IOC Report
SecuriteInfo.com.Win32.MalwareX-gen.12338.1741.exe

loading gif

Files

File Path
Type
Category
Malicious
SecuriteInfo.com.Win32.MalwareX-gen.12338.1741.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\SecuriteInfo.com.Win32.MalwareX-gen.12338.1741.exe.log
CSV text
dropped
malicious
C:\Users\user\Desktop\Main.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\Desktop\OrionAscension.exe (copy)
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\Desktop\OrionAscension_Updated.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\Desktop\Data\Music\Furia_Screen.mp3
Audio file with ID3 version 2.4.0, contains: MPEG ADTS, layer III, v1, 64 kbps, 48 kHz, Stereo
dropped
C:\Users\user\Desktop\Data\Music\LI_Event_IllusionOfMemory.mp3
Audio file with ID3 version 2.3.0, contains: MPEG ADTS, layer III, v1, 128 kbps, 44.1 kHz, JntStereo
dropped
C:\Users\user\Desktop\Data\ResSet\Custom_Room1.orion
data
dropped
C:\Users\user\Desktop\MailMIME.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\Desktop\MailSMTP.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\Desktop\update.bat
DOS batch file, ASCII text, with CRLF line terminators
dropped
\Device\Null
ASCII text, with CRLF line terminators
dropped
There are 2 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.12338.1741.exe
"C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.12338.1741.exe"
malicious
C:\Windows\System32\cmd.exe
"cmd.exe" /C update.bat
malicious
C:\Windows\System32\PING.EXE
ping 127.0.0.1 -n 2
malicious
C:\Users\user\Desktop\OrionAscension.exe
OrionAscension.exe
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\timeout.exe
TIMEOUT /T 2

URLs

Name
IP
Malicious
http://foo/images/buttons/config/config_hover.png
unknown
http://schemas.xmlsoap.org/soap/encoding/
unknown
https://cdn.orionascension.com.br
unknown
http://defaultcontainer/images/buttons/fps/fps_hover.png
unknown
http://nexon.co.jp
unknown
http://foo/bar/images/buttons/config/config_hover.png
unknown
https://ssl.grandchase.com.tw/member/authentication.htmhttp://member.changyou.com/register/regPhoneS
unknown
http://defaultcontainer/images/buttons/lang/lang_hover.png
unknown
https://cdn.orionascension.com.br/files.xml
unknown
http://defaultcontainer/images/buttons/config/config_default.png
unknown
https://bugtrap.chaseorigin.com.br/RequestHandler.aspxDISPLAYEdgeTexture.dds./Data/Stage/PlayerTempl
unknown
http://cdn.orionascension.com.br
unknown
https://cdn.orionascension.com.brShttps://cdn.orionascension.com.br/Update/
unknown
https://noticias.eternalsage.com.br
unknown
https://cdn.orionascension.com.br/Update/Data
unknown
https://cdn.orionascension.com.br/version.bin
unknown
http://chase.netmarble.net/Event/2012/20120503_ICandoit/_Html/
unknown
http://chase.playnetwork.co.kr/Event/2012/20120503_ICandoit/_Html
unknown
https://cdn.orionascension.com.br/Update/
unknown
https://noticias.eternalsage.com.brPb
unknown
http://schemas.xmlsoap.org/wsdl/
unknown
http://nexon.co.jpnummedia%dwindowReplay
unknown
https://cdn.orionascension.com.br/launcher.txt
unknown
http://defaultcontainer/images/buttons/config/config_hover.png
unknown
http://relaxng.org/ns/structure/1.0
unknown
https://cdn.orionascension.com.br/OrionAscension.exe
unknown
https://cdn.orionascension.com.br/launcher.txtonPa
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
http://chase.netmarble.net/news/notice/BbsContentView.asp?seq=8119021&searchstring=&searchstringopti
unknown
http://chase.playnetwork.co.kr/Event/2012/20120503_ICandoit/_Htmlstatic_mydpointstatic_itemdpointsta
unknown
http://www.ijg.org
unknown
http://chase.tooniland.com/Event/2012/20120503_ICandoit/_Html
unknown
https://github.com/XamlAnimatedGif/XamlAnimatedGif
unknown
http://chase.nate.netmarble.net/Event/2012/20120503_ICandoit/_Html/
unknown
There are 24 hidden URLs, click here to show them.

