IOC Report
GOmRjFSKNz.exe

loading gif

Files

File Path
Type
Category
Malicious
GOmRjFSKNz.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Local\Temp\72076\Launches.pif
PE32 executable (GUI) Intel 80386, for MS Windows
modified
malicious
C:\Users\Public\Desktop\Google Chrome.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Description string, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:41 2023, mtime=Wed Oct 4 11:02:38 2023, atime=Wed Sep 27 04:28:27 2023, length=3242272, window=hide
dropped
C:\Users\user\AppData\Local\Temp\72076\RegAsm.exe
PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\72076\s
data
dropped
C:\Users\user\AppData\Local\Temp\An
data
dropped
C:\Users\user\AppData\Local\Temp\Carol
data
dropped
C:\Users\user\AppData\Local\Temp\Indoor
data
dropped
C:\Users\user\AppData\Local\Temp\Passed
data
dropped
C:\Users\user\AppData\Local\Temp\Pediatric
ASCII text, with very long lines (701), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\Pediatric.bat (copy)
ASCII text, with very long lines (701), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\Strap
data
dropped
C:\Users\user\AppData\Local\Temp\Tmp90E.tmp
data
dropped
C:\Users\user\AppData\Local\Temp\Tmp93E.tmp
data
dropped
C:\Users\user\AppData\Local\Temp\Transport
data
dropped
C:\Users\user\AppData\Local\Temp\Treasure
SysEx File -
dropped
C:\Users\user\AppData\Local\Temp\Words
data
dropped
C:\Users\user\AppData\Roaming\Microsoft\Crypto\RSA\S-1-5-21-2246122658-3693405117-2476756634-1002\76b53b3ec448f7ccdda2063b15d2bfc3_9e146be9-c76a-4720-bcdb-53011b87bd06
data
dropped
There are 8 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\GOmRjFSKNz.exe
"C:\Users\user\Desktop\GOmRjFSKNz.exe"
malicious
C:\Windows\SysWOW64\cmd.exe
"C:\Windows\System32\cmd.exe" /c move Pediatric Pediatric.bat & Pediatric.bat
malicious
C:\Windows\SysWOW64\findstr.exe
findstr /I "wrsa opssvc"
malicious
C:\Windows\SysWOW64\findstr.exe
findstr /I "avastui avgui bdservicehost nswscsvc sophoshealth"
malicious
C:\Windows\SysWOW64\cmd.exe
cmd /c md 72076
malicious
C:\Windows\SysWOW64\findstr.exe
findstr /V "SILICONLATINOAMPLANDBLOW" Words
malicious
C:\Windows\SysWOW64\cmd.exe
cmd /c copy /b ..\Indoor + ..\An + ..\Transport + ..\Strap + ..\Passed + ..\Treasure s
malicious
C:\Users\user\AppData\Local\Temp\72076\Launches.pif
Launches.pif s
malicious
C:\Users\user\AppData\Local\Temp\72076\RegAsm.exe
C:\Users\user\AppData\Local\Temp\72076\RegAsm.exe
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\tasklist.exe
tasklist
C:\Windows\SysWOW64\tasklist.exe
tasklist
C:\Windows\SysWOW64\choice.exe
choice /d y /t 5
There are 3 hidden processes, click here to show them.

URLs

Name
IP
Malicious
87.120.114.39:47928
malicious
http://tempuri.org/Entity/Id15Responsex
unknown
http://tempuri.org/Entity/Id24LRfq
unknown
http://tempuri.org/Entity/Id18Responsex
unknown
http://tempuri.org/Entity/Id7LRfqx
unknown
http://schemas.xmlsoap.org/soap/envelope/
unknown
http://tempuri.org/
unknown
https://www.autoitscript.com/autoit3/
unknown
http://tempuri.org/Entity/Id16LRfq
unknown
http://tempuri.org/Entity/Id9LRfq
unknown
http://tempuri.org/Entity/Id22Responsex
unknown
http://tempuri.org/Entity/Id10Responsex
unknown
http://tempuri.org/Entity/Id19Responsex
unknown
http://schemas.xmlsoap.org/ws/2005/02/rm/CreateSequenceResponse
unknown
http://tempuri.org/Entity/Id3LRfq
unknown
http://tempuri.org/Entity/Id2LRfq
unknown
http://schemas.xmlsoap.org/ws/2005/02/rm/TerminateSequence
unknown
http://tempuri.org/Entity/Id13LRfq
unknown
http://tempuri.org/Entity/Id6Responsex
unknown
http://tempuri.org/Entity/Id7Responsex
unknown
http://tempuri.org/Entity/Id1Responsex
unknown
http://tempuri.org/Entity/Id21Responsex
unknown
http://schemas.xmlsoap.org/ws/2004/08/addressing/faultp9
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/right/possessproperty
unknown
http://tempuri.org/Entity/Id14LRfq
unknown
http://tempuri.org/Entity/Id5LRfq
unknown
http://www.autoitscript.com/autoit3/J
unknown
https://api.ip.sb/ip
unknown
http://tempuri.org/Entity/Id23Responsex
unknown
http://schemas.xmlsoap.org/ws/2005/02/rm/SequenceAcknowledgement
unknown
http://tempuri.org/Entity/Id5Responsex
unknown
http://schemas.xmlsoap.org/ws/2004/08/addressing/role/anonymous
unknown
http://tempuri.org/Entity/Id11LRfq
unknown
http://tempuri.org/Entity/Id1LRfq4
unknown
http://tempuri.org/Entity/Id14Responsex
unknown
http://tempuri.org/Entity/Id2Responsex
unknown
http://tempuri.org/Entity/Id11Responsex
unknown
http://tempuri.org/Entity/Id20Responsex
unknown
http://tempuri.org/Entity/Id4LRfq
unknown
http://nsis.sf.net/NSIS_ErrorError
unknown
http://tempuri.org/Entity/Id20LRfq
unknown
http://tempuri.org/Entity/Id21LRfqduj
unknown
http://schemas.xmlsoap.org/ws/2005/02/rm/AckRequested
unknown
http://tempuri.org/Entity/Id12LRfq
unknown
http://tempuri.org/Entity/Id8Responsex
unknown
http://tempuri.org/Entity/Id13Responsex
unknown
http://tempuri.org/Entity/Id16Responsex
unknown
http://tempuri.org/Entity/
unknown
http://tempuri.org/Entity/Id9Responsex
unknown
http://schemas.xmlsoap.org/ws/2004/08/addressing
unknown
http://tempuri.org/Entity/Id15LRfqx/j
unknown
http://tempuri.org/Entity/Id3Responsex
unknown
