IOC Report
olPUTAxpzu

loading gif

Files

File Path
Type
Category
Malicious
olPUTAxpzu.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_olPUTAxpzu.exe_e22b91f83659b5e64951010ad9cc6d1b32c47_5da1df81_19bd84ad\Report.wer
Little-endian UTF-16 Unicode text, with CRLF line terminators
dropped
malicious
C:\ProgramData\Microsoft\Windows\WER\Temp\WER6D9B.tmp.dmp
Mini DuMP crash report, 14 streams, Wed Apr 20 22:09:27 2022, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER759B.tmp.WERInternalMetadata.xml
XML 1.0 document, Little-endian UTF-16 Unicode text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER7732.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\olPUTAxpzu.exe
"C:\Users\user\Desktop\olPUTAxpzu.exe"
malicious
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 4912 -s 1240
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 4912 -s 1240

URLs

Name
IP
Malicious
https://api.brutalhax.net/
unknown
malicious
https://api.brutal-hax.net/notification.txt
unknown
https://api.brutal-hax.net/Online/get_online_users.php?username=
unknown
https://api.brutal-hax.net/loader_authentification_new.php?username=
unknown
https://api.brutal-hax.net/loader_statut_new.php
unknown
https://help.ea.com/en/help/faq/how-to-clean-boot-your-pc/
unknown
http://pki-ocsp.symauth.com0
unknown
https://api.brutal-hax.net/Driver/Driver1.8_x64.sys
unknown
https://discord.gg/brutal-hax
unknown
http://foo/bhicon.png
unknown
http://defaultcontainer/Login.xaml
unknown
https://api.brutal-hax.net/loader_cheat_info_ex.php?index=
unknown
http://pki-crl.symauth.com/offlineca/TheInstituteofElectricalandElectronicsEngineersIncIEEERootCA.cr
unknown
https://api.brutal-hax.net/loader_get_cheats.php?username=
unknown
https://brutal-hax.net/
unknown
http://defaultcontainer/bhicon.png
unknown
http://foo/bar/bhicon.png
unknown
https://api.brutal-hax.net/loader_version.php
unknown
http://foo/bar/login.baml
unknown
https://api.brutal-hax.net/Online/set_online_status.php?username=
unknown
https://api.brutal-hax.net/info/cheat_status.php?hack_id=
unknown
http://foo/Login.xaml
unknown
http://pki-crl.symauth.com/ca_d409a5cb737dc0768fd08ed5256f3633/LatestCRL.crl07
unknown
There are 13 hidden URLs, click here to show them.

Registry

Path
Value
Malicious
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\AppCompatFlags
AmiHivePermissionsCorrect
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\AppCompatFlags
AmiHiveOwnerCorrect
\REGISTRY\A\{241b8a8c-f1a0-b382-2900-a541fb473845}\Root\InventoryApplicationFile\olputaxpzu.exe|2e9c9b89
ProgramId
\REGISTRY\A\{241b8a8c-f1a0-b382-2900-a541fb473845}\Root\InventoryApplicationFile\olputaxpzu.exe|2e9c9b89
FileId
\REGISTRY\A\{241b8a8c-f1a0-b382-2900-a541fb473845}\Root\InventoryApplicationFile\olputaxpzu.exe|2e9c9b89
LowerCaseLongPath
\REGISTRY\A\{241b8a8c-f1a0-b382-2900-a541fb473845}\Root\InventoryApplicationFile\olputaxpzu.exe|2e9c9b89
LongPathHash
\REGISTRY\A\{241b8a8c-f1a0-b382-2900-a541fb473845}\Root\InventoryApplicationFile\olputaxpzu.exe|2e9c9b89
Name
\REGISTRY\A\{241b8a8c-f1a0-b382-2900-a541fb473845}\Root\InventoryApplicationFile\olputaxpzu.exe|2e9c9b89
Publisher
\REGISTRY\A\{241b8a8c-f1a0-b382-2900-a541fb473845}\Root\InventoryApplicationFile\olputaxpzu.exe|2e9c9b89
Version
\REGISTRY\A\{241b8a8c-f1a0-b382-2900-a541fb473845}\Root\InventoryApplicationFile\olputaxpzu.exe|2e9c9b89
BinFileVersion
\REGISTRY\A\{241b8a8c-f1a0-b382-2900-a541fb473845}\Root\InventoryApplicationFile\olputaxpzu.exe|2e9c9b89
BinaryType
\REGISTRY\A\{241b8a8c-f1a0-b382-2900-a541fb473845}\Root\InventoryApplicationFile\olputaxpzu.exe|2e9c9b89
ProductName
\REGISTRY\A\{241b8a8c-f1a0-b382-2900-a541fb473845}\Root\InventoryApplicationFile\olputaxpzu.exe|2e9c9b89
ProductVersion
\REGISTRY\A\{241b8a8c-f1a0-b382-2900-a541fb473845}\Root\InventoryApplicationFile\olputaxpzu.exe|2e9c9b89
LinkDate
\REGISTRY\A\{241b8a8c-f1a0-b382-2900-a541fb473845}\Root\InventoryApplicationFile\olputaxpzu.exe|2e9c9b89
BinProductVersion
\REGISTRY\A\{241b8a8c-f1a0-b382-2900-a541fb473845}\Root\InventoryApplicationFile\olputaxpzu.exe|2e9c9b89
Size
\REGISTRY\A\{241b8a8c-f1a0-b382-2900-a541fb473845}\Root\InventoryApplicationFile\olputaxpzu.exe|2e9c9b89
Language
\REGISTRY\A\{241b8a8c-f1a0-b382-2900-a541fb473845}\Root\InventoryApplicationFile\olputaxpzu.exe|2e9c9b89
IsPeFile
\REGISTRY\A\{241b8a8c-f1a0-b382-2900-a541fb473845}\Root\InventoryApplicationFile\olputaxpzu.exe|2e9c9b89
IsOsComponent
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\Windows Error Reporting\Debug
ExceptionRecord
HKEY_CURRENT_USER\Software\Microsoft\IdentityCRL\Immersive\production\Token\{67082621-8D18-4333-9C64-10DE93676363}
DeviceTicket
