IOC Report
f3ba41ba0b508b0965153c1688d6df6de6b3fdf59b015.exe

loading gif

Files

File Path
Type
Category
Malicious
f3ba41ba0b508b0965153c1688d6df6de6b3fdf59b015.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Local\EduTech Dynamics\ApolloSphere.js
ASCII text, with no line terminators
dropped
malicious
C:\Users\user\AppData\Local\EduTech Dynamics\ApolloSphere.pif
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\723582\Flash.pif
PE32 executable (GUI) Intel 80386, for MS Windows
modified
malicious
C:\Users\user\AppData\Local\EduTech Dynamics\L
data
dropped
C:\Users\user\AppData\Local\Temp\723582\RegAsm.exe
PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\723582\r
data
dropped
C:\Users\user\AppData\Local\Temp\Agreed
data
dropped
C:\Users\user\AppData\Local\Temp\Anchor
data
dropped
C:\Users\user\AppData\Local\Temp\Arrangements
data
dropped
C:\Users\user\AppData\Local\Temp\Barrel
data
dropped
C:\Users\user\AppData\Local\Temp\Binding
data
dropped
C:\Users\user\AppData\Local\Temp\Bonus
data
dropped
C:\Users\user\AppData\Local\Temp\Canal
data
dropped
C:\Users\user\AppData\Local\Temp\Confidentiality
data
dropped
C:\Users\user\AppData\Local\Temp\Fisting
data
dropped
C:\Users\user\AppData\Local\Temp\Fred
data
dropped
C:\Users\user\AppData\Local\Temp\Friend
data
dropped
C:\Users\user\AppData\Local\Temp\Has
data
dropped
C:\Users\user\AppData\Local\Temp\Manager
data
dropped
C:\Users\user\AppData\Local\Temp\Milk
data
dropped
C:\Users\user\AppData\Local\Temp\Myself
data
dropped
C:\Users\user\AppData\Local\Temp\North
data
dropped
C:\Users\user\AppData\Local\Temp\Palestinian
data
dropped
C:\Users\user\AppData\Local\Temp\Parents
data
dropped
C:\Users\user\AppData\Local\Temp\Pose
data
dropped
C:\Users\user\AppData\Local\Temp\Privacy
data
dropped
C:\Users\user\AppData\Local\Temp\Restriction
data
dropped
C:\Users\user\AppData\Local\Temp\Screw
data
dropped
C:\Users\user\AppData\Local\Temp\Seeds
data
dropped
C:\Users\user\AppData\Local\Temp\Sexo
data
dropped
C:\Users\user\AppData\Local\Temp\Success
data
dropped
C:\Users\user\AppData\Local\Temp\Surgeons
ASCII text, with very long lines (1660), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\Surgeons.cmd
ASCII text, with very long lines (1660), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\Tagged
data
dropped
C:\Users\user\AppData\Local\Temp\Vitamin
data
dropped
C:\Users\user\AppData\Local\Temp\Wallpapers
PDP-11 overlaid pure executable
dropped
C:\Users\user\AppData\Local\Temp\Yours
data
dropped
There are 28 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\f3ba41ba0b508b0965153c1688d6df6de6b3fdf59b015.exe
"C:\Users\user\Desktop\f3ba41ba0b508b0965153c1688d6df6de6b3fdf59b015.exe"
malicious
C:\Windows\SysWOW64\cmd.exe
"C:\Windows\System32\cmd.exe" /k copy Surgeons Surgeons.cmd & Surgeons.cmd & exit
malicious
C:\Windows\SysWOW64\findstr.exe
findstr /I "wrsa.exe opssvc.exe"
malicious
C:\Windows\SysWOW64\findstr.exe
findstr /I "avastui.exe avgui.exe bdservicehost.exe nswscsvc.exe sophoshealth.exe"
malicious
C:\Windows\SysWOW64\cmd.exe
cmd /c md 723582
malicious
C:\Windows\SysWOW64\findstr.exe
findstr /V "wagemissileaffiliatesgreeting" Fisting
malicious
C:\Windows\SysWOW64\cmd.exe
cmd /c copy /b Restriction + Manager + Screw + Anchor 723582\r
malicious
C:\Users\user\AppData\Local\Temp\723582\Flash.pif
723582\Flash.pif 723582\r
malicious
C:\Windows\SysWOW64\schtasks.exe
schtasks.exe /create /tn "ApolloSphere" /tr "wscript //B 'C:\Users\user\AppData\Local\EduTech Dynamics\ApolloSphere.js'" /sc onlogon /F /RL HIGHEST
malicious
C:\Windows\System32\wscript.exe
C:\Windows\system32\wscript.EXE //B "C:\Users\user\AppData\Local\EduTech Dynamics\ApolloSphere.js"
malicious
C:\Users\user\AppData\Local\EduTech Dynamics\ApolloSphere.pif
"C:\Users\user\AppData\Local\EduTech Dynamics\ApolloSphere.pif" "C:\Users\user\AppData\Local\EduTech Dynamics\L"
malicious
C:\Users\user\AppData\Local\Temp\723582\RegAsm.exe
C:\Users\user\AppData\Local\Temp\723582\RegAsm.exe
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\tasklist.exe
tasklist
C:\Windows\SysWOW64\tasklist.exe
tasklist
C:\Windows\SysWOW64\timeout.exe
timeout 15
