IOC Report
come.exe

loading gif

Files

File Path
Type
Category
Malicious
come.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Local\meshuggenah\subpredicate.exe
PE32 executable (GUI) Intel 80386, for MS Windows
modified
malicious
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\subpredicate.vbs
data
modified
malicious
C:\Users\user\AppData\Local\Temp\Laddonia
data
modified

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\come.exe
"C:\Users\user\Desktop\come.exe"
malicious
C:\Users\user\AppData\Local\meshuggenah\subpredicate.exe
"C:\Users\user\Desktop\come.exe"
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
"C:\Users\user\Desktop\come.exe"
malicious
C:\Windows\System32\wscript.exe
"C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\subpredicate.vbs"
malicious
C:\Users\user\AppData\Local\meshuggenah\subpredicate.exe
"C:\Users\user\AppData\Local\meshuggenah\subpredicate.exe"
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
"C:\Users\user\AppData\Local\meshuggenah\subpredicate.exe"
malicious
C:\Users\user\AppData\Local\meshuggenah\subpredicate.exe
"C:\Users\user\AppData\Local\meshuggenah\subpredicate.exe"
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
"C:\Users\user\AppData\Local\meshuggenah\subpredicate.exe"
malicious

URLs

Name
IP
Malicious
https://api.telegram.org
unknown
malicious
https://api.telegram.org/bot
unknown
malicious
https://reallyfreegeoip.org/xml/155.94.241.188l
unknown
http://checkip.dyndns.org/
132.226.8.169
http://checkip.dyndns.org/q
unknown
http://reallyfreegeoip.org
unknown
https://reallyfreegeoip.org
unknown
http://checkip.dyndns.org
unknown
http://checkip.dyndns.com
unknown
http://api.telegram.org
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
https://api.telegram.org/bot-/sendDocument?chat_id=
unknown
https://reallyfreegeoip.org/xml/155.94.241.188
188.114.97.3
https://reallyfreegeoip.org/xml/
unknown
There are 4 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
reallyfreegeoip.org
188.114.97.3
malicious
api.telegram.org
149.154.167.220
malicious
checkip.dyndns.org
unknown
malicious
198.187.3.20.in-addr.arpa
unknown
malicious
checkip.dyndns.com
132.226.8.169

IPs

IP
Domain
Country
Malicious
149.154.167.220
api.telegram.org
United Kingdom
malicious
188.114.97.3
reallyfreegeoip.org
European Union
malicious
132.226.8.169
checkip.dyndns.com
United States

Registry

Path
Value
Malicious
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASAPI32
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASAPI32
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASAPI32
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASAPI32
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASAPI32
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASAPI32
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASAPI32
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASMANCS
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASMANCS
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASMANCS
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASMANCS
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASMANCS
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASMANCS
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASMANCS
FileDirectory
There are 5 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
2E41000
trusted library allocation
page read and write
malicious
26C1000
heap
page read and write
malicious
3941000
trusted library allocation
page read and write
malicious
2B01000
trusted library allocation
page read and write
malicious
50E0000
trusted library section
page read and write
malicious
27C0000
trusted library section
page read and write
malicious
2F25000
heap
page read and write
4F24000
trusted library allocation
page read and write
6500000
heap
page read and write
4AB000
unkown
page readonly
1ADF000
stack
page read and write
2960000
trusted library allocation
page read and write
561E000
stack
page read and write
4663000
direct allocation
page read and write
A81000
heap
page read and write
2A87000
trusted library allocation
page read and write
7FFB1E3A0000
unkown
page readonly
3A6F000
stack
page read and write
6420000
trusted library allocation
page execute and read and write
30E0000
heap
page read and write
5EFB000
trusted library allocation
page read and write
5050000
trusted library allocation
page read and write
46C9000
direct allocation
page read and write
4F70000
trusted library allocation
page execute and read and write
6CA000
stack
page read and write
50C4000
trusted library allocation
page read and write
3E31000
heap
page read and write
3CB5000
heap
page read and write
