IOC Report
e5#U7248.exe

loading gif

Files

File Path
Type
Category
Malicious
e5#U7248.exe
PE32+ executable (GUI) x86-64, for MS Windows
initial sample
malicious
C:\Users\Public\Music\e5#U7248.exe
PE32+ executable (GUI) x86-64, for MS Windows
dropped
malicious
C:\Users\Public\Music\e5#U7248.exe:Zone.Identifier
ASCII text, with CRLF line terminators
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Office\16.0\WebServiceCache\AllUsers\officeclient.microsoft.com\335F8B80-9649-4ACE-A711-42A021E2413D
XML 1.0 document, UTF-8 Unicode text, with very long lines, with CRLF line terminators
dropped
C:\Users\user\AppData\Roaming\Microsoft\Office\Recent\e5.LNK
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Archive, ctime=Tue May 24 17:19:07 2022, mtime=Tue May 24 17:19:12 2022, atime=Tue May 24 17:19:07 2022, length=2068461, window=hide
dropped
C:\Users\user\AppData\Roaming\Microsoft\Office\Recent\index.dat
ASCII text, with CRLF line terminators
modified
C:\Users\user\Desktop\e5#U7248.pptx
Microsoft PowerPoint 2007+
modified

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\e5#U7248.exe
"C:\Users\user\Desktop\e5#U7248.exe"
malicious
C:\Users\Public\Music\e5#U7248.exe
C:\Users\Public\Music\e5#U7248.exe
malicious
C:\Windows\System32\cmd.exe
"C:\Windows\system32\cmd.exe" /c del C:\Users\user\Desktop\e5#U7248.exe > nul
malicious
C:\Program Files (x86)\Microsoft Office\Office16\POWERPNT.EXE
C:\Program Files (x86)\Microsoft Office\Office16\POWERPNT.EXE" "C:\Users\user\Desktop\e5#U7248.pptx" /ou "
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1

URLs

Name
IP
Malicious
http://service-ep07djah-1306669097.bj.apigw.tencentcs.com:443/bootstrap-2.min.js
malicious
https://api.diagnosticssdf.office.com
unknown
https://login.microsoftonline.com/
unknown
https://shell.suite.office.com:1443
unknown
https://login.windows.net/72f988bf-86f1-41af-91ab-2d7cd011db47/oauth2/authorize
unknown
http://rs.qbox.me/chtype/RGJhay9jaGRiOnFpbml1LnBuZw==/type/1
unknown
https://autodiscover-s.outlook.com/
unknown
https://roaming.edog.
unknown
https://insertmedia.bing.office.net/images/officeonlinecontent/browse?cp=Flickr
unknown
https://cdn.entity.
unknown
https://api.addins.omex.office.net/appinfo/query
unknown
https://clients.config.office.net/user/v1.0/tenantassociationkey
unknown
https://dev.virtualearth.net/REST/V1/GeospatialEndpoint/
unknown
https://powerlift.acompli.net
unknown
https://rpsticket.partnerservices.getmicrosoftkey.com
unknown
https://lookup.onenote.com/lookup/geolocation/v1
unknown
http://api.qiniu.com
unknown
https://cortana.ai
unknown
https://apc.learningtools.onenote.com/learningtoolsapi/v2.0/getfreeformspeech
unknown
http://rs.qbox.mehttp://rsf.qbox.mehttp://api.qiniu.comhttp://fusion.qiniuapi.comhttp://uc.qbox.meht
unknown
https://cloudfiles.onenote.com/upload.aspx
unknown
https://syncservice.protection.outlook.com/PolicySync/PolicySync.svc/SyncFile
unknown
https://entitlement.diagnosticssdf.office.com
unknown
https://na01.oscs.protection.outlook.com/api/SafeLinksApi/GetPolicy
unknown
https://api.aadrm.com/
unknown
http://rs.qbox.me/chtype/RGJhay9jaGRiOnFpbml1LnBuZw==/type/1da
unknown
https://curl.se/docs/hsts.html
unknown
https://ofcrecsvcapi-int.azurewebsites.net/
unknown
https://service-ep07djah-1306669097.bj.apigw.tencentcs.com/bootstrap-2.min.js
unknown
https://dataservice.protection.outlook.com/PsorWebService/v1/ClientSyncFile/MipPolicies
unknown
https://api.microsoftstream.com/api/
unknown
https://insertmedia.bing.office.net/images/hosted?host=office&adlt=strict&hostType=Immersive
unknown
https://cr.office.com
unknown
https://augloop.office.com;https://augloop-int.officeppe.com;https://augloop-dogfood.officeppe.com;h
unknown
https://portal.office.com/account/?ref=ClientMeControl
unknown
https://graph.ppe.windows.net
unknown
https://res.getmicrosoftkey.com/api/redemptionevents
unknown
https://powerlift-frontdesk.acompli.net
unknown
https://tasks.office.com
unknown
https://officeci.azurewebsites.net/api/
unknown
https://service-ep07djah-1306669097.bj.apigw.tencentcs.com/bootstrap-2.min.jsT
unknown
https://sr.outlook.office.net/ws/speech/recognize/assistant/work
unknown
http://upload.qiniup.com
unknown
https://store.office.cn/addinstemplate
unknown
https://api.aadrm.com
unknown
https://outlook.office.com/autosuggest/api/v1/init?cvid=
unknown
https://globaldisco.crm.dynamics.com
unknown
https://messaging.engagement.office.com/
unknown
https://nam.learningtools.onenote.com/learningtoolsapi/v2.0/getfreeformspeech
