IOC Report
aeICl0Aabv.exe

loading gif

Files

File Path
Type
Category
Malicious
aeICl0Aabv.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Local\Temp\IXP000.TMP\y89Te35.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\IXP000.TMP\zap9052.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\IXP001.TMP\xJuGE71.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\IXP001.TMP\zap9953.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\IXP002.TMP\w77lD51.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\IXP002.TMP\zap8476.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\IXP003.TMP\tz5602.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\IXP003.TMP\v7930id.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\tz5602.exe.log
CSV text
dropped
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\v7930id.exe.log
ASCII text, with CRLF line terminators
dropped

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\aeICl0Aabv.exe
C:\Users\user\Desktop\aeICl0Aabv.exe
malicious
C:\Users\user\AppData\Local\Temp\IXP000.TMP\zap9052.exe
C:\Users\user\AppData\Local\Temp\IXP000.TMP\zap9052.exe
malicious
C:\Users\user\AppData\Local\Temp\IXP001.TMP\zap9953.exe
C:\Users\user\AppData\Local\Temp\IXP001.TMP\zap9953.exe
malicious
C:\Users\user\AppData\Local\Temp\IXP002.TMP\zap8476.exe
C:\Users\user\AppData\Local\Temp\IXP002.TMP\zap8476.exe
malicious
C:\Users\user\AppData\Local\Temp\IXP003.TMP\tz5602.exe
C:\Users\user\AppData\Local\Temp\IXP003.TMP\tz5602.exe
malicious
C:\Users\user\AppData\Local\Temp\IXP003.TMP\v7930id.exe
C:\Users\user\AppData\Local\Temp\IXP003.TMP\v7930id.exe
malicious
C:\Windows\System32\rundll32.exe
C:\Windows\system32\rundll32.exe" C:\Windows\system32\advpack.dll,DelNodeRunDLL32 "C:\Users\user\AppData\Local\Temp\IXP000.TMP\
C:\Windows\System32\rundll32.exe
C:\Windows\system32\rundll32.exe" C:\Windows\system32\advpack.dll,DelNodeRunDLL32 "C:\Users\user\AppData\Local\Temp\IXP001.TMP\
C:\Windows\System32\rundll32.exe
C:\Windows\system32\rundll32.exe" C:\Windows\system32\advpack.dll,DelNodeRunDLL32 "C:\Users\user\AppData\Local\Temp\IXP002.TMP\
C:\Windows\System32\rundll32.exe
C:\Windows\system32\rundll32.exe" C:\Windows\system32\advpack.dll,DelNodeRunDLL32 "C:\Users\user\AppData\Local\Temp\IXP003.TMP\

URLs

Name
IP
Malicious
62.204.41.87/joomla/index.php
malicious
193.233.20.30:4125
malicious
https://api.ip.sb/ip
unknown

Registry

Path
Value
Malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection
DisableIOAVProtection
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection
DisableRealtimeMonitoring
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender Security Center\Notifications
DisableNotifications
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce
wextract_cleanup0
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce
wextract_cleanup1
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce
wextract_cleanup2
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce
wextract_cleanup3
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows Defender\Features
TamperProtection
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU
AUOptions
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU
AutoInstallMinorUpdates
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU
NoAutoRebootWithLoggedOnUsers
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU
UseWUServer
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate
DoNotConnectToWindowsUpdateInternetLocations
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features
TamperProtection
There are 4 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
400000
unkown
page execute and read and write
malicious
104F000
heap
page read and write
malicious
4F0000
direct allocation
page execute and read and write
malicious
464E000
heap
page read and write
malicious
520000
direct allocation
page read and write
malicious
E59ABFF000
stack
page read and write
1F60000
heap
page read and write
1D1E4F13000
heap
page read and write
FE1000
trusted library allocation
page read and write
11E0000
heap
page read and write
AD0000
unkown
page readonly
B90000
heap
page read and write
17CB8A4B000
heap
page read and write
258C000
trusted library allocation
page read and write
AD3000
heap
page read and write
909000
heap
page read and write
4FA0000
trusted library allocation
page read and write
51000
unkown
page execute read
5070000
trusted library allocation
page read and write
DE4AE7C000
stack
page read and write
1D1E5732000
heap
page read and write
50E0000
trusted library allocation
page read and write
7FFBACE14000
trusted library allocation
page read and write
25CA000
