IOC Report
DiStem-0.9.10.exe

loading gif

Files

File Path
Type
Category
Malicious
DiStem-0.9.10.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
C:\ProgramData\DiRoots, LDA\DiStem 0.9.10\install\DiStem-0.9.10.aiui
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
C:\ProgramData\DiRoots, LDA\DiStem 0.9.10\install\DiStem-0.9.10.msi
Composite Document File V2 Document, Little Endian, Os: Windows, Version 10.0, MSI Installer, Security: 0, Code page: 1252, Revision Number: {AC3E06E9-7BAF-43C4-8229-DF7E9A839035}, Number of Words: 2, Subject: DiStem, Author: DiRoots, LDA, Name of Creating Application: DiStem, Template: ;1033, Comments: This installer database contains the logic and data required to install DiStem., Title: Installation Database, Keywords: Installer, MSI, Database, Create Time/Date: Mon Apr 1 08:02:22 2024, Last Saved Time/Date: Mon Apr 1 08:02:22 2024, Last Printed: Mon Apr 1 08:02:22 2024, Number of Pages: 450
dropped
C:\ProgramData\DiRoots, LDA\DiStem 0.9.10\install\holder0.aiph
data
dropped
C:\Users\user\AppData\Local\Temp\AI_EXTUI_BIN_7316\DiRoots.CustomActions
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows, InstallShield self-extracting archive
dropped
C:\Users\user\AppData\Local\Temp\AI_EXTUI_BIN_7316\ExternalUICleaner.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\AI_EXTUI_BIN_7316\New
MS Windows icon resource - 3 icons, 48x48, 32 bits/pixel, 32x32, 32 bits/pixel
dropped
C:\Users\user\AppData\Local\Temp\AI_EXTUI_BIN_7316\PluginLogo
PNG image data, 1264 x 1264, 8-bit colormap, non-interlaced
dropped
C:\Users\user\AppData\Local\Temp\AI_EXTUI_BIN_7316\PrepareDlgProgress.gif
GIF image data, version 89a, 83 x 28
dropped
C:\Users\user\AppData\Local\Temp\AI_EXTUI_BIN_7316\ProgressImageDarkOrange.png
PNG image data, 121 x 14, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Temp\AI_EXTUI_BIN_7316\TrialBinaryComponent
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\AI_EXTUI_BIN_7316\Up
MS Windows icon resource - 3 icons, 48x48, 32 bits/pixel, 32x32, 32 bits/pixel
dropped
C:\Users\user\AppData\Local\Temp\AI_EXTUI_BIN_7316\applogoicon.bmp
PC bitmap, Windows 3.x format, 78 x 84 x 24, image size 19824, resolution 2835 x 2835 px/m, cbSize 19878, bits offset 54
dropped
C:\Users\user\AppData\Local\Temp\AI_EXTUI_BIN_7316\applogoicon.svg
SVG Scalable Vector Graphics image
dropped
C:\Users\user\AppData\Local\Temp\AI_EXTUI_BIN_7316\backbutton
PNG image data, 624 x 37, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Temp\AI_EXTUI_BIN_7316\backbutton.xaml
HTML document, ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\AI_EXTUI_BIN_7316\background
PC bitmap, Windows 3.x format, 5 x 5 x 24, image size 80, resolution 3778 x 3778 px/m, cbSize 134, bits offset 54
dropped
C:\Users\user\AppData\Local\Temp\AI_EXTUI_BIN_7316\backgroundDarkGray.bmp
PC bitmap, Windows 3.x format, 5 x 5 x 24, image size 80, resolution 3778 x 3778 px/m, cbSize 134, bits offset 54
dropped
C:\Users\user\AppData\Local\Temp\AI_EXTUI_BIN_7316\backgroundprepare
PC bitmap, Windows 3.x format, 5 x 5 x 24, image size 80, resolution 3778 x 3778 px/m, cbSize 134, bits offset 54
dropped
C:\Users\user\AppData\Local\Temp\AI_EXTUI_BIN_7316\backgroundprepareDarkGray.bmp
PC bitmap, Windows 3.x format, 5 x 5 x 24, image size 80, resolution 3778 x 3778 px/m, cbSize 134, bits offset 54
dropped
C:\Users\user\AppData\Local\Temp\AI_EXTUI_BIN_7316\backgroundsurface
PC bitmap, Windows 3.x format, 5 x 5 x 24, image size 80, resolution 3778 x 3778 px/m, cbSize 134, bits offset 54
dropped
C:\Users\user\AppData\Local\Temp\AI_EXTUI_BIN_7316\backgroundsurfaceDarkGray.bmp
PC bitmap, Windows 3.x format, 5 x 5 x 24, image size 80, resolution 3778 x 3778 px/m, cbSize 134, bits offset 54
dropped
C:\Users\user\AppData\Local\Temp\AI_EXTUI_BIN_7316\browsebutton
PNG image data, 168 x 26, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Temp\AI_EXTUI_BIN_7316\browsebutton.xaml
