IOC Report
99200032052824.bat.exe

loading gif

Files

File Path
Type
Category
Malicious
99200032052824.bat.exe
PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
initial sample
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\rasterside.ini
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\App.ini
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\nsvDCDA.tmp\System.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\tmc.ini
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Bemangle\parsleywort\Krapyls172.syg
data
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Bemangle\parsleywort\Mattias.nap
data
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Bemangle\parsleywort\Nydannelses.Aar
data
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Bemangle\parsleywort\Quizs\Sestertius.djv
data
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Bemangle\parsleywort\Quizs\Slidsomt.bra
data
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Bemangle\parsleywort\Quizs\Strand\afslres.ten
data
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Bemangle\parsleywort\Quizs\Strand\discomposed.non
TeX font metric data
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Bemangle\parsleywort\Quizs\Strand\dred.jpg
JPEG image data, JFIF standard 1.01, aspect ratio, density 1x1, segment length 16, baseline, precision 8, 200x200, components 3
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Bemangle\parsleywort\Quizs\Strand\gametophoric.txt
ASCII text, with very long lines (364), with CRLF line terminators
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Bemangle\parsleywort\Quizs\Strand\isocola.sol
data
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Bemangle\parsleywort\Quizs\Strand\malningerne.bog
data
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Bemangle\parsleywort\Quizs\Strand\monodomous.kal
TTComp archive data, binary, 1K dictionary
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Bemangle\parsleywort\Quizs\Strand\ornery.cem
data
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Bemangle\parsleywort\Quizs\Strand\podagrist.ref
data
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Bemangle\parsleywort\Quizs\Strand\soliloquium.bor
data
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Bemangle\parsleywort\Quizs\Strand\thoroughwort.ret
data
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Bemangle\parsleywort\Quizs\Strand\torminal.wes
data
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Bemangle\parsleywort\Quizs\afkontrollere.urb
data
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Bemangle\parsleywort\parallelopipedon.idi
data
dropped
There are 14 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\99200032052824.bat.exe
"C:\Users\user\Desktop\99200032052824.bat.exe"
malicious
C:\Users\user\Desktop\99200032052824.bat.exe
"C:\Users\user\Desktop\99200032052824.bat.exe"
malicious

URLs

Name
IP
Malicious
http://nsis.sf.net/NSIS_Error
unknown
http://nsis.sf.net/NSIS_ErrorError
unknown
http://109.248.151.11/LZJRCXHEEshk185.bin
109.248.151.11
http://ip-api.com/line/?fields=hosting
208.95.112.1

Domains

Name
IP
Malicious
ip-api.com
208.95.112.1
malicious

IPs

IP
Domain
Country
Malicious
208.95.112.1
ip-api.com
United States
malicious
109.248.151.11
unknown
Russian Federation

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\lymphotaxis\Navigableness\Dumdum186
konvertibiliteten
HKEY_CURRENT_USER\opslugte\Microsoft\Windows\plukkendes\Uninstall\hdersplads
bicameral
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\99200032052824_RASAPI32
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\99200032052824_RASAPI32
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\99200032052824_RASAPI32
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\99200032052824_RASAPI32
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\99200032052824_RASAPI32
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\99200032052824_RASAPI32
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\99200032052824_RASAPI32
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\99200032052824_RASMANCS
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\99200032052824_RASMANCS
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\99200032052824_RASMANCS
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\99200032052824_RASMANCS
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\99200032052824_RASMANCS
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\99200032052824_RASMANCS
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\99200032052824_RASMANCS
FileDirectory