unknown
https://dev0-api.acompli.net/autodetect
unknown
https://www.odwebp.svc.ms
unknown
https://api.diagnosticssdf.office.com/v2/feedback
unknown
https://api.powerbi.com/v1.0/myorg/groups
unknown
https://web.microsoftstream.com/video/
unknown
https://api.addins.store.officeppe.com/addinstemplate
unknown
https://curl.se/docs/alt-svc.html
unknown
https://graph.windows.net
unknown
https://dataservice.o365filtering.com/
unknown
https://officesetup.getmicrosoftkey.com
unknown
https://analysis.windows.net/powerbi/api
unknown
https://prod-global-autodetect.acompli.net/autodetect
unknown
https://outlook.office365.com/autodiscover/autodiscover.json
unknown
https://powerpoint.uservoice.com/forums/288952-powerpoint-for-ipad-iphone-ios
unknown
https://eur.learningtools.onenote.com/learningtoolsapi/v2.0/getfreeformspeech
unknown
https://pf.directory.live.com/profile/mine/System.ShortCircuitProfile.json
unknown
https://ncus.contentsync.
unknown
https://onedrive.live.com/about/download/?windows10SyncClientInstalled=false
unknown
https://webdir.online.lync.com/autodiscover/autodiscoverservice.svc/root/
unknown
http://weather.service.msn.com/data.aspx
unknown
https://apis.live.net/v5.0/
unknown
https://officemobile.uservoice.com/forums/929800-office-app-ios-and-ipad-asks
unknown
https://word.uservoice.com/forums/304948-word-for-ipad-iphone-ios
unknown
https://autodiscover-s.outlook.com/autodiscover/autodiscover.xml
unknown
https://management.azure.com
unknown
https://outlook.office365.com
unknown
https://wus2.contentsync.
unknown
https://incidents.diagnostics.office.com
unknown
https://clients.config.office.net/user/v1.0/ios
unknown
https://insertmedia.bing.office.net/odc/insertmedia
unknown
http://iovip.qbox.me
unknown
https://o365auditrealtimeingestion.manage.office.com
unknown
https://outlook.office365.com/api/v1.0/me/Activities
unknown
https://api.office.net
unknown
https://incidents.diagnosticssdf.office.com
unknown
http://fusion.qiniuapi.com
unknown
https://asgsmsproxyapi.azurewebsites.net/
unknown
https://clients.config.office.net/user/v1.0/android/policies
unknown
https://entitlement.diagnostics.office.com
unknown
http://rs.qbox.me/chtype/RGJhay9jaGRiOnFpbml1LnBuZw==/type/1-1000
unknown
https://pf.directory.live.com/profile/mine/WLX.Profiles.IC.json
unknown
https://substrate.office.com/search/api/v2/init
unknown
https://outlook.office.com/
unknown
https://storage.live.com/clientlogs/uploadlocation
unknown
https://outlook.office365.com/
unknown
https://webshell.suite.office.com
unknown
https://insertmedia.bing.office.net/images/officeonlinecontent/browse?cp=OneDrive
unknown
https://substrate.office.com/search/api/v1/SearchHistory
unknown
http://rsf.qbox.me
unknown
https://management.azure.com/
unknown
https://clients.config.office.net/c2r/v1.0/InteractiveInstallation
unknown
There are 90 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
service-ep07djah-1306669097.bj.apigw.tencentcs.com
unknown
malicious
1-1.bj.apigwtencent.com
49.233.94.119
kodo-elb-z0.qbox.me
115.231.97.60
rs.qbox.me
unknown

IPs

IP
Domain
Country
Malicious
115.231.97.60
kodo-elb-z0.qbox.me
China
49.233.94.119
1-1.bj.apigwtencent.com
China
180.101.136.19
unknown
China
127.0.0.1
unknown
unknown

Registry

Path
Value
Malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00006109110000000000000000F01FEC\Usage
PPTFiles
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Shell Extensions\Cached
{993BE281-6695-4BA5-8A2A-7AACBFAAB69E} {0000013A-0000-0000-C000-000000000046} 0xFFFF
HKEY_CURRENT_USER_Classes\Local Settings\MuiCache\f0\52C64B7E
@C:\Program Files\Common Files\Microsoft Shared\Office16\oregres.dll,-204
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
LangID
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
C:\Program Files (x86)\Microsoft Office\Office16\POWERPNT.EXE.FriendlyAppName
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
C:\Program Files (x86)\Microsoft Office\Office16\POWERPNT.EXE.ApplicationCompany
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\PowerPoint\Resiliency\StartupItems
*1
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\PowerPoint\Resiliency\StartupItems
*1
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\PowerPoint\options
DesktopBootGuid
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\PowerPoint\Resiliency\DocumentRecovery\35100
35100
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\PowerPoint\options
AppMaximized
