IOC Report
G_24370-24396_SI2_S25_8658_MPO_SMARTEX_240715.exe

loading gif

Files

File Path
Type
Category
Malicious
G_24370-24396_SI2_S25_8658_MPO_SMARTEX_240715.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Roaming\po.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\po.exe:Zone.Identifier
ASCII text, with CRLF line terminators
modified
malicious
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\po.lnk
MS Windows shortcut, Item id list present, Has Relative path, Has Working directory, ctime=Sun Dec 31 23:06:32 1600, mtime=Sun Dec 31 23:06:32 1600, atime=Sun Dec 31 23:06:32 1600, length=0, window=hide
dropped
\Device\Null
ASCII text, with CRLF line terminators
dropped

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\G_24370-24396_SI2_S25_8658_MPO_SMARTEX_240715.exe
"C:\Users\user\Desktop\G_24370-24396_SI2_S25_8658_MPO_SMARTEX_240715.exe"
malicious
C:\Windows\SysWOW64\cmd.exe
"cmd" /c ping 127.0.0.1 -n 17 > nul && copy "C:\Users\user\Desktop\G_24370-24396_SI2_S25_8658_MPO_SMARTEX_240715.exe" "C:\Users\user\AppData\Roaming\po.exe" && ping 127.0.0.1 -n 17 > nul && "C:\Users\user\AppData\Roaming\po.exe"
malicious
C:\Windows\SysWOW64\PING.EXE
ping 127.0.0.1 -n 17
malicious
C:\Windows\SysWOW64\PING.EXE
ping 127.0.0.1 -n 17
malicious
C:\Users\user\AppData\Roaming\po.exe
"C:\Users\user\AppData\Roaming\po.exe"
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1

URLs

Name
IP
Malicious
https://api.ipify.org/
172.67.74.152
https://api.ipify.org
unknown
https://account.dyn.com/
unknown
https://api.ipify.org/t
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
http://mail.iaa-airferight.com
unknown

Domains

Name
IP
Malicious
mail.iaa-airferight.com
46.175.148.58
malicious
api.ipify.org
172.67.74.152

IPs

IP
Domain
Country
Malicious
46.175.148.58
mail.iaa-airferight.com
Ukraine
malicious
127.0.0.1
unknown
unknown
malicious
172.67.74.152
api.ipify.org
United States

Registry

Path
Value
Malicious
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\AppLaunch_RASAPI32
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\AppLaunch_RASAPI32
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\AppLaunch_RASAPI32
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\AppLaunch_RASAPI32
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\AppLaunch_RASAPI32
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\AppLaunch_RASAPI32
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\AppLaunch_RASAPI32
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\AppLaunch_RASMANCS
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\AppLaunch_RASMANCS
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\AppLaunch_RASMANCS
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\AppLaunch_RASMANCS
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\AppLaunch_RASMANCS
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\AppLaunch_RASMANCS
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\AppLaunch_RASMANCS
FileDirectory
There are 5 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
4344000
trusted library allocation
page read and write
malicious
6A31000
trusted library allocation
page read and write
malicious
3091000
trusted library allocation
page read and write
malicious
4296000
trusted library allocation
page read and write
malicious
7610000
trusted library section
page read and write
malicious
4916000
trusted library allocation
page read and write
malicious
6A5C000
trusted library allocation
page read and write
malicious
497F000
trusted library allocation
page read and write
malicious
402000
remote allocation
page execute and read and write
malicious
42F3000
trusted library allocation
page read and write
malicious
2A31000
trusted library allocation
page read and write
malicious
6211000
trusted library allocation
page read and write
malicious
141D000
trusted library allocation
page execute and read and write
6A21000
trusted library allocation
page read and write
785E000
stack
page read and write
9BDA000
heap
page read and write
2D15000
trusted library allocation
page read and write
35BB000
trusted library allocation
page read and write
5600000
trusted library allocation
page read and write
35AA000
trusted library allocation
page read and write
511E000
stack
page read and write
1426000
trusted library allocation
page execute and read and write
9040000
heap
page read and write
12B7000
heap
page read and write
B14000
heap
page read and write
E50000
trusted library allocation
page read and write
2834000
trusted library allocation
page read and write
A34000
heap
page read and write
2C1C000
trusted library allocation
page read and write
9ABE000
heap
page read and write
9F6000
heap
page read and write
5980000
trusted library allocation
page execute and read and write
3004000
trusted library allocation
page read and write
4EDE000
stack
page read and write
8970000
heap
page read and write
3206000
trusted library allocation
page read and write
C8F0000
heap
page read and write
128D000
trusted library allocation
