IOC Report
opp.scr.exe

loading gif

Files

File Path
Type
Category
Malicious
opp.scr.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\opp.scr.exe.log
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\13d6pS3
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 8, database pages 89, cookie 0x36, schema 4, UTF-8, version-valid-for 8
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Docs.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Thu May 2 12:56:21 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Gmail.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Thu May 2 12:56:21 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Google Drive.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Wed Oct 4 12:54:07 2023, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Sheets.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Thu May 2 12:56:21 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Slides.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Thu May 2 12:56:21 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\YouTube.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Thu May 2 12:56:21 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
dropped
Chrome Cache Entry: 71
ASCII text, with very long lines (5435)
downloaded

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\opp.scr.exe
"C:\Users\user\Desktop\opp.scr.exe"
malicious
C:\Users\user\Desktop\opp.scr.exe
"C:\Users\user\Desktop\opp.scr.exe"
malicious
C:\Program Files (x86)\IbZIyGTNRRgnjGfKKCjfPwQYwyfKGixnBYPXdPAqeWGGHEs\oOOsxwAhjIw.exe
"C:\Program Files (x86)\IbZIyGTNRRgnjGfKKCjfPwQYwyfKGixnBYPXdPAqeWGGHEs\oOOsxwAhjIw.exe"
malicious
C:\Windows\SysWOW64\dfrgui.exe
"C:\Windows\SysWOW64\dfrgui.exe"
malicious
C:\Program Files (x86)\IbZIyGTNRRgnjGfKKCjfPwQYwyfKGixnBYPXdPAqeWGGHEs\oOOsxwAhjIw.exe
"C:\Program Files (x86)\IbZIyGTNRRgnjGfKKCjfPwQYwyfKGixnBYPXdPAqeWGGHEs\oOOsxwAhjIw.exe"
malicious
C:\Program Files\Mozilla Firefox\firefox.exe
"C:\Program Files\Mozilla Firefox\Firefox.exe"
malicious
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized --single-argument http:///
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2052 --field-trial-handle=1940,i,10687501719211606552,13801376808827217908,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8

URLs

Name
IP
Malicious
http://www.terelprime.com/ufuh/?p80t2Pu=YGhnx96XAVFPN8tv1lUEEiUVdSmZ/iyWteKDUnkDVIOF49Ku923zDENpH5OUCIyJQHomPTwvfF1wQ0t1Y4t+Kv0hk37pk2XOQoNeMFqeOrHvpWJ1tST0YGmxjRv23ozT3g==&B6bX=zjl0
66.96.161.166
malicious
https://ac.ecosia.org/autocomplete?q=
unknown
https://www.google.com/async/ddljson?async=ntp:2
142.251.40.100
https://duckduckgo.com/chrome_newtab
unknown
https://duckduckgo.com/ac/?q=
unknown
https://www.google.com/complete/search?client=chrome-omni&gs_ri=chrome-ext-ansg&xssi=t&q=&oit=0&oft=1&pgcl=20&gs_rn=42&sugkey=AIzaSyBOti4mM-6x9WDnZIjIeyEU21OpBXqWBgw
142.251.40.100
http://www.searchvity.com/
unknown
https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
unknown
https://www.google.com/sorry/index?continue=https://www.google.com/async/newtab_promos&q=EgS_YJbhGIS3zrEGIjC0v607c_qYvTi5H8NDS3aYuCJmplAqD5Rl0JeJ4_KibV6kPGTEw6xAv1H63aOy6jsyAXJKGVNPUlJZX0FCVVNJVkVfTkVUX01FU1NBR0VaAUM
142.251.40.100
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
unknown
https://www.google.com/async/newtab_promos
142.251.40.100
https://www.google.com/async/newtab_ogb?hl=en-US&async=fixed:0
142.251.40.100
http://www.searchvity.com/?dn=
unknown
https://www.google.com/sorry/index?continue=https://www.google.com/async/newtab_ogb%3Fhl%3Den-US%26async%3Dfixed:0&hl=en-US&q=EgS_YJbhGIS3zrEGIjAy2SY_wKQfS3Qr9DIp4alnyJkCTUiOIWFLBr4l8U2O7-X7PjrHl9WYNHcJAlxWu-0yAXJKGVNPUlJZX0FCVVNJVkVfTkVUX01FU1NBR0VaAUM
142.251.40.100
https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&comm
unknown
https://www.ecosia.org/newtab/
unknown
https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
unknown
There are 7 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
www.terelprime.com
66.96.161.166
malicious
www.besthomeincome24.com
unknown
malicious
www.google.com
142.251.40.100

