IOC Report
WIpGif4IRrFfamQ.exe

loading gif

Files

File Path
Type
Category
Malicious
WIpGif4IRrFfamQ.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\WIpGif4IRrFfamQ.exe.log
ASCII text, with CRLF line terminators
dropped
malicious
C:\Users\user\AppData\Local\Temp\tmp5423.tmp
XML 1.0 document, ASCII text
dropped
malicious
C:\Users\user\AppData\Roaming\AcEnrS.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\AcEnrS.exe:Zone.Identifier
ASCII text, with CRLF line terminators
dropped
malicious
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_AcEnrS.exe_2dc6f3615384b0b820f49419bdfb62c78a16395_3aa1fe28_e2f6bfb4-8e3b-4930-9192-70b04bf6ea22\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER7D66.tmp.dmp
Mini DuMP crash report, 15 streams, Tue Oct 1 08:55:19 2024, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER7EDE.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER7F2D.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\AcEnrS.exe.log
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
data
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_141esvdq.2sr.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_3mslla4e.bun.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_axf4oqit.uho.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_jsfpo23f.5dm.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_lpnetthu.zlr.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_mlfkkmvf.l5m.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_tbtjyv2p.3cq.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_wqeusgs0.ea2.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\tmp6B55.tmp
XML 1.0 document, ASCII text
dropped
There are 10 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\WIpGif4IRrFfamQ.exe
"C:\Users\user\Desktop\WIpGif4IRrFfamQ.exe"
malicious
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\WIpGif4IRrFfamQ.exe"
malicious
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\AcEnrS.exe"
malicious
C:\Windows\SysWOW64\schtasks.exe
"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\AcEnrS" /XML "C:\Users\user\AppData\Local\Temp\tmp5423.tmp"
malicious
C:\Users\user\Desktop\WIpGif4IRrFfamQ.exe
"C:\Users\user\Desktop\WIpGif4IRrFfamQ.exe"
malicious
C:\Users\user\AppData\Roaming\AcEnrS.exe
C:\Users\user\AppData\Roaming\AcEnrS.exe
malicious
C:\Windows\SysWOW64\schtasks.exe
"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\AcEnrS" /XML "C:\Users\user\AppData\Local\Temp\tmp6B55.tmp"
malicious
C:\Users\user\AppData\Roaming\AcEnrS.exe
"C:\Users\user\AppData\Roaming\AcEnrS.exe"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\wbem\WmiPrvSE.exe
C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 7708 -s 1500
There are 4 hidden processes, click here to show them.

URLs

Name
IP
Malicious
http://aborters.duckdns.org:8081
unknown
malicious
http://anotherarmy.dns.army:8081
unknown
malicious
https://www.office.com/
unknown
https://duckduckgo.com/chrome_newtab
unknown
https://duckduckgo.com/ac/?q=
unknown
https://api.telegram.org
unknown
https://www.google.com/images/branding/product/ico/googleg_lodp.ico
unknown
https://api.telegram.org/bot
unknown
https://api.telegram.org/bot/sendMessage?chat_id=&text=%20%0D%0A%0D%0APC%20Name:065367%0D%0ADate%20a
unknown
https://www.office.com/lB
unknown
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
unknown
https://api.telegram.org/bot/sendMessage?chat_id=&text=%20%0D%0A%0D%0APC%20Name:065367%0D%0ADate%20and%20Time:%2002/10/2024%20/%2021:40:19%0D%0ACountry%20Name:%20United%20States%0D%0A%5B%20065367%20Clicked%20on%20the%20File%20If%20you%20see%20nothing%20this's%20mean%20the%20system%20storage's%20empty.%20%5D
149.154.167.220
http://r10.o.lencr.org0#
unknown
http://checkip.dyndns.org
unknown
https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
unknown
https://reallyfreegeoip.org/xml/8.46.123.33
188.114.97.3
https://api.telegram.org/bot/sendMessage?chat_id=&text=
unknown
https://chrome.google.com/webstore?hl=en
unknown
https://www.ecosia.org/newtab/
unknown
https://chrome.google.com/webstore?hl=enx
unknown
http://varders.kozow.com:8081
unknown
http://mail.pymetal.net
unknown
https://ac.ecosia.org/autocomplete?q=
unknown
https://www.office.com/x
unknown
http://checkip.dyndns.org/
193.122.6.168
http://51.38.247.67:8081/_send_.php?L
unknown
https://reallyfreegeoip.org/xml/8.46.123.33$
unknown
http://x1.c.lencr.org/0
unknown
http://x1.i.lencr.org/0
unknown
https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
unknown
http://checkip.dyndns.org/q
unknown
https://chrome.google.com/webstore?hl=enlB
unknown
https://reallyfreegeoip.org
unknown
http://checkip.dyndns.com
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
unknown
http://r10.i.lencr.org/0
unknown
http://51.38.247.67:8081/_send_.php?LCapplication/x-www-form-urlencoded
unknown
https://reallyfreegeoip.org/xml/
unknown
There are 29 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
reallyfreegeoip.org
188.114.97.3
malicious
api.telegram.org
149.154.167.220
