IOC Report
rUAE_LPO.com.exe

loading gif

Files

File Path
Type
Category
Malicious
rUAE_LPO.com.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\rUAE_LPO.com.exe.log
ASCII text, with CRLF line terminators
dropped
malicious
C:\Users\user\AppData\Local\Temp\windowsBook.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\77EC63BDA74BD0D0E0426DC8F8008506
Microsoft Cabinet archive data, Windows 2000/XP setup, 71954 bytes, 1 file, at 0x2c +A "authroot.stl", number 1, 6 datablocks, 0x1 compression
dropped
C:\Users\user\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\77EC63BDA74BD0D0E0426DC8F8008506
data
dropped
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\windowsBook.exe.log
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\tmpBE0.tmp.bat
DOS batch file, ASCII text, with CRLF line terminators
dropped
\Device\Null
ASCII text, with CRLF line terminators, with overstriking
dropped

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\rUAE_LPO.com.exe
"C:\Users\user\Desktop\rUAE_LPO.com.exe"
malicious
C:\Users\user\Desktop\rUAE_LPO.com.exe
"C:\Users\user\Desktop\rUAE_LPO.com.exe"
malicious
C:\Users\user\Desktop\rUAE_LPO.com.exe
"C:\Users\user\Desktop\rUAE_LPO.com.exe"
malicious
C:\Users\user\Desktop\rUAE_LPO.com.exe
"C:\Users\user\Desktop\rUAE_LPO.com.exe"
malicious
C:\Windows\SysWOW64\cmd.exe
"C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /rl highest /tn "windowsBook" /tr '"C:\Users\user\AppData\Local\Temp\windowsBook.exe"' & exit
malicious
C:\Windows\SysWOW64\cmd.exe
C:\Windows\system32\cmd.exe /c ""C:\Users\user\AppData\Local\Temp\tmpBE0.tmp.bat""
malicious
C:\Windows\SysWOW64\schtasks.exe
schtasks /create /f /sc onlogon /rl highest /tn "windowsBook" /tr '"C:\Users\user\AppData\Local\Temp\windowsBook.exe"'
malicious
C:\Users\user\AppData\Local\Temp\windowsBook.exe
C:\Users\user\AppData\Local\Temp\windowsBook.exe
malicious
C:\Users\user\AppData\Local\Temp\windowsBook.exe
"C:\Users\user\AppData\Local\Temp\windowsBook.exe"
malicious
C:\Users\user\AppData\Local\Temp\windowsBook.exe
"C:\Users\user\AppData\Local\Temp\windowsBook.exe"
malicious
C:\Users\user\AppData\Local\Temp\windowsBook.exe
"C:\Users\user\AppData\Local\Temp\windowsBook.exe"
malicious
C:\Users\user\AppData\Local\Temp\windowsBook.exe
"C:\Users\user\AppData\Local\Temp\windowsBook.exe"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\timeout.exe
timeout 3
There are 5 hidden processes, click here to show them.

URLs

Name
IP
Malicious
quin.ydns.eu
malicious
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown

Domains

Name
IP
Malicious
quin.ydns.eu
185.38.142.240
malicious

IPs

IP
Domain
Country
Malicious
185.38.142.240
quin.ydns.eu
Portugal
malicious

Memdumps

Base Address
Regiontype
Protect
Malicious
3781000
trusted library allocation
page read and write
malicious
2781000
trusted library allocation
page read and write
malicious
6BD0000
trusted library section
page read and write
malicious
402000
remote allocation
page execute and read and write
malicious
2421000
trusted library allocation
page read and write
malicious
31F1000
trusted library allocation
page read and write
malicious
30C0000
heap
page read and write
3F66000
trusted library allocation
page read and write
2F19000
trusted library allocation
page read and write
4CC0000
trusted library allocation
page read and write
4961000
trusted library allocation
page read and write
C7A000
stack
page read and write
71EE000
stack
page read and write
A00000
trusted library allocation
page execute and read and write
4944000
trusted library allocation
page read and write
5BCE000
stack
page read and write
6EFE000
heap
page read and write
2F4F000
trusted library allocation
page read and write
2EDF000
trusted library allocation
page read and write
2D90000
heap
page execute and read and write
695000
heap
page read and write
4CD0000
heap
page read and write
5250000
heap
page read and write
1647000
trusted library allocation
page execute and read and write
2E8F000
trusted library allocation
page read and write
1110000
trusted library allocation
page read and write
9EE000
stack
page read and write
D4E000
stack
page read and write
4940000
trusted library allocation
page read and write
B36000
heap
page read and write
2F43000
trusted library allocation
page read and write
820000
heap
page read and write
3252000
trusted library allocation
page read and write
1097000
heap
page read and write
7320000
trusted library allocation
page execute and read and write
2E41000
trusted library allocation
page read and write
5640000
heap
page execute and read and write
11E0000
heap
page read and write
30B0000
heap
page read and write
4EE0000
heap
page read and write
22B0000
trusted library allocation
page read and write
70EE000
stack
page read and write
1140000
heap
page read and write
327B000
trusted library allocation
page read and write
2E6B000
trusted library allocation
page read and write
2F4D000
trusted library allocation
page read and write
2E91000
trusted library allocation
page read and write
