IOC Report
Certificate_of_registration.exe

loading gif

Files

File Path
Type
Category
Malicious
Certificate_of_registration.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\Certificate_of_registration.exe.log
CSV text
dropped
malicious
C:\Users\user\AppData\Local\Temp\Phtos\Phtos.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\Phtos\Phtos.exe:Zone.Identifier
ASCII text, with CRLF line terminators
modified
malicious
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_vbc.exe_2825b1eb36b4aa44d96f8e1ed2caaa682b687d16_521767da_68383f5d-a4e1-485a-893e-15116e2612d2\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_vbc.exe_2825b1eb36b4aa44d96f8e1ed2caaa682b687d16_521767da_6d843bd7-742d-4ce3-af3d-0d2880df641e\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER2493.tmp.dmp
Mini DuMP crash report, 14 streams, Mon Jul 1 13:23:35 2024, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER2530.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER2570.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER3FCC.tmp.dmp
Mini DuMP crash report, 14 streams, Mon Jul 1 13:23:42 2024, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER403A.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER4079.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\Phtos.exe.log
CSV text
dropped
C:\Windows\appcompat\Programs\Amcache.hve
MS Windows registry file, NT/2000 or above
dropped
There are 4 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\Certificate_of_registration.exe
"C:\Users\user\Desktop\Certificate_of_registration.exe"
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe
"C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe"
malicious
C:\Windows\SysWOW64\cmd.exe
"cmd.exe" /C mkdir "C:\Users\user\AppData\Local\Temp\Phtos"
malicious
C:\Windows\SysWOW64\cmd.exe
"cmd.exe" /C schtasks /create /sc minute /mo 1 /tn "Nafifas" /tr "'C:\Users\user\AppData\Local\Temp\Phtos\Phtos.exe'" /f
malicious
C:\Windows\SysWOW64\schtasks.exe
schtasks /create /sc minute /mo 1 /tn "Nafifas" /tr "'C:\Users\user\AppData\Local\Temp\Phtos\Phtos.exe'" /f
malicious
C:\Windows\SysWOW64\cmd.exe
"cmd.exe" /C copy "C:\Users\user\Desktop\Certificate_of_registration.exe" "C:\Users\user\AppData\Local\Temp\Phtos\Phtos.exe"
malicious
C:\Users\user\AppData\Local\Temp\Phtos\Phtos.exe
C:\Users\user\AppData\Local\Temp\Phtos\Phtos.exe
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe
"C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe"
malicious
C:\Windows\SysWOW64\cmd.exe
"cmd.exe" /C mkdir "C:\Users\user\AppData\Local\Temp\Phtos"
malicious
C:\Windows\SysWOW64\cmd.exe
"cmd.exe" /C schtasks /create /sc minute /mo 1 /tn "Nafifas" /tr "'C:\Users\user\AppData\Local\Temp\Phtos\Phtos.exe'" /f
malicious
C:\Windows\SysWOW64\schtasks.exe
schtasks /create /sc minute /mo 1 /tn "Nafifas" /tr "'C:\Users\user\AppData\Local\Temp\Phtos\Phtos.exe'" /f
malicious
C:\Windows\SysWOW64\cmd.exe
"cmd.exe" /C copy "C:\Users\user\AppData\Local\Temp\Phtos\Phtos.exe" "C:\Users\user\AppData\Local\Temp\Phtos\Phtos.exe"
malicious
C:\Users\user\AppData\Local\Temp\Phtos\Phtos.exe
C:\Users\user\AppData\Local\Temp\Phtos\Phtos.exe
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe
"C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe"
malicious
C:\Windows\SysWOW64\cmd.exe
"cmd.exe" /C mkdir "C:\Users\user\AppData\Local\Temp\Phtos"
malicious
C:\Windows\SysWOW64\cmd.exe
"cmd.exe" /C schtasks /create /sc minute /mo 1 /tn "Nafifas" /tr "'C:\Users\user\AppData\Local\Temp\Phtos\Phtos.exe'" /f
malicious
C:\Windows\SysWOW64\schtasks.exe
schtasks /create /sc minute /mo 1 /tn "Nafifas" /tr "'C:\Users\user\AppData\Local\Temp\Phtos\Phtos.exe'" /f
malicious
C:\Windows\SysWOW64\cmd.exe
"cmd.exe" /C copy "C:\Users\user\AppData\Local\Temp\Phtos\Phtos.exe" "C:\Users\user\AppData\Local\Temp\Phtos\Phtos.exe"
malicious
C:\Users\user\AppData\Local\Temp\Phtos\Phtos.exe
C:\Users\user\AppData\Local\Temp\Phtos\Phtos.exe
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe
"C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe"
malicious
C:\Windows\SysWOW64\cmd.exe
"cmd.exe" /C mkdir "C:\Users\user\AppData\Local\Temp\Phtos"
malicious
C:\Windows\SysWOW64\cmd.exe
"cmd.exe" /C schtasks /create /sc minute /mo 1 /tn "Nafifas" /tr "'C:\Users\user\AppData\Local\Temp\Phtos\Phtos.exe'" /f
malicious
C:\Windows\SysWOW64\schtasks.exe
schtasks /create /sc minute /mo 1 /tn "Nafifas" /tr "'C:\Users\user\AppData\Local\Temp\Phtos\Phtos.exe'" /f
malicious
C:\Windows\SysWOW64\cmd.exe
"cmd.exe" /C copy "C:\Users\user\AppData\Local\Temp\Phtos\Phtos.exe" "C:\Users\user\AppData\Local\Temp\Phtos\Phtos.exe"
malicious
C:\Users\user\AppData\Local\Temp\Phtos\Phtos.exe
C:\Users\user\AppData\Local\Temp\Phtos\Phtos.exe
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe
"C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe"
malicious
C:\Windows\SysWOW64\cmd.exe
"cmd.exe" /C mkdir "C:\Users\user\AppData\Local\Temp\Phtos"
malicious
