IOC Report
e5oMWYWLig.exe

loading gif

Files

File Path
Type
Category
Malicious
e5oMWYWLig.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\Users\Public\Desktop\Google Chrome.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Description string, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:41 2023, mtime=Wed Oct 4 13:16:50 2023, atime=Wed Sep 27 04:28:27 2023, length=3242272, window=hide
dropped
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\e5oMWYWLig.exe.log
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\TmpF32B.tmp
data
dropped
C:\Users\user\AppData\Local\Temp\TmpF33B.tmp
data
dropped
C:\Users\user\AppData\Roaming\Microsoft\Crypto\RSA\S-1-5-21-2246122658-3693405117-2476756634-1003\76b53b3ec448f7ccdda2063b15d2bfc3_9e146be9-c76a-4720-bcdb-53011b87bd06
data
dropped

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\e5oMWYWLig.exe
"C:\Users\user\Desktop\e5oMWYWLig.exe"
malicious

URLs

Name
IP
Malicious
http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-soap-message-security-1.0#Text
unknown
http://schemas.xmlsoap.org/ws/2005/02/sc/sct
unknown
http://schemas.xmlsoap.org/ws/2004/04/security/sc/dk
unknown
https://duckduckgo.com/ac/?q=
unknown
http://tempuri.org/Entity/Id14ResponseD
unknown
http://tempuri.org/Entity/Id23ResponseD
unknown
http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-soap-message-security-1.0#HexBinary
unknown
http://tempuri.org/Entity/Id12Response
unknown
http://pki-crl.symauth.com/ca_732b6ec148d290c0a071efd1dac8e288/LatestCRL.crl07
unknown
http://tempuri.org/
unknown
http://tempuri.org/Entity/Id2Response
unknown
http://pki-crl.symauth.com/offlineca/TheInstituteofElectricalandElectronicsEngineersIncIEEERootCA.cr
unknown
http://tempuri.org/Entity/Id15V
unknown
http://schemas.xmlsoap.org/ws/2005/02/sc/dk/p_sha1
unknown
http://tempuri.org/Entity/Id21Response
unknown
http://schemas.xmlsoap.org/2005/02/trust/spnego#GSS_Wrap
unknown
http://tempuri.org/Entity/Id9
unknown
http://docs.oasis-open.org/wss/oasis-wss-saml-token-profile-1.1#SAMLID
unknown
http://tempuri.org/Entity/Id8
unknown
http://tempuri.org/Entity/Id6ResponseD
unknown
http://tempuri.org/Entity/Id5
unknown
http://schemas.xmlsoap.org/ws/2004/10/wsat/Prepare
unknown
http://tempuri.org/Entity/Id4
unknown
http://tempuri.org/Entity/Id7
unknown
http://purl.oen
unknown
http://tempuri.org/Entity/Id6
unknown
http://schemas.xmlsoap.org/ws/2005/02/trust#BinarySecret
unknown
http://tempuri.org/Entity/Id19Response
unknown
http://docs.oasis-open.org/wss/oasis-wss-rel-token-profile-1.0.pdf#license
unknown
http://schemas.xmlsoap.org/ws/2005/02/trust/RSTR/Issue
unknown
http://schemas.xmlsoap.org/ws/2004/10/wsat/Aborted
unknown
http://schemas.xmlsoap.org/ws/2005/02/rm/TerminateSequence
unknown
http://tempuri.org/Entity/Id13ResponseD
unknown
http://schemas.xmlsoap.org/ws/2004/10/wsat/fault
unknown
http://schemas.xmlsoap.org/ws/2004/10/wsat
unknown
http://Certera.crt.sectigo.com/CerteraCodeSigningCA.crt0
unknown
http://docs.oasis-open.org/wss/oasis-wss-soap-message-security-1.1#EncryptedKey
unknown
http://tempuri.org/Entity/Id15Response
unknown
http://tempuri.org/Entity/Id5ResponseD
unknown
http://Certera.crl.sectigo.com/CerteraCodeSigningCA.crl0
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
