IOC Report
itVg5XA6eK.exe

loading gif

Files

File Path
Type
Category
Malicious
itVg5XA6eK.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
initial sample
malicious
C:\ProgramData\rejdit_free_fire.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\CLR_v2.0_32\UsageLogs\itVg5XA6eK.exe.log
ASCII text, with CRLF line terminators
dropped
malicious
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\869b16e2825dce24066aba38ee1a9add.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\CLR_v2.0_32\UsageLogs\rejdit_free_fire.exe.log
ASCII text, with CRLF line terminators
dropped
\Device\ConDrv
ASCII text, with CRLF line terminators
dropped

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\itVg5XA6eK.exe
C:\Users\user\Desktop\itVg5XA6eK.exe
malicious
C:\ProgramData\rejdit_free_fire.exe
"C:\ProgramData\rejdit_free_fire.exe"
malicious
C:\Windows\SysWOW64\netsh.exe
netsh firewall add allowedprogram "C:\ProgramData\rejdit_free_fire.exe" "rejdit_free_fire.exe" ENABLE
malicious
C:\ProgramData\rejdit_free_fire.exe
"C:\ProgramData\rejdit_free_fire.exe" ..
malicious
C:\ProgramData\rejdit_free_fire.exe
"C:\ProgramData\rejdit_free_fire.exe" ..
malicious
C:\ProgramData\rejdit_free_fire.exe
"C:\ProgramData\rejdit_free_fire.exe" ..
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1

URLs

Name
IP
Malicious
h43vipforyou.ddns.net
malicious

Domains

Name
IP
Malicious
h43vipforyou.ddns.net
41.109.68.239
malicious

IPs

IP
Domain
Country
Malicious
41.109.68.239
h43vipforyou.ddns.net
Algeria
malicious

Registry

Path
Value
Malicious
HKEY_CURRENT_USER
di
malicious
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run
869b16e2825dce24066aba38ee1a9add
malicious
HKEY_CURRENT_USER\Environment
SEE_MASK_NOZONECHECKS
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run
869b16e2825dce24066aba38ee1a9add
HKEY_CURRENT_USER\Software\869b16e2825dce24066aba38ee1a9add
[kl]

Memdumps

Base Address
Regiontype
Protect
Malicious
3AB4000
trusted library allocation
page read and write
malicious
2965000
trusted library allocation
page read and write
malicious
442000
unkown
page readonly
malicious
21448FC7000
heap
page read and write
6DA000
trusted library allocation
page execute and read and write
21449030000
heap
page read and write
E89000
heap
page read and write
56FE000
stack
page read and write
2B2C9E78000
heap
page read and write
EFA000
heap
page read and write
3351000
trusted library allocation
page read and write
A58000
heap
page read and write
DE4000
heap
page read and write
94FB2FD000
stack
page read and write
1C3ED502000
heap
page read and write
10CB000
trusted library allocation
page execute and read and write
E6B000
heap
page read and write
E9D000
heap
page read and write
12BA4A50000
heap
page read and write
960000
unkown
page readonly
12BA5402000
trusted library allocation
page read and write
533A000
trusted library allocation
page read and write
572F000
stack
page read and write
DE4000
heap
page read and write
21448613000
heap
page read and write
DF0000
trusted library allocation
page read and write
E55000
heap
page read and write
6BDC69B000
stack
page read and write
1FD23C4E000
heap
page read and write
F4D000
heap
page read and write
533E000
trusted library allocation
page read and write
266CF500000
heap
page read and write
6BDCE7E000
stack
page read and write
1D84B302000
heap
page read and write
DF8000
heap
page read and write
E94000
heap
page read and write
530F000
trusted library allocation
page read and write
4A0000
heap
page read and write
97E000
stack
page read and write
970000
unkown
page readonly
E93000
heap
page read and write
5309000
trusted library allocation
page read and write
3961000
trusted library allocation
page read and write
5316000
trusted library allocation
page read and write
1C3ED42A000
heap
page read and write
EB5000
heap
page read and write
24B0000
heap
page execute and read and write
A0E000
stack
page read and write
4A80000
trusted library allocation
page execute and read and write
6BDCAFB000
stack
page read and write
2600000
trusted library allocation
page read and write
14F0000
heap
page read and write
1D84B202000
heap
page read and write
F7057FE000
stack
page read and write
