IOC Report
72EED30398363-0983BNDJ0398763536.exe

loading gif

Files

File Path
Type
Category
Malicious
72EED30398363-0983BNDJ0398763536.exe
PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
initial sample
malicious
C:\Users\user\AppData\Local\Temp\ARMOURY CRATE Message.VisualElementsManifest.xml
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\Airplane_14.bmp
JPEG image data, JFIF standard 1.01, resolution (DPI), density 100x100, segment length 16, Exif Standard: [TIFF image data, big-endian, direntries=3], baseline, precision 8, 110x110, frames 3
dropped
C:\Users\user\AppData\Local\Temp\MapiProxy.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\Microsoft.Practices.ObjectBuilder2.dll
PE32+ executable (DLL) (console) x86-64 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\Sports-Wallpapers-1.jpg
JPEG image data, JFIF standard 1.01, resolution (DPI), density 96x96, segment length 16, baseline, precision 8, 1280x786, frames 3
dropped
C:\Users\user\AppData\Local\Temp\TREDIVER.Und
data
dropped
C:\Users\user\AppData\Local\Temp\format-justify-center-symbolic.svg
SVG Scalable Vector Graphics image
dropped
C:\Users\user\AppData\Local\Temp\fzshellext_64.dll
PE32+ executable (DLL) (console) x86-64 (stripped to external PDB), for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\lang-1071.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\mail-reply-all-symbolic.symbolic.png
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Temp\media-playback-start-symbolic.symbolic.png
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Temp\network-no-route-symbolic.svg
SVG Scalable Vector Graphics image
dropped
C:\Users\user\AppData\Local\Temp\nsw5376.tmp\System.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
modified
C:\Users\user\AppData\Local\Temp\system-reboot-symbolic.symbolic.png
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
dropped
There are 5 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\72EED30398363-0983BNDJ0398763536.exe
"C:\Users\user\Desktop\72EED30398363-0983BNDJ0398763536.exe"
malicious

URLs

Name
IP
Malicious
http://crl.sectigo.com/SectigoRSACodeSigningCA.crl0s
unknown
http://www.avast.com0/
unknown
http://nsis.sf.net/NSIS_ErrorError
unknown
http://ocsp.sectigo.com0
unknown
http://crt.sectigo.com/SectigoRSACodeSigningCA.crt0#
unknown
https://mozilla.org0
unknown
https://sectigo.com/CPS0C
unknown

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Uninstall\FLOKDYRS
Fyrvrkeres
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\riffelgangens
Spydkasters198
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Eyebath\Qoph28
Expand String Value
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Specularity211\haandholdt
Screwdriver44

Memdumps

Base Address
Regiontype
Protect
Malicious
3060000
direct allocation
page execute and read and write
malicious
20F67894000
heap
page read and write
20F6CD30000
trusted library allocation
page read and write
3F4017F000
stack
page read and write
22D91802000
heap
page read and write
1485E03D000
heap
page read and write
22D9182A000
heap
page read and write
2BCF05E0000
trusted library allocation
page read and write
2B786802000
trusted library allocation
page read and write
D15EA7F000
stack
page read and write
20F67890000
heap
page read and write
1D91CB60000
trusted library allocation
page read and write
1D91D78B000
heap
page read and write
205B2526000
heap
page read and write
1F44A0E0000
heap
page read and write
1D91D785000
heap
page read and write
4011B78000
stack
page read and write
1485E063000
heap
page read and write
22DB7002000
trusted library allocation
page read and write
1485E031000
heap
page read and write
1D91D774000
heap
page read and write
1D91D78A000
heap
page read and write
1D91D7A7000
heap
page read and write
205B252E000
heap
page read and write
1D91DC18000
heap
page read and write
1D91D77E000
heap
page read and write
8F242FC000
