IOC Report
file.exe

loading gif

Files

File Path
Type
Category
Malicious
file.exe
PE32 executable (console) Intel 80386, for MS Windows
initial sample
malicious
C:\Users\Public\Desktop\Google Chrome.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Description string, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:41 2023, mtime=Wed Oct 4 11:02:33 2023, atime=Wed Sep 27 04:28:27 2023, length=3242272, window=hide
dropped
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\RegAsm.exe.log
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\Tmp8EB7.tmp
data
dropped
C:\Users\user\AppData\Local\Temp\Tmp8EC7.tmp
data
dropped
C:\Users\user\AppData\Roaming\Microsoft\Crypto\RSA\S-1-5-21-2246122658-3693405117-2476756634-1002\76b53b3ec448f7ccdda2063b15d2bfc3_9e146be9-c76a-4720-bcdb-53011b87bd06
data
dropped

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\file.exe
"C:\Users\user\Desktop\file.exe"
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1

URLs

Name
IP
Malicious
5.42.65.50:33080
malicious
http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-soap-message-security-1.0#Text
unknown
http://schemas.xmlsoap.org/ws/2005/02/sc/sct
unknown
https://duckduckgo.com/chrome_newtab
unknown
http://schemas.xmlsoap.org/ws/2004/04/security/sc/dk
unknown
https://duckduckgo.com/ac/?q=
unknown
http://tempuri.org/Entity/Id14ResponseD
unknown
http://tempuri.org/Entity/Id23ResponseD
unknown
http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-soap-message-security-1.0#HexBinary
unknown
http://tempuri.org/Entity/Id12Response
unknown
http://tempuri.org/
unknown
http://tempuri.org/Entity/Id2Response
unknown
http://schemas.xmlsoap.org/ws/2005/02/sc/dk/p_sha1
unknown
http://tempuri.org/Entity/Id21Response
unknown
http://schemas.xmlsoap.org/2005/02/trust/spnego#GSS_Wrap
unknown
http://tempuri.org/Entity/Id9
unknown
http://docs.oasis-open.org/wss/oasis-wss-saml-token-profile-1.1#SAMLID
unknown
http://tempuri.org/Entity/Id8
unknown
http://tempuri.org/Entity/Id6ResponseD
unknown
http://tempuri.org/Entity/Id5
unknown
http://tempuri.org/Entity/Id4
unknown
http://tempuri.org/Entity/Id7
unknown
http://tempuri.org/Entity/Id6
unknown
http://schemas.xmlsoap.org/ws/2005/02/trust#BinarySecret
unknown
http://tempuri.org/Entity/Id22Response2
unknown
http://tempuri.org/Entity/Id19Response
unknown
http://docs.oasis-open.org/wss/oasis-wss-rel-token-profile-1.0.pdf#license
unknown
http://schemas.xmlsoap.org/ws/2005/02/trust/RSTR/Issue
unknown
http://schemas.xmlsoap.org/ws/2004/10/wsat/Aborted
unknown
http://schemas.xmlsoap.org/ws/2005/02/rm/TerminateSequence
unknown
http://tempuri.org/Entity/Id13ResponseD
unknown
http://schemas.xmlsoap.org/ws/2004/10/wsat/fault
unknown
http://schemas.xmlsoap.org/ws/2004/10/wsat
unknown
http://docs.oasis-open.org/wss/oasis-wss-soap-message-security-1.1#EncryptedKey
unknown
http://tempuri.org/Entity/Id15Response
unknown
http://tempuri.org/Entity/Id5ResponseD
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
http://schemas.xmlsoap.org/ws/2005/02/trust/RSTR/SCT/Renew
unknown
http://schemas.xmlsoap.org/ws/2004/10/wscoor/Register
unknown
http://tempuri.org/Entity/Id6Response
unknown
http://schemas.xmlsoap.org/ws/2004/04/trust/SymmetricKey
unknown
https://api.ip.sb/ip