5220000
trusted library allocation
page read and write
2D88000
trusted library allocation
page read and write
5322000
heap
page read and write
2DA5000
trusted library allocation
page read and write
5EF2000
trusted library allocation
page read and write
4593000
direct allocation
page read and write
B70000
heap
page read and write
510C000
heap
page read and write
60ED000
stack
page read and write
3EF35FF000
stack
page read and write
45A0000
direct allocation
page read and write
3D89000
heap
page read and write
5E7E000
stack
page read and write
480D000
direct allocation
page read and write
5F00000
trusted library allocation
page execute and read and write
2E31000
trusted library allocation
page read and write
60F0000
trusted library allocation
page read and write
2CC4000
trusted library allocation
page read and write
2E10000
heap
page read and write
426000
system
page execute and read and write
1E0000
heap
page read and write
26B0000
trusted library allocation
page read and write
64D0000
trusted library allocation
page execute and read and write
382E000
stack
page read and write
89F000
stack
page read and write
54FE000
stack
page read and write
C31000
heap
page read and write
9A000
stack
page read and write
2B82000
trusted library allocation
page read and write
2BBF000
trusted library allocation
page read and write
3D8F000
heap
page read and write
2CD0000
trusted library allocation
page read and write
30E5000
heap
page read and write
74F00000
unkown
page readonly
2D57000
trusted library allocation
page read and write
2CCE000
trusted library allocation
page read and write
168F000
stack
page read and write
3C01000
heap
page read and write
15B62010000
heap
page read and write
2EE0000
direct allocation
page read and write
910000
heap
page read and write
128F000
stack
page read and write
2670000
heap
page read and write
2E27000
trusted library allocation
page read and write
46E0000
direct allocation
page read and write
6A9F000
stack
page read and write
3CAF000
heap
page read and write
26DB000
trusted library allocation
page execute and read and write
2552000
trusted library allocation
page read and write
A3A000
heap
page read and write
5FBE000
stack
page read and write
3D37000
heap
page read and write
3EC1000
heap
page read and write
3ABF000
stack
page read and write
B23000
trusted library allocation
page execute and read and write
3EE0000
heap
page read and write
25C0000
trusted library allocation
page execute and read and write
15B6099E000
heap
page read and write
BA3000
heap
page read and write
5140000
trusted library allocation
page execute and read and write
3D29000
heap
page read and write
74EF3000
unkown
page execute read
AA0000
trusted library allocation
page read and write
45A0000
direct allocation
page read and write
473E000
direct allocation
page read and write
26B2000
trusted library allocation
page read and write
480D000
direct allocation
page read and write
9E4000
heap
page read and write
4809000
direct allocation
page read and write
436000
system
page execute and read and write
4470000
direct allocation
page read and write
3EC1000
heap
page read and write
443F000
heap
page read and write
46CD000
direct allocation
page read and write
B33000
trusted library allocation
page read and write
2C94000
trusted library allocation
page read and write
2967000
trusted library allocation
page read and write
46E0000
direct allocation
page read and write
2A69000
trusted library allocation
page read and write
2DEE000
trusted library allocation
page read and write
45E4000
direct allocation
page read and write
8F7000
stack
page read and write
970000
heap
page read and write
2D4C000
trusted library allocation
page read and write
A98000
heap
page read and write
A3E000
heap
page read and write
4663000
direct allocation
page read and write
2963000
trusted library allocation
page read and write
124E000
stack
page read and write
366E000
stack
page read and write
5BEE000
stack
page read and write
2AA5000
trusted library allocation
page read and write
400000
system
page execute and read and write
2CA3000
trusted library allocation
page read and write
2958000
trusted library allocation
page read and write
4739000
direct allocation
page read and write
1F5000
heap
page read and write
3BB0000
heap
page read and write
2A8B000
trusted library allocation
page read and write
4470000
direct allocation
page read and write
3BB0000
direct allocation
page read and write
39BE000
trusted library allocation
page read and write
A57000
heap
page read and write
3AC1000
heap
page read and write
4F1F000
stack
page read and write
BC4000
heap
page read and write
3F88000
heap
page read and write
