IOC Report
file.exe

loading gif

Files

File Path
Type
Category
Malicious
file.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
initial sample
malicious
C:\Users\user\Desktop\cabal.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\Desktop\update.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Internet Explorer\MSIMGSIZ.DAT
data
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\4UK5I61J\down[1]
PNG image data, 15 x 15, 8-bit colormap, non-interlaced
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\4UK5I61J\errorPageStrings[1]
Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\HI1BCF07\background_gradient[1]
JPEG image data, JFIF standard 1.02, aspect ratio, density 100x100, segment length 16, baseline, precision 8, 1x800, components 3
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\HI1BCF07\httpErrorPagesScripts[1]
Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\QI6Y9C7H\ErrorPageTemplate[1]
Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\QI6Y9C7H\bullet[1]
PNG image data, 15 x 15, 8-bit colormap, non-interlaced
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\WDKI0JR2\http_404_webOC[1]
HTML document, Unicode text, UTF-8 (with BOM) text, with very long lines (312), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\WDKI0JR2\info_48[1]
PNG image data, 47 x 48, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Temp\resources.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\Users\user\Desktop\SevenZipSharp.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\Desktop\System.Windows.Interactivity.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\Desktop\main.dat
data
dropped
C:\Users\user\Desktop\mainEX.dat
data
dropped
There are 7 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\file.exe
"C:\Users\user\Desktop\file.exe"
malicious
C:\Users\user\Desktop\update.exe
"C:\Users\user\Desktop\update.exe" mmoparadox
malicious

URLs

Name
IP
Malicious
http://foo/MainWindow.xamld
unknown
http://foo/bar/resources/fonts/segoewp-bold.ttf
unknown
http://194.233.88.151/ep33//web/kmnkNIANBDUIbudbnIA.php?t=28/09/2024%2019:01:53B&
unknown
http://defaultcontainer/update;component/Resources/Fonts/segoewp-bold.ttfd
unknown
http://foo/Resources/Fonts/segoewpn-black.ttf
unknown
http://defaultcontainer/update;component/classes/webbrowseroverlaywf/webbrowseroverlay.xamld
unknown
http://defaultcontainer/update;component/classes/webbrowseroverlaywf/webbrowseroverlay.xaml
unknown
http://194.233.88.151/ep33//client/7z.dll
unknown
http://foo/bar/resources/fonts/segoewpn-bold.ttfd
unknown
http://foo/Resources/Fonts/segoewpn-bold.ttf
unknown
http://foo/Resources/Fonts/segoewpn-light.ttfd
unknown
http://foo/Resources/Images/cabal.pngd
unknown
http://defaultcontainer/update;component/Resources/Fonts/segoewpn-black.ttf
unknown
http://foo/bar/resources/fonts/segoewpn-semibold.ttfd
unknown
http://defaultcontainer/update;component/Resources/Fonts/calibrii.ttfd
unknown
http://foo/Resources/Fonts/calibri.ttfd
unknown
http://foo/bar/resources/fonts/segoewp-black.ttf
unknown
http://foo/bar/resources/fonts/calibriz.ttf
unknown
http://foo/Resources/Fonts/segoewpn-semilight.ttfd
unknown
http://foo/Resources/Fonts/calibriz.ttfd
unknown
http://foo/bar/resources/fonts/segoewpn.ttfd
unknown
http://foo/Resources/Fonts/segoewp-bold.ttf
unknown
http://foo/Resources/Fonts/segoewpn-semilight.ttf
unknown
http://defaultcontainer/update;component/Resources/Fonts/segoewpn-black.ttfd
unknown
http://foo/Resources/Fonts/calibriz.ttf
unknown
http://194.233.88.151/ep33//client/System.Windows.Interactivity.dll
unknown
http://foo/Resources/Fonts/segoewpn-black.ttfd
unknown
http://foo/Resources/Fonts/segoewpn-light.ttf
unknown
http://defaultcontainer/update;component/Resources/Fonts/segoewpn-light.ttfd
unknown
http://foo/Resources/Fonts/segoewp-semilight.ttf
unknown
http://194.233.88.151/ep33//web/kmnkNIANBDUIbudbnIA.phpt=28/09/2024
unknown
http://194.233.88.151/ep33//client/7z.dllP
unknown
http://defaultcontainer/update;component/Resources/Fonts/segoewp-semibold.ttfd
unknown
http://foo/Resources/Fonts/calibrib.ttfd
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
http://194.233.88.151/ep33//client/SevenZipSharp.dllP
unknown
http://defaultcontainer/update;component/Resources/Fonts/calibrii.ttf
unknown
http://defaultcontainer/update;component/Resources/Fonts/segoewp-semilight.ttf
unknown
http://defaultcontainer/update;component/Resources/Fonts/segoewp-semibold.ttf
unknown
http://foo/classes/webbrowseroverlaywf/webbrowseroverlay.xamld
unknown
http://schemas.xmlsoap.org/soap/encoding/
unknown
http://194.233.88.151/ep33/
unknown
http://194.233.88.151/ep33//client/System.Windows.Interactivity.dllP
unknown
http://foo/bar/resources/fonts/segoewpn-bold.ttf
unknown
http://194.233.88.151/ep33/client/cabal.exe
unknown
http://sevenzipsharp.codeplex.com/WorkItem/List.aspx
unknown
http://defaultcontainer/cabal;component/favicon.icod
unknown
http://foo/Resources/Fonts/segoewp.ttfd
unknown
http://foo/Resources/Fonts/segoewp.ttf
unknown
http://foo/favicon.ico
unknown
http://defaultcontainer/update;component/Resources/Fonts/segoewp-semilight.ttfd
unknown
http://foo/favicon.icod
unknown
http://defaultcontainer/update;component/Resources/Fonts/segoewp.ttf
unknown
http://foo/bar/mainwindow.baml
unknown
http://defaultcontainer/Resources/Themes/Generic.xamld
unknown
http://foo/bar/resources/themes/generic.baml
unknown
http://194.233.88.151
unknown
http://defaultcontainer/MainWindow.xamld
unknown
http://foo/MainWindow.xaml
unknown
http://194.233.88
unknown
http://foo/bar/resources/fonts/segoewpn-black.ttfd
unknown
