IOC Report
Kaspersky.exe

FilesProcessesDomainsIPsRegistryMemdumps54321010010Label

Files

File Path
Type
Category
Malicious
Download
Kaspersky.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
initial sample
malicious
C:\Program Files (x86)\Explower.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\CLR_v2.0_32\UsageLogs\Kaspersky.exe.log
ASCII text, with CRLF line terminators
dropped
malicious
C:\Users\user\Desktop\Explower.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\server.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\app
Unicode text, UTF-8 (with BOM) text, with no line terminators
dropped
\Device\ConDrv
ASCII text, with CRLF line terminators
dropped

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\Kaspersky.exe
"C:\Users\user\Desktop\Kaspersky.exe"
malicious
C:\Users\user\server.exe
"C:\Users\user\server.exe"
malicious
C:\Windows\SysWOW64\netsh.exe
netsh firewall add allowedprogram "C:\Users\user\server.exe" "server.exe" ENABLE
malicious
C:\Windows\SysWOW64\netsh.exe
netsh firewall delete allowedprogram "C:\Users\user\server.exe"
malicious
C:\Windows\SysWOW64\netsh.exe
netsh firewall add allowedprogram "C:\Users\user\server.exe" "server.exe" ENABLE
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1

Domains

Name
IP
Malicious
7.tcp.eu.ngrok.io
3.126.224.214

IPs

IP
Domain
Country
Malicious
3.126.224.214
7.tcp.eu.ngrok.io
United States

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\Environment
SEE_MASK_NOZONECHECKS
malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System
DisableTaskMgr
malicious

