IOC Report
8ZVd2S51fr.exe

loading gif

Files

File Path
Type
Category
Malicious
8ZVd2S51fr.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\8ZVd2S51fr.exe.log
ASCII text, with CRLF line terminators
dropped
malicious
C:\Users\user\AppData\Local\Temp\tmp1799.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 25, cookie 0xe, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\tmp179A.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 25, cookie 0xe, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\tmp17AB.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 8, database pages 89, cookie 0x36, schema 4, UTF-8, version-valid-for 8
dropped
C:\Users\user\AppData\Local\Temp\tmp17BB.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 8, database pages 89, cookie 0x36, schema 4, UTF-8, version-valid-for 8
dropped
C:\Users\user\AppData\Local\Temp\tmp17CC.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 8, database pages 89, cookie 0x36, schema 4, UTF-8, version-valid-for 8
dropped
C:\Users\user\AppData\Local\Temp\tmp17CD.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 8, database pages 89, cookie 0x36, schema 4, UTF-8, version-valid-for 8
dropped
C:\Users\user\AppData\Local\Temp\tmp17DD.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 8, database pages 89, cookie 0x36, schema 4, UTF-8, version-valid-for 8
dropped
C:\Users\user\AppData\Local\Temp\tmp17EE.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 8, database pages 89, cookie 0x36, schema 4, UTF-8, version-valid-for 8
dropped
C:\Users\user\AppData\Local\Temp\tmp17FF.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 8, database pages 89, cookie 0x36, schema 4, UTF-8, version-valid-for 8
dropped
C:\Users\user\AppData\Local\Temp\tmp180F.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 8, database pages 89, cookie 0x36, schema 4, UTF-8, version-valid-for 8
dropped
C:\Users\user\AppData\Local\Temp\tmp1810.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 8, database pages 89, cookie 0x36, schema 4, UTF-8, version-valid-for 8
dropped
C:\Users\user\AppData\Local\Temp\tmp2FC0.tmp
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\tmp2FC1.tmp
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\tmp2FC2.tmp
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\tmp2FD3.tmp
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\tmp2FD4.tmp
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\tmp2FD5.tmp
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\tmp2FF2.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\tmp3002.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\tmp3013.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\tmp5086.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 8, database pages 89, cookie 0x36, schema 4, UTF-8, version-valid-for 8
dropped
C:\Users\user\AppData\Local\Temp\tmp5097.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 8, database pages 89, cookie 0x36, schema 4, UTF-8, version-valid-for 8
dropped
C:\Users\user\AppData\Local\Temp\tmp5098.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 8, database pages 89, cookie 0x36, schema 4, UTF-8, version-valid-for 8
dropped
C:\Users\user\AppData\Local\Temp\tmp50B8.tmp
SQLite 3.x database, user version 12, last written using SQLite version 3042000, page size 32768, writer version 2, read version 2, file counter 3, database pages 3, cookie 0x1, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\tmp50B9.tmp
SQLite 3.x database, user version 12, last written using SQLite version 3042000, page size 32768, writer version 2, read version 2, file counter 3, database pages 3, cookie 0x1, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\tmp6A4E.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\tmp6A5F.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\tmp6A60.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\tmp6A70.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\tmp6A81.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\tmp6A92.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\tmp6AA2.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\tmpA480.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\tmpA481.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\tmpA4A1.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\tmpA4B2.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\tmpA4C2.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\tmpDE52.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\tmpDE62.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\tmpDE63.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\tmpDE93.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 25, cookie 0xe, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\tmpDEA4.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 25, cookie 0xe, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\tmpDEA5.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 25, cookie 0xe, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\tmpDEA6.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 25, cookie 0xe, schema 4, UTF-8, version-valid-for 1
dropped
There are 36 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\8ZVd2S51fr.exe
"C:\Users\user\Desktop\8ZVd2S51fr.exe"
malicious
C:\Users\user\Desktop\8ZVd2S51fr.exe
"C:\Users\user\Desktop\8ZVd2S51fr.exe"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1

