IOC Report
file.exe

loading gif

Files

File Path
Type
Category
Malicious
file.exe
PE32 executable (console) Intel 80386, for MS Windows
initial sample
malicious
C:\Users\Public\Desktop\Google Chrome.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Description string, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:41 2023, mtime=Wed Oct 4 11:02:27 2023, atime=Wed Sep 27 04:28:27 2023, length=3242272, window=hide
dropped
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\RegAsm.exe.log
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\TmpCD1A.tmp
data
dropped
C:\Users\user\AppData\Local\Temp\TmpCD2B.tmp
data
dropped
C:\Users\user\AppData\Roaming\Microsoft\Crypto\RSA\S-1-5-21-2246122658-3693405117-2476756634-1002\76b53b3ec448f7ccdda2063b15d2bfc3_9e146be9-c76a-4720-bcdb-53011b87bd06
data
dropped

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\file.exe
"C:\Users\user\Desktop\file.exe"
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1

URLs

Name
IP
Malicious
http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-soap-message-security-1.0#Text
unknown
http://schemas.xmlsoap.org/ws/2005/02/sc/sct
unknown
https://duckduckgo.com/chrome_newtab
unknown
http://schemas.xmlsoap.org/ws/2004/04/security/sc/dk
unknown
https://duckduckgo.com/ac/?q=
unknown
http://tempuri.org/Entity/Id14ResponseD
unknown
http://tempuri.org/Entity/Id23ResponseD
unknown
http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-soap-message-security-1.0#HexBinary
unknown
http://tempuri.org/Entity/Id12Response
unknown
http://tempuri.org/
unknown
http://tempuri.org/Entity/Id2Response
unknown
http://schemas.xmlsoap.org/ws/2005/02/sc/dk/p_sha1
unknown
http://tempuri.org/Entity/Id21Response
unknown
http://schemas.xmlsoap.org/2005/02/trust/spnego#GSS_Wrap
unknown
http://tempuri.org/Entity/Id9
unknown
http://docs.oasis-open.org/wss/oasis-wss-saml-token-profile-1.1#SAMLID
unknown
http://tempuri.org/Entity/Id8
unknown
http://tempuri.org/Entity/Id6ResponseD
unknown
http://tempuri.org/Entity/Id5
unknown
http://schemas.xmlsoap.org/ws/2004/10/wsat/Prepare
unknown
http://tempuri.org/Entity/Id4
unknown
http://tempuri.org/Entity/Id7
unknown
http://tempuri.org/Entity/Id6
unknown
http://schemas.xmlsoap.org/ws/2005/02/trust#BinarySecret
unknown
http://tempuri.org/Entity/Id19Response
unknown
http://docs.oasis-open.org/wss/oasis-wss-rel-token-profile-1.0.pdf#license
unknown
http://schemas.xmlsoap.org/ws/2005/02/trust/RSTR/Issue
unknown
http://schemas.xmlsoap.org/ws/2004/10/wsat/Aborted
unknown
http://schemas.xmlsoap.org/ws/2005/02/rm/TerminateSequence
unknown
http://tempuri.org/Entity/Id13ResponseD
unknown
http://schemas.xmlsoap.org/ws/2004/10/wsat/fault
unknown
http://schemas.xmlsoap.org/ws/2004/10/wsat
unknown
http://docs.oasis-open.org/wss/oasis-wss-soap-message-security-1.1#EncryptedKey
unknown
http://tempuri.org/Entity/Id15Response
unknown
http://tempuri.org/Entity/Id5ResponseD
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
http://schemas.xmlsoap.org/ws/2005/02/trust/RSTR/SCT/Renew
unknown
http://schemas.xmlsoap.org/ws/2004/08/addressing/faultp9
unknown
http://schemas.xmlsoap.org/ws/2004/10/wscoor/Register
unknown
http://tempuri.org/Entity/Id6Response
unknown
http://schemas.xmlsoap.org/ws/2004/04/trust/SymmetricKey
