IOC Report
W7e18p57es.exe

loading gifFilesProcessesURLsIPsRegistryMemdumps8642010010Label

Files

File Path
Type
Category
Malicious
Download
W7e18p57es.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\9e146be9-c76a-4720-bcdb-53011b87bd06\AutoIt3.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\{5084E6691029}\AutoIt3.exe (copy)
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\9e146be9-c76a-4720-bcdb-53011b87bd06\ignatia.a3x
data
dropped
C:\9e146be9-c76a-4720-bcdb-53011b87bd06\ignatia.vsdx
data
modified
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\jsc.exe.log
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\is-76J5C.tmp\W7e18p57es.tmp
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\is-7BM0S.tmp\_isetup\_iscrypt.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\is-7BM0S.tmp\_isetup\_isdecmp.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\is-7BM0S.tmp\_isetup\_setup64.tmp
PE32+ executable (console) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\is-EGPSH.tmp\_isetup\_iscrypt.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\is-EGPSH.tmp\_isetup\_isdecmp.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\is-EGPSH.tmp\_isetup\_setup64.tmp
PE32+ executable (console) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\is-KALMB.tmp\W7e18p57es.tmp
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Roaming\{5084E6691029}\ignatia.a3x (copy)
data
dropped
C:\Users\user\AppData\Roaming\{5084E6691029}\ignatia.vsdx (copy)
data
dropped
C:\Users\user\AppData\Roaming\{5084E6691029}\is-RDUTC.tmp
data
dropped
C:\Users\user\AppData\Roaming\{5084E6691029}\is-S2I31.tmp
data
dropped
C:\Users\user\AppData\Roaming\{5084E6691029}\is-SHAH3.tmp
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
There are 9 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\W7e18p57es.exe
"C:\Users\user\Desktop\W7e18p57es.exe"
malicious
C:\Users\user\Desktop\W7e18p57es.exe
"C:\Users\user\Desktop\W7e18p57es.exe" /VERYSILENT
malicious
C:\Users\user\AppData\Roaming\{5084E6691029}\AutoIt3.exe
"C:\Users\user\AppData\Roaming\{5084E6691029}\AutoIt3.exe" ignatia.a3x
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\jsc.exe
"C:\Windows\Microsoft.NET\Framework\v4.0.30319\jsc.exe"
malicious
C:\9e146be9-c76a-4720-bcdb-53011b87bd06\AutoIt3.exe
"C:\9e146be9-c76a-4720-bcdb-53011b87bd06\Autoit3.exe" "C:\9e146be9-c76a-4720-bcdb-53011b87bd06\ignatia.a3x"
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\jsc.exe
"C:\Windows\Microsoft.NET\Framework\v4.0.30319\jsc.exe"
malicious
C:\9e146be9-c76a-4720-bcdb-53011b87bd06\AutoIt3.exe
"C:\9e146be9-c76a-4720-bcdb-53011b87bd06\Autoit3.exe" "C:\9e146be9-c76a-4720-bcdb-53011b87bd06\ignatia.a3x"
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\jsc.exe
"C:\Windows\Microsoft.NET\Framework\v4.0.30319\jsc.exe"
malicious
C:\Users\user\AppData\Local\Temp\is-76J5C.tmp\W7e18p57es.tmp
"C:\Users\user\AppData\Local\Temp\is-76J5C.tmp\W7e18p57es.tmp" /SL5="$204CE,3056353,780800,C:\Users\user\Desktop\W7e18p57es.exe"
C:\Users\user\AppData\Local\Temp\is-KALMB.tmp\W7e18p57es.tmp
"C:\Users\user\AppData\Local\Temp\is-KALMB.tmp\W7e18p57es.tmp" /SL5="$204E4,3056353,780800,C:\Users\user\Desktop\W7e18p57es.exe" /VERYSILENT

URLs

Name
IP
Malicious
http://crl.sectigo.com/SectigoRSATimeStampingCA.crl0t
unknown
https://jrsoftware.org/ishelp/index.php?topic=setupcmdlineSetupU
unknown
http://repository.certum.pl/ctnca.cer09
unknown
https://pastebin.com/raw/f2ThRnrjPO
unknown
http://repository.certum.pl/cscasha2.cer0
unknown
http://ocsp.sectigo.com0
unknown
https://pastebin.com/raw/f2ThRnrj
unknown
http://crl.certum.pl/ctnca.crl0k
unknown
https://www.remobjects.com/ps
unknown
http://crt.sectigo.com/SectigoRSATimeStampingCA.crt0#
unknown
http://subca.ocsp-certum.com01
unknown
https://www.innosetup.com/
unknown
https://sectigo.com/CPS0D
unknown
http://www.autoitscript.com/autoit3/X
unknown
https://jrsoftware.org0
unknown
https://jrsoftware.org/
unknown
https://www.certum.pl/CPS0
unknown
https://www.autoitscript.com/autoit3/
unknown
http://crl.certum.pl/cscasha2.crl0q
unknown
http://www.certum.pl/CPS0
unknown
http://cscasha2.ocsp-certum.com04
unknown
There are 11 hidden URLs, click here to show them.

