IOC Report
EYve4TeHvZ.exe

loading gif

Files

File Path
Type
Category
Malicious
EYve4TeHvZ.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\RegSvcs.exe.log
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\autC8A4.tmp
data
dropped
C:\Users\user\AppData\Local\Temp\autCD38.tmp
data
dropped
C:\Users\user\AppData\Local\Temp\autD2E5.tmp
data
dropped
C:\Users\user\AppData\Local\Temp\unbarricadoed
data
dropped

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\EYve4TeHvZ.exe
"C:\Users\user\Desktop\EYve4TeHvZ.exe"
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
"C:\Users\user\Desktop\EYve4TeHvZ.exe"
malicious
C:\Users\user\Desktop\EYve4TeHvZ.exe
"C:\Users\user\Desktop\EYve4TeHvZ.exe"
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
"C:\Users\user\Desktop\EYve4TeHvZ.exe"
malicious
C:\Users\user\Desktop\EYve4TeHvZ.exe
"C:\Users\user\Desktop\EYve4TeHvZ.exe"
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
"C:\Users\user\Desktop\EYve4TeHvZ.exe"
malicious

URLs

Name
IP
Malicious
http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-soap-message-security-1.0#Text
unknown
http://schemas.xmlsoap.org/ws/2005/02/sc/sct
unknown
http://schemas.xmlsoap.org/ws/2004/04/security/sc/dk
unknown
http://tempuri.org/Entity/Id23ResponseD
unknown
http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-soap-message-security-1.0#HexBinary
unknown
http://tempuri.org/Entity/Id12Response
unknown
http://tempuri.org/
unknown
http://tempuri.org/Entity/Id2Response
unknown
http://schemas.xmlsoap.org/ws/2005/02/sc/dk/p_sha1
unknown
http://tempuri.org/Entity/Id21Response
unknown
http://schemas.xmlsoap.org/2005/02/trust/spnego#GSS_Wrap
unknown
http://tempuri.org/Entity/Id9
unknown
http://docs.oasis-open.org/wss/oasis-wss-saml-token-profile-1.1#SAMLID
unknown
http://tempuri.org/Entity/Id8
unknown
http://tempuri.org/Entity/Id5
unknown
http://schemas.xmlsoap.org/ws/2004/10/wsat/Prepare
unknown
http://tempuri.org/Entity/Id4
unknown
http://tempuri.org/Entity/Id7
unknown
http://tempuri.org/Entity/Id6
unknown
http://schemas.xmlsoap.org/ws/2005/02/trust#BinarySecret
unknown
http://tempuri.org/Entity/Id19Response
unknown
http://docs.oasis-open.org/wss/oasis-wss-rel-token-profile-1.0.pdf#license
unknown
http://schemas.xmlsoap.org/ws/2005/02/trust/RSTR/Issue
unknown
http://schemas.xmlsoap.org/ws/2004/10/wsat/Aborted
unknown
http://schemas.xmlsoap.org/ws/2005/02/rm/TerminateSequence
unknown
http://schemas.xmlsoap.org/ws/2004/10/wsat/fault
unknown
http://schemas.xmlsoap.org/ws/2004/10/wsat
unknown
http://docs.oasis-open.org/wss/oasis-wss-soap-message-security-1.1#EncryptedKey
unknown
http://tempuri.org/Entity/Id15Response
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
http://schemas.xmlsoap.org/ws/2005/02/trust/RSTR/SCT/Renew
unknown
http://schemas.xmlsoap.org/ws/2004/10/wscoor/Register
unknown
http://tempuri.org/Entity/Id6Response
unknown
http://schemas.xmlsoap.org/ws/2004/04/trust/SymmetricKey
unknown
https://api.ip.sb/ip
unknown
http://schemas.xmlsoap.org/ws/2004/04/sc
unknown
http://tempuri.org/Entity/Id1ResponseD
unknown
http://schemas.xmlsoap.org/ws/2004/10/wsat/Volatile2PC
unknown
http://schemas.xmlsoap.org/ws/2005/02/trust/RSTR/SCT/Cancel
unknown
http://tempuri.org/Entity/Id9Response
unknown
http://tempuri.org/Entity/Id20
unknown
http://tempuri.org/Entity/Id21
unknown
http://tempuri.org/Entity/Id22
