IOC Report
rDetallesdenuev.exe

loading gif

Files

File Path
Type
Category
Malicious
rDetallesdenuev.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Roaming\Nlbdjgdctg.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\Nlbdjgdctg.exe:Zone.Identifier
ASCII text, with CRLF line terminators
modified
malicious

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\rDetallesdenuev.exe
"C:\Users\user\Desktop\rDetallesdenuev.exe"
malicious
C:\Windows\SysWOW64\cmd.exe
"C:\Windows\System32\cmd.exe" /c ipconfig /release
malicious
C:\Windows\SysWOW64\ipconfig.exe
ipconfig /release
malicious
C:\Users\user\Desktop\rDetallesdenuev.exe
"C:\Users\user\Desktop\rDetallesdenuev.exe"
malicious
C:\Windows\SysWOW64\cmd.exe
"C:\Windows\System32\cmd.exe" /c ipconfig /renew
malicious
C:\Users\user\AppData\Roaming\Nlbdjgdctg.exe
"C:\Users\user\AppData\Roaming\Nlbdjgdctg.exe"
malicious
C:\Windows\SysWOW64\cmd.exe
"C:\Windows\System32\cmd.exe" /c ipconfig /release
malicious
C:\Windows\SysWOW64\ipconfig.exe
ipconfig /release
malicious
C:\Users\user\AppData\Roaming\Nlbdjgdctg.exe
"C:\Users\user\AppData\Roaming\Nlbdjgdctg.exe"
malicious
C:\Users\user\AppData\Roaming\Nlbdjgdctg.exe
"C:\Users\user\AppData\Roaming\Nlbdjgdctg.exe"
malicious
C:\Windows\SysWOW64\cmd.exe
"C:\Windows\System32\cmd.exe" /c ipconfig /renew
malicious
C:\Windows\SysWOW64\ipconfig.exe
ipconfig /renew
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
There are 5 hidden processes, click here to show them.

URLs

Name
IP
Malicious
http://afanew.cl/Qjeawwzlrxu.wav
138.255.101.194
malicious
https://github.com/mgravell/protobuf-neti
unknown
https://stackoverflow.com/q/14436606/23354
unknown
https://account.dyn.com/
unknown
https://github.com/mgravell/protobuf-netJ
unknown
http://x1.c.lencr.org/0
unknown
http://x1.i.lencr.org/0
unknown
https://stackoverflow.com/q/11564914/23354;
unknown
https://stackoverflow.com/q/2152978/23354
unknown
http://afanew.cld
unknown
http://ip-api.com
unknown
http://r3.o.lencr.org0
unknown
https://github.com/mgravell/protobuf-net
unknown
http://mail.100demoras.pt
unknown
http://afanew.cl
unknown
http://100demoras.pt
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
http://r3.i.lencr.org/0)
unknown
http://ip-api.com/line/?fields=hosting
208.95.112.1
There are 9 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
ip-api.com
208.95.112.1
malicious
afanew.cl
138.255.101.194
malicious
100demoras.pt
188.40.116.241
malicious
mail.100demoras.pt
unknown
malicious
206.23.85.13.in-addr.arpa
unknown

IPs

IP
Domain
Country
Malicious
208.95.112.1
ip-api.com
United States
malicious
188.40.116.241
100demoras.pt
Germany
malicious
138.255.101.194
afanew.cl
Chile
malicious

Registry

Path
Value
Malicious
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\rDetallesdenuev_RASAPI32
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\rDetallesdenuev_RASAPI32
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\rDetallesdenuev_RASAPI32
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\rDetallesdenuev_RASAPI32
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\rDetallesdenuev_RASAPI32
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\rDetallesdenuev_RASAPI32
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\rDetallesdenuev_RASAPI32
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\rDetallesdenuev_RASMANCS
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\rDetallesdenuev_RASMANCS
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\rDetallesdenuev_RASMANCS
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\rDetallesdenuev_RASMANCS
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\rDetallesdenuev_RASMANCS
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\rDetallesdenuev_RASMANCS
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\rDetallesdenuev_RASMANCS
FileDirectory
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
Nlbdjgdctg
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Nlbdjgdctg_RASAPI32
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Nlbdjgdctg_RASAPI32
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Nlbdjgdctg_RASAPI32
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Nlbdjgdctg_RASAPI32
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Nlbdjgdctg_RASAPI32
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Nlbdjgdctg_RASAPI32
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Nlbdjgdctg_RASAPI32
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Nlbdjgdctg_RASMANCS
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Nlbdjgdctg_RASMANCS
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Nlbdjgdctg_RASMANCS
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Nlbdjgdctg_RASMANCS
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Nlbdjgdctg_RASMANCS
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Nlbdjgdctg_RASMANCS
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Nlbdjgdctg_RASMANCS
FileDirectory
There are 19 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
2D31000
trusted library allocation
page read and write
malicious
4FE5000
trusted library allocation
page read and write
malicious
7701000
trusted library allocation
page read and write
malicious
726F000
trusted library allocation
page read and write
malicious
7B90000
trusted library section
page read and write
malicious
313D000
trusted library allocation
page read and write
malicious
331D000
trusted library allocation
page read and write
malicious
6FE1000
trusted library allocation
page read and write
malicious
2E75000
trusted library allocation
page read and write
malicious
8747000
trusted library allocation
page read and write
malicious
312B000
trusted library allocation
page read and write
malicious
7670000
trusted library section
page read and write
malicious
3111000
trusted library allocation
