IOC Report
Q9FAsn6SG6

loading gif

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\Q9FAsn6SG6.exe
"C:\Users\user\Desktop\Q9FAsn6SG6.exe"
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1

URLs

Name
IP
Malicious
https://sectigo.com/CPS0
unknown
http://www.vmware.com/0
unknown
http://ocsp.sectigo.com0
unknown
http://www.symauth.com/rpa00
unknown
http://ip-api.com
unknown
http://www.vmware.com/0/
unknown
http://crl.sectigo.com/SectigoRSACodeSigningCA.crl0s
unknown
https://pidgin.im0
unknown
http://crt.sectigo.com/SectigoRSACodeSigningCA.crt0#
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
http://www.symauth.com/cps0(
unknown
http://ip-api.com/line/?fields=hosting
208.95.112.1
http://ip-api.com4
unknown
There are 3 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
ip-api.com
208.95.112.1

IPs

IP
Domain
Country
Malicious
208.95.112.1
ip-api.com
United States

Registry

Path
Value
Malicious
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\AppLaunch_RASAPI32
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\AppLaunch_RASAPI32
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\AppLaunch_RASAPI32
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\AppLaunch_RASAPI32
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\AppLaunch_RASAPI32
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\AppLaunch_RASAPI32
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\AppLaunch_RASAPI32
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\AppLaunch_RASMANCS
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\AppLaunch_RASMANCS
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\AppLaunch_RASMANCS
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\AppLaunch_RASMANCS
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\AppLaunch_RASMANCS
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\AppLaunch_RASMANCS
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\AppLaunch_RASMANCS
FileDirectory
There are 5 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
9A87000
trusted library allocation
page read and write
1F0FCD7D000
heap
page read and write
9000000
trusted library allocation
page read and write
8F70000
trusted library allocation
page read and write
9007000
trusted library allocation
page read and write
1046000
unkown
page execute and write copy
1EB50402000
heap
page read and write
1F0FC629000
heap
page read and write
9000000
trusted library allocation
page read and write
9010000
trusted library allocation
page read and write
90A0000
trusted library allocation
page read and write
1E3A2C02000
heap
page read and write
9A7D000
trusted library allocation
page read and write
1F0FCD22000
heap
page read and write
1EB4FDE0000
trusted library allocation
page read and write
8F70000
trusted library allocation
page read and write
1E3A38C0000
trusted library allocation
page read and write
8F60000
trusted library allocation
page read and write
1E3A3440000
trusted library allocation
page read and write
1F0FC64D000
heap
page read and write
9005000
trusted library allocation
page read and write
9000000
trusted library allocation
page read and write
19E3DA4C000
heap
page read and write
1F0FCD77000
heap
page read and write
9AA1000
trusted library allocation
page read and write
937D000
stack
page read and write
1F0FCD6F000
heap
page read and write
4F72000
heap
page read and write
9005000
trusted library allocation
page read and write
8F75000
trusted library allocation
page read and write
9000000
trusted library allocation
page read and write
8F70000
trusted library allocation
page read and write
1EA2C688000
heap
page read and write
3050000
direct allocation
page read and write
8F70000
trusted library allocation
page read and write
1E3A7950000
trusted library allocation
page read and write
1F0FCD82000
heap
page read and write
1E3A2713000
heap
page read and write
910E000
stack
page read and write
1E9CD24B000
heap
page read and write
30B17F000
stack
page read and write
9AD0000
trusted library allocation
page read and write
9005000
trusted library allocation
page read and write
2DF34000000
heap
page read and write
9000000
trusted library allocation
page read and write
9000000
trusted library allocation
page read and write
1F0FCD85000
heap
page read and write
2DF34063000
heap
page read and write
11AC000
unkown
page execute and write copy
9A70000
trusted library allocation
page read and write
8FB5000
trusted library allocation
page read and write
9000000
trusted library allocation
page read and write
982E000
unkown
page read and write
1E3A78D0000
trusted library allocation
page read and write
104C000
unkown
page execute and write copy
2DF3403B000
heap
page read and write
19E3DA13000
heap
page read and write
95BE000
stack
page read and write
9005000
trusted library allocation
page read and write
8F70000
trusted library allocation
page read and write
1F0FCD6F000
heap
page read and write
1C46A802000
trusted library allocation
page read and write
4D69D7E000
stack
page read and write
1ED14502000
heap
page read and write
2DF34062000
heap
page read and write
1F0FC683000
heap
page read and write
9007000
trusted library allocation
page read and write
8F70000
trusted library allocation
page read and write
1F0FC6EB000
heap
page read and write
9000000
trusted library allocation
page read and write
E286B4C000
stack
page read and write
501E000
heap
page read and write
BBB0877000
stack
page read and write
9000000
trusted library allocation
page read and write
9006000
trusted library allocation
page read and write
8F60000
trusted library allocation
page read and write
1F0FCD7E000
heap
page read and write
103C000
unkown
page execute and write copy
1F0FCD80000
heap
page read and write
1E3A78E0000
trusted library allocation
page read and write
15AE000
stack
page read and write
8FED000
stack
page read and write
691E000
stack
page read and write
2DF34045000
heap
page read and write
8F70000
trusted library allocation
page read and write
1E3A7CDF000
heap
page read and write
3370000
heap
