IOC Report
ORDER 20240986 OA.exe

loading gif

Files

File Path
Type
Category
Malicious
ORDER 20240986 OA.exe
PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
initial sample
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\bayberry\krselsretningerne\Includer.Dob
Dyalog APL transfer
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\bayberry\krselsretningerne\Logoi\moccasins.ved
data
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\bayberry\krselsretningerne\Logoi\sporostrote.dip
data
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\bayberry\krselsretningerne\Sipunculoidea.ude
DIY-Thermocam raw data (Lepton 2.x), scale 0-12, spot sensor temperature 0.000000, unit celsius, color scheme 0, calibration: offset 0.000000, slope 649037107316853453566312041152512.000000
dropped
C:\Users\user\AppData\Local\Temp\nsx1318.tmp\System.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\ORDER 20240986 OA.exe
"C:\Users\user\Desktop\ORDER 20240986 OA.exe"
malicious
C:\Users\user\Desktop\ORDER 20240986 OA.exe
"C:\Users\user\Desktop\ORDER 20240986 OA.exe"
malicious

URLs

Name
IP
Malicious
https://www.office.com/
unknown
https://duckduckgo.com/chrome_newtab
unknown
https://sierrassinfinusadas.com.ar/yak/ZnWGURK2.bin3
unknown
https://duckduckgo.com/ac/?q=
unknown
https://api.telegram.org
unknown
https://www.google.com/images/branding/product/ico/googleg_lodp.ico
unknown
https://api.telegram.org/bot/sendMessage?chat_id=&text=%20%0D%0A%0D%0APC%20Name:897506%0D%0ADate%20and%20Time:%2022/11/2024%20/%2006:52:58%0D%0ACountry%20Name:%20United%20States%0D%0A%5B%20897506%20Clicked%20on%20the%20File%20If%20you%20see%20nothing%20this's%20mean%20the%20system%20storage's%20empty.%20%5D
149.154.167.220
https://api.telegram.org/bot
unknown
https://chrome.google.com/webstore?hl=enH
unknown
https://api.telegram.org/bot/sendMessage?chat_id=&text=%20%0D%0A%0D%0APC%20Name:897506%0D%0ADate%20a
unknown
https://api.telegram.org/bot7396856636:AAFzZvZlhz352HQorBY7sPxLQBc4vVQnrB8/sendDocument?chat_id=6553726543&caption=%20Pc%20Name:%20user%20%7C%20/%20VIP%20Recovery%20%5C%0D%0A%0D%0ACookies%20%7C%20user%20%7C%20VIP%20Recovery
149.154.167.220
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
unknown
https://www.office.com/H
unknown
http://checkip.dyndns.org
unknown
https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
unknown
https://support.office.com/article/7D48285B-20E8-4B9B-91AD-216E34163BAD?wt.mc_id=EnterPK2016
unknown
http://nsis.sf.net/NSIS_ErrorError
unknown
https://support.office.com/article/94ba2e0b-638e-4a92-8857-2cb5ac1d8e17
unknown
https://api.telegram.org/bot/sendMessage?chat_id=&text=
unknown
https://chrome.google.com/webstore?hl=en
unknown
https://www.ecosia.org/newtab/
unknown
https://reallyfreegeoip.org/xml/8.46.123.75
188.114.96.3
http://varders.kozow.com:8081
unknown
https://chrome.google.com/webstore?hl=enWeb
unknown
https://www.office.com/lBdq
unknown
http://aborters.duckdns.org:8081
unknown
https://ac.ecosia.org/autocomplete?q=
unknown
http://checkip.dyndns.org/
158.101.44.242
https://chrome.google.com/webstore?hl=enlBdq
unknown
http://51.38.247.67:8081/_send_.php?L
unknown
http://anotherarmy.dns.army:8081
unknown
https://reallyfreegeoip.org/xml/8.46.123.75$
unknown
https://support.office.com/article/94ba2e0b-638e-4a92-8857-2cb5ac1d8e17Install
unknown
https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
unknown
https://reallyfreegeoip.org
unknown
https://support.office.com/article/7D48285B-20E8-4B9B-91AD-216E34163BAD?wt.mc_id=EnterPK2016Examples
unknown
http://api.telegram.org
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
https://sierrassinfinusadas.com.ar/yak/ZnWGURK2.bin
167.250.5.91
https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
unknown
https://api.telegram.org/bot7396856636:AAFzZvZlhz352HQorBY7sPxLQBc4vVQnrB8/sendDocument?chat_id=6553726543&caption=%20Pc%20Name:%20user%20%7C%20/%20VIP%20Recovery%20%5C%0D%0A%0D%0APW%20%7C%20user%20%7C%20VIP%20Recovery
149.154.167.220
https://api.telegram.org/bot7396856636:AAFzZvZlhz352HQorBY7sPxLQBc4vVQnrB8/sendDocument?chat_id=6553
unknown
https://reallyfreegeoip.org/xml/
unknown
There are 33 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
reallyfreegeoip.org
188.114.96.3
api.telegram.org
149.154.167.220
sierrassinfinusadas.com.ar
167.250.5.91
checkip.dyndns.com
158.101.44.242
checkip.dyndns.org
unknown

IPs

IP
Domain
Country
Malicious
149.154.167.220
api.telegram.org
United Kingdom
188.114.96.3
reallyfreegeoip.org
European Union
158.101.44.242
checkip.dyndns.com
United States
167.250.5.91
sierrassinfinusadas.com.ar
Argentina

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\SOFTWARE\allogeneity
Catabolite
HKEY_CURRENT_USER\Preformative\Uninstall\genitale
varicella
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\ORDER 20240986 OA_RASAPI32
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\ORDER 20240986 OA_RASAPI32
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\ORDER 20240986 OA_RASAPI32
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\ORDER 20240986 OA_RASAPI32
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\ORDER 20240986 OA_RASAPI32
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\ORDER 20240986 OA_RASAPI32
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\ORDER 20240986 OA_RASAPI32
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\ORDER 20240986 OA_RASMANCS
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\ORDER 20240986 OA_RASMANCS
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\ORDER 20240986 OA_RASMANCS
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\ORDER 20240986 OA_RASMANCS
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\ORDER 20240986 OA_RASMANCS
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\ORDER 20240986 OA_RASMANCS