http://schemas.xmlsoap.org/ws/2005/02/trust/RSTR/SCT/Renew
unknown
http://schemas.xmlsoap.org/ws/2004/10/wscoor/Register
unknown
http://tempuri.org/Entity/Id6Response
unknown
http://schemas.xmlsoap.org/ws/2004/04/trust/SymmetricKey
unknown
https://api.ip.sb/ip
unknown
http://schemas.xmlsoap.org/ws/2004/04/sc
unknown
http://tempuri.org/Entity/Id1ResponseD
unknown
http://schemas.xmlsoap.org/ws/2004/10/wsat/Volatile2PC
unknown
http://schemas.xmlsoap.org/ws/2005/02/trust/RSTR/SCT/Cancel
unknown
http://tempuri.org/Entity/Id9Response
unknown
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
unknown
http://tempuri.org/Entity/Id20
unknown
http://tempuri.org/Entity/Id21
unknown
http://tempuri.org/Entity/Id22
unknown
http://docs.oasis-open.org/wss/oasis-wss-kerberos-token-profile-1.1#Kerberosv5APREQSHA1
unknown
http://tempuri.org/Entity/Id23
unknown
http://schemas.xmlsoap.org/ws/2004/04/security/trust/CK/PSHA1
unknown
http://tempuri.org/Entity/Id24
unknown
http://schemas.xmlsoap.org/ws/2004/04/security/trust/RSTR/Issue
unknown
http://tempuri.org/Entity/Id24Response
unknown
https://www.ecosia.org/newtab/
unknown
http://tempuri.org/Entity/Id1Response
unknown
http://schemas.xmlsoap.org/ws/2005/02/rm/AckRequested
unknown
http://schemas.xmlsoap.org/ws/2004/10/wsat/ReadOnly
unknown
http://schemas.xmlsoap.org/ws/2004/10/wsat/Replay
unknown
http://schemas.xmlsoap.org/ws/2005/02/trust/tlsnego
unknown
http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-soap-message-security-1.0#Base64Binary
unknown
http://schemas.xmlsoap.org/ws/2004/10/wsat/Durable2PC
unknown
http://schemas.xmlsoap.org/ws/2004/04/security/trust/SymmetricKey
unknown
http://tempuri.org/Entity/Id21ResponseD
unknown
http://schemas.xmlsoap.org/ws/2004/08/addressing
unknown
http://schemas.xmlsoap.org/ws/2005/02/trust/RST/Issue
unknown
http://schemas.xmlsoap.org/ws/2004/10/wsat/Completion
unknown
http://schemas.xmlsoap.org/ws/2004/04/trust
unknown
http://tempuri.org/Entity/Id10
unknown
http://tempuri.org/Entity/Id11
unknown
http://tempuri.org/Entity/Id10ResponseD
unknown
http://tempuri.org/Entity/Id12
unknown
http://tempuri.org/Entity/Id16Response
unknown
http://schemas.xmlsoap.org/ws/2004/10/wscoor/CreateCoordinationContextResponse
unknown
http://schemas.xmlsoap.org/ws/2005/02/trust/RST/SCT/Cancel
unknown
http://tempuri.org/Entity/Id13
unknown
http://tempuri.org/Entity/Id14
unknown
http://tempuri.org/Entity/Id15
unknown
http://tempuri.org/Entity/Id16
unknown
http://schemas.xmlsoap.org/ws/2005/02/trust/Nonce
unknown
http://tempuri.org/Entity/Id17
unknown
http://tempuri.org/Entity/Id18
unknown
http://tempuri.org/Entity/Id5Response
unknown
http://tempuri.org/Entity/Id19
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/dns
unknown
http://tempuri.org/Entity/Id15ResponseD
unknown
http://tempuri.org/Entity/Id10Response
unknown
http://schemas.xmlsoap.org/ws/2005/02/trust/Renew
unknown
http://tempuri.org/Entity/Id11ResponseD
unknown
http://tempuri.org/Entity/Id8Response
unknown
http://schemas.xmlsoap.org/ws/2004/04/trust/PublicKey
unknown
http://docs.oasis-open.org/wss/oasis-wss-saml-token-profile-1.1#SAMLV2.0
unknown
http://docs.oasis-open.org/wss/oasis-wss-saml-token-profile-1.0#SAMLAssertionID
unknown
There are 90 hidden URLs, click here to show them.