unknown
http://docs.oasis-open.org/wss/oasis-wss-kerberos-token-profile-1.1#Kerberosv5APREQSHA1
unknown
http://tempuri.org/Entity/Id23
unknown
http://schemas.xmlsoap.org/ws/2004/04/security/trust/CK/PSHA1
unknown
http://tempuri.org/Entity/Id24
unknown
http://schemas.xmlsoap.org/ws/2004/04/security/trust/RSTR/Issue
unknown
http://tempuri.org/Entity/Id24Response
unknown
http://tempuri.org/Entity/Id1Response
unknown
http://schemas.xmlsoap.org/ws/2005/02/rm/AckRequested
unknown
http://schemas.xmlsoap.org/ws/2004/10/wsat/ReadOnly
unknown
http://schemas.xmlsoap.org/ws/2004/10/wsat/Replay
unknown
http://schemas.xmlsoap.org/ws/2005/02/trust/tlsnego
unknown
http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-soap-message-security-1.0#Base64Binary
unknown
http://schemas.xmlsoap.org/ws/2004/10/wsat/Durable2PC
unknown
http://schemas.xmlsoap.org/ws/2004/04/security/trust/SymmetricKey
unknown
http://schemas.xmlsoap.org/ws/2004/08/addressing
unknown
http://schemas.xmlsoap.org/ws/2005/02/trust/RST/Issue
unknown
http://schemas.xmlsoap.org/ws/2004/10/wsat/Completion
unknown
http://schemas.xmlsoap.org/ws/2004/04/trust
unknown
http://tempuri.org/Entity/Id10
unknown
http://tempuri.org/Entity/Id11
unknown
http://tempuri.org/Entity/Id12
unknown
http://tempuri.org/Entity/Id16Response
unknown
http://schemas.xmlsoap.org/ws/2004/10/wscoor/CreateCoordinationContextResponse
unknown
http://schemas.xmlsoap.org/ws/2005/02/trust/RST/SCT/Cancel
unknown
http://tempuri.org/Entity/Id13
unknown
http://tempuri.org/Entity/Id14
unknown
http://tempuri.org/Entity/Id15
unknown
http://tempuri.org/Entity/Id16
unknown
http://schemas.xmlsoap.org/ws/2005/02/trust/Nonce
unknown
http://tempuri.org/Entity/Id17
unknown
http://tempuri.org/Entity/Id18
unknown
http://tempuri.org/Entity/Id5Response
unknown
http://tempuri.org/Entity/Id19
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/dns
unknown
http://tempuri.org/Entity/Id10Response
unknown
http://schemas.xmlsoap.org/ws/2005/02/trust/Renew
unknown
http://tempuri.org/Entity/Id8Response
unknown
http://schemas.xmlsoap.org/ws/2004/04/trust/PublicKey
unknown
http://docs.oasis-open.org/wss/oasis-wss-saml-token-profile-1.1#SAMLV2.0
unknown
http://docs.oasis-open.org/wss/oasis-wss-saml-token-profile-1.0#SAMLAssertionID
unknown
http://schemas.xmlsoap.org/ws/2004/04/security/trust/RST/SCT
unknown
http://schemas.xmlsoap.org/ws/2006/02/addressingidentity
unknown
http://schemas.xmlsoap.org/soap/envelope/
unknown
http://schemas.xmlsoap.org/ws/2005/02/trust/PublicKey
unknown
http://docs.oasis-open.org/wss/oasis-wss-soap-message-security-1.1#EncryptedKeySHA1
unknown
http://schemas.xmlsoap.org/ws/2005/02/trust
unknown
http://schemas.xmlsoap.org/ws/2004/10/wsat/Rollback
unknown
http://tempuri.org/Entity/Id3ResponseD
unknown
http://tempuri.org/Entity/Id23Response
unknown
http://schemas.xmlsoap.org/ws/2004/04/security/trust/RSTR/SCT
unknown
http://tempuri.org/D
unknown
http://schemas.xmlsoap.org/ws/2004/06/addressingex
unknown
http://schemas.xmlsoap.org/ws/2004/10/wscoor
unknown
http://schemas.xmlsoap.org/ws/2004/04/security/trust/Nonce
unknown
http://schemas.xmlsoap.org/ws/2005/02/rm/CreateSequenceResponse
unknown
http://schemas.xmlsoap.org/ws/2004/08/addressing/fault
unknown
http://schemas.xmlsoap.org/ws/2005/02/trust/RST/SCT/Renew
unknown
There are 90 hidden URLs, click here to show them.

