IOC Report
file.exe

loading gif

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\file.exe
"C:\Users\user\Desktop\file.exe"
malicious
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized --single-argument http:///
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized --single-argument http://%3cfnc1%3e(79)/
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1932 --field-trial-handle=1984,i,17816864313725949295,15185844490458716427,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2040 --field-trial-handle=2004,i,15247930655043870069,15177389296022328392,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1932 --field-trial-handle=1984,i,17816864313725949295,15185844490458716427,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8

URLs

Name
IP
Malicious
pushjellysingeywus.shop
malicious
palmeventeryjusk.shop
malicious
bordersoarmanusjuw.shop
malicious
economicscreateojsu.shop
malicious
wifeplasterbakewis.shop
malicious
https://palmeventeryjusk.shop/api
172.67.155.93
malicious
suitcaseacanehalk.shop
malicious
entitlementappwo.shop
malicious
mealplayerpreceodsju.shop
malicious
absentconvicsjawun.shop
malicious
http://www.innosetup.com/
unknown
https://duckduckgo.com/chrome_newtab
unknown
https://duckduckgo.com/ac/?q=
unknown
https://www.google.com/images/branding/product/ico/googleg_lodp.ico
unknown
https://palmeventeryjusk.shop/K
unknown
https://palmeventeryjusk.shop/apimiga
unknown
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
unknown
http://crl.rootca1.amazontrust.com/rootca1.crl0
unknown
https://www.google.com/async/newtab_promos
142.251.32.100
https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
unknown
http://ocsp.rootca1.amazontrust.com0:
unknown
https://support.office.com/article/7D48285B-20E8-4B9B-91AD-216E34163BAD?wt.mc_id=EnterPK2016
unknown
https://support.office.com/article/94ba2e0b-638e-4a92-8857-2cb5ac1d8e17
unknown
https://www.ecosia.org/newtab/
unknown
https://support.mozilla.org/kb/customize-firefox-controls-buttons-and-toolbars?utm_source=firefox-br
unknown
https://palmeventeryjusk.shop/01(P.
unknown
https://palmeventeryjusk.shop/api-
unknown
https://ac.ecosia.org/autocomplete?q=
unknown
https://www.google.com/async/ddljson?async=ntp:2
142.251.32.100
https://palmeventeryjusk.shop/g
unknown
https://www.google.com/sorry/index?continue=https://www.google.com/async/ddljson%3Fasync%3Dntp:2&q=EgSaEMC5GMvBs7EGIjBUDjoZOZwbbYOebWZ9rjzg1pIVUtCKWFvTZJyTatG-di6-kWgVSkMk4x6uhc1VAKAyAXJKGVNPUlJZX0FCVVNJVkVfTkVUX01FU1NBR0VaAUM
142.251.32.100
http://x1.c.lencr.org/0
unknown
http://x1.i.lencr.org/0
unknown
https://support.office.com/article/94ba2e0b-638e-4a92-8857-2cb5ac1d8e17Install
unknown
https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
unknown
https://support.microsof
unknown
https://palmeventeryjusk.shop/apiE0
unknown
http://crt.rootca1.amazontrust.com/rootca1.cer0?
