IOC Report
9dOKGgFNL2.exe

loading gif

Files

File Path
Type
Category
Malicious
9dOKGgFNL2.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\9dOKGgFNL2.exe.log
ASCII text, with CRLF line terminators
dropped
malicious
C:\Users\user\AppData\Local\Temp\tmp4513.tmp
SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 1, database pages 24, cookie 0xe, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\tmp4514.tmp
SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 1, database pages 24, cookie 0xe, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\tmp4525.tmp
SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 1, database pages 24, cookie 0xe, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\tmp4526.tmp
SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 1, database pages 24, cookie 0xe, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\tmp4536.tmp
SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 1, database pages 24, cookie 0xe, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\tmp4537.tmp
SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 1, database pages 24, cookie 0xe, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\tmp4548.tmp
SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 2, database pages 56, cookie 0x24, schema 4, UTF-8, version-valid-for 2
dropped
C:\Users\user\AppData\Local\Temp\tmp4549.tmp
SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 2, database pages 56, cookie 0x24, schema 4, UTF-8, version-valid-for 2
dropped
C:\Users\user\AppData\Local\Temp\tmp455A.tmp
SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 2, database pages 56, cookie 0x24, schema 4, UTF-8, version-valid-for 2
dropped
C:\Users\user\AppData\Local\Temp\tmp457A.tmp
SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 2, database pages 56, cookie 0x24, schema 4, UTF-8, version-valid-for 2
dropped
C:\Users\user\AppData\Local\Temp\tmp457B.tmp
SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 2, database pages 56, cookie 0x24, schema 4, UTF-8, version-valid-for 2
dropped
C:\Users\user\AppData\Local\Temp\tmp7E4F.tmp
SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 2, database pages 56, cookie 0x24, schema 4, UTF-8, version-valid-for 2
dropped
C:\Users\user\AppData\Local\Temp\tmp7E5F.tmp
SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 2, database pages 56, cookie 0x24, schema 4, UTF-8, version-valid-for 2
dropped
C:\Users\user\AppData\Local\Temp\tmp7E70.tmp
SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 2, database pages 56, cookie 0x24, schema 4, UTF-8, version-valid-for 2
dropped
C:\Users\user\AppData\Local\Temp\tmp7E71.tmp
SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 2, database pages 56, cookie 0x24, schema 4, UTF-8, version-valid-for 2
dropped
C:\Users\user\AppData\Local\Temp\tmp7E82.tmp
SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 2, database pages 56, cookie 0x24, schema 4, UTF-8, version-valid-for 2
dropped
C:\Users\user\AppData\Local\Temp\tmp7E92.tmp
SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 2, database pages 56, cookie 0x24, schema 4, UTF-8, version-valid-for 2
dropped
C:\Users\user\AppData\Local\Temp\tmp7E93.tmp
SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 2, database pages 56, cookie 0x24, schema 4, UTF-8, version-valid-for 2
dropped
C:\Users\user\AppData\Local\Temp\tmp7EB3.tmp
SQLite 3.x database, user version 12, last written using SQLite version 3042000, page size 32768, writer version 2, read version 2, file counter 3, database pages 3, cookie 0x1, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\tmpB59.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\tmpB5A.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\tmpB6B.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\tmpB71A.tmp
SQLite 3.x database, user version 12, last written using SQLite version 3042000, page size 32768, writer version 2, read version 2, file counter 3, database pages 3, cookie 0x1, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\tmpB7C.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\tmpB7D.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\tmpB8D.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\tmpB9E.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\tmpB9F.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\tmpBB0.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\tmpBB1.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\tmpBC1.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\tmpBD2.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\tmpD144.tmp
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\tmpD155.tmp
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\tmpD156.tmp
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\tmpD157.tmp
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\tmpD177.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\tmpD178.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\tmpD189.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\tmpD18A.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\tmpD19A.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\tmpD19B.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
dropped
There are 34 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\9dOKGgFNL2.exe
"C:\Users\user\Desktop\9dOKGgFNL2.exe"
malicious
C:\Users\user\Desktop\9dOKGgFNL2.exe
"C:\Users\user\Desktop\9dOKGgFNL2.exe"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1