malicious
mail.pymetal.net
75.102.58.14
malicious
checkip.dyndns.org
unknown
malicious
checkip.dyndns.com
193.122.6.168

IPs

IP
Domain
Country
Malicious
75.102.58.14
mail.pymetal.net
United States
malicious
149.154.167.220
api.telegram.org
United Kingdom
malicious
188.114.97.3
reallyfreegeoip.org
European Union
malicious
193.122.6.168
checkip.dyndns.com
United States

Registry

Path
Value
Malicious
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\WIpGif4IRrFfamQ_RASAPI32
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\WIpGif4IRrFfamQ_RASAPI32
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\WIpGif4IRrFfamQ_RASAPI32
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\WIpGif4IRrFfamQ_RASAPI32
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\WIpGif4IRrFfamQ_RASAPI32
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\WIpGif4IRrFfamQ_RASAPI32
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\WIpGif4IRrFfamQ_RASAPI32
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\WIpGif4IRrFfamQ_RASMANCS
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\WIpGif4IRrFfamQ_RASMANCS
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\WIpGif4IRrFfamQ_RASMANCS
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\WIpGif4IRrFfamQ_RASMANCS
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\WIpGif4IRrFfamQ_RASMANCS
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\WIpGif4IRrFfamQ_RASMANCS
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\WIpGif4IRrFfamQ_RASMANCS
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\AcEnrS_RASAPI32
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\AcEnrS_RASAPI32
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\AcEnrS_RASAPI32
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\AcEnrS_RASAPI32
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\AcEnrS_RASAPI32
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\AcEnrS_RASAPI32
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\AcEnrS_RASAPI32
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\AcEnrS_RASMANCS
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\AcEnrS_RASMANCS
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\AcEnrS_RASMANCS
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\AcEnrS_RASMANCS
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\AcEnrS_RASMANCS
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\AcEnrS_RASMANCS
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\AcEnrS_RASMANCS
FileDirectory
There are 19 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
4087000
trusted library allocation
page read and write
malicious
2E11000
trusted library allocation
page read and write
malicious
402000
remote allocation
page execute and read and write
malicious
4C66000
trusted library allocation
page read and write
malicious
2A71000
trusted library allocation
page read and write
malicious
BD2000
unkown
page readonly
D51E000
stack
page read and write
2DB8000
trusted library allocation
page read and write
3E9A000
trusted library allocation
page read and write
A3A000
stack
page read and write
7A0000
trusted library allocation
page read and write
49D1000
trusted library allocation
page read and write
30FD000
trusted library allocation
page read and write
2E88000
trusted library allocation
page read and write
B60000
heap
page read and write
7140000
heap
page read and write
EE6000
trusted library allocation
page execute and read and write
2DCC000
stack
page read and write
5F9E000
stack
page read and write
55F0000
heap
page read and write
1414000
trusted library allocation
page read and write
DEFB000
stack
page read and write
C8BD000
stack
page read and write
400000
remote allocation
page execute and read and write
4168000
trusted library allocation
page read and write
3254000
trusted library allocation
page read and write
2D60000
trusted library allocation
page read and write
2F60000
heap
page read and write
1270000
heap
page read and write
49B0000
trusted library allocation
page read and write
2DD0000
heap
page read and write
5900000
trusted library allocation
page read and write
5990000
heap
page read and write
57D0000
heap
page read and write
D4F000
heap
page read and write
CEEC000
stack
page read and write
2EF7000
trusted library allocation
page read and write
D72000
heap
page read and write
69EE000
stack
page read and write
3A99000
trusted library allocation
page read and write
6C94000
trusted library allocation
page read and write
527E000
stack
page read and write
54FE000
stack
page read and write
7340000
heap
page read and write
2D4B000
trusted library allocation
page execute and read and write
735D000
heap
page read and write
EFB000
trusted library allocation
page execute and read and write
3091000
trusted library allocation
page read and write
9FF5000
trusted library allocation
page read and write
4B6E000
stack
page read and write
419A000
trusted library allocation
page read and write
6BD0000
trusted library allocation
page execute and read and write
