IOC Report
Apixaban - August 2024.exe

loading gif

Files

File Path
Type
Category
Malicious
Apixaban - August 2024.exe
PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
initial sample
malicious
C:\Users\user\AppData\Local\Temp\forgrovelse\konstituerendes\Kompottens.Sub
ASCII text, with very long lines (65536), with no line terminators
dropped
malicious
C:\Users\user\AppData\Local\Temp\forgrovelse\konstituerendes\Usurpatoren\Apixaban - August 2024.exe
PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
dropped
malicious
C:\Users\user\AppData\Local\Temp\forgrovelse\konstituerendes\Usurpatoren\Apixaban - August 2024.exe:Zone.Identifier
ASCII text, with CRLF line terminators
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\ModuleAnalysisCache
data
modified
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_ct140sl0.uqu.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_k0vbnx0a.o2v.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\forgrovelse\konstituerendes\Switchgirl.Pre
data
dropped
C:\Users\user\AppData\Local\Temp\forgrovelse\konstituerendes\Usurpatoren\ondskabsfuldhedernes.txt
ASCII text, with very long lines (367), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\forgrovelse\konstituerendes\grensav.sjl
data
dropped
C:\Users\user\AppData\Local\Temp\forgrovelse\konstituerendes\lokalplanrammes.sus
data
dropped
C:\Users\user\AppData\Local\Temp\nszF66C.tmp
data
dropped
There are 2 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\Apixaban - August 2024.exe
"C:\Users\user\Desktop\Apixaban - August 2024.exe"
malicious
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
"powershell.exe" -windowstyle hidden "$nonrationally=Get-Content 'C:\Users\user\AppData\Local\Temp\forgrovelse\konstituerendes\Kompottens.Sub';$Blgekams=$nonrationally.SubString(70407,3);.$Blgekams($nonrationally) "
malicious
C:\Program Files (x86)\Windows Mail\wab.exe
"C:\Program Files (x86)\windows mail\wab.exe"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1

URLs

Name
IP
Malicious
https://www.office.com/
unknown
https://duckduckgo.com/chrome_newtab
unknown
http://nuget.org/NuGet.exe
unknown
https://duckduckgo.com/ac/?q=
unknown
http://r10.i.lencr.org/01
unknown
https://api.telegram.org
unknown
https://www.google.com/images/branding/product/ico/googleg_lodp.ico
unknown
http://pesterbdd.com/images/Pester.png
unknown
https://api.telegram.org/bot
unknown
http://www.apache.org/licenses/LICENSE-2.0.html
unknown
https://contoso.com/License
unknown
https://www.office.com/lB
unknown
https://contoso.com/Icon
unknown
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
unknown
http://r10.o.lencr.org0#
unknown
http://electromac.com.bo
unknown
https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
unknown
http://nsis.sf.net/NSIS_ErrorError
unknown
https://api.telegram.org/bot/sendMessage?chat_id=&text=%20%0D%0A%0D%0APC%20Name:061544%0D%0ADate%20a
unknown
https://reallyfreegeoip.org/xml/8.46.123.33
188.114.96.3
https://api.telegram.org/bot/sendMessage?chat_id=&text=
unknown
https://chrome.google.com/webstore?hl=en
unknown
https://www.ecosia.org/newtab/
unknown
https://github.com/Pester/Pester
unknown
http://mail.electromac.com.bo
unknown
https://ac.ecosia.org/autocomplete?q=
unknown
http://checkip.dyndns.org/
193.122.6.168
http://51.38.247.67:8081/_send_.php?L
unknown
https://aka.ms/pscore6lB
unknown
https://reallyfreegeoip.org/xml/8.46.123.33$
unknown
https://www.reap.skyestates.com.mt/wp-includes/yPrtLahZfwrl128.bin
108.167.181.251
http://x1.c.lencr.org/0
unknown
http://x1.i.lencr.org/0
unknown
https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
unknown
https://contoso.com/
unknown
https://nuget.org/nuget.exe
unknown
https://go.microsoft
unknown
https://reallyfreegeoip.org
unknown
https://api.telegram.org/bot/sendMessage?chat_id=&text=%20%0D%0A%0D%0APC%20Name:061544%0D%0ADate%20and%20Time:%2026/07/2024%20/%2003:56:11%0D%0ACountry%20Name:%20United%20States%0D%0A%5B%20061544%20Clicked%20on%20the%20File%20If%20you%20see%20nothing%20this's%20mean%20the%20system%20storage's%20empty.%20%5D
149.154.167.220
https://go.microsof)
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
unknown
https://reallyfreegeoip.org/xml/
unknown
There are 33 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
reallyfreegeoip.org
188.114.96.3
malicious
electromac.com.bo
192.185.142.133
malicious
api.telegram.org
149.154.167.220
malicious
mail.electromac.com.bo
unknown
malicious
checkip.dyndns.org
unknown
malicious
www.reap.skyestates.com.mt
108.167.181.251
checkip.dyndns.com
193.122.6.168

IPs

IP
Domain
Country
Malicious
149.154.167.220
api.telegram.org
United Kingdom
malicious
192.185.142.133
electromac.com.bo
United States
malicious
188.114.96.3
reallyfreegeoip.org
European Union
malicious
193.122.6.168
checkip.dyndns.com
United States
108.167.181.251
www.reap.skyestates.com.mt
United States

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\fordjelsesbesvret\Uninstall\Spidsfindigeres22
luftrr
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\wab_RASAPI32
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\wab_RASAPI32
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\wab_RASAPI32
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\wab_RASAPI32
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\wab_RASAPI32
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\wab_RASAPI32
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\wab_RASAPI32
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\wab_RASMANCS
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\wab_RASMANCS
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\wab_RASMANCS
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\wab_RASMANCS
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\wab_RASMANCS
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\wab_RASMANCS
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\wab_RASMANCS
FileDirectory
There are 6 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
925B000
direct allocation
page execute and read and write
malicious
251E1000
trusted library allocation
page read and write
malicious