http://tempuri.org/Entity/Id8LRfq
unknown
http://tempuri.org/Entity/Id17LRfq
unknown
http://tempuri.org/Entity/Id24Responsex
unknown
http://schemas.xmlsoap.org/ws/2005/02/rm
unknown
http://tempuri.org/Entity/Id19LRfq
unknown
http://tempuri.org/Entity/Id6LRfq
unknown
http://schemas.xmlsoap.org/ws/2005/02/rm/LastMessage
unknown
http://tempuri.org/Entity/Id22LRfq
unknown
http://tempuri.org/Entity/Id23LRfq
unknown
http://tempuri.org/Entity/Id12Responsex
unknown
http://tempuri.org/Entity/Id17Responsex
unknown
http://tempuri.org/Entity/Id10LRfq
unknown
http://schemas.xmlsoap.org/ws/2005/02/rm/CreateSequence
unknown
http://tempuri.org/Entity/Id18LRfq
unknown
http://schemas.xmlsoap.org/soap/actor/next
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/dns
unknown
http://tempuri.org/Entity/Id4Responsex
unknown
There are 59 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
GRfewLDzqhRQJfpDiaidRNex.GRfewLDzqhRQJfpDiaidRNex
unknown

IPs

IP
Domain
Country
Malicious
87.120.114.39
unknown
Bulgaria
malicious

Registry

Path
Value
Malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\F1A578C4CB5DE79A370893983FD4DA8B67B2B064
Blob
malicious

Memdumps

Base Address
Regiontype
Protect
Malicious
1DDD000
trusted library allocation
page read and write
malicious
1F91000
trusted library allocation
page read and write
malicious
519F000
trusted library allocation
page read and write
malicious
1E5B000
trusted library allocation
page read and write
malicious
2601000
trusted library allocation
page read and write
malicious
1E5B000
trusted library allocation
page read and write
malicious
1DD3000
trusted library allocation
page read and write
malicious
342000
remote allocation
page execute and read and write
malicious
1D91000
trusted library allocation
page read and write
malicious
1D91000
trusted library allocation
page read and write
malicious
1DD3000
trusted library allocation
page read and write
malicious
449B000
trusted library allocation
page read and write
malicious
1DDC000
trusted library allocation
page read and write
malicious
1F91000
trusted library allocation
page read and write
malicious
4418000
trusted library allocation
page read and write
malicious
1F02000
trusted library allocation
page read and write
malicious
1E5C000
trusted library allocation
page read and write
malicious
2430000
trusted library allocation
page read and write
2D60000
heap
page read and write
491F000
stack
page read and write
804000
unkown
page write copy
4456000
trusted library allocation
page read and write
7DB000
heap
page read and write
1A4B000
heap
page read and write
6260000
trusted library allocation
page execute and read and write
890000
trusted library allocation
page read and write
3E0000
heap
page read and write
1D4B000
heap
page read and write
1CEB000
heap
page read and write
2FDF000
heap
page read and write
18B0000
trusted library allocation
page read and write
1CE1000
heap
page read and write
1D91000
trusted library allocation
page read and write
2BCC000
stack
page read and write
18B0000
trusted library allocation
page read and write
1A4B000
heap
page read and write
1BBB000
heap
page read and write
4B20000
trusted library allocation
page read and write
1E10000
trusted library allocation
page read and write
1E29000
trusted library allocation
page read and write
27CC000
heap
page read and write
7F7000
heap
page read and write
2D50000
heap
page read and write
830000
heap
page read and write
4B3000
unkown
page read and write
1BD8000
heap
page read and write
1CD6000
heap
page read and write
8A6000
trusted library allocation
page execute and read and write
2431000
trusted library allocation
page read and write
835000
heap
page read and write
4161000
heap
page read and write
1A92000
heap
page read and write
26E000
unkown
page readonly
243A000
trusted library allocation
page read and write
4ABF000
heap
page read and write
19C7000
heap
page read and write
4AEE000
trusted library allocation
page read and write
1E7D000
trusted library allocation
page read and write
25F0000
heap
page execute and read and write
7D0000
unkown
page readonly
2147000
trusted library allocation
page read and write
1CA2000
heap
page read and write
C0C000
trusted library allocation
page read and write
408000
unkown
page readonly
27C4000
heap
page read and write
4161000
heap
page read and write
9FE000
heap
page read and write
1F91000
trusted library allocation
page read and write
60A0000
trusted library allocation
page execute and read and write
7E3000
heap
page read and write
2FED000
heap
page read and write
1B8E000
heap
page read and write
1EC3000
trusted library allocation
page read and write
7DB000
heap
page read and write
1BC8000
heap
page read and write
1A78000
heap
page read and write
1E1F000
trusted library allocation
page read and write
1AF1000
heap
page read and write
4161000
heap
page read and write
4161000
heap
page read and write
2435000
trusted library allocation
page read and write
2FC8000
heap
page read and write
A14000
heap
page read and write
4B12000
trusted library allocation
page read and write
800000
unkown
page read and write
7F0000
heap
page read and write
5FBB000
trusted library allocation
page read and write
1D91000
trusted library allocation
