IOC Report
file.exe

loading gif

Files

File Path
Type
Category
Malicious
file.exe
PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
initial sample
malicious
C:\Lipras\pdf.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
data
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_eedb0q4n.0qa.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_hhjbkeew.l3p.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_ncja2tgz.kc0.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_r3rtzpbz.xok.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_vszyjc0t.wog.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_wr5worfc.fny.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_yvpfvf34.2ym.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_zvoo4mpq.v1s.psm1
ASCII text, with no line terminators
dropped
\Device\ConDrv
ASCII text, with CRLF line terminators
dropped
There are 2 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\file.exe
"C:\Users\user\Desktop\file.exe"
malicious
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
"powershell.exe" powershell -Command "Add-MpPreference -ExclusionPath 'C:\Lipras'; Add-MpPreference -ExclusionPath 'C:\Users'"
malicious
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -Command Add-MpPreference -ExclusionPath C:\Lipras
malicious
C:\Lipras\pdf.exe
"C:\Lipras\pdf.exe"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\wbem\WmiPrvSE.exe
C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding

URLs

Name
IP
Malicious
contemteny.site
malicious
opposezmny.site
malicious
servicedny.site
malicious
goalyfeastz.site
malicious
authorisev.site
malicious
faulteyotk.site
malicious
ponintnykqwm.shop
malicious
seallysl.site
malicious
https://seallysl.site/api
172.67.180.76
malicious
dilemmadu.site
malicious
https://duckduckgo.com/chrome_newtab
unknown
https://seallysl.site/e
unknown
https://duckduckgo.com/ac/?q=
unknown
https://github.com
unknown
http://www.enigmaprotector.com/openU
unknown
https://contoso.com/License
unknown
https://seallysl.site/apiH
unknown
https://bridge.lga1.admarketplace.net/ctp?version=16.0.0&key=1696332238301000001.2&ci=1696332238417.
unknown
https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
unknown
https://support.office.com/article/94ba2e0b-638e-4a92-8857-2cb5ac1d8e17
unknown
https://seallysl.site/apQ$
unknown
https://seallysl.site/
unknown
http://github.com
unknown
https://seallysl.site/api$
unknown
https://aka.ms/pscore6lB
unknown
https://imp.mt48.net/static?id=7RHzfOIXjFEYsBdvIpkX4QqmfZfYfQfafZbXfpbWfpbX7ReNxR3UIG8zInwYIFIVs9eYi
unknown
http://x1.c.lencr.org/0
unknown
http://x1.i.lencr.org/0
unknown
https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
unknown
https://contoso.com/
unknown
https://nuget.org/nuget.exe
unknown
https://seallysl.site/t
unknown
https://support.mozilla.org/products/firefoxgro.all
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
https://seallysl.site/qt
unknown
https://www.amazon.com/?tag=admarketus-20&ref=pd_sl_7548d4575af019e4c148ccf1a78112802e66a0816a72fc94
unknown
http://nuget.org/NuGet.exe
unknown
https://seallysl.site/0t
unknown
https://github.com/vonuch1/start/raw/refs/heads/main/khtoawdltrha.exe
140.82.121.4
https://contile-images.services.mozilla.com/0TegrVVRalreHILhR2WvtD_CFzj13HCDcLqqpvXSOuY.10862.jpg
unknown
https://www.google.com/images/branding/product/ico/googleg_lodp.ico
unknown
http://pesterbdd.com/images/Pester.png
unknown
http://schemas.xmlsoap.org/soap/encoding/
unknown
http://www.apache.org/licenses/LICENSE-2.0.html
unknown
http://raw.githubusercontent.comd
unknown
https://contoso.com/Icon
unknown
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
unknown
http://crl.rootca1.amazontrust.com/rootca1.crl0
unknown
https://bridge.lga1.ap01.net/ctp?version=16.0.0&key=1696332238301000001.1&ci=1696332238417.12791&cta
unknown
http://www.microsoft.
unknown
http://github.comd
unknown
http://ocsp.rootca1.amazontrust.com0:
unknown
https://support.office.com/article/7D48285B-20E8-4B9B-91AD-216E34163BAD?wt.mc_id=EnterPK2016
unknown
https://www.ecosia.org/newtab/
unknown
https://support.mozilla.org/kb/customize-firefox-controls-buttons-and-toolbars?utm_source=firefox-br
unknown
https://github.com/Pester/Pester
unknown
https://raw.githubusercontent.com/vonuch1/start/refs/heads/main/khtoawdltrha.exe
185.199.109.133
https://ac.ecosia.org/autocomplete?q=
unknown
http://crl.micro
unknown
https://raw.githubusercontent.com
unknown
https://contile-images.services.mozilla.com/obgoOYObjIFea_bXuT6L4LbBJ8j425AD87S1HMD3BWg.9991.jpg
unknown
https://seallysl.site/apif
unknown
https://support.microsof
unknown
http://schemas.xmlsoap.org/wsdl/
unknown
http://crt.rootca1.amazontrust.com/rootca1.cer0?
