IOC Report
KClGcCpDAP.exe

loading gif

Files

File Path
Type
Category
Malicious
KClGcCpDAP.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Local\Temp\validPower_Lnz_x64.exe
PE32+ executable (GUI) x86-64, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\TlsCloud_WRv3_x64\Virtual.exe
PE32+ executable (GUI) x86-64, for MS Windows
dropped
malicious
C:\Windows\Temp\{8CB9D4BD-BB58-4C1B-96C8-872261C205E0}\.ba\Virtual.exe
PE32+ executable (GUI) x86-64, for MS Windows
dropped
malicious
C:\Windows\Temp\{F5D68338-3B04-47F6-AE14-10EB1750048C}\.cr\KClGcCpDAP.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\106dbf4d
data
dropped
C:\Users\user\AppData\Local\Temp\1709cbe3
data
dropped
C:\Users\user\AppData\Local\Temp\Coastguardsman_20241007011406.log
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\bewwwy
PE32+ executable (GUI) x86-64 (stripped to external PDB), for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\f99c993e
data
dropped
C:\Users\user\AppData\Local\Temp\jamulieilmfjkk
PE32+ executable (GUI) x86-64 (stripped to external PDB), for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\xdhqslqcnobw
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Archive, ctime=Mon Oct 7 04:14:07 2024, mtime=Mon Oct 7 04:14:08 2024, atime=Sun Oct 6 07:05:58 2024, length=3559696, window=hide
dropped
C:\Users\user\AppData\Roaming\TlsCloud_WRv3_x64\VBoxDDU.dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Roaming\TlsCloud_WRv3_x64\VBoxRT.dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Roaming\TlsCloud_WRv3_x64\ehky
data
dropped
C:\Users\user\AppData\Roaming\TlsCloud_WRv3_x64\lni
data
dropped
C:\Users\user\AppData\Roaming\TlsCloud_WRv3_x64\msvcp100.dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Roaming\TlsCloud_WRv3_x64\msvcr100.dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Windows\Temp\{8CB9D4BD-BB58-4C1B-96C8-872261C205E0}\.ba\Ammonium.dll
PE32 executable (DLL) (console) Intel 80386 (stripped to external PDB), for MS Windows
dropped
C:\Windows\Temp\{8CB9D4BD-BB58-4C1B-96C8-872261C205E0}\.ba\BootstrapperApplicationData.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with very long lines (472), with CRLF line terminators
dropped
C:\Windows\Temp\{8CB9D4BD-BB58-4C1B-96C8-872261C205E0}\.ba\VBoxDDU.dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Windows\Temp\{8CB9D4BD-BB58-4C1B-96C8-872261C205E0}\.ba\VBoxRT.dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Windows\Temp\{8CB9D4BD-BB58-4C1B-96C8-872261C205E0}\.ba\ehky
data
dropped
C:\Windows\Temp\{8CB9D4BD-BB58-4C1B-96C8-872261C205E0}\.ba\lni
data
dropped
C:\Windows\Temp\{8CB9D4BD-BB58-4C1B-96C8-872261C205E0}\.ba\msvcp100.dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Windows\Temp\{8CB9D4BD-BB58-4C1B-96C8-872261C205E0}\.ba\msvcr100.dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
There are 16 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\KClGcCpDAP.exe
"C:\Users\user\Desktop\KClGcCpDAP.exe"
malicious
C:\Windows\Temp\{F5D68338-3B04-47F6-AE14-10EB1750048C}\.cr\KClGcCpDAP.exe
"C:\Windows\Temp\{F5D68338-3B04-47F6-AE14-10EB1750048C}\.cr\KClGcCpDAP.exe" -burn.clean.room="C:\Users\user\Desktop\KClGcCpDAP.exe" -burn.filehandle.attached=524 -burn.filehandle.self=544
malicious
C:\Windows\Temp\{8CB9D4BD-BB58-4C1B-96C8-872261C205E0}\.ba\Virtual.exe
"C:\Windows\Temp\{8CB9D4BD-BB58-4C1B-96C8-872261C205E0}\.ba\Virtual.exe"
malicious
C:\Users\user\AppData\Roaming\TlsCloud_WRv3_x64\Virtual.exe
C:\Users\user\AppData\Roaming\TlsCloud_WRv3_x64\Virtual.exe
malicious
C:\Windows\SysWOW64\cmd.exe
C:\Windows\SysWOW64\cmd.exe
malicious
C:\Users\user\AppData\Local\Temp\validPower_Lnz_x64.exe
C:\Users\user\AppData\Local\Temp\validPower_Lnz_x64.exe
malicious
C:\Users\user\AppData\Roaming\TlsCloud_WRv3_x64\Virtual.exe
"C:\Users\user\AppData\Roaming\TlsCloud_WRv3_x64\Virtual.exe"
malicious
C:\Windows\SysWOW64\cmd.exe
C:\Windows\SysWOW64\cmd.exe
malicious
C:\Users\user\AppData\Roaming\TlsCloud_WRv3_x64\Virtual.exe
"C:\Users\user\AppData\Roaming\TlsCloud_WRv3_x64\Virtual.exe"
malicious
C:\Windows\SysWOW64\cmd.exe
C:\Windows\SysWOW64\cmd.exe
malicious
C:\Users\user\AppData\Local\Temp\validPower_Lnz_x64.exe
C:\Users\user\AppData\Local\Temp\validPower_Lnz_x64.exe
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
There are 4 hidden processes, click here to show them.