page read and write
4161000
heap
page read and write
1D91000
trusted library allocation
page read and write
1C8F000
heap
page read and write
300C000
heap
page read and write
7E3000
heap
page read and write
1D4B000
heap
page read and write
98000
stack
page read and write
1A52000
heap
page read and write
5E70000
trusted library allocation
page read and write
1F91000
trusted library allocation
page read and write
1C16000
heap
page read and write
1D91000
trusted library allocation
page read and write
8A0000
trusted library allocation
page read and write
1D91000
trusted library allocation
page read and write
1A5E000
heap
page read and write
53C000
stack
page read and write
449B000
trusted library allocation
page read and write
1DC4000
trusted library allocation
page read and write
242E000
trusted library allocation
page read and write
1D41000
heap
page read and write
BF0000
trusted library allocation
page read and write
1EA0000
trusted library allocation
page read and write
1A8D000
heap
page read and write
1F44000
trusted library allocation
page read and write
1F01000
trusted library allocation
page read and write
207F000
trusted library allocation
page read and write
88D000
trusted library allocation
page execute and read and write
1DEB000
trusted library allocation
page read and write
3170000
heap
page read and write
21F4000
trusted library allocation
page read and write
2390000
trusted library allocation
page read and write
1BE4000
heap
page read and write
2FE2000
heap
page read and write
1DF7000
trusted library allocation
page read and write
242E000
stack
page read and write
1D8E000
heap
page read and write
19A000
stack
page read and write
2F9E000
stack
page read and write
1CBC000
heap
page read and write
5E7B000
trusted library allocation
page read and write
1F85000
trusted library allocation
page read and write
510000
heap
page read and write
1F38000
trusted library allocation
page read and write
363F000
stack
page read and write
1990000
heap
page read and write
1D91000
trusted library allocation
page read and write
27C6000
heap
page read and write
1B82000
heap
page read and write
1DF2000
trusted library allocation
page read and write
1E5B000
trusted library allocation
page read and write
51D3000
trusted library allocation
page read and write
19C1000
heap
page read and write
1B86000
heap
page read and write
1C1F000
heap
page read and write
1D91000
trusted library allocation
page read and write
741000
unkown
page execute read
1900000
heap
page read and write
860000
heap
page read and write
840000
heap
page read and write
8B7000
trusted library allocation
page execute and read and write
1D8E000
heap
page read and write
740000
heap
page read and write
1CD9000
heap
page read and write
7DB000
heap
page read and write
8B0000
trusted library allocation
page read and write
4161000
heap
page read and write
1B6E000
heap
page read and write
1A9D000
heap
page read and write
4418000
trusted library allocation
page read and write
7E3000
heap
page read and write
4161000
heap
page read and write
2BBC000
stack
page read and write
6000000
trusted library allocation
page read and write
313E000
stack
page read and write
2CAC000
stack
page read and write
7CF000
heap
page read and write
3D39000
heap
page read and write
5CD8000
trusted library allocation
page read and write
7F6000
unkown
page readonly
1D7A000
heap
page read and write
1FD3000
trusted library allocation
page read and write
7F0000
heap
page read and write
1A78000
heap
page read and write
4161000
heap
page read and write
1A7E000
heap
page read and write
2E70000
heap
page read and write
4410000
trusted library allocation
page read and write
83D000
stack
page read and write
1B65000
heap
page read and write
2E3C000
stack
page read and write
4161000
heap
page read and write
2177000
trusted library allocation
page read and write
1D91000
trusted library allocation
page read and write
7DF000
heap
page read and write
19B6000
heap
page read and write
1D8E000
heap
page read and write
7DF000
heap
page read and write
1C81000
heap
page read and write
444E000
trusted library allocation
page read and write
489F000
stack
page read and write
7DF000
heap
page read and write
8B2000
trusted library allocation
page read and write
4161000
heap
page read and write
9F1000
heap
page read and write
BE0000
trusted library allocation
page read and write
2B7F000
stack
page read and write
7F0000
heap
page read and write
1C7E000
heap
page read and write
1FF9000
trusted library allocation
page read and write
1D2F000
heap
page read and write
1C99000
heap
page read and write
1D91000
trusted library allocation
page read and write
1CF4000
heap
page read and write
2FFB000
heap
page read and write
2FFB000
heap
page read and write
1A2E000
heap
page read and write
19C7000
heap
page read and write
400000
unkown
page readonly
4C23000
heap
page read and write
4E2E000
stack
page read and write
9D7000
heap
page read and write
1A85000
heap
page read and write
243D000
trusted library allocation
page read and write
30A000
stack
page read and write
2D48000
heap
page read and write
21BA000
trusted library allocation
page read and write
1BE0000
heap
page read and write
2FC0000
heap
page read and write
9F0000
