IOC Report
z1DHLSTATEMENTOFACCOUNT-1004419433.scr.exe

loading gifFilesProcessesURLsDomainsIPsRegistryMemdumps8642010010Label

Files

File Path
Type
Category
Malicious
Download
z1DHLSTATEMENTOFACCOUNT-1004419433.scr.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\z1DHLSTATEMENTOFACCOUNT-1004419433.scr.exe.log
ASCII text, with CRLF line terminators
dropped
malicious
C:\Users\user\AppData\Local\Temp\tmp5507.tmp
XML 1.0 document, ASCII text
dropped
malicious
C:\Users\user\AppData\Roaming\WRhoFpZJ.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\WRhoFpZJ.exe:Zone.Identifier
ASCII text, with CRLF line terminators
dropped
malicious
C:\ProgramData\Microsoft\Network\Downloader\edb.chk
data
dropped
C:\ProgramData\Microsoft\Network\Downloader\edb.log
data
dropped
C:\ProgramData\Microsoft\Network\Downloader\qmgr.db
Extensible storage engine DataBase, version 0x620, checksum 0x3dbb6967, page size 16384, Windows version 10.0
dropped
C:\ProgramData\Microsoft\Network\Downloader\qmgr.jfm
data
dropped
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\WRhoFpZJ.exe.log
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
data
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_0cqhm502.ipw.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_ovshvleb.ke3.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_t4fhwa1h.xph.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_u30e0j3v.erc.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\tmp611D.tmp
XML 1.0 document, ASCII text
dropped
C:\Windows\ServiceProfiles\LocalService\AppData\Local\FontCache\Fonts\Download-1.tmp
JSON data
dropped
There are 7 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\z1DHLSTATEMENTOFACCOUNT-1004419433.scr.exe
"C:\Users\user\Desktop\z1DHLSTATEMENTOFACCOUNT-1004419433.scr.exe"
malicious
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\WRhoFpZJ.exe"
malicious
C:\Windows\SysWOW64\schtasks.exe
"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\WRhoFpZJ" /XML "C:\Users\user\AppData\Local\Temp\tmp5507.tmp"
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"
malicious
C:\Users\user\AppData\Roaming\WRhoFpZJ.exe
C:\Users\user\AppData\Roaming\WRhoFpZJ.exe
malicious
C:\Windows\SysWOW64\schtasks.exe
"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\WRhoFpZJ" /XML "C:\Users\user\AppData\Local\Temp\tmp611D.tmp"
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\wbem\WmiPrvSE.exe
C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\svchost.exe
C:\Windows\System32\svchost.exe -k netsvcs -p -s BITS
There are 3 hidden processes, click here to show them.

URLs

Name
IP
Malicious
https://www.office.com/
unknown
https://duckduckgo.com/ac/?q=
unknown
https://www.office.com/T
unknown
https://api.telegram.org
unknown
https://api.telegram.org/bot
unknown
https://chrome.google.com/webstore?hl=enH
unknown
https://www.office.com/lB
unknown
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
unknown
https://g.live.com/odclientsettings/ProdV21C:
unknown
https://www.office.com/H
unknown
http://crl.ver)
unknown
https://ac.ecosia.org?q=
unknown
http://checkip.dyndns.org
unknown
https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
unknown
https://reallyfreegeoip.org/xml/45.92.229.138$
unknown
https://api.telegram.org/bot/sendMessage?chat_id=&text=
unknown
https://chrome.google.com/webstore?hl=en
unknown
https://www.chiark.greenend.org.uk/~sgtatham/putty/0
unknown
http://varders.kozow.com:8081
unknown
http://aborters.duckdns.org:8081
unknown
https://www.google.com/images/branding/product/ico/googleg_alldp.ico
unknown
https://g.live.com/odclientsettings/Prod1C:
unknown
https://www.ecosia.org/newtab/v20
unknown
https://api.telegram.org/bot/sendMessage?chat_id=&text=%20%0D%0A%0D%0APC%20Name:287400%0D%0ADate%20and%20Time:%2028/03/2025%20/%2011:36:29%0D%0ACountry%20Name:%20United%20States%0D%0A%5B%20287400%20Clicked%20on%20the%20File%20If%20you%20see%20nothing%20this's%20mean%20the%20system%20storage's%20empty.%20%5D
149.154.167.220
http://checkip.dyndns.org/
158.101.44.242
http://anotherarmy.dns.army:8081
unknown
https://duckduckgo.com/chrome_newtabv20
unknown
https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
unknown
https://api.telegram.org/bot/sendMessage?chat_id=&text=%20%0D%0A%0D%0APC%20Name:287400%0D%0ADate%20and%20Time:%2028/03/2025%20/%2006:49:39%0D%0ACountry%20Name:%20United%20States%0D%0A%5B%20287400%20Clicked%20on%20the%20File%20If%20you%20see%20nothing%20this's%20mean%20the%20system%20storage's%20empty.%20%5D
149.154.167.220
http://checkip.dyndns.org/q
unknown
https://chrome.google.com/webstore?hl=enlB
unknown
https://reallyfreegeoip.org
unknown
https://reallyfreegeoip.org/xml/45.92.229.138
104.21.64.1
https://chrome.google.com/webstore?hl=enT
unknown
https://api.telegram.org/bot/sendMessage?chat_id=&text=%20%0D%0A%0D%0APC%20Name:287400%0D%0ADate%20a
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
unknown
https://gemini.google.com/app?q=
unknown
http://51.38.247.67:8081/_send_.php?LCapplication/x-www-form-urlencoded
unknown
https://reallyfreegeoip.org/xml/
unknown
There are 30 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
reallyfreegeoip.org
104.21.64.1
api.telegram.org
149.154.167.220
checkip.dyndns.com
158.101.44.242
checkip.dyndns.org
unknown

IPs

IP
Domain
Country
Malicious
149.154.167.220
api.telegram.org
United Kingdom
104.21.64.1
reallyfreegeoip.org
United States
158.101.44.242
checkip.dyndns.com
United States
127.0.0.1
unknown
unknown

Registry

Path
Value
Malicious
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASAPI32
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASAPI32
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASAPI32
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASAPI32