stack
page read and write
1485E06A000
heap
page read and write
1DB6AB02000
heap
page read and write
5FF000
heap
page read and write
22DB6610000
heap
page read and write
D15E57F000
stack
page read and write
1D91D782000
heap
page read and write
401000
unkown
page execute read
1D91D78E000
heap
page read and write
1EF81540000
heap
page read and write
205B2545000
heap
page read and write
20F6CEF0000
trusted library allocation
page read and write
1485E05A000
heap
page read and write
1D91D602000
heap
page read and write
925B3FF000
stack
page read and write
2B786026000
heap
page read and write
1D91D78C000
heap
page read and write
2394CA00000
heap
page read and write
2303EA64000
heap
page read and write
205B2524000
heap
page read and write
2BCF0779000
heap
page read and write
2BCF0730000
heap
page read and write
1D91D77E000
heap
page read and write
20F678A0000
heap
page read and write
22A60C00000
heap
page read and write
B32D37F000
stack
page read and write
1D91D7BA000
heap
page read and write
2394CA6E000
heap
page read and write
1D91D779000
heap
page read and write
20F6D000000
heap
page read and write
20F68113000
heap
page read and write
2303E8D0000
heap
page read and write
19D4647D000
heap
page read and write
22DB6900000
heap
page read and write
22DB6670000
heap
page read and write
22D91865000
heap
page read and write
B32D577000
stack
page read and write
1F44A263000
heap
page read and write
619000
heap
page read and write
EAF4EFD000
stack
page read and write
2394D402000
heap
page read and write
20F6D100000
heap
page read and write
2280000
heap
page read and write
22A60B80000
trusted library allocation
page read and write
1D91D7C5000
heap
page read and write
925BBFF000
stack
page read and write
1D91D798000
heap
page read and write
3F4007E000
stack
page read and write
1D91D7CF000
heap
page read and write
20F68158000
heap
page read and write
1EF8165C000
heap
page read and write
20F68100000
heap
page read and write
1D91D775000
heap
page read and write
1D91CD08000
heap
page read and write
1D91D782000
heap
page read and write
1D91D77A000
heap
page read and write
1D91D77E000
heap
page read and write
22D91710000
heap
page read and write
B32D77F000
stack
page read and write
1D91D760000
heap
page read and write
22A60C29000
heap
page read and write
19D46486000
heap
page read and write
2B786029000
heap
page read and write
8F2427E000
stack
page read and write
2394CAC3000
heap
page read and write
22DB6888000
heap
page read and write
D15E47C000
stack
page read and write
1D91D76D000
heap
page read and write
925B8F7000
stack
page read and write
20F678A9000
heap
page read and write
E3E0DF7000
stack
page read and write
1D91D796000
heap
page read and write
22D91800000
heap
page read and write
1D91D780000
heap
page read and write
20F6CEC0000
trusted library allocation
page read and write
22A60AF0000
heap
page read and write
20F6D330000
trusted library allocation
page read and write
1D91D7EA000
heap
page read and write
1D91D78A000
heap
page read and write
1F44A302000
heap
page read and write
20F68D20000
trusted library allocation
page read and write
422000
unkown
page read and write
22D91857000
heap
page read and write
925B37F000
stack
page read and write
20F6CDA0000
trusted library allocation
page read and write
1D91D490000
remote allocation
page read and write
2303E8C0000
heap
page read and write
3F4027F000
stack
page read and write
3D1317A000
stack
page read and write
20F6CF00000
trusted library allocation
page read and write
8F2417E000
stack
page read and write
2B786102000
heap
page read and write
925BAFF000
stack
page read and write
40113DE000
stack
page read and write
20F67907000
heap
page read and write
40112DB000
stack
page read and write
2BCF0860000
heap
page read and write
22DB6855000
heap
page read and write
217E000
stack
page read and write
22A60D13000
heap
page read and write
22A60C54000
heap
page read and write
1D91D77E000
heap