4E3E000
stack
page read and write
E75000
heap
page read and write
14AB000
trusted library allocation
page execute and read and write
E0A000
heap
page read and write
26D17CC000
stack
page read and write
12BA4B50000
trusted library allocation
page read and write
9E0000
heap
page read and write
1D84B200000
heap
page read and write
94FAF7C000
stack
page read and write
1330000
heap
page read and write
DA0000
trusted library allocation
page read and write
21448F00000
heap
page read and write
DC0000
trusted library allocation
page read and write
E95000
heap
page read and write
186B9C51000
heap
page read and write
599E000
stack
page read and write
1FD23C42000
heap
page read and write
1C3ED487000
heap
page read and write
5309000
trusted library allocation
page read and write
2630000
heap
page execute and read and write
EAA000
trusted library allocation
page execute and read and write
266CF658000
heap
page read and write
3000000
heap
page read and write
55BC000
stack
page read and write
6B2000
trusted library allocation
page execute and read and write
F7051FC000
stack
page read and write
E93000
heap
page read and write
21448695000
heap
page read and write
50FE000
stack
page read and write
4FBE000
stack
page read and write
55EF000
stack
page read and write
AB0000
heap
page read and write
1492000
trusted library allocation
page execute and read and write
1FD23C5F000
heap
page read and write
186B9C00000
heap
page read and write
28AB000
trusted library allocation
page execute and read and write
70A000
heap
page read and write
C26E87F000
stack
page read and write
E6E000
stack
page read and write
C0E000
stack
page read and write
1FD24402000
trusted library allocation
page read and write
21448665000
heap
page read and write
12BA4C02000
heap
page read and write
D72000
trusted library allocation
page execute and read and write
E93000
heap
page read and write
1210000
heap
page read and write
E94000
heap
page read and write
21448600000
heap
page read and write
2144868E000
heap
page read and write
5301000
trusted library allocation
page read and write
F7050FF000
stack
page read and write
3DA1000
trusted library allocation
page read and write
5ADF000
stack
page read and write
186B9C77000
heap
page read and write
186B9BB0000
heap
page read and write
DEA000
heap
page read and write
21449000000
heap
page read and write
6D2000
trusted library allocation
page execute and read and write
523F000
stack
page read and write
D42000
trusted library allocation
page execute and read and write
5331000
trusted library allocation
page read and write
21449023000
heap
page read and write
1C3ED46F000
heap
page read and write
186B9BE0000
trusted library allocation
page read and write
21448653000
heap
page read and write
2A3F000
trusted library allocation
page read and write
266D1240000
trusted library allocation
page read and write
266CF659000
heap
page read and write
1472000
trusted library allocation
page execute and read and write
5334000
trusted library allocation
page read and write
4C80000
trusted library allocation
page read and write
6CA000
trusted library allocation
page execute and read and write
531B000
trusted library allocation
page read and write
21065EB000
stack
page read and write
499B000
stack
page read and write
C26E97D000
stack
page read and write
A30000
heap
page read and write
E79000
heap
page read and write
2144878E000
heap
page read and write
E2C000
heap
page read and write
2106CFB000
stack
page read and write
E0A000
heap
page read and write
D2E000
stack
page read and write
21448669000
heap
page read and write
5306000
trusted library allocation
page read and write
1FD23C55000
heap
page read and write
53BE000
stack
page read and write
266CF663000
heap
page read and write
17B000
stack
page read and write
5334000
trusted library allocation
page read and write
94FB07E000
stack
page read and write
21449013000
heap
page read and write
1C3ED4BB000
heap
page read and write
E79000
heap
page read and write
5309000
trusted library allocation
page read and write
11E0000
trusted library allocation
page read and write
DCC000
trusted library allocation
page execute and read and write
E20000
heap
page read and write
31D7000
heap
