IOC Report
file.exe

loading gif

Files

File Path
Type
Category
Malicious
file.exe
PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
initial sample
malicious
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_file.exe_f93284ae77ab4eed7e1e6983ffdeb6b8c8d517_2059615a_dc763f9f-12e3-4a02-b6ca-49570e84e160\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
malicious
C:\Users\user\AppData\Roaming\gdi32.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\ProgramData\Microsoft\Windows\WER\Temp\WER4C58.tmp.dmp
Mini DuMP crash report, 15 streams, Sat Nov 23 13:59:49 2024, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER4D53.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER4DA2.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\Windows\appcompat\Programs\Amcache.hve
MS Windows registry file, NT/2000 or above
dropped
\Device\ConDrv
ASCII text, with very long lines (354), with CRLF, LF line terminators
dropped

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\file.exe
"C:\Users\user\Desktop\file.exe"
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe
"C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 7132 -s 1224

URLs

Name
IP
Malicious
https://disobey-curly.sbs/
unknown
malicious
https://disobey-curly.sbs/api
172.67.223.140
malicious
https://duckduckgo.com/chrome_newtab
unknown
https://duckduckgo.com/ac/?q=
unknown
https://contile-images.services.mozilla.com/0TegrVVRalreHILhR2WvtD_CFzj13HCDcLqqpvXSOuY.10862.jpg
unknown
https://www.google.com/images/branding/product/ico/googleg_lodp.ico
unknown
https://disobey-curly.sbs:443/apiO
unknown
https://bridge.lga1.admarketplace.net/ctp?version=16.0.0&key=1696332238301000001.2&ci=1696332238417.
unknown
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
unknown
http://crl.rootca1.amazontrust.com/rootca1.crl0
unknown
https://bridge.lga1.ap01.net/ctp?version=16.0.0&key=1696332238301000001.1&ci=1696332238417.12791&cta
unknown
http://upx.sf.net
unknown
https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
unknown
http://ocsp.rootca1.amazontrust.com0:
unknown
https://disobey-curly.sbs/apiI
unknown
https://support.office.com/article/7D48285B-20E8-4B9B-91AD-216E34163BAD?wt.mc_id=EnterPK2016
unknown
https://support.office.com/article/94ba2e0b-638e-4a92-8857-2cb5ac1d8e17
unknown
https://www.ecosia.org/newtab/
unknown
https://support.mozilla.org/kb/customize-firefox-controls-buttons-and-toolbars?utm_source=firefox-br
unknown
https://ac.ecosia.org/autocomplete?q=
unknown
https://disobey-curly.sbs/u
unknown
https://disobey-curly.sbs:443/api
unknown
https://disobey-curly.sbs/z
unknown
https://contile-images.services.mozilla.com/obgoOYObjIFea_bXuT6L4LbBJ8j425AD87S1HMD3BWg.9991.jpg
unknown
https://imp.mt48.net/static?id=7RHzfOIXjFEYsBdvIpkX4QqmfZfYfQfafZbXfpbWfpbX7ReNxR3UIG8zInwYIFIVs9eYi
unknown
http://x1.c.lencr.org/0
unknown
http://x1.i.lencr.org/0
unknown
https://support.office.com/article/94ba2e0b-638e-4a92-8857-2cb5ac1d8e17Install
unknown
https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
unknown
https://support.microsof
unknown
http://crt.rootca1.amazontrust.com/rootca1.cer0?
unknown
https://disobey-curly.sbs/api.