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASAPI32
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASAPI32
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASAPI32
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASMANCS
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASMANCS
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASMANCS
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASMANCS
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASMANCS
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASMANCS
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASMANCS
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\BITS
PerfMMFileName
There are 6 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
Download
4AE8000
trusted library allocation
page read and write
malicious
3061000
trusted library allocation
page read and write
malicious
2C51000
trusted library allocation
page read and write
malicious
3EF9000
trusted library allocation
page read and write
malicious
428000
remote allocation
page execute and read and write
malicious
6830000
trusted library allocation
page execute and read and write
1883000
trusted library allocation
page read and write
579E000
stack
page read and write
C37F37B000
stack
page read and write
C30057E000
unkown
page readonly
CF7000
stack
page read and write
5330000
heap
page read and write
2F97000
trusted library allocation
page read and write
1220000
trusted library allocation
page execute and read and write
30D1000
trusted library allocation
page read and write
1D026A74000
trusted library allocation
page read and write
4FEE000
stack
page read and write
14E3000
heap
page read and write
BA6E000
stack
page read and write
59DE000
stack
page read and write
C37EF7E000
stack
page read and write
121C000
stack
page read and write
1530000
heap
page read and write
B82D000
stack
page read and write
2E2B000
heap
page read and write
4089000
trusted library allocation
page read and write
30FF000
trusted library allocation
page read and write
65DE000
stack
page read and write
5130000
trusted library allocation
page read and write
1D026A30000
trusted library allocation
page read and write
4136000
trusted library allocation
page read and write
55C4000
trusted library allocation
page read and write
5830000
trusted library allocation
page read and write
32DC000
trusted library allocation
page read and write
3E2F000
trusted library allocation
page read and write
1D026B30000
trusted library allocation
page read and write
7960000
trusted library section
page read and write
3360000
heap
page read and write
2E00000
heap
page read and write
43C000
remote allocation
page execute and read and write
6453000
heap
page read and write
703B6000
unkown
page readonly
C300479000
stack
page read and write
4B90000
trusted library allocation
page execute and read and write
2F6D000
trusted library allocation
page read and write
2F05000
trusted library allocation
page read and write
662E000
stack
page read and write
1D026A30000
trusted library allocation
page read and write
D9E000
stack
page read and write
2BEE000
unkown
page read and write
40F1000
trusted library allocation
page read and write
5C95000
heap
page read and write
402000
remote allocation
page execute and read and write
1371000
trusted library allocation
page read and write
2F5C000
trusted library allocation
page read and write
1D026C1B000
heap
page read and write
770000
heap
page read and write
1D022000000
trusted library allocation
page read and write
6B60000
trusted library allocation
page read and write
1D0216B6000
heap
page read and write
1D021E02000
heap
page read and write
10F7000
stack
page read and write
1D02165C000
heap
page read and write
170F000
stack
page read and write
2D08000
trusted library allocation
page read and write
188D000
trusted library allocation
page execute and read and write
F33000
trusted library allocation
page execute and read and write
7A6000
heap
page read and write
135B000
trusted library allocation
page read and write
65E0000
heap
page read and write
30D6000
trusted library allocation
page read and write
AC5E000
stack
page read and write
3E02000
trusted library allocation
page read and write
1364000
heap
page read and write
1033000
heap
page read and write
2783000
trusted library allocation
page read and write
123A000
stack
page read and write
3CF6000
trusted library allocation
page read and write
55BE000
stack
page read and write
58B0000
heap
page read and write
310B000
trusted library allocation
page read and write
2EBC000
trusted library allocation
page read and write
4161000
trusted library allocation
page read and write
3B0000
heap
page read and write
DE0000
heap
page read and write
1D021E15000
heap
page read and write
AB7000
trusted library allocation
page execute and read and write
695E000
stack
page read and write
1D026B00000
trusted library allocation
page read and write
17D1000
trusted library allocation
page read and write
2691000
trusted library allocation
page read and write
189A000
trusted library allocation
page execute and read and write
426000
remote allocation
page execute and read and write
5C70000
trusted library allocation
page read and write
40C9000
trusted library allocation
page read and write
302E000
stack
page read and write
798000
heap
page read and write
2DD8000
trusted library allocation
page read and write
41F000
remote allocation
page execute and read and write
5134000
trusted library allocation
page read and write
1D026B10000
trusted library allocation
page read and write
3E60000
trusted library allocation
page read and write
C4E000
stack
page read and write
73E000
stack
page read and write
78E0000