page read and write
E70B3FB000
stack
page read and write
8F90000
trusted library allocation
page read and write
1C469FB0000
remote allocation
page read and write
9000000
trusted library allocation
page read and write
2DF34040000
heap
page read and write
1F0FD202000
heap
page read and write
8F70000
trusted library allocation
page read and write
1F0FCDA2000
heap
page read and write
9000000
trusted library allocation
page read and write
8F75000
trusted library allocation
page read and write
1E3A2702000
heap
page read and write
1C46A013000
heap
page read and write
1E9CD285000
heap
page read and write
8F65000
trusted library allocation
page read and write
1E3A3550000
trusted library section
page readonly
616F7E000
stack
page read and write
1F0FC68B000
heap
page read and write
1F0FCD6D000
heap
page read and write
1ED14350000
trusted library allocation
page read and write
9006000
trusted library allocation
page read and write
D63000
trusted library allocation
page execute and read and write
9005000
trusted library allocation
page read and write
1046000
unkown
page execute and write copy
6AF4000
trusted library allocation
page read and write
4F20000
trusted library allocation
page execute and read and write
1455000
heap
page read and write
8F70000
trusted library allocation
page read and write
9AA4000
trusted library allocation
page read and write
8F70000
trusted library allocation
page read and write
9005000
trusted library allocation
page read and write
1E3A7AA0000
trusted library allocation
page read and write
1E3A2D00000
heap
page read and write
9000000
trusted library allocation
page read and write
8F70000
trusted library allocation
page read and write
9005000
trusted library allocation
page read and write
1EB4FF02000
heap
page read and write
34E27FC000
stack
page read and write
4F4A000
heap
page read and write
4D6997C000
stack
page read and write
1F0FC713000
heap
page read and write
9005000
trusted library allocation
page read and write
156E000
stack
page read and write
27D7B413000
heap
page read and write
1084000
unkown
page execute and write copy
E70AF8B000
stack
page read and write
4D6987F000
stack
page read and write
9C42000
trusted library allocation
page read and write
9005000
trusted library allocation
page read and write
1ED14400000
heap
page read and write
9000000
trusted library allocation
page read and write
27D7B500000
heap
page read and write
1E3A38C3000
trusted library allocation
page read and write
DAB000
trusted library allocation
page execute and read and write
43A877F000
stack
page read and write
E2871FF000
stack
page read and write
27D7BC02000
trusted library allocation
page read and write
1E3A7BB0000
trusted library allocation
page read and write
1E3A7B90000
trusted library allocation
page read and write
9010000
trusted library allocation
page read and write
1C46A002000
heap
page read and write
69C0000
heap
page execute and read and write
94217F000
stack
page read and write
61707E000
stack
page read and write
D00000
heap
page read and write
1144000
unkown
page execute and read and write
9AAEB7F000
stack
page read and write
1F0FC627000
heap
page read and write
43A887B000
stack
page read and write
11DD000
unkown
page readonly
900C000
trusted library allocation
page read and write
1E3A2629000
heap
page read and write
9000000
trusted library allocation
page read and write
1F0FCD8D000
heap
page read and write
FAF000
unkown
page readonly
4F30000
heap
page read and write
8FB0000
trusted library allocation
page read and write
2DF34042000
heap
page read and write
1E3A25F0000
trusted library section
page read and write
2DF34057000
heap
page read and write
30B4FE000
stack
page read and write
1D26D476000
heap
page read and write
6B56000
trusted library allocation
page read and write
19E3DB02000
heap
page read and write
9000000
trusted library allocation
page read and write
9000000
trusted library allocation
page read and write
1ED14500000
heap
page read and write
2DF34065000
heap
page read and write
1E3A7C57000
heap
page read and write
1E3A2D59000
heap
page read and write
19E3DA29000
heap
page read and write
30B67F000
stack
page read and write
9000000
trusted library allocation
page read and write
9000000
trusted library allocation
page read and write
9000000
trusted library allocation
page read and write
1EB4FECC000
heap
page read and write
1EB4FE13000
heap
page read and write
1F0FCD1B000
heap
page read and write
9005000
trusted library allocation
page read and write
1F0FCD6F000
heap
page read and write
8F78000
trusted library allocation
page read and write
9C1C000
trusted library allocation
page read and write
E286FFE000
stack
page read and write
1EB4FF13000
heap
page read and write
1044000
unkown
page execute and write copy
15BB000
heap
page read and write
9005000
trusted library allocation
page read and write
2DF34078000
heap
page read and write
1F0FCD98000
heap
page read and write
27D7B45A000
heap
page read and write
9000000
trusted library allocation
page read and write
30B8FF000
stack
page read and write
1E3A2D02000
heap
page read and write
D06000
heap
page read and write
941F7B000
stack
page read and write
245D1310000
heap
page read and write
D50000
trusted library allocation
page read and write
1E3A7C63000
heap
page read and write
2DF33E80000
heap
page read and write
9007000
trusted library allocation
page read and write
1F0FD202000
heap
page read and write
933E000
stack
page read and write
9000000
trusted library allocation
page read and write
1D26D46E000
heap
page read and write
1E3A2656000
heap
page read and write
9005000
trusted library allocation
page read and write
90C0000
heap
page execute and read and write
1F0FCDA1000
heap
page read and write
9006000
trusted library allocation
page read and write
1C469F80000
trusted library allocation
page read and write
2DF3403D000
heap
page read and write
245D1C02000
trusted library allocation
page read and write
1E9CD264000
heap
page read and write
90A0000
trusted library allocation
page read and write
BBB077F000
stack
page read and write
