IOC Report
Iauncher.exe

loading gif

Files

File Path
Type
Category
Malicious
Iauncher.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Roaming\Gitgo2\Iauncher.exe
PE32 executable (console) Intel 80386, for MS Windows
modified
malicious
C:\Users\Public\Desktop\Google Chrome.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Description string, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:41 2023, mtime=Thu Oct 5 06:54:36 2023, atime=Wed Sep 27 08:36:54 2023, length=3242272, window=hide
dropped
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\RegAsm.exe.log
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\Tmp2498.tmp
data
dropped
C:\Users\user\AppData\Local\Temp\Tmp24A8.tmp
data
dropped
C:\Users\user\AppData\Roaming\Iauncher.zip
Zip archive data, at least v2.0 to extract, compression method=deflate
dropped
C:\Users\user\AppData\Roaming\Microsoft\Crypto\RSA\S-1-5-21-2246122658-3693405117-2476756634-1003\76b53b3ec448f7ccdda2063b15d2bfc3_9e146be9-c76a-4720-bcdb-53011b87bd06
data
dropped

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\Iauncher.exe
"C:\Users\user\Desktop\Iauncher.exe"
malicious
C:\Users\user\AppData\Roaming\Gitgo2\Iauncher.exe
"C:\Users\user\AppData\Roaming\Gitgo2\Iauncher.exe"
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1

URLs

Name
IP
Malicious
http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-soap-message-security-1.0#Text
unknown
http://schemas.xmlsoap.org/ws/2005/02/sc/sct
unknown
https://gitgo.org/Iauncher.zipd
unknown
http://schemas.xmlsoap.org/ws/2004/04/security/sc/dk
unknown
http://tempuri.org/Entity/Id23ResponseD
unknown
http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-soap-message-security-1.0#HexBinary
unknown
http://tempuri.org/Entity/Id12Response
unknown
https://gitgo.org
unknown
http://tempuri.org/
unknown
http://tempuri.org/Entity/Id2Response
unknown
https://antiloxss.usite.pro/STLprograms/NEW/LM19AR/Gitgo2/BuildZipName.txtd
unknown
https://antiloxss.usite.pro/STLprograms/NEW/LM19AR/Gitgo2/BuildLink.txt
193.109.246.100
http://schemas.xmlsoap.org/ws/2005/02/sc/dk/p_sha1
unknown
http://tempuri.org/Entity/Id21Response
unknown
https://www.siticoneframework.com/
unknown
https://antiloxss.usite.pro/STLprograms/NEW/hwid.txt
193.109.246.100
http://schemas.xmlsoap.org/2005/02/trust/spnego#GSS_Wrap
unknown
http://tempuri.org/Entity/Id9
unknown
http://docs.oasis-open.org/wss/oasis-wss-saml-token-profile-1.1#SAMLID
unknown
http://tempuri.org/Entity/Id8
unknown
http://tempuri.org/Entity/Id5
unknown
http://schemas.xmlsoap.org/ws/2004/10/wsat/Prepare
unknown
http://tempuri.org/Entity/Id4
unknown
http://tempuri.org/Entity/Id7
unknown
http://tempuri.org/Entity/Id6
unknown
http://schemas.xmlsoap.org/ws/2005/02/trust#BinarySecret
unknown
http://tempuri.org/Entity/Id19Response
unknown
http://docs.oasis-open.org/wss/oasis-wss-rel-token-profile-1.0.pdf#license
unknown
http://schemas.xmlsoap.org/ws/2005/02/trust/RSTR/Issue
unknown
http://schemas.xmlsoap.org/ws/2004/10/wsat/Aborted
unknown
http://schemas.xmlsoap.org/ws/2005/02/rm/TerminateSequence
unknown
http://schemas.xmlsoap.org/ws/2004/10/wsat/fault
unknown
http://schemas.xmlsoap.org/ws/2004/10/wsat
unknown
http://docs.oasis-open.org/wss/oasis-wss-soap-message-security-1.1#EncryptedKey
unknown
http://tempuri.org/Entity/Id15Response
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
https://antiloxss.usite.pro/STLprograms/NEW/LM19AR/Gitgo2/BuildName.txtt-
unknown
http://gitgo.org
unknown
http://schemas.xmlsoap.org/ws/2005/02/trust/RSTR/SCT/Renew
unknown
http://schemas.xmlsoap.org/ws/2004/08/addressing/faultp9
unknown
http://schemas.xmlsoap.org/ws/2004/10/wscoor/Register
unknown
http://tempuri.org/Entity/Id6Response
unknown
http://schemas.xmlsoap.org/ws/2004/04/trust/SymmetricKey
unknown
https://antiloxss.usite.pro/STLprograms/NEW/LM19AR/Gitgo2/BuildLink.txtt-
unknown
https://antiloxss.usite.pro/STLprograms/NEW/LM19AR/hwids.txtd
unknown
https://api.ip.sb/ip
unknown
http://vimeo.com/api/v2/video/
unknown
http://schemas.xmlsoap.org/ws/2004/04/sc
unknown
http://tempuri.org/Entity/Id1ResponseD
unknown
http://schemas.xmlsoap.org/ws/2004/10/wsat/Volatile2PC
unknown
https://antiloxss.usite.pro
unknown
http://schemas.xmlsoap.org/ws/2005/02/trust/RSTR/SCT/Cancel
unknown
http://tempuri.org/Entity/Id9Response
unknown
http://tempuri.org/Entity/Id20
unknown
http://tempuri.org/Entity/Id21
unknown
http://tempuri.org/Entity/Id22
unknown
http://docs.oasis-open.org/wss/oasis-wss-kerberos-token-profile-1.1#Kerberosv5APREQSHA1
unknown
http://tempuri.org/Entity/Id23
unknown
http://schemas.xmlsoap.org/ws/2004/04/security/trust/CK/PSHA1
unknown
http://tempuri.org/Entity/Id24
unknown
http://schemas.xmlsoap.org/ws/2004/04/security/trust/RSTR/Issue
unknown
http://tempuri.org/Entity/Id24Response
unknown
http://tempuri.org/Entity/Id1Response
