IOC Report
Stub.exe

loading gif

Files

File Path
Type
Category
Malicious
Stub.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
initial sample
malicious
C:\Users\user\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\77EC63BDA74BD0D0E0426DC8F8008506
Microsoft Cabinet archive data, Windows 2000/XP setup, 62932 bytes, 1 file, at 0x2c +A "authroot.stl", number 1, 6 datablocks, 0x1 compression
dropped
C:\Users\user\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\77EC63BDA74BD0D0E0426DC8F8008506
data
modified

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\Stub.exe
C:\Users\user\Desktop\Stub.exe
malicious

URLs

Name
IP
Malicious
egrh.linkpc.net
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown

Domains

Name
IP
Malicious
egrh.linkpc.net
142.202.240.108
windowsupdatebg.s.llnwi.net
41.63.96.128

IPs

IP
Domain
Country
Malicious
142.202.240.108
egrh.linkpc.net
Reserved

Memdumps

Base Address
Regiontype
Protect
Malicious
2511000
trusted library allocation
page read and write
malicious
52000
unkown
page readonly
malicious
1EA45455000
heap
page read and write
24F0000
trusted library allocation
page read and write
24D967F000
stack
page read and write
48D0000
trusted library allocation
page read and write
4F20000
trusted library allocation
page read and write
5D80000
trusted library allocation
page read and write
5FD0000
trusted library allocation
page read and write
2D6CDFE000
stack
page read and write
5E51000
trusted library allocation
page read and write
24F0000
trusted library allocation
page read and write
24D0000
trusted library allocation
page read and write
5FD0000
trusted library allocation
page read and write
93D000
trusted library allocation
page execute and read and write
7A6ED0B000
stack
page read and write
1EA45400000
heap
page read and write
49BC000
trusted library allocation
page read and write
5FF0000
trusted library allocation
page read and write
5FE0000
trusted library allocation
page execute and read and write
5E0B000
trusted library allocation
page read and write
67C000
heap
page read and write
5210000
trusted library allocation
page read and write
698000
heap
page read and write
1F947857000
heap
page read and write
24C0000
trusted library allocation
page read and write
5E78000
trusted library allocation
page read and write
4E70000
trusted library allocation
page read and write
49E0000
trusted library allocation
page read and write
1F94783A000
heap
page read and write
275C4E3D000
heap
page read and write
1BF72ED0000
heap
page read and write
6054000
trusted library allocation
page read and write
1BF73002000
heap
page read and write
1EB89760000
heap
page read and write
2555000
trusted library allocation
page read and write
6C30000
trusted library allocation
page read and write
1EA4548B000
heap
page read and write
6C60000
trusted library allocation
page read and write
218E000
stack
page read and write
625000
heap
page read and write
3539000
trusted library allocation
page read and write
20220F50000
trusted library allocation
page read and write
51A0000
trusted library allocation
page read and write
61B000
heap
page read and write
4EA0000
trusted library allocation
page read and write
4F30000
trusted library allocation
page read and write
942000
trusted library allocation
page read and write
22D0000
trusted library allocation
page read and write
48F0000
trusted library allocation
page read and write
6A5000
heap
page read and write
22F0000
trusted library allocation
page read and write
4EE0000
unkown
page read and write
4F20000
trusted library allocation
page read and write
49E4000
trusted library allocation
page read and write
5210000
trusted library allocation
page read and write
1EB89856000
heap
page read and write
24ED000
trusted library allocation
page read and write
5FF0000
trusted library allocation
page read and write
1EA45DB2000
heap
page read and write
6A2000
heap
page read and write
1EA45465000
heap
page read and write
4E70000
trusted library allocation
page read and write
1EA45429000
heap
page read and write
2592000
trusted library allocation
page read and write
24F0000
unkown
page read and write
95B000
trusted library allocation
page execute and read and write
20220859000
heap
page read and write
22D0000
trusted library allocation
page read and write
2D6D07F000
stack
page read and write
5FF1000
trusted library allocation
page read and write
6AE000
heap
page read and write
5ED4000
trusted library allocation
page read and write
5E18000
trusted library allocation
page read and write
4F20000
trusted library allocation
page read and write
49A5000
trusted library allocation
page read and write
4F30000
trusted library allocation
page read and write
4D28000
stack
page read and write
24F0000
unkown
page read and write
5180000
trusted library allocation
page read and write
1F94785D000
heap
page read and write
47F38FC000
stack
