IOC Report
PalEak0Yh6.exe

loading gif

Files

File Path
Type
Category
Malicious
PalEak0Yh6.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\PalEak0Yh6.exe.log
ASCII text, with CRLF line terminators
dropped
malicious
C:\Users\user\AppData\Local\Temp\tmp1377.tmp
SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 2, database pages 56, cookie 0x24, schema 4, UTF-8, version-valid-for 2
dropped
C:\Users\user\AppData\Local\Temp\tmp1387.tmp
SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 2, database pages 56, cookie 0x24, schema 4, UTF-8, version-valid-for 2
dropped
C:\Users\user\AppData\Local\Temp\tmp1398.tmp
SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 2, database pages 56, cookie 0x24, schema 4, UTF-8, version-valid-for 2
dropped
C:\Users\user\AppData\Local\Temp\tmp13B8.tmp
SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 2, database pages 56, cookie 0x24, schema 4, UTF-8, version-valid-for 2
dropped
C:\Users\user\AppData\Local\Temp\tmp13C9.tmp
SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 2, database pages 56, cookie 0x24, schema 4, UTF-8, version-valid-for 2
dropped
C:\Users\user\AppData\Local\Temp\tmp13DA.tmp
SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 2, database pages 56, cookie 0x24, schema 4, UTF-8, version-valid-for 2
dropped
C:\Users\user\AppData\Local\Temp\tmp34B4.tmp
SQLite 3.x database, last written using SQLite version 3046000, page size 2048, file counter 2, database pages 20, cookie 0xc, schema 4, UTF-8, version-valid-for 2
dropped
C:\Users\user\AppData\Local\Temp\tmp4A3C.tmp
SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 2, database pages 56, cookie 0x24, schema 4, UTF-8, version-valid-for 2
dropped
C:\Users\user\AppData\Local\Temp\tmp4A4D.tmp
SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 2, database pages 56, cookie 0x24, schema 4, UTF-8, version-valid-for 2
dropped
C:\Users\user\AppData\Local\Temp\tmp4A5E.tmp
SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 2, database pages 56, cookie 0x24, schema 4, UTF-8, version-valid-for 2
dropped
C:\Users\user\AppData\Local\Temp\tmp4A7E.tmp
SQLite 3.x database, user version 12, last written using SQLite version 3042000, page size 32768, writer version 2, read version 2, file counter 3, database pages 3, cookie 0x1, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\tmp4A8F.tmp
SQLite 3.x database, user version 12, last written using SQLite version 3042000, page size 32768, writer version 2, read version 2, file counter 3, database pages 3, cookie 0x1, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\tmp552A.tmp
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\tmp553A.tmp
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\tmp553B.tmp
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\tmp553C.tmp
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\tmp6CBD.tmp
SQLite 3.x database, last written using SQLite version 3046000, page size 2048, file counter 2, database pages 20, cookie 0xc, schema 4, UTF-8, version-valid-for 2
dropped
C:\Users\user\AppData\Local\Temp\tmp6CCD.tmp
SQLite 3.x database, last written using SQLite version 3046000, page size 2048, file counter 2, database pages 20, cookie 0xc, schema 4, UTF-8, version-valid-for 2
dropped
C:\Users\user\AppData\Local\Temp\tmp6CDE.tmp
SQLite 3.x database, last written using SQLite version 3046000, page size 2048, file counter 2, database pages 20, cookie 0xc, schema 4, UTF-8, version-valid-for 2
dropped
C:\Users\user\AppData\Local\Temp\tmp6CDF.tmp
SQLite 3.x database, last written using SQLite version 3046000, page size 2048, file counter 2, database pages 20, cookie 0xc, schema 4, UTF-8, version-valid-for 2
dropped
C:\Users\user\AppData\Local\Temp\tmp6CEF.tmp
SQLite 3.x database, last written using SQLite version 3046000, page size 2048, file counter 2, database pages 20, cookie 0xc, schema 4, UTF-8, version-valid-for 2
dropped
C:\Users\user\AppData\Local\Temp\tmp6D00.tmp
SQLite 3.x database, last written using SQLite version 3046000, page size 2048, file counter 6, database pages 68, cookie 0x4a, schema 4, UTF-8, version-valid-for 6
dropped
C:\Users\user\AppData\Local\Temp\tmp6D11.tmp
SQLite 3.x database, last written using SQLite version 3046000, page size 2048, file counter 6, database pages 68, cookie 0x4a, schema 4, UTF-8, version-valid-for 6
