IOC Report
merged.exe.bin.exe

loading gifFilesProcessesURLsDomainsIPsRegistryMemdumps642010010Label

Files

File Path
Type
Category
Malicious
Download
merged.exe.bin.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
initial sample
malicious
C:\ClickMe.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\CLR_v2.0\UsageLogs\merged.exe.bin.exe.log
ASCII text, with CRLF line terminators
dropped
malicious
C:\Users\user\AppData\Local\Temp\MegaJoinerExtracted\Payload.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\MegaJoinerExtracted\Webhooker.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\c382eb151c59bd833b24120723eac541.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\dllhost.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\CLR_v2.0_32\UsageLogs\Payload.exe.log
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\CLR_v2.0_32\UsageLogs\dllhost.exe.log
ASCII text, with CRLF line terminators
dropped

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\merged.exe.bin.exe
"C:\Users\user\Desktop\merged.exe.bin.exe"
malicious
C:\Users\user\AppData\Local\Temp\MegaJoinerExtracted\Payload.exe
"C:\Users\user\AppData\Local\Temp\MegaJoinerExtracted\Payload.exe"
malicious
C:\Users\user\AppData\Roaming\dllhost.exe
"C:\Users\user\AppData\Roaming\dllhost.exe"
malicious
C:\Users\user\AppData\Roaming\dllhost.exe
"C:\Users\user\AppData\Roaming\dllhost.exe" ..
malicious
C:\Users\user\AppData\Roaming\dllhost.exe
"C:\Users\user\AppData\Roaming\dllhost.exe" ..
malicious
C:\Users\user\AppData\Roaming\dllhost.exe
"C:\Users\user\AppData\Roaming\dllhost.exe" ..
malicious
C:\Windows\System32\dllhost.exe
C:\Windows\system32\DllHost.exe /Processid:{AB8902B4-09CA-4BB6-B78D-A8F59079A8D5}
malicious
C:\Users\user\AppData\Local\Temp\MegaJoinerExtracted\Webhooker.exe
"C:\Users\user\AppData\Local\Temp\MegaJoinerExtracted\Webhooker.exe"

URLs

Name
IP
Malicious
https://api.ipify.org/
104.26.13.205
https://api.ipify.org
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
https://discordapp.com/api/webhooks/1285640189338980413/Vp1RUEavUzHMGxrmvbJlZg4OMFtG7ABsJ2zU8xXZFkrJ
unknown
http://api.ipify.org
unknown
https://pastebin.com/raw/???
unknown

Domains

Name
IP
Malicious
gabh.gotdns.ch
46.121.250.34
malicious
api.ipify.org
104.26.13.205

IPs

IP
Domain
Country
Malicious
46.121.250.34
gabh.gotdns.ch
Israel
malicious
104.26.13.205
api.ipify.org
United States

Registry

Path
Value
Malicious
HKEY_CURRENT_USER
di
malicious
HKEY_CURRENT_USER\Environment
SEE_MASK_NOZONECHECKS
malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
c382eb151c59bd833b24120723eac541
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Webhooker_RASAPI32
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Webhooker_RASAPI32
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Webhooker_RASAPI32
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Webhooker_RASAPI32
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Webhooker_RASAPI32
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Webhooker_RASAPI32
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Webhooker_RASAPI32
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Webhooker_RASMANCS
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Webhooker_RASMANCS
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Webhooker_RASMANCS
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Webhooker_RASMANCS
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Webhooker_RASMANCS
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Webhooker_RASMANCS
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Webhooker_RASMANCS
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run
c382eb151c59bd833b24120723eac541
HKEY_CURRENT_USER\SOFTWARE\c382eb151c59bd833b24120723eac541
[kl]
There are 9 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
Download
12B20000
trusted library allocation
page read and write
malicious
2AF1000
trusted library allocation
page read and write
malicious
532000
unkown
page readonly
malicious
2B11000
trusted library allocation
page read and write
malicious
3A16000
trusted library allocation
page read and write
A72000
trusted library allocation
page execute and read and write
29837F30000
heap
page read and write
5084000
trusted library allocation
page read and write
5670000
trusted library allocation
page read and write
D26000
trusted library allocation
page execute and read and write
7B0000
heap
page read and write
F621EFE000
stack
page read and write
4BD9000
trusted library allocation
page read and write
D24000
trusted library allocation
page read and write
500000
heap
page read and write
7FFB96776000
trusted library allocation
page read and write
16845000
trusted library allocation
page read and write
2981F607000
trusted library allocation
page read and write
A4EE000
stack
page read and write
B80000
trusted library allocation
page read and write
3A95000
trusted library allocation
page read and write
503D000
stack
page read and write
2F56000
trusted library allocation
page read and write
F621FFC000
stack
page read and write
16B4A000
trusted library allocation
