IOC Report
file.exe

loading gif

Files

File Path
Type
Category
Malicious
file.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Roaming\2p4HikHFep.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\IDVNp0HKaI.exe
PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\Public\Desktop\Google Chrome.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Description string, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:41 2023, mtime=Thu Oct 5 05:47:17 2023, atime=Wed Sep 27 08:36:54 2023, length=3242272, window=hide
dropped
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\2p4HikHFep.exe.log
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\IDVNp0HKaI.exe.log
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\Tmp8D32.tmp
data
dropped
C:\Users\user\AppData\Local\Temp\Tmp8D43.tmp
data
dropped
C:\Users\user\AppData\Roaming\Microsoft\Crypto\RSA\S-1-5-21-2246122658-3693405117-2476756634-1003\76b53b3ec448f7ccdda2063b15d2bfc3_9e146be9-c76a-4720-bcdb-53011b87bd06
data
dropped

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\file.exe
"C:\Users\user\Desktop\file.exe"
malicious
C:\Users\user\AppData\Roaming\IDVNp0HKaI.exe
"C:\Users\user\AppData\Roaming\IDVNp0HKaI.exe"
malicious
C:\Users\user\AppData\Roaming\2p4HikHFep.exe
"C:\Users\user\AppData\Roaming\2p4HikHFep.exe"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1

URLs

Name
IP
Malicious
http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-soap-message-security-1.0#Text
unknown
http://schemas.xmlsoap.org/ws/2005/02/sc/sct
unknown
http://schemas.xmlsoap.org/ws/2004/04/security/sc/dk
unknown
https://duckduckgo.com/ac/?q=
unknown
http://tempuri.org/Entity/Id14ResponseD
unknown
http://tempuri.org/Entity/Id23ResponseD
unknown
http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-soap-message-security-1.0#HexBinary
unknown
http://tempuri.org/Entity/Id12Response
unknown
http://tempuri.org/
unknown
http://tempuri.org/Entity/Id2Response
unknown
http://tempuri.org/Entity/Id15V
unknown
http://schemas.xmlsoap.org/ws/2005/02/sc/dk/p_sha1
unknown
http://tempuri.org/Entity/Id21Response
unknown
http://schemas.xmlsoap.org/2005/02/trust/spnego#GSS_Wrap
unknown
http://tempuri.org/Entity/Id9
unknown
http://docs.oasis-open.org/wss/oasis-wss-saml-token-profile-1.1#SAMLID
unknown
http://tempuri.org/Entity/Id8
unknown
http://tempuri.org/Entity/Id6ResponseD
unknown
http://tempuri.org/Entity/Id5
unknown
http://schemas.xmlsoap.org/ws/2004/10/wsat/Prepare
unknown
http://tempuri.org/Entity/Id4
unknown
http://tempuri.org/Entity/Id7
unknown
http://tempuri.org/Entity/Id6
unknown
http://schemas.xmlsoap.org/ws/2005/02/trust#BinarySecret
unknown
http://tempuri.org/Entity/Id19Response
unknown
http://docs.oasis-open.org/wss/oasis-wss-rel-token-profile-1.0.pdf#license
unknown
http://schemas.xmlsoap.org/ws/2005/02/trust/RSTR/Issue
unknown
http://schemas.xmlsoap.org/ws/2004/10/wsat/Aborted
unknown
http://schemas.xmlsoap.org/ws/2005/02/rm/TerminateSequence
unknown
http://tempuri.org/Entity/Id13ResponseD
unknown
https://discord.com/api/v9/users/
unknown
http://schemas.xmlsoap.org/ws/2004/10/wsat/fault
unknown
http://schemas.xmlsoap.org/ws/2004/10/wsat
unknown
http://docs.oasis-open.org/wss/oasis-wss-soap-message-security-1.1#EncryptedKey
unknown
http://tempuri.org/Entity/Id15Response
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
http://schemas.xmlsoap.org/ws/2005/02/trust/RSTR/SCT/Renew
unknown
http://schemas.xmlsoap.org/ws/2004/08/addressing/faultp9
