IOC Report
14OWDrfahJ.exe

loading gif

Files

File Path
Type
Category
Malicious
14OWDrfahJ.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\ProgramData\OfficeTrackerNMP131\OfficeTrackerNMP131.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\MaxLoonaFest131\MaxLoonaFest131.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\FANBooster131\FANBooster131.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\IXP000.TMP\5Rp2df8.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\IXP000.TMP\Ey3OF47.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\IXP001.TMP\4eD052Od.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\IXP001.TMP\BC5tT98.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\IXP002.TMP\2Iu7231.exe
PE32 executable (console) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\IXP002.TMP\3rB05VU.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\AppLaunch.exe.log
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\9qAkkNWhLDEhe3SVi3MbZOkApbYumn_h.zip
Zip archive data, at least v2.0 to extract, compression method=deflate
dropped
C:\Users\user\AppData\Local\Temp\i0Y2zBdGkYmG70fPowdUhlT85ovTRCZq.zip
Zip archive data, at least v2.0 to extract, compression method=deflate
dropped
C:\Users\user\AppData\Local\Temp\rise131M9Asphalt.tmp
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\tempAVSaeI8GhtgT29e\02zdBXl47cvzHistory
SQLite 3.x database, last written using SQLite version 3042000, file counter 4, database pages 39, cookie 0x20, schema 4, UTF-8, version-valid-for 4
dropped
C:\Users\user\AppData\Local\Temp\tempAVSaeI8GhtgT29e\02zdBXl47cvzcookies.sqlite
SQLite 3.x database, user version 12, last written using SQLite version 3042000, page size 32768, writer version 2, read version 2, file counter 3, database pages 3, cookie 0x1, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\tempAVSaeI8GhtgT29e\2jQJv37iJ0lzHistory
SQLite 3.x database, last written using SQLite version 3035005, file counter 2, database pages 31, cookie 0x18, schema 4, UTF-8, version-valid-for 2
dropped
C:\Users\user\AppData\Local\Temp\tempAVSaeI8GhtgT29e\3b6N2Xdh3CYwWeb Data
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\tempAVSaeI8GhtgT29e\3b6N2Xdh3CYwplaces.sqlite
SQLite 3.x database, user version 75, last written using SQLite version 3042000, page size 32768, writer version 2, read version 2, file counter 2, database pages 46, cookie 0x26, schema 4, UTF-8, version-valid-for 2
dropped
C:\Users\user\AppData\Local\Temp\tempAVSaeI8GhtgT29e\8ghN89CsjOW1Login Data For Account
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\tempAVSaeI8GhtgT29e\D87fZN3R3jFeWeb Data
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\tempAVSaeI8GhtgT29e\D87fZN3R3jFeplaces.sqlite
SQLite 3.x database, user version 75, last written using SQLite version 3042000, page size 32768, writer version 2, read version 2, file counter 2, database pages 46, cookie 0x26, schema 4, UTF-8, version-valid-for 2
dropped
C:\Users\user\AppData\Local\Temp\tempAVSaeI8GhtgT29e\Ei8DrAmaYu9KLogin Data
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\tempAVSaeI8GhtgT29e\IWPfiAXUTJTSHistory
SQLite 3.x database, last written using SQLite version 3042000, file counter 4, database pages 39, cookie 0x20, schema 4, UTF-8, version-valid-for 4
dropped
C:\Users\user\AppData\Local\Temp\tempAVSaeI8GhtgT29e\JX0OQi4nZtiqWeb Data
SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 2, database pages 56, cookie 0x24, schema 4, UTF-8, version-valid-for 2
dropped
C:\Users\user\AppData\Local\Temp\tempAVSaeI8GhtgT29e\QdX9ITDLyCRBLogin Data
SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 1, database pages 24, cookie 0xe, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\tempAVSaeI8GhtgT29e\UPG2LoPXwc7OHistory
SQLite 3.x database, last written using SQLite version 3035005, file counter 2, database pages 31, cookie 0x18, schema 4, UTF-8, version-valid-for 2
dropped
C:\Users\user\AppData\Local\Temp\tempAVSaeI8GhtgT29e\o0qT3dWYBP7ZWeb Data
SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 2, database pages 56, cookie 0x24, schema 4, UTF-8, version-valid-for 2
dropped
C:\Users\user\AppData\Local\Temp\tempAVSaeI8GhtgT29e\oOPEmFmu_xsJCookies
SQLite 3.x database, last written using SQLite version 3042000, file counter 11, database pages 7, cookie 0x3, schema 4, UTF-8, version-valid-for 11
dropped
C:\Users\user\AppData\Local\Temp\tempAVSgsImjMYlWzR3\02zdBXl47cvzHistory
SQLite 3.x database, last written using SQLite version 3042000, file counter 4, database pages 39, cookie 0x20, schema 4, UTF-8, version-valid-for 4
dropped
C:\Users\user\AppData\Local\Temp\tempAVSgsImjMYlWzR3\02zdBXl47cvzcookies.sqlite
SQLite 3.x database, user version 12, last written using SQLite version 3042000, page size 32768, writer version 2, read version 2, file counter 3, database pages 3, cookie 0x1, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\tempAVSgsImjMYlWzR3\2jQJv37iJ0lzHistory
SQLite 3.x database, last written using SQLite version 3035005, file counter 2, database pages 31, cookie 0x18, schema 4, UTF-8, version-valid-for 2
dropped
C:\Users\user\AppData\Local\Temp\tempAVSgsImjMYlWzR3\3b6N2Xdh3CYwWeb Data
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\tempAVSgsImjMYlWzR3\3b6N2Xdh3CYwplaces.sqlite
SQLite 3.x database, user version 75, last written using SQLite version 3042000, page size 32768, writer version 2, read version 2, file counter 2, database pages 46, cookie 0x26, schema 4, UTF-8, version-valid-for 2
dropped
C:\Users\user\AppData\Local\Temp\tempAVSgsImjMYlWzR3\8ghN89CsjOW1Login Data For Account
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\tempAVSgsImjMYlWzR3\D87fZN3R3jFeWeb Data
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\tempAVSgsImjMYlWzR3\D87fZN3R3jFeplaces.sqlite
SQLite 3.x database, user version 75, last written using SQLite version 3042000, page size 32768, writer version 2, read version 2, file counter 2, database pages 46, cookie 0x26, schema 4, UTF-8, version-valid-for 2
dropped
C:\Users\user\AppData\Local\Temp\tempAVSgsImjMYlWzR3\Ei8DrAmaYu9KLogin Data
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\tempAVSgsImjMYlWzR3\IWPfiAXUTJTSHistory
SQLite 3.x database, last written using SQLite version 3042000, file counter 4, database pages 39, cookie 0x20, schema 4, UTF-8, version-valid-for 4
dropped
C:\Users\user\AppData\Local\Temp\tempAVSgsImjMYlWzR3\JX0OQi4nZtiqWeb Data
SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 2, database pages 56, cookie 0x24, schema 4, UTF-8, version-valid-for 2
dropped
C:\Users\user\AppData\Local\Temp\tempAVSgsImjMYlWzR3\QdX9ITDLyCRBLogin Data
SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 1, database pages 24, cookie 0xe, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\tempAVSgsImjMYlWzR3\UPG2LoPXwc7OHistory
SQLite 3.x database, last written using SQLite version 3035005, file counter 2, database pages 31, cookie 0x18, schema 4, UTF-8, version-valid-for 2
dropped
C:\Users\user\AppData\Local\Temp\tempAVSgsImjMYlWzR3\o0qT3dWYBP7ZWeb Data
SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 2, database pages 56, cookie 0x24, schema 4, UTF-8, version-valid-for 2
dropped
C:\Users\user\AppData\Local\Temp\tempAVSgsImjMYlWzR3\oOPEmFmu_xsJCookies
SQLite 3.x database, last written using SQLite version 3042000, file counter 11, database pages 7, cookie 0x3, schema 4, UTF-8, version-valid-for 11
dropped
C:\Users\user\AppData\Local\Temp\tempCMSaeI8GhtgT29e\Cookies\Chrome_Default.txt
ASCII text, with very long lines (769), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\tempCMSaeI8GhtgT29e\information.txt
ASCII text
dropped
C:\Users\user\AppData\Local\Temp\tempCMSaeI8GhtgT29e\passwords.txt
Unicode text, UTF-8 text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\tempCMSgsImjMYlWzR3\Cookies\Chrome_Default.txt
ASCII text, with very long lines (769), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\tempCMSgsImjMYlWzR3\information.txt
ASCII text
dropped
C:\Users\user\AppData\Local\Temp\tempCMSgsImjMYlWzR3\passwords.txt
Unicode text, UTF-8 text, with CRLF line terminators
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\FANBooster131.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Description string, Has Relative path, Archive, ctime=Tue Nov 21 02:17:50 2023, mtime=Tue Nov 21 02:17:50 2023, atime=Mon Nov 20 22:31:48 2023, length=1322267, window=hide
dropped
There are 41 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\14OWDrfahJ.exe
C:\Users\user\Desktop\14OWDrfahJ.exe
malicious
C:\Users\user\AppData\Local\Temp\IXP000.TMP\Ey3OF47.exe
C:\Users\user\AppData\Local\Temp\IXP000.TMP\Ey3OF47.exe
malicious
C:\Users\user\AppData\Local\Temp\IXP001.TMP\BC5tT98.exe
C:\Users\user\AppData\Local\Temp\IXP001.TMP\BC5tT98.exe
malicious
C:\Users\user\AppData\Local\Temp\IXP002.TMP\2Iu7231.exe
C:\Users\user\AppData\Local\Temp\IXP002.TMP\2Iu7231.exe
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
malicious
C:\Users\user\AppData\Local\Temp\IXP002.TMP\3rB05VU.exe
C:\Users\user\AppData\Local\Temp\IXP002.TMP\3rB05VU.exe
malicious
C:\Windows\SysWOW64\schtasks.exe
schtasks /create /f /RU "user" /tr "C:\ProgramData\OfficeTrackerNMP131\OfficeTrackerNMP131.exe" /tn "OfficeTrackerNMP131 HR" /sc HOURLY /rl HIGHEST
