IOC Report
LisectAVT_2403002A_135.exe

loading gif

Files

File Path
Type
Category
Malicious
LisectAVT_2403002A_135.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
initial sample
malicious
C:\Client.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Client.exe:Zone.Identifier
ASCII text, with CRLF line terminators
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\CLR_v2.0_32\UsageLogs\LisectAVT_2403002A_135.exe.log
ASCII text, with CRLF line terminators
dropped
malicious
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Client.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Client.url
MS Windows 95 Internet shortcut text (URL=<file:///C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Client.exe>), ASCII text, with CRLF line terminators
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\CLR_v2.0_32\UsageLogs\Client.exe.log
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Client.exe:Zone.Identifier
ASCII text, with CRLF line terminators
dropped

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\LisectAVT_2403002A_135.exe
"C:\Users\user\Desktop\LisectAVT_2403002A_135.exe"
malicious
C:\Users\user\Desktop\LisectAVT_2403002A_135.exe
"C:\Users\user\Desktop\LisectAVT_2403002A_135.exe" ..
malicious
C:\Users\user\Desktop\LisectAVT_2403002A_135.exe
"C:\Users\user\Desktop\LisectAVT_2403002A_135.exe" ..
malicious
C:\Users\user\Desktop\LisectAVT_2403002A_135.exe
"C:\Users\user\Desktop\LisectAVT_2403002A_135.exe" ..
malicious
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Client.exe
"C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Client.exe"
malicious
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Client.exe
"C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Client.exe"
malicious

URLs

Name
IP
Malicious
https://pastebin.com/raw/EngADTbC
unknown

Domains

Name
IP
Malicious
prior-gently.gl.at.ply.gg
147.185.221.19

IPs

IP
Domain
Country
Malicious
147.185.221.19
prior-gently.gl.at.ply.gg
United States

Registry

Path
Value
Malicious
HKEY_CURRENT_USER
ghost
malicious
HKEY_CURRENT_USER\Environment
SEE_MASK_NOZONECHECKS
malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
Client.exe
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run
Client.exe
HKEY_CURRENT_USER\SOFTWARE\Client.exe
[kl]
HKEY_CURRENT_USER\SOFTWARE\Client.exe
[kl]

Memdumps

Base Address
Regiontype
Protect
Malicious
2F31000
trusted library allocation
page read and write
malicious
3101000
trusted library allocation
page read and write
malicious
143C000
heap
page read and write
1230000
heap
page read and write
636A000
heap
page read and write
F630000
heap
page read and write
F3AD000
stack
page read and write
1130000
trusted library allocation
page read and write
523E000
stack
page read and write
12A0000
heap
page execute and read and write
ECA000
trusted library allocation
page execute and read and write
F06D000
stack
page read and write
101EE000
stack
page read and write
F82000
trusted library allocation
page execute and read and write
5DFE000
stack
page read and write
EDED000
stack
page read and write
7D4D000
stack
page read and write
2C6AC000
trusted library allocation
page read and write
509D000
stack
page read and write
2C4C3000
trusted library allocation
page read and write
44F1000
trusted library allocation
page read and write
114EE000
stack
page read and write
13FA000
trusted library allocation
page execute and read and write
4624000
trusted library allocation
page read and write
EB2E000
stack
page read and write
2C79D000
trusted library allocation
page read and write
553D000
stack
page read and write
1083000
heap
page read and write
5278000
trusted library allocation
page read and write
2CCCE000
trusted library allocation
page read and write
323D9000
trusted library allocation
page read and write
4BE7000
trusted library allocation
page read and write
529D000
stack
page read and write
1112D000
stack
page read and write
E32D000
stack
page read and write
59AE000
stack
page read and write
7FA8000
heap
page read and write
FF6D000
stack
page read and write
F20000
heap
page read and write
55B0000
heap
page read and write
AB6D000
stack
page read and write
ADF0000
heap
page read and write
DE2000
trusted library allocation
page execute and read and write
5B18000
heap
page read and write
8B0D000
stack
page read and write
E52000
heap
page read and write
2C061000
trusted library allocation
page read and write
9C6E000
stack
page read and write
4252000
trusted library allocation
page read and write
E45000
heap
page read and write
1470000
heap
page execute and read and write
2DBF000
trusted library allocation
page read and write
E9EE000
stack
page read and write
1126D000
stack
page read and write
D80000
heap
page read and write
A42D000
stack
page read and write
DDAE000
stack
page read and write
926D000
stack
page read and write
B76D000
stack
page read and write
130C000
trusted library allocation
page execute and read and write
2C967000
trusted library allocation
page read and write
3EA3000
trusted library allocation
page read and write
17C38000
trusted library allocation
page read and write
5B40000
heap
page read and write
5680000
heap
page read and write
3FBE000