C:\Windows\SysWOW64\cmd.exe
"cmd.exe" /C schtasks /create /sc minute /mo 1 /tn "Nafifas" /tr "'C:\Users\user\AppData\Local\Temp\Phtos\Phtos.exe'" /f
malicious
C:\Windows\SysWOW64\schtasks.exe
schtasks /create /sc minute /mo 1 /tn "Nafifas" /tr "'C:\Users\user\AppData\Local\Temp\Phtos\Phtos.exe'" /f
malicious
C:\Windows\SysWOW64\cmd.exe
"cmd.exe" /C copy "C:\Users\user\AppData\Local\Temp\Phtos\Phtos.exe" "C:\Users\user\AppData\Local\Temp\Phtos\Phtos.exe"
malicious
C:\Users\user\AppData\Local\Temp\Phtos\Phtos.exe
C:\Users\user\AppData\Local\Temp\Phtos\Phtos.exe
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe
"C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe"
malicious
C:\Windows\SysWOW64\cmd.exe
"cmd.exe" /C mkdir "C:\Users\user\AppData\Local\Temp\Phtos"
malicious
C:\Windows\SysWOW64\cmd.exe
"cmd.exe" /C schtasks /create /sc minute /mo 1 /tn "Nafifas" /tr "'C:\Users\user\AppData\Local\Temp\Phtos\Phtos.exe'" /f
malicious
C:\Windows\SysWOW64\schtasks.exe
schtasks /create /sc minute /mo 1 /tn "Nafifas" /tr "'C:\Users\user\AppData\Local\Temp\Phtos\Phtos.exe'" /f
malicious
C:\Windows\SysWOW64\cmd.exe
"cmd.exe" /C copy "C:\Users\user\AppData\Local\Temp\Phtos\Phtos.exe" "C:\Users\user\AppData\Local\Temp\Phtos\Phtos.exe"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 7328 -s 516
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 7764 -s 528
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
There are 46 hidden processes, click here to show them.

URLs

Name
IP
Malicious
morrrw.ddns.net
malicious
http://upx.sf.net
unknown
http://geoplugin.net/json.gp/C
unknown

Domains

Name
IP
Malicious
busbuctomorrrw.ddns.net
109.248.151.250
malicious

IPs

IP
Domain
Country
Malicious
109.248.151.250
busbuctomorrrw.ddns.net
Russian Federation
malicious

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\SOFTWARE\Rmc-Q2SG61
exepath
malicious
HKEY_CURRENT_USER\SOFTWARE\Rmc-Q2SG61
licence
malicious
HKEY_CURRENT_USER\SOFTWARE\Rmc-Q2SG61
time
malicious
\REGISTRY\A\{dd0f561d-aa9d-6d24-73eb-2b66d5067cc0}\Root\InventoryApplicationFile\vbc.exe|d14eb4b34a786388
ProgramId
\REGISTRY\A\{dd0f561d-aa9d-6d24-73eb-2b66d5067cc0}\Root\InventoryApplicationFile\vbc.exe|d14eb4b34a786388
FileId
\REGISTRY\A\{dd0f561d-aa9d-6d24-73eb-2b66d5067cc0}\Root\InventoryApplicationFile\vbc.exe|d14eb4b34a786388
LowerCaseLongPath
\REGISTRY\A\{dd0f561d-aa9d-6d24-73eb-2b66d5067cc0}\Root\InventoryApplicationFile\vbc.exe|d14eb4b34a786388
LongPathHash
\REGISTRY\A\{dd0f561d-aa9d-6d24-73eb-2b66d5067cc0}\Root\InventoryApplicationFile\vbc.exe|d14eb4b34a786388
Name
\REGISTRY\A\{dd0f561d-aa9d-6d24-73eb-2b66d5067cc0}\Root\InventoryApplicationFile\vbc.exe|d14eb4b34a786388
OriginalFileName
\REGISTRY\A\{dd0f561d-aa9d-6d24-73eb-2b66d5067cc0}\Root\InventoryApplicationFile\vbc.exe|d14eb4b34a786388
Publisher
\REGISTRY\A\{dd0f561d-aa9d-6d24-73eb-2b66d5067cc0}\Root\InventoryApplicationFile\vbc.exe|d14eb4b34a786388
Version
\REGISTRY\A\{dd0f561d-aa9d-6d24-73eb-2b66d5067cc0}\Root\InventoryApplicationFile\vbc.exe|d14eb4b34a786388
BinFileVersion
\REGISTRY\A\{dd0f561d-aa9d-6d24-73eb-2b66d5067cc0}\Root\InventoryApplicationFile\vbc.exe|d14eb4b34a786388
BinaryType
\REGISTRY\A\{dd0f561d-aa9d-6d24-73eb-2b66d5067cc0}\Root\InventoryApplicationFile\vbc.exe|d14eb4b34a786388
ProductName
\REGISTRY\A\{dd0f561d-aa9d-6d24-73eb-2b66d5067cc0}\Root\InventoryApplicationFile\vbc.exe|d14eb4b34a786388
ProductVersion
\REGISTRY\A\{dd0f561d-aa9d-6d24-73eb-2b66d5067cc0}\Root\InventoryApplicationFile\vbc.exe|d14eb4b34a786388
LinkDate
\REGISTRY\A\{dd0f561d-aa9d-6d24-73eb-2b66d5067cc0}\Root\InventoryApplicationFile\vbc.exe|d14eb4b34a786388
BinProductVersion
\REGISTRY\A\{dd0f561d-aa9d-6d24-73eb-2b66d5067cc0}\Root\InventoryApplicationFile\vbc.exe|d14eb4b34a786388
AppxPackageFullName
\REGISTRY\A\{dd0f561d-aa9d-6d24-73eb-2b66d5067cc0}\Root\InventoryApplicationFile\vbc.exe|d14eb4b34a786388
AppxPackageRelativeId
\REGISTRY\A\{dd0f561d-aa9d-6d24-73eb-2b66d5067cc0}\Root\InventoryApplicationFile\vbc.exe|d14eb4b34a786388
Size
\REGISTRY\A\{dd0f561d-aa9d-6d24-73eb-2b66d5067cc0}\Root\InventoryApplicationFile\vbc.exe|d14eb4b34a786388
Language
\REGISTRY\A\{dd0f561d-aa9d-6d24-73eb-2b66d5067cc0}\Root\InventoryApplicationFile\vbc.exe|d14eb4b34a786388
IsOsComponent
\REGISTRY\A\{dd0f561d-aa9d-6d24-73eb-2b66d5067cc0}\Root\InventoryApplicationFile\vbc.exe|d14eb4b34a786388
Usn
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\IdentityCRL\ClockData
ClockTimeSeconds
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\IdentityCRL\ClockData
TickCount
There are 15 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
3E51000
trusted library allocation
page read and write
malicious
C67000
heap
page read and write
malicious
627000
heap
page read and write
malicious
5337000
heap
page read and write
malicious
63B000
heap
page read and write
malicious
859000
remote allocation
page readonly
malicious
51D7000
heap
page read and write
malicious
2BEE000
unkown
page read and write
