IOC Report
Aquantia_Installer.exe

loading gif

Files

File Path
Type
Category
Malicious
Aquantia_Installer.exe
PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Roaming\gdi32.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_Aquantia_Install_d8272d3c64971475476783cd1ff2ada06cb2e7d1_da6d3015_e869c00f-6e95-46d2-8541-892e62f6bf0b\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER1023.tmp.dmp
Mini DuMP crash report, 15 streams, Sat Nov 23 14:21:54 2024, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER114C.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER116D.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\Windows\appcompat\Programs\Amcache.hve
MS Windows registry file, NT/2000 or above
dropped
\Device\ConDrv
ASCII text, with very long lines (353), with CRLF, LF line terminators
dropped

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\Aquantia_Installer.exe
"C:\Users\user\Desktop\Aquantia_Installer.exe"
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe
"C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 3716 -s 1224

URLs

Name
IP
Malicious
https://frogs-severz.sbs/api
172.67.155.47
malicious
fumblingactor.cyou
malicious
https://duckduckgo.com/chrome_newtab
unknown
https://duckduckgo.com/ac/?q=
unknown
https://frogs-severz.sbs/C
unknown
https://www.google.com/images/branding/product/ico/googleg_lodp.ico
unknown
https://imp.mt48.net/static?id=7RHzfOIXjFEYsBdvIpkX4Qqm4p8dfCfm4pbW1pbWfpbW7ReNxR3UIG8zInwYIFIVs9eYi
unknown
https://frogs-severz.sbs/apixVebc
unknown
https://bridge.sfo1.admarketplace.net/ctp?version=16.0.0&key=1696425136400800000.2&ci=1696425136743.
unknown
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
unknown
http://crl.rootca1.amazontrust.com/rootca1.crl0
unknown
http://upx.sf.net
unknown
https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
unknown
http://ocsp.rootca1.amazontrust.com0:
unknown
https://www.ecosia.org/newtab/
unknown
https://bridge.sfo1.ap01.net/ctp?version=16.0.0&key=1696425136400800000.1&ci=1696425136743.12791&cta
unknown
https://support.mozilla.org/kb/customize-firefox-controls-buttons-and-toolbars?utm_source=firefox-br
unknown
https://ac.ecosia.org/autocomplete?q=
unknown
https://frogs-severz.sbs/g
unknown
https://contile-images.services.mozilla.com/u1AuJcj32cbVUf9NjMipLXEYwu2uFIt4lsj-ccwVqEs.36904.jpg
unknown
https://frogs-severz.sbs/
unknown
https://frogs-severz.sbs/apii
unknown
https://contile-images.services.mozilla.com/obgoOYObjIFea_bXuT6L4LbBJ8j425AD87S1HMD3BWg.9991.jpg
unknown
http://x1.c.lencr.org/0
unknown
http://x1.i.lencr.org/0
unknown
https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
unknown
https://frogs-severz.sbs/api#L
unknown
http://crt.rootca1.amazontrust.com/rootca1.cer0?
