IOC Report
Move Mouse.exe

loading gif

Files

File Path
Type
Category
Malicious
Move Mouse.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Roaming\Ellanet\Move Mouse\Settings.xml
XML 1.0 document, ASCII text, with CRLF line terminators
modified

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\Move Mouse.exe
"C:\Users\user\Desktop\Move Mouse.exe"
malicious

URLs

Name
IP
Malicious
http://schemas.xceed.com/wpf/xaml/toolkit&Xceed.Wpf.Toolkit.PropertyGrid.Editors
unknown
https://www.paypal.com/cgi-bin/webscr?cmd=_s-xclick&hosted_button_id=QZTWHD9CRW5XN-GitHubLink_OnMous
unknown
http://quartznet.sourceforge.net/JobSchedulingData?
unknown
https://github.com/serilog/serilog-sinks-fileC
unknown
http://schemas.xceed.com/wpf/xaml/toolkit)Xceed.Wpf.Toolkit.PropertyGrid.Converters
unknown
https://raw.githubusercontent.com/sw3103/movemouse/master/Update_4x.xml.contact
unknown
https://www.paypal.com
unknown
https://github.com/sw3103/movemouse/wiki
unknown
http://schemas.xmlsoap.org/soap/encoding/
unknown
https://github.com/serilog/serilog.git
unknown
https://raw.githubusercontent.com/sw3103/movemouse/master/Update_4x.xml)Update/LatestVersion%Update/
unknown
https://github.com/serilog/serilog-sinks-file
unknown
https://github.com/quartznet/quartznet
unknown
https://github.com/sw3103/movemouse/wiki/Troubleshooting/TwitterLink_OnMouseDown;https://twitter.com
unknown
http://defaultcontainer/Resources/Mouse-SystemTray-Active.ico
unknown
http://www.w3.or
unknown
https://github.com/hardcodet/wpf-notifyicon.
unknown
http://www.hardcodet.net/projects/wpf-notifyicon
unknown
http://www.quartz-scheduler.org/documentation/quartz-2.3.0/tutorials/crontrigger.htmlphttps://github
unknown
https://github.com/sw3103/movemouse/wiki/Troubleshooting).
unknown
https://github.com/dotnet/runtime
unknown
http://www.movemouse.co.uk/
unknown
http://quartznet.sourceforge.net/JobSchedulingData_
unknown
http://schemas.xceed.com/wpf/xaml/toolkit)Xceed.Wpf.Toolkit.PropertyGrid.Attributes
unknown
http://schemas.xceed.com/wpf/xaml/toolkit
unknown
http://www.quartz-scheduler.org/documentation/quartz-2.3.0/tutorials/crontrigger.html/AddActionButto
unknown
http://www.hardcodet.net/taskbar
unknown
http://defaultcontainer/Resources/Mouse.ico
unknown
https://raw.githubusercontent.com
unknown
http://quartznet.sourceforge.net/JobSchedulingDatae
unknown
https://github.com/hardcodet/wpf-notifyicon
unknown
http://quartznet.sourceforge.net/JobSchedulingDatah
unknown
http://schemas.xceed.com/wpf/xaml/toolkit)Xceed.Wpf.Toolkit.PropertyGrid.AttributesV
unknown
https://www.paypal.com/cgi-bin/webscr?cmd=_s-xclick&hosted_button_id=QZTWHD9CRW5XN4http://www.movemo
unknown
http://schemas.xceed.com/wpf/xaml/toolkit&Xceed.Wpf.Toolkit.PropertyGrid.EditorsH
unknown
https://raw.githubusercontent.com/serilog/serilog-sinks-file/7eb21bd4d35d0b8b7d13e6a15851c9903ea9a46
unknown
https://twitter.com/movemouse
unknown
https://github.com/ejensen/toggle-switch-control
unknown
https://raw.githubusercontent.com/sw3103/movemouse/master/Update_4x.xml
185.199.111.133
http://schemas.xceed.com/wpf/xaml/toolkit)Xceed.Wpf.Toolkit.PropertyGrid.ConvertersU
unknown
http://quartznet.sourceforge.net/JobSchedulingData
unknown
https://github.com/sw3103/movemouse
unknown
http://defaultcontainer/Resources/Mouse-SystemTray-Execute.ico
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
http://www.movemouse.co.uk
unknown
https://github.com/serilog/serilog/pull/819.