URLs

Name
IP
Malicious
http://185.222.58.241:55615/
185.222.58.241
malicious
185.222.58.241:55615
malicious
https://ipinfo.io/ip%appdata%
unknown
https://duckduckgo.com/chrome_newtab
unknown
http://185.222.58.241:55615
unknown
https://duckduckgo.com/ac/?q=
unknown
https://www.google.com/images/branding/product/ico/googleg_lodp.ico
unknown
http://schemas.xmlsoap.org/ws/2004/08/addressing/role/anonymous
unknown
http://tempuri.org/Endpoint/CheckConnectResponse
unknown
http://schemas.datacontract.org/2004/07/
unknown
http://schemas.xmlsoap.org/ws/2004/08/addressing/faultX
unknown
http://tempuri.org/Endpoint/EnvironmentSettings
unknown
https://api.ip.sb/geoip%USERPEnvironmentROFILE%
unknown
http://tempuri.org/ianiDataSet2.xsdM
unknown
http://schemas.xmlsoap.org/soap/envelope/
unknown
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
unknown
http://tempuri.org/
unknown
http://tempuri.org/Endpoint/CheckConnect
unknown
https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
unknown
https://www.ecosia.org/newtab/
unknown
http://tempuri.org/Endpoint/VerifyUpdateResponse
unknown
http://tempuri.org/Endpoint/SetEnvironment
unknown
http://tempuri.org/Endpoint/SetEnvironmentResponse
unknown
http://tempuri.org/ianiDataSet.xsd
unknown
http://tempuri.org/Endpoint/GetUpdates
unknown
https://ac.ecosia.org/autocomplete?q=
unknown
http://tempuri.org/ianiDataSet1.xsd
unknown
https://api.ipify.orgcookies//settinString.Removeg
unknown
http://schemas.xmlsoap.org/ws/2004/08/addressing
unknown
http://tempuri.org/Endpoint/GetUpdatesResponse
unknown
https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
unknown
http://tempuri.org/Endpoint/EnvironmentSettingsResponse
unknown
http://tempuri.org/Endpoint/VerifyUpdate
unknown
http://tempuri.org/0
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
unknown
http://schemas.xmlsoap.org/soap/actor/next
unknown
There are 27 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
api.ip.sb
unknown

