IOC Report
build.exe

loading gif

Files

File Path
Type
Category
Malicious
build.exe
PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\build.exe.log
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\tmp3203.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\tmp3213.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\tmp3224.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\tmp3225.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\tmp3236.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\tmp3246.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\tmp3257.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\tmp3268.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\tmp3269.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\tmp67E1.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\tmp6801.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 25, cookie 0xe, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\tmp6802.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 25, cookie 0xe, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\tmp6813.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 25, cookie 0xe, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\tmp6814.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 25, cookie 0xe, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\tmp6825.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 25, cookie 0xe, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\tmp6826.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 25, cookie 0xe, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\tmp6836.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 7, database pages 89, cookie 0x36, schema 4, UTF-8, version-valid-for 7
dropped
C:\Users\user\AppData\Local\Temp\tmp6847.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 7, database pages 89, cookie 0x36, schema 4, UTF-8, version-valid-for 7
dropped
C:\Users\user\AppData\Local\Temp\tmp6857.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 7, database pages 89, cookie 0x36, schema 4, UTF-8, version-valid-for 7
dropped
C:\Users\user\AppData\Local\Temp\tmp8E12.tmp
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\tmp8E13.tmp
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\tmp8E23.tmp
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\tmp8E24.tmp
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\tmp8E25.tmp
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\tmp8E26.tmp
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\tmp9D53.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 7, database pages 89, cookie 0x36, schema 4, UTF-8, version-valid-for 7
dropped
C:\Users\user\AppData\Local\Temp\tmp9D64.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 7, database pages 89, cookie 0x36, schema 4, UTF-8, version-valid-for 7
dropped
C:\Users\user\AppData\Local\Temp\tmp9D65.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 7, database pages 89, cookie 0x36, schema 4, UTF-8, version-valid-for 7
dropped
C:\Users\user\AppData\Local\Temp\tmp9D85.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 7, database pages 89, cookie 0x36, schema 4, UTF-8, version-valid-for 7
dropped
C:\Users\user\AppData\Local\Temp\tmp9D95.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 7, database pages 89, cookie 0x36, schema 4, UTF-8, version-valid-for 7
dropped
C:\Users\user\AppData\Local\Temp\tmp9DA6.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 7, database pages 89, cookie 0x36, schema 4, UTF-8, version-valid-for 7
dropped
C:\Users\user\AppData\Local\Temp\tmp9DB7.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 7, database pages 89, cookie 0x36, schema 4, UTF-8, version-valid-for 7
dropped
C:\Users\user\AppData\Local\Temp\tmp9DC7.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 7, database pages 89, cookie 0x36, schema 4, UTF-8, version-valid-for 7
dropped
C:\Users\user\AppData\Local\Temp\tmp9DD8.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 7, database pages 89, cookie 0x36, schema 4, UTF-8, version-valid-for 7
dropped
C:\Users\user\AppData\Local\Temp\tmpC506.tmp
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\tmpC507.tmp
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\tmpD256.tmp
SQLite 3.x database, user version 12, last written using SQLite version 3042000, page size 32768, writer version 2, read version 2, file counter 3, database pages 3, cookie 0x1, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\tmpD267.tmp
SQLite 3.x database, user version 12, last written using SQLite version 3042000, page size 32768, writer version 2, read version 2, file counter 3, database pages 3, cookie 0x1, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\tmpFBC8.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\tmpFBD8.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\tmpFBE9.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\tmpFBFA.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\tmpFBFB.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\tmpFC0B.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\tmpFC0C.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\tmpFC1D.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
There are 38 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\build.exe
"C:\Users\user\Desktop\build.exe"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1