293D000
stack
page read and write
1697000
trusted library allocation
page execute and read and write
1663000
trusted library allocation
page execute and read and write
148A000
heap
page read and write
2E10000
heap
page read and write
C8B000
trusted library allocation
page read and write
26BB000
heap
page read and write
28C0000
heap
page read and write
3050000
trusted library allocation
page read and write
2D0E000
stack
page read and write
309F000
stack
page read and write
F45000
heap
page read and write
57C000
stack
page read and write
CEE000
stack
page read and write
2BEB000
trusted library allocation
page read and write
11C0000
trusted library allocation
page read and write
5DF000
remote allocation
page execute read
8F0000
heap
page read and write
339E000
stack
page read and write
1398000
heap
page read and write
15B0000
heap
page read and write
3611000
heap
page read and write
22DD000
stack
page read and write
DAD000
heap
page read and write
2B9E000
stack
page read and write
1530000
heap
page read and write
210000
heap
page read and write
11A0000
trusted library allocation
page read and write
104E000
heap
page read and write
5740000
heap
page execute and read and write
3CA6000
trusted library allocation
page read and write
2660000
heap
page read and write
31C0000
heap
page read and write
1068000
heap
page read and write
3B26000
trusted library allocation
page read and write
1433000
heap
page read and write
28BE000
unkown
page read and write
1450000
trusted library allocation
page read and write
41A1000
trusted library allocation
page read and write
B1E000
stack
page read and write
119D000
trusted library allocation
page execute and read and write
33C5000
heap
page read and write
B60000
heap
page read and write
1687000
trusted library allocation
page execute and read and write
2BA0000
heap
page read and write
5804000
trusted library allocation
page read and write
26F5000
heap
page read and write
B72000
heap
page read and write
1423000
trusted library allocation
page execute and read and write
2E0F000
stack
page read and write
B20000
heap
page read and write
2BC0000
heap
page read and write
2F9F000
unkown
page read and write
1080000
heap
page read and write
35AF000
unkown
page read and write
50E0000
heap
page execute and read and write
3120000
trusted library allocation
page read and write
1190000
trusted library allocation
page read and write
3050000
direct allocation
page read and write
105F000
stack
page read and write
3AAD000
trusted library allocation
page read and write
2C8E000
unkown
page read and write
2980000
heap
page read and write
30E0000
heap
page read and write
127E000
stack
page read and write
2CF0000
trusted library allocation
page execute and read and write
29EB000
heap
page read and write
29BF000
unkown
page read and write
2E3D000
stack
page read and write
4B2E000
stack
page read and write
2730000
heap
page read and write
2A20000
heap
page execute and read and write
34AF000
stack
page read and write
27B0000
heap
page read and write
2B5E000
unkown
page read and write
6CE000
stack
page read and write
32F1000
heap
page read and write
51A0000
heap
page read and write
168A000
trusted library allocation
page execute and read and write
371F000
unkown
page read and write
B9C000
stack
page read and write
30DD000
trusted library allocation
page execute and read and write
30A0000
heap
page read and write
5880000
trusted library allocation
page read and write
2DE0000
direct allocation
page read and write
29E0000
heap
page read and write
1405000
heap
page read and write
F47000
trusted library allocation
page execute and read and write
AD0000
heap
page readonly
47C000
stack
page read and write
29CE000
stack
page read and write
1190000
heap
page read and write
280E000
stack
page read and write
290E000
stack
page read and write
348E000
unkown
page read and write
167D000
trusted library allocation
page execute and read and write
2A42000
trusted library allocation
page read and write
11C7000
stack
page read and write
2DC0000
heap
page read and write
29CD000
stack
page read and write
D8B000
trusted library allocation
page execute and read and write
1087000
heap
page read and write
DEE000
stack
page read and write
115E000
stack
page read and write
2A5E000
trusted library allocation
page read and write
144A000
trusted library allocation
page execute and read and write
3B7D000
trusted library allocation
page read and write
E00000
heap
page read and write
1265000
heap
page read and write
471000
remote allocation
page execute and read and write
2E60000
heap
page read and write
103C000
stack
page read and write
2CEF000
stack
page read and write
35FC000
heap
page read and write
1430000
heap
page read and write
AB0000
unkown
page readonly
2F75000
heap
page read and write
3360000
heap
page read and write
2BB1000
trusted library allocation
page read and write
139F000
heap
page read and write
2BE0000
heap
page read and write
B38000
unkown
page readonly
