IOC Report
05#U7248.exe

loading gif

Files

File Path
Type
Category
Malicious
05#U7248.exe
PE32+ executable (GUI) x86-64, for MS Windows
initial sample
malicious
C:\Users\Public\Music\05#U7248.exe
PE32+ executable (GUI) x86-64, for MS Windows
dropped
malicious
C:\Users\Public\Music\05#U7248.exe:Zone.Identifier
ASCII text, with CRLF line terminators
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Office\16.0\WebServiceCache\AllUsers\officeclient.microsoft.com\40C9AF57-D49E-46F0-BAA8-A9E834DB8605
XML 1.0 document, UTF-8 Unicode text, with very long lines, with CRLF line terminators
dropped
C:\Users\user\AppData\Roaming\Microsoft\Office\Recent\05.LNK
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Archive, ctime=Tue May 24 17:18:00 2022, mtime=Tue May 24 17:18:03 2022, atime=Tue May 24 17:18:00 2022, length=1786211, window=hide
dropped
C:\Users\user\AppData\Roaming\Microsoft\Office\Recent\index.dat
ASCII text, with CRLF line terminators
modified
C:\Users\user\Desktop\05#U7248.pptx
Microsoft PowerPoint 2007+
modified

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\05#U7248.exe
"C:\Users\user\Desktop\05#U7248.exe"
malicious
C:\Users\Public\Music\05#U7248.exe
C:\Users\Public\Music\05#U7248.exe
malicious
C:\Windows\System32\cmd.exe
"C:\Windows\system32\cmd.exe" /c del C:\Users\user\Desktop\05#U7248.exe > nul
malicious
C:\Program Files (x86)\Microsoft Office\Office16\POWERPNT.EXE
C:\Program Files (x86)\Microsoft Office\Office16\POWERPNT.EXE" "C:\Users\user\Desktop\05#U7248.pptx" /ou "
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1

URLs

Name
IP
Malicious
http://service-ep07djah-1306669097.bj.apigw.tencentcs.com:443/bootstrap-2.min.js
malicious
https://api.diagnosticssdf.office.com
unknown
https://login.microsoftonline.com/
unknown
https://shell.suite.office.com:1443
unknown
https://login.windows.net/72f988bf-86f1-41af-91ab-2d7cd011db47/oauth2/authorize
unknown
http://rs.qbox.me/chtype/RGJhay9jaGRiOnFpbml1LnBuZw==/type/1
unknown
https://autodiscover-s.outlook.com/
unknown
https://roaming.edog.
unknown
https://insertmedia.bing.office.net/images/officeonlinecontent/browse?cp=Flickr
unknown
https://cdn.entity.
unknown
https://api.addins.omex.office.net/appinfo/query
unknown
https://clients.config.office.net/user/v1.0/tenantassociationkey
unknown
https://dev.virtualearth.net/REST/V1/GeospatialEndpoint/
unknown
https://powerlift.acompli.net
unknown
https://rpsticket.partnerservices.getmicrosoftkey.com
unknown
https://lookup.onenote.com/lookup/geolocation/v1
unknown
http://api.qiniu.com
unknown
https://cortana.ai
unknown
https://apc.learningtools.onenote.com/learningtoolsapi/v2.0/getfreeformspeech
unknown
http://rs.qbox.mehttp://rsf.qbox.mehttp://api.qiniu.comhttp://fusion.qiniuapi.comhttp://uc.qbox.meht
unknown
https://cloudfiles.onenote.com/upload.aspx
unknown
https://syncservice.protection.outlook.com/PolicySync/PolicySync.svc/SyncFile
unknown
https://entitlement.diagnosticssdf.office.com
unknown
https://na01.oscs.protection.outlook.com/api/SafeLinksApi/GetPolicy
unknown
https://api.aadrm.com/
unknown
http://rs.qbox.me/chtype/RGJhay9jaGRiOnFpbml1LnBuZw==/type/1da
unknown
https://curl.se/docs/hsts.html
unknown
https://ofcrecsvcapi-int.azurewebsites.net/
unknown
https://service-ep07djah-1306669097.bj.apigw.tencentcs.com/bootstrap-2.min.js
unknown
https://service-ep07djah-1306669097.bj.apigw.tencentcs.com/bootstrap-2.min.js0
unknown
https://dataservice.protection.outlook.com/PsorWebService/v1/ClientSyncFile/MipPolicies
unknown
https://api.microsoftstream.com/api/
unknown
https://insertmedia.bing.office.net/images/hosted?host=office&adlt=strict&hostType=Immersive
unknown
https://cr.office.com
unknown
https://augloop.office.com;https://augloop-int.officeppe.com;https://augloop-dogfood.officeppe.com;h
unknown
https://portal.office.com/account/?ref=ClientMeControl
unknown
https://graph.ppe.windows.net
unknown
https://res.getmicrosoftkey.com/api/redemptionevents
unknown
https://powerlift-frontdesk.acompli.net
unknown
https://tasks.office.com
unknown
https://officeci.azurewebsites.net/api/
unknown
https://sr.outlook.office.net/ws/speech/recognize/assistant/work
unknown
http://upload.qiniup.com
unknown
http://rs.qbox.me/chtype/RGJhay9jaGRiOnFpbml1LnBuZw==/type/1_PM
unknown
https://store.office.cn/addinstemplate
unknown
https://api.aadrm.com
unknown
https://outlook.office.com/autosuggest/api/v1/init?cvid=
unknown
https://globaldisco.crm.dynamics.com
unknown
https://messaging.engagement.office.com/
unknown
https://nam.learningtools.onenote.com/learningtoolsapi/v2.0/getfreeformspeech
unknown
https://dev0-api.acompli.net/autodetect
unknown
https://www.odwebp.svc.ms
unknown
https://api.diagnosticssdf.office.com/v2/feedback
unknown
https://api.powerbi.com/v1.0/myorg/groups
unknown
https://web.microsoftstream.com/video/
unknown
https://api.addins.store.officeppe.com/addinstemplate
unknown
https://curl.se/docs/alt-svc.html
unknown
https://service-ep07djah-1306669097.bj.apigw.tencentcs.com/bootstrap-2.min.js.com
unknown
https://graph.windows.net
unknown
https://dataservice.o365filtering.com/
unknown
https://officesetup.getmicrosoftkey.com
unknown
https://service-ep07djah-1306669097.bj.apigw.tencentcs.com/bootstrap-2.min.jsX
unknown
https://analysis.windows.net/powerbi/api
unknown
https://prod-global-autodetect.acompli.net/autodetect
unknown
https://outlook.office365.com/autodiscover/autodiscover.json
unknown
https://powerpoint.uservoice.com/forums/288952-powerpoint-for-ipad-iphone-ios
unknown
https://eur.learningtools.onenote.com/learningtoolsapi/v2.0/getfreeformspeech
unknown
https://pf.directory.live.com/profile/mine/System.ShortCircuitProfile.json
unknown
https://ncus.contentsync.