unknown
http://schemas.xmlsoap.org/ws/2005/02/rm/AckRequested
unknown
http://schemas.xmlsoap.org/ws/2004/10/wsat/ReadOnly
unknown
http://schemas.xmlsoap.org/ws/2004/10/wsat/Replay
unknown
http://schemas.xmlsoap.org/ws/2005/02/trust/tlsnego
unknown
http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-soap-message-security-1.0#Base64Binary
unknown
https://antiloxss.usite.pro/STLprograms/NEW/LM19AR/Gitgo2/BuildZipName.txt
193.109.246.100
http://schemas.xmlsoap.org/ws/2004/10/wsat/Durable2PC
unknown
http://schemas.xmlsoap.org/ws/2004/04/security/trust/SymmetricKey
unknown
https://antiloxss.usite.pro/STLprograms/NEW/LM19AR/Gitgo2/BuildLink.txtd
unknown
http://schemas.xmlsoap.org/ws/2004/08/addressing
unknown
https://gitgo.org/Iauncher.zip
172.67.202.98
https://communitykeyv1.000webhostapp.com/Decoder4.php?string=
unknown
http://schemas.xmlsoap.org/ws/2005/02/trust/RST/Issue
unknown
http://ns.adp/1.0/
unknown
http://schemas.xmlsoap.org/ws/2004/10/wsat/Completion
unknown
http://schemas.xmlsoap.org/ws/2004/04/trust
unknown
http://tempuri.org/Entity/Id10
unknown
http://tempuri.org/Entity/Id11
unknown
https://antiloxss.usite.pro/STLprograms/NEW/hwid.txtd
unknown
http://tempuri.org/Entity/Id12
unknown
http://tempuri.org/Entity/Id16Response
unknown
http://schemas.xmlsoap.org/ws/2004/10/wscoor/CreateCoordinationContextResponse
unknown
http://schemas.xmlsoap.org/ws/2005/02/trust/RST/SCT/Cancel
unknown
http://tempuri.org/Entity/Id13
unknown
http://tempuri.org/Entity/Id14
unknown
http://tempuri.org/Entity/Id15
unknown
http://tempuri.org/Entity/Id16
unknown
http://schemas.xmlsoap.org/ws/2005/02/trust/Nonce
unknown
http://tempuri.org/Entity/Id17
unknown
http://tempuri.org/Entity/Id18
unknown
http://tempuri.org/Entity/Id5Response
unknown
http://tempuri.org/Entity/Id19
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/dns
unknown
https://antiloxss.usite.pro/STLprograms/NEW/LM19AR/Gitgo2/BuildName.txt
193.109.246.100
http://tempuri.org/Entity/Id10Response
unknown
http://gitgo.orgd
unknown
http://schemas.xmlsoap.org/ws/2005/02/trust/Renew
unknown
There are 90 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
antiloxss.usite.pro
193.109.246.100
google.com
172.253.122.101
gitgo.org
172.67.202.98

IPs

IP
Domain
Country
Malicious
147.45.47.65
unknown
Russian Federation
malicious
193.109.246.100
antiloxss.usite.pro
Virgin Islands (BRITISH)
172.67.202.98
gitgo.org
United States
172.253.122.101
google.com
United States

Registry

Path
Value
Malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\F1A578C4CB5DE79A370893983FD4DA8B67B2B064
Blob
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Iauncher_RASAPI32
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Iauncher_RASAPI32
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Iauncher_RASAPI32
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Iauncher_RASAPI32
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Iauncher_RASAPI32
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Iauncher_RASAPI32
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Iauncher_RASAPI32
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Iauncher_RASMANCS
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Iauncher_RASMANCS
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Iauncher_RASMANCS
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Iauncher_RASMANCS
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Iauncher_RASMANCS
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Iauncher_RASMANCS
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Iauncher_RASMANCS
FileDirectory
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
Owner
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
SessionHash
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
Sequence
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
RegFiles0000
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
RegFilesHash
There are 11 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
402000
remote allocation
page execute and read and write
malicious
58E000
unkown
page read and write
malicious
2431000
trusted library allocation
page read and write
malicious
5C10000
trusted library section
page read and write
malicious
2A11000
trusted library allocation
page read and write
malicious
592000
unkown
page readonly
malicious
285F000
trusted library allocation
page read and write
5E80000
trusted library allocation
page read and write
570000
heap
page read and write
57A0000
trusted library allocation
page read and write
B0E000
stack
page read and write
4E7D000
trusted library allocation
page read and write
360A000
trusted library allocation
page read and write
9D00000
trusted library allocation
page read and write
3431000
trusted library allocation
page read and write
563C000
heap
page read and write