FD0000
trusted library allocation
page read and write
3795000
trusted library allocation
page read and write
2DB6000
trusted library allocation
page read and write
2C20000
heap
page read and write
4D00000
trusted library allocation
page execute and read and write
2731000
trusted library allocation
page read and write
2E63000
trusted library allocation
page read and write
2ED7000
trusted library allocation
page read and write
51FE000
trusted library allocation
page read and write
FA0000
trusted library allocation
page read and write
54BB000
stack
page read and write
95CF000
stack
page read and write
A50000
heap
page read and write
938E000
stack
page read and write
2EB1000
trusted library allocation
page read and write
382000
unkown
page readonly
2E5F000
trusted library allocation
page read and write
324E000
trusted library allocation
page read and write
14EE000
stack
page read and write
3DA1000
trusted library allocation
page read and write
2EA3000
trusted library allocation
page read and write
5770000
trusted library allocation
page read and write
2E47000
trusted library allocation
page read and write
9BCF000
stack
page read and write
E30000
trusted library allocation
page read and write
3E28000
trusted library allocation
page read and write
970E000
stack
page read and write
2DAD000
heap
page read and write
2DAE000
heap
page read and write
56BD000
stack
page read and write
6F10000
trusted library allocation
page execute and read and write
3250000
trusted library allocation
page read and write
327F000
trusted library allocation
page read and write
9E6E000
stack
page read and write
4C60000
heap
page read and write
95E000
stack
page read and write
94CE000
stack
page read and write
317D000
stack
page read and write
74D000
stack
page read and write
517D000
stack
page read and write
AD0000
trusted library allocation
page read and write
312F000
heap
page read and write
25E6000
trusted library allocation
page read and write
91D000
stack
page read and write
4CF0000
heap
page read and write
4A90000
heap
page read and write
7320000
trusted library section
page read and write
2EED000
trusted library allocation
page read and write
DE0000
heap
page read and write
6C1A000
heap
page read and write
2E51000
trusted library allocation
page read and write
2EEF000
trusted library allocation
page read and write
2F49000
trusted library allocation
page read and write
11A0000
heap
page read and write
2F69000
trusted library allocation
page read and write
9A4000
trusted library allocation
page read and write
A62000
trusted library allocation
page read and write
3190000
trusted library allocation
page read and write
13AE000
stack
page read and write
2EC9000
trusted library allocation
page read and write
2EF7000
trusted library allocation
page read and write
10DA000
trusted library allocation
page execute and read and write
2E7F000
trusted library allocation
page read and write
2DBE000
heap
page read and write
400000
remote allocation
page execute and read and write
5790000
heap
page read and write
DAF000
stack
page read and write
2F01000
trusted library allocation
page read and write
1256000
heap
page read and write
1120000
trusted library allocation
page read and write
68D0000
heap
page read and write
2BEC000
stack
page read and write
2889000
trusted library allocation
page read and write
2ED5000
trusted library allocation
page read and write
FA0000
heap
page read and write
44FB000
stack
page read and write
A77000
trusted library allocation
page execute and read and write
9ACE000
stack
page read and write
2F0F000
trusted library allocation
page read and write
2A2D000
stack
page read and write
4DD0000
heap
page read and write
10FF000
stack
page read and write
A87000
trusted library allocation
page execute and read and write
2DD3000
trusted library allocation
page read and write
DEC000
stack
page read and write
5206000
trusted library allocation
page read and write
2EFD000
trusted library allocation
page read and write
1780000
heap
page read and write
4F90000
trusted library allocation
page execute and read and write
2ECF000
trusted library allocation
page read and write
3ECB000
trusted library allocation
page read and write
1210000
trusted library allocation
page read and write
4FEE000
stack
page read and write
5290000
heap
page read and write
920000
trusted library allocation
page read and write
5360000
trusted library allocation
page read and write
51B0000
heap
page read and write
DD4000
trusted library allocation
page read and write
68D3000
heap
page read and write
959000
stack
page read and write
E70000
heap
page read and write
120D000
trusted library allocation
page execute and read and write
2DC5000
trusted library allocation
page read and write
2EBD000
trusted library allocation
page read and write
828000
heap
page read and write
3599000
trusted library allocation
page read and write
C3A000
heap
page read and write
9D7000
trusted library allocation
page execute and read and write
3229000
trusted library allocation
page read and write