page read and write
1597000
trusted library allocation
page execute and read and write
E3E000
stack
page read and write
2981DB60000
heap
page read and write
4481000
trusted library allocation
page read and write
B32D000
unkown
page read and write
2981F5CB000
trusted library allocation
page read and write
8EEE000
stack
page read and write
D2A000
trusted library allocation
page execute and read and write
7FFB966ED000
trusted library allocation
page execute and read and write
9E0000
heap
page read and write
8B2E000
stack
page read and write
A75000
heap
page read and write
5EDE000
stack
page read and write
70ED000
stack
page read and write
7FF48D090000
trusted library allocation
page execute and read and write
690000
heap
page read and write
29B1000
trusted library allocation
page read and write
2E43000
trusted library allocation
page read and write
2ADD000
trusted library allocation
page read and write
2981D990000
heap
page read and write
2981DA62000
heap
page read and write
652E000
stack
page read and write
1B6B0000
heap
page read and write
52AE000
stack
page read and write
7AED000
stack
page read and write
1B510000
heap
page read and write
2981F510000
trusted library allocation
page read and write
142E000
stack
page read and write
7FFB9A973000
trusted library allocation
page execute and read and write
1037000
trusted library allocation
page execute and read and write
9DE000
heap
page read and write
7FFB96860000
trusted library allocation
page read and write
15CB000
trusted library allocation
page execute and read and write
5D0E000
stack
page read and write
BDCE000
stack
page read and write
F30000
heap
page read and write
1652000
heap
page read and write
60B000
heap
page read and write
2981DA8E000
heap
page read and write
4751000
trusted library allocation
page read and write
971000
heap
page read and write
15C7000
trusted library allocation
page execute and read and write
92AE000
stack
page read and write
5120000
trusted library allocation
page execute and read and write
C6F000
stack
page read and write
39B4000
trusted library allocation
page read and write
8AEE000
stack
page read and write
BECE000
stack
page read and write
4DAD000
stack
page read and write
1B6C0000
heap
page read and write
550F000
stack
page read and write
5A10000
heap
page read and write
8D0000
heap
page read and write
1460000
heap
page read and write
1582000
trusted library allocation
page execute and read and write
2981F5D8000
trusted library allocation
page read and write
535B000
trusted library allocation
page read and write
547F000
stack
page read and write
53CE000
stack
page read and write
ABB0000
heap
page read and write
165E5000
trusted library allocation
page read and write
3483000
trusted library allocation
page read and write
5F7B000
heap
page read and write
5C0E000
stack
page read and write
E50000
heap
page execute and read and write
29837F79000
heap
page read and write
5B1E000
stack
page read and write
564E000
stack
page read and write
298380E0000
heap
page execute and read and write
573D000
stack
page read and write
4BD0000
heap
page read and write
15E0000
heap
page read and write
2982F531000
trusted library allocation
page read and write
836D000
stack
page read and write
159A000
trusted library allocation
page execute and read and write
3A28000
trusted library allocation
page read and write
1B4A0000
heap
page read and write
7C2E000
stack
page read and write
39B1000
trusted library allocation
page read and write
7FFB966C2000
trusted library allocation
page read and write
8D0000
trusted library allocation
page read and write
2981F65A000
trusted library allocation
page read and write
722E000
stack
page read and write
3AF1000
trusted library allocation
page read and write
1CA6D000
stack
page read and write
3DFC000
trusted library allocation
page read and write
BBB000
trusted library allocation
page execute and read and write
51A0000
trusted library allocation
page read and write
47A8000
trusted library allocation
page read and write
20A44000
trusted library allocation
page read and write
B82E000
stack
page read and write
D50000
heap
page read and write
4C66000
trusted library allocation
page read and write
4F2E000
stack
page read and write
2981F5B8000
trusted library allocation
page read and write
7E6D000
stack
page read and write
1E30B000
stack
page read and write
5680000
trusted library allocation
page execute and read and write
1004000
trusted library allocation
page read and write
B7E000
stack
page read and write
10E0000
heap
page read and write
ADB0000
heap
page read and write
52EE000
stack
page read and write
4CCE000
stack
page read and write
3FC9000
trusted library allocation
page read and write
905000
heap
page read and write
8DA000
trusted library allocation
page execute and read and write
4C6D000
stack
page read and write
601F000
stack
page read and write
AFED000
stack
page read and write
822D000
stack
page read and write
6D2D000
stack
page read and write
A0A000
heap
page read and write
AB2E000
stack
page read and write
1050000
heap
page read and write
1340000
trusted library allocation
