IOC Report
file.exe

loading gif

Files

File Path
Type
Category
Malicious
file.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Local\CyberSphere Dynamics\M
data
dropped
malicious
C:\Users\user\AppData\Local\CyberSphere Dynamics\ZeusChat.js
ASCII text, with no line terminators
dropped
malicious
C:\Users\user\AppData\Local\CyberSphere Dynamics\ZeusChat.scr
PE32+ executable (GUI) x86-64, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\29442\Reynolds.com
PE32+ executable (GUI) x86-64, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\29442\l
data
dropped
malicious
C:\Users\user\AppData\Local\Temp\Actual
data
dropped
malicious
C:\Users\user\AppData\Local\Temp\Ai
data
dropped
malicious
C:\Users\user\AppData\Local\Temp\Americans
data
dropped
malicious
C:\Users\user\AppData\Local\Temp\Biodiversity
data
dropped
malicious
C:\Users\user\AppData\Local\Temp\Blvd
data
dropped
malicious
C:\Users\user\AppData\Local\Temp\Carlo
data
dropped
malicious
C:\Users\user\AppData\Local\Temp\Chan
data
dropped
malicious
C:\Users\user\AppData\Local\Temp\Dealing
data
dropped
malicious
C:\Users\user\AppData\Local\Temp\Def
data
dropped
malicious
C:\Users\user\AppData\Local\Temp\Delaware
data
dropped
malicious
C:\Users\user\AppData\Local\Temp\Drums
data
dropped
malicious
C:\Users\user\AppData\Local\Temp\Eagle
data
dropped
malicious
C:\Users\user\AppData\Local\Temp\Ebooks
data
dropped
malicious
C:\Users\user\AppData\Local\Temp\Elliott
data
dropped
malicious
C:\Users\user\AppData\Local\Temp\Eugene
data
dropped
malicious
C:\Users\user\AppData\Local\Temp\Exempt
data
dropped
malicious
C:\Users\user\AppData\Local\Temp\Exhibits
data
dropped
malicious
C:\Users\user\AppData\Local\Temp\Expert
data
dropped
malicious
C:\Users\user\AppData\Local\Temp\Games
data
dropped
malicious
C:\Users\user\AppData\Local\Temp\Guy
DOS executable (COM)
dropped
malicious
C:\Users\user\AppData\Local\Temp\Holdem
data
dropped
malicious
C:\Users\user\AppData\Local\Temp\Hotel
data
dropped
malicious
C:\Users\user\AppData\Local\Temp\Households
data
dropped
malicious
C:\Users\user\AppData\Local\Temp\Individuals
data
dropped
malicious
C:\Users\user\AppData\Local\Temp\Innocent
OpenPGP Public Key
dropped
malicious
C:\Users\user\AppData\Local\Temp\Jpg
OpenPGP Public Key
dropped
malicious
C:\Users\user\AppData\Local\Temp\Jungle
data
dropped
malicious
C:\Users\user\AppData\Local\Temp\Lambda
data
dropped
malicious
C:\Users\user\AppData\Local\Temp\Landscape
data
dropped
malicious
C:\Users\user\AppData\Local\Temp\Matching
data
dropped
malicious
C:\Users\user\AppData\Local\Temp\Nervous
data
dropped
malicious
C:\Users\user\AppData\Local\Temp\Norway
data
dropped
malicious
C:\Users\user\AppData\Local\Temp\Odds
data
dropped
malicious
C:\Users\user\AppData\Local\Temp\Peeing
data
dropped
malicious
C:\Users\user\AppData\Local\Temp\Psychiatry
data
dropped
malicious
C:\Users\user\AppData\Local\Temp\Resolutions
data
dropped
malicious
C:\Users\user\AppData\Local\Temp\Result
data
dropped
malicious
C:\Users\user\AppData\Local\Temp\Rid
data
dropped
malicious
C:\Users\user\AppData\Local\Temp\Same
data
dropped
malicious
C:\Users\user\AppData\Local\Temp\Satin
data
dropped
malicious
C:\Users\user\AppData\Local\Temp\Seafood
data
dropped
malicious
C:\Users\user\AppData\Local\Temp\Smithsonian
data
dropped
malicious
C:\Users\user\AppData\Local\Temp\Sucking
OpenPGP Secret Key
dropped
malicious
C:\Users\user\AppData\Local\Temp\Through
data