IPs

IP
Domain
Country
Malicious
127.0.0.1
unknown
unknown
malicious
138.255.160.46
unknown
Brazil

Registry

Path
Value
Malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\SecuriteInfo_RASAPI32
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\SecuriteInfo_RASAPI32
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\SecuriteInfo_RASAPI32
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\SecuriteInfo_RASAPI32
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\SecuriteInfo_RASAPI32
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\SecuriteInfo_RASAPI32
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\SecuriteInfo_RASAPI32
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\SecuriteInfo_RASMANCS
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\SecuriteInfo_RASMANCS
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\SecuriteInfo_RASMANCS
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\SecuriteInfo_RASMANCS
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\SecuriteInfo_RASMANCS
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\SecuriteInfo_RASMANCS
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\SecuriteInfo_RASMANCS
FileDirectory
HKEY_CURRENT_USER\SOFTWARE\Microsoft\CTF\CUAS\DefaultCompositionWindow
Left
HKEY_CURRENT_USER\SOFTWARE\Microsoft\CTF\CUAS\DefaultCompositionWindow
Top
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\OrionAscension_RASAPI32
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\OrionAscension_RASAPI32
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\OrionAscension_RASAPI32
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\OrionAscension_RASAPI32
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\OrionAscension_RASAPI32
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\OrionAscension_RASAPI32
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\OrionAscension_RASAPI32
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\OrionAscension_RASMANCS
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\OrionAscension_RASMANCS
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\OrionAscension_RASMANCS
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\OrionAscension_RASMANCS
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\OrionAscension_RASMANCS
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\OrionAscension_RASMANCS
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\OrionAscension_RASMANCS
FileDirectory
There are 20 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
1C800001000
trusted library allocation
page read and write
malicious
1C87CB22000
unkown
page readonly
malicious
22980001000
trusted library allocation
page read and write
malicious
229FCCA2000
unkown
page readonly
malicious
229FF365000
heap
page read and write
2299B57A000
heap
page read and write
1C81DB1C000
heap
page read and write
2299B4EB000
heap
page read and write
1C81B426000
heap
page read and write
1C87F504000
heap
page read and write
7FF4AFA5C000
trusted library allocation
page readonly
2299B405000
heap
page read and write
7FF4AFA72000
trusted library allocation
page readonly
7FFD345FC000
trusted library allocation
page execute and read and write
13A7D9AA000
heap
page read and write
1C87F0D0000
trusted library allocation
page read and write
7FF4AFA52000
trusted library allocation
page readonly
BF89563000
stack
page read and write
229FD0E0000
trusted library allocation
page read and write
1C81B298000
heap
page read and write
229FD070000
heap
page read and write
1C800071000
trusted library allocation
page read and write
1C81DA07000
heap
page read and write
1C8001EE000
trusted library allocation
page read and write
1C87D040000
heap
page execute and read and write
1C87F6C0000
trusted library allocation
page read and write
22980584000
trusted library allocation
page read and write
1C87CC6C000
heap
page read and write
BF8A1FF000
stack
page read and write
1C81E259000
heap
page read and write
1C87F46F000
heap
page read and write
1C87FAFB000
heap
page read and write
229FFF60000
trusted library section
page readonly
353137000
stack
page read and write
1C87CBCD000
unkown
page readonly
1C81D0E0000
trusted library allocation
page read and write
229FF37C000
heap
page read and write
229FEA8A000
heap
page read and write
1C81D0B0000
trusted library allocation
page read and write
1C810021000
trusted library allocation
page read and write
1C81B61D000
heap
page read and write
352A3B000
stack
page read and write
1C87FAC6000
heap
page read and write
229FF351000
heap
page read and write