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
There are 7 hidden processes, click here to show them.

URLs

Name
IP
Malicious
88.99.151.68:7200
malicious
http://crl.sectigo.com/SectigoRSATimeStampingCA.crl0t
unknown
http://www.autoitscript.com/autoit3/J
unknown
https://api.ip.sb/ip
unknown
https://sectigo.com/CPS0
unknown
http://nsis.sf.net/NSIS_ErrorError
unknown
http://ocsp.sectigo.com0
unknown
https://www.autoitscript.com/autoit3/
unknown
http://crt.sectigo.com/SectigoRSATimeStampingCA.crt0#
unknown

Domains

Name
IP
Malicious
RADgSUbEiddPOZAFcUYmDkmxSjP.RADgSUbEiddPOZAFcUYmDkmxSjP
unknown
malicious

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows Script\Settings\Telemetry\wscript.exe
JScriptSetScriptStateStarted

Memdumps

Base Address
Regiontype
Protect
Malicious
141A000
trusted library allocation
page read and write
malicious
1350000
trusted library allocation
page read and write
malicious
30D4000
trusted library allocation
page read and write
malicious
139B000
trusted library allocation
page read and write
malicious
14CB000
trusted library allocation
page read and write
malicious
1351000
trusted library allocation
page read and write
malicious
42DB000
trusted library allocation
page read and write
malicious
141B000
trusted library allocation
page read and write
malicious
30D4000
trusted library allocation
page read and write
malicious
1285000
heap
page read and write
4F4000
unkown
page readonly
1092000
heap
page read and write
2F27000
heap
page read and write
64D000
heap
page read and write
2F9E000
heap
page read and write
3B91000
heap
page read and write
283E000
heap
page read and write
1565000
heap
page read and write
3A90000
heap
page read and write
30C3000
heap
page read and write
400000
unkown
page readonly
824000
heap
page read and write
133A2B4D000
heap
page read and write
1150000
heap
page read and write
3B90000
heap
page read and write
3B9A000
trusted library allocation
page read and write
FFC000
stack
page read and write
133A2B2F000
heap
page read and write
2FAC000
heap
page read and write
1184000
heap
page read and write
9CF000
stack
page read and write
133A2AE0000
heap
page read and write
63D000
heap
page read and write
1483000
trusted library allocation
page read and write
3240000
trusted library allocation
page read and write
133A2B16000
heap
page read and write
249000
unkown
page readonly
230E000
stack
page read and write
3397000
heap
page read and write
980000
heap
page read and write
5DE000
stack
page read and write
960000
heap
page read and write
6B51FF000
stack
page read and write
283F000
heap
page read and write
133A4720000
heap
page read and write
39F2000
trusted library allocation
page read and write
EB0000
trusted library allocation
page read and write
30EC000
heap
page read and write
2840000
heap
page read and write
30A4000
trusted library allocation
page read and write
2F9E000
heap
page read and write
4F4000
unkown
page readonly
56C000
stack
page read and write
133A2B08000
heap
page read and write
3721000
heap
page read and write
A99000
unkown
page readonly
133A2B42000
heap
page read and write
3240000
trusted library allocation
page read and write
210000
unkown
page readonly
2ECC000
stack
page read and write
649000
heap
page read and write
133A2B07000
heap
page read and write
EB0000
trusted library allocation
page read and write
2835000
heap
page read and write
30E9000
heap
page read and write
4C3000
unkown
page read and write
3A79000
trusted library allocation
page read and write
4FEE000
stack
page read and write
210000
unkown
page readonly
30EC000
heap
page read and write
2E7F000
stack
page read and write
2FBB000
heap
page read and write
3B91000
heap
page read and write
30BE000
heap
page read and write
113F000
heap
page read and write
400000
unkown
page readonly
3B91000
heap
page read and write
145B000
trusted library allocation
page read and write
283A000
heap
page read and write
E6E000
stack
page read and write
3721000
heap
page read and write
A90000
unkown
page write copy
40B000
unkown
page write copy
461000
unkown
page read and write
133A2B4D000
heap
page read and write
3046000
heap
page read and write
5AC000
stack
page read and write