page read and write
5C9E000
stack
page read and write
570D000
stack
page read and write
4D00000
trusted library allocation
page read and write
37C4000
trusted library allocation
page read and write
5ED0000
heap
page read and write
5F8000
heap
page read and write
A10000
trusted library allocation
page execute and read and write
FD0000
heap
page read and write
8F2000
trusted library allocation
page execute and read and write
7FFB9AA1A000
trusted library allocation
page execute and read and write
55CE000
stack
page read and write
158A000
trusted library allocation
page execute and read and write
6AE0000
heap
page read and write
16501000
trusted library allocation
page read and write
A8AD000
stack
page read and write
BB7000
trusted library allocation
page execute and read and write
7FFB9A96F000
trusted library allocation
page execute and read and write
4B2C000
trusted library allocation
page read and write
16B13000
trusted library allocation
page read and write
7FFB9AAF0000
trusted library allocation
page execute and read and write
D20000
trusted library allocation
page read and write
247F000
stack
page read and write
E20000
heap
page read and write
538D000
stack
page read and write
16C6F000
trusted library allocation
page read and write
7AAD000
stack
page read and write
169D8000
trusted library allocation
page read and write
4AAF000
stack
page read and write
53EE000
stack
page read and write
653000
heap
page read and write
6860000
trusted library allocation
page read and write
F4D000
heap
page read and write
A9EE000
stack
page read and write
1110000
heap
page read and write
B82000
trusted library allocation
page execute and read and write
3B09000
trusted library allocation
page read and write
7FFB9A960000
trusted library allocation
page read and write
1655000
heap
page read and write
5FEC000
heap
page read and write
89EE000
stack
page read and write
907000
trusted library allocation
page execute and read and write
A20000
trusted library allocation
page read and write
A40000
heap
page read and write
8F9000
stack
page read and write
3F70000
trusted library allocation
page read and write
70AE000
stack
page read and write
107E000
stack
page read and write
5F1E000
stack
page read and write
C80000
heap
page execute and read and write
7FFB9AA02000
trusted library allocation
page execute and read and write
347D000
stack
page read and write
580E000
stack
page read and write
7FEE000
stack
page read and write
2CDF000
trusted library allocation
page read and write
2981F5C5000
trusted library allocation
page read and write
20000
trusted library allocation
page read and write
4CA6000
trusted library allocation
page read and write
4E51000
trusted library allocation
page read and write
554E000
stack
page read and write
6BEE000
stack
page read and write
400000
unkown
page readonly
2983800D000
heap
page read and write
8BF000
stack
page read and write
C4CD000
stack
page read and write
1572000
trusted library allocation
page execute and read and write
540E000
stack
page read and write
E00000
trusted library allocation
page read and write
157A000
trusted library allocation
page execute and read and write
7FFB9AA1D000
trusted library allocation
page execute and read and write
337D000
stack
page read and write
65B000
stack
page read and write
514E000
stack
page read and write
2D74000
trusted library allocation
page read and write
2981F5C8000
trusted library allocation
page read and write
15B2000
trusted library allocation
page execute and read and write
4F6000
stack
page read and write
1B6E4000
heap
page read and write
5B5E000
stack
page read and write
2E91000
trusted library allocation
page read and write
C00E000
stack
page read and write
67D000
heap
page read and write
5690000
heap
page read and write
D55000
heap
page read and write
1B40A000
trusted library allocation
page read and write
12B17000
trusted library allocation
page read and write
93E000
heap
page read and write
EBF000
stack
page read and write
513E000
stack
page read and write
1590000
trusted library allocation
page read and write
4D6E000
stack
page read and write
16BC2000
trusted library allocation
page read and write
7FFB966D0000
trusted library allocation
page read and write
3907000
trusted library allocation
page read and write
E8E000
stack
page read and write
55F1000
heap
page read and write
7BED000
stack
page read and write
A50000
trusted library allocation
page read and write
2981DB23000
trusted library allocation
page read and write
3B77000
trusted library allocation
page read and write
2C4F000
trusted library allocation
page read and write
772E000
stack
page read and write
590000
heap
page read and write
5D4D000
stack
page read and write
F5E000
stack
page read and write
38A7000
trusted library allocation
page read and write
4C10000
trusted library allocation
page read and write
3AF5000
trusted library allocation
page read and write
407A000
trusted library allocation
page read and write
9FE000
stack
page read and write
15E8000
heap
page read and write
910000
heap
page read and write
13E0000
heap
page read and write
45F5000
trusted library allocation
