IOC Report
Torpernes.exe

loading gif

Files

File Path
Type
Category
Malicious
Torpernes.exe
PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
initial sample
malicious
C:\Users\user\AppData\Local\Temp\Contentious.exe
PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
dropped
malicious
C:\Users\user\AppData\Local\Temp\Contentious.exe:Zone.Identifier
ASCII text, with CRLF line terminators
dropped
malicious
C:\Users\user\AppData\Local\Temp\Myrmecophile\indregistreringers\Tangerendes\Beneme56.Gem
ASCII text, with very long lines (54418), with no line terminators
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\ModuleAnalysisCache
data
modified
C:\Users\user\AppData\Local\Temp\Myrmecophile\indregistreringers\Tangerendes\Sildefdnings.pre
data
dropped
C:\Users\user\AppData\Local\Temp\Myrmecophile\indregistreringers\Tangerendes\Vaabenstyringssystems\genfortl.kom
data
dropped
C:\Users\user\AppData\Local\Temp\Myrmecophile\indregistreringers\Tangerendes\Vaabenstyringssystems\leucocythaemia.lob
data
dropped
C:\Users\user\AppData\Local\Temp\Myrmecophile\indregistreringers\Tangerendes\Vaabenstyringssystems\teknonom.txt
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\Myrmecophile\indregistreringers\Tangerendes\discontiguous.alk
data
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_dqmzalva.ybv.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_g1fjdjsr.czb.ps1
ASCII text, with no line terminators
dropped
There are 2 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\Torpernes.exe
"C:\Users\user\Desktop\Torpernes.exe"
malicious
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
"powershell.exe" -windowstyle hidden "$Rligstes=Get-Content 'C:\Users\user\AppData\Local\Temp\Myrmecophile\indregistreringers\Tangerendes\Beneme56.Gem';$Fortifikatorisk=$Rligstes.SubString(54389,3);.$Fortifikatorisk($Rligstes)"
malicious
C:\Users\user\AppData\Local\Temp\Contentious.exe
"C:\Users\user\AppData\Local\Temp\Contentious.exe"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\cmd.exe
"C:\Windows\System32\cmd.exe" /c REG ADD HKCU\Software\Microsoft\Windows\CurrentVersion\Run /f /v "crisscrossing" /t REG_EXPAND_SZ /d "%Isomerous% -windowstyle minimized $Livsopsving=(Get-ItemProperty -Path 'HKCU:\Deponeringspladsen\').sknhedsplejes;%Isomerous% ($Livsopsving)"
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\reg.exe
REG ADD HKCU\Software\Microsoft\Windows\CurrentVersion\Run /f /v "crisscrossing" /t REG_EXPAND_SZ /d "%Isomerous% -windowstyle minimized $Livsopsving=(Get-ItemProperty -Path 'HKCU:\Deponeringspladsen\').sknhedsplejes;%Isomerous% ($Livsopsving)"

URLs

Name
IP
Malicious
https://api.telegram.org
unknown
malicious
https://api.telegram.org/bot
unknown
malicious
http://nuget.org/NuGet.exe
unknown
http://pesterbdd.com/images/Pester.png
unknown
http://www.apache.org/licenses/LICENSE-2.0.html
unknown
https://contoso.com/License
unknown
https://contoso.com/Icon
unknown
https://domzeleni.kz/image/bwSNbczRiJIuD15.binB
unknown
http://checkip.dyndns.org
unknown
http://nsis.sf.net/NSIS_ErrorError
unknown
https://reallyfreegeoip.org/xml/8.46.123.33
188.114.96.3
https://github.com/Pester/Pester
unknown
https://domzeleni.kz/image/bwSNbczRiJIuD15.bin
185.98.5.168
http://crl.m
unknown
http://checkip.dyndns.org/
158.101.44.242
https://aka.ms/pscore6lB
unknown
https://reallyfreegeoip.org/xml/8.46.123.33$
unknown
https://contoso.com/
unknown
https://nuget.org/nuget.exe
unknown
http://reallyfreegeoip.org
unknown
https://reallyfreegeoip.org
unknown
http://checkip.dyndns.com
unknown
http://api.telegram.org
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
https://domzeleni.kz/
unknown
https://reallyfreegeoip.org/xml/
unknown
There are 16 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
reallyfreegeoip.org
188.114.96.3
malicious
api.telegram.org
149.154.167.220
malicious
checkip.dyndns.org
unknown
malicious
domzeleni.kz
185.98.5.168
checkip.dyndns.com
158.101.44.242

IPs

IP
Domain
Country
Malicious
149.154.167.220
api.telegram.org
United Kingdom
malicious
188.114.96.3
reallyfreegeoip.org
European Union
malicious
158.101.44.242
checkip.dyndns.com
United States
185.98.5.168
domzeleni.kz
Kazakhstan

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\universitetsboghandlernes\justly\antihistaminerne
Augitite
HKEY_CURRENT_USER\Deponeringspladsen
sknhedsplejes
HKEY_CURRENT_USER\Environment
Isomerous
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Contentious_RASAPI32
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Contentious_RASAPI32
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Contentious_RASAPI32
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Contentious_RASAPI32
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Contentious_RASAPI32
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Contentious_RASAPI32
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Contentious_RASAPI32
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Contentious_RASMANCS
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Contentious_RASMANCS
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Contentious_RASMANCS
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Contentious_RASMANCS
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Contentious_RASMANCS
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Contentious_RASMANCS
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Contentious_RASMANCS
FileDirectory
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
crisscrossing
There are 9 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
21031000
trusted library allocation
page read and write
malicious
9DFB000
direct allocation
