IOC Report
7tjt3u68PZ.exe

loading gif

Files

File Path
Type
Category
Malicious
7tjt3u68PZ.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
initial sample
malicious
C:\Notepad.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Notepad.exe:Zone.Identifier
ASCII text, with CRLF line terminators
dropped
malicious
C:\Program Files (x86)\Explower.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Program Files (x86)\Explower.exe:Zone.Identifier
ASCII text, with CRLF line terminators
dropped
malicious
C:\Umbrella.flv.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Umbrella.flv.exe:Zone.Identifier
ASCII text, with CRLF line terminators
dropped
malicious
C:\Users\user\AppData\Local\Explower.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\History\Explower.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\Explower.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCookies\Explower.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Explower.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\Desktop\Explower.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\Documents\Explower.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\Favorites\Explower.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Windows\SysWOW64\Explower.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\autorun.inf
Microsoft Windows Autorun file
dropped
malicious
C:\system.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\system.exe:Zone.Identifier
ASCII text, with CRLF line terminators
dropped
malicious
C:\Users\user\AppData\Local\Explower.exe:Zone.Identifier
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\CLR_v2.0_32\UsageLogs\Explower.exe.log
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\History\Explower.exe:Zone.Identifier
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\Explower.exe:Zone.Identifier
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCookies\Explower.exe:Zone.Identifier
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Explower.exe:Zone.Identifier
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Roaming\app
Unicode text, UTF-8 (with BOM) text, with no line terminators
dropped
C:\Users\user\Desktop\Explower.exe:Zone.Identifier
ASCII text, with CRLF line terminators
dropped
C:\Users\user\Documents\Explower.exe:Zone.Identifier
ASCII text, with CRLF line terminators
dropped
C:\Users\user\Favorites\Explower.exe:Zone.Identifier
ASCII text, with CRLF line terminators
dropped
C:\Windows\SysWOW64\Explower.exe:Zone.Identifier
ASCII text, with CRLF line terminators
dropped
\Device\ConDrv
ASCII text, with CRLF line terminators
dropped
There are 21 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\7tjt3u68PZ.exe
"C:\Users\user\Desktop\7tjt3u68PZ.exe"
malicious
C:\Windows\SysWOW64\netsh.exe
netsh firewall add allowedprogram "C:\Users\user\Desktop\7tjt3u68PZ.exe" "7tjt3u68PZ.exe" ENABLE
malicious
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Explower.exe
"C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Explower.exe"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1

Domains

Name
IP
Malicious
0.tcp.eu.ngrok.io
3.125.209.94
malicious

IPs

IP
Domain
Country
Malicious
3.125.209.94
0.tcp.eu.ngrok.io
United States
malicious
18.192.31.165
unknown
United States
malicious
18.158.249.75
unknown
United States
malicious

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\Environment
SEE_MASK_NOZONECHECKS
malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System
DisableTaskMgr
malicious

Memdumps

Base Address
Regiontype
Protect
Malicious
8B2000
unkown
page readonly
malicious
2F11000
trusted library allocation
page read and write
malicious
BE8D000
stack
page read and write
54ED000
stack
page read and write
BD4D000
stack
page read and write
B3CD000
stack
page read and write
A38E000
stack
page read and write
1182000
heap
page read and write
A28D000
stack
page read and write
8487000
heap
page read and write
95CE000
stack
page read and write
1BF95000
trusted library allocation
page read and write
1B794000
trusted library allocation
page read and write
A10E000
stack
page read and write
5707000
heap
page read and write
9D4E000
stack
page read and write
7C0D000
stack
page read and write
7FCE000
stack
page read and write
11E0000
heap
page read and write
11CC000
heap
page read and write
1220000
heap
page read and write
700000
heap
page read and write
EC8E000
stack
page read and write
A8CD000
stack
page read and write
673E000
stack
page read and write
E5B000
stack
page read and write
12F9E000
stack
page read and write
56F1000
heap
page read and write
810E000
stack
page read and write
11C5000
heap
page read and write
10FDD000
stack
page read and write
ADE000
stack
page read and write
A14D000
stack
page read and write
1167000
heap
page read and write
566D000
stack
page read and write
DBCE000
stack
