IOC Report
PROD_Start_DriverPack.hta

loading gif

Files

File Path
Type
Category
Malicious
PROD_Start_DriverPack.hta
HTML document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
initial sample
malicious
C:\Users\user\AppData\Local\Microsoft\Internet Explorer\MSIMGSIZ.DAT
data
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\3D003UC5\matomo[1].htm
ASCII text, with no line terminators
modified
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\YLNGKWRH\client_ip[1].js
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\YLNGKWRH\missing-scripts-detector[1].js
Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\YLNGKWRH\step1_av[1].htm
HTML document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\YLNGKWRH\style[1].css
Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\ZJCZETOO\1[1].js
Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\ZJCZETOO\2[1].js
Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\ZJCZETOO\3[1].js
Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\ZJCZETOO\4[1].js
Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\ZJCZETOO\5[1].js
Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\ZJCZETOO\background[1].jpg
JPEG image data, JFIF standard 1.01, resolution (DPI), density 72x72, segment length 16, baseline, precision 8, 1400x700, components 3
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\ZJCZETOO\lang[1].js
HTML document, Unicode text, UTF-8 (with BOM) text, with very long lines (399), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\ZJCZETOO\matomo[1].htm
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\ZJCZETOO\script[1].js
Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\ZJCZETOO\statistics[1].js
Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
dropped
There are 7 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Windows\SysWOW64\mshta.exe
mshta.exe "C:\Users\user\Desktop\PROD_Start_DriverPack.hta"
malicious
C:\Windows\System32\wbem\WmiPrvSE.exe
C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding

URLs

Name
IP
Malicious
http://dwrapper-prod.herokuapp.com/bin/src/missing-scripts-detector.js
46.137.15.86
malicious
http://dwrapper-prod.herokuapp.com/bin/src/variables/5.js
46.137.15.86
malicious
http://dwrapper-prod.herokuapp.com/bin/src/script.js
46.137.15.86
malicious
http://dwrapper-prod.herokuapp.com/bin/src/statistics.js
46.137.15.86
malicious
http://dwrapper-prod.herokuapp.com/bin/src/style.css
46.137.15.86
malicious
http://dwrapper-prod.herokuapp.com/client_ip.js
46.137.15.86
malicious
http://dwrapper-prod.herokuapp.com/bin/src/lang.js
46.137.15.86
malicious
http://dwrapper-prod.herokuapp.com/bin/src/variables/3.js
46.137.15.86
malicious
http://dwrapper-prod.herokuapp.com/bin/step1_av.html
46.137.15.86
malicious
http://dwrapper-prod.herokuapp.com/bin/src/variables/4.js
46.137.15.86
malicious
http://dwrapper-prod.herokuapp.com/bin/src/variables/1.js
46.137.15.86
malicious
http://dwrapper-prod.herokuapp.com/bin/src/variables/2.js
46.137.15.86
malicious
http://dwrapper-prod.herokuapp.com/bin/img/background.jpg
46.137.15.86
malicious
http://exampledd.matomo.cloud/F
unknown
http://dwrapper-prod.herokuapp.com/bin/src/lang.js(
unknown
http://dwrapper-prod.herokuapp.com/bin/step1_av.htmlHKLM
unknown
http://dwrapper-prod.herokuapp.com/bin/src/variables/4.js_
unknown
http://dwrapper-prod.herokuapp.com/bin/src/script.js8B
unknown
http://dwrapper-prod.herokuapp.com/bin/src/variables/3.jsI4
unknown
http://dwrapper-prod.herokuapp.com/bin/step1_av.htmlC:
unknown
http://dwrapper-prod.herokuapp.com/bin/src/statistics.jsate
unknown
http://dwrapper-prod.herokuapp.com/bin/src/variables/2.js;
unknown
http://dwrapper-prod.herokuapp.com/bin/src/variables/3.jsenu
unknown
http://exampledd.matomo.cloud/
unknown
http://dwrapper-prod.herokuapp.com/bin/step1_av.htmll)B
unknown
http://dwrapper-prod.herokuapp.com/bin/src/variables/2.jsu
unknown
http://dwrapper-prod.herokuapp.com/bin/src/variables/4.jsI
unknown
http://dwrapper-prod.herokuapp.com/bin/step1_av.html)B
unknown
http://dwrapper-prod.herokuapp.com/bin/img/background.jpg2
unknown
http://exampledd.matomo.cloud/matomo.php?idsite=1&rec=1&rand=3535895&apiv=1&cookie=1&bots=1&res=1280x1024&h=9&m=58&s=28&uid=8118157522024418&e_c=Wrapper%20%2F%20Errors%20%2F%20Missing%20scripts&e_a=%D0%92%D1%81%D0%B5%20%D1%81%D0%BA%D1%80%D0%B8%D0%BF%D1%82%D1%8B%20%D1%83%D1%81%D0%BF%D0%B5%D1%88%D0%BD%D0%BE%20%D0%B7%D0%B0%D0%B3%D1%80%D1%83%D0%B7%D0%B8%D0%BB%D0%B8%D1%81%D1%8C&e_n=&e_v=&ca=1
3.126.133.169
http://dwrapper-prod.herokuapp.com/bin/src/script.jsnEr
unknown
http://dwrapper-prod.herokuapp.com/bin/step1_av.htmlhta
unknown
http://dwrapper-prod.herokuapp.com/bin/src/variables/4.js?