trusted library allocation
page execute and read and write
C0E000
stack
page read and write
330F000
trusted library allocation
page read and write
1D026CFA000
heap
page read and write
1D021676000
heap
page read and write
14C9000
heap
page read and write
1D021550000
heap
page read and write
3266000
trusted library allocation
page read and write
1338000
heap
page read and write
6980000
heap
page read and write
2AFD000
stack
page read and write
CB6000
trusted library allocation
page read and write
3F04000
trusted library allocation
page read and write
4289000
trusted library allocation
page read and write
2794000
trusted library allocation
page read and write
58A5000
trusted library allocation
page read and write
326D000
stack
page read and write
3699000
trusted library allocation
page read and write
1D021450000
heap
page read and write
C1D0000
trusted library allocation
page read and write
1D026C5F000
heap
page read and write
174E000
stack
page read and write
435E000
trusted library allocation
page read and write
B96D000
stack
page read and write
AD9E000
stack
page read and write
1D026C00000
heap
page read and write
3214000
trusted library allocation
page read and write
1D021641000
heap
page read and write
2F0B000
trusted library allocation
page read and write
64EE000
stack
page read and write
5881000
trusted library allocation
page read and write
CC2000
trusted library allocation
page read and write
AA1D000
stack
page read and write
2D5A000
trusted library allocation
page read and write
34AA000
heap
page read and write
4B20000
heap
page read and write
9EA000
stack
page read and write
F4D000
trusted library allocation
page execute and read and write
5886000
trusted library allocation
page read and write
1D026A70000
trusted library allocation
page read and write
1D021F13000
heap
page read and write
1D026C58000
heap
page read and write
AAA000
trusted library allocation
page execute and read and write
336C000
trusted library allocation
page read and write
2EDA000
trusted library allocation
page read and write
5940000
trusted library allocation
page execute and read and write
1D021717000
heap
page read and write
1D026A20000
trusted library allocation
page read and write
5950000
trusted library allocation
page read and write
D50000
heap
page read and write
C37F47E000
unkown
page readonly
BF7C000
stack
page read and write
3F32000
trusted library allocation
page read and write
311B000
trusted library allocation
page read and write
4B30000
heap
page read and write
1D0280A0000
trusted library allocation
page read and write
C90000
trusted library allocation
page read and write
66AE000
stack
page read and write
B35E000
stack
page read and write
2C3F000
stack
page read and write
12D0000
trusted library allocation
page read and write
4126000
trusted library allocation
page read and write
B0DF000
stack
page read and write
679E000
stack
page read and write
703BF000
unkown
page readonly
68A0000
trusted library allocation
page read and write
4B60000
trusted library allocation
page read and write
12ED000
trusted library allocation
page execute and read and write
A80000
trusted library allocation
page read and write
814000
heap
page read and write
43DB000
trusted library allocation
page read and write
D05000
trusted library allocation
page read and write
57A0000
heap
page read and write
63A2000
heap
page read and write
1290000
heap
page read and write
58C3000
heap
page read and write
1D026C82000
heap
page read and write
57C1000
heap
page read and write
F80000
heap
page read and write
361E000
stack
page read and write
400000
remote allocation
page execute and read and write
339F000
trusted library allocation
page read and write
1D0216B6000
heap
page read and write
33A7000
trusted library allocation
page read and write
1610000
heap
page read and write
5860000
trusted library allocation
page read and write
2BA0000
heap
page read and write
2F07000
trusted library allocation
page read and write
65EE000
stack
page read and write
1018000
heap
page read and write
1337000
stack
page read and write
40CB000
trusted library allocation
page read and write
1880000
trusted library allocation
page read and write
42EC000
trusted library allocation
page read and write
423F000
trusted library allocation
page read and write
3FB4000
trusted library allocation
page read and write
1D026BD0000
remote allocation
page read and write
4DED000
stack
page read and write
F3D000
trusted library allocation
page execute and read and write
1D021580000
trusted library allocation
page read and write
B7EE000
stack
page read and write
FB7000
heap
page read and write
1D026A32000
trusted library allocation
page read and write
1D026A31000
trusted library allocation
page read and write
5068000
trusted library allocation
page read and write
15EC000
stack
page read and write
3218000
trusted library allocation
page read and write
C37E6DB000
stack
page read and write
19B0000
heap
page read and write
57BB000
heap
page read and write
3EF2000
trusted library allocation
page read and write
33A4000
trusted library allocation
page read and write
5DE0000
heap
page read and write
1D026C3F000
heap
page read and write
2D36000
trusted library allocation
page read and write
2E0F000
trusted library allocation
page read and write
56A0000
heap
page read and write
844000
heap
page read and write
143A000
heap
page read and write
A84000
trusted library allocation
page read and write
68E0000
trusted library allocation
page read and write
4BC8000
trusted library allocation
page read and write
33A9000
trusted library allocation
page read and write
190E000
stack
page read and write
4D50000
heap
page execute and read and write
1D026B20000
trusted library allocation
page read and write
2DDE000