2299B420000
heap
page read and write
1C80007B000
trusted library allocation
page read and write
2299B528000
heap
page read and write
2299B43D000
heap
page read and write
2299B434000
heap
page read and write
1C81D090000
trusted library allocation
page read and write
229FF344000
heap
page read and write
7FF4AFA79000
trusted library allocation
page execute read
1C81DB08000
heap
page read and write
2299B3C9000
heap
page read and write
1C8002D7000
trusted library allocation
page read and write
1C87CCCD000
heap
page read and write
1F0A2B90000
heap
page read and write
1C81B27E000
heap
page read and write
2299B3C5000
heap
page read and write
2298006D000
trusted library allocation
page read and write
2299B3BC000
heap
page read and write
7FF4AFA43000
trusted library allocation
page execute read
BF898FE000
stack
page read and write
1C87F1D4000
heap
page read and write
3526FA000
stack
page read and write
1C87CED0000
trusted library allocation
page read and write
BF89EFB000
stack
page read and write
2299B44E000
heap
page read and write
351EFB000
stack
page read and write
7FFD3455D000
trusted library allocation
page execute and read and write
1C81D010000
trusted library allocation
page read and write
7FF4AFA92000
trusted library allocation
page readonly
1C81D2C1000
heap
page read and write
1C87E865000
heap
page read and write
1C87D0B0000
heap
page read and write
1C81B4D2000
heap
page read and write
1C87F120000
heap
page read and write
229FFC48000
heap
page read and write
BF8A5FE000
stack
page read and write
1C87CE80000
heap
page read and write
1C81CFC0000
trusted library allocation
page read and write
1C81DB19000
heap
page read and write
7FFD3456B000
trusted library allocation
page execute and read and write
2299B4E4000
heap
page read and write
35293E000
stack
page read and write
31FD3FF000
unkown
page read and write
2299B3EF000
heap
page read and write
1C81B3C5000
heap
page read and write
1C81B260000
heap
page read and write
7FFD34552000
trusted library allocation
page read and write
1C80007F000
trusted library allocation
page read and write
1C87CC60000
heap
page read and write
1C81B2E6000
heap
page read and write
1C81CE60000
trusted library allocation
page read and write
2299D6B0000
heap
page read and write
7FF4AFA7E000
trusted library allocation
page readonly
7FFD34542000
trusted library allocation
page read and write
7FFD34552000
trusted library allocation
page read and write
1C87D070000
trusted library allocation
page read and write
1C87F640000
trusted library allocation
page read and write
1C81D070000
trusted library allocation
page read and write
2299B3EB000
heap
page read and write
1C81B4F5000
heap
page read and write
1C81B26A000
heap
page read and write
7FF4AFA41000
trusted library allocation
page execute read
7FFD3459C000
trusted library allocation
page execute and read and write
1C81B618000
heap
page read and write
1C81DE72000
trusted library allocation
page read and write
1C87F650000
trusted library allocation
page read and write
1C87F600000
trusted library allocation
page read and write
1C81B3D1000
heap
page read and write
1C81CED0000
trusted library allocation
page read and write
1C87CF55000
heap
page read and write
2299B37A000
heap
page read and write
1C87F750000
trusted library allocation
page read and write
7FF4AFA97000
trusted library allocation
page execute read
7FFD3456D000
trusted library allocation
page execute and read and write
7FF4AFA78000
trusted library allocation
page readonly
7FFD34670000
trusted library allocation
page execute and read and write
1C81CF50000
trusted library allocation
page read and write
229FCEA6000
heap
page read and write
BF89AFE000
stack
page read and write
7FFD34720000
trusted library allocation
page execute and read and write
2299B473000
heap
page read and write
7FFD346F7000
trusted library allocation
page read and write
1C87CAA0000
unkown
page readonly
7FFD34750000
trusted library allocation
page read and write
229FCEA0000
heap
page read and write
229FD360000
heap
page read and write
2299B3B9000
heap
page read and write
1C87F0F0000
trusted library section
page readonly
1C81D060000
trusted library allocation
page read and write
1C87F6E0000
trusted library allocation
page read and write
1C81D2CF000
heap
page read and write
7FFD34600000
trusted library allocation
page read and write
BF89FFB000
stack
page read and write
1C81CFD0000
trusted library allocation
page read and write
1C81B49D000
heap
page read and write
229FF3A0000
heap
page read and write
1C800523000
trusted library allocation
page read and write