heap
page read and write
2147000
trusted library allocation
page read and write
19FE000
heap
page read and write
6240000
trusted library allocation
page read and write
4161000
heap
page read and write
1AD9000
heap
page read and write
1B86000
heap
page read and write
2147000
trusted library allocation
page read and write
3600000
heap
page read and write
27C1000
heap
page read and write
955000
heap
page read and write
1A86000
heap
page read and write
1BF0000
heap
page read and write
3601000
trusted library allocation
page read and write
1C12000
heap
page read and write
1C17000
heap
page read and write
1AF4000
heap
page read and write
7DF000
heap
page read and write
A0B000
heap
page read and write
19F9000
heap
page read and write
4FC0000
heap
page read and write
4F2E000
stack
page read and write
6100000
trusted library allocation
page execute and read and write
8AA000
trusted library allocation
page execute and read and write
1CA2000
heap
page read and write
1E88000
trusted library allocation
page read and write
386000
remote allocation
page execute and read and write
360F000
trusted library allocation
page read and write
5D80000
trusted library allocation
page execute and read and write
1BEF000
heap
page read and write
2886000
heap
page read and write
600B000
trusted library allocation
page read and write
7E3000
heap
page read and write
6020000
trusted library allocation
page read and write
4418000
trusted library allocation
page read and write
1C7E000
heap
page read and write
4161000
heap
page read and write
4B70000
trusted library allocation
page read and write
884000
trusted library allocation
page read and write
449B000
trusted library allocation
page read and write
1D8E000
heap
page read and write
1C52000
heap
page read and write
9FC000
heap
page read and write
1A2E000
heap
page read and write
1F91000
trusted library allocation
page read and write
310F000
stack
page read and write
1B8E000
heap
page read and write
830000
heap
page read and write
17C0000
heap
page read and write
70E000
stack
page read and write
454E000
stack
page read and write
7F0000
heap
page read and write
7CC000
heap
page read and write
1F02000
trusted library allocation
page read and write
1F02000
trusted library allocation
page read and write
1ABA000
heap
page read and write
1B24000
heap
page read and write
1D91000
trusted library allocation
page read and write
5BCE000
stack
page read and write
1C55000
heap
page read and write
1F02000
trusted library allocation
page read and write
4F90000
heap
page read and write
1F91000
trusted library allocation
page read and write
1A7E000
heap
page read and write
4B60000
heap
page read and write
4DFE000
stack
page read and write
2350000
heap
page read and write
1E8E000
trusted library allocation
page read and write
232E000
stack
page read and write
7E3000
heap
page read and write
2394000
trusted library allocation
page read and write
2FDE000
heap
page read and write
4C20000
heap
page read and write
8A2000
trusted library allocation
page read and write
1D91000
trusted library allocation
page read and write
7F6F0000
trusted library allocation
page execute and read and write
1F63000
trusted library allocation
page read and write
19C3000
heap
page read and write
1C7E000
heap
page read and write
4449000
trusted library allocation
page read and write
1AC8000
heap
page read and write
239D000
trusted library allocation
page read and write
4AE6000
trusted library allocation
page read and write
79E000
heap
page read and write
5CCF000
stack
page read and write
57C000
stack
page read and write
6110000
trusted library allocation
page execute and read and write
866000
heap
page read and write
A1F000
heap
page read and write
1E10000
trusted library allocation
page read and write
1A64000
heap
page read and write
1D11000
heap
page read and write
9D0000
heap
page read and write
1CE1000
heap
page read and write
1F63000
trusted library allocation
page read and write
1B6E000
heap
page read and write
79A000
heap
page read and write
1D84000
heap
page read and write
1CF4000
heap
page read and write
7E3000
heap
page read and write
1AF4000
heap
page read and write
4452000
trusted library allocation
page read and write
4161000
heap
page read and write
2068000
trusted library allocation
page read and write
1D91000
trusted library allocation
page read and write
7DF000
heap
page read and write
1A25000
heap
page read and write
6010000
trusted library allocation
page read and write
1ADB000
heap
page read and write
4161000
heap
page read and write
1F91000
trusted library allocation
page read and write
97E000
stack
page read and write
17F0000
heap
page read and write
1F91000
trusted library allocation
page read and write
1C12000
heap
page read and write
17F4000
heap
page read and write
4F4000
unkown
page readonly
880000
trusted library allocation
page read and write
809000
unkown
page readonly
17BE000
stack
page read and write
2426000
trusted library allocation
page read and write
1C7E000
heap
page read and write
7D0000
unkown
page readonly
2177000
trusted library allocation
page read and write
2F50000
heap
page read and write
4EEF000
stack
page read and write
1BD7000
heap
page read and write
1D44000
heap
page read and write