Memdumps

Base Address
Regiontype
Protect
Malicious
Download
3BD8000
trusted library allocation
page read and write
malicious
4D2000
unkown
page readonly
malicious
33D1000
trusted library allocation
page read and write
malicious
D57000
heap
page read and write
D58000
heap
page read and write
D4E000
heap
page read and write
485D000
trusted library allocation
page read and write
3036000
heap
page read and write
4DD8000
heap
page read and write
4E00000
heap
page read and write
15A2000
trusted library allocation
page execute and read and write
4DD9000
heap
page read and write
D8F000
heap
page read and write
817000
heap
page read and write
D46000
heap
page read and write
8DD000
heap
page read and write
4A78000
trusted library allocation
page read and write
94DC000
heap
page read and write
740000
heap
page read and write
D96000
heap
page read and write
DFA000
trusted library allocation
page execute and read and write
86A000
heap
page read and write
A08E000
stack
page read and write
468A000
trusted library allocation
page read and write
526E000
stack
page read and write
3AE000
stack
page read and write
720000
heap
page read and write
7AE000
heap
page read and write
88A000
heap
page read and write
A44E000
stack
page read and write
5EDE000
stack
page read and write
4330000
heap
page read and write
822000
heap
page read and write
43F8000
trusted library allocation
page read and write
8BEE000
stack
page read and write
17BC000
stack
page read and write
73E000
stack
page read and write
D9E000
heap
page read and write
C80000
heap
page read and write
4A02000
trusted library allocation
page read and write
810000
heap
page read and write
173E000
stack
page read and write
7FCE000
stack
page read and write
8BB000
heap
page read and write
D10000
heap
page read and write
76B000
heap
page read and write
5317000
heap
page read and write
58FE000
stack
page read and write
AF3000
stack
page read and write
448F000
stack
page read and write
288E000
stack
page read and write
4CCD000
stack
page read and write
87B000
heap
page read and write
4DA0000
heap
page read and write
795000
heap
page read and write
C86E000
stack
page read and write
4DC4000
heap
page read and write
8BB000
heap
page read and write
76B000
heap
page read and write
CF01000
trusted library allocation
page read and write
128E000
heap
page read and write
8470000
trusted library allocation
page execute and read and write
C20000
heap
page read and write
868000
heap
page read and write
78D000
heap
page read and write
7E62000
heap
page read and write
79C000
heap
page read and write
D90000
heap
page read and write
E01000
heap
page read and write
C3E000
stack
page read and write
4DC4000
heap
page read and write
D9E000
heap
page read and write
8AB000
heap
page read and write
D5D000
heap
page read and write
78D000
heap
page read and write
838E000
stack
page read and write
7A2000
heap
page read and write
1190000
heap
page read and write
AD8E000
stack
page read and write
4380000
heap
page read and write
D8F000
heap
page read and write
E04000
heap
page read and write
159A000
trusted library allocation
page execute and read and write
7CF000
heap
page read and write
D9B000
heap
page read and write
BEEE000
stack
page read and write
830000
heap
page read and write
8D2D000
stack
page read and write
CF75000
trusted library allocation
page read and write
7CF000
heap
page read and write
80F000
heap
page read and write
49CC000
trusted library allocation
page read and write
5317000
heap
page read and write
D97000
heap
page read and write
79D000
heap
page read and write
E0A000
trusted library allocation
page execute and read and write
5311000
heap
page read and write
A68E000
stack
page read and write
4783000
trusted library allocation
page read and write
76D000
heap
page read and write
5328000
heap
page read and write
2C03000
trusted library allocation
page read and write
5326000
heap
page read and write
814E000
stack
page read and write
7AF000
heap
page read and write
740000
heap
page read and write
D8D000
heap
page read and write
896E000
stack
page read and write
8AB000
heap
page read and write
8FAD000
stack
page read and write
5450000
trusted library allocation
page read and write
85A000
heap
page read and write
78D000
heap
page read and write
890000
heap
page read and write
D6A000
heap
page read and write
A6CE000
stack
page read and write
9C0D000
stack
page read and write
D7C000
heap
page read and write
4DA0000
heap
page read and write
72A000
heap
page read and write
8A6E000
stack
page read and write
757000
heap
page read and write
131A000
heap
page read and write
900000
heap
page read and write
797000
heap
page read and write
8F6D000
stack
page read and write
C4ED000
stack
page read and write
4DCC000
heap
page read and write
790000
heap
page read and write
88C000
heap
page read and write
C4AE000
stack
page read and write
AEE000
stack
page read and write
75A0000
trusted library allocation
page execute and read and write
BC6E000
stack
page read and write
4DCD000
heap
page read and write
D6A000
heap
page read and write
C10000
heap
page read and write
15B6000
heap
page read and write
CC2E000
stack
page read and write
D63000
heap
page read and write
A40E000
stack