HTML document, ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\AI_EXTUI_BIN_7316\checkbox
PNG image data, 192 x 16, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Temp\AI_EXTUI_BIN_7316\checkbox_for_ctrls
PNG image data, 192 x 16, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Temp\AI_EXTUI_BIN_7316\checkbox_for_list_ctrls
PNG image data, 32 x 16, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Temp\AI_EXTUI_BIN_7316\cmdlinkarrow
MS Windows icon resource - 3 icons, 16x16, 16 colors, 4 bits/pixel, 16x16, 8 bits/pixel
dropped
C:\Users\user\AppData\Local\Temp\AI_EXTUI_BIN_7316\completi
MS Windows icon resource - 2 icons, 48x48, 8 bits/pixel, 48x48, 32 bits/pixel
dropped
C:\Users\user\AppData\Local\Temp\AI_EXTUI_BIN_7316\custicon
MS Windows icon resource - 5 icons, 48x48, 8 bits/pixel, 32x32, 8 bits/pixel
dropped
C:\Users\user\AppData\Local\Temp\AI_EXTUI_BIN_7316\exclamic
PNG image data, 50 x 69, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Temp\AI_EXTUI_BIN_7316\frame_bottom_left.bmp
PC bitmap, Windows 3.x format, 1 x 3 x 24, resolution 2835 x 2835 px/m, cbSize 66, bits offset 54
dropped
C:\Users\user\AppData\Local\Temp\AI_EXTUI_BIN_7316\frame_bottom_left_inactive.bmp
PC bitmap, Windows 3.x format, 1 x 3 x 24, resolution 2835 x 2835 px/m, cbSize 66, bits offset 54
dropped
C:\Users\user\AppData\Local\Temp\AI_EXTUI_BIN_7316\frame_bottom_mid.bmp
PC bitmap, Windows 3.x format, 3 x 1 x 24, resolution 2835 x 2835 px/m, cbSize 66, bits offset 54
dropped
C:\Users\user\AppData\Local\Temp\AI_EXTUI_BIN_7316\frame_bottom_mid_inactive.bmp
PC bitmap, Windows 3.x format, 3 x 1 x 24, resolution 2835 x 2835 px/m, cbSize 66, bits offset 54
dropped
C:\Users\user\AppData\Local\Temp\AI_EXTUI_BIN_7316\frame_bottom_right.bmp
PC bitmap, Windows 3.x format, 1 x 3 x 24, resolution 2835 x 2835 px/m, cbSize 66, bits offset 54
dropped
C:\Users\user\AppData\Local\Temp\AI_EXTUI_BIN_7316\frame_bottom_right_inactive.bmp
PC bitmap, Windows 3.x format, 1 x 3 x 24, resolution 2835 x 2835 px/m, cbSize 66, bits offset 54
dropped
C:\Users\user\AppData\Local\Temp\AI_EXTUI_BIN_7316\frame_caption_datGray.bmp
PC bitmap, Windows 3.x format, 1 x 38 x 24, image size 152, resolution 3778 x 3778 px/m, cbSize 206, bits offset 54
dropped
C:\Users\user\AppData\Local\Temp\AI_EXTUI_BIN_7316\frame_caption_inactive.bmp
PC bitmap, Windows 3.x format, 1 x 38 x 24, image size 152, resolution 3778 x 3778 px/m, cbSize 206, bits offset 54
dropped
C:\Users\user\AppData\Local\Temp\AI_EXTUI_BIN_7316\frame_left.bmp
PC bitmap, Windows 3.x format, 1 x 3 x 24, image size 12, resolution 3779 x 3779 px/m, cbSize 66, bits offset 54
dropped
C:\Users\user\AppData\Local\Temp\AI_EXTUI_BIN_7316\frame_left_inactive.bmp
PC bitmap, Windows 3.x format, 1 x 3 x 24, image size 12, resolution 3778 x 3778 px/m, cbSize 66, bits offset 54
dropped
C:\Users\user\AppData\Local\Temp\AI_EXTUI_BIN_7316\frame_right.bmp
PC bitmap, Windows 3.x format, 1 x 3 x 24, image size 12, resolution 3779 x 3779 px/m, cbSize 66, bits offset 54
dropped
C:\Users\user\AppData\Local\Temp\AI_EXTUI_BIN_7316\frame_right_inactive.bmp
PC bitmap, Windows 3.x format, 1 x 3 x 24, image size 12, resolution 3778 x 3778 px/m, cbSize 66, bits offset 54
dropped
C:\Users\user\AppData\Local\Temp\AI_EXTUI_BIN_7316\frame_top_left.bmp
PC bitmap, Windows 3.x format, 1 x 25 x 24, image size 100, resolution 3779 x 3779 px/m, cbSize 154, bits offset 54
dropped
C:\Users\user\AppData\Local\Temp\AI_EXTUI_BIN_7316\frame_top_left_inactive.bmp
PC bitmap, Windows 3.x format, 1 x 25 x 24, image size 100, resolution 3779 x 3779 px/m, cbSize 154, bits offset 54
dropped
C:\Users\user\AppData\Local\Temp\AI_EXTUI_BIN_7316\frame_top_mid.bmp
PC bitmap, Windows 3.x format, 3 x 1 x 24, image size 12, resolution 3778 x 3778 px/m, cbSize 66, bits offset 54
dropped
C:\Users\user\AppData\Local\Temp\AI_EXTUI_BIN_7316\frame_top_mid_inactive.bmp