page execute and read and write
2CC6000
trusted library allocation
page read and write
2BAF000
trusted library allocation
page read and write
2CCA000
trusted library allocation
page read and write
7467000
heap
page read and write
E33000
trusted library allocation
page execute and read and write
2C0C000
trusted library allocation
page read and write
1290000
heap
page read and write
A100000
trusted library allocation
page read and write
2CE7000
trusted library allocation
page read and write
2D74000
trusted library allocation
page read and write
5A2B000
stack
page read and write
3060000
trusted library allocation
page read and write
2CDD000
trusted library allocation
page read and write
4DD0000
heap
page read and write
2BD6000
heap
page read and write
5180000
trusted library allocation
page read and write
4F30000
trusted library allocation
page read and write
BF0000
heap
page read and write
2C3E000
trusted library allocation
page read and write
2BAB000
heap
page read and write
2DA8000
trusted library allocation
page read and write
AAFE000
stack
page read and write
2D39000
trusted library allocation
page read and write
2BA0000
heap
page read and write
69D0000
heap
page execute and read and write
12D0000
heap
page read and write
E52000
trusted library allocation
page read and write
2CA4000
trusted library allocation
page read and write
4B2C000
stack
page read and write
C7EE000
stack
page read and write
A0FF000
stack
page read and write
DCF000
stack
page read and write
2C7E000
trusted library allocation
page read and write
1190000
heap
page read and write
285D000
trusted library allocation
page read and write
A8E0000
trusted library allocation
page execute and read and write
A15D000
stack
page read and write
2D72000
trusted library allocation
page read and write
163F000
stack
page read and write
E65000
trusted library allocation
page execute and read and write
9C70000
heap
page read and write
94F0000
trusted library allocation
page read and write
BCE000
stack
page read and write
8950000
trusted library allocation
page read and write
153E000
stack
page read and write
876C000
stack
page read and write
5AA000
stack
page read and write
C6AE000
stack
page read and write
2B9D000
trusted library allocation
page read and write
2C7C000
trusted library allocation
page read and write
920000
heap
page readonly
2C97000
trusted library allocation
page read and write
2C40000
trusted library allocation
page read and write
A9BE000
stack
page read and write
53C0000
trusted library allocation
page read and write
54DF000
stack
page read and write
35E4000
trusted library allocation
page read and write
CD3000
unkown
page execute read
A50000
heap
page read and write
3563000
trusted library allocation
page read and write
2D13000
trusted library allocation
page read and write
287D000
heap
page read and write
AB7000
heap
page read and write
E5A000
trusted library allocation
page execute and read and write
92DD000
stack
page read and write
E40000
trusted library allocation
page read and write
1190000
heap
page read and write
323F000
trusted library allocation
page read and write
2D0D000
trusted library allocation
page read and write
CE4000
unkown
page readonly
2B54000
trusted library allocation
page read and write
1166000
trusted library allocation
page read and write
2BE6000
heap
page read and write
2BA9000
trusted library allocation
page read and write
B34000
trusted library allocation
page read and write
2B6C000
trusted library allocation
page read and write
E80000
trusted library allocation
page read and write
1740000
trusted library allocation
page read and write
2D6E000
trusted library allocation
page read and write
1164000
trusted library allocation
page read and write
A42E000
stack
page read and write
E0000
unkown
page readonly
3603000
trusted library allocation
page read and write
A10D000
trusted library allocation
page read and write
A70000
heap
page read and write
1422000
trusted library allocation
page read and write
59A0000
trusted library allocation
page read and write
A63000
heap
page read and write
9050000
heap
page read and write
5B7E000
stack
page read and write
2BC1000
heap
page read and write
2D1C000
trusted library allocation
page read and write
67F0000
heap
page read and write
31EF000
trusted library allocation
page read and write
2BE2000
trusted library allocation
page read and write
2E50000
heap
page read and write
59E5000
heap
page read and write
522C000
stack
page read and write
89DC000
heap
page read and write
2C8D000
trusted library allocation
page read and write
35B3000
trusted library allocation
page read and write
35A8000
trusted library allocation
page read and write
DDA000
stack
page read and write
6A58000
trusted library allocation
page read and write
51A3000
heap
page execute and read and write
9C70000
trusted library section
page read and write
6A64000
trusted library allocation
page read and write
A7AE000
stack
page read and write
6FA6000
heap
page read and write
8F54000
heap
page read and write
5A70000
trusted library allocation
