IOC Report
7632e569071acc40bce87af592e4cc2476d9c088906a1.exe

loading gif

Files

File Path
Type
Category
Malicious
7632e569071acc40bce87af592e4cc2476d9c088906a1.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Local\Temp\154571\Eco.pif
PE32 executable (GUI) Intel 80386, for MS Windows
modified
malicious
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\RegAsm.exe.log
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\154571\RegAsm.exe
PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\154571\i
OpenPGP Secret Key
dropped
C:\Users\user\AppData\Local\Temp\Allah
data
dropped
C:\Users\user\AppData\Local\Temp\April
data
dropped
C:\Users\user\AppData\Local\Temp\Bass
OpenPGP Public Key
dropped
C:\Users\user\AppData\Local\Temp\Blake
data
dropped
C:\Users\user\AppData\Local\Temp\Category
data
dropped
C:\Users\user\AppData\Local\Temp\Compete
data
dropped
C:\Users\user\AppData\Local\Temp\Compile
data
dropped
C:\Users\user\AppData\Local\Temp\Concentration
OpenPGP Secret Key
dropped
C:\Users\user\AppData\Local\Temp\Correctly
data
dropped
C:\Users\user\AppData\Local\Temp\Ever
data
dropped
C:\Users\user\AppData\Local\Temp\Fellowship
data
dropped
C:\Users\user\AppData\Local\Temp\Founder
data
dropped
C:\Users\user\AppData\Local\Temp\Glasses
data
dropped
C:\Users\user\AppData\Local\Temp\Humor
ASCII text, with very long lines (408), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\Humor.cmd
ASCII text, with very long lines (408), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\Hz
data
dropped
C:\Users\user\AppData\Local\Temp\Intro
data
dropped
C:\Users\user\AppData\Local\Temp\Located
data
dropped
C:\Users\user\AppData\Local\Temp\Lt
OpenPGP Secret Key
dropped
C:\Users\user\AppData\Local\Temp\Miniature
data
dropped
C:\Users\user\AppData\Local\Temp\Nd
PDP-11 overlaid pure executable
dropped
C:\Users\user\AppData\Local\Temp\Optimize
data
dropped
C:\Users\user\AppData\Local\Temp\Pepper
data
dropped
C:\Users\user\AppData\Local\Temp\Pontiac
data
dropped
C:\Users\user\AppData\Local\Temp\Precipitation
data
dropped
C:\Users\user\AppData\Local\Temp\Previously
data
dropped
C:\Users\user\AppData\Local\Temp\Purchasing
data
dropped
C:\Users\user\AppData\Local\Temp\Scary
data
dropped
C:\Users\user\AppData\Local\Temp\Se
data
dropped
C:\Users\user\AppData\Local\Temp\Seek
data
dropped
C:\Users\user\AppData\Local\Temp\Sic
data
dropped
C:\Users\user\AppData\Local\Temp\Technologies
data
dropped
C:\Users\user\AppData\Local\Temp\Tion
data
dropped
C:\Users\user\AppData\Local\Temp\Tranny
data
dropped
There are 29 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\7632e569071acc40bce87af592e4cc2476d9c088906a1.exe
"C:\Users\user\Desktop\7632e569071acc40bce87af592e4cc2476d9c088906a1.exe"
malicious
C:\Windows\SysWOW64\cmd.exe
"C:\Windows\System32\cmd.exe" /k copy Humor Humor.cmd & Humor.cmd & exit
malicious
C:\Windows\SysWOW64\findstr.exe
findstr /I "wrsa.exe opssvc.exe"
malicious
C:\Windows\SysWOW64\findstr.exe
findstr /I "avastui.exe avgui.exe bdservicehost.exe nswscsvc.exe sophoshealth.exe"
malicious
C:\Windows\SysWOW64\cmd.exe
cmd /c md 154571
malicious
C:\Windows\SysWOW64\findstr.exe
findstr /V "TRUEANALOGMINDOC" Pepper
malicious
C:\Windows\SysWOW64\cmd.exe
cmd /c copy /b Lt + Blake + Tranny + Category 154571\i
malicious
C:\Users\user\AppData\Local\Temp\154571\Eco.pif
154571\Eco.pif 154571\i
malicious
C:\Users\user\AppData\Local\Temp\154571\RegAsm.exe
C:\Users\user\AppData\Local\Temp\154571\RegAsm.exe
malicious
C:\Users\user\AppData\Local\Temp\154571\RegAsm.exe
C:\Users\user\AppData\Local\Temp\154571\RegAsm.exe
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\tasklist.exe
tasklist
C:\Windows\SysWOW64\tasklist.exe
tasklist
C:\Windows\SysWOW64\timeout.exe
timeout 5
There are 4 hidden processes, click here to show them.