trusted library allocation
page read and write
D50000
heap
page read and write
780E000
stack
page read and write
6200000
trusted library allocation
page execute and read and write
79B000
stack
page read and write
28D37000
trusted library allocation
page read and write
E0C000
heap
page read and write
138E000
stack
page read and write
17FAD000
trusted library allocation
page read and write
C26E000
stack
page read and write
E3B000
heap
page read and write
3C8E000
trusted library allocation
page read and write
FA2D000
stack
page read and write
1027000
heap
page read and write
D76E000
stack
page read and write
D12000
trusted library allocation
page execute and read and write
12B2D000
stack
page read and write
5270000
heap
page read and write
1186D000
stack
page read and write
2C51E000
trusted library allocation
page read and write
67BE000
stack
page read and write
3E80000
trusted library allocation
page read and write
720D000
stack
page read and write
99EE000
stack
page read and write
798D000
stack
page read and write
1162E000
stack
page read and write
EEEE000
stack
page read and write
E10000
trusted library allocation
page read and write
F30000
trusted library allocation
page read and write
6380000
heap
page read and write
EA2D000
stack
page read and write
9EEE000
stack
page read and write
10C2D000
stack
page read and write
BFEE000
stack
page read and write
101AE000
stack
page read and write
D8ED000
stack
page read and write
103E000
heap
page read and write
75CD000
stack
page read and write
DD0000
heap
page read and write
5108000
trusted library allocation
page read and write
32061000
trusted library allocation
page read and write
E7AD000
stack
page read and write
C5A000
stack
page read and write
AE6000
unkown
page readonly
43C3000
trusted library allocation
page read and write
2BEE000
stack
page read and write
5FBE000
stack
page read and write
DA2D000
stack
page read and write
4C7E000
trusted library allocation
page read and write
B12D000
stack
page read and write
4361000
trusted library allocation
page read and write
13BF000
stack
page read and write
FBAD000
stack
page read and write
48C3000
trusted library allocation
page read and write
13E0000
trusted library allocation
page read and write
A6AD000
stack
page read and write
B9EE000
stack
page read and write
F37000
trusted library allocation
page read and write
135E000
stack
page read and write
6D4D000
stack
page read and write
EC6E000
stack
page read and write
10BE000
stack
page read and write
D32000
trusted library allocation
page execute and read and write
F17000
trusted library allocation
page execute and read and write
15E0000
trusted library allocation
page read and write
93ED000
stack
page read and write
41F7000
trusted library allocation
page read and write
E00000
heap
page read and write
454D000
trusted library allocation
page read and write
C3AE000
stack
page read and write
7E4D000
stack
page read and write
966D000
stack
page read and write
153B000
trusted library allocation
page execute and read and write
517E000
stack
page read and write
CB6D000
stack
page read and write
17C93000
trusted library allocation
page read and write
C60000
heap
page read and write
FCAE000
stack
page read and write
2CA54000
trusted library allocation
page read and write
9B2E000
stack
page read and write
17982000
trusted library allocation
page read and write
5D5A000
stack
page read and write
12AEE000
stack
page read and write
17ED7000
trusted library allocation
page read and write
526D000
stack
page read and write
770E000
stack
page read and write
59BD000
stack
page read and write
DB0000
heap
page read and write
5EBD000
stack
page read and write
2CB06000
trusted library allocation
page read and write
102EE000
stack
page read and write
794D000
stack
page read and write
511E000
stack
page read and write
730D000
stack
page read and write
1240000
heap
page read and write
1410000
trusted library allocation
page read and write
DCC000
trusted library allocation
page execute and read and write
5E00000
trusted library allocation
page read and write
32594000
trusted library allocation
page read and write
B36D000
stack
page read and write
1780000
heap
page read and write
7F8D000
stack
page read and write
4B51000
trusted library allocation
page read and write
3262A000
trusted library allocation
page read and write
4B15000
trusted library allocation
page read and write
1410000
heap
page read and write
6B4E000
stack
page read and write
4DB8000
trusted library allocation
page read and write
DC6D000
stack
page read and write
FE2E000
stack
page read and write
576E000
stack
page read and write
512E000
stack
page read and write
12DAD000
stack
page read and write
D3A000
trusted library allocation
page execute and read and write
3281000
trusted library allocation
page read and write
E16D000
stack
page read and write
2C209000
trusted library allocation
page read and write
D4EE000
stack
page read and write
406E000
trusted library allocation
page read and write
F69F000
heap
page read and write
1302000
trusted library allocation
page execute and read and write
F9C000
trusted library allocation
page execute and read and write
113ED000
stack
page read and write