There are 7 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
5B73000
direct allocation
page execute and read and write
malicious
39A40000
trusted library allocation
page read and write
6CA4000
heap
page read and write
6CA4000
heap
page read and write
190000
trusted library allocation
page read and write
6CA4000
heap
page read and write
375FD000
trusted library allocation
page read and write
6CA4000
heap
page read and write
6CA4000
heap
page read and write
6CA4000
heap
page read and write
6CA4000
heap
page read and write
6CA4000
heap
page read and write
6CA4000
heap
page read and write
6CA4000
heap
page read and write
39FB0000
trusted library allocation
page read and write
398A0000
trusted library allocation
page read and write
6CA4000
heap
page read and write
398A0000
trusted library allocation
page read and write
6CA4000
heap
page read and write
6CA5000
heap
page read and write
6CA4000
heap
page read and write
398A0000
trusted library allocation
page read and write
6CA4000
heap
page read and write
441000
unkown
page readonly
6CA4000
heap
page read and write
6CA4000
heap
page read and write
6CA4000
heap
page read and write
398A0000
trusted library allocation
page read and write
6CA4000
heap
page read and write
29E0000
trusted library allocation
page read and write
6CA4000
heap
page read and write
6CA4000
heap
page read and write
6CA4000
heap
page read and write
398A0000
trusted library allocation
page read and write
5173000
direct allocation
page execute and read and write
6CA4000
heap
page read and write
421000
unkown
page read and write
9D000
trusted library allocation
page execute and read and write
398A0000
trusted library allocation
page read and write
39DC5000
heap
page read and write
398A0000
trusted library allocation
page read and write
6CA4000
heap
page read and write
6CA4000
heap
page read and write
6CA4000
heap
page read and write
5E0000
heap
page read and write
8D73000
direct allocation
page execute and read and write
398A0000
trusted library allocation
page read and write
6CA4000
heap
page read and write
6CA4000
heap
page read and write
6CA4000
heap
page read and write
375F0000
trusted library allocation
page read and write
8A40000
direct allocation
page read and write
398B0000
heap
page read and write
6CA4000
heap
page read and write
6CA4000
heap
page read and write
6CA4000
heap
page read and write
6CA4000
heap
page read and write
39DBF000
heap
page read and write
6CA4000
heap
page read and write
400000
unkown
page readonly
6CA4000
heap
page read and write
6E47000
heap
page read and write
6CA4000
heap
page read and write
2A50000
direct allocation
page read and write
398A0000
trusted library allocation
page read and write
6CA4000
heap
page read and write
6CA4000
heap
page read and write
6CA4000
heap
page read and write
6CA4000
heap
page read and write
39F80000
trusted library allocation
page read and write
6CA4000
heap
page read and write
6CA4000
heap
page read and write
6CA4000
heap
page read and write
42C000
unkown
page read and write
CB000
trusted library allocation
page execute and read and write
6CA4000
heap
page read and write
39A50000
trusted library allocation
page read and write
6CA4000
heap
page read and write
6CA4000
heap
page read and write
6CA4000
heap
page read and write
6CA4000
heap
page read and write
375F3000
trusted library allocation
page read and write
6CA4000
heap
page read and write
6CA4000
heap
page read and write
6CA4000
heap
page read and write
39F70000
trusted library allocation
page read and write
6CA4000
heap
page read and write
6CA4000
heap
page read and write
39710000
heap
page read and write
398A0000
trusted library allocation
page read and write
6CA4000
heap
page read and write
6CA4000
heap
page read and write
6E1A000
heap
page read and write
73A35000
unkown
page readonly
398A0000
trusted library allocation
page read and write
39D9D000
heap
page read and write
6CA4000
heap
page read and write
2A60000
direct allocation
page read and write
6CA4000
heap
page read and write
6CA4000
heap
page read and write
6CA4000
heap
page read and write
375F0000
trusted library allocation
page read and write
2290000
heap
page read and write
6CA4000
heap
page read and write
6CA4000
heap
page read and write
6CA4000
heap
page read and write
3768F000
trusted library allocation
page read and write
39D70000
heap
page read and write
39DD1000
heap
page read and write
6F73000
direct allocation
page execute and read and write
6CA4000
heap
page read and write
6CA4000
heap
page read and write
375F0000
trusted library allocation
page read and write
6CA4000
heap
page read and write
6CA4000
heap
page read and write
6CA4000
heap