trusted library allocation
page read and write
3C0000
heap
page read and write
1870000
trusted library allocation
page read and write
1366000
heap
page read and write
2F67000
trusted library allocation
page read and write
A9DF000
stack
page read and write
442000
remote allocation
page execute and read and write
17F0000
trusted library allocation
page read and write
18AB000
trusted library allocation
page execute and read and write
AD0000
trusted library allocation
page read and write
BF3F000
stack
page read and write
307E000
stack
page read and write
F65000
trusted library allocation
page execute and read and write
427000
remote allocation
page execute and read and write
B25D000
stack
page read and write
411B000
trusted library allocation
page read and write
143E000
heap
page read and write
6A70000
trusted library allocation
page read and write
3A0000
heap
page read and write
3216000
trusted library allocation
page read and write
CE0000
trusted library allocation
page read and write
2DD0000
trusted library allocation
page read and write
1D026B70000
trusted library allocation
page read and write
EFE000
stack
page read and write
3CB9000
trusted library allocation
page read and write
1300000
trusted library allocation
page read and write
128E000
stack
page read and write
2E51000
trusted library allocation
page read and write
3C79000
trusted library allocation
page read and write
1D027000000
heap
page read and write
703A0000
unkown
page readonly
B49F000
stack
page read and write
AA6000
trusted library allocation
page execute and read and write
B39E000
stack
page read and write
D20000
heap
page read and write
4343000
trusted library allocation
page read and write
141B000
heap
page read and write
412F000
trusted library allocation
page read and write
2E14000
trusted library allocation
page read and write
14D7000
heap
page read and write
17D6000
trusted library allocation
page read and write
586B000
trusted library allocation
page read and write
5864000
trusted library allocation
page read and write
CF0000
trusted library allocation
page read and write
C37F07E000
unkown
page readonly
5770000
heap
page read and write
C37EC77000
stack
page read and write
11F5000
heap
page read and write
186E000
stack
page read and write
17BB000
trusted library allocation
page read and write
4B50000
trusted library allocation
page read and write
2E55000
trusted library allocation
page read and write
55DD000
trusted library allocation
page read and write
3DE6000
trusted library allocation
page read and write
1D021F04000
heap
page read and write
55F0000
heap
page read and write
5090000
trusted library allocation
page read and write
78C0000
trusted library allocation
page read and write
32EE000
trusted library allocation
page read and write
67B0000
heap
page read and write
1100000
heap
page read and write
67F0000
trusted library allocation
page execute and read and write
337D000
trusted library allocation
page read and write
D2A000
heap
page read and write
541C000
stack
page read and write
2BF0000
heap
page read and write
F20000
trusted library allocation
page read and write
2F99000
trusted library allocation
page read and write
622E000
stack
page read and write
4B80000
trusted library allocation
page read and write
2E09000
trusted library allocation
page read and write
1D0280A0000
trusted library allocation
page read and write
30B0000
trusted library allocation
page read and write
2EFF000
trusted library allocation
page read and write
5E70000
trusted library section
page readonly
12E3000
trusted library allocation
page execute and read and write
31E3000
trusted library allocation
page read and write
AF0000
trusted library allocation
page read and write
1874000
trusted library allocation
page read and write
1505000
heap
page read and write
B5EF000
stack
page read and write
67C6000
trusted library allocation
page read and write
3CBB000
trusted library allocation
page read and write
5140000
trusted library allocation
page read and write
310F000
trusted library allocation
page read and write
BCEE000
stack
page read and write
CD0000
heap
page read and write
1D026CA3000
heap
page read and write
15F4000
trusted library allocation
page read and write
37C0000
heap
page read and write
12FD000
trusted library allocation
page execute and read and write
1600000
trusted library allocation
page read and write
2D10000
trusted library allocation
page read and write
5070000
trusted library section
page readonly
441000
remote allocation
page execute and read and write
5050000
heap
page read and write
AE0000
trusted library allocation
page execute and read and write
2F55000
trusted library allocation
page read and write
1D0229A0000
trusted library allocation
page read and write
7DE0000
trusted library allocation
page execute and read and write
1896000
trusted library allocation
page execute and read and write
34A0000
heap
page read and write
7B1000
heap
page read and write
1D026D04000
heap
page read and write
30C7000
trusted library allocation
page read and write
1356000
trusted library allocation
page read and write
1D022580000
trusted library allocation
page read and write
3F64000
trusted library allocation
page read and write
6800000
trusted library allocation
page read and write
4AE0000
trusted library allocation
page read and write
1382000
trusted library allocation
page read and write
5E40000
trusted library section
page read and write
67E0000
trusted library allocation
page read and write
68F0000
trusted library allocation
page read and write
33A000
stack
page read and write
51FE000
stack
page read and write
5960000
trusted library allocation
page read and write
11D0000
heap
page execute and read and write
3D16000
trusted library allocation
