocation
page read and write
2A26000
trusted library allocation
page read and write
5BF0000
trusted library section
page read and write
3BD7000
trusted library allocation
page read and write
D03000
trusted library allocation
page execute and read and write
2DC9000
trusted library allocation
page read and write
3C08000
trusted library allocation
page read and write
2C21000
trusted library allocation
page read and write
2A6D000
trusted library allocation
page read and write
2BC9000
trusted library allocation
page read and write
7370000
heap
page read and write
2C43000
trusted library allocation
page read and write
29DB000
trusted library allocation
page read and write
3D12000
trusted library allocation
page read and write
3FA1000
trusted library allocation
page read and write
5C70000
heap
page read and write
2CD2000
trusted library allocation
page read and write
2D43000
trusted library allocation
page read and write
2DB6000
trusted library allocation
page read and write
645D000
trusted library allocation
page read and write
2DB0000
trusted library allocation
page read and write
5E50000
trusted library allocation
page execute and read and write
2E3C000
trusted library allocation
page read and write
2EB6000
trusted library allocation
page read and write
2D25000
trusted library allocation
page read and write
2CBB000
trusted library allocation
page read and write
2AE2000
trusted library allocation
page read and write
2D3D000
trusted library allocation
page read and write
2AD6000
trusted library allocation
page read and write
56B0000
heap
page read and write
2A09000
trusted library allocation
page read and write
2CF9000
trusted library allocation
page read and write
2C53000
trusted library allocation
page read and write
2870000
heap
page execute and read and write
2AC7000
trusted library allocation
page read and write
2EFF000
trusted library allocation
page read and write
2B28000
trusted library allocation
page read and write
2BF9000
trusted library allocation
page read and write
3BEF000
trusted library allocation
page read and write
5990000
trusted library allocation
page read and write
3F76000
trusted library allocation
page read and write
2A52000
trusted library allocation
page read and write
2CF4000
trusted library allocation
page read and write
2EA5000
trusted library allocation
page read and write
5CC1000
heap
page read and write
2E10000
trusted library allocation
page read and write
2EBA000
trusted library allocation
page read and write
644E000
stack
page read and write
2E81000
trusted library allocation
page read and write
2DCF000
trusted library allocation
page read and write
29BA000
trusted library allocation
page read and write
2A24000
trusted library allocation
page read and write
2BC1000
trusted library allocation
page read and write
2DB8000
trusted library allocation
page read and write
B40000
heap
page read and write
2BA6000
trusted library allocation
page read and write
5A30000
trusted library allocation
page read and write
2DCD000
trusted library allocation
page read and write
2EF7000
trusted library allocation
page read and write
2EC0000
trusted library allocation
page read and write
2E25000
trusted library allocation
page read and write
2720000
heap
page read and write
E3A000
heap
page read and write
5C10000
heap
page read and write
FE0000
trusted library allocation
page read and write
2E80000
trusted library allocation
page read and write
2CEB000
trusted library allocation
page read and write
1138000
trusted library allocation
page read and write
2B45000
trusted library allocation
page read and write
CC4000
trusted library allocation
page read and write
2A05000
trusted library allocation
page read and write
2E0E000
trusted library allocation
page read and write
3B99000
trusted library allocation
page read and write
2EB8000
trusted library allocation
page read and write
62CE000
stack
page read and write
2A91000
trusted library allocation
page read and write
2C55000
trusted library allocation
page read and write
2CA4000
trusted library allocation
page read and write
57E0000
trusted library allocation
page read and write
2E59000
trusted library allocation
page read and write
5F0000
heap
page read and write
5970000
trusted library allocation
page execute and read and write
2EB6000
trusted library allocation
page read and write
29C1000
trusted library allocation
page read and write
264E000
stack
page read and write
2A60000
heap
page execute and read and write
2E44000
trusted library allocation
page read and write
526E000
stack
page read and write
2CDB000
trusted library allocation
page read and write
65F0000
trusted library allocation
page read and write
3FA4000
trusted library allocation
page read and write
5FCE000
stack
page read and write
2AC1000
trusted library allocation
page read and write
65D7000
trusted library allocation
page read and write
2B62000