unknown
https://github.com/sw3103/movemouse/releases/tag/v4.16.2
unknown
http://quartznet.sourceforge.net/JobSchedulingDataT
unknown
There are 38 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
raw.githubusercontent.com
185.199.111.133

IPs

IP
Domain
Country
Malicious
185.199.111.133
raw.githubusercontent.com
Netherlands

Registry

Path
Value
Malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Move Mouse_RASAPI32
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Move Mouse_RASAPI32
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Move Mouse_RASAPI32
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Move Mouse_RASAPI32
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Move Mouse_RASAPI32
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Move Mouse_RASAPI32
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Move Mouse_RASAPI32
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Move Mouse_RASMANCS
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Move Mouse_RASMANCS
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Move Mouse_RASMANCS
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Move Mouse_RASMANCS
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Move Mouse_RASMANCS
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Move Mouse_RASMANCS
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Move Mouse_RASMANCS
FileDirectory
There are 4 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
20B80001000
trusted library allocation
page read and write
malicious
20BEBF92000
unkown
page readonly
malicious
20BF5C77000
heap
page read and write
7FF40819C000
trusted library allocation
page readonly
48490FE000
stack
page read and write
20BF6147000
heap
page read and write
20BF568E000
heap
page read and write
20BEEA00000
trusted library section
page read and write
48489FB000
stack
page read and write
20BEC630000
trusted library section
page read and write
20BEECE0000
trusted library allocation
page read and write
7FF408188000
trusted library allocation
page readonly
20BF56AC000
heap
page read and write
20BF5CE1000
heap
page read and write
4847BCE000
stack
page read and write
20BEEEA0000
trusted library allocation
page read and write
20BEC663000
heap
page execute and read and write
20BEEA30000
heap
page read and write
20BEEF00000
trusted library allocation
page read and write
7FF4081A2000
trusted library allocation
page readonly
20BF6070000
trusted library allocation
page read and write
20BF046F000
heap
page read and write
7FF4081A9000
trusted library allocation
page execute read
20BF58FB000
heap
page read and write
7FF9CE270000
trusted library allocation
page read and write
7FF4081BC000
trusted library allocation
page readonly
7FF9CE2C9000
trusted library allocation
page read and write
7FF9CE3C0000
trusted library allocation
page read and write
20BEEDB0000
trusted library allocation
page read and write
20BF050D000
heap
page read and write
20BEEE10000
trusted library allocation
page read and write
20BF2B58000
heap
page read and write
20B9009A000
trusted library allocation
page read and write
7FF9CE364000
trusted library allocation
page read and write
20B80249000
trusted library allocation
page read and write
20BF040F000
heap
page read and write
7FF9CE51E000
trusted library allocation
page read and write
20BF05D6000
heap
page read and write
20B90001000
trusted library allocation
page read and write
20BF2927000
heap
page read and write
7FF408182000
trusted library allocation
page readonly
7FF9CE230000
trusted library allocation
page read and write
20BEEA20000
heap
page read and write
20B80CEE000
trusted library allocation
page read and write
20BEF160000
trusted library allocation
page read and write
20BEEF80000
trusted library allocation
page read and write
20BF5E09000
heap
page read and write
20BF60F0000
trusted library allocation
page read and write
20BF297A000
heap
page read and write
20BF59AB000
heap
page read and write
20BEC705000
heap
page read and write
7FF9CE480000
trusted library allocation
page execute and read and write
20BF2899000
heap
page read and write
20BEC2A0000
heap
page read and write
4847E3E000
stack
page read and write
20BF2790000
trusted library allocation
page read and write
7FF4081C4000
trusted library allocation
page readonly
20B80F76000
trusted library allocation
page read and write
20BF59B3000
heap
page read and write
7FF9CE200000
trusted library allocation
page read and write
48491FD000
stack
page read and write
