IOC Report
file.exe

loading gif

Files

File Path
Type
Category
Malicious
file.exe
PE32 executable (console) Intel 80386, for MS Windows
initial sample
malicious
C:\Users\Public\Desktop\Google Chrome.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Description string, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:41 2023, mtime=Wed Oct 4 13:16:55 2023, atime=Wed Sep 27 04:28:27 2023, length=3242272, window=hide
dropped
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\RegAsm.exe.log
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\TmpF89F.tmp
data
dropped
C:\Users\user\AppData\Local\Temp\TmpF8AF.tmp
data
dropped
C:\Users\user\AppData\Roaming\Microsoft\Crypto\RSA\S-1-5-21-2246122658-3693405117-2476756634-1003\76b53b3ec448f7ccdda2063b15d2bfc3_9e146be9-c76a-4720-bcdb-53011b87bd06
data
dropped

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\file.exe
"C:\Users\user\Desktop\file.exe"
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1

URLs

Name
IP
Malicious
http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-soap-message-security-1.0#Text
unknown
http://schemas.xmlsoap.org/ws/2005/02/sc/sct
unknown
http://schemas.xmlsoap.org/ws/2004/04/security/sc/dk
unknown
http://tempuri.org/Entity/Id14ResponseD
unknown
http://tempuri.org/Entity/Id23ResponseD
unknown
http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-soap-message-security-1.0#HexBinary
unknown
http://tempuri.org/Entity/Id12Response
unknown
http://tempuri.org/
unknown
http://tempuri.org/Entity/Id2Response
unknown
http://tempuri.org/Entity/Id15V
unknown
http://schemas.xmlsoap.org/ws/2005/02/sc/dk/p_sha1
unknown
http://tempuri.org/Entity/Id21Response
unknown
http://schemas.xmlsoap.org/2005/02/trust/spnego#GSS_Wrap
unknown
http://tempuri.org/Entity/Id9
unknown
http://docs.oasis-open.org/wss/oasis-wss-saml-token-profile-1.1#SAMLID
unknown
http://tempuri.org/Entity/Id8
unknown
http://tempuri.org/Entity/Id6ResponseD
unknown
http://tempuri.org/Entity/Id5
unknown
http://schemas.xmlsoap.org/ws/2004/10/wsat/Prepare
unknown
http://tempuri.org/Entity/Id4
unknown
http://tempuri.org/Entity/Id7
unknown
http://tempuri.org/Entity/Id6
unknown
http://schemas.xmlsoap.org/ws/2005/02/trust#BinarySecret
unknown
http://tempuri.org/Entity/Id19Response
unknown
http://ns.exif/1
unknown
http://docs.oasis-open.org/wss/oasis-wss-rel-token-profile-1.0.pdf#license
unknown
http://schemas.xmlsoap.org/ws/2005/02/trust/RSTR/Issue
unknown
http://schemas.xmlsoap.org/ws/2004/10/wsat/Aborted
unknown
http://schemas.xmlsoap.org/ws/2005/02/rm/TerminateSequence
unknown
http://tempuri.org/Entity/Id13ResponseD
unknown
http://schemas.xmlsoap.org/ws/2004/10/wsat/fault
unknown
http://schemas.xmlsoap.org/ws/2004/10/wsat
unknown
http://docs.oasis-open.org/wss/oasis-wss-soap-message-security-1.1#EncryptedKey
unknown
http://tempuri.org/Entity/Id15Response
unknown
http://tempuri.org/Entity/Id5ResponseD
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
http://schemas.xmlsoap.org/ws/2005/02/trust/RSTR/SCT/Renew
unknown
http://schemas.xmlsoap.org/ws/2004/10/wscoor/Register
unknown
http://tempuri.org/Entity/Id6Response
unknown
http://schemas.xmlsoap.org/ws/2004/04/trust/SymmetricKey
unknown
https://api.ip.sb/ip
unknown
http://schemas.xmlsoap.org/ws/2004/04/sc
