IOC Report
file.exe

loading gif

Files

File Path
Type
Category
Malicious
file.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_file.exe_6d3b4d56c06fb8741b78b289cb3fee72d597ad_79d846d8_aa5aeb45-8592-43d1-9e07-5f4a14f9e4c5\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER480A.tmp.dmp
Mini DuMP crash report, 14 streams, Wed Apr 24 14:02:58 2024, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER4953.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER49A2.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\Users\Public\Desktop\Google Chrome.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Description string, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:41 2023, mtime=Thu Oct 5 07:36:24 2023, atime=Wed Sep 27 04:28:27 2023, length=3242272, window=hide
dropped
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\RegAsm.exe.log
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\Tmp4943.tmp
data
dropped
C:\Users\user\AppData\Local\Temp\Tmp4973.tmp
data
dropped
C:\Users\user\AppData\Roaming\Microsoft\Crypto\RSA\S-1-5-21-2246122658-3693405117-2476756634-1003\76b53b3ec448f7ccdda2063b15d2bfc3_9e146be9-c76a-4720-bcdb-53011b87bd06
data
dropped
C:\Windows\appcompat\Programs\Amcache.hve
MS Windows registry file, NT/2000 or above
dropped

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\file.exe
"C:\Users\user\Desktop\file.exe"
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
malicious
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 7364 -s 340

URLs

Name
IP
Malicious
http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-soap-message-security-1.0#Text
unknown
http://schemas.xmlsoap.org/ws/2005/02/sc/sct
unknown
https://duckduckgo.com/chrome_newtab
unknown
http://schemas.xmlsoap.org/ws/2004/04/security/sc/dk
unknown
https://duckduckgo.com/ac/?q=
unknown
http://tempuri.org/Entity/Id14ResponseD
unknown
http://tempuri.org/Entity/Id23ResponseD
unknown
http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-soap-message-security-1.0#HexBinary
unknown
http://tempuri.org/Entity/Id12Response
unknown
http://tempuri.org/
unknown
http://tempuri.org/Entity/Id2Response
unknown
http://schemas.xmlsoap.org/ws/2005/02/sc/dk/p_sha1
unknown
http://tempuri.org/Entity/Id21Response
unknown
http://schemas.xmlsoap.org/2005/02/trust/spnego#GSS_Wrap
unknown
http://tempuri.org/Entity/Id9
unknown
http://docs.oasis-open.org/wss/oasis-wss-saml-token-profile-1.1#SAMLID
unknown
http://tempuri.org/Entity/Id8
unknown
http://tempuri.org/Entity/Id6ResponseD
unknown
http://tempuri.org/Entity/Id5
unknown
http://schemas.xmlsoap.org/ws/2004/10/wsat/Prepare
unknown
http://tempuri.org/Entity/Id4
unknown
http://tempuri.org/Entity/Id7
unknown
http://tempuri.org/Entity/Id6
unknown
http://schemas.xmlsoap.org/ws/2005/02/trust#BinarySecret
unknown
http://tempuri.org/Entity/Id19Response
unknown
http://ns.exif/1
unknown
http://docs.oasis-open.org/wss/oasis-wss-rel-token-profile-1.0.pdf#license
unknown
http://schemas.xmlsoap.org/ws/2005/02/trust/RSTR/Issue
unknown
http://schemas.xmlsoap.org/ws/2004/10/wsat/Aborted
unknown
http://schemas.xmlsoap.org/ws/2005/02/rm/TerminateSequence
unknown
http://tempuri.org/Entity/Id13ResponseD
unknown
http://schemas.xmlsoap.org/ws/2004/10/wsat/fault
unknown
http://schemas.xmlsoap.org/ws/2004/10/wsat
unknown
http://docs.oasis-open.org/wss/oasis-wss-soap-message-security-1.1#EncryptedKey
unknown
http://tempuri.org/Entity/Id15Response
unknown
http://tempuri.org/Entity/Id5ResponseD
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