page read and write
29E0000
trusted library allocation
page read and write
39D83000
heap
page read and write
39A40000
trusted library allocation
page read and write
6CA5000
heap
page read and write
39D81000
heap
page read and write
3970E000
stack
page read and write
701F000
stack
page read and write
6CA4000
heap
page read and write
375F0000
trusted library allocation
page read and write
37600000
heap
page read and write
7ED000
heap
page read and write
5BE000
stack
page read and write
398A0000
trusted library allocation
page read and write
6CA5000
heap
page read and write
6CA4000
heap
page read and write
6CA4000
heap
page read and write
6CA4000
heap
page read and write
375D0000
trusted library allocation
page read and write
6CA4000
heap
page read and write
6CA4000
heap
page read and write
6CA4000
heap
page read and write
6CA4000
heap
page read and write
398A0000
trusted library allocation
page read and write
29E0000
trusted library allocation
page read and write
398A0000
trusted library allocation
page read and write
6CA4000
heap
page read and write
6CA4000
heap
page read and write
6CA4000
heap
page read and write
39A40000
trusted library allocation
page read and write
6CA4000
heap
page read and write
6CA4000
heap
page read and write
6CA4000
heap
page read and write
6CA4000
heap
page read and write
6CA4000
heap
page read and write
6CA4000
heap
page read and write
73A33000
unkown
page readonly
6CA4000
heap
page read and write
6DA3000
heap
page read and write
6CA4000
heap
page read and write
6CA4000
heap
page read and write
AD000
trusted library allocation
page execute and read and write
408000
unkown
page readonly
6CA4000
heap
page read and write
6CA4000
heap
page read and write
6CA4000
heap
page read and write
6CA4000
heap
page read and write
6CA4000
heap
page read and write
398A1000
trusted library allocation
page read and write
6CA4000
heap
page read and write
398A0000
trusted library allocation
page read and write
401000
unkown
page execute read
2A20000
direct allocation
page read and write
6CA4000
heap
page read and write
1813000
remote allocation
page execute and read and write
375F0000
trusted library allocation
page read and write
6CA4000
heap
page read and write
39D78000
heap
page read and write
6CA4000
heap
page read and write
6CA4000
heap
page read and write
6CA4000
heap
page read and write
39D9F000
heap
page read and write
6CA4000
heap
page read and write
2350000
heap
page read and write
7C7000
heap
page read and write
6CA4000
heap
page read and write
6CA4000
heap
page read and write
6CA4000
heap
page read and write
375F0000
trusted library allocation
page read and write
373DC000
stack
page read and write
6CA4000
heap
page read and write
401000
unkown
page execute read
6CA4000
heap
page read and write
6E3A000
heap
page read and write
6CA4000
heap
page read and write
6CA4000
heap
page read and write
6CA5000
heap
page read and write
180000
trusted library allocation
page read and write
6CA5000
heap
page read and write
6E36000
heap
page read and write
6CA4000
heap
page read and write
16D0000
remote allocation
page execute and read and write
160000
trusted library allocation
page execute and read and write
39711000
heap
page read and write
6CA4000
heap
page read and write
6CA4000
heap
page read and write
190000
trusted library allocation
page read and write
6CA4000
heap
page read and write
39A40000
trusted library allocation
page read and write
6CA4000
heap
page read and write
6CA4000
heap
page read and write
6CA4000
heap
page read and write
6CA4000
heap
page read and write
6CA4000
heap
page read and write
398A0000
trusted library allocation
page read and write
6CA4000
heap
page read and write
6CA5000
heap
page read and write
6CA4000
heap
page read and write
6CA4000
heap
page read and write
6CA5000
heap
page read and write
6CA4000
heap
page read and write
6CA4000
heap
page read and write
6CA4000
heap
page read and write
6CA4000
heap
page read and write
6CA4000
heap
page read and write
A0000
trusted library allocation
page read and write
398A0000
trusted library allocation
page read and write
6CA4000
heap
page read and write
2213000
remote allocation
page execute and read and write
39F77000
trusted library allocation
page read and write
398A0000
trusted library allocation
page read and write
39FD0000
trusted library allocation
page read and write
375F0000
trusted library allocation
page execute and read and write
398A0000
trusted library allocation
page read and write
6CA4000
heap
page read and write
6CA5000
heap
page read and write
375F0000
trusted library allocation
page read and write
6CA4000
heap
page read and write