BEAD000
stack
page read and write
10D2D000
stack
page read and write
1310000
trusted library allocation
page read and write
55AE000
stack
page read and write
43BE000
trusted library allocation
page read and write
734D000
stack
page read and write
BB2E000
stack
page read and write
8B8D000
stack
page read and write
2CD0A000
trusted library allocation
page read and write
589D000
stack
page read and write
83CD000
stack
page read and write
2C0F000
trusted library allocation
page read and write
E62E000
stack
page read and write
878D000
stack
page read and write
4FAD000
stack
page read and write
12EAE000
stack
page read and write
1848B000
trusted library allocation
page read and write
12D6E000
stack
page read and write
D0ED000
stack
page read and write
1340000
heap
page read and write
DEED000
stack
page read and write
6F8D000
stack
page read and write
53FE000
stack
page read and write
2C01000
trusted library allocation
page read and write
5130000
heap
page read and write
2C0BC000
trusted library allocation
page read and write
10C0000
heap
page read and write
2C447000
trusted library allocation
page read and write
170E000
stack
page read and write
AC2000
unkown
page readonly
A1AD000
stack
page read and write
4F6E000
stack
page read and write
E3D000
heap
page read and write
28C7B000
trusted library allocation
page read and write
533D000
stack
page read and write
49A8000
trusted library allocation
page read and write
5ABE000
stack
page read and write
3F02000
trusted library allocation
page read and write
127E000
stack
page read and write
8BCD000
stack
page read and write
1820C000
trusted library allocation
page read and write
15CE000
stack
page read and write
5D5E000
stack
page read and write
C4EE000
stack
page read and write
F5ED000
stack
page read and write
7C0D000
stack
page read and write
567D000
stack
page read and write
EB6D000
stack
page read and write
902D000
stack
page read and write
A2AE000
stack
page read and write
4363000
trusted library allocation
page read and write
465F000
trusted library allocation
page read and write
F4AD000
stack
page read and write
E5D000
stack
page read and write
2C742000
trusted library allocation
page read and write
912D000
stack
page read and write
94ED000
stack
page read and write
5B9F000
heap
page read and write
1150000
heap
page read and write
5D7E000
stack
page read and write
DC0000
heap
page read and write
FAA000
trusted library allocation
page execute and read and write
A52E000
stack
page read and write
5050000
trusted library allocation
page execute and read and write
D62E000
stack
page read and write
7FEB000
heap
page read and write
D7AD000
stack
page read and write
585E000
stack
page read and write
F6E000
stack
page read and write
708D000
stack
page read and write
ACA000
unkown
page readonly
5E9E000
stack
page read and write
6A4E000
stack
page read and write
12BF000
stack
page read and write
416E000
trusted library allocation
page read and write
E2ED000
stack
page read and write
A7ED000
stack
page read and write
15D0000
heap
page execute and read and write
C2AE000
stack
page read and write
1176D000
stack
page read and write
F68E000
heap
page read and write
F1AD000
stack
page read and write
10B2D000
stack
page read and write
D2AD000
stack
page read and write
18502000
trusted library allocation
page read and write
D18000
trusted library allocation
page execute and read and write
5AE0000
heap
page read and write
645E000
stack
page read and write
6940000
trusted library allocation
page execute and read and write
2A6F000
stack
page read and write
178EC000
trusted library allocation
page read and write
184C7000
trusted library allocation
page read and write
B8AD000
stack
page read and write
5C5D000
stack
page read and write
516D000
stack
page read and write
1074000
heap
page read and write
5B3E000
stack
page read and write
60DE000
stack
page read and write
325D4000
trusted library allocation
page read and write
BBB000
stack
page read and write
1482000
heap
page read and write
A8EE000
stack
page read and write
550F000
stack
page read and write
129AE000
stack
page read and write
44CB000
trusted library allocation
page read and write
3E1E000
trusted library allocation
page read and write
2C391000
trusted library allocation
page read and write
100AE000
stack
page read and write
E76D000
stack
page read and write
1015000
heap
page read and write
17AEB000
trusted library allocation
page read and write
17AAF000
trusted library allocation
page read and write
B5ED000
stack
page read and write
5D9D000
stack
page read and write
12C6D000
stack
page read and write
18024000
trusted library allocation
page read and write
FEF000
stack
page read and write
DCAD000
stack
page read and write
EE0000
heap
page read and write
A56D000
stack
page read and write
FB6E000
stack
page read and write
6F4E000
stack
page read and write
7D0E000
stack
page read and write
93AD000
stack
page read and write
CF2000
trusted library allocation
page execute and read and write
CEEE000
stack
page read and write
42C8000
trusted library allocation
page read and write
1300000
heap
page read and write
7E8D000
stack
page read and write
DB6D000
stack
page read and write
4A95000
