IOC Report
DeskTimeSetup.exe

loading gif

Files

File Path
Type
Category
Malicious
DeskTimeSetup.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
C:\Users\user\AppData\Local\DeskTime\DeskTime.exe (copy)
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\DeskTime\CrashReporter.NET.dll (copy)
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\DeskTime\es\CrashReporter.NET.resources.dll (copy)
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\DeskTime\es\DeskTime.resources.dll (copy)
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\DeskTime\es\is-5PQBT.tmp
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\DeskTime\es\is-PKMHG.tmp
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\DeskTime\is-COTMF.tmp
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\DeskTime\is-NHIFB.tmp
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\DeskTime\is-PVMFV.tmp
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\DeskTime\lv\DeskTime.resources.dll (copy)
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\DeskTime\lv\is-9GV88.tmp
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\DeskTime\unins000.dat
InnoSetup Log DeskTime, version 0x418, 53694 bytes, 609290\37\user\37, C:\Users\user\AppData\Local\DeskTime\376
dropped
C:\Users\user\AppData\Local\DeskTime\unins000.exe (copy)
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\DeskTime\unins000.msg
InnoSetup messages, version 6.0.0, 261 messages (UTF-16), Cancel installation
dropped
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\DeskTime.exe.log
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\is-1DNPB.tmp\_isetup\_setup64.tmp
PE32+ executable (console) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\is-1DNPB.tmp\idp.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\is-1DNPB.tmp\isxdl.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\is-T4572.tmp\DeskTimeSetup.tmp
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\DeskTime\DeskTime.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Archive, ctime=Wed Jan 15 16:28:03 2025, mtime=Wed Jan 15 16:28:04 2025, atime=Thu Dec 19 14:59:10 2024, length=2364664, window=hide
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\DeskTime\Uninstall DeskTime.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Archive, ctime=Wed Jan 15 16:28:03 2025, mtime=Wed Jan 15 16:28:03 2025, atime=Wed Jan 15 16:27:53 2025, length=3231992, window=hide
dropped
There are 12 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\AppData\Local\DeskTime\DeskTime.exe
"C:\Users\user\AppData\Local\DeskTime\DeskTime.exe"
malicious
C:\Users\user\AppData\Local\DeskTime\DeskTime.exe
"C:\Users\user\AppData\Local\DeskTime\DeskTime.exe"
malicious
C:\Users\user\AppData\Local\DeskTime\DeskTime.exe
"C:\Users\user\AppData\Local\DeskTime\DeskTime.exe"
malicious
C:\Users\user\Desktop\DeskTimeSetup.exe
"C:\Users\user\Desktop\DeskTimeSetup.exe"
C:\Users\user\AppData\Local\Temp\is-T4572.tmp\DeskTimeSetup.tmp
"C:\Users\user\AppData\Local\Temp\is-T4572.tmp\DeskTimeSetup.tmp" /SL5="$10462,1981594,885248,C:\Users\user\Desktop\DeskTimeSetup.exe"

URLs

Name
IP
Malicious
https://jrsoftware.org/ishelp/index.php?topic=setupcmdlineSetupU
unknown
https://in.desktime.com/api/v3/json/ping
139.59.93.85
https://desktime.com/updates/win/version/?json=true&current=1.3.668(
unknown
https://www.drdump.com/servicesTU
unknown
https://desktime.com/updates/win/update/
unknown
http://schemas.datacontract.org/2004/07/
unknown
https://www.drdump.com/services
unknown
http://twitter.com
unknown
http://schemas.datacontract.org/2004/07/DeskTime
unknown
https://local.desktime.com
unknown
http://google.com
unknown
https://desktime.com/updates/win/version/?json=true&current=1.3.668WS
unknown
https://www.telerik.com/blogs/winforms-scaling-at-large-dpi-settings-is-it-even-possible
unknown
https://www.drdump.com/services/IdolSoftware.DoctorDump.CrashReporterGate.CrashReporterReportUploade
unknown
https://www.drdump.com/servicesT
unknown
https://drdump.com/Service/CrashReporterReportUploader.svcQCrashReporterDotNET.Properties.Resources
unknown
http://desktime.com
unknown
https://in.desktime.com
unknown
https://www.drdump.com/servicesX
unknown
https://us.desktime.com
unknown
https://www.remobjects.com/ps
unknown
https://desktime.com/updates/win/version/?json=true&current=1.3.668
104.22.9.120
http://desktime.comd
unknown
https://www.innosetup.com/
unknown
https://desktime.com/updates/win/version/?json=true&current=1.3.668y
unknown
http://www.istool.org/