HKEY_CURRENT_USER\Software\Microsoft\IdentityCRL\Immersive\production\Token\{67082621-8D18-4333-9C64-10DE93676363}
DeviceId
HKEY_CURRENT_USER\Software\Microsoft\IdentityCRL\Immersive\production\Token\{67082621-8D18-4333-9C64-10DE93676363}
ApplicationFlags
HKEY_CURRENT_USER\Software\Microsoft\IdentityCRL\Immersive\production\Property
00180008F3870B0F
There are 14 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
93F000
unkown
page readonly
878000
unkown
page execute and read and write
1B261070000
heap
page read and write
3A10000
trusted library allocation
page read and write
29A3D116000
heap
page read and write
86A000
unkown
page execute and read and write
936A279000
stack
page read and write
4B31000
trusted library allocation
page read and write
16C0000
direct allocation
page read and write
39C0000
trusted library allocation
page read and write
17AC000
heap
page read and write
1F470123000
heap
page read and write
1BED9194000
trusted library allocation
page read and write
962000
unkown
page readonly
19DC000
stack
page read and write
29A3E000000
heap
page read and write
32D1000
heap
page read and write
5F30000
trusted library allocation
page read and write
1B261000000
heap
page read and write
1E212E52000
heap
page read and write
29A3D067000
heap
page read and write
3B0000
unkown
page readonly
1BED9190000
trusted library allocation
page read and write
3A20000
heap
page read and write
772407E000
stack
page read and write
19E0000
unclassified section
page read and write
1BED3B02000
heap
page read and write
1676000
heap
page read and write
1BED3A00000
heap
page read and write
32D1000
heap
page read and write
1E212CC0000
heap
page read and write
1E212CD0000
heap
page read and write
29A3DB4D000
heap
page read and write
17BD000
heap
page read and write
16BE000
stack
page read and write
21158FA0000
trusted library allocation
page read and write
1C6F4966000
heap
page read and write
16DA000
heap
page read and write
1A10000
trusted library allocation
page read and write
1BED4CA0000
trusted library section
page readonly
199F000
stack
page read and write
1BED3A8B000
heap
page read and write
21159A02000
trusted library allocation
page read and write
20DDFD00000
heap
page read and write
349D000
stack
page read and write
3B2000
unkown
page execute and read and write
B14000
unkown
page execute and read and write
4FECFBE000
stack
page read and write
21159071000
heap
page read and write
3A20000
heap
page read and write
1C6F4972000
heap
page read and write
E54DAF8000
stack
page read and write
1BED4C80000
trusted library section
page readonly
1BED3A70000
heap
page read and write
46776FC000
stack
page read and write
3A00000
trusted library allocation
page read and write
5CF0000
trusted library allocation
page read and write
32E0000
heap
page read and write
33D0000
trusted library allocation
page read and write
33DD000
trusted library allocation
page execute and read and write
1BED4513000
heap
page read and write
16BE000
stack
page read and write
B35000
unkown
page execute and read and write
1F470028000
heap
page read and write
1B26103C000
heap
page read and write
3A00000
trusted library allocation
page read and write
1C6F4950000
heap
page read and write
1BED9461000
heap
page read and write
936A07A000
stack
page read and write
1A13000
trusted library allocation
page execute and read and write
1E212E00000
heap
page read and write
21159050000
heap
page read and write
1B261053000
heap
page read and write
33E0000
trusted library allocation
page read and write
32D1000
heap
page read and write
2E2455F5000
heap
page read and write
177B000
heap
page read and write
1BED9280000
trusted library allocation
page read and write
2E245379000
heap
page read and write
3A00000
trusted library allocation
page read and write
32D1000
heap
page read and write
1670000
heap
page read and write
1F470202000
heap
page read and write
7C5D14E000
stack
page read and write
1BED91B4000
trusted library allocation
page read and write
E54DEF7000
stack
page read and write
E5594FC000
stack
page read and write
B54000
unkown
page execute and read and write
1F470302000
heap
page read and write
1B261002000
heap
page read and write
20DDFB20000
heap
page read and write
1674000
heap
page read and write
2E246410000
trusted library allocation
page read and write
4B41000
trusted library allocation
page read and write
33E0000
trusted library allocation
page read and write
936A0FF000
stack
page read and write
33F2000
trusted library allocation
page read and write
29A3D04E000
heap
page read and write
61B0000
trusted library allocation
page read and write
1F470213000
heap
page read and write
B31000
unkown
page execute and read and write
7723C7A000
stack
page read and write
29A3DB9D000
heap
page read and write
878000
unkown
