IOC Report
NewLoaderCracks_1.32.exe

loading gif

Files

File Path
Type
Category
Malicious
NewLoaderCracks_1.32.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\Program Files (x86)\MSECache\OfficeKMS\win8\SwpTnCnrsAAKjgTAQ.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Program Files (x86)\Reference Assemblies\SwpTnCnrsAAKjgTAQ.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Program Files (x86)\Windows Mail\SurrogateRef.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Program Files (x86)\WindowsPowerShell\SwpTnCnrsAAKjgTAQ.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Program Files (x86)\jDownloader\config\RuntimeBroker.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Program Files (x86)\jDownloader\config\SwpTnCnrsAAKjgTAQ.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Program Files\Windows NT\Idle.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Program Files\WindowsPowerShell\SwpTnCnrsAAKjgTAQ.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Recovery\SwpTnCnrsAAKjgTAQ.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Recovery\WmiPrvSE.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Recovery\csrss.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\Default\AppData\Roaming\Microsoft\Windows\Printer Shortcuts\SwpTnCnrsAAKjgTAQ.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\Public\AccountPictures\SwpTnCnrsAAKjgTAQ.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Windows\CbsTemp\RuntimeBroker.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\comcontainer\Kr8tZ.vbe
data
dropped
malicious
C:\comcontainer\SurrogateRef.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\comcontainer\SwpTnCnrsAAKjgTAQ.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\comcontainer\cmd.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Program Files (x86)\MSECache\OfficeKMS\win8\b85529a8a0a78e
ASCII text, with very long lines (950), with no line terminators
dropped
C:\Program Files (x86)\Reference Assemblies\b85529a8a0a78e
ASCII text, with very long lines (678), with no line terminators
dropped
C:\Program Files (x86)\Windows Mail\8f05d91182d17c
ASCII text, with very long lines (429), with no line terminators
dropped
C:\Program Files (x86)\WindowsPowerShell\b85529a8a0a78e
ASCII text, with very long lines (918), with no line terminators
dropped
C:\Program Files (x86)\jDownloader\config\9e8d7a4ca61bd9
ASCII text, with very long lines (745), with no line terminators
dropped
C:\Program Files (x86)\jDownloader\config\b85529a8a0a78e
ASCII text, with no line terminators
dropped
C:\Program Files\Windows NT\6ccacd8608530f
ASCII text, with very long lines (603), with no line terminators
dropped
C:\Program Files\WindowsPowerShell\b85529a8a0a78e
ASCII text, with very long lines (641), with no line terminators
dropped
C:\Recovery\24dbde2999530e
ASCII text, with very long lines (947), with no line terminators
dropped
C:\Recovery\886983d96e3d3e
ASCII text, with very long lines (893), with no line terminators
dropped
C:\Recovery\b85529a8a0a78e
ASCII text, with very long lines (615), with no line terminators
dropped
C:\Users\Default\AppData\Roaming\Microsoft\Windows\Printer Shortcuts\b85529a8a0a78e
ASCII text, with very long lines (934), with no line terminators
dropped
C:\Users\Public\AccountPictures\b85529a8a0a78e
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\SurrogateRef.exe.log
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\SwpTnCnrsAAKjgTAQ.exe.log
CSV text
dropped
C:\Users\user\AppData\Local\Temp\tmp9385A.tmp
ASCII text, with very long lines (1532), with no line terminators
dropped
C:\Windows\CbsTemp\9e8d7a4ca61bd9
ASCII text, with very long lines (879), with no line terminators
dropped
C:\comcontainer\b85529a8a0a78e
ASCII text, with no line terminators
dropped
C:\comcontainer\ebf1f9fa8afd6d
ASCII text, with very long lines (671), with no line terminators
dropped
C:\comcontainer\xNFGfK2ypxJsgsGsm5kX9.bat
ASCII text, with no line terminators
dropped
There are 29 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\NewLoaderCracks_1.32.exe
"C:\Users\user\Desktop\NewLoaderCracks_1.32.exe"
malicious
C:\Windows\SysWOW64\wscript.exe
"C:\Windows\System32\WScript.exe" "C:\comcontainer\Kr8tZ.vbe"
malicious
C:\comcontainer\SurrogateRef.exe
"C:\comcontainer\SurrogateRef.exe"
malicious
C:\Windows\System32\schtasks.exe
schtasks.exe /create /tn "SwpTnCnrsAAKjgTAQS" /sc MINUTE /mo 13 /tr "'C:\Program Files (x86)\jdownloader\config\SwpTnCnrsAAKjgTAQ.exe'" /f
malicious
C:\Windows\System32\schtasks.exe
schtasks.exe /create /tn "SwpTnCnrsAAKjgTAQ" /sc ONLOGON /tr "'C:\Program Files (x86)\jdownloader\config\SwpTnCnrsAAKjgTAQ.exe'" /rl HIGHEST /f
malicious
C:\Windows\System32\schtasks.exe
schtasks.exe /create /tn "SwpTnCnrsAAKjgTAQS" /sc MINUTE /mo 9 /tr "'C:\Program Files (x86)\jdownloader\config\SwpTnCnrsAAKjgTAQ.exe'" /rl HIGHEST /f