dropped
C:\Users\user\AppData\Local\Temp\tmp6D31.tmp
SQLite 3.x database, last written using SQLite version 3046000, page size 2048, file counter 6, database pages 68, cookie 0x4a, schema 4, UTF-8, version-valid-for 6
dropped
C:\Users\user\AppData\Local\Temp\tmpA4CC.tmp
SQLite 3.x database, last written using SQLite version 3046000, page size 2048, file counter 6, database pages 68, cookie 0x4a, schema 4, UTF-8, version-valid-for 6
dropped
C:\Users\user\AppData\Local\Temp\tmpA4CD.tmp
SQLite 3.x database, last written using SQLite version 3046000, page size 2048, file counter 6, database pages 68, cookie 0x4a, schema 4, UTF-8, version-valid-for 6
dropped
C:\Users\user\AppData\Local\Temp\tmpA4DE.tmp
SQLite 3.x database, last written using SQLite version 3046000, page size 2048, file counter 6, database pages 68, cookie 0x4a, schema 4, UTF-8, version-valid-for 6
dropped
C:\Users\user\AppData\Local\Temp\tmpA4EF.tmp
SQLite 3.x database, last written using SQLite version 3046000, page size 2048, file counter 6, database pages 68, cookie 0x4a, schema 4, UTF-8, version-valid-for 6
dropped
C:\Users\user\AppData\Local\Temp\tmpA4FF.tmp
SQLite 3.x database, last written using SQLite version 3046000, page size 2048, file counter 6, database pages 68, cookie 0x4a, schema 4, UTF-8, version-valid-for 6
dropped
C:\Users\user\AppData\Local\Temp\tmpA510.tmp
SQLite 3.x database, last written using SQLite version 3046000, page size 2048, file counter 6, database pages 68, cookie 0x4a, schema 4, UTF-8, version-valid-for 6
dropped
C:\Users\user\AppData\Local\Temp\tmpA520.tmp
SQLite 3.x database, last written using SQLite version 3046000, page size 2048, file counter 6, database pages 68, cookie 0x4a, schema 4, UTF-8, version-valid-for 6
dropped
C:\Users\user\AppData\Local\Temp\tmpA521.tmp
SQLite 3.x database, last written using SQLite version 3046000, page size 2048, file counter 6, database pages 68, cookie 0x4a, schema 4, UTF-8, version-valid-for 6
dropped
C:\Users\user\AppData\Local\Temp\tmpDC4F.tmp
SQLite 3.x database, last written using SQLite version 3046000, page size 2048, file counter 6, database pages 68, cookie 0x4a, schema 4, UTF-8, version-valid-for 6
dropped
C:\Users\user\AppData\Local\Temp\tmpDC60.tmp
SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 1, database pages 24, cookie 0xe, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\tmpDC71.tmp
SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 1, database pages 24, cookie 0xe, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\tmpDC72.tmp
SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 1, database pages 24, cookie 0xe, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\tmpDC82.tmp
SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 1, database pages 24, cookie 0xe, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\tmpDC83.tmp
SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 1, database pages 24, cookie 0xe, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\tmpDC94.tmp
SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 1, database pages 24, cookie 0xe, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\tmpDC95.tmp
SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 2, database pages 56, cookie 0x24, schema 4, UTF-8, version-valid-for 2
dropped
C:\Users\user\AppData\Local\Temp\tmpDCA6.tmp
SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 2, database pages 56, cookie 0x24, schema 4, UTF-8, version-valid-for 2
dropped
C:\Users\user\AppData\Local\Temp\tmpDCB6.tmp
SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 2, database pages 56, cookie 0x24, schema 4, UTF-8, version-valid-for 2
dropped
There are 34 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\PalEak0Yh6.exe
"C:\Users\user\Desktop\PalEak0Yh6.exe"
malicious
C:\Users\user\Desktop\PalEak0Yh6.exe
"C:\Users\user\Desktop\PalEak0Yh6.exe"
malicious
C:\Users\user\Desktop\PalEak0Yh6.exe
"C:\Users\user\Desktop\PalEak0Yh6.exe"
malicious
C:\Users\user\Desktop\PalEak0Yh6.exe
"C:\Users\user\Desktop\PalEak0Yh6.exe"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1

URLs

Name
IP
Malicious
45.137.22.163:55615
malicious
http://45.137.22.163:55615/
45.137.22.163
malicious
http://www.fontbureau.com/designersG
unknown
https://duckduckgo.com/ac/?q=
unknown
http://www.fontbureau.com/designers/?