IPs

IP
Domain
Country
Malicious
172.86.72.81
unknown
United States

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
Owner
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
SessionHash
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
Sequence
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
Owner
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
SessionHash
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
Sequence
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
RegFiles0000
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
RegFilesHash
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce
ignatia

Memdumps

Base Address
Regiontype
Protect
Malicious
Download
722000
remote allocation
page execute and read and write
malicious
66FE000
heap
page read and write
6203000
heap
page read and write
6458000
heap
page read and write
5F5A000
heap
page read and write
847000
heap
page read and write
C7D000
direct allocation
page read and write
2228000
direct allocation
page read and write
612B000
heap
page read and write
5F75000
heap
page read and write
62E5000
heap
page read and write
2771000
trusted library allocation
page read and write
216B000
direct allocation
page read and write
21E7000
direct allocation
page read and write
A70000
heap
page read and write
6574000
heap
page read and write
5DA5000
heap
page read and write
5F7D000
heap
page read and write
9B000
stack
page read and write
AB0000
heap
page read and write
67D6000
heap
page read and write
6031000
heap
page read and write
5420000
trusted library allocation
page read and write
AD1000
unkown
page execute read
1720000
heap
page read and write
61F2000
heap
page read and write
22B7000
direct allocation
page read and write
6128000
heap
page read and write
24B8000
direct allocation
page read and write
13AD000
heap
page read and write
6455000
heap
page read and write
62E6000
heap
page read and write
2CF0000
heap
page read and write
1049000
heap
page read and write
22A9000
direct allocation
page read and write
587E000
stack
page read and write
64A0000
heap
page read and write
66F5000
heap
page read and write
35FF000
direct allocation
page read and write
6035000
heap
page read and write
62EF000
heap
page read and write
6001000
heap
page read and write
5DA5000
heap
page read and write
63DA000
heap
page read and write
2383000
direct allocation
page read and write
2640000
trusted library allocation
page read and write
6218000
heap
page read and write
1043000
heap
page read and write
3EA0000
heap
page read and write
230F000
direct allocation
page read and write
2278000
direct allocation
page read and write
4C0000
unkown
page read and write
5F76000
heap
page read and write
109E000
stack
page read and write
6106000
heap
page read and write
5F51000
heap
page read and write
67C1000
heap
page read and write
A23000
heap
page read and write
26C0000
heap
page read and write
66FC000
heap
page read and write
6123000
heap
page read and write
63DF000
heap
page read and write
21D0000
direct allocation
page read and write
62F9000
heap
page read and write
236D000
direct allocation
page read and write
9EF000
heap
page read and write
5466000
trusted library allocation
page read and write
2E08000
trusted library allocation
page read and write
24D4000
direct allocation
page read and write
6373000
heap
page read and write
6C4000
unkown
page read and write
D35000
heap
page read and write
9E0000
heap
page read and write
990000
heap
page read and write
4C6000
unkown
page readonly
A2E000
stack
page read and write
2650000
trusted library allocation
page read and write
5A7E000
stack
page read and write
3046000
trusted library allocation
page read and write
153A000
trusted library allocation
page execute and read and write
6000000
heap
page read and write
9B000
stack
page read and write
68B6000
heap
page read and write
621E000
heap
page read and write
6138000
heap
page read and write
240F000
direct allocation
page read and write
64B7000
heap
page read and write
37AE000
stack
page read and write
61D9000
heap
page read and write
2D3E000
stack
page read and write
225C000
direct allocation
page read and write
2CB0000
trusted library allocation
page read and write
5DA2000
heap
page read and write
24F8000
direct allocation
page read and write
7AF000
stack
page read and write
38EE000
stack
page read and write
63BF000
stack
page read and write
504E000
stack
page read and write
62BC000
stack
page read and write
C60000
direct allocation
page read and write
4D0000
heap
page read and write
830000
heap
page read and write
66FF000
heap
page read and write
6049000
heap
page read and write
9F2000
heap
page read and write
6457000
heap
page read and write
6DD000
unkown
page readonly
661A000
heap
page read and write
62F5000
heap
page read and write
A20000
heap
page read and write
F38000
stack
page read and write
62F5000
heap
page read and write
AEA000
heap
page read and write
6539000
heap
page read and write
2246000
direct allocation
page read and write
620B000
heap
page read and write
63D3000
heap
page read and write
4E7E000
stack
page read and write
62F0000
heap
page read and write
3EB000
stack
page read and write
8B0000
heap
page read and write
B6D000
unkown
page readonly
CC8000
direct allocation
page read and write
2DBD000
stack
page read and write
4B7000
unkown
page write copy
66FF000
heap
page read and write
24CD000
direct allocation
