IOC Report
S#U043eftWare.exe

loading gif

Files

File Path
Type
Category
Malicious
S#U043eftWare.exe
PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Roaming\gdi32.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_S#U043eftWare.ex_c2eb22ee7582ddf93e8b655d587659adbaca8199_849bd03d_511f84fa-aed9-4bd6-a9fe-1d9ee9ac4087\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER87AC.tmp.dmp
Mini DuMP crash report, 15 streams, Sat Nov 23 14:09:59 2024, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER88B7.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER88D7.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\Windows\appcompat\Programs\Amcache.hve
MS Windows registry file, NT/2000 or above
dropped
\Device\ConDrv
ASCII text, with very long lines (352), with CRLF, LF line terminators
dropped

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\S#U043eftWare.exe
"C:\Users\user\Desktop\S#U043eftWare.exe"
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe
"C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 7624 -s 1228

URLs

Name
IP
Malicious
https://duckduckgo.com/chrome_newtab
unknown
https://duckduckgo.com/ac/?q=
unknown
https://property-imper.sbs:443/api
https://contile-images.services.mozilla.com/0TegrVVRalreHILhR2WvtD_CFzj13HCDcLqqpvXSOuY.10862.jpg
unknown
https://www.google.com/images/branding/product/ico/googleg_lodp.ico
unknown
https://property-imper.sbs/api
104.21.33.116
https://bridge.lga1.admarketplace.net/ctp?version=16.0.0&key=1696332238301000001.2&ci=1696332238417.
unknown
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
unknown
http://crl.rootca1.amazontrust.com/rootca1.crl0
unknown
http://upx.sf.net
unknown
https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
unknown
http://ocsp.rootca1.amazontrust.com0:
unknown
https://support.office.com/article/7D48285B-20E8-4B9B-91AD-216E34163BAD?wt.mc_id=EnterPK2016
unknown
https://support.office.com/article/94ba2e0b-638e-4a92-8857-2cb5ac1d8e17
unknown
https://www.ecosia.org/newtab/
unknown
https://property-imper.sbs/
unknown
https://support.mozilla.org/kb/customize-firefox-controls-buttons-and-toolbars?utm_source=firefox-br
unknown
https://property-imper.sbs/l
unknown
https://ac.ecosia.org/autocomplete?q=
unknown
https://imp.mt48.net/static?id=7RHzfOIXjFEYsBdvIpkX4QqmfZfYfQfafZbXfpbWfpbX7ReNxR3UIG8zInwYIFIVs9eYi
unknown
http://x1.c.lencr.org/0
unknown
http://x1.i.lencr.org/0
unknown
https://support.office.com/article/94ba2e0b-638e-4a92-8857-2cb5ac1d8e17Install
unknown
https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
unknown
https://support.microsof
unknown
http://crt.rootca1.amazontrust.com/rootca1.cer0?
unknown
https://property-imper.sbs/U
unknown
https://support.office.com/article/7D48285B-20E8-4B9B-91AD-216E34163BAD?wt.mc_id=EnterPK2016Examples
unknown
https://property-imper.sbs/BW#?06
unknown
https://support.mozilla.org/products/firefoxgro.all
unknown
https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
unknown
https://property-imper.sbs/api;
unknown
There are 22 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
property-imper.sbs
104.21.33.116

IPs

IP
Domain
Country
Malicious
104.21.33.116
property-imper.sbs
United States

Registry

Path
Value
Malicious
\REGISTRY\A\{6be841c4-4e02-7965-3fbe-7e5a9e79876a}\Root\InventoryApplicationFile\s#u043eftware.ex|e1c47dda31648bbe
ProgramId
\REGISTRY\A\{6be841c4-4e02-7965-3fbe-7e5a9e79876a}\Root\InventoryApplicationFile\s#u043eftware.ex|e1c47dda31648bbe
FileId
\REGISTRY\A\{6be841c4-4e02-7965-3fbe-7e5a9e79876a}\Root\InventoryApplicationFile\s#u043eftware.ex|e1c47dda31648bbe
LowerCaseLongPath
\REGISTRY\A\{6be841c4-4e02-7965-3fbe-7e5a9e79876a}\Root\InventoryApplicationFile\s#u043eftware.ex|e1c47dda31648bbe
LongPathHash
\REGISTRY\A\{6be841c4-4e02-7965-3fbe-7e5a9e79876a}\Root\InventoryApplicationFile\s#u043eftware.ex|e1c47dda31648bbe
Name
\REGISTRY\A\{6be841c4-4e02-7965-3fbe-7e5a9e79876a}\Root\InventoryApplicationFile\s#u043eftware.ex|e1c47dda31648bbe
OriginalFileName
\REGISTRY\A\{6be841c4-4e02-7965-3fbe-7e5a9e79876a}\Root\InventoryApplicationFile\s#u043eftware.ex|e1c47dda31648bbe
Publisher
\REGISTRY\A\{6be841c4-4e02-7965-3fbe-7e5a9e79876a}\Root\InventoryApplicationFile\s#u043eftware.ex|e1c47dda31648bbe
Version
\REGISTRY\A\{6be841c4-4e02-7965-3fbe-7e5a9e79876a}\Root\InventoryApplicationFile\s#u043eftware.ex|e1c47dda31648bbe
BinFileVersion
\REGISTRY\A\{6be841c4-4e02-7965-3fbe-7e5a9e79876a}\Root\InventoryApplicationFile\s#u043eftware.ex|e1c47dda31648bbe
BinaryType
