IOC Report
Gulvmaattens.exe

loading gif

Files

File Path
Type
Category
Malicious
Gulvmaattens.exe
PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
initial sample
malicious
C:\Users\user\AppData\Local\Temp\nso786B.tmp\System.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\nso786B.tmp\nsExec.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\Falder99\Interelectrode\Overvejendes\Airplane_2.bmp
JPEG image data, JFIF standard 1.01, resolution (DPI), density 100x100, segment length 16, Exif Standard: [TIFF image data, big-endian, direntries=3], baseline, precision 8, 110x110, frames 3
dropped
C:\Users\user\Falder99\Interelectrode\Overvejendes\Dystomic.Bel
ASCII text, with very long lines, with no line terminators
dropped
C:\Users\user\Falder99\Interelectrode\Overvejendes\Pleasurelessly\Anodiserende.opa
data
dropped
C:\Users\user\Falder99\Interelectrode\Overvejendes\english.txt
ASCII text
dropped
C:\Users\user\Falder99\Interelectrode\Overvejendes\sqmapi.dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\Falder99\Interelectrode\Overvejendes\vfslog.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\Gulvmaattens.exe
"C:\Users\user\Desktop\Gulvmaattens.exe"
malicious
C:\Windows\SysWOW64\cmd.exe
cmd.exe /c set /a "0x78^51"
malicious
C:\Windows\SysWOW64\cmd.exe
cmd.exe /c set /a "0x76^51"
malicious
C:\Windows\SysWOW64\cmd.exe
cmd.exe /c set /a "0x61^51"
malicious
C:\Windows\SysWOW64\cmd.exe
cmd.exe /c set /a "0x7D^51"
malicious
C:\Windows\SysWOW64\cmd.exe
cmd.exe /c set /a "0x76^51"
malicious
C:\Windows\SysWOW64\cmd.exe
cmd.exe /c set /a "0x7F^51"
malicious
C:\Windows\SysWOW64\cmd.exe
cmd.exe /c set /a "0x00^51"
malicious
C:\Windows\SysWOW64\cmd.exe
cmd.exe /c set /a "0x01^51"
malicious
C:\Windows\SysWOW64\cmd.exe
cmd.exe /c set /a "0x09^51"
malicious
C:\Windows\SysWOW64\cmd.exe
cmd.exe /c set /a "0x09^51"
malicious
C:\Windows\SysWOW64\cmd.exe
cmd.exe /c set /a "0x70^51"
malicious
C:\Windows\SysWOW64\cmd.exe
cmd.exe /c set /a "0x41^51"
malicious
C:\Windows\SysWOW64\cmd.exe
cmd.exe /c set /a "0x56^51"
malicious
C:\Windows\SysWOW64\cmd.exe
cmd.exe /c set /a "0x52^51"
malicious
C:\Windows\SysWOW64\cmd.exe
cmd.exe /c set /a "0x47^51"
malicious
C:\Windows\SysWOW64\cmd.exe
cmd.exe /c set /a "0x56^51"
malicious
C:\Windows\SysWOW64\cmd.exe
cmd.exe /c set /a "0x75^51"
malicious
C:\Windows\SysWOW64\cmd.exe
cmd.exe /c set /a "0x5A^51"
malicious
C:\Windows\SysWOW64\cmd.exe
cmd.exe /c set /a "0x5F^51"
malicious
C:\Windows\SysWOW64\cmd.exe
cmd.exe /c set /a "0x56^51"
malicious
C:\Windows\SysWOW64\cmd.exe
cmd.exe /c set /a "0x72^51"
malicious
C:\Windows\SysWOW64\cmd.exe
cmd.exe /c set /a "0x1B^51"
malicious
C:\Windows\SysWOW64\cmd.exe
cmd.exe /c set /a "0x5E^51"
malicious
C:\Windows\SysWOW64\cmd.exe
cmd.exe /c set /a "0x13^51"
malicious
C:\Windows\SysWOW64\cmd.exe
cmd.exe /c set /a "0x41^51"
malicious
C:\Windows\SysWOW64\cmd.exe
cmd.exe /c set /a "0x07^51"
malicious
C:\Windows\SysWOW64\cmd.exe
cmd.exe /c set /a "0x13^51"
malicious
C:\Windows\SysWOW64\cmd.exe
cmd.exe /c set /a "0x1F^51"
malicious
C:\Windows\SysWOW64\cmd.exe
cmd.exe /c set /a "0x13^51"
malicious
C:\Windows\SysWOW64\cmd.exe
cmd.exe /c set /a "0x5A^51"
malicious
C:\Windows\SysWOW64\cmd.exe
cmd.exe /c set /a "0x13^51"
malicious
C:\Windows\SysWOW64\cmd.exe
cmd.exe /c set /a "0x03^51"
malicious
C:\Windows\SysWOW64\cmd.exe
cmd.exe /c set /a "0x4B^51"
malicious
C:\Windows\SysWOW64\cmd.exe
cmd.exe /c set /a "0x0B^51"
malicious
C:\Windows\SysWOW64\cmd.exe
cmd.exe /c set /a "0x03^51"
malicious
C:\Windows\SysWOW64\cmd.exe
cmd.exe /c set /a "0x03^51"
malicious
C:\Windows\SysWOW64\cmd.exe
cmd.exe /c set /a "0x03^51"
malicious
C:\Windows\SysWOW64\cmd.exe
cmd.exe /c set /a "0x03^51"
malicious
C:\Windows\SysWOW64\cmd.exe
cmd.exe /c set /a "0x03^51"
malicious
C:\Windows\SysWOW64\cmd.exe
cmd.exe /c set /a "0x03^51"
malicious
C:\Windows\SysWOW64\cmd.exe
cmd.exe /c set /a "0x03^51"
malicious
C:\Windows\SysWOW64\cmd.exe
cmd.exe /c set /a "0x1F^51"
malicious
C:\Windows\SysWOW64\cmd.exe
cmd.exe /c set /a "0x13^51"
malicious
C:\Windows\SysWOW64\cmd.exe
cmd.exe /c set /a "0x5A^51"
malicious
C:\Windows\SysWOW64\cmd.exe
cmd.exe /c set /a "0x13^51"
malicious
C:\Windows\SysWOW64\cmd.exe
cmd.exe /c set /a "0x03^51"
malicious
C:\Windows\SysWOW64\cmd.exe
cmd.exe /c set /a "0x1F^51"
malicious
C:\Windows\SysWOW64\cmd.exe
cmd.exe /c set /a "0x13^51"
malicious
C:\Windows\SysWOW64\cmd.exe
cmd.exe /c set /a "0x43^51"
malicious
C:\Windows\SysWOW64\cmd.exe
cmd.exe /c set /a "0x13^51"
malicious
C:\Windows\SysWOW64\cmd.exe
cmd.exe /c set /a "0x03^51"
malicious