http://schemas.xmlsoap.org/ws/2005/02/trust/RSTR/SCT/Renew
unknown
http://schemas.xmlsoap.org/ws/2004/08/addressing/faultp9
unknown
http://schemas.xmlsoap.org/ws/2004/10/wscoor/Register
unknown
http://tempuri.org/Entity/Id6Response
unknown
http://schemas.xmlsoap.org/ws/2004/04/trust/SymmetricKey
unknown
https://api.ip.sb/ip
unknown
http://schemas.xmlsoap.org/ws/2004/04/sc
unknown
http://tempuri.org/Entity/Id1ResponseD
unknown
http://schemas.xmlsoap.org/ws/2004/10/wsat/Volatile2PC
unknown
http://schemas.xmlsoap.org/ws/2005/02/trust/RSTR/SCT/Cancel
unknown
http://tempuri.org/Entity/Id9Response
unknown
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
unknown
http://tempuri.org/Entity/Id20
unknown
http://tempuri.org/Entity/Id21
unknown
http://tempuri.org/Entity/Id22
unknown
http://docs.oasis-open.org/wss/oasis-wss-kerberos-token-profile-1.1#Kerberosv5APREQSHA1
unknown
http://tempuri.org/Entity/Id23
unknown
http://schemas.xmlsoap.org/ws/2004/04/security/trust/CK/PSHA1
unknown
http://tempuri.org/Entity/Id24
unknown
http://schemas.xmlsoap.org/ws/2004/04/security/trust/RSTR/Issue
unknown
http://tempuri.org/Entity/Id24Response
unknown
https://www.ecosia.org/newtab/
unknown
http://tempuri.org/Entity/Id1Response
unknown
http://schemas.xmlsoap.org/ws/2005/02/rm/AckRequested
unknown
http://schemas.xmlsoap.org/ws/2004/10/wsat/ReadOnly
unknown
http://schemas.xmlsoap.org/ws/2004/10/wsat/Replay
unknown
http://schemas.xmlsoap.org/ws/2005/02/trust/tlsnego
unknown
http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-soap-message-security-1.0#Base64Binary
unknown
http://schemas.xmlsoap.org/ws/2004/10/wsat/Durable2PC
unknown
http://schemas.xmlsoap.org/ws/2004/04/security/trust/SymmetricKey
unknown
http://tempuri.org/Entity/Id21ResponseD
unknown
http://ns.adp/1.0/X8
unknown
http://schemas.xmlsoap.org/ws/2004/08/addressing
unknown
http://schemas.xmlsoap.org/ws/2005/02/trust/RST/Issue
unknown
http://schemas.xmlsoap.org/ws/2004/10/wsat/Completion
unknown
http://schemas.xmlsoap.org/ws/2004/04/trust
unknown
http://tempuri.org/Entity/Id10
unknown
http://tempuri.org/Entity/Id11
unknown
http://tempuri.org/Entity/Id10ResponseD
unknown
http://tempuri.org/Entity/Id12
unknown
http://tempuri.org/Entity/Id16Response
unknown
http://schemas.xmlsoap.org/ws/2004/10/wscoor/CreateCoordinationContextResponse
unknown
http://schemas.xmlsoap.org/ws/2005/02/trust/RST/SCT/Cancel
unknown
http://tempuri.org/Entity/Id13
unknown
http://tempuri.org/Entity/Id14
unknown
http://tempuri.org/Entity/Id15
unknown
http://tempuri.org/Entity/Id16
unknown
http://schemas.xmlsoap.org/ws/2005/02/trust/Nonce
unknown
http://tempuri.org/Entity/Id17
unknown
http://tempuri.org/Entity/Id18
unknown
http://tempuri.org/Entity/Id5Response
unknown
http://tempuri.org/Entity/Id19
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/dns
unknown
http://tempuri.org/Entity/Id15ResponseD
unknown
http://tempuri.org/Entity/Id10Response
unknown
http://schemas.xmlsoap.org/ws/2005/02/trust/Renew
unknown
http://tempuri.org/Entity/Id11ResponseD
unknown
http://tempuri.org/Entity/Id8Response
unknown
http://schemas.xmlsoap.org/ws/2004/04/trust/PublicKey
unknown
http://docs.oasis-open.org/wss/oasis-wss-saml-token-profile-1.1#SAMLV2.0
unknown
http://docs.oasis-open.org/wss/oasis-wss-saml-token-profile-1.0#SAMLAssertionID
unknown
http://schemas.xmlsoap.org/ws/2004/04/security/trust/RST/SCT
unknown
http://schemas.xmlsoap.org/ws/2006/02/addressingidentity
unknown
There are 90 hidden URLs, click here to show them.