URLs

Name
IP
Malicious
http://www.openssl.org/support/faq.html....................D:
unknown
https://apokalipo.cyou/watchvideo-sheila-avis-de-recherche-191280-2770205.htmleldbZzsLLytC%2FMtKEkDE
unknown
http://schemas.mic
unknown
http://www.vmware.com/0
unknown
http://www.softwareok.com/?Freeware/Find.Same.Images.OK/History
unknown
https://apokalipo.cyou/2t2
unknown
https://apokalipo.cyou/watchvideo-sheila-avis-de-recherche-191280-2770205.html?xevok9zcbyqunjb=ZzsLL
unknown
http://www.softwareok.com/?Freeware/Find.Same.Images.OK
unknown
http://www.vmware.com/interfaces/specifications/vmdk.html#compressedhttp://www.vmware.com/specificat
unknown
http://virtualbox.org/firmware/VBoxEFIDual.fd
unknown
http://virtualbox.org/firmware/VBoxEFI32.fdVBoxEFI64.fdhttp://virtualbox.org/firmware/VBoxEFI64.fdVB
unknown
http://www.openssl.org/support/faq.html
unknown
http://www.softwareok.de/?Freeware/Find.Same.Images.OK
unknown
https://apokalipo.cyou/watchvideo-sheila-avis-de-recherche-191280-2770205.html
unknown
https://apokalipo.cyou/N
unknown
http://crl.thawte.com/ThawteTimestampingCA.crl0
unknown
http://virtualbox.org/firmware/VBoxEFI32.fd
unknown
http://www.softwareok.de/?seite=faq-Find.Same.Images.OK&faq=0
unknown
http://www.softwareok.de
unknown
http://www.softwareok.de/?Freeware/Find.Same.Images.OK/History
unknown
https://apokalipo.cyou/
unknown
http://www.softwareok.com/?Download=Find.Same.Images.OK
unknown
http://curl.haxx.se/rfc/cookie_spec.html
unknown
http://www.vmware.com/interfaces/specifications/vmdk.html#compressed
unknown
http://www.vmware.com/schema/ovf/1/envelope
unknown
http://virtualbox.org/firmware/VBoxEFI64.fd
unknown
https://apokalipo.cyou/watchvideo-sheila-avis-de-recherche-191280-2770205.html?xevok9zcbyqunjb=ZzsLLytC%2FMtKEkDEIiMG%2BNOJ3DYSue3YuBdMbTrtqKKdsg%2BC%2Fobe9lLJF33efnkG
188.114.96.3
http://www.softwareok.de/?Download=Find.Same.Images.OK
unknown
http://ocsp.thawte.com0
unknown
http://www.virtualbox.org/ovf/machine
unknown
http://www.vmware.com/0/
unknown
http://www.softwareok.com/?seite=faq-Find.Same.Images.OK&faq=0
unknown
http://appsyndication.org/2006/appsynapplicationapuputil.cppupgradeexclusivetrueenclosuredigestalgor
unknown
http://www.???.xx/?search=%s
unknown
http://www.oasis-open.org/committees/entity/release/1.0/catalog.dtd
unknown
http://www.symauth.com/cps0(
unknown
http://relaxng.org/ns/structure/1.0allocating
unknown
http://www.symauth.com/rpa00
unknown
https://apokalipo.cyou:443/watchvideo-sheila-avis-de-recherche-191280-2770205.html?xevok9zcbyqunjb=Z
unknown
http://www.innotek.de/VirtualBox-settings
unknown
http://www.info-zip.org/
unknown
https://gnu.org/licenses/
unknown
http://www.vmware.com/specifications/vmdk.html#compressed
unknown
https://gnu.org/licenses/gpl.html
unknown
http://relaxng.org/ns/structure/1.0
unknown
http://www.vmware.com/interfaces/specifications/vmdk.html#streamOptimized
unknown
http://www.vmware.com/specifications/vmdk.html#sparse
unknown
http://www.surfok.de/
unknown
http://crl.v
unknown
http://www.softwareok.com
unknown
http://www.vmware.com/specifications/vmdk.html#sparsehttp://www.vmware.com/interfaces/specifications
unknown
http://appsyndication.org/2006/appsyn
unknown
There are 42 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
apokalipo.cyou
188.114.96.3

IPs

IP
Domain
Country
Malicious
188.114.96.3
apokalipo.cyou
European Union

Memdumps

Base Address
Regiontype
Protect
Malicious
361D000
heap
page read and write
malicious
3F99000
heap
page read and write
malicious
3DF6000
heap
page read and write
malicious
3A96000
heap
page read and write
malicious
554C000
trusted library allocation
page read and write
malicious
3390000
heap
page read and write
malicious
2626000
unkown
page read and write
malicious
4EEA000
trusted library allocation
page read and write
malicious
5366000
trusted library allocation
page read and write
malicious
25FE000
unkown
page read and write
malicious
312C000
heap
page read and write
5FE1000
unkown
page read and write
3940000
unkown
page read and write
3DA0000
trusted library allocation
page read and write
49C0000
unkown
page read and write
2F74000
heap
page read and write
4F8000
heap
page read and write
38E4000
unkown
page read and write
33BE000
heap
page read and write
4F5000
heap
page read and write
EA6000
heap
page read and write
29BA000
stack
page read and write
4BD8000
unkown
page read and write
666F4000
unkown
page write copy
17A0000
heap
page read and write
135B000
heap
page read and write
7FF69E565000
unkown
page read and write
2B08000
heap
page read and write
7FFDFB2B0000
unkown
page read and write
7FF718577000
unkown
page readonly
3C67000
unkown
page read and write
2894000
heap
page read and write
346E000
heap
page read and write
7FFDFB853000
unkown
page write copy
6657A000
unkown
page readonly
4DD000
heap
page read and write
552000
heap
page read and write
12FB000
stack
page read and write
138D000
heap
page read and write
7FF6C5671000
unkown
page execute read
3670000
heap
page read and write
4668000
unkown
page read and write
35D0000
remote allocation
page read and write
2F74000
heap
page read and write
2D3D000
direct allocation
page read and write
4DB000
heap
page read and write
5BC1000
unkown
page read and write
5BC1000
unkown
page read and write
666FA000
unkown
page readonly
7FFDFB423000
unkown
page write copy
5860000
unkown
page read and write
4463000
unkown
page read and write
483B000
unkown
page read and write
38E9000
heap
page read and write
2C84000
heap
page read and write
665A0000
unkown
page readonly
390000
heap
page read and write
665A1000
unkown
page execute read
30FD000
stack
page read and write
A89000
heap
page read and write
4DD000
heap
page read and write
5466000
unkown
page read and write
B9F000
stack
page read and write
5BC1000
unkown
page read and write
4B0A000
unkown
page read and write
137E000
heap
page read and write
2C84000
heap
page read and write
1386000
heap
page read and write
66574000
unkown
page write copy
5630000
direct allocation
page read and write
2C86000
direct allocation
page read and write
3830000
heap
page read and write
6662C000
unkown
page read and write