unknown
https://api.ip.sb/ip
unknown
http://schemas.xmlsoap.org/ws/2004/04/sc
unknown
http://tempuri.org/Entity/Id1ResponseD
unknown
http://schemas.xmlsoap.org/ws/2004/10/wsat/Volatile2PC
unknown
http://schemas.xmlsoap.org/ws/2005/02/trust/RSTR/SCT/Cancel
unknown
http://tempuri.org/Entity/Id9Response
unknown
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
unknown
http://tempuri.org/Entity/Id20
unknown
http://tempuri.org/Entity/Id21
unknown
http://tempuri.org/Entity/Id22
unknown
http://docs.oasis-open.org/wss/oasis-wss-kerberos-token-profile-1.1#Kerberosv5APREQSHA1
unknown
http://tempuri.org/Entity/Id23
unknown
http://schemas.xmlsoap.org/ws/2004/04/security/trust/CK/PSHA1
unknown
http://tempuri.org/Entity/Id24
unknown
http://schemas.xmlsoap.org/ws/2004/04/security/trust/RSTR/Issue
unknown
http://tempuri.org/Entity/Id24Response
unknown
https://www.ecosia.org/newtab/
unknown
http://tempuri.org/Entity/Id1Response
unknown
http://schemas.xmlsoap.org/ws/2005/02/rm/AckRequested
unknown
http://schemas.xmlsoap.org/ws/2004/10/wsat/ReadOnly
unknown
http://schemas.xmlsoap.org/ws/2004/10/wsat/Replay
unknown
http://schemas.xmlsoap.org/ws/2005/02/trust/tlsnego
unknown
http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-soap-message-security-1.0#Base64Binary
unknown
http://schemas.xmlsoap.org/ws/2004/10/wsat/Durable2PC
unknown
http://schemas.xmlsoap.org/ws/2004/04/security/trust/SymmetricKey
unknown
http://tempuri.org/Entity/Id21ResponseD
unknown
http://schemas.xmlsoap.org/ws/2004/08/addressing
unknown
http://schemas.xmlsoap.org/ws/2005/02/trust/RST/Issue
unknown
http://schemas.xmlsoap.org/ws/2004/10/wsat/Completion
unknown
http://schemas.xmlsoap.org/ws/2004/04/trust
unknown
http://tempuri.org/Entity/Id10
unknown
http://tempuri.org/Entity/Id11
unknown
http://tempuri.org/Entity/Id10ResponseD
unknown
http://tempuri.org/Entity/Id12
unknown
http://tempuri.org/Entity/Id16Response
unknown
http://schemas.xmlsoap.org/ws/2004/10/wscoor/CreateCoordinationContextResponse
unknown
http://schemas.xmlsoap.org/ws/2005/02/trust/RST/SCT/Cancel
unknown
http://tempuri.org/Entity/Id13
unknown
http://tempuri.org/Entity/Id14
unknown
http://tempuri.org/Entity/Id15
unknown
http://tempuri.org/Entity/Id16
unknown
http://schemas.xmlsoap.org/ws/2005/02/trust/Nonce
unknown
http://tempuri.org/Entity/Id17
unknown
http://tempuri.org/Entity/Id18
unknown
http://tempuri.org/Entity/Id5Response
unknown
http://tempuri.org/Entity/Id19
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/dns
unknown
http://tempuri.org/Entity/Id15ResponseD
unknown
http://tempuri.org/Entity/Id10Response
unknown
http://schemas.xmlsoap.org/ws/2005/02/trust/Renew
unknown
http://tempuri.org/Entity/Id11ResponseD
unknown
http://tempuri.org/Entity/Id8Response
unknown
http://schemas.xmlsoap.org/ws/2004/04/trust/PublicKey
unknown
http://docs.oasis-open.org/wss/oasis-wss-saml-token-profile-1.1#SAMLV2.0
unknown
http://docs.oasis-open.org/wss/oasis-wss-saml-token-profile-1.0#SAMLAssertionID
unknown
http://schemas.xmlsoap.org/ws/2004/04/security/trust/RST/SCT
unknown
http://schemas.xmlsoap.org/ws/2006/02/addressingidentity
unknown
http://tempuri.org/Entity/Id17ResponseD
unknown
http://schemas.xmlsoap.org/soap/envelope/
unknown
There are 90 hidden URLs, click here to show them.

