IOC Report
SecuriteInfo.com.Win32.PWSX-gen.25825.12964.exe

loading gif

Files

File Path
Type
Category
Malicious
SecuriteInfo.com.Win32.PWSX-gen.25825.12964.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Local\Temp\tmp32DE.tmp
XML 1.0 document, ASCII text
dropped
malicious
C:\Users\user\AppData\Roaming\PUwpftrjIH.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\PUwpftrjIH.exe.log
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\SecuriteInfo.com.Win32.PWSX-gen.25825.12964.exe.log
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
data
modified
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_1vearkbo.2wo.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_2d33oyta.of4.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_5bol5bhh.5mf.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_k3wtoiv3.ezk.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_kl2izffn.tea.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_psj3hk1b.s0t.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_rp0pvnzb.zgh.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_wvha4chu.ai3.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\tmp4201.tmp
XML 1.0 document, ASCII text
dropped
C:\Users\user\AppData\Roaming\PUwpftrjIH.exe:Zone.Identifier
ASCII text, with CRLF line terminators
dropped
There are 6 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.25825.12964.exe
"C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.25825.12964.exe"
malicious
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.25825.12964.exe"
malicious
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\PUwpftrjIH.exe"
malicious
C:\Windows\SysWOW64\schtasks.exe
"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\PUwpftrjIH" /XML "C:\Users\user\AppData\Local\Temp\tmp32DE.tmp"
malicious
C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.25825.12964.exe
"C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.25825.12964.exe"
malicious
C:\Users\user\AppData\Roaming\PUwpftrjIH.exe
C:\Users\user\AppData\Roaming\PUwpftrjIH.exe
malicious
C:\Windows\SysWOW64\schtasks.exe
"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\PUwpftrjIH" /XML "C:\Users\user\AppData\Local\Temp\tmp4201.tmp"
malicious
C:\Users\user\AppData\Roaming\PUwpftrjIH.exe
"C:\Users\user\AppData\Roaming\PUwpftrjIH.exe"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\wbem\WmiPrvSE.exe
C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
There are 3 hidden processes, click here to show them.

URLs

Name
IP
Malicious
https://api.ipify.org/
104.26.13.205
https://api.ipify.org
unknown
https://sectigo.com/CPS0
unknown
https://account.dyn.com/
unknown
https://api.ipify.org/t
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
http://ip-api.com/line/?fields=hosting
208.95.112.1
http://ip-api.com
unknown
http://mail.hoangtruongphat.com
unknown

Domains

Name
IP
Malicious
mail.hoangtruongphat.com
125.212.217.248
malicious
api.ipify.org
104.26.13.205
ip-api.com
208.95.112.1

IPs

IP
Domain
Country
Malicious
125.212.217.248
mail.hoangtruongphat.com
Viet Nam
malicious
208.95.112.1
ip-api.com
United States
104.26.13.205
api.ipify.org
United States