264D4000
trusted library allocation
page read and write
27F20000
trusted library allocation
page execute and read and write
27F00000
trusted library allocation
page read and write
8611000
heap
page read and write
28040000
trusted library allocation
page read and write
27F00000
trusted library allocation
page read and write
24FEE000
stack
page read and write
27420000
trusted library allocation
page read and write
251C0000
trusted library allocation
page read and write
251C0000
trusted library allocation
page read and write
2771E000
stack
page read and write
25483000
trusted library allocation
page read and write
27F00000
trusted library allocation
page read and write
27460000
heap
page read and write
400000
unkown
page readonly
2FC0000
trusted library allocation
page read and write
28040000
trusted library allocation
page read and write
251C0000
trusted library allocation
page read and write
27F20000
trusted library allocation
page read and write
26534000
trusted library allocation
page read and write
271F0000
trusted library allocation
page read and write
30E0000
heap
page read and write
4D10000
trusted library allocation
page read and write
25180000
trusted library allocation
page read and write
2F40000
trusted library allocation
page read and write
26334000
trusted library allocation
page read and write
27770000
trusted library allocation
page read and write
30E9000
heap
page read and write
27EBE000
stack
page read and write
264B2000
trusted library allocation
page read and write
27F30000
trusted library allocation
page read and write
27F00000
trusted library allocation
page read and write
24EE0000
direct allocation
page read and write
27770000
trusted library allocation
page read and write
251C0000
trusted library allocation
page read and write
251C0000
trusted library allocation
page read and write
8400000
trusted library allocation
page read and write
251C0000
trusted library allocation
page read and write
27F00000
trusted library allocation
page read and write
251C0000
trusted library allocation
page read and write
265C2000
trusted library allocation
page read and write
27F00000
trusted library allocation
page read and write
27F00000
trusted library allocation
page read and write
25175000
trusted library allocation
page read and write
251C0000
trusted library allocation
page read and write
2655A000
trusted library allocation
page read and write
27F30000
trusted library allocation
page execute and read and write
27770000
trusted library allocation
page read and write
2723D000
stack
page read and write
28040000
trusted library allocation
page read and write
271E0000
trusted library allocation
page read and write
96A5000
heap
page read and write
24FF0000
trusted library allocation
page read and write
3660000
trusted library allocation
page read and write
2743A000
trusted library allocation
page read and write
96BE000
heap
page read and write
27DFF000
stack
page read and write
9672000
heap
page read and write
27F00000
trusted library allocation
page read and write
251C0000
trusted library allocation
page read and write
28040000
trusted library allocation
page read and write
782D000
stack
page read and write
254BF000
trusted library allocation
page read and write
27770000
trusted library allocation
page read and write
24F2000
trusted library allocation
page read and write
76D0000
trusted library allocation
page read and write
27F00000
trusted library allocation
page read and write
2AF0000
heap
page read and write
7720000
trusted library allocation
page read and write
30B5000
heap
page read and write
316F000
stack
page read and write
27770000
trusted library allocation
page read and write
24E7E000
stack
page read and write
7677000
trusted library allocation
page read and write
27F30000
trusted library allocation
page read and write
78F0000
trusted library allocation
page read and write
27F00000
trusted library allocation
page read and write
97C0000
direct allocation
page read and write
2624C000
trusted library allocation
page read and write
2260000
heap
page read and write
27F00000
trusted library allocation
page read and write
27440000
trusted library allocation
page read and write
27F00000
trusted library allocation
page read and write
24F0000
trusted library allocation
page read and write
251C0000
trusted library allocation
page read and write
2E10000
direct allocation
page read and write
2667D000
trusted library allocation
page read and write
7860000
trusted library allocation
page read and write
253C1000
trusted library allocation
page read and write
251C0000
trusted library allocation
page read and write
2FD8000
heap
page read and write
6EDE000
stack
page read and write
7587000
heap
page read and write
253B9000
trusted library allocation
page read and write
26419000
trusted library allocation
page read and write
4A0000
heap
page read and write
2537C000
trusted library allocation
page read and write
27F00000
trusted library allocation
page read and write
76F0000
trusted library allocation
page read and write
2FB7000
heap
page read and write
27780000
trusted library allocation
page read and write
26561000
trusted library allocation
page read and write
2527E000
trusted library allocation
page read and write
27770000
trusted library allocation
page read and write
25605000
trusted library allocation
page read and write
3A60000
remote allocation
page execute and read and write
27770000
trusted library allocation
page read and write
27F00000
trusted library allocation
page read and write
2625C000
trusted library allocation
page read and write
27420000
trusted library allocation
page read and write
9870000
heap
page read and write
251C0000
trusted library allocation
page read and write
6EF000
stack
page read and write
254BB000
trusted library allocation
page read and write
9840000
direct allocation
page read and write
8920000
direct allocation
page execute and read and write
8390000
heap
page read and write
27770000
trusted library allocation
page read and write
211E000
stack
page read and write
251C0000
trusted library allocation
page read and write
9620000
direct allocation
page read and write
2210000
heap
page read and write
