IOC Report
NUEVA ORDEN DE COMPRAsxlx..exe

loading gif

Files

File Path
Type
Category
Malicious
NUEVA ORDEN DE COMPRAsxlx..exe
PE32+ executable (console) x86-64 Mono/.Net assembly, for MS Windows
initial sample
malicious
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_NUEVA ORDEN DE C_f7bac2445179e8f2c312d8977cbf32c417e6_15c0ca2f_f5328e29-51a0-46c5-8335-48b5900a66c4\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER3EB3.tmp.dmp
Mini DuMP crash report, 16 streams, Mon May 27 10:20:04 2024, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER4645.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER4675.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
data
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_1xiw1g43.whz.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_34dbr0qw.55s.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_aqoqxckf.01r.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_fnabt4oe.n5g.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_hqvkcwwr.tfw.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_jmuhjihw.amo.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exe
PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Windows\appcompat\Programs\Amcache.hve
MS Windows registry file, NT/2000 or above
dropped
\Device\ConDrv
ASCII text, with CRLF line terminators
dropped
There are 5 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\NUEVA ORDEN DE COMPRAsxlx..exe
"C:\Users\user\Desktop\NUEVA ORDEN DE COMPRAsxlx..exe"
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\NUEVA ORDEN DE COMPRAsxlx..exe" -Force
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
"C:\Windows\Microsoft.NET\Framework\v4.0.30319\regsvcs.exe"
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
"C:\Windows\Microsoft.NET\Framework\v4.0.30319\regsvcs.exe"
malicious
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
"Powershell.exe" -ExecutionPolicy Bypass -command Copy-Item 'C:\Windows\Microsoft.NET\Framework\v4.0.30319\regsvcs.exe' 'C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exe'
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
"C:\Windows\Microsoft.NET\Framework\v4.0.30319\regsvcs.exe"
malicious
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exe
"C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exe"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe
"C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe"
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\WerFault.exe
C:\Windows\system32\WerFault.exe -u -p 7596 -s 1620
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
There are 3 hidden processes, click here to show them.

URLs

Name
IP
Malicious
http://pesterbdd.com/images/Pester.png
unknown
malicious
http://nuget.org/NuGet.exe
unknown
https://reallyfreegeoip.org/xml/8.46.123.175H
unknown
http://www.apache.org/licenses/LICENSE-2.0.html
unknown
https://contoso.com/License
unknown
https://contoso.com/Icon
unknown
http://upx.sf.net
unknown
http://checkip.dyndns.org
unknown
https://aka.ms/pscore6
unknown
https://github.com/Pester/Pester
unknown
https://reallyfreegeoip.org/xml/8.46.123.175
188.114.96.3
http://checkip.dyndns.org/
193.122.6.168
http://checkip.dyndns.org/q
unknown
https://contoso.com/
unknown
https://nuget.org/nuget.exe
unknown
https://scratchdreams.tk
unknown
http://reallyfreegeoip.org
unknown
https://reallyfreegeoip.org
unknown
https://scratchdreams.tk/_send_.php?TS
188.114.97.3
http://checkip.dyndns.com
unknown
https://reallyfreegeoip.org/xml/8.46.123.175x
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
http://crl.micro7
unknown
http://scratchdreams.tk
unknown
https://reallyfreegeoip.org/xml/
unknown
There are 15 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
reallyfreegeoip.org
188.114.96.3
malicious
checkip.dyndns.org
unknown
malicious
scratchdreams.tk
188.114.97.3
checkip.dyndns.com
193.122.6.168

IPs

IP
Domain
Country
Malicious
188.114.96.3
reallyfreegeoip.org
European Union
malicious
188.114.97.3
scratchdreams.tk
European Union
193.122.6.168
checkip.dyndns.com
United States

Registry

Path
Value
Malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System
EnableLUA
malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Notifications\Settings\Windows.SystemToast.SecurityAndMaintenance
Enabled
\REGISTRY\A\{e3c9719c-439d-9132-e040-1687fe5ba079}\Root\InventoryApplicationFile\nueva orden de c|d53a69ff245e727b
ProgramId
\REGISTRY\A\{e3c9719c-439d-9132-e040-1687fe5ba079}\Root\InventoryApplicationFile\nueva orden de c|d53a69ff245e727b
FileId
\REGISTRY\A\{e3c9719c-439d-9132-e040-1687fe5ba079}\Root\InventoryApplicationFile\nueva orden de c|d53a69ff245e727b
LowerCaseLongPath
\REGISTRY\A\{e3c9719c-439d-9132-e040-1687fe5ba079}\Root\InventoryApplicationFile\nueva orden de c|d53a69ff245e727b
LongPathHash
\REGISTRY\A\{e3c9719c-439d-9132-e040-1687fe5ba079}\Root\InventoryApplicationFile\nueva orden de c|d53a69ff245e727b
Name
\REGISTRY\A\{e3c9719c-439d-9132-e040-1687fe5ba079}\Root\InventoryApplicationFile\nueva orden de c|d53a69ff245e727b