IPs

IP
Domain
Country
Malicious
45.144.212.192
unknown
Ukraine
malicious

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
Owner
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
SessionHash
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
Sequence
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
RegFiles0000
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
RegFilesHash
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
Owner
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
SessionHash
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
Sequence
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
RegFiles0000
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
RegFilesHash

Memdumps

Base Address
Regiontype
Protect
Malicious
344B000
trusted library allocation
page read and write
malicious
57F0000
trusted library section
page read and write
malicious
3008000
heap
page read and write
malicious
5BB0000
trusted library section
page read and write
malicious
33B1000
trusted library allocation
page read and write
malicious
43A000
system
page execute and read and write
823E000
heap
page read and write
768A000
trusted library allocation
page read and write
4651000
trusted library allocation
page read and write
5F5F000
stack
page read and write
3EB0000
direct allocation
page read and write
1457000
heap
page read and write
4179000
direct allocation
page read and write
4639000
trusted library allocation
page read and write
33AE000
stack
page read and write
3BB9000
direct allocation
page read and write
10E2000
heap
page read and write
3A62000
trusted library allocation
page read and write
4643000
trusted library allocation
page read and write
148F000
heap
page read and write
394E000
trusted library allocation
page read and write
4646000
trusted library allocation
page read and write
861E000
stack
page read and write
35D5000
trusted library allocation
page read and write
113E000
heap
page read and write
BD2000
unkown
page write copy
1592000
heap
page read and write
440B000
trusted library allocation
page read and write
6E70000
trusted library allocation
page execute and read and write
5BA1000
heap
page read and write
B11000
unkown
page execute read
37AD000
trusted library allocation
page read and write
4591000
trusted library allocation
page read and write
15A5000
heap
page read and write
3A33000
trusted library allocation
page read and write
14D0000
heap
page read and write
3E40000
direct allocation
page read and write
3967000
trusted library allocation
page read and write
4621000
trusted library allocation
page read and write
1120000
heap
page read and write
2F32000
trusted library allocation
page read and write
1571000
heap
page read and write
69A0000
trusted library allocation
page execute and read and write
10EF000
heap
page execute and read and write
D8E000
stack
page read and write
BD2000
unkown
page write copy
B11000
unkown
page execute read
44CE000
trusted library allocation
page read and write
69B0000
trusted library allocation
page read and write
58B0000
heap
page read and write
68D0000
trusted library allocation
page execute and read and write
8285000
heap
page read and write
359E000
trusted library allocation
page read and write
3A67000
trusted library allocation
page read and write
45E5000
trusted library allocation
page read and write
B10000
unkown
page readonly
15E0000
heap
page read and write
2FAE000
stack
page read and write
B10000
unkown
page readonly
3EB0000
direct allocation
page read and write
374B000
trusted library allocation
page read and write
100E000
stack
page read and write
4179000
direct allocation
page read and write
680B000
trusted library allocation
page read and write
6890000
trusted library allocation
page read and write
36A0000
trusted library allocation
page read and write
3A13000
direct allocation
page read and write
113E000
heap
page read and write
824B000
heap
page read and write
5890000
trusted library allocation
page read and write
2FB0000
trusted library allocation
page execute and read and write
3940000
trusted library allocation
page read and write
6110000
heap
page read and write
1571000
heap
page read and write
B9F000
unkown
page readonly
1471000
heap
page read and write
148F000
heap
page read and write
6E60000
heap
page read and write
5B65000
heap
page read and write
4482000
trusted library allocation
page read and write
5F9E000
stack
page read and write
2F22000
trusted library allocation
page read and write
AF0000
heap
page read and write
16B0000
heap
page read and write
58C0000
heap
page read and write
4477000
trusted library allocation
page read and write
4447000
trusted library allocation
page read and write
68C0000
heap
page read and write
356D000
trusted library allocation
page read and write
826B000
heap
page read and write
82CE000
heap
page read and write
3210000
trusted library allocation
page read and write
7669000
trusted library allocation
page read and write
609E000
stack
page read and write
3A5E000
trusted library allocation
page read and write
1664000
trusted library allocation
page read and write
1660000
trusted library allocation
page read and write
442E000
trusted library allocation
page read and write
