IOC Report
DOCUMENTS OF OWNERSHIP AND PAYMENT REQUIREMENTS.exe

loading gif

Files

File Path
Type
Category
Malicious
DOCUMENTS OF OWNERSHIP AND PAYMENT REQUIREMENTS.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\DOCUMENTS OF OWNERSHIP AND PAYMENT REQUIREMENTS.exe.log
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\WIred1066.exe.log
CSV text
modified
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\word.exe.log
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Roaming\WIred1066\WIred1066.exe
PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
modified
\Device\ConDrv
ASCII text, with CRLF line terminators
dropped

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\DOCUMENTS OF OWNERSHIP AND PAYMENT REQUIREMENTS.exe
"C:\Users\user\Desktop\DOCUMENTS OF OWNERSHIP AND PAYMENT REQUIREMENTS.exe"
malicious
C:\Users\user\AppData\Local\Temp\word.exe
"C:\Users\user\AppData\Local\Temp\word.exe"
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe
"C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe
"C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"
malicious
C:\Users\user\AppData\Roaming\WIred1066\WIred1066.exe
"C:\Users\user\AppData\Roaming\WIred1066\WIred1066.exe"
malicious
C:\Users\user\AppData\Roaming\WIred1066\WIred1066.exe
"C:\Users\user\AppData\Roaming\WIred1066\WIred1066.exe"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1

URLs

Name
IP
Malicious
https://api.ipify.org/
104.26.12.205
http://www.apache.org/licenses/LICENSE-2.0
unknown
http://www.fontbureau.com
unknown
http://www.fontbureau.com/designersG
unknown
https://sectigo.com/CPS0
unknown
http://www.fontbureau.com/designers/?
unknown
http://www.founder.com.cn/cn/bThe
unknown
https://account.dyn.com/
unknown
http://www.fontbureau.com/designers?
unknown
http://www.w3.or
unknown
http://www.tiro.com
unknown
http://www.fontbureau.com/designers
unknown
http://www.goodfont.co.kr
unknown
https://api.ipify.org/t
unknown
http://cphost09.qhoster.net
unknown
http://www.carterandcone.coml
unknown
http://www.sajatypeworks.com
unknown
http://www.typography.netD
unknown
http://www.fontbureau.com/designers/cabarga.htmlN
unknown
http://www.founder.com.cn/cn/cThe
unknown
http://www.galapagosdesign.com/staff/dennis.htm
unknown
https://api.ipify.org
unknown
http://www.founder.com.cn/cn
unknown
http://www.fontbureau.com/designers/frere-user.html
unknown
http://www.jiyu-kobo.co.jp/
unknown
http://www.galapagosdesign.com/DPlease
unknown
http://www.fontbureau.com/designers8
unknown
http://www.fonts.com
unknown
http://www.sandoll.co.kr
unknown
http://www.urwpp.deDPlease
unknown
http://www.zhongyicts.com.cn
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
http://www.sakkal.com
unknown
There are 23 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
cphost09.qhoster.net
188.241.39.200
api.ipify.org
104.26.12.205

IPs

IP
Domain
Country
Malicious
104.26.12.205
api.ipify.org
United States
188.241.39.200
cphost09.qhoster.net
Belize

Registry

Path
Value
Malicious
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\InstallUtil_RASAPI32
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\InstallUtil_RASAPI32
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\InstallUtil_RASAPI32
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\InstallUtil_RASAPI32
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\InstallUtil_RASAPI32
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\InstallUtil_RASAPI32
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\InstallUtil_RASAPI32
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\InstallUtil_RASMANCS
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\InstallUtil_RASMANCS
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\InstallUtil_RASMANCS
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\InstallUtil_RASMANCS
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\InstallUtil_RASMANCS
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\InstallUtil_RASMANCS
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\InstallUtil_RASMANCS
FileDirectory
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
WIred1066
There are 6 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
28C1000
trusted library allocation
page read and write
malicious
3341000
trusted library allocation
page read and write
malicious
2FA2000
trusted library allocation
page read and write
malicious
46D6000
trusted library allocation
page read and write
malicious
45EE000
trusted library allocation
page read and write
malicious
2F9C000
trusted library allocation
page read and write
malicious
3693000
trusted library allocation
page read and write
malicious
44CE000
trusted library allocation
page read and write
malicious
622000
remote allocation
page execute and read and write
malicious
2F71000
trusted library allocation
page read and write
malicious
5A60000
trusted library section
page read and write
malicious
3A4E000
trusted library allocation
page read and write
malicious
3BDB000
trusted library allocation
page read and write
malicious
2F65000
trusted library allocation
page read and write
7B5B000
heap
page read and write
EEA000
heap
page read and write
2C9F000
trusted library allocation
page read and write
2D82000
trusted library allocation
page read and write
980000
trusted library allocation
page read and write
2EB0000
trusted library allocation
page read and write
2C19000
trusted library allocation
page read and write
2DF0000
trusted library allocation
page read and write
4FE000
heap
page read and write
DB4000
trusted library allocation
page read and write
67B0000
trusted library allocation
page execute and read and write
19D0000
trusted library allocation
page read and write
DE7000
trusted library allocation
page execute and read and write
38C1000
trusted library allocation
page read and write
2A97000
trusted library allocation
page read and write
2EE6000
trusted library allocation
page read and write
2B38000
trusted library allocation
page read and write
66E0000
trusted library allocation