unknown
https://my-domain.com
unknown
http://dwrapper-prod.herokuapp.com/bin/src/variables/5.jsC:
unknown
http://dwrapper-prod.herokuapp.com/bin/src/lang.jsG
unknown
http://dwrapper-prod.herokuapp.com/bin/src/variables/4.js94
unknown
http://dwrapper-prod.herokuapp.com/client_ip.jsng-scripts-detector.js
unknown
http://dwrapper-prod.herokuapp.com/bin/src/variables/5.js/
unknown
http://dwrapper-prod.herokuapp.com/bin/step1_av.html9E
unknown
http://dwrapper-prod.herokuapp.com/bin/src/lang.jsC:
unknown
http://dwrapper-prod.herokuapp.com/bin/src/variables/5.jshttp://dwrapper-prod.herokuapp.com/bin/src/
unknown
http://dwrapper-prod.herokuapp.com/bin/src/statistics.js)7
unknown
https://my-domain.com&queuedtracking=0&apiv=1&cookie=1&bots=1z
unknown
https://nel.heroku.com/reports?ts=1713427107&sid=812dcc77-0bd0-43b1-a5f1-b25750382959&s=ob
unknown
http://dwrapper-prod.herokuapp.com/bin/src/missing-scripts-detector.js/html
unknown
http://dwrapper-prod.herokuapp.com/bin/step1_av.html3
unknown
http://dwrapper-prod.herokuapp.com/bin/src/statistics.jssV
unknown
http://exampledd.matomo.cloud/matomo.php
unknown
http://dwrapper-prod.herokuapp.com/bin/src/variables/1.js&
unknown
http://dwrapper-prod.herokuapp.com/bin/step1_av.htmlA
unknown
http://exampledd.matomo.cloud/matomo.php?idsite=1&rec=1&rand=5523935&apiv=1&cookie=1&bots=1&res=1280x1024&h=9&m=58&s=28&uid=8118157522024418&action_name=Wrapper%20%2F%20Start%20screen%20page&url=https%3A%2F%2Fmy-domain.com%2Fstart_screen.html
3.126.133.169
http://dwrapper-prod.herokuapp.com/bin/src/lang.jss
unknown
http://dwrapper-prod.herokuapp.com/bin/step1_av.html~9
unknown
http://dwrapper-prod.herokuapp.com/bin/src/lang.jsJK
unknown
http://dwrapper-prod.herokuapp.com/bin/src/variables/1.js-detector.js
unknown
http://dwrapper-prod.herokuapp.com/bin/src/variables/1.js6
unknown
http://dwrapper-prod.herokuapp.com/bin/src/variables/5.jsDV
unknown
http://dwrapper-prod.herokuapp.com/bin/src/script.jsoC:
unknown
http://dwrapper-prod.herokuapp.com/bin/src/variables/3.jsbV
unknown
http://dwrapper-prod.herokuapp.com/bin/src/script.js5.jsSE7
unknown
http://exampledd.matomo.cloud/matomo.php?idsite=1&rec=1&rand=5523935&apiv=1&cookie=1&bots=1&res=1280
unknown
http://dwrapper-prod.herokuapp.com/bin/step1_av.htmlb
unknown
http://dwrapper-prod.herokuapp.com/bin/img/background.jpg94
unknown
http://dwrapper-prod.herokuapp.com/bin/src/style.csshta
unknown
http://dwrapper-prod.herokuapp.com/bin/src/missing-scripts-detector.jsN
unknown
http://dwrapper-prod.herokuapp.com/bin/step1_av.htmlf
unknown
http://dwrapper-prod.herokuapp.com/bin/src/variables/1.js;
unknown
http://dwrapper-prod.herokuapp.com/client_ip.jshtmlhta#
unknown
http://dwrapper-prod.herokuapp.com/bin/src/statistics.js_
unknown
http://dwrapper-prod.herokuapp.com/bin/img/background.jpgI2
unknown
http://dwrapper-prod.herokuapp.com/bin/step1_av.htmlv
unknown
http://dwrapper-prod.herokuapp.com/bin/src/style.cssu
unknown
http://dwrapper-prod.herokuapp.com/bin/src/style.cssl
unknown
http://dwrapper-prod.herokuapp.com/bin/step1_av.htmlh
unknown
http://dwrapper-prod.herokuapp.com/bin/step1_av.htmll
unknown
http://dwrapper-prod.herokuapp.com/bin/src/statistics.jso
unknown
http://dwrapper-prod.herokuapp.com/bin/src/missing-scripts-detector.jsp
unknown
http://dwrapper-prod.herokuapp.com/bin/src/variables/1.jssC:
unknown
http://dwrapper-prod.herokuapp.com/bin/step1_av.htmll7B
unknown
http://dwrapper-prod.herokuapp.com/bin/step1_av.html~
unknown
http://dwrapper-prod.herokuapp.com/client_ip.js7
unknown
http://dwrapper-prod.herokuapp.com/bin/src/missing-scripts-detector.jst
unknown
http://dwrapper-prod.herokuapp.com/bin/src/variables/3.jsK
unknown
http://dwrapper-prod.herokuapp.com/bin/src/variables/1.jsk
unknown
https://nel.heroku.com/reports
unknown
http://dwrapper-prod.herokuapp.com/client_ip.js&
unknown
http://dwrapper-prod.herokuapp.com/bin/src/variables/3.js3H
unknown
http://exampledd.matomo.cloud/matomo.php?idsite=1&rec=1&rand=3535895&apiv=1&cookie=1&bots=1&res=1280
unknown
http://dwrapper-prod.herokuapp.com/bin/src/style.cssD
unknown
http://emojipedia-us.s3.dualstack.us-west-1.amazonaws.com/thumbs/240/apple/285/white-heavy-check-mar
unknown
http://dwrapper-prod.herokuapp.com/bin/src/variables/2.jssV
unknown
http://dwrapper-prod.herokuapp.com/bin/src/variables/5.jsrtcuts
unknown
https://developer.matomo.org/api-reference/tracking-api
unknown
http://dwrapper-prod.herokuapp.com/bin/src/variables/5.jsy4l
unknown
http://dwrapper-prod.herokuapp.m/bin/step1_av.html
unknown
http://dwrapper-prod.herokuapp.com/bin/src/variables/3.jshttp://dwrapper-prod.herokuapp.com/bin/src/
unknown
http://dwrapper-prod.herokuapp.com/
unknown
http://dwrapper-prod.herokuapp.com/bin/img/background.jpgcal
unknown
http://dwrapper-prod.herokuapp.com/client_ip.jsPack.hta8
unknown
There are 90 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
dwrapper-prod.herokuapp.com
46.137.15.86
