IOC Report
logi_crashpad_handler.exe

loading gifFilesProcessesDomainsIPsRegistryMemdumps64201,00010010Label

Files

File Path
Type
Category
Malicious
Download
logi_crashpad_handler.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
initial sample
malicious
C:\Tools.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Tools.exe:Zone.Identifier
ASCII text, with CRLF line terminators
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\CLR_v2.0_32\UsageLogs\logi_crashpad_handler.exe.log
ASCII text, with CRLF line terminators
modified
malicious
C:\Users\user\AppData\Local\Temp\scvhost.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\9b559bac4e574408318117296a5babd8.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\CLR_v2.0_32\UsageLogs\scvhost.exe.log
ASCII text, with CRLF line terminators
dropped
\Device\ConDrv
ASCII text, with CRLF line terminators
dropped

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\logi_crashpad_handler.exe
"C:\Users\user\Desktop\logi_crashpad_handler.exe"
malicious
C:\Users\user\AppData\Local\Temp\scvhost.exe
"C:\Users\user\AppData\Local\Temp\scvhost.exe"
malicious
C:\Windows\SysWOW64\netsh.exe
netsh firewall add allowedprogram "C:\Users\user\AppData\Local\Temp\scvhost.exe" "scvhost.exe" ENABLE
malicious
C:\Users\user\AppData\Local\Temp\scvhost.exe
"C:\Users\user\AppData\Local\Temp\scvhost.exe" ..
malicious
C:\Users\user\AppData\Local\Temp\scvhost.exe
"C:\Users\user\AppData\Local\Temp\scvhost.exe" ..
malicious
C:\Users\user\AppData\Local\Temp\scvhost.exe
"C:\Users\user\AppData\Local\Temp\scvhost.exe" ..
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1

Domains

Name
IP
Malicious
wadad.ddns.net
94.31.93.22
malicious

IPs

IP
Domain
Country
Malicious
94.31.93.22
wadad.ddns.net
Germany
malicious

Registry

Path
Value
Malicious
HKEY_CURRENT_USER
di
malicious
HKEY_CURRENT_USER\Environment
SEE_MASK_NOZONECHECKS
malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
9b559bac4e574408318117296a5babd8
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run
9b559bac4e574408318117296a5babd8
HKEY_CURRENT_USER\SOFTWARE\9b559bac4e574408318117296a5babd8
[kl]

Memdumps

Base Address
Regiontype
Protect
Malicious
Download
273F000
trusted library allocation
page read and write
malicious
2791000
trusted library allocation
page read and write
malicious
2771000
trusted library allocation
page read and write
malicious
26CF000
trusted library allocation
page read and write
malicious
263F000
trusted library allocation
page read and write
malicious
55CE000
stack
page read and write
9D3E000
stack
page read and write
B93E000
stack
page read and write
14679000
trusted library allocation
page read and write
36B3000
heap
page read and write
508F000
stack
page read and write
760000
heap
page read and write
4E0E000
stack
page read and write
368B000
heap
page read and write
600000
heap
page read and write
F54F000
trusted library allocation
page read and write
692000
trusted library allocation
page execute and read and write
773D000
stack
page read and write
3580000
heap
page read and write
580F000
stack
page read and write
4F4E000
stack
page read and write
7C0000
heap
page read and write
4F8E000
stack
page read and write
485F000
stack
page read and write
9ABE000
stack
page read and write
5234000
heap
page read and write
783E000
stack
page read and write
12BDE000
stack
page read and write
913E000
stack
page read and write
610000
heap
page read and write
767000
trusted library allocation
page execute and read and write
89FE000
stack
page read and write
5B7F000
stack
page read and write
111AB000
trusted library allocation
page read and write
DB4E000
stack
page read and write
3BDD000
trusted library allocation
page read and write
B7F000
stack
page read and write
F22D000
trusted library allocation
page read and write
5520000
heap
page read and write
550F000
stack
page read and write
28453000
trusted library allocation
page read and write
630000
trusted library allocation
page read and write
832000
trusted library allocation
page execute and read and write
1521E000
stack
page read and write
F780000
trusted library allocation
page read and write
196000
stack
page read and write
F152000
trusted library allocation
page read and write
762000
trusted library allocation
page execute and read and write
14449000
trusted library allocation
page read and write
863E000
stack
page read and write
5ADD000
heap
page read and write
199000
stack
page read and write
F5EA000
trusted library allocation
page read and write
7FFE000
stack
page read and write
10F01000
trusted library allocation
page read and write
93C0000
heap
page read and write
37F6000
trusted library allocation
page read and write
5AC1000
heap
page read and write
7B0000
heap
page read and write
8E4000
trusted library allocation
page read and write
27A11000
trusted library allocation
page read and write
36B9000
heap
page read and write
A64000
trusted library allocation
page read and write
4F8E000
stack
page read and write
10C4D000
stack
page read and write
1205D000
stack
page read and write
C18D000
stack
page read and write
737E000
stack
page read and write
36A0000
trusted library allocation
page read and write
4E5E000
stack
page read and write
36C6000
heap
page read and write
B43E000
stack
page read and write
196000
stack
page read and write
F705000
trusted library allocation
page read and write
3634000
trusted library allocation
page read and write
11472000
trusted library allocation
page read and write
47AE000
stack
page read and write
4A2F000
stack
page read and write
BADD000
heap
page read and write
1F0000
heap
page read and write
900000
heap
page read and write
3475000
heap
page read and write
3B53000
trusted library allocation
page read and write
F3FC000
trusted library allocation
page read and write
3631000
heap
page read and write
5AD9000
heap
page read and write
C10000
trusted library allocation
page read and write
66FD000
stack
page read and write
3801000
trusted library allocation
page read and write