unknown
https://desktime.com/https://in.desktime.com
unknown
http://linkedin.com
unknown
http://bitbucket.org/mitrich_k/inno-download-plugin
unknown
https://desktime.com/api/v3/json/ping
104.22.9.120
https://us.desktime.com/api/v3/json/ping
68.183.17.53
https://desktime.comD
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
http://mitrichsoftware.wordpress.comB
unknown
https://desktime.com
unknown
http://drdump.com/Service/CrashReporterReportUploader.svcY
unknown
http://drdump.com/Service/CrashReporterReportUploader.svc
unknown
There are 27 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
us.desktime.com
68.183.17.53
in.desktime.com
139.59.93.85
desktime.com
104.22.9.120

IPs

IP
Domain
Country
Malicious
104.22.9.120
desktime.com
United States
68.183.17.53
us.desktime.com
United States
139.59.93.85
in.desktime.com
Singapore

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
Owner
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
SessionHash
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
Sequence
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
RegFiles0000
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
RegFilesHash
HKEY_CURRENT_USER\SOFTWARE\DeskTime, SIA\DeskTime\1.3
silent
HKEY_CURRENT_USER\SOFTWARE\DeskTime, SIA\DeskTime\1.3
msi
HKEY_CURRENT_USER\SOFTWARE\DeskTime, SIA\DeskTime\1.3
authProvider
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
DeskTime
HKEY_CURRENT_USER_Classes\desktime
NULL
HKEY_CURRENT_USER_Classes\desktime
URL Protocol
HKEY_CURRENT_USER_Classes\desktime\DefaultIcon
NULL
HKEY_CURRENT_USER_Classes\desktime\shell\open\command
NULL
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\DeskTime_is1
Inno Setup: Setup Version
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\DeskTime_is1
Inno Setup: App Path
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\DeskTime_is1
InstallLocation
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\DeskTime_is1
Inno Setup: Icon Group
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\DeskTime_is1
Inno Setup: User
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\DeskTime_is1
Inno Setup: Selected Tasks
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\DeskTime_is1
Inno Setup: Deselected Tasks
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\DeskTime_is1
Inno Setup: Language
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\DeskTime_is1
DisplayName
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\DeskTime_is1
DisplayIcon
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\DeskTime_is1
UninstallString
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\DeskTime_is1
QuietUninstallString
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\DeskTime_is1
DisplayVersion
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\DeskTime_is1
Publisher
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\DeskTime_is1
NoModify
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\DeskTime_is1
NoRepair
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\DeskTime_is1
InstallDate
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\DeskTime_is1
MajorVersion
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\DeskTime_is1
MinorVersion
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\DeskTime_is1
VersionMajor
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\DeskTime_is1
VersionMinor
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\DeskTime_is1
EstimatedSize
HKEY_CURRENT_USER\SOFTWARE\DeskTime, SIA\DeskTime\1.3
lastRun
HKEY_CURRENT_USER\SOFTWARE\DeskTime, SIA\DeskTime\1.3
version
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\DeskTime_RASAPI32
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\DeskTime_RASAPI32
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\DeskTime_RASAPI32
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\DeskTime_RASAPI32
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\DeskTime_RASAPI32
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\DeskTime_RASAPI32
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\DeskTime_RASAPI32
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\DeskTime_RASMANCS
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\DeskTime_RASMANCS
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\DeskTime_RASMANCS
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\DeskTime_RASMANCS
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\DeskTime_RASMANCS
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\DeskTime_RASMANCS