20BEEEE0000
trusted library allocation
page read and write
20BF5F70000
trusted library allocation
page read and write
20BF2830000
heap
page read and write
20BEF170000
trusted library allocation
page read and write
48492FE000
stack
page read and write
7FF40820E000
trusted library allocation
page readonly
20BF29F4000
heap
page read and write
20B900E4000
trusted library allocation
page read and write
20BF041F000
heap
page read and write
7FF408184000
trusted library allocation
page readonly
7FF9CE023000
trusted library allocation
page execute and read and write
20BEC540000
trusted library section
page read and write
48485FE000
stack
page read and write
20BEEF10000
trusted library allocation
page read and write
20BEEF50000
trusted library allocation
page read and write
20BF5979000
heap
page read and write
20BF5A9F000
heap
page read and write
20BF59C3000
heap
page read and write
7FF408196000
trusted library allocation
page readonly
7FF9CE3F0000
trusted library allocation
page execute and read and write
20BF28AA000
heap
page read and write
4848DFA000
stack
page read and write
7FF4081FE000
trusted library allocation
page readonly
20B8050B000
trusted library allocation
page read and write
20BEC6E0000
heap
page read and write
20BF0406000
heap
page read and write
20BF28F5000
heap
page read and write
20BF5A5E000
heap
page read and write
7FF9CE033000
trusted library allocation
page read and write
7FF9CE210000
trusted library allocation
page read and write
7FF9CE250000
trusted library allocation
page read and write
20BF5F40000
trusted library allocation
page read and write
20BF5F20000
trusted library allocation
page read and write
20BF5B1E000
heap
page read and write
20BF0452000
heap
page read and write
20BEC553000
heap
page read and write
20BF7330000
trusted library allocation
page read and write
20BF4960000
trusted library section
page read and write
7FF408180000
trusted library allocation
page readonly
20BEE716000
heap
page read and write
20BEE780000
trusted library section
page read and write
7FF9CE2A0000
trusted library allocation
page read and write
20BEC34C000
heap
page read and write
20BF5A21000
heap
page read and write
7FF9CE220000
trusted library allocation
page execute and read and write
20BEEED0000
trusted library allocation
page read and write
20BF72E0000
trusted library allocation
page read and write
20BEED10000
trusted library allocation
page read and write
7FF9CE350000
trusted library allocation
page execute and read and write
20BF6189000
heap
page read and write
7FF9CE024000
trusted library allocation
page read and write
7FF4081BF000
trusted library allocation
page execute read
7FF4081A0000
trusted library allocation
page readonly
20BEF020000
trusted library allocation
page read and write
20BEE680000
heap
page read and write
20BF29D2000
heap
page read and write
20BF2855000
heap
page read and write
20BF29D4000
heap
page read and write
20BF29CA000
heap
page read and write
4848EEB000
stack
page read and write
7FF408181000
trusted library allocation
page execute read
7FF4081A6000
trusted library allocation
page readonly
20BF7320000
trusted library allocation
page read and write
20BF568C000
heap
page read and write
20BEED00000
trusted library allocation
page read and write
20BEC2E6000
heap
page read and write
7FF9CE24B000
trusted library allocation
page read and write
20BF59AF000
heap
page read and write
7FF40818F000
trusted library allocation
page execute read
20BF29DC000
heap
page read and write
20BF046B000
heap
page read and write
20BEEE40000
trusted library allocation
page read and write
7FF9CE282000
trusted library allocation
page read and write
20BF27CE000
heap
page read and write
7FF9CE0D6000
trusted library allocation
page read and write
20BEDEE0000
trusted library allocation
page read and write
7FF9CE380000
trusted library allocation
page read and write
20BF03E0000
heap
page read and write
7FF40819A000
trusted library allocation
page readonly
20BF5AD1000
heap
page read and write
20BF59C7000
heap
page read and write
20BF5863000
heap
page read and write
20BEBF90000
unkown
page readonly
20BF5733000
heap
page read and write
20BEEF30000
trusted library allocation
page read and write
20BF5742000
heap
page read and write
7FF9CE490000
trusted library allocation
page read and write
7FF40818D000
trusted library allocation
page execute read
20BF710E000
heap
page read and write
20BF5686000
heap
page read and write
7FF4081CC000
trusted library allocation
page readonly