IPs

IP
Domain
Country
Malicious
5.42.65.96
unknown
Russian Federation
malicious

Registry

Path
Value
Malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\F1A578C4CB5DE79A370893983FD4DA8B67B2B064
Blob
malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
Owner
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
SessionHash
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
Sequence
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
RegFiles0000
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
RegFilesHash

Memdumps

Base Address
Regiontype
Protect
Malicious
30F7000
trusted library allocation
page read and write
malicious
89D000
unkown
page read and write
malicious
3051000
trusted library allocation
page read and write
malicious
402000
remote allocation
page execute and read and write
malicious
41D8000
trusted library allocation
page read and write
421A000
trusted library allocation
page read and write
4228000
trusted library allocation
page read and write
33B7000
trusted library allocation
page read and write
D8A000
stack
page read and write
429A000
trusted library allocation
page read and write
12B0000
trusted library allocation
page read and write
32FE000
trusted library allocation
page read and write
7855000
heap
page read and write
8E2000
unkown
page read and write
437000
remote allocation
page execute and read and write
31BB000
trusted library allocation
page read and write
4080000
trusted library allocation
page read and write
7991000
heap
page read and write
4354000
trusted library allocation
page read and write
4472000
trusted library allocation
page read and write
5A9B000
heap
page read and write
7EE40000
trusted library allocation
page execute and read and write
4513000
trusted library allocation
page read and write
17A4000
trusted library allocation
page read and write
3209000
trusted library allocation
page read and write
43C4000
trusted library allocation
page read and write
6B1B000
trusted library allocation
page read and write
3497000
trusted library allocation
page read and write
7C78000
trusted library allocation
page read and write
346E000
trusted library allocation
page read and write
740000
heap
page read and write
148D000
heap
page read and write
149F000
heap
page read and write
12B2000
trusted library allocation
page read and write
4258000
trusted library allocation
page read and write
3600000
trusted library allocation
page read and write
5623000
heap
page read and write
70C6000
trusted library allocation
page read and write
32DB000
trusted library allocation
page read and write
5883000
heap
page execute and read and write
6B65000
trusted library allocation
page read and write
43CC000
trusted library allocation
page read and write
425F000
trusted library allocation
page read and write
7A50000
trusted library allocation
page execute and read and write
5592000
trusted library allocation
page read and write
129D000
trusted library allocation
page execute and read and write
560E000
stack
page read and write
7120000
trusted library allocation
page read and write
3273000
trusted library allocation
page read and write
5A30000
trusted library allocation
page read and write
7C4F000
trusted library allocation
page read and write
35E0000
trusted library allocation
page read and write
4528000
trusted library allocation
page read and write
4403000
trusted library allocation
page read and write
793C000
heap
page read and write
40D6000
trusted library allocation
page read and write
42B3000
trusted library allocation
page read and write
5A2E000
stack
page read and write
6B6E000
trusted library allocation
page read and write
44A2000
trusted library allocation
page read and write
78A3000
heap
page read and write
446C000
trusted library allocation
page read and write
33BA000
trusted library allocation
page read and write
3649000
trusted library allocation
page read and write
7C70000
trusted library allocation
page read and write
8D3000
unkown
page read and write
6B21000
trusted library allocation
page read and write
183E000
heap
page read and write
13EB000
heap
page read and write
6DF0000
trusted library allocation
page execute and read and write
5A40000
heap
page read and write
447E000
trusted library allocation
page read and write
433D000
trusted library allocation
page read and write
329C000
trusted library allocation
page read and write
4378000
trusted library allocation
page read and write
6B41000
trusted library allocation
page read and write
6F9E000
stack
page read and write
7C35000
trusted library allocation
page read and write
14DD000
heap
page read and write
44DC000
trusted library allocation
page read and write
12C7000
trusted library allocation
page execute and read and write
89F000
unkown
page write copy
6BA0000
trusted library allocation
page read and write