URLs

Name
IP
Malicious
91.92.252.220:1337
malicious
http://91.92.252.220:1337/
91.92.252.220
malicious
https://ipinfo.io/ip%appdata%
unknown
https://duckduckgo.com/chrome_newtab
unknown
https://duckduckgo.com/ac/?q=
unknown
http://ns.adob/1.0/
unknown
https://www.google.com/images/branding/product/ico/googleg_lodp.ico
unknown
http://schemas.xmlsoap.org/ws/2004/08/addressing/role/anonymous
unknown
http://tempuri.org/Endpoint/CheckConnectResponse
unknown
http://schemas.datacontract.org/2004/07/
unknown
http://schemas.xmlsoap.org/ws/2004/08/addressing/faultX
unknown
http://tempuri.org/Endpoint/EnvironmentSettings
unknown
https://api.ip.sb/geoip%USERPEnvironmentROFILE%
unknown
http://ns.adobe.0/xmp
unknown
https://api.ip.sb
unknown
http://schemas.xmlsoap.org/soap/envelope/
unknown
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
unknown
http://tempuri.org/
unknown
http://tempuri.org/Endpoint/CheckConnect
unknown
https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
unknown
https://www.ecosia.org/newtab/
unknown
http://tempuri.org/Endpoint/VerifyUpdateResponse
unknown
http://tempuri.org/Endpoint/SetEnvironment
unknown
http://tempuri.org/Endpoint/SetEnvironmentResponse
unknown
http://tempuri.org/Endpoint/SetEnvironment.0HE
unknown
http://tempuri.org/Endpoint/GetUpdates
unknown
https://ac.ecosia.org/autocomplete?q=
unknown
https://api.ipify.orgcookies//settinString.Removeg
unknown
http://schemas.xmlsoap.org/ws/2004/08/addressing
unknown
http://tempuri.org/Endpoint/GetUpdatesResponse
unknown
https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
unknown
http://91.92.252.220:1337t-
unknown
http://tempuri.org/Endpoint/EnvironmentSettingsResponse
unknown
http://tempuri.org/Endpoint/VerifyUpdate
unknown
http://91.92.252.220:1337
unknown
http://tempuri.org/0
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
unknown
http://schemas.xmlsoap.org/soap/actor/next
unknown
There are 29 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
api.ip.sb
unknown
malicious

