IOC Report
ReInquiry Lenght Error.exe

loading gif

Files

File Path
Type
Category
Malicious
ReInquiry Lenght Error.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Local\Temp\tmp6629.tmp
XML 1.0 document, ASCII text
dropped
malicious
C:\Users\user\AppData\Roaming\XmiDHRWI.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\ReInquiry Lenght Error.exe.log
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\XmiDHRWI.exe.log
ASCII text, with CRLF line terminators
modified
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
data
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_3mthvkwj.1uz.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_3uuehbx5.lei.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_d3sxhwzh.ikr.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_hjaujvb1.i2k.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_if3unqmp.o2n.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_pb1qp40d.qet.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_qmt3vwfh.bwr.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_w4mjf45y.4k2.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\tmp7413.tmp
XML 1.0 document, ASCII text
dropped
C:\Users\user\AppData\Roaming\XmiDHRWI.exe:Zone.Identifier
ASCII text, with CRLF line terminators
dropped
There are 6 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\ReInquiry Lenght Error.exe
"C:\Users\user\Desktop\ReInquiry Lenght Error.exe"
malicious
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\ReInquiry Lenght Error.exe"
malicious
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\XmiDHRWI.exe"
malicious
C:\Windows\SysWOW64\schtasks.exe
"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\XmiDHRWI" /XML "C:\Users\user\AppData\Local\Temp\tmp6629.tmp"
malicious
C:\Users\user\Desktop\ReInquiry Lenght Error.exe
"C:\Users\user\Desktop\ReInquiry Lenght Error.exe"
malicious
C:\Users\user\AppData\Roaming\XmiDHRWI.exe
C:\Users\user\AppData\Roaming\XmiDHRWI.exe
malicious
C:\Windows\SysWOW64\schtasks.exe
"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\XmiDHRWI" /XML "C:\Users\user\AppData\Local\Temp\tmp7413.tmp"
malicious
C:\Users\user\AppData\Roaming\XmiDHRWI.exe
"C:\Users\user\AppData\Roaming\XmiDHRWI.exe"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\wbem\WmiPrvSE.exe
C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
There are 3 hidden processes, click here to show them.

URLs

Name
IP
Malicious
http://crt.sectigo.com/SectigoRSADomainValidationSecureServerCA.crt0#
unknown
http://ocsp.sectigo.com0A
unknown
https://sectigo.com/CPS0
unknown
https://account.dyn.com/
unknown
http://us2.smtp.mailhostbox.com
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
http://ip-api.com/line/?fields=hosting
208.95.112.1
http://ip-api.com
unknown
http://ip-api.com/line/?fields=hostingy
unknown

Domains

Name
IP
Malicious
us2.smtp.mailhostbox.com
208.91.199.223
ip-api.com
208.95.112.1

IPs

IP
Domain
Country
Malicious
208.95.112.1
ip-api.com
United States
208.91.199.223
us2.smtp.mailhostbox.com
United States

Registry

Path
Value
Malicious
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\ReInquiry Lenght Error_RASAPI32
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\ReInquiry Lenght Error_RASAPI32
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\ReInquiry Lenght Error_RASAPI32
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\ReInquiry Lenght Error_RASAPI32
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\ReInquiry Lenght Error_RASAPI32
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\ReInquiry Lenght Error_RASAPI32
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\ReInquiry Lenght Error_RASAPI32
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\ReInquiry Lenght Error_RASMANCS
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\ReInquiry Lenght Error_RASMANCS
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\ReInquiry Lenght Error_RASMANCS
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\ReInquiry Lenght Error_RASMANCS
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\ReInquiry Lenght Error_RASMANCS
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\ReInquiry Lenght Error_RASMANCS
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\ReInquiry Lenght Error_RASMANCS
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\XmiDHRWI_RASAPI32
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\XmiDHRWI_RASAPI32
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\XmiDHRWI_RASAPI32
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\XmiDHRWI_RASAPI32
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\XmiDHRWI_RASAPI32
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\XmiDHRWI_RASAPI32
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\XmiDHRWI_RASAPI32
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\XmiDHRWI_RASMANCS
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\XmiDHRWI_RASMANCS
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\XmiDHRWI_RASMANCS
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\XmiDHRWI_RASMANCS