3613000
remote allocation
page execute and read and write
6CA4000
heap
page read and write
39FC0000
trusted library allocation
page read and write
398A0000
trusted library allocation
page read and write
6CA4000
heap
page read and write
398A0000
trusted library allocation
page read and write
6CA4000
heap
page read and write
6CA4000
heap
page read and write
6D40000
direct allocation
page read and write
398A0000
trusted library allocation
page read and write
6CA4000
heap
page read and write
6CA4000
heap
page read and write
6CA4000
heap
page read and write
398A0000
trusted library allocation
page read and write
6CA4000
heap
page read and write
6CA4000
heap
page read and write
6CA4000
heap
page read and write
401000
unkown
page execute read
6CA4000
heap
page read and write
6CA4000
heap
page read and write
6CA4000
heap
page read and write
39FD0000
trusted library allocation
page read and write
6DE2000
heap
page read and write
6CA4000
heap
page read and write
6CA4000
heap
page read and write
6CA4000
heap
page read and write
398A2000
trusted library allocation
page read and write
6CA5000
heap
page read and write
398A0000
trusted library allocation
page read and write
39F90000
trusted library allocation
page read and write
6CA4000
heap
page read and write
6CA4000
heap
page read and write
29A0000
heap
page read and write
6CA4000
heap
page read and write
6CA4000
heap
page read and write
6CA4000
heap
page read and write
6CA4000
heap
page read and write
6CA4000
heap
page read and write
6CA4000
heap
page read and write
6CA4000
heap
page read and write
6CA4000
heap
page read and write
375F0000
trusted library allocation
page read and write
6CA4000
heap
page read and write
6CA4000
heap
page read and write
6CA4000
heap
page read and write
6D80000
heap
page read and write
6CA4000
heap
page read and write
6CA4000
heap
page read and write
398A0000
trusted library allocation
page read and write
6CA4000
heap
page read and write
6CA4000
heap
page read and write
29E0000
trusted library allocation
page read and write
6CA4000
heap
page read and write
6CA4000
heap
page read and write
6CA4000
heap
page read and write
8AA0000
direct allocation
page read and write
6CA4000
heap
page read and write
6CA4000
heap
page read and write
6CA4000
heap
page read and write
4A13000
remote allocation
page execute and read and write
6CA4000
heap
page read and write
190000
trusted library allocation
page read and write
6CA4000
heap
page read and write
398A0000
trusted library allocation
page read and write
6CA4000
heap
page read and write
6CA4000
heap
page read and write
90000
trusted library allocation
page read and write
6CA4000
heap
page read and write
8A60000
direct allocation
page read and write
73A30000
unkown
page readonly
6CA4000
heap
page read and write
6CA4000
heap
page read and write
39DC5000
heap
page read and write
C7000
trusted library allocation
page execute and read and write
6CA4000
heap
page read and write
6CA4000
heap
page read and write
6CA4000
heap
page read and write
6CA4000
heap
page read and write
37250000
direct allocation
page read and write
B2000
trusted library allocation
page read and write
6CA4000
heap
page read and write
6CA4000
heap
page read and write
6573000
direct allocation
page execute and read and write
6CA4000
heap
page read and write
6CA4000
heap
page read and write
6CA4000
heap
page read and write
29E0000
direct allocation
page read and write
6CA4000
heap
page read and write
6CA4000
heap
page read and write
6CA4000
heap
page read and write
6CA4000
heap
page read and write
39FA0000
trusted library allocation
page read and write
37538000
trusted library allocation
page read and write
6CA4000
heap
page read and write
37420000
heap
page read and write
39DAA000
heap
page read and write
398A0000
trusted library allocation
page read and write
6CA4000
heap
page read and write
6CA4000
heap
page read and write
6CA4000
heap
page read and write
6CA5000
heap
page read and write
6CA4000
heap
page read and write
39A40000
trusted library allocation
page read and write
6CA4000
heap
page read and write
6CA4000
heap
page read and write
39A40000
trusted library allocation
page read and write
6CA4000
heap
page read and write
375F0000
trusted library allocation
page read and write
398A0000
trusted library allocation
page read and write
6CA4000
heap
page read and write
39A41000
trusted library allocation
page read and write
6CA4000
heap
page read and write
10E000
stack
page read and write
6CA4000
heap
page read and write
6CA4000
heap
page read and write
6CA4000
heap
page read and write
6CA4000
heap
page read and write
6CA4000
heap
page read and write
6CA4000