unknown
https://onedrive.live.com/about/download/?windows10SyncClientInstalled=false
unknown
https://webdir.online.lync.com/autodiscover/autodiscoverservice.svc/root/
unknown
http://weather.service.msn.com/data.aspx
unknown
https://apis.live.net/v5.0/
unknown
https://officemobile.uservoice.com/forums/929800-office-app-ios-and-ipad-asks
unknown
https://word.uservoice.com/forums/304948-word-for-ipad-iphone-ios
unknown
https://autodiscover-s.outlook.com/autodiscover/autodiscover.xml
unknown
https://management.azure.com
unknown
https://outlook.office365.com
unknown
https://wus2.contentsync.
unknown
https://incidents.diagnostics.office.com
unknown
https://clients.config.office.net/user/v1.0/ios
unknown
https://insertmedia.bing.office.net/odc/insertmedia
unknown
http://iovip.qbox.me
unknown
https://o365auditrealtimeingestion.manage.office.com
unknown
https://outlook.office365.com/api/v1.0/me/Activities
unknown
https://api.office.net
unknown
https://incidents.diagnosticssdf.office.com
unknown
http://fusion.qiniuapi.com
unknown
https://asgsmsproxyapi.azurewebsites.net/
unknown
https://clients.config.office.net/user/v1.0/android/policies
unknown
https://entitlement.diagnostics.office.com
unknown
https://service-ep07djah-1306669097.bj.apigw.tencentcs.com/xN
unknown
https://pf.directory.live.com/profile/mine/WLX.Profiles.IC.json
unknown
https://substrate.office.com/search/api/v2/init
unknown
https://outlook.office.com/
unknown
https://storage.live.com/clientlogs/uploadlocation
unknown
https://outlook.office365.com/
unknown
https://webshell.suite.office.com
unknown
https://insertmedia.bing.office.net/images/officeonlinecontent/browse?cp=OneDrive
unknown
https://substrate.office.com/search/api/v1/SearchHistory
unknown
There are 90 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
service-ep07djah-1306669097.bj.apigw.tencentcs.com
unknown
malicious
1-1.bj.apigwtencent.com
140.143.115.153
kodo-elb-z0.qbox.me
115.231.97.60
rs.qbox.me
unknown

IPs

IP
Domain
Country
Malicious
115.231.97.60
kodo-elb-z0.qbox.me
China
180.101.136.19
unknown
China
140.143.115.153
1-1.bj.apigwtencent.com
China
127.0.0.1
unknown
unknown

Registry

Path
Value
Malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00006109110000000000000000F01FEC\Usage
PPTFiles
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Shell Extensions\Cached
{993BE281-6695-4BA5-8A2A-7AACBFAAB69E} {0000013A-0000-0000-C000-000000000046} 0xFFFF
HKEY_CURRENT_USER_Classes\Local Settings\MuiCache\f0\52C64B7E
@C:\Program Files\Common Files\Microsoft Shared\Office16\oregres.dll,-204
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
LangID
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
C:\Program Files (x86)\Microsoft Office\Office16\POWERPNT.EXE.FriendlyAppName
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
C:\Program Files (x86)\Microsoft Office\Office16\POWERPNT.EXE.ApplicationCompany
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\PowerPoint\Resiliency\StartupItems
;t:
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\PowerPoint\Resiliency\StartupItems
<t:
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\PowerPoint\options
DesktopBootGuid
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\PowerPoint\Resiliency\DocumentRecovery\27EBC
27EBC
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\PowerPoint\options
AppMaximized
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\PowerPoint\options
Top
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\PowerPoint\options
Left
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\PowerPoint\options
Bottom
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\PowerPoint\options
Right
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\PowerPoint\Resiliency\StartupItems
x:
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\IOAV
LastBootTime
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\internet\WebServiceCache
RemoteClearDate
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\internet\WebServiceCache\AllUsers\officeclient.microsoft.com\config16--lcid=1033&syslcid=1033&uilcid=1033&build=16.0.4954&crev=3
Last
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\PowerPoint\Resiliency\DocumentRecovery\28312
28312
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\PowerPoint\Place MRU\Change
ChangeId
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\PowerPoint\file mru\Change
ChangeId
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\internet\WebServiceCache\AllUsers\officeclient.microsoft.com\config16--lcid=1033&syslcid=1033&uilcid=1033&build=16.0.4954&crev=3\0
FilePath
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\internet\WebServiceCache\AllUsers\officeclient.microsoft.com\config16--lcid=1033&syslcid=1033&uilcid=1033&build=16.0.4954&crev=3\0
StartDate
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\internet\WebServiceCache\AllUsers\officeclient.microsoft.com\config16--lcid=1033&syslcid=1033&uilcid=1033&build=16.0.4954&crev=3\0
EndDate
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\internet\WebServiceCache\AllUsers\officeclient.microsoft.com\config16--lcid=1033&syslcid=1033&uilcid=1033&build=16.0.4954&crev=3\0
Properties
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\internet\WebServiceCache\AllUsers\officeclient.microsoft.com\config16--lcid=1033&syslcid=1033&uilcid=1033&build=16.0.4954&crev=3\0
Url
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\internet\WebServiceCache
LastClean
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\Identity
DisableWinHttpCertAuth