page read and write
1D026B00000
trusted library allocation
page read and write
1D026CC0000
heap
page read and write
4D2C000
stack
page read and write
C30017D000
stack
page read and write
3050000
heap
page execute and read and write
2D0C000
trusted library allocation
page read and write
3375000
trusted library allocation
page read and write
12E0000
trusted library allocation
page read and write
1D026CBB000
heap
page read and write
68A6000
trusted library allocation
page read and write
43B000
remote allocation
page execute and read and write
3281000
trusted library allocation
page read and write
B6EE000
stack
page read and write
5ADF000
unkown
page read and write
EF2000
unkown
page readonly
2680000
heap
page execute and read and write
7DAE000
stack
page read and write
11F0000
heap
page read and write
2F94000
trusted library allocation
page read and write
1D026B80000
trusted library allocation
page read and write
32CA000
trusted library allocation
page read and write
AD5E000
stack
page read and write
5060000
trusted library allocation
page read and write
1980000
trusted library allocation
page execute and read and write
2CB8000
trusted library allocation
page read and write
675F000
stack
page read and write
2EB7000
trusted library allocation
page read and write
31ED000
trusted library allocation
page read and write
32E5000
trusted library allocation
page read and write
335E000
unkown
page read and write
50A0000
trusted library allocation
page read and write
136E000
trusted library allocation
page read and write
1D0216B2000
heap
page read and write
CBD000
trusted library allocation
page read and write
1312000
trusted library allocation
page read and write
6A34000
heap
page read and write
3D0B000
trusted library allocation
page read and write
7B3000
heap
page read and write
2CC7000
trusted library allocation
page read and write
1330000
heap
page read and write
67AE000
stack
page read and write
5150000
trusted library allocation
page read and write
AFDE000
stack
page read and write
13A0000
heap
page read and write
C9B000
trusted library allocation
page read and write
5570000
heap
page execute and read and write
2D04000
trusted library allocation
page read and write
478D000
stack
page read and write
6B40000
trusted library allocation
page read and write
3310000
heap
page read and write
18C0000
trusted library allocation
page read and write
6820000
trusted library allocation
page execute and read and write
43E000
remote allocation
page execute and read and write
1750000
trusted library allocation
page read and write
17B6000
trusted library allocation
page read and write
2D00000
trusted library allocation
page read and write
4BB0000
trusted library allocation
page read and write
6430000
heap
page read and write
2CF4000
trusted library allocation
page read and write
1350000
trusted library allocation
page read and write
1D021671000
heap
page read and write
6A60000
trusted library allocation
page execute and read and write
64AA000
heap
page read and write
4B00000
heap
page read and write
7DC0000
trusted library allocation
page read and write
D9A000
stack
page read and write
51CE000
stack
page read and write
2E6F000
stack
page read and write
1D026C4C000
heap
page read and write
1D02168C000
heap
page read and write
AE9E000
stack
page read and write
587E000
trusted library allocation
page read and write
1D021613000
heap
page read and write
F30000
trusted library allocation
page read and write
3F4E000
trusted library allocation
page read and write
1D021F09000
heap
page read and write
3F2F000
trusted library allocation
page read and write
13FE000
stack
page read and write
1D026CEF000
heap
page read and write
3D51000
trusted library allocation
page read and write
6645000
heap
page read and write
A3F000
stack
page read and write
3117000
trusted library allocation
page read and write
DC0000
heap
page read and write
AA0000
trusted library allocation
page read and write
2C40000
heap
page read and write
11E0000
heap
page read and write
F5A000
trusted library allocation
page execute and read and write
F6B000
trusted library allocation
page execute and read and write
68B0000
trusted library allocation
page read and write
2E05000
trusted library allocation
page read and write
2F8E000
trusted library allocation
page read and write
A8DE000
stack
page read and write
1306000
trusted library allocation
page execute and read and write
67BA000
trusted library allocation
page read and write
1302000
trusted library allocation
page read and write
3262000
trusted library allocation
page read and write
3EB9000
trusted library allocation
page read and write
3210000
trusted library allocation
page read and write
1D021693000
heap
page read and write
1960000
heap
page read and write
438000
remote allocation
page execute and read and write
130A000
trusted library allocation
page execute and read and write
1D021600000
heap
page read and write
31E7000
trusted library allocation
page read and write
5560000
trusted library allocation
page read and write
2F9D000
trusted library allocation
page read and write
F34000
trusted library allocation
page read and write
760000
trusted library allocation
page read and write
5C90000
heap
page read and write
584B000
heap
page read and write
6A90000
trusted library allocation
page execute and read and write
2DE3000
trusted library allocation
page read and write
F40000
trusted library allocation
page read and write
6330000
heap
page read and write
3223000
trusted library allocation
page read and write
13DD000
heap
page read and write
1810000
heap
page read and write
30BD000
trusted library allocation
page read and write
3E0000
heap
page read and write
1D026A50000
trusted library allocation