4FEE000
stack
page read and write
1440000
trusted library allocation
page read and write
239D000
stack
page read and write
CFD000
stack
page read and write
D23000
trusted library allocation
page execute and read and write
BDC000
heap
page read and write
2D04000
trusted library allocation
page read and write
33C4000
heap
page read and write
32DB000
heap
page read and write
31A1000
trusted library allocation
page read and write
11FC000
heap
page read and write
B50000
heap
page read and write
D63000
heap
page read and write
5800000
trusted library allocation
page read and write
308D000
stack
page read and write
2BA0000
heap
page execute and read and write
2E87000
trusted library allocation
page read and write
BBC000
heap
page read and write
1964000
trusted library allocation
page read and write
D9E000
stack
page read and write
30B0000
heap
page read and write
35D0000
heap
page read and write
11B0000
trusted library allocation
page read and write
670000
heap
page read and write
1206000
heap
page read and write
B10000
heap
page read and write
11AB000
trusted library allocation
page read and write
318D000
stack
page read and write
5DB000
remote allocation
page execute read
210000
heap
page read and write
34D0000
direct allocation
page read and write
33A0000
heap
page read and write
29B0000
heap
page read and write
46B000
remote allocation
page execute and read and write
30BE000
trusted library allocation
page read and write
28BF000
unkown
page read and write
BCC000
stack
page read and write
1260000
heap
page read and write
5D0000
remote allocation
page execute read
2B00000
trusted library allocation
page read and write
1193000
trusted library allocation
page execute and read and write
800000
remote allocation
page execute and read and write
2D6E000
stack
page read and write
2A01000
heap
page read and write
3030000
trusted library allocation
page read and write
2F4F000
unkown
page read and write
2CDB000
heap
page read and write
20E000
unkown
page read and write
142D000
trusted library allocation
page execute and read and write
1251000
heap
page read and write
2D2E000
unkown
page read and write
65BF000
stack
page read and write
309F000
stack
page read and write
289A000
trusted library allocation
page read and write
3034000
trusted library allocation
page read and write
2BF0000
heap
page read and write
B20000
heap
page read and write
424000
remote allocation
page execute and read and write
23E0000
heap
page read and write
1195000
heap
page read and write
D30000
trusted library allocation
page read and write
2C40000
trusted library allocation
page read and write
260B000
heap
page read and write
BAE000
stack
page read and write
167B000
trusted library allocation
page read and write
C60000
heap
page read and write
2CCF000
unkown
page read and write
D2D000
trusted library allocation
page execute and read and write
303A000
trusted library allocation
page read and write
30B0000
heap
page read and write
143D000
heap
page read and write
532E000
stack
page read and write
16B0000
trusted library allocation
page read and write
2FBB000
stack
page read and write
23DD000
stack
page read and write
3123000
heap
page read and write
2C20000
trusted library allocation
page read and write
1403000
heap
page read and write
2DFB000
heap
page read and write
10CE000
stack
page read and write
298D000
stack
page read and write
AE0000
heap
page read and write
30C2000
trusted library allocation
page read and write
15A0000
heap
page read and write
2DCC000
heap
page read and write
2F2E000
stack
page read and write
2CD0000
heap
page read and write
1040000
heap
page read and write
A9C000
stack
page read and write
1674000
trusted library allocation
page read and write
32F7000
trusted library allocation
page read and write
2A62000
trusted library allocation
page read and write
A30000
heap
page read and write
10BE000
heap
page read and write
2C00000
heap
page read and write
26FD000
stack
page read and write
7C6000
stack
page read and write
65BF000
stack
page read and write
6CC000
stack
page read and write
2AFF000
stack
page read and write
3061000
trusted library allocation
page read and write
5180000
heap
page read and write
32EE000
trusted library allocation
page read and write
F5E000
stack
page read and write
3170000
trusted library allocation
page execute and read and write
263E000
stack
page read and write
13FF000
stack
page read and write
145B000
trusted library allocation
page execute and read and write
72C000
stack
page read and write
32FD000
stack
page read and write
30F7000
trusted library allocation
page execute and read and write
28CD000
stack
page read and write
96C000
stack
page read and write
1C0000
heap
page read and write
33A0000
direct allocation
page read and write
474000
remote allocation
page execute and read and write
51D0000
heap
page read and write
3107000
trusted library allocation
page execute and read and write
12FE000
stack
page read and write
148E000
heap