unknown
http://schemas.xmlsoap.org/ws/2004/04/sc
unknown
http://tempuri.org/Entity/Id1ResponseD
unknown
http://schemas.xmlsoap.org/ws/2004/10/wsat/Volatile2PC
unknown
http://schemas.xmlsoap.org/ws/2005/02/trust/RSTR/SCT/Cancel
unknown
http://tempuri.org/Entity/Id9Response
unknown
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
unknown
http://tempuri.org/Entity/Id20
unknown
http://tempuri.org/Entity/Id21
unknown
http://tempuri.org/Entity/Id22
unknown
http://docs.oasis-open.org/wss/oasis-wss-kerberos-token-profile-1.1#Kerberosv5APREQSHA1
unknown
http://tempuri.org/Entity/Id23
unknown
http://schemas.xmlsoap.org/ws/2004/04/security/trust/CK/PSHA1
unknown
http://tempuri.org/Entity/Id24
unknown
http://schemas.xmlsoap.org/ws/2004/04/security/trust/RSTR/Issue
unknown
http://tempuri.org/Entity/Id24Response
unknown
https://www.ecosia.org/newtab/
unknown
http://tempuri.org/Entity/Id1Response
unknown
http://schemas.xmlsoap.org/ws/2005/02/rm/AckRequested
unknown
http://schemas.xmlsoap.org/ws/2004/10/wsat/ReadOnly
unknown
http://schemas.xmlsoap.org/ws/2004/10/wsat/Replay
unknown
http://schemas.xmlsoap.org/ws/2005/02/trust/tlsnego
unknown
http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-soap-message-security-1.0#Base64Binary
unknown
http://schemas.xmlsoap.org/ws/2004/10/wsat/Durable2PC
unknown
http://schemas.xmlsoap.org/ws/2004/04/security/trust/SymmetricKey
unknown
http://tempuri.org/Entity/Id21ResponseD
unknown
http://schemas.xmlsoap.org/ws/2004/08/addressing
unknown
http://schemas.xmlsoap.org/ws/2005/02/trust/RST/Issue
unknown
http://schemas.xmlsoap.org/ws/2004/10/wsat/Completion
unknown
http://schemas.xmlsoap.org/ws/2004/04/trust
unknown
http://tempuri.org/Entity/Id10
unknown
http://tempuri.org/Entity/Id11
unknown
http://tempuri.org/Entity/Id10ResponseD
unknown
http://tempuri.org/Entity/Id12
unknown
http://tempuri.org/Entity/Id16Response
unknown
http://schemas.xmlsoap.org/ws/2004/10/wscoor/CreateCoordinationContextResponse
unknown
http://schemas.xmlsoap.org/ws/2005/02/trust/RST/SCT/Cancel
unknown
http://tempuri.org/Entity/Id13
unknown
http://tempuri.org/Entity/Id14
unknown
http://tempuri.org/Entity/Id15
unknown
http://tempuri.org/Entity/Id16
unknown
http://schemas.xmlsoap.org/ws/2005/02/trust/Nonce
unknown
http://tempuri.org/Entity/Id17
unknown
http://tempuri.org/Entity/Id18
unknown
http://tempuri.org/Entity/Id5Response
unknown
http://tempuri.org/Entity/Id19
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/dns
unknown
http://tempuri.org/Entity/Id15ResponseD
unknown
http://tempuri.org/Entity/Id10Response
unknown
http://schemas.xmlsoap.org/ws/2005/02/trust/Renew
unknown
http://tempuri.org/Entity/Id11ResponseD
unknown
http://tempuri.org/Entity/Id8Response
unknown
http://schemas.xmlsoap.org/ws/2004/04/trust/PublicKey
unknown
http://docs.oasis-open.org/wss/oasis-wss-saml-token-profile-1.1#SAMLV2.0
unknown
http://docs.oasis-open.org/wss/oasis-wss-saml-token-profile-1.0#SAMLAssertionID
unknown
http://schemas.xmlsoap.org/ws/2004/04/security/trust/RST/SCT
unknown
http://schemas.xmlsoap.org/ws/2006/02/addressingidentity
unknown
http://tempuri.org/Entity/Id17ResponseD
unknown
http://schemas.xmlsoap.org/soap/envelope/
unknown
There are 90 hidden URLs, click here to show them.