7FF408192000
trusted library allocation
page readonly
7FF4081C9000
trusted library allocation
page execute read
7FF4081C3000
trusted library allocation
page execute read
20BF57E8000
heap
page read and write
20BF5AC9000
heap
page read and write
20BEC2E0000
heap
page read and write
20BF03FC000
heap
page read and write
20BF281C000
heap
page read and write
7FF408204000
trusted library allocation
page readonly
7FF4081C6000
trusted library allocation
page readonly
20BEC513000
trusted library allocation
page read and write
7FF9CE28C000
trusted library allocation
page read and write
20BF051A000
heap
page read and write
7FF9CE32B000
trusted library allocation
page read and write
20BF46F0000
trusted library allocation
page read and write
20BF59BD000
heap
page read and write
20BF5CF1000
heap
page read and write
20BF0413000
heap
page read and write
7FF9CE2D6000
trusted library allocation
page read and write
20BF29CC000
heap
page read and write
48486FE000
stack
page read and write
20BEC270000
heap
page read and write
20BF27D2000
heap
page read and write
20BF5D40000
heap
page read and write
20BF0461000
heap
page read and write
20BF5963000
heap
page read and write
20BEC660000
heap
page execute and read and write
20BF5800000
heap
page read and write
20BEC670000
trusted library section
page read and write
20BF59A5000
heap
page read and write
20BEEF60000
trusted library allocation
page read and write
7FF9CE21A000
trusted library allocation
page read and write
20BEC5A5000
heap
page read and write
20BF5AA7000
heap
page read and write
20BF5694000
heap
page read and write
20BEEDD0000
trusted library allocation
page read and write
7FF9CE1D4000
trusted library allocation
page read and write
20BF5650000
heap
page read and write
20BEEF90000
trusted library section
page read and write
7FF9CE2F0000
trusted library allocation
page read and write
4848FFD000
stack
page read and write
20BF60B0000
trusted library allocation
page read and write
20BF569E000
heap
page read and write
20BF72F0000
trusted library allocation
page read and write
20BEC700000
heap
page read and write
20BF5ABB000
heap
page read and write
20BF598F000
heap
page read and write
7FF9CE07C000
trusted library allocation
page execute and read and write
20BF5F30000
trusted library allocation
page read and write
20BF5B1A000
heap
page read and write
20BF61C8000
heap
page read and write
20BF29FA000
heap
page read and write
20BEE735000
heap
page read and write
7FF9CE02D000
trusted library allocation
page execute and read and write
20BF598D000
heap
page read and write
20BF5981000
heap
page read and write
20BEC352000
heap
page read and write
7FF408202000
trusted library allocation
page readonly
7FF40819D000
trusted library allocation
page execute read
20BF598B000
heap
page read and write
7FF9CE0E0000
trusted library allocation
page execute and read and write
20BEEF40000
trusted library allocation
page read and write
48494FB000
stack
page read and write
7FF9CE51A000
trusted library allocation
page read and write
20BF59BB000
heap
page read and write
20BF29F0000
heap
page read and write
20BF0449000
heap
page read and write
20BF5813000
heap
page read and write
7FF4081A3000
trusted library allocation
page execute read
20BEEAD6000
heap
page read and write
7FF9CE260000
trusted library allocation
page read and write
20BF0596000
heap
page read and write
20BF59B1000
heap
page read and write
20BEC280000
heap
page read and write
7FF9CE1D2000
trusted library allocation
page read and write
7FF9CE3D0000
trusted library allocation
page read and write
20BF29A5000
heap
page read and write
20BEEF70000
trusted library section
page read and write
20BF0518000
heap
page read and write
20BEEDA0000
trusted library allocation
page read and write
20BEC6F0000
trusted library allocation
page read and write
20BF5858000
heap
page read and write
20BF03FA000
heap
page read and write
7FF9CE290000
trusted library allocation
page read and write
20BEEFD0000
trusted library allocation
page read and write
20BF2B61000
heap
page read and write
20BF5837000
heap
page read and write
7FF40818E000
trusted library allocation
page readonly
20BEEDC0000
trusted library allocation
page read and write
7FF4081C2000
trusted library allocation
page readonly
7FF4081BD000
trusted library allocation
page execute read
7FF9CE0D0000
trusted library allocation
page read and write
7FF4081C5000
trusted library allocation
page execute read
20BF4720000
trusted library allocation
page read and write