trusted library allocation
page read and write
631E000
stack
page read and write
5E7E000
stack
page read and write
B00000
heap
page read and write
10C8000
heap
page read and write
179BE000
trusted library allocation
page read and write
1308000
trusted library allocation
page execute and read and write
15EB000
trusted library allocation
page read and write
860D000
stack
page read and write
2C8EC000
trusted library allocation
page read and write
DC8000
trusted library allocation
page execute and read and write
2FF1000
trusted library allocation
page read and write
10F4000
heap
page read and write
2C487000
trusted library allocation
page read and write
D4B000
trusted library allocation
page execute and read and write
7BCD000
stack
page read and write
183F5000
trusted library allocation
page read and write
D47000
trusted library allocation
page execute and read and write
1270000
heap
page read and write
5D1C000
stack
page read and write
EF9000
stack
page read and write
3FE1000
trusted library allocation
page read and write
BC6D000
stack
page read and write
FD7000
trusted library allocation
page execute and read and write
322CC000
trusted library allocation
page read and write
1200000
heap
page read and write
4715000
trusted library allocation
page read and write
70CD000
stack
page read and write
B86D000
stack
page read and write
AF6000
stack
page read and write
BDAD000
stack
page read and write
2C27F000
trusted library allocation
page read and write
1835E000
trusted library allocation
page read and write
3231B000
trusted library allocation
page read and write
5020000
trusted library allocation
page execute and read and write
13F2000
trusted library allocation
page execute and read and write
D3ED000
stack
page read and write
6490000
heap
page read and write
577E000
stack
page read and write
42FE000
trusted library allocation
page read and write
5780000
heap
page read and write
E8AE000
stack
page read and write
EDAE000
stack
page read and write
4F1F000
stack
page read and write
5650000
trusted library allocation
page execute and read and write
575E000
stack
page read and write
2CB81000
trusted library allocation
page read and write
113B000
trusted library allocation
page read and write
E2E000
stack
page read and write
17D89000
trusted library allocation
page read and write
D9EE000
stack
page read and write
17947000
trusted library allocation
page read and write
1152D000
stack
page read and write
FA6E000
stack
page read and write
E3AD000
stack
page read and write
FCEE000
stack
page read and write
32632000
trusted library allocation
page read and write
529F000
stack
page read and write
C02D000
stack
page read and write
950000
unkown
page readonly
ACED000
stack
page read and write
3249B000
trusted library allocation
page read and write
1032D000
stack
page read and write
10EE000
stack
page read and write
8B4D000
stack
page read and write
5B3A000
heap
page read and write
3234C000
trusted library allocation
page read and write
5AFE000
stack
page read and write
5F6F000
stack
page read and write
784D000
stack
page read and write
4476000
trusted library allocation
page read and write
5B1E000
stack
page read and write
7ACD000
stack
page read and write
17BFC000
trusted library allocation
page read and write
51AF000
stack
page read and write
3C6B000
trusted library allocation
page read and write
BEED000
stack
page read and write
2C7F8000
trusted library allocation
page read and write
50AE000
stack
page read and write
1537000
trusted library allocation
page execute and read and write
EF6000
stack
page read and write
F70000
trusted library allocation
page read and write
EB0000
trusted library allocation
page read and write
744D000
stack
page read and write
1056E000
stack
page read and write
3D0C000
trusted library allocation
page read and write
E1AD000
stack
page read and write
10FAD000
stack
page read and write
FDEE000
stack
page read and write
4235000
trusted library allocation
page read and write
C66E000
stack
page read and write
1600000
heap
page read and write
4591000
trusted library allocation
page read and write
5E6E000
stack
page read and write
54ED000
stack
page read and write
C9EE000
stack
page read and write
5B84000
heap
page read and write
D1EE000
stack
page read and write
47CC000
trusted library allocation
page read and write
C90000
heap
page read and write
F5E000
heap
page read and write
128AD000
stack
page read and write
BC2D000
stack
page read and write
4267000
trusted library allocation
page read and write
5E7E000
stack
page read and write
42FD000
trusted library allocation
page read and write
2FEF000
trusted library allocation
page read and write
1402000
trusted library allocation
page execute and read and write
1330000
trusted library allocation
page read and write
5A3D000
stack
page read and write
54AE000
stack
page read and write
C95000
heap
page read and write
7F90000
heap
page read and write
F6B6000
heap
page read and write
DEA000
trusted library allocation
page execute and read and write
DEE000
stack
page read and write
8D3D000
stack
page read and write
59EE000
stack
page read and write
3157000
trusted library allocation
page read and write
DBA000
trusted library allocation