1F0FD202000
heap
page read and write
90A0000
trusted library allocation
page read and write
1E3A7A70000
trusted library allocation
page read and write
8F70000
trusted library allocation
page read and write
1F0FCBF0000
remote allocation
page read and write
9C00000
trusted library allocation
page read and write
9000000
trusted library allocation
page read and write
8FB0000
trusted library allocation
page read and write
8FB4000
trusted library allocation
page read and write
A3B000
stack
page read and write
8F70000
trusted library allocation
page read and write
2DF34033000
heap
page read and write
9DC0000
trusted library allocation
page read and write
94A3377000
stack
page read and write
1F0FCDD1000
heap
page read and write
1EB4FEC1000
heap
page read and write
9005000
trusted library allocation
page read and write
103C000
unkown
page execute and write copy
9000000
trusted library allocation
page read and write
9000000
trusted library allocation
page read and write
4F10000
trusted library allocation
page read and write
9000000
trusted library allocation
page read and write
9110000
trusted library allocation
page read and write
8F70000
trusted library allocation
page read and write
1E3A7AB4000
trusted library allocation
page read and write
2DF34058000
heap
page read and write
1F0FCD71000
heap
page read and write
9000000
trusted library allocation
page read and write
8F70000
trusted library allocation
page read and write
8F70000
trusted library allocation
page read and write
1F0FC5F0000
trusted library allocation
page read and write
8F60000
trusted library allocation
page read and write
8F70000
trusted library allocation
page read and write
94A2D6B000
stack
page read and write
9005000
trusted library allocation
page read and write
8F78000
trusted library allocation
page read and write
1D26D360000
heap
page read and write
8F75000
trusted library allocation
page read and write
9000000
trusted library allocation
page read and write
8F80000
trusted library allocation
page read and write
1F0FCD2D000
heap
page read and write
1E3A269C000
heap
page read and write
1D26D402000
heap
page read and write
4F66000
heap
page read and write
1E3A7A7E000
trusted library allocation
page read and write
9000000
trusted library allocation
page read and write
1E3A7B40000
trusted library allocation
page read and write
9090000
trusted library allocation
page read and write
1E3A3560000
trusted library section
page readonly
8F70000
trusted library allocation
page read and write
19E3DA82000
heap
page read and write
1E3A266B000
heap
page read and write
9000000
trusted library allocation
page read and write
9000000
trusted library allocation
page read and write
1C469FB0000
remote allocation
page read and write
2DF3406E000
heap
page read and write
94A3478000
stack
page read and write
1ED14C02000
trusted library allocation
page read and write
27D7B502000
heap
page read and write
1F0FCD7E000
heap
page read and write
2DF34048000
heap
page read and write
1F0FC420000
heap
page read and write
9A98000
trusted library allocation
page read and write
1F0FCDA1000
heap
page read and write
1F0FCD7B000
heap
page read and write
1E9CD256000
heap
page read and write
8F70000
trusted library allocation
page read and write
992F000
stack
page read and write
8F70000
trusted library allocation
page read and write
9005000
trusted library allocation
page read and write
1E9CD256000
heap
page read and write
8F70000
trusted library allocation
page read and write
9000000
trusted library allocation
page read and write
1F0FCD9D000
heap
page read and write
1F0FC671000
heap
page read and write
9C04000
trusted library allocation
page read and write
1E3A2600000
heap
page read and write
7C0000
trusted library allocation
page read and write
1D26DC02000
trusted library allocation
page read and write
1E3A2410000
heap
page read and write
9AD1000
trusted library allocation
page read and write
2DF33EE0000
heap
page read and write
4F4ECFC000
stack
page read and write
9000000
trusted library allocation
page read and write
27D7B458000
heap
page read and write
9090000
trusted library allocation
page read and write
1ED1448F000
heap
page read and write
2DF3407C000
heap
page read and write
9000000
trusted library allocation
page read and write
19E3DB13000
heap
page read and write
9000000
trusted library allocation
page read and write
1ED1446F000
heap
page read and write
9000000
trusted library allocation
page read and write
8F75000
trusted library allocation
page read and write
15B0000
heap
page read and write
1042000
unkown
page execute and write copy
1F0FD219000
heap
page read and write
1E3A2D18000
heap
page read and write
4F4F57E000
stack
page read and write
8F70000
trusted library allocation
page read and write
E33000
stack
page read and write
1E3A263E000
heap
page read and write
1EA2C648000
heap
page read and write
9A95000
trusted library allocation
page read and write
1ED14455000
heap
page read and write
1E9CD251000
heap
page read and write
27D7B476000
heap
page read and write
19E3DA52000
heap
page read and write
9010000
trusted library allocation
page read and write
1EA2C480000
heap
page read and write
9007000
trusted library allocation
page read and write
1F0FCD73000
heap
page read and write
43A8C7F000
stack
page read and write
1ED141F0000
heap
page read and write
61737F000
stack
page read and write
1F0FCD6D000
heap
page read and write
9000000
trusted library allocation
page read and write
4F4EF7F000
stack
page read and write
94A3279000
stack
page read and write
1EA2C713000
heap
page read and write
1048000
unkown
page execute and write copy
104A000
unkown
page execute and write copy
8F70000
trusted library allocation
page read and write
1F0FCD19000
heap
page read and write
9AAE87B000
stack
page read and write
9000000
trusted library allocation
page read and write
1EB50500000
heap
page read and write
245D1402000
heap
page read and write
8F75000
trusted library allocation
page read and write
1E3A7C40000
heap
page read and write
34E239F000
stack
page read and write