malicious
exampledd.matomo.cloud
3.126.133.169

IPs

IP
Domain
Country
Malicious
46.137.15.86
dwrapper-prod.herokuapp.com
Ireland
malicious
3.126.133.169
exampledd.matomo.cloud
United States

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\SOFTWARE\dwrapper
clientID
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\DirectDraw\MostRecentApplication
Name
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\DirectDraw\MostRecentApplication
ID

Memdumps

Base Address
Regiontype
Protect
Malicious
98EC000
trusted library allocation
page read and write
879B000
trusted library allocation
page read and write
4FE7000
trusted library allocation
page read and write
8847000
trusted library allocation
page read and write
658F000
heap
page read and write
2E47000
heap
page read and write
63F7000
heap
page read and write
65A1000
heap
page read and write
90A2000
trusted library allocation
page read and write
658E000
heap
page read and write
6597000
heap
page read and write
500C000
trusted library allocation
page read and write
C4A0000
trusted library allocation
page read and write
6592000
heap
page read and write
653E000
heap
page read and write
6597000
heap
page read and write
C5B5000
trusted library allocation
page read and write
B16E000
stack
page read and write
90A4000
trusted library allocation
page read and write
63FC000
heap
page read and write
98EA000
trusted library allocation
page read and write
659B000
heap
page read and write
4FCC000
trusted library allocation
page read and write
2E50000
heap
page read and write
659E000
heap
page read and write
91A8000
heap
page read and write
8FA2000
trusted library allocation
page read and write
6597000
heap
page read and write
6597000
heap
page read and write
659E000
heap
page read and write
98E5000
trusted library allocation
page read and write
29C9000
stack
page read and write
6467000
heap
page read and write
6467000
heap
page read and write
9195000
heap
page read and write
658E000
heap
page read and write
8847000
trusted library allocation
page read and write
6597000
heap
page read and write
658E000
heap
page read and write
645C000
heap
page read and write
6585000
heap
page read and write
7F431000
trusted library allocation
page execute read
6576000
heap
page read and write
6467000
heap
page read and write
658F000
heap
page read and write
AD6F000
stack
page read and write
6596000
heap
page read and write
64A6000
heap
page read and write
6492000
heap
page read and write
9111000
heap
page read and write
9247000
heap
page read and write
658F000
heap
page read and write
8836000
trusted library allocation
page read and write
658F000
heap
page read and write
879B000
trusted library allocation
page read and write
657F000
heap
page read and write
657D000
heap
page read and write
63B0000
heap
page read and write
659E000
heap
page read and write
4DCA000
heap
page read and write
8FB4000
trusted library allocation
page read and write
658F000
heap
page read and write
6575000
heap
page read and write
2D30000
heap
page read and write
658E000
heap
page read and write
659E000
heap
page read and write
87DE000
stack
page read and write
8FCC000
trusted library allocation
page read and write
501A000
trusted library allocation
page read and write
659E000
heap
page read and write
3210000
heap
page read and write
8795000
trusted library allocation
page read and write
7F401000
trusted library allocation
page execute read
4FB8000
trusted library allocation
page read and write
2DFA000
heap
page read and write
65A1000
heap
page read and write
654F000
heap
page read and write
7F411000
trusted library allocation
page execute read
991E000
trusted library allocation
page read and write
6457000
heap
page read and write
65A1000
heap
page read and write
6576000
heap
page read and write
6583000
heap
page read and write
659E000
heap
page read and write
659E000
heap
page read and write
31D0000
trusted library allocation
page read and write
8844000
trusted library allocation
page read and write
2E5E000
heap
page read and write
659E000
heap
page read and write
509A000
trusted library allocation
page read and write
657F000
heap
page read and write
8847000
trusted library allocation
page read and write
65A1000
heap
page read and write
4FC0000
trusted library allocation
page read and write
9247000
heap
page read and write
884E000
trusted library allocation
page read and write
C4F8000
trusted library allocation
page read and write
C4F2000
trusted library allocation
page read and write
6576000
heap
page read and write
C622000
trusted library allocation
page read and write
657D000
heap
page read and write
8FF0000
trusted library allocation
page execute
A9B0000
trusted library allocation
page read and write
658F000
heap
page read and write
6597000
heap
page read and write
89D0000
trusted library allocation
page read and write
657D000
heap
page read and write
6597000
heap
page read and write
6558000
heap