43A8000
trusted library allocation
page read and write
6DC0000
heap
page execute and read and write
4295000
trusted library allocation
page read and write
44F0000
trusted library allocation
page read and write
1835000
heap
page read and write
430C000
trusted library allocation
page read and write
360E000
trusted library allocation
page read and write
70C8000
trusted library allocation
page read and write
74A000
heap
page read and write
4325000
trusted library allocation
page read and write
1293000
trusted library allocation
page execute and read and write
132E000
stack
page read and write
13BB000
stack
page read and write
4505000
trusted library allocation
page read and write
3196000
trusted library allocation
page read and write
812E000
stack
page read and write
43C1000
trusted library allocation
page read and write
432F000
trusted library allocation
page read and write
5A50000
heap
page read and write
794D000
heap
page read and write
7C80000
trusted library allocation
page read and write
434F000
trusted library allocation
page read and write
6C60000
trusted library allocation
page execute and read and write
17CD000
trusted library allocation
page read and write
3565000
trusted library allocation
page read and write
7C0D000
stack
page read and write
826E000
stack
page read and write
2F4E000
stack
page read and write
421D000
trusted library allocation
page read and write
1240000
heap
page read and write
3198000
trusted library allocation
page read and write
796D000
heap
page read and write
6C00000
trusted library allocation
page execute and read and write
13D0000
trusted library allocation
page execute and read and write
33AC000
trusted library allocation
page read and write
4348000
trusted library allocation
page read and write
14A7000
heap
page read and write
452D000
trusted library allocation
page read and write
1290000
trusted library allocation
page read and write
78F0000
heap
page read and write
5B3C000
heap
page read and write
405F000
trusted library allocation
page read and write
5BCE000
stack
page read and write
5580000
heap
page read and write
3620000
trusted library allocation
page read and write
17F0000
trusted library allocation
page read and write
3262000
trusted library allocation
page read and write
4479000
trusted library allocation
page read and write
7C4A000
trusted library allocation
page read and write
3355000
trusted library allocation
page read and write
1280000
trusted library allocation
page read and write
17A0000
trusted library allocation
page read and write
80EF000
stack
page read and write
353E000
trusted library allocation
page read and write
431C000
trusted library allocation
page read and write
6DB0000
trusted library allocation
page read and write
9EE000
stack
page read and write
7888000
heap
page read and write
12AD000
trusted library allocation
page execute and read and write
7AA0000
trusted library allocation
page read and write
1670000
trusted library allocation
page read and write
4051000
trusted library allocation
page read and write
43A3000
trusted library allocation
page read and write
32CB000
trusted library allocation
page read and write
5A92000
heap
page read and write
78E4000
heap
page read and write
5590000
trusted library allocation
page read and write
31FF000
trusted library allocation
page read and write
7C32000
trusted library allocation
page read and write
19C000
stack
page read and write
6950000
trusted library allocation
page read and write
6AE9000
trusted library allocation
page read and write
4E0000
heap
page read and write
359C000
trusted library allocation
page read and write
3270000
trusted library allocation
page read and write
4220000
trusted library allocation
page read and write
5AC1000
heap
page read and write
78C2000
heap
page read and write
33D2000
trusted library allocation
page read and write
4274000
trusted library allocation
page read and write
33F7000
trusted library allocation
page read and write
62B7000
heap
page read and write
78F8000
heap
page read and write
14D9000
heap
page read and write
7929000
heap
page read and write
436A000
trusted library allocation
page read and write
435B000
trusted library allocation
page read and write
41FB000
trusted library allocation
page read and write
791D000
heap
page read and write
6DE0000
trusted library allocation
page read and write
12A0000
trusted library allocation
page read and write
42A7000
trusted library allocation
page read and write
35D5000
trusted library allocation
page read and write
6DD0000
trusted library allocation
page read and write
6F5C000
stack
page read and write
4271000
trusted library allocation
page read and write
3287000
trusted library allocation
page read and write
44C0000
trusted library allocation
page read and write
3217000
trusted library allocation
