IOC Report
#U5b89#U88c5#U52a9#U624b_2.0.6.exe

loading gif

Files

File Path
Type
Category
Malicious
#U5b89#U88c5#U52a9#U624b_2.0.6.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\Program Files (x86)\Windows NT\hrsw.vbc
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
malicious
C:\Program Files (x86)\Windows NT\is-0F5J3.tmp
PE32+ executable (console) x86-64 (stripped to external PDB), for MS Windows
dropped
malicious
C:\Program Files (x86)\Windows NT\tProtect.dll
PE32+ executable (native) x86-64, for MS Windows
dropped
malicious
C:\Program Files (x86)\Windows NT\trash (copy)
PE32+ executable (console) x86-64 (stripped to external PDB), for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\is-6SCB4.tmp\#U5b89#U88c5#U52a9#U624b_2.0.6.tmp
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\is-R46SO.tmp\update.vac
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\is-U5HAP.tmp\#U5b89#U88c5#U52a9#U624b_2.0.6.tmp
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\is-V2E3L.tmp\update.vac
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
malicious
C:\Program Files (x86)\Windows NT\7zr.exe
PE32 executable (console) Intel 80386, for MS Windows
dropped
C:\Program Files (x86)\Windows NT\file.bin (copy)
data
dropped
C:\Program Files (x86)\Windows NT\is-QJ471.tmp
data
dropped
C:\Program Files (x86)\Windows NT\locale.bin
data
dropped
C:\Program Files (x86)\Windows NT\locale.dat
7-zip archive data, version 0.4
dropped
C:\Program Files (x86)\Windows NT\locale2.bin
data
dropped
C:\Program Files (x86)\Windows NT\locale2.dat
7-zip archive data, version 0.4
dropped
C:\Program Files (x86)\Windows NT\locale3.bin
data
dropped
C:\Program Files (x86)\Windows NT\locale3.dat
7-zip archive data, version 0.4
dropped
C:\Program Files (x86)\Windows NT\locale4.bin
data
dropped
C:\Program Files (x86)\Windows NT\locale4.dat
7-zip archive data, version 0.4
dropped
C:\Program Files (x86)\Windows NT\locale7.bin
data
dropped
C:\Program Files (x86)\Windows NT\locale7.dat
7-zip archive data, version 0.4
dropped
C:\Program Files (x86)\Windows NT\res.dat
7-zip archive data, version 0.4
dropped
C:\Program Files (x86)\Windows NT\task.xml
data
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
data
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_3trkrlnv.vwo.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_4gnolrdq.yk0.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_aqv2isbv.5we.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_j32rbbna.tb4.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\is-R46SO.tmp\_isetup\_setup64.tmp
PE32+ executable (console) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\is-V2E3L.tmp\_isetup\_setup64.tmp
PE32+ executable (console) x86-64, for MS Windows
dropped
\Device\ConDrv
ASCII text, with CRLF, CR line terminators
dropped
There are 22 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\#U5b89#U88c5#U52a9#U624b_2.0.6.exe
"C:\Users\user\Desktop\#U5b89#U88c5#U52a9#U624b_2.0.6.exe"
malicious
C:\Users\user\AppData\Local\Temp\is-U5HAP.tmp\#U5b89#U88c5#U52a9#U624b_2.0.6.tmp
"C:\Users\user\AppData\Local\Temp\is-U5HAP.tmp\#U5b89#U88c5#U52a9#U624b_2.0.6.tmp" /SL5="$20432,4753239,845824,C:\Users\user\Desktop\#U5b89#U88c5#U52a9#U624b_2.0.6.exe"
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
"powershell.exe" -Command "Add-MpPreference -ExclusionPath 'C:\'"
malicious
C:\Users\user\Desktop\#U5b89#U88c5#U52a9#U624b_2.0.6.exe
"C:\Users\user\Desktop\#U5b89#U88c5#U52a9#U624b_2.0.6.exe" /VERYSILENT
malicious
C:\Users\user\AppData\Local\Temp\is-6SCB4.tmp\#U5b89#U88c5#U52a9#U624b_2.0.6.tmp
"C:\Users\user\AppData\Local\Temp\is-6SCB4.tmp\#U5b89#U88c5#U52a9#U624b_2.0.6.tmp" /SL5="$20442,4753239,845824,C:\Users\user\Desktop\#U5b89#U88c5#U52a9#U624b_2.0.6.exe" /VERYSILENT
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\cmd.exe
cmd /c start sc create CleverSoar displayname= CleverSoar binPath= "C:\Program Files (x86)\Windows NT\tProtect.dll" type= kernel start= auto
C:\Windows\System32\sc.exe
sc create CleverSoar displayname= CleverSoar binPath= "C:\Program Files (x86)\Windows NT\tProtect.dll" type= kernel start= auto
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Program Files (x86)\Windows NT\7zr.exe
7zr.exe x -y res.dat -pad8dtyw9eyfd9aslyd9iald
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Program Files (x86)\Windows NT\7zr.exe
7zr.exe x -y locale3.dat -pasfasdf79yf9layslofs
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\cmd.exe
cmd /c start sc start CleverSoar
C:\Windows\System32\sc.exe
sc start CleverSoar
