IOC Report
rPO0977-6745.exe

loading gif

Files

File Path
Type
Category
Malicious
rPO0977-6745.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\rPO0977-6745.exe.log
ASCII text, with CRLF line terminators
dropped
malicious
C:\Users\user\AppData\Local\Temp\tmp44AD.tmp
XML 1.0 document, ASCII text
dropped
malicious
C:\Users\user\AppData\Roaming\EDyxAgkldisLe.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\EDyxAgkldisLe.exe:Zone.Identifier
ASCII text, with CRLF line terminators
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\EDyxAgkldisLe.exe.log
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
data
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_1ley3isf.vh3.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_2jiszu5j.bcl.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_5c0grjqc.amp.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_ddap2fxj.pnj.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_nrnefvhn.udn.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_s4zpmwxp.xmh.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_um2plh5i.fqs.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_w20wx3ac.dgs.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\tmp547C.tmp
XML 1.0 document, ASCII text
dropped
There are 6 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\rPO0977-6745.exe
"C:\Users\user\Desktop\rPO0977-6745.exe"
malicious
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\rPO0977-6745.exe"
malicious
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\EDyxAgkldisLe.exe"
malicious
C:\Windows\SysWOW64\schtasks.exe
"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\EDyxAgkldisLe" /XML "C:\Users\user\AppData\Local\Temp\tmp44AD.tmp"
malicious
C:\Users\user\Desktop\rPO0977-6745.exe
"C:\Users\user\Desktop\rPO0977-6745.exe"
malicious
C:\Users\user\Desktop\rPO0977-6745.exe
"C:\Users\user\Desktop\rPO0977-6745.exe"
malicious
C:\Users\user\AppData\Roaming\EDyxAgkldisLe.exe
C:\Users\user\AppData\Roaming\EDyxAgkldisLe.exe
malicious
C:\Windows\SysWOW64\schtasks.exe
"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\EDyxAgkldisLe" /XML "C:\Users\user\AppData\Local\Temp\tmp547C.tmp"
malicious
C:\Users\user\AppData\Roaming\EDyxAgkldisLe.exe
"C:\Users\user\AppData\Roaming\EDyxAgkldisLe.exe"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\wbem\WmiPrvSE.exe
C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
There are 4 hidden processes, click here to show them.

URLs

Name
IP
Malicious
https://api.telegram.org
unknown
malicious
https://api.telegram.org/bot
unknown
malicious
https://api.telegram.org/bot6724182006:AAFoGlHe55KNUX6Demve5eHbGqhBzYsvQQc/sendDocument?chat_id=5535
unknown
https://api.telegram.org/bot6724182006:AAFoGlHe55KNUX6Demve5eHbGqhBzYsvQQc/sendDocument?chat_id=5535403842&caption=%20Pc%20Name:%20user%20%7C%20Snake%20Tracker%0D%0A%0D%0APW%20%7C%20user%20%7C%20Snake
149.154.167.220
http://checkip.dyndns.org/
158.101.44.242
https://reallyfreegeoip.org/xml/8.46.123.33$
unknown
http://microsoft.co
unknown
http://checkip.dyndns.orgh
unknown
http://checkip.dyndns.org/q
unknown
http://tempuri.org/DataSet1.xsd
unknown
http://reallyfreegeoip.org
unknown
https://reallyfreegeoip.org
unknown
http://checkip.dyndns.org
unknown
http://checkip.dyndns.com
unknown
https://reallyfreegeoip.org/xml/8.46.123.33
188.114.97.3
http://api.telegram.org
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
https://reallyfreegeoip.org/xml/
unknown
There are 8 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
reallyfreegeoip.org
188.114.97.3
malicious
api.telegram.org
149.154.167.220
malicious
15.164.165.52.in-addr.arpa
unknown
malicious
checkip.dyndns.org
unknown
malicious
checkip.dyndns.com
158.101.44.242

IPs

IP
Domain
Country
Malicious
149.154.167.220
api.telegram.org
United Kingdom
malicious
188.114.97.3
reallyfreegeoip.org
European Union
malicious
158.101.44.242
checkip.dyndns.com
United States

Registry

Path
Value
Malicious
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\rPO0977-6745_RASAPI32
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\rPO0977-6745_RASAPI32
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\rPO0977-6745_RASAPI32
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\rPO0977-6745_RASAPI32
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\rPO0977-6745_RASAPI32
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\rPO0977-6745_RASAPI32
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\rPO0977-6745_RASAPI32
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\rPO0977-6745_RASMANCS
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\rPO0977-6745_RASMANCS
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\rPO0977-6745_RASMANCS
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\rPO0977-6745_RASMANCS
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\rPO0977-6745_RASMANCS