page execute and read and write
malicious
21067000
trusted library allocation
page read and write
malicious
20FAA000
trusted library allocation
page read and write
malicious
20DE1000
trusted library allocation
page read and write
malicious
2091F000
stack
page read and write
4ACC000
heap
page read and write
7CF0000
trusted library allocation
page read and write
7120000
trusted library allocation
page read and write
515000
heap
page read and write
6410000
direct allocation
page read and write
20C40000
trusted library allocation
page read and write
20F20000
trusted library allocation
page read and write
20500000
trusted library allocation
page read and write
21F0000
heap
page read and write
2352D000
heap
page read and write
491000
unkown
page readonly
20C40000
trusted library allocation
page read and write
20E84000
trusted library allocation
page read and write
20C40000
trusted library allocation
page read and write
400000
unkown
page readonly
20C40000
trusted library allocation
page read and write
20C40000
trusted library allocation
page read and write
20500000
trusted library allocation
page read and write
20B8D000
trusted library allocation
page read and write
21BE000
stack
page read and write
6CD7000
trusted library allocation
page read and write
20500000
trusted library allocation
page read and write
190000
trusted library allocation
page read and write
208DE000
stack
page read and write
23810000
trusted library allocation
page read and write
20C40000
trusted library allocation
page read and write
A0000
trusted library allocation
page read and write
67C0000
direct allocation
page read and write
3670000
trusted library allocation
page read and write
4681000
trusted library allocation
page read and write
23E10000
trusted library allocation
page read and write
80E000
stack
page read and write
204D0000
trusted library allocation
page read and write
4621000
trusted library allocation
page read and write
20C40000
trusted library allocation
page read and write
70A0000
trusted library allocation
page execute and read and write
50C000
heap
page read and write
675E000
stack
page read and write
20C40000
trusted library allocation
page read and write
20520000
trusted library allocation
page read and write
4C0000
heap
page read and write
20CC0000
trusted library allocation
page read and write
20CA0000
trusted library allocation
page read and write
20A30000
trusted library allocation
page read and write
478000
stack
page read and write
700F000
stack
page read and write
409000
unkown
page write copy
4875000
heap
page read and write
6850000
direct allocation
page read and write
23810000
trusted library allocation
page read and write
23810000
trusted library allocation
page read and write
23E00000
trusted library allocation
page read and write
491000
unkown
page readonly
20B66000
trusted library allocation
page read and write
23DC0000
trusted library allocation
page read and write
20C40000
trusted library allocation
page read and write
20434000
trusted library allocation
page read and write
21E78000
trusted library allocation
page read and write
20C40000
trusted library allocation
page read and write
23810000
trusted library allocation
page read and write
20500000
trusted library allocation
page read and write
20C40000
trusted library allocation
page read and write
20CC0000
trusted library allocation
page read and write
23E10000
trusted library allocation
page read and write
AD000
trusted library allocation
page execute and read and write
20C40000
trusted library allocation
page read and write
20C40000
trusted library allocation
page read and write
94000
trusted library allocation
page read and write
536000
heap
page read and write
2870000
heap
page read and write
20C40000
trusted library allocation
page read and write
20CC0000
trusted library allocation
page read and write
20A30000
trusted library allocation
page read and write
20C40000
trusted library allocation
page read and write
204F0000
trusted library allocation
page read and write
23810000
trusted library allocation
page read and write
7CE0000
trusted library allocation
page read and write
3EAC000
stack
page read and write
20B6B000
trusted library allocation
page read and write
19A000
stack
page read and write
4A84000
heap
page read and write
20EBD000
trusted library allocation
page read and write
23DF0000
trusted library allocation
page read and write
7B70000
trusted library allocation
page read and write
20420000
trusted library allocation
page read and write
49D0000
direct allocation
page read and write
23537000
heap
page read and write
1720000
remote allocation
page execute and read and write
204F0000
trusted library allocation
page read and write
286E000
stack
page read and write
4877000
heap
page read and write
409000
unkown
page write copy
20C40000
trusted library allocation
page read and write
23810000
trusted library allocation
page read and write
7F69000
heap
page read and write
205A0000
direct allocation
page read and write
20C40000
trusted library allocation
page read and write
70D0000
trusted library allocation
page read and write
511000
heap
page read and write
20F9C000
trusted library allocation
page read and write
7130000
trusted library allocation
page read and write
23810000
trusted library allocation
page read and write
20C40000
trusted library allocation
page read and write
20EE8000
trusted library allocation
page read and write
50C000
heap
page read and write
20C40000
trusted library allocation
page read and write
515000
heap
page read and write
20890000
heap
page read and write
63F0000
direct allocation
page read and write
20C40000
trusted library allocation
page read and write
