IOC Report
vce exam simulator 2.2.1 crackk.exe

loading gif

Files

File Path
Type
Category
Malicious
vce exam simulator 2.2.1 crackk.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Local\Temp\459250\Spa.com
PE32 executable (GUI) Intel 80386, for MS Windows
modified
malicious
C:\Users\user\AppData\Local\Temp\459250\y
data
dropped
C:\Users\user\AppData\Local\Temp\Branches
data
dropped
C:\Users\user\AppData\Local\Temp\Earned
data
dropped
C:\Users\user\AppData\Local\Temp\Edmonton
data
dropped
C:\Users\user\AppData\Local\Temp\Est
data
dropped
C:\Users\user\AppData\Local\Temp\Giant
data
dropped
C:\Users\user\AppData\Local\Temp\Hawk
data
dropped
C:\Users\user\AppData\Local\Temp\Instance
data
dropped
C:\Users\user\AppData\Local\Temp\Leading
data
dropped
C:\Users\user\AppData\Local\Temp\Let
data
dropped
C:\Users\user\AppData\Local\Temp\Malawi
data
dropped
C:\Users\user\AppData\Local\Temp\No
data
dropped
C:\Users\user\AppData\Local\Temp\Paper
data
dropped
C:\Users\user\AppData\Local\Temp\Penalties
data
dropped
C:\Users\user\AppData\Local\Temp\Performances
data
dropped
C:\Users\user\AppData\Local\Temp\Reed
data
dropped
C:\Users\user\AppData\Local\Temp\Toe
data
dropped
C:\Users\user\AppData\Local\Temp\Vary
data
dropped
C:\Users\user\AppData\Local\Temp\Walls
ASCII text, with very long lines (873), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\Walls.cmd (copy)
ASCII text, with very long lines (873), with CRLF line terminators
dropped
There are 12 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Windows\SysWOW64\cmd.exe
"C:\Windows\System32\cmd.exe" /c move Walls Walls.cmd & Walls.cmd
malicious
C:\Windows\SysWOW64\findstr.exe
findstr /I "opssvc wrsa"
malicious
C:\Windows\SysWOW64\findstr.exe
findstr "AvastUI AVGUI bdservicehost nsWscSvc ekrn SophosHealth"
malicious
C:\Windows\SysWOW64\cmd.exe
cmd /c md 459250
malicious
C:\Windows\SysWOW64\findstr.exe
findstr /V "Sorry" Branches
malicious
C:\Windows\SysWOW64\cmd.exe
cmd /c copy /b ..\Penalties + ..\Let + ..\No + ..\Giant + ..\Instance + ..\Reed + ..\Hawk y
malicious
C:\Users\user\AppData\Local\Temp\459250\Spa.com
Spa.com y
malicious
C:\Users\user\Desktop\vce exam simulator 2.2.1 crackk.exe
"C:\Users\user\Desktop\vce exam simulator 2.2.1 crackk.exe"
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\tasklist.exe
tasklist
C:\Windows\SysWOW64\tasklist.exe
tasklist
C:\Windows\SysWOW64\choice.exe
choice /d y /t 5
There are 2 hidden processes, click here to show them.

URLs

Name
IP
Malicious
https://bithithol.click/api
104.21.33.227
malicious
http://www.microsoft.cov8GM
unknown
http://localhost/data.svc
unknown
https://duckduckgo.com/chrome_newtab
unknown
https://duckduckgo.com/ac/?q=
unknown
https://bridge.lga1.admarketplace.net/ctp?version=16.0.0&key=1696332238301000001.2&ci=1696332238417.
unknown
https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
unknown
http://asp.net/ApplicationServices/v200TU
unknown
https://support.office.com/article/94ba2e0b-638e-4a92-8857-2cb5ac1d8e17
unknown
https://www.autoitscript.com/autoit3/
unknown
http://crl.microso
unknown
https://imp.mt48.net/static?id=7RHzfOIXjFEYsBdvIpkX4QqmfZfYfQfafZbXfpbWfpbX7ReNxR3UIG8zInwYIFIVs9eYi
unknown
http://schemas.microsoft.co7
unknown
https://bithithol.click:443/api
unknown
http://x1.c.lencr.org/0
unknown
http://x1.i.lencr.org/0
unknown
https://support.office.com/article/94ba2e0b-638e-4a92-8857-2cb5ac1d8e17Install
unknown
https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
unknown
http://www.ietf.org/rfc/rfc2396.txt
unknown
http://tempuri.org/.
