IOC Report
e-dekont-20230206.exe

loading gif

Files

File Path
Type
Category
Malicious
e-dekont-20230206.exe
PE32+ executable (GUI) x86-64 Mono/.Net assembly, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\e-dekont-20230206.exe.log
CSV text
dropped
malicious

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\e-dekont-20230206.exe
C:\Users\user\Desktop\e-dekont-20230206.exe
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe
C:\Windows\Microsoft.NET\Framework\v4.0.30319\Caspol.exe
malicious

URLs

Name
IP
Malicious
https://discord.com/api/webhooks/1063267560818233445/Ga1uL1m9HE258QH4hqiVhVH5m98lA3rsO835awvMXcR1F31nnHHfghtrbDwRtJci1Osr
162.159.135.232
malicious
https://api.ipify.org/
64.185.227.155
https://api.ipify.org
unknown
https://discord.com
unknown
http://discord.com
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
https://discord.com4Dp
unknown
https://discord.com/api/webhooks/1063267560818233445/Ga1uL1m9HE258QH4hqiVhVH5m98lA3rsO835awvMXcR1F31
unknown

Domains

Name
IP
Malicious
discord.com
162.159.135.232
malicious
api4.ipify.org
64.185.227.155
api.ipify.org
unknown

IPs

IP
Domain
Country
Malicious
162.159.135.232
discord.com
United States
malicious
64.185.227.155
api4.ipify.org
United States

