IOC Report
66dcad8f5f33a_crypted.exe

loading gif

Files

File Path
Type
Category
Malicious
66dcad8f5f33a_crypted.exe
PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
initial sample
malicious
C:\ProgramData\Path\Path.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\66dcad8f5f33a_crypted.exe.log
ASCII text, with CRLF line terminators
dropped
malicious
C:\Users\user\AppData\Local\Temp\filename.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\ProgramData\Path\SjWVsguZ-OtOFt52U.log
ASCII text, with no line terminators
dropped
C:\Users\Public\Desktop\Google Chrome.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Description string, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:41 2023, mtime=Thu Oct 5 06:54:42 2023, atime=Wed Sep 27 08:36:54 2023, length=3242272, window=hide
dropped
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\Path.exe.log
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\RegAsm.exe.log
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\TmpECBC.tmp
data
dropped
C:\Users\user\AppData\Local\Temp\TmpECCC.tmp
data
dropped
C:\Users\user\AppData\Roaming\Microsoft\Crypto\RSA\S-1-5-21-2246122658-3693405117-2476756634-1003\76b53b3ec448f7ccdda2063b15d2bfc3_9e146be9-c76a-4720-bcdb-53011b87bd06
data
dropped
\Device\Null
ASCII text, with CRLF line terminators, with overstriking
dropped
There are 2 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\66dcad8f5f33a_crypted.exe
"C:\Users\user\Desktop\66dcad8f5f33a_crypted.exe"
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
malicious
C:\Users\user\AppData\Local\Temp\filename.exe
"C:\Users\user~1\AppData\Local\Temp\filename.exe"
malicious
C:\ProgramData\Path\Path.exe
"C:\ProgramData\Path\Path.exe"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\cmd.exe
C:\Windows\system32\cmd.exe /c ""C:\Users\user\AppData\Local\Temp\tmp5445.tmp.cmd""
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\timeout.exe
timeout 6

URLs

Name
IP
Malicious
http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-soap-message-security-1.0#Text
unknown
http://schemas.xmlsoap.org/ws/2005/02/sc/sct
unknown
http://schemas.xmlsoap.org/ws/2004/04/security/sc/dk
unknown
http://tempuri.org/Entity/Id14ResponseD
unknown
http://tempuri.org/Entity/Id23ResponseD
unknown
http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-soap-message-security-1.0#HexBinary
unknown
http://tempuri.org/Entity/Id12Response
unknown
http://tempuri.org/
unknown
http://tempuri.org/Entity/Id2Response
unknown
http://schemas.xmlsoap.org/ws/2005/02/sc/dk/p_sha1
unknown
http://tempuri.org/Entity/Id21Response
unknown
http://schemas.xmlsoap.org/2005/02/trust/spnego#GSS_Wrap
unknown
http://tempuri.org/Entity/Id9
unknown
http://docs.oasis-open.org/wss/oasis-wss-saml-token-profile-1.1#SAMLID
unknown
http://tempuri.org/Entity/Id8
unknown
http://tempuri.org/Entity/Id6ResponseD
unknown
http://tempuri.org/Entity/Id5
unknown
http://schemas.xmlsoap.org/ws/2004/10/wsat/Prepare
unknown
http://tempuri.org/Entity/Id4
unknown
http://tempuri.org/Entity/Id7
unknown
http://tempuri.org/Entity/Id6
unknown
http://schemas.xmlsoap.org/ws/2005/02/trust#BinarySecret
unknown
http://tempuri.org/Entity/Id19Response
unknown
http://tempuri.org/Entity/Id24ResponseD
unknown
http://docs.oasis-open.org/wss/oasis-wss-rel-token-profile-1.0.pdf#license
unknown
http://schemas.xmlsoap.org/ws/2005/02/trust/RSTR/Issue
unknown
http://schemas.xmlsoap.org/ws/2004/10/wsat/Aborted
unknown
http://schemas.xmlsoap.org/ws/2005/02/rm/TerminateSequence
unknown
http://tempuri.org/Entity/Id13ResponseD
unknown
http://schemas.xmlsoap.org/ws/2004/10/wsat/fault
unknown
http://schemas.xmlsoap.org/ws/2004/10/wsat
unknown
http://docs.oasis-open.org/wss/oasis-wss-soap-message-security-1.1#EncryptedKey
unknown
http://tempuri.org/Entity/Id15Response
unknown
http://tempuri.org/Entity/Id5ResponseD
unknown
http://api.telegram.orgd
unknown
https://api.telegram.org/bot7519321746:AAGYAZdkHTqE4LvUc5fDNQGiIRvfmzNMLzk/sendDocumentT
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
http://schemas.xmlsoap.org/ws/2005/02/trust/RSTR/SCT/Renew
unknown
http://schemas.xmlsoap.org/ws/2004/08/addressing/faultp9
unknown
http://schemas.xmlsoap.org/ws/2004/10/wscoor/Register
unknown
https://api.telegram.org/bot7519321746:AAGYAZdkHTqE4LvUc5fDNQGiIRvfmzNMLzk/sendDocument
149.154.167.220
http://tempuri.org/Entity/Id6Response
unknown
http://schemas.xmlsoap.org/ws/2004/04/trust/SymmetricKey
unknown
https://api.ip.sb/ip
unknown
http://schemas.xmlsoap.org/ws/2004/04/sc
unknown
http://tempuri.org/Entity/Id1ResponseD
unknown
http://schemas.xmlsoap.org/ws/2004/10/wsat/Volatile2PC
unknown
http://schemas.xmlsoap.org/ws/2005/02/trust/RSTR/SCT/Cancel
unknown
http://tempuri.org/Entity/Id9Response
unknown
http://tempuri.org/Entity/Id20
unknown
http://tempuri.org/Entity/Id21
unknown
http://pastebin.comd
unknown
http://tempuri.org/Entity/Id22
unknown
http://docs.oasis-open.org/wss/oasis-wss-kerberos-token-profile-1.1#Kerberosv5APREQSHA1
unknown
http://tempuri.org/Entity/Id23
unknown
http://schemas.xmlsoap.org/ws/2004/04/security/trust/CK/PSHA1
unknown
http://tempuri.org/Entity/Id24
unknown
http://schemas.xmlsoap.org/ws/2004/04/security/trust/RSTR/Issue
unknown
http://tempuri.org/Entity/Id24Response
unknown
http://tempuri.org/Entity/Id1Response
unknown
http://schemas.xmlsoap.org/ws/2005/02/rm/AckRequested
unknown
http://schemas.xmlsoap.org/ws/2004/10/wsat/ReadOnly
unknown
http://schemas.xmlsoap.org/ws/2004/10/wsat/Replay
unknown
http://schemas.xmlsoap.org/ws/2005/02/trust/tlsnego
unknown
http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-soap-message-security-1.0#Base64Binary
unknown
http://schemas.xmlsoap.org/ws/2004/10/wsat/Durable2PC
unknown
http://schemas.xmlsoap.org/ws/2004/04/security/trust/SymmetricKey
unknown
http://tempuri.org/Entity/Id21ResponseD
unknown
http://schemas.xmlsoap.org/ws/2004/08/addressing
unknown
http://schemas.xmlsoap.org/ws/2005/02/trust/RST/Issue
unknown
http://schemas.xmlsoap.org/ws/2004/10/wsat/Completion
unknown
http://schemas.xmlsoap.org/ws/2004/04/trust