trusted library allocation
page read and write
2BA4000
trusted library allocation
page read and write
2D7C000
trusted library allocation
page read and write
2E7C000
trusted library allocation
page read and write
2EC5000
trusted library allocation
page read and write
2E27000
trusted library allocation
page read and write
64C0000
trusted library allocation
page execute and read and write
2A5C000
trusted library allocation
page read and write
2BE5000
trusted library allocation
page read and write
5AD0000
trusted library allocation
page execute and read and write
2B95000
trusted library allocation
page read and write
57C000
stack
page read and write
2A54000
trusted library allocation
page read and write
2CE9000
trusted library allocation
page read and write
2C1F000
trusted library allocation
page read and write
3CFC000
trusted library allocation
page read and write
5AF0000
trusted library allocation
page execute and read and write
2E1D000
trusted library allocation
page read and write
FDC000
stack
page read and write
6858000
heap
page read and write
5E8E000
stack
page read and write
2BE0000
trusted library allocation
page read and write
D20000
trusted library allocation
page read and write
2ECD000
trusted library allocation
page read and write
2D6D000
trusted library allocation
page read and write
2BCB000
trusted library allocation
page read and write
65B0000
trusted library allocation
page read and write
11E0000
trusted library allocation
page read and write
64B0000
trusted library allocation
page execute and read and write
FF0000
heap
page read and write
2A89000
trusted library allocation
page read and write
282F000
stack
page read and write
3C9E000
trusted library allocation
page read and write
D2A000
trusted library allocation
page execute and read and write
2EBE000
trusted library allocation
page read and write
2CEE000
trusted library allocation
page read and write
2B26000
trusted library allocation
page read and write
2EBE000
trusted library allocation
page read and write
AB0000
trusted library allocation
page read and write
2A3D000
trusted library allocation
page read and write
E40000
heap
page read and write
CE2000
trusted library allocation
page read and write
2E3A000
trusted library allocation
page read and write
2D2A000
trusted library allocation
page read and write
2DD3000
trusted library allocation
page read and write
4FB0000
heap
page read and write
2C40000
trusted library allocation
page read and write
2BDC000
trusted library allocation
page read and write
2BAA000
trusted library allocation
page read and write
A70000
heap
page read and write
2CD6000
trusted library allocation
page read and write
3DA5000
trusted library allocation
page read and write
2E84000
trusted library allocation
page read and write
2B3D000
trusted library allocation
page read and write
97D000
stack
page read and write
2BB3000
trusted library allocation
page read and write
2C66000
trusted library allocation
page read and write
2A37000
trusted library allocation
page read and write
2B93000
trusted library allocation
page read and write
2E86000
trusted library allocation
page read and write
2DB2000
trusted library allocation
page read and write
D37000
trusted library allocation
page execute and read and write
2AE7000
trusted library allocation
page read and write
2CF2000
trusted library allocation
page read and write
2CFC000
trusted library allocation
page read and write
2CB3000
trusted library allocation
page read and write
2D1F000
trusted library allocation
page read and write
2A39000
trusted library allocation
page read and write
6B4E000
stack
page read and write
6D00000
heap
page read and write
2EE6000
trusted library allocation
page read and write
2D2C000
trusted library allocation
page read and write
2F4D000
trusted library allocation
page read and write
2DCD000
trusted library allocation
page read and write
2E42000
trusted library allocation
page read and write
2CDD000
trusted library allocation
page read and write
2CA0000
trusted library allocation
page read and write
29AB000
trusted library allocation
page read and write
3E58000
trusted library allocation
page read and write
5226000
stack
page read and write
2D1C000
trusted library allocation
page read and write
2A43000
trusted library allocation
page read and write
2E8B000
trusted library allocation
page read and write
2B2A000
trusted library allocation
page read and write
CC0000
trusted library allocation
page read and write
2B58000
trusted library allocation
page read and write
CBE000
stack
page read and write
2A0D000
trusted library allocation
page read and write
2EB4000
trusted library allocation
page read and write
E3E000
stack
page read and write
2EDE000
trusted library allocation
page read and write
2D0F000
trusted library allocation
page read and write
2C19000
trusted library allocation
page read and write
2BF7000