683D000
stack
page read and write
5ADA000
heap
page read and write
41DC000
trusted library allocation
page read and write
84BE000
stack
page read and write
4E2E000
stack
page read and write
14734000
trusted library allocation
page read and write
11209000
trusted library allocation
page read and write
3710000
heap
page read and write
5AD8000
heap
page read and write
927E000
stack
page read and write
C20000
trusted library allocation
page execute and read and write
FB21000
trusted library allocation
page read and write
3B29000
trusted library allocation
page read and write
1335E000
stack
page read and write
3710000
heap
page read and write
667000
trusted library allocation
page execute and read and write
BC8E000
stack
page read and write
480000
heap
page read and write
242F000
stack
page read and write
286A0000
trusted library allocation
page read and write
F6C8000
trusted library allocation
page read and write
4B8D000
stack
page read and write
123E0000
heap
page read and write
C64E000
stack
page read and write
3665000
heap
page read and write
7BFE000
stack
page read and write
14330000
trusted library allocation
page read and write
D8CE000
stack
page read and write
3657000
heap
page read and write
367A000
heap
page read and write
36CD000
heap
page read and write
B50000
heap
page read and write
49EF000
stack
page read and write
997000
trusted library allocation
page execute and read and write
36C2000
heap
page read and write
93BE000
stack
page read and write
1711E000
stack
page read and write
C78E000
stack
page read and write
27FA1000
trusted library allocation
page read and write
1201D000
stack
page read and write
2731000
trusted library allocation
page read and write
5AD8000
heap
page read and write
BAD7000
heap
page read and write
1A81E000
stack
page read and write
3863000
trusted library allocation
page read and write
27EC6000
trusted library allocation
page read and write
A90000
trusted library allocation
page read and write
9A000
stack
page read and write
983E000
stack
page read and write
1511E000
stack
page read and write
1721D000
stack
page read and write
36CA000
heap
page read and write
C68E000
stack
page read and write
4B2D000
stack
page read and write
2CF9000
trusted library allocation
page read and write
A0FD000
stack
page read and write
EF04000
trusted library allocation
page read and write
657000
heap
page read and write
632000
trusted library allocation
page execute and read and write
36CC000
heap
page read and write
3710000
heap
page read and write
36C6000
heap
page read and write
5CFE000
stack
page read and write
560000
heap
page read and write
76E000
heap
page read and write
196000
stack
page read and write
36CE000
heap
page read and write
53CF000
stack
page read and write
238F2000
trusted library allocation
page read and write
36AE000
heap
page read and write
28853000
trusted library allocation
page read and write
9DE000
stack
page read and write
F0F4000
trusted library allocation
page read and write
C28D000
stack
page read and write
4820000
trusted library allocation
page read and write
95E000
stack
page read and write
237F000
stack
page read and write
C15000
trusted library allocation
page read and write
27E6F000
trusted library allocation
page read and write
4E0E000
stack
page read and write
723D000
stack
page read and write
3A11000
trusted library allocation
page read and write
BA95000
heap
page read and write
E30000
heap
page read and write
A5F000
stack
page read and write
3B0E000
trusted library allocation
page read and write
2FCB000
stack
page read and write
F853000
trusted library allocation
page read and write
4BD0000
heap
page read and write
480F000
stack
page read and write
36CE000
heap
page read and write
58E000
heap
page read and write
CC4E000
stack
page read and write
3693000
heap
page read and write
803000
heap
page read and write
554E000
stack
page read and write
AD0000
heap
page execute and read and write
4BE2000
heap
page read and write
5DE000
stack
page read and write
36B9000
heap
page read and write
3677000
heap
page read and write
4F4E000
stack
page read and write
3665000
heap
page read and write
65A000
trusted library allocation
page execute and read and write
657E000
stack
page read and write
FBDC000
trusted library allocation
page read and write
F18F000
trusted library allocation
page read and write
280D9000
trusted library allocation
page read and write
368B000
heap
page read and write
670000
trusted library allocation
page read and write
693E000
stack
page read and write
A77E000
stack
page read and write
40E4000
trusted library allocation
page read and write
D78E000
stack
page read and write
371E000
heap
page read and write
3930000
trusted library allocation
page read and write
4970000
heap
page read and write
298B000
trusted library allocation
page read and write
5E1F000
stack
page read and write
5D1E000
stack
page read and write
371E000
heap
page read and write
534E000
stack
page read and write
50DE000
stack
page read and write
770000
heap
page read and write
847000
trusted library allocation
page execute and read and write
560000
heap
page read and write
4BBD000
stack
page read and write
4CE000
stack
page read and write
3BC4000
trusted library allocation
page read and write
397E000
trusted library allocation
page read and write
665000
heap
page read and write
11623000
trusted library allocation
page read and write
DA4D000
stack
page read and write
A9FD000
stack
page read and write
51DE000
stack
page read and write
367A000
heap
page read and write
282E0000
trusted library allocation
page read and write
3673000
heap
page read and write
76A000
heap
page read and write
9B000
stack
page read and write
AEFD000
stack
page read and write
9FBD000
stack
page read and write
88B000
trusted library allocation
page execute and read and write
71FD000
stack
page read and write
49EF000
stack
page read and write
27D77000
trusted library allocation
page read and write
4D0000
heap
page read and write
F4B4000
trusted library allocation
