IOC Report
Preventivo#09678.exe

loading gif

Files

File Path
Type
Category
Malicious
Preventivo#09678.exe
PE32+ executable (GUI) x86-64 Mono/.Net assembly, for MS Windows
initial sample
malicious
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_Preventivo#09678_94f6bbbdc68a34d48fcce9aab1a64036c9bb21_275c6d1b_c344c99d-faf4-462c-846b-e2080a1d818c\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERCF7B.tmp.dmp
Mini DuMP crash report, 16 streams, Wed Nov 13 14:02:25 2024, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERD141.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERD180.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\jsc.exe.log
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\tmp47F8.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\tmp4809.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\tmp4829.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 25, cookie 0xe, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\tmp482A.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 25, cookie 0xe, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\tmp483B.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 25, cookie 0xe, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\tmp483C.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 25, cookie 0xe, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\tmp484C.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 25, cookie 0xe, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\tmp485D.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 25, cookie 0xe, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\tmp485E.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 7, database pages 89, cookie 0x36, schema 4, UTF-8, version-valid-for 7
dropped
C:\Users\user\AppData\Local\Temp\tmp486E.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 7, database pages 89, cookie 0x36, schema 4, UTF-8, version-valid-for 7
dropped
C:\Users\user\AppData\Local\Temp\tmp7FFA.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 7, database pages 89, cookie 0x36, schema 4, UTF-8, version-valid-for 7
dropped
C:\Users\user\AppData\Local\Temp\tmp800B.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 7, database pages 89, cookie 0x36, schema 4, UTF-8, version-valid-for 7
dropped
C:\Users\user\AppData\Local\Temp\tmp802B.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 7, database pages 89, cookie 0x36, schema 4, UTF-8, version-valid-for 7
dropped
C:\Users\user\AppData\Local\Temp\tmp803C.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 7, database pages 89, cookie 0x36, schema 4, UTF-8, version-valid-for 7
dropped
C:\Users\user\AppData\Local\Temp\tmp805C.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 7, database pages 89, cookie 0x36, schema 4, UTF-8, version-valid-for 7
dropped
C:\Users\user\AppData\Local\Temp\tmp806D.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 7, database pages 89, cookie 0x36, schema 4, UTF-8, version-valid-for 7
dropped
C:\Users\user\AppData\Local\Temp\tmpB77B.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 7, database pages 89, cookie 0x36, schema 4, UTF-8, version-valid-for 7
dropped
C:\Users\user\AppData\Local\Temp\tmpB78C.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 7, database pages 89, cookie 0x36, schema 4, UTF-8, version-valid-for 7
dropped
C:\Users\user\AppData\Local\Temp\tmpB7AC.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 7, database pages 89, cookie 0x36, schema 4, UTF-8, version-valid-for 7
dropped
C:\Users\user\AppData\Local\Temp\tmpB7CC.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 7, database pages 89, cookie 0x36, schema 4, UTF-8, version-valid-for 7
dropped
C:\Users\user\AppData\Local\Temp\tmpB7ED.tmp
SQLite 3.x database, user version 12, last written using SQLite version 3042000, page size 32768, writer version 2, read version 2, file counter 3, database pages 3, cookie 0x1, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\tmpD6BF.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\tmpD6D0.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\tmpD6E1.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\tmpD6E2.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\tmpD6F2.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\tmpD703.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\tmpD713.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\tmpD714.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\tmpEE7E.tmp
SQLite 3.x database, user version 12, last written using SQLite version 3042000, page size 32768, writer version 2, read version 2, file counter 3, database pages 3, cookie 0x1, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\tmpEEF9.tmp
