IOC Report
imX19sLDxY.exe

loading gif

Files

File Path
Type
Category
Malicious
imX19sLDxY.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Local\TempWaircut.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\system.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Tempdll.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\9e82a5ccaed752a57fda004b4018de61.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\CLR_v2.0\UsageLogs\Tempdll.exe.log
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\CLR_v2.0\UsageLogs\system.exe.log
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\TempWaircut.exe.log
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Patcher\TempWaircut.exe_StrongName_hu55jcqz1l0xzwol4xdhfkxzesvt1zhm\2.0.0.0\pwjvxtxk.newcfg
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Patcher\TempWaircut.exe_StrongName_hu55jcqz1l0xzwol4xdhfkxzesvt1zhm\2.0.0.0\user.config (copy)
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
\Device\ConDrv
ASCII text, with CRLF line terminators
dropped

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\imX19sLDxY.exe
"C:\Users\user\Desktop\imX19sLDxY.exe"
malicious
C:\Users\user\AppData\Local\TempWaircut.exe
"C:\Users\user\AppData\Local\TempWaircut.exe"
malicious
C:\Users\user\AppData\Local\Tempdll.exe
"C:\Users\user\AppData\Local\Tempdll.exe"
malicious
C:\Users\user\AppData\Local\Temp\system.exe
"C:\Users\user\AppData\Local\Temp\system.exe"
malicious
C:\Windows\System32\netsh.exe
netsh firewall add allowedprogram "C:\Users\user\AppData\Local\Temp\system.exe" "system.exe" ENABLE
malicious
C:\Users\user\AppData\Local\Temp\system.exe
"C:\Users\user\AppData\Local\Temp\system.exe" ..
malicious
C:\Users\user\AppData\Local\Temp\system.exe
"C:\Users\user\AppData\Local\Temp\system.exe" ..
malicious
C:\Users\user\AppData\Local\Temp\system.exe
"C:\Users\user\AppData\Local\Temp\system.exe" ..
malicious
C:\Users\user\AppData\Local\Temp\system.exe
"C:\Users\user\AppData\Local\Temp\system.exe" ..
malicious
C:\Users\user\AppData\Local\Temp\system.exe
"C:\Users\user\AppData\Local\Temp\system.exe" ..
malicious
C:\Users\user\AppData\Local\Temp\system.exe
"C:\Users\user\AppData\Local\Temp\system.exe" ..
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
There are 2 hidden processes, click here to show them.

URLs

Name
IP
Malicious
https://sourceforge.net/projects/waircutU
unknown
https://sourceforge.net/projects/waircut/files/
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
http://www.mediafire.com/api/1.4/upload/simple.php?filedrop_key=492214d7de748aafa049a2428a99157bbcd9
unknown

Domains

Name
IP
Malicious
x555hd.ddns.net
197.207.192.227
malicious

IPs

IP
Domain
Country
Malicious
197.207.192.227
x555hd.ddns.net
Algeria
malicious

Registry

Path
Value
Malicious
HKEY_CURRENT_USER
di
malicious
HKEY_CURRENT_USER\Environment
SEE_MASK_NOZONECHECKS
malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
9e82a5ccaed752a57fda004b4018de61
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
9e82a5ccaed752a57fda004b4018de61
malicious
HKEY_CURRENT_USER\SOFTWARE\9e82a5ccaed752a57fda004b4018de61
[kl]
HKEY_CURRENT_USER\SOFTWARE\9e82a5ccaed752a57fda004b4018de61
[kl]

Memdumps

Base Address
Regiontype
Protect
Malicious
4082000
trusted library allocation
page read and write
malicious
1BC40000
trusted library section
page read and write
malicious
3565000
trusted library allocation
page read and write
malicious
3FC2000
trusted library allocation
page read and write
malicious
28C28392000
heap
page read and write
28C283E7000
heap
page read and write
391E000
trusted library allocation
page read and write
C0F05FE000
stack
page read and write
7460000
trusted library allocation
page read and write
1BB8000
heap
page read and write
2040000
trusted library allocation
page read and write
7FF848EDA000
trusted library allocation
page execute and read and write
28C283DE000
heap
page read and write
20DF000
stack
page read and write
28C28385000
heap
page read and write
28C283E4000
heap
page read and write
28C2A437000
heap
page read and write
2D12000
trusted library allocation
page read and write
39B9000
trusted library allocation
page read and write
B780000
trusted library allocation
page read and write
200D0000
heap
page read and write
7FF848FA0000
trusted library allocation
page execute and read and write
5330000
heap
page read and write
28C283AA000
heap
page read and write
1518B000
trusted library allocation
page read and write
28C283E4000
heap
page read and write
28C2A43B000
heap
page read and write
16F0000
heap
page read and write
28C283D6000
heap
page read and write
28C283D6000
heap
page read and write
AF50000
trusted library allocation
page read and write
1C0BE000
stack
page read and write
AE5F000
heap
page read and write
1D45000
unkown
page readonly
7903000
trusted library section
page read and write
EA0000
trusted library allocation
page read and write
14009000
trusted library allocation
page read and write
26EA000
trusted library allocation
page read and write
13D3000
heap
page read and write
91C000
unkown
page readonly
1FFE000
stack
page read and write
4222000
trusted library allocation
page read and write
1EFF000
stack
page read and write
7FF848E52000
trusted library allocation
page execute and read and write
1CDC0000
heap
page read and write
28C2A3C1000
heap
page read and write
28C2A43B000
heap
page read and write
2713000
heap
page read and write
2A6F000
stack
page read and write