page read and write
205B2516000
heap
page read and write
1485E06E000
heap
page read and write
22A60C71000
heap
page read and write
97392FB000
stack
page read and write
22D917A0000
trusted library allocation
page read and write
1D91D7AB000
heap
page read and write
2394CAE1000
heap
page read and write
20F6CEF0000
trusted library allocation
page read and write
1485E046000
heap
page read and write
613000
heap
page read and write
22D91848000
heap
page read and write
1D91D7CF000
heap
page read and write
20F6D0AF000
heap
page read and write
97393F7000
stack
page read and write
20F6CFF0000
trusted library allocation
page read and write
1D91D78A000
heap
page read and write
EA0497A000
stack
page read and write
1D91CC13000
heap
page read and write
22DB683C000
heap
page read and write
1D91D798000
heap
page read and write
1D91CCAB000
heap
page read and write
20F68102000
heap
page read and write
732A0000
unkown
page readonly
E3E07DC000
stack
page read and write
1D91D774000
heap
page read and write
1D91D7B8000
heap
page read and write
4011877000
stack
page read and write
22D91858000
heap
page read and write
1485DDE0000
heap
page read and write
20F6CEE4000
trusted library allocation
page read and write
2B785E40000
heap
page read and write
20F6D062000
heap
page read and write
22DB687D000
heap
page read and write
29465FF000
stack
page read and write
20F676C0000
heap
page read and write
40908FE000
stack
page read and write
20F678FB000
heap
page read and write
2BCF0775000
heap
page read and write
1EF81667000
heap
page read and write
19D46429000
heap
page read and write
1D91D774000
heap
page read and write
19D46400000
heap
page read and write
1D91D7DB000
heap
page read and write
1D91CC4D000
heap
page read and write
1DB6A8E0000
heap
page read and write
1D91D79D000
heap
page read and write
1D91D490000
remote allocation
page read and write
409097E000
stack
page read and write
1D91DC1A000
heap
page read and write
1485E045000
heap
page read and write
19D4643C000
heap
page read and write
2B785EB0000
heap
page read and write
2303E930000
heap
page read and write
1485E04E000
heap
page read and write
20F6CEE1000
trusted library allocation
page read and write
1DB6A9A0000
remote allocation
page read and write
1485E029000
heap
page read and write
B32D67F000
stack
page read and write
19D46513000
heap
page read and write
EAF4D7D000
stack
page read and write
97395FF000
stack
page read and write
474000
unkown
page readonly
20F6CECE000
trusted library allocation
page read and write
20F6D102000
heap
page read and write
20F6D010000
trusted library allocation
page read and write
8F2467E000
stack
page read and write
925B7FB000
stack
page read and write
1DB6AA02000
heap
page read and write
1D91D7A9000
heap
page read and write
2284000
heap
page read and write
1D91CCE9000
heap
page read and write
60D000
heap
page read and write
20F6D055000
heap
page read and write
2303EA57000
heap
page read and write
925B9FD000
stack
page read and write
1485E802000
trusted library allocation
page read and write
1D91CB30000
heap
page read and write
29464FA000
stack
page read and write
1D91D782000
heap
page read and write
2BCF1680000
trusted library allocation
page read and write
1F44A289000
heap
page read and write
22A60C77000
heap
page read and write
1D91CC56000
heap
page read and write
22D93402000
trusted library allocation
page read and write
3F4047C000
stack
page read and write
40A000
unkown
page write copy
205B2522000
heap
page read and write
20F68002000
heap
page read and write
1485E044000
heap
page read and write
1D91DC02000
heap
page read and write
29466FA000
stack
page read and write
22DB6829000
heap
page read and write
1F44A276000
heap
page read and write
22DB6600000
heap
page read and write
20F6CF04000
trusted library allocation
page read and write
1F44A200000
heap
page read and write
20F67879000
heap
page read and write
1D91D78A000
heap
page read and write
8F2457D000
stack
