IOC Report
PROFORMA + PENDENTES.exe

loading gif

Files

File Path
Type
Category
Malicious
PROFORMA + PENDENTES.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\PROFORMA + PENDENTES.exe.log
ASCII text, with CRLF line terminators
dropped
malicious
C:\Users\user\AppData\Local\Temp\tmp3E72.tmp
XML 1.0 document, ASCII text
dropped
malicious
C:\Users\user\AppData\Roaming\WYqxTmjfOgdZ.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\WYqxTmjfOgdZ.exe:Zone.Identifier
ASCII text, with CRLF line terminators
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\WYqxTmjfOgdZ.exe.log
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
data
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_a41imsea.4lc.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_eho15iwf.cdu.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_fry22dqo.hu3.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_jmysbgfb.mwn.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_mnpdhtg0.q55.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_s1byb13s.bgf.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_yb3owk2l.o5a.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_yeyidcty.klj.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\tmp5B41.tmp
XML 1.0 document, ASCII text
dropped
There are 6 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\PROFORMA + PENDENTES.exe
"C:\Users\user\Desktop\PROFORMA + PENDENTES.exe"
malicious
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\PROFORMA + PENDENTES.exe"
malicious
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\WYqxTmjfOgdZ.exe"
malicious
C:\Windows\SysWOW64\schtasks.exe
"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\WYqxTmjfOgdZ" /XML "C:\Users\user\AppData\Local\Temp\tmp3E72.tmp"
malicious
C:\Users\user\Desktop\PROFORMA + PENDENTES.exe
"C:\Users\user\Desktop\PROFORMA + PENDENTES.exe"
malicious
C:\Users\user\Desktop\PROFORMA + PENDENTES.exe
"C:\Users\user\Desktop\PROFORMA + PENDENTES.exe"
malicious
C:\Users\user\Desktop\PROFORMA + PENDENTES.exe
"C:\Users\user\Desktop\PROFORMA + PENDENTES.exe"
malicious
C:\Users\user\AppData\Roaming\WYqxTmjfOgdZ.exe
C:\Users\user\AppData\Roaming\WYqxTmjfOgdZ.exe
malicious
C:\Windows\SysWOW64\schtasks.exe
"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\WYqxTmjfOgdZ" /XML "C:\Users\user\AppData\Local\Temp\tmp5B41.tmp"
malicious
C:\Users\user\AppData\Roaming\WYqxTmjfOgdZ.exe
"C:\Users\user\AppData\Roaming\WYqxTmjfOgdZ.exe"
malicious
C:\Windows\SysWOW64\cmd.exe
"C:\Windows\System32\cmd.exe" /C choice /C Y /N /D Y /T 3 & Del "C:\Users\user\Desktop\PROFORMA + PENDENTES.exe"
malicious
C:\Windows\SysWOW64\cmd.exe
"C:\Windows\System32\cmd.exe" /C choice /C Y /N /D Y /T 3 & Del "C:\Users\user\AppData\Roaming\WYqxTmjfOgdZ.exe"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\wbem\WmiPrvSE.exe
C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\choice.exe
choice /C Y /N /D Y /T 3
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\choice.exe
choice /C Y /N /D Y /T 3
There are 11 hidden processes, click here to show them.

URLs

Name
IP
Malicious
http://checkip.dyndns.org/
158.101.44.242
http://checkip.dyndns.orgH
unknown
http://checkip.dyndns.org/q
unknown
http://crl.mv
unknown
https://www.google.com/#q=
unknown
http://reallyfreegeoip.org
unknown
https://reallyfreegeoip.org
unknown
http://checkip.dyndns.org
unknown
http://checkip.dyndns.com
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
https://reallyfreegeoip.org/xml/155.94.241.187$
unknown
https://reallyfreegeoip.org/xml/155.94.241.187
188.114.97.3
https://reallyfreegeoip.org/xml/
unknown
There are 3 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
18.31.95.13.in-addr.arpa
unknown
malicious
reallyfreegeoip.org
188.114.97.3
checkip.dyndns.com
158.101.44.242
checkip.dyndns.org
unknown

IPs

IP
Domain
Country
Malicious
188.114.97.3
reallyfreegeoip.org
European Union
158.101.44.242
checkip.dyndns.com
United States

Registry

Path
Value
Malicious
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\PROFORMA + PENDENTES_RASAPI32
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\PROFORMA + PENDENTES_RASAPI32
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\PROFORMA + PENDENTES_RASAPI32
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\PROFORMA + PENDENTES_RASAPI32
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\PROFORMA + PENDENTES_RASAPI32
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\PROFORMA + PENDENTES_RASAPI32
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\PROFORMA + PENDENTES_RASAPI32
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\PROFORMA + PENDENTES_RASMANCS
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\PROFORMA + PENDENTES_RASMANCS
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\PROFORMA + PENDENTES_RASMANCS
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\PROFORMA + PENDENTES_RASMANCS
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\PROFORMA + PENDENTES_RASMANCS
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\PROFORMA + PENDENTES_RASMANCS
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\PROFORMA + PENDENTES_RASMANCS
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\WYqxTmjfOgdZ_RASAPI32
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\WYqxTmjfOgdZ_RASAPI32
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\WYqxTmjfOgdZ_RASAPI32
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\WYqxTmjfOgdZ_RASAPI32