unknown
https://www.google.com/sorry/index?continue=https://www.google.com/async/newtab_ogb%3Fhl%3Den-US%26async%3Dfixed:0&hl=en-US&q=EgSaEMC5GMvBs7EGIjCXTsQ7Hz4Kgfi-FiRAT51_6pwZM6lLrAZbawdcw8AX8hoRf91oiReOlMqAgZsqCfUyAXJKGVNPUlJZX0FCVVNJVkVfTkVUX01FU1NBR0VaAUM
142.251.32.100
https://palmeventeryjusk.shop:443/api
unknown
https://palmeventeryjusk.shop/
unknown
https://www.google.com/async/newtab_ogb?hl=en-US&async=fixed:0
142.251.32.100
http://www.remobjects.com/ps
unknown
https://support.office.com/article/7D48285B-20E8-4B9B-91AD-216E34163BAD?wt.mc_id=EnterPK2016Examples
unknown
https://support.mozilla.org/products/firefoxgro.all
unknown
https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
unknown
https://palmeventeryjusk.shop/=
unknown
There are 37 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
palmeventeryjusk.shop
172.67.155.93
malicious
google.com
142.250.80.14
www.google.com
142.251.32.100

IPs

IP
Domain
Country
Malicious
172.67.155.93
palmeventeryjusk.shop
United States
malicious
192.168.2.4
unknown
unknown
malicious
239.255.255.250
unknown
Reserved
142.251.32.100
www.google.com
United States
142.250.80.100
unknown
United States

Memdumps

Base Address
Regiontype
Protect
Malicious
2440000
direct allocation
page read and write
malicious
822000
heap
page read and write
3BD9000
trusted library allocation
page read and write
25E5000
heap
page read and write
808000
heap
page read and write
7E0000
heap
page read and write
3EE0000
trusted library allocation
page read and write
828000
heap
page read and write
768000
heap
page read and write
7BA000
heap
page read and write
298E000
stack
page read and write
7BD000
heap
page read and write
401000
unkown
page execute read
7DC000
heap
page read and write
828000
heap
page read and write
3B39000
trusted library allocation
page read and write
3E81000
trusted library allocation
page read and write
23FE000
stack
page read and write
80F000
heap
page read and write
321C000
trusted library allocation
page read and write
82A000
heap
page read and write
3DB9000
trusted library allocation
page read and write
7A9000
heap
page read and write
3219000
trusted library allocation
page read and write
3B2F000
trusted library allocation
page read and write
3223000
trusted library allocation
page read and write
3239000
trusted library allocation
page read and write
19C000
stack
page read and write
3B89000
trusted library allocation
page read and write
7CD000
heap
page read and write
327C000
trusted library allocation
page read and write
3C9C000
trusted library allocation
page read and write
802000
heap
page read and write
80F000
heap
page read and write
829000
heap
page read and write
3223000
trusted library allocation
page read and write
2927000
unclassified section
page read and write
3E2C000
trusted library allocation
page read and write
31F1000
trusted library allocation
page read and write
7DB000
heap
page read and write
3DF0000
trusted library allocation
page read and write
827000
heap
page read and write
852000
heap
page read and write
3DDC000
trusted library allocation
page read and write
82D000
heap
page read and write
321C000
trusted library allocation
page read and write
3202000
trusted library allocation
page read and write
3CFB000
trusted library allocation
page read and write
3D73000
trusted library allocation
page read and write
31F1000
trusted library allocation
page read and write
3254000
trusted library allocation
page read and write
7AA000
heap
page read and write
7C4000
heap
page read and write
3269000
trusted library allocation
page read and write
326A000
trusted library allocation
page read and write
3209000
trusted library allocation
page read and write
3B34000
trusted library allocation
page read and write
3F12000
trusted library allocation
page read and write
555000
unkown
page readonly
321C000
trusted library allocation
page read and write
3240000
trusted library allocation
page read and write
7DC000
heap
page read and write
3221000
trusted library allocation
page read and write
2B7A000
trusted library allocation
page read and write
33E3000
trusted library allocation
page read and write
7F4000
heap
page read and write
3292000
trusted library allocation
page read and write
347B000
trusted library allocation
page read and write
2490000
heap
page read and write
7F4000
heap
page read and write
3218000
trusted library allocation
page read and write
3D82000
trusted library allocation
page read and write
3243000
trusted library allocation
page read and write
3255000
trusted library allocation
page read and write
3E31000
trusted library allocation
page read and write
3B66000
trusted library allocation
page read and write
3E59000
trusted library allocation
page read and write
2930000
heap
page read and write
3254000
trusted library allocation
page read and write
3202000
trusted library allocation
page read and write
802000
heap
page read and write
827000
heap
page read and write
31EE000
stack
page read and write
82E000
heap
page read and write
3218000
trusted library allocation
page read and write
818000
heap
page read and write
3E4A000
trusted library allocation
page read and write
A5F000
stack
page read and write
3245000
trusted library allocation
page read and write
25E0000
heap
page read and write
3D64000
trusted library allocation