928000
heap
page read and write
1C60000
heap
page read and write
1B90000
heap
page read and write
518F000
stack
page read and write
27BF000
stack
page read and write
5E75000
trusted library allocation
page read and write
4161000
heap
page read and write
1EDF000
trusted library allocation
page read and write
2D40000
heap
page read and write
1BD7000
heap
page read and write
1E10000
trusted library allocation
page read and write
1E3C000
trusted library allocation
page read and write
4B80000
trusted library allocation
page execute and read and write
1A0C000
heap
page read and write
7CF000
heap
page read and write
1CF4000
heap
page read and write
1A99000
heap
page read and write
258F000
stack
page read and write
19B6000
heap
page read and write
4161000
heap
page read and write
7DF000
heap
page read and write
580D000
stack
page read and write
1904000
heap
page read and write
1F02000
trusted library allocation
page read and write
1D88000
heap
page read and write
5EB0000
heap
page read and write
3178000
heap
page read and write
4F81000
heap
page read and write
5EF2000
heap
page read and write
7DB000
heap
page read and write
695000
heap
page read and write
19F3000
heap
page read and write
2064000
trusted library allocation
page read and write
1C22000
heap
page read and write
6005000
trusted library allocation
page read and write
2FFE000
heap
page read and write
1CEB000
heap
page read and write
1A20000
heap
page read and write
1A81000
heap
page read and write
19EC000
heap
page read and write
17F4000
heap
page read and write
1E5A000
trusted library allocation
page read and write
1F91000
trusted library allocation
page read and write
4161000
heap
page read and write
60B0000
trusted library allocation
page execute and read and write
27CF000
heap
page read and write
2430000
trusted library allocation
page read and write
2FFB000
heap
page read and write
479E000
stack
page read and write
4161000
heap
page read and write
1A9B000
heap
page read and write
1DC4000
trusted library allocation
page read and write
2440000
heap
page read and write
20D7000
trusted library allocation
page read and write
5CD0000
trusted library allocation
page read and write
1D8E000
heap
page read and write
1BBD000
heap
page read and write
7DB000
heap
page read and write
7F0000
heap
page read and write
1C12000
heap
page read and write
1BBB000
heap
page read and write
4F1E000
stack
page read and write
4161000
heap
page read and write
41F000
unkown
page read and write
4161000
heap
page read and write
1F38000
trusted library allocation
page read and write
BB0000
trusted library allocation
page execute and read and write
1B82000
heap
page read and write
8B5000
trusted library allocation
page execute and read and write
2146000
trusted library allocation
page read and write
1D79000
heap
page read and write
1D88000
heap
page read and write
1D8E000
heap
page read and write
4161000
heap
page read and write
2393000
trusted library allocation
page read and write
18B0000
trusted library allocation
page read and write
1D91000
trusted library allocation
page read and write
27CE000
heap
page read and write
1B05000
heap
page read and write
2429000
trusted library allocation
page read and write
962000
heap
page read and write
1A4D000
heap
page read and write
1800000
direct allocation
page execute and read and write
4920000
heap
page read and write
2397000
trusted library allocation
page read and write
1B93000
heap
page read and write
4B0D000
trusted library allocation
page read and write
18B0000
trusted library allocation
page read and write
4B2E000
trusted library allocation
page read and write
5E0000
heap
page read and write
7CF000
heap
page read and write
7DB000
heap
page read and write
2FFB000
heap
page read and write
2069000
trusted library allocation
page read and write
5FF0000
trusted library allocation
page read and write
4161000
heap
page read and write
20FA000
trusted library allocation
page read and write
314E000
stack
page read and write
1A37000
heap
page read and write
2CBC000
stack
page read and write
4418000
trusted library allocation
page read and write
1BE6000
heap
page read and write
4AFE000
trusted library allocation
page read and write
1B90000
heap
page read and write
A15000
heap
page read and write
4AE4000
trusted library allocation
page read and write
408000
unkown
page readonly
1AAF000
heap
page read and write
401000
unkown
page execute read
690000
heap
page read and write
4418000
trusted library allocation
page read and write
4161000
heap
page read and write
1F91000
trusted library allocation
page read and write
4161000
heap
page read and write
1D3A000
heap
page read and write
1C7E000
heap
page read and write
239C000
trusted library allocation
page read and write
19F9000
heap
page read and write
400000
unkown
page readonly
A10000
heap
page read and write
1D83000
heap
page read and write
1E1F000
trusted library allocation
page read and write
2D80000
heap
page read and write
19C3000
heap
page read and write
1A6D000
heap
page read and write
1D90000
trusted library allocation
page read and write
1D91000
trusted library allocation
page read and write
6040000
trusted library allocation
page read and write
7E3000
heap
page read and write
