IOC Report
VASkmEQ4iU.exe

loading gif

Files

File Path
Type
Category
Malicious
VASkmEQ4iU.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\Users\user\AppData\LocalLow\5VjcxCywK8MY
SQLite 3.x database, last written using SQLite version 3032001
dropped
C:\Users\user\AppData\LocalLow\9hGg93zL5D7e
SQLite 3.x database, last written using SQLite version 3032001
dropped
C:\Users\user\AppData\LocalLow\C54bUZh6GqSm
SQLite 3.x database, last written using SQLite version 3032001
dropped
C:\Users\user\AppData\LocalLow\freebl3.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\LocalLow\mozglue.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\LocalLow\msvcp140.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\LocalLow\nss3.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\LocalLow\nssdbm3.dll
HTML document, ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\LocalLow\p7T157RypD9o
SQLite 3.x database, last written using SQLite version 3032001
dropped
C:\Users\user\AppData\LocalLow\softokn3.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\LocalLow\sqlite3.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\LocalLow\vcruntime140.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
There are 3 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\VASkmEQ4iU.exe
"C:\Users\user\Desktop\VASkmEQ4iU.exe"
malicious

URLs

Name
IP
Malicious
http://185.62.56.113/
185.62.56.113
malicious
http://185.62.56.113/c5e0a800e57a53b399120e5a97b50daa
185.62.56.113
malicious
https://ac.ecosia.org/autocomplete?q=
unknown
https://duckduckgo.com/chrome_newtab
unknown
http://www.mozilla.com/en-US/blocklist/
unknown
https://duckduckgo.com/ac/?q=
unknown
https://www.google.com/images/branding/product/ico/googleg_lodp.ico
unknown
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
unknown
https://search.yahoo.com/favicon.icohttps://search.yahoo.com/search
unknown
https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
unknown
https://mozilla.org0
unknown
http://www.sqlite.org/copyright.html.
unknown
https://search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
unknown
There are 3 hidden URLs, click here to show them.

IPs

IP
Domain
Country
Malicious
185.62.56.113
unknown
Netherlands
malicious

Memdumps

Base Address
Regiontype
Protect
Malicious
1A2E000
heap
page read and write
malicious
1A2E000
heap
page read and write
malicious
1A2E000
heap
page read and write
malicious
1A2E000
heap
page read and write
malicious
1A2E000
heap
page read and write
malicious
1A51000
heap
page read and write
malicious
1A2E000
heap
page read and write
malicious
1A2E000
heap
page read and write
malicious
1A2E000
heap
page read and write
malicious
1A57000
heap
page read and write
malicious
1A2E000
heap
page read and write
malicious
1A2E000
heap
page read and write
malicious
1A2E000
heap
page read and write
malicious
1A2E000
heap
page read and write
malicious
1A2E000
heap
page read and write
malicious
1A2E000
heap
page read and write
malicious
DC4000
heap
page read and write
A94387B000
stack
page read and write
3D1F000
stack
page read and write
1F991C13000
heap
page read and write
1F068370000
trusted library allocation
page read and write
DC4000
heap
page read and write
1A0B000
heap
page read and write
1814A190000
heap
page read and write
1814A300000
trusted library allocation
page read and write
1A18000
heap
page read and write
2436DD73000
heap
page read and write
552E000
trusted library allocation
page read and write
1F062C8F000
heap
page read and write
223F7508000
heap
page read and write
2436DD71000
heap
page read and write
1F991C71000
heap
page read and write
A943A7E000
stack
page read and write
1A51000
heap
page read and write
2436E219000
heap
page read and write
36CD000
stack
page read and write
5127000
trusted library allocation
page read and write
3491000
heap
page read and write
2821A990000
trusted library allocation
page read and write
DC4000
heap
page read and write
1A51000
heap
page read and write
2436DAF0000
remote allocation
page read and write
11E9000
unkown
page read and write
DC4000
heap
page read and write
223F7476000
heap
page read and write
223F7455000
heap
page read and write
1A18000
heap
page read and write
1A16000
heap
page read and write
DC4000
heap
page read and write
2436DD79000
heap
page read and write
2436DD96000
heap
page read and write
1F0680B0000
trusted library allocation
page read and write
2436DDDB000
heap
page read and write
2436DD81000
heap
page read and write