2F90000
trusted library allocation
page read and write
286A000
heap
page read and write
27F10000
trusted library allocation
page read and write
3178000
trusted library allocation
page read and write
25380000
trusted library allocation
page read and write
251C0000
trusted library allocation
page read and write
251C0000
trusted library allocation
page read and write
251C0000
trusted library allocation
page read and write
7570000
heap
page read and write
251C0000
trusted library allocation
page read and write
2410000
heap
page read and write
6E9E000
stack
page read and write
2F60000
trusted library allocation
page read and write
26589000
trusted library allocation
page read and write
24E40000
remote allocation
page read and write
25282000
trusted library allocation
page read and write
7641000
heap
page read and write
25286000
trusted library allocation
page read and write
2F30000
trusted library section
page read and write
7840000
trusted library allocation
page read and write
27770000
trusted library allocation
page read and write
24B2F000
stack
page read and write
2E50000
direct allocation
page read and write
27F00000
trusted library allocation
page read and write
274BF000
heap
page read and write
251C0000
trusted library allocation
page read and write
27770000
trusted library allocation
page read and write
251C0000
trusted library allocation
page read and write
282A0000
trusted library allocation
page read and write
2542C000
trusted library allocation
page read and write
24F2B000
stack
page read and write
251C0000
trusted library allocation
page read and write
2EB0000
direct allocation
page read and write
882C000
stack
page read and write
27F00000
trusted library allocation
page read and write
8607000
heap
page read and write
274CB000
heap
page read and write
25292000
trusted library allocation
page read and write
27440000
trusted library allocation
page read and write
27440000
trusted library allocation
page read and write
251C0000
trusted library allocation
page read and write
9810000
direct allocation
page read and write
8900000
trusted library allocation
page execute and read and write
27F00000
trusted library allocation
page read and write
96BB000
heap
page read and write
6F35000
heap
page execute and read and write
254C7000
trusted library allocation
page read and write
77AF000
stack
page read and write
25190000
heap
page read and write
25186000
trusted library allocation
page read and write
251C0000
trusted library allocation
page read and write
251C0000
trusted library allocation
page read and write
251C1000
trusted library allocation
page read and write
26596000
trusted library allocation
page read and write
27F00000
trusted library allocation
page read and write
28040000
trusted library allocation
page read and write
27F00000
trusted library allocation
page read and write
27F00000
trusted library allocation
page read and write
743F000
stack
page read and write
97AF000
stack
page read and write
27420000
trusted library allocation
page read and write
2505000
trusted library allocation
page execute and read and write
2538E000
trusted library allocation
page read and write
7900000
trusted library allocation
page read and write
27440000
trusted library allocation
page read and write
2175000
heap
page read and write
251C0000
trusted library allocation
page read and write
27440000
trusted library allocation
page read and write
26540000
trusted library allocation
page read and write
27770000
trusted library allocation
page read and write
26253000
trusted library allocation
page read and write
27F30000
trusted library allocation
page read and write
27770000
trusted library allocation
page read and write
2545F000
trusted library allocation
page read and write
251C0000
trusted library allocation
page read and write
25357000
trusted library allocation
page read and write
27F00000
trusted library allocation
page read and write
27770000
trusted library allocation
page read and write
27F00000
trusted library allocation
page read and write
250B000
trusted library allocation
page execute and read and write
27F00000
trusted library allocation
page read and write
27770000
trusted library allocation
page read and write
24ED0000
direct allocation
page read and write
27440000
trusted library allocation
page read and write
4DEE000
stack
page read and write
2F00000
heap
page read and write
251C0000
trusted library allocation
page read and write
24C0000
trusted library allocation
page read and write
274FF000
heap
page read and write
252C4000
trusted library allocation
page read and write
27420000
trusted library allocation
page read and write
27F00000
trusted library allocation
page read and write
776E000
stack
page read and write
2F80000
trusted library allocation
page read and write
251A0000
trusted library allocation
page read and write
2538C000
trusted library allocation
page read and write
27F00000
trusted library allocation
page read and write
9850000
direct allocation
page read and write
2539B000
trusted library allocation
page read and write
27F00000
trusted library allocation
page read and write
27F00000
trusted library allocation
page read and write
400000
unkown
page readonly
2E00000
direct allocation
page read and write
251C0000
trusted library allocation
page read and write
97E0000
direct allocation
page read and write
251C0000
trusted library allocation
page read and write
732000
heap
page read and write
2E20000
direct allocation
page read and write
27F00000
trusted library allocation
page read and write
42A000
unkown
page read and write
27F30000
trusted library allocation
page read and write
448000
unkown
page readonly
7647000
heap
page read and write
7890000
trusted library allocation
page read and write
78A0000
trusted library allocation
page read and write
822B000
remote allocation
page execute and read and write
6FE000
heap
page read and write
24E0000
trusted library allocation
page read and write
7667000
heap
page read and write
27440000
trusted library allocation
page read and write
9820000
direct allocation
page read and write
5FCC000
trusted library allocation
page read and write
27F30000
