IOC Report
cnaniAxghZ.exe

loading gif

Files

File Path
Type
Category
Malicious
cnaniAxghZ.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Local\directory\name.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\name.vbs
data
dropped
malicious
C:\ProgramData\Microsoft\Windows\WER\Temp\WER5434.tmp.dmp
Mini DuMP crash report, 14 streams, Wed Jul 3 12:50:58 2024, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER559C.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER55CC.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\3D003UC5\json[1].json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\aut4129.tmp
data
dropped
C:\Users\user\AppData\Local\Temp\aut4188.tmp
data
dropped
C:\Users\user\AppData\Local\Temp\aut708F.tmp
data
dropped
C:\Users\user\AppData\Local\Temp\aut70DE.tmp
data
dropped
C:\Users\user\AppData\Local\Temp\bhv5230.tmp
Extensible storage engine DataBase, version 0x620, checksum 0x1c4d7e57, page size 32768, DirtyShutdown, Windows version 10.0
dropped
C:\Users\user\AppData\Local\Temp\differences
ASCII text, with very long lines (29748), with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\ncqkhweaghcgworcchyfyhlbjpqn
Unicode text, UTF-16, little-endian text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\semispinalis
data
dropped
There are 5 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\cnaniAxghZ.exe
"C:\Users\user\Desktop\cnaniAxghZ.exe"
malicious
C:\Users\user\AppData\Local\directory\name.exe
"C:\Users\user\Desktop\cnaniAxghZ.exe"
malicious
C:\Windows\SysWOW64\svchost.exe
"C:\Users\user\Desktop\cnaniAxghZ.exe"
malicious
C:\Windows\SysWOW64\svchost.exe
C:\Windows\SysWOW64\svchost.exe /stext "C:\Users\user\AppData\Local\Temp\ncqkhweaghcgworcchyfyhlbjpqn"
malicious
C:\Windows\SysWOW64\svchost.exe
C:\Windows\SysWOW64\svchost.exe /stext "C:\Users\user\AppData\Local\Temp\qwvdipptuputyufolskgjmgkrwiwkdi"
malicious
C:\Windows\SysWOW64\svchost.exe
C:\Windows\SysWOW64\svchost.exe /stext "C:\Users\user\AppData\Local\Temp\aybv"
malicious
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 8084 -s 1288

URLs

Name
IP
Malicious
07.175.229.139
malicious
http://geoplugin.net/json.gp
178.237.33.50
malicious
http://www.imvu.comr
unknown
https://M365CDN.nel.measure.office.net/api/report?FrontEnd=VerizonCDNWorldWide&DestinationEndpoint=W
unknown
https://ow1.res.office365.com/apc/trans.gif?29331761644ba41ebf9abf96ecc6fbad
unknown
https://aefd.nelreports.net/api/report?cat=bingth
unknown
https://86dd05e6f545b5502aade4a1946d3e9d.azr.footprintdns.com/apc/trans.gif?66601c3b572f284b9da07fcc
unknown
http://www.nirsoft.net
unknown
https://aefd.nelreports.net/api/report?cat=bingaotak
unknown
https://deff.nelreports.net/api/report?cat=msn
unknown
https://ecs.nel.measure.office.net?TenantId=ODSP_Sync_Client&DestinationEndpoint=Edge-Prod-BLUr5a&Fr
unknown
https://58293426822f9aaf9d7c729f28294583.azr.footprintdns.com/apc/trans.gif?fc66b8a78ab7a1394f56e742
unknown
https://ecs.nel.measure.office.net?TenantId=ODSP_Sync_Client&DestinationEndpoint=Edge-Prod-BL2r8e&Fr
unknown
http://www.imvu.comhttp://www.ebuddy.comhttps://www.google.com
unknown
https://rum8.perf.linkedin.com/apc/trans.gif?fe61b216ccbcc1bca02cb20f2e94fb51
unknown
https://www.google.com
unknown
https://fp-afdx-bpdee4gtg6frejfd.z01.azurefd.net/apc/trans.gif?a9bddedb22fa9ee1d455a5d5a89b950c
unknown
http://geoplugin.net/json.gp/C
unknown
https://maps.windows.com/windows-app-web-link
unknown
https://cxcs.microsoft.net/api/settings/en-GB/xml/settings-tipset?release=20h1&sku=Professional&plat
unknown
https://fp-afdx-bpdee4gtg6frejfd.z01.azurefd.net/apc/trans.gif?60caefc8ca640843bccad421cfaadcc8
unknown
https://login.yahoo.com/config/login
unknown
http://www.nirsoft.net/
unknown
https://ow1.res.office365.com/apc/trans.gif?17a81fd4cdc7fc73a2b4cf5b67ff816d