56C0000
trusted library allocation
page execute and read and write
D9F000
heap
page read and write
49F0000
trusted library allocation
page read and write
2FC4000
trusted library allocation
page read and write
6B44000
trusted library allocation
page read and write
7F4000
heap
page read and write
294E000
stack
page read and write
646E000
stack
page read and write
40F0000
trusted library allocation
page read and write
69B000
stack
page read and write
864000
heap
page read and write
30CD000
trusted library allocation
page read and write
CA0E000
stack
page read and write
66B0000
heap
page read and write
609E000
stack
page read and write
7C0000
heap
page read and write
59F0000
heap
page read and write
70D000
stack
page read and write
16FD000
trusted library allocation
page execute and read and write
6B2E000
stack
page read and write
3E31000
trusted library allocation
page read and write
710000
heap
page read and write
49BE000
trusted library allocation
page read and write
D06E000
stack
page read and write
6B4A000
trusted library allocation
page read and write
2A2D000
stack
page read and write
57E0000
heap
page execute and read and write
4CB0000
heap
page read and write
B65000
heap
page read and write
DB1E000
stack
page read and write
6D00000
trusted library allocation
page read and write
2F1A000
trusted library allocation
page read and write
D2A000
stack
page read and write
DB0000
heap
page read and write
49D6000
trusted library allocation
page read and write
125D000
trusted library allocation
page execute and read and write
ACD000
trusted library allocation
page execute and read and write
10E5000
heap
page read and write
DC5E000
stack
page read and write
7BD000
trusted library allocation
page execute and read and write
CB8000
heap
page read and write
4FA2000
trusted library allocation
page read and write
4B00000
trusted library section
page readonly
EAE000
stack
page read and write
3E11000
trusted library allocation
page read and write
299B000
trusted library allocation
page read and write
4FEE000
stack
page read and write
2CDF000
stack
page read and write
144E000
stack
page read and write
C70000
heap
page read and write
3E9D000
trusted library allocation
page read and write
AE7000
trusted library allocation
page execute and read and write
10A0000
trusted library allocation
page read and write
2F30000
trusted library allocation
page read and write
41B7000
trusted library allocation
page read and write
D75E000
stack
page read and write
30C7000
trusted library allocation
page read and write
6C0000
heap
page read and write
310E000
trusted library allocation
page read and write
413A000
trusted library allocation
page read and write
6B30000
trusted library allocation
page read and write
56B0000
heap
page execute and read and write
1376000
trusted library allocation
page execute and read and write
29C0000
heap
page execute and read and write
1240000
trusted library allocation
page read and write
C38E000
stack
page read and write
4C24000
trusted library allocation
page read and write
682F000
stack
page read and write
308D000
trusted library allocation
page read and write
7B3000
trusted library allocation
page execute and read and write
2D30000
trusted library allocation
page read and write
F90000
heap
page read and write
577000
stack
page read and write
9BF000
stack
page read and write
11B2000
heap
page read and write
10B5000
heap
page read and write
C7BD000
stack
page read and write
16F3000
trusted library allocation
page execute and read and write
4A70000
heap
page read and write
3FFA000
trusted library allocation
page read and write
4220000
trusted library allocation
page read and write
5296000
trusted library allocation
page read and write
136F000
stack
page read and write
6D10000
trusted library allocation
page read and write
2F76000
trusted library allocation
page read and write
52BD000
trusted library allocation
page read and write
41B1000
trusted library allocation
page read and write
802000
heap
page read and write
40E1000
trusted library allocation
page read and write
7842000
trusted library allocation
page read and write
34D1000
trusted library allocation
page read and write
34B9000
trusted library allocation
page read and write
4FAD000
trusted library allocation
page read and write
B10000
heap
page read and write
56B2000
trusted library allocation
page read and write
2FC2000
trusted library allocation
page read and write
32E1000
trusted library allocation
page read and write
1703000
trusted library allocation
page read and write
2C9E000
stack
page read and write
CCAE000
stack
page read and write
D8A0000
heap
page read and write
2EBB000
stack
page read and write
2C70000
trusted library allocation
page read and write
2BD8000
trusted library allocation
page read and write
7CE000
heap
page read and write
6CF0000
trusted library allocation
page read and write
4184000
trusted library allocation
page read and write
4A90000
trusted library allocation
page read and write
400D000
trusted library allocation
