IOC Report
Royalistic.exe

loading gif

Files

File Path
Type
Category
Malicious
Royalistic.exe
PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
initial sample
malicious
C:\Users\user\AppData\Local\Temp\nslE084.tmp\System.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Roaming\Kartoffelprodukterne\conchinine\Afdelingskontorer.Ate
data
dropped
C:\Users\user\AppData\Roaming\Kartoffelprodukterne\conchinine\Affaldsproblem\x-office-spreadsheet.png
PNG image data, 16 x 16, 8-bit colormap, non-interlaced
dropped
C:\Users\user\AppData\Roaming\Kartoffelprodukterne\conchinine\Forhastelse\Kommandjsr\api-ms-win-core-processthreads-l1-1-1.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Roaming\Kartoffelprodukterne\conchinine\Forhastelse\Kommandjsr\api-ms-win-crt-stdio-l1-1-0.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Roaming\Kartoffelprodukterne\conchinine\Forhastelse\Kommandjsr\drive-multidisk.png
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Roaming\Kartoffelprodukterne\conchinine\Konini\Firsaarsfdselsdage\Whorehouse\Faithworthy\System.Xml.XmlDocument.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Roaming\Kartoffelprodukterne\conchinine\Konini\Firsaarsfdselsdage\Whorehouse\Faithworthy\accessories-dictionary.png
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Roaming\Kartoffelprodukterne\conchinine\Laboratories53\x-office-address-book-symbolic.svg
SVG Scalable Vector Graphics image
dropped
C:\Users\user\AppData\Roaming\Kartoffelprodukterne\conchinine\Mitheithel\Homoplasy\Wice\AMD.Power.Processor.ppkg
HTML document, ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Roaming\Kartoffelprodukterne\conchinine\Paleograph\Statuskonto\Gusting\folder-new-symbolic.symbolic.png
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Roaming\Kartoffelprodukterne\conchinine\Paleograph\Statuskonto\Gusting\folder-templates-symbolic.svg
SVG Scalable Vector Graphics image
dropped
C:\Users\user\AppData\Roaming\Kartoffelprodukterne\conchinine\Paleograph\Statuskonto\Gusting\printer-printing-symbolic.svg
SVG Scalable Vector Graphics image
dropped
C:\Users\user\AppData\Roaming\Kartoffelprodukterne\conchinine\Paleograph\Statuskonto\Gusting\screen-shared-symbolic.symbolic.png
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Roaming\Kartoffelprodukterne\conchinine\Stinkbranden\Middagsselskaber\AsMultiLang.ini
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Roaming\Kartoffelprodukterne\conchinine\Stinkbranden\Middagsselskaber\PSReadline.psd1
HTML document, ASCII text, with CRLF line terminators
dropped
There are 7 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\Royalistic.exe
C:\Users\user\Desktop\Royalistic.exe
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe
C:\Users\user\Desktop\Royalistic.exe
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe
C:\Users\user\Desktop\Royalistic.exe
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1

URLs

Name
IP
Malicious
https://api.ipify.org/
64.185.227.155
https://api.ipify.org
unknown
http://nsis.sf.net/NSIS_Error
unknown
http://nsis.sf.net/NSIS_ErrorError
unknown
https://doc-08-50-docs.googleusercontent.com/
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
https://drive.google.com/
unknown
https://doc-08-50-docs.googleusercontent.com/docs/securesc/ha0ro937gcuc7l7deffksulhg5h7mbp1/n5qeluef
unknown
https://doc-08-50-docs.googleusercontent.com/docs/securesc/ha0ro937gcuc7l7deffksulhg5h7mbp1/n5qeluefaghr8f6hcddgpiu2u5tcuo8v/1679046600000/04783729953593762461/*/1UVMbNINla56ELELB-JwuaeCfH_gJxWsR?e=download&uuid=a3c458a3-e946-4640-bad5-e344d2665c90
142.250.184.225

Domains

Name
IP
Malicious
api4.ipify.org
64.185.227.155
drive.google.com
142.250.184.238
googlehosted.l.googleusercontent.com
142.250.184.225
doc-08-50-docs.googleusercontent.com
unknown
api.ipify.org
unknown

IPs

IP
Domain
Country
Malicious
142.250.184.225
googlehosted.l.googleusercontent.com
United States
142.250.184.238
drive.google.com
United States
64.185.227.155
api4.ipify.org
United States

Registry

Path
Value
Malicious
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\caspol_RASAPI32
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\caspol_RASAPI32
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\caspol_RASAPI32
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\caspol_RASAPI32
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\caspol_RASAPI32
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\caspol_RASAPI32
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\caspol_RASAPI32
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\caspol_RASMANCS
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\caspol_RASMANCS
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\caspol_RASMANCS
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\caspol_RASMANCS
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\caspol_RASMANCS
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\caspol_RASMANCS