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\ORDER 20240986 OA_RASMANCS
FileDirectory
There are 7 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
37BD1000
trusted library allocation
page read and write
malicious
3873000
direct allocation
page execute and read and write
malicious
83C000
heap
page read and write
malicious
37D51000
trusted library allocation
page read and write
malicious
7550000
trusted library allocation
page read and write
37BA0000
trusted library allocation
page read and write
7410000
heap
page read and write
378C0000
trusted library allocation
page read and write
7550000
trusted library allocation
page read and write
37BA0000
trusted library allocation
page read and write
37BA0000
trusted library allocation
page read and write
74F0000
trusted library allocation
page read and write
38C9A000
trusted library allocation
page read and write
150000
trusted library allocation
page execute and read and write
7550000
trusted library allocation
page read and write
BA000
trusted library allocation
page execute and read and write
37BA0000
trusted library allocation
page read and write
37C89000
trusted library allocation
page read and write
74F0000
trusted library allocation
page read and write
7550000
trusted library allocation
page read and write
38BF3000
trusted library allocation
page read and write
7AB000
unkown
page read and write
378C0000
trusted library allocation
page read and write
7550000
trusted library allocation
page read and write
7778000
heap
page read and write
3AE70000
trusted library allocation
page read and write
7550000
trusted library allocation
page read and write
7550000
trusted library allocation
page read and write
38CF6000
trusted library allocation
page read and write
74F0000
trusted library allocation
page read and write
3AE70000
trusted library allocation
page read and write
37BA0000
trusted library allocation
page read and write
37BA0000
trusted library allocation
page read and write
84E000
heap
page read and write
7560000
trusted library allocation
page read and write
378C0000
trusted library allocation
page read and write
378D0000
trusted library allocation
page read and write
3AED0000
trusted library allocation
page read and write
37BA0000
trusted library allocation
page read and write
74F0000
trusted library allocation
page read and write
74F0000
trusted library allocation
page read and write
38C64000
trusted library allocation
page read and write
26D4000
heap
page read and write
3AC80000
trusted library allocation
page read and write
38C3A000
trusted library allocation
page read and write
38CD9000
trusted library allocation
page read and write
7550000
trusted library allocation
page read and write
7550000
trusted library allocation
page read and write
3AC80000
trusted library allocation
page read and write
776E000
heap
page read and write
37BA0000
trusted library allocation
page read and write
7560000
trusted library allocation
page read and write
37BA0000
trusted library allocation
page read and write
7550000
trusted library allocation
page read and write
910000
direct allocation
page read and write
3AEB0000
trusted library allocation
page read and write
38D16000
trusted library allocation
page read and write
7640000
trusted library allocation
page read and write
40A000
unkown
page write copy
7550000
trusted library allocation
page read and write
940000
direct allocation
page read and write
3AC80000
trusted library allocation
page read and write
4273000
direct allocation
page execute and read and write
7550000
trusted library allocation
page read and write
74F0000
trusted library allocation
page read and write
38ED5000
trusted library allocation
page read and write
378F0000
heap
page read and write
3A460000
trusted library allocation
page read and write
7550000
trusted library allocation
page read and write
37D8D000
trusted library allocation
page read and write
7560000
trusted library allocation
page read and write
3AC80000
trusted library allocation
page read and write
7550000
trusted library allocation
page read and write
7560000
trusted library allocation
page read and write
38EFD000
trusted library allocation
page read and write
378C0000
trusted library allocation
page read and write
7640000
trusted library allocation
page read and write
7550000
trusted library allocation
page read and write
77CF000
heap
page read and write
37BA0000
trusted library allocation
page read and write
38F23000
trusted library allocation
page read and write
7550000
trusted library allocation
page read and write
378C0000
trusted library allocation
page read and write
3A320000
heap
page read and write
7C5000
unkown
page read and write
38D7F000
trusted library allocation
page read and write
3AE80000
trusted library allocation
page read and write
7780000
heap
page read and write
B0000
trusted library allocation
page read and write
74F0000
trusted library allocation
page read and write
378A5000
trusted library allocation
page read and write
37BA0000
trusted library allocation
page read and write
3AC7F000
stack
page read and write
3786C000
stack
page read and write
914E000
stack
page read and write
7550000
trusted library allocation
page read and write
401000
unkown
page execute read
38F16000
trusted library allocation
page read and write
7560000
trusted library allocation
page read and write
74F0000
trusted library allocation
page read and write
3A4E4000
heap
page read and write
38CB9000
trusted library allocation
page read and write
37BA0000
trusted library allocation
page read and write
7550000
trusted library allocation
page read and write
37BB0000
trusted library allocation
page read and write
74F0000
trusted library allocation
page read and write
935E000
stack
page read and write
25C0000
direct allocation
page read and write
900000
direct allocation
page read and write
37BA0000
trusted library allocation