unknown
http://tempuri.org/Entity/Id10
unknown
http://tempuri.org/Entity/Id11
unknown
http://tempuri.org/Entity/Id10ResponseD
unknown
http://tempuri.org/Entity/Id12
unknown
http://tempuri.org/Entity/Id16Response
unknown
http://schemas.xmlsoap.org/ws/2004/10/wscoor/CreateCoordinationContextResponse
unknown
http://schemas.xmlsoap.org/ws/2005/02/trust/RST/SCT/Cancel
unknown
http://tempuri.org/Entity/Id13
unknown
http://tempuri.org/Entity/Id14
unknown
http://api.telegram.org
unknown
http://tempuri.org/Entity/Id15
unknown
http://tempuri.org/Entity/Id16
unknown
http://pastebin.com
unknown
http://schemas.xmlsoap.org/ws/2005/02/trust/Nonce
unknown
http://tempuri.org/Entity/Id17
unknown
https://pastebin.com
unknown
http://tempuri.org/Entity/Id18
unknown
http://tempuri.org/Entity/Id5Response
unknown
http://tempuri.org/Entity/Id19
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/dns
unknown
http://smkn2sumbawabesar.sch.id
unknown
http://tempuri.org/Entity/Id15ResponseD
unknown
http://tempuri.org/Entity/Id10Response
unknown
http://schemas.xmlsoap.org/ws/2005/02/trust/Renew
unknown
http://tempuri.org/Entity/Id11ResponseD
unknown
http://tempuri.org/Entity/Id8Response
unknown
https://api.telegram.org
unknown
http://schemas.xmlsoap.org/ws/2004/04/trust/PublicKey
unknown
There are 90 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
smkn2sumbawabesar.sch.id
194.163.35.141
malicious
api.telegram.org
149.154.167.220
malicious
pastebin.com
104.20.4.235
malicious

IPs

IP
Domain
Country
Malicious
5.42.92.222
unknown
Russian Federation
malicious
149.154.167.220
api.telegram.org
United Kingdom
malicious
104.20.4.235
pastebin.com
United States
malicious
194.163.35.141
smkn2sumbawabesar.sch.id
Germany
malicious

Registry

Path
Value
Malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\F1A578C4CB5DE79A370893983FD4DA8B67B2B064
Blob
malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
Owner
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
SessionHash
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
Sequence
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
RegFiles0000
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
RegFilesHash
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegAsm_RASAPI32
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegAsm_RASAPI32
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegAsm_RASAPI32
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegAsm_RASAPI32
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegAsm_RASAPI32
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegAsm_RASAPI32
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegAsm_RASAPI32
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegAsm_RASMANCS
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegAsm_RASMANCS
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegAsm_RASMANCS
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegAsm_RASMANCS
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegAsm_RASMANCS
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegAsm_RASMANCS
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegAsm_RASMANCS
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\filename_RASAPI32
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\filename_RASAPI32
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\filename_RASAPI32
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\filename_RASAPI32
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\filename_RASAPI32
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\filename_RASAPI32
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\filename_RASAPI32
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\filename_RASMANCS
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\filename_RASMANCS
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\filename_RASMANCS
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\filename_RASMANCS
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\filename_RASMANCS
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\filename_RASMANCS
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\filename_RASMANCS
FileDirectory
There are 25 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
402000
remote allocation
page execute and read and write
malicious
2EF7000
trusted library allocation
page read and write
malicious
3E25000
trusted library allocation
page read and write
malicious
4172000
trusted library allocation
page read and write
1351000
heap
page read and write
6FA0000
trusted library allocation
page read and write
16F0000
heap
page execute and read and write
301B000
trusted library allocation
page read and write
1275000
heap
page read and write
5680000
trusted library allocation
page read and write
10A4000
heap
page read and write
42CB000
trusted library allocation
page read and write
15CD000
heap
page read and write
16E0000
trusted library allocation
page read and write
31D7000
trusted library allocation
page read and write
57CE000
stack
page read and write
57D0000
heap
page read and write
8790000
trusted library allocation
page read and write
335D000
trusted library allocation
page read and write
4245000
trusted library allocation
page read and write
40C2000
trusted library allocation
page read and write
53C1000
trusted library allocation
page read and write
16A7000
trusted library allocation
page execute and read and write
2CF0000
trusted library allocation
page read and write
900E000
stack
page read and write
56CC000
stack
page read and write
79A4000
trusted library allocation
page read and write
5646000
trusted library allocation
page read and write
5BAE000
stack
page read and write
5624000
trusted library allocation
page read and write
4024000
trusted library allocation
page read and write
3385000
trusted library allocation
page read and write
432A000
trusted library allocation
page read and write
3372000
trusted library allocation
page read and write
173D000
trusted library allocation
page execute and read and write
320A000
trusted library allocation