page read and write
E5A000
heap
page read and write
6BDCD79000
stack
page read and write
21448F22000
heap
page read and write
2B2C9E7D000
heap
page read and write
537E000
stack
page read and write
2B2C9C60000
heap
page read and write
DE7000
heap
page read and write
31D0000
heap
page read and write
DE4000
heap
page read and write
D2F000
stack
page read and write
4A1C000
stack
page read and write
D30000
trusted library allocation
page read and write
AF9000
stack
page read and write
5306000
trusted library allocation
page read and write
2A96000
trusted library allocation
page read and write
E0A000
heap
page read and write
797000
heap
page read and write
DF3000
heap
page read and write
440000
unkown
page readonly
E94000
heap
page read and write
5309000
trusted library allocation
page read and write
4354000
trusted library allocation
page read and write
1FD23C56000
heap
page read and write
DE4000
heap
page read and write
21448693000
heap
page read and write
533E000
stack
page read and write
C5C000
stack
page read and write
547F000
stack
page read and write
266D0FC0000
trusted library allocation
page read and write
1C3ED3F0000
trusted library allocation
page read and write
960000
unkown
page readonly
E86000
heap
page read and write
2EEE000
stack
page read and write
8F6000
stack
page read and write
D4A000
trusted library allocation
page execute and read and write
94FB17C000
stack
page read and write
E53000
heap
page read and write
266D0FF0000
remote allocation
page read and write
5328000
trusted library allocation
page read and write
531F000
trusted library allocation
page read and write
5331000
trusted library allocation
page read and write
DF2000
heap
page read and write
6D0000
heap
page read and write
28A7000
trusted library allocation
page execute and read and write
980000
unkown
page read and write
A80000
trusted library allocation
page read and write
EBC000
trusted library allocation
page execute and read and write
C26E67F000
stack
page read and write
26D1C7E000
stack
page read and write
E99000
heap
page read and write
186BA402000
trusted library allocation
page read and write
AB6000
heap
page read and write
DF6000
heap
page read and write
266CF600000
heap
page read and write
6A2000
trusted library allocation
page execute and read and write
1450000
trusted library allocation
page read and write
8F0000
heap
page read and write
4E7E000
stack
page read and write
1D84B050000
heap
page read and write
1E0000
trusted library allocation
page read and write
E9D000
heap
page read and write
26C49FE000
stack
page read and write
533A000
trusted library allocation
page read and write
73B000
heap
page read and write
5B0000
heap
page read and write
570000
trusted library allocation
page read and write
E58000
heap
page read and write
1D84B247000
heap
page read and write
12BA4C00000
heap
page read and write
1C3EDC02000
heap
page read and write
5331000
trusted library allocation
page read and write
E7E000
heap
page read and write
21448713000
heap
page read and write
5323000
trusted library allocation
page read and write
21448F43000
heap
page read and write
1C3ED350000
heap
page read and write
10D0000
heap
page read and write
4AB0000
heap
page read and write
1136000
stack
page read and write
E0A000
heap
page read and write
2AB5000
trusted library allocation
page read and write
2144868A000
heap
page read and write
1FD23C76000
heap
page read and write
5324000
trusted library allocation
page read and write
26D21FE000
stack
page read and write
1190000
heap
page read and write
14D0000
heap
page execute and read and write
EB0000
trusted library allocation
page read and write
1FD23C00000
heap
page read and write
E7F000
heap
page read and write
A92000
heap
page read and write
7B0000
heap
page read and write
118F000
trusted library allocation
page read and write
266D0FA0000
trusted library allocation
page read and write
5080000
trusted library allocation
page read and write
214485F0000
trusted library allocation
page read and write
D8B000
trusted library allocation
page execute and read and write
D87000
trusted library allocation
page execute and read and write
5331000
trusted library allocation
page read and write
2144863C000
