IOC Report
2ngxhElaud.exe

loading gif

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\2ngxhElaud.exe
"C:\Users\user\Desktop\2ngxhElaud.exe"
malicious
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\InstallUtil.exe
"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\InstallUtil.exe"
malicious
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\AddInProcess.exe
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\AddInProcess.exe -o 51.222.111.116:80 -u 46E9UkTFqALXNh2mSbA7WGDoa2i6h4WVgUgPVdT9ZdtweLRvAhWmbvuY1dhEmfjHbsavKXo3eGf5ZRb4qJzFXLVHGYH4moQ.x -p x --algo rx/0 --cpu-max-threads-hint=50
malicious

URLs

Name
IP
Malicious
https://github.com/mgravell/protobuf-neti
unknown
malicious
https://stackoverflow.com/q/14436606/23354
unknown
malicious
https://github.com/mgravell/protobuf-netJ
unknown
malicious
http://31.13.224.51/Gxqui.pdf
31.13.224.51
malicious
https://sck-dns.ws/plugin3.dll
172.67.173.168
malicious
https://stackoverflow.com/q/11564914/23354;
unknown
malicious
https://stackoverflow.com/q/2152978/23354
unknown
malicious
https://xmrig.com/wizard%s
unknown
malicious
https://sck-dns.ws/plugin3.dllp
unknown
malicious
https://xmrig.com/docs/algorithms
unknown
malicious
https://github.com/mgravell/protobuf-net
unknown
malicious
https://files.catbox.moe/k541xr.dllJ
unknown
malicious
https://xmrig.com/benchmark/%s
unknown
malicious
https://files.catbox.moe/k541xr.dll
unknown
malicious
https://xmrig.com/wizard
unknown
malicious
http://31.13.224.51
unknown
malicious
https://files.catbox.moe/kwfxr7.dll
unknown
malicious
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
malicious
There are 8 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
sck-dns.ws
172.67.173.168

IPs

IP
Domain
Country
Malicious
51.222.111.116
unknown
France
malicious
31.13.224.51
unknown
Bulgaria
172.67.173.168
sck-dns.ws
United States
213.152.162.15
unknown
Netherlands

Registry

Path
Value
Malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\2ngxhElaud_RASAPI32
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\2ngxhElaud_RASAPI32
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\2ngxhElaud_RASAPI32
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\2ngxhElaud_RASAPI32
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\2ngxhElaud_RASAPI32
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\2ngxhElaud_RASAPI32
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\2ngxhElaud_RASAPI32
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\2ngxhElaud_RASMANCS
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\2ngxhElaud_RASMANCS
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\2ngxhElaud_RASMANCS
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\2ngxhElaud_RASMANCS
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\2ngxhElaud_RASMANCS
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\2ngxhElaud_RASMANCS
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\2ngxhElaud_RASMANCS
FileDirectory
HKEY_CURRENT_USER\SOFTWARE\3b64fb9862ddb7761810978aba6d399e
a49d995a18b3b8e268e4c9a1643fd5e6
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\InstallUtil_RASAPI32
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\InstallUtil_RASAPI32
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\InstallUtil_RASAPI32
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\InstallUtil_RASAPI32
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\InstallUtil_RASAPI32
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\InstallUtil_RASAPI32
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\InstallUtil_RASAPI32
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\InstallUtil_RASMANCS
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\InstallUtil_RASMANCS
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\InstallUtil_RASMANCS
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\InstallUtil_RASMANCS
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\InstallUtil_RASMANCS
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\InstallUtil_RASMANCS
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\InstallUtil_RASMANCS
FileDirectory
HKEY_CURRENT_USER\SOFTWARE\3b64fb9862ddb7761810978aba6d399e
46CA954A242393AFA5371FD73A9FB577
There are 20 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
246443B0000
trusted library section
page read and write
malicious
14335CF0000
trusted library section
page read and write
malicious
1432D1D1000
trusted library allocation
page read and write
malicious
140465000
remote allocation
page execute and read and write
malicious
1E5C1C18000
heap
page read and write
malicious
1431D021000
trusted library allocation
page read and write
malicious
24655720000
trusted library allocation
page read and write
malicious
140799000
remote allocation
page execute and read and write
malicious
24644431000
trusted library allocation
page read and write
