IOC Report
Z6ojPnRBp1.exe

loading gif

Files

File Path
Type
Category
Malicious
Z6ojPnRBp1.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\Z6ojPnRBp1.exe.log
ASCII text, with CRLF line terminators
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\RegSvcs.exe.log
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\tmp339D.tmp
SQLite 3.x database, last written using SQLite version 3046000, page size 2048, file counter 2, database pages 20, cookie 0xc, schema 4, UTF-8, version-valid-for 2
dropped
C:\Users\user\AppData\Local\Temp\tmp339E.tmp
SQLite 3.x database, last written using SQLite version 3046000, page size 2048, file counter 2, database pages 20, cookie 0xc, schema 4, UTF-8, version-valid-for 2
dropped
C:\Users\user\AppData\Local\Temp\tmp33AF.tmp
SQLite 3.x database, last written using SQLite version 3046000, page size 2048, file counter 2, database pages 20, cookie 0xc, schema 4, UTF-8, version-valid-for 2
dropped
C:\Users\user\AppData\Local\Temp\tmp33C0.tmp
SQLite 3.x database, last written using SQLite version 3046000, page size 2048, file counter 2, database pages 20, cookie 0xc, schema 4, UTF-8, version-valid-for 2
dropped
C:\Users\user\AppData\Local\Temp\tmp33C1.tmp
SQLite 3.x database, last written using SQLite version 3046000, page size 2048, file counter 2, database pages 20, cookie 0xc, schema 4, UTF-8, version-valid-for 2
dropped
C:\Users\user\AppData\Local\Temp\tmp33D1.tmp
SQLite 3.x database, last written using SQLite version 3046000, page size 2048, file counter 2, database pages 20, cookie 0xc, schema 4, UTF-8, version-valid-for 2
dropped
C:\Users\user\AppData\Local\Temp\tmp33E2.tmp
SQLite 3.x database, last written using SQLite version 3046000, page size 2048, file counter 6, database pages 68, cookie 0x4a, schema 4, UTF-8, version-valid-for 6
dropped
C:\Users\user\AppData\Local\Temp\tmp33E3.tmp
SQLite 3.x database, last written using SQLite version 3046000, page size 2048, file counter 6, database pages 68, cookie 0x4a, schema 4, UTF-8, version-valid-for 6
dropped
C:\Users\user\AppData\Local\Temp\tmp42A0.tmp
SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 2, database pages 56, cookie 0x24, schema 4, UTF-8, version-valid-for 2
dropped
C:\Users\user\AppData\Local\Temp\tmp42B1.tmp
SQLite 3.x database, user version 12, last written using SQLite version 3042000, page size 32768, writer version 2, read version 2, file counter 3, database pages 3, cookie 0x1, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\tmp42E1.tmp
SQLite 3.x database, user version 12, last written using SQLite version 3042000, page size 32768, writer version 2, read version 2, file counter 3, database pages 3, cookie 0x1, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\tmp6A94.tmp
SQLite 3.x database, last written using SQLite version 3046000, page size 2048, file counter 6, database pages 68, cookie 0x4a, schema 4, UTF-8, version-valid-for 6
dropped
C:\Users\user\AppData\Local\Temp\tmp6AB4.tmp
SQLite 3.x database, last written using SQLite version 3046000, page size 2048, file counter 6, database pages 68, cookie 0x4a, schema 4, UTF-8, version-valid-for 6
dropped
C:\Users\user\AppData\Local\Temp\tmp6AC5.tmp
SQLite 3.x database, last written using SQLite version 3046000, page size 2048, file counter 6, database pages 68, cookie 0x4a, schema 4, UTF-8, version-valid-for 6
dropped
C:\Users\user\AppData\Local\Temp\tmp6AD5.tmp
SQLite 3.x database, last written using SQLite version 3046000, page size 2048, file counter 6, database pages 68, cookie 0x4a, schema 4, UTF-8, version-valid-for 6
dropped
C:\Users\user\AppData\Local\Temp\tmp6AE6.tmp
SQLite 3.x database, last written using SQLite version 3046000, page size 2048, file counter 6, database pages 68, cookie 0x4a, schema 4, UTF-8, version-valid-for 6
dropped
C:\Users\user\AppData\Local\Temp\tmp6AF7.tmp
SQLite 3.x database, last written using SQLite version 3046000, page size 2048, file counter 6, database pages 68, cookie 0x4a, schema 4, UTF-8, version-valid-for 6
dropped
C:\Users\user\AppData\Local\Temp\tmpA13A.tmp
SQLite 3.x database, last written using SQLite version 3046000, page size 2048, file counter 6, database pages 68, cookie 0x4a, schema 4, UTF-8, version-valid-for 6
dropped