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\XmiDHRWI_RASMANCS
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\XmiDHRWI_RASMANCS
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\XmiDHRWI_RASMANCS
FileDirectory
There are 19 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
36DE000
trusted library allocation
page read and write
malicious
29A1000
trusted library allocation
page read and write
malicious
37C6000
trusted library allocation
page read and write
malicious
3647000
trusted library allocation
page read and write
malicious
366B000
trusted library allocation
page read and write
malicious
29EB000
trusted library allocation
page read and write
malicious
3C94000
trusted library allocation
page read and write
malicious
29C7000
trusted library allocation
page read and write
malicious
3621000
trusted library allocation
page read and write
malicious
8860000
trusted library section
page read and write
359C000
stack
page read and write
500E000
stack
page read and write
29FB000
trusted library allocation
page read and write
536000
stack
page read and write
B92000
trusted library allocation
page read and write
504E000
stack
page read and write
1B87000
heap
page read and write
4C9F000
trusted library allocation
page read and write
7040000
heap
page read and write
B60000
trusted library allocation
page read and write
35E0000
heap
page execute and read and write
7EFA0000
trusted library allocation
page execute and read and write
29F4000
trusted library allocation
page read and write
51FD000
stack
page read and write
A24E000
stack
page read and write
3200000
heap
page read and write
720000
heap
page read and write
694D000
stack
page read and write
43E000
remote allocation
page execute and read and write
4540000
trusted library allocation
page read and write
6372000
heap
page read and write
6AF0000
trusted library allocation
page read and write
2E3D000
trusted library allocation
page read and write
469C000
stack
page read and write
297F000
trusted library allocation
page read and write
1190000
heap
page read and write
6016000
trusted library allocation
page read and write
2981000
trusted library allocation
page read and write
2B49000
trusted library allocation
page read and write
2979000
trusted library allocation
page read and write
4A20000
heap
page read and write
6EE0D000
unkown
page read and write
88F7000
trusted library allocation
page read and write
7550000
trusted library allocation
page read and write
88F0000
trusted library allocation
page read and write
B30000
heap
page read and write
3D0000
unkown
page readonly
2676000
trusted library allocation
page read and write
2E4D000
trusted library allocation
page read and write
4E50000
trusted library allocation
page read and write
A10000
heap
page read and write
ACC000
trusted library allocation
page read and write
697E000
stack
page read and write
E5E000
stack
page read and write
A5D000
trusted library allocation
page execute and read and write
BEE000
stack
page read and write
895000
heap
page read and write
6F50000
trusted library allocation
page execute and read and write
50BE000
stack
page read and write
4F80000
trusted library allocation
page read and write
4E40000
trusted library allocation
page read and write
6AB0000
trusted library allocation
page execute and read and write
4FCE000
stack
page read and write
764000
trusted library allocation
page read and write
280E000
trusted library allocation
page read and write
4C9D000
trusted library allocation
page read and write
B87000
trusted library allocation
page execute and read and write
50E0000
trusted library allocation
page read and write
345F000
stack
page read and write
192C000
stack
page read and write
2678000
trusted library allocation
page read and write
A35000
heap
page read and write
4E80000
trusted library allocation
page execute and read and write
25CD000
stack
page read and write
3667000
trusted library allocation
page read and write
3971000
trusted library allocation
page read and write
734E000
stack
page read and write
1691000
heap
page read and write
51F0000
trusted library allocation
page read and write
6EEE000
stack
page read and write
786000
trusted library allocation
page execute and read and write
9DEE000
stack
page read and write
1B56000
trusted library allocation
page read and write
15C5000
heap
page read and write
3A76000
trusted library allocation
page read and write
35F1000
trusted library allocation
page read and write
991B000
trusted library allocation
page read and write
622E000
stack
page read and write
6950000
heap
page read and write
76D000
trusted library allocation
page execute and read and write
51F7000
trusted library allocation
page read and write
2971000
trusted library allocation
page read and write
81A000
heap
page read and write
1930000
trusted library allocation
page execute and read and write
1950000
heap
page read and write
AEC000
heap
page read and write
4A30000
heap
page read and write
4DC0000
heap
page read and write
2E55000
trusted library allocation
page read and write
281C000
trusted library allocation
page read and write
5010000
heap
page read and write
B76000