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\rPO0977-6745_RASMANCS
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\rPO0977-6745_RASMANCS
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\EDyxAgkldisLe_RASAPI32
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\EDyxAgkldisLe_RASAPI32
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\EDyxAgkldisLe_RASAPI32
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\EDyxAgkldisLe_RASAPI32
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\EDyxAgkldisLe_RASAPI32
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\EDyxAgkldisLe_RASAPI32
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\EDyxAgkldisLe_RASAPI32
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\EDyxAgkldisLe_RASMANCS
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\EDyxAgkldisLe_RASMANCS
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\EDyxAgkldisLe_RASMANCS
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\EDyxAgkldisLe_RASMANCS
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\EDyxAgkldisLe_RASMANCS
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\EDyxAgkldisLe_RASMANCS
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\EDyxAgkldisLe_RASMANCS
FileDirectory
There are 19 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
3180000
trusted library allocation
page read and write
malicious
2960000
trusted library allocation
page read and write
malicious
2791000
trusted library allocation
page read and write
malicious
402000
remote allocation
page execute and read and write
malicious
29EE000
trusted library allocation
page read and write
malicious
41F9000
trusted library allocation
page read and write
malicious
2F21000
trusted library allocation
page read and write
malicious
2A55000
trusted library allocation
page read and write
malicious
30ED000
trusted library allocation
page read and write
malicious
3A5D000
trusted library allocation
page read and write
malicious
31E6000
trusted library allocation
page read and write
malicious
4E23000
heap
page read and write
3FBB000
trusted library allocation
page read and write
4191000
trusted library allocation
page read and write
1610000
trusted library allocation
page read and write
4DD1000
trusted library allocation
page read and write
54F1000
trusted library allocation
page read and write
3F8A000
trusted library allocation
page read and write
53AE000
trusted library allocation
page read and write
7860000
trusted library section
page read and write
D1B000
trusted library allocation
page execute and read and write
6C90000
heap
page read and write
53DA000
trusted library allocation
page read and write
E79000
stack
page read and write
5130000
trusted library allocation
page execute and read and write
E38000
heap
page read and write
6BCB000
trusted library allocation
page read and write
CED000
trusted library allocation
page execute and read and write
52B0000
heap
page read and write
5490000
trusted library allocation
page read and write
53D4000
trusted library allocation
page read and write
B9D000
stack
page read and write
13CD000
trusted library allocation
page execute and read and write
546E000
stack
page read and write
D00000
heap
page read and write
57C0000
heap
page execute and read and write
5140000
heap
page execute and read and write
D58000
heap
page read and write
53CD000
trusted library allocation
page read and write
7870000
trusted library section
page read and write
145A000
heap
page read and write
5590000
trusted library allocation
page read and write
5540000
heap
page read and write
E2E000
heap
page read and write
95E000
stack
page read and write
A8AE000
stack
page read and write
2DFF000
unkown
page read and write
64E0000
trusted library allocation
page execute and read and write
2FDC000
trusted library allocation
page read and write
4DB0000
trusted library allocation
page read and write
4A2E000
stack
page read and write
2F4C000
stack
page read and write
13D0000
trusted library allocation
page read and write
CC0000
trusted library allocation
page read and write
B30000
heap
page read and write
8970000
heap
page read and write
3150000
trusted library allocation
page read and write
547D000
stack
page read and write
4DB6000
trusted library allocation
page read and write
3821000
trusted library allocation
page read and write
13E0000
heap
page read and write
520E000
stack
page read and write
7AF0000
trusted library section
page read and write
6EDC6000
unkown
page readonly
E4B000
heap
page read and write
3158000
trusted library allocation
page read and write
2AA2000
trusted library allocation
page read and write
79CD000
stack
page read and write
6EDB1000
unkown
page execute read
3016000
trusted library allocation
page read and write
496E000
stack
page read and write
28D2000
trusted library allocation
page read and write
61CE000
stack
page read and write
31B0000
trusted library allocation
page read and write