page execute and read and write
F40000
heap
page read and write
1499000
heap
page read and write
4C27000
trusted library allocation
page read and write
6E4D000
stack
page read and write
545D000
stack
page read and write
10A0000
heap
page read and write
E22000
heap
page read and write
599D000
stack
page read and write
5CBE000
stack
page read and write
4CD9000
trusted library allocation
page read and write
DB2E000
stack
page read and write
10DC000
heap
page read and write
58BF000
stack
page read and write
FF0000
heap
page read and write
5D9C000
stack
page read and write
B62D000
stack
page read and write
52B0000
trusted library allocation
page execute and read and write
4C42000
trusted library allocation
page read and write
E0E000
heap
page read and write
507D000
stack
page read and write
ADEE000
stack
page read and write
E2AD000
stack
page read and write
CE0000
trusted library allocation
page read and write
F6BD000
heap
page read and write
1332000
trusted library allocation
page execute and read and write
1807F000
trusted library allocation
page read and write
CA2D000
stack
page read and write
60FE000
stack
page read and write
59FE000
stack
page read and write
52A0000
trusted library allocation
page execute and read and write
506E000
stack
page read and write
CFED000
stack
page read and write
2CBBC000
trusted library allocation
page read and write
525D000
stack
page read and write
521E000
stack
page read and write
1172E000
stack
page read and write
152A000
trusted library allocation
page execute and read and write
621E000
stack
page read and write
145E000
stack
page read and write
4299000
trusted library allocation
page read and write
11FF000
stack
page read and write
F02F000
stack
page read and write
A3EE000
stack
page read and write
40E2000
trusted library allocation
page read and write
66BE000
stack
page read and write
12FA000
trusted library allocation
page execute and read and write
42DB000
trusted library allocation
page read and write
E4EE000
stack
page read and write
53BE000
stack
page read and write
45F3000
trusted library allocation
page read and write
3EC2000
trusted library allocation
page read and write
2CA90000
trusted library allocation
page read and write
32399000
trusted library allocation
page read and write
2C610000
trusted library allocation
page read and write
AA6E000
stack
page read and write
42AD000
trusted library allocation
page read and write
5ADE000
stack
page read and write
562E000
stack
page read and write
5DBE000
stack
page read and write
C16D000
stack
page read and write
5B7E000
stack
page read and write
BE0000
heap
page read and write
BD6D000
stack
page read and write
7F7B0000
trusted library allocation
page execute and read and write
2C855000
trusted library allocation
page read and write
139ED000
stack
page read and write
88CD000
stack
page read and write
140C000
trusted library allocation
page execute and read and write
EF7000
trusted library allocation
page execute and read and write
E82000
heap
page read and write
864D000
stack
page read and write
5AEF000
stack
page read and write
10DE000
heap
page read and write
C8AE000
stack
page read and write
7FB000
stack
page read and write
F70000
heap
page read and write
2DBE000
stack
page read and write
14A0000
heap
page read and write
125D000
stack
page read and write
DB2000
trusted library allocation
page execute and read and write
D26D000
stack
page read and write
4121000
trusted library allocation
page read and write
DFB000
trusted library allocation
page execute and read and write
17F32000
trusted library allocation
page read and write
2C9E2000
trusted library allocation
page read and write
17F8D000
trusted library allocation
page read and write
55EE000
stack
page read and write
5FAD000
stack
page read and write
58A0000
heap
page read and write
A66E000
stack
page read and write
D9E000
stack
page read and write
2A056000
trusted library allocation
page read and write
8FBD000
stack
page read and write
F1B000
trusted library allocation
page execute and read and write
D66D000
stack
page read and write
97AD000
stack
page read and write
3E45000
trusted library allocation
page read and write
F80000
heap
page read and write
5C7E000
stack
page read and write
635E000
stack
page read and write
1170000
trusted library allocation
page read and write
14F0000
heap
page read and write
4E1E000
stack
page read and write
3271000
trusted library allocation
page read and write
C30000
heap
page read and write
12BE000
stack
page read and write
5FFE000
stack
page read and write
DDED000
stack
page read and write
61EE000
stack
page read and write
916E000
stack
page read and write
758E000
stack
page read and write
4101000
trusted library allocation
page read and write
54BD000
stack
page read and write
FDB000
trusted library allocation
page execute and read and write
9A2D000
stack
page read and write
567D000
stack
page read and write
543D000
stack
page read and write
888D000
stack
page read and write
3FBE000
trusted library allocation
page read and write
14D0000
trusted library allocation
page read and write
1420000
trusted library allocation
page read and write
952D000
stack
page read and write
113AD000
stack
page read and write