heap
page read and write
6CA4000
heap
page read and write
398A0000
trusted library allocation
page read and write
6F0000
heap
page read and write
6CA5000
heap
page read and write
3984D000
stack
page read and write
6813000
remote allocation
page execute and read and write
6CA4000
heap
page read and write
6CA4000
heap
page read and write
398A0000
trusted library allocation
page read and write
6CA4000
heap
page read and write
6CA4000
heap
page read and write
6CA4000
heap
page read and write
6CA4000
heap
page read and write
6CA4000
heap
page read and write
39A40000
trusted library allocation
page read and write
398A0000
trusted library allocation
page read and write
6CA4000
heap
page read and write
6CA4000
heap
page read and write
6CA4000
heap
page read and write
6CA0000
heap
page read and write
6CA4000
heap
page read and write
37647000
trusted library allocation
page read and write
40A000
unkown
page write copy
6CA4000
heap
page read and write
3729A000
stack
page read and write
6CA4000
heap
page read and write
6CA4000
heap
page read and write
6CA4000
heap
page read and write
6CA4000
heap
page read and write
6CA4000
heap
page read and write
39711000
heap
page read and write
6CA4000
heap
page read and write
398A0000
trusted library allocation
page read and write
6CA4000
heap
page read and write
398A0000
trusted library allocation
page read and write
6CA4000
heap
page read and write
6CA5000
heap
page read and write
6CA4000
heap
page read and write
76E000
stack
page read and write
6CA4000
heap
page read and write
6CA4000
heap
page read and write
6CA4000
heap
page read and write
4013000
remote allocation
page execute and read and write
6CA4000
heap
page read and write
6CA4000
heap
page read and write
6CA4000
heap
page read and write
6CA4000
heap
page read and write
6CA4000
heap
page read and write
6CA4000
heap
page read and write
39D80000
heap
page read and write
6CA4000
heap
page read and write
398A0000
trusted library allocation
page read and write
39A40000
trusted library allocation
page read and write
400000
unkown
page readonly
33CB000
stack
page read and write
6CA4000
heap
page read and write
6CA4000
heap
page read and write
15C000
stack
page read and write
6CA4000
heap
page read and write
400000
unkown
page readonly
6CA4000
heap
page read and write
6CA4000
heap
page read and write
30000
heap
page read and write
431000
unkown
page read and write
6CA4000
heap
page read and write
6CA4000
heap
page read and write
5E13000
remote allocation
page execute and read and write
6CA4000
heap
page read and write
6CA4000
heap
page read and write
6CA4000
heap
page read and write
6D50000
heap
page read and write
6CA4000
heap
page read and write
6CA4000
heap
page read and write
6CA4000
heap
page read and write
2355000
heap
page read and write
6CA4000
heap
page read and write
6CA4000
heap
page read and write
6CA4000
heap
page read and write
6D97000
heap
page read and write
401000
unkown
page execute read
8AF0000
heap
page read and write
6CA4000
heap
page read and write
80000
trusted library allocation
page read and write
6CA4000
heap
page read and write
6CA4000
heap
page read and write
798000
heap
page read and write
6CA4000
heap
page read and write
398A3000
trusted library allocation
page read and write
398A0000
trusted library allocation
page read and write
6CA4000
heap
page read and write
30000
heap
page read and write
6CA4000
heap
page read and write
6CA4000
heap
page read and write
43E000
unkown
page read and write
6CA4000
heap
page read and write
39A50000
trusted library allocation
page read and write
110000
heap
page execute and read and write
6CA4000
heap
page read and write
6CA4000
heap
page read and write
39DAC000
heap
page read and write
6CA4000
heap
page read and write
6CA4000
heap
page read and write
6CA4000
heap
page read and write
6CA4000
heap
page read and write
6E45000
heap
page read and write
6CA4000
heap
page read and write
6CA4000
heap
page read and write
6CA4000
heap
page read and write
29E0000
trusted library allocation
page read and write
6CA4000
heap
page read and write
398A0000
trusted library allocation
page read and write
6CA5000
heap
page read and write
6CA4000
heap
page read and write
19A000
stack
page read and write
8BC0000
trusted library allocation
page read and write
6CA4000
heap
page read and write
6CA4000
heap
page read and write
6CA4000
heap
page read and write
6CA4000
heap
page read and write
7DA000
heap
page read and write
6CA4000
heap
page read and write
6CA4000
heap
page read and write
6CA4000
heap
page read and write
7973000
direct allocation
page execute and read and write
6CA4000
heap
page read and write