C:\Windows\SysWOW64\cmd.exe
cmd.exe /c set /a "0x1F^51"
malicious
C:\Windows\SysWOW64\cmd.exe
cmd.exe /c set /a "0x13^51"
malicious
C:\Windows\SysWOW64\cmd.exe
cmd.exe /c set /a "0x5A^51"
malicious
C:\Windows\SysWOW64\cmd.exe
cmd.exe /c set /a "0x13^51"
malicious
C:\Windows\SysWOW64\cmd.exe
cmd.exe /c set /a "0x07^51"
malicious
C:\Windows\SysWOW64\cmd.exe
cmd.exe /c set /a "0x1F^51"
malicious
C:\Windows\SysWOW64\cmd.exe
cmd.exe /c set /a "0x13^51"
malicious
C:\Windows\SysWOW64\cmd.exe
cmd.exe /c set /a "0x5A^51"
malicious
C:\Windows\SysWOW64\cmd.exe
cmd.exe /c set /a "0x13^51"
malicious
C:\Windows\SysWOW64\cmd.exe
cmd.exe /c set /a "0x03^51"
malicious
C:\Windows\SysWOW64\cmd.exe
cmd.exe /c set /a "0x4B^51"
malicious
C:\Windows\SysWOW64\cmd.exe
cmd.exe /c set /a "0x0B^51"
malicious
C:\Windows\SysWOW64\cmd.exe
cmd.exe /c set /a "0x03^51"
malicious
C:\Windows\System32\Conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\Conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\Conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\Conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\Conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\Conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\Conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\Conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\Conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\Conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\Conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\Conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\Conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\Conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\Conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\Conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\Conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\Conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\Conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\Conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\Conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\Conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\Conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\Conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\Conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\Conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\Conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\Conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\Conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\Conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\Conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\Conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\Conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\Conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\Conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\Conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\Conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\Conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\Conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\Conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\Conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\Conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\Conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\Conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\Conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\Conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\Conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\Conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\Conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\Conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\Conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\Conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\Conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\Conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\Conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\Conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\Conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\Conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\Conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\Conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\Conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\Conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\Conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\Conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
There are 119 hidden processes, click here to show them.