page read and write
2394D500000
heap
page read and write
8F2477D000
stack
page read and write
2394C9D0000
heap
page read and write
29469FF000
stack
page read and write
20F67914000
heap
page read and write
2BCF16E0000
trusted library allocation
page read and write
2303EB02000
heap
page read and write
1D91DC02000
heap
page read and write
1D91D797000
heap
page read and write
570000
heap
page read and write
2394CA66000
heap
page read and write
732A6000
unkown
page readonly
20F67877000
heap
page read and write
435000
unkown
page read and write
19D4644C000
heap
page read and write
1D91D7A7000
heap
page read and write
19D462F0000
heap
page read and write
20F6CF00000
trusted library allocation
page read and write
19D46470000
heap
page read and write
3560000
trusted library allocation
page read and write
19D46413000
heap
page read and write
29468FF000
stack
page read and write
1D91DC02000
heap
page read and write
1F44A308000
heap
page read and write
610000
heap
page read and write
925B2FB000
stack
page read and write
1D91D772000
heap
page read and write
8F23BAB000
stack
page read and write
22D91700000
heap
page read and write
205B2511000
heap
page read and write
1DB6A9A0000
remote allocation
page read and write
1D91D72E000
heap
page read and write
1D91D782000
heap
page read and write
E3E0FFE000
stack
page read and write
EAF4AFC000
stack
page read and write
5345B7E000
stack
page read and write
1485E07F000
heap
page read and write
1D91D774000
heap
page read and write
408000
unkown
page readonly
3570000
trusted library allocation
page read and write
20F6CF90000
trusted library allocation
page read and write
1485E058000
heap
page read and write
EAF4DFF000
stack
page read and write
1EF82002000
trusted library allocation
page read and write
20F6CEC0000
trusted library allocation
page read and write
8F23FFC000
stack
page read and write
1D91D7DB000
heap
page read and write
278D000
trusted library allocation
page read and write
1D91D78E000
heap
page read and write
1485E062000
heap
page read and write
20F67829000
heap
page read and write
4E0000
trusted library allocation
page read and write
EA04A7E000
stack
page read and write
1D91D774000
heap
page read and write
4090BFF000
stack
page read and write
1D91D7BB000
heap
page read and write
1D91D7AB000
heap
page read and write
560000
heap
page read and write
1D91D7AE000
heap
page read and write
1EF81678000
heap
page read and write
EAF4B7E000
stack
page read and write
534536B000
stack
page read and write
20F67857000
heap
page read and write
1D91CCC1000
heap
page read and write
1F44AA02000
trusted library allocation
page read and write
22DB6870000
heap
page read and write
2303E960000
trusted library allocation
page read and write
1D91D794000
heap
page read and write
20F68118000
heap
page read and write
1D91D490000
remote allocation
page read and write
20F6D04A000
heap
page read and write
1D91DC02000
heap
page read and write
20F67813000
heap
page read and write
20F6D310000
trusted library allocation
page read and write
20F678FB000
heap
page read and write
1D91D75A000
heap
page read and write
2B785FE0000
remote allocation
page read and write
2BCF0910000
trusted library allocation
page read and write
20F6CEE0000
trusted library allocation
page read and write
1D91D778000
heap
page read and write
1DB6AA13000
heap
page read and write
22A60C4A000
heap
page read and write
2BCF0857000
heap
page read and write
1485E078000
heap
page read and write
2303EA13000
heap
page read and write
19D46459000
heap
page read and write
400000
unkown
page readonly
2B786000000
heap
page read and write
1D91D799000
heap
page read and write
2BCF07D0000
trusted library allocation
page read and write
205B2490000
heap
page read and write
80AB55A000
stack
page read and write
2BCF07B0000
trusted library allocation
page read and write
1D91D716000
heap
page read and write
1D91CC4E000
heap
page read and write
20F6CF90000
trusted library allocation
