IOC Report
z3bqnf1WvW.exe

loading gif

Files

File Path
Type
Category
Malicious
z3bqnf1WvW.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Secure Preferences
JSON data
dropped
malicious
C:\Users\user\AppData\Local\Temp\tmp1FB5.tmp
SQLite 3.x database, last written using SQLite version 3042000, file counter 7, database pages 5, cookie 0x5, schema 4, UTF-8, version-valid-for 7
dropped
C:\Users\user\AppData\Local\Temp\tmp2067.tmp
SQLite 3.x database, last written using SQLite version 3042000, file counter 4, database pages 5, cookie 0x3, schema 4, UTF-8, version-valid-for 4
dropped
C:\Users\user\AppData\Local\Temp\tmp27CE.tmp
SQLite 3.x database, last written using SQLite version 3042000, file counter 4, database pages 5, cookie 0x3, schema 4, UTF-8, version-valid-for 4
dropped
C:\Users\user\AppData\Local\Temp\tmp2D2E.tmp
SQLite 3.x database, last written using SQLite version 3042000, file counter 7, database pages 5, cookie 0x5, schema 4, UTF-8, version-valid-for 7
dropped
C:\Users\user\AppData\Local\Temp\tmp3A01.tmp
SQLite 3.x database, last written using SQLite version 3042000, file counter 7, database pages 5, cookie 0x5, schema 4, UTF-8, version-valid-for 7
dropped
C:\Users\user\AppData\Local\Temp\tmp3A11.tmp
SQLite 3.x database, last written using SQLite version 3042000, file counter 4, database pages 5, cookie 0x3, schema 4, UTF-8, version-valid-for 4
dropped
C:\Users\user\AppData\Local\Temp\tmp3EEC.tmp
SQLite 3.x database, last written using SQLite version 3042000, file counter 7, database pages 5, cookie 0x5, schema 4, UTF-8, version-valid-for 7
dropped
C:\Users\user\AppData\Local\Temp\tmp4328.tmp
SQLite 3.x database, last written using SQLite version 3042000, file counter 7, database pages 5, cookie 0x5, schema 4, UTF-8, version-valid-for 7
dropped
C:\Users\user\AppData\Local\Temp\tmp660D.tmp
SQLite 3.x database, last written using SQLite version 3042000, file counter 7, database pages 5, cookie 0x5, schema 4, UTF-8, version-valid-for 7
dropped
C:\Users\user\AppData\Local\Temp\tmp663F.tmp
SQLite 3.x database, last written using SQLite version 3042000, file counter 7, database pages 5, cookie 0x5, schema 4, UTF-8, version-valid-for 7
dropped
C:\Users\user\AppData\Local\Temp\tmp6A44.tmp
SQLite 3.x database, last written using SQLite version 3042000, file counter 7, database pages 5, cookie 0x5, schema 4, UTF-8, version-valid-for 7
dropped
C:\Users\user\AppData\Local\Temp\tmp7183.tmp
SQLite 3.x database, last written using SQLite version 3042000, file counter 4, database pages 5, cookie 0x3, schema 4, UTF-8, version-valid-for 4
dropped
C:\Users\user\AppData\Local\Temp\tmp7367.tmp
SQLite 3.x database, last written using SQLite version 3042000, file counter 4, database pages 5, cookie 0x3, schema 4, UTF-8, version-valid-for 4
dropped
C:\Users\user\AppData\Local\Temp\tmp7511.tmp
SQLite 3.x database, last written using SQLite version 3042000, file counter 7, database pages 5, cookie 0x5, schema 4, UTF-8, version-valid-for 7
dropped
C:\Users\user\AppData\Local\Temp\tmp77A2.tmp
SQLite 3.x database, last written using SQLite version 3042000, file counter 7, database pages 5, cookie 0x5, schema 4, UTF-8, version-valid-for 7
dropped
C:\Users\user\AppData\Local\Temp\tmp7BFF.tmp
SQLite 3.x database, last written using SQLite version 3042000, file counter 7, database pages 5, cookie 0x5, schema 4, UTF-8, version-valid-for 7
dropped