page read and write
5FF0000
trusted library allocation
page read and write
49E6000
trusted library allocation
page read and write
2D6CEFF000
stack
page read and write
69F000
heap
page read and write
5FF1000
trusted library allocation
page read and write
488E000
stack
page read and write
1BF73013000
heap
page read and write
275C5532000
heap
page read and write
4F26000
trusted library allocation
page read and write
275C4E00000
heap
page read and write
4EF0000
trusted library allocation
page read and write
4966000
trusted library allocation
page read and write
20220913000
heap
page read and write
5EC8000
trusted library allocation
page read and write
1EB89847000
heap
page read and write
1F94785A000
heap
page read and write
1EB89857000
heap
page read and write
1EB8B270000
trusted library allocation
page read and write
4E70000
trusted library allocation
page read and write
1EB8982A000
heap
page read and write
49EB000
trusted library allocation
page read and write
65EE000
stack
page read and write
655000
heap
page read and write
49E6000
trusted library allocation
page read and write
699000
heap
page read and write
4EB0000
trusted library allocation
page read and write
80A207F000
stack
page read and write
275C5390000
trusted library allocation
page read and write
1EA45E23000
heap
page read and write
4F20000
trusted library allocation
page read and write
1F948002000
trusted library allocation
page read and write
49B1000
trusted library allocation
page read and write
24F0000
trusted library allocation
page read and write
48CB000
stack
page read and write
7C0000
trusted library allocation
page read and write
623000
heap
page read and write
1EA451E0000
heap
page read and write
4D61000
trusted library allocation
page read and write
1DA4F113000
heap
page read and write
5180000
trusted library allocation
page read and write
1EB89813000
heap
page read and write
1DA4F000000
heap
page read and write
6000000
trusted library allocation
page read and write
4E70000
trusted library allocation
page read and write
80A1D7E000
stack
page read and write
9E6C4FF000
stack
page read and write
5130000
heap
page read and write
49EC000
trusted library allocation
page read and write
49E6000
trusted library allocation
page read and write
49EB000
trusted library allocation
page read and write
2310000
heap
page read and write
64AE000
stack
page read and write
613000
heap
page read and write
20220790000
heap
page read and write
1EB89862000
heap
page read and write
5191000
trusted library allocation
page read and write
5FF6000
trusted library allocation
page read and write
24BD000
stack
page read and write
5190000
trusted library allocation
page read and write
1EA45D00000
heap
page read and write
6C30000
trusted library allocation
page read and write
4F20000
trusted library allocation
page read and write
9E6C87F000
stack
page read and write
4E70000
trusted library allocation
page read and write
9E6CA7F000
stack
page read and write
49EC000
trusted library allocation
page read and write
6050000
trusted library allocation
page read and write
2328000
trusted library allocation
page read and write
4A0000
trusted library allocation
page read and write
1EB89846000
heap
page read and write
6000000
trusted library allocation
page read and write
4E80000
trusted library allocation
page read and write
5FD0000
trusted library allocation
page read and write
5E0A000
trusted library allocation
page read and write
3511000
trusted library allocation
page read and write
24D907E000
stack
page read and write
642D000
stack
page read and write
4E70000
trusted library allocation
page read and write
24F0000
trusted library allocation
page read and write
47F317E000
stack
page read and write
6AE000
heap
page read and write
4EA0000
trusted library allocation
page read and write
49E6000
trusted library allocation
page read and write
4EA0000
trusted library allocation
page read and write
5190000
remote allocation
page read and write
80A196B000
stack
page read and write
6000000
trusted library allocation
page read and write
49EE000
trusted library allocation
page read and write
FD000
stack
page read and write
CB8307B000
stack
page read and write
9A0000
heap
page read and write
24D0000
trusted library allocation
page read and write
49EC000
trusted library allocation
page read and write
658000
heap
page read and write
5DE0000
trusted library allocation
page read and write
49E6000
trusted library allocation
page read and write
1F947800000
heap
page read and write
4D71000
heap
page read and write
4F20000
trusted library allocation
page read and write
50000
unkown
page readonly
1EB8B402000
trusted library allocation
page read and write
6030000
trusted library allocation
page read and write
1F947868000
heap
page read and write
1EA455E5000
heap
page read and write
257D000
trusted library allocation
page read and write
930000
trusted library allocation
