IOC Report
JOSXXL1.exe

loading gif

Files

File Path
Type
Category
Malicious
JOSXXL1.exe
PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
initial sample
malicious
C:\Users\user\AppData\Local\Temp\nstA69B.tmp\System.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\nsxA532.tmp
data
dropped
C:\Users\user\AppData\Local\indvandrings\attraavrdig\Afsvor193\stiltish.sti
data
dropped
C:\Users\user\AppData\Local\indvandrings\attraavrdig\Udeladelsens.txt
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\indvandrings\attraavrdig\Vandlbslov.Uni
data
dropped
C:\Users\user\AppData\Local\indvandrings\attraavrdig\nontelegraphical.hyp
GTA audio index data (SDT)
dropped
C:\Users\user\AppData\Local\indvandrings\attraavrdig\sluggardly.udf
data
dropped

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\JOSXXL1.exe
"C:\Users\user\Desktop\JOSXXL1.exe"
malicious
C:\Users\user\Desktop\JOSXXL1.exe
"C:\Users\user\Desktop\JOSXXL1.exe"
malicious

URLs

Name
IP
Malicious
https://www.office.com/
unknown
https://duckduckgo.com/chrome_newtab
unknown
https://reallyfreegeoip.org/xml/173.254.250.68$
unknown
https://api.telegram.org/bot/sendMessage?chat_id=&text=%20%0D%0A%0D%0APC%20Name:447849%0D%0ADate%20and%20Time:%2027/10/2024%20/%2006:11:19%0D%0ACountry%20Name:%20United%20States%0D%0A%5B%20447849%20Clicked%20on%20the%20File%20If%20you%20see%20nothing%20this's%20mean%20the%20system%20storage's%20empty.%20%5D
149.154.167.220
https://duckduckgo.com/ac/?q=
unknown
https://api.telegram.org
unknown
https://www.google.com/images/branding/product/ico/googleg_lodp.ico
unknown
https://api.telegram.org/bot
unknown
https://reallyfreegeoip.org/xml/173.254.250.68
188.114.96.3
http://microsoft.coj
unknown
http://www.microsoft.co
unknown
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
unknown
https://drive.usercontent.google.com/
unknown
https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
unknown
https://support.office.com/article/7D48285B-20E8-4B9B-91AD-216E34163BAD?wt.mc_id=EnterPK2016
unknown
http://nsis.sf.net/NSIS_ErrorError
unknown
https://support.office.com/article/94ba2e0b-638e-4a92-8857-2cb5ac1d8e17
unknown
https://api.telegram.org/bot/sendMessage?chat_id=&text=
unknown
https://chrome.google.com/webstore?hl=en
unknown
https://www.ecosia.org/newtab/
unknown
https://chrome.google.com/webstore?hl=enlBkq
unknown
https://ac.ecosia.org/autocomplete?q=
unknown
https://www.google.com
unknown
http://checkip.dyndns.org/
193.122.130.0
https://drive.google.com/
unknown
https://support.office.com/article/94ba2e0b-638e-4a92-8857-2cb5ac1d8e17Install
unknown
https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
unknown
https://reallyfreegeoip.org
unknown
https://apis.google.com
unknown
https://www.office.com/lBkq
unknown
https://support.office.com/article/7D48285B-20E8-4B9B-91AD-216E34163BAD?wt.mc_id=EnterPK2016Examples
unknown
https://api.telegram.org/bot/sendMessage?chat_id=&text=%20%0D%0A%0D%0APC%20Name:447849%0D%0ADate%20a
unknown
https://drive.usercontent.google.com/1
unknown
https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
unknown
https://drive.google.com/a
unknown
https://reallyfreegeoip.org/xml/
unknown
There are 26 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
reallyfreegeoip.org
188.114.96.3
malicious
api.telegram.org
149.154.167.220
malicious
checkip.dyndns.org
unknown
malicious
drive.google.com
142.250.185.238
drive.usercontent.google.com
142.250.181.225
checkip.dyndns.com
193.122.130.0

IPs

IP
Domain
Country
Malicious
149.154.167.220
api.telegram.org
United Kingdom
malicious
188.114.96.3
reallyfreegeoip.org
European Union
malicious
142.250.181.225
drive.usercontent.google.com
United States
193.122.130.0
checkip.dyndns.com
United States
142.250.185.238
drive.google.com
United States

Registry

Path
Value
Malicious
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\JOSXXL1_RASAPI32
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\JOSXXL1_RASAPI32
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\JOSXXL1_RASAPI32
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\JOSXXL1_RASAPI32
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\JOSXXL1_RASAPI32
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\JOSXXL1_RASAPI32
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\JOSXXL1_RASAPI32
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\JOSXXL1_RASMANCS
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\JOSXXL1_RASMANCS
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\JOSXXL1_RASMANCS
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\JOSXXL1_RASMANCS
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\JOSXXL1_RASMANCS
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\JOSXXL1_RASMANCS
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\JOSXXL1_RASMANCS
FileDirectory
There are 5 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
890B000
direct allocation
page execute and read and write
malicious
37451000
trusted library allocation
page read and write
malicious
3A7B0000
trusted library allocation
page read and write
37430000
trusted library allocation
page read and write
7070000
heap
page read and write
37424000
trusted library allocation
page read and write
89A0000
direct allocation
page read and write
37430000
trusted library allocation
page read and write
373F0000
trusted library allocation
page read and write
374BD000
trusted library allocation
page read and write
3A7B0000
trusted library allocation
page read and write
3A910000
trusted library allocation
page read and write
80000
trusted library allocation
page read and write
374EE000
trusted library allocation
page read and write
3A8F0000
trusted library allocation
page read and write
373F0000
trusted library allocation
page read and write
3A7C0000
trusted library allocation
page read and write
36E7F000
stack
page read and write
750B000
direct allocation
page execute and read and write
39D60000
trusted library allocation
page read and write
39E47000
heap
page read and write
38637000
trusted library allocation
page read and write
3A7C0000
trusted library allocation
page read and write
3A7B0000
trusted library allocation
page read and write
39D60000
trusted library allocation