unknown
https://frogs-severz.sbs/api#O
unknown
https://www.bestbuy.com/site/electronics/top-deals/pcmcat1563299784494.c/?id=pcmcat1563299784494&ref
unknown
https://www.amazon.com/?tag=admarketus-20&ref=pd_sl_35787f1071928bc3a1aef90b79c9bee9c64ba6683fde7477
unknown
https://frogs-severz.sbs:443/apiAA3GM0RssN1u2sTrQHh4TeOMDePHoCR3hPAm7IHnVLLUAAAAAADoAAAAACAAAgAAAAVG
unknown
https://support.mozilla.org/products/firefoxgro.all
unknown
https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
unknown
There are 24 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
fumblingactor.cyou
unknown
malicious
frogs-severz.sbs
172.67.155.47

IPs

IP
Domain
Country
Malicious
172.67.155.47
frogs-severz.sbs
United States

Registry

Path
Value
Malicious
\REGISTRY\A\{077ef30b-10d8-21da-06dd-d34039d8337a}\Root\InventoryApplicationFile\aquantia_install|cce7ab4a2bb502c0
ProgramId
\REGISTRY\A\{077ef30b-10d8-21da-06dd-d34039d8337a}\Root\InventoryApplicationFile\aquantia_install|cce7ab4a2bb502c0
FileId
\REGISTRY\A\{077ef30b-10d8-21da-06dd-d34039d8337a}\Root\InventoryApplicationFile\aquantia_install|cce7ab4a2bb502c0
LowerCaseLongPath
\REGISTRY\A\{077ef30b-10d8-21da-06dd-d34039d8337a}\Root\InventoryApplicationFile\aquantia_install|cce7ab4a2bb502c0
LongPathHash
\REGISTRY\A\{077ef30b-10d8-21da-06dd-d34039d8337a}\Root\InventoryApplicationFile\aquantia_install|cce7ab4a2bb502c0
Name
\REGISTRY\A\{077ef30b-10d8-21da-06dd-d34039d8337a}\Root\InventoryApplicationFile\aquantia_install|cce7ab4a2bb502c0
OriginalFileName
\REGISTRY\A\{077ef30b-10d8-21da-06dd-d34039d8337a}\Root\InventoryApplicationFile\aquantia_install|cce7ab4a2bb502c0
Publisher
\REGISTRY\A\{077ef30b-10d8-21da-06dd-d34039d8337a}\Root\InventoryApplicationFile\aquantia_install|cce7ab4a2bb502c0
Version
\REGISTRY\A\{077ef30b-10d8-21da-06dd-d34039d8337a}\Root\InventoryApplicationFile\aquantia_install|cce7ab4a2bb502c0
BinFileVersion
\REGISTRY\A\{077ef30b-10d8-21da-06dd-d34039d8337a}\Root\InventoryApplicationFile\aquantia_install|cce7ab4a2bb502c0
BinaryType
\REGISTRY\A\{077ef30b-10d8-21da-06dd-d34039d8337a}\Root\InventoryApplicationFile\aquantia_install|cce7ab4a2bb502c0
ProductName
\REGISTRY\A\{077ef30b-10d8-21da-06dd-d34039d8337a}\Root\InventoryApplicationFile\aquantia_install|cce7ab4a2bb502c0
ProductVersion
\REGISTRY\A\{077ef30b-10d8-21da-06dd-d34039d8337a}\Root\InventoryApplicationFile\aquantia_install|cce7ab4a2bb502c0
LinkDate
\REGISTRY\A\{077ef30b-10d8-21da-06dd-d34039d8337a}\Root\InventoryApplicationFile\aquantia_install|cce7ab4a2bb502c0
BinProductVersion
\REGISTRY\A\{077ef30b-10d8-21da-06dd-d34039d8337a}\Root\InventoryApplicationFile\aquantia_install|cce7ab4a2bb502c0
AppxPackageFullName
\REGISTRY\A\{077ef30b-10d8-21da-06dd-d34039d8337a}\Root\InventoryApplicationFile\aquantia_install|cce7ab4a2bb502c0
AppxPackageRelativeId
\REGISTRY\A\{077ef30b-10d8-21da-06dd-d34039d8337a}\Root\InventoryApplicationFile\aquantia_install|cce7ab4a2bb502c0
Size
\REGISTRY\A\{077ef30b-10d8-21da-06dd-d34039d8337a}\Root\InventoryApplicationFile\aquantia_install|cce7ab4a2bb502c0
Language
\REGISTRY\A\{077ef30b-10d8-21da-06dd-d34039d8337a}\Root\InventoryApplicationFile\aquantia_install|cce7ab4a2bb502c0
Usn
There are 9 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
6CF40000
unkown
page read and write
malicious
576D000
trusted library allocation
page read and write
571A000
trusted library allocation
page read and write
314B000
heap
page read and write
570C000
trusted library allocation
page read and write
316E000
heap
page read and write
B6AE000
stack
page read and write
5731000
trusted library allocation
page read and write
576D000
trusted library allocation
page read and write
3411000
trusted library allocation
page read and write
5731000
trusted library allocation
page read and write
5754000
trusted library allocation
page read and write
56F0000
trusted library allocation
page read and write
314B000
heap
page read and write
5887000
trusted library allocation
page read and write
312F000
heap
page read and write
574F000
trusted library allocation
page read and write
165D000
trusted library allocation
page execute and read and write
4411000
trusted library allocation
page read and write
3050000
heap
page read and write
5731000
trusted library allocation
page read and write
3131000
heap
page read and write
5721000
trusted library allocation
page read and write
57E1000
heap
page read and write
514D000
stack
page read and write
B5AE000
stack
page read and write
4CE0000
remote allocation
page read and write
5749000
trusted library allocation
page read and write
3132000
heap
page read and write
56F4000
trusted library allocation
page read and write
56F1000
trusted library allocation
page read and write
5711000
trusted library allocation
page read and write
573B000
trusted library allocation
page read and write
5746000