IPs

IP
Domain
Country
Malicious
65.108.19.51
unknown
United States
malicious

Registry

Path
Value
Malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\F1A578C4CB5DE79A370893983FD4DA8B67B2B064
Blob
malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
Owner
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
SessionHash
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
Sequence
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
RegFiles0000
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
RegFilesHash

Memdumps

Base Address
Regiontype
Protect
Malicious
3A2000
unkown
page execute and read and write
malicious
5881000
trusted library allocation
page read and write
malicious
9710000
trusted library allocation
page read and write
6CA2000
trusted library allocation
page read and write
25A3000
heap
page read and write
A8F0000
heap
page read and write
7C30000
heap
page read and write
7A80000
trusted library allocation
page read and write
6A93000
trusted library allocation
page read and write
A560000
heap
page read and write
18F0000
unkown
page execute and write copy
2480000
heap
page read and write
4D5C000
stack
page read and write
801E000
stack
page read and write
4490000
direct allocation
page execute and read and write
96CB000
trusted library allocation
page read and write
9C00000
trusted library allocation
page read and write
68B1000
trusted library allocation
page read and write
5AF4000
trusted library allocation
page read and write
6AE0000
trusted library allocation
page read and write
6A9A000
trusted library allocation
page read and write
5B45000
trusted library allocation
page read and write
9647000
trusted library allocation
page read and write
5E70000
trusted library allocation
page read and write
5C3F000
trusted library allocation
page read and write
5C2A000
trusted library allocation
page read and write
5CCF000
trusted library allocation
page read and write
6A35000
trusted library allocation
page read and write
11CD000
unkown
page execute and read and write
6AC3000
trusted library allocation
page read and write
A690000
trusted library allocation
page read and write
4960000
direct allocation
page execute and read and write
298E000
stack
page read and write
5670000
heap
page read and write
68E9000
trusted library allocation
page read and write
5BEB000
trusted library allocation
page read and write
A630000
trusted library allocation
page read and write
4C96000
trusted library allocation
page execute and read and write
7C9E000
stack
page read and write
ABBE000
stack
page read and write
96C5000
trusted library allocation
page read and write
A652000
trusted library allocation
page read and write
6C4F000
trusted library allocation
page read and write
A910000
heap
page read and write
90C0000
trusted library allocation
page execute and read and write
7A90000
trusted library allocation
page read and write
6D58000
trusted library allocation
page read and write
A640000
trusted library allocation
page read and write
45F0000
heap
page read and write
1F50000
heap
page read and write
A6CB000
trusted library allocation
page read and write
26B6000
heap
page read and write
6D0C000
trusted library allocation
page read and write
9635000
trusted library allocation
page read and write
6AAA000
trusted library allocation
page read and write
AB00000
trusted library allocation
page execute and read and write
598A000
trusted library allocation
page read and write
6CC2000
trusted library allocation
page read and write
4130000
direct allocation
page execute and read and write
A4CB000
heap
page read and write
5BD8000
trusted library allocation
page read and write
6ABE000
trusted library allocation
page read and write
5EEA000
trusted library allocation
page read and write
5DBD000
trusted library allocation
page read and write
7AD0000
trusted library allocation
page execute and read and write
59F7000
trusted library allocation
page read and write
9BDE000
stack
page read and write
5B2E000
trusted library allocation
page read and write
4D10000
heap
page read and write
59D1000
trusted library allocation
page read and write
8028000
trusted library allocation
page read and write
962F000
stack
page read and write
5BE1000
trusted library allocation
page read and write
6D77000
trusted library allocation
page read and write
5A50000
trusted library allocation
page read and write
4D0E000
stack
page read and write
425D000
trusted library allocation
page execute and read and write
68F9000
trusted library allocation
page read and write
5DDC000
trusted library allocation
page read and write
6CBE000
trusted library allocation
page read and write
AC3E000
stack
page read and write
5600000
trusted library allocation
page read and write
6881000
trusted library allocation
page read and write
A548000
heap