unknown
http://schemas.xmlsoap.org/ws/2004/10/wscoor/Register
unknown
http://tempuri.org/Entity/Id6Response
unknown
http://schemas.xmlsoap.org/ws/2004/04/trust/SymmetricKey
unknown
https://api.ip.sb/ip
unknown
http://schemas.xmlsoap.org/ws/2004/04/sc
unknown
http://tempuri.org/Entity/Id1ResponseD
unknown
http://schemas.xmlsoap.org/ws/2004/10/wsat/Volatile2PC
unknown
http://schemas.xmlsoap.org/ws/2005/02/trust/RSTR/SCT/Cancel
unknown
http://tempuri.org/Entity/Id9Response
unknown
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
unknown
http://tempuri.org/Entity/Id20
unknown
http://tempuri.org/Entity/Id21
unknown
http://tempuri.org/Entity/Id22
unknown
http://docs.oasis-open.org/wss/oasis-wss-kerberos-token-profile-1.1#Kerberosv5APREQSHA1
unknown
http://tempuri.org/Entity/Id23
unknown
http://schemas.xmlsoap.org/ws/2004/04/security/trust/CK/PSHA1
unknown
http://tempuri.org/Entity/Id24
unknown
http://schemas.xmlsoap.org/ws/2004/04/security/trust/RSTR/Issue
unknown
http://tempuri.org/Entity/Id24Response
unknown
https://www.ecosia.org/newtab/
unknown
http://tempuri.org/Entity/Id1Response
unknown
http://schemas.xmlsoap.org/ws/2005/02/rm/AckRequested
unknown
http://schemas.xmlsoap.org/ws/2004/10/wsat/ReadOnly
unknown
http://schemas.xmlsoap.org/ws/2004/10/wsat/Replay
unknown
http://schemas.xmlsoap.org/ws/2005/02/trust/tlsnego
unknown
http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-soap-message-security-1.0#Base64Binary
unknown
http://schemas.xmlsoap.org/ws/2004/10/wsat/Durable2PC
unknown
http://schemas.xmlsoap.org/ws/2004/04/security/trust/SymmetricKey
unknown
http://tempuri.org/Entity/Id21ResponseD
unknown
http://schemas.xmlsoap.org/ws/2004/08/addressing
unknown
http://schemas.xmlsoap.org/ws/2005/02/trust/RST/Issue
unknown
http://schemas.xmlsoap.org/ws/2004/10/wsat/Completion
unknown
http://schemas.xmlsoap.org/ws/2004/04/trust
unknown
http://tempuri.org/Entity/Id10
unknown
http://tempuri.org/Entity/Id11
unknown
http://tempuri.org/Entity/Id10ResponseD
unknown
http://tempuri.org/Entity/Id12
unknown
http://tempuri.org/Entity/Id16Response
unknown
http://schemas.xmlsoap.org/ws/2004/10/wscoor/CreateCoordinationContextResponse
unknown
http://schemas.xmlsoap.org/ws/2005/02/trust/RST/SCT/Cancel
unknown
http://tempuri.org/Entity/Id13
unknown
http://tempuri.org/Entity/Id14
unknown
http://tempuri.org/Entity/Id15
unknown
http://tempuri.org/Entity/Id16
unknown
http://schemas.xmlsoap.org/ws/2005/02/trust/Nonce
unknown
http://tempuri.org/Entity/Id17
unknown
http://tempuri.org/Entity/Id18
unknown
http://tempuri.org/Entity/Id5Response
unknown
http://tempuri.org/Entity/Id19
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/dns
unknown
http://tempuri.org/Entity/Id15ResponseD
unknown
http://tempuri.org/Entity/Id10Response
unknown
http://schemas.xmlsoap.org/ws/2005/02/trust/Renew
unknown
http://tempuri.org/Entity/Id11ResponseD
unknown
http://tempuri.org/Entity/Id8Response
unknown
http://schemas.xmlsoap.org/ws/2004/04/trust/PublicKey
unknown
http://docs.oasis-open.org/wss/oasis-wss-saml-token-profile-1.1#SAMLV2.0
unknown
http://docs.oasis-open.org/wss/oasis-wss-saml-token-profile-1.0#SAMLAssertionID
unknown
http://schemas.xmlsoap.org/ws/2004/04/security/trust/RST/SCT
unknown
http://schemas.xmlsoap.org/ws/2006/02/addressingidentity
unknown
http://tempuri.org/Entity/Id17ResponseD
unknown
http://schemas.xmlsoap.org/soap/envelope/
unknown
There are 90 hidden URLs, click here to show them.