1F0FC6AB000
heap
page read and write
9010000
trusted library allocation
page read and write
996E000
stack
page read and write
9000000
trusted library allocation
page read and write
1E3A7960000
trusted library allocation
page read and write
1F0FC63C000
heap
page read and write
9010000
trusted library allocation
page read and write
1042000
unkown
page execute and write copy
E286F7E000
stack
page read and write
34E231E000
stack
page read and write
9000000
trusted library allocation
page read and write
9000000
trusted library allocation
page read and write
9000000
trusted library allocation
page read and write
1E3A7C9E000
heap
page read and write
9AC0000
trusted library allocation
page read and write
1D26D465000
heap
page read and write
1F0FCD7D000
heap
page read and write
1EA2C420000
heap
page read and write
4D69E7F000
stack
page read and write
1EB4FE70000
heap
page read and write
1E3A7B80000
trusted library allocation
page read and write
941D7F000
stack
page read and write
1E3A7CF0000
heap
page read and write
9000000
trusted library allocation
page read and write
1E9CD280000
heap
page read and write
9010000
trusted library allocation
page read and write
1F0FCDA1000
heap
page read and write
8F70000
trusted library allocation
page read and write
1F0FC6FB000
heap
page read and write
1C469FB0000
remote allocation
page read and write
1E9CD270000
heap
page read and write
9000000
trusted library allocation
page read and write
1EA2C700000
heap
page read and write
9000000
trusted library allocation
page read and write
1E9CD4D5000
heap
page read and write
9010000
trusted library allocation
page read and write
61757D000
stack
page read and write
90A0000
trusted library allocation
page read and write
94A2DEE000
stack
page read and write
8F76000
trusted library allocation
page read and write
9A9C000
trusted library allocation
page read and write
245D1502000
heap
page read and write
8F70000
trusted library allocation
page read and write
245D145A000
heap
page read and write
1E3A26F9000
heap
page read and write
1F0FC6B5000
heap
page read and write
8F76000
trusted library allocation
page read and write
1450000
heap
page read and write
2DF34046000
heap
page read and write
9AB0000
trusted library allocation
page read and write
1D26D441000
heap
page read and write
9000000
trusted library allocation
page read and write
1F0FC708000
heap
page read and write
4FB7000
heap
page read and write
9010000
trusted library allocation
page read and write
8F70000
trusted library allocation
page read and write
9AAEA7B000
stack
page read and write
1E3A2D59000
heap
page read and write
18AE000
stack
page read and write
8F75000
trusted library allocation
page read and write
E286BCE000
stack
page read and write
9A6E000
stack
page read and write
1E9CD27F000
heap
page read and write
1E3A23A0000
heap
page read and write
5014000
heap
page read and write
8F90000
trusted library allocation
page read and write
1E3A7A94000
trusted library allocation
page read and write
8F70000
trusted library allocation
page read and write
4FF6000
heap
page read and write
9010000
trusted library allocation
page read and write
19E3DA50000
heap
page read and write
27D7B43C000
heap
page read and write
4F39000
heap
page read and write
941E7B000
stack
page read and write
9006000
trusted library allocation
page read and write
1E9CD262000
heap
page read and write
1F0FCD77000
heap
page read and write
90B0000
trusted library allocation
page read and write
1F0FC6C9000
heap
page read and write
4F4EE7E000
stack
page read and write
1C469E20000
heap
page read and write
8F70000
trusted library allocation
page read and write
30B57F000
stack
page read and write
6B64000
trusted library allocation
page read and write
61747D000
stack
page read and write
1E3A7C1F000
heap
page read and write
E2872FF000
stack
page read and write
1E3A2687000
heap
page read and write
CE0000
heap
page read and write
FAD000
unkown
page read and write
1EB4FEC8000
heap
page read and write
9000000
trusted library allocation
page read and write
9005000
trusted library allocation
page read and write
BBB06FB000
stack
page read and write
4F4F47F000
stack
page read and write
8F70000
trusted library allocation
page read and write
9A74000
trusted library allocation
page read and write
4D69C7F000
stack
page read and write
8F70000
trusted library allocation
page read and write
1EA2C63C000
heap
page read and write
1E3A7BD0000
trusted library allocation
page read and write
9000000
trusted library allocation
page read and write
1E3A2613000
heap
page read and write
1E9CD240000
heap
page read and write
2DF34060000
heap
page read and write
8F70000
trusted library allocation
page read and write
94227F000
stack
page read and write
1ED1443C000
heap
page read and write
19E3DA4D000
heap
page read and write
9000000
trusted library allocation
page read and write
9000000
trusted library allocation
page read and write
9000000
trusted library allocation
page read and write
9005000
trusted library allocation
page read and write
1F0FCD90000
heap
page read and write
27D7B459000
heap
page read and write
9005000
trusted library allocation
page read and write
9000000
trusted library allocation
page read and write
1E3A7A70000
trusted library allocation
page read and write
245D1440000
heap
page read and write
D96000
trusted library allocation
page execute and read and write
9000000
trusted library allocation
page read and write
1E9CD270000
heap
page read and write
1E3A2690000
heap
page read and write
9005000
trusted library allocation
page read and write
27D7B474000
heap
page read and write
8F60000
trusted library allocation
page read and write
1EB4FE29000
heap
page read and write
1F0FCD90000
heap
page read and write
1E3A2666000
heap
page read and write
9AE0000
trusted library allocation
page read and write
34E277E000
stack
page read and write
9120000
trusted library allocation
page read and write
90B0000
trusted library allocation
page read and write
9007000
trusted library allocation
page read and write
6B47000