Registry

Path
Value
Malicious
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Caspol_RASAPI32
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Caspol_RASAPI32
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Caspol_RASAPI32
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Caspol_RASAPI32
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Caspol_RASAPI32
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Caspol_RASAPI32
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Caspol_RASAPI32
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Caspol_RASMANCS
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Caspol_RASMANCS
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Caspol_RASMANCS
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Caspol_RASMANCS
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Caspol_RASMANCS
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Caspol_RASMANCS
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Caspol_RASMANCS
FileDirectory
There are 5 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
33DC000
trusted library allocation
page read and write
malicious
6D30000
trusted library allocation
page read and write
6B90000
trusted library allocation
page read and write
6F90000
trusted library allocation
page read and write
13BA000
heap
page read and write
6F80000
trusted library allocation
page read and write
6C90000
trusted library allocation
page read and write
C7B00FE000
stack
page read and write
5510000
remote allocation
page read and write
22E8F510000
heap
page read and write
22EA7D91000
heap
page read and write
6F40000
trusted library allocation
page read and write
5490000
trusted library allocation
page read and write
22E8DC40000
trusted library allocation
page read and write
6B90000
trusted library allocation
page execute and read and write
14A8000
heap
page read and write
1300000
trusted library allocation
page read and write
6F60000
trusted library allocation
page read and write
6F80000
trusted library allocation
page read and write
6314000
heap
page read and write
6D10000
trusted library allocation
page read and write
6241000
heap
page read and write
6B60000
unkown
page read and write
6F80000
trusted library allocation
page read and write
5510000
trusted library allocation
page read and write
22E8F680000
trusted library allocation
page read and write
6B68000
trusted library allocation
page read and write
22E8F4B0000
trusted library allocation
page read and write
7FF9A5C64000
trusted library allocation
page read and write
22E8DC30000
trusted library allocation
page read and write
6F20000
trusted library allocation
page read and write
6C90000
trusted library allocation
page read and write
5A10000
trusted library allocation
page read and write
6D1B000
trusted library allocation
page read and write
15B8000
trusted library allocation
page read and write
6C80000
trusted library allocation
page read and write
6B60000
trusted library allocation
page read and write
6DE0000
trusted library allocation
page read and write
6B70000
trusted library allocation
page read and write
6F80000
trusted library allocation
page read and write
6D30000
trusted library allocation
page read and write
22EA7E30000
trusted library allocation
page read and write
6F50000
trusted library allocation
page read and write
6F30000
trusted library allocation
page read and write
1654000
trusted library allocation
page read and write
6D20000
trusted library allocation
page read and write
22E8F480000
trusted library allocation
page read and write
6F30000
trusted library allocation
page read and write
6D20000
trusted library allocation
page read and write
6F30000
trusted library allocation
page read and write
1270000
trusted library allocation
page read and write
22E8F430000
trusted library allocation
page read and write
3391000
trusted library allocation
page read and write
1262000
trusted library allocation
page read and write
22E8F4E0000
trusted library allocation
page read and write
6CA0000
trusted library allocation
page read and write
6F30000
trusted library allocation
page read and write
6265000
heap
page read and write
1277000
trusted library allocation
page execute and read and write
6B90000
trusted library allocation
page read and write
6CA0000
trusted library allocation
page read and write
6F60000
trusted library allocation
page read and write
6F80000
trusted library allocation
page read and write
22E9F6E3000
trusted library allocation
page read and write
22E8F630000
trusted library allocation
page read and write
6F80000
trusted library allocation
page read and write
65AE000
stack
page read and write
6F30000
trusted library allocation
page read and write
6F80000
trusted library allocation
page read and write
5510000
trusted library allocation
page read and write
1260000
trusted library allocation
page read and write
22E8D92C000
unkown
page readonly
C7AFDFD000
stack
page read and write
6C90000
trusted library allocation
page read and write
6D30000
trusted library allocation
page read and write
1275000
trusted library allocation
page execute and read and write
7F420000
trusted library allocation
page execute and read and write
6F80000
trusted library allocation
page read and write
59F0000
trusted library allocation
page read and write
5510000
trusted library allocation
page read and write
6B60000
trusted library allocation
page read and write
1243000
trusted library allocation
page execute and read and write
646E000
stack
page read and write
6D30000
trusted library allocation
page read and write