883000
trusted library allocation
page execute and read and write
25CE000
stack
page read and write
7F9000
heap
page read and write
161C000
stack
page read and write
1BBB000
heap
page read and write
461000
unkown
page read and write
1A4B000
heap
page read and write
4AE0000
trusted library allocation
page read and write
485E000
stack
page read and write
1C71000
heap
page read and write
1CD8000
heap
page read and write
A8F000
stack
page read and write
1D87000
heap
page read and write
9FF000
heap
page read and write
449B000
trusted library allocation
page read and write
4161000
heap
page read and write
740000
unkown
page readonly
1E41000
trusted library allocation
page read and write
4E10000
heap
page execute and read and write
1EC3000
trusted library allocation
page read and write
809000
unkown
page readonly
31C0000
heap
page read and write
19EA000
heap
page read and write
2CEC000
stack
page read and write
2399000
trusted library allocation
page read and write
1D6C000
heap
page read and write
1A51000
heap
page read and write
2FEC000
heap
page read and write
7F0000
heap
page read and write
2435000
trusted library allocation
page read and write
5180000
heap
page read and write
7CF000
heap
page read and write
2147000
trusted library allocation
page read and write
91E000
stack
page read and write
A0B000
heap
page read and write
1E9D000
trusted library allocation
page read and write
19EB000
heap
page read and write
1D23000
heap
page read and write
2733000
trusted library allocation
page read and write
2878000
heap
page read and write
1CE4000
heap
page read and write
5FDE000
trusted library allocation
page read and write
498E000
stack
page read and write
67E000
stack
page read and write
4161000
heap
page read and write
6030000
trusted library allocation
page read and write
317E000
stack
page read and write
1B86000
heap
page read and write
19EC000
heap
page read and write
19B7000
heap
page read and write
804000
heap
page read and write
4161000
heap
page read and write
3622000
trusted library allocation
page read and write
1BFC000
heap
page read and write
1B8F000
heap
page read and write
24CE000
trusted library allocation
page read and write
1AD1000
heap
page read and write
1AAD000
heap
page read and write
2DF0000
heap
page read and write
2422000
trusted library allocation
page read and write
232F000
stack
page read and write
740000
unkown
page readonly
1A23000
heap
page read and write
1A4B000
heap
page read and write
A1A000
heap
page read and write
1A0E000
heap
page read and write
1E34000
trusted library allocation
page read and write
7CF000
heap
page read and write
1E10000
trusted library allocation
page read and write
1F91000
trusted library allocation
page read and write
790000
heap
page read and write
19C5000
heap
page read and write
2069000
trusted library allocation
page read and write
1E18000
trusted library allocation
page read and write
2080000
trusted library allocation
page read and write
1A6F000
heap
page read and write
1880000
heap
page read and write
7DB000
heap
page read and write
1DDE000
trusted library allocation
page read and write
2370000
heap
page read and write
5FC1000
trusted library allocation
page read and write
C00000
trusted library allocation
page read and write
1E2D000
trusted library allocation
page read and write
51DE000
stack
page read and write
4D8F000
stack
page read and write
4161000
heap
page read and write
9F0000
heap
page read and write
24DF000
trusted library allocation
page read and write
1E46000
trusted library allocation
page read and write
25D0000
trusted library allocation
page read and write
1A40000
heap
page read and write
4F4000
unkown
page readonly
5E89000
trusted library allocation
page read and write
30FE000
stack
page read and write
1E9D000
trusted library allocation
page read and write
804000
heap
page read and write
1B82000
heap
page read and write
3D0000
heap
page read and write
1F91000
trusted library allocation
page read and write
5CF0000
trusted library allocation
page read and write
4161000
heap
page read and write
1BEF000
heap
page read and write
481F000
stack
page read and write
1F91000
trusted library allocation
page read and write
1E47000
trusted library allocation
page read and write
262000
unkown
page readonly
63E000
stack
page read and write
1A99000
heap
page read and write
19BB000
heap
page read and write
7DF000
heap
page read and write
4161000
heap
page read and write
1B90000
heap
page read and write
48DE000
stack
page read and write
2354000
heap
page read and write
5FEA000
trusted library allocation
page read and write
1D8E000
heap
page read and write
1E2D000
trusted library allocation
page read and write
1D91000
trusted library allocation
page read and write
2393000
trusted library allocation
page read and write
78E000
stack
page read and write
19C2000
heap
page read and write
27C3000
heap
page read and write
4161000
heap
page read and write
18B0000
trusted library allocation
page read and write
1E2F000
trusted library allocation
page read and write
7CF000
heap
page read and write
30F0000
heap
page read and write
A0B000
heap
page read and write
1EC3000
trusted library allocation
page read and write
2430000
trusted library allocation