page read and write
35CB000
trusted library allocation
page read and write
7D9E000
stack
page read and write
78B2000
heap
page read and write
836E000
stack
page read and write
3222000
trusted library allocation
page read and write
7C20000
trusted library allocation
page read and write
3230000
trusted library allocation
page read and write
8EC000
unkown
page readonly
59E0000
trusted library allocation
page read and write
17C1000
trusted library allocation
page read and write
674F000
stack
page read and write
449A000
trusted library allocation
page read and write
6C70000
trusted library allocation
page execute and read and write
42C2000
trusted library allocation
page read and write
822E000
stack
page read and write
33F9000
trusted library allocation
page read and write
871000
unkown
page execute read
3352000
trusted library allocation
page read and write
7AA2000
trusted library allocation
page read and write
345D000
trusted library allocation
page read and write
1489000
heap
page read and write
69E0000
trusted library allocation
page execute and read and write
3361000
trusted library allocation
page read and write
6DA0000
trusted library allocation
page read and write
3476000
trusted library allocation
page read and write
6B3E000
trusted library allocation
page read and write
43D7000
trusted library allocation
page read and write
4497000
trusted library allocation
page read and write
694F000
stack
page read and write
7D3E000
stack
page read and write
554E000
trusted library allocation
page read and write
12C2000
trusted library allocation
page read and write
6AD5000
trusted library allocation
page read and write
342A000
trusted library allocation
page read and write
2370000
heap
page read and write
17C6000
trusted library allocation
page read and write
6ADA000
trusted library allocation
page read and write
43BE000
trusted library allocation
page read and write
42AC000
trusted library allocation
page read and write
17FE000
trusted library allocation
page read and write
648F000
stack
page read and write
7850000
heap
page read and write
586E000
stack
page read and write
7C90000
trusted library allocation
page read and write
4319000
trusted library allocation
page read and write
78D0000
heap
page read and write
6B90000
trusted library allocation
page read and write
41E5000
trusted library allocation
page read and write
43FC000
trusted library allocation
page read and write
3409000
trusted library allocation
page read and write
43EA000
trusted library allocation
page read and write
74E000
heap
page read and write
42E9000
trusted library allocation
page read and write
1294000
trusted library allocation
page read and write
33CE000
trusted library allocation
page read and write
13E0000
heap
page read and write
3134000
trusted library allocation
page read and write
6E5C000
stack
page read and write
44D2000
trusted library allocation
page read and write
4209000
trusted library allocation
page read and write
4246000
trusted library allocation
page read and write
4396000
trusted library allocation
page read and write
43F7000
trusted library allocation
page read and write
436D000
trusted library allocation
page read and write
6AD0000
trusted library allocation
page read and write
3406000
trusted library allocation
page read and write
5AF1000
heap
page read and write
6E10000
trusted library allocation
page execute and read and write
42C8000
trusted library allocation
page read and write
1810000
trusted library allocation
page read and write
6B60000
trusted library allocation
page read and write
11D0000
heap
page read and write
8EB000
unkown
page execute and read and write
4093000
trusted library allocation
page read and write
17AB000
trusted library allocation
page read and write
3468000
trusted library allocation
page read and write
6BF0000
trusted library allocation
page read and write
3358000
trusted library allocation
page read and write
42DB000
trusted library allocation
page read and write
12E0000
heap
page read and write
33CC000
trusted library allocation
page read and write
42A0000
trusted library allocation
page read and write
59CE000
stack
page read and write
4085000
trusted library allocation
page read and write
870000
unkown
page readonly
3403000
trusted library allocation
page read and write
44FA000
trusted library allocation
page read and write
1330000
trusted library allocation
page read and write
6B10000
trusted library allocation
page read and write
6B70000
trusted library allocation
page read and write
7862000
heap
page read and write
59D0000
heap
page read and write
1830000
heap
page read and write
17E0000
trusted library allocation
page read and write
4342000
trusted library allocation
page read and write
59EC000
trusted library allocation
page read and write
710C000
stack
page read and write