unknown
http://raw.githubusercontent.com
unknown
http://www.enigmaprotector.com/
unknown
https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
unknown
https://github.com/vonuch1/start/raw/refs/heads/main/khtoawdltrha.exe#C:
unknown
There are 59 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
seallysl.site
172.67.180.76
malicious
ponintnykqwm.shop
unknown
malicious
github.com
140.82.121.4
raw.githubusercontent.com
185.199.109.133

IPs

IP
Domain
Country
Malicious
172.67.180.76
seallysl.site
United States
malicious
185.199.109.133
raw.githubusercontent.com
Netherlands
140.82.121.4
github.com
United States

Registry

Path
Value
Malicious
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\file_RASAPI32
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\file_RASAPI32
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\file_RASAPI32
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\file_RASAPI32
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\file_RASAPI32
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\file_RASAPI32
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\file_RASAPI32
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\file_RASMANCS
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\file_RASMANCS
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\file_RASMANCS
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\file_RASMANCS
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\file_RASMANCS
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\file_RASMANCS
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\file_RASMANCS
FileDirectory
There are 5 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
31000
unkown
page execute and read and write
malicious
586A000
trusted library allocation
page read and write
58CC000
trusted library allocation
page read and write
38A3000
trusted library allocation
page read and write
6FF0000
trusted library allocation
page execute and read and write
920000
heap
page read and write
7DE0000
heap
page read and write
3842000
trusted library allocation
page read and write
384A000
trusted library allocation
page read and write
8E000
unkown
page execute and write copy
23A0000
trusted library allocation
page read and write
7F1B000
heap
page read and write
3865000
trusted library allocation
page read and write
3865000
trusted library allocation
page read and write
3A00000
trusted library allocation
page read and write
6FA0000
trusted library allocation
page read and write
39C8000
trusted library allocation
page read and write
6ADB000
stack
page read and write
584E000
stack
page read and write
7B0D000
stack
page read and write
7B40000
trusted library allocation
page read and write
3888000
trusted library allocation
page read and write
31A0000
heap
page read and write
8990000
trusted library allocation
page read and write
691E000
stack
page read and write
83D000
heap
page read and write
22F0000
heap
page execute and read and write
8200000
trusted library allocation
page read and write
37EF000
stack
page read and write
343D000
stack
page read and write
3927000
trusted library allocation
page read and write
7D8A000
trusted library allocation
page read and write
9AE000
stack
page read and write
85B0000
trusted library allocation
page execute and read and write
76CF000
stack
page read and write
8C8000
heap
page read and write
384A000
trusted library allocation
page read and write
30D000
unkown
page execute and write copy
3851000
trusted library allocation
page read and write
3883000
trusted library allocation
page read and write
3845000
trusted library allocation
page read and write
460000
heap
page read and write
306D000
heap
page read and write
8B1000
heap
page read and write
7D87000
trusted library allocation
page read and write
8DEF000
stack
page read and write
71B0000
trusted library allocation
page read and write
7CDF000
stack
page read and write
3837000
trusted library allocation
page read and write
7E3E000
heap
page read and write
3825000
trusted library allocation
page read and write
4CD7000
heap
page read and write
2990000
trusted library allocation
page read and write
87C5000
heap
page read and write
313E000
unkown
page read and write
8B5000
heap
page read and write
3821000
trusted library allocation
page read and write
3330000
trusted library allocation
page read and write
38D2000
trusted library allocation
page read and write
3830000
trusted library allocation
page read and write
6B50000
heap
page read and write
3339000
trusted library allocation
page read and write
2470000
direct allocation
page execute and read and write
87FC000
heap
page read and write
27FE000
heap
page read and write
68B000
trusted library allocation
page execute and read and write
236F000
trusted library allocation
page read and write
85D0000
trusted library allocation
page read and write
383A000
trusted library allocation
page read and write
682000
trusted library allocation
page read and write
5A77000
trusted library allocation
page read and write
29B2000
trusted library allocation
page read and write
386B000
trusted library allocation
page read and write
87D1000
heap
page read and write
8DA000
heap
page read and write
7A00000
heap
page execute and read and write
798E000
stack
page read and write
1F9000
stack
page read and write
8DE000
heap
page read and write
8790000
heap
page read and write
B7E000
stack
page read and write
8CC000
heap
page read and write
3310000
trusted library allocation
page read and write
2A80000
heap
page read and write
280C000
heap
page read and write
384B000
trusted library allocation
page read and write
3841000
trusted library allocation
page read and write
8AD000
heap
page read and write
7F0C000
heap
page read and write
52C3000
trusted library allocation
page read and write
29B5000
trusted library allocation
page execute and read and write