A70000
heap
page read and write
824000
heap
page read and write
649000
heap
page read and write
3A37000
trusted library allocation
page read and write
3721000
heap
page read and write
600000
heap
page read and write
3721000
heap
page read and write
649000
heap
page read and write
2DF0000
heap
page read and write
21AE000
stack
page read and write
6F0000
heap
page read and write
EB0000
trusted library allocation
page read and write
824000
heap
page read and write
140A000
trusted library allocation
page read and write
2836000
heap
page read and write
2FCC000
heap
page read and write
A2F000
stack
page read and write
1403000
trusted library allocation
page read and write
30BE000
heap
page read and write
1180000
heap
page read and write
3721000
heap
page read and write
1325000
heap
page read and write
3A98000
heap
page read and write
1247000
heap
page read and write
30DF000
heap
page read and write
2844000
heap
page read and write
3240000
trusted library allocation
page read and write
2E3E000
stack
page read and write
3721000
heap
page read and write
2835000
heap
page read and write
15E1000
trusted library allocation
page read and write
63D000
heap
page read and write
A40000
heap
page read and write
2FCC000
heap
page read and write
15E4000
trusted library allocation
page read and write
63D000
heap
page read and write
133A2B4D000
heap
page read and write
9F0000
heap
page read and write
649000
heap
page read and write
671000
heap
page read and write
11B8000
heap
page read and write
824000
heap
page read and write
EB0000
trusted library allocation
page read and write
401000
unkown
page execute read
3AA0000
heap
page read and write
2836000
heap
page read and write
6B56FE000
stack
page read and write
824000
heap
page read and write
3284000
heap
page read and write
41F000
unkown
page read and write
3A79000
trusted library allocation
page read and write
134E000
heap
page read and write
181000
unkown
page execute read
3721000
heap
page read and write
181000
unkown
page execute read
649000
heap
page read and write
152F000
trusted library allocation
page read and write
649000
heap
page read and write
244000
unkown
page write copy
1351000
trusted library allocation
page read and write
39E0000
trusted library allocation
page read and write
133A2B1F000
heap
page read and write
651000
heap
page read and write
F85000
heap
page read and write
133A2AB0000
heap
page read and write
6B57FE000
stack
page read and write
530000
heap
page read and write
1344000
heap
page read and write
59E000
stack
page read and write
649000
heap
page read and write
3AD7000
trusted library allocation
page read and write
3040000
heap
page read and write
3B91000
heap
page read and write
860000
trusted library allocation
page read and write
3721000
heap
page read and write
15ED000
trusted library allocation
page read and write
63D000
heap
page read and write
2830000
heap
page read and write
3B91000
heap
page read and write
13F0000
heap
page read and write
39F2000
trusted library allocation
page read and write
34AC000
stack
page read and write
1305000
heap
page read and write
14A0000
trusted library allocation
page read and write
824000
heap
page read and write
EB0000
trusted library allocation
page read and write
3721000
heap
page read and write
30DC000
heap
page read and write
2835000
heap
page read and write
824000
heap
page read and write
EEE000
stack
page read and write
824000
heap
page read and write
3240000
trusted library allocation
page read and write
3114000
trusted library allocation
page read and write
651000
heap
page read and write
1351000
trusted library allocation
page read and write
A86000
unkown
page readonly
6B53FF000
stack
page read and write
63D000
heap
page read and write
D00000
unkown
page readonly
D02000
unkown
page readonly
2FBB000
heap
page read and write
649000
heap
page read and write
1391000
trusted library allocation
page read and write
F50000
heap
page read and write
336F000
stack
page read and write
133A2B2E000
heap
page read and write
3B91000
heap
page read and write
3721000
heap
page read and write
15F1000
trusted library allocation
page read and write
2836000
heap
page read and write