dropped
malicious
C:\Users\user\AppData\Local\Temp\Tm
data
dropped
malicious
C:\Users\user\AppData\Local\Temp\Turns
data
dropped
malicious
C:\Users\user\AppData\Local\Temp\Typical
data
dropped
malicious
C:\Users\user\AppData\Local\Temp\Wendy
data
dropped
malicious
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\ZeusChat.url
MS Windows 95 Internet shortcut text (URL=<"C:\Users\user\AppData\Local\CyberSphere Dynamics\ZeusChat.js" >), ASCII text, with CRLF line terminators
dropped
malicious
C:\Users\user\AppData\Local\Temp\Bukkake
ASCII text, with very long lines (5406), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\Bukkake.cmd
ASCII text, with very long lines (5406), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\Realized
data
dropped
C:\Users\user\AppData\Local\Temp\Tech
PE32+ executable (GUI) x86-64, for MS Windows
dropped
There are 49 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\file.exe
"C:\Users\user\Desktop\file.exe"
malicious
C:\Windows\SysWOW64\cmd.exe
"C:\Windows\System32\cmd.exe" /c copy Bukkake Bukkake.cmd && Bukkake.cmd
malicious
C:\Windows\SysWOW64\findstr.exe
findstr /I "wrsa opssvc"
malicious
C:\Windows\SysWOW64\findstr.exe
findstr "AvastUI AVGUI bdservicehost nsWscSvc ekrn SophosHealth"
malicious
C:\Windows\SysWOW64\cmd.exe
cmd /c md 29442
malicious
C:\Windows\SysWOW64\cmd.exe
cmd /c copy /b ..\Wendy + ..\Psychiatry + ..\Rid + ..\Games + ..\Norway + ..\Matching + ..\Jungle + ..\Elliott + ..\Jpg + ..\Americans + ..\Exhibits + ..\Peeing + ..\Typical + ..\Innocent + ..\Seafood + ..\Nervous + ..\Households + ..\Ai + ..\Hotel + ..\Holdem + ..\Drums + ..\Carlo + ..\Tm + ..\Landscape + ..\Resolutions + ..\Def + ..\Lambda + ..\Biodiversity + ..\Odds + ..\Smithsonian + ..\Blvd + ..\Actual + ..\Guy + ..\Expert + ..\Delaware + ..\Eagle + ..\Eugene + ..\Exempt + ..\Same + ..\Ebooks + ..\Individuals + ..\Sucking + ..\Chan + ..\Turns + ..\Satin + ..\Dealing + ..\Result + ..\Through + ..\Realized l
malicious
C:\Users\user\AppData\Local\Temp\29442\Reynolds.com
Reynolds.com l
malicious
C:\Windows\System32\cmd.exe
cmd /k echo [InternetShortcut] > "C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\ZeusChat.url" & echo URL="C:\Users\user\AppData\Local\CyberSphere Dynamics\ZeusChat.js" >> "C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\ZeusChat.url" & exit
malicious
C:\Windows\System32\wscript.exe
"C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Local\CyberSphere Dynamics\ZeusChat.js"
malicious
C:\Users\user\AppData\Local\CyberSphere Dynamics\ZeusChat.scr
"C:\Users\user\AppData\Local\CyberSphere Dynamics\ZeusChat.scr" "C:\Users\user\AppData\Local\CyberSphere Dynamics\M"
malicious
C:\Users\user\AppData\Local\Temp\29442\Reynolds.com
C:\Users\user\AppData\Local\Temp\29442\Reynolds.com
malicious
C:\Windows\explorer.exe
explorer.exe
malicious
C:\Users\user\AppData\Local\CyberSphere Dynamics\ZeusChat.scr
"C:\Users\user\AppData\Local\CyberSphere Dynamics\ZeusChat.scr"
malicious
C:\Users\user\AppData\Local\CyberSphere Dynamics\ZeusChat.scr
"C:\Users\user\AppData\Local\CyberSphere Dynamics\ZeusChat.scr"
malicious
C:\Windows\explorer.exe
explorer.exe
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\tasklist.exe
tasklist
C:\Windows\SysWOW64\tasklist.exe
tasklist
C:\Windows\SysWOW64\choice.exe
choice /d y /t 5
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
There are 12 hidden processes, click here to show them.