page read and write
580F000
stack
page read and write
2EA3000
trusted library allocation
page read and write
768000
stack
page read and write
2D71000
trusted library allocation
page read and write
2EED000
trusted library allocation
page read and write
5B8D000
heap
page read and write
1850000
heap
page read and write
2DDC000
trusted library allocation
page read and write
2B80000
trusted library allocation
page read and write
A103000
trusted library allocation
page read and write
2886000
trusted library allocation
page read and write
29FF000
trusted library allocation
page read and write
2DB8000
trusted library allocation
page read and write
569D000
stack
page read and write
C3F000
unkown
page execute read
4DF3000
heap
page read and write
808E000
stack
page read and write
29B2000
trusted library allocation
page read and write
A02000
heap
page read and write
4FFE000
stack
page read and write
716E000
stack
page read and write
1868000
trusted library allocation
page read and write
5B0A000
heap
page read and write
7B54000
heap
page read and write
2AE3000
trusted library allocation
page read and write
565E000
stack
page read and write
5190000
heap
page read and write
1135000
trusted library allocation
page execute and read and write
53EE000
stack
page read and write
197E000
trusted library allocation
page read and write
333C000
heap
page read and write
2B04000
trusted library allocation
page read and write
C28000
unkown
page execute read
2BE8000
trusted library allocation
page read and write
2BC1000
trusted library allocation
page read and write
590E000
stack
page read and write
29F9000
trusted library allocation
page read and write
C4B000
unkown
page execute read
43B9000
trusted library allocation
page read and write
1137000
trusted library allocation
page execute and read and write
7B97000
heap
page read and write
C6D000
unkown
page execute read
2A9D000
trusted library allocation
page read and write
24EE000
stack
page read and write
2DB6000
trusted library allocation
page read and write
3F21000
trusted library allocation
page read and write
5A00000
heap
page read and write
E10000
trusted library allocation
page execute and read and write
17DB000
trusted library allocation
page execute and read and write
1158000
heap
page read and write
BCB000
trusted library allocation
page execute and read and write
2A6C000
trusted library allocation
page read and write
617C000
stack
page read and write
2E11000
trusted library allocation
page read and write
5248000
heap
page read and write
2E61000
trusted library allocation
page read and write
65BE000
stack
page read and write
1110000
trusted library allocation
page read and write
8B0000
heap
page read and write
1185000
heap
page read and write
116E000
heap
page read and write
2E97000
trusted library allocation
page read and write
FF0000
heap
page read and write
2E09000
trusted library allocation
page read and write
521C000
heap
page read and write
3074000
trusted library allocation
page read and write
2EFD000
trusted library allocation
page read and write
5CA5000
heap
page read and write
2884000
trusted library allocation
page read and write
17AD000
trusted library allocation
page execute and read and write
E70000
heap
page read and write
4A5C000
stack
page read and write
13E0000
heap
page read and write
6EE5000
heap
page read and write
158E000
heap
page read and write
7C55000
trusted library allocation
page read and write
7C32000
trusted library allocation
page read and write
2EFB000
trusted library allocation
page read and write
DEB000
trusted library allocation
page execute and read and write
2B0A000
trusted library allocation
page read and write
2C4F000
trusted library allocation
page read and write
2CE0000
trusted library allocation
page read and write
5A10000
trusted library allocation
page read and write
10F3000
trusted library allocation
page execute and read and write
2C45000
trusted library allocation
page read and write
2D33000
trusted library allocation
page read and write
32A0000
trusted library allocation
page read and write
420000
heap
page read and write
994000
trusted library allocation
page read and write
29F1000
trusted library allocation
page read and write
833E000
stack
page read and write
2D1A000
trusted library allocation
page read and write
7702000
trusted library allocation
page read and write
7374000
trusted library allocation
page read and write
2CD2000
trusted library allocation
page read and write
2A93000
trusted library allocation
page read and write
6730000
trusted library allocation
page execute and read and write
5C8E000
stack
page read and write
2CD6000
trusted library allocation
page read and write
2982000
trusted library allocation
page read and write
2EC6000
trusted library allocation
page read and write
52E0000
trusted library allocation
page execute and read and write
2B19000
trusted library allocation
page read and write
2F69000
trusted library allocation
page read and write
2D3F000
trusted library allocation
page read and write
7820000
trusted library allocation
page read and write
E6E000
stack
page read and write
17CA000
trusted library allocation
page execute and read and write
2C13000
trusted library allocation
page read and write
4EBE000
stack
page read and write
2DB4000
trusted library allocation
page read and write
2BD9000
trusted library allocation
page read and write
3751000
trusted library allocation
page read and write
DD0000
trusted library allocation
page read and write
F85000
heap
page read and write
5A4D000
stack
page read and write
2BDD000
trusted library allocation
page read and write
183E000
stack
page read and write
A20000
heap
page read and write
2987000
trusted library allocation
page read and write
2989000
trusted library allocation
page read and write
3B6E000
trusted library allocation
page read and write
BC2000
unkown
page execute read
76C0000
trusted library allocation
page execute and read and write
2AE5000
trusted library allocation
page read and write
20B0000
trusted library allocation
page read and write