http://foo/bar/resources/fonts/segoewpn.ttf
unknown
http://defaultcontainer/cabal;component/favicon.ico
unknown
http://defaultcontainer/update;component/Resources/Fonts/segoewpn-bold.ttfd
unknown
http://foo/bar/resources/fonts/calibri.ttfd
unknown
http://schemas.xmlsoap.org/wsdl/
unknown
http://foo/classes/webbrowseroverlaywf/webbrowseroverlay.xaml
unknown
http://foo/Resources/Fonts/segoewp-black.ttf
unknown
http://foo/bar/classes/webbrowseroverlaywf/webbrowseroverlay.bamld
unknown
http://defaultcontainer/update;component/Resources/Fonts/calibri.ttf
unknown
http://194.233.88.151/ep33//web/kmnkNIANBDUIbudbnIA.php?t=28/09/2024
unknown
http://foo/Resources/Fonts/segoewp-black.ttfd
unknown
http://foo/Resources/Fonts/calibri.ttf
unknown
http://foo/Resources/Themes/Generic.xaml
unknown
http://foo/bar/resources/fonts/segoewp-black.ttfd
unknown
http://foo/bar/resources/fonts/segoewp-semilight.ttf
unknown
http://foo/bar/resources/themes/generic.bamld
unknown
http://defaultcontainer/update;component/Resources/Fonts/segoewpn-semilight.ttf
unknown
http://fontfabrik.comQ
unknown
http://foo/bar/resources/fonts/segoewpn-black.ttf
unknown
http://foo/bar/resources/fonts/segoewp-semibold.ttfd
unknown
http://defaultcontainer/update;component/Resources/Fonts/calibrib.ttfd
unknown
http://foo/bar/favicon.ico
unknown
http://foo/bar/resources/fonts/segoewp-bold.ttfd
unknown
http://defaultcontainer/update;component/Resources/Fonts/calibriz.ttfd
unknown
http://defaultcontainer/update;component/Resources/Fonts/segoewpn-semibold.ttf
unknown
http://defaultcontainer/update;component/Resources/Fonts/segoewpn-semilight.ttfd
unknown
http://defaultcontainer/update;component/Resources/Fonts/segoewpn.ttfd
unknown
http://foo/Resources/Fonts/segoewpn-bold.ttfd
unknown
http://defaultcontainer/update;component/Resources/Fonts/segoewp-black.ttfd
unknown
http://foo/Resources/Fonts/segoewpn-semibold.ttf
unknown
http://defaultcontainer/MainWindow.xaml
unknown
http://194.233.88.151/ep33//client/SevenZipSharp.dll
unknown
http://foo/bar/resources/fonts/calibri.ttf
unknown
http://foo/bar/resources/fonts/segoewpn-semilight.ttf
unknown
http://foo/bar/resources/fonts/calibrii.ttf
unknown
http://foo/bar/resources/images/cabal.png
unknown
http://194.233.88.151/ep33//client/update.exeP
unknown
http://foo/bar/resources/fonts/segoewpn-light.ttf
unknown
http://defaultcontainer/update;component/Resources/Fonts/calibriz.ttf
unknown
There are 90 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
shadowman.dnse.hu
185.6.188.137
s4.gtsystems.hu
unknown

IPs

IP
Domain
Country
Malicious
194.233.88.151
unknown
Germany
malicious

Registry

Path
Value
Malicious
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\file_RASAPI32
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\file_RASAPI32
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\file_RASAPI32
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\file_RASAPI32
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\file_RASAPI32
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\file_RASAPI32
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\file_RASAPI32
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\file_RASMANCS
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\file_RASMANCS
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\file_RASMANCS
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\file_RASMANCS
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\file_RASMANCS
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\file_RASMANCS
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\file_RASMANCS
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\update_RASAPI32
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\update_RASAPI32
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\update_RASAPI32
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\update_RASAPI32
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\update_RASAPI32
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\update_RASAPI32
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\update_RASAPI32
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\update_RASMANCS
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\update_RASMANCS
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\update_RASMANCS
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\update_RASMANCS
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\update_RASMANCS
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\update_RASMANCS
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\update_RASMANCS
FileDirectory
There are 19 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
D750000
trusted library allocation
page read and write
1507000
heap
page read and write
7F25F000
trusted library allocation
page execute read
6FBC000
stack
page read and write
686E000
heap
page read and write
D1D1000
heap
page read and write
7F1D5000
trusted library allocation
page execute read
7F9D000
stack
page read and write
C7CC000
stack
page read and write
1D29000
trusted library allocation
page read and write
7F1E7000
trusted library allocation
page execute read
E90000
unkown
page readonly
66C0000
trusted library allocation
page read and write
E5A2000
heap
page read and write
5EEE000
stack
page read and write
CD80000
trusted library allocation
page read and write
1820000
heap
page read and write
D7A0000
trusted library allocation
page read and write
71B0000
trusted library allocation
page read and write
7F249000
trusted library allocation
page execute read
64F8000
heap
page read and write
CB58000
heap
page read and write