6CA4000
heap
page read and write
6CA4000
heap
page read and write
6CA4000
heap
page read and write
6CA4000
heap
page read and write
2A80000
direct allocation
page read and write
6CA4000
heap
page read and write
6CA4000
heap
page read and write
6CA4000
heap
page read and write
6D9F000
heap
page read and write
6CA4000
heap
page read and write
6CA4000
heap
page read and write
2A40000
direct allocation
page read and write
6CA4000
heap
page read and write
6CA4000
heap
page read and write
39DBD000
heap
page read and write
6CA4000
heap
page read and write
6CA4000
heap
page read and write
6CA4000
heap
page read and write
6EF000
stack
page read and write
375F0000
trusted library allocation
page read and write
6CA4000
heap
page read and write
8AF7000
heap
page read and write
6CA4000
heap
page read and write
6CA4000
heap
page read and write
39F80000
trusted library allocation
page read and write
711E000
stack
page read and write
3867C000
trusted library allocation
page read and write
6CA4000
heap
page read and write
6CA4000
heap
page read and write
6CA4000
heap
page read and write
6CA4000
heap
page read and write
398A0000
trusted library allocation
page read and write
6CA5000
heap
page read and write
6CA4000
heap
page read and write
6CA4000
heap
page read and write
398A0000
trusted library allocation
page read and write
6CA4000
heap
page read and write
39A50000
trusted library allocation
page read and write
2A90000
direct allocation
page read and write
6CA4000
heap
page read and write
6DA1000
heap
page read and write
6CA4000
heap
page read and write
7C3000
heap
page read and write
6CA4000
heap
page read and write
6CA4000
heap
page read and write
6D58000
heap
page read and write
6CA4000
heap
page read and write
6CA4000
heap
page read and write
32CC000
stack
page read and write
6CA4000
heap
page read and write
6CA4000
heap
page read and write
6CA4000
heap
page read and write
6CA4000
heap
page read and write
39F70000
trusted library allocation
page read and write
6CA4000
heap
page read and write
6CA4000
heap
page read and write
6CA4000
heap
page read and write
6CA4000
heap
page read and write
6CA4000
heap
page read and write
398A0000
trusted library allocation
page read and write
38611000
trusted library allocation
page read and write
6CA4000
heap
page read and write
289F000
stack
page read and write
37645000
trusted library allocation
page read and write
6CA4000
heap
page read and write
435000
unkown
page read and write
39A40000
trusted library allocation
page read and write
39A50000
trusted library allocation
page read and write
6CA4000
heap
page read and write
6CA4000
heap
page read and write
39A60000
heap
page execute and read and write
37778000
trusted library allocation
page read and write
98E000
stack
page read and write
441000
unkown
page readonly
408000
unkown
page readonly
93000
trusted library allocation
page execute and read and write
226E000
stack
page read and write
398A1000
trusted library allocation
page read and write
4630000
direct allocation
page execute and read and write
B6000
trusted library allocation
page execute and read and write
6CA4000
heap
page read and write
6CA4000
heap
page read and write
6CA4000
heap
page read and write
6CA4000
heap
page read and write
2344000
heap
page read and write
6CA4000
heap
page read and write
36E8E000
stack
page read and write
39F90000
trusted library allocation
page read and write
39A50000
trusted library allocation
page read and write
6CA4000
heap
page read and write
8A80000
direct allocation
page read and write
6CA4000
heap
page read and write
6D30000
direct allocation
page read and write
5413000
remote allocation
page execute and read and write
375F0000
trusted library allocation
page read and write
B0000
trusted library allocation
page read and write
39A50000
trusted library allocation
page read and write
39850000
heap
page read and write
6CA4000
heap
page read and write
39A40000
trusted library allocation
page read and write
6CA4000
heap
page read and write
7F9000
heap
page read and write
6CA4000
heap
page read and write
39FA0000
trusted library allocation
page read and write
6CA4000
heap
page read and write
7FDF0000
trusted library allocation
page execute and read and write
6CA4000
heap
page read and write
6CA4000
heap
page read and write
C5000
trusted library allocation
page execute and read and write
6CA4000
heap
page read and write
6CA4000
heap
page read and write
6CA4000
heap
page read and write
6CA4000
heap
page read and write
38639000
trusted library allocation
page read and write
6CA4000
heap
page read and write
29E0000
trusted library allocation
page read and write
6CA4000