malicious
C:\Windows\SysWOW64\schtasks.exe
schtasks /create /f /RU "user" /tr "C:\ProgramData\OfficeTrackerNMP131\OfficeTrackerNMP131.exe" /tn "OfficeTrackerNMP131 LG" /sc ONLOGON /rl HIGHEST
malicious
C:\ProgramData\OfficeTrackerNMP131\OfficeTrackerNMP131.exe
C:\ProgramData\OfficeTrackerNMP131\OfficeTrackerNMP131.exe
malicious
C:\ProgramData\OfficeTrackerNMP131\OfficeTrackerNMP131.exe
C:\ProgramData\OfficeTrackerNMP131\OfficeTrackerNMP131.exe
malicious
C:\Users\user\AppData\Local\MaxLoonaFest131\MaxLoonaFest131.exe
"C:\Users\user\AppData\Local\MaxLoonaFest131\MaxLoonaFest131.exe"
malicious
C:\Users\user\AppData\Local\MaxLoonaFest131\MaxLoonaFest131.exe
"C:\Users\user\AppData\Local\MaxLoonaFest131\MaxLoonaFest131.exe"
malicious
C:\Users\user\AppData\Local\Temp\FANBooster131\FANBooster131.exe
"C:\Users\user\AppData\Local\Temp\FANBooster131\FANBooster131.exe"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\rundll32.exe
C:\Windows\system32\rundll32.exe" C:\Windows\system32\advpack.dll,DelNodeRunDLL32 "C:\Users\user\AppData\Local\Temp\IXP000.TMP\
C:\Windows\System32\rundll32.exe
C:\Windows\system32\rundll32.exe" C:\Windows\system32\advpack.dll,DelNodeRunDLL32 "C:\Users\user\AppData\Local\Temp\IXP001.TMP\
C:\Windows\System32\rundll32.exe
C:\Windows\system32\rundll32.exe" C:\Windows\system32\advpack.dll,DelNodeRunDLL32 "C:\Users\user\AppData\Local\Temp\IXP002.TMP\
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
There are 9 hidden processes, click here to show them.

URLs

Name
IP
Malicious
194.49.94.152:19053
malicious
http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-soap-message-security-1.0#Text
unknown
http://schemas.xmlsoap.org/ws/2005/02/sc/sct
unknown
https://duckduckgo.com/chrome_newtab
unknown
http://schemas.xmlsoap.org/ws/2004/04/security/sc/dk
unknown
https://duckduckgo.com/ac/?q=
unknown
http://tempuri.org/Entity/Id23ResponseD
unknown
http://tempuri.org/Entity/Id12Response
unknown
http://tempuri.org/
unknown
http://tempuri.org/Entity/Id2Response
unknown
http://schemas.xmlsoap.org/ws/2005/02/sc/dk/p_sha1
unknown
http://tempuri.org/Entity/Id21Response
unknown
https://ipinfo.io/https://www.maxmind.com/en/locate-my-ip-address
unknown
http://schemas.xmlsoap.org/2005/02/trust/spnego#GSS_Wrap
unknown
http://docs.oasis-open.org/wss/oasis-wss-saml-token-profile-1.1#SAMLID
unknown
http://tempuri.org/Entity/Id6ResponseD
unknown
https://support.microsoft..
unknown
http://schemas.xmlsoap.org/ws/2005/02/trust#BinarySecret
unknown
http://schemas.xmlsoap.org/ws/2005/02/trust/RSTR/Issue
unknown
http://schemas.xmlsoap.org/ws/2004/10/wsat/Aborted
unknown
http://schemas.xmlsoap.org/ws/2005/02/rm/TerminateSequence
unknown
http://tempuri.org/Entity/Id13ResponseD
unknown
http://schemas.xmlsoap.org/ws/2004/10/wsat/fault
unknown
http://schemas.xmlsoap.org/ws/2004/10/wsat
unknown
http://tempuri.org/Entity/Id15Response
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
http://schemas.xmlsoap.org/ws/2005/02/trust/RSTR/SCT/Renew
unknown
http://schemas.xmlsoap.org/ws/2004/10/wscoor/Register
unknown
http://schemas.xmlsoap.org/ws/2004/04/trust/SymmetricKey
unknown
https://api.ip.sb/ip
unknown
http://tempuri.org/Entity/Id1ResponseD
unknown
http://schemas.xmlsoap.org/ws/2005/02/trust/RSTR/SCT/Cancel
unknown
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
unknown
https://t.me/RiseProSUPPORT
unknown
http://schemas.xmlsoap.org/ws/2004/04/security/trust/CK/PSHA1
unknown
http://tempuri.org/Entity/Id24Response
unknown
https://www.ecosia.org/newtab/
unknown
http://schemas.xmlsoap.org/ws/2005/02/rm/AckRequested
unknown
http://schemas.xmlsoap.org/ws/2005/02/trust/tlsnego
unknown
http://tempuri.org/Entity/Id21ResponseD
unknown
http://schemas.xmlsoap.org/ws/2004/08/addressing
unknown
https://ipinfo.io/
unknown
http://schemas.xmlsoap.org/ws/2005/02/trust/RST/Issue
unknown
http://tempuri.org/Entity/Id10ResponseD
unknown
http://schemas.xmlsoap.org/ws/2004/10/wscoor/CreateCoordinationContextResponse
unknown
https://support.office.com/article/7D48285B-20E8-4B9B-91AD-216E34163BAD?wt.mc_id=EnterPK2016Examples
unknown
http://tempuri.org/Entity/Id5Response
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/dns
unknown
http://tempuri.org/Entity/Id10Response
unknown
http://schemas.xmlsoap.org/ws/2005/02/trust/Renew
unknown
http://tempuri.org/Entity/Id8Response
unknown
http://docs.oasis-open.org/wss/oasis-wss-saml-token-profile-1.0#SAMLAssertionID
unknown
http://schemas.xmlsoap.org/ws/2004/04/security/trust/RST/SCT
unknown
http://schemas.xmlsoap.org/ws/2006/02/addressingidentity
unknown
http://schemas.xmlsoap.org/ws/2005/02/trust/PublicKey
unknown
http://schemas.xmlsoap.org/ws/2004/10/wsat/Rollback
unknown
http://schemas.xmlsoap.org/ws/2004/04/security/trust/RSTR/SCT
unknown
http://tempuri.org/D
unknown
http://schemas.xmlsoap.org/ws/2004/06/addressingex
unknown
http://schemas.xmlsoap.org/ws/2004/04/security/trust/Nonce
unknown
http://schemas.xmlsoap.org/ws/2005/02/rm/CreateSequenceResponse
unknown
http://crl.thawte.com/ThawteTimestampingCA.crl0
unknown
http://docs.oasis-open.org/wss/oasis-wss-kerberos-token-profile-1.1#GSS_Kerberosv5_AP_REQ1510
unknown
http://tempuri.org/Entity/Id13Response
unknown
http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-wssecurity-utility-1.0.xsd
unknown
http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-x509-token-profile-1.0#X509SubjectKeyIdentif
unknown
http://tempuri.org/Entity/Id12ResponseD
unknown
http://schemas.xmlsoap.org/ws/2004/10/wsat/Committed
unknown
http://schemas.xmlsoap.org/ws/2005/02/trust/CK/PSHA1
unknown
https://t.me/Ris
unknown
http://docs.oasis-open.org/wss/oasis-wss-soap-message-security-1.1#ThumbprintSHA1
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/right/possessproperty
unknown
http://schemas.xmlsoap.org/ws/2004/04/security/sc/sct
unknown
http://tempuri.org/Entity/Id7ResponseD
unknown
http://schemas.xmlsoap.org/ws/2005/02/rm/SequenceAcknowledgement
unknown
http://schemas.xmlsoap.org/ws/2005/02/trust/RSTR/SCT
unknown
https://www.google.com/images/branding/product/ico/googleg_lodp.ico
unknown
http://schemas.xmlsoap.org/ws/2004/08/addressing/role/anonymous
unknown
http://tempuri.org/Entity/Id4ResponseD
unknown
http://schemas.xmlsoap.org/2005/02/trust/tlsnego#TLS_Wrap
unknown
http://schemas.xmlsoap.org/ws/2002/12/policy
unknown
http://tempuri.org/Entity/Id22Response
unknown
http://tempuri.org/Entity/Id22ResponseD
unknown
http://tempuri.org/Entity/Id16ResponseD
unknown
http://schemas.xmlsoap.org/ws/2004/04/security/trust/RST/Issue
unknown
http://schemas.xmlsoap.org/ws/2004/10/wscoor/CreateCoordinationContext
unknown
http://schemas.xmlsoap.org/ws/2005/02/trust/Issue
unknown
http://tempuri.org/Entity/Id19ResponseD
unknown
http://schemas.xmlsoap.org/ws/2005/02/trust/spnego
unknown
http://schemas.xmlsoap.org/ws/2005/02/sc
unknown
http://tempuri.org/Entity/Id18Response
unknown
http://docs.oasis-open.org/wss/oasis-wss-wssecurity-secext-1.1.xsd
unknown
http://tempuri.org/Entity/Id3Response
unknown
http://schemas.xmlsoap.org/ws/2005/02/rm/CreateSequence
unknown
http://schemas.xmlsoap.org/soap/actor/next
unknown
http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-soap-message-security-1.0#HexBinary
unknown
http://tempuri.org/Entity/Id9
unknown
https://ac.ecosia.org/autocomple
unknown
http://tempuri.org/Entity/Id8
unknown
http://tempuri.org/Entity/Id5
unknown
There are 90 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
ipinfo.io
34.117.59.81

IPs

IP
Domain
Country
Malicious
194.49.94.152
unknown
unknown
malicious
34.117.59.81
ipinfo.io
United States

Registry

Path
Value
Malicious
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce
wextract_cleanup0
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce
wextract_cleanup1
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce
wextract_cleanup2
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
Owner
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
SessionHash
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
Sequence
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
RegFiles0000
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
RegFilesHash
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
SessionHash
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
RegFiles0000
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
RegFilesHash
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
MaxLoonaFest131
There are 2 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
BB5000
heap
page read and write
malicious
4A9B000
heap
page read and write
malicious
402000
remote allocation
page execute and read and write
malicious
7321000
trusted library allocation
page read and write
malicious
BF000
unkown
page read and write
malicious
4F58000
heap
page read and write
malicious
D81B000
heap
page read and write
BA80000
trusted library allocation
page read and write
E6A000
heap
page read and write
100E000
heap
page read and write
B24000
heap
page read and write
3871000
heap
page read and write
2FED000
stack
page read and write
766A000
trusted library allocation
page read and write
B10000
heap
page read and write
9119000
trusted library allocation
page read and write
3331000
heap
page read and write
