IOC Report
784069483573273747434.exe

loading gifFilesProcessesURLsDomainsIPsRegistryMemdumps105010010Label

Files

File Path
Type
Category
Malicious
Download
784069483573273747434.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\ProgramData\remcos\logs.dat
data
dropped
malicious
C:\Users\user\AppData\Local\biopsies\sacculation.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\sacculation.vbs
data
dropped
malicious
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_svchost.exe_dab061d4385184275753fe87530fcaecfa7b2d_101a8159_06df1fa8-259e-434b-8334-dded24203592\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_svchost.exe_df7aa141c2493b459bba3de3d1bfd328dd3a48f8_101a8159_924e4c08-5de1-49a8-a45b-3cbf9c798d8b\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER7B82.tmp.dmp
Mini DuMP crash report, 14 streams, Wed Mar 26 11:51:30 2025, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER7FD8.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER817F.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER8FD5.tmp.dmp
Mini DuMP crash report, 14 streams, Wed Mar 26 11:51:34 2025, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER9053.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER9083.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\BLNS00AZ\json[1].json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\aut655A.tmp
data
dropped
C:\Users\user\AppData\Local\Temp\aut6BB3.tmp
data
dropped
C:\Users\user\AppData\Local\Temp\aut9D33.tmp
data
dropped
C:\Users\user\AppData\Local\Temp\autA409.tmp
data
dropped
C:\Users\user\AppData\Local\Temp\bhv9B9.tmp
Extensible storage user DataBase, version 0x620, checksum 0xd60f4d66, page size 32768, DirtyShutdown, Windows version 10.0
dropped
C:\Users\user\AppData\Local\Temp\oikgfvmmutkvxhnmaeoztozmbb
Unicode text, UTF-16, little-endian text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\uppishly
data
dropped
C:\Windows\appcompat\Programs\Amcache.hve
MS Windows registry file, NT/2000 or above
dropped
There are 11 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\784069483573273747434.exe
"C:\Users\user\Desktop\784069483573273747434.exe"
malicious
C:\Users\user\AppData\Local\biopsies\sacculation.exe
"C:\Users\user\Desktop\784069483573273747434.exe"
malicious
C:\Windows\SysWOW64\svchost.exe
"C:\Users\user\Desktop\784069483573273747434.exe"
malicious
C:\Windows\System32\wscript.exe
"C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\sacculation.vbs"
malicious
C:\Users\user\AppData\Local\biopsies\sacculation.exe
"C:\Users\user\AppData\Local\biopsies\sacculation.exe"
malicious
C:\Windows\SysWOW64\svchost.exe
"C:\Users\user\AppData\Local\biopsies\sacculation.exe"
malicious
C:\Users\user\AppData\Local\biopsies\sacculation.exe
"C:\Users\user\AppData\Local\biopsies\sacculation.exe"
malicious
C:\Windows\SysWOW64\svchost.exe
"C:\Users\user\AppData\Local\biopsies\sacculation.exe"
malicious
C:\Windows\SysWOW64\svchost.exe
C:\Windows\SysWOW64\svchost.exe /stext "C:\Users\user\AppData\Local\Temp\oikgfvmmutkvxhnmaeoztozmbb"
malicious
C:\Windows\SysWOW64\svchost.exe
C:\Windows\SysWOW64\svchost.exe /stext "C:\Users\user\AppData\Local\Temp\oikgfvmmutkvxhnmaeoztozmbb"
malicious
C:\Windows\SysWOW64\svchost.exe
C:\Windows\SysWOW64\svchost.exe /stext "C:\Users\user\AppData\Local\Temp\llmsxbdzeehwncwdpiujifr"
malicious
C:\Windows\SysWOW64\svchost.exe
C:\Windows\SysWOW64\svchost.exe /stext "C:\Users\user\AppData\Local\Temp\yywqnsalgfkklswlorjrfnupv"
malicious
C:\Windows\SysWOW64\svchost.exe
C:\Windows\SysWOW64\svchost.exe /stext "C:\Users\user\AppData\Local\Temp\yywqnsalgfkklswlorjrfnupv"
malicious
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 7156 -s 652
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 7156 -s 652
There are 5 hidden processes, click here to show them.