URLs

Name
IP
Malicious
45.137.22.126:55615
malicious
http://45.137.22.126:55615/
45.137.22.126
malicious
https://duckduckgo.com/chrome_newtab
unknown
http://www.fontbureau.com/designersG
unknown
https://duckduckgo.com/ac/?q=
unknown
http://www.fontbureau.com/designers/?
unknown
http://www.founder.com.cn/cn/bThe
unknown
http://schemas.xmlsoap.org/ws/2004/08/addressing/faultX
unknown
http://www.fontbureau.com/designers?
unknown
http://tempuri.org/Endpoint/EnvironmentSettings
unknown
https://api.ip.sb/geoip
unknown
http://schemas.xmlsoap.org/soap/envelope/
unknown
http://www.tiro.com
unknown
http://tempuri.org/
unknown
https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
unknown
http://www.fontbureau.com/designers
unknown
http://www.goodfont.co.kr
unknown
http://45.137.22.126:5
unknown
http://tempuri.org/Endpoint/VerifyUpdateResponse
unknown
http://tempuri.org/Endpoint/SetEnvironment
unknown
http://tempuri.org/Endpoint/SetEnvironmentResponse
unknown
http://www.sajatypeworks.com
unknown
http://tempuri.org/Endpoint/GetUpdates
unknown
http://www.typography.netD
unknown
http://www.founder.com.cn/cn/cThe
unknown
http://www.galapagosdesign.com/staff/dennis.htm
unknown
https://api.ipify.orgcookies//settinString.Removeg
unknown
https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
unknown
http://www.galapagosdesign.com/DPlease
unknown
http://tempuri.org/Endpoint/VerifyUpdate
unknown
http://tempuri.org/0
unknown
http://www.fonts.com
unknown
http://www.sandoll.co.kr
unknown
http://www.urwpp.deDPlease
unknown
http://www.zhongyicts.com.cn
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
http://www.sakkal.com
unknown
https://ipinfo.io/ip%appdata%
unknown
http://www.apache.org/licenses/LICENSE-2.0
unknown
http://www.fontbureau.com
unknown
https://www.google.com/images/branding/product/ico/googleg_lodp.ico
unknown
http://schemas.xmlsoap.org/ws/2004/08/addressing/role/anonymous
unknown
http://tempuri.org/Endpoint/CheckConnectResponse
unknown
http://schemas.datacontract.org/2004/07/
unknown
https://api.ip.sb/geoip%USERPEnvironmentROFILE%
unknown
https://api.ip.sb
unknown
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
unknown
http://tempuri.org/Endpoint/CheckConnect
unknown
https://www.ecosia.org/newtab/
unknown
http://45.137.22.126:55615t-fq
unknown
http://tempuri.org/Endpoint/SetEnviron
unknown
http://www.carterandcone.coml
unknown
https://ac.ecosia.org/autocomplete?q=
unknown
http://www.fontbureau.com/designers/cabarga.htmlN
unknown
http://www.founder.com.cn/cn
unknown
http://www.fontbureau.com/designers/frere-user.html
unknown
http://schemas.xmlsoap.org/ws/2004/08/addressing
unknown
http://tempuri.org/Endpoint/GetUpdatesResponse
unknown
http://www.jiyu-kobo.co.jp/
unknown
http://tempuri.org/Endpoint/EnvironmentSettingsResponse
unknown
http://www.fontbureau.com/designers8
unknown
https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
unknown
http://schemas.xmlsoap.org/soap/actor/next
unknown
http://45.137.22.126:55615
unknown
There are 54 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
api.ip.sb
unknown