2A1C000
trusted library allocation
page read and write
FE0000
heap
page read and write
1661000
heap
page read and write
2B34000
trusted library allocation
page read and write
501D000
stack
page read and write
17D2000
trusted library allocation
page read and write
2B32000
trusted library allocation
page read and write
80CB000
stack
page read and write
397B000
trusted library allocation
page read and write
274E000
stack
page read and write
2B36000
trusted library allocation
page read and write
BCA000
stack
page read and write
2AB4000
trusted library allocation
page read and write
5410000
heap
page read and write
2D10000
heap
page read and write
2E80000
trusted library allocation
page read and write
1790000
trusted library allocation
page read and write
20E0000
trusted library allocation
page read and write
29E8000
trusted library allocation
page read and write
10A0000
heap
page read and write
2F48000
trusted library allocation
page read and write
470000
heap
page read and write
2751000
trusted library allocation
page read and write
2B4F000
trusted library allocation
page read and write
2AEB000
trusted library allocation
page read and write
15F2000
heap
page read and write
480000
heap
page read and write
46D000
stack
page read and write
29FB000
trusted library allocation
page read and write
5B0C000
heap
page read and write
BC2000
unkown
page execute read
2F31000
trusted library allocation
page read and write
17A4000
trusted library allocation
page read and write
3459000
trusted library allocation
page read and write
2E07000
trusted library allocation
page read and write
4DBE000
stack
page read and write
7C35000
trusted library allocation
page read and write
2F03000
trusted library allocation
page read and write
7D0000
heap
page read and write
2EEA000
trusted library allocation
page read and write
2ABB000
trusted library allocation
page read and write
2DEC000
trusted library allocation
page read and write
5CE4000
heap
page read and write
DC0000
trusted library allocation
page read and write
74AE000
stack
page read and write
7380000
trusted library allocation
page read and write
2EE6000
trusted library allocation
page read and write
347F000
trusted library allocation
page read and write
1100000
trusted library allocation
page read and write
6700000
trusted library allocation
page execute and read and write
36A2000
trusted library allocation
page read and write
5A30000
heap
page read and write
2D6F000
trusted library allocation
page read and write
2A4E000
trusted library allocation
page read and write
67AD000
stack
page read and write
5390000
trusted library allocation
page execute and read and write
2E44000
trusted library allocation
page read and write
2150000
heap
page read and write
2AB6000
trusted library allocation
page read and write
4DE8000
trusted library allocation
page read and write
10F4000
trusted library allocation
page read and write
2A8F000
trusted library allocation
page read and write
7C40000
trusted library allocation
page execute and read and write
29F5000
trusted library allocation
page read and write
4C4E000
stack
page read and write
6545000
heap
page read and write
156E000
stack
page read and write
F89000
stack
page read and write
2BA9000
trusted library allocation
page read and write
3081000
trusted library allocation
page read and write
7C80000
trusted library allocation
page read and write
C5C000
unkown
page execute read
4D70000
heap
page execute and read and write
7B95000
heap
page read and write
2F16000
trusted library allocation
page read and write
2E0B000
trusted library allocation
page read and write
2F96000
trusted library allocation
page read and write
17BD000
trusted library allocation
page execute and read and write
EE7000
heap
page read and write
6280000
heap
page read and write
198D000
trusted library allocation
page read and write
4EFE000
stack
page read and write
AC000
stack
page read and write
1986000
trusted library allocation
page read and write
17D5000
trusted library allocation
page execute and read and write
EB1000
heap
page read and write
29C7000
trusted library allocation
page read and write
76D0000
trusted library allocation
page read and write
19A0000
trusted library allocation
page read and write
2CA0000
trusted library allocation
page read and write
20CB000
trusted library allocation
page execute and read and write
2CCA000
trusted library allocation
page read and write
5217000
heap
page read and write
2E1E000
trusted library allocation
page read and write
2A23000
trusted library allocation
page read and write
3C56000
trusted library allocation
page read and write
2B15000
trusted library allocation
page read and write
76A0000
trusted library allocation
page execute and read and write
BBA000
trusted library allocation
page execute and read and write
2F14000
trusted library allocation
page read and write
534C000
stack
page read and write
5350000
heap
page read and write
6710000
trusted library allocation
page read and write
2EA1000
trusted library allocation
page read and write
2BD1000
trusted library allocation
page read and write
2984000
trusted library allocation
page read and write
139E000
stack
page read and write
2CBA000
trusted library allocation
page read and write
2F56000
trusted library allocation
page read and write
52F0000
trusted library section
page readonly
2BEA000
trusted library allocation
page read and write
2EF9000
trusted library allocation
page read and write
4B1E000
stack
page read and write
2CB3000
trusted library allocation
page read and write
28A5000
trusted library allocation
page read and write
2530000
trusted library allocation
page execute and read and write
7F8E000
stack
page read and write
66C000
stack
page read and write
6C10000
heap
page read and write
2EB8000
trusted library allocation
page read and write
348C000
trusted library allocation
page read and write
2ED2000
trusted library allocation
page read and write
2AB9000
trusted library allocation
page read and write
2130000
trusted library allocation