OriginalFileName
\REGISTRY\A\{e3c9719c-439d-9132-e040-1687fe5ba079}\Root\InventoryApplicationFile\nueva orden de c|d53a69ff245e727b
Publisher
\REGISTRY\A\{e3c9719c-439d-9132-e040-1687fe5ba079}\Root\InventoryApplicationFile\nueva orden de c|d53a69ff245e727b
Version
\REGISTRY\A\{e3c9719c-439d-9132-e040-1687fe5ba079}\Root\InventoryApplicationFile\nueva orden de c|d53a69ff245e727b
BinFileVersion
\REGISTRY\A\{e3c9719c-439d-9132-e040-1687fe5ba079}\Root\InventoryApplicationFile\nueva orden de c|d53a69ff245e727b
BinaryType
\REGISTRY\A\{e3c9719c-439d-9132-e040-1687fe5ba079}\Root\InventoryApplicationFile\nueva orden de c|d53a69ff245e727b
ProductName
\REGISTRY\A\{e3c9719c-439d-9132-e040-1687fe5ba079}\Root\InventoryApplicationFile\nueva orden de c|d53a69ff245e727b
ProductVersion
\REGISTRY\A\{e3c9719c-439d-9132-e040-1687fe5ba079}\Root\InventoryApplicationFile\nueva orden de c|d53a69ff245e727b
LinkDate
\REGISTRY\A\{e3c9719c-439d-9132-e040-1687fe5ba079}\Root\InventoryApplicationFile\nueva orden de c|d53a69ff245e727b
BinProductVersion
\REGISTRY\A\{e3c9719c-439d-9132-e040-1687fe5ba079}\Root\InventoryApplicationFile\nueva orden de c|d53a69ff245e727b
AppxPackageFullName
\REGISTRY\A\{e3c9719c-439d-9132-e040-1687fe5ba079}\Root\InventoryApplicationFile\nueva orden de c|d53a69ff245e727b
AppxPackageRelativeId
\REGISTRY\A\{e3c9719c-439d-9132-e040-1687fe5ba079}\Root\InventoryApplicationFile\nueva orden de c|d53a69ff245e727b
Size
\REGISTRY\A\{e3c9719c-439d-9132-e040-1687fe5ba079}\Root\InventoryApplicationFile\nueva orden de c|d53a69ff245e727b
Language
\REGISTRY\A\{e3c9719c-439d-9132-e040-1687fe5ba079}\Root\InventoryApplicationFile\nueva orden de c|d53a69ff245e727b
Usn
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\regsvcs_RASAPI32
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\regsvcs_RASAPI32
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\regsvcs_RASAPI32
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\regsvcs_RASAPI32
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\regsvcs_RASAPI32
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\regsvcs_RASAPI32
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\regsvcs_RASAPI32
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\regsvcs_RASMANCS
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\regsvcs_RASMANCS
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\regsvcs_RASMANCS
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\regsvcs_RASMANCS
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\regsvcs_RASMANCS
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\regsvcs_RASMANCS
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\regsvcs_RASMANCS
FileDirectory
There are 26 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
2A61000
trusted library allocation
page read and write
malicious
3AE7000
trusted library allocation
page read and write
malicious
14F00044000
trusted library allocation
page read and write
malicious
402000
remote allocation
page execute and read and write
malicious
4F8B000
trusted library allocation
page read and write
109E000
heap
page read and write
42EC000
stack
page read and write
5120000
trusted library allocation
page read and write
9D0000
heap
page read and write
7FFB114F8000
trusted library allocation
page read and write
68DE000
stack
page read and write
8120000
trusted library allocation
page read and write
F97000
trusted library allocation
page execute and read and write
84B0000
trusted library allocation
page execute and read and write
75CD000
trusted library allocation
page read and write
F92000
trusted library allocation
page read and write
41B5000
trusted library allocation
page execute and read and write
5240000
trusted library allocation
page execute and read and write
D4C000
heap
page read and write
28B1000
trusted library allocation
page read and write
552E000
stack
page read and write
CA8000
heap
page read and write
2BA9000
trusted library allocation
page read and write
410000
unkown
page readonly
4E2E000
stack
page read and write
81A0000
trusted library allocation
page read and write
81B0000
trusted library allocation
page read and write
81C0000
trusted library allocation
page read and write
51B0000
trusted library allocation
page execute and read and write
8480000
trusted library allocation
page read and write
807E000
stack
page read and write
BAF000
stack
page read and write
CA0000
heap
page read and write
4F20000
trusted library allocation
page read and write
455C000
trusted library allocation
page read and write
38ACBFB000
stack
page read and write
6A9E000
stack
page read and write
6A5E000
stack
page read and write
2BB9000
trusted library allocation
page read and write
8430000
trusted library allocation
page execute and read and write
2BB1000
trusted library allocation
page read and write
F60000
trusted library allocation
page read and write
5136000
trusted library allocation
page read and write
5E7F000
stack
page read and write
7FFB11670000