page read and write
4E6F000
stack
page read and write
1A44000
heap
page read and write
4161000
heap
page read and write
18B0000
heap
page read and write
1CF9000
heap
page read and write
1BBB000
heap
page read and write
494F000
stack
page read and write
442B000
trusted library allocation
page read and write
1F63000
trusted library allocation
page read and write
6270000
trusted library allocation
page read and write
1B9B000
heap
page read and write
A1D000
heap
page read and write
4161000
heap
page read and write
1F38000
trusted library allocation
page read and write
1F38000
trusted library allocation
page read and write
6230000
trusted library allocation
page read and write
1D02000
heap
page read and write
160E000
stack
page read and write
BC0000
trusted library allocation
page read and write
1B45000
heap
page read and write
1D91000
trusted library allocation
page read and write
1BCC000
heap
page read and write
242D000
trusted library allocation
page read and write
1F63000
trusted library allocation
page read and write
19EE000
heap
page read and write
2FA0000
heap
page read and write
1E34000
trusted library allocation
page read and write
741000
unkown
page execute read
1D8E000
heap
page read and write
7F6000
unkown
page readonly
2080000
trusted library allocation
page read and write
4161000
heap
page read and write
243B000
trusted library allocation
page read and write
1E44000
trusted library allocation
page read and write
2FFD000
heap
page read and write
516F000
stack
page read and write
1A32000
heap
page read and write
1E5B000
trusted library allocation
page read and write
1CD6000
heap
page read and write
6F7000
stack
page read and write
1EA6000
trusted library allocation
page read and write
19EC000
heap
page read and write
1F90000
trusted library allocation
page read and write
2A7E000
stack
page read and write
6090000
trusted library allocation
page read and write
2230000
trusted library allocation
page read and write
4161000
heap
page read and write
1239000
stack
page read and write
1E40000
trusted library allocation
page read and write
1CE2000
heap
page read and write
1E1F000
trusted library allocation
page read and write
1FC4000
trusted library allocation
page read and write
51E2000
trusted library allocation
page read and write
1890000
heap
page read and write
27C4000
heap
page read and write
1E33000
trusted library allocation
page read and write
239A000
trusted library allocation
page read and write
1E91000
trusted library allocation
page read and write
1CB3000
heap
page read and write
7DB000
heap
page read and write
7F0000
heap
page read and write
4459000
trusted library allocation
page read and write
1D4D000
heap
page read and write
15FF000
stack
page read and write
1EC3000
trusted library allocation
page read and write
7DF000
heap
page read and write
A1F000
heap
page read and write
1E1F000
trusted library allocation
page read and write
19B5000
heap
page read and write
1D91000
trusted library allocation
page read and write
340000
remote allocation
page execute and read and write
1A22000
heap
page read and write
1D83000
heap
page read and write
5E78000
trusted library allocation
page read and write
27C1000
heap
page read and write
1F35000
trusted library allocation
page read and write
1D5A000
heap
page read and write
1BC8000
heap
page read and write
4F6F000
stack
page read and write
1AD9000
heap
page read and write
4161000
heap
page read and write
1D91000
trusted library allocation
page read and write
1E34000
trusted library allocation
page read and write
7F6000
heap
page read and write
A1F000
heap
page read and write
2428000
trusted library allocation
page read and write
C10000
heap
page read and write
1EA3000
trusted library allocation
page read and write
A0B000
heap
page read and write
1A55000
heap
page read and write
2439000
trusted library allocation
page read and write
4161000
heap
page read and write
7F9000
heap
page read and write
920000
heap
page read and write
5F25000
heap
page read and write
7CF000
heap
page read and write
2DCE000
stack
page read and write
19EA000
heap
page read and write
300C000
heap
page read and write
4418000
trusted library allocation
page read and write
1D89000
heap
page read and write
8BB000
trusted library allocation
page execute and read and write
1C5E000
heap
page read and write
9F4000
heap
page read and write
18B0000
trusted library allocation
page read and write
1C30000
heap
page read and write
2FDE000
heap
page read and write
4F60000
heap
page read and write
7F6000
heap
page read and write
2003000
trusted library allocation
page read and write
2007000
trusted library allocation
page read and write
2375000
heap
page read and write
4161000
heap
page read and write
300C000
heap
page read and write
1A0C000
heap
page read and write
2176000
trusted library allocation
page read and write
1A7B000
heap
page read and write
4950000
heap
page read and write
1D58000
heap
page read and write
260000
unkown
page readonly
1B8E000
heap
page read and write
19F6000
heap
page read and write
98F000
stack
page read and write
1D31000
heap
page read and write
5E87000
trusted library allocation
page read and write
7F0000
heap
page read and write
2391000
trusted library allocation