Registry

Path
Value
Malicious
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\SecuriteInfo_RASAPI32
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\SecuriteInfo_RASAPI32
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\SecuriteInfo_RASAPI32
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\SecuriteInfo_RASAPI32
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\SecuriteInfo_RASAPI32
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\SecuriteInfo_RASAPI32
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\SecuriteInfo_RASAPI32
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\SecuriteInfo_RASMANCS
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\SecuriteInfo_RASMANCS
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\SecuriteInfo_RASMANCS
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\SecuriteInfo_RASMANCS
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\SecuriteInfo_RASMANCS
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\SecuriteInfo_RASMANCS
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\SecuriteInfo_RASMANCS
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\PUwpftrjIH_RASAPI32
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\PUwpftrjIH_RASAPI32
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\PUwpftrjIH_RASAPI32
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\PUwpftrjIH_RASAPI32
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\PUwpftrjIH_RASAPI32
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\PUwpftrjIH_RASAPI32
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\PUwpftrjIH_RASAPI32
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\PUwpftrjIH_RASMANCS
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\PUwpftrjIH_RASMANCS
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\PUwpftrjIH_RASMANCS
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\PUwpftrjIH_RASMANCS
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\PUwpftrjIH_RASMANCS
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\PUwpftrjIH_RASMANCS
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\PUwpftrjIH_RASMANCS
FileDirectory
There are 19 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
2FBD000
trusted library allocation
page read and write
malicious
332C000
trusted library allocation
page read and write
malicious
3305000
trusted library allocation
page read and write
malicious
2F94000
trusted library allocation
page read and write
malicious
3E49000
trusted library allocation
page read and write
malicious
2FC5000
trusted library allocation
page read and write
malicious
436000
remote allocation
page execute and read and write
34AE000
stack
page read and write
6FA0000
trusted library allocation
page execute and read and write
1855000
trusted library allocation
page execute and read and write
CC0000
heap
page read and write
334B000
trusted library allocation
page read and write
14EA000
heap
page read and write
1256000
heap
page read and write
C26E000
stack
page read and write
3949000
trusted library allocation
page read and write
6B51000
heap
page read and write
C3AE000
stack
page read and write
4E2E000
trusted library allocation
page read and write
28F0000
heap
page read and write
1230000
trusted library allocation
page read and write
A9A000
heap
page read and write
14AB000
trusted library allocation
page read and write
3A39000
trusted library allocation
page read and write
14E0000
trusted library allocation
page read and write
32D0000
heap
page read and write
B93E000
stack
page read and write
C36E000
stack
page read and write
34EF000
stack
page read and write
19AC000
stack
page read and write
83E0000
trusted library allocation
page read and write
135F000
stack
page read and write
5754000
trusted library allocation
page read and write
27DC000
stack
page read and write
6D5D000
stack
page read and write
BD7E000
stack
page read and write
4821000
trusted library allocation
page read and write
118D000
trusted library allocation
page execute and read and write
F4A000
trusted library allocation
page execute and read and write
FF0000
trusted library allocation
page read and write
5510000
heap
page read and write
12BE000
heap
page read and write
6CEE000
stack
page read and write
1840000
trusted library allocation
page read and write
15C8000
heap
page read and write
2DE0000
heap
page read and write
83A000
stack
page read and write
119A000
trusted library allocation
page execute and read and write
55B1000
heap
page read and write
17BE000
unkown
page read and write
10AE000
heap
page read and write
F46000
trusted library allocation
page execute and read and write
A60000
heap
page read and write
713D000
trusted library allocation
page read and write
1830000
trusted library allocation
page read and write
5756000
trusted library allocation
page read and write
F57000
trusted library allocation
page execute and read and write
14DC000
stack
page read and write
4632000
trusted library allocation
page read and write
2BDF000
stack
page read and write
696D000
heap
page read and write
571B000
trusted library allocation
page read and write
6D60000
heap
page read and write
430C000
trusted library allocation
page read and write
3340000
trusted library allocation
page read and write
1506000
trusted library allocation
page read and write
5910000
heap
page read and write
2F2F000
stack
page read and write
2F6F000