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\Identity
DisableIsOwnerRegex
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\Identity
DisableSessionAwareHttpClose
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\Identity
DisableADALForExtendedApps
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\Identity
DisableADALSetSilentAuth
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\Identity
msoridDisableGuestCredProvider
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\Identity
msoridDisableOstringReplace
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\PowerPoint\Place MRU
Item 1
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\PowerPoint\file mru
Item 21
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00006109110000000000000000F01FEC\Usage
ProductFiles
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\LanguageResources\EnabledEditingLanguages
en-US
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\LanguageResources\EnabledEditingLanguages
en-US
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00006109110000000000000000F01FEC\Usage
PPTFiles
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\PowerPoint\Resiliency\DocumentRecovery\27EBC
27EBC
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\Roaming
RoamingConfigurableSettings
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\Roaming
RoamingLastSyncTime
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\Roaming
RoamingLastWriteTime
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\PowerPoint\Resiliency\DocumentRecovery\28312
28312
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\ServicesManagerCache\ServicesCatalog
CacheReady
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\ServicesManagerCache\ServicesCatalog
LastRequest
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\ServicesManagerCache\ServicesCatalog
CacheReady
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\ServicesManagerCache\ServicesCatalog
LastUpdate
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\ServicesManagerCache\ServicesCatalog
NextUpdate
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\PowerPoint\Place MRU\Change
ChangeId
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\PowerPoint\file mru
Item 1
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\PowerPoint\file mru
Item 2
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\PowerPoint\file mru
Item 3
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\PowerPoint\file mru
Item 4
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\PowerPoint\file mru
Item 5
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\PowerPoint\file mru
Item 6
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\PowerPoint\file mru
Item 7
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\PowerPoint\file mru
Item 8
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\PowerPoint\file mru
Item 9
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\PowerPoint\file mru
Item 10
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\PowerPoint\file mru
Item 11
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\PowerPoint\file mru
Item 12
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\PowerPoint\file mru
Item 13
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\PowerPoint\file mru
Item 14
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\PowerPoint\file mru
Item 15
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\PowerPoint\file mru
Item 16
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\PowerPoint\file mru
Item 17
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\PowerPoint\file mru
Item 18
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\PowerPoint\file mru
Item 19
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\PowerPoint\file mru
Item 20
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\PowerPoint\file mru\Change
ChangeId
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\IOAV
LastBootTime
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00006109110000000000000000F01FEC\Usage
ProductFiles
There are 65 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
2BB3F020000
direct allocation
page execute and read and write
malicious
2BB3EE32000
heap
page read and write
malicious
2BB3EE33000
heap
page read and write
malicious
CE7937F000
stack
page read and write
21925C80000
trusted library allocation
page read and write
200FBB40000
heap
page read and write
2A947420000
heap
page read and write
228CACD0000
heap
page read and write
2A946713000
heap
page read and write
200FB9D0000
heap
page read and write
2584D05F000
heap
page read and write
21F5EFE000
stack
page read and write
27013C41000
heap
page read and write
B58A6FD000
stack
page read and write
7FF7E2641000
unkown
page readonly
1B8EEDC0000
heap
page read and write
4FA197D000
stack
page read and write
CE790FB000
stack
page read and write
1A69272B000
heap
page read and write
7FF7E23C0000
unkown
page readonly
1F8D4F02000
heap
page read and write
2A9466AF000
heap
page read and write
21925700000
heap
page read and write
2A947402000
heap
page read and write
200FBB65000
heap
page read and write
1CDB4E02000
heap
page read and write
200FBB73000
heap
page read and write
1CDB9C40000
trusted library allocation
page read and write
2A946F77000
heap
page read and write
1A692795000
heap
page read and write
1CDB5501000
trusted library allocation
page read and write
228CAD70000
trusted library allocation
page read and write
2A946F7D000
heap
page read and write
21F65FE000
stack