page read and write
A00D000
stack
page read and write
4C37000
trusted library allocation
page read and write
5A4D000
stack
page read and write
756000
heap
page read and write
12D1E000
stack
page read and write
1B780000
trusted library allocation
page read and write
11DA000
trusted library allocation
page execute and read and write
960D000
stack
page read and write
DE8D000
stack
page read and write
AC50000
heap
page read and write
12ED000
stack
page read and write
99E000
stack
page read and write
FCDD000
stack
page read and write
1BBFB000
trusted library allocation
page read and write
1185000
heap
page read and write
8484000
heap
page read and write
E50000
heap
page read and write
1BE7C000
trusted library allocation
page read and write
10ADD000
stack
page read and write
11B9E000
stack
page read and write
11BE000
heap
page read and write
7D4E000
stack
page read and write
9ECE000
stack
page read and write
10AE000
stack
page read and write
44AE000
trusted library allocation
page read and write
73A000
heap
page read and write
4900000
trusted library allocation
page read and write
842D000
heap
page read and write
5B2E000
heap
page read and write
65BE000
stack
page read and write
42B2000
trusted library allocation
page read and write
11AE000
stack
page read and write
B78E000
stack
page read and write
D70D000
stack
page read and write
489F000
trusted library allocation
page read and write
26FD000
trusted library allocation
page read and write
122E000
heap
page read and write
2BCF000
stack
page read and write
11A1000
heap
page read and write
1B5D4000
trusted library allocation
page read and write
4810000
trusted library allocation
page read and write
100DD000
stack
page read and write
8B0000
unkown
page readonly
5A60000
heap
page read and write
4203000
trusted library allocation
page read and write
BCCD000
stack
page read and write
BC8D000
stack
page read and write
7A4000
heap
page read and write
11BE000
heap
page read and write
F5E000
stack
page read and write
AE0000
heap
page read and write
1184000
heap
page read and write
7C4D000
stack
page read and write
A74E000
stack
page read and write
11C5000
heap
page read and write
4F1E000
stack
page read and write
46E4000
trusted library allocation
page read and write
6C0000
heap
page read and write
11D5000
heap
page read and write
121F000
heap
page read and write
232F5000
trusted library allocation
page read and write
942000
trusted library allocation
page execute and read and write
CDCD000
stack
page read and write
4C02000
trusted library allocation
page read and write
11D1000
heap
page read and write
1189000
heap
page read and write
29AAF000
trusted library allocation
page read and write
1B680000
trusted library allocation
page read and write
562D000
stack
page read and write
D58E000
stack
page read and write
6BE000
stack
page read and write
1B465000
trusted library allocation
page read and write
12FDE000
stack
page read and write
CF4E000
stack
page read and write
122B000
heap
page read and write
D44E000
stack
page read and write
E8CD000
stack
page read and write
670000
heap
page read and write
117C000
heap
page read and write
EF0E000
stack
page read and write
42EE000
trusted library allocation
page read and write
13D5D000
stack
page read and write
FF9E000
stack
page read and write
1217000
heap
page read and write
11BDE000
stack
page read and write
E90D000
stack
page read and write
1161000
heap
page read and write
A8C000
stack
page read and write
11BF000
heap
page read and write
11D7000
heap
page read and write
4832000
trusted library allocation
page read and write
4F4C000
stack
page read and write
11D0000
heap
page read and write
56F9000
heap
page read and write
970E000
stack
page read and write
FFE000
unkown
page read and write
1BC67000
trusted library allocation
page read and write
11BF000
heap
page read and write
720000
trusted library allocation
page read and write
94A000
trusted library allocation
page execute and read and write
590E000
stack
page read and write
637D000
stack
page read and write
4786000
trusted library allocation
page read and write
105DD000
stack
page read and write
647E000
stack
page read and write
29A39000
trusted library allocation
page read and write
10BDD000
stack
page read and write
7ECD000
stack
page read and write
F04E000
stack
page read and write
40E6000
trusted library allocation
page read and write
122E000
heap
page read and write
29874000
trusted library allocation
page read and write
760D000
stack
page read and write
12E9D000
stack
page read and write
119A000
heap
page read and write
974D000
stack
page read and write
125E000
stack
page read and write
1B567000
trusted library allocation
page read and write
53AD000
stack
page read and write
C34D000
stack
page read and write
5FC4000
heap
page read and write
E78D000
stack
page read and write
5F0E000
stack
page read and write
114DE000