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\caspol_RASMANCS
FileDirectory
There are 5 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
52B6000
direct allocation
page execute and read and write
malicious
363AB000
trusted library allocation
page read and write
malicious
7BA000
heap
page read and write
malicious
66B6000
direct allocation
page execute and read and write
58E0000
heap
page read and write
950000
trusted library allocation
page read and write
38C7F000
stack
page read and write
980000
trusted library allocation
page read and write
3634B000
trusted library allocation
page read and write
813000
heap
page read and write
3609D000
trusted library allocation
page execute and read and write
36340000
trusted library allocation
page read and write
813000
heap
page read and write
36340000
unkown
page read and write
5A23000
heap
page read and write
9D0000
trusted library allocation
page read and write
950000
trusted library allocation
page read and write
813000
heap
page read and write
36340000
trusted library allocation
page read and write
813000
heap
page read and write
813000
heap
page read and write
39670000
trusted library allocation
page read and write
813000
heap
page read and write
990000
trusted library allocation
page read and write
385A0000
trusted library allocation
page read and write
813000
heap
page read and write
39600000
trusted library allocation
page read and write
980000
trusted library allocation
page read and write
27C4026C000
heap
page read and write
448000
unkown
page read and write
813000
heap
page read and write
813000
heap
page read and write
36340000
trusted library allocation
page read and write
36340000
trusted library allocation
page read and write
39640000
trusted library allocation
page read and write
36350000
heap
page execute and read and write
39627000
trusted library allocation
page read and write
813000
heap
page read and write
360B0000
trusted library allocation
page read and write
39630000
trusted library allocation
page read and write
39650000
trusted library allocation
page read and write
813000
heap
page read and write
384E1000
heap
page read and write
395F0000
trusted library allocation
page read and write
813000
heap
page read and write
38581000
trusted library allocation
page read and write
36340000
trusted library allocation
page read and write
4C7000
unkown
page read and write
950000
trusted library allocation
page read and write
813000
heap
page read and write
990000
trusted library allocation
page read and write
97F000
stack
page read and write
39670000
trusted library allocation
page read and write
39620000
trusted library allocation
page read and write
5A3B000
heap
page read and write
36340000
trusted library allocation
page read and write
49B6000
remote allocation
page execute and read and write
813000
heap
page read and write
813000
heap
page read and write
5FE000
stack
page read and write
39600000
trusted library allocation
page read and write
9D0000
trusted library allocation
page read and write
813000
heap
page read and write
707D6000
unkown
page readonly
CB5000
heap
page read and write
39AC0000
trusted library allocation
page read and write
36340000
unkown
page read and write
39670000
unkown
page read and write
813000
heap
page read and write
950000
trusted library allocation
page read and write
5B5E000
stack
page read and write
813000
heap
page read and write
35C0F000
stack
page read and write
361C0000
trusted library allocation
page read and write
19A000
stack
page read and write
5A49000
heap
page read and write
813000
heap
page read and write
408000
unkown
page readonly
813000
heap
page read and write
5D5E000
stack
page read and write
36340000
trusted library allocation
page read and write
2A90000
heap
page read and write
39670000
trusted library allocation
page read and write
384D8000
heap
page read and write
2D20000
direct allocation
page read and write
813000
heap
page read and write
650000
heap
page read and write
59DA000
heap
page read and write
27C40240000
heap
page read and write
39640000
trusted library allocation
page read and write
813000
heap
page read and write
5A09000
heap
page read and write
813000
heap
page read and write
950000
trusted library allocation
page read and write
5C50000
heap
page read and write
39670000
trusted library allocation
page read and write
39AD0000
trusted library allocation
page read and write
59C5000
heap
page read and write
813000
heap
page read and write
980000
trusted library allocation
page read and write
38558000
heap
page read and write
36340000
trusted library allocation
page read and write
39610000
trusted library allocation
page read and write
970000
trusted library allocation
page read and write
5992000
heap
page read and write
36340000
trusted library allocation
page read and write
39630000
trusted library allocation
page read and write
39740000
heap
page read and write
5A01000
heap
page read and write
70B6000
direct allocation