page read and write
613C000
heap
page read and write
68B7000
heap
page read and write
5E81000
heap
page read and write
6133000
heap
page read and write
652E000
heap
page read and write
BF4000
direct allocation
page read and write
810000
heap
page read and write
6110000
heap
page read and write
A04000
heap
page read and write
4F4E000
stack
page read and write
5DA5000
heap
page read and write
621C000
heap
page read and write
64A0000
heap
page read and write
63D1000
heap
page read and write
2C93000
trusted library allocation
page execute and read and write
2E71000
trusted library allocation
page read and write
4B7000
unkown
page read and write
62F2000
heap
page read and write
653E000
heap
page read and write
5E89000
heap
page read and write
20CE000
heap
page read and write
400000
unkown
page readonly
6379000
heap
page read and write
3974000
heap
page read and write
5BC0000
heap
page read and write
6121000
heap
page read and write
67D2000
heap
page read and write
22F0000
direct allocation
page read and write
6038000
heap
page read and write
6112000
heap
page read and write
63C4000
heap
page read and write
612F000
heap
page read and write
51E000
stack
page read and write
1057000
heap
page read and write
2730000
heap
page read and write
5E84000
heap
page read and write
6054000
heap
page read and write
130E000
heap
page read and write
63DD000
heap
page read and write
A61000
heap
page read and write
64B2000
heap
page read and write
62F6000
heap
page read and write
578000
heap
page read and write
6042000
heap
page read and write
1220000
trusted library allocation
page execute and read and write
D6F000
stack
page read and write
238A000
direct allocation
page read and write
21AD000
direct allocation
page read and write
1537000
trusted library allocation
page execute and read and write
66FF000
heap
page read and write
6616000
heap
page read and write
1020000
heap
page read and write
2492000
direct allocation
page read and write
2441000
direct allocation
page read and write
6536000
heap
page read and write
AD0000
unkown
page readonly
661B000
heap
page read and write
A87000
heap
page read and write
6048000
heap
page read and write
559E000
stack
page read and write
652E000
heap
page read and write
2323000
direct allocation
page read and write
1050000
heap
page read and write
61FC000
heap
page read and write
35BF000
direct allocation
page read and write
840000
heap
page read and write
6102000
heap
page read and write
2E3E000
stack
page read and write
6211000
heap
page read and write
2341000
direct allocation
page read and write
C34000
direct allocation
page read and write
2DC0000
trusted library allocation
page read and write
6001000
heap
page read and write
3C39000
heap
page read and write
5E4E000
stack
page read and write
24F1000
direct allocation
page read and write
A7F000
stack
page read and write
63C5000
heap
page read and write
5F6D000
heap
page read and write
603D000
heap
page read and write
35F8000
direct allocation
page read and write
2A00000
heap
page read and write
644E000
heap
page read and write
A3E000
heap
page read and write
6208000
heap
page read and write
2CCB000
trusted library allocation
page execute and read and write
35F8000
direct allocation
page read and write
22DB000
direct allocation
page read and write
621E000
heap
page read and write
605A000
heap
page read and write
604A000
heap
page read and write
2EC0000
trusted library allocation
page read and write
BCE000
stack
page read and write
64B3000
heap
page read and write
6C6000
unkown
page read and write
5DA3000
heap
page read and write
248B000
direct allocation
page read and write
67DC000
heap
page read and write
54D0000
heap
page read and write
BA1000
unkown
page write copy
63C5000
heap
page read and write
A11000
heap
page read and write
5F66000
heap
page read and write
245C000
direct allocation
page read and write
5690000
trusted library allocation
page execute and read and write
5496000
trusted library allocation
page read and write
2DD0000
heap
page read and write
621B000
heap
page read and write
64E000
stack
page read and write
2CC0000
trusted library allocation
page read and write
66FD000
heap
page read and write
6049000
heap
page read and write
6115000
heap
page read and write
67D3000
heap
page read and write
2474000
direct allocation
page read and write
6C4000
unkown
page read and write
98E000
stack
page read and write
2190000
direct allocation
page read and write
567E000
stack
page read and write
303D000
trusted library allocation
page read and write
5DA2000
heap
page read and write
6F0000
heap
page read and write
C18000
direct allocation
page read and write
67D8000
heap
page read and write
6619000
heap
page read and write
26C3000
heap
page read and write
542A000
trusted library allocation
page read and write
A0D000
heap
page read and write
544C000
trusted library allocation
page read and write
6113000
heap
page read and write
6457000
heap
page read and write
A46000
heap
page read and write
D10000
direct allocation
page execute and read and write
68BF000
heap
page read and write
A29000
heap
page read and write
55E000
stack
page read and write
67C3000
heap
page read and write
645F000
heap
page read and write
229A000
direct allocation
page read and write
6039000
heap
page read and write
5CC0000
heap
page read and write
3FE1000
trusted library allocation
page read and write
2D7E000
stack
page read and write