IPs

IP
Domain
Country
Malicious
45.137.22.126
unknown
Netherlands
malicious

Registry

Path
Value
Malicious
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\9dOKGgFNL2_RASAPI32
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\9dOKGgFNL2_RASAPI32
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\9dOKGgFNL2_RASAPI32
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\9dOKGgFNL2_RASAPI32
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\9dOKGgFNL2_RASAPI32
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\9dOKGgFNL2_RASAPI32
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\9dOKGgFNL2_RASAPI32
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\9dOKGgFNL2_RASMANCS
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\9dOKGgFNL2_RASMANCS
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\9dOKGgFNL2_RASMANCS
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\9dOKGgFNL2_RASMANCS
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\9dOKGgFNL2_RASMANCS
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\9dOKGgFNL2_RASMANCS
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\9dOKGgFNL2_RASMANCS
FileDirectory
There are 5 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
402000
remote allocation
page execute and read and write
malicious
458A000
trusted library allocation
page read and write
malicious
4491000
trusted library allocation
page read and write
malicious
1664000
trusted library allocation
page read and write
838E000
stack
page read and write
715C000
trusted library allocation
page read and write
1697000
trusted library allocation
page execute and read and write
5B2B000
stack
page read and write
6430000
heap
page read and write
5840000
trusted library allocation
page execute and read and write
C0CE000
stack
page read and write
1100000
heap
page read and write
694F000
trusted library allocation
page read and write
1135000
heap
page read and write
FFE000
stack
page read and write
6930000
trusted library allocation
page read and write
336D000
trusted library allocation
page read and write
7C5E000
stack
page read and write
75F0000
trusted library allocation
page read and write
58E0000
trusted library allocation
page execute and read and write
16B8000
heap
page read and write
6975000
trusted library allocation
page read and write
5810000
trusted library allocation
page execute and read and write
10A4000
trusted library allocation
page read and write
11C5000
heap
page read and write
575E000
stack
page read and write
2DA0000
heap
page read and write
6980000
trusted library allocation
page read and write
3385000
trusted library allocation
page read and write
1108000
heap
page read and write
6ECF000
stack
page read and write
5D1E000
stack
page read and write
3536000
trusted library allocation
page read and write
7940000
trusted library allocation
page read and write
33B0000
trusted library allocation
page read and write
7164000
trusted library allocation
page read and write
5CB0000
heap
page read and write
6F0E000
stack
page read and write
6590000
trusted library allocation
page execute and read and write
7BB0000
trusted library allocation
page execute and read and write
19AE000
stack
page read and write
6773000
heap
page read and write
7176000
trusted library allocation
page read and write
FF0000
unkown
page readonly
2FF1000
trusted library allocation
page read and write
1686000
trusted library allocation
page execute and read and write
596E000
stack
page read and write
821C000
heap
page read and write
10D2000
trusted library allocation
page read and write
565E000
stack
page read and write
3F92000
trusted library allocation
page read and write
33C3000
heap
page read and write
6F8A000
heap
page read and write
8212000
heap
page read and write
6960000
trusted library allocation
page read and write
7760000
trusted library allocation
page read and write
672A000
heap
page read and write
334B000
trusted library allocation
page read and write
6F4E000
stack
page read and write
3390000
trusted library allocation
page read and write
8218000
heap
page read and write
5940000
trusted library allocation
page read and write
645E000
heap
page read and write
692E000
stack
page read and write
505D000
stack
page read and write
333F000
stack
page read and write
1170000
heap
page read and write
33C0000
heap
page read and write
1673000
trusted library allocation
page read and write
6A2E000
stack
page read and write
71CF000
trusted library allocation
page read and write
2F10000
trusted library allocation
page read and write
F57000
stack
page read and write
5776000
trusted library allocation
page read and write
31EB000
stack
page read and write
5910000
trusted library allocation
page read and write
1129000
heap
page read and write
3534000
trusted library allocation
page read and write
58BD000
trusted library allocation
page read and write
BC0E000
stack
page read and write
1160000
heap
page read and write
6420000
heap
page read and write
57E0000
trusted library allocation
page read and write
695F000
trusted library allocation
page read and write
2EF0000
heap
page read and write
10A3000
trusted library allocation
page execute and read and write
58A0000
trusted library allocation
page read and write
81E8000
heap
page read and write
16B0000
heap
page read and write
6A50000
trusted library allocation
page read and write
5E60000
trusted library section
page read and write
6939000
trusted library allocation
page read and write
6F5A000
heap
page read and write
2CE8000
trusted library allocation
page read and write
C20D000
stack
page read and write
BD4E000
stack
page read and write
11E9000
heap
page read and write
3653000
trusted library allocation
page read and write
2F40000
trusted library allocation
page read and write
7D60000
trusted library allocation
page read and write
3220000
trusted library allocation
page read and write
7930000
trusted library allocation
page read and write
91A6000
heap