URLs

Name
IP
Malicious
45.140.147.183:12245
malicious
http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-soap-message-security-1.0#Text
unknown
http://schemas.xmlsoap.org/ws/2005/02/sc/sct
unknown
http://schemas.xmlsoap.org/ws/2004/04/security/sc/dk
unknown
http://tempuri.org/Entity/Id14ResponseD
unknown
http://tempuri.org/Entity/Id23ResponseD
unknown
http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-soap-message-security-1.0#HexBinary
unknown
http://tempuri.org/Entity/Id12Response
unknown
http://tempuri.org/
unknown
http://tempuri.org/Entity/Id2Response
unknown
http://schemas.xmlsoap.org/ws/2005/02/sc/dk/p_sha1
unknown
http://tempuri.org/Entity/Id21Response
unknown
http://schemas.xmlsoap.org/2005/02/trust/spnego#GSS_Wrap
unknown
http://tempuri.org/Entity/Id9
unknown
http://docs.oasis-open.org/wss/oasis-wss-saml-token-profile-1.1#SAMLID
unknown
http://tempuri.org/Entity/Id8
unknown
http://tempuri.org/Entity/Id6ResponseD
unknown
http://tempuri.org/Entity/Id5
unknown
http://schemas.xmlsoap.org/ws/2004/10/wsat/Prepare
unknown
http://tempuri.org/Entity/Id4
unknown
http://tempuri.org/Entity/Id7
unknown
http://tempuri.org/Entity/Id6
unknown
http://schemas.xmlsoap.org/ws/2005/02/trust#BinarySecret
unknown
http://tempuri.org/Entity/Id19Response
unknown
http://docs.oasis-open.org/wss/oasis-wss-rel-token-profile-1.0.pdf#license
unknown
http://schemas.xmlsoap.org/ws/2005/02/trust/RSTR/Issue
unknown
http://schemas.xmlsoap.org/ws/2004/10/wsat/Aborted
unknown
http://schemas.xmlsoap.org/ws/2005/02/rm/TerminateSequence
unknown
http://tempuri.org/Entity/Id13ResponseD
unknown
http://schemas.xmlsoap.org/ws/2004/10/wsat/fault
unknown
http://schemas.xmlsoap.org/ws/2004/10/wsat
unknown
http://docs.oasis-open.org/wss/oasis-wss-soap-message-security-1.1#EncryptedKey
unknown
http://tempuri.org/Entity/Id15Response
unknown
http://tempuri.org/Entity/Id5ResponseD
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
http://schemas.xmlsoap.org/ws/2005/02/trust/RSTR/SCT/Renew
unknown
http://schemas.xmlsoap.org/ws/2004/10/wscoor/Register
unknown
http://tempuri.org/Entity/Id6Response
unknown
http://schemas.xmlsoap.org/ws/2004/04/trust/SymmetricKey
unknown
http://www.autoitscript.com/autoit3/J
unknown
https://api.ip.sb/ip
unknown
http://schemas.xmlsoap.org/ws/2004/04/sc
unknown
http://tempuri.org/Entity/Id1ResponseD
unknown
http://schemas.xmlsoap.org/ws/2004/10/wsat/Volatile2PC
unknown
http://schemas.xmlsoap.org/ws/2005/02/trust/RSTR/SCT/Cancel
unknown
http://tempuri.org/Entity/Id9Response
unknown
http://tempuri.org/Entity/Id20
unknown
http://tempuri.org/Entity/Id21
unknown
http://tempuri.org/Entity/Id22
unknown
http://docs.oasis-open.org/wss/oasis-wss-kerberos-token-profile-1.1#Kerberosv5APREQSHA1
unknown
http://tempuri.org/Entity/Id23
unknown
http://nsis.sf.net/NSIS_ErrorError
unknown
http://schemas.xmlsoap.org/ws/2004/04/security/trust/CK/PSHA1
unknown
http://tempuri.org/Entity/Id24
unknown
http://schemas.xmlsoap.org/ws/2004/04/security/trust/RSTR/Issue
unknown
http://tempuri.org/Entity/Id24Response
unknown
http://tempuri.org/Entity/Id1Response
unknown
http://schemas.xmlsoap.org/ws/2005/02/rm/AckRequested
unknown
http://schemas.xmlsoap.org/ws/2004/10/wsat/ReadOnly
unknown
http://schemas.xmlsoap.org/ws/2004/10/wsat/Replay
unknown
http://schemas.xmlsoap.org/ws/2005/02/trust/tlsnego
unknown
http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-soap-message-security-1.0#Base64Binary
unknown
http://schemas.xmlsoap.org/ws/2004/10/wsat/Durable2PC
unknown
http://schemas.xmlsoap.org/ws/2004/04/security/trust/SymmetricKey
unknown
http://tempuri.org/Entity/Id21ResponseD
unknown
http://schemas.xmlsoap.org/ws/2004/08/addressing
unknown
http://schemas.xmlsoap.org/ws/2005/02/trust/RST/Issue
unknown
http://schemas.xmlsoap.org/ws/2004/10/wsat/Completion
unknown
http://schemas.xmlsoap.org/ws/2004/04/trust
unknown
http://tempuri.org/Entity/Id10
unknown
http://tempuri.org/Entity/Id11
unknown
http://tempuri.org/Entity/Id10ResponseD
unknown
http://tempuri.org/Entity/Id12
unknown
http://tempuri.org/Entity/Id16Response
unknown
http://schemas.xmlsoap.org/ws/2004/10/wscoor/CreateCoordinationContextResponse
unknown
http://schemas.xmlsoap.org/ws/2005/02/trust/RST/SCT/Cancel
unknown
http://tempuri.org/Entity/Id13
unknown
http://tempuri.org/Entity/Id14
unknown
http://tempuri.org/Entity/Id15
unknown
http://tempuri.org/Entity/Id16
unknown
http://schemas.xmlsoap.org/ws/2005/02/trust/Nonce
unknown
http://tempuri.org/Entity/Id17
unknown
http://tempuri.org/Entity/Id18
unknown
http://tempuri.org/Entity/Id5Response
unknown
http://tempuri.org/Entity/Id19
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/dns
unknown
http://tempuri.org/Entity/Id15ResponseD
unknown
http://tempuri.org/Entity/Id10Response
unknown
http://schemas.xmlsoap.org/ws/2005/02/trust/Renew
unknown
http://tempuri.org/Entity/Id11ResponseD
unknown
http://tempuri.org/Entity/Id8Response
unknown
http://schemas.xmlsoap.org/ws/2004/04/trust/PublicKey
unknown
http://docs.oasis-open.org/wss/oasis-wss-saml-token-profile-1.1#SAMLV2.0
unknown
http://docs.oasis-open.org/wss/oasis-wss-saml-token-profile-1.0#SAMLAssertionID
unknown
http://schemas.xmlsoap.org/ws/2004/04/security/trust/RST/SCT
unknown
http://schemas.xmlsoap.org/ws/2006/02/addressingidentity
unknown
http://tempuri.org/Entity/Id17ResponseD
unknown
http://schemas.xmlsoap.org/soap/envelope/
unknown
http://tempuri.org/Entity/Id8ResponseD
unknown
http://schemas.xmlsoap.org/ws/2005/02/trust/PublicKey
unknown
There are 90 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
WTYoyXMgGLmyIq.WTYoyXMgGLmyIq
unknown

IPs

IP
Domain
Country
Malicious
45.140.147.183
unknown
United Kingdom
malicious

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
Owner
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
SessionHash
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
Sequence
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
RegFiles0000
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
RegFilesHash

Memdumps

Base Address
Regiontype
Protect
Malicious
4131000
trusted library allocation
page read and write
malicious
4C71000
trusted library allocation
page read and write
malicious
5111000
trusted library allocation
page read and write
malicious
4BE4000
trusted library allocation
page read and write
malicious
4C71000
trusted library allocation
page read and write
malicious
4B43000
trusted library allocation
page read and write
malicious
4A71000
trusted library allocation
page read and write
malicious
41B3000
trusted library allocation
page read and write
malicious
3319000
trusted library allocation
page read and write
malicious
4A71000
trusted library allocation
page read and write
malicious
4BE4000