URLs

Name
IP
Malicious
http://crl.certum.pl/ctnca2.crl0l
unknown
http://repository.certum.pl/ctnca2.cer09
unknown
http://crl.certum.pl/ctsca2021.crl0o
unknown
http://repository.certum.pl/ctnca.cer09
unknown
http://nsis.sf.net/NSIS_ErrorError
unknown
http://repository.certum.pl/ctsca2021.cer0
unknown
http://crl.certum.pl/ctnca.crl0k
unknown
http://subca.ocsp-certum.com05
unknown
http://www.certum.pl/CPS0
unknown
http://subca.ocsp-certum.com02
unknown
http://subca.ocsp-certum.com01
unknown
There are 1 hidden URLs, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
760000
direct allocation
page execute and read and write
malicious
1D03D480000
heap
page read and write
2A802A7E000
heap
page read and write
3846BBB000
stack
page read and write
400000
unkown
page readonly
5845FF7000
stack
page read and write
42C000
unkown
page read and write
1D03D170000
heap
page read and write
1D03D48B000
heap
page read and write
1D49B050000
heap
page read and write
1ECC1C23000
heap
page read and write
1ECBD530000
trusted library section
page readonly
2A80359E000
heap
page read and write
2A80359E000
heap
page read and write
584657F000
stack
page read and write
440000
unkown
page read and write
2A803A05000
heap
page read and write
2A802AEF000
heap
page read and write
401000
unkown
page execute read
2A80359E000
heap
page read and write
15B9622E000
heap
page read and write
CA986F9000
stack
page read and write
1ECBD510000
trusted library section
page readonly
1871E126000
heap
page read and write
2A803594000
heap
page read and write
472B7F7000
stack
page read and write
1ECBD540000
trusted library section
page readonly
1871E122000
heap
page read and write
2A802950000
heap
page read and write
1ECC1CE8000
heap
page read and write
2A80358C000
heap
page read and write
1D03D1A0000
heap
page read and write
277F000
stack
page read and write
2A803320000
remote allocation
page read and write
1D49B102000
heap
page read and write
15B96282000
heap
page read and write
2A803A04000
heap
page read and write
138F6CA000
stack
page read and write
1ECBD310000
trusted library allocation
page read and write
1ECC1CF2000
heap
page read and write
1ECBD500000
trusted library section
page readonly
2310000
trusted library allocation
page read and write
38470FB000
stack
page read and write
15B96261000
heap
page read and write
CA9837F000
stack
page read and write
1871E14E000
heap
page read and write
1ECBC380000
trusted library section
page read and write
2A803590000
heap
page read and write
38471F7000
stack
page read and write
1ECC1B70000
trusted library allocation
page read and write
15B96213000
heap
page read and write
1ECC2000000
heap
page read and write
2A80358A000
heap
page read and write
1D03D490000
trusted library allocation
page read and write
15B96313000
heap
page read and write
1ECC1A40000
trusted library allocation
page read and write
408000
unkown
page readonly
2A802A4A000
heap
page read and write
38473FE000
stack
page read and write
1ECC1D00000
heap
page read and write
2A803A02000
heap
page read and write
1E47BC56000
heap
page read and write
CA983FF000
stack
page read and write
2A8035B4000
heap
page read and write
5846AFE000
stack
page read and write
1D03D1DE000
heap
page read and write
1ECC1A1E000
trusted library allocation
page read and write
2A80358E000
heap
page read and write
1D03D1D6000
heap
page read and write
138FAF9000
stack
page read and write
1B461513000
heap
page read and write
6B3000
heap
page read and write
1ECBC441000
heap
page read and write
2A803575000
heap
page read and write
1E47BB80000
heap
page read and write
1D03D485000
heap
page read and write
89E1CDB000
stack
page read and write
1ECC1CFB000
heap
page read and write