unknown
https://support.mozilla.org/products/firefoxgro.all
unknown
https://www.amazon.com/?tag=admarketus-20&ref=pd_sl_7548d4575af019e4c148ccf1a78112802e66a0816a72fc94
unknown
http://www.micros-core-marshal-l1-1-0.dll
unknown
https://bithithol.click/
unknown
https://contile-images.services.mozilla.com/0TegrVVRalreHILhR2WvtD_CFzj13HCDcLqqpvXSOuY.10862.jpg
unknown
https://www.google.com/images/branding/product/ico/googleg_lodp.ico
unknown
https://bithithol.click/apim
unknown
http://www.xrml.org/schema/2001/11/xrml2core
unknown
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
unknown
http://crl.rootca1.amazontrust.com/rootca1.crl0
unknown
https://bridge.lga1.ap01.net/ctp?version=16.0.0&key=1696332238301000001.1&ci=1696332238417.12791&cta
unknown
http://www.autoitscript.com/autoit3/X
unknown
http://ocsp.rootca1.amazontrust.com0:
unknown
https://support.office.com/article/7D48285B-20E8-4B9B-91AD-216E34163BAD?wt.mc_id=EnterPK2016
unknown
http://nsis.sf.net/NSIS_ErrorError
unknown
https://www.ecosia.org/newtab/
unknown
https://support.mozilla.org/kb/customize-firefox-controls-buttons-and-toolbars?utm_source=firefox-br
unknown
http://asp.net/ApplicationServices/v200
unknown
http://crl.microsoft.
unknown
https://ac.ecosia.org/autocomplete?q=
unknown
http://www.microso1.0800)4
unknown
http://crl.m
unknown
https://contile-images.services.mozilla.com/obgoOYObjIFea_bXuT6L4LbBJ8j425AD87S1HMD3BWg.9991.jpg
unknown
https://support.microsof
unknown
http://crt.rootca1.amazontrust.com/rootca1.cer0?
unknown
https://support.office.com/article/7D48285B-20E8-4B9B-91AD-216E34163BAD?wt.mc_id=EnterPK2016Examples
unknown
https://bithithol.click/api=
unknown
https://bithithol.click/api:
unknown
https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
unknown
http://crl.micros
unknown
There are 40 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
bithithol.click
104.21.33.227
malicious
UJXheBevpnMncefcEO.UJXheBevpnMncefcEO
unknown

IPs

IP
Domain
Country
Malicious
104.21.33.227
bithithol.click
United States
malicious

Memdumps

Base Address
Regiontype
Protect
Malicious
455C000
trusted library allocation
page read and write
1D65000
heap
page read and write
1D73000
heap
page read and write
4870000
heap
page read and write
73E000
stack
page read and write
30F7000
heap
page read and write
47D9000
trusted library allocation
page read and write
4491000
trusted library allocation
page read and write
4850000
direct allocation
page read and write
4491000
trusted library allocation
page read and write
4695000
trusted library allocation
page read and write
455F000
trusted library allocation
page read and write
1D83000
heap
page read and write
15FF000
stack
page read and write
19D6000
heap
page read and write
4574000
trusted library allocation
page read and write
40E2000
heap
page read and write
482B000
trusted library allocation
page read and write
4772000
trusted library allocation
page read and write
4692000
trusted library allocation
page read and write
4544000
trusted library allocation
page read and write
1D4A000
heap
page read and write
30CF000
heap
page read and write
2770000
direct allocation
page execute and read and write
455E000
trusted library allocation
page read and write
5DF2000
trusted library allocation
page read and write
84B000
heap
page read and write
4697000
trusted library allocation
page read and write
400000
unkown
page readonly
4730000
remote allocation
page read and write
469B000
trusted library allocation
page read and write
469E000
trusted library allocation
page read and write
4546000
trusted library allocation
page read and write
2F70000
heap
page read and write
40E2000
heap
page read and write
4774000
trusted library allocation
page read and write
4695000
trusted library allocation
page read and write
4696000
trusted library allocation
page read and write
4556000
trusted library allocation
page read and write
4699000
trusted library allocation
page read and write
1D72000
heap
page read and write
40E1000
heap
page read and write
445C000
trusted library allocation
page read and write
4391000
trusted library allocation
page read and write
4391000
trusted library allocation
page read and write
30FB000
heap
page read and write
4759000
trusted library allocation
page read and write
453E000
trusted library allocation
page read and write
1D6D000
heap
page read and write
457A000
trusted library allocation
page read and write
5EA2000