malicious
C:\Windows\System32\schtasks.exe
schtasks.exe /create /tn "csrssc" /sc MINUTE /mo 8 /tr "'C:\Recovery\csrss.exe'" /f
malicious
C:\Windows\System32\schtasks.exe
schtasks.exe /create /tn "csrss" /sc ONLOGON /tr "'C:\Recovery\csrss.exe'" /rl HIGHEST /f
malicious
C:\Program Files (x86)\jDownloader\config\SwpTnCnrsAAKjgTAQ.exe
"C:\Program Files (x86)\jdownloader\config\SwpTnCnrsAAKjgTAQ.exe"
malicious
C:\Windows\System32\schtasks.exe
schtasks.exe /create /tn "csrssc" /sc MINUTE /mo 9 /tr "'C:\Recovery\csrss.exe'" /rl HIGHEST /f
malicious
C:\Program Files (x86)\jDownloader\config\SwpTnCnrsAAKjgTAQ.exe
"C:\Program Files (x86)\jdownloader\config\SwpTnCnrsAAKjgTAQ.exe"
malicious
C:\Windows\System32\schtasks.exe
schtasks.exe /create /tn "WmiPrvSEW" /sc MINUTE /mo 9 /tr "'C:\Recovery\WmiPrvSE.exe'" /f
malicious
C:\Windows\System32\schtasks.exe
schtasks.exe /create /tn "WmiPrvSE" /sc ONLOGON /tr "'C:\Recovery\WmiPrvSE.exe'" /rl HIGHEST /f
malicious
C:\Windows\System32\schtasks.exe
schtasks.exe /create /tn "WmiPrvSEW" /sc MINUTE /mo 7 /tr "'C:\Recovery\WmiPrvSE.exe'" /rl HIGHEST /f
malicious
C:\Windows\System32\schtasks.exe
schtasks.exe /create /tn "RuntimeBrokerR" /sc MINUTE /mo 14 /tr "'C:\Program Files (x86)\jdownloader\config\RuntimeBroker.exe'" /f
malicious
C:\Windows\System32\schtasks.exe
schtasks.exe /create /tn "RuntimeBroker" /sc ONLOGON /tr "'C:\Program Files (x86)\jdownloader\config\RuntimeBroker.exe'" /rl HIGHEST /f
malicious
C:\Windows\System32\schtasks.exe
schtasks.exe /create /tn "RuntimeBrokerR" /sc MINUTE /mo 9 /tr "'C:\Program Files (x86)\jdownloader\config\RuntimeBroker.exe'" /rl HIGHEST /f
malicious
C:\Windows\System32\schtasks.exe
schtasks.exe /create /tn "SwpTnCnrsAAKjgTAQS" /sc MINUTE /mo 5 /tr "'C:\Users\Public\AccountPictures\SwpTnCnrsAAKjgTAQ.exe'" /f
malicious
C:\Windows\System32\schtasks.exe
schtasks.exe /create /tn "SwpTnCnrsAAKjgTAQ" /sc ONLOGON /tr "'C:\Users\Public\AccountPictures\SwpTnCnrsAAKjgTAQ.exe'" /rl HIGHEST /f
malicious
C:\Windows\System32\schtasks.exe
schtasks.exe /create /tn "SwpTnCnrsAAKjgTAQS" /sc MINUTE /mo 9 /tr "'C:\Users\Public\AccountPictures\SwpTnCnrsAAKjgTAQ.exe'" /rl HIGHEST /f
malicious
C:\Windows\System32\schtasks.exe
schtasks.exe /create /tn "SurrogateRefS" /sc MINUTE /mo 11 /tr "'C:\Program Files (x86)\windows mail\SurrogateRef.exe'" /f
malicious
C:\Windows\System32\schtasks.exe
schtasks.exe /create /tn "SurrogateRef" /sc ONLOGON /tr "'C:\Program Files (x86)\windows mail\SurrogateRef.exe'" /rl HIGHEST /f
malicious
C:\Windows\System32\schtasks.exe
schtasks.exe /create /tn "SurrogateRefS" /sc MINUTE /mo 8 /tr "'C:\Program Files (x86)\windows mail\SurrogateRef.exe'" /rl HIGHEST /f
malicious
C:\Windows\System32\schtasks.exe
schtasks.exe /create /tn "RuntimeBrokerR" /sc MINUTE /mo 10 /tr "'C:\Windows\CbsTemp\RuntimeBroker.exe'" /f
malicious
C:\Windows\System32\schtasks.exe
schtasks.exe /create /tn "RuntimeBroker" /sc ONLOGON /tr "'C:\Windows\CbsTemp\RuntimeBroker.exe'" /rl HIGHEST /f
malicious
C:\Windows\System32\schtasks.exe
schtasks.exe /create /tn "RuntimeBrokerR" /sc MINUTE /mo 6 /tr "'C:\Windows\CbsTemp\RuntimeBroker.exe'" /rl HIGHEST /f
malicious
C:\Windows\System32\schtasks.exe
schtasks.exe /create /tn "SwpTnCnrsAAKjgTAQS" /sc MINUTE /mo 14 /tr "'C:\Program Files\WindowsPowerShell\SwpTnCnrsAAKjgTAQ.exe'" /f
malicious
C:\Windows\System32\schtasks.exe
schtasks.exe /create /tn "SwpTnCnrsAAKjgTAQ" /sc ONLOGON /tr "'C:\Program Files\WindowsPowerShell\SwpTnCnrsAAKjgTAQ.exe'" /rl HIGHEST /f
malicious
C:\Windows\System32\schtasks.exe
schtasks.exe /create /tn "SwpTnCnrsAAKjgTAQS" /sc MINUTE /mo 10 /tr "'C:\Program Files\WindowsPowerShell\SwpTnCnrsAAKjgTAQ.exe'" /rl HIGHEST /f
malicious
C:\Windows\SysWOW64\cmd.exe
C:\Windows\system32\cmd.exe /c ""C:\comcontainer\xNFGfK2ypxJsgsGsm5kX9.bat" "
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
There are 21 hidden processes, click here to show them.

URLs

Name
IP
Malicious
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
http://ip-api.com/line/?fields=hosting
208.95.112.1
http://ip-api.com
unknown

Domains

Name
IP
Malicious
ip-api.com
208.95.112.1
malicious

IPs

IP
Domain
Country
Malicious
208.95.112.1
ip-api.com
United States
malicious

Registry

Path
Value
Malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System
EnableLUA
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System
PromptOnSecureDesktop
malicious
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
LangID
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
C:\Windows\System32\WScript.exe.FriendlyAppName
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
C:\Windows\System32\WScript.exe.ApplicationCompany
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\SurrogateRef_RASAPI32
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\SurrogateRef_RASAPI32