trusted library allocation
page read and write
AD6000
heap
page read and write
58000
unkown
page write copy
A8E000
stack
page read and write
930000
heap
page read and write
7FFBACED0000
trusted library allocation
page execute and read and write
5100000
trusted library allocation
page read and write
A11000
unkown
page execute read
47C9000
heap
page read and write
2350000
trusted library allocation
page read and write
17CB8A44000
heap
page read and write
10E4000
heap
page read and write
20E0000
trusted library allocation
page execute and read and write
29895EF0000
trusted library allocation
page read and write
1000000
trusted library allocation
page read and write
7FFBACE20000
trusted library allocation
page read and write
78E0000
trusted library allocation
page read and write
25A1000
trusted library allocation
page read and write
29895EB0000
trusted library allocation
page read and write
175E4A37000
heap
page read and write
ACE000
heap
page read and write
199AF870000
heap
page read and write
25F82A13000
heap
page read and write
31F7000
heap
page read and write
DE4B9FF000
stack
page read and write
17CB8A74000
heap
page read and write
DE8000
unkown
page read and write
244097B000
stack
page read and write
17CB8A68000
heap
page read and write
19CBF902000
heap
page read and write
22F0000
trusted library allocation
page read and write
29895F70000
remote allocation
page read and write
42F000
unkown
page execute and read and write
12E09000
trusted library allocation
page read and write
5C101FC000
stack
page read and write
CA5000
heap
page read and write
19CBF7C0000
remote allocation
page read and write
2A613530000
heap
page read and write
2324000
trusted library allocation
page read and write
31E4000
heap
page read and write
197000
stack
page read and write
175E55F0000
trusted library allocation
page read and write
DE4B4FD000
stack
page read and write
17CB9202000
trusted library allocation
page read and write
19CBF826000
heap
page read and write
1D1E4E6D000
heap
page read and write
49A000
stack
page read and write
71A000
heap
page read and write
1D1E4D60000
heap
page read and write
256B000
trusted library allocation
page read and write
DE0000
unkown
page readonly
2989443D000
heap
page read and write
17CB8A45000
heap
page read and write
1AC94E69000
heap
page read and write
1DC7F2B0000
heap
page read and write
5C000
unkown
page readonly
2A0A000
heap
page read and write
17CB8A30000
heap
page read and write
1DC7F675000
heap
page read and write
2C9C000
stack
page read and write
1000000
trusted library allocation
page read and write
530000
trusted library allocation
page read and write
B69797E000
stack
page read and write
6EC000
heap
page read and write
175E4A39000
heap
page read and write
29E0000
heap
page read and write
5C106FC000
stack
page read and write
1010000
trusted library allocation
page read and write
20B0000
heap
page read and write
17CB8A84000
heap
page read and write
927000
trusted library allocation
page execute and read and write
175E4A37000
heap
page read and write
19CBF824000
heap
page read and write
252F000
stack
page read and write
2D8E000
stack
page read and write
A4E000
stack
page read and write
25F82A3D000
heap
page read and write
1DC7F150000
heap
page read and write
DEA000
unkown
page readonly
31E4000
heap
page read and write
5110000
trusted library allocation
page read and write
6EF9A7E000
stack
page read and write
17CB8A42000
heap
page read and write
4FB9000
trusted library allocation
page read and write
25C0000
trusted library allocation
page read and write
AD2000
unkown
page readonly
8DA000
heap
page read and write
175E4C35000
heap
page read and write
4F90000
trusted library allocation
page read and write
29894400000
heap
page read and write
2A613535000
heap
page read and write
1113000
heap
page read and write
5C000
unkown
page readonly
29894458000
heap
page read and write
29896002000
trusted library allocation
page read and write
31E6000
heap
page read and write
8F7000
heap
page read and write
714000
heap
page read and write
19CBF802000
heap
page read and write
256F000
trusted library allocation
page read and write
19CBF7C0000
remote allocation
page read and write
2A55000
heap
page read and write
175E4A37000
heap
page read and write
29894518000
heap
page read and write
17CE1350000
heap
page read and write
25F82A02000
heap
page read and write
19CBF813000
heap
page read and write
20AE000
stack
page read and write
17CB8A4C000
heap
page read and write
CA0000
heap
page read and write
6C6000
heap
page read and write
25A3000
trusted library allocation
page read and write
B697C7D000
stack
page read and write
A10000
unkown
page readonly
12E0000