IPs

IP
Domain
Country
Malicious
192.168.2.5
unknown
unknown
malicious
66.96.161.166
www.terelprime.com
United States
malicious
142.251.40.100
www.google.com
United States
239.255.255.250
unknown
Reserved
192.168.2.23
unknown
unknown

Memdumps

Base Address
Regiontype
Protect
Malicious
4E70000
unkown
page execute and read and write
malicious
4E90000
system
page execute and read and write
malicious
400000
remote allocation
page execute and read and write
malicious
4130000
trusted library allocation
page read and write
malicious
4170000
trusted library allocation
page read and write
malicious
11C0000
unclassified section
page execute and read and write
malicious
41B0000
unclassified section
page execute and read and write
malicious
237000
unkown
page readonly
7731000
heap
page read and write
773E000
heap
page read and write
58A000
stack
page read and write
520000
unkown
page readonly
1911000
direct allocation
page execute and read and write
4F85000
system
page execute and read and write
4031000
heap
page read and write
25EC000
unkown
page read and write
3080000
trusted library allocation
page read and write
4031000
heap
page read and write
79D0000
heap
page read and write
1340000
heap
page read and write
56BA000
trusted library allocation
page read and write
4031000
heap
page read and write
166F000
stack
page read and write
4031000
heap
page read and write
4D8000
heap
page read and write
4031000
heap
page read and write
2782000
unkown
page read and write
4031000
heap
page read and write
22E000
unkown
page readonly
587E000
trusted library allocation
page read and write
3070000
unkown
page execute and read and write
4031000
heap
page read and write
4031000
heap
page read and write
220000
unkown
page readonly
7707000
heap
page read and write
4031000
heap
page read and write
4031000
heap
page read and write
4031000
heap
page read and write
792C000
stack
page read and write
2480000
unkown
page read and write
4031000
heap
page read and write
533000
heap
page read and write
4031000
heap
page read and write
4031000
heap
page read and write
4BB000
heap
page read and write
1350000
heap
page read and write
1288000
heap
page read and write
8FD000
stack
page read and write
4031000
heap
page read and write
4031000
heap
page read and write
4FA000
stack
page read and write
4031000
heap
page read and write
950000
unkown
page read and write
17FE000
direct allocation
page execute and read and write
51AF000
stack
page read and write
4514000
unclassified section
page execute and read and write
4031000
heap
page read and write
16A0000
trusted library allocation
page read and write
4031000
heap
page read and write
41EF000
heap
page read and write
4031000
heap
page read and write
4154000
heap
page read and write
262E000
stack
page read and write
4C8000
heap
page read and write
5F0000
unkown
page readonly
1176000
stack
page read and write
7746000
heap
page read and write
152E000
stack
page read and write
4031000
heap
page read and write
4031000
heap
page read and write
25B0000
unkown
page readonly
5681000
trusted library allocation
page read and write
94E000
stack
page read and write
303E000
stack
page read and write
1789000
direct allocation
page execute and read and write
BF0000
heap
page read and write
4031000
heap
page read and write
16D6000
trusted library allocation
page execute and read and write
900000
heap
page read and write
4031000
heap
page read and write
4031000
heap
page read and write
4031000
heap
page read and write
4031000
heap
page read and write
4031000
heap
page read and write
4031000
heap
page read and write
4031000
heap
page read and write
5BD4000
unkown
page execute and read and write
4031000
heap
page read and write
5A5E000
stack
page read and write
4031000
heap
page read and write
4031000
heap
page read and write
156E000
stack
page read and write
38062000
system
page read and write
11CE000
heap
page read and write
860000
heap
page read and write
4031000
heap
page read and write
5E0000
heap
page read and write
4FA000
stack
page read and write
4031000
heap
page read and write
46F2000
unclassified section
page read and write