94D000
heap
page read and write
2E2D000
trusted library allocation
page read and write
473E000
direct allocation
page read and write
46CD000
direct allocation
page read and write
2660000
trusted library allocation
page read and write
482000
unkown
page readonly
2D4F000
trusted library allocation
page read and write
482000
unkown
page readonly
26C0000
heap
page read and write
74EE1000
unkown
page execute read
27F0000
heap
page read and write
C25000
heap
page read and write
5059000
trusted library allocation
page read and write
438D000
heap
page read and write
2A48000
trusted library allocation
page read and write
487E000
direct allocation
page read and write
42B5000
heap
page read and write
93E000
stack
page read and write
B40000
heap
page read and write
9DE000
heap
page read and write
2A90000
heap
page execute and read and write
3F80000
heap
page read and write
401000
unkown
page execute read
AC1000
heap
page read and write
122E000
stack
page read and write
39CA000
trusted library allocation
page read and write
2D21000
trusted library allocation
page read and write
8AF000
stack
page read and write
15B605C0000
heap
page read and write
3C30000
heap
page read and write
3E5A000
heap
page read and write
46E0000
direct allocation
page read and write
4610000
direct allocation
page read and write
2E39000
trusted library allocation
page read and write
641E000
stack
page read and write
2C56000
trusted library allocation
page read and write
A50000
heap
page read and write
26D5000
trusted library allocation
page execute and read and write
2EC5000
trusted library allocation
page read and write
4F52000
trusted library allocation
page read and write
E0E000
stack
page read and write
AE0000
trusted library section
page read and write
47AE000
direct allocation
page read and write
2829000
heap
page read and write
3E0D000
heap
page read and write
2A8E000
stack
page read and write
B00000
heap
page read and write
3DA8000
heap
page read and write
5040000
trusted library allocation
page read and write
2690000
heap
page read and write
2A14000
trusted library allocation
page read and write
401000
unkown
page execute read
2810000
heap
page read and write
89F000
stack
page read and write
52E0000
heap
page read and write
46C9000
direct allocation
page read and write
670E000
stack
page read and write
9C0000
heap
page read and write
B2D000
trusted library allocation
page execute and read and write
A45000
heap
page read and write
2AC4000
trusted library allocation
page read and write
7FFB1E3B6000
unkown
page readonly
2A5D000
trusted library allocation
page read and write
5F7F000
stack
page read and write
4A7000
unkown
page read and write
3F83000
heap
page execute and read and write
5F1D000
trusted library allocation
page read and write
C0F000
heap
page read and write
66A0000
heap
page read and write
950000
heap
page read and write
2CDB000
trusted library allocation
page read and write
15B60990000
heap
page read and write
4809000
direct allocation
page read and write
1E0000
heap
page read and write
3EAF000
heap
page read and write
2A0F000
trusted library allocation
page read and write
46C9000
direct allocation
page read and write
2994000
trusted library allocation
page read and write
3F81000
heap
page read and write
3DC2000
heap
page read and write
A50000
heap
page read and write
1650000
heap
page read and write
401000
unkown
page execute read
3C27000
heap
page read and write
A40000
heap
page read and write
2954000
trusted library allocation
page read and write
2CA0000
trusted library allocation
page read and write
15B60654000
heap
page read and write
4A7000
unkown
page read and write
3D77000
heap
page read and write
2C9C000
trusted library allocation
page read and write
8AF000
stack
page read and write
5CEE000
stack
page read and write
8AF000
stack
page read and write
B05000
heap
page read and write
667E000
stack
page read and write
3EF34FE000
stack
page read and write
15B60995000
heap
page read and write
2AAE000
trusted library allocation
page read and write
4593000
direct allocation
page read and write
4A7000
unkown
page read and write
400000
unkown
page readonly
4523000
direct allocation
page read and write
2790000
trusted library allocation
page read and write
2533000
trusted library allocation
page read and write
3F91000
heap
page read and write
46C9000
direct allocation
page read and write
3D0C000
trusted library allocation
page read and write
AA4000
trusted library allocation
page read and write
C07000
heap
page read and write
4739000
direct allocation
page read and write
2C8C000
trusted library allocation
page read and write
2C87000
trusted library allocation