66586000
unkown
page readonly
5939000
direct allocation
page read and write
2C84000
heap
page read and write
7064000
unkown
page read and write
2C84000
heap
page read and write
7FFE01301000
unkown
page execute read
665A1000
unkown
page execute read
4667000
unkown
page read and write
66E9000
unkown
page read and write
5D3E000
stack
page read and write
1348000
heap
page read and write
59E1000
unkown
page read and write
66706000
unkown
page readonly
2D37000
direct allocation
page read and write
3390000
heap
page read and write
1A0000
heap
page read and write
2F74000
heap
page read and write
4357000
trusted library allocation
page read and write
28DE000
unkown
page read and write
2F74000
heap
page read and write
5BC1000
unkown
page read and write
1401A9000
unkown
page write copy
5BC1000
unkown
page read and write
F26000
heap
page read and write
4F8000
heap
page read and write
331F000
stack
page read and write
11ED000
stack
page read and write
7FFE0CFE9000
unkown
page readonly
485000
heap
page read and write
2F74000
heap
page read and write
59E0000
unkown
page read and write
2F74000
heap
page read and write
2C84000
heap
page read and write
5BC1000
unkown
page read and write
3A20000
unkown
page read and write
666D1000
unkown
page readonly
5BC1000
unkown
page read and write
597000
heap
page read and write
66640000
unkown
page readonly
F88000
heap
page read and write
3E60000
unkown
page read and write
47F000
heap
page read and write
40CA000
heap
page read and write
68E9000
unkown
page read and write
4FDF000
unkown
page read and write
61E4000
unkown
page read and write
7FF6C5670000
unkown
page readonly
5264000
unkown
page read and write
799B000
stack
page read and write
595000
heap
page read and write
7FF69E54F000
unkown
page readonly
493000
heap
page read and write
31B0000
heap
page read and write
7FF718653000
unkown
page readonly
18F0000
heap
page read and write
2F74000
heap
page read and write
5B4000
heap
page read and write
4CA5000
trusted library allocation
page read and write
8F9000
stack
page read and write
78B000
heap
page read and write
5BC1000
unkown
page read and write
5BC1000
unkown
page read and write
4065000
unkown
page read and write
14B0000
heap
page read and write
7FFDFAEF0000
unkown
page readonly
1376000
heap
page read and write
4DDB000
unkown
page read and write
138D000
heap
page read and write
2F74000
heap
page read and write
1365000
heap
page read and write
2F74000
heap
page read and write
2D2C000
direct allocation
page read and write
13F0000
heap
page read and write
2F74000
heap
page read and write
4DD000
heap
page read and write
593D000
direct allocation
page read and write
4DB000
heap
page read and write
62ED000
unkown
page read and write
5F0000
heap
page read and write
6662F000
unkown
page read and write
5BC1000
unkown
page read and write
2894000
heap
page read and write
465000
heap
page read and write
6BE0000
unkown
page read and write
37C2000
trusted library allocation
page read and write
2C6E000
unkown
page read and write
314D000
heap
page read and write
7FFDFB43D000
unkown
page readonly
37C1000
trusted library allocation
page read and write
7FFDFB295000
unkown
page readonly
2F74000
heap
page read and write
871000
unkown
page execute read
2C84000
heap
page read and write
2F74000
heap
page read and write
2C84000
heap
page read and write
5BC1000
unkown
page read and write
2CA0000
heap
page read and write
2E00000
heap
page read and write
2C84000
heap
page read and write
3990000
heap
page read and write
4DD000
heap
page read and write
CE6000
heap
page read and write
5E69000
unkown
page read and write
1390000
unkown
page read and write
7FFDFB423000
unkown
page write copy
4560000
unkown
page read and write
5665000
unkown
page read and write
5D7E000
stack
page read and write
66640000
unkown
page readonly
1401C7000
unkown
page readonly
3BD9000
unkown
page read and write
FAF000
heap
page read and write
552000
heap
page read and write
2D33000
direct allocation
page read and write
47E6000
trusted library allocation
page read and write
5DDA000
unkown
page read and write
317F000
stack
page read and write
3180000
heap
page read and write
4857000
trusted library allocation
page read and write
5BC1000
unkown
page read and write
5BC1000
unkown
page read and write
7FF69E5D0000
unkown
page read and write
2F75000
heap
page read and write
2F74000
heap
page read and write
2894000
heap
page read and write
2C84000
heap
page read and write
482000
heap
page read and write
7FF6C5670000
unkown
page readonly
37C6000
trusted library allocation
page read and write
FAD000
heap
page read and write
7A9E000
stack
page read and write
534E000
direct allocation
page read and write
5BC1000
unkown
page read and write
2F74000
heap
page read and write
7FF718643000
unkown
page write copy
E20000
heap
page read and write
5BC1000
unkown
page read and write
A80000
heap
page read and write
396F000
stack
page read and write
785000
heap
page read and write
3C66000
unkown
page read and write
2C84000
heap
page read and write
37E0000
remote allocation
page read and write
666F4000
unkown
page write copy
5BC1000
unkown
page read and write
2F74000
heap
page read and write
2F74000
heap
page read and write
4E96000
heap
page read and write
6646F000
unkown
page readonly
47C6000
trusted library allocation
page read and write
337F000
stack
page read and write
7C1D000
stack
page read and write
2F7B000
heap
page read and write
65E2000
unkown
page read and write
57E4000
unkown
page read and write
148000
stack
page read and write
7FF6C5877000
unkown
page readonly
F08000
heap
page read and write
7FF718653000
unkown
page readonly
4E63000
unkown
page read and write
2F74000
heap
page read and write
5BC1000
unkown
page read and write
3EE6000
unkown
page read and write
7FFDFB125000
unkown
page readonly
4C63000
unkown
page read and write
2D30000
heap
page read and write
54D000
heap
page read and write
6662F000
unkown
page read and write
666F7000
unkown
page read and write
2F6E000
stack
page read and write
5D5E000
stack
page read and write
3670000
heap
page read and write
7FFDFB2CA000
unkown
page read and write
F20000
heap
page read and write