45FC000
stack
page read and write
9B0000
trusted library allocation
page read and write
5190000
heap
page execute and read and write
9D1F000
stack
page read and write
1180000
trusted library allocation
page read and write
4930000
heap
page read and write
2E75000
trusted library allocation
page read and write
4DA0000
heap
page read and write
10EB000
trusted library allocation
page execute and read and write
4DB0000
trusted library allocation
page read and write
3233000
trusted library allocation
page read and write
FC8000
heap
page read and write
E10000
heap
page read and write
5A8F000
stack
page read and write
2EE9000
trusted library allocation
page read and write
A8B000
trusted library allocation
page execute and read and write
1640000
trusted library allocation
page read and write
4C72000
trusted library allocation
page read and write
AF0000
heap
page execute and read and write
5569000
heap
page read and write
3246000
trusted library allocation
page read and write
2F31000
trusted library allocation
page read and write
10D6000
trusted library allocation
page execute and read and write
2BF5000
trusted library allocation
page read and write
54C0000
trusted library section
page readonly
24AA000
trusted library allocation
page read and write
22A0000
trusted library allocation
page read and write
940000
trusted library allocation
page read and write
4DBF000
trusted library allocation
page read and write
957000
heap
page read and write
DB0000
heap
page read and write
57C0000
heap
page read and write
124A000
heap
page read and write
2E69000
trusted library allocation
page read and write
2EA5000
trusted library allocation
page read and write
2E95000
trusted library allocation
page read and write
6205000
trusted library allocation
page read and write
2F17000
heap
page read and write
FC0000
heap
page read and write
2EA1000
trusted library allocation
page read and write
FB3000
trusted library allocation
page execute and read and write
2F15000
trusted library allocation
page read and write
61F6000
trusted library allocation
page read and write
6760000
heap
page read and write
73AE000
stack
page read and write
52B0000
heap
page execute and read and write
2ECD000
trusted library allocation
page read and write
2DC2000
trusted library allocation
page read and write
2F23000
trusted library allocation
page read and write
5262000
trusted library allocation
page read and write
E4C000
stack
page read and write
2A30000
trusted library allocation
page read and write
16AE000
stack
page read and write
4DB3000
heap
page read and write
F6F000
stack
page read and write
2F53000
trusted library allocation
page read and write
5216000
heap
page read and write
4A30000
trusted library allocation
page read and write
2754000
trusted library allocation
page read and write
E15000
heap
page read and write
2E55000
trusted library allocation
page read and write
3010000
heap
page read and write
990000
trusted library allocation
page read and write
A10000
heap
page read and write
2F1F000
trusted library allocation
page read and write
5180000
heap
page read and write
4D4D000
stack
page read and write
61E4000
trusted library allocation
page read and write
1184000
trusted library allocation
page read and write
6D6F000
stack
page read and write
666E000
heap
page read and write
322B000
trusted library allocation
page read and write
2F2B000
trusted library allocation
page read and write
4CD0000
heap
page execute and read and write
7DF000
stack
page read and write
F6D000
stack
page read and write
70EF000
stack
page read and write
8D0000
heap
page read and write
2ED1000
trusted library allocation
page read and write
22A4000
trusted library allocation
page read and write
2C00000
trusted library allocation
page read and write
1787000
heap
page read and write
4F30000
heap
page read and write
11F0000
trusted library allocation
page read and write
5F4D000
stack
page read and write
43A000
stack
page read and write
C4D000
heap
page read and write
2D80000
heap
page read and write
2F66000
trusted library allocation
page read and write
2E89000
trusted library allocation
page read and write
4CAB000
stack
page read and write
6BF0000
heap
page read and write
2E85000
trusted library allocation
page read and write
8AC000
stack
page read and write
3E7D000
trusted library allocation
page read and write
4C80000
trusted library allocation
page execute and read and write
9A0000
heap
page read and write
31A0000
heap
page read and write
2EBF000
trusted library allocation
page read and write
490E000
stack
page read and write
A77000
trusted library allocation
page execute and read and write
9F0000
trusted library allocation
page read and write
6220000
trusted library allocation
page read and write
2F45000
trusted library allocation
page read and write
4980000
trusted library allocation
page read and write
4F0D000
heap
page read and write
280A000
trusted library allocation
page read and write
3070000
heap
page read and write
FE3000
trusted library allocation