unknown
https://86dd05e6f545b5502aade4a1946d3e9d.azr.footprintdns.com/apc/trans.gif?f67d919da1a9ba8a5672367d
unknown
https://assets.msn.com/weathermapdata/1/static/weather/Icons/JyNGQgA=/Condition/AAehR3S.svg
unknown
https://www.office.com/
unknown
https://ow1.res.office365.com/apc/trans.gif?2f153f40414852a5ead98f4103d563a8
unknown
https://acae307a6acdd4e64531be6276770618.azr.footprintdns.com/apc/trans.gif?a176b93f037f93b5720edf68
unknown
https://sin06prdapp01-canary-opaph.netmon.azure.com/apc/trans.gif?909b77fc750668f20e07288ff0ed43e2
unknown
https://18a72a1f5c7b170c6cc0a459d463264e.azr.footprintdns.com/apc/trans.gif?c9b5e9d2b836931c8ddd4e8d
unknown
https://18a72a1f5c7b170c6cc0a459d463264e.azr.footprintdns.com/apc/trans.gif?18b635b804a8d6ad0a1fa437
unknown
http://www.imvu.com
unknown
https://aefd.nelreports.net/api/report?cat=wsb
unknown
https://acae307a6acdd4e64531be6276770618.azr.footprintdns.com/apc/trans.gif?467894188c5d788807342326
unknown
http://geoplugin.net/json.gpSystem32
unknown
https://4c4f378c706610974da9cb9d99fe3116.azr.footprintdns.com/apc/trans.gif?1c89d9658c6af83a02d98b03
unknown
https://aefd.nelreports.net/api/report?cat=bingaot
unknown
https://login.windows.net/common/oauth2/authorize?response_type=code&client_id=d3590ed6-52b3-4102-ae
unknown
https://4c4f378c706610974da9cb9d99fe3116.azr.footprintdns.com/apc/trans.gif?74b620657ac570f7999e6ad7
unknown
https://ecs.nel.measure.office.net?TenantId=Skype&DestinationEndpoint=Edge-Prod-BL2r8e&FrontEnd=AFD
unknown
https://aefd.nelreports.net/api/report?cat=bingrms
unknown
https://rum8.perf.linkedin.com/apc/trans.gif?690daf9375f3d267a5b7b08fbc174993
unknown
https://www.google.com/accounts/servicelogin
unknown
https://58293426822f9aaf9d7c729f28294583.azr.footprintdns.com/apc/trans.gif?cf2d8bf3b68a3e37eef992d5
unknown
https://login.microsoftonline.com/common/oauth2/authorize?response_type=code&client_id=d3590ed6-52b3
unknown
https://ow1.res.office365.com/apc/trans.gif?a50e32ebd978eda4d21928b1dbc78135
unknown
https://sin06prdapp01-canary-opaph.netmon.azure.com/apc/trans.gif?c6931b9e725f95cf9c20849dd6498c59
unknown
http://www.ebuddy.com
unknown
There are 39 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
geoplugin.net
178.237.33.50
malicious

IPs

IP
Domain
Country
Malicious
107.175.229.139
unknown
United States
malicious
178.237.33.50
geoplugin.net
Netherlands
malicious

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\SOFTWARE\Rmc-TLPQMO
exepath
malicious
HKEY_CURRENT_USER\SOFTWARE\Rmc-TLPQMO
licence
malicious
HKEY_CURRENT_USER\SOFTWARE\Rmc-TLPQMO
time
malicious
\REGISTRY\A\{4aa6d926-536a-ec03-0a71-e95a421268ab}\Root\InventoryApplicationFile\svchost.exe|1260c7b0519b1406
ProgramId
\REGISTRY\A\{4aa6d926-536a-ec03-0a71-e95a421268ab}\Root\InventoryApplicationFile\svchost.exe|1260c7b0519b1406
FileId
\REGISTRY\A\{4aa6d926-536a-ec03-0a71-e95a421268ab}\Root\InventoryApplicationFile\svchost.exe|1260c7b0519b1406
LowerCaseLongPath
\REGISTRY\A\{4aa6d926-536a-ec03-0a71-e95a421268ab}\Root\InventoryApplicationFile\svchost.exe|1260c7b0519b1406
LongPathHash
\REGISTRY\A\{4aa6d926-536a-ec03-0a71-e95a421268ab}\Root\InventoryApplicationFile\svchost.exe|1260c7b0519b1406
Name
\REGISTRY\A\{4aa6d926-536a-ec03-0a71-e95a421268ab}\Root\InventoryApplicationFile\svchost.exe|1260c7b0519b1406
OriginalFileName
\REGISTRY\A\{4aa6d926-536a-ec03-0a71-e95a421268ab}\Root\InventoryApplicationFile\svchost.exe|1260c7b0519b1406
Publisher
\REGISTRY\A\{4aa6d926-536a-ec03-0a71-e95a421268ab}\Root\InventoryApplicationFile\svchost.exe|1260c7b0519b1406
Version
\REGISTRY\A\{4aa6d926-536a-ec03-0a71-e95a421268ab}\Root\InventoryApplicationFile\svchost.exe|1260c7b0519b1406
BinFileVersion
\REGISTRY\A\{4aa6d926-536a-ec03-0a71-e95a421268ab}\Root\InventoryApplicationFile\svchost.exe|1260c7b0519b1406