URLs

Name
IP
Malicious
https://www.virustotal.com/en/search/?query=
unknown
http://ocsp.entrust.net03
unknown
http://ocsp.entrust.net02
unknown
http://ocsp.cloudflare.com/origin_ca0
unknown
http://www.entrust.net/rpa03
unknown
http://crl.cloudflare.com/origin_ca.crl
unknown
http://aia.entrust.net/ts1-chain256.cer01
unknown
http://crl.cloudflare.com/origin_ca.crl0
unknown
http://ocsp.cloudflare.com/origin_ca
unknown
http://www.autoitscript.com/autoit3/X
unknown
http://nsis.sf.net/NSIS_ErrorError
unknown
http://www.autoitscript.com/autoit3/
unknown
https://github.com/horsicq/DIE-engine
unknown
http://crl.entrust.net/ts1ca.crl0
unknown
https://www.autoitscript.com/autoit3/
unknown
http://crl.entrust.net/2048ca.crl0
unknown
https://www.entrust.net/rpa0
unknown
There are 7 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
DqnJUgbSFuO.DqnJUgbSFuO
unknown
malicious
xmr-eu2.nanopool.org
163.172.171.111

IPs

IP
Domain
Country
Malicious
163.172.171.111
xmr-eu2.nanopool.org
United Kingdom

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows Script\Settings\Telemetry\wscript.exe
JScriptSetScriptStateStarted

Memdumps

Base Address
Regiontype
Protect
Malicious
140001000
unkown
page execute and read and write
malicious
FE1000
heap
page read and write
malicious
12F8000
heap
page read and write
malicious
2453CC50000
heap
page read and write
229F460F000
heap
page read and write
5BE000
stack
page read and write
1335000
heap
page read and write
1E8FB090000
heap
page read and write
13BB000
heap
page read and write
1A699F2E000
unkown
page read and write
2BF0000
heap
page read and write
2C5E000
heap
page read and write
15520000
trusted library allocation
page read and write
21FE000
stack
page read and write
1A69BEEB000
unkown
page read and write
7FF7AA1DA000
unkown
page write copy
2E0B45A0000
unkown
page read and write
2E0B45A0000
unkown
page read and write
4A70000
heap
page read and write
1A697DF0000
unkown
page read and write
2B50000
heap
page read and write
229F45F5000
heap
page read and write
2E0B6D69000
unkown
page read and write
785000
heap
page read and write
1A69ABB0000
heap
page read and write
1A697DF0000
unkown
page read and write
22FE000
stack
page read and write
2C2E000
heap
page read and write
2F60000
trusted library allocation
page read and write
29B0000
heap
page read and write
2835000
heap
page read and write
1A69BEE6000
unkown
page read and write
7FF7520EE000
unkown
page write copy
229F460F000
heap
page read and write
2E0B45A0000
trusted library allocation
page read and write
7D0F000
heap
page read and write
2916000
heap
page read and write
54B3000
heap
page read and write
2E0B28B0000
unkown
page read and write
13BF000
heap
page read and write
280E000
heap
page read and write
4A40000
heap
page read and write
1A69BEE0000
unkown
page read and write
7FF7AA1DE000
unkown
page write copy
500000
unkown
page readonly
7FF7520D8000
unkown
page readonly
2F60000
trusted library allocation
page read and write
7FF7520D8000
unkown
page readonly
2B20000
heap
page read and write
2E0B5F6F000
unkown
page read and write
140000000
unkown
page read and write
2E0B5909000
heap
page read and write
15CA0000
trusted library allocation
page read and write
14C0000
trusted library allocation
page read and write
229F4765000
heap
page read and write
14C0000
trusted library allocation
page read and write
7FF7520D8000
unkown
page readonly
BB0000
heap
page read and write
254C000
stack
page read and write
480B1FE000
stack
page read and write
7A2000
heap
page read and write
2F60000
trusted library allocation
page read and write
FC8000
heap
page read and write
2A2E000
stack
page read and write
1A697DF0000
unkown
page read and write
1CAE1F3B000
unkown
page read and write
4BFE000
stack
page read and write
2C4A000
heap
page read and write
1A69B1FF000
unkown
page read and write
2E0B5D91000
unkown
page read and write
2E0B45A0000
unkown
page read and write
14C0000
trusted library allocation
page read and write
1A69B0EF000
unkown
page read and write
14082D000
unkown
page execute and read and write
229F460C000
heap
page read and write
40C000
unkown
page read and write
91F000
stack
page read and write
4850000
heap
page read and write
2E0B5D91000
unkown
page read and write
6FB000
heap
page read and write
2310000
heap
page read and write
2E0B5909000
heap
page read and write
2E0B4DA7000
unkown
page read and write
409000
unkown
page readonly
2E0B45A0000
unkown
page read and write
1A69AF11000
unkown
page read and write
2E0B45A0000
unkown
page read and write
1A697DF0000
unkown
page read and write
4880000
heap
page read and write
1CAE1F3D000
unkown
page read and write
5492000
heap
page read and write
7FF752001000
unkown
page execute read
127B000
stack
page read and write
FE0000
heap
page read and write
1634000
heap
page read and write
2E0B28B0000
unkown
page read and write
7FF7AA1E4000
unkown
page readonly