unknown
http://www.founder.com.cn/cn/bThe
unknown
http://schemas.xmlsoap.org/ws/2004/08/addressing/faultX
unknown
http://www.fontbureau.com/designers?
unknown
http://tempuri.org/Endpoint/EnvironmentSettings
unknown
https://api.ip.sb/geoip
172.67.75.172
http://schemas.xmlsoap.org/soap/envelope/
unknown
http://www.tiro.com
unknown
http://tempuri.org/
unknown
https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
unknown
http://www.fontbureau.com/designers
unknown
http://tempuri.org/Endpoint/VerifyUpdateResponse
unknown
http://tempuri.org/Endpoint/SetEnvironment
unknown
http://tempuri.org/Endpoint/SetEnvironmentResponse
unknown
http://www.sajatypeworks.com
unknown
http://tempuri.org/Endpoint/GetUpdates
unknown
http://www.typography.netD
unknown
https://www.google.com/images/branding/product/ico/googleg_alldp.ico
unknown
http://www.founder.com.cn/cn/cThe
unknown
http://www.galapagosdesign.com/staff/dennis.htm
unknown
https://api.ipify.orgcookies//settinString.Removeg
unknown
https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
unknown
http://www.galapagosdesign.com/DPlease
unknown
http://tempuri.org/Endpoint/VerifyUpdate
unknown
http://tempuri.org/0
unknown
http://www.fonts.com
unknown
http://www.urwpp.deDPlease
unknown
http://www.zhongyicts.com.cn
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
http://www.sakkal.com
unknown
https://ipinfo.io/ip%appdata%
unknown
http://www.apache.org/licenses/LICENSE-2.0
unknown
http://www.fontbureau.com
unknown
http://schemas.xmlsoap.org/ws/2004/08/addressing/role/anonymous
unknown
http://tempuri.org/Endpoint/CheckConnectResponse
unknown
http://schemas.datacontract.org/2004/07/
unknown
https://api.ip.sb/geoip%USERPEnvironmentROFILE%
unknown
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
unknown
https://ac.ecosia.org?q=
unknown
http://tempuri.org/Endpoint/CheckConnect
unknown
http://www.carterandcone.coml
unknown
http://www.fontbureau.com/designers/cabarga.htmlN
unknown
http://45.137.22.163:55615
unknown
http://www.founder.com.cn/cn
unknown
https://www.ecosia.org/newtab/v20
unknown
http://www.fontbureau.com/designers/frere-user.html
unknown
http://schemas.xmlsoap.org/ws/2004/08/addressing
unknown
https://duckduckgo.com/chrome_newtabv20
unknown
http://tempuri.org/Endpoint/GetUpdatesResponse
unknown
http://www.jiyu-kobo.co.jp/
unknown
http://tempuri.org/Endpoint/EnvironmentSettingsResponse
unknown
http://www.fontbureau.com/designers8
unknown
https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
unknown
https://gemini.google.com/app?q=
unknown
http://schemas.xmlsoap.org/soap/actor/next
unknown
There are 49 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
api.ip.sb.cdn.cloudflare.net
172.67.75.172
api.ip.sb
unknown

IPs

IP
Domain
Country
Malicious
45.137.22.163
unknown
Netherlands
malicious
172.67.75.172
api.ip.sb.cdn.cloudflare.net
United States

Registry

Path
Value
Malicious
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\PalEak0Yh6_RASAPI32
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\PalEak0Yh6_RASAPI32
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\PalEak0Yh6_RASAPI32
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\PalEak0Yh6_RASAPI32
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\PalEak0Yh6_RASAPI32
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\PalEak0Yh6_RASAPI32
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\PalEak0Yh6_RASAPI32
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\PalEak0Yh6_RASMANCS
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\PalEak0Yh6_RASMANCS
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\PalEak0Yh6_RASMANCS
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\PalEak0Yh6_RASMANCS
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\PalEak0Yh6_RASMANCS
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\PalEak0Yh6_RASMANCS
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\PalEak0Yh6_RASMANCS
FileDirectory
There are 5 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
402000
remote allocation
page execute and read and write
malicious
3819000
trusted library allocation
page read and write
malicious
3851000
trusted library allocation
page read and write
malicious
F33000
heap
page read and write
6370000
trusted library allocation
page execute and read and write
5430000
trusted library allocation
page execute and read and write
62CD000
heap
page read and write
6238000
heap
page read and write
7330000
trusted library allocation
page read and write
6318000
heap
page read and write