trusted library allocation
page read and write
5D9F000
stack
page read and write
17E0000
heap
page read and write
3170000
heap
page read and write
43E1000
trusted library allocation
page read and write
1640000
heap
page read and write
500E000
stack
page read and write
469A000
trusted library allocation
page read and write
4545000
trusted library allocation
page read and write
4514000
trusted library allocation
page read and write
30B8000
heap
page read and write
4CAE000
stack
page read and write
4749000
trusted library allocation
page read and write
4567000
trusted library allocation
page read and write
4587000
trusted library allocation
page read and write
2A2E000
stack
page read and write
2AAB000
heap
page read and write
1CF0000
heap
page read and write
474D000
trusted library allocation
page read and write
23FB000
heap
page read and write
450000
unkown
page readonly
85B000
heap
page read and write
40E1000
heap
page read and write
4475000
trusted library allocation
page read and write
4491000
trusted library allocation
page read and write
877000
heap
page read and write
4491000
trusted library allocation
page read and write
3430000
heap
page read and write
1D33000
heap
page read and write
4767000
trusted library allocation
page read and write
4733000
trusted library allocation
page read and write
1CE3000
heap
page read and write
40E2000
heap
page read and write
4557000
trusted library allocation
page read and write
450F000
trusted library allocation
page read and write
4475000
trusted library allocation
page read and write
1D83000
heap
page read and write
48BC000
trusted library allocation
page read and write
1C6E000
heap
page read and write
40E2000
heap
page read and write
450F000
trusted library allocation
page read and write
30D0000
heap
page read and write
40E2000
heap
page read and write
219E000
stack
page read and write
455F000
trusted library allocation
page read and write
4569000
trusted library allocation
page read and write
2AAB000
heap
page read and write
4753000
trusted library allocation
page read and write
4692000
trusted library allocation
page read and write
30EA000
heap
page read and write
2880000
heap
page read and write
48A4000
direct allocation
page execute and read and write
401000
unkown
page execute read
30FD000
heap
page read and write
4546000
trusted library allocation
page read and write
30D3000
heap
page read and write
837000
heap
page read and write
2A9C000
heap
page read and write
473E000
trusted library allocation
page read and write
2A81000
heap
page read and write
4567000
trusted library allocation
page read and write
4475000
trusted library allocation
page read and write
17AE000
stack
page read and write
29AE000
stack
page read and write
452F000
trusted library allocation
page read and write
1990000
heap
page read and write
82B000
heap
page read and write
4491000
trusted library allocation
page read and write
4588000
trusted library allocation
page read and write
4491000
trusted library allocation
page read and write
4567000
trusted library allocation
page read and write
30CF000
heap
page read and write
1B2E000
heap
page read and write
451C000
trusted library allocation
page read and write
4695000
trusted library allocation
page read and write
1D7F000
heap
page read and write
308D000
stack
page read and write
475E000
trusted library allocation
page read and write
837000
heap
page read and write
4390000
trusted library allocation
page read and write
30B0000
heap
page read and write
860000
heap
page read and write
1D72000
heap
page read and write
469A000
trusted library allocation
page read and write
40E2000
heap
page read and write
2AA3000
heap
page read and write
2A80000
heap
page read and write
4475000
trusted library allocation
page read and write
469B000
trusted library allocation
page read and write
4581000
trusted library allocation
page read and write
4743000
trusted library allocation
page read and write
593E000
stack
page read and write
51D000
unkown
page write copy
6F0000
heap
page read and write
455C000
trusted library allocation
page read and write
447B000
trusted library allocation
page read and write
454E000
trusted library allocation
page read and write
30FE000
heap
page read and write
30D3000
heap
page read and write
1D5F000
heap
page read and write
2786000
heap
page read and write
1D77000
heap
page read and write
30EE000
heap
page read and write
1A61000
heap
page read and write
1760000
heap