page read and write
5A50000
heap
page read and write
3690000
trusted library allocation
page read and write
A4AE000
stack
page read and write
2C15000
trusted library allocation
page read and write
3570000
trusted library allocation
page read and write
2BAD000
trusted library allocation
page read and write
2CE5000
trusted library allocation
page read and write
365D000
trusted library allocation
page read and write
67BE000
trusted library allocation
page read and write
2BA1000
trusted library allocation
page read and write
3270000
trusted library allocation
page read and write
B40000
trusted library allocation
page read and write
1283000
trusted library allocation
page execute and read and write
358A000
trusted library allocation
page read and write
2BFA000
trusted library allocation
page read and write
FCF000
stack
page read and write
B33000
trusted library allocation
page execute and read and write
8960000
trusted library allocation
page execute and read and write
1437000
heap
page read and write
743F000
heap
page read and write
EC0000
heap
page read and write
AC3000
heap
page read and write
2CF6000
trusted library allocation
page read and write
1170000
trusted library allocation
page read and write
3580000
trusted library allocation
page read and write
69E1000
trusted library allocation
page read and write
1420000
trusted library allocation
page read and write
9E90000
trusted library allocation
page execute and read and write
2D0F000
trusted library allocation
page read and write
9E80000
trusted library section
page read and write
2DA6000
trusted library allocation
page read and write
2B72000
trusted library allocation
page read and write
27EE000
stack
page read and write
E34000
trusted library allocation
page read and write
B211000
trusted library allocation
page read and write
9E6E000
stack
page read and write
2C57000
trusted library allocation
page read and write
48F7000
trusted library allocation
page read and write
5840000
heap
page execute and read and write
57D0000
trusted library allocation
page read and write
910000
heap
page read and write
326B000
trusted library allocation
page read and write
A1A0000
trusted library allocation
page read and write
48B9000
trusted library allocation
page read and write
5A60000
trusted library allocation
page read and write
6718000
trusted library allocation
page read and write
A1CE000
heap
page read and write
E30000
trusted library allocation
page read and write
1750000
heap
page read and write
4F40000
trusted library allocation
page read and write
CC2000
unkown
page execute read
1284000
trusted library allocation
page read and write
9C50000
heap
page read and write
905A000
heap
page read and write
EA0000
trusted library allocation
page read and write
2D76000
trusted library allocation
page read and write
2CFC000
trusted library allocation
page read and write
4F20000
trusted library allocation
page read and write
A1B2000
trusted library allocation
page read and write
2851000
trusted library allocation
page read and write
2DBB000
trusted library allocation
page read and write
9A4000
heap
page read and write
5BD0000
trusted library allocation
page execute and read and write
9E70000
trusted library allocation
page execute and read and write
8F50000
heap
page read and write
2BE0000
trusted library allocation
page read and write
3040000
trusted library allocation
page read and write
906D000
heap
page read and write
9077000
heap
page read and write
9C5A000
heap
page read and write
BF5000
heap
page read and write
35EF000
trusted library allocation
page read and write
57CE000
stack
page read and write
2870000
heap
page read and write
6A56000
trusted library allocation
page read and write
A560000
trusted library allocation
page execute and read and write
7A09000
trusted library allocation
page read and write
282C000
stack
page read and write
89B0000
heap
page read and write
9AB0000
heap
page read and write
CDB000
unkown
page execute read
A237000
trusted library allocation
page read and write
2D8F000
trusted library allocation
page read and write
50ED000
stack
page read and write
2C81000
trusted library allocation
page read and write
2C5F000
trusted library allocation
page read and write
94F8000
trusted library allocation
page read and write
CC8000
unkown
page execute read
2B50000
heap
page read and write
E90000
trusted library allocation
page execute and read and write
2C78000
trusted library allocation
page read and write
2C2B000
trusted library allocation
page read and write
2C0F000
trusted library allocation
page read and write
2DBE000
heap
page read and write
35E2000
trusted library allocation
page read and write
1140000
heap
page read and write
3686000
trusted library allocation
page read and write
2B79000
trusted library allocation
page read and write
2C07000
trusted library allocation
page read and write
5BE0000
heap
page read and write
B40000
heap
page read and write
7410000
heap
page read and write
35FF000
trusted library allocation
page read and write
2D93000
trusted library allocation