page read and write
1D021622000
heap
page read and write
1990000
trusted library allocation
page read and write
3D54000
trusted library allocation
page read and write
50B0000
trusted library allocation
page execute and read and write
1890000
trusted library allocation
page read and write
1464000
heap
page read and write
17B0000
trusted library allocation
page read and write
596A000
trusted library allocation
page read and write
1892000
trusted library allocation
page read and write
5C60000
trusted library allocation
page read and write
ABB000
trusted library allocation
page execute and read and write
11CE000
stack
page read and write
2CA0000
trusted library allocation
page read and write
57A2000
heap
page read and write
646E000
stack
page read and write
1760000
heap
page read and write
1D026C28000
heap
page read and write
303F000
unkown
page read and write
1D026A10000
trusted library allocation
page read and write
18A2000
trusted library allocation
page read and write
3107000
trusted library allocation
page read and write
1D0216A4000
heap
page read and write
6630000
heap
page read and write
1D0216B6000
heap
page read and write
6920000
trusted library allocation
page execute and read and write
DA0000
heap
page read and write
1D026CF4000
heap
page read and write
3D1F000
trusted library allocation
page read and write
F67000
trusted library allocation
page execute and read and write
1873000
trusted library allocation
page execute and read and write
F56000
trusted library allocation
page execute and read and write
5DDE000
stack
page read and write
6FAE000
stack
page read and write
3E76000
trusted library allocation
page read and write
30BF000
stack
page read and write
4302000
trusted library allocation
page read and write
6810000
trusted library allocation
page execute and read and write
58C0000
heap
page read and write
1D02168E000
heap
page read and write
1D02168E000
heap
page read and write
12E4000
trusted library allocation
page read and write
C300CFE000
stack
page read and write
2CF8000
trusted library allocation
page read and write
1D0216FE000
heap
page read and write
6AA0000
trusted library allocation
page execute and read and write
5900000
trusted library allocation
page read and write
58E0000
heap
page execute and read and write
57BD000
heap
page read and write
644D000
heap
page read and write
EF0000
unkown
page readonly
6B90000
trusted library allocation
page execute and read and write
15AE000
stack
page read and write
BAAE000
stack
page read and write
2F20000
heap
page read and write
4393000
trusted library allocation
page read and write
55C6000
trusted library allocation
page read and write
7D6E000
stack
page read and write
1D026B20000
trusted library allocation
page read and write
3260000
trusted library allocation
page read and write
6397000
heap
page read and write
5A20000
trusted library allocation
page read and write
152F000
stack
page read and write
C8B000
stack
page read and write
1D026CCF000
heap
page read and write
2ED5000
trusted library allocation
page read and write
3378000
trusted library allocation
page read and write
2DD6000
trusted library allocation
page read and write
67C8000
trusted library allocation
page read and write
43C4000
trusted library allocation
page read and write
1D021470000
heap
page read and write
2E20000
heap
page read and write
123E000
stack
page read and write
19BA000
heap
page read and write
1D0216FE000
heap
page read and write
A83000
trusted library allocation
page execute and read and write
703BD000
unkown
page read and write
1D026A60000
trusted library allocation
page read and write
67CD000
trusted library allocation
page read and write
1D022340000
trusted library allocation
page read and write
131B000
trusted library allocation
page execute and read and write
1D021693000
heap
page read and write
1D028010000
trusted library allocation
page read and write
3DD0000
trusted library allocation
page read and write
2FA2000
trusted library allocation
page read and write
BBEE000
stack
page read and write
BE3E000
stack
page read and write
1D0216A8000
heap
page read and write
1D02169E000
heap
page read and write
32EA000
trusted library allocation
page read and write
3146000
trusted library allocation
page read and write
507E000
trusted library section
page readonly
3113000
trusted library allocation
page read and write
C1E0000
trusted library allocation
page read and write
A8D000
trusted library allocation
page execute and read and write
58A0000
heap
page read and write
4164000
trusted library allocation
page read and write
1D021F02000
heap
page read and write
C300D7E000
unkown
page readonly
336F000
trusted library allocation
page read and write
4286000
trusted library allocation
page read and write
4212000
trusted library allocation
page read and write
4B40000
trusted library allocation
page execute and read and write
6B70000
heap
page read and write
DE5000
heap
page read and write
41E0000
trusted library allocation
page read and write
CE6000
trusted library allocation
page read and write
AA2000
trusted library allocation
page read and write
792E000
stack
page read and write
67C0000
trusted library allocation
page read and write
30DA000
trusted library allocation
page read and write
4281000
trusted library allocation
page read and write
32CC000
trusted library allocation
page read and write
321E000
trusted library allocation
page read and write
4106000
trusted library allocation
page read and write
5288000
trusted library allocation
page read and write
440000
remote allocation
page execute and read and write
3315000
trusted library allocation
page read and write
3EDC000
trusted library allocation
page read and write
31F2000
trusted library allocation
page read and write