trusted library allocation
page read and write
5731000
trusted library allocation
page read and write
5731000
trusted library allocation
page read and write
5733000
trusted library allocation
page read and write
2F50000
remote allocation
page execute and read and write
570B000
trusted library allocation
page read and write
56EF000
trusted library allocation
page read and write
5710000
trusted library allocation
page read and write
5887000
trusted library allocation
page read and write
5707000
trusted library allocation
page read and write
5724000
trusted library allocation
page read and write
5731000
trusted library allocation
page read and write
17CA000
heap
page read and write
4CE0000
remote allocation
page read and write
56E4000
trusted library allocation
page read and write
338D000
stack
page read and write
5743000
trusted library allocation
page read and write
3124000
heap
page read and write
1664000
trusted library allocation
page read and write
312F000
heap
page read and write
5733000
trusted library allocation
page read and write
315C000
heap
page read and write
316C000
heap
page read and write
5741000
trusted library allocation
page read and write
5735000
trusted library allocation
page read and write
5770000
trusted library allocation
page read and write
315C000
heap
page read and write
314A000
heap
page read and write
56E9000
trusted library allocation
page read and write
311F000
heap
page read and write
5723000
trusted library allocation
page read and write
2F93000
remote allocation
page readonly
5738000
trusted library allocation
page read and write
56E0000
trusted library allocation
page read and write
56F2000
trusted library allocation
page read and write
5700000
trusted library allocation
page read and write
577D000
trusted library allocation
page read and write
554E000
stack
page read and write
3426000
trusted library allocation
page read and write
5721000
trusted library allocation
page read and write
1670000
trusted library allocation
page read and write
56F8000
trusted library allocation
page read and write
577C000
trusted library allocation
page read and write
5731000
trusted library allocation
page read and write
3141000
heap
page read and write
341B000
trusted library allocation
page read and write
57E6000
trusted library allocation
page read and write
5731000
trusted library allocation
page read and write
5711000
trusted library allocation
page read and write
5724000
trusted library allocation
page read and write
B7EE000
stack
page read and write
5731000
trusted library allocation
page read and write
5721000
trusted library allocation
page read and write
3141000
heap
page read and write
340F000
stack
page read and write
3136000
heap
page read and write
5743000
trusted library allocation
page read and write
30C7000
heap
page read and write
30A6000
heap
page read and write
3162000
heap
page read and write
1653000
trusted library allocation
page execute and read and write
5715000
trusted library allocation
page read and write
314A000
heap
page read and write
1190000
heap
page read and write
5711000
trusted library allocation
page read and write
4C30000
heap
page read and write
7FDF000
stack
page read and write
56F4000
trusted library allocation
page read and write
56E7000
trusted library allocation
page read and write
14F9000
stack
page read and write
58E4000
trusted library allocation
page read and write
56FD000
trusted library allocation
page read and write
315C000
heap
page read and write
5719000
trusted library allocation
page read and write
FE2000
unkown
page execute and read and write
316C000
heap
page read and write
1654000
trusted library allocation
page read and write
312D000
heap
page read and write
56DF000
stack
page read and write
5707000
trusted library allocation
page read and write
575E000
trusted library allocation
page read and write
341D000
trusted library allocation
page read and write
3158000
heap
page read and write
6CF3A000
unkown
page readonly
5718000
trusted library allocation
page read and write
5703000
trusted library allocation
page read and write
5711000
trusted library allocation
page read and write
5711000
trusted library allocation
page read and write
6CF20000
unkown
page readonly
58BF000
trusted library allocation
page read and write
5711000
trusted library allocation
page read and write
7E9E000
stack
page read and write
5785000
trusted library allocation
page read and write
11A0000
heap
page read and write
6CF21000
unkown
page execute read
5769000
trusted library allocation
page read and write
56F2000
trusted library allocation
page read and write
5769000
trusted library allocation
page read and write
3133000
heap
page read and write
5738000
trusted library allocation
page read and write
5712000
trusted library allocation
page read and write
B56E000
stack