220000
unkown
page readonly
10C0000
heap
page read and write
4031000
heap
page read and write
192D000
direct allocation
page execute and read and write
19B0000
unclassified section
page execute and read and write
12E0000
heap
page read and write
4031000
heap
page read and write
4031000
heap
page read and write
44CD000
direct allocation
page execute and read and write
469000
heap
page read and write
160000
system
page execute and read and write
4031000
heap
page read and write
4031000
heap
page read and write
4031000
heap
page read and write
1283000
heap
page read and write
4031000
heap
page read and write
24A0000
heap
page read and write
4031000
heap
page read and write
14C0000
heap
page read and write
EFA000
stack
page read and write
13FF000
stack
page read and write
466D000
direct allocation
page execute and read and write
243E000
stack
page read and write
46E2000
direct allocation
page execute and read and write
4260000
trusted library allocation
page execute and read and write
830000
unkown
page readonly
23E0000
unkown
page read and write
5F0000
unkown
page readonly
4031000
heap
page read and write
5D0000
unkown
page readonly
4031000
heap
page read and write
500000
unkown
page readonly
4031000
heap
page read and write
447000
heap
page read and write
5FC000
stack
page read and write
502000
heap
page read and write
235000
unkown
page read and write
50AC000
unkown
page read and write
2880000
heap
page read and write
1010000
heap
page read and write
100E000
stack
page read and write
960000
heap
page read and write
FD1000
unkown
page readonly
2460000
unkown
page read and write
970000
unkown
page read and write
4031000
heap
page read and write
4031000
heap
page read and write
16E7000
trusted library allocation
page execute and read and write
16C0000
trusted library allocation
page read and write
25AF000
stack
page read and write
463000
heap
page read and write
30B7000
trusted library allocation
page read and write
1202000
heap
page read and write
480000
unkown
page readonly
24C0000
unkown
page readonly
5890000
heap
page execute and read and write
72E000
stack
page read and write
40D1000
trusted library allocation
page read and write
237000
unkown
page readonly
988000
heap
page read and write
492000
heap
page read and write
510000
unkown
page readonly
24A0000
heap
page read and write
4B2000
heap
page read and write
57D0000
trusted library section
page read and write
4031000
heap
page read and write
D60000
unkown
page readonly
43E000
stack
page read and write
431C000
heap
page read and write
4031000
heap
page read and write
24C0000
unkown
page readonly
56C0000
heap
page read and write
4031000
heap
page read and write
4031000
heap
page read and write
4031000
heap
page read and write
4031000
heap
page read and write
2440000
unkown
page readonly
4031000
heap
page read and write
5879000
trusted library allocation
page read and write
107B000
stack
page read and write
11E7000
heap
page read and write
4031000
heap
page read and write
23E0000
unkown
page read and write
463000
heap
page read and write
8FD000
stack
page read and write
76BE000
stack
page read and write
4031000
heap
page read and write
4031000
heap
page read and write
718000
unkown
page read and write
4031000
heap
page read and write
5E1E000
stack
page read and write
25D0000
unkown
page read and write
453E000
direct allocation
page execute and read and write
178D000
direct allocation
page execute and read and write
566B000
trusted library allocation
page read and write
30C0000
heap
page execute and read and write
2690000
unkown
page readonly
4031000
heap
page read and write
235000
unkown
page read and write
2680000
heap
page read and write
1720000
heap
page read and write
DEC000
unkown
page readonly
4C8000
heap
page read and write
4031000
heap
page read and write
4031000
heap
page read and write
388B6000
system
page read and write
11C0000
heap
page read and write
4031000
heap
page read and write
23B0000
unclassified section
page execute and read and write
16DA000
trusted library allocation
page execute and read and write
2660000
heap
page read and write
4031000