6D3E000
stack
page read and write
2CAD000
trusted library allocation
page read and write
1D021F1A000
heap
page read and write
4C58000
trusted library allocation
page read and write
1D021E00000
heap
page read and write
2785000
trusted library allocation
page read and write
324E000
trusted library allocation
page read and write
64DE000
stack
page read and write
5952000
trusted library allocation
page read and write
2CC3000
trusted library allocation
page read and write
41E000
remote allocation
page execute and read and write
55D0000
trusted library allocation
page read and write
2EC2000
trusted library allocation
page read and write
AB20000
heap
page read and write
3C51000
trusted library allocation
page read and write
35DF000
unkown
page read and write
C37F57B000
stack
page read and write
B92D000
stack
page read and write
1D021F00000
heap
page read and write
1530000
trusted library allocation
page read and write
6A5E000
stack
page read and write
1D026BD0000
remote allocation
page read and write
1310000
trusted library allocation
page read and write
1230000
heap
page read and write
2739000
trusted library allocation
page read and write
3F83000
trusted library allocation
page read and write
4B6A000
trusted library allocation
page read and write
2CFC000
trusted library allocation
page read and write
6B30000
trusted library allocation
page execute and read and write
F62000
trusted library allocation
page read and write
55E0000
trusted library allocation
page execute and read and write
B00000
heap
page read and write
806000
heap
page read and write
BBAE000
stack
page read and write
31DF000
trusted library allocation
page read and write
58A0000
trusted library allocation
page read and write
6B10000
trusted library allocation
page read and write
B11B000
stack
page read and write
F88000
heap
page read and write
32C7000
trusted library allocation
page read and write
5210000
heap
page execute and read and write
25CE000
stack
page read and write
4BC0000
trusted library allocation
page read and write
1390000
heap
page read and write
77A000
heap
page read and write
7FD000
heap
page read and write
1D0216A4000
heap
page read and write
3FCA000
trusted library allocation
page read and write
703A1000
unkown
page execute read
4314000
trusted library allocation
page read and write
1D02169E000
heap
page read and write
1D026C52000
heap
page read and write
5283000
heap
page read and write
14C6000
heap
page read and write
3366000
trusted library allocation
page read and write
B21C000
stack
page read and write
671D000
stack
page read and write
648D000
heap
page read and write
1D021702000
heap
page read and write
137D000
trusted library allocation
page read and write
77E000
heap
page read and write
5E60000
trusted library allocation
page read and write
1540000
trusted library allocation
page execute and read and write
F50000
trusted library allocation
page read and write
1D02168C000
heap
page read and write
17DD000
trusted library allocation
page read and write
18A0000
trusted library allocation
page read and write
4270000
trusted library allocation
page read and write
F52000
trusted library allocation
page read and write
194B000
stack
page read and write
4AA9000
trusted library allocation
page read and write
1535000
heap
page read and write
6AB0000
trusted library allocation
page execute and read and write
A7DF000
stack
page read and write
1D026B90000
trusted library allocation
page read and write
4061000
trusted library allocation
page read and write
5080000
heap
page read and write
34BC000
heap
page read and write
55CA000
trusted library allocation
page read and write
1D026B30000
trusted library allocation
page read and write
18A7000
trusted library allocation
page execute and read and write
325E000
stack
page read and write
135E000
trusted library allocation
page read and write
1D0269A0000
trusted library allocation
page read and write
135A000
heap
page read and write
12F0000
trusted library allocation
page read and write
1D021DD1000
trusted library allocation
page read and write
40E0000
trusted library allocation
page read and write
3384000
trusted library allocation
page read and write
2CCB000
trusted library allocation
page read and write
68D7000
trusted library allocation
page read and write
1D026BD0000
remote allocation
page read and write
1D026A60000
trusted library allocation
page read and write
3CD0000
trusted library allocation
page read and write
2B3A000
stack
page read and write
C0BE000
stack
page read and write
41F6000
trusted library allocation
page read and write
17CA000
trusted library allocation
page read and write
3CE1000
trusted library allocation
page read and write
A90000
trusted library allocation
page read and write
13B0000
heap
page read and write
6A80000
trusted library allocation
page execute and read and write
5CDB000
stack
page read and write
4B52000
trusted library allocation
page read and write
2E01000
trusted library allocation
page read and write
6640000
heap
page read and write
6B7E000
stack
page read and write
1D0269B0000
trusted library allocation
page read and write
6F7000
stack
page read and write
6F6E000
stack
page read and write
32D2000
trusted library allocation
page read and write
502E000
stack
page read and write
4D30000
heap
page read and write
68AA000
trusted library allocation
page read and write
31E5000
trusted library allocation
page read and write
B4A0000
trusted library allocation
page read and write
4B33000
heap
page read and write
55F3000
heap
page read and write
1D021706000
heap
page read and write
5E3E000
stack
page read and write
689E000
stack
page read and write
33AE000
trusted library allocation
page read and write
58B0000
trusted library allocation
page read and write