5EF0000
heap
page read and write
52E0000
trusted library allocation
page execute and read and write
954E000
stack
page read and write
A20000
heap
page read and write
2891000
trusted library allocation
page read and write
50A3000
heap
page execute and read and write
29B0000
trusted library allocation
page read and write
70FA000
trusted library allocation
page read and write
D86000
heap
page read and write
25BB000
trusted library allocation
page read and write
560000
unkown
page readonly
536B000
stack
page read and write
2903000
trusted library allocation
page read and write
BE0000
heap
page execute and read and write
D4D000
trusted library allocation
page execute and read and write
26F1000
trusted library allocation
page read and write
6D2E000
heap
page read and write
5EC6000
trusted library allocation
page read and write
6D96000
heap
page read and write
561000
unkown
page execute read
5667000
heap
page read and write
345A000
trusted library allocation
page read and write
8950000
trusted library section
page read and write
5D70000
trusted library allocation
page read and write
2B15000
trusted library allocation
page read and write
9440000
heap
page execute and read and write
37C5000
trusted library allocation
page read and write
CD0000
heap
page read and write
563E000
heap
page read and write
8CBF000
stack
page read and write
70D9000
trusted library allocation
page read and write
9D0000
trusted library allocation
page read and write
9DD000
trusted library allocation
page execute and read and write
5067000
trusted library allocation
page read and write
8898000
trusted library allocation
page read and write
5717000
heap
page read and write
29ED000
trusted library allocation
page read and write
D3D000
trusted library allocation
page execute and read and write
2BD4000
trusted library allocation
page read and write
786E000
stack
page read and write
D93000
heap
page read and write
5F20000
trusted library allocation
page read and write
5730000
heap
page read and write
88A0000
trusted library allocation
page read and write
6BF0000
heap
page read and write
294E000
trusted library allocation
page read and write
6EF0000
trusted library allocation
page read and write
6130000
trusted library allocation
page read and write
5D60000
trusted library allocation
page execute and read and write
5FA0000
trusted library allocation
page execute and read and write
2752000
trusted library allocation
page read and write
AA00000
trusted library allocation
page read and write
61FC000
stack
page read and write
279C000
trusted library allocation
page read and write
2922000
trusted library allocation
page read and write
7D6000
stack
page read and write
F67000
trusted library allocation
page execute and read and write
964E000
stack
page read and write
A0B000
trusted library allocation
page execute and read and write
3799000
trusted library allocation
page read and write
6170000
trusted library allocation
page read and write
27CB000
trusted library allocation
page read and write
1060000
heap
page read and write
48B5000
trusted library allocation
page read and write
ABE000
stack
page read and write
75E0000
trusted library allocation
page execute and read and write
AFC000
stack
page read and write
D5A000
heap
page read and write
564B000
heap
page read and write
E0D000
heap
page read and write
9D4000
trusted library allocation
page read and write
27F2000
trusted library allocation
page read and write
6483000
trusted library allocation
page read and write
4891000
trusted library allocation
page read and write
584000
unkown
page readonly
5F10000
trusted library allocation
page read and write
7150000
trusted library allocation
page execute and read and write
37A4000
trusted library allocation
page read and write
F56000
trusted library allocation
page execute and read and write
2A9B000
trusted library allocation
page read and write
2BA0000
trusted library allocation
page read and write
5F80000
trusted library allocation
page read and write
5370000
trusted library section
page readonly
35C1000
trusted library allocation
page read and write
256E000
trusted library allocation
page read and write
37BB000
trusted library allocation
page read and write
4F20000
trusted library allocation
page read and write
3635000
trusted library allocation
page read and write
56FC000
heap
page read and write
7140000
trusted library allocation
page read and write
B18000
trusted library allocation
page read and write
BFE000
stack
page read and write
70F5000
trusted library allocation
page read and write
4896000
trusted library allocation
page read and write
9BE0000
trusted library allocation
page read and write
2955000
trusted library allocation
page read and write
25A4000
trusted library allocation
page read and write
5F05000
trusted library allocation
page read and write
A30000