page read and write
6467000
heap
page read and write
500E000
trusted library allocation
page read and write
91D1000
heap
page read and write
6580000
heap
page read and write
657D000
heap
page read and write
6597000
heap
page read and write
6451000
heap
page read and write
5064000
trusted library allocation
page read and write
5018000
trusted library allocation
page read and write
63FC000
heap
page read and write
7F450000
trusted library allocation
page execute read
658F000
heap
page read and write
6591000
heap
page read and write
8794000
trusted library allocation
page read and write
640B000
heap
page read and write
6558000
heap
page read and write
658F000
heap
page read and write
8BDE000
stack
page read and write
6580000
heap
page read and write
C4D2000
trusted library allocation
page read and write
65A1000
heap
page read and write
C3C0000
trusted library allocation
page read and write
A9A0000
trusted library allocation
page read and write
9916000
trusted library allocation
page read and write
98E6000
trusted library allocation
page read and write
2E52000
heap
page read and write
90A9000
trusted library allocation
page read and write
65A1000
heap
page read and write
8FBE000
trusted library allocation
page read and write
659E000
heap
page read and write
658F000
heap
page read and write
ADAE000
stack
page read and write
6555000
heap
page read and write
C3C2000
trusted library allocation
page read and write
8FC7000
trusted library allocation
page read and write
6597000
heap
page read and write
658F000
heap
page read and write
6580000
heap
page read and write
6597000
heap
page read and write
31D4000
trusted library allocation
page read and write
658F000
heap
page read and write
6594000
heap
page read and write
6580000
heap
page read and write
AAEF000
stack
page read and write
65A1000
heap
page read and write
657D000
heap
page read and write
2E58000
heap
page read and write
6588000
heap
page read and write
645C000
heap
page read and write
2D35000
heap
page read and write
6597000
heap
page read and write
31D5000
trusted library allocation
page read and write
659E000
heap
page read and write
8845000
trusted library allocation
page read and write
505A000
trusted library allocation
page read and write
90AD000
trusted library allocation
page read and write
C620000
trusted library allocation
page read and write
6597000
heap
page read and write
5860000
trusted library allocation
page read and write
C692000
heap
page read and write
879B000
trusted library allocation
page read and write
6580000
heap
page read and write
B3B0000
trusted library allocation
page read and write
6576000
heap
page read and write
90F5000
heap
page read and write
2E29000
heap
page read and write
658F000
heap
page read and write
624F000
stack
page read and write
4FEE000
trusted library allocation
page read and write
657F000
heap
page read and write
659E000
heap
page read and write
2E30000
heap
page read and write
5088000
trusted library allocation
page read and write
6451000
heap
page read and write
89B0000
trusted library allocation
page execute
654F000
heap
page read and write
AEEE000
stack
page read and write
6580000
heap
page read and write
C4B2000
trusted library allocation
page read and write
658F000
heap
page read and write
2E4E000
heap
page read and write
6467000
heap
page read and write
90AE000
trusted library allocation
page read and write
6576000
heap
page read and write
504A000
trusted library allocation
page read and write
8830000
trusted library allocation
page read and write
90DF000
trusted library allocation
page read and write
555D000
stack
page read and write
C5D0000
trusted library allocation
page read and write
2D90000
heap
page read and write
6576000
heap
page read and write
90A5000
trusted library allocation
page read and write
89C0000
trusted library section
page readonly
90B3000
trusted library allocation
page read and write
658F000
heap
page read and write
640B000
heap
page read and write
877D000
stack
page read and write
65A1000
heap
page read and write
659E000
heap
page read and write
C621000
trusted library allocation
page read and write
C623000
trusted library allocation
page read and write
658F000
heap
page read and write
924F000
heap
page read and write
4DD6000
heap
page read and write
90B3000
trusted library allocation
page read and write
2E41000
heap
page read and write
658F000
heap
page read and write
6576000
heap
page read and write
6597000
heap
page read and write
8FCD000
trusted library allocation
page read and write
C624000
trusted library allocation
page read and write
6594000
heap
page read and write
6597000
heap
page read and write
6597000
heap
page read and write
658F000
heap
page read and write
931B000
stack
page read and write
2DED000
heap
page read and write
9247000
heap
page read and write
C610000
trusted library allocation
page read and write
4FA0000
heap
page read and write
2E91000
heap
page read and write