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\tmpEEFA.tmp
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\tmpEF0B.tmp
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\tmpEF0C.tmp
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\tmpEF0D.tmp
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\tmpEF1D.tmp
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\tmpF8B.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\tmpF9B.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\tmpFAC.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\tmpFBC.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\tmpFCD.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\tmpFCE.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\tmpFDF.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\tmpFEF.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
C:\Windows\appcompat\Programs\Amcache.hve
MS Windows registry file, NT/2000 or above
dropped
There are 41 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\Preventivo#09678.exe
"C:\Users\user\Desktop\Preventivo#09678.exe"
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\jsc.exe
"C:\Windows\Microsoft.NET\Framework\v4.0.30319\jsc.exe"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\WerFault.exe
C:\Windows\system32\WerFault.exe -u -p 5092 -s 1152

URLs

Name
IP
Malicious
193.70.111.186:13484
malicious
http://193.70.111.186:13484/
193.70.111.186
malicious
https://ipinfo.io/ip%appdata%
unknown
https://duckduckgo.com/chrome_newtab
unknown
https://duckduckgo.com/ac/?q=
unknown
https://www.google.com/images/branding/product/ico/googleg_lodp.ico
unknown
http://schemas.xmlsoap.org/ws/2004/08/addressing/role/anonymous
unknown
http://tempuri.org/Endpoint/CheckConnectResponse
unknown
http://schemas.datacontract.org/2004/07/
unknown
http://schemas.xmlsoap.org/ws/2004/08/addressing/faultX
unknown
http://193.70.111.186:13484
unknown
http://tempuri.org/Endpoint/EnvironmentSettings
unknown
https://api.ip.sb/geoip%USERPEnvironmentROFILE%
unknown
http://schemas.xmlsoap.org/soap/envelope/
unknown
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
unknown
http://tempuri.org/
unknown
http://upx.sf.net
unknown
http://tempuri.org/Endpoint/CheckConnect
unknown
https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
unknown
http://193.70.111.186:13484t-
unknown
https://www.ecosia.org/newtab/
unknown
http://tempuri.org/Endpoint/VerifyUpdateResponse
unknown
http://tempuri.org/Endpoint/SetEnvironment
unknown
http://tempuri.org/Endpoint/SetEnvironmentResponse
unknown
http://tempuri.org/Endpoint/GetUpdates
unknown
https://ac.ecosia.org/autocomplete?q=
unknown
https://api.ipify.orgcookies//settinString.Removeg
unknown
http://schemas.xmlsoap.org/ws/2004/08/addressing
unknown
http://tempuri.org/Endpoint/GetUpdatesResponse
unknown
https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
unknown
http://tempuri.org/Endpoint/EnvironmentSettingsResponse
unknown
http://tempuri.org/Endpoint/VerifyUpdate
unknown
http://tempuri.org/0
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
unknown
http://schemas.xmlsoap.org/soap/actor/next
unknown
There are 26 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
api.ip.sb
unknown

IPs

IP
Domain
Country
Malicious
193.70.111.186
unknown
France
malicious

Registry

Path
Value
Malicious
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\jsc_RASAPI32
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\jsc_RASAPI32
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\jsc_RASAPI32
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\jsc_RASAPI32
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\jsc_RASAPI32
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\jsc_RASAPI32
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\jsc_RASAPI32
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\jsc_RASMANCS
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\jsc_RASMANCS
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\jsc_RASMANCS
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\jsc_RASMANCS
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\jsc_RASMANCS
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\jsc_RASMANCS
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\jsc_RASMANCS
FileDirectory
\REGISTRY\A\{d5020868-249e-564c-f8bd-eedb1eda18f1}\Root\InventoryApplicationFile\preventivo#09678|d66595edf614f2a
ProgramId
\REGISTRY\A\{d5020868-249e-564c-f8bd-eedb1eda18f1}\Root\InventoryApplicationFile\preventivo#09678|d66595edf614f2a
FileId
\REGISTRY\A\{d5020868-249e-564c-f8bd-eedb1eda18f1}\Root\InventoryApplicationFile\preventivo#09678|d66595edf614f2a
LowerCaseLongPath
\REGISTRY\A\{d5020868-249e-564c-f8bd-eedb1eda18f1}\Root\InventoryApplicationFile\preventivo#09678|d66595edf614f2a