page read and write
1D91D79F000
heap
page read and write
2303EB00000
heap
page read and write
22DB6800000
heap
page read and write
20F6D108000
heap
page read and write
20F678AD000
heap
page read and write
1D91CC82000
heap
page read and write
B32D2FB000
stack
page read and write
2BCF1660000
trusted library allocation
page read and write
1DB6B402000
trusted library allocation
page read and write
1DB6AA70000
heap
page read and write
1D91DC02000
heap
page read and write
1DB6AA00000
heap
page read and write
D15EB7E000
stack
page read and write
19D46290000
heap
page read and write
1D91CCF7000
heap
page read and write
19D46280000
heap
page read and write
22A60C4F000
heap
page read and write
534597F000
stack
page read and write
20F6D0F2000
heap
page read and write
1485E05E000
heap
page read and write
4090DFE000
stack
page read and write
1D91D788000
heap
page read and write
1485E060000
heap
page read and write
20F67889000
heap
page read and write
20F6D02C000
heap
page read and write
22D91848000
heap
page read and write
19D46502000
heap
page read and write
1D91CCD1000
heap
page read and write
2394CA87000
heap
page read and write
22A60C3C000
heap
page read and write
1485E067000
heap
page read and write
20F67800000
heap
page read and write
1485E085000
heap
page read and write
205B2480000
heap
page read and write
1D91D7B8000
heap
page read and write
30000
heap
page read and write
1485E000000
heap
page read and write
1D91D721000
heap
page read and write
277F000
stack
page read and write
1DB6AA3F000
heap
page read and write
408000
unkown
page readonly
3F3FADB000
stack
page read and write
2BCF085E000
heap
page read and write
1D91CD16000
heap
page read and write
19D46452000
heap
page read and write
1485E065000
heap
page read and write
80AB87E000
stack
page read and write
2303EA02000
heap
page read and write
80AB5DF000
stack
page read and write
3D12B7B000
stack
page read and write
1EF81629000
heap
page read and write
20F6D020000
trusted library allocation
page read and write
2394CA29000
heap
page read and write
1D91CC50000
heap
page read and write
9738D5B000
stack
page read and write
1485E042000
heap
page read and write
2303EA00000
heap
page read and write
22D917F0000
remote allocation
page read and write
1D91D772000
heap
page read and write
205B2547000
heap
page read and write
427000
unkown
page read and write
22DB6853000
heap
page read and write
2303EA3E000
heap
page read and write
29467FE000
stack
page read and write
22D91847000
heap
page read and write
8F2447C000
stack
page read and write
1EF81672000
heap
page read and write
20F68000000
heap
page read and write
1485DDD0000
heap
page read and write
19D4644F000
heap
page read and write
20F68870000
trusted library allocation
page read and write
1D91D782000
heap
page read and write
22A60C4D000
heap
page read and write
8F243FC000
stack
page read and write
22D91913000
heap
page read and write
20F6CDB0000
trusted library allocation
page read and write
1DB6A9A0000
remote allocation
page read and write
1485DF40000
trusted library allocation
page read and write
1D91DC18000
heap
page read and write
205B2485000
heap
page read and write
2303EB13000
heap
page read and write
205B2527000
heap
page read and write
5EF000
heap
page read and write
20F678AD000
heap
page read and write
22D917C0000
trusted library allocation
page read and write
19D46C02000
trusted library allocation
page read and write
372E000
stack
page read and write
20F6CFD0000
trusted library allocation
page read and write
20F67902000
heap
page read and write
22A60D00000
heap
page read and write
1D91CC54000
heap
page read and write
2BCF07C0000
trusted library allocation
page read and write
E3E0A7F000
stack
page read and write
1F44A25E000
heap
page read and write
B32CE8C000
stack
page read and write
2394D270000
trusted library allocation
page read and write
1D91CC4C000
heap
page read and write
22D91858000
heap
page read and write