URLs

Name
IP
Malicious
https://www.office.com/
unknown
http://www.imvu.comr
unknown
https://aefd.nelreports.net/api/report?cat=bingth
unknown
http://www.imvu.com
unknown
https://aefd.nelreports.net/api/report?cat=wsb
unknown
http://c.pki.goog/r/gsr1.crl0
unknown
http://upx.sf.net
unknown
http://www.nirsoft.net
unknown
https://aefd.nelreports.net/api/report?cat=bingaotak
unknown
https://assets.msn.com/weathermapdata/1/static/weather/Icons/JyNGQgA=/Condition/AAehwh2.svg
unknown
https://deff.nelreports.net/api/report?cat=msn
unknown
http://c.pki.goog/we2/64OUIVzpZV4.crl0
unknown
http://i.pki.goog/we2.crt0
unknown
http://o.pki.goog/we20%
unknown
http://www.imvu.comhttp://www.ebuddy.comhttps://www.google.com
unknown
http://geoplugin.net/json.gp
178.237.33.50
https://www.google.com
unknown
https://M365CDN.nel.measure.office.net/api/report?FrontEnd=AkamaiCDNWorldWide&DestinationEndpoint=EL
unknown
https://dl.google.com/update2/installers/icons/%7B8a69d345-d564-463c-aff1-a69d9e530f96%7D.bmp?lang=e
unknown
https://aefd.nelreports.net/api/report?cat=bingaot
unknown
http://geoplugin.net/json.gp/C
unknown
https://maps.windows.com/windows-app-web-link
unknown
http://i.pki.goog/gsr1.crt0-
unknown
https://cxcs.microsoft.net/api/settings/en-GB/xml/settings-tipset?release=20h1&sku=Professional&plat
unknown
http://c.pki.goog/r/r4.crl0
unknown
http://i.pki.goog/r4.crt0
unknown
https://aefd.nelreports.net/api/report?cat=bingrms
unknown
https://www.google.com/accounts/servicelogin
unknown
https://login.yahoo.com/config/login
unknown
http://www.nirsoft.net/
unknown
https://aefd.nelreports.net/api/report?cat=wsb&ndcParam=QWthbWFp
unknown
https://ecs.nel.measure.office.net?TenantId=ODSP_Sync_Client&DestinationEndpoint=Edge-Prod-LAX31r5c&
unknown
http://www.ebuddy.com
unknown
There are 23 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
geoplugin.net
178.237.33.50

IPs

IP
Domain
Country
Malicious
192.3.101.149
unknown
United States
malicious
178.237.33.50
geoplugin.net
Netherlands

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\SOFTWARE\Rmc-3SSI04
exepath
HKEY_CURRENT_USER\SOFTWARE\Rmc-3SSI04
licence
\REGISTRY\A\{4f012004-2dc9-f57c-f9dc-227e7282935f}\Root\InventoryApplicationFile\svchost.exe|1260c7b0519b1406
ProgramId
\REGISTRY\A\{4f012004-2dc9-f57c-f9dc-227e7282935f}\Root\InventoryApplicationFile\svchost.exe|1260c7b0519b1406
FileId
\REGISTRY\A\{4f012004-2dc9-f57c-f9dc-227e7282935f}\Root\InventoryApplicationFile\svchost.exe|1260c7b0519b1406
LowerCaseLongPath
\REGISTRY\A\{4f012004-2dc9-f57c-f9dc-227e7282935f}\Root\InventoryApplicationFile\svchost.exe|1260c7b0519b1406
LongPathHash
\REGISTRY\A\{4f012004-2dc9-f57c-f9dc-227e7282935f}\Root\InventoryApplicationFile\svchost.exe|1260c7b0519b1406
Name
\REGISTRY\A\{4f012004-2dc9-f57c-f9dc-227e7282935f}\Root\InventoryApplicationFile\svchost.exe|1260c7b0519b1406
OriginalFileName
\REGISTRY\A\{4f012004-2dc9-f57c-f9dc-227e7282935f}\Root\InventoryApplicationFile\svchost.exe|1260c7b0519b1406
Publisher
\REGISTRY\A\{4f012004-2dc9-f57c-f9dc-227e7282935f}\Root\InventoryApplicationFile\svchost.exe|1260c7b0519b1406
Version
\REGISTRY\A\{4f012004-2dc9-f57c-f9dc-227e7282935f}\Root\InventoryApplicationFile\svchost.exe|1260c7b0519b1406
BinFileVersion
\REGISTRY\A\{4f012004-2dc9-f57c-f9dc-227e7282935f}\Root\InventoryApplicationFile\svchost.exe|1260c7b0519b1406
BinaryType
\REGISTRY\A\{4f012004-2dc9-f57c-f9dc-227e7282935f}\Root\InventoryApplicationFile\svchost.exe|1260c7b0519b1406
ProductName
\REGISTRY\A\{4f012004-2dc9-f57c-f9dc-227e7282935f}\Root\InventoryApplicationFile\svchost.exe|1260c7b0519b1406
ProductVersion
\REGISTRY\A\{4f012004-2dc9-f57c-f9dc-227e7282935f}\Root\InventoryApplicationFile\svchost.exe|1260c7b0519b1406
LinkDate
\REGISTRY\A\{4f012004-2dc9-f57c-f9dc-227e7282935f}\Root\InventoryApplicationFile\svchost.exe|1260c7b0519b1406
BinProductVersion
\REGISTRY\A\{4f012004-2dc9-f57c-f9dc-227e7282935f}\Root\InventoryApplicationFile\svchost.exe|1260c7b0519b1406
AppxPackageFullName
\REGISTRY\A\{4f012004-2dc9-f57c-f9dc-227e7282935f}\Root\InventoryApplicationFile\svchost.exe|1260c7b0519b1406
AppxPackageRelativeId
\REGISTRY\A\{4f012004-2dc9-f57c-f9dc-227e7282935f}\Root\InventoryApplicationFile\svchost.exe|1260c7b0519b1406
Size
\REGISTRY\A\{4f012004-2dc9-f57c-f9dc-227e7282935f}\Root\InventoryApplicationFile\svchost.exe|1260c7b0519b1406
Language
\REGISTRY\A\{4f012004-2dc9-f57c-f9dc-227e7282935f}\Root\InventoryApplicationFile\svchost.exe|1260c7b0519b1406
IsOsComponent
\REGISTRY\A\{4f012004-2dc9-f57c-f9dc-227e7282935f}\Root\InventoryApplicationFile\svchost.exe|1260c7b0519b1406
Usn
HKEY_CURRENT_USER\SOFTWARE\Microsoft\IdentityCRL\Immersive\production\Token\{67082621-8D18-4333-9C64-10DE93676363}
DeviceTicket
HKEY_CURRENT_USER\SOFTWARE\Microsoft\IdentityCRL\Immersive\production\Token\{67082621-8D18-4333-9C64-10DE93676363}
DeviceId
HKEY_CURRENT_USER\SOFTWARE\Microsoft\IdentityCRL\Immersive\production\Token\{67082621-8D18-4333-9C64-10DE93676363}
ApplicationFlags
HKEY_CURRENT_USER\SOFTWARE\Microsoft\IdentityCRL\Immersive\production\Property
0018000DDABBE6B3
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\IdentityCRL\ClockData
ClockTimeSeconds
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\IdentityCRL\ClockData
TickCount
There are 18 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
Download
3031000
heap
page read and write
malicious
4D5F000
stack
page read and write
malicious
3224000
heap
page read and write
malicious
400000
system
page execute and read and write
malicious
3200000
heap
page read and write
malicious
3EE0000
direct allocation