IPs

IP
Domain
Country
Malicious
5.42.65.50
unknown
Russian Federation
malicious

Registry

Path
Value
Malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\F1A578C4CB5DE79A370893983FD4DA8B67B2B064
Blob
malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
Owner
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
SessionHash
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
Sequence
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
RegFiles0000
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
RegFilesHash

Memdumps

Base Address
Regiontype
Protect
Malicious
2B99000
trusted library allocation
page read and write
malicious
101E000
unkown
page read and write
malicious
402000
remote allocation
page execute and read and write
malicious
307D000
trusted library allocation
page read and write
3EA3000
trusted library allocation
page read and write
52B0000
trusted library allocation
page read and write
CAE000
stack
page read and write
2CD1000
trusted library allocation
page read and write
6870000
trusted library allocation
page execute and read and write
E0A000
trusted library allocation
page execute and read and write
2C34000
trusted library allocation
page read and write
3D1F000
trusted library allocation
page read and write
3BFA000
trusted library allocation
page read and write
54AA000
heap
page read and write
3ECA000
trusted library allocation
page read and write
3BF4000
trusted library allocation
page read and write
6586000
trusted library allocation
page read and write
6538000
trusted library allocation
page read and write
65B0000
trusted library allocation
page read and write
73B7000
heap
page read and write
3B82000
trusted library allocation
page read and write
5220000
heap
page read and write
6640000
trusted library allocation
page read and write
7427000
heap
page read and write
F95000
heap
page read and write
2CC7000
trusted library allocation
page read and write
3C0D000
trusted library allocation
page read and write
6670000
trusted library allocation
page execute and read and write
2FA7000
trusted library allocation
page read and write
B0D000
stack
page read and write
3F99000
trusted library allocation
page read and write
748E000
heap
page read and write
3033000
trusted library allocation
page read and write
4FE0000
heap
page read and write
3E99000
trusted library allocation
page read and write
1014000
unkown
page readonly
F70000
trusted library allocation
page read and write
D9D000
heap
page read and write
3F23000
trusted library allocation
page read and write
54B7000
heap
page read and write
C40000
heap
page read and write
3D7F000
trusted library allocation
page read and write
7B3E000
stack
page read and write
7664000
trusted library allocation
page read and write
54BF000
heap
page read and write
4BEC000
stack
page read and write
3C20000
trusted library allocation
page read and write
6581000
trusted library allocation
page read and write
5CE3000
heap
page read and write
65C5000
trusted library allocation
page read and write
2F8D000
trusted library allocation
page read and write
E10000
trusted library allocation
page read and write
3C74000
trusted library allocation
page read and write
62BE000
stack
page read and write
7315000
trusted library allocation
page read and write
4F34000
trusted library allocation
page read and write
7418000
heap
page read and write
3C32000
trusted library allocation
page read and write
304F000
trusted library allocation
page read and write
FF0000
unkown
page readonly
3D8C000
trusted library allocation
page read and write
2F6F000
trusted library allocation
page read and write
2F72000
trusted library allocation
page read and write
65E0000
trusted library allocation
page read and write
DF0000
trusted library allocation
page read and write
7610000
trusted library allocation
page read and write
6440000
trusted library allocation
page execute and read and write
6850000
trusted library allocation
page execute and read and write
742D000
heap
page read and write
3EDC000
trusted library allocation
page read and write
3C86000
trusted library allocation
page read and write
52C0000
heap
page execute and read and write
2F7C000
trusted library allocation
page read and write
4FF0000
trusted library allocation
page read and write
12AE000
heap
page read and write
2E6A000
trusted library allocation
page read and write
6600000
trusted library allocation
page read and write
E00000
trusted library allocation
page read and write
6B0A000
trusted library allocation
page read and write
3ECF000
trusted library allocation
page read and write
DD0000
trusted library allocation
page read and write
5CE7000
heap
page read and write
283E000
stack
page read and write
69FE000
stack
page read and write
657B000
trusted library allocation
page read and write
5053000
heap
page read and write
2AEE000
stack
page read and write
3C6F000
trusted library allocation
page read and write
5218000
trusted library allocation
page read and write
65CB000
trusted library allocation
page read and write
7560000
trusted library allocation
page read and write
E15000
trusted library allocation
page execute and read and write
3D12000
trusted library allocation
page read and write
7A3E000
stack
page read and write
2EE2000
trusted library allocation
page read and write
72F0000
trusted library allocation