page read and write
malicious
6331000
trusted library allocation
page read and write
malicious
4B1D000
trusted library allocation
page read and write
malicious
7611000
trusted library allocation
page read and write
malicious
35C1000
trusted library allocation
page read and write
malicious
2D5D000
trusted library allocation
page read and write
malicious
4658000
trusted library allocation
page read and write
malicious
8E61000
trusted library allocation
page read and write
malicious
F47000
heap
page read and write
635E000
stack
page read and write
1060000
heap
page read and write
F07000
heap
page read and write
32CB000
trusted library allocation
page read and write
3143000
trusted library allocation
page read and write
2EC8000
trusted library allocation
page read and write
1120000
heap
page read and write
582E000
stack
page read and write
6A20000
trusted library allocation
page read and write
7C20000
trusted library allocation
page read and write
3151000
trusted library allocation
page read and write
691E000
stack
page read and write
77B9000
trusted library allocation
page read and write
2C9F000
trusted library allocation
page read and write
5532000
trusted library allocation
page read and write
2EC0000
heap
page read and write
8220000
trusted library allocation
page execute and read and write
3D1F000
trusted library allocation
page read and write
5ABE000
stack
page read and write
2E21000
trusted library allocation
page read and write
80B0000
trusted library allocation
page execute and read and write
329B000
trusted library allocation
page read and write
8BB0000
trusted library allocation
page read and write
7BB0000
trusted library allocation
page read and write
F2B000
heap
page read and write
317E000
trusted library allocation
page read and write
3ED1000
trusted library allocation
page read and write
7C50000
trusted library allocation
page execute and read and write
609E000
stack
page read and write
2C3F000
stack
page read and write
2F24000
trusted library allocation
page read and write
5C1E000
stack
page read and write
61DD000
stack
page read and write
57FC000
stack
page read and write
645E000
stack
page read and write
2F4E000
trusted library allocation
page read and write
DB2000
trusted library allocation
page read and write
327E000
trusted library allocation
page read and write
2E3C000
trusted library allocation
page read and write
1467000
heap
page read and write
60BE000
stack
page read and write
14D6000
heap
page read and write
1430000
trusted library allocation
page read and write
426000
remote allocation
page execute and read and write
3159000
trusted library allocation
page read and write
62DF000
stack
page read and write
649E000
stack
page read and write
32CF000
trusted library allocation
page read and write
3509000
trusted library allocation
page read and write
1632000
trusted library allocation
page read and write
5541000
trusted library allocation
page read and write
7B4A000
heap
page read and write
32AE000
trusted library allocation
page read and write
1127000
heap
page read and write
E40000
trusted library allocation
page read and write
144E000
heap
page read and write
1052000
trusted library allocation
page read and write
60CE000
stack
page read and write
7930000
trusted library allocation
page read and write
5BBF000
stack
page read and write
E2E000
stack
page read and write
6E92000
trusted library allocation
page read and write
2ED5000
trusted library allocation
page read and write
AF7000
stack
page read and write
2E0C000
trusted library allocation
page read and write
32EC000
trusted library allocation
page read and write
7F280000
trusted library allocation
page execute and read and write
5E6F000
stack
page read and write
107E000
heap
page read and write
2E4B000
trusted library allocation
page read and write
2E1D000
trusted library allocation
page read and write
1090000
trusted library allocation
page read and write
641F000
stack
page read and write
7470000
heap
page read and write
67A0000
trusted library allocation
page execute and read and write
556E000
stack
page read and write
7941000
trusted library allocation
page read and write
648E000
stack
page read and write
56F0000
heap
page execute and read and write
8130000
trusted library allocation
page read and write
2BFE000
stack
page read and write
572E000
stack
page read and write
7C10000
trusted library allocation
page read and write
32E2000
trusted library allocation
page read and write
5880000
trusted library allocation
page read and write
2BA0000
trusted library allocation
page read and write
2D65000
trusted library allocation
page read and write
2D4E000
stack
page read and write
8581000
trusted library allocation
page read and write
2DFE000
trusted library allocation
page read and write
552B000
trusted library allocation
page read and write
1068000
heap
page read and write
E84000
heap
page read and write
6C2E000
stack
page read and write
3293000
trusted library allocation
page read and write
5150000
heap
page read and write
333F000
trusted library allocation
page read and write
5F9E000
stack
page read and write
697C000
heap
page read and write
DAD000
trusted library allocation
page execute and read and write
552E000
trusted library allocation
page read and write
78C1000
trusted library allocation
page read and write
2CA5000
trusted library allocation
page read and write
6B80000
trusted library allocation
page execute and read and write
7C00000
trusted library allocation
page read and write
2E0E000
trusted library allocation
page read and write
8090000
trusted library allocation
page read and write
2F3A000
trusted library allocation
page read and write
6820000
trusted library allocation
page execute and read and write
2BBE000
trusted library allocation
page read and write
1110000
heap
page read and write
F18000