\REGISTRY\A\{6be841c4-4e02-7965-3fbe-7e5a9e79876a}\Root\InventoryApplicationFile\s#u043eftware.ex|e1c47dda31648bbe
ProductName
\REGISTRY\A\{6be841c4-4e02-7965-3fbe-7e5a9e79876a}\Root\InventoryApplicationFile\s#u043eftware.ex|e1c47dda31648bbe
ProductVersion
\REGISTRY\A\{6be841c4-4e02-7965-3fbe-7e5a9e79876a}\Root\InventoryApplicationFile\s#u043eftware.ex|e1c47dda31648bbe
LinkDate
\REGISTRY\A\{6be841c4-4e02-7965-3fbe-7e5a9e79876a}\Root\InventoryApplicationFile\s#u043eftware.ex|e1c47dda31648bbe
BinProductVersion
\REGISTRY\A\{6be841c4-4e02-7965-3fbe-7e5a9e79876a}\Root\InventoryApplicationFile\s#u043eftware.ex|e1c47dda31648bbe
AppxPackageFullName
\REGISTRY\A\{6be841c4-4e02-7965-3fbe-7e5a9e79876a}\Root\InventoryApplicationFile\s#u043eftware.ex|e1c47dda31648bbe
AppxPackageRelativeId
\REGISTRY\A\{6be841c4-4e02-7965-3fbe-7e5a9e79876a}\Root\InventoryApplicationFile\s#u043eftware.ex|e1c47dda31648bbe
Size
\REGISTRY\A\{6be841c4-4e02-7965-3fbe-7e5a9e79876a}\Root\InventoryApplicationFile\s#u043eftware.ex|e1c47dda31648bbe
Language
\REGISTRY\A\{6be841c4-4e02-7965-3fbe-7e5a9e79876a}\Root\InventoryApplicationFile\s#u043eftware.ex|e1c47dda31648bbe
Usn
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\IdentityCRL\ClockData
ClockTimeSeconds
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\IdentityCRL\ClockData
TickCount
There are 11 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
C93000
heap
page read and write
4B3F000
stack
page read and write
4C18000
trusted library allocation
page read and write
4C4D000
trusted library allocation
page read and write
704000
heap
page read and write
4C11000
trusted library allocation
page read and write
4C7A000
trusted library allocation
page read and write
4C28000
trusted library allocation
page read and write
4C14000
trusted library allocation
page read and write
4C04000
trusted library allocation
page read and write
4C20000
trusted library allocation
page read and write
5FD000
stack
page read and write
ABEF000
stack
page read and write
4C11000
trusted library allocation
page read and write
FA0000
trusted library section
page read and write
4C0F000
trusted library allocation
page read and write
4C11000
trusted library allocation
page read and write
4C29000
trusted library allocation
page read and write
A80000
heap
page read and write
4C23000
trusted library allocation
page read and write
4C24000
trusted library allocation
page read and write
4BE0000
heap
page read and write
722000
heap
page read and write
65D000
heap
page read and write
4C69000
trusted library allocation
page read and write
4C71000
trusted library allocation
page read and write
4C5A000
trusted library allocation
page read and write
671000
heap
page read and write
6FB000
heap
page read and write
4C06000
trusted library allocation
page read and write
4C28000
trusted library allocation
page read and write
4D10000
trusted library allocation
page read and write
90E000
stack
page read and write
4C5F000
trusted library allocation
page read and write
9B000
stack
page read and write
4C21000
trusted library allocation
page read and write
4C26000
trusted library allocation
page read and write
D1E000
heap
page read and write
560000
heap
page read and write
4A3E000
stack
page read and write
4C04000
trusted library allocation
page read and write
4D28000
trusted library allocation
page read and write
4C18000
trusted library allocation
page read and write
6E2000
heap
page read and write
4C11000
trusted library allocation
page read and write
706000
heap
page read and write
C87000
heap
page read and write
4C59000
trusted library allocation
page read and write
4C04000
trusted library allocation
page read and write
4C5F000
trusted library allocation
page read and write
4C3A000
trusted library allocation
page read and write
987000
remote allocation
page readonly
4C11000
trusted library allocation
page read and write
648000
heap
page read and write
4C49000
trusted library allocation
page read and write
2981000
trusted library allocation
page read and write
6CDDC000
unkown
page readonly
6CDC0000
unkown
page readonly
4C02000
trusted library allocation
page read and write
63D000
stack
page read and write
4C14000
trusted library allocation
page read and write
4C13000
trusted library allocation
page read and write
BFE000
stack
page read and write
666000
heap
page read and write
4C04000
trusted library allocation
page read and write
4C11000
trusted library allocation
page read and write
4C14000
trusted library allocation
page read and write
4C2D000
trusted library allocation
page read and write
4C22000
trusted library allocation