trusted library allocation
page read and write
6530000
trusted library allocation
page read and write
AC0000
heap
page read and write
2DBA000
trusted library allocation
page read and write
2A8B000
trusted library allocation
page read and write
57D0000
trusted library allocation
page read and write
29A0000
trusted library allocation
page read and write
555E000
stack
page read and write
6550000
trusted library allocation
page execute and read and write
2D03000
trusted library allocation
page read and write
CEA000
trusted library allocation
page execute and read and write
2C5B000
trusted library allocation
page read and write
2CED000
trusted library allocation
page read and write
3C6C000
trusted library allocation
page read and write
2AB9000
trusted library allocation
page read and write
2F21000
trusted library allocation
page read and write
2A98000
trusted library allocation
page read and write
2C34000
trusted library allocation
page read and write
2729000
heap
page read and write
B3F000
heap
page read and write
2B47000
trusted library allocation
page read and write
2C38000
trusted library allocation
page read and write
2E5D000
trusted library allocation
page read and write
610E000
stack
page read and write
2E1F000
trusted library allocation
page read and write
2A5A000
trusted library allocation
page read and write
2F23000
trusted library allocation
page read and write
2BB0000
trusted library allocation
page read and write
3E8D000
trusted library allocation
page read and write
2B97000
trusted library allocation
page read and write
2C77000
trusted library allocation
page read and write
4C0000
unkown
page readonly
2E15000
trusted library allocation
page read and write
2F45000
trusted library allocation
page read and write
52F0000
trusted library allocation
page read and write
2DD8000
trusted library allocation
page read and write
11F0000
heap
page read and write
D20000
trusted library allocation
page execute and read and write
3E74000
trusted library allocation
page read and write
2BD2000
trusted library allocation
page read and write
2A8D000
trusted library allocation
page read and write
2B1C000
trusted library allocation
page read and write
4C6D000
stack
page read and write
2BA8000
trusted library allocation
page read and write
2E9F000
trusted library allocation
page read and write
2DF6000
trusted library allocation
page read and write
5C60000
trusted library allocation
page read and write
565D000
stack
page read and write
F50000
trusted library allocation
page read and write
2A01000
trusted library allocation
page read and write
5980000
trusted library allocation
page read and write
B32000
heap
page read and write
2E86000
trusted library allocation
page read and write
2C6C000
trusted library allocation
page read and write
7C9000
stack
page read and write
2A4D000
stack
page read and write
5CEF000
heap
page read and write
2A1C000
trusted library allocation
page read and write
2DF4000
trusted library allocation
page read and write
2D58000
trusted library allocation
page read and write
3D7A000
trusted library allocation
page read and write
5A2D000
trusted library allocation
page read and write
2A2A000
trusted library allocation
page read and write
D10000
trusted library allocation
page read and write
2D60000
trusted library allocation
page read and write
2C26000
trusted library allocation
page read and write
2A85000
trusted library allocation
page read and write
D0D000
trusted library allocation
page execute and read and write
2BCC000
trusted library allocation
page read and write
B30000
heap
page read and write
D35000
trusted library allocation
page execute and read and write
5A40000
trusted library allocation
page read and write
2C3A000
trusted library allocation
page read and write
2A53000
heap
page read and write
5C56000
heap
page read and write
2C2A000
trusted library allocation
page read and write
AE7000
heap
page read and write
2C1E000
trusted library allocation
page read and write
2E38000
trusted library allocation
page read and write
D1D000
trusted library allocation
page execute and read and write
2A50000
heap
page read and write
2B5C000
trusted library allocation
page read and write
2E93000
trusted library allocation
page read and write
2A41000
trusted library allocation
page read and write
29D5000
trusted library allocation
page read and write
3DF1000
trusted library allocation
page read and write
2CB7000
trusted library allocation
page read and write
3DC4000
trusted library allocation
page read and write
8FB000
stack
page read and write
2BE1000
trusted library allocation
page read and write
2C1D000
trusted library allocation
page read and write
29CD000
trusted library allocation
page read and write
497E000
stack
page read and write
2AA2000
trusted library allocation
page read and write
2C55000
trusted library allocation
page read and write
2C70000
trusted library allocation