7FF718643000
unkown
page write copy
8DA000
unkown
page read and write
140156000
unkown
page readonly
190000
heap
page read and write
4152000
unkown
page read and write
2C84000
heap
page read and write
7FFDFB061000
unkown
page execute read
37C7000
trusted library allocation
page read and write
5BC1000
unkown
page read and write
7FFE0E130000
unkown
page readonly
3AEE000
unkown
page read and write
18C0000
trusted library allocation
page read and write
EB3000
unkown
page read and write
44C0000
trusted library allocation
page read and write
4632000
trusted library allocation
page read and write
2CA2000
direct allocation
page read and write
66421000
unkown
page execute read
59F0000
unkown
page read and write
493000
heap
page read and write
2C84000
heap
page read and write
66572000
unkown
page read and write
50D8000
trusted library allocation
page read and write
564000
heap
page read and write
66706000
unkown
page readonly
7FF718643000
unkown
page write copy
2CB6000
direct allocation
page read and write
666FA000
unkown
page readonly
2CA4000
heap
page read and write
164E000
stack
page read and write
2C84000
heap
page read and write
140001000
unkown
page execute read
2F74000
heap
page read and write
7FFE0E131000
unkown
page execute read
37C4000
trusted library allocation
page read and write
D6D000
unkown
page readonly
665EF000
unkown
page readonly
5265000
unkown
page read and write
781D000
stack
page read and write
44DE000
unkown
page read and write
2C84000
heap
page read and write
7FFE0E175000
unkown
page readonly
49E7000
unkown
page read and write
543000
heap
page read and write
4DB000
heap
page read and write
2F74000
heap
page read and write
5BC1000
unkown
page read and write
1510000
heap
page read and write
5BC1000
unkown
page read and write
7FF69E311000
unkown
page execute read
91E000
stack
page read and write
63D8000
unkown
page read and write
2C84000
heap
page read and write
DE0000
heap
page read and write
359000
stack
page read and write
4338000
unkown
page read and write
5BC1000
unkown
page read and write
462000
heap
page read and write
2F74000
heap
page read and write
3590000
heap
page read and write
21BA000
heap
page read and write
5BC1000
unkown
page read and write
5BC1000
unkown
page read and write
133B000
stack
page read and write
5BC1000
unkown
page read and write
3380000
heap
page read and write
5BC1000
unkown
page read and write
4DB000
heap
page read and write
990000
heap
page read and write
486F000
unkown
page read and write
F10000
heap
page read and write
7FF718371000
unkown
page execute read
2F74000
heap
page read and write
5BC1000
unkown
page read and write
7FF718653000
unkown
page readonly
3500000
unkown
page read and write
4D0000
heap
page read and write
1391000
unkown
page read and write
174E000
stack
page read and write
6FDF000
unkown
page read and write
2F74000
heap
page read and write
2356000
heap
page read and write
3A61000
heap
page read and write
4EEF000
unkown
page read and write
5E64000
unkown
page read and write
5FFF000
stack
page read and write
2C84000
heap
page read and write
31B4000
heap
page read and write
7FFE01300000
unkown
page readonly
2F74000
heap
page read and write
2894000
heap
page read and write
41C000
heap
page read and write
405E000
unkown
page read and write
2C84000
heap
page read and write
59E1000
unkown
page read and write
2F74000
heap
page read and write
2F74000
heap
page read and write
566C000
unkown
page read and write
5B1D000
stack
page read and write
51B0000
direct allocation
page read and write
5BC1000
unkown
page read and write
D00000
unkown
page readonly
7FF718653000
unkown
page readonly
7FF6AB97F000
unkown
page read and write
2D32000
direct allocation
page read and write
4D73000
heap
page read and write
4DD000
heap
page read and write
51F000
heap
page read and write
2F74000
heap
page read and write
2D3E000
direct allocation
page read and write
564000
heap
page read and write
664AE000
unkown
page write copy
5BC1000
unkown
page read and write
7FF718577000
unkown
page readonly
155D000
heap
page read and write
2F74000
heap
page read and write
C7E000
stack
page read and write
E35000
heap
page read and write
7FF6ABA0E000
unkown
page readonly
493000
heap
page read and write
119E000
stack
page read and write
4242000
heap
page read and write
27A0000
heap
page read and write
7FFE0E187000
unkown
page write copy
137C000
heap
page read and write
7FF6C5877000
unkown
page readonly
47F000
heap
page read and write
A9A000
heap
page read and write
4C5C000
trusted library allocation
page read and write
5BC1000
unkown
page read and write
174E000
stack
page read and write
2F74000
heap
page read and write
2C84000
heap
page read and write
14B5000
heap
page read and write
3320000
unkown
page read and write
140001000
unkown
page execute read
8DA000
unkown
page write copy
994000
heap
page read and write
66702000
unkown
page execute
3DDF000
unkown
page read and write
2F74000
heap
page read and write
558000
heap
page read and write
8BB000
unkown
page readonly
5BC0000
unkown
page read and write
3CFD000
heap
page read and write
2894000
heap
page read and write
4DB000
heap
page read and write
7FF718577000
unkown
page readonly
2A9B000
stack
page read and write
558000
heap
page read and write
6869000
unkown
page read and write
666F2000
unkown
page read and write
2C84000
heap
page read and write
4646000
trusted library allocation
page read and write
2C84000
heap
page read and write
3E52000
trusted library allocation
page read and write
7FF718577000
unkown
page readonly
52BE000
trusted library allocation
page read and write
51D9000
unkown
page read and write
386E000
stack
page read and write
2C84000
heap
page read and write
48C0000
unkown
page read and write
5BC1000
unkown
page read and write
3480000
heap
page read and write
3BB0000
heap
page read and write
FD0000
heap
page read and write
31AF000
stack
page read and write
7FFE0E175000
unkown
page readonly
2C76000
direct allocation
page read and write
3D6A000
heap
page read and write
137C000
heap
page read and write
7FFE0E131000
unkown
page execute read
4A66000
unkown
page read and write
664AC000
unkown
page read and write