LongPathHash
\REGISTRY\A\{d5020868-249e-564c-f8bd-eedb1eda18f1}\Root\InventoryApplicationFile\preventivo#09678|d66595edf614f2a
Name
\REGISTRY\A\{d5020868-249e-564c-f8bd-eedb1eda18f1}\Root\InventoryApplicationFile\preventivo#09678|d66595edf614f2a
OriginalFileName
\REGISTRY\A\{d5020868-249e-564c-f8bd-eedb1eda18f1}\Root\InventoryApplicationFile\preventivo#09678|d66595edf614f2a
Publisher
\REGISTRY\A\{d5020868-249e-564c-f8bd-eedb1eda18f1}\Root\InventoryApplicationFile\preventivo#09678|d66595edf614f2a
Version
\REGISTRY\A\{d5020868-249e-564c-f8bd-eedb1eda18f1}\Root\InventoryApplicationFile\preventivo#09678|d66595edf614f2a
BinFileVersion
\REGISTRY\A\{d5020868-249e-564c-f8bd-eedb1eda18f1}\Root\InventoryApplicationFile\preventivo#09678|d66595edf614f2a
BinaryType
\REGISTRY\A\{d5020868-249e-564c-f8bd-eedb1eda18f1}\Root\InventoryApplicationFile\preventivo#09678|d66595edf614f2a
ProductName
\REGISTRY\A\{d5020868-249e-564c-f8bd-eedb1eda18f1}\Root\InventoryApplicationFile\preventivo#09678|d66595edf614f2a
ProductVersion
\REGISTRY\A\{d5020868-249e-564c-f8bd-eedb1eda18f1}\Root\InventoryApplicationFile\preventivo#09678|d66595edf614f2a
LinkDate
\REGISTRY\A\{d5020868-249e-564c-f8bd-eedb1eda18f1}\Root\InventoryApplicationFile\preventivo#09678|d66595edf614f2a
BinProductVersion
\REGISTRY\A\{d5020868-249e-564c-f8bd-eedb1eda18f1}\Root\InventoryApplicationFile\preventivo#09678|d66595edf614f2a
AppxPackageFullName
\REGISTRY\A\{d5020868-249e-564c-f8bd-eedb1eda18f1}\Root\InventoryApplicationFile\preventivo#09678|d66595edf614f2a
AppxPackageRelativeId
\REGISTRY\A\{d5020868-249e-564c-f8bd-eedb1eda18f1}\Root\InventoryApplicationFile\preventivo#09678|d66595edf614f2a
Size
\REGISTRY\A\{d5020868-249e-564c-f8bd-eedb1eda18f1}\Root\InventoryApplicationFile\preventivo#09678|d66595edf614f2a
Language
\REGISTRY\A\{d5020868-249e-564c-f8bd-eedb1eda18f1}\Root\InventoryApplicationFile\preventivo#09678|d66595edf614f2a
Usn
There are 24 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
402000
remote allocation
page execute and read and write
malicious
213CB9A7000
trusted library allocation
page read and write
malicious
31E0000
trusted library allocation
page read and write
malicious
213DBEF4000
trusted library allocation
page read and write
malicious
213DBD71000
trusted library allocation
page read and write
7FFAAC512000
trusted library allocation
page read and write
213C9B00000
heap
page read and write
3180000
heap
page execute and read and write
213DB7B8000
trusted library allocation
page read and write
59C0000
trusted library allocation
page read and write
213CBA78000
trusted library allocation
page read and write
32D3000
trusted library allocation
page read and write
68AC000
heap
page read and write
213CBAFA000
trusted library allocation
page read and write
4191000
trusted library allocation
page read and write
213C9890000
heap
page read and write
213DB5D1000
trusted library allocation
page read and write
6B60000
trusted library allocation
page read and write
7FFAAC5C0000
trusted library allocation
page read and write
213DBB78000
trusted library allocation
page read and write
1583000
trusted library allocation
page execute and read and write
72D0000
trusted library allocation
page read and write
213DB5C1000
trusted library allocation
page read and write
213CB5C1000
trusted library allocation
page read and write
72F0000
trusted library allocation
page execute and read and write
15D0000
trusted library allocation
page read and write
213CBAEF000
trusted library allocation
page read and write
6B2A000
trusted library allocation
page read and write
144F000
heap
page read and write
5A9A000
trusted library allocation
page read and write
15B2000
trusted library allocation
page read and write
1570000
trusted library allocation
page read and write
1230000
heap
page read and write
5970000
trusted library allocation
page read and write
7FFAAC630000
trusted library allocation
page execute and read and write
6FAE000
stack
page read and write
213CB9DC000
trusted library allocation
page read and write
213C9A95000
heap
page read and write
FB892FC000
stack
page read and write
7270000
trusted library allocation
page read and write
73C21000
unkown
page execute read
42E8000
trusted library allocation
page read and write
1190000
heap
page read and write
7FFAAC6C0000
trusted library allocation
page execute and read and write
3208000
trusted library allocation
page read and write
103B000
stack
page read and write
698A000
heap
page read and write
42A5000
trusted library allocation
page read and write
3191000
trusted library allocation
page read and write
213CBA80000
trusted library allocation
page read and write
68D2000
heap
page read and write
1235000
heap
page read and write
FB893FD000