13F0000
heap
page read and write
2D0E000
trusted library allocation
page read and write
5E1E000
stack
page read and write
28C283B5000
heap
page read and write
AF40000
trusted library allocation
page read and write
7FF848F0A000
trusted library allocation
page execute and read and write
1C91E000
stack
page read and write
28C2A43D000
heap
page read and write
EDE000
heap
page read and write
21D9000
trusted library allocation
page read and write
7FF848F00000
trusted library allocation
page read and write
2D01000
trusted library allocation
page read and write
25F0000
heap
page read and write
3E6F000
trusted library allocation
page read and write
F2D0000
trusted library allocation
page read and write
28C283D6000
heap
page read and write
2210000
heap
page execute and read and write
7FF848EE2000
trusted library allocation
page execute and read and write
28C2A3C0000
heap
page read and write
2260000
heap
page read and write
CB8E000
stack
page read and write
28C29F50000
heap
page read and write
1AA0000
trusted library allocation
page read and write
28C2A401000
heap
page read and write
3EF6000
trusted library allocation
page read and write
28C283D8000
heap
page read and write
AEAA000
heap
page read and write
28C28399000
heap
page read and write
C92C000
heap
page read and write
7FF848E22000
trusted library allocation
page execute and read and write
1BD26000
trusted library allocation
page read and write
3D7F000
trusted library allocation
page read and write
28C28383000
heap
page read and write
AE40000
heap
page read and write
3FBE000
stack
page read and write
7FF848EF0000
trusted library allocation
page read and write
CE00000
trusted library allocation
page read and write
1CBE0000
trusted library allocation
page read and write
B7E0000
heap
page read and write
28C28419000
heap
page read and write
3EE7000
trusted library allocation
page read and write
1BD4D000
trusted library allocation
page read and write
227C000
heap
page read and write
28C2A43B000
heap
page read and write
2140000
trusted library allocation
page read and write
2620000
heap
page execute and read and write
1430000
heap
page read and write
13E0000
heap
page execute and read and write
E9A2000
trusted library allocation
page read and write
2180000
trusted library allocation
page read and write
2B70000
heap
page execute and read and write
2209000
trusted library allocation
page read and write
1C82E000
stack
page read and write
1640000
heap
page read and write
1720000
heap
page read and write
1448000
heap
page read and write
CCCE000
stack
page read and write
28C2A420000
heap
page read and write
ED8000
unkown
page readonly
3F16000
trusted library allocation
page read and write
28C283EA000
heap
page read and write
28C2841E000
heap
page read and write
1BCA5000
trusted library allocation
page read and write
28C283AA000
heap
page read and write
28C283EB000
heap
page read and write
2710000
heap
page read and write
1BC5000
heap
page read and write
28C283CD000
heap
page read and write
1CCA4000
heap
page read and write
7FF848E3C000
trusted library allocation
page execute and read and write
7FF848EFA000
trusted library allocation
page execute and read and write
D250000
trusted library allocation
page execute and read and write
1E19000
heap
page read and write
15A4000
heap
page read and write
A9E0000
trusted library allocation
page execute and read and write
28C2836B000
heap
page read and write
B6FE000
stack
page read and write
14EC6000
trusted library allocation
page read and write
7FF848E4F000
trusted library allocation
page execute and read and write
2650000
trusted library allocation
page read and write
B810000
heap
page read and write
28C2A43C000
heap
page read and write
28C283E3000
heap
page read and write
1DEA000
heap
page read and write
5F1E000
stack
page read and write
3EC7000
trusted library allocation
page read and write
2280000
heap
page read and write
B7A0000
trusted library allocation
page execute and read and write
CB4E000
stack
page read and write
28C29EB0000
heap
page read and write
1E12E000
stack
page read and write
5C30000
trusted library allocation
page read and write
21D0000
trusted library allocation
page read and write
CDF0000
trusted library allocation
page execute and read and write
1C5F9000
trusted library allocation
page read and write
28C2A424000
heap
page read and write
2270000
heap
page read and write
28C283EB000
heap
page read and write
229A000
heap
page read and write
4D2D000
stack
page read and write
21E0000
heap
page execute and read and write
2630000
trusted library allocation
page read and write
28C283EF000
heap
page read and write
1577000
heap
page read and write
20000
trusted library allocation
page read and write
28C283D2000
heap
page read and write
395C000
trusted library allocation
page read and write
1C4D8000
heap
page read and write
1C5E0000
trusted library allocation
page read and write
C946000
heap
page read and write
ED0000
heap
page read and write
B010000
trusted library section
page readonly
7FF848F67000
trusted library allocation
page read and write
28C2A420000
heap
page read and write
200DA000
heap
page read and write
21F5000
heap
page read and write
7FF848F22000
trusted library allocation
page execute and read and write
1C748000
heap
page read and write
7FF848F5C000
trusted library allocation
page read and write
3B91000
trusted library allocation
page read and write
1CA2E000
stack
page read and write
ACF0000
heap