81F3000
trusted library allocation
page read and write
48AB000
stack
page read and write
7B20000
trusted library allocation
page read and write
383A000
trusted library allocation
page read and write
262B000
direct allocation
page execute and read and write
68000
unkown
page readonly
3842000
trusted library allocation
page read and write
7D3E000
stack
page read and write
8DC000
heap
page read and write
2F3E000
stack
page read and write
3891000
trusted library allocation
page read and write
276E000
stack
page read and write
2983000
trusted library allocation
page execute and read and write
4A36000
trusted library allocation
page read and write
8DE000
heap
page read and write
4D9D000
stack
page read and write
4439000
trusted library allocation
page read and write
4ADE000
stack
page read and write
6F06000
heap
page read and write
7040000
trusted library allocation
page read and write
4E0000
heap
page read and write
8C5000
heap
page read and write
6EE1000
heap
page read and write
383B000
trusted library allocation
page read and write
87FF000
heap
page read and write
72DB000
stack
page read and write
368F000
stack
page read and write
2372000
trusted library allocation
page read and write
3841000
trusted library allocation
page read and write
2930000
heap
page read and write
29A0000
trusted library allocation
page read and write
8A0000
heap
page read and write
383B000
trusted library allocation
page read and write
8DB000
heap
page read and write
2867000
heap
page read and write
87C2000
heap
page read and write
4E00000
heap
page execute and read and write
733E000
stack
page read and write
5ED1000
trusted library allocation
page read and write
FC000
stack
page read and write
8BA000
heap
page read and write
3838000
trusted library allocation
page read and write
6BE000
heap
page read and write
600000
heap
page read and write
2900000
remote allocation
page read and write
285C000
heap
page read and write
3940000
trusted library allocation
page read and write
3821000
trusted library allocation
page read and write
3841000
trusted library allocation
page read and write
3856000
trusted library allocation
page read and write
8BD000
heap
page read and write
677000
trusted library allocation
page execute and read and write
2A1E000
stack
page read and write
7EBF000
heap
page read and write
3857000
trusted library allocation
page read and write
8C8000
heap
page read and write
2634000
direct allocation
page execute and read and write
3855000
trusted library allocation
page read and write
63E000
unkown
page read and write
842E000
stack
page read and write
54FF000
stack
page read and write
3350000
trusted library allocation
page read and write
2F0E000
trusted library allocation
page read and write
3873000
trusted library allocation
page read and write
3828000
trusted library allocation
page read and write
2900000
remote allocation
page read and write
741E000
stack
page read and write
302C000
heap
page read and write
78E7000
heap
page read and write
7C2B000
trusted library allocation
page read and write
24D3000
heap
page read and write
382C000
trusted library allocation
page read and write
8B4000
heap
page read and write
307D000
stack
page read and write
73DA000
stack
page read and write
2999000
trusted library allocation
page read and write
542F000
trusted library allocation
page read and write
3855000
trusted library allocation
page read and write
4645000
heap
page execute and read and write
387A000
trusted library allocation
page read and write
7E55000
heap
page read and write
729D000
stack
page read and write
745B000
stack
page read and write
3830000
trusted library allocation
page read and write
43DD000
stack
page read and write
3865000
trusted library allocation
page read and write
3834000
trusted library allocation
page read and write
2648000
direct allocation
page execute and read and write
84C000
heap
page read and write
79F0000
trusted library allocation
page read and write
8DB000
heap
page read and write
5014000
trusted library allocation
page read and write
7762000
heap
page read and write
570E000
stack
page read and write
2CFC000
stack
page read and write
44DE000
stack
page read and write
7DD0000
trusted library allocation
page read and write
653000
trusted library allocation
page execute and read and write
3887000
trusted library allocation
page read and write
3850000
trusted library allocation
page read and write
2A90000
trusted library allocation
page read and write
8C5000
heap
page read and write
332D000
trusted library allocation
page execute and read and write
3825000
trusted library allocation
page read and write
2380000
trusted library allocation
page read and write
4ED1000
trusted library allocation
page read and write
461C000
stack
page read and write
3880000
trusted library allocation
page read and write
383F000
trusted library allocation
page read and write
3865000
trusted library allocation
page read and write
711E000
stack
page read and write
85A000
heap
page read and write
2301000
trusted library allocation
page read and write
2310000
trusted library allocation
page read and write
317E000
stack
page read and write
3830000
trusted library allocation
page read and write
8CB000
heap
page read and write
7010000
heap
page execute and read and write
3865000
trusted library allocation
page read and write
3921000
heap
page read and write
65D000
trusted library allocation
page execute and read and write
3844000
trusted library allocation
page read and write
89A3000
trusted library allocation
page read and write
1EF000
unkown
page execute and read and write
78EF000
heap
page read and write
6EFC000
heap
page read and write
7160000
trusted library allocation
page read and write
6B8000
heap
page read and write
846F000
stack
page read and write
29B0000
trusted library allocation
page read and write
6FB0000
trusted library allocation