page read and write
3CD3000
trusted library allocation
page read and write
3252000
trusted library allocation
page read and write
760000
heap
page read and write
3D55000
trusted library allocation
page read and write
827000
heap
page read and write
3259000
trusted library allocation
page read and write
3DC3000
trusted library allocation
page read and write
3220000
trusted library allocation
page read and write
7A6000
heap
page read and write
345F000
stack
page read and write
7D1000
heap
page read and write
7C5000
heap
page read and write
2925000
unclassified section
page read and write
3238000
trusted library allocation
page read and write
80A000
heap
page read and write
3E77000
trusted library allocation
page read and write
3252000
trusted library allocation
page read and write
3257000
trusted library allocation
page read and write
791000
heap
page read and write
7F4000
heap
page read and write
3E04000
trusted library allocation
page read and write
2B6B000
trusted library allocation
page read and write
3B61000
trusted library allocation
page read and write
3218000
trusted library allocation
page read and write
800000
heap
page read and write
3EC2000
trusted library allocation
page read and write
3B11000
trusted library allocation
page read and write
28E1000
unclassified section
page execute read
3B2A000
trusted library allocation
page read and write
29CD000
stack
page read and write
82B000
heap
page read and write
3E40000
trusted library allocation
page read and write
31F2000
trusted library allocation
page read and write
7D2000
heap
page read and write
7A3000
heap
page read and write
320E000
trusted library allocation
page read and write
84B000
heap
page read and write
3E9F000
trusted library allocation
page read and write
3E45000
trusted library allocation
page read and write
506000
unkown
page read and write
3E95000
trusted library allocation
page read and write
3231000
trusted library allocation
page read and write
3E63000
trusted library allocation
page read and write
3DF5000
trusted library allocation
page read and write
3EBD000
trusted library allocation
page read and write
326C000
trusted library allocation
page read and write
3245000
trusted library allocation
page read and write
78B000
heap
page read and write
3CF1000
trusted library allocation
page read and write
321B000
trusted library allocation
page read and write
3223000
trusted library allocation
page read and write
3242000
trusted library allocation
page read and write
6B0000
heap
page read and write
321C000
trusted library allocation
page read and write
3EAE000
trusted library allocation
page read and write
328B000
trusted library allocation
page read and write
3DAA000
trusted library allocation
page read and write
3288000
trusted library allocation
page read and write
3BE3000
trusted library allocation
page read and write
3254000
trusted library allocation
page read and write
3C97000
trusted library allocation
page read and write
325A000
trusted library allocation
page read and write
323A000
trusted library allocation
page read and write
3226000
trusted library allocation
page read and write
321C000
trusted library allocation
page read and write
25D8000
direct allocation
page read and write
324D000
trusted library allocation
page read and write
50E000
unkown
page read and write
827000
heap
page read and write
3217000
trusted library allocation
page read and write
830000
heap
page read and write
3219000
trusted library allocation
page read and write
31F9000
trusted library allocation
page read and write
327C000
trusted library allocation
page read and write
3E4F000
trusted library allocation
page read and write
3D2D000
trusted library allocation
page read and write
321D000
trusted library allocation
page read and write
2A10000
heap
page read and write
3B3E000
trusted library allocation
page read and write
A9E000
stack
page read and write
3EB3000
trusted library allocation
page read and write
321D000
trusted library allocation
page read and write
321C000
trusted library allocation
page read and write
23C0000
trusted library allocation
page read and write
3247000
trusted library allocation
page read and write
3CDD000
trusted library allocation
page read and write
323A000
trusted library allocation
page read and write
3DA5000
trusted library allocation
page read and write
33EB000
trusted library allocation
page read and write
31FA000
trusted library allocation
page read and write
3B57000
trusted library allocation
page read and write
7C8000
heap
page read and write
800000
heap
page read and write
3226000
trusted library allocation
page read and write
31F1000
trusted library allocation
page read and write
3D91000
trusted library allocation
page read and write
2590000
direct allocation
page read and write
322B000
trusted library allocation
page read and write
7D7000
heap
page read and write
3BE8000
trusted library allocation
page read and write
3C3D000
trusted library allocation
page read and write
3CE2000
trusted library allocation
page read and write
794000
heap
page read and write
25F0000
heap
page read and write
6D4000
heap
page read and write
77D000
heap
page read and write
81B000
heap
page read and write
31FB000
trusted library allocation
page read and write
3275000
trusted library allocation
page read and write