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\DeskTime_RASMANCS
FileDirectory
There are 42 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
57D2000
trusted library allocation
page read and write
22DB000
direct allocation
page read and write
227C000
direct allocation
page read and write
6200000
trusted library allocation
page execute and read and write
A3B000
heap
page read and write
1615000
heap
page read and write
7FB30000
direct allocation
page read and write
A35000
heap
page read and write
2387000
direct allocation
page read and write
23FF000
direct allocation
page read and write
5C0E000
stack
page read and write
9ABE000
stack
page read and write
5CFE000
stack
page read and write
6251000
heap
page read and write
4AED000
stack
page read and write
A2C2000
heap
page read and write
22C4000
direct allocation
page read and write
A270000
heap
page read and write
5901000
trusted library allocation
page read and write
30CC000
trusted library allocation
page read and write
57E8000
trusted library allocation
page read and write
2B3B000
trusted library allocation
page read and write
A0D000
heap
page read and write
236A000
direct allocation
page read and write
7930000
trusted library section
page read and write
3B1F000
stack
page read and write
29E7000
trusted library allocation
page read and write
29D7000
trusted library allocation
page read and write
5D4E000
stack
page read and write
E20000
heap
page read and write
4C2000
unkown
page write copy
2354000
direct allocation
page read and write
A48000
heap
page read and write
15B4000
heap
page read and write
6210000
trusted library allocation
page read and write
34A0000
heap
page read and write
570000
heap
page read and write
2371000
direct allocation
page read and write
58E0000
trusted library allocation
page read and write
2951000
trusted library allocation
page read and write
18A4000
trusted library allocation
page read and write
5912000
trusted library allocation
page read and write
29EB000
trusted library allocation
page read and write
29D3000
trusted library allocation
page read and write
16AF000
heap
page read and write
2458000
direct allocation
page read and write
E10000
trusted library allocation
page read and write
4F4D000
stack
page read and write
34A0000
direct allocation
page read and write
2424000
direct allocation
page read and write
A2B9000
heap
page read and write
4958000
trusted library allocation
page read and write
2820000
trusted library allocation
page read and write
36A0000
heap
page read and write
2B1E000
trusted library allocation
page read and write
7537000
direct allocation
page read and write
15F0000
trusted library allocation
page read and write
248A000
direct allocation
page read and write
1840000
trusted library allocation
page read and write
29CC000
trusted library allocation
page read and write
A04000
heap
page read and write
595E000
stack
page read and write
2BED000
trusted library allocation
page read and write
2A14000
trusted library allocation
page read and write
A2D4000
heap
page read and write
32AE000
stack
page read and write
401000
unkown
page execute read
52B0000
trusted library allocation
page read and write
23FC000
direct allocation
page read and write
5805000
trusted library allocation
page read and write
7E8E000
stack
page read and write
754D000
direct allocation
page read and write
1435000
heap
page read and write
6023000
heap
page read and write
239C000
direct allocation
page read and write
7620000
direct allocation
page read and write
730000
heap
page read and write
23DB000
direct allocation
page read and write
165A000
heap
page read and write
F6D000
stack
page read and write
4E74000
trusted library allocation
page read and write
A42000
heap
page read and write
2A1C000
trusted library allocation
page read and write
36D5000
heap
page read and write
2EA3000
trusted library allocation
page read and write
7566000
direct allocation
page read and write
A36000
heap
page read and write
2B0D000
trusted library allocation
page read and write
33F0000
heap
page read and write
5906000
trusted library allocation
page read and write
36D0000
heap
page read and write
5970000
trusted library allocation
page read and write
39DF000
stack
page read and write
58E4000
trusted library allocation
page read and write
178F000
stack
page read and write
22AE000
direct allocation
page read and write
34E0000
heap
page read and write
2A20000
trusted library allocation
page read and write
11B8000
stack
page read and write