heap
page read and write
6CA4000
heap
page read and write
6CA4000
heap
page read and write
6CA4000
heap
page read and write
6CA4000
heap
page read and write
6CA4000
heap
page read and write
39A50000
trusted library allocation
page read and write
6CA4000
heap
page read and write
6CA4000
heap
page read and write
6CA4000
heap
page read and write
A8F000
stack
page read and write
6CA4000
heap
page read and write
408000
unkown
page readonly
6CA4000
heap
page read and write
94000
trusted library allocation
page read and write
6CA4000
heap
page read and write
6CA4000
heap
page read and write
2A30000
direct allocation
page read and write
6CA4000
heap
page read and write
6CA4000
heap
page read and write
39A40000
trusted library allocation
page read and write
6D2C000
stack
page read and write
398A0000
trusted library allocation
page read and write
6CA4000
heap
page read and write
441000
unkown
page readonly
7260000
heap
page read and write
6CA4000
heap
page read and write
6CA4000
heap
page read and write
3752F000
stack
page read and write
6CA4000
heap
page read and write
40A000
unkown
page write copy
408000
unkown
page readonly
6CA4000
heap
page read and write
6CA4000
heap
page read and write
BA000
trusted library allocation
page execute and read and write
6CA4000
heap
page read and write
6CA4000
heap
page read and write
6CA4000
heap
page read and write
2A00000
direct allocation
page read and write
6CA4000
heap
page read and write
39DD1000
heap
page read and write
6CA4000
heap
page read and write
C2000
trusted library allocation
page read and write
6CA4000
heap
page read and write
375F0000
trusted library allocation
page read and write
29E0000
trusted library allocation
page read and write
6CA4000
heap
page read and write
39A40000
trusted library allocation
page read and write
6CA4000
heap
page read and write
441000
unkown
page readonly
6CA4000
heap
page read and write
39890000
trusted library allocation
page read and write
6CA4000
heap
page read and write
6CA4000
heap
page read and write
6CA4000
heap
page read and write
6CA4000
heap
page read and write
398A0000
trusted library allocation
page read and write
6CA4000
heap
page read and write
6CA4000
heap
page read and write
6CA4000
heap
page read and write
375F0000
trusted library allocation
page read and write
6CA4000
heap
page read and write
6CA4000
heap
page read and write
6CA4000
heap
page read and write
6CA4000
heap
page read and write
6CA4000
heap
page read and write
398A0000
trusted library allocation
page read and write
2A10000
direct allocation
page read and write
6DB8000
heap
page read and write
6CA4000
heap
page read and write
6CA4000
heap
page read and write
39F70000
trusted library allocation
page read and write
6CA4000
heap
page read and write
6CA4000
heap
page read and write
31D0000
heap
page read and write
6CA4000
heap
page read and write
39A50000
trusted library allocation
page read and write
8373000
direct allocation
page execute and read and write
6CA4000
heap
page read and write
6CA4000
heap
page read and write
6CA4000
heap
page read and write
6CA4000
heap
page read and write
6CA4000
heap
page read and write
6CEE000
stack
page read and write
6CA4000
heap
page read and write
6CA4000
heap
page read and write
37691000
trusted library allocation
page read and write
9773000
direct allocation
page execute and read and write
98000
stack
page read and write
398A0000
trusted library allocation
page read and write
6CA4000
heap
page read and write
6CA4000
heap
page read and write
6CA4000
heap
page read and write
6CA4000
heap
page read and write
6CA4000
heap
page read and write
6CA4000
heap
page read and write
6CA4000
heap
page read and write
6CA4000
heap
page read and write
6CA4000
heap
page read and write
6CA4000
heap
page read and write
6CA4000
heap
page read and write
6DE0000
heap
page read and write
6CA4000
heap
page read and write
398A1000
trusted library allocation
page read and write
6CA4000
heap
page read and write
6CA4000
heap
page read and write
6CA4000
heap
page read and write
6CA4000
heap
page read and write
6CA4000
heap
page read and write
790000
heap
page read and write
400000
unkown
page readonly
6CA4000
heap
page read and write
2C13000
remote allocation
page execute and read and write
398A0000
trusted library allocation
page read and write
6CA5000
heap
page read and write
6CA4000
heap
page read and write
6CA4000
heap
page read and write
6CA4000
heap
page read and write
375F0000
trusted library allocation
page read and write
6CA4000
heap
page read and write
6CA4000
heap
page read and write
29F0000
direct allocation
page read and write
6CA4000
heap
page read and write
