IOC Report
IMG-20241119-WA0006(162KB).Pdf.exe

loading gif

Files

File Path
Type
Category
Malicious
IMG-20241119-WA0006(162KB).Pdf.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Local\Wausaukee\silvexes.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\silvexes.vbs
data
dropped
malicious
C:\Users\user\AppData\Local\Temp\aut3143.tmp
data
dropped
C:\Users\user\AppData\Local\Temp\autF9F7.tmp
data
dropped
C:\Users\user\AppData\Local\Temp\autFB.tmp
data
dropped
C:\Users\user\AppData\Local\Temp\scroll
data
dropped

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\IMG-20241119-WA0006(162KB).Pdf.exe
"C:\Users\user\Desktop\IMG-20241119-WA0006(162KB).Pdf.exe"
malicious
C:\Users\user\AppData\Local\Wausaukee\silvexes.exe
"C:\Users\user\Desktop\IMG-20241119-WA0006(162KB).Pdf.exe"
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
"C:\Users\user\Desktop\IMG-20241119-WA0006(162KB).Pdf.exe"
malicious
C:\Windows\System32\wscript.exe
"C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\silvexes.vbs"
malicious
C:\Users\user\AppData\Local\Wausaukee\silvexes.exe
"C:\Users\user\AppData\Local\Wausaukee\silvexes.exe"
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
"C:\Users\user\AppData\Local\Wausaukee\silvexes.exe"
malicious

URLs

Name
IP
Malicious
https://reallyfreegeoip.org
unknown
http://checkip.dyndns.org
unknown
http://checkip.dyndns.org/
193.122.6.168
http://checkip.dyndns.com
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
https://reallyfreegeoip.org/xml/8.46.123.75
172.67.177.134
https://reallyfreegeoip.org/xml/8.46.123.75$
unknown
http://checkip.dyndns.org/q
unknown
http://reallyfreegeoip.org
unknown
https://reallyfreegeoip.org/xml/
unknown

Domains

Name
IP
Malicious
reallyfreegeoip.org
172.67.177.134
checkip.dyndns.com
193.122.6.168
checkip.dyndns.org
unknown

IPs

IP
Domain
Country
Malicious
193.122.6.168
checkip.dyndns.com
United States
172.67.177.134
reallyfreegeoip.org
United States