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\PowerPoint\options
Top
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\PowerPoint\options
Left
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\PowerPoint\options
Bottom
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\PowerPoint\options
Right
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\internet\WebServiceCache
RemoteClearDate
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\internet\WebServiceCache\AllUsers\officeclient.microsoft.com\config16--lcid=1033&syslcid=1033&uilcid=1033&build=16.0.4954&crev=3
Last
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\PowerPoint\Resiliency\StartupItems
~21
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\IOAV
LastBootTime
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\internet\WebServiceCache\AllUsers\officeclient.microsoft.com\config16--lcid=1033&syslcid=1033&uilcid=1033&build=16.0.4954&crev=3\0
FilePath
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\internet\WebServiceCache\AllUsers\officeclient.microsoft.com\config16--lcid=1033&syslcid=1033&uilcid=1033&build=16.0.4954&crev=3\0
StartDate
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\internet\WebServiceCache\AllUsers\officeclient.microsoft.com\config16--lcid=1033&syslcid=1033&uilcid=1033&build=16.0.4954&crev=3\0
EndDate
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\internet\WebServiceCache\AllUsers\officeclient.microsoft.com\config16--lcid=1033&syslcid=1033&uilcid=1033&build=16.0.4954&crev=3\0
Properties
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\internet\WebServiceCache\AllUsers\officeclient.microsoft.com\config16--lcid=1033&syslcid=1033&uilcid=1033&build=16.0.4954&crev=3\0
Url
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\internet\WebServiceCache
LastClean
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\Identity
DisableWinHttpCertAuth
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\Identity
DisableIsOwnerRegex
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\Identity
DisableSessionAwareHttpClose
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\Identity
DisableADALForExtendedApps
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\Identity
DisableADALSetSilentAuth
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\Identity
msoridDisableGuestCredProvider
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\Identity
msoridDisableOstringReplace
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\PowerPoint\Resiliency\DocumentRecovery\358D0
358D0
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\PowerPoint\Place MRU\Change
ChangeId
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\PowerPoint\file mru\Change
ChangeId
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\PowerPoint\Place MRU
Item 1
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\PowerPoint\file mru
Item 21
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00006109110000000000000000F01FEC\Usage
ProductFiles
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\LanguageResources\EnabledEditingLanguages
en-US
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\LanguageResources\EnabledEditingLanguages
en-US
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00006109110000000000000000F01FEC\Usage
PPTFiles
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\PowerPoint\Resiliency\DocumentRecovery\35100
35100
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\Roaming
RoamingConfigurableSettings
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\Roaming
RoamingLastSyncTime
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\Roaming
RoamingLastWriteTime
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\PowerPoint\Resiliency\DocumentRecovery\358D0
358D0
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\ServicesManagerCache\ServicesCatalog
CacheReady
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\ServicesManagerCache\ServicesCatalog
LastRequest
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\ServicesManagerCache\ServicesCatalog
CacheReady
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\ServicesManagerCache\ServicesCatalog
LastUpdate
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\ServicesManagerCache\ServicesCatalog
NextUpdate
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\PowerPoint\Place MRU\Change
ChangeId
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\PowerPoint\file mru
Item 1