page read and write
57E3000
trusted library allocation
page read and write
3169000
heap
page read and write
56F2000
trusted library allocation
page read and write
5724000
trusted library allocation
page read and write
2FA8000
remote allocation
page readonly
56E4000
trusted library allocation
page read and write
538E000
stack
page read and write
3164000
heap
page read and write
FE0000
unkown
page readonly
56F2000
trusted library allocation
page read and write
1B20000
heap
page read and write
3170000
heap
page read and write
5743000
trusted library allocation
page read and write
16C0000
trusted library allocation
page execute and read and write
5707000
trusted library allocation
page read and write
5794000
trusted library allocation
page read and write
5721000
trusted library allocation
page read and write
315C000
heap
page read and write
3125000
heap
page read and write
571D000
trusted library allocation
page read and write
5711000
trusted library allocation
page read and write
315C000
heap
page read and write
56F4000
trusted library allocation
page read and write
3158000
heap
page read and write
3132000
heap
page read and write
5731000
trusted library allocation
page read and write
3124000
heap
page read and write
5704000
trusted library allocation
page read and write
58B7000
trusted library allocation
page read and write
5730000
trusted library allocation
page read and write
1740000
trusted library section
page read and write
5721000
trusted library allocation
page read and write
56E4000
trusted library allocation
page read and write
5731000
trusted library allocation
page read and write
3132000
heap
page read and write
56E2000
trusted library allocation
page read and write
570A000
trusted library allocation
page read and write
577C000
trusted library allocation
page read and write
16F0000
heap
page read and write
56F3000
trusted library allocation
page read and write
5731000
trusted library allocation
page read and write
3141000
heap
page read and write
3124000
heap
page read and write
56E1000
trusted library allocation
page read and write
524D000
stack
page read and write
314B000
heap
page read and write
B6EE000
stack
page read and write
348E000
stack
page read and write
5731000
trusted library allocation
page read and write
5837000
trusted library allocation
page read and write
168B000
trusted library allocation
page execute and read and write
2F3B000
stack
page read and write
554E000
stack
page read and write
5799000
trusted library allocation
page read and write
2E3B000
stack
page read and write
316C000
heap
page read and write
3169000
heap
page read and write
5729000
trusted library allocation
page read and write
56F0000
trusted library allocation
page read and write
2F96000
remote allocation
page execute and read and write
55D0000
heap
page read and write
5731000
trusted library allocation
page read and write
3131000
heap
page read and write
57A1000
trusted library allocation
page read and write
178B000
heap
page read and write
5765000
trusted library allocation
page read and write
5707000
trusted library allocation
page read and write
5703000
trusted library allocation
page read and write
5731000
trusted library allocation
page read and write
5731000
trusted library allocation
page read and write
314B000
heap
page read and write
594F000
trusted library allocation
page read and write
5702000
trusted library allocation
page read and write
312F000
heap
page read and write
571C000
trusted library allocation
page read and write
4CE0000
remote allocation
page read and write
5710000
trusted library allocation
page read and write
56E7000
trusted library allocation
page read and write
5817000
trusted library allocation
page read and write
5731000
trusted library allocation
page read and write
575F000
trusted library allocation
page read and write
6CF8F000
unkown
page readonly
3136000
heap
page read and write
334F000
stack
page read and write
56E7000
trusted library allocation
page read and write
56FE000
trusted library allocation
page read and write
574F000
trusted library allocation
page read and write
3158000
heap
page read and write
571F000
trusted library allocation
page read and write
195E000
stack
page read and write
5708000
trusted library allocation
page read and write
571E000
trusted library allocation
page read and write
5731000
trusted library allocation
page read and write
3153000
heap
page read and write
1620000
heap
page read and write
5721000
trusted library allocation
page read and write
5719000
trusted library allocation
page read and write
5710000
trusted library allocation
page read and write
3115000
heap
page read and write
5769000
trusted library allocation
page read and write
5781000
trusted library allocation
page read and write
B11D000
stack
page read and write
3124000
heap
page read and write