PC bitmap, Windows 3.x format, 3 x 1 x 24, image size 12, resolution 3778 x 3778 px/m, cbSize 66, bits offset 54
dropped
C:\Users\user\AppData\Local\Temp\AI_EXTUI_BIN_7316\frame_top_right.bmp
PC bitmap, Windows 3.x format, 1 x 25 x 24, image size 100, resolution 3779 x 3779 px/m, cbSize 154, bits offset 54
dropped
C:\Users\user\AppData\Local\Temp\AI_EXTUI_BIN_7316\frame_top_right_inactive.bmp
PC bitmap, Windows 3.x format, 1 x 25 x 24, image size 100, resolution 3779 x 3779 px/m, cbSize 154, bits offset 54
dropped
C:\Users\user\AppData\Local\Temp\AI_EXTUI_BIN_7316\info
PNG image data, 50 x 69, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Temp\AI_EXTUI_BIN_7316\installlogoicon
MS Windows icon resource - 5 icons, 48x48, 16 colors, 4 bits/pixel, 48x48, 8 bits/pixel
dropped
C:\Users\user\AppData\Local\Temp\AI_EXTUI_BIN_7316\insticon
MS Windows icon resource - 3 icons, 48x48, 16 colors, 4 bits/pixel, 48x48, 8 bits/pixel
dropped
C:\Users\user\AppData\Local\Temp\AI_EXTUI_BIN_7316\lzmaextractor.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\AI_EXTUI_BIN_7316\metrobuttonimage
PNG image data, 624 x 37, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Temp\AI_EXTUI_BIN_7316\metrobuttonimage.xaml
HTML document, ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\AI_EXTUI_BIN_7316\metroinstallbutton.xaml
HTML document, ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\AI_EXTUI_BIN_7316\metroinstallbuttonDarkOrange.png
PNG image data, 1020 x 54, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Temp\AI_EXTUI_BIN_7316\metrorunapplicationbutton
PNG image data, 732 x 163, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Temp\AI_EXTUI_BIN_7316\metrorunapplicationbutton.xaml
ASCII text, with very long lines (373), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\AI_EXTUI_BIN_7316\modify.png
PNG image data, 732 x 163, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Temp\AI_EXTUI_BIN_7316\modify.png.xaml
ASCII text, with very long lines (383), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\AI_EXTUI_BIN_7316\nextcancelbuttons
PNG image data, 624 x 37, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Temp\AI_EXTUI_BIN_7316\nextcancelbuttons.xaml
HTML document, ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\AI_EXTUI_BIN_7316\optionslogoicon
MS Windows icon resource - 3 icons, 48x48, 8 bits/pixel, 48x48, 32 bits/pixel
dropped
C:\Users\user\AppData\Local\Temp\AI_EXTUI_BIN_7316\print.png
PNG image data, 222 x 37, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Temp\AI_EXTUI_BIN_7316\print.png.xaml
HTML document, ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\AI_EXTUI_BIN_7316\printico
MS Windows icon resource - 2 icons, 32x32, 8 bits/pixel, 32x32, 32 bits/pixel
dropped
C:\Users\user\AppData\Local\Temp\AI_EXTUI_BIN_7316\remove.png
PNG image data, 732 x 163, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Temp\AI_EXTUI_BIN_7316\remove.png.xaml
ASCII text, with very long lines (379), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\AI_EXTUI_BIN_7316\removico
MS Windows icon resource - 5 icons, 48x48, 16 colors, 4 bits/pixel, 48x48, 8 bits/pixel
dropped
C:\Users\user\AppData\Local\Temp\AI_EXTUI_BIN_7316\repair.png
PNG image data, 732 x 163, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Temp\AI_EXTUI_BIN_7316\repair.png.xaml
ASCII text, with very long lines (584), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\AI_EXTUI_BIN_7316\repairic
MS Windows icon resource - 4 icons, 48x48, 8 bits/pixel, 32x32, 8 bits/pixel
dropped
C:\Users\user\AppData\Local\Temp\AI_EXTUI_BIN_7316\runapplicationbutton
PNG image data, 432 x 72, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Temp\AI_EXTUI_BIN_7316\sys_close_down.png
PNG image data, 28 x 26, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Temp\AI_EXTUI_BIN_7316\sys_close_hot.png
PNG image data, 28 x 26, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Temp\AI_EXTUI_BIN_7316\sys_close_inactive.png