page read and write
57F0000
heap
page execute and read and write
128C000
heap
page read and write
C90000
heap
page read and write
318E000
stack
page read and write
33BC000
heap
page read and write
166D000
trusted library allocation
page execute and read and write
1580000
heap
page read and write
621000
remote allocation
page execute and read and write
D10000
trusted library allocation
page read and write
12AD000
stack
page read and write
339E000
unkown
page read and write
42F000
remote allocation
page execute and read and write
3290000
heap
page read and write
3520000
heap
page read and write
30E4000
trusted library allocation
page read and write
32FD000
stack
page read and write
310B000
trusted library allocation
page execute and read and write
467000
remote allocation
page execute and read and write
2ADE000
stack
page read and write
BCC000
heap
page read and write
10CC000
stack
page read and write
2A3D000
stack
page read and write
3C2D000
trusted library allocation
page read and write
143B000
trusted library allocation
page read and write
5170000
heap
page read and write
2ECC000
heap
page read and write
2D0A000
trusted library allocation
page read and write
17CE000
stack
page read and write
CAE000
stack
page read and write
F30000
heap
page read and write
14AC000
heap
page read and write
1010000
trusted library allocation
page read and write
C8D000
trusted library allocation
page execute and read and write
2CC0000
heap
page read and write
2B60000
heap
page read and write
6EB0000
heap
page read and write
7DE000
stack
page read and write
620000
heap
page read and write
29CD000
stack
page read and write
13E0000
trusted library allocation
page read and write
1920000
trusted library allocation
page execute and read and write
D34000
trusted library allocation
page read and write
51AE000
stack
page read and write
AB0000
heap
page read and write
23DE000
unkown
page read and write
310C000
heap
page read and write
2F9F000
unkown
page read and write
539E000
stack
page read and write
1259000
heap
page read and write
31B2000
trusted library allocation
page read and write
26D0000
heap
page read and write
2CCE000
stack
page read and write
2890000
trusted library allocation
page read and write
32C0000
heap
page read and write
2B04000
trusted library allocation
page read and write
2B9F000
stack
page read and write
1040000
heap
page read and write
C7D000
trusted library allocation
page execute and read and write
11F0000
heap
page read and write
335E000
unkown
page read and write
33E0000
heap
page read and write
2F50000
heap
page read and write
28A0000
trusted library allocation
page read and write
D24000
trusted library allocation
page read and write
1970000
trusted library allocation
page read and write
9E0000
heap
page readonly
98C000
stack
page read and write
138A000
heap
page read and write
22FD000
stack
page read and write
AF6000
stack
page read and write
11A4000
trusted library allocation
page read and write
333E000
stack
page read and write
2BA0000
heap
page read and write
30E0000
trusted library allocation
page read and write
F57000
trusted library allocation
page execute and read and write
5891000
trusted library allocation
page read and write
10E3000
heap
page read and write
11BA000
trusted library allocation
page execute and read and write
D00000
heap
page read and write
433D000
trusted library allocation
page read and write
2F5C000
heap
page read and write
4A0000
heap
page readonly
196A000
trusted library allocation
page read and write
1170000
heap
page read and write
2E1E000
unkown
page read and write
29DE000
unkown
page read and write
1110000
heap
page read and write
1360000
heap
page read and write
790000
heap
page read and write
26DC000
heap
page read and write
1194000
trusted library allocation
page read and write
4EE000
stack
page read and write
30D0000
trusted library allocation
page read and write
3040000
heap
page execute and read and write
31DB000
trusted library allocation
page read and write
E3C000
stack
page read and write
471000
remote allocation
page execute and read and write
1434000
trusted library allocation
page read and write
3BB1000
trusted library allocation
page read and write
1460000
heap
page read and write
2CAE000
stack
page read and write
2F3D000
stack
page read and write
2C20000
heap
page read and write
1420000
trusted library allocation
page read and write
2D10000
trusted library allocation
page read and write
609000
remote allocation
page readonly
DEE000
stack
page read and write
57E0000
trusted library allocation
page execute and read and write
FFE000
stack
page read and write
299F000
unkown
page read and write
2830000
heap
page read and write
F5B000
trusted library allocation
page execute and read and write
E40000
trusted library allocation
page read and write
1115000
heap
page read and write
30D3000
trusted library allocation
page execute and read and write
D78000
heap
page read and write
42B000
remote allocation