page read and write
13926840000
heap
page read and write
2D6D1FE000
stack
page read and write
1EB89876000
heap
page read and write
275C5402000
heap
page read and write
4F26000
trusted library allocation
page read and write
4EB0000
trusted library allocation
page read and write
256D000
trusted library allocation
page read and write
4F20000
trusted library allocation
page read and write
94A000
trusted library allocation
page execute and read and write
6A7000
heap
page read and write
649000
heap
page read and write
49E000
stack
page read and write
6AD000
heap
page read and write
5FE0000
trusted library allocation
page read and write
4D8D000
heap
page read and write
5EA1000
trusted library allocation
page read and write
5FF1000
trusted library allocation
page read and write
4EC0000
trusted library allocation
page read and write
1DA4F074000
heap
page read and write
2599000
trusted library allocation
page read and write
1F947874000
heap
page read and write
5DD0000
trusted library allocation
page read and write
49E6000
trusted library allocation
page read and write
2022083D000
heap
page read and write
1EB89800000
heap
page read and write
649000
heap
page read and write
1EA45474000
heap
page read and write
4F20000
trusted library allocation
page read and write
4F20000
trusted library allocation
page read and write
1EA45E27000
heap
page read and write
4EE0000
trusted library allocation
page read and write
5ED0000
trusted library allocation
page read and write
5FF0000
trusted library allocation
page read and write
49E6000
trusted library allocation
page read and write
256A000
trusted library allocation
page read and write
66AD000
stack
page read and write
1DA4F013000
heap
page read and write
699000
heap
page read and write
4D3A000
trusted library allocation
page read and write
49E7000
trusted library allocation
page read and write
2586000
trusted library allocation
page read and write
1DA4F056000
heap
page read and write
5FE0000
trusted library allocation
page read and write
4D88000
heap
page read and write
49E6000
trusted library allocation
page read and write
5FF0000
trusted library allocation
page read and write
4EC0000
trusted library allocation
page read and write
1EA45D43000
heap
page read and write
8478EFF000
stack
page read and write
4EE0000
trusted library allocation
page read and write
5B0000
heap
page read and write
275C4BD0000
heap
page read and write
22D0000
heap
page read and write
22E0000
trusted library allocation
page read and write
49E7000
trusted library allocation
page read and write
1DA4EEA0000
heap
page read and write
48D0000
trusted library allocation
page read and write
49EE000
trusted library allocation
page read and write
5FF0000
trusted library allocation
page read and write
1EA45DC7000
heap
page read and write
202207F0000
heap
page read and write
6010000
trusted library allocation
page read and write
49EE000
trusted library allocation
page read and write
48D7000
trusted library allocation
page read and write
1EA45D54000
heap
page read and write
49E6000
trusted library allocation
page read and write
69B000
heap
page read and write
5133000
heap
page read and write
49EA000
trusted library allocation
page read and write
4E70000
trusted library allocation
page read and write
1EB8B380000
remote allocation
page read and write
632D000
stack
page read and write
80A1E7A000
stack
page read and write
662E000
stack
page read and write
582D000
stack
page read and write
660000
heap
page read and write
5ECD000
trusted library allocation
page read and write
4F25000
trusted library allocation
page read and write
6AE000
heap
page read and write
49EE000
trusted library allocation
page read and write
4E90000
trusted library allocation
page read and write
4ED0000
trusted library allocation
page execute and read and write
5180000
trusted library allocation
page read and write
1EB8B2C0000
trusted library allocation
page read and write
847927E000
stack
page read and write
4E70000
trusted library allocation
page read and write
6AA000
heap
page read and write
4D4D000
trusted library allocation
page read and write
1EA4546F000
heap
page read and write
6A8000
heap
page read and write
49E6000
trusted library allocation
page read and write
4EEE000
trusted library allocation
page read and write
946000
trusted library allocation
page execute and read and write
497F000
trusted library allocation
page read and write
6000000
trusted library allocation
page read and write
1EA45E13000
heap
page read and write
69B000
heap
page read and write
1F94787D000
heap
page read and write
628000
heap
page read and write
5ED1000
trusted library allocation
page read and write
4F20000
trusted library allocation
page read and write
49E3000
trusted library allocation
page read and write
646E000
stack
page read and write
9E6C37A000
stack
page read and write
1F94786A000
heap
page read and write
1F947600000
heap