page read and write
4E30000
heap
page read and write
DFFC000
stack
page read and write
AC3000
trusted library allocation
page read and write
3096000
trusted library allocation
page read and write
2EE4000
trusted library allocation
page read and write
2460000
trusted library allocation
page read and write
2B24000
trusted library allocation
page read and write
747E000
stack
page read and write
2B2A000
trusted library allocation
page read and write
52C2000
trusted library allocation
page read and write
C53E000
stack
page read and write
4CF0000
trusted library allocation
page read and write
3010000
heap
page read and write
2D2D000
stack
page read and write
CDAE000
stack
page read and write
700E000
stack
page read and write
2FCC000
trusted library allocation
page read and write
3499000
trusted library allocation
page read and write
30B9000
trusted library allocation
page read and write
2EB9000
trusted library allocation
page read and write
4FEE000
stack
page read and write
F5E000
stack
page read and write
3E24000
trusted library allocation
page read and write
2E70000
heap
page execute and read and write
3320000
heap
page read and write
2B2D000
trusted library allocation
page read and write
DD5F000
stack
page read and write
656E000
stack
page read and write
AD6000
trusted library allocation
page execute and read and write
126B000
heap
page read and write
2756000
trusted library allocation
page read and write
2F20000
trusted library allocation
page read and write
CB0000
heap
page read and write
3E2B000
trusted library allocation
page read and write
2F50000
trusted library allocation
page read and write
3F26000
trusted library allocation
page read and write
1710000
heap
page read and write
FEA000
heap
page read and write
507E000
stack
page read and write
55E0000
heap
page read and write
A250000
trusted library section
page read and write
ECD000
trusted library allocation
page execute and read and write
16F0000
trusted library allocation
page read and write
3119000
trusted library allocation
page read and write
59D0000
heap
page read and write
13F0000
trusted library allocation
page execute and read and write
2F68000
trusted library allocation
page read and write
456B000
stack
page read and write
2985000
trusted library allocation
page read and write
3A75000
trusted library allocation
page read and write
2C80000
heap
page read and write
5B2E000
stack
page read and write
1042000
heap
page read and write
6B60000
trusted library allocation
page execute and read and write
4236000
trusted library allocation
page read and write
F37000
stack
page read and write
52B1000
trusted library allocation
page read and write
9FF0000
trusted library allocation
page read and write
1243000
trusted library allocation
page execute and read and write
50BE000
stack
page read and write
D89D000
stack
page read and write
5030000
heap
page read and write
1244000
trusted library allocation
page read and write
6719000
heap
page read and write
49CE000
trusted library allocation
page read and write
7DF000
heap
page read and write
3F9E000
trusted library allocation
page read and write
CD9000
heap
page read and write
502E000
stack
page read and write
52B0000
heap
page execute and read and write
2990000
trusted library allocation
page read and write
2FF3000
trusted library allocation
page read and write
2F4B000
trusted library allocation
page read and write
308B000
trusted library allocation
page read and write
5290000
trusted library allocation
page read and write
41BC000
trusted library allocation
page read and write
58FF000
stack
page read and write
245E000
stack
page read and write
733E000
stack
page read and write
797000
stack
page read and write
4A73000
heap
page read and write
DC1E000
stack
page read and write
6B46000
trusted library allocation
page read and write
4EB0000
heap
page read and write
B5E000
stack
page read and write
113D000
stack
page read and write
3F88000
trusted library allocation
page read and write
6BC0000
trusted library allocation
page execute and read and write
4024000
trusted library allocation
page read and write
2534000
trusted library allocation
page read and write
3E92000
trusted library allocation
page read and write
2D3A000
trusted library allocation
page execute and read and write
2D8F000
stack
page read and write
C63E000
stack
page read and write
3E7D000
trusted library allocation
page read and write
3F72000
trusted library allocation
page read and write
2E60000
heap
page read and write
3117000
trusted library allocation
page read and write
5995000
heap
page read and write
B50000
trusted library allocation
page read and write
138B000
trusted library allocation
page execute and read and write
2491000
trusted library allocation
page read and write
B1D000
stack
page read and write
2EEB000
trusted library allocation
page read and write
FA0000
heap
page read and write
5740000
trusted library section
page readonly
6B80000
trusted library allocation
page execute and read and write
EF7000
trusted library allocation