1DB6AA58000
heap
page read and write
2303EA68000
heap
page read and write
973907E000
stack
page read and write
1485E03A000
heap
page read and write
97394FE000
stack
page read and write
1D91D7A9000
heap
page read and write
1D91CC58000
heap
page read and write
1D91D7AE000
heap
page read and write
2BCF1670000
heap
page readonly
1F44A25C000
heap
page read and write
20F678A6000
heap
page read and write
3D1307A000
stack
page read and write
362D000
stack
page read and write
1D91D772000
heap
page read and write
D15DF7C000
stack
page read and write
80AB979000
stack
page read and write
1F44A22C000
heap
page read and write
1485E06C000
heap
page read and write
1485E032000
heap
page read and write
1D91CC51000
heap
page read and write
E3E0EFE000
stack
page read and write
2B785E50000
heap
page read and write
E3E0BFB000
stack
page read and write
1EF815A0000
heap
page read and write
B26000
heap
page read and write
401177E000
stack
page read and write
1485E057000
heap
page read and write
1D91D783000
heap
page read and write
22D91918000
heap
page read and write
1F44A23C000
heap
page read and write
22DB6849000
heap
page read and write
1D91D79C000
heap
page read and write
2B786057000
heap
page read and write
22A60AE0000
heap
page read and write
22D932B0000
trusted library allocation
page read and write
1D91CC3C000
heap
page read and write
22DB6770000
trusted library allocation
page read and write
1EF81530000
heap
page read and write
2394CACC000
heap
page read and write
20F6788E000
heap
page read and write
22A61602000
trusted library allocation
page read and write
205B2450000
heap
page read and write
1D91D7B9000
heap
page read and write
1D91D78E000
heap
page read and write
2303EA28000
heap
page read and write
1D91DC21000
heap
page read and write
EA049F9000
stack
page read and write
2BCF05D0000
heap
page read and write
1DB6A980000
trusted library allocation
page read and write
61D000
heap
page read and write
20F6D220000
remote allocation
page read and write
1485E07C000
heap
page read and write
227F000
stack
page read and write
1D91D776000
heap
page read and write
1485E05C000
heap
page read and write
1D91D79F000
heap
page read and write
D15EC7F000
stack
page read and write
20F68159000
heap
page read and write
400000
unkown
page readonly
1D91CCC7000
heap
page read and write
1D91CC4B000
heap
page read and write
1D91CAD0000
heap
page read and write
20F6D08F000
heap
page read and write
20F6D200000
trusted library allocation
page read and write
1485E041000
heap
page read and write
205B252E000
heap
page read and write
1D91CD13000
heap
page read and write
22A60C78000
heap
page read and write
19D46508000
heap
page read and write
D15E97F000
stack
page read and write
20F678AB000
heap
page read and write
22A60D02000
heap
page read and write
29461BF000
stack
page read and write
20F6783E000
heap
page read and write
1D91D7AA000
heap
page read and write
1D91D7BD000
heap
page read and write
2BCF1450000
trusted library allocation
page read and write
1D91D7A7000
heap
page read and write
1D91D756000
heap
page read and write
20F6D220000
remote allocation
page read and write
1D91D774000
heap
page read and write
2394CABB000
heap
page read and write
1DB6A950000
heap
page read and write
22D917F0000
remote allocation
page read and write
1F44A261000
heap
page read and write
D15E87F000
stack
page read and write
1EF81600000
heap
page read and write
1F44A28B000
heap
page read and write
22DB6813000
heap
page read and write
1F44A313000
heap
page read and write
1D91D7A0000
heap
page read and write
1EF81668000
heap
page read and write
1D91D783000
heap
page read and write
409087B000
stack
page read and write
19D46473000
heap
page read and write
1D91DC02000
heap
page read and write
1F44A300000
heap
page read and write
20F67902000
heap
page read and write
3F4037C000
stack
page read and write
1D91D796000
heap
page read and write
19D46455000
heap
page read and write
2303EA7B000
heap