trusted library allocation
page read and write
malicious
4B43000
trusted library allocation
page read and write
malicious
4BE4000
trusted library allocation
page read and write
malicious
4AB1000
trusted library allocation
page read and write
malicious
1302000
remote allocation
page execute and read and write
malicious
4B44000
trusted library allocation
page read and write
malicious
4BE4000
trusted library allocation
page read and write
malicious
4ABB000
trusted library allocation
page read and write
malicious
4A71000
trusted library allocation
page read and write
malicious
4BE4000
trusted library allocation
page read and write
malicious
5113000
trusted library allocation
page read and write
malicious
4ABB000
trusted library allocation
page read and write
malicious
AEE000
stack
page read and write
1ACB000
heap
page read and write
1714000
heap
page read and write
184A000
heap
page read and write
1917000
heap
page read and write
1680000
trusted library allocation
page read and write
4135000
trusted library allocation
page read and write
519F000
trusted library allocation
page read and write
28DD000
heap
page read and write
5E5000
heap
page read and write
1A08000
heap
page read and write
37CC000
trusted library allocation
page read and write
1A24000
heap
page read and write
17D1000
heap
page read and write
6434000
heap
page read and write
176F000
heap
page read and write
C28000
unkown
page readonly
3524000
trusted library allocation
page read and write
37D3000
trusted library allocation
page read and write
1584000
heap
page read and write
5875000
trusted library allocation
page read and write
1AEB000
heap
page read and write
3711000
heap
page read and write
18F8000
heap
page read and write
17DD000
heap
page read and write
59F000
heap
page read and write
4F1D000
trusted library allocation
page read and write
56D0000
trusted library allocation
page execute and read and write
1904000
heap
page read and write
5C7000
heap
page read and write
5075000
trusted library allocation
page read and write
1810000
heap
page read and write
3886000
trusted library allocation
page read and write
1943000
heap
page read and write
1AEE000
heap
page read and write
1AEA000
heap
page read and write
175D000
heap
page read and write
4A71000
trusted library allocation
page read and write
705E000
stack
page read and write
37BA000
trusted library allocation
page read and write
5B3000
heap
page read and write
59F000
heap
page read and write
17C3000
heap
page read and write
4576000
trusted library allocation
page read and write
5B3000
heap
page read and write
1A48000
heap
page read and write
188A000
heap
page read and write
28D3000
heap
page read and write
1A45000
heap
page read and write
1557000
trusted library allocation
page execute and read and write
3711000
heap
page read and write
5C7000
heap
page read and write
6401000
heap
page read and write
4AB1000
trusted library allocation
page read and write
19E5000
heap
page read and write
7330000
trusted library allocation
page read and write
511B000
trusted library allocation
page read and write
507F000
trusted library allocation
page read and write
4A71000
trusted library allocation
page read and write
4CBB000
trusted library allocation
page read and write
73D0000
trusted library allocation
page execute and read and write
14D0000
trusted library allocation
page read and write
425F000
trusted library allocation
page read and write
357B000
trusted library allocation
page read and write
1715000
heap
page read and write
3711000
heap
page read and write
5C7000
heap
page read and write
323E000
stack
page read and write
3700000
trusted library allocation
page read and write
35C5000
trusted library allocation
page read and write
5AB000
heap
page read and write
3711000
heap
page read and write
3711000
heap
page read and write
176E000
heap
page read and write
710000
heap
page read and write
4517000
trusted library allocation
page read and write
17D1000
heap
page read and write
1995000
heap
page read and write
3711000
heap
page read and write
5C7000
heap
page read and write
3711000
heap
page read and write
41F000
unkown
page read and write
78AF000
stack
page read and write
BF0000
unkown
page readonly
59F000
heap
page read and write
5B55000
trusted library allocation
page read and write
3711000
heap
page read and write
1788000
heap
page read and write
E1F000
stack
page read and write
170F000
heap
page read and write
3389000
trusted library allocation
page read and write
5B3000
heap
page read and write
63E8000
heap
page read and write
5B3000
heap
page read and write
4171000
trusted library allocation
page read and write
4BAD000
trusted library allocation
page read and write
4BE4000
trusted library allocation
page read and write
28DD000
heap
page read and write
3711000
heap
page read and write
72CD000
stack
page read and write
75A000
heap
page read and write
4153000
trusted library allocation
page read and write
3098000
trusted library allocation
page read and write
28DE000
heap
page read and write
180B000
heap
page read and write
715C000
stack
page read and write
7F270000
trusted library allocation
page execute and read and write
36D4000
trusted library allocation
page read and write
5117000
trusted library allocation
page read and write
1737000
heap
page read and write
1760000
heap
page read and write
511A000
trusted library allocation
page read and write
17D1000
heap
page read and write
E5E000
stack
page read and write
17FA000
heap
page read and write
1950000
heap
page read and write
3130000
heap
page execute and read and write
3726000
trusted library allocation
page read and write
19DA000
heap
page read and write
3711000
heap
page read and write
28DA000
heap
page read and write
1AD7000
heap
page read and write
5B70000
trusted library allocation
page read and write
722A000
trusted library allocation
page read and write
5104000
trusted library allocation
page read and write
361B000
trusted library allocation
page read and write
5AB000
heap
page read and write
4144000
trusted library allocation
page read and write
5B60000
trusted library allocation
page read and write
352D000
trusted library allocation
page read and write
4CBB000
trusted library allocation
page read and write
17D1000
heap
page read and write
B60000
unkown
page readonly
5102000
trusted library allocation
page read and write
5AB000
heap
page read and write
3711000
heap
page read and write
342B000
trusted library allocation
page read and write
1A6C000
heap
page read and write
4554000
trusted library allocation
page read and write
5AB000
heap
page read and write
1742000
heap
page read and write
1AEE000
heap
page read and write
D90000
heap
page read and write
28D2000
heap
page read and write
1540000
trusted library allocation