heap
page read and write
30DE000
stack
page read and write
7AEC000
heap
page read and write
680E000
stack
page read and write
409000
remote allocation
page execute and read and write
EE4000
trusted library allocation
page read and write
402000
remote allocation
page execute and read and write
EED000
trusted library allocation
page execute and read and write
2D7D000
trusted library allocation
page read and write
8120000
trusted library allocation
page read and write
5883000
trusted library allocation
page read and write
61E0000
heap
page read and write
1790000
trusted library allocation
page read and write
2FA8000
trusted library allocation
page read and write
32A1000
trusted library allocation
page read and write
132A000
trusted library allocation
page execute and read and write
66CD000
stack
page read and write
2E2E000
trusted library allocation
page read and write
3C58000
trusted library allocation
page read and write
56BE000
stack
page read and write
3121000
trusted library allocation
page read and write
6E90000
trusted library allocation
page read and write
32E4000
trusted library allocation
page read and write
6A40000
trusted library allocation
page read and write
645E000
stack
page read and write
55A0000
heap
page read and write
1107000
heap
page read and write
32B0000
trusted library allocation
page read and write
E35000
heap
page read and write
7BCE000
trusted library allocation
page read and write
2F00000
trusted library allocation
page read and write
2F06000
trusted library allocation
page read and write
156F000
stack
page read and write
32B4000
trusted library allocation
page read and write
F00000
trusted library allocation
page read and write
2CA7000
trusted library allocation
page read and write
84FC000
stack
page read and write
8150000
trusted library allocation
page read and write
3295000
trusted library allocation
page read and write
511E000
stack
page read and write
E5E000
heap
page read and write
3101000
trusted library allocation
page read and write
12E0000
trusted library allocation
page read and write
80F0000
trusted library allocation
page execute and read and write
600C000
stack
page read and write
30CE000
stack
page read and write
2E29000
trusted library allocation
page read and write
843B000
stack
page read and write
685E000
stack
page read and write
12E0000
heap
page read and write
3184000
trusted library allocation
page read and write
108A000
heap
page read and write
2DF3000
trusted library allocation
page read and write
16D0000
trusted library allocation
page read and write
5BDE000
stack
page read and write
32EE000
trusted library allocation
page read and write
52E0000
trusted library allocation
page read and write
5130000
trusted library allocation
page read and write
7920000
trusted library allocation
page read and write
1610000
trusted library allocation
page read and write
2D6E000
trusted library allocation
page read and write
1502000
heap
page read and write
1122000
heap
page read and write
1789000
trusted library allocation
page read and write
8270000
trusted library allocation
page execute and read and write
2BB2000
trusted library allocation
page read and write
61BE000
stack
page read and write
57FE000
stack
page read and write
74BA000
heap
page read and write
7C40000
trusted library allocation
page read and write
2BC6000
trusted library allocation
page read and write
DB6000
trusted library allocation
page execute and read and write
1418000
heap
page read and write
669E000
stack
page read and write
10B0000
trusted library allocation
page read and write
7900000
trusted library allocation
page read and write
6925000
heap
page read and write
10F8000
stack
page read and write
43A000
remote allocation
page execute and read and write
13F0000
trusted library allocation
page read and write
6B90000
trusted library allocation
page read and write
5610000
heap
page execute and read and write
1270000
heap
page read and write
7A30000
trusted library allocation
page read and write
4DFD000
stack
page read and write
5E5E000
stack
page read and write
163E000
stack
page read and write
143A000
heap
page read and write
32E6000
trusted library allocation
page read and write
1140000
heap
page read and write
526F000
stack
page read and write
3343000
trusted library allocation
page read and write
3154000
trusted library allocation
page read and write
553E000
trusted library allocation
page read and write
F1D000
heap
page read and write
40E1000
trusted library allocation
page read and write
16F0000
trusted library allocation
page read and write
51DD000
stack
page read and write
2F46000
trusted library allocation
page read and write
6B70000
trusted library allocation
page read and write
2AA0000
trusted library allocation
page read and write
C0E000
stack
page read and write
3D01000
trusted library allocation
page read and write
10F0000
trusted library allocation
page read and write
519C000
stack
page read and write
8133000
trusted library allocation
page read and write
1642000
trusted library allocation
page read and write
5893000
trusted library allocation
page read and write
5B7E000
stack
page read and write
11C0000
heap
page read and write
2D8D000
trusted library allocation
page read and write
3180000
trusted library allocation
page read and write
7A80000
trusted library allocation
page read and write
2E0A000
trusted library allocation
page read and write
7972000
trusted library allocation
page read and write
F06000
trusted library allocation
page execute and read and write
2E34000
trusted library allocation
page read and write
32AA000
trusted library allocation
page read and write
523E000
stack
page read and write
150E000
heap
page read and write
4147000
trusted library allocation
page read and write
16E0000
heap
page read and write
2E9E000
stack
page read and write
3163000