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\PowerPoint\file mru
Item 2
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\PowerPoint\file mru
Item 3
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\PowerPoint\file mru
Item 4
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\PowerPoint\file mru
Item 5
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\PowerPoint\file mru
Item 6
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\PowerPoint\file mru
Item 7
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\PowerPoint\file mru
Item 8
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\PowerPoint\file mru
Item 9
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\PowerPoint\file mru
Item 10
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\PowerPoint\file mru
Item 11
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\PowerPoint\file mru
Item 12
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\PowerPoint\file mru
Item 13
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\PowerPoint\file mru
Item 14
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\PowerPoint\file mru
Item 15
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\PowerPoint\file mru
Item 16
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\PowerPoint\file mru
Item 17
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\PowerPoint\file mru
Item 18
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\PowerPoint\file mru
Item 19
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\PowerPoint\file mru
Item 20
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\PowerPoint\file mru\Change
ChangeId
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00006109110000000000000000F01FEC\Usage
ProductFiles
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\IOAV
LastBootTime
There are 65 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
1C8CA0EB000
heap
page read and write
malicious
1C8CA290000
direct allocation
page execute and read and write
malicious
265BBFD3000
heap
page read and write
150D073B000
heap
page read and write
1AD76567000
heap
page read and write
14D0023B000
heap
page read and write
A81AFFD000
stack
page read and write
14D002FA000
heap
page read and write
91D3CFB000
stack
page read and write
8AF1078000
stack
page read and write
150D07DD000
heap
page read and write
1DC6C0B0000
trusted library allocation
page read and write
265BBFEF000
heap
page read and write
1AD76596000
heap
page read and write
150D0787000
heap
page read and write
56F12FE000
stack
page read and write
265BBFE2000
heap
page read and write
1F09F330000
heap
page read and write
14D7AA8D000
heap
page read and write
14D7AA57000
heap
page read and write
14D7AA6F000
heap
page read and write
1F09F44D000
heap
page read and write
F2F9F9D000
stack
page read and write
1AD75CF5000
heap
page read and write
23916655000
heap
page read and write
1AD75D08000
heap
page read and write
A81B4FE000
stack
page read and write
1AD76583000
heap
page read and write
14D0028A000
heap
page read and write
1AD765A5000
heap
page read and write
8AF0FF9000
stack
page read and write
91D447E000
stack
page read and write
1AD76A03000
heap
page read and write
7FF6C9A21000
unkown
page readonly
14D00184000
trusted library allocation
page read and write
1F34F302000
heap
page read and write
14D002F7000
heap
page read and write
14D00302000
heap
page read and write
56F13F9000
stack
page read and write
1AD765A5000
heap
page read and write
F2F9F1C000
stack
page read and write
14D00164000
trusted library allocation
page read and write
1F34F300000
heap
page read and write
1DC6BEE0000
heap
page read and write
23916670000
heap
page read and write
29F94A84000
heap
page read and write
265BBFC7000
heap
page read and write
29F94A6A000
heap
page read and write
1AD76589000
heap
page read and write
7FF79E5B1000
unkown
page execute read
14D7BA20000
trusted library section
page readonly
1AD76515000
heap
page read and write
1F09FE02000
trusted library allocation
page read and write
1AD75D16000
heap
page read and write
1AD75C49000
heap
page read and write
731407E000
stack
page read and write
265BC160000
heap
page read and write
4E164FE000
stack
page read and write
150D07A3000
heap
page read and write
29F95202000
trusted library allocation
page read and write
EBB7977000
stack
page read and write
1DC6C10F000
heap
page read and write
14D00180000
trusted library allocation
page read and write
7FF6C9A18000
unkown
page write copy
265BC0B0000
heap
page read and write
265BBFF6000
heap
page read and write