page read and write
1D91CC29000
heap
page read and write
22A60D08000
heap
page read and write
2BCF0818000
heap
page read and write
B32CF0E000
stack
page read and write
1D91DC1A000
heap
page read and write
20F67720000
heap
page read and write
1F44A213000
heap
page read and write
1D91DC21000
heap
page read and write
609000
heap
page read and write
4011977000
stack
page read and write
20F68D10000
trusted library allocation
page read and write
1D91D7AA000
heap
page read and write
EAF49FE000
stack
page read and write
2BCF1690000
trusted library allocation
page read and write
1D91D7A3000
heap
page read and write
1F44A229000
heap
page read and write
20F67FC0000
trusted library allocation
page read and write
1D91D78E000
heap
page read and write
3D1387B000
stack
page read and write
1D91D774000
heap
page read and write
1D91D7A9000
heap
page read and write
20F676B0000
heap
page read and write
22CE000
stack
page read and write
20F6D0AC000
heap
page read and write
2BCF0810000
heap
page read and write
8F2487E000
stack
page read and write
20F6CEC8000
trusted library allocation
page read and write
22DB6908000
heap
page read and write
4090AFE000
stack
page read and write
1EF815D0000
trusted library allocation
page read and write
1D91D78B000
heap
page read and write
2394D532000
heap
page read and write
2330000
heap
page read and write
1D91D782000
heap
page read and write
4090CFE000
stack
page read and write
22D93270000
trusted library allocation
page read and write
1F44A080000
heap
page read and write
2394CB13000
heap
page read and write
1EF81702000
heap
page read and write
1D91CD02000
heap
page read and write
3F4067C000
stack
page read and write
80ABA7C000
stack
page read and write
E3E0CFB000
stack
page read and write
1D91D78C000
heap
page read and write
29460BC000
stack
page read and write
20F68015000
heap
page read and write
2BCF085E000
heap
page read and write
1D91D77E000
heap
page read and write
3D1347B000
stack
page read and write
20F6D09E000
heap
page read and write
2B786013000
heap
page read and write
1485E102000
heap
page read and write
5C0000
heap
page read and write
1D91CCD8000
heap
page read and write
EA04B7F000
stack
page read and write
1D91D7A0000
heap
page read and write
19D463F0000
trusted library allocation
page read and write
B32D47B000
stack
page read and write
1F44A252000
heap
page read and write
22DB684B000
heap
page read and write
22D91902000
heap
page read and write
205B2542000
heap
page read and write
1D91D798000
heap
page read and write
20F6D220000
remote allocation
page read and write
22DB684E000
heap
page read and write
1D91D780000
heap
page read and write
1D91D783000
heap
page read and write
20F68118000
heap
page read and write
20F6D01F000
heap
page read and write
20F68CF1000
trusted library allocation
page read and write
1D91D717000
heap
page read and write
20F6D0F7000
heap
page read and write
40A000
unkown
page read and write
20F67872000
heap
page read and write
3D1327F000
stack
page read and write
22D91889000
heap
page read and write
22D917F0000
remote allocation
page read and write
4011A7F000
stack
page read and write
22D91770000
heap
page read and write
2394CA13000
heap
page read and write
1D91D788000
heap
page read and write
205B2516000
heap
page read and write
1D91CAC0000
heap
page read and write
2BCF0770000
heap
page read and write
2394CB02000
heap
page read and write
1DB6A8F0000
heap
page read and write
1DB6AA55000
heap
page read and write
E3E0AFF000
stack
page read and write
1D91D783000
heap
page read and write
1EF81713000
heap
page read and write
2BCF085E000
heap
page read and write
1D91D7D1000
heap
page read and write
20F6D03D000
heap
page read and write
3F3FEFE000
stack
page read and write
3D13A7E000
stack
page read and write
B32CF8F000
stack
page read and write
474000
unkown
page readonly
22D9185F000
heap
page read and write
3D12F77000
stack
page read and write
2394C970000
heap
page read and write