heap
page read and write
7D5F000
stack
page read and write
860000
heap
page read and write
1207000
heap
page read and write
4B2000
heap
page read and write
243E000
stack
page read and write
45A000
heap
page read and write
221000
unkown
page execute read
4031000
heap
page read and write
16EB000
trusted library allocation
page execute and read and write
10AE000
stack
page read and write
19A8000
direct allocation
page execute and read and write
4031000
heap
page read and write
4031000
heap
page read and write
57CE000
stack
page read and write
5D4000
heap
page read and write
2840000
heap
page read and write
524000
heap
page read and write
B8C000
stack
page read and write
4470000
unkown
page execute and read and write
1020000
direct allocation
page read and write
4031000
heap
page read and write
5686000
trusted library allocation
page read and write
968000
heap
page read and write
16B0000
trusted library allocation
page read and write
4EA000
heap
page read and write
2782000
unkown
page read and write
4031000
heap
page read and write
30A0000
trusted library allocation
page read and write
16B3000
trusted library allocation
page execute and read and write
4031000
heap
page read and write
830000
unkown
page readonly
58B0000
trusted library allocation
page read and write
16BD000
trusted library allocation
page execute and read and write
4031000
heap
page read and write
4F2E000
system
page execute and read and write
7702000
heap
page read and write
C2F000
stack
page read and write
C30000
unkown
page readonly
4031000
heap
page read and write
4031000
heap
page read and write
4031000
heap
page read and write
5850000
trusted library allocation
page read and write
1660000
direct allocation
page execute and read and write
5C0000
unkown
page readonly
2FD6000
unkown
page read and write
1926000
direct allocation
page execute and read and write
5A1E000
stack
page read and write
56A8000
trusted library allocation
page read and write
4031000
heap
page read and write
4031000
heap
page read and write
22E000
unkown
page readonly
567E000
trusted library allocation
page read and write
3A70000
unkown
page execute and read and write
1710000
trusted library allocation
page execute and read and write
58A000
stack
page read and write
4031000
heap
page read and write
2F3E000
stack
page read and write
4031000
heap
page read and write
5E5000
heap
page read and write
480000
unkown
page readonly
F51000
unkown
page readonly
4031000
heap
page read and write
653E000
stack
page read and write
EB000
stack
page read and write
4031000
heap
page read and write
4031000
heap
page read and write
FD1000
unkown
page readonly
4031000
heap
page read and write
7D9E000
stack
page read and write
BBF000
stack
page read and write
79AE000
stack
page read and write
4310000
trusted library allocation
page read and write
961000
unkown
page readonly
41BB000
trusted library allocation
page read and write
221000
unkown
page execute read
4031000
heap
page read and write
5664000
trusted library allocation
page read and write
23AE000
stack
page read and write
58C0000
trusted library section
page read and write
1355000
heap
page read and write
1700000
trusted library allocation
page read and write
4031000
heap
page read and write
41B0000
trusted library allocation
page read and write
4031000
heap
page read and write
900000
heap
page read and write
1200000
heap
page read and write
133E000
stack
page read and write
4031000
heap
page read and write
2684000
heap
page read and write
5D4000
heap
page read and write
4031000
heap
page read and write
438D000
heap
page read and write
4031000
heap
page read and write
5FC000
stack
page read and write
16C4000
trusted library allocation
page read and write
56BD000
trusted library allocation
page read and write
4031000
heap
page read and write
12F0000
heap
page read and write
526E000
stack
page read and write
4671000
direct allocation
page execute and read and write
2684000
heap
page read and write
16D0000
trusted library allocation
page read and write
470000
unkown
page readonly
4318000
heap
page read and write
ABE000
stack
page read and write
5874000