1D30000
trusted library allocation
page read and write
7F24B000
trusted library allocation
page execute read
CB10000
heap
page read and write
68C0000
heap
page read and write
D2A3000
heap
page read and write
E5A8000
heap
page read and write
7F267000
trusted library allocation
page execute read
C121000
heap
page read and write
1429000
unkown
page readonly
7F275000
trusted library allocation
page readonly
E6D0000
heap
page read and write
7F221000
trusted library allocation
page execute read
D270000
trusted library allocation
page read and write
6ADD000
stack
page read and write
6A20000
heap
page read and write
ECCD000
trusted library allocation
page read and write
DBBC000
stack
page read and write
CA7C000
heap
page read and write
EEF0000
trusted library allocation
page execute and read and write
3721000
trusted library allocation
page read and write
602C000
stack
page read and write
D1C8000
trusted library allocation
page read and write
7F26B000
trusted library allocation
page execute read
D208000
trusted library allocation
page read and write
33B9000
trusted library allocation
page read and write
3385000
trusted library allocation
page read and write
3399000
trusted library allocation
page read and write
7F22C000
trusted library allocation
page execute read
E4DC000
trusted library allocation
page read and write
D760000
trusted library allocation
page read and write
8874000
trusted library allocation
page read and write
D210000
trusted library allocation
page read and write
EF8F000
heap
page read and write
D1F4000
trusted library allocation
page read and write
1902000
heap
page read and write
1415000
heap
page read and write
2FD6000
trusted library allocation
page execute and read and write
D245000
heap
page read and write
5DC0000
heap
page read and write
D8BC000
stack
page read and write
D610000
trusted library allocation
page read and write
D1CA000
trusted library allocation
page read and write
64B4000
heap
page read and write
7F1DB000
trusted library allocation
page execute read
30C3000
heap
page execute and read and write
7F280000
trusted library allocation
page execute and read and write
E631000
heap
page read and write
E59B000
heap
page read and write
CD90000
trusted library allocation
page read and write
D87E000
heap
page read and write
66A0000
trusted library allocation
page read and write
D1D2000
trusted library allocation
page read and write
5728000
trusted library allocation
page read and write
C4E0000
trusted library allocation
page read and write
D278000
heap
page read and write
3A1E000
trusted library allocation
page read and write
D27A000
heap
page read and write
6855000
heap
page read and write
D320000
trusted library allocation
page read and write
D1C0000
heap
page read and write
14B7000
stack
page read and write
6972000
heap
page read and write
64AF000
heap
page read and write
6820000
trusted library allocation
page read and write
1D47000
trusted library allocation
page execute and read and write
815E000
stack
page read and write
4221000
trusted library allocation
page read and write
39C6000
trusted library allocation
page read and write
69AF000
heap
page read and write
D25D000
heap
page read and write
CB4C000
heap
page read and write
D790000
trusted library allocation
page read and write
E669000
heap
page read and write
E526000
heap
page read and write
5EC0000
heap
page read and write
4792000
trusted library allocation
page read and write
2FB0000
trusted library allocation
page read and write
9F70000
trusted library allocation
page read and write
62FE000
stack
page read and write
D1FB000
trusted library allocation
page read and write
D194000
heap
page read and write
7F238000
trusted library allocation
page readonly
D44E000
stack
page read and write
1908000
heap
page read and write
36C0000
trusted library allocation
page read and write
CB17000
heap
page read and write
CB12000
heap
page read and write
7F256000
trusted library allocation
page execute read
C242000
heap
page read and write
686A000
heap
page read and write
7F26A000
trusted library allocation
page execute read
2FD0000
trusted library allocation
page read and write
7F1EB000
trusted library allocation
page execute read
E15E000
stack
page read and write
36D0000
heap
page execute and read and write
7F222000
trusted library allocation
page readonly
5D90000
heap
page read and write
FA8000
stack
page read and write
D1D8000
trusted library allocation
page read and write
5FEE000
stack
page read and write
CD50000
trusted library allocation
page read and write
C1D1000
heap
page read and write
6479000
heap
page read and write
D1F8000
trusted library allocation
page read and write
D846000
heap
page read and write
DABC000
stack
page read and write
E5B5000
heap
page read and write
657E000
stack
page read and write
1310000
heap
page read and write
E5EB000
heap
page read and write
6B70000
trusted library allocation
page read and write
7F224000
trusted library allocation
page readonly
7F233000
trusted library allocation
page readonly
C975000
heap
page read and write
7F27A000
trusted library allocation
page execute read
4721000
trusted library allocation
page read and write
C979000
heap
page read and write
39F1000
trusted library allocation
page read and write
D113000
heap
page read and write
E97E000
stack
page read and write
D2A0000
heap
page read and write
E5C1000
heap
page read and write
15CE000
stack
page read and write
CD00000
trusted library allocation
page read and write
5F10000
heap
page read and write
2FC0000
trusted library allocation
page read and write
7F274000
trusted library allocation
page execute read
D243000