page read and write
4F20000
trusted library allocation
page read and write
24D977E000
stack
page read and write
1DA4F079000
heap
page read and write
1EB8B380000
remote allocation
page read and write
620000
heap
page read and write
1F94785C000
heap
page read and write
49E7000
trusted library allocation
page read and write
13926823000
heap
page read and write
5DA0000
trusted library allocation
page read and write
5E78000
trusted library allocation
page read and write
13926902000
heap
page read and write
6A2000
heap
page read and write
5DFA000
trusted library allocation
page read and write
275C4F02000
heap
page read and write
275C4C30000
heap
page read and write
1EA45489000
heap
page read and write
2500000
heap
page execute and read and write
1EB8B300000
trusted library allocation
page read and write
64E000
heap
page read and write
4F25000
trusted library allocation
page read and write
952000
trusted library allocation
page read and write
25A7000
trusted library allocation
page read and write
7D4000
trusted library allocation
page read and write
13926E80000
remote allocation
page read and write
1BF7302E000
heap
page read and write
49BE000
trusted library allocation
page read and write
4D55000
trusted library allocation
page read and write
49A7000
trusted library allocation
page read and write
4EA0000
unkown
page read and write
13926813000
heap
page read and write
25B5000
trusted library allocation
page read and write
5190000
remote allocation
page read and write
4F30000
trusted library allocation
page read and write
6AA000
heap
page read and write
1EA455B9000
heap
page read and write
84796FD000
stack
page read and write
49E6000
trusted library allocation
page read and write
4EF0000
trusted library allocation
page read and write
620000
heap
page read and write
84797FE000
stack
page read and write
2581000
trusted library allocation
page read and write
6040000
trusted library allocation
page read and write
6C31000
trusted library allocation
page read and write
CB833FE000
stack
page read and write
5ED8000
trusted library allocation
page read and write
63E000
heap
page read and write
49B9000
trusted library allocation
page read and write
1BF72EC0000
heap
page read and write
49EC000
trusted library allocation
page read and write
6AE000
heap
page read and write
697000
heap
page read and write
7D3000
trusted library allocation
page execute and read and write
4F10000
trusted library allocation
page read and write
1F947879000
heap
page read and write
5ED8000
trusted library allocation
page read and write
275C4E6A000
heap
page read and write
5ED4000
trusted library allocation
page read and write
275C4F13000
heap
page read and write
69B000
heap
page read and write
9E6C77A000
stack
page read and write
633000
heap
page read and write
1F9000
stack
page read and write
5D80000
trusted library allocation
page read and write
8478F7B000
stack
page read and write
1BF7303C000
heap
page read and write
1EB89913000
heap
page read and write
5190000
trusted library allocation
page read and write
498A000
trusted library allocation
page read and write
6AA000
heap
page read and write
4D5000
heap
page read and write
49EA000
trusted library allocation
page read and write
69F000
heap
page read and write
69F000
heap
page read and write
51A0000
trusted library allocation
page read and write
60E000
heap
page read and write
4D47000
trusted library allocation
page read and write
4F20000
trusted library allocation
page read and write
6AA000
heap
page read and write
1EA45D22000
heap
page read and write
5210000
trusted library allocation
page read and write
24F0000
trusted library allocation
page read and write
6050000
trusted library allocation
page read and write
1EB897D0000
heap
page read and write
67AE000
stack
page read and write
24EF000
trusted library allocation
page read and write
275C4EE2000
heap
page read and write
1F947660000
heap
page read and write
5210000
trusted library allocation
page read and write
1EA45494000
heap
page read and write
6C40000
trusted library allocation
page read and write
1F947813000
heap
page read and write
699000
heap
page read and write
24D987F000
stack
page read and write
6C50000
trusted library allocation
page read and write
4E90000
trusted library allocation
page read and write
628000
heap
page read and write
1DA4F03D000
heap
page read and write
5FD0000
trusted library allocation
page read and write
13926E80000
remote allocation
page read and write
4AEC000
stack
page read and write
1DA4EEB0000
heap
page read and write
633000
heap
page read and write
1F947856000
heap
page read and write
2D6C89C000
stack
page read and write
5FD0000
trusted library allocation
page read and write
2022085B000
heap
page read and write
699000
heap
page read and write
275C4EBA000
heap
page read and write
2588000
trusted library allocation
page read and write
24F0000
unkown
page read and write
661000