page read and write
469B000
trusted library allocation
page read and write
31EE000
stack
page read and write
326F000
stack
page read and write
1D69000
heap
page read and write
4742000
trusted library allocation
page read and write
420000
unkown
page read and write
30EA000
heap
page read and write
4491000
trusted library allocation
page read and write
4694000
trusted library allocation
page read and write
469D000
trusted library allocation
page read and write
446A000
trusted library allocation
page read and write
4690000
trusted library allocation
page read and write
4516000
trusted library allocation
page read and write
40E2000
heap
page read and write
4519000
trusted library allocation
page read and write
4520000
trusted library allocation
page read and write
1D63000
heap
page read and write
483F000
stack
page read and write
4840000
heap
page read and write
43E4000
trusted library allocation
page read and write
4491000
trusted library allocation
page read and write
3030000
heap
page read and write
4698000
trusted library allocation
page read and write
28D6000
heap
page read and write
4581000
trusted library allocation
page read and write
2AAB000
heap
page read and write
4699000
trusted library allocation
page read and write
1D7F000
heap
page read and write
4521000
trusted library allocation
page read and write
1D50000
heap
page read and write
4851000
direct allocation
page execute and read and write
300C000
stack
page read and write
452E000
trusted library allocation
page read and write
4756000
trusted library allocation
page read and write
25A3000
heap
page read and write
2B3F000
stack
page read and write
474B000
trusted library allocation
page read and write
47BC000
trusted library allocation
page read and write
19A000
stack
page read and write
452C000
trusted library allocation
page read and write
1D65000
heap
page read and write
3438000
heap
page read and write
447B000
trusted library allocation
page read and write
4412000
trusted library allocation
page read and write
40E2000
heap
page read and write
469B000
trusted library allocation
page read and write
28CE000
stack
page read and write
291E000
stack
page read and write
1D88000
heap
page read and write
4516000
trusted library allocation
page read and write
44C5000
trusted library allocation
page read and write
1D82000
heap
page read and write
4543000
trusted library allocation
page read and write
4730000
remote allocation
page read and write
50EE000
stack
page read and write
2720000
heap
page read and write
40E2000
heap
page read and write
33A0000
heap
page read and write
4491000
trusted library allocation
page read and write
401000
unkown
page execute read
4691000
trusted library allocation
page read and write
5E68000
trusted library allocation
page read and write
2320000
heap
page read and write
4731000
trusted library allocation
page read and write
4491000
trusted library allocation
page read and write
600000
heap
page read and write
40E2000
heap
page read and write
450F000
trusted library allocation
page read and write
283D000
stack
page read and write
451000
unkown
page execute read
2AA6000
heap
page read and write
473F000
trusted library allocation
page read and write
446A000
trusted library allocation
page read and write
2A98000
heap
page read and write
4599000
trusted library allocation
page read and write
4391000
trusted library allocation
page read and write
513000
unkown
page readonly
453F000
trusted library allocation
page read and write
1D85000
heap
page read and write
845000
heap
page read and write
1D50000
heap
page read and write
4755000
trusted library allocation
page read and write
409000
unkown
page readonly
3010000
heap
page read and write
4720000
trusted library allocation
page read and write
4391000
trusted library allocation
page read and write
4727000
trusted library allocation
page read and write
2F30000
heap
page read and write
4699000
trusted library allocation
page read and write
4527000
trusted library allocation
page read and write
4F0E000
stack
page read and write
860000
heap
page read and write
845000
heap
page read and write
770000
heap
page read and write
400000
unkown
page readonly
15D9000
stack
page read and write
2ECE000
stack
page read and write
1D76000
heap
page read and write
553E000
stack
page read and write
4588000
trusted library allocation
page read and write
4517000
trusted library allocation
page read and write
4526000
trusted library allocation