unkown
page readonly
199B1360000
heap
page read and write
1F0000
heap
page read and write
19CBF760000
heap
page read and write
1040000
heap
page execute and read and write
175E4C39000
heap
page read and write
925000
heap
page read and write
17CB8B02000
heap
page read and write
20D0000
trusted library allocation
page read and write
9A0000
heap
page read and write
1000000
trusted library allocation
page read and write
25F82A76000
heap
page read and write
2420000
heap
page execute and read and write
4F80000
trusted library allocation
page read and write
AE0000
heap
page read and write
175E4A30000
heap
page read and write
25F82B02000
heap
page read and write
25F82930000
heap
page read and write
AD9000
heap
page read and write
10AC000
heap
page read and write
2577000
trusted library allocation
page read and write
5BE000
stack
page read and write
19CBF700000
heap
page read and write
E59ACFC000
stack
page read and write
4F70000
trusted library allocation
page read and write
2A39000
heap
page read and write
2A2F000
heap
page read and write
1040000
trusted library allocation
page read and write
DE4B6FE000
stack
page read and write
2A33000
heap
page read and write
17CE0FE0000
heap
page read and write
113E000
stack
page read and write
ADD000
heap
page read and write
5F70000
heap
page read and write
17CB8A49000
heap
page read and write
12E1000
unkown
page execute read
400000
unkown
page readonly
310F000
stack
page read and write
1020000
trusted library allocation
page read and write
25F83202000
trusted library allocation
page read and write
5B7D4FE000
stack
page read and write
228E000
stack
page read and write
45D7EFE000
stack
page read and write
175E49A0000
trusted library allocation
page read and write
B70000
heap
page read and write
51A0000
trusted library allocation
page read and write
175E4A37000
heap
page read and write
F81A07C000
stack
page read and write
7FFBACE30000
trusted library allocation
page read and write
2A39000
heap
page read and write
17CE0F70000
heap
page read and write
25AD000
trusted library allocation
page read and write
175E4920000
heap
page read and write
298943C0000
heap
page read and write
29894402000
heap
page read and write
E59AFFE000
stack
page read and write
AD6000
unkown
page readonly
7FFBACE22000
trusted library allocation
page read and write
903000
heap
page read and write
A4E000
stack
page read and write
25D5000
trusted library allocation
page read and write
1D1E4DD0000
heap
page read and write
50F0000
trusted library allocation
page read and write
1AC94D30000
heap
page read and write
259F000
trusted library allocation
page read and write
2A36000
heap
page read and write
714000
heap
page read and write
AAA000
heap
page read and write
462F000
stack
page read and write
2140000
heap
page read and write
45D7E7E000
stack
page read and write
EF5000
stack
page read and write
17CB8A77000
heap
page read and write
22B0000
heap
page read and write
19CBF7C0000
remote allocation
page read and write
139F000
stack
page read and write
17CB8A65000
heap
page read and write
DE4B1FC000
stack
page read and write
10A0000
heap
page read and write
290F000
stack
page read and write
25CC000
trusted library allocation
page read and write
3BC7EC000
stack
page read and write
2970000
heap
page read and write
50B0000
trusted library allocation
page read and write
401000
unkown
page execute read
AC0000
heap
page read and write
29895F70000
remote allocation
page read and write
50000
unkown
page readonly
45D7B9C000
stack
page read and write
2A613210000
heap
page read and write
17CB8910000
heap
page read and write
AD0000
unkown
page readonly
1010000
trusted library allocation
page read and write
4F25000
heap
page read and write
31F7000
heap
page read and write
A1A000
unkown
page readonly
17CB8A7A000
heap
page read and write
19CBF852000
heap
page read and write
17CB8A54000
heap
page read and write
772EC7C000
stack
page read and write
1AC94F02000
heap
page read and write
17CB8A4E000
heap
page read and write
544000
trusted library allocation
page read and write
117E000
stack
page read and write
1125000
heap
page read and write
17CB8A29000
heap
page read and write
1AC94D20000
heap
page read and write
2DF0000
heap
page execute and read and write
17CB8A00000
heap
page read and write
2575000
trusted library allocation
page read and write
25F82920000
heap
page read and write
17CB8A46000
heap
page read and write
A10000
unkown
page readonly
918000
heap
page read and write
10D4000
heap
page read and write
29894448000
heap
page read and write
B69747C000
stack
page read and write
2334000
trusted library allocation
page read and write
906000
heap
page read and write