20BF283A000
heap
page read and write
4848AFB000
stack
page read and write
7FF9CE044000
trusted library allocation
page read and write
20BF04D2000
heap
page read and write
7FF4081EB000
trusted library allocation
page execute read
7FF4081B5000
trusted library allocation
page execute read
4848CF0000
stack
page read and write
20BF03F1000
heap
page read and write
20BEDEB0000
trusted library allocation
page read and write
20BEEB20000
heap
page execute and read and write
20BF5A92000
heap
page read and write
7FF408210000
trusted library allocation
page execute and read and write
20BF0402000
heap
page read and write
20BF0551000
heap
page read and write
20BF5A48000
heap
page read and write
20BF5AA2000
heap
page read and write
20BF0419000
heap
page read and write
7FF408193000
trusted library allocation
page execute read
7FF4081AA000
trusted library allocation
page readonly
20BF0555000
heap
page read and write
7FF4081B4000
trusted library allocation
page readonly
20BF283F000
heap
page read and write
20BEECD0000
trusted library allocation
page read and write
20BEC2C0000
heap
page read and write
20BF299A000
heap
page read and write
7FF9CE04B000
trusted library allocation
page execute and read and write
4848FFB000
stack
page read and write
20BEC580000
heap
page read and write
7FF4081C0000
trusted library allocation
page readonly
7FF9CE1E0000
trusted library allocation
page read and write
20BF2A0B000
heap
page read and write
20B903AC000
trusted library allocation
page read and write
7FF9CE1EB000
trusted library allocation
page read and write
20BF29F6000
heap
page read and write
20BEEFC0000
trusted library allocation
page read and write
7FF4081EA000
trusted library allocation
page readonly
7FF9CE50A000
trusted library allocation
page read and write
7FF40820F000
trusted library allocation
page execute read
20BF5662000
heap
page read and write
20BF5BAE000
heap
page read and write
20BF6090000
trusted library allocation
page read and write
7FF9CE240000
trusted library allocation
page read and write
7FF9CE1F6000
trusted library allocation
page read and write
20BEC550000
heap
page read and write
7FF9CE300000
trusted library allocation
page read and write
20BF5F60000
trusted library allocation
page read and write
7FF9CE1C0000
trusted library allocation
page read and write
20BEED30000
trusted library section
page read and write
20BF569A000
heap
page read and write
7FF9CE2EB000
trusted library allocation
page read and write
20BF29BA000
heap
page read and write
20BF2954000
heap
page read and write
7FF408203000
trusted library allocation
page execute read
20BEC31F000
heap
page read and write
7FF9CE1E7000
trusted library allocation
page read and write
20BF56A4000
heap
page read and write
7FF9CE530000
trusted library allocation
page read and write
7FF9CE4E0000
trusted library allocation
page read and write
7FF9CE244000
trusted library allocation
page read and write
20BF29EC000
heap
page read and write
7FF4081CB000
trusted library allocation
page execute read
20BF29E8000
heap
page read and write
20BEE72D000
heap
page read and write
7FF4081F8000
trusted library allocation
page readonly
20BF4610000
trusted library allocation
page read and write
20BEE6D4000
heap
page read and write
20BF2B0B000
heap
page read and write
20BF29D0000
heap
page read and write
20BF60A0000
trusted library allocation
page read and write
20BF6100000
heap
page read and write
20BF58B5000
heap
page read and write
20BEE763000
heap
page read and write
20BF5B26000
heap
page read and write
20BF294A000
heap
page read and write
7FF9CE3A0000
trusted library allocation
page read and write
20BF4700000
trusted library allocation
page read and write
7FF9CE2E0000
trusted library allocation
page read and write
7FF9CE520000
trusted library allocation
page read and write
20BF29D6000
heap
page read and write
7FF4081F9000
trusted library allocation
page execute read
20BEED90000
trusted library allocation
page read and write
20BEEFF0000
trusted library allocation
page read and write
7FF9CE0DC000
trusted library allocation
page execute and read and write
7FF4081C7000
trusted library allocation
page execute read
7FF9CE020000
trusted library allocation
page read and write
20BEECA0000
trusted library allocation
page read and write
20BEE6D2000
heap
page read and write
20BEE6C8000
heap
page read and write
20BF2A45000
heap
page read and write
20BF03E8000
heap
page read and write
7FF408194000
trusted library allocation
page readonly
7FF4081C1000