C:\Users\user\AppData\Local\Temp\tmpA13B.tmp
SQLite 3.x database, last written using SQLite version 3046000, page size 2048, file counter 6, database pages 68, cookie 0x4a, schema 4, UTF-8, version-valid-for 6
dropped
C:\Users\user\AppData\Local\Temp\tmpA14C.tmp
SQLite 3.x database, last written using SQLite version 3046000, page size 2048, file counter 6, database pages 68, cookie 0x4a, schema 4, UTF-8, version-valid-for 6
dropped
C:\Users\user\AppData\Local\Temp\tmpA15C.tmp
SQLite 3.x database, last written using SQLite version 3046000, page size 2048, file counter 6, database pages 68, cookie 0x4a, schema 4, UTF-8, version-valid-for 6
dropped
C:\Users\user\AppData\Local\Temp\tmpA16D.tmp
SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 1, database pages 24, cookie 0xe, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\tmpA17E.tmp
SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 1, database pages 24, cookie 0xe, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\tmpA17F.tmp
SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 1, database pages 24, cookie 0xe, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\tmpA18F.tmp
SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 1, database pages 24, cookie 0xe, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\tmpA1A0.tmp
SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 1, database pages 24, cookie 0xe, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\tmpA1B1.tmp
SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 1, database pages 24, cookie 0xe, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\tmpD42.tmp
SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 2, database pages 56, cookie 0x24, schema 4, UTF-8, version-valid-for 2
dropped
C:\Users\user\AppData\Local\Temp\tmpD62.tmp
SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 2, database pages 56, cookie 0x24, schema 4, UTF-8, version-valid-for 2
dropped
C:\Users\user\AppData\Local\Temp\tmpD63.tmp
SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 2, database pages 56, cookie 0x24, schema 4, UTF-8, version-valid-for 2
dropped
C:\Users\user\AppData\Local\Temp\tmpD777.tmp
SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 2, database pages 56, cookie 0x24, schema 4, UTF-8, version-valid-for 2
dropped
C:\Users\user\AppData\Local\Temp\tmpD788.tmp
SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 2, database pages 56, cookie 0x24, schema 4, UTF-8, version-valid-for 2
dropped
C:\Users\user\AppData\Local\Temp\tmpD7A8.tmp
SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 2, database pages 56, cookie 0x24, schema 4, UTF-8, version-valid-for 2
dropped
C:\Users\user\AppData\Local\Temp\tmpD7B9.tmp
SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 2, database pages 56, cookie 0x24, schema 4, UTF-8, version-valid-for 2
dropped
C:\Users\user\AppData\Local\Temp\tmpD7D9.tmp
SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 2, database pages 56, cookie 0x24, schema 4, UTF-8, version-valid-for 2
dropped
C:\Users\user\AppData\Local\Temp\tmpD83.tmp
SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 2, database pages 56, cookie 0x24, schema 4, UTF-8, version-valid-for 2
dropped
C:\Users\user\AppData\Local\Temp\tmpD94.tmp
SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 2, database pages 56, cookie 0x24, schema 4, UTF-8, version-valid-for 2
dropped
C:\Users\user\AppData\Local\Temp\tmpDA5.tmp
SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 2, database pages 56, cookie 0x24, schema 4, UTF-8, version-valid-for 2
dropped
C:\Users\user\AppData\Local\Temp\tmpFBFF.tmp
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\tmpFC00.tmp
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\tmpFC01.tmp
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\tmpFC12.tmp
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
There are 35 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\Z6ojPnRBp1.exe
"C:\Users\user\Desktop\Z6ojPnRBp1.exe"
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1

URLs

Name
IP
Malicious
45.137.22.249:55615
malicious
http://45.137.22.249:55615/
45.137.22.249
malicious
http://www.fontbureau.com/designersG
unknown
https://duckduckgo.com/ac/?q=
unknown
http://www.fontbureau.com/designers/?