35F9000
trusted library allocation
page read and write
6C10000
trusted library allocation
page execute and read and write
893000
unkown
page readonly
6A00000
trusted library allocation
page execute and read and write
1805000
trusted library allocation
page read and write
42C5000
trusted library allocation
page read and write
424C000
trusted library allocation
page read and write
4072000
trusted library allocation
page read and write
7C5A000
trusted library allocation
page read and write
448A000
trusted library allocation
page read and write
3411000
trusted library allocation
page read and write
7C5F000
trusted library allocation
page read and write
44BB000
trusted library allocation
page read and write
62A2000
heap
page read and write
6BE0000
trusted library allocation
page read and write
5058000
trusted library allocation
page read and write
7110000
trusted library allocation
page execute and read and write
43AF000
trusted library allocation
page read and write
6D90000
trusted library allocation
page read and write
453A000
trusted library allocation
page read and write
5A38000
trusted library allocation
page read and write
3558000
trusted library allocation
page read and write
8380000
trusted library allocation
page read and write
41E2000
trusted library allocation
page read and write
52E000
stack
page read and write
1820000
heap
page execute and read and write
31A8000
trusted library allocation
page read and write
13C0000
heap
page read and write
346B000
trusted library allocation
page read and write
5B8E000
stack
page read and write
41F0000
trusted library allocation
page read and write
6AE7000
trusted library allocation
page read and write
42EE000
trusted library allocation
page read and write
7C10000
trusted library allocation
page execute and read and write
42F4000
trusted library allocation
page read and write
7955000
heap
page read and write
451E000
trusted library allocation
page read and write
89D000
unkown
page write copy
4079000
trusted library allocation
page read and write
31FD000
trusted library allocation
page read and write
70C0000
trusted library allocation
page read and write
432000
remote allocation
page execute and read and write
4264000
trusted library allocation
page read and write
4485000
trusted library allocation
page read and write
7893000
heap
page read and write
3482000
trusted library allocation
page read and write
12C0000
trusted library allocation
page read and write
17BE000
trusted library allocation
page read and write
1800000
trusted library allocation
page read and write
1414000
heap
page read and write
320C000
trusted library allocation
page read and write
7900000
heap
page read and write
628E000
stack
page read and write
893000
unkown
page readonly
3380000
trusted library allocation
page read and write
336D000
trusted library allocation
page read and write
34D3000
trusted library allocation
page read and write
7C55000
trusted library allocation
page read and write
4253000
trusted library allocation
page read and write
3432000
trusted library allocation
page read and write
42FB000
trusted library allocation
page read and write
337A000
trusted library allocation
page read and write
12E5000
heap
page read and write
4534000
trusted library allocation
page read and write
7C39000
trusted library allocation
page read and write
326D000
trusted library allocation
page read and write
3612000
trusted library allocation
page read and write
6BB0000
trusted library allocation
page read and write
4383000
trusted library allocation
page read and write
4307000
trusted library allocation
page read and write
56E000
stack
page read and write
4241000
trusted library allocation
page read and write
6EF000
stack
page read and write
327B000
trusted library allocation
page read and write
4459000
trusted library allocation
page read and write
62B3000
heap
page read and write
3563000
trusted library allocation
page read and write
5E0000
heap
page read and write
334A000
trusted library allocation
page read and write
5BD0000
trusted library allocation
page read and write
31C9000
trusted library allocation
page read and write
871000
unkown
page execute read
439C000
trusted library allocation
page read and write
12CB000
trusted library allocation
page execute and read and write
348F000
trusted library allocation
page read and write
6B50000
trusted library allocation
page read and write
12BA000
trusted library allocation
page execute and read and write
3238000
trusted library allocation
page read and write
DF0000
heap
page read and write
9C000
stack
page read and write
6B32000
trusted library allocation
page read and write
31A5000
trusted library allocation
page read and write
33C7000
trusted library allocation
page read and write
4370000
trusted library allocation
page read and write