page read and write
67D0000
trusted library allocation
page execute and read and write
7970000
trusted library allocation
page read and write
5D5E000
stack
page read and write
6439000
heap
page read and write
1690000
trusted library allocation
page read and write
58D0000
trusted library allocation
page read and write
BD0E000
stack
page read and write
66E2000
heap
page read and write
7FBF000
stack
page read and write
71A1000
trusted library allocation
page read and write
6F9C000
heap
page read and write
5820000
trusted library allocation
page read and write
16E4000
heap
page read and write
58BA000
trusted library allocation
page read and write
5CA0000
trusted library allocation
page execute and read and write
10C6000
trusted library allocation
page execute and read and write
BE8D000
stack
page read and write
1090000
trusted library allocation
page read and write
168A000
trusted library allocation
page execute and read and write
5BD0000
heap
page read and write
7D70000
trusted library allocation
page execute and read and write
FF2000
unkown
page readonly
81D8000
heap
page read and write
3210000
trusted library allocation
page read and write
1040000
heap
page read and write
5DBD000
stack
page read and write
33D0000
heap
page execute and read and write
166D000
trusted library allocation
page execute and read and write
5B40000
heap
page execute and read and write
1650000
trusted library allocation
page read and write
6955000
trusted library allocation
page read and write
9190000
heap
page read and write
65E0000
heap
page read and write
164E000
stack
page read and write
5C90000
trusted library allocation
page read and write
6474000
heap
page read and write
6ACE000
stack
page read and write
3F61000
trusted library allocation
page read and write
E5B000
stack
page read and write
591B000
trusted library allocation
page read and write
6CE0000
heap
page read and write
7D68000
trusted library allocation
page read and write
43E9000
trusted library allocation
page read and write
694A000
trusted library allocation
page read and write
2CDE000
stack
page read and write
77CB000
stack
page read and write
110A000
stack
page read and write
6932000
trusted library allocation
page read and write
7C10000
trusted library allocation
page execute and read and write
677A000
heap
page read and write
10C2000
trusted library allocation
page read and write
57D0000
trusted library allocation
page read and write
4334000
trusted library allocation
page read and write
FB0000
heap
page read and write
400000
remote allocation
page execute and read and write
592D000
stack
page read and write
67C2000
trusted library allocation
page read and write
669E000
stack
page read and write
33E1000
trusted library allocation
page read and write
7750000
trusted library allocation
page execute and read and write
13D0000
trusted library allocation
page read and write
10AD000
trusted library allocation
page execute and read and write
5BE0000
heap
page read and write
7BD0000
trusted library allocation
page read and write
40B5000
trusted library allocation
page read and write
5890000
trusted library allocation
page read and write
1070000
heap
page read and write
7CDE000
stack
page read and write
BE4F000
stack
page read and write
7730000
trusted library allocation
page read and write
7152000
trusted library allocation
page read and write
7FA90000
trusted library allocation
page execute and read and write
1133000
heap
page read and write
6948000
trusted library allocation
page read and write
43E1000
trusted library allocation
page read and write
5A8B000
trusted library allocation
page read and write
715F000
trusted library allocation
page read and write
14FF000
stack
page read and write
66A8000
heap
page read and write
10C0000
trusted library allocation
page read and write
7BE0000
trusted library allocation
page execute and read and write
2F14000
trusted library allocation
page read and write
31F0000
trusted library allocation
page execute and read and write
65D0000
trusted library allocation
page read and write
7156000
trusted library allocation
page read and write
822F000
heap
page read and write
11C0000
heap
page read and write
6820000
trusted library allocation
page execute and read and write
676B000
heap
page read and write
8214000
heap
page read and write
2F61000
trusted library allocation
page read and write
6470000
heap
page read and write
79F0000
heap
page read and write
53E8000
trusted library allocation
page read and write
10A0000
trusted library allocation
page read and write
2F30000
heap
page execute and read and write
13E0000
trusted library allocation
page execute and read and write
3200000
trusted library allocation
page read and write
7AAD000
stack
page read and write
659E000
stack
page read and write
671C000
heap
page read and write
5970000
trusted library allocation
page execute and read and write
7990000
heap
page read and write
7171000
trusted library allocation
page read and write
5B30000
trusted library section
page readonly
58C0000
trusted library allocation
page read and write
13F0000
heap
page read and write
6748000
heap
page read and write
1075000
heap
page read and write
6F6A000
heap
page read and write
6964000
trusted library allocation
page read and write
6570000
trusted library allocation
page read and write
5771000
trusted library allocation
page read and write
5A7E000
stack
page read and write
3103000
trusted library allocation
page read and write
7740000
trusted library allocation
page read and write
1074000
unkown
page readonly
2EAF000
stack
page read and write
1680000
trusted library allocation
page read and write
111E000
heap
page read and write
2FE0000
trusted library allocation
page read and write
557C000
stack
page read and write
576B000
trusted library allocation
page read and write
578E000
trusted library allocation
page read and write
10EB000
heap
page read and write
14F7000
stack
page read and write
5791000
trusted library allocation