D8A000
stack
page read and write
5990000
trusted library allocation
page execute and read and write
9C0000
heap
page read and write
28DA000
trusted library allocation
page read and write
2F50000
heap
page read and write
4EEE000
trusted library allocation
page read and write
2943000
trusted library allocation
page read and write
4A50000
trusted library allocation
page read and write
37FC000
trusted library allocation
page read and write
2860000
trusted library allocation
page read and write
E50000
trusted library allocation
page read and write
2E00000
trusted library allocation
page read and write
6BA0000
trusted library allocation
page read and write
5DFE000
stack
page read and write
A68E000
stack
page read and write
B7E000
stack
page read and write
177F000
stack
page read and write
5020000
trusted library allocation
page execute and read and write
8E0D000
stack
page read and write
3818000
trusted library allocation
page read and write
31E2000
trusted library allocation
page read and write
328A000
trusted library allocation
page read and write
1294000
heap
page read and write
1407000
trusted library allocation
page execute and read and write
8E1E000
stack
page read and write
5210000
heap
page read and write
29E5000
trusted library allocation
page read and write
5A9000
stack
page read and write
1430000
heap
page execute and read and write
284F000
trusted library allocation
page read and write
638E000
stack
page read and write
CE4000
trusted library allocation
page read and write
5660000
trusted library allocation
page read and write
4DC2000
trusted library allocation
page read and write
2DA0000
heap
page read and write
13C0000
trusted library allocation
page read and write
6EDCF000
unkown
page readonly
583E000
stack
page read and write
5520000
trusted library allocation
page read and write
BDA000
stack
page read and write
B10000
heap
page read and write
13FA000
trusted library allocation
page execute and read and write
6EDB0000
unkown
page readonly
4283000
trusted library allocation
page read and write
4CB0000
heap
page read and write
54FD000
trusted library allocation
page read and write
CF6000
trusted library allocation
page execute and read and write
6BB0000
trusted library allocation
page execute and read and write
53D0000
trusted library allocation
page read and write
2887000
trusted library allocation
page read and write
29F1000
trusted library allocation
page read and write
3210000
trusted library allocation
page read and write
2846000
trusted library allocation
page read and write
3067000
trusted library allocation
page read and write
3063000
trusted library allocation
page read and write
64D6000
trusted library allocation
page read and write
4DF6000
trusted library allocation
page read and write
9C8000
heap
page read and write
1660000
heap
page read and write
165E000
stack
page read and write
3A19000
trusted library allocation
page read and write
13F2000
trusted library allocation
page read and write
1668000
heap
page read and write
2924000
trusted library allocation
page read and write
317B000
trusted library allocation
page read and write
4DF0000
trusted library allocation
page read and write
7B60000
trusted library allocation
page read and write
4E20000
heap
page read and write
283E000
trusted library allocation
page read and write
58CE000
stack
page read and write
1160000
heap
page read and write
11E5000
heap
page read and write
2880000
heap
page execute and read and write
5E10000
heap
page read and write
707C000
heap
page read and write
1440000
trusted library allocation
page execute and read and write
2D50000
heap
page read and write
9F6000
heap
page read and write
5315000
heap
page read and write
53C1000
trusted library allocation
page read and write
71C0000
heap
page read and write
7737000
heap
page read and write
4F60000
heap
page read and write
37B9000
trusted library allocation
page read and write
4E00000
trusted library allocation
page read and write
3088000
trusted library allocation
page read and write
2870000
trusted library allocation
page read and write
A76C000
stack
page read and write
4DBB000
trusted library allocation
page read and write
F77000
stack
page read and write
8B6E000
stack
page read and write
64DB000
trusted library allocation
page read and write
8D10000
trusted library allocation
page execute and read and write
13DD000
trusted library allocation
page execute and read and write
6050000
heap
page read and write
6BD0000
trusted library allocation
page execute and read and write
9B5000
heap
page read and write
5990000
trusted library allocation
page execute and read and write
4F90000
heap
page read and write
57B0000
trusted library allocation
page execute and read and write
4EF1000
trusted library allocation
page read and write
726E000
stack
page read and write
8596000
trusted library allocation
page read and write
58C7000
trusted library allocation
page read and write