IPs

IP
Domain
Country
Malicious
65.21.18.51
unknown
United States
malicious

Registry

Path
Value
Malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\F1A578C4CB5DE79A370893983FD4DA8B67B2B064
Blob
malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
Owner
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
SessionHash
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
Sequence
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
RegFiles0000
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
RegFilesHash

Memdumps

Base Address
Regiontype
Protect
Malicious
142000
unkown
page readonly
malicious
E09000
unkown
page read and write
malicious
DC4000
unkown
page read and write
malicious
C62000
unkown
page readonly
malicious
2471000
trusted library allocation
page read and write
malicious
497D000
trusted library allocation
page read and write
609E000
stack
page read and write
4976000
trusted library allocation
page read and write
BDE000
stack
page read and write
57C0000
heap
page read and write
6D36000
heap
page read and write
27D7000
trusted library allocation
page read and write
31F3000
trusted library allocation
page read and write
245E000
stack
page read and write
4950000
trusted library allocation
page read and write
76E000
heap
page read and write
2F9F000
trusted library allocation
page read and write
49A8000
trusted library allocation
page read and write
3113000
trusted library allocation
page read and write
2230000
trusted library allocation
page read and write
2FD1000
trusted library allocation
page read and write
263B000
trusted library allocation
page read and write
2262000
trusted library allocation
page read and write
113E000
stack
page read and write
372A000
trusted library allocation
page read and write
6DCA000
heap
page read and write
2FCE000
trusted library allocation
page read and write
6180000
trusted library allocation
page read and write
12CA000
trusted library allocation
page execute and read and write
5C5E000
stack
page read and write
34EF000
stack
page read and write
49EE000
trusted library allocation
page read and write
610000
heap
page read and write
61D0000
trusted library allocation
page execute and read and write
5660000
trusted library allocation
page execute and read and write
31BF000
trusted library allocation
page read and write
5820000
trusted library allocation
page read and write
3737000
trusted library allocation
page read and write
11C0000
heap
page read and write
34B8000
trusted library allocation
page read and write
2A03000
trusted library allocation
page read and write
6FA0000
trusted library allocation
page execute and read and write
2640000
trusted library allocation
page read and write
6130000
trusted library allocation
page read and write
6F78000
trusted library allocation
page read and write
7670000
trusted library allocation
page read and write
2330000
trusted library allocation
page read and write
6360000
trusted library allocation
page read and write
306E000
stack
page read and write
2FA0000
heap
page execute and read and write
354C000
trusted library allocation
page read and write
56AE000
stack
page read and write
7822000
trusted library allocation
page read and write
3223000
trusted library allocation
page read and write
61E0000
trusted library allocation
page execute and read and write
3471000
trusted library allocation
page read and write
749E000
stack
page read and write
5F23000
heap
page read and write
3221000
trusted library allocation
page read and write
CB6000
unkown
page readonly
60E0000
trusted library allocation
page read and write
3001000
trusted library allocation
page read and write
7F360000
trusted library allocation
page execute and read and write
49B0000
trusted library allocation
page read and write
43A000
stack
page read and write
6D2B000
heap
page read and write
5F11000
heap
page read and write
31CC000
trusted library allocation
page read and write
12D0000
heap
page read and write
34F3000
trusted library allocation
page read and write
31D8000
trusted library allocation
page read and write
13C2000
heap
page read and write
2313000
heap
page read and write
3080000
heap
page read and write
A30000
heap
page read and write
5C40000
trusted library allocation
page execute and read and write
6F30000
trusted library allocation
page read and write
519D000
stack
page read and write
2A4B000
trusted library allocation
page read and write
12C2000
trusted library allocation
page read and write
DC6000
unkown
page write copy
324F000
trusted library allocation
page read and write
177000
unkown
page readonly
6F70000
trusted library allocation
page read and write
1361000
heap
page read and write
4971000
trusted library allocation
page read and write
C6F000
heap
page read and write
2A1A000
trusted library allocation
page read and write
49A0000
trusted library allocation
