IOC Report
X8K556WeiK.exe

loading gif

Files

File Path
Type
Category
Malicious
X8K556WeiK.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
initial sample
malicious
C:\Users\Public\Desktop\Google Chrome.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Description string, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:41 2023, mtime=Wed Oct 4 11:02:28 2023, atime=Wed Sep 27 04:28:27 2023, length=3242272, window=hide
dropped
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\X8K556WeiK.exe.log
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\TmpEBFA.tmp
data
dropped
C:\Users\user\AppData\Local\Temp\TmpEC0A.tmp
data
dropped
C:\Users\user\AppData\Roaming\Microsoft\Crypto\RSA\S-1-5-21-2246122658-3693405117-2476756634-1002\76b53b3ec448f7ccdda2063b15d2bfc3_9e146be9-c76a-4720-bcdb-53011b87bd06
data
dropped

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\X8K556WeiK.exe
"C:\Users\user\Desktop\X8K556WeiK.exe"
malicious

URLs

Name
IP
Malicious
http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-soap-message-security-1.0#Text
unknown
http://schemas.xmlsoap.org/ws/2005/02/sc/sct
unknown
https://duckduckgo.com/chrome_newtab
unknown
http://schemas.xmlsoap.org/ws/2004/04/security/sc/dk
unknown
https://duckduckgo.com/ac/?q=
unknown
http://tempuri.org/Entity/Id14ResponseD
unknown
http://tempuri.org/Entity/Id23ResponseD
unknown
http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-soap-message-security-1.0#HexBinary
unknown
http://tempuri.org/Entity/Id12Response
unknown
http://tempuri.org/
unknown
http://tempuri.org/Entity/Id2Response
unknown
http://schemas.xmlsoap.org/ws/2005/02/sc/dk/p_sha1
unknown
http://tempuri.org/Entity/Id21Response
unknown
http://schemas.xmlsoap.org/2005/02/trust/spnego#GSS_Wrap
unknown
http://tempuri.org/Entity/Id9
unknown
http://docs.oasis-open.org/wss/oasis-wss-saml-token-profile-1.1#SAMLID
unknown
http://tempuri.org/Entity/Id8
unknown
http://tempuri.org/Entity/Id6ResponseD
unknown
http://tempuri.org/Entity/Id5
unknown
http://schemas.xmlsoap.org/ws/2004/10/wsat/Prepare
unknown
http://tempuri.org/Entity/Id4
unknown
http://tempuri.org/Entity/Id7
unknown
http://purl.oen
unknown
http://tempuri.org/Entity/Id6
unknown
http://schemas.xmlsoap.org/ws/2005/02/trust#BinarySecret
unknown
http://tempuri.org/Entity/Id19Response
unknown
http://docs.oasis-open.org/wss/oasis-wss-rel-token-profile-1.0.pdf#license
unknown
http://schemas.xmlsoap.org/ws/2005/02/trust/RSTR/Issue
unknown
http://tempuri.org/Entity/Id22Response0
unknown
http://schemas.xmlsoap.org/ws/2004/10/wsat/Aborted
unknown
http://schemas.xmlsoap.org/ws/2005/02/rm/TerminateSequence
unknown
http://tempuri.org/Entity/Id13ResponseD
unknown
http://schemas.xmlsoap.org/ws/2004/10/wsat/fault
unknown
http://schemas.xmlsoap.org/ws/2004/10/wsat
unknown
http://docs.oasis-open.org/wss/oasis-wss-soap-message-security-1.1#EncryptedKey
unknown
http://tempuri.org/Entity/Id15Response
unknown
http://tempuri.org/Entity/Id5ResponseD
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
http://schemas.xmlsoap.org/ws/2005/02/trust/RSTR/SCT/Renew
unknown
http://schemas.xmlsoap.org/ws/2004/08/addressing/faultp9
unknown
http://schemas.xmlsoap.org/ws/2004/10/wscoor/Register
unknown
http://tempuri.org/Entity/Id6Response
unknown
http://schemas.xmlsoap.org/ws/2004/04/trust/SymmetricKey
unknown
https://api.ip.sb/ip
unknown
http://schemas.xmlsoap.org/ws/2004/04/sc
unknown
http://tempuri.org/Entity/Id1ResponseD
unknown
http://schemas.xmlsoap.org/ws/2004/10/wsat/Volatile2PC