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\cmd.exe
cmd /c start sc start CleverSoar
C:\Windows\System32\sc.exe
sc start CleverSoar
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\cmd.exe
cmd /c start sc start CleverSoar
C:\Windows\System32\sc.exe
sc start CleverSoar
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\wbem\WmiPrvSE.exe
C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding
C:\Windows\System32\cmd.exe
cmd /c start sc start CleverSoar
C:\Windows\System32\sc.exe
sc start CleverSoar
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\cmd.exe
cmd /c start sc start CleverSoar
C:\Windows\System32\sc.exe
sc start CleverSoar
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\cmd.exe
cmd /c start sc start CleverSoar
C:\Windows\System32\sc.exe
sc start CleverSoar
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\cmd.exe
cmd /c start sc start CleverSoar
C:\Windows\System32\sc.exe
sc start CleverSoar
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\cmd.exe
cmd /c start sc start CleverSoar
C:\Windows\System32\sc.exe
sc start CleverSoar
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\cmd.exe
cmd /c start sc start CleverSoar
C:\Windows\System32\sc.exe
sc start CleverSoar
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\cmd.exe
cmd /c start sc start CleverSoar
C:\Windows\System32\sc.exe
sc start CleverSoar
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\cmd.exe
cmd /c start sc start CleverSoar
C:\Windows\System32\sc.exe
sc start CleverSoar
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\cmd.exe
cmd /c start sc start CleverSoar
C:\Windows\System32\sc.exe
sc start CleverSoar
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\cmd.exe
cmd /c start sc start CleverSoar
C:\Windows\System32\sc.exe
sc start CleverSoar
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\cmd.exe
cmd /c start sc start CleverSoar
C:\Windows\System32\sc.exe
sc start CleverSoar
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\cmd.exe
cmd /c start sc start CleverSoar
C:\Windows\System32\sc.exe
sc start CleverSoar
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\cmd.exe
cmd /c start sc start CleverSoar
C:\Windows\System32\sc.exe
sc start CleverSoar
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\cmd.exe
cmd /c start sc start CleverSoar
C:\Windows\System32\sc.exe
sc start CleverSoar
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\cmd.exe
cmd /c start sc start CleverSoar
C:\Windows\System32\sc.exe
sc start CleverSoar
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\cmd.exe
cmd /c start sc start CleverSoar
C:\Windows\System32\sc.exe
sc start CleverSoar
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\cmd.exe
cmd /c start sc start CleverSoar
C:\Windows\System32\sc.exe
sc start CleverSoar
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\cmd.exe
cmd /c start sc start CleverSoar
C:\Windows\System32\sc.exe
sc start CleverSoar
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\cmd.exe
cmd /c start sc start CleverSoar
C:\Windows\System32\sc.exe
sc start CleverSoar
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\cmd.exe
cmd /c start sc start CleverSoar
C:\Windows\System32\sc.exe
sc start CleverSoar
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\cmd.exe
cmd /c start sc start CleverSoar
C:\Windows\System32\sc.exe
sc start CleverSoar
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\cmd.exe
cmd /c start sc start CleverSoar
C:\Windows\System32\sc.exe
sc start CleverSoar
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\cmd.exe
cmd /c start sc start CleverSoar
C:\Windows\System32\sc.exe
sc start CleverSoar
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\cmd.exe
cmd /c start sc start CleverSoar
C:\Windows\System32\sc.exe
sc start CleverSoar
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\cmd.exe
cmd /c start sc start CleverSoar
C:\Windows\System32\sc.exe
sc start CleverSoar
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\cmd.exe
cmd /c start sc start CleverSoar
C:\Windows\System32\sc.exe
sc start CleverSoar
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\cmd.exe
cmd /c start sc start CleverSoar
C:\Windows\System32\sc.exe
sc start CleverSoar
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\cmd.exe
cmd /c start sc start CleverSoar
C:\Windows\System32\sc.exe
sc start CleverSoar
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\cmd.exe
cmd /c start sc start CleverSoar
C:\Windows\System32\Conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
There are 99 hidden processes, click here to show them.