IPs

IP
Domain
Country
Malicious
5.42.65.96
unknown
Russian Federation
malicious

Registry

Path
Value
Malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\F1A578C4CB5DE79A370893983FD4DA8B67B2B064
Blob
malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
Owner
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
SessionHash
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
Sequence
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
RegFiles0000
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
RegFilesHash
\REGISTRY\A\{211949ad-0083-c0cd-4595-b20befddef98}\Root\InventoryApplicationFile\file.exe|43858f5a1c9fa22
ProgramId
\REGISTRY\A\{211949ad-0083-c0cd-4595-b20befddef98}\Root\InventoryApplicationFile\file.exe|43858f5a1c9fa22
FileId
\REGISTRY\A\{211949ad-0083-c0cd-4595-b20befddef98}\Root\InventoryApplicationFile\file.exe|43858f5a1c9fa22
LowerCaseLongPath
\REGISTRY\A\{211949ad-0083-c0cd-4595-b20befddef98}\Root\InventoryApplicationFile\file.exe|43858f5a1c9fa22
LongPathHash
\REGISTRY\A\{211949ad-0083-c0cd-4595-b20befddef98}\Root\InventoryApplicationFile\file.exe|43858f5a1c9fa22
Name
\REGISTRY\A\{211949ad-0083-c0cd-4595-b20befddef98}\Root\InventoryApplicationFile\file.exe|43858f5a1c9fa22
OriginalFileName
\REGISTRY\A\{211949ad-0083-c0cd-4595-b20befddef98}\Root\InventoryApplicationFile\file.exe|43858f5a1c9fa22
Publisher
\REGISTRY\A\{211949ad-0083-c0cd-4595-b20befddef98}\Root\InventoryApplicationFile\file.exe|43858f5a1c9fa22
Version
\REGISTRY\A\{211949ad-0083-c0cd-4595-b20befddef98}\Root\InventoryApplicationFile\file.exe|43858f5a1c9fa22
BinFileVersion
\REGISTRY\A\{211949ad-0083-c0cd-4595-b20befddef98}\Root\InventoryApplicationFile\file.exe|43858f5a1c9fa22
BinaryType
\REGISTRY\A\{211949ad-0083-c0cd-4595-b20befddef98}\Root\InventoryApplicationFile\file.exe|43858f5a1c9fa22
ProductName
\REGISTRY\A\{211949ad-0083-c0cd-4595-b20befddef98}\Root\InventoryApplicationFile\file.exe|43858f5a1c9fa22
ProductVersion
\REGISTRY\A\{211949ad-0083-c0cd-4595-b20befddef98}\Root\InventoryApplicationFile\file.exe|43858f5a1c9fa22
LinkDate
\REGISTRY\A\{211949ad-0083-c0cd-4595-b20befddef98}\Root\InventoryApplicationFile\file.exe|43858f5a1c9fa22
BinProductVersion
\REGISTRY\A\{211949ad-0083-c0cd-4595-b20befddef98}\Root\InventoryApplicationFile\file.exe|43858f5a1c9fa22
AppxPackageFullName
\REGISTRY\A\{211949ad-0083-c0cd-4595-b20befddef98}\Root\InventoryApplicationFile\file.exe|43858f5a1c9fa22
AppxPackageRelativeId
\REGISTRY\A\{211949ad-0083-c0cd-4595-b20befddef98}\Root\InventoryApplicationFile\file.exe|43858f5a1c9fa22
Size
\REGISTRY\A\{211949ad-0083-c0cd-4595-b20befddef98}\Root\InventoryApplicationFile\file.exe|43858f5a1c9fa22
Language
\REGISTRY\A\{211949ad-0083-c0cd-4595-b20befddef98}\Root\InventoryApplicationFile\file.exe|43858f5a1c9fa22
Usn
There are 15 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
402000
remote allocation
page execute and read and write
malicious
2F21000
trusted library allocation
page read and write
malicious
BBB000
unkown
page read and write
malicious
2FC8000
trusted library allocation
page read and write
malicious
33C1000
trusted library allocation
page read and write
789B000
heap
page read and write
4471000
trusted library allocation
page read and write
42D9000
trusted library allocation
page read and write
414A000
trusted library allocation
page read and write
C1D000
unkown
page readonly
2E94000
trusted library allocation
page read and write
7839000
heap
page read and write
4414000
trusted library allocation
page read and write
11E0000
trusted library allocation
page read and write
128E000
stack
page read and write
6E8C000
stack
page read and write
81E000
heap
page read and write
7BCA000
trusted library allocation
page read and write
41E8000
trusted library allocation
page read and write
6D10000
trusted library allocation
page read and write
5A1E000
stack
page read and write
57EF000
heap
page read and write
3300000
trusted library allocation
page read and write
53D2000
trusted library allocation
page read and write
432E000
trusted library allocation
page read and write
40CE000
trusted library allocation
page read and write
3333000
trusted library allocation
page read and write
30C8000
trusted library allocation
page read and write
668E000
stack
page read and write
4423000
trusted library allocation
page read and write
55EE000
stack
page read and write
331A000
trusted library allocation
page read and write
7795000
heap
page read and write
4278000
trusted library allocation
page read and write
7FA50000