page read and write
504F000
stack
page read and write
2780000
heap
page read and write
15BE000
stack
page read and write
4741000
trusted library allocation
page read and write
6B0000
heap
page read and write
4491000
trusted library allocation
page read and write
46B000
unkown
page read and write
287F000
stack
page read and write
4536000
trusted library allocation
page read and write
6F5000
heap
page read and write
2A8D000
heap
page read and write
2AAB000
heap
page read and write
4733000
trusted library allocation
page read and write
4738000
trusted library allocation
page read and write
2A84000
heap
page read and write
30EA000
heap
page read and write
1D88000
heap
page read and write
877000
heap
page read and write
40E2000
heap
page read and write
2940000
heap
page read and write
7F0000
heap
page read and write
259F000
stack
page read and write
454E000
trusted library allocation
page read and write
1D7F000
heap
page read and write
513000
unkown
page readonly
23F5000
heap
page read and write
1D75000
heap
page read and write
4697000
trusted library allocation
page read and write
4696000
trusted library allocation
page read and write
1D73000
heap
page read and write
4755000
trusted library allocation
page read and write
4760000
trusted library allocation
page read and write
456F000
trusted library allocation
page read and write
54EF000
stack
page read and write
2F40000
heap
page read and write
4752000
trusted library allocation
page read and write
1D71000
heap
page read and write
4695000
trusted library allocation
page read and write
2A60000
heap
page read and write
2324000
heap
page read and write
1D6C000
heap
page read and write
1D88000
heap
page read and write
2948000
heap
page read and write
521000
unkown
page write copy
1A4D000
heap
page read and write
475D000
trusted library allocation
page read and write
4699000
trusted library allocation
page read and write
17E4000
heap
page read and write
484B000
trusted library allocation
page read and write
5DD3000
trusted library allocation
page read and write
434000
unkown
page read and write
476D000
trusted library allocation
page read and write
5EB2000
trusted library allocation
page read and write
4765000
trusted library allocation
page read and write
455F000
trusted library allocation
page read and write
1AB4000
heap
page read and write
4692000
trusted library allocation
page read and write
5EAA000
trusted library allocation
page read and write
40C000
unkown
page write copy
1D75000
heap
page read and write
40E2000
heap
page read and write
482A000
trusted library allocation
page read and write
469C000
trusted library allocation
page read and write
175E000
stack
page read and write
30F7000
heap
page read and write
4446000
trusted library allocation
page read and write
4551000
trusted library allocation
page read and write
5080000
heap
page read and write
4755000
trusted library allocation
page read and write
23F0000
heap
page read and write
1D73000
heap
page read and write
4533000
trusted library allocation
page read and write
322E000
stack
page read and write
1B03000
heap
page read and write
19A0000
heap
page read and write
1C06000
heap
page read and write
4491000
trusted library allocation
page read and write
500000
unkown
page readonly
474E000
trusted library allocation
page read and write
2A98000
heap
page read and write
FDA000
stack
page read and write
4536000
trusted library allocation
page read and write
267C000
stack
page read and write
4570000
trusted library allocation
page read and write
5E2A000
trusted library allocation
page read and write
2A68000
heap
page read and write
4ED000
unkown
page readonly
1D65000
heap
page read and write
469F000
trusted library allocation
page read and write
1D83000
heap
page read and write
480E000
trusted library allocation
page read and write
30FD000
heap
page read and write
30BF000
stack
page read and write
310C000
stack
page read and write
4390000
trusted library allocation
page read and write
1D5E000
heap
page read and write
4760000
trusted library allocation
page read and write
2AA7000
heap
page read and write
4771000
trusted library allocation
page read and write
40C000
unkown
page read and write
4567000
trusted library allocation
page read and write
4490000
trusted library allocation
page read and write
4536000
trusted library allocation
page read and write
85B000
heap
page read and write
2E3C000
stack
page read and write
40E2000
heap