page execute and read and write
38502000
heap
page read and write
1D0000
unclassified section
page readonly
36108000
trusted library allocation
page read and write
39680000
trusted library allocation
page execute and read and write
2490000
heap
page read and write
248F000
stack
page read and write
33BC000
stack
page read and write
3858D000
trusted library allocation
page read and write
39620000
trusted library allocation
page read and write
360FE000
stack
page read and write
9D0000
trusted library allocation
page read and write
2340000
heap
page read and write
9D0000
trusted library allocation
page read and write
A05B2FE000
stack
page read and write
38560000
trusted library allocation
page read and write
3FB6000
remote allocation
page execute and read and write
9D0000
trusted library allocation
page read and write
7ED000
heap
page read and write
36340000
trusted library allocation
page read and write
27C40190000
unclassified section
page readonly
585C000
stack
page read and write
38850000
trusted library allocation
page read and write
39666000
trusted library allocation
page read and write
5A3B000
heap
page read and write
954000
trusted library allocation
page read and write
950000
trusted library allocation
page read and write
27C40261000
heap
page read and write
5A17000
heap
page read and write
39640000
trusted library allocation
page read and write
657000
heap
page read and write
36340000
unkown
page read and write
813000
heap
page read and write
36340000
trusted library allocation
page read and write
813000
heap
page read and write
3856B000
trusted library allocation
page read and write
36090000
trusted library allocation
page read and write
DB6000
remote allocation
page execute and read and write
39600000
trusted library allocation
page read and write
281E000
stack
page read and write
950000
trusted library allocation
page read and write
39610000
trusted library allocation
page read and write
970000
trusted library allocation
page read and write
39640000
trusted library allocation
page read and write
59FB000
heap
page read and write
813000
heap
page read and write
48B6000
direct allocation
page execute and read and write
35F4A000
stack
page read and write
813000
heap
page read and write
9D0000
trusted library allocation
page read and write
39610000
trusted library allocation
page read and write
36340000
trusted library allocation
page read and write
36392000
trusted library allocation
page read and write
36083000
trusted library allocation
page execute and read and write
813000
heap
page read and write
400000
unkown
page readonly
27C40233000
heap
page read and write
950000
trusted library allocation
page read and write
5A55000
heap
page read and write
38880000
heap
page read and write
39624000
trusted library allocation
page read and write
20000
unclassified section
page readonly
27C401A0000
heap
page read and write
38860000
trusted library allocation
page read and write
39620000
trusted library allocation
page read and write
39AB0000
trusted library allocation
page read and write
39660000
trusted library allocation
page read and write
360B7000
trusted library allocation
page execute and read and write
7549000
trusted library allocation
page read and write
813000
heap
page read and write
813000
heap
page read and write
2D60000
direct allocation
page read and write
813000
heap
page read and write
36340000
trusted library allocation
page read and write
39620000
trusted library allocation
page read and write
813000
heap
page read and write
4DF000
unkown
page readonly
39AB0000
trusted library allocation
page read and write
9A0000
trusted library allocation
page read and write
813000
heap
page read and write
53B6000
remote allocation
page execute and read and write
395F0000
unkown
page read and write
39670000
trusted library allocation
page read and write
36345000
trusted library allocation
page read and write
38460000
heap
page read and write
47F000
unkown
page read and write
9D0000
trusted library allocation
page read and write
813000
heap
page read and write
5BE0000
direct allocation
page read and write
38521000
heap
page read and write
9E0000
trusted library allocation
page read and write
39630000
trusted library allocation
page read and write
9FE000
stack
page read and write
952000
trusted library allocation
page read and write
360A2000
trusted library allocation
page read and write
813000
heap
page read and write
813000
heap
page read and write
813000
heap
page read and write
39670000
unkown
page read and write
9D0000
trusted library allocation
page read and write
5894000
heap
page read and write
813000
heap
page read and write
813000
heap
page read and write
36320000
trusted library allocation
page read and write
813000
heap
page read and write
813000
heap
page read and write
9B0000
trusted library allocation
page read and write
39AAE000
stack
page read and write
813000
heap
page read and write
9D0000
trusted library allocation
page read and write
36084000