37E1000
heap
page read and write
5B5E000
stack
page read and write
716000
stack
page read and write
6225000
heap
page read and write
39D8000
trusted library allocation
page read and write
A490000
trusted library allocation
page read and write
17F0000
trusted library allocation
page read and write
5F60000
trusted library allocation
page execute and read and write
3270000
trusted library allocation
page read and write
3761000
heap
page read and write
5802000
trusted library allocation
page read and write
1860000
trusted library allocation
page execute and read and write
A5DE000
stack
page read and write
1430000
heap
page read and write
BD5000
heap
page read and write
1610000
trusted library allocation
page read and write
7DD000
stack
page read and write
1102000
trusted library allocation
page read and write
3761000
heap
page read and write
CDF000
heap
page read and write
34D8000
direct allocation
page read and write
52E0000
trusted library allocation
page read and write
164F000
heap
page read and write
1790000
heap
page read and write
5E50000
heap
page execute and read and write
E1D000
trusted library allocation
page execute and read and write
5C9E000
stack
page read and write
94BE000
stack
page read and write
5B1E000
stack
page read and write
7AB0000
trusted library allocation
page execute and read and write
2680000
heap
page read and write
4ECE000
stack
page read and write
2466000
direct allocation
page read and write
532C000
stack
page read and write
A44000
heap
page read and write
A480000
trusted library allocation
page read and write
B7DD000
stack
page read and write
7CCE000
stack
page read and write
9160000
trusted library allocation
page read and write
5C4E000
stack
page read and write
A2D7000
heap
page read and write
18E000
stack
page read and write
A70E000
stack
page read and write
586E000
stack
page read and write
58F8000
trusted library allocation
page read and write
6D9000
unkown
page write copy
303E000
stack
page read and write
5FE0000
heap
page read and write
5540000
trusted library allocation
page read and write
3490000
direct allocation
page read and write
987D000
stack
page read and write
2A24000
trusted library allocation
page read and write
590D000
trusted library allocation
page read and write
A29C000
heap
page read and write
4404000
trusted library allocation
page read and write
1630000
heap
page read and write
7C8E000
stack
page read and write
7330000
heap
page read and write
2D65000
trusted library allocation
page read and write
1603000
trusted library allocation
page execute and read and write
6220000
heap
page read and write
1830000
trusted library allocation
page execute and read and write
1604000
trusted library allocation
page read and write
C4A000
heap
page read and write
5ACF000
stack
page read and write
E6D000
stack
page read and write
529E000
stack
page read and write
3761000
heap
page read and write
A13E000
stack
page read and write
E04000
trusted library allocation
page read and write
A84C000
stack
page read and write
2EEB000
trusted library allocation
page read and write
2B58000
trusted library allocation
page read and write
1668000
heap
page read and write
625F000
heap
page read and write
2B21000
trusted library allocation
page read and write
A38000
heap
page read and write
C38000
heap
page read and write
57F6000
trusted library allocation
page read and write
2B11000
trusted library allocation
page read and write
58AA000
unkown
page readonly
FF4A0000
trusted library allocation
page execute and read and write
2B42000
trusted library allocation
page read and write
B8E0000
trusted library allocation
page execute and read and write
A960000
trusted library allocation
page read and write
4F93000
heap
page read and write
6C9000
unkown
page read and write
95FE000
stack
page read and write
A240000
heap
page read and write
B920000
trusted library allocation
page read and write
155E000
stack
page read and write
755C000
direct allocation
page read and write
2F10000
trusted library allocation
page read and write
53CD000
stack
page read and write
10BB000
stack
page read and write
7A00000
trusted library allocation
page read and write
847000
heap
page read and write
2B54000
trusted library allocation
page read and write
A22000
heap
page read and write
C3A0000
trusted library allocation
page execute and read and write
39D2000
trusted library allocation
page read and write
5F85000
heap
page read and write
A474000
trusted library allocation
page read and write
A11000
heap
page read and write