page read and write
A910000
heap
page read and write
D1A000
heap
page read and write
512E000
stack
page read and write
866000
heap
page read and write
E40000
heap
page execute and read and write
D96000
heap
page read and write
5420000
heap
page read and write
885000
heap
page read and write
1039000
stack
page read and write
3BE000
stack
page read and write
778000
heap
page read and write
1140000
trusted library allocation
page execute and read and write
8FD000
heap
page read and write
7A3000
heap
page read and write
8BB000
heap
page read and write
1280000
heap
page read and write
88D000
heap
page read and write
7A8000
heap
page read and write
D93000
heap
page read and write
4E28000
heap
page read and write
7AB000
heap
page read and write
529F000
stack
page read and write
D96000
heap
page read and write
7F1000
heap
page read and write
D7C000
heap
page read and write
79F000
heap
page read and write
1136000
stack
page read and write
C76E000
stack
page read and write
E1B000
trusted library allocation
page execute and read and write
5316000
heap
page read and write
2BB000
stack
page read and write
865000
heap
page read and write
844B000
stack
page read and write
AE77000
trusted library allocation
page read and write
5310000
heap
page read and write
536E000
stack
page read and write
8AB000
heap
page read and write
4DD2000
heap
page read and write
4DDC000
heap
page read and write
90E000
heap
page read and write
B86000
heap
page read and write
158A000
trusted library allocation
page execute and read and write
D9E000
heap
page read and write
855000
heap
page read and write
D91000
heap
page read and write
130A000
heap
page read and write
4E07000
heap
page read and write
AFE000
stack
page read and write
79D000
heap
page read and write
90E000
heap
page read and write
896000
heap
page read and write
D64000
heap
page read and write
D9E000
heap
page read and write
48C0000
heap
page read and write
79D000
heap
page read and write
C270000
heap
page read and write
BDED000
stack
page read and write
C86000
heap
page read and write
AC4E000
stack
page read and write
C80000
heap
page read and write
670000
heap
page read and write
587D000
stack
page read and write
855000
heap
page read and write
98F000
heap
page read and write
4E22000
heap
page read and write
4A42000
trusted library allocation
page read and write
8CED000
stack
page read and write
815000
heap
page read and write
72E000
stack
page read and write
9B0D000
stack
page read and write
932D000
stack
page read and write
8AF000
heap
page read and write
D31000
heap
page read and write
16FE000
stack
page read and write
1740000
trusted library allocation
page read and write
897000
heap
page read and write
120D000
stack
page read and write
791000
heap
page read and write
88B000
heap
page read and write
AB4D000
stack
page read and write
1580000
trusted library allocation
page read and write
4690000
heap
page read and write
D25000
heap
page read and write
76B000
heap
page read and write
76D000
heap
page read and write
732000
heap
page read and write
7AE000
heap
page read and write
6D0000
heap
page read and write
D64000
heap
page read and write
888000
heap
page read and write
7EB9000
heap
page read and write
DBE000
heap
page read and write
556E000
stack
page read and write
47BA000
trusted library allocation
page read and write
E17000
trusted library allocation
page execute and read and write
4DD9000
heap
page read and write
81A000
heap
page read and write
868000
heap
page read and write
777000
heap
page read and write
5326000
heap
page read and write
C8E000
unkown
page read and write
885000
heap
page read and write
157A000
trusted library allocation
page execute and read and write
D8D000
heap
page read and write
88D000
heap
page read and write
7E2C000
heap
page read and write
4510000
trusted library allocation
page read and write
1770000
heap
page read and write
75D0000
trusted library allocation
page read and write
A1CD000
stack
page read and write
76D000
heap
page read and write
5313000
heap
page read and write
DBF000
stack
page read and write
A80E000
stack
page read and write
897000
heap
page read and write
7AB000
heap
page read and write
E0A000
heap
page read and write
45FE000
stack
page read and write
780000
heap
page read and write
99D000
heap
page read and write
4EAB000
stack
page read and write
D7F000
heap
page read and write
4DCD000
heap
page read and write
3030000
heap
page read and write
96CD000
stack
page read and write
846000
heap
page read and write
D63000
heap
page read and write
47B0000
heap
page read and write
D9D000
heap
page read and write
754000
heap
page read and write
810000
heap
page read and write
790000
heap
page read and write
9E0D000
stack
page read and write
7A5000
heap
page read and write
7B0000
heap
page read and write
137C000
heap
page read and write
4B0E000
stack
page read and write
4D4F000
stack
page read and write
9710000
heap
page read and write
615E000
stack
page read and write
9F0D000
stack
page read and write
830000
heap
page read and write
8AF000
heap
page read and write
D22000
heap
page read and write
E8E000
stack
page read and write
D7D000
heap
page read and write
790000
heap
page read and write
531B000
heap
page read and write