page read and write
5FB0000
heap
page read and write
4F2B000
trusted library allocation
page read and write
487E000
direct allocation
page read and write
970000
heap
page read and write
900000
trusted library section
page read and write
295E000
trusted library allocation
page read and write
2C92000
trusted library allocation
page read and write
26B6000
trusted library allocation
page execute and read and write
2780000
trusted library allocation
page execute and read and write
2A0C000
trusted library allocation
page read and write
3C46000
heap
page read and write
3D6C000
heap
page read and write
1840000
heap
page read and write
A80000
heap
page read and write
AA3000
trusted library allocation
page execute and read and write
400000
unkown
page readonly
400000
unkown
page readonly
46CD000
direct allocation
page read and write
940000
heap
page read and write
3CB2000
heap
page read and write
295A000
trusted library allocation
page read and write
4367000
heap
page read and write
4663000
direct allocation
page read and write
2570000
trusted library allocation
page read and write
2E11000
trusted library allocation
page read and write
543E000
stack
page read and write
1651000
heap
page read and write
2CD7000
trusted library allocation
page read and write
A90000
heap
page read and write
A00000
heap
page read and write
1790000
heap
page read and write
3EB1000
heap
page read and write
47AE000
direct allocation
page read and write
2557000
trusted library allocation
page execute and read and write
2546000
trusted library allocation
page execute and read and write
8FE000
stack
page read and write
2F70000
heap
page read and write
110000
heap
page read and write
74EF4000
unkown
page execute read
3EF3DFB000
stack
page read and write
6100000
trusted library allocation
page read and write
5F50000
trusted library allocation
page read and write
3080000
heap
page read and write
2555000
trusted library allocation
page execute and read and write
60D0000
trusted library allocation
page read and write
137D000
heap
page read and write
4540000
direct allocation
page read and write
9D6000
heap
page read and write
3D7F000
stack
page read and write
4F3A000
trusted library allocation
page read and write
A58000
heap
page read and write
2930000
heap
page execute and read and write
2D9D000
trusted library allocation
page read and write
4400000
direct allocation
page read and write
2CDF000
trusted library allocation
page read and write
50BF000
stack
page read and write
3D80000
heap
page read and write
3F81000
heap
page read and write
2610000
heap
page read and write
45A0000
direct allocation
page read and write
4663000
direct allocation
page read and write
4523000
direct allocation
page read and write
4AB000
unkown
page readonly
46C9000
direct allocation
page read and write
3E07000
heap
page read and write
2D6C000
trusted library allocation
page read and write
2CCC000
trusted library allocation
page read and write
2E35000
trusted library allocation
page read and write
2CC6000
trusted library allocation
page read and write
490000
unkown
page read and write
401000
unkown
page execute read
5142000
heap
page read and write
1780000
heap
page read and write
46E0000
direct allocation
page read and write
4AB000
unkown
page readonly
571F000
stack
page read and write
473E000
direct allocation
page read and write
A4E000
stack
page read and write
4400000
direct allocation
page read and write
482000
unkown
page readonly
A6E000
stack
page read and write
93E000
stack
page read and write
3D42000
trusted library allocation
page read and write
3E40000
heap
page read and write
2540000
trusted library allocation
page read and write
3F88000
heap
page read and write
136F000
stack
page read and write
2A61000
trusted library allocation
page read and write
265E000
stack
page read and write
A2E000
stack
page read and write
60E0000
trusted library allocation
page execute and read and write
402000
system
page execute and read and write
B30000
trusted library allocation
page read and write
4809000
direct allocation
page read and write
3DA3000
heap
page read and write
2E16000
trusted library allocation
page read and write
918000
heap
page read and write
4F80000
heap
page execute and read and write
984000
heap
page read and write
574D000
trusted library allocation
page read and write
3CBC000
heap
page read and write
2C51000
trusted library allocation
page read and write
45A0000
direct allocation
page read and write
2C20000
trusted library allocation
page read and write
2CE9000
trusted library allocation
page read and write
2C9E000
trusted library allocation
page read and write
2E0E000
stack
page read and write
2947000