page execute and read and write
2C36000
trusted library allocation
page read and write
35D0000
trusted library allocation
page read and write
117A000
heap
page read and write
307B000
trusted library allocation
page read and write
3330000
heap
page read and write
122D000
heap
page read and write
2E46000
trusted library allocation
page read and write
627E000
stack
page read and write
10FD000
trusted library allocation
page execute and read and write
2BAE000
trusted library allocation
page read and write
2B28000
trusted library allocation
page read and write
7362000
trusted library allocation
page read and write
4C1F000
stack
page read and write
11E2000
heap
page read and write
29CB000
trusted library allocation
page read and write
1150000
heap
page read and write
2EE0000
trusted library allocation
page read and write
7E4D000
stack
page read and write
2C90000
trusted library allocation
page execute and read and write
BA0000
trusted library allocation
page execute and read and write
C73000
unkown
page execute read
3436000
trusted library allocation
page read and write
52B0000
heap
page read and write
2ADF000
trusted library allocation
page read and write
C7E000
unkown
page execute read
4DBE000
trusted library allocation
page read and write
3509000
trusted library allocation
page read and write
892D000
stack
page read and write
7385000
trusted library allocation
page read and write
2A80000
trusted library allocation
page read and write
2A21000
trusted library allocation
page read and write
29B0000
trusted library allocation
page read and write
2880000
trusted library allocation
page read and write
5CE0000
heap
page read and write
2C75000
trusted library allocation
page read and write
F30000
heap
page read and write
2CD4000
trusted library allocation
page read and write
2AFC000
trusted library allocation
page read and write
2AE7000
trusted library allocation
page read and write
34F2000
trusted library allocation
page read and write
5BB9000
heap
page read and write
5C4D000
stack
page read and write
77F0000
trusted library section
page read and write
7BAE000
heap
page read and write
344C000
trusted library allocation
page read and write
993000
trusted library allocation
page execute and read and write
2AAC000
trusted library allocation
page read and write
BC0000
unkown
page readonly
2AAE000
trusted library allocation
page read and write
2F4A000
trusted library allocation
page read and write
2640000
heap
page execute and read and write
2A48000
trusted library allocation
page read and write
29CD000
trusted library allocation
page read and write
2A63000
trusted library allocation
page read and write
3320000
trusted library allocation
page read and write
702E000
stack
page read and write
2A99000
trusted library allocation
page read and write
2CEB000
trusted library allocation
page read and write
5284000
heap
page read and write
6740000
trusted library allocation
page read and write
2140000
trusted library allocation
page read and write
1116000
trusted library allocation
page execute and read and write
2D37000
trusted library allocation
page read and write
3918000
trusted library allocation
page read and write
5A50000
heap
page read and write
2890000
trusted library allocation
page read and write
2C9D000
trusted library allocation
page read and write
2B45000
trusted library allocation
page read and write
7C10000
trusted library allocation
page read and write
5ACE000
stack
page read and write
4FB0000
trusted library allocation
page read and write
857E000
stack
page read and write
4DA4000
trusted library allocation
page read and write
17C6000
trusted library allocation
page execute and read and write
38C9000
trusted library allocation
page read and write
7688000
trusted library allocation
page read and write
2BF2000
trusted library allocation
page read and write
5378000
trusted library allocation
page read and write
BF0000
heap
page read and write
14EE000
stack
page read and write
2E1F000
stack
page read and write
5AFA000
heap
page read and write
1981000
trusted library allocation
page read and write
5BC2000
heap
page read and write
73D0000
trusted library allocation
page read and write
12000
unkown
page readonly
78AE000
stack
page read and write
2C30000
trusted library allocation
page read and write
2600000
heap
page read and write
517F000
stack
page read and write
2A14000
trusted library allocation
page read and write
2A76000
trusted library allocation
page read and write
5CF4000
heap
page read and write
C23000
unkown
page execute read
2E7E000
trusted library allocation
page read and write
2AFE000
trusted library allocation
page read and write
C34000
unkown
page execute read
2AE1000
trusted library allocation
page read and write
2F05000
trusted library allocation
page read and write
34D9000
trusted library allocation
page read and write
5413000
heap
page read and write
29DC000
trusted library allocation
page read and write
2BBC000
trusted library allocation
page read and write
2E87000
trusted library allocation
page read and write
6510000
heap
page read and write
539C000
stack
page read and write
2B3C000
trusted library allocation
page read and write
2DD7000
trusted library allocation
page read and write
2B4D000
trusted library allocation
page read and write
2A69000
trusted library allocation
page read and write
2D84000
trusted library allocation
page read and write
2093000
trusted library allocation
page execute and read and write
2E9F000
trusted library allocation
page read and write
2D56000
trusted library allocation
page read and write
2CE5000
trusted library allocation
page read and write
3F31000
trusted library allocation
page read and write
5CCD000
heap
page read and write
209D000
trusted library allocation
page execute and read and write
34BF000
trusted library allocation
page read and write
4E0000
heap
page read and write
152E000
stack
page read and write
2CB0000
heap
page read and write
7810000
trusted library section
page read and write
1910000
heap
page execute and read and write
134E000
stack