page read and write
malicious
400000
system
page execute and read and write
malicious
4F5F000
stack
page read and write
malicious
3012000
heap
page read and write
malicious
3B10000
direct allocation
page read and write
malicious
E30000
direct allocation
page read and write
malicious
300E000
heap
page read and write
malicious
4FEE000
stack
page read and write
6401000
heap
page read and write
5A2F000
stack
page read and write
97E000
unkown
page read and write
328F000
heap
page read and write
326B000
heap
page read and write
874000
unkown
page readonly
38CF000
stack
page read and write
326B000
heap
page read and write
7E0000
heap
page read and write
531F000
stack
page read and write
3553000
heap
page read and write
328F000
heap
page read and write
1731000
heap
page read and write
3D30000
direct allocation
page read and write
3424000
heap
page read and write
987000
unkown
page readonly
509F000
stack
page read and write
3013000
heap
page read and write
1162000
heap
page read and write
1246000
heap
page read and write
2EB0000
heap
page read and write
F31000
heap
page read and write
147E000
stack
page read and write
FC1000
heap
page read and write
328F000
heap
page read and write
1700000
heap
page read and write
3013000
heap
page read and write
974000
unkown
page readonly
3024000
heap
page read and write
225E000
stack
page read and write
3150000
heap
page readonly
44F000
system
page execute and read and write
172B000
heap
page read and write
1201000
heap
page read and write
882000
unkown
page write copy
3024000
heap
page read and write
3AEE000
direct allocation
page read and write
EF8000
heap
page read and write
3200000
heap
page read and write
1120000
heap
page read and write
982000
unkown
page write copy
3013000
heap
page read and write
2EBC000
stack
page read and write
33E4000
heap
page read and write
327A000
heap
page read and write
82E000
stack
page read and write
429E000
direct allocation
page read and write
87E000
unkown
page read and write
50A0000
trusted library allocation
page read and write
4083000
direct allocation
page read and write
87E000
unkown
page read and write
21EDDBF0000
heap
page read and write
676F000
heap
page read and write
2E12000
heap
page read and write
429E000
direct allocation
page read and write
FC1000
heap
page read and write
38D0000
direct allocation
page read and write
7EE000
stack
page read and write
3576000
heap
page read and write
3546000
heap
page read and write
EF0000
heap
page read and write
3013000
heap
page read and write
94F000
unkown
page readonly
3013000
heap
page read and write
6700000
heap
page read and write
987000
unkown
page readonly
35B5000
heap
page read and write
3024000
heap
page read and write
4F9C000
stack
page read and write
2F00000
heap
page read and write
50DC000
stack
page read and write
4D9B000
stack
page read and write
3024000
heap
page read and write
3013000
heap
page read and write
3013000
heap
page read and write
3013000
heap
page read and write
DE0000
heap
page read and write
6CC24FA000
stack
page read and write
1654000
heap
page read and write
2C3C000
stack
page read and write
3024000
heap
page read and write
37B0000
direct allocation
page read and write
3024000
heap
page read and write
1E5E000
stack
page read and write
3013000
heap
page read and write
16FA000
heap
page read and write
3202000
heap
page read and write
50A0000
trusted library allocation
page read and write
11A6000
heap
page read and write
3013000
heap
page read and write
31FF000
stack
page read and write
887000
unkown
page readonly
3024000
heap
page read and write
84F000
unkown
page readonly
30F0000
heap
page read and write
475000
system
page execute and read and write
87E000
unkown
page write copy
3013000
heap
page read and write
328F000
heap
page read and write
6CC000
stack
page read and write
3024000
heap
page read and write
3575000
heap
page read and write
3213000
heap
page read and write
50A0000
trusted library allocation
page read and write
37B0000
direct allocation
page read and write
21EDDC27000
heap
page read and write
882000
unkown
page write copy
5D2E000
stack
page read and write
C39000
stack
page read and write
328F000
heap
page read and write
3013000
heap
page read and write
5900000
heap
page read and write
16A0000
heap
page read and write
11D8000
heap
page read and write
5001000
heap
page read and write
3024000
heap
page read and write
126A000
heap
page read and write
6434000
heap
page read and write
3013000
heap
page read and write
3024000
heap
page read and write
1228000
heap
page read and write
F48000
heap
page read and write
D3E000
stack
page read and write
F8C000
heap
page read and write
4F70000
heap
page read and write
3553000
heap
page read and write
3249000
heap
page read and write
3013000
heap
page read and write
2EFA000
stack
page read and write
17C4000
heap
page read and write
4C5E000
stack
page read and write
3553000
heap
page read and write
50A0000
trusted library allocation
page read and write
3013000
heap
page read and write
120B000
heap
page read and write
3013000
heap
page read and write
1693000
heap
page read and write
3024000
heap
page read and write
2F50000
heap
page read and write
45D000
system
page execute and read and write
2930000
heap
page read and write
3585000
heap
page read and write
3730000
direct allocation
page read and write
3013000
heap
page read and write
6423000
heap
page read and write
7C1000
unkown
page execute read
38D3000
direct allocation
page read and write
8C0000
unkown
page readonly
347E000
stack
page read and write
3024000
heap
page read and write
3013000
heap
page read and write
3013000