2E0B6D6E000
unkown
page read and write
5F0F000
heap
page read and write
1E8FB190000
heap
page read and write
54CF000
heap
page read and write
2E0B60B5000
unkown
page read and write
13BF000
heap
page read and write
9A7F1FE000
unkown
page readonly
54F0000
heap
page read and write
1A699F26000
unkown
page read and write
2E0B467C000
heap
page read and write
14B0000
trusted library allocation
page read and write
2840000
heap
page read and write
25E0000
heap
page read and write
14C0000
trusted library allocation
page read and write
14D5CCC0000
heap
page read and write
7FF7520D8000
unkown
page readonly
768000
heap
page read and write
1A699F23000
unkown
page read and write
2E0B45A0000
unkown
page read and write
1A69ACBB000
heap
page read and write
2E0B5D91000
unkown
page read and write
1A699F25000
unkown
page read and write
14D5CE00000
heap
page read and write
2E0B5D91000
unkown
page read and write
46DE000
stack
page read and write
2453CD70000
heap
page read and write
2E0B5F47000
unkown
page read and write
1A697DF0000
unkown
page read and write
7FF7520EA000
unkown
page write copy
229F45A8000
heap
page read and write
1E8FB446000
heap
page read and write
ED0000
direct allocation
page execute read
1CADFEC0000
unkown
page read and write
14D5CFC0000
unkown
page read and write
2F20000
direct allocation
page execute and read and write
7FF752001000
unkown
page execute read
1CAE1C40000
unkown
page read and write
1A6979C4000
heap
page read and write
2C5D000
heap
page read and write
2F60000
trusted library allocation
page read and write
7FF7520B5000
unkown
page readonly
77C000
heap
page read and write
2E0B5D91000
unkown
page read and write
54AC000
heap
page read and write
700000
heap
page read and write
480B4FF000
stack
page read and write
2E0B603E000
unkown
page read and write
49EE000
stack
page read and write
7FF752000000
unkown
page readonly
229F45C8000
heap
page read and write
19A000
stack
page read and write
2E0B5F30000
unkown
page read and write
7FF752001000
unkown
page execute read
2BAE000
stack
page read and write
54CB000
heap
page read and write
548A000
heap
page read and write
2E0B5A21000
heap
page read and write
7FF7AA1DA000
unkown
page write copy
1A697DF0000
unkown
page read and write
1328000
heap
page read and write
C30F000
heap
page read and write
1A69B27D000
unkown
page read and write
2E0B5D91000
unkown
page read and write
229F476C000
heap
page read and write
47DE000
stack
page read and write
1CAE18F0000
heap
page read and write
9A7F2FE000
unkown
page readonly
283E000
heap
page read and write
7FF7AA1A5000
unkown
page readonly
1A69BEE4000
unkown
page read and write
2E0B5984000
heap
page read and write
1CAE1F04000
unkown
page read and write
1A697DF0000
unkown
page read and write
77F000
heap
page read and write
2C4E000
heap
page read and write
AF0F000
heap
page read and write
7FF7AA0F1000
unkown
page execute read
2840000
heap
page read and write
1A697DF0000
unkown
page read and write
1A69AF11000
unkown
page read and write
764000
heap
page read and write
2E0B5D91000
unkown
page read and write
7FF7520B5000
unkown
page readonly
2E0B6105000
unkown
page read and write
7FF7AA1E4000
unkown
page readonly
2E0B5909000
heap
page read and write
1CAE0321000
unkown
page readonly
54AC000
heap
page read and write
229F460F000
heap
page read and write
1E8FB2B0000
heap
page read and write
1A6979C2000
heap
page read and write
1A69B00A000
unkown
page read and write
2F60000
trusted library allocation
page read and write
1A69B0C3000
unkown
page read and write
2EE0000
trusted library allocation
page read and write
14C0000
trusted library allocation
page read and write
1A69ABC1000
heap
page read and write
15CA0000
trusted library allocation
page read and write
1408AE000
unkown
page execute and read and write
1A697DF0000
unkown
page read and write
229F45C1000
heap
page read and write
229F4470000
heap
page read and write
1350000
heap
page read and write
13BB000
heap
page read and write
1CAE1E1A000
unkown
page read and write
2E0B4DAD000
unkown
page read and write
2E0B5B13000
heap
page read and write
2E0B5F1F000
unkown
page read and write
24A0000
heap
page read and write
7FF752000000
unkown
page readonly
7FF7520EA000
unkown
page write copy
155FF000
heap
page read and write
1630000
heap
page read and write
2813000
heap
page read and write
15520000
trusted library allocation
page read and write
2F10000
heap
page readonly
480AB0A000
stack
page read and write
2E0B6D69000
unkown
page read and write
BD0000
heap
page read and write
870F000
heap
page read and write
1A69AF11000
unkown
page read and write
1A697DF0000
unkown
page read and write
292F000
stack
page read and write
14D5CCA7000
remote allocation
page execute and read and write
1A69B253000
unkown
page read and write
13B7000
heap
page read and write
54AC000
heap
page read and write
13BF000
heap
page read and write
43F0000
trusted library allocation