37B0000
trusted library allocation
page read and write
14D0000
heap
page read and write
6910000
trusted library allocation
page read and write
144F000
heap
page read and write
148F000
heap
page read and write
800000
heap
page read and write
344F000
stack
page read and write
7650000
trusted library allocation
page read and write
588D000
trusted library allocation
page read and write
35E4000
trusted library allocation
page read and write
845D000
stack
page read and write
44E0000
trusted library allocation
page read and write
3901000
trusted library allocation
page read and write
3A3D000
trusted library allocation
page read and write
4043000
direct allocation
page read and write
1171000
heap
page read and write
6152000
trusted library allocation
page read and write
481E000
trusted library allocation
page read and write
45E1000
trusted library allocation
page read and write
4628000
trusted library allocation
page read and write
5BAC000
heap
page read and write
76C0000
trusted library allocation
page read and write
3836000
trusted library allocation
page read and write
36A4000
trusted library allocation
page read and write
768F000
trusted library allocation
page read and write
5C6E000
stack
page read and write
1440000
heap
page read and write
3FD3000
direct allocation
page read and write
44C8000
trusted library allocation
page read and write
3626000
trusted library allocation
page read and write
41E9000
direct allocation
page read and write
7700000
trusted library allocation
page read and write
1591000
heap
page read and write
68E0000
trusted library allocation
page execute and read and write
1471000
heap
page read and write
6822000
trusted library allocation
page read and write
8A6F000
stack
page read and write
B10000
unkown
page readonly
10F0000
heap
page read and write
41EE000
direct allocation
page read and write
6940000
trusted library allocation
page read and write
113E000
heap
page read and write
410D000
direct allocation
page read and write
40C0000
direct allocation
page read and write
5860000
trusted library allocation
page read and write
14C2000
heap
page read and write
34A2000
trusted library allocation
page read and write
6CEE000
stack
page read and write
1471000
heap
page read and write
441B000
trusted library allocation
page read and write
6E30000
trusted library allocation
page read and write
444E000
trusted library allocation
page read and write
BD7000
unkown
page readonly
113E000
heap
page read and write
1120000
heap
page read and write
3290000
trusted library allocation
page read and write
7665000
trusted library allocation
page read and write
417E000
direct allocation
page read and write
1D3D000
stack
page read and write
4441000
trusted library allocation
page read and write
44A7000
trusted library allocation
page read and write
4179000
direct allocation
page read and write
B11000
unkown
page execute read
3815000
trusted library allocation
page read and write
379E000
trusted library allocation
page read and write
6E2E000
stack
page read and write
828A000
heap
page read and write
3936000
trusted library allocation
page read and write
60C0000
trusted library allocation
page read and write
2FD6000
heap
page read and write
41EE000
direct allocation
page read and write
1140000
heap
page read and write
6849000
trusted library allocation
page read and write
153B000
heap
page read and write
3585000
trusted library allocation
page read and write
153D000
stack
page read and write
158F000
heap
page read and write
1140000
heap
page read and write
14CE000
stack
page read and write
1547000
heap
page read and write
6800000
trusted library allocation
page read and write
12F7000
stack
page read and write
795E000
stack
page read and write
3200000
trusted library allocation
page read and write
2F40000
heap
page read and write
5892000
trusted library allocation
page read and write
38A3000
trusted library allocation
page read and write
38B6000
direct allocation
page read and write
3739000
trusted library allocation
page read and write
2F37000
trusted library allocation
page execute and read and write
3875000
trusted library allocation
page read and write
8720000
heap
page read and write
43B1000
trusted library allocation
page read and write
417D000
direct allocation
page read and write
158F000
heap
page read and write
7F430000
trusted library allocation
page execute and read and write
1263000
heap
page read and write
3DF7000
direct allocation
page read and write
F80000
heap
page read and write
3828000
trusted library allocation
page read and write
68A0000
trusted library allocation
page read and write
2F26000
trusted library allocation
page execute and read and write
1471000
heap
page read and write
10FE000
heap
page read and write
4418000
trusted library allocation
page read and write
425E000
direct allocation
page read and write
2FC3000
heap
page read and write
2F3B000
trusted library allocation
page execute and read and write
41E9000
direct allocation
page read and write
4109000
direct allocation
page read and write
1400000
heap
page read and write
587E000
trusted library allocation
page read and write
5BF9000
trusted library section
page read and write
F1A000
stack
page read and write
1471000
heap