heap
page read and write
11CB000
heap
page read and write
358C000
heap
page read and write
126B000
heap
page read and write
126C000
heap
page read and write
3013000
heap
page read and write
4229000
direct allocation
page read and write
501E000
stack
page read and write
11CA000
heap
page read and write
21EDDF0E000
heap
page read and write
3110000
heap
page read and write
3670000
direct allocation
page read and write
2EE0000
heap
page read and write
8C1000
unkown
page execute read
887000
unkown
page readonly
3714000
heap
page read and write
11B0000
heap
page read and write
12A1000
heap
page read and write
3D33000
direct allocation
page read and write
192E000
stack
page read and write
319E000
stack
page read and write
2FDE000
stack
page read and write
400000
system
page execute and read and write
3024000
heap
page read and write
325D000
heap
page read and write
15CE000
stack
page read and write
6801000
heap
page read and write
3024000
heap
page read and write
3518000
heap
page read and write
126A000
heap
page read and write
3013000
heap
page read and write
3024000
heap
page read and write
473000
system
page execute and read and write
3013000
heap
page read and write
3013000
heap
page read and write
3013000
heap
page read and write
3102000
heap
page read and write
352E000
heap
page read and write
37CE000
stack
page read and write
3013000
heap
page read and write
3013000
heap
page read and write
3024000
heap
page read and write
3013000
heap
page read and write
521D000
stack
page read and write
3013000
heap
page read and write
1217000
heap
page execute and read and write
16FA000
heap
page read and write
F38000
heap
page read and write
328F000
heap
page read and write
33E0000
heap
page read and write
12A1000
heap
page read and write
F8B000
heap
page read and write
7C1000
unkown
page execute read
1164000
heap
page read and write
328F000
heap
page read and write
3013000
heap
page read and write
21EDDBA0000
heap
page read and write
3013000
heap
page read and write
3024000
heap
page read and write
1751000
heap
page read and write
3AEE000
direct allocation
page read and write
94F000
unkown
page readonly
3024000
heap
page read and write
4229000
direct allocation
page read and write
353D000
heap
page read and write
3213000
heap
page read and write
3024000
heap
page read and write
3ED9000
direct allocation
page read and write
301B000
heap
page read and write
7C1000
unkown
page execute read
3024000
heap
page read and write
CDB000
stack
page read and write
F24000
heap
page read and write
3DA000
stack
page read and write
1204000
heap
page read and write
7C0000
unkown
page readonly
3024000
heap
page read and write
21EDDC02000
heap
page read and write
3024000
heap
page read and write
84F000
unkown
page readonly
3013000
heap
page read and write
51DF000
stack
page read and write
139E000
heap
page read and write
3512000
heap
page read and write
354D000
heap
page read and write
3013000
heap
page read and write
3024000
heap
page read and write
126A000
heap
page read and write
16FA000
heap
page read and write
359A000
heap
page read and write
3950000
direct allocation
page read and write
FBB000
heap
page read and write
3532000
heap
page read and write
11CA000
heap
page read and write
1170000
heap
page execute and read and write
11CA000
heap
page read and write
3CB3000
direct allocation
page read and write
122D000
heap
page read and write
3544000
heap
page read and write
F66000
heap
page read and write
3532000
heap
page read and write
21EDDBF8000
heap
page read and write
3F60000
direct allocation
page read and write
3013000
heap
page read and write
5762000
unclassified section
page execute and read and write
3024000
heap
page read and write
328F000
heap
page read and write
307C000
stack
page read and write
F66000
heap
page read and write
16A0000
heap
page read and write
3013000
heap
page read and write
3102000
heap
page read and write
358B000
heap
page read and write
3024000
heap
page read and write
740000
heap
page read and write
1332000
heap
page read and write
3553000
heap
page read and write
3024000
heap
page read and write
3562000
heap
page read and write
3013000
heap
page read and write
39FD000
direct allocation
page read and write
37C0000
heap
page read and write
10F0000
heap
page read and write
3024000
heap
page read and write
6600000
heap
page read and write
3251000
heap
page read and write
6CC26FE000
stack
page read and write
1218000
heap
page read and write
3024000
heap
page read and write
6401000
heap
page read and write
3013000
heap
page read and write
171B000
heap
page read and write
100F000
stack
page read and write
3024000
heap
page read and write
3024000
heap
page read and write
874000
unkown
page readonly
16C7000
heap
page read and write
3553000
heap
page read and write
328A000
heap
page read and write
4100000
direct allocation
page read and write
3535000
heap
page read and write
3013000
heap
page read and write
5B6E000
stack
page read and write
974000
unkown
page readonly
1130000
heap
page read and write
3553000
heap
page read and write
13DB000
stack
page read and write
3024000
heap
page read and write
3024000
heap
page read and write
16EF000
stack
page read and write
3563000
heap
page read and write
3D30000
direct allocation
page read and write
FAB000
heap
page read and write
3D33000
direct allocation
page read and write
38D3000
direct allocation
page read and write
3ECE000
direct allocation
page read and write
3532000
heap
page read and write
3024000
heap
page read and write
3024000
heap
page read and write
102F000
heap
page read and write
452000
system