page read and write
B70000
heap
page read and write
2AA8000
trusted library allocation
page read and write
2A3B000
trusted library allocation
page read and write
2F49000
trusted library allocation
page read and write
B02000
heap
page read and write
549E000
stack
page read and write
2B5A000
trusted library allocation
page read and write
2A35000
trusted library allocation
page read and write
2C78000
trusted library allocation
page read and write
2C8A000
trusted library allocation
page read and write
1000000
trusted library allocation
page read and write
D58000
heap
page read and write
2A1E000
trusted library allocation
page read and write
2EFB000
trusted library allocation
page read and write
2D9D000
trusted library allocation
page read and write
2EBC000
trusted library allocation
page read and write
2DD1000
trusted library allocation
page read and write
2DF0000
trusted library allocation
page read and write
2E88000
trusted library allocation
page read and write
52EE000
stack
page read and write
5A80000
trusted library section
page read and write
E0C000
heap
page read and write
2AC5000
trusted library allocation
page read and write
60CF000
stack
page read and write
2DB4000
trusted library allocation
page read and write
6460000
trusted library allocation
page execute and read and write
614E000
stack
page read and write
D96000
heap
page read and write
2E0A000
trusted library allocation
page read and write
5C63000
heap
page read and write
2BE9000
trusted library allocation
page read and write
2AE4000
trusted library allocation
page read and write
2ECF000
trusted library allocation
page read and write
2AF1000
trusted library allocation
page read and write
2E53000
trusted library allocation
page read and write
985000
heap
page read and write
2C57000
trusted library allocation
page read and write
2AAC000
trusted library allocation
page read and write
509E000
stack
page read and write
64D0000
trusted library allocation
page execute and read and write
FE0000
trusted library allocation
page execute and read and write
65D0000
trusted library allocation
page read and write
2AA6000
trusted library allocation
page read and write
2BC3000
trusted library allocation
page read and write
6C4E000
stack
page read and write
2DD6000
trusted library allocation
page read and write
2ABD000
trusted library allocation
page read and write
2A07000
trusted library allocation
page read and write
AF7000
stack
page read and write
2C2E000
trusted library allocation
page read and write
2A93000
trusted library allocation
page read and write
4E5E000
stack
page read and write
2E2B000
trusted library allocation
page read and write
2D45000
trusted library allocation
page read and write
980000
heap
page read and write
530A000
trusted library allocation
page read and write
3E81000
trusted library allocation
page read and write
2CA6000
trusted library allocation
page read and write
2EF9000
trusted library allocation
page read and write
38CD000
trusted library allocation
page read and write
512D000
stack
page read and write
2E1C000
trusted library allocation
page read and write
D04000
trusted library allocation
page read and write
2EEF000
trusted library allocation
page read and write
2658000
trusted library allocation
page read and write
2C12000
trusted library allocation
page read and write
11D0000
trusted library allocation
page read and write
5D05000
heap
page read and write
684F000
heap
page read and write
2A20000
trusted library allocation
page read and write
2B4C000
trusted library allocation
page read and write
630E000
stack
page read and write
2C0F000
trusted library allocation
page read and write
2EA1000
trusted library allocation
page read and write
2BA0000
trusted library allocation
page read and write
2D20000
trusted library allocation
page read and write
2B41000
trusted library allocation
page read and write
5CB3000
heap
page read and write
2C26000
trusted library allocation
page read and write
2A5E000
trusted library allocation
page read and write
5EA0000
heap
page read and write
618E000
stack
page read and write
2DA6000
trusted library allocation
page read and write
4CFE000
stack
page read and write
2D5D000
trusted library allocation
page read and write
2D80000
trusted library allocation
page read and write
5F8E000
stack
page read and write
2F68000
trusted library allocation
page read and write
93E000
stack
page read and write
29A6000
trusted library allocation
page read and write
D7F000
heap
page read and write
634E000
stack
page read and write
5E0000
heap
page read and write
2B11000
trusted library allocation
page read and write
D6F000
heap
page read and write
2C3E000
trusted library allocation
page read and write
2B91000
trusted library allocation
page read and write
2D22000
trusted library allocation
page read and write
2BE2000
trusted library allocation
page read and write
29D2000