stack
page read and write
213CBA01000
trusted library allocation
page read and write
5C60000
trusted library allocation
page read and write
5A9D000
trusted library allocation
page read and write
213DBD78000
trusted library allocation
page read and write
7310000
heap
page read and write
3339000
trusted library allocation
page read and write
213CB9D8000
trusted library allocation
page read and write
213CBB21000
trusted library allocation
page read and write
213CBA1E000
trusted library allocation
page read and write
7FFAAC6D0000
trusted library allocation
page read and write
213CBAC2000
trusted library allocation
page read and write
7051000
trusted library allocation
page read and write
213CBB5A000
trusted library allocation
page read and write
6CC6000
trusted library allocation
page read and write
213CBB52000
trusted library allocation
page read and write
15A0000
trusted library allocation
page read and write
400000
remote allocation
page execute and read and write
213C98BD000
heap
page read and write
42D7000
trusted library allocation
page read and write
6B19000
trusted library allocation
page read and write
848D000
heap
page read and write
32B1000
trusted library allocation
page read and write
213C9632000
unkown
page readonly
120E000
stack
page read and write
213CB9F4000
trusted library allocation
page read and write
213C9870000
trusted library allocation
page read and write
6B44000
trusted library allocation
page read and write
6B28000
trusted library allocation
page read and write
705D000
trusted library allocation
page read and write
7070000
trusted library allocation
page read and write
33C8000
trusted library allocation
page read and write
6C30000
trusted library allocation
page execute and read and write
73C3F000
unkown
page readonly
371B000
trusted library allocation
page read and write
4299000
trusted library allocation
page read and write
213CBB4A000
trusted library allocation
page read and write
213E3E40000
heap
page read and write
73B0000
heap
page read and write
213CBAA1000
trusted library allocation
page read and write
7FFAAC6B0000
trusted library allocation
page read and write
6C40000
trusted library allocation
page read and write
70B0000
trusted library allocation
page read and write
664F000
stack
page read and write
1210000
heap
page read and write
42FB000
trusted library allocation
page read and write
213CBBBD000
trusted library allocation
page read and write
7048000
trusted library allocation
page read and write
70C0000
trusted library allocation
page execute and read and write
213CBA7C000
trusted library allocation
page read and write
213CBA8B000
trusted library allocation
page read and write
213CB9F9000
trusted library allocation
page read and write
213CBA41000
trusted library allocation
page read and write
6B52000
trusted library allocation
page read and write
213CBA19000
trusted library allocation
page read and write
158D000
trusted library allocation
page execute and read and write
59B0000
trusted library allocation
page read and write
213CBB9C000
trusted library allocation
page read and write
593E000
trusted library allocation
page read and write
213C98CE000
heap
page read and write
213CBB7B000
trusted library allocation
page read and write
704E000
trusted library allocation
page read and write
1584000
trusted library allocation
page read and write
876F000
stack
page read and write
591B000
trusted library allocation
page read and write
213CBB5E000
trusted library allocation
page read and write
703C000
trusted library allocation
page read and write
6898000
heap
page read and write
213DB9B1000
trusted library allocation
page read and write
69FE000
stack
page read and write
213C9639000
unkown
page readonly
213CBA2E000
trusted library allocation
page read and write
6B2F000
trusted library allocation
page read and write
42F3000
trusted library allocation
page read and write
3442000
trusted library allocation
page read and write
213CBB35000
trusted library allocation
page read and write
6CC0000
trusted library allocation
page read and write
213CBAD7000
trusted library allocation
page read and write
30E0000
trusted library allocation
page read and write
374E000
trusted library allocation
page read and write
213CBA88000
trusted library allocation
page read and write
213CB5B0000
heap
page execute and read and write
213CBA84000
trusted library allocation
page read and write
FB897FE000
stack
page read and write
213C9B05000
heap
page read and write
213CBB77000
trusted library allocation
page read and write
213C9A60000
heap
page read and write
FB88FFE000
stack
page read and write
213CBA5F000
trusted library allocation
page read and write
5B4E000
stack
page read and write
213CB6CA000
trusted library allocation
page read and write