trusted library allocation
page read and write
27E8000
heap
page read and write
10B0000
trusted library allocation
page read and write
28F0000
heap
page read and write
910000
heap
page read and write
EA0000
heap
page read and write
411F000
stack
page read and write
920000
heap
page read and write
E67000
trusted library allocation
page read and write
74AC000
heap
page read and write
7830000
trusted library allocation
page execute and read and write
DE0000
trusted library allocation
page execute and read and write
8540000
trusted library allocation
page read and write
7FFB11350000
trusted library allocation
page read and write
CF7000
stack
page read and write
51DE000
trusted library allocation
page read and write
A16000
heap
page read and write
BCD000
trusted library allocation
page execute and read and write
7FFB116C0000
trusted library allocation
page read and write
51D9000
trusted library allocation
page read and write
A3B000
stack
page read and write
2CD6000
trusted library allocation
page read and write
2D3D000
trusted library allocation
page read and write
290E000
stack
page read and write
7FFB115F0000
trusted library allocation
page read and write
27E0000
heap
page read and write
551D000
stack
page read and write
4FE0000
trusted library allocation
page read and write
7F70000
trusted library allocation
page read and write
910000
heap
page read and write
671D000
stack
page read and write
14F7C7F0000
heap
page read and write
38AC1FD000
stack
page read and write
27E4000
trusted library allocation
page read and write
7FB0000
trusted library allocation
page execute and read and write
280A000
trusted library allocation
page execute and read and write
7FFB115C5000
trusted library allocation
page read and write
5210000
trusted library section
page read and write
4160000
trusted library allocation
page read and write
90E000
stack
page read and write
281B000
trusted library allocation
page execute and read and write
14F7C6BD000
heap
page read and write
8460000
trusted library allocation
page read and write
2B70000
trusted library allocation
page read and write
5150000
trusted library allocation
page read and write
690F000
stack
page read and write
2B68000
trusted library allocation
page read and write
FCE000
heap
page read and write
980000
heap
page read and write
7FFB116A0000
trusted library allocation
page execute and read and write
8290000
trusted library allocation
page read and write
2B4A000
trusted library allocation
page read and write
8220000
trusted library allocation
page read and write
2B1F000
trusted library allocation
page read and write
75D3000
trusted library allocation
page read and write
8380000
trusted library allocation
page read and write
7FFB11519000
trusted library allocation
page read and write
7634000
trusted library allocation
page read and write
29E0000
heap
page read and write
8440000
trusted library allocation
page read and write
14F7A323000
trusted library allocation
page read and write
288E000
stack
page read and write
7434000
heap
page read and write
14F7A0EA000
heap
page read and write
7FFB11590000
trusted library allocation
page read and write
7FFB11638000
trusted library allocation
page read and write
7FFB115C0000
trusted library allocation
page read and write
7FFB115B0000
trusted library allocation
page read and write
E80000
trusted library allocation
page execute and read and write
5EBD000
stack
page read and write
84A0000
trusted library allocation
page execute and read and write
FB8000
heap
page read and write
4F4D000
trusted library allocation
page read and write
4F38000
trusted library allocation
page read and write
23CC000
stack
page read and write
66C0000
trusted library allocation
page read and write
29DD000
stack
page read and write
5013000
heap
page read and write
4170000
trusted library allocation
page read and write
5031000
trusted library allocation
page read and write
38AC0FB000
stack
page read and write
F82000
trusted library allocation
page read and write
F8A000
trusted library allocation
page execute and read and write
F95000
trusted library allocation
page execute and read and write
5369000
trusted library allocation
page read and write
4F60000
heap
page read and write
515E000
stack
page read and write
38AC3FD000
stack
page read and write
5140000
trusted library allocation
page read and write
7FA0000
trusted library allocation
page read and write
EFE000
stack
page read and write
400000
remote allocation
page execute and read and write
565F000
stack
page read and write
83D0000
trusted library allocation
page read and write
8550000
trusted library allocation
page read and write
82F0000
trusted library allocation
page read and write
6750000
trusted library allocation
page read and write
6690000
trusted library allocation
page read and write
3AE9000
trusted library allocation
page read and write
14F7A365000
heap
page read and write
9D5000
heap
page read and write
9DB000
heap
page read and write
8420000
trusted library allocation
page read and write
14F1000C000