Registry

Path
Value
Malicious
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASAPI32
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASAPI32
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASAPI32
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASAPI32
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASAPI32
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASAPI32
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASAPI32
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASMANCS
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASMANCS
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASMANCS
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASMANCS
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASMANCS
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASMANCS
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASMANCS
FileDirectory
There are 5 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
2F3F000
trusted library allocation
page read and write
malicious
2A61000
trusted library allocation
page read and write
malicious
2D71000
trusted library allocation
page read and write
malicious
402000
system
page execute and read and write
malicious
19A0000
direct allocation
page read and write
malicious
1E60000
direct allocation
page read and write
malicious
2C2F000
trusted library allocation
page read and write
malicious
160D4023000
heap
page read and write
3DDB000
trusted library allocation
page read and write
5230000
trusted library allocation
page read and write
F10000
heap
page read and write
1120000
trusted library allocation
page read and write
2CE3000
trusted library allocation
page read and write
2CEA000
trusted library allocation
page read and write
C6F000
unkown
page write copy
1E94000
heap
page read and write
DDE000
stack
page read and write
81000
unkown
page execute read
A60000
heap
page read and write
3A50000
direct allocation
page read and write
3A50000
direct allocation
page read and write
3A50000
direct allocation
page read and write
81000
unkown
page execute read
3ACB000
trusted library allocation
page read and write
2FD0000
trusted library allocation
page read and write
2BB9000
trusted library allocation
page read and write
4E6FFB000
stack
page read and write
3D8E000
direct allocation
page read and write
108C000
stack
page read and write
3F40000
direct allocation
page read and write
4069000
direct allocation
page read and write
6850000
trusted library allocation
page read and write
3BF0000
direct allocation
page read and write
13F000
unkown
page write copy
5040000
trusted library allocation
page execute and read and write
3EC3000
direct allocation
page read and write
3A0D000
direct allocation
page read and write
2CAD000
trusted library allocation
page read and write
3BF0000
direct allocation
page read and write
2EB1000
trusted library allocation
page read and write
2B28000
trusted library allocation
page read and write
3A89000
trusted library allocation
page read and write
60FF000
stack
page read and write
1190000
trusted library allocation
page execute and read and write
3610000
heap
page read and write
14D9000
heap
page read and write
EF7000
stack
page read and write
FDA000
heap
page read and write
2EE8000
trusted library allocation
page read and write
109F000
stack
page read and write
1165000
trusted library allocation
page execute and read and write
1510000
heap
page read and write
C3D000
unkown
page readonly
1300000
heap
page read and write
3F70000
direct allocation
page read and write
6870000
trusted library allocation
page read and write
2BB5000
trusted library allocation
page read and write
3DD0000
direct allocation
page read and write
52B0000
trusted library allocation
page read and write
6890000
trusted library allocation
page execute and read and write
1130000
trusted library allocation
page read and write
6820000
trusted library allocation
page read and write
62FE000
stack
page read and write
1005000
heap
page read and write
2E7D000
trusted library allocation
page read and write
1686000
heap
page read and write
80000
unkown
page readonly
4E6CFD000
stack
page read and write
1000000
heap
page read and write
3D8E000
direct allocation
page read and write
29F0000
trusted library allocation
page read and write
12FF000
heap
page read and write
400000
system
page execute and read and write
107E000
stack
page read and write
5060000
heap
page read and write
3000000
trusted library allocation
page read and write
110B000
heap
page read and write
1306000
trusted library allocation
page execute and read and write
2E2B000
trusted library allocation
page read and write
2F03000
trusted library allocation
page read and write
7FE000
stack
page read and write
6510000
trusted library allocation
page execute and read and write
3BF0000
direct allocation
page read and write
1340000
heap
page read and write
BB0000
unkown
page readonly
6049000
heap
page read and write
2A06000
trusted library allocation
page read and write
2A00000
trusted library allocation