page execute and read and write
29A3DB85000
heap
page read and write
5C2E000
stack
page read and write
2E246140000
trusted library allocation
page read and write
4FED6FE000
stack
page read and write
1650000
direct allocation
page read and write
B39000
unkown
page execute and read and write
1BED4518000
heap
page read and write
29A3DBCA000
heap
page read and write
5E20000
heap
page execute and read and write
29A3D8E0000
remote allocation
page read and write
2E2453BE000
heap
page read and write
33DD000
trusted library allocation
page execute and read and write
33F0000
trusted library allocation
page read and write
1F470000000
unkown
page read and write
1BED9502000
heap
page read and write
1BED9412000
heap
page read and write
29A3E002000
heap
page read and write
17A7000
heap
page read and write
1670000
heap
page read and write
2E2455F9000
heap
page read and write
29A3DB62000
heap
page read and write
5D10000
heap
page read and write
772437F000
stack
page read and write
29A3E003000
heap
page read and write
33E0000
trusted library allocation
page read and write
1A13000
trusted library allocation
page execute and read and write
1E212E13000
heap
page read and write
29A3DB3D000
heap
page read and write
86A000
unkown
page execute and read and write
1F46FDC0000
trusted library allocation
page read and write
29A3D0C4000
heap
page read and write
1A20000
heap
page read and write
345E000
stack
page read and write
29A3D0B3000
heap
page read and write
1740000
heap
page read and write
B47000
unkown
page execute and read and write
950000
unkown
page readonly
4D5DE7B000
stack
page read and write
1BED39D0000
heap
page read and write
21159083000
heap
page read and write
46778F7000
stack
page read and write
1790000
heap
page read and write
B69000
unkown
page execute and read and write
5E23000
heap
page execute and read and write
29A3E002000
heap
page read and write
29A3DB72000
heap
page read and write
5CF0000
trusted library allocation
page execute and read and write
1731000
heap
page read and write
1F470021000
unkown
page read and write
16C0000
direct allocation
page read and write
29A3D0B5000
heap
page read and write
29A3DB13000
heap
page read and write
1650000
direct allocation
page read and write
1BED9454000
heap
page read and write
1BED9170000
trusted library allocation
page read and write
33F2000
trusted library allocation
page read and write
E54D9FF000
stack
page read and write
4FED7FF000
stack
page read and write
1E212E4C000
heap
page read and write
1A20000
heap
page read and write
1B2E000
stack
page read and write
3B2000
unkown
page execute read
1BED3A13000
heap
page read and write
1788000
heap
page read and write
1C6F4890000
heap
page read and write
1C6F498C000
heap
page read and write
1B261100000
heap
page read and write
3B2E000
stack
page read and write
16DA000
heap
page read and write
1E212E3C000
heap
page read and write
20DE03C0000
trusted library allocation
page read and write
936A1F9000
stack
page read and write
21159100000
heap
page read and write
178D000
heap
page read and write
942000
unkown
page readonly
1E212F08000
heap
page read and write
29A3DB95000
heap
page read and write
29A3D0AB000
heap
page read and write
29A3D083000
heap
page read and write
1E212F00000
heap
page read and write
6130000
trusted library allocation
page read and write
1650000
direct allocation
page read and write
861C8FF000
stack
page read and write
5D10000
heap
page read and write
1711000
heap
page read and write
32D1000
heap
page read and write
1711000
heap
page read and write
95E000
unkown
page readonly
4D5D90B000
stack
page read and write
21159102000
heap
page read and write
861CB7E000
stack
page read and write
1BED3ABB000
heap
page read and write
2E2463A0000
heap
page readonly
1F470102000
trusted library allocation
page read and write
1BED943C000
heap
page read and write
2E246150000
trusted library allocation
page read and write
32D1000
heap
page read and write
38FE000
stack
page read and write
2115903C000
heap
page read and write
163E000
stack
page read and write
29A3E002000
heap
page read and write
17A7000
heap
page read and write
2E246390000
trusted library allocation
page read and write
EC0000
unkown
page execute read
1750000
heap
page read and write
1C6F498C000
heap
page read and write
29A3D029000
heap
page read and write
1BED92B0000
trusted library allocation
page read and write
1E212E47000
heap
page read and write
1BED4C60000
trusted library section
page readonly
16D0000
heap
page read and write
B54000
unkown
page execute and read and write
1BED94FC000
heap
page read and write
1741000
heap
page read and write
29A3DB89000
heap
page read and write
29A3DB00000
heap
page read and write
1BED94E3000
heap
page read and write
1A10000
trusted library allocation