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\SurrogateRef_RASAPI32
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\SurrogateRef_RASAPI32
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\SurrogateRef_RASAPI32
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\SurrogateRef_RASAPI32
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\SurrogateRef_RASAPI32
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\SurrogateRef_RASMANCS
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\SurrogateRef_RASMANCS
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\SurrogateRef_RASMANCS
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\SurrogateRef_RASMANCS
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\SurrogateRef_RASMANCS
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\SurrogateRef_RASMANCS
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\SurrogateRef_RASMANCS
FileDirectory
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Action Center\Checks\{C8E6F269-B90A-4053-A3BE-499AFCEC98C4}.check.0
CheckSetting
There are 10 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
1239D000
trusted library allocation
page read and write
malicious
2391000
trusted library allocation
page read and write
malicious
2937000
trusted library allocation
page read and write
malicious
3081000
trusted library allocation
page read and write
malicious
3081000
trusted library allocation
page read and write
malicious
130C8000
trusted library allocation
page read and write
2E19000
heap
page read and write
2AE3000
trusted library allocation
page read and write
7FFD34554000
trusted library allocation
page read and write
6F3000
heap
page read and write
541000
unkown
page execute read
7FFD34574000
trusted library allocation
page read and write
93E000
heap
page read and write
724E000
stack
page read and write
7FFD34610000
trusted library allocation
page execute and read and write
2E80000
trusted library allocation
page read and write
7FFD345AC000
trusted library allocation
page execute and read and write
57E000
unkown
page write copy
1276000
heap
page read and write
2D50000
trusted library allocation
page read and write
910000
trusted library section
page read and write
933000
heap
page read and write
1311D000
trusted library allocation
page read and write
1B2D3000
heap
page read and write
1A71F000
heap
page read and write
64F000
heap
page read and write
573000
unkown
page readonly
130BF000
trusted library allocation
page read and write
1C161000
heap
page read and write
2A1B000
trusted library allocation
page read and write
2E90000
heap
page read and write
316D000
stack
page read and write
7FFD34543000
trusted library allocation
page read and write
33C0000
heap
page read and write
4C8E000
stack
page read and write
5A1000
unkown
page read and write
7FFD34770000
trusted library allocation
page execute and read and write
1C145000
heap
page read and write
1AFCE000
stack
page read and write
130D3000
trusted library allocation
page read and write
130D4000
trusted library allocation
page read and write
900000
heap
page read and write
2D82000
stack
page read and write
550F000
stack
page read and write
5FB000
stack
page read and write
1BB7E000
stack
page read and write
7FFD34626000
trusted library allocation
page execute and read and write
917000
heap
page read and write
91A000
heap
page read and write
2E36000
heap
page read and write
130C0000
trusted library allocation
page read and write
8F1000
heap
page read and write
11E0000
heap
page read and write
1ACA0000
trusted library section
page read and write
4F1D000
stack
page read and write
936000
heap
page read and write
1ACC3000
heap
page execute and read and write
57E000
unkown
page read and write
7FFD346E3000
trusted library allocation
page read and write
1C1B3000
heap
page read and write
28B7000
trusted library allocation
page read and write
7FFD346D3000
trusted library allocation
page read and write
2E1A000
heap
page read and write
67A000
heap
page read and write
2E53000
trusted library allocation
page read and write
13121000
trusted library allocation
page read and write
1B5FD000
stack
page read and write
7FFD346FC000
trusted library allocation
page read and write
2D66000
stack
page read and write
95B000
heap
page read and write
130BD000
trusted library allocation
page read and write
E19000
heap
page read and write
886000
heap
page read and write
2D73000
stack
page read and write
13088000
trusted library allocation
page read and write
1B0C2000
stack
page read and write
5F0000
heap
page read and write
1B4D0000
trusted library section
page read and write
13A5000
heap
page read and write
1B93F000
stack
page read and write
913000
heap
page read and write
2E19000
heap
page read and write
93D000
heap
page read and write
1C135000
heap
page read and write
541000
unkown
page execute read
1BF60000
trusted library section