trusted library allocation
page read and write
437000
remote allocation
page execute and read and write
2AAB000
trusted library allocation
page read and write
5D3000
unkown
page read and write
35C9000
trusted library allocation
page read and write
100E000
stack
page read and write
7110000
trusted library allocation
page read and write
4BB0000
heap
page execute and read and write
3828000
trusted library allocation
page read and write
292F000
trusted library allocation
page read and write
27CD000
trusted library allocation
page read and write
F65000
trusted library allocation
page execute and read and write
4A6E000
stack
page read and write
3866000
trusted library allocation
page read and write
5E85000
trusted library allocation
page read and write
507F000
trusted library allocation
page read and write
25D3000
trusted library allocation
page read and write
2871000
trusted library allocation
page read and write
BE0000
heap
page read and write
70D2000
trusted library allocation
page read and write
366F000
trusted library allocation
page read and write
452B000
stack
page read and write
564E000
heap
page read and write
2C6F000
trusted library allocation
page read and write
5DA0000
trusted library allocation
page execute and read and write
6FCB000
unkown
page read and write
2647000
trusted library allocation
page read and write
7240000
trusted library allocation
page execute and read and write
F4E000
stack
page read and write
2A0F000
trusted library allocation
page read and write
A02000
trusted library allocation
page read and write
3A21000
trusted library allocation
page read and write
EDF000
stack
page read and write
950F000
stack
page read and write
29F0000
trusted library allocation
page read and write
C3E000
stack
page read and write
2C5C000
trusted library allocation
page read and write
55EF000
heap
page read and write
3870000
trusted library allocation
page read and write
D10000
heap
page read and write
590000
unkown
page write copy
756E000
stack
page read and write
71CD000
stack
page read and write
48E0000
trusted library allocation
page read and write
5DC0000
trusted library allocation
page read and write
2887000
trusted library allocation
page read and write
529E000
stack
page read and write
64A0000
trusted library allocation
page read and write
58E000
unkown
page write copy
1C7000
stack
page read and write
2943000
trusted library allocation
page read and write
75D0000
trusted library allocation
page read and write
5EDE000
stack
page read and write
5ED2000
trusted library allocation
page read and write
26C5000
trusted library allocation
page read and write
25BD000
trusted library allocation
page read and write
2AF4000
trusted library allocation
page read and write
895C000
trusted library section
page read and write
2ADB000
trusted library allocation
page read and write
27C4000
trusted library allocation
page read and write
2AB3000
trusted library allocation
page read and write
363A000
trusted library allocation
page read and write
2976000
trusted library allocation
page read and write
DDF000
stack
page read and write
5EE0000
heap
page read and write
4AB0000
heap
page read and write
5560000
heap
page read and write
9AC0000
heap
page read and write
F52000
trusted library allocation
page read and write
9FA000
trusted library allocation
page execute and read and write
5600000
heap
page read and write
2916000
trusted library allocation
page read and write
5EDE000
trusted library allocation
page read and write
728E000
stack
page read and write
6D6D000
heap
page read and write
3821000
trusted library allocation
page read and write
383F000
trusted library allocation
page read and write
290D000
trusted library allocation
page read and write
B20000
heap
page read and write
BB5000
heap
page read and write
88AA000
trusted library allocation
page read and write
558D000
heap
page read and write
62FC000
stack
page read and write
29E0000
heap
page execute and read and write
6180000
trusted library allocation
page read and write
2BB2000
trusted library allocation
page read and write
552E000
stack
page read and write
889A000
trusted library allocation
page read and write
25C3000
trusted library allocation
page read and write
70256000
unkown
page readonly
9F0000
trusted library allocation
page read and write
271A000
trusted library allocation
page read and write
1044000
trusted library allocation
page read and write
61B0000
trusted library allocation
page execute and read and write
4F40000
heap
page read and write
720E000
stack
page read and write
A00000
trusted library allocation
page read and write
8980000
heap
page read and write
2581000
trusted library allocation
page read and write
29B5000
trusted library allocation
page read and write
5F22000
heap
page read and write
2AED000
trusted library allocation
page read and write
1020000