page read and write
1E212E4F000
heap
page read and write
29A3DB7F000
heap
page read and write
39C0000
trusted library allocation
page read and write
29A3E002000
heap
page read and write
29A3DB89000
heap
page read and write
29A3E002000
heap
page read and write
29A3DA02000
heap
page read and write
1BED92D0000
trusted library allocation
page read and write
E559479000
stack
page read and write
20DDFC02000
heap
page read and write
1A1D000
trusted library allocation
page execute and read and write
1E212E88000
heap
page read and write
1B261048000
heap
page read and write
962000
unkown
page readonly
1788000
heap
page read and write
3A29000
heap
page read and write
4D5D98E000
stack
page read and write
1400000
trusted library allocation
page read and write
1650000
direct allocation
page read and write
32D1000
heap
page read and write
20DDFD13000
heap
page read and write
61B0000
trusted library allocation
page read and write
1BED9170000
trusted library allocation
page read and write
29A3CF20000
heap
page read and write
21158F10000
heap
page read and write
1BED94F8000
heap
page read and write
3410000
trusted library allocation
page read and write
16C0000
direct allocation
page read and write
21158F00000
heap
page read and write
1670000
heap
page read and write
1BED9240000
trusted library allocation
page read and write
146A000
stack
page read and write
1B26104E000
heap
page read and write
1740000
heap
page read and write
E54DBF7000
stack
page read and write
33E6000
trusted library allocation
page execute and read and write
5D00000
trusted library allocation
page read and write
1BED3AFD000
heap
page read and write
467733F000
stack
page read and write
29A3DB97000
heap
page read and write
1B26104B000
heap
page read and write
861C4AD000
stack
page read and write
19DC000
stack
page read and write
4677BFF000
stack
page read and write
E5595F9000
stack
page read and write
77240FF000
stack
page read and write
34B0000
heap
page read and write
1740000
heap
page read and write
B60000
unkown
page execute and read and write
29A3DB97000
heap
page read and write
34A0000
trusted library allocation
page execute and read and write
32D1000
heap
page read and write
5D14000
heap
page read and write
1674000
heap
page read and write
1B261029000
heap
page read and write
1BED92A0000
trusted library allocation
page read and write
29A3DB8C000
heap
page read and write
B54000
unkown
page execute and read and write
29A3D0F4000
heap
page read and write
1744000
heap
page read and write
7723E7E000
stack
page read and write
7723FFF000
stack
page read and write
1734000
heap
page read and write
1568000
stack
page read and write
1BED3A92000
heap
page read and write
5DCC000
stack
page read and write
1674000
heap
page read and write
1BED3A29000
heap
page read and write
29A3DB9F000
heap
page read and write
345E000
stack
page read and write
29A3DB11000
heap
page read and write
11F0000
heap
page read and write
2E245310000
trusted library allocation
page read and write
2115902A000
heap
page read and write
5DCC000
stack
page read and write
199F000
stack
page read and write
1C6F4974000
heap
page read and write
1674000
heap
page read and write
1BED94AE000
heap
page read and write
1740000
heap
page read and write
21159078000
heap
page read and write
1F470039000
heap
page read and write
6130000
trusted library allocation
page read and write
11F0000
unkown
page read and write
29A3CF80000
heap
page read and write
33F2000
trusted library allocation
page read and write
5D14000
heap
page read and write
7C5D7FB000
stack
page read and write
34A0000
trusted library allocation
page execute and read and write
861CC79000
stack
page read and write
29A3DBB0000
heap
page read and write
E54DDFE000
stack
page read and write
77242FA000
stack
page read and write
1568000
stack
page read and write
349D000
stack
page read and write
1A10000
trusted library allocation
page read and write
1F470100000
trusted library allocation
page read and write
16D0000
heap
page read and write
1BED9400000
heap
page read and write
20DDFC28000
heap
page read and write
38FE000
stack
page read and write
34B0000
heap
page read and write
1782000
heap
page read and write
1BED4518000
heap
page read and write
29A3D0EE000
heap
page read and write
11F0000
unkown
page read and write
16BE000
stack
page read and write
16C0000
direct allocation
page read and write
1C6F498C000
heap
page read and write
3A29000
heap
page read and write
32D1000
heap
page read and write
32D0000
heap
page read and write
20DDFC41000
heap
page read and write
3B2E000
stack
page read and write
16D0000
heap
page read and write
1B261013000
heap
page read and write
B35000
unkown
page execute and read and write
1F470002000
unkown
page read and write