page read and write
4C53000
trusted library allocation
page read and write
4C91000
trusted library allocation
page read and write
A9AE000
stack
page read and write
4F2000
unkown
page execute and read and write
4C26000
trusted library allocation
page read and write
4C7A000
trusted library allocation
page read and write
4C0A000
trusted library allocation
page read and write
B35000
heap
page read and write
4DC0000
trusted library allocation
page read and write
4C3A000
trusted library allocation
page read and write
930000
remote allocation
page execute and read and write
CBD000
heap
page read and write
972000
remote allocation
page readonly
4ED0000
heap
page execute and read and write
4C0A000
trusted library allocation
page read and write
706000
heap
page read and write
722000
heap
page read and write
723000
heap
page read and write
D29000
heap
page read and write
2B5F000
stack
page read and write
688000
heap
page read and write
4C13000
trusted library allocation
page read and write
4C0F000
trusted library allocation
page read and write
473D000
stack
page read and write
6FD000
heap
page read and write
4C5A000
trusted library allocation
page read and write
4F2000
unkown
page readonly
4C0D000
trusted library allocation
page read and write
4C7A000
trusted library allocation
page read and write
722000
heap
page read and write
4BFB000
trusted library allocation
page read and write
6F3000
heap
page read and write
4C11000
trusted library allocation
page read and write
4C4B000
trusted library allocation
page read and write
4C08000
trusted library allocation
page read and write
4C14000
trusted library allocation
page read and write
4C61000
trusted library allocation
page read and write
4C18000
trusted library allocation
page read and write
4BFA000
trusted library allocation
page read and write
4BF3000
trusted library allocation
page read and write
4C14000
trusted library allocation
page read and write
4C22000
trusted library allocation
page read and write
4C11000
trusted library allocation
page read and write
6FE000
heap
page read and write
713000
heap
page read and write
4BFE000
trusted library allocation
page read and write
4C0D000
trusted library allocation
page read and write
722000
heap
page read and write
FB0000
trusted library allocation
page read and write
4C11000
trusted library allocation
page read and write
4C0D000
trusted library allocation
page read and write
4BF1000
trusted library allocation
page read and write
D0A000
heap
page read and write
693000
heap
page read and write
4BF6000
trusted library allocation
page read and write
4B4F000
trusted library allocation
page read and write
910000
heap
page read and write
4EBE000
stack
page read and write
6F3000
heap
page read and write
4DD0000
trusted library allocation
page read and write
6FD000
heap
page read and write
4C0F000
trusted library allocation
page read and write
4C1C000
trusted library allocation
page read and write
4C24000
trusted library allocation
page read and write
6D1000
heap
page read and write
6FD000
heap
page read and write
4C0D000
trusted library allocation
page read and write
4C22000
trusted library allocation
page read and write
4C04000
trusted library allocation
page read and write
52FF000
trusted library allocation
page read and write
6FE000
heap
page read and write
4C2F000
trusted library allocation
page read and write
4CF1000
trusted library allocation
page read and write
722000
heap
page read and write
4BFE000
trusted library allocation
page read and write
70D000
heap
page read and write
4C14000
trusted library allocation
page read and write
4C04000
trusted library allocation
page read and write
4C04000
trusted library allocation
page read and write
2994000
trusted library allocation
page read and write
4C49000
trusted library allocation
page read and write
4C02000
trusted library allocation
page read and write
4C11000
trusted library allocation
page read and write
19A000
stack
page read and write
4C14000
trusted library allocation
page read and write
666000
heap
page read and write
4C6C000
trusted library allocation
page read and write
6F7000
heap
page read and write
C10000
heap
page read and write
580000
unkown
page readonly
299B000
trusted library allocation
page read and write
4C24000
trusted library allocation
page read and write
4C27000
trusted library allocation
page read and write
1000000
heap
page read and write
4C13000
trusted library allocation
page read and write
FD0000
heap
page read and write
B74000
trusted library allocation
page read and write