BinaryType
\REGISTRY\A\{4aa6d926-536a-ec03-0a71-e95a421268ab}\Root\InventoryApplicationFile\svchost.exe|1260c7b0519b1406
ProductName
\REGISTRY\A\{4aa6d926-536a-ec03-0a71-e95a421268ab}\Root\InventoryApplicationFile\svchost.exe|1260c7b0519b1406
ProductVersion
\REGISTRY\A\{4aa6d926-536a-ec03-0a71-e95a421268ab}\Root\InventoryApplicationFile\svchost.exe|1260c7b0519b1406
LinkDate
\REGISTRY\A\{4aa6d926-536a-ec03-0a71-e95a421268ab}\Root\InventoryApplicationFile\svchost.exe|1260c7b0519b1406
BinProductVersion
\REGISTRY\A\{4aa6d926-536a-ec03-0a71-e95a421268ab}\Root\InventoryApplicationFile\svchost.exe|1260c7b0519b1406
AppxPackageFullName
\REGISTRY\A\{4aa6d926-536a-ec03-0a71-e95a421268ab}\Root\InventoryApplicationFile\svchost.exe|1260c7b0519b1406
AppxPackageRelativeId
\REGISTRY\A\{4aa6d926-536a-ec03-0a71-e95a421268ab}\Root\InventoryApplicationFile\svchost.exe|1260c7b0519b1406
Size
\REGISTRY\A\{4aa6d926-536a-ec03-0a71-e95a421268ab}\Root\InventoryApplicationFile\svchost.exe|1260c7b0519b1406
Language
\REGISTRY\A\{4aa6d926-536a-ec03-0a71-e95a421268ab}\Root\InventoryApplicationFile\svchost.exe|1260c7b0519b1406
IsOsComponent
\REGISTRY\A\{4aa6d926-536a-ec03-0a71-e95a421268ab}\Root\InventoryApplicationFile\svchost.exe|1260c7b0519b1406
Usn
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\IdentityCRL\ClockData
ClockTimeSeconds
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\IdentityCRL\ClockData
TickCount
There are 15 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
3000000
heap
page read and write
malicious
400000
system
page execute and read and write
malicious
3F20000
direct allocation
page read and write
malicious
3012000
heap
page read and write
malicious
9F000
unkown
page readonly
400000
system
page execute and read and write
478000
system
page execute and read and write
1223000
heap
page read and write
4E5E000
stack
page read and write
1684000
heap
page read and write
473000
system
page execute and read and write
2FAF000
stack
page read and write
168000
unkown
page readonly
A90000
heap
page read and write
3077000
heap
page read and write
400000
system
page execute and read and write
11A3000
heap
page read and write
5D20000
unclassified section
page execute and read and write
5301000
heap
page read and write
12F000
unkown
page readonly
1399000
heap
page read and write
E9E000
stack
page read and write
5F76000
heap
page read and write
3197000
heap
page read and write
5400000
trusted library allocation
page read and write
3153000
heap
page read and write
4030000
direct allocation
page read and write
31AD000
heap
page read and write
11BC000
heap
page read and write
5F76000
heap
page read and write
3153000
heap
page read and write
13D8000
heap
page read and write
3FA0000
direct allocation
page read and write
46B3000
direct allocation
page read and write
960000
heap
page readonly
4FE0000
heap
page read and write
436E000
direct allocation
page read and write
E4E000
stack
page read and write
5E01000
heap
page read and write
5F01000
heap
page read and write
5E01000
heap
page read and write
340F000
heap
page read and write
3132000
heap
page read and write
3107000
heap
page read and write
180E000
heap
page read and write
A00000
heap
page read and write
5E01000
heap
page read and write
13C8000
heap
page read and write
1235000
heap
page read and write
5E7A000
heap
page read and write
13C2000
heap
page read and write
101B000
stack
page read and write
5E01000
heap
page read and write
3112000
heap
page read and write
121B000
heap
page read and write
99C000
stack
page read and write
5E01000
heap
page read and write
1382000
heap
page read and write
3146000
heap
page read and write
45C000
system
page execute and read and write
5400000
trusted library allocation
page read and write