255C000
trusted library allocation
page read and write
12EA000
unkown
page readonly
7FFBACE6C000
trusted library allocation
page execute and read and write
17CE108E000
heap
page read and write
1DC7F360000
heap
page read and write
8FE000
heap
page read and write
A1A000
unkown
page readonly
68A000
heap
page read and write
A0E000
stack
page read and write
175E4990000
trusted library allocation
page read and write
1010000
trusted library allocation
page read and write
DEC000
unkown
page readonly
6EF97EC000
stack
page read and write
5B7D47E000
stack
page read and write
25A5000
trusted library allocation
page read and write
19CBF6F0000
heap
page read and write
25C6000
trusted library allocation
page read and write
5A000
unkown
page readonly
2C30000
heap
page read and write
29894513000
heap
page read and write
2336000
trusted library allocation
page read and write
29894500000
heap
page read and write
25C2000
trusted library allocation
page read and write
29895E80000
trusted library allocation
page read and write
25C8000
trusted library allocation
page read and write
DEA000
unkown
page readonly
2440A7E000
stack
page read and write
175E4C30000
heap
page read and write
2D40000
heap
page read and write
426000
unkown
page execute and read and write
5C10AFE000
stack
page read and write
17CB8A3A000
heap
page read and write
17CE1000000
heap
page read and write
25AF000
trusted library allocation
page read and write
1DC7F670000
heap
page read and write
AD0000
heap
page read and write
24BA000
stack
page read and write
199AF620000
heap
page read and write
175E4A24000
heap
page read and write
1AC94D90000
heap
page read and write
12E1000
unkown
page execute read
25F829C0000
trusted library allocation
page read and write
680000
heap
page read and write
ACA000
heap
page read and write
50A0000
trusted library allocation
page read and write
6EF9AFF000
stack
page read and write
20F0000
heap
page read and write
4FD0000
trusted library allocation
page read and write
175E49C0000
heap
page read and write
7FFBACFB2000
trusted library allocation
page read and write
2A4E000
heap
page read and write
AD9000
heap
page read and write
17CB8A7D000
heap
page read and write
903000
heap
page read and write
DE4B7FF000
stack
page read and write
17CB8A5E000
heap
page read and write
51000
unkown
page execute read
12EA000
unkown
page readonly
17CB8A48000
heap
page read and write
1030000
trusted library allocation
page read and write
7FFBACE2D000
trusted library allocation
page execute and read and write
4FF0000
trusted library allocation
page read and write
5180000
trusted library allocation
page read and write
2A613470000
heap
page read and write
2960000
heap
page read and write
5050000
trusted library allocation
page read and write
7FFBACEF6000
trusted library allocation
page execute and read and write
5190000
trusted library allocation
page read and write
175E4A2B000
heap
page read and write
110E000
heap
page read and write
1AC94E28000
heap
page read and write
50000
unkown
page readonly
3430000
heap
page read and write
17CB8A3D000
heap
page read and write
12E03000
trusted library allocation
page read and write
A1C000
unkown
page readonly
175E4A2B000
heap
page read and write
8FB000
heap
page read and write
550000
heap
page read and write
2A24000
heap
page read and write
5120000
trusted library allocation
page read and write
3BCD79000
stack
page read and write
2588000
trusted library allocation
page read and write
7FFBACF30000
trusted library allocation
page execute and read and write
22E0000
trusted library allocation
page read and write
12EC000
unkown
page readonly
175E48A0000
trusted library allocation
page read and write
1AC94F13000
heap
page read and write
50C9000
trusted library allocation
page read and write
17CB8A2E000
heap
page read and write
5090000
trusted library allocation
page read and write
4E0000
heap
page read and write
1D1E4E00000
heap
page read and write
5060000
trusted library allocation
page read and write
2370000
heap
page read and write
17CB8A7B000
heap
page read and write
29894458000
heap
page read and write
AD5000
heap
page read and write
9C000
stack
page read and write
91A000
trusted library allocation
page execute and read and write
5C1067F000
stack
page read and write
244077B000
stack
page read and write
1010000
trusted library allocation
page read and write
17CB8A63000
heap
page read and write
31CA000
heap
page read and write
1DC7F38B000
heap
page read and write
25CE000
stack
page read and write
1000000
trusted library allocation
page read and write
5B7D87F000
stack
page read and write
90D000
heap
page read and write
175E4A01000
heap
page read and write
25F82A5A000