5475000
trusted library allocation
page read and write
63CE000
heap
page read and write
64BF000
stack
page read and write
6375000
heap
page read and write
67CF000
heap
page read and write
6134000
heap
page read and write
1290000
heap
page read and write
80E000
stack
page read and write
54A0000
heap
page execute and read and write
6219000
heap
page read and write
A6B000
trusted library allocation
page execute and read and write
5E85000
heap
page read and write
228B000
direct allocation
page read and write
661C000
heap
page read and write
6613000
heap
page read and write
6001000
heap
page read and write
5F74000
heap
page read and write
1523000
trusted library allocation
page read and write
63D9000
heap
page read and write
5F66000
heap
page read and write
2316000
direct allocation
page read and write
CCF000
direct allocation
page read and write
661B000
heap
page read and write
2374000
direct allocation
page read and write
64B3000
heap
page read and write
6001000
heap
page read and write
3C29000
heap
page read and write
6C7000
unkown
page read and write
50BF000
stack
page read and write
6532000
heap
page read and write
6CB000
unkown
page read and write
63D4000
heap
page read and write
6044000
heap
page read and write
652D000
heap
page read and write
6129000
heap
page read and write
C1F000
stack
page read and write
6212000
heap
page read and write
24EA000
direct allocation
page read and write
126E000
stack
page read and write
2181000
direct allocation
page read and write
548C000
trusted library allocation
page read and write
6124000
heap
page read and write
5F61000
heap
page read and write
62BF000
heap
page read and write
A44000
trusted library allocation
page read and write
6CE000
unkown
page read and write
6D6000
unkown
page write copy
6121000
heap
page read and write
62F2000
heap
page read and write
1530000
trusted library allocation
page read and write
6987000
heap
page read and write
5E8A000
heap
page read and write
18D000
stack
page read and write
6039000
heap
page read and write
661D000
heap
page read and write
B9D000
unkown
page write copy
63D3000
heap
page read and write
154B000
trusted library allocation
page execute and read and write
6C4000
unkown
page write copy
544E000
stack
page read and write
6052000
heap
page read and write
5CCD000
heap
page read and write
661B000
heap
page read and write
6047000
heap
page read and write
6041000
heap
page read and write
65BE000
stack
page read and write
6608000
heap
page read and write
187F000
stack
page read and write
64B0000
heap
page read and write
66F8000
heap
page read and write
66FE000
heap
page read and write
67D3000
heap
page read and write
5DA8000
heap
page read and write
6048000
heap
page read and write
67DB000
heap
page read and write
5468000
trusted library allocation
page read and write
1326000
heap
page read and write
6122000
heap
page read and write
10A0000
heap
page read and write
7FB70000
direct allocation
page read and write
6001000
heap
page read and write
54B0000
trusted library allocation
page read and write
2400000
direct allocation
page read and write
22E9000
direct allocation
page read and write
66F3000
heap
page read and write
621B000
heap
page read and write
DA1000
unkown
page readonly
67D7000
heap
page read and write
66FB000
heap
page read and write
62FC000
heap
page read and write
C6C000
direct allocation
page read and write
3C6F000
stack
page read and write
507E000
stack
page read and write
6D3000
unkown
page read and write
68B6000
heap
page read and write
6611000
heap
page read and write
6217000
heap
page read and write
6452000
heap
page read and write
6119000
heap
page read and write
605C000
heap
page read and write
5DA7000
heap
page read and write
840000
heap
page read and write
2CA4000
trusted library allocation
page read and write
6100000
heap
page read and write
620D000
heap
page read and write
6129000
heap
page read and write
A8E000
heap
page read and write
C1F000
direct allocation
page read and write
3FE8000
trusted library allocation
page read and write
845000
heap
page read and write
6202000
heap
page read and write
2424000
direct allocation
page read and write
4BA000
unkown
page read and write
21B4000
direct allocation
page read and write
24C6000
direct allocation
page read and write
6538000
heap
page read and write
5F79000
heap
page read and write
63DE000
heap
page read and write
95F000
stack
page read and write
649B000
heap
page read and write
605C000
heap
page read and write
A28000
heap
page read and write
1010000
heap
page read and write
63DF000
heap
page read and write
605D000
heap
page read and write
67D6000
heap
page read and write
CEC000
direct allocation
page read and write
6899000
heap
page read and write
6617000
heap
page read and write
6043000
heap
page read and write
4C0000
unkown
page read and write
548E000
stack
page read and write
5DA3000
heap
page read and write
2307000
direct allocation
page read and write
66F2000
heap
page read and write
19D000
stack
page read and write
1514000
trusted library allocation
page read and write
9EF000
stack
page read and write
CE4000
direct allocation
page read and write
53A0000
trusted library allocation
page read and write
21F6000
direct allocation
page read and write
567E000
stack
page read and write
6D3000
unkown
page read and write
6043000
heap
page read and write
80E000
stack
page read and write
6375000
heap
page read and write
6057000