21159000000
heap
page read and write
29A3DB9B000
heap
page read and write
6030000
trusted library allocation
page read and write
29A3D070000
heap
page read and write
1BED941D000
heap
page read and write
177F000
heap
page read and write
950000
unkown
page readonly
B31000
unkown
page execute and read and write
32D1000
heap
page read and write
146A000
stack
page read and write
163E000
stack
page read and write
19DC000
stack
page read and write
1B260F60000
trusted library allocation
page read and write
1C6F4967000
heap
page read and write
4677AFE000
stack
page read and write
29A3DB5B000
heap
page read and write
1BED9191000
trusted library allocation
page read and write
33F0000
trusted library allocation
page read and write
29A3DB99000
heap
page read and write
B33000
unkown
page execute and read and write
1BED9178000
trusted library allocation
page read and write
29A3DB8E000
heap
page read and write
29A3DBA8000
heap
page read and write
46772BB000
stack
page read and write
2115908D000
heap
page read and write
29A3DB89000
heap
page read and write
772467E000
stack
page read and write
E5592FE000
stack
page read and write
E54D52C000
stack
page read and write
3410000
trusted library allocation
page read and write
EC0000
unkown
page execute read
345E000
stack
page read and write
1E212E46000
heap
page read and write
1BED4559000
heap
page read and write
2115904B000
heap
page read and write
21159013000
heap
page read and write
1B26108B000
heap
page read and write
1BED4C90000
trusted library section
page readonly
1E212F02000
heap
page read and write
29A3DB9F000
heap
page read and write
1A14000
trusted library allocation
page read and write
B33000
unkown
page execute and read and write
1711000
heap
page read and write
20DDFD02000
heap
page read and write
B6C000
unkown
page execute and read and write
1BED3A75000
heap
page read and write
33FB000
trusted library allocation
page execute and read and write
5F30000
trusted library allocation
page read and write
86A000
unkown
page execute and read and write
1F470300000
heap
page read and write
E55937E000
stack
page read and write
32D1000
heap
page read and write
936A17F000
stack
page read and write
5F30000
trusted library allocation
page read and write
199F000
stack
page read and write
1E212E50000
heap
page read and write
6130000
trusted library allocation
page read and write
39B0000
trusted library allocation
page read and write
1400000
trusted library allocation
page read and write
32E0000
heap
page read and write
146A000
stack
page read and write
3B31000
trusted library allocation
page read and write
1E213802000
trusted library allocation
page read and write
3B2000
unkown
page execute and read and write
1BED4402000
heap
page read and write
1B261113000
heap
page read and write
772417F000
stack
page read and write
5D00000
trusted library allocation
page read and write
32D1000
heap
page read and write
1650000
heap
page read and write
1750000
heap
page read and write
17A7000
heap
page read and write
E559679000
stack
page read and write
20DDFAB0000
heap
page read and write
1BED4415000
heap
page read and write
32D1000
heap
page read and write
29A3DBAD000
heap
page read and write
6030000
trusted library allocation
page read and write
39B0000
trusted library allocation
page read and write
29A3DBA4000
heap
page read and write
16C0000
direct allocation
page read and write
B60000
unkown
page execute and read and write
33E6000
trusted library allocation
page execute and read and write
3B0000
unkown
page readonly
1B260F30000
heap
page read and write
29A3D050000
heap
page read and write
936A37C000
stack
page read and write
1E212F13000
heap
page read and write
32D1000
heap
page read and write
936A2FF000
stack
page read and write
1BED3A9F000
heap
page read and write
1F46FDB0000
heap
page read and write
1C6F4B40000
heap
page read and write
39B0000
trusted library allocation
page read and write
1C6F4962000
heap
page read and write
5DD0000
trusted library allocation
page read and write
1BED4C70000
trusted library section
page readonly
1BED4559000
heap
page read and write
5E23000
heap
page execute and read and write
29A3D04B000
heap
page read and write
1E212E4B000
heap
page read and write
7C5D8FF000
stack
page read and write
3B31000
trusted library allocation
page read and write
B35000
unkown
page execute and read and write
1F470313000
heap
page read and write
7C5D5FB000
stack
page read and write
19E0000
unclassified section
page read and write
1B260EC0000
heap
page read and write
1BED942B000
heap
page read and write
E54DCF8000
stack
page read and write
1BED4A63000
trusted library allocation
page read and write
861CA7F000
stack
page read and write
1650000
heap
page read and write
962000
unkown