page execute and read and write
686E000
stack
page read and write
7010000
trusted library allocation
page execute and read and write
76E000
stack
page read and write
11A5000
heap
page read and write
7CA000
heap
page read and write
B70000
heap
page read and write
52AE000
trusted library allocation
page read and write
3E0C000
trusted library allocation
page read and write
1387000
trusted library allocation
page execute and read and write
4CE0000
trusted library allocation
page execute and read and write
65AE000
stack
page read and write
306F000
stack
page read and write
2ECA000
trusted library allocation
page read and write
4CC0000
heap
page read and write
107D000
heap
page read and write
5C9F000
stack
page read and write
310B000
trusted library allocation
page read and write
2F40000
trusted library allocation
page read and write
B77000
heap
page read and write
4037000
trusted library allocation
page read and write
3F52000
trusted library allocation
page read and write
446000
remote allocation
page execute and read and write
85E000
heap
page read and write
4057000
trusted library allocation
page read and write
3394000
trusted library allocation
page read and write
4AFB000
stack
page read and write
1700000
trusted library allocation
page read and write
4112000
trusted library allocation
page read and write
2E62000
trusted library allocation
page read and write
7FD000
stack
page read and write
548E000
stack
page read and write
1170000
heap
page read and write
2FBE000
trusted library allocation
page read and write
2DE0000
heap
page read and write
16E0000
trusted library allocation
page read and write
AEB000
trusted library allocation
page execute and read and write
2A60000
heap
page read and write
2D00000
heap
page read and write
2F01000
trusted library allocation
page read and write
2FFD000
trusted library allocation
page read and write
3D7B000
trusted library allocation
page read and write
1410000
trusted library allocation
page read and write
2E00000
heap
page execute and read and write
6D07000
trusted library allocation
page read and write
6B5D000
trusted library allocation
page read and write
5AC1000
trusted library allocation
page read and write
48CA000
trusted library allocation
page read and write
1200000
heap
page read and write
B66000
trusted library allocation
page read and write
ADA000
trusted library allocation
page execute and read and write
10E0000
heap
page read and write
68DE000
stack
page read and write
4CD0000
trusted library allocation
page read and write
AE2000
trusted library allocation
page read and write
EEA000
trusted library allocation
page execute and read and write
553E000
stack
page read and write
3CEA000
trusted library allocation
page read and write
2EE0000
trusted library allocation
page read and write
3E8A000
trusted library allocation
page read and write
AF0000
heap
page read and write
757E000
stack
page read and write
5E9E000
stack
page read and write
4E35000
heap
page read and write
6C80000
trusted library allocation
page read and write
1420000
heap
page read and write
32EE000
stack
page read and write
BD0000
unkown
page readonly
6CE2000
trusted library allocation
page read and write
6CA0000
trusted library allocation
page execute and read and write
2E84000
trusted library allocation
page read and write
67ED000
stack
page read and write
2FD1000
trusted library allocation
page read and write
4165000
trusted library allocation
page read and write
2F06000
trusted library allocation
page read and write
AEE000
unkown
page read and write
2EE0000
heap
page read and write
4044000
trusted library allocation
page read and write
52AA000
trusted library allocation
page read and write
66E0000
heap
page read and write
41AA000
trusted library allocation
page read and write
2ED0000
trusted library allocation
page read and write
2E50000
heap
page read and write
2D40000
trusted library allocation
page read and write
66AE000
stack
page read and write
1234000
heap
page read and write
3062000
trusted library allocation
page read and write
CE6000
heap
page read and write
3338000
trusted library allocation
page read and write
4A62000
trusted library allocation
page read and write
5380000
heap
page read and write
4128000
trusted library allocation
page read and write
6D20000
trusted library allocation
page read and write
E13E000
stack
page read and write
2B3A000
trusted library allocation
page read and write
5E0000
heap
page read and write
7730000
trusted library allocation
page execute and read and write
3082000
trusted library allocation
page read and write
10B7000
trusted library allocation
page read and write
AC0000
trusted library allocation
page read and write
2FF5000
trusted library allocation
page read and write
B64000
trusted library allocation
page read and write
3EA3000
trusted library allocation
page read and write
1717000
heap
page read and write
D35E000
stack
page read and write
479000
stack
page read and write
5340000
heap
page read and write
2C5F000
unkown
page read and write