1C87FADA000
heap
page read and write
7FF4AFA8B000
trusted library allocation
page execute read
1C81B28E000
heap
page read and write
229FCCA0000
unkown
page readonly
BF8A8FE000
stack
page read and write
1C87FA6A000
heap
page read and write
1F0A11D0000
heap
page read and write
229FFD4B000
heap
page read and write
229FCF0F000
heap
page read and write
2299B3E5000
heap
page read and write
7FF4AFA49000
trusted library allocation
page execute read
1C87F20B000
heap
page read and write
1C87FBDD000
heap
page read and write
BF89BFE000
stack
page read and write
7FFD34626000
trusted library allocation
page execute and read and write
229FD100000
trusted library allocation
page read and write
2299B3E3000
heap
page read and write
7FFD34560000
trusted library allocation
page read and write
1C87F19A000
heap
page read and write
1C87CAA0000
unkown
page readonly
1C87CF50000
heap
page read and write
1C81B4E7000
heap
page read and write
1C87F1E0000
heap
page read and write
1C87CED5000
trusted library allocation
page read and write
229FF67B000
heap
page read and write
229FF443000
heap
page read and write
1C87F113000
heap
page execute and read and write
229FCECD000
heap
page read and write
1C87F660000
trusted library allocation
page read and write
1C810080000
trusted library allocation
page read and write
229FEBF0000
trusted library allocation
page read and write
1C81B3B6000
heap
page read and write
229FF360000
heap
page read and write
1C81D0C0000
trusted library allocation
page read and write
1C87F201000
heap
page read and write
7FF4DD470000
trusted library allocation
page execute and read and write
7FF4AFA40000
trusted library allocation
page readonly
7FFD3454D000
trusted library allocation
page execute and read and write
1C87F19E000
heap
page read and write
7FF4AFA96000
trusted library allocation
page readonly
7FFD34660000
trusted library allocation
page execute and read and write
2299D042000
trusted library allocation
page read and write
229FFC43000
heap
page read and write
7FFD34730000
trusted library allocation
page read and write
7FFD34702000
trusted library allocation
page read and write
229FF672000
heap
page read and write
22980200000
trusted library allocation
page read and write
1C87CC66000
heap
page read and write
229FF2F9000
heap
page read and write
1C81D2AF000
heap
page read and write
1C81CF80000
trusted library allocation
page read and write
229FFD19000
heap
page read and write
7FFD3457B000
trusted library allocation
page execute and read and write
1C81D100000
trusted library allocation
page read and write
2299B52D000
heap
page read and write
1C81D930000
heap
page read and write
1C8002F3000
trusted library allocation
page read and write
BF8A6FB000
stack
page read and write
1C87FA76000
heap
page read and write
2299B36D000
heap
page read and write
BF8A93E000
stack
page read and write
7FFD34740000
trusted library allocation
page read and write
1C87F680000
trusted library allocation
page read and write
1C81B555000
heap
page read and write
229FF34A000
heap
page read and write
7FFD34610000
trusted library allocation
page execute and read and write
7FF4AFA77000
trusted library allocation
page execute read
2299B35E000
heap
page read and write
2299B3E7000
heap
page read and write
2299B39F000
heap
page read and write
1C81B4BA000
heap
page read and write
7FF4AFA91000
trusted library allocation
page execute read
1C87F6F0000
trusted library allocation
page read and write
1C81B47D000
heap
page read and write
1C87F460000
heap
page read and write
1C81B435000
heap
page read and write
1C87D0B5000
heap
page read and write
7FFD34707000
trusted library allocation
page read and write
1C81DE00000
trusted library allocation
page read and write
BF8AA3F000
stack
page read and write
1C87FC35000
heap
page read and write
229FFD6C000
heap
page read and write
1C81B331000
heap
page read and write
7FFD34600000
trusted library allocation
page execute and read and write
7FFD346F0000
trusted library allocation
page read and write
1C81B626000
heap
page read and write
1C81CF70000
trusted library allocation
page read and write
7FFD345AC000
trusted library allocation
page execute and read and write
1C81CFF0000
trusted library allocation
page read and write
1C87F740000
trusted library allocation
page read and write
352C3B000
stack
page read and write
1C87CBCB000
unkown
page readonly
1C81DE20000
trusted library allocation
page read and write
7FFD34540000
trusted library allocation
page read and write
2299B4A0000
heap
page read and write
1C87FC11000
heap
page read and write
2299B358000
heap