page read and write
4AFB000
trusted library allocation
page read and write
C1F000
unkown
page read and write
6880000
heap
page read and write
59F000
heap
page read and write
180A000
heap
page read and write
4131000
trusted library allocation
page read and write
19FA000
heap
page read and write
19EB000
heap
page read and write
1724000
heap
page read and write
573E000
trusted library allocation
page read and write
194F000
heap
page read and write
1510000
heap
page read and write
1712000
heap
page read and write
9D0000
heap
page read and write
820000
heap
page read and write
BF0000
unkown
page readonly
6EF000
stack
page read and write
1542000
trusted library allocation
page read and write
28D2000
heap
page read and write
378D000
trusted library allocation
page read and write
59F000
heap
page read and write
1715000
heap
page read and write
461000
unkown
page read and write
17D2000
heap
page read and write
71B3000
trusted library allocation
page read and write
5B0A000
trusted library allocation
page read and write
9B000
stack
page read and write
95E000
stack
page read and write
59F000
heap
page read and write
360D000
trusted library allocation
page read and write
22E0000
heap
page read and write
28DB000
heap
page read and write
176E000
heap
page read and write
ACF000
stack
page read and write
1584000
heap
page read and write
35FC000
trusted library allocation
page read and write
17E3000
heap
page read and write
17D1000
heap
page read and write
217E000
stack
page read and write
5C90000
trusted library allocation
page read and write
17E3000
heap
page read and write
5B3000
heap
page read and write
17D1000
heap
page read and write
153D000
trusted library allocation
page execute and read and write
825000
heap
page read and write
718000
heap
page read and write
8AE000
stack
page read and write
19B9000
heap
page read and write
19F8000
heap
page read and write
7A9C000
stack
page read and write
1769000
heap
page read and write
28D1000
heap
page read and write
1ACB000
heap
page read and write
5073000
trusted library allocation
page read and write
3711000
heap
page read and write
5C7000
heap
page read and write
660E000
stack
page read and write
2F4E000
stack
page read and write
3635000
trusted library allocation
page read and write
176E000
heap
page read and write
1717000
heap
page read and write
5154000
trusted library allocation
page read and write
5AB000
heap
page read and write
17AC000
heap
page read and write
1836000
heap
page read and write
1AB3000
heap
page read and write
59F000
heap
page read and write
72D000
heap
page read and write
6456000
heap
page read and write
196D000
heap
page read and write
408000
unkown
page readonly
CE000
unkown
page readonly
182B000
heap
page read and write
2380000
heap
page read and write
1485000
heap
page read and write
18DB000
heap
page read and write
1946000
heap
page read and write
AF0000
heap
page read and write
28DC000
heap
page read and write
4B83000
trusted library allocation
page read and write
3240000
heap
page read and write
1A78000
heap
page read and write
1714000
heap
page read and write
5B3000
heap
page read and write
4524000
trusted library allocation
page read and write
3711000
heap
page read and write
1787000
heap
page read and write
18A3000
heap
page read and write
5C7000
heap
page read and write
3711000
heap
page read and write
3711000
heap
page read and write
762A000
heap
page read and write
C1F000
unkown
page write copy
3605000
trusted library allocation
page read and write
1943000
heap
page read and write
5B20000
heap
page read and write
58B0000
trusted library allocation
page read and write
28DB000
heap
page read and write
1738000
heap
page read and write
1AEB000
heap
page read and write
B0E000
stack
page read and write
75C000
heap
page read and write
1A06000
heap
page read and write
4A71000
trusted library allocation
page read and write
4B0F000
trusted library allocation
page read and write
1AAA000
heap
page read and write
59F000
heap
page read and write
56A000
heap
page read and write
5B3000
heap
page read and write
1568000
heap
page read and write
1744000
heap
page read and write
4E2F000
trusted library allocation
page read and write
5AB000
heap
page read and write
1550000
heap
page read and write
15A4000
heap
page read and write
18D8000
heap
page read and write
28CF000
stack
page read and write
14E0000
heap
page read and write
6469000
heap
page read and write
6F1C000
stack
page read and write
28DC000
heap
page read and write
64CE000
stack
page read and write
5B3000
heap
page read and write
34A7000
trusted library allocation
page read and write
4C71000
trusted library allocation
page read and write
28E3000
heap
page read and write
59F000
heap
page read and write
5C70000
trusted library allocation
page read and write
1639000
heap
page read and write
1AC3000
heap
page read and write
5AF2000
trusted library allocation
page read and write
5B41000
trusted library allocation
page read and write
3711000
heap
page read and write
34BE000
trusted library allocation
page read and write
92C000
stack
page read and write
B8E000
stack
page read and write
18AA000
heap
page read and write
18BF000
heap
page read and write
3711000
heap
page read and write
1A09000
heap
page read and write
4CA3000
trusted library allocation
page read and write
1AEB000
heap
page read and write
36E5000
trusted library allocation
page read and write
355D000
trusted library allocation
page read and write
28DF000
heap
page read and write
7644000
heap
page read and write
55E000
stack
page read and write
2E80000
heap
page read and write
1723000
heap
page read and write
5AB000
heap
page read and write
177A000
heap
page read and write
5110000
trusted library allocation
page read and write
3658000
trusted library allocation
page read and write
370D000
trusted library allocation
page read and write
37F4000
trusted library allocation
page read and write
75A000
heap
page read and write
45C9000
trusted library allocation
page read and write
13FC000
stack
page read and write
1680000
trusted library allocation
page read and write
400000
unkown
page readonly
47C000
stack
page read and write
1586000
heap
page read and write
4D0000
heap
page read and write
4580000
trusted library allocation
page read and write
7612000
heap
page read and write
5F9000
heap
page read and write
5B5E000
trusted library allocation
page read and write
4BAC000
trusted library allocation
page read and write
8BF6000
heap
page read and write
18FA000
heap
page read and write
6860000
trusted library allocation
page execute and read and write
4589000
trusted library allocation
page read and write
71B0000
trusted library allocation
page read and write
17DB000
heap
page read and write
640C000
heap
page read and write
17FA000