AE0000
heap
page read and write
3B70000
direct allocation
page read and write
1DBE000
stack
page read and write
41D0000
direct allocation
page read and write
C00000
heap
page read and write
1398000
heap
page read and write
3046000
heap
page read and write
C31000
heap
page read and write
3176000
heap
page read and write
2FFE000
stack
page read and write
4030000
direct allocation
page read and write
5BBD000
stack
page read and write
3046000
heap
page read and write
3000000
heap
page read and write
A7C000
stack
page read and write
1399000
heap
page read and write
312E000
heap
page read and write
3100000
heap
page read and write
3145000
heap
page read and write
15F3000
heap
page read and write
5E01000
heap
page read and write
15FE000
heap
page read and write
2FA0000
heap
page read and write
1685000
heap
page read and write
2FEE000
stack
page read and write
50C0000
unclassified section
page execute and read and write
3132000
heap
page read and write
4269000
direct allocation
page read and write
13B8000
heap
page read and write
42FD000
direct allocation
page read and write
13FE000
stack
page read and write
4BA0000
heap
page read and write
3037000
heap
page read and write
1070000
heap
page read and write
3202000
heap
page read and write
3500000
heap
page read and write
3FA0000
direct allocation
page read and write
2250000
heap
page read and write
5E7A000
heap
page read and write
1E90000
heap
page read and write
17EF000
heap
page read and write
AB0000
heap
page read and write
997000
stack
page read and write
3176000
heap
page read and write
313E000
heap
page read and write
3046000
heap
page read and write
1686000
heap
page read and write
3153000
heap
page read and write
A0000
unkown
page readonly
155000
unkown
page readonly
531D000
stack
page read and write
4F9E000
stack
page read and write
5EAE000
heap
page read and write
97C000
stack
page read and write
5E01000
heap
page read and write
1233000
heap
page read and write
5150000
unclassified section
page execute and read and write
163000
unkown
page write copy
15C0000
heap
page read and write
509F000
stack
page read and write
143C000
stack
page read and write
12F000
unkown
page readonly
3153000
heap
page read and write
3037000
heap
page read and write
2FC0000
heap
page read and write
15FE000
heap
page read and write
4140000
direct allocation
page read and write
3503000
heap
page read and write
579F000
stack
page read and write
A0B3000
direct allocation
page read and write
9D0000
heap
page read and write
4C01000
heap
page read and write
32FF000
stack
page read and write
511D000
unclassified section
page execute and read and write
31A4000
heap
page read and write
134B000
heap
page read and write
1170000
heap
page read and write
4E3F000
stack
page read and write
456000
system
page execute and read and write
5E7B000
heap
page read and write
3BA0000
direct allocation
page read and write
51A6000
unclassified section
page execute and read and write
A13000
heap
page read and write
42F9000
direct allocation
page read and write
15F2000
heap
page read and write
17BB000
heap
page read and write
1685000
heap
page read and write
180F000
heap
page read and write
3033000
heap
page read and write
6100000
heap
page read and write
316B000
heap
page read and write
3421000
heap
page read and write
181F000
heap
page read and write
5F76000
heap
page read and write
3031000
heap
page read and write
D8000
unkown
page readonly
31D7000
heap
page read and write
371E000
stack
page read and write
C02000
heap
page read and write
1480000
heap
page read and write
D10000
heap
page read and write
5E01000
heap
page read and write
15F000
unkown
page write copy
1E70000
direct allocation
page execute and read and write
5400000
trusted library allocation
page read and write
3412000
heap