5711000
trusted library allocation
page read and write
5711000
trusted library allocation
page read and write
56F3000
trusted library allocation
page read and write
3147000
heap
page read and write
5731000
trusted library allocation
page read and write
3098000
heap
page read and write
5755000
trusted library allocation
page read and write
5731000
trusted library allocation
page read and write
577C000
trusted library allocation
page read and write
5731000
trusted library allocation
page read and write
2FE0000
heap
page read and write
1680000
trusted library allocation
page read and write
3170000
heap
page read and write
3152000
heap
page read and write
108E000
unkown
page readonly
5731000
trusted library allocation
page read and write
3162000
heap
page read and write
3162000
heap
page read and write
5755000
trusted library allocation
page read and write
5731000
trusted library allocation
page read and write
56F8000
trusted library allocation
page read and write
572F000
trusted library allocation
page read and write
3165000
heap
page read and write
315E000
heap
page read and write
312F000
heap
page read and write
16D0000
trusted library allocation
page read and write
3158000
heap
page read and write
5731000
trusted library allocation
page read and write
5734000
trusted library allocation
page read and write
5711000
trusted library allocation
page read and write
574B000
trusted library allocation
page read and write
5731000
trusted library allocation
page read and write
573F000
trusted library allocation
page read and write
3141000
heap
page read and write
5715000
trusted library allocation
page read and write
11EE000
stack
page read and write
1760000
heap
page read and write
5723000
trusted library allocation
page read and write
3169000
heap
page read and write
58AF000
trusted library allocation
page read and write
5709000
trusted library allocation
page read and write
528D000
stack
page read and write
571A000
trusted library allocation
page read and write
56FE000
trusted library allocation
page read and write
302E000
stack
page read and write
56E1000
trusted library allocation
page read and write
5728000
trusted library allocation
page read and write
311F000
heap
page read and write
312F000
heap
page read and write
3160000
heap
page read and write
176E000
heap
page read and write
5736000
trusted library allocation
page read and write
3163000
heap
page read and write
5731000
trusted library allocation
page read and write
5913000
trusted library allocation
page read and write
3080000
heap
page read and write
312F000
heap
page read and write
1640000
trusted library allocation
page read and write
7D9E000
stack
page read and write
3132000
heap
page read and write
3170000
heap
page read and write
5731000
trusted library allocation
page read and write
5714000
trusted library allocation
page read and write
30B1000
heap
page read and write
FE0000
unkown
page execute and read and write
4C8E000
stack
page read and write
30C7000
heap
page read and write
56EF000
trusted library allocation
page read and write
5768000
trusted library allocation
page read and write
3160000
heap
page read and write
3114000
heap
page read and write
4D00000
heap
page read and write
3163000
heap
page read and write
3136000
heap
page read and write
3124000
heap
page read and write
53EE000
stack
page read and write
5731000
trusted library allocation
page read and write
5711000
trusted library allocation
page read and write
5750000
trusted library allocation
page read and write
1750000
trusted library allocation
page read and write
3134000
heap
page read and write
5731000
trusted library allocation
page read and write
3160000
heap
page read and write
1768000
heap
page read and write
5731000
trusted library allocation
page read and write
5743000
trusted library allocation
page read and write
570B000
trusted library allocation
page read and write
315C000
heap
page read and write
161E000
stack
page read and write
5729000
trusted library allocation
page read and write
3113000
heap
page read and write
5736000
trusted library allocation
page read and write
B01E000
stack
page read and write
313E000
heap
page read and write
3146000
heap
page read and write
112C000
stack
page read and write
5711000
trusted library allocation
page read and write
5731000
trusted library allocation
page read and write
1795000
heap
page read and write
3160000
heap
page read and write
570E000
trusted library allocation
page read and write
1687000
trusted library allocation
page execute and read and write
5721000
trusted library allocation
page read and write
312E000
heap
page read and write
578E000
trusted library allocation
page read and write
5731000
trusted library allocation
page read and write
570B000
trusted library allocation
page read and write
5A82000
trusted library allocation