trusted library allocation
page read and write
2670000
heap
page read and write
14F7A12D000
heap
page read and write
FB0000
heap
page read and write
287E000
stack
page read and write
7700000
trusted library allocation
page read and write
DD0000
trusted library allocation
page read and write
14F7C5F0000
heap
page read and write
4AC000
stack
page read and write
14F7A0BF000
heap
page read and write
14F000C7000
trusted library allocation
page read and write
4D09000
heap
page read and write
83A0000
trusted library allocation
page read and write
2A00000
trusted library allocation
page read and write
81F0000
trusted library allocation
page read and write
8470000
trusted library allocation
page execute and read and write
83F0000
trusted library allocation
page read and write
E40000
trusted library allocation
page execute and read and write
28CE000
stack
page read and write
8490000
trusted library allocation
page execute and read and write
14F7A000000
heap
page read and write
80BC000
stack
page read and write
7FFB11460000
trusted library allocation
page execute and read and write
5160000
trusted library section
page read and write
2CD2000
trusted library allocation
page read and write
F50000
trusted library allocation
page read and write
14F7C609000
heap
page read and write
5133000
trusted library allocation
page read and write
53B7000
trusted library allocation
page read and write
915000
heap
page read and write
5E0F000
stack
page read and write
2B6C000
trusted library allocation
page read and write
2980000
trusted library allocation
page execute and read and write
38AB9E2000
stack
page read and write
8250000
trusted library allocation
page read and write
2340000
heap
page read and write
27E3000
trusted library allocation
page execute and read and write
E9F000
stack
page read and write
7FFB1136B000
trusted library allocation
page execute and read and write
4341000
trusted library allocation
page read and write
4EE0000
heap
page execute and read and write
45C2000
trusted library allocation
page read and write
66A0000
trusted library allocation
page read and write
14F7C69A000
heap
page read and write
10C0000
heap
page read and write
569E000
stack
page read and write
DF0000
trusted library allocation
page read and write
49AE000
stack
page read and write
54DD000
stack
page read and write
51EF000
stack
page read and write
288C000
heap
page read and write
3A45000
trusted library allocation
page read and write
5050000
heap
page execute and read and write
F80000
trusted library allocation
page read and write
7FFB1150C000
trusted library allocation
page read and write
7FFB11640000
trusted library allocation
page read and write
14F10011000
trusted library allocation
page read and write
14F7A3A0000
heap
page read and write
7FFB11532000
trusted library allocation
page read and write
4FB5000
trusted library allocation
page read and write
E70000
trusted library allocation
page execute and read and write
4F50000
heap
page read and write
38ABFFE000
stack
page read and write
8410000
trusted library allocation
page execute and read and write
7FFB11400000
trusted library allocation
page execute and read and write
14F7A080000
heap
page read and write
38AC6FE000
stack
page read and write
7FFB116B0000
trusted library allocation
page execute and read and write
7FFE000
stack
page read and write
7FFB115A1000
trusted library allocation
page read and write
8350000
trusted library allocation
page read and write
8610000
trusted library allocation
page execute and read and write
7FFB11364000
trusted library allocation
page read and write
297E000
stack
page read and write
7FFB115F3000
trusted library allocation
page read and write
2990000
heap
page execute and read and write
5D7E000
stack
page read and write
14F7A2A0000
heap
page read and write
8260000
trusted library allocation
page read and write
74FE000
stack
page read and write
2D00000
trusted library allocation
page read and write
14F7BCC0000
trusted library allocation
page read and write
83C0000
trusted library allocation
page read and write
8280000
trusted library allocation
page execute and read and write
73DD000
heap
page read and write
7FFB11610000
trusted library allocation
page read and write
E00000
trusted library allocation
page read and write
8100000
trusted library allocation
page execute and read and write
90FE000
heap
page read and write
BDD000
trusted library allocation
page execute and read and write
FFE000
stack
page read and write
E10000
trusted library allocation
page execute and read and write
28A0000
heap
page execute and read and write
684E000
stack
page read and write
5341000
trusted library allocation
page read and write
7AF2000
heap
page read and write
7820000
trusted library allocation
page read and write
14F7A08C000
heap
page read and write
2830000
trusted library allocation
page read and write
27CF000
stack
page read and write
E60000
trusted library allocation
page read and write
4D00000
heap
page read and write
90EA000
heap
page read and write
7FFB114F3000