3720000
heap
page read and write
63D000
heap
page read and write
60A000
heap
page read and write
930000
heap
page read and write
8C9000
stack
page read and write
118E000
heap
page read and write
1264000
heap
page read and write
2F20000
heap
page read and write
1351000
trusted library allocation
page read and write
64D000
heap
page read and write
40B000
unkown
page read and write
3B91000
heap
page read and write
2F80000
heap
page read and write
30D4000
trusted library allocation
page read and write
150C000
trusted library allocation
page read and write
9EE000
stack
page read and write
29BC000
stack
page read and write
3B91000
heap
page read and write
1553000
trusted library allocation
page read and write
3B91000
heap
page read and write
134E000
heap
page read and write
6B4DCA000
stack
page read and write
283F000
heap
page read and write
3ECF000
stack
page read and write
649000
heap
page read and write
63D000
heap
page read and write
3721000
heap
page read and write
240000
unkown
page read and write
3A2A000
trusted library allocation
page read and write
63D000
heap
page read and write
2C60000
heap
page read and write
3B91000
heap
page read and write
3B91000
heap
page read and write
9A0000
heap
page read and write
4D2E000
stack
page read and write
155E000
trusted library allocation
page read and write
11D3000
heap
page read and write
29FC000
stack
page read and write
2FAD000
heap
page read and write
39D1000
trusted library allocation
page read and write
3721000
heap
page read and write
A86000
unkown
page readonly
1685000
trusted library allocation
page read and write
3721000
heap
page read and write
133A2B0E000
heap
page read and write
4D1E000
stack
page read and write
30EA000
heap
page read and write
954000
heap
page read and write
2EF0000
trusted library allocation
page read and write
133A2B16000
heap
page read and write
401000
unkown
page execute read
145B000
trusted library allocation
page read and write
1282000
heap
page read and write
1119000
heap
page read and write
A94000
unkown
page write copy
133A4A70000
heap
page read and write
9D0000
unkown
page readonly
249000
unkown
page readonly
3721000
heap
page read and write
133A2B1E000
heap
page read and write
64D000
heap
page read and write
63D000
heap
page read and write
2FCC000
heap
page read and write
308E000
stack
page read and write
2DF6000
heap
page read and write
EB0000
trusted library allocation
page read and write
60E000
heap
page read and write
63D000
heap
page read and write
30E8000
heap
page read and write
42CF000
stack
page read and write
2832000
heap
page read and write
133A2B4D000
heap
page read and write
157C000
heap
page read and write
1047000
heap
page read and write
3240000
trusted library allocation
page read and write
824000
heap
page read and write
12F0000
heap
page read and write
1351000
trusted library allocation
page read and write
236000
unkown
page readonly
63A000
heap
page read and write
EB0000
trusted library allocation
page read and write
2EF1000
trusted library allocation
page read and write
2F6E000
stack
page read and write
10AB000
heap
page read and write
4D6F000
stack
page read and write
152F000
trusted library allocation
page read and write
3B91000
heap
page read and write
3240000
trusted library allocation
page read and write
649000
heap
page read and write
1184000
heap
page read and write
1295000
heap
page read and write
15E2000
trusted library allocation
page read and write
1314000
heap
page read and write
30A8000
heap
page read and write
143D000
heap
page read and write
3721000
heap
page read and write
3B91000
heap
page read and write
3721000
heap
page read and write
68A000
stack
page read and write
3B91000
heap
page read and write
649000
heap
page read and write
1351000
trusted library allocation
page read and write
3240000
trusted library allocation
page read and write
10F8000
heap
page read and write
EB0000
trusted library allocation
page read and write
133A2B44000
heap
page read and write
3721000
heap
page read and write
1184000
heap
page read and write
133A2B0E000
heap
page read and write
2835000
heap
page read and write
EB0000
trusted library allocation
page read and write