7FFAAC52D000
trusted library allocation
page execute and read and write
7FFAAC534000
trusted library allocation
page read and write
7FFAAC6D4000
trusted library allocation
page read and write
FB88EF2000
stack
page read and write
7FFB167B0000
unkown
page read and write
84D6000
heap
page read and write
213DBB71000
trusted library allocation
page read and write
213C97F0000
heap
page read and write
145B000
heap
page read and write
213C97B0000
heap
page read and write
7FFB167A6000
unkown
page readonly
7330000
trusted library allocation
page execute and read and write
213CBB7F000
trusted library allocation
page read and write
213CB65E000
trusted library allocation
page read and write
3210000
trusted library allocation
page read and write
15FE000
heap
page read and write
7272000
trusted library allocation
page read and write
7FFAAC6E0000
trusted library allocation
page read and write
59A0000
trusted library allocation
page read and write
312E000
stack
page read and write
213CBB8E000
trusted library allocation
page read and write
73C36000
unkown
page readonly
3173000
heap
page execute and read and write
5A10000
trusted library allocation
page read and write
5981000
trusted library allocation
page read and write
213C9973000
heap
page read and write
2F90000
heap
page read and write
42A8000
trusted library allocation
page read and write
213C9977000
heap
page read and write
213CBA4F000
trusted library allocation
page read and write
7036000
trusted library allocation
page read and write
6B12000
trusted library allocation
page read and write
213CBB25000
trusted library allocation
page read and write
213CB678000
trusted library allocation
page read and write
678E000
stack
page read and write
213CBB69000
trusted library allocation
page read and write
213CBABA000
trusted library allocation
page read and write
3221000
trusted library allocation
page read and write
5954000
trusted library allocation
page read and write
6944000
heap
page read and write
7290000
trusted library allocation
page read and write
7FFAAC51D000
trusted library allocation
page execute and read and write
213CBA57000
trusted library allocation
page read and write
7FFB16791000
unkown
page execute read
7FFAAC5CC000
trusted library allocation
page execute and read and write
5C5E000
stack
page read and write
FB890FE000
stack
page read and write
42AA000
trusted library allocation
page read and write
213CBB73000
trusted library allocation
page read and write
213CBAB2000
trusted library allocation
page read and write
69A0000
trusted library allocation
page read and write
213CBABE000
trusted library allocation
page read and write
11C0000
heap
page read and write
7FFAAC5D0000
trusted library allocation
page execute and read and write
84E1000
heap
page read and write
7056000
trusted library allocation
page read and write
68FC000
heap
page read and write
213CBACE000
trusted library allocation
page read and write
4383000
trusted library allocation
page read and write
213CBB4E000
trusted library allocation
page read and write
7FFAAC56C000
trusted library allocation
page execute and read and write
7D4E000
stack
page read and write
6B10000
trusted library allocation
page read and write
42F6000
trusted library allocation
page read and write
72E0000
heap
page read and write
213CBA32000
trusted library allocation
page read and write
84B8000
heap
page read and write
15BB000
trusted library allocation
page execute and read and write
213CBBB1000
trusted library allocation
page read and write
69B0000
trusted library allocation
page execute and read and write
213C9A40000
heap
page read and write
590F000
stack
page read and write
213CBA47000
trusted library allocation
page read and write
213CBB1F000
trusted library allocation
page read and write
42B5000
trusted library allocation
page read and write
213CBAD3000
trusted library allocation
page read and write
5932000
trusted library allocation
page read and write
34CF000
trusted library allocation
page read and write
213CB3B0000
heap
page read and write
5960000
trusted library allocation
page read and write
7FFB16790000
unkown
page readonly
213CBA15000
trusted library allocation
page read and write
5C6E000
trusted library allocation
page read and write
213CBAAD000
trusted library allocation
page read and write
213DB934000
trusted library allocation
page read and write
213CBA36000
trusted library allocation
page read and write
73D0000
trusted library allocation
page execute and read and write
140E000
stack
page read and write
42B0000
trusted library allocation
page read and write
33BF000
trusted library allocation
page read and write
15A6000
trusted library allocation
page execute and read and write
15B5000
trusted library allocation
page execute and read and write
FB896FE000