54B0000
trusted library allocation
page read and write
33C2000
trusted library allocation
page read and write
6F50000
trusted library allocation
page read and write
22E8F440000
trusted library allocation
page read and write
22E8F500000
heap
page read and write
22E8D882000
unkown
page readonly
6CFE000
stack
page read and write
22E8F450000
trusted library allocation
page read and write
6F30000
trusted library allocation
page read and write
13EB000
heap
page read and write
6C60000
trusted library allocation
page read and write
6312000
heap
page read and write
6F30000
trusted library allocation
page read and write
1690000
trusted library allocation
page read and write
22E8DB90000
heap
page read and write
22EA7DA0000
trusted library allocation
page read and write
680F000
stack
page read and write
6B90000
trusted library allocation
page read and write
6F30000
trusted library allocation
page read and write
6D30000
trusted library allocation
page read and write
5510000
trusted library allocation
page read and write
22E8F490000
trusted library allocation
page read and write
6CC0000
trusted library allocation
page read and write
6F54000
trusted library allocation
page read and write
6B60000
trusted library allocation
page read and write
6F60000
trusted library allocation
page read and write
5980000
trusted library allocation
page read and write
135D000
stack
page read and write
22EA7D90000
heap
page read and write
6B60000
trusted library allocation
page read and write
1220000
heap
page read and write
5510000
trusted library allocation
page read and write
6F30000
trusted library allocation
page read and write
5510000
trusted library allocation
page read and write
7FF9A5D82000
trusted library allocation
page read and write
6B60000
trusted library allocation
page read and write
6C6B000
trusted library allocation
page read and write
22E8DC30000
trusted library allocation
page read and write
55BE000
stack
page read and write
6C80000
trusted library allocation
page read and write
13D6000
heap
page read and write
7FF429800000
trusted library allocation
page execute and read and write
6F30000
trusted library allocation
page read and write
6CA0000
trusted library allocation
page read and write
6B60000
trusted library allocation
page read and write
6D10000
trusted library allocation
page read and write
62FB000
heap
page read and write
1390000
heap
page execute and read and write
54BC000
trusted library allocation
page read and write
6C60000
trusted library allocation
page read and write
6D30000
trusted library allocation
page read and write
6A5E000
stack
page read and write
6F50000
trusted library allocation
page read and write
6F50000
trusted library allocation
page read and write
1266000
trusted library allocation
page execute and read and write
6F20000
trusted library allocation
page read and write
351C000
trusted library allocation
page read and write
400000
remote allocation
page execute and read and write
670E000
stack
page read and write
22E8F470000
trusted library allocation
page read and write
6F30000
trusted library allocation
page read and write
6CD0000
trusted library allocation
page read and write
6D20000
unkown
page read and write
54C1000
trusted library allocation
page read and write
22EA7E50000
trusted library allocation
page read and write
6F30000
trusted library allocation
page read and write
22EA7DD0000
trusted library allocation
page read and write
DCE000
stack
page read and write
D2B000
stack
page read and write
22EA7E80000
trusted library allocation
page read and write
6F30000
trusted library allocation
page read and write
6F33000
trusted library allocation
page read and write
6C80000
trusted library allocation
page read and write
7FF9A5C70000
trusted library allocation
page read and write
1650000
trusted library allocation
page read and write
6B90000
trusted library allocation
page read and write
42C000
remote allocation
page execute and read and write
6D20000
trusted library allocation
page read and write
6D30000
trusted library allocation
page read and write
22E8F490000
trusted library allocation
page read and write
6F30000
trusted library allocation
page read and write
22E8F4C0000
trusted library allocation
page read and write
6B60000
unkown
page read and write
22E8DC10000
trusted library allocation
page read and write
6F80000
trusted library allocation
page read and write
597F000
stack
page read and write
6F80000
trusted library allocation
page read and write
6F30000
trusted library allocation
page read and write
6C80000
trusted library allocation
page read and write
13E8000
heap
page read and write
22EA7D90000
trusted library allocation
page read and write
6CE0000
trusted library allocation
page read and write
5520000
trusted library allocation
page read and write
22EA7E00000
trusted library allocation
page read and write
22EA7DB0000
trusted library allocation
page read and write
22E8D92C000
unkown
page readonly
22E8D9C0000
heap
page read and write
6B66000
trusted library allocation
page read and write
6B90000
trusted library allocation
page read and write
33F2000
trusted library allocation
page read and write
5510000
remote allocation
page read and write
6B60000
trusted library allocation
page read and write
6F36000
trusted library allocation
page read and write
22EA7E60000
trusted library allocation
page read and write
1250000
trusted library allocation
page read and write
22E8F6E1000
trusted library allocation
page read and write
5510000
trusted library allocation
page read and write
6C80000
trusted library allocation