unknown
http://www.founder.com.cn/cn/bThe
unknown
http://schemas.xmlsoap.org/ws/2004/08/addressing/faultX
unknown
http://www.fontbureau.com/designers?
unknown
http://tempuri.org/Endpoint/EnvironmentSettings
unknown
https://api.ip.sb/geoip
104.26.13.31
http://schemas.xmlsoap.org/soap/envelope/
unknown
http://www.tiro.com
unknown
http://tempuri.org/
unknown
https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
unknown
http://www.fontbureau.com/designers
unknown
http://tempuri.org/Endpoint/VerifyUpdateResponse
unknown
http://tempuri.org/Endpoint/SetEnvironment
unknown
http://tempuri.org/Endpoint/SetEnvironmentResponse
unknown
http://www.sajatypeworks.com
unknown
http://tempuri.org/Endpoint/GetUpdates
unknown
http://www.typography.netD
unknown
https://www.google.com/images/branding/product/ico/googleg_alldp.ico
unknown
http://www.founder.com.cn/cn/cThe
unknown
http://www.galapagosdesign.com/staff/dennis.htm
unknown
http://45.137.22.249:55615t-
unknown
https://api.ipify.orgcookies//settinString.Removeg
unknown
https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
unknown
http://www.galapagosdesign.com/DPlease
unknown
http://tempuri.org/Endpoint/VerifyUpdate
unknown
http://tempuri.org/0
unknown
http://www.fonts.com
unknown
http://www.urwpp.deDPlease
unknown
http://www.zhongyicts.com.cn
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
http://www.sakkal.com
unknown
https://ipinfo.io/ip%appdata%
unknown
http://45.137.22.249:55615
unknown
http://www.apache.org/licenses/LICENSE-2.0
unknown
http://www.fontbureau.com
unknown
http://schemas.xmlsoap.org/ws/2004/08/addressing/role/anonymous
unknown
http://tempuri.org/Endpoint/CheckConnectResponse
unknown
http://schemas.datacontract.org/2004/07/
unknown
https://api.ip.sb/geoip%USERPEnvironmentROFILE%
unknown
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
unknown
https://ac.ecosia.org?q=
unknown
http://tempuri.org/Endpoint/CheckConnect
unknown
http://www.carterandcone.coml
unknown
http://www.fontbureau.com/designers/cabarga.htmlN
unknown
http://www.founder.com.cn/cn
unknown
https://www.ecosia.org/newtab/v20
unknown
http://www.fontbureau.com/designers/frere-user.html
unknown
http://schemas.xmlsoap.org/ws/2004/08/addressing
unknown
https://duckduckgo.com/chrome_newtabv20
unknown
http://tempuri.org/Endpoint/GetUpdatesResponse
unknown
http://www.jiyu-kobo.co.jp/
unknown
http://tempuri.org/Endpoint/EnvironmentSettingsResponse
unknown
http://www.fontbureau.com/designers8
unknown
https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
unknown
https://gemini.google.com/app?q=
unknown
http://schemas.xmlsoap.org/soap/actor/next
unknown
There are 50 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
api.ip.sb.cdn.cloudflare.net
104.26.13.31
api.ip.sb
unknown

IPs

IP
Domain
Country
Malicious
45.137.22.249
unknown
Netherlands
malicious
104.26.13.31
api.ip.sb.cdn.cloudflare.net
United States

Registry

Path
Value
Malicious
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASAPI32
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASAPI32
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASAPI32
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASAPI32
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASAPI32
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASAPI32
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASAPI32
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASMANCS
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASMANCS
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASMANCS
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASMANCS
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASMANCS
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASMANCS
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASMANCS
FileDirectory
There are 5 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
3747000
trusted library allocation
page read and write
malicious
402000
remote allocation
page execute and read and write
malicious
6C26000
trusted library allocation
page read and write
539E000
stack
page read and write
1450000
heap
page read and write
732E000
stack
page read and write
7E40000
trusted library section
page read and write
6AA1000
heap
page read and write
4BA0000
trusted library allocation
page read and write
980000
trusted library allocation
page read and write
6A35000
heap
page read and write
5290000
heap
page execute and read and write
621E000
stack
page read and write
3F3C000
trusted library allocation
page read and write
982000
trusted library allocation
page read and write
62FC000
heap
page read and write
479D000
stack
page read and write
D00000
heap
page read and write
2EB1000
trusted library allocation
page read and write
A87000