page read and write
543C000
stack
page read and write
2C81000
trusted library allocation
page read and write
34CC000
trusted library allocation
page read and write
2D88000
trusted library allocation
page read and write
21C0000
heap
page execute and read and write
2A82000
trusted library allocation
page read and write
2BDB000
trusted library allocation
page read and write
2DF4000
trusted library allocation
page read and write
2E6B000
trusted library allocation
page read and write
4E00000
trusted library allocation
page read and write
3F83000
trusted library allocation
page read and write
8A2E000
stack
page read and write
2EE2000
trusted library allocation
page read and write
DD2000
trusted library allocation
page read and write
48CE000
stack
page read and write
2EEC000
trusted library allocation
page read and write
5DF0000
heap
page read and write
11C6000
heap
page read and write
2D4E000
trusted library allocation
page read and write
2AB2000
trusted library allocation
page read and write
17C0000
trusted library allocation
page read and write
2DBC000
trusted library allocation
page read and write
C8C000
unkown
page readonly
20BA000
trusted library allocation
page execute and read and write
4DD0000
trusted library allocation
page read and write
2F39000
trusted library allocation
page read and write
1900000
trusted library allocation
page read and write
E90000
heap
page read and write
2A8B000
trusted library allocation
page read and write
1218000
heap
page read and write
2D1E000
trusted library allocation
page read and write
910000
heap
page read and write
EF8000
stack
page read and write
350F000
trusted library allocation
page read and write
2CC8000
trusted library allocation
page read and write
2B30000
trusted library allocation
page read and write
1132000
trusted library allocation
page read and write
2830000
heap
page execute and read and write
2550000
heap
page read and write
925000
heap
page read and write
2B17000
trusted library allocation
page read and write
7680000
trusted library allocation
page read and write
308E000
trusted library allocation
page read and write
5272000
heap
page read and write
5360000
heap
page read and write
195B000
stack
page read and write
48D0000
heap
page execute and read and write
29FD000
trusted library allocation
page read and write
527B000
heap
page read and write
C2E000
unkown
page execute read
66F0000
trusted library allocation
page read and write
56DE000
stack
page read and write
2D3D000
trusted library allocation
page read and write
2C58000
trusted library allocation
page read and write
3C93000
trusted library allocation
page read and write
32FE000
stack
page read and write
2E4C000
trusted library allocation
page read and write
2A59000
trusted library allocation
page read and write
5240000
heap
page read and write
10E0000
trusted library allocation
page read and write
2F1A000
trusted library allocation
page read and write
2C60000
trusted library allocation
page read and write
1A8000
stack
page read and write
E8F000
heap
page read and write
76E0000
trusted library allocation
page read and write
2B06000
trusted library allocation
page read and write
2D52000
trusted library allocation
page read and write
2C86000
trusted library allocation
page read and write
2AEE000
trusted library allocation
page read and write
6719000
trusted library allocation
page read and write
8E0000
heap
page read and write
71AE000
stack
page read and write
15B5000
heap
page read and write
2B84000
trusted library allocation
page read and write
5400000
heap
page read and write
684E000
stack
page read and write
843E000
stack
page read and write
5380000
trusted library allocation
page read and write
2A03000
trusted library allocation
page read and write
2B53000
trusted library allocation
page read and write
A2F000
heap
page read and write
5A0F000
stack
page read and write
219C000
stack
page read and write
2A7E000
trusted library allocation
page read and write
E20000
heap
page read and write
2EB6000
trusted library allocation
page read and write
10F0000
trusted library allocation
page read and write
2E63000
trusted library allocation
page read and write
2BB6000
trusted library allocation
page read and write
2CE9000
trusted library allocation
page read and write
920000
heap
page read and write
5B07000
heap
page read and write
6720000
trusted library allocation
page read and write
488E000
stack
page read and write
9A0000
heap
page read and write
4E80000
trusted library allocation
page read and write
2F21000
trusted library allocation
page read and write
2A67000
trusted library allocation
page read and write
2A9B000
trusted library allocation
page read and write
2E9B000
trusted library allocation
page read and write
5214000
heap
page read and write
17B0000
trusted library allocation
page read and write
2DD9000
trusted library allocation
page read and write
2CCE000
trusted library allocation
page read and write
2E7C000
trusted library allocation
page read and write
2C3F000
trusted library allocation
page read and write
2B1B000
trusted library allocation
page read and write
A00000
heap
page read and write
277F000
trusted library allocation
page read and write
17F0000
trusted library allocation
page read and write
2B8A000
trusted library allocation
page read and write
2D73000
trusted library allocation
page read and write
3008000
trusted library allocation
page read and write
29D1000
trusted library allocation
page read and write
2CE7000
trusted library allocation
page read and write
2ABD000
trusted library allocation
page read and write
2E69000
trusted library allocation
page read and write
DA0000
trusted library allocation
page read and write
EE3000
heap
page read and write
2C2C000
trusted library allocation
page read and write
2C6E000
trusted library allocation
page read and write
2CAF000
trusted library allocation
page read and write
2F33000
trusted library allocation
page read and write
29AE000
trusted library allocation
page read and write
2B4B000
trusted library allocation
page read and write