1369AFF000
stack
page read and write
10D0000
heap
page read and write
B75000
heap
page read and write
2CB0000
heap
page read and write
8E86000
trusted library allocation
page read and write
387D000
heap
page read and write
FE9000
heap
page read and write
5450000
heap
page read and write
302E000
stack
page read and write
C8AA000
heap
page read and write
BF0B000
trusted library allocation
page read and write
2D0E000
stack
page read and write
F54000
heap
page read and write
3320000
trusted library allocation
page read and write
3952000
heap
page read and write
254D000
stack
page read and write
3040000
heap
page read and write
AF000
unkown
page readonly
8FBC000
trusted library allocation
page read and write
98E0000
trusted library allocation
page read and write
523A000
stack
page read and write
989E000
stack
page read and write
A1C1000
trusted library allocation
page read and write
32AE000
stack
page read and write
3BDB000
heap
page read and write
76A3000
trusted library allocation
page read and write
9163000
trusted library allocation
page read and write
7080000
trusted library allocation
page read and write
3931000
heap
page read and write
C874000
heap
page read and write
3480000
heap
page read and write
DA4000
heap
page read and write
C06000
heap
page read and write
169E45F0000
heap
page read and write
C270000
trusted library allocation
page read and write
FA000
unkown
page readonly
32E0000
heap
page read and write
280D000
stack
page read and write
333E000
heap
page read and write
696000
unkown
page readonly
4010000
heap
page read and write
B6D000
heap
page read and write
655000
heap
page read and write
A1EC000
trusted library allocation
page read and write
149000
unkown
page read and write
3317000
heap
page read and write
1014000
heap
page read and write
C8DA000
heap
page read and write
10D0000
heap
page read and write
1C000
unkown
page readonly
3E90000
heap
page read and write
68E0000
heap
page read and write
DB90000
trusted library allocation
page read and write
918C000
trusted library allocation
page read and write
334A000
heap
page read and write
9257000
trusted library allocation
page read and write
2AEF000
stack
page read and write
14D000
unkown
page readonly
B24000
heap
page read and write
3331000
heap
page read and write
92D000
unkown
page readonly
3771000
heap
page read and write
7615000
trusted library allocation
page read and write
591000
unkown
page execute read
3770000
trusted library allocation
page read and write
4177000
heap
page read and write
3485000
heap
page read and write
E8D000
stack
page read and write
A198000
trusted library allocation
page read and write
830000
unkown
page readonly
3340000
heap
page read and write
31D3000
heap
page read and write
3630000
trusted library allocation
page read and write
7033000
trusted library allocation
page execute and read and write
D6ED000
stack
page read and write
31D2000
heap
page read and write
776C000
trusted library allocation
page read and write
9203000
trusted library allocation
page read and write
4BCE000
stack
page read and write
CA5000
heap
page read and write
8EEE000
trusted library allocation
page read and write
969000
unkown
page write copy
72E0000
heap
page read and write
3320000
trusted library allocation
page read and write
B98000
heap
page read and write
7310000
heap
page execute and read and write
339B000
heap
page read and write
696000
unkown
page readonly
73C000
stack
page read and write
BA1000
unkown
page execute read
78D3000
trusted library allocation
page read and write
3150000
heap
page read and write
7020000
trusted library allocation
page read and write
BF65000
trusted library allocation
page read and write
53A0000
heap
page readonly
BAA000
unkown
page readonly
A7C000
stack
page read and write
2E4E000
stack
page read and write
78FE000
trusted library allocation
page read and write
DA5A000
trusted library allocation
page read and write
32FB000
heap
page read and write
376A000
heap
page read and write
A160000
trusted library allocation
page read and write
EC5000
heap
page read and write
169E2C70000
heap
page read and write
751000
unkown
page execute read
E5E000
heap
page read and write
8F6000
unkown
page readonly
1010000
heap
page read and write
C08000
heap
page read and write
BFA0000
trusted library allocation
page read and write
929A000
trusted library allocation
page read and write
C35000
heap
page read and write
1018000
heap
page read and write
9167000
trusted library allocation
page read and write
B24000
heap
page read and write
53E0000
heap
page read and write
C0E000
heap
page read and write
DB30000
trusted library allocation
page read and write
7577000
trusted library allocation
page read and write
27DE000
stack
page read and write
3361000
heap
page read and write
92F3000
trusted library allocation
page read and write
C0E000
heap
page read and write
BAC000
unkown
page readonly
3882000
heap
page read and write
FFC000
heap
page read and write
B24000
heap
page read and write
4131000
heap
page read and write
9261000
trusted library allocation
page read and write
8F13000
trusted library allocation
page read and write
751F000
trusted library allocation
page read and write
8F22000
trusted library allocation
page read and write
92A6000
trusted library allocation
page read and write
10000
unkown
page readonly
9E0000
heap
page read and write
8E61000
trusted library allocation
page read and write
3630000
trusted library allocation
page read and write
3873000
heap
page read and write
7464000
trusted library allocation
page read and write
1B0000
unclassified section
page readonly
333D000
heap
page read and write
92C3000
trusted library allocation
page read and write
3358000
heap
page read and write
7629000
trusted library allocation
page read and write
90C3000
trusted library allocation
page read and write
C2A000
heap
page read and write
8FAF000
trusted library allocation
page read and write
3DCD000
heap
page read and write
7130000
trusted library allocation
page read and write
FFD000
heap
page read and write
336B000
heap
page read and write
80000
unkown
page readonly
27CD000
stack
page read and write
109E000
heap
page read and write
42F000
remote allocation
page execute and read and write
92AB000
trusted library allocation
page read and write
3420000
trusted library allocation
page read and write
BCE3000
heap
page execute and read and write
936000
unkown
page readonly
4378000
heap
page read and write
FFD000
heap
page read and write
4011000
heap
page read and write
DA4F000
trusted library allocation
page read and write
A90000
unclassified section
page readonly
BD40000
trusted library allocation
page read and write
591000
unkown
page execute read
1369A7C000
stack
page read and write
3343000
heap
page read and write
7D0000
heap
page read and write
3359000
heap
page read and write
A1BC000
trusted library allocation
page read and write
C8C7000
heap
page read and write
F10000
remote allocation
page read and write
53C0000
heap
page read and write
908B000
trusted library allocation
page read and write
3DC9000
heap
page read and write
B24000
heap
page read and write
7837000
trusted library allocation
page read and write
331B000
heap
page read and write
C15000
heap
page read and write
74AA000
trusted library allocation
page read and write
3E10000
trusted library allocation
page read and write
3343000
heap
page read and write
3353000
heap
page read and write
6750000
heap
page read and write
D8D0000
heap
page read and write
7541000
trusted library allocation
page read and write
924B000
trusted library allocation
page read and write
E0CD000
stack
page read and write
BA8000
unkown
page read and write
3E1E000
heap
page read and write
930A000
trusted library allocation
page read and write
3310000
heap
page read and write
7668000
trusted library allocation
page read and write
BF11000
trusted library allocation
page read and write
6C9000
unkown
page write copy
F5D000
heap
page read and write
750000
unkown
page readonly
4486000
heap
page read and write
31CE000
heap
page read and write
3A00000
heap
page read and write
31B0000
heap
page read and write
3DE4000
heap
page read and write
10D1000
heap
page read and write
3730000
trusted library allocation
page read and write
3871000
heap
page read and write
C0B0000
trusted library allocation
page execute and read and write
336F000
heap
page read and write
3871000
heap
page read and write
3CD0000
heap
page read and write
77CA000
trusted library allocation
page read and write
76CF000
trusted library allocation
page read and write
3320000
heap
page read and write
1017000
heap
page read and write
CCD0000
trusted library allocation
page read and write
31CE000
heap
page read and write
9A0000
unclassified section
page readonly
31C8000
heap
page read and write
C07000
heap
page read and write
DA64000
trusted library allocation
page read and write
376B000
stack
page read and write
FEA000
heap
page read and write
31B5000
heap
page read and write
C1B000
heap
page read and write
72D0000
trusted library allocation
page read and write
C06000
heap
page read and write
1EA2D8D0000
heap
page read and write
C8F0000
heap
page read and write
B24000
heap
page read and write
333E000
heap
page read and write
2EAD000
stack
page read and write
1F0000