page read and write
5370000
trusted library allocation
page execute and read and write
30CB000
trusted library allocation
page read and write
3234000
trusted library allocation
page read and write
77A1000
heap
page read and write
3AC71000
trusted library allocation
page read and write
6A16000
trusted library allocation
page read and write
7852000
heap
page read and write
2FCC000
trusted library allocation
page read and write
2C90000
trusted library allocation
page read and write
7432D000
unkown
page read and write
3762E000
stack
page read and write
3E75000
trusted library allocation
page read and write
7A15000
trusted library allocation
page read and write
3F6F000
trusted library allocation
page read and write
367EE000
stack
page read and write
68D0000
trusted library allocation
page execute and read and write
1414000
trusted library allocation
page read and write
1680000
trusted library allocation
page read and write
F77000
stack
page read and write
1548000
heap
page read and write
31FA000
trusted library allocation
page read and write
3EFE000
trusted library allocation
page read and write
1697000
trusted library allocation
page execute and read and write
69C0000
trusted library allocation
page read and write
400000
remote allocation
page execute and read and write
684E000
stack
page read and write
8FCC000
stack
page read and write
7740000
trusted library allocation
page read and write
1670000
trusted library allocation
page read and write
4260000
trusted library allocation
page read and write
5626000
trusted library allocation
page read and write
5D20000
trusted library allocation
page execute and read and write
5A1E000
stack
page read and write
3E8E000
trusted library allocation
page read and write
4074000
trusted library allocation
page read and write
36DDF000
stack
page read and write
1336000
heap
page read and write
3374000
trusted library allocation
page read and write
51FD000
stack
page read and write
294D000
stack
page read and write
7839000
heap
page read and write
380AE000
stack
page read and write
3EA2000
trusted library allocation
page read and write
33D2000
trusted library allocation
page read and write
2E80000
heap
page read and write
344A000
trusted library allocation
page read and write
55B5000
trusted library allocation
page read and write
2F8C000
heap
page read and write
2FBD000
heap
page read and write
562B000
trusted library allocation
page read and write
29FE000
unkown
page read and write
3020000
heap
page read and write
7760000
heap
page read and write
3355000
trusted library allocation
page read and write
7B1E000
stack
page read and write
2CA7000
trusted library allocation
page execute and read and write
3414000
trusted library allocation
page read and write
2F2F000
stack
page read and write
DE0000
unkown
page readonly
EFB000
stack
page read and write
62CE000
stack
page read and write
77FD000
heap
page read and write
1360000
heap
page read and write
79A0000
trusted library allocation
page read and write
36CDE000
stack
page read and write
3EB4000
trusted library allocation
page read and write
2CAB000
trusted library allocation
page execute and read and write
6A0B000
trusted library allocation
page read and write
2FBD000
heap
page read and write
33E8000
trusted library allocation
page read and write
6E4C000
stack
page read and write
2C7E000
stack
page read and write
5405000
trusted library allocation
page read and write
38471000
trusted library allocation
page read and write
427F000
trusted library allocation
page read and write
2FA6000
trusted library allocation
page read and write
30AD000
trusted library allocation
page read and write
1137000
stack
page read and write
333E000
trusted library allocation
page read and write
3E81000
trusted library allocation
page read and write
5C9E000
stack
page read and write
333A000
trusted library allocation
page read and write
2C96000
trusted library allocation
page execute and read and write
2FBD000
heap
page read and write
40EF000
trusted library allocation
page read and write
12E0000
heap
page read and write
57D8000
heap
page read and write
3077000
trusted library allocation
page read and write
53E0000
trusted library allocation
page read and write
5AE0000
trusted library allocation
page execute and read and write
33BC000
trusted library allocation
page read and write
4082000
trusted library allocation
page read and write
646A000
stack
page read and write
6F8C000
stack
page read and write
348F000
trusted library allocation
page read and write
6C90000
trusted library allocation
page read and write
2E70000
heap
page read and write
6A00000
trusted library allocation
page read and write
40C5000
trusted library allocation
page read and write
2FBD000
heap
page read and write
6A80000
trusted library allocation
page read and write
37E2D000
stack
page read and write
334E000
trusted library allocation
page read and write
3265000
trusted library allocation
page read and write
3FF2000
trusted library allocation
page read and write
69D0000
trusted library allocation
page read and write
7FEE000
stack
page read and write
437000
remote allocation
page execute and read and write
563E000
trusted library allocation
page read and write
1410000
trusted library allocation
page read and write
74326000
unkown
page readonly
4357000
trusted library allocation
page read and write
7A35000
trusted library allocation
page read and write
56C0000
heap
page read and write
2CE0000
trusted library allocation
page execute and read and write
16C0000
trusted library allocation
page read and write
125F000
stack
page read and write
69CA000
trusted library allocation
page read and write
37870000
heap
page read and write
6CA0000
trusted library allocation
page read and write
1413000
trusted library allocation
page execute and read and write
2EEE000
stack
page read and write
3456000
trusted library allocation
page read and write
7796000
heap
page read and write
32E2000
trusted library allocation
page read and write
4E58000
trusted library allocation
page read and write
3F63000
trusted library allocation