trusted library allocation
page read and write
60DE000
stack
page read and write
1415000
trusted library allocation
page execute and read and write
5FFC000
stack
page read and write
5520000
trusted library allocation
page read and write
3303000
trusted library allocation
page read and write
1417000
trusted library allocation
page execute and read and write
32B5000
trusted library allocation
page read and write
6A33000
trusted library allocation
page read and write
1307000
heap
page read and write
16AE000
stack
page read and write
327A000
trusted library allocation
page read and write
7211000
trusted library allocation
page read and write
6E80000
heap
page read and write
2CB6000
trusted library allocation
page read and write
E95000
heap
page read and write
428000
remote allocation
page execute and read and write
42E000
remote allocation
page execute and read and write
2E08000
trusted library allocation
page read and write
7A89000
trusted library allocation
page read and write
583E000
stack
page read and write
5D1E000
stack
page read and write
32B2000
trusted library allocation
page read and write
126E000
stack
page read and write
2F4A000
trusted library allocation
page read and write
2E27000
trusted library allocation
page read and write
5573000
heap
page read and write
85D1000
trusted library allocation
page read and write
69C0000
trusted library allocation
page execute and read and write
7C90000
trusted library allocation
page read and write
2BE6000
trusted library allocation
page read and write
7940000
trusted library allocation
page execute and read and write
7BBC000
trusted library allocation
page read and write
5ADE000
stack
page read and write
347A000
trusted library allocation
page read and write
583E000
stack
page read and write
2CC0000
trusted library allocation
page read and write
52F0000
heap
page execute and read and write
3D66000
trusted library allocation
page read and write
412000
remote allocation
page execute and read and write
439000
remote allocation
page execute and read and write
57FE000
stack
page read and write
3278000
trusted library allocation
page read and write
414000
remote allocation
page execute and read and write
66E2000
heap
page read and write
32C9000
trusted library allocation
page read and write
2DDA000
trusted library allocation
page read and write
1040000
heap
page read and write
1448000
heap
page read and write
631D000
stack
page read and write
17D0000
trusted library allocation
page read and write
3150000
trusted library allocation
page read and write
7A70000
trusted library allocation
page execute and read and write
6B9B000
trusted library allocation
page read and write
6CE000
unkown
page readonly
32C7000
trusted library allocation
page read and write
12DE000
stack
page read and write
52C0000
heap
page read and write
CF8000
stack
page read and write
32A6000
trusted library allocation
page read and write
55AF000
stack
page read and write
78F0000
trusted library allocation
page read and write
2F21000
trusted library allocation
page read and write
10F7000
stack
page read and write
3161000
trusted library allocation
page read and write
105B000
trusted library allocation
page execute and read and write
3151000
trusted library allocation
page read and write
32A8000
trusted library allocation
page read and write
2F10000
heap
page execute and read and write
8110000
trusted library allocation
page execute and read and write
313B000
trusted library allocation
page read and write
7970000
trusted library allocation
page read and write
8E5C000
stack
page read and write
5A9E000
stack
page read and write
141B000
trusted library allocation
page execute and read and write
67F0000
heap
page read and write
329D000
trusted library allocation
page read and write
2EF0000
trusted library allocation
page read and write
53D0000
heap
page read and write
2D01000
trusted library allocation
page read and write
7BB6000
trusted library allocation
page read and write
F0A000
trusted library allocation
page execute and read and write
8350000
trusted library allocation
page read and write
74EA000
heap
page read and write
440000
remote allocation
page execute and read and write
78AE000
trusted library allocation
page read and write
59C0000
trusted library allocation
page read and write
644E000
stack
page read and write
78B0000
trusted library allocation
page read and write
1400000
trusted library allocation
page read and write
2BE4000
trusted library allocation
page read and write
58BE000
stack
page read and write
1265000
heap
page read and write
669F000
stack
page read and write
1357000
heap
page read and write
32E6000
trusted library allocation
page read and write
6A43000
trusted library allocation
page read and write
5F0D000
stack
page read and write
5CA0000
trusted library allocation
page read and write
2AE9000
trusted library allocation
page read and write
9D9000
stack
page read and write
7BF0000
trusted library allocation
page read and write
2F2E000
trusted library allocation
page read and write
78BE000
trusted library allocation
page read and write
14C7000
heap
page read and write
52E7000
trusted library allocation
page read and write
3297000
trusted library allocation
page read and write
7CDB000
stack
page read and write
2E42000
trusted library allocation
page read and write
3285000
trusted library allocation
page read and write
3148000
trusted library allocation
page read and write
1640000
trusted library allocation
page read and write
2DD2000
trusted library allocation
page read and write
2DDC000
trusted library allocation
page read and write
314E000
trusted library allocation
page read and write
7230000
heap
page read and write
42C000
remote allocation
page execute and read and write
C4E000
stack
page read and write
7534000
heap
page read and write
1057000
trusted library allocation