heap
page read and write
8E57000
trusted library allocation
page read and write
B24000
heap
page read and write
DB40000
trusted library allocation
page execute and read and write
92E1000
trusted library allocation
page read and write
3E13000
heap
page read and write
2A1E000
stack
page read and write
C903000
heap
page read and write
C06000
heap
page read and write
2CD8000
heap
page read and write
7677000
trusted library allocation
page read and write
40FC000
heap
page read and write
C02000
heap
page read and write
8F07000
trusted library allocation
page read and write
10000
unkown
page readonly
5062000
heap
page read and write
3888000
heap
page read and write
28DD000
stack
page read and write
6CD000
unkown
page readonly
3770000
trusted library allocation
page read and write
11000
unkown
page execute read
4FDE000
stack
page read and write
E9E000
stack
page read and write
CCDD000
trusted library allocation
page read and write
860000
unclassified section
page readonly
760F000
trusted library allocation
page read and write
3874000
heap
page read and write
38C0000
heap
page read and write
149000
unkown
page write copy
3E80000
heap
page read and write
3339000
heap
page read and write
FF6000
heap
page read and write
333E000
heap
page read and write
41D9000
heap
page read and write
FD0000
heap
page read and write
BFF000
heap
page read and write
387B000
heap
page read and write
75C3000
trusted library allocation
page read and write
3A30000
trusted library allocation
page read and write
929000
unkown
page read and write
C08000
heap
page read and write
3343000
heap
page read and write
BF8000
heap
page read and write
78E1000
trusted library allocation
page read and write
7A0000
unclassified section
page readonly
8E95000
trusted library allocation
page read and write
2B2E000
stack
page read and write
3EAC000
heap
page read and write
5320000
heap
page read and write
90BC000
trusted library allocation
page read and write
362D000
stack
page read and write
90D6000
trusted library allocation
page read and write
BD30000
trusted library allocation
page read and write
4E62000
heap
page read and write
96B000
unkown
page read and write
3E6B000
heap
page read and write
3EA5000
heap
page read and write
3731000
heap
page read and write
C35000
heap
page read and write
1DDB5500000
heap
page read and write
44B2000
heap
page read and write
1052000
heap
page read and write
929F000
trusted library allocation
page read and write
2B60000
heap
page read and write
F10000
remote allocation
page read and write
387F000
heap
page read and write
7034000
trusted library allocation
page read and write
9905000
trusted library allocation
page read and write
77FD000
trusted library allocation
page read and write
B52000
heap
page read and write
C912000
heap
page read and write
3640000
trusted library allocation
page read and write
98AB000
trusted library allocation
page read and write
D858000
heap
page read and write
116000
unkown
page readonly
B9E000
heap
page read and write
C9E000
stack
page read and write
7612000
trusted library allocation
page read and write
705A000
trusted library allocation
page execute and read and write
B10000
heap
page read and write
169E2D90000
heap
page read and write
335A000
heap
page read and write
C02000
heap
page read and write
3E30000
heap
page read and write
98A4000
trusted library allocation
page read and write
B44000
heap
page read and write
E37000
heap
page read and write
7765000
trusted library allocation
page read and write
830000
unkown
page readonly
9089000
trusted library allocation
page read and write
2B5F000
stack
page read and write
1C000
unkown
page readonly
D70000
heap
page read and write
DA55000
trusted library allocation
page read and write
7605000
trusted library allocation
page read and write
A1DA000
trusted library allocation
page read and write
7300000
trusted library allocation
page read and write
DA60000
trusted library allocation
page read and write
7067000
trusted library allocation
page execute and read and write
3489000
heap
page read and write
798D000
trusted library allocation
page read and write
92BB000
trusted library allocation
page read and write
927A000
trusted library allocation
page read and write
2CA0000
remote allocation
page read and write
3880000
heap
page read and write
9151000
trusted library allocation
page read and write
31D8000
heap
page read and write
410C000
heap
page read and write
749F000
trusted library allocation
page read and write
C8CE000
heap
page read and write
3730000
trusted library allocation
page read and write
1DDB54D0000
heap
page read and write
3FB2000
heap
page read and write
3641000
heap
page read and write
3871000
heap
page read and write
657000
heap
page read and write
3E10000
trusted library allocation
page read and write
DA4A000
trusted library allocation
page read and write
3630000
trusted library allocation
page read and write
3420000
trusted library allocation
page read and write
B40000
heap
page read and write
B23000
heap
page read and write
C19000
heap
page read and write
2F70000
heap
page read and write
C0D0000
trusted library allocation
page read and write
3630000
trusted library allocation
page read and write
76C000
stack
page read and write
1A000
unkown
page readonly
3356000
heap
page read and write
29EE000
stack
page read and write
3E21000
heap
page read and write
DBDE000
stack
page read and write
387F000
heap
page read and write
5360000
unclassified section
page readonly
3331000
heap
page read and write
753B000
trusted library allocation
page read and write
2F4F000
stack
page read and write
3120000
heap
page read and write
B30000
heap
page read and write
7133000
trusted library allocation
page read and write
38C1000
heap
page read and write
8F95000
trusted library allocation
page read and write
91A4000
trusted library allocation
page read and write
81000
unkown
page execute read
BF6B000
trusted library allocation
page read and write
C35000
heap
page read and write
F5000
unkown
page read and write
336D000
heap
page read and write
92E7000
trusted library allocation
page read and write
339B000
heap
page read and write
339B000
heap
page read and write
91BC000
trusted library allocation
page read and write
A18B000
trusted library allocation
page read and write
B8D000
heap
page read and write
1369B7F000
stack
page read and write
BF000
unkown
page write copy
B80000
heap
page read and write
75C000
unkown
page readonly
C090000
trusted library allocation
page read and write
98BE000
trusted library allocation
page read and write
763E000
trusted library allocation
page read and write
790000
unclassified section
page readonly
3331000
heap
page read and write
B1A000
heap
page read and write
B24000
heap
page read and write
C06000
heap
page read and write
91C7000
trusted library allocation
page read and write
3EA4000
heap
page read and write
91EB000
trusted library allocation
page read and write
3358000
heap
page read and write
B44000
heap
page read and write
8E7A000
trusted library allocation
page read and write
C0C0000
trusted library allocation
page read and write
2CBA000
heap
page read and write
3871000
heap
page read and write
5484000
heap
page read and write
DA4000
heap
page read and write
7C00000
trusted library allocation
page read and write
7733000
trusted library allocation
page read and write
758000
unkown
page write copy
5158000
heap
page read and write
339B000
heap
page read and write
2E0F000
stack
page read and write
169E2DB5000
heap
page read and write
F4E000
heap
page read and write
D6F0000
heap
page read and write
C30000
heap
page read and write
4A27000
heap
page read and write
A1A3000
trusted library allocation
page read and write
8F6000
unkown
page readonly
77A3000
trusted library allocation
page read and write
30E0000
unclassified section
page readonly
FEA000
heap
page read and write
C00000
heap
page read and write
3E10000
trusted library allocation
page read and write
D7F0000
trusted library allocation
page execute and read and write
7F0000
unkown
page readonly
F5000
unkown
page write copy
2CD2000
heap
page read and write
96A000
unkown
page write copy
3DBA000
heap
page read and write
BAA000
unkown
page readonly
1010000
heap
page read and write
333C000
heap
page read and write
3731000
heap
page read and write
53E6000
heap
page read and write
388E000
heap
page read and write
B4A000
heap
page read and write
3DF0000
heap
page read and write
333E000
heap
page read and write
C35000
heap
page read and write
C878000
heap
page read and write
3343000
heap
page read and write
758D000
trusted library allocation
page read and write
52DE000
stack
page read and write
6CB000
unkown
page read and write
CD2C000
stack
page read and write
7863000
trusted library allocation
page read and write
169E2DB0000
heap
page read and write
C8C1000
heap
page read and write
10000
unkown
page readonly
9213000
trusted library allocation
page read and write
A214000
trusted library allocation
page read and write
3353000
heap
page read and write
590000
unkown
page readonly
80000
unkown
page readonly
3645000
heap
page read and write
3637000
heap
page read and write
428E000
heap
page read and write
DB94000
trusted library allocation
page read and write
790000
unclassified section
page readonly
C35000