heap
page read and write
AFC000
heap
page read and write
2293000
direct allocation
page read and write
23D3000
direct allocation
page read and write
66EA000
heap
page read and write
23F9000
direct allocation
page read and write
5F78000
heap
page read and write
4C6E000
stack
page read and write
22C5000
direct allocation
page read and write
720000
remote allocation
page execute and read and write
6606000
heap
page read and write
24A1000
direct allocation
page read and write
6370000
heap
page read and write
5E81000
heap
page read and write
6000000
heap
page read and write
3771000
trusted library allocation
page read and write
1513000
trusted library allocation
page execute and read and write
62FB000
heap
page read and write
4F7F000
stack
page read and write
6111000
heap
page read and write
5EE000
stack
page read and write
CA2000
direct allocation
page read and write
661D000
heap
page read and write
2466000
direct allocation
page read and write
653C000
heap
page read and write
66FF000
heap
page read and write
DB5000
unkown
page readonly
2348000
direct allocation
page read and write
68BD000
heap
page read and write
62F8000
heap
page read and write
57DE000
stack
page read and write
5446000
trusted library allocation
page read and write
CFA000
direct allocation
page read and write
6109000
heap
page read and write
1311000
heap
page read and write
64BE000
heap
page read and write
661A000
heap
page read and write
6127000
heap
page read and write
1560000
heap
page read and write
62FE000
heap
page read and write
2640000
heap
page read and write
68B5000
heap
page read and write
6000000
heap
page read and write
12AE000
stack
page read and write
5E81000
heap
page read and write
63DB000
heap
page read and write
653C000
heap
page read and write
5DAD000
heap
page read and write
2DE0000
trusted library allocation
page read and write
D30000
heap
page read and write
6045000
heap
page read and write
1540000
trusted library allocation
page read and write
1280000
trusted library allocation
page read and write
2197000
direct allocation
page read and write
6051000
heap
page read and write
6001000
heap
page read and write
8E0000
heap
page read and write
226A000
direct allocation
page read and write
6CB000
unkown
page read and write
3C30000
heap
page read and write
6045000
heap
page read and write
6615000
heap
page read and write
62F5000
heap
page read and write
1486000
heap
page read and write
62FA000
heap
page read and write
2408000
direct allocation
page read and write
63D3000
heap
page read and write
9C0000
heap
page read and write
540E000
stack
page read and write
BA5000
unkown
page readonly
67D9000
heap
page read and write
2391000
direct allocation
page read and write
300A000
trusted library allocation
page read and write
50DE000
stack
page read and write
2CE0000
trusted library allocation
page read and write
68B5000
heap
page read and write
21C2000
direct allocation
page read and write
6455000
heap
page read and write
D08000
direct allocation
page read and write
6218000
heap
page read and write
67D5000
heap
page read and write
66F0000
heap
page read and write
661E000
heap
page read and write
300E000
trusted library allocation
page read and write
563E000
stack
page read and write
62F1000
heap
page read and write
233A000
direct allocation
page read and write
21E0000
direct allocation
page read and write
5E8D000
heap
page read and write
621C000
heap
page read and write
581E000
stack
page read and write
549A000
trusted library allocation
page read and write
6373000
heap
page read and write
64A7000
heap
page read and write
604A000
heap
page read and write
22CD000
direct allocation
page read and write
9F8000
heap
page read and write
2DF0000
heap
page execute and read and write
62F3000
heap
page read and write
1240000
heap
page read and write
62FE000
heap
page read and write
D01000
direct allocation
page read and write
3CAC000
stack
page read and write
A23000
heap
page read and write
6001000
heap
page read and write
61AF000
stack
page read and write
53B0000
trusted library allocation
page read and write
661B000
heap
page read and write
5F67000
heap
page read and write
5F50000
heap
page read and write
5F60000
heap
page read and write
5DA2000
heap
page read and write
5480000
trusted library allocation
page read and write
1165000
heap
page read and write
B91000
unkown
page readonly
BA5000
unkown
page readonly
22BE000
direct allocation
page read and write
64BE000
heap
page read and write
5F68000
heap
page read and write
221A000
direct allocation
page read and write
62FD000
heap
page read and write
2660000
heap
page read and write
6129000
heap
page read and write
BD0000
direct allocation
page read and write
6038000
heap
page read and write
64BD000
heap
page read and write
6A0000
heap
page read and write
66EF000
heap
page read and write
2398000
direct allocation
page read and write
9D0000
heap
page read and write
7F0000
remote allocation
page execute and read and write
2CAA000
trusted library allocation
page read and write
5E88000
heap
page read and write
603F000
heap
page read and write
19A000
stack
page read and write
6128000
heap
page read and write
61FD000
heap
page read and write
6130000
heap
page read and write
621F000
heap
page read and write
66FE000
heap
page read and write
4D0000
heap
page read and write
24BF000
direct allocation
page read and write
604E000
heap
page read and write
6573000
heap