trusted library allocation
page read and write
2A9B000
trusted library allocation
page read and write
2C4E000
trusted library allocation
page read and write
2C98000
trusted library allocation
page read and write
9A000
stack
page read and write
93E000
stack
page read and write
4AB000
unkown
page readonly
66F0000
heap
page read and write
490000
unkown
page read and write
2542000
trusted library allocation
page read and write
5EEE000
stack
page read and write
2D5D000
trusted library allocation
page read and write
4AB000
unkown
page readonly
2C1E000
stack
page read and write
4F2E000
trusted library allocation
page read and write
100000
heap
page read and write
9EE000
stack
page read and write
3D33000
heap
page read and write
3E17000
heap
page read and write
5726000
trusted library allocation
page read and write
3EB8000
heap
page read and write
26D0000
trusted library allocation
page read and write
5F30000
trusted library allocation
page read and write
3D6E000
heap
page read and write
50C6000
trusted library allocation
page read and write
2F4D000
heap
page read and write
4663000
direct allocation
page read and write
50C0000
trusted library allocation
page read and write
400000
unkown
page readonly
B10000
trusted library allocation
page read and write
3DA6000
heap
page read and write
2F20000
heap
page read and write
A7E000
stack
page read and write
AAD000
trusted library allocation
page execute and read and write
4540000
direct allocation
page read and write
2F30000
heap
page read and write
9E0000
heap
page read and write
400000
unkown
page readonly
5EF6000
trusted library allocation
page read and write
2DF1000
trusted library allocation
page read and write
4663000
direct allocation
page read and write
2D54000
trusted library allocation
page read and write
45A0000
direct allocation
page read and write
3D00000
heap
page read and write
3D8B000
heap
page read and write
2800000
heap
page read and write
3F81000
heap
page read and write
46CD000
direct allocation
page read and write
2990000
trusted library allocation
page read and write
A25000
heap
page read and write
25D0000
heap
page read and write
298C000
trusted library allocation
page read and write
42FA000
heap
page read and write
46E0000
direct allocation
page read and write
3EB4000
heap
page read and write
53A7000
heap
page read and write
2941000
trusted library allocation
page read and write
2550000
trusted library allocation
page read and write
2DA9000
trusted library allocation
page read and write
4AB000
unkown
page readonly
3A3F000
trusted library allocation
page read and write
2956000
trusted library allocation
page read and write
400000
unkown
page readonly
297B000
trusted library allocation
page read and write
3F81000
heap
page read and write
27C0000
heap
page read and write
523C000
trusted library allocation
page read and write
AB0000
heap
page read and write
2D92000
trusted library allocation
page read and write
3F84000
heap
page read and write
A6B000
heap
page read and write
2AC6000
trusted library allocation
page read and write
100000
heap
page read and write
3C00000
heap
page read and write
3EF38FF000
stack
page read and write
9A000
stack
page read and write
401000
unkown
page execute read
89F000
stack
page read and write
482000
unkown
page readonly
3E05000
heap
page read and write
9DE000
stack
page read and write
2979000
trusted library allocation
page read and write
3CBA000
heap
page read and write
2CD2000
trusted library allocation
page read and write
294C000
trusted library allocation
page read and write
3CB0000
heap
page read and write
401000
system
page execute and read and write
30F7000
heap
page read and write
2983000
heap
page read and write
4400000
direct allocation
page read and write
74EF6000
unkown
page readonly
5130000
trusted library allocation
page read and write
4F20000
trusted library allocation
page read and write
1470000
heap
page read and write
3CD6000
trusted library allocation
page read and write
4AB000
unkown
page readonly
B7D000
heap
page read and write
3D5B000
heap
page read and write
15B60652000
heap
page read and write
5153000
heap
page read and write
2999000
trusted library allocation
page read and write
3DDD000
heap
page read and write
3EF3AFD000
stack
page read and write
295C000
trusted library allocation
page read and write
490000
unkown
page write copy
3BB1000
heap
page read and write
490000
unkown
page write copy
553E000
stack
page read and write
64CF000
stack
page read and write
3E31000
heap
page read and write
36BE000
stack
page read and write
2BC3000
trusted library allocation
page read and write
473E000
direct allocation
page read and write
2CB9000