page read and write
8820000
trusted library allocation
page read and write
742A000
heap
page read and write
E3D000
trusted library allocation
page execute and read and write
919E000
stack
page read and write
2D78000
trusted library allocation
page read and write
4F60000
heap
page read and write
2CC8000
trusted library allocation
page read and write
A117000
trusted library allocation
page read and write
A3EF000
stack
page read and write
978000
heap
page read and write
87C0000
trusted library allocation
page execute and read and write
2D6C000
trusted library allocation
page read and write
2BAB000
trusted library allocation
page read and write
6A17000
trusted library allocation
page read and write
2CF8000
trusted library allocation
page read and write
A47000
heap
page read and write
2C70000
trusted library allocation
page read and write
949E000
stack
page read and write
6EA000
stack
page read and write
B52000
heap
page read and write
B65000
trusted library allocation
page execute and read and write
582D000
stack
page read and write
27BC000
stack
page read and write
2C13000
trusted library allocation
page read and write
142A000
trusted library allocation
page execute and read and write
67D6000
trusted library allocation
page read and write
59E0000
heap
page read and write
2C44000
trusted library allocation
page read and write
1660000
trusted library allocation
page read and write
A51000
heap
page read and write
2D3B000
trusted library allocation
page read and write
400000
remote allocation
page execute and read and write
1645000
trusted library allocation
page execute and read and write
6A5A000
trusted library allocation
page read and write
3050000
trusted library allocation
page read and write
730E000
stack
page read and write
2D2C000
trusted library allocation
page read and write
3A31000
trusted library allocation
page read and write
301E000
trusted library allocation
page read and write
1180000
trusted library allocation
page read and write
A1B0000
trusted library allocation
page read and write
2DEC000
trusted library allocation
page read and write
B3D000
trusted library allocation
page execute and read and write
43F8000
trusted library allocation
page read and write
2D34000
trusted library allocation
page read and write
B67000
trusted library allocation
page execute and read and write
94DE000
stack
page read and write
A820000
heap
page read and write
5090000
trusted library section
page read and write
129E000
heap
page read and write
AB3E000
stack
page read and write
2D5C000
trusted library allocation
page read and write
4DC0000
trusted library allocation
page execute and read and write
A5BB000
trusted library allocation
page read and write
2FFF000
stack
page read and write
AABE000
stack
page read and write
2DBF000
trusted library allocation
page read and write
2BD0000
trusted library allocation
page read and write
4F48000
trusted library allocation
page read and write
2B95000
trusted library allocation
page read and write
67D1000
trusted library allocation
page read and write
2C1E000
trusted library allocation
page read and write
35F4000
trusted library allocation
page read and write
2B64000
trusted library allocation
page read and write
2DA0000
trusted library allocation
page read and write
4D6E000
stack
page read and write
3000000
trusted library allocation
page read and write
2CFE000
trusted library allocation
page read and write
67B0000
trusted library allocation
page read and write
9FFE000
stack
page read and write
AC7E000
stack
page read and write
2B5C000
trusted library allocation
page read and write
9CA0000
heap
page read and write
7E7000
stack
page read and write
2830000
trusted library allocation
page read and write
A5AE000
stack
page read and write
578E000
stack
page read and write
6FA2000
heap
page read and write
AE0000
heap
page read and write
B50000
trusted library allocation
page read and write
1353000
heap
page read and write
2C17000
trusted library allocation
page read and write
69C0000
heap
page read and write
2DC3000
trusted library allocation
page read and write
2C59000
trusted library allocation
page read and write
CBC000
unkown
page execute read
9500000
trusted library allocation
page execute and read and write
67DD000
trusted library allocation
page read and write
1730000
trusted library allocation
page read and write
A1C0000
trusted library allocation
page execute and read and write
B30000
trusted library allocation
page read and write
2BDE000
trusted library allocation
page read and write
861D000
stack
page read and write
67C2000
trusted library allocation
page read and write
970000
heap
page read and write
2DA2000
trusted library allocation
page read and write
895B000
trusted library allocation
page read and write
2DB5000
trusted library allocation
page read and write
2BEF000
trusted library allocation
page read and write
5C40000
trusted library allocation
page read and write
915E000
stack
page read and write
87B0000
trusted library allocation
page read and write
48E8000
trusted library allocation