PNG image data, 28 x 26, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Temp\AI_EXTUI_BIN_7316\sys_close_normal.png
PNG image data, 28 x 26, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Temp\AI_EXTUI_BIN_7316\sys_min_down.png
PNG image data, 28 x 26, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Temp\AI_EXTUI_BIN_7316\sys_min_hot.png
PNG image data, 28 x 26, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Temp\AI_EXTUI_BIN_7316\sys_min_inactive.png
PNG image data, 28 x 26, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Temp\AI_EXTUI_BIN_7316\sys_min_normal.png
PNG image data, 28 x 26, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Temp\AI_EXTUI_BIN_7316\viewreadmebutton
PNG image data, 732 x 163, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Temp\AI_EXTUI_BIN_7316\viewreadmebutton.xaml
ASCII text, with very long lines (387), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\AI_EXTUI_BIN_7316\waitlogoicon
MS Windows icon resource - 2 icons, 48x48, 8 bits/pixel, 48x48, 32 bits/pixel
dropped
C:\Users\user\AppData\Local\Temp\AI_EXTUI_BIN_7316\whitebackground
JPEG image data, JFIF standard 1.02, aspect ratio, density 100x100, segment length 16, baseline, precision 8, 400x300, components 3
dropped
C:\Users\user\AppData\Local\Temp\MSIAB0A.tmp
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\MSIAB79.tmp
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\MSIABD8.tmp
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\MSIABF8.tmp
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\MSIAC28.tmp
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\MSIAC48.tmp
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\MSIAC78.tmp
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\MSIACD7.tmp
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\MSIAD45.tmp
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\MSIAD94.tmp
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\MSIADC4.tmp
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\MSIB007.tmp
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\MSIB037.tmp
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\MSIB076.tmp
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
modified
C:\Users\user\AppData\Local\Temp\shiAA8C.tmp
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
There are 91 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\DiStem-0.9.10.exe
"C:\Users\user\Desktop\DiStem-0.9.10.exe"
C:\Windows\System32\msiexec.exe
C:\Windows\system32\msiexec.exe /V
C:\Windows\SysWOW64\msiexec.exe
C:\Windows\syswow64\MsiExec.exe -Embedding D4A075D37BC1D68A01BCA1EB71DE32A6 C

URLs

Name
IP
Malicious
https://diroots.com/terms-and-conditions
unknown
http://html4/loose.dtd
unknown
https://diroots.com/contact-us/
unknown
http://.css
unknown
http://schemas.micr
unknown
http://.jpg
unknown
https://diroots.com/privacy-policy/
unknown
https://api.github.com/repos/DiRoots-Limited/DiRoots.DiStem.Releases/releasesPbw
unknown
https://api.github.com/repos/DiRoots-Limited/DiRoots.DiStem.Releases/releases
unknown
https://diroots.com/privacy-policy/0
unknown

Memdumps

Base Address
Regiontype
Protect
Malicious
A70B000
heap
page read and write
AB78000
heap
page read and write
732F000
stack
page read and write
9B51000
heap
page read and write
930000
unkown
page readonly
AB78000
heap
page read and write
AB78000
heap
page read and write
AF21000
trusted library allocation
page read and write
9B68000
heap
page read and write
B0FC000
trusted library allocation
page read and write
97AE000
heap
page read and write
AB71000
heap
page read and write
AB7B000
heap
page read and write
4F70000
heap
page read and write
96B0000
heap
page read and write
9B7B000
heap
page read and write
9782000
heap
page read and write
A703000
heap
page read and write
838000
stack
page read and write
AB78000
heap
page read and write
9F75000
trusted library section