heap
page read and write
2B2C9E00000
heap
page read and write
2B2C9F02000
heap
page read and write
9A0000
trusted library allocation
page read and write
F7052FF000
stack
page read and write
266CF490000
heap
page read and write
186B9B40000
heap
page read and write
2B2C9E70000
heap
page read and write
257E000
stack
page read and write
21448F22000
heap
page read and write
266CF648000
heap
page read and write
21448FBD000
heap
page read and write
50BE000
stack
page read and write
1FD23C31000
heap
page read and write
5530000
trusted library allocation
page execute and read and write
14A7000
trusted library allocation
page execute and read and write
543E000
stack
page read and write
527F000
stack
page read and write
2B2C9E3C000
heap
page read and write
E9B000
heap
page read and write
E9B000
heap
page read and write
2AB1000
trusted library allocation
page read and write
214487B9000
heap
page read and write
DEE000
heap
page read and write
1500000
heap
page read and write
E8C000
heap
page read and write
E0A000
heap
page read and write
21448FB1000
heap
page read and write
1FD23BC0000
trusted library allocation
page read and write
5333000
trusted library allocation
page read and write
147C000
trusted library allocation
page execute and read and write
2106AFB000
stack
page read and write
3DA4000
trusted library allocation
page read and write
533A000
trusted library allocation
page read and write
5329000
trusted library allocation
page read and write
E7F000
heap
page read and write
2B2C9DD0000
trusted library allocation
page read and write
4C70000
trusted library allocation
page read and write
5307000
trusted library allocation
page read and write
1C3ED360000
heap
page read and write
1FD23C60000
heap
page read and write
5302000
trusted library allocation
page read and write
2B2C9E66000
heap
page read and write
266D1200000
trusted library allocation
page read and write
75F000
heap
page read and write
26C47FF000
stack
page read and write
21448672000
heap
page read and write
6BDD1FF000
stack
page read and write
4F7F000
stack
page read and write
266CF63D000
heap
page read and write
1C3ED513000
heap
page read and write
552E000
stack
page read and write
4CFE000
stack
page read and write
6C7000
trusted library allocation
page execute and read and write
6B0000
trusted library allocation
page read and write
E23000
heap
page read and write
E6E000
heap
page read and write
E8C000
heap
page read and write
DF0000
heap
page read and write
1FD23D02000
heap
page read and write
E98000
heap
page read and write
4141000
trusted library allocation
page read and write
1A0000
remote allocation
page read and write
2B2C9E29000
heap
page read and write
E93000
heap
page read and write
2B2C9E13000
heap
page read and write
1D84B0A0000
heap
page read and write
E72000
heap
page read and write
26D1F7E000
stack
page read and write
F4A000
heap
page read and write
5311000
trusted library allocation
page read and write
53E0000
heap
page read and write
11DE000
stack
page read and write
1FD23C6B000
heap
page read and write
5334000
trusted library allocation
page read and write
6EB000
trusted library allocation
page execute and read and write
94FACFF000
stack
page read and write
D90000
heap
page read and write
21448F02000
heap
page read and write
533C000
trusted library allocation
page read and write
1FD23C64000
heap
page read and write
2DA1000
trusted library allocation
page read and write
523E000
stack
page read and write
1139000
stack
page read and write
4F7E000
stack
page read and write
4FA0000
heap
page read and write
E93000
heap
page read and write
3AB1000
trusted library allocation
page read and write
F7058FE000
stack
page read and write
115E000
stack
page read and write
1FD23C29000
heap
page read and write
3145000
trusted library allocation
page read and write
146A000
trusted library allocation
page execute and read and write
4AB3000
heap
page read and write
D56000
stack
page read and write
5130000
heap
page read and write
1C3EDD32000
heap
page read and write
6BA000
trusted library allocation
page execute and read and write
E9E000
heap
page read and write
1462000
trusted library allocation
page execute and read and write
1D84B22F000
heap