unknown
http://schemas.xmlsoap.org/ws/2005/02/trust/RSTR/SCT/Cancel
unknown
http://tempuri.org/Entity/Id9Response
unknown
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
unknown
http://tempuri.org/Entity/Id20
unknown
http://tempuri.org/Entity/Id21
unknown
http://tempuri.org/Entity/Id22
unknown
http://docs.oasis-open.org/wss/oasis-wss-kerberos-token-profile-1.1#Kerberosv5APREQSHA1
unknown
http://tempuri.org/Entity/Id23
unknown
http://schemas.xmlsoap.org/ws/2004/04/security/trust/CK/PSHA1
unknown
http://tempuri.org/Entity/Id24
unknown
http://schemas.xmlsoap.org/ws/2004/04/security/trust/RSTR/Issue
unknown
http://tempuri.org/Entity/Id24Response
unknown
https://www.ecosia.org/newtab/
unknown
http://tempuri.org/Entity/Id1Response
unknown
http://schemas.xmlsoap.org/ws/2005/02/rm/AckRequested
unknown
http://schemas.xmlsoap.org/ws/2004/10/wsat/ReadOnly
unknown
http://schemas.xmlsoap.org/ws/2004/10/wsat/Replay
unknown
http://schemas.xmlsoap.org/ws/2005/02/trust/tlsnego
unknown
http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-soap-message-security-1.0#Base64Binary
unknown
http://schemas.xmlsoap.org/ws/2004/10/wsat/Durable2PC
unknown
http://schemas.xmlsoap.org/ws/2004/04/security/trust/SymmetricKey
unknown
http://tempuri.org/Entity/Id21ResponseD
unknown
http://schemas.xmlsoap.org/ws/2004/08/addressing
unknown
http://schemas.xmlsoap.org/ws/2005/02/trust/RST/Issue
unknown
http://schemas.xmlsoap.org/ws/2004/10/wsat/Completion
unknown
http://schemas.xmlsoap.org/ws/2004/04/trust
unknown
http://tempuri.org/Entity/Id10
unknown
http://tempuri.org/Entity/Id11
unknown
http://tempuri.org/Entity/Id10ResponseD
unknown
http://tempuri.org/Entity/Id12
unknown
http://tempuri.org/Entity/Id16Response
unknown
http://schemas.xmlsoap.org/ws/2004/10/wscoor/CreateCoordinationContextResponse
unknown
http://schemas.xmlsoap.org/ws/2005/02/trust/RST/SCT/Cancel
unknown
http://tempuri.org/Entity/Id13
unknown
http://tempuri.org/Entity/Id14
unknown
http://tempuri.org/Entity/Id15
unknown
http://tempuri.org/Entity/Id16
unknown
http://schemas.xmlsoap.org/ws/2005/02/trust/Nonce
unknown
http://tempuri.org/Entity/Id17
unknown
http://tempuri.org/Entity/Id18
unknown
http://tempuri.org/Entity/Id5Response
unknown
http://tempuri.org/Entity/Id19
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/dns
unknown
http://tempuri.org/Entity/Id15ResponseD
unknown
http://tempuri.org/Entity/Id10Response
unknown
http://schemas.xmlsoap.org/ws/2005/02/trust/Renew
unknown
http://tempuri.org/Entity/Id11ResponseD
unknown
http://tempuri.org/Entity/Id8Response
unknown
http://schemas.xmlsoap.org/ws/2004/04/trust/PublicKey
unknown
http://docs.oasis-open.org/wss/oasis-wss-saml-token-profile-1.1#SAMLV2.0
unknown
http://docs.oasis-open.org/wss/oasis-wss-saml-token-profile-1.0#SAMLAssertionID
unknown
http://schemas.xmlsoap.org/ws/2004/04/security/trust/RST/SCT
unknown
http://schemas.xmlsoap.org/ws/2006/02/addressingidentity
unknown
There are 90 hidden URLs, click here to show them.

IPs

IP
Domain
Country
Malicious
103.113.70.99
unknown
India
malicious

Registry

Path
Value
Malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\F1A578C4CB5DE79A370893983FD4DA8B67B2B064
Blob
malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
Owner
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
SessionHash
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
Sequence
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
RegFiles0000
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
RegFilesHash