2436E202000
heap
page read and write
1F062A40000
heap
page read and write
38C0000
trusted library section
page readonly
1814A464000
heap
page read and write
2436DD78000
heap
page read and write
2436E202000
heap
page read and write
1F991AC0000
heap
page read and write
3491000
heap
page read and write
1814AC02000
trusted library allocation
page read and write
11EA000
unkown
page execute read
5127000
trusted library allocation
page read and write
DC4000
heap
page read and write
1F063D00000
trusted library section
page readonly
DC4000
heap
page read and write
1F992402000
trusted library allocation
page read and write
1F06840F000
heap
page read and write
DC4000
heap
page read and write
2436E203000
heap
page read and write
1A12000
heap
page read and write
DC4000
heap
page read and write
2436DDA3000
heap
page read and write
1F068260000
trusted library allocation
page read and write
35CD000
stack
page read and write
1814A46A000
heap
page read and write
2821AB28000
heap
page read and write
DC907FF000
stack
page read and write
1A51000
heap
page read and write
DC4000
heap
page read and write
2436DDA8000
heap
page read and write
2436DD81000
heap
page read and write
1A15000
heap
page read and write
2436DD71000
heap
page read and write
45A3AFE000
stack
page read and write
1A51000
heap
page read and write
1F063402000
heap
page read and write
2436E200000
heap
page read and write
3710000
heap
page read and write
2436DD79000
heap
page read and write
3491000
heap
page read and write
2436DD81000
heap
page read and write
16FCE700000
trusted library allocation
page read and write
2436DD92000
heap
page read and write
8D2417E000
stack
page read and write
DC4000
heap
page read and write
1E78000
heap
page read and write
2436DDAB000
heap
page read and write
2436DD76000
heap
page read and write
16FCE854000
heap
page read and write
5131000
trusted library allocation
page read and write
DC4000
heap
page read and write
DC909FE000
stack
page read and write
553C000
trusted library allocation
page read and write
DC4000
heap
page read and write
3F9E000
stack
page read and write
DC4000
heap
page read and write
DC4000
heap
page read and write
209319FF000
heap
page read and write
3491000
heap
page read and write
67EEB7B000
stack
page read and write
2CFF2EC000
stack
page read and write
1BE8A602000
heap
page read and write
2436DD9A000
heap
page read and write
1F063518000
heap
page read and write
2436DD71000
heap
page read and write
A94397B000
stack
page read and write
209319DD000
heap
page read and write
2436DAF0000
remote allocation
page read and write
DC4000
heap
page read and write
DC4000
heap
page read and write
16FCE87D000
heap
page read and write
5534000
trusted library allocation
page read and write
2436D2A8000
heap
page read and write
CC9D479000
stack
page read and write
2436D270000
heap
page read and write
1814A508000
heap
page read and write
2436E202000
heap
page read and write
545A000
trusted library allocation
page read and write
2436DDB0000
heap
page read and write
DC4000
heap
page read and write
1BE8A600000
heap
page read and write
DC4000
heap
page read and write
8D2407F000
stack
page read and write
223F7502000
heap
page read and write
2436DD81000
heap
page read and write
1A74000
heap
page read and write
1A51000
heap
page read and write
2436DDB3000
heap
page read and write
96C000
stack
page read and write
5121000
trusted library allocation
page read and write
16FCE600000
heap
page read and write
16FCE870000
heap
page read and write
553C000
trusted library allocation
page read and write
DC4000
heap
page read and write
1BE8A613000
heap
page read and write
2821AB66000
heap
page read and write
1F068390000
trusted library allocation
page read and write
E15000
unkown
page read and write
45A36FF000
stack
page read and write
1F064071000
trusted library allocation
page read and write
3491000
heap
page read and write
CC9D27B000
stack
page read and write
1F068380000
trusted library allocation
page read and write
385E000
stack
page read and write
2436D120000
heap
page read and write
1A51000
heap
page read and write
DC4000
heap
page read and write
2CFF36E000
stack
page read and write
1F06841F000
heap
page read and write
223F72E0000
heap
page read and write
45A37FB000
stack
page read and write
1F068248000
trusted library allocation
page read and write
1A0B000
heap
page read and write
1814A429000
heap
page read and write
2436DDBF000
heap
page read and write
1F063400000
heap
page read and write
9F3247E000