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\WYqxTmjfOgdZ_RASAPI32
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\WYqxTmjfOgdZ_RASAPI32
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\WYqxTmjfOgdZ_RASAPI32
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\WYqxTmjfOgdZ_RASMANCS
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\WYqxTmjfOgdZ_RASMANCS
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\WYqxTmjfOgdZ_RASMANCS
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\WYqxTmjfOgdZ_RASMANCS
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\WYqxTmjfOgdZ_RASMANCS
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\WYqxTmjfOgdZ_RASMANCS
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\WYqxTmjfOgdZ_RASMANCS
FileDirectory
There are 19 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
2C91000
trusted library allocation
page read and write
malicious
402000
remote allocation
page execute and read and write
malicious
2D71000
trusted library allocation
page read and write
malicious
3791000
trusted library allocation
page read and write
malicious
864000
heap
page read and write
B1D000
trusted library allocation
page execute and read and write
A32E000
stack
page read and write
6BD0000
heap
page read and write
2BA5000
trusted library allocation
page read and write
64DD000
heap
page read and write
2D90000
trusted library allocation
page read and write
5194000
trusted library allocation
page read and write
A46E000
stack
page read and write
FF0000
trusted library allocation
page execute and read and write
A00000
heap
page read and write
70A0000
heap
page read and write
2B63000
trusted library allocation
page read and write
2C96000
trusted library allocation
page read and write
2D59000
trusted library allocation
page read and write
4BD4000
trusted library allocation
page read and write
641E000
stack
page read and write
5210000
trusted library allocation
page read and write
AD4000
heap
page read and write
2B87000
trusted library allocation
page read and write
2A41000
trusted library allocation
page read and write
2BA9000
trusted library allocation
page read and write
2F31000
trusted library allocation
page read and write
2C65000
trusted library allocation
page read and write
7BE000
unkown
page read and write
2C63000
trusted library allocation
page read and write
2A3E000
stack
page read and write
2C71000
trusted library allocation
page read and write
2B43000
trusted library allocation
page read and write
D37000
stack
page read and write
2DCE000
unkown
page read and write
6E20000
trusted library allocation
page execute and read and write
573E000
stack
page read and write
4ED0000
heap
page execute and read and write
7140000
trusted library allocation
page read and write
2EE8000
trusted library allocation
page read and write
F40000
trusted library allocation
page read and write
2BE3000
trusted library allocation
page read and write
B30000
trusted library allocation
page read and write
12E0000
trusted library allocation
page read and write
D87000
stack
page read and write
78F000
stack
page read and write
32BE000
stack
page read and write
2F23000
trusted library allocation
page read and write
6D20000
heap
page read and write
3B23000
trusted library allocation
page read and write
2B25000
trusted library allocation
page read and write
6E40000
trusted library allocation
page execute and read and write
7650000
trusted library allocation
page read and write
4E2C000
stack
page read and write
70C0000
trusted library section
page read and write
5C00000
trusted library section
page read and write
2AFF000
trusted library allocation
page read and write
2E7D000
trusted library allocation
page read and write
72A0000
heap
page read and write
A18E000
stack
page read and write
2CF5000
trusted library allocation
page read and write
5F40000
trusted library allocation
page execute and read and write
B32000
trusted library allocation
page read and write
5D7000
stack
page read and write
3010000
heap
page read and write
278E000
stack
page read and write
553F000
stack
page read and write
F42000
heap
page read and write
2BBD000
trusted library allocation
page read and write
2B17000
trusted library allocation
page read and write
2BEF000
trusted library allocation
page read and write
D80000
heap
page read and write
6D1F000
stack
page read and write
2BE1000
trusted library allocation
page read and write
B36000
trusted library allocation
page execute and read and write
5D00000
trusted library allocation
page read and write
12F7000
trusted library allocation
page execute and read and write
527D000
stack
page read and write
689F000
stack
page read and write
5020000
trusted library allocation
page read and write
2BC5000
trusted library allocation
page read and write
A7EF000
stack
page read and write
2EFD000
stack
page read and write
FE0000
heap
page execute and read and write
2BF1000
trusted library allocation
page read and write
685E000
stack
page read and write
1057000
heap
page read and write
2C70000
trusted library allocation
page read and write
2A6D000
trusted library allocation
page read and write
5F90000
heap
page read and write
B2D000
trusted library allocation
page execute and read and write
EDE000
stack
page read and write
2C23000
trusted library allocation
page read and write
2B53000
trusted library allocation
page read and write
2BFD000
trusted library allocation
page read and write
66DE000
stack
page read and write
10E0000
heap
page read and write
4F10000
heap
page execute and read and write