heap
page read and write
88F000
stack
page read and write
1A5F000
heap
page read and write
59F000
heap
page read and write
9D4000
heap
page read and write
1787000
heap
page read and write
18D8000
heap
page read and write
749000
heap
page read and write
3711000
heap
page read and write
5C7000
heap
page read and write
5B0000
heap
page read and write
12F7000
stack
page read and write
1330000
remote allocation
page execute and read and write
3711000
heap
page read and write
4A71000
trusted library allocation
page read and write
4543000
trusted library allocation
page read and write
5BB000
heap
page read and write
17B0000
heap
page read and write
1ACB000
heap
page read and write
7215000
trusted library allocation
page read and write
5110000
trusted library allocation
page read and write
19E5000
heap
page read and write
5ABA000
trusted library allocation
page read and write
183B000
heap
page read and write
1AA8000
heap
page read and write
3664000
trusted library allocation
page read and write
62E000
stack
page read and write
7650000
heap
page read and write
B4F000
stack
page read and write
4C71000
trusted library allocation
page read and write
59F000
heap
page read and write
538C000
stack
page read and write
3711000
heap
page read and write
5C7000
heap
page read and write
369D000
trusted library allocation
page read and write
356F000
trusted library allocation
page read and write
D8E000
stack
page read and write
63B6000
heap
page read and write
4BAD000
trusted library allocation
page read and write
2E98000
heap
page read and write
DDE000
stack
page read and write
32E2000
trusted library allocation
page read and write
28D3000
heap
page read and write
3535000
trusted library allocation
page read and write
2FA0000
heap
page read and write
17B7000
heap
page read and write
4BAD000
trusted library allocation
page read and write
27CE000
stack
page read and write
851F000
stack
page read and write
4586000
trusted library allocation
page read and write
5B3000
heap
page read and write
5C50000
trusted library allocation
page execute and read and write
3550000
trusted library allocation
page read and write
4B66000
trusted library allocation
page read and write
3730000
trusted library allocation
page read and write
1546000
trusted library allocation
page execute and read and write
3711000
heap
page read and write
F9A000
stack
page read and write
19B0000
heap
page read and write
753000
heap
page read and write
1AEA000
heap
page read and write
17D1000
heap
page read and write
2E90000
heap
page read and write
643A000
heap
page read and write
8BE0000
heap
page read and write
6430000
heap
page read and write
1EEE000
stack
page read and write
3597000
trusted library allocation
page read and write
D40000
heap
page read and write
7621000
heap
page read and write
1335000
remote allocation
page execute and read and write
511F000
trusted library allocation
page read and write
4BAD000
trusted library allocation
page read and write
28D9000
heap
page read and write
364E000
trusted library allocation
page read and write
17D1000
heap
page read and write
99F000
stack
page read and write
41B3000
trusted library allocation
page read and write
3711000
heap
page read and write
177D000
heap
page read and write
17DE000
heap
page read and write
1938000
heap
page read and write
18E8000
heap
page read and write
58F0000
heap
page read and write
56F0000
trusted library allocation
page read and write
1830000
heap
page read and write
723F000
trusted library allocation
page read and write
1912000
heap
page read and write
648D000
heap
page read and write
1A2B000
heap
page read and write
4B1D000
trusted library allocation
page read and write
5072000
trusted library allocation
page read and write
21E0000
heap
page read and write
4C71000
trusted library allocation
page read and write
3747000
trusted library allocation
page read and write
75A000
heap
page read and write
5B3000
heap
page read and write
4130000
trusted library allocation
page read and write
1721000
heap
page read and write
17C8000
heap
page read and write
1680000
trusted library allocation
page read and write
507A000
trusted library allocation
page read and write
5B3000
heap
page read and write
196C000
heap
page read and write
7340000
trusted library allocation
page read and write
5BC0000
trusted library allocation
page read and write
1AEE000
heap
page read and write
3711000
heap
page read and write
36E7000
trusted library allocation
page read and write
234E000
stack
page read and write
3711000
heap
page read and write
4C24000
trusted library allocation
page read and write
1552000
trusted library allocation
page read and write
2B5F000
stack
page read and write
28D7000
heap
page read and write
5AB000
heap
page read and write
18D9000
heap
page read and write
3711000
heap
page read and write
3393000
trusted library allocation
page read and write
21CE000
stack
page read and write
43C000
stack
page read and write
1AB5000
heap
page read and write
B61000
unkown
page execute read
5760000
trusted library allocation
page read and write
5AE1000
trusted library allocation
page read and write
45A9000
trusted library allocation
page read and write
3711000
heap
page read and write
466E000
stack
page read and write
510000
heap
page read and write
177F000
heap
page read and write
6411000
heap
page read and write
5B3000
heap
page read and write
5CA0000
trusted library allocation
page read and write
6E0000
heap
page read and write
1550000
trusted library allocation
page read and write
4A71000
trusted library allocation
page read and write
176E000
heap
page read and write
1A95000
heap
page read and write
386C000
trusted library allocation
page read and write
1752000
heap
page read and write
28D1000
heap
page read and write
458E000
trusted library allocation
page read and write
5BD0000
trusted library allocation
page execute and read and write
154A000
trusted library allocation
page execute and read and write
749000
heap
page read and write
1560000
heap
page read and write
5073000
trusted library allocation
page read and write
28D9000
heap
page read and write
761A000
heap
page read and write
5C7000
heap
page read and write
1656000
heap
page read and write
2B9E000
stack
page read and write
3711000
heap
page read and write
89E000
stack
page read and write
3824000
trusted library allocation
page read and write
4A71000
trusted library allocation
page read and write
59F000
heap
page read and write
3711000
heap
page read and write
173C000
heap
page read and write
1802000
heap
page read and write
4A71000
trusted library allocation
page read and write
63F5000
heap
page read and write
1737000
heap
page read and write
5AA0000
trusted library allocation
page execute and read and write
446B000