page read and write
2A946F96000
heap
page read and write
2A946F93000
heap
page read and write
2A946F66000
heap
page read and write
1F8D4E5C000
heap
page read and write
25F4865A000
heap
page read and write
1A69271D000
heap
page read and write
2A946F93000
heap
page read and write
200FBB73000
heap
page read and write
2A946F93000
heap
page read and write
228CAE4F000
heap
page read and write
C63737D000
stack
page read and write
25F48660000
heap
page read and write
1A69274B000
heap
page read and write
7FF778371000
unkown
page execute read
27013C26000
heap
page read and write
2A946636000
heap
page read and write
2584D100000
heap
page read and write
7FF7785E8000
unkown
page read and write
2584D090000
heap
page read and write
2A9464C0000
heap
page read and write
2BB3EE36000
heap
page read and write
1A6927D0000
heap
page read and write
27013C59000
heap
page read and write
2A946F69000
heap
page read and write
7FF7785E8000
unkown
page write copy
1A692789000
heap
page read and write
7FF7E2641000
unkown
page readonly
20A62689000
heap
page read and write
1F8D4E40000
heap
page read and write
1CDB463F000
heap
page read and write
1A6926F7000
heap
page read and write
2584D089000
heap
page read and write
2A946FA4000
heap
page read and write
7FF7E23C1000
unkown
page execute read
2A946F7D000
heap
page read and write
970D98E000
stack
page read and write
2BB3EFD0000
heap
page read and write
2A9466C2000
heap
page read and write
1A692772000
heap
page read and write
2A946F93000
heap
page read and write
1A69277C000
heap
page read and write
20A62560000
trusted library allocation
page read and write
25F48E02000
trusted library allocation
page read and write
21F62FF000
stack
page read and write
3BAD3FB000
stack
page read and write
3BADBFE000
stack
page read and write
1A692784000
heap
page read and write
1F8D4E13000
heap
page read and write
2A946F00000
heap
page read and write
2A946F8A000
heap
page read and write
2A946670000
heap
page read and write
C2179FE000
stack
page read and write
2A94663C000
heap
page read and write
1F8D4CA0000
heap
page read and write
1CDB4600000
heap
page read and write
1A692764000
heap
page read and write
27013C7C000
heap
page read and write
2A9466EC000
heap
page read and write
20A62713000
heap
page read and write
27013C67000
heap
page read and write
21925713000
heap
page read and write
A3CECFB000
stack
page read and write
200FBB87000
heap
page read and write
1A692758000
heap
page read and write
A3CEF7E000
stack
page read and write
1A692733000
heap
page read and write
2A946654000
heap
page read and write
27013C7E000
heap
page read and write
A3CEAFE000
stack
page read and write
1A692732000
heap
page read and write
3BAD87E000
stack
page read and write
CE791F7000
stack
page read and write
2192564B000
heap
page read and write
2A9466EB000
heap
page read and write
2A946F77000
heap
page read and write
9020EF9000
stack
page read and write
970DDFE000
stack
page read and write
27013C75000
heap
page read and write
7FF7E2598000
unkown
page readonly
73D9CFF000
stack
page read and write
1A69270E000
heap
page read and write
4516EDB000
stack
page read and write
228CAF00000
heap
page read and write
2A946FA4000
heap
page read and write
A3CEBFC000
stack
page read and write
9020B9E000
stack
page read and write
27013C70000
heap
page read and write
2A946F72000
heap
page read and write
2A946F93000
heap
page read and write
1B8EEE13000
heap
page read and write
27014402000
trusted library allocation
page read and write
4FA177D000
stack
page read and write
228CAE29000
heap
page read and write
2A946F96000
heap
page read and write
2BB3EE56000
heap
page read and write
2A946F77000
heap
page read and write
B58A2FE000
stack
page read and write
1A69275A000
heap
page read and write
4FA14FC000
stack
page read and write
2A946F66000
heap
page read and write
1A692570000
heap
page read and write
27013C4E000
heap
page read and write
228CAE58000
heap
page read and write
B188CFD000
stack
page read and write
21F61FE000
stack
page read and write
228CAE53000
heap
page read and write
73D9AFB000
stack
page read and write
2BB3F0B0000
remote allocation
page read and write
1B8EEE00000
heap
page read and write
2A947402000
heap
page read and write
2584CF60000
heap
page read and write
1CDB4678000
heap
page read and write
27013C51000
heap
page read and write
3BACFF7000
stack
page read and write
1CDB5740000
trusted library section
page readonly
2A946FB5000
heap
page read and write
27013C6E000
heap
page read and write
2A946F81000
heap
page read and write
7FF7E2598000
unkown
page readonly
228CAE86000
heap
page read and write
200FBB64000
heap
page read and write
1CDB4726000
heap
page read and write
1CDB4658000
heap
page read and write
200FBB89000
heap
page read and write
27013C6A000
heap
page read and write
2A946F93000
heap
page read and write
7FF778548000
unkown
page readonly
1A69275F000
heap
page read and write
1B8EEF13000
heap
page read and write
2A946F7D000
heap
page read and write
2192568B000
heap
page read and write
2A946D40000
remote allocation
page read and write
C63797E000
unkown
page read and write
2A946F93000
heap
page read and write
2A9466C9000
heap
page read and write
45174FF000
stack
page read and write
1CDB9B00000
trusted library allocation
page read and write
3BAD9F9000
stack
page read and write
2A946C80000
trusted library allocation
page read and write
228CAE49000
heap
page read and write
200FBB7E000
heap
page read and write
27013C42000
heap
page read and write
3BAD47E000
stack
page read and write
1CDB9C50000
trusted library allocation
page read and write
B18867B000
stack
page read and write