page read and write
1B3ED000
stack
page read and write
6850000
trusted library allocation
page read and write
AFF0000
heap
page read and write
3A89000
trusted library allocation
page read and write
37C1000
trusted library allocation
page read and write
29837C70000
heap
page read and write
7FFB966EB000
trusted library allocation
page execute and read and write
4F13000
trusted library allocation
page read and write
A8EE000
stack
page read and write
786D000
stack
page read and write
88AD000
stack
page read and write
1580000
trusted library allocation
page read and write
49C4000
trusted library allocation
page read and write
8C2E000
stack
page read and write
29837FF0000
heap
page read and write
F63000
heap
page read and write
9AE000
heap
page read and write
8CE000
stack
page read and write
578F000
stack
page read and write
FA8000
heap
page read and write
7FFB9AA82000
trusted library allocation
page read and write
4AAE000
stack
page read and write
4EA5000
trusted library allocation
page read and write
B6E000
stack
page read and write
5DCE000
stack
page read and write
4AD5000
trusted library allocation
page read and write
6FAD000
stack
page read and write
5150000
heap
page read and write
167CF000
trusted library allocation
page read and write
7FFB966C4000
trusted library allocation
page read and write
F6227FE000
stack
page read and write
2981D9E0000
trusted library allocation
page read and write
62CC000
stack
page read and write
3BC9000
trusted library allocation
page read and write
7FF48D080000
trusted library allocation
page execute and read and write
4514000
trusted library allocation
page read and write
630D000
stack
page read and write
7FFB9AA90000
trusted library allocation
page execute and read and write
7FFB9A952000
trusted library allocation
page execute and read and write
2981DA00000
trusted library allocation
page read and write
ABAE000
stack
page read and write
9A8000
heap
page read and write
7FFB9671C000
trusted library allocation
page execute and read and write
3AC8000
trusted library allocation
page read and write
4545000
trusted library allocation
page read and write
6E2E000
stack
page read and write
29837FE0000
heap
page read and write
55D0000
heap
page read and write
29837F56000
heap
page read and write
CF6000
heap
page read and write
16C51000
trusted library allocation
page read and write
29B3000
trusted library allocation
page read and write
29837F2E000
heap
page read and write
CEE000
stack
page read and write
A3EE000
stack
page read and write
3D5B000
trusted library allocation
page read and write
84ED000
stack
page read and write
DF4000
trusted library allocation
page read and write
1CB6E000
stack
page read and write
1010000
trusted library allocation
page execute and read and write
1B61D000
stack
page read and write
29837F5A000
heap
page read and write
D43000
heap
page execute and read and write
7FFB9AA0A000
trusted library allocation
page execute and read and write
54FD000
stack
page read and write
68FE000
stack
page read and write
97E000
stack
page read and write
862E000
stack
page read and write
5A0D000
stack
page read and write
F0A000
trusted library allocation
page execute and read and write
84AD000
stack
page read and write
9B0000
heap
page read and write
900000
heap
page read and write
13E5000
heap
page read and write
3968000
trusted library allocation
page read and write
AD0000
heap
page read and write
16722000
trusted library allocation
page read and write
AFAE000
stack
page read and write
93B000
heap
page read and write
A80000
heap
page read and write
4B63000
trusted library allocation
page read and write
2981F603000
trusted library allocation
page read and write
1020000
trusted library allocation
page read and write
4EBE000
stack
page read and write
53C9000
trusted library allocation
page read and write
693E000
stack
page read and write
2981F520000
heap
page execute and read and write
B01A000
heap
page read and write
6A3E000
stack
page read and write
4F69000
trusted library allocation
page read and write
7FFB966E0000
trusted library allocation
page read and write
3BB4000
trusted library allocation
page read and write
29839140000
heap
page read and write
1450000
trusted library allocation
page read and write
B9A000
trusted library allocation
page execute and read and write
812D000
stack
page read and write
51DF000
trusted library allocation
page read and write
AB6D000
stack
page read and write
B46E000
stack
page read and write
4E48000
trusted library allocation
page read and write
50DB000
trusted library allocation
page read and write
F22000
trusted library allocation
page execute and read and write
16CC6000
trusted library allocation
page read and write
80ED000
stack
page read and write
A9B000
heap
page read and write
7FFB966E4000
trusted library allocation
page read and write
8D6E000
stack
page read and write
165F000
heap
page read and write
1E310000
heap
page read and write
67FE000
stack
page read and write
4CF0000
trusted library allocation
page execute and read and write
6AD0000
heap
page read and write
1E20E000
stack
page read and write
16741000