trusted library allocation
page read and write
2FB7000
trusted library allocation
page read and write
2DB5000
trusted library allocation
page read and write
14E6000
trusted library allocation
page read and write
1870000
heap
page read and write
BFFE000
stack
page read and write
5010000
trusted library allocation
page read and write
5B1C000
stack
page read and write
C62C000
stack
page read and write
6D2E000
stack
page read and write
14C6000
trusted library allocation
page read and write
6F4E000
stack
page read and write
595B000
stack
page read and write
4E2B000
trusted library allocation
page read and write
28E0000
heap
page read and write
459C000
trusted library allocation
page read and write
83F0000
trusted library allocation
page execute and read and write
342E000
unkown
page read and write
2FE0000
heap
page read and write
18CE000
stack
page read and write
5285000
heap
page read and write
182D000
trusted library allocation
page execute and read and write
4E24000
trusted library allocation
page read and write
3E41000
trusted library allocation
page read and write
E70000
heap
page read and write
689E000
stack
page read and write
14E0000
heap
page read and write
4EE0000
trusted library allocation
page read and write
10C0000
heap
page read and write
47D3000
trusted library allocation
page read and write
F8E000
stack
page read and write
56E0000
heap
page read and write
6EB0000
trusted library allocation
page read and write
C4EE000
stack
page read and write
BFFE000
stack
page read and write
5690000
heap
page execute and read and write
A90000
heap
page read and write
14C1000
trusted library allocation
page read and write
844E000
stack
page read and write
8780000
trusted library section
page read and write
C0FE000
stack
page read and write
42C9000
trusted library allocation
page read and write
C37E000
stack
page read and write
2A4F000
unkown
page read and write
6EA000
stack
page read and write
434000
remote allocation
page execute and read and write
FFA000
stack
page read and write
1214000
trusted library allocation
page read and write
6EE0000
trusted library allocation
page read and write
150E000
stack
page read and write
F3D000
trusted library allocation
page execute and read and write
309C000
trusted library allocation
page read and write
55F5000
heap
page read and write
2E38000
heap
page read and write
7133000
trusted library allocation
page read and write
7250000
trusted library allocation
page read and write
1212000
trusted library allocation
page read and write
10B2000
heap
page read and write
19F0000
heap
page read and write
2E20000
heap
page execute and read and write
46C7000
trusted library allocation
page read and write
346F000
unkown
page read and write
1810000
trusted library allocation
page read and write
8011000
trusted library allocation
page read and write
4948000
trusted library allocation
page read and write
6D93000
trusted library allocation
page read and write
E20000
heap
page read and write
E0E000
stack
page read and write
F23000
trusted library allocation
page execute and read and write
4E41000
trusted library allocation
page read and write
7350000
trusted library allocation
page execute and read and write
438000
remote allocation
page execute and read and write
4F38000
trusted library allocation
page read and write
2BEF000
trusted library allocation
page read and write
FFD000
trusted library allocation
page execute and read and write
19B0000
heap
page execute and read and write
1633000
heap
page read and write
6D84000
trusted library allocation
page read and write
57FE000
stack
page read and write
7270000
trusted library allocation
page execute and read and write
2DDF000
stack
page read and write
1850000
trusted library allocation
page read and write
6F50000
heap
page read and write
100E000
heap
page read and write
5410000
heap
page read and write
56DC000
stack
page read and write
6EBE000
stack
page read and write
1190000
trusted library allocation
page read and write
C27D000
stack
page read and write
36C0000
heap
page read and write
27E6000
trusted library allocation
page read and write
6DBE000
stack
page read and write
5470000
heap
page read and write
3941000
trusted library allocation
page read and write
13DB000
stack
page read and write
495A000
trusted library allocation
page read and write
7300000
heap
page read and write
2F7D000
trusted library allocation
page read and write
2800000
trusted library allocation
page read and write
53C3000
heap
page read and write
6B4A000
heap
page read and write
53F0000
trusted library allocation
page read and write
6D9E000
trusted library allocation
page read and write
6D6E000
stack
page read and write
F78000
stack
page read and write
5210000
heap
page read and write
6B67000
heap
page read and write
BEBE000
stack
page read and write
2FB9000
trusted library allocation
page read and write
571E000
trusted library allocation
page read and write
4E20000
trusted library allocation
page read and write
2805000
trusted library allocation
page read and write
145E000
stack
page read and write
B00000
heap
page read and write
573D000
trusted library allocation
page read and write
8400000
trusted library allocation
page execute and read and write
10D0000
heap
page read and write
800E000
stack
page read and write
19F7000
heap
page read and write
7F990000
trusted library allocation
page execute and read and write
1649000
heap