unknown
http://tempuri.org/Entity/Id1ResponseD
unknown
http://schemas.xmlsoap.org/ws/2004/10/wsat/Volatile2PC
unknown
http://schemas.xmlsoap.org/ws/2005/02/trust/RSTR/SCT/Cancel
unknown
http://tempuri.org/Entity/Id9Response
unknown
http://tempuri.org/Entity/Id20
unknown
http://tempuri.org/Entity/Id21
unknown
http://tempuri.org/Entity/Id22
unknown
http://docs.oasis-open.org/wss/oasis-wss-kerberos-token-profile-1.1#Kerberosv5APREQSHA1
unknown
http://tempuri.org/Entity/Id23
unknown
http://schemas.xmlsoap.org/ws/2004/04/security/trust/CK/PSHA1
unknown
http://tempuri.org/Entity/Id24
unknown
http://schemas.xmlsoap.org/ws/2004/04/security/trust/RSTR/Issue
unknown
http://tempuri.org/Entity/Id24Response
unknown
http://tempuri.org/Entity/Id1Response
unknown
http://schemas.xmlsoap.org/ws/2005/02/rm/AckRequested
unknown
http://schemas.xmlsoap.org/ws/2004/10/wsat/ReadOnly
unknown
http://schemas.xmlsoap.org/ws/2004/10/wsat/Replay
unknown
http://schemas.xmlsoap.org/ws/2005/02/trust/tlsnego
unknown
http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-soap-message-security-1.0#Base64Binary
unknown
http://schemas.xmlsoap.org/ws/2004/10/wsat/Durable2PC
unknown
http://schemas.xmlsoap.org/ws/2004/04/security/trust/SymmetricKey
unknown
http://tempuri.org/Entity/Id21ResponseD
unknown
http://schemas.xmlsoap.org/ws/2004/08/addressing
unknown
http://schemas.xmlsoap.org/ws/2005/02/trust/RST/Issue
unknown
http://schemas.xmlsoap.org/ws/2004/10/wsat/Completion
unknown
http://schemas.xmlsoap.org/ws/2004/04/trust
unknown
http://tempuri.org/Entity/Id10
unknown
http://tempuri.org/Entity/Id11
unknown
http://tempuri.org/Entity/Id10ResponseD
unknown
http://tempuri.org/Entity/Id12
unknown
http://tempuri.org/Entity/Id16Response
unknown
http://schemas.xmlsoap.org/ws/2004/10/wscoor/CreateCoordinationContextResponse
unknown
http://schemas.xmlsoap.org/ws/2005/02/trust/RST/SCT/Cancel
unknown
http://tempuri.org/Entity/Id13
unknown
http://tempuri.org/Entity/Id14
unknown
http://tempuri.org/Entity/Id15
unknown
http://tempuri.org/Entity/Id16
unknown
http://schemas.xmlsoap.org/ws/2005/02/trust/Nonce
unknown
http://tempuri.org/Entity/Id17
unknown
http://tempuri.org/Entity/Id18
unknown
http://tempuri.org/Entity/Id5Response
unknown
http://tempuri.org/Entity/Id19
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/dns
unknown
http://tempuri.org/Entity/Id15ResponseD
unknown
http://tempuri.org/Entity/Id10Response
unknown
http://schemas.xmlsoap.org/ws/2005/02/trust/Renew
unknown
http://tempuri.org/Entity/Id11ResponseD
unknown
http://tempuri.org/Entity/Id8Response
unknown
http://schemas.xmlsoap.org/ws/2004/08/addressing/faultp93
unknown
http://schemas.xmlsoap.org/ws/2004/04/trust/PublicKey
unknown
http://docs.oasis-open.org/wss/oasis-wss-saml-token-profile-1.1#SAMLV2.0
unknown
http://docs.oasis-open.org/wss/oasis-wss-saml-token-profile-1.0#SAMLAssertionID
unknown
http://schemas.xmlsoap.org/ws/2004/04/security/trust/RST/SCT
unknown
http://schemas.xmlsoap.org/ws/2006/02/addressingidentity
unknown
http://tempuri.org/Entity/Id17ResponseD
unknown
http://schemas.xmlsoap.org/soap/envelope/
unknown
http://tempuri.org/Entity/Id8ResponseD
unknown
http://schemas.xmlsoap.org/ws/2005/02/trust/PublicKey
unknown
There are 90 hidden URLs, click here to show them.