unknown
https://support.office.com/article/7D48285B-20E8-4B9B-91AD-216E34163BAD?wt.mc_id=EnterPK2016Examples
unknown
https://support.mozilla.org/products/firefoxgro.all
unknown
https://disobey-curly.sbs/apiu
unknown
https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
unknown
https://www.amazon.com/?tag=admarketus-20&ref=pd_sl_7548d4575af019e4c148ccf1a78112802e66a0816a72fc94
unknown
There are 27 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
disobey-curly.sbs
172.67.223.140
malicious

IPs

IP
Domain
Country
Malicious
172.67.223.140
disobey-curly.sbs
United States
malicious

Registry

Path
Value
Malicious
\REGISTRY\A\{b7a7ed61-1bbb-c9aa-bfc9-4270346fe8ea}\Root\InventoryApplicationFile\file.exe|ff8e65d6b06db8e5
ProgramId
malicious
\REGISTRY\A\{b7a7ed61-1bbb-c9aa-bfc9-4270346fe8ea}\Root\InventoryApplicationFile\file.exe|ff8e65d6b06db8e5
FileId
malicious
\REGISTRY\A\{b7a7ed61-1bbb-c9aa-bfc9-4270346fe8ea}\Root\InventoryApplicationFile\file.exe|ff8e65d6b06db8e5
LowerCaseLongPath
malicious
\REGISTRY\A\{b7a7ed61-1bbb-c9aa-bfc9-4270346fe8ea}\Root\InventoryApplicationFile\file.exe|ff8e65d6b06db8e5
LongPathHash
malicious
\REGISTRY\A\{b7a7ed61-1bbb-c9aa-bfc9-4270346fe8ea}\Root\InventoryApplicationFile\file.exe|ff8e65d6b06db8e5
Name
malicious
\REGISTRY\A\{b7a7ed61-1bbb-c9aa-bfc9-4270346fe8ea}\Root\InventoryApplicationFile\file.exe|ff8e65d6b06db8e5
OriginalFileName
malicious
\REGISTRY\A\{b7a7ed61-1bbb-c9aa-bfc9-4270346fe8ea}\Root\InventoryApplicationFile\file.exe|ff8e65d6b06db8e5
Publisher
malicious
\REGISTRY\A\{b7a7ed61-1bbb-c9aa-bfc9-4270346fe8ea}\Root\InventoryApplicationFile\file.exe|ff8e65d6b06db8e5
Version
malicious
\REGISTRY\A\{b7a7ed61-1bbb-c9aa-bfc9-4270346fe8ea}\Root\InventoryApplicationFile\file.exe|ff8e65d6b06db8e5
BinFileVersion
malicious
\REGISTRY\A\{b7a7ed61-1bbb-c9aa-bfc9-4270346fe8ea}\Root\InventoryApplicationFile\file.exe|ff8e65d6b06db8e5
BinaryType
malicious
\REGISTRY\A\{b7a7ed61-1bbb-c9aa-bfc9-4270346fe8ea}\Root\InventoryApplicationFile\file.exe|ff8e65d6b06db8e5
ProductName
malicious
\REGISTRY\A\{b7a7ed61-1bbb-c9aa-bfc9-4270346fe8ea}\Root\InventoryApplicationFile\file.exe|ff8e65d6b06db8e5
ProductVersion
malicious
\REGISTRY\A\{b7a7ed61-1bbb-c9aa-bfc9-4270346fe8ea}\Root\InventoryApplicationFile\file.exe|ff8e65d6b06db8e5
LinkDate
malicious
\REGISTRY\A\{b7a7ed61-1bbb-c9aa-bfc9-4270346fe8ea}\Root\InventoryApplicationFile\file.exe|ff8e65d6b06db8e5
BinProductVersion
malicious
\REGISTRY\A\{b7a7ed61-1bbb-c9aa-bfc9-4270346fe8ea}\Root\InventoryApplicationFile\file.exe|ff8e65d6b06db8e5
AppxPackageFullName
malicious
\REGISTRY\A\{b7a7ed61-1bbb-c9aa-bfc9-4270346fe8ea}\Root\InventoryApplicationFile\file.exe|ff8e65d6b06db8e5
AppxPackageRelativeId
malicious
\REGISTRY\A\{b7a7ed61-1bbb-c9aa-bfc9-4270346fe8ea}\Root\InventoryApplicationFile\file.exe|ff8e65d6b06db8e5
Size
malicious
\REGISTRY\A\{b7a7ed61-1bbb-c9aa-bfc9-4270346fe8ea}\Root\InventoryApplicationFile\file.exe|ff8e65d6b06db8e5
Language
malicious
\REGISTRY\A\{b7a7ed61-1bbb-c9aa-bfc9-4270346fe8ea}\Root\InventoryApplicationFile\file.exe|ff8e65d6b06db8e5
Usn
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\IdentityCRL\ClockData
ClockTimeSeconds
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\IdentityCRL\ClockData
TickCount
There are 11 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
4FB7000
trusted library allocation
page read and write
2C84000
heap
page read and write
4FC5000
trusted library allocation
page read and write
2C71000
heap
page read and write
4F96000
trusted library allocation
page read and write
2C8D000
heap
page read and write
2C8D000
heap
page read and write
4FF8000
trusted library allocation
page read and write
4FBF000
trusted library allocation
page read and write
4F82000
trusted library allocation
page read and write
4B4D000
stack
page read and write
51CD000
trusted library allocation
page read and write
4FAF000
trusted library allocation
page read and write
4F82000
trusted library allocation
page read and write
2C63000
heap
page read and write
4FAF000
trusted library allocation
page read and write
4FE1000
trusted library allocation
page read and write
756E000
stack
page read and write
4F8F000
trusted library allocation
page read and write
4F94000
trusted library allocation
page read and write
29F0000
heap
page read and write
29E0000
heap
page read and write
5010000
trusted library allocation
page read and write
4FC7000
trusted library allocation
page read and write
4FC7000
trusted library allocation
page read and write
51E5000
trusted library allocation
page read and write
CBB000
heap
page read and write
4FB3000