heap
page read and write
CB80000
trusted library allocation
page read and write
7F223000
trusted library allocation
page execute read
C2AB000
heap
page read and write
C123000
heap
page read and write
7F245000
trusted library allocation
page execute read
C4D0000
trusted library allocation
page read and write
5B4C000
heap
page read and write
C990000
heap
page read and write
1917000
heap
page read and write
E92000
unkown
page readonly
D23D000
heap
page read and write
9FC0000
trusted library allocation
page read and write
643E000
stack
page read and write
1930000
heap
page read and write
D6A0000
trusted library allocation
page read and write
CA10000
heap
page read and write
69AB000
heap
page read and write
C480000
trusted library allocation
page read and write
338A000
trusted library allocation
page read and write
C9FA000
heap
page read and write
E673000
heap
page read and write
61FE000
stack
page read and write
CD40000
trusted library allocation
page read and write
E5E7000
heap
page read and write
1D32000
trusted library allocation
page read and write
1A20000
heap
page read and write
6442000
heap
page read and write
7F237000
trusted library allocation
page execute read
7F27E000
trusted library allocation
page execute read
D202000
trusted library allocation
page read and write
6803000
heap
page read and write
C12A000
heap
page read and write
C4A0000
trusted library allocation
page read and write
E560000
heap
page read and write
D12A000
heap
page read and write
18EB000
heap
page read and write
67F6000
heap
page read and write
36AC000
stack
page read and write
C118000
heap
page read and write
CD30000
trusted library allocation
page read and write
5FD0000
trusted library allocation
page read and write
5D80000
heap
page read and write
7F1FF000
trusted library allocation
page execute read
C22B000
heap
page read and write
7F1ED000
trusted library allocation
page execute read
6490000
heap
page read and write
D700000
trusted library allocation
page read and write
C2F0000
trusted library allocation
page read and write
1D4B000
trusted library allocation
page execute and read and write
1541000
heap
page read and write
D27D000
heap
page read and write
C10F000
heap
page read and write
6B40000
trusted library allocation
page read and write
7F243000
trusted library allocation
page execute read
E51C000
heap
page read and write
632C000
stack
page read and write
C977000
heap
page read and write
5890000
heap
page read and write
D1C7000
heap
page read and write
EF91000
heap
page read and write
1D00000
trusted library allocation
page read and write
C130000
heap
page read and write
7F26F000
trusted library allocation
page execute read
60DE000
stack
page read and write
E4D7000
trusted library allocation
page read and write
E01C000
stack
page read and write
67DF000
heap
page read and write
E040000
trusted library allocation
page read and write
C197000
heap
page read and write
A71F000
trusted library allocation
page read and write
E697000
heap
page read and write
2FA0000
trusted library allocation
page read and write
6494000
heap
page read and write
E589000
heap
page read and write
D2A4000
heap
page read and write
C6CE000
stack
page read and write
D24E000
heap
page read and write
58A0000
trusted library allocation
page read and write
2F80000
heap
page read and write
7F228000
trusted library allocation
page readonly
64DD000
heap
page read and write
680C000
heap
page read and write
339C000
trusted library allocation
page read and write
6B20000
trusted library allocation
page read and write
E304000
trusted library allocation
page read and write
6859000
heap
page read and write
EACB000
stack
page read and write
C9E6000
heap
page read and write
37D2000
trusted library allocation
page read and write
1D2D000
trusted library allocation
page execute and read and write
E663000
heap
page read and write
6A3C000
heap
page read and write
1CC0000
heap
page read and write
D300000
trusted library allocation
page read and write
D124000
heap
page read and write
C470000
trusted library allocation
page read and write
E6BB000
heap
page read and write
D660000
trusted library allocation
page read and write
6810000
trusted library allocation
page read and write
D1C0000
trusted library allocation
page read and write
30E0000
trusted library allocation
page read and write
D350000
trusted library allocation
page read and write
2FE0000
trusted library allocation
page read and write
33B1000
trusted library allocation
page read and write
7F269000
trusted library allocation
page execute read
CB1D000
heap
page read and write
7F1FB000
trusted library allocation
page execute read
C500000
trusted library allocation
page read and write
D140000
heap
page read and write
5EDE000
heap
page read and write
15D0000
heap
page read and write
12F7000
stack
page read and write
7F241000
trusted library allocation
page execute read
C277000
heap
page read and write
D24C000
heap
page read and write
6A09000
heap
page read and write
E490000
trusted library allocation
page read and write
684D000
heap
page read and write
D84D000
heap
page read and write
6519000
heap
page read and write
D13E000
heap
page read and write
7F1E4000
trusted library allocation
page execute read
D282000
heap
page read and write
7F25A000
trusted library allocation
page execute read
7F239000
trusted library allocation
page execute read
7F265000
trusted library allocation
page execute read
CAB6000
heap
page read and write
C4C0000
trusted library allocation
page read and write
6EBD000
stack
page read and write
7F24E000
trusted library allocation
page execute read
C0CE000
heap
page read and write
7F236000