page read and write
4E33000
trusted library allocation
page read and write
7000000
trusted library allocation
page read and write
78E2000
heap
page read and write
640000
heap
page read and write
4DDB000
stack
page read and write
3865000
trusted library allocation
page read and write
3180000
heap
page read and write
71A0000
trusted library allocation
page read and write
2A98000
trusted library allocation
page read and write
8AD000
heap
page read and write
8CB000
heap
page read and write
567D000
stack
page read and write
3B0000
heap
page read and write
7EF7000
heap
page read and write
8980000
trusted library allocation
page execute and read and write
7350000
trusted library allocation
page execute and read and write
87E9000
heap
page read and write
2361000
trusted library allocation
page read and write
8DC000
heap
page read and write
8369000
stack
page read and write
3F20000
trusted library allocation
page read and write
7A4E000
stack
page read and write
24A0000
heap
page read and write
2DFE000
unkown
page read and write
3822000
trusted library allocation
page read and write
8855000
heap
page read and write
8D6D000
stack
page read and write
3855000
trusted library allocation
page read and write
48D0000
heap
page execute and read and write
8B4000
heap
page read and write
8DB000
heap
page read and write
760D000
stack
page read and write
8E0000
heap
page read and write
3837000
trusted library allocation
page read and write
33F0000
heap
page read and write
27C7000
heap
page read and write
3885000
trusted library allocation
page read and write
5F3B000
trusted library allocation
page read and write
486D000
stack
page read and write
7ACE000
stack
page read and write
389B000
trusted library allocation
page read and write
2634000
direct allocation
page execute and read and write
3855000
trusted library allocation
page read and write
532D000
trusted library allocation
page read and write
8DA000
heap
page read and write
7B70000
trusted library allocation
page read and write
607F000
trusted library allocation
page read and write
383A000
trusted library allocation
page read and write
3AB7000
trusted library allocation
page read and write
6078000
trusted library allocation
page read and write
3865000
trusted library allocation
page read and write
33F8000
heap
page read and write
3836000
trusted library allocation
page read and write
3845000
trusted library allocation
page read and write
30E4000
heap
page read and write
7180000
trusted library allocation
page read and write
8CE000
heap
page read and write
2780000
trusted library section
page read and write
3888000
trusted library allocation
page read and write
24E0000
heap
page read and write
386A000
trusted library allocation
page read and write
8DC000
heap
page read and write
3873000
trusted library allocation
page read and write
654000
trusted library allocation
page read and write
4942000
trusted library allocation
page read and write
8770000
heap
page read and write
5459000
trusted library allocation
page read and write
7869000
heap
page read and write
3873000
trusted library allocation
page read and write
48E1000
trusted library allocation
page read and write
3841000
trusted library allocation
page read and write
81B000
heap
page read and write
89000
unkown
page execute and write copy
715D000
stack
page read and write
8DE000
heap
page read and write
5C20000
heap
page read and write
30000
unkown
page readonly
7030000
trusted library allocation
page execute and read and write
5609000
trusted library allocation
page read and write
7C10000
trusted library allocation
page execute and read and write
3865000
trusted library allocation
page read and write
8752000
trusted library allocation
page read and write
3844000
trusted library allocation
page read and write
2374000
trusted library allocation
page read and write
7E93000
heap
page read and write
6D5E000
stack
page read and write
3038000
heap
page read and write
4710000
heap
page read and write
3845000
trusted library allocation
page read and write
879C000
heap
page read and write
7BC0000
trusted library allocation
page read and write
76000
unkown
page execute and write copy
5277000
trusted library allocation
page read and write
8C5000
heap
page read and write
3820000
trusted library allocation
page read and write
7170000
trusted library allocation
page read and write
3A90000
trusted library allocation
page read and write
8AE000
stack
page read and write
470D000
stack
page read and write
70DE000
stack
page read and write
468E000
stack
page read and write
5C10000
heap
page read and write
383A000
trusted library allocation
page read and write
2366000
trusted library allocation
page read and write
3833000
trusted library allocation
page read and write
861F000
stack
page read and write
79E0000
trusted library allocation
page execute and read and write
3822000
trusted library allocation
page read and write
69DA000
stack
page read and write
89B0000
trusted library allocation
page read and write
6F18000
heap
page read and write
7190000
trusted library allocation
page read and write
3885000
trusted library allocation
page read and write
31A5000
heap
page read and write
38A4000
trusted library allocation
page read and write
5909000
trusted library allocation
page read and write
3842000
trusted library allocation
page read and write
45DC000
stack
page read and write
8DA000
heap
page read and write
39F0000
trusted library allocation
page read and write
3853000
trusted library allocation
page read and write
3845000
trusted library allocation
page read and write
9B0000
trusted library allocation
page execute and read and write
38B9000
trusted library allocation
page read and write
3078000
heap
page read and write
2804000
heap
page read and write
8DC000
heap
page read and write
78C5000
heap
page read and write
3323000
trusted library allocation