page readonly
19E4000
direct allocation
page read and write
1A14000
trusted library allocation
page read and write
E54DF7F000
unkown
page read and write
16C0000
direct allocation
page read and write
B14000
unkown
page execute and read and write
1A00000
trusted library allocation
page read and write
95E000
unkown
page readonly
1B2E000
stack
page read and write
95E000
unkown
page readonly
1BED4A70000
trusted library allocation
page read and write
21158F70000
heap
page read and write
1650000
direct allocation
page read and write
1731000
heap
page read and write
1B260ED0000
heap
page read and write
1C6F4995000
heap
page read and write
29A3DB89000
heap
page read and write
1C6F48B0000
heap
page read and write
1C6F497F000
heap
page read and write
32D1000
heap
page read and write
1BED4270000
trusted library allocation
page read and write
4D5DD7B000
stack
page read and write
97A000
unkown
page execute and read and write
29A3DBA0000
heap
page read and write
33E2000
trusted library allocation
page read and write
20DDFC70000
heap
page read and write
1B261102000
heap
page read and write
1BED5000000
trusted library allocation
page read and write
1C6F498F000
heap
page read and write
5DF0000
remote allocation
page read and write
1E212D60000
trusted library allocation
page read and write
33D8000
trusted library allocation
page read and write
34B0000
heap
page read and write
2E245300000
heap
page read and write
5F40000
trusted library allocation
page read and write
39F0000
heap
page execute and read and write
20DDFC64000
heap
page read and write
1B261081000
heap
page read and write
4D5DF77000
stack
page read and write
4B31000
trusted library allocation
page read and write
39C0000
trusted library allocation
page read and write
29A3DB89000
heap
page read and write
1BED9500000
heap
page read and write
1BED9290000
trusted library allocation
page read and write
163E000
stack
page read and write
21159108000
heap
page read and write
B47000
unkown
page execute and read and write
1BED4A80000
trusted library allocation
page read and write
32D1000
heap
page read and write
29A3DBA0000
heap
page read and write
4FED4FF000
stack
page read and write
1B26108A000
heap
page read and write
29A3D03C000
heap
page read and write
2E2453B6000
heap
page read and write
7723B77000
stack
page read and write
29A3DB85000
heap
page read and write
1C6F497F000
heap
page read and write
1BED3AAD000
heap
page read and write
77237EE000
stack
page read and write
1E212E29000
heap
page read and write
EC0000
unkown
page execute read
1F470115000
trusted library allocation
page read and write
33D8000
trusted library allocation
page read and write
1C6F4760000
heap
page read and write
16C0000
direct allocation
page read and write
21159126000
heap
page read and write
1BED94A4000
heap
page read and write
1BED3960000
heap
page read and write
33D0000
trusted library allocation
page read and write
3B2000
unkown
page execute and read and write
1BED3A3D000
heap
page read and write
942000
unkown
page readonly
7723F7B000
stack
page read and write
34A0000
trusted library allocation
page execute and read and write
1E212E78000
heap
page read and write
1BED94B8000
heap
page read and write
1BED94A1000
heap
page read and write
29A3D113000
heap
page read and write
17BD000
heap
page read and write
1BED94FE000
heap
page read and write
7C5D6FC000
stack
page read and write
2E2453BE000
heap
page read and write
1BED3970000
heap
page read and write
1650000
direct allocation
page read and write
B39000
unkown
page execute and read and write
20DDFC13000
heap
page read and write
19E0000
direct allocation
page read and write
2E2463B0000
trusted library allocation
page read and write
5F2C000
stack
page read and write
1750000
heap
page read and write
E54D87E000
stack
page read and write
1750000
heap
page read and write
1A13000
trusted library allocation
page execute and read and write
1BED91A0000
trusted library allocation
page read and write
32D1000
heap
page read and write
93F000
unkown
page readonly
1783000
heap
page read and write
97A000
unkown
page execute and read and write
1BED4400000
heap
page read and write
1650000
heap
page read and write
32D1000
heap
page read and write
1A1D000
trusted library allocation
page execute and read and write
EC0000
unkown
page execute read
1BED4B80000
trusted library allocation
page read and write
878000
unkown
page execute and read and write
5E23000
heap
page execute and read and write
16C0000
direct allocation
page read and write
33FB000
trusted library allocation
page execute and read and write
20DDFC64000
heap
page read and write
3410000
trusted library allocation
page read and write
1E212E70000
heap
page read and write
33F7000
trusted library allocation