malicious
140000000
remote allocation
page execute and read and write
malicious
1431D3EB000
trusted library allocation
page read and write
1431D3AC000
trusted library allocation
page read and write
24644678000
trusted library allocation
page read and write
1431D179000
trusted library allocation
page read and write
24644A2F000
trusted library allocation
page read and write
1431D3AA000
trusted library allocation
page read and write
CA569FF000
stack
page read and write
24644B47000
trusted library allocation
page read and write
246446F6000
trusted library allocation
page read and write
24644768000
trusted library allocation
page read and write
1431D3D2000
trusted library allocation
page read and write
2464476E000
trusted library allocation
page read and write
1431D746000
trusted library allocation
page read and write
7FFD9BAA0000
trusted library allocation
page read and write
24644B6B000
trusted library allocation
page read and write
1431D451000
trusted library allocation
page read and write
1431D413000
trusted library allocation
page read and write
24654CA7000
trusted library allocation
page read and write
7FFD9B9B0000
trusted library allocation
page read and write
246429BD000
heap
page read and write
1432E1A3000
trusted library allocation
page read and write
7FFD9B930000
trusted library allocation
page read and write
7FFD9B880000
trusted library allocation
page execute and read and write
1431B835000
heap
page read and write
1431D18F000
trusted library allocation
page read and write
1431D397000
trusted library allocation
page read and write
24644B9B000
trusted library allocation
page read and write
24644904000
trusted library allocation
page read and write
246545E9000
trusted library allocation
page read and write
7FFD9B7EC000
trusted library allocation
page execute and read and write
1431D1AC000
trusted library allocation
page read and write
CA562FB000
stack
page read and write
14335AF0000
trusted library section
page read and write
1E5C35C0000
direct allocation
page execute read
1431B713000
trusted library allocation
page read and write
24642945000
heap
page read and write
CA567FE000
stack
page read and write
2465CBD3000
heap
page read and write
2465CFD8000
heap
page read and write
1E5C1C10000
heap
page read and write
1431D42B000
trusted library allocation
page read and write
7FFD9B772000
trusted library allocation
page read and write
7FFD9B784000
trusted library allocation
page read and write
1431B633000
heap
page read and write
1431B6C6000
heap
page read and write
14335A22000
heap
page read and write
1431D73E000
trusted library allocation
page read and write
1431D489000
trusted library allocation
page read and write
1431D4B8000
trusted library allocation
page read and write
1431D470000
trusted library allocation
page read and write
2464460A000
trusted library allocation
page read and write
138DFFE000
stack
page read and write
2465CB40000
heap
page read and write
1431B212000
unkown
page readonly
CA56AFF000
stack
page read and write
24654EED000
trusted library allocation
page read and write
1431D1F2000
trusted library allocation
page read and write
1E5C3720000
direct allocation
page execute and read and write
1431D3EF000
trusted library allocation
page read and write
24642880000
heap
page read and write
1431D324000
trusted library allocation
page read and write
1E5C7381000
heap
page read and write
1431D3B9000
trusted library allocation
page read and write
246446AA000
trusted library allocation
page read and write
A4C07FF000
stack
page read and write
24644A3D000
trusted library allocation
page read and write
246448C3000
trusted library allocation
page read and write
7FFD9B940000
trusted library allocation
page read and write
1431D22C000
trusted library allocation
page read and write
1431D2E4000
trusted library allocation
page read and write
1431D28B000
trusted library allocation
page read and write
1E5C1CF4000
heap
page read and write
1431D455000
trusted library allocation
page read and write
1431D42D000
trusted library allocation
page read and write
1431D203000
trusted library allocation
page read and write
7FFD9B920000
trusted library allocation
page read and write
1431D3ED000
trusted library allocation
page read and write
14335A48000
heap
page read and write
1432CFE1000
trusted library allocation
page read and write
1431D400000
trusted library allocation
page read and write
4B6000
remote allocation
page execute and read and write
2464496B000
trusted library allocation
page read and write
1E5C3610000
heap
page read and write
1431D227000
trusted library allocation
page read and write
7FFD9B760000
trusted library allocation
page read and write
1431D209000
trusted library allocation
page read and write
1431D223000
trusted library allocation
page read and write
1431D373000
trusted library allocation
page read and write
1431D1AA000
trusted library allocation
page read and write