URLs

Name
IP
Malicious
https://aria2.github.io/Usage:
unknown
https://jrsoftware.org/ishelp/index.php?topic=setupcmdlineSetupU
unknown
https://github.com/aria2/aria2/issuesReport
unknown
http://www.metalinker.org/
unknown
https://www.remobjects.com/ps
unknown
https://aria2.github.io/
unknown
https://github.com/aria2/aria2/issues
unknown
https://www.innosetup.com/
unknown
http://www.metalinker.org/basic_string::_M_construct
unknown

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
Owner
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
SessionHash
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
Sequence
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
Owner
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
SessionHash
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
Sequence
HKEY_CURRENT_USER\SOFTWARE\Magisk
ring3_username

Memdumps

Base Address
Regiontype
Protect
Malicious
2C4EE6B8000
heap
page read and write
32D0000
heap
page read and write
2D9E000
direct allocation
page read and write
A75000
unkown
page read and write
580000
unkown
page readonly
DEF000
direct allocation
page read and write
AF0000
unkown
page readonly
BADA27F000
stack
page read and write
13E0000
heap
page read and write
E21000
direct allocation
page read and write
1195000
unkown
page read and write
15B9000
direct allocation
page read and write
2E39000
heap
page read and write
9172DFE000
stack
page read and write
2F9B5515000
heap
page read and write
6CA48000
unkown
page readonly
16AC000
direct allocation
page read and write
15A3000
direct allocation
page read and write
2122B925000
heap
page read and write
21FCD465000
heap
page read and write
AE0987C000
stack
page read and write
273E3E70000
heap
page read and write
2B513370000
heap
page read and write
122E000
stack
page read and write
302C000
direct allocation
page read and write
A70000
unkown
page read and write
2243E2B0000
heap
page read and write
18683385000
heap
page read and write
E0C000
direct allocation
page read and write
2E19000
heap
page read and write
28E8CD88000
heap
page read and write
50FC47C000
stack
page read and write
20571EA0000
heap
page read and write
1540000
heap
page read and write
2A02EF00000
heap
page read and write
9CAF8BD000
stack
page read and write
2F9B5510000
heap
page read and write
2DAC000
direct allocation
page read and write
15C7000
direct allocation
page read and write
2DFD000
direct allocation
page read and write
4E77000
trusted library allocation
page read and write
1DEB2BE0000
heap
page read and write
301D000
direct allocation
page read and write
179FFBC0000
heap
page read and write
1238000
heap
page read and write
131D000
stack
page read and write
21FCD420000
heap
page read and write
4D5D000
stack
page read and write
18D67A10000
heap
page read and write
118E000
unkown
page write copy
D7F000
direct allocation
page read and write
18D67B98000
heap
page read and write
42AE000
direct allocation
page read and write
73AFEFF000
stack
page read and write
DA4000
direct allocation
page read and write
1190000
unkown
page write copy
16B3000
direct allocation
page read and write
1250000
heap
page read and write
152F000
stack
page read and write
2FF2000
direct allocation
page read and write
4E60000
trusted library allocation
page read and write
2FE3000
direct allocation
page read and write
D30000
direct allocation
page read and write
3041000
direct allocation
page read and write
1B347188000
heap
page read and write
25A54A20000
heap
page read and write
BB2000
unkown
page write copy
4C21000
heap
page read and write
D4C000
direct allocation
page read and write
4290000
direct allocation
page read and write
D78000
stack
page read and write
1D00EA90000
heap
page read and write
14A0000
heap
page read and write
EAD000
stack
page read and write
2FAB000
direct allocation
page read and write
1260000
heap
page read and write
2FB6000
direct allocation
page read and write
4E62000
trusted library allocation
page read and write
1E874CE0000
heap
page read and write
2FC4000
direct allocation
page read and write
B9C000
unkown
page readonly
1CF75410000
heap
page read and write
1BE99260000
heap
page read and write
34D0000
heap
page read and write
1195000
heap
page read and write
3CD0000
direct allocation
page read and write
25A54A00000
heap
page read and write
6C8A0000
unkown
page readonly
CE4827E000
stack
page read and write
1BE991C0000
heap
page read and write
163D000
direct allocation
page read and write
1195000
unkown
page write copy
FF005EE000
stack
page read and write
7C1000
unkown
page execute read
2C4EE640000
heap
page read and write
4289000
direct allocation
page read and write
F0771CE000
stack
page read and write
1010000
heap
page read and write
25A54A80000
heap
page read and write
1570000
heap
page read and write
20571C70000
heap
page read and write
2F40000
direct allocation
page read and write
2E88000
direct allocation
page read and write
156E000
stack
page read and write
40B0000
direct allocation
page read and write
295BDA10000
heap