trusted library allocation
page read and write
2B1C000
trusted library allocation
page read and write
DFD000
trusted library allocation
page read and write
432D000
stack
page read and write
8190000
trusted library allocation
page execute and read and write
1000000
heap
page read and write
7840000
trusted library allocation
page read and write
41F0000
trusted library allocation
page execute and read and write
402000
remote allocation
page execute and read and write
14F7A3E0000
heap
page execute and read and write
14F7A4E0000
heap
page read and write
2BAD000
trusted library allocation
page read and write
803E000
stack
page read and write
FD9000
heap
page read and write
7FFB115EC000
trusted library allocation
page read and write
536E000
stack
page read and write
14F7A410000
heap
page execute and read and write
428E000
stack
page read and write
26A0000
heap
page read and write
F5D000
trusted library allocation
page execute and read and write
4F70000
trusted library allocation
page execute and read and write
53AE000
trusted library allocation
page read and write
75C0000
trusted library allocation
page read and write
8580000
trusted library allocation
page read and write
3AFF000
trusted library allocation
page read and write
5012000
trusted library allocation
page read and write
519D000
stack
page read and write
66B0000
trusted library allocation
page read and write
FE5000
heap
page read and write
8210000
trusted library allocation
page read and write
675F000
stack
page read and write
E20000
heap
page read and write
14F7A250000
heap
page read and write
28C9000
heap
page read and write
3A41000
trusted library allocation
page read and write
4F80000
trusted library allocation
page read and write
4174000
trusted library allocation
page read and write
27D0000
trusted library allocation
page read and write
8170000
trusted library allocation
page execute and read and write
7FFB11650000
trusted library allocation
page read and write
2B14000
trusted library allocation
page read and write
83E0000
trusted library allocation
page execute and read and write
8163000
trusted library allocation
page read and write
7FFB11680000
trusted library allocation
page read and write
14F7A4E5000
heap
page read and write
511F000
stack
page read and write
7FFB113F6000
trusted library allocation
page read and write
562F000
stack
page read and write
6B70000
heap
page read and write
28F8000
heap
page read and write
50EE000
stack
page read and write
7FFB114F0000
trusted library allocation
page read and write
4200000
heap
page execute and read and write
99A000
stack
page read and write
689E000
stack
page read and write
7FFB11600000
trusted library allocation
page read and write
2940000
heap
page execute and read and write
532E000
stack
page read and write
51D4000
trusted library allocation
page read and write
80F0000
trusted library allocation
page read and write
14F7A0F2000
heap
page read and write
773C000
trusted library allocation
page read and write
7FFB114E2000
trusted library allocation
page read and write
6680000
trusted library allocation
page read and write
40DE000
stack
page read and write
4CF0000
heap
page read and write
8360000
trusted library allocation
page execute and read and write
2C4E000
trusted library allocation
page read and write
7F40000
trusted library allocation
page read and write
7600000
trusted library allocation
page read and write
7724000
trusted library allocation
page read and write
75BE000
stack
page read and write
14F7C7F3000
heap
page read and write
14F7A2F0000
trusted library allocation
page read and write
6740000
heap
page execute and read and write
F9B000
trusted library allocation
page execute and read and write
6675000
heap
page read and write
14F10008000
trusted library allocation
page read and write
86A5000
trusted library allocation
page read and write
500E000
stack
page read and write
14F10001000
trusted library allocation
page read and write
2A30000
heap
page read and write
6AD0000
heap
page read and write
5010000
heap
page read and write
2637000
stack
page read and write
2844000
heap
page read and write
F30000
trusted library allocation
page read and write
74B0000
trusted library allocation
page read and write
2A06000
trusted library allocation
page read and write
2A4E000
stack
page read and write
67CE000
stack
page read and write
B36000
stack
page read and write
512B000
trusted library allocation
page read and write
14F7A310000
trusted library allocation
page read and write
41D0000
trusted library allocation
page read and write
14F7A0EC000
heap
page read and write
2C16000
trusted library allocation
page read and write
2B32000
trusted library allocation
page read and write
75C6000
trusted library allocation
page read and write
8400000
heap
page read and write
75D6000
trusted library allocation
page read and write
7FFB1151F000
trusted library allocation
page read and write
14F7A3C0000
trusted library section
page read and write
7FFB11360000
trusted library allocation
page read and write
B80000
heap