27013C40000
heap
page read and write
2BB3EEA8000
heap
page read and write
1CDB9D30000
trusted library allocation
page read and write
3BAD6FC000
stack
page read and write
1CDB9C60000
trusted library allocation
page read and write
7FF7E23C1000
unkown
page execute read
1A69276D000
heap
page read and write
2A946FA4000
heap
page read and write
228CAE48000
heap
page read and write
1A69273B000
heap
page read and write
2A946F93000
heap
page read and write
1CDB469D000
heap
page read and write
1CDB4713000
heap
page read and write
1CDB4F02000
heap
page read and write
2A946FB7000
heap
page read and write
2A946F72000
heap
page read and write
219254B0000
heap
page read and write
9020A9A000
stack
page read and write
1CDB5720000
trusted library section
page readonly
2584D102000
heap
page read and write
2BB3EE53000
heap
page read and write
2BB3EE53000
heap
page read and write
C217DFF000
stack
page read and write
2A946FA1000
heap
page read and write
2BB3EFF0000
heap
page read and write
20A62E02000
heap
page read and write
970D90B000
stack
page read and write
2BB3EE00000
heap
page read and write
1A692725000
heap
page read and write
2A946F72000
heap
page read and write
2A946FC5000
heap
page read and write
2A946F96000
heap
page read and write
27013C65000
heap
page read and write
1CDB9D80000
remote allocation
page read and write
25F48670000
heap
page read and write
C217CFE000
stack
page read and write
228CAD40000
heap
page read and write
2A9466E5000
heap
page read and write
1F8D5490000
remote allocation
page read and write
2A9466B6000
heap
page read and write
1A692890000
heap
page read and write
228CAE52000
heap
page read and write
1A692725000
heap
page read and write
2584D08B000
heap
page read and write
2A946F93000
heap
page read and write
B188A7F000
stack
page read and write
21F60FF000
stack
page read and write
2A946FB5000
heap
page read and write
2A946FA4000
heap
page read and write
7FF7E2638000
unkown
page write copy
1B8EEF00000
heap
page read and write
2A946F72000
heap
page read and write
1CDB4F59000
heap
page read and write
2A946F16000
heap
page read and write
2A946655000
heap
page read and write
1CDB4D30000
trusted library section
page read and write
1A694385000
heap
page read and write
2A946F93000
heap
page read and write
C6377FF000
stack
page read and write
2A946F93000
heap
page read and write
2192563C000
heap
page read and write
C2176FE000
stack
page read and write
2A946F7D000
heap
page read and write
C637B7A000
stack
page read and write
2A946F93000
heap
page read and write
2A946F93000
heap
page read and write
1CDB4F59000
heap
page read and write
2A946F93000
heap
page read and write
1CDB9E9F000
heap
page read and write
2BB3EEA7000
heap
page read and write
2BB3ED80000
heap
page read and write
1CDB9E5F000
heap
page read and write
2A946F96000
heap
page read and write
2A946F8A000
heap
page read and write
4FA15FD000
stack
page read and write
2A94665D000
heap
page read and write
1CDB56F0000
trusted library section
page readonly
9020E79000
stack
page read and write
C6374FE000
stack
page read and write
27013C64000
heap
page read and write
1CDB4F13000
heap
page read and write
3BAD1FD000
stack
page read and write
1CDB9C2E000
trusted library allocation
page read and write
2A946FA5000
heap
page read and write
27013C63000
heap
page read and write
200FBB7E000
heap
page read and write
25F48686000
heap
page read and write
21F5B3B000
stack
page read and write
3BAD8FE000
stack
page read and write
1CDB46AE000
heap
page read and write
21925E02000
trusted library allocation
page read and write
A3CE79C000
stack
page read and write
27013C68000
heap
page read and write
CE78FFC000
stack
page read and write
2BB3EE76000
heap
page read and write
1CDB9C28000
trusted library allocation
page read and write
20A626BC000
heap
page read and write
2A94664E000
heap
page read and write
73D9BF7000
stack
page read and write
228CAE55000
heap
page read and write
21925520000
heap
page read and write
228CAE3C000
heap
page read and write
228CAE8B000
heap
page read and write
1CDB9EF5000
heap
page read and write
1A692782000
heap
page read and write
45173FB000
stack
page read and write
1A692720000
heap
page read and write
1A692779000
heap
page read and write
4FA147F000
stack
page read and write
2A946F61000
heap
page read and write
2A946F63000
heap
page read and write
1CDB9E3A000
heap
page read and write
B1887FE000
stack
page read and write
2A947403000
heap
page read and write
1CDB9B10000
trusted library allocation
page read and write
1B8EED60000
heap
page read and write
1A692705000
heap
page read and write
2584CFF0000
trusted library allocation
page read and write
1A69274B000
heap
page read and write
B58ABFF000
stack
page read and write
A3CED7F000
stack
page read and write
228CAE00000
heap
page read and write
228CAE70000
heap
page read and write
1A692788000
heap
page read and write
1A692777000
heap
page read and write
2BB3EE35000
heap
page read and write
B188DFD000
stack
page read and write
200FBB86000
heap
page read and write
2A946F73000
heap
page read and write
C6376F7000
stack
page read and write
1A69272B000
heap
page read and write
1A692764000
heap
page read and write
1A692780000
heap
page read and write
27013C58000
heap
page read and write
2A946F96000
heap
page read and write
7FF778371000
unkown
page execute read
1A69270E000
heap
page read and write
C6375F8000
stack
page read and write
B188BFF000
stack
page read and write
2A946F7D000
heap
page read and write
1F8D4D00000
heap
page read and write
2A946FB5000
heap
page read and write
1B8EED50000
heap
page read and write
2A946F67000