trusted library allocation
page read and write
18B6000
heap
page read and write
5900000
trusted library allocation
page read and write
507D000
trusted library allocation
page read and write
5198000
trusted library allocation
page read and write
1AA6000
heap
page read and write
41B3000
trusted library allocation
page read and write
9CA000
heap
page read and write
9BA000
heap
page read and write
71A0000
trusted library allocation
page execute and read and write
4C71000
trusted library allocation
page read and write
59F000
heap
page read and write
3710000
heap
page read and write
7A30000
trusted library allocation
page execute and read and write
7244000
trusted library allocation
page read and write
3711000
heap
page read and write
4B24000
trusted library allocation
page read and write
5AB000
heap
page read and write
5AFE000
trusted library allocation
page read and write
4131000
trusted library allocation
page read and write
5710000
heap
page read and write
5720000
trusted library allocation
page read and write
5752000
trusted library allocation
page read and write
E0F000
stack
page read and write
5110000
trusted library allocation
page read and write
59F000
heap
page read and write
5C7000
heap
page read and write
338F000
trusted library allocation
page read and write
C0000
unkown
page readonly
28D0000
heap
page read and write
59F000
heap
page read and write
17D1000
heap
page read and write
78EE000
stack
page read and write
5AB000
heap
page read and write
6AE000
stack
page read and write
1A39000
heap
page read and write
59F000
heap
page read and write
990000
heap
page read and write
5110000
trusted library allocation
page read and write
6409000
heap
page read and write
59F000
heap
page read and write
7228000
trusted library allocation
page read and write
6EC4000
trusted library allocation
page read and write
14D4000
trusted library allocation
page read and write
401000
unkown
page execute read
454F000
trusted library allocation
page read and write
75F2000
heap
page read and write
3898000
trusted library allocation
page read and write
5B3000
heap
page read and write
34ED000
trusted library allocation
page read and write
1786000
heap
page read and write
7664000
heap
page read and write
5076000
trusted library allocation
page read and write
1595000
heap
page read and write
1788000
heap
page read and write
19E5000
heap
page read and write
33BC000
stack
page read and write
65CF000
stack
page read and write
400000
unkown
page readonly
13CD000
stack
page read and write
732000
heap
page read and write
5AB000
heap
page read and write
5AB000
heap
page read and write
82DE000
stack
page read and write
9D8000
heap
page read and write
1300000
remote allocation
page execute and read and write
40B000
unkown
page write copy
9D3000
heap
page read and write
560000
heap
page read and write
19DE000
heap
page read and write
3711000
heap
page read and write
1916000
heap
page read and write
723A000
trusted library allocation
page read and write
360F000
trusted library allocation
page read and write
7672000
heap
page read and write
174D000
heap
page read and write
18A3000
heap
page read and write
6444000
heap
page read and write
1AEE000
heap
page read and write
CD9000
stack
page read and write
722F000
trusted library allocation
page read and write
4BAD000
trusted library allocation
page read and write
810E000
stack
page read and write
5B3000
heap
page read and write
19E5000
heap
page read and write
7AA0000
trusted library allocation
page read and write
3711000
heap
page read and write
59F000
heap
page read and write
500000
heap
page read and write
1720000
heap
page read and write
5C60000
trusted library allocation
page read and write
13BE000
stack
page read and write
181A000
heap
page read and write
6EC0000
trusted library allocation
page read and write
5770000
heap
page read and write
17EC000
heap
page read and write
1785000
heap
page read and write
4C71000
trusted library allocation
page read and write
5AB000
heap
page read and write
642C000
heap
page read and write
7260000
trusted library allocation
page read and write
1AB3000
heap
page read and write
5C80000
trusted library allocation
page execute and read and write
572B000
trusted library allocation
page read and write
41C6000
trusted library allocation
page read and write
41B7000
trusted library allocation
page read and write
1AB3000
heap
page read and write
17A7000
heap
page read and write
16F8000
heap
page read and write
7310000
trusted library allocation
page read and write
18F1000
heap
page read and write
3711000
heap
page read and write
37DD000
trusted library allocation
page read and write
17FA000
heap
page read and write
16BE000
stack
page read and write
3711000
heap
page read and write
4A71000
trusted library allocation
page read and write
41B3000
trusted library allocation
page read and write
4CA3000
trusted library allocation
page read and write
180A000
heap
page read and write
4C71000
trusted library allocation
page read and write
33A3000
trusted library allocation
page read and write
4C24000
trusted library allocation
page read and write
4594000
trusted library allocation
page read and write
5AB000
heap
page read and write
3711000
heap
page read and write
36DD000
trusted library allocation
page read and write
9DC000
heap
page read and write
36F3000
trusted library allocation
page read and write
66F000
stack
page read and write
366F000
trusted library allocation
page read and write
4531000
trusted library allocation
page read and write
C15000
unkown
page readonly
308E000
stack
page read and write
1A9C000
heap
page read and write
5902000
trusted library allocation
page read and write
1A9F000
heap
page read and write
3711000
heap
page read and write
6473000
heap
page read and write
4B66000
trusted library allocation
page read and write
28DC000
heap
page read and write
9AF000
heap
page read and write
17AD000
heap
page read and write
5BE0000
trusted library allocation
page read and write
15E4000
heap
page read and write
28E2000
heap
page read and write
416C000
trusted library allocation
page read and write
3711000
heap
page read and write
5B3000
heap
page read and write
34BC000
stack
page read and write
3711000
heap
page read and write
15B7000
heap
page read and write
196E000
heap
page read and write
1920000
heap
page read and write
19E7000
heap
page read and write
998000
heap
page read and write
1708000
heap
page read and write
363C000
trusted library allocation
page read and write
3711000
heap
page read and write
401000
unkown
page execute read
3647000
trusted library allocation
page read and write
19A000
stack
page read and write
1715000
heap
page read and write
1AEA000
heap
page read and write
9B2000
heap
page read and write
5AB000
heap
page read and write