page read and write
90F0000
direct allocation
page read and write
7550000
trusted library allocation
page read and write
38E5F000
trusted library allocation
page read and write
7550000
trusted library allocation
page read and write
37BB0000
trusted library allocation
page read and write
38BD5000
trusted library allocation
page read and write
7570000
heap
page read and write
37BA0000
trusted library allocation
page read and write
378D6000
trusted library allocation
page read and write
7560000
trusted library allocation
page read and write
7550000
trusted library allocation
page read and write
7560000
trusted library allocation
page execute and read and write
378C0000
trusted library allocation
page read and write
7640000
trusted library allocation
page read and write
3A7BF000
stack
page read and write
7550000
trusted library allocation
page read and write
7560000
trusted library allocation
page read and write
37EB9000
trusted library allocation
page read and write
7550000
trusted library allocation
page read and write
37BA0000
trusted library allocation
page read and write
37BA0000
trusted library allocation
page read and write
7550000
trusted library allocation
page read and write
3A8FE000
stack
page read and write
7550000
trusted library allocation
page read and write
C5000
trusted library allocation
page execute and read and write
3A354000
heap
page read and write
74F0000
trusted library allocation
page read and write
37BA1000
trusted library allocation
page read and write
37BA0000
trusted library allocation
page read and write
37BA0000
trusted library allocation
page read and write
7550000
trusted library allocation
page read and write
37BA0000
trusted library allocation
page read and write
37E1F000
trusted library allocation
page read and write
38F47000
trusted library allocation
page read and write
75D0000
direct allocation
page read and write
3AC80000
trusted library allocation
page read and write
7550000
trusted library allocation
page read and write
38E58000
trusted library allocation
page read and write
37BA0000
trusted library allocation
page read and write
9310000
trusted library allocation
page read and write
7550000
trusted library allocation
page read and write
37C8D000
trusted library allocation
page read and write
3AEA0000
trusted library allocation
page read and write
7550000
trusted library allocation
page read and write
378C0000
trusted library allocation
page read and write
37BA0000
trusted library allocation
page read and write
37BB0000
trusted library allocation
page read and write
7610000
trusted library allocation
page read and write
3AEA0000
trusted library allocation
page read and write
3A46A000
trusted library allocation
page read and write
37BA0000
trusted library allocation
page read and write
378B0000
trusted library allocation
page read and write
7550000
trusted library allocation
page read and write
74F0000
trusted library allocation
page read and write
37BA0000
trusted library allocation
page read and write
37BB0000
trusted library allocation
page read and write
7640000
trusted library allocation
page read and write
7550000
trusted library allocation
page read and write
3AC80000
trusted library allocation
page read and write
3AE90000
trusted library allocation
page read and write
37FC9000
trusted library allocation
page read and write
1A40000
remote allocation
page execute and read and write
3AE80000
trusted library allocation
page read and write
36270000
direct allocation
page read and write
37BA0000
trusted library allocation
page read and write
7610000
trusted library allocation
page read and write
38025000
trusted library allocation
page read and write
378D0000
trusted library allocation
page read and write
40A000
unkown
page write copy
82F000
heap
page read and write
24E0000
heap
page read and write
3AEB0000
trusted library allocation
page read and write
37BA0000
trusted library allocation
page read and write
3AE70000
trusted library allocation
page read and write
7560000
trusted library allocation
page read and write
3AC80000
trusted library allocation
page read and write
7550000
trusted library allocation
page read and write
36290000
direct allocation
page read and write
7550000
trusted library allocation
page read and write
37BA0000
trusted library allocation
page read and write
37C75000
trusted library allocation
page read and write
38F40000
trusted library allocation
page read and write
788000
unkown
page read and write
7550000
trusted library allocation
page read and write
38DBB000
trusted library allocation
page read and write
7550000
trusted library allocation
page read and write
3AB3F000
stack
page read and write
378D0000
trusted library allocation
page read and write
74F0000
trusted library allocation
page read and write
37BA0000
trusted library allocation
page read and write
38E3E000
trusted library allocation
page read and write
3A97F000
stack
page read and write
38CBD000
trusted library allocation
page read and write
7550000
trusted library allocation
page read and write
38E5D000
trusted library allocation
page read and write
38BF9000
trusted library allocation
page read and write
3A48B000
heap
page read and write
37BA0000
trusted library allocation
page read and write
378D0000
trusted library allocation
page read and write
37BA0000
trusted library allocation
page read and write
6FBB1000
unkown
page execute read
37BA0000
trusted library allocation
page read and write
74F0000
trusted library allocation
page read and write
37C40000
trusted library allocation
page read and write
378C0000
trusted library allocation
page read and write
2E73000
direct allocation
page execute and read and write
3AC80000
trusted library allocation
page read and write
96000
stack
page read and write
3AE70000
trusted library allocation
page read and write
7A6000
unkown