page read and write
A78000
trusted library allocation
page read and write
7D9000
heap
page read and write
4C0E000
stack
page read and write
14486000
trusted library allocation
page read and write
1000D000
stack
page read and write
154DE000
stack
page read and write
CA0E000
stack
page read and write
527F000
heap
page read and write
3994000
trusted library allocation
page read and write
5A0E000
stack
page read and write
366E000
heap
page read and write
637000
trusted library allocation
page execute and read and write
4BC0000
trusted library allocation
page read and write
1484C000
trusted library allocation
page read and write
1133F000
trusted library allocation
page read and write
4BD0000
heap
page read and write
F039000
trusted library allocation
page read and write
D64E000
stack
page read and write
3620000
heap
page read and write
4A7F000
stack
page read and write
A60000
heap
page read and write
FB5F000
trusted library allocation
page read and write
6CFD000
stack
page read and write
7D3E000
stack
page read and write
4E4E000
stack
page read and write
14238000
trusted library allocation
page read and write
2631000
trusted library allocation
page read and write
70E000
stack
page read and write
61FE000
stack
page read and write
11589000
trusted library allocation
page read and write
5E9000
heap
page read and write
F341000
trusted library allocation
page read and write
36C5000
heap
page read and write
637000
trusted library allocation
page execute and read and write
594E000
stack
page read and write
797000
heap
page read and write
FC19000
trusted library allocation
page read and write
BA50000
heap
page read and write
36B9000
heap
page read and write
4F9E000
stack
page read and write
8EFE000
stack
page read and write
4122000
trusted library allocation
page read and write
AC7D000
stack
page read and write
3710000
heap
page read and write
366B000
heap
page read and write
22EF000
stack
page read and write
622000
trusted library allocation
page execute and read and write
480000
heap
page read and write
570000
heap
page read and write
4D2D000
stack
page read and write
368D000
heap
page read and write
75BD000
stack
page read and write
51F0000
heap
page read and write
28265000
trusted library allocation
page read and write
A30000
heap
page read and write
368B000
heap
page read and write
FFCF000
stack
page read and write
14121000
trusted library allocation
page read and write
27D7000
trusted library allocation
page read and write
13FDE000
stack
page read and write
5AE000
stack
page read and write
F8B1000
trusted library allocation
page read and write
5AC1000
heap
page read and write
1415E000
trusted library allocation
page read and write
13BDE000
stack
page read and write
3792000
trusted library allocation
page read and write
2A13000
trusted library allocation
page read and write
548E000
stack
page read and write
4C4B000
heap
page read and write
6BB000
heap
page read and write
6E7E000
stack
page read and write
5C8E000
stack
page read and write
8EE000
stack
page read and write
11111000
trusted library allocation
page read and write
1137C000
trusted library allocation
page read and write
1074E000
stack
page read and write
36B8000
heap
page read and write
27DB4000
trusted library allocation
page read and write
10ECD000
stack
page read and write
3330000
heap
page read and write
BA63000
heap
page read and write
490000
heap
page read and write
FA66000
trusted library allocation
page read and write
620000
heap
page execute and read and write
A5FE000
stack
page read and write
3693000
heap
page read and write
2FA11000
trusted library allocation
page read and write
8B3E000
stack
page read and write
4E4E000
stack
page read and write
3A6E000
trusted library allocation
page read and write
3C62000
trusted library allocation
page read and write
7C3D000
stack
page read and write
658000
heap
page read and write
366D000
heap
page read and write
1A21E000
stack
page read and write
1399E000
stack
page read and write
7D7D000
stack
page read and write
650000
heap
page read and write
367A000
heap
page read and write
3731000
trusted library allocation
page read and write
9E7D000
stack
page read and write
4D0E000
stack
page read and write
28193000
trusted library allocation
page read and write
A40000
trusted library allocation
page read and write
36F0000
heap
page read and write
488F000
stack
page read and write
286FE000
trusted library allocation
page read and write
36B8000
heap
page read and write
A23E000
stack
page read and write
3714000
heap
page read and write
13C1E000
stack
page read and write
76FE000
stack
page read and write
910000
trusted library allocation
page read and write
51F0000
heap
page read and write
9CFE000
stack
page read and write
98A000
trusted library allocation
page execute and read and write
14560000
trusted library allocation
page read and write
887000
trusted library allocation
page execute and read and write
1F5000
heap
page read and write
5AC2000
heap
page read and write
36C4000
trusted library allocation
page read and write
27ACB000
trusted library allocation
page read and write
6C7000
trusted library allocation
page execute and read and write
282A3000
trusted library allocation
page read and write
36B4000
heap
page read and write
27EAF000
trusted library allocation
page read and write
4049000
trusted library allocation
page read and write
1024E000
stack
page read and write
88E000
stack
page read and write
834000
heap
page read and write
3713000
heap
page read and write
B57E000
stack
page read and write
14A1E000
trusted library allocation
page read and write
6C7000
heap
page read and write
70F000
stack
page read and write
3666000
heap
page read and write
578000
heap
page read and write
104CE000
stack
page read and write
558F000
stack
page read and write
1417E000
trusted library allocation
page read and write
D50E000
stack
page read and write
BC4D000
stack
page read and write
862000
trusted library allocation
page execute and read and write
62FE000
stack