1565000
heap
page read and write
2474000
direct allocation
page read and write
1820000
trusted library allocation
page read and write
9B20000
heap
page read and write
A36000
heap
page read and write
242B000
direct allocation
page read and write
226E000
direct allocation
page read and write
733E000
heap
page read and write
6C7000
unkown
page read and write
23E2000
direct allocation
page read and write
23AB000
direct allocation
page read and write
322D000
stack
page read and write
7541000
direct allocation
page read and write
6230000
heap
page read and write
1699000
heap
page read and write
A54000
heap
page read and write
1850000
heap
page read and write
17D4000
trusted library allocation
page read and write
18B0000
trusted library allocation
page read and write
BD0000
heap
page read and write
5F81000
heap
page read and write
A08000
heap
page read and write
243A000
direct allocation
page read and write
5F70000
heap
page read and write
79D0000
trusted library allocation
page read and write
B20000
direct allocation
page execute and read and write
5F7D000
heap
page read and write
4C4000
unkown
page readonly
9B000
stack
page read and write
A22000
heap
page read and write
5900000
trusted library allocation
page read and write
230A000
direct allocation
page read and write
4F90000
heap
page read and write
98F000
stack
page read and write
58F7000
trusted library allocation
page read and write
7A10000
trusted library allocation
page read and write
780000
heap
page read and write
2840000
heap
page read and write
1420000
heap
page read and write
400000
unkown
page readonly
5F3B000
stack
page read and write
440000
unkown
page readonly
2B52000
trusted library allocation
page read and write
240D000
direct allocation
page read and write
58F1000
trusted library allocation
page read and write
9150000
trusted library allocation
page execute and read and write
A26B000
heap
page read and write
5909000
trusted library allocation
page read and write
5820000
trusted library allocation
page read and write
54D0000
heap
page read and write
2406000
direct allocation
page read and write
17D3000
trusted library allocation
page execute and read and write
B1E000
stack
page read and write
2346000
direct allocation
page read and write
2730000
trusted library allocation
page read and write
2E6D000
trusted library allocation
page read and write
2338000
direct allocation
page read and write
5B0E000
stack
page read and write
18C0000
heap
page read and write
7552000
trusted library allocation
page read and write
2328000
direct allocation
page read and write
2C7B000
trusted library allocation
page read and write
294E000
stack
page read and write
2363000
direct allocation
page read and write
537E000
stack
page read and write
4C6000
unkown
page readonly
97F000
stack
page read and write
5D8E000
stack
page read and write
E00000
trusted library allocation
page read and write
3761000
heap
page read and write
A94C000
stack
page read and write
3038000
trusted library allocation
page read and write
A482000
trusted library allocation
page read and write
7440000
trusted library allocation
page read and write
559D000
stack
page read and write
7ED0000
heap
page read and write
5810000
trusted library allocation
page read and write
5DA0000
heap
page execute and read and write
1820000
trusted library allocation
page read and write
180B000
trusted library allocation
page execute and read and write
6264000
heap
page read and write
1606000
heap
page read and write
57FD000
trusted library allocation
page read and write
2498000
direct allocation
page read and write
22BD000
direct allocation
page read and write
4B7000
unkown
page read and write
5EAE000
stack
page read and write
96FE000
stack
page read and write
4294000
trusted library allocation
page read and write
7430000
trusted library allocation
page execute and read and write
A26000
heap
page read and write
23F0000
direct allocation
page read and write
983C000
stack
page read and write
E03000
trusted library allocation
page execute and read and write
2395000
direct allocation
page read and write
75A6000
direct allocation
page read and write
22F1000
direct allocation
page read and write
2414000
direct allocation
page read and write
2A10000
trusted library allocation
page read and write
1106000
trusted library allocation
page execute and read and write
75B2000
direct allocation
page read and write
9B0000
heap
page read and write
845000
heap
page read and write
5DFC000
stack
page read and write
61F0000
heap