F66000
trusted library allocation
page execute and read and write
2DE8000
trusted library allocation
page read and write
6EF000
stack
page read and write
E7F000
heap
page read and write
2BA1000
trusted library allocation
page read and write
2B21000
trusted library allocation
page read and write
2D98000
trusted library allocation
page read and write
2DE0000
trusted library allocation
page read and write
2BA7000
trusted library allocation
page read and write
4C3D000
trusted library allocation
page read and write
3C52000
trusted library allocation
page read and write
2B9D000
trusted library allocation
page read and write
2C55000
trusted library allocation
page read and write
2B45000
trusted library allocation
page read and write
2D0A000
stack
page read and write
2D80000
heap
page read and write
2C3F000
trusted library allocation
page read and write
74E000
stack
page read and write
5C10000
heap
page read and write
780000
heap
page read and write
2B6F000
trusted library allocation
page read and write
4C00000
trusted library allocation
page read and write
635E000
stack
page read and write
2B29000
trusted library allocation
page read and write
9EDE000
stack
page read and write
2B5D000
trusted library allocation
page read and write
5C20000
heap
page read and write
2B83000
trusted library allocation
page read and write
2BB5000
trusted library allocation
page read and write
54FB000
stack
page read and write
67DF000
stack
page read and write
2CBC000
stack
page read and write
EED000
heap
page read and write
2BC1000
trusted library allocation
page read and write
2C39000
trusted library allocation
page read and write
10A6000
trusted library allocation
page read and write
611E000
stack
page read and write
5040000
trusted library allocation
page read and write
E60000
heap
page read and write
579D000
stack
page read and write
2C41000
trusted library allocation
page read and write
675E000
stack
page read and write
3050000
heap
page read and write
5BFD000
stack
page read and write
2BBB000
trusted library allocation
page read and write
2C81000
trusted library allocation
page read and write
3C0E000
trusted library allocation
page read and write
A04E000
stack
page read and write
BAE000
stack
page read and write
5045000
trusted library allocation
page read and write
5290000
trusted library allocation
page read and write
506E000
stack
page read and write
2B4D000
trusted library allocation
page read and write
2C2B000
trusted library allocation
page read and write
2FF0000
heap
page read and write
1080000
trusted library allocation
page read and write
488B000
stack
page read and write
12F0000
trusted library allocation
page read and write
C8B000
stack
page read and write
2D56000
trusted library allocation
page read and write
840000
heap
page read and write
2B69000
trusted library allocation
page read and write
323F000
unkown
page read and write
9D9E000
stack
page read and write
2ECD000
trusted library allocation
page read and write
625E000
stack
page read and write
9FE000
stack
page read and write
2BF7000
trusted library allocation
page read and write
F43000
trusted library allocation
page execute and read and write
A56E000
stack
page read and write
2791000
trusted library allocation
page read and write
2B49000
trusted library allocation
page read and write
12E6000
trusted library allocation
page execute and read and write
2B67000
trusted library allocation
page read and write
2B57000
trusted library allocation
page read and write
2B13000
trusted library allocation
page read and write
2BD0000
heap
page read and write
2C25000
trusted library allocation
page read and write
2D9C000
trusted library allocation
page read and write
2B6B000
trusted library allocation
page read and write
2C07000
trusted library allocation
page read and write
2BC3000
trusted library allocation
page read and write
2BDD000
trusted library allocation
page read and write
2DF9000
trusted library allocation
page read and write
2B61000
trusted library allocation
page read and write
2B03000
trusted library allocation
page read and write
64A0000
heap
page read and write
68DE000
stack
page read and write
2BB7000
trusted library allocation
page read and write
F72000
trusted library allocation
page read and write
2C77000
trusted library allocation
page read and write
2AC7000
trusted library allocation
page read and write
2B95000
trusted library allocation
page read and write
2EBD000
trusted library allocation
page read and write
10B2000
trusted library allocation
page read and write
51ED000
stack
page read and write
2F1F000
trusted library allocation
page read and write
4E8D000
trusted library allocation
page read and write
2DEC000
trusted library allocation
page read and write
119E000
stack
page read and write
69DE000
stack
page read and write
730000
heap
page read and write
2930000
heap
page read and write
5C57000
heap
page read and write
A14F000
stack
page read and write
AF7000
stack
page read and write
5AF0000
heap
page read and write
A0E000
heap
page read and write
2D4D000
stack
page read and write
4FE0000
heap
page read and write
4BF6000
trusted library allocation
page read and write
2B3D000
trusted library allocation
page read and write
13C0000
heap
page read and write
577E000
stack
page read and write
2AF7000
trusted library allocation
page read and write
1060000
trusted library allocation
page read and write
2B99000
trusted library allocation
page read and write
9B0000
heap
page read and write
F50000
trusted library allocation