3B91000
heap
page read and write
FDD000
stack
page read and write
990000
heap
page read and write
64D000
heap
page read and write
2FBF000
heap
page read and write
824000
heap
page read and write
64D000
heap
page read and write
4CDF000
stack
page read and write
9D1000
unkown
page execute read
133A2B0D000
heap
page read and write
3240000
trusted library allocation
page read and write
6B54FF000
stack
page read and write
3A91000
heap
page read and write
15E4000
trusted library allocation
page read and write
824000
heap
page read and write
133A2B27000
heap
page read and write
64D000
heap
page read and write
3B91000
heap
page read and write
133A2B4B000
heap
page read and write
2FCC000
heap
page read and write
11E4000
heap
page read and write
8CF000
stack
page read and write
950000
heap
page read and write
1550000
trusted library allocation
page read and write
4F2F000
stack
page read and write
1120000
heap
page read and write
283F000
heap
page read and write
649000
heap
page read and write
283D000
heap
page read and write
EB0000
trusted library allocation
page read and write
3240000
trusted library allocation
page read and write
283A000
heap
page read and write
133A2AFC000
heap
page read and write
1184000
heap
page read and write
A90000
unkown
page read and write
A60000
unkown
page readonly
3721000
heap
page read and write
2DBF000
stack
page read and write
63D000
heap
page read and write
3721000
heap
page read and write
4DF000
unkown
page read and write
3280000
heap
page read and write
133A2AC0000
heap
page read and write
63D000
heap
page read and write
678000
heap
page read and write
A60000
unkown
page readonly
2EF1000
trusted library allocation
page read and write
F58000
heap
page read and write
824000
heap
page read and write
283F000
heap
page read and write
6B50FF000
stack
page read and write
1184000
heap
page read and write
649000
heap
page read and write
3721000
heap
page read and write
85E000
stack
page read and write
3B91000
heap
page read and write
13DF000
trusted library allocation
page read and write
13F3000
trusted library allocation
page read and write
133A2B16000
heap
page read and write
D0E000
unkown
page readonly
EB0000
trusted library allocation
page read and write
9D0000
unkown
page readonly
3721000
heap
page read and write
63D000
heap
page read and write
30CD000
heap
page read and write
2F30000
heap
page read and write
3B91000
heap
page read and write
133A2B27000
heap
page read and write
63D000
heap
page read and write
3B91000
heap
page read and write
133A2DDC000
heap
page read and write
14CC000
trusted library allocation
page read and write
133A2AE8000
heap
page read and write
133A2B4D000
heap
page read and write
159D000
heap
page read and write
2D7E000
stack
page read and write
30E0000
heap
page read and write
133A2B27000
heap
page read and write
3721000
heap
page read and write
649000
heap
page read and write
3240000
trusted library allocation
page read and write
2DC0000
heap
page read and write
2E8C000
stack
page read and write
32F5000
heap
page read and write
152F000
trusted library allocation
page read and write
1569000
heap
page read and write
3B91000
heap
page read and write
824000
heap
page read and write
5080000
heap
page read and write
1184000
heap
page read and write
326E000
stack
page read and write
2FBE000
heap
page read and write
89F000
stack
page read and write
2835000
heap
page read and write
5050000
heap
page read and write
39F2000
trusted library allocation
page read and write
3721000
heap
page read and write
1483000
trusted library allocation
page read and write
133A2B27000
heap
page read and write
31DF000
stack
page read and write
3B91000
heap
page read and write
3A37000
trusted library allocation
page read and write
63D000
heap
page read and write
1387000
heap
page read and write
133A2B4D000
heap
page read and write
2834000
heap
page read and write
133A2B01000
heap
page read and write
651000
heap
page read and write
649000
heap
page read and write
133A2B44000
heap
page read and write
3B91000
heap
page read and write
649000
heap
page read and write
2836000
heap
page read and write
2FC6000
trusted library allocation
page read and write
860000