page read and write
A610000
heap
page read and write
2C63000
trusted library allocation
page read and write
1410000
trusted library allocation
page read and write
A5C0000
trusted library allocation
page execute and read and write
4F66000
heap
page read and write
2B4E000
trusted library allocation
page read and write
2DCF000
heap
page read and write
2B74000
trusted library allocation
page read and write
2C95000
trusted library allocation
page read and write
53A0000
heap
page read and write
57E0000
trusted library allocation
page execute and read and write
53B0000
trusted library allocation
page read and write
2C8F000
trusted library allocation
page read and write
2C91000
trusted library allocation
page read and write
133F000
heap
page read and write
5C30000
trusted library allocation
page execute and read and write
2BF8000
trusted library allocation
page read and write
3216000
trusted library allocation
page read and write
1430000
heap
page read and write
2B7F000
trusted library allocation
page read and write
1703000
heap
page read and write
5A30000
heap
page read and write
2CC4000
trusted library allocation
page read and write
A340000
heap
page read and write
2DC4000
heap
page read and write
2C05000
trusted library allocation
page read and write
8790000
heap
page read and write
84DD000
stack
page read and write
9E2E000
stack
page read and write
4F7E000
stack
page read and write
2DA0000
direct allocation
page read and write
2D5E000
trusted library allocation
page read and write
C8ED000
stack
page read and write
2BCA000
trusted library allocation
page read and write
2C2E000
trusted library allocation
page read and write
2D19000
trusted library allocation
page read and write
5170000
heap
page read and write
83DD000
stack
page read and write
31BB000
trusted library allocation
page read and write
6D9E000
stack
page read and write
59D0000
trusted library section
page readonly
2DD2000
trusted library allocation
page read and write
1150000
heap
page read and write
AC0000
unkown
page readonly
E0E000
stack
page read and write
2D8D000
trusted library allocation
page read and write
35E0000
trusted library allocation
page read and write
5BA1000
trusted library allocation
page read and write
A1EE000
stack
page read and write
2D2A000
trusted library allocation
page read and write
2C3C000
trusted library allocation
page read and write
35A3000
trusted library allocation
page read and write
4ECE000
stack
page read and write
46E8000
trusted library allocation
page read and write
A55D000
stack
page read and write
2BCC000
trusted library allocation
page read and write
5843000
heap
page execute and read and write
55DF000
stack
page read and write
C7AD000
stack
page read and write
302000
unkown
page execute read
88CE000
stack
page read and write
2C5B000
trusted library allocation
page read and write
2DCA000
heap
page read and write
3594000
trusted library allocation
page read and write
2C29000
trusted library allocation
page read and write
B6B000
trusted library allocation
page execute and read and write
6A6A000
trusted library allocation
page read and write
1160000
trusted library allocation
page read and write
2BCE000
trusted library allocation
page read and write
B5A000
trusted library allocation
page execute and read and write
795F000
stack
page read and write
4F90000
trusted library allocation
page execute and read and write
302D000
trusted library allocation
page read and write
6C9E000
stack
page read and write
2DD8000
trusted library allocation
page read and write
89F8000
heap
page read and write
2DC5000
trusted library allocation
page read and write
2A20000
heap
page execute and read and write
2C09000
trusted library allocation
page read and write
35AE000
trusted library allocation
page read and write
5BF0000
trusted library allocation
page read and write
2B97000
trusted library allocation
page read and write
2CE3000
trusted library allocation
page read and write
2C48000
trusted library allocation
page read and write
2B50000
trusted library allocation
page read and write
1710000
trusted library allocation
page read and write
2C65000
trusted library allocation
page read and write
B62000
trusted library allocation
page read and write
9A6000
heap
page read and write
4F80000
trusted library allocation
page read and write
2C46000
trusted library allocation
page read and write
E20000
trusted library allocation
page read and write
9EB000
heap
page read and write
26BD000
stack
page read and write
16EC000
stack
page read and write
2C74000
trusted library allocation
page read and write
4EE0000
trusted library allocation
page read and write
32B4000
trusted library allocation
page read and write
5D90000
trusted library allocation
page read and write
51A0000
heap
page execute and read and write
4D70000
trusted library allocation
page read and write
1270000
trusted library allocation
page read and write
1642000
trusted library allocation
page read and write
8980000
trusted library allocation
page read and write
2BB3000
trusted library allocation