trusted library allocation
page readonly
D3ED000
stack
page read and write
37D8000
trusted library allocation
page read and write
58EE000
stack
page read and write
E59F000
heap
page read and write
D690000
trusted library allocation
page read and write
A474000
heap
page read and write
C68C000
stack
page read and write
7F1E9000
trusted library allocation
page execute read
D60C000
stack
page read and write
63FF000
stack
page read and write
C9AA000
heap
page read and write
7F213000
trusted library allocation
page execute read
D6B0000
trusted library allocation
page read and write
7F234000
trusted library allocation
page execute read
CA60000
heap
page read and write
64C2000
heap
page read and write
D17A000
trusted library allocation
page read and write
2FE7000
trusted library allocation
page execute and read and write
7F1F7000
trusted library allocation
page execute read
356E000
stack
page read and write
7F23F000
trusted library allocation
page execute read
5FC0000
trusted library allocation
page read and write
1920000
heap
page read and write
E521000
heap
page read and write
E51F000
heap
page read and write
18FE000
heap
page read and write
6890000
trusted library allocation
page read and write
321F000
stack
page read and write
D620000
trusted library allocation
page read and write
C0B0000
heap
page read and write
7F272000
trusted library allocation
page execute read
33AE000
trusted library allocation
page read and write
7F26D000
trusted library allocation
page execute read
3396000
trusted library allocation
page read and write
2FEB000
trusted library allocation
page execute and read and write
5D74000
heap
page execute and read and write
E44E000
stack
page read and write
C2B0000
trusted library allocation
page read and write
7F1FD000
trusted library allocation
page execute read
D9BE000
stack
page read and write
D180000
trusted library allocation
page read and write
1513000
heap
page read and write
64FF000
heap
page read and write
D1D4000
trusted library allocation
page read and write
7F22F000
trusted library allocation
page execute read
69FF000
heap
page read and write
1430000
heap
page read and write
5F14000
heap
page read and write
7F1F5000
trusted library allocation
page execute read
6A14000
heap
page read and write
37DB000
trusted library allocation
page read and write
F00000
unkown
page readonly
68AC000
heap
page read and write
CB21000
heap
page read and write
F18000
unkown
page readonly
6800000
trusted library allocation
page read and write
E5AB000
heap
page read and write
3710000
heap
page read and write
7F26C000
trusted library allocation
page execute read
5B89000
heap
page read and write
66BB000
stack
page read and write
D640000
trusted library allocation
page read and write
C450000
trusted library allocation
page read and write
D370000
trusted library allocation
page read and write
C2C0000
trusted library allocation
page read and write
5F4D000
heap
page read and write
7F27D000
trusted library allocation
page readonly
E702000
heap
page read and write
C12C000
heap
page read and write
1D36000
trusted library allocation
page execute and read and write
E5FB000
heap
page read and write
7DE0000
heap
page read and write
CA8A000
heap
page read and write
69DC000
stack
page read and write
7F225000
trusted library allocation
page execute read
5B40000
heap
page read and write
D360000
trusted library allocation
page read and write
6B30000
trusted library allocation
page read and write
CA07000
heap
page read and write
D630000
trusted library allocation
page read and write
8260000
heap
page execute and read and write
15AF000
stack
page read and write
67FA000
heap
page read and write
C460000
trusted library allocation
page read and write
D98D000
stack
page read and write
6BBE000
stack
page read and write
1D40000
trusted library allocation
page read and write
D201000
heap
page read and write
6499000
heap
page read and write
6864000
heap
page read and write
6452000
heap
page read and write
D670000
trusted library allocation
page read and write
3393000
trusted library allocation
page read and write
7185000
trusted library allocation
page read and write
C58D000
stack
page read and write
D340000
trusted library allocation
page read and write
E5E3000
heap
page read and write
C90E000
stack
page read and write
7F266000
trusted library allocation
page execute read
E475000
trusted library allocation
page read and write
9FD0000
trusted library allocation
page read and write
C9C9000
heap
page read and write
E47E000
trusted library allocation
page read and write
7180000
trusted library allocation
page read and write
C235000
heap
page read and write
736C000
stack
page read and write
D19A000
heap
page read and write
D1BA000
trusted library allocation
page read and write
D280000
heap
page read and write
E4D3000
trusted library allocation
page read and write
D2C0000
trusted library allocation
page read and write
E53D000
heap
page read and write
64E3000
heap
page read and write
D1A8000
trusted library allocation
page read and write
D87E000
stack
page read and write
C16B000
heap
page read and write
E470000
trusted library allocation
page read and write
7F226000
trusted library allocation
page readonly
1861000
heap
page read and write
E55C000
heap
page read and write
3A02000
trusted library allocation
page read and write
1D20000
trusted library allocation
page read and write
7F23E000
trusted library allocation
page readonly
5720000
trusted library allocation
page read and write
344B000
trusted library allocation
page read and write
E34E000
stack
page read and write
E2F6000
trusted library allocation
page read and write