trusted library allocation
page execute and read and write
5200000
heap
page execute and read and write
7540000
heap
page read and write
B9A000
trusted library allocation
page execute and read and write
341E000
stack
page read and write
18EE000
stack
page read and write
4D7B000
stack
page read and write
4E3E000
stack
page read and write
86EE000
stack
page read and write
8DD000
heap
page read and write
59AE000
stack
page read and write
7045000
heap
page read and write
2811000
trusted library allocation
page read and write
2F9E000
unkown
page read and write
2E4B000
trusted library allocation
page read and write
1B5D000
trusted library allocation
page read and write
AA0000
heap
page read and write
4E60000
trusted library allocation
page read and write
C30000
trusted library allocation
page execute and read and write
C14000
trusted library allocation
page read and write
283A000
stack
page read and write
F26000
trusted library allocation
page read and write
2962000
trusted library allocation
page read and write
AA3000
heap
page read and write
2FE0000
heap
page read and write
320B000
heap
page read and write
6F3E000
stack
page read and write
4A50000
trusted library allocation
page read and write
744F000
stack
page read and write
B34000
heap
page read and write
BF0000
trusted library allocation
page read and write
2985000
trusted library allocation
page read and write
6EE06000
unkown
page readonly
1970000
trusted library allocation
page read and write
632D000
stack
page read and write
B22000
heap
page read and write
97BC000
trusted library allocation
page read and write
8711000
trusted library allocation
page read and write
70D2000
heap
page read and write
F40000
trusted library allocation
page read and write
B20000
trusted library allocation
page read and write
3430000
trusted library allocation
page read and write
B2AD000
stack
page read and write
15AB000
trusted library allocation
page execute and read and write
BE0000
trusted library allocation
page read and write
1A98000
trusted library allocation
page read and write
77D000
trusted library allocation
page execute and read and write
8C2000
heap
page read and write
2E59000
trusted library allocation
page read and write
EB0000
trusted library allocation
page read and write
5A50000
trusted library allocation
page execute and read and write
4E6C000
trusted library allocation
page read and write
1580000
trusted library allocation
page read and write
1615000
heap
page read and write
29C5000
trusted library allocation
page read and write
29CD000
trusted library allocation
page read and write
A2E000
stack
page read and write
2E43000
trusted library allocation
page read and write
B80000
trusted library allocation
page read and write
25D4000
trusted library allocation
page read and write
1596000
trusted library allocation
page execute and read and write
E20000
trusted library allocation
page read and write
B70000
trusted library allocation
page read and write
763000
trusted library allocation
page execute and read and write
297D000
trusted library allocation
page read and write
6F4D000
stack
page read and write
5790000
trusted library allocation
page read and write
686E000
stack
page read and write
6DF0000
trusted library section
page read and write
268C000
trusted library allocation
page read and write
6CD0000
heap
page read and write
851000
heap
page read and write
1B51000
trusted library allocation
page read and write
7FA00000
trusted library allocation
page execute and read and write
15A7000
trusted library allocation
page execute and read and write
2BE7000
trusted library allocation
page read and write
5A0000
heap
page read and write
704E000
stack
page read and write
4DE3000
heap
page read and write
F21000
trusted library allocation
page read and write
8CD000
heap
page read and write
4E50000
heap
page read and write
27FB000
trusted library allocation
page read and write
4E70000
trusted library allocation
page execute and read and write
5350000
trusted library allocation
page execute and read and write
797000
trusted library allocation
page execute and read and write
465B000
trusted library allocation
page read and write
560F000
stack
page read and write
3964000
trusted library allocation
page read and write
590000
heap
page read and write
4C70000
heap
page read and write
A6D000
trusted library allocation
page execute and read and write
6B90000
trusted library section
page read and write
268E000
trusted library allocation
page read and write
695E000
heap
page read and write
6600000
trusted library allocation
page read and write
6606000
trusted library allocation
page read and write
2C2B000
trusted library allocation
page read and write
4DFE000
stack
page read and write
2860000
heap
page execute and read and write
8460000
trusted library allocation
page execute and read and write
3450000
heap
page read and write
1B74000
trusted library allocation
page read and write
2BF9000
trusted library allocation
page read and write
C28000
heap
page read and write
29C0000
heap
page execute and read and write
6005000
trusted library allocation
page read and write
3AC4000