page read and write
839E000
stack
page read and write
F90000
heap
page read and write
12AA000
heap
page read and write
106A000
unkown
page execute and read and write
3B5A000
trusted library allocation
page read and write
731A000
trusted library allocation
page read and write
3EFD000
trusted library allocation
page read and write
4F75000
trusted library allocation
page read and write
12A0000
heap
page read and write
4FAE000
trusted library allocation
page read and write
55BE000
stack
page read and write
7350000
heap
page read and write
7399000
heap
page read and write
7B7E000
stack
page read and write
3EFA000
trusted library allocation
page read and write
DE4000
trusted library allocation
page read and write
2CCD000
trusted library allocation
page read and write
3EA6000
trusted library allocation
page read and write
3B15000
trusted library allocation
page read and write
2C9D000
trusted library allocation
page read and write
4F51000
trusted library allocation
page read and write
3B2D000
trusted library allocation
page read and write
30C4000
trusted library allocation
page read and write
6460000
trusted library allocation
page execute and read and write
3025000
trusted library allocation
page read and write
DE0000
trusted library allocation
page read and write
E40000
heap
page read and write
2FC0000
trusted library allocation
page read and write
66C0000
trusted library allocation
page execute and read and write
3C2D000
trusted library allocation
page read and write
3B22000
trusted library allocation
page read and write
1014000
unkown
page readonly
7450000
heap
page read and write
B40000
heap
page read and write
542B000
heap
page read and write
746C000
heap
page read and write
3CC8000
trusted library allocation
page read and write
4FF2000
trusted library allocation
page read and write
76BA000
trusted library allocation
page read and write
6547000
trusted library allocation
page read and write
653A000
trusted library allocation
page read and write
E70000
heap
page execute and read and write
FF1000
unkown
page execute read
6B6B000
stack
page read and write
72AE000
stack
page read and write
3EE1000
trusted library allocation
page read and write
5412000
heap
page read and write
7422000
heap
page read and write
3F10000
trusted library allocation
page read and write
7431000
heap
page read and write
3C92000
trusted library allocation
page read and write
159F000
stack
page read and write
3FC9000
trusted library allocation
page read and write
F9E000
heap
page read and write
3F75000
trusted library allocation
page read and write
6549000
trusted library allocation
page read and write
CB0000
heap
page read and write
2F76000
trusted library allocation
page read and write
7640000
trusted library allocation
page execute and read and write
3CA2000
trusted library allocation
page read and write
617E000
stack
page read and write
30CD000
trusted library allocation
page read and write
7340000
trusted library allocation
page read and write
2F99000
trusted library allocation
page read and write
E12000
trusted library allocation
page read and write
3C9F000
trusted library allocation
page read and write
730F000
trusted library allocation
page read and write
4F70000
trusted library allocation
page read and write
72F2000
trusted library allocation
page read and write
AF7000
stack
page read and write
3C02000
trusted library allocation
page read and write
2F4A000
trusted library allocation
page read and write
6B0D000
trusted library allocation
page read and write
65D0000
trusted library allocation
page read and write
6AFC000
stack
page read and write
3F93000
trusted library allocation
page read and write
3F58000
trusted library allocation
page read and write
3F35000
trusted library allocation
page read and write
6592000
trusted library allocation
page read and write
7491000
heap
page read and write
627E000
stack
page read and write
DED000
trusted library allocation
page execute and read and write
3C48000
trusted library allocation
page read and write
79FE000
stack
page read and write
3D51000
trusted library allocation
page read and write
2CC9000
trusted library allocation
page read and write
63BF000
stack
page read and write
3FAC000
trusted library allocation
page read and write
72F9000
trusted library allocation
page read and write
101E000
unkown
page write copy
E17000
trusted library allocation
page execute and read and write
760E000
stack
page read and write
CEF000
heap
page read and write
745A000
heap
page read and write
7DFE000
stack
page read and write
F8E000
trusted library allocation
page read and write
3CC3000
trusted library allocation
page read and write
3CAA000
trusted library allocation
page read and write
5EBF000
stack
page read and write
526E000
stack
page read and write
6B10000
trusted library allocation
page read and write
D55000
heap
page read and write
CBB000
heap
page read and write
3F29000
trusted library allocation
page read and write
3F3C000
trusted library allocation
page read and write
3CB5000
trusted library allocation
page read and write
3C81000
trusted library allocation
page read and write
11B0000
heap
page read and write
3FA0000
trusted library allocation
page read and write
73EE000
heap
page read and write
DFD000
trusted library allocation
page execute and read and write
6545000