page read and write
6138000
trusted library allocation
page read and write
44F9000
trusted library allocation
page read and write
353A000
trusted library allocation
page read and write
148F000
heap
page read and write
43FA000
trusted library allocation
page read and write
381D000
trusted library allocation
page read and write
34D3000
trusted library allocation
page read and write
6920000
trusted library allocation
page read and write
7656000
trusted library allocation
page read and write
7710000
heap
page read and write
38A7000
direct allocation
page read and write
113E000
heap
page read and write
4539000
trusted library allocation
page read and write
B10000
unkown
page readonly
143B000
heap
page read and write
3A4B000
trusted library allocation
page read and write
44A4000
trusted library allocation
page read and write
5864000
trusted library allocation
page read and write
BD7000
unkown
page readonly
8736000
heap
page read and write
383E000
trusted library allocation
page read and write
3994000
heap
page read and write
828E000
heap
page read and write
37D9000
trusted library allocation
page read and write
155D000
heap
page read and write
13DB000
stack
page read and write
DD0000
heap
page read and write
36AA000
trusted library allocation
page read and write
1491000
heap
page read and write
38F4000
trusted library allocation
page read and write
B9F000
unkown
page readonly
387B000
trusted library allocation
page read and write
7694000
trusted library allocation
page read and write
8A2E000
stack
page read and write
920000
heap
page read and write
1120000
heap
page read and write
15C1000
heap
page read and write
458D000
trusted library allocation
page read and write
1723000
heap
page read and write
10F0000
heap
page read and write
3A54000
trusted library allocation
page read and write
34B2000
trusted library allocation
page read and write
822B000
heap
page read and write
376C000
trusted library allocation
page read and write
3577000
trusted library allocation
page read and write
6870000
trusted library allocation
page read and write
6850000
trusted library allocation
page read and write
6880000
trusted library allocation
page execute and read and write
5B49000
heap
page read and write
5CAE000
stack
page read and write
3A13000
direct allocation
page read and write
4465000
trusted library allocation
page read and write
3930000
heap
page read and write
1120000
heap
page read and write
3984000
heap
page read and write
7685000
trusted library allocation
page read and write
3A90000
direct allocation
page read and write
44AF000
trusted library allocation
page read and write
3880000
direct allocation
page read and write
1446000
heap
page execute and read and write
B9F000
unkown
page readonly
4050000
direct allocation
page read and write
3805000
trusted library allocation
page read and write
44D3000
trusted library allocation
page read and write
7690000
trusted library allocation
page read and write
AF4000
heap
page read and write
82AE000
heap
page read and write
1663000
trusted library allocation
page execute and read and write
417D000
direct allocation
page read and write
38F0000
direct allocation
page read and write
45FD000
trusted library allocation
page read and write
B9F000
unkown
page readonly
686B000
trusted library allocation
page read and write
D40000
heap
page read and write
16A0000
heap
page read and write
82D2000
heap
page read and write
4406000
trusted library allocation
page read and write
39C5000
trusted library allocation
page read and write
5881000
trusted library allocation
page read and write
3E06000
direct allocation
page read and write
1540000
heap
page read and write
16DD000
heap
page read and write
38DE000
trusted library allocation
page read and write
7653000
trusted library allocation
page read and write
9DE000
stack
page read and write
1738000
heap
page read and write
1140000
heap
page read and write
113E000
heap
page read and write
6E33000
trusted library allocation
page read and write
45F5000
trusted library allocation
page read and write
6816000
trusted library allocation
page read and write
3748000
trusted library allocation
page read and write
213E000
stack
page read and write
13FD000
stack
page read and write
46A000
system
page execute and read and write
36FB000
trusted library allocation
page read and write
2FC0000
heap
page read and write
5886000
trusted library allocation
page read and write
B11000
unkown
page execute read
8236000
heap
page read and write
4415000
trusted library allocation
page read and write
76F0000
trusted library allocation
page execute and read and write
5B4D000
heap
page read and write
1678000
heap
page read and write
4050000
direct allocation
page read and write
BCE000
unkown
page write copy
3FE0000
direct allocation
page read and write
3513000
trusted library allocation
page read and write
44BA000
trusted library allocation
page read and write
400000
system
page execute and read and write
1447000
heap
page read and write
B9F000
unkown
page readonly
30A1000
heap
page read and write
BD7000
unkown
page readonly
767A000
trusted library allocation
page read and write
3990000
heap
page read and write
352C000
trusted library allocation
page read and write