page read and write
7DF000
heap
page read and write
1AA7000
heap
page read and write
5F0000
heap
page read and write
1A99000
heap
page read and write
1E3C000
trusted library allocation
page read and write
1BEF000
heap
page read and write
1A4B000
heap
page read and write
2080000
trusted library allocation
page read and write
1D6C000
heap
page read and write
6050000
trusted library allocation
page read and write
7F0000
heap
page read and write
1A30000
heap
page read and write
31C7000
heap
page read and write
1DE8000
trusted library allocation
page read and write
1AAD000
heap
page read and write
BD4000
heap
page read and write
248E000
stack
page read and write
9BE000
stack
page read and write
1DF5000
trusted library allocation
page read and write
1C96000
heap
page read and write
4EAE000
stack
page read and write
4160000
heap
page read and write
4B06000
trusted library allocation
page read and write
2FF9000
heap
page read and write
57CE000
stack
page read and write
4AEB000
trusted library allocation
page read and write
5FB0000
trusted library allocation
page read and write
4161000
heap
page read and write
19F4000
heap
page read and write
1B91000
heap
page read and write
4B01000
trusted library allocation
page read and write
1D0D000
heap
page read and write
7E3000
heap
page read and write
1A6D000
heap
page read and write
1FFC000
trusted library allocation
page read and write
1E2E000
trusted library allocation
page read and write
1E5B000
trusted library allocation
page read and write
5FD2000
trusted library allocation
page read and write
800000
unkown
page write copy
4161000
heap
page read and write
40B000
unkown
page write copy
505000
unkown
page readonly
2391000
trusted library allocation
page read and write
5FC6000
trusted library allocation
page read and write
7CF000
heap
page read and write
893000
trusted library allocation
page read and write
300D000
heap
page read and write
5F0000
heap
page read and write
1998000
heap
page read and write
1E47000
trusted library allocation
page read and write
7DB000
heap
page read and write
7F6000
heap
page read and write
7DF000
heap
page read and write
5ACF000
stack
page read and write
7F0000
heap
page read and write
5FE1000
trusted library allocation
page read and write
1E8E000
trusted library allocation
page read and write
1A7E000
heap
page read and write
1F63000
trusted library allocation
page read and write
1CED000
heap
page read and write
239C000
trusted library allocation
page read and write
870000
trusted library allocation
page read and write
19B2000
heap
page read and write
4161000
heap
page read and write
7E3000
heap
page read and write
6080000
trusted library allocation
page read and write
5CE0000
trusted library allocation
page read and write
4161000
heap
page read and write
24BC000
trusted library allocation
page read and write
372000
remote allocation
page execute and read and write
2396000
trusted library allocation
page read and write
5E80000
trusted library allocation
page read and write
16A0000
heap
page read and write
2425000
trusted library allocation
page read and write
4161000
heap
page read and write
4B72000
trusted library allocation
page read and write
BD0000
heap
page read and write
1DE1000
trusted library allocation
page read and write
1EC3000
trusted library allocation
page read and write
1AB1000
heap
page read and write
1A4C000
heap
page read and write
377000
remote allocation
page execute and read and write
6B0000
heap
page read and write
505000
unkown
page readonly
1A17000
heap
page read and write
4AF2000
trusted library allocation
page read and write
89D000
trusted library allocation
page execute and read and write
1D86000
heap
page read and write
5DA0000
trusted library allocation
page execute and read and write
1BB3000
heap
page read and write
1F85000
trusted library allocation
page read and write
4F5E000
stack
page read and write
163C000
stack
page read and write
1D06000
heap
page read and write
4161000
heap
page read and write
600E000
trusted library allocation
page read and write
A1F000
heap
page read and write
401000
unkown
page execute read
B0E000
stack
page read and write
1F02000
trusted library allocation
page read and write
1D02000
heap
page read and write
81E000
stack
page read and write
449A000
trusted library allocation
page read and write
2D3E000
stack
page read and write
1BD7000
heap
page read and write
C08000
trusted library allocation
page read and write
1E8C000
trusted library allocation
page read and write
1D51000
heap
page read and write
4161000
heap
page read and write
1E9A000
trusted library allocation
page read and write
4161000
heap
page read and write
5E85000
trusted library allocation
page read and write
4161000
heap
page read and write
1D8E000
heap
page read and write
1C14000
heap
page read and write
1B6E000
heap
page read and write
9E7000
heap
page read and write
1D2E000
heap
page read and write
7E3000
heap
page read and write
40B000
unkown
page read and write
6250000
trusted library allocation
page read and write
2F56000
heap
page read and write
239C000
trusted library allocation
page read and write
441C000
trusted library allocation
page read and write
There are 844 hidden memdumps, click here to show them.