1404FC000
remote allocation
page execute and read and write
7FFD9B810000
trusted library allocation
page read and write
1431D3A2000
trusted library allocation
page read and write
7FFD9B76D000
trusted library allocation
page execute and read and write
246447C7000
trusted library allocation
page read and write
1431D274000
trusted library allocation
page read and write
7FFD9B93F000
trusted library allocation
page read and write
1431D1E7000
trusted library allocation
page read and write
246429B9000
heap
page read and write
1E5C1CFC000
heap
page read and write
1E5C9B81000
heap
page read and write
7FFD9BA80000
trusted library allocation
page read and write
7FFD9B816000
trusted library allocation
page read and write
1431D738000
trusted library allocation
page read and write
246446CC000
trusted library allocation
page read and write
1431D3B7000
trusted library allocation
page read and write
2465CBD1000
heap
page read and write
24644763000
trusted library allocation
page read and write
1431D39D000
trusted library allocation
page read and write
1431B5D0000
trusted library allocation
page read and write
2464455A000
trusted library allocation
page read and write
1431D3CC000
trusted library allocation
page read and write
1431D311000
trusted library allocation
page read and write
1431D258000
trusted library allocation
page read and write
2465CEA0000
heap
page execute and read and write
7FFD9B7BB000
trusted library allocation
page execute and read and write
7FFD9B7BC000
trusted library allocation
page execute and read and write
2465480F000
trusted library allocation
page read and write
1431D4BB000
trusted library allocation
page read and write
1431D742000
trusted library allocation
page read and write
24642968000
heap
page read and write
1431B580000
heap
page read and write
1431D1D4000
trusted library allocation
page read and write
2465492A000
trusted library allocation
page read and write
246447D5000
trusted library allocation
page read and write
7FFD9BA70000
trusted library allocation
page execute and read and write
1431D2F6000
trusted library allocation
page read and write
1431D26A000
trusted library allocation
page read and write
1431D43E000
trusted library allocation
page read and write
246556F1000
trusted library allocation
page read and write
7FFD9B9C0000
trusted library allocation
page execute and read and write
7FFD9B990000
trusted library allocation
page read and write
1431D2AD000
trusted library allocation
page read and write
7FFD9B950000
trusted library allocation
page read and write
2464471A000
trusted library allocation
page read and write
CA566FE000
stack
page read and write
7FFD9BB00000
trusted library allocation
page read and write
246448DF000
trusted library allocation
page read and write
7FFD9B770000
trusted library allocation
page read and write
1431D3E9000
trusted library allocation
page read and write
1431D4A5000
trusted library allocation
page read and write
A4BE7FC000
stack
page read and write
1431D399000
trusted library allocation
page read and write
24642A02000
heap
page read and write
1431B710000
trusted library allocation
page read and write
24654431000
trusted library allocation
page read and write
1E5C3770000
heap
page read and write
1431D440000
trusted library allocation
page read and write
1E5C7D81000
heap
page read and write
7FFD9B846000
trusted library allocation
page read and write
13903FE000
stack
page read and write
14335A3C000
heap
page read and write
246449F7000
trusted library allocation
page read and write
1431B830000
heap
page read and write
1431D3A6000
trusted library allocation
page read and write
1431B700000
trusted library allocation
page read and write
24654E9A000
trusted library allocation
page read and write
1431D164000
trusted library allocation
page read and write
1431D4C5000
trusted library allocation
page read and write
1431B540000
heap
page read and write
24644BA9000
trusted library allocation
page read and write
1431D320000
trusted library allocation
page read and write
24644A91000
trusted library allocation
page read and write
1431D474000
trusted library allocation
page read and write
1E5C3671000
heap
page read and write
7FFD9B9A0000
trusted library allocation
page read and write
7FFD9BA00000
trusted library allocation
page read and write
246428A0000
heap
page read and write
24644899000
trusted library allocation
page read and write
14335E90000
heap
page read and write
7FFD9B910000
trusted library allocation
page read and write
A4BCBFE000
stack
page read and write
1431D2AB000
trusted library allocation
page read and write
7FFD9B9B4000
trusted library allocation
page read and write
1431D369000
trusted library allocation
page read and write
1E5C3620000
heap
page read and write
A4BE3F7000
stack
page read and write
24654A0C000
trusted library allocation
page read and write
7FFD9B930000
trusted library allocation
page read and write