page read and write
373F0000
trusted library allocation
page read and write
CB000
trusted library allocation
page execute and read and write
27FF000
stack
page read and write
386CF000
trusted library allocation
page read and write
3877F000
trusted library allocation
page read and write
3A7B0000
trusted library allocation
page read and write
373B0000
trusted library allocation
page read and write
37390000
trusted library allocation
page read and write
37280000
heap
page read and write
3738F000
stack
page read and write
3A7B0000
trusted library allocation
page read and write
373F0000
trusted library allocation
page read and write
3A7B0000
trusted library allocation
page read and write
3A820000
trusted library allocation
page read and write
57D4000
heap
page read and write
37390000
trusted library allocation
page read and write
373F0000
trusted library allocation
page read and write
373F0000
trusted library allocation
page read and write
3A7B0000
trusted library allocation
page read and write
375FF000
trusted library allocation
page read and write
3A910000
trusted library allocation
page read and write
3A7B0000
trusted library allocation
page read and write
38500000
trusted library allocation
page read and write
89C0000
direct allocation
page read and write
373F0000
trusted library allocation
page read and write
39D60000
trusted library allocation
page read and write
3A7B0000
trusted library allocation
page read and write
160000
trusted library allocation
page read and write
5B42000
heap
page read and write
37430000
trusted library allocation
page read and write
37390000
trusted library allocation
page read and write
3A7B0000
trusted library allocation
page read and write
370CF000
stack
page read and write
37390000
trusted library allocation
page read and write
373F1000
trusted library allocation
page read and write
373F0000
trusted library allocation
page read and write
360E000
heap
page read and write
3A7F0000
trusted library allocation
page read and write
3A7B0000
trusted library allocation
page read and write
600000
direct allocation
page read and write
386F9000
trusted library allocation
page read and write
401000
unkown
page execute read
38573000
trusted library allocation
page read and write
38707000
trusted library allocation
page read and write
3A7B0000
trusted library allocation
page read and write
706E000
heap
page read and write
BA000
trusted library allocation
page execute and read and write
38751000
trusted library allocation
page read and write
3A7C0000
trusted library allocation
page read and write
373F0000
trusted library allocation
page read and write
3A7C0000
trusted library allocation
page read and write
373F0000
trusted library allocation
page read and write
373F0000
trusted library allocation
page read and write
707A000
heap
page read and write
6F90000
direct allocation
page read and write
3A7B0000
trusted library allocation
page read and write
3A44F000
stack
page read and write
37430000
trusted library allocation
page read and write
38555000
trusted library allocation
page read and write
373F0000
trusted library allocation
page read and write
28FF000
stack
page read and write
373ED000
stack
page read and write
3A900000
trusted library allocation
page read and write
720000
direct allocation
page read and write
3A7B0000
trusted library allocation
page read and write
3A2CE000
stack
page read and write
6F70000
direct allocation
page read and write
3A7B0000
trusted library allocation
page read and write
39C60000
heap
page read and write
373F0000
trusted library allocation
page read and write
3A7B0000
trusted library allocation
page read and write
37390000
trusted library allocation
page read and write
3A7C0000
trusted library allocation
page read and write
3A7B0000
trusted library allocation
page read and write
3708E000
stack
page read and write
6FA0000
direct allocation
page read and write
401000
unkown
page execute read
3A8F0000
trusted library allocation
page read and write
373F0000
trusted library allocation
page read and write
39D60000
trusted library allocation
page read and write
3A7F0000
trusted library allocation
page read and write
373F0000
trusted library allocation
page read and write
3A7B0000
trusted library allocation
page read and write
5458000
heap
page read and write
39D9A000
heap
page read and write
3A7B0000
trusted library allocation
page read and write
53B2000
heap
page read and write
4B0000
heap
page read and write
36C0F000
stack
page read and write
40A000
unkown
page write copy
3A7C0000
trusted library allocation
page read and write
37430000
trusted library allocation
page read and write
687B000
remote allocation
page execute and read and write
373A0000
trusted library allocation
page read and write
8A6E000
stack
page read and write
39690000
trusted library allocation
page execute and read and write
3A820000
trusted library allocation
page read and write
3A7B0000
trusted library allocation
page read and write
373F0000
trusted library allocation
page read and write
3230000
heap
page read and write
37705000
trusted library allocation
page read and write
37410000
trusted library allocation
page read and write
373F0000
trusted library allocation
page read and write
37410000
trusted library allocation
page read and write
3A7B0000
trusted library allocation
page read and write
3A760000
trusted library allocation
page read and write
370E0000
direct allocation
page read and write
23B5000
heap
page read and write
3A7B0000
trusted library allocation
page read and write
22DE000
stack
page read and write
373F0000
trusted library allocation
page read and write
39E08000
heap
page read and write
38506000
trusted library allocation
page read and write
373A0000
trusted library allocation
page read and write
3A7B0000
trusted library allocation
page read and write
36D0D000
stack
page read and write
387A7000
trusted library allocation
page read and write
37430000
trusted library allocation
page read and write
374C5000
trusted library allocation
page read and write
7088000
heap
page read and write
180000
trusted library allocation
page read and write
44C000
unkown
page read and write
407B000
remote allocation
page execute and read and write
373F0000