3270000
heap
page read and write
20C40000
trusted library allocation
page read and write
23DD0000
trusted library allocation
page read and write
7F40000
heap
page read and write
6C1E000
stack
page read and write
407000
unkown
page readonly
20C40000
trusted library allocation
page read and write
874000
trusted library allocation
page read and write
6C8000
heap
page read and write
20CC0000
trusted library allocation
page read and write
20C40000
trusted library allocation
page read and write
7F99000
heap
page read and write
20C40000
trusted library allocation
page read and write
20430000
trusted library allocation
page read and write
23E10000
trusted library allocation
page read and write
6890000
direct allocation
page read and write
20A30000
trusted library allocation
page read and write
6CF0000
heap
page execute and read and write
70E0000
trusted library allocation
page read and write
23810000
trusted library allocation
page read and write
20C40000
trusted library allocation
page read and write
44C000
unkown
page read and write
20580000
direct allocation
page read and write
20C40000
trusted library allocation
page read and write
6F10000
trusted library allocation
page read and write
20C40000
trusted library allocation
page read and write
281E000
unkown
page read and write
6820000
direct allocation
page read and write
20CB0000
trusted library allocation
page read and write
23810000
trusted library allocation
page read and write
190000
trusted library allocation
page read and write
20410000
trusted library allocation
page read and write
20C41000
trusted library allocation
page read and write
448E000
stack
page read and write
20C40000
trusted library allocation
page read and write
20F6E000
trusted library allocation
page read and write
20C40000
trusted library allocation
page read and write
23810000
trusted library allocation
page read and write
5621000
trusted library allocation
page read and write
2040F000
stack
page read and write
20F34000
trusted library allocation
page read and write
49A0000
direct allocation
page read and write
204F0000
trusted library allocation
page read and write
20B92000
trusted library allocation
page read and write
44CE000
stack
page read and write
20C40000
trusted library allocation
page read and write
20A40000
trusted library allocation
page read and write
20F53000
trusted library allocation
page read and write
20CC0000
trusted library allocation
page read and write
7F7F000
heap
page read and write
20CA0000
trusted library allocation
page read and write
6880000
direct allocation
page read and write
7090000
trusted library allocation
page read and write
20CA0000
trusted library allocation
page read and write
27FD000
heap
page read and write
21055000
trusted library allocation
page read and write
64E0000
heap
page read and write
68A000
heap
page read and write
7B60000
trusted library allocation
page execute and read and write
20A50000
heap
page read and write
7FE2000
heap
page read and write
20C40000
trusted library allocation
page read and write
20C40000
trusted library allocation
page read and write
20C40000
trusted library allocation
page read and write
6D10000
heap
page read and write
658000
heap
page read and write
210AF000
trusted library allocation
page read and write
20C40000
trusted library allocation
page read and write
20B6E000
trusted library allocation
page read and write
4E7A000
trusted library allocation
page read and write
511000
heap
page read and write
23ABF000
stack
page read and write
568D000
trusted library allocation
page read and write
C5000
trusted library allocation
page execute and read and write
27FC000
heap
page read and write
6D76000
heap
page read and write
20CC0000
trusted library allocation
page read and write
20430000
trusted library allocation
page read and write
671E000
stack
page read and write
8170000
trusted library allocation
page execute and read and write
6DE1000
heap
page read and write
20C40000
trusted library allocation
page read and write
6860000
direct allocation
page read and write
20CB0000
trusted library allocation
page execute and read and write
23810000
trusted library allocation
page read and write
20C40000
trusted library allocation
page read and write
500000
heap
page read and write
23810000
trusted library allocation
page read and write
2100F000
trusted library allocation
page read and write
20CA0000
trusted library allocation
page read and write
20C40000
trusted library allocation
page read and write
511000
heap
page read and write
22A0000
heap
page read and write
2250000
heap
page read and write
3650000
heap
page read and write
20500000
trusted library allocation
page read and write
44F000
unkown
page readonly
20C40000
trusted library allocation
page read and write
2D00000
heap
page read and write
20A40000
trusted library allocation
page read and write
4860000
direct allocation
page read and write
4ABF000
heap
page read and write
20C40000
trusted library allocation
page read and write
23820000
trusted library allocation
page read and write
23E10000
trusted library allocation
page read and write
20CA0000
trusted library allocation
page read and write
20C40000
trusted library allocation
page read and write
23E10000
trusted library allocation
page read and write
35FB000
remote allocation
page execute and read and write
4A54000
heap
page read and write
50C000
heap
page read and write
63D0000
direct allocation
page read and write
23810000
trusted library allocation
page read and write
64BD000
stack
page read and write
6815000
heap
page execute and read and write
7110000
trusted library allocation
page read and write
20CC0000
trusted library allocation
page read and write