page execute and read and write
690000
heap
page read and write
A5E000
stack
page read and write
5280000
trusted library allocation
page read and write
2E57000
trusted library allocation
page read and write
130A000
heap
page read and write
491B000
stack
page read and write
495E000
trusted library allocation
page read and write
2C2E000
unkown
page read and write
A55000
heap
page read and write
6D4E000
stack
page read and write
2F3F000
trusted library allocation
page read and write
2EFF000
trusted library allocation
page read and write
4EDD000
stack
page read and write
9B3000
trusted library allocation
page read and write
2C51000
trusted library allocation
page read and write
4A10000
trusted library allocation
page read and write
557B000
heap
page read and write
11E7000
heap
page read and write
2EAF000
trusted library allocation
page read and write
54E0000
heap
page read and write
4EEB000
stack
page read and write
F70000
heap
page read and write
A72000
trusted library allocation
page read and write
2F2F000
trusted library allocation
page read and write
2EA7000
trusted library allocation
page read and write
863000
heap
page read and write
2E2A000
trusted library allocation
page read and write
27EF000
trusted library allocation
page read and write
10E2000
trusted library allocation
page read and write
1190000
trusted library allocation
page read and write
A7B000
trusted library allocation
page execute and read and write
4A50000
trusted library allocation
page read and write
41F1000
trusted library allocation
page read and write
A6A000
trusted library allocation
page execute and read and write
4EF0000
trusted library allocation
page execute and read and write
4A12000
trusted library allocation
page read and write
4DB0000
heap
page read and write
3244000
trusted library allocation
page read and write
1313000
heap
page read and write
2C70000
heap
page read and write
E35000
trusted library allocation
page read and write
3421000
trusted library allocation
page read and write
1117000
trusted library allocation
page execute and read and write
934000
trusted library allocation
page read and write
9D6E000
stack
page read and write
8C0000
heap
page read and write
4C30000
trusted library allocation
page execute and read and write
950000
heap
page read and write
537000
stack
page read and write
2DBE000
heap
page read and write
4D50000
heap
page read and write
1760000
trusted library allocation
page read and write
34A8000
trusted library allocation
page read and write
2F55000
trusted library allocation
page read and write
2F05000
trusted library allocation
page read and write
51EB000
trusted library allocation
page read and write
2E9B000
trusted library allocation
page read and write
9980000
trusted library allocation
page read and write
2E8B000
trusted library allocation
page read and write
C8B000
stack
page read and write
2E3F000
trusted library allocation
page read and write
650000
heap
page read and write
2EFB000
trusted library allocation
page read and write
70F0000
trusted library allocation
page execute and read and write
DF6000
trusted library allocation
page read and write
2ED3000
trusted library allocation
page read and write
2EEB000
trusted library allocation
page read and write
6390000
trusted library allocation
page read and write
659C000
stack
page read and write
3731000
trusted library allocation
page read and write
8D0000
heap
page read and write
1218000
trusted library allocation
page read and write
1750000
trusted library allocation
page execute and read and write
4FD0000
trusted library allocation
page read and write
162E000
stack
page read and write
111A000
trusted library allocation
page execute and read and write
FF0000
heap
page read and write
A7A000
trusted library allocation
page execute and read and write
F2E000
stack
page read and write
1636000
trusted library allocation
page execute and read and write
1258000
heap
page read and write
1186000
trusted library allocation
page read and write
81D000
stack
page read and write
3255000
trusted library allocation
page read and write
3DBE000
trusted library allocation
page read and write
2813000
trusted library allocation
page read and write
DEE000
trusted library allocation
page read and write
326D000
trusted library allocation
page read and write
2E6F000
trusted library allocation
page read and write
5570000
heap
page read and write
31E0000
heap
page execute and read and write
2F39000
trusted library allocation
page read and write
48CE000
stack
page read and write
2E79000
trusted library allocation
page read and write
6E8E000
stack
page read and write
5CCE000
stack
page read and write
4CE0000
trusted library section
page readonly
2DBE000
heap
page read and write
2770000
heap
page execute and read and write
49F3000
heap
page read and write
E70000
heap
page read and write
2841000
trusted library allocation
page read and write
7FD20000
trusted library allocation
page execute and read and write
5010000
heap
page execute and read and write
D8E000
stack
page read and write
675C000