IPs

IP
Domain
Country
Malicious
185.222.58.241
unknown
Netherlands
malicious

Registry

Path
Value
Malicious
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\8ZVd2S51fr_RASAPI32
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\8ZVd2S51fr_RASAPI32
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\8ZVd2S51fr_RASAPI32
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\8ZVd2S51fr_RASAPI32
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\8ZVd2S51fr_RASAPI32
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\8ZVd2S51fr_RASAPI32
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\8ZVd2S51fr_RASAPI32
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\8ZVd2S51fr_RASMANCS
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\8ZVd2S51fr_RASMANCS
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\8ZVd2S51fr_RASMANCS
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\8ZVd2S51fr_RASMANCS
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\8ZVd2S51fr_RASMANCS
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\8ZVd2S51fr_RASMANCS
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\8ZVd2S51fr_RASMANCS
FileDirectory
There are 5 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
374F000
trusted library allocation
page read and write
malicious
384A000
trusted library allocation
page read and write
malicious
402000
remote allocation
page execute and read and write
malicious
7DF0000
trusted library allocation
page read and write
99BF000
stack
page read and write
56FE000
stack
page read and write
1134000
heap
page read and write
892000
trusted library allocation
page read and write
390000
heap
page read and write
3284000
trusted library allocation
page read and write
2576000
trusted library allocation
page read and write
67BC000
heap
page read and write
7080000
heap
page read and write
6A54000
trusted library allocation
page read and write
71AF000
trusted library allocation
page read and write
5980000
trusted library allocation
page read and write
7842000
heap
page read and write
690E000
stack
page read and write
40A5000
trusted library allocation
page read and write
88A000
trusted library allocation
page execute and read and write
6D20000
trusted library allocation
page read and write
6CDE000
stack
page read and write
A20000
heap
page read and write
71E4000
trusted library allocation
page read and write
A2A000
heap
page read and write
A00000
heap
page read and write
3F9E000
trusted library allocation
page read and write
6ADD000
stack
page read and write
71FD000
trusted library allocation
page read and write
2571000
trusted library allocation
page read and write
4B40000
trusted library allocation
page execute and read and write
24F0000
trusted library allocation
page read and write
5E0D000
stack
page read and write
400000
remote allocation
page execute and read and write
1382000
trusted library allocation
page read and write
6E42000
trusted library allocation
page read and write
9C3E000
stack
page read and write
408F000
trusted library allocation
page read and write
387A000
trusted library allocation
page read and write
1640000
heap
page read and write
850000
trusted library allocation
page read and write
409C000
trusted library allocation
page read and write
A54000
heap
page read and write
2E60000
trusted library allocation
page read and write
9EBE000
stack
page read and write
68C0000
trusted library allocation
page execute and read and write
71A6000
trusted library allocation
page read and write
7855000
heap
page read and write
6889000
heap
page read and write
7210000
trusted library allocation
page read and write
72E0000
trusted library allocation
page read and write
880000
trusted library allocation
page read and write
26A1000
trusted library allocation
page read and write
15E0000
trusted library allocation
page read and write
6A3A000
trusted library allocation
page read and write
32A000
stack
page read and write
DEE000
stack
page read and write
7E10000
trusted library allocation
page read and write
6970000
trusted library allocation
page read and write
9D80000
heap
page read and write
59AD000
trusted library allocation
page read and write
7DD0000
trusted library allocation
page read and write
5891000
trusted library allocation
page read and write
7288000
trusted library allocation
page read and write
13B0000
trusted library allocation
page read and write
7280000
trusted library allocation
page read and write
789D000
heap
page read and write
686A000
heap
page read and write
5650000
heap
page read and write
1386000
trusted library allocation
page execute and read and write
71A2000
trusted library allocation
page read and write
586E000
trusted library allocation
page read and write
1647000
heap
page read and write
7DE0000
trusted library allocation
page execute and read and write
6B80000
trusted library allocation
page execute and read and write
7C40000
heap
page read and write
583F000
stack
page read and write
2520000
trusted library allocation
page read and write
6A45000
trusted library allocation
page read and write
3F91000
trusted library allocation
page read and write
8B0000
heap
page read and write
7090000
heap
page read and write
873000
trusted library allocation
page read and write
71F0000
trusted library allocation
page read and write
4B32000
trusted library allocation
page read and write
A3F000
heap
page read and write
7E22000
heap
page read and write
86D000
trusted library allocation
page execute and read and write
7DC0000
trusted library allocation
page execute and read and write
163E000
stack
page read and write
864000
trusted library allocation
page read and write
1149000
heap
page read and write
54EE000
stack
page read and write
2E80000
heap
page read and write
4FE0000
trusted library allocation
page execute and read and write
2590000
heap
page read and write
5E50000
trusted library allocation
page read and write
1110000
trusted library allocation
page read and write
59B0000
trusted library allocation
page read and write
684A000
heap