stack
page read and write
DC4000
heap
page read and write
1BE8A68A000
heap
page read and write
1F068130000
trusted library allocation
page read and write
CFA000
stack
page read and write
1A66000
heap
page read and write
DC4000
heap
page read and write
2821B7D0000
trusted library allocation
page read and write
2436E23E000
heap
page read and write
DC4000
heap
page read and write
1F063415000
heap
page read and write
1814A1A0000
heap
page read and write
3491000
heap
page read and write
1BE8A64B000
heap
page read and write
223F7464000
heap
page read and write
16FCE84C000
heap
page read and write
DC4000
heap
page read and write
1F069000000
heap
page read and write
209319D0000
heap
page read and write
DC4000
heap
page read and write
209319F4000
heap
page read and write
DC4000
heap
page read and write
DC4000
heap
page read and write
1814A45E000
heap
page read and write
2436D2E7000
heap
page read and write
1BE8A64D000
heap
page read and write
2436DD78000
heap
page read and write
209319E1000
heap
page read and write
DC4000
heap
page read and write
1F063CF0000
trusted library section
page readonly
421E000
stack
page read and write
2436DD92000
heap
page read and write
16FCE83C000
heap
page read and write
16FCF002000
trusted library allocation
page read and write
2436DD79000
heap
page read and write
2436DD7E000
heap
page read and write
1814A461000
heap
page read and write
45A38FB000
stack
page read and write
DC4000
heap
page read and write
2821AC75000
heap
page read and write
DC4000
heap
page read and write
DC4000
heap
page read and write
16FCE813000
heap
page read and write
1F062D02000
heap
page read and write
1F0683A0000
remote allocation
page read and write
223F7462000
heap
page read and write
2821B7C0000
trusted library allocation
page read and write
9F32777000
stack
page read and write
2436DD81000
heap
page read and write
3491000
heap
page read and write
1A86000
heap
page read and write
3E1E000
stack
page read and write
8D23D3A000
stack
page read and write
2436DD81000
heap
page read and write
539D000
trusted library allocation
page read and write
16FCE82A000
heap
page read and write
2436DD9A000
heap
page read and write
67EEE7F000
stack
page read and write
2436DD9A000
heap
page read and write
DC901FF000
stack
page read and write
2436DD9D000
heap
page read and write
1F063502000
heap
page read and write
389E000
stack
page read and write
2821AC79000
heap
page read and write
1F068499000
heap
page read and write
20931C50000
heap
page read and write
8B8D57B000
stack
page read and write
1814A469000
heap
page read and write
2436DD9A000
heap
page read and write
3491000
heap
page read and write
3491000
heap
page read and write
3491000
heap
page read and write
1F062C95000
heap
page read and write
1814A45C000
heap
page read and write
D3E000
stack
page read and write
2436DDAB000
heap
page read and write
1A0B000
heap
page read and write
1A0B000
heap
page read and write
1BE8A67C000
heap
page read and write
5524000
trusted library allocation
page read and write
1814A488000
heap
page read and write
20931A16000
heap
page read and write
DC4000
heap
page read and write
1F06824E000
trusted library allocation
page read and write
1BE8A650000
heap
page read and write
CC9D4FE000
stack
page read and write
8B8D47A000
stack
page read and write
CC9D579000
stack
page read and write
3491000
heap
page read and write
3491000
heap
page read and write
2436DDA8000
heap
page read and write
3491000
heap
page read and write
34A0000
heap
page read and write
3491000
heap
page read and write
2436DD6F000
heap
page read and write
1F068310000
trusted library allocation
page read and write
19DA000
heap
page read and write
553C000
trusted library allocation
page read and write
1F991B20000
heap
page read and write
1A51000
heap
page read and write
512D000
trusted library allocation
page read and write
223F7413000
heap
page read and write
D7E000
stack
page read and write
2436DD77000
heap
page read and write
209319B0000
heap
page read and write
223F7460000
heap
page read and write
40D3000
trusted library allocation
page read and write
370D000
stack
page read and write
3491000
heap
page read and write
2CFF6FB000
stack
page read and write
2436DD71000
heap
page read and write
2436DC02000
heap
page read and write
2436D190000
heap
page read and write
1814A513000
heap
page read and write
1F063701000
trusted library allocation
page read and write
DF0000
unkown
page execute read
2436DDA3000
heap
page read and write
DC4000
heap