page read and write
A5BE000
stack
page read and write
FAA4000
trusted library allocation
page read and write
66BE000
stack
page read and write
3730000
trusted library allocation
page read and write
3774000
trusted library allocation
page read and write
196000
stack
page read and write
EDEB000
trusted library allocation
page read and write
690000
trusted library allocation
page read and write
2801E000
trusted library allocation
page read and write
36BA000
heap
page read and write
5A4F000
stack
page read and write
36B6000
heap
page read and write
4DBE000
stack
page read and write
130DE000
stack
page read and write
5EE000
stack
page read and write
6C9000
heap
page read and write
708000
heap
page read and write
B7FE000
stack
page read and write
3654000
heap
page read and write
7EBE000
stack
page read and write
143CD000
trusted library allocation
page read and write
42D4000
trusted library allocation
page read and write
698000
heap
page read and write
558F000
stack
page read and write
548E000
stack
page read and write
110D1000
trusted library allocation
page read and write
369D000
trusted library allocation
page read and write
544F000
stack
page read and write
4239000
trusted library allocation
page read and write
1038E000
stack
page read and write
3450000
heap
page read and write
C40E000
stack
page read and write
C2CE000
stack
page read and write
60D000
stack
page read and write
417000
unkown
page execute read
564E000
stack
page read and write
144E3000
trusted library allocation
page read and write
21EE000
stack
page read and write
3641000
heap
page read and write
3667000
heap
page read and write
697D000
stack
page read and write
3716000
heap
page read and write
D48000
trusted library allocation
page read and write
AB3D000
stack
page read and write
3959000
trusted library allocation
page read and write
5BBC000
stack
page read and write
633D000
stack
page read and write
8C7E000
stack
page read and write
14791000
trusted library allocation
page read and write
1291E000
stack
page read and write
D90E000
stack
page read and write
199000
stack
page read and write
10A0E000
stack
page read and write
612000
trusted library allocation
page execute and read and write
B33E000
stack
page read and write
480000
heap
page read and write
111CB000
trusted library allocation
page read and write
3718000
heap
page read and write
508E000
stack
page read and write
9F7E000
stack
page read and write
7F1000
heap
page read and write
590E000
stack
page read and write
CD8E000
stack
page read and write
A37E000
stack
page read and write
8C3E000
stack
page read and write
D40D000
stack
page read and write
366F000
heap
page read and write
36CC000
heap
page read and write
CB4E000
stack
page read and write
27C7F000
trusted library allocation
page read and write
287B9000
trusted library allocation
page read and write
3858000
trusted library allocation
page read and write
1549E000
stack
page read and write
368D000
heap
page read and write
1229E000
stack
page read and write
38BE000
trusted library allocation
page read and write
140DE000
stack
page read and write
36C9000
heap
page read and write
3CBF000
trusted library allocation
page read and write
6C2000
trusted library allocation
page read and write
1371D000
stack
page read and write
344E000
unkown
page read and write
494D000
stack
page read and write
122DE000
stack
page read and write
D68E000
stack
page read and write
36CD000
heap
page read and write
BDCE000
stack
page read and write
5AC4000
heap
page read and write
534E000
stack
page read and write
567E000
stack
page read and write
7E9000
heap
page read and write
81D000
heap
page read and write
38BA000
trusted library allocation
page read and write
4BC0000
trusted library allocation
page execute and read and write
5ACE000
heap
page read and write
12B9E000
stack
page read and write
36B9000
heap
page read and write
3ACB000
trusted library allocation
page read and write
1A25E000
stack
page read and write
3676000
heap
page read and write
11286000
trusted library allocation
page read and write
27F63000
trusted library allocation
page read and write
3714000
heap
page read and write
4A8E000
stack
page read and write
BAD3000
heap
page read and write
F92C000
trusted library allocation
page read and write
11435000
trusted library allocation
page read and write
530F000
stack
page read and write
3976000
trusted library allocation
page read and write
1060E000
stack
page read and write
570E000
stack
page read and write
70BD000
stack
page read and write
BAE5000
heap
page read and write
379D000
trusted library allocation
page read and write
A60000
trusted library allocation
page read and write
3695000
heap
page read and write
36C2000
heap
page read and write
486F000
stack
page read and write
48FE000
stack
page read and write
A4BE000
stack
page read and write
61A000
trusted library allocation
page execute and read and write
6BBE000
stack
page read and write
7B0000
heap
page read and write
3710000
heap
page read and write
F9AC000
trusted library allocation
page read and write
1461C000
trusted library allocation
page read and write
1331E000
stack
page read and write
652000
trusted library allocation
page execute and read and write
1078E000
stack
page read and write
EE69000
trusted library allocation
page read and write
AB7D000
stack
page read and write
57BF000
stack
page read and write
54F0000
unclassified section
page read and write
AA5000
trusted library allocation
page read and write
B6BE000
stack
page read and write
920000
heap
page read and write
812000
heap
page read and write
2873C000
trusted library allocation
page read and write
B9BE000
stack
page read and write
3610000
heap
page read and write
1571D000
stack
page read and write
A8FD000
stack
page read and write
10F7B000
trusted library allocation
page read and write
62A000
trusted library allocation
page execute and read and write
544F000
stack
page read and write
48CF000
stack
page read and write
F304000
trusted library allocation
page read and write
A30000
heap