20F6CD20000
trusted library allocation
page read and write
22D9183D000
heap
page read and write
294613F000
stack
page read and write
D15E77D000
stack
page read and write
1EF81662000
heap
page read and write
732A1000
unkown
page execute read
1485DE40000
heap
page read and write
1D91D787000
heap
page read and write
1EF8163D000
heap
page read and write
20F6CFE0000
trusted library allocation
page read and write
1D91D716000
heap
page read and write
9738DDE000
stack
page read and write
2394CA40000
heap
page read and write
22DB6856000
heap
page read and write
4011CF9000
stack
page read and write
EA04AF9000
stack
page read and write
22A60C13000
heap
page read and write
1D91CCFD000
heap
page read and write
1DB6AA5D000
heap
page read and write
1D91CC71000
heap
page read and write
205B2543000
heap
page read and write
1485E047000
heap
page read and write
99000
stack
page read and write
19D46500000
heap
page read and write
22A60B50000
heap
page read and write
19A000
stack
page read and write
1DB6AA29000
heap
page read and write
2394C960000
heap
page read and write
2B78603D000
heap
page read and write
EA0454B000
stack
page read and write
534587B000
stack
page read and write
22DB6913000
heap
page read and write
205B2320000
heap
page read and write
1D91D778000
heap
page read and write
1D91D796000
heap
page read and write
1D91CC00000
heap
page read and write
1EF81602000
heap
page read and write
97391FE000
stack
page read and write
1485E05F000
heap
page read and write
20F6CFB0000
trusted library allocation
page read and write
1D91D7DC000
heap
page read and write
1D91D721000
heap
page read and write
2394CA68000
heap
page read and write
4011BFF000
unkown
page read and write
973917C000
stack
page read and write
20F68104000
heap
page read and write
1D91DC00000
heap
page read and write
5C8000
heap
page read and write
20F6CF90000
trusted library allocation
page read and write
1F44A1E0000
trusted library allocation
page read and write
22D91900000
heap
page read and write
22D91813000
heap
page read and write
401135F000
stack
page read and write
1D91D700000
heap
page read and write
2BCF0710000
heap
page read and write
1485E07B000
heap
page read and write
1D91D782000
heap
page read and write
3D1337D000
stack
page read and write
1D91D721000
heap
page read and write
20F68D13000
trusted library allocation
page read and write
1F44A284000
heap
page read and write
732A4000
unkown
page readonly
1D91D783000
heap
page read and write
1F44A260000
heap
page read and write
5345A7B000
stack
page read and write
1D91D797000
heap
page read and write
205B252E000
heap
page read and write
401000
unkown
page execute read
22DB688E000
heap
page read and write
1D91D787000
heap
page read and write
80AB8F8000
stack
page read and write
1F44A27D000
heap
page read and write
1D91D779000
heap
page read and write
205B2500000
heap
page read and write
1F44A27C000
heap
page read and write
EAF487B000
stack
page read and write
2303F402000
trusted library allocation
page read and write
22A60C83000
heap
page read and write
565000
heap
page read and write
80AB9FF000
stack
page read and write
D15E37B000
stack
page read and write
1F44A070000
heap
page read and write
613000
heap
page read and write
1D91D783000
heap
page read and write
1D91CCA4000
heap
page read and write
3050000
trusted library allocation
page read and write
2B786002000
heap
page read and write
2B785FE0000
remote allocation
page read and write
22DB6851000
heap
page read and write
2B785FE0000
remote allocation
page read and write
1D91D7C5000
heap
page read and write
19D4643A000
heap
page read and write
22DB6902000
heap
page read and write
1EF81613000
heap
page read and write
1485E013000
heap
page read and write
B20000
heap
page read and write
1D91D780000
heap
page read and write
2B785FB0000
trusted library allocation
page read and write
1D91D774000
heap
page read and write
There are 712 hidden memdumps, click here to show them.