trusted library allocation
page execute read
20BF6184000
heap
page read and write
20BEC321000
heap
page read and write
20BEEE20000
trusted library allocation
page read and write
20BF58D4000
heap
page read and write
20BF28B0000
heap
page read and write
20BF5738000
heap
page read and write
20BF6193000
heap
page read and write
7FF4081BE000
trusted library allocation
page readonly
20BF56F6000
heap
page read and write
20B80218000
trusted library allocation
page read and write
20BEEA6F000
heap
page read and write
7FF9CE1D0000
trusted library allocation
page read and write
20BEEA4E000
heap
page read and write
7FF9CE4B0000
trusted library allocation
page read and write
20BF2946000
heap
page read and write
20BF2A28000
heap
page read and write
20BEEEC0000
trusted library allocation
page read and write
20BEECC0000
trusted library allocation
page read and write
20BF573B000
heap
page read and write
7FF9CE390000
trusted library allocation
page read and write
20BF2A4F000
heap
page read and write
20B90366000
trusted library allocation
page read and write
20BF60E0000
trusted library allocation
page read and write
20BF618C000
heap
page read and write
20BF57E1000
heap
page read and write
20BF5F10000
trusted library allocation
page read and write
20BEE725000
heap
page read and write
20BF7300000
trusted library allocation
page read and write
7FF9CE040000
trusted library allocation
page read and write
48482FC000
stack
page read and write
20BF46D0000
trusted library allocation
page read and write
20BF29DA000
heap
page read and write
20BF7118000
heap
page read and write
20BF05CB000
heap
page read and write
20BF5684000
heap
page read and write
20BEED20000
trusted library allocation
page read and write
20BEEE30000
trusted library allocation
page read and write
20BEECB0000
trusted library allocation
page read and write
20BF2B5E000
heap
page read and write
7FF9CE4F0000
trusted library allocation
page read and write
7FF408195000
trusted library allocation
page execute read
7FF9CE140000
trusted library allocation
page execute and read and write
7FF9CE3B0000
trusted library allocation
page execute and read and write
20BF2845000
heap
page read and write
7FF9CE106000
trusted library allocation
page execute and read and write
7FF9CE1F0000
trusted library allocation
page read and write
20BEBF90000
unkown
page readonly
20BEE71C000
heap
page read and write
20BEEF20000
trusted library allocation
page read and write
20B80D34000
trusted library allocation
page read and write
7FF4081AD000
trusted library allocation
page execute read
20BF59A1000
heap
page read and write
7FF9CE502000
trusted library allocation
page read and write
7FF4081A8000
trusted library allocation
page readonly
20BF29FF000
heap
page read and write
20BEC5A0000
heap
page read and write
20BF2931000
heap
page read and write
20BF581C000
heap
page read and write
20BF28F0000
heap
page read and write
7FF9CE340000
trusted library allocation
page read and write
20BF46C0000
trusted library allocation
page read and write
4848BF5000
stack
page read and write
20BF5F50000
trusted library allocation
page read and write
7FF9CE470000
trusted library allocation
page read and write
7FF9CE370000
trusted library allocation
page read and write
20BF5997000
heap
page read and write
7FF40818C000
trusted library allocation
page readonly
7FF9CE03D000
trusted library allocation
page execute and read and write
20BF5875000
heap
page read and write
20BF5924000
heap
page read and write
7FF408189000
trusted library allocation
page execute read
7FF4081AC000
trusted library allocation
page readonly
20BF5B84000
heap
page read and write
20BEE729000
heap
page read and write
20BEEE00000
trusted library allocation
page read and write
20BF044B000
heap
page read and write
20BF042C000
heap
page read and write
20BF5777000
heap
page read and write
7FF9CE320000
trusted library allocation
page read and write
20BF5254000
trusted library allocation
page read and write
20BEEE60000
trusted library allocation
page read and write
20BF59B7000
heap
page read and write
20BF70E0000
heap
page read and write
20B80240000
trusted library allocation
page read and write
20BF59A9000
heap
page read and write
20BEE239000
heap
page read and write
20BEEFB0000
trusted library allocation
page read and write
20BF5987000
heap
page read and write
7FF408197000
trusted library allocation
page execute read
20BF70D0000
trusted library allocation
page read and write
7FF9CE3E0000
trusted library allocation