page execute and read and write
147EF000
trusted library allocation
page read and write
5F3E000
stack
page read and write
75A000
trusted library allocation
page execute and read and write
52C0000
heap
page read and write
3E15000
trusted library allocation
page read and write
288FB000
trusted library allocation
page read and write
196000
stack
page read and write
6FE000
heap
page read and write
3710000
heap
page read and write
CF0E000
stack
page read and write
14A99000
trusted library allocation
page read and write
8AFE000
stack
page read and write
141BB000
trusted library allocation
page read and write
36B1000
heap
page read and write
5E3E000
stack
page read and write
D7CE000
stack
page read and write
4F8E000
stack
page read and write
6AE000
heap
page read and write
997D000
stack
page read and write
3679000
heap
page read and write
840000
trusted library allocation
page read and write
A7E000
stack
page read and write
3820000
trusted library allocation
page read and write
540E000
stack
page read and write
109CD000
stack
page read and write
84F000
stack
page read and write
36B6000
heap
page read and write
71B000
heap
page read and write
50CE000
stack
page read and write
8CE000
stack
page read and write
3F89000
trusted library allocation
page read and write
85A000
trusted library allocation
page execute and read and write
F742000
trusted library allocation
page read and write
12F9E000
stack
page read and write
64A000
trusted library allocation
page execute and read and write
36CE000
heap
page read and write
391C000
trusted library allocation
page read and write
A33E000
stack
page read and write
A2E000
stack
page read and write
3EEF000
trusted library allocation
page read and write
3D1C000
trusted library allocation
page read and write
BA3E000
stack
page read and write
366B000
heap
page read and write
3910000
trusted library allocation
page read and write
284CD000
trusted library allocation
page read and write
3791000
trusted library allocation
page read and write
81A000
heap
page read and write
36CB000
heap
page read and write
6F7D000
stack
page read and write
3714000
heap
page read and write
3714000
heap
page read and write
690000
heap
page read and write
4A8E000
stack
page read and write
1050E000
stack
page read and write
B20000
trusted library allocation
page execute and read and write
5A3F000
stack
page read and write
69A000
trusted library allocation
page execute and read and write
632000
trusted library allocation
page execute and read and write
51CF000
stack
page read and write
5110000
heap
page read and write
12A9E000
stack
page read and write
590000
heap
page read and write
35DE000
stack
page read and write
84FE000
stack
page read and write
10DCE000
stack
page read and write
4FAE000
stack
page read and write
CC8E000
stack
page read and write
B6FE000
stack
page read and write
F6A5000
trusted library allocation
page read and write
B5BE000
stack
page read and write
36AE000
heap
page read and write
BAE1000
heap
page read and write
A5E000
stack
page read and write
B83E000
stack
page read and write
568E000
stack
page read and write
F4F2000
trusted library allocation
page read and write
5CA0000
heap
page read and write
36B5000
heap
page read and write
F5AD000
trusted library allocation
page read and write
13D1E000
stack
page read and write
28156000
trusted library allocation
page read and write
1295E000
stack
page read and write
546C000
stack
page read and write
A7FE000
stack
page read and write
892000
trusted library allocation
page execute and read and write
14276000
trusted library allocation
page read and write
4A5F000
stack
page read and write
3ADF000
stack
page read and write
5AD8000
heap
page read and write
36C6000
heap
page read and write
6E3D000
stack
page read and write
50CE000
stack
page read and write
32F4000
stack
page read and write
79BE000
stack
page read and write
7ABE000
stack
page read and write
3710000
heap
page read and write
95C0000
heap
page read and write
23EF000
stack
page read and write
4C28000
heap
page read and write
60BE000
stack
page read and write
5AE000
stack
page read and write
10C8E000
stack
page read and write
A9E000
stack
page read and write
366E000
heap
page read and write
13A9E000
stack
page read and write
7AF000
stack
page read and write
873E000
stack
page read and write
66D000
heap
page read and write
3693000
heap
page read and write
EFFC000
trusted library allocation
page read and write
80FE000
stack
page read and write
1215E000
stack
page read and write
3641000
heap
page read and write
36BD000
heap
page read and write
368B000
heap
page read and write
5CB0000
heap
page read and write
1064E000
stack
page read and write
BFE000
stack
page read and write
F83D000
trusted library allocation
page read and write
42C000
unkown
page readonly
36C9000
heap
page read and write
6AA000
trusted library allocation
page execute and read and write
1A11E000
stack
page read and write
610000
heap
page read and write
6BA000
trusted library allocation
page execute and read and write
2850E000
trusted library allocation
page read and write
4E4E000
stack
page read and write
6A7D000
stack
page read and write
4B80000
heap
page read and write
56BE000
stack
page read and write
52CE000
stack
page read and write
760000
trusted library allocation
page read and write
83BE000
stack
page read and write
BBE000
stack
page read and write
3711000
heap
page read and write
3677000
heap
page read and write
2839B000
trusted library allocation
page read and write
4BC0000
trusted library allocation
page execute and read and write
5DFE000
stack
page read and write
3B98000
trusted library allocation
page read and write
D18D000
stack
page read and write
3710000
heap
page read and write
36B0000
heap
page read and write
4CBD000
stack
page read and write
36C9000
heap
page read and write
36CE000
heap
page read and write
3FE7000
trusted library allocation
page read and write
5A7E000
stack
page read and write
6B2000
trusted library allocation
page execute and read and write