page read and write
7FB50000
trusted library allocation
page execute and read and write
7B2F000
trusted library allocation
page read and write
816E000
stack
page read and write
86AE000
stack
page read and write
78AC000
heap
page read and write
311E000
stack
page read and write
5A6F000
stack
page read and write
666E000
stack
page read and write
3010000
heap
page read and write
42AC000
trusted library allocation
page read and write
180C000
stack
page read and write
2D30000
heap
page read and write
3846E000
stack
page read and write
773E000
stack
page read and write
3334000
trusted library allocation
page read and write
5566000
trusted library allocation
page read and write
169A000
trusted library allocation
page execute and read and write
32F3000
trusted library allocation
page read and write
1780000
trusted library allocation
page read and write
3135000
trusted library allocation
page read and write
2FE1000
trusted library allocation
page read and write
3DE71000
trusted library allocation
page read and write
77AA000
heap
page read and write
37DEE000
stack
page read and write
3124000
trusted library allocation
page read and write
327B000
trusted library allocation
page read and write
3666C000
stack
page read and write
2E22000
trusted library allocation
page execute and read and write
2FAE000
heap
page read and write
37F30000
heap
page read and write
2F80000
heap
page read and write
7B9E000
stack
page read and write
3806E000
stack
page read and write
64DD000
stack
page read and write
596E000
stack
page read and write
560C000
stack
page read and write
2C8D000
trusted library allocation
page execute and read and write
2E3E000
stack
page read and write
3380000
heap
page read and write
433B000
trusted library allocation
page read and write
F10000
heap
page read and write
52DE000
stack
page read and write
36860000
heap
page read and write
3D471000
trusted library allocation
page read and write
6A60000
trusted library allocation
page read and write
6A40000
trusted library allocation
page read and write
407F000
trusted library allocation
page read and write
1318000
heap
page read and write
2F99000
trusted library allocation
page read and write
30A4000
trusted library allocation
page read and write
40D2000
trusted library allocation
page read and write
2FAD000
heap
page read and write
3394000
trusted library allocation
page read and write
402B000
trusted library allocation
page read and write
3120000
trusted library allocation
page read and write
566E000
trusted library allocation
page read and write
674E000
stack
page read and write
1320000
heap
page read and write
141D000
trusted library allocation
page execute and read and write
3FE9000
trusted library allocation
page read and write
3E68000
trusted library allocation
page read and write
7A2A000
trusted library allocation
page read and write
1160000
heap
page read and write
53CD000
trusted library allocation
page read and write
3F59000
trusted library allocation
page read and write
3676D000
stack
page read and write
5430000
trusted library allocation
page read and write
40C1000
trusted library allocation
page read and write
5564000
trusted library allocation
page read and write
3488000
trusted library allocation
page read and write
150F000
stack
page read and write
3836E000
stack
page read and write
2DC0000
heap
page read and write
2C80000
trusted library allocation
page read and write
1270000
heap
page read and write
5410000
trusted library allocation
page read and write
5B10000
trusted library allocation
page read and write
305F000
trusted library allocation
page read and write
1660000
trusted library allocation
page read and write
AC0000
unkown
page readonly
339C000
trusted library allocation
page read and write
3FD9000
trusted library allocation
page read and write
5AF8000
trusted library allocation
page read and write
3E83000
trusted library allocation
page read and write
2CC0000
trusted library allocation
page read and write
79B8000
trusted library allocation
page read and write
1425000
heap
page read and write
4274000
trusted library allocation
page read and write
5864000
heap
page read and write
3432000
trusted library allocation
page read and write
33B7000
trusted library allocation
page read and write
4070000
trusted library allocation
page read and write
5895000
heap
page read and write
12F0000
heap
page read and write
3E21000
trusted library allocation
page read and write
152E000
heap
page read and write
2CA0000
trusted library allocation
page read and write
6CC0000
trusted library allocation
page read and write
2FB3000
trusted library allocation
page read and write
7A12000
trusted library allocation
page read and write
2F94000
heap
page read and write
2E51000
trusted library allocation
page read and write
3CA71000
trusted library allocation
page read and write
373AC000
stack
page read and write
3E72000
trusted library allocation
page read and write
30C0000
trusted library allocation
page read and write
3322000
trusted library allocation
page read and write
5570000
trusted library allocation
page read and write
6F90000
trusted library allocation
page read and write
1060000
heap
page read and write
40C7000
trusted library allocation
page read and write
2B7E000
stack
page read and write
42B9000
trusted library allocation
page read and write
5620000
trusted library allocation
page read and write
40DA000
trusted library allocation
page read and write
1092000
heap
page read and write
33F5000
trusted library allocation
page read and write
5660000
trusted library allocation
page read and write
1430000
heap
page read and write
1762000
trusted library allocation
page read and write
40BF000
trusted library allocation
page read and write
37F83000
heap
page read and write
2C3E000
stack
page read and write
407D000
trusted library allocation
page read and write
5812000
heap
page read and write
327E000
trusted library allocation
page read and write
7879000
heap
page read and write
7A40000
trusted library allocation
page read and write
6A70000
trusted library allocation
page read and write