trusted library allocation
page read and write
104E000
unkown
page execute and write copy
4F40000
heap
page read and write
1E3A2C15000
heap
page read and write
FB7000
unkown
page execute and read and write
1D26D3F0000
trusted library allocation
page read and write
9000000
trusted library allocation
page read and write
8F80000
trusted library allocation
page read and write
9000000
trusted library allocation
page read and write
1F0FCD4F000
heap
page read and write
9000000
trusted library allocation
page read and write
4F4EFFC000
stack
page read and write
1ED14483000
heap
page read and write
1F0FCD8F000
heap
page read and write
9000000
trusted library allocation
page read and write
1ED141E0000
heap
page read and write
3210000
heap
page read and write
1F0FD202000
heap
page read and write
9000000
trusted library allocation
page read and write
245D1468000
heap
page read and write
8F6B000
trusted library allocation
page read and write
9000000
trusted library allocation
page read and write
19E3DB08000
heap
page read and write
9005000
trusted library allocation
page read and write
8F60000
trusted library allocation
page read and write
1F0FCD77000
heap
page read and write
1D26D458000
heap
page read and write
9AAE32B000
stack
page read and write
1E3A25E0000
trusted library allocation
page read and write
4F4F27C000
stack
page read and write
1E3A7CFB000
heap
page read and write
2DF34802000
trusted library allocation
page read and write
1E3A2BE1000
trusted library allocation
page read and write
27D7B451000
heap
page read and write
1E3A3530000
trusted library section
page readonly
9120000
trusted library allocation
page read and write
1ED14429000
heap
page read and write
1C46A029000
heap
page read and write
D6D000
trusted library allocation
page execute and read and write
9005000
trusted library allocation
page read and write
1F0FCD7E000
heap
page read and write
27D7B466000
heap
page read and write
9000000
trusted library allocation
page read and write
1F0FCDB2000
heap
page read and write
1E3A7BC0000
trusted library allocation
page read and write
D64000
trusted library allocation
page read and write
E61000
unkown
page execute read
1F0FCD8D000
heap
page read and write
1EA2C613000
heap
page read and write
27D7B513000
heap
page read and write
30B6FE000
stack
page read and write
19E3DB00000
heap
page read and write
FAD000
unkown
page write copy
1C469E80000
heap
page read and write
E70B5F7000
stack
page read and write
245D1513000
heap
page read and write
27D7B45E000
heap
page read and write
947E000
stack
page read and write
1F0FCD90000
heap
page read and write
9000000
trusted library allocation
page read and write
9000000
trusted library allocation
page read and write
1F0FCDC4000
heap
page read and write
27D7B2E0000
heap
page read and write
94BE000
stack
page read and write
8F60000
trusted library allocation
page read and write
1EA2C629000
heap
page read and write
4D6A07E000
stack
page read and write
4D69F7E000
stack
page read and write
104C000
unkown
page execute and write copy
8F70000
trusted library allocation
page read and write
6AD1000
trusted library allocation
page read and write
9000000
trusted library allocation
page read and write
9000000
trusted library allocation
page read and write
27D7B45B000
heap
page read and write
4F4F0FC000
stack
page read and write
19E3E202000
trusted library allocation
page read and write
7AD1000
trusted library allocation
page read and write
4F76000
heap
page read and write
19E3DA4B000
heap
page read and write
7B0000
heap
page read and write
1F0FCD91000
heap
page read and write
1F0FCD80000
heap
page read and write
17AF000
stack
page read and write
1EB4FBB0000
heap
page read and write
1F0FC656000
heap
page read and write
8FB0000
trusted library allocation
page read and write
4D6931B000
stack
page read and write
4F00000
trusted library allocation
page readonly
1E3A7BA0000
trusted library allocation
page read and write
8F70000
trusted library allocation
page read and write
9AD0000
trusted library allocation
page read and write
DA7000
trusted library allocation
page execute and read and write
19E3DA70000
heap
page read and write
400000
remote allocation
page readonly
8F77000
trusted library allocation
page read and write
8F70000
trusted library allocation
page read and write
1F0FCDB7000
heap
page read and write
1F0FD262000
heap
page read and write
9000000
trusted library allocation
page read and write
1EB4FBA0000
heap
page read and write
9000000
trusted library allocation
page read and write
1F0FCC02000
heap
page read and write
E286E7E000
stack
page read and write
1080000
unkown
page execute and write copy
1040000
unkown
page execute and write copy
1F0FD221000
heap
page read and write
FB7000
unkown
page execute and write copy
9700000
trusted library allocation
page read and write
9000000
trusted library allocation
page read and write
BBB047D000
stack
page read and write
1F0FCBF0000
remote allocation
page read and write
4D69B7D000
stack
page read and write
9000000
trusted library allocation
page read and write
9000000
trusted library allocation
page read and write
245D13B0000
trusted library allocation
page read and write
1E9CD27B000
heap
page read and write
9000000
trusted library allocation
page read and write
9000000
trusted library allocation
page read and write
1F0FC3B0000
heap
page read and write
9000000
trusted library allocation
page read and write
11DD000
unkown
page readonly
9127000
trusted library allocation
page read and write
E70B27E000
stack
page read and write
E60000
unkown
page readonly
1F0FCDD9000
heap
page read and write
1EA2C64E000
heap
page read and write
9000000
trusted library allocation
page read and write
9005000
trusted library allocation
page read and write
4F4F37E000
stack
page read and write
9000000
trusted library allocation
page read and write
27D7B2D0000
heap
page read and write
FAF000
unkown
page readonly
43A83EE000
stack
page read and write
1F0FC658000
heap
page read and write
34E267F000
stack
page read and write
9010000
trusted library allocation