trusted library allocation
page read and write
666000
unkown
page execute and read and write
2CA9000
heap
page read and write
FEE000
stack
page read and write
2BD0000
heap
page read and write
2C83000
heap
page read and write
4F66000
trusted library allocation
page read and write
2CAB000
heap
page read and write
4E10000
heap
page read and write
BE8000
heap
page read and write
28DE000
stack
page read and write
2C90000
heap
page read and write
5E2000
unkown
page readonly
6CD91000
unkown
page execute read
2C83000
heap
page read and write
4F82000
trusted library allocation
page read and write
4F8E000
trusted library allocation
page read and write
A66D000
stack
page read and write
5205000
trusted library allocation
page read and write
4FDF000
trusted library allocation
page read and write
4FDF000
trusted library allocation
page read and write
C22000
heap
page read and write
2C8E000
heap
page read and write
E40000
trusted library allocation
page read and write
6CDA7000
unkown
page read and write
4FCF000
trusted library allocation
page read and write
4FA9000
trusted library allocation
page read and write
72AC1000
remote allocation
page execute read
4F66000
trusted library allocation
page read and write
E44000
trusted library allocation
page read and write
4FDC000
trusted library allocation
page read and write
4F9C000
trusted library allocation
page read and write
2C99000
heap
page read and write
4FB7000
trusted library allocation
page read and write
780000
heap
page read and write
51AE000
trusted library allocation
page read and write
4F7A000
trusted library allocation
page read and write
4FA9000
trusted library allocation
page read and write
4F6E000
stack
page read and write
4F7C000
trusted library allocation
page read and write
4FAF000
trusted library allocation
page read and write
4BAE000
stack
page read and write
4F98000
trusted library allocation
page read and write
2C19000
heap
page read and write
AB7F000
stack
page read and write
2C8D000
heap
page read and write
4F9F000
trusted library allocation
page read and write
4FAF000
trusted library allocation
page read and write
4F99000
trusted library allocation
page read and write
4F8E000
trusted library allocation
page read and write
4FF0000
trusted library allocation
page read and write
4F7C000
trusted library allocation
page read and write
2AC9000
trusted library allocation
page read and write
2C17000
heap
page read and write
4FA7000
trusted library allocation
page read and write
4FC7000
trusted library allocation
page read and write
2C61000
heap
page read and write
4F6D000
trusted library allocation
page read and write
4F9A000
trusted library allocation
page read and write
4F8F000
trusted library allocation
page read and write
4FCB000
trusted library allocation
page read and write
72AC0000
remote allocation
page execute and read and write
EA0000
heap
page read and write
4FC5000
trusted library allocation
page read and write
6CD90000
unkown
page readonly
2C83000
heap
page read and write
2BF6000
heap
page read and write
4F94000
trusted library allocation
page read and write
4F82000
trusted library allocation
page read and write
4FA0000
trusted library allocation
page read and write
4F82000
trusted library allocation
page read and write
4F8F000
trusted library allocation
page read and write
4FAF000
trusted library allocation
page read and write
4F82000
trusted library allocation
page read and write
C3E000
heap
page read and write
57BA000
trusted library allocation
page read and write
2C94000
heap
page read and write
4F76000
trusted library allocation
page read and write
4F9B000
trusted library allocation
page read and write
4F8E000
trusted library allocation
page read and write
4F8E000
trusted library allocation
page read and write
4F8F000
trusted library allocation
page read and write
4FAF000
trusted library allocation
page read and write
2CAE000
heap
page read and write
4F60000
trusted library allocation
page read and write
2CAE000
heap
page read and write
46C0000
remote allocation
page read and write
4FAF000
trusted library allocation
page read and write
C99000
heap
page read and write
2C61000
heap
page read and write
5014000
trusted library allocation
page read and write
4FA0000
trusted library allocation
page read and write
790000
heap
page read and write
4F7C000
trusted library allocation
page read and write
2CA9000
heap
page read and write
2C64000
heap
page read and write
A76D000
stack
page read and write
54B000
stack
page read and write
46AD000
stack
page read and write
4F92000
trusted library allocation
page read and write
4FC7000
trusted library allocation
page read and write