page read and write
A80000
trusted library allocation
page read and write
E79000
heap
page read and write
266CF713000
heap
page read and write
E83000
heap
page read and write
690000
trusted library allocation
page read and write
2B2C9F13000
heap
page read and write
E87000
heap
page read and write
E6B000
heap
page read and write
537E000
stack
page read and write
563E000
stack
page read and write
1FD23C5C000
heap
page read and write
AA0000
trusted library allocation
page read and write
2B2C9E65000
heap
page read and write
160E000
stack
page read and write
E6F000
heap
page read and write
DF1000
heap
page read and write
1C3ED3C0000
heap
page read and write
5306000
trusted library allocation
page read and write
266CF602000
heap
page read and write
CFE000
stack
page read and write
266CF718000
heap
page read and write
E94000
heap
page read and write
FEF000
stack
page read and write
E83000
heap
page read and write
1FD23C47000
heap
page read and write
E7C000
heap
page read and write
A80000
trusted library allocation
page execute and read and write
132E000
stack
page read and write
7B7000
heap
page read and write
E8A000
heap
page read and write
E34000
heap
page read and write
533B000
trusted library allocation
page read and write
523E000
stack
page read and write
A80000
trusted library allocation
page read and write
266CF649000
heap
page read and write
2106DFE000
stack
page read and write
D6E000
stack
page read and write
4D00000
trusted library allocation
page read and write
F7053FD000
stack
page read and write
E72000
heap
page read and write
12BA4C51000
heap
page read and write
1FD23C40000
heap
page read and write
A6B000
heap
page read and write
2B2C9CD0000
heap
page read and write
C26E0BB000
stack
page read and write
A80000
trusted library allocation
page read and write
C26EC7C000
stack
page read and write
EE2000
trusted library allocation
page execute and read and write
F704F7B000
stack
page read and write
4D3E000
stack
page read and write
186B9C13000
heap
page read and write
12BA4B80000
remote allocation
page read and write
1C3ED4C6000
heap
page read and write
EA2000
trusted library allocation
page execute and read and write
5309000
trusted library allocation
page read and write
12BA4B80000
remote allocation
page read and write
5331000
trusted library allocation
page read and write
21448656000
heap
page read and write
E8D000
heap
page read and write
4351000
trusted library allocation
page read and write
5307000
trusted library allocation
page read and write
5FE000
stack
page read and write
DE8000
heap
page read and write
9C0000
heap
page read and write
2CCE000
stack
page read and write
26D217D000
stack
page read and write
1D84B1A0000
trusted library allocation
page read and write
1C3ED43D000
heap
page read and write
DF8000
heap
page read and write
50FE000
stack
page read and write
2106BFB000
stack
page read and write
1090000
trusted library allocation
page read and write
D59000
stack
page read and write
52E0000
trusted library allocation
page read and write
E80000
heap
page read and write
2C00000
trusted library allocation
page read and write
530F000
trusted library allocation
page read and write
49DD000
stack
page read and write
4D90000
heap
page read and write
186B9C24000
heap
page read and write
139E000
stack
page read and write
2A30000
trusted library allocation
page read and write
4BF0000
trusted library allocation
page read and write
2B2C9E76000
heap
page read and write
54BE000
stack
page read and write
DBA000
trusted library allocation
page execute and read and write
E86000
heap
page read and write
DED000
heap
page read and write
E7A000
heap
page read and write
F704B0B000
stack
page read and write
4BEE000
stack
page read and write
6E7000
trusted library allocation
page execute and read and write
5070000
trusted library allocation
page read and write
4C70000
trusted library allocation
page read and write
2B2C9E5A000
heap
page read and write
21448649000
heap
page read and write
7DE000
stack
page read and write
2C10000
trusted library allocation
page read and write
4FF0000
trusted library allocation
page read and write
266D0FF0000
remote allocation
page read and write
2610000
heap
page read and write