63CE000
stack
page read and write
CD3000
trusted library allocation
page execute and read and write
5ABD000
stack
page read and write
4ED0000
trusted library allocation
page read and write
5030000
trusted library section
page readonly
30A3000
trusted library allocation
page read and write
2A7F000
trusted library allocation
page read and write
29CC000
trusted library allocation
page read and write
3180000
heap
page execute and read and write
4DDD000
trusted library allocation
page read and write
5670000
heap
page read and write
EE0000
heap
page read and write
904E000
stack
page read and write
31AB000
trusted library allocation
page read and write
30B1000
trusted library allocation
page read and write
D0A000
trusted library allocation
page execute and read and write
11D0000
heap
page read and write
7880000
trusted library allocation
page read and write
28FB000
trusted library allocation
page read and write
31B6000
trusted library allocation
page read and write
3027000
trusted library allocation
page read and write
53F3000
heap
page read and write
13F0000
trusted library allocation
page read and write
5572000
trusted library allocation
page read and write
305B000
trusted library allocation
page read and write
2875000
trusted library allocation
page read and write
54D0000
trusted library allocation
page read and write
620E000
stack
page read and write
CCE000
stack
page read and write
2FD3000
trusted library allocation
page read and write
661E000
stack
page read and write
57D0000
heap
page read and write
29D0000
trusted library allocation
page read and write
65C0000
heap
page read and write
5510000
trusted library allocation
page read and write
C72000
unkown
page readonly
EB0000
heap
page execute and read and write
2DB0000
heap
page read and write
298F000
stack
page read and write
53BA000
trusted library allocation
page read and write
78CD000
stack
page read and write
12BA000
heap
page read and write
BB0000
heap
page read and write
52C7000
trusted library allocation
page read and write
278E000
stack
page read and write
54F6000
trusted library allocation
page read and write
4FA0000
trusted library allocation
page read and write
4EC0000
trusted library allocation
page read and write
4DD6000
trusted library allocation
page read and write
13E0000
trusted library allocation
page read and write
11AE000
stack
page read and write
3073000
trusted library allocation
page read and write
C70000
unkown
page readonly
FF0000
heap
page read and write
13D4000
trusted library allocation
page read and write
2940000
trusted library allocation
page read and write
EAE000
stack
page read and write
5CFE000
stack
page read and write
30DF000
trusted library allocation
page read and write
744D000
stack
page read and write
3191000
trusted library allocation
page read and write
301F000
trusted library allocation
page read and write
8DCC000
stack
page read and write
307B000
trusted library allocation
page read and write
4F93000
heap
page read and write
29DC000
trusted library allocation
page read and write
D30000
trusted library allocation
page read and write
CD0000
trusted library allocation
page read and write
587E000
stack
page read and write
15F7000
trusted library allocation
page execute and read and write
3077000
trusted library allocation
page read and write
740D000
stack
page read and write
1110000
heap
page read and write
5580000
trusted library allocation
page execute and read and write
5300000
trusted library allocation
page execute and read and write
15E6000
trusted library allocation
page execute and read and write
CFA000
trusted library allocation
page execute and read and write
63F0000
heap
page read and write
3791000
trusted library allocation
page read and write
6A50000
heap
page read and write
526E000
stack
page read and write
4EF6000
trusted library allocation
page read and write
69DE000
stack
page read and write
74EE000
heap
page read and write
5F4E000
stack
page read and write
8F0E000
stack
page read and write
2A12000
trusted library allocation
page read and write
13C4000
trusted library allocation
page read and write
58D0000
trusted library allocation
page execute and read and write
3163000
trusted library allocation
page read and write
7A0D000
stack
page read and write
CED000
trusted library allocation
page execute and read and write
64F0000
trusted library allocation
page read and write
E28000
heap
page read and write
15DF000
stack
page read and write
7820000
trusted library section
page read and write
7772000
heap
page read and write
7788000
heap
page read and write
7ABD000
stack
page read and write
7F240000
trusted library allocation
page execute and read and write
4DE2000
trusted library allocation
page read and write
64D8000
trusted library allocation
page read and write
52C0000
trusted library allocation
page read and write
39F1000
trusted library allocation
page read and write
D50000
heap