stack
page read and write
8A7A000
trusted library allocation
page read and write
6EFD000
stack
page read and write
9D0000
heap
page read and write
56CF000
stack
page read and write
798D000
stack
page read and write
48E2000
trusted library allocation
page read and write
6ABD000
stack
page read and write
11DA000
heap
page read and write
11D2000
heap
page read and write
11A9E000
stack
page read and write
10C1E000
stack
page read and write
1B80F000
trusted library allocation
page read and write
494D000
trusted library allocation
page read and write
8390000
heap
page read and write
5F4C000
stack
page read and write
11CA000
heap
page read and write
F1CD000
stack
page read and write
C44E000
stack
page read and write
10E9E000
stack
page read and write
B74E000
stack
page read and write
B00D000
stack
page read and write
1184000
heap
page read and write
49F8000
trusted library allocation
page read and write
99CD000
stack
page read and write
1205000
heap
page read and write
A50D000
stack
page read and write
1185000
heap
page read and write
1BC9D000
trusted library allocation
page read and write
11E0000
heap
page read and write
C64E000
stack
page read and write
847A000
heap
page read and write
467B000
trusted library allocation
page read and write
1121E000
stack
page read and write
56F2000
heap
page read and write
5DCE000
stack
page read and write
1099D000
stack
page read and write
52AC000
stack
page read and write
DFCD000
stack
page read and write
1071D000
stack
page read and write
E20D000
stack
page read and write
56F8000
heap
page read and write
415A000
trusted library allocation
page read and write
61D0000
trusted library allocation
page execute and read and write
EB8D000
stack
page read and write
4A10000
trusted library allocation
page read and write
5701000
heap
page read and write
5070000
trusted library allocation
page read and write
BE4D000
stack
page read and write
12C1D000
stack
page read and write
BD0D000
stack
page read and write
11A1000
heap
page read and write
4C5E000
stack
page read and write
CCCE000
stack
page read and write
232E0000
trusted library allocation
page read and write
BC4E000
stack
page read and write
3F38000
trusted library allocation
page read and write
11DC000
heap
page read and write
5706000
heap
page read and write
93A000
trusted library allocation
page execute and read and write
10A9E000
stack
page read and write
FE1D000
stack
page read and write
722000
trusted library allocation
page execute and read and write
11860000
heap
page read and write
5703000
heap
page read and write
1049D000
stack
page read and write
9B0E000
stack
page read and write
42B8000
trusted library allocation
page read and write
5704000
heap
page read and write
1B59E000
trusted library allocation
page read and write
734D000
stack
page read and write
B4CE000
stack
page read and write
64BD000
stack
page read and write
8491000
trusted library allocation
page read and write
EB4E000
stack
page read and write
5705000
heap
page read and write
11CC000
heap
page read and write
957000
trusted library allocation
page execute and read and write
101DE000
stack
page read and write
4237000
trusted library allocation
page read and write
1165000
heap
page read and write
540000
heap
page read and write
56F1000
heap
page read and write
1150000
heap
page read and write
EB0000
heap
page read and write
4DB2000
trusted library allocation
page read and write
1BEB3000
trusted library allocation
page read and write
29791000
trusted library allocation
page read and write
92F000
stack
page read and write
1B994000
trusted library allocation
page read and write
E54D000
stack
page read and write
F5B000
stack
page read and write
295CC000
trusted library allocation
page read and write
36D1000
trusted library allocation
page read and write
1175000
heap
page read and write
C7CD000
stack
page read and write
AECD000
stack
page read and write
36D4000
trusted library allocation
page read and write
E60000
heap
page read and write
1327000
heap
page read and write
1BFCA000
trusted library allocation
page read and write
11CC000
heap
page read and write
990000
heap
page read and write
11BE000
heap
page read and write
11C2000
trusted library allocation
page execute and read and write
4AF1000
trusted library allocation
page read and write
D5CD000
stack
page read and write
A3CD000
stack
page read and write
1B382000
trusted library allocation
page read and write
3FF7000
trusted library allocation
page read and write
4DF1000
trusted library allocation
page read and write
43D1000
trusted library allocation
page read and write
1227000
heap
page read and write
4B29000
trusted library allocation
page read and write
43CF000
trusted library allocation
page read and write
5701000
heap
page read and write
724D000
stack
page read and write
11FA000
trusted library allocation
page execute and read and write
6200000