E90000
heap
page read and write
28EE000
stack
page read and write
E83000
heap
page read and write
5650000
heap
page read and write
533A000
trusted library allocation
page read and write
1C3ED413000
heap
page read and write
2A50000
heap
page execute and read and write
59DF000
stack
page read and write
134D000
heap
page read and write
700000
heap
page read and write
545E47E000
stack
page read and write
4F6000
stack
page read and write
575E000
stack
page read and write
26C43BE000
stack
page read and write
1D84B256000
heap
page read and write
1FD23B20000
heap
page read and write
960000
unkown
page readonly
73C000
stack
page read and write
7E0000
trusted library allocation
page read and write
532B000
trusted library allocation
page read and write
1D84B213000
heap
page read and write
95C000
stack
page read and write
562F000
stack
page read and write
54EE000
stack
page read and write
1FD23C7D000
heap
page read and write
51FE000
stack
page read and write
DED000
heap
page read and write
186B9D13000
heap
page read and write
1FD23C3C000
heap
page read and write
E89000
heap
page read and write
5314000
trusted library allocation
page read and write
E9B000
heap
page read and write
12BA4C3C000
heap
page read and write
DB2000
trusted library allocation
page execute and read and write
2DFF000
stack
page read and write
6E2000
trusted library allocation
page read and write
2B2C9E02000
heap
page read and write
E6E000
heap
page read and write
1FD23C79000
heap
page read and write
D52000
trusted library allocation
page execute and read and write
2760000
heap
page read and write
585E000
stack
page read and write
E7A000
heap
page read and write
12BA4D02000
heap
page read and write
2A10000
heap
page read and write
186B9C3C000
heap
page read and write
503E000
stack
page read and write
4A7E000
stack
page read and write
21448F54000
heap
page read and write
26C467E000
stack
page read and write
214487E5000
heap
page read and write
545E27E000
stack
page read and write
E87000
heap
page read and write
ED0000
heap
page read and write
E7C000
heap
page read and write
1D84B040000
heap
page read and write
E0D000
heap
page read and write
DA0000
heap
page read and write
5323000
trusted library allocation
page read and write
26D1DFE000
stack
page read and write
E8C000
heap
page read and write
E7C000
heap
page read and write
5301000
trusted library allocation
page read and write
5306000
trusted library allocation
page read and write
94FB5FF000
stack
page read and write
C26E4FE000
stack
page read and write
94FAD7C000
stack
page read and write
E89000
heap
page read and write
26C48FE000
stack
page read and write
5326000
trusted library allocation
page read and write
EF0000
heap
page read and write
21448E02000
heap
page read and write
186B9D02000
heap
page read and write
266CF659000
heap
page read and write
186B9C79000
heap
page read and write
AA0000
trusted library allocation
page read and write
2B2CA602000
trusted library allocation
page read and write
530F000
trusted library allocation
page read and write
5326000
trusted library allocation
page read and write
2BE0000
trusted library allocation
page execute and read and write
E72000
heap
page read and write
266CF649000
heap
page read and write
1362000
heap
page read and write
EB2000
trusted library allocation
page execute and read and write
110000
heap
page read and write
186B9C02000
heap
page read and write
1FD23C5E000
heap
page read and write
266D1002000
trusted library allocation
page read and write
A83000
trusted library allocation
page read and write
E90000
heap
page read and write
1180000
trusted library allocation
page read and write
3141000
trusted library allocation
page read and write
E6C000
heap
page read and write
1FD23C57000
heap
page read and write
2FEE000
stack
page read and write
266D0FF0000
remote allocation
page read and write
D5A000
trusted library allocation
page execute and read and write
AF6000
stack
page read and write
266CF62A000
heap
page read and write
25BE000
stack
page read and write
26C4AFF000
stack
page read and write
DE0000
heap
page read and write
21448675000
heap
page read and write
DEC000
heap
page read and write
5329000
trusted library allocation