page read and write
2F40000
heap
page read and write
27BF000
stack
page read and write
72E000
heap
page read and write
69C000
stack
page read and write
768000
heap
page read and write
14C0000
trusted library allocation
page read and write
40C000
unkown
page write copy
75C000
heap
page read and write
229F45F8000
heap
page read and write
1A69B06F000
unkown
page read and write
1A69B0D5000
unkown
page read and write
1CAE1D04000
unkown
page read and write
54AB000
heap
page read and write
229F460B000
heap
page read and write
2E0B5A0A000
heap
page read and write
730F000
heap
page read and write
229F45A0000
heap
page read and write
1408B0000
unkown
page execute and read and write
2CFE000
stack
page read and write
2E0B2940000
heap
page read and write
14B0000
trusted library allocation
page read and write
2B59000
heap
page read and write
788000
heap
page read and write
1636000
heap
page read and write
1A69B096000
unkown
page read and write
2E0B5D91000
unkown
page read and write
27C0000
heap
page read and write
327F000
stack
page read and write
2E0B4DAA000
unkown
page read and write
2E0B5D91000
unkown
page read and write
9A7F27E000
unkown
page read and write
1CADFC79000
heap
page read and write
2E0B28FF000
heap
page read and write
4A2F000
stack
page read and write
229F4570000
heap
page read and write
1A697DF0000
unkown
page read and write
2840000
heap
page read and write
2F60000
trusted library allocation
page read and write
229F6340000
heap
page read and write
1A69B0AC000
unkown
page read and write
1E8FB1BC000
heap
page read and write
7FF7AA1C8000
unkown
page readonly
54CC000
heap
page read and write
7FF7AA1DE000
unkown
page write copy
57E000
stack
page read and write
2E0B28B0000
unkown
page read and write
54CF000
heap
page read and write
2E0B5C20000
heap
page read and write
2E0B28B0000
unkown
page read and write
1A697DF0000
unkown
page read and write
1A69ABC7000
heap
page read and write
14B0000
trusted library allocation
page read and write
1336000
heap
page read and write
282B000
heap
page read and write
480B2FF000
stack
page read and write
54AB000
heap
page read and write
229F4608000
heap
page read and write
15814000
heap
page read and write
54DB000
heap
page read and write
7FF752000000
unkown
page readonly
2453CED0000
heap
page read and write
13C4000
heap
page read and write
2F60000
trusted library allocation
page read and write
500000
unkown
page readonly
2C30000
heap
page read and write
2E0B28B0000
unkown
page read and write
1A69AF11000
unkown
page read and write
9B0F000
heap
page read and write
1A69B069000
unkown
page read and write
480B5FF000
stack
page read and write
1A69A114000
heap
page read and write
54CC000
heap
page read and write
1A69AAAD000
heap
page read and write
9A7EF19000
unkown
page read and write
15522000
heap
page read and write
7FF7520B5000
unkown
page readonly
15829000
heap
page read and write
282E000
stack
page read and write
7FF752000000
unkown
page readonly
229F45EC000
heap
page read and write
1A69AF11000
unkown
page read and write
2E3C000
stack
page read and write
2E0B5A41000
heap
page read and write
13A8000
heap
page read and write
7FF7520B5000
unkown
page readonly
1A697DF0000
unkown
page read and write
1A69B1D5000
unkown
page read and write
2E0B4F97000
heap
page read and write
14B0000
trusted library allocation
page read and write
540B000
heap
page read and write
2E0B612B000
unkown
page read and write
1CAE1EE4000
unkown
page read and write
2E0B28B0000
unkown
page read and write
1CADFE50000
unkown
page read and write
434000
unkown
page read and write
98000
stack
page read and write
2AEF000
stack
page read and write
2C5D000
heap
page read and write
2834000
heap
page read and write
7FF7AA1A5000
unkown
page readonly
282E000
heap
page read and write
1A699F2E000
unkown
page read and write
7FF752000000
unkown
page readonly
1A69AF11000
unkown
page read and write
1A69BEEE000
unkown
page read and write
13C4000
heap
page read and write
13C4000
heap
page read and write
54CF000
heap
page read and write
400000
unkown
page readonly
1CADFD70000
heap
page read and write
3BFC000
stack
page read and write
497000
unkown
page read and write
480B6FF000
stack
page read and write
2F20000
trusted library allocation
page read and write
1A69AAAD000
heap
page read and write
5440000
heap
page read and write
14C0000
trusted library allocation
page read and write
1CAE1DB0000
unkown
page read and write
15CA0000
trusted library allocation
page read and write
15CA0000
trusted library allocation
page read and write
13BB000
heap
page read and write
1A69AAAD000
heap
page read and write
7FF7520EA000
unkown
page write copy
229F45FB000
heap
page read and write
7FF7AA1C8000
unkown
page readonly
2453CD30000
heap
page read and write
1A697DF0000
trusted library allocation
page read and write
54CC000
heap
page read and write
2E0B5A3A000
heap
page read and write
1CADFE91000
unkown