heap
page read and write
CE0D000
stack
page read and write
770D000
stack
page read and write
9C4E000
stack
page read and write
1125E000
stack
page read and write
CF0E000
stack
page read and write
29425000
trusted library allocation
page read and write
1B6B7000
trusted library allocation
page read and write
12AD000
stack
page read and write
4B7F000
trusted library allocation
page read and write
B28E000
stack
page read and write
294CF000
trusted library allocation
page read and write
106DE000
stack
page read and write
1205000
heap
page read and write
1188000
heap
page read and write
C78E000
stack
page read and write
29674000
trusted library allocation
page read and write
788E000
stack
page read and write
526B000
stack
page read and write
1229000
heap
page read and write
6D7D000
stack
page read and write
45FE000
trusted library allocation
page read and write
ECCD000
stack
page read and write
4CC5000
trusted library allocation
page read and write
9C0000
heap
page read and write
1B933000
trusted library allocation
page read and write
11CC000
heap
page read and write
3F11000
trusted library allocation
page read and write
66FD000
stack
page read and write
5701000
heap
page read and write
1BF09000
trusted library allocation
page read and write
620000
heap
page read and write
11D5000
heap
page read and write
86D0000
trusted library allocation
page read and write
B64D000
stack
page read and write
11CA000
heap
page read and write
D34D000
stack
page read and write
E44D000
stack
page read and write
847F000
heap
page read and write
720D000
stack
page read and write
6D3E000
stack
page read and write
4522000
trusted library allocation
page read and write
6C3E000
stack
page read and write
65FD000
stack
page read and write
631D000
stack
page read and write
113A000
heap
page read and write
11B0000
trusted library allocation
page read and write
5AE9000
heap
page read and write
A24E000
stack
page read and write
13D1E000
stack
page read and write
439B000
trusted library allocation
page read and write
11C8000
heap
page read and write
EB8000
heap
page read and write
1BD79000
trusted library allocation
page read and write
1202000
trusted library allocation
page read and write
12D5D000
stack
page read and write
E34D000
stack
page read and write
FF5D000
stack
page read and write
EA0000
heap
page execute and read and write
4D5D000
trusted library allocation
page read and write
DD4D000
stack
page read and write
120B000
trusted library allocation
page execute and read and write
7ACD000
stack
page read and write
5702000
heap
page read and write
AB0D000
stack
page read and write
AA0D000
stack
page read and write
DC0D000
stack
page read and write
46E7000
trusted library allocation
page read and write
D2CD000
stack
page read and write
61A0000
unclassified section
page read and write
D08D000
stack
page read and write
2983E000
trusted library allocation
page read and write
1B6EB000
trusted library allocation
page read and write
5C8E000
stack
page read and write
1B55E000
trusted library allocation
page read and write
1BB2F000
trusted library allocation
page read and write
1160000
heap
page read and write
29504000
trusted library allocation
page read and write
4D27000
trusted library allocation
page read and write
E64D000
stack
page read and write
11A1000
heap
page read and write
4C8F000
trusted library allocation
page read and write
D18E000
stack
page read and write
12F0000
trusted library allocation
page execute and read and write
117B000
heap
page read and write
F53000
stack
page read and write
F3DD000
stack
page read and write
6AFD000
stack
page read and write
110DE000
stack
page read and write
1223000
heap
page read and write
11D2000
heap
page read and write
11D2000
trusted library allocation
page execute and read and write
DACD000
stack
page read and write
6320000
heap
page read and write
75CD000
stack
page read and write
1224000
heap
page read and write
F6DE000
stack
page read and write
11CA000
heap
page read and write
11FF000
heap
page read and write
B10E000
stack
page read and write
9FCE000
stack
page read and write
1BE4E000
trusted library allocation
page read and write
D94E000
stack
page read and write
11CD000
heap
page read and write
1B4E6000
trusted library allocation
page read and write
CF6000
stack
page read and write
7FCC0000
trusted library allocation
page execute and read and write
72C000
trusted library allocation
page execute and read and write
9E8D000
stack
page read and write
5F90000
heap
page read and write
1B9CA000
trusted library allocation
page read and write
1185000
heap
page read and write
AE8D000
stack
page read and write
848A000
heap
page read and write
95B000
trusted library allocation
page execute and read and write
5F8B000
stack
page read and write
AFCD000
stack
page read and write
1BA1F000
trusted library allocation
page read and write
29920000