page read and write
459000
system
page execute and read and write
182F000
heap
page read and write
3185000
heap
page read and write
5E01000
heap
page read and write
13C8000
heap
page read and write
9B0000
heap
page read and write
5F76000
heap
page read and write
C12000
heap
page read and write
3146000
heap
page read and write
1674000
heap
page read and write
1818000
heap
page read and write
11A6000
heap
page read and write
4F5F000
stack
page read and write
3012000
heap
page read and write
3160000
heap
page read and write
42F9000
direct allocation
page read and write
4140000
direct allocation
page read and write
50B3000
direct allocation
page read and write
3068000
heap
page read and write
1764000
heap
page read and write
11000
unkown
page execute read
3101000
heap
page read and write
310E000
heap
page read and write
3068000
heap
page read and write
82B3000
direct allocation
page read and write
3046000
heap
page read and write
3068000
heap
page read and write
1450000
heap
page read and write
5E7A000
heap
page read and write
11AD000
heap
page read and write
436E000
direct allocation
page read and write
5E01000
heap
page read and write
5E7A000
heap
page read and write
45D000
system
page execute and read and write
31B6000
heap
page read and write
5301000
heap
page read and write
2F2C000
stack
page read and write
17EF000
heap
page read and write
E7E000
stack
page read and write
5E01000
heap
page read and write
16A6000
heap
page read and write
1E50000
heap
page read and write
3824000
heap
page read and write
E10000
heap
page read and write
3174000
heap
page read and write
3BD0000
heap
page read and write
569F000
stack
page read and write
CF000
unkown
page read and write
312E000
heap
page read and write
5E01000
heap
page read and write
9AE000
stack
page read and write
5400000
trusted library allocation
page read and write
1100000
heap
page read and write
36D0000
heap
page readonly
100E000
stack
page read and write
C13000
heap
page read and write
11000
unkown
page execute read
5E7A000
heap
page read and write
305A000
heap
page read and write
3146000
heap
page read and write
40C3000
direct allocation
page read and write
11AD000
heap
page read and write
308E000
heap
page read and write
2FF0000
heap
page read and write
3197000
heap
page read and write
3153000
heap
page read and write
5301000
heap
page read and write
C31000
heap
page read and write
141B000
stack
page read and write
4E1F000
stack
page read and write
5E01000
heap
page read and write
182F000
heap
page read and write
15C8000
heap
page read and write
42FD000
direct allocation
page read and write
5E01000
heap
page read and write
3063000
heap
page read and write
5200000
heap
page read and write
C13000
heap
page read and write
315A000
heap
page read and write
15F3000
heap
page read and write
1255000
heap
page read and write
51AC000
unclassified section
page execute and read and write
13A8000
heap
page read and write
C5000
unkown
page readonly
5400000
trusted library allocation
page read and write
2FA0000
heap
page read and write
CF000
unkown
page write copy
96B3000
direct allocation
page read and write
D18000
heap
page read and write
16A7000
heap
page read and write
3153000
heap
page read and write
318C000
heap
page read and write
591D000
stack
page read and write
5F76000
heap
page read and write
1234000
heap
page read and write
3144000
heap
page read and write
41D0000
direct allocation
page read and write
3820000
heap
page read and write
5133000
unclassified section
page execute and read and write
4BDB000
stack
page read and write
436E000
direct allocation
page read and write
880000
heap
page read and write
17EB000
heap
page read and write
3CA5000
direct allocation
page read and write
BC0000
heap
page readonly
4BB0000
trusted library allocation
page read and write