stack
page read and write
4A80000
heap
page read and write
163A000
trusted library allocation
page execute and read and write
51E4000
trusted library allocation
page read and write
7100000
trusted library allocation
page read and write
4EC6000
heap
page read and write
10C0000
trusted library allocation
page read and write
2F3D000
trusted library allocation
page read and write
1203000
trusted library allocation
page execute and read and write
325C000
trusted library allocation
page read and write
6B0E000
stack
page read and write
2F09000
trusted library allocation
page read and write
A43000
trusted library allocation
page execute and read and write
2E53000
trusted library allocation
page read and write
2F5E000
trusted library allocation
page read and write
52FE000
stack
page read and write
6D00000
trusted library allocation
page read and write
4EF4000
heap
page read and write
68A000
stack
page read and write
960E000
stack
page read and write
2E77000
trusted library allocation
page read and write
2EDE000
stack
page read and write
2EC1000
trusted library allocation
page read and write
9851000
trusted library allocation
page read and write
9990000
heap
page read and write
5212000
trusted library allocation
page read and write
2EE0000
heap
page read and write
7110000
trusted library allocation
page read and write
2E6D000
trusted library allocation
page read and write
DF1000
trusted library allocation
page read and write
F70000
heap
page read and write
1642000
trusted library allocation
page read and write
2EC5000
trusted library allocation
page read and write
22D0000
heap
page execute and read and write
2EF3000
trusted library allocation
page read and write
FED000
trusted library allocation
page execute and read and write
E20000
trusted library allocation
page read and write
2EE7000
trusted library allocation
page read and write
2DBE000
heap
page read and write
6DE000
stack
page read and write
4E50000
heap
page read and write
594E000
stack
page read and write
1127000
trusted library allocation
page execute and read and write
2E65000
trusted library allocation
page read and write
A1A000
heap
page read and write
2EBB000
trusted library allocation
page read and write
2F0B000
trusted library allocation
page read and write
2F07000
trusted library allocation
page read and write
324C000
trusted library allocation
page read and write
9DB000
trusted library allocation
page execute and read and write
5E4E000
stack
page read and write
2F33000
trusted library allocation
page read and write
93D000
trusted library allocation
page execute and read and write
16B8000
trusted library allocation
page read and write
4966000
trusted library allocation
page read and write
354B000
trusted library allocation
page read and write
6E6C000
stack
page read and write
6210000
trusted library allocation
page read and write
B00000
heap
page read and write
2F03000
trusted library allocation
page read and write
787000
stack
page read and write
3F19000
trusted library allocation
page read and write
C10000
heap
page read and write
1630000
trusted library allocation
page read and write
2D80000
trusted library allocation
page read and write
641E000
stack
page read and write
FF8000
heap
page read and write
99D0000
heap
page read and write
4F60000
trusted library allocation
page read and write
66DE000
stack
page read and write
494B000
trusted library allocation
page read and write
1026000
heap
page read and write
6C0C000
heap
page read and write
1190000
trusted library allocation
page execute and read and write
2EE5000
trusted library allocation
page read and write
2D6C000
stack
page read and write
6A0E000
stack
page read and write
4A0F000
stack
page read and write
5260000
trusted library allocation
page read and write
6EF0000
heap
page read and write
2E8D000
trusted library allocation
page read and write
2F3B000
trusted library allocation
page read and write
1100000
trusted library allocation
page read and write
4F00000
heap
page read and write
943000
trusted library allocation
page read and write
E10000
trusted library allocation
page read and write
2720000
heap
page read and write
35E6000
trusted library allocation
page read and write
7EF80000
trusted library allocation
page execute and read and write
2E93000
trusted library allocation
page read and write
3259000
trusted library allocation
page read and write
74AF000
stack
page read and write
2E90000
heap
page read and write
2F51000
trusted library allocation
page read and write
325E000
trusted library allocation
page read and write
2E37000
trusted library allocation
page read and write
3194000
trusted library allocation
page read and write
2E97000
trusted library allocation
page read and write
5380000
heap
page read and write
4C70000
trusted library allocation
page read and write
2E33000
trusted library allocation
page read and write
692E000
heap
page read and write
9C2000
trusted library allocation
page read and write
2EF1000
trusted library allocation
page read and write
8F1000
heap
page read and write