749000
heap
page read and write
2BDF000
stack
page read and write
458C000
trusted library allocation
page read and write
7219000
trusted library allocation
page read and write
18D8000
heap
page read and write
17F3000
heap
page read and write
1AB6000
heap
page read and write
684F000
stack
page read and write
5700000
trusted library allocation
page read and write
5AB000
heap
page read and write
800000
heap
page read and write
19B4000
heap
page read and write
3711000
heap
page read and write
19EA000
heap
page read and write
63DD000
heap
page read and write
5C7000
heap
page read and write
7601000
heap
page read and write
3864000
trusted library allocation
page read and write
5BB000
heap
page read and write
17B9000
heap
page read and write
1734000
heap
page read and write
510F000
trusted library allocation
page read and write
1A13000
heap
page read and write
7320000
trusted library allocation
page execute and read and write
17E0000
heap
page read and write
5880000
trusted library allocation
page read and write
528B000
stack
page read and write
7255000
trusted library allocation
page read and write
5AB000
heap
page read and write
1580000
heap
page read and write
1A45000
heap
page read and write
4B83000
trusted library allocation
page read and write
1A07000
heap
page read and write
1713000
heap
page read and write
19E9000
heap
page read and write
5AB5000
trusted library allocation
page read and write
1A71000
heap
page read and write
4C24000
trusted library allocation
page read and write
17FB000
heap
page read and write
4AB1000
trusted library allocation
page read and write
B90000
heap
page read and write
670F000
stack
page read and write
63DB000
heap
page read and write
1907000
heap
page read and write
155B000
trusted library allocation
page execute and read and write
1816000
heap
page read and write
1A65000
heap
page read and write
7A2E000
stack
page read and write
EA0000
heap
page read and write
19E5000
heap
page read and write
3628000
trusted library allocation
page read and write
C23000
unkown
page write copy
3711000
heap
page read and write
4C70000
trusted library allocation
page read and write
37C1000
trusted library allocation
page read and write
5741000
trusted library allocation
page read and write
385B000
trusted library allocation
page read and write
56E0000
trusted library allocation
page read and write
5B50000
trusted library allocation
page read and write
5AB000
heap
page read and write
5BF0000
trusted library allocation
page read and write
4D4A000
trusted library allocation
page read and write
5B3000
heap
page read and write
7A40000
trusted library allocation
page read and write
3711000
heap
page read and write
59F000
heap
page read and write
408000
unkown
page readonly
5152000
trusted library allocation
page read and write
9CA000
heap
page read and write
1AEE000
heap
page read and write
4C24000
trusted library allocation
page read and write
1971000
heap
page read and write
4BE4000
trusted library allocation
page read and write
9AD000
heap
page read and write
1470000
trusted library allocation
page read and write
28D0000
heap
page read and write
40B000
unkown
page read and write
9CA000
heap
page read and write
4B0A000
trusted library allocation
page read and write
7235000
trusted library allocation
page read and write
4F4000
unkown
page readonly
4640000
heap
page read and write
18AF000
heap
page read and write
37D9000
trusted library allocation
page read and write
17FA000
heap
page read and write
5B80000
trusted library allocation
page read and write
67C000
stack
page read and write
680000
heap
page read and write
4BB5000
trusted library allocation
page read and write
4B42000
trusted library allocation
page read and write
4B90000
trusted library allocation
page read and write
701C000
stack
page read and write
8C0000
heap
page read and write
3714000
trusted library allocation
page read and write
358C000
trusted library allocation
page read and write
4131000
trusted library allocation
page read and write
6437000
heap
page read and write
4BAD000
trusted library allocation
page read and write
59F000
heap
page read and write
4C24000
trusted library allocation
page read and write
7210000
trusted library allocation
page read and write
674E000
stack
page read and write
4393000
trusted library allocation
page read and write
28DC000
heap
page read and write
1A37000
heap
page read and write
462F000
stack
page read and write
186B000
heap
page read and write
5AB8000
trusted library allocation
page read and write
63C000
stack
page read and write
5AB0000
trusted library allocation
page read and write
5CC0000
trusted library allocation
page read and write
84E000
stack
page read and write
28D8000
heap
page read and write
9BB000
heap
page read and write
19C2000
heap
page read and write
19EA000
heap
page read and write
5B5B000
trusted library allocation
page read and write
373C000
trusted library allocation
page read and write
371F000
trusted library allocation
page read and write
1955000
heap
page read and write
4A6F000
stack
page read and write
5B3000
heap
page read and write
17D1000
heap
page read and write
9CA000
heap
page read and write
3711000
heap
page read and write
BC8000
heap
page read and write
28D6000
heap
page read and write
372B000
trusted library allocation
page read and write
71B6000
trusted library allocation
page read and write
5870000
trusted library allocation
page read and write
4131000
trusted library allocation
page read and write
34B9000
trusted library allocation
page read and write
18AA000
heap
page read and write
7633000
heap
page read and write
5B90000
trusted library allocation
page read and write
1A51000
heap
page read and write
6421000
heap
page read and write
3580000
trusted library allocation
page read and write
4E5D000
trusted library allocation
page read and write
7252000
trusted library allocation
page read and write
6419000
heap
page read and write
28DC000
heap
page read and write
4271000
trusted library allocation
page read and write
338D000
trusted library allocation
page read and write
4CF000
unkown
page read and write
41B3000
trusted library allocation
page read and write
5B30000
trusted library allocation
page read and write
16F0000
heap
page read and write
5AB000
heap
page read and write
3711000
heap
page read and write
5713000
heap
page read and write
17B2000
heap
page read and write
5E0000
heap
page read and write
C15000
unkown
page readonly
4CBB000
trusted library allocation
page read and write
1599000
heap
page read and write
5B3000
heap
page read and write
5C7000
heap
page read and write
3543000
trusted library allocation
page read and write
6ED0000
trusted library allocation
page execute and read and write
4B43000
trusted library allocation