page readonly
2C7DFD000
stack
page read and write
2E0B4DAA000
unkown
page read and write
7FF7AA1DE000
unkown
page write copy
15CA0000
trusted library allocation
page read and write
471F000
stack
page read and write
1A699F2D000
unkown
page read and write
1A697DF0000
trusted library allocation
page read and write
229F45C1000
heap
page read and write
1573D000
heap
page read and write
7FF7AA0F1000
unkown
page execute read
229F45DE000
heap
page read and write
7FF7520EA000
unkown
page write copy
7FF7520F4000
unkown
page readonly
29B8000
heap
page read and write
49AF000
stack
page read and write
720000
heap
page read and write
2A30000
heap
page read and write
14C0000
trusted library allocation
page read and write
7FF7AA0F0000
unkown
page readonly
B8C000
stack
page read and write
1A69AF11000
unkown
page read and write
7FF7520EE000
unkown
page write copy
290E000
stack
page read and write
2F60000
trusted library allocation
page read and write
13BF000
heap
page read and write
1A69AB2F000
heap
page read and write
2BEF000
stack
page read and write
1CAE1730000
unkown
page read and write
2E0B28B0000
unkown
page read and write
27D0000
heap
page read and write
13BB000
heap
page read and write
2E0B5D91000
unkown
page read and write
14D5CFB5000
heap
page read and write
229F460D000
heap
page read and write
258C000
stack
page read and write
46B000
unkown
page read and write
5480000
heap
page read and write
2C2E000
heap
page read and write
9A7F17C000
unkown
page read and write
2F3C000
stack
page read and write
2453CC37000
remote allocation
page execute and read and write
13B8000
heap
page read and write
1408F6000
unkown
page read and write
2E0B6155000
unkown
page read and write
7FF7520D8000
unkown
page readonly
2E0B5909000
heap
page read and write
1CADFF80000
heap
page read and write
1A697DF0000
unkown
page read and write
2C10000
heap
page read and write
1A69AF11000
unkown
page read and write
401000
unkown
page execute read
1CADFC60000
unkown
page readonly
1A69AAAD000
heap
page read and write
2C5D000
heap
page read and write
54CC000
heap
page read and write
2E0B5F58000
unkown
page read and write
7FF7AA0F0000
unkown
page readonly
1A69BEE1000
unkown
page read and write
690F000
heap
page read and write
2E0B291F000
heap
page read and write
7FF7520EE000
unkown
page write copy
B90F000
heap
page read and write
15CA0000
trusted library allocation
page read and write
13A3000
heap
page read and write
282B000
heap
page read and write
2E0B28B0000
unkown
page read and write
2453CC3A000
remote allocation
page execute and read and write
33FD000
stack
page read and write
2453CED4000
heap
page read and write
2E0B5EF6000
unkown
page read and write
294F000
stack
page read and write
409000
unkown
page readonly
2E0B45A0000
unkown
page read and write
229F45DF000
heap
page read and write
1A699F28000
unkown
page read and write
7FF752001000
unkown
page execute read
283E000
heap
page read and write
13A8000
heap
page read and write
5492000
heap
page read and write
2B0F000
stack
page read and write
7FF7520B5000
unkown
page readonly
14B0000
trusted library allocation
page read and write
235E000
stack
page read and write
2A7F000
stack
page read and write
2E0B45A0000
unkown
page read and write
530000
heap
page read and write
2E0B6D6B000
unkown
page read and write
13B8000
heap
page read and write
7FF7AA1DA000
unkown
page write copy
1A69AF11000
unkown
page read and write
1A69B09B000
unkown
page read and write
14C0000
trusted library allocation
page read and write
14B0000
trusted library allocation
page read and write
1A69AF11000
unkown
page read and write
788000
heap
page read and write
2840000
heap
page read and write
1A697DF0000
unkown
page read and write
15EA0000
trusted library allocation
page read and write
14C0000
trusted library allocation
page read and write
15528000
heap
page read and write
5F0000
heap
page read and write
54E2000
heap
page read and write
1E8FB170000
heap
page read and write
2E0B4DA2000
unkown
page read and write
6D0000
heap
page read and write
420000
unkown
page read and write
2C4D000
heap
page read and write
2F70000
heap
page read and write
282F000
heap
page read and write
7FF7AA1E4000
unkown
page readonly
13BF000
heap
page read and write
53FE000
stack
page read and write
6F5000
heap
page read and write
1CADFE70000
unkown
page read and write
2E0B60DB000
unkown
page read and write
2836000
heap
page read and write
2A6F000
stack
page read and write
2E0B5F08000
unkown
page read and write
2ACE000
stack
page read and write
13AC000
heap
page read and write
A1F000
stack
page read and write
7FF7AA1A5000
unkown
page readonly
13C4000
heap
page read and write
FC0000
heap
page read and write
66C000
stack
page read and write
1A69AAAD000
heap
page read and write
15614000
heap
page read and write
1A69AF11000
unkown
page read and write
1280000
heap
page read and write
7FF7520EA000
unkown
page write copy