AC8E000
stack
page read and write
D93000
heap
page read and write
886000
heap
page read and write
A18E000
stack
page read and write
768000
heap
page read and write
4654000
trusted library allocation
page read and write
5E0000
heap
page read and write
81D000
heap
page read and write
C72E000
stack
page read and write
5326000
heap
page read and write
90EE000
stack
page read and write
880000
heap
page read and write
D63000
heap
page read and write
8AAE000
stack
page read and write
4A3E000
stack
page read and write
BDAE000
stack
page read and write
4DDB000
heap
page read and write
850000
heap
page read and write
47F0000
trusted library allocation
page read and write
573B000
stack
page read and write
894000
heap
page read and write
A20000
heap
page read and write
D48000
heap
page read and write
8BB000
heap
page read and write
87E000
heap
page read and write
849000
heap
page read and write
793000
heap
page read and write
43D1000
trusted library allocation
page read and write
D95000
heap
page read and write
87E000
heap
page read and write
86A000
heap
page read and write
4DDC000
heap
page read and write
499E000
stack
page read and write
5D0000
heap
page read and write
D64000
heap
page read and write
D90000
heap
page read and write
4566000
trusted library allocation
page read and write
7D0000
heap
page read and write
595E000
stack
page read and write
DBE000
heap
page read and write
5DDE000
stack
page read and write
88E000
heap
page read and write
CC6D000
stack
page read and write
D265000
trusted library allocation
page read and write
D86000
heap
page read and write
76D000
heap
page read and write
D94000
heap
page read and write
893000
heap
page read and write
D60000
heap
page read and write
6F0000
heap
page read and write
E04000
heap
page read and write
4DDC000
heap
page read and write
4FAD000
stack
page read and write
5326000
heap
page read and write
798000
heap
page read and write
D7E000
heap
page read and write
87F000
heap
page read and write
CFC2000
trusted library allocation
page read and write
819000
heap
page read and write
9450000
heap
page read and write
5316000
heap
page read and write
1170000
heap
page read and write
906000
heap
page read and write
5315000
heap
page read and write
D30000
heap
page read and write
4DDB000
heap
page read and write
8450000
unclassified section
page read and write
4D5C000
stack
page read and write
734000
stack
page read and write
A25000
heap
page read and write
886000
heap
page read and write
498C000
trusted library allocation
page read and write
9A0D000
stack
page read and write
F6C000
stack
page read and write
4E20000
heap
page read and write
85B000
heap
page read and write
15B0000
heap
page read and write
A30D000
stack
page read and write
88C000
heap
page read and write
4893000
trusted library allocation
page read and write
7F7E0000
trusted library allocation
page execute and read and write
56BC000
stack
page read and write
894000
heap
page read and write
3BD1000
trusted library allocation
page read and write
76D000
heap
page read and write
936E000
stack
page read and write
BCAD000
stack
page read and write
893000
heap
page read and write
4FFF000
stack
page read and write
8F6000
stack
page read and write
5327000
heap
page read and write
D94000
heap
page read and write
D31000
heap
page read and write
15C7000
trusted library allocation
page execute and read and write
D94000
heap
page read and write
C06D000
stack
page read and write
A2CE000
stack
page read and write
605E000
stack
page read and write
794000
heap
page read and write
D9C000
heap
page read and write
772000
heap
page read and write
7AE000
heap
page read and write
B30000
heap
page read and write
4DFF000
stack
page read and write
791000
heap
page read and write
825000
heap
page read and write
15F7000
heap
page read and write
906000
heap
page read and write
8AB000
heap
page read and write
5326000
heap
page read and write
95B000
heap
page read and write
429E000
stack
page read and write
532A000
heap
page read and write
858000
heap
page read and write
4D0000
unkown
page readonly
791000
heap
page read and write
E02000
trusted library allocation
page execute and read and write
577C000
stack
page read and write
57FE000
stack
page read and write
CF23000
trusted library allocation
page read and write
D63000
heap
page read and write
C9ED000
stack
page read and write
886000
heap
page read and write
ADF000
unkown
page read and write
75F000
heap
page read and write
45DE000
trusted library allocation
page read and write
D7E000
stack
page read and write
D64000
heap
page read and write
567E000
stack
page read and write
5634000
heap
page read and write
797000
heap
page read and write
DC0000
trusted library allocation
page read and write
D89000
heap
page read and write
D4F000
heap
page read and write
BB6E000
stack
page read and write
5F5E000
stack
page read and write
4717000
trusted library allocation
page read and write
8BC000
heap
page read and write
4D9C000
stack
page read and write
E09000
heap
page read and write
8AF000
heap
page read and write
D99000
heap
page read and write
818000
heap
page read and write
C40000
heap
page read and write
131E000
heap
page read and write
5316000
heap
page read and write