heap
page read and write
CE7947D000
stack
page read and write
27013C46000
heap
page read and write
27013C5D000
heap
page read and write
1CDB4F18000
heap
page read and write
2584CF50000
heap
page read and write
4FA137F000
stack
page read and write
1CDB4673000
heap
page read and write
1A69271D000
heap
page read and write
1CDB5710000
trusted library section
page readonly
B58A8FF000
stack
page read and write
2A946600000
heap
page read and write
1A69270E000
heap
page read and write
228CAF02000
heap
page read and write
200FBB72000
heap
page read and write
2A947400000
heap
page read and write
2584D063000
heap
page read and write
1CDB9EF2000
heap
page read and write
73D99FB000
stack
page read and write
20A626C5000
heap
page read and write
21F69FF000
stack
page read and write
228CAE4D000
heap
page read and write
2A946FA4000
heap
page read and write
2A946F78000
heap
page read and write
2A946F72000
heap
page read and write
2192564E000
heap
page read and write
200FBB51000
heap
page read and write
21F67FB000
stack
page read and write
7FF7E2638000
unkown
page read and write
200FBB4D000
heap
page read and write
2A946F77000
heap
page read and write
1A692741000
heap
page read and write
1CDB9EE6000
heap
page read and write
B58A7FE000
stack
page read and write
228CAE4B000
heap
page read and write
1B8EEDF0000
trusted library allocation
page read and write
2A946F7E000
heap
page read and write
1B8EEE28000
heap
page read and write
1A692740000
heap
page read and write
2A946F75000
heap
page read and write
2A946F72000
heap
page read and write
C63747B000
stack
page read and write
1A692787000
heap
page read and write
B58A4FF000
stack
page read and write
25F48713000
heap
page read and write
3BAD77E000
stack
page read and write
2192564F000
heap
page read and write
27013C00000
heap
page read and write
25F48600000
heap
page read and write
4FA167B000
stack
page read and write
1A692786000
heap
page read and write
1CDB9D40000
trusted library allocation
page read and write
2A946F93000
heap
page read and write
3BACBAC000
stack
page read and write
27013C7F000
heap
page read and write
1A692748000
heap
page read and write
25F48613000
heap
page read and write
B1888FE000
stack
page read and write
21925600000
heap
page read and write
2192564C000
heap
page read and write
2A946D40000
remote allocation
page read and write
228CAE13000
heap
page read and write
CE792FE000
stack
page read and write
1CDB9E52000
heap
page read and write
2584D05C000
heap
page read and write
2A946F67000
heap
page read and write
C6378F7000
stack
page read and write
2A946F70000
heap
page read and write
1F8D4E36000
heap
page read and write
1CDB5610000
trusted library allocation
page read and write
9020B1E000
stack
page read and write
1CDB9F00000
heap
page read and write
1A692764000
heap
page read and write
2A946F6D000
heap
page read and write
20A62613000
heap
page read and write
2A946F62000
heap
page read and write
2BB3EE88000
heap
page read and write
B18897E000
stack
page read and write
20A62460000
heap
page read and write
1CDB9C41000
trusted library allocation
page read and write
1B8EEE66000
heap
page read and write
2A946708000
heap
page read and write
B589D6C000
stack
page read and write
2A946F7B000
heap
page read and write
228CAE66000
heap
page read and write
2A946F5F000
heap
page read and write
CE78EFE000
stack
page read and write
2584D05B000
heap
page read and write
1CDB9E00000
heap
page read and write
2584D03C000
heap
page read and write
2A946F5F000
heap
page read and write
2A946FA5000
heap
page read and write
4FA187E000
stack
page read and write
1A6926D0000
heap
page read and write
200FBB7E000
heap
page read and write
2A946F82000
heap
page read and write
2A947402000
heap
page read and write
1A69277C000
heap
page read and write
2A946F21000
heap
page read and write
2A946F82000
heap
page read and write
27013C85000
heap
page read and write
2A946702000
heap
page read and write
2A9466E9000
heap
page read and write
2A946650000
heap
page read and write
9020F7E000
stack
page read and write
2A946FA5000
heap
page read and write
2A94664C000
heap
page read and write
C2178FF000
stack
page read and write
2BB3EE45000
heap
page read and write
2A946F7B000
heap
page read and write
7FF778370000
unkown
page readonly
21925702000
heap
page read and write
200FBD10000
heap
page read and write
1A6927A5000
heap
page read and write
2BB3F0B0000
remote allocation
page read and write
7FF7785EF000
unkown
page read and write
21925708000
heap
page read and write
2584D059000
heap
page read and write
2A946FA4000
heap
page read and write
1A692704000
heap
page read and write
73D95FB000
stack
page read and write
1A692895000
heap
page read and write
1B8EF602000
trusted library allocation
page read and write
2A946FA5000
heap
page read and write
25F483E0000
heap
page read and write
2A946F96000
heap
page read and write
1CDB4613000
heap
page read and write
2584D057000
heap
page read and write
1A694550000
heap
page read and write
2A946FB5000
heap
page read and write
1A69274B000
heap
page read and write
2A946F96000
heap
page read and write
B58AAFF000
stack
page read and write
3BAD2FF000
stack
page read and write
228CAF08000
heap
page read and write
73D98FE000
stack
page read and write
1CDB4550000
heap
page read and write
1A692788000
heap
page read and write
2A946F77000
heap
page read and write
2A946F7C000
heap
page read and write
3BAD0FA000
stack
page read and write
2A946F7D000
heap
page read and write
1A692786000
heap
page read and write
1CDB9E47000
heap
page read and write
1CDB9C64000
trusted library allocation
page read and write
7FF778548000