trusted library allocation
page read and write
63D000
heap
page read and write
3721000
heap
page read and write
3721000
heap
page read and write
39D0000
trusted library allocation
page read and write
168D000
trusted library allocation
page read and write
3721000
heap
page read and write
EB0000
trusted library allocation
page read and write
3721000
heap
page read and write
1351000
trusted library allocation
page read and write
2FCC000
heap
page read and write
13ED000
trusted library allocation
page read and write
3A92000
heap
page read and write
FCE000
stack
page read and write
133A2B3E000
heap
page read and write
3B8C000
trusted library allocation
page read and write
39F2000
trusted library allocation
page read and write
133A2B3D000
heap
page read and write
EB0000
trusted library allocation
page read and write
4FAF000
stack
page read and write
11EA000
heap
page read and write
4D80000
heap
page read and write
FE6000
heap
page read and write
15EF000
trusted library allocation
page read and write
1491000
heap
page read and write
3240000
trusted library allocation
page read and write
E7F000
stack
page read and write
824000
heap
page read and write
3721000
heap
page read and write
283F000
heap
page read and write
3C75000
trusted library allocation
page read and write
3BC0000
trusted library allocation
page read and write
133A2DD5000
heap
page read and write
F74000
heap
page read and write
1551000
trusted library allocation
page read and write
236000
unkown
page readonly
14CC000
trusted library allocation
page read and write
2838000
heap
page read and write
649000
heap
page read and write
63D000
heap
page read and write
A78000
heap
page read and write
431C000
trusted library allocation
page read and write
649000
heap
page read and write
3B91000
heap
page read and write
1556000
trusted library allocation
page read and write
283F000
heap
page read and write
2EDE000
stack
page read and write
134E000
heap
page read and write
1245000
heap
page read and write
820000
heap
page read and write
3721000
heap
page read and write
2EF1000
trusted library allocation
page read and write
133A2B46000
heap
page read and write
39F2000
trusted library allocation
page read and write
3B91000
heap
page read and write
133A2B43000
heap
page read and write
649000
heap
page read and write
368E000
stack
page read and write
30A0000
heap
page read and write
283F000
heap
page read and write
63D000
heap
page read and write
4DB0000
heap
page read and write
3B91000
heap
page read and write
1553000
trusted library allocation
page read and write
14CC000
trusted library allocation
page read and write
3B91000
heap
page read and write
9D1000
unkown
page execute read
3B91000
heap
page read and write
283B000
heap
page read and write
283C000
heap
page read and write
152F000
trusted library allocation
page read and write
FBF000
stack
page read and write
3721000
heap
page read and write
133A2B16000
heap
page read and write
2833000
heap
page read and write
423F000
stack
page read and write
15FE000
trusted library allocation
page read and write
133A2B4D000
heap
page read and write
3114000
trusted library allocation
page read and write
133A2B01000
heap
page read and write
11F9000
heap
page read and write
64D000
heap
page read and write
4EEE000
stack
page read and write
2FBB000
heap
page read and write
3721000
heap
page read and write
1351000
trusted library allocation
page read and write
1559000
trusted library allocation
page read and write
155A000
trusted library allocation
page read and write
133A2CB0000
heap
page read and write
649000
heap
page read and write
64D000
heap
page read and write
141B000
trusted library allocation
page read and write
E8C000
stack
page read and write
692000
heap
page read and write
63D000
heap
page read and write
63D000
heap
page read and write
282F000
stack
page read and write
19A000
stack
page read and write
30ED000
heap
page read and write
30EC000
heap
page read and write
3240000
trusted library allocation
page read and write
3C83000
trusted library allocation
page read and write
3721000
heap
page read and write
3010000
heap
page read and write
824000
heap
page read and write
EB0000