stack
page read and write
7FFAAC700000
trusted library allocation
page read and write
213C98BB000
heap
page read and write
3202000
trusted library allocation
page read and write
213E3E30000
heap
page read and write
3719000
trusted library allocation
page read and write
1590000
trusted library allocation
page read and write
213CBA53000
trusted library allocation
page read and write
7FFB167B2000
unkown
page readonly
42E4000
trusted library allocation
page read and write
6B0F000
stack
page read and write
213C96D0000
heap
page read and write
6C1E000
stack
page read and write
213CBAE3000
trusted library allocation
page read and write
213CBA2A000
trusted library allocation
page read and write
213CBBAC000
trusted library allocation
page read and write
213DB5E4000
trusted library allocation
page read and write
213CBB3D000
trusted library allocation
page read and write
703F000
trusted library allocation
page read and write
213CBBA4000
trusted library allocation
page read and write
213CBA05000
trusted library allocation
page read and write
213CBB83000
trusted library allocation
page read and write
213CBB1D000
trusted library allocation
page read and write
5926000
trusted library allocation
page read and write
213CBADF000
trusted library allocation
page read and write
213CBB42000
trusted library allocation
page read and write
42F1000
trusted library allocation
page read and write
213C9A03000
heap
page read and write
34C5000
trusted library allocation
page read and write
5AA0000
trusted library allocation
page read and write
4308000
trusted library allocation
page read and write
7080000
trusted library allocation
page read and write
7034000
trusted library allocation
page read and write
7032000
trusted library allocation
page read and write
213C99D0000
heap
page execute and read and write
213CBB0C000
trusted library allocation
page read and write
213CB5F5000
trusted library allocation
page read and write
213C97D0000
heap
page read and write
2F80000
trusted library allocation
page read and write
5A70000
trusted library allocation
page read and write
5910000
trusted library allocation
page read and write
73C20000
unkown
page readonly
213CBA8D000
trusted library allocation
page read and write
3732000
trusted library allocation
page read and write
213CBA99000
trusted library allocation
page read and write
213CB6D2000
trusted library allocation
page read and write
15F0000
heap
page read and write
213CBAB6000
trusted library allocation
page read and write
7FFAAC53D000
trusted library allocation
page execute and read and write
213CBB04000
trusted library allocation
page read and write
213CBA4B000
trusted library allocation
page read and write
450C000
trusted library allocation
page read and write
213CB9E8000
trusted library allocation
page read and write
5AB0000
trusted library allocation
page read and write
42DE000
trusted library allocation
page read and write
213C9A90000
heap
page read and write
213CBA22000
trusted library allocation
page read and write
213C98D3000
heap
page read and write
15B7000
trusted library allocation
page execute and read and write
7350000
trusted library allocation
page read and write
213CBAA5000
trusted library allocation
page read and write
213CBA11000
trusted library allocation
page read and write
42ED000
trusted library allocation
page read and write
7FFAAC6DA000
trusted library allocation
page read and write
1430000
heap
page read and write
FB895FE000
stack
page read and write
213CBA66000
trusted library allocation
page read and write
316E000
stack
page read and write
7FFAAC513000
trusted library allocation
page execute and read and write
213CB9F0000
trusted library allocation
page read and write
159D000
trusted library allocation
page execute and read and write
213DBB85000
trusted library allocation
page read and write
7044000
trusted library allocation
page read and write
213CBBB9000
trusted library allocation
page read and write
7FFAAC5F6000
trusted library allocation
page execute and read and write
213C9630000
unkown
page readonly
213CBA3A000
trusted library allocation
page read and write
73C3D000
unkown
page read and write
213CBAFC000
trusted library allocation
page read and write
2EDE000
stack
page read and write
213CBB14000
trusted library allocation
page read and write
7340000
trusted library allocation
page read and write
5921000
trusted library allocation
page read and write
151B000
heap
page read and write
213C9873000
trusted library allocation
page read and write
213CBB8C000
trusted library allocation
page read and write
32C9000
trusted library allocation
page read and write
213DB754000
trusted library allocation
page read and write
5950000
trusted library allocation
page read and write
213CBBA0000
trusted library allocation