Memdumps

Base Address
Regiontype
Protect
Malicious
892000
unkown
page readonly
malicious
2D27000
trusted library allocation
page read and write
malicious
61DE000
stack
page read and write
31CD000
trusted library allocation
page read and write
2E17000
trusted library allocation
page read and write
9E5000
heap
page read and write
2E7D000
trusted library allocation
page read and write
65BE000
stack
page read and write
2F0B000
trusted library allocation
page read and write
2E4E000
trusted library allocation
page read and write
40FD000
trusted library allocation
page read and write
2F84000
trusted library allocation
page read and write
3E71000
trusted library allocation
page read and write
7836000
heap
page read and write
3CA9000
trusted library allocation
page read and write
3E58000
trusted library allocation
page read and write
7B42000
trusted library allocation
page read and write
2B40000
trusted library allocation
page read and write
9F0000
heap
page read and write
2F25000
trusted library allocation
page read and write
559E000
stack
page read and write
77BD000
heap
page read and write
68C6000
heap
page read and write
6F2E000
stack
page read and write
3FB4000
trusted library allocation
page read and write
5D31000
heap
page read and write
5180000
trusted library allocation
page read and write
2990000
trusted library allocation
page read and write
693B000
heap
page read and write
5358000
trusted library allocation
page read and write
CF7000
stack
page read and write
3168000
trusted library allocation
page read and write
7A00000
trusted library allocation
page execute and read and write
7B5A000
trusted library allocation
page read and write
29A6000
trusted library allocation
page execute and read and write
7A30000
heap
page read and write
694A000
heap
page read and write
3E77000
trusted library allocation
page read and write
7D00000
trusted library allocation
page read and write
66BE000
stack
page read and write
76B0000
heap
page read and write
3234000
trusted library allocation
page read and write
7CF4000
trusted library allocation
page read and write
410C000
trusted library allocation
page read and write
555F000
stack
page read and write
3F9E000
trusted library allocation
page read and write
6C20000
trusted library allocation
page read and write
2EB5000
trusted library allocation
page read and write
69E0000
trusted library allocation
page read and write
2E0F000
trusted library allocation
page read and write
2F46000
trusted library allocation
page read and write
6C30000
trusted library allocation
page read and write
2F3E000
trusted library allocation
page read and write
30B8000
trusted library allocation
page read and write
3276000
trusted library allocation
page read and write
6BF0000
trusted library allocation
page read and write
5105000
trusted library allocation
page read and write
3E2C000
trusted library allocation
page read and write
309D000
trusted library allocation
page read and write
407F000
trusted library allocation
page read and write
3FCD000
trusted library allocation
page read and write
315C000
trusted library allocation
page read and write
108E000
stack
page read and write
2EB8000
trusted library allocation
page read and write
3F24000
trusted library allocation
page read and write
3F1F000
trusted library allocation
page read and write
5130000
trusted library allocation
page read and write
30DD000
trusted library allocation
page read and write
7889000
heap
page read and write
3206000
trusted library allocation
page read and write
7848000
heap
page read and write
3F54000
trusted library allocation
page read and write
40EB000
trusted library allocation
page read and write
3ECB000
trusted library allocation
page read and write
2F1D000
trusted library allocation
page read and write
2E67000
trusted library allocation
page read and write
7CEE000
stack
page read and write
3092000
trusted library allocation
page read and write
4024000
trusted library allocation
page read and write
3E16000
trusted library allocation
page read and write
3083000
trusted library allocation
page read and write
31B9000
trusted library allocation
page read and write
29BB000
trusted library allocation
page execute and read and write
40BA000
trusted library allocation
page read and write
6DAC000
stack
page read and write
2B70000
heap
page execute and read and write
3E50000
trusted library allocation
page read and write
3F90000
trusted library allocation
page read and write
3103000
trusted library allocation
page read and write
2E01000
trusted library allocation
page read and write
3D06000
trusted library allocation
page read and write
7B49000
trusted library allocation
page read and write
79EC000
stack
page read and write
EBF000
heap
page read and write
7B88000
trusted library allocation
page read and write
3FD0000
trusted library allocation
page read and write
2EE1000
trusted library allocation
page read and write
5350000
trusted library allocation
page read and write
50CB000
trusted library allocation
page read and write
3E7C000
trusted library allocation
page read and write
3C8F000
trusted library allocation
page read and write
4028000
trusted library allocation
page read and write
3ED7000
trusted library allocation
page read and write
3154000
trusted library allocation
page read and write
29B2000
trusted library allocation
page read and write
3FF2000
trusted library allocation
page read and write
7B45000
trusted library allocation