page read and write
96E0000
heap
page read and write
80BE000
stack
page read and write
9782000
heap
page read and write
AB81000
heap
page read and write
A6FE000
heap
page read and write
97AE000
heap
page read and write
97AE000
heap
page read and write
9B6E000
heap
page read and write
6CA0000
heap
page read and write
AB78000
heap
page read and write
6A00000
heap
page read and write
AB7A000
heap
page read and write
930000
unkown
page readonly
6C4E000
stack
page read and write
97AE000
heap
page read and write
4F48000
heap
page read and write
97A7000
heap
page read and write
6AD0000
heap
page read and write
97AE000
heap
page read and write
C7D000
unkown
page read and write
AB7A000
heap
page read and write
C8A000
unkown
page readonly
4FB7000
heap
page read and write
8D0000
heap
page read and write
97AB000
heap
page read and write
9AB1000
trusted library allocation
page read and write
970D000
heap
page read and write
880000
heap
page read and write
AB78000
heap
page read and write
97A7000
heap
page read and write
AB78000
heap
page read and write
AB78000
heap
page read and write
AB7A000
heap
page read and write
97AE000
heap
page read and write
A726000
heap
page read and write
A6E6000
heap
page read and write
B126000
trusted library allocation
page read and write
4F98000
heap
page read and write
96D0000
heap
page read and write
9B73000
heap
page read and write
AB78000
heap
page read and write
94C0000
unkown
page readonly
AB81000
heap
page read and write
905000
heap
page read and write
A997000
trusted library allocation
page read and write
AB7B000
heap
page read and write
A9B9000
trusted library allocation
page read and write
97AE000
heap
page read and write
4FA6000
heap
page read and write
4FBC000
heap
page read and write
97AE000
heap
page read and write
AF11000
trusted library allocation
page read and write
96CD000
heap
page read and write
AB78000
heap
page read and write
AB7A000
heap
page read and write
99B1000
trusted library allocation
page read and write
9B71000
heap
page read and write
4FA9000
heap
page read and write
AB78000
heap
page read and write
4F83000
heap
page read and write
9B6C000
heap
page read and write
96F3000
heap
page read and write
4F56000
heap
page read and write
AF4B000
trusted library allocation
page read and write
AB78000
heap
page read and write
9B82000
heap
page read and write
9B77000
heap
page read and write
AB78000
heap
page read and write
97AE000
heap
page read and write
AB70000
heap
page read and write
AB78000
heap
page read and write
96CF000
heap
page read and write
AB71000
heap
page read and write
97AE000
heap
page read and write
7DDF000
stack
page read and write
9AB0000
trusted library allocation
page read and write
97AE000
heap
page read and write
9B52000
heap
page read and write
A709000
heap
page read and write
A9AA000
trusted library allocation
page read and write
AB7A000
heap
page read and write
AB7A000
heap
page read and write
9AB0000
trusted library allocation
page read and write
BC9000
unkown
page readonly
AB7A000
heap
page read and write
4F42000
heap
page read and write
9490000
unkown
page readonly
AB7B000
heap
page read and write
A6FD000
heap
page read and write
976A000
heap
page read and write
AB78000
heap
page read and write
4F59000
heap
page read and write
AB78000
heap
page read and write
96D9000
heap
page read and write
9773000
heap
page read and write
97A7000
heap
page read and write
97A7000
heap
page read and write
96CB000
heap
page read and write
97AE000
heap
page read and write
96CF000
heap
page read and write
99B1000
trusted library allocation
page read and write
4FB5000
heap
page read and write
9B6C000
heap
page read and write
9B67000
heap
page read and write
900000
heap
page read and write
96DD000
heap
page read and write
4F59000
heap
page read and write
97AE000
heap
page read and write
AB7A000
heap
page read and write
96CD000
heap
page read and write
AB83000
heap
page read and write