trusted library allocation
page read and write
D17000
heap
page read and write
432000
remote allocation
page execute and read and write
C1E000
heap
page read and write
3656000
trusted library allocation
page read and write
5060000
trusted library allocation
page read and write
5FB0000
trusted library allocation
page execute and read and write
2BAC000
trusted library allocation
page read and write
4E5B000
trusted library allocation
page read and write
5DB0000
trusted library allocation
page execute and read and write
D20000
trusted library allocation
page read and write
F6B000
trusted library allocation
page execute and read and write
5586000
heap
page read and write
BF0000
trusted library allocation
page read and write
2AE2000
trusted library allocation
page read and write
1040000
trusted library allocation
page read and write
BC0000
trusted library allocation
page read and write
5F30000
trusted library allocation
page read and write
7025D000
unkown
page read and write
5E7A000
trusted library allocation
page read and write
26B4000
trusted library allocation
page read and write
276E000
trusted library allocation
page read and write
5F18000
heap
page read and write
B6E000
stack
page read and write
D9C000
heap
page read and write
3675000
trusted library allocation
page read and write
264C000
trusted library allocation
page read and write
5DE000
stack
page read and write
37CE000
trusted library allocation
page read and write
5640000
heap
page read and write
3833000
trusted library allocation
page read and write
4E53000
heap
page read and write
D40000
trusted library allocation
page read and write
9CA0000
trusted library allocation
page execute and read and write
7104000
trusted library allocation
page read and write
290F000
stack
page read and write
7120000
trusted library allocation
page read and write
633D000
stack
page read and write
74B000
heap
page read and write
CA000
stack
page read and write
2D04000
trusted library allocation
page read and write
270C000
trusted library allocation
page read and write
273B000
trusted library allocation
page read and write
265C000
trusted library allocation
page read and write
3629000
trusted library allocation
page read and write
5723000
heap
page read and write
50A0000
heap
page execute and read and write
96D000
stack
page read and write
2C5E000
trusted library allocation
page read and write
2918000
trusted library allocation
page read and write
366C000
trusted library allocation
page read and write
55F6000
heap
page read and write
630000
heap
page read and write
2868000
trusted library allocation
page read and write
620000
trusted library allocation
page read and write
2AFE000
trusted library allocation
page read and write
5CEE000
stack
page read and write
D50000
heap
page read and write
7210000
trusted library allocation
page read and write
4B0E000
stack
page read and write
27BA000
trusted library allocation
page read and write
346B000
trusted library allocation
page read and write
3879000
trusted library allocation
page read and write
2960000
trusted library allocation
page read and write
489D000
trusted library allocation
page read and write
86D000
stack
page read and write
635000
heap
page read and write
721D000
trusted library allocation
page read and write
6F10000
heap
page read and write
70EF000
trusted library allocation
page read and write
DDD000
heap
page read and write
7290000
trusted library allocation
page read and write
560B000
heap
page read and write
3452000
trusted library allocation
page read and write
8956000
trusted library section
page read and write
89CE000
heap
page read and write
A7E000
stack
page read and write
274D000
trusted library allocation
page read and write
6DBE000
heap
page read and write
C0E000
trusted library allocation
page read and write
232E000
stack
page read and write
4E2F000
stack
page read and write
2D20000
trusted library allocation
page read and write
5300000
trusted library allocation
page read and write
555E000
stack
page read and write
7F9E0000
trusted library allocation
page execute and read and write
4940000
trusted library allocation
page execute and read and write
37AE000
trusted library allocation
page read and write
3EF1000
trusted library allocation
page read and write
4EF0000
trusted library allocation
page execute and read and write
590000
unkown
page readonly
3794000
trusted library allocation
page read and write
487B000
trusted library allocation
page read and write
2734000
trusted library allocation
page read and write
4F43000
heap
page read and write
6D90000
heap
page read and write
293C000
trusted library allocation
page read and write
1080000
heap
page read and write
2658000
trusted library allocation
page read and write
2B90000
trusted library allocation
page read and write
4AAE000
stack
page read and write
9C40000