56D0000
trusted library allocation
page read and write
C6E000
stack
page read and write
2B36000
trusted library allocation
page read and write
528D000
stack
page read and write
109E000
stack
page read and write
406C000
trusted library allocation
page read and write
2EBD000
trusted library allocation
page read and write
C30F000
trusted library allocation
page read and write
4A50000
heap
page read and write
6BB0000
trusted library allocation
page execute and read and write
2EC0000
trusted library allocation
page execute and read and write
6CE5000
trusted library allocation
page read and write
3F18000
trusted library allocation
page read and write
170D000
trusted library allocation
page execute and read and write
C34E000
stack
page read and write
49B4000
trusted library allocation
page read and write
5330000
heap
page read and write
2470000
trusted library allocation
page read and write
7080000
heap
page read and write
68F0000
heap
page read and write
516C000
stack
page read and write
2E7B000
trusted library allocation
page read and write
3346000
trusted library allocation
page read and write
117E000
heap
page read and write
2B1C000
trusted library allocation
page read and write
3EA0000
trusted library allocation
page read and write
7720000
trusted library allocation
page read and write
B30000
heap
page read and write
6902000
heap
page read and write
6A2E000
stack
page read and write
3A71000
trusted library allocation
page read and write
1211000
heap
page read and write
29A0000
trusted library allocation
page read and write
4FA0000
trusted library allocation
page read and write
6BA0000
trusted library allocation
page execute and read and write
2ECE000
trusted library allocation
page read and write
6ADE000
stack
page read and write
725000
heap
page read and write
1260000
heap
page read and write
2E8C000
trusted library allocation
page read and write
4071000
trusted library allocation
page read and write
2BD0000
trusted library allocation
page read and write
6B70000
trusted library allocation
page read and write
CF2D000
stack
page read and write
10F7000
stack
page read and write
1250000
trusted library allocation
page read and write
318F000
unkown
page read and write
EC3000
trusted library allocation
page execute and read and write
6725000
heap
page read and write
3E39000
trusted library allocation
page read and write
311D000
trusted library allocation
page read and write
4F0E000
stack
page read and write
C305000
trusted library allocation
page read and write
2ED2000
trusted library allocation
page read and write
6C30000
trusted library allocation
page read and write
4A60000
trusted library allocation
page read and write
8BA000
heap
page read and write
D31E000
stack
page read and write
720000
heap
page read and write
2EC6000
trusted library allocation
page read and write
10C0000
heap
page read and write
6CB6000
trusted library allocation
page read and write
49DD000
trusted library allocation
page read and write
1370000
trusted library allocation
page read and write
3E94000
trusted library allocation
page read and write
31D0000
heap
page read and write
1382000
trusted library allocation
page read and write
5910000
trusted library allocation
page execute and read and write
16F4000
trusted library allocation
page read and write
6B50000
trusted library allocation
page read and write
CDEB000
stack
page read and write
D79D000
stack
page read and write
529B000
trusted library allocation
page read and write
68E0000
heap
page read and write
4F7E000
stack
page read and write
2D32000
trusted library allocation
page read and write
F80000
trusted library allocation
page execute and read and write
D8B0000
heap
page read and write
3088000
trusted library allocation
page read and write
1400000
trusted library allocation
page read and write
C300000
trusted library allocation
page read and write
41D4000
trusted library allocation
page read and write
1385000
trusted library allocation
page execute and read and write
3EA8000
trusted library allocation
page read and write
DA0000
heap
page read and write
2EB5000
trusted library allocation
page read and write
4200000
trusted library allocation
page read and write
3114000
trusted library allocation
page read and write
5B50000
trusted library allocation
page read and write
7B4000
trusted library allocation
page read and write
1380000
trusted library allocation
page read and write
55D3000
heap
page read and write
59B0000
heap
page read and write
5383000
heap
page read and write
FC8000
heap
page read and write
3491000
trusted library allocation
page read and write
59C0000
heap
page read and write
3071000
trusted library allocation
page read and write
4A10000
trusted library allocation
page read and write
6B90000
trusted library allocation
page read and write
235E000
stack
page read and write
2FC6000
trusted library allocation
page read and write
885000
heap
page read and write
36AF000
stack
page read and write
2EFE000
trusted library allocation
page read and write
3EFD000