trusted library allocation
page read and write
25AF000
stack
page read and write
5660000
trusted library allocation
page read and write
4031000
heap
page read and write
16E0000
trusted library allocation
page read and write
2460000
unkown
page read and write
4031000
heap
page read and write
4031000
heap
page read and write
4031000
heap
page read and write
470000
unkown
page readonly
4031000
heap
page read and write
E31000
unkown
page readonly
94E000
stack
page read and write
520000
unkown
page readonly
4031000
heap
page read and write
16B4000
trusted library allocation
page read and write
643E000
stack
page read and write
25D0000
unkown
page read and write
4031000
heap
page read and write
5D4000
heap
page read and write
F51000
unkown
page readonly
4031000
heap
page read and write
4031000
heap
page read and write
235000
unkown
page read and write
7E5F000
stack
page read and write
57E000
stack
page read and write
463000
heap
page read and write
458000
heap
page read and write
4031000
heap
page read and write
24B0000
heap
page read and write
58B5000
trusted library allocation
page read and write
44A6000
unclassified section
page execute and read and write
4E0000
heap
page read and write
4031000
heap
page read and write
4031000
heap
page read and write
463000
heap
page read and write
5880000
trusted library allocation
page read and write
76FC000
heap
page read and write
11C8000
heap
page read and write
4031000
heap
page read and write
49CC000
unclassified section
page read and write
5166000
unkown
page execute and read and write
772A000
heap
page read and write
870000
heap
page read and write
4031000
heap
page read and write
4F14000
unclassified section
page execute and read and write
30D1000
trusted library allocation
page read and write
27B0000
trusted library allocation
page read and write
235000
unkown
page read and write
4F09000
system
page execute and read and write
4031000
heap
page read and write
4031000
heap
page read and write
4031000
heap
page read and write
5D0000
unkown
page readonly
2A5C000
unkown
page read and write
4031000
heap
page read and write
2A5C000
unkown
page read and write
4031000
heap
page read and write
4F46000
unclassified section
page read and write
980000
heap
page read and write
4031000
heap
page read and write
968000
heap
page read and write
519000
heap
page read and write
2664000
heap
page read and write
514000
heap
page read and write
4031000
heap
page read and write
45E000
heap
page read and write
4031000
heap
page read and write
950000
unkown
page read and write
4031000
heap
page read and write
D62000
unkown
page readonly
4B6000
heap
page read and write
5D0000
heap
page read and write
5C1E000
stack
page read and write
4031000
heap
page read and write
4031000
heap
page read and write
4031000
heap
page read and write
1E0000
heap
page read and write
4A3000
heap
page read and write
4031000
heap
page read and write
1D0000
heap
page read and write
4A7000
heap
page read and write
4031000
heap
page read and write
3833C000
system
page read and write
C30000
unkown
page readonly
2664000
heap
page read and write
BC0000
unkown
page readonly
4031000
heap
page read and write
4B6000
heap
page read and write
4031000
heap
page read and write
4031000
heap
page read and write
44C9000
direct allocation
page execute and read and write
7DDF000
stack
page read and write
4031000
heap
page read and write
4E4000
heap
page read and write
4031000
heap
page read and write
237000
unkown
page readonly
4031000
heap
page read and write
128000
stack
page read and write
4031000
heap
page read and write
4031000
heap
page read and write
7737000
heap
page read and write
56A0000
trusted library allocation
page read and write
6EE000
stack
page read and write
469000
heap
page read and write
4031000
heap
page read and write
715000
unkown
page read and write
48A000
heap
page read and write
22E000
unkown
page readonly
51D4000
unkown
page execute and read and write
796D000
stack
page read and write
988000
heap
page read and write
220000
unkown
page readonly
4031000
heap
page read and write
4031000
heap
page read and write
2DB0000