page read and write
36A4000
trusted library allocation
page read and write
3215000
trusted library allocation
page read and write
5A6F000
stack
page read and write
223D000
trusted library allocation
page execute and read and write
13CE000
heap
page read and write
60F6000
trusted library allocation
page read and write
3555000
trusted library allocation
page read and write
4A30000
trusted library allocation
page read and write
73BF000
stack
page read and write
318F000
trusted library allocation
page read and write
1383000
heap
page read and write
5EE000
stack
page read and write
4982000
trusted library allocation
page read and write
5850000
heap
page read and write
1355000
heap
page read and write
6F23000
trusted library allocation
page read and write
3242000
trusted library allocation
page read and write
2F70000
trusted library allocation
page read and write
4C50000
trusted library allocation
page read and write
370B000
trusted library allocation
page read and write
70E0000
trusted library allocation
page read and write
3578000
trusted library allocation
page read and write
22CE000
stack
page read and write
31C1000
trusted library allocation
page read and write
2252000
trusted library allocation
page read and write
37D7000
trusted library allocation
page read and write
641C000
stack
page read and write
A5E000
stack
page read and write
7050000
trusted library allocation
page read and write
26C0000
trusted library allocation
page read and write
5680000
trusted library section
page readonly
3240000
trusted library allocation
page read and write
6F90000
trusted library allocation
page read and write
6F32000
trusted library allocation
page read and write
C64000
heap
page read and write
5C30000
trusted library allocation
page execute and read and write
3181000
trusted library allocation
page read and write
323A000
trusted library allocation
page read and write
15F0000
trusted library allocation
page read and write
5F38000
heap
page read and write
6F4A000
trusted library allocation
page read and write
4C1E000
stack
page read and write
37DD000
trusted library allocation
page read and write
665000
heap
page read and write
6D31000
heap
page read and write
2FE2000
trusted library allocation
page read and write
5F5C000
heap
page read and write
537000
stack
page read and write
6660000
trusted library allocation
page read and write
6120000
trusted library allocation
page read and write
77D0000
trusted library allocation
page read and write
76CE000
stack
page read and write
33EE000
stack
page read and write
311B000
trusted library allocation
page read and write
3257000
trusted library allocation
page read and write
31B3000
trusted library allocation
page read and write
273F000
trusted library allocation
page read and write
2F60000
heap
page read and write
6D25000
heap
page read and write
31F5000
trusted library allocation
page read and write
595D000
stack
page read and write
54C1000
heap
page read and write
318B000
trusted library allocation
page read and write
5510000
heap
page execute and read and write
460C000
stack
page read and write
5F3C000
heap
page read and write
3665000
trusted library allocation
page read and write
6D80000
heap
page read and write
15D2000
trusted library allocation
page read and write
8E86000
heap
page read and write
6F48000
trusted library allocation
page read and write
13A9000
heap
page read and write
E8D000
unkown
page readonly
30ED000
trusted library allocation
page read and write
60EB000
trusted library allocation
page read and write
6170000
trusted library allocation
page read and write
2A35000
trusted library allocation
page read and write
352F000
trusted library allocation
page read and write
2220000
trusted library allocation
page read and write
3500000
trusted library allocation
page read and write
34A7000
trusted library allocation
page read and write
5E2E000
stack
page read and write
60B5000
trusted library allocation
page read and write
745E000
stack
page read and write
31D6000
trusted library allocation
page read and write
322D000
trusted library allocation
page read and write
32AE000
stack
page read and write
2280000
trusted library allocation
page read and write
5E60000
heap
page read and write
12B3000
trusted library allocation
page read and write
6E49000
heap
page read and write
C0A000
heap
page read and write
12A4000
trusted library allocation
page read and write
6370000
trusted library allocation
page read and write
34AA000
trusted library allocation
page read and write
320E000
trusted library allocation
page read and write
735E000
stack
page read and write
366F000
trusted library allocation
page read and write
A66000
heap
page read and write
3550000
trusted library allocation
page read and write
2636000
trusted library allocation
page read and write
363F000
trusted library allocation
page read and write
355B000