page read and write
10F7000
stack
page read and write
15E0000
trusted library allocation
page read and write
13CF000
stack
page read and write
2909000
trusted library allocation
page read and write
54D4000
trusted library allocation
page read and write
4A30000
trusted library allocation
page read and write
13D0000
trusted library allocation
page read and write
53DE000
trusted library allocation
page read and write
685D000
stack
page read and write
2D60000
heap
page read and write
6A1E000
stack
page read and write
58E5000
heap
page read and write
5010000
trusted library allocation
page read and write
3212000
trusted library allocation
page read and write
2FCB000
trusted library allocation
page read and write
54EE000
trusted library allocation
page read and write
11C0000
trusted library allocation
page read and write
1402000
trusted library allocation
page read and write
D60000
trusted library allocation
page read and write
52D0000
trusted library allocation
page execute and read and write
64CF000
stack
page read and write
9E9000
heap
page read and write
1140000
heap
page read and write
D40000
trusted library allocation
page execute and read and write
536E000
stack
page read and write
2FE6000
trusted library allocation
page read and write
7720000
heap
page read and write
E15000
trusted library allocation
page execute and read and write
CE0000
trusted library allocation
page read and write
486D000
stack
page read and write
30CD000
trusted library allocation
page read and write
D00000
trusted library allocation
page read and write
3F49000
trusted library allocation
page read and write
2D70000
heap
page read and write
29D2000
trusted library allocation
page read and write
30BF000
stack
page read and write
1400000
trusted library allocation
page read and write
7570000
trusted library allocation
page read and write
CD0000
trusted library allocation
page read and write
960000
heap
page read and write
2F70000
trusted library allocation
page execute and read and write
2A1E000
trusted library allocation
page read and write
6BC0000
trusted library allocation
page read and write
29C7000
trusted library allocation
page read and write
1405000
trusted library allocation
page execute and read and write
58E0000
heap
page read and write
4E30000
trusted library allocation
page read and write
CE0000
trusted library allocation
page read and write
D78000
heap
page read and write
8C6E000
stack
page read and write
2896000
trusted library allocation
page read and write
2CAD000
stack
page read and write
13C3000
trusted library allocation
page execute and read and write
289E000
trusted library allocation
page read and write
302B000
trusted library allocation
page read and write
E60000
heap
page read and write
60C9000
heap
page read and write
8F4E000
stack
page read and write
F6E000
stack
page read and write
630E000
stack
page read and write
2892000
trusted library allocation
page read and write
4EFD000
trusted library allocation
page read and write
1460000
trusted library allocation
page read and write
D70000
heap
page read and write
BB5000
heap
page read and write
57F0000
heap
page execute and read and write
CDD000
trusted library allocation
page execute and read and write
2AF2000
trusted library allocation
page read and write
D02000
trusted library allocation
page read and write
634E000
stack
page read and write
289A000
trusted library allocation
page read and write
DF0000
heap
page read and write
2858000
trusted library allocation
page read and write
4DCE000
trusted library allocation
page read and write
68DE000
stack
page read and write
106E000
stack
page read and write
3FAF000
trusted library allocation
page read and write
3170000
trusted library allocation
page read and write
7280000
trusted library allocation
page read and write
3165000
trusted library allocation
page read and write
6510000
trusted library allocation
page execute and read and write
3F21000
trusted library allocation
page read and write
6F7E000
heap
page read and write
306B000
trusted library allocation
page read and write
1470000
heap
page read and write
436E000
trusted library allocation
page read and write
E17000
trusted library allocation
page execute and read and write
DB6000
heap
page read and write
1464000
trusted library allocation
page read and write
63DF000
stack
page read and write
28DE000
trusted library allocation
page read and write
618E000
stack
page read and write
5520000
trusted library allocation
page read and write
2F80000
trusted library allocation
page read and write
7A4E000
stack
page read and write
2DFF000
unkown
page read and write
500C000
stack
page read and write
28D6000
trusted library allocation
page read and write
3030000
heap
page read and write
7830000
trusted library allocation
page read and write
2DBE000
unkown
page read and write
13D3000
trusted library allocation
page read and write
C8E000
stack
page read and write