89FB000
direct allocation
page execute and read and write
20C40000
trusted library allocation
page read and write
20C40000
trusted library allocation
page read and write
23820000
trusted library allocation
page execute and read and write
2820000
heap
page read and write
500000
heap
page read and write
2007E000
stack
page read and write
63A0000
direct allocation
page read and write
23A3E000
stack
page read and write
4D0000
heap
page read and write
23810000
trusted library allocation
page read and write
A7FB000
direct allocation
page execute and read and write
669E000
stack
page read and write
20C40000
trusted library allocation
page read and write
20C40000
trusted library allocation
page read and write
57CB000
trusted library allocation
page read and write
8180000
direct allocation
page execute and read and write
23590000
heap
page read and write
93000
trusted library allocation
page execute and read and write
32CE000
stack
page read and write
20C40000
trusted library allocation
page read and write
27F2000
heap
page read and write
2098A000
stack
page read and write
20CC0000
trusted library allocation
page read and write
20430000
trusted library allocation
page read and write
23810000
trusted library allocation
page read and write
235C9000
heap
page read and write
20C50000
heap
page execute and read and write
191000
trusted library allocation
page read and write
20CCE000
trusted library allocation
page read and write
4776000
trusted library allocation
page read and write
28EB000
heap
page read and write
50C000
heap
page read and write
63C0000
direct allocation
page read and write
20CA0000
trusted library allocation
page read and write
98000
stack
page read and write
20C40000
trusted library allocation
page read and write
401000
unkown
page execute read
452C000
stack
page read and write
704E000
stack
page read and write
20C40000
trusted library allocation
page read and write
2003D000
stack
page read and write
20930000
direct allocation
page read and write
6E21000
heap
page read and write
20500000
trusted library allocation
page read and write
6E7000
heap
page read and write
160000
trusted library allocation
page read and write
20E87000
trusted library allocation
page read and write
6F20000
trusted library allocation
page read and write
20EA2000
trusted library allocation
page read and write
4ABE000
heap
page read and write
7BEE000
stack
page read and write
20410000
trusted library allocation
page read and write
20CC0000
trusted library allocation
page read and write
515000
heap
page read and write
421000
unkown
page read and write
407000
unkown
page readonly
23DC0000
trusted library allocation
page read and write
20E92000
trusted library allocation
page read and write
3280000
heap
page read and write
20A30000
trusted library allocation
page read and write
20C40000
trusted library allocation
page read and write
204F0000
trusted library allocation
page read and write
20430000
trusted library allocation
page read and write
150000
trusted library allocation
page execute and read and write
409000
unkown
page write copy
20CA0000
trusted library allocation
page read and write
326F000
stack
page read and write
23E10000
trusted library allocation
page read and write
78E000
stack
page read and write
200C0000
heap
page read and write
B0000
trusted library allocation
page read and write
20CC0000
trusted library allocation
page read and write
C70000
heap
page execute and read and write
4990000
direct allocation
page read and write
63E0000
direct allocation
page read and write
B1FB000
direct allocation
page execute and read and write
180000
trusted library allocation
page read and write
20C40000
trusted library allocation
page read and write
23810000
trusted library allocation
page read and write
239D000
stack
page read and write
6810000
heap
page execute and read and write
20500000
trusted library allocation
page read and write
20CA0000
trusted library allocation
page read and write
401000
unkown
page execute read
20500000
trusted library allocation
page read and write
23810000
trusted library allocation
page read and write
23810000
trusted library allocation
page read and write
4A84000
heap
page read and write
20A36000
trusted library allocation
page read and write
22A9000
heap
page read and write
6400000
direct allocation
page read and write
23810000
trusted library allocation
page read and write
BA000
trusted library allocation
page execute and read and write
7F92000
heap
page read and write
217E000
stack
page read and write
2073E000
stack
page read and write
526000
heap
page read and write
456E000
stack
page read and write
23810000
trusted library allocation
page read and write
7C2E000
stack
page read and write
42A000
unkown
page read and write
7F60000
heap
page read and write
20C40000
trusted library allocation
page read and write
20CA0000
trusted library allocation
page read and write
87D000
trusted library allocation
page execute and read and write
20CA0000
trusted library allocation
page read and write
22A5000
heap
page read and write
20C40000
trusted library allocation
page read and write
536000
heap
page read and write
2380E000
stack
page read and write
605000
heap
page read and write
27F2000
heap
page read and write
191000
trusted library allocation
page read and write
20C40000
trusted library allocation
page read and write
10E000
stack
page read and write
4ABE000
heap
page read and write
810000
heap
page read and write
67E0000
direct allocation
page read and write
4980000
direct allocation
page read and write
407000
unkown
page readonly
50C000
heap
page read and write
33C8000
heap
page read and write
857000
heap
page read and write
20C40000