15C2000
trusted library allocation
page read and write
444E000
trusted library allocation
page read and write
17E0000
heap
page execute and read and write
84A0000
heap
page read and write
CB2D000
stack
page read and write
810000
heap
page read and write
87D000
heap
page read and write
C3AE000
stack
page read and write
7510000
heap
page read and write
A90E000
stack
page read and write
8AB000
heap
page read and write
DE7000
trusted library allocation
page execute and read and write
49F0000
heap
page read and write
81B000
heap
page read and write
4920000
trusted library allocation
page read and write
1130000
trusted library allocation
page read and write
5D9E000
stack
page read and write
7D1000
heap
page read and write
D96000
heap
page read and write
906000
heap
page read and write
1326000
heap
page read and write
78E000
heap
page read and write
7A4000
heap
page read and write
5630000
heap
page read and write
1572000
trusted library allocation
page execute and read and write
1597000
trusted library allocation
page execute and read and write
531C000
heap
page read and write
C7E000
stack
page read and write
522E000
stack
page read and write
88A000
heap
page read and write
C45000
heap
page read and write
D91000
heap
page read and write
D9F000
heap
page read and write
D6A000
heap
page read and write
C5ED000
stack
page read and write
777000
heap
page read and write
1110000
trusted library allocation
page read and write
474D000
trusted library allocation
page read and write
78E000
heap
page read and write
57BC000
stack
page read and write
620000
heap
page read and write
15BA000
heap
page read and write
D9E000
heap
page read and write
8E6D000
stack
page read and write
794000
heap
page read and write
8BE000
heap
page read and write
93AD000
stack
page read and write
D67000
heap
page read and write
770000
heap
page read and write
87E000
heap
page read and write
2BD1000
trusted library allocation
page read and write
87EE000
stack
page read and write
5BFE000
stack
page read and write
7E0B000
heap
page read and write
4E28000
heap
page read and write
D45000
heap
page read and write
87F000
heap
page read and write
4A50000
heap
page read and write
7F0000
heap
page read and write
DC0000
heap
page read and write
90E000
heap
page read and write
57B000
stack
page read and write
908000
heap
page read and write
929000
heap
page read and write
882D000
stack
page read and write
7CB000
stack
page read and write
619E000
stack
page read and write
15F0000
heap
page read and write
C62E000
stack
page read and write
4DDB000
heap
page read and write
BF2D000
stack
page read and write
81B000
heap
page read and write
864000
heap
page read and write
908000
heap
page read and write
D7C000
heap
page read and write
79C000
heap
page read and write
87B000
heap
page read and write
3B4000
stack
page read and write
15AA000
trusted library allocation
page execute and read and write
5ABE000
stack
page read and write
17C0000
trusted library allocation
page execute and read and write
D7F000
heap
page read and write
E0C000
heap
page read and write
59BE000
stack
page read and write
C9AE000
stack
page read and write
66E000
unkown
page read and write
519E000
stack
page read and write
D99000
heap
page read and write
867000
heap
page read and write
840C000
stack
page read and write
D64000
heap
page read and write
816000
heap
page read and write
DE2000
trusted library allocation
page execute and read and write
958000
heap
page read and write
9F4D000
stack
page read and write
8E2E000
stack
page read and write
597E000
stack
page read and write
52F0000
heap
page read and write
D83000
heap
page read and write
CAEE000
stack
page read and write
E10000
heap
page read and write
1250000
heap
page read and write
DE0000
trusted library allocation
page read and write
11C0000
heap
page read and write
4DD9000
heap
page read and write
A974000
heap
page read and write
83CD000
stack
page read and write
892000
heap
page read and write
892E000
stack
page read and write
1560000
trusted library allocation
page read and write
D9B000
heap
page read and write
D85000
heap
page read and write
D48000
heap
page read and write
308F000
stack
page read and write
858000
heap
page read and write
84E000
heap
page read and write
44BA000
trusted library allocation
page read and write
79D000
heap
page read and write
81A000
heap
page read and write
52F1000
heap
page read and write
85F000
heap
page read and write
D6A000
heap
page read and write
15CB000
trusted library allocation
page execute and read and write
896000
heap
page read and write
5A5F000
stack
page read and write
896000
heap
page read and write
5C3E000
stack
page read and write
D99000
heap
page read and write
154E000
stack
page read and write
78F000
heap
page read and write
E02000
heap
page read and write
4C60000
heap
page read and write
D68000
heap
page read and write
476E000
stack
page read and write
D31000
heap
page read and write
942E000
stack
page read and write
968D000
stack
page read and write
86EE000
stack
page read and write
D8E000
heap
page read and write
7FE000
unkown
page read and write
964D000
stack
page read and write
55FC000
stack
page read and write
CC81000
trusted library allocation
page read and write