page read and write
156F000
stack
page read and write
2E1D000
heap
page read and write
860000
heap
page read and write
6910000
trusted library allocation
page read and write
2DC5000
trusted library allocation
page read and write
1B392000
heap
page read and write
13122000
trusted library allocation
page read and write
1B34C000
heap
page read and write
1313F000
trusted library allocation
page read and write
913000
heap
page read and write
880000
heap
page read and write
7FFD34780000
trusted library allocation
page read and write
27EF000
trusted library allocation
page read and write
5E7000
unkown
page readonly
52B7000
heap
page read and write
51B0000
heap
page read and write
5338000
heap
page read and write
313F000
trusted library allocation
page read and write
255E000
trusted library allocation
page read and write
FC0000
heap
page read and write
1760000
heap
page execute and read and write
501E000
stack
page read and write
130CC000
trusted library allocation
page read and write
938000
heap
page read and write
130DA000
trusted library allocation
page read and write
5170000
heap
page read and write
1BEC4000
stack
page read and write
7FFD34740000
trusted library allocation
page read and write
130CB000
trusted library allocation
page read and write
2EA9000
heap
page read and write
2C44000
trusted library allocation
page read and write
13081000
trusted library allocation
page read and write
2E45000
heap
page read and write
5160000
heap
page read and write
565E000
stack
page read and write
7FFD346E0000
trusted library allocation
page read and write
13088000
trusted library allocation
page read and write
2380000
heap
page execute and read and write
130CD000
trusted library allocation
page read and write
1312C000
trusted library allocation
page read and write
52B8000
heap
page read and write
2E47000
heap
page read and write
7FFD34550000
trusted library allocation
page read and write
2D4C000
stack
page read and write
2AE5000
trusted library allocation
page read and write
7FFD34530000
trusted library allocation
page read and write
13083000
trusted library allocation
page read and write
13129000
trusted library allocation
page read and write
7FFD34552000
trusted library allocation
page read and write
7FFD345EC000
trusted library allocation
page execute and read and write
2DE8000
heap
page read and write
1C186000
heap
page read and write
2C7C000
trusted library allocation
page read and write
7FFD3454D000
trusted library allocation
page execute and read and write
13091000
trusted library allocation
page read and write
2B01000
trusted library allocation
page read and write
2D60000
stack
page read and write
AAF000
stack
page read and write
90F000
heap
page read and write
1C0CE000
stack
page read and write
2E5A000
trusted library allocation
page read and write
301E000
stack
page read and write
1BE9E000
stack
page read and write
2E60000
trusted library allocation
page read and write
7FFD3456C000
trusted library allocation
page read and write
2AE9000
trusted library allocation
page read and write
1C110000
heap
page read and write
93D000
heap
page read and write
12B1000
heap
page read and write
1BAF0000
heap
page read and write
1240000
heap
page read and write
95B000
heap
page read and write
1BD00000
trusted library section
page read and write
7FFD347F0000
trusted library allocation
page read and write
1311B000
trusted library allocation
page read and write
326E000
stack
page read and write
2AFF000
trusted library allocation
page read and write
912000
heap
page read and write
1BA50000
heap
page execute and read and write
2D79000
stack
page read and write
91D000
heap
page read and write
2D8A000
stack
page read and write
738B000
stack
page read and write
133B000
heap
page read and write
7FFD3455C000
trusted library allocation
page read and write
2D30000
trusted library allocation
page read and write
1C12C000
heap
page read and write
2E04000
heap
page read and write
830000
heap
page read and write
2EA0000
heap
page read and write
130C7000
trusted library allocation
page read and write
1B332000
heap
page read and write
12E85000
trusted library allocation
page read and write
7FFD34543000
trusted library allocation
page execute and read and write
7FFD346FA000
trusted library allocation
page read and write
7FFD346EC000
trusted library allocation
page read and write
8D0000
trusted library allocation
page read and write
1B2D0000
heap
page read and write
2E08000
heap
page read and write
3270000
heap
page read and write
2EA0000
heap
page read and write
13120000
trusted library allocation
page read and write
7FFD345E6000
trusted library allocation
page read and write
130C6000
trusted library allocation
page read and write
1C158000
heap
page read and write
7FFD34544000
trusted library allocation
page read and write
1BCC0000
heap
page execute and read and write
1ACCE000
heap