page read and write
3034000
heap
page read and write
3078000
heap
page read and write
5C5F000
heap
page read and write
2C6E000
stack
page read and write
10C6000
trusted library allocation
page read and write
EE0000
heap
page read and write
5200000
trusted library allocation
page read and write
1426000
trusted library allocation
page read and write
2C5B000
trusted library allocation
page read and write
2B05000
trusted library allocation
page read and write
32BF000
stack
page read and write
3031000
heap
page read and write
2B5B000
trusted library allocation
page read and write
2DE4000
trusted library allocation
page read and write
6C1E000
stack
page read and write
2E52000
trusted library allocation
page read and write
B47000
trusted library allocation
page execute and read and write
12C0000
trusted library allocation
page read and write
2B1D000
trusted library allocation
page read and write
519E000
trusted library allocation
page read and write
2C49000
trusted library allocation
page read and write
2BE9000
trusted library allocation
page read and write
2BCD000
trusted library allocation
page read and write
2CD4000
trusted library allocation
page read and write
5AC0000
trusted library allocation
page read and write
67C000
stack
page read and write
2B71000
trusted library allocation
page read and write
2C3B000
trusted library allocation
page read and write
2F3F000
trusted library allocation
page read and write
328E000
stack
page read and write
BB0000
heap
page read and write
5270000
heap
page read and write
D50000
trusted library allocation
page read and write
4C02000
trusted library allocation
page read and write
AAAD000
stack
page read and write
12E2000
trusted library allocation
page read and write
2B89000
trusted library allocation
page read and write
2B79000
trusted library allocation
page read and write
649F000
stack
page read and write
5500000
trusted library section
page readonly
AB3000
heap
page read and write
2AF3000
trusted library allocation
page read and write
E6E000
heap
page read and write
CCF000
stack
page read and write
2BEB000
trusted library allocation
page read and write
4C60000
trusted library allocation
page read and write
33FF000
stack
page read and write
C3B000
stack
page read and write
2B93000
trusted library allocation
page read and write
51E0000
trusted library allocation
page read and write
13C7000
heap
page read and write
661E000
stack
page read and write
2C69000
trusted library allocation
page read and write
103E000
heap
page read and write
2B2F000
trusted library allocation
page read and write
56FD000
stack
page read and write
25B0000
trusted library allocation
page read and write
2B35000
trusted library allocation
page read and write
F6A000
trusted library allocation
page execute and read and write
D40000
trusted library allocation
page read and write
2D3C000
trusted library allocation
page read and write
2B07000
trusted library allocation
page read and write
61DE000
stack
page read and write
A82E000
stack
page read and write
2B7B000
trusted library allocation
page read and write
D1E000
stack
page read and write
255E000
stack
page read and write
2C67000
trusted library allocation
page read and write
A20E000
stack
page read and write
327E000
unkown
page read and write
2C0D000
trusted library allocation
page read and write
25A0000
trusted library allocation
page execute and read and write
2DDC000
trusted library allocation
page read and write
2C33000
trusted library allocation
page read and write
4C10000
trusted library allocation
page read and write
6BBD000
stack
page read and write
D8B000
trusted library allocation
page execute and read and write
2C1F000
trusted library allocation
page read and write
6AE000
stack
page read and write
5080000
trusted library allocation
page read and write
F30000
trusted library allocation
page read and write
3370000
heap
page read and write
CD0000
heap
page read and write
115E000
stack
page read and write
2B39000
trusted library allocation
page read and write
D70000
trusted library allocation
page read and write
3300000
heap
page read and write
A28E000
stack
page read and write
2EB5000
trusted library allocation
page read and write
109E000
trusted library allocation
page read and write
4E80000
trusted library allocation
page read and write
3400000
heap
page read and write
7CE000
stack
page read and write
2C59000
trusted library allocation
page read and write
72DC000
heap
page read and write
2BFB000
trusted library allocation
page read and write
2C4B000
trusted library allocation
page read and write
F4D000
trusted library allocation
page execute and read and write
3CB7000
trusted library allocation
page read and write
50A8000
heap
page read and write
B10000
trusted library allocation
page read and write
2C15000
trusted library allocation
page read and write
105E000
stack
page read and write
2D94000
trusted library allocation
page read and write
D53000
trusted library allocation
page execute and read and write
1424000
trusted library allocation
page read and write
779E000
stack
page read and write
12EA000
trusted library allocation
page execute and read and write
2F03000
trusted library allocation
page read and write
2BDB000
trusted library allocation
page read and write
F00000
heap
page read and write
750000
heap
page read and write
E40000
trusted library allocation
page execute and read and write
2BF9000
trusted library allocation
page read and write
101E000
stack
page read and write
729E000
stack