page read and write
1C81E000
stack
page read and write
7FF848F22000
trusted library allocation
page execute and read and write
28C283AD000
heap
page read and write
2380000
trusted library allocation
page read and write
7FF497C30000
trusted library allocation
page execute and read and write
51C0000
trusted library allocation
page read and write
10CE000
stack
page read and write
EC2000
trusted library allocation
page read and write
1407D000
trusted library allocation
page read and write
1B30000
heap
page read and write
1473000
heap
page read and write
1D65000
heap
page read and write
514E000
stack
page read and write
7FF848F82000
trusted library allocation
page read and write
1BE84000
trusted library allocation
page read and write
28C28380000
heap
page read and write
EDC0000
trusted library allocation
page execute and read and write
1D4D000
unkown
page readonly
20A9000
heap
page read and write
2CD6000
trusted library allocation
page read and write
D260000
trusted library allocation
page read and write
4219000
trusted library allocation
page read and write
50A0000
trusted library allocation
page read and write
AEBE000
heap
page read and write
14310000
trusted library allocation
page read and write
20000
trusted library allocation
page read and write
1110000
trusted library allocation
page read and write
1DF5000
heap
page read and write
28C283EA000
heap
page read and write
B00C000
stack
page read and write
7FF848E37000
trusted library allocation
page execute and read and write
7FF848F15000
trusted library allocation
page read and write
1680000
heap
page read and write
431C000
trusted library allocation
page read and write
1C5E8000
trusted library allocation
page read and write
B020000
heap
page read and write
22E3000
heap
page read and write
D30E000
stack
page read and write
28C2A420000
heap
page read and write
3F64000
trusted library allocation
page read and write
1DF0000
heap
page read and write
14BA000
heap
page read and write
B7F0000
trusted library allocation
page read and write
1B50000
heap
page read and write
7FF848F70000
trusted library allocation
page execute and read and write
3546000
trusted library allocation
page read and write
28C283D1000
heap
page read and write
28C283EC000
heap
page read and write
1C5F3000
trusted library allocation
page read and write
ACE0000
trusted library allocation
page read and write
7FF848F59000
trusted library allocation
page read and write
7FF848F1A000
trusted library allocation
page execute and read and write
C12000
unkown
page readonly
2220000
heap
page read and write
21B2000
trusted library allocation
page read and write
3D01000
trusted library allocation
page read and write
28C2A43B000
heap
page read and write
111B000
trusted library allocation
page execute and read and write
4176000
trusted library allocation
page read and write
28C283E2000
heap
page read and write
1725000
heap
page read and write
C926000
heap
page read and write
7FF848F70000
trusted library allocation
page execute and read and write
28C2A3E7000
heap
page read and write
4BD9000
trusted library allocation
page read and write
EC6000
trusted library allocation
page execute and read and write
398B000
trusted library allocation
page read and write
2600000
trusted library allocation
page read and write
CDCF000
stack
page read and write
762000
unkown
page readonly
7FF848E60000
trusted library allocation
page read and write
1F20000
heap
page read and write
28C283D3000
heap
page read and write
7FF848EF5000
trusted library allocation
page read and write
1C6DE000
stack
page read and write
2321000
heap
page read and write
28C283AA000
heap
page read and write
28C28260000
heap
page read and write
1750000
heap
page read and write
2388000
trusted library allocation
page read and write
1BC50000
trusted library allocation
page read and write
1A93000
heap
page read and write
28C283AA000
heap
page read and write
20FB000
heap
page read and write
E80000
trusted library allocation
page read and write
28C28380000
heap
page read and write
4157000
trusted library allocation
page read and write
3797000
trusted library allocation
page read and write
28C2A43B000
heap
page read and write
1BC7C000
heap
page read and write
28C28412000
heap
page read and write
7FF848E6F000
trusted library allocation
page execute and read and write
3F93000
trusted library allocation
page read and write
4BF0000
trusted library allocation
page read and write
7FF848E22000
trusted library allocation
page execute and read and write
7FF848E53000
trusted library allocation
page execute and read and write
28C28382000
heap
page read and write
13D6000
heap
page read and write
28C28250000
heap
page read and write
1660000
heap
page read and write
AE8D000
heap
page read and write
D270000
trusted library allocation
page read and write
38C0000
trusted library allocation
page read and write
1BC56000
trusted library allocation
page read and write
7FF848E73000
trusted library allocation
page execute and read and write
7FF848E2A000
trusted library allocation
page execute and read and write
1CDAC000
stack
page read and write
28C28411000
heap
page read and write
CC8E000
stack
page read and write
1440000
heap
page read and write
7FF848E84000
trusted library allocation
page execute and read and write
135A1000
trusted library allocation
page read and write
2D04000
trusted library allocation
page read and write
239B000
trusted library allocation
page read and write
28C283D8000
heap