page read and write
1350000
heap
page execute and read and write
64E0000
heap
page read and write
5030000
trusted library allocation
page read and write
1310000
trusted library allocation
page read and write
E20000
heap
page read and write
2C21000
trusted library allocation
page read and write
2BCA000
trusted library allocation
page read and write
149A000
heap
page read and write
53BD000
stack
page read and write
11EE000
stack
page read and write
3B73000
direct allocation
page read and write
3EC3000
direct allocation
page read and write
10EE000
stack
page read and write
406D000
direct allocation
page read and write
3B73000
direct allocation
page read and write
10AC000
stack
page read and write
684E000
trusted library allocation
page read and write
D50000
heap
page read and write
2FF4000
trusted library allocation
page read and write
2A2D000
trusted library allocation
page read and write
3E0B000
trusted library allocation
page read and write
2CEF000
trusted library allocation
page read and write
2C9D000
trusted library allocation
page read and write
40DE000
direct allocation
page read and write
5350000
heap
page execute and read and write
6D60000
heap
page read and write
12FD000
trusted library allocation
page execute and read and write
3530000
direct allocation
page read and write
3BF0000
direct allocation
page read and write
5236000
trusted library allocation
page read and write
14BB000
heap
page read and write
130A000
trusted library allocation
page execute and read and write
4B5E000
stack
page read and write
C6A000
unkown
page write copy
651E000
stack
page read and write
6910000
trusted library allocation
page read and write
12D0000
trusted library allocation
page read and write
2ECD000
trusted library allocation
page read and write
C3D000
unkown
page readonly
CE0000
heap
page read and write
3960000
direct allocation
page read and write
2FA9000
trusted library allocation
page read and write
2F1F000
trusted library allocation
page read and write
655E000
stack
page read and write
1312000
trusted library allocation
page read and write
C6A000
unkown
page read and write
10D000
unkown
page readonly
2EDA000
trusted library allocation
page read and write
81000
unkown
page execute read
560E000
stack
page read and write
7B0000
heap
page read and write
10FB000
heap
page read and write
110A000
heap
page read and write
BB0000
unkown
page readonly
2CB7000
trusted library allocation
page read and write
5FC0000
heap
page read and write
10D000
unkown
page readonly
52B6000
trusted library allocation
page read and write
DDD000
stack
page read and write
1C90000
heap
page read and write
1BDE000
stack
page read and write
10FC000
heap
page read and write
5290000
trusted library allocation
page execute and read and write
C6A000
unkown
page write copy
3AF2000
trusted library allocation
page read and write
52DD000
trusted library allocation
page read and write
BB0000
unkown
page readonly
130F000
heap
page read and write
1302000
trusted library allocation
page read and write
3A61000
trusted library allocation
page read and write
3BF0000
direct allocation
page read and write
FB4000
heap
page read and write
160D4060000
heap
page read and write
3D19000
direct allocation
page read and write
13BC000
stack
page read and write
7BA000
stack
page read and write
E8A000
heap
page read and write
3A1E000
direct allocation
page read and write
3D8E000
direct allocation
page read and write
2BE5000
trusted library allocation
page read and write
3D19000
direct allocation
page read and write
13DC000
stack
page read and write
3DA0000
direct allocation
page read and write
C6F000
unkown
page write copy
2E79000
trusted library allocation
page read and write
2FCC000
trusted library allocation
page read and write
FFA000
heap
page read and write
115F000
heap
page read and write
149E000
heap
page read and write
2EB9000
trusted library allocation
page read and write
12F0000
trusted library allocation
page read and write
12EE000
stack
page read and write
ECE000
stack
page read and write
63D7000
heap
page read and write
2A1E000
trusted library allocation
page read and write
6856000
trusted library allocation
page read and write
6430000
trusted library allocation
page execute and read and write
D10000
heap
page read and write
6420000
trusted library allocation
page execute and read and write
2EC5000
trusted library allocation
page read and write
2E3A000
trusted library allocation
page read and write
C74000
unkown
page readonly
160D3FF5000
heap
page read and write
4069000
direct allocation
page read and write
3A50000
direct allocation
page read and write
19D4000
heap
page read and write
4F4D000
stack
page read and write
BB1000
unkown
page execute read
641F000
trusted library allocation
page read and write
152F000
heap
page read and write
FC5000
heap
page read and write
C5E000
unkown
page readonly
2B42000
trusted library allocation
page read and write
63E3000
heap
page read and write
52CA000
trusted library allocation
page read and write
12E3000
trusted library allocation