heap
page read and write
62C8000
heap
page read and write
4B90000
trusted library allocation
page read and write
4B52000
trusted library allocation
page read and write
970000
trusted library allocation
page read and write
3F2C000
trusted library allocation
page read and write
6C10000
trusted library allocation
page read and write
4B24000
trusted library allocation
page read and write
62D3000
heap
page read and write
56C0000
trusted library allocation
page execute and read and write
4B46000
trusted library allocation
page read and write
CF8000
stack
page read and write
5610000
trusted library allocation
page read and write
9B0000
heap
page read and write
72A0000
trusted library allocation
page read and write
2EC3000
trusted library allocation
page read and write
6CE0000
trusted library allocation
page read and write
511E000
stack
page read and write
940000
heap
page read and write
4D3C000
stack
page read and write
57CF000
stack
page read and write
5502000
trusted library allocation
page read and write
6A3A000
heap
page read and write
3EFD000
trusted library allocation
page read and write
6A00000
heap
page read and write
6311000
heap
page read and write
930000
trusted library allocation
page read and write
7860000
trusted library allocation
page execute and read and write
11F2000
trusted library allocation
page read and write
2AC6000
trusted library allocation
page read and write
2777000
trusted library allocation
page read and write
7070000
trusted library allocation
page read and write
2723000
trusted library allocation
page read and write
5261000
trusted library allocation
page read and write
11D0000
trusted library allocation
page read and write
30C4000
trusted library allocation
page read and write
36A2000
trusted library allocation
page read and write
54F1000
trusted library allocation
page read and write
E20000
heap
page read and write
4EA0000
heap
page read and write
3DA1000
trusted library allocation
page read and write
6C3E000
trusted library allocation
page read and write
2F0000
unkown
page readonly
1270000
heap
page read and write
75E0000
trusted library allocation
page execute and read and write
5530000
trusted library allocation
page read and write
954000
trusted library allocation
page read and write
6A55000
heap
page read and write
11C4000
trusted library allocation
page read and write
4118000
trusted library allocation
page read and write
A8A000
heap
page read and write
6228000
heap
page read and write
62E6000
heap
page read and write
57D7000
heap
page read and write
2E20000
trusted library allocation
page read and write
6C70000
trusted library allocation
page read and write
5630000
trusted library allocation
page execute and read and write
73B0000
heap
page read and write
2727000
trusted library allocation
page read and write
6560000
heap
page read and write
2F2D000
trusted library allocation
page read and write
74C0000
heap
page read and write
5785000
heap
page read and write
820000
heap
page read and write
3F35000
trusted library allocation
page read and write
7660000
trusted library allocation
page read and write
6A1F000
heap
page read and write
953000
trusted library allocation
page execute and read and write
50C0000
trusted library allocation
page read and write
6A98000
heap
page read and write
6C41000
trusted library allocation
page read and write
2B70000
trusted library allocation
page read and write
6F70000
trusted library allocation
page read and write
6F80000
trusted library allocation
page read and write
9A0000
trusted library allocation
page read and write
50C2000
trusted library allocation
page read and write
7DAE000
stack
page read and write
57D0000
trusted library allocation
page read and write
985000
trusted library allocation
page execute and read and write
3DD2000
trusted library allocation
page read and write
7115000
heap
page read and write
E40000
heap
page read and write
2E18000
trusted library allocation
page read and write
75D0000
trusted library allocation
page read and write
62DE000
heap
page read and write
71A0000
trusted library section
page read and write
577D000
stack
page read and write
2D90000
heap
page execute and read and write
3DB2000
trusted library allocation
page read and write
6460000
heap
page execute and read and write
30F3000
trusted library allocation
page read and write
4EB0000
trusted library allocation
page read and write
54F6000
trusted library allocation
page read and write
6A31000
heap
page read and write
11CD000
trusted library allocation
page execute and read and write
780000
heap
page read and write
4BC0000
trusted library allocation
page read and write
644A000
trusted library allocation
page read and write
70FD000
heap
page read and write
6450000
trusted library allocation