4BF3000
trusted library allocation
page read and write
6E7000
heap
page read and write
4C0F000
trusted library allocation
page read and write
4C21000
trusted library allocation
page read and write
4C04000
trusted library allocation
page read and write
6D9000
heap
page read and write
6FF000
heap
page read and write
570000
heap
page read and write
4C11000
trusted library allocation
page read and write
C30000
heap
page read and write
6F9000
heap
page read and write
6F3000
heap
page read and write
B60000
trusted library allocation
page read and write
B97000
trusted library allocation
page execute and read and write
4C51000
trusted library allocation
page read and write
4C14000
trusted library allocation
page read and write
4CF7000
trusted library allocation
page read and write
4C0D000
trusted library allocation
page read and write
4C11000
trusted library allocation
page read and write
C00000
trusted library allocation
page execute and read and write
4C04000
trusted library allocation
page read and write
4C72000
trusted library allocation
page read and write
4C28000
trusted library allocation
page read and write
4C11000
trusted library allocation
page read and write
4C0F000
trusted library allocation
page read and write
4C41000
trusted library allocation
page read and write
B6D000
trusted library allocation
page execute and read and write
E4F000
stack
page read and write
715000
heap
page read and write
4C05000
trusted library allocation
page read and write
55E000
stack
page read and write
ACE000
stack
page read and write
4C2A000
trusted library allocation
page read and write
72B000
heap
page read and write
4C04000
trusted library allocation
page read and write
4BF9000
trusted library allocation
page read and write
701000
heap
page read and write
4C64000
trusted library allocation
page read and write
4C27000
trusted library allocation
page read and write
4C0D000
trusted library allocation
page read and write
6F9000
heap
page read and write
4C2B000
trusted library allocation
page read and write
4C0D000
trusted library allocation
page read and write
6CDC1000
unkown
page execute read
4C21000
trusted library allocation
page read and write
A65D000
stack
page read and write
4C5A000
trusted library allocation
page read and write
6D1000
heap
page read and write
4BF3000
trusted library allocation
page read and write
4C29000
trusted library allocation
page read and write
4C04000
trusted library allocation
page read and write
722000
heap
page read and write
4C0D000
trusted library allocation
page read and write
4C91000
trusted library allocation
page read and write
4C3D000
trusted library allocation
page read and write
4C0F000
trusted library allocation
page read and write
711000
heap
page read and write
4C04000
trusted library allocation
page read and write
6E7000
heap
page read and write
AD2F000
stack
page read and write
4C0F000
trusted library allocation
page read and write
B70000
trusted library allocation
page read and write
4C18000
trusted library allocation
page read and write
4C38000
trusted library allocation
page read and write
4B41000
trusted library allocation
page read and write
6F0000
heap
page read and write
4BFB000
trusted library allocation
page read and write
4DF7000
trusted library allocation
page read and write
4C4D000
trusted library allocation
page read and write
4C64000
trusted library allocation
page read and write
4C11000
trusted library allocation
page read and write
C5E000
heap
page read and write
4C11000
trusted library allocation
page read and write
4C01000
trusted library allocation
page read and write
4C11000
trusted library allocation
page read and write
B63000
trusted library allocation
page execute and read and write
4C53000
trusted library allocation
page read and write
6CE30000
unkown
page readonly
5812000
trusted library allocation
page read and write
4C9A000
trusted library allocation
page read and write
65D000
heap
page read and write
4C0D000
trusted library allocation
page read and write
4BF0000
trusted library allocation
page read and write
4C2F000
trusted library allocation
page read and write
4C4C000
trusted library allocation
page read and write
4C04000
trusted library allocation
page read and write
2870000
heap
page execute and read and write
4C25000
trusted library allocation
page read and write
4BF1000
trusted library allocation
page read and write
4C11000
trusted library allocation
page read and write
722000
heap
page read and write
5A0000
heap
page read and write
4C0B000
trusted library allocation
page read and write