E488000
trusted library allocation
page read and write
D59E000
stack
page read and write
C1A8000
heap
page read and write
30E6000
trusted library allocation
page read and write
D184000
trusted library allocation
page read and write
7F227000
trusted library allocation
page execute read
7F1EF000
trusted library allocation
page execute read
1D45000
trusted library allocation
page execute and read and write
64FB000
heap
page read and write
D295000
heap
page read and write
A476000
heap
page read and write
D188000
trusted library allocation
page read and write
5C6E000
stack
page read and write
6934000
heap
page read and write
E654000
heap
page read and write
7F231000
trusted library allocation
page execute read
A6A0000
heap
page read and write
7F23C000
trusted library allocation
page readonly
4252000
trusted library allocation
page read and write
3884000
trusted library allocation
page read and write
3110000
heap
page read and write
4751000
trusted library allocation
page read and write
6A05000
heap
page read and write
6A2B000
heap
page read and write
18DC000
heap
page read and write
D2E0000
trusted library allocation
page read and write
D2A7000
heap
page read and write
E4E1000
trusted library allocation
page read and write
59EF000
stack
page read and write
C11F000
heap
page read and write
A6F0000
trusted library allocation
page read and write
E031000
trusted library allocation
page read and write
D720000
trusted library allocation
page read and write
2FDA000
trusted library allocation
page execute and read and write
CCE0000
trusted library allocation
page read and write
A570000
heap
page execute and read and write
3000000
trusted library allocation
page read and write
E4DE000
trusted library allocation
page read and write
C970000
heap
page read and write
3841000
trusted library allocation
page read and write
1D60000
trusted library allocation
page read and write
366F000
stack
page read and write
E4B0000
trusted library allocation
page execute
D6C0000
trusted library allocation
page read and write
3882000
trusted library allocation
page read and write
6D7B000
stack
page read and write
7F268000
trusted library allocation
page execute read
67C0000
trusted library allocation
page read and write
CCD0000
trusted library allocation
page read and write
C910000
trusted library allocation
page read and write
6FC0000
trusted library allocation
page read and write
D2D0000
trusted library allocation
page read and write
7F261000
trusted library allocation
page execute read
7F255000
trusted library allocation
page readonly
D24A000
heap
page read and write
39FF000
trusted library allocation
page read and write
E5A4000
heap
page read and write
E692000
heap
page read and write
E5AD000
heap
page read and write
3A1A000
trusted library allocation
page read and write
5EDB000
heap
page read and write
C43C000
stack
page read and write
D1A9000
heap
page read and write
2FBD000
trusted library allocation
page execute and read and write
D49E000
stack
page read and write
E644000
heap
page read and write
5D6E000
stack
page read and write
CD20000
trusted library allocation
page read and write
7DF0000
trusted library allocation
page read and write
7F251000
trusted library allocation
page execute read
726D000
stack
page read and write
D843000
heap
page read and write
D257000
heap
page read and write
642C000
stack
page read and write
68C2000
heap
page read and write
9FE0000
trusted library allocation
page read and write
145E000
heap
page read and write
1D10000
trusted library allocation
page read and write
D135000
heap
page read and write
67B8000
stack
page read and write
E559000
heap
page read and write
67D0000
heap
page read and write
D26C000
heap
page read and write
D310000
trusted library allocation
page read and write
C4F0000
trusted library allocation
page read and write
CB70000
trusted library allocation
page read and write
E52A000
heap
page read and write
D6D0000
trusted library allocation
page read and write
7F263000
trusted library allocation
page execute read
D131000
heap
page read and write
3104000
heap
page read and write
3A2D000
trusted library allocation
page read and write
E68C000
heap
page read and write
A700000
trusted library allocation
page read and write
E483000
trusted library allocation
page read and write
C1C4000
heap
page read and write
6B60000
trusted library allocation
page read and write
E65A000
heap
page read and write
3387000
trusted library allocation
page read and write
5EAE000
stack
page read and write
C1F1000
heap
page read and write
D740000
trusted library allocation
page read and write
A47F000
heap
page read and write
D1F1000
heap
page read and write
C19E000
heap
page read and write
CB68000
heap
page read and write
C4B0000
trusted library allocation
page read and write
18A3000
heap
page read and write
D11B000
heap
page read and write
7F27C000
trusted library allocation
page execute read
D2F3000
heap
page read and write
6A67000
heap
page read and write
7F258000
trusted library allocation
page execute read
E52F000
heap
page read and write
4231000
trusted library allocation
page read and write
D650000
trusted library allocation
page read and write
2FD2000
trusted library allocation
page read and write
3390000
trusted library allocation
page read and write
36B0000
trusted library allocation
page read and write
C80E000
stack
page read and write
1D80000
heap
page read and write
CB0E000
heap
page read and write
67C6000
heap
page read and write
CB6D000
heap
page read and write
809E000
stack
page read and write
58BE000
stack
page read and write
8892000
trusted library allocation
page read and write
C0EB000