trusted library allocation
page read and write
B96000
trusted library allocation
page execute and read and write
8410000
trusted library section
page read and write
6D20000
trusted library allocation
page execute and read and write
687E000
stack
page read and write
39D1000
trusted library allocation
page read and write
C40000
trusted library allocation
page read and write
4C90000
trusted library allocation
page read and write
267A000
trusted library allocation
page read and write
6EE0D000
unkown
page read and write
6A8E000
stack
page read and write
2987000
trusted library allocation
page read and write
2850000
heap
page read and write
9E0000
heap
page read and write
B01000
trusted library allocation
page read and write
5A40000
trusted library allocation
page read and write
C53000
heap
page read and write
4EA5000
heap
page read and write
792000
trusted library allocation
page read and write
29DA000
trusted library allocation
page read and write
2E41000
trusted library allocation
page read and write
5A20000
heap
page execute and read and write
A70000
heap
page read and write
680000
heap
page read and write
6A4F000
stack
page read and write
6EAD000
stack
page read and write
6430000
trusted library allocation
page read and write
AC0000
trusted library allocation
page read and write
540F000
stack
page read and write
550E000
stack
page read and write
57A0000
trusted library allocation
page execute and read and write
563D000
stack
page read and write
907000
heap
page read and write
B8D000
trusted library allocation
page execute and read and write
696E000
stack
page read and write
6DC0000
trusted library allocation
page read and write
EA0000
trusted library allocation
page read and write
B06000
trusted library allocation
page read and write
5A0000
heap
page read and write
800000
trusted library allocation
page execute and read and write
725000
heap
page read and write
4F30000
trusted library allocation
page read and write
6A8E000
stack
page read and write
988000
stack
page read and write
2989000
trusted library allocation
page read and write
8730000
trusted library allocation
page execute and read and write
6348000
heap
page read and write
70D000
stack
page read and write
C56000
heap
page read and write
5390000
trusted library allocation
page execute and read and write
27FE000
trusted library allocation
page read and write
596E000
stack
page read and write
2A00000
trusted library allocation
page read and write
5360000
trusted library allocation
page execute and read and write
4C60000
trusted library section
page readonly
7363000
heap
page read and write
AD0000
heap
page execute and read and write
160A000
heap
page read and write
C00000
heap
page read and write
5A4D000
trusted library allocation
page read and write
112A000
stack
page read and write
1590000
trusted library allocation
page read and write
1B3B000
trusted library allocation
page read and write
29A0000
trusted library allocation
page read and write
51E0000
trusted library allocation
page read and write
2E47000
trusted library allocation
page read and write
2E53000
trusted library allocation
page read and write
6EE0D000
unkown
page read and write
33D0000
heap
page read and write
84F000
heap
page read and write
C2B000
stack
page read and write
4DBD000
trusted library allocation
page read and write
4F8C000
stack
page read and write
364D000
trusted library allocation
page read and write
B88E000
stack
page read and write
2EAD000
stack
page read and write
4D90000
heap
page read and write
8580000
heap
page read and write
4DBF000
trusted library allocation
page read and write
292C000
stack
page read and write
B90000
trusted library allocation
page read and write
A96000
trusted library allocation
page read and write
50F0000
heap
page read and write
2729000
trusted library allocation
page read and write
29E7000
trusted library allocation
page read and write
5370000
trusted library allocation
page execute and read and write
400000
remote allocation
page execute and read and write
2FDF000
unkown
page read and write
1686000
heap
page read and write
2E37000
trusted library allocation
page read and write
72D0000
heap
page read and write
6DD0000
trusted library allocation
page read and write
782000
trusted library allocation
page read and write
647E000
stack
page read and write
167E000
heap
page read and write
5200000
heap
page read and write
4F80000
heap
page execute and read and write
E9E000
stack
page read and write
9BFF000
stack
page read and write
6B10000
heap
page read and write
439000
stack
page read and write
2950000
trusted library allocation
page read and write
5EE000
stack
page read and write
C49000
heap
page read and write
1683000
heap
page read and write
C50000
heap
page read and write
1B70000
trusted library allocation
page read and write
B66000
heap
page read and write
60ED000
stack
page read and write
1B30000
trusted library allocation
page read and write
F40000
heap
page read and write
6000000
trusted library allocation
page read and write
B68C000
stack
page read and write
3999000
trusted library allocation
page read and write
B6A000
heap