page read and write
5BFC000
stack
page read and write
BA0000
heap
page read and write
110A000
trusted library allocation
page execute and read and write
22D2000
direct allocation
page read and write
2FD6000
trusted library allocation
page read and write
53D0000
heap
page execute and read and write
9E8000
heap
page read and write
1654000
heap
page read and write
22E9000
direct allocation
page read and write
A23E000
stack
page read and write
87E000
stack
page read and write
2230000
heap
page read and write
2255000
direct allocation
page read and write
29CA000
trusted library allocation
page read and write
C08000
heap
page read and write
99BE000
stack
page read and write
790000
heap
page read and write
1510000
heap
page read and write
23B2000
direct allocation
page read and write
9B10000
heap
page read and write
5490000
trusted library allocation
page read and write
15A5000
heap
page read and write
3291000
trusted library allocation
page read and write
54E0000
trusted library allocation
page read and write
22F8000
direct allocation
page read and write
273B000
trusted library allocation
page execute and read and write
810000
heap
page read and write
5872000
unkown
page readonly
367E000
stack
page read and write
A65000
heap
page read and write
9B03000
heap
page read and write
4E30000
trusted library allocation
page read and write
88E000
stack
page read and write
2C90000
trusted library allocation
page read and write
3761000
heap
page read and write
1110000
heap
page read and write
1800000
trusted library allocation
page read and write
5F50000
heap
page read and write
5520000
heap
page read and write
4E70000
trusted library allocation
page read and write
A3E000
heap
page read and write
4291000
trusted library allocation
page read and write
2B19000
trusted library allocation
page read and write
36E0000
heap
page read and write
29D5000
trusted library allocation
page read and write
57F1000
trusted library allocation
page read and write
625D000
heap
page read and write
23A3000
direct allocation
page read and write
5C5E000
stack
page read and write
5915000
trusted library allocation
page read and write
29DA000
trusted library allocation
page read and write
22A0000
direct allocation
page read and write
65EE000
stack
page read and write
2B3D000
trusted library allocation
page read and write
18A0000
trusted library allocation
page read and write
2B3F000
trusted library allocation
page read and write
27A0000
heap
page read and write
4E51000
trusted library allocation
page read and write
6C7000
unkown
page write copy
1590000
heap
page read and write
17E0000
trusted library allocation
page read and write
57CF000
stack
page read and write
3490000
direct allocation
page read and write
4E80000
trusted library allocation
page read and write
2483000
direct allocation
page read and write
33AE000
stack
page read and write
58EF000
trusted library allocation
page read and write
37A0000
heap
page read and write
1614000
trusted library allocation
page read and write
7530000
direct allocation
page read and write
2A08000
trusted library allocation
page read and write
2275000
direct allocation
page read and write
2A29000
trusted library allocation
page read and write
A3B000
heap
page read and write
B70000
heap
page read and write
9B3000
heap
page read and write
1870000
trusted library allocation
page read and write
326E000
stack
page read and write
279E000
stack
page read and write
15B0000
heap
page read and write
23E9000
direct allocation
page read and write
22CB000
direct allocation
page read and write
4E4E000
trusted library allocation
page read and write
233F000
direct allocation
page read and write
7ECD000
stack
page read and write
2B50000
trusted library allocation
page read and write
52A0000
trusted library allocation
page read and write
401000
unkown
page execute read
2B34000
trusted library allocation
page read and write
3401000
trusted library allocation
page read and write
52E3000
trusted library allocation
page read and write
58EE000
stack
page read and write
7352000
heap
page read and write
519C000
stack
page read and write
606E000
heap
page read and write
58E2000
trusted library allocation
page read and write
58FE000
trusted library allocation
page read and write
2EA5000
trusted library allocation
page read and write
A4DE000
stack
page read and write
58E6000
trusted library allocation
page read and write
4F0000
heap
page read and write
BB5000
heap
page read and write
A4B000
heap
page read and write
2432000
direct allocation