trusted library allocation
page execute and read and write
2757000
trusted library allocation
page read and write
BAF000
stack
page read and write
6190000
trusted library allocation
page execute and read and write
980F000
stack
page read and write
48A2000
trusted library allocation
page read and write
A622000
trusted library allocation
page read and write
55B3000
heap
page read and write
5F00000
trusted library allocation
page read and write
37B4000
trusted library allocation
page read and write
5E89000
trusted library allocation
page read and write
5E75000
trusted library allocation
page read and write
70E8000
trusted library allocation
page read and write
26BD000
trusted library allocation
page read and write
5DA0000
trusted library allocation
page read and write
4E57000
heap
page read and write
3645000
trusted library allocation
page read and write
4932000
trusted library allocation
page read and write
378E000
trusted library allocation
page read and write
70CE000
stack
page read and write
37D3000
trusted library allocation
page read and write
3876000
trusted library allocation
page read and write
2763000
trusted library allocation
page read and write
5798000
trusted library allocation
page read and write
25C1000
trusted library allocation
page read and write
9ED000
trusted library allocation
page execute and read and write
3860000
trusted library allocation
page read and write
3768000
trusted library allocation
page read and write
2AC1000
trusted library allocation
page read and write
387C000
trusted library allocation
page read and write
B4E000
stack
page read and write
8BBD000
stack
page read and write
1030000
trusted library allocation
page read and write
3666000
trusted library allocation
page read and write
6150000
trusted library allocation
page read and write
B00000
heap
page read and write
5BAE000
stack
page read and write
2AB5000
trusted library allocation
page read and write
4920000
heap
page read and write
970E000
stack
page read and write
73F000
stack
page read and write
2B95000
trusted library allocation
page read and write
BEA000
heap
page read and write
BB0000
trusted library allocation
page execute and read and write
5E0000
heap
page read and write
6BED000
stack
page read and write
2655000
trusted library allocation
page read and write
2C25000
trusted library allocation
page read and write
2ACE000
trusted library allocation
page read and write
6140000
trusted library allocation
page read and write
6000000
trusted library allocation
page execute and read and write
26E3000
trusted library allocation
page read and write
25C9000
trusted library allocation
page read and write
5F50000
trusted library allocation
page read and write
2C2D000
trusted library allocation
page read and write
7025F000
unkown
page readonly
3630000
trusted library allocation
page read and write
7118000
trusted library allocation
page read and write
545E000
stack
page read and write
361E000
trusted library allocation
page read and write
2649000
trusted library allocation
page read and write
5588000
heap
page read and write
488E000
trusted library allocation
page read and write
A05000
trusted library allocation
page execute and read and write
4EE0000
heap
page read and write
D33000
trusted library allocation
page execute and read and write
6D1B000
heap
page read and write
2897000
trusted library allocation
page read and write
2BCC000
trusted library allocation
page read and write
5630000
heap
page read and write
F50000
trusted library allocation
page read and write
6EF9000
trusted library allocation
page read and write
6CFD000
heap
page read and write
D5E000
heap
page read and write
48EE000
trusted library allocation
page read and write
578E000
stack
page read and write
5F00000
heap
page read and write
BB0000
heap
page read and write
7220000
heap
page read and write
6490000
trusted library allocation
page execute and read and write
2BD0000
trusted library allocation
page read and write
740000
heap
page read and write
70240000
unkown
page readonly
4BB3000
heap
page execute and read and write
772E000
stack
page read and write
B1A000
trusted library allocation
page read and write
6480000
trusted library allocation
page read and write
F5A000
trusted library allocation
page execute and read and write
BD0000
trusted library allocation
page read and write
F80000
trusted library allocation
page read and write
3775000
trusted library allocation
page read and write
37D9000
trusted library allocation
page read and write
88A8000
trusted library allocation
page read and write
7025D000
unkown
page read and write
5DD000
unkown
page readonly
71C2000
trusted library allocation
page read and write
5310000
trusted library allocation
page read and write
2B8E000
trusted library allocation
page read and write
2746000
trusted library allocation
page read and write