page read and write
E9E000
stack
page read and write
6330000
heap
page read and write
2990000
heap
page read and write
14F9000
stack
page read and write
29B0000
trusted library allocation
page read and write
2ED0000
trusted library allocation
page read and write
15A0000
trusted library allocation
page read and write
2E5B000
trusted library allocation
page read and write
856D000
stack
page read and write
2717000
trusted library allocation
page read and write
4A40000
trusted library allocation
page read and write
2810000
trusted library allocation
page read and write
365A000
trusted library allocation
page read and write
5013000
heap
page read and write
494000
unkown
page readonly
4CA0000
trusted library allocation
page read and write
A30000
heap
page read and write
4DC5000
heap
page read and write
5F6F000
stack
page read and write
4C80000
heap
page read and write
B7D000
trusted library allocation
page execute and read and write
6EDF1000
unkown
page execute read
280A000
trusted library allocation
page read and write
6AE0000
heap
page read and write
3674000
trusted library allocation
page read and write
6EE0D000
unkown
page read and write
2C16000
trusted library allocation
page read and write
ED0000
trusted library allocation
page execute and read and write
530C000
stack
page read and write
1570000
trusted library allocation
page read and write
4978000
trusted library allocation
page read and write
2802000
trusted library allocation
page read and write
70FC000
heap
page read and write
5050000
trusted library allocation
page read and write
70DD000
heap
page read and write
39D9000
trusted library allocation
page read and write
1B80000
heap
page read and write
883D000
stack
page read and write
F1E000
trusted library allocation
page read and write
2980000
heap
page read and write
8570000
heap
page read and write
2820000
heap
page read and write
27F0000
trusted library allocation
page read and write
4F3A000
trusted library allocation
page read and write
F2D000
trusted library allocation
page read and write
15A2000
trusted library allocation
page read and write
2870000
heap
page read and write
9E5000
heap
page read and write
2E51000
trusted library allocation
page read and write
9CEE000
stack
page read and write
24DE000
stack
page read and write
6CE000
stack
page read and write
50C0000
trusted library allocation
page read and write
1B4A000
trusted library allocation
page read and write
2930000
trusted library allocation
page read and write
4DE0000
heap
page read and write
6D32000
trusted library allocation
page read and write
4D8E000
stack
page read and write
4F70000
trusted library allocation
page read and write
519E000
stack
page read and write
724E000
stack
page read and write
90B000
heap
page read and write
9ECB000
stack
page read and write
2680000
trusted library allocation
page read and write
78A000
trusted library allocation
page execute and read and write
6D20000
heap
page read and write
B37000
heap
page read and write
6BDE000
stack
page read and write
4F35000
trusted library allocation
page read and write
27FE000
stack
page read and write
297B000
trusted library allocation
page read and write
6010000
trusted library allocation
page read and write
5A70000
heap
page read and write
72E9000
heap
page read and write
A30000
heap
page read and write
C10000
trusted library allocation
page read and write
4DB0000
trusted library allocation
page read and write
A14E000
stack
page read and write
4EA0000
heap
page read and write
4DA0000
heap
page read and write
6D30000
trusted library allocation
page read and write
2971000
trusted library allocation
page read and write
295E000
stack
page read and write
2965000
trusted library allocation
page read and write
9F0000
heap
page read and write
B8B000
trusted library allocation
page execute and read and write
7560000
heap
page read and write
B26D000
stack
page read and write
2816000
trusted library allocation
page read and write
714E000
stack
page read and write
5650000
heap
page read and write
BA5000
trusted library allocation
page execute and read and write
A10E000
stack
page read and write
3501000
trusted library allocation
page read and write
BA2000
trusted library allocation
page read and write
158D000
trusted library allocation
page execute and read and write
5A37000
trusted library allocation
page read and write
2501000
trusted library allocation
page read and write
2684000
trusted library allocation
page read and write
4F40000
trusted library allocation
page execute and read and write
29D1000
trusted library allocation
page read and write
6E00000
trusted library section
page read and write
5A30000
trusted library allocation
page read and write
B52E000
stack
page read and write
A00E000
stack
page read and write
1560000
trusted library allocation
page read and write
5060000
trusted library allocation
page execute and read and write
296D000
trusted library allocation
page read and write
75E0000
heap
page read and write
770000
trusted library allocation
page read and write
5070000
trusted library allocation
page execute and read and write
B58B000
stack
page read and write