trusted library allocation
page read and write
47DC000
trusted library allocation
page read and write
1BD25000
trusted library allocation
page read and write
AC4D000
stack
page read and write
40B2000
trusted library allocation
page read and write
119F000
heap
page read and write
4BB6000
trusted library allocation
page read and write
55EE000
stack
page read and write
1045E000
stack
page read and write
FA8000
heap
page read and write
738D000
stack
page read and write
504E000
stack
page read and write
4868000
trusted library allocation
page read and write
C20D000
stack
page read and write
1111E000
stack
page read and write
4910000
heap
page read and write
F91D000
stack
page read and write
1B430000
trusted library allocation
page read and write
B88E000
stack
page read and write
5708000
heap
page read and write
14FF000
stack
page read and write
FE5D000
stack
page read and write
687D000
stack
page read and write
11CD000
heap
page read and write
11D9000
heap
page read and write
710E000
stack
page read and write
13C1D000
stack
page read and write
11DC000
heap
page read and write
1135E000
stack
page read and write
1188000
heap
page read and write
53ED000
stack
page read and write
FA5D000
stack
page read and write
10D1E000
stack
page read and write
1BDC5000
trusted library allocation
page read and write
4920000
trusted library allocation
page execute and read and write
5701000
heap
page read and write
5E0D000
stack
page read and write
297C7000
trusted library allocation
page read and write
B9CE000
stack
page read and write
11D2000
heap
page read and write
11BE000
heap
page read and write
11C5000
heap
page read and write
1176000
heap
page read and write
122E000
heap
page read and write
10F9E000
stack
page read and write
122A000
heap
page read and write
5701000
heap
page read and write
FBDE000
stack
page read and write
1189000
heap
page read and write
814D000
stack
page read and write
DF8E000
stack
page read and write
1B60A000
trusted library allocation
page read and write
11D0000
trusted library allocation
page read and write
9D8D000
stack
page read and write
660000
heap
page read and write
8CD0000
trusted library allocation
page read and write
1179000
heap
page read and write
B8CD000
stack
page read and write
7D8D000
stack
page read and write
BF8E000
stack
page read and write
F5DD000
stack
page read and write
1149E000
stack
page read and write
1031E000
stack
page read and write
E68E000
stack
page read and write
4364000
trusted library allocation
page read and write
1B94A000
trusted library allocation
page read and write
12ADD000
stack
page read and write
4EDE000
stack
page read and write
1B4B2000
trusted library allocation
page read and write
11CDE000
stack
page read and write
74CD000
stack
page read and write
E24D000
stack
page read and write
11D2000
heap
page read and write
29B1C000
trusted library allocation
page read and write
A64D000
stack
page read and write
121F000
heap
page read and write
1BDFA000
trusted library allocation
page read and write
1B34B000
trusted library allocation
page read and write
E7CD000
stack
page read and write
1021E000
stack
page read and write
D84D000
stack
page read and write
122D000
heap
page read and write
8467000
heap
page read and write
580E000
stack
page read and write
3FA3000
trusted library allocation
page read and write
73E000
heap
page read and write
11D4000
heap
page read and write
683E000
stack
page read and write
1187000
heap
page read and write
CB8D000
stack
page read and write
83AC000
heap
page read and write
5701000
heap
page read and write
1085E000
stack
page read and write
4F6000
stack
page read and write
11A1000
heap
page read and write
984E000
stack
page read and write
13E5E000
stack
page read and write
11CA000
trusted library allocation
page execute and read and write
D04D000
stack
page read and write
1059E000
stack
page read and write
1186000
heap
page read and write
E4D000
stack
page read and write
4725000
trusted library allocation
page read and write
4556000
trusted library allocation
page read and write
1210000
heap
page read and write
5A92000
heap
page read and write
A78D000
stack
page read and write
5702000
heap
page read and write
1175000
heap
page read and write
1BCD1000
trusted library allocation
page read and write
4406000
trusted library allocation
page read and write
83F0000
heap
page read and write
DA8E000
stack
page read and write
1066000
heap
page read and write
1B3B7000
trusted library allocation
page read and write
29AE5000
trusted library allocation
page read and write
418F000
trusted library allocation
page read and write
11E7000
trusted library allocation
page execute and read and write
844E000
heap
page read and write
1085000
heap
page read and write
EE0D000
stack
page read and write
DD0E000
stack
page read and write
11C2000
heap
page read and write
29A19000
trusted library allocation