1178000
heap
page read and write
1694000
heap
page read and write
3144000
heap
page read and write
5E7A000
heap
page read and write
300D000
heap
page read and write
305A000
heap
page read and write
5BC000
stack
page read and write
15FE000
heap
page read and write
535B000
heap
page read and write
5374000
heap
page read and write
850000
heap
page read and write
9B3000
stack
page read and write
3174000
heap
page read and write
17D5000
heap
page read and write
42F9000
direct allocation
page read and write
9AF000
stack
page read and write
6010000
heap
page read and write
4140000
direct allocation
page read and write
10000
unkown
page readonly
4A9E000
stack
page read and write
569E000
stack
page read and write
1224000
heap
page read and write
5E7B000
heap
page read and write
5400000
trusted library allocation
page read and write
E40000
heap
page read and write
30A0000
heap
page read and write
474000
system
page execute and read and write
31D8000
heap
page read and write
5E01000
heap
page read and write
11A2000
heap
page read and write
3146000
heap
page read and write
5EAE000
heap
page read and write
C00000
heap
page read and write
4B9F000
stack
page read and write
1675000
heap
page read and write
4269000
direct allocation
page read and write
58DE000
stack
page read and write
42DE000
direct allocation
page read and write
11A2000
heap
page read and write
15F000
unkown
page read and write
1703000
heap
page read and write
17EF000
heap
page read and write
3820000
heap
page read and write
42DE000
direct allocation
page read and write
42DE000
direct allocation
page read and write
426D000
direct allocation
page read and write
5B6F000
stack
page read and write
5300000
heap
page read and write
3197000
heap
page read and write
3135000
heap
page read and write
3153000
heap
page read and write
5E7A000
heap
page read and write
1140000
heap
page read and write
1275000
heap
page read and write
12E5000
heap
page read and write
3CB3000
direct allocation
page read and write
308A000
heap
page read and write
41B000
system
page execute and read and write
5F76000
heap
page read and write
3153000
heap
page read and write
317E000
heap
page read and write
3144000
heap
page read and write
11AD000
heap
page read and write
40C3000
direct allocation
page read and write
3400000
heap
page read and write
159D000
stack
page read and write
103A000
stack
page read and write
5EBB000
heap
page read and write
3FA0000
direct allocation
page read and write
10000
unkown
page readonly
C13000
heap
page read and write
5E01000
heap
page read and write
30D1000
heap
page read and write
21FF000
stack
page read and write
5FA000
stack
page read and write
350C000
heap
page read and write
11000
unkown
page execute read
3132000
heap
page read and write
5001000
heap
page read and write
5E01000
heap
page read and write
140E000
stack
page read and write
C02000
heap
page read and write
4CDE000
stack
page read and write
5E00000
heap
page read and write
3037000
heap
page read and write
40C3000
direct allocation
page read and write
A02000
heap
page read and write
319A000
heap
page read and write
C5000
unkown
page readonly
3BD4000
heap
page read and write
5E01000
heap
page read and write
4BB0000
trusted library allocation
page read and write
15FB000
heap
page read and write
3146000
heap
page read and write
31D8000
heap
page read and write
155000
unkown
page readonly
3176000
heap
page read and write
3153000
heap
page read and write
306E000
heap
page read and write
381F000
stack
page read and write
4B9F000
stack
page read and write
A13000
heap
page read and write
5E7A000
heap
page read and write
426D000
direct allocation
page read and write
5119000
unclassified section
page execute and read and write
A1000
unkown
page execute read
1695000
heap
page read and write
