IOC Report
MB267382625AE.exe

loading gif

Files

File Path
Type
Category
Malicious
MB267382625AE.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\MB267382625AE.exe.log
ASCII text, with CRLF line terminators
dropped
malicious
C:\Users\user\AppData\Local\Temp\tmp9D96.tmp
XML 1.0 document, ASCII text
dropped
malicious
C:\Users\user\AppData\Roaming\IFUybmFQxR.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\IFUybmFQxR.exe:Zone.Identifier
ASCII text, with CRLF line terminators
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\IFUybmFQxR.exe.log
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
data
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_1x4jykkf.1yd.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_c4xz3vfg.g54.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_jfuqgshe.qdu.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_jvpoy15z.yes.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_kwxeecb2.lde.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_mozz4lhf.zog.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_otpwiu2m.ywc.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_zqo1kbz2.oln.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\tmpB37F.tmp
XML 1.0 document, ASCII text
dropped
There are 6 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\MB267382625AE.exe
"C:\Users\user\Desktop\MB267382625AE.exe"
malicious
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\MB267382625AE.exe"
malicious
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\IFUybmFQxR.exe"
malicious
C:\Windows\SysWOW64\schtasks.exe
"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\IFUybmFQxR" /XML "C:\Users\user\AppData\Local\Temp\tmp9D96.tmp"
malicious
C:\Users\user\Desktop\MB267382625AE.exe
"C:\Users\user\Desktop\MB267382625AE.exe"
malicious
C:\Users\user\AppData\Roaming\IFUybmFQxR.exe
C:\Users\user\AppData\Roaming\IFUybmFQxR.exe
malicious
C:\Windows\SysWOW64\schtasks.exe
"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\IFUybmFQxR" /XML "C:\Users\user\AppData\Local\Temp\tmpB37F.tmp"
malicious
C:\Users\user\AppData\Roaming\IFUybmFQxR.exe
"C:\Users\user\AppData\Roaming\IFUybmFQxR.exe"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\wbem\WmiPrvSE.exe
C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
There are 3 hidden processes, click here to show them.

URLs

Name
IP
Malicious
https://reallyfreegeoip.org
unknown
http://checkip.dyndns.org
unknown
http://checkip.dyndns.org/
158.101.44.242
http://checkip.dyndns.com
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
https://reallyfreegeoip.org/xml/8.46.123.75
188.114.96.3
http://tempuri.org/project_mgtDataSet.xsdOproject_mgt_system.Properties.Resources
unknown
https://reallyfreegeoip.org/xml/8.46.123.75$
unknown
http://checkip.dyndns.org/q
unknown
http://reallyfreegeoip.org
unknown
https://reallyfreegeoip.org/xml/
unknown
There are 1 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
reallyfreegeoip.org
188.114.96.3
checkip.dyndns.com
158.101.44.242
checkip.dyndns.org
unknown

IPs

IP
Domain
Country
Malicious
188.114.96.3
reallyfreegeoip.org
European Union
158.101.44.242
checkip.dyndns.com
United States

Registry

Path
Value
Malicious
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\MB267382625AE_RASAPI32
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\MB267382625AE_RASAPI32
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\MB267382625AE_RASAPI32
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\MB267382625AE_RASAPI32
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\MB267382625AE_RASAPI32
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\MB267382625AE_RASAPI32
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\MB267382625AE_RASAPI32
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\MB267382625AE_RASMANCS
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\MB267382625AE_RASMANCS
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\MB267382625AE_RASMANCS
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\MB267382625AE_RASMANCS
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\MB267382625AE_RASMANCS
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\MB267382625AE_RASMANCS
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\MB267382625AE_RASMANCS
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\IFUybmFQxR_RASAPI32
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\IFUybmFQxR_RASAPI32
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\IFUybmFQxR_RASAPI32
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\IFUybmFQxR_RASAPI32
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\IFUybmFQxR_RASAPI32
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\IFUybmFQxR_RASAPI32