page execute and read and write
613E000
stack
page read and write
3D8E000
direct allocation
page read and write
6450000
trusted library allocation
page read and write
548E000
stack
page read and write
4E69FE000
stack
page read and write
3EF3000
direct allocation
page read and write
406D000
direct allocation
page read and write
106C000
stack
page read and write
B9A000
stack
page read and write
11E1000
heap
page read and write
E80000
heap
page read and write
115C000
heap
page read and write
12E0000
trusted library allocation
page read and write
13A000
unkown
page read and write
E60000
heap
page read and write
144000
unkown
page readonly
52CE000
trusted library allocation
page read and write
3F70000
direct allocation
page read and write
104E000
stack
page read and write
52BE000
trusted library allocation
page read and write
1162000
trusted library allocation
page read and write
3EF3000
direct allocation
page read and write
3614000
heap
page read and write
410E000
direct allocation
page read and write
2EBD000
trusted library allocation
page read and write
3A5E000
stack
page read and write
2D6E000
stack
page read and write
167D000
heap
page read and write
52D6000
trusted library allocation
page read and write
5304000
trusted library allocation
page read and write
3BF0000
direct allocation
page read and write
3006000
trusted library allocation
page read and write
160D42D0000
heap
page read and write
5238000
trusted library allocation
page read and write
2B12000
trusted library allocation
page read and write
2E1A000
trusted library allocation
page read and write
1105000
heap
page read and write
410E000
direct allocation
page read and write
3AE5000
trusted library allocation
page read and write
2B65000
trusted library allocation
page read and write
4E6EFF000
stack
page read and write
5310000
trusted library allocation
page read and write
5460000
heap
page read and write
4F2D000
stack
page read and write
C74000
unkown
page readonly
168C000
heap
page read and write
5220000
trusted library allocation
page read and write
1330000
trusted library allocation
page read and write
160D42D5000
heap
page read and write
14CB000
heap
page read and write
4EC0000
trusted library allocation
page read and write
68A0000
trusted library allocation
page read and write
3DFF000
trusted library allocation
page read and write
3D1D000
direct allocation
page read and write
115B000
heap
page execute and read and write
5050000
heap
page read and write
1152000
trusted library allocation
page read and write
1100000
heap
page read and write
DBC000
stack
page read and write
12ED000
trusted library allocation
page execute and read and write
1D5F000
stack
page read and write
2FFB000
trusted library allocation
page read and write
F10000
heap
page read and write
64DD000
stack
page read and write
6873000
trusted library allocation
page read and write
2BA1000
trusted library allocation
page read and write
2BB1000
trusted library allocation
page read and write
113D000
trusted library allocation
page execute and read and write
C3D000
unkown
page readonly
629E000
stack
page read and write
4E67FE000
stack
page read and write
E40000
heap
page read and write
11FB000
heap
page read and write
1153000
heap
page read and write
29EE000
stack
page read and write
1120000
heap
page read and write
2A12000
trusted library allocation
page read and write
1E90000
heap
page read and write
F3D000
heap
page read and write
409D000
direct allocation
page read and write
3570000
heap
page read and write
C5E000
unkown
page readonly
5306000
trusted library allocation
page read and write
11B6000
heap
page read and write
3D1D000
direct allocation
page read and write
12E000
unkown
page readonly
1133000
trusted library allocation
page execute and read and write
2B57000
trusted library allocation
page read and write
3A50000
direct allocation
page read and write
4E4E000
stack
page read and write
C5E000
unkown
page readonly
3DA0000
direct allocation
page read and write
2B17000
trusted library allocation
page read and write
2FB4000
trusted library allocation
page read and write
80000
unkown
page readonly
3EF3000
direct allocation
page read and write
2B0A000
trusted library allocation
page read and write
2E38000
trusted library allocation
page read and write
13FC000
stack
page read and write
2A0E000
trusted library allocation
page read and write
600A000
heap
page read and write
2E1F000
trusted library allocation
page read and write
687A000
trusted library allocation
page read and write
4E6AFF000
stack
page read and write
E7E000
heap
page read and write
40DE000
direct allocation
page read and write
2B1B000
trusted library allocation
page read and write
3D1D000
direct allocation
page read and write
2E27000
trusted library allocation
page read and write
68B0000
trusted library allocation
page read and write
2B0F000
trusted library allocation
page read and write
2E67000
trusted library allocation
page read and write
2F23000
trusted library allocation
page read and write
3D19000
direct allocation
page read and write