page read and write
6E0000
unkown
page readonly
3A1E000
stack
page read and write
2BBD000
trusted library allocation
page read and write
5FE8000
heap
page read and write
3280000
heap
page execute and read and write
228A000
direct allocation
page read and write
C0E000
heap
page read and write
247C000
direct allocation
page read and write
758C000
direct allocation
page read and write
75D8000
direct allocation
page read and write
93000
stack
page read and write
161D000
heap
page read and write
9D0000
heap
page read and write
5F91000
heap
page read and write
5340000
heap
page read and write
1890000
heap
page read and write
4B9000
unkown
page read and write
759C000
direct allocation
page read and write
CA2000
heap
page read and write
4F8E000
stack
page read and write
57DF000
trusted library allocation
page read and write
27C0000
trusted library allocation
page execute and read and write
95BE000
stack
page read and write
B910000
trusted library allocation
page execute and read and write
7520000
direct allocation
page read and write
58EB000
trusted library allocation
page read and write
BB0000
heap
page read and write
238E000
direct allocation
page read and write
A74000
heap
page read and write
34A0000
direct allocation
page read and write
5F89000
heap
page read and write
2A2D000
trusted library allocation
page read and write
3030000
trusted library allocation
page read and write
5A1E000
stack
page read and write
57F9000
trusted library allocation
page read and write
19CE000
stack
page read and write
7B4E000
stack
page read and write
2292000
direct allocation
page read and write
560000
heap
page read and write
4401000
trusted library allocation
page read and write
57EE000
trusted library allocation
page read and write
30E0000
heap
page read and write
538D000
stack
page read and write
2B29000
trusted library allocation
page read and write
A33000
heap
page read and write
5FB7000
heap
page read and write
A446000
trusted library allocation
page read and write
5F79000
heap
page read and write
169B000
heap
page read and write
269E000
stack
page read and write
3763000
heap
page read and write
2F76000
trusted library allocation
page read and write
1850000
heap
page execute and read and write
2B2C000
trusted library allocation
page read and write
23B9000
direct allocation
page read and write
A42000
heap
page read and write
33ED000
stack
page read and write
E27000
heap
page read and write
11AB000
stack
page read and write
C9D000
heap
page read and write
E0D000
trusted library allocation
page execute and read and write
578000
heap
page read and write
A42000
heap
page read and write
19D000
stack
page read and write
1ACE000
stack
page read and write
5980000
heap
page read and write
5961000
trusted library allocation
page read and write
2491000
direct allocation
page read and write
A15000
heap
page read and write
A3E000
heap
page read and write
7E4D000
stack
page read and write
57D6000
trusted library allocation
page read and write
947E000
stack
page read and write
4E3B000
trusted library allocation
page read and write
54F2000
trusted library allocation
page read and write
6F4000
unkown
page readonly
1830000
heap
page read and write
14F9000
stack
page read and write
31EF000
stack
page read and write
2732000
trusted library allocation
page read and write
2B26000
trusted library allocation
page read and write
22B6000
direct allocation
page read and write
2CF3000
trusted library allocation
page read and write
7FE16000
direct allocation
page read and write
A34000
heap
page read and write
2F40000
trusted library allocation
page read and write
C94000
heap
page read and write
A3B000
heap
page read and write
A2CC000
heap
page read and write
756B000
direct allocation
page read and write
923F000
stack
page read and write
2DEB000
trusted library allocation
page read and write
4E56000
trusted library allocation
page read and write
A67000
heap
page read and write
7A90000
trusted library allocation
page execute and read and write
29A9000
trusted library allocation
page read and write
34C0000
direct allocation
page read and write
2735000
trusted library allocation
page execute and read and write
57DB000
trusted library allocation
page read and write
25C0000
direct allocation
page read and write
54B0000
trusted library allocation
page execute and read and write
A41000
heap
page read and write
A41000
heap
page read and write
A80D000
stack
page read and write
2750000
trusted library allocation
page read and write
9FB000
heap
page read and write
765A000