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\IFUybmFQxR_RASAPI32
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\IFUybmFQxR_RASMANCS
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\IFUybmFQxR_RASMANCS
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\IFUybmFQxR_RASMANCS
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\IFUybmFQxR_RASMANCS
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\IFUybmFQxR_RASMANCS
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\IFUybmFQxR_RASMANCS
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\IFUybmFQxR_RASMANCS
FileDirectory
There are 19 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
402000
remote allocation
page execute and read and write
malicious
39A9000
trusted library allocation
page read and write
malicious
2A2B000
trusted library allocation
page read and write
malicious
2F1D000
trusted library allocation
page read and write
malicious
2D51000
trusted library allocation
page read and write
malicious
2861000
trusted library allocation
page read and write
malicious
7580000
trusted library allocation
page read and write
5920000
heap
page read and write
635E000
stack
page read and write
3DEC000
trusted library allocation
page read and write
5504000
trusted library allocation
page read and write
3DD6000
trusted library allocation
page read and write
8E0000
heap
page read and write
2E7E000
stack
page read and write
BB9000
heap
page read and write
E3F000
unkown
page read and write
1643000
trusted library allocation
page read and write
D10000
trusted library allocation
page read and write
555A000
trusted library allocation
page read and write
6730000
heap
page read and write
1656000
trusted library allocation
page execute and read and write
4FC0000
heap
page read and write
DFA000
stack
page read and write
A99000
heap
page read and write
2BF8000
trusted library allocation
page read and write
4D10000
trusted library allocation
page read and write
E3A000
stack
page read and write
552D000
trusted library allocation
page read and write
4F60000
heap
page read and write
B68000
heap
page read and write
9B0000
heap
page read and write
5532000
trusted library allocation
page read and write
6660000
trusted library allocation
page read and write
2F01000
trusted library allocation
page read and write
6FC0000
trusted library allocation
page execute and read and write
1630000
trusted library allocation
page read and write
BA5E000
stack
page read and write
54F0000
trusted library allocation
page read and write
55F2000
trusted library allocation
page read and write
4D14000
trusted library allocation
page read and write
27B0000
heap
page read and write
980000
heap
page read and write
D52000
trusted library allocation
page read and write
6B70000
heap
page read and write
5AB5000
heap
page read and write
5B70000
trusted library allocation
page execute and read and write
5040000
heap
page execute and read and write
1633000
trusted library allocation
page execute and read and write
11B4000
heap
page read and write
2E8F000
trusted library allocation
page read and write
61DE000
stack
page read and write
681D000
stack
page read and write
4F2000
unkown
page readonly
3016000
trusted library allocation
page read and write
276E000
stack
page read and write
6C40000
heap
page read and write
E6F000
stack
page read and write
5990000
heap
page read and write
288C000
stack
page read and write
29AE000
trusted library allocation
page read and write
B20000
trusted library allocation
page read and write
2C30000
trusted library allocation
page read and write
5A9D000
stack
page read and write
29E2000
trusted library allocation
page read and write
39A1000
trusted library allocation
page read and write
D32000
trusted library allocation
page read and write
1270000
heap
page read and write
2E30000
trusted library allocation
page read and write
E90000
trusted library allocation
page read and write
6EA0000
trusted library allocation
page read and write
665E000
stack
page read and write
2EA7000
trusted library allocation
page read and write
4DCE000
stack
page read and write
5950000
heap
page read and write
2B07000
trusted library allocation
page execute and read and write
990000
heap
page read and write
27B8000
trusted library allocation
page read and write
3D79000
trusted library allocation
page read and write
2A0B000
trusted library allocation
page read and write
2E9F000
trusted library allocation
page read and write
B3D000
trusted library allocation
page execute and read and write
1198000
heap
page read and write
BB9C000
stack
page read and write
980000
heap
page read and write
2E17000
trusted library allocation
page execute and read and write
2F70000