trusted library allocation
page read and write
9630000
heap
page read and write
6E5F000
stack
page read and write
6F50000
direct allocation
page read and write
2524D000
trusted library allocation
page read and write
251C0000
trusted library allocation
page read and write
251C0000
trusted library allocation
page read and write
27F00000
trusted library allocation
page read and write
27F10000
trusted library allocation
page read and write
2414000
heap
page read and write
271E0000
trusted library allocation
page read and write
252E3000
trusted library allocation
page read and write
28040000
trusted library allocation
page read and write
2744D000
trusted library allocation
page read and write
285F000
stack
page read and write
7680000
heap
page execute and read and write
27F30000
trusted library allocation
page read and write
28040000
trusted library allocation
page read and write
409000
unkown
page write copy
5579000
trusted library allocation
page read and write
55D6000
trusted library allocation
page read and write
2510000
trusted library allocation
page execute and read and write
251C0000
trusted library allocation
page read and write
2623E000
trusted library allocation
page read and write
251C0000
trusted library allocation
page read and write
27434000
trusted library allocation
page read and write
251D0000
heap
page execute and read and write
27420000
trusted library allocation
page read and write
27200000
trusted library allocation
page read and write
2F64000
trusted library allocation
page read and write
27440000
trusted library allocation
page read and write
5E29000
trusted library allocation
page read and write
2FD0000
heap
page read and write
2F56000
heap
page read and write
2502000
trusted library allocation
page read and write
92E000
stack
page read and write
251C0000
trusted library allocation
page read and write
28040000
trusted library allocation
page read and write
27770000
trusted library allocation
page read and write
251C0000
trusted library allocation
page read and write
78E0000
trusted library allocation
page read and write
27440000
trusted library allocation
page read and write
2544C000
trusted library allocation
page read and write
251C0000
trusted library allocation
page read and write
8300000
trusted library allocation
page read and write
28040000
trusted library allocation
page read and write
271F0000
trusted library allocation
page read and write
27F00000
trusted library allocation
page read and write
251C0000
trusted library allocation
page read and write
263A7000
trusted library allocation
page read and write
407000
unkown
page readonly
8580000
heap
page read and write
27770000
trusted library allocation
page read and write
4E10000
heap
page execute and read and write
251C0000
trusted library allocation
page read and write
27770000
trusted library allocation
page read and write
2656C000
trusted library allocation
page read and write
251C0000
trusted library allocation
page read and write
9638000
heap
page read and write
27440000
trusted library allocation
page read and write
462B000
remote allocation
page execute and read and write
27F30000
trusted library allocation
page read and write
251C0000
trusted library allocation
page read and write
759000
heap
page read and write
42E000
unkown
page read and write
27420000
trusted library allocation
page read and write
251C0000
trusted library allocation
page read and write
7597000
heap
page read and write
82D7000
stack
page read and write
28040000
trusted library allocation
page read and write
2634A000
trusted library allocation
page read and write
253CC000
trusted library allocation
page read and write
251C0000
trusted library allocation
page read and write
265E2000
trusted library allocation
page read and write
27E7E000
stack
page read and write
886C000
stack
page read and write
282B0000
trusted library allocation
page read and write
26201000
trusted library allocation
page read and write
27F00000
trusted library allocation
page read and write
27450000
heap
page execute and read and write
251C0000
trusted library allocation
page read and write
26578000
trusted library allocation
page read and write
261E1000
trusted library allocation
page read and write
251C0000
trusted library allocation
page read and write
27770000
trusted library allocation
page read and write
27F00000
trusted library allocation
page read and write
5FB3000
trusted library allocation
page read and write
25E0000
heap
page read and write
73FE000
stack
page read and write
736000
heap
page read and write
27440000
trusted library allocation
page read and write
24D2E000
stack
page read and write
251C0000
trusted library allocation
page read and write
97B0000
direct allocation
page read and write
7830000
trusted library allocation
page execute and read and write
27D7E000
stack
page read and write
251C0000
trusted library allocation
page read and write
28040000
trusted library allocation
page read and write
27F00000
trusted library allocation
page read and write
4E82000
trusted library allocation
page read and write
2F63000
trusted library allocation
page execute and read and write
55B1000
trusted library allocation
page read and write
407000
unkown
page readonly
2E90000
direct allocation
page read and write
55D0000
trusted library allocation
page read and write
7630000
heap
page read and write
8480000
trusted library allocation
page read and write
274CB000
heap
page read and write
27770000
trusted library allocation
page read and write
27430000
trusted library allocation
page read and write
B05B000
direct allocation
page execute and read and write
25454000
trusted library allocation
page read and write
24E40000
remote allocation
page read and write
5E21000
trusted library allocation
page read and write
2626A000
trusted library allocation
page read and write
24BAF000
stack
page read and write
27770000
trusted library allocation
page read and write
254CE000
trusted library allocation
page read and write
510000
heap
page read and write
27F00000
trusted library allocation
page read and write
7472000
heap
page read and write
27F10000
trusted library allocation
page read and write
2775D000
stack