page read and write
6F50000
trusted library allocation
page read and write
22EA7E10000
trusted library allocation
page read and write
62D0000
heap
page read and write
5990000
trusted library allocation
page read and write
22E8DA58000
heap
page read and write
5520000
trusted library allocation
page read and write
22E8DC30000
trusted library allocation
page read and write
22EA7DE0000
trusted library allocation
page read and write
6CB0000
trusted library allocation
page read and write
C7AFFFE000
stack
page read and write
6F30000
trusted library allocation
page read and write
6B65000
trusted library allocation
page read and write
22E8DC24000
trusted library allocation
page read and write
1240000
trusted library allocation
page read and write
6D30000
trusted library allocation
page read and write
6B60000
trusted library allocation
page read and write
22E8DC40000
trusted library allocation
page read and write
6F30000
trusted library allocation
page read and write
54A4000
trusted library allocation
page read and write
6F80000
trusted library allocation
page read and write
557E000
stack
page read and write
6F60000
trusted library allocation
page read and write
16A0000
heap
page read and write
6D30000
trusted library allocation
page read and write
6CF0000
trusted library allocation
page read and write
22E8DC50000
heap
page read and write
22E8F6C0000
trusted library allocation
page read and write
6D20000
heap
page read and write
6F70000
heap
page read and write
5510000
trusted library allocation
page read and write
6F50000
trusted library allocation
page read and write
22E8DC70000
trusted library allocation
page read and write
6A20000
trusted library allocation
page read and write
125D000
trusted library allocation
page execute and read and write
12DE000
stack
page read and write
22E8F460000
trusted library allocation
page read and write
22E8F6B0000
trusted library allocation
page read and write
14A3000
heap
page read and write
7FF9A5C74000
trusted library allocation
page read and write
22E8D9CC000
heap
page read and write
6F90000
trusted library allocation
page read and write
6B65000
unkown
page read and write
6301000
heap
page read and write
548D000
stack
page read and write
6F30000
trusted library allocation
page read and write
6C60000
trusted library allocation
page read and write
6F50000
trusted library allocation
page read and write
6B60000
trusted library allocation
page read and write
6D30000
trusted library allocation
page read and write
6D37000
trusted library allocation
page read and write
54AA000
trusted library allocation
page read and write
22E8F650000
trusted library allocation
page read and write
6F80000
trusted library allocation
page read and write
6F50000
trusted library allocation
page read and write
22E8DC70000
trusted library allocation
page read and write
6C9E000
trusted library allocation
page read and write
6B70000
trusted library allocation
page read and write
6D30000
trusted library allocation
page read and write
22E8F640000
trusted library allocation
page read and write
22E8F4B0000
trusted library allocation
page read and write
6D30000
trusted library allocation
page read and write
C7AF7E6000
stack
page read and write
6F30000
trusted library allocation
page read and write
62F1000
heap
page read and write
6B6F000
trusted library allocation
page read and write
22E8F470000
trusted library allocation
page read and write
7FF9A5D46000
trusted library allocation
page execute and read and write
6F30000
trusted library allocation
page read and write
22E8F4A0000
trusted library allocation
page read and write
6F30000
trusted library allocation
page read and write
62F0000
heap
page read and write
22E8F671000
trusted library allocation
page read and write
6C60000
trusted library allocation
page read and write
6D3A000
trusted library allocation
page read and write
22E8DC20000
trusted library allocation
page read and write
6F30000
trusted library allocation
page read and write
6F34000
trusted library allocation
page read and write
22E8D880000
unkown
page readonly
603E000
stack
page read and write
22E8DBB0000
heap
page read and write
6F30000
trusted library allocation
page read and write
7FF9A5D89000
trusted library allocation
page read and write
3419000
trusted library allocation
page read and write
5510000
trusted library allocation
page read and write
5510000
remote allocation
page read and write
5980000
trusted library allocation
page read and write
6B90000
trusted library allocation
page read and write
22E8DC80000
heap
page read and write
5980000
trusted library allocation
page read and write
577C000
stack
page read and write
22E8DC40000
trusted library allocation
page read and write
62F8000
heap
page read and write
33D8000
trusted library allocation
page read and write
6C96000
trusted library allocation
page read and write
54A2000
trusted library allocation
page read and write
7FF9A5C72000
trusted library allocation
page read and write
6F30000
trusted library allocation
page read and write
22E8DC60000
trusted library allocation
page read and write
5520000
heap
page read and write
6F80000
trusted library allocation
page read and write
6F30000
trusted library allocation
page read and write
7FF9A5D10000
trusted library allocation
page read and write
6F80000
trusted library allocation
page read and write
22EA7E90000
heap
page read and write
22E8D930000
heap
page read and write
6F80000
trusted library allocation
page read and write
6F80000
trusted library allocation
page read and write
5510000
trusted library allocation
page read and write