trusted library allocation
page read and write
36340000
trusted library allocation
page read and write
59FC000
heap
page read and write
950000
trusted library allocation
page read and write
812000
heap
page read and write
951000
trusted library allocation
page read and write
39640000
trusted library allocation
page read and write
980000
trusted library allocation
page read and write
813000
heap
page read and write
36340000
trusted library allocation
page read and write
4CB000
unkown
page read and write
5A1C000
heap
page read and write
39AB0000
unkown
page read and write
36048000
stack
page read and write
9A0000
trusted library allocation
page read and write
39624000
trusted library allocation
page read and write
36340000
trusted library allocation
page read and write
38558000
heap
page read and write
35DFE000
stack
page read and write
39AB0000
trusted library allocation
page read and write
59B7000
heap
page read and write
39620000
trusted library allocation
page read and write
39930000
trusted library allocation
page read and write
39670000
trusted library allocation
page read and write
384F8000
heap
page read and write
39650000
trusted library allocation
page read and write
5A1E000
heap
page read and write
39741000
heap
page read and write
9D0000
trusted library allocation
page read and write
980000
trusted library allocation
page read and write
38493000
heap
page read and write
39630000
unkown
page read and write
950000
trusted library allocation
page read and write
39620000
trusted library allocation
page read and write
813000
heap
page read and write
36340000
trusted library allocation
page read and write
9D0000
trusted library allocation
page read and write
970000
trusted library allocation
page read and write
30000
heap
page read and write
39AB0000
trusted library allocation
page read and write
36340000
trusted library allocation
page read and write
401000
unkown
page execute read
5A3F000
heap
page read and write
813000
heap
page read and write
4D1000
unkown
page readonly
9D0000
trusted library allocation
page read and write
9D0000
trusted library allocation
page read and write
9230000
trusted library allocation
page read and write
980000
trusted library allocation
page read and write
980000
trusted library allocation
page read and write
39620000
trusted library allocation
page read and write
7ED000
heap
page read and write
950000
trusted library allocation
page read and write
5CB6000
direct allocation
page execute and read and write
39AB0000
unkown
page read and write
950000
trusted library allocation
page read and write
27C40C02000
trusted library allocation
page read and write
39650000
trusted library allocation
page read and write
7500000
trusted library allocation
page read and write
27C40256000
heap
page read and write
A05AD1C000
stack
page read and write
21B6000
remote allocation
page execute and read and write
395F0000
trusted library allocation
page read and write
9D0000
trusted library allocation
page read and write
39600000
unkown
page read and write
59E7000
heap
page read and write
813000
heap
page read and write
39AC0000
trusted library allocation
page read and write
951000
trusted library allocation
page read and write
813000
heap
page read and write
707D4000
unkown
page readonly
4CF000
unkown
page readonly
39600000
trusted library allocation
page read and write
39AB0000
trusted library allocation
page read and write
95E000
trusted library allocation
page read and write
5A1C000
heap
page read and write
238E000
stack
page read and write
CB0000
heap
page read and write
27C4024E000
heap
page read and write
813000
heap
page read and write
39628000
trusted library allocation
page read and write
36345000
trusted library allocation
page read and write
59F8000
heap
page read and write
59FF000
heap
page read and write
36345000
trusted library allocation
page read and write
9DA000
trusted library allocation
page read and write
4720000
direct allocation
page execute and read and write
780000
heap
page read and write
813000
heap
page read and write
395F0000
trusted library allocation
page read and write
39730000
heap
page read and write
84B6000
direct allocation
page execute and read and write
707D0000
unkown
page readonly
438000
unkown
page read and write
38870000
heap
page execute and read and write
39670000
trusted library allocation
page read and write
3634B000
trusted library allocation
page read and write
36340000
trusted library allocation
page read and write
39AD0000
trusted library allocation
page read and write
950000
trusted library allocation
page read and write
5A05000
heap
page read and write
950000
trusted library allocation
page read and write
36361000
trusted library allocation
page read and write
36340000
trusted library allocation
page read and write
360A0000
trusted library allocation
page read and write
401000
unkown
page execute read
950000
trusted library allocation
page read and write
39670000
trusted library allocation