page read and write
2E31000
trusted library allocation
page read and write
525E000
stack
page read and write
65AE000
stack
page read and write
11F7000
trusted library allocation
page execute and read and write
57DB000
trusted library allocation
page read and write
2E2D000
trusted library allocation
page read and write
9EF000
heap
page read and write
6A75000
heap
page read and write
6C38000
trusted library allocation
page read and write
A11000
heap
page read and write
144C000
stack
page read and write
F8D000
stack
page read and write
62F8000
heap
page read and write
FA8000
heap
page read and write
2BE8000
trusted library allocation
page read and write
4F00000
trusted library allocation
page read and write
2BC0000
trusted library allocation
page read and write
4CD0000
trusted library allocation
page read and write
A880000
heap
page read and write
57E6000
heap
page read and write
644F000
trusted library allocation
page read and write
4AE0000
trusted library allocation
page execute and read and write
5A70000
trusted library allocation
page read and write
F4E000
stack
page read and write
4B20000
trusted library allocation
page read and write
7640000
trusted library allocation
page execute and read and write
4B60000
trusted library allocation
page read and write
4218000
trusted library allocation
page read and write
69FE000
stack
page read and write
6C34000
trusted library allocation
page read and write
77D0000
trusted library allocation
page read and write
71E0000
trusted library allocation
page execute and read and write
6C22000
trusted library allocation
page read and write
65EE000
stack
page read and write
3F25000
trusted library allocation
page read and write
2F10000
trusted library allocation
page read and write
2D80000
trusted library allocation
page read and write
3F09000
trusted library allocation
page read and write
9C0000
heap
page execute and read and write
4CE0000
trusted library allocation
page execute and read and write
4F40000
trusted library allocation
page read and write
6A93000
heap
page read and write
7FDE000
stack
page read and write
72C0000
trusted library allocation
page read and write
72E0000
trusted library allocation
page execute and read and write
2BD0000
heap
page read and write
7630000
trusted library allocation
page read and write
3F48000
trusted library allocation
page read and write
4D40000
trusted library section
page readonly
AAE000
heap
page read and write
643A000
trusted library allocation
page read and write
5560000
trusted library allocation
page execute and read and write
327B000
trusted library allocation
page read and write
57DE000
trusted library allocation
page read and write
55F0000
trusted library allocation
page read and write
6C00000
trusted library allocation
page read and write
5790000
heap
page read and write
7686000
heap
page read and write
4B50000
trusted library allocation
page read and write
6C06000
trusted library allocation
page read and write
FCA000
heap
page read and write
2661000
trusted library allocation
page read and write
2650000
heap
page read and write
74BE000
stack
page read and write
54EB000
trusted library allocation
page read and write
790000
heap
page read and write
3FF5000
trusted library allocation
page read and write
5AF0000
trusted library allocation
page read and write
6FA0000
trusted library allocation
page execute and read and write
742F000
stack
page read and write
947000
heap
page read and write
5AE4000
trusted library allocation
page read and write
4C10000
trusted library allocation
page read and write
6A51000
heap
page read and write
3DBF000
trusted library allocation
page read and write
6305000
heap
page read and write
631C000
heap
page read and write
71D0000
trusted library allocation
page read and write
7390000
trusted library allocation
page read and write
630E000
heap
page read and write
4F50000
heap
page execute and read and write
AABE000
stack
page read and write
6A0B000
heap
page read and write
E45000
heap
page read and write
FBF000
heap
page read and write
2B80000
heap
page read and write
3F41000
trusted library allocation
page read and write
6C4D000
trusted library allocation
page read and write
7DE000
stack
page read and write
825000
heap
page read and write
70A4000
heap
page read and write
7090000
trusted library allocation
page execute and read and write
6530000
trusted library allocation
page read and write
64CD000
stack
page read and write
4B2B000
trusted library allocation
page read and write
30F9000
trusted library allocation
page read and write
3F19000
trusted library allocation
page read and write
11C0000
trusted library allocation
page read and write
72B0000
trusted library allocation
page read and write
400000
remote allocation