page execute and read and write
32D1000
heap
page read and write
33E2000
trusted library allocation
page read and write
29A3CFB0000
trusted library allocation
page read and write
33D0000
trusted library allocation
page read and write
4B41000
trusted library allocation
page read and write
349D000
stack
page read and write
B6C000
unkown
page execute and read and write
3B0000
unkown
page readonly
772457C000
stack
page read and write
1E212D30000
heap
page read and write
5DCC000
stack
page read and write
38FE000
stack
page read and write
772376C000
stack
page read and write
29A3D0A4000
heap
page read and write
32E0000
heap
page read and write
29A3DBBE000
heap
page read and write
29A3D049000
heap
page read and write
29A3DB95000
heap
page read and write
29A3DB6E000
heap
page read and write
1782000
heap
page read and write
E55927B000
stack
page read and write
39F0000
heap
page execute and read and write
29A3E003000
heap
page read and write
5DF0000
remote allocation
page read and write
1BED9240000
remote allocation
page read and write
1BED91A0000
trusted library allocation
page read and write
3B0000
unkown
page readonly
97A000
unkown
page execute and read and write
33FB000
trusted library allocation
page execute and read and write
1650000
direct allocation
page read and write
1BED3B13000
heap
page read and write
4B31000
trusted library allocation
page read and write
29A3D088000
heap
page read and write
1BED4A60000
trusted library allocation
page read and write
3A10000
trusted library allocation
page read and write
1BED3A7A000
heap
page read and write
4FECF3B000
stack
page read and write
B69000
unkown
page execute and read and write
1BED9060000
trusted library allocation
page read and write
29A3D8E0000
remote allocation
page read and write
E55957E000
stack
page read and write
29A3D000000
heap
page read and write
4FED47B000
stack
page read and write
46779FF000
stack
page read and write
B14000
unkown
page execute and read and write
29A3DBCA000
heap
page read and write
29A3D0C8000
heap
page read and write
2115908F000
heap
page read and write
20DDFAC0000
heap
page read and write
33D8000
trusted library allocation
page read and write
1C6F497F000
heap
page read and write
29A3E002000
heap
page read and write
7C5D0CB000
stack
page read and write
32D0000
heap
page read and write
1C6F4B45000
heap
page read and write
4FED27D000
stack
page read and write
2E245600000
trusted library allocation
page read and write
46773BF000
stack
page read and write
29A3DBC3000
heap
page read and write
1BED3A78000
heap
page read and write
29A3CF10000
heap
page read and write
29A3E062000
heap
page read and write
33EA000
trusted library allocation
page execute and read and write
772447E000
stack
page read and write
1788000
heap
page read and write
29A3DB89000
heap
page read and write
2E245540000
heap
page read and write
3B31000
trusted library allocation
page read and write
29A3DB9F000
heap
page read and write
19F2000
direct allocation
page read and write
3B2E000
stack
page read and write
29A3D0DB000
heap
page read and write
1782000
heap
page read and write
33F7000
trusted library allocation
page execute and read and write
17BD000
heap
page read and write
29A3D8E0000
remote allocation
page read and write
942000
unkown
page readonly
2E2455E0000
trusted library allocation
page read and write
5E20000
heap
page execute and read and write
6030000
trusted library allocation
page read and write
1568000
stack
page read and write
1BED3A0B000
heap
page read and write
2E2453BE000
heap
page read and write
29A3D102000
heap
page read and write
1BED9050000
trusted library allocation
page read and write
1F46FE20000
heap
page read and write
1BED9240000
remote allocation
page read and write
2E245370000
heap
page read and write
29A3DB7F000
heap
page read and write
1BED4380000
trusted library section
page read and write
33EA000
trusted library allocation
page execute and read and write
16DA000
heap
page read and write
16C0000
direct allocation
page read and write
1BED94F4000
heap
page read and write
29A3D053000
heap
page read and write
1E212E4D000
heap
page read and write
1B261108000
heap
page read and write
33F7000
trusted library allocation
page execute and read and write
20DDFC00000
heap
page read and write
1A20000
heap
page read and write
32D1000
heap
page read and write
950000
unkown
page readonly
16C0000
direct allocation
page read and write
1A1D000
trusted library allocation
page execute and read and write
5D10000
heap
page read and write
5DD0000
trusted library allocation
page read and write
1A00000
trusted library allocation
page read and write
1A14000
trusted library allocation
page read and write
1BED4601000
trusted library allocation
page read and write
33F5000