C:\Users\user\AppData\Local\Temp\tmp8327.tmp
SQLite 3.x database, last written using SQLite version 3042000, file counter 4, database pages 5, cookie 0x3, schema 4, UTF-8, version-valid-for 4
dropped
C:\Users\user\AppData\Local\Temp\tmp8751.tmp
SQLite 3.x database, last written using SQLite version 3042000, file counter 7, database pages 5, cookie 0x5, schema 4, UTF-8, version-valid-for 7
dropped
C:\Users\user\AppData\Local\Temp\tmp897D.tmp
SQLite 3.x database, last written using SQLite version 3042000, file counter 7, database pages 5, cookie 0x5, schema 4, UTF-8, version-valid-for 7
dropped
C:\Users\user\AppData\Local\Temp\tmp8BAF.tmp
SQLite 3.x database, last written using SQLite version 3042000, file counter 7, database pages 5, cookie 0x5, schema 4, UTF-8, version-valid-for 7
dropped
C:\Users\user\AppData\Local\Temp\tmp8F81.tmp
SQLite 3.x database, last written using SQLite version 3042000, file counter 7, database pages 5, cookie 0x5, schema 4, UTF-8, version-valid-for 7
dropped
C:\Users\user\AppData\Local\Temp\tmp92E5.tmp
SQLite 3.x database, last written using SQLite version 3042000, file counter 7, database pages 5, cookie 0x5, schema 4, UTF-8, version-valid-for 7
dropped
C:\Users\user\AppData\Local\Temp\tmp9F14.tmp
SQLite 3.x database, last written using SQLite version 3042000, file counter 7, database pages 5, cookie 0x5, schema 4, UTF-8, version-valid-for 7
dropped
C:\Users\user\AppData\Local\Temp\tmpA08.tmp
SQLite 3.x database, last written using SQLite version 3042000, file counter 4, database pages 5, cookie 0x3, schema 4, UTF-8, version-valid-for 4
dropped
C:\Users\user\AppData\Local\Temp\tmpA147.tmp
SQLite 3.x database, last written using SQLite version 3042000, file counter 7, database pages 5, cookie 0x5, schema 4, UTF-8, version-valid-for 7
dropped
C:\Users\user\AppData\Local\Temp\tmpA7A3.tmp
SQLite 3.x database, last written using SQLite version 3042000, file counter 4, database pages 5, cookie 0x3, schema 4, UTF-8, version-valid-for 4
dropped
C:\Users\user\AppData\Local\Temp\tmpAFC0.tmp
SQLite 3.x database, last written using SQLite version 3042000, file counter 7, database pages 5, cookie 0x5, schema 4, UTF-8, version-valid-for 7
dropped
C:\Users\user\AppData\Local\Temp\tmpCEC2.tmp
SQLite 3.x database, last written using SQLite version 3042000, file counter 7, database pages 5, cookie 0x5, schema 4, UTF-8, version-valid-for 7
dropped
C:\Users\user\AppData\Local\Temp\tmpD034.tmp
SQLite 3.x database, last written using SQLite version 3042000, file counter 7, database pages 5, cookie 0x5, schema 4, UTF-8, version-valid-for 7
dropped
C:\Users\user\AppData\Local\Temp\tmpD08B.tmp
SQLite 3.x database, last written using SQLite version 3042000, file counter 7, database pages 5, cookie 0x5, schema 4, UTF-8, version-valid-for 7
dropped
C:\Users\user\AppData\Local\Temp\tmpD87B.tmp
SQLite 3.x database, last written using SQLite version 3042000, file counter 7, database pages 5, cookie 0x5, schema 4, UTF-8, version-valid-for 7
dropped
C:\Users\user\AppData\Local\Temp\tmpDF23.tmp
SQLite 3.x database, last written using SQLite version 3042000, file counter 7, database pages 5, cookie 0x5, schema 4, UTF-8, version-valid-for 7
dropped
C:\Users\user\AppData\Local\Temp\tmpE069.tmp
SQLite 3.x database, last written using SQLite version 3042000, file counter 7, database pages 5, cookie 0x5, schema 4, UTF-8, version-valid-for 7
dropped
C:\Users\user\AppData\Local\Temp\tmpEBD7.tmp