2A8029C0000
heap
page read and write
CA982FB000
stack
page read and write
6F6A1000
unkown
page execute read
1ECC1B50000
trusted library allocation
page read and write
2A803516000
heap
page read and write
1D49B086000
heap
page read and write
1871E13F000
heap
page read and write
1ECBC477000
heap
page read and write
660000
heap
page read and write
600000
heap
page read and write
99000
stack
page read and write
1E47BC13000
heap
page read and write
1ECBC472000
heap
page read and write
8B0D8FF000
stack
page read and write
1ECC1C43000
heap
page read and write
1D49AF50000
heap
page read and write
1ECC18F0000
trusted library allocation
page read and write
2A803590000
heap
page read and write
2A8035A1000
heap
page read and write
2A802B08000
heap
page read and write
2A802B13000
heap
page read and write
138F7CF000
stack
page read and write
138F74F000
stack
page read and write
CA9877F000
stack
page read and write
2A8029F0000
trusted library allocation
page read and write
2A803A04000
heap
page read and write
8B0DAFF000
stack
page read and write
15B96A02000
trusted library allocation
page read and write
1871E131000
heap
page read and write
1ECC1CDB000
heap
page read and write
2A803590000
heap
page read and write
2200000
heap
page read and write
2940000
trusted library allocation
page read and write
8B0D57B000
stack
page read and write
1ECBC3E1000
trusted library allocation
page read and write
2A802960000
heap
page read and write
2A803A44000
heap
page read and write
1ECBC458000
heap
page read and write
2A80359E000
heap
page read and write
1E47BC7B000
heap
page read and write
1ECBC200000
heap
page read and write
1B461468000
heap
page read and write
30000
heap
page read and write
1ECBC400000
heap
page read and write
1ECBCC15000
heap
page read and write
2A802AF1000
heap
page read and write
2A8035C5000
heap
page read and write
8B0D12C000
stack
page read and write
1ECBCD18000
heap
page read and write
2A803594000
heap
page read and write
693000
heap
page read and write
CA98879000
stack
page read and write
1ECC1A18000
trusted library allocation
page read and write
1ECC1CB1000
heap
page read and write
8B0D47D000
stack
page read and write
1D03D3B0000
trusted library allocation
page read and write
1B461428000
heap
page read and write
408000
unkown
page readonly
606000
heap
page read and write
2A80358B000
heap
page read and write
1E47BC00000
heap
page read and write
1D49B048000
heap
page read and write
1ECC1C64000
heap
page read and write
472B9FD000
stack
page read and write
1871E14F000
heap
page read and write
15B9625C000
heap
page read and write
1ECBD520000
trusted library section
page readonly
230F000
stack
page read and write
4B0000
heap
page read and write
3846EFF000
stack
page read and write
1871E154000
heap
page read and write
2A8035B4000
heap
page read and write
1ECC1A54000
trusted library allocation
page read and write
2A80358C000
heap
page read and write
472B12B000
stack
page read and write
1B461456000
heap
page read and write
1871E135000
heap
page read and write
2A802A8A000
heap
page read and write
1871E136000
heap
page read and write
2A803500000
heap
page read and write
438000
unkown
page read and write
1ECC1C12000
heap
page read and write
15B95FE0000
heap
page read and write
15B96140000
trusted library allocation
page read and write
58463FB000
stack
page read and write
CF79EFE000
stack
page read and write
1ECC1A31000
trusted library allocation
page read and write
15B96302000
heap
page read and write
CF79FF8000
stack
page read and write
1ECBD300000
trusted library allocation
page read and write
15B96260000
heap
page read and write
15B95FD0000
heap
page read and write
2A8035A4000
heap
page read and write
CF7A1F7000