page read and write
760A000
heap
page read and write
40B000
unkown
page read and write
2642E000
trusted library allocation
page read and write
A65B000
direct allocation
page execute and read and write
263FD000
trusted library allocation
page read and write
28040000
trusted library allocation
page read and write
27F00000
trusted library allocation
page read and write
282A0000
trusted library allocation
page read and write
253BF000
trusted library allocation
page read and write
2179000
heap
page read and write
27F30000
trusted library allocation
page read and write
27F00000
trusted library allocation
page read and write
251C0000
trusted library allocation
page read and write
3C2B000
remote allocation
page execute and read and write
7850000
trusted library allocation
page read and write
27F00000
trusted library allocation
page read and write
2727F000
stack
page read and write
409000
unkown
page read and write
27770000
trusted library allocation
page read and write
266A8000
trusted library allocation
page read and write
251C0000
trusted library allocation
page read and write
4D6E000
stack
page read and write
280B0000
trusted library allocation
page read and write
4B0000
heap
page read and write
250A8000
trusted library allocation
page read and write
24D4000
trusted library allocation
page read and write
25242000
trusted library allocation
page read and write
D85B000
direct allocation
page execute and read and write
274FF000
heap
page read and write
251C0000
trusted library allocation
page read and write
251C0000
trusted library allocation
page read and write
251C0000
trusted library allocation
page read and write
27F00000
trusted library allocation
page read and write
27F00000
trusted library allocation
page read and write
27F00000
trusted library allocation
page read and write
251C0000
trusted library allocation
page read and write
27440000
trusted library allocation
page read and write
251C0000
trusted library allocation
page read and write
25000000
heap
page read and write
27F00000
trusted library allocation
page read and write
27F00000
trusted library allocation
page read and write
5595000
trusted library allocation
page read and write
251C0000
trusted library allocation
page read and write
2E40000
direct allocation
page read and write
251C0000
trusted library allocation
page read and write
253C7000
trusted library allocation
page read and write
271E0000
trusted library allocation
page read and write
27F00000
trusted library allocation
page read and write
27F00000
trusted library allocation
page read and write
860D000
heap
page read and write
271E0000
trusted library allocation
page read and write
251C0000
trusted library allocation
page read and write
24EBF000
stack
page read and write
837D000
stack
page read and write
251C0000
trusted library allocation
page read and write
251C0000
trusted library allocation
page read and write
27440000
trusted library allocation
page read and write
27770000
trusted library allocation
page read and write
6F30000
heap
page execute and read and write
251C0000
trusted library allocation
page read and write
251C0000
trusted library allocation
page read and write
83F0000
trusted library allocation
page read and write
251C0000
trusted library allocation
page read and write
27495000
heap
page read and write
78C0000
trusted library allocation
page read and write
4FE000
stack
page read and write
280C0000
trusted library allocation
page read and write
27440000
trusted library allocation
page read and write
A08000
stack
page read and write
5A2B000
remote allocation
page execute and read and write
251C0000
trusted library allocation
page read and write
251C0000
trusted library allocation
page read and write
27770000
trusted library allocation
page read and write
251C0000
trusted library allocation
page read and write
72D8000
heap
page read and write
261E5000
trusted library allocation
page read and write
7EE70000
trusted library allocation
page execute and read and write
27440000
trusted library allocation
page read and write
401000
unkown
page execute read
642B000
remote allocation
page execute and read and write
2500000
trusted library allocation
page read and write
251C0000
trusted library allocation
page read and write
251C0000
trusted library allocation
page read and write
4CCC000
stack
page read and write
27440000
trusted library allocation
page read and write
27770000
trusted library allocation
page read and write
27770000
trusted library allocation
page read and write
27430000
trusted library allocation
page read and write
2590000
heap
page read and write
28040000
trusted library allocation
page read and write
28060000
trusted library allocation
page read and write
2F20000
trusted library section
page read and write
262D5000
trusted library allocation
page read and write
73E000
heap
page read and write
27440000
trusted library allocation
page read and write
27F00000
trusted library allocation
page read and write
271E6000
trusted library allocation
page read and write
264A3000
trusted library allocation
page read and write
96F5000
heap
page read and write
24C2C000
stack
page read and write
96B0000
heap
page read and write
3190000
trusted library allocation
page execute and read and write
25090000
heap
page read and write
27F00000
trusted library allocation
page read and write
27F00000
trusted library allocation
page read and write
6F40000
direct allocation
page read and write
761F000
heap
page read and write
251C0000
trusted library allocation
page read and write
25245000
trusted library allocation
page read and write
27F00000
trusted library allocation
page read and write
251C0000
trusted library allocation
page read and write
251C0000
trusted library allocation
page read and write
28060000
trusted library allocation
page execute and read and write
251C0000
trusted library allocation
page read and write
27430000
trusted library allocation
page read and write
27F40000
trusted library allocation
page execute and read and write
27440000
trusted library allocation
page read and write
27F00000
trusted library allocation
page read and write
2545B000
trusted library allocation
page read and write