page read and write
7FFD34750000
trusted library allocation
page read and write
229FCE70000
heap
page read and write
13A7D9C4000
heap
page read and write
2299B3DD000
heap
page read and write
7FFD34550000
trusted library allocation
page read and write
7FFD34564000
trusted library allocation
page read and write
BF895EE000
stack
page read and write
1C87D060000
heap
page read and write
7FF4AFA82000
trusted library allocation
page readonly
1C87F1C3000
heap
page read and write
7FFD3473E000
trusted library allocation
page read and write
7FFD34543000
trusted library allocation
page execute and read and write
1C810001000
trusted library allocation
page read and write
1C87CCA0000
heap
page read and write
1C81CF60000
trusted library allocation
page read and write
2299B53A000
heap
page read and write
776277F000
stack
page read and write
13A7D9A0000
heap
page read and write
1C87F12D000
heap
page read and write
1C81D000000
trusted library allocation
page read and write
1C81DAAC000
heap
page read and write
1C87CD31000
heap
page read and write
1C81DB12000
heap
page read and write
1C8001AF000
trusted library allocation
page read and write
2299B348000
heap
page read and write
3525F4000
stack
page read and write
1C87F1EF000
heap
page read and write
31FD2FB000
stack
page read and write
7FF4AFA42000
trusted library allocation
page readonly
2299B557000
heap
page read and write
1C81B29E000
heap
page read and write
1C8002BA000
trusted library allocation
page read and write
1C81D1C8000
heap
page read and write
1C87CF90000
heap
page read and write
229FF37A000
heap
page read and write
7FF4AFA44000
trusted library allocation
page readonly
BF89CFC000
stack
page read and write
2299B3FB000
heap
page read and write
7FFD34740000
trusted library allocation
page read and write
7FFD34748000
trusted library allocation
page read and write
13A7D8C0000
heap
page read and write
351EFD000
stack
page read and write
229FFD78000
heap
page read and write
13A7D9DB000
heap
page read and write
1C87FBA8000
heap
page read and write
1C87F13A000
heap
page read and write
22980566000
trusted library allocation
page read and write
1C87F521000
heap
page read and write
BF8A0FE000
stack
page read and write
7FFD34700000
trusted library allocation
page read and write
1C87CF00000
trusted library allocation
page read and write
229FF3F0000
heap
page execute and read and write
13A7DBB0000
heap
page read and write
13A7D9DC000
heap
page read and write
1C81B3D6000
heap
page read and write
1C81CF40000
trusted library allocation
page read and write
1C81B358000
heap
page read and write
229FD365000
heap
page read and write
BF8A7FC000
stack
page read and write
2299B409000
heap
page read and write
7FFD3455D000
trusted library allocation
page execute and read and write
1C81CEC0000
trusted library allocation
page read and write
7FF4AFA56000
trusted library allocation
page readonly
1C87CBC9000
unkown
page readonly
7FFD34606000
trusted library allocation
page read and write
1C81B428000
heap
page read and write
1C81D040000
trusted library allocation
page read and write
229FF336000
heap
page read and write
BF8AD3C000
stack
page read and write
229FCF19000
heap
page read and write
1C81CEE0000
trusted library allocation
page read and write
13A7D9DB000
heap
page read and write
13A7D7E0000
heap
page read and write
1C81B42E000
heap
page read and write
1C81D204000
heap
page read and write
2299B366000
heap
page read and write
7FF4AFA68000
trusted library allocation
page readonly
1C87FC2B000
heap
page read and write
13A7D9DD000
heap
page read and write
1C81B52A000
heap
page read and write
3524FE000
stack
page read and write
1C87F54E000
heap
page read and write
1C87F730000
trusted library allocation
page read and write
7FFD34636000
trusted library allocation
page execute and read and write
1F0A2CC5000
heap
page read and write
1C81DA40000
heap
page read and write
1C81B606000
heap
page read and write
1C81B412000
heap
page read and write
229FFCD1000
heap
page read and write
2299B3B3000
heap
page read and write
352A3D000
stack
page read and write
1C81CEB0000
trusted library allocation
page read and write
1C81DE10000
trusted library allocation
page read and write
229FFD81000
heap
page read and write
1C81B27C000
heap
page read and write
1C87FC37000
heap
page read and write
229802FE000
trusted library allocation
page read and write
1C87CBB4000
unkown
page readonly
229FF440000
heap
page read and write
1C87F6D0000
trusted library allocation
page read and write
1C81D1C0000
heap
page read and write
13A7D8E0000
heap
page read and write
229FFBC2000
heap