trusted library allocation
page read and write
7FFB9AAD0000
trusted library allocation
page execute and read and write
4A1B000
trusted library allocation
page read and write
47FE000
stack
page read and write
B8AD000
stack
page read and write
4C7D000
stack
page read and write
2983B880000
trusted library allocation
page read and write
3C73000
trusted library allocation
page read and write
29838135000
heap
page read and write
4DE2000
trusted library allocation
page read and write
4FDE000
stack
page read and write
3AF4000
trusted library allocation
page read and write
75ED000
stack
page read and write
3CB9000
trusted library allocation
page read and write
93B000
heap
page read and write
736E000
stack
page read and write
F6A000
stack
page read and write
D40000
heap
page execute and read and write
9EF000
stack
page read and write
7FFB96780000
trusted library allocation
page execute and read and write
B20000
heap
page read and write
565E000
stack
page read and write
7EAD000
stack
page read and write
5571000
heap
page read and write
3E41000
trusted library allocation
page read and write
5F0000
heap
page read and write
4DE0000
heap
page read and write
4FA0000
trusted library allocation
page read and write
D36000
stack
page read and write
5130000
trusted library allocation
page read and write
C28E000
stack
page read and write
1694A000
trusted library allocation
page read and write
31A4000
trusted library allocation
page read and write
16DC000
heap
page read and write
2981DC00000
heap
page read and write
2981D870000
heap
page read and write
4A9E000
trusted library allocation
page read and write
AB3000
heap
page read and write
5A8E000
stack
page read and write
1467000
heap
page read and write
5740000
trusted library allocation
page execute and read and write
15BA000
trusted library allocation
page execute and read and write
3B69000
trusted library allocation
page read and write
2981D970000
heap
page read and write
4CE0000
trusted library allocation
page read and write
5181000
heap
page read and write
732D000
stack
page read and write
D2C000
trusted library allocation
page execute and read and write
9D4000
heap
page read and write
2981D7E2000
unkown
page readonly
2981F5B5000
trusted library allocation
page read and write
A52E000
stack
page read and write
5ECE000
stack
page read and write
506D000
stack
page read and write
6F6E000
stack
page read and write
D42000
trusted library allocation
page execute and read and write
7FFB9A94A000
trusted library allocation
page execute and read and write
46FA000
trusted library allocation
page read and write
C4E000
stack
page read and write
586E000
stack
page read and write
169F000
heap
page read and write
E90000
heap
page read and write
3A55000
trusted library allocation
page read and write
3B54000
trusted library allocation
page read and write
29837CA3000
heap
page read and write
F6220FF000
stack
page read and write
169B000
heap
page read and write
548D000
stack
page read and write
52AD000
trusted library allocation
page read and write
916E000
stack
page read and write
8D6000
trusted library allocation
page execute and read and write
5841000
trusted library allocation
page read and write
1B6B5000
heap
page read and write
2981DC40000
heap
page read and write
7FFB9AA10000
trusted library allocation
page read and write
537E000
stack
page read and write
4BAF000
stack
page read and write
1000000
trusted library allocation
page read and write
D20000
trusted library allocation
page read and write
5408000
trusted library allocation
page read and write
7FFB96770000
trusted library allocation
page read and write
158C000
trusted library allocation
page execute and read and write
94B000
heap
page read and write
8EA000
trusted library allocation
page execute and read and write
54BE000
stack
page read and write
9F8000
heap
page read and write
40D3000
trusted library allocation
page read and write
504D000
stack
page read and write
3D1A000
trusted library allocation
page read and write
2E41000
trusted library allocation
page read and write
7FFB966DD000
trusted library allocation
page execute and read and write
54CD000
stack
page read and write
55B2000
heap
page read and write
16C19000
trusted library allocation
page read and write
B5AD000
stack
page read and write
54BD000
stack
page read and write
52ED000
stack
page read and write
7FAD000
stack
page read and write
2981DA15000
heap
page read and write
9DA000
heap
page read and write
1CD6E000
stack
page read and write
495E000
stack
page read and write
7FFB9A966000
trusted library allocation
page read and write
598E000
stack
page read and write
E25000
heap
page read and write
D2A000
trusted library allocation
page read and write
2981DBF0000
trusted library section
page readonly
46C4000
trusted library allocation
page read and write
61CE000
stack
page read and write
27AE000
stack
page read and write
8FA000
trusted library allocation
page execute and read and write
E1A000
trusted library allocation
page read and write
8E5000
heap
page read and write
B86000
trusted library allocation
page execute and read and write
4EFC000
trusted library allocation