106E000
heap
page read and write
806E000
stack
page read and write
3EAD000
trusted library allocation
page read and write
1877000
heap
page read and write
FF7000
heap
page read and write
3494000
trusted library allocation
page read and write
37F3F000
heap
page read and write
4017000
trusted library allocation
page read and write
1750000
trusted library allocation
page read and write
4087000
trusted library allocation
page read and write
42D5000
trusted library allocation
page read and write
2FAD000
heap
page read and write
3141000
trusted library allocation
page read and write
2FED000
trusted library allocation
page read and write
374AB000
stack
page read and write
4079000
trusted library allocation
page read and write
78C8000
heap
page read and write
3F93000
trusted library allocation
page read and write
36C9D000
stack
page read and write
5670000
trusted library allocation
page read and write
69C8000
trusted library allocation
page read and write
5581000
trusted library allocation
page read and write
430B000
trusted library allocation
page read and write
142E000
heap
page read and write
3349000
trusted library allocation
page read and write
3C071000
trusted library allocation
page read and write
31D1000
trusted library allocation
page read and write
3822E000
stack
page read and write
2BF0000
heap
page read and write
405C000
trusted library allocation
page read and write
2FBF000
heap
page read and write
52DE000
stack
page read and write
1240000
heap
page read and write
5C5F000
stack
page read and write
37886000
heap
page read and write
100B000
heap
page read and write
2FBD000
heap
page read and write
1344000
heap
page read and write
40A9000
trusted library allocation
page read and write
3403000
trusted library allocation
page read and write
14FD000
stack
page read and write
37881000
heap
page read and write
60F7000
heap
page read and write
789C000
heap
page read and write
50FC000
stack
page read and write
35809000
trusted library allocation
page read and write
6A90000
trusted library allocation
page read and write
42C2000
trusted library allocation
page read and write
33CD000
trusted library allocation
page read and write
5492000
trusted library allocation
page read and write
1100000
heap
page read and write
2D10000
heap
page read and write
320E000
trusted library allocation
page read and write
D00000
heap
page read and write
5CEE000
stack
page read and write
662D000
stack
page read and write
4052000
trusted library allocation
page read and write
4F5D000
stack
page read and write
31EA000
trusted library allocation
page read and write
446000
remote allocation
page execute and read and write
4253000
trusted library allocation
page read and write
176B000
trusted library allocation
page execute and read and write
31C9000
trusted library allocation
page read and write
1180000
heap
page read and write
8170000
heap
page read and write
3462000
trusted library allocation
page read and write
429C000
trusted library allocation
page read and write
2C92000
trusted library allocation
page read and write
86F0000
heap
page read and write
1068000
heap
page read and write
74326000
unkown
page readonly
3EF6000
trusted library allocation
page read and write
652E000
stack
page read and write
785E000
heap
page read and write
400A000
trusted library allocation
page read and write
2CA2000
trusted library allocation
page read and write
79B0000
trusted library allocation
page read and write
7010000
trusted library allocation
page execute and read and write
341A000
trusted library allocation
page read and write
12D4000
trusted library allocation
page read and write
40CD000
trusted library allocation
page read and write
7BDE000
stack
page read and write
1566000
heap
page read and write
31B4000
trusted library allocation
page read and write
5AAE000
stack
page read and write
591C000
stack
page read and write
30AB000
trusted library allocation
page read and write
3EBE000
trusted library allocation
page read and write
3254000
trusted library allocation
page read and write
31EE000
trusted library allocation
page read and write
381EF000
stack
page read and write
346C000
trusted library allocation
page read and write
60F3000
heap
page read and write
32F5000
trusted library allocation
page read and write
14B0000
heap
page read and write
5770000
heap
page read and write
408C000
trusted library allocation
page read and write
15C0000
heap
page read and write
6CB0000
heap
page execute and read and write
5540000
trusted library allocation
page execute and read and write
37F8E000
heap
page read and write
42D0000
trusted library allocation
page read and write
C5C000
stack
page read and write
2FAD000
heap
page read and write
2E23000
trusted library allocation
page read and write
7888000
heap
page read and write
777C000
heap
page read and write
2D10000
heap
page execute and read and write
53A0000
trusted library allocation
page read and write
6630000
heap
page execute and read and write
3EC9000
trusted library allocation
page read and write
3EF8000
trusted library allocation
page read and write
37F2E000
stack
page read and write
7A28000
trusted library allocation
page read and write
51C0000
heap
page read and write
7746000
trusted library allocation
page read and write
334A000
trusted library allocation
page read and write
3F12000
trusted library allocation
page read and write
3438000
trusted library allocation
page read and write
103B000
stack
page read and write
7A19000
trusted library allocation
page read and write
3FEC000
trusted library allocation
page read and write
36A70000
heap
page read and write
30B0000
trusted library allocation
page read and write
160C000
heap
page read and write
5827000
heap
page read and write
7B50000
trusted library allocation
page execute and read and write
7A3F000
trusted library allocation
page read and write
3E871000
trusted library allocation
page read and write
3091000
trusted library allocation
page read and write
31EF000
trusted library allocation
page read and write
5D10000
trusted library allocation
page read and write
1740000