page read and write
2E16000
heap
page read and write
BBB000
unkown
page readonly
2DB4000
direct allocation
page read and write
D96000
direct allocation
page read and write
126D000
heap
page read and write
3D83000
direct allocation
page read and write
2F99000
direct allocation
page read and write
27E8DB90000
heap
page read and write
E06810D000
stack
page read and write
2314FEB5000
heap
page read and write
2C56FA00000
heap
page read and write
13C0000
heap
page read and write
4D0C000
stack
page read and write
16D9000
heap
page read and write
BB2000
unkown
page read and write
3A90000
direct allocation
page read and write
D45000
direct allocation
page read and write
28E8CBE0000
heap
page read and write
632000
unkown
page read and write
13E6000
heap
page read and write
1E874CC0000
heap
page read and write
AE7000
unkown
page readonly
2E29000
heap
page read and write
EEB0A7E000
stack
page read and write
2F72000
direct allocation
page read and write
5641CFE000
stack
page read and write
15B4000
heap
page read and write
2300A6C5000
heap
page read and write
1F112E10000
heap
page read and write
2DDF000
direct allocation
page read and write
637000
unkown
page readonly
2FAE000
direct allocation
page read and write
223A8400000
heap
page read and write
DCB7CFF000
stack
page read and write
2300A780000
heap
page read and write
16BA000
direct allocation
page read and write
1619000
direct allocation
page read and write
13E7000
heap
page read and write
1D00E970000
heap
page read and write
3C10000
direct allocation
page read and write
2C56FD25000
heap
page read and write
28FF000
heap
page read and write
1CF753F0000
heap
page read and write
1578000
heap
page read and write
105E000
stack
page read and write
2C56FBD0000
heap
page read and write
BAD9F2C000
stack
page read and write
146E000
stack
page read and write
4E87000
trusted library allocation
page read and write
1688000
direct allocation
page read and write
28E8CCC0000
heap
page read and write
1210000
heap
page read and write
2F4E000
direct allocation
page read and write
D62000
direct allocation
page read and write
2712FE000
stack
page read and write
15EB000
direct allocation
page read and write
14C0000
direct allocation
page execute and read and write
78C000
stack
page read and write
E13000
direct allocation
page read and write
1590000
direct allocation
page read and write
50FC57E000
stack
page read and write
1572FA90000
heap
page read and write
179FFC98000
heap
page read and write
28C0000
heap
page read and write
3B10000
direct allocation
page read and write
15E4000
direct allocation
page read and write
295BDE00000
heap
page read and write
223A8865000
heap
page read and write
EC3737E000
stack
page read and write
AF0000
unkown
page readonly
5641DFE000
stack
page read and write
3C50000
direct allocation
page read and write
1F112FC0000
heap
page read and write
2300A690000
heap
page read and write
2E64000
direct allocation
page read and write
11A7000
unkown
page readonly
15F2000
direct allocation
page read and write
1B347130000
heap
page read and write
335EE7F000
stack
page read and write
3F4E000
stack
page read and write
BD24B7E000
stack
page read and write
E06847E000
stack
page read and write
11E0000
heap
page read and write
AFF000
stack
page read and write
1B300820000
heap
page read and write
1190000
unkown
page read and write
6CA58000
unkown
page write copy
564199D000
stack
page read and write
1E063B90000
heap
page read and write
137E000
stack
page read and write
6D4717F000
stack
page read and write
16D0000
heap
page read and write
CEF000
stack
page read and write
3F8000
heap
page read and write
BBBDBFF000
stack
page read and write
1BE991E0000
heap
page read and write
29CD000
heap
page read and write
4E87000
trusted library allocation
page read and write
2FA0000
direct allocation
page read and write
D5A000
heap
page read and write
404E000
stack
page read and write
18683040000
heap
page read and write
179FFF10000
heap
page read and write
42E2000
direct allocation
page read and write
20571D50000
heap
page read and write
2C56FBF0000
heap
page read and write
162E000
direct allocation
page read and write
129F000
heap
page read and write
4B8E000
stack
page read and write
D69000
direct allocation
page read and write
2F55000
direct allocation
page read and write
3390000
direct allocation
page read and write
2F78000
direct allocation
page read and write
2E39000
direct allocation
page read and write
2314FD90000
heap
page read and write
295BDBB8000
heap
page read and write
D3E000
direct allocation
page read and write
54E000
stack
page read and write
1BE99268000
heap
page read and write
4CCF000
stack
page read and write
2122B660000
heap
page read and write
4E60000
trusted library allocation
page read and write
D0E000
stack
page read and write
20571E70000
heap
page read and write
1D239D60000
heap
page read and write
303A000
direct allocation
page read and write
A6E000
unkown
page write copy
1272000
heap
page read and write
EB0000
heap
page read and write
DBA000
direct allocation