unkown
page readonly
3BAD4FE000
stack
page read and write
1A692759000
heap
page read and write
27013C5A000
heap
page read and write
1F8D5460000
trusted library allocation
page read and write
1F8D4E00000
heap
page read and write
20A626CB000
heap
page read and write
1CDB9C20000
trusted library allocation
page read and write
1B8EEE53000
heap
page read and write
2BB3EE53000
heap
page read and write
1CDB5520000
trusted library allocation
page read and write
228CAE50000
heap
page read and write
2A946F7E000
heap
page read and write
1A694540000
heap
page read and write
25F48688000
heap
page read and write
200FBD15000
heap
page read and write
1CDB468B000
heap
page read and write
20A62702000
heap
page read and write
20A6262A000
heap
page read and write
27013A70000
heap
page read and write
2BB3EE76000
heap
page read and write
A3CEE77000
stack
page read and write
1F8D5602000
trusted library allocation
page read and write
2BB3F0B0000
remote allocation
page read and write
1CDB4560000
heap
page read and write
1A6926D8000
heap
page read and write
B58A3FC000
stack
page read and write
2A947402000
heap
page read and write
27013C56000
heap
page read and write
1F8D4E21000
heap
page read and write
200FBB20000
heap
page read and write
228CAE66000
heap
page read and write
2BB3EE08000
heap
page read and write
A3CF07D000
stack
page read and write
2A947402000
heap
page read and write
27013C29000
heap
page read and write
2A946F62000
heap
page read and write
219254C0000
heap
page read and write
1CDB4DF0000
trusted library allocation
page read and write
21F68FE000
stack
page read and write
B188B7D000
stack
page read and write
2A946627000
heap
page read and write
2A946F93000
heap
page read and write
C637A78000
stack
page read and write
1B8EEE64000
heap
page read and write
7FF778370000
unkown
page readonly
73D987E000
stack
page read and write
2A946E02000
heap
page read and write
2A94665C000
heap
page read and write
200FBB7E000
heap
page read and write
200FBB66000
heap
page read and write
2A946FB5000
heap
page read and write
7FF7785F1000
unkown
page readonly
2BB3EE27000
heap
page read and write
970DFFF000
stack
page read and write
1F8D5490000
remote allocation
page read and write
2192566F000
heap
page read and write
27013B70000
trusted library allocation
page read and write
C63727B000
stack
page read and write
27013C60000
heap
page read and write
2A946F62000
heap
page read and write
228CAE7C000
heap
page read and write
21F66FE000
stack
page read and write
1CDB9D80000
trusted library allocation
page read and write
1CDB9F02000
heap
page read and write
2A946F67000
heap
page read and write
2A946657000
heap
page read and write
1CDB469F000
heap
page read and write
CE78BBB000
stack
page read and write
1F8D4C90000
heap
page read and write
2A946629000
heap
page read and write
27013C13000
heap
page read and write
1F8D4E2A000
heap
page read and write
1A692764000
heap
page read and write
1CDB4E00000
heap
page read and write
A3CEA7E000
stack
page read and write
25F4863D000
heap
page read and write
1CDB9D70000
trusted library allocation
page read and write
45175FF000
stack
page read and write
27013C62000
heap
page read and write
C217FFD000
stack
page read and write
1CDB4F18000
heap
page read and write
1A6926B0000
heap
page read and write
2A946F67000
heap
page read and write
2584D000000
heap
page read and write
2A946F77000
heap
page read and write
1CDB9C20000
trusted library allocation
page read and write
1CDB9ED5000
heap
page read and write
2584D02C000
heap
page read and write
2A946FA1000
heap
page read and write
1CDB4F00000
heap
page read and write
21925690000
heap
page read and write
2A946F66000
heap
page read and write
2A947402000
heap
page read and write
73D9DFF000
stack
page read and write
1CDB4676000
heap
page read and write
2584D108000
heap
page read and write
1A692764000
heap
page read and write
2A946F93000
heap
page read and write
1CDB4DF3000
trusted library allocation
page read and write
2A946F96000
heap
page read and write
2584D061000
heap
page read and write
27013C48000
heap
page read and write
2584D013000
heap
page read and write
1A692720000
heap
page read and write
1CDB5A90000
trusted library allocation
page read and write
1B8EEE3C000
heap
page read and write
1A692748000
heap
page read and write
2192564A000
heap
page read and write
2A9466AB000
heap
page read and write
2A946F18000
heap
page read and write
1CDB45C0000
heap
page read and write
2A946FB5000
heap
page read and write
2584D05A000
heap
page read and write
2A946FA4000
heap
page read and write
27013C5C000
heap
page read and write
1B8EEF02000
heap
page read and write
3BAD5FF000
stack
page read and write
2A9466FA000
heap
page read and write
2A946F5E000
heap
page read and write
21925651000
heap
page read and write
1CDB4702000
heap
page read and write
200FBB8A000
heap
page read and write
2A946659000
heap
page read and write
2BB3EE3E000
heap
page read and write
2A946F5F000
heap
page read and write
1CDB9EF8000
heap
page read and write
1A69277F000
heap
page read and write
25F483F0000
heap
page read and write
1CDB9C50000
trusted library allocation
page read and write
2A94667F000
heap
page read and write
2A946F72000
heap
page read and write
2A946F85000
heap
page read and write
1CDB9EEC000
heap
page read and write
1F8D5490000
remote allocation
page read and write
1A692720000
heap
page read and write
228CB602000
trusted library allocation
page read and write
2A946F50000
heap
page read and write
2A946F93000
heap
page read and write
2584D020000
heap
page read and write
C6372FE000
stack
page read and write
2584D029000