page read and write
9000000
trusted library allocation
page read and write
34E229A000
stack
page read and write
1EB4FEE1000
heap
page read and write
30AF79000
stack
page read and write
1E3A23B0000
heap
page read and write
1F0FCD6F000
heap
page read and write
BBB04FE000
stack
page read and write
6172FD000
stack
page read and write
1077000
unkown
page execute and read and write
1E3A2C00000
heap
page read and write
9000000
trusted library allocation
page read and write
E70B7FE000
stack
page read and write
19E3DA3C000
heap
page read and write
8F70000
trusted library allocation
page read and write
1048000
unkown
page execute and write copy
9000000
trusted library allocation
page read and write
1F0FCDA1000
heap
page read and write
1F0FD200000
heap
page read and write
9007000
trusted library allocation
page read and write
9110000
trusted library allocation
page read and write
2DF3406A000
heap
page read and write
1EA2C64C000
heap
page read and write
942077000
stack
page read and write
19E3DA8B000
heap
page read and write
1EA2C600000
heap
page read and write
1F0FC6AA000
heap
page read and write
9A8D000
trusted library allocation
page read and write
27D7B481000
heap
page read and write
8FA0000
trusted library allocation
page read and write
94A307E000
stack
page read and write
BBB097F000
stack
page read and write
9000000
trusted library allocation
page read and write
9000000
trusted library allocation
page read and write
9000000
trusted library allocation
page read and write
2DF34102000
heap
page read and write
1F0FCD7E000
heap
page read and write
9000000
trusted library allocation
page read and write
27D7B508000
heap
page read and write
1EA2C67D000
heap
page read and write
9000000
trusted library allocation
page read and write
1F0FC6C2000
heap
page read and write
9B10000
trusted library allocation
page read and write
19E3D960000
heap
page read and write
1EB4FC10000
heap
page read and write
245D1500000
heap
page read and write
30AC7B000
stack
page read and write
43A8B7C000
stack
page read and write
9008000
trusted library allocation
page read and write
9000000
trusted library allocation
page read and write
1E9CD4D0000
heap
page read and write
9000000
trusted library allocation
page read and write
1F0FD202000
heap
page read and write
9000000
trusted library allocation
page read and write
1E3A3520000
trusted library section
page readonly
9006000
trusted library allocation
page read and write
1EB50512000
heap
page read and write
27D7B474000
heap
page read and write
402000
remote allocation
page execute read
314E000
direct allocation
page execute and read and write
1F0FCD77000
heap
page read and write
941C7B000
stack
page read and write
27D7B45D000
heap
page read and write
1F0FCDA3000
heap
page read and write
1D26D429000
heap
page read and write
43A836E000
stack
page read and write
9000000
trusted library allocation
page read and write
8F60000
trusted library allocation
page read and write
9000000
trusted library allocation
page read and write
245D1400000
heap
page read and write
1C46A102000
heap
page read and write
1C46A03D000
heap
page read and write
1C46A000000
heap
page read and write
1ED1444A000
heap
page read and write
1D26D45B000
heap
page read and write
1E3A2F01000
trusted library allocation
page read and write
9000000
trusted library allocation
page read and write
1E3A7A90000
trusted library allocation
page read and write
D9A000
trusted library allocation
page execute and read and write
9010000
trusted library allocation
page read and write
1F0FCD7D000
heap
page read and write
9000000
trusted library allocation
page read and write
1E9CD287000
heap
page read and write
1C46A025000
heap
page read and write
9000000
trusted library allocation
page read and write
1F0FCD6F000
heap
page read and write
90B0000
trusted library allocation
page read and write
8F70000
trusted library allocation
page read and write
FB2000
unkown
page read and write
1EA2C410000
heap
page read and write
1EA2C66F000
heap
page read and write
4FF8000
heap
page read and write
9A7F000
trusted library allocation
page read and write
6B44000
trusted library allocation
page read and write
43A8977000
stack
page read and write
9000000
trusted library allocation
page read and write
8F75000
trusted library allocation
page read and write
8F75000
trusted library allocation
page read and write
8F60000
trusted library allocation
page read and write
1EA2CE02000
trusted library allocation
page read and write
30AE77000
stack
page read and write
1F0FCD6F000
heap
page read and write
2DF34067000
heap
page read and write
1EB4FEBB000
heap
page read and write
1EB4FE87000
heap
page read and write
616BBC000
stack
page read and write
1E9CD267000
heap
page read and write
9000000
trusted library allocation
page read and write
E61000
unkown
page execute read
900F000
trusted library allocation
page read and write
1ED14450000
heap
page read and write
500D000
heap
page read and write
3070000
direct allocation
page read and write
9000000
trusted library allocation
page read and write
1EA2C702000
heap
page read and write
94A357E000
stack
page read and write
E2870FE000
stack
page read and write
245D1320000
heap
page read and write
1ED14250000
heap
page read and write
B37000
stack
page read and write
D90000
trusted library allocation
page read and write
1F0FC6ED000
heap
page read and write
9000000
trusted library allocation
page read and write
1E3A7CF6000
heap
page read and write
D4C000
stack
page read and write
9005000
trusted library allocation
page read and write
E70B6FF000
stack
page read and write
BBB0A7F000
stack
page read and write
1F0FCD98000
heap
page read and write
9005000
trusted library allocation
page read and write
1F0FCD90000
heap
page read and write
5017000
heap
page read and write
1F0FC6EA000
heap
page read and write
9AAE97B000
stack
page read and write
900A000
trusted library allocation
page read and write
1F0FCD6F000
heap
page read and write
9000000
trusted library allocation
page read and write
1F0FCD8D000
heap
page read and write
9000000