7BD000
heap
page read and write
31F4000
trusted library allocation
page read and write
259F000
direct allocation
page read and write
7D7000
heap
page read and write
31F8000
trusted library allocation
page read and write
2C1D000
stack
page read and write
79B000
heap
page read and write
7E5000
heap
page read and write
7F8000
heap
page read and write
332B000
trusted library allocation
page read and write
829000
heap
page read and write
30EE000
stack
page read and write
3263000
trusted library allocation
page read and write
80B000
heap
page read and write
323B000
trusted library allocation
page read and write
321B000
trusted library allocation
page read and write
3275000
trusted library allocation
page read and write
28D8000
stack
page read and write
3E6D000
trusted library allocation
page read and write
3D87000
trusted library allocation
page read and write
3D78000
trusted library allocation
page read and write
7EA000
heap
page read and write
2589000
direct allocation
page read and write
3234000
trusted library allocation
page read and write
3235000
trusted library allocation
page read and write
27DF000
stack
page read and write
822000
heap
page read and write
3218000
trusted library allocation
page read and write
3B7A000
trusted library allocation
page read and write
82B000
heap
page read and write
3E68000
trusted library allocation
page read and write
3C60000
trusted library allocation
page read and write
25E1000
heap
page read and write
2FAE000
stack
page read and write
3218000
trusted library allocation
page read and write
3252000
trusted library allocation
page read and write
3CD8000
trusted library allocation
page read and write
3D7D000
trusted library allocation
page read and write
50B000
unkown
page read and write
3B43000
trusted library allocation
page read and write
3F7B000
trusted library allocation
page read and write
3DA0000
trusted library allocation
page read and write
3223000
trusted library allocation
page read and write
6D4000
heap
page read and write
3D37000
trusted library allocation
page read and write
30AF000
stack
page read and write
3253000
trusted library allocation
page read and write
3219000
trusted library allocation
page read and write
3254000
trusted library allocation
page read and write
3259000
trusted library allocation
page read and write
2926000
unclassified section
page write copy
25E1000
heap
page read and write
3D5F000
trusted library allocation
page read and write
7DA000
heap
page read and write
321B000
trusted library allocation
page read and write
326C000
trusted library allocation
page read and write
25E1000
heap
page read and write
3287000
trusted library allocation
page read and write
788000
heap
page read and write
3218000
trusted library allocation
page read and write
50E000
unkown
page write copy
3235000
trusted library allocation
page read and write
3DC8000
trusted library allocation
page read and write
31F8000
trusted library allocation
page read and write
3EDB000
trusted library allocation
page read and write
321A000
trusted library allocation
page read and write
3CA1000
trusted library allocation
page read and write
3EA4000
trusted library allocation
page read and write
7BD000
heap
page read and write
3236000
trusted library allocation
page read and write
25E1000
heap
page read and write
3F08000
trusted library allocation
page read and write
3261000
trusted library allocation
page read and write
25AD000
direct allocation
page read and write
3269000
trusted library allocation
page read and write
25E1000
heap
page read and write
323B000
trusted library allocation
page read and write
84E000
heap
page read and write
3269000
trusted library allocation
page read and write
3550000
heap
page read and write
3B52000
trusted library allocation
page read and write
3E5E000
trusted library allocation
page read and write
3272000
trusted library allocation
page read and write
3CBF000
trusted library allocation
page read and write
7F4000
heap
page read and write
323A000
trusted library allocation
page read and write
3D6E000
trusted library allocation
page read and write
828000
heap
page read and write
7CE000
heap
page read and write
3312000
trusted library allocation
page read and write
3208000
trusted library allocation
page read and write
820000
heap
page read and write
3269000
trusted library allocation
page read and write
3254000
trusted library allocation
page read and write
7F4000
heap
page read and write
327C000
trusted library allocation
page read and write
2A21000
trusted library allocation
page read and write
80F000
heap
page read and write
3C06000
trusted library allocation
page read and write
3EB8000
trusted library allocation
page read and write
243C000
stack
page read and write
3EFE000
trusted library allocation
page read and write
3BD4000
trusted library allocation
page read and write
3C47000
trusted library allocation
page read and write
830000
heap
page read and write
6D4000
heap
page read and write
75E000
stack
page read and write
25E1000
heap
page read and write
831000
heap
page read and write
3343000
trusted library allocation
page read and write
3288000
trusted library allocation
page read and write
3DAF000
trusted library allocation
page read and write
29F0000
remote allocation
page read and write
3D4B000
trusted library allocation