8834000
trusted library allocation
page read and write
654F000
heap
page read and write
6597000
heap
page read and write
6591000
heap
page read and write
4DC2000
heap
page read and write
659E000
heap
page read and write
8FA9000
trusted library allocation
page read and write
941E000
stack
page read and write
6576000
heap
page read and write
658F000
heap
page read and write
5081000
trusted library allocation
page read and write
5000000
trusted library allocation
page read and write
91C0000
heap
page read and write
65A1000
heap
page read and write
6459000
heap
page read and write
645E000
heap
page read and write
6500000
heap
page read and write
6555000
heap
page read and write
2E6D000
heap
page read and write
8FB3000
trusted library allocation
page read and write
6576000
heap
page read and write
659B000
heap
page read and write
6585000
heap
page read and write
8791000
trusted library allocation
page read and write
6597000
heap
page read and write
90E0000
heap
page read and write
C600000
trusted library allocation
page read and write
321A000
heap
page read and write
6580000
heap
page read and write
2E70000
heap
page read and write
8798000
trusted library allocation
page read and write
C626000
trusted library allocation
page read and write
90C0000
trusted library allocation
page read and write
6580000
heap
page read and write
658F000
heap
page read and write
65A1000
heap
page read and write
882F000
stack
page read and write
2DA0000
heap
page read and write
91E5000
heap
page read and write
6575000
heap
page read and write
6580000
heap
page read and write
65A1000
heap
page read and write
659E000
heap
page read and write
879B000
trusted library allocation
page read and write
5035000
trusted library allocation
page read and write
90CA000
trusted library allocation
page read and write
91C0000
heap
page read and write
90B3000
trusted library allocation
page read and write
4D90000
heap
page read and write
6591000
heap
page read and write
62AD000
stack
page read and write
90DD000
trusted library allocation
page read and write
5048000
trusted library allocation
page read and write
9178000
heap
page read and write
659E000
heap
page read and write
C660000
heap
page read and write
65B1000
heap
page read and write
4D20000
heap
page read and write
509E000
trusted library allocation
page read and write
658F000
heap
page read and write
6597000
heap
page read and write
4F90000
heap
page read and write
65A4000
heap
page read and write
6597000
heap
page read and write
6580000
heap
page read and write
6492000
heap
page read and write
884E000
trusted library allocation
page read and write
90B3000
trusted library allocation
page read and write
90B3000
trusted library allocation
page read and write
90B3000
trusted library allocation
page read and write
7F421000
trusted library allocation
page execute read
8E80000
heap
page read and write
659E000
heap
page read and write
6543000
heap
page read and write
6578000
heap
page read and write
6580000
heap
page read and write
C5E0000
trusted library allocation
page read and write
614E000
stack
page read and write
90D9000
trusted library allocation
page read and write
6585000
heap
page read and write
658F000
heap
page read and write
657F000
heap
page read and write
4FBE000
trusted library allocation
page read and write
657C000
heap
page read and write
90B3000
trusted library allocation
page read and write
65A9000
heap
page read and write
6575000
heap
page read and write
6576000
heap
page read and write
8FCE000
trusted library allocation
page read and write
8798000
trusted library allocation
page read and write
5016000
trusted library allocation
page read and write
91B0000
heap
page read and write
990C000
trusted library allocation
page read and write
90B3000
trusted library allocation
page read and write
31D4000
trusted library allocation
page read and write
98E0000
trusted library allocation
page read and write
658F000
heap
page read and write
65A1000
heap
page read and write
91DF000
heap
page read and write
5088000
trusted library allocation
page read and write
657F000
heap
page read and write
8785000
trusted library allocation
page read and write
2CF7000
stack
page read and write
879B000
trusted library allocation
page read and write
6582000
heap
page read and write
65A1000
heap
page read and write
4FF4000
trusted library allocation
page read and write
508A000
trusted library allocation
page read and write
6416000
heap
page read and write
6467000
heap
page read and write
6597000
heap
page read and write
951C000
trusted library allocation
page read and write
65A1000
heap
page read and write
509A000
trusted library allocation
page read and write
65A1000
heap
page read and write
657D000
heap
page read and write
4DA0000
heap
page read and write
545B000
stack
page read and write
5009000
trusted library allocation
page read and write
90B3000
trusted library allocation
page read and write
5020000