page read and write
62DE000
stack
page read and write
501E000
stack
page read and write
10AD000
trusted library allocation
page read and write
2B51000
trusted library allocation
page read and write
304D000
unkown
page read and write
5D04000
trusted library allocation
page read and write
718E000
stack
page read and write
2BDF000
trusted library allocation
page read and write
3C4E000
trusted library allocation
page read and write
2C61000
trusted library allocation
page read and write
72B2000
heap
page read and write
2F10000
heap
page read and write
75AE000
stack
page read and write
51B9000
trusted library allocation
page read and write
2B0F000
trusted library allocation
page read and write
310A000
heap
page read and write
3B89000
trusted library allocation
page read and write
2B7D000
trusted library allocation
page read and write
621F000
stack
page read and write
2BCB000
trusted library allocation
page read and write
6C4C000
stack
page read and write
720000
heap
page read and write
770000
heap
page read and write
730000
heap
page read and write
5EAD000
stack
page read and write
10C4000
trusted library allocation
page read and write
2B33000
trusted library allocation
page read and write
2C17000
trusted library allocation
page read and write
F28000
heap
page read and write
2B0B000
trusted library allocation
page read and write
E3C000
stack
page read and write
AA6C000
stack
page read and write
52A0000
heap
page read and write
EFF000
heap
page read and write
2CE1000
trusted library allocation
page read and write
2B7F000
trusted library allocation
page read and write
2C73000
trusted library allocation
page read and write
2B41000
trusted library allocation
page read and write
5DA0000
heap
page read and write
2D20000
trusted library allocation
page read and write
CD5000
heap
page read and write
2C0B000
trusted library allocation
page read and write
1437000
heap
page read and write
2C6F000
trusted library allocation
page read and write
2B3F000
trusted library allocation
page read and write
52B0000
trusted library section
page readonly
A36000
heap
page read and write
2B8B000
trusted library allocation
page read and write
2AF9000
trusted library allocation
page read and write
2B97000
trusted library allocation
page read and write
2BD1000
trusted library allocation
page read and write
2BAD000
trusted library allocation
page read and write
D60000
trusted library allocation
page read and write
665E000
stack
page read and write
2C45000
trusted library allocation
page read and write
D54000
trusted library allocation
page read and write
3CD000
stack
page read and write
5F30000
trusted library allocation
page read and write
770000
heap
page read and write
A3CE000
stack
page read and write
565E000
stack
page read and write
3AB6000
trusted library allocation
page read and write
528E000
stack
page read and write
2BB9000
trusted library allocation
page read and write
2B23000
trusted library allocation
page read and write
4D14000
heap
page read and write
2D71000
trusted library allocation
page read and write
5D10000
trusted library allocation
page read and write
2EB1000
trusted library allocation
page read and write
3D99000
trusted library allocation
page read and write
3070000
heap
page read and write
50A4000
heap
page read and write
2B37000
trusted library allocation
page read and write
98E000
stack
page read and write
4BD0000
trusted library allocation
page read and write
2B09000
trusted library allocation
page read and write
2C4F000
trusted library allocation
page read and write
13A0000
trusted library allocation
page execute and read and write
131E000
stack
page read and write
5CF0000
trusted library allocation
page execute and read and write
2A07000
heap
page read and write
ABAE000
stack
page read and write
3CB9000
trusted library allocation
page read and write
DFE000
stack
page read and write
E9E000
stack
page read and write
2C4D000
trusted library allocation
page read and write
525D000
stack
page read and write
51B6000
trusted library allocation
page read and write
2B19000
trusted library allocation
page read and write
12C3000
trusted library allocation
page execute and read and write
2B81000
trusted library allocation
page read and write
2D8A000
stack
page read and write
6B4C000
stack
page read and write
5F80000
trusted library allocation
page read and write
2C31000
trusted library allocation
page read and write
129E000
stack
page read and write
DB0000
heap
page read and write
5E5E000
stack
page read and write
5170000
heap
page read and write
2BCF000
trusted library allocation
page read and write
700000
heap
page read and write
1020000
heap
page read and write
A40B000
stack
page read and write
5350000
heap
page read and write
1028000
heap
page read and write
D7A000
trusted library allocation
page execute and read and write
2E79000
trusted library allocation
page read and write
2E3D000
trusted library allocation
page read and write
2AF1000
trusted library allocation
page read and write
3B2000
unkown
page readonly
B20000
trusted library allocation
page read and write
4D10000
heap
page read and write
619E000
stack
page read and write
12CD000
trusted library allocation
page execute and read and write
2AAB000
trusted library allocation
page read and write
1010000
trusted library allocation
page read and write
509C000
stack
page read and write
139C000
stack
page read and write
84C000
heap
page read and write
A650000
trusted library allocation
page execute and read and write
B14000
trusted library allocation