2ADE000
trusted library allocation
page read and write
1592000
trusted library allocation
page read and write
35F4000
trusted library allocation
page read and write
5C6C000
stack
page read and write
6E0E000
stack
page read and write
780000
trusted library allocation
page read and write
2E3B000
trusted library allocation
page read and write
F50000
heap
page read and write
6B8E000
stack
page read and write
5340000
trusted library allocation
page read and write
1980000
heap
page read and write
1940000
trusted library allocation
page read and write
4619000
trusted library allocation
page read and write
4E65000
trusted library allocation
page read and write
AA4000
heap
page read and write
B0D000
trusted library allocation
page read and write
6CCE000
stack
page read and write
16BD000
heap
page read and write
28BE000
unkown
page read and write
A54000
trusted library allocation
page read and write
81E000
heap
page read and write
A0E000
stack
page read and write
1617000
heap
page read and write
B130000
heap
page read and write
281D000
trusted library allocation
page read and write
6B8E000
stack
page read and write
579D000
trusted library allocation
page read and write
2E4F000
trusted library allocation
page read and write
A50000
trusted library allocation
page read and write
674E000
heap
page read and write
7080000
heap
page read and write
2973000
trusted library allocation
page read and write
F00000
trusted library allocation
page read and write
2E3F000
trusted library allocation
page read and write
1B76000
trusted library allocation
page read and write
4F38000
trusted library allocation
page read and write
6D10000
trusted library allocation
page execute and read and write
2682000
trusted library allocation
page read and write
A7E000
heap
page read and write
4A70000
trusted library allocation
page execute and read and write
7328000
heap
page read and write
B530000
heap
page read and write
24F0000
heap
page read and write
2AA4000
trusted library allocation
page read and write
708F000
stack
page read and write
B7A000
trusted library allocation
page execute and read and write
157D000
trusted library allocation
page execute and read and write
2E39000
trusted library allocation
page read and write
59EE000
stack
page read and write
B73000
trusted library allocation
page execute and read and write
2900000
heap
page read and write
5F6E000
stack
page read and write
7F530000
trusted library allocation
page execute and read and write
15A5000
trusted library allocation
page execute and read and write
296F000
trusted library allocation
page read and write
35B0000
heap
page read and write
2696000
trusted library allocation
page read and write
4DD0000
trusted library allocation
page read and write
3C56000
trusted library allocation
page read and write
1B4E000
trusted library allocation
page read and write
2967000
trusted library allocation
page read and write
2E45000
trusted library allocation
page read and write
6F0D000
stack
page read and write
268A000
trusted library allocation
page read and write
5A63000
heap
page read and write
1573000
trusted library allocation
page execute and read and write
88E0000
trusted library allocation
page execute and read and write
367B000
trusted library allocation
page read and write
3766000
trusted library allocation
page read and write
7F4D0000
trusted library allocation
page execute and read and write
2E57000
trusted library allocation
page read and write
2690000
trusted library allocation
page read and write
A00000
heap
page read and write
5FAE000
stack
page read and write
C3D000
heap
page read and write
D5E000
stack
page read and write
27EE000
stack
page read and write
BA7000
trusted library allocation
page execute and read and write
9AAE000
stack
page read and write
2674000
trusted library allocation
page read and write
F47000
heap
page read and write
B82000
trusted library allocation
page read and write
4A5F000
trusted library allocation
page read and write
B74000
trusted library allocation
page read and write
A7C000
stack
page read and write
7FE000
stack
page read and write
3786000
trusted library allocation
page read and write
1B3E000
trusted library allocation
page read and write
6E5E000
stack
page read and write
267E000
trusted library allocation
page read and write
5A60000
heap
page read and write
15C0000
heap
page read and write
6DB0000
trusted library section
page read and write
275B000
trusted library allocation
page read and write
5D6E000
stack
page read and write
8D1000
heap
page read and write
A90000
trusted library allocation
page read and write
49E0000
trusted library allocation
page read and write
533E000
stack
page read and write
3645000
trusted library allocation
page read and write
B72000
trusted library allocation
page read and write
6740000
heap
page read and write
BC0000
trusted library allocation
page read and write
159A000
trusted library allocation
page execute and read and write
2969000
trusted library allocation
page read and write
6E3E000
stack
page read and write
4D90000
trusted library allocation
page execute and read and write
50D0000
trusted library allocation