page read and write
7A85000
trusted library allocation
page read and write
5D95000
trusted library allocation
page read and write
1FFE000
stack
page read and write
A4B0000
heap
page read and write
A527000
heap
page read and write
5DE0000
trusted library allocation
page read and write
5AAB000
trusted library allocation
page read and write
AB10000
heap
page read and write
5610000
heap
page execute and read and write
688F000
trusted library allocation
page read and write
A8E0000
heap
page read and write
5ACB000
trusted library allocation
page read and write
3DA000
unkown
page execute and write copy
5B39000
trusted library allocation
page read and write
5ABA000
trusted library allocation
page read and write
5EAF000
trusted library allocation
page read and write
96B0000
trusted library allocation
page read and write
6CAF000
trusted library allocation
page read and write
68E4000
trusted library allocation
page read and write
4AAB000
direct allocation
page execute and read and write
6C98000
trusted library allocation
page read and write
6D25000
trusted library allocation
page read and write
7C50000
heap
page execute and read and write
7F840000
trusted library allocation
page execute and read and write
24CE000
heap
page read and write
23F7000
stack
page read and write
A67A000
trusted library allocation
page read and write
4280000
heap
page read and write
5C18000
trusted library allocation
page read and write
26AD000
heap
page read and write
6CEE000
trusted library allocation
page read and write
59C4000
trusted library allocation
page read and write
A64B000
trusted library allocation
page read and write
5AB3000
trusted library allocation
page read and write
5EDD000
trusted library allocation
page read and write
967B000
trusted library allocation
page read and write
1FAE000
stack
page read and write
6A41000
trusted library allocation
page read and write
6993000
trusted library allocation
page read and write
4CA5000
trusted library allocation
page execute and read and write
A58F000
heap
page read and write
6CC7000
trusted library allocation
page read and write
5AA8000
trusted library allocation
page read and write
999C000
stack
page read and write
4A60000
direct allocation
page execute and read and write
A680000
trusted library allocation
page read and write
B41E000
stack
page read and write
1EE9000
stack
page read and write
6A62000
trusted library allocation
page read and write
6AB3000
trusted library allocation
page read and write
6AB0000
trusted library allocation
page read and write
6B04000
trusted library allocation
page read and write
55E0000
trusted library allocation
page read and write
6AE6000
trusted library allocation
page read and write
AC7E000
stack
page read and write
9900000
trusted library allocation
page read and write
5B4A000
trusted library allocation
page read and write
6963000
trusted library allocation
page read and write
68B3000
trusted library allocation
page read and write
98F0000
trusted library allocation
page read and write
5D84000
trusted library allocation
page read and write
50A000
unkown
page execute and read and write
4860000
direct allocation
page execute and read and write
6910000
trusted library allocation
page read and write
ABFE000
stack
page read and write
4CA2000
trusted library allocation
page read and write
6C88000
trusted library allocation
page read and write
A6A0000
trusted library allocation
page read and write
6C7B000
trusted library allocation
page read and write
1F55000
heap
page read and write
5CE9000
trusted library allocation
page read and write
690A000
trusted library allocation
page read and write
AB20000
trusted library allocation
page execute and read and write
9760000
trusted library allocation
page execute and read and write
24E5000
heap
page read and write
5CB9000
trusted library allocation
page read and write
5CDC000
trusted library allocation
page read and write
6D51000
trusted library allocation
page read and write
6C8D000
trusted library allocation
page read and write
6AA7000
trusted library allocation
page read and write
6928000
trusted library allocation
page read and write
9920000
trusted library allocation
page read and write
5EB9000
trusted library allocation
page read and write
7FDE000
stack
page read and write
3D6000
unkown
page readonly
AB30000
trusted library allocation
page read and write
5E7C000
trusted library allocation
page read and write
9692000
trusted library allocation
page read and write
A66A000
trusted library allocation
page read and write
6D19000
trusted library allocation
page read and write
5D23000
trusted library allocation
page read and write
2440000
heap
page read and write
59F0000
trusted library allocation
page read and write
4C9A000
trusted library allocation
page execute and read and write
4AA8000