heap
page read and write
120E000
stack
page read and write
1010000
heap
page read and write
C0E000
stack
page read and write
387D000
heap
page read and write
2DF0000
unclassified section
page readonly
9189000
trusted library allocation
page read and write
DA70000
trusted library allocation
page read and write
1EA2BD00000
heap
page read and write
C08000
heap
page read and write
278D000
stack
page read and write
4012000
heap
page read and write
91FE000
trusted library allocation
page read and write
CA6E000
stack
page read and write
17B000
stack
page read and write
63C000
stack
page read and write
703D000
trusted library allocation
page execute and read and write
3000000
unclassified section
page readonly
3871000
heap
page read and write
1018000
heap
page read and write
3636000
heap
page read and write
397A000
heap
page read and write
C8BA000
heap
page read and write
33ED000
stack
page read and write
346E000
stack
page read and write
75D9000
trusted library allocation
page read and write
E85EAFE000
stack
page read and write
34ED000
stack
page read and write
4FA0000
unclassified section
page readonly
2DAE000
stack
page read and write
11000
unkown
page execute read
2B40000
heap
page read and write
C0B000
heap
page read and write
8B2F000
trusted library allocation
page read and write
8B63000
trusted library allocation
page read and write
3641000
heap
page read and write
BCE0000
heap
page execute and read and write
B24000
heap
page read and write
77A6000
trusted library allocation
page read and write
31AA000
heap
page read and write
960000
heap
page read and write
9D0000
heap
page read and write
F86000
heap
page read and write
366E000
stack
page read and write
B24000
heap
page read and write
3780000
trusted library allocation
page read and write
DA80000
trusted library allocation
page read and write
2FCF000
stack
page read and write
D8CD000
heap
page read and write
333E000
heap
page read and write
941C000
stack
page read and write
333E000
heap
page read and write
5496000
heap
page read and write
9943000
heap
page read and write
3631000
heap
page read and write
BF6E000
trusted library allocation
page read and write
3362000
heap
page read and write
3AC0000
heap
page read and write
3888000
heap
page read and write
169E2C78000
heap
page read and write
C8FF000
heap
page read and write
CFB000
stack
page read and write
169E2B90000
heap
page read and write
BF31000
trusted library allocation
page read and write
9234000
trusted library allocation
page read and write
AF0000
heap
page read and write
3EA0000
heap
page read and write
3389000
heap
page read and write
C0F0000
trusted library allocation
page execute and read and write
75B9000
trusted library allocation
page read and write
333E000
heap
page read and write
C09000
heap
page read and write
3348000
heap
page read and write
387B000
heap
page read and write
3DD4000
heap
page read and write
C06000
heap
page read and write
6C9000
unkown
page read and write
3970000
trusted library allocation
page read and write
7968000
trusted library allocation
page read and write
A3F000
stack
page read and write
3E33000
heap
page read and write
FF0000
heap
page read and write
98C1000
trusted library allocation
page read and write
3730000
trusted library allocation
page read and write
3730000
trusted library allocation
page read and write
387F000
heap
page read and write
3366000
heap
page read and write
4B1D000
stack
page read and write
B24000
heap
page read and write
BF80000
trusted library allocation
page execute and read and write
2F8E000
stack
page read and write
9156000
trusted library allocation
page read and write
C35000
heap
page read and write
E85EB7F000
stack
page read and write
590000
unkown
page readonly
34F0000
trusted library allocation
page read and write
98CD000
trusted library allocation
page read and write
7A18000
trusted library allocation
page read and write
B81000
heap
page read and write
7822000
trusted library allocation
page read and write
926F000
trusted library allocation
page read and write
B24000
heap
page read and write
8F29000
trusted library allocation
page read and write
3317000
heap
page read and write
98F8000
trusted library allocation
page read and write
96D000
unkown
page readonly
D4E000
stack
page read and write
FE5000
heap
page read and write
C830000
heap
page read and write
C4E000
stack
page read and write
10000
unkown
page readonly
E4E000
stack
page read and write
91D2000
trusted library allocation
page read and write
A195000
trusted library allocation
page read and write
7700000
trusted library allocation
page read and write
76CD000
trusted library allocation
page read and write
6C9000
unkown
page read and write
8EA1000
trusted library allocation
page read and write
30A0000
heap
page read and write
3E65C7C000
stack
page read and write
C26E000
stack
page read and write
1048000
heap
page read and write
3630000
heap
page read and write
C19000
heap
page read and write
1A000
unkown
page readonly
9197000
trusted library allocation
page read and write
DA22000
trusted library allocation
page read and write
AD0000
heap
page read and write
40E9000
heap
page read and write
40F8000
heap
page read and write
9171000
trusted library allocation
page read and write
3D54000
heap
page read and write
3C04000
heap
page read and write
336D000
heap
page read and write
6754000
heap
page read and write
A1CE000
trusted library allocation
page read and write
BAC000
unkown
page readonly
6CB000
unkown
page read and write
CBAE000
stack
page read and write
3770000
trusted library allocation
page read and write
FF6000
heap
page read and write
7682000
trusted library allocation
page read and write
316E000
stack
page read and write
2EEE000
stack
page read and write
100000
unclassified section
page readonly
543E000
stack
page read and write
3320000
trusted library allocation
page read and write
91F2000
trusted library allocation
page read and write
1DDB5905000
heap
page read and write
3E21000
heap
page read and write
FFD000
heap
page read and write
2ECE000
stack
page read and write
3631000
heap
page read and write
3343000
heap
page read and write
DA4000
heap
page read and write
3770000
heap
page read and write
F8E000
stack
page read and write
B24000
heap
page read and write
B1C000
stack
page read and write
92FA000
trusted library allocation
page read and write
92EE000
trusted library allocation
page read and write
3110000
heap
page read and write
AE0000
heap
page read and write
C2F000
heap
page read and write
92DC000
trusted library allocation
page read and write
2CD0000
heap
page read and write
3770000
trusted library allocation
page read and write
10BB000
heap
page read and write
E85EA7C000
stack
page read and write
90D0000
trusted library allocation
page read and write
4C0E000
stack
page read and write
3631000
heap
page read and write
591000
unkown
page execute read
1DDB5570000
heap
page read and write
BF70000
trusted library allocation
page read and write
2E8D000
stack
page read and write
3AB7000
heap
page read and write
3DBA000
heap
page read and write
7816000
trusted library allocation
page read and write
F6F000
heap
page read and write
769B000
trusted library allocation
page read and write
7757000
trusted library allocation
page read and write
DF8E000
stack
page read and write
98C6000
trusted library allocation
page read and write
C08000
heap
page read and write
913C000
trusted library allocation
page read and write
2C8E000
stack
page read and write
402A000
heap
page read and write
44A6000
heap
page read and write
169E2D70000
heap
page read and write
3350000
heap
page read and write
550D000
heap
page read and write
2960000
heap
page read and write
330F000
heap
page read and write
3343000
heap
page read and write
C06000
heap
page read and write
7F1000
unkown
page execute read
91E0000
trusted library allocation
page read and write
6C9000
unkown
page write copy
9226000
trusted library allocation
page read and write
921B000
trusted library allocation
page read and write
AFB000
stack
page read and write
C0D000
heap
page read and write
334A000
heap
page read and write
3941000
heap
page read and write
3645000
heap
page read and write
C0E0000
heap
page execute and read and write
C06000
heap
page read and write
EFC000
stack
page read and write
3731000
heap
page read and write
3E10000
trusted library allocation
page read and write
FEA000
heap
page read and write
BF3A000
trusted library allocation
page read and write
2A5E000
stack
page read and write
8B9F000
trusted library allocation
page read and write
9022000
trusted library allocation
page read and write
333D000
heap
page read and write
3331000
heap
page read and write
333E000
heap
page read and write
B24000
heap
page read and write
571F000
stack
page read and write
14D000
unkown
page readonly
B50000
unclassified section
page readonly
730000
unclassified section
page readonly
BA1000
unkown
page execute read
76F2000
trusted library allocation
page read and write
A7E000
stack
page read and write
11000
unkown
page execute read
B85000
heap
page read and write
9147000
trusted library allocation
page read and write
761D000
trusted library allocation
page read and write
C91E000
heap
page read and write
8FA9000
trusted library allocation
page read and write