page read and write
6BDD000
stack
page read and write
213CBB6F000
trusted library allocation
page read and write
213CBA95000
trusted library allocation
page read and write
213CBBB5000
trusted library allocation
page read and write
7FF423D30000
trusted library allocation
page execute and read and write
213CB9FD000
trusted library allocation
page read and write
213CBB00000
trusted library allocation
page read and write
7FFAAC510000
trusted library allocation
page read and write
7FFB167B5000
unkown
page readonly
8482000
heap
page read and write
15F7000
heap
page read and write
213E35F0000
trusted library allocation
page read and write
6FEE000
stack
page read and write
1137000
stack
page read and write
213CBB94000
trusted library allocation
page read and write
213CBA3E000
trusted library allocation
page read and write
213CBADB000
trusted library allocation
page read and write
213DB5C8000
trusted library allocation
page read and write
5F20000
trusted library allocation
page read and write
213CBA09000
trusted library allocation
page read and write
213C989C000
heap
page read and write
702E000
stack
page read and write
73A0000
trusted library allocation
page read and write
6B40000
trusted library allocation
page read and write
7E4E000
stack
page read and write
5B0D000
stack
page read and write
7FFAAC530000
trusted library allocation
page read and write
213CBB62000
trusted library allocation
page read and write
59F0000
trusted library allocation
page execute and read and write
213C9646000
unkown
page readonly
213CBAE7000
trusted library allocation
page read and write
1580000
trusted library allocation
page read and write
6B3A000
trusted library allocation
page read and write
3343000
trusted library allocation
page read and write
419E000
trusted library allocation
page read and write
7E8E000
stack
page read and write
3170000
heap
page execute and read and write
213CBB31000
trusted library allocation
page read and write
7FFAAC710000
trusted library allocation
page execute and read and write
213CBB87000
trusted library allocation
page read and write
6913000
heap
page read and write
8470000
heap
page read and write
156E000
stack
page read and write
7FFAAC6EF000
trusted library allocation
page read and write
7B26000
heap
page read and write
213C98D1000
heap
page read and write
15B0000
trusted library allocation
page read and write
7A0E000
stack
page read and write
7FFAAC514000
trusted library allocation
page read and write
213CB540000
trusted library section
page read and write
FB891FF000
stack
page read and write
213CB9E0000
trusted library allocation
page read and write
16FE000
stack
page read and write
213CBB6B000
trusted library allocation
page read and write
2EE8000
trusted library allocation
page read and write
73C0000
trusted library allocation
page execute and read and write
57CE000
stack
page read and write
213CBAF8000
trusted library allocation
page read and write
6925000
heap
page read and write
7FFAAC520000
trusted library allocation
page read and write
5A00000
trusted library allocation
page read and write
4292000
trusted library allocation
page read and write
213CB9E4000
trusted library allocation
page read and write
213CBB10000
trusted library allocation
page read and write
6B50000
trusted library allocation
page read and write
7058000
trusted library allocation
page read and write
213CB3B9000
heap
page read and write
41A2000
trusted library allocation
page read and write
213CBA43000
trusted library allocation
page read and write
213CBB67000
trusted library allocation
page read and write
213DB7B1000
trusted library allocation
page read and write
213CBB44000
trusted library allocation
page read and write
6B3F000
trusted library allocation
page read and write
213CBA91000
trusted library allocation
page read and write
674E000
stack
page read and write
7320000
trusted library allocation
page read and write
84EA000
heap
page read and write
5A80000
trusted library allocation
page read and write
213CBA68000
trusted library allocation
page read and write
213DBF74000
trusted library allocation
page read and write
213CBA70000
trusted library allocation
page read and write
213CBB08000
trusted library allocation
page read and write
1438000
heap
page read and write
697B000
heap
page read and write
213CBB56000
trusted library allocation
page read and write
213CBAEB000
trusted library allocation
page read and write
213CBAB0000
trusted library allocation
page read and write
15E0000
trusted library allocation
page execute and read and write
4338000
trusted library allocation
page read and write
6CBE000
stack
page read and write
213C99E0000
heap
page read and write
213DBA86000
trusted library allocation
page read and write
213E3F40000
heap
page read and write