4F8F000
trusted library allocation
page read and write
4FE7000
trusted library allocation
page read and write
4F9F000
trusted library allocation
page read and write
6CDF5000
unkown
page readonly
E7B000
trusted library allocation
page execute and read and write
4F8F000
trusted library allocation
page read and write
5E0000
unkown
page execute and read and write
2C79000
heap
page read and write
4FC6000
trusted library allocation
page read and write
AFA000
stack
page read and write
46C0000
remote allocation
page read and write
4F9F000
trusted library allocation
page read and write
4FAA000
trusted library allocation
page read and write
4FA8000
trusted library allocation
page read and write
290B000
stack
page read and write
4FCF000
trusted library allocation
page read and write
51B4000
trusted library allocation
page read and write
4F81000
trusted library allocation
page read and write
5285000
trusted library allocation
page read and write
4FAF000
trusted library allocation
page read and write
2C8E000
heap
page read and write
4F6B000
trusted library allocation
page read and write
C08000
heap
page read and write
4FA7000
trusted library allocation
page read and write
4F9B000
trusted library allocation
page read and write
2AA0000
heap
page execute and read and write
2C73000
heap
page read and write
4FB8000
trusted library allocation
page read and write
2C83000
heap
page read and write
2C82000
heap
page read and write
4FB3000
trusted library allocation
page read and write
4FB7000
trusted library allocation
page read and write
42B5000
trusted library allocation
page read and write
E50000
trusted library allocation
page read and write
4FB8000
trusted library allocation
page read and write
4F96000
trusted library allocation
page read and write
4FAF000
trusted library allocation
page read and write
4F99000
trusted library allocation
page read and write
2CAD000
heap
page read and write
2C02000
heap
page read and write
4FCC000
trusted library allocation
page read and write
C14000
heap
page read and write
2CB0000
heap
page read and write
6CDA1000
unkown
page readonly
E30000
trusted library allocation
page read and write
4F9F000
trusted library allocation
page read and write
CA2000
heap
page read and write
2C8D000
heap
page read and write
4FB7000
trusted library allocation
page read and write
4F6B000
trusted library allocation
page read and write
4CCE000
stack
page read and write
4FC5000
trusted library allocation
page read and write
5CC0000
trusted library allocation
page read and write
4F68000
trusted library allocation
page read and write
4F96000
trusted library allocation
page read and write
2C25000
heap
page read and write
4FAF000
trusted library allocation
page read and write
4F76000
trusted library allocation
page read and write
2C63000
heap
page read and write
ACFE000
stack
page read and write
C0D000
heap
page read and write
4F61000
trusted library allocation
page read and write
2C83000
heap
page read and write
2C8D000
heap
page read and write
4FCE000
stack
page read and write
4F8F000
trusted library allocation
page read and write
2C8D000
heap
page read and write
4F2E000
stack
page read and write
4FEA000
trusted library allocation
page read and write
4FC5000
trusted library allocation
page read and write
5343000
trusted library allocation
page read and write
545F000
trusted library allocation
page read and write
5000000
trusted library allocation
page read and write
4F74000
trusted library allocation
page read and write
5020000
trusted library allocation
page read and write
29F7000
heap
page read and write
4FAF000
trusted library allocation
page read and write
2AC4000
trusted library allocation
page read and write
4F9F000
trusted library allocation
page read and write
2CAC000
heap
page read and write
2C7B000
heap
page read and write
4700000
heap
page read and write
4FFB000
trusted library allocation
page read and write
4F6D000
trusted library allocation
page read and write
4F8E000
trusted library allocation
page read and write
4FB3000
trusted library allocation
page read and write
4FE0000
heap
page execute and read and write
4F6C000
trusted library allocation
page read and write
4FE2000
trusted library allocation
page read and write
4FC4000
trusted library allocation
page read and write
4F7B000
trusted library allocation
page read and write
2CB1000
heap
page read and write
4F66000
trusted library allocation
page read and write
4F81000
trusted library allocation
page read and write
2CAD000
heap
page read and write
ABBE000
stack
page read and write
4F9C000
trusted library allocation
page read and write
4FAA000