page read and write
3131000
heap
page read and write
5731000
trusted library allocation
page read and write
5721000
trusted library allocation
page read and write
597E000
trusted library allocation
page read and write
5710000
trusted library allocation
page read and write
3132000
heap
page read and write
315C000
heap
page read and write
576D000
trusted library allocation
page read and write
316C000
heap
page read and write
57E0000
trusted library allocation
page read and write
3169000
heap
page read and write
4CCE000
stack
page read and write
3114000
heap
page read and write
5718000
trusted library allocation
page read and write
181B000
heap
page read and write
5721000
trusted library allocation
page read and write
3088000
heap
page read and write
5711000
trusted library allocation
page read and write
576D000
trusted library allocation
page read and write
323F000
stack
page read and write
3158000
heap
page read and write
572B000
trusted library allocation
page read and write
544E000
stack
page read and write
3160000
heap
page read and write
5732000
trusted library allocation
page read and write
56F8000
trusted library allocation
page read and write
56EA000
trusted library allocation
page read and write
3170000
heap
page read and write
5739000
trusted library allocation
page read and write
5723000
trusted library allocation
page read and write
5743000
trusted library allocation
page read and write
17C0000
heap
page read and write
5749000
trusted library allocation
page read and write
5735000
trusted library allocation
page read and write
571B000
trusted library allocation
page read and write
3030000
heap
page read and write
5743000
trusted library allocation
page read and write
312F000
heap
page read and write
30B1000
heap
page read and write
5DE3000
trusted library allocation
page read and write
309C000
heap
page read and write
342B000
trusted library allocation
page read and write
3300000
heap
page execute and read and write
314A000
heap
page read and write
3055000
heap
page read and write
5731000
trusted library allocation
page read and write
5731000
trusted library allocation
page read and write
B46E000
stack
page read and write
5730000
trusted library allocation
page read and write
5702000
trusted library allocation
page read and write
5731000
trusted library allocation
page read and write
5731000
trusted library allocation
page read and write
571C000
trusted library allocation
page read and write
30DC000
heap
page read and write
1811000
heap
page read and write
7EDE000
stack
page read and write
3160000
heap
page read and write
1660000
trusted library allocation
page read and write
62F9000
trusted library allocation
page read and write
316E000
heap
page read and write
56EA000
trusted library allocation
page read and write
577C000
trusted library allocation
page read and write
5731000
trusted library allocation
page read and write
573A000
trusted library allocation
page read and write
56F8000
trusted library allocation
page read and write
3158000
heap
page read and write
3131000
heap
page read and write
309C000
heap
page read and write
5721000
trusted library allocation
page read and write
17A1000
heap
page read and write
570E000
trusted library allocation
page read and write
3134000
heap
page read and write
4C15000
trusted library allocation
page read and write
30A6000
heap
page read and write
1650000
trusted library allocation
page read and write
570E000
trusted library allocation
page read and write
3057000
heap
page read and write
57FF000
trusted library allocation
page read and write
570D000
trusted library allocation
page read and write
5707000
trusted library allocation
page read and write
58D0000
heap
page execute and read and write
316D000
heap
page read and write
56F6000
trusted library allocation
page read and write
57E0000
heap
page read and write
FE2000
unkown
page readonly
5731000
trusted library allocation
page read and write
5769000
trusted library allocation
page read and write
2F51000
remote allocation
page execute read
1690000
heap
page read and write
312F000
heap
page read and write
5731000
trusted library allocation
page read and write
54EF000
stack
page read and write
30DC000
heap
page read and write
16B0000
trusted library allocation
page read and write
3160000
heap
page read and write
5769000
trusted library allocation
page read and write
5711000
trusted library allocation
page read and write
571A000
trusted library allocation
page read and write
5731000
trusted library allocation
page read and write
570A000
trusted library allocation
page read and write
5711000
trusted library allocation
page read and write
3160000
heap
page read and write
173E000
stack
page read and write
56FD000
trusted library allocation
page read and write
There are 440 hidden memdumps, click here to show them.