heap
page read and write
1000000
trusted library allocation
page read and write
8FF000
heap
page read and write
A18000
unkown
page read and write
12E07000
trusted library allocation
page read and write
702000
heap
page read and write
2A6131A0000
heap
page read and write
7610000
trusted library allocation
page read and write
258A000
trusted library allocation
page read and write
19CBF857000
heap
page read and write
1002000
trusted library allocation
page read and write
17CB8A41000
heap
page read and write
1002000
trusted library allocation
page read and write
CA9000
heap
page read and write
175E4A2E000
heap
page read and write
50D0000
trusted library allocation
page read and write
AEE000
heap
page read and write
2A2A000
heap
page read and write
29894447000
heap
page read and write
2CE9000
heap
page read and write
5165000
trusted library allocation
page read and write
2350000
trusted library section
page read and write
772EDFF000
stack
page read and write
7FFBACE3D000
trusted library allocation
page execute and read and write
9A5000
heap
page read and write
5160000
trusted library allocation
page read and write
AB0000
heap
page read and write
E59ADFC000
stack
page read and write
175E5860000
trusted library allocation
page read and write
1AC94F00000
heap
page read and write
1020000
trusted library allocation
page read and write
4AC000
unkown
page readonly
17CB8A13000
heap
page read and write
E59A9FF000
stack
page read and write
772ECFE000
stack
page read and write
430000
heap
page read and write
5A000
unkown
page readonly
29894489000
heap
page read and write
199AF6A7000
heap
page read and write
29894457000
heap
page read and write
25A9000
trusted library allocation
page read and write
199AFA35000
heap
page read and write
4970000
heap
page read and write
1D1E4E3E000
heap
page read and write
5A000
unkown
page readonly
1AC94E40000
heap
page read and write
2A33000
heap
page read and write
199AF890000
heap
page read and write
175E4A25000
heap
page read and write
25F82B13000
heap
page read and write
50C0000
trusted library allocation
page read and write
1D1E5700000
heap
page read and write
17CB8A64000
heap
page read and write
F81A17E000
stack
page read and write
1D1E4F02000
heap
page read and write
2531000
trusted library allocation
page read and write
2CDB000
stack
page read and write
AA0000
heap
page read and write
175E49B0000
trusted library allocation
page read and write
10E2000
heap
page read and write
2290000
trusted library section
page read and write
1AC94E64000
heap
page read and write
6D9000
heap
page read and write
1D1E4E13000
heap
page read and write
5125000
heap
page read and write
7FFBACEC0000
trusted library allocation
page read and write
AC7000
heap
page read and write
2450000
heap
page read and write
5C10A7D000
stack
page read and write
1B37D000
stack
page read and write
17CB8A31000
heap
page read and write
702000
heap
page read and write
199AF6A0000
heap
page read and write
51CF000
stack
page read and write
13E5000
heap
page read and write
1290000
heap
page read and write
4FE0000
trusted library allocation
page read and write
8FD000
heap
page read and write
40D000
unkown
page write copy
3535000
trusted library allocation
page read and write
175E5800000
trusted library allocation
page read and write
2A00000
heap
page read and write
DE4B8FE000
stack
page read and write
5B7D18C000
stack
page read and write
244087E000
stack
page read and write
1AC94DC0000
trusted library allocation
page read and write
A11000
unkown
page execute read
2A2A000
heap
page read and write
124F000
heap
page read and write
5FE000
stack
page read and write
29894350000
heap
page read and write
8F4000
heap
page read and write
175E4C40000
trusted library allocation
page read and write
3559000
trusted library allocation
page read and write
4840000
heap
page read and write
543000
trusted library allocation
page execute and read and write
2569000
trusted library allocation
page read and write
1000000
trusted library allocation
page read and write
175E4890000
heap
page read and write
5B7D67E000
stack
page read and write
1D1E4EB9000
heap
page read and write
30000
heap
page read and write
29894466000
heap
page read and write
772ED7E000
stack
page read and write
199AFA30000
heap
page read and write
5C108FE000
stack
page read and write
2567000
trusted library allocation
page read and write
DE4B07B000
stack
page read and write
670000
trusted library allocation
page read and write
1AC94E00000
heap
page read and write
1000000
trusted library allocation
page read and write
2594000
trusted library allocation
page read and write
AD5000
heap
page read and write
17CB8A4D000
heap