trusted library allocation
page read and write
36A60000
heap
page read and write
142F000
stack
page read and write
33CF000
trusted library allocation
page read and write
5634000
trusted library allocation
page read and write
64AE000
stack
page read and write
1520000
heap
page read and write
3260000
trusted library allocation
page read and write
1760000
trusted library allocation
page read and write
3832E000
stack
page read and write
10A8000
heap
page read and write
6FFB000
stack
page read and write
802E000
stack
page read and write
5886000
heap
page read and write
432000
remote allocation
page execute and read and write
53AB000
trusted library allocation
page read and write
42C6000
trusted library allocation
page read and write
3130000
heap
page execute and read and write
63DC000
stack
page read and write
4141000
trusted library allocation
page read and write
3696E000
stack
page read and write
3F3A000
trusted library allocation
page read and write
67AE000
stack
page read and write
345C000
trusted library allocation
page read and write
543E000
trusted library allocation
page read and write
586C000
stack
page read and write
335A000
trusted library allocation
page read and write
40AF000
trusted library allocation
page read and write
3B671000
trusted library allocation
page read and write
367AB000
stack
page read and write
4111000
trusted library allocation
page read and write
3FF7000
trusted library allocation
page read and write
2CFC000
stack
page read and write
16A0000
trusted library allocation
page read and write
3EEA000
trusted library allocation
page read and write
53FE000
trusted library allocation
page read and write
7A60000
trusted library allocation
page execute and read and write
3420000
trusted library allocation
page read and write
108C000
heap
page read and write
3278000
trusted library allocation
page read and write
EDB000
stack
page read and write
E79000
stack
page read and write
342C000
trusted library allocation
page read and write
1340000
heap
page read and write
7788000
heap
page read and write
5470000
heap
page read and write
3469000
trusted library allocation
page read and write
6A11000
trusted library allocation
page read and write
56AE000
stack
page read and write
C9C000
stack
page read and write
5490000
trusted library allocation
page read and write
576E000
stack
page read and write
3055000
trusted library allocation
page read and write
4063000
trusted library allocation
page read and write
4069000
trusted library allocation
page read and write
3084000
trusted library allocation
page read and write
77CF000
heap
page read and write
358D3000
trusted library allocation
page read and write
1087000
heap
page read and write
78AE000
heap
page read and write
634D000
stack
page read and write
3EDA000
trusted library allocation
page read and write
37CAF000
stack
page read and write
30B5000
trusted library allocation
page read and write
5675000
trusted library allocation
page read and write
13AE000
stack
page read and write
556B000
trusted library allocation
page read and write
31D4000
trusted library allocation
page read and write
53A4000
trusted library allocation
page read and write
131E000
heap
page read and write
3472000
trusted library allocation
page read and write
3450000
trusted library allocation
page read and write
1150000
trusted library allocation
page read and write
42A6000
trusted library allocation
page read and write
6A5E000
trusted library allocation
page read and write
17CE000
stack
page read and write
13DD000
heap
page read and write
6B00000
trusted library allocation
page execute and read and write
1720000
trusted library allocation
page read and write
656E000
stack
page read and write
53BE000
trusted library allocation
page read and write
14AE000
stack
page read and write
7000000
trusted library allocation
page read and write
32EC000
trusted library allocation
page read and write
3FC71000
trusted library allocation
page read and write
69C5000
trusted library allocation
page read and write
331B000
trusted library allocation
page read and write
154E000
stack
page read and write
16AB000
trusted library allocation
page execute and read and write
8780000
trusted library allocation
page read and write
4256000
trusted library allocation
page read and write
7770000
heap
page read and write
86EE000
stack
page read and write
5CF0000
trusted library allocation
page read and write
7A3A000
trusted library allocation
page read and write
5AF0000
trusted library allocation
page read and write
74310000
unkown
page readonly
F70000
heap
page read and write
64E0000
heap
page execute and read and write
1365000
heap
page read and write
3FE4000
trusted library allocation
page read and write
4200000
trusted library allocation
page read and write
BAC000
stack
page read and write
6D4C000
stack
page read and write
636E000
stack
page read and write
3270000
heap
page read and write
2E1E000
stack
page read and write
2E6F000
stack
page read and write
10BA000
heap
page read and write
33BE000
trusted library allocation
page read and write
41B1000
trusted library allocation
page read and write
42BD000
trusted library allocation
page read and write
6739000
stack
page read and write
347D000
trusted library allocation
page read and write
1870000
heap
page read and write
380EE000
stack
page read and write
3772E000
stack
page read and write
1420000
heap
page read and write
1260000
heap
page read and write
502C000
stack
page read and write
317F000
unkown
page read and write
133C000
heap
page read and write
13BA000
heap
page read and write
660E000
stack
page read and write
2FFE000
stack
page read and write
7432D000
unkown
page read and write
4F2C000
stack
page read and write
69D9000
trusted library allocation
page read and write
171E000
stack
page read and write
3444000
trusted library allocation
page read and write
4290000
trusted library allocation
page read and write
7A70000
trusted library allocation
page read and write
3228000
trusted library allocation
page read and write
325B000
trusted library allocation
page read and write