SQLite 3.x database, last written using SQLite version 3042000, file counter 7, database pages 5, cookie 0x5, schema 4, UTF-8, version-valid-for 7
dropped
C:\Users\user\AppData\Local\Temp\tmpEBD8.tmp
SQLite 3.x database, last written using SQLite version 3042000, file counter 7, database pages 5, cookie 0x5, schema 4, UTF-8, version-valid-for 7
dropped
C:\Users\user\AppData\Local\Temp\tmpEBE8.tmp
SQLite 3.x database, last written using SQLite version 3042000, file counter 7, database pages 5, cookie 0x5, schema 4, UTF-8, version-valid-for 7
dropped
C:\Users\user\AppData\Local\Temp\tmpF31E.tmp
SQLite 3.x database, last written using SQLite version 3042000, file counter 4, database pages 5, cookie 0x3, schema 4, UTF-8, version-valid-for 4
dropped
C:\Users\user\AppData\Local\Temp\tmpF665.tmp
SQLite 3.x database, last written using SQLite version 3042000, file counter 4, database pages 5, cookie 0x3, schema 4, UTF-8, version-valid-for 4
dropped
C:\Users\user\AppData\Local\Temp\tmpFFDD.tmp
SQLite 3.x database, last written using SQLite version 3042000, file counter 7, database pages 5, cookie 0x5, schema 4, UTF-8, version-valid-for 7
dropped
C:\Users\user\AppData\Local\Temp\tmpFFED.tmp
SQLite 3.x database, last written using SQLite version 3042000, file counter 7, database pages 5, cookie 0x5, schema 4, UTF-8, version-valid-for 7
dropped
C:\Users\user\AppData\Local\snofla\llg\background.js
ASCII text
dropped
C:\Users\user\AppData\Local\snofla\llg\content.js
ASCII text
dropped
C:\Users\user\AppData\Local\snofla\llg\icon.png
PNG image data, 128 x 128, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\snofla\llg\jquery.js
ASCII text, with very long lines (32086)
dropped
C:\Users\user\AppData\Local\snofla\llg\manifest.json
JSON data
dropped
There are 37 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\z3bqnf1WvW.exe
"C:\Users\user\Desktop\z3bqnf1WvW.exe"
malicious

URLs

Name
IP
Malicious
http://178.63.51.126:9000/wbinjget?q=9F196B497BDFD0CED832D4AB8AAC3B4F
178.63.51.126
malicious
https://duckduckgo.com/chrome_newtab
unknown
https://duckduckgo.com/ac/?q=
unknown
https://www.google.com/images/branding/product/ico/googleg_lodp.ico
unknown
http://schemas.datacontract.org/2004/07/
unknown
https://chrome.google.com/webstore
unknown
https://drive-daily-2.corp.google.com/
unknown
https://drive-autopush.corp.google.com/
unknown
https://drive-daily-4.corp.google.com/
unknown
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
unknown
https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
unknown
https://duckduckgo.com/chrome_newtabS
unknown
https://www.ecosia.org/newtab/
unknown
https://drive-daily-1.corp.google.com/
unknown
http://178.63.51.126:9000/
unknown
https://drive-daily-5.corp.google.com/
unknown
https://docs.google.com/
unknown
http://purl.oen
unknown
https://ac.ecosia.org/autocomplete?q=
unknown
https://drive-staging.corp.google.com/
unknown
https://drive-daily-6.corp.google.com/
unknown
https://drive.google.com/
unknown
https://drive-daily-0.corp.google.com/
unknown
https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
unknown
http://178.63.51.126:9000
unknown
https://drive-preprod.corp.google.com/
unknown
https://pastebin.com/raw/ZqQ3tKFz
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
unknown
https://www.google.com/
unknown
https://drive-daily-3.corp.google.com/
unknown
There are 21 hidden URLs, click here to show them.