stack
page read and write
1E47BC88000
heap
page read and write
472BAFF000
stack
page read and write
8B0D5FF000
stack
page read and write
CF7A37F000
unkown
page read and write
58462FE000
stack
page read and write
1871E127000
heap
page read and write
1871E360000
heap
page read and write
1D03D190000
heap
page read and write
2A8035A4000
heap
page read and write
1E47BD13000
heap
page read and write
2A803A04000
heap
page read and write
1E47BC4A000
heap
page read and write
2A802A00000
heap
page read and write
590000
trusted library allocation
page read and write
2A803594000
heap
page read and write
1D03D489000
heap
page read and write
2A803A02000
heap
page read and write
2A803A04000
heap
page read and write
3846FFB000
stack
page read and write
1B461300000
heap
page read and write
1D49B07B000
heap
page read and write
2A803597000
heap
page read and write
3846E7E000
stack
page read and write
2A803A04000
heap
page read and write
2A802ADB000
heap
page read and write
6A3000
heap
page read and write
2334000
heap
page read and write
400000
unkown
page readonly
89E24FE000
stack
page read and write
1871E110000
heap
page read and write
6AE000
heap
page read and write
697000
heap
page read and write
2A802AB5000
heap
page read and write
1871E130000
heap
page read and write
1ECBC4BD000
heap
page read and write
2A80358E000
heap
page read and write
58464FB000
stack
page read and write
1D49B029000
heap
page read and write
1D03D206000
heap
page read and write
1E47BC8C000
heap
page read and write
1ECC1CA9000
heap
page read and write
45F000
unkown
page readonly
138FA79000
stack
page read and write
15B96264000
heap
page read and write
58465FF000
stack
page read and write
1E47BC3C000
heap
page read and write
1D49B08A000
heap
page read and write
15B96278000
heap
page read and write
2A802A5C000
heap
page read and write
2A8035C8000
heap
page read and write
2A802A29000
heap
page read and write
1ECBC413000
heap
page read and write
1ECBD320000
trusted library allocation
page read and write
2A802AE4000
heap
page read and write
2A80358C000
heap
page read and write
1D03D198000
heap
page read and write
6AC000
heap
page read and write
2A803597000
heap
page read and write
1D49B04B000
heap
page read and write
2A803594000
heap
page read and write
1D49B04D000
heap
page read and write
1D03D150000
heap
page read and write
1871DED0000
heap
page read and write
1D49B04F000
heap
page read and write
2A8035AF000
heap
page read and write
1D03D0F0000
trusted library allocation
page read and write
2A8035A7000
heap
page read and write
2A802AAB000
heap
page read and write
584667F000
stack
page read and write
2A803519000
heap
page read and write
2A80358F000
heap
page read and write
1E47BC53000
heap
page read and write
CA98679000
stack
page read and write
1ECBCC02000
heap
page read and write
1ECC1CFB000
heap
page read and write
1ECC1A34000
trusted library allocation
page read and write
2A802B16000
heap
page read and write
2A802A49000
heap
page read and write
19A000
stack
page read and write
1ECBD4F0000
trusted library section
page readonly
1ECC1B70000
remote allocation
page read and write
89E23FE000
stack
page read and write
1ECBD890000
trusted library allocation
page read and write
1ECC1C00000
heap
page read and write
2A803A04000
heap
page read and write
1B461402000
heap
page read and write
138FBFC000
stack
page read and write
1B46143C000
heap
page read and write
2A802AC9000
heap
page read and write
1871E137000
heap
page read and write
1D49BA02000
trusted library allocation
page read and write
1ECBCD02000
heap
page read and write
1E47BC4C000
heap
page read and write
1ECBCD00000
heap
page read and write
1ECBC429000
heap
page read and write
1ECBC490000
heap