trusted library allocation
page read and write
9000000
trusted library allocation
page read and write
1F0FC613000
heap
page read and write
9110000
trusted library allocation
page execute and read and write
27D7B370000
trusted library allocation
page read and write
1E3A2D18000
heap
page read and write
1F0FD202000
heap
page read and write
9134000
heap
page read and write
8F70000
trusted library allocation
page read and write
1040000
unkown
page execute and write copy
1D26D502000
heap
page read and write
9000000
trusted library allocation
page read and write
9000000
trusted library allocation
page read and write
D85000
heap
page read and write
923C000
stack
page read and write
245D1380000
heap
page read and write
9000000
trusted library allocation
page read and write
1ED14492000
heap
page read and write
1F0FC6E6000
heap
page read and write
94A3677000
stack
page read and write
19E3D990000
trusted library allocation
page read and write
9008000
trusted library allocation
page read and write
8F60000
trusted library allocation
page read and write
1C469E10000
heap
page read and write
E70B2FE000
stack
page read and write
1D26D350000
heap
page read and write
4D6977B000
stack
page read and write
1E9CD270000
heap
page read and write
9000000
trusted library allocation
page read and write
1ED14508000
heap
page read and write
1E9CD27C000
heap
page read and write
9000000
trusted library allocation
page read and write
9006000
trusted library allocation
page read and write
1E3A7BD0000
remote allocation
page read and write
9006000
trusted library allocation
page read and write
9005000
trusted library allocation
page read and write
8F70000
trusted library allocation
page read and write
9000000
trusted library allocation
page read and write
27D7B462000
heap
page read and write
2DF34013000
heap
page read and write
1EB4FE24000
heap
page read and write
1E9CD1F0000
heap
page read and write
2DF3405A000
heap
page read and write
3130000
direct allocation
page execute and read and write
1F0FC600000
heap
page read and write
1ED14477000
heap
page read and write
1F0FCD85000
heap
page read and write
1E3A7C0F000
heap
page read and write
1D26D3C0000
heap
page read and write
43A82EB000
stack
page read and write
1E3A7AB0000
trusted library allocation
page read and write
1F0FD203000
heap
page read and write
9000000
trusted library allocation
page read and write
9010000
trusted library allocation
page read and write
30B5FF000
stack
page read and write
9AD0000
trusted library allocation
page read and write
1F0FCD98000
heap
page read and write
1F0FCD82000
heap
page read and write
1E3A7BD0000
remote allocation
page read and write
1E3A3570000
trusted library section
page readonly
94A36FF000
unkown
page read and write
9009000
trusted library allocation
page read and write
1430000
trusted library allocation
page read and write
2DF3406C000
heap
page read and write
1E3A7CF9000
heap
page read and write
1ED14513000
heap
page read and write
9000000
trusted library allocation
page read and write
27D7B340000
heap
page read and write
9A90000
trusted library allocation
page read and write
1F0FCDB2000
heap
page read and write
8F50000
trusted library allocation
page read and write
8F70000
trusted library allocation
page read and write
E32000
stack
page execute and read and write
9BF0000
trusted library allocation
page read and write
8F70000
trusted library allocation
page read and write
FB2000
unkown
page write copy
E2B000
stack
page read and write
1C46A051000
heap
page read and write
27D7B400000
heap
page read and write
1F0FCD8D000
heap
page read and write
8F76000
trusted library allocation
page read and write
104E000
unkown
page execute and write copy
9000000
trusted library allocation
page read and write
8FB0000
trusted library allocation
page read and write
6ACF000
stack
page read and write
1D26D413000
heap
page read and write
19E3DA4F000
heap
page read and write
1E3A7CEA000
heap
page read and write
9006000
trusted library allocation
page read and write
D60000
trusted library allocation
page read and write
1E3A7CA1000
heap
page read and write
245D1479000
heap
page read and write
9130000
heap
page read and write
1044000
unkown
page execute and write copy
9000000
trusted library allocation
page read and write
1F0FCDA1000
heap
page read and write
1F0FCD90000
heap
page read and write
1F0FD203000
heap
page read and write
9005000
trusted library allocation
page read and write
FBA000
unkown
page execute and write copy
9000000
trusted library allocation
page read and write
1ED1444E000
heap
page read and write
1E3A7A78000
trusted library allocation
page read and write
9000000
trusted library allocation
page read and write
D80000
heap
page read and write
8F70000
trusted library allocation
page read and write
4F4E8DB000
stack
page read and write
1F0FCDA1000
heap
page read and write
1F0FCBF0000
remote allocation
page read and write
1F0FC3C0000
heap
page read and write
8C0E000
stack
page read and write
9006000
trusted library allocation
page read and write
30B47F000
stack
page read and write
245D1413000
heap
page read and write
1F0FCD90000
heap
page read and write
2DF34029000
heap
page read and write
103E000
unkown
page execute and write copy
104A000
unkown
page execute and write copy
1E9CD0A0000
heap
page read and write
1ED14413000
heap
page read and write
1145000
unkown
page execute and write copy
1E9CD1D0000
heap
page read and write
9000000
trusted library allocation
page read and write
41E000
remote allocation
page readonly
1F0FCDC5000
heap
page read and write
90A0000
trusted library allocation
page read and write
9010000
trusted library allocation
page read and write
1F0FCD90000
heap
page read and write
DA2000
trusted library allocation
page read and write
1F0FCD98000
heap
page read and write
E60000
unkown
page readonly
9000000
trusted library allocation
page read and write
2DF34085000
heap
page read and write
1F0FCD68000
heap
page read and write
3132000
direct allocation
page execute and read and write
8B0D000
stack
page read and write
9000000