heap
page read and write
3565000
trusted library allocation
page read and write
90000
heap
page read and write
2550000
trusted library allocation
page read and write
275C4E13000
heap
page read and write
1EA45513000
heap
page read and write
49EA000
trusted library allocation
page read and write
49E0000
trusted library allocation
page read and write
258A000
trusted library allocation
page read and write
49E0000
trusted library allocation
page read and write
5EC8000
trusted library allocation
page read and write
49EC000
trusted library allocation
page read and write
5D80000
trusted library allocation
page read and write
698000
heap
page read and write
1F94786D000
heap
page read and write
4E98000
trusted library allocation
page read and write
5DD7000
trusted library allocation
page read and write
4EA0000
unkown
page read and write
275C4E87000
heap
page read and write
2D6D17D000
stack
page read and write
6A9000
heap
page read and write
6AA000
heap
page read and write
49EB000
trusted library allocation
page read and write
625000
heap
page read and write
1F947861000
heap
page read and write
1EB89918000
heap
page read and write
1EB89900000
heap
page read and write
5C6F000
stack
page read and write
1F947858000
heap
page read and write
275C4E64000
heap
page read and write
639000
heap
page read and write
49A8000
trusted library allocation
page read and write
13927002000
trusted library allocation
page read and write
4EB0000
trusted library allocation
page read and write
1F947841000
heap
page read and write
49A5000
trusted library allocation
page read and write
2D6D2FD000
stack
page read and write
49E0000
trusted library allocation
page read and write
49AD000
trusted library allocation
page read and write
5180000
trusted library allocation
page read and write
671000
heap
page read and write
1BF73054000
heap
page read and write
24F0000
unkown
page read and write
1EA45C02000
heap
page read and write
5DD8000
trusted library allocation
page read and write
1F94787B000
heap
page read and write
512D000
stack
page read and write
49E6000
trusted library allocation
page read and write
6BEE000
stack
page read and write
5DE9000
trusted library allocation
page read and write
9E6C5FB000
stack
page read and write
6A2000
heap
page read and write
1F94786F000
heap
page read and write
7E0000
heap
page read and write
1EA451F0000
heap
page read and write
4D8B000
heap
page read and write
5B6E000
stack
page read and write
47F37FE000
stack
page read and write
1EA45250000
heap
page read and write
5E1000
heap
page read and write
275C4EC3000
heap
page read and write
5EC8000
trusted library allocation
page read and write
1EB8983D000
heap
page read and write
633000
heap
page read and write
48D0000
trusted library allocation
page read and write
49A8000
trusted library allocation
page read and write
623000
heap
page read and write
4F20000
trusted library allocation
page read and write
5D80000
trusted library allocation
page read and write
5E3000
heap
page read and write
5D80000
trusted library allocation
page read and write
1EA45DC0000
heap
page read and write
5DE1000
trusted library allocation
page read and write
5180000
trusted library allocation
page read and write
4E90000
trusted library allocation
page read and write
2D6CFFD000
stack
page read and write
2022082A000
heap
page read and write
20220802000
heap
page read and write
5190000
trusted library allocation
page read and write
6050000
trusted library allocation
page read and write
20220902000
heap
page read and write
49EE000
trusted library allocation
page read and write
1BF73680000
trusted library allocation
page read and write
69F000
heap
page read and write
658000
heap
page read and write
6C50000
trusted library allocation
page read and write
4EA0000
trusted library allocation
page read and write
5E0A000
trusted library allocation
page read and write
4F20000
trusted library allocation
page read and write
1F947864000
heap
page read and write
5DA0000
trusted library allocation
page read and write
20220800000
heap
page read and write
9E6C679000
stack
page read and write
4D50000
trusted library allocation
page read and write
1F94787A000
heap
page read and write
5E79000
trusted library allocation
page read and write
139267F0000
trusted library allocation
page read and write
49E1000
trusted library allocation
page read and write
2022084F000
heap
page read and write
24D957E000
stack
page read and write
5E41000
trusted library allocation
page read and write
5DA0000
trusted library allocation
page read and write
1F9475F0000
heap
page read and write
1EA45476000
heap
page read and write
5D80000
trusted library allocation
page read and write
4D71000
heap
page read and write
49E6000
trusted library allocation
page read and write
5E41000
trusted library allocation
page read and write
47F35FC000
stack
page read and write
49EE000
trusted library allocation
page read and write