1431D448000
trusted library allocation
page read and write
1431D366000
trusted library allocation
page read and write
14335DF0000
trusted library section
page read and write
138F3FE000
stack
page read and write
143359F2000
heap
page read and write
1431D19C000
trusted library allocation
page read and write
7FFD9B9D0000
trusted library allocation
page read and write
1431B5E0000
heap
page read and write
1E5C5581000
heap
page read and write
1431D33A000
trusted library allocation
page read and write
246446E8000
trusted library allocation
page read and write
246448ED000
trusted library allocation
page read and write
1431D34D000
trusted library allocation
page read and write
24654FE6000
trusted library allocation
page read and write
A4BF3FA000
stack
page read and write
143359F0000
heap
page read and write
1431D3F2000
trusted library allocation
page read and write
1431D344000
trusted library allocation
page read and write
A4BDBFD000
stack
page read and write
7FFD9BAD0000
trusted library allocation
page read and write
CA565FD000
stack
page read and write
1431D1D7000
trusted library allocation
page read and write
24644B87000
trusted library allocation
page read and write
1431D219000
trusted library allocation
page read and write
246428F5000
heap
page read and write
1431D2B8000
trusted library allocation
page read and write
1431D567000
trusted library allocation
page read and write
24644BAF000
trusted library allocation
page read and write
246549B9000
trusted library allocation
page read and write
1431CFE1000
trusted library allocation
page read and write
1E5C3660000
heap
page read and write
7FFD9B764000
trusted library allocation
page read and write
1E5C4B81000
heap
page read and write
2465D03A000
heap
page read and write
1431D3A8000
trusted library allocation
page read and write
1431D1E1000
trusted library allocation
page read and write
7FFD9B793000
trusted library allocation
page execute and read and write
1E5C35A0000
heap
page read and write
24654B5A000
trusted library allocation
page read and write
24644A21000
trusted library allocation
page read and write
24644925000
trusted library allocation
page read and write
2465CF90000
heap
page read and write
1431D38C000
trusted library allocation
page read and write
1431D431000
trusted library allocation
page read and write
246429AE000
heap
page read and write
1431D483000
trusted library allocation
page read and write
1431D335000
trusted library allocation
page read and write
24644A05000
trusted library allocation
page read and write
1431D331000
trusted library allocation
page read and write
7FFD9B990000
trusted library allocation
page read and write
7FFD9BA30000
trusted library allocation
page execute and read and write
24642923000
trusted library allocation
page read and write
1431D4B4000
trusted library allocation
page read and write
24644686000
trusted library allocation
page read and write
1431D289000
trusted library allocation
page read and write
1431D2F1000
trusted library allocation
page read and write
24644798000
trusted library allocation
page read and write
1431D3FE000
trusted library allocation
page read and write
7FFD9B9F0000
trusted library allocation
page read and write
2465512D000
trusted library allocation
page read and write
24644A4B000
trusted library allocation
page read and write
1431D40D000
trusted library allocation
page read and write
1E5C1CDC000
heap
page read and write
7FFD9BB20000
trusted library allocation
page read and write
1431D17D000
trusted library allocation
page read and write
24654965000
trusted library allocation
page read and write
13907FD000
stack
page read and write
1431D4CB000
trusted library allocation
page read and write
2464486F000
trusted library allocation
page read and write
24654B06000
trusted library allocation
page read and write
24644982000
trusted library allocation
page read and write
7FFD9B7A3000
trusted library allocation
page read and write
A4C1BFA000
stack
page read and write
1431D3BF000
trusted library allocation
page read and write
7FFD9B790000
trusted library allocation
page read and write
1431B5F6000
heap
page read and write
7FFD9B7BD000
trusted library allocation
page execute and read and write
2465CB30000
heap
page read and write
2464455F000
trusted library allocation
page read and write
246429F6000
heap
page read and write
1431D360000
trusted library allocation
page read and write
1431D313000
trusted library allocation
page read and write
1431B6CC000
heap
page read and write
2465CB15000
heap
page read and write
1431D466000
trusted library allocation
page read and write
1431D1BD000
trusted library allocation
page read and write
1431D3CA000
trusted library allocation
page read and write
2465CFBD000
heap
page read and write
2464472E000
trusted library allocation
page read and write
1E5C3669000
heap
page read and write
246550C3000
trusted library allocation
page read and write