page read and write
578E000
stack
page read and write
9FCC000
stack
page read and write
6E10000
trusted library allocation
page execute and read and write
4DA0000
trusted library allocation
page read and write
5E6E000
stack
page read and write
2983000
trusted library allocation
page read and write
7B0000
trusted library allocation
page read and write
A78000
heap
page read and write
C20000
heap
page read and write
C3E000
stack
page read and write
AB0000
heap
page read and write
4B0D000
stack
page read and write
5FF0000
trusted library allocation
page read and write
B78E000
stack
page read and write
6BCE000
stack
page read and write
6CDF000
stack
page read and write
760000
trusted library allocation
page read and write
4D80000
trusted library section
page readonly
844000
heap
page read and write
AB0000
trusted library allocation
page read and write
3BAE000
trusted library allocation
page read and write
A53000
trusted library allocation
page execute and read and write
B30000
heap
page read and write
2688000
trusted library allocation
page read and write
AF8000
heap
page read and write
72F4000
heap
page read and write
529000
stack
page read and write
1B42000
trusted library allocation
page read and write
269A000
trusted library allocation
page read and write
65F0000
heap
page read and write
2910000
heap
page read and write
2B8F000
stack
page read and write
6D37000
trusted library allocation
page read and write
6CEA000
heap
page read and write
15E0000
heap
page read and write
2975000
trusted library allocation
page read and write
296B000
trusted library allocation
page read and write
6EE0F000
unkown
page readonly
708B000
heap
page read and write
BAB000
trusted library allocation
page execute and read and write
86AD000
stack
page read and write
458E000
stack
page read and write
4C5B000
stack
page read and write
B70000
trusted library allocation
page read and write
2977000
trusted library allocation
page read and write
88A000
stack
page read and write
4D20000
trusted library allocation
page execute and read and write
AE0000
trusted library allocation
page read and write
11E0000
heap
page read and write
2698000
trusted library allocation
page read and write
E50000
heap
page read and write
2746000
trusted library allocation
page read and write
5345000
trusted library allocation
page read and write
A40000
trusted library allocation
page read and write
79B000
trusted library allocation
page execute and read and write
703E000
stack
page read and write
2694000
trusted library allocation
page read and write
A94000
trusted library allocation
page read and write
8C9000
heap
page read and write
4CB0000
trusted library allocation
page read and write
2F50000
heap
page read and write
AFE000
trusted library allocation
page read and write
355D000
stack
page read and write
28FE000
unkown
page read and write
F1C000
stack
page read and write
298B000
heap
page read and write
B42E000
stack
page read and write
A60000
trusted library allocation
page read and write
3D2000
unkown
page readonly
AB2000
heap
page read and write
4CC0000
heap
page execute and read and write
5380000
trusted library allocation
page read and write
15D0000
trusted library allocation
page read and write
2D10000
heap
page read and write
2E49000
trusted library allocation
page read and write
810000
heap
page read and write
453E000
stack
page read and write
45F1000
trusted library allocation
page read and write
BA0000
trusted library allocation
page read and write
2631000
trusted library allocation
page read and write
65AF000
stack
page read and write
4DB0000
trusted library allocation
page execute and read and write
35D0000
heap
page read and write
3A28000
trusted library allocation
page read and write
2692000
trusted library allocation
page read and write
60AE000
stack
page read and write
8F6000
stack
page read and write
F57000
heap
page read and write
4E90000
trusted library allocation
page execute and read and write
A80000
trusted library allocation
page read and write
B38000
heap
page read and write
15E8000
heap
page read and write
298B000
trusted library allocation
page read and write
2800000
trusted library allocation
page read and write
5210000
heap
page read and write
2686000
trusted library allocation
page read and write
1574000
trusted library allocation
page read and write
5640000
heap
page read and write
BD0000
trusted library allocation
page execute and read and write
6EDF0000
unkown
page readonly
342E000
stack
page read and write
750000
trusted library allocation
page read and write
267C000
trusted library allocation
page read and write
2E35000
trusted library allocation
page read and write
2EEA000
stack
page read and write
5A10000
trusted library allocation
page read and write
375E000
trusted library allocation
page read and write
61EF000
stack
page read and write
38E8000
trusted library allocation
page read and write
43C000
remote allocation
page execute and read and write
57B0000
trusted library allocation
page read and write
6435000
trusted library allocation
page read and write
There are 645 hidden memdumps, click here to show them.