trusted library allocation
page read and write
3A7F0000
trusted library allocation
page read and write
373F0000
trusted library allocation
page read and write
547B000
remote allocation
page execute and read and write
401000
unkown
page execute read
374A7000
trusted library allocation
page read and write
37430000
trusted library allocation
page read and write
3A7B0000
trusted library allocation
page read and write
37430000
trusted library allocation
page read and write
190000
trusted library allocation
page read and write
3A790000
trusted library allocation
page read and write
373A0000
trusted library allocation
page read and write
35CA000
heap
page read and write
3A940000
trusted library allocation
page read and write
3A7B0000
trusted library allocation
page read and write
3A28F000
stack
page read and write
3762C000
trusted library allocation
page read and write
33AD000
heap
page read and write
37410000
trusted library allocation
page read and write
3760E000
trusted library allocation
page read and write
373A0000
trusted library allocation
page read and write
3A20E000
stack
page read and write
3A7B0000
trusted library allocation
page read and write
37506000
trusted library allocation
page read and write
39D60000
trusted library allocation
page read and write
23AC000
stack
page read and write
37872000
trusted library allocation
page read and write
5B84000
heap
page read and write
3A7C0000
trusted library allocation
page read and write
36D7E000
stack
page read and write
377BB000
trusted library allocation
page read and write
386DB000
trusted library allocation
page read and write
3240000
heap
page read and write
B2000
trusted library allocation
page read and write
7036000
heap
page read and write
3A760000
trusted library allocation
page read and write
3A7C0000
trusted library allocation
page read and write
3A830000
trusted library allocation
page read and write
16E0000
remote allocation
page execute and read and write
3A7C0000
trusted library allocation
page read and write
430000
unkown
page read and write
8A20000
heap
page read and write
373F0000
trusted library allocation
page read and write
3A7B0000
trusted library allocation
page read and write
374C1000
trusted library allocation
page read and write
3A7B0000
trusted library allocation
page read and write
3A7B0000
trusted library allocation
page read and write
3A7B0000
trusted library allocation
page read and write
39D60000
trusted library allocation
page read and write
3743D000
trusted library allocation
page read and write
373F0000
trusted library allocation
page read and write
3A820000
trusted library allocation
page read and write
3513000
heap
page read and write
37420000
trusted library allocation
page read and write
3A820000
trusted library allocation
page read and write
386BA000
trusted library allocation
page read and write
A70B000
direct allocation
page execute and read and write
373F0000
trusted library allocation
page read and write
37390000
trusted library allocation
page read and write
559A000
heap
page read and write
39D60000
trusted library allocation
page read and write
2340000
heap
page read and write
3A950000
trusted library allocation
page read and write
628000
heap
page read and write
3A910000
trusted library allocation
page read and write
3A7B0000
trusted library allocation
page read and write
384E0000
trusted library allocation
page read and write
39D60000
trusted library allocation
page read and write
227B000
remote allocation
page execute and read and write
39D60000
trusted library allocation
page read and write
37601000
trusted library allocation
page read and write
39D60000
trusted library allocation
page read and write
3A7B0000
trusted library allocation
page read and write
225E000
stack
page read and write
373F0000
trusted library allocation
page read and write
373F0000
trusted library allocation
page read and write
373F0000
trusted library allocation
page read and write
39D60000
trusted library allocation
page read and write
37430000
trusted library allocation
page read and write
702F000
heap
page read and write
39D60000
trusted library allocation
page read and write
38539000
trusted library allocation
page read and write
3A820000
trusted library allocation
page read and write
3A7B0000
trusted library allocation
page read and write
37430000
trusted library allocation
page read and write
3A7F0000
trusted library allocation
page read and write
400000
unkown
page readonly
37764000
trusted library allocation
page read and write
3A7B0000
trusted library allocation
page read and write
3A7B0000
trusted library allocation
page read and write
6DE7000
heap
page read and write
400000
unkown
page readonly
39D60000
trusted library allocation
page read and write
37430000
trusted library allocation
page read and write
373F0000
trusted library allocation
page read and write
37420000
trusted library allocation
page read and write
3A7B0000
trusted library allocation
page read and write
2290000
heap
page read and write
564B000
heap
page read and write
373F0000
trusted library allocation
page read and write
386D5000
trusted library allocation
page read and write
3A7C0000
trusted library allocation
page read and write
3A7B0000
trusted library allocation
page read and write
39D60000
trusted library allocation
page read and write
44F000
unkown
page readonly
3A48E000
stack
page read and write
3A7B0000
trusted library allocation
page read and write
373F0000
trusted library allocation
page read and write
37050000
remote allocation
page read and write
3A8F0000
trusted library allocation
page read and write
37400000
heap
page execute and read and write
6DE7000
heap
page read and write
3851D000
trusted library allocation
page read and write
37390000
trusted library allocation
page read and write
3A7B0000
trusted library allocation
page read and write
3A7B0000
trusted library allocation
page read and write
373F0000
trusted library allocation
page read and write
19A000
stack
page read and write
37603000
trusted library allocation
page read and write
435000
unkown
page read and write
3A7F0000
trusted library allocation
page read and write
37430000
trusted library allocation
page read and write
39D60000
trusted library allocation
page read and write