2464485C000
trusted library allocation
page read and write
1431D435000
trusted library allocation
page read and write
1431B65D000
heap
page read and write
7FFD9BA10000
trusted library allocation
page read and write
CA568FE000
stack
page read and write
138FFFE000
stack
page read and write
7FFD9B876000
trusted library allocation
page execute and read and write
7FFD9BB30000
trusted library allocation
page read and write
2465CD50000
heap
page execute and read and write
1431D1E3000
trusted library allocation
page read and write
246449BF000
trusted library allocation
page read and write
7FFD9B79D000
trusted library allocation
page execute and read and write
24644845000
trusted library allocation
page read and write
7FFD9B763000
trusted library allocation
page execute and read and write
24642910000
trusted library allocation
page read and write
2465CD53000
heap
page execute and read and write
A4BEFFE000
stack
page read and write
24644765000
trusted library allocation
page read and write
1432D7A2000
trusted library allocation
page read and write
1431D348000
trusted library allocation
page read and write
7FFD9BA9A000
trusted library allocation
page read and write
24654CFA000
trusted library allocation
page read and write
1431D377000
trusted library allocation
page read and write
246448A7000
trusted library allocation
page read and write
1431D2E2000
trusted library allocation
page read and write
24644B2B000
trusted library allocation
page read and write
1431D238000
trusted library allocation
page read and write
24644632000
trusted library allocation
page read and write
1431B210000
unkown
page readonly
1431B760000
heap
page read and write
A4C17FA000
stack
page read and write
2465CBF0000
trusted library section
page read and write
7FFD9B7B4000
trusted library allocation
page read and write
1432CFE7000
trusted library allocation
page read and write
7FFD9B98E000
trusted library allocation
page read and write
246449DB000
trusted library allocation
page read and write
1431D2BA000
trusted library allocation
page read and write
1431D6B2000
trusted library allocation
page read and write
24654E47000
trusted library allocation
page read and write
1431D461000
trusted library allocation
page read and write
1431D2BE000
trusted library allocation
page read and write
1431D29A000
trusted library allocation
page read and write
1431D186000
trusted library allocation
page read and write
402000
remote allocation
page execute and read and write
246449B1000
trusted library allocation
page read and write
1431D296000
trusted library allocation
page read and write
1E5C5F81000
heap
page read and write
1431D300000
trusted library allocation
page read and write
246428E0000
trusted library allocation
page read and write
7FFD9BB36000
trusted library allocation
page read and write
24644824000
trusted library allocation
page read and write
7FFD9B9E0000
trusted library allocation
page read and write
1431D267000
trusted library allocation
page read and write
1431D3CE000
trusted library allocation
page read and write
1431D457000
trusted library allocation
page read and write
1431B660000
heap
page read and write
1431D23F000
trusted library allocation
page read and write
7FF4C7370000
trusted library allocation
page execute and read and write
1431D252000
trusted library allocation
page read and write
A4C13FA000
stack
page read and write
246551BD000
trusted library allocation
page read and write
1431D1F4000
trusted library allocation
page read and write
24654DA0000
trusted library allocation
page read and write
7FFD9B820000
trusted library allocation
page execute and read and write
24655039000
trusted library allocation
page read and write
1431D333000
trusted library allocation
page read and write
7FFD9B960000
trusted library allocation
page read and write
7FFD9B794000
trusted library allocation
page read and write
1431D3BD000
trusted library allocation
page read and write
1E5CAF81000
heap
page read and write
24644A74000
trusted library allocation
page read and write
24644941000
trusted library allocation
page read and write
7FFD9B940000
trusted library allocation
page read and write
138E7FE000
stack
page read and write
1431D4C7000
trusted library allocation
page read and write
24644704000
trusted library allocation
page read and write
138E3FE000
stack
page read and write
1E5C4181000
heap
page read and write
1431D254000
trusted library allocation
page read and write
7FFD9B7B0000
trusted library allocation
page read and write
24644933000
trusted library allocation
page read and write
1431D1A6000
trusted library allocation
page read and write
1E5C6981000
heap
page read and write
24644728000
trusted library allocation
page read and write
24644853000
trusted library allocation
page read and write
1431B7E0000
heap
page execute and read and write
7FFD9B8B0000
trusted library allocation
page execute and read and write
246447F1000