trusted library allocation
page read and write
33AF000
stack
page read and write
364C000
trusted library allocation
page read and write
3611000
trusted library allocation
page read and write
6DFD000
heap
page read and write
760000
heap
page read and write
6390000
trusted library allocation
page read and write
3559000
trusted library allocation
page read and write
27C0000
trusted library allocation
page read and write
1680000
heap
page read and write
6D54000
heap
page read and write
786000
heap
page read and write
C0E000
heap
page read and write
2518000
trusted library allocation
page read and write
77CE000
stack
page read and write
31DA000
trusted library allocation
page read and write
6E1F000
heap
page read and write
2A40000
trusted library allocation
page read and write
6380000
trusted library allocation
page read and write
2A3B000
trusted library allocation
page read and write
709E000
stack
page read and write
365E000
trusted library allocation
page read and write
34E6000
trusted library allocation
page read and write
7CD000
stack
page read and write
35A0000
trusted library allocation
page read and write
5630000
trusted library allocation
page execute and read and write
3255000
trusted library allocation
page read and write
E8D000
unkown
page readonly
6DBE000
heap
page read and write
2F80000
trusted library allocation
page read and write
6DE9000
heap
page read and write
3546000
trusted library allocation
page read and write
30BE000
trusted library allocation
page read and write
610E000
trusted library allocation
page read and write
3259000
trusted library allocation
page read and write
6160000
trusted library allocation
page read and write
D90000
unkown
page readonly
25E0000
trusted library allocation
page read and write
2310000
heap
page read and write
5970000
heap
page read and write
36AF000
trusted library allocation
page read and write
DD0000
heap
page read and write
36A1000
trusted library allocation
page read and write
8EA3000
heap
page read and write
31D4000
trusted library allocation
page read and write
6F80000
trusted library allocation
page read and write
3539000
trusted library allocation
page read and write
56B0000
heap
page read and write
3730000
trusted library allocation
page read and write
660000
heap
page read and write
3507000
trusted library allocation
page read and write
3492000
trusted library allocation
page read and write
C00000
heap
page read and write
5EF9000
heap
page read and write
31B0000
trusted library allocation
page read and write
15D0000
trusted library allocation
page read and write
352B000
stack
page read and write
31E7000
trusted library allocation
page read and write
323E000
trusted library allocation
page read and write
12C6000
trusted library allocation
page execute and read and write
6F60000
trusted library allocation
page read and write
13AD000
heap
page read and write
3189000
trusted library allocation
page read and write
3225000
trusted library allocation
page read and write
3563000
trusted library allocation
page read and write
4BDE000
stack
page read and write
613B000
trusted library allocation
page read and write
6D41000
heap
page read and write
5570000
trusted library allocation
page execute and read and write
2A2F000
trusted library allocation
page read and write
25EA000
trusted library allocation
page read and write
117E000
stack
page read and write
2A40000
heap
page read and write
57B0000
trusted library allocation
page read and write
60F1000
trusted library allocation
page read and write
12AD000
trusted library allocation
page execute and read and write
2624000
trusted library allocation
page read and write
8E66000
heap
page read and write
D91000
unkown
page execute read
5A0000
heap
page read and write
2260000
trusted library allocation
page read and write
2879000
trusted library allocation
page read and write
6F39000
trusted library allocation
page read and write
56B3000
heap
page read and write
3741000
trusted library allocation
page read and write
2460000
heap
page execute and read and write
2603000
trusted library allocation
page read and write
374F000
trusted library allocation
page read and write
2320000
trusted library allocation
page execute and read and write
5620000
trusted library allocation
page read and write
6D65000
heap
page read and write
6F35000
trusted library allocation
page read and write
61B0000
trusted library allocation
page read and write
3747000
trusted library allocation
page read and write
257A000
trusted library allocation
page read and write
6CD000
stack
page read and write
2F90000
trusted library allocation
page read and write
4A20000
heap
page read and write
765E000
stack
page read and write
54E5000
trusted library allocation
page read and write
31F1000
trusted library allocation
page read and write
A20000
heap
page read and write
36A7000
trusted library allocation