page execute and read and write
6A0F000
heap
page read and write
62DB000
heap
page read and write
5AF5000
trusted library allocation
page read and write
71C0000
trusted library allocation
page execute and read and write
1061000
heap
page read and write
A04000
heap
page read and write
7FD20000
trusted library allocation
page execute and read and write
4E80000
heap
page read and write
A43000
heap
page read and write
5590000
trusted library allocation
page execute and read and write
5AD0000
trusted library allocation
page execute and read and write
6A46000
heap
page read and write
309C000
trusted library allocation
page read and write
70E2000
heap
page read and write
67C0000
heap
page read and write
99B000
stack
page read and write
6A3E000
heap
page read and write
6C46000
trusted library allocation
page read and write
62D1000
heap
page read and write
6CDB000
stack
page read and write
3F10000
trusted library allocation
page read and write
7670000
heap
page read and write
2773000
trusted library allocation
page read and write
5AE0000
trusted library allocation
page read and write
781E000
stack
page read and write
A90000
heap
page read and write
3279000
trusted library allocation
page read and write
7E2D000
stack
page read and write
6A28000
heap
page read and write
3F20000
trusted library allocation
page read and write
5ACE000
stack
page read and write
95D000
trusted library allocation
page execute and read and write
2EA9000
trusted library allocation
page read and write
62B4000
heap
page read and write
57A0000
heap
page read and write
3661000
trusted library allocation
page read and write
7650000
trusted library allocation
page read and write
96D000
trusted library allocation
page execute and read and write
6429000
trusted library allocation
page read and write
56BE000
stack
page read and write
4E90000
heap
page read and write
71D2000
trusted library allocation
page read and write
98B000
trusted library allocation
page execute and read and write
2BB4000
trusted library allocation
page read and write
4B4D000
trusted library allocation
page read and write
2FF9000
trusted library allocation
page read and write
3DB8000
trusted library allocation
page read and write
145B000
heap
page read and write
4B85000
trusted library allocation
page read and write
2B6E000
stack
page read and write
53DD000
stack
page read and write
7790000
trusted library allocation
page execute and read and write
6438000
trusted library allocation
page read and write
4B80000
trusted library allocation
page read and write
54DE000
stack
page read and write
97A000
trusted library allocation
page execute and read and write
987000
trusted library allocation
page execute and read and write
5520000
trusted library allocation
page read and write
81E000
stack
page read and write
11E6000
trusted library allocation
page execute and read and write
6445000
trusted library allocation
page read and write
2F93000
trusted library allocation
page read and write
3DCB000
trusted library allocation
page read and write
7620000
trusted library allocation
page execute and read and write
628C000
heap
page read and write
4B41000
trusted library allocation
page read and write
3096000
trusted library allocation
page read and write
2BA0000
trusted library allocation
page read and write
62F4000
heap
page read and write
6C52000
trusted library allocation
page read and write
11E2000
trusted library allocation
page read and write
73A0000
trusted library allocation
page execute and read and write
A85000
heap
page read and write
386000
unkown
page readonly
2DA1000
trusted library allocation
page read and write
6425000
trusted library allocation
page read and write
7770000
trusted library allocation
page read and write
30CA000
trusted library allocation
page read and write
6C2F000
trusted library allocation
page read and write
567E000
stack
page read and write
A9BD000
stack
page read and write
6C24000
trusted library allocation
page read and write
62A5000
heap
page read and write
7EDE000
stack
page read and write
2BB0000
trusted library allocation
page read and write
A87D000
stack
page read and write
3F2F000
trusted library allocation
page read and write
9DE000
heap
page read and write
5280000
trusted library allocation
page read and write
469C000
stack
page read and write
7D6F000
stack
page read and write
CCF000
stack
page read and write
11F0000
trusted library allocation
page read and write
24AE000
stack
page read and write
6262000
heap
page read and write
7F9F000
stack
page read and write
4B10000
trusted library allocation
page read and write
6A5C000
heap
page read and write
4F30000
trusted library allocation
page read and write
6F90000
trusted library allocation
page execute and read and write
5A50000