29F94A78000
heap
page read and write
1AD75CD8000
heap
page read and write
1AD76A02000
heap
page read and write
1AD76594000
heap
page read and write
1C8CA149000
heap
page read and write
1AD76594000
heap
page read and write
1AD75C3C000
heap
page read and write
150D07E4000
heap
page read and write
4E162FE000
stack
page read and write
1AD765A2000
heap
page read and write
7FF6C97A0000
unkown
page readonly
2391664B000
heap
page read and write
1F09F481000
heap
page read and write
1DC6C108000
heap
page read and write
1AD75CC9000
heap
page read and write
150D0A20000
heap
page read and write
14D7B601000
trusted library allocation
page read and write
1DC6CF80000
heap
page readonly
1F09F390000
heap
page read and write
1C8CA060000
heap
page read and write
14D7BA10000
trusted library section
page readonly
7FF79E831000
unkown
page readonly
4E169FB000
stack
page read and write
14D00302000
heap
page read and write
1AD75CE9000
heap
page read and write
1AD76960000
remote allocation
page read and write
150D0970000
heap
page read and write
14D002E7000
heap
page read and write
1AD75C13000
heap
page read and write
14D7AA79000
heap
page read and write
7FF6C9978000
unkown
page readonly
2391668A000
heap
page read and write
150D07D4000
heap
page read and write
265BBFE2000
heap
page read and write
23916657000
heap
page read and write
1AD76583000
heap
page read and write
1F34F271000
heap
page read and write
1F09F45A000
heap
page read and write
91D40FB000
stack
page read and write
265BBFD9000
heap
page read and write
1AD75C4B000
heap
page read and write
14D7FFA0000
trusted library allocation
page read and write
F2FA4FF000
stack
page read and write
14D004A0000
remote allocation
page read and write
3D0947F000
stack
page read and write
1C8CA080000
heap
page read and write
14D00460000
trusted library allocation
page read and write
A81A79B000
stack
page read and write
1AD76402000
heap
page read and write
3D08FFA000
stack
page read and write
150D0730000
heap
page read and write
1AD75CA5000
heap
page read and write
1AD75C6F000
heap
page read and write
1DC6C399000
heap
page read and write
1DC6CFA0000
trusted library allocation
page read and write
29F94A2D000
heap
page read and write
7313D0B000
stack
page read and write
F2FA5F7000
stack
page read and write
150D07E2000
heap
page read and write
23916647000
heap
page read and write
1C8CA129000
heap
page read and write
3D091FF000
stack
page read and write
1F34F23C000
heap
page read and write
1AD76585000
heap
page read and write
1F09F477000
heap
page read and write
1F34F202000
heap
page read and write
150D0766000
heap
page read and write
14D7AB13000
heap
page read and write
1AD75A60000
heap
page read and write
1F34F180000
heap
page read and write
7FF6C9978000
unkown
page readonly
1C8CBE10000
remote allocation
page read and write
14D7BB50000
trusted library allocation
page read and write
1DC6CD50000
trusted library allocation
page read and write
150D07D2000
heap
page read and write
1AD765AC000
heap
page read and write
150D0773000
heap
page read and write
1AD765A5000
heap
page read and write
EBB767F000
stack
page read and write
EBB777B000
stack
page read and write
1AD75A50000
heap
page read and write
EBB787B000
stack
page read and write
265BBFCF000
heap
page read and write
150D07C8000
heap
page read and write
A81B2F9000
stack
page read and write
1DC6C3A0000
trusted library allocation
page read and write
1AD75C99000
heap
page read and write
1AD76A02000
heap
page read and write
7FF79E82F000
unkown
page read and write
1DC6C129000
heap
page read and write
4E163FF000
stack
page read and write
14D7BFA0000
trusted library allocation
page read and write
1AD76583000
heap
page read and write
7FF79E5B1000
unkown
page execute read
14D00200000
heap
page read and write
3D090FA000
stack
page read and write
1AD76562000
heap
page read and write
7314377000
stack
page read and write
8AF10FE000
stack
page read and write
14D0014E000
trusted library allocation
page read and write
14D002F5000
heap
page read and write
1AD76583000
heap
page read and write
14D00480000
trusted library allocation
page read and write
1AD765A9000
heap
page read and write
14D7BF90000
trusted library allocation
page read and write
1AD765A5000
heap
page read and write
23916702000
heap
page read and write
23916629000
heap
page read and write
1F34F264000
heap
page read and write
34930BB000
stack
page read and write
1AD765A2000
heap
page read and write
2391664C000
heap
page read and write
23916659000
heap
page read and write