heap
page read and write
4F0000
unkown
page readonly
5D9000
stack
page read and write
29B2000
trusted library allocation
page read and write
D45000
trusted library allocation
page execute and read and write
122F000
heap
page read and write
164D000
trusted library allocation
page execute and read and write
5959000
heap
page read and write
B73E000
stack
page read and write
B5F000
heap
page read and write
B6DE000
stack
page read and write
41E9000
trusted library allocation
page read and write
4CE0000
heap
page read and write
290F000
trusted library allocation
page read and write
6140000
heap
page read and write
117E000
heap
page read and write
AA5000
heap
page read and write
EA0000
trusted library allocation
page execute and read and write
2AB9000
trusted library allocation
page read and write
D1D000
trusted library allocation
page execute and read and write
2AAB000
trusted library allocation
page read and write
57A000
unkown
page readonly
1255000
heap
page read and write
D20000
trusted library allocation
page read and write
2912000
trusted library allocation
page read and write
D4B000
trusted library allocation
page execute and read and write
6690000
trusted library allocation
page read and write
2E4F000
trusted library allocation
page read and write
D3A000
trusted library allocation
page execute and read and write
1660000
heap
page read and write
B83000
heap
page read and write
2E10000
trusted library allocation
page read and write
6B7A000
trusted library allocation
page read and write
42B3000
trusted library allocation
page read and write
2927000
trusted library allocation
page read and write
2AF2000
trusted library allocation
page read and write
52D8000
trusted library allocation
page read and write
27F3000
heap
page read and write
B0E000
stack
page read and write
54E0000
trusted library allocation
page execute and read and write
2C40000
heap
page read and write
970000
heap
page read and write
E7E000
stack
page read and write
2BAD000
stack
page read and write
27D0000
trusted library allocation
page read and write
543E000
stack
page read and write
7230000
heap
page read and write
296A000
trusted library allocation
page read and write
B5FE000
stack
page read and write
555E000
trusted library allocation
page read and write
700E000
stack
page read and write
B20000
heap
page read and write
6B90000
trusted library allocation
page execute and read and write
421000
remote allocation
page execute and read and write
65DE000
stack
page read and write
6B60000
trusted library allocation
page execute and read and write
2A9B000
trusted library allocation
page read and write
122A000
heap
page read and write
BF2000
heap
page read and write
29A1000
trusted library allocation
page read and write
4116000
trusted library allocation
page read and write
B63E000
stack
page read and write
96F000
unkown
page read and write
B4A000
heap
page read and write
2842000
trusted library allocation
page read and write
666F000
trusted library allocation
page read and write
B480000
heap
page read and write
5650000
trusted library section
page readonly
5510000
trusted library allocation
page read and write
5990000
trusted library allocation
page read and write
2A1E000
trusted library allocation
page read and write
32F8000
trusted library allocation
page read and write
1155000
heap
page read and write
621E000
stack
page read and write
5020000
trusted library allocation
page execute and read and write
8F7000
stack
page read and write
6B7F000
trusted library allocation
page read and write
2AFA000
trusted library allocation
page execute and read and write
59A8000
trusted library allocation
page read and write
5256000
trusted library allocation
page read and write
69DE000
stack
page read and write
29AA000
trusted library allocation
page read and write
4E90000
heap
page read and write
2FAF000
trusted library allocation
page read and write
2E16000
trusted library allocation
page read and write
10FE000
stack
page read and write
428F000
trusted library allocation
page read and write
27E0000
trusted library allocation
page read and write
C18000
heap
page read and write
BDA000
heap
page read and write
B4E000
heap
page read and write
27A0000
heap
page read and write
2E12000
trusted library allocation
page read and write
2FDF000
trusted library allocation
page read and write
6A20000
heap
page read and write
2F8D000
trusted library allocation
page read and write
BCDF000
stack
page read and write
4EEE000
stack
page read and write
5F9E000
stack
page read and write
269E000
stack
page read and write
5350000
trusted library allocation
page read and write
4F80000
trusted library allocation
page execute and read and write
2850000
heap
page read and write
2ABD000