5BC1000
unkown
page read and write
7FFDFB850000
unkown
page read and write
467000
heap
page read and write
7FFDFB060000
unkown
page readonly
42D2000
trusted library allocation
page read and write
45E5000
unkown
page read and write
2F74000
heap
page read and write
139B000
unkown
page read and write
5BC1000
unkown
page read and write
1380000
heap
page read and write
597000
heap
page read and write
133E000
stack
page read and write
2F7F000
stack
page read and write
52DD000
direct allocation
page read and write
2F74000
heap
page read and write
4DB000
heap
page read and write
665A0000
unkown
page readonly
2C72000
direct allocation
page read and write
8DD000
unkown
page readonly
66641000
unkown
page execute read
666F4000
unkown
page write copy
155D000
heap
page read and write
2C66000
direct allocation
page read and write
3360000
heap
page read and write
2AE6000
direct allocation
page read and write
2F74000
heap
page read and write
2980000
heap
page read and write
558000
heap
page read and write
41E0000
unkown
page read and write
9B5000
heap
page read and write
13A0000
heap
page read and write
6E252000
unkown
page read and write
2FFE000
unkown
page read and write
7FFE0E189000
unkown
page readonly
7FF718371000
unkown
page execute read
7FF6C5671000
unkown
page execute read
25DD000
unkown
page read and write
2F1E000
unkown
page read and write
5BC1000
unkown
page read and write
5EE2000
unkown
page read and write
2C84000
heap
page read and write
666FA000
unkown
page readonly
3A61000
unkown
page read and write
5AE000
heap
page read and write
7FF718577000
unkown
page readonly
109D000
stack
page read and write
4F9000
heap
page read and write
2F74000
heap
page read and write
5BC1000
unkown
page read and write
2C84000
heap
page read and write
6258000
unkown
page read and write
2C84000
heap
page read and write
2C84000
heap
page read and write
5BC1000
unkown
page read and write
595000
heap
page read and write
5BC1000
unkown
page read and write
1340000
heap
page read and write
3E0000
heap
page read and write
605A000
unkown
page read and write
2C84000
heap
page read and write
7FFDFB435000
unkown
page read and write
7FF718643000
unkown
page write copy
35D0000
unkown
page read and write
2786000
direct allocation
page read and write
37E0000
remote allocation
page read and write
666F7000
unkown
page read and write
3D53000
heap
page read and write
35D0000
remote allocation
page read and write
59AE000
direct allocation
page read and write
5759000
direct allocation
page read and write
5BC1000
unkown
page read and write
33E0000
trusted library allocation
page read and write
4F3000
heap
page read and write
4160000
trusted library allocation
page read and write
D6A000
unkown
page write copy
7FFDFB491000
unkown
page execute read
160E000
stack
page read and write
42C6000
trusted library allocation
page read and write
4DD000
heap
page read and write
F5C000
stack
page read and write
42E6000
trusted library allocation
page read and write
5DF0000
heap
page read and write
37C5000
trusted library allocation
page read and write
5BC1000
unkown
page read and write
7C9E000
stack
page read and write
779D000
stack
page read and write
7CE000
stack
page read and write
5AE5000
unkown
page read and write
54ED000
unkown
page read and write
2C80000
heap
page read and write
4AC000
heap
page read and write
59E1000
unkown
page read and write
4CEB000
unkown
page read and write
2300000
direct allocation
page read and write
B90000
heap
page read and write
7FFDFB43A000
unkown
page read and write
1536000
heap
page read and write
3CE8000
unkown
page read and write
2C84000
heap
page read and write
646A000
unkown
page read and write
666F2000
unkown
page read and write
1A0000
heap
page read and write
66582000
unkown
page execute
2F74000
heap
page read and write
5BDC000
unkown
page read and write
2F74000
heap
page read and write
138D000
heap
page read and write
66420000
unkown
page readonly
140000000
unkown
page readonly
7FFE01345000
unkown
page readonly
FAE000
heap
page read and write
137E000
heap
page read and write
2C84000
heap
page read and write
FAD000
heap
page read and write
1255000
heap
page read and write
AEB000
heap
page read and write
FC0000
heap
page read and write
34C0000
heap
page read and write
137C000
heap
page read and write
5CFE000
stack
page read and write
5BC1000
unkown
page read and write
7FFDFB6C5000
unkown
page readonly
597000
heap
page read and write
1391000
unkown
page read and write
2CCD000
stack
page read and write
2C84000
heap
page read and write
140000000
unkown
page readonly
2CA4000
heap
page read and write
66631000
unkown
page readonly
50D000
heap
page read and write
AE6000
heap
page read and write
5C5D000
unkown
page read and write
2894000
heap
page read and write
4AB000
heap
page read and write
575D000
direct allocation
page read and write
4366000
unkown
page read and write
7D1F000
stack
page read and write
7FFE0CFD5000
unkown
page readonly
2C84000
heap
page read and write
47F000
heap
page read and write
6E230000
unkown
page readonly
38BD000
heap
page read and write
FAE000
heap
page read and write
57CE000
direct allocation
page read and write
291E000
stack
page read and write
2C84000
heap
page read and write
7FF718370000
unkown
page readonly
D01000
unkown
page execute read
7D9F000
stack
page read and write
2C84000
heap
page read and write
5EFF000
stack
page read and write
467000
heap
page read and write
66577000
unkown
page read and write
2F74000
heap
page read and write
791E000
stack
page read and write
2F74000
heap
page read and write
3940000
unkown
page read and write
5BC1000
unkown
page read and write
2C84000
heap
page read and write
405D000
unkown
page read and write
39A0000
trusted library allocation
page read and write
154F000
heap
page read and write
4AC000
heap
page read and write
7FF6C5953000
unkown
page readonly
1543000
heap
page read and write
487000
heap
page read and write
2D27000
direct allocation
page read and write
2950000
direct allocation
page read and write
3660000
unkown
page read and write
565000
heap
page read and write
6A68000
unkown
page read and write
2D28000
direct allocation
page read and write