page read and write
321C000
trusted library allocation
page read and write
329C000
trusted library allocation
page read and write
3263000
trusted library allocation
page read and write
325B000
trusted library allocation
page read and write
821000
heap
page read and write
3223000
trusted library allocation
page read and write
3224000
trusted library allocation
page read and write
7E6000
heap
page read and write
330C000
trusted library allocation
page read and write
3242000
trusted library allocation
page read and write
565000
unkown
page readonly
3DD7000
trusted library allocation
page read and write
3363000
trusted library allocation
page read and write
7CA000
heap
page read and write
823000
heap
page read and write
323E000
trusted library allocation
page read and write
3224000
trusted library allocation
page read and write
7CD000
heap
page read and write
818000
heap
page read and write
3E09000
trusted library allocation
page read and write
3E18000
trusted library allocation
page read and write
7AC000
heap
page read and write
7E5000
heap
page read and write
6D4000
heap
page read and write
3B5C000
trusted library allocation
page read and write
323B000
trusted library allocation
page read and write
3E1D000
trusted library allocation
page read and write
3216000
trusted library allocation
page read and write
3AF3000
trusted library allocation
page read and write
25B4000
direct allocation
page read and write
2B1D000
stack
page read and write
3C42000
trusted library allocation
page read and write
7C1000
heap
page read and write
3DFF000
trusted library allocation
page read and write
3245000
trusted library allocation
page read and write
7B8000
heap
page read and write
3241000
trusted library allocation
page read and write
3B0C000
trusted library allocation
page read and write
31FD000
trusted library allocation
page read and write
3B48000
trusted library allocation
page read and write
3CEC000
trusted library allocation
page read and write
3E9A000
trusted library allocation
page read and write
7CA000
heap
page read and write
3D5A000
trusted library allocation
page read and write
827000
heap
page read and write
7E0000
heap
page read and write
31F7000
trusted library allocation
page read and write
830000
heap
page read and write
7E2000
heap
page read and write
3492000
trusted library allocation
page read and write
7C7000
heap
page read and write
78B000
heap
page read and write
503000
unkown
page read and write
823000
heap
page read and write
3E72000
trusted library allocation
page read and write
325B000
trusted library allocation
page read and write
7A2000
heap
page read and write
3D50000
trusted library allocation
page read and write
3213000
trusted library allocation
page read and write
830000
heap
page read and write
25F0000
heap
page read and write
31F1000
trusted library allocation
page read and write
3DEB000
trusted library allocation
page read and write
321C000
trusted library allocation
page read and write
808000
heap
page read and write
828000
heap
page read and write
80F000
heap
page read and write
25C3000
direct allocation
page read and write
3E36000
trusted library allocation
page read and write
3229000
trusted library allocation
page read and write
3254000
trusted library allocation
page read and write
3223000
trusted library allocation
page read and write
78D000
heap
page read and write
3ECC000
trusted library allocation
page read and write
3B4D000
trusted library allocation
page read and write
3223000
trusted library allocation
page read and write
9C000
stack
page read and write
2B76000
trusted library allocation
page read and write
322F000
trusted library allocation
page read and write
3C38000
trusted library allocation
page read and write
3C2E000
trusted library allocation
page read and write
3D8C000
trusted library allocation
page read and write
3D69000
trusted library allocation
page read and write
3E22000
trusted library allocation
page read and write
3F1C000
trusted library allocation
page read and write
806000
heap
page read and write
7AE000
heap
page read and write
7E3000
heap
page read and write
3246000
trusted library allocation
page read and write
25CA000
direct allocation
page read and write
7E2000
heap
page read and write
3BDE000
trusted library allocation
page read and write
3C65000
trusted library allocation
page read and write
322B000
trusted library allocation
page read and write
3DBE000
trusted library allocation
page read and write
321B000
trusted library allocation
page read and write
3DB4000
trusted library allocation
page read and write
3234000
trusted library allocation
page read and write
3222000
trusted library allocation
page read and write
3242000
trusted library allocation
page read and write
3ADA000
trusted library allocation
page read and write
81E000
heap
page read and write
830000
heap
page read and write
7D9000
heap
page read and write
3247000
trusted library allocation
page read and write
847000
heap
page read and write
400000
unkown
page readonly
321B000
trusted library allocation
page read and write
3247000
trusted library allocation
page read and write
3252000
trusted library allocation
page read and write
323F000
trusted library allocation
page read and write
3234000
trusted library allocation
page read and write
7ED000
heap
page read and write