9F0000
heap
page read and write
2F47000
trusted library allocation
page read and write
626E000
stack
page read and write
2DFF000
trusted library allocation
page read and write
5560000
heap
page read and write
6660000
heap
page read and write
580E000
stack
page read and write
27D6000
trusted library allocation
page read and write
6E4E000
stack
page read and write
5360000
trusted library allocation
page execute and read and write
E50000
trusted library allocation
page read and write
8C7000
heap
page read and write
4F05000
heap
page read and write
5650000
heap
page read and write
12AF000
stack
page read and write
9CA000
trusted library allocation
page execute and read and write
4972000
trusted library allocation
page read and write
271F000
stack
page read and write
2DAD000
heap
page read and write
10C3000
trusted library allocation
page read and write
2F1D000
trusted library allocation
page read and write
2EAD000
trusted library allocation
page read and write
4788000
trusted library allocation
page read and write
2C80000
heap
page read and write
4F00000
heap
page read and write
6219000
trusted library allocation
page read and write
1200000
trusted library allocation
page read and write
2EE3000
trusted library allocation
page read and write
5530000
heap
page read and write
A44000
heap
page read and write
2E67000
trusted library allocation
page read and write
2EDD000
trusted library allocation
page read and write
1150000
heap
page read and write
A72000
trusted library allocation
page read and write
DD0000
heap
page read and write
41F7000
trusted library allocation
page read and write
6E2E000
stack
page read and write
DFD000
trusted library allocation
page read and write
2A40000
heap
page execute and read and write
164B000
trusted library allocation
page execute and read and write
2F4B000
trusted library allocation
page read and write
9971000
trusted library allocation
page read and write
1170000
trusted library allocation
page read and write
2E39000
trusted library allocation
page read and write
2DBD000
heap
page read and write
2DAD000
heap
page read and write
73BE000
stack
page read and write
1140000
trusted library allocation
page read and write
27AD000
trusted library allocation
page read and write
241F000
stack
page read and write
2BF0000
trusted library allocation
page read and write
4DC0000
trusted library allocation
page read and write
5CEC000
stack
page read and write
10D0000
trusted library allocation
page read and write
2EB7000
trusted library allocation
page read and write
4EEF000
heap
page read and write
54D0000
heap
page read and write
22C5000
trusted library allocation
page read and write
A60000
trusted library allocation
page read and write
A37000
heap
page read and write
10F9000
stack
page read and write
4D60000
heap
page read and write
3257000
trusted library allocation
page read and write
99C0000
trusted library allocation
page read and write
5780000
heap
page read and write
6FAE000
stack
page read and write
5B8E000
stack
page read and write
A53000
heap
page read and write
1100000
trusted library allocation
page read and write
2DCD000
trusted library allocation
page read and write
2F13000
trusted library allocation
page read and write
A60000
trusted library allocation
page read and write
4FAE000
stack
page read and write
655E000
stack
page read and write
9A0000
trusted library allocation
page read and write
933000
trusted library allocation
page execute and read and write
285D000
trusted library allocation
page read and write
51E0000
trusted library allocation
page read and write
34FD000
trusted library allocation
page read and write
E02000
trusted library allocation
page read and write
2DA1000
trusted library allocation
page read and write
2E5B000
trusted library allocation
page read and write
2290000
heap
page read and write
3C51000
trusted library allocation
page read and write
2E4F000
trusted library allocation
page read and write
AB0000
trusted library allocation
page execute and read and write
2E87000
trusted library allocation
page read and write
27FD000
trusted library allocation
page read and write
1155000
heap
page read and write
94D000
trusted library allocation
page execute and read and write
2280000
trusted library allocation
page read and write
343E000
trusted library allocation
page read and write
C2F000
heap
page read and write
2E5D000
trusted library allocation
page read and write
4A20000
trusted library allocation
page execute and read and write
60CE000
stack
page read and write
9C11000
trusted library allocation
page read and write
2C4E000
stack
page read and write
3267000
trusted library allocation
page read and write
D95000
heap
page read and write
2E03000
trusted library allocation
page read and write
2E28000
trusted library allocation
page read and write
2E9F000
trusted library allocation
page read and write
4428000
trusted library allocation
page read and write
7FD30000
trusted library allocation
page execute and read and write
710F000
trusted library allocation