page read and write
2436DD79000
heap
page read and write
2436DD92000
heap
page read and write
CC9D5FF000
stack
page read and write
DC4000
heap
page read and write
2CFFAFC000
stack
page read and write
1BE8A624000
heap
page read and write
1F062C13000
heap
page read and write
1F068400000
heap
page read and write
1F0684E1000
heap
page read and write
3491000
heap
page read and write
D80000
trusted library allocation
page read and write
1A51000
heap
page read and write
1814A47A000
heap
page read and write
1814A500000
heap
page read and write
3491000
heap
page read and write
DC4000
heap
page read and write
1F0683A0000
remote allocation
page read and write
1A74000
heap
page read and write
2436D2EC000
heap
page read and write
1A16000
heap
page read and write
1A65000
heap
page read and write
DC4000
heap
page read and write
45A39F7000
stack
page read and write
2821BA90000
trusted library allocation
page read and write
DC9017F000
stack
page read and write
20931BA0000
heap
page read and write
1A15000
heap
page read and write
DEE000
unkown
page read and write
5535000
trusted library allocation
page read and write
8B8D5FF000
stack
page read and write
1A18000
heap
page read and write
67EE97E000
stack
page read and write
3491000
heap
page read and write
2436DD9C000
heap
page read and write
2821AC80000
trusted library allocation
page read and write
2821BA10000
trusted library allocation
page read and write
20931C55000
heap
page read and write
9F323FC000
stack
page read and write
3491000
heap
page read and write
3491000
heap
page read and write
DEC000
unkown
page readonly
2436DD7B000
heap
page read and write
3491000
heap
page read and write
2436E202000
heap
page read and write
1A18000
heap
page read and write
2436E202000
heap
page read and write
1A86000
heap
page read and write
3491000
heap
page read and write
DC4000
heap
page read and write
2436DD9C000
heap
page read and write
2436DD71000
heap
page read and write
1A11000
heap
page read and write
1F062BB0000
trusted library section
page read and write
223F7380000
trusted library allocation
page read and write
DC4000
heap
page read and write
8B8D078000
stack
page read and write
1814A502000
heap
page read and write
2436DDA0000
heap
page read and write
DC4000
heap
page read and write
45A367F000
stack
page read and write
1F062D13000
heap
page read and write
3F5F000
stack
page read and write
1A51000
heap
page read and write
2436DD9C000
heap
page read and write
8B8D37E000
stack
page read and write
1F068449000
heap
page read and write
1F062CA1000
heap
page read and write
1F068360000
trusted library allocation
page read and write
DC4000
heap
page read and write
1F068454000
heap
page read and write
1F0684F7000
heap
page read and write
209319F7000
heap
page read and write
DC4000
heap
page read and write
2436D313000
heap
page read and write
5121000
trusted library allocation
page read and write
2436DD81000
heap
page read and write
1A12000
heap
page read and write
8B8D67E000
stack
page read and write
223F7424000
heap
page read and write
1BE8A5B0000
trusted library allocation
page read and write
DC4000
heap
page read and write
1CCE000
stack
page read and write
DC4000
heap
page read and write
1F0680A0000
trusted library allocation
page read and write
1F991C02000
heap
page read and write
20931A13000
heap
page read and write
1A51000
heap
page read and write
DC4000
heap
page read and write
3491000
heap
page read and write
A943B7E000
stack
page read and write
8B8D87F000
stack
page read and write
209319FF000
heap
page read and write
DC4000
heap
page read and write
3491000
heap
page read and write
2821BA20000
heap
page readonly
1F991D13000
heap
page read and write
2CFF9FF000
stack
page read and write
CC9D3F9000
stack
page read and write
19D0000
heap
page read and write
2436DD9A000
heap
page read and write
1F068502000
heap
page read and write
1814A400000
heap
page read and write
1F062C3F000
heap
page read and write
9F32577000
stack
page read and write
223F7E02000
trusted library allocation
page read and write
1F062C75000
heap
page read and write
1F991C7C000
heap
page read and write
DC4000
heap
page read and write
2436D229000
heap
page read and write
67EE8FF000
stack
page read and write
3491000
heap
page read and write
1A10000
heap
page read and write
8D241FF000
stack
page read and write
DC4000
heap
page read and write
553B000
trusted library allocation
page read and write
2436D2A9000
heap
page read and write
1BE8A450000
heap
page read and write
2436E220000
heap