A92E000
stack
page read and write
4DD0000
heap
page read and write
4205000
trusted library allocation
page read and write
2C11000
trusted library allocation
page read and write
14BC000
stack
page read and write
17E60000
trusted library allocation
page read and write
F8A000
trusted library allocation
page execute and read and write
586F000
stack
page read and write
110EE000
stack
page read and write
DF2D000
stack
page read and write
AA2E000
stack
page read and write
4A23000
trusted library allocation
page read and write
DF8000
heap
page read and write
DF0000
heap
page read and write
134B000
trusted library allocation
page execute and read and write
401F000
trusted library allocation
page read and write
623E000
stack
page read and write
6321000
heap
page read and write
FC0000
heap
page execute and read and write
60AE000
stack
page read and write
CCAD000
stack
page read and write
C12E000
stack
page read and write
A16E000
stack
page read and write
D22D000
stack
page read and write
D52D000
stack
page read and write
2F8A000
trusted library allocation
page read and write
667A000
stack
page read and write
B60000
heap
page read and write
1408000
trusted library allocation
page execute and read and write
5EA0000
heap
page read and write
5C3E000
stack
page read and write
FB2000
trusted library allocation
page execute and read and write
E17000
heap
page read and write
17FE9000
trusted library allocation
page read and write
10F6000
stack
page read and write
13DE000
stack
page read and write
100E000
heap
page read and write
2DB1000
trusted library allocation
page read and write
503D000
stack
page read and write
F0A000
trusted library allocation
page execute and read and write
C62E000
stack
page read and write
5B3E000
stack
page read and write
17E9C000
trusted library allocation
page read and write
ABAD000
stack
page read and write
1000000
heap
page read and write
1839A000
trusted library allocation
page read and write
952000
unkown
page readonly
F62D000
stack
page read and write
E10000
heap
page read and write
FBA000
trusted library allocation
page execute and read and write
E52D000
stack
page read and write
ACAD000
stack
page read and write
17E40000
trusted library allocation
page read and write
2C132000
trusted library allocation
page read and write
F16D000
stack
page read and write
98AD000
stack
page read and write
5A3E000
stack
page read and write
CDAE000
stack
page read and write
76CD000
stack
page read and write
2CD65000
trusted library allocation
page read and write
141A000
trusted library allocation
page execute and read and write
2FE1000
trusted library allocation
page read and write
6C4E000
stack
page read and write
2CACB000
trusted library allocation
page read and write
9CAD000
stack
page read and write
12F2000
trusted library allocation
page execute and read and write
45C8000
trusted library allocation
page read and write
2CC73000
trusted library allocation
page read and write
18176000
trusted library allocation
page read and write
AFF0000
heap
page read and write
92AD000
stack
page read and write
2C336000
trusted library allocation
page read and write
323DD000
trusted library allocation
page read and write
14E0000
trusted library allocation
page execute and read and write
ED2000
trusted library allocation
page execute and read and write
118AE000
stack
page read and write
AF6000
stack
page read and write
D66000
stack
page read and write
181B1000
trusted library allocation
page read and write
D00000
heap
page read and write
1760000
trusted library allocation
page read and write
8D7D000
stack
page read and write
71CD000
stack
page read and write
1023000
heap
page read and write
3221B000
trusted library allocation
page read and write
59DE000
stack
page read and write
F58000
heap
page read and write
579D000
stack
page read and write
129ED000
stack
page read and write
C7E000
stack
page read and write
2C18E000
trusted library allocation
page read and write
54C0000
heap
page read and write
13E0000
trusted library allocation
page read and write
2C5D4000
trusted library allocation
page read and write
1420000
heap
page read and write
119AE000
stack
page read and write
9DAE000
stack
page read and write
61DE000
stack
page read and write
E02D000
stack
page read and write
58AE000
stack
page read and write
D6F000
stack
page read and write
E8ED000
stack
page read and write
E3ED000
stack
page read and write
BAED000
stack
page read and write
12DD000
stack
page read and write
9F2D000
stack
page read and write
962D000
stack
page read and write
1320000
heap
page read and write
417C000
trusted library allocation
page read and write
3229B000
trusted library allocation
page read and write
2C264000
trusted library allocation
page read and write
E66D000
stack
page read and write
124E000
stack
page read and write
E06D000
stack
page read and write
17D2E000
trusted library allocation
page read and write
B22D000
stack
page read and write
112E000
stack
page read and write
5340000
heap
page read and write
4F4E000
stack
page read and write
8A0D000
stack
page read and write
55AF000
heap
page read and write
1428000
heap
page read and write
567D000
stack
page read and write
5DE0000
trusted library allocation