76B000
heap
page read and write
794000
heap
page read and write
50EE000
stack
page read and write
4C0F000
stack
page read and write
8AF000
heap
page read and write
4484000
trusted library allocation
page read and write
4DC8000
heap
page read and write
86AE000
stack
page read and write
7AA000
heap
page read and write
864000
heap
page read and write
855000
heap
page read and write
830000
heap
page read and write
88A000
heap
page read and write
DBE000
heap
page read and write
D8D000
heap
page read and write
90B000
heap
page read and write
C273000
heap
page read and write
77C000
heap
page read and write
D99000
heap
page read and write
790000
heap
page read and write
894000
heap
page read and write
5410000
heap
page read and write
824E000
stack
page read and write
810000
heap
page read and write
922E000
stack
page read and write
5F1D000
stack
page read and write
8BB000
heap
page read and write
5319000
heap
page read and write
1582000
trusted library allocation
page execute and read and write
855000
heap
page read and write
C16E000
stack
page read and write
11C5000
heap
page read and write
C170000
heap
page read and write
D57000
heap
page read and write
4DDC000
heap
page read and write
D8E000
heap
page read and write
88D000
heap
page read and write
B80000
heap
page read and write
79E000
heap
page read and write
DBE000
heap
page read and write
9C5000
heap
page read and write
7A4000
heap
page read and write
C8AD000
stack
page read and write
4DCD000
heap
page read and write
A54E000
stack
page read and write
88A000
heap
page read and write
740000
heap
page read and write
455F000
stack
page read and write
777000
heap
page read and write
DBF000
heap
page read and write
DBE000
heap
page read and write
6D5000
heap
page read and write
80F000
heap
page read and write
779000
heap
page read and write
7500000
heap
page read and write
7A2000
heap
page read and write
CB0000
heap
page read and write
7A8000
heap
page read and write
F70000
heap
page read and write
828D000
stack
page read and write
D57000
heap
page read and write
9D0D000
stack
page read and write
15C0000
trusted library allocation
page read and write
4E21000
heap
page read and write
D9A000
heap
page read and write
86A000
heap
page read and write
D57000
heap
page read and write
124E000
stack
page read and write
A7CE000
stack
page read and write
78D000
heap
page read and write
63B000
stack
page read and write
90AD000
stack
page read and write
A58D000
stack
page read and write
93ED000
stack
page read and write
91EE000
stack
page read and write
313F000
stack
page read and write
D83000
heap
page read and write
7B5000
heap
page read and write
900000
heap
page read and write
680000
heap
page read and write
890000
heap
page read and write
A04E000
stack
page read and write
79F000
heap
page read and write
1180000
heap
page read and write
8BAD000
stack
page read and write
5312000
heap
page read and write
898000
heap
page read and write
4FEE000
stack
page read and write
4E28000
heap
page read and write
94E4000
heap
page read and write
9EF000
unkown
page read and write
7DD0000
heap
page read and write
1288000
heap
page read and write
4DCA000
heap
page read and write
D7E000
heap
page read and write
D99000
heap
page read and write
79F000
heap
page read and write
5AFE000
stack
page read and write
776000
heap
page read and write
7A6000
heap
page read and write
46C0000
trusted library allocation
page read and write
94A5000
heap
page read and write
8AF000
heap
page read and write
943000
heap
page read and write
804E000
stack
page read and write
D61000
heap
page read and write
B3E000
stack
page read and write
4DC4000
heap
page read and write
75E000
heap
page read and write
970E000
stack
page read and write
791000
heap
page read and write
D95000
heap
page read and write
880000
heap
page read and write
966000
heap
page read and write
DEC000
trusted library allocation
page execute and read and write
7A2000
heap
page read and write
557D000
stack
page read and write
4C4E000
stack
page read and write
4620000
heap
page read and write
DD7E000
stack
page read and write
7F1000
heap
page read and write
C02E000
stack
page read and write
4826000
trusted library allocation
page read and write
7A8000
heap
page read and write
800D000
stack
page read and write
D81000
heap
page read and write
735000
heap
page read and write
1777000
heap
page read and write
3BD4000
trusted library allocation
page read and write
768000
heap
page read and write
813000
heap
page read and write
DDA000
trusted library allocation
page execute and read and write
540D000
stack
page read and write
864000
heap
page read and write
797000
heap
page read and write
2F4F000
unkown
page read and write
7A8000
heap
page read and write
DEA000
trusted library allocation
page execute and read and write
7AE000
heap
page read and write
CCE000
stack
page read and write
2BF7000
trusted library allocation
page read and write
5312000
heap
page read and write
1760000
trusted library allocation
page read and write
4956000
trusted library allocation
page read and write
DD2000
trusted library allocation
page execute and read and write
D91000
heap
page read and write
There are 714 hidden memdumps, click here to show them.