page execute and read and write
316D000
trusted library allocation
page read and write
2ED0000
heap
page read and write
32F1000
trusted library allocation
page read and write
FFF000
heap
page read and write
55EF000
stack
page read and write
6C2000
unkown
page readonly
597E000
stack
page read and write
2E46000
trusted library allocation
page read and write
32AC000
trusted library allocation
page read and write
1486000
heap
page read and write
12C0000
trusted library allocation
page read and write
49DB000
trusted library allocation
page read and write
12F0000
trusted library allocation
page read and write
659E000
stack
page read and write
7C30000
trusted library allocation
page read and write
552D000
stack
page read and write
5F5E000
stack
page read and write
2D90000
heap
page execute and read and write
12F0000
trusted library allocation
page read and write
2AD0000
trusted library allocation
page read and write
655E000
stack
page read and write
61CE000
stack
page read and write
74D2000
heap
page read and write
5C9D000
stack
page read and write
1310000
heap
page read and write
54D0000
trusted library allocation
page read and write
2E5B000
trusted library allocation
page read and write
16C0000
trusted library allocation
page read and write
52BE000
stack
page read and write
5546000
trusted library allocation
page read and write
1300000
heap
page read and write
16C0000
trusted library allocation
page execute and read and write
12B0000
heap
page read and write
2DED000
trusted library allocation
page read and write
7BD1000
trusted library allocation
page read and write
2F52000
trusted library allocation
page read and write
632E000
stack
page read and write
2DF1000
trusted library allocation
page read and write
2BBA000
trusted library allocation
page read and write
66DE000
stack
page read and write
1320000
trusted library allocation
page read and write
78A6000
trusted library allocation
page read and write
8137000
trusted library allocation
page read and write
2CAB000
trusted library allocation
page read and write
7A40000
trusted library allocation
page read and write
695E000
stack
page read and write
1350000
trusted library allocation
page read and write
104E000
stack
page read and write
32DC000
trusted library allocation
page read and write
581E000
stack
page read and write
2F37000
trusted library allocation
page read and write
2BC1000
trusted library allocation
page read and write
146E000
stack
page read and write
12D4000
trusted library allocation
page read and write
6810000
heap
page read and write
521E000
stack
page read and write
696E000
stack
page read and write
2DDF000
trusted library allocation
page read and write
7B10000
trusted library allocation
page read and write
8354000
trusted library allocation
page read and write
1780000
trusted library allocation
page read and write
5A7E000
stack
page read and write
7BE5000
trusted library allocation
page read and write
622E000
stack
page read and write
54AE000
stack
page read and write
5E1E000
stack
page read and write
2CC2000
trusted library allocation
page read and write
681E000
stack
page read and write
2CA9000
trusted library allocation
page read and write
670E000
stack
page read and write
D40000
heap
page read and write
12DD000
trusted library allocation
page execute and read and write
2CB1000
trusted library allocation
page read and write
5C5D000
stack
page read and write
315D000
trusted library allocation
page read and write
12F3000
trusted library allocation
page execute and read and write
6D31000
trusted library allocation
page read and write
7910000
trusted library allocation
page read and write
7E1E000
stack
page read and write
2E3E000
trusted library allocation
page read and write
E93000
heap
page read and write
6EEE000
stack
page read and write
1280000
heap
page read and write
150F000
heap
page read and write
2E1B000
trusted library allocation
page read and write
6810000
trusted library allocation
page read and write
58A0000
trusted library allocation
page read and write
2E55000
trusted library allocation
page read and write
425000
remote allocation
page execute and read and write
5526000
trusted library allocation
page read and write
5ABE000
stack
page read and write
52D0000
trusted library allocation
page read and write
697A000
heap
page read and write
67DE000
stack
page read and write
59E0000
trusted library section
page read and write
59BC000
stack
page read and write
51F0000
heap
page read and write
2E57000
trusted library allocation
page read and write
1410000
trusted library allocation
page read and write
55ED000
stack
page read and write
2C40000
heap
page read and write
4DB9000
trusted library allocation
page read and write
3061000
trusted library allocation
page read and write
2ECC000
stack
page read and write
1050000
trusted library allocation
page read and write
2CFE000
stack
page read and write
F45000
heap
page read and write
17E0000
heap
page read and write
400000
remote allocation
page execute and read and write
6C70000
trusted library allocation
page execute and read and write
56FE000
stack
page read and write
16E7000
heap
page read and write
57BF000
stack
page read and write
2F5F000
trusted library allocation
page read and write
3182000
trusted library allocation
page read and write
78CB000
trusted library allocation
page read and write
8080000
trusted library allocation
page read and write
66EE000
heap
page read and write
5570000
heap
page read and write
7C60000
trusted library allocation
page execute and read and write
6A50000
trusted library allocation
page read and write
3C51000
trusted library allocation
page read and write
3282000
trusted library allocation
page read and write
78E0000
trusted library allocation
page read and write
7510000
heap
page read and write
1070000
trusted library allocation