page read and write
2C1B000
trusted library allocation
page read and write
2D60000
heap
page read and write
400000
remote allocation
page execute and read and write
D5D000
trusted library allocation
page execute and read and write
29E6000
trusted library allocation
page read and write
2E41000
trusted library allocation
page read and write
709000
stack
page read and write
4C35000
trusted library allocation
page read and write
713D000
trusted library allocation
page read and write
64AC000
heap
page read and write
2C83000
trusted library allocation
page read and write
590000
heap
page read and write
2BBF000
trusted library allocation
page read and write
2D00000
trusted library allocation
page read and write
2BE7000
trusted library allocation
page read and write
79F3000
heap
page read and write
2B3B000
trusted library allocation
page read and write
10C0000
trusted library allocation
page read and write
51D0000
trusted library allocation
page read and write
301C000
heap
page read and write
2E69000
trusted library allocation
page read and write
12B0000
trusted library allocation
page read and write
639E000
stack
page read and write
2AF5000
trusted library allocation
page read and write
7E0000
heap
page read and write
50A0000
heap
page read and write
A5AE000
stack
page read and write
2C35000
trusted library allocation
page read and write
3BED000
trusted library allocation
page read and write
2A6B000
trusted library allocation
page read and write
3C2F000
trusted library allocation
page read and write
2C37000
trusted library allocation
page read and write
2D88000
trusted library allocation
page read and write
4BF1000
trusted library allocation
page read and write
5F8C000
trusted library allocation
page read and write
2BAB000
trusted library allocation
page read and write
1050000
heap
page read and write
6DAE000
stack
page read and write
2A00000
heap
page read and write
5C15000
heap
page read and write
4E8A000
trusted library allocation
page read and write
2C7D000
trusted library allocation
page read and write
2C03000
trusted library allocation
page read and write
1310000
trusted library allocation
page read and write
54BE000
stack
page read and write
D6D000
trusted library allocation
page execute and read and write
2C9F000
stack
page read and write
2C5D000
trusted library allocation
page read and write
324F000
unkown
page read and write
2C80000
heap
page execute and read and write
52C0000
heap
page read and write
79E000
stack
page read and write
2E38000
trusted library allocation
page read and write
6F0000
heap
page read and write
2C8E000
trusted library allocation
page read and write
2C21000
trusted library allocation
page read and write
5C30000
heap
page read and write
681E000
stack
page read and write
1084000
trusted library allocation
page read and write
2B77000
trusted library allocation
page read and write
259B000
stack
page read and write
D72000
trusted library allocation
page read and write
32F0000
heap
page read and write
2D30000
heap
page read and write
4EB0000
trusted library allocation
page read and write
4DA000
stack
page read and write
2B01000
trusted library allocation
page read and write
F00000
heap
page read and write
529F000
stack
page read and write
3C91000
trusted library allocation
page read and write
72ED000
heap
page read and write
2B91000
trusted library allocation
page read and write
2BB3000
trusted library allocation
page read and write
4F00000
trusted library allocation
page read and write
2B6D000
trusted library allocation
page read and write
2CC4000
trusted library allocation
page read and write
A64E000
stack
page read and write
2B1B000
trusted library allocation
page read and write
2BAF000
trusted library allocation
page read and write
2DC0000
heap
page read and write
691E000
stack
page read and write
524D000
stack
page read and write
4BDB000
trusted library allocation
page read and write
E37000
heap
page read and write
2AFD000
trusted library allocation
page read and write
2C27000
trusted library allocation
page read and write
2D86000
trusted library allocation
page read and write
2EDA000
trusted library allocation
page read and write
5FA0000
heap
page read and write
2B75000
trusted library allocation
page read and write
2CE6000
trusted library allocation
page read and write
4E90000
trusted library allocation
page read and write
502B000
stack
page read and write
2B65000
trusted library allocation
page read and write
2C19000
trusted library allocation
page read and write
2C5F000
trusted library allocation
page read and write
2C0F000
trusted library allocation
page read and write
2BC7000
trusted library allocation
page read and write
4E6C000
stack
page read and write
631E000
stack
page read and write
108B000
trusted library allocation
page read and write
2C05000
trusted library allocation
page read and write
669D000
stack
page read and write
2C51000
trusted library allocation
page read and write
4BEE000
trusted library allocation
page read and write
57DE000
stack
page read and write
2C2D000
trusted library allocation
page read and write
A54E000
stack
page read and write
2C53000
trusted library allocation
page read and write
2B0D000
trusted library allocation
page read and write
2B55000
trusted library allocation
page read and write
A6EE000
stack
page read and write
769E000
stack
page read and write
3C97000
trusted library allocation
page read and write
2CE9000
trusted library allocation
page read and write
DC5000
heap
page read and write
2B85000