page execute and read and write
283D000
stack
page read and write
31BF000
stack
page read and write
C80000
trusted library allocation
page read and write
28AB000
heap
page read and write
DDF000
stack
page read and write
8EE000
stack
page read and write
11DE000
heap
page read and write
144B000
heap
page read and write
328E000
stack
page read and write
1457000
trusted library allocation
page execute and read and write
2D00000
heap
page read and write
27DD000
stack
page read and write
FA0000
heap
page read and write
2B6D000
stack
page read and write
B87000
heap
page read and write
30CB000
trusted library allocation
page read and write
801000
remote allocation
page execute read
52EE000
stack
page read and write
2BDE000
trusted library allocation
page read and write
E30000
trusted library allocation
page execute and read and write
11D8000
heap
page read and write
552E000
stack
page read and write
A1F000
stack
page read and write
220000
heap
page read and write
14D000
stack
page read and write
1670000
trusted library allocation
page read and write
2A67000
trusted library allocation
page read and write
10D9000
heap
page read and write
9C000
stack
page read and write
88C000
stack
page read and write
2F30000
heap
page read and write
14B0000
heap
page read and write
3100000
heap
page read and write
53CE000
stack
page read and write
1430000
trusted library allocation
page read and write
30C0000
heap
page read and write
30A0000
heap
page read and write
1B0000
heap
page read and write
440D000
trusted library allocation
page read and write
53B0000
heap
page execute and read and write
505000
heap
page read and write
750000
heap
page read and write
155E000
stack
page read and write
1680000
trusted library allocation
page read and write
2A9F000
stack
page read and write
10F0000
heap
page read and write
890000
heap
page read and write
AB2000
unkown
page readonly
5330000
heap
page read and write
730000
heap
page read and write
34C0000
heap
page read and write
2BE2000
trusted library allocation
page read and write
DB9000
heap
page read and write
9F0000
heap
page read and write
474000
remote allocation
page execute and read and write
358F000
unkown
page read and write
C30000
heap
page read and write
2E70000
direct allocation
page read and write
142E000
stack
page read and write
2DDF000
unkown
page read and write
B58000
heap
page read and write
106C000
heap
page read and write
2E8B000
trusted library allocation
page read and write
2C80000
heap
page read and write
2BB0000
direct allocation
page read and write
2BE7000
trusted library allocation
page read and write
2A31000
trusted library allocation
page read and write
49C000
stack
page read and write
32D2000
trusted library allocation
page read and write
D80000
heap
page read and write
5B1000
remote allocation
page execute read
3A31000
trusted library allocation
page read and write
31A0000
heap
page read and write
359F000
unkown
page read and write
11B7000
trusted library allocation
page execute and read and write
10EA000
heap
page read and write
2C30000
trusted library allocation
page execute and read and write
19B000
stack
page read and write
BDE000
heap
page read and write
1664000
trusted library allocation
page read and write
316E000
stack
page read and write
2990000
heap
page read and write
720000
heap
page read and write
12EE000
stack
page read and write
277E000
stack
page read and write
13D6000
heap
page read and write
3240000
heap
page read and write
D77000
trusted library allocation
page execute and read and write
420000
remote allocation
page execute and read and write
2CCE000
stack
page read and write
3091000
trusted library allocation
page read and write
1180000
heap
page read and write
421D000
trusted library allocation
page read and write
FBE000
stack
page read and write
2B3D000
stack
page read and write
29D0000
heap
page read and write
4F0000
heap
page read and write
11C7000
trusted library allocation
page execute and read and write
1780000
heap
page read and write
1180000
trusted library allocation
page read and write
30C7000
trusted library allocation
page read and write
272E000
unkown
page read and write
1030000
trusted library allocation
page execute and read and write
14AA000
heap
page read and write
18EF000
stack
page read and write
30ED000
trusted library allocation
page execute and read and write
1424000
trusted library allocation
page read and write
180E000
stack
page read and write
2B0A000
trusted library allocation
page read and write
D3D000
trusted library allocation
page execute and read and write
33B0000
heap
page read and write
CFD000
stack
page read and write
30F0000
trusted library allocation
page read and write
E00000
heap
page read and write
11AD000
trusted library allocation
page execute and read and write
30FA000
trusted library allocation
page execute and read and write
2A6B000
trusted library allocation
page read and write
2C00000
heap
page read and write
2BFB000
heap
page read and write
1750000