page read and write
7FF443190000
trusted library allocation
page execute and read and write
38ACAFE000
stack
page read and write
14F79FD2000
unkown
page readonly
429A000
trusted library allocation
page read and write
2B17000
trusted library allocation
page read and write
9320000
trusted library allocation
page execute and read and write
7FFB113FC000
trusted library allocation
page execute and read and write
14F7C6E8000
heap
page read and write
2676000
heap
page read and write
4F9A000
trusted library allocation
page read and write
A2C000
heap
page read and write
753F000
stack
page read and write
2BB5000
trusted library allocation
page read and write
2910000
trusted library allocation
page execute and read and write
73FE000
heap
page read and write
14F7C664000
heap
page read and write
66B6000
trusted library allocation
page read and write
F40000
trusted library allocation
page read and write
38ABCFE000
stack
page read and write
14F7A360000
heap
page read and write
80C0000
trusted library allocation
page read and write
68CE000
stack
page read and write
7FFB1150F000
trusted library allocation
page read and write
4F40000
trusted library allocation
page read and write
2CBA000
trusted library allocation
page read and write
7FFB1168B000
trusted library allocation
page read and write
424E000
stack
page read and write
90EF000
heap
page read and write
665A000
heap
page read and write
7471000
heap
page read and write
4FC0000
trusted library allocation
page read and write
5345000
trusted library allocation
page read and write
14F7A420000
heap
page read and write
8570000
trusted library allocation
page read and write
9E8000
heap
page read and write
65E0000
heap
page read and write
7FFB1139C000
trusted library allocation
page execute and read and write
38B1000
trusted library allocation
page read and write
10E0000
heap
page read and write
2C32000
trusted library allocation
page read and write
2BD2000
trusted library allocation
page read and write
639F000
stack
page read and write
5550000
heap
page execute and read and write
C9E000
stack
page read and write
4298000
trusted library allocation
page read and write
2816000
heap
page read and write
7630000
trusted library allocation
page read and write
2D06000
trusted library allocation
page read and write
4186000
trusted library allocation
page read and write
2A50000
heap
page read and write
680E000
stack
page read and write
7B0000
heap
page read and write
9B0000
heap
page read and write
772F000
trusted library allocation
page read and write
2810000
trusted library allocation
page read and write
2817000
trusted library allocation
page execute and read and write
F53000
trusted library allocation
page execute and read and write
7FFB11537000
trusted library allocation
page read and write
9B8000
heap
page read and write
4498000
trusted library allocation
page read and write
73C0000
heap
page read and write
14F7C010000
heap
page read and write
7FFB11690000
trusted library allocation
page execute and read and write
2A10000
trusted library allocation
page read and write
4F86000
trusted library allocation
page read and write
7FFB11580000
trusted library allocation
page read and write
51C0000
trusted library allocation
page read and write
5AA000
stack
page read and write
4F4A000
trusted library allocation
page read and write
DF3000
trusted library allocation
page read and write
B85000
heap
page read and write
73B0000
heap
page read and write
4180000
trusted library allocation
page read and write
76E0000
trusted library allocation
page execute and read and write
C9C000
stack
page read and write
8390000
trusted library allocation
page read and write
8160000
trusted library allocation
page read and write
7FFB11654000
trusted library allocation
page read and write
2CB4000
trusted library allocation
page read and write
14F7A0C2000
heap
page read and write
8240000
trusted library allocation
page read and write
80D1000
trusted library allocation
page read and write
7F58000
trusted library allocation
page read and write
7402000
heap
page read and write
4120000
heap
page read and write
41E0000
heap
page readonly
82C0000
trusted library allocation
page execute and read and write
649D000
stack
page read and write
6CEB000
stack
page read and write
7680000
trusted library allocation
page read and write
7FFB11507000
trusted library allocation
page read and write
41B0000
trusted library allocation
page read and write
76F0000
heap
page execute and read and write
F54000
trusted library allocation
page read and write
41A000
unkown
page readonly
76D0000
trusted library allocation
page execute and read and write
400000
remote allocation
page execute and read and write
278E000
stack
page read and write
75E0000
trusted library allocation
page read and write
27ED000
trusted library allocation
page execute and read and write
8150000
trusted library allocation
page read and write
81E0000
trusted library allocation
page read and write
DD0000
trusted library allocation
page read and write
DAF000
stack