page execute and read and write
1C252000
heap
page read and write
810000
heap
page read and write
15CF000
stack
page read and write
130B2000
trusted library allocation
page read and write
2AF1000
trusted library allocation
page read and write
130C3000
trusted library allocation
page read and write
8D8000
heap
page read and write
1BCBB000
stack
page read and write
8F0000
heap
page read and write
13091000
trusted library allocation
page read and write
80E000
stack
page read and write
7FFD34600000
trusted library allocation
page read and write
5A2000
unkown
page readonly
938000
heap
page read and write
7FFD3459C000
trusted library allocation
page execute and read and write
2E19000
heap
page read and write
2E58000
trusted library allocation
page read and write
2EA9000
heap
page read and write
11F0000
heap
page read and write
2EA0000
heap
page read and write
1308D000
trusted library allocation
page read and write
90E000
heap
page read and write
7FFD34730000
trusted library allocation
page read and write
7FFD34790000
trusted library allocation
page read and write
1BA9F000
stack
page read and write
7FFD34650000
trusted library allocation
page execute and read and write
2903000
trusted library allocation
page read and write
196000
unkown
page readonly
1C233000
heap
page read and write
5A2000
unkown
page write copy
7FFD34570000
trusted library allocation
page read and write
6BA000
heap
page read and write
7FFD347A4000
trusted library allocation
page read and write
50B0000
heap
page read and write
130F1000
trusted library allocation
page read and write
51B4000
heap
page read and write
610000
heap
page read and write
130C9000
trusted library allocation
page read and write
1C198000
heap
page read and write
20000
unkown
page readonly
1BBBE000
stack
page read and write
1B0B0000
trusted library allocation
page read and write
6EF000
heap
page read and write
1BB9E000
stack
page read and write
7FFD346D0000
trusted library allocation
page read and write
312F000
stack
page read and write
1300000
heap
page read and write
2D56000
stack
page read and write
1C1CE000
stack
page read and write
2EA0000
heap
page read and write
1B93D000
stack
page read and write
95B000
heap
page read and write
1BF70000
trusted library section
page read and write
92C000
heap
page read and write
130D7000
trusted library allocation
page read and write
130D5000
trusted library allocation
page read and write
7FFD34616000
trusted library allocation
page execute and read and write
1311A000
trusted library allocation
page read and write
1C212000
heap
page read and write
91F000
heap
page read and write
93E000
heap
page read and write
130D6000
trusted library allocation
page read and write
15D0000
heap
page read and write
1B3BD000
heap
page read and write
130ED000
trusted library allocation
page read and write
2E5C000
trusted library allocation
page read and write
12E42000
trusted library allocation
page read and write
554B000
stack
page read and write
4D8F000
stack
page read and write
510000
heap
page read and write
7FFD3454C000
trusted library allocation
page read and write
2EA0000
heap
page read and write
2A64000
trusted library allocation
page read and write
7FFD347D0000
trusted library allocation
page read and write
1220000
heap
page read and write
2B23000
trusted library allocation
page read and write
1BA4E000
stack
page read and write
2E30000
heap
page read and write
1600000
heap
page read and write
7FFD347E0000
trusted library allocation
page read and write
1C1EA000
heap
page read and write
2AF5000
trusted library allocation
page read and write
7FFD3460C000
trusted library allocation
page execute and read and write
2EF0000
heap
page read and write
6ED000
heap
page read and write
2E5E000
trusted library allocation
page read and write
130CF000
trusted library allocation
page read and write
2FE0000
heap
page readonly
130CA000
trusted library allocation
page read and write
915000
heap
page read and write
7FFD34550000
trusted library allocation
page read and write
929000
heap
page read and write
3139000
trusted library allocation
page read and write
B9E000
stack
page read and write
1C17B000
heap
page read and write
20000
unkown
page readonly
923000
heap
page read and write
734F000
stack
page read and write
2AF3000
trusted library allocation
page read and write
1C175000
heap
page read and write
921000
heap
page read and write
7FFD34636000
trusted library allocation
page execute and read and write
2EA9000
heap
page read and write
2EA0000
heap
page read and write
7FFD34533000
trusted library allocation
page execute and read and write
130DC000
trusted library allocation
page read and write
1B369000
heap
page read and write
1270000
heap
page read and write
7FFD34713000
trusted library allocation
page read and write
22000
unkown
page readonly
1200000
heap
page read and write
12CA7000
trusted library allocation