page read and write
1220000
heap
page read and write
1490000
trusted library allocation
page read and write
279E000
stack
page read and write
1210000
trusted library allocation
page read and write
572E000
trusted library allocation
page read and write
18D8000
trusted library allocation
page read and write
1360000
heap
page read and write
39C0000
trusted library allocation
page read and write
BCFE000
stack
page read and write
67CE000
stack
page read and write
68CD000
stack
page read and write
53C0000
heap
page read and write
679D000
stack
page read and write
32F0000
heap
page read and write
27FF000
trusted library allocation
page read and write
6DFE000
stack
page read and write
15F3000
heap
page read and write
F2D000
trusted library allocation
page execute and read and write
139E000
stack
page read and write
6916000
heap
page read and write
6BEE000
stack
page read and write
BE7F000
stack
page read and write
7360000
heap
page read and write
1823000
trusted library allocation
page execute and read and write
1028000
heap
page read and write
A9E000
heap
page read and write
F20000
trusted library allocation
page read and write
1254000
heap
page read and write
11E0000
heap
page read and write
422000
remote allocation
page execute and read and write
1445000
heap
page read and write
4E46000
trusted library allocation
page read and write
5731000
trusted library allocation
page read and write
1820000
trusted library allocation
page read and write
6F0D000
stack
page read and write
DCE000
stack
page read and write
2DF0000
trusted library allocation
page read and write
150D000
trusted library allocation
page read and write
44FB000
trusted library allocation
page read and write
7140000
trusted library allocation
page read and write
3F59000
trusted library allocation
page read and write
120A000
trusted library allocation
page execute and read and write
11FE000
stack
page read and write
3A85000
trusted library allocation
page read and write
5700000
trusted library allocation
page read and write
6D70000
trusted library allocation
page read and write
51F0000
trusted library allocation
page read and write
1200000
trusted library allocation
page read and write
19C0000
trusted library allocation
page execute and read and write
6B3C000
heap
page read and write
57DC000
stack
page read and write
1250000
heap
page read and write
1228000
heap
page read and write
1440000
heap
page read and write
F0E000
stack
page read and write
1240000
trusted library allocation
page execute and read and write
5523000
heap
page read and write
15F6000
heap
page read and write
27F0000
trusted library allocation
page read and write
719E000
stack
page read and write
1877000
heap
page read and write
1000000
heap
page read and write
71A0000
heap
page read and write
FB0000
heap
page read and write
3328000
trusted library allocation
page read and write
6C5E000
stack
page read and write
5040000
trusted library allocation
page read and write
5272000
heap
page read and write
1170000
trusted library allocation
page read and write
2930000
heap
page read and write
5570000
heap
page read and write
531E000
stack
page read and write
F5B000
trusted library allocation
page execute and read and write
32F7000
heap
page read and write
11A2000
trusted library allocation
page read and write
FE4000
trusted library allocation
page read and write
6F60000
trusted library allocation
page read and write
423000
remote allocation
page execute and read and write
2938000
heap
page read and write
B02000
heap
page read and write
2DC0000
trusted library allocation
page read and write
1160000
trusted library allocation
page read and write
7F060000
trusted library allocation
page execute and read and write
2D8E000
stack
page read and write
1192000
trusted library allocation
page read and write
72F0000
heap
page read and write
124A000
heap
page read and write
13E0000
heap
page execute and read and write
19E0000
heap
page read and write
6B30000
heap
page read and write
148E000
stack
page read and write
14BE000
trusted library allocation
page read and write
5266000
heap
page read and write
5736000
trusted library allocation
page read and write
32D5000
trusted library allocation
page read and write
5FD000
stack
page read and write
5773000
heap
page read and write
5716000
trusted library allocation
page read and write
55E5000
heap
page read and write
C13C000
stack
page read and write
12F9000
stack
page read and write
14AE000
trusted library allocation
page read and write
27E4000
trusted library allocation
page read and write
2B9C000
trusted library allocation
page read and write
2B50000
heap
page read and write
5710000
trusted library allocation
page read and write
E7A000
stack
page read and write
7124000
trusted library allocation
page read and write
8472000
trusted library allocation
page read and write
5790000
trusted library allocation
page read and write
6DA0000
trusted library allocation
page read and write
4E70000
heap
page read and write
400000
remote allocation
page execute and read and write
475D000
trusted library allocation
page read and write
FE0000
heap
page read and write
165D000
heap
page read and write
5A1C000
stack
page read and write
445A000
trusted library allocation
page read and write
32F1000
trusted library allocation
page read and write
6E00000
heap
page read and write
402000
remote allocation
page execute and read and write
2F71000