3CC4000
trusted library allocation
page read and write
82C000
heap
page read and write
7C9000
heap
page read and write
7DF000
heap
page read and write
3C4C000
trusted library allocation
page read and write
25D1000
direct allocation
page read and write
320A000
trusted library allocation
page read and write
3CCE000
trusted library allocation
page read and write
29F0000
remote allocation
page read and write
3290000
trusted library allocation
page read and write
794000
heap
page read and write
6D4000
heap
page read and write
3EF9000
trusted library allocation
page read and write
25A6000
direct allocation
page read and write
324B000
trusted library allocation
page read and write
82B000
heap
page read and write
7B3000
heap
page read and write
829000
heap
page read and write
7AA000
heap
page read and write
3E3B000
trusted library allocation
page read and write
3B07000
trusted library allocation
page read and write
321E000
trusted library allocation
page read and write
31F0000
trusted library allocation
page read and write
326D000
trusted library allocation
page read and write
7E2000
heap
page read and write
31F1000
trusted library allocation
page read and write
812000
heap
page read and write
B9F000
stack
page read and write
325B000
trusted library allocation
page read and write
3234000
trusted library allocation
page read and write
327C000
trusted library allocation
page read and write
7F8000
heap
page read and write
829000
heap
page read and write
3218000
trusted library allocation
page read and write
3F17000
trusted library allocation
page read and write
3E86000
trusted library allocation
page read and write
3ED1000
trusted library allocation
page read and write
3EC7000
trusted library allocation
page read and write
7AD000
heap
page read and write
291F000
unclassified section
page write copy
7F8000
heap
page read and write
3ED6000
trusted library allocation
page read and write
6D0000
heap
page read and write
71E000
stack
page read and write
3E7C000
trusted library allocation
page read and write
7A3000
heap
page read and write
3B8E000
trusted library allocation
page read and write
3208000
trusted library allocation
page read and write
31F2000
trusted library allocation
page read and write
806000
heap
page read and write
3223000
trusted library allocation
page read and write
3EA9000
trusted library allocation
page read and write
7D4000
heap
page read and write
7C3000
heap
page read and write
335E000
stack
page read and write
31F8000
trusted library allocation
page read and write
33DB000
trusted library allocation
page read and write
797000
heap
page read and write
321C000
trusted library allocation
page read and write
3E54000
trusted library allocation
page read and write
791000
heap
page read and write
5D0000
heap
page read and write
3295000
trusted library allocation
page read and write
3253000
trusted library allocation
page read and write
823000
heap
page read and write
807000
heap
page read and write
3253000
trusted library allocation
page read and write
3D00000
trusted library allocation
page read and write
31F6000
trusted library allocation
page read and write
33B3000
trusted library allocation
page read and write
514000
unkown
page readonly
3BED000
trusted library allocation
page read and write
31F9000
trusted library allocation
page read and write
3253000
trusted library allocation
page read and write
503000
unkown
page write copy
292A000
unclassified section
page readonly
3CF6000
trusted library allocation
page read and write
7F8000
heap
page read and write
7F8000
heap
page read and write
3AAD000
trusted library allocation
page read and write
830000
heap
page read and write
803000
heap
page read and write
7BB000
heap
page read and write
7AA000
heap
page read and write
3252000
trusted library allocation
page read and write
81F000
heap
page read and write
6D4000
heap
page read and write
95F000
stack
page read and write
7E2000
heap
page read and write
830000
heap
page read and write
3D3C000
trusted library allocation
page read and write
29F0000
remote allocation
page read and write
31F1000
trusted library allocation
page read and write
827000
heap
page read and write
3E27000
trusted library allocation
page read and write
804000
heap
page read and write
3245000
trusted library allocation
page read and write
7B3000
heap
page read and write
7C7000
heap
page read and write
291C000
unclassified section
page readonly
3DE6000
trusted library allocation
page read and write
3F0D000
trusted library allocation
page read and write
328B000
trusted library allocation
page read and write
3CC9000
trusted library allocation
page read and write
2360000
direct allocation
page execute and read and write
3218000
trusted library allocation
page read and write
7C5000
heap
page read and write
3A66000
trusted library allocation
page read and write
3C33000
trusted library allocation
page read and write
31F1000
trusted library allocation
page read and write
820000
heap
page read and write
31F2000
trusted library allocation
page read and write
3219000
trusted library allocation
page read and write
82F000
heap
page read and write
7D3000
heap
page read and write
3259000
trusted library allocation
page read and write
25E2000
heap
page read and write
There are 534 hidden memdumps, click here to show them.