IPs

IP
Domain
Country
Malicious
178.63.51.126
unknown
Germany
malicious

Registry

Path
Value
Malicious
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\z3bqnf1WvW_RASAPI32
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\z3bqnf1WvW_RASAPI32
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\z3bqnf1WvW_RASAPI32
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\z3bqnf1WvW_RASAPI32
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\z3bqnf1WvW_RASAPI32
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\z3bqnf1WvW_RASAPI32
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\z3bqnf1WvW_RASAPI32
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\z3bqnf1WvW_RASMANCS
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\z3bqnf1WvW_RASMANCS
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\z3bqnf1WvW_RASMANCS
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\z3bqnf1WvW_RASMANCS
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\z3bqnf1WvW_RASMANCS
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\z3bqnf1WvW_RASMANCS
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\z3bqnf1WvW_RASMANCS
FileDirectory
There are 5 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
642000
unkown
page readonly
malicious
FDD000
trusted library allocation
page execute and read and write
28C0000
heap
page read and write
3B42000
trusted library allocation
page read and write
530B000
trusted library allocation
page read and write
2C25000
trusted library allocation
page read and write
4EC0000
trusted library allocation
page read and write
B0A000
heap
page read and write
2C06000
trusted library allocation
page read and write
4EED000
trusted library allocation
page read and write
60D0000
trusted library allocation
page execute and read and write
2C51000
trusted library allocation
page read and write
2C79000
trusted library allocation
page read and write
2AD6000
trusted library allocation
page read and write
5330000
trusted library allocation
page execute and read and write
60F0000
trusted library allocation
page execute and read and write
39D1000
trusted library allocation
page read and write
2C32000
trusted library allocation
page read and write
2BBF000
trusted library allocation
page read and write
2BB7000
trusted library allocation
page read and write
5005000
trusted library allocation
page read and write
3B52000
trusted library allocation
page read and write
FC0000
trusted library allocation
page read and write
FE0000
trusted library allocation
page read and write
753D000
stack
page read and write
2CCF000
trusted library allocation
page read and write
7AB0000
heap
page read and write
80FD000
stack
page read and write
5F32000
trusted library allocation
page read and write
7E5000
heap
page read and write
767D000
stack
page read and write
62DE000
stack
page read and write
6C00000
trusted library allocation
page execute and read and write
61AE000
stack
page read and write
51F0000
heap
page execute and read and write
5F48000
trusted library allocation
page read and write
4F43000
trusted library allocation
page read and write
2DA5000
trusted library allocation
page read and write
4B6D000
stack
page read and write
5080000
heap
page read and write
51E4000
trusted library allocation
page read and write
FF6000
trusted library allocation
page execute and read and write
7199000
stack
page read and write
7AD0000
trusted library allocation
page execute and read and write
7A60000
trusted library allocation
page read and write
604F000
heap
page read and write
5CEE000
stack
page read and write
641E000
stack
page read and write
2D8C000
trusted library allocation
page read and write
100B000
trusted library allocation
page execute and read and write
2C3F000
trusted library allocation
page read and write
61D0000
trusted library allocation
page execute and read and write
7AC0000
trusted library allocation
page execute and read and write
7080000
heap
page read and write
72DC000
stack
page read and write
5F30000
trusted library allocation
page read and write
E6E000
stack
page read and write
D67000
heap
page read and write
287E000
stack
page read and write
1007000
trusted library allocation
page execute and read and write
53C0000
trusted library allocation
page read and write
3BE8000
trusted library allocation
page read and write
3B1A000
trusted library allocation
page read and write
2D1D000
trusted library allocation
page read and write
6E8B000
stack
page read and write
3AF9000
trusted library allocation
page read and write
3094000
trusted library allocation
page read and write
3B25000
trusted library allocation
page read and write
1060000
trusted library allocation
page execute and read and write
7090000
trusted library allocation
page execute and read and write
2B94000
trusted library allocation
page read and write
1000000
trusted library allocation
page read and write
527D000
stack
page read and write