page read and write
2EB0000
trusted library allocation
page read and write
2DD4000
trusted library allocation
page read and write
32D7000
trusted library allocation
page read and write
176E000
stack
page read and write
122E000
stack
page read and write
7240000
trusted library allocation
page read and write
3301000
trusted library allocation
page read and write
433000
remote allocation
page execute and read and write
ED0000
trusted library allocation
page read and write
E20000
heap
page read and write
2EA0000
trusted library allocation
page execute and read and write
2F04000
trusted library allocation
page read and write
14F4000
heap
page read and write
50DD000
stack
page read and write
13FD000
trusted library allocation
page execute and read and write
2F26000
trusted library allocation
page read and write
7AB0000
trusted library allocation
page execute and read and write
42D000
remote allocation
page execute and read and write
2DFA000
trusted library allocation
page read and write
4121000
trusted library allocation
page read and write
111E000
stack
page read and write
32E8000
trusted library allocation
page read and write
2DD0000
trusted library allocation
page read and write
C90000
heap
page read and write
86D0000
trusted library allocation
page read and write
42A000
remote allocation
page execute and read and write
7250000
trusted library allocation
page execute and read and write
EA0000
heap
page read and write
6830000
trusted library allocation
page read and write
7C80000
trusted library allocation
page read and write
43B000
remote allocation
page execute and read and write
6A4E000
trusted library allocation
page read and write
1330000
trusted library allocation
page read and write
62FE000
stack
page read and write
1660000
trusted library allocation
page read and write
2DF5000
trusted library allocation
page read and write
12F4000
trusted library allocation
page read and write
80A0000
trusted library allocation
page read and write
2FD2000
trusted library allocation
page read and write
54FC000
stack
page read and write
434000
remote allocation
page execute and read and write
32CD000
trusted library allocation
page read and write
7950000
trusted library allocation
page read and write
620E000
stack
page read and write
56BC000
stack
page read and write
2CC4000
trusted library allocation
page read and write
2E40000
trusted library allocation
page read and write
1098000
heap
page read and write
634E000
stack
page read and write
E30000
heap
page read and write
3186000
trusted library allocation
page read and write
2AEB000
trusted library allocation
page read and write
13EE000
stack
page read and write
9A9C000
stack
page read and write
1402000
trusted library allocation
page read and write
6920000
heap
page read and write
314A000
trusted library allocation
page read and write
32E4000
trusted library allocation
page read and write
334B000
trusted library allocation
page read and write
16E7000
heap
page read and write
2CAD000
trusted library allocation
page read and write
1770000
trusted library allocation
page read and write
12E5000
heap
page read and write
7A50000
trusted library allocation
page read and write
603E000
stack
page read and write
1645000
trusted library allocation
page execute and read and write
5D6E000
stack
page read and write
7827000
trusted library allocation
page read and write
59D0000
trusted library allocation
page execute and read and write
316B000
trusted library allocation
page read and write
32FD000
trusted library allocation
page read and write
55FE000
stack
page read and write
EE3000
trusted library allocation
page execute and read and write
1620000
trusted library allocation
page read and write
6EA0000
trusted library allocation
page execute and read and write
55B0000
heap
page execute and read and write
7341000
trusted library allocation
page read and write
1327000
trusted library allocation
page execute and read and write
7B14000
heap
page read and write
56EE000
stack
page read and write
6EF0000
heap
page read and write
14FA000
heap
page read and write
1080000
trusted library allocation
page execute and read and write
5EFE000
stack
page read and write
84B0000
heap
page read and write
2EF7000
trusted library allocation
page read and write
754B000
heap
page read and write
599D000
stack
page read and write
12FD000
trusted library allocation
page execute and read and write
415000
remote allocation
page execute and read and write
2F63000
trusted library allocation
page read and write
142E000
heap
page read and write
658E000
stack
page read and write
1410000
heap
page read and write
51F3000
heap
page read and write
607F000
stack
page read and write
2A9E000
stack
page read and write
589D000
trusted library allocation
page read and write
559D000
stack
page read and write
411000
remote allocation
page execute and read and write
1100000
heap
page read and write
78B4000
trusted library allocation
page read and write
431000
remote allocation
page execute and read and write
10C0000
heap
page execute and read and write
6A30000
trusted library allocation
page read and write
2D81000
trusted library allocation
page read and write
2DD6000
trusted library allocation
page read and write
7AF0000
heap
page read and write
E30000
trusted library allocation
page execute and read and write
2E59000
trusted library allocation
page read and write
DCB000
trusted library allocation
page execute and read and write
5AFD000
stack
page read and write
7AD0000
trusted library allocation
page execute and read and write
1614000
trusted library allocation
page read and write
506E000
stack
page read and write
2DF7000
trusted library allocation
page read and write
140A000
trusted library allocation
page execute and read and write
2E2C000
trusted library allocation
page read and write
2CAF000
trusted library allocation