6F60000
trusted library allocation
page read and write
689D000
stack
page read and write
6C60000
trusted library allocation
page read and write
6F30000
trusted library allocation
page read and write
6C90000
trusted library allocation
page read and write
6F30000
trusted library allocation
page read and write
22E9F6E5000
trusted library allocation
page read and write
22EA7E91000
heap
page read and write
62FB000
heap
page read and write
6F30000
trusted library allocation
page read and write
CC0000
heap
page read and write
22EA7E20000
trusted library allocation
page read and write
33CA000
trusted library allocation
page read and write
10F8000
stack
page read and write
6D20000
trusted library allocation
page read and write
22E8DC55000
heap
page read and write
22E8D9A0000
heap
page read and write
6D30000
trusted library allocation
page read and write
7FF9A5D80000
trusted library allocation
page read and write
6D30000
trusted library allocation
page read and write
22E8DC60000
trusted library allocation
page read and write
22E8DA29000
heap
page read and write
3425000
trusted library allocation
page read and write
7FF9A5D20000
trusted library allocation
page execute and read and write
22E9F6E1000
trusted library allocation
page read and write
120E000
stack
page read and write
5A30000
trusted library allocation
page execute and read and write
22E8D9FE000
heap
page read and write
C7AFEFE000
stack
page read and write
6F80000
trusted library allocation
page read and write
6D30000
trusted library allocation
page read and write
7FF9A5D90000
trusted library allocation
page execute and read and write
6B90000
trusted library allocation
page read and write
5510000
trusted library allocation
page read and write
7FF9A5C6D000
trusted library allocation
page execute and read and write
22E8F4A0000
trusted library allocation
page read and write
6B90000
trusted library allocation
page read and write
54AD000
trusted library allocation
page read and write
549A000
trusted library allocation
page read and write
6D10000
trusted library allocation
page read and write
5600000
heap
page execute and read and write
6CA0000
trusted library allocation
page read and write
6B60000
trusted library allocation
page read and write
6F80000
trusted library allocation
page read and write
22E8F460000
trusted library allocation
page read and write
22E8F4F0000
trusted library allocation
page read and write
54B5000
trusted library allocation
page read and write
6D30000
trusted library allocation
page read and write
656E000
stack
page read and write
22E8F480000
trusted library allocation
page read and write
6D30000
trusted library allocation
page read and write
1660000
trusted library allocation
page read and write
6C90000
trusted library allocation
page read and write
6B60000
trusted library allocation
page read and write
6F50000
trusted library allocation
page read and write
6D20000
trusted library allocation
page read and write
33F4000
trusted library allocation
page read and write
6240000
heap
page read and write
6D20000
trusted library allocation
page read and write
6B60000
trusted library allocation
page read and write
6B60000
trusted library allocation
page read and write
6D20000
trusted library allocation
page read and write
402000
remote allocation
page execute and read and write
22E8F440000
trusted library allocation
page read and write
1680000
trusted library allocation
page read and write
5A00000
trusted library allocation
page read and write
6D30000
trusted library allocation
page read and write
5516000
trusted library allocation
page read and write
6262000
heap
page read and write
6D30000
trusted library allocation
page read and write
1360000
heap
page read and write
6F30000
trusted library allocation
page read and write
22E9F6E9000
trusted library allocation
page read and write
6D30000
trusted library allocation
page read and write
5510000
trusted library allocation
page read and write
22E8D9EF000
heap
page read and write
6F60000
trusted library allocation
page read and write
1380000
trusted library allocation
page execute and read and write
22E8D9FC000
heap
page read and write
14B0000
heap
page read and write
1225000
heap
page read and write
5530000
heap
page read and write
124D000
trusted library allocation
page execute and read and write
22E8F6A0000
trusted library allocation
page read and write
55FE000
stack
page read and write
C7AFCFE000
stack
page read and write
6F30000
trusted library allocation
page read and write
6F30000
trusted library allocation
page read and write
6B67000
trusted library allocation
page read and write
22E8F4C0000
trusted library allocation
page read and write
6F30000
trusted library allocation
page read and write
6F80000
trusted library allocation
page read and write
6F80000
trusted library allocation
page read and write
6B60000
trusted library allocation
page read and write
62BF000
heap
page read and write
22E8DC30000
trusted library allocation
page read and write
C7AFAFF000
stack
page read and write
699A000
stack
page read and write
6C60000
trusted library allocation
page read and write
6F20000
trusted library allocation
page read and write
6B60000
trusted library allocation
page read and write
6D00000
trusted library allocation
page read and write
22E8DC60000
trusted library allocation
page read and write
6DE0000
trusted library allocation
page read and write
6B60000
trusted library allocation
page read and write
22E8F690000
trusted library allocation
page read and write
C7B01FE000
stack
page read and write
6A20000
trusted library allocation