trusted library allocation
page read and write
4F32000
trusted library allocation
page read and write
2996000
trusted library allocation
page read and write
14D0000
heap
page read and write
487E000
direct allocation
page read and write
2986000
trusted library allocation
page read and write
89F000
stack
page read and write
3F91000
heap
page read and write
648E000
stack
page read and write
3CD4000
heap
page read and write
15B605F6000
heap
page read and write
4F46000
trusted library allocation
page read and write
2A52000
trusted library allocation
page read and write
3DDD000
heap
page read and write
74EF7000
unkown
page readonly
A30000
heap
page read and write
1F0000
heap
page read and write
2AA9000
trusted library allocation
page read and write
2C5D000
trusted library allocation
page read and write
26D2000
trusted library allocation
page read and write
7FFB1E3C5000
unkown
page readonly
2A2C000
trusted library allocation
page read and write
482000
unkown
page readonly
9A4000
heap
page read and write
3C78000
heap
page read and write
5393000
heap
page read and write
A04000
heap
page read and write
4809000
direct allocation
page read and write
B24000
trusted library allocation
page read and write
2C70000
heap
page read and write
3EAA000
heap
page read and write
612E000
stack
page read and write
547D000
stack
page read and write
2977000
trusted library allocation
page read and write
400000
unkown
page readonly
74EFD000
unkown
page read and write
2A1D000
trusted library allocation
page read and write
7FFB1E3A1000
unkown
page execute read
3E33000
heap
page execute and read and write
2AD0000
trusted library allocation
page read and write
626E000
stack
page read and write
3E41000
heap
page read and write
3D31000
heap
page read and write
397E000
stack
page read and write
5F10000
trusted library allocation
page read and write
9A000
stack
page read and write
46CD000
direct allocation
page read and write
25BE000
stack
page read and write
46CD000
direct allocation
page read and write
15B60624000
heap
page read and write
3081000
heap
page read and write
2ACA000
trusted library allocation
page read and write
4540000
direct allocation
page read and write
4400000
direct allocation
page read and write
4523000
direct allocation
page read and write
C21000
heap
page read and write
7FFB1E3C2000
unkown
page readonly
3C9F000
heap
page read and write
473E000
direct allocation
page read and write
505C000
trusted library allocation
page read and write
51CD000
heap
page read and write
2950000
heap
page read and write
3E29000
heap
page read and write
2973000
trusted library allocation
page read and write
52A000
stack
page read and write
5100000
heap
page read and write
3D22000
heap
page read and write
3230000
heap
page read and write
980000
heap
page read and write
3EF37FE000
stack
page read and write
400000
unkown
page readonly
4F4D000
trusted library allocation
page read and write
9F1000
heap
page read and write
A30000
heap
page read and write
16E6000
heap
page read and write
4446000
heap
page read and write
656E000
stack
page read and write
5F20000
trusted library allocation
page execute and read and write
2A2A000
trusted library allocation
page read and write
9A0000
heap
page read and write
4400000
direct allocation
page read and write
A70000
heap
page read and write
3D5B000
heap
page read and write
2E1D000
trusted library allocation
page read and write
3F91000
heap
page read and write
3CB7000
heap
page read and write
950000
heap
page read and write
B7E000
heap
page read and write
2CB5000
trusted library allocation
page read and write
3A02000
trusted library allocation
page read and write
3FA2000
heap
page read and write
3EF3BFE000
stack
page read and write
2F07000
trusted library allocation
page read and write
2F34000
heap
page read and write
3C77000
heap
page read and write
C27000
heap
page read and write
3D85000
heap
page read and write
105000
heap
page read and write
3D30000
heap
page read and write
2C9A000
trusted library allocation
page read and write
298E000
trusted library allocation
page read and write
54BE000
stack
page read and write
74EF2000
unkown
page execute read
473E000
direct allocation
page read and write
521E000
stack
page read and write
3E52000
heap
page read and write
2AD0000
heap
page read and write
7FFB1E3C0000
unkown
page read and write
255B000
trusted library allocation
page execute and read and write
A80000
heap
page read and write
473D000
direct allocation
page read and write
2CA7000
trusted library allocation
page read and write
4383000
heap
page read and write
5234000
trusted library allocation
page read and write
5730000
trusted library allocation