trusted library allocation
page read and write
C625000
trusted library allocation
page read and write
8CDF000
stack
page read and write
65A1000
heap
page read and write
B12F000
stack
page read and write
879B000
trusted library allocation
page read and write
884E000
trusted library allocation
page read and write
8FCB000
trusted library allocation
page read and write
6555000
heap
page read and write
6580000
heap
page read and write
98E8000
trusted library allocation
page read and write
6588000
heap
page read and write
8FBB000
trusted library allocation
page read and write
6597000
heap
page read and write
659E000
heap
page read and write
5088000
trusted library allocation
page read and write
8791000
trusted library allocation
page read and write
657D000
heap
page read and write
6580000
heap
page read and write
90A6000
trusted library allocation
page read and write
4F0D000
stack
page read and write
6558000
heap
page read and write
90C7000
trusted library allocation
page read and write
658E000
heap
page read and write
51DB000
stack
page read and write
8FE0000
heap
page read and write
640B000
heap
page read and write
659E000
heap
page read and write
509E000
trusted library allocation
page read and write
90B3000
trusted library allocation
page read and write
658F000
heap
page read and write
657F000
heap
page read and write
63FC000
heap
page read and write
6592000
heap
page read and write
657D000
heap
page read and write
6597000
heap
page read and write
6575000
heap
page read and write
6570000
heap
page read and write
AC2F000
stack
page read and write
657F000
heap
page read and write
6452000
heap
page read and write
658F000
heap
page read and write
6510000
heap
page read and write
8FC5000
trusted library allocation
page read and write
658E000
heap
page read and write
658F000
heap
page read and write
6576000
heap
page read and write
657D000
heap
page read and write
659E000
heap
page read and write
6492000
heap
page read and write
658F000
heap
page read and write
2DB2000
heap
page read and write
65A1000
heap
page read and write
6492000
heap
page read and write
64AA000
heap
page read and write
6576000
heap
page read and write
658F000
heap
page read and write
509E000
trusted library allocation
page read and write
65A1000
heap
page read and write
879A000
trusted library allocation
page read and write
6576000
heap
page read and write
6594000
heap
page read and write
6492000
heap
page read and write
658A000
heap
page read and write
B2AE000
stack
page read and write
98E7000
trusted library allocation
page read and write
645C000
heap
page read and write
658F000
heap
page read and write
9909000
trusted library allocation
page read and write
65A1000
heap
page read and write
658F000
heap
page read and write
8FB8000
trusted library allocation
page read and write
645C000
heap
page read and write
659E000
heap
page read and write
658E000
heap
page read and write
63FA000
heap
page read and write
6591000
heap
page read and write
640B000
heap
page read and write
658F000
heap
page read and write
90B3000
trusted library allocation
page read and write
98E9000
trusted library allocation
page read and write
659E000
heap
page read and write
6580000
heap
page read and write
6580000
heap
page read and write
90E8000
heap
page read and write
6597000
heap
page read and write
4FC8000
trusted library allocation
page read and write
90B3000
trusted library allocation
page read and write
504C000
trusted library allocation
page read and write
879B000
trusted library allocation
page read and write
90C4000
trusted library allocation
page read and write
90B3000
trusted library allocation
page read and write
6591000
heap
page read and write
90B4000
trusted library allocation
page read and write
6578000
heap
page read and write
90AC000
trusted library allocation
page read and write
8780000
trusted library allocation
page read and write
AEAF000
stack
page read and write
C5B5000
trusted library allocation
page read and write
6594000
heap
page read and write
658F000
heap
page read and write
6537000
heap
page read and write
9247000
heap
page read and write
658F000
heap
page read and write
8847000
trusted library allocation
page read and write
65A1000
heap
page read and write
883B000
trusted library allocation
page read and write
91F5000
heap
page read and write
65A1000
heap
page read and write
6597000
heap
page read and write
4DC0000
heap
page read and write
4FD8000
trusted library allocation
page read and write
4F5F000
stack
page read and write
2DBF000
heap
page read and write
C5B2000
trusted library allocation
page read and write
2E45000
heap
page read and write
4DDF000
heap
page read and write
531B000
stack
page read and write
8FCA000
trusted library allocation
page read and write
52DD000
stack
page read and write
509A000
trusted library allocation
page read and write
657D000
heap
page read and write
C3C3000
trusted library allocation
page read and write