trusted library allocation
page read and write
20CC0000
trusted library allocation
page read and write
4D8000
heap
page read and write
23CBE000
stack
page read and write
515000
heap
page read and write
21E09000
trusted library allocation
page read and write
20ED4000
trusted library allocation
page read and write
66DE000
stack
page read and write
23810000
trusted library allocation
page read and write
6F80000
trusted library allocation
page read and write
500000
heap
page read and write
21E6F000
trusted library allocation
page read and write
6D59000
heap
page read and write
20C40000
trusted library allocation
page read and write
4570000
trusted library allocation
page execute and read and write
20A30000
trusted library allocation
page read and write
67D0000
direct allocation
page read and write
20E8A000
trusted library allocation
page read and write
22EDE000
stack
page read and write
23810000
trusted library allocation
page read and write
23E10000
trusted library allocation
page read and write
20510000
trusted library allocation
page execute and read and write
20CA0000
trusted library allocation
page read and write
20F1C000
trusted library allocation
page read and write
2030E000
stack
page read and write
8A2000
trusted library allocation
page read and write
23E10000
trusted library allocation
page read and write
23E20000
trusted library allocation
page read and write
23BFF000
stack
page read and write
20A40000
trusted library allocation
page read and write
889000
trusted library allocation
page read and write
23E10000
trusted library allocation
page read and write
20F45000
trusted library allocation
page read and write
6D7000
heap
page read and write
4830000
heap
page read and write
85E000
stack
page read and write
23810000
trusted library allocation
page read and write
20420000
trusted library allocation
page read and write
7C85000
trusted library allocation
page read and write
20A30000
trusted library allocation
page read and write
23810000
trusted library allocation
page read and write
234AE000
heap
page read and write
43C000
stack
page read and write
20A30000
trusted library allocation
page read and write
8190000
trusted library allocation
page read and write
20500000
trusted library allocation
page read and write
20CB0000
trusted library allocation
page read and write
20890000
remote allocation
page read and write
234A4000
heap
page read and write
500000
heap
page read and write
23591000
heap
page read and write
20A40000
trusted library allocation
page read and write
4A7E000
heap
page read and write
711000
heap
page read and write
8D9000
heap
page read and write
44F000
unkown
page readonly
23DD0000
trusted library allocation
page read and write
20500000
trusted library allocation
page read and write
409000
unkown
page read and write
400000
unkown
page readonly
20420000
trusted library allocation
page read and write
5649000
trusted library allocation
page read and write
20530000
trusted library allocation
page read and write
20500000
trusted library allocation
page read and write
501000
heap
page read and write
23AFE000
stack
page read and write
30AD000
stack
page read and write
23DE0000
trusted library allocation
page read and write
20420000
trusted library allocation
page read and write
204F0000
trusted library allocation
page read and write
20F30000
trusted library allocation
page read and write
6FCE000
stack
page read and write
23E10000
trusted library allocation
page read and write
873000
trusted library allocation
page execute and read and write
426000
unkown
page read and write
8A5000
trusted library allocation
page execute and read and write
20A30000
trusted library allocation
page read and write
204F0000
trusted library allocation
page read and write
4580000
trusted library allocation
page read and write
20F18000
trusted library allocation
page read and write
20CC0000
trusted library allocation
page read and write
21E62000
trusted library allocation
page read and write
27F3000
heap
page read and write
434000
unkown
page read and write
50C000
heap
page read and write
23DC0000
trusted library allocation
page read and write
20C40000
trusted library allocation
page read and write
21E48000
trusted library allocation
page read and write
2905000
heap
page read and write
20C40000
trusted library allocation
page read and write
23810000
trusted library allocation
page read and write
20A30000
trusted library allocation
page read and write
20A30000
trusted library allocation
page read and write
23810000
trusted library allocation
page read and write
20C9D000
stack
page read and write
7CE000
stack
page read and write
23810000
trusted library allocation
page read and write
20C40000
trusted library allocation
page read and write
401000
unkown
page execute read
89A000
trusted library allocation
page execute and read and write
515000
heap
page read and write
2902000
heap
page read and write
20F38000
trusted library allocation
page read and write
23DCF000
trusted library allocation
page read and write
20A30000
trusted library allocation
page read and write
8920000
direct allocation
page execute and read and write
73F000
heap
page read and write
6D84000
heap
page read and write
20C40000
trusted library allocation
page read and write
6E0A000
heap
page read and write
4A7C000
heap
page read and write
6840000
direct allocation
page read and write
20C40000
trusted library allocation
page read and write
44F000
unkown
page readonly
20CA0000
trusted library allocation
page read and write
204F0000
trusted library allocation
page read and write
93FB000
direct allocation
page execute and read and write
20C40000
trusted library allocation
page read and write