trusted library allocation
page read and write
9000000
trusted library allocation
page read and write
9000000
trusted library allocation
page read and write
4D69A7E000
stack
page read and write
8F75000
trusted library allocation
page read and write
FF0E0000
trusted library allocation
page execute and read and write
9000000
trusted library allocation
page read and write
1F0FCDB7000
heap
page read and write
9000000
trusted library allocation
page read and write
6B5A000
trusted library allocation
page read and write
9000000
trusted library allocation
page read and write
6171FE000
stack
page read and write
1E3A2D13000
heap
page read and write
8F70000
trusted library allocation
page read and write
8F70000
trusted library allocation
page read and write
9000000
trusted library allocation
page read and write
103E000
unkown
page execute and write copy
9005000
trusted library allocation
page read and write
19E3D8F0000
heap
page read and write
4EF0000
heap
page read and write
1F0FC64E000
heap
page read and write
D70000
trusted library allocation
page read and write
912D000
trusted library allocation
page read and write
1EB4FE43000
heap
page read and write
30B07B000
stack
page read and write
9000000
trusted library allocation
page read and write
1F0FCD70000
heap
page read and write
1D26D400000
heap
page read and write
8F70000
trusted library allocation
page read and write
9000000
trusted library allocation
page read and write
9000000
trusted library allocation
page read and write
19E3DA02000
heap
page read and write
1F0FCD8A000
heap
page read and write
9005000
trusted library allocation
page read and write
2DF3405F000
heap
page read and write
9000000
trusted library allocation
page read and write
9000000
trusted library allocation
page read and write
1EB4FE00000
heap
page read and write
F8D000
unkown
page readonly
9000000
trusted library allocation
page read and write
2DF3407F000
heap
page read and write
9000000
trusted library allocation
page read and write
43A8A7F000
stack
page read and write
1F0FCD6D000
heap
page read and write
1EA2C708000
heap
page read and write
1F0FC6D9000
heap
page read and write
9000000
trusted library allocation
page read and write
9000000
trusted library allocation
page read and write
1F0FCDA1000
heap
page read and write
1E3A38D0000
trusted library allocation
page read and write
8F70000
trusted library allocation
page read and write
8F70000
trusted library allocation
page read and write
1F0FCD90000
heap
page read and write
9000000
trusted library allocation
page read and write
8F85000
trusted library allocation
page read and write
1F0FC702000
heap
page read and write
9000000
trusted library allocation
page read and write
2DF3404E000
heap
page read and write
9000000
trusted library allocation
page read and write
6170FF000
stack
page read and write
1E3A7C00000
heap
page read and write
9000000
trusted library allocation
page read and write
1E3A266F000
heap
page read and write
9000000
trusted library allocation
page read and write
8F90000
trusted library allocation
page read and write
D7D000
trusted library allocation
page execute and read and write
1E9CD266000
heap
page read and write
1E3A7BD0000
remote allocation
page read and write
1E3A7A91000
trusted library allocation
page read and write
1080000
unkown
page execute and read and write
8F60000
trusted library allocation
page read and write
1E3A7AA0000
trusted library allocation
page read and write
BBB01EB000
stack
page read and write
E70B4FB000
stack
page read and write
2DF3407B000
heap
page read and write
1EA2C580000
trusted library allocation
page read and write
9000000
trusted library allocation
page read and write
19E3D900000
heap
page read and write
9000000
trusted library allocation
page read and write
1F0FCD00000
heap
page read and write
2DF33E70000
heap
page read and write
F8D000
unkown
page readonly
1EA2C654000
heap
page read and write
1E3A268B000
heap
page read and write
9000000
trusted library allocation
page read and write
1F0FCDB2000
heap
page read and write
9000000
trusted library allocation
page read and write
9000000
trusted library allocation
page read and write
3050000
heap
page read and write
2DF3405C000
heap
page read and write
4F4F17B000
stack
page read and write
1E3A7C2C000
heap
page read and write
1E3A7C4D000
heap
page read and write
9005000
trusted library allocation
page read and write
9000000
trusted library allocation
page read and write
8F70000
trusted library allocation
page read and write
27D7B429000
heap
page read and write
8F66000
trusted library allocation
page read and write
1F0FCD77000
heap
page read and write
9000000
trusted library allocation
page read and write
9000000
trusted library allocation
page read and write
90A6000
trusted library allocation
page read and write
9009000
trusted library allocation
page read and write
1F0FCD8E000
heap
page read and write
11AB000
unkown
page execute and read and write
8F75000
trusted library allocation
page read and write
9005000
trusted library allocation
page read and write
34E26F8000
stack
page read and write
9A84000
trusted library allocation
page read and write
30B27A000
stack
page read and write
245D1428000
heap
page read and write
9000000
trusted library allocation
page read and write
1E3A3540000
trusted library section
page readonly
1F0FC716000
heap
page read and write
19E3DA00000
heap
page read and write
2DF34032000
heap
page read and write
900B000
trusted library allocation
page read and write
1D26D513000
heap
page read and write
1F0FD202000
heap
page read and write
9000000
trusted library allocation
page read and write
941CFF000
stack
page read and write
9005000
trusted library allocation
page read and write
9000000
trusted library allocation
page read and write
30B37B000
stack
page read and write
D92000
trusted library allocation
page read and write
8F90000
heap
page read and write
1F0FD202000
heap
page read and write
2DF33FE0000
trusted library allocation
page read and write
There are 1013 hidden memdumps, click here to show them.