trusted library allocation
page read and write
53FE000
stack
page read and write
8ACE000
stack
page read and write
52E0000
trusted library allocation
page execute and read and write
970000
heap
page read and write
49FD000
stack
page read and write
D00000
trusted library allocation
page read and write
11EB000
heap
page read and write
B47E000
stack
page read and write
B470000
heap
page read and write
5521000
trusted library allocation
page read and write
40A1000
trusted library allocation
page read and write
5270000
trusted library allocation
page read and write
4DA0000
trusted library allocation
page read and write
666A000
trusted library allocation
page read and write
4D60000
trusted library allocation
page read and write
D47000
trusted library allocation
page execute and read and write
165A000
trusted library allocation
page execute and read and write
5AC0000
trusted library allocation
page read and write
29BA000
trusted library allocation
page read and write
4D00000
trusted library allocation
page read and write
B60000
heap
page read and write
2962000
trusted library allocation
page read and write
523B000
trusted library allocation
page read and write
2B6E000
stack
page read and write
11FE000
stack
page read and write
6B70000
trusted library allocation
page read and write
4E00000
trusted library allocation
page read and write
6670000
trusted library allocation
page execute and read and write
73AE000
heap
page read and write
F90000
heap
page read and write
4F00000
trusted library section
page readonly
2907000
trusted library allocation
page read and write
D2D000
trusted library allocation
page execute and read and write
B46E000
stack
page read and write
295E000
trusted library allocation
page read and write
29BB000
trusted library allocation
page read and write
6A1F000
stack
page read and write
9B5000
heap
page read and write
7570000
trusted library allocation
page read and write
6CEE000
stack
page read and write
5546000
trusted library allocation
page read and write
6EA7000
trusted library allocation
page read and write
6B73000
trusted library allocation
page read and write
4D31000
trusted library allocation
page read and write
3DEE000
trusted library allocation
page read and write
7386000
heap
page read and write
89DE000
stack
page read and write
92E000
unkown
page read and write
2E97000
trusted library allocation
page read and write
3D51000
trusted library allocation
page read and write
52DB000
trusted library allocation
page read and write
B4FE000
stack
page read and write
38CA000
trusted library allocation
page read and write
42AF000
trusted library allocation
page read and write
B75000
heap
page read and write
524A000
trusted library allocation
page read and write
309F000
stack
page read and write
DAE000
stack
page read and write
2AF6000
trusted library allocation
page execute and read and write
2EE1000
trusted library allocation
page read and write
2B02000
trusted library allocation
page read and write
29C7000
trusted library allocation
page read and write
2E31000
trusted library allocation
page read and write
52A0000
trusted library allocation
page read and write
B2D000
heap
page read and write
7620000
trusted library allocation
page execute and read and write
BAE000
stack
page read and write
55F0000
trusted library allocation
page read and write
4DB3000
heap
page read and write
B9BC000
stack
page read and write
2FD3000
trusted library allocation
page read and write
685F000
stack
page read and write
14B3000
trusted library allocation
page execute and read and write
D4D000
trusted library allocation
page execute and read and write
6DEE000
stack
page read and write
B36D000
stack
page read and write
2AE1000
trusted library allocation
page read and write
52F0000
heap
page read and write
5507000
trusted library allocation
page read and write
6663000
trusted library allocation
page read and write
6C60000
trusted library allocation
page execute and read and write
2E19000
trusted library allocation
page read and write
B34000
trusted library allocation
page read and write
5590000
trusted library allocation
page read and write
5540000
heap
page read and write
2E57000
trusted library allocation
page read and write
1208000
heap
page read and write
6750000
trusted library allocation
page execute and read and write
B91E000
stack
page read and write
4D75000
trusted library allocation
page read and write
290A000
trusted library allocation
page read and write
6680000
trusted library allocation
page execute and read and write
14EE000
stack
page read and write
55E0000
heap
page read and write
D56000
trusted library allocation
page execute and read and write
B21E000
stack
page read and write
2990000
heap
page execute and read and write