page read and write
3406000
trusted library allocation
page read and write
1390000
trusted library allocation
page read and write
727C000
stack
page read and write
2E6A000
trusted library allocation
page read and write
1D0000
unkown
page readonly
7200000
trusted library allocation
page read and write
9D0000
trusted library allocation
page execute and read and write
7891000
heap
page read and write
4B20000
heap
page read and write
5670000
heap
page read and write
6EFE000
stack
page read and write
7DBB000
trusted library allocation
page read and write
256E000
trusted library allocation
page read and write
6865000
heap
page read and write
6A22000
trusted library allocation
page read and write
2E64000
trusted library allocation
page read and write
886000
trusted library allocation
page execute and read and write
71C6000
trusted library allocation
page read and write
584B000
trusted library allocation
page read and write
5A60000
trusted library allocation
page execute and read and write
132E000
stack
page read and write
6B40000
trusted library allocation
page read and write
6882000
heap
page read and write
7F6E000
stack
page read and write
40A8000
trusted library allocation
page read and write
1100000
trusted library allocation
page read and write
9C0000
trusted library allocation
page read and write
5080000
heap
page read and write
55FF000
stack
page read and write
5871000
trusted library allocation
page read and write
6D10000
trusted library allocation
page execute and read and write
2E30000
trusted library allocation
page read and write
5B6F000
stack
page read and write
6A65000
trusted library allocation
page read and write
2E40000
heap
page read and write
71D2000
trusted library allocation
page read and write
4FAD000
stack
page read and write
6D00000
trusted library allocation
page read and write
1370000
trusted library allocation
page read and write
13C7000
heap
page read and write
6A29000
trusted library allocation
page read and write
7F20000
trusted library allocation
page read and write
67A0000
heap
page read and write
6BDE000
stack
page read and write
1380000
trusted library allocation
page read and write
5900000
trusted library allocation
page execute and read and write
7820000
heap
page read and write
685F000
heap
page read and write
4413000
trusted library allocation
page read and write
14CE000
stack
page read and write
6960000
trusted library allocation
page execute and read and write
40F0000
trusted library allocation
page read and write
5930000
trusted library allocation
page execute and read and write
68B2000
trusted library allocation
page read and write
7DB0000
trusted library allocation
page read and write
897000
trusted library allocation
page execute and read and write
5862000
trusted library allocation
page read and write
69BE000
stack
page read and write
71C8000
trusted library allocation
page read and write
7D70000
trusted library allocation
page read and write
257D000
trusted library allocation
page read and write
9F0000
trusted library allocation
page read and write
4FB0000
heap
page read and write
6854000
heap
page read and write
1113000
trusted library allocation
page execute and read and write
7190000
heap
page read and write
71BE000
trusted library allocation
page read and write
4068000
trusted library allocation
page read and write
269E000
stack
page read and write
7F80000
trusted library allocation
page execute and read and write
5B7E000
trusted library allocation
page read and write
DA0000
heap
page read and write
5851000
trusted library allocation
page read and write
136E000
stack
page read and write
9BF000
stack
page read and write
58C0000
trusted library allocation
page read and write
406E000
trusted library allocation
page read and write
6B90000
trusted library allocation
page read and write
3A0000
heap
page read and write
9E0000
trusted library allocation
page read and write
7887000
heap
page read and write
5640000
heap
page read and write
A2E000
heap
page read and write
78C2000
heap
page read and write
72BE000
stack
page read and write
68B0000
trusted library allocation
page read and write
15D0000
trusted library allocation
page execute and read and write
9AFE000
stack
page read and write
13C0000
heap
page read and write
4B50000
trusted library allocation
page read and write
9C7D000
stack
page read and write
2550000
trusted library allocation
page read and write
860000
trusted library allocation
page read and write
71A4000
trusted library allocation
page read and write
1395000
trusted library allocation
page execute and read and write
6A38000
trusted library allocation
page read and write
C1F000
stack
page read and write
71E0000
trusted library allocation
page read and write
7897000
heap
page read and write
7D80000
trusted library allocation
page execute and read and write
71B8000
trusted library allocation
page read and write
685A000
heap
page read and write
87D000
trusted library allocation
page execute and read and write
7D60000
trusted library allocation
page read and write
5880000
trusted library allocation
page read and write
479B000
stack
page read and write
6829000
heap
page read and write
80E000
stack
page read and write
573E000
stack
page read and write
6F3E000
stack
page read and write
137D000
trusted library allocation
page execute and read and write
255B000
trusted library allocation
page read and write
4D10000
trusted library allocation
page read and write
58D0000
trusted library allocation
page read and write
36A1000
trusted library allocation
page read and write
7E37000
heap
page read and write
278F000
trusted library allocation
page read and write
A63000
heap
page read and write
1D2000
unkown
page readonly
7220000
trusted library section
page read and write
8B5000
heap
page read and write
71C1000
trusted library allocation
page read and write
2543000
heap
page read and write
58B0000
trusted library allocation
page read and write
6950000
trusted library allocation
page read and write
6CF0000
trusted library allocation
page read and write
71D5000