4EB1000
trusted library allocation
page read and write
1EA45370000
trusted library allocation
page read and write
7A6F37B000
stack
page read and write
4C2A000
stack
page read and write
658000
heap
page read and write
1F947884000
heap
page read and write
5DE7000
trusted library allocation
page read and write
1F947824000
heap
page read and write
65F000
heap
page read and write
6030000
trusted library allocation
page read and write
69F000
heap
page read and write
5D90000
trusted library allocation
page read and write
1F947865000
heap
page read and write
1F947831000
heap
page read and write
1BF73029000
heap
page read and write
957000
trusted library allocation
page execute and read and write
25AB000
trusted library allocation
page read and write
1EA45469000
heap
page read and write
51B0000
remote allocation
page read and write
24F0000
trusted library allocation
page read and write
660000
heap
page read and write
5190000
trusted library allocation
page read and write
4F21000
trusted library allocation
page read and write
1F947840000
heap
page read and write
1F947902000
heap
page read and write
1F94786B000
heap
page read and write
6000000
trusted library allocation
page read and write
625000
heap
page read and write
5FF0000
trusted library allocation
page read and write
4D71000
heap
page read and write
4F29000
trusted library allocation
page read and write
847937C000
stack
page read and write
1DA4F102000
heap
page read and write
4F20000
trusted library allocation
page read and write
4E70000
trusted library allocation
page read and write
4F20000
trusted library allocation
page read and write
228E000
stack
page read and write
49C1000
trusted library allocation
page read and write
4D0000
heap
page read and write
4F25000
trusted library allocation
page read and write
4F20000
trusted library allocation
page read and write
5A2D000
stack
page read and write
1DA4F100000
heap
page read and write
7AE000
stack
page read and write
1EA45458000
heap
page read and write
1F947859000
heap
page read and write
6AE000
heap
page read and write
24E0000
trusted library allocation
page read and write
4E70000
trusted library allocation
page read and write
4993000
trusted library allocation
page read and write
4E76000
trusted library allocation
page read and write
4F2C000
trusted library allocation
page read and write
47F347F000
stack
page read and write
1EA45E30000
heap
page read and write
5190000
trusted library allocation
page read and write
22D0000
trusted library allocation
page read and write
645000
heap
page read and write
4EE0000
trusted library allocation
page read and write
5FF0000
trusted library allocation
page read and write
7F390000
trusted library allocation
page execute and read and write
49EA000
trusted library allocation
page read and write
49E7000
trusted library allocation
page read and write
4E90000
trusted library allocation
page read and write
1EB89902000
heap
page read and write
4F20000
trusted library allocation
page read and write
84794FD000
stack
page read and write
5180000
trusted library allocation
page read and write
1EA45D22000
heap
page read and write
4EA0000
trusted library allocation
page read and write
697000
heap
page read and write
5FF0000
trusted library allocation
page read and write
255B000
trusted library allocation
page read and write
4F00000
trusted library allocation
page read and write
24D8AFB000
stack
page read and write
980000
trusted library allocation
page execute and read and write
24F0000
trusted library allocation
page read and write
7A6F47E000
stack
page read and write
4D70000
heap
page read and write
4EA0000
trusted library allocation
page read and write
49ED000
trusted library allocation
page read and write
1F947855000
heap
page read and write
4D4A000
trusted library allocation
page read and write
49EA000
trusted library allocation
page read and write
24D947F000
stack
page read and write
49EA000
trusted library allocation
page read and write
61AE000
stack
page read and write
4E90000
trusted library allocation
page read and write
4F20000
trusted library allocation
page read and write
4F20000
trusted library allocation
page read and write
1F947842000
heap
page read and write
1EA45E00000
heap
page read and write
255F000
trusted library allocation
page read and write
49EB000
trusted library allocation
page read and write
49AD000
trusted library allocation
page read and write
CB834FF000
stack
page read and write
6A9000
heap
page read and write
13926E80000
remote allocation
page read and write
4F30000
trusted library allocation
page read and write
5FF0000
trusted library allocation
page read and write
9A7000
heap
page read and write
CB830FE000
stack
page read and write
61D000
heap
page read and write
4E70000
trusted library allocation
page read and write
5210000
trusted library allocation
page read and write
4F1D000
stack
page read and write