550C000
trusted library allocation
page read and write
1360000
heap
page read and write
5980000
trusted library allocation
page execute and read and write
40A9000
trusted library allocation
page read and write
87A000
stack
page read and write
5544000
trusted library allocation
page read and write
60A0000
heap
page read and write
AAE000
stack
page read and write
7350000
heap
page read and write
8C6F000
stack
page read and write
6C10000
trusted library allocation
page read and write
1640000
trusted library allocation
page read and write
60D7000
heap
page read and write
5230000
trusted library allocation
page read and write
551E000
trusted library allocation
page read and write
52D0000
trusted library allocation
page read and write
625E000
stack
page read and write
57E0000
trusted library allocation
page execute and read and write
14C0000
trusted library allocation
page read and write
B7A000
heap
page read and write
503E000
trusted library allocation
page read and write
1170000
heap
page read and write
1236000
heap
page read and write
D14000
trusted library allocation
page read and write
1070000
heap
page read and write
2E06000
trusted library allocation
page read and write
2E46000
trusted library allocation
page read and write
52F3000
heap
page read and write
2AA1000
trusted library allocation
page read and write
2E93000
trusted library allocation
page read and write
30A1000
trusted library allocation
page read and write
4E50000
trusted library allocation
page read and write
52D6000
trusted library allocation
page read and write
A70000
heap
page read and write
4D42000
trusted library allocation
page read and write
B70000
heap
page read and write
2ED4000
trusted library allocation
page read and write
14B0000
trusted library allocation
page read and write
2E88000
trusted library allocation
page read and write
2FA6000
trusted library allocation
page read and write
5550000
trusted library allocation
page read and write
2816000
trusted library allocation
page read and write
746E000
stack
page read and write
5570000
trusted library allocation
page read and write
EB7000
heap
page read and write
D60000
heap
page read and write
29A6000
trusted library allocation
page read and write
2A96000
trusted library allocation
page read and write
5034000
trusted library allocation
page read and write
2E9B000
trusted library allocation
page read and write
D3E000
stack
page read and write
3200000
heap
page read and write
689E000
stack
page read and write
AEF000
stack
page read and write
57D0000
heap
page read and write
AFA000
stack
page read and write
55C3000
heap
page read and write
2918000
trusted library allocation
page read and write
5517000
trusted library allocation
page read and write
38E5000
trusted library allocation
page read and write
699E000
stack
page read and write
57F0000
heap
page execute and read and write
6DF0000
trusted library allocation
page execute and read and write
4E02000
trusted library allocation
page read and write
29A2000
trusted library allocation
page read and write
279F000
stack
page read and write
4D80000
trusted library allocation
page read and write
6E00000
trusted library allocation
page read and write
CB0000
heap
page read and write
CAF000
stack
page read and write
B81E000
stack
page read and write
5236000
trusted library allocation
page read and write
940000
heap
page read and write
27E4000
trusted library allocation
page read and write
14B4000
trusted library allocation
page read and write
5530000
trusted library allocation
page read and write
2EFD000
trusted library allocation
page read and write
29B6000
trusted library allocation
page read and write
2FE5000
trusted library allocation
page read and write
2C00000
heap
page execute and read and write
D43000
trusted library allocation
page read and write
2831000
trusted library allocation
page read and write
293F000
trusted library allocation
page read and write
760E000
stack
page read and write
2BEE000
stack
page read and write
2E01000
trusted library allocation
page read and write
B77E000
stack
page read and write
6BFE000
heap
page read and write
5514000
trusted library allocation
page read and write
4D50000
trusted library allocation
page read and write
B40000
heap
page read and write
4F70000
heap
page read and write
5242000
trusted library allocation
page read and write
BCE000
unkown
page read and write
2EA3000
trusted library allocation
page read and write
985000
heap
page read and write
38EF000
trusted library allocation
page read and write
7122000
trusted library allocation
page read and write
587E000
stack
page read and write
4184000
trusted library allocation
page read and write
525D000
trusted library allocation
page read and write