page read and write
7654000
trusted library allocation
page read and write
24BE000
stack
page read and write
7550000
trusted library allocation
page read and write
37BA0000
trusted library allocation
page read and write
3AC80000
trusted library allocation
page read and write
7550000
trusted library allocation
page read and write
37BA0000
trusted library allocation
page read and write
37BA0000
trusted library allocation
page read and write
7610000
trusted library allocation
page read and write
7650000
trusted library allocation
page read and write
400000
unkown
page readonly
7787000
heap
page read and write
37C35000
trusted library allocation
page read and write
37BA0000
trusted library allocation
page read and write
38E51000
trusted library allocation
page read and write
7550000
trusted library allocation
page read and write
7660000
trusted library allocation
page execute and read and write
7550000
trusted library allocation
page read and write
37BA0000
trusted library allocation
page read and write
38CAD000
trusted library allocation
page read and write
7787000
heap
page read and write
3AE70000
trusted library allocation
page read and write
950000
direct allocation
page read and write
3A464000
trusted library allocation
page read and write
38081000
trusted library allocation
page read and write
7560000
trusted library allocation
page read and write
37BA0000
trusted library allocation
page read and write
37BA0000
trusted library allocation
page read and write
3A45D000
stack
page read and write
38DAF000
trusted library allocation
page read and write
38D0F000
trusted library allocation
page read and write
7640000
trusted library allocation
page read and write
38CBB000
trusted library allocation
page read and write
75E5000
heap
page read and write
7560000
trusted library allocation
page read and write
37BB0000
trusted library allocation
page read and write
38D81000
trusted library allocation
page read and write
38053000
trusted library allocation
page read and write
7600000
trusted library allocation
page execute and read and write
37BA0000
trusted library allocation
page read and write
7550000
trusted library allocation
page read and write
37750000
heap
page read and write
7F0000
heap
page read and write
37D85000
trusted library allocation
page read and write
74F0000
trusted library allocation
page read and write
7560000
trusted library allocation
page read and write
77C5000
heap
page read and write
92FF000
stack
page read and write
3AC80000
trusted library allocation
page read and write
7550000
trusted library allocation
page read and write
37BA0000
trusted library allocation
page read and write
7550000
trusted library allocation
page read and write
37BA0000
trusted library allocation
page read and write
6FBB0000
unkown
page readonly
7550000
trusted library allocation
page read and write
37BB0000
trusted library allocation
page read and write
6C13000
remote allocation
page execute and read and write
37BA0000
trusted library allocation
page read and write
7550000
trusted library allocation
page read and write
3A538000
heap
page read and write
37BA0000
trusted library allocation
page read and write
74F0000
trusted library allocation
page read and write
7B3000
unkown
page read and write
76E0000
trusted library allocation
page read and write
3AC80000
trusted library allocation
page read and write
7550000
trusted library allocation
page read and write
930000
direct allocation
page read and write
378D0000
trusted library allocation
page read and write
76B0000
trusted library allocation
page read and write
7550000
trusted library allocation
page read and write
37BA0000
trusted library allocation
page read and write
7E73000
direct allocation
page execute and read and write
7C7000
unkown
page readonly
378C0000
trusted library allocation
page read and write
3AC80000
trusted library allocation
page read and write
37780000
remote allocation
page read and write
7610000
trusted library allocation
page read and write
7560000
trusted library allocation
page read and write
7550000
trusted library allocation
page read and write
37874000
trusted library allocation
page read and write
7650000
trusted library allocation
page read and write
6073000
direct allocation
page execute and read and write
378C0000
trusted library allocation
page read and write
7560000
trusted library allocation
page read and write
3AC80000
trusted library allocation
page read and write
37DEF000
trusted library allocation
page read and write
37BA0000
trusted library allocation
page read and write
37BA0000
trusted library allocation
page read and write
3AC80000
trusted library allocation
page read and write
7550000
trusted library allocation
page read and write
378B0000
trusted library allocation
page read and write
37BA0000
trusted library allocation
page read and write
7550000
trusted library allocation
page read and write
37BA0000
trusted library allocation
page read and write
9D000
trusted library allocation
page execute and read and write
76E0000
trusted library allocation
page read and write
7550000
trusted library allocation
page read and write
37780000
remote allocation
page read and write
377FF000
stack
page read and write
37E89000
trusted library allocation
page read and write
7550000
trusted library allocation
page read and write
37BB0000
trusted library allocation
page read and write
38CB4000
trusted library allocation
page read and write
7550000
trusted library allocation
page read and write
3AC8D000
trusted library allocation
page read and write
408000
unkown
page readonly
6213000
remote allocation
page execute and read and write
25A0000
direct allocation
page read and write
7640000
trusted library allocation
page read and write
2550000
heap
page read and write
7610000
trusted library allocation
page read and write
3AC80000
trusted library allocation