1641000
heap
page read and write
6B50000
trusted library allocation
page execute and read and write
38E8000
trusted library allocation
page read and write
45F2000
trusted library allocation
page read and write
2F60000
trusted library allocation
page read and write
13BE000
stack
page read and write
BC4000
unkown
page readonly
38F0000
direct allocation
page read and write
2F13000
trusted library allocation
page read and write
37AA000
trusted library allocation
page read and write
3A82000
trusted library allocation
page read and write
762D000
stack
page read and write
16B3000
heap
page read and write
4494000
trusted library allocation
page read and write
36F0000
trusted library allocation
page read and write
781E000
stack
page read and write
445A000
trusted library allocation
page read and write
18AF000
stack
page read and write
5B3B000
heap
page read and write
1408000
heap
page read and write
7678000
trusted library allocation
page read and write
6F0B000
stack
page read and write
1491000
heap
page read and write
3521000
trusted library allocation
page read and write
1434000
heap
page read and write
45EF000
trusted library allocation
page read and write
465D000
trusted library allocation
page read and write
BC4000
unkown
page readonly
13BF000
stack
page read and write
16A1000
heap
page read and write
31B0000
heap
page execute and read and write
45A9000
trusted library allocation
page read and write
B10000
unkown
page readonly
3FD3000
direct allocation
page read and write
43C4000
trusted library allocation
page read and write
1143000
heap
page read and write
6845000
trusted library allocation
page read and write
1254000
heap
page read and write
1500000
heap
page read and write
2F30000
trusted library allocation
page read and write
31A0000
trusted library allocation
page read and write
1548000
heap
page read and write
10E4000
heap
page read and write
8220000
heap
page read and write
D80000
heap
page read and write
BD7000
unkown
page readonly
39CE000
trusted library allocation
page read and write
4675000
trusted library allocation
page read and write
110B000
heap
page read and write
76A0000
trusted library allocation
page read and write
4043000
direct allocation
page read and write
14C1000
heap
page read and write
5E5E000
stack
page read and write
69D0000
heap
page execute and read and write
5C24000
trusted library allocation
page read and write
1191000
heap
page read and write
15C0000
heap
page read and write
357D000
trusted library allocation
page read and write
FD0000
heap
page read and write
34C5000
trusted library allocation
page read and write
37A0000
trusted library allocation
page read and write
39E9000
trusted library allocation
page read and write
1532000
heap
page read and write
11F4000
heap
page read and write
6860000
trusted library allocation
page read and write
BD7000
unkown
page readonly
8254000
heap
page read and write
3F20000
direct allocation
page read and write
148F000
heap
page read and write
43CF000
trusted library allocation
page read and write
1533000
heap
page read and write
41ED000
direct allocation
page read and write
37D1000
trusted library allocation
page read and write
102B000
stack
page read and write
871E000
stack
page read and write
1CFD000
stack
page read and write
DF0000
heap
page read and write
30E0000
trusted library allocation
page read and write
20CE000
stack
page read and write
3516000
trusted library allocation
page read and write
3E40000
direct allocation
page read and write
6135000
trusted library allocation
page read and write
1471000
heap
page read and write
1264000
heap
page read and write
82BF000
heap
page read and write
14C1000
heap
page read and write
B11000
unkown
page execute read
31FB000
stack
page read and write
7662000
trusted library allocation
page read and write
3BBD000
direct allocation
page read and write
1540000
heap
page read and write
166D000
trusted library allocation
page execute and read and write
A70000
heap
page read and write
82BB000
heap
page read and write
1670000
heap
page read and write
4400000
trusted library allocation
page read and write
785E000
stack
page read and write
3909000
trusted library allocation
page read and write
3590000
trusted library allocation
page read and write
36F3000
trusted library allocation
page read and write
44E7000
trusted library allocation
page read and write
1545000
heap
page read and write
1493000
heap
page read and write
417E000
direct allocation
page read and write
6B9C000
stack
page read and write
3745000
trusted library allocation
page read and write
13CF000
stack
page read and write
410D000
direct allocation
page read and write
10F7000
heap
page read and write
5C20000
trusted library allocation
page read and write
3869000
trusted library allocation
page read and write
10B0000
heap
page read and write
32A0000
heap
page read and write
1548000
heap
page read and write
8A90000
trusted library allocation
page execute and read and write
5AB0000
heap
page read and write
2F35000
trusted library allocation
page execute and read and write
4616000
trusted library allocation
page read and write
586B000
trusted library allocation
page read and write
143F000
heap
page execute and read and write
68B0000