56DC000
stack
page read and write
65A1000
heap
page read and write
6580000
heap
page read and write
645C000
heap
page read and write
2E0B000
heap
page read and write
8847000
trusted library allocation
page read and write
659E000
heap
page read and write
90A3000
trusted library allocation
page read and write
657D000
heap
page read and write
90FA000
heap
page read and write
4DE1000
heap
page read and write
65A1000
heap
page read and write
90B3000
trusted library allocation
page read and write
659E000
heap
page read and write
6451000
heap
page read and write
8FBA000
trusted library allocation
page read and write
8783000
trusted library allocation
page read and write
6597000
heap
page read and write
6551000
heap
page read and write
90B3000
trusted library allocation
page read and write
6576000
heap
page read and write
B02E000
stack
page read and write
4FF8000
trusted library allocation
page read and write
508C000
trusted library allocation
page read and write
4DD0000
heap
page read and write
884E000
trusted library allocation
page read and write
9234000
heap
page read and write
6597000
heap
page read and write
B26F000
stack
page read and write
AC6E000
stack
page read and write
6576000
heap
page read and write
8798000
trusted library allocation
page read and write
659E000
heap
page read and write
65A1000
heap
page read and write
65A1000
heap
page read and write
9900000
trusted library allocation
page read and write
879B000
trusted library allocation
page read and write
65A1000
heap
page read and write
65A1000
heap
page read and write
658F000
heap
page read and write
AFEF000
stack
page read and write
659E000
heap
page read and write
5010000
trusted library allocation
page read and write
C5B0000
trusted library allocation
page read and write
8FC9000
trusted library allocation
page read and write
6597000
heap
page read and write
6451000
heap
page read and write
6576000
heap
page read and write
C3C1000
trusted library allocation
page read and write
659E000
heap
page read and write
8798000
trusted library allocation
page read and write
509A000
trusted library allocation
page read and write
65A1000
heap
page read and write
6555000
heap
page read and write
6597000
heap
page read and write
867E000
stack
page read and write
31F0000
trusted library allocation
page read and write
879E000
trusted library allocation
page read and write
659E000
heap
page read and write
90A0000
trusted library allocation
page read and write
5030000
trusted library allocation
page read and write
657F000
heap
page read and write
645C000
heap
page read and write
91B3000
heap
page read and write
91DF000
heap
page read and write
658F000
heap
page read and write
90D3000
trusted library allocation
page read and write
6597000
heap
page read and write
8845000
trusted library allocation
page read and write
C4A0000
trusted library allocation
page read and write
8845000
trusted library allocation
page read and write
2E49000
heap
page read and write
6522000
heap
page read and write
65A1000
heap
page read and write
5057000
trusted library allocation
page read and write
6580000
heap
page read and write
6558000
heap
page read and write
65AC000
heap
page read and write
657C000
heap
page read and write
659E000
heap
page read and write
91B0000
heap
page read and write
6580000
heap
page read and write
659E000
heap
page read and write
8FC6000
trusted library allocation
page read and write
90FD000
heap
page read and write
6556000
heap
page read and write
C640000
trusted library allocation
page execute
6596000
heap
page read and write
6580000
heap
page read and write
8FCF000
trusted library allocation
page read and write
569C000
stack
page read and write
658D000
heap
page read and write
63FA000
heap
page read and write
6576000
heap
page read and write
541F000
stack
page read and write
65A1000
heap
page read and write
658E000
heap
page read and write
5006000
trusted library allocation
page read and write
657D000
heap
page read and write
659E000
heap
page read and write
B3B0000
trusted library allocation
page read and write
917E000
heap
page read and write
2D40000
heap
page read and write
65A1000
heap
page read and write
AB2E000
stack
page read and write
8FB0000
trusted library allocation
page read and write
65A1000
heap
page read and write
657D000
heap
page read and write
658F000
heap
page read and write
509A000
trusted library allocation
page read and write
879E000
trusted library allocation
page read and write
658F000
heap
page read and write
884E000
trusted library allocation
page read and write
3216000
heap
page read and write
C600000
trusted library allocation
page read and write
9187000
heap
page read and write
65A1000
heap
page read and write
90B3000
trusted library allocation
page read and write
5014000
trusted library allocation
page read and write
CA60000
trusted library allocation
page read and write
8845000
trusted library allocation
page read and write