9706000
heap
page read and write
AF26000
trusted library allocation
page read and write
AB78000
heap
page read and write
AB78000
heap
page read and write
71EF000
stack
page read and write
A9B3000
heap
page read and write
96D3000
heap
page read and write
97AE000
heap
page read and write
6AD4000
heap
page read and write
9B6C000
heap
page read and write
AF60000
trusted library allocation
page read and write
B170000
trusted library allocation
page read and write
9B73000
heap
page read and write
722E000
stack
page read and write
97A7000
heap
page read and write
AB78000
heap
page read and write
A61A000
unkown
page readonly
97AE000
heap
page read and write
AB7B000
heap
page read and write
A6F2000
heap
page read and write
AF5B000
trusted library allocation
page read and write
9720000
heap
page read and write
AF36000
trusted library allocation
page read and write
6A50000
heap
page read and write
96D3000
heap
page read and write
97AE000
heap
page read and write
AB78000
heap
page read and write
97AE000
heap
page read and write
9AB1000
trusted library allocation
page read and write
BC9000
unkown
page readonly
AB7A000
heap
page read and write
9B75000
heap
page read and write
97AE000
heap
page read and write
9B67000
heap
page read and write
70EE000
stack
page read and write
AB78000
heap
page read and write
4DFB000
stack
page read and write
AB7B000
heap
page read and write
97AE000
heap
page read and write
9B69000
heap
page read and write
97AE000
heap
page read and write
4F71000
heap
page read and write
9AB0000
trusted library allocation
page read and write
9AB1000
trusted library allocation
page read and write
A960000
heap
page read and write
9AB0000
trusted library allocation
page read and write
AB7B000
heap
page read and write
AB78000
heap
page read and write
99B1000
trusted library allocation
page read and write
6C0A000
heap
page read and write
97A7000
heap
page read and write
9B6E000
heap
page read and write
9AB0000
trusted library allocation
page read and write
AB7A000
heap
page read and write
9B63000
heap
page read and write
B13B000
trusted library allocation
page read and write
A978000
heap
page read and write
AB7B000
heap
page read and write
AB71000
heap
page read and write
A9B7000
trusted library allocation
page read and write
97AE000
heap
page read and write
AB78000
heap
page read and write
9B4F000
heap
page read and write
6C70000
heap
page read and write
96C9000
heap
page read and write
97A7000
heap
page read and write
96CC000
heap
page read and write
9B71000
heap
page read and write
AB71000
heap
page read and write
A6C7000
heap
page read and write
A370000
unkown
page readonly
4F7D000
heap
page read and write
AB78000
heap
page read and write
AB7B000
heap
page read and write
AB78000
heap
page read and write
4F73000
heap
page read and write
96D2000
heap
page read and write
96CD000
heap
page read and write
69C0000
heap
page read and write
C8B000
unkown
page readonly
81BF000
stack
page read and write
A6EA000
heap
page read and write
4F80000
heap
page read and write
A6C0000
heap
page read and write
9AB1000
trusted library allocation
page read and write
96CD000
heap
page read and write
7CDE000
stack
page read and write
99B1000
trusted library allocation
page read and write
9B6E000
heap
page read and write
ABB7000
trusted library allocation
page read and write
9F70000
trusted library section
page read and write
96F7000
heap
page read and write
9460000
unkown
page readonly
AB78000
heap
page read and write
4EDE000
heap
page read and write
6BDE000
stack
page read and write
A720000
heap
page read and write
C80000
unkown
page read and write
96D2000
heap
page read and write
97A7000
heap
page read and write
97AE000
heap
page read and write
A6C6000
heap
page read and write
9AB1000
trusted library allocation
page read and write
4F84000
heap
page read and write
4F71000
heap
page read and write
96CE000
heap
page read and write
A97C000
heap
page read and write
9AB1000