IPs

IP
Domain
Country
Malicious
5.42.65.96
unknown
Russian Federation
malicious

Registry

Path
Value
Malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\F1A578C4CB5DE79A370893983FD4DA8B67B2B064
Blob
malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
Owner
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
SessionHash
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
Sequence
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
RegFiles0000
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
RegFilesHash

Memdumps

Base Address
Regiontype
Protect
Malicious
27F000
unkown
page read and write
malicious
402000
remote allocation
page execute and read and write
malicious
29C7000
trusted library allocation
page read and write
malicious
2921000
trusted library allocation
page read and write
malicious
3A63000
trusted library allocation
page read and write
5070000
heap
page read and write
2E12000
trusted library allocation
page read and write
3CDA000
trusted library allocation
page read and write
AD0000
trusted library allocation
page read and write
4DBE000
stack
page read and write
4E10000
heap
page read and write
2D76000
trusted library allocation
page read and write
2AE1000
trusted library allocation
page read and write
2800000
trusted library allocation
page execute and read and write
A40000
heap
page read and write
AB2000
trusted library allocation
page read and write
6590000
trusted library allocation
page execute and read and write
25DE000
stack
page read and write
A9D000
trusted library allocation
page execute and read and write
6280000
trusted library allocation
page read and write
3AEA000
trusted library allocation
page read and write
73E0000
trusted library allocation
page read and write
274000
unkown
page readonly
BE0000
trusted library allocation
page read and write
7233000
heap
page read and write
3AE0000
trusted library allocation
page read and write
5EBF000
stack
page read and write
2AC5000
trusted library allocation
page read and write
2ACC000
trusted library allocation
page read and write
3A48000
trusted library allocation
page read and write
719F000
trusted library allocation
page read and write
687E000
stack
page read and write
3A26000
trusted library allocation
page read and write
C40000
heap
page read and write
140E000
stack
page read and write
250000
unkown
page readonly
71A0000
trusted library allocation
page read and write
2746000
trusted library allocation
page read and write
7203000
heap
page read and write
C30000
trusted library allocation
page read and write
A8D000
stack
page read and write
3972000
trusted library allocation
page read and write
F2D000
stack
page read and write
52B2000
heap
page read and write
7A6E000
stack
page read and write
B20000
heap
page read and write
2B23000
trusted library allocation
page read and write
529E000
stack
page read and write
3999000
trusted library allocation
page read and write
250000
unkown
page readonly
3951000
trusted library allocation
page read and write
1590000
heap
page read and write
5B1F000
heap
page read and write
5FBE000
stack
page read and write
C05000
heap
page read and write
5B6B000
heap
page read and write
2F05000
trusted library allocation
page read and write
C81000
heap
page read and write
7179000
trusted library allocation
page read and write
6300000
trusted library allocation
page read and write
5A7E000
stack
page read and write
2EBC000
trusted library allocation
page read and write
3B6D000
trusted library allocation
page read and write
7175000
trusted library allocation
page read and write
7FD80000
trusted library allocation
page execute and read and write
A90000
trusted library allocation
page read and write
251000
unkown
page execute read
63B0000
trusted library allocation
page execute and read and write
6530000
trusted library allocation
page read and write
3A2C000
trusted library allocation
page read and write
2EF5000
trusted library allocation
page read and write
A30000
trusted library allocation
page read and write
AB7000
trusted library allocation
page execute and read and write
39CE000
trusted library allocation
page read and write
3CCE000
trusted library allocation
page read and write
3B86000
trusted library allocation
page read and write
62BB000
trusted library allocation
page read and write
2BA3000
trusted library allocation
page read and write
39A3000
trusted library allocation
page read and write
68B0000
trusted library allocation
page read and write
5BBE000
stack
page read and write
5B13000
heap
page read and write
2EAF000
trusted library allocation
page read and write
395E000
trusted library allocation
page read and write
3BA5000
trusted library allocation
page read and write
3942000
trusted library allocation
page read and write
3ACE000
trusted library allocation
page read and write
6285000
trusted library allocation
page read and write
6350000
trusted library allocation
page read and write
CC8000
heap