page execute and read and write
71D0000
trusted library allocation
page read and write
385A000
trusted library allocation
page read and write
6E90000
heap
page read and write
3842000
trusted library allocation
page read and write
489E000
stack
page read and write
3845000
trusted library allocation
page read and write
8B8000
heap
page read and write
3000000
heap
page read and write
4D5F000
stack
page read and write
4BDF000
stack
page read and write
8B9C000
stack
page read and write
3352000
trusted library allocation
page read and write
2A5F000
stack
page read and write
3861000
trusted library allocation
page read and write
3821000
trusted library allocation
page read and write
51D5000
trusted library allocation
page read and write
353D000
stack
page read and write
3833000
trusted library allocation
page read and write
4FF3000
trusted library allocation
page read and write
8BC000
heap
page read and write
3837000
trusted library allocation
page read and write
3833000
trusted library allocation
page read and write
6EA9000
heap
page read and write
7F11000
heap
page read and write
3845000
trusted library allocation
page read and write
47DE000
stack
page read and write
8CB000
heap
page read and write
38B4000
trusted library allocation
page read and write
83ED000
stack
page read and write
7E5D000
heap
page read and write
580E000
stack
page read and write
3324000
trusted library allocation
page read and write
386A000
trusted library allocation
page read and write
3842000
trusted library allocation
page read and write
79D0000
trusted library allocation
page read and write
85CD000
trusted library allocation
page read and write
8DE000
heap
page read and write
9C0000
heap
page read and write
71C0000
trusted library allocation
page read and write
7BA0000
trusted library allocation
page read and write
8BA000
heap
page read and write
89000
unkown
page execute and read and write
869E000
stack
page read and write
883C000
heap
page read and write
9C7000
heap
page read and write
5371000
trusted library allocation
page read and write
235E000
trusted library allocation
page read and write
3826000
trusted library allocation
page read and write
46CF000
stack
page read and write
7D80000
trusted library allocation
page read and write
7E59000
heap
page read and write
2960000
trusted library section
page read and write
927000
heap
page read and write
38A1000
trusted library allocation
page read and write
3845000
trusted library allocation
page read and write
3864000
trusted library allocation
page read and write
8784000
heap
page read and write
328000
stack
page read and write
27A0000
heap
page read and write
3893000
trusted library allocation
page read and write
3855000
trusted library allocation
page read and write
5605000
trusted library allocation
page read and write
3869000
trusted library allocation
page read and write
3821000
trusted library allocation
page read and write
78DD000
heap
page read and write
7CF0000
trusted library allocation
page execute and read and write
3829000
trusted library allocation
page read and write
3836000
trusted library allocation
page read and write
383B000
trusted library allocation
page read and write
6A9D000
stack
page read and write
8DB000
heap
page read and write
3855000
trusted library allocation
page read and write
2DFF000
stack
page read and write
85CB000
trusted library allocation
page read and write
5890000
heap
page read and write
A3E000
stack
page read and write
2780000
heap
page read and write
3880000
trusted library allocation
page read and write
479E000
stack
page read and write
38A4000
trusted library allocation
page read and write
4EC0000
heap
page execute and read and write
36EE000
stack
page read and write
8CB000
heap
page read and write
62000
unkown
page readonly
770E000
stack
page read and write
24F0000
direct allocation
page execute and read and write
53FE000
stack
page read and write
71F0000
trusted library allocation
page read and write
4CD0000
heap
page read and write
596E000
trusted library allocation
page read and write
6C9E000
stack
page read and write
7DB0000
trusted library allocation
page read and write
298D000
trusted library allocation
page execute and read and write
3893000
trusted library allocation
page read and write
7C00000
heap
page read and write
272E000
stack
page read and write
6E4000
heap
page read and write
3865000
trusted library allocation
page read and write
8BB000
heap
page read and write
3859000
trusted library allocation
page read and write
3838000
trusted library allocation
page read and write
3880000
trusted library allocation
page read and write
33BE000
stack
page read and write
3830000
trusted library allocation
page read and write
792C000
heap
page read and write
7220000
trusted library allocation
page read and write
8794000
heap
page read and write
3320000
trusted library allocation
page read and write
8D7000
heap
page read and write
3865000
trusted library allocation
page read and write
387B000
trusted library allocation
page read and write
3843000
trusted library allocation
page read and write
383A000
trusted library allocation
page read and write
3826000
trusted library allocation
page read and write
8DB000
heap
page read and write
31000
unkown
page execute and write copy
8AF000
heap
page read and write
8780000
heap
page read and write
33D8000
trusted library allocation
page read and write
7A8E000
stack
page read and write
3088000
heap
page read and write
8D6000
heap
page read and write
699E000
stack
page read and write
6A0000
trusted library allocation
page read and write
768E000
stack
page read and write
7460000
heap
page read and write
4C1C000
stack
page read and write
8CB000
heap
page read and write
38B9000
trusted library allocation
page read and write
27BB000
heap
page read and write
78D9000
heap
page read and write
38B9000
trusted library allocation
page read and write