direct allocation
page execute and read and write
9940000
trusted library allocation
page read and write
5646000
trusted library allocation
page read and write
5D0D000
trusted library allocation
page read and write
96E0000
trusted library allocation
page read and write
24B0000
heap
page read and write
7AC0000
trusted library allocation
page read and write
4760000
direct allocation
page execute and read and write
533F000
stack
page read and write
5E89000
trusted library allocation
page read and write
7EC8000
heap
page read and write
91CE000
stack
page read and write
5D02000
trusted library allocation
page read and write
1F60000
heap
page read and write
26A2000
heap
page read and write
6CB5000
trusted library allocation
page read and write
5B3000
unkown
page execute and read and write
A650000
trusted library allocation
page read and write
553E000
stack
page read and write
AC90000
trusted library allocation
page read and write
5ED0000
trusted library allocation
page read and write
5C34000
trusted library allocation
page read and write
901F000
stack
page read and write
969E000
trusted library allocation
page read and write
6A6D000
trusted library allocation
page read and write
6C69000
trusted library allocation
page read and write
6D46000
trusted library allocation
page read and write
5620000
trusted library allocation
page read and write
9770000
trusted library allocation
page execute and read and write
96C0000
trusted library allocation
page read and write
6D07000
trusted library allocation
page read and write
B07E000
stack
page read and write
68EE000
trusted library allocation
page read and write
6C5C000
trusted library allocation
page read and write
69A8000
trusted library allocation
page read and write
9B9C000
stack
page read and write
59E5000
trusted library allocation
page read and write
A698000
trusted library allocation
page read and write
5DEC000
trusted library allocation
page read and write
9030000
trusted library allocation
page read and write
A4B7000
heap
page read and write
5BA1000
trusted library allocation
page read and write
4C90000
trusted library allocation
page read and write
6917000
trusted library allocation
page read and write
5CB0000
trusted library allocation
page read and write
5E26000
trusted library allocation
page read and write
59DE000
trusted library allocation
page read and write
6D5D000
trusted library allocation
page read and write
5927000
trusted library allocation
page read and write
6CFE000
trusted library allocation
page read and write
55F0000
trusted library allocation
page read and write
6AED000
trusted library allocation
page read and write
26A7000
heap
page read and write
45E0000
heap
page read and write
6926000
trusted library allocation
page read and write
5EB4000
trusted library allocation
page read and write
5A2B000
trusted library allocation
page read and write
6CA8000
trusted library allocation
page read and write
6AA0000
trusted library allocation
page read and write
6D04000
trusted library allocation
page read and write
5B27000
trusted library allocation
page read and write
6D3F000
trusted library allocation
page read and write
A926000
heap
page read and write
4270000
trusted library allocation
page read and write
5C2F000
trusted library allocation
page read and write
A4F3000
heap
page read and write
6A7E000
trusted library allocation
page read and write
68DD000
trusted library allocation
page read and write
6D12000
trusted library allocation
page read and write
5AD8000
trusted library allocation
page read and write
5ADD000
trusted library allocation
page read and write
6903000
trusted library allocation
page read and write
6A89000
trusted library allocation
page read and write
4C8E000
stack
page read and write
8E1F000
stack
page read and write
2586000
heap
page read and write
9740000
trusted library allocation
page read and write
6D62000
trusted library allocation
page read and write
3DA000
unkown
page execute and read and write
694A000
trusted library allocation
page read and write
698E000
trusted library allocation
page read and write
24C0000
heap
page read and write
6977000
trusted library allocation
page read and write
6CD1000
trusted library allocation
page read and write
A589000
heap
page read and write
5C79000
trusted library allocation
page read and write
5AE8000
trusted library allocation
page read and write
5E66000
trusted library allocation
page read and write
5C4B000
trusted library allocation
page read and write
A668000
trusted library allocation
page read and write
A67F000
trusted library allocation
page read and write
A6D0000
heap
page read and write
5E96000
trusted library allocation
page read and write
6933000
trusted library allocation
page read and write
9BF0000
trusted library allocation
page read and write
6A79000