page execute and read and write
4A7000
unkown
page read and write
3E00000
heap
page read and write
2CB7000
trusted library allocation
page read and write
3E29000
heap
page read and write
480D000
direct allocation
page read and write
27A0000
heap
page read and write
2C62000
trusted library allocation
page read and write
7C7000
stack
page read and write
2C4A000
trusted library allocation
page read and write
480D000
direct allocation
page read and write
AC3000
heap
page read and write
A50000
heap
page read and write
51DD000
stack
page read and write
3CAE000
trusted library allocation
page read and write
4540000
direct allocation
page read and write
39B5000
trusted library allocation
page read and write
3E34000
heap
page read and write
74EFD000
unkown
page read and write
5118000
heap
page read and write
631E000
stack
page read and write
164F000
stack
page read and write
2F75000
heap
page read and write
940000
heap
page read and write
2D1F000
trusted library allocation
page read and write
490000
unkown
page write copy
663E000
stack
page read and write
5720000
trusted library allocation
page read and write
5D3D000
stack
page read and write
4F26000
trusted library allocation
page read and write
523F000
trusted library allocation
page read and write
5395000
heap
page read and write
3E58000
heap
page read and write
2975000
trusted library allocation
page read and write
291F000
stack
page read and write
5E3E000
stack
page read and write
2992000
trusted library allocation
page read and write
2984000
trusted library allocation
page read and write
3DA3000
heap
page read and write
487E000
direct allocation
page read and write
5190000
heap
page execute and read and write
3F80000
heap
page read and write
A20000
heap
page read and write
27BE000
stack
page read and write
29A7000
trusted library allocation
page read and write
100000
heap
page read and write
6160000
heap
page read and write
3D70000
heap
page read and write
277E000
stack
page read and write
3D8C000
heap
page read and write
4F60000
trusted library allocation
page read and write
26D7000
trusted library allocation
page execute and read and write
26BA000
trusted library allocation
page execute and read and write
253D000
trusted library allocation
page execute and read and write
8FE000
stack
page read and write
45A0000
direct allocation
page read and write
46E0000
direct allocation
page read and write
3116000
heap
page read and write
3F91000
heap
page read and write
490000
unkown
page write copy
2E23000
trusted library allocation
page read and write
3A73000
heap
page read and write
2C3E000
trusted library allocation
page read and write
2613000
heap
page read and write
4550000
direct allocation
page read and write
4809000
direct allocation
page read and write
3EB1000
heap
page read and write
3C81000
trusted library allocation
page read and write
2A20000
trusted library allocation
page read and write
2CB3000
trusted library allocation
page read and write
3DF2000
heap
page read and write
B70000
heap
page read and write
BAB000
heap
page read and write
B3D000
trusted library allocation
page execute and read and write
A90000
trusted library allocation
page read and write
2A17000
trusted library allocation
page read and write
8AF000
stack
page read and write
52F4000
heap
page read and write
2CE7000
trusted library allocation
page read and write
A02000
heap
page read and write
3E31000
heap
page read and write
62DE000
stack
page read and write
2952000
trusted library allocation
page read and write
2980000
heap
page read and write
6270000
trusted library allocation
page read and write
4AB000
unkown
page readonly
4230000
direct allocation
page read and write
46C9000
direct allocation
page read and write
9BE000
stack
page read and write
629E000
stack
page read and write
4F3E000
trusted library allocation
page read and write
AB5000
heap
page read and write
2F03000
trusted library allocation
page read and write
2C30000
trusted library allocation
page read and write
100000
heap
page read and write
2ABE000
trusted library allocation
page read and write
4523000
direct allocation
page read and write
2CD9000
trusted library allocation
page read and write
2D28000
trusted library allocation
page read and write
2CD4000
trusted library allocation
page read and write
999000
heap
page read and write
482000
unkown
page readonly
4ADE000
stack
page read and write
401000
unkown
page execute read
29A9000
trusted library allocation
page read and write
3D81000
trusted library allocation
page read and write
16C7000
heap
page read and write
27F0000
trusted library allocation
page read and write
74EFF000
unkown
page readonly
162F000
stack
page read and write