page execute and read and write
CCE000
stack
page read and write
760000
heap
page read and write
3024000
heap
page read and write
3AEE000
direct allocation
page read and write
169A000
heap
page read and write
328F000
heap
page read and write
3ED9000
direct allocation
page read and write
3024000
heap
page read and write
3544000
heap
page read and write
6701000
heap
page read and write
7C0000
unkown
page readonly
3710000
heap
page read and write
3013000
heap
page read and write
3F60000
direct allocation
page read and write
F66000
heap
page read and write
1211000
heap
page read and write
357E000
heap
page read and write
3024000
heap
page read and write
1650000
heap
page read and write
103D000
stack
page read and write
21EDDC16000
heap
page read and write
3553000
heap
page read and write
7C0000
unkown
page readonly
353D000
heap
page read and write
3950000
direct allocation
page read and write
16FB000
heap
page read and write
3500000
heap
page read and write
6CC2CFE000
stack
page read and write
3F4E000
direct allocation
page read and write
3544000
heap
page read and write
3013000
heap
page read and write
F90000
heap
page read and write
3545000
heap
page read and write
6010000
heap
page read and write
3532000
heap
page read and write
3013000
heap
page read and write
3024000
heap
page read and write
16D5000
heap
page read and write
2E31000
heap
page read and write
3024000
heap
page read and write
3E59000
direct allocation
page read and write
3213000
heap
page read and write
3024000
heap
page read and write
2CF0000
heap
page read and write
3561000
heap
page read and write
3013000
heap
page read and write
3024000
heap
page read and write
3013000
heap
page read and write
328F000
heap
page read and write
DCA000
stack
page read and write
5E2F000
stack
page read and write
CBF000
stack
page read and write
367F000
stack
page read and write
3013000
heap
page read and write
3024000
heap
page read and write
3013000
heap
page read and write
3024000
heap
page read and write
357E000
stack
page read and write
3013000
heap
page read and write
3024000
heap
page read and write
3013000
heap
page read and write
830000
heap
page read and write
3024000
heap
page read and write
595B000
heap
page read and write
3024000
heap
page read and write
16B7000
heap
page read and write
643E000
heap
page read and write
5F7B000
stack
page read and write
50A0000
trusted library allocation
page read and write
3013000
heap
page read and write
3576000
heap
page read and write
2F30000
heap
page read and write
3013000
heap
page read and write
3E59000
direct allocation
page read and write
790000
heap
page read and write
3013000
heap
page read and write
3026000
heap
page read and write
3013000
heap
page read and write
3024000
heap
page read and write
84F000
unkown
page readonly
6401000
heap
page read and write
11A6000
heap
page read and write
3101000
heap
page read and write
13FC000
stack
page read and write
3530000
heap
page read and write
3024000
heap
page read and write
3A6E000
direct allocation
page read and write
3ECE000
direct allocation
page read and write
3013000
heap
page read and write
2C7C000
stack
page read and write
328F000
heap
page read and write
6CC29FF000
stack
page read and write
1053000
heap
page read and write
12C1000
heap
page read and write
1138000
heap
page read and write
3013000
heap
page read and write
5090000
heap
page read and write
3024000
heap
page read and write
2E21000
heap
page read and write
328F000
heap
page read and write
6863000
heap
page read and write
1668000
heap
page read and write
874000
unkown
page readonly
3013000
heap
page read and write
3553000
heap
page read and write
3507000
heap
page read and write
16FB000
heap
page read and write
3585000
heap
page read and write
1171000
heap
page read and write
3853000
direct allocation
page read and write
38D0000
direct allocation
page read and write
1211000
heap
page read and write
39FD000
direct allocation
page read and write
2E02000
heap
page read and write
59D2000
heap
page read and write
3560000
heap
page read and write
1201000
heap
page read and write
3EDD000
direct allocation
page read and write
30AF000
stack
page read and write
3024000
heap
page read and write
328F000
heap
page read and write
4EDC000
stack
page read and write
3013000
heap
page read and write
301B000
heap
page read and write
3253000
heap
page read and write
358B000
heap
page read and write
1221000
heap
page read and write
21EDDBB0000
heap
page read and write
1246000
heap
page read and write
355A000
heap
page read and write
3013000
heap
page read and write
3113000
heap
page read and write
353A000
heap
page read and write
12A1000
heap
page read and write
2DD0000
heap
page readonly
3213000
heap
page read and write
6CC2FFB000
stack
page read and write
1731000
heap
page read and write
302C000
heap
page read and write
3532000
heap
page read and write
3C10000
direct allocation
page read and write
2300000
heap
page read and write
87E000
unkown
page read and write
2FE0000
heap
page read and write
3577000
heap
page read and write
337E000
stack
page read and write
3013000
heap
page read and write
3024000
heap
page read and write
1830000
heap
page read and write
459000
system
page execute and read and write
3024000
heap
page read and write
16D5000
heap
page read and write
3024000
heap
page read and write
3A79000
direct allocation
page read and write
3730000
direct allocation
page read and write
1060000
heap
page read and write
3A7D000
direct allocation
page read and write
3013000
heap
page read and write
3013000
heap
page read and write
116B000
heap
page read and write
11CA000
heap