A30000
heap
page read and write
502E000
stack
page read and write
C3D000
unkown
page readonly
144000
unkown
page readonly
1E50000
heap
page read and write
671E000
stack
page read and write
FDB000
heap
page read and write
409D000
direct allocation
page read and write
1084000
heap
page read and write
160D5BC0000
heap
page read and write
C5E000
unkown
page readonly
F5D000
heap
page read and write
2E52000
trusted library allocation
page read and write
CD0000
heap
page read and write
5FBF000
stack
page read and write
6400000
trusted library allocation
page execute and read and write
4E639A000
stack
page read and write
2EB5000
trusted library allocation
page read and write
2B61000
trusted library allocation
page read and write
3B73000
direct allocation
page read and write
3B73000
direct allocation
page read and write
6960000
trusted library allocation
page execute and read and write
116B000
trusted library allocation
page execute and read and write
1180000
trusted library allocation
page read and write
3D19000
direct allocation
page read and write
2FAE000
trusted library allocation
page read and write
52A0000
trusted library allocation
page read and write
1558000
heap
page read and write
160D3F10000
heap
page read and write
523B000
trusted library allocation
page read and write
2A26000
trusted library allocation
page read and write
160D3F30000
heap
page read and write
D9E000
stack
page read and write
115A000
trusted library allocation
page execute and read and write
1300000
trusted library allocation
page read and write
E30000
heap
page read and write
1197000
heap
page read and write
3D1D000
direct allocation
page read and write
6830000
trusted library allocation
page execute and read and write
127C000
heap
page read and write
2CF5000
trusted library allocation
page read and write
12E000
unkown
page readonly
114D000
trusted library allocation
page execute and read and write
2C99000
trusted library allocation
page read and write
BB1000
unkown
page execute read
2BAD000
trusted library allocation
page read and write
669E000
stack
page read and write
4099000
direct allocation
page read and write
3D19000
direct allocation
page read and write
6413000
trusted library allocation
page read and write
14D5000
heap
page read and write
6844000
trusted library allocation
page read and write
1150000
trusted library allocation
page read and write
5300000
trusted library allocation
page read and write
1557000
heap
page read and write
406D000
direct allocation
page read and write
2CA4000
trusted library allocation
page read and write
3D8E000
direct allocation
page read and write
D2E000
stack
page read and write
11D0000
heap
page read and write
2B2A000
trusted library allocation
page read and write
E85000
heap
page read and write
2CBB000
trusted library allocation
page read and write
19D0000
heap
page read and write
2C6E000
stack
page read and write
3EC3000
direct allocation
page read and write
1200000
heap
page read and write
2B6D000
trusted library allocation
page read and write
1C80000
heap
page read and write
1380000
heap
page read and write
1140000
trusted library allocation
page read and write
3DA0000
direct allocation
page read and write
2C13000
trusted library allocation
page read and write
5053000
heap
page read and write
BA9000
stack
page read and write
11E0000
heap
page read and write
3DD0000
direct allocation
page read and write
522E000
trusted library allocation
page read and write
681F000
stack
page read and write
2CC0000
trusted library allocation
page read and write
1180000
heap
page read and write
4099000
direct allocation
page read and write
1110000
heap
page read and write
623F000
stack
page read and write
3DD0000
direct allocation
page read and write
E98000
heap
page read and write
7BA000
stack
page read and write
3AEF000
trusted library allocation
page read and write
160D3FC9000
heap
page read and write
F4D000
heap
page read and write
579F000
stack
page read and write
12E4000
trusted library allocation
page read and write
2BA9000
trusted library allocation
page read and write
52F0000
heap
page read and write
1317000
trusted library allocation
page execute and read and write
409D000
direct allocation
page read and write
1360000
heap
page read and write
AF7000
stack
page read and write
E2F000
stack
page read and write
1160000
trusted library allocation
page read and write
11CE000
stack
page read and write
11D8000
heap
page read and write
DFD000
stack
page read and write
3D1D000
direct allocation
page read and write
627E000
stack
page read and write
5240000
heap
page execute and read and write
5330000
trusted library allocation
page read and write
1144000
heap
page read and write
558E000
stack
page read and write
55CE000
stack
page read and write
CCE000
stack
page read and write
160D3FC0000
heap
page read and write
2C0F000
trusted library allocation
page read and write
3E02000
trusted library allocation
page read and write
14D4000
heap
page execute and read and write
FF0000
heap
page read and write
1EB0000
heap
page read and write