trusted library allocation
page read and write
7F8A0000
direct allocation
page execute and read and write
A648000
trusted library allocation
page read and write
4CC0000
trusted library allocation
page read and write
2450000
direct allocation
page execute and read and write
A6C0000
trusted library allocation
page read and write
A66F000
trusted library allocation
page read and write
5C04000
trusted library allocation
page read and write
9950000
trusted library allocation
page execute and read and write
5E9D000
trusted library allocation
page read and write
9700000
trusted library allocation
page read and write
881E000
stack
page read and write
18F3000
unkown
page execute and write copy
A4AC000
stack
page read and write
6D0A000
trusted library allocation
page read and write
4C92000
trusted library allocation
page read and write
5DD6000
trusted library allocation
page read and write
5EE8000
trusted library allocation
page read and write
3A0000
unkown
page readonly
5D8E000
trusted library allocation
page read and write
5E5D000
trusted library allocation
page read and write
699F000
trusted library allocation
page read and write
9020000
trusted library allocation
page read and write
1F40000
heap
page read and write
5DA3000
trusted library allocation
page read and write
7C40000
trusted library allocation
page execute and read and write
6A5B000
trusted library allocation
page read and write
692E000
trusted library allocation
page read and write
4285000
heap
page read and write
5AB7000
trusted library allocation
page read and write
93CE000
stack
page read and write
4240000
trusted library allocation
page read and write
5AC0000
trusted library allocation
page read and write
96F0000
trusted library allocation
page read and write
4660000
direct allocation
page execute and read and write
4254000
trusted library allocation
page read and write
5C11000
trusted library allocation
page read and write
6989000
trusted library allocation
page read and write
9649000
trusted library allocation
page read and write
9686000
trusted library allocation
page read and write
2668000
heap
page read and write
5EA8000
trusted library allocation
page read and write
A684000
trusted library allocation
page read and write
587E000
stack
page read and write
2691000
heap
page read and write
6956000
trusted library allocation
page read and write
4250000
trusted library allocation
page read and write
5B61000
trusted library allocation
page read and write
A6B0000
trusted library allocation
page read and write
4A93000
direct allocation
page execute and read and write
6AF9000
trusted library allocation
page read and write
4260000
heap
page read and write
97D0000
trusted library allocation
page execute and read and write
6D6D000
trusted library allocation
page read and write
A4E2000
heap
page read and write
9930000
trusted library allocation
page execute and read and write
3A0000
unkown
page readonly
A59F000
heap
page read and write
691A000
trusted library allocation
page read and write
59FD000
trusted library allocation
page read and write
428E000
heap
page read and write
9BF5000
trusted library allocation
page read and write
942E000
stack
page read and write
6C70000
trusted library allocation
page read and write
6A4E000
trusted library allocation
page read and write
5CFB000
trusted library allocation
page read and write
B2E0000
heap
page read and write
269B000
heap
page read and write
5BE9000
trusted library allocation
page read and write
4CA7000
trusted library allocation
page execute and read and write
A675000
trusted library allocation
page read and write
5DCF000
trusted library allocation
page read and write
5CF0000
trusted library allocation
page read and write
7EC3000
heap
page read and write
260E000
heap
page read and write
5BF7000
trusted library allocation
page read and write
564D000
trusted library allocation
page read and write
4CAB000
trusted library allocation
page execute and read and write
68A2000
trusted library allocation
page read and write
6CF4000
trusted library allocation
page read and write
6A13000
trusted library allocation
page read and write
A655000
trusted library allocation
page read and write
A57D000
heap
page read and write
9C5B000
stack
page read and write
6982000
trusted library allocation
page read and write
68D2000
trusted library allocation
page read and write
3A2000
unkown
page execute and write copy
4D13000
heap
page read and write
97C0000
trusted library allocation
page execute and read and write
8020000
trusted library allocation
page read and write
9640000
trusted library allocation
page read and write
9C60000
trusted library allocation
page execute and read and write
A4D1000
heap
page read and write
7E9E000
stack
page read and write
8C1E000
stack
page read and write
9681000