page read and write
454B000
trusted library allocation
page read and write
2EB0000
heap
page read and write
4740000
trusted library allocation
page read and write
1D5D000
heap
page read and write
1D7A000
heap
page read and write
2ECC000
stack
page read and write
4391000
trusted library allocation
page read and write
30FA000
heap
page read and write
AEF000
stack
page read and write
2A8C000
heap
page read and write
4491000
trusted library allocation
page read and write
30CF000
heap
page read and write
40E2000
heap
page read and write
29EF000
stack
page read and write
22E0000
heap
page read and write
833000
heap
page read and write
1A6C000
heap
page read and write
1D69000
heap
page read and write
4696000
trusted library allocation
page read and write
4491000
trusted library allocation
page read and write
293F000
stack
page read and write
4778000
trusted library allocation
page read and write
4696000
trusted library allocation
page read and write
307E000
stack
page read and write
1C4E000
heap
page read and write
1D65000
heap
page read and write
9EF000
stack
page read and write
47BE000
trusted library allocation
page read and write
1D65000
heap
page read and write
475B000
trusted library allocation
page read and write
1D33000
heap
page read and write
40E2000
heap
page read and write
1C8E000
heap
page read and write
4491000
trusted library allocation
page read and write
2A80000
heap
page read and write
4776000
trusted library allocation
page read and write
2A98000
heap
page read and write
1D7F000
heap
page read and write
455C000
trusted library allocation
page read and write
4F8E000
stack
page read and write
469F000
trusted library allocation
page read and write
30EA000
heap
page read and write
22CE000
stack
page read and write
1D76000
heap
page read and write
40E2000
heap
page read and write
98000
stack
page read and write
2E7C000
stack
page read and write
40E2000
heap
page read and write
469E000
trusted library allocation
page read and write
40E2000
heap
page read and write
1D77000
heap
page read and write
30F8000
heap
page read and write
4760000
trusted library allocation
page read and write
40E2000
heap
page read and write
40E2000
heap
page read and write
2FCF000
stack
page read and write
7FE000
heap
page read and write
1C99000
heap
page read and write
19A8000
heap
page read and write
4771000
trusted library allocation
page read and write
525000
unkown
page readonly
4543000
trusted library allocation
page read and write
4561000
trusted library allocation
page read and write
3178000
heap
page read and write
30EA000
heap
page read and write
446C000
trusted library allocation
page read and write
476D000
trusted library allocation
page read and write
1D5D000
heap
page read and write
4491000
trusted library allocation
page read and write
4696000
trusted library allocation
page read and write
67EF000
trusted library allocation
page read and write
4411000
trusted library allocation
page read and write
4697000
trusted library allocation
page read and write
2730000
heap
page read and write
1D5F000
heap
page read and write
46CD000
stack
page read and write
51D000
unkown
page read and write
4527000
trusted library allocation
page read and write
4516000
trusted library allocation
page read and write
5DD9000
trusted library allocation
page read and write
4692000
trusted library allocation
page read and write
500000
unkown
page readonly
520000
heap
page read and write
458F000
trusted library allocation
page read and write
19C5000
heap
page read and write
451000
unkown
page execute read
68E000
stack
page read and write
453D000
trusted library allocation
page read and write
409000
unkown
page readonly
4F4F000
stack
page read and write
283E000
stack
page read and write
4691000
trusted library allocation
page read and write
1D5D000
heap
page read and write
47FE000
stack
page read and write
4588000
trusted library allocation
page read and write
525000
unkown
page readonly
2E8C000
stack
page read and write
40E2000
heap
page read and write
5050000
heap
page read and write
447B000
trusted library allocation
page read and write
40E2000
heap
page read and write
4491000
trusted library allocation
page read and write
498B000
trusted library allocation
page read and write
5DD6000
trusted library allocation
page read and write
4734000
trusted library allocation
page read and write
5E0A000
trusted library allocation
page read and write
1994000
heap
page read and write