1DA4F802000
trusted library allocation
page read and write
4EE5000
trusted library allocation
page read and write
2D6CD7F000
stack
page read and write
69B000
heap
page read and write
61E000
heap
page read and write
62E000
heap
page read and write
CB835FF000
stack
page read and write
4F20000
trusted library allocation
page read and write
618000
heap
page read and write
5ED8000
trusted library allocation
page read and write
4E90000
trusted library allocation
page read and write
82E000
stack
page read and write
5180000
trusted library allocation
page execute and read and write
4F30000
trusted library allocation
page read and write
5BA000
heap
page read and write
5ED5000
trusted library allocation
page read and write
5D70000
trusted library allocation
page read and write
64F000
heap
page read and write
49E1000
trusted library allocation
page read and write
9E6C97F000
stack
page read and write
84795FE000
stack
page read and write
4EA0000
trusted library allocation
page read and write
22D0000
trusted library allocation
page read and write
CB832FE000
stack
page read and write
628000
heap
page read and write
5FF0000
trusted library allocation
page read and write
60E000
heap
page read and write
4E70000
unkown
page read and write
24F4000
trusted library allocation
page read and write
24F0000
trusted library allocation
page read and write
5DDA000
trusted library allocation
page read and write
1EB89857000
heap
page read and write
275C4ECB000
heap
page read and write
49E6000
trusted library allocation
page read and write
4EF0000
trusted library allocation
page read and write
257B000
trusted library allocation
page read and write
49EC000
trusted library allocation
page read and write
5EC8000
trusted library allocation
page read and write
49EC000
trusted library allocation
page read and write
1EA45413000
heap
page read and write
1BF72F20000
heap
page read and write
1F947760000
trusted library allocation
page read and write
1EB89770000
heap
page read and write
47F2D4C000
stack
page read and write
1BF73000000
heap
page read and write
1EA45D6F000
heap
page read and write
69F000
heap
page read and write
632000
heap
page read and write
4EA0000
trusted library allocation
page read and write
22D4000
trusted library allocation
page read and write
49EE000
trusted library allocation
page read and write
84793FB000
stack
page read and write
5FF0000
trusted library allocation
page read and write
614000
heap
page read and write
1EA45D94000
heap
page read and write
1EA4543C000
heap
page read and write
6030000
trusted library allocation
page read and write
4F20000
trusted library allocation
page read and write
1EB89802000
heap
page read and write
24F0000
trusted library allocation
page read and write
64ED000
stack
page read and write
4EA0000
trusted library allocation
page read and write
4E90000
trusted library allocation
page read and write
24D917C000
stack
page read and write
24D0000
trusted library allocation
page read and write
4D75000
heap
page read and write
847917C000
stack
page read and write
49E6000
trusted library allocation
page read and write
5DA0000
trusted library allocation
page read and write
6C40000
trusted library allocation
page read and write
1DA4F670000
trusted library allocation
page read and write
24F0000
trusted library allocation
page read and write
20221002000
trusted library allocation
page read and write
940000
trusted library allocation
page read and write
69F000
heap
page read and write
62E000
heap
page read and write
275C4E29000
heap
page read and write
6A3000
heap
page read and write
602D000
stack
page read and write
990000
trusted library allocation
page read and write
50E0000
heap
page read and write
62000
unkown
page readonly
2300000
trusted library allocation
page read and write
653000
heap
page read and write
5B2F000
stack
page read and write
4D30000
trusted library allocation
page read and write
48E0000
heap
page execute and read and write
1EB8B380000
remote allocation
page read and write
5FC0000
trusted library allocation
page read and write
24D927F000
stack
page read and write
24FD000
unkown
page read and write
7A6F57E000
stack
page read and write
13926800000
heap
page read and write
4D5C000
trusted library allocation
page read and write
49A0000
trusted library allocation
page read and write
1EA45443000
heap
page read and write
4EA0000
trusted library allocation
page read and write
4D34000
trusted library allocation
page read and write
1EA45492000
heap
page read and write
1EA45D02000
heap
page read and write
13926854000
heap
page read and write
49E4000
trusted library allocation
page read and write
24D937D000
stack
page read and write
1DA4F029000
heap
page read and write
1BF73102000
heap
page read and write
1BF73046000
heap
page read and write
1F94783C000
heap
page read and write
5FD0000
trusted library allocation
page read and write
6A7000
heap
page read and write