trusted library allocation
page read and write
3F51000
trusted library allocation
page read and write
76AE000
stack
page read and write
E97000
heap
page read and write
D6B000
heap
page read and write
3CDA000
trusted library allocation
page read and write
73E3000
heap
page read and write
5480000
heap
page read and write
3C26000
trusted library allocation
page read and write
4F80000
trusted library allocation
page read and write
2948000
trusted library allocation
page read and write
54CE000
heap
page read and write
3D25000
trusted library allocation
page read and write
D4F000
heap
page read and write
3EF7000
trusted library allocation
page read and write
DE3000
trusted library allocation
page execute and read and write
3FB3000
trusted library allocation
page read and write
3EB1000
trusted library allocation
page read and write
E1B000
trusted library allocation
page execute and read and write
73A6000
heap
page read and write
6840000
trusted library allocation
page read and write
2CA3000
trusted library allocation
page read and write
72E0000
trusted library allocation
page read and write
53CF000
stack
page read and write
5050000
heap
page read and write
7480000
heap
page read and write
4FA0000
trusted library allocation
page read and write
5CBE000
stack
page read and write
3ED5000
trusted library allocation
page read and write
3D6A000
trusted library allocation
page read and write
4F5D000
trusted library allocation
page read and write
2FD8000
trusted library allocation
page read and write
3F3F000
trusted library allocation
page read and write
6B80000
trusted library allocation
page execute and read and write
7330000
trusted library allocation
page read and write
3C3E000
trusted library allocation
page read and write
51F0000
heap
page read and write
73FE000
heap
page read and write
3D3A000
trusted library allocation
page read and write
2FEC000
trusted library allocation
page read and write
659E000
trusted library allocation
page read and write
2CD7000
trusted library allocation
page read and write
E60000
trusted library allocation
page execute and read and write
6540000
trusted library allocation
page read and write
7382000
heap
page read and write
3D84000
trusted library allocation
page read and write
6820000
heap
page execute and read and write
3EA9000
trusted library allocation
page read and write
EFD000
stack
page read and write
6530000
trusted library allocation
page read and write
BFE000
stack
page read and write
54A0000
heap
page read and write
B60000
heap
page read and write
3CE4000
trusted library allocation
page read and write
2C57000
trusted library allocation
page read and write
3BF7000
trusted library allocation
page read and write
4F56000
trusted library allocation
page read and write
11AE000
stack
page read and write
3EE8000
trusted library allocation
page read and write
52AE000
stack
page read and write
B60000
heap
page read and write
2C24000
trusted library allocation
page read and write
55FE000
stack
page read and write
E90000
heap
page read and write
4F3B000
trusted library allocation
page read and write
2F9F000
trusted library allocation
page read and write
3EED000
trusted library allocation
page read and write
849E000
stack
page read and write
7710000
heap
page read and write
53D4000
heap
page read and write
730A000
trusted library allocation
page read and write
E02000
trusted library allocation
page read and write
F1E000
stack
page read and write
3D91000
trusted library allocation
page read and write
3CEF000
trusted library allocation
page read and write
303C000
trusted library allocation
page read and write
432000
remote allocation
page execute and read and write
2CF3000
trusted library allocation
page read and write
731F000
trusted library allocation
page read and write
75CD000
stack
page read and write
149F000
stack
page read and write
7630000
trusted library allocation
page execute and read and write
3F5D000
trusted library allocation
page read and write
3B1F000
trusted library allocation
page read and write
7620000
trusted library allocation
page execute and read and write
CF1000
heap
page read and write
3C4E000
trusted library allocation
page read and write
3BB3000
trusted library allocation
page read and write
301B000
trusted library allocation
page read and write
F5C000
stack
page read and write
2EDD000
trusted library allocation
page read and write
2F79000
trusted library allocation
page read and write
3F30000
trusted library allocation
page read and write
2ED5000
trusted library allocation
page read and write
66D0000
trusted library allocation
page execute and read and write
6660000
trusted library allocation
page execute and read and write
7EA000
stack
page read and write
6810000
trusted library allocation
page read and write
3D47000
trusted library allocation
page read and write
3FBE000
trusted library allocation
page read and write
3F05000
trusted library allocation
page read and write
743F000
heap
page read and write
67F0000
trusted library allocation
page read and write
72F5000
trusted library allocation
page read and write
7650000
trusted library allocation
page read and write
12BD000
heap
page read and write
2AF1000
trusted library allocation
page read and write
65CE000
trusted library allocation
page read and write
3C56000
trusted library allocation
page read and write