3869000
trusted library allocation
page read and write
2624000
direct allocation
page execute and read and write
2398000
trusted library allocation
page read and write
8B0000
heap
page read and write
7200000
trusted library allocation
page read and write
3890000
trusted library allocation
page read and write
3920000
heap
page read and write
3842000
trusted library allocation
page read and write
55E8000
trusted library allocation
page read and write
3855000
trusted library allocation
page read and write
385A000
trusted library allocation
page read and write
3845000
trusted library allocation
page read and write
2369000
trusted library allocation
page read and write
390000
heap
page read and write
3830000
trusted library allocation
page read and write
3845000
trusted library allocation
page read and write
3978000
trusted library allocation
page read and write
386C000
trusted library allocation
page read and write
8D7000
heap
page read and write
4C70000
trusted library allocation
page read and write
32BE000
stack
page read and write
58EE000
trusted library allocation
page read and write
594C000
trusted library allocation
page read and write
5FE000
stack
page read and write
22E0000
trusted library allocation
page read and write
6F3A000
heap
page read and write
3865000
trusted library allocation
page read and write
5A8B000
trusted library allocation
page read and write
5025000
trusted library allocation
page read and write
2634000
direct allocation
page execute and read and write
4E64000
trusted library allocation
page read and write
3845000
trusted library allocation
page read and write
3868000
trusted library allocation
page read and write
38B2000
trusted library allocation
page read and write
3301000
trusted library allocation
page read and write
640000
heap
page read and write
8BC000
heap
page read and write
3884000
trusted library allocation
page read and write
385A000
trusted library allocation
page read and write
5B0E000
stack
page read and write
89A0000
trusted library allocation
page read and write
39F8000
trusted library allocation
page read and write
82B000
heap
page read and write
5895000
heap
page read and write
5823000
trusted library allocation
page read and write
49DE000
stack
page read and write
78F5000
heap
page read and write
7E30000
heap
page read and write
395000
heap
page read and write
925000
heap
page read and write
8C9000
heap
page read and write
3888000
trusted library allocation
page read and write
4F31000
trusted library allocation
page read and write
3370000
trusted library allocation
page read and write
78B2000
heap
page read and write
2A70000
trusted library allocation
page execute and read and write
7850000
heap
page read and write
334A000
trusted library allocation
page execute and read and write
3899000
trusted library allocation
page read and write
3888000
trusted library allocation
page read and write
6D1E000
stack
page read and write
6087000
trusted library allocation
page read and write
7C9E000
stack
page read and write
8BB000
heap
page read and write
2628000
direct allocation
page execute and read and write
630000
trusted library allocation
page read and write
23A8000
trusted library allocation
page read and write
2416000
trusted library allocation
page read and write
3859000
trusted library allocation
page read and write
25F0000
direct allocation
page execute and read and write
79CE000
stack
page read and write
8C3000
heap
page read and write
3856000
trusted library allocation
page read and write
5A97000
trusted library allocation
page read and write
2790000
heap
page read and write
B3F000
stack
page read and write
3A20000
trusted library allocation
page read and write
7B30000
trusted library allocation
page read and write
3888000
trusted library allocation
page read and write
31BE000
stack
page read and write
3830000
trusted library allocation
page read and write
2D38000
stack
page read and write
382E000
trusted library allocation
page read and write
8DA000
heap
page read and write
4E4A000
trusted library allocation
page read and write
387E000
trusted library allocation
page read and write
78A6000
heap
page read and write
8BC000
heap
page read and write
4C60000
trusted library allocation
page execute and read and write
86F0000
trusted library allocation
page read and write
3844000
trusted library allocation
page read and write
58E1000
trusted library allocation
page read and write
3880000
trusted library allocation
page read and write
3865000
trusted library allocation
page read and write
543D000
trusted library allocation
page read and write
3855000
trusted library allocation
page read and write
4E8E000
stack
page read and write
242B000
trusted library allocation
page read and write
3836000
trusted library allocation
page read and write
7E0000
heap
page read and write
3FE000
unkown
page read and write
3355000
trusted library allocation
page execute and read and write
2790000
heap
page read and write
3893000
trusted library allocation
page read and write
4E90000
trusted library allocation
page read and write
7944000
heap
page read and write
6D7000
heap
page read and write
7020000
trusted library allocation
page read and write
7E61000
heap
page read and write
5C0F000
stack
page read and write
241A000
trusted library allocation
page read and write
387F000
trusted library allocation
page read and write
2386000
trusted library allocation
page read and write
886F000
heap
page read and write
8CE9000
stack
page read and write
865E000
stack
page read and write
2A87000
heap
page read and write
4620000
trusted library allocation
page read and write
6FD2000
trusted library allocation
page read and write
1CF000
unkown
page execute and read and write
8DC000
heap
page read and write
3830000
trusted library allocation
page read and write
3845000
trusted library allocation
page read and write
303D000
stack