page read and write
8E5000
heap
page read and write
2E60000
heap
page execute and read and write
12EE000
stack
page read and write
5F66000
heap
page read and write
62FC000
heap
page read and write
5E89000
heap
page read and write
62FC000
heap
page read and write
2358000
direct allocation
page read and write
62FA000
heap
page read and write
152A000
trusted library allocation
page read and write
620A000
heap
page read and write
66F8000
heap
page read and write
A78000
heap
page read and write
2263000
direct allocation
page read and write
A0A000
heap
page read and write
5E82000
heap
page read and write
1710000
trusted library allocation
page execute and read and write
63D0000
heap
page read and write
6124000
heap
page read and write
66F3000
heap
page read and write
C94000
direct allocation
page read and write
237C000
direct allocation
page read and write
5F66000
heap
page read and write
850000
heap
page read and write
6219000
heap
page read and write
6001000
heap
page read and write
C26000
direct allocation
page read and write
5CCA000
heap
page read and write
C2D000
direct allocation
page read and write
AA9000
heap
page read and write
64A6000
heap
page read and write
67D6000
heap
page read and write
6137000
heap
page read and write
2EA0000
heap
page read and write
6110000
heap
page read and write
9AE000
stack
page read and write
63D2000
heap
page read and write
8C0000
direct allocation
page execute and read and write
62F8000
heap
page read and write
6000000
heap
page read and write
4C4000
unkown
page readonly
2212000
direct allocation
page read and write
12F8000
heap
page read and write
1358000
heap
page read and write
63D5000
heap
page read and write
22F9000
direct allocation
page read and write
890000
heap
page read and write
241D000
direct allocation
page read and write
EF8000
stack
page read and write
5E0E000
stack
page read and write
3DFB000
heap
page read and write
6218000
heap
page read and write
62F1000
heap
page read and write
62F3000
heap
page read and write
66E5000
heap
page read and write
66F5000
heap
page read and write
35CF000
direct allocation
page read and write
357D000
direct allocation
page read and write
5F60000
heap
page read and write
3010000
trusted library allocation
page read and write
94E000
stack
page read and write
C84000
direct allocation
page read and write
48AE000
stack
page read and write
63CB000
heap
page read and write
4B9000
unkown
page read and write
645D000
heap
page read and write
A1E000
heap
page read and write
262C000
trusted library allocation
page read and write
6001000
heap
page read and write
6205000
heap
page read and write
1510000
trusted library allocation
page read and write
6031000
heap
page read and write
8D5000
heap
page read and write
22D4000
direct allocation
page read and write
1553000
heap
page read and write
224D000
direct allocation
page read and write
545E000
trusted library allocation
page read and write
6125000
heap
page read and write
1389000
heap
page read and write
66FA000
heap
page read and write
14EE000
stack
page read and write
62F6000
heap
page read and write
39EF000
stack
page read and write
603D000
heap
page read and write
68A9000
heap
page read and write
2173000
direct allocation
page read and write
620D000
heap
page read and write
6DB000
unkown
page readonly
870000
heap
page read and write
DB1000
unkown
page write copy
CD6000
direct allocation
page read and write
A30000
heap
page read and write
66F3000
heap
page read and write
1475000
heap
page read and write
A76000
heap
page read and write
22E2000
direct allocation
page read and write
A34000
trusted library allocation
page read and write
680000
heap
page read and write
38FF000
heap
page read and write
6619000
heap
page read and write
2ED0000
heap
page read and write
2449000
direct allocation
page read and write
66F5000
heap
page read and write
53AC000
trusted library allocation
page read and write
5F0000
heap
page read and write
5DAB000
heap
page read and write
115E000
stack
page read and write
6455000
heap
page read and write
613A000
heap
page read and write
2610000
trusted library allocation
page execute and read and write
6615000
heap
page read and write
D39000
heap
page read and write
276E000
stack
page read and write
637F000
heap
page read and write
2416000
direct allocation
page read and write
62F1000
heap
page read and write
5E8D000
heap
page read and write
A76000
heap
page read and write
62FA000
heap
page read and write
61FD000
heap
page read and write
2271000
direct allocation
page read and write
6046000
heap
page read and write
21A5000
direct allocation
page read and write
603C000
heap
page read and write
3032000
trusted library allocation
page read and write
2450000
direct allocation
page read and write
2238000
direct allocation
page read and write
19D000
stack
page read and write
637F000
heap
page read and write
4C2000
unkown
page write copy
2CC0000
trusted library allocation
page read and write
246D000
direct allocation
page read and write
C09000
direct allocation
page read and write
6051000
heap
page read and write
B9D000
unkown
page write copy
85F000
stack
page read and write
577F000
stack
page read and write
6056000
heap
page read and write
66F3000
heap
page read and write
A09000
heap
page read and write
A1C000
heap
page read and write
645C000
heap
page read and write
62F1000
heap
page read and write
62E7000
heap
page read and write
249A000