page read and write
E6B000
trusted library allocation
page execute and read and write
2BC5000
heap
page read and write
317F000
trusted library allocation
page read and write
8B4D000
stack
page read and write
A370000
heap
page read and write
A51D000
stack
page read and write
2BD7000
heap
page read and write
A110000
trusted library allocation
page read and write
2DBD000
trusted library allocation
page read and write
4091000
trusted library allocation
page read and write
6A1F000
trusted library allocation
page read and write
5A40000
heap
page read and write
2DA4000
trusted library allocation
page read and write
4E70000
trusted library allocation
page read and write
871D000
stack
page read and write
6FFD000
heap
page read and write
8F8000
stack
page read and write
2A30000
heap
page read and write
2A1C000
stack
page read and write
3021000
trusted library allocation
page read and write
2D91000
trusted library allocation
page read and write
2DD6000
trusted library allocation
page read and write
6FA4000
heap
page read and write
2C27000
trusted library allocation
page read and write
12AF000
heap
page read and write
929F000
stack
page read and write
13CE000
stack
page read and write
1640000
trusted library allocation
page read and write
B20000
trusted library allocation
page read and write
2BE4000
trusted library allocation
page read and write
4259000
trusted library allocation
page read and write
5BBE000
stack
page read and write
8ADE000
stack
page read and write
515E000
stack
page read and write
2BC4000
heap
page read and write
2B5E000
trusted library allocation
page read and write
512B000
stack
page read and write
55EE000
stack
page read and write
E62000
trusted library allocation
page read and write
A4DE000
stack
page read and write
AB7E000
stack
page read and write
2D17000
trusted library allocation
page read and write
16AE000
stack
page read and write
2CE1000
trusted library allocation
page read and write
4EF3000
heap
page read and write
2D02000
trusted library allocation
page read and write
1185000
trusted library allocation
page read and write
A230000
trusted library allocation
page read and write
8780000
heap
page read and write
3080000
heap
page execute and read and write
760E000
stack
page read and write
10F8000
stack
page read and write
4F50000
trusted library allocation
page read and write
A60000
heap
page read and write
3569000
trusted library allocation
page read and write
B52000
trusted library allocation
page read and write
2BDA000
trusted library allocation
page read and write
284E000
trusted library allocation
page read and write
5960000
heap
page read and write
E4D000
trusted library allocation
page execute and read and write
A8AE000
stack
page read and write
45E8000
trusted library allocation
page read and write
8C4D000
stack
page read and write
3236000
trusted library allocation
page read and write
AC2000
unkown
page execute read
2D85000
trusted library allocation
page read and write
8770000
trusted library section
page readonly
67CE000
trusted library allocation
page read and write
EB0000
trusted library allocation
page read and write
12D4000
heap
page read and write
9BBC000
stack
page read and write
1720000
heap
page read and write
9C6D000
heap
page read and write
A360000
trusted library allocation
page execute and read and write
CCE000
unkown
page execute read
79E1000
trusted library allocation
page read and write
1280000
trusted library allocation
page read and write
AD0000
heap
page read and write
B56000
trusted library allocation
page execute and read and write
2BC8000
trusted library allocation
page read and write
742E000
heap
page read and write
3186000
trusted library allocation
page read and write
A5B0000
trusted library allocation
page read and write
746B000
heap
page read and write
2C8B000
trusted library allocation
page read and write
16F0000
trusted library allocation
page execute and read and write
A1C0000
heap
page read and write
2C7A000
trusted library allocation
page read and write
1700000
heap
page read and write
9BC0000
heap
page read and write
905C000
stack
page read and write
4EF0000
heap
page read and write
2CC2000
trusted library allocation
page read and write
89E5000
heap
page read and write
89A0000
heap
page read and write
287A000
heap
page read and write
2DD7000
heap
page read and write
8F20000
heap
page execute and read and write
B4D000
trusted library allocation
page execute and read and write
7479000
heap
page read and write
29DD000
stack
page read and write
2CDB000
trusted library allocation
page read and write
12C3000
heap
page read and write
2A20000
heap
page read and write
55AE000
stack
page read and write
5BC0000
trusted library allocation
page read and write
2D09000
trusted library allocation
page read and write
ABE000
stack
page read and write
2D30000
trusted library allocation
page read and write
2CD9000
trusted library allocation
page read and write
68FE000
stack
page read and write
4F44000
trusted library allocation
page read and write
36AF000
trusted library allocation
page read and write