page read and write
DD0000
heap
page read and write
6C60000
trusted library allocation
page read and write
22E8DC40000
trusted library allocation
page read and write
6D20000
trusted library allocation
page read and write
C7AFBFE000
stack
page read and write
22E8DC40000
trusted library allocation
page read and write
6D10000
trusted library allocation
page read and write
6252000
heap
page read and write
6F60000
trusted library allocation
page read and write
6F80000
trusted library allocation
page read and write
1310000
heap
page read and write
22E8F4D0000
trusted library allocation
page read and write
6F80000
trusted library allocation
page read and write
22EA7DF0000
trusted library allocation
page read and write
6F50000
trusted library allocation
page read and write
5510000
trusted library allocation
page read and write
1680000
trusted library allocation
page read and write
6D30000
trusted library allocation
page read and write
6C80000
trusted library allocation
page read and write
22E8F430000
trusted library allocation
page read and write
6D30000
trusted library allocation
page read and write
6F30000
trusted library allocation
page read and write
22EA7E40000
trusted library allocation
page read and write
6B90000
trusted library allocation
page read and write
6C63000
trusted library allocation
page read and write
6F90000
trusted library allocation
page read and write
22E8DC40000
trusted library allocation
page read and write
22E8F660000
trusted library allocation
page read and write
5520000
trusted library allocation
page read and write
22E8F6D0000
heap
page execute and read and write
6B70000
trusted library allocation
page read and write
59E0000
trusted library allocation
page read and write
5510000
trusted library allocation
page read and write
6F40000
trusted library allocation
page execute and read and write
22EA7DC0000
trusted library allocation
page read and write
6D30000
trusted library allocation
page read and write
6B60000
trusted library allocation
page read and write
550D000
stack
page read and write
6D30000
trusted library allocation
page read and write
6B60000
trusted library allocation
page read and write
5510000
trusted library allocation
page read and write
6F50000
trusted library allocation
page read and write
6F90000
trusted library allocation
page read and write
22E8D9E7000
heap
page read and write
1244000
trusted library allocation
page read and write
6F1F000
stack
page read and write
6F90000
trusted library allocation
page read and write
6C60000
trusted library allocation
page read and write
54A7000
trusted library allocation
page read and write
13B0000
heap
page read and write
1290000
trusted library allocation
page read and write
22E8DC30000
trusted library section
page read and write
6B65000
trusted library allocation
page read and write
5534000
heap
page read and write
6B5F000
stack
page read and write
6B60000
trusted library allocation
page read and write
6F60000
trusted library allocation
page read and write
22E8D880000
unkown
page readonly
587E000
stack
page read and write
6F30000
trusted library allocation
page read and write
6CA0000
trusted library allocation
page read and write
5510000
trusted library allocation
page read and write
1272000
trusted library allocation
page read and write
6C60000
trusted library allocation
page read and write
66AE000
stack
page read and write
22E8DC40000
trusted library allocation
page read and write
6D30000
trusted library allocation
page read and write
6F50000
trusted library allocation
page read and write
6F25000
trusted library allocation
page read and write
22E8DC85000
heap
page read and write
6CC0000
trusted library allocation
page read and write
22E8F450000
trusted library allocation
page read and write
6308000
heap
page read and write
22E8DBF0000
trusted library allocation
page read and write
127B000
trusted library allocation
page execute and read and write
5510000
trusted library allocation
page read and write
22E8D9D9000
heap
page read and write
22E9F820000
trusted library allocation
page read and write
6F3A000
trusted library allocation
page read and write
22EA7E70000
trusted library allocation
page read and write
6D30000
trusted library allocation
page read and write
6F32000
trusted library allocation
page read and write
6F30000
trusted library allocation
page read and write
6F90000
trusted library allocation
page read and write
1230000
trusted library allocation
page read and write
22E8D882000
unkown
page readonly
304E000
stack
page read and write
4391000
trusted library allocation
page read and write
6F30000
trusted library allocation
page read and write
6F31000
trusted library allocation
page read and write
6326000
heap
page read and write
22EA7E8B000
trusted library allocation
page read and write
6C60000
trusted library allocation
page read and write
126A000
trusted library allocation
page execute and read and write
6E1E000
stack
page read and write
6D30000
trusted library allocation
page read and write
6F30000
unkown
page read and write
6B96000
trusted library allocation
page read and write
16A7000
heap
page read and write
6F30000
trusted library allocation
page read and write
1670000
heap
page read and write
6D30000
trusted library allocation
page read and write
6CBD000
stack
page read and write
6B60000
trusted library allocation
page read and write
1475000
heap
page read and write
13A0000
trusted library allocation
page read and write
6CB0000
trusted library allocation
page read and write
There are 505 hidden memdumps, click here to show them.