35CF000
trusted library allocation
page read and write
26D6000
trusted library allocation
page read and write
29C0000
trusted library allocation
page read and write
35C7000
trusted library allocation
page read and write
560000
unkown
page readonly
384F000
trusted library allocation
page read and write
2709000
trusted library allocation
page read and write
5C4000
unkown
page read and write
7009000
heap
page read and write
4E71000
trusted library allocation
page read and write
9D0000
heap
page read and write
35C4000
trusted library allocation
page read and write
5F90000
trusted library allocation
page read and write
3694000
trusted library allocation
page read and write
5A6E000
stack
page read and write
801000
heap
page read and write
5DC000
unkown
page execute and read and write
D78000
heap
page read and write
AC0000
heap
page read and write
5F1D000
heap
page read and write
1068000
heap
page read and write
2BC1000
trusted library allocation
page read and write
2A14000
trusted library allocation
page read and write
5F0B000
trusted library allocation
page read and write
5EBB000
trusted library allocation
page read and write
490000
heap
page read and write
6EF6000
trusted library allocation
page read and write
3807000
trusted library allocation
page read and write
70256000
unkown
page readonly
5EE1000
trusted library allocation
page read and write
343F000
trusted library allocation
page read and write
52F2000
trusted library allocation
page read and write
94CD000
stack
page read and write
5790000
trusted library allocation
page read and write
8857000
trusted library allocation
page read and write
2A2A000
trusted library allocation
page read and write
56E1000
heap
page read and write
4E6E000
trusted library allocation
page read and write
5E87000
trusted library allocation
page read and write
25C7000
trusted library allocation
page read and write
64C0000
trusted library allocation
page read and write
3889000
trusted library allocation
page read and write
647E000
stack
page read and write
2A09000
trusted library allocation
page read and write
1050000
trusted library allocation
page read and write
FCE000
stack
page read and write
5D80000
trusted library allocation
page execute and read and write
4870000
trusted library allocation
page read and write
2ACA000
trusted library allocation
page read and write
F62000
trusted library allocation
page read and write
786000
heap
page read and write
5080000
trusted library section
page read and write
3617000
trusted library allocation
page read and write
26F8000
trusted library allocation
page read and write
386D000
trusted library allocation
page read and write
5DD0000
trusted library allocation
page execute and read and write
567A000
heap
page read and write
5090000
heap
page read and write
5AAE000
stack
page read and write
27D6000
trusted library allocation
page read and write
9BF0000
trusted library allocation
page execute and read and write
35B8000
trusted library allocation
page read and write
A27000
heap
page read and write
4E76000
trusted library allocation
page read and write
7014000
heap
page read and write
287B000
trusted library allocation
page read and write
2ABD000
trusted library allocation
page read and write
296B000
trusted library allocation
page read and write
567D000
heap
page read and write
37D0000
trusted library allocation
page read and write
5EE5000
heap
page read and write
6CF0000
heap
page read and write
6DA5000
heap
page read and write
C15000
heap
page read and write
8888000
trusted library allocation
page read and write
5410000
heap
page read and write
48B0000
trusted library allocation
page read and write
5EB0000
trusted library allocation
page read and write
270E000
trusted library allocation
page read and write
2727000
trusted library allocation
page read and write
3742000
trusted library allocation
page read and write
D30000
trusted library allocation
page read and write
27EC000
trusted library allocation
page read and write
70D0000
trusted library allocation
page read and write
2A00000
heap
page read and write
832000
heap
page read and write
D34000
trusted library allocation
page read and write
4930000
trusted library allocation
page read and write
35BB000
trusted library allocation
page read and write
5DD000
unkown
page readonly
7160000
trusted library allocation
page read and write
2AF9000
trusted library allocation
page read and write
C00000
trusted library allocation
page read and write
9E0000
trusted library allocation
page read and write
643C000
stack
page read and write
2B0A000
trusted library allocation
page read and write
400000
remote allocation
page execute and read and write
383A000
trusted library allocation
page read and write
4980000
heap
page read and write
A07000
trusted library allocation
page execute and read and write
6160000
heap