page read and write
596B000
heap
page read and write
36345000
trusted library allocation
page read and write
38558000
heap
page read and write
35B6000
remote allocation
page execute and read and write
7B6000
heap
page read and write
7CD000
heap
page read and write
A05B4FA000
stack
page read and write
38850000
trusted library allocation
page read and write
39C80000
heap
page read and write
39670000
unkown
page read and write
59FF000
heap
page read and write
27C40302000
heap
page read and write
7AF000
heap
page read and write
39670000
trusted library allocation
page read and write
39620000
trusted library allocation
page read and write
813000
heap
page read and write
27C40202000
heap
page read and write
39B20000
trusted library allocation
page read and write
410000
unkown
page read and write
35DC0000
remote allocation
page read and write
291F000
stack
page read and write
39620000
trusted library allocation
page execute and read and write
39645000
trusted library allocation
page read and write
39AD0000
heap
page read and write
363D9000
trusted library allocation
page read and write
395F0000
trusted library allocation
page read and write
39670000
unkown
page read and write
395F0000
trusted library allocation
page read and write
5A01000
heap
page read and write
9D0000
trusted library allocation
page read and write
38700000
heap
page read and write
3848B000
heap
page read and write
3857E000
trusted library allocation
page read and write
39670000
trusted library allocation
page read and write
361A0000
trusted library allocation
page execute and read and write
39660000
trusted library allocation
page read and write
36340000
trusted library allocation
page read and write
5960000
heap
page read and write
950000
trusted library allocation
page read and write
3856E000
trusted library allocation
page read and write
27C40265000
heap
page read and write
9D0000
trusted library allocation
page read and write
39678000
trusted library allocation
page read and write
39620000
trusted library allocation
page read and write
5C57000
heap
page read and write
36340000
trusted library allocation
page read and write
813000
heap
page read and write
980000
trusted library allocation
page read and write
360BB000
trusted library allocation
page execute and read and write
39620000
trusted library allocation
page read and write
36340000
trusted library allocation
page read and write
950000
trusted library allocation
page read and write
3639A000
trusted library allocation
page read and write
950000
trusted library allocation
page read and write
36340000
trusted library allocation
page read and write
5A2B000
heap
page read and write
950000
trusted library allocation
page read and write
950000
trusted library allocation
page read and write
813000
heap
page read and write
27C40213000
heap
page read and write
5A44000
heap
page read and write
27C4025E000
heap
page read and write
2BE1000
heap
page read and write
36346000
trusted library allocation
page read and write
361D0000
heap
page read and write
36340000
trusted library allocation
page read and write
4CF000
unkown
page readonly
39670000
unkown
page read and write
36348000
trusted library allocation
page read and write
813000
heap
page read and write
35660000
heap
page read and write
9D0000
trusted library allocation
page read and write
950000
trusted library allocation
page read and write
5A58000
heap
page read and write
63E000
stack
page read and write
27C40180000
unclassified section
page readonly
3852F000
heap
page read and write
950000
trusted library allocation
page read and write
36346000
trusted library allocation
page read and write
950000
trusted library allocation
page read and write
360AA000
trusted library allocation
page execute and read and write
9D0000
trusted library allocation
page read and write
810000
heap
page read and write
7AB6000
direct allocation
page execute and read and write
27C40268000
heap
page read and write
27C4024D000
heap
page read and write
400000
unkown
page readonly
36330000
trusted library allocation
page read and write
98000
stack
page read and write
27C40270000
heap
page read and write
A05B3FE000
stack
page read and write
5A0F000
heap
page read and write
35100000
heap
page read and write
39AB0000
trusted library allocation
page read and write
27C400F0000
heap
page read and write
360B5000
trusted library allocation
page execute and read and write
5A3B000
heap
page read and write
38592000
trusted library allocation
page read and write
39670000
trusted library allocation
page read and write
813000
heap
page read and write
3845E000
stack
page read and write
36340000
trusted library allocation
page read and write
953000
trusted library allocation
page read and write
3973A000
heap
page read and write
35300000
direct allocation
page read and write
9BC000
trusted library allocation
page read and write
951000
trusted library allocation
page read and write
37361000
trusted library allocation
page read and write
7FC000