page read and write
2FDD000
trusted library allocation
page read and write
63A0000
trusted library allocation
page read and write
167B000
stack
page read and write
36F2000
trusted library allocation
page read and write
34B0000
trusted library allocation
page read and write
8EC4000
heap
page read and write
30C2000
trusted library allocation
page read and write
37E9000
trusted library allocation
page read and write
5560000
heap
page read and write
3512000
trusted library allocation
page read and write
60A0000
trusted library allocation
page read and write
DC4000
unkown
page write copy
37B6000
trusted library allocation
page read and write
2A1C000
trusted library allocation
page read and write
60A5000
trusted library allocation
page read and write
2A0E000
trusted library allocation
page read and write
2FD6000
trusted library allocation
page read and write
31A4000
trusted library allocation
page read and write
1180000
heap
page read and write
6DB0000
heap
page read and write
2FB0000
trusted library allocation
page read and write
60B9000
trusted library allocation
page read and write
49C0000
trusted library allocation
page read and write
6E58000
heap
page read and write
76DE000
stack
page read and write
495B000
trusted library allocation
page read and write
5BAE000
stack
page read and write
2A56000
trusted library allocation
page read and write
4C40000
trusted library allocation
page read and write
6230000
trusted library allocation
page execute and read and write
36DA000
trusted library allocation
page read and write
56A0000
heap
page read and write
31BD000
trusted library allocation
page read and write
700D000
stack
page read and write
A85000
heap
page read and write
6F5A000
trusted library allocation
page read and write
3210000
trusted library allocation
page read and write
37B0000
trusted library allocation
page read and write
3698000
trusted library allocation
page read and write
6DB6000
heap
page read and write
37BA000
trusted library allocation
page read and write
163E000
stack
page read and write
6F4F000
trusted library allocation
page read and write
15CF000
stack
page read and write
6E1A000
heap
page read and write
37A9000
trusted library allocation
page read and write
61C0000
trusted library allocation
page read and write
DE0000
heap
page read and write
613E000
trusted library allocation
page read and write
11B0000
trusted library allocation
page read and write
1312000
heap
page read and write
6135000
trusted library allocation
page read and write
6DA0000
heap
page read and write
224D000
trusted library allocation
page execute and read and write
3229000
trusted library allocation
page read and write
1687000
heap
page read and write
3244000
trusted library allocation
page read and write
4954000
trusted library allocation
page read and write
4EEE000
stack
page read and write
859000
heap
page read and write
2F50000
trusted library allocation
page execute and read and write
6111000
trusted library allocation
page read and write
5F27000
heap
page read and write
2657000
trusted library allocation
page read and write
11C5000
heap
page read and write
37C6000
trusted library allocation
page read and write
12C0000
trusted library allocation
page read and write
374A000
trusted library allocation
page read and write
186000
unkown
page readonly
5C10000
trusted library allocation
page execute and read and write
65E000
stack
page read and write
4C60000
trusted library allocation
page read and write
2A23000
trusted library allocation
page read and write
3715000
trusted library allocation
page read and write
95E000
stack
page read and write
A60000
heap
page read and write
5F31000
heap
page read and write
6F20000
trusted library allocation
page read and write
4C70000
heap
page read and write
7680000
trusted library allocation
page execute and read and write
118F000
stack
page read and write
3684000
trusted library allocation
page read and write
35D0000
trusted library allocation
page read and write
368B000
trusted library allocation
page read and write
5F9D000
stack
page read and write
3247000
trusted library allocation
page read and write
6102000
trusted library allocation
page read and write
C89000
heap
page read and write
4EAE000
stack
page read and write
665C000
stack
page read and write
2240000
trusted library allocation
page read and write
6F64000
trusted library allocation
page read and write
7A3000
heap
page read and write
4A32000
trusted library allocation
page read and write
5F4E000
heap
page read and write
366A000
trusted library allocation
page read and write
3710000
trusted library allocation
page read and write
3704000
trusted library allocation
page read and write
3063000
trusted library allocation
page read and write
5AAE000
stack
page read and write
3797000
trusted library allocation
page read and write
14CF000
stack
page read and write