page read and write
7FF4AFA8A000
trusted library allocation
page readonly
1C81B601000
heap
page read and write
1C81CF90000
trusted library allocation
page read and write
1C800083000
trusted library allocation
page read and write
1C87E9B0000
trusted library allocation
page read and write
1C81CE70000
trusted library allocation
page read and write
1F0A11E0000
heap
page read and write
351DFE000
stack
page read and write
1C87F6A0000
trusted library allocation
page read and write
1C87F0E0000
trusted library allocation
page read and write
7FFD3457D000
trusted library allocation
page execute and read and write
7FF4AFA93000
trusted library allocation
page execute read
1C81CF30000
trusted library allocation
page read and write
7FFD34728000
trusted library allocation
page read and write
1C800305000
trusted library allocation
page read and write
13A7D9CA000
heap
page read and write
1C81DB0C000
heap
page read and write
229FCE80000
heap
page read and write
1C87FBCF000
heap
page read and write
1C81B26C000
heap
page read and write
229FCEE2000
heap
page read and write
2299007E000
trusted library allocation
page read and write
22980086000
trusted library allocation
page read and write
229FCEE5000
heap
page read and write
229FEA70000
heap
page read and write
BF8AE3B000
stack
page read and write
13A7D9DB000
heap
page read and write
13A7D9DC000
heap
page read and write
1C8003F8000
trusted library allocation
page read and write
1C87FA64000
heap
page read and write
1C81CE80000
trusted library allocation
page read and write
1C87CEDF000
trusted library allocation
page read and write
7FFD3456D000
trusted library allocation
page execute and read and write
7FFD34710000
trusted library allocation
page execute and read and write
2298008A000
trusted library allocation
page read and write
2299B54E000
heap
page read and write
7FF4AFA57000
trusted library allocation
page execute read
351BFE000
stack
page read and write
229FCF15000
heap
page read and write
2299B387000
heap
page read and write
1C87FA86000
heap
page read and write
1C81B2B2000
heap
page read and write
2299B431000
heap
page read and write
22980340000
trusted library allocation
page read and write
22980082000
trusted library allocation
page read and write
1C81D030000
trusted library allocation
page read and write
352D32000
stack
page read and write
1C87F670000
trusted library allocation
page read and write
35273E000
stack
page read and write
22980237000
trusted library allocation
page read and write
1C81B485000
heap
page read and write
1C87F207000
heap
page read and write
229FF280000
heap
page read and write
1C87CCCF000
heap
page read and write
1C81B418000
heap
page read and write
229FF33E000
heap
page read and write
2299B4DB000
heap
page read and write
1C87F51E000
heap
page read and write
229FF3F3000
heap
page execute and read and write
1F0A2CC0000
heap
page read and write
1C81B2EC000
heap
page read and write
7FF4AFA47000
trusted library allocation
page execute read
1F0A13B0000
heap
page read and write
351CFC000
stack
page read and write
1C87CEF0000
trusted library allocation
page read and write
7FFD34760000
trusted library allocation
page read and write
2299B63C000
heap
page read and write
1C81DAFB000
heap
page read and write
77626FE000
stack
page read and write
7FFD34553000
trusted library allocation
page execute and read and write
3518F3000
stack
page read and write
229FF5A0000
heap
page read and write
229FFD72000
heap
page read and write
229FF65F000
heap
page read and write
1C81B32D000
heap
page read and write
229FF35A000
heap
page read and write
1C87FBB4000
heap
page read and write
1C87F136000
heap
page read and write
2298033C000
trusted library allocation
page read and write
7FFD34574000
trusted library allocation
page read and write
1C81DE25000
trusted library allocation
page read and write
1C81D1C5000
heap
page read and write
1C87F0F9000
trusted library section
page readonly
7FFD346F0000
trusted library allocation
page read and write
229FFC4A000
heap
page read and write
2299B3E1000
heap
page read and write
7FFD346E0000
trusted library allocation
page read and write
1C87F110000
heap
page execute and read and write
13A7D9DC000
heap
page read and write
229FF333000
heap
page read and write
7FF4AFA7A000
trusted library allocation
page readonly
22980224000
trusted library allocation
page read and write
1C800077000
trusted library allocation
page read and write
1C81D080000
trusted library allocation
page read and write
1C87F610000
trusted library allocation
page read and write
1C87FA89000
heap
page read and write