direct allocation
page read and write
5E87000
heap
page read and write
63D0000
heap
page read and write
5494000
trusted library allocation
page read and write
61EA000
heap
page read and write
621C000
heap
page read and write
84E000
stack
page read and write
5E81000
heap
page read and write
2484000
direct allocation
page read and write
67D8000
heap
page read and write
401000
unkown
page execute read
5390000
trusted library allocation
page execute and read and write
1160000
heap
page read and write
64AC000
heap
page read and write
1115000
heap
page read and write
5CCD000
heap
page read and write
151D000
trusted library allocation
page execute and read and write
604E000
heap
page read and write
2189000
direct allocation
page read and write
24E3000
direct allocation
page read and write
6124000
heap
page read and write
24DC000
direct allocation
page read and write
612C000
heap
page read and write
1082000
heap
page read and write
62AF000
stack
page read and write
96000
stack
page read and write
6536000
heap
page read and write
1547000
trusted library allocation
page execute and read and write
6139000
heap
page read and write
880000
heap
page read and write
66F1000
heap
page read and write
C6F000
stack
page read and write
5F68000
heap
page read and write
6F0000
heap
page read and write
358C000
direct allocation
page read and write
CF3000
direct allocation
page read and write
35D8000
direct allocation
page read and write
6001000
heap
page read and write
6211000
heap
page read and write
67DE000
heap
page read and write
62F6000
heap
page read and write
9EB000
heap
page read and write
35B4000
direct allocation
page read and write
6F8000
stack
page read and write
604A000
heap
page read and write
612F000
heap
page read and write
217A000
direct allocation
page read and write
5CC4000
heap
page read and write
6452000
heap
page read and write
24A8000
direct allocation
page read and write
6127000
heap
page read and write
6536000
heap
page read and write
62FA000
heap
page read and write
67D8000
heap
page read and write
47AE000
stack
page read and write
604B000
heap
page read and write
5F6B000
heap
page read and write
10EE000
stack
page read and write
5DAD000
heap
page read and write
6000000
heap
page read and write
61EA000
heap
page read and write
6137000
heap
page read and write
22B0000
direct allocation
page read and write
AD1000
unkown
page execute read
A29000
heap
page read and write
5BF0000
heap
page read and write
62EE000
heap
page read and write
66F9000
heap
page read and write
1110000
heap
page read and write
C76000
direct allocation
page read and write
6000000
heap
page read and write
C51000
direct allocation
page read and write
6452000
heap
page read and write
C10000
direct allocation
page read and write
CE0000
unkown
page readonly
1530000
heap
page read and write
63C5000
heap
page read and write
9D0000
trusted library allocation
page read and write
6533000
heap
page read and write
5DA4000
heap
page read and write
2366000
direct allocation
page read and write
6210000
heap
page read and write
103E000
heap
page read and write
67D3000
heap
page read and write
6210000
heap
page read and write
5450000
trusted library allocation
page read and write
6377000
heap
page read and write
604E000
heap
page read and write
4C2D000
stack
page read and write
99000
stack
page read and write
605B000
heap
page read and write
CDD000
direct allocation
page read and write
2620000
trusted library allocation
page read and write
1564000
heap
page read and write
64B2000
heap
page read and write
C02000
direct allocation
page read and write
38AE000
stack
page read and write
DAD000
unkown
page write copy
2770000
heap
page read and write
570000
heap
page read and write
21D9000
direct allocation
page read and write
35E8000
direct allocation
page read and write
21FD000
direct allocation
page read and write
66FB000
heap
page read and write
62FF000
heap
page read and write
5E87000
heap
page read and write
2FE1000
trusted library allocation
page read and write
6537000
heap
page read and write
6126000
heap
page read and write
401000
unkown
page execute read
4D6E000
stack
page read and write
53C0000
trusted library allocation
page read and write
5F70000
heap
page read and write
6125000
heap
page read and write
66F5000
heap
page read and write
C59000
direct allocation
page read and write
3E71000
trusted library allocation
page read and write
3B2F000
stack
page read and write
6101000
heap
page read and write
A80000
heap
page read and write
A0D000
heap
page read and write
A7C000
heap
page read and write
63CF000
heap
page read and write
579E000
stack
page read and write
5F68000
heap
page read and write
27A0000
heap
page read and write
895000
heap
page read and write
CAA000
direct allocation
page read and write
66EB000
heap
page read and write
C6F000
direct allocation
page read and write
27A3000
heap
page read and write
5454000
trusted library allocation
page read and write
6030000
heap
page read and write
2C94000
trusted library allocation
page read and write
62F8000
heap
page read and write
6000000
heap
page read and write
21EF000
direct allocation
page read and write
2680000
heap
page read and write
62F5000
heap
page read and write
67C6000
heap
page read and write
13BD000
heap
page read and write
6000000
heap
page read and write
A28000
heap
page read and write
C41000
direct allocation
page read and write
235F000
direct allocation