431F000
trusted library allocation
page read and write
40B9000
trusted library allocation
page read and write
5641000
trusted library allocation
page read and write
3351000
trusted library allocation
page read and write
2FD1000
trusted library allocation
page read and write
6E8E000
stack
page read and write
788E000
heap
page read and write
36E1E000
stack
page read and write
2F8B000
trusted library allocation
page read and write
5A7E000
stack
page read and write
5B5E000
stack
page read and write
7749000
trusted library allocation
page read and write
2FD6000
trusted library allocation
page read and write
3F5F000
trusted library allocation
page read and write
4E5E000
stack
page read and write
656B000
stack
page read and write
3200000
trusted library allocation
page read and write
5655000
trusted library allocation
page read and write
66AE000
stack
page read and write
3F52000
trusted library allocation
page read and write
1767000
trusted library allocation
page execute and read and write
330E000
trusted library allocation
page read and write
34A2000
trusted library allocation
page read and write
1820000
trusted library allocation
page read and write
30C1000
trusted library allocation
page read and write
7EAE000
stack
page read and write
3EF0000
trusted library allocation
page read and write
1730000
trusted library allocation
page read and write
3426000
trusted library allocation
page read and write
3E51000
trusted library allocation
page read and write
3242000
trusted library allocation
page read and write
2F9B000
trusted library allocation
page read and write
6D00000
trusted library allocation
page execute and read and write
6A2E000
trusted library allocation
page read and write
6B50000
trusted library allocation
page execute and read and write
337F000
stack
page read and write
5380000
trusted library allocation
page read and write
53DF000
stack
page read and write
3F78000
trusted library allocation
page read and write
5AD0000
heap
page read and write
3FD3000
trusted library allocation
page read and write
5563000
heap
page read and write
8700000
trusted library allocation
page execute and read and write
51BD000
stack
page read and write
38E71000
trusted library allocation
page read and write
31F8000
trusted library allocation
page read and write
6B60000
trusted library allocation
page execute and read and write
36B9C000
stack
page read and write
30A6000
trusted library allocation
page read and write
130B000
trusted library allocation
page execute and read and write
5588000
trusted library allocation
page read and write
1039000
heap
page read and write
4318000
trusted library allocation
page read and write
2EFE000
stack
page read and write
FF0000
heap
page read and write
6AF0000
trusted library allocation
page execute and read and write
2E2E000
stack
page read and write
42C8000
trusted library allocation
page read and write
597E000
stack
page read and write
33C5000
trusted library allocation
page read and write
FD7000
stack
page read and write
55C0000
trusted library allocation
page read and write
5595000
trusted library allocation
page read and write
4346000
trusted library allocation
page read and write
55B0000
trusted library allocation
page read and write
2D00000
heap
page read and write
7432F000
unkown
page readonly
1690000
trusted library allocation
page read and write
30B0000
heap
page read and write
174D000
trusted library allocation
page execute and read and write
3398000
trusted library allocation
page read and write
FE0000
heap
page read and write
5648000
trusted library allocation
page read and write
5400000
trusted library allocation
page read and write
53C6000
trusted library allocation
page read and write
6A50000
trusted library allocation
page read and write
29B0000
heap
page read and write
40B6000
trusted library allocation
page read and write
167D000
trusted library allocation
page execute and read and write
5390000
trusted library allocation
page read and write
7ADD000
stack
page read and write
5B1F000
stack
page read and write
343E000
trusted library allocation
page read and write
1165000
heap
page read and write
3F271000
trusted library allocation
page read and write
786C000
heap
page read and write
56C3000
heap
page execute and read and write
42FE000
trusted library allocation
page read and write
65C0000
heap
page read and write
12C0000
trusted library allocation
page read and write
3112000
trusted library allocation
page read and write
6A55000
trusted library allocation
page read and write
588B000
heap
page read and write
3A271000
trusted library allocation
page read and write
56C0000
heap
page execute and read and write
3682D000
stack
page read and write
670E000
stack
page read and write
32AB000
trusted library allocation
page read and write
2F5D000
trusted library allocation
page read and write
6AD0000
trusted library allocation
page read and write
1310000
heap
page read and write
632C000
stack
page read and write
7A50000
trusted library allocation
page read and write
5653000
trusted library allocation
page read and write
3ED3000
trusted library allocation
page read and write
2CA5000
trusted library allocation
page execute and read and write
4042000
trusted library allocation
page read and write
53D2000
trusted library allocation
page read and write
10C8000
heap
page read and write
1674000
trusted library allocation
page read and write
3EB9000
trusted library allocation
page read and write
40FB000
trusted library allocation
page read and write
2FAD000
heap
page read and write
F20000
heap
page read and write
5BF0000
trusted library allocation
page read and write
428C000
trusted library allocation
page read and write
4286000
trusted library allocation
page read and write
37CEE000
stack
page read and write
140E000
stack
page read and write
30A4000
trusted library allocation
page read and write
3EE7000
trusted library allocation
page read and write
1710000
heap
page read and write
6AA0000
trusted library allocation
page read and write
65AB000
stack
page read and write
306A000
trusted library allocation