27440000
trusted library allocation
page read and write
27F00000
trusted library allocation
page read and write
4D0E000
stack
page read and write
27F00000
trusted library allocation
page read and write
251C0000
trusted library allocation
page read and write
27420000
trusted library allocation
page read and write
27F00000
trusted library allocation
page read and write
27440000
trusted library allocation
page read and write
6E2B000
remote allocation
page execute and read and write
251C0000
trusted library allocation
page read and write
312E000
stack
page read and write
251C0000
trusted library allocation
page read and write
27780000
trusted library allocation
page read and write
7710000
trusted library allocation
page read and write
27F00000
trusted library allocation
page read and write
24DAD000
stack
page read and write
88F0000
heap
page read and write
25390000
trusted library allocation
page read and write
263F9000
trusted library allocation
page read and write
BA5B000
direct allocation
page execute and read and write
274EF000
heap
page read and write
251C0000
trusted library allocation
page read and write
254AE000
trusted library allocation
page read and write
25452000
trusted library allocation
page read and write
30D0000
heap
page readonly
2522B000
trusted library allocation
page read and write
27420000
trusted library allocation
page read and write
27F00000
trusted library allocation
page read and write
2648D000
trusted library allocation
page read and write
24DD000
trusted library allocation
page execute and read and write
9CC000
stack
page read and write
27F10000
trusted library allocation
page read and write
265F8000
trusted library allocation
page read and write
2597000
heap
page read and write
24FAE000
stack
page read and write
27440000
trusted library allocation
page read and write
24CCF000
stack
page read and write
27770000
trusted library allocation
page read and write
55A8000
trusted library allocation
page read and write
2F8A000
trusted library allocation
page execute and read and write
251C0000
trusted library allocation
page read and write
271E0000
trusted library allocation
page read and write
27F00000
trusted library allocation
page read and write
27440000
trusted library allocation
page read and write
27440000
trusted library allocation
page read and write
251C0000
trusted library allocation
page read and write
82E0000
heap
page read and write
28040000
trusted library allocation
page read and write
27770000
trusted library allocation
page read and write
26262000
trusted library allocation
page read and write
27770000
trusted library allocation
page read and write
282B0000
trusted library allocation
page read and write
8380000
heap
page read and write
251C0000
trusted library allocation
page read and write
251C0000
trusted library allocation
page read and write
27770000
trusted library allocation
page read and write
27F00000
trusted library allocation
page read and write
8420000
trusted library allocation
page read and write
271E0000
trusted library allocation
page read and write
2528A000
trusted library allocation
page read and write
5FC6000
trusted library allocation
page read and write
251C0000
trusted library allocation
page read and write
276DE000
stack
page read and write
251C0000
trusted library allocation
page read and write
27F00000
trusted library allocation
page read and write
27F0F000
trusted library allocation
page read and write
251C0000
trusted library allocation
page read and write
252C2000
trusted library allocation
page read and write
24C40000
trusted library allocation
page read and write
251C0000
trusted library allocation
page read and write
27F00000
trusted library allocation
page read and write
2580000
heap
page read and write
26209000
trusted library allocation
page read and write
27F00000
trusted library allocation
page read and write
6FA000
heap
page read and write
24FA000
trusted library allocation
page execute and read and write
261F4000
trusted library allocation
page read and write
25296000
trusted library allocation
page read and write
251C0000
trusted library allocation
page read and write
426000
unkown
page read and write
2EA0000
direct allocation
page read and write
271E0000
trusted library allocation
page read and write
27770000
trusted library allocation
page read and write
19A000
stack
page read and write
27F00000
trusted library allocation
page read and write
28040000
trusted library allocation
page read and write
251C0000
trusted library allocation
page read and write
8C2B000
remote allocation
page execute and read and write
27F00000
trusted library allocation
page read and write
253BD000
trusted library allocation
page read and write
4DAF000
stack
page read and write
251B0000
trusted library allocation
page read and write
263BC000
trusted library allocation
page read and write
5E49000
trusted library allocation
page read and write
976D000
stack
page read and write
2528E000
trusted library allocation
page read and write
216E000
stack
page read and write
27F00000
trusted library allocation
page read and write
2802E000
stack
page read and write
27E3E000
stack
page read and write
7700000
trusted library allocation
page read and write
280A0000
trusted library allocation
page read and write
8930000
trusted library allocation
page read and write
251C0000
trusted library allocation
page read and write
28050000
trusted library allocation
page read and write
27F00000
trusted library allocation
page read and write
251C0000
trusted library allocation
page read and write
251C0000
trusted library allocation
page read and write
27770000
trusted library allocation
page read and write
3008000
heap
page read and write
251C0000
trusted library allocation
page read and write
25144000
trusted library allocation
page read and write
27770000
trusted library allocation
page read and write
261FB000
trusted library allocation
page read and write
28040000
trusted library allocation
page read and write
31A8000
heap
page read and write
26256000
trusted library allocation
page read and write
251B0000
trusted library allocation
page read and write
27F30000
trusted library allocation