heap
page read and write
39AB0000
trusted library allocation
page read and write
35B0E000
stack
page read and write
2AD0000
heap
page read and write
950000
trusted library allocation
page read and write
9D6000
trusted library allocation
page read and write
AFF000
stack
page read and write
39670000
trusted library allocation
page read and write
3608D000
trusted library allocation
page execute and read and write
384E3000
heap
page read and write
813000
heap
page read and write
40A000
unkown
page read and write
39610000
trusted library allocation
page read and write
39670000
unkown
page read and write
38850000
trusted library allocation
page read and write
813000
heap
page read and write
39600000
trusted library allocation
page read and write
9D0000
trusted library allocation
page read and write
39AC9000
trusted library allocation
page read and write
4D1000
unkown
page readonly
385DC000
stack
page read and write
970000
trusted library allocation
page read and write
813000
heap
page read and write
980000
trusted library allocation
page read and write
950000
trusted library allocation
page read and write
27C40249000
heap
page read and write
813000
heap
page read and write
9BA000
trusted library allocation
page read and write
813000
heap
page read and write
950000
trusted library allocation
page read and write
970000
trusted library allocation
page read and write
38572000
trusted library allocation
page read and write
8EB6000
direct allocation
page execute and read and write
813000
heap
page read and write
2BE0000
heap
page read and write
35EFE000
stack
page read and write
38564000
trusted library allocation
page read and write
27C4022A000
heap
page read and write
5890000
heap
page read and write
813000
heap
page read and write
950000
trusted library allocation
page read and write
40C000
unkown
page read and write
950000
trusted library allocation
page read and write
39B10000
trusted library allocation
page read and write
990000
trusted library allocation
page read and write
813000
heap
page read and write
813000
heap
page read and write
414000
unkown
page read and write
813000
heap
page read and write
950000
trusted library allocation
page read and write
813000
heap
page read and write
813000
heap
page read and write
813000
heap
page read and write
788000
heap
page read and write
36340000
trusted library allocation
page read and write
980000
trusted library allocation
page read and write
94E000
stack
page read and write
950000
trusted library allocation
page read and write
38850000
unkown
page read and write
38867000
trusted library allocation
page read and write
813000
heap
page read and write
5A32000
heap
page read and write
8B0000
trusted library allocation
page read and write
39630000
trusted library allocation
page read and write
36340000
trusted library allocation
page read and write
950000
trusted library allocation
page read and write
5A1F000
heap
page read and write
950000
trusted library allocation
page read and write
39623000
trusted library allocation
page read and write
39AC0000
trusted library allocation
page read and write
9269000
trusted library allocation
page read and write
813000
heap
page read and write
36340000
trusted library allocation
page read and write
813000
heap
page read and write
813000
heap
page read and write
27C4027E000
heap
page read and write
950000
trusted library allocation
page read and write
39AD6000
trusted library allocation
page read and write
38850000
trusted library allocation
page read and write
3966D000
stack
page read and write
813000
heap
page read and write
36345000
trusted library allocation
page read and write
5C27000
heap
page read and write
36080000
trusted library allocation
page read and write
813000
heap
page read and write
38535000
heap
page read and write
5C30000
direct allocation
page read and write
813000
heap
page read and write
5C20000
heap
page read and write
34BD000
stack
page read and write
59F0000
heap
page read and write
39AB0000
trusted library allocation
page read and write
363A7000
trusted library allocation
page read and write
655000
heap
page read and write
813000
heap
page read and write
813000
heap
page read and write
952000
trusted library allocation
page read and write
39AD0000
trusted library allocation
page read and write
39610000
trusted library allocation
page execute and read and write
813000
heap
page read and write
39AB0000
trusted library allocation
page read and write
38850000
trusted library allocation
page read and write
5A24000
heap
page read and write
980000
heap
page read and write
950000
trusted library allocation
page read and write
36340000
trusted library allocation
page read and write
38850000
trusted library allocation
page read and write
39620000
trusted library allocation
page read and write
3631C000
stack
page read and write
813000
heap
page read and write
813000
heap
page read and write
36340000
trusted library allocation
page read and write
5A1A000
heap
page read and write