37426000
trusted library allocation
page read and write
39D60000
trusted library allocation
page read and write
37609000
trusted library allocation
page read and write
3845B000
trusted library allocation
page read and write
38787000
trusted library allocation
page read and write
39D90000
heap
page read and write
3A820000
trusted library allocation
page read and write
3A7B0000
trusted library allocation
page read and write
5E0000
direct allocation
page read and write
3630000
direct allocation
page read and write
6FB0000
direct allocation
page read and write
B0000
trusted library allocation
page read and write
3A820000
trusted library allocation
page read and write
370F0000
direct allocation
page read and write
2360000
heap
page read and write
38537000
trusted library allocation
page read and write
10003000
unkown
page readonly
373F0000
trusted library allocation
page read and write
3430000
heap
page read and write
5E7B000
remote allocation
page execute and read and write
373F0000
trusted library allocation
page read and write
373F0000
trusted library allocation
page read and write
374FE000
trusted library allocation
page read and write
3A76F000
trusted library allocation
page read and write
37390000
trusted library allocation
page read and write
39D60000
trusted library allocation
page read and write
39D60000
trusted library allocation
page read and write
3766A000
trusted library allocation
page read and write
37410000
trusted library allocation
page read and write
44F000
unkown
page readonly
190000
trusted library allocation
page read and write
38592000
trusted library allocation
page read and write
37430000
trusted library allocation
page read and write
40A000
unkown
page read and write
3A7B0000
trusted library allocation
page read and write
422000
unkown
page read and write
373F0000
trusted library allocation
page read and write
39D60000
trusted library allocation
page read and write
37430000
trusted library allocation
page read and write
3A820000
trusted library allocation
page read and write
3A40E000
stack
page read and write
150000
trusted library allocation
page execute and read and write
3A820000
trusted library allocation
page read and write
37430000
trusted library allocation
page read and write
3A8F0000
trusted library allocation
page read and write
373F0000
trusted library allocation
page read and write
373F0000
trusted library allocation
page read and write
387A0000
trusted library allocation
page read and write
3875E000
trusted library allocation
page read and write
7F0B000
direct allocation
page execute and read and write
39D60000
trusted library allocation
page read and write
373F0000
trusted library allocation
page read and write
10E000
stack
page read and write
44F000
unkown
page readonly
3763F000
trusted library allocation
page read and write
373A6000
trusted library allocation
page read and write
187B000
remote allocation
page execute and read and write
3A820000
trusted library allocation
page read and write
2350000
heap
page read and write
373F0000
trusted library allocation
page read and write
3A7B0000
trusted library allocation
page read and write
3A830000
trusted library allocation
page read and write
36D30000
trusted library allocation
page read and write
3A7B0000
trusted library allocation
page read and write
400000
unkown
page readonly
37502000
trusted library allocation
page read and write
37390000
trusted library allocation
page read and write
3A7D0000
trusted library allocation
page execute and read and write
5E07000
heap
page read and write
38531000
trusted library allocation
page read and write
3A7B0000
trusted library allocation
page read and write
3A7B0000
trusted library allocation
page read and write
3792B000
trusted library allocation
page read and write
10005000
unkown
page readonly
37410000
trusted library allocation
page read and write
3A7B0000
trusted library allocation
page read and write
3750B000
trusted library allocation
page read and write
373F0000
trusted library allocation
page read and write
3A7B0000
trusted library allocation
page read and write
37430000
trusted library allocation
page read and write
373F0000
trusted library allocation
page read and write
37634000
trusted library allocation
page read and write
427000
unkown
page read and write
3A7B0000
trusted library allocation
page read and write
37390000
trusted library allocation
page read and write
3A7B0000
trusted library allocation
page read and write
3A7C0000
trusted library allocation
page read and write
38529000
trusted library allocation
page read and write
6DE0000
heap
page read and write
3A7B0000
trusted library allocation
page read and write
590000
direct allocation
page read and write
3A910000
trusted library allocation
page read and write
3725E000
trusted library allocation
page read and write
37632000
trusted library allocation
page read and write
5A0000
direct allocation
page read and write
10001000
unkown
page execute read
39D60000
trusted library allocation
page read and write
3A7B0000
trusted library allocation
page read and write
39D60000
trusted library allocation
page read and write
373F0000
trusted library allocation
page read and write
386C1000
trusted library allocation
page read and write
3A7F0000
trusted library allocation
page read and write
38535000
trusted library allocation
page read and write
3A820000
trusted library allocation
page read and write
37430000
trusted library allocation
page read and write
37430000
trusted library allocation
page read and write
373F0000
trusted library allocation
page read and write
38563000
trusted library allocation
page read and write
3A58F000
stack
page read and write
3A7B0000
trusted library allocation
page read and write
3A7B0000
trusted library allocation
page read and write
3A820000
trusted library allocation
page read and write
396A0000
heap
page read and write
373F0000
trusted library allocation
page read and write
3A7B0000
trusted library allocation
page read and write
3A7B0000
trusted library allocation
page read and write
3A7B0000
trusted library allocation
page read and write
3A820000
trusted library allocation
page read and write
373B0000
trusted library allocation
page read and write
7036000