trusted library allocation
page read and write
119E000
stack
page read and write
25B8000
trusted library allocation
page read and write
11DD000
trusted library allocation
page execute and read and write
6422000
trusted library allocation
page read and write
9D8000
heap
page read and write
6FE0000
trusted library allocation
page read and write
950000
trusted library allocation
page read and write
650E000
stack
page read and write
68B2000
trusted library allocation
page read and write
4D50000
heap
page read and write
1260000
trusted library allocation
page execute and read and write
976000
trusted library allocation
page execute and read and write
4D53000
heap
page read and write
4AF0000
heap
page read and write
70AA000
heap
page read and write
11F5000
trusted library allocation
page execute and read and write
FD8000
heap
page read and write
560D000
trusted library allocation
page read and write
2775000
trusted library allocation
page read and write
125E000
stack
page read and write
630B000
heap
page read and write
6420000
trusted library allocation
page read and write
6A87000
heap
page read and write
11E0000
trusted library allocation
page read and write
4C00000
trusted library allocation
page execute and read and write
6A12000
heap
page read and write
BCF000
stack
page read and write
6FD0000
trusted library allocation
page execute and read and write
5570000
trusted library allocation
page read and write
5293000
heap
page execute and read and write
5AF2000
trusted library allocation
page read and write
4B3E000
trusted library allocation
page read and write
641E000
stack
page read and write
7380000
trusted library allocation
page read and write
6C60000
trusted library allocation
page read and write
7610000
trusted library allocation
page read and write
6C55000
trusted library allocation
page read and write
6520000
trusted library allocation
page execute and read and write
5A72000
trusted library allocation
page read and write
4BF0000
heap
page read and write
643F000
trusted library allocation
page read and write
67D0000
heap
page read and write
785E000
stack
page read and write
972000
trusted library allocation
page read and write
70F0000
heap
page read and write
A77E000
stack
page read and write
7DEE000
stack
page read and write
6890000
trusted library allocation
page read and write
2F2000
unkown
page readonly
11C3000
trusted library allocation
page execute and read and write
3DC4000
trusted library allocation
page read and write
5511000
trusted library allocation
page read and write
560A000
trusted library allocation
page read and write
2BBA000
trusted library allocation
page read and write
3DAE000
trusted library allocation
page read and write
5620000
trusted library allocation
page read and write
3E14000
trusted library allocation
page read and write
1210000
trusted library allocation
page read and write
521E000
stack
page read and write
54E0000
trusted library allocation
page read and write
3F53000
trusted library allocation
page read and write
1456000
heap
page read and write
AA0000
heap
page read and write
4B70000
trusted library allocation
page read and write
63A000
stack
page read and write
E1E000
stack
page read and write
6C90000
heap
page read and write
6A6C000
heap
page read and write
2D7D000
stack
page read and write
5580000
trusted library allocation
page read and write
7C6E000
stack
page read and write
2E12000
trusted library allocation
page read and write
960000
trusted library allocation
page read and write
3F04000
trusted library allocation
page read and write
707F000
trusted library allocation
page read and write
6C48000
trusted library allocation
page read and write
7382000
trusted library allocation
page read and write
809F000
stack
page read and write
25AF000
stack
page read and write
5A80000
trusted library allocation
page execute and read and write
57A6000
heap
page read and write
5780000
heap
page read and write
FA0000
heap
page read and write
55E0000
trusted library allocation
page read and write
11B0000
trusted library allocation
page read and write
A67F000
stack
page read and write
9D0000
heap
page read and write
6A9D000
heap
page read and write
69BF000
stack
page read and write
963000
trusted library allocation
page read and write
6C64000
trusted library allocation
page read and write
11FB000
trusted library allocation
page execute and read and write
3F63000
trusted library allocation
page read and write
550E000
trusted library allocation
page read and write
6C2C000
trusted library allocation
page read and write
737000
stack
page read and write
3F13000
trusted library allocation
page read and write
2DF0000
trusted library allocation
page read and write
There are 408 hidden memdumps, click here to show them.