2A98000
trusted library allocation
page read and write
FD5000
heap
page read and write
AAE000
heap
page read and write
B20000
heap
page read and write
5E00000
heap
page read and write
761E000
stack
page read and write
2FA0000
heap
page read and write
CD4000
trusted library allocation
page read and write
64D0000
trusted library allocation
page read and write
284E000
stack
page read and write
314F000
stack
page read and write
671E000
stack
page read and write
53C6000
trusted library allocation
page read and write
A58E000
stack
page read and write
31DD000
trusted library allocation
page read and write
13B0000
trusted library allocation
page read and write
141F000
heap
page read and write
57E0000
heap
page read and write
7F8A0000
trusted library allocation
page execute and read and write
5310000
heap
page read and write
3176000
trusted library allocation
page read and write
60B9000
heap
page read and write
7AA000
stack
page read and write
3014000
trusted library allocation
page read and write
29E0000
heap
page read and write
E02000
heap
page read and write
62DE000
stack
page read and write
D12000
trusted library allocation
page read and write
4B8C000
stack
page read and write
140B000
trusted library allocation
page execute and read and write
285B000
trusted library allocation
page read and write
136F000
stack
page read and write
53D2000
trusted library allocation
page read and write
777E000
heap
page read and write
6720000
heap
page read and write
2F1E000
stack
page read and write
A9AE000
stack
page read and write
2850000
trusted library allocation
page read and write
4F70000
trusted library allocation
page read and write
2843000
trusted library allocation
page read and write
59AE000
trusted library allocation
page read and write
AF7000
stack
page read and write
5BFF000
stack
page read and write
6530000
trusted library allocation
page read and write
31A0000
heap
page read and write
283B000
trusted library allocation
page read and write
13D3000
trusted library allocation
page execute and read and write
31A9000
trusted library allocation
page read and write
4DF4000
trusted library allocation
page read and write
4F20000
trusted library allocation
page read and write
6500000
trusted library allocation
page execute and read and write
74E0000
heap
page read and write
53BE000
trusted library allocation
page read and write
4E9D000
stack
page read and write
3FA6000
trusted library allocation
page read and write
E12000
trusted library allocation
page read and write
64FB000
trusted library allocation
page read and write
382D000
trusted library allocation
page read and write
604F000
stack
page read and write
53A6000
trusted library allocation
page read and write
6BF0000
trusted library allocation
page read and write
15E2000
trusted library allocation
page read and write
5560000
heap
page read and write
5220000
heap
page execute and read and write
2A18000
trusted library allocation
page read and write
13DD000
trusted library allocation
page execute and read and write
2CEA000
stack
page read and write
110E000
stack
page read and write
CF0000
trusted library allocation
page read and write
6BA6000
trusted library allocation
page read and write
13EE000
heap
page read and write
524F000
stack
page read and write
6F00000
heap
page read and write
E11000
heap
page read and write
57AC000
stack
page read and write
4DCA000
trusted library allocation
page read and write
2A1A000
trusted library allocation
page read and write
4ED9000
trusted library allocation
page read and write
15EA000
trusted library allocation
page execute and read and write
310E000
stack
page read and write
6A9E000
stack
page read and write
400000
remote allocation
page execute and read and write
3096000
trusted library allocation
page read and write
6BE0000
trusted library allocation
page execute and read and write
2A3D000
trusted library allocation
page read and write
58C0000
trusted library allocation
page read and write
3160000
trusted library allocation
page read and write
A290000
heap
page read and write
52AE000
stack
page read and write
284C000
trusted library allocation
page read and write
DB4000
heap
page read and write
4F5E000
stack
page read and write
8720000
trusted library allocation
page execute and read and write
2C80000
heap
page read and write
2854000
trusted library allocation
page read and write
31A7000
heap
page read and write
4ED4000
trusted library allocation
page read and write
CF3000
trusted library allocation
page read and write
28CE000
trusted library allocation
page read and write
5673000
heap
page read and write
4199000
trusted library allocation
page read and write
5400000
trusted library allocation
page read and write
A2A0000
heap
page read and write
5370000
heap
page read and write
EC0000
heap
page read and write
E1B000
trusted library allocation
page execute and read and write
CFC000
unkown
page readonly
1422000
heap