3343000
heap
page read and write
758000
unkown
page read and write
334A000
heap
page read and write
923F000
trusted library allocation
page read and write
720000
unclassified section
page readonly
9013000
trusted library allocation
page read and write
326F000
stack
page read and write
9293000
trusted library allocation
page read and write
1EA2BC20000
heap
page read and write
7A0000
unclassified section
page readonly
101E000
heap
page read and write
93D000
stack
page read and write
B24000
heap
page read and write
590000
unkown
page readonly
7588000
trusted library allocation
page read and write
3355000
heap
page read and write
1E0000
heap
page read and write
38A0000
heap
page read and write
70CE000
stack
page read and write
3770000
trusted library allocation
page read and write
C2B000
heap
page read and write
3870000
heap
page read and write
BFF0000
trusted library allocation
page read and write
339B000
heap
page read and write
1EA2BFE5000
heap
page read and write
9239000
trusted library allocation
page read and write
3A01000
heap
page read and write
C8D3000
heap
page read and write
3930000
heap
page read and write
3270000
trusted library allocation
page read and write
7546000
trusted library allocation
page read and write
902D000
trusted library allocation
page read and write
DAED000
stack
page read and write
334E000
heap
page read and write
2CA0000
remote allocation
page read and write
98F0000
trusted library allocation
page read and write
326F000
stack
page read and write
3343000
heap
page read and write
332E000
heap
page read and write
CB6F000
stack
page read and write
3420000
trusted library allocation
page read and write
A90000
heap
page read and write
3331000
heap
page read and write
3330000
heap
page read and write
116000
unkown
page readonly
696000
unkown
page readonly
10C8000
heap
page read and write
5730000
heap
page read and write
3339000
heap
page read and write
3331000
heap
page read and write
C04000
heap
page read and write
387B000
heap
page read and write
363F000
heap
page read and write
3D19000
heap
page read and write
750000
unkown
page readonly
5518000
heap
page read and write
2DE0000
unclassified section
page readonly
1EA2BDC8000
heap
page read and write
F20000
heap
page read and write
1050000
heap
page read and write
FFC000
heap
page read and write
773E000
trusted library allocation
page read and write
6CA000
unkown
page write copy
3638000
heap
page read and write
77A9000
trusted library allocation
page read and write
B24000
heap
page read and write
920D000
trusted library allocation
page read and write
3353000
heap
page read and write
3E10000
trusted library allocation
page read and write
A1D3000
trusted library allocation
page read and write
332A000
heap
page read and write
8321000
trusted library allocation
page read and write
C2A000
heap
page read and write
C0A000
heap
page read and write
936000
unkown
page readonly
FEA000
heap
page read and write
335A000
heap
page read and write
3E23000
heap
page read and write
9210000
trusted library allocation
page read and write
B89000
heap
page read and write
C28000
heap
page read and write
1DDB5590000
heap
page read and write
CE2C000
stack
page read and write
7A0000
unclassified section
page readonly
3343000
heap
page read and write
7170000
heap
page read and write
AA0000
heap
page read and write
AF000
unkown
page readonly
FE9000
heap
page read and write
BF40000
trusted library allocation
page read and write
3EA0000
heap
page read and write
7593000
trusted library allocation
page read and write
74C4000
trusted library allocation
page read and write
3343000
heap
page read and write
3886000
heap
page read and write
D5EE000
stack
page read and write
11000
unkown
page execute read
279E000
stack
page read and write
31CB000
heap
page read and write
BB1000
heap
page read and write
9049000
trusted library allocation
page read and write
109A000
heap
page read and write
76DC000
trusted library allocation
page read and write
B24000
heap
page read and write
291D000
stack
page read and write
3352000
heap
page read and write
68E4000
heap
page read and write
712E000
stack
page read and write
D800000
heap
page read and write
BA0000
unkown
page readonly
B24000
heap
page read and write
70E0000
trusted library allocation
page execute and read and write
BF16000
trusted library allocation
page read and write
31BF000
heap
page read and write
D4AE000
stack
page read and write
77B1000
trusted library allocation
page read and write
A1AE000
trusted library allocation
page read and write
7052000
trusted library allocation
page read and write
8FB6000
trusted library allocation
page read and write
C06000
heap
page read and write
7030000
trusted library allocation
page read and write
C8AE000
heap
page read and write
1050000
heap
page read and write
75A000
unkown
page readonly
40F3000
heap
page read and write
FD5000
heap
page read and write
3420000
trusted library allocation
page read and write
1A000
unkown
page readonly
8E9C000
trusted library allocation
page read and write
30C5000
heap
page read and write
81000
unkown
page execute read
C020000
trusted library allocation
page read and write
757A000
trusted library allocation
page read and write
18000
unkown
page read and write
2CA0000
remote allocation
page read and write
B41000
heap
page read and write
9008000
trusted library allocation
page read and write
312E000
stack
page read and write
3876000
heap
page read and write
400000
remote allocation
page execute and read and write
336F000
heap
page read and write
C0B000
heap
page read and write
3331000
heap
page read and write
F83000
heap
page read and write
53B5000
heap
page read and write
1DDB5900000
heap
page read and write
C000000
heap
page read and write
81C000
stack
page read and write
92CE000
trusted library allocation
page read and write
BF8000
heap
page read and write
4F9000
stack
page read and write
B24000
heap
page read and write
B24000
heap
page read and write
A15D000
trusted library allocation
page read and write
C06000
heap
page read and write
3730000
heap
page read and write
128F000
stack
page read and write
973000
heap
page read and write
44AA000
heap
page read and write
73BB000
trusted library allocation
page read and write
3353000
heap
page read and write
BD48000
trusted library allocation
page read and write
75C000
unkown
page readonly
30AC000
stack
page read and write
2830000
remote allocation
page read and write
FC7000
heap
page read and write
149000
unkown
page write copy
FCF000
stack
page read and write
7A29000
trusted library allocation
page read and write
DA75000
trusted library allocation
page read and write
3E65CFF000
stack
page read and write
9EB000
stack
page read and write
5530000
heap
page read and write
FE9000
heap
page read and write
3C00000
heap
page read and write
3350000
heap
page read and write
231E000
stack
page read and write
FFC000
heap
page read and write
6CD000
unkown
page readonly
333E000
heap
page read and write
BFF000
heap
page read and write
DA32000
trusted library allocation
page read and write
E4E000
stack
page read and write
DB0000
heap
page read and write
4C27000
heap
page read and write
7419000
trusted library allocation
page read and write
5070000
heap
page read and write
929000
unkown
page write copy
760000
heap
page read and write
969000
unkown
page read and write
F7D000
heap
page read and write
11000
unkown
page execute read
BDE000
stack
page read and write
DA35000
trusted library allocation
page read and write
979E000
stack
page read and write
7741000
trusted library allocation
page read and write
FDA000
heap
page read and write
1C000
unkown
page readonly
696000
unkown
page readonly
72C0000
trusted library allocation
page execute and read and write
9123000
trusted library allocation
page read and write
915D000
trusted library allocation
page read and write
782F000
trusted library allocation
page read and write
3771000
heap
page read and write
7050000
trusted library allocation
page read and write
C0E000
heap
page read and write
D848000
heap
page read and write
3354000
heap
page read and write
9940000
heap
page read and write
BD45000
trusted library allocation
page read and write
7E0000
heap
page read and write
BFF000
heap
page read and write
9043000
trusted library allocation
page read and write
7062000
trusted library allocation
page read and write
10000
unkown
page readonly
2830000
remote allocation
page read and write
FFC000
heap
page read and write
FFD60000
trusted library allocation
page execute and read and write
CCB0000
heap
page read and write
4116000
heap
page read and write
B81000
heap
page read and write
751000
unkown
page execute read
3882000
heap
page read and write
C040000
trusted library allocation
page read and write
A16B000
trusted library allocation
page read and write
78E8000
trusted library allocation
page read and write
7E0000
heap
page read and write
FEA000
heap
page read and write
7040000
trusted library allocation
page read and write
B7D000
heap
page read and write
1EA2BD20000
heap
page read and write
3730000
trusted library allocation
page read and write
B24000
heap
page read and write
2C9F000
stack
page read and write
116000
unkown
page readonly
18000
unkown
page write copy
9267000
trusted library allocation