23810000
trusted library allocation
page read and write
322E000
stack
page read and write
515000
heap
page read and write
2220000
heap
page read and write
201CF000
stack
page read and write
20C40000
trusted library allocation
page read and write
7EBC000
stack
page read and write
191000
trusted library allocation
page read and write
20C40000
trusted library allocation
page read and write
20510000
trusted library allocation
page read and write
20890000
remote allocation
page read and write
23810000
trusted library allocation
page read and write
23810000
trusted library allocation
page read and write
95E000
stack
page read and write
206EF000
stack
page read and write
20C40000
trusted library allocation
page read and write
27FC000
heap
page read and write
20C40000
trusted library allocation
page read and write
20CA0000
trusted library allocation
page read and write
20420000
trusted library allocation
page read and write
57D1000
trusted library allocation
page read and write
20C40000
trusted library allocation
page read and write
20C40000
trusted library allocation
page read and write
20590000
direct allocation
page read and write
665E000
stack
page read and write
23DC0000
trusted library allocation
page read and write
20C40000
trusted library allocation
page read and write
6390000
direct allocation
page read and write
20A30000
trusted library allocation
page read and write
306D000
stack
page read and write
63B0000
direct allocation
page read and write
70F0000
trusted library allocation
page read and write
6830000
direct allocation
page read and write
21DE1000
trusted library allocation
page read and write
20B7A000
trusted library allocation
page read and write
23810000
trusted library allocation
page read and write
20420000
trusted library allocation
page read and write
840000
trusted library section
page read and write
6F30000
trusted library allocation
page read and write
49F8000
heap
page read and write
46D0000
heap
page read and write
500000
heap
page read and write
20CC0000
trusted library allocation
page read and write
7B80000
trusted library allocation
page read and write
9D000
trusted library allocation
page execute and read and write
20500000
trusted library allocation
page read and write
40B000
unkown
page read and write
204F0000
trusted library allocation
page read and write
23810000
trusted library allocation
page read and write
20440000
trusted library allocation
page read and write
23818000
trusted library allocation
page read and write
500000
heap
page read and write
3110000
heap
page read and write
20C40000
trusted library allocation
page read and write
2393F000
stack
page read and write
7100000
trusted library allocation
page read and write
2100A000
trusted library allocation
page read and write
23810000
trusted library allocation
page read and write
6CD0000
trusted library allocation
page read and write
20540000
trusted library allocation
page read and write
81F000
stack
page read and write
44D8000
trusted library allocation
page read and write
63E000
stack
page read and write
7EFE000
stack
page read and write
7F86000
heap
page read and write
20C40000
trusted library allocation
page read and write
50C000
heap
page read and write
23810000
trusted library allocation
page read and write
511000
heap
page read and write
23E30000
trusted library allocation
page execute and read and write
7150000
trusted library allocation
page read and write
204E0000
trusted library allocation
page read and write
20CA0000
trusted library allocation
page read and write
20C40000
trusted library allocation
page read and write
2134000
heap
page read and write
3FFB000
remote allocation
page execute and read and write
400000
unkown
page readonly
2260000
heap
page read and write
20E99000
trusted library allocation
page read and write
20CC0000
trusted library allocation
page read and write
870000
trusted library allocation
page read and write
2C00000
heap
page read and write
70B0000
trusted library allocation
page read and write
7FC9000
heap
page read and write
23830000
heap
page execute and read and write
20430000
trusted library allocation
page read and write
6870000
direct allocation
page read and write
20C40000
trusted library allocation
page read and write
20C40000
trusted library allocation
page read and write
21015000
trusted library allocation
page read and write
7F8C000
heap
page read and write
2BDF000
stack
page read and write
407000
unkown
page readonly
20B60000
trusted library allocation
page read and write
20C40000
trusted library allocation
page read and write
23E10000
trusted library allocation
page read and write
20CC0000
trusted library allocation
page read and write
20F8A000
trusted library allocation
page read and write
49B0000
direct allocation
page read and write
6D1A000
heap
page read and write
20C40000
trusted library allocation
page read and write
2105B000
trusted library allocation
page read and write
20C40000
trusted library allocation
page read and write
20CA0000
trusted library allocation
page read and write
4A6B000
heap
page read and write
7F48000
heap
page read and write
23DC0000
trusted library allocation
page read and write
20CA0000
trusted library allocation
page read and write
20C40000
trusted library allocation
page read and write
20A30000
trusted library allocation
page read and write
20C40000
trusted library allocation
page read and write
20CC0000
trusted library allocation
page read and write
400000
unkown
page readonly
20C40000
trusted library allocation
page read and write
23820000
trusted library allocation
page read and write
20C40000
trusted library allocation
page read and write
20CA0000
trusted library allocation