page read and write
3A13000
remote allocation
page execute and read and write
37BA0000
trusted library allocation
page read and write
37BA0000
trusted library allocation
page read and write
3772D000
stack
page read and write
37BA0000
trusted library allocation
page read and write
7550000
trusted library allocation
page read and write
378C0000
trusted library allocation
page read and write
37BB0000
trusted library allocation
page read and write
38CF9000
trusted library allocation
page read and write
7550000
trusted library allocation
page read and write
91F0000
heap
page read and write
38F00000
trusted library allocation
page read and write
1C13000
remote allocation
page execute and read and write
37BA0000
trusted library allocation
page read and write
37BB0000
trusted library allocation
page read and write
3AC80000
trusted library allocation
page read and write
3AC80000
trusted library allocation
page read and write
38CA1000
trusted library allocation
page read and write
37BA0000
trusted library allocation
page read and write
3AE70000
trusted library allocation
page read and write
37C79000
trusted library allocation
page read and write
76A2000
trusted library allocation
page read and write
38CA8000
trusted library allocation
page read and write
7560000
trusted library allocation
page read and write
990000
heap
page read and write
37BA0000
trusted library allocation
page read and write
7550000
trusted library allocation
page read and write
37CD8000
trusted library allocation
page read and write
37BA0000
trusted library allocation
page read and write
38BDB000
trusted library allocation
page read and write
7640000
trusted library allocation
page read and write
74F0000
trusted library allocation
page read and write
3AE70000
trusted library allocation
page read and write
7650000
trusted library allocation
page read and write
37BC0000
heap
page execute and read and write
2C1F000
stack
page read and write
7550000
trusted library allocation
page read and write
38E8B000
trusted library allocation
page read and write
38E28000
trusted library allocation
page read and write
7550000
trusted library allocation
page read and write
37DE2000
trusted library allocation
page read and write
246E000
stack
page read and write
7550000
trusted library allocation
page read and write
7550000
trusted library allocation
page read and write
90C0000
direct allocation
page read and write
7640000
trusted library allocation
page read and write
37BA0000
trusted library allocation
page read and write
76D0000
trusted library allocation
page read and write
3AC80000
trusted library allocation
page read and write
7660000
trusted library allocation
page read and write
37BB0000
trusted library allocation
page read and write
800000
heap
page read and write
7550000
trusted library allocation
page read and write
77C000
unkown
page read and write
37BA0000
trusted library allocation
page read and write
37BA0000
trusted library allocation
page read and write
38E2C000
trusted library allocation
page read and write
7560000
trusted library allocation
page read and write
378D0000
trusted library allocation
page read and write
37DB0000
trusted library allocation
page read and write
38E45000
trusted library allocation
page read and write
37BA0000
trusted library allocation
page read and write
378C0000
trusted library allocation
page read and write
3AB7E000
stack
page read and write
7550000
trusted library allocation
page read and write
4C73000
direct allocation
page execute and read and write
7550000
trusted library allocation
page read and write
3A7FE000
stack
page read and write
7550000
trusted library allocation
page read and write
37BA1000
trusted library allocation
page read and write
377BE000
stack
page read and write
3AC80000
trusted library allocation
page read and write
37BA0000
trusted library allocation
page read and write
160000
trusted library allocation
page read and write
37BA0000
trusted library allocation
page read and write
80000
trusted library allocation
page read and write
37BA0000
trusted library allocation
page read and write
75A0000
direct allocation
page read and write
7782000
heap
page read and write
75E0000
heap
page read and write
2CA0000
direct allocation
page execute and read and write
6FBB5000
unkown
page readonly
3AC80000
trusted library allocation
page read and write
378D0000
trusted library allocation
page read and write
38F8F000
trusted library allocation
page read and write
38C58000
trusted library allocation
page read and write
37DB4000
trusted library allocation
page read and write
37BB0000
trusted library allocation
page read and write
37C6D000
trusted library allocation
page read and write
3762D000
stack
page read and write
7550000
trusted library allocation
page read and write
37C7D000
trusted library allocation
page read and write
37BA0000
trusted library allocation
page read and write
37BA0000
trusted library allocation
page read and write
7560000
trusted library allocation
page read and write
7550000
trusted library allocation
page read and write
37810000
direct allocation
page read and write
90000
trusted library allocation
page read and write
3A9BE000
stack
page read and write
37BB0000
trusted library allocation
page read and write
10E000
stack
page read and write
37BB0000
trusted library allocation
page read and write
378C0000
trusted library allocation
page read and write
37BA0000
trusted library allocation
page read and write
7610000
trusted library allocation
page read and write
378C0000
trusted library allocation
page read and write
3AE70000
trusted library allocation
page read and write
7550000
trusted library allocation
page read and write
7550000
trusted library allocation
page read and write
408000
unkown
page readonly
38C33000
trusted library allocation
page read and write
37DB6000
trusted library allocation