heap
page read and write
5B3F000
heap
page read and write
3A7B0000
trusted library allocation
page read and write
37390000
trusted library allocation
page read and write
37440000
heap
page read and write
3A7B0000
trusted library allocation
page read and write
AD000
trusted library allocation
page execute and read and write
375CC000
trusted library allocation
page read and write
37390000
trusted library allocation
page read and write
373A0000
trusted library allocation
page read and write
3877C000
trusted library allocation
page read and write
56DE000
heap
page read and write
3A7B0000
trusted library allocation
page read and write
5CC1000
heap
page read and write
5811000
heap
page read and write
37430000
trusted library allocation
page read and write
373F0000
trusted library allocation
page read and write
3A930000
trusted library allocation
page execute and read and write
373F0000
trusted library allocation
page read and write
3A7C0000
trusted library allocation
page read and write
480000
heap
page read and write
373F0000
trusted library allocation
page read and write
37410000
trusted library allocation
page read and write
3A7C0000
trusted library allocation
page read and write
378FC000
trusted library allocation
page read and write
5370000
heap
page read and write
3A7B0000
trusted library allocation
page read and write
55BC000
heap
page read and write
3A7B0000
trusted library allocation
page read and write
373F0000
trusted library allocation
page read and write
8990000
direct allocation
page read and write
39D60000
trusted library allocation
page read and write
39D60000
trusted library allocation
page read and write
37390000
trusted library allocation
page read and write
3A7B0000
trusted library allocation
page read and write
53F4000
heap
page read and write
3A810000
trusted library allocation
page read and write
3880C000
trusted library allocation
page read and write
4B5000
heap
page read and write
5BEC000
heap
page read and write
39458000
trusted library allocation
page read and write
C2000
trusted library allocation
page read and write
373F0000
trusted library allocation
page read and write
3A7B0000
trusted library allocation
page read and write
373F0000
trusted library allocation
page read and write
3A830000
trusted library allocation
page read and write
395EE000
stack
page read and write
37430000
trusted library allocation
page read and write
5A76000
heap
page read and write
408000
unkown
page readonly
3A7B0000
trusted library allocation
page read and write
3A7F0000
trusted library allocation
page execute and read and write
3A910000
trusted library allocation
page read and write
89B0000
direct allocation
page read and write
37430000
trusted library allocation
page read and write
3A7C0000
trusted library allocation
page read and write
6F80000
direct allocation
page read and write
385F2000
trusted library allocation
page read and write
707C000
heap
page read and write
373F0000
trusted library allocation
page read and write
37430000
trusted library allocation
page read and write
5613000
heap
page read and write
610B000
direct allocation
page execute and read and write
3A910000
trusted library allocation
page read and write
3A7B0000
trusted library allocation
page read and write
56A4000
heap
page read and write
374EA000
trusted library allocation
page read and write
37430000
trusted library allocation
page read and write
3A7B0000
trusted library allocation
page read and write
3546000
heap
page read and write
373F0000
trusted library allocation
page read and write
3A7B0000
trusted library allocation
page read and write
586F000
heap
page read and write
373F0000
trusted library allocation
page read and write
5D2E000
heap
page read and write
170000
trusted library allocation
page read and write
38717000
trusted library allocation
page read and write
3A7B0000
trusted library allocation
page read and write
3A920000
trusted library allocation
page read and write
374F6000
trusted library allocation
page read and write
3A7C0000
trusted library allocation
page execute and read and write
37261000
trusted library allocation
page read and write
3A900000
trusted library allocation
page read and write
3A7B0000
trusted library allocation
page read and write
39D60000
trusted library allocation
page read and write
3A7B0000
trusted library allocation
page read and write
3876F000
trusted library allocation
page read and write
9D0B000
direct allocation
page execute and read and write
37794000
trusted library allocation
page read and write
3A940000
trusted library allocation
page read and write
3A7B0000
trusted library allocation
page read and write
38763000
trusted library allocation
page read and write
373F0000
trusted library allocation
page read and write
3725A000
trusted library allocation
page read and write
7036000
heap
page read and write
386AA000
trusted library allocation
page read and write
37531000
trusted library allocation
page read and write
3A780000
trusted library allocation
page read and write
373F0000
trusted library allocation
page read and write
373F0000
trusted library allocation
page read and write
59AF000
heap
page read and write
38579000
trusted library allocation
page read and write
373F0000
trusted library allocation
page read and write
5B0000
direct allocation
page read and write
36EED000
stack
page read and write
3A790000
trusted library allocation
page read and write
667000
heap
page read and write
373F0000
trusted library allocation
page read and write
701D000
heap
page read and write
39D60000
trusted library allocation
page read and write
6FC7000
heap
page read and write
7073000
heap
page read and write
386D9000
trusted library allocation
page read and write
3A7B0000
trusted library allocation
page read and write
3876A000
trusted library allocation
page read and write
3763A000
trusted library allocation
page read and write
40A000
unkown
page write copy
38757000
trusted library allocation
page read and write
37410000
trusted library allocation
page read and write
39D80000
heap
page execute and read and write
9D000
trusted library allocation
page execute and read and write
373F0000
trusted library allocation
page read and write
37390000
trusted library allocation