2C41000
trusted library allocation
page read and write
2AA1000
trusted library allocation
page read and write
4FA1000
trusted library allocation
page read and write
CB0000
trusted library allocation
page read and write
EC5000
heap
page read and write
7293000
heap
page read and write
72F0000
heap
page read and write
52E0000
trusted library allocation
page read and write
3B18000
trusted library allocation
page read and write
2B47000
trusted library allocation
page read and write
722E000
stack
page read and write
64C5000
trusted library allocation
page read and write
53E0000
trusted library allocation
page read and write
630F000
heap
page read and write
3E85000
trusted library allocation
page read and write
EB9000
heap
page read and write
7340000
trusted library allocation
page execute and read and write
3BF6000
trusted library allocation
page read and write
CD0000
trusted library allocation
page read and write
2B15000
trusted library allocation
page read and write
C65000
heap
page read and write
55D0000
trusted library allocation
page read and write
3C12000
trusted library allocation
page read and write
699F000
stack
page read and write
3BEA000
trusted library allocation
page read and write
CE4000
heap
page read and write
2855000
trusted library allocation
page read and write
B90000
trusted library allocation
page read and write
601E000
stack
page read and write
6A10000
trusted library allocation
page read and write
28E0000
trusted library allocation
page read and write
C00000
trusted library allocation
page read and write
B70000
trusted library allocation
page read and write
653D000
stack
page read and write
64D0000
trusted library allocation
page read and write
1040000
trusted library allocation
page read and write
8CE0000
heap
page read and write
647E000
stack
page read and write
58AE000
stack
page read and write
E80000
trusted library allocation
page read and write
7F860000
trusted library allocation
page execute and read and write
726E000
stack
page read and write
5360000
trusted library allocation
page execute and read and write
540D000
trusted library allocation
page read and write
621E000
stack
page read and write
2838000
trusted library allocation
page read and write
58D0000
trusted library allocation
page read and write
296A000
trusted library allocation
page read and write
3811000
trusted library allocation
page read and write
54C0000
trusted library allocation
page execute and read and write
CC3000
trusted library allocation
page execute and read and write
757E000
stack
page read and write
2CA2000
trusted library allocation
page read and write
CCD000
trusted library allocation
page execute and read and write
69A6000
trusted library allocation
page read and write
C80000
heap
page read and write
4EA0000
heap
page read and write
69BE000
trusted library allocation
page read and write
4FC0000
trusted library allocation
page read and write
4818000
trusted library allocation
page read and write
3CA4000
trusted library allocation
page read and write
F06000
trusted library allocation
page read and write
3F85000
trusted library allocation
page read and write
58F0000
trusted library allocation
page read and write
72CF000
heap
page read and write
7280000
heap
page read and write
64AA000
trusted library allocation
page read and write
69C1000
trusted library allocation
page read and write
4B9D000
stack
page read and write
5180000
trusted library allocation
page read and write
6A70000
trusted library allocation
page execute and read and write
516E000
stack
page read and write
693E000
stack
page read and write
BE0000
trusted library allocation
page execute and read and write
28D0000
trusted library allocation
page read and write
28F0000
heap
page execute and read and write
4F9E000
stack
page read and write
72F7000
heap
page read and write
4E90000
heap
page read and write
CE0000
heap
page read and write
3C00000
trusted library allocation
page read and write
F01000
trusted library allocation
page read and write
5A0000
heap
page read and write
6485000
trusted library allocation
page read and write
3C89000
trusted library allocation
page read and write
5302000
trusted library allocation
page read and write
4E7C000
stack
page read and write
2DAB000
trusted library allocation
page read and write
6320000
trusted library allocation
page execute and read and write
1050000
trusted library allocation
page read and write
51D0000
heap
page read and write
2C3D000
trusted library allocation
page read and write
792E000
stack
page read and write
DF0000