trusted library allocation
page execute and read and write
3349000
trusted library allocation
page read and write
339A000
trusted library allocation
page read and write
42A9000
trusted library allocation
page read and write
7800000
heap
page read and write
6037000
heap
page read and write
5A20000
trusted library allocation
page read and write
7B70000
trusted library allocation
page execute and read and write
501C000
stack
page read and write
446000
remote allocation
page execute and read and write
4323000
trusted library allocation
page read and write
40ED000
trusted library allocation
page read and write
4129000
trusted library allocation
page read and write
2EF0000
trusted library allocation
page read and write
5A30000
trusted library allocation
page read and write
6AC0000
trusted library allocation
page read and write
3152000
trusted library allocation
page read and write
BFE000
unkown
page read and write
414F000
trusted library allocation
page read and write
778A000
heap
page read and write
F30000
heap
page read and write
6CC0000
trusted library allocation
page read and write
7841000
heap
page read and write
35EF000
trusted library allocation
page read and write
40D4000
trusted library allocation
page read and write
750000
heap
page read and write
11F3000
trusted library allocation
page execute and read and write
6A0A000
trusted library allocation
page read and write
43DA000
trusted library allocation
page read and write
678E000
stack
page read and write
4299000
trusted library allocation
page read and write
6D8C000
stack
page read and write
4338000
trusted library allocation
page read and write
777C000
stack
page read and write
4358000
trusted library allocation
page read and write
2EBD000
trusted library allocation
page read and write
6FD000
stack
page read and write
7871000
heap
page read and write
43EB000
trusted library allocation
page read and write
431E000
trusted library allocation
page read and write
77E6000
heap
page read and write
5856000
heap
page read and write
4288000
trusted library allocation
page read and write
6AE0000
trusted library allocation
page read and write
6CE0000
trusted library allocation
page read and write
11F4000
trusted library allocation
page read and write
40BA000
trusted library allocation
page read and write
6B40000
trusted library allocation
page execute and read and write
F65000
heap
page read and write
7B80000
trusted library allocation
page read and write
42FF000
trusted library allocation
page read and write
7BD4000
trusted library allocation
page read and write
30C1000
trusted library allocation
page read and write
6CD0000
trusted library allocation
page read and write
4164000
trusted library allocation
page read and write
6B90000
trusted library allocation
page execute and read and write
43CF000
trusted library allocation
page read and write
41A9000
trusted library allocation
page read and write
4146000
trusted library allocation
page read and write
435D000
trusted library allocation
page read and write
4119000
trusted library allocation
page read and write
F20000
heap
page read and write
C16000
unkown
page write copy
AF1000
unkown
page execute read
43A2000
trusted library allocation
page read and write
40B6000
trusted library allocation
page read and write
4306000
trusted library allocation
page read and write
5817000
heap
page read and write
624E000
stack
page read and write
434F000
trusted library allocation
page read and write
C1D000
unkown
page readonly
11F0000
trusted library allocation
page read and write
1222000
trusted library allocation
page read and write
5680000
heap
page read and write
41DF000
trusted library allocation
page read and write
32E1000
trusted library allocation
page read and write
6A6E000
trusted library allocation
page read and write
41E5000
trusted library allocation
page read and write
6A15000
trusted library allocation
page read and write
44D6000
trusted library allocation
page read and write
F39000
heap
page read and write
3095000
trusted library allocation
page read and write
330D000
trusted library allocation
page read and write
40A3000
trusted library allocation
page read and write
7BBA000
trusted library allocation
page read and write
30E9000
trusted library allocation
page read and write
43C8000
trusted library allocation
page read and write
7050000
trusted library allocation
page execute and read and write
D2F000
stack
page read and write
2E90000
trusted library allocation
page read and write
79CA000
trusted library allocation