trusted library allocation
page read and write
BD2000
unkown
page write copy
BCE000
unkown
page read and write
10EC000
heap
page read and write
417D000
direct allocation
page read and write
13DB000
stack
page read and write
158F000
heap
page read and write
930000
heap
page read and write
3943000
trusted library allocation
page read and write
45D4000
trusted library allocation
page read and write
3803000
trusted library allocation
page read and write
380F000
trusted library allocation
page read and write
327E000
stack
page read and write
58A0000
heap
page execute and read and write
3541000
trusted library allocation
page read and write
37C3000
trusted library allocation
page read and write
1171000
heap
page read and write
2FDE000
heap
page read and write
8224000
heap
page read and write
825F000
heap
page read and write
3878000
trusted library allocation
page read and write
1107000
heap
page read and write
5B8F000
heap
page read and write
3FE0000
direct allocation
page read and write
39BB000
trusted library allocation
page read and write
B11000
unkown
page execute read
1172000
heap
page read and write
6130000
trusted library allocation
page read and write
D3A000
stack
page read and write
6990000
trusted library allocation
page execute and read and write
1440000
heap
page read and write
158F000
heap
page read and write
1650000
trusted library allocation
page read and write
1592000
heap
page read and write
FCE000
stack
page read and write
101E000
stack
page read and write
459E000
trusted library allocation
page read and write
45C8000
trusted library allocation
page read and write
1120000
heap
page read and write
990000
heap
page read and write
37B8000
trusted library allocation
page read and write
396F000
trusted library allocation
page read and write
BC4000
unkown
page readonly
3220000
trusted library allocation
page read and write
163E000
stack
page read and write
41E9000
direct allocation
page read and write
2F1D000
trusted library allocation
page execute and read and write
14F5000
heap
page read and write
BC4000
unkown
page readonly
3FD3000
direct allocation
page read and write
60DA000
trusted library allocation
page read and write
613A000
trusted library allocation
page read and write
2FD0000
heap
page read and write
3F63000
direct allocation
page read and write
3F20000
direct allocation
page read and write
45A1000
trusted library allocation
page read and write
6CAC000
stack
page read and write
3608000
trusted library allocation
page read and write
13CE000
stack
page read and write
38E0000
trusted library allocation
page read and write
6120000
trusted library allocation
page execute and read and write
B9F000
unkown
page readonly
43C1000
trusted library allocation
page read and write
6150000
trusted library allocation
page read and write
43B7000
trusted library allocation
page read and write
3C2E000
direct allocation
page read and write
39CA000
trusted library allocation
page read and write
34BA000
trusted library allocation
page read and write
DB0000
heap
page read and write
34A0000
trusted library allocation
page read and write
3E76000
direct allocation
page read and write
388E000
trusted library allocation
page read and write
2290000
heap
page read and write
69F0000
trusted library allocation
page read and write
41ED000
direct allocation
page read and write
6B10000
trusted library allocation
page execute and read and write
3753000
trusted library allocation
page read and write
36FE000
trusted library allocation
page read and write
15B4000
heap
page read and write
3812000
trusted library allocation
page read and write
3519000
trusted library allocation
page read and write
34DA000
trusted library allocation
page read and write
6847000
trusted library allocation
page read and write
36B2000
trusted library allocation
page read and write
3946000
trusted library allocation
page read and write
10F6000
heap
page execute and read and write
2180000
heap
page read and write
1558000
heap
page read and write
6811000
trusted library allocation
page read and write
5B0C000
heap
page read and write
1433000
heap
page read and write
10C8000
heap
page read and write
459B000
trusted library allocation
page read and write
4649000
trusted library allocation
page read and write
6840000
trusted library allocation
page read and write
6B20000
trusted library allocation
page read and write
375E000
trusted library allocation
page read and write
3883000
trusted library allocation
page read and write
145B000
heap
page read and write
1571000
heap
page read and write
54AC000
stack
page read and write
13FC000
stack
page read and write
5B40000
heap
page read and write
6930000
trusted library allocation
page read and write
BCE000
unkown
page read and write
4609000
trusted library allocation
page read and write
44A1000
trusted library allocation
page read and write
389C000
trusted library allocation
page read and write
370E000
trusted library allocation
page read and write
3980000
heap
page read and write
4586000
trusted library allocation
page read and write
69C0000
trusted library allocation
page read and write
2F10000
trusted library allocation
page read and write
6DEC000
stack
page read and write
10B8000
heap
page read and write