265BBFB7000
heap
page read and write
23916600000
heap
page read and write
1DC6C0C0000
heap
page read and write
1AD75C47000
heap
page read and write
1AD75C29000
heap
page read and write
14D7AAAF000
heap
page read and write
1AD76583000
heap
page read and write
56F127C000
stack
page read and write
1AD7656C000
heap
page read and write
731457F000
stack
page read and write
1DC6CF90000
trusted library allocation
page read and write
7FF79E788000
unkown
page readonly
14D7AA13000
heap
page read and write
1AD765A6000
heap
page read and write
29F94A29000
heap
page read and write
1AD76585000
heap
page read and write
91D4577000
stack
page read and write
1F09F502000
heap
page read and write
91D3D7D000
stack
page read and write
1F09F476000
heap
page read and write
1F09F3C0000
trusted library allocation
page read and write
7FF6C9A18000
unkown
page read and write
1AD76583000
heap
page read and write
1DC6CFF0000
trusted library allocation
page read and write
150D0773000
heap
page read and write
150D0781000
heap
page read and write
1AD76581000
heap
page read and write
7FF6C97A1000
unkown
page execute read
14D7B500000
heap
page read and write
1F34F170000
heap
page read and write
29F94A13000
heap
page read and write
1AD76567000
heap
page read and write
14D00214000
heap
page read and write
1DC6C0D1000
heap
page read and write
29F94A4C000
heap
page read and write
3D095FB000
stack
page read and write
4E16AFE000
stack
page read and write
14D002A0000
trusted library allocation
page read and write
14D7AAA0000
heap
page read and write
1AD765D7000
heap
page read and write
1DC6C395000
heap
page read and write
150D07DE000
heap
page read and write
14D7AA00000
heap
page read and write
265BBFB0000
heap
page read and write
EBB7B7F000
stack
page read and write
14D00161000
trusted library allocation
page read and write
1AD76A02000
heap
page read and write
7FF79E5B0000
unkown
page readonly
1AD75CB1000
heap
page read and write
14D00140000
trusted library allocation
page read and write
1AD76960000
remote allocation
page read and write
14D7A9E0000
trusted library section
page read and write
91D4377000
stack
page read and write
14D004A0000
remote allocation
page read and write
23916713000
heap
page read and write
29F94A49000
heap
page read and write
EBB7A7E000
stack
page read and write
1AD76585000
heap
page read and write
7FF6C9A21000
unkown
page readonly
14D002FD000
heap
page read and write
29F94B00000
heap
page read and write
14D7B400000
heap
page read and write
1C8CA2B0000
heap
page read and write
731447F000
stack
page read and write
14D7B415000
heap
page read and write
29F94A8E000
heap
page read and write
2391664D000
heap
page read and write
1AD75CB6000
heap
page read and write
23916613000
heap
page read and write
3D093FE000
stack
page read and write
14D7AA8F000
heap
page read and write
265BBFD0000
heap
page read and write
14D7BF71000
trusted library allocation
page read and write
1F34F258000
heap
page read and write
14D7B402000
heap
page read and write
23916677000
heap
page read and write
150D0781000
heap
page read and write
7FF6C97A0000
unkown
page readonly
1F09F43C000
heap
page read and write
1AD76587000
heap
page read and write
1AD76595000
heap
page read and write
EBB73EF000
stack
page read and write
265BC0D0000
heap
page read and write
265BBFF5000
heap
page read and write
265BBFD7000
heap
page read and write
1AD75C4C000
heap
page read and write
1AD76583000
heap
page read and write
265BBFE2000
heap
page read and write
1AD76A02000
heap
page read and write
150D07E1000
heap
page read and write
1F34F213000
heap
page read and write
1AD76A02000
heap
page read and write
29F94810000
heap
page read and write
29F94B13000
heap
page read and write
150D0768000
heap
page read and write
150D2621000
heap
page read and write
1AD7656A000
heap
page read and write
14D7FFB0000
trusted library allocation
page read and write
1DC6C360000
trusted library allocation
page read and write
4E166FE000
stack
page read and write
1AD765BB000
heap
page read and write
1F34F1E0000
heap
page read and write
23916650000
heap
page read and write
3D08A9B000
stack
page read and write
1C8CBE10000
remote allocation
page read and write
1AD7656E000
heap
page read and write
8AF0E7A000
stack
page read and write
1AD7655F000
heap
page read and write
14D002FB000
heap
page read and write
F2FA27E000
stack
page read and write
14D002D7000
heap
page read and write
14D00160000
trusted library allocation
page read and write
7FF79E828000
unkown
page write copy
29F94A00000
heap