page read and write
3C13000
trusted library allocation
page read and write
12B11000
trusted library allocation
page read and write
F1A000
trusted library allocation
page execute and read and write
2981F5F7000
trusted library allocation
page read and write
16ABE000
trusted library allocation
page read and write
4C80000
heap
page read and write
A76E000
stack
page read and write
2981D7E6000
unkown
page readonly
402000
unkown
page readonly
1B400000
trusted library allocation
page read and write
B8A000
trusted library allocation
page execute and read and write
7FFB9A9A4000
trusted library allocation
page execute and read and write
9B1000
heap
page read and write
C24E000
stack
page read and write
74AD000
stack
page read and write
5169000
trusted library allocation
page read and write
584E000
stack
page read and write
916000
heap
page read and write
5D9E000
stack
page read and write
B86E000
stack
page read and write
EFA000
trusted library allocation
page execute and read and write
131F000
stack
page read and write
4D6B000
trusted library allocation
page read and write
5140000
heap
page read and write
7FFB96880000
trusted library allocation
page read and write
3E66000
trusted library allocation
page read and write
528F000
stack
page read and write
400000
unkown
page readonly
C38E000
stack
page read and write
872D000
stack
page read and write
4FD7000
trusted library allocation
page read and write
1CC6E000
stack
page read and write
4D34000
trusted library allocation
page read and write
5BCE000
stack
page read and write
BA2000
trusted library allocation
page execute and read and write
51ED000
stack
page read and write
8C2000
trusted library allocation
page execute and read and write
756000
stack
page read and write
16538000
trusted library allocation
page read and write
2981DA20000
heap
page read and write
782E000
stack
page read and write
2981F5BE000
trusted library allocation
page read and write
29838130000
heap
page read and write
B8C000
trusted library allocation
page execute and read and write
6310000
unclassified section
page read and write
4855000
trusted library allocation
page read and write
590000
heap
page read and write
1689C000
trusted library allocation
page read and write
B7EE000
stack
page read and write
1344000
trusted library allocation
page read and write
85ED000
stack
page read and write
8E0000
heap
page read and write
7FFB967E0000
trusted library allocation
page execute and read and write
BFE000
stack
page read and write
16E0000
heap
page read and write
2981DA60000
heap
page read and write
685C000
trusted library allocation
page read and write
CA0000
heap
page read and write
2981F5BB000
trusted library allocation
page read and write
4E19000
trusted library allocation
page read and write
5DB000
stack
page read and write
93F000
heap
page read and write
594F000
stack
page read and write
1330000
heap
page execute and read and write
2981DB20000
trusted library allocation
page read and write
1C7C0000
heap
page read and write
59CE000
stack
page read and write
3C59000
trusted library allocation
page read and write
A62E000
stack
page read and write
F02000
trusted library allocation
page execute and read and write
A30000
heap
page read and write
7FFB96890000
trusted library allocation
page execute and read and write
29837C90000
heap
page execute and read and write
4AF8000
trusted library allocation
page read and write
2E8D000
trusted library allocation
page read and write
2FFE000
stack
page read and write
518E000
stack
page read and write
61BE000
stack
page read and write
7FFB966CD000
trusted library allocation
page execute and read and write
89AE000
stack
page read and write
CF3000
heap
page read and write
EE0000
trusted library allocation
page read and write
4EFE000
stack
page read and write
30EA000
trusted library allocation
page read and write
1B513000
heap
page read and write
464C000
trusted library allocation
page read and write
EF2000
trusted library allocation
page execute and read and write
1E510000
trusted library allocation
page read and write
543F000
trusted library allocation
page read and write
10F0000
heap
page read and write
D3A000
trusted library allocation
page execute and read and write
980000
heap
page read and write
12F9000
stack
page read and write
F06000
trusted library allocation
page execute and read and write
930000
heap
page read and write
BFCD000
stack
page read and write
16B8000
heap
page read and write
7FFB96870000
trusted library allocation
page execute and read and write
1350000
heap
page read and write
6A7D000
stack
page read and write
2981DA26000
heap
page read and write
7FFB9677C000
trusted library allocation
page execute and read and write
5DDE000
stack
page read and write
83AD000
stack
page read and write
90B000
trusted library allocation
page execute and read and write
15C0000
trusted library allocation
page read and write
540000
heap
page read and write
DFA000
trusted library allocation
page read and write
A70000
heap
page read and write
16674000
trusted library allocation
page read and write
60D000
heap
page read and write
B6AD000
stack