page read and write
1BE8A64F000
heap
page read and write
67EEA7B000
stack
page read and write
552E000
trusted library allocation
page read and write
3491000
heap
page read and write
1A51000
heap
page read and write
1F063D20000
trusted library section
page readonly
DC4000
heap
page read and write
18EF000
unkown
page readonly
2821AB6E000
heap
page read and write
2436D2B3000
heap
page read and write
67EE87B000
stack
page read and write
2436E203000
heap
page read and write
2436E202000
heap
page read and write
DC4000
heap
page read and write
DC4000
heap
page read and write
223F7467000
heap
page read and write
1A51000
heap
page read and write
2821AC60000
trusted library allocation
page read and write
3491000
heap
page read and write
3491000
heap
page read and write
1BE8A4B0000
heap
page read and write
1F068240000
trusted library allocation
page read and write
1F068240000
trusted library allocation
page read and write
20931A16000
heap
page read and write
DC4000
heap
page read and write
16FCE908000
heap
page read and write
2436D2F7000
heap
page read and write
3491000
heap
page read and write
1BE8AE02000
trusted library allocation
page read and write
41E4000
trusted library allocation
page read and write
2436DD6F000
heap
page read and write
1F062C6F000
heap
page read and write
3491000
heap
page read and write
1F0684E6000
heap
page read and write
3491000
heap
page read and write
1F062A30000
heap
page read and write
3E5E000
stack
page read and write
8B8D7FF000
stack
page read and write
2436D2EA000
heap
page read and write
2436DD50000
heap
page read and write
2436DD00000
heap
page read and write
16FCE590000
heap
page read and write
223F745D000
heap
page read and write
2436DAF0000
remote allocation
page read and write
DC4000
heap
page read and write
2436DD71000
heap
page read and write
DC0000
heap
page read and write
1A16000
heap
page read and write
2436D2FB000
heap
page read and write
1F991C57000
heap
page read and write
DC4000
heap
page read and write
223F7400000
heap
page read and write
DC4000
heap
page read and write
2436D1C0000
trusted library allocation
page read and write
2436D200000
heap
page read and write
2436DD5B000
heap
page read and write
DC4000
heap
page read and write
A94367E000
stack
page read and write
2821BA30000
trusted library allocation
page read and write
1A74000
heap
page read and write
1F06842C000
heap
page read and write
DC4000
heap
page read and write
2436D213000
heap
page read and write
1F068264000
trusted library allocation
page read and write
DC900FB000
stack
page read and write
2436DD81000
heap
page read and write
1F0683A0000
remote allocation
page read and write
16FCE902000
heap
page read and write
1F991D00000
heap
page read and write
1BE8A713000
heap
page read and write
1F068350000
trusted library allocation
page read and write
1814A466000
heap
page read and write
1F991C28000
heap
page read and write
3491000
heap
page read and write
16FCE900000
heap
page read and write
8D23DBF000
stack
page read and write
223F743C000
heap
page read and write
1F068261000
trusted library allocation
page read and write
5518000
trusted library allocation
page read and write
1F068284000
trusted library allocation
page read and write
1F062C58000
heap
page read and write
1F062AA0000
heap
page read and write
5120000
trusted library allocation
page read and write
DC4000
heap
page read and write
1F062BA0000
trusted library allocation
page read and write
DC4000
heap
page read and write
E1B000
unkown
page execute read
38D0000
heap
page read and write
8D24278000
stack
page read and write
2436D286000
heap
page read and write
9F31FEC000
stack
page read and write
45A33BC000
stack
page read and write
DC4000
heap
page read and write
2436DD16000
heap
page read and write
2821AB6E000
heap
page read and write
DC4000
heap
page read and write
11E9000
unkown
page write copy
1F0684B9000
heap
page read and write
8B8D97E000
stack
page read and write
DC904FC000
stack
page read and write
1F06843C000
heap
page read and write
DC4000
heap
page read and write
1F9923C0000
trusted library allocation
page read and write
2436DD9A000
heap
page read and write
DC4000
heap
page read and write
11EA000
unkown
page execute read
2436DD9A000
heap
page read and write
DC4000
heap
page read and write
1F063518000
heap
page read and write
2436DD66000
heap
page read and write
552E000
trusted library allocation
page read and write
1F068270000
trusted library allocation
page read and write
DC4000
heap
page read and write
8B8DB7F000