page read and write
28C283B5000
heap
page read and write
28C283CD000
heap
page read and write
1E632000
trusted library allocation
page read and write
28C2A443000
heap
page read and write
19F5000
stack
page read and write
1D5A000
unkown
page readonly
15183000
trusted library allocation
page read and write
77C8000
trusted library section
page read and write
52DE000
stack
page read and write
1D40000
heap
page read and write
1EF5000
stack
page read and write
1BC90000
trusted library allocation
page read and write
2367000
heap
page read and write
22B7000
heap
page read and write
28C28411000
heap
page read and write
4137000
trusted library allocation
page read and write
7FF487440000
trusted library allocation
page execute and read and write
F70000
heap
page read and write
28C283B5000
heap
page read and write
E5E000
stack
page read and write
18D2000
unkown
page readonly
28C28411000
heap
page read and write
1BEF0000
trusted library allocation
page read and write
1B88000
heap
page read and write
7FF848F8C000
trusted library allocation
page read and write
28C283D7000
heap
page read and write
1BD40000
trusted library allocation
page read and write
2D16000
trusted library allocation
page read and write
2190000
trusted library allocation
page read and write
1C1BE000
stack
page read and write
28C283AC000
heap
page read and write
28C283DA000
heap
page read and write
22E6000
heap
page read and write
1C710000
heap
page read and write
1562000
heap
page read and write
3DAD000
trusted library allocation
page read and write
7FF848F65000
trusted library allocation
page read and write
22F5000
heap
page read and write
FE0000
heap
page read and write
7FF848E2A000
trusted library allocation
page execute and read and write
7FF848EEA000
trusted library allocation
page execute and read and write
28C283AD000
heap
page read and write
28C28399000
heap
page read and write
28C28397000
heap
page read and write
7FF848FD0000
trusted library allocation
page execute and read and write
77F1000
trusted library section
page read and write
1D89000
heap
page read and write
5160000
trusted library allocation
page read and write
2030000
trusted library allocation
page read and write
20F5000
stack
page read and write
1CDE9000
heap
page read and write
4BBD000
trusted library allocation
page read and write
22AA000
heap
page read and write
4280000
trusted library allocation
page read and write
1BD20000
trusted library allocation
page read and write
13D0000
heap
page read and write
5303000
heap
page execute and read and write
1C11E000
stack
page read and write
2319000
heap
page read and write
28C283E7000
heap
page read and write
1A2E000
stack
page read and write
ED2000
unkown
page readonly
1D72000
unkown
page readonly
28C28397000
heap
page read and write
D45000
heap
page read and write
1B20000
heap
page read and write
AED8000
heap
page read and write
28C28399000
heap
page read and write
14077000
trusted library allocation
page read and write
7FF848F6C000
trusted library allocation
page read and write
1CDB0000
heap
page read and write
7FF848EFD000
trusted library allocation
page execute and read and write
25F3000
heap
page read and write
1BF00000
trusted library allocation
page read and write
D280000
trusted library allocation
page read and write
1BCA0000
trusted library allocation
page read and write
264A000
trusted library allocation
page read and write
1C5FB000
trusted library allocation
page read and write
28C283E7000
heap
page read and write
28C28411000
heap
page read and write
EB3000
trusted library allocation
page read and write
13E08000
trusted library allocation
page read and write
110E000
stack
page read and write
1BD4A000
trusted library allocation
page read and write
7FF848E32000
trusted library allocation
page execute and read and write
14011000
trusted library allocation
page read and write
F11000
heap
page read and write
28C283E4000
heap
page read and write
2192000
trusted library allocation
page read and write
B7B0000
trusted library allocation
page execute and read and write
1CBDE000
stack
page read and write
AE8F000
heap
page read and write
375E000
trusted library allocation
page read and write
7FF848EA4000
trusted library allocation
page execute and read and write
28C283D2000
heap
page read and write
77A9000
trusted library section
page read and write
28C2A3A0000
heap
page read and write
7FF848E37000
trusted library allocation
page execute and read and write
2100000
heap
page read and write
13D05000
trusted library allocation
page read and write
7FF848EE2000
trusted library allocation
page execute and read and write
2119000
heap
page read and write
28C283DA000
heap
page read and write
13D08000
trusted library allocation
page read and write
20000
trusted library allocation
page read and write
1BDA000
heap
page read and write
4071000
trusted library allocation
page read and write
1D20000
heap
page read and write
23A3000
heap
page read and write
7FF848E57000
trusted library allocation
page execute and read and write
2B91000
trusted library allocation
page read and write
1BEF9000
trusted library allocation
page read and write
28C2A400000
heap
page read and write
28C283F1000
heap
page read and write
28C283AB000
heap
page read and write
1D58000
unkown
page readonly
2074000
heap
page read and write
1FA0000
heap
page read and write
28C283D2000
heap
page read and write
7FF848FB0000
trusted library allocation
page execute and read and write
14301000