page read and write
44C9000
trusted library allocation
page read and write
F72000
heap
page read and write
6CF0000
heap
page execute and read and write
41EE000
trusted library allocation
page read and write
7A5B000
stack
page read and write
79CC000
trusted library allocation
page read and write
810000
heap
page read and write
424D000
trusted library allocation
page read and write
418A000
trusted library allocation
page read and write
6A00000
trusted library allocation
page read and write
7BE0000
trusted library allocation
page read and write
34B3000
trusted library allocation
page read and write
40C3000
trusted library allocation
page read and write
7010000
trusted library allocation
page execute and read and write
6900000
heap
page read and write
6A51000
trusted library allocation
page read and write
6A9E000
trusted library allocation
page read and write
3F21000
trusted library allocation
page read and write
2E80000
trusted library allocation
page read and write
7BA9000
trusted library allocation
page read and write
6D20000
trusted library allocation
page execute and read and write
7B90000
heap
page read and write
2EB1000
trusted library allocation
page read and write
6B20000
trusted library allocation
page read and write
6A95000
trusted library allocation
page read and write
11FD000
trusted library allocation
page execute and read and write
41D6000
trusted library allocation
page read and write
BBB000
unkown
page write copy
3492000
trusted library allocation
page read and write
81A000
heap
page read and write
5690000
heap
page read and write
6A19000
trusted library allocation
page read and write
422A000
trusted library allocation
page read and write
7BA0000
trusted library allocation
page read and write
3089000
trusted library allocation
page read and write
43AE000
trusted library allocation
page read and write
3537000
trusted library allocation
page read and write
77E0000
heap
page read and write
AFF000
unkown
page execute read
3087000
trusted library allocation
page read and write
327A000
trusted library allocation
page read and write
7831000
heap
page read and write
3489000
trusted library allocation
page read and write
4273000
trusted library allocation
page read and write
13B0000
trusted library allocation
page read and write
4292000
trusted library allocation
page read and write
54A3000
heap
page read and write
5393000
heap
page execute and read and write
6A4B000
trusted library allocation
page read and write
417D000
trusted library allocation
page read and write
5390000
heap
page execute and read and write
3EC000
stack
page read and write
6A62000
trusted library allocation
page read and write
6033000
heap
page read and write
4113000
trusted library allocation
page read and write
41C9000
trusted library allocation
page read and write
2E5C000
stack
page read and write
41B9000
trusted library allocation
page read and write
40B0000
trusted library allocation
page read and write
AFB000
unkown
page execute read
5892000
heap
page read and write
6BA0000
trusted library allocation
page execute and read and write
5370000
trusted library allocation
page read and write
4407000
trusted library allocation
page read and write
BA0000
unkown
page execute read
32AA000
trusted library allocation
page read and write
3F5C000
trusted library allocation
page read and write
42BD000
trusted library allocation
page read and write
425A000
trusted library allocation
page read and write
447B000
trusted library allocation
page read and write
429F000
trusted library allocation
page read and write
664E000
stack
page read and write
13C0000
heap
page read and write
122B000
trusted library allocation
page execute and read and write
620F000
stack
page read and write
31C9000
trusted library allocation
page read and write
53E0000
trusted library allocation
page execute and read and write
440D000
trusted library allocation
page read and write
41AE000
trusted library allocation
page read and write
1240000
trusted library allocation
page read and write
442B000
trusted library allocation
page read and write
6A17000
trusted library allocation
page read and write
5A22000
trusted library allocation
page read and write
6A9B000
trusted library allocation
page read and write
437000
remote allocation
page execute and read and write
3FA2000
trusted library allocation
page read and write
7CF0000
trusted library allocation
page read and write
7C00000
trusted library allocation
page read and write
10F5000
heap
page read and write
40C8000
trusted library allocation