page read and write
1AD76567000
heap
page read and write
14D7FFF0000
trusted library allocation
page read and write
7FF6C97A1000
unkown
page execute read
1F09F508000
heap
page read and write
F2FA6FF000
stack
page read and write
14D00470000
trusted library allocation
page read and write
3D098FA000
stack
page read and write
150D0660000
heap
page read and write
150D2518000
heap
page read and write
1AD75AC0000
heap
page read and write
1AD75BC0000
trusted library allocation
page read and write
1AD76594000
heap
page read and write
150D07F9000
heap
page read and write
7313D8F000
stack
page read and write
3D09AFE000
stack
page read and write
56F1579000
stack
page read and write
1F34FA80000
trusted library allocation
page read and write
1F09F476000
heap
page read and write
F2FA37C000
stack
page read and write
91D45FF000
unkown
page read and write
1AD76595000
heap
page read and write
1C8CBE10000
remote allocation
page read and write
150D06F0000
heap
page read and write
1AD75C00000
heap
page read and write
14D002EF000
heap
page read and write
1F09F400000
heap
page read and write
14D7BA30000
trusted library section
page readonly
1AD7658F000
heap
page read and write
1AD765AA000
heap
page read and write
7FF6C9A1F000
unkown
page read and write
23916708000
heap
page read and write
150D0781000
heap
page read and write
1AD76583000
heap
page read and write
29F94A4E000
heap
page read and write
3D097FE000
stack
page read and write
14D002B1000
heap
page read and write
1AD76569000
heap
page read and write
150D07C6000
heap
page read and write
A81AEFF000
stack
page read and write
1AD76594000
heap
page read and write
1AD76565000
heap
page read and write
150D0775000
heap
page read and write
29F94800000
heap
page read and write
1AD75CEC000
heap
page read and write
14D7AAFD000
heap
page read and write
EBB736B000
stack
page read and write
150D07EA000
heap
page read and write
4E168FE000
stack
page read and write
14D7AA29000
heap
page read and write
7FF79E828000
unkown
page read and write
7FF79E5B0000
unkown
page readonly
56F137F000
stack
page read and write
1DC6C350000
trusted library allocation
page read and write
150D07D7000
heap
page read and write
1DC6C10F000
heap
page read and write
29F94A3C000
heap
page read and write
1AD76500000
heap
page read and write
14D7A9A0000
heap
page read and write
1DC6C0C8000
heap
page read and write
1AD76583000
heap
page read and write
1F09F460000
heap
page read and write
F2FA47B000
stack
page read and write
14D7B518000
heap
page read and write
14D00410000
trusted library allocation
page read and write
23916658000
heap
page read and write
A81B0FE000
stack
page read and write
14D7AA9E000
heap
page read and write
1C8CA111000
heap
page read and write
23917002000
trusted library allocation
page read and write
1AD76585000
heap
page read and write
14D7AA93000
heap
page read and write
1AD76584000
heap
page read and write
1AD76567000
heap
page read and write
34936FE000
stack
page read and write
56F147A000
stack
page read and write
150D06D0000
heap
page read and write
14D7AB26000
heap
page read and write
14D0022B000
heap
page read and write
8AF0EFE000
stack
page read and write
14D7A940000
heap
page read and write
3D092FB000
stack
page read and write
23916646000
heap
page read and write
14D00248000
heap
page read and write
1DC6C040000
heap
page read and write
14D7A9D0000
trusted library allocation
page read and write
1C8CA2B5000
heap
page read and write
239165D0000
heap
page read and write
91D417E000
stack
page read and write
23916560000
heap
page read and write
14D7B559000
heap
page read and write
4E15D9B000
stack
page read and write
150D0781000
heap
page read and write
731417C000
stack
page read and write
A81ADFE000
stack
page read and write
1AD76518000
heap
page read and write
1AD7656A000
heap
page read and write
14D00170000
trusted library allocation
page read and write
91D4278000
stack
page read and write
23916E70000
trusted library allocation
page read and write
1DC6C10F000
heap
page read and write
23916626000
heap
page read and write
14D7BA50000
trusted library section
page readonly
4E167FE000
stack
page read and write
7FF79E831000
unkown
page readonly
14D7B559000
heap
page read and write
A81B3FE000
stack
page read and write
A81B1FE000
stack
page read and write
1AD765D5000
heap
page read and write
1C8C9FF0000
heap
page read and write
150D07E0000
heap
page read and write
150D07D7000
heap
page read and write
56F14FE000
stack
page read and write
1F09F320000
heap
page read and write
1AD765AC000
heap