page read and write
1572FAD0000
heap
page read and write
27E8DD90000
heap
page read and write
2D69000
direct allocation
page read and write
2FF0000
direct allocation
page read and write
1E063850000
heap
page read and write
2FEB000
direct allocation
page read and write
32F0000
heap
page read and write
1CF75470000
heap
page read and write
6D4707C000
stack
page read and write
3008000
direct allocation
page read and write
1060000
heap
page read and write
80D39BD000
stack
page read and write
4E4218C000
stack
page read and write
18683150000
heap
page read and write
550000
heap
page read and write
AF0000
unkown
page readonly
1B300828000
heap
page read and write
1572FDE0000
heap
page read and write
2122B760000
heap
page read and write
BE0000
heap
page read and write
418C000
stack
page read and write
B9C000
unkown
page readonly
21FCD320000
heap
page read and write
119D000
unkown
page read and write
AF1000
unkown
page execute read
1090000
heap
page read and write
D6B23FE000
stack
page read and write
168F000
direct allocation
page read and write
1B347100000
heap
page read and write
CAB000
stack
page read and write
2DA5000
direct allocation
page read and write
11DF07E000
stack
page read and write
2F31000
direct allocation
page read and write
2F00000
heap
page read and write
115D000
unkown
page execute read
BBB000
unkown
page readonly
D50000
heap
page read and write
1BE990E0000
heap
page read and write
1F112DA0000
heap
page read and write
118E000
unkown
page read and write
3D60000
direct allocation
page read and write
C51CD8F000
stack
page read and write
2E16000
heap
page read and write
4BCE000
stack
page read and write
42A4000
direct allocation
page read and write
18683120000
heap
page read and write
1572FAA0000
heap
page read and write
DE0000
direct allocation
page read and write
1696000
direct allocation
page read and write
115D000
stack
page read and write
7EF3B000
direct allocation
page read and write
2E5D000
direct allocation
page read and write
9172CFD000
stack
page read and write
2E4F000
direct allocation
page read and write
1E063938000
heap
page read and write
273E3F70000
heap
page read and write
3560000
trusted library allocation
page read and write
11DED4D000
stack
page read and write
1CF75310000
heap
page read and write
1DEB2A10000
heap
page read and write
D5B000
direct allocation
page read and write
2F88000
direct allocation
page read and write
156E000
stack
page read and write
7F23A000
direct allocation
page read and write
11C0000
heap
page read and write
1D00E978000
heap
page read and write
1F112DC0000
heap
page read and write
2B513440000
heap
page read and write
CE4817F000
stack
page read and write
80D3DFE000
stack
page read and write
39C000
stack
page read and write
26F3F2C000
stack
page read and write
1654000
direct allocation
page read and write
A54857E000
stack
page read and write
4E60000
trusted library allocation
page read and write
4012000
heap
page read and write
635000
unkown
page write copy
632000
unkown
page read and write
2122B560000
heap
page read and write
1B347110000
heap
page read and write
1608000
direct allocation
page read and write
4220000
heap
page read and write
D19000
direct allocation
page read and write
1E063930000
heap
page read and write
348E000
stack
page read and write
2DD0000
direct allocation
page read and write
4320000
direct allocation
page read and write
D9D000
direct allocation
page read and write
DE8047E000
stack
page read and write
F28000
heap
page read and write
142F000
stack
page read and write
2DBB000
direct allocation
page read and write
2E32000
direct allocation
page read and write
D55000
heap
page read and write
408E000
direct allocation
page read and write
223A8410000
heap
page read and write
1240000
direct allocation
page read and write
4E7B000
trusted library allocation
page read and write
473B000
direct allocation
page read and write
BB2000
unkown
page read and write
1572FDE5000
heap
page read and write
165B000
direct allocation
page read and write
214361B0000
heap
page read and write
118B000
unkown
page execute read
3570000
heap
page read and write
1268000
heap
page read and write
DC1000
direct allocation
page read and write
2DE6000
direct allocation
page read and write
4098000
direct allocation
page read and write
3016000
direct allocation
page read and write
EEB087D000
stack
page read and write
DF6000
direct allocation
page read and write
16D5000
heap
page read and write
20571D70000
heap
page read and write
15CE000
direct allocation
page read and write
32E0000
heap
page read and write
4C1F000
stack
page read and write
21FCD400000
heap
page read and write
2B80000
heap
page read and write
2B40000
direct allocation
page read and write
9CAF9BF000
stack
page read and write
3D8D000
direct allocation
page read and write
4E0D000
stack
page read and write
3048000
direct allocation
page read and write
1D239F60000
heap
page read and write
28E8CD80000
heap
page read and write
A87000
unkown
page readonly
15C0000
heap
page read and write
2E6C000
direct allocation