2D1F000
direct allocation
page read and write
7FF6ABA10000
unkown
page read and write
2C84000
heap
page read and write
467000
heap
page read and write
46C3000
unkown
page read and write
5307000
trusted library allocation
page read and write
E40000
unkown
page read and write
4AC1000
unkown
page read and write
B50000
heap
page read and write
D6A000
unkown
page read and write
FAD000
heap
page read and write
6C61000
unkown
page read and write
2F74000
heap
page read and write
7FF69E568000
unkown
page read and write
2987000
heap
page read and write
B15000
heap
page read and write
8DD000
unkown
page readonly
EAC000
heap
page read and write
2C84000
heap
page read and write
FC0000
heap
page read and write
493000
heap
page read and write
4F0000
heap
page read and write
5463000
unkown
page read and write
1401F4000
unkown
page readonly
2F75000
heap
page read and write
5BC1000
unkown
page read and write
A10000
heap
page read and write
66641000
unkown
page execute read
2C84000
heap
page read and write
53E000
heap
page read and write
666D1000
unkown
page readonly
5DFE000
stack
page read and write
3A0000
heap
page read and write
2894000
heap
page read and write
5BC1000
unkown
page read and write
7FF6C5953000
unkown
page readonly
2C84000
heap
page read and write
7FF6AB750000
unkown
page readonly
3381000
heap
page read and write
2F74000
heap
page read and write
446D000
unkown
page read and write
5660000
direct allocation
page read and write
2C84000
heap
page read and write
664AF000
unkown
page read and write
2E00000
heap
page read and write
2F74000
heap
page read and write
5BC1000
unkown
page read and write
2F74000
heap
page read and write
7FF718643000
unkown
page write copy
59E1000
unkown
page read and write
2AD0000
direct allocation
page read and write
5BC1000
unkown
page read and write
61A0000
unkown
page read and write
2F74000
heap
page read and write
4F7000
heap
page read and write
1401F4000
unkown
page readonly
5BC1000
unkown
page read and write
2F47000
heap
page read and write
728000
heap
page read and write
4AC000
heap
page read and write
40E0000
unkown
page read and write
2F74000
heap
page read and write
2F74000
heap
page read and write
499000
heap
page read and write
5C1E000
stack
page read and write
5BC1000
unkown
page read and write
5BC1000
unkown
page read and write
664B1000
unkown
page readonly
5BC1000
unkown
page read and write
7FF718370000
unkown
page readonly
2C7F000
stack
page read and write
4A60000
unkown
page read and write
7FFE0CF90000
unkown
page readonly
1401E0000
unkown
page readonly
4660000
trusted library allocation
page read and write
664C0000
unkown
page readonly
3EE2000
heap
page read and write
67E3000
unkown
page read and write
7FF6C5943000
unkown
page write copy
6E253000
unkown
page readonly
EF8000
stack
page read and write
519000
heap
page read and write
1401C7000
unkown
page readonly
3370000
heap
page read and write
37CC000
trusted library allocation
page read and write
8BB000
unkown
page readonly
597000
heap
page read and write
2C20000
heap
page read and write
7FFDFB2C5000
unkown
page read and write
7FFDFB2B3000
unkown
page write copy
1401A9000
unkown
page write copy
2770000
direct allocation
page read and write
1898000
stack
page read and write
2F74000
heap
page read and write
66551000
unkown
page readonly
1401C7000
unkown
page readonly
37CB000
trusted library allocation
page read and write
1391000
unkown
page read and write
2F74000
heap
page read and write
543000
heap
page read and write
34DC000
stack
page read and write
307E000
unkown
page read and write
7064000
unkown
page read and write
5BC1000
unkown
page read and write
1C0000
heap
page read and write
B40000
heap
page read and write
3120000
heap
page read and write
3450000
heap
page read and write
485000
heap
page read and write
5BC1000
unkown
page read and write
3FDE000
unkown
page read and write
665A1000
unkown
page execute read
7FF6AB9A5000
unkown
page read and write
5BC1000
unkown
page read and write
140000000
unkown
page readonly
7FFDFB061000
unkown
page execute read
B10000
heap
page read and write
485A000
unkown
page read and write
E50000
heap
page read and write
2D05000
direct allocation
page read and write
2332000
heap
page read and write
60E0000
unkown
page read and write
37CA000
trusted library allocation
page read and write
F2B000
heap
page read and write
6E0000
heap
page read and write
7FFE0E187000
unkown
page write copy
318B000
heap
page read and write
48FD000
heap
page read and write
606C000
unkown
page read and write
6662C000
unkown
page read and write
3B5A000
heap
page read and write
7FFE0CF91000
unkown
page execute read
EA0000
heap
page read and write
2FAF000
stack
page read and write
44B000
heap
page read and write
52D9000
direct allocation
page read and write
2B9A000
stack
page read and write
3E66000
trusted library allocation
page read and write
66640000
unkown
page readonly
7FF69E53F000
unkown
page read and write
2F74000
heap
page read and write
71DC000
unkown
page read and write
558000
heap
page read and write
5BC1000
unkown
page read and write
138D000
heap
page read and write
D00000
unkown
page readonly
2F74000
heap
page read and write
2F74000
heap
page read and write
499000
heap
page read and write
358F000
stack
page read and write
CF9000
stack
page read and write
2C84000
heap
page read and write
1325000
heap
page read and write
1367000
heap
page read and write
33AF000
stack
page read and write
462000
heap
page read and write
7FF718371000
unkown
page execute read
2C84000
heap
page read and write
2C84000
heap
page read and write
52EB000
unkown
page read and write
7DF000
stack
page read and write
6EEC000
unkown
page read and write
2C60000
direct allocation
page read and write
2F70000
heap
page read and write
3A50000
heap
page execute read
5BC1000
unkown
page read and write
4AEC000
unkown
page read and write
50EC000
unkown
page read and write
38D0000
heap
page execute read
7FF718370000
unkown
page readonly
2C84000
heap
page read and write
2F74000
heap
page read and write
58E3000
unkown
page read and write
7FF718643000
unkown
page write copy
4AB000
heap
page read and write
47D2000
trusted library allocation