stack
page read and write
2821AB87000
heap
page read and write
223F7500000
heap
page read and write
209319E6000
heap
page read and write
1A12000
heap
page read and write
DE1000
unkown
page execute read
5536000
trusted library allocation
page read and write
DC4000
heap
page read and write
5526000
trusted library allocation
page read and write
1A74000
heap
page read and write
1A74000
heap
page read and write
2436E202000
heap
page read and write
1F063513000
heap
page read and write
2436DD71000
heap
page read and write
2436DD81000
heap
page read and write
8B8D17D000
stack
page read and write
1F068270000
trusted library allocation
page read and write
3491000
heap
page read and write
DC4000
heap
page read and write
2436D2D1000
heap
page read and write
3491000
heap
page read and write
2436DD7B000
heap
page read and write
1F062C29000
heap
page read and write
5527000
trusted library allocation
page read and write
9F328FF000
unkown
page read and write
2436DD80000
heap
page read and write
2436D130000
heap
page read and write
18EF000
unkown
page readonly
1F068120000
trusted library allocation
page read and write
3491000
heap
page read and write
1BE8A63C000
heap
page read and write
3491000
heap
page read and write
553C000
trusted library allocation
page read and write
2436DD9C000
heap
page read and write
1F062C91000
heap
page read and write
DC4000
heap
page read and write
2436DD79000
heap
page read and write
1F063BF0000
trusted library allocation
page read and write
1814A200000
heap
page read and write
1BE8A440000
heap
page read and write
2821AB6E000
heap
page read and write
2436DD9E000
heap
page read and write
1BE8A670000
heap
page read and write
DC4000
heap
page read and write
2821A980000
heap
page read and write
2436DD71000
heap
page read and write
1F068280000
trusted library allocation
page read and write
2436D2C5000
heap
page read and write
1F062C79000
heap
page read and write
8B8D27A000
stack
page read and write
2436E202000
heap
page read and write
209319FF000
heap
page read and write
1A0F000
heap
page read and write
2436D2D4000
heap
page read and write
553C000
trusted library allocation
page read and write
1F063500000
heap
page read and write
DC908FC000
stack
page read and write
2436DD81000
heap
page read and write
900000
heap
page read and write
1F064093000
trusted library allocation
page read and write
553C000
trusted library allocation
page read and write
1F0640A0000
trusted library allocation
page read and write
5127000
trusted library allocation
page read and write
2436DD78000
heap
page read and write
3491000
heap
page read and write
2436D2BE000
heap
page read and write
9F3287E000
stack
page read and write
1814A42C000
heap
page read and write
2436DD94000
heap
page read and write
1814A413000
heap
page read and write
223F7481000
heap
page read and write
1BE8A652000
heap
page read and write
1A0B000
heap
page read and write
8B8CE7B000
stack
page read and write
DC4000
heap
page read and write
1A76000
heap
page read and write
3491000
heap
page read and write
20931950000
heap
page read and write
3491000
heap
page read and write
209319E6000
heap
page read and write
20931A15000
heap
page read and write
2CFF7FB000
stack
page read and write
45A3BFE000
stack
page read and write
1A51000
heap
page read and write
52DF000
trusted library allocation
page read and write
2436D302000
heap
page read and write
1814A43C000
heap
page read and write
209319DB000
heap
page read and write
1BE8A66D000
heap
page read and write
A94332C000
stack
page read and write
2CFFBFF000
stack
page read and write
1F991D02000
heap
page read and write
2436E202000
heap
page read and write
223F72F0000
heap
page read and write
1F991C3F000
heap
page read and write
3491000
heap
page read and write
2CFF8F7000
stack
page read and write
DC4000
heap
page read and write
2436DD81000
heap
page read and write
1F0684AF000
heap
page read and write
DC4000
heap
page read and write
2436D2E1000
heap
page read and write
450F000
trusted library allocation
page read and write
1F062D26000
heap
page read and write
9D0000
trusted library allocation
page read and write
16FCE913000
heap
page read and write
1F063CD0000
trusted library section
page readonly
1BE8A708000
heap
page read and write
2436DDC0000
heap
page read and write
16FCE888000
heap
page read and write
1F062C00000
heap
page read and write
DC4000
heap
page read and write
3491000
heap
page read and write
2436DD7B000
heap
page read and write
2436E202000
heap
page read and write