page read and write
5D43000
heap
page read and write
7BB0000
trusted library allocation
page read and write
6AD0000
trusted library allocation
page execute and read and write
4016000
trusted library allocation
page read and write
2F30000
trusted library allocation
page read and write
3F3C000
trusted library allocation
page read and write
2EB2000
trusted library allocation
page read and write
7B6A000
trusted library allocation
page read and write
31B3000
trusted library allocation
page read and write
410A000
trusted library allocation
page read and write
5D48000
heap
page read and write
6849000
trusted library allocation
page read and write
2E42000
trusted library allocation
page read and write
8C7000
unkown
page readonly
3210000
trusted library allocation
page read and write
69C5000
trusted library allocation
page read and write
5290000
heap
page read and write
5D1E000
stack
page read and write
7C6E000
stack
page read and write
6986000
trusted library allocation
page read and write
7B65000
trusted library allocation
page read and write
2A88000
trusted library allocation
page read and write
2A70000
heap
page read and write
30B2000
trusted library allocation
page read and write
40C7000
trusted library allocation
page read and write
3EB8000
trusted library allocation
page read and write
7CA0000
trusted library allocation
page execute and read and write
30F7000
trusted library allocation
page read and write
7814000
heap
page read and write
7A20000
trusted library allocation
page read and write
29AA000
trusted library allocation
page execute and read and write
2F17000
trusted library allocation
page read and write
6A50000
trusted library allocation
page read and write
101F000
stack
page read and write
30EF000
trusted library allocation
page read and write
2C7E000
stack
page read and write
3CBC000
trusted library allocation
page read and write
40D2000
trusted library allocation
page read and write
3089000
trusted library allocation
page read and write
6840000
trusted library allocation
page read and write
3E39000
trusted library allocation
page read and write
6845000
trusted library allocation
page read and write
3280000
trusted library allocation
page read and write
6927000
heap
page read and write
69CE000
trusted library allocation
page read and write
2E75000
trusted library allocation
page read and write
29B0000
trusted library allocation
page read and write
6992000
trusted library allocation
page read and write
69D0000
trusted library allocation
page read and write
76C0000
heap
page read and write
7820000
heap
page read and write
3151000
trusted library allocation
page read and write
3EF3000
trusted library allocation
page read and write
2B20000
trusted library allocation
page execute and read and write
3FFD000
trusted library allocation
page read and write
2ECC000
trusted library allocation
page read and write
97A000
stack
page read and write
3F85000
trusted library allocation
page read and write
3000000
trusted library allocation
page read and write
3FA9000
trusted library allocation
page read and write
3EA5000
trusted library allocation
page read and write
68B2000
heap
page read and write
2B6E000
trusted library allocation
page read and write
7A23000
trusted library allocation
page read and write
ED0000
heap
page read and write
816E000
stack
page read and write
6981000
trusted library allocation
page read and write
7B70000
trusted library allocation
page read and write
696A000
heap
page read and write
308F000
trusted library allocation
page read and write
30AD000
trusted library allocation
page read and write
30A0000
trusted library allocation
page read and write
7BC0000
trusted library allocation
page read and write
6C40000
trusted library allocation
page execute and read and write
2DDE000
trusted library allocation
page read and write
77D3000
heap
page read and write
2970000
trusted library allocation
page read and write
2B30000
trusted library allocation
page read and write
DD0000
heap
page read and write
2B50000
trusted library allocation
page read and write
29D0000
trusted library allocation
page read and write
2A60000
heap
page read and write
3E4E000
trusted library allocation
page read and write
3110000
trusted library allocation
page read and write
4046000
trusted library allocation
page read and write
69A1000
trusted library allocation
page read and write
7B6F000
trusted library allocation
page read and write
3F19000
trusted library allocation
page read and write
3CC3000
trusted library allocation
page read and write
7C70000
trusted library allocation
page read and write
2980000
trusted library allocation
page read and write
6950000
heap
page read and write
50E6000
trusted library allocation
page read and write
314E000
trusted library allocation
page read and write
68BA000
heap
page read and write
3FC2000
trusted library allocation
page read and write
40DE000
trusted library allocation
page read and write
3FD9000
trusted library allocation
page read and write
3F4A000
trusted library allocation
page read and write
29B5000
trusted library allocation
page execute and read and write
298D000
trusted library allocation
page execute and read and write
3282000
trusted library allocation
page read and write
69CB000
trusted library allocation
page read and write
3EF9000
trusted library allocation
page read and write
7B5F000
trusted library allocation
page read and write
66FE000
stack
page read and write
31E3000