trusted library allocation
page read and write
E960000
trusted library allocation
page read and write
C0F0131000
stack
page read and write
14A8000
heap
page read and write
22E0000
heap
page read and write
7FF44B4D0000
trusted library allocation
page execute and read and write
28C28280000
heap
page read and write
2200000
trusted library allocation
page read and write
EEF000
heap
page read and write
A960000
heap
page read and write
5090000
trusted library allocation
page execute and read and write
7FF848F1D000
trusted library allocation
page execute and read and write
F80000
heap
page read and write
20000
trusted library allocation
page read and write
2048000
heap
page read and write
2CF8000
trusted library allocation
page read and write
1D70000
heap
page read and write
51D3000
heap
page read and write
1C3DA000
heap
page read and write
7FF848F42000
trusted library allocation
page execute and read and write
4232000
trusted library allocation
page read and write
229C000
heap
page read and write
A9DD000
stack
page read and write
7FF848F0A000
trusted library allocation
page execute and read and write
1AF4000
stack
page read and write
1CB30000
trusted library section
page read and write
28C28399000
heap
page read and write
4C20000
trusted library allocation
page read and write
1BC1E000
stack
page read and write
2020000
heap
page read and write
20FD000
heap
page read and write
28C283ED000
heap
page read and write
28C283E4000
heap
page read and write
909000
unkown
page readonly
7FF848E2C000
trusted library allocation
page execute and read and write
1BF1B000
trusted library allocation
page read and write
E970000
trusted library allocation
page execute and read and write
1BED000
heap
page read and write
28C283CF000
heap
page read and write
28C283CD000
heap
page read and write
28C2A425000
heap
page read and write
ED8000
heap
page read and write
2D07000
trusted library allocation
page read and write
7FF848EF0000
trusted library allocation
page read and write
D10000
heap
page read and write
7FF848FE0000
trusted library allocation
page execute and read and write
2390000
trusted library allocation
page read and write
4C00000
trusted library allocation
page read and write
28C2A43B000
heap
page read and write
2085000
heap
page read and write
28C283B0000
heap
page read and write
7FF848F87000
trusted library allocation
page read and write
2D0A000
trusted library allocation
page read and write
28C283AB000
heap
page read and write
4C10000
trusted library allocation
page read and write
3ABE000
stack
page read and write
7FF44B4E0000
trusted library allocation
page execute and read and write
1BE7E000
stack
page read and write
1CEB0000
heap
page read and write
1BF13000
trusted library allocation
page read and write
D40000
heap
page read and write
2305000
heap
page read and write
28C283D0000
heap
page read and write
28C2A420000
heap
page read and write
2399000
trusted library allocation
page read and write
3BA1000
trusted library allocation
page read and write
28C2841E000
heap
page read and write
13D4E000
trusted library allocation
page read and write
7FF848E42000
trusted library allocation
page execute and read and write
7FF848F1D000
trusted library allocation
page execute and read and write
2160000
trusted library allocation
page read and write
2040000
heap
page read and write
28C283EF000
heap
page read and write
212000
unkown
page readonly
1334E000
trusted library allocation
page read and write
7FF436110000
trusted library allocation
page execute and read and write
4BAE000
trusted library allocation
page read and write
5176000
trusted library allocation
page read and write
1CCA0000
heap
page read and write
28C283D8000
heap
page read and write
411C000
trusted library allocation
page read and write
50B0000
trusted library allocation
page read and write
7FF848F42000
trusted library allocation
page execute and read and write
432C000
trusted library allocation
page read and write
28C2A43E000
heap
page read and write
1BC70000
trusted library allocation
page read and write
7FF848F90000
trusted library allocation
page execute and read and write
1BC80000
trusted library allocation
page read and write
7FF848EE0000
trusted library allocation
page read and write
1A96000
heap
page read and write
28C283E3000
heap
page read and write
1B84000
heap
page read and write
1B72000
heap
page read and write
1C6FE000
stack
page read and write
28C28394000
heap
page read and write
5190000
trusted library allocation
page execute and read and write
35A1000
trusted library allocation
page read and write
1AB0000
heap
page execute and read and write
28C283ED000
heap
page read and write
28C28411000
heap
page read and write
210C000
heap
page read and write
D40F000
stack
page read and write
28C283DA000
heap
page read and write
4B90000
trusted library allocation
page read and write
28C283E2000
heap
page read and write
28C2841D000
heap
page read and write
28C28414000
heap
page read and write
7FF848FD0000
trusted library allocation
page execute and read and write
EC0000
trusted library allocation
page read and write
28C28320000
heap
page read and write
2440000
trusted library allocation
page read and write
CDE0000
heap
page execute and read and write
28C2A401000
heap
page read and write
21B4000
trusted library allocation
page read and write
2483000
heap
page execute and read and write
7FF848E22000
trusted library allocation
page execute and read and write
7FF848FC0000
trusted library allocation