1A0B000
heap
page read and write
2821AC50000
trusted library allocation
page read and write
411E000
stack
page read and write
16FCE84F000
heap
page read and write
1BE8A700000
heap
page read and write
2821AAE0000
heap
page read and write
209319F2000
heap
page read and write
5220000
trusted library allocation
page read and write
1A86000
heap
page read and write
1BE8A702000
heap
page read and write
3491000
heap
page read and write
DC4000
heap
page read and write
1F068461000
heap
page read and write
1F0684FD000
heap
page read and write
1F0684F0000
heap
page read and write
5223000
trusted library allocation
page read and write
512A000
trusted library allocation
page read and write
462D000
trusted library allocation
page read and write
38A0000
heap
page read and write
5527000
trusted library allocation
page read and write
223F745B000
heap
page read and write
DC4000
heap
page read and write
2436DD92000
heap
page read and write
1A87000
heap
page read and write
1F062CFD000
heap
page read and write
9F322FE000
stack
page read and write
1F0684E1000
heap
page read and write
2436DD7B000
heap
page read and write
DC4000
heap
page read and write
2436DD79000
heap
page read and write
1E70000
heap
page read and write
1A86000
heap
page read and write
2436DD62000
heap
page read and write
16FCE800000
heap
page read and write
DC4000
heap
page read and write
DC4000
heap
page read and write
1A18000
heap
page read and write
8B8D6FF000
stack
page read and write
2CFF3EE000
stack
page read and write
1A15000
heap
page read and write
2821AB20000
heap
page read and write
553C000
trusted library allocation
page read and write
1A86000
heap
page read and write
3491000
heap
page read and write
DC4000
heap
page read and write
1A1B000
heap
page read and write
1A1B000
heap
page read and write
2436DDA0000
heap
page read and write
8D240F9000
stack
page read and write
DC4000
heap
page read and write
2436DD76000
heap
page read and write
1A86000
heap
page read and write
1F0684B8000
heap
page read and write
DE0000
unkown
page readonly
DE0000
unkown
page readonly
DC4000
heap
page read and write
1F991C00000
heap
page read and write
5527000
trusted library allocation
page read and write
223F7350000
heap
page read and write
2821AB90000
heap
page read and write
DC4000
heap
page read and write
8B8D77F000
stack
page read and write
DC4000
heap
page read and write
209319F6000
heap
page read and write
2821BA40000
trusted library allocation
page read and write
3491000
heap
page read and write
9F32678000
stack
page read and write
9F3227E000
stack
page read and write
1F0683A0000
trusted library allocation
page read and write
DC905FB000
stack
page read and write
2821AC70000
heap
page read and write
1BE8A66D000
heap
page read and write
2436D23C000
heap
page read and write
3491000
heap
page read and write
1A18000
heap
page read and write
DC4000
heap
page read and write
DC4000
heap
page read and write
1F068500000
heap
page read and write
223F7513000
heap
page read and write
1F062C8B000
heap
page read and write
2821AAC0000
heap
page read and write
67EEC77000
stack
page read and write
1F06849D000
heap
page read and write
3491000
heap
page read and write
67EED7E000
stack
page read and write
2436DD79000
heap
page read and write
2436DD2B000
heap
page read and write
5527000
trusted library allocation
page read and write
DC4000
heap
page read and write
DC4000
heap
page read and write
381C000
stack
page read and write
DC4000
heap
page read and write
1F063D10000
trusted library section
page readonly
1F063CE0000
trusted library section
page readonly
1A1B000
heap
page read and write
3490000
heap
page read and write
409F000
stack
page read and write
9F329F9000
stack
page read and write
DC4000
heap
page read and write
3491000
heap
page read and write
2436D280000
heap
page read and write
2436DD7C000
heap
page read and write
16FCE846000
heap
page read and write
DC4000
heap
page read and write
16FCE5A0000
heap
page read and write
2436DD75000
heap
page read and write
DC906F7000
stack
page read and write
16FCE859000
heap
page read and write
2436D2C1000
heap
page read and write
5516000
trusted library allocation
page read and write
DC4000
heap
page read and write
1BCE000
stack
page read and write
1F991AB0000
heap
page read and write
DC4000
heap
page read and write
2436DD7B000
heap
page read and write
1F064090000
trusted library allocation
page read and write
16FCE88F000
heap
page read and write
There are 740 hidden memdumps, click here to show them.