trusted library allocation
page read and write
53A000
stack
page read and write
2862000
trusted library allocation
page read and write
2F25000
trusted library allocation
page read and write
65F0000
heap
page read and write
5B0000
heap
page read and write
3AD2000
trusted library allocation
page read and write
64A5000
trusted library allocation
page read and write
AF8000
stack
page read and write
70CE000
stack
page read and write
730E000
stack
page read and write
293C000
stack
page read and write
69AC000
trusted library allocation
page read and write
E90000
heap
page execute and read and write
A0E000
stack
page read and write
6F45000
heap
page read and write
E0B000
trusted library allocation
page execute and read and write
55DB000
trusted library allocation
page read and write
6A50000
trusted library allocation
page read and write
64C0000
trusted library allocation
page read and write
4EC0000
trusted library allocation
page execute and read and write
6A80000
trusted library allocation
page read and write
2B20000
trusted library allocation
page read and write
A20000
heap
page read and write
EE0000
trusted library allocation
page read and write
4FD0000
heap
page execute and read and write
52F6000
trusted library allocation
page read and write
1060000
heap
page read and write
7670000
heap
page read and write
A45000
heap
page read and write
77CE000
stack
page read and write
B80000
trusted library allocation
page read and write
C10000
heap
page read and write
5330000
trusted library allocation
page read and write
77F0000
trusted library allocation
page read and write
62F0000
heap
page read and write
B8D000
trusted library allocation
page execute and read and write
6A40000
trusted library allocation
page execute and read and write
3C45000
trusted library allocation
page read and write
E20000
trusted library allocation
page read and write
4ED0000
trusted library allocation
page read and write
69C6000
trusted library allocation
page read and write
E02000
trusted library allocation
page read and write
412000
unkown
page readonly
E40000
heap
page read and write
BB2000
trusted library allocation
page read and write
69C8000
trusted library allocation
page read and write
E46000
heap
page read and write
3BF1000
trusted library allocation
page read and write
2B31000
trusted library allocation
page read and write
2B18000
trusted library allocation
page read and write
695E000
stack
page read and write
6302000
heap
page read and write
3C94000
trusted library allocation
page read and write
A40000
heap
page read and write
4D90000
heap
page read and write
2DD3000
trusted library allocation
page read and write
64B4000
trusted library allocation
page read and write
4D93000
heap
page read and write
F0D000
trusted library allocation
page read and write
3C35000
trusted library allocation
page read and write
5390000
trusted library allocation
page execute and read and write
72FE000
heap
page read and write
6F1F000
heap
page read and write
6640000
trusted library allocation
page read and write
4D50000
trusted library allocation
page execute and read and write
BAA000
trusted library allocation
page execute and read and write
3C22000
trusted library allocation
page read and write
5320000
trusted library allocation
page read and write
CC0000
trusted library allocation
page read and write
6CB0000
trusted library allocation
page read and write
62BE000
heap
page read and write
6489000
trusted library allocation
page read and write
6960000
trusted library allocation
page read and write
6ED0000
heap
page read and write
BA0000
trusted library allocation
page read and write
2B2D000
trusted library allocation
page read and write
2990000
heap
page read and write
75DE000
stack
page read and write
611E000
stack
page read and write
4D30000
heap
page read and write
3C7D000
trusted library allocation
page read and write
72DC000
heap
page read and write
65C0000
trusted library allocation
page execute and read and write
E2F000
stack
page read and write
6498000
trusted library allocation
page read and write
5380000
trusted library allocation
page read and write
6940000
trusted library section
page read and write
3C54000
trusted library allocation
page read and write
8CF6000
heap
page read and write
E70000
trusted library allocation
page read and write
3BFD000
trusted library allocation
page read and write
58F2000
trusted library allocation
page read and write
C30000
heap
page read and write
69D2000
trusted library allocation
page read and write
3C2E000
trusted library allocation
page read and write