trusted library allocation
page read and write
2BD9000
trusted library allocation
page read and write
2B4F000
trusted library allocation
page read and write
A50C000
stack
page read and write
A42E000
stack
page read and write
448000
unkown
page readonly
B13000
trusted library allocation
page execute and read and write
60DE000
stack
page read and write
12FB000
trusted library allocation
page execute and read and write
E50000
heap
page execute and read and write
F44000
trusted library allocation
page read and write
13B0000
heap
page read and write
2E71000
trusted library allocation
page read and write
2680000
heap
page execute and read and write
2B9B000
trusted library allocation
page read and write
7FE000
stack
page read and write
5EDF000
stack
page read and write
2C6B000
trusted library allocation
page read and write
78CE000
stack
page read and write
2A73000
trusted library allocation
page read and write
D87000
trusted library allocation
page execute and read and write
5540000
trusted library allocation
page read and write
2C9A000
trusted library allocation
page read and write
2A57000
trusted library allocation
page read and write
4FE4000
heap
page read and write
EBB000
heap
page read and write
2C3D000
trusted library allocation
page read and write
4BFD000
trusted library allocation
page read and write
10D0000
heap
page read and write
2B9D000
stack
page read and write
2BD5000
trusted library allocation
page read and write
104A000
heap
page read and write
2C7F000
trusted library allocation
page read and write
10D0000
trusted library allocation
page read and write
5340000
heap
page read and write
728E000
stack
page read and write
52C000
stack
page read and write
681F000
stack
page read and write
3D71000
trusted library allocation
page read and write
2C29000
trusted library allocation
page read and write
2EC9000
trusted library allocation
page read and write
121E000
stack
page read and write
2C4F000
stack
page read and write
327E000
stack
page read and write
CBF000
stack
page read and write
9B6000
heap
page read and write
3B0000
unkown
page readonly
2BC9000
trusted library allocation
page read and write
2E67000
trusted library allocation
page read and write
F62000
trusted library allocation
page read and write
2C57000
trusted library allocation
page read and write
597F000
stack
page read and write
52C0000
heap
page read and write
A2CD000
stack
page read and write
945000
heap
page read and write
27AD000
trusted library allocation
page read and write
3000000
heap
page read and write
2E75000
trusted library allocation
page read and write
2C01000
trusted library allocation
page read and write
2CCE000
trusted library allocation
page read and write
2B11000
trusted library allocation
page read and write
4CCC000
stack
page read and write
4EB0000
heap
page read and write
2C47000
trusted library allocation
page read and write
72CE000
stack
page read and write
840000
heap
page read and write
605E000
stack
page read and write
3D77000
trusted library allocation
page read and write
6ABC000
stack
page read and write
2B9F000
trusted library allocation
page read and write
12D0000
trusted library allocation
page read and write
2DD4000
trusted library allocation
page read and write
A96C000
stack
page read and write
3A41000
trusted library allocation
page read and write
2B31000
trusted library allocation
page read and write
FDE000
stack
page read and write
5AD0000
trusted library allocation
page read and write
6FD000
stack
page read and write
65DE000
stack
page read and write
6560000
heap
page read and write
2B8D000
trusted library allocation
page read and write
2D70000
heap
page read and write
2BFF000
trusted library allocation
page read and write
2DD0000
trusted library allocation
page read and write
2BF5000
trusted library allocation
page read and write
51D6000
trusted library allocation
page read and write
10A1000
trusted library allocation
page read and write
5F20000
trusted library allocation
page execute and read and write
2CF0000
heap
page read and write
DC0000
heap
page read and write
862000
heap
page read and write
1000000
heap
page read and write
2C75000
trusted library allocation
page read and write
2A9E000
trusted library allocation
page read and write
2E14000
trusted library allocation
page read and write
51C5000
trusted library allocation
page read and write
4EAE000
stack
page read and write
7120000
heap
page read and write
920000
heap
page read and write
4C20000
trusted library allocation
page read and write
79D0000
heap
page read and write
A0A000
heap
page read and write
B42000
trusted library allocation
page read and write
2D4A000
trusted library allocation
page read and write
5320000
heap
page read and write
2CCD000
stack
page read and write
581E000
stack
page read and write
51A4000
trusted library allocation
page read and write
51D4000
trusted library allocation
page read and write
2C1D000
trusted library allocation
page read and write
5210000
heap
page execute and read and write
52C4000
heap
page read and write
2E3A000
trusted library allocation
page read and write
2EC1000
trusted library allocation
page read and write
52C8000
heap
page read and write
A010000
heap
page read and write
110D000
heap
page read and write
F60000
trusted library allocation
page read and write
F7B000
trusted library allocation
page execute and read and write
4EC0000
trusted library allocation
page execute and read and write
E08000
heap
page read and write
4E85000
trusted library allocation