page read and write
437000
remote allocation
page execute and read and write
2AED000
trusted library allocation
page read and write
6550000
trusted library allocation
page read and write
2BAD000
trusted library allocation
page read and write
6580000
trusted library allocation
page read and write
251000
unkown
page execute read
2EFA000
trusted library allocation
page read and write
2760000
trusted library allocation
page read and write
2D90000
trusted library allocation
page read and write
3B90000
trusted library allocation
page read and write
191F000
stack
page read and write
688B000
trusted library allocation
page read and write
702B000
stack
page read and write
6880000
trusted library allocation
page read and write
39C8000
trusted library allocation
page read and write
71A4000
trusted library allocation
page read and write
2AB3000
trusted library allocation
page read and write
1450000
heap
page read and write
39AA000
trusted library allocation
page read and write
4A1C000
stack
page read and write
52A000
stack
page read and write
A0D000
stack
page read and write
6890000
trusted library allocation
page read and write
291E000
stack
page read and write
3B8B000
trusted library allocation
page read and write
7218000
heap
page read and write
AAA000
trusted library allocation
page execute and read and write
7A2E000
unkown
page read and write
7B6E000
stack
page read and write
61A0000
trusted library allocation
page execute and read and write
2BAB000
trusted library allocation
page read and write
2EE9000
trusted library allocation
page read and write
A20000
trusted library allocation
page read and write
2BA5000
trusted library allocation
page read and write
BF0000
trusted library allocation
page read and write
A33000
trusted library allocation
page execute and read and write
3B20000
trusted library allocation
page read and write
3B13000
trusted library allocation
page read and write
5B5B000
heap
page read and write
432000
remote allocation
page execute and read and write
3B22000
trusted library allocation
page read and write
2C4000
unkown
page read and write
39C6000
trusted library allocation
page read and write
274000
unkown
page readonly
2F59000
trusted library allocation
page read and write
3B2A000
trusted library allocation
page read and write
2EF0000
trusted library allocation
page read and write
71E4000
heap
page read and write
C74000
heap
page read and write
3A43000
trusted library allocation
page read and write
5B52000
heap
page read and write
6287000
trusted library allocation
page read and write
6570000
trusted library allocation
page read and write
AB0000
trusted library allocation
page read and write
6275000
trusted library allocation
page read and write
27D0000
heap
page execute and read and write
3B53000
trusted library allocation
page read and write
2A8D000
trusted library allocation
page read and write
39C0000
trusted library allocation
page read and write
159E000
heap
page read and write
71B8000
trusted library allocation
page read and write
6320000
trusted library allocation
page read and write
2B9F000
trusted library allocation
page read and write
F90000
heap
page read and write
74C0000
heap
page read and write
8F7000
stack
page read and write
BD0000
trusted library allocation
page execute and read and write
7172000
trusted library allocation
page read and write
3945000
trusted library allocation
page read and write
3B0C000
trusted library allocation
page read and write
78AE000
stack
page read and write
7258000
heap
page read and write
5B5E000
heap
page read and write
52C7000
heap
page read and write
5A9F000
heap
page read and write
2E38000
trusted library allocation
page read and write
53C0000
trusted library allocation
page read and write
71EB000
heap
page read and write
2E67000
trusted library allocation
page read and write
2AA6000
trusted library allocation
page read and write
396B000
trusted library allocation
page read and write
748E000
stack
page read and write
3B55000
trusted library allocation
page read and write
719A000
trusted library allocation
page read and write
3B17000
trusted library allocation
page read and write
724A000
heap
page read and write
D31000
heap
page read and write
2A99000
trusted library allocation
page read and write
60FF000
stack
page read and write
71F4000
heap
page read and write
2A80000
trusted library allocation
page read and write
627A000
trusted library allocation
page read and write
C35000
trusted library allocation
page read and write
2A5E000
trusted library allocation
page read and write
5A80000
heap
page read and write
7BD0000
heap
page read and write
C49000
heap
page read and write
5FFE000
stack
page read and write
66FC000
stack
page read and write
722A000
heap
page read and write
15AC000
heap
page read and write
62F0000
trusted library allocation
page read and write
3BBC000
trusted library allocation
page read and write
65FC000
stack
page read and write
2F46000