page read and write
7E4097F000
stack
page read and write
1B347180000
heap
page read and write
2F9B5208000
heap
page read and write
1679000
direct allocation
page read and write
C042A7D000
stack
page read and write
1D239D87000
heap
page read and write
639000
unkown
page readonly
18683158000
heap
page read and write
1644000
direct allocation
page read and write
D8F000
direct allocation
page read and write
2FD4000
direct allocation
page read and write
223A84C0000
heap
page read and write
2F9B51A0000
heap
page read and write
13AE000
stack
page read and write
DE8037E000
stack
page read and write
75EC48C000
stack
page read and write
223A84C8000
heap
page read and write
EDF000
stack
page read and write
AD0000
heap
page read and write
27E8DBC8000
heap
page read and write
2F9B5200000
heap
page read and write
25A54A87000
heap
page read and write
28E8CCE0000
heap
page read and write
179FFF15000
heap
page read and write
28FD000
heap
page read and write
1D239D80000
heap
page read and write
BBB000
unkown
page readonly
27E8DBA0000
heap
page read and write
1E063B95000
heap
page read and write
C5498FF000
stack
page read and write
4150000
direct allocation
page read and write
127B000
heap
page read and write
BBBDAFF000
stack
page read and write
223A8860000
heap
page read and write
20571D78000
heap
page read and write
629000
unkown
page read and write
2E12000
heap
page read and write
1B300AB0000
heap
page read and write
179FFC90000
heap
page read and write
11DF17E000
stack
page read and write
DE8000
direct allocation
page read and write
F0774FE000
stack
page read and write
BBBD79D000
stack
page read and write
4D20000
trusted library allocation
page read and write
2C4EE6B0000
heap
page read and write
BF6000
stack
page read and write
1B347490000
heap
page read and write
2FE0000
heap
page read and write
1672000
direct allocation
page read and write
EE1000
unkown
page execute read
73AFBCE000
stack
page read and write
2D90000
direct allocation
page read and write
2A02EDF0000
heap
page read and write
2E7A000
direct allocation
page read and write
D70000
direct allocation
page read and write
DD0000
heap
page read and write
D86000
direct allocation
page read and write
2243E330000
heap
page read and write
214361B8000
heap
page read and write
1D00EB35000
heap
page read and write
2D97000
direct allocation
page read and write
2D88000
direct allocation
page read and write
1E874AE0000
heap
page read and write
C51CC8D000
stack
page read and write
2B5133A0000
heap
page read and write
3A10000
direct allocation
page read and write
120E000
stack
page read and write
80D3CFE000
stack
page read and write
2F9B5170000
heap
page read and write
1DEB29D0000
heap
page read and write
2D81000
direct allocation
page read and write
18D67B90000
heap
page read and write
F20000
heap
page read and write
F0770CD000
stack
page read and write
2E3A000
heap
page read and write
2F9B5180000
heap
page read and write
3024000
direct allocation
page read and write
7F0000
heap
page read and write
2C56FD20000
heap
page read and write
1E874BC8000
heap
page read and write
2BD0000
direct allocation
page read and write
136F000
stack
page read and write
629000
unkown
page read and write
1DEB29E0000
heap
page read and write
6C8A1000
unkown
page execute read
1DEB2DD0000
heap
page read and write
2FDB000
direct allocation
page read and write
1B3007E0000
heap
page read and write
D28000
direct allocation
page read and write
E40000
heap
page read and write
15C1000
heap
page read and write
BBB000
unkown
page readonly
AF0000
unkown
page readonly
26F437E000
stack
page read and write
3104000
heap
page read and write
EC3747E000
stack
page read and write
2FEA000
heap
page read and write
28E8CF85000
heap
page read and write
13B5000
heap
page read and write
2F64000
direct allocation
page read and write
25A54A50000
heap
page read and write
2E7A000
heap
page read and write
BD24A7F000
stack
page read and write
42CE000
direct allocation
page read and write
C5494AC000
stack
page read and write
AF1000
unkown
page execute read
214364F0000
heap
page read and write
270EEC000
stack
page read and write
2C4EE620000
heap
page read and write
295BDE05000
heap
page read and write
2243E620000
heap
page read and write
3D60000
direct allocation
page read and write
21FCD210000
heap
page read and write
DE8027D000
stack
page read and write
295BDB10000
heap
page read and write
3573000
heap
page read and write
15B3000
heap
page read and write
4E7B000
trusted library allocation
page read and write
2314FD70000
heap
page read and write
DD2000
direct allocation
page read and write
3D60000
direct allocation
page read and write
2A02F000000
heap
page read and write
80D3D7E000
unkown
page readonly
DCB7DFF000
stack
page read and write
DF0000
heap
page read and write
BD2471C000
stack
page read and write
2AC0000
direct allocation
page read and write
1D239C80000
heap
page read and write
2DF6000
direct allocation
page read and write
EE7267D000
stack
page read and write
1E874E65000
heap
page read and write
AE09A7E000
stack