6B50000
trusted library allocation
page read and write
C37ED7E000
unkown
page readonly
1D026B60000
trusted library allocation
page read and write
6B20000
trusted library allocation
page read and write
3322000
trusted library allocation
page read and write
331C000
trusted library allocation
page read and write
6433000
heap
page read and write
3103000
trusted library allocation
page read and write
5AC0000
heap
page read and write
816000
heap
page read and write
57EF000
heap
page read and write
64AE000
stack
page read and write
1D026A89000
trusted library allocation
page read and write
588D000
trusted library allocation
page read and write
420000
remote allocation
page execute and read and write
136A000
trusted library allocation
page read and write
3270000
heap
page read and write
43A000
remote allocation
page execute and read and write
3390000
heap
page read and write
2ECB000
trusted library allocation
page read and write
77C0000
heap
page read and write
7AEE000
stack
page read and write
5AA0000
trusted library allocation
page execute and read and write
6A20000
heap
page read and write
2CF0000
trusted library allocation
page read and write
5BA0000
trusted library allocation
page read and write
6FEE000
stack
page read and write
566E000
stack
page read and write
C3002FE000
unkown
page readonly
D00000
trusted library allocation
page read and write
1471000
heap
page read and write
C07C000
stack
page read and write
5280000
heap
page read and write
1560000
heap
page read and write
67B4000
trusted library allocation
page read and write
3169000
trusted library allocation
page read and write
CB1000
trusted library allocation
page read and write
19A0000
trusted library allocation
page read and write
CE4000
trusted library allocation
page read and write
32AA000
stack
page read and write
D10000
trusted library allocation
page read and write
187D000
trusted library allocation
page execute and read and write
1D026B80000
trusted library allocation
page read and write
3A5000
heap
page read and write
1D026D0A000
heap
page read and write
A93000
trusted library allocation
page read and write
A9D000
trusted library allocation
page execute and read and write
FAA000
heap
page read and write
1D02167B000
heap
page read and write
A7E000
stack
page read and write
2DD4000
trusted library allocation
page read and write
AB1D000
stack
page read and write
FB4000
heap
page read and write
1D026CEB000
heap
page read and write
1071000
heap
page read and write
311F000
trusted library allocation
page read and write
6639000
heap
page read and write
26DA000
trusted library allocation
page read and write
2E07000
trusted library allocation
page read and write
645F000
heap
page read and write
1D0216A9000
heap
page read and write
433F000
trusted library allocation
page read and write
1180000
trusted library allocation
page read and write
1317000
trusted library allocation
page execute and read and write
43D000
remote allocation
page execute and read and write
1950000
heap
page execute and read and write
2F12000
trusted library allocation
page read and write
2EAE000
stack
page read and write
67D0000
trusted library allocation
page execute and read and write
3373000
trusted library allocation
page read and write
3691000
trusted library allocation
page read and write
68D0000
trusted library allocation
page read and write
7D2E000
stack
page read and write
6930000
heap
page read and write
C1BE000
stack
page read and write
6B47000
trusted library allocation
page read and write
1D0216BC000
heap
page read and write
33B2000
trusted library allocation
page read and write
1D026D02000
heap
page read and write
6BB0000
heap
page read and write
1D0216B2000
heap
page read and write
5892000
trusted library allocation
page read and write
1340000
trusted library allocation
page read and write
17CE000
trusted library allocation
page read and write
6B30000
trusted library allocation
page execute and read and write
6840000
trusted library allocation
page execute and read and write
1D021702000
heap
page read and write
25D8000
trusted library allocation
page read and write
AB2000
trusted library allocation
page read and write
5930000
heap
page read and write
57F2000
heap
page read and write
1D0216B2000
heap
page read and write
146F000
heap
page read and write
43F000
remote allocation
page execute and read and write
632E000
stack
page read and write
68C0000
trusted library allocation
page execute and read and write
CAE000
trusted library allocation
page read and write
1430000
heap
page read and write
67B6000
trusted library allocation
page read and write
17BE000
trusted library allocation
page read and write
5055000
heap
page read and write
C37F67E000
unkown
page readonly
6463000
heap
page read and write
1550000
trusted library allocation
page read and write
1457000
heap
page read and write
1315000
trusted library allocation
page execute and read and write
2F5F000
trusted library allocation
page read and write
4374000
trusted library allocation
page read and write
1D026C84000
heap
page read and write
365F000
stack
page read and write
15F0000
trusted library allocation
page read and write
1D02162B000
heap
page read and write
5760000
heap
page read and write
1376000
trusted library allocation
page read and write
5826000
heap
page read and write
77D4000
heap
page read and write
703BD000
unkown
page read and write
2E3F000
trusted library allocation
page read and write
1D021713000
heap
page read and write
1D021F1A000
heap
page read and write
3D26000
trusted library allocation
page read and write
5136000
trusted library allocation
page read and write
2EDE000
trusted library allocation
page read and write
There are 825 hidden memdumps, click here to show them.