trusted library allocation
page read and write
33DE000
stack
page read and write
2C7E000
unkown
page read and write
2660000
heap
page read and write
500000
heap
page read and write
9D0000
heap
page read and write
CDF000
stack
page read and write
1B2D000
stack
page read and write
1213000
heap
page read and write
680000
heap
page readonly
2BD0000
heap
page read and write
E2E000
stack
page read and write
871000
remote allocation
page execute and read and write
2C40000
heap
page read and write
469000
remote allocation
page execute and read and write
43B6000
trusted library allocation
page read and write
3350000
heap
page read and write
178E000
stack
page read and write
1D8F000
stack
page read and write
23FD000
stack
page read and write
15B5000
heap
page read and write
BEE000
heap
page read and write
352B000
heap
page read and write
1447000
trusted library allocation
page execute and read and write
DDA000
heap
page read and write
DDF000
heap
page read and write
C74000
trusted library allocation
page read and write
2CED000
stack
page read and write
1770000
trusted library allocation
page execute and read and write
1980000
heap
page execute and read and write
BE9000
heap
page read and write
1950000
trusted library allocation
page execute and read and write
143A000
heap
page read and write
1498000
heap
page read and write
2F71000
heap
page read and write
1137000
stack
page read and write
328F000
stack
page read and write
C60000
trusted library allocation
page read and write
2CD0000
heap
page read and write
2D21000
trusted library allocation
page read and write
471000
remote allocation
page execute and read and write
39A0000
heap
page read and write
2690000
heap
page read and write
1660000
trusted library allocation
page read and write
33E0000
heap
page read and write
11D0000
heap
page read and write
2E5E000
stack
page read and write
1930000
trusted library allocation
page read and write
2B9D000
stack
page read and write
26F1000
heap
page read and write
B65000
heap
page read and write
42ED000
trusted library allocation
page read and write
1810000
heap
page read and write
878000
remote allocation
page readonly
D7A000
trusted library allocation
page execute and read and write
2D10000
heap
page read and write
2610000
heap
page read and write
4186000
trusted library allocation
page read and write
35F0000
heap
page read and write
2CDB000
heap
page read and write
3300000
heap
page read and write
730000
heap
page read and write
3100000
trusted library allocation
page read and write
1300000
heap
page read and write
30A2000
trusted library allocation
page read and write
29FE000
stack
page read and write
4091000
trusted library allocation
page read and write
2EBD000
stack
page read and write
1410000
heap
page read and write
E50000
heap
page read and write
17E0000
heap
page read and write
165E000
stack
page read and write
35CE000
stack
page read and write
1AD000
stack
page read and write
37EF000
stack
page read and write
104A000
heap
page read and write
3640000
heap
page read and write
10CE000
heap
page read and write
F40000
heap
page read and write
1368000
heap
page read and write
D87000
trusted library allocation
page execute and read and write
30EB000
trusted library allocation
page read and write
3310000
heap
page read and write
474000
remote allocation
page execute and read and write
3CFD000
trusted library allocation
page read and write
2F2E000
unkown
page read and write
143D000
trusted library allocation
page execute and read and write
2FFD000
stack
page read and write
D3B000
trusted library allocation
page read and write
2BF0000
heap
page read and write
13F1000
heap
page read and write
2BE0000
heap
page read and write
137F000
heap
page read and write
13FE000
heap
page read and write
410D000
trusted library allocation
page read and write
474000
remote allocation
page execute and read and write
294B000
heap
page read and write
C84000
trusted library allocation
page read and write
1000000
trusted library allocation
page execute and read and write
2A9F000
unkown
page read and write
314F000
unkown
page read and write
2894000
trusted library allocation
page read and write
2C60000
heap
page execute and read and write
757000
heap
page read and write
2A40000
heap
page read and write
61B000
remote allocation
page readonly
1418000
heap
page read and write
2FED000
stack
page read and write
13CF000
stack
page read and write
232D000
stack
page read and write
2FD0000
heap
page read and write
239D000
stack
page read and write
6D0000
heap
page read and write
A3E000
stack
page read and write
157E000
stack
page read and write
2EC0000
heap
page read and write
31F0000
heap
page read and write
2F90000
heap
page read and write
28CF000
unkown
page read and write
1282000
heap
page read and write
1410000
trusted library allocation
page read and write
549E000
stack
page read and write
2A9D000
stack
page read and write
11F8000
heap
page read and write
2A6D000
stack
page read and write