5C20000
heap
page read and write
15D7000
trusted library allocation
page execute and read and write
3212000
trusted library allocation
page read and write
4478000
trusted library allocation
page read and write
3238000
trusted library allocation
page read and write
4001000
trusted library allocation
page read and write
36A9000
trusted library allocation
page read and write
DB6000
unkown
page readonly
60A8000
trusted library allocation
page read and write
31E1000
trusted library allocation
page read and write
DFA000
unkown
page read and write
6240000
trusted library allocation
page execute and read and write
8E9D000
heap
page read and write
740000
heap
page read and write
3720000
trusted library allocation
page read and write
269D000
trusted library allocation
page read and write
355E000
trusted library allocation
page read and write
2FF0000
heap
page read and write
3070000
heap
page read and write
31DC000
trusted library allocation
page read and write
4E6E000
stack
page read and write
13BD000
heap
page read and write
316D000
trusted library allocation
page read and write
6F55000
trusted library allocation
page read and write
2265000
trusted library allocation
page execute and read and write
12A0000
trusted library allocation
page read and write
2267000
trusted library allocation
page execute and read and write
34B6000
trusted library allocation
page read and write
3632000
trusted library allocation
page read and write
12BD000
trusted library allocation
page execute and read and write
31C5000
trusted library allocation
page read and write
4994000
trusted library allocation
page read and write
4C48000
trusted library allocation
page read and write
3626000
trusted library allocation
page read and write
140000
unkown
page readonly
2F60000
trusted library allocation
page read and write
C33000
heap
page read and write
580C000
stack
page read and write
4A40000
trusted library allocation
page execute and read and write
6D58000
heap
page read and write
347F000
trusted library allocation
page read and write
34DA000
trusted library allocation
page read and write
73FE000
stack
page read and write
C60000
unkown
page readonly
63D0000
trusted library allocation
page execute and read and write
12D8000
heap
page read and write
318D000
trusted library allocation
page read and write
8E80000
heap
page read and write
31A6000
trusted library allocation
page read and write
3169000
trusted library allocation
page read and write
15DB000
trusted library allocation
page execute and read and write
5855000
heap
page read and write
135E000
heap
page read and write
795000
heap
page read and write
7410000
trusted library allocation
page execute and read and write
63B0000
trusted library allocation
page execute and read and write
377D000
trusted library allocation
page read and write
36B4000
trusted library allocation
page read and write
230B000
stack
page read and write
261D000
trusted library allocation
page read and write
5AE0000
heap
page read and write
2610000
trusted library allocation
page read and write
3249000
trusted library allocation
page read and write
6E2D000
heap
page read and write
3771000
trusted library allocation
page read and write
3191000
trusted library allocation
page read and write
4C30000
heap
page read and write
362C000
stack
page read and write
320C000
trusted library allocation
page read and write
6663000
trusted library allocation
page read and write
36E4000
trusted library allocation
page read and write
3130000
trusted library allocation
page read and write
6D28000
heap
page read and write
351F000
trusted library allocation
page read and write
12A3000
trusted library allocation
page execute and read and write
2F4E000
stack
page read and write
31F7000
trusted library allocation
page read and write
496E000
trusted library allocation
page read and write
8E60000
heap
page read and write
731E000
stack
page read and write
25F5000
trusted library allocation
page read and write
12DE000
heap
page read and write
2233000
trusted library allocation
page execute and read and write
755E000
stack
page read and write
322B000
trusted library allocation
page read and write
D00000
heap
page read and write
379E000
trusted library allocation
page read and write
5D2D000
stack
page read and write
6F26000
trusted library allocation
page read and write
2ECE000
stack
page read and write
6150000
trusted library allocation
page read and write
6E37000
heap
page read and write
4B90000
heap
page execute and read and write
759E000
stack
page read and write
6D5E000
heap
page read and write
B9E000
stack
page read and write
262F000
trusted library allocation
page read and write
3208000
trusted library allocation
page read and write
60B7000
trusted library allocation
page read and write
7D9000
heap
page read and write
8E91000
heap
page read and write
3230000