page read and write
422D000
direct allocation
page read and write
2F0C000
heap
page read and write
6800000
heap
page read and write
2E3C000
stack
page read and write
11CA000
heap
page read and write
11EA000
heap
page read and write
6CC2EFF000
stack
page read and write
3E5D000
direct allocation
page read and write
3013000
heap
page read and write
4A01000
heap
page read and write
3013000
heap
page read and write
6340000
unclassified section
page execute and read and write
107D000
stack
page read and write
50A0000
trusted library allocation
page read and write
328F000
heap
page read and write
3024000
heap
page read and write
301B000
heap
page read and write
3EDD000
direct allocation
page read and write
2C02000
heap
page read and write
328F000
heap
page read and write
3024000
heap
page read and write
3013000
heap
page read and write
6801000
heap
page read and write
328F000
heap
page read and write
5800000
heap
page read and write
3013000
heap
page read and write
3A6E000
direct allocation
page read and write
3C10000
direct allocation
page read and write
7C0000
unkown
page readonly
3013000
heap
page read and write
3544000
heap
page read and write
3013000
heap
page read and write
328F000
heap
page read and write
3013000
heap
page read and write
3024000
heap
page read and write
1179000
heap
page read and write
1610000
heap
page read and write
16FA000
heap
page read and write
35A3000
heap
page read and write
471000
system
page execute and read and write
1202000
heap
page read and write
3024000
heap
page read and write
3024000
heap
page read and write
3546000
heap
page read and write
3584000
heap
page read and write
50A0000
trusted library allocation
page read and write
3431000
heap
page read and write
3000000
heap
page read and write
3ECE000
direct allocation
page read and write
56D9000
unclassified section
page execute and read and write
14B0000
heap
page read and write
3097000
stack
page read and write
3013000
heap
page read and write
16D5000
heap
page read and write
350E000
heap
page read and write
3253000
heap
page read and write
3024000
heap
page read and write
3024000
heap
page read and write
6832000
heap
page read and write
3577000
heap
page read and write
11D1000
heap
page read and write
3500000
heap
page read and write
5967000
heap
page read and write
FC1000
heap
page read and write
35A4000
heap
page read and write
1E40000
heap
page read and write
5070000
heap
page read and write
6CC28FF000
stack
page read and write
16BD000
heap
page read and write
FFF000
stack
page read and write
31E0000
heap
page read and write
575F000
unclassified section
page execute and read and write
11CB000
heap
page read and write
12A1000
heap
page read and write
56F3000
unclassified section
page execute and read and write
3E59000
direct allocation
page read and write
3013000
heap
page read and write
3024000
heap
page read and write
3024000
heap
page read and write
2E00000
heap
page read and write
3B90000
direct allocation
page read and write
3562000
heap
page read and write
1178000
heap
page read and write
1DD0000
heap
page read and write
39F9000
direct allocation
page read and write
3546000
heap
page read and write
3024000
heap
page read and write
4FDF000
stack
page read and write
7C0000
unkown
page readonly
F66000
heap
page read and write
301B000
heap
page read and write
2F90000
heap
page readonly
169F000
heap
page execute and read and write
3553000
heap
page read and write
129B000
heap
page read and write
1201000
heap
page read and write
3013000
heap
page read and write
3202000
heap
page read and write
3013000
heap
page read and write
58EF000
stack
page read and write
3013000
heap
page read and write
3212000
heap
page read and write
3024000
heap
page read and write
3013000
heap
page read and write
3024000
heap
page read and write
F4E000
heap
page read and write
3532000
heap
page read and write
19CF000
stack
page read and write
F8B000
heap
page read and write
887000
unkown
page readonly
126A000
heap
page read and write
3013000
heap
page read and write
352E000
heap
page read and write
3E5D000
direct allocation
page read and write
3013000
heap
page read and write
3546000
heap
page read and write
3024000
heap
page read and write
1660000
heap
page read and write
6400000
heap
page read and write
F66000
heap
page read and write
3553000
heap
page read and write
3013000
heap
page read and write
3853000
direct allocation
page read and write
3024000
heap
page read and write
2F03000
heap
page read and write
FC1000
heap
page read and write
3024000
heap
page read and write
343E000
stack
page read and write
6002000
heap
page read and write
7A0000
heap
page readonly
887000
unkown
page readonly
3546000
heap
page read and write
3213000
heap
page read and write
1731000
heap
page read and write
328F000
heap
page read and write
3535000
heap
page read and write
1731000
heap
page read and write
57EE000
stack
page read and write
3013000
heap
page read and write
325D000
heap
page read and write
328F000
stack
page read and write
3024000
heap
page read and write
3024000
heap
page read and write
328F000
heap
page read and write
11D0000
heap
page read and write
13BF000
stack
page read and write
887000
unkown
page readonly
3024000
heap
page read and write
353F000
stack
page read and write
F38000
heap
page read and write
F22000
heap
page read and write
3013000
heap
page read and write
356B000
heap
page read and write
3024000
heap
page read and write
650000
heap
page read and write
2CC0000
heap
page read and write
11A6000
heap
page read and write
3024000
heap
page read and write
3013000
heap
page read and write