trusted library allocation
page read and write
7490000
trusted library allocation
page read and write
2D7C000
trusted library allocation
page read and write
5A0000
heap
page read and write
6400000
trusted library allocation
page execute and read and write
2741000
trusted library allocation
page read and write
2E06000
trusted library allocation
page read and write
2752000
trusted library allocation
page read and write
7590000
trusted library allocation
page read and write
71C0000
heap
page read and write
2790000
trusted library allocation
page read and write
39C3000
trusted library allocation
page read and write
712E000
stack
page read and write
53A8000
trusted library allocation
page read and write
74D9000
trusted library allocation
page read and write
752E000
stack
page read and write
3B2F000
trusted library allocation
page read and write
27E0000
heap
page read and write
2E03000
trusted library allocation
page read and write
673E000
stack
page read and write
3A39000
trusted library allocation
page read and write
144E000
stack
page read and write
274D000
trusted library allocation
page read and write
2ED6000
trusted library allocation
page read and write
C20000
trusted library allocation
page read and write
A3D000
trusted library allocation
page execute and read and write
27F000
unkown
page write copy
2780000
heap
page execute and read and write
2F10000
trusted library allocation
page read and write
27F2000
trusted library allocation
page read and write
AB5000
trusted library allocation
page execute and read and write
27F0000
trusted library allocation
page read and write
C2E000
trusted library allocation
page read and write
400000
remote allocation
page execute and read and write
727A000
heap
page read and write
729C000
heap
page read and write
5BFD000
stack
page read and write
7BAE000
stack
page read and write
272B000
trusted library allocation
page read and write
5B45000
heap
page read and write
74A0000
trusted library allocation
page execute and read and write
ABB000
trusted library allocation
page execute and read and write
3A3B000
trusted library allocation
page read and write
74E4000
trusted library allocation
page read and write
7170000
trusted library allocation
page read and write
3AAD000
trusted library allocation
page read and write
718F000
trusted library allocation
page read and write
5B55000
heap
page read and write
2B56000
trusted library allocation
page read and write
6FED000
stack
page read and write
281000
unkown
page write copy
786F000
stack
page read and write
26DE000
stack
page read and write
6380000
trusted library allocation
page read and write
3AE5000
trusted library allocation
page read and write
2CD000
unkown
page execute and read and write
720B000
heap
page read and write
3B06000
trusted library allocation
page read and write
C86000
heap
page read and write
2BA9000
trusted library allocation
page read and write
5B2C000
heap
page read and write
3A61000
trusted library allocation
page read and write
3CE7000
trusted library allocation
page read and write
79EE000
stack
page read and write
62C1000
trusted library allocation
page read and write
C10000
trusted library allocation
page read and write
2CE000
unkown
page readonly
4DFE000
stack
page read and write
271B000
stack
page read and write
1810000
heap
page read and write
68C0000
trusted library allocation
page execute and read and write
505E000
stack
page read and write
7DCE000
stack
page read and write
3B7F000
trusted library allocation
page read and write
62C6000
trusted library allocation
page read and write
71D0000
heap
page read and write
3AD9000
trusted library allocation
page read and write
2E18000
trusted library allocation
page read and write
74E0000
trusted library allocation
page read and write
2E0E000
trusted library allocation
page read and write
5B4B000
heap
page read and write
590000
heap
page read and write
6310000
trusted library allocation
page read and write
62DE000
trusted library allocation
page read and write
73D0000
trusted library allocation
page read and write
6390000
trusted library allocation
page read and write
2F3F000
trusted library allocation
page read and write
630B000
trusted library allocation
page read and write
65B0000
trusted library allocation
page execute and read and write
63A0000
trusted library allocation
page execute and read and write
B27000
heap
page read and write
2D80000
trusted library allocation
page read and write
5D0000
heap
page read and write
2B33000
trusted library allocation
page read and write
B38000
trusted library allocation
page read and write
AA0000
trusted library allocation
page read and write
2EA7000
trusted library allocation
page read and write
7162000
trusted library allocation
page read and write
12FD000
stack
page read and write
2810000
heap
page read and write
74B0000
trusted library allocation
page execute and read and write
398E000
trusted library allocation