page read and write
54F0000
heap
page read and write
39D70000
trusted library allocation
page execute and read and write
706F000
heap
page read and write
10000000
unkown
page readonly
373F0000
trusted library allocation
page read and write
290B000
heap
page read and write
386CD000
trusted library allocation
page read and write
39D60000
trusted library allocation
page read and write
5792000
heap
page read and write
425000
unkown
page read and write
3492000
heap
page read and write
3749B000
trusted library allocation
page read and write
3210000
direct allocation
page read and write
3A910000
trusted library allocation
page read and write
3A7B0000
trusted library allocation
page read and write
3A7C0000
trusted library allocation
page read and write
3A3CF000
stack
page read and write
373F0000
trusted library allocation
page read and write
7030000
heap
page read and write
373F0000
trusted library allocation
page read and write
3A7C0000
trusted library allocation
page read and write
3A780000
trusted library allocation
page read and write
3A7B0000
trusted library allocation
page read and write
386C9000
trusted library allocation
page read and write
373A0000
trusted library allocation
page read and write
3A7B0000
trusted library allocation
page read and write
384B4000
trusted library allocation
page read and write
3780000
trusted library allocation
page read and write
3A7C0000
trusted library allocation
page read and write
C5000
trusted library allocation
page execute and read and write
373A0000
trusted library allocation
page read and write
387BD000
trusted library allocation
page read and write
3A7C0000
trusted library allocation
page read and write
373F0000
trusted library allocation
page read and write
378CE000
trusted library allocation
page read and write
39D60000
trusted library allocation
page read and write
3A7B0000
trusted library allocation
page read and write
37430000
trusted library allocation
page read and write
8980000
direct allocation
page read and write
5C78000
heap
page read and write
3A7B0000
trusted library allocation
page read and write
37246000
trusted library allocation
page read and write
2C7B000
remote allocation
page execute and read and write
373C0000
trusted library allocation
page read and write
39E2C000
heap
page read and write
375DC000
trusted library allocation
page read and write
8A1E000
stack
page read and write
93000
trusted library allocation
page execute and read and write
373A0000
trusted library allocation
page read and write
3A7B0000
trusted library allocation
page read and write
38479000
trusted library allocation
page read and write
373F0000
trusted library allocation
page read and write
3A7B0000
trusted library allocation
page read and write
373F0000
trusted library allocation
page read and write
5770000
heap
page read and write
3A7C0000
trusted library allocation
page read and write
5738000
heap
page read and write
37430000
trusted library allocation
page read and write
3A7B0000
trusted library allocation
page read and write
39E2C000
heap
page read and write
373F0000
trusted library allocation
page read and write
3A7B0000
trusted library allocation
page read and write
3A7B0000
trusted library allocation
page read and write
54BC000
heap
page read and write
3A7B0000
trusted library allocation
page read and write
3A7B0000
trusted library allocation
page read and write
730000
direct allocation
page read and write
23B0000
heap
page read and write
3A910000
trusted library allocation
page read and write
3858B000
trusted library allocation
page read and write
373F0000
trusted library allocation
page read and write
373F0000
trusted library allocation
page read and write
373F0000
trusted library allocation
page read and write
37390000
trusted library allocation
page read and write
36FEE000
stack
page read and write
8960000
direct allocation
page read and write
3A7B0000
trusted library allocation
page read and write
39D60000
trusted library allocation
page read and write
930B000
direct allocation
page execute and read and write
42B000
unkown
page read and write
37266000
trusted library allocation
page read and write
387AB000
trusted library allocation
page read and write
373F0000
trusted library allocation
page read and write
39D60000
trusted library allocation
page read and write
3A770000
trusted library allocation
page read and write
38792000
trusted library allocation
page read and write
3A7B0000
trusted library allocation
page read and write
385FB000
trusted library allocation
page read and write
384B0000
trusted library allocation
page read and write
3A7B0000
trusted library allocation
page read and write
38575000
trusted library allocation
page read and write
3852B000
trusted library allocation
page read and write
A0000
trusted library allocation
page read and write
373F0000
trusted library allocation
page read and write
38451000
trusted library allocation
page read and write
6DC0000
heap
page read and write
38516000
trusted library allocation
page read and write
2364000
heap
page read and write
3A910000
trusted library allocation
page read and write
373F0000
trusted library allocation
page read and write
39D60000
trusted library allocation
page read and write
B6000
trusted library allocation
page execute and read and write
7033000
heap
page read and write
3A7B0000
trusted library allocation
page read and write
373F0000
trusted library allocation
page read and write
37735000
trusted library allocation
page read and write
373F0000
trusted library allocation
page read and write
3A7B0000
trusted library allocation
page read and write
3A7C0000
trusted library allocation
page read and write
3A7B0000
trusted library allocation
page read and write
373F0000
trusted library allocation
page read and write
37555000
trusted library allocation
page read and write
3A7B0000
trusted library allocation
page read and write
373F0000
trusted library allocation
page read and write
38779000
trusted library allocation
page read and write
3A910000
trusted library allocation
page read and write
596E000
heap
page read and write
39450000
trusted library allocation
page read and write
3A770000
trusted library allocation
page read and write
3A820000
trusted library allocation