page read and write
1F112E18000
heap
page read and write
40B3000
direct allocation
page read and write
32D3000
heap
page read and write
2FE5000
heap
page read and write
EE7277F000
stack
page read and write
29B000
stack
page read and write
D6B22FC000
stack
page read and write
D9E000
stack
page read and write
B9C000
unkown
page readonly
484D000
direct allocation
page read and write
409000
heap
page read and write
2F39000
direct allocation
page read and write
2C4EE540000
heap
page read and write
A54867E000
stack
page read and write
7E40A7E000
stack
page read and write
636000
unkown
page read and write
2DEF000
direct allocation
page read and write
2B5137C0000
heap
page read and write
C5495AF000
stack
page read and write
270FEF000
stack
page read and write
1680000
direct allocation
page read and write
7E4087D000
stack
page read and write
2DC2000
direct allocation
page read and write
D37000
direct allocation
page read and write
1620000
direct allocation
page read and write
42E0000
direct allocation
page read and write
2F10000
direct allocation
page read and write
21436160000
heap
page read and write
18683250000
heap
page read and write
2A02F195000
heap
page read and write
2B513448000
heap
page read and write
FF008FE000
stack
page read and write
B9C000
unkown
page readonly
D78000
direct allocation
page read and write
1E874E60000
heap
page read and write
1636000
direct allocation
page read and write
3D70000
direct allocation
page read and write
15AA000
heap
page read and write
1D239F65000
heap
page read and write
2E10000
heap
page read and write
2243E625000
heap
page read and write
2FBD000
direct allocation
page read and write
15C9000
heap
page read and write
4A8E000
stack
page read and write
2A02EFE0000
heap
page read and write
3D7B000
direct allocation
page read and write
3D9F000
direct allocation
page read and write
2300A787000
heap
page read and write
2E73000
direct allocation
page read and write
21436170000
heap
page read and write
26F427F000
stack
page read and write
1D00E880000
heap
page read and write
581000
unkown
page execute read
1BE99550000
heap
page read and write
2314FC90000
heap
page read and write
273E4120000
heap
page read and write
18683380000
heap
page read and write
28BF000
stack
page read and write
AE0997F000
stack
page read and write
3FB0000
direct allocation
page read and write
21FCD218000
heap
page read and write
1287000
heap
page read and write
335EB7D000
stack
page read and write
2300A5B0000
heap
page read and write
DAC000
stack
page read and write
780000
heap
page read and write
10EF000
stack
page read and write
21FCD460000
heap
page read and write
18D67B10000
heap
page read and write
273E3F90000
heap
page read and write
169D000
direct allocation
page read and write
105C000
stack
page read and write
D6B26FE000
stack
page read and write
11A4000
unkown
page write copy
1E063870000
heap
page read and write
2C56FA08000
heap
page read and write
1D00EA70000
heap
page read and write
1230000
heap
page read and write
335EF7F000
stack
page read and write
2B5137C5000
heap
page read and write
10E6000
unkown
page execute read
4E60000
trusted library allocation
page read and write
11E6000
heap
page read and write
2E81000
direct allocation
page read and write
1CF756D0000
heap
page read and write
D10000
heap
page read and write
2D4F000
stack
page read and write
1B3007D0000
heap
page read and write
2243E338000
heap
page read and write
4E4257E000
unkown
page readonly
4A4E000
stack
page read and write
2A02EDF8000
heap
page read and write
E06857E000
stack
page read and write
EC3727D000
stack
page read and write
18D67B70000
heap
page read and write
4E425FF000
stack
page read and write
EE7287E000
stack
page read and write
6CB23000
unkown
page read and write
27E8DF10000
heap
page read and write
75EC8FF000
stack
page read and write
2F5D000
direct allocation
page read and write
2FF7000
heap
page read and write
A80000
unkown
page write copy
1572FAD8000
heap
page read and write
2E29000
heap
page read and write
62B000
unkown
page read and write
7C0000
unkown
page readonly
2E40000
direct allocation
page read and write
4C20000
heap
page read and write
295BDAF0000
heap
page read and write
6D4727F000
stack
page read and write
1E874BC0000
heap
page read and write
2C4EE8F0000
heap
page read and write
D54000
direct allocation
page read and write
1B300AB5000
heap
page read and write
16C1000
direct allocation
page read and write
62B000
unkown
page read and write
1CF756D5000
heap
page read and write
414F000
stack
page read and write
AE099FE000
unkown
page readonly
1B300800000
heap
page read and write
1E063770000
heap
page read and write
1098000
heap
page read and write
BADA37F000
stack
page read and write
15C0000
direct allocation
page read and write
4E7B000
trusted library allocation
page read and write
9CAFCFF000
stack
page read and write
273E3D80000
heap
page read and write
15DD000
direct allocation
page read and write
1D00EB30000
heap
page read and write
DE0000
heap
page read and write
E1A000
direct allocation
page read and write