page execute and read and write
7130000
trusted library allocation
page execute and read and write
25EA000
trusted library allocation
page read and write
5EC1000
trusted library allocation
page read and write
364F000
trusted library allocation
page read and write
35D4000
trusted library allocation
page read and write
27E3000
trusted library allocation
page read and write
37C1000
trusted library allocation
page read and write
6010000
trusted library allocation
page execute and read and write
4874000
trusted library allocation
page read and write
2C29000
trusted library allocation
page read and write
295B000
trusted library allocation
page read and write
6D6000
stack
page read and write
56CE000
heap
page read and write
4E42000
heap
page read and write
572E000
heap
page read and write
9F2000
trusted library allocation
page read and write
5CF0000
trusted library allocation
page read and write
5BEE000
stack
page read and write
5D80000
trusted library allocation
page execute and read and write
70FF000
trusted library allocation
page read and write
75EF000
stack
page read and write
2BE9000
trusted library allocation
page read and write
762E000
stack
page read and write
37FB000
trusted library allocation
page read and write
35F1000
trusted library allocation
page read and write
27E8000
trusted library allocation
page read and write
DD2000
heap
page read and write
562E000
stack
page read and write
75AE000
stack
page read and write
5E70000
trusted library allocation
page read and write
5EF0000
trusted library allocation
page read and write
9C10000
trusted library allocation
page read and write
5612000
heap
page read and write
387E000
trusted library allocation
page read and write
2AA2000
trusted library allocation
page read and write
BEE000
heap
page read and write
242E000
stack
page read and write
3788000
trusted library allocation
page read and write
3884000
trusted library allocation
page read and write
26C9000
trusted library allocation
page read and write
2703000
trusted library allocation
page read and write
9D3000
trusted library allocation
page execute and read and write
5579000
heap
page read and write
2CB9000
trusted library allocation
page read and write
377C000
trusted library allocation
page read and write
446000
remote allocation
page execute and read and write
2A1F000
trusted library allocation
page read and write
70EA000
trusted library allocation
page read and write
4983000
heap
page read and write
367A000
trusted library allocation
page read and write
2C1D000
trusted library allocation
page read and write
6FF0000
heap
page read and write
2C21000
trusted library allocation
page read and write
5400000
heap
page read and write
3663000
trusted library allocation
page read and write
3859000
trusted library allocation
page read and write
37CA000
trusted library allocation
page read and write
C10000
heap
page read and write
5F0E000
trusted library allocation
page read and write
367F000
trusted library allocation
page read and write
88A2000
trusted library allocation
page read and write
365C000
trusted library allocation
page read and write
29F7000
trusted library allocation
page read and write
3473000
trusted library allocation
page read and write
A40000
heap
page read and write
7100000
trusted library allocation
page read and write
3814000
trusted library allocation
page read and write
70241000
unkown
page execute read
9F6000
trusted library allocation
page execute and read and write
3A11000
trusted library allocation
page read and write
561000
unkown
page execute read
4F30000
trusted library allocation
page read and write
70D5000
trusted library allocation
page read and write
563A000
heap
page read and write
776E000
stack
page read and write
9E0000
heap
page read and write
48C0000
trusted library allocation
page read and write
5D90000
trusted library allocation
page read and write
34B4000
trusted library allocation
page read and write
8896000
trusted library allocation
page read and write
288C000
trusted library allocation
page read and write
1010000
trusted library allocation
page execute and read and write
4E50000
trusted library allocation
page read and write
5F40000
trusted library allocation
page read and write
3672000
trusted library allocation
page read and write
584000
unkown
page readonly
37DD000
trusted library allocation
page read and write
3844000
trusted library allocation
page read and write
5619000
heap
page read and write
2B9E000
trusted library allocation
page read and write
4CBE000
stack
page read and write
2C31000
trusted library allocation
page read and write
6D70000
heap
page read and write
24D7000
trusted library allocation
page read and write
2914000
trusted library allocation
page read and write
35FD000
trusted library allocation
page read and write
There are 603 hidden memdumps, click here to show them.