trusted library allocation
page read and write
299D000
trusted library allocation
page execute and read and write
40A2000
trusted library allocation
page read and write
29A2000
trusted library allocation
page read and write
9E0000
heap
page read and write
2DE8000
trusted library allocation
page read and write
6870000
heap
page read and write
806E000
stack
page read and write
3E83000
trusted library allocation
page read and write
68BD000
heap
page read and write
631E000
stack
page read and write
1046000
heap
page read and write
67FE000
stack
page read and write
29A0000
trusted library allocation
page read and write
1040000
heap
page read and write
DF7000
heap
page read and write
68C0000
heap
page read and write
4008000
trusted library allocation
page read and write
890000
unkown
page readonly
3F0C000
trusted library allocation
page read and write
62DE000
stack
page read and write
7864000
heap
page read and write
3FA1000
trusted library allocation
page read and write
77DF000
heap
page read and write
8D6000
unkown
page readonly
2DF6000
trusted library allocation
page read and write
321B000
trusted library allocation
page read and write
3E40000
trusted library allocation
page read and write
3C81000
trusted library allocation
page read and write
7B3D000
stack
page read and write
31A8000
trusted library allocation
page read and write
5110000
trusted library allocation
page read and write
4034000
trusted library allocation
page read and write
6A60000
trusted library allocation
page execute and read and write
6A10000
trusted library allocation
page read and write
30EC000
trusted library allocation
page read and write
2DAF000
trusted library allocation
page read and write
3229000
trusted library allocation
page read and write
3E20000
trusted library allocation
page read and write
5F1E000
stack
page read and write
6AC0000
trusted library allocation
page execute and read and write
6C60000
trusted library allocation
page execute and read and write
6A70000
trusted library allocation
page execute and read and write
2F1A000
trusted library allocation
page read and write
3EF6000
trusted library allocation
page read and write
3E08000
trusted library allocation
page read and write
6907000
heap
page read and write
6420000
trusted library allocation
page read and write
50C4000
trusted library allocation
page read and write
2E54000
trusted library allocation
page read and write
31B6000
trusted library allocation
page read and write
7C74000
trusted library allocation
page read and write
3ED0000
trusted library allocation
page read and write
693E000
heap
page read and write
3FEF000
trusted library allocation
page read and write
29B7000
trusted library allocation
page execute and read and write
7B58000
trusted library allocation
page read and write
3EE8000
trusted library allocation
page read and write
2DEB000
trusted library allocation
page read and write
3F7F000
trusted library allocation
page read and write
695E000
heap
page read and write
641F000
stack
page read and write
3F60000
trusted library allocation
page read and write
3FD3000
trusted library allocation
page read and write
3F38000
trusted library allocation
page read and write
69B0000
trusted library allocation
page read and write
3F6D000
trusted library allocation
page read and write
7B74000
trusted library allocation
page read and write
2A1E000
stack
page read and write
4097000
trusted library allocation
page read and write
3E64000
trusted library allocation
page read and write
3F9B000
trusted library allocation
page read and write
40CA000
trusted library allocation
page read and write
2E51000
trusted library allocation
page read and write
3EC5000
trusted library allocation
page read and write
401B000
trusted library allocation
page read and write
6964000
heap
page read and write
11CF000
stack
page read and write
7C2D000
stack
page read and write
50E1000
trusted library allocation
page read and write
4103000
trusted library allocation
page read and write
3E12000
trusted library allocation
page read and write
E98000
heap
page read and write
3E4A000
trusted library allocation
page read and write
317D000
trusted library allocation
page read and write
7A26000
trusted library allocation
page read and write
40C4000
trusted library allocation
page read and write
6847000
trusted library allocation
page read and write
6F80000
trusted library allocation
page execute and read and write
6838000
trusted library allocation
page read and write
3CA2000
trusted library allocation
page read and write
3CBF000
trusted library allocation
page read and write
7F9C0000
trusted library allocation
page execute and read and write
3F47000
trusted library allocation
page read and write
6EEE000
stack
page read and write
DD8000
heap
page read and write
30DF000
trusted library allocation
page read and write
3F8C000
trusted library allocation
page read and write
2B60000
trusted library allocation
page read and write
6CAC000
stack
page read and write
F1E000
stack
page read and write
3EE4000
trusted library allocation
page read and write
79F0000
trusted library allocation
page read and write
3F4D000
trusted library allocation
page read and write
7C80000
heap
page read and write
2EA7000
trusted library allocation
page read and write
699E000
trusted library allocation
page read and write
40F1000
trusted library allocation
page read and write
55DE000
stack
page read and write
3274000
trusted library allocation