page read and write
E9F000
stack
page read and write
3576000
trusted library allocation
page read and write
1A8A000
heap
page read and write
8EE000
stack
page read and write
13DC000
stack
page read and write
3711000
heap
page read and write
1744000
heap
page read and write
5B01000
trusted library allocation
page read and write
1715000
heap
page read and write
5ADB000
trusted library allocation
page read and write
28D1000
heap
page read and write
19CE000
heap
page read and write
4DF000
unkown
page read and write
28D3000
heap
page read and write
14D3000
trusted library allocation
page execute and read and write
5746000
trusted library allocation
page read and write
1350000
heap
page read and write
41B3000
trusted library allocation
page read and write
28DF000
heap
page read and write
3879000
trusted library allocation
page read and write
1555000
trusted library allocation
page execute and read and write
730E000
stack
page read and write
4B72000
trusted library allocation
page read and write
3711000
heap
page read and write
1913000
heap
page read and write
5AE6000
trusted library allocation
page read and write
749000
heap
page read and write
337F000
stack
page read and write
1570000
direct allocation
page execute and read and write
28DF000
heap
page read and write
4538000
trusted library allocation
page read and write
752000
heap
page read and write
6390000
heap
page read and write
5B3000
heap
page read and write
454A000
trusted library allocation
page read and write
4570000
trusted library allocation
page read and write
4131000
trusted library allocation
page read and write
5AB000
heap
page read and write
17B9000
heap
page read and write
19EA000
heap
page read and write
18E7000
heap
page read and write
3711000
heap
page read and write
3395000
trusted library allocation
page read and write
18E2000
heap
page read and write
5C7000
heap
page read and write
4C71000
trusted library allocation
page read and write
4BE3000
trusted library allocation
page read and write
3251000
trusted library allocation
page read and write
1A42000
heap
page read and write
4569000
trusted library allocation
page read and write
792E000
stack
page read and write
59B000
heap
page read and write
5AD0000
trusted library allocation
page read and write
9AD000
heap
page read and write
4B77000
trusted library allocation
page read and write
96C000
stack
page read and write
3893000
trusted library allocation
page read and write
1AD8000
heap
page read and write
51AD000
trusted library allocation
page read and write
3834000
heap
page read and write
196C000
heap
page read and write
B60000
unkown
page readonly
173A000
heap
page read and write
3387000
trusted library allocation
page read and write
152E000
stack
page read and write
4B86000
trusted library allocation
page read and write
28DC000
heap
page read and write
738E000
stack
page read and write
63BC000
heap
page read and write
4251000
trusted library allocation
page read and write
72D000
heap
page read and write
3830000
heap
page read and write
1530000
heap
page read and write
4BAD000
trusted library allocation
page read and write
4C3000
unkown
page read and write
7212000
trusted library allocation
page read and write
1A45000
heap
page read and write
1344000
remote allocation
page execute and read and write
5B3000
heap
page read and write
3653000
trusted library allocation
page read and write
4131000
trusted library allocation
page read and write
7250000
trusted library allocation
page read and write
72F000
heap
page read and write
1943000
heap
page read and write
17BB000
heap
page read and write
304E000
stack
page read and write
85F000
stack
page read and write
7240000
trusted library allocation
page read and write
5AB000
heap
page read and write
4BE4000
trusted library allocation
page read and write
BC0000
heap
page read and write
5B3000
heap
page read and write
E10000
heap
page read and write
15A8000
heap
page read and write
574D000
trusted library allocation
page read and write
19EA000
heap
page read and write
18F8000
heap
page read and write
18D8000
heap
page read and write
58A0000
heap
page execute and read and write
7AB0000
trusted library allocation
page read and write
41B2000
trusted library allocation
page read and write
5100000
trusted library allocation
page read and write
5C40000
trusted library allocation
page execute and read and write
457D000
trusted library allocation
page read and write
37E9000
trusted library allocation
page read and write
3564000
trusted library allocation
page read and write
5B3000
heap
page read and write
3711000
heap
page read and write
5AB000
heap
page read and write
56E000
heap
page read and write
43CC000
trusted library allocation
page read and write
5CB0000
trusted library allocation
page execute and read and write
4D63000
trusted library allocation
page read and write
3711000
heap
page read and write
28D0000
heap
page read and write
1530000
trusted library allocation
page read and write
4A70000
trusted library allocation
page read and write
818E000
stack
page read and write
3711000
heap
page read and write
3711000
heap
page read and write
181A000
heap
page read and write
173F000
heap
page read and write
75B0000
heap
page read and write
5B3000
heap
page read and write
1480000
heap
page read and write
7FE000
stack
page read and write
507B000
trusted library allocation
page read and write
59F000
heap
page read and write
5C7000
heap
page read and write
86E000
stack
page read and write
197C000
heap
page read and write
5724000
trusted library allocation
page read and write
C28000
unkown
page readonly
41B3000
trusted library allocation
page read and write
59F000
heap
page read and write
28DF000
heap
page read and write
C2000
unkown
page readonly
5C7000
heap
page read and write
19DC000
heap
page read and write
28DA000
heap
page read and write
814E000
stack
page read and write
197B000
heap
page read and write
81D0000
heap
page read and write
5B10000
trusted library allocation
page read and write
3537000
trusted library allocation
page read and write
1430000
heap
page read and write
1AD5000
heap
page read and write
18AB000
heap
page read and write
1909000
heap
page read and write
4A71000
trusted library allocation
page read and write
1800000
trusted library allocation
page read and write
1560000
direct allocation
page execute and read and write
14CE000
stack
page read and write
14DD000
trusted library allocation
page execute and read and write
5F3000
heap
page read and write
5AB000
heap
page read and write
455F000
trusted library allocation
page read and write
B61000
unkown
page execute read
73CE000
stack
page read and write
647E000
heap
page read and write
4F4000
unkown
page readonly
There are 984 hidden memdumps, click here to show them.