page read and write
5BC1000
unkown
page read and write
2E0B000
heap
page read and write
D6D000
unkown
page readonly
7FFDFB420000
unkown
page read and write
154D000
heap
page read and write
44EF000
unkown
page read and write
6C64000
unkown
page read and write
2B30000
direct allocation
page read and write
7FF718370000
unkown
page readonly
30B0000
direct allocation
page read and write
2F74000
heap
page read and write
66631000
unkown
page readonly
2D0E000
direct allocation
page read and write
7FFDFB060000
unkown
page readonly
5BC1000
unkown
page read and write
416000
heap
page read and write
2C84000
heap
page read and write
519000
heap
page read and write
4F3000
heap
page read and write
2C84000
heap
page read and write
7FFDFB43A000
unkown
page read and write
6260000
unkown
page read and write
664C1000
unkown
page execute read
354E000
stack
page read and write
1401A9000
unkown
page write copy
263C000
stack
page read and write
595000
heap
page read and write
7FF718371000
unkown
page execute read
2880000
heap
page read and write
2C84000
heap
page read and write
60FF000
stack
page read and write
D7D000
stack
page read and write
18F9000
heap
page read and write
140156000
unkown
page readonly
2D07000
direct allocation
page read and write
A1E000
stack
page read and write
37AF000
stack
page read and write
58C0000
unkown
page read and write
1401C7000
unkown
page readonly
13F2000
unkown
page read and write
25B5000
unkown
page read and write
4C64000
unkown
page read and write
2F74000
heap
page read and write
37C9000
trusted library allocation
page read and write
5067000
unkown
page read and write
A40000
heap
page read and write
4F8000
heap
page read and write
425B000
unkown
page read and write
5BC1000
unkown
page read and write
3550000
heap
page read and write
1401F4000
unkown
page readonly
5BC1000
unkown
page read and write
2B00000
direct allocation
page read and write
47F000
heap
page read and write
48EE000
unkown
page read and write
3600000
heap
page read and write
66702000
unkown
page execute
1401E0000
unkown
page readonly
BBF000
stack
page read and write
5BC1000
unkown
page read and write
3EE5000
unkown
page read and write
1250000
heap
page read and write
5BC1000
unkown
page read and write
6861000
unkown
page read and write
6465000
unkown
page read and write
2F74000
heap
page read and write
2D03000
direct allocation
page read and write
5BC1000
unkown
page read and write
6E231000
unkown
page execute read
3394000
heap
page read and write
FF0000
heap
page read and write
6662F000
unkown
page read and write
7FF718370000
unkown
page readonly
56E8000
unkown
page read and write
66706000
unkown
page readonly
35A0000
heap
page read and write
5BC1000
unkown
page read and write
18A0000
heap
page read and write
5BC1000
unkown
page read and write
5810000
direct allocation
page read and write
3E66000
unkown
page read and write
2F74000
heap
page read and write
46B7000
trusted library allocation
page read and write
7FFE0E189000
unkown
page readonly
871000
unkown
page execute read
2894000
heap
page read and write
4939000
unkown
page read and write
597000
heap
page read and write
7FF6AB9A8000
unkown
page read and write
E30000
heap
page read and write
2894000
heap
page read and write
2F74000
heap
page read and write
6AE9000
unkown
page read and write
66702000
unkown
page execute
136C000
heap
page read and write
6A61000
unkown
page read and write
53DD000
unkown
page read and write
BC0000
heap
page read and write
2F74000
heap
page read and write
53E000
heap
page read and write
2F74000
heap
page read and write
2D38000
heap
page read and write
56B000
heap
page read and write
2C84000
heap
page read and write
3394000
heap
page read and write
552000
heap
page read and write
1401A9000
unkown
page write copy
7FFE01359000
unkown
page readonly
6E26B000
unkown
page readonly
2C96000
direct allocation
page read and write
3713000
heap
page read and write
2F74000
heap
page read and write
5BC1000
unkown
page read and write
CE0000
heap
page read and write
5D60000
unkown
page read and write
7FFE01357000
unkown
page write copy
5BC1000
unkown
page read and write
7A1F000
stack
page read and write
5BC1000
unkown
page read and write
3E46000
trusted library allocation
page read and write
5CEC000
unkown
page read and write
7FF718577000
unkown
page readonly
595000
heap
page read and write
53E000
heap
page read and write
66631000
unkown
page readonly
18E0000
heap
page read and write
2F74000
heap
page read and write
140001000
unkown
page execute read
2D00000
direct allocation
page read and write
41DD000
unkown
page read and write
56B000
heap
page read and write
2C84000
heap
page read and write
4E67000
unkown
page read and write
2C84000
heap
page read and write
2894000
heap
page read and write
9B0000
heap
page read and write
4F5000
heap
page read and write
51F000
heap
page read and write
4F3000
heap
page read and write
37C3000
trusted library allocation
page read and write
1517000
heap
page read and write
5A64000
unkown
page read and write
665EF000
unkown
page readonly
5561000
unkown
page read and write
4D8000
heap
page read and write
18F6000
heap
page read and write
51E000
heap
page read and write
761B000
stack
page read and write
6CE4000
unkown
page read and write
2F74000
heap
page read and write
870000
unkown
page readonly
499000
heap
page read and write
154F000
heap
page read and write
5561000
unkown
page read and write
35D0000
remote allocation
page read and write
37CD000
trusted library allocation
page read and write
7FFDFB435000
unkown
page read and write
7FF69E310000
unkown
page readonly
5BC1000
unkown
page read and write
5BC1000
unkown
page read and write
2890000
heap
page read and write
35AF000
stack
page read and write
6662E000
unkown
page write copy
31B4000
heap
page read and write
5BC1000
unkown
page read and write
552000
heap
page read and write
6E265000
unkown
page readonly
64EC000
unkown
page read and write
2F74000
heap
page read and write
7FF6ABA0A000
unkown
page read and write
540000
heap
page read and write
1320000
heap
page read and write
5A5B000
unkown
page read and write
4267000
unkown
page read and write
5BC1000
unkown