direct allocation
page read and write
6065000
heap
page read and write
5967000
trusted library allocation
page read and write
37A1000
heap
page read and write
234D000
direct allocation
page read and write
B8F0000
trusted library allocation
page read and write
A3D000
heap
page read and write
2321000
direct allocation
page read and write
6D1000
unkown
page read and write
666000
unkown
page readonly
5F40000
trusted library section
page readonly
7527000
direct allocation
page read and write
2A18000
trusted library allocation
page read and write
1118000
heap
page read and write
2283000
direct allocation
page read and write
180B000
trusted library allocation
page execute and read and write
2830000
trusted library allocation
page read and write
5816000
trusted library allocation
page read and write
2A0C000
trusted library allocation
page read and write
C00000
heap
page read and write
2312000
direct allocation
page read and write
997C000
stack
page read and write
BB9000
heap
page read and write
2B4C000
trusted library allocation
page read and write
757C000
direct allocation
page read and write
2360000
direct allocation
page read and write
A13000
heap
page read and write
1598000
heap
page read and write
A31000
heap
page read and write
AEA0000
trusted library allocation
page read and write
1100000
trusted library allocation
page read and write
6DE000
unkown
page readonly
83F000
stack
page read and write
2B14000
trusted library allocation
page read and write
15BB000
heap
page read and write
7AA0000
trusted library allocation
page read and write
400000
unkown
page readonly
A489000
trusted library allocation
page read and write
5870000
unkown
page readonly
74EF000
direct allocation
page read and write
540000
heap
page read and write
1560000
heap
page read and write
9E0000
heap
page read and write
28AA000
direct allocation
page read and write
154E000
stack
page read and write
281C000
stack
page read and write
509F000
stack
page read and write
15AE000
stack
page read and write
57E4000
trusted library allocation
page read and write
616E000
stack
page read and write
37A3000
heap
page read and write
91FE000
stack
page read and write
5910000
heap
page read and write
6240000
heap
page read and write
9140000
heap
page execute and read and write
17E4000
trusted library allocation
page read and write
AF7000
stack
page read and write
DFD000
stack
page read and write
BF0000
trusted library allocation
page read and write
3951000
trusted library allocation
page read and write
1638000
heap
page read and write
29E3000
trusted library allocation
page read and write
4E5D000
trusted library allocation
page read and write
2B16000
trusted library allocation
page read and write
53D3000
heap
page execute and read and write
6CE000
unkown
page read and write
442000
unkown
page readonly
B6DE000
stack
page read and write
2378000
direct allocation
page read and write
17C0000
trusted library allocation
page read and write
22E2000
direct allocation
page read and write
840000
heap
page read and write
A28000
heap
page read and write
7C4F000
stack
page read and write
34CC000
direct allocation
page read and write
1550000
heap
page read and write
A485000
trusted library allocation
page read and write
A1E000
heap
page read and write
2299000
direct allocation
page read and write
235C000
direct allocation
page read and write
57D4000
trusted library allocation
page read and write
54F0000
trusted library allocation
page read and write
2737000
trusted library allocation
page execute and read and write
58F4000
trusted library allocation
page read and write
79E0000
trusted library allocation
page read and write
1560000
heap
page read and write
6068000
heap
page read and write
CD7000
heap
page read and write
7D0D000
stack
page read and write
A50000
heap
page read and write
6D6000
unkown
page read and write
16BC000
heap
page read and write
53E000
stack
page read and write
7E0B000
stack
page read and write
18A6000
trusted library allocation
page read and write
25C0000
direct allocation
page read and write
4C0000
unkown
page read and write
4B7000
unkown
page write copy
2B49000
trusted library allocation
page read and write
37E0000
heap
page read and write
973D000
stack
page read and write
1620000
trusted library allocation
page read and write
15C8000
heap
page read and write
27D0000
heap
page execute and read and write
22A7000
direct allocation
page read and write
1880000
trusted library allocation
page read and write
There are 614 hidden memdumps, click here to show them.