page execute and read and write
4BE0000
trusted library allocation
page read and write
42DE000
trusted library allocation
page read and write
22F0000
heap
page read and write
28C283EF000
heap
page read and write
F41000
heap
page read and write
2200000
heap
page read and write
7790000
trusted library section
page read and write
ED0000
unkown
page readonly
1130000
trusted library allocation
page read and write
ACD0000
trusted library allocation
page read and write
1B7A000
heap
page read and write
EAD000
trusted library allocation
page execute and read and write
11E4000
stack
page read and write
1A40000
trusted library allocation
page read and write
2240000
heap
page read and write
1CA59000
stack
page read and write
13E01000
trusted library allocation
page read and write
ACCE000
stack
page read and write
28C2A43B000
heap
page read and write
1BFBD000
stack
page read and write
1EB00000
heap
page read and write
B7E5000
heap
page read and write
2623000
heap
page execute and read and write
AEA5000
heap
page read and write
1CE50000
heap
page execute and read and write
212A000
heap
page read and write
1C0D0000
trusted library allocation
page read and write
3982000
trusted library allocation
page read and write
2065000
heap
page read and write
1CC30000
trusted library section
page readonly
ED0000
unkown
page readonly
1DF30000
heap
page read and write
28C28380000
heap
page read and write
13E05000
trusted library allocation
page read and write
7FF848F69000
trusted library allocation
page read and write
D420000
trusted library allocation
page execute and read and write
7FF848E4F000
trusted library allocation
page execute and read and write
1BE80000
trusted library allocation
page read and write
28C28382000
heap
page read and write
1E32E000
stack
page read and write
1573000
heap
page read and write
D410000
trusted library allocation
page read and write
1FD0000
heap
page read and write
28C283D6000
heap
page read and write
246E000
stack
page read and write
28C28387000
heap
page read and write
AE67000
heap
page read and write
7FF848E32000
trusted library allocation
page execute and read and write
3E89000
trusted library allocation
page read and write
7FF848E5C000
trusted library allocation
page execute and read and write
A990000
trusted library allocation
page read and write
28C283D6000
heap
page read and write
3536000
trusted library allocation
page read and write
2173000
heap
page read and write
7FF848F70000
trusted library allocation
page execute and read and write
396C000
trusted library allocation
page read and write
1755000
heap
page read and write
7FF848EEA000
trusted library allocation
page execute and read and write
26E0000
trusted library allocation
page read and write
20000
trusted library allocation
page read and write
11C0000
heap
page read and write
AEEE000
heap
page read and write
15B8000
heap
page read and write
2170000
heap
page read and write
7FF848EED000
trusted library allocation
page execute and read and write
1115000
trusted library allocation
page execute and read and write
434B000
trusted library allocation
page read and write
1DAA000
heap
page read and write
28C283D5000
heap
page read and write
28C28380000
heap
page read and write
1BAF000
heap
page read and write
28C2A431000
heap
page read and write
1510000
heap
page read and write
7FF848E42000
trusted library allocation
page execute and read and write
FD0000
heap
page read and write
1C01E000
stack
page read and write
C0F04FE000
unkown
page read and write
7FF848F67000
trusted library allocation
page read and write
C91E000
heap
page read and write
7FF848E12000
trusted library allocation
page execute and read and write
7FF848F12000
trusted library allocation
page execute and read and write
7FF848FB0000
trusted library allocation
page execute and read and write
1C5F0000
trusted library allocation
page read and write
7FF848EFD000
trusted library allocation
page execute and read and write
5170000
trusted library allocation
page read and write
4BB6000
trusted library allocation
page read and write
2585000
heap
page read and write
2107000
heap
page read and write
C0F013E000
stack
page read and write
28C283B0000
heap
page read and write
260A000
trusted library allocation
page read and write
2276000
heap
page read and write
EF7000
heap
page read and write
1C5DE000
stack
page read and write
28C283EC000
heap
page read and write
B800000
trusted library allocation
page execute and read and write
14DE000
heap
page read and write
D20000
heap
page read and write
28C283DE000
heap
page read and write
7FF848F57000
trusted library allocation
page read and write
1D40000
heap
page read and write
28C2A3C1000
heap
page read and write
1BC9A000
trusted library allocation
page read and write
B846000
heap
page read and write
FA0000
heap
page read and write
AF28000
heap
page read and write
7FF848E3F000
trusted library allocation
page execute and read and write
1A60000
trusted library allocation
page read and write
7F7D0000
trusted library allocation
page execute and read and write
11C8000
heap
page read and write
28C28346000
heap
page read and write
1C2BB000
stack
page read and write
F05000
heap
page read and write
1F7E000
stack
page read and write
51A0000
trusted library allocation
page execute and read and write
1540000
heap
page read and write
2604000
trusted library allocation
page read and write
7FF4D9F40000
trusted library allocation
page execute and read and write