trusted library allocation
page read and write
5B0000
heap
page read and write
2C7B000
heap
page read and write
4F82000
trusted library allocation
page read and write
2BBD000
stack
page read and write
4F9F000
trusted library allocation
page read and write
2C83000
heap
page read and write
ACBE000
stack
page read and write
E43000
trusted library allocation
page execute and read and write
2C7A000
heap
page read and write
E54000
trusted library allocation
page read and write
4FA1000
trusted library allocation
page read and write
4FAF000
trusted library allocation
page read and write
FAE000
stack
page read and write
7DE000
stack
page read and write
4F91000
trusted library allocation
page read and write
2910000
heap
page read and write
3AB1000
trusted library allocation
page read and write
4F9F000
trusted library allocation
page read and write
2BF6000
heap
page read and write
2C8E000
heap
page read and write
4FEF000
trusted library allocation
page read and write
5255000
trusted library allocation
page read and write
4F96000
trusted library allocation
page read and write
4FF8000
trusted library allocation
page read and write
4F76000
trusted library allocation
page read and write
5E0000
unkown
page readonly
531D000
trusted library allocation
page read and write
5005000
trusted library allocation
page read and write
BD0000
heap
page read and write
2AB1000
trusted library allocation
page read and write
2C8D000
heap
page read and write
501B000
trusted library allocation
page read and write
C0B000
heap
page read and write
4FD8000
trusted library allocation
page read and write
4F7C000
trusted library allocation
page read and write
4FC5000
trusted library allocation
page read and write
4F8F000
trusted library allocation
page read and write
2C63000
heap
page read and write
519E000
stack
page read and write
2C1A000
heap
page read and write
2C79000
heap
page read and write
4F81000
trusted library allocation
page read and write
2CAE000
heap
page read and write
BE0000
heap
page read and write
4FA3000
trusted library allocation
page read and write
4F8F000
trusted library allocation
page read and write
466D000
stack
page read and write
4FAD000
trusted library allocation
page read and write
2CAD000
heap
page read and write
456E000
stack
page read and write
4FF8000
trusted library allocation
page read and write
2BE8000
heap
page read and write
4F8E000
trusted library allocation
page read and write
51A1000
heap
page read and write
4F96000
trusted library allocation
page read and write
528D000
trusted library allocation
page read and write
2CAD000
heap
page read and write
4F82000
trusted library allocation
page read and write
4F96000
trusted library allocation
page read and write
4F8E000
trusted library allocation
page read and write
FF0000
heap
page read and write
2C8D000
heap
page read and write
2C17000
heap
page read and write
2A7E000
stack
page read and write
E4D000
trusted library allocation
page execute and read and write
4FA8000
trusted library allocation
page read and write
C4A000
heap
page read and write
2C8E000
heap
page read and write
289E000
stack
page read and write
4F81000
trusted library allocation
page read and write
4E5E000
stack
page read and write
4F90000
trusted library allocation
page read and write
4F8F000
trusted library allocation
page read and write
2CAA000
heap
page read and write
4F8F000
trusted library allocation
page read and write
4F7C000
trusted library allocation
page read and write
2BEC000
heap
page read and write
2C92000
heap
page read and write
2C25000
heap
page read and write
4F82000
trusted library allocation
page read and write
4FA9000
trusted library allocation
page read and write
4FD7000
trusted library allocation
page read and write
2BEC000
heap
page read and write
4F6C000
trusted library allocation
page read and write
4F76000
trusted library allocation
page read and write
2B60000
heap
page read and write
4FAF000
trusted library allocation
page read and write
2CA9000
heap
page read and write
72B05000
remote allocation
page execute and read and write
4F6B000
trusted library allocation
page read and write
4F64000
trusted library allocation
page read and write
4FA3000
trusted library allocation
page read and write
4FAB000
trusted library allocation
page read and write
51A0000
heap
page read and write
4F73000
trusted library allocation
page read and write
4FB9000
trusted library allocation
page read and write
E77000
trusted library allocation
page execute and read and write
2CA9000
heap
page read and write
2C25000
heap
page read and write
4F79000
trusted library allocation
page read and write
4F9F000