heap
page read and write
27013C3C000
heap
page read and write
228CACE0000
heap
page read and write
970DC7E000
stack
page read and write
2BB3EE3E000
heap
page read and write
25F48450000
heap
page read and write
1CDB9D50000
trusted library allocation
page read and write
CE78E7E000
stack
page read and write
2A946716000
heap
page read and write
200FBB56000
heap
page read and write
20A623F0000
heap
page read and write
25F48629000
heap
page read and write
7FF7785F1000
unkown
page readonly
228CAE4C000
heap
page read and write
200FBB00000
heap
page read and write
4FA1A7F000
stack
page read and write
2A94664D000
heap
page read and write
B58A17A000
stack
page read and write
1CDB9A90000
trusted library allocation
page read and write
27013C5E000
heap
page read and write
2584CFC0000
heap
page read and write
27013A10000
heap
page read and write
2A946FBA000
heap
page read and write
2192562C000
heap
page read and write
1F8D4E02000
heap
page read and write
1CDB4629000
heap
page read and write
27013D02000
heap
page read and write
1CDB9EFB000
heap
page read and write
B58A5FD000
stack
page read and write
21F63FE000
stack
page read and write
7FF7E23C0000
unkown
page readonly
1A692789000
heap
page read and write
25F48550000
trusted library allocation
page read and write
2A946F67000
heap
page read and write
2A946F72000
heap
page read and write
27013C57000
heap
page read and write
2BB3F105000
heap
page read and write
970DEFE000
stack
page read and write
1CDB9D60000
trusted library allocation
page read and write
2A947403000
heap
page read and write
20A62600000
heap
page read and write
1CDB9E1B000
heap
page read and write
1CDB466E000
heap
page read and write
21925613000
heap
page read and write
200FBB7E000
heap
page read and write
1CDB4E15000
heap
page read and write
20A62645000
heap
page read and write
2A946FB4000
heap
page read and write
2A946F77000
heap
page read and write
1CDB9D80000
remote allocation
page read and write
2A946613000
heap
page read and write
200FBB4B000
heap
page read and write
20A6266D000
heap
page read and write
1A692774000
heap
page read and write
2A946F5F000
heap
page read and write
1A692716000
heap
page read and write
4FA0DBB000
stack
page read and write
2584D802000
trusted library allocation
page read and write
25F48667000
heap
page read and write
2A947402000
heap
page read and write
1CDB9E29000
heap
page read and write
2BB3EE45000
heap
page read and write
2A946520000
heap
page read and write
1CDB5700000
trusted library section
page readonly
200FBB56000
heap
page read and write
1B8EEE7B000
heap
page read and write
21925629000
heap
page read and write
2A947402000
heap
page read and write
4FA11FB000
stack
page read and write
2584D038000
heap
page read and write
C217EFD000
stack
page read and write
2A946FB4000
heap
page read and write
2584D05D000
heap
page read and write
2BB3EE53000
heap
page read and write
228CAE59000
heap
page read and write
27013C61000
heap
page read and write
228CAF13000
heap
page read and write
2A9466D5000
heap
page read and write
2A9464B0000
heap
page read and write
A3CF17F000
stack
page read and write
2A946D40000
remote allocation
page read and write
1CDB9D80000
remote allocation
page read and write
2A946FA4000
heap
page read and write
2A946FBA000
heap
page read and write
2A946FC4000
heap
page read and write
1A692770000
heap
page read and write
20A62F00000
heap
page read and write
1CDB4692000
heap
page read and write
1CDB9E12000
heap
page read and write
1CDB45F0000
trusted library allocation
page read and write
1A69275A000
heap
page read and write
21F5FFE000
stack
page read and write
C2173AB000
stack
page read and write
2BB3EEA7000
heap
page read and write
9020FFC000
stack
page read and write
27013C31000
heap
page read and write
27013C76000
heap
page read and write
20A626CD000
heap
page read and write
2A946F7D000
heap
page read and write
2A946FB4000
heap
page read and write
1A6927A6000
heap
page read and write
1CDB46FC000
heap
page read and write
2A946F69000
heap
page read and write
2584D07F000
heap
page read and write
1A692703000
heap
page read and write
20A62400000
heap
page read and write
200FBB62000
heap
page read and write
45172FF000
stack
page read and write
3BAD57E000
stack
page read and write
1A69271D000
heap
page read and write
25F48626000
heap
page read and write
7FF7E263F000
unkown
page read and write
1CDB9E86000
heap
page read and write
1B8EEE02000
heap
page read and write
1A69278A000
heap
page read and write
25F48602000
heap
page read and write
2A947419000
heap
page read and write
2BB3F100000
heap
page read and write
2A946F6C000
heap
page read and write
27013A00000
heap
page read and write
C217BF9000
stack
page read and write
21925649000
heap
page read and write
2A946F7A000
heap
page read and write
2A946F67000
heap
page read and write
27013C55000
heap
page read and write
B58A9FF000
stack
page read and write
2A9466D8000
heap
page read and write
1A69276F000
heap
page read and write
2A946FB6000
heap
page read and write
2A94665B000
heap
page read and write
2A9466A4000
heap
page read and write
1A69273C000
heap
page read and write
1CDB9CF0000
trusted library allocation
page read and write
2BB3EE88000
heap
page read and write
1CDB9C44000
trusted library allocation
page read and write
25F48702000
heap
page read and write
2584D113000
heap
page read and write
2A946688000
heap
page read and write
C217AFE000
stack
page read and write
27013C6B000
heap
page read and write
1CDB5730000
trusted library section
page readonly
970E0FF000
stack
page read and write
There are 740 hidden memdumps, click here to show them.