trusted library allocation
page read and write
4370000
trusted library allocation
page read and write
2E30000
heap
page read and write
68F0000
heap
page read and write
6EE6000
trusted library allocation
page read and write
1846000
trusted library allocation
page execute and read and write
11D0000
trusted library allocation
page execute and read and write
699E000
heap
page read and write
5970000
trusted library allocation
page read and write
7310000
trusted library allocation
page read and write
2920000
trusted library allocation
page read and write
F33000
trusted library allocation
page read and write
BD00000
heap
page read and write
83AE000
stack
page read and write
534E000
stack
page read and write
184A000
trusted library allocation
page execute and read and write
E30000
heap
page read and write
32A1000
trusted library allocation
page read and write
ABA000
stack
page read and write
11A7000
trusted library allocation
page execute and read and write
4ED0000
trusted library allocation
page execute and read and write
4E52000
trusted library allocation
page read and write
2F31000
trusted library allocation
page read and write
8470000
trusted library allocation
page read and write
10C0000
heap
page read and write
183D000
trusted library allocation
page execute and read and write
6BE3000
heap
page read and write
FED000
trusted library allocation
page execute and read and write
141E000
stack
page read and write
68D0000
heap
page read and write
1530000
heap
page read and write
5760000
trusted library allocation
page read and write
1537000
heap
page read and write
C9E000
stack
page read and write
B8FE000
stack
page read and write
F40000
trusted library allocation
page read and write
FD0000
trusted library allocation
page read and write
6997000
heap
page read and write
30EF000
trusted library allocation
page read and write
1590000
heap
page read and write
1842000
trusted library allocation
page read and write
2A50000
heap
page read and write
717E000
stack
page read and write
1042000
heap
page read and write
7120000
trusted library allocation
page read and write
BFBE000
stack
page read and write
F52000
trusted library allocation
page read and write
32ED000
trusted library allocation
page read and write
1196000
trusted library allocation
page execute and read and write
576E000
stack
page read and write
329E000
stack
page read and write
A50000
heap
page read and write
4E3E000
trusted library allocation
page read and write
5960000
trusted library allocation
page read and write
539D000
stack
page read and write
C5EE000
stack
page read and write
FE0000
trusted library allocation
page read and write
14EB000
trusted library allocation
page read and write
4EC0000
heap
page read and write
11AB000
trusted library allocation
page execute and read and write
1173000
trusted library allocation
page execute and read and write
2810000
heap
page execute and read and write
6EEB000
trusted library allocation
page read and write
435000
remote allocation
page execute and read and write
58FF000
stack
page read and write
2DAF000
trusted library allocation
page read and write
2F66000
trusted library allocation
page read and write
2FDD000
trusted library allocation
page read and write
14FA000
trusted library allocation
page read and write
53CC000
stack
page read and write
5750000
trusted library allocation
page read and write
185B000
trusted library allocation
page execute and read and write
5200000
heap
page read and write
69D0000
trusted library allocation
page read and write
11A0000
trusted library allocation
page read and write
1501000
trusted library allocation
page read and write
2941000
trusted library allocation
page read and write
14F2000
trusted library allocation
page read and write
572A000
trusted library allocation
page read and write
F24000
trusted library allocation
page read and write
2E20000
heap
page execute and read and write
1174000
trusted library allocation
page read and write
4E50000
trusted library allocation
page read and write
14EE000
trusted library allocation
page read and write
4870000
trusted library allocation
page read and write
C23C000
stack
page read and write
FCE000
stack
page read and write
2F81000
trusted library allocation
page read and write
57A0000
trusted library allocation
page execute and read and write
5780000
trusted library section
page read and write
4E80000
trusted library allocation
page read and write
291F000
stack
page read and write
BBEE000
stack
page read and write
BEFE000
stack
page read and write
14FE000
trusted library allocation
page read and write
50CE000
stack
page read and write
15E9000
heap
page read and write
5380000
heap
page read and write
BAEE000
stack
page read and write
3F9D000
trusted library allocation
page read and write
7117000
trusted library allocation
page read and write
2DA0000
trusted library allocation
page read and write
960000
unkown
page readonly
14CE000
stack
page read and write
C4AE000
stack
page read and write
5742000
trusted library allocation
page read and write
7150000
trusted library allocation
page execute and read and write
52B0000
trusted library allocation
page read and write
19D0000
trusted library allocation
page read and write
1852000
trusted library allocation
page read and write
C72C000
stack
page read and write
5050000
trusted library allocation
page execute and read and write
27E0000
trusted library allocation