10B0D000
stack
page read and write
85FE000
stack
page read and write
520E000
stack
page read and write
C00D000
stack
page read and write
112C4000
trusted library allocation
page read and write
C04D000
stack
page read and write
1349D000
stack
page read and write
199000
stack
page read and write
C30000
heap
page read and write
D3F000
stack
page read and write
1345F000
stack
page read and write
6ABE000
stack
page read and write
607E000
stack
page read and write
D04E000
stack
page read and write
560000
heap
page read and write
650000
heap
page read and write
8DBD000
stack
page read and write
C50E000
stack
page read and write
285A8000
trusted library allocation
page read and write
3771000
trusted library allocation
page read and write
ADFE000
stack
page read and write
BF0E000
stack
page read and write
827E000
stack
page read and write
557E000
stack
page read and write
8D7E000
stack
page read and write
508E000
stack
page read and write
149A1000
trusted library allocation
page read and write
3668000
heap
page read and write
155DE000
stack
page read and write
ACBD000
stack
page read and write
9BBD000
stack
page read and write
36AE000
heap
page read and write
115C6000
trusted library allocation
page read and write
199000
stack
page read and write
FD8D000
stack
page read and write
4D0E000
stack
page read and write
84C000
trusted library allocation
page execute and read and write
1539E000
stack
page read and write
D54D000
stack
page read and write
914000
trusted library allocation
page read and write
65BD000
stack
page read and write
36B7000
heap
page read and write
F969000
trusted library allocation
page read and write
27B66000
trusted library allocation
page read and write
1385E000
stack
page read and write
114CE000
trusted library allocation
page read and write
4BC0000
trusted library allocation
page execute and read and write
12F5E000
stack
page read and write
7FBE000
stack
page read and write
752000
trusted library allocation
page execute and read and write
96F000
stack
page read and write
490E000
stack
page read and write
7E7E000
stack
page read and write
74BD000
stack
page read and write
480000
heap
page read and write
3717000
heap
page read and write
239A6000
trusted library allocation
page read and write
3A44000
trusted library allocation
page read and write
6D3D000
stack
page read and write
27FDE000
trusted library allocation
page read and write
4087000
trusted library allocation
page read and write
684000
trusted library allocation
page read and write
27B09000
trusted library allocation
page read and write
542D000
stack
page read and write
36CE000
heap
page read and write
21AF000
stack
page read and write
11074000
trusted library allocation
page read and write
66B000
trusted library allocation
page execute and read and write
F628000
trusted library allocation
page read and write
CDCE000
stack
page read and write
3E72000
trusted library allocation
page read and write
63C000
trusted library allocation
page execute and read and write
28623000
trusted library allocation
page read and write
CD0000
heap
page execute and read and write
1241B000
heap
page read and write
1014E000
stack
page read and write
595000
heap
page read and write
813E000
stack
page read and write
36BD000
heap
page read and write
4950000
heap
page read and write
554E000
stack
page read and write
C7CE000
stack
page read and write
88BE000
stack
page read and write
14907000
trusted library allocation
page read and write
51EE000
stack
page read and write
6CB000
trusted library allocation
page execute and read and write
113F7000
trusted library allocation
page read and write
89BE000
stack
page read and write
5B4E000
stack
page read and write
366A000
heap
page read and write
1321E000
stack
page read and write
75E000
stack
page read and write
12D1E000
stack
page read and write
660000
heap
page read and write
3671000
heap
page read and write
917E000
stack
page read and write
600000
trusted library allocation
page read and write
887E000
stack
page read and write
37FD000
trusted library allocation
page read and write
3631000
trusted library allocation
page read and write
630000
trusted library allocation
page read and write
8AB000
trusted library allocation
page execute and read and write
3695000
heap
page read and write
283D8000
trusted library allocation
page read and write
402000
unkown
page execute read
AB0000
trusted library allocation
page execute and read and write
1381E000
stack
page read and write
11036000
trusted library allocation
page read and write
14964000
trusted library allocation
page read and write
36CD000
heap
page read and write
2833D000
trusted library allocation
page read and write
903D000
stack
page read and write
36D1000
heap
page read and write
54AC000
stack
page read and write
1219E000
stack
page read and write
680000
trusted library allocation
page read and write
C90E000
stack
page read and write
11246000
trusted library allocation
page read and write
A47E000
stack
page read and write
13E9E000
stack
page read and write
1116E000
trusted library allocation
page read and write
36BD000
heap
page read and write
5AD8000
heap
page read and write
DD4E000
stack
page read and write
136DE000
stack
page read and write
2809C000
trusted library allocation
page read and write
787D000
stack
page read and write
431D000
trusted library allocation
page read and write
D28E000
stack
page read and write
3713000
heap
page read and write
27CBC000
trusted library allocation
page read and write
36AF000
heap
page read and write
4F6E000
stack
page read and write
10FB9000
trusted library allocation
page read and write
67FE000
stack
page read and write
747D000
stack
page read and write
4D0E000
stack
page read and write
FE8E000
stack
page read and write
12E1E000
stack
page read and write
46C8000
trusted library allocation
page read and write
57FE000
stack
page read and write
1561E000
stack
page read and write
28490000
trusted library allocation
page read and write
41A000
unkown
page execute read
36B6000
heap