page read and write
1161D000
stack
page read and write
6EBD000
stack
page read and write
C24E000
stack
page read and write
11BE000
heap
page read and write
72A000
trusted library allocation
page execute and read and write
D80E000
stack
page read and write
2971B000
trusted library allocation
page read and write
6190000
trusted library allocation
page read and write
A60D000
stack
page read and write
117F000
heap
page read and write
4BEA000
trusted library allocation
page read and write
9C0E000
stack
page read and write
4A7B000
trusted library allocation
page read and write
5FCE000
heap
page read and write
AD8D000
stack
page read and write
E0E000
stack
page read and write
D98D000
stack
page read and write
130DE000
stack
page read and write
119A000
heap
page read and write
6F0000
trusted library allocation
page read and write
1189000
heap
page read and write
47CC000
stack
page read and write
26F4000
trusted library allocation
page read and write
988D000
stack
page read and write
576D000
stack
page read and write
11C7000
heap
page read and write
998E000
stack
page read and write
7B0D000
stack
page read and write
E40D000
stack
page read and write
CB4E000
stack
page read and write
49C4000
trusted library allocation
page read and write
CA0E000
stack
page read and write
4A47000
trusted library allocation
page read and write
11CA000
heap
page read and write
1B7D9000
trusted library allocation
page read and write
3F6E000
trusted library allocation
page read and write
6330000
heap
page read and write
94CD000
stack
page read and write
13FF000
unkown
page read and write
122B000
heap
page read and write
774D000
stack
page read and write
1139E000
stack
page read and write
1B865000
trusted library allocation
page read and write
1080000
heap
page read and write
847C000
heap
page read and write
46B0000
trusted library allocation
page read and write
56D0000
heap
page read and write
824D000
stack
page read and write
700E000
stack
page read and write
675000
heap
page read and write
122B000
heap
page read and write
4FDE000
stack
page read and write
121F000
heap
page read and write
117C000
heap
page read and write
EDCE000
stack
page read and write
C90D000
stack
page read and write
FD1E000
stack
page read and write
959000
stack
page read and write
697E000
stack
page read and write
119A000
heap
page read and write
1BF5F000
trusted library allocation
page read and write
8470000
heap
page read and write
10E5D000
stack
page read and write
299AC000
trusted library allocation
page read and write
29596000
trusted library allocation
page read and write
1B89A000
trusted library allocation
page read and write
C0CD000
stack
page read and write
BB4D000
stack
page read and write
1B8F3000
trusted library allocation
page read and write
D6CE000
stack
page read and write
DE4E000
stack
page read and write
5709000
heap
page read and write
1BAF8000
trusted library allocation
page read and write
5080000
trusted library allocation
page execute and read and write
79CD000
stack
page read and write
11CE000
heap
page read and write
5180000
heap
page read and write
F1E0000
heap
page read and write
293F1000
trusted library allocation
page read and write
E38D000
stack
page read and write
FB9D000
stack
page read and write
712000
trusted library allocation
page execute and read and write
FB0000
heap
page read and write
AB4D000
stack
page read and write
1009D000
stack
page read and write
1207000
trusted library allocation
page execute and read and write
E0CE000
stack
page read and write
1227000
heap
page read and write
8410000
heap
page read and write
F08D000
stack
page read and write
BFCD000
stack
page read and write
C8CE000
stack
page read and write
48CF000
stack
page read and write
10CE000
stack
page read and write
1000000
heap
page read and write
B38E000
stack
page read and write
121F000
heap
page read and write
11F2000
trusted library allocation
page execute and read and write
1185000
heap
page read and write
6BFD000
stack
page read and write
12BDE000
stack
page read and write
4D5E000
stack
page read and write
9ACE000
stack
page read and write
1B63F000
trusted library allocation
page read and write
730000
heap
page read and write
122E000
heap
page read and write
29B52000
trusted library allocation
page read and write
F18E000
stack
page read and write
A90000
heap
page execute and read and write
CC8E000
stack
page read and write
1179000
heap
page read and write
838D000
stack
page read and write
E3CD000
stack
page read and write
5050000
trusted library allocation
page read and write
11BF000
heap
page read and write
7AB000
heap
page read and write
1095E000
stack
page read and write
1081E000
stack
page read and write
1130000
heap
page read and write
825E000
heap
page read and write
E57000
heap
page read and write
11EA000
trusted library allocation
page execute and read and write
1BC31000
trusted library allocation