trusted library allocation
page read and write
5B70000
trusted library allocation
page read and write
6A4A000
trusted library allocation
page read and write
DD0000
heap
page read and write
DD5000
heap
page read and write
67B0000
heap
page read and write
5910000
trusted library allocation
page read and write
870000
trusted library allocation
page read and write
59AA000
trusted library allocation
page read and write
5856000
trusted library allocation
page read and write
6840000
trusted library section
page read and write
5A1E000
stack
page read and write
2540000
heap
page read and write
6850000
heap
page read and write
139B000
trusted library allocation
page execute and read and write
24EB000
stack
page read and write
DF0000
heap
page read and write
6A4F000
trusted library allocation
page read and write
6A50000
trusted library allocation
page read and write
7F70000
heap
page read and write
6890000
heap
page read and write
6871000
heap
page read and write
6A60000
trusted library allocation
page read and write
54AE000
stack
page read and write
4AE0000
trusted library allocation
page read and write
111D000
trusted library allocation
page execute and read and write
15CF000
stack
page read and write
5B7B000
trusted library allocation
page read and write
3FA2000
trusted library allocation
page read and write
9D7D000
stack
page read and write
5A5E000
stack
page read and write
4D6B000
stack
page read and write
6ABE000
stack
page read and write
512D000
stack
page read and write
40B3000
trusted library allocation
page read and write
4132000
trusted library allocation
page read and write
40AB000
trusted library allocation
page read and write
4B60000
heap
page execute and read and write
409F000
trusted library allocation
page read and write
6A70000
trusted library allocation
page read and write
67E2000
heap
page read and write
1156000
heap
page read and write
73BE000
stack
page read and write
1397000
trusted library allocation
page execute and read and write
34D3000
trusted library allocation
page read and write
113E000
heap
page read and write
9FBE000
stack
page read and write
677E000
stack
page read and write
89B000
trusted library allocation
page execute and read and write
810000
heap
page read and write
5E4E000
stack
page read and write
6EBE000
stack
page read and write
667F000
stack
page read and write
7C50000
heap
page read and write
6A20000
trusted library allocation
page read and write
350F000
trusted library allocation
page read and write
657F000
stack
page read and write
782C000
heap
page read and write
863000
trusted library allocation
page execute and read and write
1128000
heap
page read and write
164B000
heap
page read and write
DB0000
heap
page read and write
78B3000
heap
page read and write
4313000
trusted library allocation
page read and write
40AD000
trusted library allocation
page read and write
6A1F000
stack
page read and write
4F98000
trusted library allocation
page read and write
2515000
trusted library allocation
page read and write
6A3F000
trusted library allocation
page read and write
B11000
heap
page read and write
2F91000
trusted library allocation
page read and write
787C000
heap
page read and write
6740000
heap
page read and write
2F8E000
stack
page read and write
15F0000
heap
page execute and read and write
4FC0000
heap
page read and write
4B30000
trusted library allocation
page read and write
71AC000
trusted library allocation
page read and write
4095000
trusted library allocation
page read and write
5085000
heap
page read and write
7E20000
heap
page read and write
3279000
trusted library allocation
page read and write
36A9000
trusted library allocation
page read and write
680B000
heap
page read and write
7290000
trusted library allocation
page execute and read and write
9B3E000
stack
page read and write
DF7000
heap
page read and write
40C0000
trusted library allocation
page read and write
4072000
trusted library allocation
page read and write
7FAC0000
trusted library allocation
page execute and read and write
A57000
heap
page read and write
2E2C000
stack
page read and write
59D0000
trusted library allocation
page execute and read and write
4E00000
heap
page read and write
A10000
trusted library allocation
page read and write
6A62000
trusted library allocation
page read and write
6F7000
stack
page read and write
3EE000
stack
page read and write
6818000
heap
page read and write
ADA000
heap
page read and write
687E000
heap
page read and write
10F8000
stack
page read and write
867D000
stack
page read and write
2E70000
trusted library allocation
page read and write
4D70000
trusted library section
page readonly
4065000
trusted library allocation
page read and write
2500000
heap
page execute and read and write
5840000
trusted library allocation
page read and write
1120000
heap
page read and write
5920000
trusted library allocation
page read and write
6910000
trusted library allocation
page execute and read and write
A0FE000
stack
page read and write
783E000
heap
page read and write
71CD000
trusted library allocation
page read and write
1392000
trusted library allocation
page read and write
D3B000
stack
page read and write
707E000
stack
page read and write
2418000
trusted library allocation
page read and write
1114000
trusted library allocation
page read and write
54F0000
heap
page execute and read and write
6F7E000
stack
page read and write
99FE000
stack
page read and write
9FFE000
stack
page read and write
4063000
trusted library allocation
page read and write
7E00000
trusted library allocation
page execute and read and write
71B4000
trusted library allocation
page read and write
59C0000
trusted library allocation
page read and write
28D2000
trusted library allocation
page read and write
7C3E000
stack
page read and write
6A25000
trusted library allocation
page read and write
5990000
trusted library allocation
page read and write
2510000
trusted library allocation
page read and write
6B1F000
stack
page read and write
There are 349 hidden memdumps, click here to show them.