page read and write
2102D000
trusted library allocation
page read and write
20B86000
trusted library allocation
page read and write
20C40000
trusted library allocation
page read and write
28E0000
heap
page read and write
8C0000
trusted library allocation
page read and write
170000
trusted library allocation
page read and write
4870000
heap
page read and write
7140000
trusted library allocation
page read and write
23810000
trusted library allocation
page read and write
67E000
heap
page read and write
20500000
trusted library allocation
page read and write
190000
trusted library allocation
page read and write
20C40000
trusted library allocation
page read and write
21FB000
remote allocation
page execute and read and write
20EE4000
trusted library allocation
page read and write
21061000
trusted library allocation
page read and write
20460000
trusted library allocation
page read and write
4F0000
heap
page read and write
536000
heap
page read and write
20A30000
trusted library allocation
page read and write
491000
unkown
page readonly
23810000
trusted library allocation
page read and write
20570000
direct allocation
page read and write
44F000
unkown
page readonly
20500000
trusted library allocation
page read and write
45DE000
stack
page read and write
20C40000
trusted library allocation
page read and write
20E96000
trusted library allocation
page read and write
850000
heap
page read and write
B6000
trusted library allocation
page execute and read and write
2101E000
trusted library allocation
page read and write
20420000
trusted library allocation
page read and write
7CB0000
trusted library allocation
page read and write
6D44000
heap
page read and write
3FAC000
stack
page read and write
20C40000
trusted library allocation
page read and write
4850000
direct allocation
page read and write
20CC0000
trusted library allocation
page read and write
23810000
trusted library allocation
page read and write
23810000
trusted library allocation
page read and write
860000
trusted library allocation
page read and write
23810000
trusted library allocation
page read and write
6460000
heap
page read and write
23DE0000
trusted library allocation
page read and write
20CC0000
trusted library allocation
page read and write
23810000
trusted library allocation
page read and write
4A77000
heap
page read and write
49E0000
direct allocation
page read and write
20CA0000
trusted library allocation
page read and write
20C40000
trusted library allocation
page read and write
21028000
trusted library allocation
page read and write
4877000
heap
page read and write
20CC0000
trusted library allocation
page read and write
B2000
trusted library allocation
page read and write
20C40000
trusted library allocation
page read and write
20C40000
trusted library allocation
page read and write
190000
trusted library allocation
page read and write
6960000
heap
page read and write
20500000
trusted library allocation
page read and write
20CC0000
trusted library allocation
page read and write
49F0000
heap
page read and write
23810000
trusted library allocation
page read and write
20A30000
trusted library allocation
page read and write
23A7D000
stack
page read and write
20C40000
trusted library allocation
page read and write
20C40000
trusted library allocation
page read and write
533000
heap
page read and write
23816000
trusted library allocation
page read and write
401000
unkown
page execute read
20EA5000
trusted library allocation
page read and write
71E000
stack
page read and write
650000
heap
page read and write
73C000
heap
page read and write
20CC0000
trusted library allocation
page read and write
20A30000
trusted library allocation
page read and write
23810000
trusted library allocation
page read and write
20C40000
trusted library allocation
page read and write
27F9000
heap
page read and write
4A19000
heap
page read and write
7F040000
trusted library allocation
page execute and read and write
880000
trusted library allocation
page read and write
17FB000
remote allocation
page execute and read and write
20CC0000
trusted library allocation
page read and write
20430000
trusted library allocation
page read and write
20C40000
trusted library allocation
page read and write
830000
trusted library section
page read and write
20530000
trusted library allocation
page read and write
20F60000
trusted library allocation
page read and write
20CA0000
trusted library allocation
page read and write
5D0000
heap
page read and write
6BF7000
trusted library allocation
page read and write
20F28000
trusted library allocation
page read and write
20410000
trusted library allocation
page read and write
20430000
trusted library allocation
page read and write
20ED1000
trusted library allocation
page read and write
20B81000
trusted library allocation
page read and write
7C30000
heap
page read and write
7D10000
heap
page read and write
20410000
trusted library allocation
page read and write
20C40000
trusted library allocation
page read and write
20C40000
trusted library allocation
page read and write
20C40000
trusted library allocation
page read and write
20410000
trusted library allocation
page read and write
20500000
trusted library allocation
page read and write
2700000
heap
page read and write
20CD0000
heap
page read and write
14E000
stack
page read and write
20CA0000
trusted library allocation
page read and write
23810000
trusted library allocation
page read and write
234D9000
heap
page read and write
20CC0000
trusted library allocation
page read and write
7F3C000
stack
page read and write
2ADF000
unkown
page read and write
7170000
trusted library allocation
page read and write
20C40000
trusted library allocation