28C2A400000
heap
page read and write
7FF848F10000
trusted library allocation
page read and write
216E000
stack
page read and write
7FF848F02000
trusted library allocation
page execute and read and write
1C3EE000
stack
page read and write
28C283CF000
heap
page read and write
B790000
trusted library allocation
page read and write
7930000
trusted library section
page read and write
F62000
heap
page read and write
2E3E000
trusted library allocation
page read and write
144C6000
trusted library allocation
page read and write
7FF848F55000
trusted library allocation
page read and write
28C2838C000
heap
page read and write
28C283D7000
heap
page read and write
3F25000
trusted library allocation
page read and write
C910000
heap
page read and write
14307000
trusted library allocation
page read and write
1BD42000
trusted library allocation
page read and write
C0F012E000
stack
page read and write
760000
unkown
page readonly
7FF848F10000
trusted library allocation
page read and write
28C28371000
heap
page read and write
28C283B0000
heap
page read and write
210000
unkown
page readonly
2644000
trusted library allocation
page read and write
14D5000
heap
page read and write
28C2A43E000
heap
page read and write
2634000
trusted library allocation
page read and write
10700000
trusted library allocation
page read and write
3F06000
trusted library allocation
page read and write
28C29F60000
heap
page read and write
28C2A449000
heap
page read and write
7FF848F22000
trusted library allocation
page execute and read and write
5DDE000
stack
page read and write
1548000
heap
page read and write
1BC94000
trusted library allocation
page read and write
7FF848F6C000
trusted library allocation
page read and write
26E4000
trusted library allocation
page read and write
5070000
heap
page read and write
99F000
stack
page read and write
B040000
trusted library allocation
page read and write
EA4000
trusted library allocation
page read and write
50FE000
stack
page read and write
28C2A420000
heap
page read and write
2480000
heap
page execute and read and write
1D60000
heap
page read and write
1DA2000
heap
page read and write
7FF848E4A000
trusted library allocation
page execute and read and write
ED80000
trusted library allocation
page execute and read and write
28C2A434000
heap
page read and write
20DB000
heap
page read and write
2640000
trusted library allocation
page read and write
7FF4AD2C0000
trusted library allocation
page execute and read and write
FD5000
heap
page read and write
28C283AA000
heap
page read and write
51D0000
heap
page read and write
14071000
trusted library allocation
page read and write
28C2841E000
heap
page read and write
21A0000
heap
page read and write
1CAA0000
heap
page read and write
1BE82000
trusted library allocation
page read and write
13D01000
trusted library allocation
page read and write
22E0000
heap
page read and write
C95A000
heap
page read and write
EB2000
unkown
page readonly
7FF848F1A000
trusted library allocation
page execute and read and write
1BD44000
trusted library allocation
page read and write
182E000
stack
page read and write
16D5000
heap
page read and write
5300000
heap
page execute and read and write
1BA1D000
heap
page read and write
7FF848F6C000
trusted library allocation
page read and write
7FF848FE0000
trusted library allocation
page execute and read and write
135A5000
trusted library allocation
page read and write
EA3000
trusted library allocation
page execute and read and write
28C2A449000
heap
page read and write
4BB1000
trusted library allocation
page read and write
1C40000
heap
page read and write
13348000
trusted library allocation
page read and write
5150000
trusted library allocation
page read and write
7FF848EEA000
trusted library allocation
page execute and read and write
7FF848E5A000
trusted library allocation
page execute and read and write
1B58000
heap
page read and write
778E000
stack
page read and write
EB4000
unkown
page readonly
28C283B5000
heap
page read and write
7FF848F85000
trusted library allocation
page read and write
7FF848F67000
trusted library allocation
page read and write
2025000
heap
page read and write
210000
unkown
page readonly
28C2841E000
heap
page read and write
2176000
heap
page read and write
41E2000
trusted library allocation
page read and write
28C28399000
heap
page read and write
1469000
heap
page read and write
2590000
heap
page read and write
1BEB000
heap
page read and write
1C92E000
stack
page read and write
3D2E000
stack
page read and write
1BF3000
heap
page read and write
1BF19000
trusted library allocation
page read and write
15D6000
heap
page read and write
7FF848F60000
trusted library allocation
page execute and read and write
7FF848F02000
trusted library allocation
page execute and read and write
7FF848EEA000
trusted library allocation
page execute and read and write
14305000
trusted library allocation
page read and write
23A6000
heap
page read and write
B030000
heap
page read and write
28C283AD000
heap
page read and write
4301000
trusted library allocation
page read and write
28C2841E000
heap
page read and write
ED0000
unkown
page readonly
21B0000
trusted library allocation
page read and write
1D80000
heap
page read and write
28C2838A000
heap
page read and write
CF8000
stack
page read and write
2B80000
heap
page read and write
223E000
stack
page read and write
28C283DD000
heap
page read and write
2060000
heap
page read and write
430D000
trusted library allocation