page read and write
3A470000
heap
page execute and read and write
7550000
trusted library allocation
page read and write
7550000
trusted library allocation
page read and write
7700000
direct allocation
page read and write
7560000
trusted library allocation
page read and write
3AC80000
trusted library allocation
page read and write
7550000
trusted library allocation
page read and write
378C0000
trusted library allocation
page read and write
37BA0000
trusted library allocation
page read and write
378C0000
trusted library allocation
page read and write
3AC80000
trusted library allocation
page read and write
7550000
trusted library allocation
page read and write
38C8A000
trusted library allocation
page read and write
190000
heap
page read and write
37BA0000
trusted library allocation
page read and write
3A480000
heap
page read and write
7610000
trusted library allocation
page read and write
7640000
trusted library allocation
page read and write
38F4F000
trusted library allocation
page read and write
7550000
trusted library allocation
page read and write
7560000
trusted library allocation
page read and write
37BA0000
trusted library allocation
page read and write
77E7000
heap
page read and write
37DB8000
trusted library allocation
page read and write
7473000
direct allocation
page execute and read and write
3AE70000
trusted library allocation
page read and write
7640000
trusted library allocation
page read and write
37780000
remote allocation
page read and write
38E7D000
trusted library allocation
page read and write
94000
trusted library allocation
page read and write
6A73000
direct allocation
page execute and read and write
7630000
trusted library allocation
page read and write
38C5B000
trusted library allocation
page read and write
37BA0000
trusted library allocation
page read and write
37BA0000
trusted library allocation
page read and write
3AE90000
trusted library allocation
page read and write
37BA0000
trusted library allocation
page read and write
38C38000
trusted library allocation
page read and write
378C0000
trusted library allocation
page read and write
37BA0000
trusted library allocation
page read and write
37BA0000
trusted library allocation
page read and write
7560000
trusted library allocation
page read and write
37BA0000
trusted library allocation
page read and write
37BA0000
trusted library allocation
page read and write
7550000
trusted library allocation
page read and write
90E0000
direct allocation
page read and write
378C0000
trusted library allocation
page read and write
401000
unkown
page execute read
2560000
heap
page read and write
378C0000
trusted library allocation
page read and write
7640000
trusted library allocation
page read and write
7550000
trusted library allocation
page read and write
38EF2000
trusted library allocation
page read and write
37B08000
trusted library allocation
page read and write
38EEE000
trusted library allocation
page read and write
7640000
trusted library allocation
page read and write
74F0000
trusted library allocation
page read and write
7550000
trusted library allocation
page read and write
3AE70000
trusted library allocation
page read and write
37F19000
trusted library allocation
page read and write
7550000
trusted library allocation
page read and write
408000
unkown
page readonly
37BA0000
trusted library allocation
page read and write
37CDA000
trusted library allocation
page read and write
93A0000
heap
page read and write
37DBE000
trusted library allocation
page read and write
37BA0000
trusted library allocation
page read and write
7550000
trusted library allocation
page read and write
3AC80000
trusted library allocation
page read and write
37BA0000
trusted library allocation
page read and write
7550000
trusted library allocation
page read and write
37B00000
trusted library allocation
page read and write
7550000
trusted library allocation
page read and write
38CE7000
trusted library allocation
page read and write
7560000
trusted library allocation
page read and write
3A460000
trusted library allocation
page read and write
38FA7000
trusted library allocation
page read and write
7550000
trusted library allocation
page read and write
7550000
trusted library allocation
page read and write
38F30000
trusted library allocation
page read and write
7550000
trusted library allocation
page read and write
37DC3000
trusted library allocation
page read and write
7560000
trusted library allocation
page read and write
38D76000
trusted library allocation
page read and write
37BA0000
trusted library allocation
page read and write
75B0000
direct allocation
page read and write
3A4BA000
heap
page read and write
37FF7000
trusted library allocation
page read and write
37BA0000
trusted library allocation
page read and write
3AC80000
trusted library allocation
page read and write
C2000
trusted library allocation
page read and write
4E13000
remote allocation
page execute and read and write
38E9A000
trusted library allocation
page read and write
38BD1000
trusted library allocation
page read and write
7550000
trusted library allocation
page read and write
91CD000
stack
page read and write
7550000
trusted library allocation
page read and write
5673000
direct allocation
page execute and read and write
7550000
trusted library allocation
page read and write
3AC80000
trusted library allocation
page read and write
38EE7000
trusted library allocation
page read and write
37BA0000
trusted library allocation
page read and write
90B0000
direct allocation
page read and write
37F40000
trusted library allocation
page read and write
37BA0000
trusted library allocation
page read and write
37BA0000
trusted library allocation
page read and write
3AC80000
trusted library allocation
page read and write
7590000
direct allocation
page read and write
3A4FB000
heap
page read and write
7560000