page read and write
23C7F000
stack
page read and write
20C40000
trusted library allocation
page read and write
20940000
direct allocation
page read and write
7CD0000
trusted library allocation
page read and write
2130000
heap
page read and write
7C40000
trusted library allocation
page execute and read and write
330F000
stack
page read and write
204F0000
trusted library allocation
page read and write
20560000
trusted library allocation
page read and write
20F24000
trusted library allocation
page read and write
511000
heap
page read and write
20CC0000
trusted library allocation
page read and write
20CC0000
trusted library allocation
page read and write
20DDF000
stack
page read and write
68B0000
direct allocation
page read and write
205EE000
stack
page read and write
708D000
stack
page read and write
2083E000
stack
page read and write
2381B000
trusted library allocation
page read and write
20B57000
stack
page read and write
23DD0000
trusted library allocation
page read and write
6D37000
heap
page read and write
20B7E000
trusted library allocation
page read and write
C2000
trusted library allocation
page read and write
511000
heap
page read and write
6F40000
trusted library allocation
page read and write
2BE0000
heap
page read and write
20F2C000
trusted library allocation
page read and write
21E6C000
trusted library allocation
page read and write
20EDC000
trusted library allocation
page read and write
20C40000
trusted library allocation
page read and write
190000
trusted library allocation
page read and write
20440000
trusted library allocation
page read and write
600000
heap
page read and write
23E10000
trusted library allocation
page read and write
23810000
trusted library allocation
page read and write
23810000
trusted library allocation
page read and write
4A81000
heap
page read and write
20420000
trusted library allocation
page read and write
8160000
trusted library allocation
page read and write
536000
heap
page read and write
7FCF000
heap
page read and write
5629000
trusted library allocation
page read and write
20CA0000
trusted library allocation
page read and write
20450000
trusted library allocation
page read and write
7FA2000
heap
page read and write
68A0000
direct allocation
page read and write
20A30000
trusted library allocation
page read and write
2041B000
trusted library allocation
page read and write
23810000
trusted library allocation
page read and write
70C0000
trusted library allocation
page read and write
7160000
trusted library allocation
page read and write
26FD000
stack
page read and write
20C40000
trusted library allocation
page read and write
20C40000
trusted library allocation
page read and write
27EF000
stack
page read and write
20C40000
trusted library allocation
page read and write
64E6000
heap
page read and write
6C5E000
stack
page read and write
8150000
trusted library allocation
page execute and read and write
20C40000
trusted library allocation
page read and write
190000
trusted library allocation
page read and write
57B8000
trusted library allocation
page read and write
20A40000
trusted library allocation
page read and write
520000
heap
page read and write
71BB000
stack
page read and write
2BFB000
remote allocation
page execute and read and write
90000
trusted library allocation
page read and write
491000
unkown
page readonly
20C40000
trusted library allocation
page read and write
500000
heap
page read and write
26EE000
stack
page read and write
8A0000
trusted library allocation
page read and write
20A30000
trusted library allocation
page read and write
23C3E000
stack
page read and write
CB000
trusted library allocation
page execute and read and write
20CC0000
trusted library allocation
page read and write
C7000
trusted library allocation
page execute and read and write
23DC0000
trusted library allocation
page read and write
204F0000
trusted library allocation
page read and write
20CA0000
trusted library allocation
page read and write
7B47000
stack
page read and write
67B0000
direct allocation
page read and write
20A40000
trusted library allocation
page read and write
20890000
remote allocation
page read and write
42E000
unkown
page read and write
20C40000
trusted library allocation
page read and write
8140000
trusted library allocation
page read and write
23DBF000
stack
page read and write
20CA0000
trusted library allocation
page read and write
6D54000
heap
page read and write
511000
heap
page read and write
6D7D000
heap
page read and write
20CC0000
trusted library allocation
page read and write
20C41000
trusted library allocation
page read and write
515000
heap
page read and write
4610000
heap
page read and write
23591000
heap
page read and write
20C40000
trusted library allocation
page read and write
6DFF000
heap
page read and write
20420000
trusted library allocation
page execute and read and write
7B50000
heap
page read and write
20C40000
trusted library allocation
page read and write
20EE0000
trusted library allocation
page read and write
536000
heap
page read and write
80000
trusted library allocation
page read and write
8D0000
heap
page read and write
C80000
heap
page readonly
6430000
heap
page read and write
49C0000
direct allocation
page read and write
7E7C000
stack
page read and write
20F8D000
trusted library allocation
page read and write
23490000
heap
page read and write
20A30000
trusted library allocation
page read and write
7CC0000
trusted library allocation
page read and write
20C40000
trusted library allocation
page read and write
20C40000
trusted library allocation
page read and write
33C0000
heap
page read and write
23506000
heap
page read and write
There are 816 hidden memdumps, click here to show them.