2BDE000
stack
page read and write
4400000
direct allocation
page read and write
297D000
trusted library allocation
page read and write
B9A000
heap
page read and write
B9E000
heap
page read and write
5F16000
trusted library allocation
page read and write
3ED2000
heap
page read and write
2971000
trusted library allocation
page read and write
2C36000
trusted library allocation
page read and write
2D6A000
trusted library allocation
page read and write
2530000
trusted library allocation
page read and write
299F000
trusted library allocation
page read and write
4610000
direct allocation
page read and write
3CAC000
heap
page read and write
2600000
trusted library allocation
page read and write
273E000
stack
page read and write
1E0000
heap
page read and write
2C3B000
trusted library allocation
page read and write
490000
unkown
page read and write
15B607B0000
heap
page read and write
3235000
heap
page read and write
5DEF000
stack
page read and write
423D000
heap
page read and write
3EB0000
heap
page read and write
482000
unkown
page readonly
68EE000
stack
page read and write
3C96000
heap
page read and write
5EF0000
trusted library allocation
page read and write
590000
heap
page read and write
940000
heap
page read and write
2CB1000
trusted library allocation
page read and write
3FA2000
heap
page read and write
5740000
trusted library allocation
page read and write
15B605D2000
heap
page read and write
4523000
direct allocation
page read and write
401000
unkown
page execute read
4523000
direct allocation
page read and write
B7A000
heap
page read and write
4540000
direct allocation
page read and write
5746000
trusted library allocation
page read and write
1480000
direct allocation
page read and write
5E0000
heap
page read and write
60C0000
trusted library allocation
page execute and read and write
9E0000
heap
page read and write
502E000
stack
page read and write
3D21000
trusted library allocation
page read and write
480D000
direct allocation
page read and write
9CE000
stack
page read and write
3E0E000
heap
page read and write
487E000
direct allocation
page read and write
3D79000
heap
page read and write
401000
unkown
page execute read
5230000
trusted library allocation
page read and write
254A000
trusted library allocation
page execute and read and write
3EF3CFF000
stack
page read and write
473D000
direct allocation
page read and write
3EF31CA000
stack
page read and write
8FE000
stack
page read and write
3DC7000
heap
page read and write
480D000
direct allocation
page read and write
51A1000
heap
page read and write
422000
system
page execute and read and write
3E9B000
heap
page read and write
3D1B000
heap
page read and write
3F83000
heap
page execute and read and write
3EB3000
heap
page execute and read and write
2E3D000
trusted library allocation
page read and write
B48000
heap
page read and write
3E3E000
heap
page read and write
2DA1000
trusted library allocation
page read and write
2D60000
trusted library allocation
page read and write
50DE000
trusted library allocation
page read and write
505F000
trusted library allocation
page read and write
1F0000
heap
page read and write
8FE000
stack
page read and write
3EAF000
heap
page read and write
3F84000
heap
page read and write
BB0000
heap
page read and write
616E000
stack
page read and write
3D82000
heap
page read and write
490000
unkown
page read and write
68A0000
heap
page read and write
482000
unkown
page readonly
5F40000
trusted library allocation
page execute and read and write
15B60790000
heap
page read and write
93E000
stack
page read and write
2F20000
heap
page read and write
15B605A0000
heap
page read and write
4809000
direct allocation
page read and write
3C2F000
stack
page read and write
2C96000
trusted library allocation
page read and write
74EF1000
unkown
page execute read
25E0000
trusted library allocation
page read and write
14C0000
direct allocation
page read and write
74EE0000
unkown
page readonly
B20000
trusted library allocation
page read and write
4540000
direct allocation
page read and write
3E30000
heap
page read and write
2CBB000
trusted library allocation
page read and write
3D3D000
heap
page read and write
4F41000
trusted library allocation
page read and write
60BE000
stack
page read and write
50D0000
trusted library allocation
page read and write
2A65000
trusted library allocation
page read and write
3E37000
heap
page read and write
487E000
direct allocation
page read and write
437000
system
page execute and read and write
299B000
trusted library allocation
page read and write
2C81000
trusted library allocation
page read and write
There are 791 hidden memdumps, click here to show them.