page read and write
5F74000
heap
page read and write
2586000
trusted library allocation
page read and write
2590000
trusted library allocation
page read and write
B6979FC000
stack
page read and write
2E01000
trusted library allocation
page read and write
2A3D000
heap
page read and write
175E4A14000
heap
page read and write
2A613110000
heap
page read and write
7690000
trusted library allocation
page read and write
31C0000
heap
page read and write
B697F7E000
stack
page read and write
FE4000
trusted library allocation
page read and write
3BCBF9000
stack
page read and write
575000
heap
page read and write
25F82A29000
heap
page read and write
2A27000
heap
page read and write
17CB8A6B000
heap
page read and write
13E0000
heap
page read and write
B69787F000
stack
page read and write
7FFBACE1D000
trusted library allocation
page execute and read and write
530F000
stack
page read and write
AB4000
heap
page read and write
2571000
trusted library allocation
page read and write
A18000
unkown
page write copy
5170000
trusted library allocation
page read and write
F81A0FF000
stack
page read and write
175E4900000
heap
page read and write
58000
unkown
page read and write
5B7D97F000
stack
page read and write
25AB000
trusted library allocation
page read and write
5C1097E000
stack
page read and write
318F000
stack
page read and write
22D0000
heap
page read and write
1D1E4E29000
heap
page read and write
25F82A00000
heap
page read and write
1DC7F290000
heap
page read and write
1AC95602000
trusted library allocation
page read and write
17CB9070000
trusted library allocation
page read and write
9C0000
heap
page read and write
DEC000
unkown
page readonly
92B000
trusted library allocation
page execute and read and write
ACF000
heap
page read and write
2A613180000
heap
page read and write
1010000
trusted library allocation
page read and write
175E4A2B000
heap
page read and write
17CB88B0000
heap
page read and write
2330000
trusted library allocation
page read and write
4FB0000
trusted library allocation
page read and write
1001000
trusted library allocation
page read and write
B697B7B000
stack
page read and write
8D0000
heap
page read and write
25F82990000
heap
page read and write
25B2000
trusted library allocation
page read and write
199AF6AB000
heap
page read and write
17CB88A0000
heap
page read and write
4770000
heap
page read and write
20C0000
heap
page execute and read and write
4AC000
unkown
page readonly
673000
trusted library allocation
page read and write
DE0000
unkown
page readonly
1AC94E50000
heap
page read and write
B697D7F000
stack
page read and write
7FFBACE13000
trusted library allocation
page execute and read and write
909000
heap
page read and write
A1C000
unkown
page readonly
E59AAFF000
stack
page read and write
2989451C000
heap
page read and write
1001000
trusted library allocation
page read and write
17CB8A40000
heap
page read and write
10E7000
heap
page read and write
DE8000
unkown
page write copy
4DB000
stack
page read and write
17CB8A60000
heap
page read and write
AF5000
heap
page read and write
175E49A0000
trusted library allocation
page read and write
DE1000
unkown
page execute read
29894413000
heap
page read and write
1D1E5530000
trusted library allocation
page read and write
5130000
trusted library allocation
page read and write
17CB8A31000
heap
page read and write
2573000
trusted library allocation
page read and write
5020000
trusted library allocation
page read and write
19CBF829000
heap
page read and write
5040000
trusted library allocation
page read and write
175E4A0C000
heap
page read and write
2060000
trusted library allocation
page read and write
940000
heap
page read and write
224F000
stack
page read and write
2D90000
heap
page read and write
DE4B5FE000
stack
page read and write
4FC0000
trusted library allocation
page read and write
25C4000
trusted library allocation
page read and write
5090000
trusted library allocation
page read and write
29BF000
stack
page read and write
19CBF820000
heap
page read and write
17CB8A61000
heap
page read and write
2592000
trusted library allocation
page read and write
17CE1355000
heap
page read and write
17CB8A6A000
heap
page read and write
7FF439610000
trusted library allocation
page execute and read and write
FF0000
heap
page read and write
54D000
trusted library allocation
page execute and read and write
29894448000
heap
page read and write
AD3000
heap
page read and write
540000
heap
page read and write
256D000
trusted library allocation
page read and write
DE1000
unkown
page execute read
25F82A56000
heap
page read and write
9E0000
heap
page read and write
540000
trusted library allocation
page read and write