7433000
heap
page read and write
3D18000
trusted library allocation
page read and write
3D09000
trusted library allocation
page read and write
2F64000
trusted library allocation
page read and write
E30000
trusted library allocation
page read and write
30AC000
trusted library allocation
page read and write
3C1B000
trusted library allocation
page read and write
D9A000
heap
page read and write
6650000
trusted library allocation
page read and write
30B6000
trusted library allocation
page read and write
76B0000
trusted library allocation
page read and write
3C39000
trusted library allocation
page read and write
73BB000
heap
page read and write
65C0000
trusted library allocation
page read and write
557E000
stack
page read and write
437000
remote allocation
page execute and read and write
5000000
trusted library allocation
page execute and read and write
400000
remote allocation
page execute and read and write
3F8E000
trusted library allocation
page read and write
F60000
trusted library allocation
page read and write
739C000
heap
page read and write
3B12000
trusted library allocation
page read and write
FF0000
unkown
page readonly
5210000
trusted library allocation
page read and write
7338000
trusted library allocation
page read and write
B45000
heap
page read and write
F80000
trusted library allocation
page read and write
2FB2000
trusted library allocation
page read and write
3AFF000
trusted library allocation
page read and write
446000
remote allocation
page execute and read and write
6535000
trusted library allocation
page read and write
3B38000
trusted library allocation
page read and write
3EBC000
trusted library allocation
page read and write
4F4E000
trusted library allocation
page read and write
73F8000
heap
page read and write
53D0000
heap
page read and write
3B46000
trusted library allocation
page read and write
7660000
trusted library allocation
page read and write
7308000
trusted library allocation
page read and write
29E0000
heap
page read and write
65A1000
trusted library allocation
page read and write
2F9C000
trusted library allocation
page read and write
3FA5000
trusted library allocation
page read and write
2FC8000
trusted library allocation
page read and write
CE4000
heap
page read and write
3CFE000
trusted library allocation
page read and write
3C61000
trusted library allocation
page read and write
5428000
heap
page read and write
73D7000
heap
page read and write
7CFE000
stack
page read and write
106B000
unkown
page read and write
6B00000
trusted library allocation
page read and write
6570000
trusted library allocation
page read and write
EDE000
stack
page read and write
D57000
heap
page read and write
7BBF000
stack
page read and write
3AF1000
trusted library allocation
page read and write
2F67000
trusted library allocation
page read and write
7FBB0000
trusted library allocation
page execute and read and write
106D000
unkown
page readonly
3F45000
trusted library allocation
page read and write
3046000
trusted library allocation
page read and write
3F67000
trusted library allocation
page read and write
2CA7000
trusted library allocation
page read and write
2CD3000
trusted library allocation
page read and write
3F4C000
trusted library allocation
page read and write
3B25000
trusted library allocation
page read and write
5CD2000
heap
page read and write
6B70000
trusted library allocation
page read and write
3F6A000
trusted library allocation
page read and write
7324000
trusted library allocation
page read and write
6830000
trusted library allocation
page read and write
7393000
heap
page read and write
E06000
trusted library allocation
page execute and read and write
3C4B000
trusted library allocation
page read and write
3C7A000
trusted library allocation
page read and write
4F62000
trusted library allocation
page read and write
3C8D000
trusted library allocation
page read and write
747E000
heap
page read and write
7360000
heap
page read and write
B70000
heap
page read and write
3D75000
trusted library allocation
page read and write
3D5C000
trusted library allocation
page read and write
52C3000
heap
page execute and read and write
B80000
heap
page read and write
293E000
stack
page read and write
5600000
trusted library allocation
page read and write
106D000
unkown
page readonly
7BC0000
heap
page read and write
2F8F000
trusted library allocation
page read and write
69BC000
stack
page read and write
3F6D000
trusted library allocation
page read and write
3C9C000
trusted library allocation
page read and write
65F0000
trusted library allocation
page read and write
72E2000
trusted library allocation
page read and write
304A000
trusted library allocation
page read and write
7373000
heap
page read and write
736D000
heap
page read and write
FF1000
unkown
page execute read
6610000
trusted library allocation
page read and write
3F1E000
trusted library allocation
page read and write
4F30000
trusted library allocation
page read and write
3FAF000
trusted library allocation
page read and write
E80000
trusted library allocation
page read and write
6800000
trusted library allocation
page read and write
7320000
trusted library allocation
page read and write
3F80000
trusted library allocation
page read and write
68BC000
stack
page read and write
There are 414 hidden memdumps, click here to show them.