page read and write
385B000
trusted library allocation
page read and write
709E000
stack
page read and write
3841000
trusted library allocation
page read and write
38CC000
trusted library allocation
page read and write
6F2000
heap
page read and write
2970000
trusted library allocation
page read and write
382C000
trusted library allocation
page read and write
6A5B000
stack
page read and write
3008000
heap
page read and write
3921000
trusted library allocation
page read and write
23A4000
trusted library allocation
page read and write
2308000
trusted library allocation
page read and write
8AD000
heap
page read and write
81F0000
trusted library allocation
page read and write
8C5000
heap
page read and write
2EFF000
stack
page read and write
3340000
trusted library allocation
page read and write
32BF000
stack
page read and write
3863000
trusted library allocation
page read and write
5940000
trusted library allocation
page read and write
24D0000
heap
page read and write
85A0000
heap
page read and write
910000
heap
page read and write
66D000
trusted library allocation
page execute and read and write
5EF1000
trusted library allocation
page read and write
764E000
stack
page read and write
21DE000
stack
page read and write
38C5000
trusted library allocation
page read and write
3844000
trusted library allocation
page read and write
22DE000
stack
page read and write
588F000
stack
page read and write
2630000
direct allocation
page execute and read and write
5EF9000
trusted library allocation
page read and write
3865000
trusted library allocation
page read and write
7C2D000
trusted library allocation
page read and write
2980000
trusted library allocation
page read and write
67A000
trusted library allocation
page execute and read and write
8B00000
trusted library allocation
page read and write
7340000
heap
page read and write
4C7D000
stack
page read and write
78A000
stack
page read and write
886B000
heap
page read and write
8BC000
heap
page read and write
4850000
heap
page execute and read and write
56BE000
stack
page read and write
3830000
trusted library allocation
page read and write
774F000
stack
page read and write
383A000
trusted library allocation
page read and write
5D6E000
stack
page read and write
8CE000
heap
page read and write
3833000
trusted library allocation
page read and write
3830000
trusted library allocation
page read and write
6F42000
heap
page read and write
383A000
trusted library allocation
page read and write
86B0000
trusted library allocation
page read and write
2AB0000
heap
page read and write
793000
heap
page read and write
8D1000
heap
page read and write
317E000
stack
page read and write
8DAE000
stack
page read and write
3881000
trusted library allocation
page read and write
5C6E000
stack
page read and write
8817000
heap
page read and write
3843000
trusted library allocation
page read and write
6CDE000
stack
page read and write
385C000
trusted library allocation
page read and write
7F1D8000
trusted library allocation
page execute and read and write
2AB8000
heap
page read and write
78CD000
heap
page read and write
60000
unkown
page readonly
8CE000
heap
page read and write
3868000
trusted library allocation
page read and write
3865000
trusted library allocation
page read and write
4C90000
heap
page read and write
385D000
trusted library allocation
page read and write
59CE000
stack
page read and write
8BC000
heap
page read and write
792A000
heap
page read and write
826D000
stack
page read and write
3865000
trusted library allocation
page read and write
6A1D000
stack
page read and write
7E36000
heap
page read and write
387B000
trusted library allocation
page read and write
8D2E000
stack
page read and write
2634000
direct allocation
page execute and read and write
86E0000
trusted library allocation
page read and write
878C000
heap
page read and write
3829000
trusted library allocation
page read and write
6D92000
heap
page read and write
386C000
trusted library allocation
page read and write
3855000
trusted library allocation
page read and write
7EA000
heap
page read and write
385B000
trusted library allocation
page read and write
884D000
heap
page read and write
880C000
heap
page read and write
2881000
heap
page read and write
7B90000
trusted library allocation
page read and write
6F60000
heap
page read and write
8A5000
heap
page read and write
8CAE000
stack
page read and write
384A000
trusted library allocation
page read and write
7C20000
trusted library allocation
page read and write
29AA000
trusted library allocation
page execute and read and write
8DB000
heap
page read and write
7ED9000
heap
page read and write
79000
unkown
page execute and write copy
3843000
trusted library allocation
page read and write
385B000
trusted library allocation
page read and write
7F1C0000
trusted library allocation
page execute and read and write
2634000
direct allocation
page execute and read and write
38D4000
trusted library allocation
page read and write
739D000
stack
page read and write
270E000
stack
page read and write
4E05000
heap
page execute and read and write
8D1000
heap
page read and write
236B000
trusted library allocation
page read and write
695E000
stack
page read and write
647000
heap
page read and write
2EC000
stack
page read and write
85C0000
trusted library allocation
page read and write
30000
unkown
page readonly
3958000
trusted library allocation
page read and write
8DE000
heap
page read and write
7B50000
trusted library allocation
page read and write
7F020000
trusted library allocation
page execute and read and write
8BC000
heap
page read and write
8C60000
trusted library allocation
page execute and read and write
38B9000
trusted library allocation
page read and write
385A000
trusted library allocation
page read and write
358E000
stack
page read and write
7B10000
trusted library allocation
page read and write
3843000