page read and write
2C7B000
trusted library allocation
page read and write
1430000
heap
page read and write
575E000
stack
page read and write
4C30000
trusted library allocation
page read and write
135E000
stack
page read and write
671E000
stack
page read and write
A28000
heap
page read and write
2C0E000
stack
page read and write
2B4B000
trusted library allocation
page read and write
679E000
stack
page read and write
2DD8000
trusted library allocation
page read and write
2C43000
trusted library allocation
page read and write
5590000
heap
page read and write
2B2B000
trusted library allocation
page read and write
2D41000
trusted library allocation
page read and write
2C09000
trusted library allocation
page read and write
DA0000
trusted library allocation
page read and write
655F000
stack
page read and write
7130000
trusted library allocation
page read and write
79CE000
stack
page read and write
1070000
trusted library allocation
page read and write
5070000
trusted library allocation
page execute and read and write
65AE000
heap
page read and write
645E000
stack
page read and write
51F0000
heap
page read and write
B00000
trusted library allocation
page read and write
2B10000
heap
page read and write
609E000
stack
page read and write
2B1F000
trusted library allocation
page read and write
2D70000
heap
page read and write
2BF3000
trusted library allocation
page read and write
5FDE000
stack
page read and write
7422000
trusted library allocation
page read and write
6CAE000
stack
page read and write
2E5D000
trusted library allocation
page read and write
314E000
unkown
page read and write
2BD7000
trusted library allocation
page read and write
2D4D000
trusted library allocation
page read and write
6C60000
heap
page read and write
5C4E000
stack
page read and write
2E06000
trusted library allocation
page read and write
2B2D000
trusted library allocation
page read and write
2C79000
trusted library allocation
page read and write
12F2000
trusted library allocation
page read and write
1020000
heap
page read and write
5F95000
heap
page read and write
B4B000
trusted library allocation
page execute and read and write
865000
heap
page read and write
5FB0000
heap
page read and write
A46000
heap
page read and write
7080000
trusted library allocation
page execute and read and write
DB6000
heap
page read and write
A6AE000
stack
page read and write
3100000
heap
page read and write
2E50000
trusted library allocation
page read and write
A92E000
stack
page read and write
1420000
trusted library allocation
page read and write
740000
heap
page read and write
2E22000
trusted library allocation
page read and write
25D8000
trusted library allocation
page read and write
2C2F000
trusted library allocation
page read and write
2C11000
trusted library allocation
page read and write
D82000
trusted library allocation
page read and write
6E30000
trusted library allocation
page read and write
E68000
heap
page read and write
52B0000
heap
page read and write
F90000
trusted library allocation
page read and write
2C6D000
trusted library allocation
page read and write
2DD0000
heap
page read and write
32FF000
stack
page read and write
2EC5000
trusted library allocation
page read and write
2AFB000
trusted library allocation
page read and write
5A00000
trusted library allocation
page execute and read and write
2B27000
trusted library allocation
page read and write
4EC000
stack
page read and write
2D44000
trusted library allocation
page read and write
2C13000
trusted library allocation
page read and write
F77000
trusted library allocation
page execute and read and write
2B18000
heap
page read and write
5570000
heap
page execute and read and write
2BD3000
trusted library allocation
page read and write
2BB1000
trusted library allocation
page read and write
5F0E000
stack
page read and write
6BC000
stack
page read and write
EA2000
heap
page read and write
141E000
stack
page read and write
2B47000
trusted library allocation
page read and write
27FF000
stack
page read and write
4FD0000
heap
page read and write
2BED000
trusted library allocation
page read and write
E00000
heap
page read and write
2F46000
trusted library allocation
page read and write
4FDD000
stack
page read and write
2EB9000
trusted library allocation
page read and write
4B3B000
stack
page read and write
2B15000
trusted library allocation
page read and write
2B59000
trusted library allocation
page read and write
2D39000
trusted library allocation
page read and write
2B73000
trusted library allocation
page read and write
2670000
trusted library allocation
page read and write
5F5E000
stack
page read and write
2B8F000
trusted library allocation
page read and write
E29000
heap
page read and write
E95000
heap
page read and write
2BE5000
trusted library allocation
page read and write
12C4000
trusted library allocation
page read and write
2BA3000
trusted library allocation
page read and write
2B5F000
trusted library allocation
page read and write
B60000
trusted library allocation
page read and write
B3A000
trusted library allocation
page execute and read and write
D76000
trusted library allocation
page execute and read and write
25C0000
heap
page read and write
2B9F000
unkown
page read and write
4CF0000
trusted library allocation
page read and write
4C40000
trusted library allocation
page read and write
9DDE000
stack
page read and write
940000
heap
page read and write
5295000
trusted library allocation
page read and write
There are 800 hidden memdumps, click here to show them.