2C10000
heap
page read and write
426F000
trusted library allocation
page read and write
5630000
trusted library allocation
page read and write
29B9000
trusted library allocation
page read and write
2F90000
heap
page read and write
1350000
heap
page read and write
2AB4000
trusted library allocation
page read and write
2B20000
trusted library allocation
page read and write
4E40000
trusted library allocation
page read and write
5274000
trusted library allocation
page read and write
B8BB000
stack
page read and write
2966000
trusted library allocation
page read and write
ACE000
stack
page read and write
282E000
trusted library allocation
page read and write
83D000
stack
page read and write
298C000
stack
page read and write
7610000
trusted library allocation
page read and write
66E0000
heap
page read and write
4D6F000
trusted library allocation
page read and write
B70000
heap
page read and write
E77000
trusted library allocation
page execute and read and write
950000
heap
page read and write
655E000
stack
page read and write
282A000
trusted library allocation
page read and write
8870000
trusted library section
page read and write
D30000
trusted library allocation
page read and write
574B000
stack
page read and write
937000
stack
page read and write
1667000
heap
page read and write
27AD000
stack
page read and write
B0DE000
stack
page read and write
B30000
trusted library allocation
page read and write
5490000
trusted library allocation
page read and write
523E000
trusted library allocation
page read and write
11A5000
heap
page read and write
5560000
trusted library allocation
page read and write
2AED000
trusted library allocation
page read and write
D50000
trusted library allocation
page read and write
6130000
heap
page read and write
14A0000
trusted library allocation
page read and write
2FAB000
trusted library allocation
page read and write
1085000
heap
page read and write
14BD000
trusted library allocation
page execute and read and write
CFE000
stack
page read and write
29F0000
trusted library allocation
page read and write
6B5E000
stack
page read and write
13AE000
stack
page read and write
519B000
stack
page read and write
11FF000
heap
page read and write
5262000
trusted library allocation
page read and write
4E10000
trusted library allocation
page execute and read and write
EB0000
heap
page read and write
5276000
trusted library allocation
page read and write
5527000
trusted library allocation
page read and write
2B0B000
trusted library allocation
page execute and read and write
14AF000
stack
page read and write
5251000
trusted library allocation
page read and write
2B24000
trusted library allocation
page read and write
ABD000
stack
page read and write
5500000
trusted library allocation
page read and write
1634000
trusted library allocation
page read and write
3060000
heap
page read and write
5280000
trusted library allocation
page read and write
6E9E000
stack
page read and write
1150000
heap
page read and write
400000
remote allocation
page execute and read and write
2EAB000
trusted library allocation
page read and write
2DF9000
trusted library allocation
page read and write
2BF0000
trusted library allocation
page execute and read and write
6E50000
trusted library allocation
page read and write
4D3D000
trusted library allocation
page read and write
5360000
trusted library section
page read and write
4D60000
trusted library allocation
page read and write
14CD000
trusted library allocation
page execute and read and write
2E1B000
trusted library allocation
page execute and read and write
4D36000
trusted library allocation
page read and write
14D0000
heap
page read and write
2F5C000
stack
page read and write
B32E000
stack
page read and write
756E000
stack
page read and write
2F88000
trusted library allocation
page read and write
5600000
trusted library allocation
page execute and read and write
4D1B000
trusted library allocation
page read and write
2810000
trusted library allocation
page read and write
5010000
heap
page execute and read and write
6BB0000
trusted library allocation
page read and write
E72000
trusted library allocation
page read and write
1652000
trusted library allocation
page read and write
3861000
trusted library allocation
page read and write
4318000
trusted library allocation
page read and write
2B00000
trusted library allocation
page read and write
5AB0000
heap
page read and write
6BA0000
trusted library allocation
page read and write
59A6000
trusted library allocation
page read and write
2F93000
trusted library allocation
page read and write
D36000
trusted library allocation
page execute and read and write
2F60000
heap
page execute and read and write
1190000
heap
page read and write