page read and write
326F000
trusted library allocation
page read and write
2F21000
trusted library allocation
page read and write
49F0000
heap
page read and write
1220000
heap
page read and write
118E000
stack
page read and write
61D4000
trusted library allocation
page read and write
2F17000
trusted library allocation
page read and write
2E61000
trusted library allocation
page read and write
6BCE000
stack
page read and write
2EAB000
trusted library allocation
page read and write
570000
heap
page read and write
2F41000
trusted library allocation
page read and write
3240000
trusted library allocation
page read and write
82E000
heap
page read and write
152E000
stack
page read and write
2260000
heap
page read and write
9240000
trusted library allocation
page read and write
FB0000
trusted library allocation
page read and write
2DAD000
heap
page read and write
9B0E000
stack
page read and write
11A0000
heap
page read and write
307F000
stack
page read and write
AB0000
heap
page read and write
2F10000
heap
page read and write
1227000
heap
page read and write
669D000
stack
page read and write
2D8B000
heap
page read and write
5785000
heap
page read and write
2DBE000
heap
page read and write
848000
heap
page read and write
4E9C000
stack
page read and write
2C6E000
stack
page read and write
5A4E000
stack
page read and write
9C0000
trusted library allocation
page read and write
2E7D000
trusted library allocation
page read and write
1660000
trusted library allocation
page read and write
9BD000
trusted library allocation
page execute and read and write
10CD000
trusted library allocation
page execute and read and write
2EC7000
trusted library allocation
page read and write
61CE000
stack
page read and write
5201000
trusted library allocation
page read and write
2E3C000
stack
page read and write
271E000
stack
page read and write
22C0000
trusted library allocation
page read and write
608E000
stack
page read and write
E40000
heap
page read and write
2AFD000
stack
page read and write
49B0000
trusted library allocation
page read and write
4A00000
heap
page read and write
2F29000
trusted library allocation
page read and write
4C90000
trusted library allocation
page read and write
2F1B000
trusted library allocation
page read and write
856000
heap
page read and write
1110000
trusted library allocation
page execute and read and write
5533000
heap
page read and write
2DCB000
trusted library allocation
page read and write
C45000
heap
page read and write
58CE000
stack
page read and write
AA0000
trusted library allocation
page execute and read and write
231E000
stack
page read and write
2EB9000
trusted library allocation
page read and write
1204000
trusted library allocation
page read and write
FEB000
heap
page read and write
6901000
heap
page read and write
6F6E000
stack
page read and write
2F25000
trusted library allocation
page read and write
9A3000
trusted library allocation
page execute and read and write
6920000
heap
page read and write
7F410000
trusted library allocation
page execute and read and write
54F0000
trusted library allocation
page execute and read and write
CA0000
heap
page read and write
6ACE000
stack
page read and write
322E000
trusted library allocation
page read and write
590E000
stack
page read and write
DCF000
stack
page read and write
40E000
remote allocation
page execute and read and write
2EB3000
trusted library allocation
page read and write
2E31000
trusted library allocation
page read and write
645E000
stack
page read and write
10D2000
trusted library allocation
page read and write
A44000
trusted library allocation
page read and write
4F65000
trusted library allocation
page read and write
4970000
trusted library allocation
page read and write
3755000
trusted library allocation
page read and write
61F9000
trusted library allocation
page read and write
3453000
trusted library allocation
page read and write
E77000
heap
page read and write
27EA000
trusted library allocation
page read and write
B08000
heap
page read and write
22A6000
trusted library allocation
page read and write
621B000
trusted library allocation
page read and write
1104000
trusted library allocation
page read and write
63DD000
stack
page read and write
8C5000
heap
page read and write
2E59000
trusted library allocation
page read and write
112B000
trusted library allocation
page execute and read and write
C0F000
stack
page read and write
2E71000
trusted library allocation
page read and write
10E0000
trusted library allocation
page read and write
85C000
stack
page read and write
10E7000
trusted library allocation
page execute and read and write
9AD000
trusted library allocation
page execute and read and write
2E3D000
trusted library allocation
page read and write
6F42000
trusted library allocation
page read and write
496D000
trusted library allocation
page read and write
2E35000
trusted library allocation
page read and write
2E4B000
trusted library allocation
page read and write
2EDB000
trusted library allocation
page read and write
2B10000
heap
page read and write