229FFD74000
heap
page read and write
1C81B53A000
heap
page read and write
7FF4AFA94000
trusted library allocation
page readonly
2299B47D000
heap
page read and write
13A7D9DB000
heap
page read and write
13A7DAA0000
heap
page read and write
229FF590000
heap
page read and write
1C8002F1000
trusted library allocation
page read and write
1C87F620000
trusted library allocation
page read and write
1C81B2A2000
heap
page read and write
7FFD34554000
trusted library allocation
page read and write
1C81B2FB000
heap
page read and write
1C87CE40000
heap
page read and write
7FFD345F6000
trusted library allocation
page read and write
1C87F6B0000
trusted library allocation
page read and write
1C81B2F9000
heap
page read and write
1C81D0F0000
trusted library allocation
page read and write
1C87E970000
heap
page execute and read and write
BF8A3FE000
stack
page read and write
7FFD34730000
trusted library allocation
page read and write
1C81CFA0000
trusted library allocation
page read and write
BF895AE000
stack
page read and write
7FF4AFA58000
trusted library allocation
page readonly
2299B3F5000
heap
page read and write
7FFD345F0000
trusted library allocation
page read and write
2299B525000
heap
page read and write
22990001000
trusted library allocation
page read and write
1C81D183000
heap
page read and write
7FFD34550000
trusted library allocation
page read and write
1C81B278000
heap
page read and write
1C81B5BE000
heap
page read and write
7FF4AFA69000
trusted library allocation
page execute read
1C8003AB000
trusted library allocation
page read and write
1C800165000
trusted library allocation
page read and write
776267C000
stack
page read and write
229FD1B5000
heap
page read and write
1C81CF20000
trusted library allocation
page read and write
229FFD5B000
heap
page read and write
1C81D110000
trusted library allocation
page read and write
7FF4AFA5D000
trusted library allocation
page execute read
1C87FAA3000
heap
page read and write
22980352000
trusted library allocation
page read and write
2299B329000
heap
page read and write
229FFD52000
heap
page read and write
1C87FA7C000
heap
page read and write
1C81CEF0000
trusted library allocation
page read and write
2299B46F000
heap
page read and write
1C87FAC0000
heap
page read and write
2299B4DF000
heap
page read and write
BF8AB3B000
stack
page read and write
1C87FBAC000
heap
page read and write
2299B486000
heap
page read and write
1C81DB22000
heap
page read and write
229FD36E000
heap
page read and write
229FCDC0000
unkown
page readonly
2298007A000
trusted library allocation
page read and write
1C81B5C4000
heap
page read and write
1C81DB16000
heap
page read and write
1C87CE60000
heap
page read and write
229FF66F000
heap
page read and write
1C87FB4D000
heap
page read and write
BF89DFF000
stack
page read and write
1C87FB7F000
heap
page read and write
1C87FC18000
heap
page read and write
1C81D130000
heap
page read and write
2299B3C1000
heap
page read and write
1C87CAA5000
unkown
page readonly
2299B377000
heap
page read and write
229FFC36000
heap
page read and write
7FF4AFA46000
trusted library allocation
page readonly
1C81B5CE000
heap
page read and write
229FEBB0000
heap
page execute and read and write
1C87F450000
heap
page read and write
1C81D020000
trusted library allocation
page read and write
229FD090000
heap
page read and write
1C81B3DB000
heap
page read and write
31FD4FF000
stack
page read and write
7FFD34700000
trusted library allocation
page execute and read and write
1C81CFB0000
trusted library allocation
page read and write
7FFD34562000
trusted library allocation
page read and write
7FF4AFA83000
trusted library allocation
page execute read
2299B447000
heap
page read and write
1C87FA90000
heap
page read and write
1C87CBC5000
unkown
page readonly
7FFD346F2000
trusted library allocation
page read and write
229FF36D000
heap
page read and write
1C81D050000
trusted library allocation
page read and write
1C81B372000
heap
page read and write
1C81CE90000
trusted library allocation
page read and write
1C81D99A000
heap
page read and write
229FFD30000
heap
page read and write
229FFC55000
heap
page read and write
1C81CF10000
trusted library allocation
page read and write
1C81D0A0000
trusted library allocation
page read and write
BF8A2FE000
stack
page read and write
1C87F710000
trusted library allocation
page read and write
229FF400000
trusted library allocation
page read and write
1C87FA50000
heap
page read and write
7FF4AFA73000
trusted library allocation
page execute read
7FFD34736000
trusted library allocation
page read and write
1C81CEA0000