page read and write
DE2000
unkown
page readonly
1734000
trusted library allocation
page read and write
1541000
heap
page read and write
4133000
trusted library allocation
page read and write
69D7000
trusted library allocation
page read and write
1300000
trusted library allocation
page read and write
6CD0000
trusted library allocation
page read and write
4247000
trusted library allocation
page read and write
42B3000
trusted library allocation
page read and write
3FEF000
trusted library allocation
page read and write
7A2F000
trusted library allocation
page read and write
910F000
stack
page read and write
6F9B000
trusted library allocation
page read and write
77B3000
heap
page read and write
68F0000
trusted library allocation
page execute and read and write
2B3E000
stack
page read and write
3E5F000
trusted library allocation
page read and write
557E000
trusted library allocation
page read and write
6A22000
trusted library allocation
page read and write
3282000
trusted library allocation
page read and write
6A5B000
trusted library allocation
page read and write
3FE0000
trusted library allocation
page read and write
2FC5000
trusted library allocation
page read and write
1000000
heap
page read and write
42F2000
trusted library allocation
page read and write
403D000
trusted library allocation
page read and write
60E2000
heap
page read and write
3270000
trusted library allocation
page read and write
562F000
trusted library allocation
page read and write
1733000
trusted library allocation
page execute and read and write
37F4E000
heap
page read and write
31B8000
trusted library allocation
page read and write
1756000
trusted library allocation
page execute and read and write
2FAD000
heap
page read and write
74311000
unkown
page execute read
3098000
trusted library allocation
page read and write
53F0000
trusted library allocation
page read and write
3027000
heap
page read and write
31FC000
trusted library allocation
page read and write
129E000
stack
page read and write
4336000
trusted library allocation
page read and write
875C000
stack
page read and write
1095000
heap
page read and write
2FBD000
heap
page read and write
426D000
trusted library allocation
page read and write
4047000
trusted library allocation
page read and write
1673000
trusted library allocation
page execute and read and write
55A8000
trusted library allocation
page read and write
4331000
trusted library allocation
page read and write
2D4E000
stack
page read and write
3E9B000
trusted library allocation
page read and write
327A000
trusted library allocation
page read and write
57E4000
heap
page read and write
37FA4000
heap
page read and write
3432000
trusted library allocation
page read and write
7A10000
trusted library allocation
page read and write
AC2000
unkown
page readonly
69D5000
trusted library allocation
page read and write
108E000
heap
page read and write
566E000
stack
page read and write
6CE0000
trusted library allocation
page execute and read and write
15DF000
heap
page read and write
3FCC000
trusted library allocation
page read and write
16D0000
trusted library allocation
page execute and read and write
8DCD000
stack
page read and write
3301000
trusted library allocation
page read and write
164F000
stack
page read and write
1860000
heap
page read and write
5575000
trusted library allocation
page read and write
5B00000
trusted library allocation
page read and write
3EF3000
trusted library allocation
page read and write
2BE0000
trusted library allocation
page read and write
336C000
trusted library allocation
page read and write
6A31000
trusted library allocation
page read and write
7B20000
trusted library allocation
page read and write
3249000
trusted library allocation
page read and write
12E4000
trusted library allocation
page read and write
2D0E000
stack
page read and write
3410000
trusted library allocation
page read and write
1320000
heap
page read and write
12D3000
trusted library allocation
page execute and read and write
3220000
trusted library allocation
page read and write
2E40000
heap
page execute and read and write
1046000
heap
page read and write
33F9000
trusted library allocation
page read and write
6C80000
trusted library allocation
page read and write
8ECE000
stack
page read and write
2FBD000
heap
page read and write
33DB000
trusted library allocation
page read and write
36F1E000
stack
page read and write
3EE0000
trusted library allocation
page read and write
572E000
stack
page read and write
39871000
trusted library allocation
page read and write
41D6000
trusted library allocation
page read and write
77AE000
heap
page read and write
56AE000
stack
page read and write
31FE000
trusted library allocation
page read and write
FF9B0000
trusted library allocation
page execute and read and write
14B7000
heap
page read and write
5ABE000
stack
page read and write
630E000
stack
page read and write
12BE000
stack
page read and write
1810000
trusted library allocation
page execute and read and write
55A0000
trusted library allocation
page read and write
2FBA000
trusted library allocation
page read and write
F6E000
stack
page read and write
5560000
heap
page read and write
77C0000
heap
page read and write
6AE0000
trusted library allocation
page read and write
5480000
heap
page read and write
12E0000
trusted library allocation
page read and write
332D000
trusted library allocation
page read and write
175A000
trusted library allocation
page execute and read and write
1528000
heap
page read and write
3388000
trusted library allocation
page read and write
4036000
trusted library allocation
page read and write
3FFE000
trusted library allocation
page read and write
37FA1000
heap
page read and write
7FAE000
stack
page read and write
30A0000
trusted library allocation
page read and write
5BED000
stack
page read and write
1557000
heap
page read and write
31B0000
trusted library allocation
page read and write
1752000
trusted library allocation
page read and write
2E21000
trusted library allocation
page read and write
There are 798 hidden memdumps, click here to show them.