page read and write
2A803320000
remote allocation
page read and write
620000
heap
page read and write
1ECC1A50000
trusted library allocation
page read and write
1B461470000
heap
page read and write
45B000
unkown
page read and write
1D03D460000
trusted library allocation
page read and write
1ECBC49F000
heap
page read and write
38472FF000
stack
page read and write
2A803586000
heap
page read and write
1871E000000
heap
page read and write
CF7A478000
stack
page read and write
1ECC1C30000
heap
page read and write
1D49B000000
heap
page read and write
1ECC1A30000
trusted library allocation
page read and write
8B0D7F7000
stack
page read and write
2A803402000
heap
page read and write
2FFE000
stack
page read and write
1D49B052000
heap
page read and write
2330000
heap
page read and write
2A8035CF000
heap
page read and write
1ECC1B20000
trusted library allocation
page read and write
6F6A4000
unkown
page readonly
15B9625D000
heap
page read and write
58467FF000
stack
page read and write
217E000
stack
page read and write
15B96229000
heap
page read and write
2A802B02000
heap
page read and write
1ECBCF01000
trusted library allocation
page read and write
1D49B049000
heap
page read and write
1ECBCC00000
heap
page read and write
1D49B03C000
heap
page read and write
1B461413000
heap
page read and write
431000
unkown
page read and write
668000
heap
page read and write
1B461370000
heap
page read and write
1E47BB20000
heap
page read and write
1ECBD303000
trusted library allocation
page read and write
472B8FE000
stack
page read and write
1ECC1A10000
trusted library allocation
page read and write
472B57B000
stack
page read and write
CA987F9000
stack
page read and write
1ECC1B70000
remote allocation
page read and write
1D03D420000
trusted library allocation
page read and write
1ECBC270000
heap
page read and write
1D49B053000
heap
page read and write
2A8035A4000
heap
page read and write
2A803A22000
heap
page read and write
1ECC1A10000
trusted library allocation
page read and write
2A803553000
heap
page read and write
2A803320000
remote allocation
page read and write
15B96040000
heap
page read and write
4B5000
heap
page read and write
1ECBC210000
heap
page read and write
2A802A3C000
heap
page read and write
2A803588000
heap
page read and write
213E000
stack
page read and write
1E47BC51000
heap
page read and write
2A802AFC000
heap
page read and write
1B461478000
heap
page read and write
2A80351B000
heap
page read and write
89E21FB000
stack
page read and write
CF79CFE000
stack
page read and write
1E47BC4F000
heap
page read and write
CF79D7E000
stack
page read and write
472B47E000
stack
page read and write
1ECC1CF5000
heap
page read and write
58468FC000
stack
page read and write
40A000
unkown
page read and write
1E47BC26000
heap
page read and write
2A803591000
heap
page read and write
1D49B113000
heap
page read and write
1D49AF40000
heap
page read and write
1ECBC370000
trusted library allocation
page read and write
1ECC1A40000
trusted library allocation
page read and write
1ECC1B70000
remote allocation
page read and write
15B96200000
heap
page read and write
1ECBC4FF000
heap
page read and write
2A803A00000
heap
page read and write
1D03D0E0000
heap
page read and write
15B96308000
heap
page read and write
2A803A04000
heap
page read and write
1D03E1F0000
trusted library allocation
page read and write
1ECC1CE2000
heap
page read and write
2A80359E000
heap
page read and write
2A803596000
heap
page read and write
1ECC1B40000
trusted library allocation
page read and write
1E47BD08000
heap
page read and write
1D03DF80000
trusted library allocation
page read and write
2A80358C000
heap
page read and write
58460FA000
stack
page read and write