trusted library allocation
page read and write
AF65000
trusted library allocation
page read and write
96D7000
heap
page read and write
9440000
unkown
page readonly
96D3000
heap
page read and write
AB78000
heap
page read and write
B14B000
trusted library allocation
page read and write
97AE000
heap
page read and write
94B0000
unkown
page readonly
AF70000
trusted library allocation
page read and write
AB7A000
heap
page read and write
9B82000
heap
page read and write
96CB000
heap
page read and write
ABB9000
trusted library allocation
page read and write
A6ED000
heap
page read and write
97AE000
heap
page read and write
97AE000
heap
page read and write
AB7B000
heap
page read and write
B101000
trusted library allocation
page read and write
9AB1000
trusted library allocation
page read and write
B175000
trusted library allocation
page read and write
9718000
heap
page read and write
A9B7000
heap
page read and write
971C000
heap
page read and write
4F96000
heap
page read and write
AB78000
heap
page read and write
AB71000
heap
page read and write
AB78000
heap
page read and write
AB78000
heap
page read and write
AB71000
heap
page read and write
97A7000
heap
page read and write
A970000
heap
page read and write
AB78000
heap
page read and write
AF50000
trusted library allocation
page read and write
B116000
trusted library allocation
page read and write
AB71000
heap
page read and write
AB7A000
heap
page read and write
AF3B000
trusted library allocation
page read and write
97AE000
heap
page read and write
7F5C000
stack
page read and write
AEFC000
trusted library allocation
page read and write
B111000
trusted library allocation
page read and write
96CF000
heap
page read and write
96CC000
heap
page read and write
9480000
unkown
page readonly
97AE000
heap
page read and write
974F000
heap
page read and write
99B1000
trusted library allocation
page read and write
AB78000
heap
page read and write
9715000
heap
page read and write
AB7B000
heap
page read and write
4FA5000
heap
page read and write
AB71000
heap
page read and write
96D2000
heap
page read and write
AB71000
heap
page read and write
9B7D000
heap
page read and write
97AB000
heap
page read and write
97A7000
heap
page read and write
9B42000
heap
page read and write
9B70000
heap
page read and write
AB78000
heap
page read and write
4F95000
heap
page read and write
97AE000
heap
page read and write
97AE000
heap
page read and write
ABAA000
trusted library allocation
page read and write
96CD000
heap
page read and write
AB7B000
heap
page read and write
AB71000
heap
page read and write
9B57000
heap
page read and write
6C00000
heap
page read and write
A6E2000
heap
page read and write
97AE000
heap
page read and write
AB78000
heap
page read and write
B15B000
trusted library allocation
page read and write
A709000
heap
page read and write
A75E000
heap
page read and write
4F84000
heap
page read and write
4F87000
heap
page read and write
97AE000
heap
page read and write
AB97000
trusted library allocation
page read and write
6A0B000
heap
page read and write
9AB1000
trusted library allocation
page read and write
97AE000
heap
page read and write
9B30000
heap
page read and write
4F70000
heap
page read and write
AB78000
heap
page read and write
A704000
heap
page read and write
97AE000
heap
page read and write
9450000
unkown
page readonly
9510000
heap
page read and write
B160000
trusted library allocation
page read and write
97AE000
heap
page read and write
96CC000
heap
page read and write
97AE000
heap
page read and write
9470000
unkown
page readonly
9AB1000
trusted library allocation
page read and write
A70D000
heap
page read and write
A98A000
trusted library allocation
page read and write
AB71000
heap
page read and write
9B65000
heap
page read and write
9AB1000
trusted library allocation
page read and write
9B79000
heap
page read and write
97AE000
heap
page read and write
B136000
trusted library allocation
page read and write