page read and write
7FFB115C2000
trusted library allocation
page read and write
7FFB113F0000
trusted library allocation
page read and write
14F79FD0000
unkown
page readonly
8230000
trusted library allocation
page read and write
7690000
trusted library allocation
page read and write
688E000
stack
page read and write
4F30000
trusted library allocation
page read and write
2CCD000
trusted library allocation
page read and write
F70000
heap
page read and write
CD5000
heap
page read and write
F6D000
trusted library allocation
page execute and read and write
BB0000
trusted library allocation
page read and write
2CAF000
trusted library allocation
page read and write
7620000
trusted library allocation
page read and write
8340000
heap
page read and write
27AF000
stack
page read and write
2B5E000
trusted library allocation
page read and write
BF7000
trusted library allocation
page execute and read and write
2A41000
trusted library allocation
page read and write
41A0000
heap
page read and write
502E000
trusted library allocation
page read and write
699D000
stack
page read and write
BD4000
trusted library allocation
page read and write
2350000
heap
page read and write
74A9000
heap
page read and write
695E000
stack
page read and write
280A000
heap
page read and write
4FAD000
trusted library allocation
page read and write
CA0000
heap
page read and write
910E000
heap
page read and write
2806000
trusted library allocation
page execute and read and write
417D000
trusted library allocation
page execute and read and write
6621000
heap
page read and write
8200000
trusted library allocation
page read and write
2934000
trusted library allocation
page read and write
6B6C000
stack
page read and write
8180000
trusted library allocation
page read and write
69DA000
stack
page read and write
14F7A0AF000
heap
page read and write
84FD000
stack
page read and write
2BBD000
trusted library allocation
page read and write
1074000
heap
page read and write
7FFB11426000
trusted library allocation
page execute and read and write
5036000
trusted library allocation
page read and write
6668000
heap
page read and write
14F7A320000
trusted library allocation
page read and write
6CAD000
stack
page read and write
F86000
trusted library allocation
page execute and read and write
2CC4000
trusted library allocation
page read and write
7FFB11340000
trusted library allocation
page read and write
7FFB11540000
trusted library allocation
page read and write
4FEF000
stack
page read and write
8450000
heap
page read and write
7738000
trusted library allocation
page read and write
501B000
trusted library allocation
page read and write
691E000
stack
page read and write
284E000
stack
page read and write
3A89000
trusted library allocation
page read and write
853E000
stack
page read and write
BC4000
trusted library allocation
page read and write
5014000
trusted library allocation
page read and write
512D000
trusted library allocation
page read and write
81D0000
trusted library allocation
page read and write
746B000
heap
page read and write
4330000
heap
page read and write
7FFB11559000
trusted library allocation
page read and write
412000
unkown
page readonly
7FFB11555000
trusted library allocation
page read and write
660F000
heap
page read and write
7FFB11630000
trusted library allocation
page read and write
6B2D000
stack
page read and write
6745000
heap
page execute and read and write
5EFD000
stack
page read and write
7FFB114FC000
trusted library allocation
page read and write
7FFB11570000
trusted library allocation
page read and write
4173000
trusted library allocation
page execute and read and write
43A4000
trusted library allocation
page read and write
45C6000
trusted library allocation
page read and write
82B0000
trusted library allocation
page read and write
38AC5FE000
stack
page read and write
4BFE000
stack
page read and write
8270000
trusted library allocation
page execute and read and write
BC3000
trusted library allocation
page execute and read and write
2D0C000
trusted library allocation
page read and write
27FC000
heap
page read and write
3ACE000
trusted library allocation
page read and write
7FFB1134D000
trusted library allocation
page execute and read and write
75E4000
trusted library allocation
page read and write
2BC5000
trusted library allocation
page read and write
4F27000
trusted library allocation
page read and write
6AD9000
stack
page read and write
90D0000
heap
page read and write
65DE000
stack
page read and write
629E000
stack
page read and write
38ABEFE000
stack
page read and write
D09000
heap
page read and write
7FFB11550000
trusted library allocation
page read and write
2BF6000
trusted library allocation
page read and write
7FFB11514000
trusted library allocation
page read and write
757E000
stack
page read and write
5200000
trusted library allocation
page read and write
3AF3000
trusted library allocation
page read and write
7FFB1136D000
trusted library allocation
page execute and read and write
2BC1000
trusted library allocation
page read and write