trusted library allocation
page read and write
A5AC000
heap
page read and write
6D32000
trusted library allocation
page read and write
6B10000
trusted library allocation
page read and write
87DE000
stack
page read and write
6AFC000
trusted library allocation
page read and write
427D000
trusted library allocation
page execute and read and write
A558000
heap
page read and write
6A33000
trusted library allocation
page read and write
5D97000
trusted library allocation
page read and write
5D29000
trusted library allocation
page read and write
5624000
trusted library allocation
page read and write
5B40000
trusted library allocation
page read and write
5DB0000
trusted library allocation
page read and write
6C82000
trusted library allocation
page read and write
68CB000
trusted library allocation
page read and write
6B23000
trusted library allocation
page read and write
5EEE000
trusted library allocation
page read and write
5548000
trusted library allocation
page read and write
B2BE000
stack
page read and write
524000
unkown
page execute and read and write
45D0000
heap
page read and write
5D19000
trusted library allocation
page read and write
5AA5000
trusted library allocation
page read and write
45CE000
stack
page read and write
6923000
trusted library allocation
page read and write
6AFE000
trusted library allocation
page read and write
562B000
trusted library allocation
page read and write
6AF6000
trusted library allocation
page read and write
25BD000
heap
page read and write
7AB0000
trusted library allocation
page read and write
68A5000
trusted library allocation
page read and write
25AF000
heap
page read and write
7AC2000
trusted library allocation
page read and write
5641000
trusted library allocation
page read and write
9750000
trusted library allocation
page read and write
885E000
stack
page read and write
6C2C000
trusted library allocation
page read and write
96A1000
trusted library allocation
page read and write
6C43000
trusted library allocation
page read and write
5E6E000
trusted library allocation
page read and write
5660000
trusted library allocation
page read and write
18F3000
unkown
page execute and read and write
A900000
heap
page read and write
6AB6000
trusted library allocation
page read and write
5EC4000
trusted library allocation
page read and write
6CFB000
trusted library allocation
page read and write
5DF7000
trusted library allocation
page read and write
4253000
trusted library allocation
page execute and read and write
59B7000
trusted library allocation
page read and write
5AD2000
trusted library allocation
page read and write
5D1E000
trusted library allocation
page read and write
4D60000
trusted library allocation
page execute and read and write
B61E000
stack
page read and write
9638000
trusted library allocation
page read and write
4CA0000
trusted library allocation
page read and write
5B56000
trusted library allocation
page read and write
5D07000
trusted library allocation
page read and write
6AB9000
trusted library allocation
page read and write
9645000
trusted library allocation
page read and write
9630000
trusted library allocation
page read and write
448E000
stack
page read and write
AB7D000
stack
page read and write
563E000
trusted library allocation
page read and write
9C70000
trusted library allocation
page read and write
5B1A000
trusted library allocation
page read and write
4D70000
heap
page read and write
6A74000
trusted library allocation
page read and write
7A7C000
stack
page read and write
4267000
heap
page read and write
25E0000
heap
page read and write
6920000
trusted library allocation
page read and write
9910000
trusted library allocation
page read and write
A659000
trusted library allocation
page read and write
6CB9000
trusted library allocation
page read and write
5DC4000
trusted library allocation
page read and write
96CE000
trusted library allocation
page read and write
A8DD000
stack
page read and write
5D4D000
trusted library allocation
page read and write
6CC4000
trusted library allocation
page read and write
69C3000
trusted library allocation
page read and write
96D0000
trusted library allocation
page read and write
2518000
heap
page read and write
B27E000
stack
page read and write
963A000
trusted library allocation
page read and write
68BE000
trusted library allocation
page read and write
9670000
trusted library allocation
page read and write
A517000
heap
page read and write
7EB2000
heap
page read and write
90E0000
trusted library allocation
page execute and read and write
6AF0000
trusted library allocation
page read and write
6CCD000
trusted library allocation
page read and write
4AA0000
direct allocation
page execute and read and write
5C23000
trusted library allocation
page read and write
There are 452 hidden memdumps, click here to show them.