page read and write
366B000
heap
page read and write
488E000
stack
page read and write
123DE000
stack
page read and write
4277000
trusted library allocation
page read and write
4B7D000
stack
page read and write
1088D000
stack
page read and write
37D6000
heap
page read and write
BECD000
stack
page read and write
36B2000
heap
page read and write
B30000
trusted library allocation
page execute and read and write
36C5000
heap
page read and write
3704000
trusted library allocation
page read and write
4825000
trusted library allocation
page read and write
51E0000
heap
page read and write
3668000
heap
page read and write
76A000
trusted library allocation
page execute and read and write
5DB000
heap
page read and write
88F000
stack
page read and write
3881000
trusted library allocation
page read and write
36C9000
heap
page read and write
D14E000
stack
page read and write
837E000
stack
page read and write
F8EE000
trusted library allocation
page read and write
131DE000
stack
page read and write
36CD000
heap
page read and write
36BD000
heap
page read and write
9B000
stack
page read and write
EEC6000
trusted library allocation
page read and write
367A000
heap
page read and write
27A6E000
trusted library allocation
page read and write
36C2000
heap
page read and write
27BC3000
trusted library allocation
page read and write
CECE000
stack
page read and write
37D0000
heap
page read and write
36C0000
heap
page read and write
1535D000
stack
page read and write
9A7D000
stack
page read and write
1010E000
stack
page read and write
39B4000
trusted library allocation
page read and write
3D7A000
trusted library allocation
page read and write
4890000
heap
page read and write
5A4E000
stack
page read and write
ED71000
trusted library allocation
page read and write
A73E000
stack
page read and write
530F000
stack
page read and write
5AA0000
heap
page read and write
3678000
heap
page read and write
402000
unkown
page execute read
8E0000
trusted library allocation
page read and write
12CDE000
stack
page read and write
61BE000
stack
page read and write
CA4E000
stack
page read and write
3693000
heap
page read and write
92BD000
stack
page read and write
A0BE000
stack
page read and write
1525E000
stack
page read and write
27F03000
trusted library allocation
page read and write
51CE000
stack
page read and write
9B000
stack
page read and write
103CD000
stack
page read and write
3B67000
trusted library allocation
page read and write
63A000
trusted library allocation
page execute and read and write
58FF000
stack
page read and write
36BD000
heap
page read and write
3470000
heap
page read and write
F3BC000
trusted library allocation
page read and write
5B8D000
stack
page read and write
493E000
stack
page read and write
950000
heap
page read and write
5090000
heap
page read and write
97A000
trusted library allocation
page execute and read and write
11321000
trusted library allocation
page read and write
2889E000
trusted library allocation
page read and write
12E5E000
stack
page read and write
54ED000
stack
page read and write
682000
trusted library allocation
page execute and read and write
C54E000
stack
page read and write
D2CE000
stack
page read and write
10B4E000
stack
page read and write
1395E000
stack
page read and write
3866000
trusted library allocation
page read and write
C8CE000
stack
page read and write
6FBD000
stack
page read and write
4B8D000
stack
page read and write
4F4F000
stack
page read and write
4830000
trusted library allocation
page execute and read and write
F37F000
trusted library allocation
page read and write
36B0000
heap
page read and write
A7BE000
stack
page read and write
9BFE000
stack
page read and write
900000
heap
page read and write
509F000
stack
page read and write
AA0000
trusted library allocation
page read and write
E2E000
stack
page read and write
36C1000
trusted library allocation
page read and write
5810000
heap
page read and write
491E000
stack
page read and write
75FE000
stack
page read and write
823E000
stack
page read and write
2D0C000
trusted library allocation
page read and write
733D000
stack
page read and write
145BE000
trusted library allocation
page read and write
70FD000
stack
page read and write
89A000
trusted library allocation
page execute and read and write
11F1E000
stack
page read and write
470E000
stack
page read and write
3AC9000
trusted library allocation
page read and write
870000
heap
page read and write
6BFD000
stack
page read and write
357F000
unkown
page read and write
96FE000
stack
page read and write
C3CD000
stack
page read and write
371E000
heap
page read and write
797E000
stack
page read and write
86A000
trusted library allocation
page execute and read and write
D10000
heap
page read and write
AFFE000
stack
page read and write
4920000
heap
page read and write
3634000
heap
page read and write
7D3000
heap
page read and write
3710000
heap
page read and write
3794000
trusted library allocation
page read and write
366D000
heap
page read and write
DA0E000
stack
page read and write
578E000
stack
page read and write
142F3000
trusted library allocation
page read and write
76C000
trusted library allocation
page execute and read and write
C14D000
stack
page read and write
12A5E000
stack
page read and write
A70000
trusted library allocation
page read and write
32FE000
stack
page read and write
10F3E000
trusted library allocation
page read and write
417F000
trusted library allocation
page read and write
682000
heap
page read and write
285E6000
trusted library allocation
page read and write
38CB000
trusted library allocation
page read and write
64A000
trusted library allocation
page execute and read and write
94C0000
heap
page read and write
1309E000
stack
page read and write
14A5C000
trusted library allocation
page read and write
D00E000
stack
page read and write
EF41000
trusted library allocation
page read and write
F497000
trusted library allocation
page read and write
3C24000
trusted library allocation
page read and write
13ADE000
stack
page read and write