4183000
trusted library allocation
page read and write
7FFB11542000
trusted library allocation
page read and write
4F9E000
trusted library allocation
page read and write
86B0000
trusted library allocation
page execute and read and write
C5E000
stack
page read and write
E90000
trusted library allocation
page read and write
7FFB115E7000
trusted library allocation
page read and write
2800000
trusted library allocation
page read and write
6710000
trusted library allocation
page read and write
7FFB11659000
trusted library allocation
page read and write
7FFB1135D000
trusted library allocation
page execute and read and write
95D000
stack
page read and write
66B3000
trusted library allocation
page read and write
D92000
heap
page read and write
E52000
trusted library allocation
page read and write
38ABDFE000
stack
page read and write
7FFB11683000
trusted library allocation
page read and write
4F45000
trusted library allocation
page read and write
741A000
heap
page read and write
2C24000
trusted library allocation
page read and write
DC0000
trusted library allocation
page read and write
27F4000
trusted library allocation
page read and write
4F8E000
trusted library allocation
page read and write
7FFB115C8000
trusted library allocation
page read and write
BD0000
trusted library allocation
page read and write
4189000
trusted library allocation
page read and write
E35000
heap
page read and write
2D02000
trusted library allocation
page read and write
4FA6000
trusted library allocation
page read and write
4BDE000
stack
page read and write
420000
heap
page read and write
5260000
heap
page read and write
83B0000
trusted library allocation
page read and write
7F50000
trusted library allocation
page read and write
6A5E000
stack
page read and write
7FFB1154A000
trusted library allocation
page read and write
14F7C800000
trusted library section
page read and write
7FFB11620000
trusted library allocation
page read and write
679E000
stack
page read and write
38AC9FD000
stack
page read and write
8720000
trusted library allocation
page execute and read and write
27E0000
trusted library allocation
page read and write
7710000
trusted library allocation
page read and write
6A1E000
stack
page read and write
2CFA000
trusted library allocation
page read and write
7FFB115DA000
trusted library allocation
page read and write
CC9000
heap
page read and write
7FFB11560000
trusted library allocation
page read and write
8370000
trusted library allocation
page execute and read and write
82D0000
trusted library allocation
page read and write
14F7A0A4000
heap
page read and write
8560000
trusted library allocation
page read and write
14F00001000
trusted library allocation
page read and write
75EC000
trusted library allocation
page read and write
660D000
heap
page read and write
7FFB11343000
trusted library allocation
page execute and read and write
7FFB1152C000
trusted library allocation
page read and write
14F7A280000
heap
page read and write
38AC2FC000
stack
page read and write
14F7C600000
heap
page read and write
82E0000
trusted library allocation
page execute and read and write
E30000
heap
page read and write
D80000
heap
page read and write
5205000
trusted library allocation
page read and write
7A0000
heap
page read and write
51B0000
trusted library allocation
page read and write
80E0000
trusted library allocation
page execute and read and write
3A61000
trusted library allocation
page read and write
5045000
trusted library allocation
page read and write
51D0000
trusted library allocation
page read and write
64DE000
stack
page read and write
4FB2000
trusted library allocation
page read and write
566E000
stack
page read and write
7FFB115DD000
trusted library allocation
page read and write
7FFB11660000
trusted library allocation
page read and write
2930000
trusted library allocation
page read and write
A36000
heap
page read and write
CBE000
heap
page read and write
430000
heap
page read and write
7F60000
trusted library allocation
page read and write
2920000
trusted library allocation
page read and write
7FFB1153D000
trusted library allocation
page read and write
51E0000
trusted library allocation
page read and write
F2E000
stack
page read and write
5010000
trusted library allocation
page read and write
4FA1000
trusted library allocation
page read and write
BFB000
trusted library allocation
page execute and read and write
82A0000
trusted library allocation
page execute and read and write
5530000
trusted library allocation
page read and write
2B0F000
trusted library allocation
page read and write
38AC4FE000
stack
page read and write
7721000
trusted library allocation
page read and write
28A0000
heap
page read and write
8110000
trusted library allocation
page read and write
2C1A000
trusted library allocation
page read and write
14F7A390000
heap
page read and write
DB0000
trusted library allocation
page execute and read and write
7FFB11344000
trusted library allocation
page read and write
There are 651 hidden memdumps, click here to show them.