page read and write
5E82000
heap
page read and write
5F6A000
heap
page read and write
66F9000
heap
page read and write
109A000
heap
page read and write
D7D000
unkown
page readonly
23F2000
direct allocation
page read and write
A93000
heap
page read and write
5461000
trusted library allocation
page read and write
A01000
heap
page read and write
3B6E000
stack
page read and write
23C0000
direct allocation
page read and write
9D8000
heap
page read and write
AD0000
unkown
page readonly
6534000
heap
page read and write
219E000
direct allocation
page read and write
6058000
heap
page read and write
A25000
heap
page read and write
2221000
direct allocation
page read and write
A33000
trusted library allocation
page execute and read and write
55A0000
trusted library allocation
page read and write
9FF000
heap
page read and write
BA1000
unkown
page write copy
888000
heap
page read and write
5CCB000
heap
page read and write
6458000
heap
page read and write
66FE000
heap
page read and write
A2B000
heap
page read and write
6CE000
unkown
page read and write
63D3000
heap
page read and write
242C000
direct allocation
page read and write
604E000
heap
page read and write
2DCC000
trusted library allocation
page read and write
136C000
heap
page read and write
603C000
heap
page read and write
661B000
heap
page read and write
256E000
stack
page read and write
850000
heap
page read and write
6216000
heap
page read and write
400000
unkown
page readonly
6054000
heap
page read and write
22A1000
direct allocation
page read and write
620E000
heap
page read and write
2332000
direct allocation
page read and write
177E000
stack
page read and write
6043000
heap
page read and write
139F000
stack
page read and write
6127000
heap
page read and write
63DB000
heap
page read and write
6609000
heap
page read and write
5F6A000
heap
page read and write
2E40000
heap
page read and write
2300000
direct allocation
page read and write
62F6000
heap
page read and write
5F63000
heap
page read and write
66FA000
heap
page read and write
604E000
heap
page read and write
BCB000
stack
page read and write
63C1000
heap
page read and write
5CC1000
heap
page read and write
1500000
trusted library allocation
page read and write
F40000
remote allocation
page execute and read and write
67DD000
heap
page read and write
6139000
heap
page read and write
5F74000
heap
page read and write
62F0000
heap
page read and write
2630000
heap
page execute and read and write
63D8000
heap
page read and write
6601000
heap
page read and write
2FDE000
stack
page read and write
223F000
direct allocation
page read and write
100E000
remote allocation
page execute and read and write
5F63000
heap
page read and write
A21000
heap
page read and write
5CCB000
heap
page read and write
4D70000
heap
page read and write
1028000
heap
page read and write
611F000
heap
page read and write
63D3000
heap
page read and write
63DA000
heap
page read and write
620A000
heap
page read and write
67DA000
heap
page read and write
6056000
heap
page read and write
3A2E000
stack
page read and write
2AB0000
heap
page read and write
E3B000
stack
page read and write
21C9000
direct allocation
page read and write
6536000
heap
page read and write
C9B000
direct allocation
page read and write
621B000
heap
page read and write
66F6000
heap
page read and write
63D8000
heap
page read and write
8D0000
heap
page read and write
5F69000
heap
page read and write
2520000
trusted library allocation
page read and write
5DAB000
heap
page read and write
CE1000
unkown
page execute read
3035000
trusted library allocation
page read and write
A78000
heap
page read and write
603B000
heap
page read and write
12F0000
heap
page read and write
560000
heap
page read and write
613C000
heap
page read and write
6987000
heap
page read and write
1352000
heap
page read and write
B6D000
unkown
page readonly
62FA000
heap
page read and write
3591000
direct allocation
page read and write
6376000
heap
page read and write
5F69000
heap
page read and write
6608000
heap
page read and write
604D000
heap
page read and write
1324000
heap
page read and write
603A000
heap
page read and write
5CC3000
heap
page read and write
3DAD000
stack
page read and write
6458000
heap
page read and write
BE3000
direct allocation
page read and write
21BB000
direct allocation
page read and write
F00000
remote allocation
page execute and read and write
1700000
trusted library allocation
page read and write
245F000
direct allocation
page read and write
2254000
direct allocation
page read and write
613F000
heap
page read and write
66FA000
heap
page read and write
6055000
heap
page read and write
5CC5000
heap
page read and write
247D000
direct allocation
page read and write
620A000
heap
page read and write
5F69000
heap
page read and write
6040000
heap
page read and write
61BE000
heap
page read and write
6139000
heap
page read and write
5F68000
heap
page read and write
62FF000
heap
page read and write
4B7000
unkown
page read and write
5DA7000
heap
page read and write
FCE000
remote allocation
page execute and read and write
5444000
trusted library allocation
page read and write
B91000
unkown
page readonly
6454000
heap
page read and write
61BE000
stack
page read and write
8D9000
heap
page read and write
68AB000
heap
page read and write
5BFE000
heap
page read and write
6041000
heap
page read and write
There are 984 hidden memdumps, click here to show them.