page read and write
373F0000
trusted library allocation
page read and write
3A7B0000
trusted library allocation
page read and write
39D60000
trusted library allocation
page read and write
90000
trusted library allocation
page read and write
407D000
stack
page read and write
38824000
trusted library allocation
page read and write
3724B000
trusted library allocation
page read and write
373F0000
trusted library allocation
page read and write
400000
unkown
page readonly
37430000
trusted library allocation
page read and write
5AB8000
heap
page read and write
373A0000
trusted library allocation
page read and write
3A7C0000
trusted library allocation
page read and write
5A54000
heap
page read and write
3A7B0000
trusted library allocation
page read and write
37430000
trusted library allocation
page read and write
547A000
heap
page read and write
3A760000
trusted library allocation
page read and write
3A910000
trusted library allocation
page read and write
3A0CF000
stack
page read and write
3A8F0000
trusted library allocation
page read and write
3A7B0000
trusted library allocation
page read and write
3A7B0000
trusted library allocation
page read and write
3A7B0000
trusted library allocation
page read and write
36B0F000
stack
page read and write
3A7B0000
trusted library allocation
page read and write
39D60000
trusted library allocation
page read and write
33D9000
heap
page read and write
3A7B0000
trusted library allocation
page read and write
374FA000
trusted library allocation
page read and write
37410000
trusted library allocation
page read and write
3A7C0000
trusted library allocation
page read and write
37240000
trusted library allocation
page read and write
386DD000
trusted library allocation
page read and write
3A7B0000
trusted library allocation
page read and write
373F0000
trusted library allocation
page read and write
373F0000
trusted library allocation
page read and write
37390000
trusted library allocation
page read and write
373F0000
trusted library allocation
page read and write
373F0000
trusted library allocation
page read and write
37410000
trusted library allocation
page read and write
44F000
unkown
page readonly
6B0B000
direct allocation
page execute and read and write
39D60000
trusted library allocation
page read and write
373A0000
trusted library allocation
page read and write
3A910000
trusted library allocation
page read and write
38525000
trusted library allocation
page read and write
3A7B0000
trusted library allocation
page read and write
3864F000
trusted library allocation
page read and write
3330000
heap
page read and write
3A7B0000
trusted library allocation
page read and write
39D60000
trusted library allocation
page read and write
5C0000
direct allocation
page read and write
377E9000
trusted library allocation
page read and write
37050000
remote allocation
page read and write
3A820000
trusted library allocation
page read and write
3A7A0000
trusted library allocation
page read and write
373F0000
trusted library allocation
page read and write
37390000
trusted library allocation
page read and write
3A830000
trusted library allocation
page read and write
373F0000
trusted library allocation
page read and write
373A0000
trusted library allocation
page read and write
3A7B0000
trusted library allocation
page read and write
37430000
trusted library allocation
page read and write
373F0000
trusted library allocation
page read and write
401000
unkown
page execute read
3A7B0000
trusted library allocation
page read and write
39DED000
heap
page read and write
3724E000
trusted library allocation
page read and write
B10B000
direct allocation
page execute and read and write
373F0000
trusted library allocation
page read and write
373F0000
trusted library allocation
page read and write
3A7B0000
trusted library allocation
page read and write
38504000
trusted library allocation
page read and write
3A7B0000
trusted library allocation
page read and write
37410000
trusted library allocation
page read and write
3859A000
trusted library allocation
page read and write
3A7B0000
trusted library allocation
page read and write
23B9000
heap
page read and write
490000
heap
page read and write
35EC000
heap
page read and write
3A920000
trusted library allocation
page read and write
373F0000
trusted library allocation
page read and write
367B000
remote allocation
page execute and read and write
373F0000
trusted library allocation
page read and write
36E90000
heap
page read and write
3A7B0000
trusted library allocation
page read and write
3857B000
trusted library allocation
page read and write
3A7B0000
trusted library allocation
page read and write
3A24D000
stack
page read and write
3A920000
trusted library allocation
page read and write
37430000
trusted library allocation
page read and write
3A800000
trusted library allocation
page execute and read and write
3A8F0000
trusted library allocation
page read and write
387CC000
trusted library allocation
page read and write
39D60000
trusted library allocation
page read and write
3A7B0000
trusted library allocation
page read and write
373F0000
trusted library allocation
page read and write
373F0000
trusted library allocation
page read and write
374F2000
trusted library allocation
page read and write
39D60000
trusted library allocation
page read and write
C7000
trusted library allocation
page execute and read and write
8AC0000
heap
page read and write
39D70000
trusted library allocation
page read and write
39D60000
trusted library allocation
page read and write
3A840000
trusted library allocation
page execute and read and write
39D60000
trusted library allocation
page read and write
39D70000
trusted library allocation
page read and write
8AAD000
stack
page read and write
37430000
trusted library allocation
page read and write
6CE0000
heap
page read and write
6DE5000
heap
page read and write
4A7B000
remote allocation
page execute and read and write
5ADA000
heap
page read and write
3713A000
stack
page read and write
3A910000
trusted library allocation
page read and write
3A7B0000
trusted library allocation
page read and write
37430000
trusted library allocation
page read and write
3A820000
trusted library allocation
page read and write
3A7B0000
trusted library allocation