IPs

IP
Domain
Country
Malicious
91.92.252.220
unknown
Bulgaria
malicious

Registry

Path
Value
Malicious
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\build_RASAPI32
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\build_RASAPI32
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\build_RASAPI32
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\build_RASAPI32
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\build_RASAPI32
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\build_RASAPI32
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\build_RASAPI32
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\build_RASMANCS
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\build_RASMANCS
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\build_RASMANCS
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\build_RASMANCS
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\build_RASMANCS
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\build_RASMANCS
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\build_RASMANCS
FileDirectory
There are 5 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
2E91000
trusted library allocation
page read and write
malicious
B82000
unkown
page readonly
malicious
6EEFF000
unkown
page readonly
6773000
heap
page read and write
712F000
stack
page read and write
6A50000
trusted library allocation
page read and write
7AD9000
heap
page read and write
7FDD0000
trusted library allocation
page execute and read and write
6AA0000
trusted library allocation
page read and write
6A5F000
trusted library allocation
page read and write
5810000
trusted library allocation
page read and write
3098000
trusted library allocation
page read and write
561E000
stack
page read and write
6A78000
trusted library allocation
page read and write
13A0000
trusted library allocation
page read and write
30CA000
trusted library allocation
page read and write
13F0000
trusted library allocation
page read and write
3058000
trusted library allocation
page read and write
1417000
heap
page read and write
673B000
heap
page read and write
1376000
trusted library allocation
page execute and read and write
334E000
trusted library allocation
page read and write
4141000
trusted library allocation
page read and write
5950000
trusted library allocation
page execute and read and write
6EEFD000
unkown
page read and write
58A0000
trusted library allocation
page read and write
67B0000
trusted library allocation
page execute and read and write
1134000
trusted library allocation
page read and write
3F70000
trusted library allocation
page read and write
7870000
heap
page read and write
3366000
trusted library allocation
page read and write
4033000
trusted library allocation
page read and write
5820000
trusted library allocation
page execute and read and write
2E14000
trusted library allocation
page read and write
6955000
trusted library allocation
page read and write
3F86000
trusted library allocation
page read and write
6A82000
trusted library allocation
page read and write
71B0000
trusted library allocation
page read and write
7AAF000
heap
page read and write
1370000
trusted library allocation
page read and write
2EC3000
trusted library allocation
page read and write
3FBC000
trusted library allocation
page read and write
594D000
stack
page read and write
152E000
heap
page read and write
1030000
heap
page read and write
328E000
trusted library allocation
page read and write
6A20000
trusted library allocation
page read and write
103E000
heap
page read and write
2E30000
heap
page read and write
136D000
trusted library allocation
page execute and read and write
1071000
heap
page read and write
6783000
heap
page read and write
659E000
stack
page read and write
2FA8000
trusted library allocation
page read and write
FEE000
stack
page read and write
7AC0000
heap
page read and write
2F98000
trusted library allocation
page read and write
6919000
trusted library allocation
page read and write
693A000
trusted library allocation
page read and write
7A90000
heap
page read and write
7885000
heap
page read and write
6A40000
trusted library allocation
page read and write
3E41000
trusted library allocation
page read and write
69CE000
stack
page read and write
2E20000
trusted library allocation
page read and write
5791000
trusted library allocation
page read and write
7150000
trusted library allocation
page read and write
4F1C000
stack
page read and write
4E48000
trusted library allocation
page read and write
6A30000
trusted library allocation
page read and write
1400000
trusted library allocation
page read and write
67A2000
trusted library allocation
page read and write
3FF7000
trusted library allocation
page read and write
6A85000
trusted library allocation
page read and write
1520000
heap
page read and write
3FE7000
trusted library allocation
page read and write
690E000
stack
page read and write
2E10000
trusted library allocation
page read and write
53DE000
stack
page read and write
70EE000
stack
page read and write
7B02000
heap
page read and write
5880000
trusted library allocation
page read and write
3F53000
trusted library allocation
page read and write
6A5C000
trusted library allocation
page read and write
6758000
heap
page read and write
58C0000
trusted library allocation
page execute and read and write
6F60000
heap
page read and write
7810000
heap
page read and write
5870000
trusted library allocation
page read and write
576B000
trusted library allocation
page read and write
3026000
trusted library allocation
page read and write
F90000
heap
page read and write
5A6B000
trusted library allocation
page read and write
7850000
trusted library allocation
page execute and read and write
3F81000
trusted library allocation
page read and write
5776000
trusted library allocation
page read and write
5360000
trusted library allocation
page read and write
6E0B000
stack
page read and write
5D3E000
stack
page read and write
308F000
trusted library allocation
page read and write
422A000
trusted library allocation
page read and write
1528000
heap
page read and write
7880000
heap
page read and write
840E000
stack
page read and write
675D000
heap
page read and write
589D000
trusted library allocation
page read and write
138B000
trusted library allocation
page execute and read and write
7830000
trusted library allocation
page read and write
2D0E000
stack
page read and write
3403000
trusted library allocation
page read and write
67FE000
stack
page read and write
71D0000
trusted library allocation
page read and write
6A54000
trusted library allocation
page read and write
677C000
heap
page read and write
3E4E000
trusted library allocation
page read and write
FA0000
heap
page read and write
6935000
trusted library allocation
page read and write
3F8F000
trusted library allocation
page read and write
1056000
heap
page read and write
3F99000
trusted library allocation
page read and write
3F77000
trusted library allocation
page read and write
71C0000
trusted library allocation
page read and write
692A000
trusted library allocation
page read and write
6729000
heap
page read and write
5A5E000
stack
page read and write
7170000
trusted library allocation
page execute and read and write
3FD2000
trusted library allocation
page read and write
7130000
heap
page read and write
7142000
trusted library allocation
page read and write
330F000
trusted library allocation
page read and write
106E000
heap
page read and write
5371000
trusted library allocation
page read and write
6A71000
trusted library allocation
page read and write
6EEE1000
unkown
page execute read
6A0F000
stack
page read and write
551E000
stack