400000
remote allocation
page execute and read and write
410000
unkown
page readonly
6D60000
heap
page read and write
B1BE000
stack
page read and write
547E000
stack
page read and write
69A2000
trusted library allocation
page read and write
540A000
trusted library allocation
page read and write
663E000
stack
page read and write
108E000
stack
page read and write
7600000
trusted library allocation
page execute and read and write
BF0000
trusted library allocation
page read and write
EEB000
trusted library allocation
page read and write
627D000
heap
page read and write
CBB000
heap
page read and write
CC4000
trusted library allocation
page read and write
7FDE000
stack
page read and write
79B000
stack
page read and write
2B12000
trusted library allocation
page read and write
DEE000
stack
page read and write
6F0B000
heap
page read and write
2860000
trusted library allocation
page read and write
6A1E000
trusted library allocation
page read and write
4D80000
heap
page read and write
E4E000
heap
page read and write
6220000
heap
page read and write
E05000
trusted library allocation
page execute and read and write
2E08000
trusted library allocation
page read and write
6A00000
trusted library allocation
page read and write
3C82000
trusted library allocation
page read and write
E75000
trusted library allocation
page read and write
6B40000
heap
page read and write
69B8000
trusted library allocation
page read and write
64B0000
trusted library allocation
page read and write
62FA000
heap
page read and write
69AF000
trusted library allocation
page read and write
2E02000
trusted library allocation
page read and write
4E80000
trusted library section
page readonly
2960000
trusted library allocation
page read and write
51A0000
trusted library allocation
page read and write
6A60000
trusted library allocation
page read and write
2964000
trusted library allocation
page read and write
B84000
trusted library allocation
page read and write
E30000
trusted library allocation
page execute and read and write
3AA1000
trusted library allocation
page read and write
D0A000
heap
page read and write
69B4000
trusted library allocation
page read and write
EDB000
stack
page read and write
BA6000
trusted library allocation
page execute and read and write
B9D000
trusted library allocation
page execute and read and write
5370000
trusted library allocation
page read and write
5340000
trusted library allocation
page execute and read and write
6CA0000
trusted library allocation
page read and write
6982000
trusted library allocation
page read and write
EFE000
trusted library allocation
page read and write
6299000
heap
page read and write
70E0000
trusted library allocation
page read and write
4F5E000
stack
page read and write
2940000
heap
page read and write
2DD9000
trusted library allocation
page read and write
691E000
stack
page read and write
6D40000
trusted library allocation
page read and write
3BDA000
trusted library allocation
page read and write
7440000
trusted library section
page read and write
CE5000
heap
page read and write
C5E000
stack
page read and write
3BE4000
trusted library allocation
page read and write
3C38000
trusted library allocation
page read and write
74DE000
stack
page read and write
5FE000
stack
page read and write
E6E000
stack
page read and write
54BD000
stack
page read and write
65AE000
trusted library allocation
page read and write
3AAE000
trusted library allocation
page read and write
69CD000
trusted library allocation
page read and write
2980000
trusted library allocation
page read and write
69A4000
trusted library allocation
page read and write
69D5000
trusted library allocation
page read and write
649A000
trusted library allocation
page read and write
BBB000
trusted library allocation
page execute and read and write
65A0000
trusted library allocation
page read and write
586D000
stack
page read and write
3C3E000
trusted library allocation
page read and write
530E000
trusted library allocation
page read and write
E90000
heap
page read and write
4F1E000
stack
page read and write
55CF000
stack
page read and write
51B5000
heap
page read and write
B83000
trusted library allocation
page execute and read and write
B4E000
stack
page read and write
55DE000
trusted library allocation
page read and write
3C06000
trusted library allocation
page read and write
49AC000
stack
page read and write
C3E000
heap
page read and write
52DE000
stack
page read and write
75E0000
trusted library allocation
page read and write
2DA5000
trusted library allocation
page read and write