trusted library allocation
page read and write
4D7E000
stack
page read and write
32D0000
heap
page read and write
8CC000
heap
page read and write
23C1000
trusted library allocation
page read and write
4D1E000
stack
page read and write
3821000
trusted library allocation
page read and write
8845000
heap
page read and write
4E4E000
stack
page read and write
86AA000
trusted library allocation
page read and write
3855000
trusted library allocation
page read and write
7D7E000
stack
page read and write
7E6D000
heap
page read and write
7CE0000
heap
page read and write
7930000
heap
page read and write
68B000
stack
page read and write
2623000
direct allocation
page execute and read and write
38C7000
trusted library allocation
page read and write
32FE000
stack
page read and write
52EC000
trusted library allocation
page read and write
2377000
trusted library allocation
page read and write
384C000
trusted library allocation
page read and write
86A0000
trusted library allocation
page read and write
3845000
trusted library allocation
page read and write
7210000
trusted library allocation
page read and write
8B10000
trusted library allocation
page read and write
3842000
trusted library allocation
page read and write
7D90000
trusted library allocation
page read and write
2760000
heap
page read and write
3821000
trusted library allocation
page read and write
29D0000
trusted library allocation
page read and write
3888000
trusted library allocation
page read and write
78F2000
heap
page read and write
3842000
trusted library allocation
page read and write
2395000
trusted library allocation
page read and write
86A7000
trusted library allocation
page read and write
6F56000
heap
page read and write
4E5000
heap
page read and write
5ACE000
stack
page read and write
1D4000
unkown
page execute and read and write
5171000
trusted library allocation
page read and write
7E50000
heap
page read and write
7F038000
trusted library allocation
page execute and read and write
7C30000
trusted library allocation
page read and write
8858000
heap
page read and write
83AE000
stack
page read and write
6F1B000
heap
page read and write
4640000
heap
page execute and read and write
8DC000
heap
page read and write
2984000
trusted library allocation
page read and write
660000
trusted library allocation
page read and write
6B0000
heap
page read and write
78ED000
heap
page read and write
475B000
stack
page read and write
33C0000
heap
page readonly
2900000
remote allocation
page read and write
3859000
trusted library allocation
page read and write
8C8000
heap
page read and write
3851000
trusted library allocation
page read and write
6067000
trusted library allocation
page read and write
3A25000
trusted library allocation
page read and write
3842000
trusted library allocation
page read and write
8B6000
heap
page read and write
3865000
trusted library allocation
page read and write
7B80000
trusted library allocation
page read and write
6F3F000
heap
page read and write
3843000
trusted library allocation
page read and write
6B68000
heap
page read and write
2170000
trusted library allocation
page read and write
8798000
heap
page read and write
71E0000
trusted library allocation
page read and write
384C000
trusted library allocation
page read and write
3855000
trusted library allocation
page read and write
80AC000
stack
page read and write
C7E000
stack
page read and write
4C5C000
stack
page read and write
7ED0000
heap
page read and write
7F02000
heap
page read and write
382A000
trusted library allocation
page read and write
8B5E000
stack
page read and write
499E000
stack
page read and write
8BE000
heap
page read and write
78C8000
heap
page read and write
5A88000
trusted library allocation
page read and write
885C000
heap
page read and write
806E000
stack
page read and write
3830000
trusted library allocation
page read and write
6F14000
heap
page read and write
2DB0000
heap
page read and write
6FC0000
trusted library allocation
page read and write
3874000
trusted library allocation
page read and write
387F000
trusted library allocation
page read and write
7E65000
heap
page read and write
2630000
direct allocation
page execute and read and write
2190000
heap
page read and write
5F60000
heap
page read and write
4BE000
stack
page read and write
389B000
trusted library allocation
page read and write
7B60000
trusted library allocation
page read and write
8BB000
heap
page read and write
8700000
trusted library allocation
page read and write
3860000
trusted library allocation
page read and write
8220000
trusted library allocation
page execute and read and write
2798000
heap
page read and write
23D9000
trusted library allocation
page read and write
8F0000
heap
page read and write
8B8000
heap
page read and write
8DA000
heap
page read and write
3891000
trusted library allocation
page read and write
7EE000
heap
page read and write
387B000
trusted library allocation
page read and write
2460000
heap
page read and write
5191000
trusted library allocation
page read and write
3851000
trusted library allocation
page read and write
470000
heap
page read and write
274E000
stack
page read and write
388B000
trusted library allocation
page read and write
8BB000
heap
page read and write
38B9000
trusted library allocation
page read and write
2A60000
heap
page readonly
33FF000
stack
page read and write
2363000
trusted library allocation
page read and write
687000
trusted library allocation
page execute and read and write
5A8F000
trusted library allocation
page read and write
383A000
trusted library allocation
page read and write
8DE000
heap
page read and write
7BB0000
trusted library allocation
page read and write
3867000
trusted library allocation
page read and write
7E69000
heap
page read and write
3890000
trusted library allocation
page read and write
There are 858 hidden memdumps, click here to show them.