page read and write
3F8C000
trusted library allocation
page read and write
3F44000
trusted library allocation
page read and write
10A5000
heap
page read and write
7AEA000
heap
page read and write
E3B000
stack
page read and write
6912000
trusted library allocation
page read and write
2E1A000
trusted library allocation
page read and write
5771000
trusted library allocation
page read and write
1372000
trusted library allocation
page read and write
1020000
trusted library allocation
page read and write
13B0000
trusted library allocation
page execute and read and write
7AF9000
heap
page read and write
3E52000
trusted library allocation
page read and write
6723000
heap
page read and write
3232000
trusted library allocation
page read and write
7160000
trusted library allocation
page read and write
693F000
trusted library allocation
page read and write
79A0000
heap
page read and write
5390000
heap
page execute and read and write
10DA000
heap
page read and write
1140000
heap
page read and write
3FC3000
trusted library allocation
page read and write
2FE6000
trusted library allocation
page read and write
565E000
stack
page read and write
2EBA000
trusted library allocation
page read and write
7ADF000
heap
page read and write
1130000
trusted library allocation
page read and write
71A0000
trusted library allocation
page execute and read and write
2FB2000
trusted library allocation
page read and write
57B0000
trusted library allocation
page read and write
1382000
trusted library allocation
page read and write
6928000
trusted library allocation
page read and write
1133000
trusted library allocation
page execute and read and write
589A000
trusted library allocation
page read and write
66A8000
heap
page read and write
6EEE0000
unkown
page readonly
5760000
trusted library allocation
page read and write
3F7D000
trusted library allocation
page read and write
7A98000
heap
page read and write
6960000
trusted library allocation
page read and write
5782000
trusted library allocation
page read and write
5D60000
trusted library allocation
page read and write
6A68000
trusted library allocation
page read and write
1360000
trusted library allocation
page read and write
8510000
heap
page read and write
7820000
trusted library allocation
page execute and read and write
6F10000
trusted library allocation
page read and write
6AB0000
trusted library allocation
page execute and read and write
5A6E000
trusted library allocation
page read and write
6910000
trusted library allocation
page read and write
4201000
trusted library allocation
page read and write
2F92000
trusted library allocation
page read and write
B80000
unkown
page readonly
7140000
trusted library allocation
page read and write
3F94000
trusted library allocation
page read and write
7B24000
heap
page read and write
7990000
heap
page read and write
113D000
trusted library allocation
page execute and read and write
679C000
heap
page read and write
6A76000
trusted library allocation
page read and write
6940000
trusted library allocation
page read and write
6944000
trusted library allocation
page read and write
4224000
trusted library allocation
page read and write
780E000
stack
page read and write
6A7D000
trusted library allocation
page read and write
3FC6000
trusted library allocation
page read and write
850E000
stack
page read and write
33C5000
trusted library allocation
page read and write
82CE000
stack
page read and write
3F4F000
trusted library allocation
page read and write
6952000
trusted library allocation
page read and write
1410000
heap
page read and write
31B3000
trusted library allocation
page read and write
301D000
trusted library allocation
page read and write
6A64000
trusted library allocation
page read and write
2ED0000
trusted library allocation
page read and write
6F0E000
stack
page read and write
1145000
heap
page read and write
1064000
heap
page read and write
13C0000
heap
page read and write
33E1000
trusted library allocation
page read and write
2E41000
trusted library allocation
page read and write
1385000
trusted library allocation
page execute and read and write
5A60000
trusted library allocation
page read and write
3FCF000
trusted library allocation
page read and write
6A6E000
trusted library allocation
page read and write
6792000
heap
page read and write
2F9C000
trusted library allocation
page read and write
338E000
trusted library allocation
page read and write
5800000
trusted library allocation
page read and write
3F46000
trusted library allocation
page read and write
3F8A000
trusted library allocation
page read and write
7B30000
heap
page read and write
6767000
heap
page read and write
421D000
trusted library allocation
page read and write
3F49000
trusted library allocation
page read and write
7980000
trusted library allocation
page execute and read and write
6A56000
trusted library allocation
page read and write
649F000
stack
page read and write
57A0000
trusted library allocation
page read and write
6A26000
trusted library allocation
page read and write
3FD4000
trusted library allocation
page read and write
83CF000
stack
page read and write
2ED4000
trusted library allocation
page read and write
57F0000
trusted library allocation
page execute and read and write
31D5000
trusted library allocation
page read and write
501D000
stack
page read and write
7B0F000
heap
page read and write
54DE000
stack
page read and write
6A90000
trusted library allocation
page read and write
57C0000
trusted library allocation
page read and write
6A52000
trusted library allocation
page read and write
66E2000
heap
page read and write
6EEF6000
unkown
page readonly
2E0F000
stack
page read and write
3FCC000
trusted library allocation
page read and write
6915000
trusted library allocation
page read and write
3101000
trusted library allocation
page read and write
13E0000
heap
page execute and read and write
3358000
trusted library allocation
page read and write
33CE000
trusted library allocation
page read and write
33DB000
trusted library allocation
page read and write
675B000
heap
page read and write
1387000
trusted library allocation
page execute and read and write
58B0000
trusted library allocation
page read and write
3FB6000
trusted library allocation
page read and write
8520000
trusted library allocation
page execute and read and write
7B3B000
heap
page read and write
5CFD000
stack
page read and write
131E000
stack
page read and write
578E000
trusted library allocation
page read and write
336C000
trusted library allocation
page read and write
135E000
stack
page read and write
4218000
trusted library allocation
page read and write
575E000
stack
page read and write
7AA8000
heap
page read and write
590E000
stack
page read and write
66A0000
heap
page read and write
7860000
trusted library allocation
page read and write
3FDA000
trusted library allocation
page read and write
436D000
trusted library allocation
page read and write
40FF000
trusted library allocation
page read and write
6744000
heap
page read and write
67A0000
trusted library allocation
page read and write
669E000
stack
page read and write
1380000
trusted library allocation
page read and write
6800000
trusted library allocation
page execute and read and write
7CB0000
trusted library allocation
page read and write
70AE000
stack
page read and write
3138000
trusted library allocation
page read and write
7AAC000
heap
page read and write
6950000
trusted library allocation
page read and write
F37000
stack
page read and write
692F000
trusted library allocation
page read and write
151E000
stack
page read and write
7B1A000
heap
page read and write
There are 282 hidden memdumps, click here to show them.