50A0000
trusted library allocation
page read and write
30FF000
stack
page read and write
1218000
heap
page read and write
3D33000
direct allocation
page read and write
97E000
unkown
page write copy
3251000
heap
page read and write
87E000
unkown
page write copy
400000
system
page execute and read and write
F30000
heap
page execute and read and write
353E000
heap
page read and write
3102000
heap
page read and write
3412000
heap
page read and write
5CAE000
stack
page read and write
128B000
heap
page read and write
30B3000
stack
page read and write
646F000
heap
page read and write
3213000
heap
page read and write
3013000
heap
page read and write
16AD000
heap
page read and write
3013000
heap
page read and write
3D30000
direct allocation
page read and write
4100000
direct allocation
page read and write
5BAD000
stack
page read and write
635B000
unclassified section
page execute and read and write
31DE000
stack
page read and write
3013000
heap
page read and write
37A0000
direct allocation
page read and write
3C10000
direct allocation
page read and write
3140000
heap
page read and write
3950000
direct allocation
page read and write
5680000
unclassified section
page execute and read and write
3024000
heap
page read and write
3024000
heap
page read and write
471000
system
page execute and read and write
3013000
heap
page read and write
3301000
heap
page read and write
16D5000
heap
page read and write
3102000
heap
page read and write
6401000
heap
page read and write
3024000
heap
page read and write
3024000
heap
page read and write
37C4000
heap
page read and write
84F000
unkown
page readonly
1271000
heap
page read and write
353A000
heap
page read and write
CEF000
stack
page read and write
35C6000
heap
page read and write
3024000
heap
page read and write
3013000
heap
page read and write
3CB3000
direct allocation
page read and write
35C5000
heap
page read and write
F31000
heap
page read and write
2CA0000
heap
page read and write
3DB0000
direct allocation
page read and write
874000
unkown
page readonly
84F000
unkown
page readonly
126B000
heap
page read and write
3532000
heap
page read and write
FBE000
stack
page read and write
13CF000
stack
page read and write
3024000
heap
page read and write
1188000
heap
page read and write
3024000
heap
page read and write
3024000
heap
page read and write
F38000
heap
page read and write
12A2000
heap
page read and write
1246000
heap
page read and write
1198000
heap
page read and write
6891000
heap
page read and write
3DB0000
direct allocation
page read and write
3024000
heap
page read and write
5E7E000
stack
page read and write
3533000
heap
page read and write
400000
system
page execute and read and write
328F000
heap
page read and write
3A79000
direct allocation
page read and write
1080000
heap
page read and write
4083000
direct allocation
page read and write
5901000
heap
page read and write
2E90000
heap
page read and write
11AE000
stack
page read and write
301B000
heap
page read and write
70C000
stack
page read and write
1246000
heap
page read and write
3026000
heap
page read and write
126A000
heap
page read and write
1210000
heap
page execute and read and write
3433000
heap
page read and write
3574000
heap
page read and write
874000
unkown
page readonly
1692000
heap
page read and write
592E000
stack
page read and write
328F000
heap
page read and write
3024000
heap
page read and write
7C1000
unkown
page execute read
12A1000
heap
page read and write
3102000
heap
page read and write
301B000
heap
page read and write
358A000
heap
page read and write
3013000
heap
page read and write
1480000
heap
page read and write
3024000
heap
page read and write
56DD000
unclassified section
page execute and read and write
3013000
heap
page read and write
3532000
heap
page read and write
3400000
heap
page read and write
770000
heap
page read and write
3024000
heap
page read and write
11A6000
heap
page read and write
3024000
heap
page read and write
1090000
heap
page read and write
3ED9000
direct allocation
page read and write
3013000
heap
page read and write
16D5000
heap
page read and write
1E0F000
stack
page read and write
17AE000
heap
page read and write
3013000
heap
page read and write
643E000
heap
page read and write
3013000
heap
page read and write
E20000
heap
page read and write
5901000
heap
page read and write
3DB0000
direct allocation
page read and write
77A000
stack
page read and write
7C0000
unkown
page readonly
21EDDF00000
heap
page read and write
3554000
heap
page read and write
3EDD000
direct allocation
page read and write
3024000
heap
page read and write
4E5E000
stack
page read and write
3024000
heap
page read and write
3A7D000
direct allocation
page read and write
1201000
heap
page read and write
3597000
heap
page read and write
F8B000
heap
page read and write
3024000
heap
page read and write
1732000
heap
page read and write
6CC2BFD000
stack
page read and write
563E000
stack
page read and write
309C000
stack
page read and write
3013000
heap
page read and write
3F4E000
direct allocation
page read and write
328F000
heap
page read and write
F2C000
heap
page read and write
16A7000
heap
page read and write
3730000
direct allocation
page read and write
3431000
heap
page read and write
1171000
heap
page read and write
39F9000
direct allocation
page read and write
39FD000
direct allocation
page read and write
887000
unkown
page readonly
87E000
unkown
page write copy
3576000
heap
page read and write
FC2000
heap
page read and write
F8B000
heap
page read and write
3546000
heap
page read and write
103D000
stack
page read and write
511F000
stack
page read and write