page read and write
3355000
trusted library allocation
page read and write
520000
heap
page read and write
E6E000
heap
page read and write
DE7000
heap
page read and write
12BA4B80000
remote allocation
page read and write
5322000
trusted library allocation
page read and write
186B9C5E000
heap
page read and write
4F7E000
stack
page read and write
DE5000
heap
page read and write
266CF613000
heap
page read and write
26D1EFE000
stack
page read and write
245F000
stack
page read and write
1FD23C7A000
heap
page read and write
533E000
stack
page read and write
186B9C64000
heap
page read and write
103C000
stack
page read and write
29EE000
stack
page read and write
2A40000
trusted library allocation
page execute and read and write
273E000
stack
page read and write
5329000
trusted library allocation
page read and write
12BA4C26000
heap
page read and write
C26EB7E000
stack
page read and write
DBF000
heap
page read and write
21448560000
heap
page read and write
55FE000
stack
page read and write
4FA000
stack
page read and write
533A000
trusted library allocation
page read and write
E89000
heap
page read and write
F7056FF000
stack
page read and write
F7054FF000
stack
page read and write
3AEF000
trusted library allocation
page read and write
12BA4C13000
heap
page read and write
21449002000
heap
page read and write
542E000
stack
page read and write
E9B000
heap
page read and write
E0B000
heap
page read and write
E6E000
heap
page read and write
1FD23C13000
heap
page read and write
2CF0000
heap
page execute and read and write
545E379000
stack
page read and write
110E000
stack
page read and write
4BFE000
stack
page read and write
DF2000
heap
page read and write
55A0000
trusted library allocation
page read and write
970000
unkown
page readonly
DD0000
heap
page read and write
C26E77E000
stack
page read and write
CF4000
stack
page read and write
E9D000
heap
page read and write
4144000
trusted library allocation
page read and write
545E57E000
stack
page read and write
21448550000
heap
page read and write
970000
unkown
page readonly
3110000
trusted library allocation
page read and write
533E000
stack
page read and write
E31000
heap
page read and write
10EF000
stack
page read and write
589E000
stack
page read and write
170E000
stack
page read and write
1D84BA02000
trusted library allocation
page read and write
4E7E000
stack
page read and write
12BA49E0000
heap
page read and write
DF3000
heap
page read and write
DF8000
heap
page read and write
4C00000
trusted library allocation
page execute and read and write
E9D000
heap
page read and write
DEA000
heap
page read and write
4BBF000
stack
page read and write
C26EA7C000
stack
page read and write
E93000
heap
page read and write
21449027000
heap
page read and write
DF8000
heap
page read and write
5320000
trusted library allocation
page read and write
2FF0000
trusted library allocation
page read and write
10C7000
trusted library allocation
page execute and read and write
94FB1FC000
stack
page read and write
530F000
trusted library allocation
page read and write
F7055FE000
stack
page read and write
21448D40000
trusted library allocation
page read and write
E86000
heap
page read and write
E83000
heap
page read and write
47B000
unkown
page readonly
EB0000
heap
page read and write
26D207D000
stack
page read and write
1FD23C3A000
heap
page read and write
12BA4C29000
heap
page read and write
1FD23B90000
heap
page read and write
12BA49F0000
heap
page read and write
5301000
trusted library allocation
page read and write
CEE000
stack
page read and write
1C3ED4CC000
heap
page read and write
5316000
trusted library allocation
page read and write
6BDCF7A000
stack
page read and write
1FD23C62000
heap
page read and write
5326000
trusted library allocation
page read and write
4E7E000
stack
page read and write
4AEE000
stack
page read and write
266CF700000
heap
page read and write
E90000
trusted library allocation
page read and write
E86000
heap
page read and write
DEB000
heap
page read and write
186B9B50000
heap
page read and write
2FFF000
trusted library allocation
page read and write
533D000
trusted library allocation
page read and write
507E000
stack
page read and write
1384000
heap
page read and write