298943F0000
trusted library allocation
page read and write
5BA000
stack
page read and write
8FB000
heap
page read and write
19CBF790000
trusted library allocation
page read and write
2A2E000
heap
page read and write
AD9000
heap
page read and write
244047B000
stack
page read and write
175E4A16000
heap
page read and write
17CB8A62000
heap
page read and write
175E4A37000
heap
page read and write
5FB000
stack
page read and write
24FB000
stack
page read and write
AE8000
heap
page read and write
6E0000
heap
page read and write
2CE0000
heap
page read and write
5030000
trusted library allocation
page read and write
175E5860000
trusted library allocation
page read and write
1D1E4D70000
heap
page read and write
1008000
trusted library allocation
page read and write
17CB8A47000
heap
page read and write
10D6000
heap
page read and write
213E000
stack
page read and write
3BCB79000
stack
page read and write
175E4A13000
heap
page read and write
FD0000
trusted library allocation
page read and write
17CB8A39000
heap
page read and write
1AC94E02000
heap
page read and write
175E4B9E000
trusted library allocation
page read and write
1D1E5602000
heap
page read and write
2989447B000
heap
page read and write
1000000
trusted library allocation
page read and write
1000000
trusted library allocation
page read and write
2599000
trusted library allocation
page read and write
2560000
heap
page read and write
2340000
trusted library allocation
page read and write
1000000
trusted library allocation
page read and write
990000
heap
page read and write
1000000
trusted library allocation
page read and write
472E000
stack
page read and write
1DC7F380000
heap
page read and write
AD9000
heap
page read and write
50CE000
stack
page read and write
25A7000
trusted library allocation
page read and write
ACA000
heap
page read and write
19CBF83D000
heap
page read and write
550000
heap
page read and write
555000
heap
page read and write
1AC94E7D000
heap
page read and write
29894502000
heap
page read and write
19CBF800000
heap
page read and write
570000
heap
page read and write
91E000
heap
page read and write
A90000
heap
page read and write
12E8000
unkown
page read and write
B50000
heap
page read and write
E59A67B000
stack
page read and write
5000000
trusted library allocation
page read and write
12E8000
unkown
page write copy
B697E7C000
stack
page read and write
2989442A000
heap
page read and write
3BCCF9000
stack
page read and write
2A61321E000
heap
page read and write
12EC000
unkown
page readonly
1AC94E13000
heap
page read and write
25CE000
trusted library allocation
page read and write
2A48000
heap
page read and write
2CE5000
heap
page read and write
917000
trusted library allocation
page execute and read and write
17CB8A75000
heap
page read and write
905000
heap
page read and write
484E000
heap
page read and write
294E000
stack
page read and write
3531000
trusted library allocation
page read and write
5B7D77E000
stack
page read and write
19CC0002000
trusted library allocation
page read and write
2A39000
heap
page read and write
175E4A13000
heap
page read and write
17CE1080000
heap
page read and write
17CB8A2D000
heap
page read and write
5C000
unkown
page readonly
29895F70000
remote allocation
page read and write
66E000
stack
page read and write
12E01000
trusted library allocation
page read and write
314E000
stack
page read and write
6A6000
heap
page execute and read and write
1DC7F387000
heap
page read and write
AC4000
heap
page read and write
2561000
trusted library allocation
page read and write
258E000
trusted library allocation
page read and write
DE4B2FF000
stack
page read and write
5080000
trusted library allocation
page read and write
2DDE000
stack
page read and write
2C8F000
stack
page read and write
B697AFD000
stack
page read and write
17CE12A0000
heap
page read and write
909000
heap
page read and write
3BCC7E000
stack
page read and write
29894360000
heap
page read and write
175E5810000
trusted library allocation
page read and write
1D1E4EC8000
heap
page read and write
1000000
trusted library allocation
page read and write
12E0000
unkown
page readonly
11E4000
heap
page read and write
19CBF837000
heap
page read and write
175E4C10000
trusted library allocation
page read and write
17CB8A6D000
heap
page read and write
1D1E4ECA000
heap
page read and write
4F90000
heap
page read and write
B69767C000
stack
page read and write
2A35000
heap
page read and write
175E4C20000
heap
page readonly
5010000
trusted library allocation
page read and write
BE0000
trusted library allocation
page read and write
520E000
stack
page read and write
There are 695 hidden memdumps, click here to show them.