FC1000
heap
page read and write
3013000
heap
page read and write
3024000
heap
page read and write
2FE0000
heap
page read and write
3013000
heap
page read and write
328F000
heap
page read and write
37B0000
direct allocation
page read and write
5901000
heap
page read and write
3532000
heap
page read and write
3553000
heap
page read and write
323E000
stack
page read and write
3024000
heap
page read and write
117E000
heap
page read and write
3B90000
direct allocation
page read and write
21EDDEA0000
heap
page read and write
6CC2DFF000
stack
page read and write
11CA000
heap
page read and write
16A7000
heap
page read and write
5901000
heap
page read and write
13EF000
stack
page read and write
3013000
heap
page read and write
3024000
heap
page read and write
3024000
heap
page read and write
3013000
heap
page read and write
1306000
heap
page read and write
21EDDC53000
heap
page read and write
3A60000
direct allocation
page read and write
11A6000
heap
page read and write
3024000
heap
page read and write
16FC000
heap
page read and write
16D5000
heap
page read and write
41B000
system
page execute and read and write
3113000
heap
page read and write
3024000
heap
page read and write
1246000
heap
page read and write
3780000
heap
page read and write
3024000
heap
page read and write
10C0000
heap
page read and write
3024000
heap
page read and write
3853000
direct allocation
page read and write
6463000
heap
page read and write
3013000
heap
page read and write
3024000
heap
page read and write
328F000
heap
page read and write
328F000
heap
page read and write
6422000
heap
page read and write
3510000
heap
page read and write
301B000
heap
page read and write
328F000
heap
page read and write
7C1000
unkown
page execute read
3013000
heap
page read and write
3200000
heap
page read and write
11A6000
heap
page read and write
3102000
heap
page read and write
333F000
stack
page read and write
21EDDF05000
heap
page read and write
3CB3000
direct allocation
page read and write
3024000
heap
page read and write
38D0000
direct allocation
page read and write
3532000
heap
page read and write
FFC000
stack
page read and write
1202000
heap
page read and write
37CF000
stack
page read and write
101B000
stack
page read and write
35D7000
heap
page read and write
3510000
heap
page read and write
1177000
heap
page execute and read and write
3546000
heap
page read and write
21EDDC87000
heap
page read and write
301B000
heap
page read and write
3546000
heap
page read and write
6434000
heap
page read and write
6CC25FE000
stack
page read and write
5660000
heap
page read and write
3024000
heap
page read and write
3546000
heap
page read and write
16FA000
heap
page read and write
475000
system
page execute and read and write
3400000
heap
page read and write
5710000
unclassified section
page execute and read and write
3013000
heap
page read and write
8C0000
unkown
page readonly
FCE000
stack
page read and write
3000000
heap
page read and write
1201000
heap
page read and write
3E5D000
direct allocation
page read and write
1430000
heap
page read and write
39F9000
direct allocation
page read and write
F8B000
heap
page read and write
3546000
heap
page read and write
1299000
heap
page read and write
3024000
heap
page read and write
11FA000
heap
page read and write
1A0E000
stack
page read and write
3A7D000
direct allocation
page read and write
2F0C000
heap
page read and write
3013000
heap
page read and write
3B13000
direct allocation
page read and write
328F000
heap
page read and write
3013000
heap
page read and write
76E000
stack
page read and write
1731000
heap
page read and write
84F000
unkown
page readonly
3A79000
direct allocation
page read and write
5201000
heap
page read and write
3B21000
direct allocation
page read and write
3024000
heap
page read and write
3024000
heap
page read and write
35AD000
heap
page read and write
3503000
heap
page read and write
3F4E000
direct allocation
page read and write
3546000
heap
page read and write
38D3000
direct allocation
page read and write
35A4000
heap
page read and write
16FA000
heap
page read and write
3013000
heap
page read and write
3102000
heap
page read and write
4E9E000
stack
page read and write
3A6E000
direct allocation
page read and write
3013000
heap
page read and write
2F80000
heap
page read and write
874000
unkown
page readonly
5A6E000
stack
page read and write
3013000
heap
page read and write
301B000
heap
page read and write
422D000
direct allocation
page read and write
3013000
heap
page read and write
3024000
heap
page read and write
7C1000
unkown
page execute read
3532000
heap
page read and write
FE1000
heap
page read and write
3546000
heap
page read and write
3113000
heap
page read and write
3412000
heap
page read and write
3013000
heap
page read and write
1D2F000
stack
page read and write
2FC0000
heap
page readonly
8C1000
unkown
page execute read
3024000
heap
page read and write
3002000
heap
page read and write
3013000
heap
page read and write
3013000
heap
page read and write
3024000
heap
page read and write
21EDDBD0000
heap
page read and write
2E7D000
stack
page read and write
328F000
heap
page read and write
301B000
heap
page read and write
3533000
heap
page read and write
2DF0000
heap
page read and write
FDB000
stack
page read and write
3013000
heap
page read and write
3B90000
direct allocation
page read and write
882000
unkown
page write copy
CFC000
stack
page read and write
3013000
heap
page read and write
3577000
heap
page read and write
640000
heap
page read and write
3102000
heap
page read and write
There are 950 hidden memdumps, click here to show them.