page read and write
27420000
trusted library allocation
page read and write
266AB000
trusted library allocation
page read and write
271E0000
trusted library allocation
page read and write
27F00000
trusted library allocation
page read and write
26246000
trusted library allocation
page read and write
5570000
trusted library allocation
page read and write
4F76000
trusted library allocation
page read and write
7617000
heap
page read and write
861E000
heap
page read and write
28040000
trusted library allocation
page read and write
24DEE000
stack
page read and write
24E40000
remote allocation
page read and write
27F00000
trusted library allocation
page read and write
280A2000
trusted library allocation
page read and write
27F00000
trusted library allocation
page read and write
251C0000
trusted library allocation
page read and write
27F00000
trusted library allocation
page read and write
76A0000
trusted library allocation
page read and write
27440000
trusted library allocation
page read and write
2F70000
trusted library allocation
page read and write
82F0000
trusted library allocation
page execute and read and write
27440000
trusted library allocation
page read and write
26314000
trusted library allocation
page read and write
251C0000
trusted library allocation
page read and write
8310000
trusted library allocation
page read and write
251C0000
trusted library allocation
page read and write
251C0000
trusted library allocation
page read and write
27440000
trusted library allocation
page read and write
2508E000
stack
page read and write
251C0000
trusted library allocation
page read and write
98000
stack
page read and write
9830000
direct allocation
page read and write
25487000
trusted library allocation
page read and write
28040000
trusted library allocation
page read and write
2597000
heap
page read and write
78B0000
trusted library allocation
page read and write
72C0000
heap
page read and write
251C0000
trusted library allocation
page read and write
2BD0000
heap
page read and write
2666A000
trusted library allocation
page read and write
27770000
trusted library allocation
page read and write
968E000
heap
page read and write
27436000
trusted library allocation
page read and write
2E60000
direct allocation
page read and write
27F00000
trusted library allocation
page read and write
558C000
trusted library allocation
page read and write
24D3000
trusted library allocation
page execute and read and write
250A0000
trusted library allocation
page read and write
24F67000
stack
page read and write
2170000
heap
page read and write
2E70000
direct allocation
page read and write
27F00000
trusted library allocation
page read and write
24AEE000
stack
page read and write
2200000
heap
page read and write
27F00000
trusted library allocation
page read and write
782B000
remote allocation
page execute and read and write
251C0000
trusted library allocation
page read and write
251C0000
trusted library allocation
page read and write
251C0000
trusted library allocation
page read and write
27F40000
trusted library allocation
page read and write
262BF000
trusted library allocation
page read and write
251C1000
trusted library allocation
page read and write
27F00000
trusted library allocation
page read and write
27F00000
trusted library allocation
page read and write
251C0000
trusted library allocation
page read and write
25251000
trusted library allocation
page read and write
262E8000
trusted library allocation
page read and write
27440000
trusted library allocation
page read and write
251C0000
trusted library allocation
page read and write
98B0000
heap
page read and write
24D0000
trusted library allocation
page read and write
251C0000
trusted library allocation
page read and write
27770000
trusted library allocation
page read and write
251C0000
trusted library allocation
page read and write
251C0000
trusted library allocation
page read and write
25255000
trusted library allocation
page read and write
401000
unkown
page execute read
960E000
stack
page read and write
25456000
trusted library allocation
page read and write
73A000
heap
page read and write
2F6D000
trusted library allocation
page execute and read and write
27DBE000
stack
page read and write
9610000
heap
page readonly
251C0000
trusted library allocation
page read and write
6F0000
heap
page read and write
27440000
trusted library allocation
page read and write
448000
unkown
page readonly
28040000
trusted library allocation
page read and write
24BED000
stack
page read and write
25388000
trusted library allocation
page read and write
83E0000
trusted library allocation
page execute and read and write
27F10000
trusted library allocation
page execute and read and write
27770000
trusted library allocation
page read and write
251C0000
trusted library allocation
page read and write
28054000
trusted library allocation
page read and write
303C000
heap
page read and write
25396000
trusted library allocation
page read and write
2F50000
heap
page read and write
97F0000
direct allocation
page read and write
27321000
heap
page read and write
251C0000
trusted library allocation
page read and write
27440000
trusted library allocation
page read and write
27440000
trusted library allocation
page read and write
C45B000
direct allocation
page execute and read and write
251C0000
trusted library allocation
page read and write
26573000
trusted library allocation
page read and write
27420000
trusted library allocation
page read and write
251C0000
trusted library allocation
page read and write
24C8E000
stack
page read and write
251C0000
trusted library allocation
page read and write
753000
heap
page read and write
251C0000
trusted library allocation
page read and write
E25B000
direct allocation
page execute and read and write
9800000
direct allocation
page read and write
27770000
trusted library allocation
page read and write
7880000
trusted library allocation
page read and write
264E9000
trusted library allocation
page read and write
27F00000
trusted library allocation
page read and write
27F00000
trusted library allocation
page read and write
7670000
trusted library allocation
page read and write
27770000