page read and write
1717000
heap
page read and write
1EEDE000
stack
page read and write
5C0000
heap
page read and write
15C2000
trusted library allocation
page read and write
5690000
trusted library allocation
page read and write
5D8D000
stack
page read and write
2981F531000
trusted library allocation
page read and write
65AD000
stack
page read and write
4CFD000
trusted library allocation
page read and write
F621AF0000
stack
page read and write
628B000
stack
page read and write
27C1000
trusted library allocation
page read and write
F38000
heap
page read and write
1658E000
trusted library allocation
page read and write
7FFB966C3000
trusted library allocation
page execute and read and write
4DBD000
stack
page read and write
16A4000
heap
page read and write
5C0E000
stack
page read and write
516E000
stack
page read and write
459E000
trusted library allocation
page read and write
29837CA0000
heap
page read and write
568E000
stack
page read and write
D60000
heap
page execute and read and write
624D000
stack
page read and write
9BF000
heap
page read and write
2981D950000
heap
page read and write
D12000
trusted library allocation
page execute and read and write
8C6E000
stack
page read and write
AF8000
heap
page read and write
902D000
stack
page read and write
5276000
trusted library allocation
page read and write
8D2000
trusted library allocation
page execute and read and write
3C2A000
trusted library allocation
page read and write
5530000
heap
page read and write
970000
heap
page read and write
573E000
stack
page read and write
A9D000
heap
page read and write
29839AD2000
trusted library allocation
page read and write
7FFB9A942000
trusted library allocation
page execute and read and write
642E000
stack
page read and write
16778000
trusted library allocation
page read and write
5E0000
heap
page read and write
2981F5E3000
trusted library allocation
page read and write
4EEF000
stack
page read and write
DF0000
trusted library allocation
page read and write
39C8000
trusted library allocation
page read and write
C60000
heap
page read and write
2981DA98000
heap
page read and write
2981D7E0000
unkown
page readonly
27CE000
stack
page read and write
7D6D000
stack
page read and write
5A0000
heap
page read and write
545000
stack
page read and write
166EB000
trusted library allocation
page read and write
502E000
trusted library allocation
page read and write
37E6000
trusted library allocation
page read and write
166AB000
trusted library allocation
page read and write
79AE000
stack
page read and write
5ACE000
stack
page read and write
1030000
trusted library allocation
page read and write
930000
heap
page read and write
1E33B000
heap
page read and write
8CA000
trusted library allocation
page execute and read and write
4F0D000
stack
page read and write
5236000
trusted library allocation
page read and write
2981D7E0000
unkown
page readonly
D4A000
trusted library allocation
page execute and read and write
5C5E000
stack
page read and write
6A6E000
stack
page read and write
2981DBC0000
heap
page read and write
3847000
trusted library allocation
page read and write
385F000
trusted library allocation
page read and write
2EFE000
stack
page read and write
8EAE000
stack
page read and write
15A7000
heap
page read and write
1663D000
trusted library allocation
page read and write
4B7D000
stack
page read and write
15A0000
heap
page read and write
605C000
stack
page read and write
C3CD000
stack
page read and write
29837F19000
heap
page read and write
7FFB9AAE0000
trusted library allocation
page execute and read and write
EC0000
heap
page read and write
3823000
trusted library allocation
page read and write
10CE000
stack
page read and write
5750000
trusted library allocation
page read and write
B42E000
stack
page read and write
2981DC45000
heap
page read and write
103B000
trusted library allocation
page execute and read and write
D00000
trusted library allocation
page read and write
55BE000
stack
page read and write
555E000
stack
page read and write
D57000
trusted library allocation
page execute and read and write
1B6D0000
heap
page read and write
876D000
stack
page read and write
F2A000
trusted library allocation
page execute and read and write
3481000
trusted library allocation
page read and write
FC0000
heap
page read and write
6E6D000
stack
page read and write
93AE000
stack
page read and write
71EE000
stack
page read and write
8DAE000
stack
page read and write
2981DA2C000
heap
page read and write
76EE000
stack
page read and write
7D2D000
stack
page read and write
2981F5F5000
trusted library allocation
page read and write
620D000
stack
page read and write
A7A000
trusted library allocation
page execute and read and write
5E0000
trusted library allocation
page read and write
44BD000
trusted library allocation
page read and write
55FE000
stack
page read and write
AFF2000
heap
page read and write
A10000
heap
page read and write
5112000
trusted library allocation
page read and write
4903000
trusted library allocation
page read and write
A7AE000
stack
page read and write
FF0000
heap
page execute and read and write
15EE000
heap