trusted library allocation
page read and write
1C81DA78000
heap
page read and write
7FF4AFA95000
trusted library allocation
page execute read
1C87FA6D000
heap
page read and write
3515DF000
stack
page read and write
2299B260000
heap
page read and write
229FF31C000
heap
page read and write
229FFBDB000
heap
page read and write
7FFD34738000
trusted library allocation
page read and write
7FFD34560000
trusted library allocation
page read and write
1C87FAE4000
heap
page read and write
13A7D9DB000
heap
page read and write
1C87CAA2000
unkown
page readonly
1C81B264000
heap
page read and write
7FF4AFA59000
trusted library allocation
page execute read
7FFD34544000
trusted library allocation
page read and write
7FFD34738000
trusted library allocation
page read and write
1C81B623000
heap
page read and write
1C8001EA000
trusted library allocation
page read and write
1C81B4AB000
heap
page read and write
1C81DB10000
heap
page read and write
7FF4AFA51000
trusted library allocation
page execute read
1C81B4C8000
heap
page read and write
1C87CF03000
trusted library allocation
page read and write
1C87CFC0000
heap
page read and write
1C87CD60000
heap
page read and write
1C81D1CF000
heap
page read and write
229FFBA2000
heap
page read and write
1C81B43A000
heap
page read and write
7FFD34710000
trusted library allocation
page execute and read and write
229FCF13000
heap
page read and write
229FFCD8000
heap
page read and write
7FF4AFA53000
trusted library allocation
page execute read
7FFD34720000
trusted library allocation
page read and write
1C81B62A000
heap
page read and write
1C81D965000
heap
page read and write
7FFD3460C000
trusted library allocation
page execute and read and write
1C87FACA000
heap
page read and write
1C81B609000
heap
page read and write
7FF4AFA50000
trusted library allocation
page readonly
1C87CCD6000
heap
page read and write
7FF4AFA45000
trusted library allocation
page execute read
1C87FB00000
heap
page read and write
1C87FAE9000
heap
page read and write
1C87FC29000
heap
page read and write
7FF4AFA7F000
trusted library allocation
page execute read
1C87CC8B000
heap
page read and write
7FFD34758000
trusted library allocation
page read and write
1C87F690000
trusted library allocation
page read and write
2299B491000
heap
page read and write
229FFCF8000
heap
page read and write
1C81B280000
heap
page read and write
1C81B463000
heap
page read and write
22990021000
trusted library allocation
page read and write
7FFD34570000
trusted library allocation
page read and write
1C87FA6F000
heap
page read and write
229FCCA0000
unkown
page readonly
229FF3C0000
heap
page execute and read and write
1C81B2F7000
heap
page read and write
2299B4AD000
heap
page read and write
1C87F4C9000
heap
page read and write
229FFD44000
heap
page read and write
1C87F51C000
heap
page read and write
7FF4AFA76000
trusted library allocation
page readonly
1F0A11E8000
heap
page read and write
BF8A4FE000
stack
page read and write
1C81D120000
trusted library allocation
page read and write
229FFBD4000
heap
page read and write
1C81B321000
heap
page read and write
229FF2F6000
heap
page read and write
2299B42C000
heap
page read and write
22980077000
trusted library allocation
page read and write
1C81B3AC000
heap
page read and write
1C81B60E000
heap
page read and write
7FF4AFA48000
trusted library allocation
page readonly
BF8AC3D000
stack
page read and write
229FFC2C000
heap
page read and write
1C81B603000
heap
page read and write
229FD1B0000
heap
page read and write
1C81B589000
heap
page read and write
1C81DB06000
heap
page read and write
229FCF11000
heap
page read and write
7FF4AFA7B000
trusted library allocation
page execute read
2299B55A000
heap
page read and write
1C81CFE0000
trusted library allocation
page read and write
1C87F463000
heap
page read and write
1C87FC24000
heap
page read and write
1C81D0D0000
trusted library allocation
page read and write
1C81B292000
heap
page read and write
1C81B268000
heap
page read and write
BF899FE000
stack
page read and write
1C81B30F000
heap
page read and write
1C87F213000
heap
page read and write
351FFB000
stack
page read and write
229FFB90000
heap
page read and write
1C8001F2000
trusted library allocation
page read and write
2298037E000
trusted library allocation
page read and write
1C81B29A000
heap
page read and write
1C87F1D8000
heap
page read and write
1C81DB1E000
heap
page read and write
13A7D9DC000
heap
page read and write
1C87CFC3000
heap
page read and write
1C81B31D000
heap
page read and write
There are 629 hidden memdumps, click here to show them.