21436190000
heap
page read and write
4299000
direct allocation
page read and write
164D000
direct allocation
page read and write
3DD0000
direct allocation
page read and write
2F47000
direct allocation
page read and write
1DEB2A18000
heap
page read and write
A85000
unkown
page readonly
6CC12000
unkown
page readonly
2314FEB0000
heap
page read and write
132D000
stack
page read and write
DCA000
direct allocation
page read and write
273E3E78000
heap
page read and write
300F000
direct allocation
page read and write
18D67AF0000
heap
page read and write
CE4807C000
stack
page read and write
500000
heap
page read and write
28E8CF80000
heap
page read and write
1664000
direct allocation
page read and write
4E77000
trusted library allocation
page read and write
2DD7000
direct allocation
page read and write
EE0000
unkown
page readonly
4E5B000
stack
page read and write
223A8430000
heap
page read and write
AF1000
unkown
page execute read
13A0000
heap
page read and write
27E8DF15000
heap
page read and write
2E2A000
direct allocation
page read and write
E28000
direct allocation
page read and write
1CF75478000
heap
page read and write
25A54920000
heap
page read and write
1DEB2DD5000
heap
page read and write
214364F5000
heap
page read and write
1410000
heap
page read and write
15D5000
heap
page read and write
2C4EE8F5000
heap
page read and write
AE09AFE000
unkown
page readonly
C042B7E000
stack
page read and write
2E04000
direct allocation
page read and write
2C56F9E0000
heap
page read and write
50FC67E000
stack
page read and write
2300A6D0000
heap
page read and write
2314FB90000
heap
page read and write
18D67B75000
heap
page read and write
37B0000
trusted library allocation
page read and write
DAA000
direct allocation
page read and write
15D5000
direct allocation
page read and write
A6E000
unkown
page read and write
179FFBE0000
heap
page read and write
D21000
direct allocation
page read and write
166F000
stack
page read and write
162B000
direct allocation
page read and write
1460000
heap
page read and write
2B513380000
heap
page read and write
CCD000
stack
page read and write
629000
unkown
page write copy
EFC000
unkown
page execute read
EEB097E000
stack
page read and write
11A4000
unkown
page read and write
2300A6C0000
heap
page read and write
28C1000
heap
page read and write
DFD000
direct allocation
page read and write
6CB29000
unkown
page execute read
D59000
heap
page read and write
75EC58E000
stack
page read and write
25A54A55000
heap
page read and write
2A02F190000
heap
page read and write
2243E290000
heap
page read and write
DCB79FD000
stack
page read and write
4E77000
trusted library allocation
page read and write
1D239E80000
heap
page read and write
2E17000
heap
page read and write
2122B920000
heap
page read and write
47C9000
direct allocation
page read and write
13B9000
heap
page read and write
1572FCA0000
heap
page read and write
3F0000
heap
page read and write
2E21000
direct allocation
page read and write
20571EA5000
heap
page read and write
2243E1B0000
heap
page read and write
1BE99555000
heap
page read and write
2E48000
direct allocation
page read and write
1F112FC5000
heap
page read and write
BB2000
unkown
page write copy
AF1000
unkown
page execute read
DD9000
direct allocation
page read and write
42BE000
direct allocation
page read and write
73AFACD000
stack
page read and write
D09000
direct allocation
page read and write
27E8DBC0000
heap
page read and write
C51D0FE000
stack
page read and write
FF004ED000
stack
page read and write
15B1000
direct allocation
page read and write
1B347495000
heap
page read and write
4E87000
trusted library allocation
page read and write
2E56000
direct allocation
page read and write
3310000
direct allocation
page execute and read and write
7EF20000
direct allocation
page read and write
2F23000
direct allocation
page read and write
13B0000
heap
page read and write
2F6B000
direct allocation
page read and write
16C8000
direct allocation
page read and write
16A4000
direct allocation
page read and write
2314FB98000
heap
page read and write
273E4125000
heap
page read and write
3390000
direct allocation
page read and write
176E000
stack
page read and write
2DC9000
direct allocation
page read and write
1F112CC0000
heap
page read and write
1190000
heap
page read and write
34AE000
direct allocation
page read and write
2122B740000
heap
page read and write
1230000
heap
page read and write
2E1A000
direct allocation
page read and write
3D70000
direct allocation
page read and write
166B000
direct allocation
page read and write
4E424FE000
stack
page read and write
E04000
direct allocation
page read and write
A54847C000
stack
page read and write
76E000
stack
page read and write
3033000
direct allocation
page read and write
C042C7F000
stack
page read and write
E60000
heap
page read and write
295BDBB0000
heap
page read and write
2122B568000
heap
page read and write
A7D000
unkown
page read and write
179FFAE0000
heap
page read and write
There are 745 hidden memdumps, click here to show them.