page read and write
886D000
stack
page read and write
AA2E000
stack
page read and write
3EBD000
trusted library allocation
page read and write
C3B000
stack
page read and write
ACD000
stack
page read and write
8E0000
heap
page read and write
4E0D000
stack
page read and write
B6EE000
stack
page read and write
796D000
stack
page read and write
29837C93000
heap
page execute and read and write
A66E000
stack
page read and write
DB0000
heap
page read and write
D70000
heap
page read and write
62BF000
stack
page read and write
F6228FC000
stack
page read and write
6AC0000
heap
page read and write
746E000
stack
page read and write
926E000
stack
page read and write
DAE000
stack
page read and write
A7E000
stack
page read and write
75AE000
stack
page read and write
4C30000
trusted library allocation
page read and write
3DBC000
trusted library allocation
page read and write
501E000
stack
page read and write
ACB0000
heap
page read and write
56FE000
stack
page read and write
656D000
stack
page read and write
F2F000
stack
page read and write
167EE000
trusted library allocation
page read and write
58E000
stack
page read and write
3E44000
trusted library allocation
page read and write
237E000
stack
page read and write
29837F9F000
heap
page read and write
4F10000
heap
page read and write
4FFE000
stack
page read and write
E10000
trusted library allocation
page read and write
8DC000
trusted library allocation
page execute and read and write
9B0000
heap
page execute and read and write
A00000
trusted library allocation
page read and write
A60000
heap
page read and write
16A0F000
trusted library allocation
page read and write
4021000
trusted library allocation
page read and write
5760000
heap
page read and write
4F4F000
heap
page read and write
16A86000
trusted library allocation
page read and write
12F6000
stack
page read and write
B1EE000
stack
page read and write
2981F5C2000
trusted library allocation
page read and write
D1A000
trusted library allocation
page execute and read and write
D22000
trusted library allocation
page execute and read and write
1687C000
trusted library allocation
page read and write
168D3000
trusted library allocation
page read and write
912E000
stack
page read and write
C7E000
stack
page read and write
552E000
stack
page read and write
12B15000
trusted library allocation
page read and write
583E000
stack
page read and write
B2ED000
stack
page read and write
7FF4E97C0000
trusted library allocation
page execute and read and write
4BCE000
stack
page read and write
6922000
trusted library allocation
page read and write
3E7C000
trusted library allocation
page read and write
2981DA10000
heap
page read and write
B56E000
stack
page read and write
CF0000
heap
page read and write
2981DA4B000
heap
page read and write
16982000
trusted library allocation
page read and write
BAA000
trusted library allocation
page execute and read and write
502D000
stack
page read and write
4E6E000
trusted library allocation
page read and write
2981DBFE000
trusted library section
page readonly
156D000
stack
page read and write
7FFB967A6000
trusted library allocation
page execute and read and write
498D000
trusted library allocation
page read and write
5D0E000
stack
page read and write
F0C000
trusted library allocation
page execute and read and write
1710000
heap
page read and write
7FFB966D2000
trusted library allocation
page read and write
505000
heap
page read and write
CB0000
trusted library section
page readonly
F00000
heap
page read and write
A88000
heap
page read and write
7FFB9AA42000
trusted library allocation
page execute and read and write
542E000
stack
page read and write
7FFB9A950000
trusted library allocation
page read and write
3EBF000
trusted library allocation
page read and write
826E000
stack
page read and write
3BF8000
trusted library allocation
page read and write
2981DA8C000
heap
page read and write
1DB000
stack
page read and write
5A1E000
stack
page read and write
F4B000
heap
page read and write
52CE000
stack
page read and write
4B30000
heap
page read and write
511F000
stack
page read and write
8F6000
stack
page read and write
530000
unkown
page readonly
7FFB9AA15000
trusted library allocation
page read and write
51AD000
stack
page read and write
4B99000
trusted library allocation
page read and write
C14E000
stack
page read and write
5F45000
heap
page read and write
121F000
stack
page read and write
47FE000
trusted library allocation
page read and write
F00000
trusted library allocation
page read and write
8FEE000
stack
page read and write
615C000
stack
page read and write
29837F7B000
heap
page read and write
F68000
trusted library allocation
page read and write
29837EE0000
heap
page read and write
2982F538000
trusted library allocation
page read and write
E14000
trusted library allocation
page read and write
5392000
trusted library allocation
page read and write
DB0000
heap
page read and write
D5B000
trusted library allocation
page execute and read and write
3F18000
trusted library allocation
page read and write
C10E000
stack
page read and write
There are 819 hidden memdumps, click here to show them.