page read and write
67ED000
stack
page read and write
8570000
trusted library allocation
page read and write
32D2000
trusted library allocation
page read and write
659E000
stack
page read and write
65DE000
stack
page read and write
5D1E000
stack
page read and write
2B08000
trusted library allocation
page read and write
65CE000
stack
page read and write
78A0000
trusted library allocation
page read and write
3152000
trusted library allocation
page read and write
80C9000
trusted library allocation
page read and write
429000
remote allocation
page execute and read and write
E77000
heap
page read and write
3178000
trusted library allocation
page read and write
C83000
trusted library allocation
page execute and read and write
14AA000
heap
page read and write
16D0000
trusted library allocation
page read and write
61DE000
stack
page read and write
12D0000
trusted library allocation
page read and write
438000
remote allocation
page execute and read and write
10EE000
stack
page read and write
2D8D000
stack
page read and write
2AE0000
trusted library allocation
page read and write
1636000
trusted library allocation
page execute and read and write
1090000
heap
page read and write
2EBD000
trusted library allocation
page read and write
1448000
heap
page read and write
7B00000
trusted library allocation
page read and write
2C51000
trusted library allocation
page read and write
427000
remote allocation
page execute and read and write
432000
remote allocation
page execute and read and write
1030000
heap
page read and write
E50000
heap
page read and write
7C0B000
trusted library allocation
page read and write
2E23000
trusted library allocation
page read and write
DC5000
trusted library allocation
page execute and read and write
771D000
trusted library allocation
page read and write
8360000
trusted library allocation
page read and write
7528000
heap
page read and write
4275000
trusted library allocation
page read and write
7E0000
heap
page read and write
2D79000
trusted library allocation
page read and write
2CA1000
trusted library allocation
page read and write
12AD000
stack
page read and write
1360000
heap
page read and write
812A000
trusted library allocation
page read and write
554D000
trusted library allocation
page read and write
5300000
heap
page read and write
F02000
trusted library allocation
page read and write
5C3D000
stack
page read and write
2BF0000
heap
page execute and read and write
2BAE000
trusted library allocation
page read and write
C8D000
trusted library allocation
page execute and read and write
2E44000
trusted library allocation
page read and write
2CC6000
trusted library allocation
page read and write
DB0000
trusted library allocation
page read and write
32DE000
trusted library allocation
page read and write
108C000
stack
page read and write
2AF0000
trusted library allocation
page read and write
2E48000
trusted library allocation
page read and write
659E000
stack
page read and write
7FD30000
trusted library allocation
page execute and read and write
5D7E000
stack
page read and write
5552000
trusted library allocation
page read and write
1406000
trusted library allocation
page execute and read and write
DC7000
trusted library allocation
page execute and read and write
571E000
stack
page read and write
EE0000
trusted library allocation
page read and write
630E000
stack
page read and write
DC8000
stack
page read and write
98FC000
stack
page read and write
1445000
heap
page read and write
7CA0000
trusted library allocation
page read and write
126E000
stack
page read and write
78D5000
trusted library allocation
page read and write
5BBE000
stack
page read and write
6961000
trusted library allocation
page read and write
66B4000
heap
page read and write
6D2F000
stack
page read and write
56E0000
heap
page read and write
12D3000
trusted library allocation
page execute and read and write
430000
remote allocation
page execute and read and write
2ED1000
trusted library allocation
page read and write
1260000
heap
page read and write
8250000
trusted library allocation
page execute and read and write
EFD000
trusted library allocation
page execute and read and write
122E000
stack
page read and write
1710000
trusted library allocation
page read and write
55AD000
stack
page read and write
DDA000
stack
page read and write
59BD000
stack
page read and write
66DD000
stack
page read and write
30E0000
heap
page execute and read and write
1514000
heap
page read and write
151F000
heap
page read and write
7C70000
trusted library allocation
page read and write
53E0000
heap
page read and write
3299000
trusted library allocation
page read and write
164B000
trusted library allocation
page execute and read and write
5D20000
trusted library allocation
page read and write
8D50000
heap
page read and write
5140000
trusted library allocation
page read and write
1350000
heap
page read and write
5580000
heap
page read and write
7242000
trusted library allocation
page read and write
161D000
trusted library allocation
page execute and read and write
6B96000
trusted library allocation
page read and write
2D71000
trusted library allocation
page read and write
11E0000
heap
page read and write
2E1F000
trusted library allocation
page read and write
DA0000
trusted library allocation
page read and write
1647000
trusted library allocation
page execute and read and write
1720000
trusted library allocation
page read and write
6A60000
trusted library allocation
page execute and read and write
66A0000
heap
page read and write
1003000
heap
page read and write
2D5B000
trusted library allocation
page read and write
162D000
trusted library allocation
page execute and read and write
508E000
stack
page read and write
2DD8000
trusted library allocation
page read and write
1337000
trusted library allocation
page execute and read and write