page read and write
284A000
trusted library allocation
page read and write
1730000
trusted library allocation
page read and write
1B3C8000
heap
page read and write
130B0000
trusted library allocation
page read and write
1775000
heap
page read and write
7FFD3456D000
trusted library allocation
page execute and read and write
2A0A000
trusted library allocation
page read and write
2C3C000
trusted library allocation
page read and write
980000
heap
page read and write
2AE1000
trusted library allocation
page read and write
1C65B000
stack
page read and write
234F000
stack
page read and write
1BD9E000
stack
page read and write
936000
heap
page read and write
131EC000
trusted library allocation
page read and write
1C13A000
heap
page read and write
7FFD345FC000
trusted library allocation
page execute and read and write
26FA000
trusted library allocation
page read and write
2E9F000
heap
page read and write
7FFD346F0000
trusted library allocation
page read and write
9A0000
heap
page read and write
4FB000
stack
page read and write
3040000
trusted library allocation
page read and write
92E000
heap
page read and write
33EB000
heap
page read and write
2B03000
trusted library allocation
page read and write
7FFD3457D000
trusted library allocation
page execute and read and write
13112000
trusted library allocation
page read and write
1AECF000
stack
page read and write
5E7000
unkown
page readonly
2E1E000
heap
page read and write
720F000
stack
page read and write
7FFD34532000
trusted library allocation
page read and write
928000
heap
page read and write
7FFD346EA000
trusted library allocation
page read and write
13130000
trusted library allocation
page read and write
1329000
heap
page read and write
3105000
trusted library allocation
page read and write
1BCD0000
trusted library section
page read and write
5A3000
unkown
page readonly
2AED000
trusted library allocation
page read and write
1B3CA000
heap
page read and write
5060000
heap
page read and write
748D000
stack
page read and write
1BA3B000
stack
page read and write
13113000
trusted library allocation
page read and write
95B000
heap
page read and write
1C21F000
heap
page read and write
52B8000
heap
page read and write
7FFD34720000
trusted library allocation
page read and write
131B000
heap
page read and write
7FFD346E0000
trusted library allocation
page read and write
2AEB000
trusted library allocation
page read and write
8A0000
trusted library allocation
page read and write
E10000
heap
page read and write
920000
heap
page read and write
2EA0000
heap
page read and write
7FFD34750000
trusted library allocation
page execute and read and write
13102000
trusted library allocation
page read and write
1B4FD000
stack
page read and write
E40000
heap
page read and write
2C4C000
trusted library allocation
page read and write
651000
heap
page read and write
555D000
stack
page read and write
11F5000
heap
page read and write
1326000
heap
page read and write
7FFD34554000
trusted library allocation
page read and write
1C1FA000
heap
page read and write
3020000
heap
page execute and read and write
2AF9000
trusted library allocation
page read and write
130F0000
trusted library allocation
page read and write
1308000
heap
page read and write
505E000
stack
page read and write
7FFD3455B000
trusted library allocation
page execute and read and write
D90000
heap
page read and write
2EA9000
heap
page read and write
63A000
heap
page read and write
302D000
stack
page read and write
11E5000
heap
page read and write
33C4000
heap
page read and write
7FFD346EB000
trusted library allocation
page read and write
12DF000
heap
page read and write
6996000
heap
page read and write
7FFD34547000
trusted library allocation
page read and write
1312B000
trusted library allocation
page read and write
12EA1000
trusted library allocation
page read and write
2E0C000
heap
page read and write
1C24F000
heap
page read and write
130EE000
trusted library allocation
page read and write
CDE000
stack
page read and write
1C141000
heap
page read and write
1B2CA000
stack
page read and write
12A6000
heap
page read and write
10F6000
stack
page read and write
2DE0000
heap
page read and write
1C0EC000
stack
page read and write
8F7000
heap
page read and write
7FFD347F6000
trusted library allocation
page read and write
13126000
trusted library allocation
page read and write
92F000
heap
page read and write
1C249000
heap
page read and write
130D8000
trusted library allocation
page read and write
3070000
heap
page execute and read and write
1605000
heap
page read and write
2D77000
stack
page read and write
13119000
trusted library allocation
page read and write
1100000
heap
page read and write
938000
heap
page read and write
2E08000
heap
page read and write
7FFD34760000
trusted library allocation
page execute and read and write
2EA0000
heap
page read and write
52B3000
heap
page read and write