2E45000
trusted library allocation
page read and write
1127000
heap
page read and write
A90000
trusted library allocation
page read and write
490E000
stack
page read and write
A30000
trusted library allocation
page read and write
4CD5000
heap
page read and write
D77000
stack
page read and write
312F000
stack
page read and write
DDB000
trusted library allocation
page read and write
323E000
trusted library allocation
page read and write
2EF5000
trusted library allocation
page read and write
74BE000
stack
page read and write
2EE1000
trusted library allocation
page read and write
306C000
stack
page read and write
2F0D000
trusted library allocation
page read and write
380000
unkown
page readonly
FE4000
trusted library allocation
page read and write
2E83000
trusted library allocation
page read and write
2EB5000
trusted library allocation
page read and write
1632000
trusted library allocation
page read and write
51BE000
stack
page read and write
2B40000
heap
page read and write
497F000
stack
page read and write
12DB000
heap
page read and write
2E3B000
trusted library allocation
page read and write
3287000
trusted library allocation
page read and write
2E49000
trusted library allocation
page read and write
E50000
heap
page read and write
4A70000
trusted library section
page readonly
9C0E000
stack
page read and write
53FF000
stack
page read and write
2F11000
trusted library allocation
page read and write
4CB0000
trusted library allocation
page read and write
2F7F000
unkown
page read and write
2E7B000
trusted library allocation
page read and write
2E73000
trusted library allocation
page read and write
2E99000
trusted library allocation
page read and write
5BEB000
stack
page read and write
5270000
trusted library allocation
page execute and read and write
AA0000
trusted library allocation
page read and write
2946000
trusted library allocation
page read and write
57A0000
heap
page read and write
984E000
stack
page read and write
9D2000
trusted library allocation
page read and write
A1E000
heap
page read and write
9250000
heap
page read and write
A4D000
trusted library allocation
page execute and read and write
593E000
stack
page read and write
56C6000
heap
page read and write
C18000
heap
page read and write
D90000
heap
page read and write
3F8000
unkown
page readonly
671E000
stack
page read and write
3DD3000
trusted library allocation
page read and write
4C60000
heap
page execute and read and write
70AD000
stack
page read and write
68CE000
stack
page read and write
2F35000
trusted library allocation
page read and write
9A9000
stack
page read and write
2ED9000
trusted library allocation
page read and write
FB4000
trusted library allocation
page read and write
2F2D000
trusted library allocation
page read and write
636E000
stack
page read and write
51A0000
heap
page read and write
9C6000
trusted library allocation
page execute and read and write
68FB000
heap
page read and write
11A0000
heap
page read and write
116E000
stack
page read and write
AC0000
heap
page read and write
2EA9000
trusted library allocation
page read and write
FBD000
trusted library allocation
page execute and read and write
119C000
stack
page read and write
2F37000
trusted library allocation
page read and write
974E000
stack
page read and write
948F000
stack
page read and write
9C0E000
stack
page read and write
6CF0000
trusted library allocation
page read and write
B33000
heap
page read and write
7E0000
heap
page read and write
A66000
trusted library allocation
page execute and read and write
C4E000
stack
page read and write
2E4D000
trusted library allocation
page read and write
ACF000
heap
page read and write
2D2E000
stack
page read and write
287D000
trusted library allocation
page read and write
2ECB000
trusted library allocation
page read and write
2EC3000
trusted library allocation
page read and write
5F8E000
stack
page read and write
C90000
trusted library allocation
page read and write
5536000
heap
page read and write
2EF9000
trusted library allocation
page read and write
C00000
heap
page read and write
520D000
trusted library allocation
page read and write
B2A000
heap
page read and write
5090000
heap
page read and write
5190000
heap
page read and write
E0E000
stack
page read and write
930000
trusted library allocation
page read and write
302F000
stack
page read and write
6770000
heap
page read and write
2F27000
trusted library allocation
page read and write
C47000
heap
page read and write
2730000
trusted library allocation
page read and write
2E43000
trusted library allocation
page read and write
5559000
heap
page read and write
2E9D000
trusted library allocation
page read and write
52BE000
stack
page read and write
588E000
stack
page read and write
5383000
heap
page read and write
DD0000
trusted library allocation
page read and write
1120000
heap
page read and write
2E81000
trusted library allocation
page read and write
5565000
heap
page read and write
9D1E000
stack
page read and write
There are 794 hidden memdumps, click here to show them.