64AF000
trusted library allocation
page read and write
7EDE000
stack
page read and write
2D08000
trusted library allocation
page read and write
6C50000
heap
page read and write
DF2000
trusted library allocation
page read and write
70D0000
trusted library allocation
page read and write
E8E000
stack
page read and write
623C000
heap
page read and write
5410000
trusted library allocation
page read and write
3C1C000
trusted library allocation
page read and write
766E000
stack
page read and write
B0BF000
stack
page read and write
7780000
trusted library allocation
page execute and read and write
70F0000
heap
page read and write
72D6000
heap
page read and write
CDD000
trusted library allocation
page execute and read and write
3C76000
trusted library allocation
page read and write
50DE000
stack
page read and write
51B0000
heap
page read and write
2AF0000
trusted library allocation
page read and write
728E000
heap
page read and write
6C9C000
stack
page read and write
3C4A000
trusted library allocation
page read and write
6480000
trusted library allocation
page read and write
77D0000
heap
page read and write
62AE000
heap
page read and write
72E5000
heap
page read and write
B2BE000
stack
page read and write
7610000
trusted library allocation
page read and write
4D40000
trusted library allocation
page read and write
3C19000
trusted library allocation
page read and write
6482000
trusted library allocation
page read and write
B93000
trusted library allocation
page read and write
C78000
heap
page read and write
6B50000
heap
page read and write
8F7000
stack
page read and write
BA2000
trusted library allocation
page read and write
52F1000
trusted library allocation
page read and write
51D9000
heap
page read and write
E07000
trusted library allocation
page execute and read and write
52EB000
trusted library allocation
page read and write
C1E000
stack
page read and write
F10000
trusted library allocation
page read and write
7283000
heap
page read and write
3C29000
trusted library allocation
page read and write
F20000
heap
page read and write
DF6000
trusted library allocation
page execute and read and write
3C5A000
trusted library allocation
page read and write
72BA000
heap
page read and write
62E2000
heap
page read and write
69F0000
trusted library allocation
page read and write
649F000
trusted library allocation
page read and write
B00000
heap
page read and write
3BDF000
trusted library allocation
page read and write
2970000
trusted library allocation
page read and write
64C2000
trusted library allocation
page read and write
BB7000
trusted library allocation
page execute and read and write
72C2000
heap
page read and write
72C6000
heap
page read and write
C75000
heap
page read and write
69E0000
trusted library allocation
page read and write
72A8000
heap
page read and write
51DF000
stack
page read and write
657F000
stack
page read and write
631E000
heap
page read and write
3C70000
trusted library allocation
page read and write
3C66000
trusted library allocation
page read and write
51D6000
heap
page read and write
3C6D000
trusted library allocation
page read and write
4EB0000
trusted library allocation
page read and write
7270000
trusted library allocation
page read and write
8CFA000
heap
page read and write
7620000
trusted library allocation
page execute and read and write
6287000
heap
page read and write
636E000
stack
page read and write
2811000
trusted library allocation
page read and write
5207000
heap
page read and write
2A9E000
stack
page read and write
630C000
heap
page read and write
6262000
heap
page read and write
51C0000
heap
page read and write
730A000
heap
page read and write
3C51000
trusted library allocation
page read and write
102E000
stack
page read and write
53F0000
trusted library allocation
page read and write
BD0000
trusted library allocation
page read and write
C60000
heap
page read and write
75F0000
trusted library allocation
page execute and read and write
4D10000
heap
page execute and read and write
78EF000
stack
page read and write
3C0D000
trusted library allocation
page read and write
3C61000
trusted library allocation
page read and write
C38000
heap
page read and write
5311000
trusted library allocation
page read and write
C20000
trusted library allocation
page read and write
5420000
trusted library allocation
page read and write
E00000
trusted library allocation
page read and write
62A1000
heap
page read and write
62FD000
heap
page read and write
1067000
heap
page read and write
There are 385 hidden memdumps, click here to show them.