page read and write
1FD5000
heap
page read and write
28C2A428000
heap
page read and write
1A90000
heap
page read and write
AE57000
heap
page read and write
28C2A43D000
heap
page read and write
7FF848FB0000
trusted library allocation
page execute and read and write
A970000
trusted library allocation
page execute and read and write
4BD0000
trusted library allocation
page read and write
7FF848E52000
trusted library allocation
page execute and read and write
7FF848EE2000
trusted library allocation
page execute and read and write
28C28395000
heap
page read and write
1CC70000
heap
page execute and read and write
1CC10000
heap
page read and write
1112000
trusted library allocation
page read and write
1CA1E000
stack
page read and write
1CB2E000
stack
page read and write
7FF848FD0000
trusted library allocation
page read and write
1BDB0000
heap
page read and write
7FF848ED2000
trusted library allocation
page execute and read and write
117E000
stack
page read and write
7FF848F89000
trusted library allocation
page read and write
D290000
trusted library allocation
page execute and read and write
28C2A43B000
heap
page read and write
2580000
heap
page read and write
28C283EC000
heap
page read and write
C0F06FE000
stack
page read and write
5C20000
trusted library allocation
page read and write
7FF848EFA000
trusted library allocation
page execute and read and write
1117000
trusted library allocation
page execute and read and write
4212000
trusted library allocation
page read and write
1C21E000
stack
page read and write
4241000
trusted library allocation
page read and write
28C283ED000
heap
page read and write
28C2A42A000
heap
page read and write
2B6F000
stack
page read and write
7FF848E22000
trusted library allocation
page execute and read and write
2240000
heap
page read and write
3862000
trusted library allocation
page read and write
173E000
stack
page read and write
AEDC000
heap
page read and write
360F000
trusted library allocation
page read and write
28C28615000
heap
page read and write
1C94D000
stack
page read and write
AF60000
trusted library allocation
page execute and read and write
1F80000
heap
page read and write
AF80000
trusted library allocation
page read and write
16D0000
heap
page read and write
7FF848E27000
trusted library allocation
page execute and read and write
28C2A3E0000
heap
page read and write
28C28394000
heap
page read and write
2000000
heap
page read and write
13341000
trusted library allocation
page read and write
28C28412000
heap
page read and write
28C2A449000
heap
page read and write
2B8A000
heap
page read and write
156A000
heap
page read and write
28C28610000
heap
page read and write
1BF08000
trusted library allocation
page read and write
15D4000
heap
page read and write
2393000
trusted library allocation
page read and write
256E000
stack
page read and write
B839000
heap
page read and write
2716000
heap
page read and write
2190000
trusted library allocation
page read and write
192E000
stack
page read and write
3341000
trusted library allocation
page read and write
11BB000
stack
page read and write
28C283DA000
heap
page read and write
2D47000
trusted library allocation
page read and write
EBD000
trusted library allocation
page execute and read and write
28C283CD000
heap
page read and write
C0F09FE000
stack
page read and write
23A0000
heap
page read and write
2170000
trusted library allocation
page read and write
20BD000
heap
page read and write
28C2A3E3000
heap
page read and write
1A70000
trusted library allocation
page read and write
7FF848E32000
trusted library allocation
page execute and read and write
28C2A443000
heap
page read and write
3D21000
trusted library allocation
page read and write
1DB3000
heap
page read and write
7FF848E6F000
trusted library allocation
page execute and read and write
21F0000
heap
page read and write
14075000
trusted library allocation
page read and write
B820000
heap
page read and write
7FF848F90000
trusted library allocation
page execute and read and write
2FFF000
stack
page read and write
5C9E000
stack
page read and write
2CFE000
trusted library allocation
page read and write
1CA95000
stack
page read and write
28C283E7000
heap
page read and write
28C2841E000
heap
page read and write
5C50000
trusted library allocation
page execute and read and write
28C283B0000
heap
page read and write
28C2A3C1000
heap
page read and write
163F000
stack
page read and write
2194000
trusted library allocation
page read and write
3E01000
trusted library allocation
page read and write
20000
trusted library allocation
page read and write
28C28392000
heap
page read and write
13345000
trusted library allocation
page read and write
28C283E7000
heap
page read and write
C95F000
heap
page read and write
2D1B000
trusted library allocation
page read and write
135A8000
trusted library allocation
page read and write
28C28399000
heap
page read and write
1BF10000
trusted library allocation
page read and write
1D20000
heap
page read and write
ECA000
trusted library allocation
page execute and read and write
CA4E000
stack
page read and write
7FF848E50000
trusted library allocation
page read and write
28C283D3000
heap
page read and write
2010000
trusted library allocation
page read and write
5180000
trusted library allocation
page read and write
28C283DA000
heap
page read and write
12F4000
stack
page read and write
E90000
heap
page read and write
There are 869 hidden memdumps, click here to show them.