1E47BC29000
heap
page read and write
1B461E02000
trusted library allocation
page read and write
1E47BD02000
heap
page read and write
45F000
unkown
page readonly
1B461310000
heap
page read and write
1D49AFE0000
trusted library allocation
page read and write
2A80358E000
heap
page read and write
1E47BBB0000
trusted library allocation
page read and write
15B96300000
heap
page read and write
CF7A0F7000
stack
page read and write
8B0D9FF000
stack
page read and write
1ECBC48E000
heap
page read and write
1ECC1D02000
heap
page read and write
138FB7F000
stack
page read and write
1ECC1AE0000
trusted library allocation
page read and write
2A802A13000
heap
page read and write
1D49B108000
heap
page read and write
CF7A2FE000
stack
page read and write
15B96267000
heap
page read and write
1B461400000
heap
page read and write
1D03E1A0000
trusted library allocation
page read and write
1ECC1C9E000
heap
page read and write
2A803586000
heap
page read and write
1ECBC494000
heap
page read and write
1ECC1B60000
trusted library allocation
page read and write
1E47C602000
trusted library allocation
page read and write
1871E020000
heap
page read and write
1D03E190000
trusted library allocation
page read and write
5845BEB000
stack
page read and write
1E47BC70000
heap
page read and write
1E47BD00000
heap
page read and write
58461F9000
stack
page read and write
1871E13F000
heap
page read and write
58466FE000
stack
page read and write
1B4613A0000
trusted library allocation
page read and write
1ECBCD13000
heap
page read and write
6F6A6000
unkown
page readonly
1D49AFB0000
heap
page read and write
2A802AC2000
heap
page read and write
1D03D470000
heap
page readonly
2A802AAB000
heap
page read and write
1ECBC513000
heap
page read and write
1ECC1D02000
heap
page read and write
1B461502000
heap
page read and write
1D03D1DE000
heap
page read and write
1871E13F000
heap
page read and write
6AC000
heap
page read and write
1B461500000
heap
page read and write
1ECBC47A000
heap
page read and write
1871E365000
heap
page read and write
CF79C7B000
stack
page read and write
6F6A0000
unkown
page readonly
1ECBCD18000
heap
page read and write
1ECBD410000
trusted library allocation
page read and write
1D49B100000
heap
page read and write
1D03D3C0000
trusted library allocation
page read and write
1E47BB10000
heap
page read and write
1ECC1B30000
trusted library allocation
page read and write
472B67B000
stack
page read and write
8B0D6FB000
stack
page read and write
2A802AF2000
heap
page read and write
2A80358E000
heap
page read and write
15B9623C000
heap
page read and write
1D03D1DE000
heap
page read and write
2A8035D5000
heap
page read and write
2A8035A4000
heap
page read and write
2780000
heap
page read and write
2A802A5B000
heap
page read and write
1D49B04C000
heap
page read and write
8B0D1AE000
stack
page read and write
1ECBC502000
heap
page read and write
2EFD000
stack
page read and write
1871E11B000
heap
page read and write
1871E155000
heap
page read and write
1871E133000
heap
page read and write
1ECBC47C000
heap
page read and write
2A802A7E000
heap
page read and write
1ECC1C50000
heap
page read and write
1ECC1CFD000
heap
page read and write
40A000
unkown
page write copy
89E22FB000
stack
page read and write
6A9000
heap
page read and write
584677E000
stack
page read and write
1D49B070000
heap
page read and write
401000
unkown
page execute read
1ECC1900000
trusted library allocation
page read and write
21F0000
trusted library allocation
page read and write
1D49B013000
heap
page read and write
6AC000
heap
page read and write
472B6FE000
stack
page read and write
472B1AE000
stack
page read and write
There are 439 hidden memdumps, click here to show them.