2B9D000
trusted library allocation
page read and write
2C51000
trusted library allocation
page read and write
DDA000
trusted library allocation
page execute and read and write
22CE000
stack
page read and write
2B7A000
trusted library allocation
page read and write
2C3A000
trusted library allocation
page read and write
53A0000
heap
page read and write
66BE000
stack
page read and write
11CC000
heap
page read and write
4E20000
trusted library allocation
page read and write
19B0000
trusted library allocation
page read and write
52A0000
trusted library allocation
page read and write
4ADE000
stack
page read and write
5E00000
heap
page read and write
2788000
trusted library allocation
page read and write
518000
heap
page read and write
2F35000
trusted library allocation
page read and write
3939000
trusted library allocation
page read and write
2C62000
trusted library allocation
page read and write
2BA1000
trusted library allocation
page read and write
2FB8000
trusted library allocation
page read and write
22D1000
trusted library allocation
page read and write
653F000
heap
page read and write
2D18000
trusted library allocation
page read and write
5BA000
stack
page read and write
2F6D000
trusted library allocation
page read and write
2B1F000
trusted library allocation
page read and write
6EAB000
heap
page read and write
19C0000
trusted library allocation
page read and write
2B0F000
trusted library allocation
page read and write
4DC1000
trusted library allocation
page read and write
EF1000
heap
page read and write
28B7000
heap
page read and write
9D7000
heap
page read and write
2D76000
trusted library allocation
page read and write
4DF0000
heap
page read and write
2C7D000
trusted library allocation
page read and write
2DD1000
trusted library allocation
page read and write
6760000
trusted library allocation
page execute and read and write
E27000
heap
page read and write
446E000
stack
page read and write
5C90000
trusted library allocation
page execute and read and write
4E7E000
stack
page read and write
2A7C000
trusted library allocation
page read and write
2C47000
trusted library allocation
page read and write
17D7000
trusted library allocation
page execute and read and write
2A18000
trusted library allocation
page read and write
B7E000
stack
page read and write
2D35000
trusted library allocation
page read and write
2EB4000
trusted library allocation
page read and write
2A12000
trusted library allocation
page read and write
5CD0000
trusted library allocation
page execute and read and write
2E48000
trusted library allocation
page read and write
13E5000
heap
page read and write
20B7000
trusted library allocation
page execute and read and write
2ECB000
trusted library allocation
page read and write
7320000
trusted library allocation
page read and write
63FC000
stack
page read and write
4DA0000
trusted library allocation
page read and write
111A000
trusted library allocation
page execute and read and write
32D1000
trusted library allocation
page read and write
17A0000
trusted library allocation
page read and write
B9F000
stack
page read and write
3300000
trusted library allocation
page read and write
2C4B000
trusted library allocation
page read and write
7460000
trusted library allocation
page execute and read and write
2DBA000
trusted library allocation
page read and write
29C9000
trusted library allocation
page read and write
66D8000
trusted library allocation
page read and write
4DE0000
trusted library allocation
page read and write
2A1A000
trusted library allocation
page read and write
706E000
stack
page read and write
2DCF000
trusted library allocation
page read and write
5AD0000
heap
page read and write
2A95000
trusted library allocation
page read and write
7C24000
trusted library allocation
page read and write
5CC0000
heap
page read and write
2C68000
trusted library allocation
page read and write
1840000
trusted library allocation
page execute and read and write
12F7000
stack
page read and write
4DC6000
trusted library allocation
page read and write
D56D000
stack
page read and write
7AE000
stack
page read and write
2CCC000
trusted library allocation
page read and write
2540000
trusted library allocation
page read and write
13E0000
heap
page read and write
2BBA000
trusted library allocation
page read and write
2B8C000
trusted library allocation
page read and write
99D000
trusted library allocation
page execute and read and write
7F4D0000
trusted library allocation
page execute and read and write
17C2000
trusted library allocation
page read and write
2ECE000
trusted library allocation
page read and write
2D22000
trusted library allocation
page read and write
2B86000
trusted library allocation
page read and write
17D0000
trusted library allocation
page read and write
2C83000
trusted library allocation
page read and write
19E0000
heap
page read and write
2E0D000
trusted library allocation
page read and write
28B0000
heap
page read and write
2E53000
trusted library allocation
page read and write
F80000
heap
page read and write
2C15000
trusted library allocation
page read and write
2BA7000
trusted library allocation
page read and write
2B02000
trusted library allocation
page read and write
6750000
trusted library allocation
page read and write
7690000
trusted library allocation
page read and write
5420000
heap
page read and write
5A40000
trusted library allocation
page execute and read and write
4DCD000
trusted library allocation
page read and write
5290000
heap
page read and write
29B4000
trusted library allocation
page read and write
5853000
heap
page read and write
E7E000
heap
page read and write
425000
heap
page read and write
484E000
stack
page read and write
DB3000
trusted library allocation
page execute and read and write
2B88000
trusted library allocation
page read and write
2D24000
trusted library allocation
page read and write
2F9A000
trusted library allocation
page read and write
8F7000
stack
page read and write
410000
heap
page read and write
1120000
heap
page read and write
A7D000
stack
page read and write