4109000
trusted library allocation
page read and write
3D29000
trusted library allocation
page read and write
5160000
heap
page execute and read and write
11C5000
heap
page read and write
5CBE000
stack
page read and write
766E000
stack
page read and write
6FEF000
stack
page read and write
DBA000
trusted library allocation
page execute and read and write
4B17000
trusted library allocation
page read and write
1440000
heap
page read and write
16B0000
trusted library allocation
page execute and read and write
32C5000
trusted library allocation
page read and write
134C000
stack
page read and write
16E0000
heap
page read and write
7D10000
trusted library allocation
page read and write
6A27000
trusted library allocation
page read and write
5BFE000
stack
page read and write
2E02000
trusted library allocation
page read and write
413000
remote allocation
page execute and read and write
119E000
stack
page read and write
314E000
trusted library allocation
page read and write
5E7E000
stack
page read and write
1613000
trusted library allocation
page execute and read and write
78FB000
trusted library allocation
page read and write
8C9C000
stack
page read and write
DC2000
trusted library allocation
page read and write
3110000
heap
page read and write
F10000
heap
page read and write
32D6000
trusted library allocation
page read and write
1100000
heap
page read and write
32B6000
trusted library allocation
page read and write
C70000
trusted library allocation
page read and write
2F28000
trusted library allocation
page read and write
6010000
trusted library allocation
page read and write
30E1000
trusted library allocation
page read and write
2E25000
trusted library allocation
page read and write
4128000
trusted library allocation
page read and write
7A60000
trusted library allocation
page read and write
6B60000
heap
page read and write
2F6B000
trusted library allocation
page read and write
7260000
heap
page read and write
7D0000
heap
page read and write
6963000
heap
page read and write
1475000
heap
page read and write
32C3000
trusted library allocation
page read and write
133B000
trusted library allocation
page execute and read and write
7C00000
trusted library section
page read and write
16BC000
stack
page read and write
61FE000
stack
page read and write
DE0000
trusted library allocation
page read and write
6C0000
unkown
page readonly
10A0000
heap
page read and write
5890000
trusted library allocation
page read and write
2C81000
trusted library allocation
page read and write
80C0000
trusted library allocation
page read and write
7980000
trusted library allocation
page read and write
2BCD000
trusted library allocation
page read and write
C95000
heap
page read and write
317A000
trusted library allocation
page read and write
1630000
trusted library allocation
page read and write
32FF000
trusted library allocation
page read and write
7AF0000
trusted library allocation
page read and write
53B0000
heap
page read and write
7AE0000
trusted library allocation
page read and write
8520000
trusted library allocation
page execute and read and write
E5A000
heap
page read and write
10D9000
heap
page read and write
167E000
stack
page read and write
593E000
stack
page read and write
3280000
trusted library allocation
page read and write
43C000
remote allocation
page execute and read and write
3E94000
trusted library allocation
page read and write
1779000
trusted library allocation
page read and write
D9C000
stack
page read and write
7C60000
trusted library allocation
page read and write
7C90000
trusted library allocation
page execute and read and write
49E1000
trusted library allocation
page read and write
7549000
heap
page read and write
553A000
trusted library allocation
page read and write
7960000
trusted library allocation
page read and write
327C000
trusted library allocation
page read and write
D9E000
stack
page read and write
6C2E000
stack
page read and write
4581000
trusted library allocation
page read and write
308E000
stack
page read and write
8158000
trusted library allocation
page read and write
8B60000
trusted library allocation
page execute and read and write
1055000
trusted library allocation
page execute and read and write
C84000
trusted library allocation
page read and write
7DAE000
stack
page read and write
527E000
stack
page read and write
12B7000
heap
page read and write
1300000
trusted library allocation
page read and write
6AAD000
stack
page read and write
2AF9000
trusted library allocation
page read and write
C80000
trusted library allocation
page read and write
2BE0000
trusted library allocation
page read and write
7AB0000
heap
page read and write
3301000
trusted library allocation
page read and write
3597000
trusted library allocation
page read and write
17E7000
heap
page read and write
317C000
trusted library allocation
page read and write
78AB000
trusted library allocation
page read and write
177B000
trusted library allocation
page read and write
EF0000
trusted library allocation
page read and write
2BAB000
trusted library allocation
page read and write
F3A000
heap
page read and write
5D3F000
stack
page read and write
3450000
trusted library allocation
page read and write
1412000
trusted library allocation
page read and write
2AC0000
trusted library allocation
page read and write
2BD2000
trusted library allocation
page read and write
42F000
remote allocation
page execute and read and write
5A7E000
stack
page read and write
32EA000
trusted library allocation
page read and write
CCC000
stack
page read and write
1714000
trusted library allocation
page read and write
2FD0000
heap
page read and write
76C000
stack
page read and write
163A000
trusted library allocation
page execute and read and write
2CB4000
trusted library allocation
page read and write
There are 852 hidden memdumps, click here to show them.