page read and write
6F0000
unclassified section
page readonly
76E7000
trusted library allocation
page read and write
3420000
trusted library allocation
page read and write
92B8000
trusted library allocation
page read and write
14D000
unkown
page readonly
BFF000
heap
page read and write
B92000
heap
page read and write
75C6000
trusted library allocation
page read and write
335A000
heap
page read and write
DAF000
stack
page read and write
A184000
trusted library allocation
page read and write
C06000
heap
page read and write
3420000
trusted library allocation
page read and write
90AF000
trusted library allocation
page read and write
3357000
heap
page read and write
BD20000
trusted library allocation
page execute and read and write
3E71000
heap
page read and write
90BA000
trusted library allocation
page read and write
3E5F000
heap
page read and write
CA2E000
stack
page read and write
B8A000
heap
page read and write
293D000
stack
page read and write
98A0000
trusted library allocation
page read and write
C8C3000
heap
page read and write
B7B000
heap
page read and write
B24000
heap
page read and write
7AC000
stack
page read and write
3888000
heap
page read and write
767A000
trusted library allocation
page read and write
3E96000
heap
page read and write
4EE000
stack
page read and write
31CE000
heap
page read and write
3420000
trusted library allocation
page read and write
92FD000
trusted library allocation
page read and write
78F7000
trusted library allocation
page read and write
40ED000
heap
page read and write
14D000
unkown
page readonly
7065000
trusted library allocation
page execute and read and write
DA4000
heap
page read and write
2830000
remote allocation
page read and write
DB50000
trusted library allocation
page read and write
FEA000
heap
page read and write
333E000
heap
page read and write
DA4000
heap
page read and write
3630000
trusted library allocation
page read and write
388F000
heap
page read and write
B24000
heap
page read and write
C0A0000
trusted library allocation
page execute and read and write
A163000
trusted library allocation
page read and write
7973000
trusted library allocation
page read and write
3159000
heap
page read and write
6CD000
unkown
page readonly
3190000
heap
page read and write
BFD0000
trusted library allocation
page read and write
BD60000
trusted library allocation
page read and write
C50000
heap
page read and write
3DD6000
heap
page read and write
C37000
heap
page read and write
870000
unclassified section
page readonly
FE9000
heap
page read and write
DA20000
trusted library allocation
page read and write
40F1000
heap
page read and write
3360000
heap
page read and write
74C6000
trusted library allocation
page read and write
101A000
heap
page read and write
DA5F000
trusted library allocation
page read and write
3880000
heap
page read and write
425B000
heap
page read and write
2CD0000
heap
page read and write
333E000
heap
page read and write
9316000
trusted library allocation
page read and write
1090000
heap
page read and write
333E000
heap
page read and write
9900000
trusted library allocation
page read and write
31CE000
heap
page read and write
3630000
trusted library allocation
page read and write
90C9000
trusted library allocation
page read and write
C19000
heap
page read and write
774C000
trusted library allocation
page read and write
CCE0000
trusted library allocation
page execute and read and write
B90000
heap
page read and write
E30000
heap
page read and write
91BF000
trusted library allocation
page read and write
3331000
heap
page read and write
339B000
heap
page read and write
B24000
heap
page read and write
8E8F000
trusted library allocation
page read and write
BFE0000
trusted library allocation
page execute and read and write
1EA2BDC0000
heap
page read and write
100E000
heap
page read and write
6F1E000
stack
page read and write
BFF000
heap
page read and write
3770000
trusted library allocation
page read and write
3366000
heap
page read and write
383C000
heap
page read and write
3331000
heap
page read and write
7056000
trusted library allocation
page execute and read and write
40F5000
heap
page read and write
F84000
heap
page read and write
E5B000
heap
page read and write
BA8000
unkown
page write copy
75A000
unkown
page readonly
40E5000
heap
page read and write
BFF000
heap
page read and write
91E5000
trusted library allocation
page read and write
98D2000
trusted library allocation
page read and write
523F000
stack
page read and write
C28000
heap
page read and write
3069000
stack
page read and write
3BC2000
heap
page read and write
352D000
stack
page read and write
78EC000
trusted library allocation
page read and write
338B000
heap
page read and write
4ADE000
stack
page read and write
3875000
heap
page read and write
8B41000
trusted library allocation
page read and write
3343000
heap
page read and write
387B000
heap
page read and write
3420000
trusted library allocation
page read and write
AA0000
unclassified section
page readonly
8F2E000
trusted library allocation
page read and write
C15000
heap
page read and write
3354000
heap
page read and write
FE9000
heap
page read and write
7F1000
unkown
page execute read
333E000
heap
page read and write
3871000
heap
page read and write
C030000
trusted library allocation
page execute and read and write
B24000
heap
page read and write
3389000
heap
page read and write
8E6C000
trusted library allocation
page read and write
BD10000
heap
page read and write
3385000
heap
page read and write
B50000
heap
page read and write
BF8000
heap
page read and write
F77000
heap
page read and write
387F000
heap
page read and write
F0000
unclassified section
page readonly
63E000
stack
page read and write
C2C000
heap
page read and write
727E000
stack
page read and write
B24000
heap
page read and write
7636000
trusted library allocation
page read and write
E61000
heap
page read and write
BF2E000
trusted library allocation
page read and write
993E000
trusted library allocation
page read and write
EC0000
heap
page read and write
3314000
heap
page read and write
3A30000
heap
page read and write
9036000
trusted library allocation
page read and write
9264000
trusted library allocation
page read and write
9910000
trusted library allocation
page read and write
F10000
remote allocation
page read and write
335E000
heap
page read and write
3631000
heap
page read and write
333B000
heap
page read and write
5F7000
heap
page read and write
3CD7000
heap
page read and write
D5AC000
stack
page read and write
3372000
heap
page read and write
334A000
heap
page read and write
B24000
heap
page read and write
32CE000
stack
page read and write
650000
heap
page read and write
A19B000
trusted library allocation
page read and write
3E10000
trusted library allocation
page read and write
F4C000
heap
page read and write
FFC000
heap
page read and write
903C000
trusted library allocation
page read and write
BF51000
trusted library allocation
page read and write
831000
unkown
page execute read
A1C7000
trusted library allocation
page read and write
A153000
trusted library allocation
page read and write
116000
unkown
page readonly
7CA0000
trusted library allocation
page read and write
1006000
heap
page read and write
AEE000
stack
page read and write
C2A000
heap
page read and write
7411000
trusted library allocation
page read and write
3DE7000
heap
page read and write
7799000
trusted library allocation
page read and write
C09000
heap
page read and write
1010000
heap
page read and write
792F000
trusted library allocation
page read and write
31C6000
heap
page read and write
339B000
heap
page read and write
3349000
heap
page read and write
9174000
trusted library allocation
page read and write
CA0000
heap
page read and write
3360000
heap
page read and write
3331000
heap
page read and write
FEA000
heap
page read and write
8FA0000
trusted library allocation
page read and write
FF7000
heap
page read and write
2D10000
unclassified section
page readonly
770000
heap
page read and write
C06000
heap
page read and write
C92E000
heap
page read and write
9303000
trusted library allocation
page read and write
28FD000
stack
page read and write
3876000
heap
page read and write
7E0000
unclassified section
page readonly
75DF000
trusted library allocation
page read and write
43E2000
heap
page read and write
C19000
heap
page read and write
C8BD000
heap
page read and write
74B9000
trusted library allocation
page read and write
531F000
stack
page read and write
BF22000
trusted library allocation
page read and write
92B5000
trusted library allocation
page read and write
9288000
trusted library allocation
page read and write
3871000
heap
page read and write
C8DF000
heap
page read and write
3730000
trusted library allocation
page read and write
FA000
unkown
page readonly
53B0000
heap
page read and write
8F1C000
trusted library allocation
page read and write
269D000
stack
page read and write
752E000
trusted library allocation
page read and write
91A1000
trusted library allocation
page read and write
3380000
heap
page read and write
9252000
trusted library allocation
page read and write
96A000
heap
page read and write
3B51000
heap
page read and write
3630000
trusted library allocation
page read and write
76D9000
trusted library allocation