unclassified section
page execute and read and write
5D1F000
stack
page read and write
870000
heap
page read and write
4031000
heap
page read and write
960000
heap
page read and write
4031000
heap
page read and write
56B0000
trusted library allocation
page read and write
4BB000
heap
page read and write
4031000
heap
page read and write
2ED0000
heap
page read and write
4031000
heap
page read and write
500000
unkown
page readonly
770C000
heap
page read and write
22E000
unkown
page readonly
2680000
heap
page read and write
4031000
heap
page read and write
4031000
heap
page read and write
56B5000
trusted library allocation
page read and write
490000
unkown
page readonly
4031000
heap
page read and write
4031000
heap
page read and write
4031000
heap
page read and write
5870000
trusted library allocation
page read and write
50F000
heap
page read and write
7E1E000
stack
page read and write
511000
heap
page read and write
980000
heap
page read and write
950000
unkown
page read and write
5695000
trusted library allocation
page read and write
840000
unkown
page readonly
4031000
heap
page read and write
4031000
heap
page read and write
840000
unkown
page readonly
7721000
heap
page read and write
27B4000
heap
page read and write
237000
unkown
page readonly
4031000
heap
page read and write
11F5000
heap
page read and write
565E000
stack
page read and write
850000
unkown
page readonly
508000
heap
page read and write
4D2000
heap
page read and write
4030000
heap
page read and write
490000
unkown
page readonly
4031000
heap
page read and write
279F000
stack
page read and write
37B0000
unclassified section
page execute and read and write
10B0000
heap
page read and write
5860000
trusted library allocation
page read and write
4031000
heap
page read and write
4031000
heap
page read and write
307E000
stack
page read and write
463000
heap
page read and write
4031000
heap
page read and write
97F000
heap
page read and write
7744000
heap
page read and write
5BE000
stack
page read and write
458000
heap
page read and write
961000
unkown
page readonly
5C0000
unkown
page readonly
4031000
heap
page read and write
220000
unkown
page readonly
76F5000
heap
page read and write
4031000
heap
page read and write
E31000
unkown
page readonly
4031000
heap
page read and write
43A0000
direct allocation
page execute and read and write
4031000
heap
page read and write
2470000
unkown
page read and write
7734000
heap
page read and write
4031000
heap
page read and write
4031000
heap
page read and write
4031000
heap
page read and write
4031000
heap
page read and write
25B0000
unkown
page readonly
1285000
heap
page read and write
46A000
heap
page read and write
5662000
trusted library allocation
page read and write
15CF000
stack
page read and write
40D5000
trusted library allocation
page read and write
BC0000
unkown
page readonly
221000
unkown
page execute read
2440000
unkown
page readonly
4031000
heap
page read and write
4031000
heap
page read and write
4031000
heap
page read and write
2660000
heap
page read and write
4031000
heap
page read and write
4031000
heap
page read and write
45E000
heap
page read and write
4031000
heap
page read and write
4031000
heap
page read and write
4031000
heap
page read and write
440000
heap
page read and write
24B0000
heap
page read and write
970000
unkown
page read and write
438D000
stack
page read and write
4F6000
heap
page read and write
2690000
unkown
page readonly
2EF0000
heap
page read and write
4310000
trusted library allocation
page read and write
850000
unkown
page readonly
950000
unkown
page read and write
463000
heap
page read and write
4031000
heap
page read and write
4310000
trusted library allocation
page read and write
510000
unkown
page readonly
30B0000
trusted library allocation
page read and write
221000
unkown
page execute read
4031000
heap
page read and write
24AF000
stack
page read and write
590D000
stack
page read and write
4031000
heap
page read and write
2670000
unkown
page execute and read and write
C2F000
stack
page read and write
5E0000
heap
page read and write
There are 538 hidden memdumps, click here to show them.