93F000
heap
page read and write
584000
unkown
page read and write
8E4000
heap
page read and write
1ADCF000
stack
page read and write
13125000
trusted library allocation
page read and write
170F000
stack
page read and write
192000
unkown
page readonly
8CE000
stack
page read and write
569D000
stack
page read and write
2E0E000
heap
page read and write
2E0F000
heap
page read and write
2E30000
heap
page read and write
7FFD34564000
trusted library allocation
page read and write
1311F000
trusted library allocation
page read and write
93E000
heap
page read and write
2EA9000
heap
page read and write
7FFD3455D000
trusted library allocation
page execute and read and write
632000
heap
page read and write
6915000
heap
page read and write
7FFD34567000
trusted library allocation
page read and write
1770000
heap
page read and write
95B000
heap
page read and write
7FFD34700000
trusted library allocation
page read and write
13114000
trusted library allocation
page read and write
7FFD34560000
trusted library allocation
page read and write
7FFD347B0000
trusted library allocation
page read and write
67F000
heap
page read and write
3070000
heap
page read and write
7FFD3458C000
trusted library allocation
page execute and read and write
7FFD34563000
trusted library allocation
page read and write
1A92D000
stack
page read and write
540E000
stack
page read and write
7FFD346F3000
trusted library allocation
page read and write
130C4000
trusted library allocation
page read and write
8D0000
heap
page read and write
1BFA0000
heap
page read and write
1BCF0000
trusted library section
page read and write
1C240000
heap
page read and write
132C000
heap
page read and write
1BC93000
stack
page read and write
7FFD347C2000
trusted library allocation
page read and write
130EF000
trusted library allocation
page read and write
7FFD34534000
trusted library allocation
page read and write
1279000
heap
page read and write
3139000
trusted library allocation
page read and write
7FFD345F0000
trusted library allocation
page execute and read and write
1BF9E000
stack
page read and write
33BA000
trusted library allocation
page read and write
1BBFE000
stack
page read and write
7FFD34720000
trusted library allocation
page read and write
1BCC0000
trusted library section
page read and write
1311E000
trusted library allocation
page read and write
938000
heap
page read and write
934000
heap
page read and write
7FFD34606000
trusted library allocation
page read and write
1B0B0000
trusted library allocation
page read and write
7FFD345F6000
trusted library allocation
page read and write
678000
heap
page read and write
13123000
trusted library allocation
page read and write
1313F000
trusted library allocation
page read and write
7FFD34700000
trusted library allocation
page read and write
13A8000
heap
page read and write
919000
heap
page read and write
1C26A000
heap
page read and write
7FFD34730000
trusted library allocation
page read and write
DFE000
stack
page read and write
12E7000
heap
page read and write
1B4CF000
stack
page read and write
FE0000
heap
page read and write
2AFD000
trusted library allocation
page read and write
933000
heap
page read and write
1ACC0000
heap
page execute and read and write
7FFD345F0000
trusted library allocation
page read and write
13117000
trusted library allocation
page read and write
130D9000
trusted library allocation
page read and write
12DD000
heap
page read and write
13124000
trusted library allocation
page read and write
2E0C000
heap
page read and write
130DB000
trusted library allocation
page read and write
12B4000
heap
page read and write
130CE000
trusted library allocation
page read and write
7FFD346F0000
trusted library allocation
page read and write
1311C000
trusted library allocation
page read and write
52B1000
heap
page read and write
7FFD34553000
trusted library allocation
page execute and read and write
130BE000
trusted library allocation
page read and write
2C86000
stack
page read and write
1C190000
heap
page read and write
33E7000
heap
page read and write
69F000
heap
page read and write
13083000
trusted library allocation
page read and write
8F7000
heap
page read and write
1B33E000
heap
page read and write
E00000
heap
page read and write
2AE7000
trusted library allocation
page read and write
7FFD34542000
trusted library allocation
page read and write
7FFD3453D000
trusted library allocation
page execute and read and write
95B000
heap
page read and write
1750000
trusted library allocation
page read and write
1BCE0000
trusted library section
page read and write
12391000
trusted library allocation
page read and write
1BDCE000
stack
page read and write
1C25C000
heap
page read and write
2E19000
heap
page read and write
901000
heap
page read and write
1293000
heap
page read and write
7FFD347A0000
trusted library allocation
page read and write
7FFD3455D000
trusted library allocation