266CF670000
heap
page read and write
21448678000
heap
page read and write
21449030000
heap
page read and write
5334000
trusted library allocation
page read and write
D10000
heap
page read and write
1C3ED400000
heap
page read and write
31C0000
heap
page read and write
1470000
trusted library allocation
page read and write
E99000
heap
page read and write
553E000
stack
page read and write
129F000
stack
page read and write
9B0000
trusted library allocation
page execute and read and write
517E000
stack
page read and write
F23000
heap
page read and write
980000
unkown
page read and write
4FE0000
trusted library allocation
page read and write
A90000
trusted library allocation
page read and write
E7A000
heap
page read and write
E94000
heap
page read and write
F0D000
heap
page read and write
1338000
heap
page read and write
266CF702000
heap
page read and write
6BDD07E000
stack
page read and write
E2E000
heap
page read and write
1FD23C82000
heap
page read and write
C20000
heap
page read and write
E9D000
heap
page read and write
A8C000
trusted library allocation
page read and write
6BDCBFF000
stack
page read and write
1C3EDD00000
heap
page read and write
55FE000
stack
page read and write
50C000
stack
page read and write
D50000
trusted library allocation
page read and write
32DF000
stack
page read and write
2892000
trusted library allocation
page execute and read and write
26C433C000
stack
page read and write
DE4000
heap
page read and write
2B2C9C70000
heap
page read and write
E8C000
heap
page read and write
21448F6F000
heap
page read and write
21448F96000
heap
page read and write
545E07C000
stack
page read and write
DC2000
trusted library allocation
page execute and read and write
E83000
heap
page read and write
A20000
heap
page read and write
D6E000
stack
page read and write
E87000
heap
page read and write
6BDD0FF000
stack
page read and write
1D84B23E000
heap
page read and write
50B0000
trusted library allocation
page read and write
1FD23C26000
heap
page read and write
980000
unkown
page read and write
4A19000
stack
page read and write
DF2000
heap
page read and write
DF8000
heap
page read and write
E92000
heap
page read and write
94FB3FF000
stack
page read and write
26D1CFF000
stack
page read and write
2DA5000
trusted library allocation
page read and write
1D84B229000
heap
page read and write
266CF4A0000
heap
page read and write
6AA000
trusted library allocation
page execute and read and write
1FD23C5A000
heap
page read and write
21448643000
heap
page read and write
94FA93C000
stack
page read and write
5314000
trusted library allocation
page read and write
DFA000
heap
page read and write
D00000
trusted library allocation
page read and write
186B9D00000
heap
page read and write
93E000
stack
page read and write
E8C000
heap
page read and write
E7C000
heap
page read and write
DA8000
heap
page read and write
1FD23C34000
heap
page read and write
50BE000
stack
page read and write
25FD000
stack
page read and write
DEE000
stack
page read and write
A80000
trusted library allocation
page read and write
2C30000
heap
page read and write
7FB30000
trusted library allocation
page execute and read and write
94FB4FD000
stack
page read and write
E7A000
heap
page read and write
DED000
heap
page read and write
C2E000
stack
page read and write
1D84B23B000
heap
page read and write
1FD23B30000
heap
page read and write
5325000
trusted library allocation
page read and write
21448629000
heap
page read and write
CFB000
stack
page read and write
108E000
unkown
page read and write
8F9000
stack
page read and write
266CF68A000
heap
page read and write
1FD23C58000
heap
page read and write
9FE000
unkown
page read and write
2961000
trusted library allocation
page read and write
214485C0000
heap
page read and write
E7E000
heap
page read and write
D5C000
trusted library allocation
page execute and read and write
D90000
heap
page read and write
55B0000
trusted library allocation
page read and write
E93000
heap
page read and write
DF1000
heap
page read and write
5313000
trusted library allocation
page read and write
6BDCCFC000
stack
page read and write
1FD23C67000
heap
page read and write
There are 760 hidden memdumps, click here to show them.