page read and write
150D07C1000
heap
page read and write
150D07A9000
heap
page read and write
23916570000
heap
page read and write
1AD76583000
heap
page read and write
14D00450000
trusted library allocation
page read and write
150D07D7000
heap
page read and write
150D07A8000
heap
page read and write
14D0021D000
heap
page read and write
1F34FC02000
trusted library allocation
page read and write
8AF0F7F000
stack
page read and write
1DC6BEF0000
trusted library allocation
page read and write
1AD7659A000
heap
page read and write
1AD76A02000
heap
page read and write
1DC6C390000
heap
page read and write
1F34F200000
heap
page read and write
91D46FC000
stack
page read and write
34938FE000
stack
page read and write
1AD76583000
heap
page read and write
265BBFD2000
heap
page read and write
3D0967F000
stack
page read and write
29F94B08000
heap
page read and write
29F94970000
trusted library allocation
page read and write
14D7AA74000
heap
page read and write
150D07E7000
heap
page read and write
1AD76960000
remote allocation
page read and write
14D7B513000
heap
page read and write
150D07AD000
heap
page read and write
2391664F000
heap
page read and write
34935FB000
stack
page read and write
7FF79E788000
unkown
page readonly
14D7AB02000
heap
page read and write
150D2620000
heap
page read and write
150D0766000
heap
page read and write
265BBE80000
heap
page read and write
1AD76513000
heap
page read and write
14D00170000
trusted library allocation
page read and write
14D00290000
trusted library allocation
page read and write
1AD7656A000
heap
page read and write
1AD75C48000
heap
page read and write
14D00148000
trusted library allocation
page read and write
1F34F313000
heap
page read and write
1AD75CAC000
heap
page read and write
1DC6C020000
heap
page read and write
1AD76A20000
heap
page read and write
14D7AA77000
heap
page read and write
14D7AA3C000
heap
page read and write
1F09F413000
heap
page read and write
14D7B518000
heap
page read and write
1AD76594000
heap
page read and write
14D7BA60000
trusted library section
page readonly
23916682000
heap
page read and write
1DC6C380000
trusted library allocation
page read and write
4E165FE000
stack
page read and write
23916652000
heap
page read and write
14D7B502000
heap
page read and write
1AD76585000
heap
page read and write
1C8CA0A0000
heap
page read and write
265BC165000
heap
page read and write
14D00140000
trusted library allocation
page read and write
1AD76A00000
heap
page read and write
150D07F0000
heap
page read and write
1C8CA0A8000
heap
page read and write
1AD76570000
heap
page read and write
29F94B02000
heap
page read and write
1F09F466000
heap
page read and write
4E160FE000
stack
page read and write
14D7BF93000
trusted library allocation
page read and write
265BBFF1000
heap
page read and write
1AD7652E000
heap
page read and write
A81AAFF000
stack
page read and write
150D07CE000
heap
page read and write
1F34F228000
heap
page read and write
731427B000
stack
page read and write
29F94870000
heap
page read and write
1AD765B5000
heap
page read and write
150D0779000
heap
page read and write
29F94A53000
heap
page read and write
1AD75D13000
heap
page read and write
1AD75CEC000
heap
page read and write
14D7BA40000
trusted library section
page readonly
3D0937E000
stack
page read and write
14D00030000
trusted library allocation
page read and write
150D077D000
heap
page read and write
1AD765B4000
heap
page read and write
3D096FF000
stack
page read and write
8AF117C000
stack
page read and write
34937FB000
stack
page read and write
A81ACFF000
stack
page read and write
1F09F429000
heap
page read and write
91D3DFE000
stack
page read and write
1AD76596000
heap
page read and write
150D0A25000
heap
page read and write
23916700000
heap
page read and write
14D7A930000
heap
page read and write
265BBFC2000
heap
page read and write
1F09F513000
heap
page read and write
1AD76567000
heap
page read and write
265BBFC7000
heap
page read and write
3D094FF000
stack
page read and write
14D004A0000
remote allocation
page read and write
1AD75CE0000
heap
page read and write
150D07A4000
heap
page read and write
1F09F500000
heap
page read and write
23916654000
heap
page read and write
2391663C000
heap
page read and write
1AD75CC3000
heap
page read and write
F2FA7FF000
stack
page read and write
3D08EF7000
stack
page read and write
1AD75D02000
heap
page read and write
14D00261000
heap
page read and write
1AD7656A000
heap
page read and write
There are 508 hidden memdumps, click here to show them.