356B000
trusted library allocation
page read and write
38CF000
trusted library allocation
page read and write
59A000
stack
page read and write
1713000
heap
page read and write
3BB9000
direct allocation
page read and write
3773000
trusted library allocation
page read and write
BC4000
unkown
page readonly
30E8000
trusted library allocation
page read and write
45B5000
trusted library allocation
page read and write
3F20000
direct allocation
page read and write
1571000
heap
page read and write
34AF000
trusted library allocation
page read and write
BC4000
unkown
page readonly
767F000
trusted library allocation
page read and write
BCE000
unkown
page write copy
DFD000
stack
page read and write
BCE000
unkown
page read and write
357A000
trusted library allocation
page read and write
3DD0000
direct allocation
page read and write
426000
system
page execute and read and write
1571000
heap
page read and write
16CA000
heap
page read and write
15C0000
heap
page read and write
44DA000
trusted library allocation
page read and write
45C2000
trusted library allocation
page read and write
3E40000
direct allocation
page read and write
1492000
heap
page read and write
686E000
trusted library allocation
page read and write
42B000
system
page execute and read and write
3280000
trusted library allocation
page read and write
5BA8000
heap
page read and write
443C000
trusted library allocation
page read and write
3934000
trusted library allocation
page read and write
3E67000
direct allocation
page read and write
462E000
trusted library allocation
page read and write
113E000
heap
page read and write
3C2E000
direct allocation
page read and write
6BA0000
trusted library allocation
page execute and read and write
40C0000
direct allocation
page read and write
14F0000
heap
page read and write
1120000
heap
page read and write
40C0000
direct allocation
page read and write
1592000
heap
page read and write
1120000
heap
page read and write
B10000
unkown
page readonly
1508000
heap
page read and write
4635000
trusted library allocation
page read and write
4109000
direct allocation
page read and write
369E000
trusted library allocation
page read and write
69E0000
trusted library allocation
page read and write
43DA000
trusted library allocation
page read and write
DCE000
stack
page read and write
76B0000
trusted library allocation
page read and write
395A000
trusted library allocation
page read and write
14E1000
heap
page read and write
158F000
heap
page read and write
35A6000
trusted library allocation
page read and write
104C000
stack
page read and write
43ED000
trusted library allocation
page read and write
3BBD000
direct allocation
page read and write
3507000
trusted library allocation
page read and write
38DA000
trusted library allocation
page read and write
34AC000
trusted library allocation
page read and write
1CCE000
stack
page read and write
6831000
trusted library allocation
page read and write
39AE000
trusted library allocation
page read and write
5B7A000
heap
page read and write
3230000
heap
page read and write
5AAE000
stack
page read and write
CD9000
stack
page read and write
5B9C000
heap
page read and write
43F3000
trusted library allocation
page read and write
58A7000
heap
page execute and read and write
4050000
direct allocation
page read and write
682E000
trusted library allocation
page read and write
3A90000
direct allocation
page read and write
45CD000
trusted library allocation
page read and write
466A000
trusted library allocation
page read and write
43C7000
trusted library allocation
page read and write
4043000
direct allocation
page read and write
91E000
stack
page read and write
4580000
trusted library allocation
page read and write
425E000
direct allocation
page read and write
41EE000
direct allocation
page read and write
45DA000
trusted library allocation
page read and write
8242000
heap
page read and write
461C000
trusted library allocation
page read and write
4497000
trusted library allocation
page read and write
425E000
direct allocation
page read and write
43E8000
trusted library allocation
page read and write
3698000
trusted library allocation
page read and write
6865000
trusted library allocation
page read and write
1471000
heap
page read and write
3EB0000
direct allocation
page read and write
41ED000
direct allocation
page read and write
6E40000
trusted library allocation
page read and write
2F20000
trusted library allocation
page read and write
148F000
heap
page read and write
153F000
heap
page execute and read and write
8279000
heap
page read and write
7660000
trusted library allocation
page read and write
4454000
trusted library allocation
page read and write
3180000
trusted library allocation
page read and write
3F63000
direct allocation
page read and write
BD7000
unkown
page readonly
849E000
stack
page read and write
60D0000
trusted library allocation
page read and write
BCE000
unkown
page write copy
2F2A000
trusted library allocation
page execute and read and write
3950000
heap
page read and write
76A8000
trusted library allocation
page read and write
148F000
heap
page read and write
4423000
trusted library allocation
page read and write
There are 668 hidden memdumps, click here to show them.