6EA4000
heap
page read and write
86F6000
heap
page read and write
2EE1000
trusted library allocation
page read and write
F5E000
heap
page read and write
29E6000
trusted library allocation
page read and write
2FAF000
trusted library allocation
page read and write
13DC000
stack
page read and write
82FF000
stack
page read and write
CFF000
stack
page read and write
86EC000
stack
page read and write
5300000
trusted library allocation
page execute and read and write
620000
remote allocation
page execute and read and write
2F18000
trusted library allocation
page read and write
3067000
trusted library allocation
page read and write
DBD000
trusted library allocation
page execute and read and write
2F10000
heap
page execute and read and write
20A0000
trusted library allocation
page read and write
3310000
trusted library allocation
page read and write
76B0000
heap
page read and write
BA0000
trusted library allocation
page read and write
E7A000
heap
page read and write
2EFF000
trusted library allocation
page read and write
6EFD000
heap
page read and write
B90000
trusted library allocation
page read and write
34A6000
trusted library allocation
page read and write
9C9000
heap
page read and write
5700000
heap
page execute and read and write
1188000
heap
page read and write
2C38000
trusted library allocation
page read and write
29C5000
trusted library allocation
page read and write
2F07000
trusted library allocation
page read and write
738E000
trusted library allocation
page read and write
4E90000
trusted library allocation
page read and write
10000
unkown
page readonly
2BEC000
trusted library allocation
page read and write
5DE0000
trusted library section
page readonly
8AE000
stack
page read and write
2B08000
trusted library allocation
page read and write
5820000
heap
page read and write
2A84000
trusted library allocation
page read and write
2EE8000
trusted library allocation
page read and write
20C0000
trusted library allocation
page read and write
212E000
stack
page read and write
4341000
trusted library allocation
page read and write
4CE000
stack
page read and write
2C4D000
trusted library allocation
page read and write
2A4C000
trusted library allocation
page read and write
2810000
heap
page read and write
21A0000
heap
page read and write
280E000
stack
page read and write
2BCF000
trusted library allocation
page read and write
2D1C000
trusted library allocation
page read and write
BC7000
trusted library allocation
page execute and read and write
C67000
unkown
page execute read
5CD4000
heap
page read and write
2A01000
trusted library allocation
page read and write
D5EE000
stack
page read and write
BB7000
trusted library allocation
page execute and read and write
2B1D000
trusted library allocation
page read and write
2C66000
trusted library allocation
page read and write
7C30000
trusted library allocation
page read and write
2E4A000
trusted library allocation
page read and write
DE2000
trusted library allocation
page read and write
7AE0000
heap
page read and write
3669000
trusted library allocation
page read and write
5180000
heap
page execute and read and write
2E28000
trusted library allocation
page read and write
655C000
heap
page read and write
28BC000
heap
page read and write
81FE000
stack
page read and write
29E4000
trusted library allocation
page read and write
2B00000
trusted library allocation
page read and write
D6ED000
stack
page read and write
66D0000
trusted library allocation
page read and write
2CB1000
trusted library allocation
page read and write
15C2000
heap
page read and write
2EDE000
trusted library allocation
page read and write
2F1C000
trusted library allocation
page read and write
96E000
stack
page read and write
167A000
heap
page read and write
561C000
stack
page read and write
1126000
heap
page read and write
2A87000
trusted library allocation
page read and write
2AE9000
trusted library allocation
page read and write
1960000
trusted library allocation
page read and write
2EB2000
trusted library allocation
page read and write
2A65000
trusted library allocation
page read and write
2C2E000
trusted library allocation
page read and write
E00000
trusted library allocation
page read and write
DD6000
trusted library allocation
page execute and read and write
2A9F000
trusted library allocation
page read and write
847E000
stack
page read and write
2E82000
trusted library allocation
page read and write
29E2000
trusted library allocation
page read and write
5CB0000
heap
page read and write
2C0F000
trusted library allocation
page read and write
7829000
trusted library allocation
page read and write
5A35000
heap
page read and write
7F4E000
stack
page read and write
2E95000
trusted library allocation
page read and write
2A61000
trusted library allocation
page read and write
113B000
trusted library allocation
page execute and read and write
F7E000
stack
page read and write
7450000
trusted library allocation
page execute and read and write
2E4E000
trusted library allocation
page read and write
2B21000
trusted library allocation
page read and write
5850000
heap
page read and write
1580000
heap
page read and write
2B56000
trusted library allocation
page read and write
2CF0000
trusted library allocation
page read and write
2094000
trusted library allocation
page read and write
2F3B000
trusted library allocation
page read and write
C62000
unkown
page execute read
2A51000
trusted library allocation
page read and write
2E1C000
trusted library allocation
page read and write
19E7000
heap
page read and write
2DBE000
trusted library allocation
page read and write
C45000
unkown
page execute read
2BD5000
trusted library allocation
page read and write
2C6C000
trusted library allocation
page read and write
74EF000
stack
page read and write
2BF0000
trusted library allocation
page read and write
2D58000
trusted library allocation
page read and write
2EC0000
trusted library allocation
page read and write
2A4A000
trusted library allocation
page read and write
142E000
stack
page read and write
4349000