trusted library allocation
page read and write
EB0000
trusted library allocation
page read and write
23E0000
heap
page read and write
63D000
heap
page read and write
8A0000
heap
page read and write
649000
heap
page read and write
9B000
stack
page read and write
7D0000
direct allocation
page execute and read and write
3B91000
heap
page read and write
3390000
heap
page read and write
133A2B39000
heap
page read and write
21EE000
stack
page read and write
180000
unkown
page readonly
1555000
trusted library allocation
page read and write
651000
heap
page read and write
30C0000
heap
page read and write
30CC000
heap
page read and write
1224000
heap
page read and write
3B91000
heap
page read and write
F2E000
stack
page read and write
408000
unkown
page readonly
3721000
heap
page read and write
3B91000
heap
page read and write
2831000
heap
page read and write
649000
heap
page read and write
327E000
stack
page read and write
649000
heap
page read and write
550000
heap
page read and write
33AC000
stack
page read and write
30DC000
heap
page read and write
3721000
heap
page read and write
3240000
trusted library allocation
page read and write
180000
unkown
page readonly
1391000
trusted library allocation
page read and write
3721000
heap
page read and write
EB0000
trusted library allocation
page read and write
3B91000
heap
page read and write
11B0000
heap
page read and write
3B91000
heap
page read and write
1184000
heap
page read and write
39DA000
trusted library allocation
page read and write
240000
unkown
page write copy
6B55FE000
stack
page read and write
12EC000
heap
page read and write
3B91000
heap
page read and write
15E3000
trusted library allocation
page read and write
2EF1000
trusted library allocation
page read and write
463F000
stack
page read and write
EAC000
stack
page read and write
134E000
heap
page read and write
318B000
trusted library allocation
page read and write
3A79000
trusted library allocation
page read and write
64D000
heap
page read and write
1475000
trusted library allocation
page read and write
3A37000
trusted library allocation
page read and write
1483000
trusted library allocation
page read and write
30DC000
heap
page read and write
63D000
heap
page read and write
3721000
heap
page read and write
3721000
heap
page read and write
12D9000
heap
page read and write
3721000
heap
page read and write
810000
heap
page read and write
30DC000
heap
page read and write
1005000
heap
page read and write
A99000
unkown
page readonly
2FDE000
trusted library allocation
page read and write
63D000
heap
page read and write
1351000
trusted library allocation
page read and write
3A37000
trusted library allocation
page read and write
649000
heap
page read and write
4CF000
unkown
page read and write
1591000
heap
page read and write
6B58FE000
stack
page read and write
30D3000
trusted library allocation
page read and write
3A78000
trusted library allocation
page read and write
2830000
heap
page read and write
502F000
stack
page read and write
12F7000
heap
page read and write
2F99000
heap
page read and write
8B0000
heap
page read and write
3B91000
heap
page read and write
3721000
heap
page read and write
810000
heap
page read and write
3B91000
heap
page read and write
408000
unkown
page readonly
1351000
trusted library allocation
page read and write
500000
heap
page read and write
1351000
trusted library allocation
page read and write
133A2DD0000
heap
page read and write
649000
heap
page read and write
2F1F000
stack
page read and write
3240000
trusted library allocation
page read and write
3B91000
heap
page read and write
4F6E000
stack
page read and write
510000
heap
page read and write
1106000
heap
page read and write
12E7000
heap
page read and write
2FA0000
heap
page read and write
2837000
heap
page read and write
3240000
trusted library allocation
page read and write
2FA3000
heap
page read and write
133A2B27000
heap
page read and write
63D000
heap
page read and write
4D5F000
stack
page read and write
1344000
heap
page read and write
2FBB000
heap
page read and write
3721000
heap
page read and write
2200000
heap
page read and write
There are 627 hidden memdumps, click here to show them.