4F20000
trusted library allocation
page read and write
5FD0000
trusted library allocation
page read and write
5FF0000
trusted library allocation
page read and write
4F20000
trusted library allocation
page read and write
6A9000
heap
page read and write
50DC000
stack
page read and write
517E000
stack
page read and write
625000
heap
page read and write
258C000
trusted library allocation
page read and write
5FD0000
trusted library allocation
page read and write
5D74000
trusted library allocation
page read and write
1DA4EF10000
heap
page read and write
637000
heap
page read and write
639000
heap
page read and write
139266F0000
heap
page read and write
49E8000
trusted library allocation
page read and write
4E90000
trusted library allocation
page read and write
49E4000
trusted library allocation
page read and write
4EE0000
trusted library allocation
page read and write
631000
heap
page read and write
6A9000
heap
page read and write
6000000
trusted library allocation
page read and write
1EA45350000
trusted library allocation
page read and write
499B000
trusted library allocation
page read and write
697000
heap
page read and write
1F947863000
heap
page read and write
1BF7304E000
heap
page read and write
20220780000
heap
page read and write
1BF73802000
trusted library allocation
page read and write
47F337E000
stack
page read and write
13926680000
heap
page read and write
47F36FD000
stack
page read and write
1F94785E000
heap
page read and write
5FF1000
trusted library allocation
page read and write
25B3000
trusted library allocation
page read and write
660000
heap
page read and write
1EB89888000
heap
page read and write
4F20000
trusted library allocation
page read and write
275C5500000
heap
page read and write
5DED000
trusted library allocation
page read and write
49E6000
trusted library allocation
page read and write
1EA4558E000
heap
page read and write
9E6BF5C000
stack
page read and write
1EB89847000
heap
page read and write
92D000
stack
page read and write
1F947860000
heap
page read and write
1F947862000
heap
page read and write
22CD000
stack
page read and write
49EE000
trusted library allocation
page read and write
592D000
stack
page read and write
7DD000
trusted library allocation
page execute and read and write
7E7000
heap
page read and write
9E6C9FF000
stack
page read and write
5DD8000
trusted library allocation
page read and write
24D8EFB000
stack
page read and write
1F947847000
heap
page read and write
5DDD000
trusted library allocation
page read and write
647000
heap
page read and write
670000
heap
page read and write
4E70000
trusted library allocation
page read and write
4EB0000
trusted library allocation
page read and write
6AA000
heap
page read and write
6000000
trusted library allocation
page read and write
1F94787E000
heap
page read and write
4EE0000
trusted library allocation
page read and write
13926829000
heap
page read and write
5DA0000
trusted library allocation
page read and write
4F20000
trusted library allocation
page read and write
80A1F79000
stack
page read and write
8478B6C000
stack
page read and write
6050000
trusted library allocation
page read and write
20220813000
heap
page read and write
49E6000
trusted library allocation
page read and write
1F94784D000
heap
page read and write
49AD000
trusted library allocation
page read and write
20220877000
heap
page read and write
49E0000
trusted library allocation
page read and write
5EC8000
trusted library allocation
page read and write
4EE0000
trusted library allocation
page read and write
47F327F000
stack
page read and write
5190000
trusted library allocation
page read and write
4F20000
trusted library allocation
page read and write
4D44000
trusted library allocation
page read and write
1DA4F002000
heap
page read and write
499C000
trusted library allocation
page read and write
1F947875000
heap
page read and write
656000
heap
page read and write
5FF0000
trusted library allocation
page read and write
4BE9000
stack
page read and write
13926802000
heap
page read and write
1BF73036000
heap
page read and write
49E6000
trusted library allocation
page read and write
13926690000
heap
page read and write
49EB000
trusted library allocation
page read and write
5FE0000
trusted library allocation
page read and write
1EB8B290000
trusted library allocation
page read and write
1DA4F06A000
heap
page read and write
699000
heap
page read and write
4EA0000
unkown
page read and write
2584000
trusted library allocation
page read and write
7A6F27B000
stack
page read and write
67D000
heap
page read and write
49E4000
trusted library allocation
page read and write
255D000
trusted library allocation
page read and write
1EA45E02000
heap
page read and write
CB8317E000
stack
page read and write
4F20000
trusted library allocation
page read and write
275C4BC0000
heap
page read and write
There are 826 hidden memdumps, click here to show them.