426E000
trusted library allocation
page read and write
4233000
trusted library allocation
page read and write
5620000
heap
page read and write
4467000
trusted library allocation
page read and write
7866000
heap
page read and write
42D0000
trusted library allocation
page read and write
3549000
trusted library allocation
page read and write
787C000
heap
page read and write
35EE000
trusted library allocation
page read and write
44AD000
trusted library allocation
page read and write
400000
remote allocation
page execute and read and write
6B80000
trusted library allocation
page read and write
443E000
trusted library allocation
page read and write
7913000
heap
page read and write
3294000
trusted library allocation
page read and write
6B6B000
trusted library allocation
page read and write
80AE000
stack
page read and write
5B49000
heap
page read and write
12C5000
trusted library allocation
page execute and read and write
42B8000
trusted library allocation
page read and write
5540000
trusted library allocation
page read and write
3569000
trusted library allocation
page read and write
799F000
heap
page read and write
684E000
stack
page read and write
4391000
trusted library allocation
page read and write
786F000
heap
page read and write
7C30000
trusted library allocation
page read and write
4300000
trusted library allocation
page read and write
444E000
trusted library allocation
page read and write
7B00000
heap
page read and write
44D9000
trusted library allocation
page read and write
70A0000
trusted library allocation
page read and write
4316000
trusted library allocation
page read and write
43B4000
trusted library allocation
page read and write
1421000
heap
page read and write
6AE0000
trusted library allocation
page read and write
17D2000
trusted library allocation
page read and write
6AD8000
trusted library allocation
page read and write
5A6C000
heap
page read and write
4210000
trusted library allocation
page read and write
7D50000
trusted library allocation
page execute and read and write
870000
unkown
page readonly
709C000
stack
page read and write
12B6000
trusted library allocation
page execute and read and write
7C64000
trusted library allocation
page read and write
408F000
trusted library allocation
page read and write
5B3F000
heap
page read and write
4287000
trusted library allocation
page read and write
3386000
trusted library allocation
page read and write
1790000
trusted library allocation
page read and write
43F0000
trusted library allocation
page read and write
798A000
heap
page read and write
31D1000
trusted library allocation
page read and write
137E000
stack
page read and write
44CD000
trusted library allocation
page read and write
31A2000
trusted library allocation
page read and write
43E5000
trusted library allocation
page read and write
3505000
trusted library allocation
page read and write
400000
heap
page read and write
320F000
trusted library allocation
page read and write
6B26000
trusted library allocation
page read and write
5B4E000
heap
page read and write
4494000
trusted library allocation
page read and write
31B0000
trusted library allocation
page read and write
7D40000
trusted library allocation
page read and write
3615000
trusted library allocation
page read and write
59E9000
trusted library allocation
page read and write
6AE5000
trusted library allocation
page read and write
55A0000
trusted library allocation
page execute and read and write
34C2000
trusted library allocation
page read and write
598F000
stack
page read and write
178E000
stack
page read and write
304E000
stack
page read and write
790C000
heap
page read and write
7931000
heap
page read and write
5B29000
heap
page read and write
427C000
trusted library allocation
page read and write
7C48000
trusted library allocation
page read and write
1680000
heap
page read and write
51EC000
stack
page read and write
4360000
trusted library allocation
page read and write
8EC000
unkown
page readonly
10F7000
stack
page read and write
123E000
stack
page read and write
14CC000
heap
page read and write
7DDE000
stack
page read and write
34CD000
trusted library allocation
page read and write
7995000
heap
page read and write
361B000
trusted library allocation
page read and write
41E8000
trusted library allocation
page read and write
5880000
heap
page execute and read and write
44C6000
trusted library allocation
page read and write
341C000
trusted library allocation
page read and write
446000
remote allocation
page execute and read and write
7C60000
trusted library allocation
page read and write
4416000
trusted library allocation
page read and write
7750000
heap
page read and write
7CFD000
stack
page read and write
408C000
trusted library allocation
page read and write
There are 462 hidden memdumps, click here to show them.