36340000
trusted library allocation
page read and write
813000
heap
page read and write
36340000
trusted library allocation
page read and write
39AB0000
trusted library allocation
page read and write
39660000
unkown
page read and write
408000
unkown
page readonly
39620000
trusted library allocation
page read and write
959000
trusted library allocation
page read and write
38586000
trusted library allocation
page read and write
950000
trusted library allocation
page read and write
22D0000
heap
page read and write
C20000
remote allocation
page execute and read and write
813000
heap
page read and write
813000
heap
page read and write
36340000
trusted library allocation
page read and write
813000
heap
page read and write
813000
heap
page read and write
813000
heap
page read and write
707D1000
unkown
page execute read
17B6000
remote allocation
page execute and read and write
27C40270000
heap
page read and write
384FF000
heap
page read and write
35DC0000
remote allocation
page read and write
40A000
unkown
page write copy
950000
trusted library allocation
page read and write
813000
heap
page read and write
27C40150000
heap
page read and write
2BB6000
remote allocation
page execute and read and write
38514000
heap
page read and write
360A6000
trusted library allocation
page execute and read and write
386DC000
stack
page read and write
27C40A70000
trusted library allocation
page read and write
395F0000
unkown
page read and write
39610000
trusted library allocation
page read and write
39B20000
trusted library allocation
page read and write
36340000
trusted library allocation
page read and write
39620000
trusted library allocation
page read and write
950000
trusted library allocation
page read and write
39AB0000
unkown
page read and write
813000
heap
page read and write
3967A000
trusted library allocation
page read and write
2494000
heap
page read and write
362DE000
stack
page read and write
36340000
trusted library allocation
page read and write
813000
heap
page read and write
813000
heap
page read and write
38704000
heap
page read and write
813000
heap
page read and write
59F7000
heap
page read and write
9D0000
trusted library allocation
page read and write
36340000
trusted library allocation
page read and write
5720000
unclassified section
page readonly
5A03000
heap
page read and write
39AB5000
trusted library allocation
page read and write
950000
trusted library allocation
page read and write
36340000
trusted library allocation
page read and write
27C40200000
heap
page read and write
5A2B000
heap
page read and write
27C40247000
heap
page read and write
35101000
heap
page read and write
38850000
trusted library allocation
page read and write
813000
heap
page read and write
4DF000
unkown
page readonly
360B2000
trusted library allocation
page read and write
5A09000
heap
page read and write
9D0000
trusted library allocation
page read and write
813000
heap
page read and write
813000
heap
page read and write
36340000
unkown
page read and write
361B0000
trusted library allocation
page read and write
27C4023B000
heap
page read and write
5A17000
heap
page read and write
36340000
trusted library allocation
page read and write
38850000
trusted library allocation
page read and write
813000
heap
page read and write
3851E000
heap
page read and write
38B7D000
stack
page read and write
813000
heap
page read and write
870000
unclassified section
page readonly
9D0000
unkown
page read and write
813000
heap
page read and write
75E000
stack
page read and write
395B0000
heap
page read and write
59A7000
heap
page read and write
5A0F000
heap
page read and write
813000
heap
page read and write
35DC0000
remote allocation
page read and write
970000
trusted library allocation
page execute and read and write
950000
trusted library allocation
page read and write
35AC0000
trusted library allocation
page read and write
813000
heap
page read and write
39670000
unkown
page read and write
5A0C000
heap
page read and write
36070000
trusted library allocation
page read and write
9DF000
trusted library allocation
page read and write
59E1000
heap
page read and write
27C40242000
heap
page read and write
3974C000
heap
page read and write
39AB0000
trusted library allocation
page read and write
39670000
trusted library allocation
page read and write
395F0000
trusted library allocation
page read and write
39B30000
trusted library allocation
page read and write
950000
trusted library allocation
page read and write
880000
heap
page read and write
813000
heap
page read and write
45B000
unkown
page read and write
813000
heap
page read and write
813000
heap
page read and write
39620000
trusted library allocation
page read and write
39620000
trusted library allocation
page read and write
39640000
trusted library allocation
page read and write
980000
trusted library allocation
page read and write
39620000
trusted library allocation
page read and write
There are 651 hidden memdumps, click here to show them.