559E000
stack
page read and write
3110000
heap
page read and write
5A1B000
stack
page read and write
5AB3000
direct allocation
page read and write
3130000
heap
page read and write
3177000
heap
page read and write
5E7A000
heap
page read and write
A0000
unkown
page readonly
3146000
heap
page read and write
FFF000
stack
page read and write
1243000
heap
page read and write
521D000
stack
page read and write
3135000
heap
page read and write
78B3000
direct allocation
page read and write
9F000
unkown
page readonly
400000
system
page execute and read and write
4D1C000
stack
page read and write
313D000
heap
page read and write
D10000
heap
page read and write
426D000
direct allocation
page read and write
4030000
direct allocation
page read and write
5E01000
heap
page read and write
15A0000
heap
page read and write
1792000
heap
page read and write
42FD000
direct allocation
page read and write
D3000
unkown
page write copy
1244000
heap
page read and write
3B90000
direct allocation
page execute and read and write
1DFE000
stack
page read and write
318B000
heap
page read and write
1255000
heap
page read and write
1234000
heap
page read and write
3153000
heap
page read and write
4269000
direct allocation
page read and write
A3C000
stack
page read and write
309F000
heap
page read and write
2F80000
heap
page read and write
D8000
unkown
page readonly
E50000
heap
page readonly
E3D000
stack
page read and write
4153000
direct allocation
page read and write
4153000
direct allocation
page read and write
313D000
heap
page read and write
830000
heap
page read and write
5E01000
heap
page read and write
4153000
direct allocation
page read and write
5D3B000
unclassified section
page execute and read and write
3175000
heap
page read and write
2F6B000
stack
page read and write
3068000
heap
page read and write
30A0000
heap
page read and write
1336000
heap
page read and write
305A000
heap
page read and write
D03000
heap
page read and write
C3A000
stack
page read and write
5CBE000
stack
page read and write
3153000
heap
page read and write
168000
unkown
page readonly
5F00000
heap
page read and write
BE0000
heap
page read and write
30A0000
heap
page read and write
2FAF000
stack
page read and write
1256000
heap
page read and write
13B8000
heap
page read and write
3B70000
heap
page read and write
64B3000
direct allocation
page read and write
41D0000
direct allocation
page read and write
5301000
heap
page read and write
A1000
unkown
page execute read
8CB3000
direct allocation
page read and write
627B000
heap
page read and write
5F76000
heap
page read and write
5E01000
heap
page read and write
6EB3000
direct allocation
page read and write
D00000
heap
page read and write
50A0000
heap
page read and write
627B000
heap
page read and write
31B5000
heap
page read and write
3154000
heap
page read and write
3030000
heap
page read and write
5E7A000
heap
page read and write
9F0000
heap
page read and write
5E7A000
heap
page read and write
5A6E000
stack
page read and write
30A0000
heap
page read and write
5E01000
heap
page read and write
4801000
heap
page read and write
5E01000
heap
page read and write
5F76000
heap
page read and write
3153000
heap
page read and write
3132000
heap
page read and write
3BF0000
direct allocation
page read and write
103C000
stack
page read and write
13D8000
heap
page read and write
350C000
heap
page read and write
31B6000
heap
page read and write
6200000
heap
page read and write
5F76000
heap
page read and write
5301000
heap
page read and write
17E0000
heap
page read and write
3132000
heap
page read and write
5367000
heap
page read and write
181F000
heap
page read and write
C13000
heap
page read and write
305A000
heap
page read and write
57DD000
stack
page read and write
There are 476 hidden memdumps, click here to show them.