4C28000
trusted library allocation
page read and write
4C11000
trusted library allocation
page read and write
4E7E000
stack
page read and write
4C45000
trusted library allocation
page read and write
4CF1000
heap
page read and write
4C0F000
trusted library allocation
page read and write
4C0F000
trusted library allocation
page read and write
688000
heap
page read and write
4C04000
trusted library allocation
page read and write
6FC000
heap
page read and write
4C41000
trusted library allocation
page read and write
C40000
trusted library allocation
page read and write
4C04000
trusted library allocation
page read and write
4C38000
trusted library allocation
page read and write
4C04000
trusted library allocation
page read and write
3981000
trusted library allocation
page read and write
4C82000
trusted library allocation
page read and write
4C28000
trusted library allocation
page read and write
B30000
heap
page read and write
4C13000
trusted library allocation
page read and write
4C14000
trusted library allocation
page read and write
4C22000
trusted library allocation
page read and write
4C4D000
trusted library allocation
page read and write
4C0A000
trusted library allocation
page read and write
4C21000
trusted library allocation
page read and write
4DC8000
trusted library allocation
page read and write
711000
heap
page read and write
4C3A000
trusted library allocation
page read and write
693000
heap
page read and write
4C0F000
trusted library allocation
page read and write
4C29000
trusted library allocation
page read and write
83C000
stack
page read and write
4C61000
trusted library allocation
page read and write
4C59000
trusted library allocation
page read and write
4C11000
trusted library allocation
page read and write
4BFF000
trusted library allocation
page read and write
4C4E000
trusted library allocation
page read and write
4C2D000
trusted library allocation
page read and write
4C36000
trusted library allocation
page read and write
4C55000
trusted library allocation
page read and write
6FA000
heap
page read and write
4185000
trusted library allocation
page read and write
493F000
stack
page read and write
745F000
stack
page read and write
860000
remote allocation
page read and write
4C27000
trusted library allocation
page read and write
4C04000
trusted library allocation
page read and write
4C51000
trusted library allocation
page read and write
4C5C000
trusted library allocation
page read and write
4CF0000
heap
page read and write
4C4D000
trusted library allocation
page read and write
70D000
heap
page read and write
4E60000
trusted library allocation
page read and write
400000
heap
page read and write
4C05000
trusted library allocation
page read and write
4C14000
trusted library allocation
page read and write
4C0D000
trusted library allocation
page read and write
4C61000
trusted library allocation
page read and write
9FE000
stack
page read and write
4C11000
trusted library allocation
page read and write
4C22000
trusted library allocation
page read and write
4C11000
trusted library allocation
page read and write
4C0D000
trusted library allocation
page read and write
4C14000
trusted library allocation
page read and write
B9B000
trusted library allocation
page execute and read and write
4BF4000
trusted library allocation
page read and write
4C09000
trusted library allocation
page read and write
706000
heap
page read and write
706000
heap
page read and write
8CE000
stack
page read and write
4C14000
trusted library allocation
page read and write
860000
remote allocation
page read and write
4C50000
trusted library allocation
page read and write
4C11000
trusted library allocation
page read and write
4C14000
trusted library allocation
page read and write
4C01000
trusted library allocation
page read and write
4C0D000
trusted library allocation
page read and write
4C0F000
trusted library allocation
page read and write
860000
remote allocation
page read and write
640000
heap
page read and write
975000
remote allocation
page execute and read and write
4F0000
unkown
page execute and read and write
4BFE000
trusted library allocation
page read and write
4C5A000
trusted library allocation
page read and write
4BFA000
trusted library allocation
page read and write
4C0D000
trusted library allocation
page read and write
4C0D000
trusted library allocation
page read and write
4C11000
trusted library allocation
page read and write
4C14000
trusted library allocation
page read and write
4BF1000
trusted library allocation
page read and write
C7D000
heap
page read and write