1A69ABE7000
heap
page read and write
1A699F28000
unkown
page read and write
282B000
heap
page read and write
229F4604000
heap
page read and write
12E0000
heap
page read and write
229F45C9000
heap
page read and write
1A69AB29000
heap
page read and write
1CAE1E40000
unkown
page read and write
1A697DF0000
unkown
page read and write
54CC000
heap
page read and write
1CAE1F26000
unkown
page read and write
550F000
heap
page read and write
229F45F4000
heap
page read and write
229F45BC000
heap
page read and write
1A69B34F000
unkown
page read and write
5492000
heap
page read and write
2E0B5909000
heap
page read and write
229F46B0000
heap
page read and write
25C0000
heap
page read and write
27D8000
heap
page read and write
A50F000
heap
page read and write
7FF7520EE000
unkown
page write copy
280E000
heap
page read and write
2EDE000
stack
page read and write
7FF7520EE000
unkown
page write copy
15CA0000
trusted library allocation
page read and write
283E000
heap
page read and write
2E0B6D65000
unkown
page read and write
14C0000
trusted library allocation
page read and write
282B000
heap
page read and write
2E0B5909000
heap
page read and write
2C33000
heap
page read and write
2E0B6D61000
unkown
page read and write
1A69AAAD000
heap
page read and write
2C4A000
heap
page read and write
54CC000
heap
page read and write
14C0000
trusted library allocation
page read and write
1A69B2A8000
unkown
page read and write
2B26000
heap
page read and write
1A697DF0000
unkown
page read and write
337E000
stack
page read and write
2E0B4DA4000
unkown
page read and write
7FF752001000
unkown
page execute read
1408ED000
unkown
page execute and read and write
14C0000
trusted library allocation
page read and write
5404000
heap
page read and write
1A69AB24000
heap
page read and write
2E0B5978000
heap
page read and write
277E000
stack
page read and write
2C55000
heap
page read and write
2E0B4DA7000
unkown
page read and write
27F0000
heap
page read and write
2E0B5F80000
unkown
page read and write
12E9000
heap
page read and write
307E000
stack
page read and write
229F4760000
heap
page read and write
2F60000
trusted library allocation
page read and write
1A699F2E000
unkown
page read and write
54F7000
heap
page read and write
1A69B2D5000
unkown
page read and write
15CA0000
trusted library allocation
page read and write
2C77BF000
stack
page read and write
2C4A000
heap
page read and write
1CAE1CA2000
unkown
page read and write
1A69AF11000
unkown
page read and write
2F60000
trusted library allocation
page read and write
13AD000
heap
page read and write
229F4608000
heap
page read and write
1A697DF0000
unkown
page read and write
1CADFF84000
heap
page read and write
14D5CCAA000
remote allocation
page execute and read and write
2E0B5D91000
unkown
page read and write
A94733D000
stack
page read and write
1360000
heap
page read and write
1A697DF0000
unkown
page read and write
2F60000
trusted library allocation
page read and write
2E0B5D91000
unkown
page read and write
229F45EE000
heap
page read and write
1A69B22D000
unkown
page read and write
14057E000
unkown
page execute and read and write
2E0B45A0000
unkown
page read and write
2E0B6D67000
unkown
page read and write
480AFFD000
stack
page read and write
14C0000
trusted library allocation
page read and write
496E000
stack
page read and write
7FF7520F4000
unkown
page readonly
2A3E000
stack
page read and write
1E8FB440000
heap
page read and write
77F59FD000
stack
page read and write
1A69AFF5000
unkown
page read and write
1A697DF0000
unkown
page read and write
2E0B6D6F000
unkown
page read and write
2E0B6D60000
unkown
page read and write
7FF7AA0F0000
unkown
page readonly
5483000
heap
page read and write
2E0B5909000
heap
page read and write
2E0B4DA3000
unkown
page read and write
1A69AAAD000
heap
page read and write
7FF7520F4000
unkown
page readonly
1A69B100000
unkown
page read and write
1A69BEEF000
unkown
page read and write
1A69AF1E000
unkown
page read and write
520000
heap
page read and write
283E000
heap
page read and write
7FF7520F4000
unkown
page readonly
14D5CA90000
remote allocation
page execute and read and write
14C0000
trusted library allocation
page read and write
1A69AB1E000
heap
page read and write
1318000
heap
page read and write
5F5000
heap
page read and write
13C4000
heap
page read and write
1E8FB444000
heap
page read and write
25F0000
heap
page read and write
2E0B4DA4000
unkown
page read and write
5492000
heap
page read and write
2E0B28B0000
unkown
page read and write
2E0B5D91000
unkown
page read and write
1A69BEEB000
unkown
page read and write
2C29000
heap
page read and write
2EE0000
trusted library allocation
page read and write
2F20000
trusted library allocation
page read and write
1A697DF0000
unkown
page read and write
229F45D6000
heap
page read and write
14B0000
trusted library allocation
page read and write
2453CA20000
remote allocation
page execute and read and write