page read and write
373F0000
trusted library allocation
page read and write
620000
heap
page read and write
3A837000
trusted library allocation
page read and write
3A910000
trusted library allocation
page read and write
3742A000
trusted library allocation
page read and write
3A8F0000
trusted library allocation
page read and write
39D91000
heap
page read and write
14C000
stack
page read and write
65F000
heap
page read and write
385DA000
trusted library allocation
page read and write
590D000
heap
page read and write
98000
stack
page read and write
373F0000
trusted library allocation
page read and write
373F0000
trusted library allocation
page read and write
7003000
heap
page read and write
3A7B0000
trusted library allocation
page read and write
37390000
trusted library allocation
page read and write
5F70000
direct allocation
page execute and read and write
3A820000
trusted library allocation
page read and write
39C61000
heap
page read and write
384B6000
trusted library allocation
page read and write
58AE000
heap
page read and write
3A910000
trusted library allocation
page read and write
3A7F0000
trusted library allocation
page read and write
373F0000
trusted library allocation
page read and write
3A7C0000
trusted library allocation
page read and write
378A0000
trusted library allocation
page read and write
37390000
trusted library allocation
page read and write
373F0000
trusted library allocation
page read and write
373F0000
trusted library allocation
page read and write
37050000
remote allocation
page read and write
3A7B0000
trusted library allocation
page read and write
5D0000
direct allocation
page read and write
94000
trusted library allocation
page read and write
37272000
trusted library allocation
page read and write
39D60000
trusted library allocation
page read and write
373F0000
trusted library allocation
page read and write
3A7B0000
trusted library allocation
page read and write
37430000
trusted library allocation
page read and write
384D7000
trusted library allocation
page read and write
8970000
direct allocation
page read and write
3A7C0000
trusted library allocation
page read and write
6FC0000
heap
page read and write
38473000
trusted library allocation
page read and write
384D4000
trusted library allocation
page read and write
373F0000
trusted library allocation
page read and write
5BA6000
heap
page read and write
37410000
trusted library allocation
page read and write
5C56000
heap
page read and write
3A920000
trusted library allocation
page read and write
5F0000
direct allocation
page read and write
375FB000
trusted library allocation
page read and write
3769B000
trusted library allocation
page read and write
387AD000
trusted library allocation
page read and write
3A7B0000
trusted library allocation
page read and write
386A8000
trusted library allocation
page read and write
5416000
heap
page read and write
3A7B0000
trusted library allocation
page read and write
39E37000
heap
page read and write
3A7B0000
trusted library allocation
page read and write
387C4000
trusted library allocation
page read and write
37410000
trusted library allocation
page read and write
373F0000
trusted library allocation
page read and write
5C0E000
heap
page read and write
39C61000
heap
page read and write
37237000
stack
page read and write
39DE6000
heap
page read and write
39D60000
trusted library allocation
page read and write
37630000
trusted library allocation
page read and write
3A7C0000
trusted library allocation
page read and write
37430000
trusted library allocation
page read and write
373F0000
trusted library allocation
page read and write
707A000
heap
page read and write
408000
unkown
page readonly
3A7C0000
trusted library allocation
page read and write
685000
heap
page read and write
3A820000
trusted library allocation
page read and write
3726D000
trusted library allocation
page read and write
3862B000
trusted library allocation
page read and write
37816000
trusted library allocation
page read and write
3A7B0000
trusted library allocation
page read and write
37430000
trusted library allocation
page read and write
3A7B0000
trusted library allocation
page read and write
3A7F0000
trusted library allocation
page read and write
3A7B0000
trusted library allocation
page read and write
373F0000
trusted library allocation
page read and write
3A7E0000
trusted library allocation
page execute and read and write
3A900000
trusted library allocation
page read and write
408000
unkown
page readonly
386A4000
trusted library allocation
page read and write
663000
heap
page read and write
373F0000
trusted library allocation
page read and write
5A11000
heap
page read and write
373F0000
trusted library allocation
page read and write
2200000
heap
page read and write
373F0000
trusted library allocation
page read and write
37420000
trusted library allocation
page read and write
373F0000
trusted library allocation
page read and write
384E4000
trusted library allocation
page read and write
37410000
trusted library allocation
page read and write
3A7B0000
trusted library allocation
page read and write
3A7F0000
trusted library allocation
page read and write
37844000
trusted library allocation
page read and write
373F1000
trusted library allocation
page read and write
3A10E000
stack
page read and write
3A7B0000
trusted library allocation
page read and write
37410000
trusted library allocation
page read and write
44E000
unkown
page read and write
3A840000
trusted library allocation
page read and write
5B1D000
heap
page read and write
3A7B0000
trusted library allocation
page read and write
37410000
trusted library allocation
page read and write
374B3000
trusted library allocation
page read and write
3588000
heap
page read and write
37390000
trusted library allocation
page read and write
39D60000
trusted library allocation
page read and write
385FD000
trusted library allocation
page read and write
3A7F0000
trusted library allocation
page read and write
3A7B0000
trusted library allocation
page read and write
3A7B0000
trusted library allocation
page read and write
40A000
unkown
page write copy
408000
unkown
page readonly
5544000
heap
page read and write
There are 866 hidden memdumps, click here to show them.