trusted library allocation
page read and write
2AA1000
trusted library allocation
page read and write
2C49000
trusted library allocation
page read and write
5CA0000
heap
page read and write
2C1E000
trusted library allocation
page read and write
20C7000
trusted library allocation
page execute and read and write
29CF000
trusted library allocation
page read and write
2BD7000
trusted library allocation
page read and write
4D4E000
stack
page read and write
19B5000
trusted library allocation
page read and write
2CE3000
trusted library allocation
page read and write
2BEE000
trusted library allocation
page read and write
2EDE000
trusted library allocation
page read and write
2C32000
trusted library allocation
page read and write
49DE000
stack
page read and write
110D000
trusted library allocation
page execute and read and write
5275000
heap
page read and write
7360000
trusted library allocation
page read and write
1130000
trusted library allocation
page read and write
DB0000
trusted library allocation
page read and write
3499000
trusted library allocation
page read and write
34E6000
trusted library allocation
page read and write
6F10000
heap
page read and write
9BE000
heap
page read and write
C78000
unkown
page execute read
50A000
heap
page read and write
2B51000
trusted library allocation
page read and write
2E67000
trusted library allocation
page read and write
2C17000
trusted library allocation
page read and write
5CED000
heap
page read and write
2DF2000
trusted library allocation
page read and write
3F49000
trusted library allocation
page read and write
252C000
stack
page read and write
2CD0000
trusted library allocation
page read and write
2EE4000
trusted library allocation
page read and write
2781000
trusted library allocation
page read and write
5A50000
heap
page execute and read and write
2E99000
trusted library allocation
page read and write
287C000
stack
page read and write
5224000
heap
page read and write
C53000
unkown
page execute read
6EE3000
heap
page read and write
2A5F000
trusted library allocation
page read and write
328E000
stack
page read and write
2C1B000
trusted library allocation
page read and write
5370000
trusted library allocation
page read and write
2CE4000
trusted library allocation
page read and write
2EDA000
trusted library allocation
page read and write
34B3000
trusted library allocation
page read and write
2D6D000
trusted library allocation
page read and write
2E05000
trusted library allocation
page read and write
2C7F000
trusted library allocation
page read and write
2B9F000
trusted library allocation
page read and write
7C70000
trusted library allocation
page read and write
1964000
trusted library allocation
page read and write
2E50000
trusted library allocation
page read and write
2E22000
trusted library allocation
page read and write
109D000
stack
page read and write
9A8000
heap
page read and write
72AE000
stack
page read and write
6EE7000
heap
page read and write
162B000
heap
page read and write
A30000
heap
page read and write
66E7000
trusted library allocation
page read and write
52F4000
trusted library section
page readonly
2D80000
trusted library allocation
page read and write
3466000
trusted library allocation
page read and write
7B93000
heap
page read and write
2F5D000
trusted library allocation
page read and write
28A0000
trusted library allocation
page read and write
1112000
trusted library allocation
page read and write
92E000
stack
page read and write
DCD000
trusted library allocation
page execute and read and write
2C11000
trusted library allocation
page read and write
29F7000
trusted library allocation
page read and write
6500000
heap
page read and write
672D000
trusted library allocation
page read and write
5A8E000
stack
page read and write
2080000
trusted library allocation
page read and write
6CA0000
heap
page read and write
4E8000
heap
page read and write
2C34000
trusted library allocation
page read and write
2BBE000
trusted library allocation
page read and write
86F0000
heap
page read and write
29EA000
trusted library allocation
page read and write
660000
remote allocation
page execute and read and write
2C64000
trusted library allocation
page read and write
2B3E000
trusted library allocation
page read and write
2F2F000
trusted library allocation
page read and write
2B9B000
trusted library allocation
page read and write
C56000
unkown
page execute read
8E5000
heap
page read and write
5AD3000
heap
page read and write
64FD000
stack
page read and write
EA4000
heap
page read and write
2CB5000
trusted library allocation
page read and write
43FA000
trusted library allocation
page read and write
17A3000
trusted library allocation
page execute and read and write
2B82000
trusted library allocation
page read and write
34FF000
trusted library allocation
page read and write
2D6B000
trusted library allocation
page read and write
7390000
trusted library allocation
page execute and read and write
1350000
trusted library allocation
page read and write
3473000
trusted library allocation
page read and write
524C000
heap
page read and write
E97000
heap
page read and write
29C3000
trusted library allocation
page read and write
2C7B000
trusted library allocation
page read and write
29AC000
trusted library allocation
page read and write
DE5000
trusted library allocation
page execute and read and write
7BC0000
heap
page read and write
2F01000
trusted library allocation
page read and write
2E0F000
trusted library allocation
page read and write
2E65000
trusted library allocation
page read and write
2BB8000
trusted library allocation
page read and write
8D0000
heap
page read and write
2A06000
trusted library allocation
page read and write
3062000
trusted library allocation
page read and write
2A46000
trusted library allocation
page read and write
2D20000
trusted library allocation
page read and write
5CD0000
heap
page read and write
177E000
stack
page read and write
6E30000
heap
page read and write
59FE000
stack
page read and write
There are 895 hidden memdumps, click here to show them.