page execute and read and write
1B387000
heap
page read and write
1B4E0000
trusted library section
page read and write
2E30000
heap
page read and write
564C000
stack
page read and write
7FFD34540000
trusted library allocation
page read and write
922000
heap
page read and write
1C264000
heap
page read and write
7FFD34710000
trusted library allocation
page read and write
1312D000
trusted library allocation
page read and write
1312F000
trusted library allocation
page read and write
130C2000
trusted library allocation
page read and write
1C1C1000
heap
page read and write
7FFD34670000
trusted library allocation
page execute and read and write
1C16B000
heap
page read and write
2E47000
heap
page read and write
2E5E000
stack
page read and write
7FFD34553000
trusted library allocation
page read and write
7FFD34703000
trusted library allocation
page read and write
515E000
stack
page read and write
2F00000
heap
page read and write
1C129000
heap
page read and write
7FFD3456D000
trusted library allocation
page execute and read and write
1C1D6000
heap
page read and write
1B39A000
heap
page read and write
13127000
trusted library allocation
page read and write
912000
heap
page read and write
1312A000
trusted library allocation
page read and write
7FFD34700000
trusted library allocation
page read and write
12F6000
stack
page read and write
1A3C0000
trusted library allocation
page read and write
130F2000
trusted library allocation
page read and write
33E0000
heap
page read and write
2E16000
heap
page read and write
130C5000
trusted library allocation
page read and write
2A39000
trusted library allocation
page read and write
1BF5A000
stack
page read and write
573000
unkown
page readonly
7FFD3456B000
trusted library allocation
page execute and read and write
12B7000
heap
page read and write
2AEF000
trusted library allocation
page read and write
130D0000
trusted library allocation
page read and write
880000
trusted library allocation
page read and write
2600000
trusted library allocation
page read and write
95B000
heap
page read and write
130B1000
trusted library allocation
page read and write
8E0000
heap
page read and write
7FFD3457B000
trusted library allocation
page execute and read and write
13118000
trusted library allocation
page read and write
924000
heap
page read and write
1B37F000
heap
page read and write
13116000
trusted library allocation
page read and write
1BFC3000
stack
page read and write
2360000
heap
page execute and read and write
7FF4828C0000
trusted library allocation
page execute and read and write
BDE000
stack
page read and write
1BE5A000
stack
page read and write
1B1CA000
stack
page read and write
33A1000
trusted library allocation
page read and write
7FFD346F0000
trusted library allocation
page read and write
7FFD3470B000
trusted library allocation
page read and write
1B83E000
stack
page read and write
25FE000
trusted library allocation
page read and write
2AF7000
trusted library allocation
page read and write
4C4F000
stack
page read and write
2AFB000
trusted library allocation
page read and write
2E47000
heap
page read and write
7FFD34710000
trusted library allocation
page read and write
7FFD346DC000
trusted library allocation
page read and write
5000000
heap
page read and write
FB0000
heap
page read and write
919000
heap
page read and write
7FFD34660000
trusted library allocation
page execute and read and write
540000
unkown
page readonly
13128000
trusted library allocation
page read and write
1BA40000
heap
page execute and read and write
146E000
stack
page read and write
13081000
trusted library allocation
page read and write
540000
unkown
page readonly
1308D000
trusted library allocation
page read and write
2ADF000
trusted library allocation
page read and write
7FFD3454D000
trusted library allocation
page execute and read and write
51B0000
trusted library allocation
page read and write
9A4000
heap
page read and write
7FFD34557000
trusted library allocation
page read and write
931000
heap
page read and write
1B990000
heap
page read and write
7FFD345E0000
trusted library allocation
page read and write
2E6D000
heap
page read and write
128F000
heap
page read and write
7FFD3478B000
trusted library allocation
page read and write
92D000
heap
page read and write
7FFD34600000
trusted library allocation
page execute and read and write
1367000
heap
page read and write
870000
heap
page read and write
4F6000
stack
page read and write
130C1000
trusted library allocation
page read and write
133E000
heap
page read and write
7FFD3470B000
trusted library allocation
page read and write
130EC000
trusted library allocation
page read and write
1B60D000
stack
page read and write
7FFD34710000
trusted library allocation
page read and write
7FFD3455D000
trusted library allocation
page execute and read and write
There are 618 hidden memdumps, click here to show them.