4DE6000
heap
page read and write
6576000
heap
page read and write
6588000
heap
page read and write
6590000
heap
page read and write
6492000
heap
page read and write
C5F0000
trusted library allocation
page read and write
31D4000
trusted library allocation
page read and write
65A4000
heap
page read and write
6580000
heap
page read and write
6459000
heap
page read and write
91CA000
heap
page read and write
65A1000
heap
page read and write
9249000
heap
page read and write
B3AF000
stack
page read and write
658F000
heap
page read and write
659E000
heap
page read and write
659E000
heap
page read and write
5064000
trusted library allocation
page read and write
2E55000
heap
page read and write
6594000
heap
page read and write
6578000
heap
page read and write
6597000
heap
page read and write
658F000
heap
page read and write
658F000
heap
page read and write
654D000
heap
page read and write
CA60000
heap
page read and write
659E000
heap
page read and write
658F000
heap
page read and write
657E000
heap
page read and write
6582000
heap
page read and write
8F90000
trusted library allocation
page read and write
91D0000
heap
page read and write
C5B5000
trusted library allocation
page read and write
65A1000
heap
page read and write
C609000
trusted library allocation
page read and write
6492000
heap
page read and write
659E000
heap
page read and write
8FA9000
trusted library allocation
page read and write
C3C1000
trusted library allocation
page read and write
659E000
heap
page read and write
509E000
trusted library allocation
page read and write
90B3000
trusted library allocation
page read and write
65A1000
heap
page read and write
657D000
heap
page read and write
898E000
stack
page read and write
6576000
heap
page read and write
6576000
heap
page read and write
9247000
heap
page read and write
C600000
trusted library allocation
page read and write
65A1000
heap
page read and write
63AD000
stack
page read and write
57DC000
stack
page read and write
C4DA000
trusted library allocation
page read and write
659E000
heap
page read and write
879B000
trusted library allocation
page read and write
509E000
trusted library allocation
page read and write
2E3E000
heap
page read and write
90B3000
trusted library allocation
page read and write
4D94000
heap
page read and write
6597000
heap
page read and write
2E43000
heap
page read and write
658F000
heap
page read and write
6476000
heap
page read and write
2DA7000
heap
page read and write
6594000
heap
page read and write
90A8000
trusted library allocation
page read and write
65A1000
heap
page read and write
6575000
heap
page read and write
65A1000
heap
page read and write
2E0E000
heap
page read and write
B534000
trusted library allocation
page read and write
98EB000
trusted library allocation
page read and write
6597000
heap
page read and write
65A1000
heap
page read and write
657D000
heap
page read and write
6576000
heap
page read and write
6597000
heap
page read and write
658F000
heap
page read and write
A9EE000
stack
page read and write
8799000
trusted library allocation
page read and write
7F441000
trusted library allocation
page execute read
5052000
trusted library allocation
page read and write
B552000
trusted library allocation
page read and write
6576000
heap
page read and write
90E1000
heap
page read and write
8FB7000
trusted library allocation
page read and write
888E000
stack
page read and write
659E000
heap
page read and write
90AA000
trusted library allocation
page read and write
658F000
heap
page read and write
5024000
trusted library allocation
page read and write
658F000
heap
page read and write
90B3000
trusted library allocation
page read and write
90A7000
trusted library allocation
page read and write
2E3A000
heap
page read and write
658F000
heap
page read and write
658F000
heap
page read and write
C5E0000
trusted library allocation
page read and write
8798000
trusted library allocation
page read and write
90AB000
trusted library allocation
page read and write
6578000
heap
page read and write
6597000
heap
page read and write
4FC4000
trusted library allocation
page read and write
645E000
heap
page read and write
C5B2000
trusted library allocation
page read and write
559C000
stack
page read and write
659E000
heap
page read and write
6586000
heap
page read and write
6558000
heap
page read and write
6476000
heap
page read and write
9206000
heap
page read and write
8FC8000
trusted library allocation
page read and write
4DD4000
heap
page read and write
659E000
heap
page read and write
8FBF000
trusted library allocation
page read and write
8798000
trusted library allocation
page read and write
509E000
trusted library allocation
page read and write
6576000
heap
page read and write
659E000
heap
page read and write
879B000
trusted library allocation
page read and write
6597000
heap
page read and write
919D000
heap
page read and write
There are 706 hidden memdumps, click here to show them.