heap
page read and write
17DE000
stack
page read and write
67C0000
heap
page read and write
667E000
stack
page read and write
7F1F1000
trusted library allocation
page execute read
7200000
trusted library allocation
page read and write
7F253000
trusted library allocation
page execute read
3020000
trusted library allocation
page read and write
E2F4000
trusted library allocation
page read and write
5DB0000
heap
page read and write
E516000
heap
page read and write
1C4E000
stack
page read and write
37DE000
trusted library allocation
page read and write
2FB3000
trusted library allocation
page execute and read and write
1410000
heap
page read and write
39F7000
trusted library allocation
page read and write
CF90000
trusted library allocation
page read and write
6930000
heap
page read and write
D1A4000
trusted library allocation
page read and write
9F40000
trusted library allocation
page read and write
6E7C000
stack
page read and write
D11D000
heap
page read and write
7F1D1000
trusted library allocation
page execute read
D198000
heap
page read and write
2FB4000
trusted library allocation
page read and write
653F000
stack
page read and write
CD60000
trusted library allocation
page read and write
5D70000
heap
page execute and read and write
67E0000
trusted library allocation
page read and write
62AD000
stack
page read and write
7F264000
trusted library allocation
page execute read
68A7000
heap
page read and write
7F229000
trusted library allocation
page execute read
8322000
trusted library allocation
page read and write
C440000
trusted library allocation
page read and write
1450000
heap
page read and write
E4F2000
trusted library allocation
page read and write
D730000
trusted library allocation
page read and write
6B50000
trusted library allocation
page read and write
7F23D000
trusted library allocation
page execute read
6830000
trusted library allocation
page read and write
D2C2000
heap
page read and write
7F26E000
trusted library allocation
page execute read
2FE2000
trusted library allocation
page read and write
1484000
heap
page read and write
657E000
stack
page read and write
39BF000
trusted library allocation
page read and write
30BD000
stack
page read and write
D1F6000
trusted library allocation
page read and write
5B96000
heap
page read and write
C988000
heap
page read and write
13F0000
heap
page read and write
6A3E000
heap
page read and write
674E000
stack
page read and write
5B30000
heap
page read and write
EA7E000
stack
page read and write
D1C3000
trusted library allocation
page read and write
9F60000
trusted library allocation
page read and write
E671000
heap
page read and write
67A0000
trusted library allocation
page read and write
C1D6000
heap
page read and write
73AE000
stack
page read and write
A680000
trusted library allocation
page read and write
68A0000
heap
page read and write
5EC2000
heap
page read and write
D185000
heap
page read and write
C183000
heap
page read and write
7F23B000
trusted library allocation
page execute read
D1D0000
trusted library allocation
page read and write
7F271000
trusted library allocation
page readonly
5F87000
heap
page read and write
F02000
unkown
page readonly
EBCE000
stack
page read and write
7F1E1000
trusted library allocation
page execute read
61AC000
stack
page read and write
E513000
heap
page read and write
5DB4000
heap
page read and write
C11D000
heap
page read and write
D241000
heap
page read and write
6849000
heap
page read and write
D16C000
trusted library allocation
page read and write
D6E0000
trusted library allocation
page read and write
C2D0000
heap
page read and write
6833000
heap
page read and write
D7BA000
heap
page read and write
1498000
heap
page read and write
D1BC000
trusted library allocation
page read and write
E594000
heap
page read and write
7F25C000
trusted library allocation
page execute read
C9A4000
heap
page read and write
E2FB000
trusted library allocation
page read and write
D710000
trusted library allocation
page read and write
D330000
trusted library allocation
page read and write
3030000
heap
page execute and read and write
667C000
stack
page read and write
E6B5000
heap
page read and write
7F1F9000
trusted library allocation
page execute read
670D000
stack
page read and write
6B1C000
stack
page read and write
1521000
heap
page read and write
E5D5000
heap
page read and write
D2AA000
heap
page read and write
5A2C000
stack
page read and write
67B0000
trusted library allocation
page read and write
D178000
trusted library allocation
page read and write
67F0000
trusted library allocation
page read and write
182E000
heap
page read and write
3382000
trusted library allocation
page read and write
67E6000
heap
page read and write
7F200000
trusted library allocation
page execute and read and write
DFCE000
stack
page read and write
307E000
stack
page read and write
CD70000
trusted library allocation
page read and write
39F9000
trusted library allocation
page read and write
D1A0000
trusted library allocation
page read and write
337E000
trusted library allocation
page read and write
5F49000
heap
page read and write
145A000
heap
page read and write
7F230000
trusted library allocation
page readonly
C28F000
heap
page read and write
1D14000
trusted library allocation
page read and write
7F1DA000
trusted library allocation
page readonly
D12C000
heap
page read and write
E486000
trusted library allocation
page read and write
CD10000
trusted library allocation
page read and write
D198000
trusted library allocation
page read and write
3100000
heap
page read and write
5ED4000
heap
page read and write
E29E000
stack
page read and write
3458000