page read and write
7829000
heap
page read and write
33B1000
trusted library allocation
page read and write
4158000
trusted library allocation
page read and write
4400000
trusted library allocation
page read and write
2EF5000
trusted library allocation
page read and write
588F000
heap
page read and write
4367000
trusted library allocation
page read and write
3321000
trusted library allocation
page read and write
4202000
trusted library allocation
page read and write
6B10000
trusted library allocation
page read and write
3556000
trusted library allocation
page read and write
2EB6000
trusted library allocation
page read and write
3F5A000
trusted library allocation
page read and write
2F10000
heap
page execute and read and write
13AE000
stack
page read and write
42C2000
trusted library allocation
page read and write
33CD000
trusted library allocation
page read and write
77C5000
heap
page read and write
2EAE000
trusted library allocation
page read and write
31B1000
trusted library allocation
page read and write
410C000
trusted library allocation
page read and write
781C000
heap
page read and write
7780000
heap
page read and write
81FE000
stack
page read and write
7D60000
trusted library allocation
page read and write
FDA000
heap
page read and write
1227000
trusted library allocation
page execute and read and write
30B6000
trusted library allocation
page read and write
ADF000
stack
page read and write
59DE000
stack
page read and write
5896000
heap
page read and write
4191000
trusted library allocation
page read and write
2EE0000
trusted library allocation
page read and write
44C6000
trusted library allocation
page read and write
7BE8000
trusted library allocation
page read and write
43BB000
trusted library allocation
page read and write
432000
remote allocation
page execute and read and write
77B9000
heap
page read and write
FFC000
heap
page read and write
341B000
trusted library allocation
page read and write
7020000
trusted library allocation
page read and write
C1B000
unkown
page readonly
7851000
heap
page read and write
57B4000
heap
page read and write
4490000
trusted library allocation
page read and write
3416000
trusted library allocation
page read and write
7CEE000
stack
page read and write
7BC5000
trusted library allocation
page read and write
7B5E000
stack
page read and write
6A10000
trusted library allocation
page read and write
740000
heap
page read and write
788F000
heap
page read and write
4421000
trusted library allocation
page read and write
6A71000
trusted library allocation
page read and write
2C6E000
stack
page read and write
446A000
trusted library allocation
page read and write
3338000
trusted library allocation
page read and write
121A000
trusted library allocation
page execute and read and write
31AE000
trusted library allocation
page read and write
BA0000
unkown
page execute read
4101000
trusted library allocation
page read and write
3354000
trusted library allocation
page read and write
4363000
trusted library allocation
page read and write
32F4000
trusted library allocation
page read and write
3545000
trusted library allocation
page read and write
7BB8000
trusted library allocation
page read and write
7CFB000
trusted library allocation
page read and write
FEC000
heap
page read and write
7808000
heap
page read and write
12AE000
heap
page read and write
2EEE000
trusted library allocation
page read and write
3F2F000
trusted library allocation
page read and write
32EA000
trusted library allocation
page read and write
10DE000
stack
page read and write
41E3000
trusted library allocation
page read and write
4458000
trusted library allocation
page read and write
3F63000
trusted library allocation
page read and write
6D00000
trusted library allocation
page read and write
7C6D000
stack
page read and write
80E000
stack
page read and write
6B30000
trusted library allocation
page execute and read and write
30AF000
trusted library allocation
page read and write
3379000
trusted library allocation
page read and write
6D40000
trusted library allocation
page execute and read and write
3F42000
trusted library allocation
page read and write
58DE000
stack
page read and write
5A50000
trusted library allocation
page read and write
5A40000
trusted library allocation
page read and write
120D000
trusted library allocation
page execute and read and write
40C5000
trusted library allocation
page read and write
42B2000
trusted library allocation
page read and write
53D0000
trusted library allocation
page read and write