trusted library allocation
page read and write
2E0C000
trusted library allocation
page read and write
286C000
stack
page read and write
3DEC000
trusted library allocation
page read and write
2E57000
trusted library allocation
page read and write
6470000
trusted library allocation
page read and write
2EC9000
trusted library allocation
page read and write
2F60000
trusted library allocation
page read and write
2E29000
trusted library allocation
page read and write
2C94000
trusted library allocation
page read and write
2D0B000
trusted library allocation
page read and write
2D9B000
trusted library allocation
page read and write
2A63000
trusted library allocation
page read and write
6630000
trusted library allocation
page execute and read and write
2A46000
trusted library allocation
page read and write
2B0F000
trusted library allocation
page read and write
2E3E000
trusted library allocation
page read and write
2D01000
trusted library allocation
page read and write
65A5000
trusted library allocation
page read and write
5310000
heap
page execute and read and write
5A50000
trusted library allocation
page read and write
2ADC000
trusted library allocation
page read and write
D00000
trusted library allocation
page read and write
2CB9000
trusted library allocation
page read and write
B69000
heap
page read and write
2EE4000
trusted library allocation
page read and write
390000
unkown
page readonly
2F1E000
trusted library allocation
page read and write
2D52000
trusted library allocation
page read and write
4DFE000
stack
page read and write
2C51000
trusted library allocation
page read and write
2BDE000
trusted library allocation
page read and write
2D85000
trusted library allocation
page read and write
2F1A000
trusted library allocation
page read and write
6810000
heap
page read and write
B75000
heap
page read and write
2C74000
trusted library allocation
page read and write
2C6A000
trusted library allocation
page read and write
2D23000
trusted library allocation
page read and write
2C4F000
trusted library allocation
page read and write
5BC5000
trusted library allocation
page read and write
5C74000
heap
page read and write
2CCE000
trusted library allocation
page read and write
2C6E000
trusted library allocation
page read and write
2F16000
trusted library allocation
page read and write
400000
remote allocation
page execute and read and write
2B4E000
trusted library allocation
page read and write
3E5E000
trusted library allocation
page read and write
2B75000
trusted library allocation
page read and write
5B20000
trusted library allocation
page read and write
29C6000
trusted library allocation
page read and write
2B6E000
stack
page read and write
2D97000
trusted library allocation
page read and write
6566000
trusted library allocation
page read and write
2CF7000
trusted library allocation
page read and write
5C40000
trusted library allocation
page read and write
1020000
heap
page read and write
2AAA000
trusted library allocation
page read and write
29BE000
trusted library allocation
page read and write
6450000
trusted library allocation
page read and write
2B43000
trusted library allocation
page read and write
55A0000
trusted library section
page read and write
2AAF000
trusted library allocation
page read and write
2D5A000
trusted library allocation
page read and write
2D09000
trusted library allocation
page read and write
2C22000
trusted library allocation
page read and write
2A60000
trusted library allocation
page read and write
2CBF000
trusted library allocation
page read and write
3ED0000
trusted library allocation
page read and write
65C0000
trusted library allocation
page read and write
2E5F000
trusted library allocation
page read and write
3E4D000
trusted library allocation
page read and write
2F1C000
trusted library allocation
page read and write
2D11000
trusted library allocation
page read and write
2DAE000
trusted library allocation
page read and write
5C20000
heap
page read and write
2E21000
trusted library allocation
page read and write
2D5E000
trusted library allocation
page read and write
29D7000
trusted library allocation
page read and write
2CC8000
trusted library allocation
page read and write
2F14000
trusted library allocation
page read and write
2CD4000
trusted library allocation
page read and write
2A0B000
trusted library allocation
page read and write
628E000
stack
page read and write
2C36000
trusted library allocation
page read and write
2F12000
trusted library allocation
page read and write
2B2C000
trusted library allocation
page read and write
2AE0000
trusted library allocation
page read and write
2D56000
trusted library allocation
page read and write
CF2000
trusted library allocation
page read and write
2C9E000
trusted library allocation
page read and write
2ADE000
trusted library allocation
page read and write
There are 695 hidden memdumps, click here to show them.