424E000
trusted library allocation
page read and write
5010000
trusted library allocation
page read and write
524E000
trusted library allocation
page read and write
291B000
trusted library allocation
page read and write
D40000
trusted library allocation
page read and write
6B80000
trusted library allocation
page execute and read and write
4D2E000
trusted library allocation
page read and write
2F9D000
trusted library allocation
page read and write
528F000
stack
page read and write
839000
stack
page read and write
10F7000
stack
page read and write
70A0000
heap
page read and write
6EB0000
trusted library allocation
page execute and read and write
3889000
trusted library allocation
page read and write
2924000
trusted library allocation
page read and write
DB0000
trusted library allocation
page execute and read and write
2D4F000
stack
page read and write
73A5000
heap
page read and write
B87E000
stack
page read and write
66DE000
stack
page read and write
281E000
trusted library allocation
page read and write
6A5E000
stack
page read and write
2E53000
trusted library allocation
page read and write
B37E000
stack
page read and write
2FD9000
trusted library allocation
page read and write
2F0F000
trusted library allocation
page read and write
4F15000
heap
page read and write
B80000
heap
page read and write
4DB0000
heap
page read and write
59A0000
trusted library allocation
page read and write
59AB000
trusted library allocation
page read and write
BBDE000
stack
page read and write
6BD0000
heap
page read and write
4D70000
trusted library allocation
page read and write
1620000
trusted library allocation
page read and write
503A000
trusted library allocation
page read and write
1200000
heap
page read and write
55C0000
heap
page read and write
4D40000
trusted library allocation
page read and write
B11D000
stack
page read and write
1080000
heap
page read and write
E7B000
trusted library allocation
page execute and read and write
2DFE000
trusted library allocation
page read and write
27F0000
heap
page read and write
D5A000
trusted library allocation
page execute and read and write
599E000
trusted library allocation
page read and write
2AF0000
trusted library allocation
page read and write
E0F000
stack
page read and write
6E10000
trusted library allocation
page read and write
30B7000
trusted library allocation
page read and write
4F5B000
stack
page read and write
D13000
trusted library allocation
page execute and read and write
281B000
trusted library allocation
page read and write
299E000
trusted library allocation
page read and write
66A0000
trusted library allocation
page read and write
2800000
heap
page execute and read and write
5030000
trusted library allocation
page read and write
10B0000
heap
page read and write
283D000
trusted library allocation
page read and write
4F10000
heap
page read and write
5565000
trusted library allocation
page read and write
2954000
trusted library allocation
page read and write
6700000
trusted library allocation
page read and write
2AF3000
trusted library allocation
page read and write
5540000
trusted library allocation
page read and write
12F2000
heap
page read and write
2FCF000
stack
page read and write
5930000
heap
page read and write
609F000
stack
page read and write
38FB000
trusted library allocation
page read and write
2AE7000
trusted library allocation
page read and write
B95E000
stack
page read and write
5640000
trusted library allocation
page read and write
117A000
heap
page read and write
5660000
heap
page read and write
4DF0000
heap
page read and write
52AE000
stack
page read and write
3DE0000
trusted library allocation
page read and write
F37000
stack
page read and write
2836000
trusted library allocation
page read and write
D42000
trusted library allocation
page read and write
163D000
trusted library allocation
page execute and read and write
5480000
heap
page execute and read and write
2EC6000
trusted library allocation
page read and write
75C0000
trusted library allocation
page read and write
BA9B000
stack
page read and write
2A10000
trusted library allocation
page read and write
1650000
trusted library allocation
page read and write
7588000
trusted library allocation
page read and write
B7DE000
stack
page read and write
3DBB000
trusted library allocation
page read and write
15EE000
stack
page read and write
DC0000
heap
page read and write
7582000
trusted library allocation
page read and write
2B05000
trusted library allocation
page execute and read and write
B33000
trusted library allocation
page execute and read and write
7810000
trusted library allocation
page execute and read and write
306B000
heap
page read and write
There are 573 hidden memdumps, click here to show them.