trusted library allocation
page read and write
27440000
trusted library allocation
page read and write
27420000
trusted library allocation
page read and write
2529A000
trusted library allocation
page read and write
251C0000
trusted library allocation
page read and write
434000
unkown
page read and write
251C0000
trusted library allocation
page read and write
9702000
heap
page read and write
27F00000
trusted library allocation
page read and write
251C0000
trusted library allocation
page read and write
CE5B000
direct allocation
page execute and read and write
27F00000
trusted library allocation
page read and write
27F20000
trusted library allocation
page read and write
27F30000
trusted library allocation
page read and write
271E0000
trusted library allocation
page read and write
8565000
trusted library allocation
page read and write
24D6F000
stack
page read and write
25DE000
stack
page read and write
2F92000
trusted library allocation
page read and write
27F30000
trusted library allocation
page read and write
5E87000
trusted library allocation
page read and write
27F00000
trusted library allocation
page read and write
251C0000
trusted library allocation
page read and write
26264000
trusted library allocation
page read and write
76E0000
trusted library allocation
page read and write
251C0000
trusted library allocation
page read and write
251C0000
trusted library allocation
page read and write
27F00000
trusted library allocation
page read and write
27780000
trusted library allocation
page execute and read and write
27420000
trusted library allocation
page read and write
28040000
trusted library allocation
page read and write
24B6D000
stack
page read and write
27420000
trusted library allocation
page read and write
25237000
trusted library allocation
page read and write
28076000
trusted library allocation
page read and write
254CA000
trusted library allocation
page read and write
274C2000
heap
page read and write
27F00000
trusted library allocation
page read and write
27FA0000
trusted library allocation
page read and write
27760000
trusted library allocation
page execute and read and write
8570000
heap
page read and write
27F30000
trusted library allocation
page read and write
251C0000
trusted library allocation
page read and write
794B000
stack
page read and write
8910000
trusted library allocation
page execute and read and write
251C0000
trusted library allocation
page read and write
2504C000
stack
page read and write
27320000
heap
page read and write
31A0000
heap
page read and write
28030000
heap
page read and write
251C0000
trusted library allocation
page read and write
27770000
trusted library allocation
page read and write
27420000
trusted library allocation
page read and write
254C4000
trusted library allocation
page read and write
96BE000
heap
page read and write
9C5B000
direct allocation
page execute and read and write
27F00000
trusted library allocation
page read and write
27770000
trusted library allocation
page read and write
251C0000
trusted library allocation
page read and write
26655000
trusted library allocation
page read and write
27770000
trusted library allocation
page read and write
251C0000
trusted library allocation
page read and write
2507000
trusted library allocation
page execute and read and write
2E30000
direct allocation
page read and write
4E21000
trusted library allocation
page read and write
421000
unkown
page read and write
2657D000
trusted library allocation
page read and write
251C0000
trusted library allocation
page read and write
2F95000
trusted library allocation
page execute and read and write
97D0000
direct allocation
page read and write
27F00000
trusted library allocation
page read and write
78D0000
trusted library allocation
page read and write
27F00000
trusted library allocation
page read and write
28050000
trusted library allocation
page read and write
82E000
stack
page read and write
27440000
trusted library allocation
page read and write
27F30000
trusted library allocation
page read and write
8470000
trusted library allocation
page read and write
27FEE000
stack
page read and write
27F00000
trusted library allocation
page read and write
27F00000
trusted library allocation
page read and write
236E000
stack
page read and write
251C0000
trusted library allocation
page read and write
27420000
trusted library allocation
page read and write
27770000
trusted library allocation
page read and write
2E80000
direct allocation
page read and write
2F79000
trusted library allocation
page read and write
444000
unkown
page read and write
263CF000
trusted library allocation
page read and write
271E0000
trusted library allocation
page read and write
27440000
trusted library allocation
page read and write
27F10000
trusted library allocation
page read and write
251C0000
trusted library allocation
page read and write
280A5000
trusted library allocation
page read and write
7870000
trusted library allocation
page read and write
75D5000
heap
page read and write
251C0000
trusted library allocation
page read and write
27321000
heap
page read and write
28050000
trusted library allocation
page read and write
27440000
trusted library allocation
page read and write
27F00000
trusted library allocation
page read and write
2595000
heap
page read and write
2654D000
trusted library allocation
page read and write
271E0000
trusted library allocation
page read and write
280C0000
trusted library allocation
page read and write
24F6000
trusted library allocation
page execute and read and write
83DE000
stack
page read and write
251C0000
trusted library allocation
page read and write
2625F000
trusted library allocation
page read and write
27EFF000
stack
page read and write
28040000
trusted library allocation
page read and write
27770000
trusted library allocation
page read and write
2FB0000
heap
page read and write
8410000
trusted library allocation
page read and write
9090000
direct allocation
page execute and read and write
251C0000
trusted library allocation
page read and write
77EE000
stack
page read and write
502B000
remote allocation
page execute and read and write
There are 835 hidden memdumps, click here to show them.