page read and write
C06000
heap
page read and write
3420000
trusted library allocation
page read and write
DA39000
trusted library allocation
page read and write
100D000
heap
page read and write
3770000
trusted library allocation
page read and write
B4D000
heap
page read and write
FEC000
heap
page read and write
296E000
stack
page read and write
70D0000
trusted library allocation
page execute and read and write
590000
unkown
page readonly
701F000
stack
page read and write
FDA000
heap
page read and write
D842000
heap
page read and write
B24000
heap
page read and write
3420000
trusted library allocation
page read and write
9930000
trusted library allocation
page read and write
3896000
heap
page read and write
7808000
trusted library allocation
page read and write
F8A000
heap
page read and write
3420000
trusted library allocation
page read and write
BD4A000
trusted library allocation
page read and write
3E33000
heap
page read and write
768D000
trusted library allocation
page read and write
2D00000
unclassified section
page readonly
FD6000
heap
page read and write
30C0000
heap
page read and write
3770000
trusted library allocation
page read and write
DF4E000
stack
page read and write
74CA000
trusted library allocation
page read and write
BF90000
trusted library allocation
page read and write
752B000
trusted library allocation
page read and write
BFB000
heap
page read and write
77D2000
trusted library allocation
page read and write
D830000
heap
page read and write
33AF000
stack
page read and write
7981000
trusted library allocation
page read and write
3CAA000
heap
page read and write
3AC1000
heap
page read and write
DF0E000
stack
page read and write
333D000
heap
page read and write
3324000
heap
page read and write
E6A000
heap
page read and write
F8A000
heap
page read and write
38A0000
heap
page read and write
8EC000
stack
page read and write
D803000
heap
page read and write
D889000
heap
page read and write
3F70000
heap
page read and write
C010000
trusted library allocation
page read and write
AA0000
unclassified section
page readonly
7708000
trusted library allocation
page read and write
100D000
heap
page read and write
4128000
heap
page read and write
78D9000
trusted library allocation
page read and write
BF00000
trusted library allocation
page read and write
C0E000
heap
page read and write
2840000
heap
page read and write
B24000
heap
page read and write
FFD000
heap
page read and write
7674000
trusted library allocation
page read and write
336D000
heap
page read and write
930F000
trusted library allocation
page read and write
A3C000
stack
page read and write
31CA000
heap
page read and write
7886000
trusted library allocation
page read and write
78E5000
trusted library allocation
page read and write
3359000
heap
page read and write
3F0000
unclassified section
page readonly
3331000
heap
page read and write
BF6000
heap
page read and write
92D000
unkown
page readonly
780B000
trusted library allocation
page read and write
7853000
trusted library allocation
page read and write
78D6000
trusted library allocation
page read and write
7A23000
trusted library allocation
page read and write
706B000
trusted library allocation
page execute and read and write
31DC000
heap
page read and write
8F86000
trusted library allocation
page read and write
928D000
trusted library allocation
page read and write
BD32000
trusted library allocation
page read and write
C2E000
heap
page read and write
91F7000
trusted library allocation
page read and write
3155000
heap
page read and write
100C000
heap
page read and write
76DF000
trusted library allocation
page read and write
100C000
heap
page read and write
917F000
trusted library allocation
page read and write
31A0000
heap
page read and write
1010000
heap
page read and write
3871000
heap
page read and write
E08F000
stack
page read and write
DB2E000
stack
page read and write
704D000
trusted library allocation
page execute and read and write
C07000
heap
page read and write
AFB000
stack
page read and write
8F7B000
trusted library allocation
page read and write
8EE4000
trusted library allocation
page read and write
11000
unkown
page execute read
91B9000
trusted library allocation
page read and write
7993000
trusted library allocation
page read and write
90A1000
trusted library allocation
page read and write
5390000
heap
page read and write
756D000
trusted library allocation
page read and write
1DDB54E0000
heap
page read and write
149000
unkown
page read and write
8B25000
trusted library allocation
page read and write
B24000
heap
page read and write
3365000
heap
page read and write
FED000
heap
page read and write
31EB000
heap
page read and write
E0E000
stack
page read and write
FFF000
heap
page read and write
FD0000
heap
page read and write
C35000
heap
page read and write
4470000
heap
page read and write
780E000
trusted library allocation
page read and write
F27000
heap
page read and write
8FFE000
trusted library allocation
page read and write
B24000
heap
page read and write
336B000
heap
page read and write
333E000
heap
page read and write
591000
unkown
page execute read
3030000
heap
page read and write
3871000
heap
page read and write
2D89000
stack
page read and write
A176000
trusted library allocation
page read and write
B79000
heap
page read and write
32F0000
heap
page read and write
7F0000
unkown
page readonly
2D8D000
stack
page read and write
C06000
heap
page read and write
96D000
unkown
page readonly
831000
unkown
page execute read
C06000
heap
page read and write
B24000
heap
page read and write
1018000
heap
page read and write
912E000
trusted library allocation
page read and write
6E0000
unclassified section
page readonly
3771000
heap
page read and write
9096000
trusted library allocation
page read and write
2F30000
heap
page read and write
DA30000
trusted library allocation
page read and write
7521000
trusted library allocation
page read and write
D82B000
heap
page read and write
1010000
heap
page read and write
1DDB5598000
heap
page read and write
3E65D7F000
stack
page read and write
9246000
trusted library allocation
page read and write
3871000
heap
page read and write
7A09000
trusted library allocation
page read and write
388F000
heap
page read and write
3331000
heap
page read and write
310F000
stack
page read and write
3355000
heap
page read and write
1052000
heap
page read and write
3E80000
heap
page read and write
79C5000
trusted library allocation
page read and write
10000
unkown
page readonly
31C6000
heap
page read and write
7797000
trusted library allocation
page read and write
DA48000
trusted library allocation
page read and write
6CD000
unkown
page readonly
5060000
heap
page read and write
C2B000
heap
page read and write
91AF000
trusted library allocation
page read and write
387F000
heap
page read and write
380000
unclassified section
page readonly
B7B000
heap
page read and write
3354000
heap
page read and write
2B2E000
stack
page read and write
B20000
heap
page read and write
387F000
heap
page read and write
7060000
trusted library allocation
page read and write
3DBA000
heap
page read and write
316E000
stack
page read and write
3343000
heap
page read and write
3363000
heap
page read and write
5511000
heap
page read and write
E1CE000
stack
page read and write
5F0000
heap
page read and write
5337000
stack
page read and write
3343000
heap
page read and write
B24000
heap
page read and write
C20000
unclassified section
page readonly
11000
unkown
page execute read
3420000
trusted library allocation
page read and write
BAA0000
trusted library allocation
page read and write
77BC000
trusted library allocation
page read and write
79FE000
trusted library allocation
page read and write
B24000
heap
page read and write
11000
unkown
page execute read
C06000
heap
page read and write
FEA000
heap
page read and write
CCAF000
stack
page read and write
3EAC000
heap
page read and write
1EA2BFE0000
heap
page read and write
75D4000
trusted library allocation
page read and write
3871000
heap
page read and write
B75000
heap
page read and write
3876000
heap
page read and write
339B000
heap
page read and write
DA72000
trusted library allocation
page read and write
1015000
heap
page read and write
7744000
trusted library allocation
page read and write
31BF000
heap
page read and write
2B9E000
stack
page read and write
FE0000
heap
page read and write
8F71000
trusted library allocation
page read and write
3E21000
heap
page read and write
EA0000
heap
page read and write
390000
unclassified section
page readonly
27CE000
stack
page read and write
3343000
heap
page read and write
3354000
heap
page read and write
CCDA000
trusted library allocation
page read and write
72BB000
stack
page read and write
3630000
trusted library allocation
page read and write
B24000
heap
page read and write
6CA000
unkown
page write copy
BF60000
trusted library allocation
page read and write
2DCC000
stack
page read and write
300E000
stack
page read and write
339B000
heap
page read and write
DA0000
heap
page read and write
D809000
heap
page read and write
2860000
heap
page read and write
FEA000
heap
page read and write
BA0000
unkown
page readonly
8EF9000
trusted library allocation
page read and write
There are 1395 hidden memdumps, click here to show them.