39F7F000
trusted library allocation
page read and write
39F70000
trusted library allocation
page read and write
6CA4000
heap
page read and write
8A50000
direct allocation
page read and write
6CA4000
heap
page read and write
73A31000
unkown
page execute read
398A0000
trusted library allocation
page read and write
6CA4000
heap
page read and write
6CA4000
heap
page read and write
6CA4000
heap
page read and write
6CA4000
heap
page read and write
6CA4000
heap
page read and write
6CA4000
heap
page read and write
6CA4000
heap
page read and write
6CA4000
heap
page read and write
22DE000
stack
page read and write
40A000
unkown
page write copy
57E000
stack
page read and write
6CA4000
heap
page read and write
6CA4000
heap
page read and write
4773000
direct allocation
page execute and read and write
6CA4000
heap
page read and write
6CA4000
heap
page read and write
6CA4000
heap
page read and write
6CA4000
heap
page read and write
39F80000
trusted library allocation
page read and write
39A40000
trusted library allocation
page read and write
6CA4000
heap
page read and write
6CA4000
heap
page read and write
6CA5000
heap
page read and write
39A40000
trusted library allocation
page read and write
6CA4000
heap
page read and write
6CA4000
heap
page read and write
6CA4000
heap
page read and write
6CA4000
heap
page read and write
6CA4000
heap
page read and write
39F80000
trusted library allocation
page read and write
6CA4000
heap
page read and write
6C90000
direct allocation
page read and write
6CA4000
heap
page read and write
6CA4000
heap
page read and write
6CA4000
heap
page read and write
6CA4000
heap
page read and write
6CA4000
heap
page read and write
279F000
stack
page read and write
6CA4000
heap
page read and write
6CA4000
heap
page read and write
6CA4000
heap
page read and write
6CA4000
heap
page read and write
6CA4000
heap
page read and write
6CA4000
heap
page read and write
36F8F000
stack
page read and write
2A70000
direct allocation
page read and write
39D95000
heap
page read and write
6CA4000
heap
page read and write
6CA4000
heap
page read and write
8A70000
direct allocation
page read and write
6CA4000
heap
page read and write
6CA4000
heap
page read and write
39B6C000
stack
page read and write
6CA4000
heap
page read and write
6CA4000
heap
page read and write
39DC5000
heap
page read and write
6CA4000
heap
page read and write
6CA4000
heap
page read and write
6CA4000
heap
page read and write
6CA4000
heap
page read and write
6CA5000
heap
page read and write
39A40000
trusted library allocation
page read and write
6CA4000
heap
page read and write
6CA4000
heap
page read and write
2340000
heap
page read and write
6CA4000
heap
page read and write
29E0000
trusted library allocation
page read and write
39F76000
trusted library allocation
page read and write
6CA4000
heap
page read and write
6CA4000
heap
page read and write
6CA4000
heap
page read and write
37240000
direct allocation
page read and write
6CA4000
heap
page read and write
6CA4000
heap
page read and write
39897000
trusted library allocation
page read and write
6CA4000
heap
page read and write
6CA4000
heap
page read and write
39D75000
heap
page read and write
6CA4000
heap
page read and write
8C00000
heap
page read and write
6CA4000
heap
page read and write
6CA4000
heap
page read and write
6CA4000
heap
page read and write
37611000
trusted library allocation
page read and write
6CA4000
heap
page read and write
6CA4000
heap
page read and write
8A90000
direct allocation
page read and write
6CA4000
heap
page read and write
6CA4000
heap
page read and write
29E0000
trusted library allocation
page read and write
6CA4000
heap
page read and write
170000
trusted library allocation
page read and write
6CA4000
heap
page read and write
6CA4000
heap
page read and write
6CA4000
heap
page read and write
398A0000
trusted library allocation
page read and write
6CA4000
heap
page read and write
6CA4000
heap
page read and write
6CA4000
heap
page read and write
39D6F000
stack
page read and write
6CA4000
heap
page read and write
6CA4000
heap
page read and write
6CA4000
heap
page read and write
37399000
stack
page read and write
6CA4000
heap
page read and write
6CA4000
heap
page read and write
6CA4000
heap
page read and write
6CA4000
heap
page read and write
398A0000
trusted library allocation
page read and write
40A000
unkown
page read and write
190000
trusted library allocation
page read and write
6CA4000
heap
page read and write
39DD1000
heap
page read and write
6CA4000
heap
page read and write
6CA4000
heap
page read and write
6CA4000
heap
page read and write
There are 829 hidden memdumps, click here to show them.