page read and write
3984000
trusted library allocation
page read and write
C0E000
heap
page read and write
2BE0000
trusted library allocation
page read and write
7160000
trusted library allocation
page read and write
2EDD000
trusted library allocation
page read and write
688E000
trusted library allocation
page read and write
6560000
heap
page execute and read and write
AA2000
trusted library allocation
page read and write
62E1000
trusted library allocation
page read and write
39E2000
trusted library allocation
page read and write
62D2000
trusted library allocation
page read and write
718A000
trusted library allocation
page read and write
3A30000
trusted library allocation
page read and write
725C000
heap
page read and write
3B9B000
trusted library allocation
page read and write
2A8B000
trusted library allocation
page read and write
744E000
stack
page read and write
74D0000
trusted library allocation
page read and write
630E000
trusted library allocation
page read and write
3B47000
trusted library allocation
page read and write
5B7C000
heap
page read and write
6540000
trusted library allocation
page read and write
2EC9000
trusted library allocation
page read and write
39B0000
trusted library allocation
page read and write
3AA1000
trusted library allocation
page read and write
A34000
trusted library allocation
page read and write
7195000
trusted library allocation
page read and write
FA0000
heap
page read and write
6410000
trusted library allocation
page execute and read and write
6340000
trusted library allocation
page read and write
2724000
trusted library allocation
page read and write
53A0000
trusted library allocation
page read and write
6278000
trusted library allocation
page read and write
5090000
heap
page read and write
3B25000
trusted library allocation
page read and write
446000
remote allocation
page execute and read and write
2ABA000
trusted library allocation
page read and write
3989000
trusted library allocation
page read and write
2BD6000
trusted library allocation
page read and write
62B0000
trusted library allocation
page read and write
2E9D000
trusted library allocation
page read and write
B1E000
stack
page read and write
392F000
trusted library allocation
page read and write
6305000
trusted library allocation
page read and write
3B74000
trusted library allocation
page read and write
2A77000
trusted library allocation
page read and write
C64000
heap
page read and write
2783000
heap
page execute and read and write
5B16000
heap
page read and write
6289000
trusted library allocation
page read and write
39B7000
trusted library allocation
page read and write
2720000
trusted library allocation
page read and write
3AC7000
trusted library allocation
page read and write
159A000
heap
page read and write
3AF5000
trusted library allocation
page read and write
7212000
heap
page read and write
A45000
heap
page read and write
178F000
stack
page read and write
D03000
heap
page read and write
6270000
trusted library allocation
page read and write
6330000
trusted library allocation
page read and write
3ABA000
trusted library allocation
page read and write
C00000
heap
page read and write
683C000
stack
page read and write
2CE000
unkown
page readonly
3921000
trusted library allocation
page read and write
279E000
trusted library allocation
page read and write
52C3000
heap
page read and write
7221000
heap
page read and write
3AFF000
trusted library allocation
page read and write
3B60000
trusted library allocation
page read and write
53B0000
trusted library allocation
page read and write
723E000
heap
page read and write
6180000
trusted library allocation
page execute and read and write
39BA000
trusted library allocation
page read and write
AA6000
trusted library allocation
page execute and read and write
3A1F000
trusted library allocation
page read and write
519E000
stack
page read and write
5AB6000
heap
page read and write
71B0000
trusted library allocation
page read and write
79AE000
stack
page read and write
3A35000
trusted library allocation
page read and write
3A0A000
trusted library allocation
page read and write
273E000
trusted library allocation
page read and write
4E13000
heap
page read and write
397D000
trusted library allocation
page read and write
3953000
trusted library allocation
page read and write
2D5F000
trusted library allocation
page read and write
7188000
trusted library allocation
page read and write
2AD1000
trusted library allocation
page read and write
2B5000
unkown
page read and write
2E00000
trusted library allocation
page read and write
3B1C000
trusted library allocation
page read and write
7530000
trusted library allocation
page execute and read and write
3A3E000
trusted library allocation
page read and write
2AD6000
trusted library allocation
page read and write
722C000
heap
page read and write
2E15000
trusted library allocation
page read and write
There are 384 hidden memdumps, click here to show them.