96AD000
stack
page read and write
AB78000
heap
page read and write
B10C000
trusted library allocation
page read and write
AB78000
heap
page read and write
931000
unkown
page execute read
9B82000
heap
page read and write
7F1B000
stack
page read and write
AB71000
heap
page read and write
97AE000
heap
page read and write
96CD000
heap
page read and write
9B79000
heap
page read and write
96D7000
heap
page read and write
96D2000
heap
page read and write
9430000
unkown
page readonly
96D7000
heap
page read and write
931000
unkown
page execute read
C8A000
unkown
page write copy
AB7B000
heap
page read and write
C7F000
unkown
page write copy
6A05000
heap
page read and write
AB78000
heap
page read and write
9B79000
heap
page read and write
9B56000
heap
page read and write
97AE000
heap
page read and write
4F96000
heap
page read and write
9AB1000
trusted library allocation
page read and write
AB78000
heap
page read and write
4F7C000
heap
page read and write
B121000
trusted library allocation
page read and write
9B82000
heap
page read and write
97AE000
heap
page read and write
9B7E000
heap
page read and write
96C7000
heap
page read and write
B150000
trusted library allocation
page read and write
97AE000
heap
page read and write
A9C5000
heap
page read and write
97AE000
heap
page read and write
4F65000
heap
page read and write
C7D000
unkown
page write copy
4ED0000
heap
page read and write
96CF000
heap
page read and write
96D7000
heap
page read and write
AF01000
trusted library allocation
page read and write
A610000
unkown
page readonly
AF0C000
trusted library allocation
page read and write
A6F8000
heap
page read and write
96D2000
heap
page read and write
99B1000
trusted library allocation
page read and write
A670000
heap
page read and write
AB78000
heap
page read and write
A9B2000
heap
page read and write
AB71000
heap
page read and write
AB7B000
heap
page read and write
AB7A000
heap
page read and write
AB7A000
heap
page read and write
9B71000
heap
page read and write
AB7B000
heap
page read and write
4F8A000
heap
page read and write
97AE000
heap
page read and write
95AB000
stack
page read and write
AF16000
trusted library allocation
page read and write
805D000
stack
page read and write
4F20000
heap
page read and write
9B58000
heap
page read and write
AB7A000
heap
page read and write
A74F000
heap
page read and write
74A0000
trusted library allocation
page read and write
A6D4000
heap
page read and write
97A7000
heap
page read and write
6AAB000
stack
page read and write
AF75000
trusted library allocation
page read and write
4F47000
heap
page read and write
96CD000
heap
page read and write
9C7E000
stack
page read and write
A75C000
heap
page read and write
4F8A000
heap
page read and write
9B57000
heap
page read and write
97A7000
heap
page read and write
96D1000
heap
page read and write
AB78000
heap
page read and write
973C000
heap
page read and write
97AE000
heap
page read and write
9AB1000
trusted library allocation
page read and write
94A0000
unkown
page readonly
AB78000
heap
page read and write
7E1C000
stack
page read and write
97AE000
heap
page read and write
9AB0000
trusted library allocation
page read and write
6A4B000
stack
page read and write
96D3000
heap
page read and write
4F84000
heap
page read and write
AB7A000
heap
page read and write
9432000
heap
page read and write
96CF000
heap
page read and write
4F70000
heap
page read and write
A9C1000
heap
page read and write
4F94000
heap
page read and write
AB7B000
heap
page read and write
AB78000
heap
page read and write
A6AA000
heap
page read and write
96FE000
heap
page read and write
AB78000
heap
page read and write
97A7000
heap
page read and write
9D7F000
stack
page read and write
4F88000
heap
page read and write
B165000
trusted library allocation
page read and write
AB8A000
trusted library allocation
page read and write
9B5B000
heap
page read and write
There are 441 hidden memdumps, click here to show them.