page read and write
5BC1000
unkown
page read and write
5BC1000
unkown
page read and write
2994000
heap
page read and write
3A5C000
unkown
page read and write
37FA000
heap
page read and write
170E000
stack
page read and write
5BC1000
unkown
page read and write
2F74000
heap
page read and write
7FF69E5CA000
unkown
page read and write
2B7E000
unkown
page read and write
6E26A000
unkown
page write copy
410000
heap
page read and write
7FF718371000
unkown
page execute read
36A0000
heap
page read and write
7FF69E5CE000
unkown
page readonly
5BC1000
unkown
page read and write
6662C000
unkown
page read and write
9D0000
heap
page read and write
46B1000
unkown
page read and write
4DD000
heap
page read and write
493000
heap
page read and write
190000
heap
page read and write
4262000
heap
page read and write
2F20000
heap
page read and write
6E5C000
unkown
page read and write
2CF7000
direct allocation
page read and write
666F7000
unkown
page read and write
7FF6AB999000
unkown
page readonly
7FFDFB86D000
unkown
page readonly
7FFDFB43D000
unkown
page readonly
46E2000
unkown
page read and write
D4B000
unkown
page readonly
1376000
heap
page read and write
21DE000
heap
page read and write
43DA000
heap
page read and write
2F74000
heap
page read and write
6DDC000
unkown
page read and write
7FFDFB86A000
unkown
page read and write
2D35000
direct allocation
page read and write
7FFDFB420000
unkown
page read and write
665A0000
unkown
page readonly
2F74000
heap
page read and write
7FFDFB2CD000
unkown
page readonly
D00000
heap
page read and write
499000
heap
page read and write
2C70000
heap
page read and write
720000
heap
page read and write
5F20000
direct allocation
page read and write
140156000
unkown
page readonly
140156000
unkown
page readonly
2D4F000
direct allocation
page read and write
7FFDFB490000
unkown
page readonly
499000
heap
page read and write
2C84000
heap
page read and write
13EE000
stack
page read and write
3ED7000
trusted library allocation
page read and write
2316000
direct allocation
page read and write
4A20000
heap
page read and write
2D88000
direct allocation
page read and write
2D88000
heap
page read and write
7FF718653000
unkown
page readonly
3850000
heap
page read and write
32D5000
heap
page read and write
5121000
trusted library allocation
page read and write
2F74000
heap
page read and write
2D7B000
direct allocation
page read and write
7FF6AB98F000
unkown
page readonly
17B0000
heap
page read and write
5560000
unkown
page read and write
55DE000
unkown
page read and write
42EB000
unkown
page read and write
FC6000
heap
page read and write
273A000
stack
page read and write
5EFF000
stack
page read and write
6662E000
unkown
page write copy
5BC1000
unkown
page read and write
467000
heap
page read and write
123C000
stack
page read and write
666B000
unkown
page read and write
7FF6C5943000
unkown
page write copy
140000000
unkown
page readonly
7FFDFB865000
unkown
page read and write
D4B000
unkown
page readonly
37C0000
heap
page read and write
2F74000
heap
page read and write
69E1000
unkown
page read and write
485000
heap
page read and write
2F74000
heap
page read and write
1366000
heap
page read and write
2D76000
direct allocation
page read and write
2D6E000
direct allocation
page read and write
37DE000
stack
page read and write
5C62000
unkown
page read and write
47E4000
unkown
page read and write
4DB000
heap
page read and write
1401F4000
unkown
page readonly
40E3000
unkown
page read and write
666F2000
unkown
page read and write
43DF000
unkown
page read and write
3CE0000
trusted library allocation
page read and write
5BC1000
unkown
page read and write
37C8000
trusted library allocation
page read and write
507A000
heap
page read and write
7FFE0E130000
unkown
page readonly
51F000
heap
page read and write
2D57000
direct allocation
page read and write
44F000
heap
page read and write
3440000
heap
page read and write
135E000
heap
page read and write
462000
heap
page read and write
1C0000
heap
page read and write
6E267000
unkown
page read and write
7D80000
heap
page read and write
466C000
unkown
page read and write
140001000
unkown
page execute read
666D1000
unkown
page readonly
2F74000
heap
page read and write
37E0000
remote allocation
page read and write
6664000
unkown
page read and write
5BC1000
unkown
page read and write
5BC1000
unkown
page read and write
42EF000
unkown
page read and write
2F74000
heap
page read and write
D01000
unkown
page execute read
184E000
stack
page read and write
1401E0000
unkown
page readonly
595000
heap
page read and write
148000
stack
page read and write
4F8000
heap
page read and write
7510000
unkown
page read and write
37C0000
trusted library allocation
page read and write
5BC1000
unkown
page read and write
1430000
heap
page read and write
7FF718370000
unkown
page readonly
28BC000
stack
page read and write
33D7000
heap
page read and write
2F74000
heap
page read and write
2F75000
heap
page read and write
5BC1000
unkown
page read and write
66641000
unkown
page execute read
4F57000
heap
page read and write
4F8000
heap
page read and write
5061000
unkown
page read and write
7FF718371000
unkown
page execute read
7FF69E559000
unkown
page readonly
2F74000
heap
page read and write
2F74000
heap
page read and write
F8F000
heap
page read and write
6662E000
unkown
page write copy
6E67000
unkown
page read and write
7FF718653000
unkown
page readonly
12EE000
stack
page read and write
7FFDFB295000
unkown
page readonly
4F5000
heap
page read and write
7FFE0CFE7000
unkown
page write copy
2D4B000
direct allocation
page read and write
2F74000
heap
page read and write
7FF6AB751000
unkown
page execute read
2F74000
heap
page read and write
2D62000
direct allocation
page read and write
5869000
unkown
page read and write
2F74000
heap
page read and write
154D000
heap
page read and write
665EF000
unkown
page readonly
870000
unkown
page readonly
7FFDFAEF1000
unkown
page execute read
5C5E000
stack
page read and write
4626000
trusted library allocation
page read and write
1401E0000
unkown
page readonly
2F74000
heap
page read and write
2F74000
heap
page read and write
There are 1104 hidden memdumps, click here to show them.