page read and write
307E000
stack
page read and write
28EE000
trusted library allocation
page read and write
3023000
trusted library allocation
page read and write
53A0000
trusted library allocation
page read and write
39F9000
trusted library allocation
page read and write
2FF0000
trusted library allocation
page read and write
3330000
heap
page read and write
5BBE000
stack
page read and write
4DBE000
trusted library allocation
page read and write
1260000
heap
page read and write
CFD000
trusted library allocation
page execute and read and write
53F0000
heap
page read and write
6590000
trusted library allocation
page read and write
57C0000
trusted library section
page readonly
2873000
trusted library allocation
page read and write
8F7000
stack
page read and write
2A25000
trusted library allocation
page read and write
4F80000
trusted library allocation
page execute and read and write
689F000
stack
page read and write
29CC000
stack
page read and write
316D000
trusted library allocation
page read and write
59A0000
trusted library allocation
page read and write
6A5E000
stack
page read and write
709F000
heap
page read and write
505E000
stack
page read and write
58BE000
stack
page read and write
D17000
trusted library allocation
page execute and read and write
73CD000
stack
page read and write
31A3000
trusted library allocation
page read and write
E40000
trusted library allocation
page execute and read and write
72CD000
stack
page read and write
305F000
trusted library allocation
page read and write
65E0000
trusted library allocation
page execute and read and write
288A000
trusted library allocation
page read and write
FD0000
heap
page read and write
6C60000
trusted library allocation
page read and write
8B86000
trusted library allocation
page read and write
28E6000
trusted library allocation
page read and write
5570000
trusted library allocation
page read and write
315D000
trusted library allocation
page read and write
3120000
heap
page read and write
11D0000
heap
page read and write
4F72000
trusted library allocation
page read and write
3016000
trusted library allocation
page read and write
63E0000
heap
page read and write
DA8000
heap
page read and write
2E10000
heap
page read and write
2952000
trusted library allocation
page read and write
312B000
heap
page read and write
6EDCD000
unkown
page read and write
3010000
trusted library allocation
page read and write
2D9E000
unkown
page read and write
7840000
trusted library allocation
page read and write
2D5E000
stack
page read and write
CF0000
trusted library allocation
page read and write
29EA000
trusted library allocation
page read and write
CF2000
trusted library allocation
page read and write
15F0000
trusted library allocation
page read and write
6BA8000
trusted library allocation
page read and write
314C000
stack
page read and write
1450000
trusted library allocation
page read and write
11E0000
heap
page read and write
2FEE000
stack
page read and write
CE3000
trusted library allocation
page execute and read and write
1420000
trusted library allocation
page read and write
8CCC000
stack
page read and write
2F90000
trusted library allocation
page read and write
910000
heap
page read and write
771E000
stack
page read and write
6B9E000
stack
page read and write
9B0000
heap
page read and write
6EDCD000
unkown
page read and write
41B9000
trusted library allocation
page read and write
30D0000
trusted library allocation
page read and write
A86C000
stack
page read and write
122D000
stack
page read and write
13AE000
stack
page read and write
775A000
heap
page read and write
6520000
trusted library allocation
page read and write
D7E000
heap
page read and write
1206000
heap
page read and write
13ED000
trusted library allocation
page execute and read and write
53AB000
trusted library allocation
page read and write
11D8000
heap
page read and write
15FB000
trusted library allocation
page execute and read and write
2C51000
trusted library allocation
page read and write
2FE8000
trusted library allocation
page read and write
D06000
trusted library allocation
page execute and read and write
13F6000
trusted library allocation
page execute and read and write
7070000
heap
page read and write
2856000
trusted library allocation
page read and write
59B0000
heap
page read and write
882F000
stack
page read and write
28EA000
trusted library allocation
page read and write
A48F000
stack
page read and write
6BAB000
trusted library allocation
page read and write
3000000
trusted library allocation
page read and write
6C00000
trusted library allocation
page read and write
28E2000
trusted library allocation
page read and write
15F2000
trusted library allocation
page read and write
6CB0000
trusted library allocation
page execute and read and write
306F000
trusted library allocation
page read and write
2F0E000
stack
page read and write
There are 587 hidden memdumps, click here to show them.