4693000
trusted library allocation
page read and write
469D000
trusted library allocation
page read and write
483C000
trusted library allocation
page read and write
4692000
trusted library allocation
page read and write
4694000
trusted library allocation
page read and write
4412000
trusted library allocation
page read and write
1D77000
heap
page read and write
2AA4000
heap
page read and write
456D000
trusted library allocation
page read and write
1C2E000
heap
page read and write
28D0000
heap
page read and write
2AA8000
heap
page read and write
1D80000
heap
page read and write
40E2000
heap
page read and write
1D88000
heap
page read and write
451B000
trusted library allocation
page read and write
1D7E000
heap
page read and write
15EF000
stack
page read and write
4ED000
unkown
page readonly
4390000
trusted library allocation
page read and write
7BE000
stack
page read and write
474D000
trusted library allocation
page read and write
1D77000
heap
page read and write
30DD000
heap
page read and write
300F000
stack
page read and write
4693000
trusted library allocation
page read and write
5DD3000
trusted library allocation
page read and write
4696000
trusted library allocation
page read and write
1D6E000
heap
page read and write
4698000
trusted library allocation
page read and write
4695000
trusted library allocation
page read and write
4552000
trusted library allocation
page read and write
452F000
trusted library allocation
page read and write
1CA3000
heap
page read and write
45A1000
trusted library allocation
page read and write
62D5000
trusted library allocation
page read and write
4517000
trusted library allocation
page read and write
2A9B000
heap
page read and write
497D000
trusted library allocation
page read and write
447B000
trusted library allocation
page read and write
4567000
trusted library allocation
page read and write
2750000
heap
page read and write
833000
heap
page read and write
7FA000
heap
page read and write
1D60000
heap
page read and write
5F42000
trusted library allocation
page read and write
2940000
heap
page read and write
40E2000
heap
page read and write
30DC000
heap
page read and write
40F1000
heap
page read and write
1D50000
heap
page read and write
30ED000
heap
page read and write
1D4A000
heap
page read and write
5E7A000
trusted library allocation
page read and write
1D72000
heap
page read and write
1D88000
heap
page read and write
30F6000
heap
page read and write
4510000
trusted library allocation
page read and write
40E1000
heap
page read and write
15CE000
stack
page read and write
17E4000
heap
page read and write
30D3000
heap
page read and write
476C000
trusted library allocation
page read and write
30F7000
heap
page read and write
4738000
trusted library allocation
page read and write
4777000
trusted library allocation
page read and write
4555000
trusted library allocation
page read and write
4471000
trusted library allocation
page read and write
4569000
trusted library allocation
page read and write
41E0000
trusted library allocation
page read and write
4746000
trusted library allocation
page read and write
453D000
trusted library allocation
page read and write
40E2000
heap
page read and write
2FCE000
stack
page read and write
472C000
trusted library allocation
page read and write
2F76000
heap
page read and write
40E2000
heap
page read and write
473D000
trusted library allocation
page read and write
43C5000
trusted library allocation
page read and write
26BC000
stack
page read and write
22F0000
heap
page read and write
40E2000
heap
page read and write
2A98000
heap
page read and write
50AD000
stack
page read and write
47BF000
stack
page read and write
4FCF000
stack
page read and write
1D78000
heap
page read and write
450000
unkown
page readonly
450F000
trusted library allocation
page read and write
64E000
stack
page read and write
4730000
remote allocation
page read and write
4391000
trusted library allocation
page read and write
469C000
trusted library allocation
page read and write
2A98000
heap
page read and write
4512000
trusted library allocation
page read and write
40E2000
heap
page read and write
469A000
trusted library allocation
page read and write
599E000
stack
page read and write
40E2000
heap
page read and write
473B000
trusted library allocation
page read and write
485F000
trusted library allocation
page read and write
470D000
stack
page read and write
There are 562 hidden memdumps, click here to show them.