3BD8000
trusted library allocation
page read and write
7A8E000
trusted library section
page read and write
3B06000
trusted library allocation
page read and write
5070000
trusted library allocation
page execute and read and write
2D93000
trusted library allocation
page read and write
3B32000
trusted library allocation
page read and write
FF0000
trusted library allocation
page read and write
3B71000
trusted library allocation
page read and write
52FD000
stack
page read and write
CF0000
heap
page read and write
5310000
trusted library allocation
page read and write
BB2000
heap
page read and write
3080000
trusted library allocation
page read and write
FFA000
trusted library allocation
page execute and read and write
AF8000
stack
page read and write
4FF0000
trusted library allocation
page read and write
6004000
heap
page read and write
4F40000
trusted library allocation
page read and write
743D000
stack
page read and write
3B77000
trusted library allocation
page read and write
5000000
trusted library allocation
page read and write
2D53000
trusted library allocation
page read and write
60C0000
trusted library allocation
page execute and read and write
616E000
stack
page read and write
1097000
heap
page read and write
5F5A000
trusted library allocation
page read and write
28BC000
stack
page read and write
704A000
stack
page read and write
305F000
trusted library allocation
page read and write
4EDE000
trusted library allocation
page read and write
78FE000
stack
page read and write
2C46000
trusted library allocation
page read and write
603B000
heap
page read and write
2BD0000
trusted library allocation
page read and write
6BE0000
trusted library section
page read and write
4FFB000
trusted library allocation
page read and write
4F00000
trusted library allocation
page read and write
3B6E000
trusted library allocation
page read and write
FF2000
trusted library allocation
page read and write
7B10000
heap
page read and write
2AC8000
trusted library allocation
page read and write
6D61000
trusted library allocation
page read and write
7F310000
trusted library allocation
page execute and read and write
5F4F000
trusted library allocation
page read and write
2DBB000
trusted library allocation
page read and write
3B6C000
trusted library allocation
page read and write
5FB4000
heap
page read and write
7B22000
heap
page read and write
7FFF000
stack
page read and write
B0E000
heap
page read and write
5FA2000
heap
page read and write
605A000
heap
page read and write
FAE000
stack
page read and write
6D80000
trusted library allocation
page execute and read and write
49D0000
trusted library allocation
page read and write
EAE000
stack
page read and write
5083000
heap
page read and write
2C10000
trusted library allocation
page read and write
2F86000
trusted library allocation
page read and write
5FBC000
heap
page read and write
5300000
trusted library allocation
page read and write
5EEE000
stack
page read and write
6120000
trusted library allocation
page execute and read and write
7A5E000
stack
page read and write
6A8C000
stack
page read and write
FD4000
trusted library allocation
page read and write
6D1C000
stack
page read and write
6100000
trusted library allocation
page read and write
7070000
trusted library allocation
page read and write
7A81000
trusted library section
page read and write
1070000
trusted library allocation
page read and write
2C6E000
trusted library allocation
page read and write
2C18000
trusted library allocation
page read and write
29D1000
trusted library allocation
page read and write
3B5F000
trusted library allocation
page read and write
72E0000
heap
page read and write
B00000
heap
page read and write
5F5F000
trusted library allocation
page read and write
5F55000
trusted library allocation
page read and write
4ECE000
trusted library allocation
page read and write
7E0000
heap
page read and write
4F09000
trusted library allocation
page read and write
2CAC000
trusted library allocation
page read and write
2B62000
trusted library allocation
page read and write
1030000
heap
page read and write
4F18000
trusted library allocation
page read and write
30A2000
trusted library allocation
page read and write
6A90000
trusted library allocation
page execute and read and write
3AD5000
trusted library allocation
page read and write
1005000
trusted library allocation
page execute and read and write
5320000
trusted library allocation
page read and write
4EDA000
trusted library allocation
page read and write
D3E000
stack
page read and write
4EB0000
trusted library allocation
page read and write
6ADB000
stack
page read and write
6C10000
trusted library allocation
page read and write
1050000
heap
page execute and read and write
51E0000
trusted library allocation
page read and write
FD3000
trusted library allocation
page execute and read and write
3B4C000
trusted library allocation
page read and write
308B000
trusted library allocation