4380000
trusted library allocation
page read and write
32CF000
trusted library allocation
page read and write
7300000
trusted library allocation
page read and write
7280000
trusted library allocation
page read and write
32D1000
trusted library allocation
page read and write
84AB000
heap
page read and write
5B50000
trusted library allocation
page execute and read and write
213C9A00000
heap
page read and write
7062000
trusted library allocation
page read and write
213CBB98000
trusted library allocation
page read and write
213CBACA000
trusted library allocation
page read and write
7065000
trusted library allocation
page read and write
213CBAD5000
trusted library allocation
page read and write
213C9860000
trusted library allocation
page read and write
329F000
trusted library allocation
page read and write
213C9840000
trusted library allocation
page read and write
6B55000
trusted library allocation
page read and write
213CBA0D000
trusted library allocation
page read and write
213CBB29000
trusted library allocation
page read and write
6B35000
trusted library allocation
page read and write
213C98FC000
heap
page read and write
5EFE000
stack
page read and write
6CD0000
trusted library allocation
page read and write
5A20000
trusted library allocation
page execute and read and write
56CE000
stack
page read and write
7FFAAC53B000
trusted library allocation
page execute and read and write
580E000
stack
page read and write
1499000
heap
page read and write
6A00000
trusted library allocation
page execute and read and write
321D000
trusted library allocation
page read and write
5AC0000
trusted library allocation
page execute and read and write
213CBAC6000
trusted library allocation
page read and write
696E000
heap
page read and write
528D000
stack
page read and write
72A0000
trusted library allocation
page execute and read and write
722B000
stack
page read and write
213CBA63000
trusted library allocation
page read and write
7FFAAC720000
trusted library allocation
page read and write
213CBA74000
trusted library allocation
page read and write
3327000
trusted library allocation
page read and write
30DC000
stack
page read and write
213CBB18000
trusted library allocation
page read and write
213CBB39000
trusted library allocation
page read and write
7C10000
heap
page read and write
213C9905000
heap
page read and write
15A2000
trusted library allocation
page read and write
69A2000
trusted library allocation
page read and write
32BB000
trusted library allocation
page read and write
688E000
stack
page read and write
213DB7C5000
trusted library allocation
page read and write
213DB5D8000
trusted library allocation
page read and write
429C000
trusted library allocation
page read and write
213CBB2D000
trusted library allocation
page read and write
309F000
stack
page read and write
213CBA26000
trusted library allocation
page read and write
213DC17A000
trusted library allocation
page read and write
595A000
trusted library allocation
page read and write
213CBAA9000
trusted library allocation
page read and write
344C000
trusted library allocation
page read and write
213DBCF4000
trusted library allocation
page read and write
6967000
heap
page read and write
6B15000
trusted library allocation
page read and write
849F000
heap
page read and write
5941000
trusted library allocation
page read and write
213CBA6C000
trusted library allocation
page read and write
213CBBA8000
trusted library allocation
page read and write
7FFAAC5C6000
trusted library allocation
page read and write
848F000
heap
page read and write
437A000
trusted library allocation
page read and write
1467000
heap
page read and write
7F460000
trusted library allocation
page execute and read and write
213CB9EC000
trusted library allocation
page read and write
213DBD85000
trusted library allocation
page read and write
7357000
trusted library allocation
page read and write
213CBA5B000
trusted library allocation
page read and write
7FFAAC522000
trusted library allocation
page read and write
3744000
trusted library allocation
page read and write
213CBAF3000
trusted library allocation
page read and write
7FFAAC6F0000
trusted library allocation
page read and write
5C6B000
trusted library allocation
page read and write
213CBB90000
trusted library allocation
page read and write
6B70000
heap
page execute and read and write
7B10000
heap
page read and write
213CBB46000
trusted library allocation
page read and write
213CBA9D000
trusted library allocation
page read and write
460C000
trusted library allocation
page read and write
42A2000
trusted library allocation
page read and write
848A000
heap
page read and write
6C70000
heap
page read and write
11A0000
heap
page read and write
There are 498 hidden memdumps, click here to show them.