trusted library allocation
page read and write
37BA0000
trusted library allocation
page read and write
375EF000
stack
page read and write
A0000
trusted library allocation
page read and write
7610000
trusted library allocation
page execute and read and write
76A5000
trusted library allocation
page read and write
4413000
remote allocation
page execute and read and write
7550000
trusted library allocation
page read and write
7550000
trusted library allocation
page read and write
37C2A000
trusted library allocation
page read and write
7A4000
unkown
page read and write
38E53000
trusted library allocation
page read and write
37BA0000
trusted library allocation
page read and write
6FBB3000
unkown
page readonly
37C71000
trusted library allocation
page read and write
7C3000
unkown
page read and write
3AE70000
trusted library allocation
page read and write
3AC80000
trusted library allocation
page read and write
778E000
heap
page read and write
3AE70000
trusted library allocation
page read and write
3AC80000
trusted library allocation
page read and write
36280000
direct allocation
page read and write
378D0000
trusted library allocation
page read and write
170000
trusted library allocation
page read and write
37BA0000
trusted library allocation
page read and write
7550000
trusted library allocation
page read and write
808000
heap
page read and write
74F0000
trusted library allocation
page read and write
3A4A0000
heap
page read and write
7550000
trusted library allocation
page read and write
C7000
trusted library allocation
page execute and read and write
76C0000
trusted library allocation
page read and write
37BA0000
trusted library allocation
page read and write
37CB5000
trusted library allocation
page read and write
76C0000
trusted library allocation
page read and write
7550000
trusted library allocation
page read and write
38CFF000
trusted library allocation
page read and write
37F6D000
trusted library allocation
page read and write
7560000
trusted library allocation
page read and write
38F03000
trusted library allocation
page read and write
3A460000
trusted library allocation
page read and write
37C44000
trusted library allocation
page read and write
38CAF000
trusted library allocation
page read and write
37EE9000
trusted library allocation
page read and write
37BA0000
trusted library allocation
page read and write
37BA0000
trusted library allocation
page read and write
7620000
trusted library allocation
page execute and read and write
38E61000
trusted library allocation
page read and write
37BA0000
trusted library allocation
page read and write
400000
unkown
page readonly
7560000
trusted library allocation
page read and write
7550000
trusted library allocation
page read and write
75F0000
trusted library allocation
page execute and read and write
7550000
trusted library allocation
page read and write
37BB0000
trusted library allocation
page read and write
74F0000
trusted library allocation
page read and write
3AE70000
trusted library allocation
page read and write
3AC80000
trusted library allocation
page read and write
3AE70000
trusted library allocation
page read and write
38F0A000
trusted library allocation
page read and write
3013000
remote allocation
page execute and read and write
37BA0000
trusted library allocation
page read and write
3AABF000
stack
page read and write
37D87000
trusted library allocation
page read and write
19A000
stack
page read and write
38EE1000
trusted library allocation
page read and write
400000
unkown
page readonly
7550000
trusted library allocation
page read and write
38F2A000
trusted library allocation
page read and write
93000
trusted library allocation
page execute and read and write
25D0000
heap
page read and write
3AEC0000
trusted library allocation
page read and write
378C0000
trusted library allocation
page read and write
7550000
trusted library allocation
page read and write
7550000
trusted library allocation
page read and write
37C48000
trusted library allocation
page read and write
378D0000
trusted library allocation
page read and write
7640000
trusted library allocation
page read and write
7550000
trusted library allocation
page read and write
3A492000
heap
page read and write
7610000
trusted library allocation
page read and write
40A000
unkown
page write copy
3AE80000
trusted library allocation
page execute and read and write
177000
trusted library allocation
page read and write
7550000
trusted library allocation
page read and write
7550000
trusted library allocation
page read and write
76D0000
trusted library allocation
page read and write
7640000
trusted library allocation
page read and write
37D65000
trusted library allocation
page read and write
26D0000
heap
page read and write
37D92000
trusted library allocation
page read and write
7550000
trusted library allocation
page read and write
7550000
trusted library allocation
page read and write
37C85000
trusted library allocation
page read and write
38C84000
trusted library allocation
page read and write
7E0000
heap
page read and write
37D76000
trusted library allocation
page read and write
7610000
trusted library allocation
page read and write
37BA0000
trusted library allocation
page read and write
7550000
trusted library allocation
page read and write
7550000
trusted library allocation
page read and write
7550000
trusted library allocation
page read and write
40A000
unkown
page read and write
37C1D000
trusted library allocation
page read and write
37BA0000
trusted library allocation
page read and write
7610000
trusted library allocation
page read and write
38D1D000
trusted library allocation
page read and write
7550000
trusted library allocation
page read and write
7C7000
unkown
page readonly
379F7000
stack
page read and write
75C0000
direct allocation
page read and write
3AE70000
trusted library allocation
page read and write