page read and write
53C2000
trusted library allocation
page read and write
3B68000
trusted library allocation
page read and write
6430000
trusted library allocation
page read and write
4F20000
trusted library allocation
page read and write
1090000
heap
page read and write
FD0000
trusted library allocation
page read and write
306D000
trusted library allocation
page read and write
6BDD000
stack
page read and write
6070000
trusted library allocation
page read and write
6D70000
trusted library allocation
page read and write
60E1000
trusted library allocation
page read and write
55DD000
stack
page read and write
7DC0000
trusted library allocation
page execute and read and write
2DAB000
trusted library allocation
page read and write
4F10000
trusted library allocation
page read and write
2D65000
trusted library allocation
page read and write
3AED000
trusted library allocation
page read and write
2DB0000
trusted library allocation
page read and write
7B00000
heap
page read and write
2D7F000
trusted library allocation
page read and write
51DE000
stack
page read and write
2DC6000
trusted library allocation
page read and write
640000
unkown
page readonly
2C58000
trusted library allocation
page read and write
2D9F000
trusted library allocation
page read and write
B95000
heap
page read and write
2CE5000
trusted library allocation
page read and write
D60000
heap
page read and write
3BF5000
trusted library allocation
page read and write
3B13000
trusted library allocation
page read and write
3B2C000
trusted library allocation
page read and write
63DE000
stack
page read and write
7DF0000
heap
page read and write
8100000
trusted library allocation
page read and write
81BA000
heap
page read and write
2E97000
trusted library allocation
page read and write
30A0000
trusted library allocation
page read and write
B41000
heap
page read and write
4EE1000
trusted library allocation
page read and write
1080000
trusted library allocation
page read and write
2B1A000
trusted library allocation
page read and write
61C0000
trusted library allocation
page read and write
2D5D000
trusted library allocation
page read and write
3B37000
trusted library allocation
page read and write
7A68000
trusted library allocation
page read and write
C10000
heap
page read and write
6025000
heap
page read and write
3BDC000
trusted library allocation
page read and write
6080000
trusted library allocation
page read and write
7AF0000
trusted library allocation
page read and write
81B0000
heap
page read and write
5F39000
trusted library allocation
page read and write
79B000
stack
page read and write
6090000
trusted library allocation
page read and write
3B59000
trusted library allocation
page read and write
7A8B000
trusted library section
page read and write
561C000
stack
page read and write
3078000
trusted library allocation
page read and write
81CC000
heap
page read and write
4F46000
trusted library allocation
page read and write
3B63000
trusted library allocation
page read and write
2B09000
trusted library allocation
page read and write
2AC4000
trusted library allocation
page read and write
2B6D000
trusted library allocation
page read and write
72F0000
trusted library allocation
page read and write
7DBD000
stack
page read and write
2C5E000
trusted library allocation
page read and write
7300000
heap
page read and write
FED000
trusted library allocation
page execute and read and write
4ECB000
trusted library allocation
page read and write
49D8000
trusted library allocation
page read and write
309D000
trusted library allocation
page read and write
29CE000
stack
page read and write
537E000
stack
page read and write
77FE000
stack
page read and write
6060000
trusted library allocation
page execute and read and write
2CF1000
trusted library allocation
page read and write
3B7B000
trusted library allocation
page read and write
601F000
heap
page read and write
519E000
stack
page read and write
1002000
trusted library allocation
page read and write
1020000
trusted library allocation
page read and write
2C63000
trusted library allocation
page read and write
3054000
trusted library allocation
page read and write
506D000
stack
page read and write
5F78000
heap
page read and write
304A000
trusted library allocation
page read and write
4EE6000
trusted library allocation
page read and write
B34000
heap
page read and write
81BD000
heap
page read and write
795B000
stack
page read and write
7310000
heap
page read and write
757D000
stack
page read and write
71DD000
stack
page read and write
7A70000
trusted library allocation
page execute and read and write
5DED000
stack
page read and write
2D72000
trusted library allocation
page read and write
5F35000
trusted library allocation
page read and write
3ACD000
trusted library allocation
page read and write
5F60000
heap
page read and write
B9F000
heap
page read and write
There are 265 hidden memdumps, click here to show them.