trusted library allocation
page read and write
246449E9000
trusted library allocation
page read and write
7FFD9B950000
trusted library allocation
page execute and read and write
1431D322000
trusted library allocation
page read and write
24654DF3000
trusted library allocation
page read and write
1431D34A000
trusted library allocation
page read and write
1E5C1C7B000
heap
page read and write
7FFD9BAC0000
trusted library allocation
page read and write
1431D285000
trusted library allocation
page read and write
1431D265000
trusted library allocation
page read and write
A4BB88E000
stack
page read and write
7FFD9B970000
trusted library allocation
page read and write
140784000
remote allocation
page execute and read and write
1431D2BC000
trusted library allocation
page read and write
1431D28D000
trusted library allocation
page read and write
1431D492000
trusted library allocation
page read and write
1431D2E0000
trusted library allocation
page read and write
246428F0000
heap
page read and write
1431D404000
trusted library allocation
page read and write
7FFD9B780000
trusted library allocation
page read and write
138EBFD000
stack
page read and write
1E5C1DE0000
heap
page read and write
1431D2F3000
trusted library allocation
page read and write
246446BE000
trusted library allocation
page read and write
1431D442000
trusted library allocation
page read and write
1431D485000
trusted library allocation
page read and write
2464477C000
trusted library allocation
page read and write
246547BC000
trusted library allocation
page read and write
24642780000
heap
page read and write
24644995000
trusted library allocation
page read and write
7FFD9B81C000
trusted library allocation
page execute and read and write
7FFD9BA52000
trusted library allocation
page read and write
1432DFE5000
trusted library allocation
page read and write
138DBED000
stack
page read and write
1E5CA581000
heap
page read and write
1431D2C0000
trusted library allocation
page read and write
1E5C1C62000
heap
page read and write
7FFD9B846000
trusted library allocation
page execute and read and write
2464475A000
trusted library allocation
page read and write
246446DA000
trusted library allocation
page read and write
1431D287000
trusted library allocation
page read and write
1431B73E000
heap
page read and write
1431D261000
trusted library allocation
page read and write
1431D1F6000
trusted library allocation
page read and write
2464494F000
trusted library allocation
page read and write
1431B636000
heap
page read and write
24654F93000
trusted library allocation
page read and write
1431D498000
trusted library allocation
page read and write
1431D15A000
trusted library allocation
page read and write
1E5C3682000
heap
page read and write
1431D294000
trusted library allocation
page read and write
A4BC3FE000
stack
page read and write
2465CFB1000
heap
page read and write
24644B55000
trusted library allocation
page read and write
246445EE000
trusted library allocation
page read and write
143357B0000
heap
page read and write
1431D362000
trusted library allocation
page read and write
2465C460000
trusted library allocation
page read and write
CA563FF000
stack
page read and write
2465CFFD000
heap
page read and write
24654925000
trusted library allocation
page read and write
246545D7000
trusted library allocation
page read and write
1431D1D2000
trusted library allocation
page read and write
24644784000
trusted library allocation
page read and write
7FFD9BA82000
trusted library allocation
page read and write
2464473C000
trusted library allocation
page read and write
1E5C8781000
heap
page read and write
2465CAF0000
heap
page read and write
A4BD7FE000
stack
page read and write
1431B61C000
heap
page read and write
1431D444000
trusted library allocation
page read and write
138FBFE000
stack
page read and write
24654BAD000
trusted library allocation
page read and write
1431D476000
trusted library allocation
page read and write
1431D1A8000
trusted library allocation
page read and write
1431B378000
unkown
page readonly
2464474D000
trusted library allocation
page read and write
24654AB3000
trusted library allocation
page read and write
1431D364000
trusted library allocation
page read and write
246429CF000
heap
page read and write
24654A60000
trusted library allocation
page read and write
246429B5000
heap
page read and write
138EFFF000
stack
page read and write
1431D225000
trusted library allocation
page read and write
24654735000
trusted library allocation
page read and write
1431D23A000
trusted library allocation
page read and write
1431D433000
trusted library allocation
page read and write
1431D744000
trusted library allocation
page read and write
246447E3000
trusted library allocation
page read and write
24644A9E000
trusted library allocation
page read and write
1431D4B2000
trusted library allocation
page read and write
1431B560000
heap
page read and write