7CAE000
stack
page read and write
7BCF000
trusted library allocation
page read and write
2EC2000
trusted library allocation
page read and write
6A40000
trusted library allocation
page read and write
433E000
trusted library allocation
page read and write
1220000
trusted library allocation
page read and write
AF0000
unkown
page readonly
31F5000
trusted library allocation
page read and write
6810000
trusted library allocation
page execute and read and write
2D70000
heap
page read and write
42B7000
trusted library allocation
page read and write
3386000
trusted library allocation
page read and write
4155000
trusted library allocation
page read and write
77EC000
heap
page read and write
82FE000
stack
page read and write
44C3000
trusted library allocation
page read and write
31DA000
trusted library allocation
page read and write
33A5000
trusted library allocation
page read and write
42E5000
trusted library allocation
page read and write
7BF0000
trusted library allocation
page read and write
77A6000
heap
page read and write
10F0000
heap
page read and write
6021000
heap
page read and write
2ED0000
trusted library allocation
page read and write
78C0000
heap
page read and write
30CD000
trusted library allocation
page read and write
325E000
trusted library allocation
page read and write
6ECE000
stack
page read and write
419C000
trusted library allocation
page read and write
7027000
trusted library allocation
page read and write
44BD000
trusted library allocation
page read and write
6A05000
trusted library allocation
page read and write
443E000
trusted library allocation
page read and write
81BE000
stack
page read and write
42B5000
trusted library allocation
page read and write
79C0000
trusted library allocation
page read and write
813E000
stack
page read and write
30D2000
trusted library allocation
page read and write
1030000
heap
page read and write
344E000
trusted library allocation
page read and write
2E60000
heap
page read and write
42A6000
trusted library allocation
page read and write
1016000
heap
page read and write
332C000
trusted library allocation
page read and write
30A2000
trusted library allocation
page read and write
EF7000
stack
page read and write
BB9000
stack
page read and write
4153000
trusted library allocation
page read and write
579F000
stack
page read and write
4133000
trusted library allocation
page read and write
44BA000
trusted library allocation
page read and write
42F2000
trusted library allocation
page read and write
33B6000
trusted library allocation
page read and write
C07000
unkown
page execute and read and write
41A3000
trusted library allocation
page read and write
444B000
trusted library allocation
page read and write
44AD000
trusted library allocation
page read and write
78B8000
heap
page read and write
7D5E000
stack
page read and write
333D000
trusted library allocation
page read and write
4318000
trusted library allocation
page read and write
4426000
trusted library allocation
page read and write
582F000
heap
page read and write
6A08000
trusted library allocation
page read and write
31BE000
trusted library allocation
page read and write
3026000
trusted library allocation
page read and write
40E0000
trusted library allocation
page read and write
3393000
trusted library allocation
page read and write
628E000
stack
page read and write
7BA5000
trusted library allocation
page read and write
44B3000
trusted library allocation
page read and write
54A0000
heap
page read and write
79A0000
trusted library allocation
page read and write
4389000
trusted library allocation
page read and write
42AF000
trusted library allocation
page read and write
41DA000
trusted library allocation
page read and write
4432000
trusted library allocation
page read and write
4139000
trusted library allocation
page read and write
43E6000
trusted library allocation
page read and write
6FCE000
stack
page read and write
7B60000
trusted library allocation
page read and write
C1B000
unkown
page readonly
4418000
trusted library allocation
page read and write
441D000
trusted library allocation
page read and write
803E000
stack
page read and write
4476000
trusted library allocation
page read and write
5880000
heap
page read and write
585A000
heap
page read and write
31D0000
trusted library allocation
page read and write
12A4000
heap
page read and write
6AA0000
trusted library allocation
page read and write
537E000
trusted library allocation
page read and write
400000
remote allocation
page execute and read and write
31EA000