12F0000
heap
page read and write
4EA0000
trusted library allocation
page read and write
3D1D000
direct allocation
page read and write
6858000
trusted library allocation
page read and write
6500000
heap
page read and write
CE5000
heap
page read and write
11A0000
heap
page read and write
641A000
trusted library allocation
page read and write
13CE000
stack
page read and write
66DE000
stack
page read and write
4E6DFE000
stack
page read and write
3F70000
direct allocation
page read and write
2E71000
trusted library allocation
page read and write
14D5000
heap
page read and write
1167000
trusted library allocation
page execute and read and write
F1A000
heap
page read and write
4099000
direct allocation
page read and write
6440000
trusted library allocation
page read and write
131B000
trusted library allocation
page execute and read and write
A20000
heap
page read and write
C74000
unkown
page readonly
3D19000
direct allocation
page read and write
52E2000
trusted library allocation
page read and write
3B73000
direct allocation
page read and write
1315000
trusted library allocation
page execute and read and write
6037000
heap
page read and write
160D42DC000
heap
page read and write
6860000
trusted library allocation
page execute and read and write
63FE000
stack
page read and write
3B73000
direct allocation
page read and write
665E000
stack
page read and write
2A40000
trusted library allocation
page read and write
1156000
trusted library allocation
page execute and read and write
4069000
direct allocation
page read and write
3F40000
direct allocation
page read and write
2F31000
trusted library allocation
page read and write
64B0000
trusted library allocation
page read and write
52D1000
trusted library allocation
page read and write
2E22000
trusted library allocation
page read and write
191F000
stack
page read and write
BB0000
unkown
page readonly
410E000
direct allocation
page read and write
F53000
heap
page read and write
114F000
stack
page read and write
361F000
stack
page read and write
2EF6000
trusted library allocation
page read and write
2BA5000
trusted library allocation
page read and write
6940000
heap
page read and write
12B6000
heap
page read and write
160D42DE000
heap
page read and write
E7E000
stack
page read and write
160D3F00000
heap
page read and write
17DE000
stack
page read and write
125A000
heap
page read and write
13A000
unkown
page write copy
4E66FE000
stack
page read and write
2E75000
trusted library allocation
page read and write
3F40000
direct allocation
page read and write
2FBD000
trusted library allocation
page read and write
2BF3000
trusted library allocation
page read and write
1611000
heap
page read and write
E68000
heap
page read and write
6880000
trusted library allocation
page execute and read and write
2FC7000
trusted library allocation
page read and write
C6A000
unkown
page read and write
D00000
heap
page read and write
F95000
heap
page read and write
2B69000
trusted library allocation
page read and write
167C000
heap
page read and write
148E000
stack
page read and write
6410000
trusted library allocation
page read and write
BB1000
unkown
page execute read
62BF000
stack
page read and write
533F000
trusted library allocation
page read and write
2EC9000
trusted library allocation
page read and write
3DA0000
direct allocation
page read and write
6840000
trusted library allocation
page read and write
1577000
heap
page read and write
2A1A000
trusted library allocation
page read and write
63A0000
heap
page read and write
115C000
heap
page read and write
F59000
heap
page execute and read and write
2A50000
heap
page execute and read and write
BB1000
unkown
page execute read
685B000
trusted library allocation
page read and write
3A50000
direct allocation
page read and write
52C2000
trusted library allocation
page read and write
1490000
heap
page read and write
C74000
unkown
page readonly
F1E000
heap
page read and write
687F000
trusted library allocation
page read and write
F5A000
heap
page read and write
3AFB000
trusted library allocation
page read and write
3D8E000
direct allocation
page read and write
2A0B000
trusted library allocation
page read and write
DCF000
stack
page read and write
2EC1000
trusted library allocation
page read and write
2A21000
trusted library allocation
page read and write
52BB000
trusted library allocation
page read and write
3D99000
trusted library allocation
page read and write
3D71000
trusted library allocation
page read and write
2BBD000
trusted library allocation
page read and write
3DF5000
trusted library allocation
page read and write
1A70000
heap
page read and write
74A000
stack
page read and write
639F000
stack
page read and write
52F3000
heap
page read and write
684A000
trusted library allocation
page read and write
1134000
trusted library allocation
page read and write
1208000
heap
page read and write
B7E000
stack
page read and write
1128000
heap
page read and write
40DE000
direct allocation
page read and write
There are 538 hidden memdumps, click here to show them.