page execute and read and write
84CD000
stack
page read and write
F98000
trusted library allocation
page execute and read and write
2D6E000
trusted library allocation
page read and write
572F000
stack
page read and write
8E7E000
stack
page read and write
59FE000
stack
page read and write
5410000
trusted library allocation
page execute and read and write
2DC1000
trusted library allocation
page read and write
C3EE000
stack
page read and write
58FE000
stack
page read and write
874D000
stack
page read and write
180BF000
trusted library allocation
page read and write
3E1B000
trusted library allocation
page read and write
3F9B000
trusted library allocation
page read and write
105AE000
stack
page read and write
575F000
stack
page read and write
D56000
stack
page read and write
42E8000
trusted library allocation
page read and write
5BFE000
stack
page read and write
DF7000
trusted library allocation
page execute and read and write
18303000
trusted library allocation
page read and write
1122E000
stack
page read and write
4A59000
trusted library allocation
page read and write
EC2000
trusted library allocation
page execute and read and write
416B000
trusted library allocation
page read and write
41D2000
trusted library allocation
page read and write
E36D000
stack
page read and write
105E000
stack
page read and write
53AD000
stack
page read and write
992000
unkown
page readonly
DF0000
heap
page read and write
CB2E000
stack
page read and write
121E000
stack
page read and write
9DED000
stack
page read and write
1180000
trusted library allocation
page execute and read and write
3DB1000
trusted library allocation
page read and write
ECAD000
stack
page read and write
1530000
trusted library allocation
page read and write
89CD000
stack
page read and write
DC2000
trusted library allocation
page execute and read and write
10EAD000
stack
page read and write
12E0000
trusted library allocation
page read and write
100A000
heap
page read and write
131A000
trusted library allocation
page execute and read and write
553E000
stack
page read and write
CDED000
stack
page read and write
1347000
trusted library allocation
page execute and read and write
174E000
stack
page read and write
56BE000
stack
page read and write
10FED000
stack
page read and write
613E000
stack
page read and write
D8AE000
stack
page read and write
F92000
trusted library allocation
page execute and read and write
B72D000
stack
page read and write
129D000
stack
page read and write
2C1C9000
trusted library allocation
page read and write
4143000
trusted library allocation
page read and write
1452000
heap
page read and write
5B5E000
heap
page read and write
1136E000
stack
page read and write
E6A000
heap
page read and write
E52000
heap
page read and write
4406000
trusted library allocation
page read and write
1258000
trusted library allocation
page read and write
57BE000
stack
page read and write
2CBF8000
trusted library allocation
page read and write
563E000
stack
page read and write
1025000
heap
page read and write
4FE0000
heap
page read and write
3D4A000
trusted library allocation
page read and write
F43000
heap
page read and write
2FAF000
trusted library allocation
page read and write
850D000
stack
page read and write
540F000
stack
page read and write
525D000
stack
page read and write
DEB000
stack
page read and write
B26D000
stack
page read and write
DA0000
trusted library allocation
page read and write
57BD000
stack
page read and write
1811B000
trusted library allocation
page read and write
40E5000
trusted library allocation
page read and write
3DE7000
trusted library allocation
page read and write
1290000
trusted library allocation
page execute and read and write
4489000
trusted library allocation
page read and write
7A8D000
stack
page read and write
F50000
heap
page read and write
157E000
stack
page read and write
2C579000
trusted library allocation
page read and write
2C8B1000
trusted library allocation
page read and write
3DA9000
trusted library allocation
page read and write
58BE000
stack
page read and write
8EBD000
stack
page read and write
E20000
heap
page read and write
103D000
heap
page read and write
4C08000
trusted library allocation
page read and write
17BC1000
trusted library allocation
page read and write
589D000
stack
page read and write
17871000
trusted library allocation
page read and write
5D7D000
stack
page read and write
F30000
heap
page read and write
17DE5000
trusted library allocation
page read and write
52F0000
trusted library allocation
page execute and read and write
E40000
heap
page read and write
CFA000
trusted library allocation
page execute and read and write
577E000
stack
page read and write
1060000
heap
page read and write
B9AD000
stack
page read and write
E80000
heap
page read and write
C2E000
stack
page read and write
B3AD000
stack
page read and write
1250000
trusted library allocation
page read and write
4360000
trusted library allocation
page read and write
5E10000
unclassified section
page read and write
A02E000
stack
page read and write
EFA000
trusted library allocation
page execute and read and write
60ED000
stack
page read and write
1340000
trusted library allocation
page read and write