trusted library allocation
page read and write
312F000
trusted library allocation
page read and write
319F000
trusted library allocation
page read and write
1200000
trusted library allocation
page read and write
41D0000
trusted library allocation
page read and write
4487000
trusted library allocation
page read and write
319C000
trusted library allocation
page read and write
700E000
stack
page read and write
7BD0000
trusted library allocation
page read and write
7BBF000
trusted library allocation
page read and write
7D10000
trusted library allocation
page execute and read and write
BA7000
unkown
page readonly
41C3000
trusted library allocation
page read and write
31D5000
trusted library allocation
page read and write
AF1000
unkown
page execute read
40A9000
trusted library allocation
page read and write
57A0000
heap
page read and write
1290000
trusted library allocation
page execute and read and write
43F7000
trusted library allocation
page read and write
31E3000
trusted library allocation
page read and write
3550000
trusted library allocation
page read and write
785D000
heap
page read and write
4170000
trusted library allocation
page read and write
C16000
unkown
page read and write
6A56000
trusted library allocation
page read and write
AF0000
unkown
page readonly
35F8000
trusted library allocation
page read and write
4311000
trusted library allocation
page read and write
434B000
trusted library allocation
page read and write
31AA000
trusted library allocation
page read and write
5877000
heap
page read and write
40BF000
trusted library allocation
page read and write
44D1000
trusted library allocation
page read and write
35EB000
trusted library allocation
page read and write
2E9B000
trusted library allocation
page read and write
3218000
trusted library allocation
page read and write
43E1000
trusted library allocation
page read and write
4261000
trusted library allocation
page read and write
779D000
heap
page read and write
583A000
heap
page read and write
32F2000
trusted library allocation
page read and write
AFB000
unkown
page execute read
109E000
stack
page read and write
352C000
trusted library allocation
page read and write
12A0000
heap
page read and write
336D000
trusted library allocation
page read and write
4140000
trusted library allocation
page read and write
1225000
trusted library allocation
page execute and read and write
53C0000
heap
page read and write
6A90000
trusted library allocation
page read and write
1210000
trusted library allocation
page read and write
426C000
trusted library allocation
page read and write
BA7000
unkown
page readonly
7C0000
heap
page read and write
654F000
stack
page read and write
79E000
stack
page read and write
435A000
trusted library allocation
page read and write
AFF000
unkown
page execute read
78B0000
heap
page read and write
33AC000
trusted library allocation
page read and write
6AD0000
trusted library allocation
page read and write
817E000
stack
page read and write
57E2000
heap
page read and write
44CB000
trusted library allocation
page read and write
4345000
trusted library allocation
page read and write
2D6E000
stack
page read and write
30DE000
trusted library allocation
page read and write
445F000
trusted library allocation
page read and write
427D000
trusted library allocation
page read and write
4354000
trusted library allocation
page read and write
6AB0000
trusted library allocation
page read and write
1212000
trusted library allocation
page read and write
307C000
trusted library allocation
page read and write
4240000
trusted library allocation
page read and write
6A80000
trusted library allocation
page read and write
2F00000
trusted library allocation
page read and write
31A2000
trusted library allocation
page read and write
3227000
trusted library allocation
page read and write
2D88000
trusted library allocation
page read and write
BEF000
unkown
page read and write
7BA2000
trusted library allocation
page read and write
411E000
trusted library allocation
page read and write
40FA000
trusted library allocation
page read and write
77D0000
heap
page read and write
4396000
trusted library allocation
page read and write
415E000
trusted library allocation
page read and write
6830000
trusted library allocation
page execute and read and write
1216000
trusted library allocation
page execute and read and write
5A38000
trusted library allocation
page read and write
326E000
trusted library allocation
page read and write
There are 480 hidden memdumps, click here to show them.