page read and write
2D64000
trusted library allocation
page read and write
2FA7000
trusted library allocation
page read and write
3E89000
trusted library allocation
page read and write
1090000
heap
page read and write
7B80000
trusted library allocation
page read and write
3E9E000
trusted library allocation
page read and write
2DDC000
trusted library allocation
page read and write
3CB5000
trusted library allocation
page read and write
50F2000
trusted library allocation
page read and write
7842000
heap
page read and write
3F00000
trusted library allocation
page read and write
77F4000
heap
page read and write
697B000
trusted library allocation
page read and write
513E000
trusted library allocation
page read and write
7B40000
trusted library allocation
page read and write
3E18000
trusted library allocation
page read and write
323B000
trusted library allocation
page read and write
6C00000
trusted library allocation
page read and write
2DEE000
trusted library allocation
page read and write
3EDD000
trusted library allocation
page read and write
683A000
trusted library allocation
page read and write
5170000
heap
page read and write
6F50000
trusted library allocation
page read and write
561E000
stack
page read and write
2F0D000
trusted library allocation
page read and write
77C5000
heap
page read and write
2C81000
trusted library allocation
page read and write
30E9000
trusted library allocation
page read and write
408A000
trusted library allocation
page read and write
104E000
heap
page read and write
3118000
trusted library allocation
page read and write
7BA0000
trusted library allocation
page execute and read and write
3143000
trusted library allocation
page read and write
2EF8000
trusted library allocation
page read and write
3086000
trusted library allocation
page read and write
2983000
trusted library allocation
page execute and read and write
3CB0000
trusted library allocation
page read and write
2A63000
heap
page read and write
3F78000
trusted library allocation
page read and write
6970000
trusted library allocation
page read and write
50DE000
trusted library allocation
page read and write
6C10000
trusted library allocation
page read and write
50C0000
trusted library allocation
page read and write
3175000
trusted library allocation
page read and write
69C0000
trusted library allocation
page read and write
31C1000
trusted library allocation
page read and write
3F31000
trusted library allocation
page read and write
5190000
trusted library allocation
page execute and read and write
7858000
heap
page read and write
2984000
trusted library allocation
page read and write
6A40000
trusted library allocation
page read and write
3FC7000
trusted library allocation
page read and write
64D0000
trusted library allocation
page execute and read and write
5100000
trusted library allocation
page read and write
5660000
trusted library allocation
page read and write
7CF0000
trusted library allocation
page read and write
50ED000
trusted library allocation
page read and write
2EC0000
trusted library allocation
page read and write
5182000
trusted library allocation
page read and write
3FE0000
trusted library allocation
page read and write
3F2B000
trusted library allocation
page read and write
40A9000
trusted library allocation
page read and write
DDE000
heap
page read and write
3E94000
trusted library allocation
page read and write
2E5C000
trusted library allocation
page read and write
4D7C000
stack
page read and write
3E90000
trusted library allocation
page read and write
30B4000
trusted library allocation
page read and write
40F6000
trusted library allocation
page read and write
802E000
stack
page read and write
69F0000
trusted library allocation
page read and write
3EA2000
trusted library allocation
page read and write
2A5B000
stack
page read and write
2ED9000
trusted library allocation
page read and write
77B0000
heap
page read and write
3EAC000
trusted library allocation
page read and write
402D000
trusted library allocation
page read and write
40AF000
trusted library allocation
page read and write
4021000
trusted library allocation
page read and write
31DA000
trusted library allocation
page read and write
40B6000
trusted library allocation
page read and write
2E44000
trusted library allocation
page read and write
8C2000
unkown
page readonly
E11000
heap
page read and write
7B90000
trusted library allocation
page read and write
565E000
stack
page read and write
10C0000
heap
page read and write
E04000
heap
page read and write
77B4000
heap
page read and write
7804000
heap
page read and write
76AC000
stack
page read and write
E7E000
heap
page read and write
406E000
trusted library allocation
page read and write
409D000
trusted library allocation
page read and write
6830000
trusted library allocation
page read and write
3FE4000
trusted library allocation
page read and write
6835000
trusted library allocation
page read and write
64B0000
heap
page read and write
3F73000
trusted library allocation
page read and write
3FF5000
trusted library allocation
page read and write
6956000
heap
page read and write
52DE000
stack
page read and write
6A00000
trusted library allocation
page read and write
6DEE000
stack
page read and write
5360000
heap
page execute and read and write
6F60000
trusted library allocation
page read and write
64C0000
trusted library allocation
page execute and read and write
There are 420 hidden memdumps, click here to show them.