4950000
trusted library allocation
page execute and read and write
820000
trusted library allocation
page read and write
84A000
trusted library allocation
page execute and read and write
4007000
trusted library allocation
page read and write
520E000
stack
page read and write
6A7000
trusted library allocation
page execute and read and write
643E000
stack
page read and write
3794000
trusted library allocation
page read and write
B2FE000
stack
page read and write
3F2C000
trusted library allocation
page read and write
26C1000
trusted library allocation
page read and write
AB0000
trusted library allocation
page execute and read and write
39FF000
trusted library allocation
page read and write
1440B000
trusted library allocation
page read and write
AA3E000
stack
page read and write
4638000
trusted library allocation
page read and write
6AE000
stack
page read and write
FAE4000
trusted library allocation
page read and write
4F0000
heap
page read and write
5140000
heap
page read and write
36B7000
heap
page read and write
135DE000
stack
page read and write
BAE9000
heap
page read and write
148A9000
trusted library allocation
page read and write
27C41000
trusted library allocation
page read and write
368D000
heap
page read and write
BD8D000
stack
page read and write
28816000
trusted library allocation
page read and write
286C1000
trusted library allocation
page read and write
AA0000
heap
page read and write
68A000
trusted library allocation
page execute and read and write
6C5000
heap
page read and write
63C000
trusted library allocation
page execute and read and write
FBBC000
trusted library allocation
page read and write
1359E000
stack
page read and write
5AD8000
heap
page read and write
283F5000
trusted library allocation
page read and write
97FE000
stack
page read and write
11661000
trusted library allocation
page read and write
5C90000
heap
page read and write
740000
trusted library allocation
page read and write
F077000
trusted library allocation
page read and write
1281D000
stack
page read and write
8EBE000
stack
page read and write
BA6E000
heap
page read and write
38FB000
trusted library allocation
page read and write
529F000
heap
page read and write
36C2000
heap
page read and write
27CF9000
trusted library allocation
page read and write
5CBC000
stack
page read and write
B0FE000
stack
page read and write
842000
trusted library allocation
page execute and read and write
36AE000
heap
page read and write
10D8D000
stack
page read and write
B47E000
stack
page read and write
1A35D000
stack
page read and write
EFBF000
trusted library allocation
page read and write
B9FE000
stack
page read and write
199000
stack
page read and write
63A000
trusted library allocation
page execute and read and write
EEA9000
trusted library allocation
page read and write
372D000
trusted library allocation
page read and write
4BE0000
trusted library allocation
page execute and read and write
36B8000
heap
page read and write
8A7000
trusted library allocation
page execute and read and write
1028E000
stack
page read and write
13E5E000
stack
page read and write
3676000
heap
page read and write
108CE000
stack
page read and write
366D000
heap
page read and write
3677000
heap
page read and write
FECE000
stack
page read and write
4D10000
heap
page read and write
3695000
heap
page read and write
647D000
stack
page read and write
593E000
stack
page read and write
13F9E000
stack
page read and write
83A000
trusted library allocation
page execute and read and write
5225000
heap
page read and write
9E3E000
stack
page read and write
5A4000
heap
page read and write
1139A000
trusted library allocation
page read and write
36B5000
heap
page read and write
32EE000
stack
page read and write
4F5E000
stack
page read and write
A1FE000
stack
page read and write
38C7000
trusted library allocation
page read and write
3A19000
trusted library allocation
page read and write
146D6000
trusted library allocation
page read and write
56CF000
stack
page read and write
99B000
trusted library allocation
page execute and read and write
B30000
heap
page read and write
13D5E000
stack
page read and write
3641000
heap
page read and write
4E6D000
stack
page read and write
BAD9000
heap
page read and write
476E000
stack
page read and write
600000
trusted library allocation
page read and write
B1FE000
stack
page read and write
B37000
heap
page read and write
3DD7000
trusted library allocation
page read and write
993D000
stack
page read and write
982000
trusted library allocation
page execute and read and write
27DF2000
trusted library allocation
page read and write
48EE000
stack
page read and write
400000
unkown
page readonly
366F000
heap
page read and write
BAEF000
heap
page read and write
3800000
trusted library allocation
page read and write
F28A000
trusted library allocation
page read and write
A6FE000
stack
page read and write
77E000
heap
page read and write
EDAE000
trusted library allocation
page read and write
D3CE000
stack
page read and write
3695000
heap
page read and write
50AF000
stack
page read and write
77A000
heap
page read and write
564F000
stack
page read and write
42A000
unkown
page write copy
1A91E000
stack
page read and write
AA7000
heap
page read and write
50ED000
stack
page read and write
ADBD000
stack
page read and write
7AFD000
stack
page read and write
F7BD000
trusted library allocation
page read and write
8FFE000
stack
page read and write
5F7E000
stack
page read and write
F114000
trusted library allocation
page read and write
1150B000
trusted library allocation
page read and write
877E000
stack
page read and write
B20000
trusted library allocation
page read and write
9B000
stack
page read and write
522D000
heap
page read and write
4BF0000
heap
page read and write
F1CD000
trusted library allocation
page read and write
32FB000
stack
page read and write
36C2000
heap
page read and write
36B6000
heap
page read and write
800000
heap
page execute and read and write
There are 1097 hidden memdumps, click here to show them.