3AE70000
trusted library allocation
page read and write
778B000
heap
page read and write
3AE70000
trusted library allocation
page read and write
B2000
trusted library allocation
page read and write
7550000
trusted library allocation
page read and write
3AEC0000
trusted library allocation
page read and write
3AC90000
trusted library allocation
page execute and read and write
7710000
heap
page read and write
74F0000
trusted library allocation
page read and write
7550000
trusted library allocation
page read and write
378D0000
trusted library allocation
page read and write
3AC80000
trusted library allocation
page read and write
90D0000
direct allocation
page read and write
7550000
trusted library allocation
page read and write
7676000
trusted library allocation
page read and write
7718000
heap
page read and write
3AC80000
trusted library allocation
page read and write
401000
unkown
page execute read
7560000
trusted library allocation
page read and write
7550000
trusted library allocation
page read and write
374EE000
stack
page read and write
37820000
direct allocation
page read and write
7550000
trusted library allocation
page read and write
37BB0000
trusted library allocation
page read and write
38E2E000
trusted library allocation
page read and write
38E4C000
trusted library allocation
page read and write
37BA0000
trusted library allocation
page read and write
2613000
remote allocation
page execute and read and write
7550000
trusted library allocation
page read and write
37BA0000
trusted library allocation
page read and write
76A0000
trusted library allocation
page read and write
38F2E000
trusted library allocation
page read and write
3AE70000
trusted library allocation
page read and write
778E000
heap
page read and write
380B0000
trusted library allocation
page read and write
378D0000
trusted library allocation
page read and write
76F0000
direct allocation
page read and write
77DC000
heap
page read and write
7C7000
unkown
page readonly
401000
unkown
page execute read
786000
unkown
page read and write
7550000
trusted library allocation
page read and write
37BA0000
trusted library allocation
page read and write
3AE9F000
trusted library allocation
page read and write
B6000
trusted library allocation
page execute and read and write
37BA0000
trusted library allocation
page read and write
782000
unkown
page read and write
7550000
trusted library allocation
page read and write
3AAFE000
stack
page read and write
7640000
trusted library allocation
page read and write
38D5E000
trusted library allocation
page read and write
74F0000
trusted library allocation
page read and write
37BA0000
trusted library allocation
page read and write
38EDA000
trusted library allocation
page read and write
5813000
remote allocation
page execute and read and write
7550000
trusted library allocation
page read and write
7540000
trusted library allocation
page read and write
7640000
trusted library allocation
page read and write
7550000
trusted library allocation
page read and write
7550000
trusted library allocation
page read and write
7500000
trusted library allocation
page read and write
7640000
trusted library allocation
page read and write
7550000
trusted library allocation
page read and write
37BA0000
trusted library allocation
page read and write
7560000
trusted library allocation
page read and write
3AE70000
trusted library allocation
page read and write
37BA0000
trusted library allocation
page read and write
400000
unkown
page readonly
3AC80000
trusted library allocation
page read and write
3A466000
trusted library allocation
page read and write
7C7000
unkown
page readonly
7550000
trusted library allocation
page read and write
180000
trusted library allocation
page read and write
408000
unkown
page readonly
3AC80000
trusted library allocation
page read and write
7550000
trusted library allocation
page read and write
37BA0000
trusted library allocation
page read and write
7550000
trusted library allocation
page read and write
7640000
trusted library allocation
page read and write
3A93D000
stack
page read and write
373EF000
stack
page read and write
7640000
trusted library allocation
page read and write
920000
direct allocation
page read and write
918E000
stack
page read and write
7752000
heap
page read and write
37BA0000
trusted library allocation
page read and write
7550000
trusted library allocation
page read and write
74F0000
trusted library allocation
page read and write
39CCE000
stack
page read and write
37BB0000
trusted library allocation
page read and write
7550000
trusted library allocation
page read and write
7550000
trusted library allocation
page read and write
378E0000
heap
page read and write
37C81000
trusted library allocation
page read and write
37BA0000
trusted library allocation
page read and write
2B1F000
stack
page read and write
37BA0000
trusted library allocation
page read and write
850000
heap
page read and write
CB000
trusted library allocation
page execute and read and write
25B0000
direct allocation
page read and write
7550000
trusted library allocation
page read and write
14C000
stack
page read and write
3A50F000
heap
page read and write
37F9B000
trusted library allocation
page read and write
38C68000
trusted library allocation
page read and write
37BA0000
trusted library allocation
page read and write
3AC80000
trusted library allocation
page read and write
37AFF000
stack
page read and write
37BA0000
trusted library allocation
page read and write
37BA0000
trusted library allocation
page read and write
37BA0000
trusted library allocation
page read and write
7550000
trusted library allocation
page read and write
7550000
trusted library allocation
page read and write
38DD3000
trusted library allocation
page read and write
24E5000
heap
page read and write
There are 770 hidden memdumps, click here to show them.