trusted library allocation
page read and write
264B000
trusted library allocation
page read and write
2717000
trusted library allocation
page read and write
5960000
heap
page read and write
3253000
trusted library allocation
page read and write
30CA000
trusted library allocation
page read and write
12F6000
heap
page read and write
31A2000
trusted library allocation
page read and write
2F30000
heap
page read and write
5690000
heap
page read and write
27B8000
trusted library allocation
page read and write
378A000
trusted library allocation
page read and write
5994000
heap
page read and write
1305000
heap
page read and write
7400000
trusted library allocation
page execute and read and write
768000
heap
page read and write
DB6000
unkown
page readonly
D69000
stack
page read and write
6E6B000
heap
page read and write
70DE000
stack
page read and write
2FBB000
trusted library allocation
page read and write
2234000
trusted library allocation
page read and write
5520000
trusted library allocation
page read and write
108F000
stack
page read and write
49E0000
trusted library allocation
page read and write
5E6C000
heap
page read and write
225A000
trusted library allocation
page execute and read and write
2713000
trusted library allocation
page read and write
2350000
heap
page read and write
373D000
trusted library allocation
page read and write
2340000
trusted library allocation
page read and write
5990000
heap
page read and write
34BE000
trusted library allocation
page read and write
3755000
trusted library allocation
page read and write
367A000
trusted library allocation
page read and write
3524000
trusted library allocation
page read and write
7420000
heap
page read and write
36CB000
trusted library allocation
page read and write
5650000
trusted library allocation
page read and write
25A9000
trusted library allocation
page read and write
3187000
trusted library allocation
page read and write
49B5000
trusted library allocation
page read and write
D91000
unkown
page execute read
226B000
trusted library allocation
page execute and read and write
6140000
trusted library allocation
page read and write
3691000
trusted library allocation
page read and write
30BA000
trusted library allocation
page read and write
3270000
trusted library allocation
page read and write
2F0E000
stack
page read and write
3206000
trusted library allocation
page read and write
36F9000
trusted library allocation
page read and write
2FB4000
trusted library allocation
page read and write
8EAB000
heap
page read and write
3759000
trusted library allocation
page read and write
D90000
unkown
page readonly
6F5F000
trusted library allocation
page read and write
271B000
trusted library allocation
page read and write
54E0000
trusted library allocation
page read and write
172000
unkown
page readonly
369B000
trusted library allocation
page read and write
A80000
heap
page read and write
3161000
trusted library allocation
page read and write
596E000
stack
page read and write
3519000
trusted library allocation
page read and write
10F7000
stack
page read and write
326F000
stack
page read and write
5EA6000
heap
page read and write
2A11000
trusted library allocation
page read and write
5F0F000
heap
page read and write
2F2E000
stack
page read and write
2DCE000
stack
page read and write
34A0000
trusted library allocation
page read and write
830000
heap
page read and write
3653000
trusted library allocation
page read and write
349A000
trusted library allocation
page read and write
320A000
trusted library allocation
page read and write
3194000
trusted library allocation
page read and write
655E000
stack
page read and write
590000
heap
page read and write
374C000
trusted library allocation
page read and write
31A8000
trusted library allocation
page read and write
34C3000
trusted library allocation
page read and write
617000
heap
page read and write
31DE000
trusted library allocation
page read and write
651C000
stack
page read and write
136F000
heap
page read and write
54F0000
trusted library allocation
page read and write
704E000
stack
page read and write
5F56000
heap
page read and write
60B0000
trusted library allocation
page read and write
75DE000
stack
page read and write
34B3000
trusted library allocation
page read and write
3227000
trusted library allocation
page read and write
2250000
trusted library allocation
page read and write
3117000
trusted library allocation
page read and write
2256000
trusted library allocation
page execute and read and write
60AA000
trusted library allocation
page read and write
4990000
trusted library allocation
page read and write
36D7000
trusted library allocation
page read and write
6D20000
heap
page read and write
25F7000
trusted library allocation
page read and write
353F000
trusted library allocation
page read and write
There are 589 hidden memdumps, click here to show them.