page read and write
117D000
trusted library allocation
page execute and read and write
5060000
heap
page execute and read and write
2E41000
trusted library allocation
page read and write
4E4D000
trusted library allocation
page read and write
6D77000
trusted library allocation
page read and write
6B24000
heap
page read and write
FF3000
trusted library allocation
page read and write
57A0000
heap
page read and write
F90000
heap
page read and write
80B0000
trusted library allocation
page read and write
168E000
heap
page read and write
5290000
heap
page read and write
BD3E000
stack
page read and write
14D2000
trusted library allocation
page read and write
83D0000
trusted library allocation
page read and write
1880000
trusted library allocation
page read and write
6D80000
trusted library allocation
page read and write
10C7000
heap
page read and write
12F1000
heap
page read and write
6B94000
heap
page read and write
6ED0000
trusted library allocation
page execute and read and write
2FD0000
heap
page read and write
4ADC000
stack
page read and write
11A5000
trusted library allocation
page execute and read and write
15C0000
heap
page read and write
2C00000
heap
page read and write
1210000
trusted library allocation
page read and write
751E000
stack
page read and write
121B000
trusted library allocation
page execute and read and write
1180000
trusted library allocation
page read and write
2A5A000
heap
page read and write
6A1E000
stack
page read and write
3984000
trusted library allocation
page read and write
1200000
trusted library allocation
page read and write
149E000
stack
page read and write
1857000
trusted library allocation
page execute and read and write
F30000
trusted library allocation
page read and write
A70000
heap
page read and write
2F2D000
stack
page read and write
6B26000
heap
page read and write
1824000
trusted library allocation
page read and write
B3F000
heap
page read and write
14CD000
trusted library allocation
page read and write
640D000
stack
page read and write
2DB0000
trusted library allocation
page read and write
4F3C000
stack
page read and write
6B6D000
stack
page read and write
2D90000
trusted library allocation
page read and write
F93000
heap
page read and write
3A3F000
trusted library allocation
page read and write
32DF000
trusted library allocation
page read and write
11C0000
trusted library allocation
page read and write
650E000
stack
page read and write
5A7E000
stack
page read and write
5B7E000
stack
page read and write
55A9000
heap
page read and write
FE3000
trusted library allocation
page execute and read and write
110E000
stack
page read and write
F10000
trusted library allocation
page read and write
6F8E000
stack
page read and write
6BAF000
stack
page read and write
39FE000
trusted library allocation
page read and write
962000
unkown
page readonly
2FD0000
trusted library allocation
page read and write
2F6A000
stack
page read and write
2A0E000
unkown
page read and write
5780000
heap
page execute and read and write
403000
remote allocation
page execute and read and write
4FEE000
stack
page read and write
332A000
trusted library allocation
page read and write
11F0000
trusted library allocation
page read and write
6B1F000
stack
page read and write
1125000
heap
page read and write
42A1000
trusted library allocation
page read and write
AC4000
heap
page read and write
13F8000
trusted library allocation
page read and write
1120000
heap
page read and write
3F31000
trusted library allocation
page read and write
5722000
trusted library allocation
page read and write
FA0000
trusted library allocation
page read and write
14A4000
trusted library allocation
page read and write
55CF000
heap
page read and write
6B20000
heap
page read and write
6DB0000
trusted library allocation
page execute and read and write
7110000
trusted library allocation
page read and write
5770000
heap
page read and write
5230000
heap
page read and write
7F2A0000
trusted library allocation
page execute and read and write
6965000
heap
page read and write
C0FE000
stack
page read and write
1206000
trusted library allocation
page execute and read and write
FB9000
heap
page read and write
C1F0000
heap
page read and write
7280000
trusted library allocation
page read and write
1520000
trusted library allocation
page read and write
433000
remote allocation
page execute and read and write
14A0000
trusted library allocation
page read and write
AD2000
heap
page read and write
6D70000
trusted library allocation
page read and write
57B0000
trusted library section
page read and write
43E000
remote allocation
page execute and read and write
BB7000
stack
page read and write
437000
remote allocation
page execute and read and write
1217000
trusted library allocation
page execute and read and write
5520000
heap
page read and write
2B9E000
stack
page read and write
708E000
stack
page read and write
1110000
heap
page read and write
6BEA000
heap
page read and write
F70000
trusted library allocation
page read and write
52A0000
trusted library allocation
page execute and read and write
7F700000
trusted library allocation
page execute and read and write
53D0000
trusted library section
page read and write
2FBB000
trusted library allocation
page read and write
F80000
trusted library allocation
page execute and read and write
7E7000
stack
page read and write
There are 529 hidden memdumps, click here to show them.