page execute and read and write
20BF46E0000
trusted library allocation
page read and write
20BEEE50000
trusted library allocation
page read and write
4847B76000
stack
page read and write
20BEEEF0000
trusted library allocation
page read and write
20BF5A24000
heap
page read and write
20BEC500000
trusted library allocation
page read and write
20BF56AF000
heap
page read and write
20BEC510000
trusted library allocation
page read and write
20BF59C5000
heap
page read and write
20BF58B0000
heap
page read and write
20BF03F7000
heap
page read and write
48487FB000
stack
page read and write
7FF4081CA000
trusted library allocation
page readonly
20BF5A4B000
heap
page read and write
48493FB000
stack
page read and write
20BF27A0000
heap
page read and write
7FF9CE4C0000
trusted library allocation
page read and write
7FF9CE21F000
trusted library allocation
page read and write
7FF408185000
trusted library allocation
page execute read
7FF9CE4D0000
trusted library allocation
page read and write
20BF2A31000
heap
page read and write
7FF4081FF000
trusted library allocation
page execute read
20BF59B5000
heap
page read and write
48495FB000
stack
page read and write
20B80B96000
trusted library allocation
page read and write
7FF408183000
trusted library allocation
page execute read
20BF2B0E000
heap
page read and write
20BEEDF0000
trusted library allocation
page read and write
20BF6080000
trusted library allocation
page read and write
20BF589C000
heap
page read and write
20BEC680000
heap
page execute and read and write
20BEEE70000
trusted library allocation
page read and write
7FF408205000
trusted library allocation
page execute read
20BEF010000
trusted library allocation
page read and write
20BEEA9E000
heap
page read and write
7FF9CE360000
trusted library allocation
page read and write
20BF27DE000
heap
page read and write
20BF5A14000
heap
page read and write
20B8025B000
trusted library allocation
page read and write
20BF27FC000
heap
page read and write
20BF5B4F000
heap
page read and write
48483F4000
stack
page read and write
7FF40819B000
trusted library allocation
page execute read
20BEC4E0000
trusted library allocation
page read and write
7FF9CE1CE000
trusted library allocation
page read and write
20BEC3A8000
heap
page read and write
20BF7114000
heap
page read and write
20BF27CC000
heap
page read and write
20BF5676000
heap
page read and write
20BEEE80000
trusted library allocation
page read and write
20BF5272000
trusted library allocation
page read and write
7FF9CE286000
trusted library allocation
page read and write
7FF4081A7000
trusted library allocation
page execute read
20BEEDE0000
trusted library allocation
page read and write
20BEEFE0000
trusted library allocation
page read and write
20BF29AE000
heap
page read and write
20BEEE90000
trusted library allocation
page read and write
7FF4081AB000
trusted library allocation
page execute read
20BF5A17000
heap
page read and write
7FF408201000
trusted library allocation
page execute read
20BF57F0000
heap
page read and write
7FF9CE4A0000
trusted library allocation
page read and write
20BEEADF000
heap
page read and write
20B80D1A000
trusted library allocation
page read and write
48488FB000
stack
page read and write
20B80257000
trusted library allocation
page read and write
20BF3DA0000
trusted library allocation
page read and write
20BF60D0000
trusted library allocation
page read and write
20BF29C0000
heap
page read and write
7FF9CE311000
trusted library allocation
page read and write
20BF5682000
heap
page read and write
20BF4710000
trusted library allocation
page read and write
20BF27EC000
heap
page read and write
20BF60C0000
trusted library allocation
page read and write
7FF9CE330000
trusted library allocation
page read and write
20BF29D8000
heap
page read and write
20BF2AE8000
heap
page read and write
20BEE77D000
heap
page read and write
20BF27E2000
heap
page read and write
20BEECF0000
trusted library allocation
page read and write
20BF29DE000
heap
page read and write
7FF4081A1000
trusted library allocation
page execute read
20BEE690000
heap
page read and write
20BF2B6D000
heap
page read and write
20BEE9D0000
trusted library section
page read and write
7FF4081CD000
trusted library allocation
page execute read
20BF2780000
trusted library allocation
page read and write
48481FE000
stack
page read and write
20BF4600000
trusted library allocation
page read and write
20BF0503000
heap
page read and write
There are 509 hidden memdumps, click here to show them.