page read and write
5B8D000
stack
page read and write
1BB9B000
trusted library allocation
page read and write
299E3000
trusted library allocation
page read and write
1171E000
stack
page read and write
EA0D000
stack
page read and write
4D9E000
stack
page read and write
1B317000
trusted library allocation
page read and write
11D9000
heap
page read and write
11BE000
heap
page read and write
1010000
heap
page read and write
C10D000
stack
page read and write
784D000
stack
page read and write
1205000
heap
page read and write
1035D000
stack
page read and write
26D1000
trusted library allocation
page read and write
1060000
heap
page read and write
11C0000
heap
page read and write
F7DD000
stack
page read and write
BA0D000
stack
page read and write
1BA53000
trusted library allocation
page read and write
5CCE000
stack
page read and write
117A000
heap
page read and write
4E27000
trusted library allocation
page read and write
F81E000
stack
page read and write
117B000
heap
page read and write
5120000
heap
page read and write
4DBA000
trusted library allocation
page read and write
748E000
stack
page read and write
4E9E000
stack
page read and write
1B47B000
trusted library allocation
page read and write
C68D000
stack
page read and write
BB0E000
stack
page read and write
76E000
heap
page read and write
7E8E000
stack
page read and write
2700000
trusted library allocation
page read and write
119A000
heap
page read and write
B60E000
stack
page read and write
48E0000
trusted library allocation
page read and write
501E000
stack
page read and write
EA4D000
stack
page read and write
5A50000
heap
page read and write
594D000
stack
page read and write
407C000
trusted library allocation
page read and write
11D2000
heap
page read and write
430E000
trusted library allocation
page read and write
B50D000
stack
page read and write
83D3000
heap
page read and write
11FF000
heap
page read and write
11DF000
heap
page read and write
12E5E000
stack
page read and write
EBE000
heap
page read and write
F4E000
stack
page read and write
A88E000
stack
page read and write
B14D000
stack
page read and write
800D000
stack
page read and write
296E5000
trusted library allocation
page read and write
A9CE000
stack
page read and write
26F6000
trusted library allocation
page read and write
1175E000
stack
page read and write
1B2E1000
trusted library allocation
page read and write
1B3F9000
trusted library allocation
page read and write
1182000
heap
page read and write
4ACB000
stack
page read and write
995000
heap
page read and write
121F000
heap
page read and write
238F000
stack
page read and write
11D9000
heap
page read and write
516C000
stack
page read and write
FA9D000
stack
page read and write
1189000
heap
page read and write
1182000
heap
page read and write
1320000
heap
page read and write
49CC000
stack
page read and write
F4DD000
stack
page read and write
D30D000
stack
page read and write
1B72B000
trusted library allocation
page read and write
11D9000
heap
page read and write
CA4E000
stack
page read and write
29620000
trusted library allocation
page read and write
4918000
trusted library allocation
page read and write
1185E000
stack
page read and write
11FF000
heap
page read and write
69BD000
stack
page read and write
10D0000
heap
page read and write
71A000
trusted library allocation
page execute and read and write
511E000
stack
page read and write
1188000
heap
page read and write
1EB000
stack
page read and write
11A1000
heap
page read and write
1BB64000
trusted library allocation
page read and write
1200000
trusted library allocation
page read and write
A4CD000
stack
page read and write
1151000
heap
page read and write
5190000
heap
page read and write
F95E000
stack
page read and write
8250000
heap
page read and write
D48D000
stack
page read and write
296A8000
trusted library allocation
page read and write
298EA000
trusted library allocation
page read and write
1189000
heap
page read and write
FA5000
heap
page read and write
4B1C000
stack
page read and write
10D5E000
stack
page read and write
4F80000
heap
page read and write
11D4000
heap
page read and write
115DE000
stack
page read and write
C54E000
stack
page read and write
11CC000
heap
page read and write
4C1C000
stack
page read and write
6E7D000
stack
page read and write
D1CD000
stack
page read and write
1205000
heap
page read and write
B24E000
stack
page read and write
45CA000
trusted library allocation
page read and write
447A000
trusted library allocation
page read and write
E10D000
stack
page read and write
2945A000
trusted library allocation
page read and write
5709000
heap
page read and write
EF4E000
stack
page read and write
11C7000
heap
page read and write
298CA000
trusted library allocation
page read and write
11DD000
heap
page read and write
11D1000
heap
page read and write
There are 755 hidden memdumps, click here to show them.