15CA0000
trusted library allocation
page read and write
6AC000
stack
page read and write
15520000
trusted library allocation
page read and write
11BF000
stack
page read and write
480B3FF000
stack
page read and write
1A69ABE0000
heap
page read and write
77F53EF000
stack
page read and write
2E0B608B000
unkown
page read and write
2E0B5909000
heap
page read and write
2F60000
trusted library allocation
page read and write
1A69AF11000
unkown
page read and write
2E0B5D91000
unkown
page read and write
2453CEE0000
unkown
page read and write
1A69BEE3000
unkown
page read and write
12C0000
direct allocation
page execute read
2A80000
heap
page read and write
2837000
heap
page read and write
1A69B44B000
unkown
page read and write
1CAE181E000
unkown
page read and write
229F4550000
heap
page read and write
1A69B0EA000
unkown
page read and write
1A69ACE9000
heap
page read and write
1E8FB445000
heap
page read and write
2E0B4DA5000
unkown
page read and write
317F000
stack
page read and write
1A69B080000
unkown
page read and write
14B0000
trusted library allocation
page read and write
A9477FF000
stack
page read and write
54AB000
heap
page read and write
155F9000
heap
page read and write
2DFF000
stack
page read and write
2E0B4DAD000
unkown
page read and write
2E0B2921000
heap
page read and write
2E0B28B0000
unkown
page read and write
54AC000
heap
page read and write
229F45D6000
heap
page read and write
2E0B28B0000
unkown
page read and write
2E0B6D64000
unkown
page read and write
A9476FE000
unkown
page read and write
7FF7AA0F1000
unkown
page execute read
1A6979B3000
heap
page read and write
2E0B45A0000
unkown
page read and write
229F460F000
heap
page read and write
2E0B6D64000
unkown
page read and write
910F000
heap
page read and write
2E0B5989000
heap
page read and write
72A000
heap
page read and write
65C000
stack
page read and write
7FF7AA1C8000
unkown
page readonly
1CAE1EA2000
unkown
page read and write
1A697DF0000
unkown
page read and write
1CAE1D66000
unkown
page read and write
475E000
stack
page read and write
1560E000
heap
page read and write
2E0B5EE3000
unkown
page read and write
54CC000
heap
page read and write
2E0B6D6E000
unkown
page read and write
400000
unkown
page readonly
14D5CDA0000
heap
page read and write
54CC000
heap
page read and write
481F000
stack
page read and write
229F45D6000
heap
page read and write
14C0000
trusted library allocation
page read and write
2E0B5A1B000
heap
page read and write
401000
unkown
page execute read
1A697DF0000
unkown
page read and write
229F45D6000
heap
page read and write
1A697DF0000
unkown
page read and write
43FE000
stack
page read and write
2E0B4DAC000
unkown
page read and write
1A69ADCA000
heap
page read and write
15CA0000
trusted library allocation
page read and write
2E0B4DA1000
unkown
page read and write
2730000
heap
page read and write
2E0B45A0000
unkown
page read and write
1A697DF0000
unkown
page read and write
2E0B597E000
heap
page read and write
1CADFC70000
heap
page read and write
785000
heap
page read and write
2F60000
trusted library allocation
page read and write
245F000
stack
page read and write
1A69AAAD000
heap
page read and write
54CD000
heap
page read and write
479F000
stack
page read and write
2E0B5D91000
unkown
page read and write
1A6997FD000
heap
page read and write
2C5D000
heap
page read and write
12A0000
heap
page read and write
2E0B5972000
heap
page read and write
162E000
stack
page read and write
1A699F22000
unkown
page read and write
7FF7520F4000
unkown
page readonly
1A69AF11000
unkown
page read and write
2F60000
trusted library allocation
page read and write
1A699FFA000
unkown
page read and write
2C4A000
heap
page read and write
1A697DF0000
unkown
page read and write
1A69AF11000
unkown
page read and write
2810000
heap
page read and write
2E0B5D91000
unkown
page read and write
2910000
heap
page read and write
14D5CFB0000
heap
page read and write
2E0B28B0000
trusted library allocation
page read and write
1E8FB1B0000
heap
page read and write
480AEFF000
stack
page read and write
24A4000
heap
page read and write
BA0000
heap
page read and write
54CC000
heap
page read and write
13BB000
heap
page read and write
13C3000
heap
page read and write
2E0B5D91000
unkown
page read and write
1A69AF11000
unkown
page read and write
29AE000
stack
page read and write
6F0000
heap
page read and write
54C3000
heap
page read and write
7A2000
heap
page read and write
1A69A00F000
unkown
page read and write
2E0B291F000
heap
page read and write
229F460F000
heap
page read and write
2E0B5B41000
heap
page read and write
15CA0000
trusted library allocation
page read and write
2F60000
trusted library allocation
page read and write
2C53000
heap
page read and write
2E0B6064000
unkown
page read and write
54CC000
heap
page read and write
1A699F2D000
unkown
page read and write
There are 727 hidden memdumps, click here to show them.