7FFD9B7AD000
trusted library allocation
page execute and read and write
7FFD9B9C0000
trusted library allocation
page read and write
7FFD9BB3C000
trusted library allocation
page read and write
14335010000
trusted library allocation
page read and write
138F7FE000
stack
page read and write
1431D379000
trusted library allocation
page read and write
7FFD9B970000
trusted library allocation
page read and write
7FFD9B93B000
trusted library allocation
page read and write
7FFD9BA20000
trusted library allocation
page read and write
1431D1E5000
trusted library allocation
page read and write
2465514D000
trusted library allocation
page read and write
24644837000
trusted library allocation
page read and write
24642972000
heap
page read and write
7FFD9B78B000
trusted library allocation
page execute and read and write
7FFD9BA90000
trusted library allocation
page read and write
24655169000
trusted library allocation
page read and write
7FFD9B84C000
trusted library allocation
page execute and read and write
24654C54000
trusted library allocation
page read and write
7FFD9B937000
trusted library allocation
page read and write
1431D18C000
trusted library allocation
page read and write
1431D278000
trusted library allocation
page read and write
24655209000
trusted library allocation
page read and write
7FFD9B960000
trusted library allocation
page execute and read and write
24644AC9000
trusted library allocation
page read and write
24644B0F000
trusted library allocation
page read and write
1431D395000
trusted library allocation
page read and write
1431D175000
trusted library allocation
page read and write
1431D402000
trusted library allocation
page read and write
1431D1FA000
trusted library allocation
page read and write
1431D157000
trusted library allocation
page read and write
1431D420000
trusted library allocation
page read and write
24642998000
heap
page read and write
1431D1BB000
trusted library allocation
page read and write
1431D4A8000
trusted library allocation
page read and write
A4BCFFD000
stack
page read and write
24644752000
trusted library allocation
page read and write
1431D3C8000
trusted library allocation
page read and write
1431D496000
trusted library allocation
page read and write
1431D17B000
trusted library allocation
page read and write
24654D4D000
trusted library allocation
page read and write
1431D415000
trusted library allocation
page read and write
2465CB32000
heap
page read and write
2465CB35000
heap
page read and write
1431B720000
heap
page execute and read and write
7FFD9B980000
trusted library allocation
page read and write
2465CB00000
heap
page read and write
1431D1AF000
trusted library allocation
page read and write
1431B669000
heap
page read and write
24644AF3000
trusted library allocation
page read and write
A4BBFE1000
stack
page read and write
1431D327000
trusted library allocation
page read and write
14335E40000
trusted library section
page read and write
1431D256000
trusted library allocation
page read and write
2464464E000
trusted library allocation
page read and write
24642860000
heap
page read and write
1431D18A000
trusted library allocation
page read and write
1431D236000
trusted library allocation
page read and write
246447AB000
trusted library allocation
page read and write
2464495D000
trusted library allocation
page read and write
1431D49B000
trusted library allocation
page read and write
1431B730000
heap
page read and write
A4BB84E000
stack
page read and write
400000
remote allocation
page execute and read and write
7FFD9BB10000
trusted library allocation
page read and write
24644B1D000
trusted library allocation
page read and write
24644A62000
trusted library allocation
page read and write
1431D463000
trusted library allocation
page read and write
1431D3B5000
trusted library allocation
page read and write
1431D472000
trusted library allocation
page read and write
2464487D000
trusted library allocation
page read and write
24654C00000
trusted library allocation
page read and write
246449A3000
trusted library allocation
page read and write
7FFD9B980000
trusted library allocation
page read and write
2465CFA0000
heap
page read and write
1E5C9181000
heap
page read and write
7FFD9B9A0000
trusted library allocation
page read and write
24644694000
trusted library allocation
page read and write
2465CED0000
trusted library allocation
page read and write
1431D481000
trusted library allocation
page read and write
24644B39000
trusted library allocation
page read and write
7FFD9B850000
trusted library allocation
page execute and read and write
1431D4C9000
trusted library allocation
page read and write
7FFD9B97E000
trusted library allocation
page read and write
24644A13000
trusted library allocation
page read and write
246448D1000
trusted library allocation
page read and write
1431D177000
trusted library allocation
page read and write
7FFD9BAF0000
trusted library allocation