trusted library allocation
page execute and read and write
33E2000
trusted library allocation
page read and write
1650000
direct allocation
page read and write
17AC000
heap
page read and write
1BED91B0000
trusted library allocation
page read and write
1736000
heap
page read and write
29A3DB89000
heap
page read and write
1BED3A9D000
heap
page read and write
29A3DB89000
heap
page read and write
1BED9449000
heap
page read and write
1F470013000
unkown
page read and write
7723A7E000
stack
page read and write
32D1000
heap
page read and write
33F0000
trusted library allocation
page read and write
19E0000
unclassified section
page read and write
29A3DB95000
heap
page read and write
1674000
heap
page read and write
4D5E17F000
stack
page read and write
21159113000
heap
page read and write
2E2455F0000
heap
page read and write
33F5000
trusted library allocation
page execute and read and write
29A3D013000
heap
page read and write
1BED4CB0000
trusted library section
page readonly
1BED92C0000
trusted library allocation
page read and write
B60000
unkown
page execute and read and write
3A29000
heap
page read and write
4FED5F7000
stack
page read and write
29A3D067000
heap
page read and write
1734000
heap
page read and write
1BED94FA000
heap
page read and write
970000
unkown
page readonly
2E245560000
heap
page read and write
17AC000
heap
page read and write
33EA000
trusted library allocation
page execute and read and write
4D5E07F000
stack
page read and write
3A10000
trusted library allocation
page read and write
33DD000
trusted library allocation
page execute and read and write
29A3D021000
heap
page read and write
21159054000
heap
page read and write
1BED4500000
heap
page read and write
29A3E002000
heap
page read and write
B6C000
unkown
page execute and read and write
29A3DB95000
heap
page read and write
1BED43E1000
trusted library allocation
page read and write
5C2E000
stack
page read and write
29A3D0E2000
heap
page read and write
7723D7D000
stack
page read and write
46777FB000
stack
page read and write
33E6000
trusted library allocation
page execute and read and write
E5593FE000
stack
page read and write
32D0000
heap
page read and write
1B261A02000
trusted library allocation
page read and write
1C6F498E000
heap
page read and write
29A3DB8B000
heap
page read and write
1E212E7F000
heap
page read and write
B69000
unkown
page execute and read and write
970000
unkown
page readonly
32D1000
heap
page read and write
173A000
heap
page read and write
95E000
unkown
page readonly
29A3DBAD000
heap
page read and write
5CF0000
trusted library allocation
page execute and read and write
970000
unkown
page readonly
29A3DB93000
heap
page read and write
5E20000
heap
page execute and read and write
1A00000
trusted library allocation
page read and write
29A3E002000
heap
page read and write
2E2463C0000
trusted library allocation
page read and write
20DE0402000
trusted library allocation
page read and write
1BED3A56000
heap
page read and write
4D5DC7F000
stack
page read and write
962000
unkown
page readonly
1BED917E000
trusted library allocation
page read and write
1C6F4977000
heap
page read and write
1C6F4996000
heap
page read and write
39F0000
heap
page execute and read and write
1400000
trusted library allocation
page read and write
1BED4502000
heap
page read and write
5D14000
heap
page read and write
1B2E000
stack
page read and write
177B000
heap
page read and write
B31000
unkown
page execute and read and write
5F2C000
stack
page read and write
5CF0000
trusted library allocation
page execute and read and write
5D00000
trusted library allocation
page read and write
B33000
unkown
page execute and read and write
29A3E021000
heap
page read and write
5F40000
trusted library allocation
page read and write
3B2000
unkown
page execute read
3A20000
heap
page read and write
61B0000
trusted library allocation
page read and write
29A3D108000
heap
page read and write
1BED9240000
remote allocation
page read and write
4B41000
trusted library allocation
page read and write
970000
unkown
page readonly
93F000
unkown
page readonly
B47000
unkown
page execute and read and write
29A3E01A000
heap
page read and write
20DDFC58000
heap
page read and write
5C2E000
stack
page read and write
1C6F4976000
heap
page read and write
33F5000
trusted library allocation
page execute and read and write
77241FF000
stack
page read and write
E54D5AF000
stack
page read and write
2E2455D0000
trusted library allocation
page read and write
5F40000
trusted library allocation
page read and write
5F2C000
stack
page read and write
1C6F495B000
heap
page read and write
B39000
unkown
page execute and read and write
93E000
unkown
page readonly
There are 774 hidden memdumps, click here to show them.