trusted library allocation
page read and write
AD2000
trusted library allocation
page read and write
2E6E000
trusted library allocation
page read and write
D9DE000
stack
page read and write
30C0000
trusted library allocation
page read and write
FC0000
heap
page read and write
4498000
trusted library allocation
page read and write
573B000
stack
page read and write
11FE000
stack
page read and write
B40000
trusted library allocation
page execute and read and write
ED0000
trusted library allocation
page read and write
2DD0000
trusted library allocation
page read and write
DADE000
stack
page read and write
A00000
heap
page read and write
54C0000
trusted library allocation
page read and write
D02F000
stack
page read and write
4A80000
trusted library allocation
page execute and read and write
557E000
stack
page read and write
2EC2000
trusted library allocation
page read and write
7381000
heap
page read and write
49E2000
trusted library allocation
page read and write
10A3000
heap
page read and write
532D000
stack
page read and write
4079000
trusted library allocation
page read and write
3FE5000
trusted library allocation
page read and write
56B0000
trusted library allocation
page read and write
4B10000
heap
page read and write
2F45000
trusted library allocation
page read and write
4F3D000
stack
page read and write
117A000
heap
page read and write
10B1000
heap
page read and write
5530000
heap
page read and write
E3A000
stack
page read and write
AA0000
heap
page read and write
C67E000
stack
page read and write
C77F000
stack
page read and write
2701000
trusted library allocation
page read and write
40CB000
trusted library allocation
page read and write
2EEB000
heap
page read and write
7030000
heap
page read and write
DFE000
stack
page read and write
1275000
heap
page read and write
5B30000
trusted library section
page read and write
58EE000
stack
page read and write
301A000
heap
page read and write
466C000
stack
page read and write
3002000
trusted library allocation
page read and write
5020000
trusted library allocation
page read and write
13EE000
stack
page read and write
C8C0000
heap
page read and write
FB0000
heap
page read and write
4D30000
heap
page execute and read and write
403B000
trusted library allocation
page read and write
EB0000
trusted library allocation
page read and write
2F12000
trusted library allocation
page read and write
2F0D000
trusted library allocation
page read and write
3E91000
trusted library allocation
page read and write
2D6A000
stack
page read and write
30C2000
trusted library allocation
page read and write
D61E000
stack
page read and write
13A0000
trusted library allocation
page read and write
E03E000
stack
page read and write
49BB000
trusted library allocation
page read and write
2D47000
trusted library allocation
page execute and read and write
1372000
trusted library allocation
page read and write
CB0E000
stack
page read and write
124D000
trusted library allocation
page execute and read and write
696F000
stack
page read and write
69AE000
stack
page read and write
9010000
trusted library allocation
page execute and read and write
ABF000
stack
page read and write
41C7000
trusted library allocation
page read and write
EF2000
trusted library allocation
page read and write
B00000
trusted library allocation
page read and write
5D9E000
stack
page read and write
1230000
trusted library allocation
page read and write
EE0000
trusted library allocation
page read and write
10B4000
trusted library allocation
page read and write
2DAE000
stack
page read and write
6743000
heap
page read and write
529E000
trusted library allocation
page read and write
3F13000
trusted library allocation
page read and write
137A000
trusted library allocation
page execute and read and write
10B0000
trusted library allocation
page read and write
7B0000
trusted library allocation
page read and write
B60000
trusted library allocation
page read and write
2FF7000
trusted library allocation
page read and write
3113000
trusted library allocation
page read and write
52B6000
trusted library allocation
page read and write
EC4000
trusted library allocation
page read and write
2475000
trusted library allocation
page read and write
55D0000
heap
page read and write
314E000
unkown
page read and write
56A0000
heap
page read and write
D65E000
stack
page read and write
2EF9000
trusted library allocation
page read and write
3E84000
trusted library allocation
page read and write
D90000
heap
page read and write
58F0000
heap
page read and write
F60000
heap
page read and write
D16E000
stack
page read and write
FF6000
heap
page read and write
2480000
heap
page execute and read and write
6CE0000
trusted library allocation
page read and write
6C7E000
stack
page read and write
2E79000
trusted library allocation
page read and write
154E000
stack
page read and write
2D42000
trusted library allocation
page read and write
2D36000
trusted library allocation
page execute and read and write
There are 580 hidden memdumps, click here to show them.