40AA000
trusted library allocation
page read and write
45A8000
trusted library allocation
page read and write
B4AD000
stack
page read and write
5C1E000
stack
page read and write
C8ED000
stack
page read and write
17A19000
trusted library allocation
page read and write
10D6D000
stack
page read and write
143E000
heap
page read and write
2C66B000
trusted library allocation
page read and write
DDA000
trusted library allocation
page execute and read and write
990000
unkown
page readonly
17A54000
trusted library allocation
page read and write
748D000
stack
page read and write
4B8C000
trusted library allocation
page read and write
5EFF000
stack
page read and write
41A4000
trusted library allocation
page read and write
17CD3000
trusted library allocation
page read and write
13AEE000
stack
page read and write
167D000
stack
page read and write
B4ED000
stack
page read and write
1137000
trusted library allocation
page read and write
C6B000
stack
page read and write
28B8E000
trusted library allocation
page read and write
454E000
trusted library allocation
page read and write
1046E000
stack
page read and write
FF2E000
stack
page read and write
657C000
stack
page read and write
12FB000
trusted library allocation
page read and write
5540000
heap
page read and write
976D000
stack
page read and write
4080000
trusted library allocation
page read and write
4D9E000
stack
page read and write
14F7000
heap
page read and write
3F31000
trusted library allocation
page read and write
2C707000
trusted library allocation
page read and write
5470000
heap
page read and write
104E000
heap
page read and write
17B61000
trusted library allocation
page read and write
55AB000
heap
page read and write
A2ED000
stack
page read and write
C7AD000
stack
page read and write
F02000
trusted library allocation
page execute and read and write
131D000
stack
page read and write
5DF0000
trusted library allocation
page read and write
32692000
trusted library allocation
page read and write
EF2E000
stack
page read and write
6347000
heap
page read and write
D3AE000
stack
page read and write
6270000
heap
page read and write
18267000
trusted library allocation
page read and write
16A0000
heap
page execute and read and write
1006E000
stack
page read and write
5DDC000
stack
page read and write
5D3E000
stack
page read and write
182C8000
trusted library allocation
page read and write
8C3D000
stack
page read and write
A06D000
stack
page read and write
1042E000
stack
page read and write
EE7000
heap
page read and write
CC6E000
stack
page read and write
12F7000
trusted library allocation
page read and write
E28000
heap
page read and write
4271000
trusted library allocation
page read and write
557F000
stack
page read and write
E17000
trusted library allocation
page read and write
1770000
trusted library allocation
page execute and read and write
5ADE000
stack
page read and write
17B26000
trusted library allocation
page read and write
F92D000
stack
page read and write
1430000
trusted library allocation
page execute and read and write
12F0000
trusted library allocation
page read and write
10E6D000
stack
page read and write
AEF0000
heap
page read and write
D1C000
trusted library allocation
page execute and read and write
C80000
heap
page read and write
603E000
stack
page read and write
1005000
heap
page read and write
C76E000
stack
page read and write
4FDD000
stack
page read and write
2CDC0000
trusted library allocation
page read and write
539F000
stack
page read and write
133A000
trusted library allocation
page execute and read and write
1522000
trusted library allocation
page execute and read and write
6230000
heap
page read and write
C65000
heap
page read and write
51B0000
trusted library allocation
page execute and read and write
E1B000
trusted library allocation
page read and write
3C01000
trusted library allocation
page read and write
1150000
heap
page read and write
3224C000
trusted library allocation
page read and write
15E7000
trusted library allocation
page read and write
AE2000
unkown
page readonly
1275000
heap
page read and write
F5AD000
stack
page read and write
D2A000
trusted library allocation
page execute and read and write
50DD000
stack
page read and write
98ED000
stack
page read and write
59DD000
stack
page read and write
A7AE000
stack
page read and write
9B6D000
stack
page read and write
11C0000
heap
page execute and read and write
12C2E000
stack
page read and write
323CC000
trusted library allocation
page read and write
1280000
trusted library allocation
page read and write
58FD000
stack
page read and write
8042000
heap
page read and write
F2AE000
stack
page read and write
3F60000
trusted library allocation
page read and write
327F000
trusted library allocation
page read and write
18430000
trusted library allocation
page read and write
DE0000
heap
page read and write
404B000
trusted library allocation
page read and write
C52D000
stack
page read and write
F5E000
stack
page read and write
326B6000
trusted library allocation
page read and write
F12000
trusted library allocation
page read and write
106AE000
stack
page read and write
5F3E000
stack
page read and write
There are 910 hidden memdumps, click here to show them.