page read and write
1431D1C2000
trusted library allocation
page read and write
1431D1BF000
trusted library allocation
page read and write
7FFD9BA40000
trusted library allocation
page read and write
1431D4B6000
trusted library allocation
page read and write
2465D02A000
heap
page read and write
24642960000
heap
page read and write
7FFD9BB50000
trusted library allocation
page read and write
24644ADF000
trusted library allocation
page read and write
24655116000
trusted library allocation
page read and write
2464480D000
trusted library allocation
page read and write
7FFD9BB40000
trusted library allocation
page read and write
7FFD9B78D000
trusted library allocation
page execute and read and write
1431D23C000
trusted library allocation
page read and write
1431D740000
trusted library allocation
page read and write
1431D2DC000
trusted library allocation
page read and write
24644782000
trusted library allocation
page read and write
24644220000
heap
page read and write
1431D41E000
trusted library allocation
page read and write
7FFD9B900000
trusted library allocation
page read and write
24654769000
trusted library allocation
page read and write
7FFD9BB1B000
trusted library allocation
page read and write
1431D263000
trusted library allocation
page read and write
1431D168000
trusted library allocation
page read and write
1431D42F000
trusted library allocation
page read and write
24642A00000
heap
page read and write
24644861000
trusted library allocation
page read and write
246447B9000
trusted library allocation
page read and write
24644420000
heap
page execute and read and write
1431B460000
heap
page read and write
1431D20C000
trusted library allocation
page read and write
1E5C3781000
heap
page read and write
1431D27B000
trusted library allocation
page read and write
1431D2FE000
trusted library allocation
page read and write
24642920000
trusted library allocation
page read and write
1431D2A5000
trusted library allocation
page read and write
1431D16A000
trusted library allocation
page read and write
1431D386000
trusted library allocation
page read and write
1431D3BB000
trusted library allocation
page read and write
1432DAC4000
trusted library allocation
page read and write
1432CFF1000
trusted library allocation
page read and write
246449CD000
trusted library allocation
page read and write
24644563000
trusted library allocation
page read and write
246447FF000
trusted library allocation
page read and write
7FFD9BA00000
trusted library allocation
page execute and read and write
1431D1B9000
trusted library allocation
page read and write
1431D37B000
trusted library allocation
page read and write
A4BEBFA000
stack
page read and write
1433536A000
heap
page read and write
1431D1F8000
trusted library allocation
page read and write
24644917000
trusted library allocation
page read and write
1E5C3615000
heap
page read and write
1E5C1C48000
heap
page read and write
1431D166000
trusted library allocation
page read and write
24644239000
heap
page read and write
7FFD9BA1C000
trusted library allocation
page read and write
1E5C1BF0000
heap
page read and write
A4C03FB000
stack
page read and write
1431D276000
trusted library allocation
page read and write
24644AAD000
trusted library allocation
page read and write
1431D3D0000
trusted library allocation
page read and write
246448B5000
trusted library allocation
page read and write
1431D337000
trusted library allocation
page read and write
1431D2ED000
trusted library allocation
page read and write
246551F0000
trusted library allocation
page read and write
2464488B000
trusted library allocation
page read and write
2465508C000
trusted library allocation
page read and write
1431D2A9000
trusted library allocation
page read and write
1431B5FC000
heap
page read and write
7FFD9BA60000
trusted library allocation
page read and write
A4C0FFA000
stack
page read and write
1431D4CE000
trusted library allocation
page read and write
7FFD9B934000
trusted library allocation
page read and write
1431D306000
trusted library allocation
page read and write
A4C0BF9000
stack
page read and write
7FFD9B9B0000
trusted library allocation
page read and write
7FFD9BAB0000
trusted library allocation
page execute and read and write
24642988000
heap
page read and write
1431D346000
trusted library allocation
page read and write
24654F40000
trusted library allocation
page read and write
1431B5F0000
heap
page read and write
1431D453000
trusted library allocation
page read and write
7FFD9B840000
trusted library allocation
page read and write
24642940000
heap
page read and write
7FFD9B77D000
trusted library allocation
page execute and read and write
2465CB3D000
heap
page read and write
1431B5E5000
heap
page read and write
7FFD9B9D0000
trusted library allocation
page execute and read and write
1431D446000
trusted library allocation
page read and write
There are 623 hidden memdumps, click here to show them.