3090000
heap
page read and write
302E000
stack
page read and write
169B000
trusted library allocation
page execute and read and write
29C0000
heap
page read and write
2E4E000
stack
page read and write
2B91000
trusted library allocation
page read and write
8A0000
heap
page readonly
B40000
heap
page read and write
13DA000
heap
page read and write
C73000
trusted library allocation
page execute and read and write
10C0000
heap
page read and write
2C10000
heap
page read and write
2D00000
trusted library allocation
page read and write
2DF0000
heap
page read and write
3615000
heap
page read and write
42C1000
trusted library allocation
page read and write
2AA0000
heap
page read and write
512E000
stack
page read and write
580A000
trusted library allocation
page read and write
173D000
stack
page read and write
1020000
heap
page read and write
2E62000
trusted library allocation
page read and write
DCE000
heap
page read and write
30DF000
stack
page read and write
16FE000
stack
page read and write
C95000
heap
page read and write
51EE000
stack
page read and write
2970000
heap
page read and write
D6A000
heap
page read and write
3125000
heap
page read and write
2600000
heap
page read and write
401000
remote allocation
page execute and read and write
26DD000
stack
page read and write
28CD000
stack
page read and write
9F0000
heap
page read and write
191E000
stack
page read and write
32FF000
unkown
page read and write
1B31000
trusted library allocation
page read and write
BF0000
heap
page read and write
3122000
heap
page read and write
14CA000
heap
page read and write
2BC2000
trusted library allocation
page read and write
DF7000
heap
page read and write
14AE000
heap
page read and write
304F000
stack
page read and write
32D0000
heap
page read and write
1960000
trusted library allocation
page read and write
31D7000
trusted library allocation
page read and write
E10000
heap
page readonly
50ED000
stack
page read and write
F36000
stack
page read and write
3440000
heap
page read and write
36AF000
stack
page read and write
3080000
heap
page read and write
C2E000
stack
page read and write
EF7000
stack
page read and write
3B8F000
stack
page read and write
7E0000
heap
page read and write
2E51000
trusted library allocation
page read and write
1350000
trusted library allocation
page read and write
2670000
heap
page read and write
F3F000
stack
page read and write
D40000
heap
page read and write
28A0000
heap
page read and write
117E000
stack
page read and write
3740000
heap
page read and write
12B0000
heap
page read and write
F4A000
trusted library allocation
page execute and read and write
28B1000
trusted library allocation
page read and write
6B00000
heap
page read and write
2BE0000
heap
page read and write
2C30000
heap
page read and write
B79000
heap
page read and write
32B0000
heap
page execute and read and write
5050000
heap
page execute and read and write
30BE000
unkown
page read and write
32AE000
stack
page read and write
617000
remote allocation
page readonly
2AF0000
trusted library allocation
page execute and read and write
11CB000
trusted library allocation
page execute and read and write
619000
remote allocation
page readonly
10E0000
heap
page read and write
13F5000
heap
page read and write
32F2000
trusted library allocation
page read and write
32FB000
trusted library allocation
page read and write
26B0000
heap
page read and write
3220000
heap
page read and write
AE7000
heap
page read and write
490000
heap
page read and write
471000
remote allocation
page execute and read and write
B3E000
stack
page read and write
2CFD000
stack
page read and write
381F000
stack
page read and write
D48000
heap
page read and write
1310000
heap
page read and write
1B70000
heap
page execute and read and write
1690000
trusted library allocation
page read and write
5D4000
remote allocation
page execute read
3880000
heap
page read and write
2FE0000
heap
page read and write
3180000
trusted library allocation
page read and write
522E000
stack
page read and write
2B80000
trusted library allocation
page read and write
91F000
stack
page read and write
59C000
stack
page read and write
4296000
trusted library allocation
page read and write
1740000
trusted library allocation
page execute and read and write
740000
heap
page read and write
920000
heap
page read and write
23DE000
unkown
page read and write
2FBF000
stack
page read and write
32C1000
trusted library allocation
page read and write
2D70000
heap
page read and write
323E000
unkown
page read and write
2940000
heap
page read and write
30D4000
trusted library allocation
page read and write
1280000
heap
page read and write
2D40000
heap
page read and write
54CE000
stack
page read and write
2FDE000
unkown
page read and write
2CAF000
unkown
page read and write
2390000
heap
page read and write
41DD000
trusted library allocation
page read and write
30C0000
trusted library allocation
page read and write
There are 725 hidden memdumps, click here to show them.