trusted library allocation
page read and write
29F5000
heap
page read and write
2C79000
heap
page read and write
4F9F000
trusted library allocation
page read and write
2CAA000
heap
page read and write
4F7C000
trusted library allocation
page read and write
4FA8000
trusted library allocation
page read and write
2AFF000
stack
page read and write
29F0000
trusted library allocation
page read and write
72B17000
remote allocation
page readonly
4F81000
trusted library allocation
page read and write
4FF8000
trusted library allocation
page read and write
4F8F000
trusted library allocation
page read and write
4DCE000
stack
page read and write
4FC5000
trusted library allocation
page read and write
28F0000
heap
page read and write
4F8F000
trusted library allocation
page read and write
2C90000
heap
page read and write
4F8E000
trusted library allocation
page read and write
5003000
trusted library allocation
page read and write
71C000
stack
page read and write
4B8E000
stack
page read and write
5018000
trusted library allocation
page read and write
5015000
trusted library allocation
page read and write
4F9F000
trusted library allocation
page read and write
4FC3000
trusted library allocation
page read and write
4FA8000
trusted library allocation
page read and write
4FAC000
trusted library allocation
page read and write
ADFE000
stack
page read and write
E1E000
stack
page read and write
72B02000
remote allocation
page readonly
4F6B000
trusted library allocation
page read and write
2C8D000
heap
page read and write
4F8F000
trusted library allocation
page read and write
4F8E000
trusted library allocation
page read and write
46C0000
remote allocation
page read and write
4FBF000
trusted library allocation
page read and write
4F8E000
trusted library allocation
page read and write
4FB6000
trusted library allocation
page read and write
4F7A000
trusted library allocation
page read and write
4F61000
trusted library allocation
page read and write
5FE000
stack
page read and write
4F9F000
trusted library allocation
page read and write
4F61000
trusted library allocation
page read and write
4F61000
trusted library allocation
page read and write
4FAF000
trusted library allocation
page read and write
4F6C000
trusted library allocation
page read and write
4FA1000
trusted library allocation
page read and write
2CBC000
heap
page read and write
28E0000
trusted library allocation
page execute and read and write
2C84000
heap
page read and write
4F8F000
trusted library allocation
page read and write
4FBD000
trusted library allocation
page read and write
29C0000
trusted library allocation
page read and write
2B4E000
stack
page read and write
4F5F000
stack
page read and write
4FAF000
trusted library allocation
page read and write
4C8F000
stack
page read and write
4F8F000
trusted library allocation
page read and write
4F6B000
trusted library allocation
page read and write
4FA8000
trusted library allocation
page read and write
4FA5000
trusted library allocation
page read and write
DDE000
stack
page read and write
2ABA000
trusted library allocation
page read and write
509E000
stack
page read and write
4F76000
trusted library allocation
page read and write
29E0000
trusted library section
page read and write
CAD000
heap
page read and write
4FAF000
trusted library allocation
page read and write
4FC0000
trusted library allocation
page read and write
4FD1000
trusted library allocation
page read and write
4F82000
trusted library allocation
page read and write
2C61000
heap
page read and write
4F9F000
trusted library allocation
page read and write
BD5000
heap
page read and write
2C8D000
heap
page read and write
2C02000
heap
page read and write
4FC7000
trusted library allocation
page read and write
4FAF000
trusted library allocation
page read and write
5E2000
unkown
page execute and read and write
4FA6000
trusted library allocation
page read and write
527D000
trusted library allocation
page read and write
52B5000
trusted library allocation
page read and write
666000
unkown
page readonly
4F6D000
trusted library allocation
page read and write
4FF8000
trusted library allocation
page read and write
4F8F000
trusted library allocation
page read and write
2C63000
heap
page read and write
2C8D000
heap
page read and write
4FBF000
trusted library allocation
page read and write
BEE000
heap
page read and write
4F6C000
trusted library allocation
page read and write
4FAF000
trusted library allocation
page read and write
4F9F000
trusted library allocation
page read and write
4F82000
trusted library allocation
page read and write
There are 411 hidden memdumps, click here to show them.