2BD8000
trusted library allocation
page read and write
89A5000
heap
page read and write
A5F0000
trusted library allocation
page read and write
3228000
trusted library allocation
page read and write
2DAD000
trusted library allocation
page read and write
6A2D000
trusted library allocation
page read and write
32B6000
trusted library allocation
page read and write
A98000
heap
page read and write
89C0000
heap
page read and write
8E4D000
stack
page read and write
93DE000
stack
page read and write
8956000
trusted library allocation
page read and write
E67000
trusted library allocation
page execute and read and write
9C90000
trusted library allocation
page execute and read and write
4F1C000
stack
page read and write
31FD000
trusted library allocation
page read and write
2BC6000
trusted library allocation
page read and write
2BF1000
trusted library allocation
page read and write
EC7000
heap
page read and write
8C50000
heap
page read and write
1198000
heap
page read and write
4F3E000
stack
page read and write
2BE7000
heap
page read and write
1647000
trusted library allocation
page execute and read and write
945D000
stack
page read and write
3588000
trusted library allocation
page read and write
2CD5000
trusted library allocation
page read and write
6FC6000
heap
page read and write
89CA000
heap
page read and write
96E000
stack
page read and write
9BD5000
heap
page read and write
35AC000
trusted library allocation
page read and write
AE5000
heap
page read and write
59B0000
heap
page execute and read and write
2C72000
trusted library allocation
page read and write
877F000
trusted library section
page readonly
2DD4000
trusted library allocation
page read and write
84E0000
heap
page read and write
1758000
heap
page read and write
740E000
stack
page read and write
9EFE000
stack
page read and write
2D6A000
trusted library allocation
page read and write
172D000
heap
page read and write
2BC6000
heap
page read and write
A9E000
heap
page read and write
2EAF000
heap
page read and write
2BA3000
trusted library allocation
page read and write
A240000
trusted library allocation
page read and write
594F000
stack
page read and write
903D000
stack
page read and write
2D70000
trusted library allocation
page read and write
7A42000
trusted library allocation
page read and write
AD7000
heap
page read and write
2C01000
trusted library allocation
page read and write
5970000
trusted library allocation
page read and write
8E20000
heap
page read and write
FF830000
trusted library allocation
page execute and read and write
35B5000
trusted library allocation
page read and write
B22000
heap
page read and write
999000
heap
page read and write
164B000
trusted library allocation
page execute and read and write
2B4C000
trusted library allocation
page read and write
2BF6000
trusted library allocation
page read and write
A90000
heap
page read and write
A22E000
stack
page read and write
357A000
trusted library allocation
page read and write
55E0000
trusted library allocation
page execute and read and write
694C000
stack
page read and write
2D8B000
trusted library allocation
page read and write
2DC1000
trusted library allocation
page read and write
2C61000
trusted library allocation
page read and write
2B52000
trusted library allocation
page read and write
5A76000
trusted library allocation
page read and write
2C5D000
trusted library allocation
page read and write
69AE000
stack
page read and write
87A0000
heap
page execute and read and write
2C11000
trusted library allocation
page read and write
3578000
trusted library allocation
page read and write
7426000
heap
page read and write
AF0000
heap
page read and write
3055000
trusted library allocation
page read and write
BD0000
heap
page read and write
6F90000
heap
page read and write
3026000
trusted library allocation
page read and write
297E000
stack
page read and write
8990000
trusted library allocation
page read and write
A600000
trusted library allocation
page execute and read and write
9061000
heap
page read and write
2CDF000
trusted library allocation
page read and write
4DBE000
stack
page read and write
AC2000
unkown
page execute read
2B9A000
trusted library allocation
page read and write
52AE000
stack
page read and write
2D00000
trusted library allocation
page read and write
3565000
trusted library allocation
page read and write
A46E000
stack
page read and write
67BB000
trusted library allocation
page read and write
E56000
trusted library allocation
page execute and read and write
3605000
trusted library allocation
page read and write
2856000
trusted library allocation
page read and write
941E000
stack
page read and write
5608000
trusted library allocation
page read and write
140E000
stack
page read and write
31B2000
trusted library allocation
page read and write
2D7F000
trusted library allocation
page read and write
2D32000
trusted library allocation
page read and write
2C42000
trusted library allocation
page read and write
A97E000
stack
page read and write
There are 672 hidden memdumps, click here to show them.