4C14000
trusted library allocation
page read and write
4C7A000
trusted library allocation
page read and write
CEE000
heap
page read and write
9A0000
heap
page read and write
C50000
heap
page read and write
722000
heap
page read and write
297F000
stack
page read and write
B50000
trusted library allocation
page read and write
4C0A000
trusted library allocation
page read and write
658000
heap
page read and write
4BF8000
trusted library allocation
page read and write
4C09000
trusted library allocation
page read and write
6FD000
heap
page read and write
70D000
heap
page read and write
4C4D000
trusted library allocation
page read and write
4C0D000
trusted library allocation
page read and write
931000
remote allocation
page execute read
F4F000
stack
page read and write
51E000
stack
page read and write
4C8F000
trusted library allocation
page read and write
4C30000
trusted library allocation
page read and write
4C04000
trusted library allocation
page read and write
483D000
stack
page read and write
C7F000
heap
page read and write
4C04000
trusted library allocation
page read and write
4C0A000
trusted library allocation
page read and write
4C16000
trusted library allocation
page read and write
580000
unkown
page execute and read and write
70E000
heap
page read and write
4C65000
trusted library allocation
page read and write
4BF8000
trusted library allocation
page read and write
4C40000
trusted library allocation
page read and write
4C14000
trusted library allocation
page read and write
298B000
trusted library allocation
page read and write
4C08000
trusted library allocation
page read and write
AAEE000
stack
page read and write
4BF1000
trusted library allocation
page read and write
6CDE2000
unkown
page read and write
4C6F000
trusted library allocation
page read and write
4CA2000
trusted library allocation
page read and write
4C69000
trusted library allocation
page read and write
4C61000
trusted library allocation
page read and write
93A000
stack
page read and write
4F0000
unkown
page readonly
70D000
heap
page read and write
4A7E000
stack
page read and write
671000
heap
page read and write
4C11000
trusted library allocation
page read and write
4C0D000
trusted library allocation
page read and write
4C0D000
trusted library allocation
page read and write
4C4D000
trusted library allocation
page read and write
4C29000
trusted library allocation
page read and write
4C11000
trusted library allocation
page read and write
6E7000
heap
page read and write
6FE000
heap
page read and write
4C55000
trusted library allocation
page read and write
C5A000
heap
page read and write
719000
heap
page read and write
A55D000
stack
page read and write
711000
heap
page read and write
AAAE000
stack
page read and write
4C02000
trusted library allocation
page read and write
4D48000
trusted library allocation
page read and write
B64000
trusted library allocation
page read and write
4C0D000
trusted library allocation
page read and write
706000
heap
page read and write
4D98000
trusted library allocation
page read and write
4C11000
trusted library allocation
page read and write
4C11000
trusted library allocation
page read and write
4C7D000
trusted library allocation
page read and write
701000
heap
page read and write
83F000
stack
page read and write
4C45000
trusted library allocation
page read and write
6FD000
heap
page read and write
575000
heap
page read and write
AC2E000
stack
page read and write
4C95000
trusted library allocation
page read and write
4E3E000
stack
page read and write
4BF7000
trusted library allocation
page read and write
4C45000
trusted library allocation
page read and write
B0E000
stack
page read and write
5A0000
unkown
page readonly
4C21000
trusted library allocation
page read and write
4C38000
trusted library allocation
page read and write
4C04000
trusted library allocation
page read and write
701000
heap
page read and write
4C45000
trusted library allocation
page read and write
4C0D000
trusted library allocation
page read and write
4C08000
trusted library allocation
page read and write
4C2D000
trusted library allocation
page read and write
577000
heap
page read and write
4C3E000
trusted library allocation
page read and write
4C9D000
trusted library allocation
page read and write
F8E000
stack
page read and write
4C04000
trusted library allocation
page read and write
722000
heap
page read and write
6F3000
heap
page read and write
713000
heap
page read and write
4C1F000
trusted library allocation
page read and write
There are 439 hidden memdumps, click here to show them.