page read and write
1660000
trusted library allocation
page read and write
5920000
trusted library allocation
page read and write
2F20000
trusted library allocation
page read and write
6A80000
heap
page read and write
7168000
trusted library allocation
page read and write
6799000
heap
page read and write
1663000
trusted library allocation
page execute and read and write
6CD0000
heap
page read and write
71B0000
trusted library allocation
page read and write
10B0000
trusted library allocation
page read and write
79FE000
heap
page read and write
11D0000
heap
page read and write
10D5000
trusted library allocation
page execute and read and write
681E000
stack
page read and write
167D000
trusted library allocation
page execute and read and write
7182000
trusted library allocation
page read and write
3FD5000
trusted library allocation
page read and write
6F50000
heap
page read and write
13CE000
stack
page read and write
1180000
heap
page read and write
7BC0000
trusted library allocation
page read and write
6762000
heap
page read and write
6972000
trusted library allocation
page read and write
649E000
stack
page read and write
5912000
trusted library allocation
page read and write
7190000
trusted library allocation
page read and write
6AD0000
trusted library allocation
page read and write
717D000
trusted library allocation
page read and write
58F0000
heap
page read and write
2FD7000
trusted library allocation
page read and write
69EE000
stack
page read and write
675F000
heap
page read and write
716E000
trusted library allocation
page read and write
7154000
trusted library allocation
page read and write
1190000
heap
page read and write
7612000
trusted library allocation
page read and write
1670000
trusted library allocation
page read and write
6752000
heap
page read and write
6770000
heap
page read and write
2FED000
trusted library allocation
page read and write
6F86000
heap
page read and write
7EBE000
stack
page read and write
5760000
trusted library allocation
page read and write
6A40000
trusted library allocation
page execute and read and write
10E0000
heap
page read and write
57A1000
trusted library allocation
page read and write
67C0000
trusted library allocation
page read and write
5900000
trusted library allocation
page execute and read and write
10D0000
trusted library allocation
page read and write
3F72000
trusted library allocation
page read and write
6580000
trusted library allocation
page execute and read and write
10D7000
trusted library allocation
page execute and read and write
81D0000
heap
page read and write
54DF000
stack
page read and write
1B97000
heap
page read and write
335E000
trusted library allocation
page read and write
30FD000
trusted library allocation
page read and write
2F1A000
trusted library allocation
page read and write
176E000
heap
page read and write
2FB0000
trusted library allocation
page read and write
6F60000
heap
page read and write
6560000
trusted library allocation
page read and write
6FAB000
heap
page read and write
7D00000
trusted library section
page read and write
BF90000
heap
page read and write
79A0000
heap
page read and write
7185000
trusted library allocation
page read and write
1692000
trusted library allocation
page read and write
65E5000
heap
page read and write
1193000
heap
page read and write
5A80000
trusted library allocation
page read and write
160E000
stack
page read and write
16F1000
heap
page read and write
10DB000
trusted library allocation
page execute and read and write
2D80000
trusted library allocation
page read and write
10E7000
heap
page read and write
6935000
trusted library allocation
page read and write
5830000
trusted library allocation
page read and write
695A000
trusted library allocation
page read and write
2F50000
heap
page execute and read and write
71F0000
trusted library allocation
page execute and read and write
81E0000
heap
page read and write
6767000
heap
page read and write
6970000
trusted library allocation
page read and write
6F76000
heap
page read and write
71C0000
trusted library allocation
page read and write
16BE000
heap
page read and write
678A000
heap
page read and write
10BD000
trusted library allocation
page execute and read and write
1682000
trusted library allocation
page read and write
3361000
trusted library allocation
page read and write
5782000
trusted library allocation
page read and write
7178000
trusted library allocation
page read and write
103E000
stack
page read and write
7980000
trusted library allocation
page read and write
3230000
heap
page read and write
1B90000
heap
page read and write
18AE000
stack
page read and write
7C80000
trusted library allocation
page execute and read and write
6759000
heap
page read and write
67A0000
trusted library allocation
page read and write
53DE000
stack
page read and write
2EEC000
stack
page read and write
3F6E000
trusted library allocation
page read and write
C30E000
stack
page read and write
81CE000
stack
page read and write
3372000
trusted library allocation
page read and write
1B8E000
stack
page read and write
6784000
heap
page read and write
6FC2000
heap
page read and write
66A0000
heap
page read and write
BF8D000
stack
page read and write
3380000
trusted library allocation
page read and write
1B40000
trusted library allocation
page read and write
561F000
stack
page read and write
2D90000
trusted library allocation
page read and write
81E4000
heap
page read and write
57C0000
trusted library allocation
page read and write
3340000
trusted library allocation
page read and write
675C000
heap
page read and write
3366000
trusted library allocation
page read and write
C1CF000
stack
page read and write
551D000
stack
page read and write
169B000
trusted library allocation
page execute and read and write
5A8E000
trusted library allocation
page read and write
655E000
stack
page read and write
7DBE000
stack
page read and write
There are 347 hidden memdumps, click here to show them.