trusted library allocation
page read and write
1D1D000
trusted library allocation
page execute and read and write
E66B000
heap
page read and write
E046000
trusted library allocation
page read and write
5FBC000
heap
page read and write
C190000
heap
page read and write
6887000
heap
page read and write
CCF0000
trusted library allocation
page read and write
64A5000
heap
page read and write
D2F0000
trusted library allocation
page read and write
64F3000
heap
page read and write
3A05000
trusted library allocation
page read and write
7F1D8000
trusted library allocation
page execute read
D121000
heap
page read and write
8720000
trusted library allocation
page read and write
5B28000
stack
page read and write
C203000
heap
page read and write
E599000
heap
page read and write
CB1B000
heap
page read and write
D12F000
heap
page read and write
7F276000
trusted library allocation
page execute read
D1EE000
trusted library allocation
page read and write
5F82000
heap
page read and write
C2E0000
trusted library allocation
page read and write
CA6E000
heap
page read and write
D1D6000
trusted library allocation
page read and write
16DE000
stack
page read and write
68BC000
heap
page read and write
7F247000
trusted library allocation
page execute read
5D60000
trusted library allocation
page read and write
67D0000
trusted library allocation
page read and write
7F211000
trusted library allocation
page execute read
E2EE000
stack
page read and write
7F1D3000
trusted library allocation
page execute read
2FC9000
trusted library allocation
page read and write
CB54000
heap
page read and write
696A000
heap
page read and write
39B5000
trusted library allocation
page read and write
EFCA000
heap
page read and write
696D000
heap
page read and write
D1CC000
trusted library allocation
page read and write
6A11000
heap
page read and write
151B000
heap
page read and write
E6B2000
heap
page read and write
E4D9000
trusted library allocation
page read and write
A8CC000
trusted library allocation
page read and write
CA2F000
heap
page read and write
D186000
trusted library allocation
page read and write
478D000
trusted library allocation
page read and write
D1E0000
trusted library allocation
page read and write
1A17000
heap
page read and write
A690000
trusted library allocation
page read and write
1912000
heap
page read and write
D1E8000
trusted library allocation
page read and write
D11F000
heap
page read and write
1A10000
heap
page read and write
C114000
heap
page read and write
68A1000
heap
page read and write
D28D000
heap
page read and write
7F270000
trusted library allocation
page execute read
6690000
trusted library allocation
page read and write
CB51000
heap
page read and write
7F278000
trusted library allocation
page execute read
EF99000
heap
page read and write
E25E000
stack
page read and write
6534000
heap
page read and write
30C0000
heap
page execute and read and write
15D7000
heap
page read and write
35E4000
trusted library allocation
page read and write
CAFF000
heap
page read and write
D801000
heap
page read and write
CA3A000
heap
page read and write
5DAE000
stack
page read and write
64A9000
heap
page read and write
D680000
trusted library allocation
page read and write
7F1DD000
trusted library allocation
page execute read
E5F3000
heap
page read and write
1549000
heap
page read and write
1D13000
trusted library allocation
page execute and read and write
3221000
trusted library allocation
page read and write
C33E000
stack
page read and write
3010000
trusted library allocation
page execute and read and write
E034000
trusted library allocation
page read and write
D110000
heap
page read and write
E67B000
heap
page read and write
D128000
heap
page read and write
C216000
heap
page read and write
825E000
stack
page read and write
158E000
stack
page read and write
A6ED000
stack
page read and write
18D6000
heap
page read and write
E5F7000
heap
page read and write
68FB000
heap
page read and write
EF4D000
heap
page read and write
1D42000
trusted library allocation
page read and write
69E3000
heap
page read and write
150B000
heap
page read and write
D780000
trusted library allocation
page read and write
6840000
trusted library allocation
page read and write
7F273000
trusted library allocation
page readonly
2FCD000
trusted library allocation
page execute and read and write
C116000
heap
page read and write
7F1F3000
trusted library allocation
page execute read
E5A6000
heap
page read and write
A470000
heap
page read and write
D2B0000
trusted library allocation
page read and write
1925000
heap
page read and write
66B0000
trusted library allocation
page read and write
53BD000
stack
page read and write
E050000
heap
page read and write
649F000
heap
page read and write
C490000
trusted library allocation
page read and write
338D000
trusted library allocation
page read and write
5228000
trusted library allocation
page read and write
D1F1000
trusted library allocation
page read and write
6A50000
heap
page read and write
D1B0000
trusted library allocation
page read and write
1895000
heap
page read and write
6170000
trusted library allocation
page read and write
D6F0000
trusted library allocation
page read and write
143D000
heap
page read and write
74AE000
stack
page read and write
612B000
stack
page read and write
1491000
heap
page read and write
2FE5000
trusted library allocation
page execute and read and write
7F262000
trusted library allocation
page execute read
1D70000
trusted library allocation
page execute and read and write
EF06000
heap
page read and write
62EE000
stack
page read and write
There are 784 hidden memdumps, click here to show them.